6 :Updated: Li Zefan and Tom Zanussi
11 Tracepoints (see Documentation/trace/tracepoints.rst) can be used
12 without creating custom kernel modules to register probe functions
13 using the event tracing infrastructure.
15 Not all tracepoints can be traced using the event tracing system;
16 the kernel developer must provide code snippets which define how the
17 tracing information is saved into the tracing buffer, and how the
18 tracing information should be printed.
20 2. Using Event Tracing
21 ======================
23 2.1 Via the 'set_event' interface
24 ---------------------------------
26 The events which are available for tracing can be found in the file
27 /sys/kernel/tracing/available_events.
29 To enable a particular event, such as 'sched_wakeup', simply echo it
30 to /sys/kernel/tracing/set_event. For example::
32 # echo sched_wakeup >> /sys/kernel/tracing/set_event
34 .. Note:: '>>' is necessary, otherwise it will firstly disable all the events.
36 To disable an event, echo the event name to the set_event file prefixed
37 with an exclamation point::
39 # echo '!sched_wakeup' >> /sys/kernel/tracing/set_event
41 To disable all events, echo an empty line to the set_event file::
43 # echo > /sys/kernel/tracing/set_event
45 To enable all events, echo ``*:*`` or ``*:`` to the set_event file::
47 # echo *:* > /sys/kernel/tracing/set_event
49 The events are organized into subsystems, such as ext4, irq, sched,
50 etc., and a full event name looks like this: <subsystem>:<event>. The
51 subsystem name is optional, but it is displayed in the available_events
52 file. All of the events in a subsystem can be specified via the syntax
53 ``<subsystem>:*``; for example, to enable all irq events, you can use the
56 # echo 'irq:*' > /sys/kernel/tracing/set_event
58 2.2 Via the 'enable' toggle
59 ---------------------------
61 The events available are also listed in /sys/kernel/tracing/events/ hierarchy
64 To enable event 'sched_wakeup'::
66 # echo 1 > /sys/kernel/tracing/events/sched/sched_wakeup/enable
70 # echo 0 > /sys/kernel/tracing/events/sched/sched_wakeup/enable
72 To enable all events in sched subsystem::
74 # echo 1 > /sys/kernel/tracing/events/sched/enable
76 To enable all events::
78 # echo 1 > /sys/kernel/tracing/events/enable
80 When reading one of these enable files, there are four results:
82 - 0 - all events this file affects are disabled
83 - 1 - all events this file affects are enabled
84 - X - there is a mixture of events enabled and disabled
85 - ? - this file does not affect any event
90 In order to facilitate early boot debugging, use boot option::
92 trace_event=[event-list]
94 event-list is a comma separated list of events. See section 2.1 for event
97 3. Defining an event-enabled tracepoint
98 =======================================
100 See The example provided in samples/trace_events
105 Each trace event has a 'format' file associated with it that contains
106 a description of each field in a logged event. This information can
107 be used to parse the binary trace stream, and is also the place to
108 find the field names that can be used in event filters (see section 5).
110 It also displays the format string that will be used to print the
111 event in text mode, along with the event name and ID used for
114 Every event has a set of ``common`` fields associated with it; these are
115 the fields prefixed with ``common_``. The other fields vary between
116 events and correspond to the fields defined in the TRACE_EVENT
117 definition for that event.
119 Each field in the format has the form::
121 field:field-type field-name; offset:N; size:N;
123 where offset is the offset of the field in the trace record and size
124 is the size of the data item, in bytes.
126 For example, here's the information displayed for the 'sched_wakeup'
129 # cat /sys/kernel/tracing/events/sched/sched_wakeup/format
134 field:unsigned short common_type; offset:0; size:2;
135 field:unsigned char common_flags; offset:2; size:1;
136 field:unsigned char common_preempt_count; offset:3; size:1;
137 field:int common_pid; offset:4; size:4;
138 field:int common_tgid; offset:8; size:4;
140 field:char comm[TASK_COMM_LEN]; offset:12; size:16;
141 field:pid_t pid; offset:28; size:4;
142 field:int prio; offset:32; size:4;
143 field:int success; offset:36; size:4;
144 field:int cpu; offset:40; size:4;
146 print fmt: "task %s:%d [%d] success=%d [%03d]", REC->comm, REC->pid,
147 REC->prio, REC->success, REC->cpu
149 This event contains 10 fields, the first 5 common and the remaining 5
150 event-specific. All the fields for this event are numeric, except for
151 'comm' which is a string, a distinction important for event filtering.
156 Trace events can be filtered in the kernel by associating boolean
157 'filter expressions' with them. As soon as an event is logged into
158 the trace buffer, its fields are checked against the filter expression
159 associated with that event type. An event with field values that
160 'match' the filter will appear in the trace output, and an event whose
161 values don't match will be discarded. An event with no filter
162 associated with it matches everything, and is the default when no
163 filter has been set for an event.
165 5.1 Expression syntax
166 ---------------------
168 A filter expression consists of one or more 'predicates' that can be
169 combined using the logical operators '&&' and '||'. A predicate is
170 simply a clause that compares the value of a field contained within a
171 logged event with a constant value and returns either 0 or 1 depending
172 on whether the field value matched (1) or didn't match (0)::
174 field-name relational-operator value
176 Parentheses can be used to provide arbitrary logical groupings and
177 double-quotes can be used to prevent the shell from interpreting
178 operators as shell metacharacters.
180 The field-names available for use in filters can be found in the
181 'format' files for trace events (see section 4).
183 The relational-operators depend on the type of the field being tested:
185 The operators available for numeric fields are:
187 ==, !=, <, <=, >, >=, &
189 And for string fields they are:
193 The glob (~) accepts a wild card character (\*,?) and character classes
201 If the field is a pointer that points into user space (for example
202 "filename" from sys_enter_openat), then you have to append ".ustring" to the
205 filename.ustring ~ "password"
207 As the kernel will have to know how to retrieve the memory that the pointer
208 is at from user space.
210 You can convert any long type to a function address and search by function name::
212 call_site.function == security_prepare_creds
214 The above will filter when the field "call_site" falls on the address within
215 "security_prepare_creds". That is, it will compare the value of "call_site" and
216 the filter will return true if it is greater than or equal to the start of
217 the function "security_prepare_creds" and less than the end of that function.
219 The ".function" postfix can only be attached to values of size long, and can only
220 be compared with "==" or "!=".
225 A filter for an individual event is set by writing a filter expression
226 to the 'filter' file for the given event.
230 # cd /sys/kernel/tracing/events/sched/sched_wakeup
231 # echo "common_preempt_count > 4" > filter
233 A slightly more involved example::
235 # cd /sys/kernel/tracing/events/signal/signal_generate
236 # echo "((sig >= 10 && sig < 15) || sig == 17) && comm != bash" > filter
238 If there is an error in the expression, you'll get an 'Invalid
239 argument' error when setting it, and the erroneous string along with
240 an error message can be seen by looking at the filter e.g.::
242 # cd /sys/kernel/tracing/events/signal/signal_generate
243 # echo "((sig >= 10 && sig < 15) || dsig == 17) && comm != bash" > filter
244 -bash: echo: write error: Invalid argument
246 ((sig >= 10 && sig < 15) || dsig == 17) && comm != bash
248 parse_error: Field not found
250 Currently the caret ('^') for an error always appears at the beginning of
251 the filter string; the error message should still be useful though
252 even without more accurate position info.
254 5.2.1 Filter limitations
255 ------------------------
257 If a filter is placed on a string pointer ``(char *)`` that does not point
258 to a string on the ring buffer, but instead points to kernel or user space
259 memory, then, for safety reasons, at most 1024 bytes of the content is
260 copied onto a temporary buffer to do the compare. If the copy of the memory
261 faults (the pointer points to memory that should not be accessed), then the
262 string compare will be treated as not matching.
267 To clear the filter for an event, write a '0' to the event's filter
270 To clear the filters for all events in a subsystem, write a '0' to the
271 subsystem's filter file.
273 5.4 Subsystem filters
274 ---------------------
276 For convenience, filters for every event in a subsystem can be set or
277 cleared as a group by writing a filter expression into the filter file
278 at the root of the subsystem. Note however, that if a filter for any
279 event within the subsystem lacks a field specified in the subsystem
280 filter, or if the filter can't be applied for any other reason, the
281 filter for that event will retain its previous setting. This can
282 result in an unintended mixture of filters which could lead to
283 confusing (to the user who might think different filters are in
284 effect) trace output. Only filters that reference just the common
285 fields can be guaranteed to propagate successfully to all events.
287 Here are a few subsystem filter examples that also illustrate the
290 Clear the filters on all events in the sched subsystem::
292 # cd /sys/kernel/tracing/events/sched
294 # cat sched_switch/filter
296 # cat sched_wakeup/filter
299 Set a filter using only common fields for all events in the sched
300 subsystem (all events end up with the same filter)::
302 # cd /sys/kernel/tracing/events/sched
303 # echo common_pid == 0 > filter
304 # cat sched_switch/filter
306 # cat sched_wakeup/filter
309 Attempt to set a filter using a non-common field for all events in the
310 sched subsystem (all events but those that have a prev_pid field retain
313 # cd /sys/kernel/tracing/events/sched
314 # echo prev_pid == 0 > filter
315 # cat sched_switch/filter
317 # cat sched_wakeup/filter
323 The set_event_pid file in the same directory as the top events directory
324 exists, will filter all events from tracing any task that does not have the
325 PID listed in the set_event_pid file.
328 # cd /sys/kernel/tracing
329 # echo $$ > set_event_pid
330 # echo 1 > events/enable
332 Will only trace events for the current task.
334 To add more PIDs without losing the PIDs already included, use '>>'.
337 # echo 123 244 1 >> set_event_pid
343 Trace events can be made to conditionally invoke trigger 'commands'
344 which can take various forms and are described in detail below;
345 examples would be enabling or disabling other trace events or invoking
346 a stack trace whenever the trace event is hit. Whenever a trace event
347 with attached triggers is invoked, the set of trigger commands
348 associated with that event is invoked. Any given trigger can
349 additionally have an event filter of the same form as described in
350 section 5 (Event filtering) associated with it - the command will only
351 be invoked if the event being invoked passes the associated filter.
352 If no filter is associated with the trigger, it always passes.
354 Triggers are added to and removed from a particular event by writing
355 trigger expressions to the 'trigger' file for the given event.
357 A given event can have any number of triggers associated with it,
358 subject to any restrictions that individual commands may have in that
361 Event triggers are implemented on top of "soft" mode, which means that
362 whenever a trace event has one or more triggers associated with it,
363 the event is activated even if it isn't actually enabled, but is
364 disabled in a "soft" mode. That is, the tracepoint will be called,
365 but just will not be traced, unless of course it's actually enabled.
366 This scheme allows triggers to be invoked even for events that aren't
367 enabled, and also allows the current event filter implementation to be
368 used for conditionally invoking triggers.
370 The syntax for event triggers is roughly based on the syntax for
371 set_ftrace_filter 'ftrace filter commands' (see the 'Filter commands'
372 section of Documentation/trace/ftrace.rst), but there are major
373 differences and the implementation isn't currently tied to it in any
374 way, so beware about making generalizations between the two.
377 Writing into trace_marker (See Documentation/trace/ftrace.rst)
378 can also enable triggers that are written into
379 /sys/kernel/tracing/events/ftrace/print/trigger
381 6.1 Expression syntax
382 ---------------------
384 Triggers are added by echoing the command to the 'trigger' file::
386 # echo 'command[:count] [if filter]' > trigger
388 Triggers are removed by echoing the same command but starting with '!'
389 to the 'trigger' file::
391 # echo '!command[:count] [if filter]' > trigger
393 The [if filter] part isn't used in matching commands when removing, so
394 leaving that off in a '!' command will accomplish the same thing as
397 The filter syntax is the same as that described in the 'Event
398 filtering' section above.
400 For ease of use, writing to the trigger file using '>' currently just
401 adds or removes a single trigger and there's no explicit '>>' support
402 ('>' actually behaves like '>>') or truncation support to remove all
403 triggers (you have to use '!' for each one added.)
405 6.2 Supported trigger commands
406 ------------------------------
408 The following commands are supported:
410 - enable_event/disable_event
412 These commands can enable or disable another trace event whenever
413 the triggering event is hit. When these commands are registered,
414 the other trace event is activated, but disabled in a "soft" mode.
415 That is, the tracepoint will be called, but just will not be traced.
416 The event tracepoint stays in this mode as long as there's a trigger
417 in effect that can trigger it.
419 For example, the following trigger causes kmalloc events to be
420 traced when a read system call is entered, and the :1 at the end
421 specifies that this enablement happens only once::
423 # echo 'enable_event:kmem:kmalloc:1' > \
424 /sys/kernel/tracing/events/syscalls/sys_enter_read/trigger
426 The following trigger causes kmalloc events to stop being traced
427 when a read system call exits. This disablement happens on every
428 read system call exit::
430 # echo 'disable_event:kmem:kmalloc' > \
431 /sys/kernel/tracing/events/syscalls/sys_exit_read/trigger
435 enable_event:<system>:<event>[:count]
436 disable_event:<system>:<event>[:count]
438 To remove the above commands::
440 # echo '!enable_event:kmem:kmalloc:1' > \
441 /sys/kernel/tracing/events/syscalls/sys_enter_read/trigger
443 # echo '!disable_event:kmem:kmalloc' > \
444 /sys/kernel/tracing/events/syscalls/sys_exit_read/trigger
446 Note that there can be any number of enable/disable_event triggers
447 per triggering event, but there can only be one trigger per
448 triggered event. e.g. sys_enter_read can have triggers enabling both
449 kmem:kmalloc and sched:sched_switch, but can't have two kmem:kmalloc
450 versions such as kmem:kmalloc and kmem:kmalloc:1 or 'kmem:kmalloc if
451 bytes_req == 256' and 'kmem:kmalloc if bytes_alloc == 256' (they
452 could be combined into a single filter on kmem:kmalloc though).
456 This command dumps a stacktrace in the trace buffer whenever the
457 triggering event occurs.
459 For example, the following trigger dumps a stacktrace every time the
460 kmalloc tracepoint is hit::
462 # echo 'stacktrace' > \
463 /sys/kernel/tracing/events/kmem/kmalloc/trigger
465 The following trigger dumps a stacktrace the first 5 times a kmalloc
466 request happens with a size >= 64K::
468 # echo 'stacktrace:5 if bytes_req >= 65536' > \
469 /sys/kernel/tracing/events/kmem/kmalloc/trigger
475 To remove the above commands::
477 # echo '!stacktrace' > \
478 /sys/kernel/tracing/events/kmem/kmalloc/trigger
480 # echo '!stacktrace:5 if bytes_req >= 65536' > \
481 /sys/kernel/tracing/events/kmem/kmalloc/trigger
483 The latter can also be removed more simply by the following (without
486 # echo '!stacktrace:5' > \
487 /sys/kernel/tracing/events/kmem/kmalloc/trigger
489 Note that there can be only one stacktrace trigger per triggering
494 This command causes a snapshot to be triggered whenever the
495 triggering event occurs.
497 The following command creates a snapshot every time a block request
498 queue is unplugged with a depth > 1. If you were tracing a set of
499 events or functions at the time, the snapshot trace buffer would
500 capture those events when the trigger event occurred::
502 # echo 'snapshot if nr_rq > 1' > \
503 /sys/kernel/tracing/events/block/block_unplug/trigger
505 To only snapshot once::
507 # echo 'snapshot:1 if nr_rq > 1' > \
508 /sys/kernel/tracing/events/block/block_unplug/trigger
510 To remove the above commands::
512 # echo '!snapshot if nr_rq > 1' > \
513 /sys/kernel/tracing/events/block/block_unplug/trigger
515 # echo '!snapshot:1 if nr_rq > 1' > \
516 /sys/kernel/tracing/events/block/block_unplug/trigger
518 Note that there can be only one snapshot trigger per triggering
523 These commands turn tracing on and off when the specified events are
524 hit. The parameter determines how many times the tracing system is
525 turned on and off. If unspecified, there is no limit.
527 The following command turns tracing off the first time a block
528 request queue is unplugged with a depth > 1. If you were tracing a
529 set of events or functions at the time, you could then examine the
530 trace buffer to see the sequence of events that led up to the
533 # echo 'traceoff:1 if nr_rq > 1' > \
534 /sys/kernel/tracing/events/block/block_unplug/trigger
536 To always disable tracing when nr_rq > 1::
538 # echo 'traceoff if nr_rq > 1' > \
539 /sys/kernel/tracing/events/block/block_unplug/trigger
541 To remove the above commands::
543 # echo '!traceoff:1 if nr_rq > 1' > \
544 /sys/kernel/tracing/events/block/block_unplug/trigger
546 # echo '!traceoff if nr_rq > 1' > \
547 /sys/kernel/tracing/events/block/block_unplug/trigger
549 Note that there can be only one traceon or traceoff trigger per
554 This command aggregates event hits into a hash table keyed on one or
555 more trace event format fields (or stacktrace) and a set of running
556 totals derived from one or more trace event format fields and/or
557 event counts (hitcount).
559 See Documentation/trace/histogram.rst for details and examples.
561 7. In-kernel trace event API
562 ============================
564 In most cases, the command-line interface to trace events is more than
565 sufficient. Sometimes, however, applications might find the need for
566 more complex relationships than can be expressed through a simple
567 series of linked command-line expressions, or putting together sets of
568 commands may be simply too cumbersome. An example might be an
569 application that needs to 'listen' to the trace stream in order to
570 maintain an in-kernel state machine detecting, for instance, when an
571 illegal kernel state occurs in the scheduler.
573 The trace event subsystem provides an in-kernel API allowing modules
574 or other kernel code to generate user-defined 'synthetic' events at
575 will, which can be used to either augment the existing trace stream
576 and/or signal that a particular important state has occurred.
578 A similar in-kernel API is also available for creating kprobe and
581 Both the synthetic event and k/ret/probe event APIs are built on top
582 of a lower-level "dynevent_cmd" event command API, which is also
583 available for more specialized applications, or as the basis of other
584 higher-level trace event APIs.
586 The API provided for these purposes is describe below and allows the
589 - dynamically creating synthetic event definitions
590 - dynamically creating kprobe and kretprobe event definitions
591 - tracing synthetic events from in-kernel code
592 - the low-level "dynevent_cmd" API
594 7.1 Dyamically creating synthetic event definitions
595 ---------------------------------------------------
597 There are a couple ways to create a new synthetic event from a kernel
598 module or other kernel code.
600 The first creates the event in one step, using synth_event_create().
601 In this method, the name of the event to create and an array defining
602 the fields is supplied to synth_event_create(). If successful, a
603 synthetic event with that name and fields will exist following that
604 call. For example, to create a new "schedtest" synthetic event::
606 ret = synth_event_create("schedtest", sched_fields,
607 ARRAY_SIZE(sched_fields), THIS_MODULE);
609 The sched_fields param in this example points to an array of struct
610 synth_field_desc, each of which describes an event field by type and
613 static struct synth_field_desc sched_fields[] = {
614 { .type = "pid_t", .name = "next_pid_field" },
615 { .type = "char[16]", .name = "next_comm_field" },
616 { .type = "u64", .name = "ts_ns" },
617 { .type = "u64", .name = "ts_ms" },
618 { .type = "unsigned int", .name = "cpu" },
619 { .type = "char[64]", .name = "my_string_field" },
620 { .type = "int", .name = "my_int_field" },
623 See synth_field_size() for available types.
625 If field_name contains [n], the field is considered to be a static array.
627 If field_names contains[] (no subscript), the field is considered to
628 be a dynamic array, which will only take as much space in the event as
629 is required to hold the array.
631 Because space for an event is reserved before assigning field values
632 to the event, using dynamic arrays implies that the piecewise
633 in-kernel API described below can't be used with dynamic arrays. The
634 other non-piecewise in-kernel APIs can, however, be used with dynamic
637 If the event is created from within a module, a pointer to the module
638 must be passed to synth_event_create(). This will ensure that the
639 trace buffer won't contain unreadable events when the module is
642 At this point, the event object is ready to be used for generating new
645 In the second method, the event is created in several steps. This
646 allows events to be created dynamically and without the need to create
647 and populate an array of fields beforehand.
649 To use this method, an empty or partially empty synthetic event should
650 first be created using synth_event_gen_cmd_start() or
651 synth_event_gen_cmd_array_start(). For synth_event_gen_cmd_start(),
652 the name of the event along with one or more pairs of args each pair
653 representing a 'type field_name;' field specification should be
654 supplied. For synth_event_gen_cmd_array_start(), the name of the
655 event along with an array of struct synth_field_desc should be
656 supplied. Before calling synth_event_gen_cmd_start() or
657 synth_event_gen_cmd_array_start(), the user should create and
658 initialize a dynevent_cmd object using synth_event_cmd_init().
660 For example, to create a new "schedtest" synthetic event with two
663 struct dynevent_cmd cmd;
666 /* Create a buffer to hold the generated command */
667 buf = kzalloc(MAX_DYNEVENT_CMD_LEN, GFP_KERNEL);
669 /* Before generating the command, initialize the cmd object */
670 synth_event_cmd_init(&cmd, buf, MAX_DYNEVENT_CMD_LEN);
672 ret = synth_event_gen_cmd_start(&cmd, "schedtest", THIS_MODULE,
673 "pid_t", "next_pid_field",
676 Alternatively, using an array of struct synth_field_desc fields
677 containing the same information::
679 ret = synth_event_gen_cmd_array_start(&cmd, "schedtest", THIS_MODULE,
682 Once the synthetic event object has been created, it can then be
683 populated with more fields. Fields are added one by one using
684 synth_event_add_field(), supplying the dynevent_cmd object, a field
685 type, and a field name. For example, to add a new int field named
686 "intfield", the following call should be made::
688 ret = synth_event_add_field(&cmd, "int", "intfield");
690 See synth_field_size() for available types. If field_name contains [n]
691 the field is considered to be an array.
693 A group of fields can also be added all at once using an array of
694 synth_field_desc with add_synth_fields(). For example, this would add
695 just the first four sched_fields::
697 ret = synth_event_add_fields(&cmd, sched_fields, 4);
699 If you already have a string of the form 'type field_name',
700 synth_event_add_field_str() can be used to add it as-is; it will
701 also automatically append a ';' to the string.
703 Once all the fields have been added, the event should be finalized and
704 registered by calling the synth_event_gen_cmd_end() function::
706 ret = synth_event_gen_cmd_end(&cmd);
708 At this point, the event object is ready to be used for tracing new
711 7.2 Tracing synthetic events from in-kernel code
712 ------------------------------------------------
714 To trace a synthetic event, there are several options. The first
715 option is to trace the event in one call, using synth_event_trace()
716 with a variable number of values, or synth_event_trace_array() with an
717 array of values to be set. A second option can be used to avoid the
718 need for a pre-formed array of values or list of arguments, via
719 synth_event_trace_start() and synth_event_trace_end() along with
720 synth_event_add_next_val() or synth_event_add_val() to add the values
723 7.2.1 Tracing a synthetic event all at once
724 -------------------------------------------
726 To trace a synthetic event all at once, the synth_event_trace() or
727 synth_event_trace_array() functions can be used.
729 The synth_event_trace() function is passed the trace_event_file
730 representing the synthetic event (which can be retrieved using
731 trace_get_event_file() using the synthetic event name, "synthetic" as
732 the system name, and the trace instance name (NULL if using the global
733 trace array)), along with an variable number of u64 args, one for each
734 synthetic event field, and the number of values being passed.
736 So, to trace an event corresponding to the synthetic event definition
737 above, code like the following could be used::
739 ret = synth_event_trace(create_synth_test, 7, /* number of values */
740 444, /* next_pid_field */
741 (u64)"clackers", /* next_comm_field */
744 smp_processor_id(),/* cpu */
745 (u64)"Thneed", /* my_string_field */
746 999); /* my_int_field */
748 All vals should be cast to u64, and string vals are just pointers to
749 strings, cast to u64. Strings will be copied into space reserved in
750 the event for the string, using these pointers.
752 Alternatively, the synth_event_trace_array() function can be used to
753 accomplish the same thing. It is passed the trace_event_file
754 representing the synthetic event (which can be retrieved using
755 trace_get_event_file() using the synthetic event name, "synthetic" as
756 the system name, and the trace instance name (NULL if using the global
757 trace array)), along with an array of u64, one for each synthetic
760 To trace an event corresponding to the synthetic event definition
761 above, code like the following could be used::
765 vals[0] = 777; /* next_pid_field */
766 vals[1] = (u64)"tiddlywinks"; /* next_comm_field */
767 vals[2] = 1000000; /* ts_ns */
768 vals[3] = 1000; /* ts_ms */
769 vals[4] = smp_processor_id(); /* cpu */
770 vals[5] = (u64)"thneed"; /* my_string_field */
771 vals[6] = 398; /* my_int_field */
773 The 'vals' array is just an array of u64, the number of which must
774 match the number of field in the synthetic event, and which must be in
775 the same order as the synthetic event fields.
777 All vals should be cast to u64, and string vals are just pointers to
778 strings, cast to u64. Strings will be copied into space reserved in
779 the event for the string, using these pointers.
781 In order to trace a synthetic event, a pointer to the trace event file
782 is needed. The trace_get_event_file() function can be used to get
783 it - it will find the file in the given trace instance (in this case
784 NULL since the top trace array is being used) while at the same time
785 preventing the instance containing it from going away::
787 schedtest_event_file = trace_get_event_file(NULL, "synthetic",
790 Before tracing the event, it should be enabled in some way, otherwise
791 the synthetic event won't actually show up in the trace buffer.
793 To enable a synthetic event from the kernel, trace_array_set_clr_event()
794 can be used (which is not specific to synthetic events, so does need
795 the "synthetic" system name to be specified explicitly).
797 To enable the event, pass 'true' to it::
799 trace_array_set_clr_event(schedtest_event_file->tr,
800 "synthetic", "schedtest", true);
802 To disable it pass false::
804 trace_array_set_clr_event(schedtest_event_file->tr,
805 "synthetic", "schedtest", false);
807 Finally, synth_event_trace_array() can be used to actually trace the
808 event, which should be visible in the trace buffer afterwards::
810 ret = synth_event_trace_array(schedtest_event_file, vals,
813 To remove the synthetic event, the event should be disabled, and the
814 trace instance should be 'put' back using trace_put_event_file()::
816 trace_array_set_clr_event(schedtest_event_file->tr,
817 "synthetic", "schedtest", false);
818 trace_put_event_file(schedtest_event_file);
820 If those have been successful, synth_event_delete() can be called to
823 ret = synth_event_delete("schedtest");
825 7.2.2 Tracing a synthetic event piecewise
826 -----------------------------------------
828 To trace a synthetic using the piecewise method described above, the
829 synth_event_trace_start() function is used to 'open' the synthetic
832 struct synth_event_trace_state trace_state;
834 ret = synth_event_trace_start(schedtest_event_file, &trace_state);
836 It's passed the trace_event_file representing the synthetic event
837 using the same methods as described above, along with a pointer to a
838 struct synth_event_trace_state object, which will be zeroed before use and
839 used to maintain state between this and following calls.
841 Once the event has been opened, which means space for it has been
842 reserved in the trace buffer, the individual fields can be set. There
843 are two ways to do that, either one after another for each field in
844 the event, which requires no lookups, or by name, which does. The
845 tradeoff is flexibility in doing the assignments vs the cost of a
848 To assign the values one after the other without lookups,
849 synth_event_add_next_val() should be used. Each call is passed the
850 same synth_event_trace_state object used in the synth_event_trace_start(),
851 along with the value to set the next field in the event. After each
852 field is set, the 'cursor' points to the next field, which will be set
853 by the subsequent call, continuing until all the fields have been set
854 in order. The same sequence of calls as in the above examples using
855 this method would be (without error-handling code)::
858 ret = synth_event_add_next_val(777, &trace_state);
860 /* next_comm_field */
861 ret = synth_event_add_next_val((u64)"slinky", &trace_state);
864 ret = synth_event_add_next_val(1000000, &trace_state);
867 ret = synth_event_add_next_val(1000, &trace_state);
870 ret = synth_event_add_next_val(smp_processor_id(), &trace_state);
872 /* my_string_field */
873 ret = synth_event_add_next_val((u64)"thneed_2.01", &trace_state);
876 ret = synth_event_add_next_val(395, &trace_state);
878 To assign the values in any order, synth_event_add_val() should be
879 used. Each call is passed the same synth_event_trace_state object used in
880 the synth_event_trace_start(), along with the field name of the field
881 to set and the value to set it to. The same sequence of calls as in
882 the above examples using this method would be (without error-handling
885 ret = synth_event_add_val("next_pid_field", 777, &trace_state);
886 ret = synth_event_add_val("next_comm_field", (u64)"silly putty",
888 ret = synth_event_add_val("ts_ns", 1000000, &trace_state);
889 ret = synth_event_add_val("ts_ms", 1000, &trace_state);
890 ret = synth_event_add_val("cpu", smp_processor_id(), &trace_state);
891 ret = synth_event_add_val("my_string_field", (u64)"thneed_9",
893 ret = synth_event_add_val("my_int_field", 3999, &trace_state);
895 Note that synth_event_add_next_val() and synth_event_add_val() are
896 incompatible if used within the same trace of an event - either one
897 can be used but not both at the same time.
899 Finally, the event won't be actually traced until it's 'closed',
900 which is done using synth_event_trace_end(), which takes only the
901 struct synth_event_trace_state object used in the previous calls::
903 ret = synth_event_trace_end(&trace_state);
905 Note that synth_event_trace_end() must be called at the end regardless
906 of whether any of the add calls failed (say due to a bad field name
909 7.3 Dyamically creating kprobe and kretprobe event definitions
910 --------------------------------------------------------------
912 To create a kprobe or kretprobe trace event from kernel code, the
913 kprobe_event_gen_cmd_start() or kretprobe_event_gen_cmd_start()
914 functions can be used.
916 To create a kprobe event, an empty or partially empty kprobe event
917 should first be created using kprobe_event_gen_cmd_start(). The name
918 of the event and the probe location should be specfied along with one
919 or args each representing a probe field should be supplied to this
920 function. Before calling kprobe_event_gen_cmd_start(), the user
921 should create and initialize a dynevent_cmd object using
922 kprobe_event_cmd_init().
924 For example, to create a new "schedtest" kprobe event with two fields::
926 struct dynevent_cmd cmd;
929 /* Create a buffer to hold the generated command */
930 buf = kzalloc(MAX_DYNEVENT_CMD_LEN, GFP_KERNEL);
932 /* Before generating the command, initialize the cmd object */
933 kprobe_event_cmd_init(&cmd, buf, MAX_DYNEVENT_CMD_LEN);
936 * Define the gen_kprobe_test event with the first 2 kprobe
939 ret = kprobe_event_gen_cmd_start(&cmd, "gen_kprobe_test", "do_sys_open",
940 "dfd=%ax", "filename=%dx");
942 Once the kprobe event object has been created, it can then be
943 populated with more fields. Fields can be added using
944 kprobe_event_add_fields(), supplying the dynevent_cmd object along
945 with a variable arg list of probe fields. For example, to add a
946 couple additional fields, the following call could be made::
948 ret = kprobe_event_add_fields(&cmd, "flags=%cx", "mode=+4($stack)");
950 Once all the fields have been added, the event should be finalized and
951 registered by calling the kprobe_event_gen_cmd_end() or
952 kretprobe_event_gen_cmd_end() functions, depending on whether a kprobe
953 or kretprobe command was started::
955 ret = kprobe_event_gen_cmd_end(&cmd);
959 ret = kretprobe_event_gen_cmd_end(&cmd);
961 At this point, the event object is ready to be used for tracing new
964 Similarly, a kretprobe event can be created using
965 kretprobe_event_gen_cmd_start() with a probe name and location and
966 additional params such as $retval::
968 ret = kretprobe_event_gen_cmd_start(&cmd, "gen_kretprobe_test",
969 "do_sys_open", "$retval");
971 Similar to the synthetic event case, code like the following can be
972 used to enable the newly created kprobe event::
974 gen_kprobe_test = trace_get_event_file(NULL, "kprobes", "gen_kprobe_test");
976 ret = trace_array_set_clr_event(gen_kprobe_test->tr,
977 "kprobes", "gen_kprobe_test", true);
979 Finally, also similar to synthetic events, the following code can be
980 used to give the kprobe event file back and delete the event::
982 trace_put_event_file(gen_kprobe_test);
984 ret = kprobe_event_delete("gen_kprobe_test");
986 7.4 The "dynevent_cmd" low-level API
987 ------------------------------------
989 Both the in-kernel synthetic event and kprobe interfaces are built on
990 top of a lower-level "dynevent_cmd" interface. This interface is
991 meant to provide the basis for higher-level interfaces such as the
992 synthetic and kprobe interfaces, which can be used as examples.
994 The basic idea is simple and amounts to providing a general-purpose
995 layer that can be used to generate trace event commands. The
996 generated command strings can then be passed to the command-parsing
997 and event creation code that already exists in the trace event
998 subystem for creating the corresponding trace events.
1000 In a nutshell, the way it works is that the higher-level interface
1001 code creates a struct dynevent_cmd object, then uses a couple
1002 functions, dynevent_arg_add() and dynevent_arg_pair_add() to build up
1003 a command string, which finally causes the command to be executed
1004 using the dynevent_create() function. The details of the interface
1005 are described below.
1007 The first step in building a new command string is to create and
1008 initialize an instance of a dynevent_cmd. Here, for instance, we
1009 create a dynevent_cmd on the stack and initialize it::
1011 struct dynevent_cmd cmd;
1015 buf = kzalloc(MAX_DYNEVENT_CMD_LEN, GFP_KERNEL);
1017 dynevent_cmd_init(cmd, buf, maxlen, DYNEVENT_TYPE_FOO,
1018 foo_event_run_command);
1020 The dynevent_cmd initialization needs to be given a user-specified
1021 buffer and the length of the buffer (MAX_DYNEVENT_CMD_LEN can be used
1022 for this purpose - at 2k it's generally too big to be comfortably put
1023 on the stack, so is dynamically allocated), a dynevent type id, which
1024 is meant to be used to check that further API calls are for the
1025 correct command type, and a pointer to an event-specific run_command()
1026 callback that will be called to actually execute the event-specific
1029 Once that's done, the command string can by built up by successive
1030 calls to argument-adding functions.
1032 To add a single argument, define and initialize a struct dynevent_arg
1033 or struct dynevent_arg_pair object. Here's an example of the simplest
1034 possible arg addition, which is simply to append the given string as
1035 a whitespace-separated argument to the command::
1037 struct dynevent_arg arg;
1039 dynevent_arg_init(&arg, NULL, 0);
1043 ret = dynevent_arg_add(cmd, &arg);
1045 The arg object is first initialized using dynevent_arg_init() and in
1046 this case the parameters are NULL or 0, which means there's no
1047 optional sanity-checking function or separator appended to the end of
1050 Here's another more complicated example using an 'arg pair', which is
1051 used to create an argument that consists of a couple components added
1052 together as a unit, for example, a 'type field_name;' arg or a simple
1053 expression arg e.g. 'flags=%cx'::
1055 struct dynevent_arg_pair arg_pair;
1057 dynevent_arg_pair_init(&arg_pair, dynevent_foo_check_arg_fn, 0, ';');
1059 arg_pair.lhs = type;
1060 arg_pair.rhs = name;
1062 ret = dynevent_arg_pair_add(cmd, &arg_pair);
1064 Again, the arg_pair is first initialized, in this case with a callback
1065 function used to check the sanity of the args (for example, that
1066 neither part of the pair is NULL), along with a character to be used
1067 to add an operator between the pair (here none) and a separator to be
1068 appended onto the end of the arg pair (here ';').
1070 There's also a dynevent_str_add() function that can be used to simply
1071 add a string as-is, with no spaces, delimeters, or arg check.
1073 Any number of dynevent_*_add() calls can be made to build up the string
1074 (until its length surpasses cmd->maxlen). When all the arguments have
1075 been added and the command string is complete, the only thing left to
1076 do is run the command, which happens by simply calling
1079 ret = dynevent_create(&cmd);
1081 At that point, if the return value is 0, the dynamic event has been
1082 created and is ready to use.
1084 See the dynevent_cmd function definitions themselves for the details