Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp7748375rwr; Wed, 10 May 2023 12:03:49 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ7K0/rt/PkA1qF+nJv3n4yusLtse/FYh4f/bxDZbGdvBV81nLxLwp1eVL9LjPujNmeBYgiL X-Received: by 2002:a17:90b:19d4:b0:24e:46f8:492a with SMTP id nm20-20020a17090b19d400b0024e46f8492amr17871301pjb.46.1683745428790; Wed, 10 May 2023 12:03:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1683745428; cv=none; d=google.com; s=arc-20160816; b=WcTIPPoL+Nopkv+cC3XXi2XOFBrFzgUV20NgSCkWIWmiOBf4xicFOYGQdVMrZPmgdb banZIuhYZ985DI/dcHo6COAGqTbNfYNjyeO+m5ttiMkS0opmcVnEnglxntxEMFsWIFFP Lln+BdR/bSz0E92b/RA3MJm3nsWlEMKQAJY+ENHr+FrPOc7Xl/B6ys+upgZLLQ51/agx kdAoYZNew2WnTtCYcnYwQblohMZaY/p/exvUqYL3MqmCR41GngP6NG61Dx8eOrHxMTyo kFLi6ZY15Gfcp+3BJq3p3MICGA+Ighv2HgxWd7K0mnomRgPtrLstXWCyxWTH20cpyTED Witg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=xw/PyePB7ERpNoe6xyhBD+52GwzI3ENbxWvV/xVfbGY=; b=vcLIEA5Hf+Tmk8AUL9x5IHLjD1am4XAYt8WaD2MLS0A1R/reL41B23V6mEWlGuvSCT PgUrlUZTbhbMBTZllqRQSB7f2U4V4sEufxrbhYHKWN78kq7R3e9Yp+d3z7ZqxvSuOGut FiP648tksId+V6yH7D7GoYtSTiQ1BN5Fo9t0NQjwxbJhL9EYL29z2j/2cNhPv06Rws11 cSo7svLcPTJqgPxINioMMNdOrBIRYKd9sQXyJOzh05yydk2jGalF7LdfDWtwl6rULTni Hc9Geg8UeuRqA63bpoh0Pc41Xod1mzmbFwe7xBANEc31NECi9+N7yHm65EkPypNc9uez NByw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ks6OQHE3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id lw1-20020a17090b180100b0024b60d77608si30685774pjb.30.2023.05.10.12.03.33; Wed, 10 May 2023 12:03:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ks6OQHE3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235987AbjEJS44 (ORCPT + 99 others); Wed, 10 May 2023 14:56:56 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46676 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229482AbjEJS4y (ORCPT ); Wed, 10 May 2023 14:56:54 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A5E2410D3; Wed, 10 May 2023 11:56:51 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 33EDE63FC4; Wed, 10 May 2023 18:56:51 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 36A18C433EF; Wed, 10 May 2023 18:56:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1683745010; bh=hnjNpJ/WI6twjro0xk2Nr8Le9Sc2ewfqjnIfqLVYWXA=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=ks6OQHE3+6zg0Buwwl+2k0aQIIxjKrtCGH4lX+coXTjtimmMBzqrljL1CJAw7IgPz 4Z0b765QPWea8zWV8ETgqugT94lYzmT10zVDrH6SDOzsR/8dyibSgvwHSfNc8mC6w3 jUs78Hm/crFMKmUJ9B7wvJhdD621dSUYW/+zwlNO62sGAINp8Cutt5dHcSFVd9ukTh u2b7XX5pYsVemAfN5eLS2khUUeakfD4ajmrb1x/3ObSQKviBkkkM7mK/l+3olZAd15 sRUKEF2x/KQzZOoMq2WVL//g8cattukNRY582GDQcXHOzfUKIaM95L+xNfXKZCrB8R 4zpdawR8SzLyw== Received: by quaco.ghostprotocols.net (Postfix, from userid 1000) id 558B7403B5; Wed, 10 May 2023 15:56:47 -0300 (-03) Date: Wed, 10 May 2023 15:56:47 -0300 From: Arnaldo Carvalho de Melo To: Namhyung Kim Cc: Ian Rogers , Jiri Olsa , Linus Torvalds , Andrii Nakryiko , Song Liu , Andrii Nakryiko , Ingo Molnar , Thomas Gleixner , Clark Williams , Kate Carcia , linux-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org, Adrian Hunter , Changbin Du , Hao Luo , James Clark , Kan Liang , Roman Lozko , Stephane Eranian , Thomas Richter , Arnaldo Carvalho de Melo , bpf , Alexei Starovoitov , Yang Jihong , Mark Rutland , Paul Clarke Subject: Re: [PATCH RFC/RFT] perf bpf skels: Stop using vmlinux.h generated from BTF, use subset of used structs + CO-RE. was Re: BPF skels in perf .Re: [GIT PULL] perf tools changes for v6.4 Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Url: http://acmel.wordpress.com X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Em Fri, May 05, 2023 at 01:48:52PM -0700, Namhyung Kim escreveu: > On Fri, May 5, 2023 at 1:46 PM Ian Rogers wrote: > > > > On Fri, May 5, 2023 at 1:43 PM Jiri Olsa wrote: > > > > > > On Fri, May 05, 2023 at 10:04:47AM -0700, Ian Rogers wrote: > > > > On Fri, May 5, 2023 at 9:56 AM Arnaldo Carvalho de Melo wrote: > > > > > > > > > > Em Fri, May 05, 2023 at 10:33:15AM -0300, Arnaldo Carvalho de Melo escreveu: > > > > > > Em Fri, May 05, 2023 at 01:03:14AM +0200, Jiri Olsa escreveu: > > > > > > That with the preserve_access_index isn't needed, we need just the > > > > > > fields that we access in the tools, right? > > > > > > > > > > I'm now doing build test this in many distro containers, without the two > > > > > reverts, i.e. BPF skels continue as opt-out as in my pull request, to > > > > > test build and also for the functionality tests on the tools using such > > > > > bpf skels, see below, no touching of vmlinux nor BTF data during the > > > > > build. > > > > > > > > > > - Arnaldo > > > > > > > > > > From 882adaee50bc27f85374aeb2fbaa5b76bef60d05 Mon Sep 17 00:00:00 2001 > > > > > From: Arnaldo Carvalho de Melo > > > > > Date: Thu, 4 May 2023 19:03:51 -0300 > > > > > Subject: [PATCH 1/1] perf bpf skels: Stop using vmlinux.h generated from BTF, > > > > > use subset of used structs + CO-RE > > > > > > > > > > Linus reported a build break due to using a vmlinux without a BTF elf > > > > > section to generate the vmlinux.h header with bpftool for use in the BPF > > > > > tools in tools/perf/util/bpf_skel/*.bpf.c. > > > > > > > > > > Instead add a vmlinux.h file with the structs needed with the fields the > > > > > tools need, marking the structs with __attribute__((preserve_access_index)), > > > > > so that libbpf's CO-RE code can fixup the struct field offsets. > > > > > > > > > > In some cases the vmlinux.h file that was being generated by bpftool > > > > > from the kernel BTF information was not needed at all, just including > > > > > linux/bpf.h, sometimes linux/perf_event.h was enough as non-UAPI > > > > > types were not being used. > > > > > > > > > > To keep te patch small, include those UAPI headers from the trimmed down > > > > > vmlinux.h file, that then provides the tools with just the structs and > > > > > the subset of its fields needed for them. > > > > > > > > > > Testing it: > > > > > > > > > > # perf lock contention -b find / > /dev/null > > > > > > I tested perf lock con -abv -L rcu_state sleep 1 > > > and needed fix below > > > > > > jirka > > > > I thought this was fixed by: > > https://lore.kernel.org/lkml/20230427234833.1576130-1-namhyung@kernel.org/ Those are upstream already: ⬢[acme@toolbox perf-tools]$ git log --oneline torvalds/master | grep -m1 -B1 "perf lock contention: Fix struct rq lock access" b9f82b5c63bf5390 perf lock contention: Rework offset calculation with BPF CO-RE e53de7b65a3ca59a perf lock contention: Fix struct rq lock access ⬢[acme@toolbox perf-tools]$ > > but I think that is just in perf-tools-next. > Right, but we might still need the empty rq definition. Yeah, without the empty struct diff libbpf complains about a mismatch of just a forward declaration as the type for 'runqueues' on the lock_contention.bpf.c file while the kernel has a the type as 'struct rq': [root@quaco ~]# perf lock con -ab sleep 1 libbpf: extern (var ksym) 'runqueues': incompatible types, expected [95] fwd rq, but kernel has [55509] struct rq libbpf: failed to load object 'lock_contention_bpf' libbpf: failed to load BPF skeleton 'lock_contention_bpf': -22 Failed to load lock-contention BPF skeleton lock contention BPF setup failed [root@quaco ~]# Adding: struct rq {}; libbpf is happy: [root@quaco ~]# perf lock con -ab sleep 1 contended total wait max wait avg wait type caller 2 50.64 us 25.38 us 25.32 us spinlock tick_do_update_jiffies64+0x25 1 26.18 us 26.18 us 26.18 us spinlock tick_do_update_jiffies64+0x25 [root@quaco ~]# - Arnaldo