mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-12-17 01:34:00 +08:00
c8f6ae1fb2
**perf-<pid>.map and jit-<pid>.dump designs: When a JIT generates code to be executed, it must allocate memory and mark it executable using an mmap call. *** perf-<pid>.map design The perf-<pid>.map assumes that any sample recorded in an anonymous memory page is JIT code. It then tries to resolve the symbol name by looking at the process' perf-<pid>.map. *** jit-<pid>.dump design The jit-<pid>.dump mechanism takes a different approach. It requires a JIT to write a `<path>/jit-<pid>.dump` file. This file must also be mmapped so that perf inject -jit can find the file. The JIT must also add JIT_CODE_LOAD records for any functions it generates. The records are timestamped using a clock which can be correlated to the perf record clock. After perf record, the `perf inject -jit` pass parses the recording looking for a `<path>/jit-<pid>.dump` file. When it finds the file, it parses it and for each JIT_CODE_LOAD record: * creates an elf file `<path>/jitted-<pid>-<code_index>.so * injects a new mmap record mapping the new elf file into the process. *** Coexistence design The kernel and perf support both of these mechanisms. We need to make sure perf works on an app supporting either or both of these mechanisms. Both designs rely on mmap records to determine how to resolve an ip address. The mmap records of both techniques by definition overlap. When the JIT compiles a method, it must: * allocate memory (mmap) * add execution privilege (mprotect or mmap. either will generate an mmap event form the kernel to perf) * compile code into memory * add a function record to perf-<pid>.map and/or jit-<pid>.dump Because the jit-<pid>.dump mechanism supports greater capabilities, perf prefers the symbols from jit-<pid>.dump. It implements this based on timestamp ordering of events. There is an implicit ASSUMPTION that the JIT_CODE_LOAD record timestamp will be after the // anon mmap event that was generated during memory allocation or adding the execution privilege setting. *** Problems with the ASSUMPTION The ASSUMPTION made in the Coexistence design section above is violated in the following scenario. *** Scenario While a JIT is jitting code it will eventually need to commit more pages and change these pages to executable permissions. Typically the JIT will want these collocated to minimize branch displacements. The kernel will coalesce these anonymous mapping with identical permissions before sending an MMAP event for the new pages. The address range of the new mmap will not be just the most recently mmap pages. It will include the entire coalesced mmap region. See mm/mmap.c unsigned long mmap_region(struct file *file, unsigned long addr, unsigned long len, vm_flags_t vm_flags, unsigned long pgoff, struct list_head *uf) { ... /* * Can we just expand an old mapping? */ ... perf_event_mmap(vma); ... } *** Symptoms The coalesced // anon mmap event will be timestamped after the JIT_CODE_LOAD records. This means it will be used as the most recent mapping for that entire address range. For remaining events it will look at the inferior perf-<pid>.map for symbols. If both mechanisms are supported, the symbol will appear twice with different module names. This causes weird behavior in reporting. If only jit-<pid>.dump is supported, the symbol will no longer be resolved. ** Implemented solution This patch solves the issue by removing // anon mmap events for any process which has a valid jit-<pid>.dump file. It tracks on a per process basis to handle the case where some running apps support jit-<pid>.dump, but some only support perf-<pid>.map. It adds new assumptions: * // anon mmap events are only required for perf-<pid>.map support. * An app that uses jit-<pid>.dump, no longer needs perf-<pid>.map support. It assumes that any perf-<pid>.map info is inferior. *** Details Use thread->priv to store whether a jitdump file has been processed During "perf inject --jit", discard "//anon*" mmap events for any pid which has sucessfully processed a jitdump file. ** Testing: // jitdump case perf record <app with jitdump> perf inject --jit --input perf.data --output perfjit.data // verify mmap "//anon" events present initially perf script --input perf.data --show-mmap-events | grep '//anon' // verify mmap "//anon" events removed perf script --input perfjit.data --show-mmap-events | grep '//anon' // no jitdump case perf record <app without jitdump> perf inject --jit --input perf.data --output perfjit.data // verify mmap "//anon" events present initially perf script --input perf.data --show-mmap-events | grep '//anon' // verify mmap "//anon" events not removed perf script --input perfjit.data --show-mmap-events | grep '//anon' ** Repro: This issue was discovered while testing the initial CoreCLR jitdump implementation. https://github.com/dotnet/coreclr/pull/26897. ** Alternate solutions considered These were also briefly considered: * Change kernel to not coalesce mmap regions. * Change kernel reporting of coalesced mmap regions to perf. Only include newly mapped memory. * Only strip parts of // anon mmap events overlapping existing jitted-<pid>-<code_index>.so mmap events. Signed-off-by: Steve MacLean <Steve.MacLean@Microsoft.com> Acked-by: Ian Rogers <irogers@google.com> Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com> Cc: Jiri Olsa <jolsa@redhat.com> Cc: Mark Rutland <mark.rutland@arm.com> Cc: Namhyung Kim <namhyung@kernel.org> Cc: Peter Zijlstra <peterz@infradead.org> Cc: Stephane Eranian <eranian@google.com> Link: http://lore.kernel.org/lkml/1590544271-125795-1-git-send-email-steve.maclean@linux.microsoft.com Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
842 lines
22 KiB
C
842 lines
22 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/*
|
|
* builtin-inject.c
|
|
*
|
|
* Builtin inject command: Examine the live mode (stdin) event stream
|
|
* and repipe it to stdout while optionally injecting additional
|
|
* events into it.
|
|
*/
|
|
#include "builtin.h"
|
|
|
|
#include "util/color.h"
|
|
#include "util/dso.h"
|
|
#include "util/evlist.h"
|
|
#include "util/evsel.h"
|
|
#include "util/map.h"
|
|
#include "util/session.h"
|
|
#include "util/tool.h"
|
|
#include "util/debug.h"
|
|
#include "util/build-id.h"
|
|
#include "util/data.h"
|
|
#include "util/auxtrace.h"
|
|
#include "util/jit.h"
|
|
#include "util/symbol.h"
|
|
#include "util/synthetic-events.h"
|
|
#include "util/thread.h"
|
|
#include <linux/err.h>
|
|
|
|
#include <subcmd/parse-options.h>
|
|
|
|
#include <linux/list.h>
|
|
#include <errno.h>
|
|
#include <signal.h>
|
|
|
|
struct perf_inject {
|
|
struct perf_tool tool;
|
|
struct perf_session *session;
|
|
bool build_ids;
|
|
bool sched_stat;
|
|
bool have_auxtrace;
|
|
bool strip;
|
|
bool jit_mode;
|
|
const char *input_name;
|
|
struct perf_data output;
|
|
u64 bytes_written;
|
|
u64 aux_id;
|
|
struct list_head samples;
|
|
struct itrace_synth_opts itrace_synth_opts;
|
|
char event_copy[PERF_SAMPLE_MAX_SIZE];
|
|
};
|
|
|
|
struct event_entry {
|
|
struct list_head node;
|
|
u32 tid;
|
|
union perf_event event[];
|
|
};
|
|
|
|
static int output_bytes(struct perf_inject *inject, void *buf, size_t sz)
|
|
{
|
|
ssize_t size;
|
|
|
|
size = perf_data__write(&inject->output, buf, sz);
|
|
if (size < 0)
|
|
return -errno;
|
|
|
|
inject->bytes_written += size;
|
|
return 0;
|
|
}
|
|
|
|
static int perf_event__repipe_synth(struct perf_tool *tool,
|
|
union perf_event *event)
|
|
{
|
|
struct perf_inject *inject = container_of(tool, struct perf_inject,
|
|
tool);
|
|
|
|
return output_bytes(inject, event, event->header.size);
|
|
}
|
|
|
|
static int perf_event__repipe_oe_synth(struct perf_tool *tool,
|
|
union perf_event *event,
|
|
struct ordered_events *oe __maybe_unused)
|
|
{
|
|
return perf_event__repipe_synth(tool, event);
|
|
}
|
|
|
|
#ifdef HAVE_JITDUMP
|
|
static int perf_event__drop_oe(struct perf_tool *tool __maybe_unused,
|
|
union perf_event *event __maybe_unused,
|
|
struct ordered_events *oe __maybe_unused)
|
|
{
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
static int perf_event__repipe_op2_synth(struct perf_session *session,
|
|
union perf_event *event)
|
|
{
|
|
return perf_event__repipe_synth(session->tool, event);
|
|
}
|
|
|
|
static int perf_event__repipe_attr(struct perf_tool *tool,
|
|
union perf_event *event,
|
|
struct evlist **pevlist)
|
|
{
|
|
struct perf_inject *inject = container_of(tool, struct perf_inject,
|
|
tool);
|
|
int ret;
|
|
|
|
ret = perf_event__process_attr(tool, event, pevlist);
|
|
if (ret)
|
|
return ret;
|
|
|
|
if (!inject->output.is_pipe)
|
|
return 0;
|
|
|
|
return perf_event__repipe_synth(tool, event);
|
|
}
|
|
|
|
#ifdef HAVE_AUXTRACE_SUPPORT
|
|
|
|
static int copy_bytes(struct perf_inject *inject, int fd, off_t size)
|
|
{
|
|
char buf[4096];
|
|
ssize_t ssz;
|
|
int ret;
|
|
|
|
while (size > 0) {
|
|
ssz = read(fd, buf, min(size, (off_t)sizeof(buf)));
|
|
if (ssz < 0)
|
|
return -errno;
|
|
ret = output_bytes(inject, buf, ssz);
|
|
if (ret)
|
|
return ret;
|
|
size -= ssz;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static s64 perf_event__repipe_auxtrace(struct perf_session *session,
|
|
union perf_event *event)
|
|
{
|
|
struct perf_tool *tool = session->tool;
|
|
struct perf_inject *inject = container_of(tool, struct perf_inject,
|
|
tool);
|
|
int ret;
|
|
|
|
inject->have_auxtrace = true;
|
|
|
|
if (!inject->output.is_pipe) {
|
|
off_t offset;
|
|
|
|
offset = lseek(inject->output.file.fd, 0, SEEK_CUR);
|
|
if (offset == -1)
|
|
return -errno;
|
|
ret = auxtrace_index__auxtrace_event(&session->auxtrace_index,
|
|
event, offset);
|
|
if (ret < 0)
|
|
return ret;
|
|
}
|
|
|
|
if (perf_data__is_pipe(session->data) || !session->one_mmap) {
|
|
ret = output_bytes(inject, event, event->header.size);
|
|
if (ret < 0)
|
|
return ret;
|
|
ret = copy_bytes(inject, perf_data__fd(session->data),
|
|
event->auxtrace.size);
|
|
} else {
|
|
ret = output_bytes(inject, event,
|
|
event->header.size + event->auxtrace.size);
|
|
}
|
|
if (ret < 0)
|
|
return ret;
|
|
|
|
return event->auxtrace.size;
|
|
}
|
|
|
|
#else
|
|
|
|
static s64
|
|
perf_event__repipe_auxtrace(struct perf_session *session __maybe_unused,
|
|
union perf_event *event __maybe_unused)
|
|
{
|
|
pr_err("AUX area tracing not supported\n");
|
|
return -EINVAL;
|
|
}
|
|
|
|
#endif
|
|
|
|
static int perf_event__repipe(struct perf_tool *tool,
|
|
union perf_event *event,
|
|
struct perf_sample *sample __maybe_unused,
|
|
struct machine *machine __maybe_unused)
|
|
{
|
|
return perf_event__repipe_synth(tool, event);
|
|
}
|
|
|
|
static int perf_event__drop(struct perf_tool *tool __maybe_unused,
|
|
union perf_event *event __maybe_unused,
|
|
struct perf_sample *sample __maybe_unused,
|
|
struct machine *machine __maybe_unused)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static int perf_event__drop_aux(struct perf_tool *tool,
|
|
union perf_event *event __maybe_unused,
|
|
struct perf_sample *sample,
|
|
struct machine *machine __maybe_unused)
|
|
{
|
|
struct perf_inject *inject = container_of(tool, struct perf_inject, tool);
|
|
|
|
if (!inject->aux_id)
|
|
inject->aux_id = sample->id;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static union perf_event *
|
|
perf_inject__cut_auxtrace_sample(struct perf_inject *inject,
|
|
union perf_event *event,
|
|
struct perf_sample *sample)
|
|
{
|
|
size_t sz1 = sample->aux_sample.data - (void *)event;
|
|
size_t sz2 = event->header.size - sample->aux_sample.size - sz1;
|
|
union perf_event *ev = (union perf_event *)inject->event_copy;
|
|
|
|
if (sz1 > event->header.size || sz2 > event->header.size ||
|
|
sz1 + sz2 > event->header.size ||
|
|
sz1 < sizeof(struct perf_event_header) + sizeof(u64))
|
|
return event;
|
|
|
|
memcpy(ev, event, sz1);
|
|
memcpy((void *)ev + sz1, (void *)event + event->header.size - sz2, sz2);
|
|
ev->header.size = sz1 + sz2;
|
|
((u64 *)((void *)ev + sz1))[-1] = 0;
|
|
|
|
return ev;
|
|
}
|
|
|
|
typedef int (*inject_handler)(struct perf_tool *tool,
|
|
union perf_event *event,
|
|
struct perf_sample *sample,
|
|
struct evsel *evsel,
|
|
struct machine *machine);
|
|
|
|
static int perf_event__repipe_sample(struct perf_tool *tool,
|
|
union perf_event *event,
|
|
struct perf_sample *sample,
|
|
struct evsel *evsel,
|
|
struct machine *machine)
|
|
{
|
|
struct perf_inject *inject = container_of(tool, struct perf_inject,
|
|
tool);
|
|
|
|
if (evsel && evsel->handler) {
|
|
inject_handler f = evsel->handler;
|
|
return f(tool, event, sample, evsel, machine);
|
|
}
|
|
|
|
build_id__mark_dso_hit(tool, event, sample, evsel, machine);
|
|
|
|
if (inject->itrace_synth_opts.set && sample->aux_sample.size)
|
|
event = perf_inject__cut_auxtrace_sample(inject, event, sample);
|
|
|
|
return perf_event__repipe_synth(tool, event);
|
|
}
|
|
|
|
static int perf_event__repipe_mmap(struct perf_tool *tool,
|
|
union perf_event *event,
|
|
struct perf_sample *sample,
|
|
struct machine *machine)
|
|
{
|
|
int err;
|
|
|
|
err = perf_event__process_mmap(tool, event, sample, machine);
|
|
perf_event__repipe(tool, event, sample, machine);
|
|
|
|
return err;
|
|
}
|
|
|
|
#ifdef HAVE_JITDUMP
|
|
static int perf_event__jit_repipe_mmap(struct perf_tool *tool,
|
|
union perf_event *event,
|
|
struct perf_sample *sample,
|
|
struct machine *machine)
|
|
{
|
|
struct perf_inject *inject = container_of(tool, struct perf_inject, tool);
|
|
u64 n = 0;
|
|
int ret;
|
|
|
|
/*
|
|
* if jit marker, then inject jit mmaps and generate ELF images
|
|
*/
|
|
ret = jit_process(inject->session, &inject->output, machine,
|
|
event->mmap.filename, event->mmap.pid, &n);
|
|
if (ret < 0)
|
|
return ret;
|
|
if (ret) {
|
|
inject->bytes_written += n;
|
|
return 0;
|
|
}
|
|
return perf_event__repipe_mmap(tool, event, sample, machine);
|
|
}
|
|
#endif
|
|
|
|
static int perf_event__repipe_mmap2(struct perf_tool *tool,
|
|
union perf_event *event,
|
|
struct perf_sample *sample,
|
|
struct machine *machine)
|
|
{
|
|
int err;
|
|
|
|
err = perf_event__process_mmap2(tool, event, sample, machine);
|
|
perf_event__repipe(tool, event, sample, machine);
|
|
|
|
return err;
|
|
}
|
|
|
|
#ifdef HAVE_JITDUMP
|
|
static int perf_event__jit_repipe_mmap2(struct perf_tool *tool,
|
|
union perf_event *event,
|
|
struct perf_sample *sample,
|
|
struct machine *machine)
|
|
{
|
|
struct perf_inject *inject = container_of(tool, struct perf_inject, tool);
|
|
u64 n = 0;
|
|
int ret;
|
|
|
|
/*
|
|
* if jit marker, then inject jit mmaps and generate ELF images
|
|
*/
|
|
ret = jit_process(inject->session, &inject->output, machine,
|
|
event->mmap2.filename, event->mmap2.pid, &n);
|
|
if (ret < 0)
|
|
return ret;
|
|
if (ret) {
|
|
inject->bytes_written += n;
|
|
return 0;
|
|
}
|
|
return perf_event__repipe_mmap2(tool, event, sample, machine);
|
|
}
|
|
#endif
|
|
|
|
static int perf_event__repipe_fork(struct perf_tool *tool,
|
|
union perf_event *event,
|
|
struct perf_sample *sample,
|
|
struct machine *machine)
|
|
{
|
|
int err;
|
|
|
|
err = perf_event__process_fork(tool, event, sample, machine);
|
|
perf_event__repipe(tool, event, sample, machine);
|
|
|
|
return err;
|
|
}
|
|
|
|
static int perf_event__repipe_comm(struct perf_tool *tool,
|
|
union perf_event *event,
|
|
struct perf_sample *sample,
|
|
struct machine *machine)
|
|
{
|
|
int err;
|
|
|
|
err = perf_event__process_comm(tool, event, sample, machine);
|
|
perf_event__repipe(tool, event, sample, machine);
|
|
|
|
return err;
|
|
}
|
|
|
|
static int perf_event__repipe_namespaces(struct perf_tool *tool,
|
|
union perf_event *event,
|
|
struct perf_sample *sample,
|
|
struct machine *machine)
|
|
{
|
|
int err = perf_event__process_namespaces(tool, event, sample, machine);
|
|
|
|
perf_event__repipe(tool, event, sample, machine);
|
|
|
|
return err;
|
|
}
|
|
|
|
static int perf_event__repipe_exit(struct perf_tool *tool,
|
|
union perf_event *event,
|
|
struct perf_sample *sample,
|
|
struct machine *machine)
|
|
{
|
|
int err;
|
|
|
|
err = perf_event__process_exit(tool, event, sample, machine);
|
|
perf_event__repipe(tool, event, sample, machine);
|
|
|
|
return err;
|
|
}
|
|
|
|
static int perf_event__repipe_tracing_data(struct perf_session *session,
|
|
union perf_event *event)
|
|
{
|
|
int err;
|
|
|
|
perf_event__repipe_synth(session->tool, event);
|
|
err = perf_event__process_tracing_data(session, event);
|
|
|
|
return err;
|
|
}
|
|
|
|
static int dso__read_build_id(struct dso *dso)
|
|
{
|
|
if (dso->has_build_id)
|
|
return 0;
|
|
|
|
if (filename__read_build_id(dso->long_name, dso->build_id,
|
|
sizeof(dso->build_id)) > 0) {
|
|
dso->has_build_id = true;
|
|
return 0;
|
|
}
|
|
|
|
return -1;
|
|
}
|
|
|
|
static int dso__inject_build_id(struct dso *dso, struct perf_tool *tool,
|
|
struct machine *machine)
|
|
{
|
|
u16 misc = PERF_RECORD_MISC_USER;
|
|
int err;
|
|
|
|
if (dso__read_build_id(dso) < 0) {
|
|
pr_debug("no build_id found for %s\n", dso->long_name);
|
|
return -1;
|
|
}
|
|
|
|
if (dso->kernel)
|
|
misc = PERF_RECORD_MISC_KERNEL;
|
|
|
|
err = perf_event__synthesize_build_id(tool, dso, misc, perf_event__repipe,
|
|
machine);
|
|
if (err) {
|
|
pr_err("Can't synthesize build_id event for %s\n", dso->long_name);
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int perf_event__inject_buildid(struct perf_tool *tool,
|
|
union perf_event *event,
|
|
struct perf_sample *sample,
|
|
struct evsel *evsel __maybe_unused,
|
|
struct machine *machine)
|
|
{
|
|
struct addr_location al;
|
|
struct thread *thread;
|
|
|
|
thread = machine__findnew_thread(machine, sample->pid, sample->tid);
|
|
if (thread == NULL) {
|
|
pr_err("problem processing %d event, skipping it.\n",
|
|
event->header.type);
|
|
goto repipe;
|
|
}
|
|
|
|
if (thread__find_map(thread, sample->cpumode, sample->ip, &al)) {
|
|
if (!al.map->dso->hit) {
|
|
al.map->dso->hit = 1;
|
|
if (map__load(al.map) >= 0) {
|
|
dso__inject_build_id(al.map->dso, tool, machine);
|
|
/*
|
|
* If this fails, too bad, let the other side
|
|
* account this as unresolved.
|
|
*/
|
|
} else {
|
|
#ifdef HAVE_LIBELF_SUPPORT
|
|
pr_warning("no symbols found in %s, maybe "
|
|
"install a debug package?\n",
|
|
al.map->dso->long_name);
|
|
#endif
|
|
}
|
|
}
|
|
}
|
|
|
|
thread__put(thread);
|
|
repipe:
|
|
perf_event__repipe(tool, event, sample, machine);
|
|
return 0;
|
|
}
|
|
|
|
static int perf_inject__sched_process_exit(struct perf_tool *tool,
|
|
union perf_event *event __maybe_unused,
|
|
struct perf_sample *sample,
|
|
struct evsel *evsel __maybe_unused,
|
|
struct machine *machine __maybe_unused)
|
|
{
|
|
struct perf_inject *inject = container_of(tool, struct perf_inject, tool);
|
|
struct event_entry *ent;
|
|
|
|
list_for_each_entry(ent, &inject->samples, node) {
|
|
if (sample->tid == ent->tid) {
|
|
list_del_init(&ent->node);
|
|
free(ent);
|
|
break;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int perf_inject__sched_switch(struct perf_tool *tool,
|
|
union perf_event *event,
|
|
struct perf_sample *sample,
|
|
struct evsel *evsel,
|
|
struct machine *machine)
|
|
{
|
|
struct perf_inject *inject = container_of(tool, struct perf_inject, tool);
|
|
struct event_entry *ent;
|
|
|
|
perf_inject__sched_process_exit(tool, event, sample, evsel, machine);
|
|
|
|
ent = malloc(event->header.size + sizeof(struct event_entry));
|
|
if (ent == NULL) {
|
|
color_fprintf(stderr, PERF_COLOR_RED,
|
|
"Not enough memory to process sched switch event!");
|
|
return -1;
|
|
}
|
|
|
|
ent->tid = sample->tid;
|
|
memcpy(&ent->event, event, event->header.size);
|
|
list_add(&ent->node, &inject->samples);
|
|
return 0;
|
|
}
|
|
|
|
static int perf_inject__sched_stat(struct perf_tool *tool,
|
|
union perf_event *event __maybe_unused,
|
|
struct perf_sample *sample,
|
|
struct evsel *evsel,
|
|
struct machine *machine)
|
|
{
|
|
struct event_entry *ent;
|
|
union perf_event *event_sw;
|
|
struct perf_sample sample_sw;
|
|
struct perf_inject *inject = container_of(tool, struct perf_inject, tool);
|
|
u32 pid = evsel__intval(evsel, sample, "pid");
|
|
|
|
list_for_each_entry(ent, &inject->samples, node) {
|
|
if (pid == ent->tid)
|
|
goto found;
|
|
}
|
|
|
|
return 0;
|
|
found:
|
|
event_sw = &ent->event[0];
|
|
evsel__parse_sample(evsel, event_sw, &sample_sw);
|
|
|
|
sample_sw.period = sample->period;
|
|
sample_sw.time = sample->time;
|
|
perf_event__synthesize_sample(event_sw, evsel->core.attr.sample_type,
|
|
evsel->core.attr.read_format, &sample_sw);
|
|
build_id__mark_dso_hit(tool, event_sw, &sample_sw, evsel, machine);
|
|
return perf_event__repipe(tool, event_sw, &sample_sw, machine);
|
|
}
|
|
|
|
static void sig_handler(int sig __maybe_unused)
|
|
{
|
|
session_done = 1;
|
|
}
|
|
|
|
static int evsel__check_stype(struct evsel *evsel, u64 sample_type, const char *sample_msg)
|
|
{
|
|
struct perf_event_attr *attr = &evsel->core.attr;
|
|
const char *name = evsel__name(evsel);
|
|
|
|
if (!(attr->sample_type & sample_type)) {
|
|
pr_err("Samples for %s event do not have %s attribute set.",
|
|
name, sample_msg);
|
|
return -EINVAL;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int drop_sample(struct perf_tool *tool __maybe_unused,
|
|
union perf_event *event __maybe_unused,
|
|
struct perf_sample *sample __maybe_unused,
|
|
struct evsel *evsel __maybe_unused,
|
|
struct machine *machine __maybe_unused)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static void strip_init(struct perf_inject *inject)
|
|
{
|
|
struct evlist *evlist = inject->session->evlist;
|
|
struct evsel *evsel;
|
|
|
|
inject->tool.context_switch = perf_event__drop;
|
|
|
|
evlist__for_each_entry(evlist, evsel)
|
|
evsel->handler = drop_sample;
|
|
}
|
|
|
|
static int __cmd_inject(struct perf_inject *inject)
|
|
{
|
|
int ret = -EINVAL;
|
|
struct perf_session *session = inject->session;
|
|
struct perf_data *data_out = &inject->output;
|
|
int fd = perf_data__fd(data_out);
|
|
u64 output_data_offset;
|
|
|
|
signal(SIGINT, sig_handler);
|
|
|
|
if (inject->build_ids || inject->sched_stat ||
|
|
inject->itrace_synth_opts.set) {
|
|
inject->tool.mmap = perf_event__repipe_mmap;
|
|
inject->tool.mmap2 = perf_event__repipe_mmap2;
|
|
inject->tool.fork = perf_event__repipe_fork;
|
|
inject->tool.tracing_data = perf_event__repipe_tracing_data;
|
|
}
|
|
|
|
output_data_offset = session->header.data_offset;
|
|
|
|
if (inject->build_ids) {
|
|
inject->tool.sample = perf_event__inject_buildid;
|
|
} else if (inject->sched_stat) {
|
|
struct evsel *evsel;
|
|
|
|
evlist__for_each_entry(session->evlist, evsel) {
|
|
const char *name = evsel__name(evsel);
|
|
|
|
if (!strcmp(name, "sched:sched_switch")) {
|
|
if (evsel__check_stype(evsel, PERF_SAMPLE_TID, "TID"))
|
|
return -EINVAL;
|
|
|
|
evsel->handler = perf_inject__sched_switch;
|
|
} else if (!strcmp(name, "sched:sched_process_exit"))
|
|
evsel->handler = perf_inject__sched_process_exit;
|
|
else if (!strncmp(name, "sched:sched_stat_", 17))
|
|
evsel->handler = perf_inject__sched_stat;
|
|
}
|
|
} else if (inject->itrace_synth_opts.set) {
|
|
session->itrace_synth_opts = &inject->itrace_synth_opts;
|
|
inject->itrace_synth_opts.inject = true;
|
|
inject->tool.comm = perf_event__repipe_comm;
|
|
inject->tool.namespaces = perf_event__repipe_namespaces;
|
|
inject->tool.exit = perf_event__repipe_exit;
|
|
inject->tool.id_index = perf_event__process_id_index;
|
|
inject->tool.auxtrace_info = perf_event__process_auxtrace_info;
|
|
inject->tool.auxtrace = perf_event__process_auxtrace;
|
|
inject->tool.aux = perf_event__drop_aux;
|
|
inject->tool.itrace_start = perf_event__drop_aux,
|
|
inject->tool.ordered_events = true;
|
|
inject->tool.ordering_requires_timestamps = true;
|
|
/* Allow space in the header for new attributes */
|
|
output_data_offset = 4096;
|
|
if (inject->strip)
|
|
strip_init(inject);
|
|
}
|
|
|
|
if (!inject->itrace_synth_opts.set)
|
|
auxtrace_index__free(&session->auxtrace_index);
|
|
|
|
if (!data_out->is_pipe)
|
|
lseek(fd, output_data_offset, SEEK_SET);
|
|
|
|
ret = perf_session__process_events(session);
|
|
if (ret)
|
|
return ret;
|
|
|
|
if (!data_out->is_pipe) {
|
|
if (inject->build_ids)
|
|
perf_header__set_feat(&session->header,
|
|
HEADER_BUILD_ID);
|
|
/*
|
|
* Keep all buildids when there is unprocessed AUX data because
|
|
* it is not known which ones the AUX trace hits.
|
|
*/
|
|
if (perf_header__has_feat(&session->header, HEADER_BUILD_ID) &&
|
|
inject->have_auxtrace && !inject->itrace_synth_opts.set)
|
|
dsos__hit_all(session);
|
|
/*
|
|
* The AUX areas have been removed and replaced with
|
|
* synthesized hardware events, so clear the feature flag and
|
|
* remove the evsel.
|
|
*/
|
|
if (inject->itrace_synth_opts.set) {
|
|
struct evsel *evsel;
|
|
|
|
perf_header__clear_feat(&session->header,
|
|
HEADER_AUXTRACE);
|
|
if (inject->itrace_synth_opts.last_branch ||
|
|
inject->itrace_synth_opts.add_last_branch)
|
|
perf_header__set_feat(&session->header,
|
|
HEADER_BRANCH_STACK);
|
|
evsel = perf_evlist__id2evsel_strict(session->evlist,
|
|
inject->aux_id);
|
|
if (evsel) {
|
|
pr_debug("Deleting %s\n", evsel__name(evsel));
|
|
evlist__remove(session->evlist, evsel);
|
|
evsel__delete(evsel);
|
|
}
|
|
}
|
|
session->header.data_offset = output_data_offset;
|
|
session->header.data_size = inject->bytes_written;
|
|
perf_session__write_header(session, session->evlist, fd, true);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
int cmd_inject(int argc, const char **argv)
|
|
{
|
|
struct perf_inject inject = {
|
|
.tool = {
|
|
.sample = perf_event__repipe_sample,
|
|
.mmap = perf_event__repipe,
|
|
.mmap2 = perf_event__repipe,
|
|
.comm = perf_event__repipe,
|
|
.fork = perf_event__repipe,
|
|
.exit = perf_event__repipe,
|
|
.lost = perf_event__repipe,
|
|
.lost_samples = perf_event__repipe,
|
|
.aux = perf_event__repipe,
|
|
.itrace_start = perf_event__repipe,
|
|
.context_switch = perf_event__repipe,
|
|
.read = perf_event__repipe_sample,
|
|
.throttle = perf_event__repipe,
|
|
.unthrottle = perf_event__repipe,
|
|
.attr = perf_event__repipe_attr,
|
|
.tracing_data = perf_event__repipe_op2_synth,
|
|
.auxtrace_info = perf_event__repipe_op2_synth,
|
|
.auxtrace = perf_event__repipe_auxtrace,
|
|
.auxtrace_error = perf_event__repipe_op2_synth,
|
|
.time_conv = perf_event__repipe_op2_synth,
|
|
.finished_round = perf_event__repipe_oe_synth,
|
|
.build_id = perf_event__repipe_op2_synth,
|
|
.id_index = perf_event__repipe_op2_synth,
|
|
.feature = perf_event__repipe_op2_synth,
|
|
},
|
|
.input_name = "-",
|
|
.samples = LIST_HEAD_INIT(inject.samples),
|
|
.output = {
|
|
.path = "-",
|
|
.mode = PERF_DATA_MODE_WRITE,
|
|
},
|
|
};
|
|
struct perf_data data = {
|
|
.mode = PERF_DATA_MODE_READ,
|
|
};
|
|
int ret;
|
|
|
|
struct option options[] = {
|
|
OPT_BOOLEAN('b', "build-ids", &inject.build_ids,
|
|
"Inject build-ids into the output stream"),
|
|
OPT_STRING('i', "input", &inject.input_name, "file",
|
|
"input file name"),
|
|
OPT_STRING('o', "output", &inject.output.path, "file",
|
|
"output file name"),
|
|
OPT_BOOLEAN('s', "sched-stat", &inject.sched_stat,
|
|
"Merge sched-stat and sched-switch for getting events "
|
|
"where and how long tasks slept"),
|
|
#ifdef HAVE_JITDUMP
|
|
OPT_BOOLEAN('j', "jit", &inject.jit_mode, "merge jitdump files into perf.data file"),
|
|
#endif
|
|
OPT_INCR('v', "verbose", &verbose,
|
|
"be more verbose (show build ids, etc)"),
|
|
OPT_STRING(0, "kallsyms", &symbol_conf.kallsyms_name, "file",
|
|
"kallsyms pathname"),
|
|
OPT_BOOLEAN('f', "force", &data.force, "don't complain, do it"),
|
|
OPT_CALLBACK_OPTARG(0, "itrace", &inject.itrace_synth_opts,
|
|
NULL, "opts", "Instruction Tracing options\n"
|
|
ITRACE_HELP,
|
|
itrace_parse_synth_opts),
|
|
OPT_BOOLEAN(0, "strip", &inject.strip,
|
|
"strip non-synthesized events (use with --itrace)"),
|
|
OPT_END()
|
|
};
|
|
const char * const inject_usage[] = {
|
|
"perf inject [<options>]",
|
|
NULL
|
|
};
|
|
#ifndef HAVE_JITDUMP
|
|
set_option_nobuild(options, 'j', "jit", "NO_LIBELF=1", true);
|
|
#endif
|
|
argc = parse_options(argc, argv, options, inject_usage, 0);
|
|
|
|
/*
|
|
* Any (unrecognized) arguments left?
|
|
*/
|
|
if (argc)
|
|
usage_with_options(inject_usage, options);
|
|
|
|
if (inject.strip && !inject.itrace_synth_opts.set) {
|
|
pr_err("--strip option requires --itrace option\n");
|
|
return -1;
|
|
}
|
|
|
|
if (perf_data__open(&inject.output)) {
|
|
perror("failed to create output file");
|
|
return -1;
|
|
}
|
|
|
|
inject.tool.ordered_events = inject.sched_stat;
|
|
|
|
data.path = inject.input_name;
|
|
inject.session = perf_session__new(&data, true, &inject.tool);
|
|
if (IS_ERR(inject.session))
|
|
return PTR_ERR(inject.session);
|
|
|
|
if (zstd_init(&(inject.session->zstd_data), 0) < 0)
|
|
pr_warning("Decompression initialization failed.\n");
|
|
|
|
if (inject.build_ids) {
|
|
/*
|
|
* to make sure the mmap records are ordered correctly
|
|
* and so that the correct especially due to jitted code
|
|
* mmaps. We cannot generate the buildid hit list and
|
|
* inject the jit mmaps at the same time for now.
|
|
*/
|
|
inject.tool.ordered_events = true;
|
|
inject.tool.ordering_requires_timestamps = true;
|
|
}
|
|
#ifdef HAVE_JITDUMP
|
|
if (inject.jit_mode) {
|
|
inject.tool.mmap2 = perf_event__jit_repipe_mmap2;
|
|
inject.tool.mmap = perf_event__jit_repipe_mmap;
|
|
inject.tool.ordered_events = true;
|
|
inject.tool.ordering_requires_timestamps = true;
|
|
/*
|
|
* JIT MMAP injection injects all MMAP events in one go, so it
|
|
* does not obey finished_round semantics.
|
|
*/
|
|
inject.tool.finished_round = perf_event__drop_oe;
|
|
}
|
|
#endif
|
|
ret = symbol__init(&inject.session->header.env);
|
|
if (ret < 0)
|
|
goto out_delete;
|
|
|
|
ret = __cmd_inject(&inject);
|
|
|
|
out_delete:
|
|
zstd_fini(&(inject.session->zstd_data));
|
|
perf_session__delete(inject.session);
|
|
return ret;
|
|
}
|