Lines Matching +full:event +full:- +full:name
1 /* SPDX-License-Identifier: GPL-2.0 */
57 struct trace_event *event);
62 * The trace entry - the most basic unit of tracing. This is what
65 * bash-15816 [01] 235.197585: idle_cpu <- irq_enter
75 ((1 << (sizeof(((struct trace_entry *)0)->type) * 8)) - 1)
78 * Trace iterator - used by printout routines who present trace
126 int flags, struct trace_event *event);
142 extern int register_trace_event(struct trace_event *event);
143 extern int unregister_trace_event(struct trace_event *event);
159 entry->preempt_count = trace_ctx & 0xff; in tracing_generic_entry_update()
160 entry->pid = current->pid; in tracing_generic_entry_update()
161 entry->type = type; in tracing_generic_entry_update()
162 entry->flags = trace_ctx >> 16; in tracing_generic_entry_update()
213 trace_ctx--; in tracing_gen_ctx_dec()
235 int trace_output_call(struct trace_iterator *iter, char *name, char *fmt, ...);
265 const char *name; member
281 int (*reg)(struct trace_event_call *event,
289 extern int trace_event_reg(struct trace_event_call *event,
294 struct ring_buffer_event *event; member
320 * Event flags:
321 * FILTERED - The event has a filter attached
322 * CAP_ANY - Any user can enable for perf
323 * NO_SET_FILTER - Set when filter has error and is to be ignored
324 * IGNORE_ENABLE - For trace internal events, do not enable with debugfs file
325 * TRACEPOINT - Event is a tracepoint
326 * DYNAMIC - Event is a dynamic event (created at run time)
327 * KPROBE - Event is a kprobe
328 * UPROBE - Event is a uprobe
329 * EPROBE - Event is an event probe
349 char *name; member
353 struct trace_event event; member
401 if (call->flags & TRACE_EVENT_FL_DYNAMIC) in trace_event_try_get_ref()
404 return try_module_get(call->module); in trace_event_try_get_ref()
409 if (call->flags & TRACE_EVENT_FL_DYNAMIC) in trace_event_put_ref()
412 module_put(call->module); in trace_event_put_ref()
419 * This inline function checks whether call->prog_array in bpf_prog_array_valid()
423 * If this function returns true, and later call->prog_array in bpf_prog_array_valid()
428 * call->prog_array happened to become non-NULL then. in bpf_prog_array_valid()
435 return !!READ_ONCE(call->prog_array); in bpf_prog_array_valid()
442 if (call->flags & TRACE_EVENT_FL_TRACEPOINT) in trace_event_name()
443 return call->tp ? call->tp->name : NULL; in trace_event_name()
445 return call->name; in trace_event_name()
451 if (!event_call->class->get_fields) in trace_get_fields()
452 return &event_call->class->fields; in trace_get_fields()
453 return event_call->class->get_fields(event_call); in trace_get_fields()
474 const char *event);
500 extern int synth_event_delete(const char *name);
506 const char *name,
509 #define synth_event_gen_cmd_start(cmd, name, mod, ...) \ argument
510 __synth_event_gen_cmd_start(cmd, name, mod, ## __VA_ARGS__, NULL)
514 const char *name; member
518 const char *name,
522 extern int synth_event_create(const char *name,
528 const char *name);
544 struct synth_event *event; member
564 extern int kprobe_event_delete(const char *name);
569 #define kprobe_event_gen_cmd_start(cmd, name, loc, ...) \ argument
570 __kprobe_event_gen_cmd_start(cmd, false, name, loc, ## __VA_ARGS__, NULL)
572 #define kretprobe_event_gen_cmd_start(cmd, name, loc, ...) \ argument
573 __kprobe_event_gen_cmd_start(cmd, true, name, loc, ## __VA_ARGS__, NULL)
577 const char *name,
595 * Event file flags:
596 * ENABLED - The event is enabled
597 * RECORDED_CMD - The comms should be recorded at sched_switch
598 * RECORDED_TGID - The tgids should be recorded at sched_switch
599 * FILTERED - The event has a filter attached
600 * NO_SET_FILTER - Set when filter has error and is to be ignored
601 * SOFT_MODE - The event is enabled/disabled by SOFT_DISABLED
602 * SOFT_DISABLED - When set, do not trace the event (even though its
604 * TRIGGER_MODE - When set, invoke the triggers associated with the event
605 * TRIGGER_COND - When set, one or more triggers has an associated filter
606 * PID_FILTER - When set, the event is filtered based on pid
607 * WAS_ENABLED - Set when enabled to know to clear trace on module removal
646 * caching and such. Which is mostly OK ;-)
649 atomic_t sm_ref; /* soft-mode reference counter */
650 atomic_t tm_ref; /* trigger-mode reference counter */
653 #define __TRACE_EVENT_FLAGS(name, value) \ argument
654 static int __init trace_init_flags_##name(void) \
656 event_##name.flags |= value; \
659 early_initcall(trace_init_flags_##name);
661 #define __TRACE_EVENT_PERF_PERM(name, expr...) \ argument
662 static int perf_perm_##name(struct trace_event_call *tp_event, \
667 static int __init trace_init_perf_perm_##name(void) \
669 event_##name.perf_perm = &perf_perm_##name; \
672 early_initcall(trace_init_perf_perm_##name);
694 struct ring_buffer_event *event);
702 * trace_trigger_soft_disabled - do triggers and test if soft disabled
703 * @file: The file pointer of the event to test
705 * If any triggers without filters are attached to this event, they
706 * will be called here. If the event is soft disabled and has no
713 unsigned long eflags = file->flags; in trace_trigger_soft_disabled()
728 int perf_event_attach_bpf_prog(struct perf_event *event, struct bpf_prog *prog, u64 bpf_cookie);
729 void perf_event_detach_bpf_prog(struct perf_event *event);
730 int perf_event_query_prog_array(struct perf_event *event, void __user *info);
733 struct bpf_raw_event_map *bpf_get_raw_tracepoint(const char *name);
735 int bpf_get_perf_event_info(const struct perf_event *event, u32 *prog_id,
745 perf_event_attach_bpf_prog(struct perf_event *event, struct bpf_prog *prog, u64 bpf_cookie) in perf_event_attach_bpf_prog() argument
747 return -EOPNOTSUPP; in perf_event_attach_bpf_prog()
750 static inline void perf_event_detach_bpf_prog(struct perf_event *event) { } in perf_event_detach_bpf_prog() argument
753 perf_event_query_prog_array(struct perf_event *event, void __user *info) in perf_event_query_prog_array() argument
755 return -EOPNOTSUPP; in perf_event_query_prog_array()
759 return -EOPNOTSUPP; in bpf_probe_register()
763 return -EOPNOTSUPP; in bpf_probe_unregister()
765 static inline struct bpf_raw_event_map *bpf_get_raw_tracepoint(const char *name) in bpf_get_raw_tracepoint() argument
772 static inline int bpf_get_perf_event_info(const struct perf_event *event, in bpf_get_perf_event_info() argument
777 return -EOPNOTSUPP; in bpf_get_perf_event_info()
793 const char *name, int offset, int size,
799 #define is_signed_type(type) (((type)(-1)) < (type)1)
802 int trace_set_clr_event(const char *system, const char *event, int set);
804 const char *event, bool enable);
830 extern int perf_trace_init(struct perf_event *event);
831 extern void perf_trace_destroy(struct perf_event *event);
832 extern int perf_trace_add(struct perf_event *event, int flags);
833 extern void perf_trace_del(struct perf_event *event, int flags);
835 extern int perf_kprobe_init(struct perf_event *event, bool is_retprobe);
836 extern void perf_kprobe_destroy(struct perf_event *event);
837 extern int bpf_get_kprobe_info(const struct perf_event *event,
843 extern int perf_uprobe_init(struct perf_event *event,
845 extern void perf_uprobe_destroy(struct perf_event *event);
846 extern int bpf_get_uprobe_info(const struct perf_event *event,
850 extern int ftrace_profile_set_filter(struct perf_event *event, int event_id,
852 extern void ftrace_profile_free_filter(struct perf_event *event);
856 int perf_event_set_bpf_prog(struct perf_event *event, struct bpf_prog *prog, u64 bpf_cookie);
857 void perf_event_free_bpf_prog(struct perf_event *event);