From patchwork Sun Sep 6 07:13:31 2015 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Wang Nan X-Patchwork-Id: 53168 Return-Path: X-Original-To: linaro@patches.linaro.org Delivered-To: linaro@patches.linaro.org Received: from mail-lb0-f197.google.com (mail-lb0-f197.google.com [209.85.217.197]) by patches.linaro.org (Postfix) with ESMTPS id 2A59722B05 for ; Sun, 6 Sep 2015 07:15:21 +0000 (UTC) Received: by lbcjc2 with SMTP id jc2sf17265583lbc.0 for ; Sun, 06 Sep 2015 00:15:20 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:delivered-to:from:to:cc:subject:date:message-id :in-reply-to:references:mime-version:content-type:sender:precedence :list-id:x-original-sender:x-original-authentication-results :mailing-list:list-post:list-help:list-archive:list-unsubscribe; bh=7MHRa4sRnPBDDA7RAEVgSLXCxIb+rwimIU5zb49h4TQ=; b=Q6aVqi200EiI/dlnt97v5muuBd6ErRGJNWjPMxf8uGrFF0WbJ1XMNST40Z9IOspeSb JFxzqbS7ET3+K15WhI0yml44cgNZSli+XG3EVfV4+Ypz5WLZ/HMgX795zM374odKuprM BkhXwWd9hb8X04gNI4JndfymSpHu7iIzyzhSU2UglHKDbaT0F1ZEUdwxByzF50KRC9u6 t2+RVW4BWA5HNVasa3b30G1vttG5YsJyZd7Ng02dyddHQmDopgn4s6Ni/WzyXLCaUAsV ohpZ511izWHBlT/DuukfQMTq2ZrcMV5jN952erKcExfUoN3Wm5yYy2c7QSCMtb5jZn9T uK4Q== X-Gm-Message-State: ALoCoQlZOL+GQvsCdlw1U4vqRnqnxRa7V5+e2Crl5ppjMxMYUttIygZ9sn763+KtEgqubzGxPeIQ X-Received: by 10.112.78.101 with SMTP id a5mr3387972lbx.9.1441523719863; Sun, 06 Sep 2015 00:15:19 -0700 (PDT) X-BeenThere: patchwork-forward@linaro.org Received: by 10.152.239.161 with SMTP id vt1ls409877lac.41.gmail; Sun, 06 Sep 2015 00:15:19 -0700 (PDT) X-Received: by 10.112.146.106 with SMTP id tb10mr11597195lbb.22.1441523719680; Sun, 06 Sep 2015 00:15:19 -0700 (PDT) Received: from mail-la0-f46.google.com (mail-la0-f46.google.com. [209.85.215.46]) by mx.google.com with ESMTPS id 7si7210570law.133.2015.09.06.00.15.19 for (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 06 Sep 2015 00:15:19 -0700 (PDT) Received-SPF: pass (google.com: domain of patch+caf_=patchwork-forward=linaro.org@linaro.org designates 209.85.215.46 as permitted sender) client-ip=209.85.215.46; Received: by lagj9 with SMTP id j9so35899569lag.2 for ; Sun, 06 Sep 2015 00:15:19 -0700 (PDT) X-Received: by 10.112.125.134 with SMTP id mq6mr647120lbb.19.1441523719507; Sun, 06 Sep 2015 00:15:19 -0700 (PDT) X-Forwarded-To: patchwork-forward@linaro.org X-Forwarded-For: patch@linaro.org patchwork-forward@linaro.org Delivered-To: patch@linaro.org Received: by 10.112.164.42 with SMTP id yn10csp843445lbb; Sun, 6 Sep 2015 00:15:18 -0700 (PDT) X-Received: by 10.50.138.8 with SMTP id qm8mr10522027igb.33.1441523718238; Sun, 06 Sep 2015 00:15:18 -0700 (PDT) Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id fw16si13802434pdb.10.2015.09.06.00.15.17; Sun, 06 Sep 2015 00:15:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751911AbbIFHPL (ORCPT + 28 others); Sun, 6 Sep 2015 03:15:11 -0400 Received: from szxga01-in.huawei.com ([58.251.152.64]:7332 "EHLO szxga01-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751073AbbIFHOk (ORCPT ); Sun, 6 Sep 2015 03:14:40 -0400 Received: from 172.24.1.48 (EHLO SZXEML423-HUB.china.huawei.com) ([172.24.1.48]) by szxrg01-dlp.huawei.com (MOS 4.3.7-GA FastPath queued) with ESMTP id CUK94057; Sun, 06 Sep 2015 15:14:16 +0800 (CST) Received: from linux-4hy3.site (10.107.193.248) by SZXEML423-HUB.china.huawei.com (10.82.67.154) with Microsoft SMTP Server id 14.3.235.1; Sun, 6 Sep 2015 15:14:08 +0800 From: Wang Nan To: , , , CC: , , , , , , , , , , , Subject: [PATCH 15/27] perf test: Add 'perf test BPF' Date: Sun, 6 Sep 2015 07:13:31 +0000 Message-ID: <1441523623-152703-16-git-send-email-wangnan0@huawei.com> X-Mailer: git-send-email 1.8.3.4 In-Reply-To: <1441523623-152703-1-git-send-email-wangnan0@huawei.com> References: <1441523623-152703-1-git-send-email-wangnan0@huawei.com> MIME-Version: 1.0 X-Originating-IP: [10.107.193.248] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: list List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Removed-Original-Auth: Dkim didn't pass. X-Original-Sender: wangnan0@huawei.com X-Original-Authentication-Results: mx.google.com; spf=pass (google.com: domain of patch+caf_=patchwork-forward=linaro.org@linaro.org designates 209.85.215.46 as permitted sender) smtp.mailfrom=patch+caf_=patchwork-forward=linaro.org@linaro.org Mailing-list: list patchwork-forward@linaro.org; contact patchwork-forward+owners@linaro.org X-Google-Group-Id: 836684582541 List-Post: , List-Help: , List-Archive: List-Unsubscribe: , This patch adds BPF testcase for testing BPF event filtering. By utilizing the result of 'perf test LLVM', this patch compiles the eBPF sample program then test it ability. The BPF script in 'perf test LLVM' collects half of execution of epoll_pwait(). This patch runs 111 times of it, so the resule should contains 56 samples. Signed-off-by: Wang Nan Cc: Arnaldo Carvalho de Melo Cc: Alexei Starovoitov Cc: Brendan Gregg Cc: Daniel Borkmann Cc: David Ahern Cc: He Kuang Cc: Jiri Olsa Cc: Kaixu Xia Cc: Masami Hiramatsu Cc: Namhyung Kim Cc: Peter Zijlstra Cc: Zefan Li Cc: pi3orama@163.com Link: http://lkml.kernel.org/n/1440151770-129878-16-git-send-email-wangnan0@huawei.com [wangnan: skip BPF test if not run by root] --- tools/perf/tests/Build | 1 + tools/perf/tests/bpf.c | 173 ++++++++++++++++++++++++++++++++++++++++ tools/perf/tests/builtin-test.c | 4 + tools/perf/tests/llvm.c | 19 +++++ tools/perf/tests/llvm.h | 1 + tools/perf/tests/tests.h | 1 + tools/perf/util/bpf-loader.c | 14 ++++ tools/perf/util/bpf-loader.h | 8 ++ 8 files changed, 221 insertions(+) create mode 100644 tools/perf/tests/bpf.c diff --git a/tools/perf/tests/Build b/tools/perf/tests/Build index e80f787..5cfb420 100644 --- a/tools/perf/tests/Build +++ b/tools/perf/tests/Build @@ -33,6 +33,7 @@ perf-y += parse-no-sample-id-all.o perf-y += kmod-path.o perf-y += thread-map.o perf-y += llvm.o llvm-src.o +perf-y += bpf.o perf-y += topology.o $(OUTPUT)tests/llvm-src.c: tests/bpf-script-example.c diff --git a/tools/perf/tests/bpf.c b/tools/perf/tests/bpf.c new file mode 100644 index 0000000..e256c12 --- /dev/null +++ b/tools/perf/tests/bpf.c @@ -0,0 +1,173 @@ +#include +#include +#include +#include +#include "tests.h" +#include "llvm.h" +#include "debug.h" +#define NR_ITERS 111 + +#ifdef HAVE_LIBBPF_SUPPORT + +static int epoll_pwait_loop(void) +{ + int i; + + /* Should fail NR_ITERS times */ + for (i = 0; i < NR_ITERS; i++) + epoll_pwait(-(i + 1), NULL, 0, 0, NULL); + return 0; +} + +static int prepare_bpf(void *obj_buf, size_t obj_buf_sz) +{ + int err; + char errbuf[BUFSIZ]; + + err = bpf__prepare_load_buffer(obj_buf, obj_buf_sz, NULL); + if (err) { + bpf__strerror_prepare_load("[buffer]", false, err, errbuf, + sizeof(errbuf)); + fprintf(stderr, " (%s)", errbuf); + return TEST_FAIL; + } + + err = bpf__probe(); + if (err) { + bpf__strerror_load(err, errbuf, sizeof(errbuf)); + fprintf(stderr, " (%s)", errbuf); + return TEST_FAIL; + } + + err = bpf__load(); + if (err) { + bpf__strerror_load(err, errbuf, sizeof(errbuf)); + fprintf(stderr, " (%s)", errbuf); + return TEST_FAIL; + } + + return 0; +} + +static int do_test(void) +{ + struct record_opts opts = { + .target = { + .uid = UINT_MAX, + .uses_mmap = true, + }, + .freq = 0, + .mmap_pages = 256, + .default_interval = 1, + }; + + int err, i, count = 0; + char pid[16]; + char sbuf[STRERR_BUFSIZE]; + struct perf_evlist *evlist; + + snprintf(pid, sizeof(pid), "%d", getpid()); + pid[sizeof(pid) - 1] = '\0'; + opts.target.tid = opts.target.pid = pid; + + /* Instead of perf_evlist__new_default, don't add default events */ + evlist = perf_evlist__new(); + if (!evlist) { + pr_debug("No ehough memory to create evlist\n"); + return -ENOMEM; + } + + err = perf_evlist__create_maps(evlist, &opts.target); + if (err < 0) { + pr_debug("Not enough memory to create thread/cpu maps\n"); + goto out_delete_evlist; + } + + err = perf_evlist__add_bpf(evlist); + if (err) { + fprintf(stderr, " (Failed to add events selected by BPF)"); + goto out_delete_evlist; + } + + perf_evlist__config(evlist, &opts); + + err = perf_evlist__open(evlist); + if (err < 0) { + pr_debug("perf_evlist__open: %s\n", + strerror_r(errno, sbuf, sizeof(sbuf))); + goto out_delete_evlist; + } + + err = perf_evlist__mmap(evlist, opts.mmap_pages, false); + if (err < 0) { + pr_debug("perf_evlist__mmap: %s\n", + strerror_r(errno, sbuf, sizeof(sbuf))); + goto out_delete_evlist; + } + + perf_evlist__enable(evlist); + epoll_pwait_loop(); + perf_evlist__disable(evlist); + + for (i = 0; i < evlist->nr_mmaps; i++) { + union perf_event *event; + + while ((event = perf_evlist__mmap_read(evlist, i)) != NULL) { + const u32 type = event->header.type; + + if (type == PERF_RECORD_SAMPLE) + count ++; + } + } + + if (count != (NR_ITERS + 1) / 2) { + fprintf(stderr, " (filter result incorrect)"); + err = -EBADF; + } + +out_delete_evlist: + perf_evlist__delete(evlist); + if (err) + return TEST_FAIL; + return 0; +} + +int test__bpf(void) +{ + int err; + void *obj_buf; + size_t obj_buf_sz; + + if (geteuid() != 0) { + fprintf(stderr, " (try run as root)"); + return TEST_SKIP; + } + + test_llvm__fetch_bpf_obj(&obj_buf, &obj_buf_sz); + if (!obj_buf || !obj_buf_sz) { + if (verbose == 0) + fprintf(stderr, " (fix 'perf test LLVM' first)"); + return TEST_SKIP; + } + + err = prepare_bpf(obj_buf, obj_buf_sz); + if (err) + goto out; + + err = do_test(); + if (err) + goto out; +out: + bpf__unprobe(); + bpf__clear(); + if (err) + return TEST_FAIL; + return 0; +} + +#else +int test__bpf(void) +{ + return TEST_SKIP; +} +#endif diff --git a/tools/perf/tests/builtin-test.c b/tools/perf/tests/builtin-test.c index ba3cf10..80cee5c 100644 --- a/tools/perf/tests/builtin-test.c +++ b/tools/perf/tests/builtin-test.c @@ -195,6 +195,10 @@ static struct test { .func = test_session_topology, }, { + .desc = "Test BPF filter", + .func = test__bpf, + }, + { .func = NULL, }, }; diff --git a/tools/perf/tests/llvm.c b/tools/perf/tests/llvm.c index 236bf39..fd5fdb0 100644 --- a/tools/perf/tests/llvm.c +++ b/tools/perf/tests/llvm.c @@ -174,3 +174,22 @@ void test__llvm_cleanup(void) (~((unsigned long)page_size - 1)); munmap((void *)boundary, buf_end - boundary); } + +void +test_llvm__fetch_bpf_obj(void **p_obj_buf, size_t *p_obj_buf_sz) +{ + *p_obj_buf = NULL; + *p_obj_buf_sz = 0; + + if (!p_test_llvm__bpf_result) { + test__llvm_prepare(); + test__llvm(); + test__llvm_cleanup(); + } + + if (!p_test_llvm__bpf_result) + return; + + *p_obj_buf = p_test_llvm__bpf_result->object; + *p_obj_buf_sz = p_test_llvm__bpf_result->size; +} diff --git a/tools/perf/tests/llvm.h b/tools/perf/tests/llvm.h index 1e89e46..2fd7ed6 100644 --- a/tools/perf/tests/llvm.h +++ b/tools/perf/tests/llvm.h @@ -10,5 +10,6 @@ struct test_llvm__bpf_result { extern struct test_llvm__bpf_result *p_test_llvm__bpf_result; extern const char test_llvm__bpf_prog[]; +void test_llvm__fetch_bpf_obj(void **p_obj_buf, size_t *p_obj_buf_sz); #endif diff --git a/tools/perf/tests/tests.h b/tools/perf/tests/tests.h index a5e6f641..b413f08 100644 --- a/tools/perf/tests/tests.h +++ b/tools/perf/tests/tests.h @@ -65,6 +65,7 @@ int test__thread_map(void); int test__llvm(void); void test__llvm_prepare(void); void test__llvm_cleanup(void); +int test__bpf(void); int test__insn_x86(void); int test_session_topology(void); diff --git a/tools/perf/util/bpf-loader.c b/tools/perf/util/bpf-loader.c index 7229f8e..1994552 100644 --- a/tools/perf/util/bpf-loader.c +++ b/tools/perf/util/bpf-loader.c @@ -165,6 +165,20 @@ sync_bpf_program_pev(struct bpf_program *prog) return 0; } +int bpf__prepare_load_buffer(void *obj_buf, size_t obj_buf_sz, + const char *name) +{ + struct bpf_object *obj; + + obj = bpf_object__open_buffer(obj_buf, obj_buf_sz, name); + if (!obj) { + pr_debug("bpf: failed to load buffer\n"); + return -EINVAL; + } + + return 0; +} + int bpf__prepare_load(const char *filename, bool source) { struct bpf_object *obj; diff --git a/tools/perf/util/bpf-loader.h b/tools/perf/util/bpf-loader.h index 9a2358c..d91d015 100644 --- a/tools/perf/util/bpf-loader.h +++ b/tools/perf/util/bpf-loader.h @@ -18,6 +18,8 @@ typedef int (*bpf_prog_iter_callback_t)(struct probe_trace_event *tev, #ifdef HAVE_LIBBPF_SUPPORT int bpf__prepare_load(const char *filename, bool source); +int bpf__prepare_load_buffer(void *obj_buf, size_t obj_buf_sz, + const char *name); int bpf__strerror_prepare_load(const char *filename, bool source, int err, char *buf, size_t size); int bpf__probe(void); @@ -38,6 +40,12 @@ static inline int bpf__prepare_load(const char *filename __maybe_unused, return -1; } +static inline int bpf__prepare_load_buffer(void *obj_buf __maybe_unused, + size_t obj_buf_sz __maybe_unused) +{ + return bpf__prepare_load(NULL, false); +} + static inline int bpf__probe(void) { return 0; } static inline int bpf__unprobe(void) { return 0; } static inline int bpf__load(void) { return 0; }