From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 45673C77B75 for ; Fri, 5 May 2023 21:33:34 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233120AbjEEVdd (ORCPT ); Fri, 5 May 2023 17:33:33 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35630 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230312AbjEEVdc (ORCPT ); Fri, 5 May 2023 17:33:32 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3C006F4; Fri, 5 May 2023 14:33:31 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 8FB84640D8; Fri, 5 May 2023 21:33:30 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 74DC4C433D2; Fri, 5 May 2023 21:33:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1683322409; bh=M4kahhFPmrKwLmC+dwLRPb9KCPDgd7YIFYm187tld3A=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=m5spICSYMMdXNA9wHyGc+FulwdcXkR8owOHc+m9ihjvpDcUM0ZP+xGyFkDCDTae+p qeg31jfxTIBoDPNErCo0O6lh81M5Y51fCeh8XMuY2YJA6g//xr1X+vI8RgTBe8Ffh3 rWT8e4hMgwgyA7aaxdroUzKRpBPz6meLsKarHStHqlWKQBYmcAgd8K4y8yWBCfRjcU SqJv9W7XEu4pYQVDMTr+y1+OdQieT2eViMMSzqic7JRJwsJwSfsCE8GzTU+qNpHpgI kaYlbYox6jL/K2mpdGlPkneCGW4w15X/lWnlSFqQs7RkAgdTWrwmeSOPzatqYDU0bB 7bNKd+k1o3SSw== Received: by quaco.ghostprotocols.net (Postfix, from userid 1000) id B359C403B5; Fri, 5 May 2023 18:33:26 -0300 (-03) Date: Fri, 5 May 2023 18:33:26 -0300 From: Arnaldo Carvalho de Melo To: Jiri Olsa Cc: Ian Rogers , Linus Torvalds , Andrii Nakryiko , Namhyung Kim , Song Liu , Andrii Nakryiko , Ingo Molnar , Thomas Gleixner , Clark Williams , Kate Carcia , linux-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org, Adrian Hunter , Changbin Du , Hao Luo , James Clark , Kan Liang , Roman Lozko , Stephane Eranian , Thomas Richter , Arnaldo Carvalho de Melo , bpf , Alexei Starovoitov , Yang Jihong , Mark Rutland , Paul Clarke Subject: Re: [PATCH RFC/RFT] perf bpf skels: Stop using vmlinux.h generated from BTF, use subset of used structs + CO-RE. was Re: BPF skels in perf .Re: [GIT PULL] perf tools changes for v6.4 Message-ID: References: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Url: http://acmel.wordpress.com Precedence: bulk List-ID: X-Mailing-List: linux-perf-users@vger.kernel.org Em Fri, May 05, 2023 at 10:43:36PM +0200, Jiri Olsa escreveu: > On Fri, May 05, 2023 at 10:04:47AM -0700, Ian Rogers wrote: > > On Fri, May 5, 2023 at 9:56 AM Arnaldo Carvalho de Melo wrote: > > > > > > Em Fri, May 05, 2023 at 10:33:15AM -0300, Arnaldo Carvalho de Melo escreveu: > > > > Em Fri, May 05, 2023 at 01:03:14AM +0200, Jiri Olsa escreveu: > > > > That with the preserve_access_index isn't needed, we need just the > > > > fields that we access in the tools, right? > > > > > > I'm now doing build test this in many distro containers, without the two > > > reverts, i.e. BPF skels continue as opt-out as in my pull request, to > > > test build and also for the functionality tests on the tools using such > > > bpf skels, see below, no touching of vmlinux nor BTF data during the > > > build. > > > > > > - Arnaldo > > > > > > From 882adaee50bc27f85374aeb2fbaa5b76bef60d05 Mon Sep 17 00:00:00 2001 > > > From: Arnaldo Carvalho de Melo > > > Date: Thu, 4 May 2023 19:03:51 -0300 > > > Subject: [PATCH 1/1] perf bpf skels: Stop using vmlinux.h generated from BTF, > > > use subset of used structs + CO-RE > > > > > > Linus reported a build break due to using a vmlinux without a BTF elf > > > section to generate the vmlinux.h header with bpftool for use in the BPF > > > tools in tools/perf/util/bpf_skel/*.bpf.c. > > > > > > Instead add a vmlinux.h file with the structs needed with the fields the > > > tools need, marking the structs with __attribute__((preserve_access_index)), > > > so that libbpf's CO-RE code can fixup the struct field offsets. > > > > > > In some cases the vmlinux.h file that was being generated by bpftool > > > from the kernel BTF information was not needed at all, just including > > > linux/bpf.h, sometimes linux/perf_event.h was enough as non-UAPI > > > types were not being used. > > > > > > To keep te patch small, include those UAPI headers from the trimmed down > > > vmlinux.h file, that then provides the tools with just the structs and > > > the subset of its fields needed for them. > > > > > > Testing it: > > > > > > # perf lock contention -b find / > /dev/null > > I tested perf lock con -abv -L rcu_state sleep 1 > and needed fix below > > jirka patch not applying trying to do it manually. - Arnaldo > > --- > From b12aea55f1171dc09cde2957f9019c84bda7adbb Mon Sep 17 00:00:00 2001 > From: Jiri Olsa > Date: Fri, 5 May 2023 13:28:46 +0200 > Subject: [PATCH] perf tools: Fix lock_contention bpf program > > We need to define empty 'struct rq' so the runqueues gets > resolved properly: > > # ./perf lock con -b > libbpf: extern (var ksym) 'runqueues': incompatible types, expected [99] fwd rq, but kernel has [19783] struct rq > libbpf: failed to load object 'lock_contention_bpf' > libbpf: failed to load BPF skeleton 'lock_contention_bpf': -22 > Failed to load lock-contention BPF skeleton > > Also rq__old/rq__new need additional '_' so the suffix is ignored > properly. > > Signed-off-by: Jiri Olsa > --- > tools/perf/util/bpf_skel/lock_contention.bpf.c | 10 ++++++---- > 1 file changed, 6 insertions(+), 4 deletions(-) > > diff --git a/tools/perf/util/bpf_skel/lock_contention.bpf.c b/tools/perf/util/bpf_skel/lock_contention.bpf.c > index 8911e2a077d8..c2bf24c68c14 100644 > --- a/tools/perf/util/bpf_skel/lock_contention.bpf.c > +++ b/tools/perf/util/bpf_skel/lock_contention.bpf.c > @@ -416,13 +416,15 @@ int contention_end(u64 *ctx) > return 0; > } > > +struct rq {}; > + > extern struct rq runqueues __ksym; > > -struct rq__old { > +struct rq___old { > raw_spinlock_t lock; > } __attribute__((preserve_access_index)); > > -struct rq__new { > +struct rq___new { > raw_spinlock_t __lock; > } __attribute__((preserve_access_index)); > > @@ -434,8 +436,8 @@ int BPF_PROG(collect_lock_syms) > > for (int i = 0; i < MAX_CPUS; i++) { > struct rq *rq = bpf_per_cpu_ptr(&runqueues, i); > - struct rq__new *rq_new = (void *)rq; > - struct rq__old *rq_old = (void *)rq; > + struct rq___new *rq_new = (void *)rq; > + struct rq___old *rq_old = (void *)rq; > > if (rq == NULL) > break; > -- > 2.40.1 > -- - Arnaldo