Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp1890844ybl; Wed, 28 Aug 2019 23:58:24 -0700 (PDT) X-Google-Smtp-Source: APXvYqwBR9V9qgRomG/KmlPuDHClJ81A/1Vi7+s94g8dFkgFC8FJMHRfF7hgtRFA2dDSRPSjNNEy X-Received: by 2002:aa7:957a:: with SMTP id x26mr6294649pfq.16.1567061903897; Wed, 28 Aug 2019 23:58:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567061903; cv=none; d=google.com; s=arc-20160816; b=GDO8Gm4dQgI/yRzA8ity73CK7yxgg0d2oESTSwumuRR6289Hay0mobfA8AxxKijA/w dUAG0D3TW7RjwY3NyftmH+OPX9EGWQpGjbaCQTTx5dpKxgK5gG1HXsAEd5Clr7NAOCvk ONF07ruWtwwf2er97liCtWjWh/fG37pwQXw9R2vhZZhS3t57ToHcUNAQ9tHGOiIETRjM anLMoUwRWZQYhO+qZgFRBM9W1Hrl2eEca3121XsoJWqNk2A/Br28GQx/XTPwXFMCG/Du zUtsGwLJ+9abQcsafP97mh49oMlFhuB3TUNibUaPcNMKBrdNWEbGHd31oZbBlVKHH9In eolw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:references :in-reply-to:message-id:date:subject:cc:to:from; bh=0Ve1EXqUdEv1+X6EuladiETC7T3HRgV5mCa9sqw8wpo=; b=0uOm7HGb7newiJLLAgCVFNX5ht27nl903al1K4g97MYZtDSYotk50BLxed5xmvILJB FxM8YRXNWGPCgSLteAs1CvFmzjDPiGcjOYOUvtVrZy5nF5COTOSTCpuhjZUxFmjd5cnR pMnAHvToNMLfplS/q2ZIzcYmnKfHSpd8+SsI68iQrElvPz/73yHENHGJMy69cgbn7mw0 INtA+FMO757xirtPHYBeYgNbbHX2eecuBV+EbUh0s/wjZijiVI8DyZm01FEU1mCr93sY W0wdZ8HiluprD+6gL0+n6kekGxHXvzc2mzazXu7YvDmV5pltBRPZnWNOG02a/Um5iM+o OSZw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q7si1613402pfq.147.2019.08.28.23.58.07; Wed, 28 Aug 2019 23:58:23 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727718AbfH2G5O (ORCPT + 99 others); Thu, 29 Aug 2019 02:57:14 -0400 Received: from smtp2200-217.mail.aliyun.com ([121.197.200.217]:37440 "EHLO smtp2200-217.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725782AbfH2G5N (ORCPT ); Thu, 29 Aug 2019 02:57:13 -0400 X-Alimail-AntiSpam: AC=CONTINUE;BC=0.07436282|-1;CH=green;DM=CONTINUE|CONTINUE|true|0.50963-0.027241-0.463129;FP=0|0|0|0|0|-1|-1|-1;HT=e01a16378;MF=han_mao@c-sky.com;NM=1;PH=DS;RN=9;RT=9;SR=0;TI=SMTPD_---.FKp9f.G_1567061829; Received: from localhost(mailfrom:han_mao@c-sky.com fp:SMTPD_---.FKp9f.G_1567061829) by smtp.aliyun-inc.com(10.147.44.145); Thu, 29 Aug 2019 14:57:09 +0800 From: Mao Han To: linux-riscv@lists.infradead.org Cc: linux-kernel@vger.kernel.org, linux-csky@vger.kernel.org, Mao Han , Paul Walmsley , Greentime Hu , Palmer Dabbelt , Christoph Hellwig , Guo Ren Subject: [PATCH V6 1/3] riscv: Add perf callchain support Date: Thu, 29 Aug 2019 14:57:00 +0800 Message-Id: <86d18d80affc39cf9579a24f1beb7c8631cfa9bd.1567060834.git.han_mao@c-sky.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: References: In-Reply-To: References: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch add support for perf callchain sampling on riscv platform. The return address of leaf function is retrieved from pt_regs as it is not saved in the outmost frame. Signed-off-by: Mao Han Cc: Paul Walmsley Cc: Greentime Hu Cc: Palmer Dabbelt Cc: linux-riscv Cc: Christoph Hellwig Cc: Guo Ren --- arch/riscv/Makefile | 3 ++ arch/riscv/kernel/Makefile | 3 +- arch/riscv/kernel/perf_callchain.c | 95 ++++++++++++++++++++++++++++++++++++++ arch/riscv/kernel/stacktrace.c | 2 +- 4 files changed, 101 insertions(+), 2 deletions(-) create mode 100644 arch/riscv/kernel/perf_callchain.c diff --git a/arch/riscv/Makefile b/arch/riscv/Makefile index 7a117be..946565b 100644 --- a/arch/riscv/Makefile +++ b/arch/riscv/Makefile @@ -54,6 +54,9 @@ endif ifeq ($(CONFIG_MODULE_SECTIONS),y) KBUILD_LDFLAGS_MODULE += -T $(srctree)/arch/riscv/kernel/module.lds endif +ifeq ($(CONFIG_PERF_EVENTS),y) + KBUILD_CFLAGS += -fno-omit-frame-pointer +endif KBUILD_CFLAGS_MODULE += $(call cc-option,-mno-relax) diff --git a/arch/riscv/kernel/Makefile b/arch/riscv/kernel/Makefile index 2420d37..b1bea89 100644 --- a/arch/riscv/kernel/Makefile +++ b/arch/riscv/kernel/Makefile @@ -38,6 +38,7 @@ obj-$(CONFIG_MODULE_SECTIONS) += module-sections.o obj-$(CONFIG_FUNCTION_TRACER) += mcount.o ftrace.o obj-$(CONFIG_DYNAMIC_FTRACE) += mcount-dyn.o -obj-$(CONFIG_PERF_EVENTS) += perf_event.o +obj-$(CONFIG_PERF_EVENTS) += perf_event.o +obj-$(CONFIG_PERF_EVENTS) += perf_callchain.o clean: diff --git a/arch/riscv/kernel/perf_callchain.c b/arch/riscv/kernel/perf_callchain.c new file mode 100644 index 0000000..72168e1 --- /dev/null +++ b/arch/riscv/kernel/perf_callchain.c @@ -0,0 +1,95 @@ +// SPDX-License-Identifier: GPL-2.0 +/* Copyright (C) 2019 Hangzhou C-SKY Microsystems co.,ltd. */ + +#include +#include + +/* Kernel callchain */ +struct stackframe { + unsigned long fp; + unsigned long ra; +}; + +/* + * Get the return address for a single stackframe and return a pointer to the + * next frame tail. + */ +static unsigned long user_backtrace(struct perf_callchain_entry_ctx *entry, + unsigned long fp, unsigned long reg_ra) +{ + struct stackframe buftail; + unsigned long ra = 0; + unsigned long *user_frame_tail = + (unsigned long *)(fp - sizeof(struct stackframe)); + + /* Check accessibility of one struct frame_tail beyond */ + if (!access_ok(user_frame_tail, sizeof(buftail))) + return 0; + if (__copy_from_user_inatomic(&buftail, user_frame_tail, + sizeof(buftail))) + return 0; + + if (reg_ra != 0) + ra = reg_ra; + else + ra = buftail.ra; + + fp = buftail.fp; + if (ra != 0) + perf_callchain_store(entry, ra); + else + return 0; + + return fp; +} + +/* + * This will be called when the target is in user mode + * This function will only be called when we use + * "PERF_SAMPLE_CALLCHAIN" in + * kernel/events/core.c:perf_prepare_sample() + * + * How to trigger perf_callchain_[user/kernel] : + * $ perf record -e cpu-clock --call-graph fp ./program + * $ perf report --call-graph + * + * On RISC-V platform, the program being sampled and the C library + * need to be compiled with -fno-omit-frame-pointer, otherwise + * the user stack will not contain function frame. + */ +void perf_callchain_user(struct perf_callchain_entry_ctx *entry, + struct pt_regs *regs) +{ + unsigned long fp = 0; + + /* RISC-V does not support perf in guest mode. */ + if (perf_guest_cbs && perf_guest_cbs->is_in_guest()) + return; + + fp = regs->s0; + perf_callchain_store(entry, regs->sepc); + + fp = user_backtrace(entry, fp, regs->ra); + while (fp && !(fp & 0x3) && entry->nr < entry->max_stack) + fp = user_backtrace(entry, fp, 0); +} + +bool fill_callchain(unsigned long pc, void *entry) +{ + return perf_callchain_store(entry, pc); +} + +void notrace walk_stackframe(struct task_struct *task, + struct pt_regs *regs, bool (*fn)(unsigned long, void *), void *arg); +void perf_callchain_kernel(struct perf_callchain_entry_ctx *entry, + struct pt_regs *regs) +{ + + /* RISC-V does not support perf in guest mode. */ + if (perf_guest_cbs && perf_guest_cbs->is_in_guest()) { + pr_warn("RISC-V does not support perf in guest mode!"); + return; + } + + walk_stackframe(NULL, regs, fill_callchain, entry); +} diff --git a/arch/riscv/kernel/stacktrace.c b/arch/riscv/kernel/stacktrace.c index f156427..9b376c1 100644 --- a/arch/riscv/kernel/stacktrace.c +++ b/arch/riscv/kernel/stacktrace.c @@ -19,7 +19,7 @@ struct stackframe { unsigned long ra; }; -static void notrace walk_stackframe(struct task_struct *task, +void notrace walk_stackframe(struct task_struct *task, struct pt_regs *regs, bool (*fn)(unsigned long, void *), void *arg) { unsigned long fp, sp, pc; -- 2.7.4