aboutsummaryrefslogtreecommitdiffstats
path: root/tools/perf
diff options
context:
space:
mode:
authorWang Nan <wangnan0@huawei.com>2015-10-14 08:41:17 -0400
committerArnaldo Carvalho de Melo <acme@redhat.com>2015-10-28 12:11:59 -0400
commit4edf30e39e6cff32390eaff6a1508969b3cd967b (patch)
tree1d5a60b14b9f808b3c0cece5761002ad32f0e274 /tools/perf
parent1e5e3ee8ff3877db6943032b54a6ac21c095affd (diff)
perf bpf: Collect perf_evsel in BPF object files
This patch creates a 'struct perf_evsel' for every probe in a BPF object file(s) and fills 'struct evlist' with them. The previously introduced dummy event is now removed. After this patch, the following command: # perf record --event filter.o ls Can trace on each of the probes defined in filter.o. The core of this patch is bpf__foreach_tev(), which calls a callback function for each 'struct probe_trace_event' event for a bpf program with each associated file descriptors. The add_bpf_event() callback creates evsels by calling parse_events_add_tracepoint(). Since bpf-loader.c will not be built if libbpf is turned off, an empty bpf__foreach_tev() is defined in bpf-loader.h to avoid build errors. Committer notes: Before: # /tmp/oldperf record --event /tmp/foo.o -a usleep 1 [ perf record: Woken up 1 times to write data ] [ perf record: Captured and wrote 0.198 MB perf.data ] # perf evlist /tmp/foo.o # perf evlist -v /tmp/foo.o: type: 1, size: 112, config: 0x9, { sample_period, sample_freq }: 4000, sample_type: IP|TID|TIME|CPU|PERIOD, disabled: 1, inherit: 1, mmap: 1, comm: 1, freq: 1, task: 1, sample_id_all: 1, exclude_guest: 1, mmap2: 1, comm_exec: 1 I.e. we create just the PERF_TYPE_SOFTWARE (type: 1), PERF_COUNT_SW_DUMMY(config 0x9) event, now, with this patch: # perf record --event /tmp/foo.o -a usleep 1 [ perf record: Woken up 1 times to write data ] [ perf record: Captured and wrote 0.210 MB perf.data ] # perf evlist -v perf_bpf_probe:fork: type: 2, size: 112, config: 0x6bd, { sample_period, sample_freq }: 1, sample_type: IP|TID|TIME|CPU|PERIOD|RAW, disabled: 1, inherit: 1, mmap: 1, comm: 1, task: 1, sample_id_all: 1, exclude_guest: 1, mmap2: 1, comm_exec: 1 # We now have a PERF_TYPE_SOFTWARE (type: 1), but the config states 0x6bd, which is how, after setting up the event via the kprobes interface, the 'perf_bpf_probe:fork' event is accessible via the perf_event_open syscall. This is all transient, as soon as the 'perf record' session ends, these probes will go away. To see how it looks like, lets try doing a neverending session, one that expects a control+C to end: # perf record --event /tmp/foo.o -a So, with that in place, we can use 'perf probe' to see what is in place: # perf probe -l perf_bpf_probe:fork (on _do_fork@acme/git/linux/kernel/fork.c) We also can use debugfs: [root@felicio ~]# cat /sys/kernel/debug/tracing/kprobe_events p:perf_bpf_probe/fork _text+638512 Ok, now lets stop and see if we got some forks: [root@felicio linux]# perf record --event /tmp/foo.o -a ^C[ perf record: Woken up 1 times to write data ] [ perf record: Captured and wrote 0.325 MB perf.data (111 samples) ] [root@felicio linux]# perf script sshd 1271 [003] 81797.507678: perf_bpf_probe:fork: (ffffffff8109be30) sshd 18309 [000] 81797.524917: perf_bpf_probe:fork: (ffffffff8109be30) sshd 18309 [001] 81799.381603: perf_bpf_probe:fork: (ffffffff8109be30) sshd 18309 [001] 81799.408635: perf_bpf_probe:fork: (ffffffff8109be30) <SNIP> Sure enough, we have 111 forks :-) Callchains seems to work as well: # perf report --stdio --no-child # To display the perf.data header info, please use --header/--header-only options. # # Total Lost Samples: 0 # # Samples: 562 of event 'perf_bpf_probe:fork' # Event count (approx.): 562 # # Overhead Command Shared Object Symbol # ........ ........ ................ ............ # 44.66% sh [kernel.vmlinux] [k] _do_fork | ---_do_fork entry_SYSCALL_64_fastpath __libc_fork make_child 26.16% make [kernel.vmlinux] [k] _do_fork <SNIP> # Signed-off-by: Wang Nan <wangnan0@huawei.com> Tested-by: Arnaldo Carvalho de Melo <acme@redhat.com> Cc: Alexei Starovoitov <ast@plumgrid.com> Cc: Brendan Gregg <brendan.d.gregg@gmail.com> Cc: Daniel Borkmann <daniel@iogearbox.net> Cc: David Ahern <dsahern@gmail.com> Cc: He Kuang <hekuang@huawei.com> Cc: Jiri Olsa <jolsa@kernel.org> Cc: Kaixu Xia <xiakaixu@huawei.com> Cc: Masami Hiramatsu <masami.hiramatsu.pt@hitachi.com> Cc: Namhyung Kim <namhyung@kernel.org> Cc: Peter Zijlstra <a.p.zijlstra@chello.nl> Cc: Zefan Li <lizefan@huawei.com> Cc: pi3orama@163.com Link: http://lkml.kernel.org/r/1444826502-49291-7-git-send-email-wangnan0@huawei.com Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Diffstat (limited to 'tools/perf')
-rw-r--r--tools/perf/util/bpf-loader.c40
-rw-r--r--tools/perf/util/bpf-loader.h14
-rw-r--r--tools/perf/util/parse-events.c52
3 files changed, 99 insertions, 7 deletions
diff --git a/tools/perf/util/bpf-loader.c b/tools/perf/util/bpf-loader.c
index 727955858d00..aa784a498c48 100644
--- a/tools/perf/util/bpf-loader.c
+++ b/tools/perf/util/bpf-loader.c
@@ -255,6 +255,46 @@ int bpf__load(struct bpf_object *obj)
255 return 0; 255 return 0;
256} 256}
257 257
258int bpf__foreach_tev(struct bpf_object *obj,
259 bpf_prog_iter_callback_t func,
260 void *arg)
261{
262 struct bpf_program *prog;
263 int err;
264
265 bpf_object__for_each_program(prog, obj) {
266 struct probe_trace_event *tev;
267 struct perf_probe_event *pev;
268 struct bpf_prog_priv *priv;
269 int i, fd;
270
271 err = bpf_program__get_private(prog,
272 (void **)&priv);
273 if (err || !priv) {
274 pr_debug("bpf: failed to get private field\n");
275 return -EINVAL;
276 }
277
278 pev = &priv->pev;
279 for (i = 0; i < pev->ntevs; i++) {
280 tev = &pev->tevs[i];
281
282 fd = bpf_program__fd(prog);
283 if (fd < 0) {
284 pr_debug("bpf: failed to get file descriptor\n");
285 return fd;
286 }
287
288 err = (*func)(tev, fd, arg);
289 if (err) {
290 pr_debug("bpf: call back failed, stop iterate\n");
291 return err;
292 }
293 }
294 }
295 return 0;
296}
297
258#define bpf__strerror_head(err, buf, size) \ 298#define bpf__strerror_head(err, buf, size) \
259 char sbuf[STRERR_BUFSIZE], *emsg;\ 299 char sbuf[STRERR_BUFSIZE], *emsg;\
260 if (!size)\ 300 if (!size)\
diff --git a/tools/perf/util/bpf-loader.h b/tools/perf/util/bpf-loader.h
index b091ceb19c48..a8f25ee06fc5 100644
--- a/tools/perf/util/bpf-loader.h
+++ b/tools/perf/util/bpf-loader.h
@@ -8,11 +8,15 @@
8#include <linux/compiler.h> 8#include <linux/compiler.h>
9#include <linux/err.h> 9#include <linux/err.h>
10#include <string.h> 10#include <string.h>
11#include "probe-event.h"
11#include "debug.h" 12#include "debug.h"
12 13
13struct bpf_object; 14struct bpf_object;
14#define PERF_BPF_PROBE_GROUP "perf_bpf_probe" 15#define PERF_BPF_PROBE_GROUP "perf_bpf_probe"
15 16
17typedef int (*bpf_prog_iter_callback_t)(struct probe_trace_event *tev,
18 int fd, void *arg);
19
16#ifdef HAVE_LIBBPF_SUPPORT 20#ifdef HAVE_LIBBPF_SUPPORT
17struct bpf_object *bpf__prepare_load(const char *filename); 21struct bpf_object *bpf__prepare_load(const char *filename);
18 22
@@ -26,6 +30,8 @@ int bpf__strerror_probe(struct bpf_object *obj, int err,
26int bpf__load(struct bpf_object *obj); 30int bpf__load(struct bpf_object *obj);
27int bpf__strerror_load(struct bpf_object *obj, int err, 31int bpf__strerror_load(struct bpf_object *obj, int err,
28 char *buf, size_t size); 32 char *buf, size_t size);
33int bpf__foreach_tev(struct bpf_object *obj,
34 bpf_prog_iter_callback_t func, void *arg);
29#else 35#else
30static inline struct bpf_object * 36static inline struct bpf_object *
31bpf__prepare_load(const char *filename __maybe_unused) 37bpf__prepare_load(const char *filename __maybe_unused)
@@ -41,6 +47,14 @@ static inline int bpf__unprobe(struct bpf_object *obj __maybe_unused) { return 0
41static inline int bpf__load(struct bpf_object *obj __maybe_unused) { return 0; } 47static inline int bpf__load(struct bpf_object *obj __maybe_unused) { return 0; }
42 48
43static inline int 49static inline int
50bpf__foreach_tev(struct bpf_object *obj __maybe_unused,
51 bpf_prog_iter_callback_t func __maybe_unused,
52 void *arg __maybe_unused)
53{
54 return 0;
55}
56
57static inline int
44__bpf_strerror(char *buf, size_t size) 58__bpf_strerror(char *buf, size_t size)
45{ 59{
46 if (!size) 60 if (!size)
diff --git a/tools/perf/util/parse-events.c b/tools/perf/util/parse-events.c
index c3aabeb63e88..d97b03710331 100644
--- a/tools/perf/util/parse-events.c
+++ b/tools/perf/util/parse-events.c
@@ -530,12 +530,49 @@ static int add_tracepoint_multi_sys(struct list_head *list, int *idx,
530 return ret; 530 return ret;
531} 531}
532 532
533struct __add_bpf_event_param {
534 struct parse_events_evlist *data;
535 struct list_head *list;
536};
537
538static int add_bpf_event(struct probe_trace_event *tev, int fd,
539 void *_param)
540{
541 LIST_HEAD(new_evsels);
542 struct __add_bpf_event_param *param = _param;
543 struct parse_events_evlist *evlist = param->data;
544 struct list_head *list = param->list;
545 int err;
546
547 pr_debug("add bpf event %s:%s and attach bpf program %d\n",
548 tev->group, tev->event, fd);
549
550 err = parse_events_add_tracepoint(&new_evsels, &evlist->idx, tev->group,
551 tev->event, evlist->error, NULL);
552 if (err) {
553 struct perf_evsel *evsel, *tmp;
554
555 pr_debug("Failed to add BPF event %s:%s\n",
556 tev->group, tev->event);
557 list_for_each_entry_safe(evsel, tmp, &new_evsels, node) {
558 list_del(&evsel->node);
559 perf_evsel__delete(evsel);
560 }
561 return err;
562 }
563 pr_debug("adding %s:%s\n", tev->group, tev->event);
564
565 list_splice(&new_evsels, list);
566 return 0;
567}
568
533int parse_events_load_bpf_obj(struct parse_events_evlist *data, 569int parse_events_load_bpf_obj(struct parse_events_evlist *data,
534 struct list_head *list, 570 struct list_head *list,
535 struct bpf_object *obj) 571 struct bpf_object *obj)
536{ 572{
537 int err; 573 int err;
538 char errbuf[BUFSIZ]; 574 char errbuf[BUFSIZ];
575 struct __add_bpf_event_param param = {data, list};
539 static bool registered_unprobe_atexit = false; 576 static bool registered_unprobe_atexit = false;
540 577
541 if (IS_ERR(obj) || !obj) { 578 if (IS_ERR(obj) || !obj) {
@@ -567,13 +604,14 @@ int parse_events_load_bpf_obj(struct parse_events_evlist *data,
567 goto errout; 604 goto errout;
568 } 605 }
569 606
570 /* 607 err = bpf__foreach_tev(obj, add_bpf_event, &param);
571 * Temporary add a dummy event here so we can check whether 608 if (err) {
572 * basic bpf loader works. Following patches will replace 609 snprintf(errbuf, sizeof(errbuf),
573 * dummy event by useful evsels. 610 "Attach events in BPF object failed");
574 */ 611 goto errout;
575 return parse_events_add_numeric(data, list, PERF_TYPE_SOFTWARE, 612 }
576 PERF_COUNT_SW_DUMMY, NULL); 613
614 return 0;
577errout: 615errout:
578 data->error->help = strdup("(add -v to see detail)"); 616 data->error->help = strdup("(add -v to see detail)");
579 data->error->str = strdup(errbuf); 617 data->error->str = strdup(errbuf);