]> Git Repo - linux.git/blob - tools/perf/util/bpf_kwork.c
HID: hid-sensor-custom: Fix big on-stack allocation in hid_sensor_custom_get_known()
[linux.git] / tools / perf / util / bpf_kwork.c
1 // SPDX-License-Identifier: GPL-2.0
2 /*
3  * bpf_kwork.c
4  *
5  * Copyright (c) 2022  Huawei Inc,  Yang Jihong <[email protected]>
6  */
7
8 #include <time.h>
9 #include <fcntl.h>
10 #include <stdio.h>
11 #include <unistd.h>
12
13 #include <linux/time64.h>
14
15 #include "util/debug.h"
16 #include "util/kwork.h"
17
18 #include <bpf/bpf.h>
19
20 #include "util/bpf_skel/kwork_trace.skel.h"
21
22 /*
23  * This should be in sync with "util/kwork_trace.bpf.c"
24  */
25 #define MAX_KWORKNAME 128
26
27 struct work_key {
28         u32 type;
29         u32 cpu;
30         u64 id;
31 };
32
33 struct report_data {
34         u64 nr;
35         u64 total_time;
36         u64 max_time;
37         u64 max_time_start;
38         u64 max_time_end;
39 };
40
41 struct kwork_class_bpf {
42         struct kwork_class *class;
43
44         void (*load_prepare)(struct perf_kwork *kwork);
45         int  (*get_work_name)(struct work_key *key, char **ret_name);
46 };
47
48 static struct kwork_trace_bpf *skel;
49
50 static struct timespec ts_start;
51 static struct timespec ts_end;
52
53 void perf_kwork__trace_start(void)
54 {
55         clock_gettime(CLOCK_MONOTONIC, &ts_start);
56         skel->bss->enabled = 1;
57 }
58
59 void perf_kwork__trace_finish(void)
60 {
61         clock_gettime(CLOCK_MONOTONIC, &ts_end);
62         skel->bss->enabled = 0;
63 }
64
65 static int get_work_name_from_map(struct work_key *key, char **ret_name)
66 {
67         char name[MAX_KWORKNAME] = { 0 };
68         int fd = bpf_map__fd(skel->maps.perf_kwork_names);
69
70         *ret_name = NULL;
71
72         if (fd < 0) {
73                 pr_debug("Invalid names map fd\n");
74                 return 0;
75         }
76
77         if ((bpf_map_lookup_elem(fd, key, name) == 0) && (strlen(name) != 0)) {
78                 *ret_name = strdup(name);
79                 if (*ret_name == NULL) {
80                         pr_err("Failed to copy work name\n");
81                         return -1;
82                 }
83         }
84
85         return 0;
86 }
87
88 static void irq_load_prepare(struct perf_kwork *kwork)
89 {
90         if (kwork->report == KWORK_REPORT_RUNTIME) {
91                 bpf_program__set_autoload(skel->progs.report_irq_handler_entry, true);
92                 bpf_program__set_autoload(skel->progs.report_irq_handler_exit, true);
93         }
94 }
95
96 static struct kwork_class_bpf kwork_irq_bpf = {
97         .load_prepare  = irq_load_prepare,
98         .get_work_name = get_work_name_from_map,
99 };
100
101 static void softirq_load_prepare(struct perf_kwork *kwork)
102 {
103         if (kwork->report == KWORK_REPORT_RUNTIME) {
104                 bpf_program__set_autoload(skel->progs.report_softirq_entry, true);
105                 bpf_program__set_autoload(skel->progs.report_softirq_exit, true);
106         } else if (kwork->report == KWORK_REPORT_LATENCY) {
107                 bpf_program__set_autoload(skel->progs.latency_softirq_raise, true);
108                 bpf_program__set_autoload(skel->progs.latency_softirq_entry, true);
109         }
110 }
111
112 static struct kwork_class_bpf kwork_softirq_bpf = {
113         .load_prepare  = softirq_load_prepare,
114         .get_work_name = get_work_name_from_map,
115 };
116
117 static void workqueue_load_prepare(struct perf_kwork *kwork)
118 {
119         if (kwork->report == KWORK_REPORT_RUNTIME) {
120                 bpf_program__set_autoload(skel->progs.report_workqueue_execute_start, true);
121                 bpf_program__set_autoload(skel->progs.report_workqueue_execute_end, true);
122         } else if (kwork->report == KWORK_REPORT_LATENCY) {
123                 bpf_program__set_autoload(skel->progs.latency_workqueue_activate_work, true);
124                 bpf_program__set_autoload(skel->progs.latency_workqueue_execute_start, true);
125         }
126 }
127
128 static struct kwork_class_bpf kwork_workqueue_bpf = {
129         .load_prepare  = workqueue_load_prepare,
130         .get_work_name = get_work_name_from_map,
131 };
132
133 static struct kwork_class_bpf *
134 kwork_class_bpf_supported_list[KWORK_CLASS_MAX] = {
135         [KWORK_CLASS_IRQ]       = &kwork_irq_bpf,
136         [KWORK_CLASS_SOFTIRQ]   = &kwork_softirq_bpf,
137         [KWORK_CLASS_WORKQUEUE] = &kwork_workqueue_bpf,
138 };
139
140 static bool valid_kwork_class_type(enum kwork_class_type type)
141 {
142         return type >= 0 && type < KWORK_CLASS_MAX ? true : false;
143 }
144
145 static int setup_filters(struct perf_kwork *kwork)
146 {
147         u8 val = 1;
148         int i, nr_cpus, key, fd;
149         struct perf_cpu_map *map;
150
151         if (kwork->cpu_list != NULL) {
152                 fd = bpf_map__fd(skel->maps.perf_kwork_cpu_filter);
153                 if (fd < 0) {
154                         pr_debug("Invalid cpu filter fd\n");
155                         return -1;
156                 }
157
158                 map = perf_cpu_map__new(kwork->cpu_list);
159                 if (map == NULL) {
160                         pr_debug("Invalid cpu_list\n");
161                         return -1;
162                 }
163
164                 nr_cpus = libbpf_num_possible_cpus();
165                 for (i = 0; i < perf_cpu_map__nr(map); i++) {
166                         struct perf_cpu cpu = perf_cpu_map__cpu(map, i);
167
168                         if (cpu.cpu >= nr_cpus) {
169                                 perf_cpu_map__put(map);
170                                 pr_err("Requested cpu %d too large\n", cpu.cpu);
171                                 return -1;
172                         }
173                         bpf_map_update_elem(fd, &cpu.cpu, &val, BPF_ANY);
174                 }
175                 perf_cpu_map__put(map);
176
177                 skel->bss->has_cpu_filter = 1;
178         }
179
180         if (kwork->profile_name != NULL) {
181                 if (strlen(kwork->profile_name) >= MAX_KWORKNAME) {
182                         pr_err("Requested name filter %s too large, limit to %d\n",
183                                kwork->profile_name, MAX_KWORKNAME - 1);
184                         return -1;
185                 }
186
187                 fd = bpf_map__fd(skel->maps.perf_kwork_name_filter);
188                 if (fd < 0) {
189                         pr_debug("Invalid name filter fd\n");
190                         return -1;
191                 }
192
193                 key = 0;
194                 bpf_map_update_elem(fd, &key, kwork->profile_name, BPF_ANY);
195
196                 skel->bss->has_name_filter = 1;
197         }
198
199         return 0;
200 }
201
202 int perf_kwork__trace_prepare_bpf(struct perf_kwork *kwork)
203 {
204         struct bpf_program *prog;
205         struct kwork_class *class;
206         struct kwork_class_bpf *class_bpf;
207         enum kwork_class_type type;
208
209         skel = kwork_trace_bpf__open();
210         if (!skel) {
211                 pr_debug("Failed to open kwork trace skeleton\n");
212                 return -1;
213         }
214
215         /*
216          * set all progs to non-autoload,
217          * then set corresponding progs according to config
218          */
219         bpf_object__for_each_program(prog, skel->obj)
220                 bpf_program__set_autoload(prog, false);
221
222         list_for_each_entry(class, &kwork->class_list, list) {
223                 type = class->type;
224                 if (!valid_kwork_class_type(type) ||
225                     (kwork_class_bpf_supported_list[type] == NULL)) {
226                         pr_err("Unsupported bpf trace class %s\n", class->name);
227                         goto out;
228                 }
229
230                 class_bpf = kwork_class_bpf_supported_list[type];
231                 class_bpf->class = class;
232
233                 if (class_bpf->load_prepare != NULL)
234                         class_bpf->load_prepare(kwork);
235         }
236
237         if (kwork_trace_bpf__load(skel)) {
238                 pr_debug("Failed to load kwork trace skeleton\n");
239                 goto out;
240         }
241
242         if (setup_filters(kwork))
243                 goto out;
244
245         if (kwork_trace_bpf__attach(skel)) {
246                 pr_debug("Failed to attach kwork trace skeleton\n");
247                 goto out;
248         }
249
250         return 0;
251
252 out:
253         kwork_trace_bpf__destroy(skel);
254         return -1;
255 }
256
257 static int add_work(struct perf_kwork *kwork,
258                     struct work_key *key,
259                     struct report_data *data)
260 {
261         struct kwork_work *work;
262         struct kwork_class_bpf *bpf_trace;
263         struct kwork_work tmp = {
264                 .id = key->id,
265                 .name = NULL,
266                 .cpu = key->cpu,
267         };
268         enum kwork_class_type type = key->type;
269
270         if (!valid_kwork_class_type(type)) {
271                 pr_debug("Invalid class type %d to add work\n", type);
272                 return -1;
273         }
274
275         bpf_trace = kwork_class_bpf_supported_list[type];
276         tmp.class = bpf_trace->class;
277
278         if ((bpf_trace->get_work_name != NULL) &&
279             (bpf_trace->get_work_name(key, &tmp.name)))
280                 return -1;
281
282         work = perf_kwork_add_work(kwork, tmp.class, &tmp);
283         if (work == NULL)
284                 return -1;
285
286         if (kwork->report == KWORK_REPORT_RUNTIME) {
287                 work->nr_atoms = data->nr;
288                 work->total_runtime = data->total_time;
289                 work->max_runtime = data->max_time;
290                 work->max_runtime_start = data->max_time_start;
291                 work->max_runtime_end = data->max_time_end;
292         } else if (kwork->report == KWORK_REPORT_LATENCY) {
293                 work->nr_atoms = data->nr;
294                 work->total_latency = data->total_time;
295                 work->max_latency = data->max_time;
296                 work->max_latency_start = data->max_time_start;
297                 work->max_latency_end = data->max_time_end;
298         } else {
299                 pr_debug("Invalid bpf report type %d\n", kwork->report);
300                 return -1;
301         }
302
303         kwork->timestart = (u64)ts_start.tv_sec * NSEC_PER_SEC + ts_start.tv_nsec;
304         kwork->timeend = (u64)ts_end.tv_sec * NSEC_PER_SEC + ts_end.tv_nsec;
305
306         return 0;
307 }
308
309 int perf_kwork__report_read_bpf(struct perf_kwork *kwork)
310 {
311         struct report_data data;
312         struct work_key key = {
313                 .type = 0,
314                 .cpu  = 0,
315                 .id   = 0,
316         };
317         struct work_key prev = {
318                 .type = 0,
319                 .cpu  = 0,
320                 .id   = 0,
321         };
322         int fd = bpf_map__fd(skel->maps.perf_kwork_report);
323
324         if (fd < 0) {
325                 pr_debug("Invalid report fd\n");
326                 return -1;
327         }
328
329         while (!bpf_map_get_next_key(fd, &prev, &key)) {
330                 if ((bpf_map_lookup_elem(fd, &key, &data)) != 0) {
331                         pr_debug("Failed to lookup report elem\n");
332                         return -1;
333                 }
334
335                 if ((data.nr != 0) && (add_work(kwork, &key, &data) != 0))
336                         return -1;
337
338                 prev = key;
339         }
340         return 0;
341 }
342
343 void perf_kwork__report_cleanup_bpf(void)
344 {
345         kwork_trace_bpf__destroy(skel);
346 }
This page took 0.051885 seconds and 4 git commands to generate.