1 | // SPDX-License-Identifier: GPL-2.0 |
2 | /* |
3 | * Common code for probe-based Dynamic events. |
4 | * |
5 | * This code was copied from kernel/trace/trace_kprobe.c written by |
6 | * Masami Hiramatsu <masami.hiramatsu.pt@hitachi.com> |
7 | * |
8 | * Updates to make this generic: |
9 | * Copyright (C) IBM Corporation, 2010-2011 |
10 | * Author: Srikar Dronamraju |
11 | */ |
12 | #define pr_fmt(fmt) "trace_probe: " fmt |
13 | |
14 | #include <linux/bpf.h> |
15 | #include "trace_btf.h" |
16 | |
17 | #include "trace_probe.h" |
18 | |
19 | #undef C |
20 | #define C(a, b) b |
21 | |
22 | static const char *trace_probe_err_text[] = { ERRORS }; |
23 | |
24 | static const char *reserved_field_names[] = { |
25 | "common_type" , |
26 | "common_flags" , |
27 | "common_preempt_count" , |
28 | "common_pid" , |
29 | "common_tgid" , |
30 | FIELD_STRING_IP, |
31 | FIELD_STRING_RETIP, |
32 | FIELD_STRING_FUNC, |
33 | }; |
34 | |
35 | /* Printing in basic type function template */ |
36 | #define DEFINE_BASIC_PRINT_TYPE_FUNC(tname, type, fmt) \ |
37 | int PRINT_TYPE_FUNC_NAME(tname)(struct trace_seq *s, void *data, void *ent)\ |
38 | { \ |
39 | trace_seq_printf(s, fmt, *(type *)data); \ |
40 | return !trace_seq_has_overflowed(s); \ |
41 | } \ |
42 | const char PRINT_TYPE_FMT_NAME(tname)[] = fmt; |
43 | |
44 | DEFINE_BASIC_PRINT_TYPE_FUNC(u8, u8, "%u" ) |
45 | DEFINE_BASIC_PRINT_TYPE_FUNC(u16, u16, "%u" ) |
46 | DEFINE_BASIC_PRINT_TYPE_FUNC(u32, u32, "%u" ) |
47 | DEFINE_BASIC_PRINT_TYPE_FUNC(u64, u64, "%Lu" ) |
48 | DEFINE_BASIC_PRINT_TYPE_FUNC(s8, s8, "%d" ) |
49 | DEFINE_BASIC_PRINT_TYPE_FUNC(s16, s16, "%d" ) |
50 | DEFINE_BASIC_PRINT_TYPE_FUNC(s32, s32, "%d" ) |
51 | DEFINE_BASIC_PRINT_TYPE_FUNC(s64, s64, "%Ld" ) |
52 | DEFINE_BASIC_PRINT_TYPE_FUNC(x8, u8, "0x%x" ) |
53 | DEFINE_BASIC_PRINT_TYPE_FUNC(x16, u16, "0x%x" ) |
54 | DEFINE_BASIC_PRINT_TYPE_FUNC(x32, u32, "0x%x" ) |
55 | DEFINE_BASIC_PRINT_TYPE_FUNC(x64, u64, "0x%Lx" ) |
56 | DEFINE_BASIC_PRINT_TYPE_FUNC(char, u8, "'%c'" ) |
57 | |
58 | int PRINT_TYPE_FUNC_NAME(symbol)(struct trace_seq *s, void *data, void *ent) |
59 | { |
60 | trace_seq_printf(s, fmt: "%pS" , (void *)*(unsigned long *)data); |
61 | return !trace_seq_has_overflowed(s); |
62 | } |
63 | const char PRINT_TYPE_FMT_NAME(symbol)[] = "%pS" ; |
64 | |
65 | /* Print type function for string type */ |
66 | int PRINT_TYPE_FUNC_NAME(string)(struct trace_seq *s, void *data, void *ent) |
67 | { |
68 | int len = *(u32 *)data >> 16; |
69 | |
70 | if (!len) |
71 | trace_seq_puts(s, FAULT_STRING); |
72 | else |
73 | trace_seq_printf(s, fmt: "\"%s\"" , |
74 | (const char *)get_loc_data(dl: data, ent)); |
75 | return !trace_seq_has_overflowed(s); |
76 | } |
77 | |
78 | const char PRINT_TYPE_FMT_NAME(string)[] = "\\\"%s\\\"" ; |
79 | |
80 | /* Fetch type information table */ |
81 | static const struct fetch_type probe_fetch_types[] = { |
82 | /* Special types */ |
83 | __ASSIGN_FETCH_TYPE("string" , string, string, sizeof(u32), 1, 1, |
84 | "__data_loc char[]" ), |
85 | __ASSIGN_FETCH_TYPE("ustring" , string, string, sizeof(u32), 1, 1, |
86 | "__data_loc char[]" ), |
87 | __ASSIGN_FETCH_TYPE("symstr" , string, string, sizeof(u32), 1, 1, |
88 | "__data_loc char[]" ), |
89 | /* Basic types */ |
90 | ASSIGN_FETCH_TYPE(u8, u8, 0), |
91 | ASSIGN_FETCH_TYPE(u16, u16, 0), |
92 | ASSIGN_FETCH_TYPE(u32, u32, 0), |
93 | ASSIGN_FETCH_TYPE(u64, u64, 0), |
94 | ASSIGN_FETCH_TYPE(s8, u8, 1), |
95 | ASSIGN_FETCH_TYPE(s16, u16, 1), |
96 | ASSIGN_FETCH_TYPE(s32, u32, 1), |
97 | ASSIGN_FETCH_TYPE(s64, u64, 1), |
98 | ASSIGN_FETCH_TYPE_ALIAS(x8, u8, u8, 0), |
99 | ASSIGN_FETCH_TYPE_ALIAS(x16, u16, u16, 0), |
100 | ASSIGN_FETCH_TYPE_ALIAS(x32, u32, u32, 0), |
101 | ASSIGN_FETCH_TYPE_ALIAS(x64, u64, u64, 0), |
102 | ASSIGN_FETCH_TYPE_ALIAS(char, u8, u8, 0), |
103 | ASSIGN_FETCH_TYPE_ALIAS(symbol, ADDR_FETCH_TYPE, ADDR_FETCH_TYPE, 0), |
104 | |
105 | ASSIGN_FETCH_TYPE_END |
106 | }; |
107 | |
108 | static const struct fetch_type *find_fetch_type(const char *type, unsigned long flags) |
109 | { |
110 | int i; |
111 | |
112 | /* Reject the symbol/symstr for uprobes */ |
113 | if (type && (flags & TPARG_FL_USER) && |
114 | (!strcmp(type, "symbol" ) || !strcmp(type, "symstr" ))) |
115 | return NULL; |
116 | |
117 | if (!type) |
118 | type = DEFAULT_FETCH_TYPE_STR; |
119 | |
120 | /* Special case: bitfield */ |
121 | if (*type == 'b') { |
122 | unsigned long bs; |
123 | |
124 | type = strchr(type, '/'); |
125 | if (!type) |
126 | goto fail; |
127 | |
128 | type++; |
129 | if (kstrtoul(s: type, base: 0, res: &bs)) |
130 | goto fail; |
131 | |
132 | switch (bs) { |
133 | case 8: |
134 | return find_fetch_type(type: "u8" , flags); |
135 | case 16: |
136 | return find_fetch_type(type: "u16" , flags); |
137 | case 32: |
138 | return find_fetch_type(type: "u32" , flags); |
139 | case 64: |
140 | return find_fetch_type(type: "u64" , flags); |
141 | default: |
142 | goto fail; |
143 | } |
144 | } |
145 | |
146 | for (i = 0; probe_fetch_types[i].name; i++) { |
147 | if (strcmp(type, probe_fetch_types[i].name) == 0) |
148 | return &probe_fetch_types[i]; |
149 | } |
150 | |
151 | fail: |
152 | return NULL; |
153 | } |
154 | |
155 | static struct trace_probe_log trace_probe_log; |
156 | |
157 | void trace_probe_log_init(const char *subsystem, int argc, const char **argv) |
158 | { |
159 | trace_probe_log.subsystem = subsystem; |
160 | trace_probe_log.argc = argc; |
161 | trace_probe_log.argv = argv; |
162 | trace_probe_log.index = 0; |
163 | } |
164 | |
165 | void trace_probe_log_clear(void) |
166 | { |
167 | memset(&trace_probe_log, 0, sizeof(trace_probe_log)); |
168 | } |
169 | |
170 | void trace_probe_log_set_index(int index) |
171 | { |
172 | trace_probe_log.index = index; |
173 | } |
174 | |
175 | void __trace_probe_log_err(int offset, int err_type) |
176 | { |
177 | char *command, *p; |
178 | int i, len = 0, pos = 0; |
179 | |
180 | if (!trace_probe_log.argv) |
181 | return; |
182 | |
183 | /* Recalculate the length and allocate buffer */ |
184 | for (i = 0; i < trace_probe_log.argc; i++) { |
185 | if (i == trace_probe_log.index) |
186 | pos = len; |
187 | len += strlen(trace_probe_log.argv[i]) + 1; |
188 | } |
189 | command = kzalloc(size: len, GFP_KERNEL); |
190 | if (!command) |
191 | return; |
192 | |
193 | if (trace_probe_log.index >= trace_probe_log.argc) { |
194 | /** |
195 | * Set the error position is next to the last arg + space. |
196 | * Note that len includes the terminal null and the cursor |
197 | * appears at pos + 1. |
198 | */ |
199 | pos = len; |
200 | offset = 0; |
201 | } |
202 | |
203 | /* And make a command string from argv array */ |
204 | p = command; |
205 | for (i = 0; i < trace_probe_log.argc; i++) { |
206 | len = strlen(trace_probe_log.argv[i]); |
207 | strcpy(p, q: trace_probe_log.argv[i]); |
208 | p[len] = ' '; |
209 | p += len + 1; |
210 | } |
211 | *(p - 1) = '\0'; |
212 | |
213 | tracing_log_err(NULL, loc: trace_probe_log.subsystem, cmd: command, |
214 | errs: trace_probe_err_text, type: err_type, pos: pos + offset); |
215 | |
216 | kfree(objp: command); |
217 | } |
218 | |
219 | /* Split symbol and offset. */ |
220 | int traceprobe_split_symbol_offset(char *symbol, long *offset) |
221 | { |
222 | char *tmp; |
223 | int ret; |
224 | |
225 | if (!offset) |
226 | return -EINVAL; |
227 | |
228 | tmp = strpbrk(symbol, "+-" ); |
229 | if (tmp) { |
230 | ret = kstrtol(s: tmp, base: 0, res: offset); |
231 | if (ret) |
232 | return ret; |
233 | *tmp = '\0'; |
234 | } else |
235 | *offset = 0; |
236 | |
237 | return 0; |
238 | } |
239 | |
240 | /* @buf must has MAX_EVENT_NAME_LEN size */ |
241 | int traceprobe_parse_event_name(const char **pevent, const char **pgroup, |
242 | char *buf, int offset) |
243 | { |
244 | const char *slash, *event = *pevent; |
245 | int len; |
246 | |
247 | slash = strchr(event, '/'); |
248 | if (!slash) |
249 | slash = strchr(event, '.'); |
250 | |
251 | if (slash) { |
252 | if (slash == event) { |
253 | trace_probe_log_err(offset, NO_GROUP_NAME); |
254 | return -EINVAL; |
255 | } |
256 | if (slash - event + 1 > MAX_EVENT_NAME_LEN) { |
257 | trace_probe_log_err(offset, GROUP_TOO_LONG); |
258 | return -EINVAL; |
259 | } |
260 | strscpy(buf, event, slash - event + 1); |
261 | if (!is_good_system_name(name: buf)) { |
262 | trace_probe_log_err(offset, BAD_GROUP_NAME); |
263 | return -EINVAL; |
264 | } |
265 | *pgroup = buf; |
266 | *pevent = slash + 1; |
267 | offset += slash - event + 1; |
268 | event = *pevent; |
269 | } |
270 | len = strlen(event); |
271 | if (len == 0) { |
272 | if (slash) { |
273 | *pevent = NULL; |
274 | return 0; |
275 | } |
276 | trace_probe_log_err(offset, NO_EVENT_NAME); |
277 | return -EINVAL; |
278 | } else if (len > MAX_EVENT_NAME_LEN) { |
279 | trace_probe_log_err(offset, EVENT_TOO_LONG); |
280 | return -EINVAL; |
281 | } |
282 | if (!is_good_name(name: event)) { |
283 | trace_probe_log_err(offset, BAD_EVENT_NAME); |
284 | return -EINVAL; |
285 | } |
286 | return 0; |
287 | } |
288 | |
289 | static int parse_trace_event_arg(char *arg, struct fetch_insn *code, |
290 | struct traceprobe_parse_context *ctx) |
291 | { |
292 | struct ftrace_event_field *field; |
293 | struct list_head *head; |
294 | |
295 | head = trace_get_fields(event_call: ctx->event); |
296 | list_for_each_entry(field, head, link) { |
297 | if (!strcmp(arg, field->name)) { |
298 | code->op = FETCH_OP_TP_ARG; |
299 | code->data = field; |
300 | return 0; |
301 | } |
302 | } |
303 | return -ENOENT; |
304 | } |
305 | |
306 | #ifdef CONFIG_PROBE_EVENTS_BTF_ARGS |
307 | |
308 | static u32 btf_type_int(const struct btf_type *t) |
309 | { |
310 | return *(u32 *)(t + 1); |
311 | } |
312 | |
313 | static bool btf_type_is_char_ptr(struct btf *btf, const struct btf_type *type) |
314 | { |
315 | const struct btf_type *real_type; |
316 | u32 intdata; |
317 | s32 tid; |
318 | |
319 | real_type = btf_type_skip_modifiers(btf, type->type, &tid); |
320 | if (!real_type) |
321 | return false; |
322 | |
323 | if (BTF_INFO_KIND(real_type->info) != BTF_KIND_INT) |
324 | return false; |
325 | |
326 | intdata = btf_type_int(real_type); |
327 | return !(BTF_INT_ENCODING(intdata) & BTF_INT_SIGNED) |
328 | && BTF_INT_BITS(intdata) == 8; |
329 | } |
330 | |
331 | static bool btf_type_is_char_array(struct btf *btf, const struct btf_type *type) |
332 | { |
333 | const struct btf_type *real_type; |
334 | const struct btf_array *array; |
335 | u32 intdata; |
336 | s32 tid; |
337 | |
338 | if (BTF_INFO_KIND(type->info) != BTF_KIND_ARRAY) |
339 | return false; |
340 | |
341 | array = (const struct btf_array *)(type + 1); |
342 | |
343 | real_type = btf_type_skip_modifiers(btf, array->type, &tid); |
344 | |
345 | intdata = btf_type_int(real_type); |
346 | return !(BTF_INT_ENCODING(intdata) & BTF_INT_SIGNED) |
347 | && BTF_INT_BITS(intdata) == 8; |
348 | } |
349 | |
350 | static int check_prepare_btf_string_fetch(char *typename, |
351 | struct fetch_insn **pcode, |
352 | struct traceprobe_parse_context *ctx) |
353 | { |
354 | struct btf *btf = ctx->btf; |
355 | |
356 | if (!btf || !ctx->last_type) |
357 | return 0; |
358 | |
359 | /* char [] does not need any change. */ |
360 | if (btf_type_is_char_array(btf, ctx->last_type)) |
361 | return 0; |
362 | |
363 | /* char * requires dereference the pointer. */ |
364 | if (btf_type_is_char_ptr(btf, ctx->last_type)) { |
365 | struct fetch_insn *code = *pcode + 1; |
366 | |
367 | if (code->op == FETCH_OP_END) { |
368 | trace_probe_log_err(ctx->offset, TOO_MANY_OPS); |
369 | return -E2BIG; |
370 | } |
371 | if (typename[0] == 'u') |
372 | code->op = FETCH_OP_UDEREF; |
373 | else |
374 | code->op = FETCH_OP_DEREF; |
375 | code->offset = 0; |
376 | *pcode = code; |
377 | return 0; |
378 | } |
379 | /* Other types are not available for string */ |
380 | trace_probe_log_err(ctx->offset, BAD_TYPE4STR); |
381 | return -EINVAL; |
382 | } |
383 | |
384 | static const char *fetch_type_from_btf_type(struct btf *btf, |
385 | const struct btf_type *type, |
386 | struct traceprobe_parse_context *ctx) |
387 | { |
388 | u32 intdata; |
389 | |
390 | /* TODO: const char * could be converted as a string */ |
391 | switch (BTF_INFO_KIND(type->info)) { |
392 | case BTF_KIND_ENUM: |
393 | /* enum is "int", so convert to "s32" */ |
394 | return "s32" ; |
395 | case BTF_KIND_ENUM64: |
396 | return "s64" ; |
397 | case BTF_KIND_PTR: |
398 | /* pointer will be converted to "x??" */ |
399 | if (IS_ENABLED(CONFIG_64BIT)) |
400 | return "x64" ; |
401 | else |
402 | return "x32" ; |
403 | case BTF_KIND_INT: |
404 | intdata = btf_type_int(type); |
405 | if (BTF_INT_ENCODING(intdata) & BTF_INT_SIGNED) { |
406 | switch (BTF_INT_BITS(intdata)) { |
407 | case 8: |
408 | return "s8" ; |
409 | case 16: |
410 | return "s16" ; |
411 | case 32: |
412 | return "s32" ; |
413 | case 64: |
414 | return "s64" ; |
415 | } |
416 | } else { /* unsigned */ |
417 | switch (BTF_INT_BITS(intdata)) { |
418 | case 8: |
419 | return "u8" ; |
420 | case 16: |
421 | return "u16" ; |
422 | case 32: |
423 | return "u32" ; |
424 | case 64: |
425 | return "u64" ; |
426 | } |
427 | /* bitfield, size is encoded in the type */ |
428 | ctx->last_bitsize = BTF_INT_BITS(intdata); |
429 | ctx->last_bitoffs += BTF_INT_OFFSET(intdata); |
430 | return "u64" ; |
431 | } |
432 | } |
433 | /* TODO: support other types */ |
434 | |
435 | return NULL; |
436 | } |
437 | |
438 | static int query_btf_context(struct traceprobe_parse_context *ctx) |
439 | { |
440 | const struct btf_param *param; |
441 | const struct btf_type *type; |
442 | struct btf *btf; |
443 | s32 nr; |
444 | |
445 | if (ctx->btf) |
446 | return 0; |
447 | |
448 | if (!ctx->funcname) |
449 | return -EINVAL; |
450 | |
451 | type = btf_find_func_proto(ctx->funcname, &btf); |
452 | if (!type) |
453 | return -ENOENT; |
454 | |
455 | ctx->btf = btf; |
456 | ctx->proto = type; |
457 | |
458 | /* ctx->params is optional, since func(void) will not have params. */ |
459 | nr = 0; |
460 | param = btf_get_func_param(type, &nr); |
461 | if (!IS_ERR_OR_NULL(param)) { |
462 | /* Hide the first 'data' argument of tracepoint */ |
463 | if (ctx->flags & TPARG_FL_TPOINT) { |
464 | nr--; |
465 | param++; |
466 | } |
467 | } |
468 | |
469 | if (nr > 0) { |
470 | ctx->nr_params = nr; |
471 | ctx->params = param; |
472 | } else { |
473 | ctx->nr_params = 0; |
474 | ctx->params = NULL; |
475 | } |
476 | |
477 | return 0; |
478 | } |
479 | |
480 | static void clear_btf_context(struct traceprobe_parse_context *ctx) |
481 | { |
482 | if (ctx->btf) { |
483 | btf_put(ctx->btf); |
484 | ctx->btf = NULL; |
485 | ctx->proto = NULL; |
486 | ctx->params = NULL; |
487 | ctx->nr_params = 0; |
488 | } |
489 | } |
490 | |
491 | /* Return 1 if the field separater is arrow operator ('->') */ |
492 | static int split_next_field(char *varname, char **next_field, |
493 | struct traceprobe_parse_context *ctx) |
494 | { |
495 | char *field; |
496 | int ret = 0; |
497 | |
498 | field = strpbrk(varname, ".-" ); |
499 | if (field) { |
500 | if (field[0] == '-' && field[1] == '>') { |
501 | field[0] = '\0'; |
502 | field += 2; |
503 | ret = 1; |
504 | } else if (field[0] == '.') { |
505 | field[0] = '\0'; |
506 | field += 1; |
507 | } else { |
508 | trace_probe_log_err(ctx->offset + field - varname, BAD_HYPHEN); |
509 | return -EINVAL; |
510 | } |
511 | *next_field = field; |
512 | } |
513 | |
514 | return ret; |
515 | } |
516 | |
517 | /* |
518 | * Parse the field of data structure. The @type must be a pointer type |
519 | * pointing the target data structure type. |
520 | */ |
521 | static int parse_btf_field(char *fieldname, const struct btf_type *type, |
522 | struct fetch_insn **pcode, struct fetch_insn *end, |
523 | struct traceprobe_parse_context *ctx) |
524 | { |
525 | struct fetch_insn *code = *pcode; |
526 | const struct btf_member *field; |
527 | u32 bitoffs, anon_offs; |
528 | char *next; |
529 | int is_ptr; |
530 | s32 tid; |
531 | |
532 | do { |
533 | /* Outer loop for solving arrow operator ('->') */ |
534 | if (BTF_INFO_KIND(type->info) != BTF_KIND_PTR) { |
535 | trace_probe_log_err(ctx->offset, NO_PTR_STRCT); |
536 | return -EINVAL; |
537 | } |
538 | /* Convert a struct pointer type to a struct type */ |
539 | type = btf_type_skip_modifiers(ctx->btf, type->type, &tid); |
540 | if (!type) { |
541 | trace_probe_log_err(ctx->offset, BAD_BTF_TID); |
542 | return -EINVAL; |
543 | } |
544 | |
545 | bitoffs = 0; |
546 | do { |
547 | /* Inner loop for solving dot operator ('.') */ |
548 | next = NULL; |
549 | is_ptr = split_next_field(fieldname, &next, ctx); |
550 | if (is_ptr < 0) |
551 | return is_ptr; |
552 | |
553 | anon_offs = 0; |
554 | field = btf_find_struct_member(ctx->btf, type, fieldname, |
555 | &anon_offs); |
556 | if (!field) { |
557 | trace_probe_log_err(ctx->offset, NO_BTF_FIELD); |
558 | return -ENOENT; |
559 | } |
560 | /* Add anonymous structure/union offset */ |
561 | bitoffs += anon_offs; |
562 | |
563 | /* Accumulate the bit-offsets of the dot-connected fields */ |
564 | if (btf_type_kflag(type)) { |
565 | bitoffs += BTF_MEMBER_BIT_OFFSET(field->offset); |
566 | ctx->last_bitsize = BTF_MEMBER_BITFIELD_SIZE(field->offset); |
567 | } else { |
568 | bitoffs += field->offset; |
569 | ctx->last_bitsize = 0; |
570 | } |
571 | |
572 | type = btf_type_skip_modifiers(ctx->btf, field->type, &tid); |
573 | if (!type) { |
574 | trace_probe_log_err(ctx->offset, BAD_BTF_TID); |
575 | return -EINVAL; |
576 | } |
577 | |
578 | ctx->offset += next - fieldname; |
579 | fieldname = next; |
580 | } while (!is_ptr && fieldname); |
581 | |
582 | if (++code == end) { |
583 | trace_probe_log_err(ctx->offset, TOO_MANY_OPS); |
584 | return -EINVAL; |
585 | } |
586 | code->op = FETCH_OP_DEREF; /* TODO: user deref support */ |
587 | code->offset = bitoffs / 8; |
588 | *pcode = code; |
589 | |
590 | ctx->last_bitoffs = bitoffs % 8; |
591 | ctx->last_type = type; |
592 | } while (fieldname); |
593 | |
594 | return 0; |
595 | } |
596 | |
597 | static int __store_entry_arg(struct trace_probe *tp, int argnum); |
598 | |
599 | static int parse_btf_arg(char *varname, |
600 | struct fetch_insn **pcode, struct fetch_insn *end, |
601 | struct traceprobe_parse_context *ctx) |
602 | { |
603 | struct fetch_insn *code = *pcode; |
604 | const struct btf_param *params; |
605 | const struct btf_type *type; |
606 | char *field = NULL; |
607 | int i, is_ptr, ret; |
608 | u32 tid; |
609 | |
610 | if (WARN_ON_ONCE(!ctx->funcname)) |
611 | return -EINVAL; |
612 | |
613 | is_ptr = split_next_field(varname, &field, ctx); |
614 | if (is_ptr < 0) |
615 | return is_ptr; |
616 | if (!is_ptr && field) { |
617 | /* dot-connected field on an argument is not supported. */ |
618 | trace_probe_log_err(ctx->offset + field - varname, |
619 | NOSUP_DAT_ARG); |
620 | return -EOPNOTSUPP; |
621 | } |
622 | |
623 | if (ctx->flags & TPARG_FL_RETURN && !strcmp(varname, "$retval" )) { |
624 | code->op = FETCH_OP_RETVAL; |
625 | /* Check whether the function return type is not void */ |
626 | if (query_btf_context(ctx) == 0) { |
627 | if (ctx->proto->type == 0) { |
628 | trace_probe_log_err(ctx->offset, NO_RETVAL); |
629 | return -ENOENT; |
630 | } |
631 | tid = ctx->proto->type; |
632 | goto found; |
633 | } |
634 | if (field) { |
635 | trace_probe_log_err(ctx->offset + field - varname, |
636 | NO_BTF_ENTRY); |
637 | return -ENOENT; |
638 | } |
639 | return 0; |
640 | } |
641 | |
642 | if (!ctx->btf) { |
643 | ret = query_btf_context(ctx); |
644 | if (ret < 0 || ctx->nr_params == 0) { |
645 | trace_probe_log_err(ctx->offset, NO_BTF_ENTRY); |
646 | return PTR_ERR(params); |
647 | } |
648 | } |
649 | params = ctx->params; |
650 | |
651 | for (i = 0; i < ctx->nr_params; i++) { |
652 | const char *name = btf_name_by_offset(ctx->btf, params[i].name_off); |
653 | |
654 | if (name && !strcmp(name, varname)) { |
655 | if (tparg_is_function_entry(ctx->flags)) { |
656 | code->op = FETCH_OP_ARG; |
657 | if (ctx->flags & TPARG_FL_TPOINT) |
658 | code->param = i + 1; |
659 | else |
660 | code->param = i; |
661 | } else if (tparg_is_function_return(ctx->flags)) { |
662 | code->op = FETCH_OP_EDATA; |
663 | ret = __store_entry_arg(ctx->tp, i); |
664 | if (ret < 0) { |
665 | /* internal error */ |
666 | return ret; |
667 | } |
668 | code->offset = ret; |
669 | } |
670 | tid = params[i].type; |
671 | goto found; |
672 | } |
673 | } |
674 | trace_probe_log_err(ctx->offset, NO_BTFARG); |
675 | return -ENOENT; |
676 | |
677 | found: |
678 | type = btf_type_skip_modifiers(ctx->btf, tid, &tid); |
679 | if (!type) { |
680 | trace_probe_log_err(ctx->offset, BAD_BTF_TID); |
681 | return -EINVAL; |
682 | } |
683 | /* Initialize the last type information */ |
684 | ctx->last_type = type; |
685 | ctx->last_bitoffs = 0; |
686 | ctx->last_bitsize = 0; |
687 | if (field) { |
688 | ctx->offset += field - varname; |
689 | return parse_btf_field(field, type, pcode, end, ctx); |
690 | } |
691 | return 0; |
692 | } |
693 | |
694 | static const struct fetch_type *find_fetch_type_from_btf_type( |
695 | struct traceprobe_parse_context *ctx) |
696 | { |
697 | struct btf *btf = ctx->btf; |
698 | const char *typestr = NULL; |
699 | |
700 | if (btf && ctx->last_type) |
701 | typestr = fetch_type_from_btf_type(btf, ctx->last_type, ctx); |
702 | |
703 | return find_fetch_type(typestr, ctx->flags); |
704 | } |
705 | |
706 | static int parse_btf_bitfield(struct fetch_insn **pcode, |
707 | struct traceprobe_parse_context *ctx) |
708 | { |
709 | struct fetch_insn *code = *pcode; |
710 | |
711 | if ((ctx->last_bitsize % 8 == 0) && ctx->last_bitoffs == 0) |
712 | return 0; |
713 | |
714 | code++; |
715 | if (code->op != FETCH_OP_NOP) { |
716 | trace_probe_log_err(ctx->offset, TOO_MANY_OPS); |
717 | return -EINVAL; |
718 | } |
719 | *pcode = code; |
720 | |
721 | code->op = FETCH_OP_MOD_BF; |
722 | code->lshift = 64 - (ctx->last_bitsize + ctx->last_bitoffs); |
723 | code->rshift = 64 - ctx->last_bitsize; |
724 | code->basesize = 64 / 8; |
725 | return 0; |
726 | } |
727 | |
728 | #else |
729 | static void clear_btf_context(struct traceprobe_parse_context *ctx) |
730 | { |
731 | ctx->btf = NULL; |
732 | } |
733 | |
734 | static int query_btf_context(struct traceprobe_parse_context *ctx) |
735 | { |
736 | return -EOPNOTSUPP; |
737 | } |
738 | |
739 | static int parse_btf_arg(char *varname, |
740 | struct fetch_insn **pcode, struct fetch_insn *end, |
741 | struct traceprobe_parse_context *ctx) |
742 | { |
743 | trace_probe_log_err(ctx->offset, NOSUP_BTFARG); |
744 | return -EOPNOTSUPP; |
745 | } |
746 | |
747 | static int parse_btf_bitfield(struct fetch_insn **pcode, |
748 | struct traceprobe_parse_context *ctx) |
749 | { |
750 | trace_probe_log_err(ctx->offset, NOSUP_BTFARG); |
751 | return -EOPNOTSUPP; |
752 | } |
753 | |
754 | #define find_fetch_type_from_btf_type(ctx) \ |
755 | find_fetch_type(NULL, ctx->flags) |
756 | |
757 | static int check_prepare_btf_string_fetch(char *typename, |
758 | struct fetch_insn **pcode, |
759 | struct traceprobe_parse_context *ctx) |
760 | { |
761 | return 0; |
762 | } |
763 | |
764 | #endif |
765 | |
766 | #ifdef CONFIG_HAVE_FUNCTION_ARG_ACCESS_API |
767 | |
768 | static int __store_entry_arg(struct trace_probe *tp, int argnum) |
769 | { |
770 | struct probe_entry_arg *earg = tp->entry_arg; |
771 | bool match = false; |
772 | int i, offset; |
773 | |
774 | if (!earg) { |
775 | earg = kzalloc(size: sizeof(*tp->entry_arg), GFP_KERNEL); |
776 | if (!earg) |
777 | return -ENOMEM; |
778 | earg->size = 2 * tp->nr_args + 1; |
779 | earg->code = kcalloc(n: earg->size, size: sizeof(struct fetch_insn), |
780 | GFP_KERNEL); |
781 | if (!earg->code) { |
782 | kfree(objp: earg); |
783 | return -ENOMEM; |
784 | } |
785 | /* Fill the code buffer with 'end' to simplify it */ |
786 | for (i = 0; i < earg->size; i++) |
787 | earg->code[i].op = FETCH_OP_END; |
788 | tp->entry_arg = earg; |
789 | } |
790 | |
791 | offset = 0; |
792 | for (i = 0; i < earg->size - 1; i++) { |
793 | switch (earg->code[i].op) { |
794 | case FETCH_OP_END: |
795 | earg->code[i].op = FETCH_OP_ARG; |
796 | earg->code[i].param = argnum; |
797 | earg->code[i + 1].op = FETCH_OP_ST_EDATA; |
798 | earg->code[i + 1].offset = offset; |
799 | return offset; |
800 | case FETCH_OP_ARG: |
801 | match = (earg->code[i].param == argnum); |
802 | break; |
803 | case FETCH_OP_ST_EDATA: |
804 | offset = earg->code[i].offset; |
805 | if (match) |
806 | return offset; |
807 | offset += sizeof(unsigned long); |
808 | break; |
809 | default: |
810 | break; |
811 | } |
812 | } |
813 | return -ENOSPC; |
814 | } |
815 | |
816 | int traceprobe_get_entry_data_size(struct trace_probe *tp) |
817 | { |
818 | struct probe_entry_arg *earg = tp->entry_arg; |
819 | int i, size = 0; |
820 | |
821 | if (!earg) |
822 | return 0; |
823 | |
824 | for (i = 0; i < earg->size; i++) { |
825 | switch (earg->code[i].op) { |
826 | case FETCH_OP_END: |
827 | goto out; |
828 | case FETCH_OP_ST_EDATA: |
829 | size = earg->code[i].offset + sizeof(unsigned long); |
830 | break; |
831 | default: |
832 | break; |
833 | } |
834 | } |
835 | out: |
836 | return size; |
837 | } |
838 | |
839 | void store_trace_entry_data(void *edata, struct trace_probe *tp, struct pt_regs *regs) |
840 | { |
841 | struct probe_entry_arg *earg = tp->entry_arg; |
842 | unsigned long val = 0; |
843 | int i; |
844 | |
845 | if (!earg) |
846 | return; |
847 | |
848 | for (i = 0; i < earg->size; i++) { |
849 | struct fetch_insn *code = &earg->code[i]; |
850 | |
851 | switch (code->op) { |
852 | case FETCH_OP_ARG: |
853 | val = regs_get_kernel_argument(regs, n: code->param); |
854 | break; |
855 | case FETCH_OP_ST_EDATA: |
856 | *(unsigned long *)((unsigned long)edata + code->offset) = val; |
857 | break; |
858 | case FETCH_OP_END: |
859 | goto end; |
860 | default: |
861 | break; |
862 | } |
863 | } |
864 | end: |
865 | return; |
866 | } |
867 | NOKPROBE_SYMBOL(store_trace_entry_data) |
868 | #endif |
869 | |
870 | #define PARAM_MAX_STACK (THREAD_SIZE / sizeof(unsigned long)) |
871 | |
872 | /* Parse $vars. @orig_arg points '$', which syncs to @ctx->offset */ |
873 | static int parse_probe_vars(char *orig_arg, const struct fetch_type *t, |
874 | struct fetch_insn **pcode, |
875 | struct fetch_insn *end, |
876 | struct traceprobe_parse_context *ctx) |
877 | { |
878 | struct fetch_insn *code = *pcode; |
879 | int err = TP_ERR_BAD_VAR; |
880 | char *arg = orig_arg + 1; |
881 | unsigned long param; |
882 | int ret = 0; |
883 | int len; |
884 | |
885 | if (ctx->flags & TPARG_FL_TEVENT) { |
886 | if (code->data) |
887 | return -EFAULT; |
888 | ret = parse_trace_event_arg(arg, code, ctx); |
889 | if (!ret) |
890 | return 0; |
891 | if (strcmp(arg, "comm" ) == 0 || strcmp(arg, "COMM" ) == 0) { |
892 | code->op = FETCH_OP_COMM; |
893 | return 0; |
894 | } |
895 | /* backward compatibility */ |
896 | ctx->offset = 0; |
897 | goto inval; |
898 | } |
899 | |
900 | if (str_has_prefix(str: arg, prefix: "retval" )) { |
901 | if (!(ctx->flags & TPARG_FL_RETURN)) { |
902 | err = TP_ERR_RETVAL_ON_PROBE; |
903 | goto inval; |
904 | } |
905 | if (!(ctx->flags & TPARG_FL_KERNEL) || |
906 | !IS_ENABLED(CONFIG_PROBE_EVENTS_BTF_ARGS)) { |
907 | code->op = FETCH_OP_RETVAL; |
908 | return 0; |
909 | } |
910 | return parse_btf_arg(varname: orig_arg, pcode, end, ctx); |
911 | } |
912 | |
913 | len = str_has_prefix(str: arg, prefix: "stack" ); |
914 | if (len) { |
915 | |
916 | if (arg[len] == '\0') { |
917 | code->op = FETCH_OP_STACKP; |
918 | return 0; |
919 | } |
920 | |
921 | if (isdigit(c: arg[len])) { |
922 | ret = kstrtoul(s: arg + len, base: 10, res: ¶m); |
923 | if (ret) |
924 | goto inval; |
925 | |
926 | if ((ctx->flags & TPARG_FL_KERNEL) && |
927 | param > PARAM_MAX_STACK) { |
928 | err = TP_ERR_BAD_STACK_NUM; |
929 | goto inval; |
930 | } |
931 | code->op = FETCH_OP_STACK; |
932 | code->param = (unsigned int)param; |
933 | return 0; |
934 | } |
935 | goto inval; |
936 | } |
937 | |
938 | if (strcmp(arg, "comm" ) == 0 || strcmp(arg, "COMM" ) == 0) { |
939 | code->op = FETCH_OP_COMM; |
940 | return 0; |
941 | } |
942 | |
943 | #ifdef CONFIG_HAVE_FUNCTION_ARG_ACCESS_API |
944 | len = str_has_prefix(str: arg, prefix: "arg" ); |
945 | if (len) { |
946 | ret = kstrtoul(s: arg + len, base: 10, res: ¶m); |
947 | if (ret) |
948 | goto inval; |
949 | |
950 | if (!param || param > PARAM_MAX_STACK) { |
951 | err = TP_ERR_BAD_ARG_NUM; |
952 | goto inval; |
953 | } |
954 | param--; /* argN starts from 1, but internal arg[N] starts from 0 */ |
955 | |
956 | if (tparg_is_function_entry(flags: ctx->flags)) { |
957 | code->op = FETCH_OP_ARG; |
958 | code->param = (unsigned int)param; |
959 | /* |
960 | * The tracepoint probe will probe a stub function, and the |
961 | * first parameter of the stub is a dummy and should be ignored. |
962 | */ |
963 | if (ctx->flags & TPARG_FL_TPOINT) |
964 | code->param++; |
965 | } else if (tparg_is_function_return(flags: ctx->flags)) { |
966 | /* function entry argument access from return probe */ |
967 | ret = __store_entry_arg(tp: ctx->tp, argnum: param); |
968 | if (ret < 0) /* This error should be an internal error */ |
969 | return ret; |
970 | |
971 | code->op = FETCH_OP_EDATA; |
972 | code->offset = ret; |
973 | } else { |
974 | err = TP_ERR_NOFENTRY_ARGS; |
975 | goto inval; |
976 | } |
977 | return 0; |
978 | } |
979 | #endif |
980 | |
981 | inval: |
982 | __trace_probe_log_err(offset: ctx->offset, err_type: err); |
983 | return -EINVAL; |
984 | } |
985 | |
986 | static int str_to_immediate(char *str, unsigned long *imm) |
987 | { |
988 | if (isdigit(c: str[0])) |
989 | return kstrtoul(s: str, base: 0, res: imm); |
990 | else if (str[0] == '-') |
991 | return kstrtol(s: str, base: 0, res: (long *)imm); |
992 | else if (str[0] == '+') |
993 | return kstrtol(s: str + 1, base: 0, res: (long *)imm); |
994 | return -EINVAL; |
995 | } |
996 | |
997 | static int __parse_imm_string(char *str, char **pbuf, int offs) |
998 | { |
999 | size_t len = strlen(str); |
1000 | |
1001 | if (str[len - 1] != '"') { |
1002 | trace_probe_log_err(offs + len, IMMSTR_NO_CLOSE); |
1003 | return -EINVAL; |
1004 | } |
1005 | *pbuf = kstrndup(s: str, len: len - 1, GFP_KERNEL); |
1006 | if (!*pbuf) |
1007 | return -ENOMEM; |
1008 | return 0; |
1009 | } |
1010 | |
1011 | /* Recursive argument parser */ |
1012 | static int |
1013 | parse_probe_arg(char *arg, const struct fetch_type *type, |
1014 | struct fetch_insn **pcode, struct fetch_insn *end, |
1015 | struct traceprobe_parse_context *ctx) |
1016 | { |
1017 | struct fetch_insn *code = *pcode; |
1018 | unsigned long param; |
1019 | int deref = FETCH_OP_DEREF; |
1020 | long offset = 0; |
1021 | char *tmp; |
1022 | int ret = 0; |
1023 | |
1024 | switch (arg[0]) { |
1025 | case '$': |
1026 | ret = parse_probe_vars(orig_arg: arg, t: type, pcode, end, ctx); |
1027 | break; |
1028 | |
1029 | case '%': /* named register */ |
1030 | if (ctx->flags & (TPARG_FL_TEVENT | TPARG_FL_FPROBE)) { |
1031 | /* eprobe and fprobe do not handle registers */ |
1032 | trace_probe_log_err(ctx->offset, BAD_VAR); |
1033 | break; |
1034 | } |
1035 | ret = regs_query_register_offset(name: arg + 1); |
1036 | if (ret >= 0) { |
1037 | code->op = FETCH_OP_REG; |
1038 | code->param = (unsigned int)ret; |
1039 | ret = 0; |
1040 | } else |
1041 | trace_probe_log_err(ctx->offset, BAD_REG_NAME); |
1042 | break; |
1043 | |
1044 | case '@': /* memory, file-offset or symbol */ |
1045 | if (isdigit(c: arg[1])) { |
1046 | ret = kstrtoul(s: arg + 1, base: 0, res: ¶m); |
1047 | if (ret) { |
1048 | trace_probe_log_err(ctx->offset, BAD_MEM_ADDR); |
1049 | break; |
1050 | } |
1051 | /* load address */ |
1052 | code->op = FETCH_OP_IMM; |
1053 | code->immediate = param; |
1054 | } else if (arg[1] == '+') { |
1055 | /* kprobes don't support file offsets */ |
1056 | if (ctx->flags & TPARG_FL_KERNEL) { |
1057 | trace_probe_log_err(ctx->offset, FILE_ON_KPROBE); |
1058 | return -EINVAL; |
1059 | } |
1060 | ret = kstrtol(s: arg + 2, base: 0, res: &offset); |
1061 | if (ret) { |
1062 | trace_probe_log_err(ctx->offset, BAD_FILE_OFFS); |
1063 | break; |
1064 | } |
1065 | |
1066 | code->op = FETCH_OP_FOFFS; |
1067 | code->immediate = (unsigned long)offset; // imm64? |
1068 | } else { |
1069 | /* uprobes don't support symbols */ |
1070 | if (!(ctx->flags & TPARG_FL_KERNEL)) { |
1071 | trace_probe_log_err(ctx->offset, SYM_ON_UPROBE); |
1072 | return -EINVAL; |
1073 | } |
1074 | /* Preserve symbol for updating */ |
1075 | code->op = FETCH_NOP_SYMBOL; |
1076 | code->data = kstrdup(s: arg + 1, GFP_KERNEL); |
1077 | if (!code->data) |
1078 | return -ENOMEM; |
1079 | if (++code == end) { |
1080 | trace_probe_log_err(ctx->offset, TOO_MANY_OPS); |
1081 | return -EINVAL; |
1082 | } |
1083 | code->op = FETCH_OP_IMM; |
1084 | code->immediate = 0; |
1085 | } |
1086 | /* These are fetching from memory */ |
1087 | if (++code == end) { |
1088 | trace_probe_log_err(ctx->offset, TOO_MANY_OPS); |
1089 | return -EINVAL; |
1090 | } |
1091 | *pcode = code; |
1092 | code->op = FETCH_OP_DEREF; |
1093 | code->offset = offset; |
1094 | break; |
1095 | |
1096 | case '+': /* deref memory */ |
1097 | case '-': |
1098 | if (arg[1] == 'u') { |
1099 | deref = FETCH_OP_UDEREF; |
1100 | arg[1] = arg[0]; |
1101 | arg++; |
1102 | } |
1103 | if (arg[0] == '+') |
1104 | arg++; /* Skip '+', because kstrtol() rejects it. */ |
1105 | tmp = strchr(arg, '('); |
1106 | if (!tmp) { |
1107 | trace_probe_log_err(ctx->offset, DEREF_NEED_BRACE); |
1108 | return -EINVAL; |
1109 | } |
1110 | *tmp = '\0'; |
1111 | ret = kstrtol(s: arg, base: 0, res: &offset); |
1112 | if (ret) { |
1113 | trace_probe_log_err(ctx->offset, BAD_DEREF_OFFS); |
1114 | break; |
1115 | } |
1116 | ctx->offset += (tmp + 1 - arg) + (arg[0] != '-' ? 1 : 0); |
1117 | arg = tmp + 1; |
1118 | tmp = strrchr(arg, ')'); |
1119 | if (!tmp) { |
1120 | trace_probe_log_err(ctx->offset + strlen(arg), |
1121 | DEREF_OPEN_BRACE); |
1122 | return -EINVAL; |
1123 | } else { |
1124 | const struct fetch_type *t2 = find_fetch_type(NULL, flags: ctx->flags); |
1125 | int cur_offs = ctx->offset; |
1126 | |
1127 | *tmp = '\0'; |
1128 | ret = parse_probe_arg(arg, type: t2, pcode: &code, end, ctx); |
1129 | if (ret) |
1130 | break; |
1131 | ctx->offset = cur_offs; |
1132 | if (code->op == FETCH_OP_COMM || |
1133 | code->op == FETCH_OP_DATA) { |
1134 | trace_probe_log_err(ctx->offset, COMM_CANT_DEREF); |
1135 | return -EINVAL; |
1136 | } |
1137 | if (++code == end) { |
1138 | trace_probe_log_err(ctx->offset, TOO_MANY_OPS); |
1139 | return -EINVAL; |
1140 | } |
1141 | *pcode = code; |
1142 | |
1143 | code->op = deref; |
1144 | code->offset = offset; |
1145 | /* Reset the last type if used */ |
1146 | ctx->last_type = NULL; |
1147 | } |
1148 | break; |
1149 | case '\\': /* Immediate value */ |
1150 | if (arg[1] == '"') { /* Immediate string */ |
1151 | ret = __parse_imm_string(str: arg + 2, pbuf: &tmp, offs: ctx->offset + 2); |
1152 | if (ret) |
1153 | break; |
1154 | code->op = FETCH_OP_DATA; |
1155 | code->data = tmp; |
1156 | } else { |
1157 | ret = str_to_immediate(str: arg + 1, imm: &code->immediate); |
1158 | if (ret) |
1159 | trace_probe_log_err(ctx->offset + 1, BAD_IMM); |
1160 | else |
1161 | code->op = FETCH_OP_IMM; |
1162 | } |
1163 | break; |
1164 | default: |
1165 | if (isalpha(arg[0]) || arg[0] == '_') { /* BTF variable */ |
1166 | if (!tparg_is_function_entry(flags: ctx->flags) && |
1167 | !tparg_is_function_return(flags: ctx->flags)) { |
1168 | trace_probe_log_err(ctx->offset, NOSUP_BTFARG); |
1169 | return -EINVAL; |
1170 | } |
1171 | ret = parse_btf_arg(varname: arg, pcode, end, ctx); |
1172 | break; |
1173 | } |
1174 | } |
1175 | if (!ret && code->op == FETCH_OP_NOP) { |
1176 | /* Parsed, but do not find fetch method */ |
1177 | trace_probe_log_err(ctx->offset, BAD_FETCH_ARG); |
1178 | ret = -EINVAL; |
1179 | } |
1180 | return ret; |
1181 | } |
1182 | |
1183 | #define BYTES_TO_BITS(nb) ((BITS_PER_LONG * (nb)) / sizeof(long)) |
1184 | |
1185 | /* Bitfield type needs to be parsed into a fetch function */ |
1186 | static int __parse_bitfield_probe_arg(const char *bf, |
1187 | const struct fetch_type *t, |
1188 | struct fetch_insn **pcode) |
1189 | { |
1190 | struct fetch_insn *code = *pcode; |
1191 | unsigned long bw, bo; |
1192 | char *tail; |
1193 | |
1194 | if (*bf != 'b') |
1195 | return 0; |
1196 | |
1197 | bw = simple_strtoul(bf + 1, &tail, 0); /* Use simple one */ |
1198 | |
1199 | if (bw == 0 || *tail != '@') |
1200 | return -EINVAL; |
1201 | |
1202 | bf = tail + 1; |
1203 | bo = simple_strtoul(bf, &tail, 0); |
1204 | |
1205 | if (tail == bf || *tail != '/') |
1206 | return -EINVAL; |
1207 | code++; |
1208 | if (code->op != FETCH_OP_NOP) |
1209 | return -EINVAL; |
1210 | *pcode = code; |
1211 | |
1212 | code->op = FETCH_OP_MOD_BF; |
1213 | code->lshift = BYTES_TO_BITS(t->size) - (bw + bo); |
1214 | code->rshift = BYTES_TO_BITS(t->size) - bw; |
1215 | code->basesize = t->size; |
1216 | |
1217 | return (BYTES_TO_BITS(t->size) < (bw + bo)) ? -EINVAL : 0; |
1218 | } |
1219 | |
1220 | /* Split type part from @arg and return it. */ |
1221 | static char *parse_probe_arg_type(char *arg, struct probe_arg *parg, |
1222 | struct traceprobe_parse_context *ctx) |
1223 | { |
1224 | char *t = NULL, *t2, *t3; |
1225 | int offs; |
1226 | |
1227 | t = strchr(arg, ':'); |
1228 | if (t) { |
1229 | *t++ = '\0'; |
1230 | t2 = strchr(t, '['); |
1231 | if (t2) { |
1232 | *t2++ = '\0'; |
1233 | t3 = strchr(t2, ']'); |
1234 | if (!t3) { |
1235 | offs = t2 + strlen(t2) - arg; |
1236 | |
1237 | trace_probe_log_err(ctx->offset + offs, |
1238 | ARRAY_NO_CLOSE); |
1239 | return ERR_PTR(error: -EINVAL); |
1240 | } else if (t3[1] != '\0') { |
1241 | trace_probe_log_err(ctx->offset + t3 + 1 - arg, |
1242 | BAD_ARRAY_SUFFIX); |
1243 | return ERR_PTR(error: -EINVAL); |
1244 | } |
1245 | *t3 = '\0'; |
1246 | if (kstrtouint(s: t2, base: 0, res: &parg->count) || !parg->count) { |
1247 | trace_probe_log_err(ctx->offset + t2 - arg, |
1248 | BAD_ARRAY_NUM); |
1249 | return ERR_PTR(error: -EINVAL); |
1250 | } |
1251 | if (parg->count > MAX_ARRAY_LEN) { |
1252 | trace_probe_log_err(ctx->offset + t2 - arg, |
1253 | ARRAY_TOO_BIG); |
1254 | return ERR_PTR(error: -EINVAL); |
1255 | } |
1256 | } |
1257 | } |
1258 | offs = t ? t - arg : 0; |
1259 | |
1260 | /* |
1261 | * Since $comm and immediate string can not be dereferenced, |
1262 | * we can find those by strcmp. But ignore for eprobes. |
1263 | */ |
1264 | if (!(ctx->flags & TPARG_FL_TEVENT) && |
1265 | (strcmp(arg, "$comm" ) == 0 || strcmp(arg, "$COMM" ) == 0 || |
1266 | strncmp(arg, "\\\"" , 2) == 0)) { |
1267 | /* The type of $comm must be "string", and not an array type. */ |
1268 | if (parg->count || (t && strcmp(t, "string" ))) { |
1269 | trace_probe_log_err(ctx->offset + offs, NEED_STRING_TYPE); |
1270 | return ERR_PTR(error: -EINVAL); |
1271 | } |
1272 | parg->type = find_fetch_type(type: "string" , flags: ctx->flags); |
1273 | } else |
1274 | parg->type = find_fetch_type(type: t, flags: ctx->flags); |
1275 | |
1276 | if (!parg->type) { |
1277 | trace_probe_log_err(ctx->offset + offs, BAD_TYPE); |
1278 | return ERR_PTR(error: -EINVAL); |
1279 | } |
1280 | |
1281 | return t; |
1282 | } |
1283 | |
1284 | /* After parsing, adjust the fetch_insn according to the probe_arg */ |
1285 | static int finalize_fetch_insn(struct fetch_insn *code, |
1286 | struct probe_arg *parg, |
1287 | char *type, |
1288 | int type_offset, |
1289 | struct traceprobe_parse_context *ctx) |
1290 | { |
1291 | struct fetch_insn *scode; |
1292 | int ret; |
1293 | |
1294 | /* Store operation */ |
1295 | if (parg->type->is_string) { |
1296 | /* Check bad combination of the type and the last fetch_insn. */ |
1297 | if (!strcmp(parg->type->name, "symstr" )) { |
1298 | if (code->op != FETCH_OP_REG && code->op != FETCH_OP_STACK && |
1299 | code->op != FETCH_OP_RETVAL && code->op != FETCH_OP_ARG && |
1300 | code->op != FETCH_OP_DEREF && code->op != FETCH_OP_TP_ARG) { |
1301 | trace_probe_log_err(ctx->offset + type_offset, |
1302 | BAD_SYMSTRING); |
1303 | return -EINVAL; |
1304 | } |
1305 | } else { |
1306 | if (code->op != FETCH_OP_DEREF && code->op != FETCH_OP_UDEREF && |
1307 | code->op != FETCH_OP_IMM && code->op != FETCH_OP_COMM && |
1308 | code->op != FETCH_OP_DATA && code->op != FETCH_OP_TP_ARG) { |
1309 | trace_probe_log_err(ctx->offset + type_offset, |
1310 | BAD_STRING); |
1311 | return -EINVAL; |
1312 | } |
1313 | } |
1314 | |
1315 | if (!strcmp(parg->type->name, "symstr" ) || |
1316 | (code->op == FETCH_OP_IMM || code->op == FETCH_OP_COMM || |
1317 | code->op == FETCH_OP_DATA) || code->op == FETCH_OP_TP_ARG || |
1318 | parg->count) { |
1319 | /* |
1320 | * IMM, DATA and COMM is pointing actual address, those |
1321 | * must be kept, and if parg->count != 0, this is an |
1322 | * array of string pointers instead of string address |
1323 | * itself. |
1324 | * For the symstr, it doesn't need to dereference, thus |
1325 | * it just get the value. |
1326 | */ |
1327 | code++; |
1328 | if (code->op != FETCH_OP_NOP) { |
1329 | trace_probe_log_err(ctx->offset, TOO_MANY_OPS); |
1330 | return -EINVAL; |
1331 | } |
1332 | } |
1333 | |
1334 | /* If op == DEREF, replace it with STRING */ |
1335 | if (!strcmp(parg->type->name, "ustring" ) || |
1336 | code->op == FETCH_OP_UDEREF) |
1337 | code->op = FETCH_OP_ST_USTRING; |
1338 | else if (!strcmp(parg->type->name, "symstr" )) |
1339 | code->op = FETCH_OP_ST_SYMSTR; |
1340 | else |
1341 | code->op = FETCH_OP_ST_STRING; |
1342 | code->size = parg->type->size; |
1343 | parg->dynamic = true; |
1344 | } else if (code->op == FETCH_OP_DEREF) { |
1345 | code->op = FETCH_OP_ST_MEM; |
1346 | code->size = parg->type->size; |
1347 | } else if (code->op == FETCH_OP_UDEREF) { |
1348 | code->op = FETCH_OP_ST_UMEM; |
1349 | code->size = parg->type->size; |
1350 | } else { |
1351 | code++; |
1352 | if (code->op != FETCH_OP_NOP) { |
1353 | trace_probe_log_err(ctx->offset, TOO_MANY_OPS); |
1354 | return -E2BIG; |
1355 | } |
1356 | code->op = FETCH_OP_ST_RAW; |
1357 | code->size = parg->type->size; |
1358 | } |
1359 | |
1360 | /* Save storing fetch_insn. */ |
1361 | scode = code; |
1362 | |
1363 | /* Modify operation */ |
1364 | if (type != NULL) { |
1365 | /* Bitfield needs a special fetch_insn. */ |
1366 | ret = __parse_bitfield_probe_arg(bf: type, t: parg->type, pcode: &code); |
1367 | if (ret) { |
1368 | trace_probe_log_err(ctx->offset + type_offset, BAD_BITFIELD); |
1369 | return ret; |
1370 | } |
1371 | } else if (IS_ENABLED(CONFIG_PROBE_EVENTS_BTF_ARGS) && |
1372 | ctx->last_type) { |
1373 | /* If user not specified the type, try parsing BTF bitfield. */ |
1374 | ret = parse_btf_bitfield(pcode: &code, ctx); |
1375 | if (ret) |
1376 | return ret; |
1377 | } |
1378 | |
1379 | /* Loop(Array) operation */ |
1380 | if (parg->count) { |
1381 | if (scode->op != FETCH_OP_ST_MEM && |
1382 | scode->op != FETCH_OP_ST_STRING && |
1383 | scode->op != FETCH_OP_ST_USTRING) { |
1384 | trace_probe_log_err(ctx->offset + type_offset, BAD_STRING); |
1385 | return -EINVAL; |
1386 | } |
1387 | code++; |
1388 | if (code->op != FETCH_OP_NOP) { |
1389 | trace_probe_log_err(ctx->offset, TOO_MANY_OPS); |
1390 | return -E2BIG; |
1391 | } |
1392 | code->op = FETCH_OP_LP_ARRAY; |
1393 | code->param = parg->count; |
1394 | } |
1395 | |
1396 | /* Finalize the fetch_insn array. */ |
1397 | code++; |
1398 | code->op = FETCH_OP_END; |
1399 | |
1400 | return 0; |
1401 | } |
1402 | |
1403 | /* String length checking wrapper */ |
1404 | static int traceprobe_parse_probe_arg_body(const char *argv, ssize_t *size, |
1405 | struct probe_arg *parg, |
1406 | struct traceprobe_parse_context *ctx) |
1407 | { |
1408 | struct fetch_insn *code, *tmp = NULL; |
1409 | char *type, *arg; |
1410 | int ret, len; |
1411 | |
1412 | len = strlen(argv); |
1413 | if (len > MAX_ARGSTR_LEN) { |
1414 | trace_probe_log_err(ctx->offset, ARG_TOO_LONG); |
1415 | return -E2BIG; |
1416 | } else if (len == 0) { |
1417 | trace_probe_log_err(ctx->offset, NO_ARG_BODY); |
1418 | return -EINVAL; |
1419 | } |
1420 | |
1421 | arg = kstrdup(s: argv, GFP_KERNEL); |
1422 | if (!arg) |
1423 | return -ENOMEM; |
1424 | |
1425 | parg->comm = kstrdup(s: arg, GFP_KERNEL); |
1426 | if (!parg->comm) { |
1427 | ret = -ENOMEM; |
1428 | goto out; |
1429 | } |
1430 | |
1431 | type = parse_probe_arg_type(arg, parg, ctx); |
1432 | if (IS_ERR(ptr: type)) { |
1433 | ret = PTR_ERR(ptr: type); |
1434 | goto out; |
1435 | } |
1436 | |
1437 | code = tmp = kcalloc(FETCH_INSN_MAX, size: sizeof(*code), GFP_KERNEL); |
1438 | if (!code) { |
1439 | ret = -ENOMEM; |
1440 | goto out; |
1441 | } |
1442 | code[FETCH_INSN_MAX - 1].op = FETCH_OP_END; |
1443 | |
1444 | ctx->last_type = NULL; |
1445 | ret = parse_probe_arg(arg, type: parg->type, pcode: &code, end: &code[FETCH_INSN_MAX - 1], |
1446 | ctx); |
1447 | if (ret < 0) |
1448 | goto fail; |
1449 | |
1450 | /* Update storing type if BTF is available */ |
1451 | if (IS_ENABLED(CONFIG_PROBE_EVENTS_BTF_ARGS) && |
1452 | ctx->last_type) { |
1453 | if (!type) { |
1454 | parg->type = find_fetch_type_from_btf_type(ctx); |
1455 | } else if (strstr(type, "string" )) { |
1456 | ret = check_prepare_btf_string_fetch(typename: type, pcode: &code, ctx); |
1457 | if (ret) |
1458 | goto fail; |
1459 | } |
1460 | } |
1461 | parg->offset = *size; |
1462 | *size += parg->type->size * (parg->count ?: 1); |
1463 | |
1464 | if (parg->count) { |
1465 | len = strlen(parg->type->fmttype) + 6; |
1466 | parg->fmt = kmalloc(size: len, GFP_KERNEL); |
1467 | if (!parg->fmt) { |
1468 | ret = -ENOMEM; |
1469 | goto out; |
1470 | } |
1471 | snprintf(buf: parg->fmt, size: len, fmt: "%s[%d]" , parg->type->fmttype, |
1472 | parg->count); |
1473 | } |
1474 | |
1475 | ret = finalize_fetch_insn(code, parg, type, type_offset: type ? type - arg : 0, ctx); |
1476 | if (ret < 0) |
1477 | goto fail; |
1478 | |
1479 | for (; code < tmp + FETCH_INSN_MAX; code++) |
1480 | if (code->op == FETCH_OP_END) |
1481 | break; |
1482 | /* Shrink down the code buffer */ |
1483 | parg->code = kcalloc(n: code - tmp + 1, size: sizeof(*code), GFP_KERNEL); |
1484 | if (!parg->code) |
1485 | ret = -ENOMEM; |
1486 | else |
1487 | memcpy(parg->code, tmp, sizeof(*code) * (code - tmp + 1)); |
1488 | |
1489 | fail: |
1490 | if (ret < 0) { |
1491 | for (code = tmp; code < tmp + FETCH_INSN_MAX; code++) |
1492 | if (code->op == FETCH_NOP_SYMBOL || |
1493 | code->op == FETCH_OP_DATA) |
1494 | kfree(objp: code->data); |
1495 | } |
1496 | kfree(objp: tmp); |
1497 | out: |
1498 | kfree(objp: arg); |
1499 | |
1500 | return ret; |
1501 | } |
1502 | |
1503 | /* Return 1 if name is reserved or already used by another argument */ |
1504 | static int traceprobe_conflict_field_name(const char *name, |
1505 | struct probe_arg *args, int narg) |
1506 | { |
1507 | int i; |
1508 | |
1509 | for (i = 0; i < ARRAY_SIZE(reserved_field_names); i++) |
1510 | if (strcmp(reserved_field_names[i], name) == 0) |
1511 | return 1; |
1512 | |
1513 | for (i = 0; i < narg; i++) |
1514 | if (strcmp(args[i].name, name) == 0) |
1515 | return 1; |
1516 | |
1517 | return 0; |
1518 | } |
1519 | |
1520 | static char *generate_probe_arg_name(const char *arg, int idx) |
1521 | { |
1522 | char *name = NULL; |
1523 | const char *end; |
1524 | |
1525 | /* |
1526 | * If argument name is omitted, try arg as a name (BTF variable) |
1527 | * or "argN". |
1528 | */ |
1529 | if (IS_ENABLED(CONFIG_PROBE_EVENTS_BTF_ARGS)) { |
1530 | end = strchr(arg, ':'); |
1531 | if (!end) |
1532 | end = arg + strlen(arg); |
1533 | |
1534 | name = kmemdup_nul(s: arg, len: end - arg, GFP_KERNEL); |
1535 | if (!name || !is_good_name(name)) { |
1536 | kfree(objp: name); |
1537 | name = NULL; |
1538 | } |
1539 | } |
1540 | |
1541 | if (!name) |
1542 | name = kasprintf(GFP_KERNEL, fmt: "arg%d" , idx + 1); |
1543 | |
1544 | return name; |
1545 | } |
1546 | |
1547 | int traceprobe_parse_probe_arg(struct trace_probe *tp, int i, const char *arg, |
1548 | struct traceprobe_parse_context *ctx) |
1549 | { |
1550 | struct probe_arg *parg = &tp->args[i]; |
1551 | const char *body; |
1552 | |
1553 | ctx->tp = tp; |
1554 | body = strchr(arg, '='); |
1555 | if (body) { |
1556 | if (body - arg > MAX_ARG_NAME_LEN) { |
1557 | trace_probe_log_err(0, ARG_NAME_TOO_LONG); |
1558 | return -EINVAL; |
1559 | } else if (body == arg) { |
1560 | trace_probe_log_err(0, NO_ARG_NAME); |
1561 | return -EINVAL; |
1562 | } |
1563 | parg->name = kmemdup_nul(s: arg, len: body - arg, GFP_KERNEL); |
1564 | body++; |
1565 | } else { |
1566 | parg->name = generate_probe_arg_name(arg, idx: i); |
1567 | body = arg; |
1568 | } |
1569 | if (!parg->name) |
1570 | return -ENOMEM; |
1571 | |
1572 | if (!is_good_name(name: parg->name)) { |
1573 | trace_probe_log_err(0, BAD_ARG_NAME); |
1574 | return -EINVAL; |
1575 | } |
1576 | if (traceprobe_conflict_field_name(name: parg->name, args: tp->args, narg: i)) { |
1577 | trace_probe_log_err(0, USED_ARG_NAME); |
1578 | return -EINVAL; |
1579 | } |
1580 | ctx->offset = body - arg; |
1581 | /* Parse fetch argument */ |
1582 | return traceprobe_parse_probe_arg_body(argv: body, size: &tp->size, parg, ctx); |
1583 | } |
1584 | |
1585 | void traceprobe_free_probe_arg(struct probe_arg *arg) |
1586 | { |
1587 | struct fetch_insn *code = arg->code; |
1588 | |
1589 | while (code && code->op != FETCH_OP_END) { |
1590 | if (code->op == FETCH_NOP_SYMBOL || |
1591 | code->op == FETCH_OP_DATA) |
1592 | kfree(objp: code->data); |
1593 | code++; |
1594 | } |
1595 | kfree(objp: arg->code); |
1596 | kfree(objp: arg->name); |
1597 | kfree(objp: arg->comm); |
1598 | kfree(objp: arg->fmt); |
1599 | } |
1600 | |
1601 | static int argv_has_var_arg(int argc, const char *argv[], int *args_idx, |
1602 | struct traceprobe_parse_context *ctx) |
1603 | { |
1604 | int i, found = 0; |
1605 | |
1606 | for (i = 0; i < argc; i++) |
1607 | if (str_has_prefix(str: argv[i], prefix: "$arg" )) { |
1608 | trace_probe_log_set_index(index: i + 2); |
1609 | |
1610 | if (!tparg_is_function_entry(flags: ctx->flags) && |
1611 | !tparg_is_function_return(flags: ctx->flags)) { |
1612 | trace_probe_log_err(0, NOFENTRY_ARGS); |
1613 | return -EINVAL; |
1614 | } |
1615 | |
1616 | if (isdigit(c: argv[i][4])) { |
1617 | found = 1; |
1618 | continue; |
1619 | } |
1620 | |
1621 | if (argv[i][4] != '*') { |
1622 | trace_probe_log_err(0, BAD_VAR); |
1623 | return -EINVAL; |
1624 | } |
1625 | |
1626 | if (*args_idx >= 0 && *args_idx < argc) { |
1627 | trace_probe_log_err(0, DOUBLE_ARGS); |
1628 | return -EINVAL; |
1629 | } |
1630 | found = 1; |
1631 | *args_idx = i; |
1632 | } |
1633 | |
1634 | return found; |
1635 | } |
1636 | |
1637 | static int sprint_nth_btf_arg(int idx, const char *type, |
1638 | char *buf, int bufsize, |
1639 | struct traceprobe_parse_context *ctx) |
1640 | { |
1641 | const char *name; |
1642 | int ret; |
1643 | |
1644 | if (idx >= ctx->nr_params) { |
1645 | trace_probe_log_err(0, NO_BTFARG); |
1646 | return -ENOENT; |
1647 | } |
1648 | name = btf_name_by_offset(btf: ctx->btf, offset: ctx->params[idx].name_off); |
1649 | if (!name) { |
1650 | trace_probe_log_err(0, NO_BTF_ENTRY); |
1651 | return -ENOENT; |
1652 | } |
1653 | ret = snprintf(buf, size: bufsize, fmt: "%s%s" , name, type); |
1654 | if (ret >= bufsize) { |
1655 | trace_probe_log_err(0, ARGS_2LONG); |
1656 | return -E2BIG; |
1657 | } |
1658 | return ret; |
1659 | } |
1660 | |
1661 | /* Return new_argv which must be freed after use */ |
1662 | const char **traceprobe_expand_meta_args(int argc, const char *argv[], |
1663 | int *new_argc, char *buf, int bufsize, |
1664 | struct traceprobe_parse_context *ctx) |
1665 | { |
1666 | const struct btf_param *params = NULL; |
1667 | int i, j, n, used, ret, args_idx = -1; |
1668 | const char **new_argv = NULL; |
1669 | |
1670 | ret = argv_has_var_arg(argc, argv, args_idx: &args_idx, ctx); |
1671 | if (ret < 0) |
1672 | return ERR_PTR(error: ret); |
1673 | |
1674 | if (!ret) { |
1675 | *new_argc = argc; |
1676 | return NULL; |
1677 | } |
1678 | |
1679 | ret = query_btf_context(ctx); |
1680 | if (ret < 0 || ctx->nr_params == 0) { |
1681 | if (args_idx != -1) { |
1682 | /* $arg* requires BTF info */ |
1683 | trace_probe_log_err(0, NOSUP_BTFARG); |
1684 | return (const char **)params; |
1685 | } |
1686 | *new_argc = argc; |
1687 | return NULL; |
1688 | } |
1689 | |
1690 | if (args_idx >= 0) |
1691 | *new_argc = argc + ctx->nr_params - 1; |
1692 | else |
1693 | *new_argc = argc; |
1694 | |
1695 | new_argv = kcalloc(n: *new_argc, size: sizeof(char *), GFP_KERNEL); |
1696 | if (!new_argv) |
1697 | return ERR_PTR(error: -ENOMEM); |
1698 | |
1699 | used = 0; |
1700 | for (i = 0, j = 0; i < argc; i++) { |
1701 | trace_probe_log_set_index(index: i + 2); |
1702 | if (i == args_idx) { |
1703 | for (n = 0; n < ctx->nr_params; n++) { |
1704 | ret = sprint_nth_btf_arg(idx: n, type: "" , buf: buf + used, |
1705 | bufsize: bufsize - used, ctx); |
1706 | if (ret < 0) |
1707 | goto error; |
1708 | |
1709 | new_argv[j++] = buf + used; |
1710 | used += ret + 1; |
1711 | } |
1712 | continue; |
1713 | } |
1714 | |
1715 | if (str_has_prefix(str: argv[i], prefix: "$arg" )) { |
1716 | char *type = NULL; |
1717 | |
1718 | n = simple_strtoul(argv[i] + 4, &type, 10); |
1719 | if (type && !(*type == ':' || *type == '\0')) { |
1720 | trace_probe_log_err(0, BAD_VAR); |
1721 | ret = -ENOENT; |
1722 | goto error; |
1723 | } |
1724 | /* Note: $argN starts from $arg1 */ |
1725 | ret = sprint_nth_btf_arg(idx: n - 1, type, buf: buf + used, |
1726 | bufsize: bufsize - used, ctx); |
1727 | if (ret < 0) |
1728 | goto error; |
1729 | new_argv[j++] = buf + used; |
1730 | used += ret + 1; |
1731 | } else |
1732 | new_argv[j++] = argv[i]; |
1733 | } |
1734 | |
1735 | return new_argv; |
1736 | |
1737 | error: |
1738 | kfree(objp: new_argv); |
1739 | return ERR_PTR(error: ret); |
1740 | } |
1741 | |
1742 | void traceprobe_finish_parse(struct traceprobe_parse_context *ctx) |
1743 | { |
1744 | clear_btf_context(ctx); |
1745 | } |
1746 | |
1747 | int traceprobe_update_arg(struct probe_arg *arg) |
1748 | { |
1749 | struct fetch_insn *code = arg->code; |
1750 | long offset; |
1751 | char *tmp; |
1752 | char c; |
1753 | int ret = 0; |
1754 | |
1755 | while (code && code->op != FETCH_OP_END) { |
1756 | if (code->op == FETCH_NOP_SYMBOL) { |
1757 | if (code[1].op != FETCH_OP_IMM) |
1758 | return -EINVAL; |
1759 | |
1760 | tmp = strpbrk(code->data, "+-" ); |
1761 | if (tmp) |
1762 | c = *tmp; |
1763 | ret = traceprobe_split_symbol_offset(symbol: code->data, |
1764 | offset: &offset); |
1765 | if (ret) |
1766 | return ret; |
1767 | |
1768 | code[1].immediate = |
1769 | (unsigned long)kallsyms_lookup_name(name: code->data); |
1770 | if (tmp) |
1771 | *tmp = c; |
1772 | if (!code[1].immediate) |
1773 | return -ENOENT; |
1774 | code[1].immediate += offset; |
1775 | } |
1776 | code++; |
1777 | } |
1778 | return 0; |
1779 | } |
1780 | |
1781 | /* When len=0, we just calculate the needed length */ |
1782 | #define LEN_OR_ZERO (len ? len - pos : 0) |
1783 | static int __set_print_fmt(struct trace_probe *tp, char *buf, int len, |
1784 | enum probe_print_type ptype) |
1785 | { |
1786 | struct probe_arg *parg; |
1787 | int i, j; |
1788 | int pos = 0; |
1789 | const char *fmt, *arg; |
1790 | |
1791 | switch (ptype) { |
1792 | case PROBE_PRINT_NORMAL: |
1793 | fmt = "(%lx)" ; |
1794 | arg = ", REC->" FIELD_STRING_IP; |
1795 | break; |
1796 | case PROBE_PRINT_RETURN: |
1797 | fmt = "(%lx <- %lx)" ; |
1798 | arg = ", REC->" FIELD_STRING_FUNC ", REC->" FIELD_STRING_RETIP; |
1799 | break; |
1800 | case PROBE_PRINT_EVENT: |
1801 | fmt = "" ; |
1802 | arg = "" ; |
1803 | break; |
1804 | default: |
1805 | WARN_ON_ONCE(1); |
1806 | return 0; |
1807 | } |
1808 | |
1809 | pos += snprintf(buf: buf + pos, LEN_OR_ZERO, fmt: "\"%s" , fmt); |
1810 | |
1811 | for (i = 0; i < tp->nr_args; i++) { |
1812 | parg = tp->args + i; |
1813 | pos += snprintf(buf: buf + pos, LEN_OR_ZERO, fmt: " %s=" , parg->name); |
1814 | if (parg->count) { |
1815 | pos += snprintf(buf: buf + pos, LEN_OR_ZERO, fmt: "{%s" , |
1816 | parg->type->fmt); |
1817 | for (j = 1; j < parg->count; j++) |
1818 | pos += snprintf(buf: buf + pos, LEN_OR_ZERO, fmt: ",%s" , |
1819 | parg->type->fmt); |
1820 | pos += snprintf(buf: buf + pos, LEN_OR_ZERO, fmt: "}" ); |
1821 | } else |
1822 | pos += snprintf(buf: buf + pos, LEN_OR_ZERO, fmt: "%s" , |
1823 | parg->type->fmt); |
1824 | } |
1825 | |
1826 | pos += snprintf(buf: buf + pos, LEN_OR_ZERO, fmt: "\"%s" , arg); |
1827 | |
1828 | for (i = 0; i < tp->nr_args; i++) { |
1829 | parg = tp->args + i; |
1830 | if (parg->count) { |
1831 | if (parg->type->is_string) |
1832 | fmt = ", __get_str(%s[%d])" ; |
1833 | else |
1834 | fmt = ", REC->%s[%d]" ; |
1835 | for (j = 0; j < parg->count; j++) |
1836 | pos += snprintf(buf: buf + pos, LEN_OR_ZERO, |
1837 | fmt, parg->name, j); |
1838 | } else { |
1839 | if (parg->type->is_string) |
1840 | fmt = ", __get_str(%s)" ; |
1841 | else |
1842 | fmt = ", REC->%s" ; |
1843 | pos += snprintf(buf: buf + pos, LEN_OR_ZERO, |
1844 | fmt, parg->name); |
1845 | } |
1846 | } |
1847 | |
1848 | /* return the length of print_fmt */ |
1849 | return pos; |
1850 | } |
1851 | #undef LEN_OR_ZERO |
1852 | |
1853 | int traceprobe_set_print_fmt(struct trace_probe *tp, enum probe_print_type ptype) |
1854 | { |
1855 | struct trace_event_call *call = trace_probe_event_call(tp); |
1856 | int len; |
1857 | char *print_fmt; |
1858 | |
1859 | /* First: called with 0 length to calculate the needed length */ |
1860 | len = __set_print_fmt(tp, NULL, len: 0, ptype); |
1861 | print_fmt = kmalloc(size: len + 1, GFP_KERNEL); |
1862 | if (!print_fmt) |
1863 | return -ENOMEM; |
1864 | |
1865 | /* Second: actually write the @print_fmt */ |
1866 | __set_print_fmt(tp, buf: print_fmt, len: len + 1, ptype); |
1867 | call->print_fmt = print_fmt; |
1868 | |
1869 | return 0; |
1870 | } |
1871 | |
1872 | int traceprobe_define_arg_fields(struct trace_event_call *event_call, |
1873 | size_t offset, struct trace_probe *tp) |
1874 | { |
1875 | int ret, i; |
1876 | |
1877 | /* Set argument names as fields */ |
1878 | for (i = 0; i < tp->nr_args; i++) { |
1879 | struct probe_arg *parg = &tp->args[i]; |
1880 | const char *fmt = parg->type->fmttype; |
1881 | int size = parg->type->size; |
1882 | |
1883 | if (parg->fmt) |
1884 | fmt = parg->fmt; |
1885 | if (parg->count) |
1886 | size *= parg->count; |
1887 | ret = trace_define_field(call: event_call, type: fmt, name: parg->name, |
1888 | offset: offset + parg->offset, size, |
1889 | is_signed: parg->type->is_signed, |
1890 | filter_type: FILTER_OTHER); |
1891 | if (ret) |
1892 | return ret; |
1893 | } |
1894 | return 0; |
1895 | } |
1896 | |
1897 | static void trace_probe_event_free(struct trace_probe_event *tpe) |
1898 | { |
1899 | kfree(objp: tpe->class.system); |
1900 | kfree(objp: tpe->call.name); |
1901 | kfree(objp: tpe->call.print_fmt); |
1902 | kfree(objp: tpe); |
1903 | } |
1904 | |
1905 | int trace_probe_append(struct trace_probe *tp, struct trace_probe *to) |
1906 | { |
1907 | if (trace_probe_has_sibling(tp)) |
1908 | return -EBUSY; |
1909 | |
1910 | list_del_init(entry: &tp->list); |
1911 | trace_probe_event_free(tpe: tp->event); |
1912 | |
1913 | tp->event = to->event; |
1914 | list_add_tail(new: &tp->list, head: trace_probe_probe_list(tp: to)); |
1915 | |
1916 | return 0; |
1917 | } |
1918 | |
1919 | void trace_probe_unlink(struct trace_probe *tp) |
1920 | { |
1921 | list_del_init(entry: &tp->list); |
1922 | if (list_empty(head: trace_probe_probe_list(tp))) |
1923 | trace_probe_event_free(tpe: tp->event); |
1924 | tp->event = NULL; |
1925 | } |
1926 | |
1927 | void trace_probe_cleanup(struct trace_probe *tp) |
1928 | { |
1929 | int i; |
1930 | |
1931 | for (i = 0; i < tp->nr_args; i++) |
1932 | traceprobe_free_probe_arg(arg: &tp->args[i]); |
1933 | |
1934 | if (tp->entry_arg) { |
1935 | kfree(objp: tp->entry_arg->code); |
1936 | kfree(objp: tp->entry_arg); |
1937 | tp->entry_arg = NULL; |
1938 | } |
1939 | |
1940 | if (tp->event) |
1941 | trace_probe_unlink(tp); |
1942 | } |
1943 | |
1944 | int trace_probe_init(struct trace_probe *tp, const char *event, |
1945 | const char *group, bool alloc_filter, int nargs) |
1946 | { |
1947 | struct trace_event_call *call; |
1948 | size_t size = sizeof(struct trace_probe_event); |
1949 | int ret = 0; |
1950 | |
1951 | if (!event || !group) |
1952 | return -EINVAL; |
1953 | |
1954 | if (alloc_filter) |
1955 | size += sizeof(struct trace_uprobe_filter); |
1956 | |
1957 | tp->event = kzalloc(size, GFP_KERNEL); |
1958 | if (!tp->event) |
1959 | return -ENOMEM; |
1960 | |
1961 | INIT_LIST_HEAD(list: &tp->event->files); |
1962 | INIT_LIST_HEAD(list: &tp->event->class.fields); |
1963 | INIT_LIST_HEAD(list: &tp->event->probes); |
1964 | INIT_LIST_HEAD(list: &tp->list); |
1965 | list_add(new: &tp->list, head: &tp->event->probes); |
1966 | |
1967 | call = trace_probe_event_call(tp); |
1968 | call->class = &tp->event->class; |
1969 | call->name = kstrdup(s: event, GFP_KERNEL); |
1970 | if (!call->name) { |
1971 | ret = -ENOMEM; |
1972 | goto error; |
1973 | } |
1974 | |
1975 | tp->event->class.system = kstrdup(s: group, GFP_KERNEL); |
1976 | if (!tp->event->class.system) { |
1977 | ret = -ENOMEM; |
1978 | goto error; |
1979 | } |
1980 | |
1981 | tp->nr_args = nargs; |
1982 | /* Make sure pointers in args[] are NULL */ |
1983 | if (nargs) |
1984 | memset(tp->args, 0, sizeof(tp->args[0]) * nargs); |
1985 | |
1986 | return 0; |
1987 | |
1988 | error: |
1989 | trace_probe_cleanup(tp); |
1990 | return ret; |
1991 | } |
1992 | |
1993 | static struct trace_event_call * |
1994 | find_trace_event_call(const char *system, const char *event_name) |
1995 | { |
1996 | struct trace_event_call *tp_event; |
1997 | const char *name; |
1998 | |
1999 | list_for_each_entry(tp_event, &ftrace_events, list) { |
2000 | if (!tp_event->class->system || |
2001 | strcmp(system, tp_event->class->system)) |
2002 | continue; |
2003 | name = trace_event_name(call: tp_event); |
2004 | if (!name || strcmp(event_name, name)) |
2005 | continue; |
2006 | return tp_event; |
2007 | } |
2008 | |
2009 | return NULL; |
2010 | } |
2011 | |
2012 | int trace_probe_register_event_call(struct trace_probe *tp) |
2013 | { |
2014 | struct trace_event_call *call = trace_probe_event_call(tp); |
2015 | int ret; |
2016 | |
2017 | lockdep_assert_held(&event_mutex); |
2018 | |
2019 | if (find_trace_event_call(system: trace_probe_group_name(tp), |
2020 | event_name: trace_probe_name(tp))) |
2021 | return -EEXIST; |
2022 | |
2023 | ret = register_trace_event(event: &call->event); |
2024 | if (!ret) |
2025 | return -ENODEV; |
2026 | |
2027 | ret = trace_add_event_call(call); |
2028 | if (ret) |
2029 | unregister_trace_event(event: &call->event); |
2030 | |
2031 | return ret; |
2032 | } |
2033 | |
2034 | int trace_probe_add_file(struct trace_probe *tp, struct trace_event_file *file) |
2035 | { |
2036 | struct event_file_link *link; |
2037 | |
2038 | link = kmalloc(size: sizeof(*link), GFP_KERNEL); |
2039 | if (!link) |
2040 | return -ENOMEM; |
2041 | |
2042 | link->file = file; |
2043 | INIT_LIST_HEAD(list: &link->list); |
2044 | list_add_tail_rcu(new: &link->list, head: &tp->event->files); |
2045 | trace_probe_set_flag(tp, TP_FLAG_TRACE); |
2046 | return 0; |
2047 | } |
2048 | |
2049 | struct event_file_link *trace_probe_get_file_link(struct trace_probe *tp, |
2050 | struct trace_event_file *file) |
2051 | { |
2052 | struct event_file_link *link; |
2053 | |
2054 | trace_probe_for_each_link(link, tp) { |
2055 | if (link->file == file) |
2056 | return link; |
2057 | } |
2058 | |
2059 | return NULL; |
2060 | } |
2061 | |
2062 | int trace_probe_remove_file(struct trace_probe *tp, |
2063 | struct trace_event_file *file) |
2064 | { |
2065 | struct event_file_link *link; |
2066 | |
2067 | link = trace_probe_get_file_link(tp, file); |
2068 | if (!link) |
2069 | return -ENOENT; |
2070 | |
2071 | list_del_rcu(entry: &link->list); |
2072 | kvfree_rcu_mightsleep(link); |
2073 | |
2074 | if (list_empty(head: &tp->event->files)) |
2075 | trace_probe_clear_flag(tp, TP_FLAG_TRACE); |
2076 | |
2077 | return 0; |
2078 | } |
2079 | |
2080 | /* |
2081 | * Return the smallest index of different type argument (start from 1). |
2082 | * If all argument types and name are same, return 0. |
2083 | */ |
2084 | int trace_probe_compare_arg_type(struct trace_probe *a, struct trace_probe *b) |
2085 | { |
2086 | int i; |
2087 | |
2088 | /* In case of more arguments */ |
2089 | if (a->nr_args < b->nr_args) |
2090 | return a->nr_args + 1; |
2091 | if (a->nr_args > b->nr_args) |
2092 | return b->nr_args + 1; |
2093 | |
2094 | for (i = 0; i < a->nr_args; i++) { |
2095 | if ((b->nr_args <= i) || |
2096 | ((a->args[i].type != b->args[i].type) || |
2097 | (a->args[i].count != b->args[i].count) || |
2098 | strcmp(a->args[i].name, b->args[i].name))) |
2099 | return i + 1; |
2100 | } |
2101 | |
2102 | return 0; |
2103 | } |
2104 | |
2105 | bool trace_probe_match_command_args(struct trace_probe *tp, |
2106 | int argc, const char **argv) |
2107 | { |
2108 | char buf[MAX_ARGSTR_LEN + 1]; |
2109 | int i; |
2110 | |
2111 | if (tp->nr_args < argc) |
2112 | return false; |
2113 | |
2114 | for (i = 0; i < argc; i++) { |
2115 | snprintf(buf, size: sizeof(buf), fmt: "%s=%s" , |
2116 | tp->args[i].name, tp->args[i].comm); |
2117 | if (strcmp(buf, argv[i])) |
2118 | return false; |
2119 | } |
2120 | return true; |
2121 | } |
2122 | |
2123 | int trace_probe_create(const char *raw_command, int (*createfn)(int, const char **)) |
2124 | { |
2125 | int argc = 0, ret = 0; |
2126 | char **argv; |
2127 | |
2128 | argv = argv_split(GFP_KERNEL, str: raw_command, argcp: &argc); |
2129 | if (!argv) |
2130 | return -ENOMEM; |
2131 | |
2132 | if (argc) |
2133 | ret = createfn(argc, (const char **)argv); |
2134 | |
2135 | argv_free(argv); |
2136 | |
2137 | return ret; |
2138 | } |
2139 | |
2140 | int trace_probe_print_args(struct trace_seq *s, struct probe_arg *args, int nr_args, |
2141 | u8 *data, void *field) |
2142 | { |
2143 | void *p; |
2144 | int i, j; |
2145 | |
2146 | for (i = 0; i < nr_args; i++) { |
2147 | struct probe_arg *a = args + i; |
2148 | |
2149 | trace_seq_printf(s, fmt: " %s=" , a->name); |
2150 | if (likely(!a->count)) { |
2151 | if (!a->type->print(s, data + a->offset, field)) |
2152 | return -ENOMEM; |
2153 | continue; |
2154 | } |
2155 | trace_seq_putc(s, c: '{'); |
2156 | p = data + a->offset; |
2157 | for (j = 0; j < a->count; j++) { |
2158 | if (!a->type->print(s, p, field)) |
2159 | return -ENOMEM; |
2160 | trace_seq_putc(s, c: j == a->count - 1 ? '}' : ','); |
2161 | p += a->type->size; |
2162 | } |
2163 | } |
2164 | return 0; |
2165 | } |
2166 | |