Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp52242rdg; Wed, 11 Oct 2023 20:51:54 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEdHyyH9BYDQhnxnWIIppjqqfVv9sjsq7WryBz6LeF9aryr/DCcfXl8hpIdwb7NNgZzPHjT X-Received: by 2002:a05:6a20:9389:b0:154:6480:83a4 with SMTP id x9-20020a056a20938900b00154648083a4mr22488577pzh.14.1697082713485; Wed, 11 Oct 2023 20:51:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697082713; cv=none; d=google.com; s=arc-20160816; b=GfRivoE+GwaMokwBcbRCLNckMj/FpylRknib7zAmH7jlCmSy10yhGKqURmJJxI8eXW Kk8OaeohUONTcAtia5NDSYU3nIgLLgOLvVAQgtjn/OW3ttru37AnSeIRQxBt14YENsBM pKu10apZu1J1nE2KU6Syw/E6WTd9uoIXN+IqW7HJ6HHLS6nPOzdxmchpVXOIx5SLq4AK RNPIoopo/XGQhmOzFTuuQfbqBx2dV+ubh/qgxfxF95SkrEQCte7Du13L8Wzls1Dlw84i c6OXWLjlIazjHaFrrPWTxcaUm52H3sFKsm2ywLzfy0gcfx38OzH2NXyeXyqGwVs/lZmO /oxw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:sender:dkim-signature; bh=9yjJiKDwPwcQVCXQasKWZeyEk3GKKIALC4+90Iua41s=; fh=MAa86mE4pR+qvc3vZBfQ8VA3JABZMsvYwXPMbxUQaEM=; b=nzLTJVVzwNry4GO+czJHGaLqZthqN1gHDL7e5HMOFNchwjAz8+WpS5IxssMxboMi8g +uX5fh/cfTWzO7pWImadGVHNqBy/muvtSCnSLiVvcg/tVorOr+qZFevercfS14Eagjit treo4gePRS3iC/UBOoiHMZ4p5cCkO9cvOXZKQREv3TjW6+5YO5Ndr8dHvVlnys62Wd83 w8qnNM1xSq/hN8j3a8zzrl+W74SJB7g8C/kmXQZGv8hp/4YJWGybqBmeW6QZwazVBqDM 6Othnl6DZi/kmR9h3brgONT+hVacgOgb+8rg30RwQRzdhS6GDBrCa4b3uHUkzb68t6Gx m38Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=KqvJx2le; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from groat.vger.email (groat.vger.email. [23.128.96.35]) by mx.google.com with ESMTPS id g10-20020a170902740a00b001c9c733c422si1147427pll.95.2023.10.11.20.51.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Oct 2023 20:51:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) client-ip=23.128.96.35; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=KqvJx2le; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id B52278028F9C; Wed, 11 Oct 2023 20:51:41 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1347040AbjJLDvT (ORCPT + 99 others); Wed, 11 Oct 2023 23:51:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43474 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234091AbjJLDvR (ORCPT ); Wed, 11 Oct 2023 23:51:17 -0400 Received: from mail-pf1-x42c.google.com (mail-pf1-x42c.google.com [IPv6:2607:f8b0:4864:20::42c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F2BC2A9; Wed, 11 Oct 2023 20:51:14 -0700 (PDT) Received: by mail-pf1-x42c.google.com with SMTP id d2e1a72fcca58-68bed2c786eso414259b3a.0; Wed, 11 Oct 2023 20:51:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1697082674; x=1697687474; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:sender:from:to:cc:subject:date:message-id:reply-to; bh=9yjJiKDwPwcQVCXQasKWZeyEk3GKKIALC4+90Iua41s=; b=KqvJx2leovUHJITNgo/i5Xp3JVI4Qy+GU7dFgqj/gXw+3hSxz7BkaB3vylF4gP7IOn R8a+rPwRAUKNhHVhvCMhPnFBeWmlq1ZbnQFqaUpwDxY4DLX9VP7ig11/Fi6Ay5kakNiW KGpOjjXk4SXQjbb9Inm/xw+UEGfj+4SsY3xJTBet2D3mJinHrEyI1uTK+ZP7zXz+o8wI b29jHprTaCHfPhEvsk71EqNao7Ld2GjJly+bWQ8uzOMW+Ro0CiEgwtWrrEqHpvW7jnoD GmUoWfh9sjqPhKyBEkEHtCkgkqHEuVkTQuuJAiCNYSssACfri3s8CbL/Qj1V/Bk+OA08 lgkQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1697082674; x=1697687474; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:sender:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=9yjJiKDwPwcQVCXQasKWZeyEk3GKKIALC4+90Iua41s=; b=pD9IkL+bnQ4Avb8jv7IjrQu+j9c/vbA0Et2X+YakE6186ZrUxmHLY5aanv/ec8S+kZ UmgVanevV/3qCQ2qGr+VGwA2op5OwUgOZWPV/VCuAk2R4dy2cy1nYuWEhvEhVOYy2jab mKQ1iE/mtECbxXTmvlyUwhDl3/+IM5OkJ9MF1mJi01qxvzhI0ZbE9E2Bj5OSnlUQ7zgE t0bDe2qhx/+IPS7eKOEmGb5twqUVPc4CENJdGR3TmmSWfE7BuuxI3c/Z/J+c5/I3YYqr mIypEskyH5ON8dlf2vLtlqgzVUGuD6w4wZL7vf0s6iSA1pWB05JDxalf3NLiR4idEm7V hSEQ== X-Gm-Message-State: AOJu0Yy/yx8pg59g7134BVjVi1qnHeDLbVyFQyOpKIrOcqIEt1PxxOAp eNuB0svN9TwZvcLeg732cDs= X-Received: by 2002:a05:6a20:8419:b0:161:2389:e34b with SMTP id c25-20020a056a20841900b001612389e34bmr27946788pzd.13.1697082674237; Wed, 11 Oct 2023 20:51:14 -0700 (PDT) Received: from bangji.hsd1.ca.comcast.net ([2601:647:6780:42e0:b1b9:d490:2f5e:be06]) by smtp.gmail.com with ESMTPSA id w8-20020a170902d70800b001bc18e579aesm711374ply.101.2023.10.11.20.51.12 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Oct 2023 20:51:13 -0700 (PDT) Sender: Namhyung Kim From: Namhyung Kim To: Arnaldo Carvalho de Melo , Jiri Olsa , Peter Zijlstra Cc: Ian Rogers , Adrian Hunter , Ingo Molnar , LKML , linux-perf-users@vger.kernel.org, Linus Torvalds , Stephane Eranian , Masami Hiramatsu , linux-toolchains@vger.kernel.org, linux-trace-devel@vger.kernel.org, Ben Woodard , Joe Mario , Kees Cook , David Blaikie , Xu Liu , Kan Liang , Ravi Bangoria Subject: [RFC 00/48] perf tools: Introduce data type profiling (v1) Date: Wed, 11 Oct 2023 20:50:23 -0700 Message-ID: <20231012035111.676789-1-namhyung@kernel.org> X-Mailer: git-send-email 2.42.0.655.g421f12c284-goog MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.0 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Wed, 11 Oct 2023 20:51:42 -0700 (PDT) Hello, I'm happy to share my work on data type profiling. This is to associate PMU samples to data types they refer using DWARF debug information. So basically it depends on quality of PMU events and compiler for producing DWARF info. But it doesn't require any changes in the target program. As it's an early stage, I've targeted the kernel on x86 to reduce the amount of work but IIUC there's no fundamental blocker to apply it to other architectures and applications. * How to use it To get precise memory access samples, users can use `perf mem record` command to utilize those events supported by their architecture. Intel machines would work best as they have dedicated memory access events but they would have a filter to ignore low latency loads like less than 30 cycles (use --ldlat option to change the default value). # To get memory access samples in kernel for 1 second (on Intel) $ sudo perf mem record -a -K --ldlat=4 -- sleep 1 # Similar for the AMD (but it requires 6.3+ kernel for BPF filters) $ sudo perf mem record -a --filter 'mem_op == load, ip > 0x8000000000000000' -- sleep 1 Note that it used 'sudo' command because it's collecting the event in system wide mode. Actually it would depend on the sysctl setting of kernel.perf_event_paranoid. AMD still needs root due to the BPF filter though. After getting a profile data, you would run perf report or perf annotate as usual to see the result. Make sure that you have a kernel debug package installed or vmlinux with DWARF info. I've added new options and sort keys to enable the data type profiling. Probably I need to add it to perf mem or perf c2c command for better user experience. I'm open to discussion how we can make it simpler and intuitive for regular users. But let's talk about the lower level interface for now. In perf report, it's just a matter of selecting new sort keys: 'type' and 'typeoff'. The 'type' shows name of the data type as a whole while 'typeoff' shows name of the field in the data type. I found it useful to use it with --hierarchy option to group relevant entries in the same level. $ sudo perf report -s type,typeoff --hierarchy --stdio ... # # Overhead Data Type / Data Type Offset # ........... ............................ # 23.95% (stack operation) 23.95% (stack operation) +0 (no field) 23.43% (unknown) 23.43% (unknown) +0 (no field) 10.30% struct pcpu_hot 4.80% struct pcpu_hot +0 (current_task) 3.53% struct pcpu_hot +8 (preempt_count) 1.88% struct pcpu_hot +12 (cpu_number) 0.07% struct pcpu_hot +24 (top_of_stack) 0.01% struct pcpu_hot +40 (softirq_pending) 4.25% struct task_struct 1.48% struct task_struct +2036 (rcu_read_lock_nesting) 0.53% struct task_struct +2040 (rcu_read_unlock_special.b.blocked) 0.49% struct task_struct +2936 (cred) 0.35% struct task_struct +3144 (audit_context) 0.19% struct task_struct +46 (flags) 0.17% struct task_struct +972 (policy) 0.15% struct task_struct +32 (stack) 0.15% struct task_struct +8 (thread_info.syscall_work) 0.10% struct task_struct +976 (nr_cpus_allowed) 0.09% struct task_struct +2272 (mm) ... The (stack operation) and (unknown) have no type and field info. FYI, the stack operations are samples in PUSH, POP or RET instructions which save or restore registers from/to the stack. They are usually parts of function prologue and epilogue and have no type info. The next is the struct pcpu_hot and you can see the first field (current_task) at offset 0 was accessed mostly. It's listed in order of access frequency (not in offset) as you can see it in the task_struct. In perf annotate, new --data-type option was added to enable data field level annotation. Now it only shows number of samples for each field but we can improve it. $ sudo perf annotate --data-type Annotate type: 'struct pcpu_hot' in [kernel.kallsyms] (223 samples): ============================================================================ samples offset size field 223 0 64 struct pcpu_hot { 223 0 64 union { 223 0 48 struct { 78 0 8 struct task_struct* current_task; 98 8 4 int preempt_count; 45 12 4 int cpu_number; 0 16 8 u64 call_depth; 1 24 8 long unsigned int top_of_stack; 0 32 8 void* hardirq_stack_ptr; 1 40 2 u16 softirq_pending; 0 42 1 bool hardirq_stack_inuse; }; 223 0 64 u8* pad; }; }; ... This shows each struct one by one and field-level access info in C-like style. The number of samples for the outer struct is a sum of number of samples in every field in the struct. In unions, each field is placed in the same offset so they will have the same number of samples. No TUI support yet. * How it works The basic idea is to use DWARF location expression in debug entries for variables. Say we got a sample in the instruction below: 0x123456: mov 0x18(%rdi), %rcx Then we know the instruction at 0x123456 is accessing to a memory region where %rdi register has a base address and offset 0x18 from the base. DWARF would have a debug info entry for a function or a block which covers that address. For example, we might have something like this: <1><100>: Abbrev Number: 10 (DW_TAG_subroutine_type) <101> DW_AT_name : (indirect string, offset: 0x184e6): foo <105> DW_AT_type : <0x29ad7> <106> DW_AT_low_pc : 0x123400 <10e> DW_AT_high_pc : 0x1234ff <2><116>: Abbrev Number: 8 (DW_TAG_formal_parameter) <117> DW_AT_name : (indirect string, offset: 0x18527): bar <11b> DW_AT_type : <0x29b3a> <11c> DW_AT_location : 1 byte block: 55 (DW_OP_reg2 (rdi)) So the function 'foo' covers the instruction from 0x123400 to 0x1234ff and we know the sample instruction belongs to the function. And it has a parameter called 'bar' and it's located at the %rdi register. Then we know the instruction is using the variable bar and its type would be a pointer (to a struct). We can follow the type info of bar and verify its access by checking the size of the (struct) type and offset in the instruction (0x18). Well.. this is a simple example that the 'bar' has a single location. Other variables might be located in various places over time but it should be covered by the location list of the debug entry. Therefore, as long as DWARF produces a correct location expression for a variable, it should be able to find the variable using the location info. Global variables and local variables are different as they can be accessed directly without a pointer. They are located in an absolute address or relative position from the current stack frame. So it needs to handle such location expressions as well. However, some memory accesses don't have a variable in some cases. For example, you have a pointer variable for a struct which contains another pointers. And then you can directly dereference it without using a variable. Consider the following source code. int foo(struct baz *bar) { ... if (bar->p->q == 0) return 1; ... } This can generate instructions like below. ... 0x123456: mov 0x18(%rdi), %rcx 0x12345a: mov 0x10(%rcx), %rax <=== sample 0x12345e: test %rax, %rax 0x123461: je <...> ... And imagine we have a sample at 0x12345a. Then it cannot find a variable for %rcx since DWARF didn't generate one (it only knows about 'bar'). Without compiler support, all it can do is to track the code execution in each instruction and propagate the type info in each register and stack location by following the memory access. Actually I found a discussion in the DWARF mailing list to support "inverted location lists" and it seems a perfect fit for this project. It'd be great if new DWARF would provide a way to lookup variable and type info using a concrete location info (like a register number). https://lists.dwarfstd.org/pipermail/dwarf-discuss/2023-June/002278.html * Patch structure The patch 1-5 are cleanups and a fix that can be applied separately. The patch 6-21 are the main changes in perf report and perf annotate to support simple cases with a pointer variable. The patch 22-33 are to improve it by handling global and local variables (without a pointer) and some edge cases. The patch 34-43 implemented instruction tracking to infer data type when there's no variable for that. The patch 44-47 handles kernel-specific per-cpu variables (only for current CPU). The patch 48 is to help debugging and is not intended for merge. * Limitations and future work As I said earlier, this work is in a very early shape and has many limitations or rooms for improvement. Basically it uses objdump tool to extract location information from the sample instruction. And the parsing code and instruction tracking work on x86 only. Actually there's a performance issue about getting disassembly from the objdump for kernel. On my system, GNU objdump was really slower than the one from LLVM for some reason so I had to pass the following option for each perf report and perf annotate. $ sudo perf report --objdump=llvm-objdump ... # To save it in the config file and drop the command line option $ sudo perf config annotate.objdump=llvm-objdump Even with this change, still the most processing time was spent on the objdump to get the disassembly. It'd be nice if we can get the result without using objdump at all. Also I only tested it with C programs (mostly vmlinux) and I believe there are many issues on handling C++ applications. Probably other languages (like Rust?) could be supported too. But even for C programs, it could improve things like better supporting union and array types and dealing with type casts and so on. I think compiler could generate more DWARF information to help this kind of analysis. Like I mentioned, it doesn't have a variable for intermediate pointers when they are chained: a->b->c. This chain could be longer and hard to track the type from the previous variable. If compiler could generate (artificial) debug entries for the intermediate pointers with a precise location expression and type info, it would be really helpful. And I plan to improve the analysis in perf tools with better integration to the existing command like perf mem and/or perf c2c. It'd be pretty interesting to see per-struct or per-field access patterns both for load and store event at the same time. Also using data-source or snoop info for each struct/field would give some insights on optimizing memory usage or layout. There are kernel specific issues too. Some per-cpu variable accesses created complex instruction patterns so it was hard to determine which data/type it accessed. For now, it just parsed simple patterns for this-cpu access using %gs segment register. Also it should handle self-modifying codes like kprobe, ftrace, live patch and so on. I guess they would usually create an out-of-line copy of modified instructions but needs more checking. And I have no idea about the status of struct layout randomization and the DWARF info of the resulting struct. Maybe there are more issues I'm not aware of, please let me know if you notice something. * Summary Despite all the issues, I believe this would be a good addition to our performance toolset. It would help to observe memory overheads in a different angle and to optimize the memory usage. I'm really looking forward to hearing any feedback. The code is available at 'perf/data-profile-v1' branch in git://git.kernel.org/pub/scm/linux/kernel/git/namhyung/linux-perf.git Enjoy, Namhyung Cc: Ben Woodard Cc: Joe Mario CC: Kees Cook Cc: David Blaikie Cc: Xu Liu Cc: Kan Liang Cc: Ravi Bangoria Namhyung Kim (48): perf annotate: Move raw_comment and raw_func_start perf annotate: Check if operand has multiple regs perf tools: Add util/debuginfo.[ch] files perf dwarf-aux: Fix die_get_typename() for void * perf dwarf-aux: Move #ifdef code to the header file perf dwarf-aux: Add die_get_scopes() helper perf dwarf-aux: Add die_find_variable_by_reg() helper perf dwarf-aux: Factor out __die_get_typename() perf dwarf-regs: Add get_dwarf_regnum() perf annotate-data: Add find_data_type() perf annotate-data: Add dso->data_types tree perf annotate: Factor out evsel__get_arch() perf annotate: Add annotate_get_insn_location() perf annotate: Implement hist_entry__get_data_type() perf report: Add 'type' sort key perf report: Support data type profiling perf annotate-data: Add member field in the data type perf annotate-data: Update sample histogram for type perf report: Add 'typeoff' sort key perf report: Add 'symoff' sort key perf annotate: Add --data-type option perf annotate: Add --type-stat option for debugging perf annotate: Add --insn-stat option for debugging perf annotate-data: Parse 'lock' prefix from llvm-objdump perf annotate-data: Handle macro fusion on x86 perf annotate-data: Handle array style accesses perf annotate-data: Add stack operation pseudo type perf dwarf-aux: Add die_find_variable_by_addr() perf annotate-data: Handle PC-relative addressing perf annotate-data: Support global variables perf dwarf-aux: Add die_get_cfa() perf annotate-data: Support stack variables perf dwarf-aux: Check allowed DWARF Ops perf dwarf-aux: Add die_collect_vars() perf dwarf-aux: Handle type transfer for memory access perf annotate-data: Introduce struct data_loc_info perf map: Add map__objdump_2rip() perf annotate: Add annotate_get_basic_blocks() perf annotate-data: Maintain variable type info perf annotate-data: Add update_insn_state() perf annotate-data: Handle global variable access perf annotate-data: Handle call instructions perf annotate-data: Implement instruction tracking perf annotate: Parse x86 segment register location perf annotate-data: Handle this-cpu variables in kernel perf annotate-data: Track instructions with a this-cpu variable perf annotate-data: Add stack canary type perf annotate-data: Add debug message tools/perf/Documentation/perf-report.txt | 3 + .../arch/loongarch/annotate/instructions.c | 6 +- tools/perf/arch/x86/util/dwarf-regs.c | 38 + tools/perf/builtin-annotate.c | 149 +- tools/perf/builtin-report.c | 19 +- tools/perf/util/Build | 2 + tools/perf/util/annotate-data.c | 1246 +++++++++++++++++ tools/perf/util/annotate-data.h | 222 +++ tools/perf/util/annotate.c | 763 +++++++++- tools/perf/util/annotate.h | 104 +- tools/perf/util/debuginfo.c | 205 +++ tools/perf/util/debuginfo.h | 64 + tools/perf/util/dso.c | 4 + tools/perf/util/dso.h | 2 + tools/perf/util/dwarf-aux.c | 561 +++++++- tools/perf/util/dwarf-aux.h | 86 +- tools/perf/util/dwarf-regs.c | 33 + tools/perf/util/hist.h | 3 + tools/perf/util/include/dwarf-regs.h | 11 + tools/perf/util/map.c | 20 + tools/perf/util/map.h | 3 + tools/perf/util/probe-finder.c | 193 +-- tools/perf/util/probe-finder.h | 19 +- tools/perf/util/sort.c | 195 ++- tools/perf/util/sort.h | 7 + tools/perf/util/symbol_conf.h | 4 +- 26 files changed, 3703 insertions(+), 259 deletions(-) create mode 100644 tools/perf/util/annotate-data.c create mode 100644 tools/perf/util/annotate-data.h create mode 100644 tools/perf/util/debuginfo.c create mode 100644 tools/perf/util/debuginfo.h base-commit: 87cd3d48191e533cd9c224f2da1d78b3513daf47 -- 2.42.0.655.g421f12c284-goog