162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * bpf_kwork.c 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * Copyright (c) 2022 Huawei Inc, Yang Jihong <yangjihong1@huawei.com> 662306a36Sopenharmony_ci */ 762306a36Sopenharmony_ci 862306a36Sopenharmony_ci#include <time.h> 962306a36Sopenharmony_ci#include <fcntl.h> 1062306a36Sopenharmony_ci#include <signal.h> 1162306a36Sopenharmony_ci#include <stdio.h> 1262306a36Sopenharmony_ci#include <unistd.h> 1362306a36Sopenharmony_ci 1462306a36Sopenharmony_ci#include <linux/time64.h> 1562306a36Sopenharmony_ci 1662306a36Sopenharmony_ci#include "util/debug.h" 1762306a36Sopenharmony_ci#include "util/evsel.h" 1862306a36Sopenharmony_ci#include "util/kwork.h" 1962306a36Sopenharmony_ci 2062306a36Sopenharmony_ci#include <bpf/bpf.h> 2162306a36Sopenharmony_ci#include <perf/cpumap.h> 2262306a36Sopenharmony_ci 2362306a36Sopenharmony_ci#include "util/bpf_skel/kwork_trace.skel.h" 2462306a36Sopenharmony_ci 2562306a36Sopenharmony_ci/* 2662306a36Sopenharmony_ci * This should be in sync with "util/kwork_trace.bpf.c" 2762306a36Sopenharmony_ci */ 2862306a36Sopenharmony_ci#define MAX_KWORKNAME 128 2962306a36Sopenharmony_ci 3062306a36Sopenharmony_cistruct work_key { 3162306a36Sopenharmony_ci u32 type; 3262306a36Sopenharmony_ci u32 cpu; 3362306a36Sopenharmony_ci u64 id; 3462306a36Sopenharmony_ci}; 3562306a36Sopenharmony_ci 3662306a36Sopenharmony_cistruct report_data { 3762306a36Sopenharmony_ci u64 nr; 3862306a36Sopenharmony_ci u64 total_time; 3962306a36Sopenharmony_ci u64 max_time; 4062306a36Sopenharmony_ci u64 max_time_start; 4162306a36Sopenharmony_ci u64 max_time_end; 4262306a36Sopenharmony_ci}; 4362306a36Sopenharmony_ci 4462306a36Sopenharmony_cistruct kwork_class_bpf { 4562306a36Sopenharmony_ci struct kwork_class *class; 4662306a36Sopenharmony_ci 4762306a36Sopenharmony_ci void (*load_prepare)(struct perf_kwork *kwork); 4862306a36Sopenharmony_ci int (*get_work_name)(struct work_key *key, char **ret_name); 4962306a36Sopenharmony_ci}; 5062306a36Sopenharmony_ci 5162306a36Sopenharmony_cistatic struct kwork_trace_bpf *skel; 5262306a36Sopenharmony_ci 5362306a36Sopenharmony_cistatic struct timespec ts_start; 5462306a36Sopenharmony_cistatic struct timespec ts_end; 5562306a36Sopenharmony_ci 5662306a36Sopenharmony_civoid perf_kwork__trace_start(void) 5762306a36Sopenharmony_ci{ 5862306a36Sopenharmony_ci clock_gettime(CLOCK_MONOTONIC, &ts_start); 5962306a36Sopenharmony_ci skel->bss->enabled = 1; 6062306a36Sopenharmony_ci} 6162306a36Sopenharmony_ci 6262306a36Sopenharmony_civoid perf_kwork__trace_finish(void) 6362306a36Sopenharmony_ci{ 6462306a36Sopenharmony_ci clock_gettime(CLOCK_MONOTONIC, &ts_end); 6562306a36Sopenharmony_ci skel->bss->enabled = 0; 6662306a36Sopenharmony_ci} 6762306a36Sopenharmony_ci 6862306a36Sopenharmony_cistatic int get_work_name_from_map(struct work_key *key, char **ret_name) 6962306a36Sopenharmony_ci{ 7062306a36Sopenharmony_ci char name[MAX_KWORKNAME] = { 0 }; 7162306a36Sopenharmony_ci int fd = bpf_map__fd(skel->maps.perf_kwork_names); 7262306a36Sopenharmony_ci 7362306a36Sopenharmony_ci *ret_name = NULL; 7462306a36Sopenharmony_ci 7562306a36Sopenharmony_ci if (fd < 0) { 7662306a36Sopenharmony_ci pr_debug("Invalid names map fd\n"); 7762306a36Sopenharmony_ci return 0; 7862306a36Sopenharmony_ci } 7962306a36Sopenharmony_ci 8062306a36Sopenharmony_ci if ((bpf_map_lookup_elem(fd, key, name) == 0) && (strlen(name) != 0)) { 8162306a36Sopenharmony_ci *ret_name = strdup(name); 8262306a36Sopenharmony_ci if (*ret_name == NULL) { 8362306a36Sopenharmony_ci pr_err("Failed to copy work name\n"); 8462306a36Sopenharmony_ci return -1; 8562306a36Sopenharmony_ci } 8662306a36Sopenharmony_ci } 8762306a36Sopenharmony_ci 8862306a36Sopenharmony_ci return 0; 8962306a36Sopenharmony_ci} 9062306a36Sopenharmony_ci 9162306a36Sopenharmony_cistatic void irq_load_prepare(struct perf_kwork *kwork) 9262306a36Sopenharmony_ci{ 9362306a36Sopenharmony_ci if (kwork->report == KWORK_REPORT_RUNTIME) { 9462306a36Sopenharmony_ci bpf_program__set_autoload(skel->progs.report_irq_handler_entry, true); 9562306a36Sopenharmony_ci bpf_program__set_autoload(skel->progs.report_irq_handler_exit, true); 9662306a36Sopenharmony_ci } 9762306a36Sopenharmony_ci} 9862306a36Sopenharmony_ci 9962306a36Sopenharmony_cistatic struct kwork_class_bpf kwork_irq_bpf = { 10062306a36Sopenharmony_ci .load_prepare = irq_load_prepare, 10162306a36Sopenharmony_ci .get_work_name = get_work_name_from_map, 10262306a36Sopenharmony_ci}; 10362306a36Sopenharmony_ci 10462306a36Sopenharmony_cistatic void softirq_load_prepare(struct perf_kwork *kwork) 10562306a36Sopenharmony_ci{ 10662306a36Sopenharmony_ci if (kwork->report == KWORK_REPORT_RUNTIME) { 10762306a36Sopenharmony_ci bpf_program__set_autoload(skel->progs.report_softirq_entry, true); 10862306a36Sopenharmony_ci bpf_program__set_autoload(skel->progs.report_softirq_exit, true); 10962306a36Sopenharmony_ci } else if (kwork->report == KWORK_REPORT_LATENCY) { 11062306a36Sopenharmony_ci bpf_program__set_autoload(skel->progs.latency_softirq_raise, true); 11162306a36Sopenharmony_ci bpf_program__set_autoload(skel->progs.latency_softirq_entry, true); 11262306a36Sopenharmony_ci } 11362306a36Sopenharmony_ci} 11462306a36Sopenharmony_ci 11562306a36Sopenharmony_cistatic struct kwork_class_bpf kwork_softirq_bpf = { 11662306a36Sopenharmony_ci .load_prepare = softirq_load_prepare, 11762306a36Sopenharmony_ci .get_work_name = get_work_name_from_map, 11862306a36Sopenharmony_ci}; 11962306a36Sopenharmony_ci 12062306a36Sopenharmony_cistatic void workqueue_load_prepare(struct perf_kwork *kwork) 12162306a36Sopenharmony_ci{ 12262306a36Sopenharmony_ci if (kwork->report == KWORK_REPORT_RUNTIME) { 12362306a36Sopenharmony_ci bpf_program__set_autoload(skel->progs.report_workqueue_execute_start, true); 12462306a36Sopenharmony_ci bpf_program__set_autoload(skel->progs.report_workqueue_execute_end, true); 12562306a36Sopenharmony_ci } else if (kwork->report == KWORK_REPORT_LATENCY) { 12662306a36Sopenharmony_ci bpf_program__set_autoload(skel->progs.latency_workqueue_activate_work, true); 12762306a36Sopenharmony_ci bpf_program__set_autoload(skel->progs.latency_workqueue_execute_start, true); 12862306a36Sopenharmony_ci } 12962306a36Sopenharmony_ci} 13062306a36Sopenharmony_ci 13162306a36Sopenharmony_cistatic struct kwork_class_bpf kwork_workqueue_bpf = { 13262306a36Sopenharmony_ci .load_prepare = workqueue_load_prepare, 13362306a36Sopenharmony_ci .get_work_name = get_work_name_from_map, 13462306a36Sopenharmony_ci}; 13562306a36Sopenharmony_ci 13662306a36Sopenharmony_cistatic struct kwork_class_bpf * 13762306a36Sopenharmony_cikwork_class_bpf_supported_list[KWORK_CLASS_MAX] = { 13862306a36Sopenharmony_ci [KWORK_CLASS_IRQ] = &kwork_irq_bpf, 13962306a36Sopenharmony_ci [KWORK_CLASS_SOFTIRQ] = &kwork_softirq_bpf, 14062306a36Sopenharmony_ci [KWORK_CLASS_WORKQUEUE] = &kwork_workqueue_bpf, 14162306a36Sopenharmony_ci}; 14262306a36Sopenharmony_ci 14362306a36Sopenharmony_cistatic bool valid_kwork_class_type(enum kwork_class_type type) 14462306a36Sopenharmony_ci{ 14562306a36Sopenharmony_ci return type >= 0 && type < KWORK_CLASS_MAX ? true : false; 14662306a36Sopenharmony_ci} 14762306a36Sopenharmony_ci 14862306a36Sopenharmony_cistatic int setup_filters(struct perf_kwork *kwork) 14962306a36Sopenharmony_ci{ 15062306a36Sopenharmony_ci u8 val = 1; 15162306a36Sopenharmony_ci int i, nr_cpus, key, fd; 15262306a36Sopenharmony_ci struct perf_cpu_map *map; 15362306a36Sopenharmony_ci 15462306a36Sopenharmony_ci if (kwork->cpu_list != NULL) { 15562306a36Sopenharmony_ci fd = bpf_map__fd(skel->maps.perf_kwork_cpu_filter); 15662306a36Sopenharmony_ci if (fd < 0) { 15762306a36Sopenharmony_ci pr_debug("Invalid cpu filter fd\n"); 15862306a36Sopenharmony_ci return -1; 15962306a36Sopenharmony_ci } 16062306a36Sopenharmony_ci 16162306a36Sopenharmony_ci map = perf_cpu_map__new(kwork->cpu_list); 16262306a36Sopenharmony_ci if (map == NULL) { 16362306a36Sopenharmony_ci pr_debug("Invalid cpu_list\n"); 16462306a36Sopenharmony_ci return -1; 16562306a36Sopenharmony_ci } 16662306a36Sopenharmony_ci 16762306a36Sopenharmony_ci nr_cpus = libbpf_num_possible_cpus(); 16862306a36Sopenharmony_ci for (i = 0; i < perf_cpu_map__nr(map); i++) { 16962306a36Sopenharmony_ci struct perf_cpu cpu = perf_cpu_map__cpu(map, i); 17062306a36Sopenharmony_ci 17162306a36Sopenharmony_ci if (cpu.cpu >= nr_cpus) { 17262306a36Sopenharmony_ci perf_cpu_map__put(map); 17362306a36Sopenharmony_ci pr_err("Requested cpu %d too large\n", cpu.cpu); 17462306a36Sopenharmony_ci return -1; 17562306a36Sopenharmony_ci } 17662306a36Sopenharmony_ci bpf_map_update_elem(fd, &cpu.cpu, &val, BPF_ANY); 17762306a36Sopenharmony_ci } 17862306a36Sopenharmony_ci perf_cpu_map__put(map); 17962306a36Sopenharmony_ci 18062306a36Sopenharmony_ci skel->bss->has_cpu_filter = 1; 18162306a36Sopenharmony_ci } 18262306a36Sopenharmony_ci 18362306a36Sopenharmony_ci if (kwork->profile_name != NULL) { 18462306a36Sopenharmony_ci if (strlen(kwork->profile_name) >= MAX_KWORKNAME) { 18562306a36Sopenharmony_ci pr_err("Requested name filter %s too large, limit to %d\n", 18662306a36Sopenharmony_ci kwork->profile_name, MAX_KWORKNAME - 1); 18762306a36Sopenharmony_ci return -1; 18862306a36Sopenharmony_ci } 18962306a36Sopenharmony_ci 19062306a36Sopenharmony_ci fd = bpf_map__fd(skel->maps.perf_kwork_name_filter); 19162306a36Sopenharmony_ci if (fd < 0) { 19262306a36Sopenharmony_ci pr_debug("Invalid name filter fd\n"); 19362306a36Sopenharmony_ci return -1; 19462306a36Sopenharmony_ci } 19562306a36Sopenharmony_ci 19662306a36Sopenharmony_ci key = 0; 19762306a36Sopenharmony_ci bpf_map_update_elem(fd, &key, kwork->profile_name, BPF_ANY); 19862306a36Sopenharmony_ci 19962306a36Sopenharmony_ci skel->bss->has_name_filter = 1; 20062306a36Sopenharmony_ci } 20162306a36Sopenharmony_ci 20262306a36Sopenharmony_ci return 0; 20362306a36Sopenharmony_ci} 20462306a36Sopenharmony_ci 20562306a36Sopenharmony_ciint perf_kwork__trace_prepare_bpf(struct perf_kwork *kwork) 20662306a36Sopenharmony_ci{ 20762306a36Sopenharmony_ci struct bpf_program *prog; 20862306a36Sopenharmony_ci struct kwork_class *class; 20962306a36Sopenharmony_ci struct kwork_class_bpf *class_bpf; 21062306a36Sopenharmony_ci enum kwork_class_type type; 21162306a36Sopenharmony_ci 21262306a36Sopenharmony_ci skel = kwork_trace_bpf__open(); 21362306a36Sopenharmony_ci if (!skel) { 21462306a36Sopenharmony_ci pr_debug("Failed to open kwork trace skeleton\n"); 21562306a36Sopenharmony_ci return -1; 21662306a36Sopenharmony_ci } 21762306a36Sopenharmony_ci 21862306a36Sopenharmony_ci /* 21962306a36Sopenharmony_ci * set all progs to non-autoload, 22062306a36Sopenharmony_ci * then set corresponding progs according to config 22162306a36Sopenharmony_ci */ 22262306a36Sopenharmony_ci bpf_object__for_each_program(prog, skel->obj) 22362306a36Sopenharmony_ci bpf_program__set_autoload(prog, false); 22462306a36Sopenharmony_ci 22562306a36Sopenharmony_ci list_for_each_entry(class, &kwork->class_list, list) { 22662306a36Sopenharmony_ci type = class->type; 22762306a36Sopenharmony_ci if (!valid_kwork_class_type(type) || 22862306a36Sopenharmony_ci (kwork_class_bpf_supported_list[type] == NULL)) { 22962306a36Sopenharmony_ci pr_err("Unsupported bpf trace class %s\n", class->name); 23062306a36Sopenharmony_ci goto out; 23162306a36Sopenharmony_ci } 23262306a36Sopenharmony_ci 23362306a36Sopenharmony_ci class_bpf = kwork_class_bpf_supported_list[type]; 23462306a36Sopenharmony_ci class_bpf->class = class; 23562306a36Sopenharmony_ci 23662306a36Sopenharmony_ci if (class_bpf->load_prepare != NULL) 23762306a36Sopenharmony_ci class_bpf->load_prepare(kwork); 23862306a36Sopenharmony_ci } 23962306a36Sopenharmony_ci 24062306a36Sopenharmony_ci if (kwork_trace_bpf__load(skel)) { 24162306a36Sopenharmony_ci pr_debug("Failed to load kwork trace skeleton\n"); 24262306a36Sopenharmony_ci goto out; 24362306a36Sopenharmony_ci } 24462306a36Sopenharmony_ci 24562306a36Sopenharmony_ci if (setup_filters(kwork)) 24662306a36Sopenharmony_ci goto out; 24762306a36Sopenharmony_ci 24862306a36Sopenharmony_ci if (kwork_trace_bpf__attach(skel)) { 24962306a36Sopenharmony_ci pr_debug("Failed to attach kwork trace skeleton\n"); 25062306a36Sopenharmony_ci goto out; 25162306a36Sopenharmony_ci } 25262306a36Sopenharmony_ci 25362306a36Sopenharmony_ci return 0; 25462306a36Sopenharmony_ci 25562306a36Sopenharmony_ciout: 25662306a36Sopenharmony_ci kwork_trace_bpf__destroy(skel); 25762306a36Sopenharmony_ci return -1; 25862306a36Sopenharmony_ci} 25962306a36Sopenharmony_ci 26062306a36Sopenharmony_cistatic int add_work(struct perf_kwork *kwork, 26162306a36Sopenharmony_ci struct work_key *key, 26262306a36Sopenharmony_ci struct report_data *data) 26362306a36Sopenharmony_ci{ 26462306a36Sopenharmony_ci struct kwork_work *work; 26562306a36Sopenharmony_ci struct kwork_class_bpf *bpf_trace; 26662306a36Sopenharmony_ci struct kwork_work tmp = { 26762306a36Sopenharmony_ci .id = key->id, 26862306a36Sopenharmony_ci .name = NULL, 26962306a36Sopenharmony_ci .cpu = key->cpu, 27062306a36Sopenharmony_ci }; 27162306a36Sopenharmony_ci enum kwork_class_type type = key->type; 27262306a36Sopenharmony_ci 27362306a36Sopenharmony_ci if (!valid_kwork_class_type(type)) { 27462306a36Sopenharmony_ci pr_debug("Invalid class type %d to add work\n", type); 27562306a36Sopenharmony_ci return -1; 27662306a36Sopenharmony_ci } 27762306a36Sopenharmony_ci 27862306a36Sopenharmony_ci bpf_trace = kwork_class_bpf_supported_list[type]; 27962306a36Sopenharmony_ci tmp.class = bpf_trace->class; 28062306a36Sopenharmony_ci 28162306a36Sopenharmony_ci if ((bpf_trace->get_work_name != NULL) && 28262306a36Sopenharmony_ci (bpf_trace->get_work_name(key, &tmp.name))) 28362306a36Sopenharmony_ci return -1; 28462306a36Sopenharmony_ci 28562306a36Sopenharmony_ci work = perf_kwork_add_work(kwork, tmp.class, &tmp); 28662306a36Sopenharmony_ci if (work == NULL) 28762306a36Sopenharmony_ci return -1; 28862306a36Sopenharmony_ci 28962306a36Sopenharmony_ci if (kwork->report == KWORK_REPORT_RUNTIME) { 29062306a36Sopenharmony_ci work->nr_atoms = data->nr; 29162306a36Sopenharmony_ci work->total_runtime = data->total_time; 29262306a36Sopenharmony_ci work->max_runtime = data->max_time; 29362306a36Sopenharmony_ci work->max_runtime_start = data->max_time_start; 29462306a36Sopenharmony_ci work->max_runtime_end = data->max_time_end; 29562306a36Sopenharmony_ci } else if (kwork->report == KWORK_REPORT_LATENCY) { 29662306a36Sopenharmony_ci work->nr_atoms = data->nr; 29762306a36Sopenharmony_ci work->total_latency = data->total_time; 29862306a36Sopenharmony_ci work->max_latency = data->max_time; 29962306a36Sopenharmony_ci work->max_latency_start = data->max_time_start; 30062306a36Sopenharmony_ci work->max_latency_end = data->max_time_end; 30162306a36Sopenharmony_ci } else { 30262306a36Sopenharmony_ci pr_debug("Invalid bpf report type %d\n", kwork->report); 30362306a36Sopenharmony_ci return -1; 30462306a36Sopenharmony_ci } 30562306a36Sopenharmony_ci 30662306a36Sopenharmony_ci kwork->timestart = (u64)ts_start.tv_sec * NSEC_PER_SEC + ts_start.tv_nsec; 30762306a36Sopenharmony_ci kwork->timeend = (u64)ts_end.tv_sec * NSEC_PER_SEC + ts_end.tv_nsec; 30862306a36Sopenharmony_ci 30962306a36Sopenharmony_ci return 0; 31062306a36Sopenharmony_ci} 31162306a36Sopenharmony_ci 31262306a36Sopenharmony_ciint perf_kwork__report_read_bpf(struct perf_kwork *kwork) 31362306a36Sopenharmony_ci{ 31462306a36Sopenharmony_ci struct report_data data; 31562306a36Sopenharmony_ci struct work_key key = { 31662306a36Sopenharmony_ci .type = 0, 31762306a36Sopenharmony_ci .cpu = 0, 31862306a36Sopenharmony_ci .id = 0, 31962306a36Sopenharmony_ci }; 32062306a36Sopenharmony_ci struct work_key prev = { 32162306a36Sopenharmony_ci .type = 0, 32262306a36Sopenharmony_ci .cpu = 0, 32362306a36Sopenharmony_ci .id = 0, 32462306a36Sopenharmony_ci }; 32562306a36Sopenharmony_ci int fd = bpf_map__fd(skel->maps.perf_kwork_report); 32662306a36Sopenharmony_ci 32762306a36Sopenharmony_ci if (fd < 0) { 32862306a36Sopenharmony_ci pr_debug("Invalid report fd\n"); 32962306a36Sopenharmony_ci return -1; 33062306a36Sopenharmony_ci } 33162306a36Sopenharmony_ci 33262306a36Sopenharmony_ci while (!bpf_map_get_next_key(fd, &prev, &key)) { 33362306a36Sopenharmony_ci if ((bpf_map_lookup_elem(fd, &key, &data)) != 0) { 33462306a36Sopenharmony_ci pr_debug("Failed to lookup report elem\n"); 33562306a36Sopenharmony_ci return -1; 33662306a36Sopenharmony_ci } 33762306a36Sopenharmony_ci 33862306a36Sopenharmony_ci if ((data.nr != 0) && (add_work(kwork, &key, &data) != 0)) 33962306a36Sopenharmony_ci return -1; 34062306a36Sopenharmony_ci 34162306a36Sopenharmony_ci prev = key; 34262306a36Sopenharmony_ci } 34362306a36Sopenharmony_ci return 0; 34462306a36Sopenharmony_ci} 34562306a36Sopenharmony_ci 34662306a36Sopenharmony_civoid perf_kwork__report_cleanup_bpf(void) 34762306a36Sopenharmony_ci{ 34862306a36Sopenharmony_ci kwork_trace_bpf__destroy(skel); 34962306a36Sopenharmony_ci} 350