• Home
  • Raw
  • Download

Lines Matching +full:event +full:- +full:name

1 /* SPDX-License-Identifier: GPL-2.0 */
57 struct trace_event *event);
62 * The trace entry - the most basic unit of tracing. This is what
65 * bash-15816 [01] 235.197585: idle_cpu <- irq_enter
75 ((1 << (sizeof(((struct trace_entry *)0)->type) * 8)) - 1)
78 * Trace iterator - used by printout routines who present trace
126 int flags, struct trace_event *event);
142 extern int register_trace_event(struct trace_event *event);
143 extern int unregister_trace_event(struct trace_event *event);
177 int trace_output_call(struct trace_iterator *iter, char *name, char *fmt, ...);
207 const char *name; member
223 int (*reg)(struct trace_event_call *event,
231 extern int trace_event_reg(struct trace_event_call *event,
236 struct ring_buffer_event *event; member
261 * Event flags:
262 * FILTERED - The event has a filter attached
263 * CAP_ANY - Any user can enable for perf
264 * NO_SET_FILTER - Set when filter has error and is to be ignored
265 * IGNORE_ENABLE - For trace internal events, do not enable with debugfs file
266 * TRACEPOINT - Event is a tracepoint
267 * KPROBE - Event is a kprobe
268 * UPROBE - Event is a uprobe
286 char *name; member
290 struct trace_event event; member
299 * bit 3: trace internal event (do not enable)
300 * bit 4: Event was enabled by module
302 * bit 6: Event is a tracepoint
320 * This inline function checks whether call->prog_array in bpf_prog_array_valid()
324 * If this function returns true, and later call->prog_array in bpf_prog_array_valid()
329 * call->prog_array happened to become non-NULL then. in bpf_prog_array_valid()
336 return !!READ_ONCE(call->prog_array); in bpf_prog_array_valid()
343 if (call->flags & TRACE_EVENT_FL_TRACEPOINT) in trace_event_name()
344 return call->tp ? call->tp->name : NULL; in trace_event_name()
346 return call->name; in trace_event_name()
352 if (!event_call->class->get_fields) in trace_get_fields()
353 return &event_call->class->fields; in trace_get_fields()
354 return event_call->class->get_fields(event_call); in trace_get_fields()
377 const char *event);
403 extern int synth_event_delete(const char *name);
409 const char *name,
412 #define synth_event_gen_cmd_start(cmd, name, mod, ...) \ argument
413 __synth_event_gen_cmd_start(cmd, name, mod, ## __VA_ARGS__, NULL)
417 const char *name; member
421 const char *name,
425 extern int synth_event_create(const char *name,
431 const char *name);
447 struct synth_event *event; member
467 extern int kprobe_event_delete(const char *name);
472 #define kprobe_event_gen_cmd_start(cmd, name, loc, ...) \ argument
473 __kprobe_event_gen_cmd_start(cmd, false, name, loc, ## __VA_ARGS__, NULL)
475 #define kretprobe_event_gen_cmd_start(cmd, name, loc, ...) \ argument
476 __kprobe_event_gen_cmd_start(cmd, true, name, loc, ## __VA_ARGS__, NULL)
480 const char *name,
498 * Event file flags:
499 * ENABLED - The event is enabled
500 * RECORDED_CMD - The comms should be recorded at sched_switch
501 * RECORDED_TGID - The tgids should be recorded at sched_switch
502 * FILTERED - The event has a filter attached
503 * NO_SET_FILTER - Set when filter has error and is to be ignored
504 * SOFT_MODE - The event is enabled/disabled by SOFT_DISABLED
505 * SOFT_DISABLED - When set, do not trace the event (even though its
507 * TRIGGER_MODE - When set, invoke the triggers associated with the event
508 * TRIGGER_COND - When set, one or more triggers has an associated filter
509 * PID_FILTER - When set, the event is filtered based on pid
510 * WAS_ENABLED - Set when enabled to know to clear trace on module removal
511 * FREED - File descriptor is freed, all fields should be considered invalid
551 * caching and such. Which is mostly OK ;-)
555 atomic_t sm_ref; /* soft-mode reference counter */
556 atomic_t tm_ref; /* trigger-mode reference counter */
559 #define __TRACE_EVENT_FLAGS(name, value) \ argument
560 static int __init trace_init_flags_##name(void) \
562 event_##name.flags |= value; \
565 early_initcall(trace_init_flags_##name);
567 #define __TRACE_EVENT_PERF_PERM(name, expr...) \ argument
568 static int perf_perm_##name(struct trace_event_call *tp_event, \
573 static int __init trace_init_perf_perm_##name(void) \
575 event_##name.perf_perm = &perf_perm_##name; \
578 early_initcall(trace_init_perf_perm_##name);
598 struct ring_buffer_event *event);
606 * trace_trigger_soft_disabled - do triggers and test if soft disabled
607 * @file: The file pointer of the event to test
609 * If any triggers without filters are attached to this event, they
610 * will be called here. If the event is soft disabled and has no
617 unsigned long eflags = file->flags; in trace_trigger_soft_disabled()
632 int perf_event_attach_bpf_prog(struct perf_event *event, struct bpf_prog *prog);
633 void perf_event_detach_bpf_prog(struct perf_event *event);
634 int perf_event_query_prog_array(struct perf_event *event, void __user *info);
637 struct bpf_raw_event_map *bpf_get_raw_tracepoint(const char *name);
639 int bpf_get_perf_event_info(const struct perf_event *event, u32 *prog_id,
649 perf_event_attach_bpf_prog(struct perf_event *event, struct bpf_prog *prog) in perf_event_attach_bpf_prog() argument
651 return -EOPNOTSUPP; in perf_event_attach_bpf_prog()
654 static inline void perf_event_detach_bpf_prog(struct perf_event *event) { } in perf_event_detach_bpf_prog() argument
657 perf_event_query_prog_array(struct perf_event *event, void __user *info) in perf_event_query_prog_array() argument
659 return -EOPNOTSUPP; in perf_event_query_prog_array()
663 return -EOPNOTSUPP; in bpf_probe_register()
667 return -EOPNOTSUPP; in bpf_probe_unregister()
669 static inline struct bpf_raw_event_map *bpf_get_raw_tracepoint(const char *name) in bpf_get_raw_tracepoint() argument
676 static inline int bpf_get_perf_event_info(const struct perf_event *event, in bpf_get_perf_event_info() argument
681 return -EOPNOTSUPP; in bpf_get_perf_event_info()
697 const char *name, int offset, int size,
703 #define is_signed_type(type) (((type)(-1)) < (type)1)
706 int trace_set_clr_event(const char *system, const char *event, int set);
708 const char *event, bool enable);
734 extern int perf_trace_init(struct perf_event *event);
735 extern void perf_trace_destroy(struct perf_event *event);
736 extern int perf_trace_add(struct perf_event *event, int flags);
737 extern void perf_trace_del(struct perf_event *event, int flags);
739 extern int perf_kprobe_init(struct perf_event *event, bool is_retprobe);
740 extern void perf_kprobe_destroy(struct perf_event *event);
741 extern int bpf_get_kprobe_info(const struct perf_event *event,
747 extern int perf_uprobe_init(struct perf_event *event,
749 extern void perf_uprobe_destroy(struct perf_event *event);
750 extern int bpf_get_uprobe_info(const struct perf_event *event,
755 extern int ftrace_profile_set_filter(struct perf_event *event, int event_id,
757 extern void ftrace_profile_free_filter(struct perf_event *event);