2012-04-11 14:30:43 +04:00
/*
* uprobes - based tracing events
*
* This program is free software ; you can redistribute it and / or modify
* it under the terms of the GNU General Public License version 2 as
* published by the Free Software Foundation .
*
* This program is distributed in the hope that it will be useful ,
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
* GNU General Public License for more details .
*
* You should have received a copy of the GNU General Public License
* along with this program ; if not , write to the Free Software
* Foundation , Inc . , 59 Temple Place , Suite 330 , Boston , MA 02111 - 1307 USA
*
* Copyright ( C ) IBM Corporation , 2010 - 2012
* Author : Srikar Dronamraju < srikar @ linux . vnet . ibm . com >
*/
# include <linux/module.h>
# include <linux/uaccess.h>
# include <linux/uprobes.h>
# include <linux/namei.h>
2012-12-18 04:01:27 +04:00
# include <linux/string.h>
2012-04-11 14:30:43 +04:00
# include "trace_probe.h"
# define UPROBE_EVENT_SYSTEM "uprobes"
2013-03-29 21:26:51 +04:00
struct uprobe_trace_entry_head {
struct trace_entry ent ;
unsigned long vaddr [ ] ;
} ;
# define SIZEOF_TRACE_ENTRY(is_return) \
( sizeof ( struct uprobe_trace_entry_head ) + \
sizeof ( unsigned long ) * ( is_return ? 2 : 1 ) )
# define DATAOF_TRACE_ENTRY(entry, is_return) \
( ( void * ) ( entry ) + SIZEOF_TRACE_ENTRY ( is_return ) )
2013-02-03 23:58:35 +04:00
struct trace_uprobe_filter {
rwlock_t rwlock ;
int nr_systemwide ;
struct list_head perf_events ;
} ;
2012-04-11 14:30:43 +04:00
/*
* uprobe event core functions
*/
struct trace_uprobe {
struct list_head list ;
2013-02-03 23:58:35 +04:00
struct trace_uprobe_filter filter ;
2013-01-31 22:47:23 +04:00
struct uprobe_consumer consumer ;
2012-04-11 14:30:43 +04:00
struct inode * inode ;
char * filename ;
unsigned long offset ;
unsigned long nhit ;
2013-07-03 10:42:53 +04:00
struct trace_probe tp ;
2012-04-11 14:30:43 +04:00
} ;
2013-07-03 10:42:53 +04:00
# define SIZEOF_TRACE_UPROBE(n) \
( offsetof ( struct trace_uprobe , tp . args ) + \
2012-04-11 14:30:43 +04:00
( sizeof ( struct probe_arg ) * ( n ) ) )
static int register_uprobe_event ( struct trace_uprobe * tu ) ;
2013-07-04 07:33:51 +04:00
static int unregister_uprobe_event ( struct trace_uprobe * tu ) ;
2012-04-11 14:30:43 +04:00
static DEFINE_MUTEX ( uprobe_lock ) ;
static LIST_HEAD ( uprobe_list ) ;
2013-11-25 08:42:47 +04:00
struct uprobe_dispatch_data {
struct trace_uprobe * tu ;
unsigned long bp_addr ;
} ;
2012-04-11 14:30:43 +04:00
static int uprobe_dispatcher ( struct uprobe_consumer * con , struct pt_regs * regs ) ;
2013-03-30 21:25:23 +04:00
static int uretprobe_dispatcher ( struct uprobe_consumer * con ,
unsigned long func , struct pt_regs * regs ) ;
2012-04-11 14:30:43 +04:00
2013-11-26 10:21:04 +04:00
# ifdef CONFIG_STACK_GROWSUP
static unsigned long adjust_stack_addr ( unsigned long addr , unsigned int n )
{
return addr - ( n * sizeof ( long ) ) ;
}
# else
static unsigned long adjust_stack_addr ( unsigned long addr , unsigned int n )
{
return addr + ( n * sizeof ( long ) ) ;
}
# endif
static unsigned long get_user_stack_nth ( struct pt_regs * regs , unsigned int n )
{
unsigned long ret ;
unsigned long addr = user_stack_pointer ( regs ) ;
addr = adjust_stack_addr ( addr , n ) ;
if ( copy_from_user ( & ret , ( void __force __user * ) addr , sizeof ( ret ) ) )
return 0 ;
return ret ;
}
/*
* Uprobes - specific fetch functions
*/
# define DEFINE_FETCH_stack(type) \
static __kprobes void FETCH_FUNC_NAME ( stack , type ) ( struct pt_regs * regs , \
void * offset , void * dest ) \
{ \
* ( type * ) dest = ( type ) get_user_stack_nth ( regs , \
( ( unsigned long ) offset ) ) ; \
}
DEFINE_BASIC_FETCH_FUNCS ( stack )
/* No string on the stack entry */
# define fetch_stack_string NULL
# define fetch_stack_string_size NULL
2013-11-26 10:21:04 +04:00
# define DEFINE_FETCH_memory(type) \
static __kprobes void FETCH_FUNC_NAME ( memory , type ) ( struct pt_regs * regs , \
void * addr , void * dest ) \
{ \
type retval ; \
void __user * vaddr = ( void __force __user * ) addr ; \
\
if ( copy_from_user ( & retval , vaddr , sizeof ( type ) ) ) \
* ( type * ) dest = 0 ; \
else \
* ( type * ) dest = retval ; \
}
DEFINE_BASIC_FETCH_FUNCS ( memory )
/*
* Fetch a null - terminated string . Caller MUST set * ( u32 * ) dest with max
* length and relative data location .
*/
static __kprobes void FETCH_FUNC_NAME ( memory , string ) ( struct pt_regs * regs ,
void * addr , void * dest )
{
long ret ;
u32 rloc = * ( u32 * ) dest ;
int maxlen = get_rloc_len ( rloc ) ;
u8 * dst = get_rloc_data ( dest ) ;
void __user * src = ( void __force __user * ) addr ;
if ( ! maxlen )
return ;
ret = strncpy_from_user ( dst , src , maxlen ) ;
if ( ret < 0 ) { /* Failed to fetch string */
( ( u8 * ) get_rloc_data ( dest ) ) [ 0 ] = ' \0 ' ;
* ( u32 * ) dest = make_data_rloc ( 0 , get_rloc_offs ( rloc ) ) ;
} else {
* ( u32 * ) dest = make_data_rloc ( ret , get_rloc_offs ( rloc ) ) ;
}
}
static __kprobes void FETCH_FUNC_NAME ( memory , string_size ) ( struct pt_regs * regs ,
void * addr , void * dest )
{
int len ;
void __user * vaddr = ( void __force __user * ) addr ;
len = strnlen_user ( vaddr , MAX_STRING_SIZE ) ;
if ( len = = 0 | | len > MAX_STRING_SIZE ) /* Failed to check length */
* ( u32 * ) dest = 0 ;
else
* ( u32 * ) dest = len ;
}
2013-11-26 10:21:04 +04:00
2013-11-25 08:42:47 +04:00
static unsigned long translate_user_vaddr ( void * file_offset )
{
unsigned long base_addr ;
struct uprobe_dispatch_data * udd ;
udd = ( void * ) current - > utask - > vaddr ;
base_addr = udd - > bp_addr - udd - > tu - > offset ;
return base_addr + ( unsigned long ) file_offset ;
}
# define DEFINE_FETCH_file_offset(type) \
static __kprobes void FETCH_FUNC_NAME ( file_offset , type ) ( struct pt_regs * regs , \
void * offset , void * dest ) \
{ \
void * vaddr = ( void * ) translate_user_vaddr ( offset ) ; \
\
FETCH_FUNC_NAME ( memory , type ) ( regs , vaddr , dest ) ; \
}
DEFINE_BASIC_FETCH_FUNCS ( file_offset )
DEFINE_FETCH_file_offset ( string )
DEFINE_FETCH_file_offset ( string_size )
2013-11-26 09:56:28 +04:00
/* Fetch type information table */
const struct fetch_type uprobes_fetch_type_table [ ] = {
/* Special types */
[ FETCH_TYPE_STRING ] = __ASSIGN_FETCH_TYPE ( " string " , string , string ,
sizeof ( u32 ) , 1 , " __data_loc char[] " ) ,
[ FETCH_TYPE_STRSIZE ] = __ASSIGN_FETCH_TYPE ( " string_size " , u32 ,
string_size , sizeof ( u32 ) , 0 , " u32 " ) ,
/* Basic types */
ASSIGN_FETCH_TYPE ( u8 , u8 , 0 ) ,
ASSIGN_FETCH_TYPE ( u16 , u16 , 0 ) ,
ASSIGN_FETCH_TYPE ( u32 , u32 , 0 ) ,
ASSIGN_FETCH_TYPE ( u64 , u64 , 0 ) ,
ASSIGN_FETCH_TYPE ( s8 , u8 , 1 ) ,
ASSIGN_FETCH_TYPE ( s16 , u16 , 1 ) ,
ASSIGN_FETCH_TYPE ( s32 , u32 , 1 ) ,
ASSIGN_FETCH_TYPE ( s64 , u64 , 1 ) ,
ASSIGN_FETCH_TYPE_END
} ;
2013-02-03 23:58:35 +04:00
static inline void init_trace_uprobe_filter ( struct trace_uprobe_filter * filter )
{
rwlock_init ( & filter - > rwlock ) ;
filter - > nr_systemwide = 0 ;
INIT_LIST_HEAD ( & filter - > perf_events ) ;
}
static inline bool uprobe_filter_is_empty ( struct trace_uprobe_filter * filter )
{
return ! filter - > nr_systemwide & & list_empty ( & filter - > perf_events ) ;
}
2013-03-30 21:25:23 +04:00
static inline bool is_ret_probe ( struct trace_uprobe * tu )
{
return tu - > consumer . ret_handler ! = NULL ;
}
2012-04-11 14:30:43 +04:00
/*
* Allocate new trace_uprobe and initialize it ( including uprobes ) .
*/
static struct trace_uprobe *
2013-03-30 21:25:23 +04:00
alloc_trace_uprobe ( const char * group , const char * event , int nargs , bool is_ret )
2012-04-11 14:30:43 +04:00
{
struct trace_uprobe * tu ;
if ( ! event | | ! is_good_name ( event ) )
return ERR_PTR ( - EINVAL ) ;
if ( ! group | | ! is_good_name ( group ) )
return ERR_PTR ( - EINVAL ) ;
tu = kzalloc ( SIZEOF_TRACE_UPROBE ( nargs ) , GFP_KERNEL ) ;
if ( ! tu )
return ERR_PTR ( - ENOMEM ) ;
2013-07-03 10:42:53 +04:00
tu - > tp . call . class = & tu - > tp . class ;
tu - > tp . call . name = kstrdup ( event , GFP_KERNEL ) ;
if ( ! tu - > tp . call . name )
2012-04-11 14:30:43 +04:00
goto error ;
2013-07-03 10:42:53 +04:00
tu - > tp . class . system = kstrdup ( group , GFP_KERNEL ) ;
if ( ! tu - > tp . class . system )
2012-04-11 14:30:43 +04:00
goto error ;
INIT_LIST_HEAD ( & tu - > list ) ;
2014-01-17 12:08:38 +04:00
INIT_LIST_HEAD ( & tu - > tp . files ) ;
2013-01-31 22:47:23 +04:00
tu - > consumer . handler = uprobe_dispatcher ;
2013-03-30 21:25:23 +04:00
if ( is_ret )
tu - > consumer . ret_handler = uretprobe_dispatcher ;
2013-02-03 23:58:35 +04:00
init_trace_uprobe_filter ( & tu - > filter ) ;
2013-07-03 10:42:53 +04:00
tu - > tp . call . flags | = TRACE_EVENT_FL_USE_CALL_FILTER ;
2012-04-11 14:30:43 +04:00
return tu ;
error :
2013-07-03 10:42:53 +04:00
kfree ( tu - > tp . call . name ) ;
2012-04-11 14:30:43 +04:00
kfree ( tu ) ;
return ERR_PTR ( - ENOMEM ) ;
}
static void free_trace_uprobe ( struct trace_uprobe * tu )
{
int i ;
2013-07-03 10:42:53 +04:00
for ( i = 0 ; i < tu - > tp . nr_args ; i + + )
traceprobe_free_probe_arg ( & tu - > tp . args [ i ] ) ;
2012-04-11 14:30:43 +04:00
iput ( tu - > inode ) ;
2013-07-03 10:42:53 +04:00
kfree ( tu - > tp . call . class - > system ) ;
kfree ( tu - > tp . call . name ) ;
2012-04-11 14:30:43 +04:00
kfree ( tu - > filename ) ;
kfree ( tu ) ;
}
static struct trace_uprobe * find_probe_event ( const char * event , const char * group )
{
struct trace_uprobe * tu ;
list_for_each_entry ( tu , & uprobe_list , list )
2014-04-09 01:26:21 +04:00
if ( strcmp ( ftrace_event_name ( & tu - > tp . call ) , event ) = = 0 & &
2013-07-03 10:42:53 +04:00
strcmp ( tu - > tp . call . class - > system , group ) = = 0 )
2012-04-11 14:30:43 +04:00
return tu ;
return NULL ;
}
/* Unregister a trace_uprobe and probe_event: call with locking uprobe_lock */
2013-07-04 07:33:51 +04:00
static int unregister_trace_uprobe ( struct trace_uprobe * tu )
2012-04-11 14:30:43 +04:00
{
2013-07-04 07:33:51 +04:00
int ret ;
ret = unregister_uprobe_event ( tu ) ;
if ( ret )
return ret ;
2012-04-11 14:30:43 +04:00
list_del ( & tu - > list ) ;
free_trace_uprobe ( tu ) ;
2013-07-04 07:33:51 +04:00
return 0 ;
2012-04-11 14:30:43 +04:00
}
/* Register a trace_uprobe and probe_event */
static int register_trace_uprobe ( struct trace_uprobe * tu )
{
2013-07-03 10:42:53 +04:00
struct trace_uprobe * old_tu ;
2012-04-11 14:30:43 +04:00
int ret ;
mutex_lock ( & uprobe_lock ) ;
/* register as an event */
2014-04-09 01:26:21 +04:00
old_tu = find_probe_event ( ftrace_event_name ( & tu - > tp . call ) ,
tu - > tp . call . class - > system ) ;
2013-07-03 10:42:53 +04:00
if ( old_tu ) {
2012-04-11 14:30:43 +04:00
/* delete old event */
2013-07-03 10:42:53 +04:00
ret = unregister_trace_uprobe ( old_tu ) ;
2013-07-04 07:33:51 +04:00
if ( ret )
goto end ;
}
2012-04-11 14:30:43 +04:00
ret = register_uprobe_event ( tu ) ;
if ( ret ) {
pr_warning ( " Failed to register probe event(%d) \n " , ret ) ;
goto end ;
}
list_add_tail ( & tu - > list , & uprobe_list ) ;
end :
mutex_unlock ( & uprobe_lock ) ;
return ret ;
}
/*
* Argument syntax :
2013-07-03 11:44:46 +04:00
* - Add uprobe : p | r [ : [ GRP / ] EVENT ] PATH : OFFSET [ FETCHARGS ]
2012-04-11 14:30:43 +04:00
*
* - Remove uprobe : - : [ GRP / ] EVENT
*/
static int create_trace_uprobe ( int argc , char * * argv )
{
struct trace_uprobe * tu ;
struct inode * inode ;
char * arg , * event , * group , * filename ;
char buf [ MAX_EVENT_NAME_LEN ] ;
struct path path ;
unsigned long offset ;
2013-03-30 23:28:15 +04:00
bool is_delete , is_return ;
2012-04-11 14:30:43 +04:00
int i , ret ;
inode = NULL ;
ret = 0 ;
is_delete = false ;
2013-03-30 23:28:15 +04:00
is_return = false ;
2012-04-11 14:30:43 +04:00
event = NULL ;
group = NULL ;
/* argc must be >= 1 */
if ( argv [ 0 ] [ 0 ] = = ' - ' )
is_delete = true ;
2013-03-30 23:28:15 +04:00
else if ( argv [ 0 ] [ 0 ] = = ' r ' )
is_return = true ;
2012-04-11 14:30:43 +04:00
else if ( argv [ 0 ] [ 0 ] ! = ' p ' ) {
2013-03-30 23:28:15 +04:00
pr_info ( " Probe definition must be started with 'p', 'r' or '-'. \n " ) ;
2012-04-11 14:30:43 +04:00
return - EINVAL ;
}
if ( argv [ 0 ] [ 1 ] = = ' : ' ) {
event = & argv [ 0 ] [ 2 ] ;
arg = strchr ( event , ' / ' ) ;
if ( arg ) {
group = event ;
event = arg + 1 ;
event [ - 1 ] = ' \0 ' ;
if ( strlen ( group ) = = 0 ) {
pr_info ( " Group name is not specified \n " ) ;
return - EINVAL ;
}
}
if ( strlen ( event ) = = 0 ) {
pr_info ( " Event name is not specified \n " ) ;
return - EINVAL ;
}
}
if ( ! group )
group = UPROBE_EVENT_SYSTEM ;
if ( is_delete ) {
2013-07-04 07:33:51 +04:00
int ret ;
2012-04-11 14:30:43 +04:00
if ( ! event ) {
pr_info ( " Delete command needs an event name. \n " ) ;
return - EINVAL ;
}
mutex_lock ( & uprobe_lock ) ;
tu = find_probe_event ( event , group ) ;
if ( ! tu ) {
mutex_unlock ( & uprobe_lock ) ;
pr_info ( " Event %s/%s doesn't exist. \n " , group , event ) ;
return - ENOENT ;
}
/* delete an event */
2013-07-04 07:33:51 +04:00
ret = unregister_trace_uprobe ( tu ) ;
2012-04-11 14:30:43 +04:00
mutex_unlock ( & uprobe_lock ) ;
2013-07-04 07:33:51 +04:00
return ret ;
2012-04-11 14:30:43 +04:00
}
if ( argc < 2 ) {
pr_info ( " Probe point is not specified. \n " ) ;
return - EINVAL ;
}
if ( isdigit ( argv [ 1 ] [ 0 ] ) ) {
pr_info ( " probe point must be have a filename. \n " ) ;
return - EINVAL ;
}
arg = strchr ( argv [ 1 ] , ' : ' ) ;
2013-06-13 10:21:51 +04:00
if ( ! arg ) {
ret = - EINVAL ;
2012-04-11 14:30:43 +04:00
goto fail_address_parse ;
2013-06-13 10:21:51 +04:00
}
2012-04-11 14:30:43 +04:00
* arg + + = ' \0 ' ;
filename = argv [ 1 ] ;
ret = kern_path ( filename , LOOKUP_FOLLOW , & path ) ;
if ( ret )
goto fail_address_parse ;
inode = igrab ( path . dentry - > d_inode ) ;
2013-01-27 21:20:45 +04:00
path_put ( & path ) ;
2013-01-28 20:08:47 +04:00
if ( ! inode | | ! S_ISREG ( inode - > i_mode ) ) {
2012-07-18 14:16:44 +04:00
ret = - EINVAL ;
goto fail_address_parse ;
}
2012-04-11 14:30:43 +04:00
2013-01-27 21:20:45 +04:00
ret = kstrtoul ( arg , 0 , & offset ) ;
if ( ret )
goto fail_address_parse ;
2012-04-11 14:30:43 +04:00
argc - = 2 ;
argv + = 2 ;
/* setup a probe */
if ( ! event ) {
2012-12-18 04:01:27 +04:00
char * tail ;
2012-04-11 14:30:43 +04:00
char * ptr ;
2012-12-18 04:01:27 +04:00
tail = kstrdup ( kbasename ( filename ) , GFP_KERNEL ) ;
if ( ! tail ) {
2012-04-11 14:30:43 +04:00
ret = - ENOMEM ;
goto fail_address_parse ;
}
ptr = strpbrk ( tail , " .-_ " ) ;
if ( ptr )
* ptr = ' \0 ' ;
snprintf ( buf , MAX_EVENT_NAME_LEN , " %c_%s_0x%lx " , ' p ' , tail , offset ) ;
event = buf ;
kfree ( tail ) ;
}
2013-03-30 23:28:15 +04:00
tu = alloc_trace_uprobe ( group , event , argc , is_return ) ;
2012-04-11 14:30:43 +04:00
if ( IS_ERR ( tu ) ) {
pr_info ( " Failed to allocate trace_uprobe.(%d) \n " , ( int ) PTR_ERR ( tu ) ) ;
ret = PTR_ERR ( tu ) ;
goto fail_address_parse ;
}
tu - > offset = offset ;
tu - > inode = inode ;
tu - > filename = kstrdup ( filename , GFP_KERNEL ) ;
if ( ! tu - > filename ) {
pr_info ( " Failed to allocate filename. \n " ) ;
ret = - ENOMEM ;
goto error ;
}
/* parse arguments */
ret = 0 ;
for ( i = 0 ; i < argc & & i < MAX_TRACE_ARGS ; i + + ) {
2013-07-03 10:42:53 +04:00
struct probe_arg * parg = & tu - > tp . args [ i ] ;
2012-04-11 14:30:43 +04:00
/* Increment count for freeing args in error case */
2013-07-03 10:42:53 +04:00
tu - > tp . nr_args + + ;
2012-04-11 14:30:43 +04:00
/* Parse argument name */
arg = strchr ( argv [ i ] , ' = ' ) ;
if ( arg ) {
* arg + + = ' \0 ' ;
2013-07-03 10:42:53 +04:00
parg - > name = kstrdup ( argv [ i ] , GFP_KERNEL ) ;
2012-04-11 14:30:43 +04:00
} else {
arg = argv [ i ] ;
/* If argument name is omitted, set "argN" */
snprintf ( buf , MAX_EVENT_NAME_LEN , " arg%d " , i + 1 ) ;
2013-07-03 10:42:53 +04:00
parg - > name = kstrdup ( buf , GFP_KERNEL ) ;
2012-04-11 14:30:43 +04:00
}
2013-07-03 10:42:53 +04:00
if ( ! parg - > name ) {
2012-04-11 14:30:43 +04:00
pr_info ( " Failed to allocate argument[%d] name. \n " , i ) ;
ret = - ENOMEM ;
goto error ;
}
2013-07-03 10:42:53 +04:00
if ( ! is_good_name ( parg - > name ) ) {
pr_info ( " Invalid argument[%d] name: %s \n " , i , parg - > name ) ;
2012-04-11 14:30:43 +04:00
ret = - EINVAL ;
goto error ;
}
2013-07-03 10:42:53 +04:00
if ( traceprobe_conflict_field_name ( parg - > name , tu - > tp . args , i ) ) {
2012-04-11 14:30:43 +04:00
pr_info ( " Argument[%d] name '%s' conflicts with "
" another field. \n " , i , argv [ i ] ) ;
ret = - EINVAL ;
goto error ;
}
/* Parse fetch argument */
2013-07-03 10:42:53 +04:00
ret = traceprobe_parse_probe_arg ( arg , & tu - > tp . size , parg ,
2013-11-27 06:36:47 +04:00
is_return , false ) ;
2012-04-11 14:30:43 +04:00
if ( ret ) {
pr_info ( " Parse error at argument[%d]. (%d) \n " , i , ret ) ;
goto error ;
}
}
ret = register_trace_uprobe ( tu ) ;
if ( ret )
goto error ;
return 0 ;
error :
free_trace_uprobe ( tu ) ;
return ret ;
fail_address_parse :
if ( inode )
iput ( inode ) ;
2012-07-18 14:16:44 +04:00
pr_info ( " Failed to parse address or file. \n " ) ;
2012-04-11 14:30:43 +04:00
return ret ;
}
2013-07-04 07:33:51 +04:00
static int cleanup_all_probes ( void )
2012-04-11 14:30:43 +04:00
{
struct trace_uprobe * tu ;
2013-07-04 07:33:51 +04:00
int ret = 0 ;
2012-04-11 14:30:43 +04:00
mutex_lock ( & uprobe_lock ) ;
while ( ! list_empty ( & uprobe_list ) ) {
tu = list_entry ( uprobe_list . next , struct trace_uprobe , list ) ;
2013-07-04 07:33:51 +04:00
ret = unregister_trace_uprobe ( tu ) ;
if ( ret )
break ;
2012-04-11 14:30:43 +04:00
}
mutex_unlock ( & uprobe_lock ) ;
2013-07-04 07:33:51 +04:00
return ret ;
2012-04-11 14:30:43 +04:00
}
/* Probes listing interfaces */
static void * probes_seq_start ( struct seq_file * m , loff_t * pos )
{
mutex_lock ( & uprobe_lock ) ;
return seq_list_start ( & uprobe_list , * pos ) ;
}
static void * probes_seq_next ( struct seq_file * m , void * v , loff_t * pos )
{
return seq_list_next ( v , & uprobe_list , pos ) ;
}
static void probes_seq_stop ( struct seq_file * m , void * v )
{
mutex_unlock ( & uprobe_lock ) ;
}
static int probes_seq_show ( struct seq_file * m , void * v )
{
struct trace_uprobe * tu = v ;
2013-03-30 22:48:09 +04:00
char c = is_ret_probe ( tu ) ? ' r ' : ' p ' ;
2012-04-11 14:30:43 +04:00
int i ;
2014-04-09 01:26:21 +04:00
seq_printf ( m , " %c:%s/%s " , c , tu - > tp . call . class - > system ,
ftrace_event_name ( & tu - > tp . call ) ) ;
2012-04-11 14:30:43 +04:00
seq_printf ( m , " %s:0x%p " , tu - > filename , ( void * ) tu - > offset ) ;
2013-07-03 10:42:53 +04:00
for ( i = 0 ; i < tu - > tp . nr_args ; i + + )
seq_printf ( m , " %s=%s " , tu - > tp . args [ i ] . name , tu - > tp . args [ i ] . comm ) ;
2012-04-11 14:30:43 +04:00
seq_printf ( m , " \n " ) ;
return 0 ;
}
static const struct seq_operations probes_seq_op = {
. start = probes_seq_start ,
. next = probes_seq_next ,
. stop = probes_seq_stop ,
. show = probes_seq_show
} ;
static int probes_open ( struct inode * inode , struct file * file )
{
2013-07-04 07:33:51 +04:00
int ret ;
if ( ( file - > f_mode & FMODE_WRITE ) & & ( file - > f_flags & O_TRUNC ) ) {
ret = cleanup_all_probes ( ) ;
if ( ret )
return ret ;
}
2012-04-11 14:30:43 +04:00
return seq_open ( file , & probes_seq_op ) ;
}
static ssize_t probes_write ( struct file * file , const char __user * buffer ,
size_t count , loff_t * ppos )
{
return traceprobe_probes_write ( file , buffer , count , ppos , create_trace_uprobe ) ;
}
static const struct file_operations uprobe_events_ops = {
. owner = THIS_MODULE ,
. open = probes_open ,
. read = seq_read ,
. llseek = seq_lseek ,
. release = seq_release ,
. write = probes_write ,
} ;
/* Probes profiling interfaces */
static int probes_profile_seq_show ( struct seq_file * m , void * v )
{
struct trace_uprobe * tu = v ;
2014-04-09 01:26:21 +04:00
seq_printf ( m , " %s %-44s %15lu \n " , tu - > filename ,
ftrace_event_name ( & tu - > tp . call ) , tu - > nhit ) ;
2012-04-11 14:30:43 +04:00
return 0 ;
}
static const struct seq_operations profile_seq_op = {
. start = probes_seq_start ,
. next = probes_seq_next ,
. stop = probes_seq_stop ,
. show = probes_profile_seq_show
} ;
static int profile_open ( struct inode * inode , struct file * file )
{
return seq_open ( file , & profile_seq_op ) ;
}
static const struct file_operations uprobe_profile_ops = {
. owner = THIS_MODULE ,
. open = profile_open ,
. read = seq_read ,
. llseek = seq_lseek ,
. release = seq_release ,
} ;
2013-07-03 11:40:28 +04:00
struct uprobe_cpu_buffer {
struct mutex mutex ;
void * buf ;
} ;
static struct uprobe_cpu_buffer __percpu * uprobe_cpu_buffer ;
static int uprobe_buffer_refcnt ;
static int uprobe_buffer_init ( void )
{
int cpu , err_cpu ;
uprobe_cpu_buffer = alloc_percpu ( struct uprobe_cpu_buffer ) ;
if ( uprobe_cpu_buffer = = NULL )
return - ENOMEM ;
for_each_possible_cpu ( cpu ) {
struct page * p = alloc_pages_node ( cpu_to_node ( cpu ) ,
GFP_KERNEL , 0 ) ;
if ( p = = NULL ) {
err_cpu = cpu ;
goto err ;
}
per_cpu_ptr ( uprobe_cpu_buffer , cpu ) - > buf = page_address ( p ) ;
mutex_init ( & per_cpu_ptr ( uprobe_cpu_buffer , cpu ) - > mutex ) ;
}
return 0 ;
err :
for_each_possible_cpu ( cpu ) {
if ( cpu = = err_cpu )
break ;
free_page ( ( unsigned long ) per_cpu_ptr ( uprobe_cpu_buffer , cpu ) - > buf ) ;
}
free_percpu ( uprobe_cpu_buffer ) ;
return - ENOMEM ;
}
static int uprobe_buffer_enable ( void )
{
int ret = 0 ;
BUG_ON ( ! mutex_is_locked ( & event_mutex ) ) ;
if ( uprobe_buffer_refcnt + + = = 0 ) {
ret = uprobe_buffer_init ( ) ;
if ( ret < 0 )
uprobe_buffer_refcnt - - ;
}
return ret ;
}
static void uprobe_buffer_disable ( void )
{
2014-04-17 12:05:19 +04:00
int cpu ;
2013-07-03 11:40:28 +04:00
BUG_ON ( ! mutex_is_locked ( & event_mutex ) ) ;
if ( - - uprobe_buffer_refcnt = = 0 ) {
2014-04-17 12:05:19 +04:00
for_each_possible_cpu ( cpu )
free_page ( ( unsigned long ) per_cpu_ptr ( uprobe_cpu_buffer ,
cpu ) - > buf ) ;
2013-07-03 11:40:28 +04:00
free_percpu ( uprobe_cpu_buffer ) ;
uprobe_cpu_buffer = NULL ;
}
}
static struct uprobe_cpu_buffer * uprobe_buffer_get ( void )
{
struct uprobe_cpu_buffer * ucb ;
int cpu ;
cpu = raw_smp_processor_id ( ) ;
ucb = per_cpu_ptr ( uprobe_cpu_buffer , cpu ) ;
/*
* Use per - cpu buffers for fastest access , but we might migrate
* so the mutex makes sure we have sole access to it .
*/
mutex_lock ( & ucb - > mutex ) ;
return ucb ;
}
static void uprobe_buffer_put ( struct uprobe_cpu_buffer * ucb )
{
mutex_unlock ( & ucb - > mutex ) ;
}
2014-01-17 12:08:36 +04:00
static void __uprobe_trace_func ( struct trace_uprobe * tu ,
2014-01-17 12:08:37 +04:00
unsigned long func , struct pt_regs * regs ,
2014-01-17 12:08:38 +04:00
struct uprobe_cpu_buffer * ucb , int dsize ,
struct ftrace_event_file * ftrace_file )
2012-04-11 14:30:43 +04:00
{
struct uprobe_trace_entry_head * entry ;
struct ring_buffer_event * event ;
struct ring_buffer * buffer ;
2013-03-29 21:26:51 +04:00
void * data ;
2014-01-17 12:08:37 +04:00
int size , esize ;
2013-07-03 10:42:53 +04:00
struct ftrace_event_call * call = & tu - > tp . call ;
2012-04-11 14:30:43 +04:00
2014-01-17 12:08:38 +04:00
WARN_ON ( call ! = ftrace_file - > event_call ) ;
2014-01-17 12:08:37 +04:00
if ( WARN_ON_ONCE ( tu - > tp . size + dsize > PAGE_SIZE ) )
2013-07-03 11:40:28 +04:00
return ;
2014-01-17 12:08:39 +04:00
if ( ftrace_trigger_soft_disabled ( ftrace_file ) )
return ;
2014-01-17 12:08:37 +04:00
esize = SIZEOF_TRACE_ENTRY ( is_ret_probe ( tu ) ) ;
2013-07-03 11:40:28 +04:00
size = esize + tu - > tp . size + dsize ;
2014-01-17 12:08:38 +04:00
event = trace_event_buffer_lock_reserve ( & buffer , ftrace_file ,
call - > event . type , size , 0 , 0 ) ;
2012-04-11 14:30:43 +04:00
if ( ! event )
2014-01-17 12:08:37 +04:00
return ;
2012-04-11 14:30:43 +04:00
entry = ring_buffer_event_data ( event ) ;
2013-03-30 21:46:22 +04:00
if ( is_ret_probe ( tu ) ) {
entry - > vaddr [ 0 ] = func ;
entry - > vaddr [ 1 ] = instruction_pointer ( regs ) ;
data = DATAOF_TRACE_ENTRY ( entry , true ) ;
} else {
entry - > vaddr [ 0 ] = instruction_pointer ( regs ) ;
data = DATAOF_TRACE_ENTRY ( entry , false ) ;
}
2013-07-03 11:40:28 +04:00
memcpy ( data , ucb - > buf , tu - > tp . size + dsize ) ;
2012-04-11 14:30:43 +04:00
2014-01-17 12:08:39 +04:00
event_trigger_unlock_commit ( ftrace_file , buffer , event , entry , 0 , 0 ) ;
2013-03-30 21:02:12 +04:00
}
2013-02-04 20:48:34 +04:00
2013-03-30 21:02:12 +04:00
/* uprobe handler */
2014-01-17 12:08:37 +04:00
static int uprobe_trace_func ( struct trace_uprobe * tu , struct pt_regs * regs ,
struct uprobe_cpu_buffer * ucb , int dsize )
2013-03-30 21:02:12 +04:00
{
2014-01-17 12:08:38 +04:00
struct event_file_link * link ;
if ( is_ret_probe ( tu ) )
return 0 ;
rcu_read_lock ( ) ;
list_for_each_entry_rcu ( link , & tu - > tp . files , list )
__uprobe_trace_func ( tu , 0 , regs , ucb , dsize , link - > file ) ;
rcu_read_unlock ( ) ;
2013-02-04 20:48:34 +04:00
return 0 ;
2012-04-11 14:30:43 +04:00
}
2013-03-30 21:25:23 +04:00
static void uretprobe_trace_func ( struct trace_uprobe * tu , unsigned long func ,
2014-01-17 12:08:37 +04:00
struct pt_regs * regs ,
struct uprobe_cpu_buffer * ucb , int dsize )
2013-03-30 21:25:23 +04:00
{
2014-01-17 12:08:38 +04:00
struct event_file_link * link ;
rcu_read_lock ( ) ;
list_for_each_entry_rcu ( link , & tu - > tp . files , list )
__uprobe_trace_func ( tu , func , regs , ucb , dsize , link - > file ) ;
rcu_read_unlock ( ) ;
2013-03-30 21:25:23 +04:00
}
2012-04-11 14:30:43 +04:00
/* Event entry printers */
static enum print_line_t
print_uprobe_event ( struct trace_iterator * iter , int flags , struct trace_event * event )
{
2013-03-29 21:26:51 +04:00
struct uprobe_trace_entry_head * entry ;
2012-04-11 14:30:43 +04:00
struct trace_seq * s = & iter - > seq ;
struct trace_uprobe * tu ;
u8 * data ;
int i ;
2013-03-29 21:26:51 +04:00
entry = ( struct uprobe_trace_entry_head * ) iter - > ent ;
2013-07-03 10:42:53 +04:00
tu = container_of ( event , struct trace_uprobe , tp . call . event ) ;
2012-04-11 14:30:43 +04:00
2013-03-30 22:48:09 +04:00
if ( is_ret_probe ( tu ) ) {
2014-04-09 01:26:21 +04:00
if ( ! trace_seq_printf ( s , " %s: (0x%lx <- 0x%lx) " ,
ftrace_event_name ( & tu - > tp . call ) ,
2013-03-30 22:48:09 +04:00
entry - > vaddr [ 1 ] , entry - > vaddr [ 0 ] ) )
goto partial ;
data = DATAOF_TRACE_ENTRY ( entry , true ) ;
} else {
2014-04-09 01:26:21 +04:00
if ( ! trace_seq_printf ( s , " %s: (0x%lx) " ,
ftrace_event_name ( & tu - > tp . call ) ,
2013-03-30 22:48:09 +04:00
entry - > vaddr [ 0 ] ) )
goto partial ;
data = DATAOF_TRACE_ENTRY ( entry , false ) ;
}
2012-04-11 14:30:43 +04:00
2013-07-03 10:42:53 +04:00
for ( i = 0 ; i < tu - > tp . nr_args ; i + + ) {
struct probe_arg * parg = & tu - > tp . args [ i ] ;
if ( ! parg - > type - > print ( s , parg - > name , data + parg - > offset , entry ) )
2012-04-11 14:30:43 +04:00
goto partial ;
}
if ( trace_seq_puts ( s , " \n " ) )
return TRACE_TYPE_HANDLED ;
partial :
return TRACE_TYPE_PARTIAL_LINE ;
}
2013-02-04 20:11:58 +04:00
typedef bool ( * filter_func_t ) ( struct uprobe_consumer * self ,
enum uprobe_filter_ctx ctx ,
struct mm_struct * mm ) ;
static int
2014-01-17 12:08:38 +04:00
probe_event_enable ( struct trace_uprobe * tu , struct ftrace_event_file * file ,
filter_func_t filter )
2012-04-11 14:30:43 +04:00
{
2014-01-17 12:08:38 +04:00
bool enabled = trace_probe_is_enabled ( & tu - > tp ) ;
struct event_file_link * link = NULL ;
int ret ;
if ( file ) {
link = kmalloc ( sizeof ( * link ) , GFP_KERNEL ) ;
if ( ! link )
return - ENOMEM ;
link - > file = file ;
list_add_tail_rcu ( & link - > list , & tu - > tp . files ) ;
tu - > tp . flags | = TP_FLAG_TRACE ;
2014-01-17 12:08:40 +04:00
} else
2014-01-17 12:08:38 +04:00
tu - > tp . flags | = TP_FLAG_PROFILE ;
2012-04-11 14:30:43 +04:00
2013-07-03 11:40:28 +04:00
ret = uprobe_buffer_enable ( ) ;
if ( ret < 0 )
return ret ;
2013-02-03 23:58:35 +04:00
WARN_ON ( ! uprobe_filter_is_empty ( & tu - > filter ) ) ;
2014-01-17 12:08:38 +04:00
if ( enabled )
return 0 ;
2013-02-04 20:11:58 +04:00
tu - > consumer . filter = filter ;
2013-01-31 22:47:23 +04:00
ret = uprobe_register ( tu - > inode , tu - > offset , & tu - > consumer ) ;
2014-01-17 12:08:38 +04:00
if ( ret ) {
if ( file ) {
list_del ( & link - > list ) ;
kfree ( link ) ;
tu - > tp . flags & = ~ TP_FLAG_TRACE ;
} else
tu - > tp . flags & = ~ TP_FLAG_PROFILE ;
}
2012-04-11 14:30:43 +04:00
2013-01-27 21:36:24 +04:00
return ret ;
2012-04-11 14:30:43 +04:00
}
2014-01-17 12:08:38 +04:00
static void
probe_event_disable ( struct trace_uprobe * tu , struct ftrace_event_file * file )
2012-04-11 14:30:43 +04:00
{
2013-07-03 10:42:53 +04:00
if ( ! trace_probe_is_enabled ( & tu - > tp ) )
2012-04-11 14:30:43 +04:00
return ;
2014-01-17 12:08:38 +04:00
if ( file ) {
struct event_file_link * link ;
link = find_event_file_link ( & tu - > tp , file ) ;
if ( ! link )
return ;
list_del_rcu ( & link - > list ) ;
/* synchronize with u{,ret}probe_trace_func */
synchronize_sched ( ) ;
kfree ( link ) ;
if ( ! list_empty ( & tu - > tp . files ) )
return ;
}
2013-02-03 23:58:35 +04:00
WARN_ON ( ! uprobe_filter_is_empty ( & tu - > filter ) ) ;
2013-01-31 22:47:23 +04:00
uprobe_unregister ( tu - > inode , tu - > offset , & tu - > consumer ) ;
2014-01-17 12:08:38 +04:00
tu - > tp . flags & = file ? ~ TP_FLAG_TRACE : ~ TP_FLAG_PROFILE ;
2013-07-03 11:40:28 +04:00
uprobe_buffer_disable ( ) ;
2012-04-11 14:30:43 +04:00
}
static int uprobe_event_define_fields ( struct ftrace_event_call * event_call )
{
2013-03-29 21:26:51 +04:00
int ret , i , size ;
2012-04-11 14:30:43 +04:00
struct uprobe_trace_entry_head field ;
2013-03-29 21:26:51 +04:00
struct trace_uprobe * tu = event_call - > data ;
2012-04-11 14:30:43 +04:00
2013-03-30 22:23:15 +04:00
if ( is_ret_probe ( tu ) ) {
DEFINE_FIELD ( unsigned long , vaddr [ 0 ] , FIELD_STRING_FUNC , 0 ) ;
DEFINE_FIELD ( unsigned long , vaddr [ 1 ] , FIELD_STRING_RETIP , 0 ) ;
size = SIZEOF_TRACE_ENTRY ( true ) ;
} else {
DEFINE_FIELD ( unsigned long , vaddr [ 0 ] , FIELD_STRING_IP , 0 ) ;
size = SIZEOF_TRACE_ENTRY ( false ) ;
}
2012-04-11 14:30:43 +04:00
/* Set argument names as fields */
2013-07-03 10:42:53 +04:00
for ( i = 0 ; i < tu - > tp . nr_args ; i + + ) {
struct probe_arg * parg = & tu - > tp . args [ i ] ;
ret = trace_define_field ( event_call , parg - > type - > fmttype ,
parg - > name , size + parg - > offset ,
parg - > type - > size , parg - > type - > is_signed ,
2012-04-11 14:30:43 +04:00
FILTER_OTHER ) ;
if ( ret )
return ret ;
}
return 0 ;
}
# ifdef CONFIG_PERF_EVENTS
2013-02-04 20:11:58 +04:00
static bool
__uprobe_perf_filter ( struct trace_uprobe_filter * filter , struct mm_struct * mm )
{
struct perf_event * event ;
if ( filter - > nr_systemwide )
return true ;
list_for_each_entry ( event , & filter - > perf_events , hw . tp_list ) {
if ( event - > hw . tp_target - > mm = = mm )
return true ;
}
return false ;
}
2013-02-04 22:05:43 +04:00
static inline bool
uprobe_filter_event ( struct trace_uprobe * tu , struct perf_event * event )
{
return __uprobe_perf_filter ( & tu - > filter , event - > hw . tp_target - > mm ) ;
}
2013-02-03 23:58:35 +04:00
static int uprobe_perf_open ( struct trace_uprobe * tu , struct perf_event * event )
{
2013-02-04 22:05:43 +04:00
bool done ;
2013-02-03 23:58:35 +04:00
write_lock ( & tu - > filter . rwlock ) ;
2013-02-04 22:05:43 +04:00
if ( event - > hw . tp_target ) {
/*
* event - > parent ! = NULL means copy_process ( ) , we can avoid
* uprobe_apply ( ) . current - > mm must be probed and we can rely
* on dup_mmap ( ) which preserves the already installed bp ' s .
*
* attr . enable_on_exec means that exec / mmap will install the
* breakpoints we need .
*/
done = tu - > filter . nr_systemwide | |
event - > parent | | event - > attr . enable_on_exec | |
uprobe_filter_event ( tu , event ) ;
2013-02-03 23:58:35 +04:00
list_add ( & event - > hw . tp_list , & tu - > filter . perf_events ) ;
2013-02-04 22:05:43 +04:00
} else {
done = tu - > filter . nr_systemwide ;
2013-02-03 23:58:35 +04:00
tu - > filter . nr_systemwide + + ;
2013-02-04 22:05:43 +04:00
}
2013-02-03 23:58:35 +04:00
write_unlock ( & tu - > filter . rwlock ) ;
2013-02-04 22:05:43 +04:00
if ( ! done )
uprobe_apply ( tu - > inode , tu - > offset , & tu - > consumer , true ) ;
2013-02-04 20:11:58 +04:00
2013-02-03 23:58:35 +04:00
return 0 ;
}
static int uprobe_perf_close ( struct trace_uprobe * tu , struct perf_event * event )
{
2013-02-04 22:05:43 +04:00
bool done ;
2013-02-03 23:58:35 +04:00
write_lock ( & tu - > filter . rwlock ) ;
2013-02-04 22:05:43 +04:00
if ( event - > hw . tp_target ) {
2013-02-03 23:58:35 +04:00
list_del ( & event - > hw . tp_list ) ;
2013-02-04 22:05:43 +04:00
done = tu - > filter . nr_systemwide | |
( event - > hw . tp_target - > flags & PF_EXITING ) | |
uprobe_filter_event ( tu , event ) ;
} else {
2013-02-03 23:58:35 +04:00
tu - > filter . nr_systemwide - - ;
2013-02-04 22:05:43 +04:00
done = tu - > filter . nr_systemwide ;
}
2013-02-03 23:58:35 +04:00
write_unlock ( & tu - > filter . rwlock ) ;
2013-02-04 22:05:43 +04:00
if ( ! done )
uprobe_apply ( tu - > inode , tu - > offset , & tu - > consumer , false ) ;
2013-02-04 20:11:58 +04:00
2013-02-03 23:58:35 +04:00
return 0 ;
}
2013-02-04 20:11:58 +04:00
static bool uprobe_perf_filter ( struct uprobe_consumer * uc ,
enum uprobe_filter_ctx ctx , struct mm_struct * mm )
{
struct trace_uprobe * tu ;
int ret ;
tu = container_of ( uc , struct trace_uprobe , consumer ) ;
read_lock ( & tu - > filter . rwlock ) ;
ret = __uprobe_perf_filter ( & tu - > filter , mm ) ;
read_unlock ( & tu - > filter . rwlock ) ;
return ret ;
}
2014-01-17 12:08:36 +04:00
static void __uprobe_perf_func ( struct trace_uprobe * tu ,
2014-01-17 12:08:37 +04:00
unsigned long func , struct pt_regs * regs ,
struct uprobe_cpu_buffer * ucb , int dsize )
2012-04-11 14:30:43 +04:00
{
2013-07-03 10:42:53 +04:00
struct ftrace_event_call * call = & tu - > tp . call ;
2012-04-11 14:30:43 +04:00
struct uprobe_trace_entry_head * entry ;
struct hlist_head * head ;
2013-03-29 21:26:51 +04:00
void * data ;
2014-01-17 12:08:37 +04:00
int size , esize ;
2013-07-03 11:40:28 +04:00
int rctx ;
esize = SIZEOF_TRACE_ENTRY ( is_ret_probe ( tu ) ) ;
2012-04-11 14:30:43 +04:00
2013-07-03 11:40:28 +04:00
size = esize + tu - > tp . size + dsize ;
size = ALIGN ( size + sizeof ( u32 ) , sizeof ( u64 ) ) - sizeof ( u32 ) ;
if ( WARN_ONCE ( size > PERF_MAX_TRACE_SIZE , " profile buffer not large enough " ) )
return ;
2012-04-11 14:30:43 +04:00
preempt_disable ( ) ;
2013-04-13 17:36:49 +04:00
head = this_cpu_ptr ( call - > perf_events ) ;
if ( hlist_empty ( head ) )
goto out ;
2012-04-11 14:30:43 +04:00
entry = perf_trace_buf_prepare ( size , call - > event . type , regs , & rctx ) ;
if ( ! entry )
goto out ;
2013-03-30 21:46:22 +04:00
if ( is_ret_probe ( tu ) ) {
entry - > vaddr [ 0 ] = func ;
2013-04-10 18:25:49 +04:00
entry - > vaddr [ 1 ] = instruction_pointer ( regs ) ;
2013-03-30 21:46:22 +04:00
data = DATAOF_TRACE_ENTRY ( entry , true ) ;
} else {
2013-04-10 18:25:49 +04:00
entry - > vaddr [ 0 ] = instruction_pointer ( regs ) ;
2013-03-30 21:46:22 +04:00
data = DATAOF_TRACE_ENTRY ( entry , false ) ;
}
2013-07-03 11:40:28 +04:00
memcpy ( data , ucb - > buf , tu - > tp . size + dsize ) ;
if ( size - esize > tu - > tp . size + dsize ) {
int len = tu - > tp . size + dsize ;
2013-07-03 10:42:53 +04:00
2013-07-03 11:40:28 +04:00
memset ( data + len , 0 , size - esize - len ) ;
2013-07-03 10:42:53 +04:00
}
2012-04-11 14:30:43 +04:00
2013-04-10 18:25:49 +04:00
perf_trace_buf_submit ( entry , size , rctx , 0 , 1 , regs , head , NULL ) ;
2012-04-11 14:30:43 +04:00
out :
preempt_enable ( ) ;
2013-03-30 21:02:12 +04:00
}
/* uprobe profile handler */
2014-01-17 12:08:37 +04:00
static int uprobe_perf_func ( struct trace_uprobe * tu , struct pt_regs * regs ,
struct uprobe_cpu_buffer * ucb , int dsize )
2013-03-30 21:02:12 +04:00
{
if ( ! uprobe_perf_filter ( & tu - > consumer , 0 , current - > mm ) )
return UPROBE_HANDLER_REMOVE ;
2013-03-30 21:46:22 +04:00
if ( ! is_ret_probe ( tu ) )
2014-01-17 12:08:37 +04:00
__uprobe_perf_func ( tu , 0 , regs , ucb , dsize ) ;
2013-02-04 20:48:34 +04:00
return 0 ;
2012-04-11 14:30:43 +04:00
}
2013-03-30 21:25:23 +04:00
static void uretprobe_perf_func ( struct trace_uprobe * tu , unsigned long func ,
2014-01-17 12:08:37 +04:00
struct pt_regs * regs ,
struct uprobe_cpu_buffer * ucb , int dsize )
2013-03-30 21:25:23 +04:00
{
2014-01-17 12:08:37 +04:00
__uprobe_perf_func ( tu , func , regs , ucb , dsize ) ;
2013-03-30 21:25:23 +04:00
}
2012-04-11 14:30:43 +04:00
# endif /* CONFIG_PERF_EVENTS */
2014-01-17 12:08:38 +04:00
static int
trace_uprobe_register ( struct ftrace_event_call * event , enum trace_reg type ,
void * data )
2012-04-11 14:30:43 +04:00
{
2013-03-29 21:26:51 +04:00
struct trace_uprobe * tu = event - > data ;
2014-01-17 12:08:38 +04:00
struct ftrace_event_file * file = data ;
2012-04-11 14:30:43 +04:00
switch ( type ) {
case TRACE_REG_REGISTER :
2014-01-17 12:08:38 +04:00
return probe_event_enable ( tu , file , NULL ) ;
2012-04-11 14:30:43 +04:00
case TRACE_REG_UNREGISTER :
2014-01-17 12:08:38 +04:00
probe_event_disable ( tu , file ) ;
2012-04-11 14:30:43 +04:00
return 0 ;
# ifdef CONFIG_PERF_EVENTS
case TRACE_REG_PERF_REGISTER :
2014-01-17 12:08:38 +04:00
return probe_event_enable ( tu , NULL , uprobe_perf_filter ) ;
2012-04-11 14:30:43 +04:00
case TRACE_REG_PERF_UNREGISTER :
2014-01-17 12:08:38 +04:00
probe_event_disable ( tu , NULL ) ;
2012-04-11 14:30:43 +04:00
return 0 ;
2013-02-03 23:58:35 +04:00
case TRACE_REG_PERF_OPEN :
return uprobe_perf_open ( tu , data ) ;
case TRACE_REG_PERF_CLOSE :
return uprobe_perf_close ( tu , data ) ;
2012-04-11 14:30:43 +04:00
# endif
default :
return 0 ;
}
return 0 ;
}
static int uprobe_dispatcher ( struct uprobe_consumer * con , struct pt_regs * regs )
{
struct trace_uprobe * tu ;
2013-11-25 08:42:47 +04:00
struct uprobe_dispatch_data udd ;
2014-01-17 12:08:37 +04:00
struct uprobe_cpu_buffer * ucb ;
int dsize , esize ;
2013-02-04 20:48:34 +04:00
int ret = 0 ;
2012-04-11 14:30:43 +04:00
2014-01-17 12:08:37 +04:00
2013-01-31 22:47:23 +04:00
tu = container_of ( con , struct trace_uprobe , consumer ) ;
2013-01-31 22:55:27 +04:00
tu - > nhit + + ;
2012-04-11 14:30:43 +04:00
2013-11-25 08:42:47 +04:00
udd . tu = tu ;
udd . bp_addr = instruction_pointer ( regs ) ;
current - > utask - > vaddr = ( unsigned long ) & udd ;
2014-01-17 12:08:37 +04:00
# ifdef CONFIG_PERF_EVENTS
if ( ( tu - > tp . flags & TP_FLAG_TRACE ) = = 0 & &
! uprobe_perf_filter ( & tu - > consumer , 0 , current - > mm ) )
return UPROBE_HANDLER_REMOVE ;
# endif
if ( WARN_ON_ONCE ( ! uprobe_cpu_buffer ) )
return 0 ;
dsize = __get_data_size ( & tu - > tp , regs ) ;
esize = SIZEOF_TRACE_ENTRY ( is_ret_probe ( tu ) ) ;
ucb = uprobe_buffer_get ( ) ;
store_trace_args ( esize , & tu - > tp , regs , ucb - > buf , dsize ) ;
2013-07-03 10:42:53 +04:00
if ( tu - > tp . flags & TP_FLAG_TRACE )
2014-01-17 12:08:37 +04:00
ret | = uprobe_trace_func ( tu , regs , ucb , dsize ) ;
2012-04-11 14:30:43 +04:00
# ifdef CONFIG_PERF_EVENTS
2013-07-03 10:42:53 +04:00
if ( tu - > tp . flags & TP_FLAG_PROFILE )
2014-01-17 12:08:37 +04:00
ret | = uprobe_perf_func ( tu , regs , ucb , dsize ) ;
2012-04-11 14:30:43 +04:00
# endif
2014-01-17 12:08:37 +04:00
uprobe_buffer_put ( ucb ) ;
2013-02-04 20:48:34 +04:00
return ret ;
2012-04-11 14:30:43 +04:00
}
2013-03-30 21:25:23 +04:00
static int uretprobe_dispatcher ( struct uprobe_consumer * con ,
unsigned long func , struct pt_regs * regs )
{
struct trace_uprobe * tu ;
2013-11-25 08:42:47 +04:00
struct uprobe_dispatch_data udd ;
2014-01-17 12:08:37 +04:00
struct uprobe_cpu_buffer * ucb ;
int dsize , esize ;
2013-03-30 21:25:23 +04:00
tu = container_of ( con , struct trace_uprobe , consumer ) ;
2013-11-25 08:42:47 +04:00
udd . tu = tu ;
udd . bp_addr = func ;
current - > utask - > vaddr = ( unsigned long ) & udd ;
2014-01-17 12:08:37 +04:00
if ( WARN_ON_ONCE ( ! uprobe_cpu_buffer ) )
return 0 ;
dsize = __get_data_size ( & tu - > tp , regs ) ;
esize = SIZEOF_TRACE_ENTRY ( is_ret_probe ( tu ) ) ;
ucb = uprobe_buffer_get ( ) ;
store_trace_args ( esize , & tu - > tp , regs , ucb - > buf , dsize ) ;
2013-07-03 10:42:53 +04:00
if ( tu - > tp . flags & TP_FLAG_TRACE )
2014-01-17 12:08:37 +04:00
uretprobe_trace_func ( tu , func , regs , ucb , dsize ) ;
2013-03-30 21:25:23 +04:00
# ifdef CONFIG_PERF_EVENTS
2013-07-03 10:42:53 +04:00
if ( tu - > tp . flags & TP_FLAG_PROFILE )
2014-01-17 12:08:37 +04:00
uretprobe_perf_func ( tu , func , regs , ucb , dsize ) ;
2013-03-30 21:25:23 +04:00
# endif
2014-01-17 12:08:37 +04:00
uprobe_buffer_put ( ucb ) ;
2013-03-30 21:25:23 +04:00
return 0 ;
}
2012-04-11 14:30:43 +04:00
static struct trace_event_functions uprobe_funcs = {
. trace = print_uprobe_event
} ;
static int register_uprobe_event ( struct trace_uprobe * tu )
{
2013-07-03 10:42:53 +04:00
struct ftrace_event_call * call = & tu - > tp . call ;
2012-04-11 14:30:43 +04:00
int ret ;
/* Initialize ftrace_event_call */
INIT_LIST_HEAD ( & call - > class - > fields ) ;
call - > event . funcs = & uprobe_funcs ;
call - > class - > define_fields = uprobe_event_define_fields ;
2013-07-03 11:09:02 +04:00
if ( set_print_fmt ( & tu - > tp , is_ret_probe ( tu ) ) < 0 )
2012-04-11 14:30:43 +04:00
return - ENOMEM ;
ret = register_ftrace_event ( & call - > event ) ;
if ( ! ret ) {
kfree ( call - > print_fmt ) ;
return - ENODEV ;
}
call - > flags = 0 ;
call - > class - > reg = trace_uprobe_register ;
call - > data = tu ;
ret = trace_add_event_call ( call ) ;
if ( ret ) {
2014-04-09 01:26:21 +04:00
pr_info ( " Failed to register uprobe event: %s \n " ,
ftrace_event_name ( call ) ) ;
2012-04-11 14:30:43 +04:00
kfree ( call - > print_fmt ) ;
unregister_ftrace_event ( & call - > event ) ;
}
return ret ;
}
2013-07-04 07:33:51 +04:00
static int unregister_uprobe_event ( struct trace_uprobe * tu )
2012-04-11 14:30:43 +04:00
{
2013-07-04 07:33:51 +04:00
int ret ;
2012-04-11 14:30:43 +04:00
/* tu->event is unregistered in trace_remove_event_call() */
2013-07-03 10:42:53 +04:00
ret = trace_remove_event_call ( & tu - > tp . call ) ;
2013-07-04 07:33:51 +04:00
if ( ret )
return ret ;
2013-07-03 10:42:53 +04:00
kfree ( tu - > tp . call . print_fmt ) ;
tu - > tp . call . print_fmt = NULL ;
2013-07-04 07:33:51 +04:00
return 0 ;
2012-04-11 14:30:43 +04:00
}
/* Make a trace interface for controling probe points */
static __init int init_uprobe_trace ( void )
{
struct dentry * d_tracer ;
d_tracer = tracing_init_dentry ( ) ;
if ( ! d_tracer )
return 0 ;
trace_create_file ( " uprobe_events " , 0644 , d_tracer ,
NULL , & uprobe_events_ops ) ;
/* Profile interface */
trace_create_file ( " uprobe_profile " , 0444 , d_tracer ,
NULL , & uprobe_profile_ops ) ;
return 0 ;
}
fs_initcall ( init_uprobe_trace ) ;