All of lore.kernel.org
 help / color / mirror / Atom feed
From: Song Liu <songliubraving@fb.com>
To: Jiri Olsa <jolsa@kernel.org>
Cc: Arnaldo Carvalho de Melo <acme@kernel.org>,
	lkml <linux-kernel@vger.kernel.org>,
	Ingo Molnar <mingo@kernel.org>,
	Namhyung Kim <namhyung@kernel.org>,
	Alexander Shishkin <alexander.shishkin@linux.intel.com>,
	Peter Zijlstra <a.p.zijlstra@chello.nl>,
	Stanislav Fomichev <sdf@fomichev.me>,
	Adrian Hunter <adrian.hunter@intel.com>,
	Andi Kleen <ak@linux.intel.com>
Subject: Re: [PATCH 10/12] perf script: Add --show-bpf-events to show eBPF related events
Date: Mon, 6 May 2019 21:42:44 +0000	[thread overview]
Message-ID: <7A338906-850D-430B-A558-93C409A03842@fb.com> (raw)
In-Reply-To: <20190503081841.1908-11-jolsa@kernel.org>



> On May 3, 2019, at 1:18 AM, Jiri Olsa <jolsa@kernel.org> wrote:
> 
> Adding --show-bpf-events to show eBPF related events:
>  PERF_RECORD_KSYMBOL
>  PERF_RECORD_BPF_EVENT
> 
> Usage:
>  # perf record -a
>  ...
>  # perf script --show-bpf-events
>  ...
>  swapper     0 [000]     0.000000: PERF_RECORD_KSYMBOL ksymbol event with addr ffffffffc0ef971d len 229 type 1 flags 0x0 name bpf_prog_2a142ef67aaad174
>  swapper     0 [000]     0.000000: PERF_RECORD_BPF_EVENT bpf event with type 1, flags 0, id 36
>  ...
> 
> Link: http://lkml.kernel.org/n/tip-9kvkcw7z4i1464jb7gasv4lb@git.kernel.org
> Signed-off-by: Jiri Olsa <jolsa@kernel.org>
> ---
> tools/perf/Documentation/perf-script.txt |  3 ++
> tools/perf/builtin-script.c              | 42 ++++++++++++++++++++++++
> 2 files changed, 45 insertions(+)
> 
> diff --git a/tools/perf/Documentation/perf-script.txt b/tools/perf/Documentation/perf-script.txt
> index 9b0d04dd2a61..af8282782911 100644
> --- a/tools/perf/Documentation/perf-script.txt
> +++ b/tools/perf/Documentation/perf-script.txt
> @@ -313,6 +313,9 @@ OPTIONS
> --show-round-events
> 	Display finished round events i.e. events of type PERF_RECORD_FINISHED_ROUND.
> 
> +--show-bpf-events
> +	Display bpf events i.e. events of type PERF_RECORD_KSYMBOL and PERF_RECORD_BPF_EVENT.
> +
> --demangle::
> 	Demangle symbol names to human readable form. It's enabled by default,
> 	disable with --no-demangle.
> diff --git a/tools/perf/builtin-script.c b/tools/perf/builtin-script.c
> index 7adaa6c63a0b..3a48a2627670 100644
> --- a/tools/perf/builtin-script.c
> +++ b/tools/perf/builtin-script.c
> @@ -1606,6 +1606,7 @@ struct perf_script {
> 	bool			show_namespace_events;
> 	bool			show_lost_events;
> 	bool			show_round_events;
> +	bool			show_bpf_events;
> 	bool			allocated;
> 	bool			per_event_dump;
> 	struct cpu_map		*cpus;
> @@ -2318,6 +2319,41 @@ process_finished_round_event(struct perf_tool *tool __maybe_unused,
> 	return 0;
> }
> 
> +static int
> +process_bpf_events(struct perf_tool *tool __maybe_unused,
> +		   union perf_event *event,
> +		   struct perf_sample *sample,
> +		   struct machine *machine)
> +{
> +	struct thread *thread;
> +	struct perf_script *script = container_of(tool, struct perf_script, tool);
> +	struct perf_session *session = script->session;
> +	struct perf_evsel *evsel = perf_evlist__id2evsel(session->evlist, sample->id);
> +
> +	if (machine__process_ksymbol(machine, event, sample) < 0)
> +		return -1;
> +
> +	if (!evsel->attr.sample_id_all) {
> +		perf_event__fprintf(event, stdout);
> +		return 0;
> +	}
> +
> +	thread = machine__findnew_thread(machine, sample->pid, sample->tid);
> +	if (thread == NULL) {
> +		pr_debug("problem processing MMAP event, skipping it.\n");
> +		return -1;
> +	}
> +
> +	if (!filter_cpu(sample)) {
> +		perf_sample__fprintf_start(sample, thread, evsel,
> +					   event->header.type, stdout);
> +		perf_event__fprintf(event, stdout);
> +	}
> +
> +	thread__put(thread);
> +	return 0;
> +}
> +
> static void sig_handler(int sig __maybe_unused)
> {
> 	session_done = 1;
> @@ -2420,6 +2456,10 @@ static int __cmd_script(struct perf_script *script)
> 		script->tool.ordered_events = false;
> 		script->tool.finished_round = process_finished_round_event;
> 	}
> +	if (script->show_bpf_events) {
> +		script->tool.ksymbol   = process_bpf_events;
> +		script->tool.bpf_event = process_bpf_events;

Why do we need both set to process_bpf_events?

Thanks,
Song

> +	}
> 
> 	if (perf_script__setup_per_event_dump(script)) {
> 		pr_err("Couldn't create the per event dump files\n");
> @@ -3439,6 +3479,8 @@ int cmd_script(int argc, const char **argv)
> 		    "Show lost events (if recorded)"),
> 	OPT_BOOLEAN('\0', "show-round-events", &script.show_round_events,
> 		    "Show round events (if recorded)"),
> +	OPT_BOOLEAN('\0', "show-bpf-events", &script.show_bpf_events,
> +		    "Show bpf related events (if recorded)"),
> 	OPT_BOOLEAN('\0', "per-event-dump", &script.per_event_dump,
> 		    "Dump trace output to files named by the monitored events"),
> 	OPT_BOOLEAN('f', "force", &symbol_conf.force, "don't complain, do it"),
> -- 
> 2.20.1
> 


  reply	other threads:[~2019-05-06 21:42 UTC|newest]

Thread overview: 22+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-05-03  8:18 [PATCHv2 00/12] perf tools: Display eBPF code in intel_pt trace Jiri Olsa
2019-05-03  8:18 ` [PATCH 01/12] perf tools: Separate generic code in dso__data_file_size Jiri Olsa
2019-05-03  8:18 ` [PATCH 02/12] perf tools: Separate generic code in dso_cache__read Jiri Olsa
2019-05-03  8:18 ` [PATCH 03/12] perf tools: Simplify dso_cache__read function Jiri Olsa
2019-05-03  8:18 ` [PATCH 04/12] perf tools: Add bpf dso read and size hooks Jiri Olsa
2019-05-03  8:18 ` [PATCH 05/12] perf tools: Read also the end of the kernel Jiri Olsa
2019-05-03  8:18 ` [PATCH 06/12] perf tools: Keep zero in pgoff bpf map Jiri Olsa
2019-05-03  8:18 ` [PATCH 07/12] perf script: Pad dso name for --call-trace Jiri Olsa
2019-05-06 21:38   ` Song Liu
2019-05-07  8:13     ` Jiri Olsa
2019-05-07 18:29       ` Song Liu
2019-05-08  7:40         ` Jiri Olsa
2019-05-03  8:18 ` [PATCH 08/12] perf tools: Preserve eBPF maps when loading kcore Jiri Olsa
2019-05-03  8:18 ` [PATCH 09/12] perf tests: Add map_groups__merge_in test Jiri Olsa
2019-05-03  8:18 ` [PATCH 10/12] perf script: Add --show-bpf-events to show eBPF related events Jiri Olsa
2019-05-06 21:42   ` Song Liu [this message]
2019-05-07  8:18     ` Jiri Olsa
2019-05-07 18:27       ` Song Liu
2019-05-03  8:18 ` [PATCH 11/12] perf script: Remove superfluous bpf event titles Jiri Olsa
2019-05-03  8:18 ` [PATCH 12/12] perf script: Add --show-all-events option Jiri Olsa
2019-05-06 21:46 ` [PATCHv2 00/12] perf tools: Display eBPF code in intel_pt trace Song Liu
2019-05-08 13:19 [PATCHv3 " Jiri Olsa
2019-05-08 13:20 ` [PATCH 10/12] perf script: Add --show-bpf-events to show eBPF related events Jiri Olsa

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=7A338906-850D-430B-A558-93C409A03842@fb.com \
    --to=songliubraving@fb.com \
    --cc=a.p.zijlstra@chello.nl \
    --cc=acme@kernel.org \
    --cc=adrian.hunter@intel.com \
    --cc=ak@linux.intel.com \
    --cc=alexander.shishkin@linux.intel.com \
    --cc=jolsa@kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=mingo@kernel.org \
    --cc=namhyung@kernel.org \
    --cc=sdf@fomichev.me \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.