Merge tag 'trace-printf-v6.13' of git://git.kernel.org/pub/scm/linux/kernel/git/trace...
[drm/drm-misc.git] / tools / perf / util / bpf_kwork.c
blob6c7126b7670dd0c9a2b0a5b55d74cbbc5f4ea5cd
1 // SPDX-License-Identifier: GPL-2.0
2 /*
3 * bpf_kwork.c
5 * Copyright (c) 2022 Huawei Inc, Yang Jihong <yangjihong1@huawei.com>
6 */
8 #include <time.h>
9 #include <fcntl.h>
10 #include <signal.h>
11 #include <stdio.h>
12 #include <unistd.h>
14 #include <linux/time64.h>
16 #include "util/debug.h"
17 #include "util/evsel.h"
18 #include "util/kwork.h"
20 #include <bpf/bpf.h>
21 #include <perf/cpumap.h>
23 #include "util/bpf_skel/kwork_trace.skel.h"
26 * This should be in sync with "util/kwork_trace.bpf.c"
28 #define MAX_KWORKNAME 128
30 struct work_key {
31 u32 type;
32 u32 cpu;
33 u64 id;
36 struct report_data {
37 u64 nr;
38 u64 total_time;
39 u64 max_time;
40 u64 max_time_start;
41 u64 max_time_end;
44 struct kwork_class_bpf {
45 struct kwork_class *class;
47 void (*load_prepare)(struct perf_kwork *kwork);
48 int (*get_work_name)(struct work_key *key, char **ret_name);
51 static struct kwork_trace_bpf *skel;
53 static struct timespec ts_start;
54 static struct timespec ts_end;
56 void perf_kwork__trace_start(void)
58 clock_gettime(CLOCK_MONOTONIC, &ts_start);
59 skel->bss->enabled = 1;
62 void perf_kwork__trace_finish(void)
64 clock_gettime(CLOCK_MONOTONIC, &ts_end);
65 skel->bss->enabled = 0;
68 static int get_work_name_from_map(struct work_key *key, char **ret_name)
70 char name[MAX_KWORKNAME] = { 0 };
71 int fd = bpf_map__fd(skel->maps.perf_kwork_names);
73 *ret_name = NULL;
75 if (fd < 0) {
76 pr_debug("Invalid names map fd\n");
77 return 0;
80 if ((bpf_map_lookup_elem(fd, key, name) == 0) && (strlen(name) != 0)) {
81 *ret_name = strdup(name);
82 if (*ret_name == NULL) {
83 pr_err("Failed to copy work name\n");
84 return -1;
88 return 0;
91 static void irq_load_prepare(struct perf_kwork *kwork)
93 if (kwork->report == KWORK_REPORT_RUNTIME) {
94 bpf_program__set_autoload(skel->progs.report_irq_handler_entry, true);
95 bpf_program__set_autoload(skel->progs.report_irq_handler_exit, true);
99 static struct kwork_class_bpf kwork_irq_bpf = {
100 .load_prepare = irq_load_prepare,
101 .get_work_name = get_work_name_from_map,
104 static void softirq_load_prepare(struct perf_kwork *kwork)
106 if (kwork->report == KWORK_REPORT_RUNTIME) {
107 bpf_program__set_autoload(skel->progs.report_softirq_entry, true);
108 bpf_program__set_autoload(skel->progs.report_softirq_exit, true);
109 } else if (kwork->report == KWORK_REPORT_LATENCY) {
110 bpf_program__set_autoload(skel->progs.latency_softirq_raise, true);
111 bpf_program__set_autoload(skel->progs.latency_softirq_entry, true);
115 static struct kwork_class_bpf kwork_softirq_bpf = {
116 .load_prepare = softirq_load_prepare,
117 .get_work_name = get_work_name_from_map,
120 static void workqueue_load_prepare(struct perf_kwork *kwork)
122 if (kwork->report == KWORK_REPORT_RUNTIME) {
123 bpf_program__set_autoload(skel->progs.report_workqueue_execute_start, true);
124 bpf_program__set_autoload(skel->progs.report_workqueue_execute_end, true);
125 } else if (kwork->report == KWORK_REPORT_LATENCY) {
126 bpf_program__set_autoload(skel->progs.latency_workqueue_activate_work, true);
127 bpf_program__set_autoload(skel->progs.latency_workqueue_execute_start, true);
131 static struct kwork_class_bpf kwork_workqueue_bpf = {
132 .load_prepare = workqueue_load_prepare,
133 .get_work_name = get_work_name_from_map,
136 static struct kwork_class_bpf *
137 kwork_class_bpf_supported_list[KWORK_CLASS_MAX] = {
138 [KWORK_CLASS_IRQ] = &kwork_irq_bpf,
139 [KWORK_CLASS_SOFTIRQ] = &kwork_softirq_bpf,
140 [KWORK_CLASS_WORKQUEUE] = &kwork_workqueue_bpf,
143 static bool valid_kwork_class_type(enum kwork_class_type type)
145 return type >= 0 && type < KWORK_CLASS_MAX ? true : false;
148 static int setup_filters(struct perf_kwork *kwork)
150 if (kwork->cpu_list != NULL) {
151 int idx, nr_cpus;
152 struct perf_cpu_map *map;
153 struct perf_cpu cpu;
154 int fd = bpf_map__fd(skel->maps.perf_kwork_cpu_filter);
156 if (fd < 0) {
157 pr_debug("Invalid cpu filter fd\n");
158 return -1;
161 map = perf_cpu_map__new(kwork->cpu_list);
162 if (map == NULL) {
163 pr_debug("Invalid cpu_list\n");
164 return -1;
167 nr_cpus = libbpf_num_possible_cpus();
168 perf_cpu_map__for_each_cpu(cpu, idx, map) {
169 u8 val = 1;
171 if (cpu.cpu >= nr_cpus) {
172 perf_cpu_map__put(map);
173 pr_err("Requested cpu %d too large\n", cpu.cpu);
174 return -1;
176 bpf_map_update_elem(fd, &cpu.cpu, &val, BPF_ANY);
178 perf_cpu_map__put(map);
181 if (kwork->profile_name != NULL) {
182 int key, fd;
184 if (strlen(kwork->profile_name) >= MAX_KWORKNAME) {
185 pr_err("Requested name filter %s too large, limit to %d\n",
186 kwork->profile_name, MAX_KWORKNAME - 1);
187 return -1;
190 fd = bpf_map__fd(skel->maps.perf_kwork_name_filter);
191 if (fd < 0) {
192 pr_debug("Invalid name filter fd\n");
193 return -1;
196 key = 0;
197 bpf_map_update_elem(fd, &key, kwork->profile_name, BPF_ANY);
200 return 0;
203 int perf_kwork__trace_prepare_bpf(struct perf_kwork *kwork)
205 struct bpf_program *prog;
206 struct kwork_class *class;
207 struct kwork_class_bpf *class_bpf;
208 enum kwork_class_type type;
210 skel = kwork_trace_bpf__open();
211 if (!skel) {
212 pr_debug("Failed to open kwork trace skeleton\n");
213 return -1;
217 * set all progs to non-autoload,
218 * then set corresponding progs according to config
220 bpf_object__for_each_program(prog, skel->obj)
221 bpf_program__set_autoload(prog, false);
223 list_for_each_entry(class, &kwork->class_list, list) {
224 type = class->type;
225 if (!valid_kwork_class_type(type) ||
226 (kwork_class_bpf_supported_list[type] == NULL)) {
227 pr_err("Unsupported bpf trace class %s\n", class->name);
228 goto out;
231 class_bpf = kwork_class_bpf_supported_list[type];
232 class_bpf->class = class;
234 if (class_bpf->load_prepare != NULL)
235 class_bpf->load_prepare(kwork);
238 if (kwork->cpu_list != NULL)
239 skel->rodata->has_cpu_filter = 1;
240 if (kwork->profile_name != NULL)
241 skel->rodata->has_name_filter = 1;
243 if (kwork_trace_bpf__load(skel)) {
244 pr_debug("Failed to load kwork trace skeleton\n");
245 goto out;
248 if (setup_filters(kwork))
249 goto out;
251 if (kwork_trace_bpf__attach(skel)) {
252 pr_debug("Failed to attach kwork trace skeleton\n");
253 goto out;
256 return 0;
258 out:
259 kwork_trace_bpf__destroy(skel);
260 return -1;
263 static int add_work(struct perf_kwork *kwork,
264 struct work_key *key,
265 struct report_data *data)
267 struct kwork_work *work;
268 struct kwork_class_bpf *bpf_trace;
269 struct kwork_work tmp = {
270 .id = key->id,
271 .name = NULL,
272 .cpu = key->cpu,
274 enum kwork_class_type type = key->type;
276 if (!valid_kwork_class_type(type)) {
277 pr_debug("Invalid class type %d to add work\n", type);
278 return -1;
281 bpf_trace = kwork_class_bpf_supported_list[type];
282 tmp.class = bpf_trace->class;
284 if ((bpf_trace->get_work_name != NULL) &&
285 (bpf_trace->get_work_name(key, &tmp.name)))
286 return -1;
288 work = perf_kwork_add_work(kwork, tmp.class, &tmp);
289 if (work == NULL)
290 return -1;
292 if (kwork->report == KWORK_REPORT_RUNTIME) {
293 work->nr_atoms = data->nr;
294 work->total_runtime = data->total_time;
295 work->max_runtime = data->max_time;
296 work->max_runtime_start = data->max_time_start;
297 work->max_runtime_end = data->max_time_end;
298 } else if (kwork->report == KWORK_REPORT_LATENCY) {
299 work->nr_atoms = data->nr;
300 work->total_latency = data->total_time;
301 work->max_latency = data->max_time;
302 work->max_latency_start = data->max_time_start;
303 work->max_latency_end = data->max_time_end;
304 } else {
305 pr_debug("Invalid bpf report type %d\n", kwork->report);
306 return -1;
309 kwork->timestart = (u64)ts_start.tv_sec * NSEC_PER_SEC + ts_start.tv_nsec;
310 kwork->timeend = (u64)ts_end.tv_sec * NSEC_PER_SEC + ts_end.tv_nsec;
312 return 0;
315 int perf_kwork__report_read_bpf(struct perf_kwork *kwork)
317 struct report_data data;
318 struct work_key key = {
319 .type = 0,
320 .cpu = 0,
321 .id = 0,
323 struct work_key prev = {
324 .type = 0,
325 .cpu = 0,
326 .id = 0,
328 int fd = bpf_map__fd(skel->maps.perf_kwork_report);
330 if (fd < 0) {
331 pr_debug("Invalid report fd\n");
332 return -1;
335 while (!bpf_map_get_next_key(fd, &prev, &key)) {
336 if ((bpf_map_lookup_elem(fd, &key, &data)) != 0) {
337 pr_debug("Failed to lookup report elem\n");
338 return -1;
341 if ((data.nr != 0) && (add_work(kwork, &key, &data) != 0))
342 return -1;
344 prev = key;
346 return 0;
349 void perf_kwork__report_cleanup_bpf(void)
351 kwork_trace_bpf__destroy(skel);