Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp1466659rwr; Fri, 5 May 2023 14:49:47 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ45LaT0hWH85QdnhPrW8r7TvokjzKdXpQJAtaRUQS4z28E8j2XrHJBEhDTq3oFHWdUoqJMo X-Received: by 2002:a05:6a20:6e22:b0:f1:b3c1:82f2 with SMTP id go34-20020a056a206e2200b000f1b3c182f2mr2682179pzb.38.1683323386896; Fri, 05 May 2023 14:49:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1683323386; cv=none; d=google.com; s=arc-20160816; b=EwjutfbeIMlzdOfXp8pS9vBaAnx4lm27ARYV5djgyLzInLAIZU5KZLBS4xFn9UEx1B ALnPfMMLth/Eruc5REnNs8akkmAzAWgutMcMnFYCG0D8OZZP76obwdNgKjsF1y7uioLd S1+1nO77SNichmspnQs/4TLmUVB1hAMlxxZCZU9rXUGm0/RalWExzQ3hDlYa1ErkPT2z Kfa0XP9BDOsWwXdxosoQKYqTmVJX2wb+nJ93X/Ajp2J/anjBhTHvm83saiZHJTv187G1 v72GLZnIzhN6LP4D8qu+tXqbQ83eomWjgMFIEWBslp9kLeUsHBJQzi3fZS6PxtjSbjz2 5gUw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=tamrOqAH8+csjkPJjBmoJCFBvCTggGf+7IRKDvg4O48=; b=YgrfUqsTjJF3WT4ybijsHnwR9MJjK2GLRPDrWfJ4+TljDMufLH1ITgVmeD+rtnVG+C ED3ggnLuVlGSnyRBmRCB2AlfCspVKJVsHdemHk0naMxNvGgPea8QkVuj9h7LIWbW4EAz JyWuDApYCZCvvottlHGGRcKc1+Zal6LJhlZk9PDxDQTCUiIZtiNeEjn6kvVCKD0DD2ZE MdnevCIPGfPTt+uPCDQjv6oM+8Oa4H5NeT5MxTSTY5KBsiA8dFnH+oIG2oLuco/p8YyR YTc/9XuY7U8oWI/XT0jVPMTOm1dLxdO4QPsUPKS8RsbfBYZ700cju7ff5UTHusn83QeD zDQw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=m5spICSY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id o10-20020a637e4a000000b0051b65f4d94asi2697959pgn.484.2023.05.05.14.49.32; Fri, 05 May 2023 14:49:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=m5spICSY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233541AbjEEVdd (ORCPT + 99 others); Fri, 5 May 2023 17:33:33 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35630 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230312AbjEEVdc (ORCPT ); Fri, 5 May 2023 17:33:32 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3C006F4; Fri, 5 May 2023 14:33:31 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 8FB84640D8; Fri, 5 May 2023 21:33:30 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 74DC4C433D2; Fri, 5 May 2023 21:33:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1683322409; bh=M4kahhFPmrKwLmC+dwLRPb9KCPDgd7YIFYm187tld3A=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=m5spICSYMMdXNA9wHyGc+FulwdcXkR8owOHc+m9ihjvpDcUM0ZP+xGyFkDCDTae+p qeg31jfxTIBoDPNErCo0O6lh81M5Y51fCeh8XMuY2YJA6g//xr1X+vI8RgTBe8Ffh3 rWT8e4hMgwgyA7aaxdroUzKRpBPz6meLsKarHStHqlWKQBYmcAgd8K4y8yWBCfRjcU SqJv9W7XEu4pYQVDMTr+y1+OdQieT2eViMMSzqic7JRJwsJwSfsCE8GzTU+qNpHpgI kaYlbYox6jL/K2mpdGlPkneCGW4w15X/lWnlSFqQs7RkAgdTWrwmeSOPzatqYDU0bB 7bNKd+k1o3SSw== Received: by quaco.ghostprotocols.net (Postfix, from userid 1000) id B359C403B5; Fri, 5 May 2023 18:33:26 -0300 (-03) Date: Fri, 5 May 2023 18:33:26 -0300 From: Arnaldo Carvalho de Melo To: Jiri Olsa Cc: Ian Rogers , Linus Torvalds , Andrii Nakryiko , Namhyung Kim , Song Liu , Andrii Nakryiko , Ingo Molnar , Thomas Gleixner , Clark Williams , Kate Carcia , linux-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org, Adrian Hunter , Changbin Du , Hao Luo , James Clark , Kan Liang , Roman Lozko , Stephane Eranian , Thomas Richter , Arnaldo Carvalho de Melo , bpf , Alexei Starovoitov , Yang Jihong , Mark Rutland , Paul Clarke Subject: Re: [PATCH RFC/RFT] perf bpf skels: Stop using vmlinux.h generated from BTF, use subset of used structs + CO-RE. was Re: BPF skels in perf .Re: [GIT PULL] perf tools changes for v6.4 Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Url: http://acmel.wordpress.com X-Spam-Status: No, score=-4.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Em Fri, May 05, 2023 at 10:43:36PM +0200, Jiri Olsa escreveu: > On Fri, May 05, 2023 at 10:04:47AM -0700, Ian Rogers wrote: > > On Fri, May 5, 2023 at 9:56 AM Arnaldo Carvalho de Melo wrote: > > > > > > Em Fri, May 05, 2023 at 10:33:15AM -0300, Arnaldo Carvalho de Melo escreveu: > > > > Em Fri, May 05, 2023 at 01:03:14AM +0200, Jiri Olsa escreveu: > > > > That with the preserve_access_index isn't needed, we need just the > > > > fields that we access in the tools, right? > > > > > > I'm now doing build test this in many distro containers, without the two > > > reverts, i.e. BPF skels continue as opt-out as in my pull request, to > > > test build and also for the functionality tests on the tools using such > > > bpf skels, see below, no touching of vmlinux nor BTF data during the > > > build. > > > > > > - Arnaldo > > > > > > From 882adaee50bc27f85374aeb2fbaa5b76bef60d05 Mon Sep 17 00:00:00 2001 > > > From: Arnaldo Carvalho de Melo > > > Date: Thu, 4 May 2023 19:03:51 -0300 > > > Subject: [PATCH 1/1] perf bpf skels: Stop using vmlinux.h generated from BTF, > > > use subset of used structs + CO-RE > > > > > > Linus reported a build break due to using a vmlinux without a BTF elf > > > section to generate the vmlinux.h header with bpftool for use in the BPF > > > tools in tools/perf/util/bpf_skel/*.bpf.c. > > > > > > Instead add a vmlinux.h file with the structs needed with the fields the > > > tools need, marking the structs with __attribute__((preserve_access_index)), > > > so that libbpf's CO-RE code can fixup the struct field offsets. > > > > > > In some cases the vmlinux.h file that was being generated by bpftool > > > from the kernel BTF information was not needed at all, just including > > > linux/bpf.h, sometimes linux/perf_event.h was enough as non-UAPI > > > types were not being used. > > > > > > To keep te patch small, include those UAPI headers from the trimmed down > > > vmlinux.h file, that then provides the tools with just the structs and > > > the subset of its fields needed for them. > > > > > > Testing it: > > > > > > # perf lock contention -b find / > /dev/null > > I tested perf lock con -abv -L rcu_state sleep 1 > and needed fix below > > jirka patch not applying trying to do it manually. - Arnaldo > > --- > From b12aea55f1171dc09cde2957f9019c84bda7adbb Mon Sep 17 00:00:00 2001 > From: Jiri Olsa > Date: Fri, 5 May 2023 13:28:46 +0200 > Subject: [PATCH] perf tools: Fix lock_contention bpf program > > We need to define empty 'struct rq' so the runqueues gets > resolved properly: > > # ./perf lock con -b > libbpf: extern (var ksym) 'runqueues': incompatible types, expected [99] fwd rq, but kernel has [19783] struct rq > libbpf: failed to load object 'lock_contention_bpf' > libbpf: failed to load BPF skeleton 'lock_contention_bpf': -22 > Failed to load lock-contention BPF skeleton > > Also rq__old/rq__new need additional '_' so the suffix is ignored > properly. > > Signed-off-by: Jiri Olsa > --- > tools/perf/util/bpf_skel/lock_contention.bpf.c | 10 ++++++---- > 1 file changed, 6 insertions(+), 4 deletions(-) > > diff --git a/tools/perf/util/bpf_skel/lock_contention.bpf.c b/tools/perf/util/bpf_skel/lock_contention.bpf.c > index 8911e2a077d8..c2bf24c68c14 100644 > --- a/tools/perf/util/bpf_skel/lock_contention.bpf.c > +++ b/tools/perf/util/bpf_skel/lock_contention.bpf.c > @@ -416,13 +416,15 @@ int contention_end(u64 *ctx) > return 0; > } > > +struct rq {}; > + > extern struct rq runqueues __ksym; > > -struct rq__old { > +struct rq___old { > raw_spinlock_t lock; > } __attribute__((preserve_access_index)); > > -struct rq__new { > +struct rq___new { > raw_spinlock_t __lock; > } __attribute__((preserve_access_index)); > > @@ -434,8 +436,8 @@ int BPF_PROG(collect_lock_syms) > > for (int i = 0; i < MAX_CPUS; i++) { > struct rq *rq = bpf_per_cpu_ptr(&runqueues, i); > - struct rq__new *rq_new = (void *)rq; > - struct rq__old *rq_old = (void *)rq; > + struct rq___new *rq_new = (void *)rq; > + struct rq___old *rq_old = (void *)rq; > > if (rq == NULL) > break; > -- > 2.40.1 > -- - Arnaldo