Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp186012imu; Thu, 20 Dec 2018 19:48:26 -0800 (PST) X-Google-Smtp-Source: ALg8bN7I6RZd9HeX4IIkJDwNJ8FGnARwMeJUcR8eCQ1bBx50gfvcdsWXmaAmFps3parc2AuSinkc X-Received: by 2002:a17:902:848d:: with SMTP id c13mr882829plo.257.1545364106373; Thu, 20 Dec 2018 19:48:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1545364106; cv=none; d=google.com; s=arc-20160816; b=uA+EzKGVTrpS6gbjVehexJ7cd4e7WABt8rj3Pf7GmXM4GixBWdeqCCcpD1rg0V1oDP FhNo7sF3/63gsK2FdIUZstwDGMhmBFPCv1rxhmKiy/OAkzaEt1Qq6GGlwvSpWtAfWjJe KaLlHlwzBLlKYoo9dLBGqrGV1ggMGkbEoeWSD5MBwQdBSxynyd8nvsiCn1pvu/HjPsiA 7JASTcuTtGp7kACwgp7bOuqG0qf5Dl60eCieAiF7f0YEPW4TmFSnBMBdoTTGkURC0TZr pPk+CXIGEW/n4p5K85GgHT37BFMeqP3mStpn0fuFXl0W7YheFVLWIXWPInm1gIqSaa7W LieA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject :smtp-origin-cluster:cc:to:smtp-origin-hostname:from :smtp-origin-hostprefix:dkim-signature; bh=MTRykMM0ShTUFnbRjmPUHqKhnIAmL7hH1c6acLHMyIQ=; b=GEDRjW7qwyrph4UG3Pf8Yj/SDw1yIAO5lzgpZjDBQeKGRgn1F4UVYSVI6GiHWpiZfK 5Be646iDIUtpmRE4c23N0hWmbA0iUPG031rAnqptBnQqw2q/k0Ix1MhedlAZS7yvipr3 CFmFM+h9Vb/spzYE0JEC8XR32bGvvNaF3I3rRZWRywKlZVGo/lXAJrgXmlOqjvrIidff UkeX/axTjnLp5FpdtpymHQC1taSBxhBR9EL6Xc763T1LA5qMgC4s10VwqEhoq8Gq2GXn 2nMn3Hl/1XDMpfn+dK6+0HRbfHounbF+cngCMkp58dfNTfvb1Xw7Ivc860fpsQ5xiq66 r+vw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@fb.com header.s=facebook header.b=rdhOu0dB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=fb.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u4si12902549pga.91.2018.12.20.19.48.10; Thu, 20 Dec 2018 19:48:26 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@fb.com header.s=facebook header.b=rdhOu0dB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=fb.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389134AbeLTS31 (ORCPT + 99 others); Thu, 20 Dec 2018 13:29:27 -0500 Received: from mx0a-00082601.pphosted.com ([67.231.145.42]:49006 "EHLO mx0a-00082601.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389103AbeLTS3X (ORCPT ); Thu, 20 Dec 2018 13:29:23 -0500 Received: from pps.filterd (m0044012.ppops.net [127.0.0.1]) by mx0a-00082601.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id wBKIPITX001134 for ; Thu, 20 Dec 2018 10:29:22 -0800 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fb.com; h=from : to : cc : subject : date : message-id : mime-version : content-type; s=facebook; bh=MTRykMM0ShTUFnbRjmPUHqKhnIAmL7hH1c6acLHMyIQ=; b=rdhOu0dBcJMD//Ug9NEuIJ0Kcw6cj9iMXuNu/DLzZ09Ig4DleU5nxcRDzZV9ZSA0NREw IcGqPwaZrDT7iWewWPLjXXcQljF17dttTl64RE6RGRZwFqTHZBMQBJbDpNshUfJnqAOt x8L0q/Yeh6XmQkdw8vtGc2MTY2Q5fyPnwgk= Received: from maileast.thefacebook.com ([199.201.65.23]) by mx0a-00082601.pphosted.com with ESMTP id 2pgf8xg9cs-15 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT) for ; Thu, 20 Dec 2018 10:29:22 -0800 Received: from mx-out.facebook.com (2620:10d:c0a1:3::13) by mail.thefacebook.com (2620:10d:c021:18::176) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA) id 15.1.1531.3; Thu, 20 Dec 2018 10:29:12 -0800 Received: by devbig006.ftw2.facebook.com (Postfix, from userid 4523) id 0837562E139A; Thu, 20 Dec 2018 10:29:06 -0800 (PST) Smtp-Origin-Hostprefix: devbig From: Song Liu Smtp-Origin-Hostname: devbig006.ftw2.facebook.com To: , CC: Song Liu , , , , , Smtp-Origin-Cluster: ftw2c04 Subject: [PATCH v5 perf, bpf-next 0/7] reveal invisible bpf programs Date: Thu, 20 Dec 2018 10:28:57 -0800 Message-ID: <20181220182904.4193196-1-songliubraving@fb.com> X-Mailer: git-send-email 2.17.1 X-FB-Internal: Safe MIME-Version: 1.0 Content-Type: text/plain X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-12-20_09:,, signatures=0 X-Proofpoint-Spam-Reason: safe X-FB-Internal: Safe Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This set catches symbol for all bpf programs loaded/unloaded before/during/after perf-record run PERF_RECORD_KSYMBOL and PERF_RECORD_BPF_EVENT. PERF_RECORD_KSYMBOL and PERF_RECORD_BPF_EVENT includes key information of a bpf program load and unload. They are sent through perf ringbuffer, and stored in perf.data. PERF_RECORD_KSYMBOL includes basic information for simple profiling. It is ON by default. PERF_RECORD_BPF_EVENT is used to gather more information of the bpf program. It is necessary for perf-annotate of bpf programs. Before this patch, perf-report will not be able to recover symbols of bpf programs once the programs are unloaded. This is to follow up Alexei's early effort [2] to show bpf programs via mmap events. Thanks, Song Changes v3 -> PATCH v4: 1. Fixed build error reported by kbuild test bot. Changes v3 -> PATCH v4: 1. Split information about bpf program into PERF_RECORD_KSYMBOL (with name, addr, len); and PERF_RECORD_BPF_EVENT PERF_RECORD_BPF_EVENT (with id, tag); 2. Split the implementation in kernel and user space. Changes v2 -> PATCH v3: 1. Rebase on bpf-next tree, and on top of BPF sub program tag patches [1] for latest information in bpf_prog_info. 2. Complete handling and synthesizing PERF_RECORD_BPF_EVENT in perf. Changes v1 -> PATCH v2: 1. Only 3 of the 5 patches in v1, to focus on ABI first; 2. Generate PERF_RECORD_BPF_EVENT per bpf sub program instead of per prog; 3. Modify PERF_RECORD_BPF_EVENT with more details (addr, len, name), so that it can be used for basic profiling without calling sys_bpf. Changes RFC -> PATCH v1: 1. In perf-record, poll vip events in a separate thread; 2. Add tag to bpf prog name; 3. Small refactorings. [1] https://patchwork.ozlabs.org/project/netdev/list/?series=81037 [2] https://www.spinics.net/lists/netdev/msg524232.html Song Liu (7): perf, bpf: Introduce PERF_RECORD_KSYMBOL sync tools/include/uapi/linux/perf_event.h perf, bpf: introduce PERF_RECORD_BPF_EVENT sync tools/include/uapi/linux/perf_event.h perf util: handle PERF_RECORD_KSYMBOL perf util: handle PERF_RECORD_BPF_EVENT perf tools: synthesize PERF_RECORD_* for loaded BPF programs include/linux/filter.h | 7 + include/linux/perf_event.h | 18 +++ include/uapi/linux/perf_event.h | 50 +++++- kernel/bpf/core.c | 2 +- kernel/bpf/syscall.c | 2 + kernel/events/core.c | 218 ++++++++++++++++++++++++- tools/include/uapi/linux/perf_event.h | 50 +++++- tools/perf/builtin-record.c | 7 + tools/perf/perf.h | 1 + tools/perf/util/Build | 2 + tools/perf/util/bpf-event.c | 219 ++++++++++++++++++++++++++ tools/perf/util/bpf-event.h | 16 ++ tools/perf/util/event.c | 40 +++++ tools/perf/util/event.h | 34 ++++ tools/perf/util/evsel.c | 19 +++ tools/perf/util/evsel.h | 2 + tools/perf/util/machine.c | 60 +++++++ tools/perf/util/machine.h | 5 +- tools/perf/util/session.c | 8 + tools/perf/util/tool.h | 5 +- 20 files changed, 759 insertions(+), 6 deletions(-) create mode 100644 tools/perf/util/bpf-event.c create mode 100644 tools/perf/util/bpf-event.h -- 2.17.1