[RFC PATCH 00/22] perf tools: introduce 'perf bpf' command to load eBPF programs.
From: Wang Nan
Date: Thu Apr 30 2015 - 07:03:02 EST
This series of patches is an approach to integrate eBPF with perf.
After applying these patches, users are allowed to use following
command to load eBPF program compiled by LLVM into kernel:
$ perf bpf sample_bpf.o
The required BPF code and the loading procedure is similar to Alexei
Starovoitov's libbpf in sample/bpf, with following exceptions:
1. The section name are not required leading with 'kprobe/' or
'kretprobe/'. Without such leading, any valid C var name can be use.
2. A 'config' section can be provided to describe the position and
arguments of a program. Syntax is identical to 'perf probe'.
An example is pasted at the bottom of this cover letter. In that
example, mybpfprog is configured by string in config section, and will
be probed at __alloc_pages_nodemask. sample_bpf.o is generated using:
$ $CLANG -I/usr/src/kernel/include -I/usr/src/kernel/usr/include -D__KERNEL__ \
-Wno-unused-value -Wno-pointer-sign \
-O2 -emit-llvm -c sample_bpf.c -o -| $LLC -march=bpf -filetype=obj -o \
sample_bpf.o
And can be loaded using:
$ perf bpf sample_bpf.o
This series is only a limited functional. Following works are on the
todo list:
1. Unprobe kprobe stubs used by eBPF programs when unloading;
2. Enable eBPF programs to access local variables and arguments
by utilizing debuginfo;
3. Output data in perf way.
In this series:
Patch 1/22 is a bugfix in perf probe, and may be triggered by following
patches;
Patch 2-3/22 are preparation, add required macros and syscall
definition into perf source tree.
Patch 4/22 add 'perf bpf' command.
Patch 5-20/22 are labor works, which parse the ELF object file, collect
information in object files, create maps needed by programs, link map
and programs, config programs and load programs into kernel.
Patch 21-22/22 are the final work. Patch 21 creates kprobe points which
will be used by eBPF programs, patch 22 creates perf file descriptors
then attach eBPF programs on them.
-------- EXAMPL --------
----- sample_bpf.c -----
#include <uapi/linux/bpf.h>
#include <linux/version.h>
#include <uapi/linux/ptrace.h>
#define SEC(NAME) __attribute__((section(NAME), used))
static int (*bpf_map_delete_elem)(void *map, void *key) =
(void *) BPF_FUNC_map_delete_elem;
static int (*bpf_trace_printk)(const char *fmt, int fmt_size, ...) =
(void *) BPF_FUNC_trace_printk;
struct bpf_map_def {
unsigned int type;
unsigned int key_size;
unsigned int value_size;
unsigned int max_entries;
};
struct pair {
u64 val;
u64 ip;
};
struct bpf_map_def SEC("maps") my_map = {
.type = BPF_MAP_TYPE_HASH,
.key_size = sizeof(long),
.value_size = sizeof(struct pair),
.max_entries = 1000000,
};
SEC("kprobe/kmem_cache_free")
int bpf_prog1(struct pt_regs *ctx)
{
long ptr = ctx->r14;
bpf_map_delete_elem(&my_map, &ptr);
return 0;
}
SEC("mybpfprog")
int bpf_prog_my(void *ctx)
{
char fmt[] = "Haha\n";
bpf_trace_printk(fmt, sizeof(fmt));
return 0;
}
char _license[] SEC("license") = "GPL";
u32 _version SEC("version") = LINUX_VERSION_CODE;
char _config[] SEC("config") = ""
"mybpfprog=__alloc_pages_nodemask\n";
Wang Nan (22):
perf: probe: avoid segfault if passed with ''.
perf: bpf: prepare: add __aligned_u64 to types.h.
perf: add bpf common operations.
perf tools: Add new 'perf bpf' command.
perf bpf: open eBPF object file and do basic validation.
perf bpf: check swap according to EHDR.
perf bpf: iterater over elf sections to collect information.
perf bpf: collect version and license from ELF.
perf bpf: collect map definitions.
perf bpf: collect config section in object.
perf bpf: collect symbol table in object files.
perf bpf: collect bpf programs from object files.
perf bpf: collects relocation sections from object file.
perf bpf: config eBPF programs based on their names.
perf bpf: config eBPF programs using config section.
perf bpf: create maps needed by object file.
perf bpf: relocation programs.
perf bpf: load eBPF programs into kernel.
perf bpf: dump eBPF program before loading.
perf bpf: clean elf memory after loading.
perf bpf: probe at kprobe points.
perf bpf: attaches eBPF program to perf fd.
tools/include/linux/types.h | 5 +
tools/perf/Build | 1 +
tools/perf/Documentation/perf-bpf.txt | 18 +
tools/perf/builtin-bpf.c | 63 ++
tools/perf/builtin.h | 1 +
tools/perf/perf-sys.h | 6 +
tools/perf/perf.c | 1 +
tools/perf/util/Build | 2 +
tools/perf/util/bpf-loader.c | 1061 +++++++++++++++++++++++++++++++++
tools/perf/util/bpf-loader.h | 73 +++
tools/perf/util/bpf.c | 195 ++++++
tools/perf/util/bpf.h | 23 +
tools/perf/util/probe-event.c | 2 +
13 files changed, 1451 insertions(+)
create mode 100644 tools/perf/Documentation/perf-bpf.txt
create mode 100644 tools/perf/builtin-bpf.c
create mode 100644 tools/perf/util/bpf-loader.c
create mode 100644 tools/perf/util/bpf-loader.h
create mode 100644 tools/perf/util/bpf.c
create mode 100644 tools/perf/util/bpf.h
--
1.8.3.4
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/