ring-buffer: Drop unneeded check in ring_buffer_resize()
[linux-block.git] / include / linux / trace_events.h
CommitLineData
b2441318 1/* SPDX-License-Identifier: GPL-2.0 */
bac5fb97 2
645df987
SRRH
3#ifndef _LINUX_TRACE_EVENT_H
4#define _LINUX_TRACE_EVENT_H
97f20251 5
97f20251 6#include <linux/ring_buffer.h>
16bb8eb1 7#include <linux/trace_seq.h>
be74b73a 8#include <linux/percpu.h>
20ab4425 9#include <linux/hardirq.h>
430ad5a6 10#include <linux/perf_event.h>
de7b2973 11#include <linux/tracepoint.h>
97f20251
SR
12
13struct trace_array;
1c5eb448 14struct array_buffer;
97f20251 15struct tracer;
6d723736 16struct dentry;
2541517c 17struct bpf_prog;
97f20251 18
645df987
SRRH
19const char *trace_print_flags_seq(struct trace_seq *p, const char *delim,
20 unsigned long flags,
21 const struct trace_print_flags *flag_array);
be74b73a 22
645df987
SRRH
23const char *trace_print_symbols_seq(struct trace_seq *p, unsigned long val,
24 const struct trace_print_flags *symbol_array);
0f4fc29d 25
2fc1b6f0 26#if BITS_PER_LONG == 32
d3213e8f
RZ
27const char *trace_print_flags_seq_u64(struct trace_seq *p, const char *delim,
28 unsigned long long flags,
29 const struct trace_print_flags_u64 *flag_array);
30
645df987
SRRH
31const char *trace_print_symbols_seq_u64(struct trace_seq *p,
32 unsigned long long val,
33 const struct trace_print_flags_u64
2fc1b6f0 34 *symbol_array);
35#endif
36
645df987
SRRH
37const char *trace_print_bitmask_seq(struct trace_seq *p, void *bitmask_ptr,
38 unsigned int bitmask_size);
4449bf92 39
645df987 40const char *trace_print_hex_seq(struct trace_seq *p,
2acae0d5 41 const unsigned char *buf, int len,
3898fac1 42 bool concatenate);
5a2e3995 43
645df987 44const char *trace_print_array_seq(struct trace_seq *p,
ac01ce14 45 const void *buf, int count,
6ea22486
DM
46 size_t el_size);
47
ef56e047
PM
48const char *
49trace_print_hex_dump_seq(struct trace_seq *p, const char *prefix_str,
50 int prefix_type, int rowsize, int groupsize,
51 const void *buf, size_t len, bool ascii);
52
f71130de
LZ
53struct trace_iterator;
54struct trace_event;
55
892c505a
SRRH
56int trace_raw_output_prep(struct trace_iterator *iter,
57 struct trace_event *event);
f71130de 58
97f20251
SR
59/*
60 * The trace entry - the most basic unit of tracing. This is what
61 * is printed in the end as a single line in the trace output, such as:
62 *
63 * bash-15816 [01] 235.197585: idle_cpu <- irq_enter
64 */
65struct trace_entry {
89ec0dee 66 unsigned short type;
97f20251
SR
67 unsigned char flags;
68 unsigned char preempt_count;
69 int pid;
97f20251
SR
70};
71
609a7404 72#define TRACE_EVENT_TYPE_MAX \
89ec0dee
SR
73 ((1 << (sizeof(((struct trace_entry *)0)->type) * 8)) - 1)
74
97f20251
SR
75/*
76 * Trace iterator - used by printout routines who present trace
77 * results to users and which routines might sleep, etc:
78 */
79struct trace_iterator {
80 struct trace_array *tr;
81 struct tracer *trace;
1c5eb448 82 struct array_buffer *array_buffer;
97f20251
SR
83 void *private;
84 int cpu_file;
85 struct mutex mutex;
6d158a81 86 struct ring_buffer_iter **buffer_iter;
112f38a7 87 unsigned long iter_flags;
ff895103
SRV
88 void *temp; /* temp holder */
89 unsigned int temp_size;
97f20251 90
bc289ae9
LJ
91 /* trace_seq for __print_flags() and __print_symbolic() etc. */
92 struct trace_seq tmp_seq;
93
ed5467da
AV
94 cpumask_var_t started;
95
96 /* it's true when current open file is snapshot */
97 bool snapshot;
98
97f20251
SR
99 /* The below is zeroed out in pipe_read */
100 struct trace_seq seq;
101 struct trace_entry *ent;
bc21b478 102 unsigned long lost_events;
a63ce5b3 103 int leftover;
4a9bd3f1 104 int ent_size;
97f20251
SR
105 int cpu;
106 u64 ts;
107
97f20251
SR
108 loff_t pos;
109 long idx;
110
ed5467da 111 /* All new field here will be zeroed out in pipe_read */
97f20251
SR
112};
113
8be0709f
DS
114enum trace_iter_flags {
115 TRACE_FILE_LAT_FMT = 1,
116 TRACE_FILE_ANNOTATE = 2,
117 TRACE_FILE_TIME_IN_NS = 4,
118};
119
97f20251
SR
120
121typedef enum print_line_t (*trace_print_func)(struct trace_iterator *iter,
a9a57763
SR
122 int flags, struct trace_event *event);
123
124struct trace_event_functions {
97f20251
SR
125 trace_print_func trace;
126 trace_print_func raw;
127 trace_print_func hex;
128 trace_print_func binary;
129};
130
a9a57763
SR
131struct trace_event {
132 struct hlist_node node;
133 struct list_head list;
134 int type;
135 struct trace_event_functions *funcs;
136};
137
9023c930
SRRH
138extern int register_trace_event(struct trace_event *event);
139extern int unregister_trace_event(struct trace_event *event);
97f20251
SR
140
141/* Return values for print_line callback */
142enum print_line_t {
143 TRACE_TYPE_PARTIAL_LINE = 0, /* Retry after flushing the seq */
144 TRACE_TYPE_HANDLED = 1,
145 TRACE_TYPE_UNHANDLED = 2, /* Relay to other output functions */
146 TRACE_TYPE_NO_CONSUME = 3 /* Handled but ask to not consume */
147};
148
af0009fc 149enum print_line_t trace_handle_return(struct trace_seq *s);
19a7fe20 150
f413cdb8 151void tracing_generic_entry_update(struct trace_entry *entry,
46710f3a 152 unsigned short type,
f413cdb8
FW
153 unsigned long flags,
154 int pc);
7f1d2f82 155struct trace_event_file;
ccb469a1
SR
156
157struct ring_buffer_event *
13292494 158trace_event_buffer_lock_reserve(struct trace_buffer **current_buffer,
7f1d2f82 159 struct trace_event_file *trace_file,
ccb469a1
SR
160 int type, unsigned long len,
161 unsigned long flags, int pc);
97f20251 162
d914ba37
JF
163#define TRACE_RECORD_CMDLINE BIT(0)
164#define TRACE_RECORD_TGID BIT(1)
165
166void tracing_record_taskinfo(struct task_struct *task, int flags);
167void tracing_record_taskinfo_sched_switch(struct task_struct *prev,
168 struct task_struct *next, int flags);
169
170void tracing_record_cmdline(struct task_struct *task);
171void tracing_record_tgid(struct task_struct *task);
97f20251 172
892c505a 173int trace_output_call(struct trace_iterator *iter, char *name, char *fmt, ...);
1d6bae96 174
1f9963cb
LZ
175struct event_filter;
176
2239291a
SR
177enum trace_reg {
178 TRACE_REG_REGISTER,
179 TRACE_REG_UNREGISTER,
37d73998 180#ifdef CONFIG_PERF_EVENTS
2239291a
SR
181 TRACE_REG_PERF_REGISTER,
182 TRACE_REG_PERF_UNREGISTER,
ceec0b6f
JO
183 TRACE_REG_PERF_OPEN,
184 TRACE_REG_PERF_CLOSE,
466c81c4
PZ
185 /*
186 * These (ADD/DEL) use a 'boolean' return value, where 1 (true) means a
187 * custom action was taken and the default action is not to be
188 * performed.
189 */
489c75c3
JO
190 TRACE_REG_PERF_ADD,
191 TRACE_REG_PERF_DEL,
37d73998 192#endif
2239291a
SR
193};
194
2425bcb9 195struct trace_event_call;
2239291a 196
04ae87a5
PZ
197#define TRACE_FUNCTION_TYPE ((const char *)~0UL)
198
199struct trace_event_fields {
200 const char *type;
201 union {
202 struct {
203 const char *name;
204 const int size;
205 const int align;
206 const int is_signed;
207 const int filter_type;
208 };
209 int (*define_fields)(struct trace_event_call *);
210 };
211};
212
2425bcb9 213struct trace_event_class {
acd388fd 214 const char *system;
2239291a
SR
215 void *probe;
216#ifdef CONFIG_PERF_EVENTS
217 void *perf_probe;
218#endif
2425bcb9 219 int (*reg)(struct trace_event_call *event,
ceec0b6f 220 enum trace_reg type, void *data);
04ae87a5 221 struct trace_event_fields *fields_array;
2425bcb9 222 struct list_head *(*get_fields)(struct trace_event_call *);
2e33af02 223 struct list_head fields;
2425bcb9 224 int (*raw_init)(struct trace_event_call *);
8f082018
SR
225};
226
2425bcb9 227extern int trace_event_reg(struct trace_event_call *event,
ceec0b6f 228 enum trace_reg type, void *data);
a1d0ce82 229
3f795dcf 230struct trace_event_buffer {
13292494 231 struct trace_buffer *buffer;
3fd40d1e 232 struct ring_buffer_event *event;
7f1d2f82 233 struct trace_event_file *trace_file;
3fd40d1e
SR
234 void *entry;
235 unsigned long flags;
236 int pc;
8cfcf155 237 struct pt_regs *regs;
3fd40d1e
SR
238};
239
3f795dcf 240void *trace_event_buffer_reserve(struct trace_event_buffer *fbuffer,
7f1d2f82 241 struct trace_event_file *trace_file,
3fd40d1e
SR
242 unsigned long len);
243
3f795dcf 244void trace_event_buffer_commit(struct trace_event_buffer *fbuffer);
3fd40d1e 245
553552ce 246enum {
553552ce 247 TRACE_EVENT_FL_FILTERED_BIT,
61c32659 248 TRACE_EVENT_FL_CAP_ANY_BIT,
27b14b56 249 TRACE_EVENT_FL_NO_SET_FILTER_BIT,
9b63776f 250 TRACE_EVENT_FL_IGNORE_ENABLE_BIT,
de7b2973 251 TRACE_EVENT_FL_TRACEPOINT_BIT,
72cbbc89 252 TRACE_EVENT_FL_KPROBE_BIT,
04a22fae 253 TRACE_EVENT_FL_UPROBE_BIT,
553552ce
SR
254};
255
ae63b31e
SR
256/*
257 * Event flags:
258 * FILTERED - The event has a filter attached
259 * CAP_ANY - Any user can enable for perf
260 * NO_SET_FILTER - Set when filter has error and is to be ignored
5d6ad960 261 * IGNORE_ENABLE - For trace internal events, do not enable with debugfs file
de7b2973 262 * TRACEPOINT - Event is a tracepoint
72cbbc89 263 * KPROBE - Event is a kprobe
04a22fae 264 * UPROBE - Event is a uprobe
ae63b31e 265 */
553552ce 266enum {
e870e9a1 267 TRACE_EVENT_FL_FILTERED = (1 << TRACE_EVENT_FL_FILTERED_BIT),
61c32659 268 TRACE_EVENT_FL_CAP_ANY = (1 << TRACE_EVENT_FL_CAP_ANY_BIT),
27b14b56 269 TRACE_EVENT_FL_NO_SET_FILTER = (1 << TRACE_EVENT_FL_NO_SET_FILTER_BIT),
9b63776f 270 TRACE_EVENT_FL_IGNORE_ENABLE = (1 << TRACE_EVENT_FL_IGNORE_ENABLE_BIT),
de7b2973 271 TRACE_EVENT_FL_TRACEPOINT = (1 << TRACE_EVENT_FL_TRACEPOINT_BIT),
72cbbc89 272 TRACE_EVENT_FL_KPROBE = (1 << TRACE_EVENT_FL_KPROBE_BIT),
04a22fae 273 TRACE_EVENT_FL_UPROBE = (1 << TRACE_EVENT_FL_UPROBE_BIT),
553552ce
SR
274};
275
04a22fae
WN
276#define TRACE_EVENT_FL_UKPROBE (TRACE_EVENT_FL_KPROBE | TRACE_EVENT_FL_UPROBE)
277
2425bcb9 278struct trace_event_call {
a59fd602 279 struct list_head list;
2425bcb9 280 struct trace_event_class *class;
de7b2973
MD
281 union {
282 char *name;
283 /* Set TRACE_EVENT_FL_TRACEPOINT flag when using "tp" */
284 struct tracepoint *tp;
285 };
80decc70 286 struct trace_event event;
0c564a53 287 char *print_fmt;
1f9963cb 288 struct event_filter *filter;
6d723736 289 void *mod;
69fd4f0e 290 void *data;
57d01ad0
SRRH
291 /*
292 * bit 0: filter_active
293 * bit 1: allow trace by non root (cap any)
294 * bit 2: failed to apply filter
5d6ad960 295 * bit 3: trace internal event (do not enable)
57d01ad0 296 * bit 4: Event was enabled by module
f306cc82 297 * bit 5: use call filter rather than file filter
de7b2973 298 * bit 6: Event is a tracepoint
57d01ad0 299 */
ae63b31e
SR
300 int flags; /* static flags of different events */
301
302#ifdef CONFIG_PERF_EVENTS
303 int perf_refcount;
304 struct hlist_head __percpu *perf_events;
e87c6bc3 305 struct bpf_prog_array __rcu *prog_array;
d5b5f391 306
2425bcb9 307 int (*perf_perm)(struct trace_event_call *,
d5b5f391 308 struct perf_event *);
ae63b31e
SR
309#endif
310};
311
e87c6bc3
YS
312#ifdef CONFIG_PERF_EVENTS
313static inline bool bpf_prog_array_valid(struct trace_event_call *call)
314{
315 /*
316 * This inline function checks whether call->prog_array
317 * is valid or not. The function is called in various places,
318 * outside rcu_read_lock/unlock, as a heuristic to speed up execution.
319 *
320 * If this function returns true, and later call->prog_array
321 * becomes false inside rcu_read_lock/unlock region,
322 * we bail out then. If this function return false,
323 * there is a risk that we might miss a few events if the checking
324 * were delayed until inside rcu_read_lock/unlock region and
325 * call->prog_array happened to become non-NULL then.
326 *
327 * Here, READ_ONCE() is used instead of rcu_access_pointer().
328 * rcu_access_pointer() requires the actual definition of
329 * "struct bpf_prog_array" while READ_ONCE() only needs
330 * a declaration of the same type.
331 */
332 return !!READ_ONCE(call->prog_array);
333}
334#endif
335
de7b2973 336static inline const char *
687fcc4a 337trace_event_name(struct trace_event_call *call)
de7b2973
MD
338{
339 if (call->flags & TRACE_EVENT_FL_TRACEPOINT)
340 return call->tp ? call->tp->name : NULL;
341 else
342 return call->name;
343}
344
0aeb1def
CW
345static inline struct list_head *
346trace_get_fields(struct trace_event_call *event_call)
347{
348 if (!event_call->class->get_fields)
349 return &event_call->class->fields;
350 return event_call->class->get_fields(event_call);
351}
352
ae63b31e 353struct trace_array;
7967b3e0 354struct trace_subsystem_dir;
ae63b31e
SR
355
356enum {
5d6ad960
SRRH
357 EVENT_FILE_FL_ENABLED_BIT,
358 EVENT_FILE_FL_RECORDED_CMD_BIT,
d914ba37 359 EVENT_FILE_FL_RECORDED_TGID_BIT,
5d6ad960
SRRH
360 EVENT_FILE_FL_FILTERED_BIT,
361 EVENT_FILE_FL_NO_SET_FILTER_BIT,
362 EVENT_FILE_FL_SOFT_MODE_BIT,
363 EVENT_FILE_FL_SOFT_DISABLED_BIT,
364 EVENT_FILE_FL_TRIGGER_MODE_BIT,
365 EVENT_FILE_FL_TRIGGER_COND_BIT,
3fdaf80f 366 EVENT_FILE_FL_PID_FILTER_BIT,
065e63f9 367 EVENT_FILE_FL_WAS_ENABLED_BIT,
ae63b31e
SR
368};
369
e3e2a2cc
TZ
370extern struct trace_event_file *trace_get_event_file(const char *instance,
371 const char *system,
372 const char *event);
373extern void trace_put_event_file(struct trace_event_file *file);
374
86c5426b
TZ
375#define MAX_DYNEVENT_CMD_LEN (2048)
376
377enum dynevent_type {
35ca5207 378 DYNEVENT_TYPE_SYNTH = 1,
2a588dd1 379 DYNEVENT_TYPE_KPROBE,
86c5426b
TZ
380 DYNEVENT_TYPE_NONE,
381};
382
383struct dynevent_cmd;
384
385typedef int (*dynevent_create_fn_t)(struct dynevent_cmd *cmd);
386
387struct dynevent_cmd {
2b90927c 388 struct seq_buf seq;
86c5426b 389 const char *event_name;
86c5426b
TZ
390 unsigned int n_fields;
391 enum dynevent_type type;
392 dynevent_create_fn_t run_command;
393 void *private_data;
394};
395
396extern int dynevent_create(struct dynevent_cmd *cmd);
397
f5f6b255
TZ
398extern int synth_event_delete(const char *name);
399
35ca5207
TZ
400extern void synth_event_cmd_init(struct dynevent_cmd *cmd,
401 char *buf, int maxlen);
402
403extern int __synth_event_gen_cmd_start(struct dynevent_cmd *cmd,
404 const char *name,
405 struct module *mod, ...);
406
407#define synth_event_gen_cmd_start(cmd, name, mod, ...) \
408 __synth_event_gen_cmd_start(cmd, name, mod, ## __VA_ARGS__, NULL)
409
410struct synth_field_desc {
411 const char *type;
412 const char *name;
413};
414
415extern int synth_event_gen_cmd_array_start(struct dynevent_cmd *cmd,
416 const char *name,
417 struct module *mod,
418 struct synth_field_desc *fields,
419 unsigned int n_fields);
420extern int synth_event_create(const char *name,
421 struct synth_field_desc *fields,
422 unsigned int n_fields, struct module *mod);
423
424extern int synth_event_add_field(struct dynevent_cmd *cmd,
425 const char *type,
426 const char *name);
427extern int synth_event_add_field_str(struct dynevent_cmd *cmd,
428 const char *type_name);
429extern int synth_event_add_fields(struct dynevent_cmd *cmd,
430 struct synth_field_desc *fields,
431 unsigned int n_fields);
432
433#define synth_event_gen_cmd_end(cmd) \
434 dynevent_create(cmd)
435
8dcc53ad
TZ
436struct synth_event;
437
438struct synth_event_trace_state {
439 struct trace_event_buffer fbuffer;
440 struct synth_trace_event *entry;
441 struct trace_buffer *buffer;
442 struct synth_event *event;
443 unsigned int cur_field;
444 unsigned int n_u64;
7276531d 445 bool disabled;
8dcc53ad
TZ
446 bool add_next;
447 bool add_name;
448};
449
450extern int synth_event_trace(struct trace_event_file *file,
451 unsigned int n_vals, ...);
452extern int synth_event_trace_array(struct trace_event_file *file, u64 *vals,
453 unsigned int n_vals);
454extern int synth_event_trace_start(struct trace_event_file *file,
455 struct synth_event_trace_state *trace_state);
456extern int synth_event_add_next_val(u64 val,
457 struct synth_event_trace_state *trace_state);
458extern int synth_event_add_val(const char *field_name, u64 val,
459 struct synth_event_trace_state *trace_state);
460extern int synth_event_trace_end(struct synth_event_trace_state *trace_state);
461
2a588dd1
TZ
462extern int kprobe_event_delete(const char *name);
463
464extern void kprobe_event_cmd_init(struct dynevent_cmd *cmd,
465 char *buf, int maxlen);
466
467#define kprobe_event_gen_cmd_start(cmd, name, loc, ...) \
468 __kprobe_event_gen_cmd_start(cmd, false, name, loc, ## __VA_ARGS__, NULL)
469
470#define kretprobe_event_gen_cmd_start(cmd, name, loc, ...) \
471 __kprobe_event_gen_cmd_start(cmd, true, name, loc, ## __VA_ARGS__, NULL)
472
473extern int __kprobe_event_gen_cmd_start(struct dynevent_cmd *cmd,
474 bool kretprobe,
475 const char *name,
476 const char *loc, ...);
477
478#define kprobe_event_add_fields(cmd, ...) \
479 __kprobe_event_add_fields(cmd, ## __VA_ARGS__, NULL)
480
481#define kprobe_event_add_field(cmd, field) \
482 __kprobe_event_add_fields(cmd, field, NULL)
483
484extern int __kprobe_event_add_fields(struct dynevent_cmd *cmd, ...);
485
486#define kprobe_event_gen_cmd_end(cmd) \
487 dynevent_create(cmd)
488
489#define kretprobe_event_gen_cmd_end(cmd) \
490 dynevent_create(cmd)
491
ae63b31e 492/*
5d6ad960 493 * Event file flags:
57d01ad0 494 * ENABLED - The event is enabled
ae63b31e 495 * RECORDED_CMD - The comms should be recorded at sched_switch
d914ba37 496 * RECORDED_TGID - The tgids should be recorded at sched_switch
f306cc82
TZ
497 * FILTERED - The event has a filter attached
498 * NO_SET_FILTER - Set when filter has error and is to be ignored
417944c4
SRRH
499 * SOFT_MODE - The event is enabled/disabled by SOFT_DISABLED
500 * SOFT_DISABLED - When set, do not trace the event (even though its
501 * tracepoint may be enabled)
85f2b082 502 * TRIGGER_MODE - When set, invoke the triggers associated with the event
bac5fb97 503 * TRIGGER_COND - When set, one or more triggers has an associated filter
3fdaf80f 504 * PID_FILTER - When set, the event is filtered based on pid
065e63f9 505 * WAS_ENABLED - Set when enabled to know to clear trace on module removal
ae63b31e
SR
506 */
507enum {
5d6ad960
SRRH
508 EVENT_FILE_FL_ENABLED = (1 << EVENT_FILE_FL_ENABLED_BIT),
509 EVENT_FILE_FL_RECORDED_CMD = (1 << EVENT_FILE_FL_RECORDED_CMD_BIT),
d914ba37 510 EVENT_FILE_FL_RECORDED_TGID = (1 << EVENT_FILE_FL_RECORDED_TGID_BIT),
5d6ad960
SRRH
511 EVENT_FILE_FL_FILTERED = (1 << EVENT_FILE_FL_FILTERED_BIT),
512 EVENT_FILE_FL_NO_SET_FILTER = (1 << EVENT_FILE_FL_NO_SET_FILTER_BIT),
513 EVENT_FILE_FL_SOFT_MODE = (1 << EVENT_FILE_FL_SOFT_MODE_BIT),
514 EVENT_FILE_FL_SOFT_DISABLED = (1 << EVENT_FILE_FL_SOFT_DISABLED_BIT),
515 EVENT_FILE_FL_TRIGGER_MODE = (1 << EVENT_FILE_FL_TRIGGER_MODE_BIT),
516 EVENT_FILE_FL_TRIGGER_COND = (1 << EVENT_FILE_FL_TRIGGER_COND_BIT),
3fdaf80f 517 EVENT_FILE_FL_PID_FILTER = (1 << EVENT_FILE_FL_PID_FILTER_BIT),
065e63f9 518 EVENT_FILE_FL_WAS_ENABLED = (1 << EVENT_FILE_FL_WAS_ENABLED_BIT),
ae63b31e
SR
519};
520
7f1d2f82 521struct trace_event_file {
ae63b31e 522 struct list_head list;
2425bcb9 523 struct trace_event_call *event_call;
f86f4180 524 struct event_filter __rcu *filter;
ae63b31e
SR
525 struct dentry *dir;
526 struct trace_array *tr;
7967b3e0 527 struct trace_subsystem_dir *system;
85f2b082 528 struct list_head triggers;
97f20251 529
553552ce
SR
530 /*
531 * 32 bit flags:
57d01ad0
SRRH
532 * bit 0: enabled
533 * bit 1: enabled cmd record
417944c4
SRRH
534 * bit 2: enable/disable with the soft disable bit
535 * bit 3: soft disabled
85f2b082 536 * bit 4: trigger enabled
553552ce 537 *
417944c4
SRRH
538 * Note: The bits must be set atomically to prevent races
539 * from other writers. Reads of flags do not need to be in
540 * sync as they occur in critical sections. But the way flags
ae63b31e 541 * is currently used, these changes do not affect the code
1eaa4787
SR
542 * except that when a change is made, it may have a slight
543 * delay in propagating the changes to other CPUs due to
417944c4 544 * caching and such. Which is mostly OK ;-)
553552ce 545 */
417944c4 546 unsigned long flags;
1cf4c073 547 atomic_t sm_ref; /* soft-mode reference counter */
85f2b082 548 atomic_t tm_ref; /* trigger-mode reference counter */
97f20251
SR
549};
550
53cf810b
FW
551#define __TRACE_EVENT_FLAGS(name, value) \
552 static int __init trace_init_flags_##name(void) \
553 { \
de7b2973 554 event_##name.flags |= value; \
53cf810b
FW
555 return 0; \
556 } \
557 early_initcall(trace_init_flags_##name);
558
d5b5f391 559#define __TRACE_EVENT_PERF_PERM(name, expr...) \
2425bcb9 560 static int perf_perm_##name(struct trace_event_call *tp_event, \
d5b5f391
PZ
561 struct perf_event *p_event) \
562 { \
563 return ({ expr; }); \
564 } \
565 static int __init trace_init_perf_perm_##name(void) \
566 { \
567 event_##name.perf_perm = &perf_perm_##name; \
568 return 0; \
569 } \
570 early_initcall(trace_init_perf_perm_##name);
571
97d5a220 572#define PERF_MAX_TRACE_SIZE 2048
20ab4425 573
16bb8eb1 574#define MAX_FILTER_STR_VAL 256 /* Should handle KSYM_SYMBOL_LEN */
97f20251 575
85f2b082
TZ
576enum event_trigger_type {
577 ETT_NONE = (0),
2a2df321 578 ETT_TRACE_ONOFF = (1 << 0),
93e31ffb 579 ETT_SNAPSHOT = (1 << 1),
f21ecbb3 580 ETT_STACKTRACE = (1 << 2),
7862ad18 581 ETT_EVENT_ENABLE = (1 << 3),
7ef224d1 582 ETT_EVENT_HIST = (1 << 4),
d0bad49b 583 ETT_HIST_ENABLE = (1 << 5),
85f2b082
TZ
584};
585
6fb2915d 586extern int filter_match_preds(struct event_filter *filter, void *rec);
f306cc82 587
1ac4f51c
TZ
588extern enum event_trigger_type
589event_triggers_call(struct trace_event_file *file, void *rec,
590 struct ring_buffer_event *event);
591extern void
592event_triggers_post_call(struct trace_event_file *file,
c94e45bc 593 enum event_trigger_type tt);
97f20251 594
3fdaf80f
SRRH
595bool trace_event_ignore_this_pid(struct trace_event_file *trace_file);
596
13a1e4ae 597/**
09a5059a 598 * trace_trigger_soft_disabled - do triggers and test if soft disabled
13a1e4ae
SRRH
599 * @file: The file pointer of the event to test
600 *
601 * If any triggers without filters are attached to this event, they
602 * will be called here. If the event is soft disabled and has no
603 * triggers that require testing the fields, it will return true,
604 * otherwise false.
605 */
606static inline bool
09a5059a 607trace_trigger_soft_disabled(struct trace_event_file *file)
13a1e4ae
SRRH
608{
609 unsigned long eflags = file->flags;
610
5d6ad960
SRRH
611 if (!(eflags & EVENT_FILE_FL_TRIGGER_COND)) {
612 if (eflags & EVENT_FILE_FL_TRIGGER_MODE)
1ac4f51c 613 event_triggers_call(file, NULL, NULL);
5d6ad960 614 if (eflags & EVENT_FILE_FL_SOFT_DISABLED)
13a1e4ae 615 return true;
3fdaf80f
SRRH
616 if (eflags & EVENT_FILE_FL_PID_FILTER)
617 return trace_event_ignore_this_pid(file);
13a1e4ae
SRRH
618 }
619 return false;
620}
621
098d2164 622#ifdef CONFIG_BPF_EVENTS
e87c6bc3
YS
623unsigned int trace_call_bpf(struct trace_event_call *call, void *ctx);
624int perf_event_attach_bpf_prog(struct perf_event *event, struct bpf_prog *prog);
625void perf_event_detach_bpf_prog(struct perf_event *event);
f4e2298e 626int perf_event_query_prog_array(struct perf_event *event, void __user *info);
c4f6699d
AS
627int bpf_probe_register(struct bpf_raw_event_map *btp, struct bpf_prog *prog);
628int bpf_probe_unregister(struct bpf_raw_event_map *btp, struct bpf_prog *prog);
a38d1107
MM
629struct bpf_raw_event_map *bpf_get_raw_tracepoint(const char *name);
630void bpf_put_raw_tracepoint(struct bpf_raw_event_map *btp);
41bdc4b4
YS
631int bpf_get_perf_event_info(const struct perf_event *event, u32 *prog_id,
632 u32 *fd_type, const char **buf,
633 u64 *probe_offset, u64 *probe_addr);
2541517c 634#else
e87c6bc3 635static inline unsigned int trace_call_bpf(struct trace_event_call *call, void *ctx)
2541517c
AS
636{
637 return 1;
638}
e87c6bc3
YS
639
640static inline int
641perf_event_attach_bpf_prog(struct perf_event *event, struct bpf_prog *prog)
642{
643 return -EOPNOTSUPP;
644}
645
646static inline void perf_event_detach_bpf_prog(struct perf_event *event) { }
647
f4e2298e
YS
648static inline int
649perf_event_query_prog_array(struct perf_event *event, void __user *info)
650{
651 return -EOPNOTSUPP;
652}
c4f6699d
AS
653static inline int bpf_probe_register(struct bpf_raw_event_map *btp, struct bpf_prog *p)
654{
655 return -EOPNOTSUPP;
656}
657static inline int bpf_probe_unregister(struct bpf_raw_event_map *btp, struct bpf_prog *p)
658{
659 return -EOPNOTSUPP;
660}
a38d1107 661static inline struct bpf_raw_event_map *bpf_get_raw_tracepoint(const char *name)
c4f6699d
AS
662{
663 return NULL;
664}
a38d1107
MM
665static inline void bpf_put_raw_tracepoint(struct bpf_raw_event_map *btp)
666{
667}
41bdc4b4
YS
668static inline int bpf_get_perf_event_info(const struct perf_event *event,
669 u32 *prog_id, u32 *fd_type,
670 const char **buf, u64 *probe_offset,
671 u64 *probe_addr)
672{
673 return -EOPNOTSUPP;
674}
2541517c
AS
675#endif
676
43b51ead
LZ
677enum {
678 FILTER_OTHER = 0,
679 FILTER_STATIC_STRING,
680 FILTER_DYN_STRING,
87a342f5 681 FILTER_PTR_STRING,
02aa3162 682 FILTER_TRACE_FN,
e57cbaf0
SRRH
683 FILTER_COMM,
684 FILTER_CPU,
43b51ead
LZ
685};
686
2425bcb9
SRRH
687extern int trace_event_raw_init(struct trace_event_call *call);
688extern int trace_define_field(struct trace_event_call *call, const char *type,
aeaeae11
FW
689 const char *name, int offset, int size,
690 int is_signed, int filter_type);
2425bcb9
SRRH
691extern int trace_add_event_call(struct trace_event_call *call);
692extern int trace_remove_event_call(struct trace_event_call *call);
32bbe007 693extern int trace_event_get_offsets(struct trace_event_call *call);
97f20251 694
d2802d07 695#define is_signed_type(type) (((type)(-1)) < (type)1)
97f20251 696
595a438c 697int ftrace_set_clr_event(struct trace_array *tr, char *buf, int set);
4671c794 698int trace_set_clr_event(const char *system, const char *event, int set);
28879787
DI
699int trace_array_set_clr_event(struct trace_array *tr, const char *system,
700 const char *event, bool enable);
97f20251
SR
701/*
702 * The double __builtin_constant_p is because gcc will give us an error
703 * if we try to allocate the static variable to fmt if it is not a
704 * constant. Even with the outer if statement optimizing out.
705 */
706#define event_trace_printk(ip, fmt, args...) \
707do { \
708 __trace_printk_check_format(fmt, ##args); \
709 tracing_record_cmdline(current); \
710 if (__builtin_constant_p(fmt)) { \
711 static const char *trace_printk_fmt \
33def849 712 __section("__trace_printk_fmt") = \
97f20251
SR
713 __builtin_constant_p(fmt) ? fmt : NULL; \
714 \
715 __trace_bprintk(ip, trace_printk_fmt, ##args); \
716 } else \
717 __trace_printk(ip, fmt, ##args); \
718} while (0)
719
07b139c8 720#ifdef CONFIG_PERF_EVENTS
6fb2915d 721struct perf_event;
c530665c
FW
722
723DECLARE_PER_CPU(struct pt_regs, perf_trace_regs);
9802d865 724DECLARE_PER_CPU(int, bpf_kprobe_override);
c530665c 725
1c024eca
PZ
726extern int perf_trace_init(struct perf_event *event);
727extern void perf_trace_destroy(struct perf_event *event);
a4eaf7f1
PZ
728extern int perf_trace_add(struct perf_event *event, int flags);
729extern void perf_trace_del(struct perf_event *event, int flags);
e12f03d7
SL
730#ifdef CONFIG_KPROBE_EVENTS
731extern int perf_kprobe_init(struct perf_event *event, bool is_retprobe);
732extern void perf_kprobe_destroy(struct perf_event *event);
41bdc4b4
YS
733extern int bpf_get_kprobe_info(const struct perf_event *event,
734 u32 *fd_type, const char **symbol,
735 u64 *probe_offset, u64 *probe_addr,
736 bool perf_type_tracepoint);
e12f03d7 737#endif
33ea4b24 738#ifdef CONFIG_UPROBE_EVENTS
a6ca88b2
SL
739extern int perf_uprobe_init(struct perf_event *event,
740 unsigned long ref_ctr_offset, bool is_retprobe);
33ea4b24 741extern void perf_uprobe_destroy(struct perf_event *event);
41bdc4b4
YS
742extern int bpf_get_uprobe_info(const struct perf_event *event,
743 u32 *fd_type, const char **filename,
744 u64 *probe_offset, bool perf_type_tracepoint);
33ea4b24 745#endif
1c024eca 746extern int ftrace_profile_set_filter(struct perf_event *event, int event_id,
6fb2915d
LZ
747 char *filter_str);
748extern void ftrace_profile_free_filter(struct perf_event *event);
1e1dcd93
AS
749void perf_trace_buf_update(void *record, u16 type);
750void *perf_trace_buf_alloc(int size, struct pt_regs **regs, int *rctxp);
430ad5a6 751
c4f6699d
AS
752void bpf_trace_run1(struct bpf_prog *prog, u64 arg1);
753void bpf_trace_run2(struct bpf_prog *prog, u64 arg1, u64 arg2);
754void bpf_trace_run3(struct bpf_prog *prog, u64 arg1, u64 arg2,
755 u64 arg3);
756void bpf_trace_run4(struct bpf_prog *prog, u64 arg1, u64 arg2,
757 u64 arg3, u64 arg4);
758void bpf_trace_run5(struct bpf_prog *prog, u64 arg1, u64 arg2,
759 u64 arg3, u64 arg4, u64 arg5);
760void bpf_trace_run6(struct bpf_prog *prog, u64 arg1, u64 arg2,
761 u64 arg3, u64 arg4, u64 arg5, u64 arg6);
762void bpf_trace_run7(struct bpf_prog *prog, u64 arg1, u64 arg2,
763 u64 arg3, u64 arg4, u64 arg5, u64 arg6, u64 arg7);
764void bpf_trace_run8(struct bpf_prog *prog, u64 arg1, u64 arg2,
765 u64 arg3, u64 arg4, u64 arg5, u64 arg6, u64 arg7,
766 u64 arg8);
767void bpf_trace_run9(struct bpf_prog *prog, u64 arg1, u64 arg2,
768 u64 arg3, u64 arg4, u64 arg5, u64 arg6, u64 arg7,
769 u64 arg8, u64 arg9);
770void bpf_trace_run10(struct bpf_prog *prog, u64 arg1, u64 arg2,
771 u64 arg3, u64 arg4, u64 arg5, u64 arg6, u64 arg7,
772 u64 arg8, u64 arg9, u64 arg10);
773void bpf_trace_run11(struct bpf_prog *prog, u64 arg1, u64 arg2,
774 u64 arg3, u64 arg4, u64 arg5, u64 arg6, u64 arg7,
775 u64 arg8, u64 arg9, u64 arg10, u64 arg11);
776void bpf_trace_run12(struct bpf_prog *prog, u64 arg1, u64 arg2,
777 u64 arg3, u64 arg4, u64 arg5, u64 arg6, u64 arg7,
778 u64 arg8, u64 arg9, u64 arg10, u64 arg11, u64 arg12);
85b67bcb
AS
779void perf_trace_run_bpf_submit(void *raw_data, int size, int rctx,
780 struct trace_event_call *call, u64 count,
781 struct pt_regs *regs, struct hlist_head *head,
782 struct task_struct *task);
783
430ad5a6 784static inline void
1e1dcd93 785perf_trace_buf_submit(void *raw_data, int size, int rctx, u16 type,
e6dab5ff 786 u64 count, struct pt_regs *regs, void *head,
8fd0fbbe 787 struct task_struct *task)
430ad5a6 788{
8fd0fbbe 789 perf_tp_event(type, count, raw_data, size, regs, head, rctx, task);
430ad5a6 790}
e87c6bc3 791
6fb2915d
LZ
792#endif
793
2425bcb9 794#endif /* _LINUX_TRACE_EVENT_H */