Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751953AbbD3LCb (ORCPT ); Thu, 30 Apr 2015 07:02:31 -0400 Received: from szxga01-in.huawei.com ([58.251.152.64]:65197 "EHLO szxga01-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751195AbbD3Kxb (ORCPT ); Thu, 30 Apr 2015 06:53:31 -0400 From: Wang Nan To: , , , , , , CC: , , , Subject: [RFC PATCH 00/22] perf tools: introduce 'perf bpf' command to load eBPF programs. Date: Thu, 30 Apr 2015 10:52:23 +0000 Message-ID: <1430391165-30267-1-git-send-email-wangnan0@huawei.com> X-Mailer: git-send-email 1.8.3.4 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.107.197.210] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 5459 Lines: 162 This series of patches is an approach to integrate eBPF with perf. After applying these patches, users are allowed to use following command to load eBPF program compiled by LLVM into kernel: $ perf bpf sample_bpf.o The required BPF code and the loading procedure is similar to Alexei Starovoitov's libbpf in sample/bpf, with following exceptions: 1. The section name are not required leading with 'kprobe/' or 'kretprobe/'. Without such leading, any valid C var name can be use. 2. A 'config' section can be provided to describe the position and arguments of a program. Syntax is identical to 'perf probe'. An example is pasted at the bottom of this cover letter. In that example, mybpfprog is configured by string in config section, and will be probed at __alloc_pages_nodemask. sample_bpf.o is generated using: $ $CLANG -I/usr/src/kernel/include -I/usr/src/kernel/usr/include -D__KERNEL__ \ -Wno-unused-value -Wno-pointer-sign \ -O2 -emit-llvm -c sample_bpf.c -o -| $LLC -march=bpf -filetype=obj -o \ sample_bpf.o And can be loaded using: $ perf bpf sample_bpf.o This series is only a limited functional. Following works are on the todo list: 1. Unprobe kprobe stubs used by eBPF programs when unloading; 2. Enable eBPF programs to access local variables and arguments by utilizing debuginfo; 3. Output data in perf way. In this series: Patch 1/22 is a bugfix in perf probe, and may be triggered by following patches; Patch 2-3/22 are preparation, add required macros and syscall definition into perf source tree. Patch 4/22 add 'perf bpf' command. Patch 5-20/22 are labor works, which parse the ELF object file, collect information in object files, create maps needed by programs, link map and programs, config programs and load programs into kernel. Patch 21-22/22 are the final work. Patch 21 creates kprobe points which will be used by eBPF programs, patch 22 creates perf file descriptors then attach eBPF programs on them. -------- EXAMPL -------- ----- sample_bpf.c ----- #include #include #include #define SEC(NAME) __attribute__((section(NAME), used)) static int (*bpf_map_delete_elem)(void *map, void *key) = (void *) BPF_FUNC_map_delete_elem; static int (*bpf_trace_printk)(const char *fmt, int fmt_size, ...) = (void *) BPF_FUNC_trace_printk; struct bpf_map_def { unsigned int type; unsigned int key_size; unsigned int value_size; unsigned int max_entries; }; struct pair { u64 val; u64 ip; }; struct bpf_map_def SEC("maps") my_map = { .type = BPF_MAP_TYPE_HASH, .key_size = sizeof(long), .value_size = sizeof(struct pair), .max_entries = 1000000, }; SEC("kprobe/kmem_cache_free") int bpf_prog1(struct pt_regs *ctx) { long ptr = ctx->r14; bpf_map_delete_elem(&my_map, &ptr); return 0; } SEC("mybpfprog") int bpf_prog_my(void *ctx) { char fmt[] = "Haha\n"; bpf_trace_printk(fmt, sizeof(fmt)); return 0; } char _license[] SEC("license") = "GPL"; u32 _version SEC("version") = LINUX_VERSION_CODE; char _config[] SEC("config") = "" "mybpfprog=__alloc_pages_nodemask\n"; Wang Nan (22): perf: probe: avoid segfault if passed with ''. perf: bpf: prepare: add __aligned_u64 to types.h. perf: add bpf common operations. perf tools: Add new 'perf bpf' command. perf bpf: open eBPF object file and do basic validation. perf bpf: check swap according to EHDR. perf bpf: iterater over elf sections to collect information. perf bpf: collect version and license from ELF. perf bpf: collect map definitions. perf bpf: collect config section in object. perf bpf: collect symbol table in object files. perf bpf: collect bpf programs from object files. perf bpf: collects relocation sections from object file. perf bpf: config eBPF programs based on their names. perf bpf: config eBPF programs using config section. perf bpf: create maps needed by object file. perf bpf: relocation programs. perf bpf: load eBPF programs into kernel. perf bpf: dump eBPF program before loading. perf bpf: clean elf memory after loading. perf bpf: probe at kprobe points. perf bpf: attaches eBPF program to perf fd. tools/include/linux/types.h | 5 + tools/perf/Build | 1 + tools/perf/Documentation/perf-bpf.txt | 18 + tools/perf/builtin-bpf.c | 63 ++ tools/perf/builtin.h | 1 + tools/perf/perf-sys.h | 6 + tools/perf/perf.c | 1 + tools/perf/util/Build | 2 + tools/perf/util/bpf-loader.c | 1061 +++++++++++++++++++++++++++++++++ tools/perf/util/bpf-loader.h | 73 +++ tools/perf/util/bpf.c | 195 ++++++ tools/perf/util/bpf.h | 23 + tools/perf/util/probe-event.c | 2 + 13 files changed, 1451 insertions(+) create mode 100644 tools/perf/Documentation/perf-bpf.txt create mode 100644 tools/perf/builtin-bpf.c create mode 100644 tools/perf/util/bpf-loader.c create mode 100644 tools/perf/util/bpf-loader.h create mode 100644 tools/perf/util/bpf.c create mode 100644 tools/perf/util/bpf.h -- 1.8.3.4 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/