blob: c47f381d0c00252b3e9993c9a784bb2f39a8b089 [file] [log] [blame]
Changbin Du73d98122018-02-17 13:39:42 +08001=============
2Event Tracing
3=============
Theodore Ts'oabd41442009-04-11 15:51:18 -04004
Changbin Du73d98122018-02-17 13:39:42 +08005:Author: Theodore Ts'o
6:Updated: Li Zefan and Tom Zanussi
Theodore Ts'oabd41442009-04-11 15:51:18 -04007
Li Zefan143c1452009-05-19 14:43:15 +080081. Introduction
9===============
Theodore Ts'oabd41442009-04-11 15:51:18 -040010
Mauro Carvalho Chehabec158722018-05-08 18:54:36 -030011Tracepoints (see Documentation/trace/tracepoints.rst) can be used
Theodore Ts'oabd41442009-04-11 15:51:18 -040012without creating custom kernel modules to register probe functions
13using the event tracing infrastructure.
14
15Not all tracepoints can be traced using the event tracing system;
16the kernel developer must provide code snippets which define how the
17tracing information is saved into the tracing buffer, and how the
Li Zefan143c1452009-05-19 14:43:15 +080018tracing information should be printed.
Theodore Ts'oabd41442009-04-11 15:51:18 -040019
Li Zefan143c1452009-05-19 14:43:15 +0800202. Using Event Tracing
21======================
22
232.1 Via the 'set_event' interface
24---------------------------------
Theodore Ts'oabd41442009-04-11 15:51:18 -040025
26The events which are available for tracing can be found in the file
GeunSik Lim52ad51e2009-09-07 21:37:17 +090027/sys/kernel/debug/tracing/available_events.
Theodore Ts'oabd41442009-04-11 15:51:18 -040028
29To enable a particular event, such as 'sched_wakeup', simply echo it
Changbin Du73d98122018-02-17 13:39:42 +080030to /sys/kernel/debug/tracing/set_event. For example::
Theodore Ts'oabd41442009-04-11 15:51:18 -040031
GeunSik Lim52ad51e2009-09-07 21:37:17 +090032 # echo sched_wakeup >> /sys/kernel/debug/tracing/set_event
Theodore Ts'oabd41442009-04-11 15:51:18 -040033
Changbin Du73d98122018-02-17 13:39:42 +080034.. Note:: '>>' is necessary, otherwise it will firstly disable all the events.
Theodore Ts'oabd41442009-04-11 15:51:18 -040035
36To disable an event, echo the event name to the set_event file prefixed
Changbin Du73d98122018-02-17 13:39:42 +080037with an exclamation point::
Theodore Ts'oabd41442009-04-11 15:51:18 -040038
GeunSik Lim52ad51e2009-09-07 21:37:17 +090039 # echo '!sched_wakeup' >> /sys/kernel/debug/tracing/set_event
Theodore Ts'oabd41442009-04-11 15:51:18 -040040
Changbin Du73d98122018-02-17 13:39:42 +080041To disable all events, echo an empty line to the set_event file::
Theodore Ts'oabd41442009-04-11 15:51:18 -040042
GeunSik Lim52ad51e2009-09-07 21:37:17 +090043 # echo > /sys/kernel/debug/tracing/set_event
Li Zefan143c1452009-05-19 14:43:15 +080044
Jonathan Corbet6234c7b2018-03-07 10:44:08 -070045To enable all events, echo ``*:*`` or ``*:`` to the set_event file::
Li Zefan143c1452009-05-19 14:43:15 +080046
GeunSik Lim52ad51e2009-09-07 21:37:17 +090047 # echo *:* > /sys/kernel/debug/tracing/set_event
Theodore Ts'oabd41442009-04-11 15:51:18 -040048
49The events are organized into subsystems, such as ext4, irq, sched,
50etc., and a full event name looks like this: <subsystem>:<event>. The
51subsystem name is optional, but it is displayed in the available_events
52file. All of the events in a subsystem can be specified via the syntax
Jonathan Corbet6234c7b2018-03-07 10:44:08 -070053``<subsystem>:*``; for example, to enable all irq events, you can use the
Changbin Du73d98122018-02-17 13:39:42 +080054command::
Theodore Ts'oabd41442009-04-11 15:51:18 -040055
GeunSik Lim52ad51e2009-09-07 21:37:17 +090056 # echo 'irq:*' > /sys/kernel/debug/tracing/set_event
Theodore Ts'oabd41442009-04-11 15:51:18 -040057
Li Zefan143c1452009-05-19 14:43:15 +0800582.2 Via the 'enable' toggle
59---------------------------
Theodore Ts'oabd41442009-04-11 15:51:18 -040060
GeunSik Lim52ad51e2009-09-07 21:37:17 +090061The events available are also listed in /sys/kernel/debug/tracing/events/ hierarchy
Li Zefan143c1452009-05-19 14:43:15 +080062of directories.
Theodore Ts'oabd41442009-04-11 15:51:18 -040063
Changbin Du73d98122018-02-17 13:39:42 +080064To enable event 'sched_wakeup'::
Theodore Ts'oabd41442009-04-11 15:51:18 -040065
GeunSik Lim52ad51e2009-09-07 21:37:17 +090066 # echo 1 > /sys/kernel/debug/tracing/events/sched/sched_wakeup/enable
Theodore Ts'oabd41442009-04-11 15:51:18 -040067
Changbin Du73d98122018-02-17 13:39:42 +080068To disable it::
Theodore Ts'oabd41442009-04-11 15:51:18 -040069
GeunSik Lim52ad51e2009-09-07 21:37:17 +090070 # echo 0 > /sys/kernel/debug/tracing/events/sched/sched_wakeup/enable
Theodore Ts'oabd41442009-04-11 15:51:18 -040071
Changbin Du73d98122018-02-17 13:39:42 +080072To enable all events in sched subsystem::
Theodore Ts'oabd41442009-04-11 15:51:18 -040073
GeunSik Lim52ad51e2009-09-07 21:37:17 +090074 # echo 1 > /sys/kernel/debug/tracing/events/sched/enable
Theodore Ts'oabd41442009-04-11 15:51:18 -040075
Changbin Du73d98122018-02-17 13:39:42 +080076To enable all events::
Theodore Ts'oabd41442009-04-11 15:51:18 -040077
GeunSik Lim52ad51e2009-09-07 21:37:17 +090078 # echo 1 > /sys/kernel/debug/tracing/events/enable
Theodore Ts'oabd41442009-04-11 15:51:18 -040079
Li Zefan143c1452009-05-19 14:43:15 +080080When reading one of these enable files, there are four results:
Theodore Ts'oabd41442009-04-11 15:51:18 -040081
Changbin Du73d98122018-02-17 13:39:42 +080082 - 0 - all events this file affects are disabled
83 - 1 - all events this file affects are enabled
84 - X - there is a mixture of events enabled and disabled
85 - ? - this file does not affect any event
Theodore Ts'oabd41442009-04-11 15:51:18 -040086
Li Zefan020e5f82009-07-01 10:47:05 +0800872.3 Boot option
88---------------
89
Changbin Du73d98122018-02-17 13:39:42 +080090In order to facilitate early boot debugging, use boot option::
Li Zefan020e5f82009-07-01 10:47:05 +080091
92 trace_event=[event-list]
93
Li Zefan03d646e2009-12-21 14:27:24 +080094event-list is a comma separated list of events. See section 2.1 for event
95format.
Li Zefan020e5f82009-07-01 10:47:05 +080096
Li Zefan143c1452009-05-19 14:43:15 +0800973. Defining an event-enabled tracepoint
98=======================================
Theodore Ts'oabd41442009-04-11 15:51:18 -040099
Li Zefan143c1452009-05-19 14:43:15 +0800100See The example provided in samples/trace_events
Theodore Ts'oabd41442009-04-11 15:51:18 -0400101
Tom Zanussi95b69602009-09-10 23:13:51 -05001024. Event formats
103================
104
105Each trace event has a 'format' file associated with it that contains
106a description of each field in a logged event. This information can
107be used to parse the binary trace stream, and is also the place to
108find the field names that can be used in event filters (see section 5).
109
110It also displays the format string that will be used to print the
111event in text mode, along with the event name and ID used for
112profiling.
113
Jonathan Corbet6234c7b2018-03-07 10:44:08 -0700114Every event has a set of ``common`` fields associated with it; these are
115the fields prefixed with ``common_``. The other fields vary between
Tom Zanussi95b69602009-09-10 23:13:51 -0500116events and correspond to the fields defined in the TRACE_EVENT
117definition for that event.
118
Changbin Du73d98122018-02-17 13:39:42 +0800119Each field in the format has the form::
Tom Zanussi95b69602009-09-10 23:13:51 -0500120
121 field:field-type field-name; offset:N; size:N;
122
123where offset is the offset of the field in the trace record and size
124is the size of the data item, in bytes.
125
126For example, here's the information displayed for the 'sched_wakeup'
Changbin Du73d98122018-02-17 13:39:42 +0800127event::
Tom Zanussi95b69602009-09-10 23:13:51 -0500128
Changbin Du73d98122018-02-17 13:39:42 +0800129 # cat /sys/kernel/debug/tracing/events/sched/sched_wakeup/format
Tom Zanussi95b69602009-09-10 23:13:51 -0500130
Changbin Du73d98122018-02-17 13:39:42 +0800131 name: sched_wakeup
132 ID: 60
133 format:
134 field:unsigned short common_type; offset:0; size:2;
135 field:unsigned char common_flags; offset:2; size:1;
136 field:unsigned char common_preempt_count; offset:3; size:1;
137 field:int common_pid; offset:4; size:4;
138 field:int common_tgid; offset:8; size:4;
Tom Zanussi95b69602009-09-10 23:13:51 -0500139
Changbin Du73d98122018-02-17 13:39:42 +0800140 field:char comm[TASK_COMM_LEN]; offset:12; size:16;
141 field:pid_t pid; offset:28; size:4;
142 field:int prio; offset:32; size:4;
143 field:int success; offset:36; size:4;
144 field:int cpu; offset:40; size:4;
Tom Zanussi95b69602009-09-10 23:13:51 -0500145
Changbin Du73d98122018-02-17 13:39:42 +0800146 print fmt: "task %s:%d [%d] success=%d [%03d]", REC->comm, REC->pid,
147 REC->prio, REC->success, REC->cpu
Tom Zanussi95b69602009-09-10 23:13:51 -0500148
149This event contains 10 fields, the first 5 common and the remaining 5
150event-specific. All the fields for this event are numeric, except for
151'comm' which is a string, a distinction important for event filtering.
152
1535. Event filtering
154==================
155
156Trace events can be filtered in the kernel by associating boolean
157'filter expressions' with them. As soon as an event is logged into
158the trace buffer, its fields are checked against the filter expression
159associated with that event type. An event with field values that
160'match' the filter will appear in the trace output, and an event whose
161values don't match will be discarded. An event with no filter
162associated with it matches everything, and is the default when no
163filter has been set for an event.
164
1655.1 Expression syntax
166---------------------
167
168A filter expression consists of one or more 'predicates' that can be
169combined using the logical operators '&&' and '||'. A predicate is
170simply a clause that compares the value of a field contained within a
171logged event with a constant value and returns either 0 or 1 depending
Changbin Du73d98122018-02-17 13:39:42 +0800172on whether the field value matched (1) or didn't match (0)::
Tom Zanussi95b69602009-09-10 23:13:51 -0500173
174 field-name relational-operator value
175
176Parentheses can be used to provide arbitrary logical groupings and
177double-quotes can be used to prevent the shell from interpreting
178operators as shell metacharacters.
179
180The field-names available for use in filters can be found in the
181'format' files for trace events (see section 4).
182
183The relational-operators depend on the type of the field being tested:
184
185The operators available for numeric fields are:
186
Steven Rostedt1a891cf2013-06-12 13:16:25 -0400187==, !=, <, <=, >, >=, &
Tom Zanussi95b69602009-09-10 23:13:51 -0500188
189And for string fields they are:
190
Steven Rostedt (Red Hat)c3e13c72013-06-17 10:59:17 -0400191==, !=, ~
Tom Zanussi95b69602009-09-10 23:13:51 -0500192
Jonathan Corbet6234c7b2018-03-07 10:44:08 -0700193The glob (~) accepts a wild card character (\*,?) and character classes
Changbin Du73d98122018-02-17 13:39:42 +0800194([). For example::
Steven Rostedt (Red Hat)c3e13c72013-06-17 10:59:17 -0400195
196 prev_comm ~ "*sh"
197 prev_comm ~ "sh*"
198 prev_comm ~ "*sh*"
Masami Hiramatsu60f1d5e2016-10-05 20:58:15 +0900199 prev_comm ~ "ba*sh"
Tom Zanussi95b69602009-09-10 23:13:51 -0500200
Steven Rostedtf37c3bb2022-01-13 20:08:40 -0500201If the field is a pointer that points into user space (for example
202"filename" from sys_enter_openat), then you have to append ".ustring" to the
203field name::
204
205 filename.ustring ~ "password"
206
207As the kernel will have to know how to retrieve the memory that the pointer
208is at from user space.
209
Tom Zanussi95b69602009-09-10 23:13:51 -05002105.2 Setting filters
211-------------------
212
213A filter for an individual event is set by writing a filter expression
214to the 'filter' file for the given event.
215
Changbin Du73d98122018-02-17 13:39:42 +0800216For example::
Tom Zanussi95b69602009-09-10 23:13:51 -0500217
Changbin Du73d98122018-02-17 13:39:42 +0800218 # cd /sys/kernel/debug/tracing/events/sched/sched_wakeup
219 # echo "common_preempt_count > 4" > filter
Tom Zanussi95b69602009-09-10 23:13:51 -0500220
Changbin Du73d98122018-02-17 13:39:42 +0800221A slightly more involved example::
Tom Zanussi95b69602009-09-10 23:13:51 -0500222
Changbin Du73d98122018-02-17 13:39:42 +0800223 # cd /sys/kernel/debug/tracing/events/signal/signal_generate
224 # echo "((sig >= 10 && sig < 15) || sig == 17) && comm != bash" > filter
Tom Zanussi95b69602009-09-10 23:13:51 -0500225
226If there is an error in the expression, you'll get an 'Invalid
227argument' error when setting it, and the erroneous string along with
Changbin Du73d98122018-02-17 13:39:42 +0800228an error message can be seen by looking at the filter e.g.::
Tom Zanussi95b69602009-09-10 23:13:51 -0500229
Changbin Du73d98122018-02-17 13:39:42 +0800230 # cd /sys/kernel/debug/tracing/events/signal/signal_generate
231 # echo "((sig >= 10 && sig < 15) || dsig == 17) && comm != bash" > filter
232 -bash: echo: write error: Invalid argument
233 # cat filter
234 ((sig >= 10 && sig < 15) || dsig == 17) && comm != bash
235 ^
236 parse_error: Field not found
Tom Zanussi95b69602009-09-10 23:13:51 -0500237
238Currently the caret ('^') for an error always appears at the beginning of
239the filter string; the error message should still be useful though
240even without more accurate position info.
241
Steven Rostedt77360f92022-01-10 11:55:32 -05002425.2.1 Filter limitations
243------------------------
244
245If a filter is placed on a string pointer ``(char *)`` that does not point
246to a string on the ring buffer, but instead points to kernel or user space
247memory, then, for safety reasons, at most 1024 bytes of the content is
248copied onto a temporary buffer to do the compare. If the copy of the memory
249faults (the pointer points to memory that should not be accessed), then the
250string compare will be treated as not matching.
251
Tom Zanussi95b69602009-09-10 23:13:51 -05002525.3 Clearing filters
253--------------------
254
255To clear the filter for an event, write a '0' to the event's filter
256file.
257
258To clear the filters for all events in a subsystem, write a '0' to the
259subsystem's filter file.
260
2615.3 Subsystem filters
262---------------------
263
264For convenience, filters for every event in a subsystem can be set or
265cleared as a group by writing a filter expression into the filter file
Thomas Weber88393162010-03-16 11:47:56 +0100266at the root of the subsystem. Note however, that if a filter for any
Tom Zanussi95b69602009-09-10 23:13:51 -0500267event within the subsystem lacks a field specified in the subsystem
268filter, or if the filter can't be applied for any other reason, the
269filter for that event will retain its previous setting. This can
270result in an unintended mixture of filters which could lead to
271confusing (to the user who might think different filters are in
272effect) trace output. Only filters that reference just the common
273fields can be guaranteed to propagate successfully to all events.
274
275Here are a few subsystem filter examples that also illustrate the
276above points:
277
Changbin Du73d98122018-02-17 13:39:42 +0800278Clear the filters on all events in the sched subsystem::
Tom Zanussi95b69602009-09-10 23:13:51 -0500279
Changbin Du73d98122018-02-17 13:39:42 +0800280 # cd /sys/kernel/debug/tracing/events/sched
281 # echo 0 > filter
282 # cat sched_switch/filter
283 none
284 # cat sched_wakeup/filter
285 none
Tom Zanussi95b69602009-09-10 23:13:51 -0500286
287Set a filter using only common fields for all events in the sched
Changbin Du73d98122018-02-17 13:39:42 +0800288subsystem (all events end up with the same filter)::
Tom Zanussi95b69602009-09-10 23:13:51 -0500289
Changbin Du73d98122018-02-17 13:39:42 +0800290 # cd /sys/kernel/debug/tracing/events/sched
291 # echo common_pid == 0 > filter
292 # cat sched_switch/filter
293 common_pid == 0
294 # cat sched_wakeup/filter
295 common_pid == 0
Tom Zanussi95b69602009-09-10 23:13:51 -0500296
297Attempt to set a filter using a non-common field for all events in the
Thomas Weber88393162010-03-16 11:47:56 +0100298sched subsystem (all events but those that have a prev_pid field retain
Changbin Du73d98122018-02-17 13:39:42 +0800299their old filters)::
Tom Zanussi95b69602009-09-10 23:13:51 -0500300
Changbin Du73d98122018-02-17 13:39:42 +0800301 # cd /sys/kernel/debug/tracing/events/sched
302 # echo prev_pid == 0 > filter
303 # cat sched_switch/filter
304 prev_pid == 0
305 # cat sched_wakeup/filter
306 common_pid == 0
Tom Zanussiac38fb82013-10-24 08:59:30 -0500307
Steven Rostedt (Red Hat)627645f2015-11-03 16:37:15 -05003085.4 PID filtering
309-----------------
310
311The set_event_pid file in the same directory as the top events directory
312exists, will filter all events from tracing any task that does not have the
313PID listed in the set_event_pid file.
Changbin Du73d98122018-02-17 13:39:42 +0800314::
Steven Rostedt (Red Hat)627645f2015-11-03 16:37:15 -0500315
Changbin Du73d98122018-02-17 13:39:42 +0800316 # cd /sys/kernel/debug/tracing
317 # echo $$ > set_event_pid
318 # echo 1 > events/enable
Steven Rostedt (Red Hat)627645f2015-11-03 16:37:15 -0500319
320Will only trace events for the current task.
321
322To add more PIDs without losing the PIDs already included, use '>>'.
Changbin Du73d98122018-02-17 13:39:42 +0800323::
Steven Rostedt (Red Hat)627645f2015-11-03 16:37:15 -0500324
Changbin Du73d98122018-02-17 13:39:42 +0800325 # echo 123 244 1 >> set_event_pid
Steven Rostedt (Red Hat)627645f2015-11-03 16:37:15 -0500326
327
Tom Zanussiac38fb82013-10-24 08:59:30 -05003286. Event triggers
329=================
330
331Trace events can be made to conditionally invoke trigger 'commands'
332which can take various forms and are described in detail below;
333examples would be enabling or disabling other trace events or invoking
334a stack trace whenever the trace event is hit. Whenever a trace event
335with attached triggers is invoked, the set of trigger commands
336associated with that event is invoked. Any given trigger can
337additionally have an event filter of the same form as described in
338section 5 (Event filtering) associated with it - the command will only
339be invoked if the event being invoked passes the associated filter.
340If no filter is associated with the trigger, it always passes.
341
342Triggers are added to and removed from a particular event by writing
343trigger expressions to the 'trigger' file for the given event.
344
345A given event can have any number of triggers associated with it,
346subject to any restrictions that individual commands may have in that
347regard.
348
349Event triggers are implemented on top of "soft" mode, which means that
350whenever a trace event has one or more triggers associated with it,
351the event is activated even if it isn't actually enabled, but is
352disabled in a "soft" mode. That is, the tracepoint will be called,
353but just will not be traced, unless of course it's actually enabled.
354This scheme allows triggers to be invoked even for events that aren't
355enabled, and also allows the current event filter implementation to be
356used for conditionally invoking triggers.
357
358The syntax for event triggers is roughly based on the syntax for
359set_ftrace_filter 'ftrace filter commands' (see the 'Filter commands'
Steven Rostedt (VMware)d3439f92018-05-11 15:41:24 -0400360section of Documentation/trace/ftrace.rst), but there are major
Tom Zanussiac38fb82013-10-24 08:59:30 -0500361differences and the implementation isn't currently tied to it in any
362way, so beware about making generalizations between the two.
363
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100364.. Note::
365 Writing into trace_marker (See Documentation/trace/ftrace.rst)
Steven Rostedt (VMware)d3439f92018-05-11 15:41:24 -0400366 can also enable triggers that are written into
367 /sys/kernel/tracing/events/ftrace/print/trigger
368
Tom Zanussiac38fb82013-10-24 08:59:30 -05003696.1 Expression syntax
370---------------------
371
Changbin Du73d98122018-02-17 13:39:42 +0800372Triggers are added by echoing the command to the 'trigger' file::
Tom Zanussiac38fb82013-10-24 08:59:30 -0500373
374 # echo 'command[:count] [if filter]' > trigger
375
376Triggers are removed by echoing the same command but starting with '!'
Changbin Du73d98122018-02-17 13:39:42 +0800377to the 'trigger' file::
Tom Zanussiac38fb82013-10-24 08:59:30 -0500378
379 # echo '!command[:count] [if filter]' > trigger
380
381The [if filter] part isn't used in matching commands when removing, so
382leaving that off in a '!' command will accomplish the same thing as
383having it in.
384
385The filter syntax is the same as that described in the 'Event
386filtering' section above.
387
388For ease of use, writing to the trigger file using '>' currently just
389adds or removes a single trigger and there's no explicit '>>' support
390('>' actually behaves like '>>') or truncation support to remove all
391triggers (you have to use '!' for each one added.)
392
3936.2 Supported trigger commands
394------------------------------
395
396The following commands are supported:
397
398- enable_event/disable_event
399
400 These commands can enable or disable another trace event whenever
401 the triggering event is hit. When these commands are registered,
402 the other trace event is activated, but disabled in a "soft" mode.
403 That is, the tracepoint will be called, but just will not be traced.
404 The event tracepoint stays in this mode as long as there's a trigger
405 in effect that can trigger it.
406
407 For example, the following trigger causes kmalloc events to be
408 traced when a read system call is entered, and the :1 at the end
Changbin Du73d98122018-02-17 13:39:42 +0800409 specifies that this enablement happens only once::
Tom Zanussiac38fb82013-10-24 08:59:30 -0500410
Changbin Du73d98122018-02-17 13:39:42 +0800411 # echo 'enable_event:kmem:kmalloc:1' > \
412 /sys/kernel/debug/tracing/events/syscalls/sys_enter_read/trigger
Tom Zanussiac38fb82013-10-24 08:59:30 -0500413
414 The following trigger causes kmalloc events to stop being traced
415 when a read system call exits. This disablement happens on every
Changbin Du73d98122018-02-17 13:39:42 +0800416 read system call exit::
Tom Zanussiac38fb82013-10-24 08:59:30 -0500417
Changbin Du73d98122018-02-17 13:39:42 +0800418 # echo 'disable_event:kmem:kmalloc' > \
419 /sys/kernel/debug/tracing/events/syscalls/sys_exit_read/trigger
Tom Zanussiac38fb82013-10-24 08:59:30 -0500420
Changbin Du73d98122018-02-17 13:39:42 +0800421 The format is::
Tom Zanussiac38fb82013-10-24 08:59:30 -0500422
423 enable_event:<system>:<event>[:count]
424 disable_event:<system>:<event>[:count]
425
Changbin Du73d98122018-02-17 13:39:42 +0800426 To remove the above commands::
Tom Zanussiac38fb82013-10-24 08:59:30 -0500427
Changbin Du73d98122018-02-17 13:39:42 +0800428 # echo '!enable_event:kmem:kmalloc:1' > \
429 /sys/kernel/debug/tracing/events/syscalls/sys_enter_read/trigger
Tom Zanussiac38fb82013-10-24 08:59:30 -0500430
Changbin Du73d98122018-02-17 13:39:42 +0800431 # echo '!disable_event:kmem:kmalloc' > \
432 /sys/kernel/debug/tracing/events/syscalls/sys_exit_read/trigger
Tom Zanussiac38fb82013-10-24 08:59:30 -0500433
434 Note that there can be any number of enable/disable_event triggers
435 per triggering event, but there can only be one trigger per
436 triggered event. e.g. sys_enter_read can have triggers enabling both
437 kmem:kmalloc and sched:sched_switch, but can't have two kmem:kmalloc
438 versions such as kmem:kmalloc and kmem:kmalloc:1 or 'kmem:kmalloc if
439 bytes_req == 256' and 'kmem:kmalloc if bytes_alloc == 256' (they
440 could be combined into a single filter on kmem:kmalloc though).
441
442- stacktrace
443
444 This command dumps a stacktrace in the trace buffer whenever the
445 triggering event occurs.
446
447 For example, the following trigger dumps a stacktrace every time the
Changbin Du73d98122018-02-17 13:39:42 +0800448 kmalloc tracepoint is hit::
Tom Zanussiac38fb82013-10-24 08:59:30 -0500449
Changbin Du73d98122018-02-17 13:39:42 +0800450 # echo 'stacktrace' > \
451 /sys/kernel/debug/tracing/events/kmem/kmalloc/trigger
Tom Zanussiac38fb82013-10-24 08:59:30 -0500452
453 The following trigger dumps a stacktrace the first 5 times a kmalloc
Changbin Du73d98122018-02-17 13:39:42 +0800454 request happens with a size >= 64K::
Tom Zanussiac38fb82013-10-24 08:59:30 -0500455
Changbin Du73d98122018-02-17 13:39:42 +0800456 # echo 'stacktrace:5 if bytes_req >= 65536' > \
457 /sys/kernel/debug/tracing/events/kmem/kmalloc/trigger
Tom Zanussiac38fb82013-10-24 08:59:30 -0500458
Changbin Du73d98122018-02-17 13:39:42 +0800459 The format is::
Tom Zanussiac38fb82013-10-24 08:59:30 -0500460
461 stacktrace[:count]
462
Changbin Du73d98122018-02-17 13:39:42 +0800463 To remove the above commands::
Tom Zanussiac38fb82013-10-24 08:59:30 -0500464
Changbin Du73d98122018-02-17 13:39:42 +0800465 # echo '!stacktrace' > \
466 /sys/kernel/debug/tracing/events/kmem/kmalloc/trigger
Tom Zanussiac38fb82013-10-24 08:59:30 -0500467
Changbin Du73d98122018-02-17 13:39:42 +0800468 # echo '!stacktrace:5 if bytes_req >= 65536' > \
469 /sys/kernel/debug/tracing/events/kmem/kmalloc/trigger
Tom Zanussiac38fb82013-10-24 08:59:30 -0500470
471 The latter can also be removed more simply by the following (without
Changbin Du73d98122018-02-17 13:39:42 +0800472 the filter)::
Tom Zanussiac38fb82013-10-24 08:59:30 -0500473
Changbin Du73d98122018-02-17 13:39:42 +0800474 # echo '!stacktrace:5' > \
475 /sys/kernel/debug/tracing/events/kmem/kmalloc/trigger
Tom Zanussiac38fb82013-10-24 08:59:30 -0500476
477 Note that there can be only one stacktrace trigger per triggering
478 event.
479
480- snapshot
481
482 This command causes a snapshot to be triggered whenever the
483 triggering event occurs.
484
485 The following command creates a snapshot every time a block request
486 queue is unplugged with a depth > 1. If you were tracing a set of
487 events or functions at the time, the snapshot trace buffer would
Changbin Du73d98122018-02-17 13:39:42 +0800488 capture those events when the trigger event occurred::
Tom Zanussiac38fb82013-10-24 08:59:30 -0500489
Changbin Du73d98122018-02-17 13:39:42 +0800490 # echo 'snapshot if nr_rq > 1' > \
491 /sys/kernel/debug/tracing/events/block/block_unplug/trigger
Tom Zanussiac38fb82013-10-24 08:59:30 -0500492
Changbin Du73d98122018-02-17 13:39:42 +0800493 To only snapshot once::
Tom Zanussiac38fb82013-10-24 08:59:30 -0500494
Changbin Du73d98122018-02-17 13:39:42 +0800495 # echo 'snapshot:1 if nr_rq > 1' > \
496 /sys/kernel/debug/tracing/events/block/block_unplug/trigger
Tom Zanussiac38fb82013-10-24 08:59:30 -0500497
Changbin Du73d98122018-02-17 13:39:42 +0800498 To remove the above commands::
Tom Zanussiac38fb82013-10-24 08:59:30 -0500499
Changbin Du73d98122018-02-17 13:39:42 +0800500 # echo '!snapshot if nr_rq > 1' > \
501 /sys/kernel/debug/tracing/events/block/block_unplug/trigger
Tom Zanussiac38fb82013-10-24 08:59:30 -0500502
Changbin Du73d98122018-02-17 13:39:42 +0800503 # echo '!snapshot:1 if nr_rq > 1' > \
504 /sys/kernel/debug/tracing/events/block/block_unplug/trigger
Tom Zanussiac38fb82013-10-24 08:59:30 -0500505
506 Note that there can be only one snapshot trigger per triggering
507 event.
508
509- traceon/traceoff
510
511 These commands turn tracing on and off when the specified events are
512 hit. The parameter determines how many times the tracing system is
513 turned on and off. If unspecified, there is no limit.
514
515 The following command turns tracing off the first time a block
516 request queue is unplugged with a depth > 1. If you were tracing a
517 set of events or functions at the time, you could then examine the
518 trace buffer to see the sequence of events that led up to the
Changbin Du73d98122018-02-17 13:39:42 +0800519 trigger event::
Tom Zanussiac38fb82013-10-24 08:59:30 -0500520
Changbin Du73d98122018-02-17 13:39:42 +0800521 # echo 'traceoff:1 if nr_rq > 1' > \
522 /sys/kernel/debug/tracing/events/block/block_unplug/trigger
Tom Zanussiac38fb82013-10-24 08:59:30 -0500523
Changbin Du73d98122018-02-17 13:39:42 +0800524 To always disable tracing when nr_rq > 1::
Tom Zanussiac38fb82013-10-24 08:59:30 -0500525
Changbin Du73d98122018-02-17 13:39:42 +0800526 # echo 'traceoff if nr_rq > 1' > \
527 /sys/kernel/debug/tracing/events/block/block_unplug/trigger
Tom Zanussiac38fb82013-10-24 08:59:30 -0500528
Changbin Du73d98122018-02-17 13:39:42 +0800529 To remove the above commands::
Tom Zanussiac38fb82013-10-24 08:59:30 -0500530
Changbin Du73d98122018-02-17 13:39:42 +0800531 # echo '!traceoff:1 if nr_rq > 1' > \
532 /sys/kernel/debug/tracing/events/block/block_unplug/trigger
Tom Zanussiac38fb82013-10-24 08:59:30 -0500533
Changbin Du73d98122018-02-17 13:39:42 +0800534 # echo '!traceoff if nr_rq > 1' > \
535 /sys/kernel/debug/tracing/events/block/block_unplug/trigger
Tom Zanussiac38fb82013-10-24 08:59:30 -0500536
537 Note that there can be only one traceon or traceoff trigger per
538 triggering event.
Tom Zanussi0fc38132016-03-03 12:54:56 -0600539
540- hist
541
542 This command aggregates event hits into a hash table keyed on one or
543 more trace event format fields (or stacktrace) and a set of running
544 totals derived from one or more trace event format fields and/or
545 event counts (hitcount).
546
Mauro Carvalho Chehabea272252018-06-26 06:49:11 -0300547 See Documentation/trace/histogram.rst for details and examples.
Tom Zanussi34ed6352020-01-29 12:59:32 -0600548
Tom Zanussib8170fa2020-05-18 13:29:24 -05005497. In-kernel trace event API
550============================
Tom Zanussi34ed6352020-01-29 12:59:32 -0600551
552In most cases, the command-line interface to trace events is more than
553sufficient. Sometimes, however, applications might find the need for
554more complex relationships than can be expressed through a simple
555series of linked command-line expressions, or putting together sets of
556commands may be simply too cumbersome. An example might be an
557application that needs to 'listen' to the trace stream in order to
558maintain an in-kernel state machine detecting, for instance, when an
559illegal kernel state occurs in the scheduler.
560
561The trace event subsystem provides an in-kernel API allowing modules
562or other kernel code to generate user-defined 'synthetic' events at
563will, which can be used to either augment the existing trace stream
564and/or signal that a particular important state has occurred.
565
566A similar in-kernel API is also available for creating kprobe and
567kretprobe events.
568
569Both the synthetic event and k/ret/probe event APIs are built on top
570of a lower-level "dynevent_cmd" event command API, which is also
571available for more specialized applications, or as the basis of other
572higher-level trace event APIs.
573
574The API provided for these purposes is describe below and allows the
575following:
576
577 - dynamically creating synthetic event definitions
578 - dynamically creating kprobe and kretprobe event definitions
579 - tracing synthetic events from in-kernel code
580 - the low-level "dynevent_cmd" API
581
Tom Zanussib8170fa2020-05-18 13:29:24 -05005827.1 Dyamically creating synthetic event definitions
583---------------------------------------------------
Tom Zanussi34ed6352020-01-29 12:59:32 -0600584
585There are a couple ways to create a new synthetic event from a kernel
586module or other kernel code.
587
588The first creates the event in one step, using synth_event_create().
589In this method, the name of the event to create and an array defining
590the fields is supplied to synth_event_create(). If successful, a
591synthetic event with that name and fields will exist following that
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100592call. For example, to create a new "schedtest" synthetic event::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600593
594 ret = synth_event_create("schedtest", sched_fields,
595 ARRAY_SIZE(sched_fields), THIS_MODULE);
596
597The sched_fields param in this example points to an array of struct
598synth_field_desc, each of which describes an event field by type and
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100599name::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600600
601 static struct synth_field_desc sched_fields[] = {
602 { .type = "pid_t", .name = "next_pid_field" },
603 { .type = "char[16]", .name = "next_comm_field" },
604 { .type = "u64", .name = "ts_ns" },
605 { .type = "u64", .name = "ts_ms" },
606 { .type = "unsigned int", .name = "cpu" },
607 { .type = "char[64]", .name = "my_string_field" },
608 { .type = "int", .name = "my_int_field" },
609 };
610
Tom Zanussibd826312020-10-04 17:14:06 -0500611See synth_field_size() for available types.
612
613If field_name contains [n], the field is considered to be a static array.
614
615If field_names contains[] (no subscript), the field is considered to
616be a dynamic array, which will only take as much space in the event as
617is required to hold the array.
618
619Because space for an event is reserved before assigning field values
620to the event, using dynamic arrays implies that the piecewise
621in-kernel API described below can't be used with dynamic arrays. The
622other non-piecewise in-kernel APIs can, however, be used with dynamic
623arrays.
Tom Zanussi34ed6352020-01-29 12:59:32 -0600624
625If the event is created from within a module, a pointer to the module
626must be passed to synth_event_create(). This will ensure that the
627trace buffer won't contain unreadable events when the module is
628removed.
629
630At this point, the event object is ready to be used for generating new
631events.
632
633In the second method, the event is created in several steps. This
634allows events to be created dynamically and without the need to create
635and populate an array of fields beforehand.
636
637To use this method, an empty or partially empty synthetic event should
638first be created using synth_event_gen_cmd_start() or
639synth_event_gen_cmd_array_start(). For synth_event_gen_cmd_start(),
640the name of the event along with one or more pairs of args each pair
641representing a 'type field_name;' field specification should be
642supplied. For synth_event_gen_cmd_array_start(), the name of the
643event along with an array of struct synth_field_desc should be
644supplied. Before calling synth_event_gen_cmd_start() or
645synth_event_gen_cmd_array_start(), the user should create and
646initialize a dynevent_cmd object using synth_event_cmd_init().
647
648For example, to create a new "schedtest" synthetic event with two
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100649fields::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600650
651 struct dynevent_cmd cmd;
652 char *buf;
653
654 /* Create a buffer to hold the generated command */
655 buf = kzalloc(MAX_DYNEVENT_CMD_LEN, GFP_KERNEL);
656
657 /* Before generating the command, initialize the cmd object */
658 synth_event_cmd_init(&cmd, buf, MAX_DYNEVENT_CMD_LEN);
659
660 ret = synth_event_gen_cmd_start(&cmd, "schedtest", THIS_MODULE,
661 "pid_t", "next_pid_field",
662 "u64", "ts_ns");
663
664Alternatively, using an array of struct synth_field_desc fields
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100665containing the same information::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600666
667 ret = synth_event_gen_cmd_array_start(&cmd, "schedtest", THIS_MODULE,
668 fields, n_fields);
669
670Once the synthetic event object has been created, it can then be
671populated with more fields. Fields are added one by one using
672synth_event_add_field(), supplying the dynevent_cmd object, a field
673type, and a field name. For example, to add a new int field named
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100674"intfield", the following call should be made::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600675
676 ret = synth_event_add_field(&cmd, "int", "intfield");
677
678See synth_field_size() for available types. If field_name contains [n]
679the field is considered to be an array.
680
681A group of fields can also be added all at once using an array of
682synth_field_desc with add_synth_fields(). For example, this would add
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100683just the first four sched_fields::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600684
685 ret = synth_event_add_fields(&cmd, sched_fields, 4);
686
687If you already have a string of the form 'type field_name',
688synth_event_add_field_str() can be used to add it as-is; it will
689also automatically append a ';' to the string.
690
691Once all the fields have been added, the event should be finalized and
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100692registered by calling the synth_event_gen_cmd_end() function::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600693
694 ret = synth_event_gen_cmd_end(&cmd);
695
696At this point, the event object is ready to be used for tracing new
697events.
698
Tom Zanussib8170fa2020-05-18 13:29:24 -05006997.2 Tracing synthetic events from in-kernel code
700------------------------------------------------
Tom Zanussi34ed6352020-01-29 12:59:32 -0600701
702To trace a synthetic event, there are several options. The first
703option is to trace the event in one call, using synth_event_trace()
704with a variable number of values, or synth_event_trace_array() with an
705array of values to be set. A second option can be used to avoid the
706need for a pre-formed array of values or list of arguments, via
707synth_event_trace_start() and synth_event_trace_end() along with
708synth_event_add_next_val() or synth_event_add_val() to add the values
709piecewise.
710
Tom Zanussib8170fa2020-05-18 13:29:24 -05007117.2.1 Tracing a synthetic event all at once
712-------------------------------------------
Tom Zanussi34ed6352020-01-29 12:59:32 -0600713
714To trace a synthetic event all at once, the synth_event_trace() or
715synth_event_trace_array() functions can be used.
716
717The synth_event_trace() function is passed the trace_event_file
718representing the synthetic event (which can be retrieved using
719trace_get_event_file() using the synthetic event name, "synthetic" as
720the system name, and the trace instance name (NULL if using the global
721trace array)), along with an variable number of u64 args, one for each
722synthetic event field, and the number of values being passed.
723
724So, to trace an event corresponding to the synthetic event definition
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100725above, code like the following could be used::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600726
727 ret = synth_event_trace(create_synth_test, 7, /* number of values */
728 444, /* next_pid_field */
729 (u64)"clackers", /* next_comm_field */
730 1000000, /* ts_ns */
731 1000, /* ts_ms */
732 smp_processor_id(),/* cpu */
733 (u64)"Thneed", /* my_string_field */
734 999); /* my_int_field */
735
736All vals should be cast to u64, and string vals are just pointers to
737strings, cast to u64. Strings will be copied into space reserved in
738the event for the string, using these pointers.
739
740Alternatively, the synth_event_trace_array() function can be used to
741accomplish the same thing. It is passed the trace_event_file
742representing the synthetic event (which can be retrieved using
743trace_get_event_file() using the synthetic event name, "synthetic" as
744the system name, and the trace instance name (NULL if using the global
745trace array)), along with an array of u64, one for each synthetic
746event field.
747
748To trace an event corresponding to the synthetic event definition
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100749above, code like the following could be used::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600750
751 u64 vals[7];
752
753 vals[0] = 777; /* next_pid_field */
754 vals[1] = (u64)"tiddlywinks"; /* next_comm_field */
755 vals[2] = 1000000; /* ts_ns */
756 vals[3] = 1000; /* ts_ms */
757 vals[4] = smp_processor_id(); /* cpu */
758 vals[5] = (u64)"thneed"; /* my_string_field */
759 vals[6] = 398; /* my_int_field */
760
761The 'vals' array is just an array of u64, the number of which must
762match the number of field in the synthetic event, and which must be in
763the same order as the synthetic event fields.
764
765All vals should be cast to u64, and string vals are just pointers to
766strings, cast to u64. Strings will be copied into space reserved in
767the event for the string, using these pointers.
768
769In order to trace a synthetic event, a pointer to the trace event file
770is needed. The trace_get_event_file() function can be used to get
771it - it will find the file in the given trace instance (in this case
772NULL since the top trace array is being used) while at the same time
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100773preventing the instance containing it from going away::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600774
775 schedtest_event_file = trace_get_event_file(NULL, "synthetic",
776 "schedtest");
777
778Before tracing the event, it should be enabled in some way, otherwise
779the synthetic event won't actually show up in the trace buffer.
780
781To enable a synthetic event from the kernel, trace_array_set_clr_event()
782can be used (which is not specific to synthetic events, so does need
783the "synthetic" system name to be specified explicitly).
784
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100785To enable the event, pass 'true' to it::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600786
787 trace_array_set_clr_event(schedtest_event_file->tr,
788 "synthetic", "schedtest", true);
789
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100790To disable it pass false::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600791
792 trace_array_set_clr_event(schedtest_event_file->tr,
793 "synthetic", "schedtest", false);
794
795Finally, synth_event_trace_array() can be used to actually trace the
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100796event, which should be visible in the trace buffer afterwards::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600797
798 ret = synth_event_trace_array(schedtest_event_file, vals,
799 ARRAY_SIZE(vals));
800
801To remove the synthetic event, the event should be disabled, and the
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100802trace instance should be 'put' back using trace_put_event_file()::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600803
804 trace_array_set_clr_event(schedtest_event_file->tr,
805 "synthetic", "schedtest", false);
806 trace_put_event_file(schedtest_event_file);
807
808If those have been successful, synth_event_delete() can be called to
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100809remove the event::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600810
811 ret = synth_event_delete("schedtest");
812
Tom Zanussib8170fa2020-05-18 13:29:24 -05008137.2.2 Tracing a synthetic event piecewise
814-----------------------------------------
Tom Zanussi34ed6352020-01-29 12:59:32 -0600815
816To trace a synthetic using the piecewise method described above, the
817synth_event_trace_start() function is used to 'open' the synthetic
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100818event trace::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600819
Artem Bityutskiy301de542020-11-04 14:21:13 +0200820 struct synth_event_trace_state trace_state;
Tom Zanussi34ed6352020-01-29 12:59:32 -0600821
822 ret = synth_event_trace_start(schedtest_event_file, &trace_state);
823
824It's passed the trace_event_file representing the synthetic event
825using the same methods as described above, along with a pointer to a
Artem Bityutskiy301de542020-11-04 14:21:13 +0200826struct synth_event_trace_state object, which will be zeroed before use and
Tom Zanussi34ed6352020-01-29 12:59:32 -0600827used to maintain state between this and following calls.
828
829Once the event has been opened, which means space for it has been
830reserved in the trace buffer, the individual fields can be set. There
831are two ways to do that, either one after another for each field in
832the event, which requires no lookups, or by name, which does. The
833tradeoff is flexibility in doing the assignments vs the cost of a
834lookup per field.
835
836To assign the values one after the other without lookups,
837synth_event_add_next_val() should be used. Each call is passed the
Artem Bityutskiy301de542020-11-04 14:21:13 +0200838same synth_event_trace_state object used in the synth_event_trace_start(),
Tom Zanussi34ed6352020-01-29 12:59:32 -0600839along with the value to set the next field in the event. After each
840field is set, the 'cursor' points to the next field, which will be set
841by the subsequent call, continuing until all the fields have been set
842in order. The same sequence of calls as in the above examples using
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100843this method would be (without error-handling code)::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600844
845 /* next_pid_field */
846 ret = synth_event_add_next_val(777, &trace_state);
847
848 /* next_comm_field */
849 ret = synth_event_add_next_val((u64)"slinky", &trace_state);
850
851 /* ts_ns */
852 ret = synth_event_add_next_val(1000000, &trace_state);
853
854 /* ts_ms */
855 ret = synth_event_add_next_val(1000, &trace_state);
856
857 /* cpu */
858 ret = synth_event_add_next_val(smp_processor_id(), &trace_state);
859
860 /* my_string_field */
861 ret = synth_event_add_next_val((u64)"thneed_2.01", &trace_state);
862
863 /* my_int_field */
864 ret = synth_event_add_next_val(395, &trace_state);
865
866To assign the values in any order, synth_event_add_val() should be
Artem Bityutskiy301de542020-11-04 14:21:13 +0200867used. Each call is passed the same synth_event_trace_state object used in
Tom Zanussi34ed6352020-01-29 12:59:32 -0600868the synth_event_trace_start(), along with the field name of the field
869to set and the value to set it to. The same sequence of calls as in
870the above examples using this method would be (without error-handling
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100871code)::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600872
873 ret = synth_event_add_val("next_pid_field", 777, &trace_state);
874 ret = synth_event_add_val("next_comm_field", (u64)"silly putty",
875 &trace_state);
876 ret = synth_event_add_val("ts_ns", 1000000, &trace_state);
877 ret = synth_event_add_val("ts_ms", 1000, &trace_state);
878 ret = synth_event_add_val("cpu", smp_processor_id(), &trace_state);
879 ret = synth_event_add_val("my_string_field", (u64)"thneed_9",
880 &trace_state);
881 ret = synth_event_add_val("my_int_field", 3999, &trace_state);
882
883Note that synth_event_add_next_val() and synth_event_add_val() are
884incompatible if used within the same trace of an event - either one
885can be used but not both at the same time.
886
887Finally, the event won't be actually traced until it's 'closed',
888which is done using synth_event_trace_end(), which takes only the
Artem Bityutskiy301de542020-11-04 14:21:13 +0200889struct synth_event_trace_state object used in the previous calls::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600890
891 ret = synth_event_trace_end(&trace_state);
892
893Note that synth_event_trace_end() must be called at the end regardless
894of whether any of the add calls failed (say due to a bad field name
895being passed in).
896
Tom Zanussib8170fa2020-05-18 13:29:24 -05008977.3 Dyamically creating kprobe and kretprobe event definitions
898--------------------------------------------------------------
Tom Zanussi34ed6352020-01-29 12:59:32 -0600899
900To create a kprobe or kretprobe trace event from kernel code, the
901kprobe_event_gen_cmd_start() or kretprobe_event_gen_cmd_start()
902functions can be used.
903
904To create a kprobe event, an empty or partially empty kprobe event
905should first be created using kprobe_event_gen_cmd_start(). The name
906of the event and the probe location should be specfied along with one
907or args each representing a probe field should be supplied to this
908function. Before calling kprobe_event_gen_cmd_start(), the user
909should create and initialize a dynevent_cmd object using
910kprobe_event_cmd_init().
911
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100912For example, to create a new "schedtest" kprobe event with two fields::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600913
914 struct dynevent_cmd cmd;
915 char *buf;
916
917 /* Create a buffer to hold the generated command */
918 buf = kzalloc(MAX_DYNEVENT_CMD_LEN, GFP_KERNEL);
919
920 /* Before generating the command, initialize the cmd object */
921 kprobe_event_cmd_init(&cmd, buf, MAX_DYNEVENT_CMD_LEN);
922
923 /*
924 * Define the gen_kprobe_test event with the first 2 kprobe
925 * fields.
926 */
927 ret = kprobe_event_gen_cmd_start(&cmd, "gen_kprobe_test", "do_sys_open",
928 "dfd=%ax", "filename=%dx");
929
930Once the kprobe event object has been created, it can then be
931populated with more fields. Fields can be added using
932kprobe_event_add_fields(), supplying the dynevent_cmd object along
933with a variable arg list of probe fields. For example, to add a
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100934couple additional fields, the following call could be made::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600935
936 ret = kprobe_event_add_fields(&cmd, "flags=%cx", "mode=+4($stack)");
937
938Once all the fields have been added, the event should be finalized and
939registered by calling the kprobe_event_gen_cmd_end() or
940kretprobe_event_gen_cmd_end() functions, depending on whether a kprobe
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100941or kretprobe command was started::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600942
943 ret = kprobe_event_gen_cmd_end(&cmd);
944
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100945or::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600946
947 ret = kretprobe_event_gen_cmd_end(&cmd);
948
949At this point, the event object is ready to be used for tracing new
950events.
951
952Similarly, a kretprobe event can be created using
953kretprobe_event_gen_cmd_start() with a probe name and location and
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100954additional params such as $retval::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600955
956 ret = kretprobe_event_gen_cmd_start(&cmd, "gen_kretprobe_test",
957 "do_sys_open", "$retval");
958
959Similar to the synthetic event case, code like the following can be
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100960used to enable the newly created kprobe event::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600961
962 gen_kprobe_test = trace_get_event_file(NULL, "kprobes", "gen_kprobe_test");
963
964 ret = trace_array_set_clr_event(gen_kprobe_test->tr,
965 "kprobes", "gen_kprobe_test", true);
966
967Finally, also similar to synthetic events, the following code can be
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100968used to give the kprobe event file back and delete the event::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600969
970 trace_put_event_file(gen_kprobe_test);
971
972 ret = kprobe_event_delete("gen_kprobe_test");
973
Tom Zanussib8170fa2020-05-18 13:29:24 -05009747.4 The "dynevent_cmd" low-level API
975------------------------------------
Tom Zanussi34ed6352020-01-29 12:59:32 -0600976
977Both the in-kernel synthetic event and kprobe interfaces are built on
978top of a lower-level "dynevent_cmd" interface. This interface is
979meant to provide the basis for higher-level interfaces such as the
980synthetic and kprobe interfaces, which can be used as examples.
981
982The basic idea is simple and amounts to providing a general-purpose
983layer that can be used to generate trace event commands. The
984generated command strings can then be passed to the command-parsing
985and event creation code that already exists in the trace event
986subystem for creating the corresponding trace events.
987
988In a nutshell, the way it works is that the higher-level interface
989code creates a struct dynevent_cmd object, then uses a couple
990functions, dynevent_arg_add() and dynevent_arg_pair_add() to build up
991a command string, which finally causes the command to be executed
992using the dynevent_create() function. The details of the interface
993are described below.
994
995The first step in building a new command string is to create and
996initialize an instance of a dynevent_cmd. Here, for instance, we
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +0100997create a dynevent_cmd on the stack and initialize it::
Tom Zanussi34ed6352020-01-29 12:59:32 -0600998
999 struct dynevent_cmd cmd;
1000 char *buf;
1001 int ret;
1002
1003 buf = kzalloc(MAX_DYNEVENT_CMD_LEN, GFP_KERNEL);
1004
1005 dynevent_cmd_init(cmd, buf, maxlen, DYNEVENT_TYPE_FOO,
1006 foo_event_run_command);
1007
1008The dynevent_cmd initialization needs to be given a user-specified
1009buffer and the length of the buffer (MAX_DYNEVENT_CMD_LEN can be used
1010for this purpose - at 2k it's generally too big to be comfortably put
1011on the stack, so is dynamically allocated), a dynevent type id, which
1012is meant to be used to check that further API calls are for the
1013correct command type, and a pointer to an event-specific run_command()
1014callback that will be called to actually execute the event-specific
1015command function.
1016
1017Once that's done, the command string can by built up by successive
1018calls to argument-adding functions.
1019
1020To add a single argument, define and initialize a struct dynevent_arg
1021or struct dynevent_arg_pair object. Here's an example of the simplest
1022possible arg addition, which is simply to append the given string as
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +01001023a whitespace-separated argument to the command::
Tom Zanussi34ed6352020-01-29 12:59:32 -06001024
1025 struct dynevent_arg arg;
1026
1027 dynevent_arg_init(&arg, NULL, 0);
1028
1029 arg.str = name;
1030
1031 ret = dynevent_arg_add(cmd, &arg);
1032
1033The arg object is first initialized using dynevent_arg_init() and in
1034this case the parameters are NULL or 0, which means there's no
1035optional sanity-checking function or separator appended to the end of
1036the arg.
1037
1038Here's another more complicated example using an 'arg pair', which is
1039used to create an argument that consists of a couple components added
1040together as a unit, for example, a 'type field_name;' arg or a simple
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +01001041expression arg e.g. 'flags=%cx'::
Tom Zanussi34ed6352020-01-29 12:59:32 -06001042
1043 struct dynevent_arg_pair arg_pair;
1044
1045 dynevent_arg_pair_init(&arg_pair, dynevent_foo_check_arg_fn, 0, ';');
1046
1047 arg_pair.lhs = type;
1048 arg_pair.rhs = name;
1049
1050 ret = dynevent_arg_pair_add(cmd, &arg_pair);
1051
1052Again, the arg_pair is first initialized, in this case with a callback
1053function used to check the sanity of the args (for example, that
1054neither part of the pair is NULL), along with a character to be used
1055to add an operator between the pair (here none) and a separator to be
1056appended onto the end of the arg pair (here ';').
1057
1058There's also a dynevent_str_add() function that can be used to simply
1059add a string as-is, with no spaces, delimeters, or arg check.
1060
1061Any number of dynevent_*_add() calls can be made to build up the string
1062(until its length surpasses cmd->maxlen). When all the arguments have
1063been added and the command string is complete, the only thing left to
1064do is run the command, which happens by simply calling
Mauro Carvalho Chehab8206de72020-03-03 16:50:31 +01001065dynevent_create()::
Tom Zanussi34ed6352020-01-29 12:59:32 -06001066
1067 ret = dynevent_create(&cmd);
1068
1069At that point, if the return value is 0, the dynamic event has been
1070created and is ready to use.
1071
1072See the dynevent_cmd function definitions themselves for the details
1073of the API.