Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753456AbbGWBOs (ORCPT ); Wed, 22 Jul 2015 21:14:48 -0400 Received: from mail-pa0-f45.google.com ([209.85.220.45]:34003 "EHLO mail-pa0-f45.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752589AbbGWBOq (ORCPT ); Wed, 22 Jul 2015 21:14:46 -0400 Subject: Re: [PATCH v2 4/5] bpf: Implement function bpf_perf_event_read() that get the selected hardware PMU conuter To: Kaixu Xia , davem@davemloft.net, acme@kernel.org, mingo@redhat.com, a.p.zijlstra@chello.nl, masami.hiramatsu.pt@hitachi.com, jolsa@kernel.org References: <1437552572-84748-1-git-send-email-xiakaixu@huawei.com> <1437552572-84748-5-git-send-email-xiakaixu@huawei.com> Cc: wangnan0@huawei.com, linux-kernel@vger.kernel.org, pi3orama@163.com, hekuang@huawei.com From: Alexei Starovoitov Message-ID: <55B04003.3000904@plumgrid.com> Date: Wed, 22 Jul 2015 18:14:43 -0700 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:38.0) Gecko/20100101 Thunderbird/38.0.1 MIME-Version: 1.0 In-Reply-To: <1437552572-84748-5-git-send-email-xiakaixu@huawei.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2017 Lines: 65 On 7/22/15 1:09 AM, Kaixu Xia wrote: > According to the perf_event_map_fd and key, the function > bpf_perf_event_read() can convert the corresponding map > value to the pointer to struct perf_event and return the > Hardware PMU counter value. > > The key can't be passed to bpf_perf_event_read() directly > because the function argument constraint is lacked. I don't understand above sentence. > diff --git a/include/uapi/linux/bpf.h b/include/uapi/linux/bpf.h > index 69a1f6b..e3bb181 100644 > --- a/include/uapi/linux/bpf.h > +++ b/include/uapi/linux/bpf.h > @@ -250,6 +250,8 @@ enum bpf_func_id { > * Return: 0 on success > */ > BPF_FUNC_get_current_comm, > + > + BPF_FUNC_perf_event_read, /* u64 bpf_perf_event_read(&map, &key) */ no need for extra empty line. > + > +static u64 bpf_perf_event_read(u64 r1, u64 r2, u64 r3, u64 r4, u64 r5) > +{ > + struct bpf_map *map = (struct bpf_map *) (unsigned long) r1; > + void *key = (void *) (unsigned long) r2; > + struct perf_event *event; > + void *ptr; > + > + if (map->map_type != BPF_MAP_TYPE_PERF_EVENT_ARRAY) > + return -EINVAL; please check this statically in verifier instead of in run-time. > + > + rcu_read_lock(); unnecessary. > + ptr = map->ops->map_lookup_elem(map, key); > + rcu_read_unlock(); > + if (!ptr || !(*(unsigned long *)ptr)) > + return -EBADF; all these casts can be removed. First cast of 'r1' into perf_event_array will be enough. > +const struct bpf_func_proto bpf_perf_event_read_proto = { > + .func = bpf_perf_event_read, > + .gpl_only = false, > + .ret_type = RET_INTEGER, > + .arg1_type = ARG_CONST_MAP_PTR, > + .arg2_type = ARG_PTR_TO_MAP_KEY, make it arg2_type = ARG_ANYTHING then you'll just index into array the way prog_array does and similar to bpf_tail_call. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/