diff options
author | Wang Nan <wangnan0@huawei.com> | 2015-10-14 08:41:17 -0400 |
---|---|---|
committer | Arnaldo Carvalho de Melo <acme@redhat.com> | 2015-10-28 12:11:59 -0400 |
commit | 4edf30e39e6cff32390eaff6a1508969b3cd967b (patch) | |
tree | 1d5a60b14b9f808b3c0cece5761002ad32f0e274 /tools/perf | |
parent | 1e5e3ee8ff3877db6943032b54a6ac21c095affd (diff) |
perf bpf: Collect perf_evsel in BPF object files
This patch creates a 'struct perf_evsel' for every probe in a BPF object
file(s) and fills 'struct evlist' with them. The previously introduced
dummy event is now removed. After this patch, the following command:
# perf record --event filter.o ls
Can trace on each of the probes defined in filter.o.
The core of this patch is bpf__foreach_tev(), which calls a callback
function for each 'struct probe_trace_event' event for a bpf program
with each associated file descriptors. The add_bpf_event() callback
creates evsels by calling parse_events_add_tracepoint().
Since bpf-loader.c will not be built if libbpf is turned off, an empty
bpf__foreach_tev() is defined in bpf-loader.h to avoid build errors.
Committer notes:
Before:
# /tmp/oldperf record --event /tmp/foo.o -a usleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.198 MB perf.data ]
# perf evlist
/tmp/foo.o
# perf evlist -v
/tmp/foo.o: type: 1, size: 112, config: 0x9, { sample_period,
sample_freq }: 4000, sample_type: IP|TID|TIME|CPU|PERIOD, disabled: 1,
inherit: 1, mmap: 1, comm: 1, freq: 1, task: 1, sample_id_all: 1,
exclude_guest: 1, mmap2: 1, comm_exec: 1
I.e. we create just the PERF_TYPE_SOFTWARE (type: 1),
PERF_COUNT_SW_DUMMY(config 0x9) event, now, with this patch:
# perf record --event /tmp/foo.o -a usleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.210 MB perf.data ]
# perf evlist -v
perf_bpf_probe:fork: type: 2, size: 112, config: 0x6bd, { sample_period,
sample_freq }: 1, sample_type: IP|TID|TIME|CPU|PERIOD|RAW, disabled: 1,
inherit: 1, mmap: 1, comm: 1, task: 1, sample_id_all: 1, exclude_guest:
1, mmap2: 1, comm_exec: 1
#
We now have a PERF_TYPE_SOFTWARE (type: 1), but the config states 0x6bd,
which is how, after setting up the event via the kprobes interface, the
'perf_bpf_probe:fork' event is accessible via the perf_event_open
syscall. This is all transient, as soon as the 'perf record' session
ends, these probes will go away.
To see how it looks like, lets try doing a neverending session, one that
expects a control+C to end:
# perf record --event /tmp/foo.o -a
So, with that in place, we can use 'perf probe' to see what is in place:
# perf probe -l
perf_bpf_probe:fork (on _do_fork@acme/git/linux/kernel/fork.c)
We also can use debugfs:
[root@felicio ~]# cat /sys/kernel/debug/tracing/kprobe_events
p:perf_bpf_probe/fork _text+638512
Ok, now lets stop and see if we got some forks:
[root@felicio linux]# perf record --event /tmp/foo.o -a
^C[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.325 MB perf.data (111 samples) ]
[root@felicio linux]# perf script
sshd 1271 [003] 81797.507678: perf_bpf_probe:fork: (ffffffff8109be30)
sshd 18309 [000] 81797.524917: perf_bpf_probe:fork: (ffffffff8109be30)
sshd 18309 [001] 81799.381603: perf_bpf_probe:fork: (ffffffff8109be30)
sshd 18309 [001] 81799.408635: perf_bpf_probe:fork: (ffffffff8109be30)
<SNIP>
Sure enough, we have 111 forks :-)
Callchains seems to work as well:
# perf report --stdio --no-child
# To display the perf.data header info, please use --header/--header-only options.
#
# Total Lost Samples: 0
#
# Samples: 562 of event 'perf_bpf_probe:fork'
# Event count (approx.): 562
#
# Overhead Command Shared Object Symbol
# ........ ........ ................ ............
#
44.66% sh [kernel.vmlinux] [k] _do_fork
|
---_do_fork
entry_SYSCALL_64_fastpath
__libc_fork
make_child
26.16% make [kernel.vmlinux] [k] _do_fork
<SNIP>
#
Signed-off-by: Wang Nan <wangnan0@huawei.com>
Tested-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Cc: Alexei Starovoitov <ast@plumgrid.com>
Cc: Brendan Gregg <brendan.d.gregg@gmail.com>
Cc: Daniel Borkmann <daniel@iogearbox.net>
Cc: David Ahern <dsahern@gmail.com>
Cc: He Kuang <hekuang@huawei.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Kaixu Xia <xiakaixu@huawei.com>
Cc: Masami Hiramatsu <masami.hiramatsu.pt@hitachi.com>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Peter Zijlstra <a.p.zijlstra@chello.nl>
Cc: Zefan Li <lizefan@huawei.com>
Cc: pi3orama@163.com
Link: http://lkml.kernel.org/r/1444826502-49291-7-git-send-email-wangnan0@huawei.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Diffstat (limited to 'tools/perf')
-rw-r--r-- | tools/perf/util/bpf-loader.c | 40 | ||||
-rw-r--r-- | tools/perf/util/bpf-loader.h | 14 | ||||
-rw-r--r-- | tools/perf/util/parse-events.c | 52 |
3 files changed, 99 insertions, 7 deletions
diff --git a/tools/perf/util/bpf-loader.c b/tools/perf/util/bpf-loader.c index 727955858d00..aa784a498c48 100644 --- a/tools/perf/util/bpf-loader.c +++ b/tools/perf/util/bpf-loader.c | |||
@@ -255,6 +255,46 @@ int bpf__load(struct bpf_object *obj) | |||
255 | return 0; | 255 | return 0; |
256 | } | 256 | } |
257 | 257 | ||
258 | int bpf__foreach_tev(struct bpf_object *obj, | ||
259 | bpf_prog_iter_callback_t func, | ||
260 | void *arg) | ||
261 | { | ||
262 | struct bpf_program *prog; | ||
263 | int err; | ||
264 | |||
265 | bpf_object__for_each_program(prog, obj) { | ||
266 | struct probe_trace_event *tev; | ||
267 | struct perf_probe_event *pev; | ||
268 | struct bpf_prog_priv *priv; | ||
269 | int i, fd; | ||
270 | |||
271 | err = bpf_program__get_private(prog, | ||
272 | (void **)&priv); | ||
273 | if (err || !priv) { | ||
274 | pr_debug("bpf: failed to get private field\n"); | ||
275 | return -EINVAL; | ||
276 | } | ||
277 | |||
278 | pev = &priv->pev; | ||
279 | for (i = 0; i < pev->ntevs; i++) { | ||
280 | tev = &pev->tevs[i]; | ||
281 | |||
282 | fd = bpf_program__fd(prog); | ||
283 | if (fd < 0) { | ||
284 | pr_debug("bpf: failed to get file descriptor\n"); | ||
285 | return fd; | ||
286 | } | ||
287 | |||
288 | err = (*func)(tev, fd, arg); | ||
289 | if (err) { | ||
290 | pr_debug("bpf: call back failed, stop iterate\n"); | ||
291 | return err; | ||
292 | } | ||
293 | } | ||
294 | } | ||
295 | return 0; | ||
296 | } | ||
297 | |||
258 | #define bpf__strerror_head(err, buf, size) \ | 298 | #define bpf__strerror_head(err, buf, size) \ |
259 | char sbuf[STRERR_BUFSIZE], *emsg;\ | 299 | char sbuf[STRERR_BUFSIZE], *emsg;\ |
260 | if (!size)\ | 300 | if (!size)\ |
diff --git a/tools/perf/util/bpf-loader.h b/tools/perf/util/bpf-loader.h index b091ceb19c48..a8f25ee06fc5 100644 --- a/tools/perf/util/bpf-loader.h +++ b/tools/perf/util/bpf-loader.h | |||
@@ -8,11 +8,15 @@ | |||
8 | #include <linux/compiler.h> | 8 | #include <linux/compiler.h> |
9 | #include <linux/err.h> | 9 | #include <linux/err.h> |
10 | #include <string.h> | 10 | #include <string.h> |
11 | #include "probe-event.h" | ||
11 | #include "debug.h" | 12 | #include "debug.h" |
12 | 13 | ||
13 | struct bpf_object; | 14 | struct bpf_object; |
14 | #define PERF_BPF_PROBE_GROUP "perf_bpf_probe" | 15 | #define PERF_BPF_PROBE_GROUP "perf_bpf_probe" |
15 | 16 | ||
17 | typedef int (*bpf_prog_iter_callback_t)(struct probe_trace_event *tev, | ||
18 | int fd, void *arg); | ||
19 | |||
16 | #ifdef HAVE_LIBBPF_SUPPORT | 20 | #ifdef HAVE_LIBBPF_SUPPORT |
17 | struct bpf_object *bpf__prepare_load(const char *filename); | 21 | struct bpf_object *bpf__prepare_load(const char *filename); |
18 | 22 | ||
@@ -26,6 +30,8 @@ int bpf__strerror_probe(struct bpf_object *obj, int err, | |||
26 | int bpf__load(struct bpf_object *obj); | 30 | int bpf__load(struct bpf_object *obj); |
27 | int bpf__strerror_load(struct bpf_object *obj, int err, | 31 | int bpf__strerror_load(struct bpf_object *obj, int err, |
28 | char *buf, size_t size); | 32 | char *buf, size_t size); |
33 | int bpf__foreach_tev(struct bpf_object *obj, | ||
34 | bpf_prog_iter_callback_t func, void *arg); | ||
29 | #else | 35 | #else |
30 | static inline struct bpf_object * | 36 | static inline struct bpf_object * |
31 | bpf__prepare_load(const char *filename __maybe_unused) | 37 | bpf__prepare_load(const char *filename __maybe_unused) |
@@ -41,6 +47,14 @@ static inline int bpf__unprobe(struct bpf_object *obj __maybe_unused) { return 0 | |||
41 | static inline int bpf__load(struct bpf_object *obj __maybe_unused) { return 0; } | 47 | static inline int bpf__load(struct bpf_object *obj __maybe_unused) { return 0; } |
42 | 48 | ||
43 | static inline int | 49 | static inline int |
50 | bpf__foreach_tev(struct bpf_object *obj __maybe_unused, | ||
51 | bpf_prog_iter_callback_t func __maybe_unused, | ||
52 | void *arg __maybe_unused) | ||
53 | { | ||
54 | return 0; | ||
55 | } | ||
56 | |||
57 | static inline int | ||
44 | __bpf_strerror(char *buf, size_t size) | 58 | __bpf_strerror(char *buf, size_t size) |
45 | { | 59 | { |
46 | if (!size) | 60 | if (!size) |
diff --git a/tools/perf/util/parse-events.c b/tools/perf/util/parse-events.c index c3aabeb63e88..d97b03710331 100644 --- a/tools/perf/util/parse-events.c +++ b/tools/perf/util/parse-events.c | |||
@@ -530,12 +530,49 @@ static int add_tracepoint_multi_sys(struct list_head *list, int *idx, | |||
530 | return ret; | 530 | return ret; |
531 | } | 531 | } |
532 | 532 | ||
533 | struct __add_bpf_event_param { | ||
534 | struct parse_events_evlist *data; | ||
535 | struct list_head *list; | ||
536 | }; | ||
537 | |||
538 | static int add_bpf_event(struct probe_trace_event *tev, int fd, | ||
539 | void *_param) | ||
540 | { | ||
541 | LIST_HEAD(new_evsels); | ||
542 | struct __add_bpf_event_param *param = _param; | ||
543 | struct parse_events_evlist *evlist = param->data; | ||
544 | struct list_head *list = param->list; | ||
545 | int err; | ||
546 | |||
547 | pr_debug("add bpf event %s:%s and attach bpf program %d\n", | ||
548 | tev->group, tev->event, fd); | ||
549 | |||
550 | err = parse_events_add_tracepoint(&new_evsels, &evlist->idx, tev->group, | ||
551 | tev->event, evlist->error, NULL); | ||
552 | if (err) { | ||
553 | struct perf_evsel *evsel, *tmp; | ||
554 | |||
555 | pr_debug("Failed to add BPF event %s:%s\n", | ||
556 | tev->group, tev->event); | ||
557 | list_for_each_entry_safe(evsel, tmp, &new_evsels, node) { | ||
558 | list_del(&evsel->node); | ||
559 | perf_evsel__delete(evsel); | ||
560 | } | ||
561 | return err; | ||
562 | } | ||
563 | pr_debug("adding %s:%s\n", tev->group, tev->event); | ||
564 | |||
565 | list_splice(&new_evsels, list); | ||
566 | return 0; | ||
567 | } | ||
568 | |||
533 | int parse_events_load_bpf_obj(struct parse_events_evlist *data, | 569 | int parse_events_load_bpf_obj(struct parse_events_evlist *data, |
534 | struct list_head *list, | 570 | struct list_head *list, |
535 | struct bpf_object *obj) | 571 | struct bpf_object *obj) |
536 | { | 572 | { |
537 | int err; | 573 | int err; |
538 | char errbuf[BUFSIZ]; | 574 | char errbuf[BUFSIZ]; |
575 | struct __add_bpf_event_param param = {data, list}; | ||
539 | static bool registered_unprobe_atexit = false; | 576 | static bool registered_unprobe_atexit = false; |
540 | 577 | ||
541 | if (IS_ERR(obj) || !obj) { | 578 | if (IS_ERR(obj) || !obj) { |
@@ -567,13 +604,14 @@ int parse_events_load_bpf_obj(struct parse_events_evlist *data, | |||
567 | goto errout; | 604 | goto errout; |
568 | } | 605 | } |
569 | 606 | ||
570 | /* | 607 | err = bpf__foreach_tev(obj, add_bpf_event, ¶m); |
571 | * Temporary add a dummy event here so we can check whether | 608 | if (err) { |
572 | * basic bpf loader works. Following patches will replace | 609 | snprintf(errbuf, sizeof(errbuf), |
573 | * dummy event by useful evsels. | 610 | "Attach events in BPF object failed"); |
574 | */ | 611 | goto errout; |
575 | return parse_events_add_numeric(data, list, PERF_TYPE_SOFTWARE, | 612 | } |
576 | PERF_COUNT_SW_DUMMY, NULL); | 613 | |
614 | return 0; | ||
577 | errout: | 615 | errout: |
578 | data->error->help = strdup("(add -v to see detail)"); | 616 | data->error->help = strdup("(add -v to see detail)"); |
579 | data->error->str = strdup(errbuf); | 617 | data->error->str = strdup(errbuf); |