Merge tag 'platform-drivers-x86-v6.2-3' of git://git.kernel.org/pub/scm/linux/kernel...
[linux-block.git] / Documentation / trace / events.rst
CommitLineData
73d98127
CD
1=============
2Event Tracing
3=============
abd41443 4
73d98127
CD
5:Author: Theodore Ts'o
6:Updated: Li Zefan and Tom Zanussi
abd41443 7
143c145e
LZ
81. Introduction
9===============
abd41443 10
ec15872d 11Tracepoints (see Documentation/trace/tracepoints.rst) can be used
abd41443
TT
12without creating custom kernel modules to register probe functions
13using the event tracing infrastructure.
14
15Not all tracepoints can be traced using the event tracing system;
16the kernel developer must provide code snippets which define how the
17tracing information is saved into the tracing buffer, and how the
143c145e 18tracing information should be printed.
abd41443 19
143c145e
LZ
202. Using Event Tracing
21======================
22
232.1 Via the 'set_event' interface
24---------------------------------
abd41443
TT
25
26The events which are available for tracing can be found in the file
52ad51e7 27/sys/kernel/debug/tracing/available_events.
abd41443
TT
28
29To enable a particular event, such as 'sched_wakeup', simply echo it
73d98127 30to /sys/kernel/debug/tracing/set_event. For example::
abd41443 31
52ad51e7 32 # echo sched_wakeup >> /sys/kernel/debug/tracing/set_event
abd41443 33
73d98127 34.. Note:: '>>' is necessary, otherwise it will firstly disable all the events.
abd41443
TT
35
36To disable an event, echo the event name to the set_event file prefixed
73d98127 37with an exclamation point::
abd41443 38
52ad51e7 39 # echo '!sched_wakeup' >> /sys/kernel/debug/tracing/set_event
143c145e 40
73d98127 41To disable all events, echo an empty line to the set_event file::
143c145e 42
52ad51e7 43 # echo > /sys/kernel/debug/tracing/set_event
abd41443 44
6234c7bd 45To enable all events, echo ``*:*`` or ``*:`` to the set_event file::
abd41443 46
52ad51e7 47 # echo *:* > /sys/kernel/debug/tracing/set_event
abd41443
TT
48
49The events are organized into subsystems, such as ext4, irq, sched,
50etc., and a full event name looks like this: <subsystem>:<event>. The
51subsystem name is optional, but it is displayed in the available_events
52file. All of the events in a subsystem can be specified via the syntax
6234c7bd 53``<subsystem>:*``; for example, to enable all irq events, you can use the
73d98127 54command::
abd41443 55
52ad51e7 56 # echo 'irq:*' > /sys/kernel/debug/tracing/set_event
143c145e
LZ
57
582.2 Via the 'enable' toggle
59---------------------------
60
52ad51e7 61The events available are also listed in /sys/kernel/debug/tracing/events/ hierarchy
143c145e
LZ
62of directories.
63
73d98127 64To enable event 'sched_wakeup'::
143c145e 65
52ad51e7 66 # echo 1 > /sys/kernel/debug/tracing/events/sched/sched_wakeup/enable
143c145e 67
73d98127 68To disable it::
143c145e 69
52ad51e7 70 # echo 0 > /sys/kernel/debug/tracing/events/sched/sched_wakeup/enable
143c145e 71
73d98127 72To enable all events in sched subsystem::
143c145e 73
52ad51e7 74 # echo 1 > /sys/kernel/debug/tracing/events/sched/enable
143c145e 75
73d98127 76To enable all events::
143c145e 77
52ad51e7 78 # echo 1 > /sys/kernel/debug/tracing/events/enable
143c145e
LZ
79
80When reading one of these enable files, there are four results:
81
73d98127
CD
82 - 0 - all events this file affects are disabled
83 - 1 - all events this file affects are enabled
84 - X - there is a mixture of events enabled and disabled
85 - ? - this file does not affect any event
143c145e 86
020e5f85
LZ
872.3 Boot option
88---------------
89
73d98127 90In order to facilitate early boot debugging, use boot option::
020e5f85
LZ
91
92 trace_event=[event-list]
93
03d646e6
LZ
94event-list is a comma separated list of events. See section 2.1 for event
95format.
020e5f85 96
143c145e
LZ
973. Defining an event-enabled tracepoint
98=======================================
99
100See The example provided in samples/trace_events
101
95b69608
TZ
1024. Event formats
103================
104
105Each trace event has a 'format' file associated with it that contains
106a description of each field in a logged event. This information can
107be used to parse the binary trace stream, and is also the place to
108find the field names that can be used in event filters (see section 5).
109
110It also displays the format string that will be used to print the
111event in text mode, along with the event name and ID used for
112profiling.
113
6234c7bd
JC
114Every event has a set of ``common`` fields associated with it; these are
115the fields prefixed with ``common_``. The other fields vary between
95b69608
TZ
116events and correspond to the fields defined in the TRACE_EVENT
117definition for that event.
118
73d98127 119Each field in the format has the form::
95b69608
TZ
120
121 field:field-type field-name; offset:N; size:N;
122
123where offset is the offset of the field in the trace record and size
124is the size of the data item, in bytes.
125
126For example, here's the information displayed for the 'sched_wakeup'
73d98127 127event::
95b69608 128
73d98127 129 # cat /sys/kernel/debug/tracing/events/sched/sched_wakeup/format
95b69608 130
73d98127
CD
131 name: sched_wakeup
132 ID: 60
133 format:
134 field:unsigned short common_type; offset:0; size:2;
135 field:unsigned char common_flags; offset:2; size:1;
136 field:unsigned char common_preempt_count; offset:3; size:1;
137 field:int common_pid; offset:4; size:4;
138 field:int common_tgid; offset:8; size:4;
95b69608 139
73d98127
CD
140 field:char comm[TASK_COMM_LEN]; offset:12; size:16;
141 field:pid_t pid; offset:28; size:4;
142 field:int prio; offset:32; size:4;
143 field:int success; offset:36; size:4;
144 field:int cpu; offset:40; size:4;
95b69608 145
73d98127
CD
146 print fmt: "task %s:%d [%d] success=%d [%03d]", REC->comm, REC->pid,
147 REC->prio, REC->success, REC->cpu
95b69608
TZ
148
149This event contains 10 fields, the first 5 common and the remaining 5
150event-specific. All the fields for this event are numeric, except for
151'comm' which is a string, a distinction important for event filtering.
152
1535. Event filtering
154==================
155
156Trace events can be filtered in the kernel by associating boolean
157'filter expressions' with them. As soon as an event is logged into
158the trace buffer, its fields are checked against the filter expression
159associated with that event type. An event with field values that
160'match' the filter will appear in the trace output, and an event whose
161values don't match will be discarded. An event with no filter
162associated with it matches everything, and is the default when no
163filter has been set for an event.
164
1655.1 Expression syntax
166---------------------
167
168A filter expression consists of one or more 'predicates' that can be
169combined using the logical operators '&&' and '||'. A predicate is
170simply a clause that compares the value of a field contained within a
171logged event with a constant value and returns either 0 or 1 depending
73d98127 172on whether the field value matched (1) or didn't match (0)::
95b69608
TZ
173
174 field-name relational-operator value
175
176Parentheses can be used to provide arbitrary logical groupings and
177double-quotes can be used to prevent the shell from interpreting
178operators as shell metacharacters.
179
180The field-names available for use in filters can be found in the
181'format' files for trace events (see section 4).
182
183The relational-operators depend on the type of the field being tested:
184
185The operators available for numeric fields are:
186
1a891cf1 187==, !=, <, <=, >, >=, &
95b69608
TZ
188
189And for string fields they are:
190
c3e13c7c 191==, !=, ~
95b69608 192
6234c7bd 193The glob (~) accepts a wild card character (\*,?) and character classes
73d98127 194([). For example::
c3e13c7c
SRRH
195
196 prev_comm ~ "*sh"
197 prev_comm ~ "sh*"
198 prev_comm ~ "*sh*"
60f1d5e3 199 prev_comm ~ "ba*sh"
95b69608 200
f37c3bbc
SR
201If the field is a pointer that points into user space (for example
202"filename" from sys_enter_openat), then you have to append ".ustring" to the
203field name::
204
205 filename.ustring ~ "password"
206
207As the kernel will have to know how to retrieve the memory that the pointer
208is at from user space.
209
95b69608
TZ
2105.2 Setting filters
211-------------------
212
213A filter for an individual event is set by writing a filter expression
214to the 'filter' file for the given event.
215
73d98127 216For example::
95b69608 217
73d98127
CD
218 # cd /sys/kernel/debug/tracing/events/sched/sched_wakeup
219 # echo "common_preempt_count > 4" > filter
95b69608 220
73d98127 221A slightly more involved example::
95b69608 222
73d98127
CD
223 # cd /sys/kernel/debug/tracing/events/signal/signal_generate
224 # echo "((sig >= 10 && sig < 15) || sig == 17) && comm != bash" > filter
95b69608
TZ
225
226If there is an error in the expression, you'll get an 'Invalid
227argument' error when setting it, and the erroneous string along with
73d98127 228an error message can be seen by looking at the filter e.g.::
95b69608 229
73d98127
CD
230 # cd /sys/kernel/debug/tracing/events/signal/signal_generate
231 # echo "((sig >= 10 && sig < 15) || dsig == 17) && comm != bash" > filter
232 -bash: echo: write error: Invalid argument
233 # cat filter
234 ((sig >= 10 && sig < 15) || dsig == 17) && comm != bash
235 ^
236 parse_error: Field not found
95b69608
TZ
237
238Currently the caret ('^') for an error always appears at the beginning of
239the filter string; the error message should still be useful though
240even without more accurate position info.
241
77360f9b
SR
2425.2.1 Filter limitations
243------------------------
244
245If a filter is placed on a string pointer ``(char *)`` that does not point
246to a string on the ring buffer, but instead points to kernel or user space
247memory, then, for safety reasons, at most 1024 bytes of the content is
248copied onto a temporary buffer to do the compare. If the copy of the memory
249faults (the pointer points to memory that should not be accessed), then the
250string compare will be treated as not matching.
251
95b69608
TZ
2525.3 Clearing filters
253--------------------
254
255To clear the filter for an event, write a '0' to the event's filter
256file.
257
258To clear the filters for all events in a subsystem, write a '0' to the
259subsystem's filter file.
260
2615.3 Subsystem filters
262---------------------
263
264For convenience, filters for every event in a subsystem can be set or
265cleared as a group by writing a filter expression into the filter file
88393161 266at the root of the subsystem. Note however, that if a filter for any
95b69608
TZ
267event within the subsystem lacks a field specified in the subsystem
268filter, or if the filter can't be applied for any other reason, the
269filter for that event will retain its previous setting. This can
270result in an unintended mixture of filters which could lead to
271confusing (to the user who might think different filters are in
272effect) trace output. Only filters that reference just the common
273fields can be guaranteed to propagate successfully to all events.
274
275Here are a few subsystem filter examples that also illustrate the
276above points:
277
73d98127 278Clear the filters on all events in the sched subsystem::
95b69608 279
73d98127
CD
280 # cd /sys/kernel/debug/tracing/events/sched
281 # echo 0 > filter
282 # cat sched_switch/filter
283 none
284 # cat sched_wakeup/filter
285 none
95b69608
TZ
286
287Set a filter using only common fields for all events in the sched
73d98127 288subsystem (all events end up with the same filter)::
95b69608 289
73d98127
CD
290 # cd /sys/kernel/debug/tracing/events/sched
291 # echo common_pid == 0 > filter
292 # cat sched_switch/filter
293 common_pid == 0
294 # cat sched_wakeup/filter
295 common_pid == 0
95b69608
TZ
296
297Attempt to set a filter using a non-common field for all events in the
88393161 298sched subsystem (all events but those that have a prev_pid field retain
73d98127 299their old filters)::
95b69608 300
73d98127
CD
301 # cd /sys/kernel/debug/tracing/events/sched
302 # echo prev_pid == 0 > filter
303 # cat sched_switch/filter
304 prev_pid == 0
305 # cat sched_wakeup/filter
306 common_pid == 0
ac38fb85 307
627645fd
SRRH
3085.4 PID filtering
309-----------------
310
311The set_event_pid file in the same directory as the top events directory
312exists, will filter all events from tracing any task that does not have the
313PID listed in the set_event_pid file.
73d98127 314::
627645fd 315
73d98127
CD
316 # cd /sys/kernel/debug/tracing
317 # echo $$ > set_event_pid
318 # echo 1 > events/enable
627645fd
SRRH
319
320Will only trace events for the current task.
321
322To add more PIDs without losing the PIDs already included, use '>>'.
73d98127 323::
627645fd 324
73d98127 325 # echo 123 244 1 >> set_event_pid
627645fd
SRRH
326
327
ac38fb85
TZ
3286. Event triggers
329=================
330
331Trace events can be made to conditionally invoke trigger 'commands'
332which can take various forms and are described in detail below;
333examples would be enabling or disabling other trace events or invoking
334a stack trace whenever the trace event is hit. Whenever a trace event
335with attached triggers is invoked, the set of trigger commands
336associated with that event is invoked. Any given trigger can
337additionally have an event filter of the same form as described in
338section 5 (Event filtering) associated with it - the command will only
339be invoked if the event being invoked passes the associated filter.
340If no filter is associated with the trigger, it always passes.
341
342Triggers are added to and removed from a particular event by writing
343trigger expressions to the 'trigger' file for the given event.
344
345A given event can have any number of triggers associated with it,
346subject to any restrictions that individual commands may have in that
347regard.
348
349Event triggers are implemented on top of "soft" mode, which means that
350whenever a trace event has one or more triggers associated with it,
351the event is activated even if it isn't actually enabled, but is
352disabled in a "soft" mode. That is, the tracepoint will be called,
353but just will not be traced, unless of course it's actually enabled.
354This scheme allows triggers to be invoked even for events that aren't
355enabled, and also allows the current event filter implementation to be
356used for conditionally invoking triggers.
357
358The syntax for event triggers is roughly based on the syntax for
359set_ftrace_filter 'ftrace filter commands' (see the 'Filter commands'
d3439f9d 360section of Documentation/trace/ftrace.rst), but there are major
ac38fb85
TZ
361differences and the implementation isn't currently tied to it in any
362way, so beware about making generalizations between the two.
363
8206de7d
MCC
364.. Note::
365 Writing into trace_marker (See Documentation/trace/ftrace.rst)
d3439f9d
SRV
366 can also enable triggers that are written into
367 /sys/kernel/tracing/events/ftrace/print/trigger
368
ac38fb85
TZ
3696.1 Expression syntax
370---------------------
371
73d98127 372Triggers are added by echoing the command to the 'trigger' file::
ac38fb85
TZ
373
374 # echo 'command[:count] [if filter]' > trigger
375
376Triggers are removed by echoing the same command but starting with '!'
73d98127 377to the 'trigger' file::
ac38fb85
TZ
378
379 # echo '!command[:count] [if filter]' > trigger
380
381The [if filter] part isn't used in matching commands when removing, so
382leaving that off in a '!' command will accomplish the same thing as
383having it in.
384
385The filter syntax is the same as that described in the 'Event
386filtering' section above.
387
388For ease of use, writing to the trigger file using '>' currently just
389adds or removes a single trigger and there's no explicit '>>' support
390('>' actually behaves like '>>') or truncation support to remove all
391triggers (you have to use '!' for each one added.)
392
3936.2 Supported trigger commands
394------------------------------
395
396The following commands are supported:
397
398- enable_event/disable_event
399
400 These commands can enable or disable another trace event whenever
401 the triggering event is hit. When these commands are registered,
402 the other trace event is activated, but disabled in a "soft" mode.
403 That is, the tracepoint will be called, but just will not be traced.
404 The event tracepoint stays in this mode as long as there's a trigger
405 in effect that can trigger it.
406
407 For example, the following trigger causes kmalloc events to be
408 traced when a read system call is entered, and the :1 at the end
73d98127 409 specifies that this enablement happens only once::
ac38fb85 410
73d98127
CD
411 # echo 'enable_event:kmem:kmalloc:1' > \
412 /sys/kernel/debug/tracing/events/syscalls/sys_enter_read/trigger
ac38fb85
TZ
413
414 The following trigger causes kmalloc events to stop being traced
415 when a read system call exits. This disablement happens on every
73d98127 416 read system call exit::
ac38fb85 417
73d98127
CD
418 # echo 'disable_event:kmem:kmalloc' > \
419 /sys/kernel/debug/tracing/events/syscalls/sys_exit_read/trigger
ac38fb85 420
73d98127 421 The format is::
ac38fb85
TZ
422
423 enable_event:<system>:<event>[:count]
424 disable_event:<system>:<event>[:count]
425
73d98127 426 To remove the above commands::
ac38fb85 427
73d98127
CD
428 # echo '!enable_event:kmem:kmalloc:1' > \
429 /sys/kernel/debug/tracing/events/syscalls/sys_enter_read/trigger
ac38fb85 430
73d98127
CD
431 # echo '!disable_event:kmem:kmalloc' > \
432 /sys/kernel/debug/tracing/events/syscalls/sys_exit_read/trigger
ac38fb85
TZ
433
434 Note that there can be any number of enable/disable_event triggers
435 per triggering event, but there can only be one trigger per
436 triggered event. e.g. sys_enter_read can have triggers enabling both
437 kmem:kmalloc and sched:sched_switch, but can't have two kmem:kmalloc
438 versions such as kmem:kmalloc and kmem:kmalloc:1 or 'kmem:kmalloc if
439 bytes_req == 256' and 'kmem:kmalloc if bytes_alloc == 256' (they
440 could be combined into a single filter on kmem:kmalloc though).
441
442- stacktrace
443
444 This command dumps a stacktrace in the trace buffer whenever the
445 triggering event occurs.
446
447 For example, the following trigger dumps a stacktrace every time the
73d98127 448 kmalloc tracepoint is hit::
ac38fb85 449
73d98127
CD
450 # echo 'stacktrace' > \
451 /sys/kernel/debug/tracing/events/kmem/kmalloc/trigger
ac38fb85
TZ
452
453 The following trigger dumps a stacktrace the first 5 times a kmalloc
73d98127 454 request happens with a size >= 64K::
ac38fb85 455
73d98127
CD
456 # echo 'stacktrace:5 if bytes_req >= 65536' > \
457 /sys/kernel/debug/tracing/events/kmem/kmalloc/trigger
ac38fb85 458
73d98127 459 The format is::
ac38fb85
TZ
460
461 stacktrace[:count]
462
73d98127 463 To remove the above commands::
ac38fb85 464
73d98127
CD
465 # echo '!stacktrace' > \
466 /sys/kernel/debug/tracing/events/kmem/kmalloc/trigger
ac38fb85 467
73d98127
CD
468 # echo '!stacktrace:5 if bytes_req >= 65536' > \
469 /sys/kernel/debug/tracing/events/kmem/kmalloc/trigger
ac38fb85
TZ
470
471 The latter can also be removed more simply by the following (without
73d98127 472 the filter)::
ac38fb85 473
73d98127
CD
474 # echo '!stacktrace:5' > \
475 /sys/kernel/debug/tracing/events/kmem/kmalloc/trigger
ac38fb85
TZ
476
477 Note that there can be only one stacktrace trigger per triggering
478 event.
479
480- snapshot
481
482 This command causes a snapshot to be triggered whenever the
483 triggering event occurs.
484
485 The following command creates a snapshot every time a block request
486 queue is unplugged with a depth > 1. If you were tracing a set of
487 events or functions at the time, the snapshot trace buffer would
73d98127 488 capture those events when the trigger event occurred::
ac38fb85 489
73d98127
CD
490 # echo 'snapshot if nr_rq > 1' > \
491 /sys/kernel/debug/tracing/events/block/block_unplug/trigger
ac38fb85 492
73d98127 493 To only snapshot once::
ac38fb85 494
73d98127
CD
495 # echo 'snapshot:1 if nr_rq > 1' > \
496 /sys/kernel/debug/tracing/events/block/block_unplug/trigger
ac38fb85 497
73d98127 498 To remove the above commands::
ac38fb85 499
73d98127
CD
500 # echo '!snapshot if nr_rq > 1' > \
501 /sys/kernel/debug/tracing/events/block/block_unplug/trigger
ac38fb85 502
73d98127
CD
503 # echo '!snapshot:1 if nr_rq > 1' > \
504 /sys/kernel/debug/tracing/events/block/block_unplug/trigger
ac38fb85
TZ
505
506 Note that there can be only one snapshot trigger per triggering
507 event.
508
509- traceon/traceoff
510
511 These commands turn tracing on and off when the specified events are
512 hit. The parameter determines how many times the tracing system is
513 turned on and off. If unspecified, there is no limit.
514
515 The following command turns tracing off the first time a block
516 request queue is unplugged with a depth > 1. If you were tracing a
517 set of events or functions at the time, you could then examine the
518 trace buffer to see the sequence of events that led up to the
73d98127 519 trigger event::
ac38fb85 520
73d98127
CD
521 # echo 'traceoff:1 if nr_rq > 1' > \
522 /sys/kernel/debug/tracing/events/block/block_unplug/trigger
ac38fb85 523
73d98127 524 To always disable tracing when nr_rq > 1::
ac38fb85 525
73d98127
CD
526 # echo 'traceoff if nr_rq > 1' > \
527 /sys/kernel/debug/tracing/events/block/block_unplug/trigger
ac38fb85 528
73d98127 529 To remove the above commands::
ac38fb85 530
73d98127
CD
531 # echo '!traceoff:1 if nr_rq > 1' > \
532 /sys/kernel/debug/tracing/events/block/block_unplug/trigger
ac38fb85 533
73d98127
CD
534 # echo '!traceoff if nr_rq > 1' > \
535 /sys/kernel/debug/tracing/events/block/block_unplug/trigger
ac38fb85
TZ
536
537 Note that there can be only one traceon or traceoff trigger per
538 triggering event.
0fc3813c
TZ
539
540- hist
541
542 This command aggregates event hits into a hash table keyed on one or
543 more trace event format fields (or stacktrace) and a set of running
544 totals derived from one or more trace event format fields and/or
545 event counts (hitcount).
546
ea272257 547 See Documentation/trace/histogram.rst for details and examples.
34ed6357 548
b8170fad
TZ
5497. In-kernel trace event API
550============================
34ed6357
TZ
551
552In most cases, the command-line interface to trace events is more than
553sufficient. Sometimes, however, applications might find the need for
554more complex relationships than can be expressed through a simple
555series of linked command-line expressions, or putting together sets of
556commands may be simply too cumbersome. An example might be an
557application that needs to 'listen' to the trace stream in order to
558maintain an in-kernel state machine detecting, for instance, when an
559illegal kernel state occurs in the scheduler.
560
561The trace event subsystem provides an in-kernel API allowing modules
562or other kernel code to generate user-defined 'synthetic' events at
563will, which can be used to either augment the existing trace stream
564and/or signal that a particular important state has occurred.
565
566A similar in-kernel API is also available for creating kprobe and
567kretprobe events.
568
569Both the synthetic event and k/ret/probe event APIs are built on top
570of a lower-level "dynevent_cmd" event command API, which is also
571available for more specialized applications, or as the basis of other
572higher-level trace event APIs.
573
574The API provided for these purposes is describe below and allows the
575following:
576
577 - dynamically creating synthetic event definitions
578 - dynamically creating kprobe and kretprobe event definitions
579 - tracing synthetic events from in-kernel code
580 - the low-level "dynevent_cmd" API
581
b8170fad
TZ
5827.1 Dyamically creating synthetic event definitions
583---------------------------------------------------
34ed6357
TZ
584
585There are a couple ways to create a new synthetic event from a kernel
586module or other kernel code.
587
588The first creates the event in one step, using synth_event_create().
589In this method, the name of the event to create and an array defining
590the fields is supplied to synth_event_create(). If successful, a
591synthetic event with that name and fields will exist following that
8206de7d 592call. For example, to create a new "schedtest" synthetic event::
34ed6357
TZ
593
594 ret = synth_event_create("schedtest", sched_fields,
595 ARRAY_SIZE(sched_fields), THIS_MODULE);
596
597The sched_fields param in this example points to an array of struct
598synth_field_desc, each of which describes an event field by type and
8206de7d 599name::
34ed6357
TZ
600
601 static struct synth_field_desc sched_fields[] = {
602 { .type = "pid_t", .name = "next_pid_field" },
603 { .type = "char[16]", .name = "next_comm_field" },
604 { .type = "u64", .name = "ts_ns" },
605 { .type = "u64", .name = "ts_ms" },
606 { .type = "unsigned int", .name = "cpu" },
607 { .type = "char[64]", .name = "my_string_field" },
608 { .type = "int", .name = "my_int_field" },
609 };
610
bd82631d
TZ
611See synth_field_size() for available types.
612
613If field_name contains [n], the field is considered to be a static array.
614
615If field_names contains[] (no subscript), the field is considered to
616be a dynamic array, which will only take as much space in the event as
617is required to hold the array.
618
619Because space for an event is reserved before assigning field values
620to the event, using dynamic arrays implies that the piecewise
621in-kernel API described below can't be used with dynamic arrays. The
622other non-piecewise in-kernel APIs can, however, be used with dynamic
623arrays.
34ed6357
TZ
624
625If the event is created from within a module, a pointer to the module
626must be passed to synth_event_create(). This will ensure that the
627trace buffer won't contain unreadable events when the module is
628removed.
629
630At this point, the event object is ready to be used for generating new
631events.
632
633In the second method, the event is created in several steps. This
634allows events to be created dynamically and without the need to create
635and populate an array of fields beforehand.
636
637To use this method, an empty or partially empty synthetic event should
638first be created using synth_event_gen_cmd_start() or
639synth_event_gen_cmd_array_start(). For synth_event_gen_cmd_start(),
640the name of the event along with one or more pairs of args each pair
641representing a 'type field_name;' field specification should be
642supplied. For synth_event_gen_cmd_array_start(), the name of the
643event along with an array of struct synth_field_desc should be
644supplied. Before calling synth_event_gen_cmd_start() or
645synth_event_gen_cmd_array_start(), the user should create and
646initialize a dynevent_cmd object using synth_event_cmd_init().
647
648For example, to create a new "schedtest" synthetic event with two
8206de7d 649fields::
34ed6357
TZ
650
651 struct dynevent_cmd cmd;
652 char *buf;
653
654 /* Create a buffer to hold the generated command */
655 buf = kzalloc(MAX_DYNEVENT_CMD_LEN, GFP_KERNEL);
656
657 /* Before generating the command, initialize the cmd object */
658 synth_event_cmd_init(&cmd, buf, MAX_DYNEVENT_CMD_LEN);
659
660 ret = synth_event_gen_cmd_start(&cmd, "schedtest", THIS_MODULE,
661 "pid_t", "next_pid_field",
662 "u64", "ts_ns");
663
664Alternatively, using an array of struct synth_field_desc fields
8206de7d 665containing the same information::
34ed6357
TZ
666
667 ret = synth_event_gen_cmd_array_start(&cmd, "schedtest", THIS_MODULE,
668 fields, n_fields);
669
670Once the synthetic event object has been created, it can then be
671populated with more fields. Fields are added one by one using
672synth_event_add_field(), supplying the dynevent_cmd object, a field
673type, and a field name. For example, to add a new int field named
8206de7d 674"intfield", the following call should be made::
34ed6357
TZ
675
676 ret = synth_event_add_field(&cmd, "int", "intfield");
677
678See synth_field_size() for available types. If field_name contains [n]
679the field is considered to be an array.
680
681A group of fields can also be added all at once using an array of
682synth_field_desc with add_synth_fields(). For example, this would add
8206de7d 683just the first four sched_fields::
34ed6357
TZ
684
685 ret = synth_event_add_fields(&cmd, sched_fields, 4);
686
687If you already have a string of the form 'type field_name',
688synth_event_add_field_str() can be used to add it as-is; it will
689also automatically append a ';' to the string.
690
691Once all the fields have been added, the event should be finalized and
8206de7d 692registered by calling the synth_event_gen_cmd_end() function::
34ed6357
TZ
693
694 ret = synth_event_gen_cmd_end(&cmd);
695
696At this point, the event object is ready to be used for tracing new
697events.
698
b8170fad
TZ
6997.2 Tracing synthetic events from in-kernel code
700------------------------------------------------
34ed6357
TZ
701
702To trace a synthetic event, there are several options. The first
703option is to trace the event in one call, using synth_event_trace()
704with a variable number of values, or synth_event_trace_array() with an
705array of values to be set. A second option can be used to avoid the
706need for a pre-formed array of values or list of arguments, via
707synth_event_trace_start() and synth_event_trace_end() along with
708synth_event_add_next_val() or synth_event_add_val() to add the values
709piecewise.
710
b8170fad
TZ
7117.2.1 Tracing a synthetic event all at once
712-------------------------------------------
34ed6357
TZ
713
714To trace a synthetic event all at once, the synth_event_trace() or
715synth_event_trace_array() functions can be used.
716
717The synth_event_trace() function is passed the trace_event_file
718representing the synthetic event (which can be retrieved using
719trace_get_event_file() using the synthetic event name, "synthetic" as
720the system name, and the trace instance name (NULL if using the global
721trace array)), along with an variable number of u64 args, one for each
722synthetic event field, and the number of values being passed.
723
724So, to trace an event corresponding to the synthetic event definition
8206de7d 725above, code like the following could be used::
34ed6357
TZ
726
727 ret = synth_event_trace(create_synth_test, 7, /* number of values */
728 444, /* next_pid_field */
729 (u64)"clackers", /* next_comm_field */
730 1000000, /* ts_ns */
731 1000, /* ts_ms */
732 smp_processor_id(),/* cpu */
733 (u64)"Thneed", /* my_string_field */
734 999); /* my_int_field */
735
736All vals should be cast to u64, and string vals are just pointers to
737strings, cast to u64. Strings will be copied into space reserved in
738the event for the string, using these pointers.
739
740Alternatively, the synth_event_trace_array() function can be used to
741accomplish the same thing. It is passed the trace_event_file
742representing the synthetic event (which can be retrieved using
743trace_get_event_file() using the synthetic event name, "synthetic" as
744the system name, and the trace instance name (NULL if using the global
745trace array)), along with an array of u64, one for each synthetic
746event field.
747
748To trace an event corresponding to the synthetic event definition
8206de7d 749above, code like the following could be used::
34ed6357
TZ
750
751 u64 vals[7];
752
753 vals[0] = 777; /* next_pid_field */
754 vals[1] = (u64)"tiddlywinks"; /* next_comm_field */
755 vals[2] = 1000000; /* ts_ns */
756 vals[3] = 1000; /* ts_ms */
757 vals[4] = smp_processor_id(); /* cpu */
758 vals[5] = (u64)"thneed"; /* my_string_field */
759 vals[6] = 398; /* my_int_field */
760
761The 'vals' array is just an array of u64, the number of which must
762match the number of field in the synthetic event, and which must be in
763the same order as the synthetic event fields.
764
765All vals should be cast to u64, and string vals are just pointers to
766strings, cast to u64. Strings will be copied into space reserved in
767the event for the string, using these pointers.
768
769In order to trace a synthetic event, a pointer to the trace event file
770is needed. The trace_get_event_file() function can be used to get
771it - it will find the file in the given trace instance (in this case
772NULL since the top trace array is being used) while at the same time
8206de7d 773preventing the instance containing it from going away::
34ed6357
TZ
774
775 schedtest_event_file = trace_get_event_file(NULL, "synthetic",
776 "schedtest");
777
778Before tracing the event, it should be enabled in some way, otherwise
779the synthetic event won't actually show up in the trace buffer.
780
781To enable a synthetic event from the kernel, trace_array_set_clr_event()
782can be used (which is not specific to synthetic events, so does need
783the "synthetic" system name to be specified explicitly).
784
8206de7d 785To enable the event, pass 'true' to it::
34ed6357
TZ
786
787 trace_array_set_clr_event(schedtest_event_file->tr,
788 "synthetic", "schedtest", true);
789
8206de7d 790To disable it pass false::
34ed6357
TZ
791
792 trace_array_set_clr_event(schedtest_event_file->tr,
793 "synthetic", "schedtest", false);
794
795Finally, synth_event_trace_array() can be used to actually trace the
8206de7d 796event, which should be visible in the trace buffer afterwards::
34ed6357
TZ
797
798 ret = synth_event_trace_array(schedtest_event_file, vals,
799 ARRAY_SIZE(vals));
800
801To remove the synthetic event, the event should be disabled, and the
8206de7d 802trace instance should be 'put' back using trace_put_event_file()::
34ed6357
TZ
803
804 trace_array_set_clr_event(schedtest_event_file->tr,
805 "synthetic", "schedtest", false);
806 trace_put_event_file(schedtest_event_file);
807
808If those have been successful, synth_event_delete() can be called to
8206de7d 809remove the event::
34ed6357
TZ
810
811 ret = synth_event_delete("schedtest");
812
b8170fad
TZ
8137.2.2 Tracing a synthetic event piecewise
814-----------------------------------------
34ed6357
TZ
815
816To trace a synthetic using the piecewise method described above, the
817synth_event_trace_start() function is used to 'open' the synthetic
8206de7d 818event trace::
34ed6357 819
301de546 820 struct synth_event_trace_state trace_state;
34ed6357
TZ
821
822 ret = synth_event_trace_start(schedtest_event_file, &trace_state);
823
824It's passed the trace_event_file representing the synthetic event
825using the same methods as described above, along with a pointer to a
301de546 826struct synth_event_trace_state object, which will be zeroed before use and
34ed6357
TZ
827used to maintain state between this and following calls.
828
829Once the event has been opened, which means space for it has been
830reserved in the trace buffer, the individual fields can be set. There
831are two ways to do that, either one after another for each field in
832the event, which requires no lookups, or by name, which does. The
833tradeoff is flexibility in doing the assignments vs the cost of a
834lookup per field.
835
836To assign the values one after the other without lookups,
837synth_event_add_next_val() should be used. Each call is passed the
301de546 838same synth_event_trace_state object used in the synth_event_trace_start(),
34ed6357
TZ
839along with the value to set the next field in the event. After each
840field is set, the 'cursor' points to the next field, which will be set
841by the subsequent call, continuing until all the fields have been set
842in order. The same sequence of calls as in the above examples using
8206de7d 843this method would be (without error-handling code)::
34ed6357
TZ
844
845 /* next_pid_field */
846 ret = synth_event_add_next_val(777, &trace_state);
847
848 /* next_comm_field */
849 ret = synth_event_add_next_val((u64)"slinky", &trace_state);
850
851 /* ts_ns */
852 ret = synth_event_add_next_val(1000000, &trace_state);
853
854 /* ts_ms */
855 ret = synth_event_add_next_val(1000, &trace_state);
856
857 /* cpu */
858 ret = synth_event_add_next_val(smp_processor_id(), &trace_state);
859
860 /* my_string_field */
861 ret = synth_event_add_next_val((u64)"thneed_2.01", &trace_state);
862
863 /* my_int_field */
864 ret = synth_event_add_next_val(395, &trace_state);
865
866To assign the values in any order, synth_event_add_val() should be
301de546 867used. Each call is passed the same synth_event_trace_state object used in
34ed6357
TZ
868the synth_event_trace_start(), along with the field name of the field
869to set and the value to set it to. The same sequence of calls as in
870the above examples using this method would be (without error-handling
8206de7d 871code)::
34ed6357
TZ
872
873 ret = synth_event_add_val("next_pid_field", 777, &trace_state);
874 ret = synth_event_add_val("next_comm_field", (u64)"silly putty",
875 &trace_state);
876 ret = synth_event_add_val("ts_ns", 1000000, &trace_state);
877 ret = synth_event_add_val("ts_ms", 1000, &trace_state);
878 ret = synth_event_add_val("cpu", smp_processor_id(), &trace_state);
879 ret = synth_event_add_val("my_string_field", (u64)"thneed_9",
880 &trace_state);
881 ret = synth_event_add_val("my_int_field", 3999, &trace_state);
882
883Note that synth_event_add_next_val() and synth_event_add_val() are
884incompatible if used within the same trace of an event - either one
885can be used but not both at the same time.
886
887Finally, the event won't be actually traced until it's 'closed',
888which is done using synth_event_trace_end(), which takes only the
301de546 889struct synth_event_trace_state object used in the previous calls::
34ed6357
TZ
890
891 ret = synth_event_trace_end(&trace_state);
892
893Note that synth_event_trace_end() must be called at the end regardless
894of whether any of the add calls failed (say due to a bad field name
895being passed in).
896
b8170fad
TZ
8977.3 Dyamically creating kprobe and kretprobe event definitions
898--------------------------------------------------------------
34ed6357
TZ
899
900To create a kprobe or kretprobe trace event from kernel code, the
901kprobe_event_gen_cmd_start() or kretprobe_event_gen_cmd_start()
902functions can be used.
903
904To create a kprobe event, an empty or partially empty kprobe event
905should first be created using kprobe_event_gen_cmd_start(). The name
906of the event and the probe location should be specfied along with one
907or args each representing a probe field should be supplied to this
908function. Before calling kprobe_event_gen_cmd_start(), the user
909should create and initialize a dynevent_cmd object using
910kprobe_event_cmd_init().
911
8206de7d 912For example, to create a new "schedtest" kprobe event with two fields::
34ed6357
TZ
913
914 struct dynevent_cmd cmd;
915 char *buf;
916
917 /* Create a buffer to hold the generated command */
918 buf = kzalloc(MAX_DYNEVENT_CMD_LEN, GFP_KERNEL);
919
920 /* Before generating the command, initialize the cmd object */
921 kprobe_event_cmd_init(&cmd, buf, MAX_DYNEVENT_CMD_LEN);
922
923 /*
924 * Define the gen_kprobe_test event with the first 2 kprobe
925 * fields.
926 */
927 ret = kprobe_event_gen_cmd_start(&cmd, "gen_kprobe_test", "do_sys_open",
928 "dfd=%ax", "filename=%dx");
929
930Once the kprobe event object has been created, it can then be
931populated with more fields. Fields can be added using
932kprobe_event_add_fields(), supplying the dynevent_cmd object along
933with a variable arg list of probe fields. For example, to add a
8206de7d 934couple additional fields, the following call could be made::
34ed6357
TZ
935
936 ret = kprobe_event_add_fields(&cmd, "flags=%cx", "mode=+4($stack)");
937
938Once all the fields have been added, the event should be finalized and
939registered by calling the kprobe_event_gen_cmd_end() or
940kretprobe_event_gen_cmd_end() functions, depending on whether a kprobe
8206de7d 941or kretprobe command was started::
34ed6357
TZ
942
943 ret = kprobe_event_gen_cmd_end(&cmd);
944
8206de7d 945or::
34ed6357
TZ
946
947 ret = kretprobe_event_gen_cmd_end(&cmd);
948
949At this point, the event object is ready to be used for tracing new
950events.
951
952Similarly, a kretprobe event can be created using
953kretprobe_event_gen_cmd_start() with a probe name and location and
8206de7d 954additional params such as $retval::
34ed6357
TZ
955
956 ret = kretprobe_event_gen_cmd_start(&cmd, "gen_kretprobe_test",
957 "do_sys_open", "$retval");
958
959Similar to the synthetic event case, code like the following can be
8206de7d 960used to enable the newly created kprobe event::
34ed6357
TZ
961
962 gen_kprobe_test = trace_get_event_file(NULL, "kprobes", "gen_kprobe_test");
963
964 ret = trace_array_set_clr_event(gen_kprobe_test->tr,
965 "kprobes", "gen_kprobe_test", true);
966
967Finally, also similar to synthetic events, the following code can be
8206de7d 968used to give the kprobe event file back and delete the event::
34ed6357
TZ
969
970 trace_put_event_file(gen_kprobe_test);
971
972 ret = kprobe_event_delete("gen_kprobe_test");
973
b8170fad
TZ
9747.4 The "dynevent_cmd" low-level API
975------------------------------------
34ed6357
TZ
976
977Both the in-kernel synthetic event and kprobe interfaces are built on
978top of a lower-level "dynevent_cmd" interface. This interface is
979meant to provide the basis for higher-level interfaces such as the
980synthetic and kprobe interfaces, which can be used as examples.
981
982The basic idea is simple and amounts to providing a general-purpose
983layer that can be used to generate trace event commands. The
984generated command strings can then be passed to the command-parsing
985and event creation code that already exists in the trace event
986subystem for creating the corresponding trace events.
987
988In a nutshell, the way it works is that the higher-level interface
989code creates a struct dynevent_cmd object, then uses a couple
990functions, dynevent_arg_add() and dynevent_arg_pair_add() to build up
991a command string, which finally causes the command to be executed
992using the dynevent_create() function. The details of the interface
993are described below.
994
995The first step in building a new command string is to create and
996initialize an instance of a dynevent_cmd. Here, for instance, we
8206de7d 997create a dynevent_cmd on the stack and initialize it::
34ed6357
TZ
998
999 struct dynevent_cmd cmd;
1000 char *buf;
1001 int ret;
1002
1003 buf = kzalloc(MAX_DYNEVENT_CMD_LEN, GFP_KERNEL);
1004
1005 dynevent_cmd_init(cmd, buf, maxlen, DYNEVENT_TYPE_FOO,
1006 foo_event_run_command);
1007
1008The dynevent_cmd initialization needs to be given a user-specified
1009buffer and the length of the buffer (MAX_DYNEVENT_CMD_LEN can be used
1010for this purpose - at 2k it's generally too big to be comfortably put
1011on the stack, so is dynamically allocated), a dynevent type id, which
1012is meant to be used to check that further API calls are for the
1013correct command type, and a pointer to an event-specific run_command()
1014callback that will be called to actually execute the event-specific
1015command function.
1016
1017Once that's done, the command string can by built up by successive
1018calls to argument-adding functions.
1019
1020To add a single argument, define and initialize a struct dynevent_arg
1021or struct dynevent_arg_pair object. Here's an example of the simplest
1022possible arg addition, which is simply to append the given string as
8206de7d 1023a whitespace-separated argument to the command::
34ed6357
TZ
1024
1025 struct dynevent_arg arg;
1026
1027 dynevent_arg_init(&arg, NULL, 0);
1028
1029 arg.str = name;
1030
1031 ret = dynevent_arg_add(cmd, &arg);
1032
1033The arg object is first initialized using dynevent_arg_init() and in
1034this case the parameters are NULL or 0, which means there's no
1035optional sanity-checking function or separator appended to the end of
1036the arg.
1037
1038Here's another more complicated example using an 'arg pair', which is
1039used to create an argument that consists of a couple components added
1040together as a unit, for example, a 'type field_name;' arg or a simple
8206de7d 1041expression arg e.g. 'flags=%cx'::
34ed6357
TZ
1042
1043 struct dynevent_arg_pair arg_pair;
1044
1045 dynevent_arg_pair_init(&arg_pair, dynevent_foo_check_arg_fn, 0, ';');
1046
1047 arg_pair.lhs = type;
1048 arg_pair.rhs = name;
1049
1050 ret = dynevent_arg_pair_add(cmd, &arg_pair);
1051
1052Again, the arg_pair is first initialized, in this case with a callback
1053function used to check the sanity of the args (for example, that
1054neither part of the pair is NULL), along with a character to be used
1055to add an operator between the pair (here none) and a separator to be
1056appended onto the end of the arg pair (here ';').
1057
1058There's also a dynevent_str_add() function that can be used to simply
1059add a string as-is, with no spaces, delimeters, or arg check.
1060
1061Any number of dynevent_*_add() calls can be made to build up the string
1062(until its length surpasses cmd->maxlen). When all the arguments have
1063been added and the command string is complete, the only thing left to
1064do is run the command, which happens by simply calling
8206de7d 1065dynevent_create()::
34ed6357
TZ
1066
1067 ret = dynevent_create(&cmd);
1068
1069At that point, if the return value is 0, the dynamic event has been
1070created and is ready to use.
1071
1072See the dynevent_cmd function definitions themselves for the details
1073of the API.