162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
262306a36Sopenharmony_ci/*
362306a36Sopenharmony_ci * bpf_kwork.c
462306a36Sopenharmony_ci *
562306a36Sopenharmony_ci * Copyright (c) 2022  Huawei Inc,  Yang Jihong <yangjihong1@huawei.com>
662306a36Sopenharmony_ci */
762306a36Sopenharmony_ci
862306a36Sopenharmony_ci#include <time.h>
962306a36Sopenharmony_ci#include <fcntl.h>
1062306a36Sopenharmony_ci#include <signal.h>
1162306a36Sopenharmony_ci#include <stdio.h>
1262306a36Sopenharmony_ci#include <unistd.h>
1362306a36Sopenharmony_ci
1462306a36Sopenharmony_ci#include <linux/time64.h>
1562306a36Sopenharmony_ci
1662306a36Sopenharmony_ci#include "util/debug.h"
1762306a36Sopenharmony_ci#include "util/evsel.h"
1862306a36Sopenharmony_ci#include "util/kwork.h"
1962306a36Sopenharmony_ci
2062306a36Sopenharmony_ci#include <bpf/bpf.h>
2162306a36Sopenharmony_ci#include <perf/cpumap.h>
2262306a36Sopenharmony_ci
2362306a36Sopenharmony_ci#include "util/bpf_skel/kwork_trace.skel.h"
2462306a36Sopenharmony_ci
2562306a36Sopenharmony_ci/*
2662306a36Sopenharmony_ci * This should be in sync with "util/kwork_trace.bpf.c"
2762306a36Sopenharmony_ci */
2862306a36Sopenharmony_ci#define MAX_KWORKNAME 128
2962306a36Sopenharmony_ci
3062306a36Sopenharmony_cistruct work_key {
3162306a36Sopenharmony_ci	u32 type;
3262306a36Sopenharmony_ci	u32 cpu;
3362306a36Sopenharmony_ci	u64 id;
3462306a36Sopenharmony_ci};
3562306a36Sopenharmony_ci
3662306a36Sopenharmony_cistruct report_data {
3762306a36Sopenharmony_ci	u64 nr;
3862306a36Sopenharmony_ci	u64 total_time;
3962306a36Sopenharmony_ci	u64 max_time;
4062306a36Sopenharmony_ci	u64 max_time_start;
4162306a36Sopenharmony_ci	u64 max_time_end;
4262306a36Sopenharmony_ci};
4362306a36Sopenharmony_ci
4462306a36Sopenharmony_cistruct kwork_class_bpf {
4562306a36Sopenharmony_ci	struct kwork_class *class;
4662306a36Sopenharmony_ci
4762306a36Sopenharmony_ci	void (*load_prepare)(struct perf_kwork *kwork);
4862306a36Sopenharmony_ci	int  (*get_work_name)(struct work_key *key, char **ret_name);
4962306a36Sopenharmony_ci};
5062306a36Sopenharmony_ci
5162306a36Sopenharmony_cistatic struct kwork_trace_bpf *skel;
5262306a36Sopenharmony_ci
5362306a36Sopenharmony_cistatic struct timespec ts_start;
5462306a36Sopenharmony_cistatic struct timespec ts_end;
5562306a36Sopenharmony_ci
5662306a36Sopenharmony_civoid perf_kwork__trace_start(void)
5762306a36Sopenharmony_ci{
5862306a36Sopenharmony_ci	clock_gettime(CLOCK_MONOTONIC, &ts_start);
5962306a36Sopenharmony_ci	skel->bss->enabled = 1;
6062306a36Sopenharmony_ci}
6162306a36Sopenharmony_ci
6262306a36Sopenharmony_civoid perf_kwork__trace_finish(void)
6362306a36Sopenharmony_ci{
6462306a36Sopenharmony_ci	clock_gettime(CLOCK_MONOTONIC, &ts_end);
6562306a36Sopenharmony_ci	skel->bss->enabled = 0;
6662306a36Sopenharmony_ci}
6762306a36Sopenharmony_ci
6862306a36Sopenharmony_cistatic int get_work_name_from_map(struct work_key *key, char **ret_name)
6962306a36Sopenharmony_ci{
7062306a36Sopenharmony_ci	char name[MAX_KWORKNAME] = { 0 };
7162306a36Sopenharmony_ci	int fd = bpf_map__fd(skel->maps.perf_kwork_names);
7262306a36Sopenharmony_ci
7362306a36Sopenharmony_ci	*ret_name = NULL;
7462306a36Sopenharmony_ci
7562306a36Sopenharmony_ci	if (fd < 0) {
7662306a36Sopenharmony_ci		pr_debug("Invalid names map fd\n");
7762306a36Sopenharmony_ci		return 0;
7862306a36Sopenharmony_ci	}
7962306a36Sopenharmony_ci
8062306a36Sopenharmony_ci	if ((bpf_map_lookup_elem(fd, key, name) == 0) && (strlen(name) != 0)) {
8162306a36Sopenharmony_ci		*ret_name = strdup(name);
8262306a36Sopenharmony_ci		if (*ret_name == NULL) {
8362306a36Sopenharmony_ci			pr_err("Failed to copy work name\n");
8462306a36Sopenharmony_ci			return -1;
8562306a36Sopenharmony_ci		}
8662306a36Sopenharmony_ci	}
8762306a36Sopenharmony_ci
8862306a36Sopenharmony_ci	return 0;
8962306a36Sopenharmony_ci}
9062306a36Sopenharmony_ci
9162306a36Sopenharmony_cistatic void irq_load_prepare(struct perf_kwork *kwork)
9262306a36Sopenharmony_ci{
9362306a36Sopenharmony_ci	if (kwork->report == KWORK_REPORT_RUNTIME) {
9462306a36Sopenharmony_ci		bpf_program__set_autoload(skel->progs.report_irq_handler_entry, true);
9562306a36Sopenharmony_ci		bpf_program__set_autoload(skel->progs.report_irq_handler_exit, true);
9662306a36Sopenharmony_ci	}
9762306a36Sopenharmony_ci}
9862306a36Sopenharmony_ci
9962306a36Sopenharmony_cistatic struct kwork_class_bpf kwork_irq_bpf = {
10062306a36Sopenharmony_ci	.load_prepare  = irq_load_prepare,
10162306a36Sopenharmony_ci	.get_work_name = get_work_name_from_map,
10262306a36Sopenharmony_ci};
10362306a36Sopenharmony_ci
10462306a36Sopenharmony_cistatic void softirq_load_prepare(struct perf_kwork *kwork)
10562306a36Sopenharmony_ci{
10662306a36Sopenharmony_ci	if (kwork->report == KWORK_REPORT_RUNTIME) {
10762306a36Sopenharmony_ci		bpf_program__set_autoload(skel->progs.report_softirq_entry, true);
10862306a36Sopenharmony_ci		bpf_program__set_autoload(skel->progs.report_softirq_exit, true);
10962306a36Sopenharmony_ci	} else if (kwork->report == KWORK_REPORT_LATENCY) {
11062306a36Sopenharmony_ci		bpf_program__set_autoload(skel->progs.latency_softirq_raise, true);
11162306a36Sopenharmony_ci		bpf_program__set_autoload(skel->progs.latency_softirq_entry, true);
11262306a36Sopenharmony_ci	}
11362306a36Sopenharmony_ci}
11462306a36Sopenharmony_ci
11562306a36Sopenharmony_cistatic struct kwork_class_bpf kwork_softirq_bpf = {
11662306a36Sopenharmony_ci	.load_prepare  = softirq_load_prepare,
11762306a36Sopenharmony_ci	.get_work_name = get_work_name_from_map,
11862306a36Sopenharmony_ci};
11962306a36Sopenharmony_ci
12062306a36Sopenharmony_cistatic void workqueue_load_prepare(struct perf_kwork *kwork)
12162306a36Sopenharmony_ci{
12262306a36Sopenharmony_ci	if (kwork->report == KWORK_REPORT_RUNTIME) {
12362306a36Sopenharmony_ci		bpf_program__set_autoload(skel->progs.report_workqueue_execute_start, true);
12462306a36Sopenharmony_ci		bpf_program__set_autoload(skel->progs.report_workqueue_execute_end, true);
12562306a36Sopenharmony_ci	} else if (kwork->report == KWORK_REPORT_LATENCY) {
12662306a36Sopenharmony_ci		bpf_program__set_autoload(skel->progs.latency_workqueue_activate_work, true);
12762306a36Sopenharmony_ci		bpf_program__set_autoload(skel->progs.latency_workqueue_execute_start, true);
12862306a36Sopenharmony_ci	}
12962306a36Sopenharmony_ci}
13062306a36Sopenharmony_ci
13162306a36Sopenharmony_cistatic struct kwork_class_bpf kwork_workqueue_bpf = {
13262306a36Sopenharmony_ci	.load_prepare  = workqueue_load_prepare,
13362306a36Sopenharmony_ci	.get_work_name = get_work_name_from_map,
13462306a36Sopenharmony_ci};
13562306a36Sopenharmony_ci
13662306a36Sopenharmony_cistatic struct kwork_class_bpf *
13762306a36Sopenharmony_cikwork_class_bpf_supported_list[KWORK_CLASS_MAX] = {
13862306a36Sopenharmony_ci	[KWORK_CLASS_IRQ]       = &kwork_irq_bpf,
13962306a36Sopenharmony_ci	[KWORK_CLASS_SOFTIRQ]   = &kwork_softirq_bpf,
14062306a36Sopenharmony_ci	[KWORK_CLASS_WORKQUEUE] = &kwork_workqueue_bpf,
14162306a36Sopenharmony_ci};
14262306a36Sopenharmony_ci
14362306a36Sopenharmony_cistatic bool valid_kwork_class_type(enum kwork_class_type type)
14462306a36Sopenharmony_ci{
14562306a36Sopenharmony_ci	return type >= 0 && type < KWORK_CLASS_MAX ? true : false;
14662306a36Sopenharmony_ci}
14762306a36Sopenharmony_ci
14862306a36Sopenharmony_cistatic int setup_filters(struct perf_kwork *kwork)
14962306a36Sopenharmony_ci{
15062306a36Sopenharmony_ci	u8 val = 1;
15162306a36Sopenharmony_ci	int i, nr_cpus, key, fd;
15262306a36Sopenharmony_ci	struct perf_cpu_map *map;
15362306a36Sopenharmony_ci
15462306a36Sopenharmony_ci	if (kwork->cpu_list != NULL) {
15562306a36Sopenharmony_ci		fd = bpf_map__fd(skel->maps.perf_kwork_cpu_filter);
15662306a36Sopenharmony_ci		if (fd < 0) {
15762306a36Sopenharmony_ci			pr_debug("Invalid cpu filter fd\n");
15862306a36Sopenharmony_ci			return -1;
15962306a36Sopenharmony_ci		}
16062306a36Sopenharmony_ci
16162306a36Sopenharmony_ci		map = perf_cpu_map__new(kwork->cpu_list);
16262306a36Sopenharmony_ci		if (map == NULL) {
16362306a36Sopenharmony_ci			pr_debug("Invalid cpu_list\n");
16462306a36Sopenharmony_ci			return -1;
16562306a36Sopenharmony_ci		}
16662306a36Sopenharmony_ci
16762306a36Sopenharmony_ci		nr_cpus = libbpf_num_possible_cpus();
16862306a36Sopenharmony_ci		for (i = 0; i < perf_cpu_map__nr(map); i++) {
16962306a36Sopenharmony_ci			struct perf_cpu cpu = perf_cpu_map__cpu(map, i);
17062306a36Sopenharmony_ci
17162306a36Sopenharmony_ci			if (cpu.cpu >= nr_cpus) {
17262306a36Sopenharmony_ci				perf_cpu_map__put(map);
17362306a36Sopenharmony_ci				pr_err("Requested cpu %d too large\n", cpu.cpu);
17462306a36Sopenharmony_ci				return -1;
17562306a36Sopenharmony_ci			}
17662306a36Sopenharmony_ci			bpf_map_update_elem(fd, &cpu.cpu, &val, BPF_ANY);
17762306a36Sopenharmony_ci		}
17862306a36Sopenharmony_ci		perf_cpu_map__put(map);
17962306a36Sopenharmony_ci
18062306a36Sopenharmony_ci		skel->bss->has_cpu_filter = 1;
18162306a36Sopenharmony_ci	}
18262306a36Sopenharmony_ci
18362306a36Sopenharmony_ci	if (kwork->profile_name != NULL) {
18462306a36Sopenharmony_ci		if (strlen(kwork->profile_name) >= MAX_KWORKNAME) {
18562306a36Sopenharmony_ci			pr_err("Requested name filter %s too large, limit to %d\n",
18662306a36Sopenharmony_ci			       kwork->profile_name, MAX_KWORKNAME - 1);
18762306a36Sopenharmony_ci			return -1;
18862306a36Sopenharmony_ci		}
18962306a36Sopenharmony_ci
19062306a36Sopenharmony_ci		fd = bpf_map__fd(skel->maps.perf_kwork_name_filter);
19162306a36Sopenharmony_ci		if (fd < 0) {
19262306a36Sopenharmony_ci			pr_debug("Invalid name filter fd\n");
19362306a36Sopenharmony_ci			return -1;
19462306a36Sopenharmony_ci		}
19562306a36Sopenharmony_ci
19662306a36Sopenharmony_ci		key = 0;
19762306a36Sopenharmony_ci		bpf_map_update_elem(fd, &key, kwork->profile_name, BPF_ANY);
19862306a36Sopenharmony_ci
19962306a36Sopenharmony_ci		skel->bss->has_name_filter = 1;
20062306a36Sopenharmony_ci	}
20162306a36Sopenharmony_ci
20262306a36Sopenharmony_ci	return 0;
20362306a36Sopenharmony_ci}
20462306a36Sopenharmony_ci
20562306a36Sopenharmony_ciint perf_kwork__trace_prepare_bpf(struct perf_kwork *kwork)
20662306a36Sopenharmony_ci{
20762306a36Sopenharmony_ci	struct bpf_program *prog;
20862306a36Sopenharmony_ci	struct kwork_class *class;
20962306a36Sopenharmony_ci	struct kwork_class_bpf *class_bpf;
21062306a36Sopenharmony_ci	enum kwork_class_type type;
21162306a36Sopenharmony_ci
21262306a36Sopenharmony_ci	skel = kwork_trace_bpf__open();
21362306a36Sopenharmony_ci	if (!skel) {
21462306a36Sopenharmony_ci		pr_debug("Failed to open kwork trace skeleton\n");
21562306a36Sopenharmony_ci		return -1;
21662306a36Sopenharmony_ci	}
21762306a36Sopenharmony_ci
21862306a36Sopenharmony_ci	/*
21962306a36Sopenharmony_ci	 * set all progs to non-autoload,
22062306a36Sopenharmony_ci	 * then set corresponding progs according to config
22162306a36Sopenharmony_ci	 */
22262306a36Sopenharmony_ci	bpf_object__for_each_program(prog, skel->obj)
22362306a36Sopenharmony_ci		bpf_program__set_autoload(prog, false);
22462306a36Sopenharmony_ci
22562306a36Sopenharmony_ci	list_for_each_entry(class, &kwork->class_list, list) {
22662306a36Sopenharmony_ci		type = class->type;
22762306a36Sopenharmony_ci		if (!valid_kwork_class_type(type) ||
22862306a36Sopenharmony_ci		    (kwork_class_bpf_supported_list[type] == NULL)) {
22962306a36Sopenharmony_ci			pr_err("Unsupported bpf trace class %s\n", class->name);
23062306a36Sopenharmony_ci			goto out;
23162306a36Sopenharmony_ci		}
23262306a36Sopenharmony_ci
23362306a36Sopenharmony_ci		class_bpf = kwork_class_bpf_supported_list[type];
23462306a36Sopenharmony_ci		class_bpf->class = class;
23562306a36Sopenharmony_ci
23662306a36Sopenharmony_ci		if (class_bpf->load_prepare != NULL)
23762306a36Sopenharmony_ci			class_bpf->load_prepare(kwork);
23862306a36Sopenharmony_ci	}
23962306a36Sopenharmony_ci
24062306a36Sopenharmony_ci	if (kwork_trace_bpf__load(skel)) {
24162306a36Sopenharmony_ci		pr_debug("Failed to load kwork trace skeleton\n");
24262306a36Sopenharmony_ci		goto out;
24362306a36Sopenharmony_ci	}
24462306a36Sopenharmony_ci
24562306a36Sopenharmony_ci	if (setup_filters(kwork))
24662306a36Sopenharmony_ci		goto out;
24762306a36Sopenharmony_ci
24862306a36Sopenharmony_ci	if (kwork_trace_bpf__attach(skel)) {
24962306a36Sopenharmony_ci		pr_debug("Failed to attach kwork trace skeleton\n");
25062306a36Sopenharmony_ci		goto out;
25162306a36Sopenharmony_ci	}
25262306a36Sopenharmony_ci
25362306a36Sopenharmony_ci	return 0;
25462306a36Sopenharmony_ci
25562306a36Sopenharmony_ciout:
25662306a36Sopenharmony_ci	kwork_trace_bpf__destroy(skel);
25762306a36Sopenharmony_ci	return -1;
25862306a36Sopenharmony_ci}
25962306a36Sopenharmony_ci
26062306a36Sopenharmony_cistatic int add_work(struct perf_kwork *kwork,
26162306a36Sopenharmony_ci		    struct work_key *key,
26262306a36Sopenharmony_ci		    struct report_data *data)
26362306a36Sopenharmony_ci{
26462306a36Sopenharmony_ci	struct kwork_work *work;
26562306a36Sopenharmony_ci	struct kwork_class_bpf *bpf_trace;
26662306a36Sopenharmony_ci	struct kwork_work tmp = {
26762306a36Sopenharmony_ci		.id = key->id,
26862306a36Sopenharmony_ci		.name = NULL,
26962306a36Sopenharmony_ci		.cpu = key->cpu,
27062306a36Sopenharmony_ci	};
27162306a36Sopenharmony_ci	enum kwork_class_type type = key->type;
27262306a36Sopenharmony_ci
27362306a36Sopenharmony_ci	if (!valid_kwork_class_type(type)) {
27462306a36Sopenharmony_ci		pr_debug("Invalid class type %d to add work\n", type);
27562306a36Sopenharmony_ci		return -1;
27662306a36Sopenharmony_ci	}
27762306a36Sopenharmony_ci
27862306a36Sopenharmony_ci	bpf_trace = kwork_class_bpf_supported_list[type];
27962306a36Sopenharmony_ci	tmp.class = bpf_trace->class;
28062306a36Sopenharmony_ci
28162306a36Sopenharmony_ci	if ((bpf_trace->get_work_name != NULL) &&
28262306a36Sopenharmony_ci	    (bpf_trace->get_work_name(key, &tmp.name)))
28362306a36Sopenharmony_ci		return -1;
28462306a36Sopenharmony_ci
28562306a36Sopenharmony_ci	work = perf_kwork_add_work(kwork, tmp.class, &tmp);
28662306a36Sopenharmony_ci	if (work == NULL)
28762306a36Sopenharmony_ci		return -1;
28862306a36Sopenharmony_ci
28962306a36Sopenharmony_ci	if (kwork->report == KWORK_REPORT_RUNTIME) {
29062306a36Sopenharmony_ci		work->nr_atoms = data->nr;
29162306a36Sopenharmony_ci		work->total_runtime = data->total_time;
29262306a36Sopenharmony_ci		work->max_runtime = data->max_time;
29362306a36Sopenharmony_ci		work->max_runtime_start = data->max_time_start;
29462306a36Sopenharmony_ci		work->max_runtime_end = data->max_time_end;
29562306a36Sopenharmony_ci	} else if (kwork->report == KWORK_REPORT_LATENCY) {
29662306a36Sopenharmony_ci		work->nr_atoms = data->nr;
29762306a36Sopenharmony_ci		work->total_latency = data->total_time;
29862306a36Sopenharmony_ci		work->max_latency = data->max_time;
29962306a36Sopenharmony_ci		work->max_latency_start = data->max_time_start;
30062306a36Sopenharmony_ci		work->max_latency_end = data->max_time_end;
30162306a36Sopenharmony_ci	} else {
30262306a36Sopenharmony_ci		pr_debug("Invalid bpf report type %d\n", kwork->report);
30362306a36Sopenharmony_ci		return -1;
30462306a36Sopenharmony_ci	}
30562306a36Sopenharmony_ci
30662306a36Sopenharmony_ci	kwork->timestart = (u64)ts_start.tv_sec * NSEC_PER_SEC + ts_start.tv_nsec;
30762306a36Sopenharmony_ci	kwork->timeend = (u64)ts_end.tv_sec * NSEC_PER_SEC + ts_end.tv_nsec;
30862306a36Sopenharmony_ci
30962306a36Sopenharmony_ci	return 0;
31062306a36Sopenharmony_ci}
31162306a36Sopenharmony_ci
31262306a36Sopenharmony_ciint perf_kwork__report_read_bpf(struct perf_kwork *kwork)
31362306a36Sopenharmony_ci{
31462306a36Sopenharmony_ci	struct report_data data;
31562306a36Sopenharmony_ci	struct work_key key = {
31662306a36Sopenharmony_ci		.type = 0,
31762306a36Sopenharmony_ci		.cpu  = 0,
31862306a36Sopenharmony_ci		.id   = 0,
31962306a36Sopenharmony_ci	};
32062306a36Sopenharmony_ci	struct work_key prev = {
32162306a36Sopenharmony_ci		.type = 0,
32262306a36Sopenharmony_ci		.cpu  = 0,
32362306a36Sopenharmony_ci		.id   = 0,
32462306a36Sopenharmony_ci	};
32562306a36Sopenharmony_ci	int fd = bpf_map__fd(skel->maps.perf_kwork_report);
32662306a36Sopenharmony_ci
32762306a36Sopenharmony_ci	if (fd < 0) {
32862306a36Sopenharmony_ci		pr_debug("Invalid report fd\n");
32962306a36Sopenharmony_ci		return -1;
33062306a36Sopenharmony_ci	}
33162306a36Sopenharmony_ci
33262306a36Sopenharmony_ci	while (!bpf_map_get_next_key(fd, &prev, &key)) {
33362306a36Sopenharmony_ci		if ((bpf_map_lookup_elem(fd, &key, &data)) != 0) {
33462306a36Sopenharmony_ci			pr_debug("Failed to lookup report elem\n");
33562306a36Sopenharmony_ci			return -1;
33662306a36Sopenharmony_ci		}
33762306a36Sopenharmony_ci
33862306a36Sopenharmony_ci		if ((data.nr != 0) && (add_work(kwork, &key, &data) != 0))
33962306a36Sopenharmony_ci			return -1;
34062306a36Sopenharmony_ci
34162306a36Sopenharmony_ci		prev = key;
34262306a36Sopenharmony_ci	}
34362306a36Sopenharmony_ci	return 0;
34462306a36Sopenharmony_ci}
34562306a36Sopenharmony_ci
34662306a36Sopenharmony_civoid perf_kwork__report_cleanup_bpf(void)
34762306a36Sopenharmony_ci{
34862306a36Sopenharmony_ci	kwork_trace_bpf__destroy(skel);
34962306a36Sopenharmony_ci}
350