1 /* SPDX-License-Identifier: GPL-2.0 */
2
3 #ifndef _LINUX_TRACE_EVENT_H
4 #define _LINUX_TRACE_EVENT_H
5
6 #include <linux/ring_buffer.h>
7 #include <linux/trace_seq.h>
8 #include <linux/percpu.h>
9 #include <linux/hardirq.h>
10 #include <linux/perf_event.h>
11 #include <linux/tracepoint.h>
12
13 struct trace_array;
14 struct trace_buffer;
15 struct tracer;
16 struct dentry;
17 struct bpf_prog;
18
19 const char *trace_print_flags_seq(struct trace_seq *p, const char *delim,
20 unsigned long flags,
21 const struct trace_print_flags *flag_array);
22
23 const char *trace_print_symbols_seq(struct trace_seq *p, unsigned long val,
24 const struct trace_print_flags *symbol_array);
25
26 #if BITS_PER_LONG == 32
27 const char *trace_print_flags_seq_u64(struct trace_seq *p, const char *delim,
28 unsigned long long flags,
29 const struct trace_print_flags_u64 *flag_array);
30
31 const char *trace_print_symbols_seq_u64(struct trace_seq *p,
32 unsigned long long val,
33 const struct trace_print_flags_u64
34 *symbol_array);
35 #endif
36
37 const char *trace_print_bitmask_seq(struct trace_seq *p, void *bitmask_ptr,
38 unsigned int bitmask_size);
39
40 const char *trace_print_hex_seq(struct trace_seq *p,
41 const unsigned char *buf, int len,
42 bool concatenate);
43
44 const char *trace_print_array_seq(struct trace_seq *p,
45 const void *buf, int count,
46 size_t el_size);
47
48 struct trace_iterator;
49 struct trace_event;
50
51 int trace_raw_output_prep(struct trace_iterator *iter,
52 struct trace_event *event);
53
54 /*
55 * The trace entry - the most basic unit of tracing. This is what
56 * is printed in the end as a single line in the trace output, such as:
57 *
58 * bash-15816 [01] 235.197585: idle_cpu <- irq_enter
59 */
60 struct trace_entry {
61 unsigned short type;
62 unsigned char flags;
63 unsigned char preempt_count;
64 int pid;
65 };
66
67 #define TRACE_EVENT_TYPE_MAX \
68 ((1 << (sizeof(((struct trace_entry *)0)->type) * 8)) - 1)
69
70 /*
71 * Trace iterator - used by printout routines who present trace
72 * results to users and which routines might sleep, etc:
73 */
74 struct trace_iterator {
75 struct trace_array *tr;
76 struct tracer *trace;
77 struct trace_buffer *trace_buffer;
78 void *private;
79 int cpu_file;
80 struct mutex mutex;
81 struct ring_buffer_iter **buffer_iter;
82 unsigned long iter_flags;
83
84 /* trace_seq for __print_flags() and __print_symbolic() etc. */
85 struct trace_seq tmp_seq;
86
87 cpumask_var_t started;
88
89 /* it's true when current open file is snapshot */
90 bool snapshot;
91
92 /* The below is zeroed out in pipe_read */
93 struct trace_seq seq;
94 struct trace_entry *ent;
95 unsigned long lost_events;
96 int leftover;
97 int ent_size;
98 int cpu;
99 u64 ts;
100
101 loff_t pos;
102 long idx;
103
104 /* All new field here will be zeroed out in pipe_read */
105 };
106
107 enum trace_iter_flags {
108 TRACE_FILE_LAT_FMT = 1,
109 TRACE_FILE_ANNOTATE = 2,
110 TRACE_FILE_TIME_IN_NS = 4,
111 };
112
113
114 typedef enum print_line_t (*trace_print_func)(struct trace_iterator *iter,
115 int flags, struct trace_event *event);
116
117 struct trace_event_functions {
118 trace_print_func trace;
119 trace_print_func raw;
120 trace_print_func hex;
121 trace_print_func binary;
122 };
123
124 struct trace_event {
125 struct hlist_node node;
126 struct list_head list;
127 int type;
128 struct trace_event_functions *funcs;
129 };
130
131 extern int register_trace_event(struct trace_event *event);
132 extern int unregister_trace_event(struct trace_event *event);
133
134 /* Return values for print_line callback */
135 enum print_line_t {
136 TRACE_TYPE_PARTIAL_LINE = 0, /* Retry after flushing the seq */
137 TRACE_TYPE_HANDLED = 1,
138 TRACE_TYPE_UNHANDLED = 2, /* Relay to other output functions */
139 TRACE_TYPE_NO_CONSUME = 3 /* Handled but ask to not consume */
140 };
141
142 enum print_line_t trace_handle_return(struct trace_seq *s);
143
144 void tracing_generic_entry_update(struct trace_entry *entry,
145 unsigned long flags,
146 int pc);
147 struct trace_event_file;
148
149 struct ring_buffer_event *
150 trace_event_buffer_lock_reserve(struct ring_buffer **current_buffer,
151 struct trace_event_file *trace_file,
152 int type, unsigned long len,
153 unsigned long flags, int pc);
154
155 #define TRACE_RECORD_CMDLINE BIT(0)
156 #define TRACE_RECORD_TGID BIT(1)
157
158 void tracing_record_taskinfo(struct task_struct *task, int flags);
159 void tracing_record_taskinfo_sched_switch(struct task_struct *prev,
160 struct task_struct *next, int flags);
161
162 void tracing_record_cmdline(struct task_struct *task);
163 void tracing_record_tgid(struct task_struct *task);
164
165 int trace_output_call(struct trace_iterator *iter, char *name, char *fmt, ...);
166
167 struct event_filter;
168
169 enum trace_reg {
170 TRACE_REG_REGISTER,
171 TRACE_REG_UNREGISTER,
172 #ifdef CONFIG_PERF_EVENTS
173 TRACE_REG_PERF_REGISTER,
174 TRACE_REG_PERF_UNREGISTER,
175 TRACE_REG_PERF_OPEN,
176 TRACE_REG_PERF_CLOSE,
177 /*
178 * These (ADD/DEL) use a 'boolean' return value, where 1 (true) means a
179 * custom action was taken and the default action is not to be
180 * performed.
181 */
182 TRACE_REG_PERF_ADD,
183 TRACE_REG_PERF_DEL,
184 #endif
185 };
186
187 struct trace_event_call;
188
189 struct trace_event_class {
190 const char *system;
191 void *probe;
192 #ifdef CONFIG_PERF_EVENTS
193 void *perf_probe;
194 #endif
195 int (*reg)(struct trace_event_call *event,
196 enum trace_reg type, void *data);
197 int (*define_fields)(struct trace_event_call *);
198 struct list_head *(*get_fields)(struct trace_event_call *);
199 struct list_head fields;
200 int (*raw_init)(struct trace_event_call *);
201 };
202
203 extern int trace_event_reg(struct trace_event_call *event,
204 enum trace_reg type, void *data);
205
206 struct trace_event_buffer {
207 struct ring_buffer *buffer;
208 struct ring_buffer_event *event;
209 struct trace_event_file *trace_file;
210 void *entry;
211 unsigned long flags;
212 int pc;
213 };
214
215 void *trace_event_buffer_reserve(struct trace_event_buffer *fbuffer,
216 struct trace_event_file *trace_file,
217 unsigned long len);
218
219 void trace_event_buffer_commit(struct trace_event_buffer *fbuffer);
220
221 enum {
222 TRACE_EVENT_FL_FILTERED_BIT,
223 TRACE_EVENT_FL_CAP_ANY_BIT,
224 TRACE_EVENT_FL_NO_SET_FILTER_BIT,
225 TRACE_EVENT_FL_IGNORE_ENABLE_BIT,
226 TRACE_EVENT_FL_TRACEPOINT_BIT,
227 TRACE_EVENT_FL_KPROBE_BIT,
228 TRACE_EVENT_FL_UPROBE_BIT,
229 };
230
231 /*
232 * Event flags:
233 * FILTERED - The event has a filter attached
234 * CAP_ANY - Any user can enable for perf
235 * NO_SET_FILTER - Set when filter has error and is to be ignored
236 * IGNORE_ENABLE - For trace internal events, do not enable with debugfs file
237 * TRACEPOINT - Event is a tracepoint
238 * KPROBE - Event is a kprobe
239 * UPROBE - Event is a uprobe
240 */
241 enum {
242 TRACE_EVENT_FL_FILTERED = (1 << TRACE_EVENT_FL_FILTERED_BIT),
243 TRACE_EVENT_FL_CAP_ANY = (1 << TRACE_EVENT_FL_CAP_ANY_BIT),
244 TRACE_EVENT_FL_NO_SET_FILTER = (1 << TRACE_EVENT_FL_NO_SET_FILTER_BIT),
245 TRACE_EVENT_FL_IGNORE_ENABLE = (1 << TRACE_EVENT_FL_IGNORE_ENABLE_BIT),
246 TRACE_EVENT_FL_TRACEPOINT = (1 << TRACE_EVENT_FL_TRACEPOINT_BIT),
247 TRACE_EVENT_FL_KPROBE = (1 << TRACE_EVENT_FL_KPROBE_BIT),
248 TRACE_EVENT_FL_UPROBE = (1 << TRACE_EVENT_FL_UPROBE_BIT),
249 };
250
251 #define TRACE_EVENT_FL_UKPROBE (TRACE_EVENT_FL_KPROBE | TRACE_EVENT_FL_UPROBE)
252
253 struct trace_event_call {
254 struct list_head list;
255 struct trace_event_class *class;
256 union {
257 char *name;
258 /* Set TRACE_EVENT_FL_TRACEPOINT flag when using "tp" */
259 struct tracepoint *tp;
260 };
261 struct trace_event event;
262 char *print_fmt;
263 struct event_filter *filter;
264 void *mod;
265 void *data;
266 /*
267 * bit 0: filter_active
268 * bit 1: allow trace by non root (cap any)
269 * bit 2: failed to apply filter
270 * bit 3: trace internal event (do not enable)
271 * bit 4: Event was enabled by module
272 * bit 5: use call filter rather than file filter
273 * bit 6: Event is a tracepoint
274 */
275 int flags; /* static flags of different events */
276
277 #ifdef CONFIG_PERF_EVENTS
278 int perf_refcount;
279 struct hlist_head __percpu *perf_events;
280 struct bpf_prog_array __rcu *prog_array;
281
282 int (*perf_perm)(struct trace_event_call *,
283 struct perf_event *);
284 #endif
285 };
286
287 #ifdef CONFIG_PERF_EVENTS
bpf_prog_array_valid(struct trace_event_call * call)288 static inline bool bpf_prog_array_valid(struct trace_event_call *call)
289 {
290 /*
291 * This inline function checks whether call->prog_array
292 * is valid or not. The function is called in various places,
293 * outside rcu_read_lock/unlock, as a heuristic to speed up execution.
294 *
295 * If this function returns true, and later call->prog_array
296 * becomes false inside rcu_read_lock/unlock region,
297 * we bail out then. If this function return false,
298 * there is a risk that we might miss a few events if the checking
299 * were delayed until inside rcu_read_lock/unlock region and
300 * call->prog_array happened to become non-NULL then.
301 *
302 * Here, READ_ONCE() is used instead of rcu_access_pointer().
303 * rcu_access_pointer() requires the actual definition of
304 * "struct bpf_prog_array" while READ_ONCE() only needs
305 * a declaration of the same type.
306 */
307 return !!READ_ONCE(call->prog_array);
308 }
309 #endif
310
311 static inline const char *
trace_event_name(struct trace_event_call * call)312 trace_event_name(struct trace_event_call *call)
313 {
314 if (call->flags & TRACE_EVENT_FL_TRACEPOINT)
315 return call->tp ? call->tp->name : NULL;
316 else
317 return call->name;
318 }
319
320 struct trace_array;
321 struct trace_subsystem_dir;
322
323 enum {
324 EVENT_FILE_FL_ENABLED_BIT,
325 EVENT_FILE_FL_RECORDED_CMD_BIT,
326 EVENT_FILE_FL_RECORDED_TGID_BIT,
327 EVENT_FILE_FL_FILTERED_BIT,
328 EVENT_FILE_FL_NO_SET_FILTER_BIT,
329 EVENT_FILE_FL_SOFT_MODE_BIT,
330 EVENT_FILE_FL_SOFT_DISABLED_BIT,
331 EVENT_FILE_FL_TRIGGER_MODE_BIT,
332 EVENT_FILE_FL_TRIGGER_COND_BIT,
333 EVENT_FILE_FL_PID_FILTER_BIT,
334 EVENT_FILE_FL_WAS_ENABLED_BIT,
335 };
336
337 /*
338 * Event file flags:
339 * ENABLED - The event is enabled
340 * RECORDED_CMD - The comms should be recorded at sched_switch
341 * RECORDED_TGID - The tgids should be recorded at sched_switch
342 * FILTERED - The event has a filter attached
343 * NO_SET_FILTER - Set when filter has error and is to be ignored
344 * SOFT_MODE - The event is enabled/disabled by SOFT_DISABLED
345 * SOFT_DISABLED - When set, do not trace the event (even though its
346 * tracepoint may be enabled)
347 * TRIGGER_MODE - When set, invoke the triggers associated with the event
348 * TRIGGER_COND - When set, one or more triggers has an associated filter
349 * PID_FILTER - When set, the event is filtered based on pid
350 * WAS_ENABLED - Set when enabled to know to clear trace on module removal
351 */
352 enum {
353 EVENT_FILE_FL_ENABLED = (1 << EVENT_FILE_FL_ENABLED_BIT),
354 EVENT_FILE_FL_RECORDED_CMD = (1 << EVENT_FILE_FL_RECORDED_CMD_BIT),
355 EVENT_FILE_FL_RECORDED_TGID = (1 << EVENT_FILE_FL_RECORDED_TGID_BIT),
356 EVENT_FILE_FL_FILTERED = (1 << EVENT_FILE_FL_FILTERED_BIT),
357 EVENT_FILE_FL_NO_SET_FILTER = (1 << EVENT_FILE_FL_NO_SET_FILTER_BIT),
358 EVENT_FILE_FL_SOFT_MODE = (1 << EVENT_FILE_FL_SOFT_MODE_BIT),
359 EVENT_FILE_FL_SOFT_DISABLED = (1 << EVENT_FILE_FL_SOFT_DISABLED_BIT),
360 EVENT_FILE_FL_TRIGGER_MODE = (1 << EVENT_FILE_FL_TRIGGER_MODE_BIT),
361 EVENT_FILE_FL_TRIGGER_COND = (1 << EVENT_FILE_FL_TRIGGER_COND_BIT),
362 EVENT_FILE_FL_PID_FILTER = (1 << EVENT_FILE_FL_PID_FILTER_BIT),
363 EVENT_FILE_FL_WAS_ENABLED = (1 << EVENT_FILE_FL_WAS_ENABLED_BIT),
364 };
365
366 struct trace_event_file {
367 struct list_head list;
368 struct trace_event_call *event_call;
369 struct event_filter __rcu *filter;
370 struct dentry *dir;
371 struct trace_array *tr;
372 struct trace_subsystem_dir *system;
373 struct list_head triggers;
374
375 /*
376 * 32 bit flags:
377 * bit 0: enabled
378 * bit 1: enabled cmd record
379 * bit 2: enable/disable with the soft disable bit
380 * bit 3: soft disabled
381 * bit 4: trigger enabled
382 *
383 * Note: The bits must be set atomically to prevent races
384 * from other writers. Reads of flags do not need to be in
385 * sync as they occur in critical sections. But the way flags
386 * is currently used, these changes do not affect the code
387 * except that when a change is made, it may have a slight
388 * delay in propagating the changes to other CPUs due to
389 * caching and such. Which is mostly OK ;-)
390 */
391 unsigned long flags;
392 atomic_t sm_ref; /* soft-mode reference counter */
393 atomic_t tm_ref; /* trigger-mode reference counter */
394 };
395
396 #define __TRACE_EVENT_FLAGS(name, value) \
397 static int __init trace_init_flags_##name(void) \
398 { \
399 event_##name.flags |= value; \
400 return 0; \
401 } \
402 early_initcall(trace_init_flags_##name);
403
404 #define __TRACE_EVENT_PERF_PERM(name, expr...) \
405 static int perf_perm_##name(struct trace_event_call *tp_event, \
406 struct perf_event *p_event) \
407 { \
408 return ({ expr; }); \
409 } \
410 static int __init trace_init_perf_perm_##name(void) \
411 { \
412 event_##name.perf_perm = &perf_perm_##name; \
413 return 0; \
414 } \
415 early_initcall(trace_init_perf_perm_##name);
416
417 #define PERF_MAX_TRACE_SIZE 2048
418
419 #define MAX_FILTER_STR_VAL 256 /* Should handle KSYM_SYMBOL_LEN */
420
421 enum event_trigger_type {
422 ETT_NONE = (0),
423 ETT_TRACE_ONOFF = (1 << 0),
424 ETT_SNAPSHOT = (1 << 1),
425 ETT_STACKTRACE = (1 << 2),
426 ETT_EVENT_ENABLE = (1 << 3),
427 ETT_EVENT_HIST = (1 << 4),
428 ETT_HIST_ENABLE = (1 << 5),
429 };
430
431 extern int filter_match_preds(struct event_filter *filter, void *rec);
432
433 extern enum event_trigger_type
434 event_triggers_call(struct trace_event_file *file, void *rec,
435 struct ring_buffer_event *event);
436 extern void
437 event_triggers_post_call(struct trace_event_file *file,
438 enum event_trigger_type tt);
439
440 bool trace_event_ignore_this_pid(struct trace_event_file *trace_file);
441
442 /**
443 * trace_trigger_soft_disabled - do triggers and test if soft disabled
444 * @file: The file pointer of the event to test
445 *
446 * If any triggers without filters are attached to this event, they
447 * will be called here. If the event is soft disabled and has no
448 * triggers that require testing the fields, it will return true,
449 * otherwise false.
450 */
451 static inline bool
trace_trigger_soft_disabled(struct trace_event_file * file)452 trace_trigger_soft_disabled(struct trace_event_file *file)
453 {
454 unsigned long eflags = file->flags;
455
456 if (!(eflags & EVENT_FILE_FL_TRIGGER_COND)) {
457 if (eflags & EVENT_FILE_FL_TRIGGER_MODE)
458 event_triggers_call(file, NULL, NULL);
459 if (eflags & EVENT_FILE_FL_SOFT_DISABLED)
460 return true;
461 if (eflags & EVENT_FILE_FL_PID_FILTER)
462 return trace_event_ignore_this_pid(file);
463 }
464 return false;
465 }
466
467 #ifdef CONFIG_BPF_EVENTS
468 unsigned int trace_call_bpf(struct trace_event_call *call, void *ctx);
469 int perf_event_attach_bpf_prog(struct perf_event *event, struct bpf_prog *prog);
470 void perf_event_detach_bpf_prog(struct perf_event *event);
471 int perf_event_query_prog_array(struct perf_event *event, void __user *info);
472 int bpf_probe_register(struct bpf_raw_event_map *btp, struct bpf_prog *prog);
473 int bpf_probe_unregister(struct bpf_raw_event_map *btp, struct bpf_prog *prog);
474 struct bpf_raw_event_map *bpf_find_raw_tracepoint(const char *name);
475 int bpf_get_perf_event_info(const struct perf_event *event, u32 *prog_id,
476 u32 *fd_type, const char **buf,
477 u64 *probe_offset, u64 *probe_addr);
478 #else
trace_call_bpf(struct trace_event_call * call,void * ctx)479 static inline unsigned int trace_call_bpf(struct trace_event_call *call, void *ctx)
480 {
481 return 1;
482 }
483
484 static inline int
perf_event_attach_bpf_prog(struct perf_event * event,struct bpf_prog * prog)485 perf_event_attach_bpf_prog(struct perf_event *event, struct bpf_prog *prog)
486 {
487 return -EOPNOTSUPP;
488 }
489
perf_event_detach_bpf_prog(struct perf_event * event)490 static inline void perf_event_detach_bpf_prog(struct perf_event *event) { }
491
492 static inline int
perf_event_query_prog_array(struct perf_event * event,void __user * info)493 perf_event_query_prog_array(struct perf_event *event, void __user *info)
494 {
495 return -EOPNOTSUPP;
496 }
bpf_probe_register(struct bpf_raw_event_map * btp,struct bpf_prog * p)497 static inline int bpf_probe_register(struct bpf_raw_event_map *btp, struct bpf_prog *p)
498 {
499 return -EOPNOTSUPP;
500 }
bpf_probe_unregister(struct bpf_raw_event_map * btp,struct bpf_prog * p)501 static inline int bpf_probe_unregister(struct bpf_raw_event_map *btp, struct bpf_prog *p)
502 {
503 return -EOPNOTSUPP;
504 }
bpf_find_raw_tracepoint(const char * name)505 static inline struct bpf_raw_event_map *bpf_find_raw_tracepoint(const char *name)
506 {
507 return NULL;
508 }
bpf_get_perf_event_info(const struct perf_event * event,u32 * prog_id,u32 * fd_type,const char ** buf,u64 * probe_offset,u64 * probe_addr)509 static inline int bpf_get_perf_event_info(const struct perf_event *event,
510 u32 *prog_id, u32 *fd_type,
511 const char **buf, u64 *probe_offset,
512 u64 *probe_addr)
513 {
514 return -EOPNOTSUPP;
515 }
516 #endif
517
518 enum {
519 FILTER_OTHER = 0,
520 FILTER_STATIC_STRING,
521 FILTER_DYN_STRING,
522 FILTER_PTR_STRING,
523 FILTER_TRACE_FN,
524 FILTER_COMM,
525 FILTER_CPU,
526 };
527
528 extern int trace_event_raw_init(struct trace_event_call *call);
529 extern int trace_define_field(struct trace_event_call *call, const char *type,
530 const char *name, int offset, int size,
531 int is_signed, int filter_type);
532 extern int trace_add_event_call_nolock(struct trace_event_call *call);
533 extern int trace_remove_event_call_nolock(struct trace_event_call *call);
534 extern int trace_add_event_call(struct trace_event_call *call);
535 extern int trace_remove_event_call(struct trace_event_call *call);
536 extern int trace_event_get_offsets(struct trace_event_call *call);
537
538 #define is_signed_type(type) (((type)(-1)) < (type)1)
539
540 int trace_set_clr_event(const char *system, const char *event, int set);
541
542 /*
543 * The double __builtin_constant_p is because gcc will give us an error
544 * if we try to allocate the static variable to fmt if it is not a
545 * constant. Even with the outer if statement optimizing out.
546 */
547 #define event_trace_printk(ip, fmt, args...) \
548 do { \
549 __trace_printk_check_format(fmt, ##args); \
550 tracing_record_cmdline(current); \
551 if (__builtin_constant_p(fmt)) { \
552 static const char *trace_printk_fmt \
553 __attribute__((section("__trace_printk_fmt"))) = \
554 __builtin_constant_p(fmt) ? fmt : NULL; \
555 \
556 __trace_bprintk(ip, trace_printk_fmt, ##args); \
557 } else \
558 __trace_printk(ip, fmt, ##args); \
559 } while (0)
560
561 #ifdef CONFIG_PERF_EVENTS
562 struct perf_event;
563
564 DECLARE_PER_CPU(struct pt_regs, perf_trace_regs);
565 DECLARE_PER_CPU(int, bpf_kprobe_override);
566
567 extern int perf_trace_init(struct perf_event *event);
568 extern void perf_trace_destroy(struct perf_event *event);
569 extern int perf_trace_add(struct perf_event *event, int flags);
570 extern void perf_trace_del(struct perf_event *event, int flags);
571 #ifdef CONFIG_KPROBE_EVENTS
572 extern int perf_kprobe_init(struct perf_event *event, bool is_retprobe);
573 extern void perf_kprobe_destroy(struct perf_event *event);
574 extern int bpf_get_kprobe_info(const struct perf_event *event,
575 u32 *fd_type, const char **symbol,
576 u64 *probe_offset, u64 *probe_addr,
577 bool perf_type_tracepoint);
578 #endif
579 #ifdef CONFIG_UPROBE_EVENTS
580 extern int perf_uprobe_init(struct perf_event *event, bool is_retprobe);
581 extern void perf_uprobe_destroy(struct perf_event *event);
582 extern int bpf_get_uprobe_info(const struct perf_event *event,
583 u32 *fd_type, const char **filename,
584 u64 *probe_offset, u64 *probe_addr,
585 bool perf_type_tracepoint);
586 #endif
587 extern int ftrace_profile_set_filter(struct perf_event *event, int event_id,
588 char *filter_str);
589 extern void ftrace_profile_free_filter(struct perf_event *event);
590 void perf_trace_buf_update(void *record, u16 type);
591 void *perf_trace_buf_alloc(int size, struct pt_regs **regs, int *rctxp);
592
593 void bpf_trace_run1(struct bpf_prog *prog, u64 arg1);
594 void bpf_trace_run2(struct bpf_prog *prog, u64 arg1, u64 arg2);
595 void bpf_trace_run3(struct bpf_prog *prog, u64 arg1, u64 arg2,
596 u64 arg3);
597 void bpf_trace_run4(struct bpf_prog *prog, u64 arg1, u64 arg2,
598 u64 arg3, u64 arg4);
599 void bpf_trace_run5(struct bpf_prog *prog, u64 arg1, u64 arg2,
600 u64 arg3, u64 arg4, u64 arg5);
601 void bpf_trace_run6(struct bpf_prog *prog, u64 arg1, u64 arg2,
602 u64 arg3, u64 arg4, u64 arg5, u64 arg6);
603 void bpf_trace_run7(struct bpf_prog *prog, u64 arg1, u64 arg2,
604 u64 arg3, u64 arg4, u64 arg5, u64 arg6, u64 arg7);
605 void bpf_trace_run8(struct bpf_prog *prog, u64 arg1, u64 arg2,
606 u64 arg3, u64 arg4, u64 arg5, u64 arg6, u64 arg7,
607 u64 arg8);
608 void bpf_trace_run9(struct bpf_prog *prog, u64 arg1, u64 arg2,
609 u64 arg3, u64 arg4, u64 arg5, u64 arg6, u64 arg7,
610 u64 arg8, u64 arg9);
611 void bpf_trace_run10(struct bpf_prog *prog, u64 arg1, u64 arg2,
612 u64 arg3, u64 arg4, u64 arg5, u64 arg6, u64 arg7,
613 u64 arg8, u64 arg9, u64 arg10);
614 void bpf_trace_run11(struct bpf_prog *prog, u64 arg1, u64 arg2,
615 u64 arg3, u64 arg4, u64 arg5, u64 arg6, u64 arg7,
616 u64 arg8, u64 arg9, u64 arg10, u64 arg11);
617 void bpf_trace_run12(struct bpf_prog *prog, u64 arg1, u64 arg2,
618 u64 arg3, u64 arg4, u64 arg5, u64 arg6, u64 arg7,
619 u64 arg8, u64 arg9, u64 arg10, u64 arg11, u64 arg12);
620 void perf_trace_run_bpf_submit(void *raw_data, int size, int rctx,
621 struct trace_event_call *call, u64 count,
622 struct pt_regs *regs, struct hlist_head *head,
623 struct task_struct *task);
624
625 static inline void
perf_trace_buf_submit(void * raw_data,int size,int rctx,u16 type,u64 count,struct pt_regs * regs,void * head,struct task_struct * task)626 perf_trace_buf_submit(void *raw_data, int size, int rctx, u16 type,
627 u64 count, struct pt_regs *regs, void *head,
628 struct task_struct *task)
629 {
630 perf_tp_event(type, count, raw_data, size, regs, head, rctx, task);
631 }
632
633 #endif
634
635 #endif /* _LINUX_TRACE_EVENT_H */
636