xref: /linux/Documentation/trace/events.rst (revision 34dc1baba215b826e454b8d19e4f24adbeb7d00d)
1=============
2Event Tracing
3=============
4
5:Author: Theodore Ts'o
6:Updated: Li Zefan and Tom Zanussi
7
81. Introduction
9===============
10
11Tracepoints (see Documentation/trace/tracepoints.rst) can be used
12without creating custom kernel modules to register probe functions
13using the event tracing infrastructure.
14
15Not all tracepoints can be traced using the event tracing system;
16the kernel developer must provide code snippets which define how the
17tracing information is saved into the tracing buffer, and how the
18tracing information should be printed.
19
202. Using Event Tracing
21======================
22
232.1 Via the 'set_event' interface
24---------------------------------
25
26The events which are available for tracing can be found in the file
27/sys/kernel/tracing/available_events.
28
29To enable a particular event, such as 'sched_wakeup', simply echo it
30to /sys/kernel/tracing/set_event. For example::
31
32	# echo sched_wakeup >> /sys/kernel/tracing/set_event
33
34.. Note:: '>>' is necessary, otherwise it will firstly disable all the events.
35
36To disable an event, echo the event name to the set_event file prefixed
37with an exclamation point::
38
39	# echo '!sched_wakeup' >> /sys/kernel/tracing/set_event
40
41To disable all events, echo an empty line to the set_event file::
42
43	# echo > /sys/kernel/tracing/set_event
44
45To enable all events, echo ``*:*`` or ``*:`` to the set_event file::
46
47	# echo *:* > /sys/kernel/tracing/set_event
48
49The events are organized into subsystems, such as ext4, irq, sched,
50etc., and a full event name looks like this: <subsystem>:<event>.  The
51subsystem name is optional, but it is displayed in the available_events
52file.  All of the events in a subsystem can be specified via the syntax
53``<subsystem>:*``; for example, to enable all irq events, you can use the
54command::
55
56	# echo 'irq:*' > /sys/kernel/tracing/set_event
57
582.2 Via the 'enable' toggle
59---------------------------
60
61The events available are also listed in /sys/kernel/tracing/events/ hierarchy
62of directories.
63
64To enable event 'sched_wakeup'::
65
66	# echo 1 > /sys/kernel/tracing/events/sched/sched_wakeup/enable
67
68To disable it::
69
70	# echo 0 > /sys/kernel/tracing/events/sched/sched_wakeup/enable
71
72To enable all events in sched subsystem::
73
74	# echo 1 > /sys/kernel/tracing/events/sched/enable
75
76To enable all events::
77
78	# echo 1 > /sys/kernel/tracing/events/enable
79
80When reading one of these enable files, there are four results:
81
82 - 0 - all events this file affects are disabled
83 - 1 - all events this file affects are enabled
84 - X - there is a mixture of events enabled and disabled
85 - ? - this file does not affect any event
86
872.3 Boot option
88---------------
89
90In order to facilitate early boot debugging, use boot option::
91
92	trace_event=[event-list]
93
94event-list is a comma separated list of events. See section 2.1 for event
95format.
96
973. Defining an event-enabled tracepoint
98=======================================
99
100See The example provided in samples/trace_events
101
1024. Event formats
103================
104
105Each trace event has a 'format' file associated with it that contains
106a description of each field in a logged event.  This information can
107be used to parse the binary trace stream, and is also the place to
108find the field names that can be used in event filters (see section 5).
109
110It also displays the format string that will be used to print the
111event in text mode, along with the event name and ID used for
112profiling.
113
114Every event has a set of ``common`` fields associated with it; these are
115the fields prefixed with ``common_``.  The other fields vary between
116events and correspond to the fields defined in the TRACE_EVENT
117definition for that event.
118
119Each field in the format has the form::
120
121     field:field-type field-name; offset:N; size:N;
122
123where offset is the offset of the field in the trace record and size
124is the size of the data item, in bytes.
125
126For example, here's the information displayed for the 'sched_wakeup'
127event::
128
129	# cat /sys/kernel/tracing/events/sched/sched_wakeup/format
130
131	name: sched_wakeup
132	ID: 60
133	format:
134		field:unsigned short common_type;	offset:0;	size:2;
135		field:unsigned char common_flags;	offset:2;	size:1;
136		field:unsigned char common_preempt_count;	offset:3;	size:1;
137		field:int common_pid;	offset:4;	size:4;
138		field:int common_tgid;	offset:8;	size:4;
139
140		field:char comm[TASK_COMM_LEN];	offset:12;	size:16;
141		field:pid_t pid;	offset:28;	size:4;
142		field:int prio;	offset:32;	size:4;
143		field:int success;	offset:36;	size:4;
144		field:int cpu;	offset:40;	size:4;
145
146	print fmt: "task %s:%d [%d] success=%d [%03d]", REC->comm, REC->pid,
147		   REC->prio, REC->success, REC->cpu
148
149This event contains 10 fields, the first 5 common and the remaining 5
150event-specific.  All the fields for this event are numeric, except for
151'comm' which is a string, a distinction important for event filtering.
152
1535. Event filtering
154==================
155
156Trace events can be filtered in the kernel by associating boolean
157'filter expressions' with them.  As soon as an event is logged into
158the trace buffer, its fields are checked against the filter expression
159associated with that event type.  An event with field values that
160'match' the filter will appear in the trace output, and an event whose
161values don't match will be discarded.  An event with no filter
162associated with it matches everything, and is the default when no
163filter has been set for an event.
164
1655.1 Expression syntax
166---------------------
167
168A filter expression consists of one or more 'predicates' that can be
169combined using the logical operators '&&' and '||'.  A predicate is
170simply a clause that compares the value of a field contained within a
171logged event with a constant value and returns either 0 or 1 depending
172on whether the field value matched (1) or didn't match (0)::
173
174	  field-name relational-operator value
175
176Parentheses can be used to provide arbitrary logical groupings and
177double-quotes can be used to prevent the shell from interpreting
178operators as shell metacharacters.
179
180The field-names available for use in filters can be found in the
181'format' files for trace events (see section 4).
182
183The relational-operators depend on the type of the field being tested:
184
185The operators available for numeric fields are:
186
187==, !=, <, <=, >, >=, &
188
189And for string fields they are:
190
191==, !=, ~
192
193The glob (~) accepts a wild card character (\*,?) and character classes
194([). For example::
195
196  prev_comm ~ "*sh"
197  prev_comm ~ "sh*"
198  prev_comm ~ "*sh*"
199  prev_comm ~ "ba*sh"
200
201If the field is a pointer that points into user space (for example
202"filename" from sys_enter_openat), then you have to append ".ustring" to the
203field name::
204
205  filename.ustring ~ "password"
206
207As the kernel will have to know how to retrieve the memory that the pointer
208is at from user space.
209
210You can convert any long type to a function address and search by function name::
211
212  call_site.function == security_prepare_creds
213
214The above will filter when the field "call_site" falls on the address within
215"security_prepare_creds". That is, it will compare the value of "call_site" and
216the filter will return true if it is greater than or equal to the start of
217the function "security_prepare_creds" and less than the end of that function.
218
219The ".function" postfix can only be attached to values of size long, and can only
220be compared with "==" or "!=".
221
222Cpumask fields or scalar fields that encode a CPU number can be filtered using
223a user-provided cpumask in cpulist format. The format is as follows::
224
225  CPUS{$cpulist}
226
227Operators available to cpumask filtering are:
228
229& (intersection), ==, !=
230
231For example, this will filter events that have their .target_cpu field present
232in the given cpumask::
233
234  target_cpu & CPUS{17-42}
235
2365.2 Setting filters
237-------------------
238
239A filter for an individual event is set by writing a filter expression
240to the 'filter' file for the given event.
241
242For example::
243
244	# cd /sys/kernel/tracing/events/sched/sched_wakeup
245	# echo "common_preempt_count > 4" > filter
246
247A slightly more involved example::
248
249	# cd /sys/kernel/tracing/events/signal/signal_generate
250	# echo "((sig >= 10 && sig < 15) || sig == 17) && comm != bash" > filter
251
252If there is an error in the expression, you'll get an 'Invalid
253argument' error when setting it, and the erroneous string along with
254an error message can be seen by looking at the filter e.g.::
255
256	# cd /sys/kernel/tracing/events/signal/signal_generate
257	# echo "((sig >= 10 && sig < 15) || dsig == 17) && comm != bash" > filter
258	-bash: echo: write error: Invalid argument
259	# cat filter
260	((sig >= 10 && sig < 15) || dsig == 17) && comm != bash
261	^
262	parse_error: Field not found
263
264Currently the caret ('^') for an error always appears at the beginning of
265the filter string; the error message should still be useful though
266even without more accurate position info.
267
2685.2.1 Filter limitations
269------------------------
270
271If a filter is placed on a string pointer ``(char *)`` that does not point
272to a string on the ring buffer, but instead points to kernel or user space
273memory, then, for safety reasons, at most 1024 bytes of the content is
274copied onto a temporary buffer to do the compare. If the copy of the memory
275faults (the pointer points to memory that should not be accessed), then the
276string compare will be treated as not matching.
277
2785.3 Clearing filters
279--------------------
280
281To clear the filter for an event, write a '0' to the event's filter
282file.
283
284To clear the filters for all events in a subsystem, write a '0' to the
285subsystem's filter file.
286
2875.4 Subsystem filters
288---------------------
289
290For convenience, filters for every event in a subsystem can be set or
291cleared as a group by writing a filter expression into the filter file
292at the root of the subsystem.  Note however, that if a filter for any
293event within the subsystem lacks a field specified in the subsystem
294filter, or if the filter can't be applied for any other reason, the
295filter for that event will retain its previous setting.  This can
296result in an unintended mixture of filters which could lead to
297confusing (to the user who might think different filters are in
298effect) trace output.  Only filters that reference just the common
299fields can be guaranteed to propagate successfully to all events.
300
301Here are a few subsystem filter examples that also illustrate the
302above points:
303
304Clear the filters on all events in the sched subsystem::
305
306	# cd /sys/kernel/tracing/events/sched
307	# echo 0 > filter
308	# cat sched_switch/filter
309	none
310	# cat sched_wakeup/filter
311	none
312
313Set a filter using only common fields for all events in the sched
314subsystem (all events end up with the same filter)::
315
316	# cd /sys/kernel/tracing/events/sched
317	# echo common_pid == 0 > filter
318	# cat sched_switch/filter
319	common_pid == 0
320	# cat sched_wakeup/filter
321	common_pid == 0
322
323Attempt to set a filter using a non-common field for all events in the
324sched subsystem (all events but those that have a prev_pid field retain
325their old filters)::
326
327	# cd /sys/kernel/tracing/events/sched
328	# echo prev_pid == 0 > filter
329	# cat sched_switch/filter
330	prev_pid == 0
331	# cat sched_wakeup/filter
332	common_pid == 0
333
3345.5 PID filtering
335-----------------
336
337The set_event_pid file in the same directory as the top events directory
338exists, will filter all events from tracing any task that does not have the
339PID listed in the set_event_pid file.
340::
341
342	# cd /sys/kernel/tracing
343	# echo $$ > set_event_pid
344	# echo 1 > events/enable
345
346Will only trace events for the current task.
347
348To add more PIDs without losing the PIDs already included, use '>>'.
349::
350
351	# echo 123 244 1 >> set_event_pid
352
353
3546. Event triggers
355=================
356
357Trace events can be made to conditionally invoke trigger 'commands'
358which can take various forms and are described in detail below;
359examples would be enabling or disabling other trace events or invoking
360a stack trace whenever the trace event is hit.  Whenever a trace event
361with attached triggers is invoked, the set of trigger commands
362associated with that event is invoked.  Any given trigger can
363additionally have an event filter of the same form as described in
364section 5 (Event filtering) associated with it - the command will only
365be invoked if the event being invoked passes the associated filter.
366If no filter is associated with the trigger, it always passes.
367
368Triggers are added to and removed from a particular event by writing
369trigger expressions to the 'trigger' file for the given event.
370
371A given event can have any number of triggers associated with it,
372subject to any restrictions that individual commands may have in that
373regard.
374
375Event triggers are implemented on top of "soft" mode, which means that
376whenever a trace event has one or more triggers associated with it,
377the event is activated even if it isn't actually enabled, but is
378disabled in a "soft" mode.  That is, the tracepoint will be called,
379but just will not be traced, unless of course it's actually enabled.
380This scheme allows triggers to be invoked even for events that aren't
381enabled, and also allows the current event filter implementation to be
382used for conditionally invoking triggers.
383
384The syntax for event triggers is roughly based on the syntax for
385set_ftrace_filter 'ftrace filter commands' (see the 'Filter commands'
386section of Documentation/trace/ftrace.rst), but there are major
387differences and the implementation isn't currently tied to it in any
388way, so beware about making generalizations between the two.
389
390.. Note::
391     Writing into trace_marker (See Documentation/trace/ftrace.rst)
392     can also enable triggers that are written into
393     /sys/kernel/tracing/events/ftrace/print/trigger
394
3956.1 Expression syntax
396---------------------
397
398Triggers are added by echoing the command to the 'trigger' file::
399
400  # echo 'command[:count] [if filter]' > trigger
401
402Triggers are removed by echoing the same command but starting with '!'
403to the 'trigger' file::
404
405  # echo '!command[:count] [if filter]' > trigger
406
407The [if filter] part isn't used in matching commands when removing, so
408leaving that off in a '!' command will accomplish the same thing as
409having it in.
410
411The filter syntax is the same as that described in the 'Event
412filtering' section above.
413
414For ease of use, writing to the trigger file using '>' currently just
415adds or removes a single trigger and there's no explicit '>>' support
416('>' actually behaves like '>>') or truncation support to remove all
417triggers (you have to use '!' for each one added.)
418
4196.2 Supported trigger commands
420------------------------------
421
422The following commands are supported:
423
424- enable_event/disable_event
425
426  These commands can enable or disable another trace event whenever
427  the triggering event is hit.  When these commands are registered,
428  the other trace event is activated, but disabled in a "soft" mode.
429  That is, the tracepoint will be called, but just will not be traced.
430  The event tracepoint stays in this mode as long as there's a trigger
431  in effect that can trigger it.
432
433  For example, the following trigger causes kmalloc events to be
434  traced when a read system call is entered, and the :1 at the end
435  specifies that this enablement happens only once::
436
437	  # echo 'enable_event:kmem:kmalloc:1' > \
438	      /sys/kernel/tracing/events/syscalls/sys_enter_read/trigger
439
440  The following trigger causes kmalloc events to stop being traced
441  when a read system call exits.  This disablement happens on every
442  read system call exit::
443
444	  # echo 'disable_event:kmem:kmalloc' > \
445	      /sys/kernel/tracing/events/syscalls/sys_exit_read/trigger
446
447  The format is::
448
449      enable_event:<system>:<event>[:count]
450      disable_event:<system>:<event>[:count]
451
452  To remove the above commands::
453
454	  # echo '!enable_event:kmem:kmalloc:1' > \
455	      /sys/kernel/tracing/events/syscalls/sys_enter_read/trigger
456
457	  # echo '!disable_event:kmem:kmalloc' > \
458	      /sys/kernel/tracing/events/syscalls/sys_exit_read/trigger
459
460  Note that there can be any number of enable/disable_event triggers
461  per triggering event, but there can only be one trigger per
462  triggered event. e.g. sys_enter_read can have triggers enabling both
463  kmem:kmalloc and sched:sched_switch, but can't have two kmem:kmalloc
464  versions such as kmem:kmalloc and kmem:kmalloc:1 or 'kmem:kmalloc if
465  bytes_req == 256' and 'kmem:kmalloc if bytes_alloc == 256' (they
466  could be combined into a single filter on kmem:kmalloc though).
467
468- stacktrace
469
470  This command dumps a stacktrace in the trace buffer whenever the
471  triggering event occurs.
472
473  For example, the following trigger dumps a stacktrace every time the
474  kmalloc tracepoint is hit::
475
476	  # echo 'stacktrace' > \
477		/sys/kernel/tracing/events/kmem/kmalloc/trigger
478
479  The following trigger dumps a stacktrace the first 5 times a kmalloc
480  request happens with a size >= 64K::
481
482	  # echo 'stacktrace:5 if bytes_req >= 65536' > \
483		/sys/kernel/tracing/events/kmem/kmalloc/trigger
484
485  The format is::
486
487      stacktrace[:count]
488
489  To remove the above commands::
490
491	  # echo '!stacktrace' > \
492		/sys/kernel/tracing/events/kmem/kmalloc/trigger
493
494	  # echo '!stacktrace:5 if bytes_req >= 65536' > \
495		/sys/kernel/tracing/events/kmem/kmalloc/trigger
496
497  The latter can also be removed more simply by the following (without
498  the filter)::
499
500	  # echo '!stacktrace:5' > \
501		/sys/kernel/tracing/events/kmem/kmalloc/trigger
502
503  Note that there can be only one stacktrace trigger per triggering
504  event.
505
506- snapshot
507
508  This command causes a snapshot to be triggered whenever the
509  triggering event occurs.
510
511  The following command creates a snapshot every time a block request
512  queue is unplugged with a depth > 1.  If you were tracing a set of
513  events or functions at the time, the snapshot trace buffer would
514  capture those events when the trigger event occurred::
515
516	  # echo 'snapshot if nr_rq > 1' > \
517		/sys/kernel/tracing/events/block/block_unplug/trigger
518
519  To only snapshot once::
520
521	  # echo 'snapshot:1 if nr_rq > 1' > \
522		/sys/kernel/tracing/events/block/block_unplug/trigger
523
524  To remove the above commands::
525
526	  # echo '!snapshot if nr_rq > 1' > \
527		/sys/kernel/tracing/events/block/block_unplug/trigger
528
529	  # echo '!snapshot:1 if nr_rq > 1' > \
530		/sys/kernel/tracing/events/block/block_unplug/trigger
531
532  Note that there can be only one snapshot trigger per triggering
533  event.
534
535- traceon/traceoff
536
537  These commands turn tracing on and off when the specified events are
538  hit. The parameter determines how many times the tracing system is
539  turned on and off. If unspecified, there is no limit.
540
541  The following command turns tracing off the first time a block
542  request queue is unplugged with a depth > 1.  If you were tracing a
543  set of events or functions at the time, you could then examine the
544  trace buffer to see the sequence of events that led up to the
545  trigger event::
546
547	  # echo 'traceoff:1 if nr_rq > 1' > \
548		/sys/kernel/tracing/events/block/block_unplug/trigger
549
550  To always disable tracing when nr_rq  > 1::
551
552	  # echo 'traceoff if nr_rq > 1' > \
553		/sys/kernel/tracing/events/block/block_unplug/trigger
554
555  To remove the above commands::
556
557	  # echo '!traceoff:1 if nr_rq > 1' > \
558		/sys/kernel/tracing/events/block/block_unplug/trigger
559
560	  # echo '!traceoff if nr_rq > 1' > \
561		/sys/kernel/tracing/events/block/block_unplug/trigger
562
563  Note that there can be only one traceon or traceoff trigger per
564  triggering event.
565
566- hist
567
568  This command aggregates event hits into a hash table keyed on one or
569  more trace event format fields (or stacktrace) and a set of running
570  totals derived from one or more trace event format fields and/or
571  event counts (hitcount).
572
573  See Documentation/trace/histogram.rst for details and examples.
574
5757. In-kernel trace event API
576============================
577
578In most cases, the command-line interface to trace events is more than
579sufficient.  Sometimes, however, applications might find the need for
580more complex relationships than can be expressed through a simple
581series of linked command-line expressions, or putting together sets of
582commands may be simply too cumbersome.  An example might be an
583application that needs to 'listen' to the trace stream in order to
584maintain an in-kernel state machine detecting, for instance, when an
585illegal kernel state occurs in the scheduler.
586
587The trace event subsystem provides an in-kernel API allowing modules
588or other kernel code to generate user-defined 'synthetic' events at
589will, which can be used to either augment the existing trace stream
590and/or signal that a particular important state has occurred.
591
592A similar in-kernel API is also available for creating kprobe and
593kretprobe events.
594
595Both the synthetic event and k/ret/probe event APIs are built on top
596of a lower-level "dynevent_cmd" event command API, which is also
597available for more specialized applications, or as the basis of other
598higher-level trace event APIs.
599
600The API provided for these purposes is describe below and allows the
601following:
602
603  - dynamically creating synthetic event definitions
604  - dynamically creating kprobe and kretprobe event definitions
605  - tracing synthetic events from in-kernel code
606  - the low-level "dynevent_cmd" API
607
6087.1 Dyamically creating synthetic event definitions
609---------------------------------------------------
610
611There are a couple ways to create a new synthetic event from a kernel
612module or other kernel code.
613
614The first creates the event in one step, using synth_event_create().
615In this method, the name of the event to create and an array defining
616the fields is supplied to synth_event_create().  If successful, a
617synthetic event with that name and fields will exist following that
618call.  For example, to create a new "schedtest" synthetic event::
619
620  ret = synth_event_create("schedtest", sched_fields,
621                           ARRAY_SIZE(sched_fields), THIS_MODULE);
622
623The sched_fields param in this example points to an array of struct
624synth_field_desc, each of which describes an event field by type and
625name::
626
627  static struct synth_field_desc sched_fields[] = {
628        { .type = "pid_t",              .name = "next_pid_field" },
629        { .type = "char[16]",           .name = "next_comm_field" },
630        { .type = "u64",                .name = "ts_ns" },
631        { .type = "u64",                .name = "ts_ms" },
632        { .type = "unsigned int",       .name = "cpu" },
633        { .type = "char[64]",           .name = "my_string_field" },
634        { .type = "int",                .name = "my_int_field" },
635  };
636
637See synth_field_size() for available types.
638
639If field_name contains [n], the field is considered to be a static array.
640
641If field_names contains[] (no subscript), the field is considered to
642be a dynamic array, which will only take as much space in the event as
643is required to hold the array.
644
645Because space for an event is reserved before assigning field values
646to the event, using dynamic arrays implies that the piecewise
647in-kernel API described below can't be used with dynamic arrays.  The
648other non-piecewise in-kernel APIs can, however, be used with dynamic
649arrays.
650
651If the event is created from within a module, a pointer to the module
652must be passed to synth_event_create().  This will ensure that the
653trace buffer won't contain unreadable events when the module is
654removed.
655
656At this point, the event object is ready to be used for generating new
657events.
658
659In the second method, the event is created in several steps.  This
660allows events to be created dynamically and without the need to create
661and populate an array of fields beforehand.
662
663To use this method, an empty or partially empty synthetic event should
664first be created using synth_event_gen_cmd_start() or
665synth_event_gen_cmd_array_start().  For synth_event_gen_cmd_start(),
666the name of the event along with one or more pairs of args each pair
667representing a 'type field_name;' field specification should be
668supplied.  For synth_event_gen_cmd_array_start(), the name of the
669event along with an array of struct synth_field_desc should be
670supplied. Before calling synth_event_gen_cmd_start() or
671synth_event_gen_cmd_array_start(), the user should create and
672initialize a dynevent_cmd object using synth_event_cmd_init().
673
674For example, to create a new "schedtest" synthetic event with two
675fields::
676
677  struct dynevent_cmd cmd;
678  char *buf;
679
680  /* Create a buffer to hold the generated command */
681  buf = kzalloc(MAX_DYNEVENT_CMD_LEN, GFP_KERNEL);
682
683  /* Before generating the command, initialize the cmd object */
684  synth_event_cmd_init(&cmd, buf, MAX_DYNEVENT_CMD_LEN);
685
686  ret = synth_event_gen_cmd_start(&cmd, "schedtest", THIS_MODULE,
687                                  "pid_t", "next_pid_field",
688                                  "u64", "ts_ns");
689
690Alternatively, using an array of struct synth_field_desc fields
691containing the same information::
692
693  ret = synth_event_gen_cmd_array_start(&cmd, "schedtest", THIS_MODULE,
694                                        fields, n_fields);
695
696Once the synthetic event object has been created, it can then be
697populated with more fields.  Fields are added one by one using
698synth_event_add_field(), supplying the dynevent_cmd object, a field
699type, and a field name.  For example, to add a new int field named
700"intfield", the following call should be made::
701
702  ret = synth_event_add_field(&cmd, "int", "intfield");
703
704See synth_field_size() for available types. If field_name contains [n]
705the field is considered to be an array.
706
707A group of fields can also be added all at once using an array of
708synth_field_desc with add_synth_fields().  For example, this would add
709just the first four sched_fields::
710
711  ret = synth_event_add_fields(&cmd, sched_fields, 4);
712
713If you already have a string of the form 'type field_name',
714synth_event_add_field_str() can be used to add it as-is; it will
715also automatically append a ';' to the string.
716
717Once all the fields have been added, the event should be finalized and
718registered by calling the synth_event_gen_cmd_end() function::
719
720  ret = synth_event_gen_cmd_end(&cmd);
721
722At this point, the event object is ready to be used for tracing new
723events.
724
7257.2 Tracing synthetic events from in-kernel code
726------------------------------------------------
727
728To trace a synthetic event, there are several options.  The first
729option is to trace the event in one call, using synth_event_trace()
730with a variable number of values, or synth_event_trace_array() with an
731array of values to be set.  A second option can be used to avoid the
732need for a pre-formed array of values or list of arguments, via
733synth_event_trace_start() and synth_event_trace_end() along with
734synth_event_add_next_val() or synth_event_add_val() to add the values
735piecewise.
736
7377.2.1 Tracing a synthetic event all at once
738-------------------------------------------
739
740To trace a synthetic event all at once, the synth_event_trace() or
741synth_event_trace_array() functions can be used.
742
743The synth_event_trace() function is passed the trace_event_file
744representing the synthetic event (which can be retrieved using
745trace_get_event_file() using the synthetic event name, "synthetic" as
746the system name, and the trace instance name (NULL if using the global
747trace array)), along with an variable number of u64 args, one for each
748synthetic event field, and the number of values being passed.
749
750So, to trace an event corresponding to the synthetic event definition
751above, code like the following could be used::
752
753  ret = synth_event_trace(create_synth_test, 7, /* number of values */
754                          444,             /* next_pid_field */
755                          (u64)"clackers", /* next_comm_field */
756                          1000000,         /* ts_ns */
757                          1000,            /* ts_ms */
758                          smp_processor_id(),/* cpu */
759                          (u64)"Thneed",   /* my_string_field */
760                          999);            /* my_int_field */
761
762All vals should be cast to u64, and string vals are just pointers to
763strings, cast to u64.  Strings will be copied into space reserved in
764the event for the string, using these pointers.
765
766Alternatively, the synth_event_trace_array() function can be used to
767accomplish the same thing.  It is passed the trace_event_file
768representing the synthetic event (which can be retrieved using
769trace_get_event_file() using the synthetic event name, "synthetic" as
770the system name, and the trace instance name (NULL if using the global
771trace array)), along with an array of u64, one for each synthetic
772event field.
773
774To trace an event corresponding to the synthetic event definition
775above, code like the following could be used::
776
777  u64 vals[7];
778
779  vals[0] = 777;                  /* next_pid_field */
780  vals[1] = (u64)"tiddlywinks";   /* next_comm_field */
781  vals[2] = 1000000;              /* ts_ns */
782  vals[3] = 1000;                 /* ts_ms */
783  vals[4] = smp_processor_id();   /* cpu */
784  vals[5] = (u64)"thneed";        /* my_string_field */
785  vals[6] = 398;                  /* my_int_field */
786
787The 'vals' array is just an array of u64, the number of which must
788match the number of field in the synthetic event, and which must be in
789the same order as the synthetic event fields.
790
791All vals should be cast to u64, and string vals are just pointers to
792strings, cast to u64.  Strings will be copied into space reserved in
793the event for the string, using these pointers.
794
795In order to trace a synthetic event, a pointer to the trace event file
796is needed.  The trace_get_event_file() function can be used to get
797it - it will find the file in the given trace instance (in this case
798NULL since the top trace array is being used) while at the same time
799preventing the instance containing it from going away::
800
801       schedtest_event_file = trace_get_event_file(NULL, "synthetic",
802                                                   "schedtest");
803
804Before tracing the event, it should be enabled in some way, otherwise
805the synthetic event won't actually show up in the trace buffer.
806
807To enable a synthetic event from the kernel, trace_array_set_clr_event()
808can be used (which is not specific to synthetic events, so does need
809the "synthetic" system name to be specified explicitly).
810
811To enable the event, pass 'true' to it::
812
813       trace_array_set_clr_event(schedtest_event_file->tr,
814                                 "synthetic", "schedtest", true);
815
816To disable it pass false::
817
818       trace_array_set_clr_event(schedtest_event_file->tr,
819                                 "synthetic", "schedtest", false);
820
821Finally, synth_event_trace_array() can be used to actually trace the
822event, which should be visible in the trace buffer afterwards::
823
824       ret = synth_event_trace_array(schedtest_event_file, vals,
825                                     ARRAY_SIZE(vals));
826
827To remove the synthetic event, the event should be disabled, and the
828trace instance should be 'put' back using trace_put_event_file()::
829
830       trace_array_set_clr_event(schedtest_event_file->tr,
831                                 "synthetic", "schedtest", false);
832       trace_put_event_file(schedtest_event_file);
833
834If those have been successful, synth_event_delete() can be called to
835remove the event::
836
837       ret = synth_event_delete("schedtest");
838
8397.2.2 Tracing a synthetic event piecewise
840-----------------------------------------
841
842To trace a synthetic using the piecewise method described above, the
843synth_event_trace_start() function is used to 'open' the synthetic
844event trace::
845
846       struct synth_event_trace_state trace_state;
847
848       ret = synth_event_trace_start(schedtest_event_file, &trace_state);
849
850It's passed the trace_event_file representing the synthetic event
851using the same methods as described above, along with a pointer to a
852struct synth_event_trace_state object, which will be zeroed before use and
853used to maintain state between this and following calls.
854
855Once the event has been opened, which means space for it has been
856reserved in the trace buffer, the individual fields can be set.  There
857are two ways to do that, either one after another for each field in
858the event, which requires no lookups, or by name, which does.  The
859tradeoff is flexibility in doing the assignments vs the cost of a
860lookup per field.
861
862To assign the values one after the other without lookups,
863synth_event_add_next_val() should be used.  Each call is passed the
864same synth_event_trace_state object used in the synth_event_trace_start(),
865along with the value to set the next field in the event.  After each
866field is set, the 'cursor' points to the next field, which will be set
867by the subsequent call, continuing until all the fields have been set
868in order.  The same sequence of calls as in the above examples using
869this method would be (without error-handling code)::
870
871       /* next_pid_field */
872       ret = synth_event_add_next_val(777, &trace_state);
873
874       /* next_comm_field */
875       ret = synth_event_add_next_val((u64)"slinky", &trace_state);
876
877       /* ts_ns */
878       ret = synth_event_add_next_val(1000000, &trace_state);
879
880       /* ts_ms */
881       ret = synth_event_add_next_val(1000, &trace_state);
882
883       /* cpu */
884       ret = synth_event_add_next_val(smp_processor_id(), &trace_state);
885
886       /* my_string_field */
887       ret = synth_event_add_next_val((u64)"thneed_2.01", &trace_state);
888
889       /* my_int_field */
890       ret = synth_event_add_next_val(395, &trace_state);
891
892To assign the values in any order, synth_event_add_val() should be
893used.  Each call is passed the same synth_event_trace_state object used in
894the synth_event_trace_start(), along with the field name of the field
895to set and the value to set it to.  The same sequence of calls as in
896the above examples using this method would be (without error-handling
897code)::
898
899       ret = synth_event_add_val("next_pid_field", 777, &trace_state);
900       ret = synth_event_add_val("next_comm_field", (u64)"silly putty",
901                                 &trace_state);
902       ret = synth_event_add_val("ts_ns", 1000000, &trace_state);
903       ret = synth_event_add_val("ts_ms", 1000, &trace_state);
904       ret = synth_event_add_val("cpu", smp_processor_id(), &trace_state);
905       ret = synth_event_add_val("my_string_field", (u64)"thneed_9",
906                                 &trace_state);
907       ret = synth_event_add_val("my_int_field", 3999, &trace_state);
908
909Note that synth_event_add_next_val() and synth_event_add_val() are
910incompatible if used within the same trace of an event - either one
911can be used but not both at the same time.
912
913Finally, the event won't be actually traced until it's 'closed',
914which is done using synth_event_trace_end(), which takes only the
915struct synth_event_trace_state object used in the previous calls::
916
917       ret = synth_event_trace_end(&trace_state);
918
919Note that synth_event_trace_end() must be called at the end regardless
920of whether any of the add calls failed (say due to a bad field name
921being passed in).
922
9237.3 Dyamically creating kprobe and kretprobe event definitions
924--------------------------------------------------------------
925
926To create a kprobe or kretprobe trace event from kernel code, the
927kprobe_event_gen_cmd_start() or kretprobe_event_gen_cmd_start()
928functions can be used.
929
930To create a kprobe event, an empty or partially empty kprobe event
931should first be created using kprobe_event_gen_cmd_start().  The name
932of the event and the probe location should be specified along with one
933or args each representing a probe field should be supplied to this
934function.  Before calling kprobe_event_gen_cmd_start(), the user
935should create and initialize a dynevent_cmd object using
936kprobe_event_cmd_init().
937
938For example, to create a new "schedtest" kprobe event with two fields::
939
940  struct dynevent_cmd cmd;
941  char *buf;
942
943  /* Create a buffer to hold the generated command */
944  buf = kzalloc(MAX_DYNEVENT_CMD_LEN, GFP_KERNEL);
945
946  /* Before generating the command, initialize the cmd object */
947  kprobe_event_cmd_init(&cmd, buf, MAX_DYNEVENT_CMD_LEN);
948
949  /*
950   * Define the gen_kprobe_test event with the first 2 kprobe
951   * fields.
952   */
953  ret = kprobe_event_gen_cmd_start(&cmd, "gen_kprobe_test", "do_sys_open",
954                                   "dfd=%ax", "filename=%dx");
955
956Once the kprobe event object has been created, it can then be
957populated with more fields.  Fields can be added using
958kprobe_event_add_fields(), supplying the dynevent_cmd object along
959with a variable arg list of probe fields.  For example, to add a
960couple additional fields, the following call could be made::
961
962  ret = kprobe_event_add_fields(&cmd, "flags=%cx", "mode=+4($stack)");
963
964Once all the fields have been added, the event should be finalized and
965registered by calling the kprobe_event_gen_cmd_end() or
966kretprobe_event_gen_cmd_end() functions, depending on whether a kprobe
967or kretprobe command was started::
968
969  ret = kprobe_event_gen_cmd_end(&cmd);
970
971or::
972
973  ret = kretprobe_event_gen_cmd_end(&cmd);
974
975At this point, the event object is ready to be used for tracing new
976events.
977
978Similarly, a kretprobe event can be created using
979kretprobe_event_gen_cmd_start() with a probe name and location and
980additional params such as $retval::
981
982  ret = kretprobe_event_gen_cmd_start(&cmd, "gen_kretprobe_test",
983                                      "do_sys_open", "$retval");
984
985Similar to the synthetic event case, code like the following can be
986used to enable the newly created kprobe event::
987
988  gen_kprobe_test = trace_get_event_file(NULL, "kprobes", "gen_kprobe_test");
989
990  ret = trace_array_set_clr_event(gen_kprobe_test->tr,
991                                  "kprobes", "gen_kprobe_test", true);
992
993Finally, also similar to synthetic events, the following code can be
994used to give the kprobe event file back and delete the event::
995
996  trace_put_event_file(gen_kprobe_test);
997
998  ret = kprobe_event_delete("gen_kprobe_test");
999
10007.4 The "dynevent_cmd" low-level API
1001------------------------------------
1002
1003Both the in-kernel synthetic event and kprobe interfaces are built on
1004top of a lower-level "dynevent_cmd" interface.  This interface is
1005meant to provide the basis for higher-level interfaces such as the
1006synthetic and kprobe interfaces, which can be used as examples.
1007
1008The basic idea is simple and amounts to providing a general-purpose
1009layer that can be used to generate trace event commands.  The
1010generated command strings can then be passed to the command-parsing
1011and event creation code that already exists in the trace event
1012subsystem for creating the corresponding trace events.
1013
1014In a nutshell, the way it works is that the higher-level interface
1015code creates a struct dynevent_cmd object, then uses a couple
1016functions, dynevent_arg_add() and dynevent_arg_pair_add() to build up
1017a command string, which finally causes the command to be executed
1018using the dynevent_create() function.  The details of the interface
1019are described below.
1020
1021The first step in building a new command string is to create and
1022initialize an instance of a dynevent_cmd.  Here, for instance, we
1023create a dynevent_cmd on the stack and initialize it::
1024
1025  struct dynevent_cmd cmd;
1026  char *buf;
1027  int ret;
1028
1029  buf = kzalloc(MAX_DYNEVENT_CMD_LEN, GFP_KERNEL);
1030
1031  dynevent_cmd_init(cmd, buf, maxlen, DYNEVENT_TYPE_FOO,
1032                    foo_event_run_command);
1033
1034The dynevent_cmd initialization needs to be given a user-specified
1035buffer and the length of the buffer (MAX_DYNEVENT_CMD_LEN can be used
1036for this purpose - at 2k it's generally too big to be comfortably put
1037on the stack, so is dynamically allocated), a dynevent type id, which
1038is meant to be used to check that further API calls are for the
1039correct command type, and a pointer to an event-specific run_command()
1040callback that will be called to actually execute the event-specific
1041command function.
1042
1043Once that's done, the command string can by built up by successive
1044calls to argument-adding functions.
1045
1046To add a single argument, define and initialize a struct dynevent_arg
1047or struct dynevent_arg_pair object.  Here's an example of the simplest
1048possible arg addition, which is simply to append the given string as
1049a whitespace-separated argument to the command::
1050
1051  struct dynevent_arg arg;
1052
1053  dynevent_arg_init(&arg, NULL, 0);
1054
1055  arg.str = name;
1056
1057  ret = dynevent_arg_add(cmd, &arg);
1058
1059The arg object is first initialized using dynevent_arg_init() and in
1060this case the parameters are NULL or 0, which means there's no
1061optional sanity-checking function or separator appended to the end of
1062the arg.
1063
1064Here's another more complicated example using an 'arg pair', which is
1065used to create an argument that consists of a couple components added
1066together as a unit, for example, a 'type field_name;' arg or a simple
1067expression arg e.g. 'flags=%cx'::
1068
1069  struct dynevent_arg_pair arg_pair;
1070
1071  dynevent_arg_pair_init(&arg_pair, dynevent_foo_check_arg_fn, 0, ';');
1072
1073  arg_pair.lhs = type;
1074  arg_pair.rhs = name;
1075
1076  ret = dynevent_arg_pair_add(cmd, &arg_pair);
1077
1078Again, the arg_pair is first initialized, in this case with a callback
1079function used to check the sanity of the args (for example, that
1080neither part of the pair is NULL), along with a character to be used
1081to add an operator between the pair (here none) and a separator to be
1082appended onto the end of the arg pair (here ';').
1083
1084There's also a dynevent_str_add() function that can be used to simply
1085add a string as-is, with no spaces, delimiters, or arg check.
1086
1087Any number of dynevent_*_add() calls can be made to build up the string
1088(until its length surpasses cmd->maxlen).  When all the arguments have
1089been added and the command string is complete, the only thing left to
1090do is run the command, which happens by simply calling
1091dynevent_create()::
1092
1093  ret = dynevent_create(&cmd);
1094
1095At that point, if the return value is 0, the dynamic event has been
1096created and is ready to use.
1097
1098See the dynevent_cmd function definitions themselves for the details
1099of the API.
1100