tracing: Add synthetic event command generation functions
[linux-block.git] / include / linux / trace_events.h
CommitLineData
b2441318 1/* SPDX-License-Identifier: GPL-2.0 */
bac5fb97 2
645df987
SRRH
3#ifndef _LINUX_TRACE_EVENT_H
4#define _LINUX_TRACE_EVENT_H
97f20251 5
97f20251 6#include <linux/ring_buffer.h>
16bb8eb1 7#include <linux/trace_seq.h>
be74b73a 8#include <linux/percpu.h>
20ab4425 9#include <linux/hardirq.h>
430ad5a6 10#include <linux/perf_event.h>
de7b2973 11#include <linux/tracepoint.h>
97f20251
SR
12
13struct trace_array;
1c5eb448 14struct array_buffer;
97f20251 15struct tracer;
6d723736 16struct dentry;
2541517c 17struct bpf_prog;
97f20251 18
645df987
SRRH
19const char *trace_print_flags_seq(struct trace_seq *p, const char *delim,
20 unsigned long flags,
21 const struct trace_print_flags *flag_array);
be74b73a 22
645df987
SRRH
23const char *trace_print_symbols_seq(struct trace_seq *p, unsigned long val,
24 const struct trace_print_flags *symbol_array);
0f4fc29d 25
2fc1b6f0 26#if BITS_PER_LONG == 32
d3213e8f
RZ
27const char *trace_print_flags_seq_u64(struct trace_seq *p, const char *delim,
28 unsigned long long flags,
29 const struct trace_print_flags_u64 *flag_array);
30
645df987
SRRH
31const char *trace_print_symbols_seq_u64(struct trace_seq *p,
32 unsigned long long val,
33 const struct trace_print_flags_u64
2fc1b6f0 34 *symbol_array);
35#endif
36
645df987
SRRH
37const char *trace_print_bitmask_seq(struct trace_seq *p, void *bitmask_ptr,
38 unsigned int bitmask_size);
4449bf92 39
645df987 40const char *trace_print_hex_seq(struct trace_seq *p,
2acae0d5 41 const unsigned char *buf, int len,
3898fac1 42 bool concatenate);
5a2e3995 43
645df987 44const char *trace_print_array_seq(struct trace_seq *p,
ac01ce14 45 const void *buf, int count,
6ea22486
DM
46 size_t el_size);
47
ef56e047
PM
48const char *
49trace_print_hex_dump_seq(struct trace_seq *p, const char *prefix_str,
50 int prefix_type, int rowsize, int groupsize,
51 const void *buf, size_t len, bool ascii);
52
f71130de
LZ
53struct trace_iterator;
54struct trace_event;
55
892c505a
SRRH
56int trace_raw_output_prep(struct trace_iterator *iter,
57 struct trace_event *event);
f71130de 58
97f20251
SR
59/*
60 * The trace entry - the most basic unit of tracing. This is what
61 * is printed in the end as a single line in the trace output, such as:
62 *
63 * bash-15816 [01] 235.197585: idle_cpu <- irq_enter
64 */
65struct trace_entry {
89ec0dee 66 unsigned short type;
97f20251
SR
67 unsigned char flags;
68 unsigned char preempt_count;
69 int pid;
97f20251
SR
70};
71
609a7404 72#define TRACE_EVENT_TYPE_MAX \
89ec0dee
SR
73 ((1 << (sizeof(((struct trace_entry *)0)->type) * 8)) - 1)
74
97f20251
SR
75/*
76 * Trace iterator - used by printout routines who present trace
77 * results to users and which routines might sleep, etc:
78 */
79struct trace_iterator {
80 struct trace_array *tr;
81 struct tracer *trace;
1c5eb448 82 struct array_buffer *array_buffer;
97f20251
SR
83 void *private;
84 int cpu_file;
85 struct mutex mutex;
6d158a81 86 struct ring_buffer_iter **buffer_iter;
112f38a7 87 unsigned long iter_flags;
97f20251 88
bc289ae9
LJ
89 /* trace_seq for __print_flags() and __print_symbolic() etc. */
90 struct trace_seq tmp_seq;
91
ed5467da
AV
92 cpumask_var_t started;
93
94 /* it's true when current open file is snapshot */
95 bool snapshot;
96
97f20251
SR
97 /* The below is zeroed out in pipe_read */
98 struct trace_seq seq;
99 struct trace_entry *ent;
bc21b478 100 unsigned long lost_events;
a63ce5b3 101 int leftover;
4a9bd3f1 102 int ent_size;
97f20251
SR
103 int cpu;
104 u64 ts;
105
97f20251
SR
106 loff_t pos;
107 long idx;
108
ed5467da 109 /* All new field here will be zeroed out in pipe_read */
97f20251
SR
110};
111
8be0709f
DS
112enum trace_iter_flags {
113 TRACE_FILE_LAT_FMT = 1,
114 TRACE_FILE_ANNOTATE = 2,
115 TRACE_FILE_TIME_IN_NS = 4,
116};
117
97f20251
SR
118
119typedef enum print_line_t (*trace_print_func)(struct trace_iterator *iter,
a9a57763
SR
120 int flags, struct trace_event *event);
121
122struct trace_event_functions {
97f20251
SR
123 trace_print_func trace;
124 trace_print_func raw;
125 trace_print_func hex;
126 trace_print_func binary;
127};
128
a9a57763
SR
129struct trace_event {
130 struct hlist_node node;
131 struct list_head list;
132 int type;
133 struct trace_event_functions *funcs;
134};
135
9023c930
SRRH
136extern int register_trace_event(struct trace_event *event);
137extern int unregister_trace_event(struct trace_event *event);
97f20251
SR
138
139/* Return values for print_line callback */
140enum print_line_t {
141 TRACE_TYPE_PARTIAL_LINE = 0, /* Retry after flushing the seq */
142 TRACE_TYPE_HANDLED = 1,
143 TRACE_TYPE_UNHANDLED = 2, /* Relay to other output functions */
144 TRACE_TYPE_NO_CONSUME = 3 /* Handled but ask to not consume */
145};
146
af0009fc 147enum print_line_t trace_handle_return(struct trace_seq *s);
19a7fe20 148
f413cdb8 149void tracing_generic_entry_update(struct trace_entry *entry,
46710f3a 150 unsigned short type,
f413cdb8
FW
151 unsigned long flags,
152 int pc);
7f1d2f82 153struct trace_event_file;
ccb469a1
SR
154
155struct ring_buffer_event *
13292494 156trace_event_buffer_lock_reserve(struct trace_buffer **current_buffer,
7f1d2f82 157 struct trace_event_file *trace_file,
ccb469a1
SR
158 int type, unsigned long len,
159 unsigned long flags, int pc);
97f20251 160
d914ba37
JF
161#define TRACE_RECORD_CMDLINE BIT(0)
162#define TRACE_RECORD_TGID BIT(1)
163
164void tracing_record_taskinfo(struct task_struct *task, int flags);
165void tracing_record_taskinfo_sched_switch(struct task_struct *prev,
166 struct task_struct *next, int flags);
167
168void tracing_record_cmdline(struct task_struct *task);
169void tracing_record_tgid(struct task_struct *task);
97f20251 170
892c505a 171int trace_output_call(struct trace_iterator *iter, char *name, char *fmt, ...);
1d6bae96 172
1f9963cb
LZ
173struct event_filter;
174
2239291a
SR
175enum trace_reg {
176 TRACE_REG_REGISTER,
177 TRACE_REG_UNREGISTER,
37d73998 178#ifdef CONFIG_PERF_EVENTS
2239291a
SR
179 TRACE_REG_PERF_REGISTER,
180 TRACE_REG_PERF_UNREGISTER,
ceec0b6f
JO
181 TRACE_REG_PERF_OPEN,
182 TRACE_REG_PERF_CLOSE,
466c81c4
PZ
183 /*
184 * These (ADD/DEL) use a 'boolean' return value, where 1 (true) means a
185 * custom action was taken and the default action is not to be
186 * performed.
187 */
489c75c3
JO
188 TRACE_REG_PERF_ADD,
189 TRACE_REG_PERF_DEL,
37d73998 190#endif
2239291a
SR
191};
192
2425bcb9 193struct trace_event_call;
2239291a 194
2425bcb9 195struct trace_event_class {
acd388fd 196 const char *system;
2239291a
SR
197 void *probe;
198#ifdef CONFIG_PERF_EVENTS
199 void *perf_probe;
200#endif
2425bcb9 201 int (*reg)(struct trace_event_call *event,
ceec0b6f 202 enum trace_reg type, void *data);
2425bcb9
SRRH
203 int (*define_fields)(struct trace_event_call *);
204 struct list_head *(*get_fields)(struct trace_event_call *);
2e33af02 205 struct list_head fields;
2425bcb9 206 int (*raw_init)(struct trace_event_call *);
8f082018
SR
207};
208
2425bcb9 209extern int trace_event_reg(struct trace_event_call *event,
ceec0b6f 210 enum trace_reg type, void *data);
a1d0ce82 211
3f795dcf 212struct trace_event_buffer {
13292494 213 struct trace_buffer *buffer;
3fd40d1e 214 struct ring_buffer_event *event;
7f1d2f82 215 struct trace_event_file *trace_file;
3fd40d1e
SR
216 void *entry;
217 unsigned long flags;
218 int pc;
8cfcf155 219 struct pt_regs *regs;
3fd40d1e
SR
220};
221
3f795dcf 222void *trace_event_buffer_reserve(struct trace_event_buffer *fbuffer,
7f1d2f82 223 struct trace_event_file *trace_file,
3fd40d1e
SR
224 unsigned long len);
225
3f795dcf 226void trace_event_buffer_commit(struct trace_event_buffer *fbuffer);
3fd40d1e 227
553552ce 228enum {
553552ce 229 TRACE_EVENT_FL_FILTERED_BIT,
61c32659 230 TRACE_EVENT_FL_CAP_ANY_BIT,
27b14b56 231 TRACE_EVENT_FL_NO_SET_FILTER_BIT,
9b63776f 232 TRACE_EVENT_FL_IGNORE_ENABLE_BIT,
de7b2973 233 TRACE_EVENT_FL_TRACEPOINT_BIT,
72cbbc89 234 TRACE_EVENT_FL_KPROBE_BIT,
04a22fae 235 TRACE_EVENT_FL_UPROBE_BIT,
553552ce
SR
236};
237
ae63b31e
SR
238/*
239 * Event flags:
240 * FILTERED - The event has a filter attached
241 * CAP_ANY - Any user can enable for perf
242 * NO_SET_FILTER - Set when filter has error and is to be ignored
5d6ad960 243 * IGNORE_ENABLE - For trace internal events, do not enable with debugfs file
de7b2973 244 * TRACEPOINT - Event is a tracepoint
72cbbc89 245 * KPROBE - Event is a kprobe
04a22fae 246 * UPROBE - Event is a uprobe
ae63b31e 247 */
553552ce 248enum {
e870e9a1 249 TRACE_EVENT_FL_FILTERED = (1 << TRACE_EVENT_FL_FILTERED_BIT),
61c32659 250 TRACE_EVENT_FL_CAP_ANY = (1 << TRACE_EVENT_FL_CAP_ANY_BIT),
27b14b56 251 TRACE_EVENT_FL_NO_SET_FILTER = (1 << TRACE_EVENT_FL_NO_SET_FILTER_BIT),
9b63776f 252 TRACE_EVENT_FL_IGNORE_ENABLE = (1 << TRACE_EVENT_FL_IGNORE_ENABLE_BIT),
de7b2973 253 TRACE_EVENT_FL_TRACEPOINT = (1 << TRACE_EVENT_FL_TRACEPOINT_BIT),
72cbbc89 254 TRACE_EVENT_FL_KPROBE = (1 << TRACE_EVENT_FL_KPROBE_BIT),
04a22fae 255 TRACE_EVENT_FL_UPROBE = (1 << TRACE_EVENT_FL_UPROBE_BIT),
553552ce
SR
256};
257
04a22fae
WN
258#define TRACE_EVENT_FL_UKPROBE (TRACE_EVENT_FL_KPROBE | TRACE_EVENT_FL_UPROBE)
259
2425bcb9 260struct trace_event_call {
a59fd602 261 struct list_head list;
2425bcb9 262 struct trace_event_class *class;
de7b2973
MD
263 union {
264 char *name;
265 /* Set TRACE_EVENT_FL_TRACEPOINT flag when using "tp" */
266 struct tracepoint *tp;
267 };
80decc70 268 struct trace_event event;
0c564a53 269 char *print_fmt;
1f9963cb 270 struct event_filter *filter;
6d723736 271 void *mod;
69fd4f0e 272 void *data;
57d01ad0
SRRH
273 /*
274 * bit 0: filter_active
275 * bit 1: allow trace by non root (cap any)
276 * bit 2: failed to apply filter
5d6ad960 277 * bit 3: trace internal event (do not enable)
57d01ad0 278 * bit 4: Event was enabled by module
f306cc82 279 * bit 5: use call filter rather than file filter
de7b2973 280 * bit 6: Event is a tracepoint
57d01ad0 281 */
ae63b31e
SR
282 int flags; /* static flags of different events */
283
284#ifdef CONFIG_PERF_EVENTS
285 int perf_refcount;
286 struct hlist_head __percpu *perf_events;
e87c6bc3 287 struct bpf_prog_array __rcu *prog_array;
d5b5f391 288
2425bcb9 289 int (*perf_perm)(struct trace_event_call *,
d5b5f391 290 struct perf_event *);
ae63b31e
SR
291#endif
292};
293
e87c6bc3
YS
294#ifdef CONFIG_PERF_EVENTS
295static inline bool bpf_prog_array_valid(struct trace_event_call *call)
296{
297 /*
298 * This inline function checks whether call->prog_array
299 * is valid or not. The function is called in various places,
300 * outside rcu_read_lock/unlock, as a heuristic to speed up execution.
301 *
302 * If this function returns true, and later call->prog_array
303 * becomes false inside rcu_read_lock/unlock region,
304 * we bail out then. If this function return false,
305 * there is a risk that we might miss a few events if the checking
306 * were delayed until inside rcu_read_lock/unlock region and
307 * call->prog_array happened to become non-NULL then.
308 *
309 * Here, READ_ONCE() is used instead of rcu_access_pointer().
310 * rcu_access_pointer() requires the actual definition of
311 * "struct bpf_prog_array" while READ_ONCE() only needs
312 * a declaration of the same type.
313 */
314 return !!READ_ONCE(call->prog_array);
315}
316#endif
317
de7b2973 318static inline const char *
687fcc4a 319trace_event_name(struct trace_event_call *call)
de7b2973
MD
320{
321 if (call->flags & TRACE_EVENT_FL_TRACEPOINT)
322 return call->tp ? call->tp->name : NULL;
323 else
324 return call->name;
325}
326
0aeb1def
CW
327static inline struct list_head *
328trace_get_fields(struct trace_event_call *event_call)
329{
330 if (!event_call->class->get_fields)
331 return &event_call->class->fields;
332 return event_call->class->get_fields(event_call);
333}
334
ae63b31e 335struct trace_array;
7967b3e0 336struct trace_subsystem_dir;
ae63b31e
SR
337
338enum {
5d6ad960
SRRH
339 EVENT_FILE_FL_ENABLED_BIT,
340 EVENT_FILE_FL_RECORDED_CMD_BIT,
d914ba37 341 EVENT_FILE_FL_RECORDED_TGID_BIT,
5d6ad960
SRRH
342 EVENT_FILE_FL_FILTERED_BIT,
343 EVENT_FILE_FL_NO_SET_FILTER_BIT,
344 EVENT_FILE_FL_SOFT_MODE_BIT,
345 EVENT_FILE_FL_SOFT_DISABLED_BIT,
346 EVENT_FILE_FL_TRIGGER_MODE_BIT,
347 EVENT_FILE_FL_TRIGGER_COND_BIT,
3fdaf80f 348 EVENT_FILE_FL_PID_FILTER_BIT,
065e63f9 349 EVENT_FILE_FL_WAS_ENABLED_BIT,
ae63b31e
SR
350};
351
e3e2a2cc
TZ
352extern struct trace_event_file *trace_get_event_file(const char *instance,
353 const char *system,
354 const char *event);
355extern void trace_put_event_file(struct trace_event_file *file);
356
86c5426b
TZ
357#define MAX_DYNEVENT_CMD_LEN (2048)
358
359enum dynevent_type {
35ca5207 360 DYNEVENT_TYPE_SYNTH = 1,
86c5426b
TZ
361 DYNEVENT_TYPE_NONE,
362};
363
364struct dynevent_cmd;
365
366typedef int (*dynevent_create_fn_t)(struct dynevent_cmd *cmd);
367
368struct dynevent_cmd {
369 char *buf;
370 const char *event_name;
371 int maxlen;
372 int remaining;
373 unsigned int n_fields;
374 enum dynevent_type type;
375 dynevent_create_fn_t run_command;
376 void *private_data;
377};
378
379extern int dynevent_create(struct dynevent_cmd *cmd);
380
f5f6b255
TZ
381extern int synth_event_delete(const char *name);
382
35ca5207
TZ
383extern void synth_event_cmd_init(struct dynevent_cmd *cmd,
384 char *buf, int maxlen);
385
386extern int __synth_event_gen_cmd_start(struct dynevent_cmd *cmd,
387 const char *name,
388 struct module *mod, ...);
389
390#define synth_event_gen_cmd_start(cmd, name, mod, ...) \
391 __synth_event_gen_cmd_start(cmd, name, mod, ## __VA_ARGS__, NULL)
392
393struct synth_field_desc {
394 const char *type;
395 const char *name;
396};
397
398extern int synth_event_gen_cmd_array_start(struct dynevent_cmd *cmd,
399 const char *name,
400 struct module *mod,
401 struct synth_field_desc *fields,
402 unsigned int n_fields);
403extern int synth_event_create(const char *name,
404 struct synth_field_desc *fields,
405 unsigned int n_fields, struct module *mod);
406
407extern int synth_event_add_field(struct dynevent_cmd *cmd,
408 const char *type,
409 const char *name);
410extern int synth_event_add_field_str(struct dynevent_cmd *cmd,
411 const char *type_name);
412extern int synth_event_add_fields(struct dynevent_cmd *cmd,
413 struct synth_field_desc *fields,
414 unsigned int n_fields);
415
416#define synth_event_gen_cmd_end(cmd) \
417 dynevent_create(cmd)
418
ae63b31e 419/*
5d6ad960 420 * Event file flags:
57d01ad0 421 * ENABLED - The event is enabled
ae63b31e 422 * RECORDED_CMD - The comms should be recorded at sched_switch
d914ba37 423 * RECORDED_TGID - The tgids should be recorded at sched_switch
f306cc82
TZ
424 * FILTERED - The event has a filter attached
425 * NO_SET_FILTER - Set when filter has error and is to be ignored
417944c4
SRRH
426 * SOFT_MODE - The event is enabled/disabled by SOFT_DISABLED
427 * SOFT_DISABLED - When set, do not trace the event (even though its
428 * tracepoint may be enabled)
85f2b082 429 * TRIGGER_MODE - When set, invoke the triggers associated with the event
bac5fb97 430 * TRIGGER_COND - When set, one or more triggers has an associated filter
3fdaf80f 431 * PID_FILTER - When set, the event is filtered based on pid
065e63f9 432 * WAS_ENABLED - Set when enabled to know to clear trace on module removal
ae63b31e
SR
433 */
434enum {
5d6ad960
SRRH
435 EVENT_FILE_FL_ENABLED = (1 << EVENT_FILE_FL_ENABLED_BIT),
436 EVENT_FILE_FL_RECORDED_CMD = (1 << EVENT_FILE_FL_RECORDED_CMD_BIT),
d914ba37 437 EVENT_FILE_FL_RECORDED_TGID = (1 << EVENT_FILE_FL_RECORDED_TGID_BIT),
5d6ad960
SRRH
438 EVENT_FILE_FL_FILTERED = (1 << EVENT_FILE_FL_FILTERED_BIT),
439 EVENT_FILE_FL_NO_SET_FILTER = (1 << EVENT_FILE_FL_NO_SET_FILTER_BIT),
440 EVENT_FILE_FL_SOFT_MODE = (1 << EVENT_FILE_FL_SOFT_MODE_BIT),
441 EVENT_FILE_FL_SOFT_DISABLED = (1 << EVENT_FILE_FL_SOFT_DISABLED_BIT),
442 EVENT_FILE_FL_TRIGGER_MODE = (1 << EVENT_FILE_FL_TRIGGER_MODE_BIT),
443 EVENT_FILE_FL_TRIGGER_COND = (1 << EVENT_FILE_FL_TRIGGER_COND_BIT),
3fdaf80f 444 EVENT_FILE_FL_PID_FILTER = (1 << EVENT_FILE_FL_PID_FILTER_BIT),
065e63f9 445 EVENT_FILE_FL_WAS_ENABLED = (1 << EVENT_FILE_FL_WAS_ENABLED_BIT),
ae63b31e
SR
446};
447
7f1d2f82 448struct trace_event_file {
ae63b31e 449 struct list_head list;
2425bcb9 450 struct trace_event_call *event_call;
f86f4180 451 struct event_filter __rcu *filter;
ae63b31e
SR
452 struct dentry *dir;
453 struct trace_array *tr;
7967b3e0 454 struct trace_subsystem_dir *system;
85f2b082 455 struct list_head triggers;
97f20251 456
553552ce
SR
457 /*
458 * 32 bit flags:
57d01ad0
SRRH
459 * bit 0: enabled
460 * bit 1: enabled cmd record
417944c4
SRRH
461 * bit 2: enable/disable with the soft disable bit
462 * bit 3: soft disabled
85f2b082 463 * bit 4: trigger enabled
553552ce 464 *
417944c4
SRRH
465 * Note: The bits must be set atomically to prevent races
466 * from other writers. Reads of flags do not need to be in
467 * sync as they occur in critical sections. But the way flags
ae63b31e 468 * is currently used, these changes do not affect the code
1eaa4787
SR
469 * except that when a change is made, it may have a slight
470 * delay in propagating the changes to other CPUs due to
417944c4 471 * caching and such. Which is mostly OK ;-)
553552ce 472 */
417944c4 473 unsigned long flags;
1cf4c073 474 atomic_t sm_ref; /* soft-mode reference counter */
85f2b082 475 atomic_t tm_ref; /* trigger-mode reference counter */
97f20251
SR
476};
477
53cf810b
FW
478#define __TRACE_EVENT_FLAGS(name, value) \
479 static int __init trace_init_flags_##name(void) \
480 { \
de7b2973 481 event_##name.flags |= value; \
53cf810b
FW
482 return 0; \
483 } \
484 early_initcall(trace_init_flags_##name);
485
d5b5f391 486#define __TRACE_EVENT_PERF_PERM(name, expr...) \
2425bcb9 487 static int perf_perm_##name(struct trace_event_call *tp_event, \
d5b5f391
PZ
488 struct perf_event *p_event) \
489 { \
490 return ({ expr; }); \
491 } \
492 static int __init trace_init_perf_perm_##name(void) \
493 { \
494 event_##name.perf_perm = &perf_perm_##name; \
495 return 0; \
496 } \
497 early_initcall(trace_init_perf_perm_##name);
498
97d5a220 499#define PERF_MAX_TRACE_SIZE 2048
20ab4425 500
16bb8eb1 501#define MAX_FILTER_STR_VAL 256 /* Should handle KSYM_SYMBOL_LEN */
97f20251 502
85f2b082
TZ
503enum event_trigger_type {
504 ETT_NONE = (0),
2a2df321 505 ETT_TRACE_ONOFF = (1 << 0),
93e31ffb 506 ETT_SNAPSHOT = (1 << 1),
f21ecbb3 507 ETT_STACKTRACE = (1 << 2),
7862ad18 508 ETT_EVENT_ENABLE = (1 << 3),
7ef224d1 509 ETT_EVENT_HIST = (1 << 4),
d0bad49b 510 ETT_HIST_ENABLE = (1 << 5),
85f2b082
TZ
511};
512
6fb2915d 513extern int filter_match_preds(struct event_filter *filter, void *rec);
f306cc82 514
1ac4f51c
TZ
515extern enum event_trigger_type
516event_triggers_call(struct trace_event_file *file, void *rec,
517 struct ring_buffer_event *event);
518extern void
519event_triggers_post_call(struct trace_event_file *file,
c94e45bc 520 enum event_trigger_type tt);
97f20251 521
3fdaf80f
SRRH
522bool trace_event_ignore_this_pid(struct trace_event_file *trace_file);
523
13a1e4ae 524/**
09a5059a 525 * trace_trigger_soft_disabled - do triggers and test if soft disabled
13a1e4ae
SRRH
526 * @file: The file pointer of the event to test
527 *
528 * If any triggers without filters are attached to this event, they
529 * will be called here. If the event is soft disabled and has no
530 * triggers that require testing the fields, it will return true,
531 * otherwise false.
532 */
533static inline bool
09a5059a 534trace_trigger_soft_disabled(struct trace_event_file *file)
13a1e4ae
SRRH
535{
536 unsigned long eflags = file->flags;
537
5d6ad960
SRRH
538 if (!(eflags & EVENT_FILE_FL_TRIGGER_COND)) {
539 if (eflags & EVENT_FILE_FL_TRIGGER_MODE)
1ac4f51c 540 event_triggers_call(file, NULL, NULL);
5d6ad960 541 if (eflags & EVENT_FILE_FL_SOFT_DISABLED)
13a1e4ae 542 return true;
3fdaf80f
SRRH
543 if (eflags & EVENT_FILE_FL_PID_FILTER)
544 return trace_event_ignore_this_pid(file);
13a1e4ae
SRRH
545 }
546 return false;
547}
548
098d2164 549#ifdef CONFIG_BPF_EVENTS
e87c6bc3
YS
550unsigned int trace_call_bpf(struct trace_event_call *call, void *ctx);
551int perf_event_attach_bpf_prog(struct perf_event *event, struct bpf_prog *prog);
552void perf_event_detach_bpf_prog(struct perf_event *event);
f4e2298e 553int perf_event_query_prog_array(struct perf_event *event, void __user *info);
c4f6699d
AS
554int bpf_probe_register(struct bpf_raw_event_map *btp, struct bpf_prog *prog);
555int bpf_probe_unregister(struct bpf_raw_event_map *btp, struct bpf_prog *prog);
a38d1107
MM
556struct bpf_raw_event_map *bpf_get_raw_tracepoint(const char *name);
557void bpf_put_raw_tracepoint(struct bpf_raw_event_map *btp);
41bdc4b4
YS
558int bpf_get_perf_event_info(const struct perf_event *event, u32 *prog_id,
559 u32 *fd_type, const char **buf,
560 u64 *probe_offset, u64 *probe_addr);
2541517c 561#else
e87c6bc3 562static inline unsigned int trace_call_bpf(struct trace_event_call *call, void *ctx)
2541517c
AS
563{
564 return 1;
565}
e87c6bc3
YS
566
567static inline int
568perf_event_attach_bpf_prog(struct perf_event *event, struct bpf_prog *prog)
569{
570 return -EOPNOTSUPP;
571}
572
573static inline void perf_event_detach_bpf_prog(struct perf_event *event) { }
574
f4e2298e
YS
575static inline int
576perf_event_query_prog_array(struct perf_event *event, void __user *info)
577{
578 return -EOPNOTSUPP;
579}
c4f6699d
AS
580static inline int bpf_probe_register(struct bpf_raw_event_map *btp, struct bpf_prog *p)
581{
582 return -EOPNOTSUPP;
583}
584static inline int bpf_probe_unregister(struct bpf_raw_event_map *btp, struct bpf_prog *p)
585{
586 return -EOPNOTSUPP;
587}
a38d1107 588static inline struct bpf_raw_event_map *bpf_get_raw_tracepoint(const char *name)
c4f6699d
AS
589{
590 return NULL;
591}
a38d1107
MM
592static inline void bpf_put_raw_tracepoint(struct bpf_raw_event_map *btp)
593{
594}
41bdc4b4
YS
595static inline int bpf_get_perf_event_info(const struct perf_event *event,
596 u32 *prog_id, u32 *fd_type,
597 const char **buf, u64 *probe_offset,
598 u64 *probe_addr)
599{
600 return -EOPNOTSUPP;
601}
2541517c
AS
602#endif
603
43b51ead
LZ
604enum {
605 FILTER_OTHER = 0,
606 FILTER_STATIC_STRING,
607 FILTER_DYN_STRING,
87a342f5 608 FILTER_PTR_STRING,
02aa3162 609 FILTER_TRACE_FN,
e57cbaf0
SRRH
610 FILTER_COMM,
611 FILTER_CPU,
43b51ead
LZ
612};
613
2425bcb9
SRRH
614extern int trace_event_raw_init(struct trace_event_call *call);
615extern int trace_define_field(struct trace_event_call *call, const char *type,
aeaeae11
FW
616 const char *name, int offset, int size,
617 int is_signed, int filter_type);
2425bcb9
SRRH
618extern int trace_add_event_call(struct trace_event_call *call);
619extern int trace_remove_event_call(struct trace_event_call *call);
32bbe007 620extern int trace_event_get_offsets(struct trace_event_call *call);
97f20251 621
d2802d07 622#define is_signed_type(type) (((type)(-1)) < (type)1)
97f20251 623
595a438c 624int ftrace_set_clr_event(struct trace_array *tr, char *buf, int set);
4671c794 625int trace_set_clr_event(const char *system, const char *event, int set);
28879787
DI
626int trace_array_set_clr_event(struct trace_array *tr, const char *system,
627 const char *event, bool enable);
97f20251
SR
628/*
629 * The double __builtin_constant_p is because gcc will give us an error
630 * if we try to allocate the static variable to fmt if it is not a
631 * constant. Even with the outer if statement optimizing out.
632 */
633#define event_trace_printk(ip, fmt, args...) \
634do { \
635 __trace_printk_check_format(fmt, ##args); \
636 tracing_record_cmdline(current); \
637 if (__builtin_constant_p(fmt)) { \
638 static const char *trace_printk_fmt \
639 __attribute__((section("__trace_printk_fmt"))) = \
640 __builtin_constant_p(fmt) ? fmt : NULL; \
641 \
642 __trace_bprintk(ip, trace_printk_fmt, ##args); \
643 } else \
644 __trace_printk(ip, fmt, ##args); \
645} while (0)
646
07b139c8 647#ifdef CONFIG_PERF_EVENTS
6fb2915d 648struct perf_event;
c530665c
FW
649
650DECLARE_PER_CPU(struct pt_regs, perf_trace_regs);
9802d865 651DECLARE_PER_CPU(int, bpf_kprobe_override);
c530665c 652
1c024eca
PZ
653extern int perf_trace_init(struct perf_event *event);
654extern void perf_trace_destroy(struct perf_event *event);
a4eaf7f1
PZ
655extern int perf_trace_add(struct perf_event *event, int flags);
656extern void perf_trace_del(struct perf_event *event, int flags);
e12f03d7
SL
657#ifdef CONFIG_KPROBE_EVENTS
658extern int perf_kprobe_init(struct perf_event *event, bool is_retprobe);
659extern void perf_kprobe_destroy(struct perf_event *event);
41bdc4b4
YS
660extern int bpf_get_kprobe_info(const struct perf_event *event,
661 u32 *fd_type, const char **symbol,
662 u64 *probe_offset, u64 *probe_addr,
663 bool perf_type_tracepoint);
e12f03d7 664#endif
33ea4b24 665#ifdef CONFIG_UPROBE_EVENTS
a6ca88b2
SL
666extern int perf_uprobe_init(struct perf_event *event,
667 unsigned long ref_ctr_offset, bool is_retprobe);
33ea4b24 668extern void perf_uprobe_destroy(struct perf_event *event);
41bdc4b4
YS
669extern int bpf_get_uprobe_info(const struct perf_event *event,
670 u32 *fd_type, const char **filename,
671 u64 *probe_offset, bool perf_type_tracepoint);
33ea4b24 672#endif
1c024eca 673extern int ftrace_profile_set_filter(struct perf_event *event, int event_id,
6fb2915d
LZ
674 char *filter_str);
675extern void ftrace_profile_free_filter(struct perf_event *event);
1e1dcd93
AS
676void perf_trace_buf_update(void *record, u16 type);
677void *perf_trace_buf_alloc(int size, struct pt_regs **regs, int *rctxp);
430ad5a6 678
c4f6699d
AS
679void bpf_trace_run1(struct bpf_prog *prog, u64 arg1);
680void bpf_trace_run2(struct bpf_prog *prog, u64 arg1, u64 arg2);
681void bpf_trace_run3(struct bpf_prog *prog, u64 arg1, u64 arg2,
682 u64 arg3);
683void bpf_trace_run4(struct bpf_prog *prog, u64 arg1, u64 arg2,
684 u64 arg3, u64 arg4);
685void bpf_trace_run5(struct bpf_prog *prog, u64 arg1, u64 arg2,
686 u64 arg3, u64 arg4, u64 arg5);
687void bpf_trace_run6(struct bpf_prog *prog, u64 arg1, u64 arg2,
688 u64 arg3, u64 arg4, u64 arg5, u64 arg6);
689void bpf_trace_run7(struct bpf_prog *prog, u64 arg1, u64 arg2,
690 u64 arg3, u64 arg4, u64 arg5, u64 arg6, u64 arg7);
691void bpf_trace_run8(struct bpf_prog *prog, u64 arg1, u64 arg2,
692 u64 arg3, u64 arg4, u64 arg5, u64 arg6, u64 arg7,
693 u64 arg8);
694void bpf_trace_run9(struct bpf_prog *prog, u64 arg1, u64 arg2,
695 u64 arg3, u64 arg4, u64 arg5, u64 arg6, u64 arg7,
696 u64 arg8, u64 arg9);
697void bpf_trace_run10(struct bpf_prog *prog, u64 arg1, u64 arg2,
698 u64 arg3, u64 arg4, u64 arg5, u64 arg6, u64 arg7,
699 u64 arg8, u64 arg9, u64 arg10);
700void bpf_trace_run11(struct bpf_prog *prog, u64 arg1, u64 arg2,
701 u64 arg3, u64 arg4, u64 arg5, u64 arg6, u64 arg7,
702 u64 arg8, u64 arg9, u64 arg10, u64 arg11);
703void bpf_trace_run12(struct bpf_prog *prog, u64 arg1, u64 arg2,
704 u64 arg3, u64 arg4, u64 arg5, u64 arg6, u64 arg7,
705 u64 arg8, u64 arg9, u64 arg10, u64 arg11, u64 arg12);
85b67bcb
AS
706void perf_trace_run_bpf_submit(void *raw_data, int size, int rctx,
707 struct trace_event_call *call, u64 count,
708 struct pt_regs *regs, struct hlist_head *head,
709 struct task_struct *task);
710
430ad5a6 711static inline void
1e1dcd93 712perf_trace_buf_submit(void *raw_data, int size, int rctx, u16 type,
e6dab5ff 713 u64 count, struct pt_regs *regs, void *head,
8fd0fbbe 714 struct task_struct *task)
430ad5a6 715{
8fd0fbbe 716 perf_tp_event(type, count, raw_data, size, regs, head, rctx, task);
430ad5a6 717}
e87c6bc3 718
6fb2915d
LZ
719#endif
720
2425bcb9 721#endif /* _LINUX_TRACE_EVENT_H */