cachepc-linux

Fork of AMDESE/linux with modifications for CachePC side-channel attack
git clone https://git.sinitax.com/sinitax/cachepc-linux
Log | Files | Refs | README | LICENSE | sfeed.txt

events.rst (40799B)


      1=============
      2Event Tracing
      3=============
      4
      5:Author: Theodore Ts'o
      6:Updated: Li Zefan and Tom Zanussi
      7
      81. Introduction
      9===============
     10
     11Tracepoints (see Documentation/trace/tracepoints.rst) can be used
     12without creating custom kernel modules to register probe functions
     13using the event tracing infrastructure.
     14
     15Not all tracepoints can be traced using the event tracing system;
     16the kernel developer must provide code snippets which define how the
     17tracing information is saved into the tracing buffer, and how the
     18tracing information should be printed.
     19
     202. Using Event Tracing
     21======================
     22
     232.1 Via the 'set_event' interface
     24---------------------------------
     25
     26The events which are available for tracing can be found in the file
     27/sys/kernel/debug/tracing/available_events.
     28
     29To enable a particular event, such as 'sched_wakeup', simply echo it
     30to /sys/kernel/debug/tracing/set_event. For example::
     31
     32	# echo sched_wakeup >> /sys/kernel/debug/tracing/set_event
     33
     34.. Note:: '>>' is necessary, otherwise it will firstly disable all the events.
     35
     36To disable an event, echo the event name to the set_event file prefixed
     37with an exclamation point::
     38
     39	# echo '!sched_wakeup' >> /sys/kernel/debug/tracing/set_event
     40
     41To disable all events, echo an empty line to the set_event file::
     42
     43	# echo > /sys/kernel/debug/tracing/set_event
     44
     45To enable all events, echo ``*:*`` or ``*:`` to the set_event file::
     46
     47	# echo *:* > /sys/kernel/debug/tracing/set_event
     48
     49The events are organized into subsystems, such as ext4, irq, sched,
     50etc., and a full event name looks like this: <subsystem>:<event>.  The
     51subsystem name is optional, but it is displayed in the available_events
     52file.  All of the events in a subsystem can be specified via the syntax
     53``<subsystem>:*``; for example, to enable all irq events, you can use the
     54command::
     55
     56	# echo 'irq:*' > /sys/kernel/debug/tracing/set_event
     57
     582.2 Via the 'enable' toggle
     59---------------------------
     60
     61The events available are also listed in /sys/kernel/debug/tracing/events/ hierarchy
     62of directories.
     63
     64To enable event 'sched_wakeup'::
     65
     66	# echo 1 > /sys/kernel/debug/tracing/events/sched/sched_wakeup/enable
     67
     68To disable it::
     69
     70	# echo 0 > /sys/kernel/debug/tracing/events/sched/sched_wakeup/enable
     71
     72To enable all events in sched subsystem::
     73
     74	# echo 1 > /sys/kernel/debug/tracing/events/sched/enable
     75
     76To enable all events::
     77
     78	# echo 1 > /sys/kernel/debug/tracing/events/enable
     79
     80When reading one of these enable files, there are four results:
     81
     82 - 0 - all events this file affects are disabled
     83 - 1 - all events this file affects are enabled
     84 - X - there is a mixture of events enabled and disabled
     85 - ? - this file does not affect any event
     86
     872.3 Boot option
     88---------------
     89
     90In order to facilitate early boot debugging, use boot option::
     91
     92	trace_event=[event-list]
     93
     94event-list is a comma separated list of events. See section 2.1 for event
     95format.
     96
     973. Defining an event-enabled tracepoint
     98=======================================
     99
    100See The example provided in samples/trace_events
    101
    1024. Event formats
    103================
    104
    105Each trace event has a 'format' file associated with it that contains
    106a description of each field in a logged event.  This information can
    107be used to parse the binary trace stream, and is also the place to
    108find the field names that can be used in event filters (see section 5).
    109
    110It also displays the format string that will be used to print the
    111event in text mode, along with the event name and ID used for
    112profiling.
    113
    114Every event has a set of ``common`` fields associated with it; these are
    115the fields prefixed with ``common_``.  The other fields vary between
    116events and correspond to the fields defined in the TRACE_EVENT
    117definition for that event.
    118
    119Each field in the format has the form::
    120
    121     field:field-type field-name; offset:N; size:N;
    122
    123where offset is the offset of the field in the trace record and size
    124is the size of the data item, in bytes.
    125
    126For example, here's the information displayed for the 'sched_wakeup'
    127event::
    128
    129	# cat /sys/kernel/debug/tracing/events/sched/sched_wakeup/format
    130
    131	name: sched_wakeup
    132	ID: 60
    133	format:
    134		field:unsigned short common_type;	offset:0;	size:2;
    135		field:unsigned char common_flags;	offset:2;	size:1;
    136		field:unsigned char common_preempt_count;	offset:3;	size:1;
    137		field:int common_pid;	offset:4;	size:4;
    138		field:int common_tgid;	offset:8;	size:4;
    139
    140		field:char comm[TASK_COMM_LEN];	offset:12;	size:16;
    141		field:pid_t pid;	offset:28;	size:4;
    142		field:int prio;	offset:32;	size:4;
    143		field:int success;	offset:36;	size:4;
    144		field:int cpu;	offset:40;	size:4;
    145
    146	print fmt: "task %s:%d [%d] success=%d [%03d]", REC->comm, REC->pid,
    147		   REC->prio, REC->success, REC->cpu
    148
    149This event contains 10 fields, the first 5 common and the remaining 5
    150event-specific.  All the fields for this event are numeric, except for
    151'comm' which is a string, a distinction important for event filtering.
    152
    1535. Event filtering
    154==================
    155
    156Trace events can be filtered in the kernel by associating boolean
    157'filter expressions' with them.  As soon as an event is logged into
    158the trace buffer, its fields are checked against the filter expression
    159associated with that event type.  An event with field values that
    160'match' the filter will appear in the trace output, and an event whose
    161values don't match will be discarded.  An event with no filter
    162associated with it matches everything, and is the default when no
    163filter has been set for an event.
    164
    1655.1 Expression syntax
    166---------------------
    167
    168A filter expression consists of one or more 'predicates' that can be
    169combined using the logical operators '&&' and '||'.  A predicate is
    170simply a clause that compares the value of a field contained within a
    171logged event with a constant value and returns either 0 or 1 depending
    172on whether the field value matched (1) or didn't match (0)::
    173
    174	  field-name relational-operator value
    175
    176Parentheses can be used to provide arbitrary logical groupings and
    177double-quotes can be used to prevent the shell from interpreting
    178operators as shell metacharacters.
    179
    180The field-names available for use in filters can be found in the
    181'format' files for trace events (see section 4).
    182
    183The relational-operators depend on the type of the field being tested:
    184
    185The operators available for numeric fields are:
    186
    187==, !=, <, <=, >, >=, &
    188
    189And for string fields they are:
    190
    191==, !=, ~
    192
    193The glob (~) accepts a wild card character (\*,?) and character classes
    194([). For example::
    195
    196  prev_comm ~ "*sh"
    197  prev_comm ~ "sh*"
    198  prev_comm ~ "*sh*"
    199  prev_comm ~ "ba*sh"
    200
    201If the field is a pointer that points into user space (for example
    202"filename" from sys_enter_openat), then you have to append ".ustring" to the
    203field name::
    204
    205  filename.ustring ~ "password"
    206
    207As the kernel will have to know how to retrieve the memory that the pointer
    208is at from user space.
    209
    2105.2 Setting filters
    211-------------------
    212
    213A filter for an individual event is set by writing a filter expression
    214to the 'filter' file for the given event.
    215
    216For example::
    217
    218	# cd /sys/kernel/debug/tracing/events/sched/sched_wakeup
    219	# echo "common_preempt_count > 4" > filter
    220
    221A slightly more involved example::
    222
    223	# cd /sys/kernel/debug/tracing/events/signal/signal_generate
    224	# echo "((sig >= 10 && sig < 15) || sig == 17) && comm != bash" > filter
    225
    226If there is an error in the expression, you'll get an 'Invalid
    227argument' error when setting it, and the erroneous string along with
    228an error message can be seen by looking at the filter e.g.::
    229
    230	# cd /sys/kernel/debug/tracing/events/signal/signal_generate
    231	# echo "((sig >= 10 && sig < 15) || dsig == 17) && comm != bash" > filter
    232	-bash: echo: write error: Invalid argument
    233	# cat filter
    234	((sig >= 10 && sig < 15) || dsig == 17) && comm != bash
    235	^
    236	parse_error: Field not found
    237
    238Currently the caret ('^') for an error always appears at the beginning of
    239the filter string; the error message should still be useful though
    240even without more accurate position info.
    241
    2425.2.1 Filter limitations
    243------------------------
    244
    245If a filter is placed on a string pointer ``(char *)`` that does not point
    246to a string on the ring buffer, but instead points to kernel or user space
    247memory, then, for safety reasons, at most 1024 bytes of the content is
    248copied onto a temporary buffer to do the compare. If the copy of the memory
    249faults (the pointer points to memory that should not be accessed), then the
    250string compare will be treated as not matching.
    251
    2525.3 Clearing filters
    253--------------------
    254
    255To clear the filter for an event, write a '0' to the event's filter
    256file.
    257
    258To clear the filters for all events in a subsystem, write a '0' to the
    259subsystem's filter file.
    260
    2615.3 Subsystem filters
    262---------------------
    263
    264For convenience, filters for every event in a subsystem can be set or
    265cleared as a group by writing a filter expression into the filter file
    266at the root of the subsystem.  Note however, that if a filter for any
    267event within the subsystem lacks a field specified in the subsystem
    268filter, or if the filter can't be applied for any other reason, the
    269filter for that event will retain its previous setting.  This can
    270result in an unintended mixture of filters which could lead to
    271confusing (to the user who might think different filters are in
    272effect) trace output.  Only filters that reference just the common
    273fields can be guaranteed to propagate successfully to all events.
    274
    275Here are a few subsystem filter examples that also illustrate the
    276above points:
    277
    278Clear the filters on all events in the sched subsystem::
    279
    280	# cd /sys/kernel/debug/tracing/events/sched
    281	# echo 0 > filter
    282	# cat sched_switch/filter
    283	none
    284	# cat sched_wakeup/filter
    285	none
    286
    287Set a filter using only common fields for all events in the sched
    288subsystem (all events end up with the same filter)::
    289
    290	# cd /sys/kernel/debug/tracing/events/sched
    291	# echo common_pid == 0 > filter
    292	# cat sched_switch/filter
    293	common_pid == 0
    294	# cat sched_wakeup/filter
    295	common_pid == 0
    296
    297Attempt to set a filter using a non-common field for all events in the
    298sched subsystem (all events but those that have a prev_pid field retain
    299their old filters)::
    300
    301	# cd /sys/kernel/debug/tracing/events/sched
    302	# echo prev_pid == 0 > filter
    303	# cat sched_switch/filter
    304	prev_pid == 0
    305	# cat sched_wakeup/filter
    306	common_pid == 0
    307
    3085.4 PID filtering
    309-----------------
    310
    311The set_event_pid file in the same directory as the top events directory
    312exists, will filter all events from tracing any task that does not have the
    313PID listed in the set_event_pid file.
    314::
    315
    316	# cd /sys/kernel/debug/tracing
    317	# echo $$ > set_event_pid
    318	# echo 1 > events/enable
    319
    320Will only trace events for the current task.
    321
    322To add more PIDs without losing the PIDs already included, use '>>'.
    323::
    324
    325	# echo 123 244 1 >> set_event_pid
    326
    327
    3286. Event triggers
    329=================
    330
    331Trace events can be made to conditionally invoke trigger 'commands'
    332which can take various forms and are described in detail below;
    333examples would be enabling or disabling other trace events or invoking
    334a stack trace whenever the trace event is hit.  Whenever a trace event
    335with attached triggers is invoked, the set of trigger commands
    336associated with that event is invoked.  Any given trigger can
    337additionally have an event filter of the same form as described in
    338section 5 (Event filtering) associated with it - the command will only
    339be invoked if the event being invoked passes the associated filter.
    340If no filter is associated with the trigger, it always passes.
    341
    342Triggers are added to and removed from a particular event by writing
    343trigger expressions to the 'trigger' file for the given event.
    344
    345A given event can have any number of triggers associated with it,
    346subject to any restrictions that individual commands may have in that
    347regard.
    348
    349Event triggers are implemented on top of "soft" mode, which means that
    350whenever a trace event has one or more triggers associated with it,
    351the event is activated even if it isn't actually enabled, but is
    352disabled in a "soft" mode.  That is, the tracepoint will be called,
    353but just will not be traced, unless of course it's actually enabled.
    354This scheme allows triggers to be invoked even for events that aren't
    355enabled, and also allows the current event filter implementation to be
    356used for conditionally invoking triggers.
    357
    358The syntax for event triggers is roughly based on the syntax for
    359set_ftrace_filter 'ftrace filter commands' (see the 'Filter commands'
    360section of Documentation/trace/ftrace.rst), but there are major
    361differences and the implementation isn't currently tied to it in any
    362way, so beware about making generalizations between the two.
    363
    364.. Note::
    365     Writing into trace_marker (See Documentation/trace/ftrace.rst)
    366     can also enable triggers that are written into
    367     /sys/kernel/tracing/events/ftrace/print/trigger
    368
    3696.1 Expression syntax
    370---------------------
    371
    372Triggers are added by echoing the command to the 'trigger' file::
    373
    374  # echo 'command[:count] [if filter]' > trigger
    375
    376Triggers are removed by echoing the same command but starting with '!'
    377to the 'trigger' file::
    378
    379  # echo '!command[:count] [if filter]' > trigger
    380
    381The [if filter] part isn't used in matching commands when removing, so
    382leaving that off in a '!' command will accomplish the same thing as
    383having it in.
    384
    385The filter syntax is the same as that described in the 'Event
    386filtering' section above.
    387
    388For ease of use, writing to the trigger file using '>' currently just
    389adds or removes a single trigger and there's no explicit '>>' support
    390('>' actually behaves like '>>') or truncation support to remove all
    391triggers (you have to use '!' for each one added.)
    392
    3936.2 Supported trigger commands
    394------------------------------
    395
    396The following commands are supported:
    397
    398- enable_event/disable_event
    399
    400  These commands can enable or disable another trace event whenever
    401  the triggering event is hit.  When these commands are registered,
    402  the other trace event is activated, but disabled in a "soft" mode.
    403  That is, the tracepoint will be called, but just will not be traced.
    404  The event tracepoint stays in this mode as long as there's a trigger
    405  in effect that can trigger it.
    406
    407  For example, the following trigger causes kmalloc events to be
    408  traced when a read system call is entered, and the :1 at the end
    409  specifies that this enablement happens only once::
    410
    411	  # echo 'enable_event:kmem:kmalloc:1' > \
    412	      /sys/kernel/debug/tracing/events/syscalls/sys_enter_read/trigger
    413
    414  The following trigger causes kmalloc events to stop being traced
    415  when a read system call exits.  This disablement happens on every
    416  read system call exit::
    417
    418	  # echo 'disable_event:kmem:kmalloc' > \
    419	      /sys/kernel/debug/tracing/events/syscalls/sys_exit_read/trigger
    420
    421  The format is::
    422
    423      enable_event:<system>:<event>[:count]
    424      disable_event:<system>:<event>[:count]
    425
    426  To remove the above commands::
    427
    428	  # echo '!enable_event:kmem:kmalloc:1' > \
    429	      /sys/kernel/debug/tracing/events/syscalls/sys_enter_read/trigger
    430
    431	  # echo '!disable_event:kmem:kmalloc' > \
    432	      /sys/kernel/debug/tracing/events/syscalls/sys_exit_read/trigger
    433
    434  Note that there can be any number of enable/disable_event triggers
    435  per triggering event, but there can only be one trigger per
    436  triggered event. e.g. sys_enter_read can have triggers enabling both
    437  kmem:kmalloc and sched:sched_switch, but can't have two kmem:kmalloc
    438  versions such as kmem:kmalloc and kmem:kmalloc:1 or 'kmem:kmalloc if
    439  bytes_req == 256' and 'kmem:kmalloc if bytes_alloc == 256' (they
    440  could be combined into a single filter on kmem:kmalloc though).
    441
    442- stacktrace
    443
    444  This command dumps a stacktrace in the trace buffer whenever the
    445  triggering event occurs.
    446
    447  For example, the following trigger dumps a stacktrace every time the
    448  kmalloc tracepoint is hit::
    449
    450	  # echo 'stacktrace' > \
    451		/sys/kernel/debug/tracing/events/kmem/kmalloc/trigger
    452
    453  The following trigger dumps a stacktrace the first 5 times a kmalloc
    454  request happens with a size >= 64K::
    455
    456	  # echo 'stacktrace:5 if bytes_req >= 65536' > \
    457		/sys/kernel/debug/tracing/events/kmem/kmalloc/trigger
    458
    459  The format is::
    460
    461      stacktrace[:count]
    462
    463  To remove the above commands::
    464
    465	  # echo '!stacktrace' > \
    466		/sys/kernel/debug/tracing/events/kmem/kmalloc/trigger
    467
    468	  # echo '!stacktrace:5 if bytes_req >= 65536' > \
    469		/sys/kernel/debug/tracing/events/kmem/kmalloc/trigger
    470
    471  The latter can also be removed more simply by the following (without
    472  the filter)::
    473
    474	  # echo '!stacktrace:5' > \
    475		/sys/kernel/debug/tracing/events/kmem/kmalloc/trigger
    476
    477  Note that there can be only one stacktrace trigger per triggering
    478  event.
    479
    480- snapshot
    481
    482  This command causes a snapshot to be triggered whenever the
    483  triggering event occurs.
    484
    485  The following command creates a snapshot every time a block request
    486  queue is unplugged with a depth > 1.  If you were tracing a set of
    487  events or functions at the time, the snapshot trace buffer would
    488  capture those events when the trigger event occurred::
    489
    490	  # echo 'snapshot if nr_rq > 1' > \
    491		/sys/kernel/debug/tracing/events/block/block_unplug/trigger
    492
    493  To only snapshot once::
    494
    495	  # echo 'snapshot:1 if nr_rq > 1' > \
    496		/sys/kernel/debug/tracing/events/block/block_unplug/trigger
    497
    498  To remove the above commands::
    499
    500	  # echo '!snapshot if nr_rq > 1' > \
    501		/sys/kernel/debug/tracing/events/block/block_unplug/trigger
    502
    503	  # echo '!snapshot:1 if nr_rq > 1' > \
    504		/sys/kernel/debug/tracing/events/block/block_unplug/trigger
    505
    506  Note that there can be only one snapshot trigger per triggering
    507  event.
    508
    509- traceon/traceoff
    510
    511  These commands turn tracing on and off when the specified events are
    512  hit. The parameter determines how many times the tracing system is
    513  turned on and off. If unspecified, there is no limit.
    514
    515  The following command turns tracing off the first time a block
    516  request queue is unplugged with a depth > 1.  If you were tracing a
    517  set of events or functions at the time, you could then examine the
    518  trace buffer to see the sequence of events that led up to the
    519  trigger event::
    520
    521	  # echo 'traceoff:1 if nr_rq > 1' > \
    522		/sys/kernel/debug/tracing/events/block/block_unplug/trigger
    523
    524  To always disable tracing when nr_rq  > 1::
    525
    526	  # echo 'traceoff if nr_rq > 1' > \
    527		/sys/kernel/debug/tracing/events/block/block_unplug/trigger
    528
    529  To remove the above commands::
    530
    531	  # echo '!traceoff:1 if nr_rq > 1' > \
    532		/sys/kernel/debug/tracing/events/block/block_unplug/trigger
    533
    534	  # echo '!traceoff if nr_rq > 1' > \
    535		/sys/kernel/debug/tracing/events/block/block_unplug/trigger
    536
    537  Note that there can be only one traceon or traceoff trigger per
    538  triggering event.
    539
    540- hist
    541
    542  This command aggregates event hits into a hash table keyed on one or
    543  more trace event format fields (or stacktrace) and a set of running
    544  totals derived from one or more trace event format fields and/or
    545  event counts (hitcount).
    546
    547  See Documentation/trace/histogram.rst for details and examples.
    548
    5497. In-kernel trace event API
    550============================
    551
    552In most cases, the command-line interface to trace events is more than
    553sufficient.  Sometimes, however, applications might find the need for
    554more complex relationships than can be expressed through a simple
    555series of linked command-line expressions, or putting together sets of
    556commands may be simply too cumbersome.  An example might be an
    557application that needs to 'listen' to the trace stream in order to
    558maintain an in-kernel state machine detecting, for instance, when an
    559illegal kernel state occurs in the scheduler.
    560
    561The trace event subsystem provides an in-kernel API allowing modules
    562or other kernel code to generate user-defined 'synthetic' events at
    563will, which can be used to either augment the existing trace stream
    564and/or signal that a particular important state has occurred.
    565
    566A similar in-kernel API is also available for creating kprobe and
    567kretprobe events.
    568
    569Both the synthetic event and k/ret/probe event APIs are built on top
    570of a lower-level "dynevent_cmd" event command API, which is also
    571available for more specialized applications, or as the basis of other
    572higher-level trace event APIs.
    573
    574The API provided for these purposes is describe below and allows the
    575following:
    576
    577  - dynamically creating synthetic event definitions
    578  - dynamically creating kprobe and kretprobe event definitions
    579  - tracing synthetic events from in-kernel code
    580  - the low-level "dynevent_cmd" API
    581
    5827.1 Dyamically creating synthetic event definitions
    583---------------------------------------------------
    584
    585There are a couple ways to create a new synthetic event from a kernel
    586module or other kernel code.
    587
    588The first creates the event in one step, using synth_event_create().
    589In this method, the name of the event to create and an array defining
    590the fields is supplied to synth_event_create().  If successful, a
    591synthetic event with that name and fields will exist following that
    592call.  For example, to create a new "schedtest" synthetic event::
    593
    594  ret = synth_event_create("schedtest", sched_fields,
    595                           ARRAY_SIZE(sched_fields), THIS_MODULE);
    596
    597The sched_fields param in this example points to an array of struct
    598synth_field_desc, each of which describes an event field by type and
    599name::
    600
    601  static struct synth_field_desc sched_fields[] = {
    602        { .type = "pid_t",              .name = "next_pid_field" },
    603        { .type = "char[16]",           .name = "next_comm_field" },
    604        { .type = "u64",                .name = "ts_ns" },
    605        { .type = "u64",                .name = "ts_ms" },
    606        { .type = "unsigned int",       .name = "cpu" },
    607        { .type = "char[64]",           .name = "my_string_field" },
    608        { .type = "int",                .name = "my_int_field" },
    609  };
    610
    611See synth_field_size() for available types.
    612
    613If field_name contains [n], the field is considered to be a static array.
    614
    615If field_names contains[] (no subscript), the field is considered to
    616be a dynamic array, which will only take as much space in the event as
    617is required to hold the array.
    618
    619Because space for an event is reserved before assigning field values
    620to the event, using dynamic arrays implies that the piecewise
    621in-kernel API described below can't be used with dynamic arrays.  The
    622other non-piecewise in-kernel APIs can, however, be used with dynamic
    623arrays.
    624
    625If the event is created from within a module, a pointer to the module
    626must be passed to synth_event_create().  This will ensure that the
    627trace buffer won't contain unreadable events when the module is
    628removed.
    629
    630At this point, the event object is ready to be used for generating new
    631events.
    632
    633In the second method, the event is created in several steps.  This
    634allows events to be created dynamically and without the need to create
    635and populate an array of fields beforehand.
    636
    637To use this method, an empty or partially empty synthetic event should
    638first be created using synth_event_gen_cmd_start() or
    639synth_event_gen_cmd_array_start().  For synth_event_gen_cmd_start(),
    640the name of the event along with one or more pairs of args each pair
    641representing a 'type field_name;' field specification should be
    642supplied.  For synth_event_gen_cmd_array_start(), the name of the
    643event along with an array of struct synth_field_desc should be
    644supplied. Before calling synth_event_gen_cmd_start() or
    645synth_event_gen_cmd_array_start(), the user should create and
    646initialize a dynevent_cmd object using synth_event_cmd_init().
    647
    648For example, to create a new "schedtest" synthetic event with two
    649fields::
    650
    651  struct dynevent_cmd cmd;
    652  char *buf;
    653
    654  /* Create a buffer to hold the generated command */
    655  buf = kzalloc(MAX_DYNEVENT_CMD_LEN, GFP_KERNEL);
    656
    657  /* Before generating the command, initialize the cmd object */
    658  synth_event_cmd_init(&cmd, buf, MAX_DYNEVENT_CMD_LEN);
    659
    660  ret = synth_event_gen_cmd_start(&cmd, "schedtest", THIS_MODULE,
    661                                  "pid_t", "next_pid_field",
    662                                  "u64", "ts_ns");
    663
    664Alternatively, using an array of struct synth_field_desc fields
    665containing the same information::
    666
    667  ret = synth_event_gen_cmd_array_start(&cmd, "schedtest", THIS_MODULE,
    668                                        fields, n_fields);
    669
    670Once the synthetic event object has been created, it can then be
    671populated with more fields.  Fields are added one by one using
    672synth_event_add_field(), supplying the dynevent_cmd object, a field
    673type, and a field name.  For example, to add a new int field named
    674"intfield", the following call should be made::
    675
    676  ret = synth_event_add_field(&cmd, "int", "intfield");
    677
    678See synth_field_size() for available types. If field_name contains [n]
    679the field is considered to be an array.
    680
    681A group of fields can also be added all at once using an array of
    682synth_field_desc with add_synth_fields().  For example, this would add
    683just the first four sched_fields::
    684
    685  ret = synth_event_add_fields(&cmd, sched_fields, 4);
    686
    687If you already have a string of the form 'type field_name',
    688synth_event_add_field_str() can be used to add it as-is; it will
    689also automatically append a ';' to the string.
    690
    691Once all the fields have been added, the event should be finalized and
    692registered by calling the synth_event_gen_cmd_end() function::
    693
    694  ret = synth_event_gen_cmd_end(&cmd);
    695
    696At this point, the event object is ready to be used for tracing new
    697events.
    698
    6997.2 Tracing synthetic events from in-kernel code
    700------------------------------------------------
    701
    702To trace a synthetic event, there are several options.  The first
    703option is to trace the event in one call, using synth_event_trace()
    704with a variable number of values, or synth_event_trace_array() with an
    705array of values to be set.  A second option can be used to avoid the
    706need for a pre-formed array of values or list of arguments, via
    707synth_event_trace_start() and synth_event_trace_end() along with
    708synth_event_add_next_val() or synth_event_add_val() to add the values
    709piecewise.
    710
    7117.2.1 Tracing a synthetic event all at once
    712-------------------------------------------
    713
    714To trace a synthetic event all at once, the synth_event_trace() or
    715synth_event_trace_array() functions can be used.
    716
    717The synth_event_trace() function is passed the trace_event_file
    718representing the synthetic event (which can be retrieved using
    719trace_get_event_file() using the synthetic event name, "synthetic" as
    720the system name, and the trace instance name (NULL if using the global
    721trace array)), along with an variable number of u64 args, one for each
    722synthetic event field, and the number of values being passed.
    723
    724So, to trace an event corresponding to the synthetic event definition
    725above, code like the following could be used::
    726
    727  ret = synth_event_trace(create_synth_test, 7, /* number of values */
    728                          444,             /* next_pid_field */
    729                          (u64)"clackers", /* next_comm_field */
    730                          1000000,         /* ts_ns */
    731                          1000,            /* ts_ms */
    732                          smp_processor_id(),/* cpu */
    733                          (u64)"Thneed",   /* my_string_field */
    734                          999);            /* my_int_field */
    735
    736All vals should be cast to u64, and string vals are just pointers to
    737strings, cast to u64.  Strings will be copied into space reserved in
    738the event for the string, using these pointers.
    739
    740Alternatively, the synth_event_trace_array() function can be used to
    741accomplish the same thing.  It is passed the trace_event_file
    742representing the synthetic event (which can be retrieved using
    743trace_get_event_file() using the synthetic event name, "synthetic" as
    744the system name, and the trace instance name (NULL if using the global
    745trace array)), along with an array of u64, one for each synthetic
    746event field.
    747
    748To trace an event corresponding to the synthetic event definition
    749above, code like the following could be used::
    750
    751  u64 vals[7];
    752
    753  vals[0] = 777;                  /* next_pid_field */
    754  vals[1] = (u64)"tiddlywinks";   /* next_comm_field */
    755  vals[2] = 1000000;              /* ts_ns */
    756  vals[3] = 1000;                 /* ts_ms */
    757  vals[4] = smp_processor_id();   /* cpu */
    758  vals[5] = (u64)"thneed";        /* my_string_field */
    759  vals[6] = 398;                  /* my_int_field */
    760
    761The 'vals' array is just an array of u64, the number of which must
    762match the number of field in the synthetic event, and which must be in
    763the same order as the synthetic event fields.
    764
    765All vals should be cast to u64, and string vals are just pointers to
    766strings, cast to u64.  Strings will be copied into space reserved in
    767the event for the string, using these pointers.
    768
    769In order to trace a synthetic event, a pointer to the trace event file
    770is needed.  The trace_get_event_file() function can be used to get
    771it - it will find the file in the given trace instance (in this case
    772NULL since the top trace array is being used) while at the same time
    773preventing the instance containing it from going away::
    774
    775       schedtest_event_file = trace_get_event_file(NULL, "synthetic",
    776                                                   "schedtest");
    777
    778Before tracing the event, it should be enabled in some way, otherwise
    779the synthetic event won't actually show up in the trace buffer.
    780
    781To enable a synthetic event from the kernel, trace_array_set_clr_event()
    782can be used (which is not specific to synthetic events, so does need
    783the "synthetic" system name to be specified explicitly).
    784
    785To enable the event, pass 'true' to it::
    786
    787       trace_array_set_clr_event(schedtest_event_file->tr,
    788                                 "synthetic", "schedtest", true);
    789
    790To disable it pass false::
    791
    792       trace_array_set_clr_event(schedtest_event_file->tr,
    793                                 "synthetic", "schedtest", false);
    794
    795Finally, synth_event_trace_array() can be used to actually trace the
    796event, which should be visible in the trace buffer afterwards::
    797
    798       ret = synth_event_trace_array(schedtest_event_file, vals,
    799                                     ARRAY_SIZE(vals));
    800
    801To remove the synthetic event, the event should be disabled, and the
    802trace instance should be 'put' back using trace_put_event_file()::
    803
    804       trace_array_set_clr_event(schedtest_event_file->tr,
    805                                 "synthetic", "schedtest", false);
    806       trace_put_event_file(schedtest_event_file);
    807
    808If those have been successful, synth_event_delete() can be called to
    809remove the event::
    810
    811       ret = synth_event_delete("schedtest");
    812
    8137.2.2 Tracing a synthetic event piecewise
    814-----------------------------------------
    815
    816To trace a synthetic using the piecewise method described above, the
    817synth_event_trace_start() function is used to 'open' the synthetic
    818event trace::
    819
    820       struct synth_event_trace_state trace_state;
    821
    822       ret = synth_event_trace_start(schedtest_event_file, &trace_state);
    823
    824It's passed the trace_event_file representing the synthetic event
    825using the same methods as described above, along with a pointer to a
    826struct synth_event_trace_state object, which will be zeroed before use and
    827used to maintain state between this and following calls.
    828
    829Once the event has been opened, which means space for it has been
    830reserved in the trace buffer, the individual fields can be set.  There
    831are two ways to do that, either one after another for each field in
    832the event, which requires no lookups, or by name, which does.  The
    833tradeoff is flexibility in doing the assignments vs the cost of a
    834lookup per field.
    835
    836To assign the values one after the other without lookups,
    837synth_event_add_next_val() should be used.  Each call is passed the
    838same synth_event_trace_state object used in the synth_event_trace_start(),
    839along with the value to set the next field in the event.  After each
    840field is set, the 'cursor' points to the next field, which will be set
    841by the subsequent call, continuing until all the fields have been set
    842in order.  The same sequence of calls as in the above examples using
    843this method would be (without error-handling code)::
    844
    845       /* next_pid_field */
    846       ret = synth_event_add_next_val(777, &trace_state);
    847
    848       /* next_comm_field */
    849       ret = synth_event_add_next_val((u64)"slinky", &trace_state);
    850
    851       /* ts_ns */
    852       ret = synth_event_add_next_val(1000000, &trace_state);
    853
    854       /* ts_ms */
    855       ret = synth_event_add_next_val(1000, &trace_state);
    856
    857       /* cpu */
    858       ret = synth_event_add_next_val(smp_processor_id(), &trace_state);
    859
    860       /* my_string_field */
    861       ret = synth_event_add_next_val((u64)"thneed_2.01", &trace_state);
    862
    863       /* my_int_field */
    864       ret = synth_event_add_next_val(395, &trace_state);
    865
    866To assign the values in any order, synth_event_add_val() should be
    867used.  Each call is passed the same synth_event_trace_state object used in
    868the synth_event_trace_start(), along with the field name of the field
    869to set and the value to set it to.  The same sequence of calls as in
    870the above examples using this method would be (without error-handling
    871code)::
    872
    873       ret = synth_event_add_val("next_pid_field", 777, &trace_state);
    874       ret = synth_event_add_val("next_comm_field", (u64)"silly putty",
    875                                 &trace_state);
    876       ret = synth_event_add_val("ts_ns", 1000000, &trace_state);
    877       ret = synth_event_add_val("ts_ms", 1000, &trace_state);
    878       ret = synth_event_add_val("cpu", smp_processor_id(), &trace_state);
    879       ret = synth_event_add_val("my_string_field", (u64)"thneed_9",
    880                                 &trace_state);
    881       ret = synth_event_add_val("my_int_field", 3999, &trace_state);
    882
    883Note that synth_event_add_next_val() and synth_event_add_val() are
    884incompatible if used within the same trace of an event - either one
    885can be used but not both at the same time.
    886
    887Finally, the event won't be actually traced until it's 'closed',
    888which is done using synth_event_trace_end(), which takes only the
    889struct synth_event_trace_state object used in the previous calls::
    890
    891       ret = synth_event_trace_end(&trace_state);
    892
    893Note that synth_event_trace_end() must be called at the end regardless
    894of whether any of the add calls failed (say due to a bad field name
    895being passed in).
    896
    8977.3 Dyamically creating kprobe and kretprobe event definitions
    898--------------------------------------------------------------
    899
    900To create a kprobe or kretprobe trace event from kernel code, the
    901kprobe_event_gen_cmd_start() or kretprobe_event_gen_cmd_start()
    902functions can be used.
    903
    904To create a kprobe event, an empty or partially empty kprobe event
    905should first be created using kprobe_event_gen_cmd_start().  The name
    906of the event and the probe location should be specfied along with one
    907or args each representing a probe field should be supplied to this
    908function.  Before calling kprobe_event_gen_cmd_start(), the user
    909should create and initialize a dynevent_cmd object using
    910kprobe_event_cmd_init().
    911
    912For example, to create a new "schedtest" kprobe event with two fields::
    913
    914  struct dynevent_cmd cmd;
    915  char *buf;
    916
    917  /* Create a buffer to hold the generated command */
    918  buf = kzalloc(MAX_DYNEVENT_CMD_LEN, GFP_KERNEL);
    919
    920  /* Before generating the command, initialize the cmd object */
    921  kprobe_event_cmd_init(&cmd, buf, MAX_DYNEVENT_CMD_LEN);
    922
    923  /*
    924   * Define the gen_kprobe_test event with the first 2 kprobe
    925   * fields.
    926   */
    927  ret = kprobe_event_gen_cmd_start(&cmd, "gen_kprobe_test", "do_sys_open",
    928                                   "dfd=%ax", "filename=%dx");
    929
    930Once the kprobe event object has been created, it can then be
    931populated with more fields.  Fields can be added using
    932kprobe_event_add_fields(), supplying the dynevent_cmd object along
    933with a variable arg list of probe fields.  For example, to add a
    934couple additional fields, the following call could be made::
    935
    936  ret = kprobe_event_add_fields(&cmd, "flags=%cx", "mode=+4($stack)");
    937
    938Once all the fields have been added, the event should be finalized and
    939registered by calling the kprobe_event_gen_cmd_end() or
    940kretprobe_event_gen_cmd_end() functions, depending on whether a kprobe
    941or kretprobe command was started::
    942
    943  ret = kprobe_event_gen_cmd_end(&cmd);
    944
    945or::
    946
    947  ret = kretprobe_event_gen_cmd_end(&cmd);
    948
    949At this point, the event object is ready to be used for tracing new
    950events.
    951
    952Similarly, a kretprobe event can be created using
    953kretprobe_event_gen_cmd_start() with a probe name and location and
    954additional params such as $retval::
    955
    956  ret = kretprobe_event_gen_cmd_start(&cmd, "gen_kretprobe_test",
    957                                      "do_sys_open", "$retval");
    958
    959Similar to the synthetic event case, code like the following can be
    960used to enable the newly created kprobe event::
    961
    962  gen_kprobe_test = trace_get_event_file(NULL, "kprobes", "gen_kprobe_test");
    963
    964  ret = trace_array_set_clr_event(gen_kprobe_test->tr,
    965                                  "kprobes", "gen_kprobe_test", true);
    966
    967Finally, also similar to synthetic events, the following code can be
    968used to give the kprobe event file back and delete the event::
    969
    970  trace_put_event_file(gen_kprobe_test);
    971
    972  ret = kprobe_event_delete("gen_kprobe_test");
    973
    9747.4 The "dynevent_cmd" low-level API
    975------------------------------------
    976
    977Both the in-kernel synthetic event and kprobe interfaces are built on
    978top of a lower-level "dynevent_cmd" interface.  This interface is
    979meant to provide the basis for higher-level interfaces such as the
    980synthetic and kprobe interfaces, which can be used as examples.
    981
    982The basic idea is simple and amounts to providing a general-purpose
    983layer that can be used to generate trace event commands.  The
    984generated command strings can then be passed to the command-parsing
    985and event creation code that already exists in the trace event
    986subystem for creating the corresponding trace events.
    987
    988In a nutshell, the way it works is that the higher-level interface
    989code creates a struct dynevent_cmd object, then uses a couple
    990functions, dynevent_arg_add() and dynevent_arg_pair_add() to build up
    991a command string, which finally causes the command to be executed
    992using the dynevent_create() function.  The details of the interface
    993are described below.
    994
    995The first step in building a new command string is to create and
    996initialize an instance of a dynevent_cmd.  Here, for instance, we
    997create a dynevent_cmd on the stack and initialize it::
    998
    999  struct dynevent_cmd cmd;
   1000  char *buf;
   1001  int ret;
   1002
   1003  buf = kzalloc(MAX_DYNEVENT_CMD_LEN, GFP_KERNEL);
   1004
   1005  dynevent_cmd_init(cmd, buf, maxlen, DYNEVENT_TYPE_FOO,
   1006                    foo_event_run_command);
   1007
   1008The dynevent_cmd initialization needs to be given a user-specified
   1009buffer and the length of the buffer (MAX_DYNEVENT_CMD_LEN can be used
   1010for this purpose - at 2k it's generally too big to be comfortably put
   1011on the stack, so is dynamically allocated), a dynevent type id, which
   1012is meant to be used to check that further API calls are for the
   1013correct command type, and a pointer to an event-specific run_command()
   1014callback that will be called to actually execute the event-specific
   1015command function.
   1016
   1017Once that's done, the command string can by built up by successive
   1018calls to argument-adding functions.
   1019
   1020To add a single argument, define and initialize a struct dynevent_arg
   1021or struct dynevent_arg_pair object.  Here's an example of the simplest
   1022possible arg addition, which is simply to append the given string as
   1023a whitespace-separated argument to the command::
   1024
   1025  struct dynevent_arg arg;
   1026
   1027  dynevent_arg_init(&arg, NULL, 0);
   1028
   1029  arg.str = name;
   1030
   1031  ret = dynevent_arg_add(cmd, &arg);
   1032
   1033The arg object is first initialized using dynevent_arg_init() and in
   1034this case the parameters are NULL or 0, which means there's no
   1035optional sanity-checking function or separator appended to the end of
   1036the arg.
   1037
   1038Here's another more complicated example using an 'arg pair', which is
   1039used to create an argument that consists of a couple components added
   1040together as a unit, for example, a 'type field_name;' arg or a simple
   1041expression arg e.g. 'flags=%cx'::
   1042
   1043  struct dynevent_arg_pair arg_pair;
   1044
   1045  dynevent_arg_pair_init(&arg_pair, dynevent_foo_check_arg_fn, 0, ';');
   1046
   1047  arg_pair.lhs = type;
   1048  arg_pair.rhs = name;
   1049
   1050  ret = dynevent_arg_pair_add(cmd, &arg_pair);
   1051
   1052Again, the arg_pair is first initialized, in this case with a callback
   1053function used to check the sanity of the args (for example, that
   1054neither part of the pair is NULL), along with a character to be used
   1055to add an operator between the pair (here none) and a separator to be
   1056appended onto the end of the arg pair (here ';').
   1057
   1058There's also a dynevent_str_add() function that can be used to simply
   1059add a string as-is, with no spaces, delimeters, or arg check.
   1060
   1061Any number of dynevent_*_add() calls can be made to build up the string
   1062(until its length surpasses cmd->maxlen).  When all the arguments have
   1063been added and the command string is complete, the only thing left to
   1064do is run the command, which happens by simply calling
   1065dynevent_create()::
   1066
   1067  ret = dynevent_create(&cmd);
   1068
   1069At that point, if the return value is 0, the dynamic event has been
   1070created and is ready to use.
   1071
   1072See the dynevent_cmd function definitions themselves for the details
   1073of the API.