Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754116AbbFLFiq (ORCPT ); Fri, 12 Jun 2015 01:38:46 -0400 Received: from szxga03-in.huawei.com ([119.145.14.66]:7607 "EHLO szxga03-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753164AbbFLFgk (ORCPT ); Fri, 12 Jun 2015 01:36:40 -0400 From: Wang Nan To: , , , , , , , , , , CC: , , , , Subject: [RFC PATCH v7 32/37] perf record: Probe at kprobe points Date: Fri, 12 Jun 2015 05:35:40 +0000 Message-ID: <1434087345-127225-33-git-send-email-wangnan0@huawei.com> X-Mailer: git-send-email 1.8.3.4 In-Reply-To: <1434087345-127225-1-git-send-email-wangnan0@huawei.com> References: <1434087345-127225-1-git-send-email-wangnan0@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.107.197.200] X-CFilter-Loop: Reflected X-Mirapoint-Virus-RAPID-Raw: score=unknown(0), refid=str=0001.0A020202.557A6FDD.0009,ss=1,re=0.000,recu=0.000,reip=0.000,cl=1,cld=1,fgs=0, ip=0.0.0.0, so=2013-05-26 15:14:31, dmn=2013-03-21 17:37:32 X-Mirapoint-Loop-Id: 82eeed981dc31a93111e663dc17cce2f Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3923 Lines: 142 In this patch, kprobe points are created using add_perf_probe_events. Since all events are already grouped together in an array, calling add_perf_probe_events() once creates all of them. probe_conf.max_probes is set to MAX_PROBES to support glob matching. Signed-off-by: Wang Nan --- tools/perf/builtin-record.c | 18 ++++++++++++++++- tools/perf/util/bpf-loader.c | 48 ++++++++++++++++++++++++++++++++++++++++++++ tools/perf/util/bpf-loader.h | 4 ++++ 3 files changed, 69 insertions(+), 1 deletion(-) diff --git a/tools/perf/builtin-record.c b/tools/perf/builtin-record.c index d3731cc..29f7b40 100644 --- a/tools/perf/builtin-record.c +++ b/tools/perf/builtin-record.c @@ -29,6 +29,7 @@ #include "util/data.h" #include "util/auxtrace.h" #include "util/parse-branch-options.h" +#include "util/bpf-loader.h" #include #include @@ -1106,7 +1107,21 @@ int cmd_record(int argc, const char **argv, const char *prefix __maybe_unused) if (err) return err; - err = -ENOMEM; + /* + * bpf__probe must be called before symbol__init() because we + * need init_symbol_maps. If called after symbol__init, + * symbol_conf.sort_by_name won't take effect. + * + * bpf__unprobe() is safe even if bpf__probe() failed, and it + * also calls symbol__init. Therefore, goto out_symbol_exit + * is safe when probe failed. + */ + err = bpf__probe(); + if (err) { + pr_err("Probing at events in BPF object failed.\n"); + pr_err("Try perf probe -d '*' to remove existing probe events.\n"); + goto out_symbol_exit; + } symbol__init(NULL); @@ -1167,6 +1182,7 @@ out_symbol_exit: perf_evlist__delete(rec->evlist); symbol__exit(); auxtrace_record__free(rec->itr); + bpf__unprobe(); return err; } diff --git a/tools/perf/util/bpf-loader.c b/tools/perf/util/bpf-loader.c index a202702..cb11561 100644 --- a/tools/perf/util/bpf-loader.c +++ b/tools/perf/util/bpf-loader.c @@ -191,3 +191,51 @@ void bpf__clear(void) bpf_object__for_each(obj, tmp) bpf_object__close(obj); } + +static bool is_probing = false; + +int bpf__unprobe(void) +{ + struct strfilter *delfilter; + int ret; + + if (!is_probing) + return 0; + + delfilter = strfilter__new(PERF_BPF_PROBE_GROUP ":*", NULL); + if (!delfilter) { + pr_err("Failed to create delfilter when unprobing\n"); + return -ENOMEM; + } + + ret = del_perf_probe_events(delfilter); + strfilter__delete(delfilter); + if (ret < 0 && is_probing) + pr_err("Error: failed to delete events: %s\n", + strerror(-ret)); + else + is_probing = false; + return ret < 0 ? ret : 0; +} + +int bpf__probe(void) +{ + int err; + + if (nr_probe_events <= 0) + return 0; + + probe_conf.max_probes = MAX_PROBES; + /* Let add_perf_probe_events keeps probe_trace_event */ + err = add_perf_probe_events(probe_event_array, + nr_probe_events, + false); + + /* add_perf_probe_events return negative when fail */ + if (err < 0) + pr_err("bpf probe: failed to probe events\n"); + else + is_probing = true; + + return err < 0 ? err : 0; +} diff --git a/tools/perf/util/bpf-loader.h b/tools/perf/util/bpf-loader.h index 5a3c954..374aec0 100644 --- a/tools/perf/util/bpf-loader.h +++ b/tools/perf/util/bpf-loader.h @@ -12,6 +12,8 @@ #ifdef HAVE_LIBBPF_SUPPORT int bpf__prepare_load(const char *filename, bool source); +int bpf__probe(void); +int bpf__unprobe(void); void bpf__clear(void); #else @@ -22,6 +24,8 @@ static inline int bpf__prepare_load(const char *filename __maybe_unused, return -1; } +static inline int bpf__probe(void) { return 0; } +static inline int bpf__unprobe(void) { return 0; } static inline void bpf__clear(void) { } #endif #endif -- 1.8.3.4 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/