2019-05-29 22:18:02 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
2015-07-18 00:33:41 +08:00
|
|
|
/*
|
|
|
|
* intel_pt.c: Intel Processor Trace support
|
|
|
|
* Copyright (c) 2013-2015, Intel Corporation.
|
|
|
|
*/
|
|
|
|
|
2017-04-18 02:23:08 +08:00
|
|
|
#include <inttypes.h>
|
perf intel-pt: Synthesize cycle events
There is no good reason why we cannot synthesize "cycle" events from
Intel PT just as we can synthesize "instruction" events, in particular
when CYC packets are available. This enables using PT to getting much
more accurate cycle profiles than regular sampling (record -e cycles)
when the work last for very short periods (<10 ms). Thus, add support
for this, based off of the existing IPC calculation framework. The new
option to --itrace is "y" (for cYcles), as c was taken for calls. Cycle
and instruction events can be synthesized together, and are by default.
The only real caveat is that CYC packets are only emitted whenever some
other packet is, which in practice is when a branch instruction is
encountered (and not even all branches). Thus, even at no subsampling
(e.g. --itrace=y0ns), it is impossible to get more accuracy than a
single basic block, and all cycles spent executing that block will get
attributed to the branch instruction that ends the packet. Thus, one
cannot know whether the cycles came from e.g. a specific load, a
mispredicted branch, or something else. When subsampling (which is the
default), the cycle events will get smeared out even more, but will
still be generally useful to attribute cycle counts to functions.
Reviewed-by: Adrian Hunter <adrian.hunter@intel.com>
Signed-off-by: Steinar H. Gunderson <sesse@google.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Link: https://lore.kernel.org/r/20220322082452.1429091-1-sesse@google.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2022-03-22 16:24:52 +08:00
|
|
|
#include <linux/perf_event.h>
|
2015-07-18 00:33:41 +08:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdbool.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <linux/kernel.h>
|
2019-08-30 03:18:59 +08:00
|
|
|
#include <linux/string.h>
|
2015-07-18 00:33:41 +08:00
|
|
|
#include <linux/types.h>
|
2019-07-04 22:32:27 +08:00
|
|
|
#include <linux/zalloc.h>
|
2015-07-18 00:33:41 +08:00
|
|
|
|
|
|
|
#include "session.h"
|
|
|
|
#include "machine.h"
|
2017-04-26 02:45:35 +08:00
|
|
|
#include "memswap.h"
|
2015-09-25 21:15:45 +08:00
|
|
|
#include "sort.h"
|
2015-07-18 00:33:41 +08:00
|
|
|
#include "tool.h"
|
|
|
|
#include "event.h"
|
|
|
|
#include "evlist.h"
|
|
|
|
#include "evsel.h"
|
|
|
|
#include "map.h"
|
|
|
|
#include "color.h"
|
|
|
|
#include "thread.h"
|
|
|
|
#include "thread-stack.h"
|
|
|
|
#include "symbol.h"
|
|
|
|
#include "callchain.h"
|
|
|
|
#include "dso.h"
|
|
|
|
#include "debug.h"
|
|
|
|
#include "auxtrace.h"
|
|
|
|
#include "tsc.h"
|
|
|
|
#include "intel-pt.h"
|
2016-06-23 16:55:17 +08:00
|
|
|
#include "config.h"
|
2020-05-05 22:49:08 +08:00
|
|
|
#include "util/perf_api_probe.h"
|
2019-09-18 22:36:13 +08:00
|
|
|
#include "util/synthetic-events.h"
|
2019-06-04 21:00:09 +08:00
|
|
|
#include "time-utils.h"
|
2015-07-18 00:33:41 +08:00
|
|
|
|
2019-06-10 15:27:59 +08:00
|
|
|
#include "../arch/x86/include/uapi/asm/perf_regs.h"
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
#include "intel-pt-decoder/intel-pt-log.h"
|
|
|
|
#include "intel-pt-decoder/intel-pt-decoder.h"
|
|
|
|
#include "intel-pt-decoder/intel-pt-insn-decoder.h"
|
|
|
|
#include "intel-pt-decoder/intel-pt-pkt-decoder.h"
|
|
|
|
|
|
|
|
#define MAX_TIMESTAMP (~0ULL)
|
|
|
|
|
2022-01-24 16:41:41 +08:00
|
|
|
#define INTEL_PT_CFG_PASS_THRU BIT_ULL(0)
|
|
|
|
#define INTEL_PT_CFG_PWR_EVT_EN BIT_ULL(4)
|
|
|
|
#define INTEL_PT_CFG_BRANCH_EN BIT_ULL(13)
|
2022-01-24 16:41:50 +08:00
|
|
|
#define INTEL_PT_CFG_EVT_EN BIT_ULL(31)
|
2022-01-24 16:41:53 +08:00
|
|
|
#define INTEL_PT_CFG_TNT_DIS BIT_ULL(55)
|
2022-01-24 16:41:41 +08:00
|
|
|
|
2019-06-04 21:00:09 +08:00
|
|
|
struct range {
|
|
|
|
u64 start;
|
|
|
|
u64 end;
|
|
|
|
};
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
struct intel_pt {
|
|
|
|
struct auxtrace auxtrace;
|
|
|
|
struct auxtrace_queues queues;
|
|
|
|
struct auxtrace_heap heap;
|
|
|
|
u32 auxtrace_type;
|
|
|
|
struct perf_session *session;
|
|
|
|
struct machine *machine;
|
2019-07-21 19:23:51 +08:00
|
|
|
struct evsel *switch_evsel;
|
2015-07-18 00:33:41 +08:00
|
|
|
struct thread *unknown_thread;
|
|
|
|
bool timeless_decoding;
|
|
|
|
bool sampling_mode;
|
|
|
|
bool snapshot_mode;
|
|
|
|
bool per_cpu_mmaps;
|
|
|
|
bool have_tsc;
|
|
|
|
bool data_queued;
|
|
|
|
bool est_tsc;
|
|
|
|
bool sync_switch;
|
2022-07-11 17:32:14 +08:00
|
|
|
bool sync_switch_not_supported;
|
2015-09-25 21:15:56 +08:00
|
|
|
bool mispred_all;
|
2020-04-29 23:07:44 +08:00
|
|
|
bool use_thread_stack;
|
2020-04-29 23:07:45 +08:00
|
|
|
bool callstack;
|
2022-01-24 16:41:49 +08:00
|
|
|
bool cap_event_trace;
|
2022-07-11 17:32:13 +08:00
|
|
|
bool have_guest_sideband;
|
2020-04-29 23:07:45 +08:00
|
|
|
unsigned int br_stack_sz;
|
2020-04-29 23:07:49 +08:00
|
|
|
unsigned int br_stack_sz_plus;
|
2015-07-18 00:33:41 +08:00
|
|
|
int have_sched_switch;
|
|
|
|
u32 pmu_type;
|
|
|
|
u64 kernel_start;
|
|
|
|
u64 switch_ip;
|
|
|
|
u64 ptss_ip;
|
2021-04-30 15:03:06 +08:00
|
|
|
u64 first_timestamp;
|
2015-07-18 00:33:41 +08:00
|
|
|
|
|
|
|
struct perf_tsc_conversion tc;
|
|
|
|
bool cap_user_time_zero;
|
|
|
|
|
|
|
|
struct itrace_synth_opts synth_opts;
|
|
|
|
|
|
|
|
bool sample_instructions;
|
|
|
|
u64 instructions_sample_type;
|
|
|
|
u64 instructions_id;
|
|
|
|
|
perf intel-pt: Synthesize cycle events
There is no good reason why we cannot synthesize "cycle" events from
Intel PT just as we can synthesize "instruction" events, in particular
when CYC packets are available. This enables using PT to getting much
more accurate cycle profiles than regular sampling (record -e cycles)
when the work last for very short periods (<10 ms). Thus, add support
for this, based off of the existing IPC calculation framework. The new
option to --itrace is "y" (for cYcles), as c was taken for calls. Cycle
and instruction events can be synthesized together, and are by default.
The only real caveat is that CYC packets are only emitted whenever some
other packet is, which in practice is when a branch instruction is
encountered (and not even all branches). Thus, even at no subsampling
(e.g. --itrace=y0ns), it is impossible to get more accuracy than a
single basic block, and all cycles spent executing that block will get
attributed to the branch instruction that ends the packet. Thus, one
cannot know whether the cycles came from e.g. a specific load, a
mispredicted branch, or something else. When subsampling (which is the
default), the cycle events will get smeared out even more, but will
still be generally useful to attribute cycle counts to functions.
Reviewed-by: Adrian Hunter <adrian.hunter@intel.com>
Signed-off-by: Steinar H. Gunderson <sesse@google.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Link: https://lore.kernel.org/r/20220322082452.1429091-1-sesse@google.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2022-03-22 16:24:52 +08:00
|
|
|
bool sample_cycles;
|
|
|
|
u64 cycles_sample_type;
|
|
|
|
u64 cycles_id;
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
bool sample_branches;
|
|
|
|
u32 branches_filter;
|
|
|
|
u64 branches_sample_type;
|
|
|
|
u64 branches_id;
|
|
|
|
|
|
|
|
bool sample_transactions;
|
|
|
|
u64 transactions_sample_type;
|
|
|
|
u64 transactions_id;
|
|
|
|
|
2017-06-30 16:36:45 +08:00
|
|
|
bool sample_ptwrites;
|
|
|
|
u64 ptwrites_sample_type;
|
|
|
|
u64 ptwrites_id;
|
|
|
|
|
|
|
|
bool sample_pwr_events;
|
|
|
|
u64 pwr_events_sample_type;
|
|
|
|
u64 mwait_id;
|
|
|
|
u64 pwre_id;
|
|
|
|
u64 exstop_id;
|
|
|
|
u64 pwrx_id;
|
|
|
|
u64 cbr_id;
|
2021-02-06 01:53:50 +08:00
|
|
|
u64 psb_id;
|
2017-06-30 16:36:45 +08:00
|
|
|
|
2021-09-08 00:39:03 +08:00
|
|
|
bool single_pebs;
|
2019-06-10 15:27:56 +08:00
|
|
|
bool sample_pebs;
|
2019-07-21 19:23:51 +08:00
|
|
|
struct evsel *pebs_evsel;
|
2019-06-10 15:27:56 +08:00
|
|
|
|
2022-01-24 16:41:50 +08:00
|
|
|
u64 evt_sample_type;
|
|
|
|
u64 evt_id;
|
|
|
|
|
2022-01-24 16:41:51 +08:00
|
|
|
u64 iflag_chg_sample_type;
|
|
|
|
u64 iflag_chg_id;
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
u64 tsc_bit;
|
2015-07-18 00:33:54 +08:00
|
|
|
u64 mtc_bit;
|
|
|
|
u64 mtc_freq_bits;
|
|
|
|
u32 tsc_ctc_ratio_n;
|
|
|
|
u32 tsc_ctc_ratio_d;
|
|
|
|
u64 cyc_bit;
|
2015-07-18 00:33:41 +08:00
|
|
|
u64 noretcomp_bit;
|
|
|
|
unsigned max_non_turbo_ratio;
|
2017-06-30 16:36:45 +08:00
|
|
|
unsigned cbr2khz;
|
2021-07-02 01:51:32 +08:00
|
|
|
int max_loops;
|
2016-03-29 01:45:38 +08:00
|
|
|
|
|
|
|
unsigned long num_events;
|
2016-09-23 22:38:46 +08:00
|
|
|
|
|
|
|
char *filter;
|
2016-09-23 22:38:48 +08:00
|
|
|
struct addr_filters filts;
|
2019-06-04 21:00:09 +08:00
|
|
|
|
|
|
|
struct range *time_ranges;
|
|
|
|
unsigned int range_cnt;
|
2020-04-01 18:16:08 +08:00
|
|
|
|
|
|
|
struct ip_callchain *chain;
|
2020-04-29 23:07:49 +08:00
|
|
|
struct branch_stack *br_stack;
|
2021-04-30 15:03:05 +08:00
|
|
|
|
|
|
|
u64 dflt_tsc_offset;
|
|
|
|
struct rb_root vmcs_info;
|
2015-07-18 00:33:41 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
enum switch_state {
|
|
|
|
INTEL_PT_SS_NOT_TRACING,
|
|
|
|
INTEL_PT_SS_UNKNOWN,
|
|
|
|
INTEL_PT_SS_TRACING,
|
|
|
|
INTEL_PT_SS_EXPECTING_SWITCH_EVENT,
|
|
|
|
INTEL_PT_SS_EXPECTING_SWITCH_IP,
|
|
|
|
};
|
|
|
|
|
2021-09-08 00:39:03 +08:00
|
|
|
/* applicable_counters is 64-bits */
|
|
|
|
#define INTEL_PT_MAX_PEBS 64
|
|
|
|
|
|
|
|
struct intel_pt_pebs_event {
|
|
|
|
struct evsel *evsel;
|
|
|
|
u64 id;
|
|
|
|
};
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
struct intel_pt_queue {
|
|
|
|
struct intel_pt *pt;
|
|
|
|
unsigned int queue_nr;
|
|
|
|
struct auxtrace_buffer *buffer;
|
2018-03-07 22:02:27 +08:00
|
|
|
struct auxtrace_buffer *old_buffer;
|
2015-07-18 00:33:41 +08:00
|
|
|
void *decoder;
|
|
|
|
const struct intel_pt_state *state;
|
|
|
|
struct ip_callchain *chain;
|
2015-09-25 21:15:45 +08:00
|
|
|
struct branch_stack *last_branch;
|
2015-07-18 00:33:41 +08:00
|
|
|
union perf_event *event_buf;
|
|
|
|
bool on_heap;
|
|
|
|
bool stop;
|
|
|
|
bool step_through_buffers;
|
|
|
|
bool use_buffer_pid_tid;
|
2018-03-07 22:02:22 +08:00
|
|
|
bool sync_switch;
|
perf intel-pt: Support itrace A option to approximate IPC
Normally, for cycle-acccurate mode, IPC values are an exact number of
instructions and cycles. Due to the granularity of timestamps, that happens
only when a CYC packet correlates to the event.
Support the itrace 'A' option, to use instead, the number of cycles
associated with the current timestamp. This provides IPC information for
every change of timestamp, but at the expense of accuracy. Due to the
granularity of timestamps, the actual number of cycles increases even
though the cycles reported does not. The number of instructions is known,
but if IPC is reported, cycles can be too low and so IPC is too high. Note
that inaccuracy decreases as the period of sampling increases i.e. if the
number of cycles is too low by a small amount, that becomes less
significant if the number of cycles is large.
Furthermore, it can be used in conjunction with dlfilter-show-cycles.so
to provide higher granularity cycle information.
Reviewed-by: Andi Kleen <ak@linux.intel.com>
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Jiri Olsa <jolsa@redhat.com>
Link: https://lore.kernel.org/r/20211027080334.365596-4-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2021-10-27 16:03:31 +08:00
|
|
|
bool sample_ipc;
|
2015-07-18 00:33:41 +08:00
|
|
|
pid_t pid, tid;
|
|
|
|
int cpu;
|
|
|
|
int switch_state;
|
|
|
|
pid_t next_tid;
|
|
|
|
struct thread *thread;
|
2021-02-18 17:57:57 +08:00
|
|
|
struct machine *guest_machine;
|
perf intel-pt: Add guest_code support
A common case for KVM test programs is that the test program acts as the
hypervisor, creating, running and destroying the virtual machine, and
providing the guest object code from its own object code. In this case,
the VM is not running an OS, but only the functions loaded into it by the
hypervisor test program, and conveniently, loaded at the same virtual
addresses.
To support that, a new option "--guest-code" has been added in
previous patches.
In this patch, add support also to Intel PT.
In particular, ensure guest_code thread is set up before attempting to
walk object code or synthesize samples.
Example:
# perf record --kcore -e intel_pt/cyc/ -- tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.280 MB perf.data ]
# perf script --guest-code --itrace=bep --ns -F-period,+addr,+flags
[SNIP]
tsc_msrs_test 18436 [007] 10897.962087733: branches: call ffffffffc13b2ff5 __vmx_vcpu_run+0x15 (vmlinux) => ffffffffc13b2f50 vmx_update_host_rsp+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962087733: branches: return ffffffffc13b2f5d vmx_update_host_rsp+0xd (vmlinux) => ffffffffc13b2ffa __vmx_vcpu_run+0x1a (vmlinux)
tsc_msrs_test 18436 [007] 10897.962087733: branches: call ffffffffc13b303b __vmx_vcpu_run+0x5b (vmlinux) => ffffffffc13b2f80 vmx_vmenter+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962087836: branches: vmentry ffffffffc13b2f82 vmx_vmenter+0x2 (vmlinux) => 0 [unknown] ([unknown])
[guest/18436] 18436 [007] 10897.962087836: branches: vmentry 0 [unknown] ([unknown]) => 402c81 guest_code+0x131 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962087836: branches: call 402c81 guest_code+0x131 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dba0 ucall+0x0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962088248: branches: vmexit 40dba0 ucall+0x0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 0 [unknown] ([unknown])
tsc_msrs_test 18436 [007] 10897.962088248: branches: vmexit 0 [unknown] ([unknown]) => ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962088248: branches: jmp ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux) => ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962088256: branches: return ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux) => ffffffffc13b3040 __vmx_vcpu_run+0x60 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962088270: branches: return ffffffffc13b30b6 __vmx_vcpu_run+0xd6 (vmlinux) => ffffffffc13b2f2e vmx_vcpu_enter_exit+0x4e (vmlinux)
[SNIP]
tsc_msrs_test 18436 [007] 10897.962089321: branches: call ffffffffc13b2ff5 __vmx_vcpu_run+0x15 (vmlinux) => ffffffffc13b2f50 vmx_update_host_rsp+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089321: branches: return ffffffffc13b2f5d vmx_update_host_rsp+0xd (vmlinux) => ffffffffc13b2ffa __vmx_vcpu_run+0x1a (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089321: branches: call ffffffffc13b303b __vmx_vcpu_run+0x5b (vmlinux) => ffffffffc13b2f80 vmx_vmenter+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089424: branches: vmentry ffffffffc13b2f82 vmx_vmenter+0x2 (vmlinux) => 0 [unknown] ([unknown])
[guest/18436] 18436 [007] 10897.962089424: branches: vmentry 0 [unknown] ([unknown]) => 40dba0 ucall+0x0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jmp 40dc1b ucall+0x7b (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc39 ucall+0x99 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jcc 40dc3c ucall+0x9c (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc20 ucall+0x80 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jcc 40dc3c ucall+0x9c (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc20 ucall+0x80 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jcc 40dc37 ucall+0x97 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc50 ucall+0xb0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089878: branches: vmexit 40dc55 ucall+0xb5 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 0 [unknown] ([unknown])
tsc_msrs_test 18436 [007] 10897.962089878: branches: vmexit 0 [unknown] ([unknown]) => ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089878: branches: jmp ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux) => ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089887: branches: return ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux) => ffffffffc13b3040 __vmx_vcpu_run+0x60 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089901: branches: return ffffffffc13b30b6 __vmx_vcpu_run+0xd6 (vmlinux) => ffffffffc13b2f2e vmx_vcpu_enter_exit+0x4e (vmlinux)
[SNIP]
# perf kvm --guest-code --guest --host report -i perf.data --stdio | head -20
# To display the perf.data header info, please use --header/--header-only options.
#
#
# Total Lost Samples: 0
#
# Samples: 12 of event 'instructions'
# Event count (approx.): 2274583
#
# Children Self Command Shared Object Symbol
# ........ ........ ............. .................... ...........................................
#
54.70% 0.00% tsc_msrs_test [kernel.vmlinux] [k] entry_SYSCALL_64_after_hwframe
|
---entry_SYSCALL_64_after_hwframe
do_syscall_64
|
|--29.44%--syscall_exit_to_user_mode
| exit_to_user_mode_prepare
| task_work_run
| __fput
For more information about Perf tools support for Intel® Processor Trace
refer:
https://perf.wiki.kernel.org/index.php/Perf_tools_support_for_Intel%C2%AE_Processor_Trace
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Andi Kleen <ak@linux.intel.com>
Cc: Ian Rogers <irogers@google.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: kvm@vger.kernel.org
Link: https://lore.kernel.org/r/20220517131011.6117-7-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2022-05-17 21:10:11 +08:00
|
|
|
struct thread *guest_thread;
|
2021-02-18 17:57:57 +08:00
|
|
|
struct thread *unknown_guest_thread;
|
2022-07-11 17:32:15 +08:00
|
|
|
pid_t guest_machine_pid;
|
|
|
|
pid_t guest_pid;
|
|
|
|
pid_t guest_tid;
|
|
|
|
int vcpu;
|
2015-07-18 00:33:41 +08:00
|
|
|
bool exclude_kernel;
|
|
|
|
bool have_sample;
|
|
|
|
u64 time;
|
|
|
|
u64 timestamp;
|
2019-06-04 21:00:09 +08:00
|
|
|
u64 sel_timestamp;
|
|
|
|
bool sel_start;
|
|
|
|
unsigned int sel_idx;
|
2015-07-18 00:33:41 +08:00
|
|
|
u32 flags;
|
|
|
|
u16 insn_len;
|
2015-07-18 00:33:48 +08:00
|
|
|
u64 last_insn_cnt;
|
2019-05-20 19:37:13 +08:00
|
|
|
u64 ipc_insn_cnt;
|
|
|
|
u64 ipc_cyc_cnt;
|
|
|
|
u64 last_in_insn_cnt;
|
|
|
|
u64 last_in_cyc_cnt;
|
perf intel-pt: Synthesize cycle events
There is no good reason why we cannot synthesize "cycle" events from
Intel PT just as we can synthesize "instruction" events, in particular
when CYC packets are available. This enables using PT to getting much
more accurate cycle profiles than regular sampling (record -e cycles)
when the work last for very short periods (<10 ms). Thus, add support
for this, based off of the existing IPC calculation framework. The new
option to --itrace is "y" (for cYcles), as c was taken for calls. Cycle
and instruction events can be synthesized together, and are by default.
The only real caveat is that CYC packets are only emitted whenever some
other packet is, which in practice is when a branch instruction is
encountered (and not even all branches). Thus, even at no subsampling
(e.g. --itrace=y0ns), it is impossible to get more accuracy than a
single basic block, and all cycles spent executing that block will get
attributed to the branch instruction that ends the packet. Thus, one
cannot know whether the cycles came from e.g. a specific load, a
mispredicted branch, or something else. When subsampling (which is the
default), the cycle events will get smeared out even more, but will
still be generally useful to attribute cycle counts to functions.
Reviewed-by: Adrian Hunter <adrian.hunter@intel.com>
Signed-off-by: Steinar H. Gunderson <sesse@google.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Link: https://lore.kernel.org/r/20220322082452.1429091-1-sesse@google.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2022-03-22 16:24:52 +08:00
|
|
|
u64 last_cy_insn_cnt;
|
|
|
|
u64 last_cy_cyc_cnt;
|
2019-05-20 19:37:13 +08:00
|
|
|
u64 last_br_insn_cnt;
|
|
|
|
u64 last_br_cyc_cnt;
|
2019-06-22 17:32:45 +08:00
|
|
|
unsigned int cbr_seen;
|
2016-10-07 21:42:26 +08:00
|
|
|
char insn[INTEL_PT_INSN_BUF_SZ];
|
2021-09-08 00:39:03 +08:00
|
|
|
struct intel_pt_pebs_event pebs[INTEL_PT_MAX_PEBS];
|
2015-07-18 00:33:41 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
static void intel_pt_dump(struct intel_pt *pt __maybe_unused,
|
|
|
|
unsigned char *buf, size_t len)
|
|
|
|
{
|
|
|
|
struct intel_pt_pkt packet;
|
|
|
|
size_t pos = 0;
|
|
|
|
int ret, pkt_len, i;
|
|
|
|
char desc[INTEL_PT_PKT_DESC_MAX];
|
|
|
|
const char *color = PERF_COLOR_BLUE;
|
2019-06-10 15:27:53 +08:00
|
|
|
enum intel_pt_pkt_ctx ctx = INTEL_PT_NO_CTX;
|
2015-07-18 00:33:41 +08:00
|
|
|
|
|
|
|
color_fprintf(stdout, color,
|
|
|
|
". ... Intel Processor Trace data: size %zu bytes\n",
|
|
|
|
len);
|
|
|
|
|
|
|
|
while (len) {
|
2019-06-10 15:27:53 +08:00
|
|
|
ret = intel_pt_get_packet(buf, len, &packet, &ctx);
|
2015-07-18 00:33:41 +08:00
|
|
|
if (ret > 0)
|
|
|
|
pkt_len = ret;
|
|
|
|
else
|
|
|
|
pkt_len = 1;
|
|
|
|
printf(".");
|
|
|
|
color_fprintf(stdout, color, " %08x: ", pos);
|
|
|
|
for (i = 0; i < pkt_len; i++)
|
|
|
|
color_fprintf(stdout, color, " %02x", buf[i]);
|
|
|
|
for (; i < 16; i++)
|
|
|
|
color_fprintf(stdout, color, " ");
|
|
|
|
if (ret > 0) {
|
|
|
|
ret = intel_pt_pkt_desc(&packet, desc,
|
|
|
|
INTEL_PT_PKT_DESC_MAX);
|
|
|
|
if (ret > 0)
|
|
|
|
color_fprintf(stdout, color, " %s\n", desc);
|
|
|
|
} else {
|
|
|
|
color_fprintf(stdout, color, " Bad packet!\n");
|
|
|
|
}
|
|
|
|
pos += pkt_len;
|
|
|
|
buf += pkt_len;
|
|
|
|
len -= pkt_len;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void intel_pt_dump_event(struct intel_pt *pt, unsigned char *buf,
|
|
|
|
size_t len)
|
|
|
|
{
|
|
|
|
printf(".\n");
|
|
|
|
intel_pt_dump(pt, buf, len);
|
|
|
|
}
|
|
|
|
|
2018-11-05 15:35:04 +08:00
|
|
|
static void intel_pt_log_event(union perf_event *event)
|
|
|
|
{
|
|
|
|
FILE *f = intel_pt_log_fp();
|
|
|
|
|
|
|
|
if (!intel_pt_enable_logging || !f)
|
|
|
|
return;
|
|
|
|
|
2020-05-12 20:19:22 +08:00
|
|
|
perf_event__fprintf(event, NULL, f);
|
2018-11-05 15:35:04 +08:00
|
|
|
}
|
|
|
|
|
2019-11-15 20:42:24 +08:00
|
|
|
static void intel_pt_dump_sample(struct perf_session *session,
|
|
|
|
struct perf_sample *sample)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = container_of(session->auxtrace, struct intel_pt,
|
|
|
|
auxtrace);
|
|
|
|
|
|
|
|
printf("\n");
|
|
|
|
intel_pt_dump(pt, sample->aux_sample.data, sample->aux_sample.size);
|
|
|
|
}
|
|
|
|
|
2020-07-10 23:11:01 +08:00
|
|
|
static bool intel_pt_log_events(struct intel_pt *pt, u64 tm)
|
2020-07-10 23:11:00 +08:00
|
|
|
{
|
2020-07-10 23:11:01 +08:00
|
|
|
struct perf_time_interval *range = pt->synth_opts.ptime_range;
|
|
|
|
int n = pt->synth_opts.range_num;
|
|
|
|
|
|
|
|
if (pt->synth_opts.log_plus_flags & AUXTRACE_LOG_FLG_ALL_PERF_EVTS)
|
|
|
|
return true;
|
|
|
|
|
|
|
|
if (pt->synth_opts.log_minus_flags & AUXTRACE_LOG_FLG_ALL_PERF_EVTS)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
/* perf_time__ranges_skip_sample does not work if time is zero */
|
|
|
|
if (!tm)
|
|
|
|
tm = 1;
|
|
|
|
|
|
|
|
return !n || !perf_time__ranges_skip_sample(range, n, tm);
|
2020-07-10 23:11:00 +08:00
|
|
|
}
|
|
|
|
|
2021-04-30 15:03:05 +08:00
|
|
|
static struct intel_pt_vmcs_info *intel_pt_findnew_vmcs(struct rb_root *rb_root,
|
|
|
|
u64 vmcs,
|
|
|
|
u64 dflt_tsc_offset)
|
|
|
|
{
|
|
|
|
struct rb_node **p = &rb_root->rb_node;
|
|
|
|
struct rb_node *parent = NULL;
|
|
|
|
struct intel_pt_vmcs_info *v;
|
|
|
|
|
|
|
|
while (*p) {
|
|
|
|
parent = *p;
|
|
|
|
v = rb_entry(parent, struct intel_pt_vmcs_info, rb_node);
|
|
|
|
|
|
|
|
if (v->vmcs == vmcs)
|
|
|
|
return v;
|
|
|
|
|
|
|
|
if (vmcs < v->vmcs)
|
|
|
|
p = &(*p)->rb_left;
|
|
|
|
else
|
|
|
|
p = &(*p)->rb_right;
|
|
|
|
}
|
|
|
|
|
|
|
|
v = zalloc(sizeof(*v));
|
|
|
|
if (v) {
|
|
|
|
v->vmcs = vmcs;
|
|
|
|
v->tsc_offset = dflt_tsc_offset;
|
|
|
|
v->reliable = dflt_tsc_offset;
|
|
|
|
|
|
|
|
rb_link_node(&v->rb_node, parent, p);
|
|
|
|
rb_insert_color(&v->rb_node, rb_root);
|
|
|
|
}
|
|
|
|
|
|
|
|
return v;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct intel_pt_vmcs_info *intel_pt_findnew_vmcs_info(void *data, uint64_t vmcs)
|
|
|
|
{
|
|
|
|
struct intel_pt_queue *ptq = data;
|
|
|
|
struct intel_pt *pt = ptq->pt;
|
|
|
|
|
|
|
|
if (!vmcs && !pt->dflt_tsc_offset)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
return intel_pt_findnew_vmcs(&pt->vmcs_info, vmcs, pt->dflt_tsc_offset);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void intel_pt_free_vmcs_info(struct intel_pt *pt)
|
|
|
|
{
|
|
|
|
struct intel_pt_vmcs_info *v;
|
|
|
|
struct rb_node *n;
|
|
|
|
|
|
|
|
n = rb_first(&pt->vmcs_info);
|
|
|
|
while (n) {
|
|
|
|
v = rb_entry(n, struct intel_pt_vmcs_info, rb_node);
|
|
|
|
n = rb_next(n);
|
|
|
|
rb_erase(&v->rb_node, &pt->vmcs_info);
|
|
|
|
free(v);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
static int intel_pt_do_fix_overlap(struct intel_pt *pt, struct auxtrace_buffer *a,
|
|
|
|
struct auxtrace_buffer *b)
|
|
|
|
{
|
2018-03-07 22:02:21 +08:00
|
|
|
bool consecutive = false;
|
2015-07-18 00:33:41 +08:00
|
|
|
void *start;
|
|
|
|
|
|
|
|
start = intel_pt_find_overlap(a->data, a->size, b->data, b->size,
|
2021-04-30 15:03:04 +08:00
|
|
|
pt->have_tsc, &consecutive,
|
|
|
|
pt->synth_opts.vm_time_correlation);
|
2015-07-18 00:33:41 +08:00
|
|
|
if (!start)
|
|
|
|
return -EINVAL;
|
2021-04-30 15:03:04 +08:00
|
|
|
/*
|
|
|
|
* In the case of vm_time_correlation, the overlap might contain TSC
|
|
|
|
* packets that will not be fixed, and that will then no longer work for
|
|
|
|
* overlap detection. Avoid that by zeroing out the overlap.
|
|
|
|
*/
|
|
|
|
if (pt->synth_opts.vm_time_correlation)
|
|
|
|
memset(b->data, 0, start - b->data);
|
2015-07-18 00:33:41 +08:00
|
|
|
b->use_size = b->data + b->size - start;
|
|
|
|
b->use_data = start;
|
2018-03-07 22:02:21 +08:00
|
|
|
if (b->use_size && consecutive)
|
|
|
|
b->consecutive = true;
|
2015-07-18 00:33:41 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-06-04 21:00:07 +08:00
|
|
|
static int intel_pt_get_buffer(struct intel_pt_queue *ptq,
|
|
|
|
struct auxtrace_buffer *buffer,
|
|
|
|
struct auxtrace_buffer *old_buffer,
|
|
|
|
struct intel_pt_buffer *b)
|
2015-07-18 00:33:41 +08:00
|
|
|
{
|
2018-03-07 22:02:29 +08:00
|
|
|
bool might_overlap;
|
2015-07-18 00:33:41 +08:00
|
|
|
|
|
|
|
if (!buffer->data) {
|
2017-01-24 05:07:59 +08:00
|
|
|
int fd = perf_data__fd(ptq->pt->session->data);
|
2015-07-18 00:33:41 +08:00
|
|
|
|
|
|
|
buffer->data = auxtrace_buffer__get_data(buffer, fd);
|
|
|
|
if (!buffer->data)
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
2018-03-07 22:02:29 +08:00
|
|
|
might_overlap = ptq->pt->snapshot_mode || ptq->pt->sampling_mode;
|
|
|
|
if (might_overlap && !buffer->consecutive && old_buffer &&
|
2015-07-18 00:33:41 +08:00
|
|
|
intel_pt_do_fix_overlap(ptq->pt, old_buffer, buffer))
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
if (buffer->use_data) {
|
|
|
|
b->len = buffer->use_size;
|
|
|
|
b->buf = buffer->use_data;
|
|
|
|
} else {
|
|
|
|
b->len = buffer->size;
|
|
|
|
b->buf = buffer->data;
|
|
|
|
}
|
|
|
|
b->ref_timestamp = buffer->reference;
|
|
|
|
|
2018-03-07 22:02:29 +08:00
|
|
|
if (!old_buffer || (might_overlap && !buffer->consecutive)) {
|
2015-07-18 00:33:41 +08:00
|
|
|
b->consecutive = false;
|
|
|
|
b->trace_nr = buffer->buffer_nr + 1;
|
|
|
|
} else {
|
|
|
|
b->consecutive = true;
|
|
|
|
}
|
|
|
|
|
2019-06-04 21:00:07 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-06-04 21:00:08 +08:00
|
|
|
/* Do not drop buffers with references - refer intel_pt_get_trace() */
|
|
|
|
static void intel_pt_lookahead_drop_buffer(struct intel_pt_queue *ptq,
|
|
|
|
struct auxtrace_buffer *buffer)
|
|
|
|
{
|
|
|
|
if (!buffer || buffer == ptq->buffer || buffer == ptq->old_buffer)
|
|
|
|
return;
|
|
|
|
|
|
|
|
auxtrace_buffer__drop_data(buffer);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Must be serialized with respect to intel_pt_get_trace() */
|
|
|
|
static int intel_pt_lookahead(void *data, intel_pt_lookahead_cb_t cb,
|
|
|
|
void *cb_data)
|
|
|
|
{
|
|
|
|
struct intel_pt_queue *ptq = data;
|
|
|
|
struct auxtrace_buffer *buffer = ptq->buffer;
|
|
|
|
struct auxtrace_buffer *old_buffer = ptq->old_buffer;
|
|
|
|
struct auxtrace_queue *queue;
|
|
|
|
int err = 0;
|
|
|
|
|
|
|
|
queue = &ptq->pt->queues.queue_array[ptq->queue_nr];
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
struct intel_pt_buffer b = { .len = 0 };
|
|
|
|
|
|
|
|
buffer = auxtrace_buffer__next(queue, buffer);
|
|
|
|
if (!buffer)
|
|
|
|
break;
|
|
|
|
|
|
|
|
err = intel_pt_get_buffer(ptq, buffer, old_buffer, &b);
|
|
|
|
if (err)
|
|
|
|
break;
|
|
|
|
|
|
|
|
if (b.len) {
|
|
|
|
intel_pt_lookahead_drop_buffer(ptq, old_buffer);
|
|
|
|
old_buffer = buffer;
|
|
|
|
} else {
|
|
|
|
intel_pt_lookahead_drop_buffer(ptq, buffer);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = cb(&b, cb_data);
|
|
|
|
if (err)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (buffer != old_buffer)
|
|
|
|
intel_pt_lookahead_drop_buffer(ptq, buffer);
|
|
|
|
intel_pt_lookahead_drop_buffer(ptq, old_buffer);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This function assumes data is processed sequentially only.
|
|
|
|
* Must be serialized with respect to intel_pt_lookahead()
|
|
|
|
*/
|
2019-06-04 21:00:07 +08:00
|
|
|
static int intel_pt_get_trace(struct intel_pt_buffer *b, void *data)
|
|
|
|
{
|
|
|
|
struct intel_pt_queue *ptq = data;
|
|
|
|
struct auxtrace_buffer *buffer = ptq->buffer;
|
|
|
|
struct auxtrace_buffer *old_buffer = ptq->old_buffer;
|
|
|
|
struct auxtrace_queue *queue;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
if (ptq->stop) {
|
|
|
|
b->len = 0;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
queue = &ptq->pt->queues.queue_array[ptq->queue_nr];
|
|
|
|
|
|
|
|
buffer = auxtrace_buffer__next(queue, buffer);
|
|
|
|
if (!buffer) {
|
|
|
|
if (old_buffer)
|
|
|
|
auxtrace_buffer__drop_data(old_buffer);
|
|
|
|
b->len = 0;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
ptq->buffer = buffer;
|
|
|
|
|
|
|
|
err = intel_pt_get_buffer(ptq, buffer, old_buffer, b);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
if (ptq->step_through_buffers)
|
|
|
|
ptq->stop = true;
|
|
|
|
|
2018-03-07 22:02:27 +08:00
|
|
|
if (b->len) {
|
|
|
|
if (old_buffer)
|
|
|
|
auxtrace_buffer__drop_data(old_buffer);
|
|
|
|
ptq->old_buffer = buffer;
|
|
|
|
} else {
|
|
|
|
auxtrace_buffer__drop_data(buffer);
|
2015-07-18 00:33:41 +08:00
|
|
|
return intel_pt_get_trace(b, data);
|
2018-03-07 22:02:27 +08:00
|
|
|
}
|
2015-07-18 00:33:41 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct intel_pt_cache_entry {
|
|
|
|
struct auxtrace_cache_entry entry;
|
|
|
|
u64 insn_cnt;
|
|
|
|
u64 byte_cnt;
|
|
|
|
enum intel_pt_insn_op op;
|
|
|
|
enum intel_pt_insn_branch branch;
|
2022-05-09 23:23:58 +08:00
|
|
|
bool emulated_ptwrite;
|
2015-07-18 00:33:41 +08:00
|
|
|
int length;
|
|
|
|
int32_t rel;
|
2016-10-07 21:42:26 +08:00
|
|
|
char insn[INTEL_PT_INSN_BUF_SZ];
|
2015-07-18 00:33:41 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
static int intel_pt_config_div(const char *var, const char *value, void *data)
|
|
|
|
{
|
|
|
|
int *d = data;
|
|
|
|
long val;
|
|
|
|
|
|
|
|
if (!strcmp(var, "intel-pt.cache-divisor")) {
|
|
|
|
val = strtol(value, NULL, 0);
|
|
|
|
if (val > 0 && val <= INT_MAX)
|
|
|
|
*d = val;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int intel_pt_cache_divisor(void)
|
|
|
|
{
|
|
|
|
static int d;
|
|
|
|
|
|
|
|
if (d)
|
|
|
|
return d;
|
|
|
|
|
|
|
|
perf_config(intel_pt_config_div, &d);
|
|
|
|
|
|
|
|
if (!d)
|
|
|
|
d = 64;
|
|
|
|
|
|
|
|
return d;
|
|
|
|
}
|
|
|
|
|
|
|
|
static unsigned int intel_pt_cache_size(struct dso *dso,
|
|
|
|
struct machine *machine)
|
|
|
|
{
|
|
|
|
off_t size;
|
|
|
|
|
|
|
|
size = dso__data_size(dso, machine);
|
|
|
|
size /= intel_pt_cache_divisor();
|
|
|
|
if (size < 1000)
|
|
|
|
return 10;
|
|
|
|
if (size > (1 << 21))
|
|
|
|
return 21;
|
|
|
|
return 32 - __builtin_clz(size);
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct auxtrace_cache *intel_pt_cache(struct dso *dso,
|
|
|
|
struct machine *machine)
|
|
|
|
{
|
|
|
|
struct auxtrace_cache *c;
|
|
|
|
unsigned int bits;
|
|
|
|
|
|
|
|
if (dso->auxtrace_cache)
|
|
|
|
return dso->auxtrace_cache;
|
|
|
|
|
|
|
|
bits = intel_pt_cache_size(dso, machine);
|
|
|
|
|
|
|
|
/* Ignoring cache creation failure */
|
|
|
|
c = auxtrace_cache__new(bits, sizeof(struct intel_pt_cache_entry), 200);
|
|
|
|
|
|
|
|
dso->auxtrace_cache = c;
|
|
|
|
|
|
|
|
return c;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int intel_pt_cache_add(struct dso *dso, struct machine *machine,
|
|
|
|
u64 offset, u64 insn_cnt, u64 byte_cnt,
|
|
|
|
struct intel_pt_insn *intel_pt_insn)
|
|
|
|
{
|
|
|
|
struct auxtrace_cache *c = intel_pt_cache(dso, machine);
|
|
|
|
struct intel_pt_cache_entry *e;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
if (!c)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
e = auxtrace_cache__alloc_entry(c);
|
|
|
|
if (!e)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
e->insn_cnt = insn_cnt;
|
|
|
|
e->byte_cnt = byte_cnt;
|
|
|
|
e->op = intel_pt_insn->op;
|
|
|
|
e->branch = intel_pt_insn->branch;
|
2022-05-09 23:23:58 +08:00
|
|
|
e->emulated_ptwrite = intel_pt_insn->emulated_ptwrite;
|
2015-07-18 00:33:41 +08:00
|
|
|
e->length = intel_pt_insn->length;
|
|
|
|
e->rel = intel_pt_insn->rel;
|
2016-10-07 21:42:26 +08:00
|
|
|
memcpy(e->insn, intel_pt_insn->buf, INTEL_PT_INSN_BUF_SZ);
|
2015-07-18 00:33:41 +08:00
|
|
|
|
|
|
|
err = auxtrace_cache__add(c, offset, &e->entry);
|
|
|
|
if (err)
|
|
|
|
auxtrace_cache__free_entry(c, e);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct intel_pt_cache_entry *
|
|
|
|
intel_pt_cache_lookup(struct dso *dso, struct machine *machine, u64 offset)
|
|
|
|
{
|
|
|
|
struct auxtrace_cache *c = intel_pt_cache(dso, machine);
|
|
|
|
|
|
|
|
if (!c)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
return auxtrace_cache__lookup(dso->auxtrace_cache, offset);
|
|
|
|
}
|
|
|
|
|
perf intel-pt: Add support for text poke events
Select text poke events when available and the kernel is being traced.
Process text poke events to invalidate entries in Intel PT's instruction
cache.
Example:
The example requires kernel config:
CONFIG_PROC_SYSCTL=y
CONFIG_SCHED_DEBUG=y
CONFIG_SCHEDSTATS=y
Before:
# perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 3.341 MB perf.data.before ]
[1]+ Terminated perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.before --itrace=e >/dev/null
Warning:
474 instruction trace errors
After:
# perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 2.646 MB perf.data.after ]
[1]+ Terminated perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.after --itrace=e >/dev/null
Example:
The example requires kernel config:
# CONFIG_FUNCTION_TRACER is not set
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.026 MB perf.data (68 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.268 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
207 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.028 MB perf.data (107 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 39.978 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
6 565303693547 0x291f18 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027a000 len 4096 type 2 flags 0x0 name kprobe_insn_page
6 565303697010 0x291f68 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 0 new len 6
6 565303838278 0x291fa8 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027c000 len 4096 type 2 flags 0x0 name kprobe_optinsn_page
6 565303848286 0x291ff8 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 0 new len 106
6 565369336743 0x292af8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
7 566434327704 0x217c208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
6 566456313475 0x293198 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 106 new len 0
6 566456314935 0x293238 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 6 new len 0
Example:
The example requires kernel config:
CONFIG_FUNCTION_TRACER=y
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.022 MB perf.data (6 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 2 times to write data ]
[ perf record: Captured and wrote 43.850 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
8 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.037 MB perf.data (206 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.442 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
5 312216133258 0x8bafe0 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc0360000 len 415 type 2 flags 0x0 name ftrace_trampoline
5 312216133494 0x8bb030 [0x1d8]: PERF_RECORD_TEXT_POKE addr 0xffffffffc0360000 old len 0 new len 415
5 312216229563 0x8bb208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216239063 0x8bb248 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
5 312216727230 0x8bb288 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
5 312216739322 0x8bb2c8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216748321 0x8bb308 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287163462 0x2817430 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287174890 0x2817470 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287818979 0x28174b0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
7 313287829357 0x28174f0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287841246 0x2817530 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Masami Hiramatsu <mhiramat@kernel.org>
Cc: Mathieu Poirier <mathieu.poirier@linaro.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Steven Rostedt (VMware) <rostedt@goodmis.org>
Cc: x86@kernel.org
Link: http://lore.kernel.org/lkml/20200512121922.8997-14-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2020-05-12 20:19:20 +08:00
|
|
|
static void intel_pt_cache_invalidate(struct dso *dso, struct machine *machine,
|
|
|
|
u64 offset)
|
|
|
|
{
|
|
|
|
struct auxtrace_cache *c = intel_pt_cache(dso, machine);
|
|
|
|
|
|
|
|
if (!c)
|
|
|
|
return;
|
|
|
|
|
|
|
|
auxtrace_cache__remove(dso->auxtrace_cache, offset);
|
|
|
|
}
|
|
|
|
|
2021-02-18 17:57:57 +08:00
|
|
|
static inline bool intel_pt_guest_kernel_ip(uint64_t ip)
|
2018-10-31 17:10:43 +08:00
|
|
|
{
|
2021-02-18 17:57:57 +08:00
|
|
|
/* Assumes 64-bit kernel */
|
|
|
|
return ip & (1ULL << 63);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline u8 intel_pt_nr_cpumode(struct intel_pt_queue *ptq, uint64_t ip, bool nr)
|
|
|
|
{
|
|
|
|
if (nr) {
|
|
|
|
return intel_pt_guest_kernel_ip(ip) ?
|
|
|
|
PERF_RECORD_MISC_GUEST_KERNEL :
|
|
|
|
PERF_RECORD_MISC_GUEST_USER;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ip >= ptq->pt->kernel_start ?
|
2018-10-31 17:10:43 +08:00
|
|
|
PERF_RECORD_MISC_KERNEL :
|
|
|
|
PERF_RECORD_MISC_USER;
|
|
|
|
}
|
|
|
|
|
2021-02-18 17:57:57 +08:00
|
|
|
static inline u8 intel_pt_cpumode(struct intel_pt_queue *ptq, uint64_t from_ip, uint64_t to_ip)
|
|
|
|
{
|
|
|
|
/* No support for non-zero CS base */
|
|
|
|
if (from_ip)
|
|
|
|
return intel_pt_nr_cpumode(ptq, from_ip, ptq->state->from_nr);
|
|
|
|
return intel_pt_nr_cpumode(ptq, to_ip, ptq->state->to_nr);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int intel_pt_get_guest(struct intel_pt_queue *ptq)
|
|
|
|
{
|
|
|
|
struct machines *machines = &ptq->pt->session->machines;
|
|
|
|
struct machine *machine;
|
|
|
|
pid_t pid = ptq->pid <= 0 ? DEFAULT_GUEST_KERNEL_ID : ptq->pid;
|
|
|
|
|
2022-07-11 17:32:11 +08:00
|
|
|
if (ptq->guest_machine && pid == ptq->guest_machine->pid)
|
2021-02-18 17:57:57 +08:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
ptq->guest_machine = NULL;
|
|
|
|
thread__zput(ptq->unknown_guest_thread);
|
|
|
|
|
perf intel-pt: Add guest_code support
A common case for KVM test programs is that the test program acts as the
hypervisor, creating, running and destroying the virtual machine, and
providing the guest object code from its own object code. In this case,
the VM is not running an OS, but only the functions loaded into it by the
hypervisor test program, and conveniently, loaded at the same virtual
addresses.
To support that, a new option "--guest-code" has been added in
previous patches.
In this patch, add support also to Intel PT.
In particular, ensure guest_code thread is set up before attempting to
walk object code or synthesize samples.
Example:
# perf record --kcore -e intel_pt/cyc/ -- tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.280 MB perf.data ]
# perf script --guest-code --itrace=bep --ns -F-period,+addr,+flags
[SNIP]
tsc_msrs_test 18436 [007] 10897.962087733: branches: call ffffffffc13b2ff5 __vmx_vcpu_run+0x15 (vmlinux) => ffffffffc13b2f50 vmx_update_host_rsp+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962087733: branches: return ffffffffc13b2f5d vmx_update_host_rsp+0xd (vmlinux) => ffffffffc13b2ffa __vmx_vcpu_run+0x1a (vmlinux)
tsc_msrs_test 18436 [007] 10897.962087733: branches: call ffffffffc13b303b __vmx_vcpu_run+0x5b (vmlinux) => ffffffffc13b2f80 vmx_vmenter+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962087836: branches: vmentry ffffffffc13b2f82 vmx_vmenter+0x2 (vmlinux) => 0 [unknown] ([unknown])
[guest/18436] 18436 [007] 10897.962087836: branches: vmentry 0 [unknown] ([unknown]) => 402c81 guest_code+0x131 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962087836: branches: call 402c81 guest_code+0x131 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dba0 ucall+0x0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962088248: branches: vmexit 40dba0 ucall+0x0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 0 [unknown] ([unknown])
tsc_msrs_test 18436 [007] 10897.962088248: branches: vmexit 0 [unknown] ([unknown]) => ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962088248: branches: jmp ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux) => ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962088256: branches: return ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux) => ffffffffc13b3040 __vmx_vcpu_run+0x60 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962088270: branches: return ffffffffc13b30b6 __vmx_vcpu_run+0xd6 (vmlinux) => ffffffffc13b2f2e vmx_vcpu_enter_exit+0x4e (vmlinux)
[SNIP]
tsc_msrs_test 18436 [007] 10897.962089321: branches: call ffffffffc13b2ff5 __vmx_vcpu_run+0x15 (vmlinux) => ffffffffc13b2f50 vmx_update_host_rsp+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089321: branches: return ffffffffc13b2f5d vmx_update_host_rsp+0xd (vmlinux) => ffffffffc13b2ffa __vmx_vcpu_run+0x1a (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089321: branches: call ffffffffc13b303b __vmx_vcpu_run+0x5b (vmlinux) => ffffffffc13b2f80 vmx_vmenter+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089424: branches: vmentry ffffffffc13b2f82 vmx_vmenter+0x2 (vmlinux) => 0 [unknown] ([unknown])
[guest/18436] 18436 [007] 10897.962089424: branches: vmentry 0 [unknown] ([unknown]) => 40dba0 ucall+0x0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jmp 40dc1b ucall+0x7b (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc39 ucall+0x99 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jcc 40dc3c ucall+0x9c (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc20 ucall+0x80 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jcc 40dc3c ucall+0x9c (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc20 ucall+0x80 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jcc 40dc37 ucall+0x97 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc50 ucall+0xb0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089878: branches: vmexit 40dc55 ucall+0xb5 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 0 [unknown] ([unknown])
tsc_msrs_test 18436 [007] 10897.962089878: branches: vmexit 0 [unknown] ([unknown]) => ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089878: branches: jmp ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux) => ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089887: branches: return ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux) => ffffffffc13b3040 __vmx_vcpu_run+0x60 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089901: branches: return ffffffffc13b30b6 __vmx_vcpu_run+0xd6 (vmlinux) => ffffffffc13b2f2e vmx_vcpu_enter_exit+0x4e (vmlinux)
[SNIP]
# perf kvm --guest-code --guest --host report -i perf.data --stdio | head -20
# To display the perf.data header info, please use --header/--header-only options.
#
#
# Total Lost Samples: 0
#
# Samples: 12 of event 'instructions'
# Event count (approx.): 2274583
#
# Children Self Command Shared Object Symbol
# ........ ........ ............. .................... ...........................................
#
54.70% 0.00% tsc_msrs_test [kernel.vmlinux] [k] entry_SYSCALL_64_after_hwframe
|
---entry_SYSCALL_64_after_hwframe
do_syscall_64
|
|--29.44%--syscall_exit_to_user_mode
| exit_to_user_mode_prepare
| task_work_run
| __fput
For more information about Perf tools support for Intel® Processor Trace
refer:
https://perf.wiki.kernel.org/index.php/Perf_tools_support_for_Intel%C2%AE_Processor_Trace
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Andi Kleen <ak@linux.intel.com>
Cc: Ian Rogers <irogers@google.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: kvm@vger.kernel.org
Link: https://lore.kernel.org/r/20220517131011.6117-7-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2022-05-17 21:10:11 +08:00
|
|
|
if (symbol_conf.guest_code) {
|
|
|
|
thread__zput(ptq->guest_thread);
|
|
|
|
ptq->guest_thread = machines__findnew_guest_code(machines, pid);
|
|
|
|
}
|
|
|
|
|
2021-02-18 17:57:57 +08:00
|
|
|
machine = machines__find_guest(machines, pid);
|
|
|
|
if (!machine)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
ptq->unknown_guest_thread = machine__idle_thread(machine);
|
|
|
|
if (!ptq->unknown_guest_thread)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
ptq->guest_machine = machine;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2022-05-09 23:23:58 +08:00
|
|
|
static inline bool intel_pt_jmp_16(struct intel_pt_insn *intel_pt_insn)
|
|
|
|
{
|
|
|
|
return intel_pt_insn->rel == 16 && intel_pt_insn->branch == INTEL_PT_BR_UNCONDITIONAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define PTWRITE_MAGIC "\x0f\x0bperf,ptwrite "
|
|
|
|
#define PTWRITE_MAGIC_LEN 16
|
|
|
|
|
|
|
|
static bool intel_pt_emulated_ptwrite(struct dso *dso, struct machine *machine, u64 offset)
|
|
|
|
{
|
|
|
|
unsigned char buf[PTWRITE_MAGIC_LEN];
|
|
|
|
ssize_t len;
|
|
|
|
|
|
|
|
len = dso__data_read_offset(dso, machine, offset, buf, PTWRITE_MAGIC_LEN);
|
|
|
|
if (len == PTWRITE_MAGIC_LEN && !memcmp(buf, PTWRITE_MAGIC, PTWRITE_MAGIC_LEN)) {
|
|
|
|
intel_pt_log("Emulated ptwrite signature found\n");
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
intel_pt_log("Emulated ptwrite signature not found\n");
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
static int intel_pt_walk_next_insn(struct intel_pt_insn *intel_pt_insn,
|
|
|
|
uint64_t *insn_cnt_ptr, uint64_t *ip,
|
|
|
|
uint64_t to_ip, uint64_t max_insn_cnt,
|
|
|
|
void *data)
|
|
|
|
{
|
|
|
|
struct intel_pt_queue *ptq = data;
|
|
|
|
struct machine *machine = ptq->pt->machine;
|
|
|
|
struct thread *thread;
|
|
|
|
struct addr_location al;
|
2016-10-07 21:42:25 +08:00
|
|
|
unsigned char buf[INTEL_PT_INSN_BUF_SZ];
|
2015-07-18 00:33:41 +08:00
|
|
|
ssize_t len;
|
2023-06-09 07:28:03 +08:00
|
|
|
int x86_64, ret = 0;
|
2015-07-18 00:33:41 +08:00
|
|
|
u8 cpumode;
|
|
|
|
u64 offset, start_offset, start_ip;
|
|
|
|
u64 insn_cnt = 0;
|
|
|
|
bool one_map = true;
|
2021-02-18 17:57:57 +08:00
|
|
|
bool nr;
|
2015-07-18 00:33:41 +08:00
|
|
|
|
2023-06-09 07:28:03 +08:00
|
|
|
|
|
|
|
addr_location__init(&al);
|
2016-10-07 21:42:26 +08:00
|
|
|
intel_pt_insn->length = 0;
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
if (to_ip && *ip == to_ip)
|
|
|
|
goto out_no_cache;
|
|
|
|
|
2021-02-18 17:57:57 +08:00
|
|
|
nr = ptq->state->to_nr;
|
|
|
|
cpumode = intel_pt_nr_cpumode(ptq, *ip, nr);
|
2015-07-18 00:33:41 +08:00
|
|
|
|
2021-02-18 17:57:57 +08:00
|
|
|
if (nr) {
|
2022-07-11 17:32:15 +08:00
|
|
|
if (ptq->pt->have_guest_sideband) {
|
|
|
|
if (!ptq->guest_machine || ptq->guest_machine_pid != ptq->pid) {
|
|
|
|
intel_pt_log("ERROR: guest sideband but no guest machine\n");
|
2023-06-09 07:28:03 +08:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out_ret;
|
2022-07-11 17:32:15 +08:00
|
|
|
}
|
|
|
|
} else if ((!symbol_conf.guest_code && cpumode != PERF_RECORD_MISC_GUEST_KERNEL) ||
|
|
|
|
intel_pt_get_guest(ptq)) {
|
2022-07-11 17:32:12 +08:00
|
|
|
intel_pt_log("ERROR: no guest machine\n");
|
2023-06-09 07:28:03 +08:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out_ret;
|
2022-07-11 17:32:12 +08:00
|
|
|
}
|
2021-02-18 17:57:57 +08:00
|
|
|
machine = ptq->guest_machine;
|
perf intel-pt: Add guest_code support
A common case for KVM test programs is that the test program acts as the
hypervisor, creating, running and destroying the virtual machine, and
providing the guest object code from its own object code. In this case,
the VM is not running an OS, but only the functions loaded into it by the
hypervisor test program, and conveniently, loaded at the same virtual
addresses.
To support that, a new option "--guest-code" has been added in
previous patches.
In this patch, add support also to Intel PT.
In particular, ensure guest_code thread is set up before attempting to
walk object code or synthesize samples.
Example:
# perf record --kcore -e intel_pt/cyc/ -- tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.280 MB perf.data ]
# perf script --guest-code --itrace=bep --ns -F-period,+addr,+flags
[SNIP]
tsc_msrs_test 18436 [007] 10897.962087733: branches: call ffffffffc13b2ff5 __vmx_vcpu_run+0x15 (vmlinux) => ffffffffc13b2f50 vmx_update_host_rsp+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962087733: branches: return ffffffffc13b2f5d vmx_update_host_rsp+0xd (vmlinux) => ffffffffc13b2ffa __vmx_vcpu_run+0x1a (vmlinux)
tsc_msrs_test 18436 [007] 10897.962087733: branches: call ffffffffc13b303b __vmx_vcpu_run+0x5b (vmlinux) => ffffffffc13b2f80 vmx_vmenter+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962087836: branches: vmentry ffffffffc13b2f82 vmx_vmenter+0x2 (vmlinux) => 0 [unknown] ([unknown])
[guest/18436] 18436 [007] 10897.962087836: branches: vmentry 0 [unknown] ([unknown]) => 402c81 guest_code+0x131 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962087836: branches: call 402c81 guest_code+0x131 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dba0 ucall+0x0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962088248: branches: vmexit 40dba0 ucall+0x0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 0 [unknown] ([unknown])
tsc_msrs_test 18436 [007] 10897.962088248: branches: vmexit 0 [unknown] ([unknown]) => ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962088248: branches: jmp ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux) => ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962088256: branches: return ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux) => ffffffffc13b3040 __vmx_vcpu_run+0x60 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962088270: branches: return ffffffffc13b30b6 __vmx_vcpu_run+0xd6 (vmlinux) => ffffffffc13b2f2e vmx_vcpu_enter_exit+0x4e (vmlinux)
[SNIP]
tsc_msrs_test 18436 [007] 10897.962089321: branches: call ffffffffc13b2ff5 __vmx_vcpu_run+0x15 (vmlinux) => ffffffffc13b2f50 vmx_update_host_rsp+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089321: branches: return ffffffffc13b2f5d vmx_update_host_rsp+0xd (vmlinux) => ffffffffc13b2ffa __vmx_vcpu_run+0x1a (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089321: branches: call ffffffffc13b303b __vmx_vcpu_run+0x5b (vmlinux) => ffffffffc13b2f80 vmx_vmenter+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089424: branches: vmentry ffffffffc13b2f82 vmx_vmenter+0x2 (vmlinux) => 0 [unknown] ([unknown])
[guest/18436] 18436 [007] 10897.962089424: branches: vmentry 0 [unknown] ([unknown]) => 40dba0 ucall+0x0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jmp 40dc1b ucall+0x7b (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc39 ucall+0x99 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jcc 40dc3c ucall+0x9c (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc20 ucall+0x80 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jcc 40dc3c ucall+0x9c (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc20 ucall+0x80 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jcc 40dc37 ucall+0x97 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc50 ucall+0xb0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089878: branches: vmexit 40dc55 ucall+0xb5 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 0 [unknown] ([unknown])
tsc_msrs_test 18436 [007] 10897.962089878: branches: vmexit 0 [unknown] ([unknown]) => ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089878: branches: jmp ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux) => ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089887: branches: return ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux) => ffffffffc13b3040 __vmx_vcpu_run+0x60 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089901: branches: return ffffffffc13b30b6 __vmx_vcpu_run+0xd6 (vmlinux) => ffffffffc13b2f2e vmx_vcpu_enter_exit+0x4e (vmlinux)
[SNIP]
# perf kvm --guest-code --guest --host report -i perf.data --stdio | head -20
# To display the perf.data header info, please use --header/--header-only options.
#
#
# Total Lost Samples: 0
#
# Samples: 12 of event 'instructions'
# Event count (approx.): 2274583
#
# Children Self Command Shared Object Symbol
# ........ ........ ............. .................... ...........................................
#
54.70% 0.00% tsc_msrs_test [kernel.vmlinux] [k] entry_SYSCALL_64_after_hwframe
|
---entry_SYSCALL_64_after_hwframe
do_syscall_64
|
|--29.44%--syscall_exit_to_user_mode
| exit_to_user_mode_prepare
| task_work_run
| __fput
For more information about Perf tools support for Intel® Processor Trace
refer:
https://perf.wiki.kernel.org/index.php/Perf_tools_support_for_Intel%C2%AE_Processor_Trace
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Andi Kleen <ak@linux.intel.com>
Cc: Ian Rogers <irogers@google.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: kvm@vger.kernel.org
Link: https://lore.kernel.org/r/20220517131011.6117-7-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2022-05-17 21:10:11 +08:00
|
|
|
thread = ptq->guest_thread;
|
|
|
|
if (!thread) {
|
2022-07-11 17:32:12 +08:00
|
|
|
if (cpumode != PERF_RECORD_MISC_GUEST_KERNEL) {
|
|
|
|
intel_pt_log("ERROR: no guest thread\n");
|
2023-06-09 07:28:03 +08:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out_ret;
|
2022-07-11 17:32:12 +08:00
|
|
|
}
|
perf intel-pt: Add guest_code support
A common case for KVM test programs is that the test program acts as the
hypervisor, creating, running and destroying the virtual machine, and
providing the guest object code from its own object code. In this case,
the VM is not running an OS, but only the functions loaded into it by the
hypervisor test program, and conveniently, loaded at the same virtual
addresses.
To support that, a new option "--guest-code" has been added in
previous patches.
In this patch, add support also to Intel PT.
In particular, ensure guest_code thread is set up before attempting to
walk object code or synthesize samples.
Example:
# perf record --kcore -e intel_pt/cyc/ -- tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.280 MB perf.data ]
# perf script --guest-code --itrace=bep --ns -F-period,+addr,+flags
[SNIP]
tsc_msrs_test 18436 [007] 10897.962087733: branches: call ffffffffc13b2ff5 __vmx_vcpu_run+0x15 (vmlinux) => ffffffffc13b2f50 vmx_update_host_rsp+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962087733: branches: return ffffffffc13b2f5d vmx_update_host_rsp+0xd (vmlinux) => ffffffffc13b2ffa __vmx_vcpu_run+0x1a (vmlinux)
tsc_msrs_test 18436 [007] 10897.962087733: branches: call ffffffffc13b303b __vmx_vcpu_run+0x5b (vmlinux) => ffffffffc13b2f80 vmx_vmenter+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962087836: branches: vmentry ffffffffc13b2f82 vmx_vmenter+0x2 (vmlinux) => 0 [unknown] ([unknown])
[guest/18436] 18436 [007] 10897.962087836: branches: vmentry 0 [unknown] ([unknown]) => 402c81 guest_code+0x131 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962087836: branches: call 402c81 guest_code+0x131 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dba0 ucall+0x0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962088248: branches: vmexit 40dba0 ucall+0x0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 0 [unknown] ([unknown])
tsc_msrs_test 18436 [007] 10897.962088248: branches: vmexit 0 [unknown] ([unknown]) => ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962088248: branches: jmp ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux) => ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962088256: branches: return ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux) => ffffffffc13b3040 __vmx_vcpu_run+0x60 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962088270: branches: return ffffffffc13b30b6 __vmx_vcpu_run+0xd6 (vmlinux) => ffffffffc13b2f2e vmx_vcpu_enter_exit+0x4e (vmlinux)
[SNIP]
tsc_msrs_test 18436 [007] 10897.962089321: branches: call ffffffffc13b2ff5 __vmx_vcpu_run+0x15 (vmlinux) => ffffffffc13b2f50 vmx_update_host_rsp+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089321: branches: return ffffffffc13b2f5d vmx_update_host_rsp+0xd (vmlinux) => ffffffffc13b2ffa __vmx_vcpu_run+0x1a (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089321: branches: call ffffffffc13b303b __vmx_vcpu_run+0x5b (vmlinux) => ffffffffc13b2f80 vmx_vmenter+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089424: branches: vmentry ffffffffc13b2f82 vmx_vmenter+0x2 (vmlinux) => 0 [unknown] ([unknown])
[guest/18436] 18436 [007] 10897.962089424: branches: vmentry 0 [unknown] ([unknown]) => 40dba0 ucall+0x0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jmp 40dc1b ucall+0x7b (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc39 ucall+0x99 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jcc 40dc3c ucall+0x9c (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc20 ucall+0x80 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jcc 40dc3c ucall+0x9c (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc20 ucall+0x80 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jcc 40dc37 ucall+0x97 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc50 ucall+0xb0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089878: branches: vmexit 40dc55 ucall+0xb5 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 0 [unknown] ([unknown])
tsc_msrs_test 18436 [007] 10897.962089878: branches: vmexit 0 [unknown] ([unknown]) => ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089878: branches: jmp ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux) => ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089887: branches: return ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux) => ffffffffc13b3040 __vmx_vcpu_run+0x60 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089901: branches: return ffffffffc13b30b6 __vmx_vcpu_run+0xd6 (vmlinux) => ffffffffc13b2f2e vmx_vcpu_enter_exit+0x4e (vmlinux)
[SNIP]
# perf kvm --guest-code --guest --host report -i perf.data --stdio | head -20
# To display the perf.data header info, please use --header/--header-only options.
#
#
# Total Lost Samples: 0
#
# Samples: 12 of event 'instructions'
# Event count (approx.): 2274583
#
# Children Self Command Shared Object Symbol
# ........ ........ ............. .................... ...........................................
#
54.70% 0.00% tsc_msrs_test [kernel.vmlinux] [k] entry_SYSCALL_64_after_hwframe
|
---entry_SYSCALL_64_after_hwframe
do_syscall_64
|
|--29.44%--syscall_exit_to_user_mode
| exit_to_user_mode_prepare
| task_work_run
| __fput
For more information about Perf tools support for Intel® Processor Trace
refer:
https://perf.wiki.kernel.org/index.php/Perf_tools_support_for_Intel%C2%AE_Processor_Trace
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Andi Kleen <ak@linux.intel.com>
Cc: Ian Rogers <irogers@google.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: kvm@vger.kernel.org
Link: https://lore.kernel.org/r/20220517131011.6117-7-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2022-05-17 21:10:11 +08:00
|
|
|
thread = ptq->unknown_guest_thread;
|
|
|
|
}
|
2021-02-18 17:57:57 +08:00
|
|
|
} else {
|
|
|
|
thread = ptq->thread;
|
|
|
|
if (!thread) {
|
2022-07-11 17:32:12 +08:00
|
|
|
if (cpumode != PERF_RECORD_MISC_KERNEL) {
|
|
|
|
intel_pt_log("ERROR: no thread\n");
|
2023-06-09 07:28:03 +08:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out_ret;
|
2022-07-11 17:32:12 +08:00
|
|
|
}
|
2021-02-18 17:57:57 +08:00
|
|
|
thread = ptq->pt->unknown_thread;
|
|
|
|
}
|
2015-07-18 00:33:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
while (1) {
|
2023-03-21 05:22:35 +08:00
|
|
|
struct dso *dso;
|
|
|
|
|
|
|
|
if (!thread__find_map(thread, cpumode, *ip, &al) || !map__dso(al.map)) {
|
2022-07-11 17:32:12 +08:00
|
|
|
if (al.map)
|
|
|
|
intel_pt_log("ERROR: thread has no dso for %#" PRIx64 "\n", *ip);
|
|
|
|
else
|
|
|
|
intel_pt_log("ERROR: thread has no map for %#" PRIx64 "\n", *ip);
|
2023-06-09 07:28:03 +08:00
|
|
|
addr_location__exit(&al);
|
|
|
|
ret = -EINVAL;
|
|
|
|
goto out_ret;
|
2022-07-11 17:32:12 +08:00
|
|
|
}
|
2023-03-21 05:22:35 +08:00
|
|
|
dso = map__dso(al.map);
|
2015-07-18 00:33:41 +08:00
|
|
|
|
2023-03-21 05:22:35 +08:00
|
|
|
if (dso->data.status == DSO_DATA_STATUS_ERROR &&
|
2023-06-09 07:28:03 +08:00
|
|
|
dso__data_status_seen(dso, DSO_DATA_STATUS_SEEN_ITRACE)) {
|
|
|
|
ret = -ENOENT;
|
|
|
|
goto out_ret;
|
|
|
|
}
|
2015-07-18 00:33:41 +08:00
|
|
|
|
2023-04-05 04:59:44 +08:00
|
|
|
offset = map__map_ip(al.map, *ip);
|
2015-07-18 00:33:41 +08:00
|
|
|
|
|
|
|
if (!to_ip && one_map) {
|
|
|
|
struct intel_pt_cache_entry *e;
|
|
|
|
|
2023-03-21 05:22:35 +08:00
|
|
|
e = intel_pt_cache_lookup(dso, machine, offset);
|
2015-07-18 00:33:41 +08:00
|
|
|
if (e &&
|
|
|
|
(!max_insn_cnt || e->insn_cnt <= max_insn_cnt)) {
|
|
|
|
*insn_cnt_ptr = e->insn_cnt;
|
|
|
|
*ip += e->byte_cnt;
|
|
|
|
intel_pt_insn->op = e->op;
|
|
|
|
intel_pt_insn->branch = e->branch;
|
2022-05-09 23:23:58 +08:00
|
|
|
intel_pt_insn->emulated_ptwrite = e->emulated_ptwrite;
|
2015-07-18 00:33:41 +08:00
|
|
|
intel_pt_insn->length = e->length;
|
|
|
|
intel_pt_insn->rel = e->rel;
|
2023-03-21 05:22:35 +08:00
|
|
|
memcpy(intel_pt_insn->buf, e->insn, INTEL_PT_INSN_BUF_SZ);
|
2015-07-18 00:33:41 +08:00
|
|
|
intel_pt_log_insn_no_data(intel_pt_insn, *ip);
|
2023-06-09 07:28:03 +08:00
|
|
|
ret = 0;
|
|
|
|
goto out_ret;
|
2015-07-18 00:33:41 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
start_offset = offset;
|
|
|
|
start_ip = *ip;
|
|
|
|
|
|
|
|
/* Load maps to ensure dso->is_64_bit has been updated */
|
2016-09-02 06:25:52 +08:00
|
|
|
map__load(al.map);
|
2015-07-18 00:33:41 +08:00
|
|
|
|
2023-03-21 05:22:35 +08:00
|
|
|
x86_64 = dso->is_64_bit;
|
2015-07-18 00:33:41 +08:00
|
|
|
|
|
|
|
while (1) {
|
2023-03-21 05:22:35 +08:00
|
|
|
len = dso__data_read_offset(dso, machine,
|
2016-10-07 21:42:25 +08:00
|
|
|
offset, buf,
|
|
|
|
INTEL_PT_INSN_BUF_SZ);
|
2022-07-11 17:32:12 +08:00
|
|
|
if (len <= 0) {
|
2022-09-05 15:34:22 +08:00
|
|
|
intel_pt_log("ERROR: failed to read at offset %#" PRIx64 " ",
|
|
|
|
offset);
|
2022-07-11 17:32:12 +08:00
|
|
|
if (intel_pt_enable_logging)
|
2023-03-21 05:22:35 +08:00
|
|
|
dso__fprintf(dso, intel_pt_log_fp());
|
2023-06-09 07:28:03 +08:00
|
|
|
ret = -EINVAL;
|
|
|
|
goto out_ret;
|
2022-07-11 17:32:12 +08:00
|
|
|
}
|
2015-07-18 00:33:41 +08:00
|
|
|
|
2023-06-09 07:28:03 +08:00
|
|
|
if (intel_pt_get_insn(buf, len, x86_64, intel_pt_insn)) {
|
|
|
|
ret = -EINVAL;
|
|
|
|
goto out_ret;
|
|
|
|
}
|
2015-07-18 00:33:41 +08:00
|
|
|
|
|
|
|
intel_pt_log_insn(intel_pt_insn, *ip);
|
|
|
|
|
|
|
|
insn_cnt += 1;
|
|
|
|
|
2022-05-09 23:23:58 +08:00
|
|
|
if (intel_pt_insn->branch != INTEL_PT_BR_NO_BRANCH) {
|
|
|
|
bool eptw;
|
|
|
|
u64 offs;
|
|
|
|
|
|
|
|
if (!intel_pt_jmp_16(intel_pt_insn))
|
|
|
|
goto out;
|
|
|
|
/* Check for emulated ptwrite */
|
|
|
|
offs = offset + intel_pt_insn->length;
|
2023-03-21 05:22:35 +08:00
|
|
|
eptw = intel_pt_emulated_ptwrite(dso, machine, offs);
|
2022-05-09 23:23:58 +08:00
|
|
|
intel_pt_insn->emulated_ptwrite = eptw;
|
2015-07-18 00:33:41 +08:00
|
|
|
goto out;
|
2022-05-09 23:23:58 +08:00
|
|
|
}
|
2015-07-18 00:33:41 +08:00
|
|
|
|
|
|
|
if (max_insn_cnt && insn_cnt >= max_insn_cnt)
|
|
|
|
goto out_no_cache;
|
|
|
|
|
|
|
|
*ip += intel_pt_insn->length;
|
|
|
|
|
2021-05-19 15:45:14 +08:00
|
|
|
if (to_ip && *ip == to_ip) {
|
|
|
|
intel_pt_insn->length = 0;
|
2015-07-18 00:33:41 +08:00
|
|
|
goto out_no_cache;
|
2021-05-19 15:45:14 +08:00
|
|
|
}
|
2015-07-18 00:33:41 +08:00
|
|
|
|
2023-03-21 05:22:36 +08:00
|
|
|
if (*ip >= map__end(al.map))
|
2015-07-18 00:33:41 +08:00
|
|
|
break;
|
|
|
|
|
|
|
|
offset += intel_pt_insn->length;
|
|
|
|
}
|
|
|
|
one_map = false;
|
|
|
|
}
|
|
|
|
out:
|
|
|
|
*insn_cnt_ptr = insn_cnt;
|
|
|
|
|
|
|
|
if (!one_map)
|
|
|
|
goto out_no_cache;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Didn't lookup in the 'to_ip' case, so do it now to prevent duplicate
|
|
|
|
* entries.
|
|
|
|
*/
|
|
|
|
if (to_ip) {
|
|
|
|
struct intel_pt_cache_entry *e;
|
|
|
|
|
2023-03-21 05:22:35 +08:00
|
|
|
e = intel_pt_cache_lookup(map__dso(al.map), machine, start_offset);
|
2015-07-18 00:33:41 +08:00
|
|
|
if (e)
|
2023-06-09 07:28:03 +08:00
|
|
|
goto out_ret;
|
2015-07-18 00:33:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Ignore cache errors */
|
2023-03-21 05:22:35 +08:00
|
|
|
intel_pt_cache_add(map__dso(al.map), machine, start_offset, insn_cnt,
|
2015-07-18 00:33:41 +08:00
|
|
|
*ip - start_ip, intel_pt_insn);
|
|
|
|
|
2023-06-09 07:28:03 +08:00
|
|
|
out_ret:
|
|
|
|
addr_location__exit(&al);
|
|
|
|
return ret;
|
2015-07-18 00:33:41 +08:00
|
|
|
|
|
|
|
out_no_cache:
|
|
|
|
*insn_cnt_ptr = insn_cnt;
|
2023-06-09 07:28:03 +08:00
|
|
|
addr_location__exit(&al);
|
2015-07-18 00:33:41 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-09-23 22:38:48 +08:00
|
|
|
static bool intel_pt_match_pgd_ip(struct intel_pt *pt, uint64_t ip,
|
|
|
|
uint64_t offset, const char *filename)
|
|
|
|
{
|
|
|
|
struct addr_filter *filt;
|
|
|
|
bool have_filter = false;
|
|
|
|
bool hit_tracestop = false;
|
|
|
|
bool hit_filter = false;
|
|
|
|
|
|
|
|
list_for_each_entry(filt, &pt->filts.head, list) {
|
|
|
|
if (filt->start)
|
|
|
|
have_filter = true;
|
|
|
|
|
|
|
|
if ((filename && !filt->filename) ||
|
|
|
|
(!filename && filt->filename) ||
|
|
|
|
(filename && strcmp(filename, filt->filename)))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (!(offset >= filt->addr && offset < filt->addr + filt->size))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
intel_pt_log("TIP.PGD ip %#"PRIx64" offset %#"PRIx64" in %s hit filter: %s offset %#"PRIx64" size %#"PRIx64"\n",
|
|
|
|
ip, offset, filename ? filename : "[kernel]",
|
|
|
|
filt->start ? "filter" : "stop",
|
|
|
|
filt->addr, filt->size);
|
|
|
|
|
|
|
|
if (filt->start)
|
|
|
|
hit_filter = true;
|
|
|
|
else
|
|
|
|
hit_tracestop = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!hit_tracestop && !hit_filter)
|
|
|
|
intel_pt_log("TIP.PGD ip %#"PRIx64" offset %#"PRIx64" in %s is not in a filter region\n",
|
|
|
|
ip, offset, filename ? filename : "[kernel]");
|
|
|
|
|
|
|
|
return hit_tracestop || (have_filter && !hit_filter);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int __intel_pt_pgd_ip(uint64_t ip, void *data)
|
|
|
|
{
|
|
|
|
struct intel_pt_queue *ptq = data;
|
|
|
|
struct thread *thread;
|
|
|
|
struct addr_location al;
|
|
|
|
u8 cpumode;
|
|
|
|
u64 offset;
|
2023-06-09 07:28:03 +08:00
|
|
|
int res;
|
2016-09-23 22:38:48 +08:00
|
|
|
|
2021-02-18 17:57:58 +08:00
|
|
|
if (ptq->state->to_nr) {
|
|
|
|
if (intel_pt_guest_kernel_ip(ip))
|
|
|
|
return intel_pt_match_pgd_ip(ptq->pt, ip, ip, NULL);
|
|
|
|
/* No support for decoding guest user space */
|
|
|
|
return -EINVAL;
|
|
|
|
} else if (ip >= ptq->pt->kernel_start) {
|
2016-09-23 22:38:48 +08:00
|
|
|
return intel_pt_match_pgd_ip(ptq->pt, ip, ip, NULL);
|
2021-02-18 17:57:58 +08:00
|
|
|
}
|
2016-09-23 22:38:48 +08:00
|
|
|
|
|
|
|
cpumode = PERF_RECORD_MISC_USER;
|
|
|
|
|
|
|
|
thread = ptq->thread;
|
|
|
|
if (!thread)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2023-06-09 07:28:03 +08:00
|
|
|
addr_location__init(&al);
|
2023-03-21 05:22:35 +08:00
|
|
|
if (!thread__find_map(thread, cpumode, ip, &al) || !map__dso(al.map))
|
2016-09-23 22:38:48 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
2023-04-05 04:59:44 +08:00
|
|
|
offset = map__map_ip(al.map, ip);
|
2016-09-23 22:38:48 +08:00
|
|
|
|
2023-06-09 07:28:03 +08:00
|
|
|
res = intel_pt_match_pgd_ip(ptq->pt, ip, offset, map__dso(al.map)->long_name);
|
|
|
|
addr_location__exit(&al);
|
|
|
|
return res;
|
2016-09-23 22:38:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static bool intel_pt_pgd_ip(uint64_t ip, void *data)
|
|
|
|
{
|
|
|
|
return __intel_pt_pgd_ip(ip, data) > 0;
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
static bool intel_pt_get_config(struct intel_pt *pt,
|
|
|
|
struct perf_event_attr *attr, u64 *config)
|
|
|
|
{
|
|
|
|
if (attr->type == pt->pmu_type) {
|
|
|
|
if (config)
|
|
|
|
*config = attr->config;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool intel_pt_exclude_kernel(struct intel_pt *pt)
|
|
|
|
{
|
2019-07-21 19:23:51 +08:00
|
|
|
struct evsel *evsel;
|
2015-07-18 00:33:41 +08:00
|
|
|
|
2016-06-23 22:26:15 +08:00
|
|
|
evlist__for_each_entry(pt->session->evlist, evsel) {
|
2019-07-21 19:24:29 +08:00
|
|
|
if (intel_pt_get_config(pt, &evsel->core.attr, NULL) &&
|
|
|
|
!evsel->core.attr.exclude_kernel)
|
2015-07-18 00:33:41 +08:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool intel_pt_return_compression(struct intel_pt *pt)
|
|
|
|
{
|
2019-07-21 19:23:51 +08:00
|
|
|
struct evsel *evsel;
|
2015-07-18 00:33:41 +08:00
|
|
|
u64 config;
|
|
|
|
|
|
|
|
if (!pt->noretcomp_bit)
|
|
|
|
return true;
|
|
|
|
|
2016-06-23 22:26:15 +08:00
|
|
|
evlist__for_each_entry(pt->session->evlist, evsel) {
|
2019-07-21 19:24:29 +08:00
|
|
|
if (intel_pt_get_config(pt, &evsel->core.attr, &config) &&
|
2015-07-18 00:33:41 +08:00
|
|
|
(config & pt->noretcomp_bit))
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2017-05-26 16:17:11 +08:00
|
|
|
static bool intel_pt_branch_enable(struct intel_pt *pt)
|
|
|
|
{
|
2019-07-21 19:23:51 +08:00
|
|
|
struct evsel *evsel;
|
2017-05-26 16:17:11 +08:00
|
|
|
u64 config;
|
|
|
|
|
|
|
|
evlist__for_each_entry(pt->session->evlist, evsel) {
|
2019-07-21 19:24:29 +08:00
|
|
|
if (intel_pt_get_config(pt, &evsel->core.attr, &config) &&
|
2022-01-24 16:41:41 +08:00
|
|
|
(config & INTEL_PT_CFG_PASS_THRU) &&
|
|
|
|
!(config & INTEL_PT_CFG_BRANCH_EN))
|
2017-05-26 16:17:11 +08:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2022-01-24 16:41:53 +08:00
|
|
|
static bool intel_pt_disabled_tnt(struct intel_pt *pt)
|
|
|
|
{
|
|
|
|
struct evsel *evsel;
|
|
|
|
u64 config;
|
|
|
|
|
|
|
|
evlist__for_each_entry(pt->session->evlist, evsel) {
|
|
|
|
if (intel_pt_get_config(pt, &evsel->core.attr, &config) &&
|
|
|
|
config & INTEL_PT_CFG_TNT_DIS)
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:54 +08:00
|
|
|
static unsigned int intel_pt_mtc_period(struct intel_pt *pt)
|
|
|
|
{
|
2019-07-21 19:23:51 +08:00
|
|
|
struct evsel *evsel;
|
2015-07-18 00:33:54 +08:00
|
|
|
unsigned int shift;
|
|
|
|
u64 config;
|
|
|
|
|
|
|
|
if (!pt->mtc_freq_bits)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
for (shift = 0, config = pt->mtc_freq_bits; !(config & 1); shift++)
|
|
|
|
config >>= 1;
|
|
|
|
|
2016-06-23 22:26:15 +08:00
|
|
|
evlist__for_each_entry(pt->session->evlist, evsel) {
|
2019-07-21 19:24:29 +08:00
|
|
|
if (intel_pt_get_config(pt, &evsel->core.attr, &config))
|
2015-07-18 00:33:54 +08:00
|
|
|
return (config & pt->mtc_freq_bits) >> shift;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
static bool intel_pt_timeless_decoding(struct intel_pt *pt)
|
|
|
|
{
|
2019-07-21 19:23:51 +08:00
|
|
|
struct evsel *evsel;
|
2015-07-18 00:33:41 +08:00
|
|
|
bool timeless_decoding = true;
|
|
|
|
u64 config;
|
|
|
|
|
2021-04-30 15:03:00 +08:00
|
|
|
if (!pt->tsc_bit || !pt->cap_user_time_zero || pt->synth_opts.timeless_decoding)
|
2015-07-18 00:33:41 +08:00
|
|
|
return true;
|
|
|
|
|
2016-06-23 22:26:15 +08:00
|
|
|
evlist__for_each_entry(pt->session->evlist, evsel) {
|
2019-07-21 19:24:29 +08:00
|
|
|
if (!(evsel->core.attr.sample_type & PERF_SAMPLE_TIME))
|
2015-07-18 00:33:41 +08:00
|
|
|
return true;
|
2019-07-21 19:24:29 +08:00
|
|
|
if (intel_pt_get_config(pt, &evsel->core.attr, &config)) {
|
2015-07-18 00:33:41 +08:00
|
|
|
if (config & pt->tsc_bit)
|
|
|
|
timeless_decoding = false;
|
|
|
|
else
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return timeless_decoding;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool intel_pt_tracing_kernel(struct intel_pt *pt)
|
|
|
|
{
|
2019-07-21 19:23:51 +08:00
|
|
|
struct evsel *evsel;
|
2015-07-18 00:33:41 +08:00
|
|
|
|
2016-06-23 22:26:15 +08:00
|
|
|
evlist__for_each_entry(pt->session->evlist, evsel) {
|
2019-07-21 19:24:29 +08:00
|
|
|
if (intel_pt_get_config(pt, &evsel->core.attr, NULL) &&
|
|
|
|
!evsel->core.attr.exclude_kernel)
|
2015-07-18 00:33:41 +08:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool intel_pt_have_tsc(struct intel_pt *pt)
|
|
|
|
{
|
2019-07-21 19:23:51 +08:00
|
|
|
struct evsel *evsel;
|
2015-07-18 00:33:41 +08:00
|
|
|
bool have_tsc = false;
|
|
|
|
u64 config;
|
|
|
|
|
|
|
|
if (!pt->tsc_bit)
|
|
|
|
return false;
|
|
|
|
|
2016-06-23 22:26:15 +08:00
|
|
|
evlist__for_each_entry(pt->session->evlist, evsel) {
|
2019-07-21 19:24:29 +08:00
|
|
|
if (intel_pt_get_config(pt, &evsel->core.attr, &config)) {
|
2015-07-18 00:33:41 +08:00
|
|
|
if (config & pt->tsc_bit)
|
|
|
|
have_tsc = true;
|
|
|
|
else
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return have_tsc;
|
|
|
|
}
|
|
|
|
|
2021-04-30 15:03:09 +08:00
|
|
|
static bool intel_pt_have_mtc(struct intel_pt *pt)
|
|
|
|
{
|
|
|
|
struct evsel *evsel;
|
|
|
|
u64 config;
|
|
|
|
|
|
|
|
evlist__for_each_entry(pt->session->evlist, evsel) {
|
|
|
|
if (intel_pt_get_config(pt, &evsel->core.attr, &config) &&
|
|
|
|
(config & pt->mtc_bit))
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2019-11-15 20:42:24 +08:00
|
|
|
static bool intel_pt_sampling_mode(struct intel_pt *pt)
|
|
|
|
{
|
|
|
|
struct evsel *evsel;
|
|
|
|
|
|
|
|
evlist__for_each_entry(pt->session->evlist, evsel) {
|
|
|
|
if ((evsel->core.attr.sample_type & PERF_SAMPLE_AUX) &&
|
|
|
|
evsel->core.attr.aux_sample_size)
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2021-02-06 01:53:49 +08:00
|
|
|
static u64 intel_pt_ctl(struct intel_pt *pt)
|
|
|
|
{
|
|
|
|
struct evsel *evsel;
|
|
|
|
u64 config;
|
|
|
|
|
|
|
|
evlist__for_each_entry(pt->session->evlist, evsel) {
|
|
|
|
if (intel_pt_get_config(pt, &evsel->core.attr, &config))
|
|
|
|
return config;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
static u64 intel_pt_ns_to_ticks(const struct intel_pt *pt, u64 ns)
|
|
|
|
{
|
|
|
|
u64 quot, rem;
|
|
|
|
|
|
|
|
quot = ns / pt->tc.time_mult;
|
|
|
|
rem = ns % pt->tc.time_mult;
|
|
|
|
return (quot << pt->tc.time_shift) + (rem << pt->tc.time_shift) /
|
|
|
|
pt->tc.time_mult;
|
|
|
|
}
|
|
|
|
|
2020-04-01 18:16:08 +08:00
|
|
|
static struct ip_callchain *intel_pt_alloc_chain(struct intel_pt *pt)
|
|
|
|
{
|
|
|
|
size_t sz = sizeof(struct ip_callchain);
|
|
|
|
|
|
|
|
/* Add 1 to callchain_sz for callchain context */
|
|
|
|
sz += (pt->synth_opts.callchain_sz + 1) * sizeof(u64);
|
|
|
|
return zalloc(sz);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int intel_pt_callchain_init(struct intel_pt *pt)
|
|
|
|
{
|
|
|
|
struct evsel *evsel;
|
|
|
|
|
|
|
|
evlist__for_each_entry(pt->session->evlist, evsel) {
|
|
|
|
if (!(evsel->core.attr.sample_type & PERF_SAMPLE_CALLCHAIN))
|
|
|
|
evsel->synth_sample_type |= PERF_SAMPLE_CALLCHAIN;
|
|
|
|
}
|
|
|
|
|
|
|
|
pt->chain = intel_pt_alloc_chain(pt);
|
|
|
|
if (!pt->chain)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void intel_pt_add_callchain(struct intel_pt *pt,
|
|
|
|
struct perf_sample *sample)
|
|
|
|
{
|
|
|
|
struct thread *thread = machine__findnew_thread(pt->machine,
|
|
|
|
sample->pid,
|
|
|
|
sample->tid);
|
|
|
|
|
|
|
|
thread_stack__sample_late(thread, sample->cpu, pt->chain,
|
|
|
|
pt->synth_opts.callchain_sz + 1, sample->ip,
|
|
|
|
pt->kernel_start);
|
|
|
|
|
|
|
|
sample->callchain = pt->chain;
|
|
|
|
}
|
|
|
|
|
2020-05-16 20:35:48 +08:00
|
|
|
static struct branch_stack *intel_pt_alloc_br_stack(unsigned int entry_cnt)
|
2020-04-29 23:07:49 +08:00
|
|
|
{
|
|
|
|
size_t sz = sizeof(struct branch_stack);
|
|
|
|
|
2020-05-16 20:35:48 +08:00
|
|
|
sz += entry_cnt * sizeof(struct branch_entry);
|
2020-04-29 23:07:49 +08:00
|
|
|
return zalloc(sz);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int intel_pt_br_stack_init(struct intel_pt *pt)
|
|
|
|
{
|
|
|
|
struct evsel *evsel;
|
|
|
|
|
|
|
|
evlist__for_each_entry(pt->session->evlist, evsel) {
|
|
|
|
if (!(evsel->core.attr.sample_type & PERF_SAMPLE_BRANCH_STACK))
|
|
|
|
evsel->synth_sample_type |= PERF_SAMPLE_BRANCH_STACK;
|
|
|
|
}
|
|
|
|
|
2020-05-16 20:35:48 +08:00
|
|
|
pt->br_stack = intel_pt_alloc_br_stack(pt->br_stack_sz);
|
2020-04-29 23:07:49 +08:00
|
|
|
if (!pt->br_stack)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void intel_pt_add_br_stack(struct intel_pt *pt,
|
|
|
|
struct perf_sample *sample)
|
|
|
|
{
|
|
|
|
struct thread *thread = machine__findnew_thread(pt->machine,
|
|
|
|
sample->pid,
|
|
|
|
sample->tid);
|
|
|
|
|
|
|
|
thread_stack__br_sample_late(thread, sample->cpu, pt->br_stack,
|
|
|
|
pt->br_stack_sz, sample->ip,
|
|
|
|
pt->kernel_start);
|
|
|
|
|
|
|
|
sample->branch_stack = pt->br_stack;
|
2023-06-09 07:28:09 +08:00
|
|
|
thread__put(thread);
|
2020-04-29 23:07:49 +08:00
|
|
|
}
|
|
|
|
|
2020-05-16 20:35:48 +08:00
|
|
|
/* INTEL_PT_LBR_0, INTEL_PT_LBR_1 and INTEL_PT_LBR_2 */
|
|
|
|
#define LBRS_MAX (INTEL_PT_BLK_ITEM_ID_CNT * 3U)
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
static struct intel_pt_queue *intel_pt_alloc_queue(struct intel_pt *pt,
|
|
|
|
unsigned int queue_nr)
|
|
|
|
{
|
|
|
|
struct intel_pt_params params = { .get_trace = 0, };
|
2018-05-31 18:23:45 +08:00
|
|
|
struct perf_env *env = pt->machine->env;
|
2015-07-18 00:33:41 +08:00
|
|
|
struct intel_pt_queue *ptq;
|
|
|
|
|
|
|
|
ptq = zalloc(sizeof(struct intel_pt_queue));
|
|
|
|
if (!ptq)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
if (pt->synth_opts.callchain) {
|
2020-04-01 18:16:08 +08:00
|
|
|
ptq->chain = intel_pt_alloc_chain(pt);
|
2015-07-18 00:33:41 +08:00
|
|
|
if (!ptq->chain)
|
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
2020-05-16 20:35:48 +08:00
|
|
|
if (pt->synth_opts.last_branch || pt->synth_opts.other_events) {
|
|
|
|
unsigned int entry_cnt = max(LBRS_MAX, pt->br_stack_sz);
|
|
|
|
|
|
|
|
ptq->last_branch = intel_pt_alloc_br_stack(entry_cnt);
|
2015-09-25 21:15:45 +08:00
|
|
|
if (!ptq->last_branch)
|
|
|
|
goto out_free;
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
ptq->event_buf = malloc(PERF_SAMPLE_MAX_SIZE);
|
|
|
|
if (!ptq->event_buf)
|
|
|
|
goto out_free;
|
|
|
|
|
|
|
|
ptq->pt = pt;
|
|
|
|
ptq->queue_nr = queue_nr;
|
|
|
|
ptq->exclude_kernel = intel_pt_exclude_kernel(pt);
|
|
|
|
ptq->pid = -1;
|
|
|
|
ptq->tid = -1;
|
|
|
|
ptq->cpu = -1;
|
|
|
|
ptq->next_tid = -1;
|
|
|
|
|
|
|
|
params.get_trace = intel_pt_get_trace;
|
|
|
|
params.walk_insn = intel_pt_walk_next_insn;
|
2019-06-04 21:00:08 +08:00
|
|
|
params.lookahead = intel_pt_lookahead;
|
2021-04-30 15:03:05 +08:00
|
|
|
params.findnew_vmcs_info = intel_pt_findnew_vmcs_info;
|
2015-07-18 00:33:41 +08:00
|
|
|
params.data = ptq;
|
|
|
|
params.return_compression = intel_pt_return_compression(pt);
|
2017-05-26 16:17:11 +08:00
|
|
|
params.branch_enable = intel_pt_branch_enable(pt);
|
2021-02-06 01:53:49 +08:00
|
|
|
params.ctl = intel_pt_ctl(pt);
|
2015-07-18 00:33:41 +08:00
|
|
|
params.max_non_turbo_ratio = pt->max_non_turbo_ratio;
|
2015-07-18 00:33:54 +08:00
|
|
|
params.mtc_period = intel_pt_mtc_period(pt);
|
|
|
|
params.tsc_ctc_ratio_n = pt->tsc_ctc_ratio_n;
|
|
|
|
params.tsc_ctc_ratio_d = pt->tsc_ctc_ratio_d;
|
2020-07-10 23:11:03 +08:00
|
|
|
params.quick = pt->synth_opts.quick;
|
2021-04-30 15:03:09 +08:00
|
|
|
params.vm_time_correlation = pt->synth_opts.vm_time_correlation;
|
|
|
|
params.vm_tm_corr_dry_run = pt->synth_opts.vm_tm_corr_dry_run;
|
2021-04-30 15:03:06 +08:00
|
|
|
params.first_timestamp = pt->first_timestamp;
|
2021-07-02 01:51:32 +08:00
|
|
|
params.max_loops = pt->max_loops;
|
2015-07-18 00:33:41 +08:00
|
|
|
|
2022-01-24 16:41:53 +08:00
|
|
|
/* Cannot walk code without TNT, so force 'quick' mode */
|
|
|
|
if (params.branch_enable && intel_pt_disabled_tnt(pt) && !params.quick)
|
|
|
|
params.quick = 1;
|
|
|
|
|
2016-09-23 22:38:48 +08:00
|
|
|
if (pt->filts.cnt > 0)
|
|
|
|
params.pgd_ip = intel_pt_pgd_ip;
|
|
|
|
|
perf intel-pt: Synthesize cycle events
There is no good reason why we cannot synthesize "cycle" events from
Intel PT just as we can synthesize "instruction" events, in particular
when CYC packets are available. This enables using PT to getting much
more accurate cycle profiles than regular sampling (record -e cycles)
when the work last for very short periods (<10 ms). Thus, add support
for this, based off of the existing IPC calculation framework. The new
option to --itrace is "y" (for cYcles), as c was taken for calls. Cycle
and instruction events can be synthesized together, and are by default.
The only real caveat is that CYC packets are only emitted whenever some
other packet is, which in practice is when a branch instruction is
encountered (and not even all branches). Thus, even at no subsampling
(e.g. --itrace=y0ns), it is impossible to get more accuracy than a
single basic block, and all cycles spent executing that block will get
attributed to the branch instruction that ends the packet. Thus, one
cannot know whether the cycles came from e.g. a specific load, a
mispredicted branch, or something else. When subsampling (which is the
default), the cycle events will get smeared out even more, but will
still be generally useful to attribute cycle counts to functions.
Reviewed-by: Adrian Hunter <adrian.hunter@intel.com>
Signed-off-by: Steinar H. Gunderson <sesse@google.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Link: https://lore.kernel.org/r/20220322082452.1429091-1-sesse@google.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2022-03-22 16:24:52 +08:00
|
|
|
if (pt->synth_opts.instructions || pt->synth_opts.cycles) {
|
2015-07-18 00:33:41 +08:00
|
|
|
if (pt->synth_opts.period) {
|
|
|
|
switch (pt->synth_opts.period_type) {
|
|
|
|
case PERF_ITRACE_PERIOD_INSTRUCTIONS:
|
|
|
|
params.period_type =
|
|
|
|
INTEL_PT_PERIOD_INSTRUCTIONS;
|
|
|
|
params.period = pt->synth_opts.period;
|
|
|
|
break;
|
|
|
|
case PERF_ITRACE_PERIOD_TICKS:
|
|
|
|
params.period_type = INTEL_PT_PERIOD_TICKS;
|
|
|
|
params.period = pt->synth_opts.period;
|
|
|
|
break;
|
|
|
|
case PERF_ITRACE_PERIOD_NANOSECS:
|
|
|
|
params.period_type = INTEL_PT_PERIOD_TICKS;
|
|
|
|
params.period = intel_pt_ns_to_ticks(pt,
|
|
|
|
pt->synth_opts.period);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!params.period) {
|
|
|
|
params.period_type = INTEL_PT_PERIOD_INSTRUCTIONS;
|
2015-09-25 21:15:32 +08:00
|
|
|
params.period = 1;
|
2015-07-18 00:33:41 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-05-31 18:23:45 +08:00
|
|
|
if (env->cpuid && !strncmp(env->cpuid, "GenuineIntel,6,92,", 18))
|
|
|
|
params.flags |= INTEL_PT_FUP_WITH_NLIP;
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
ptq->decoder = intel_pt_decoder_new(¶ms);
|
|
|
|
if (!ptq->decoder)
|
|
|
|
goto out_free;
|
|
|
|
|
|
|
|
return ptq;
|
|
|
|
|
|
|
|
out_free:
|
|
|
|
zfree(&ptq->event_buf);
|
2015-09-25 21:15:45 +08:00
|
|
|
zfree(&ptq->last_branch);
|
2015-07-18 00:33:41 +08:00
|
|
|
zfree(&ptq->chain);
|
|
|
|
free(ptq);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void intel_pt_free_queue(void *priv)
|
|
|
|
{
|
|
|
|
struct intel_pt_queue *ptq = priv;
|
|
|
|
|
|
|
|
if (!ptq)
|
|
|
|
return;
|
|
|
|
thread__zput(ptq->thread);
|
perf intel-pt: Add guest_code support
A common case for KVM test programs is that the test program acts as the
hypervisor, creating, running and destroying the virtual machine, and
providing the guest object code from its own object code. In this case,
the VM is not running an OS, but only the functions loaded into it by the
hypervisor test program, and conveniently, loaded at the same virtual
addresses.
To support that, a new option "--guest-code" has been added in
previous patches.
In this patch, add support also to Intel PT.
In particular, ensure guest_code thread is set up before attempting to
walk object code or synthesize samples.
Example:
# perf record --kcore -e intel_pt/cyc/ -- tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.280 MB perf.data ]
# perf script --guest-code --itrace=bep --ns -F-period,+addr,+flags
[SNIP]
tsc_msrs_test 18436 [007] 10897.962087733: branches: call ffffffffc13b2ff5 __vmx_vcpu_run+0x15 (vmlinux) => ffffffffc13b2f50 vmx_update_host_rsp+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962087733: branches: return ffffffffc13b2f5d vmx_update_host_rsp+0xd (vmlinux) => ffffffffc13b2ffa __vmx_vcpu_run+0x1a (vmlinux)
tsc_msrs_test 18436 [007] 10897.962087733: branches: call ffffffffc13b303b __vmx_vcpu_run+0x5b (vmlinux) => ffffffffc13b2f80 vmx_vmenter+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962087836: branches: vmentry ffffffffc13b2f82 vmx_vmenter+0x2 (vmlinux) => 0 [unknown] ([unknown])
[guest/18436] 18436 [007] 10897.962087836: branches: vmentry 0 [unknown] ([unknown]) => 402c81 guest_code+0x131 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962087836: branches: call 402c81 guest_code+0x131 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dba0 ucall+0x0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962088248: branches: vmexit 40dba0 ucall+0x0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 0 [unknown] ([unknown])
tsc_msrs_test 18436 [007] 10897.962088248: branches: vmexit 0 [unknown] ([unknown]) => ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962088248: branches: jmp ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux) => ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962088256: branches: return ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux) => ffffffffc13b3040 __vmx_vcpu_run+0x60 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962088270: branches: return ffffffffc13b30b6 __vmx_vcpu_run+0xd6 (vmlinux) => ffffffffc13b2f2e vmx_vcpu_enter_exit+0x4e (vmlinux)
[SNIP]
tsc_msrs_test 18436 [007] 10897.962089321: branches: call ffffffffc13b2ff5 __vmx_vcpu_run+0x15 (vmlinux) => ffffffffc13b2f50 vmx_update_host_rsp+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089321: branches: return ffffffffc13b2f5d vmx_update_host_rsp+0xd (vmlinux) => ffffffffc13b2ffa __vmx_vcpu_run+0x1a (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089321: branches: call ffffffffc13b303b __vmx_vcpu_run+0x5b (vmlinux) => ffffffffc13b2f80 vmx_vmenter+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089424: branches: vmentry ffffffffc13b2f82 vmx_vmenter+0x2 (vmlinux) => 0 [unknown] ([unknown])
[guest/18436] 18436 [007] 10897.962089424: branches: vmentry 0 [unknown] ([unknown]) => 40dba0 ucall+0x0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jmp 40dc1b ucall+0x7b (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc39 ucall+0x99 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jcc 40dc3c ucall+0x9c (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc20 ucall+0x80 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jcc 40dc3c ucall+0x9c (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc20 ucall+0x80 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jcc 40dc37 ucall+0x97 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc50 ucall+0xb0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089878: branches: vmexit 40dc55 ucall+0xb5 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 0 [unknown] ([unknown])
tsc_msrs_test 18436 [007] 10897.962089878: branches: vmexit 0 [unknown] ([unknown]) => ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089878: branches: jmp ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux) => ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089887: branches: return ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux) => ffffffffc13b3040 __vmx_vcpu_run+0x60 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089901: branches: return ffffffffc13b30b6 __vmx_vcpu_run+0xd6 (vmlinux) => ffffffffc13b2f2e vmx_vcpu_enter_exit+0x4e (vmlinux)
[SNIP]
# perf kvm --guest-code --guest --host report -i perf.data --stdio | head -20
# To display the perf.data header info, please use --header/--header-only options.
#
#
# Total Lost Samples: 0
#
# Samples: 12 of event 'instructions'
# Event count (approx.): 2274583
#
# Children Self Command Shared Object Symbol
# ........ ........ ............. .................... ...........................................
#
54.70% 0.00% tsc_msrs_test [kernel.vmlinux] [k] entry_SYSCALL_64_after_hwframe
|
---entry_SYSCALL_64_after_hwframe
do_syscall_64
|
|--29.44%--syscall_exit_to_user_mode
| exit_to_user_mode_prepare
| task_work_run
| __fput
For more information about Perf tools support for Intel® Processor Trace
refer:
https://perf.wiki.kernel.org/index.php/Perf_tools_support_for_Intel%C2%AE_Processor_Trace
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Andi Kleen <ak@linux.intel.com>
Cc: Ian Rogers <irogers@google.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: kvm@vger.kernel.org
Link: https://lore.kernel.org/r/20220517131011.6117-7-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2022-05-17 21:10:11 +08:00
|
|
|
thread__zput(ptq->guest_thread);
|
2021-02-18 17:57:57 +08:00
|
|
|
thread__zput(ptq->unknown_guest_thread);
|
2015-07-18 00:33:41 +08:00
|
|
|
intel_pt_decoder_free(ptq->decoder);
|
|
|
|
zfree(&ptq->event_buf);
|
2015-09-25 21:15:45 +08:00
|
|
|
zfree(&ptq->last_branch);
|
2015-07-18 00:33:41 +08:00
|
|
|
zfree(&ptq->chain);
|
|
|
|
free(ptq);
|
|
|
|
}
|
|
|
|
|
2021-04-30 15:03:06 +08:00
|
|
|
static void intel_pt_first_timestamp(struct intel_pt *pt, u64 timestamp)
|
|
|
|
{
|
|
|
|
unsigned int i;
|
|
|
|
|
|
|
|
pt->first_timestamp = timestamp;
|
|
|
|
|
|
|
|
for (i = 0; i < pt->queues.nr_queues; i++) {
|
|
|
|
struct auxtrace_queue *queue = &pt->queues.queue_array[i];
|
|
|
|
struct intel_pt_queue *ptq = queue->priv;
|
|
|
|
|
|
|
|
if (ptq && ptq->decoder)
|
|
|
|
intel_pt_set_first_timestamp(ptq->decoder, timestamp);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-07-11 17:32:15 +08:00
|
|
|
static int intel_pt_get_guest_from_sideband(struct intel_pt_queue *ptq)
|
|
|
|
{
|
|
|
|
struct machines *machines = &ptq->pt->session->machines;
|
|
|
|
struct machine *machine;
|
|
|
|
pid_t machine_pid = ptq->pid;
|
|
|
|
pid_t tid;
|
|
|
|
int vcpu;
|
|
|
|
|
|
|
|
if (machine_pid <= 0)
|
|
|
|
return 0; /* Not a guest machine */
|
|
|
|
|
|
|
|
machine = machines__find(machines, machine_pid);
|
|
|
|
if (!machine)
|
|
|
|
return 0; /* Not a guest machine */
|
|
|
|
|
|
|
|
if (ptq->guest_machine != machine) {
|
|
|
|
ptq->guest_machine = NULL;
|
|
|
|
thread__zput(ptq->guest_thread);
|
|
|
|
thread__zput(ptq->unknown_guest_thread);
|
|
|
|
|
|
|
|
ptq->unknown_guest_thread = machine__find_thread(machine, 0, 0);
|
|
|
|
if (!ptq->unknown_guest_thread)
|
|
|
|
return -1;
|
|
|
|
ptq->guest_machine = machine;
|
|
|
|
}
|
|
|
|
|
2023-06-09 07:28:00 +08:00
|
|
|
vcpu = ptq->thread ? thread__guest_cpu(ptq->thread) : -1;
|
2022-07-11 17:32:15 +08:00
|
|
|
if (vcpu < 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
tid = machine__get_current_tid(machine, vcpu);
|
|
|
|
|
2023-06-09 07:28:00 +08:00
|
|
|
if (ptq->guest_thread && thread__tid(ptq->guest_thread) != tid)
|
2022-07-11 17:32:15 +08:00
|
|
|
thread__zput(ptq->guest_thread);
|
|
|
|
|
|
|
|
if (!ptq->guest_thread) {
|
|
|
|
ptq->guest_thread = machine__find_thread(machine, -1, tid);
|
|
|
|
if (!ptq->guest_thread)
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ptq->guest_machine_pid = machine_pid;
|
2023-06-09 07:28:00 +08:00
|
|
|
ptq->guest_pid = thread__pid(ptq->guest_thread);
|
2022-07-11 17:32:15 +08:00
|
|
|
ptq->guest_tid = tid;
|
|
|
|
ptq->vcpu = vcpu;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
static void intel_pt_set_pid_tid_cpu(struct intel_pt *pt,
|
|
|
|
struct auxtrace_queue *queue)
|
|
|
|
{
|
|
|
|
struct intel_pt_queue *ptq = queue->priv;
|
|
|
|
|
|
|
|
if (queue->tid == -1 || pt->have_sched_switch) {
|
|
|
|
ptq->tid = machine__get_current_tid(pt->machine, ptq->cpu);
|
2020-09-09 16:49:23 +08:00
|
|
|
if (ptq->tid == -1)
|
|
|
|
ptq->pid = -1;
|
2015-07-18 00:33:41 +08:00
|
|
|
thread__zput(ptq->thread);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!ptq->thread && ptq->tid != -1)
|
|
|
|
ptq->thread = machine__find_thread(pt->machine, -1, ptq->tid);
|
|
|
|
|
|
|
|
if (ptq->thread) {
|
2023-06-09 07:28:00 +08:00
|
|
|
ptq->pid = thread__pid(ptq->thread);
|
2015-07-18 00:33:41 +08:00
|
|
|
if (queue->cpu == -1)
|
2023-06-09 07:28:00 +08:00
|
|
|
ptq->cpu = thread__cpu(ptq->thread);
|
2015-07-18 00:33:41 +08:00
|
|
|
}
|
2022-07-11 17:32:15 +08:00
|
|
|
|
|
|
|
if (pt->have_guest_sideband && intel_pt_get_guest_from_sideband(ptq)) {
|
|
|
|
ptq->guest_machine_pid = 0;
|
|
|
|
ptq->guest_pid = -1;
|
|
|
|
ptq->guest_tid = -1;
|
|
|
|
ptq->vcpu = -1;
|
|
|
|
}
|
2015-07-18 00:33:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void intel_pt_sample_flags(struct intel_pt_queue *ptq)
|
|
|
|
{
|
2022-01-24 16:41:52 +08:00
|
|
|
struct intel_pt *pt = ptq->pt;
|
|
|
|
|
2021-05-19 15:45:14 +08:00
|
|
|
ptq->insn_len = 0;
|
2015-07-18 00:33:41 +08:00
|
|
|
if (ptq->state->flags & INTEL_PT_ABORT_TX) {
|
|
|
|
ptq->flags = PERF_IP_FLAG_BRANCH | PERF_IP_FLAG_TX_ABORT;
|
|
|
|
} else if (ptq->state->flags & INTEL_PT_ASYNC) {
|
2021-02-18 17:57:59 +08:00
|
|
|
if (!ptq->state->to_ip)
|
|
|
|
ptq->flags = PERF_IP_FLAG_BRANCH |
|
2023-09-28 15:29:53 +08:00
|
|
|
PERF_IP_FLAG_ASYNC |
|
2021-02-18 17:57:59 +08:00
|
|
|
PERF_IP_FLAG_TRACE_END;
|
|
|
|
else if (ptq->state->from_nr && !ptq->state->to_nr)
|
|
|
|
ptq->flags = PERF_IP_FLAG_BRANCH | PERF_IP_FLAG_CALL |
|
2023-09-28 15:29:53 +08:00
|
|
|
PERF_IP_FLAG_ASYNC |
|
2021-02-18 17:57:59 +08:00
|
|
|
PERF_IP_FLAG_VMEXIT;
|
|
|
|
else
|
2015-07-18 00:33:41 +08:00
|
|
|
ptq->flags = PERF_IP_FLAG_BRANCH | PERF_IP_FLAG_CALL |
|
|
|
|
PERF_IP_FLAG_ASYNC |
|
|
|
|
PERF_IP_FLAG_INTERRUPT;
|
|
|
|
} else {
|
|
|
|
if (ptq->state->from_ip)
|
|
|
|
ptq->flags = intel_pt_insn_type(ptq->state->insn_op);
|
|
|
|
else
|
|
|
|
ptq->flags = PERF_IP_FLAG_BRANCH |
|
|
|
|
PERF_IP_FLAG_TRACE_BEGIN;
|
|
|
|
if (ptq->state->flags & INTEL_PT_IN_TX)
|
|
|
|
ptq->flags |= PERF_IP_FLAG_IN_TX;
|
|
|
|
ptq->insn_len = ptq->state->insn_len;
|
2016-10-07 21:42:26 +08:00
|
|
|
memcpy(ptq->insn, ptq->state->insn, INTEL_PT_INSN_BUF_SZ);
|
2015-07-18 00:33:41 +08:00
|
|
|
}
|
2018-09-20 21:00:47 +08:00
|
|
|
|
|
|
|
if (ptq->state->type & INTEL_PT_TRACE_BEGIN)
|
|
|
|
ptq->flags |= PERF_IP_FLAG_TRACE_BEGIN;
|
|
|
|
if (ptq->state->type & INTEL_PT_TRACE_END)
|
|
|
|
ptq->flags |= PERF_IP_FLAG_TRACE_END;
|
2022-01-24 16:41:52 +08:00
|
|
|
|
|
|
|
if (pt->cap_event_trace) {
|
|
|
|
if (ptq->state->type & INTEL_PT_IFLAG_CHG) {
|
|
|
|
if (!ptq->state->from_iflag)
|
|
|
|
ptq->flags |= PERF_IP_FLAG_INTR_DISABLE;
|
|
|
|
if (ptq->state->from_iflag != ptq->state->to_iflag)
|
|
|
|
ptq->flags |= PERF_IP_FLAG_INTR_TOGGLE;
|
|
|
|
} else if (!ptq->state->to_iflag) {
|
|
|
|
ptq->flags |= PERF_IP_FLAG_INTR_DISABLE;
|
|
|
|
}
|
|
|
|
}
|
2015-07-18 00:33:41 +08:00
|
|
|
}
|
|
|
|
|
2019-06-04 21:00:09 +08:00
|
|
|
static void intel_pt_setup_time_range(struct intel_pt *pt,
|
|
|
|
struct intel_pt_queue *ptq)
|
|
|
|
{
|
|
|
|
if (!pt->range_cnt)
|
|
|
|
return;
|
|
|
|
|
|
|
|
ptq->sel_timestamp = pt->time_ranges[0].start;
|
|
|
|
ptq->sel_idx = 0;
|
|
|
|
|
|
|
|
if (ptq->sel_timestamp) {
|
|
|
|
ptq->sel_start = true;
|
|
|
|
} else {
|
|
|
|
ptq->sel_timestamp = pt->time_ranges[0].end;
|
|
|
|
ptq->sel_start = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
static int intel_pt_setup_queue(struct intel_pt *pt,
|
|
|
|
struct auxtrace_queue *queue,
|
|
|
|
unsigned int queue_nr)
|
|
|
|
{
|
|
|
|
struct intel_pt_queue *ptq = queue->priv;
|
|
|
|
|
|
|
|
if (list_empty(&queue->head))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (!ptq) {
|
|
|
|
ptq = intel_pt_alloc_queue(pt, queue_nr);
|
|
|
|
if (!ptq)
|
|
|
|
return -ENOMEM;
|
|
|
|
queue->priv = ptq;
|
|
|
|
|
|
|
|
if (queue->cpu != -1)
|
|
|
|
ptq->cpu = queue->cpu;
|
|
|
|
ptq->tid = queue->tid;
|
|
|
|
|
2019-06-22 17:32:45 +08:00
|
|
|
ptq->cbr_seen = UINT_MAX;
|
|
|
|
|
2018-03-07 22:02:26 +08:00
|
|
|
if (pt->sampling_mode && !pt->snapshot_mode &&
|
|
|
|
pt->timeless_decoding)
|
|
|
|
ptq->step_through_buffers = true;
|
2018-03-07 22:02:22 +08:00
|
|
|
|
|
|
|
ptq->sync_switch = pt->sync_switch;
|
2019-06-04 21:00:09 +08:00
|
|
|
|
|
|
|
intel_pt_setup_time_range(pt, ptq);
|
2015-07-18 00:33:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!ptq->on_heap &&
|
2018-03-07 22:02:22 +08:00
|
|
|
(!ptq->sync_switch ||
|
2015-07-18 00:33:41 +08:00
|
|
|
ptq->switch_state != INTEL_PT_SS_EXPECTING_SWITCH_EVENT)) {
|
|
|
|
const struct intel_pt_state *state;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (pt->timeless_decoding)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
intel_pt_log("queue %u getting timestamp\n", queue_nr);
|
|
|
|
intel_pt_log("queue %u decoding cpu %d pid %d tid %d\n",
|
|
|
|
queue_nr, ptq->cpu, ptq->pid, ptq->tid);
|
2019-06-04 21:00:09 +08:00
|
|
|
|
|
|
|
if (ptq->sel_start && ptq->sel_timestamp) {
|
|
|
|
ret = intel_pt_fast_forward(ptq->decoder,
|
|
|
|
ptq->sel_timestamp);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
while (1) {
|
|
|
|
state = intel_pt_decode(ptq->decoder);
|
|
|
|
if (state->err) {
|
|
|
|
if (state->err == INTEL_PT_ERR_NODATA) {
|
|
|
|
intel_pt_log("queue %u has no timestamp\n",
|
|
|
|
queue_nr);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
if (state->timestamp)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
ptq->timestamp = state->timestamp;
|
|
|
|
intel_pt_log("queue %u timestamp 0x%" PRIx64 "\n",
|
|
|
|
queue_nr, ptq->timestamp);
|
|
|
|
ptq->state = state;
|
|
|
|
ptq->have_sample = true;
|
2019-06-04 21:00:09 +08:00
|
|
|
if (ptq->sel_start && ptq->sel_timestamp &&
|
|
|
|
ptq->timestamp < ptq->sel_timestamp)
|
|
|
|
ptq->have_sample = false;
|
2015-07-18 00:33:41 +08:00
|
|
|
intel_pt_sample_flags(ptq);
|
|
|
|
ret = auxtrace_heap__add(&pt->heap, queue_nr, ptq->timestamp);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
ptq->on_heap = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int intel_pt_setup_queues(struct intel_pt *pt)
|
|
|
|
{
|
|
|
|
unsigned int i;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
for (i = 0; i < pt->queues.nr_queues; i++) {
|
|
|
|
ret = intel_pt_setup_queue(pt, &pt->queues.queue_array[i], i);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-05-26 16:17:27 +08:00
|
|
|
static inline bool intel_pt_skip_event(struct intel_pt *pt)
|
|
|
|
{
|
|
|
|
return pt->synth_opts.initial_skip &&
|
|
|
|
pt->num_events++ < pt->synth_opts.initial_skip;
|
|
|
|
}
|
|
|
|
|
2019-06-22 17:32:45 +08:00
|
|
|
/*
|
|
|
|
* Cannot count CBR as skipped because it won't go away until cbr == cbr_seen.
|
|
|
|
* Also ensure CBR is first non-skipped event by allowing for 4 more samples
|
|
|
|
* from this decoder state.
|
|
|
|
*/
|
|
|
|
static inline bool intel_pt_skip_cbr_event(struct intel_pt *pt)
|
|
|
|
{
|
|
|
|
return pt->synth_opts.initial_skip &&
|
|
|
|
pt->num_events + 4 < pt->synth_opts.initial_skip;
|
|
|
|
}
|
|
|
|
|
2019-06-10 15:27:57 +08:00
|
|
|
static void intel_pt_prep_a_sample(struct intel_pt_queue *ptq,
|
|
|
|
union perf_event *event,
|
|
|
|
struct perf_sample *sample)
|
|
|
|
{
|
|
|
|
event->sample.header.type = PERF_RECORD_SAMPLE;
|
|
|
|
event->sample.header.size = sizeof(struct perf_event_header);
|
|
|
|
|
|
|
|
sample->pid = ptq->pid;
|
|
|
|
sample->tid = ptq->tid;
|
2022-07-11 17:32:17 +08:00
|
|
|
|
|
|
|
if (ptq->pt->have_guest_sideband) {
|
|
|
|
if ((ptq->state->from_ip && ptq->state->from_nr) ||
|
|
|
|
(ptq->state->to_ip && ptq->state->to_nr)) {
|
|
|
|
sample->pid = ptq->guest_pid;
|
|
|
|
sample->tid = ptq->guest_tid;
|
|
|
|
sample->machine_pid = ptq->guest_machine_pid;
|
|
|
|
sample->vcpu = ptq->vcpu;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-10 15:27:57 +08:00
|
|
|
sample->cpu = ptq->cpu;
|
|
|
|
sample->insn_len = ptq->insn_len;
|
|
|
|
memcpy(sample->insn, ptq->insn, INTEL_PT_INSN_BUF_SZ);
|
|
|
|
}
|
|
|
|
|
2017-05-26 16:17:27 +08:00
|
|
|
static void intel_pt_prep_b_sample(struct intel_pt *pt,
|
|
|
|
struct intel_pt_queue *ptq,
|
|
|
|
union perf_event *event,
|
|
|
|
struct perf_sample *sample)
|
|
|
|
{
|
2019-06-10 15:27:57 +08:00
|
|
|
intel_pt_prep_a_sample(ptq, event, sample);
|
|
|
|
|
2017-05-26 16:17:27 +08:00
|
|
|
if (!pt->timeless_decoding)
|
|
|
|
sample->time = tsc_to_perf_time(ptq->timestamp, &pt->tc);
|
|
|
|
|
|
|
|
sample->ip = ptq->state->from_ip;
|
|
|
|
sample->addr = ptq->state->to_ip;
|
2021-02-18 17:57:57 +08:00
|
|
|
sample->cpumode = intel_pt_cpumode(ptq, sample->ip, sample->addr);
|
2017-05-26 16:17:27 +08:00
|
|
|
sample->period = 1;
|
|
|
|
sample->flags = ptq->flags;
|
2018-10-31 17:10:43 +08:00
|
|
|
|
|
|
|
event->sample.header.misc = sample->cpumode;
|
2017-05-26 16:17:27 +08:00
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
static int intel_pt_inject_event(union perf_event *event,
|
2018-01-16 21:14:50 +08:00
|
|
|
struct perf_sample *sample, u64 type)
|
2015-07-18 00:33:41 +08:00
|
|
|
{
|
|
|
|
event->header.size = perf_event__sample_event_size(sample, type, 0);
|
2018-01-16 21:14:52 +08:00
|
|
|
return perf_event__synthesize_sample(event, type, 0, sample);
|
2015-07-18 00:33:41 +08:00
|
|
|
}
|
|
|
|
|
2017-05-26 16:17:27 +08:00
|
|
|
static inline int intel_pt_opt_inject(struct intel_pt *pt,
|
|
|
|
union perf_event *event,
|
|
|
|
struct perf_sample *sample, u64 type)
|
|
|
|
{
|
|
|
|
if (!pt->synth_opts.inject)
|
|
|
|
return 0;
|
|
|
|
|
2018-01-16 21:14:50 +08:00
|
|
|
return intel_pt_inject_event(event, sample, type);
|
2017-05-26 16:17:27 +08:00
|
|
|
}
|
|
|
|
|
2020-04-29 23:07:45 +08:00
|
|
|
static int intel_pt_deliver_synth_event(struct intel_pt *pt,
|
|
|
|
union perf_event *event,
|
|
|
|
struct perf_sample *sample, u64 type)
|
2015-07-18 00:33:41 +08:00
|
|
|
{
|
|
|
|
int ret;
|
2017-05-26 16:17:27 +08:00
|
|
|
|
|
|
|
ret = intel_pt_opt_inject(pt, event, sample, type);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
ret = perf_session__deliver_synth_event(pt->session, event, sample);
|
|
|
|
if (ret)
|
|
|
|
pr_err("Intel PT: failed to deliver event, error %d\n", ret);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int intel_pt_synth_branch_sample(struct intel_pt_queue *ptq)
|
|
|
|
{
|
2015-07-18 00:33:41 +08:00
|
|
|
struct intel_pt *pt = ptq->pt;
|
|
|
|
union perf_event *event = ptq->event_buf;
|
|
|
|
struct perf_sample sample = { .ip = 0, };
|
2015-09-25 21:15:45 +08:00
|
|
|
struct dummy_branch_stack {
|
|
|
|
u64 nr;
|
2020-02-29 00:30:00 +08:00
|
|
|
u64 hw_idx;
|
2015-09-25 21:15:45 +08:00
|
|
|
struct branch_entry entries;
|
|
|
|
} dummy_bs;
|
2015-07-18 00:33:41 +08:00
|
|
|
|
2015-09-25 21:15:44 +08:00
|
|
|
if (pt->branches_filter && !(pt->branches_filter & ptq->flags))
|
|
|
|
return 0;
|
|
|
|
|
2017-05-26 16:17:27 +08:00
|
|
|
if (intel_pt_skip_event(pt))
|
2016-03-29 01:45:38 +08:00
|
|
|
return 0;
|
|
|
|
|
2017-05-26 16:17:27 +08:00
|
|
|
intel_pt_prep_b_sample(pt, ptq, event, &sample);
|
2015-07-18 00:33:41 +08:00
|
|
|
|
|
|
|
sample.id = ptq->pt->branches_id;
|
|
|
|
sample.stream_id = ptq->pt->branches_id;
|
|
|
|
|
2015-09-25 21:15:45 +08:00
|
|
|
/*
|
|
|
|
* perf report cannot handle events without a branch stack when using
|
|
|
|
* SORT_MODE__BRANCH so make a dummy one.
|
|
|
|
*/
|
|
|
|
if (pt->synth_opts.last_branch && sort__mode == SORT_MODE__BRANCH) {
|
|
|
|
dummy_bs = (struct dummy_branch_stack){
|
|
|
|
.nr = 1,
|
2020-02-29 00:30:00 +08:00
|
|
|
.hw_idx = -1ULL,
|
2015-09-25 21:15:45 +08:00
|
|
|
.entries = {
|
|
|
|
.from = sample.ip,
|
|
|
|
.to = sample.addr,
|
|
|
|
},
|
|
|
|
};
|
|
|
|
sample.branch_stack = (struct branch_stack *)&dummy_bs;
|
|
|
|
}
|
|
|
|
|
perf intel-pt: Support itrace A option to approximate IPC
Normally, for cycle-acccurate mode, IPC values are an exact number of
instructions and cycles. Due to the granularity of timestamps, that happens
only when a CYC packet correlates to the event.
Support the itrace 'A' option, to use instead, the number of cycles
associated with the current timestamp. This provides IPC information for
every change of timestamp, but at the expense of accuracy. Due to the
granularity of timestamps, the actual number of cycles increases even
though the cycles reported does not. The number of instructions is known,
but if IPC is reported, cycles can be too low and so IPC is too high. Note
that inaccuracy decreases as the period of sampling increases i.e. if the
number of cycles is too low by a small amount, that becomes less
significant if the number of cycles is large.
Furthermore, it can be used in conjunction with dlfilter-show-cycles.so
to provide higher granularity cycle information.
Reviewed-by: Andi Kleen <ak@linux.intel.com>
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Jiri Olsa <jolsa@redhat.com>
Link: https://lore.kernel.org/r/20211027080334.365596-4-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2021-10-27 16:03:31 +08:00
|
|
|
if (ptq->sample_ipc)
|
2021-02-06 01:53:48 +08:00
|
|
|
sample.cyc_cnt = ptq->ipc_cyc_cnt - ptq->last_br_cyc_cnt;
|
2019-05-20 19:37:13 +08:00
|
|
|
if (sample.cyc_cnt) {
|
|
|
|
sample.insn_cnt = ptq->ipc_insn_cnt - ptq->last_br_insn_cnt;
|
|
|
|
ptq->last_br_insn_cnt = ptq->ipc_insn_cnt;
|
|
|
|
ptq->last_br_cyc_cnt = ptq->ipc_cyc_cnt;
|
|
|
|
}
|
|
|
|
|
2020-04-29 23:07:45 +08:00
|
|
|
return intel_pt_deliver_synth_event(pt, event, &sample,
|
|
|
|
pt->branches_sample_type);
|
2015-07-18 00:33:41 +08:00
|
|
|
}
|
|
|
|
|
2017-05-26 16:17:27 +08:00
|
|
|
static void intel_pt_prep_sample(struct intel_pt *pt,
|
|
|
|
struct intel_pt_queue *ptq,
|
|
|
|
union perf_event *event,
|
|
|
|
struct perf_sample *sample)
|
2015-07-18 00:33:41 +08:00
|
|
|
{
|
2017-05-26 16:17:27 +08:00
|
|
|
intel_pt_prep_b_sample(pt, ptq, event, sample);
|
2015-07-18 00:33:48 +08:00
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
if (pt->synth_opts.callchain) {
|
2018-12-21 20:06:19 +08:00
|
|
|
thread_stack__sample(ptq->thread, ptq->cpu, ptq->chain,
|
2018-10-31 17:10:42 +08:00
|
|
|
pt->synth_opts.callchain_sz + 1,
|
|
|
|
sample->ip, pt->kernel_start);
|
2017-05-26 16:17:27 +08:00
|
|
|
sample->callchain = ptq->chain;
|
2015-07-18 00:33:41 +08:00
|
|
|
}
|
|
|
|
|
2015-09-25 21:15:45 +08:00
|
|
|
if (pt->synth_opts.last_branch) {
|
2020-04-29 23:07:45 +08:00
|
|
|
thread_stack__br_sample(ptq->thread, ptq->cpu, ptq->last_branch,
|
|
|
|
pt->br_stack_sz);
|
2017-05-26 16:17:27 +08:00
|
|
|
sample->branch_stack = ptq->last_branch;
|
2015-09-25 21:15:45 +08:00
|
|
|
}
|
2017-05-26 16:17:27 +08:00
|
|
|
}
|
2015-09-25 21:15:45 +08:00
|
|
|
|
2017-05-26 16:17:27 +08:00
|
|
|
static int intel_pt_synth_instruction_sample(struct intel_pt_queue *ptq)
|
2015-07-18 00:33:41 +08:00
|
|
|
{
|
|
|
|
struct intel_pt *pt = ptq->pt;
|
|
|
|
union perf_event *event = ptq->event_buf;
|
|
|
|
struct perf_sample sample = { .ip = 0, };
|
|
|
|
|
2017-05-26 16:17:27 +08:00
|
|
|
if (intel_pt_skip_event(pt))
|
2016-03-29 01:45:38 +08:00
|
|
|
return 0;
|
|
|
|
|
2017-05-26 16:17:27 +08:00
|
|
|
intel_pt_prep_sample(pt, ptq, event, &sample);
|
2015-07-18 00:33:41 +08:00
|
|
|
|
2017-05-26 16:17:27 +08:00
|
|
|
sample.id = ptq->pt->instructions_id;
|
|
|
|
sample.stream_id = ptq->pt->instructions_id;
|
2020-07-10 23:11:03 +08:00
|
|
|
if (pt->synth_opts.quick)
|
|
|
|
sample.period = 1;
|
|
|
|
else
|
|
|
|
sample.period = ptq->state->tot_insn_cnt - ptq->last_insn_cnt;
|
2015-07-18 00:33:41 +08:00
|
|
|
|
perf intel-pt: Support itrace A option to approximate IPC
Normally, for cycle-acccurate mode, IPC values are an exact number of
instructions and cycles. Due to the granularity of timestamps, that happens
only when a CYC packet correlates to the event.
Support the itrace 'A' option, to use instead, the number of cycles
associated with the current timestamp. This provides IPC information for
every change of timestamp, but at the expense of accuracy. Due to the
granularity of timestamps, the actual number of cycles increases even
though the cycles reported does not. The number of instructions is known,
but if IPC is reported, cycles can be too low and so IPC is too high. Note
that inaccuracy decreases as the period of sampling increases i.e. if the
number of cycles is too low by a small amount, that becomes less
significant if the number of cycles is large.
Furthermore, it can be used in conjunction with dlfilter-show-cycles.so
to provide higher granularity cycle information.
Reviewed-by: Andi Kleen <ak@linux.intel.com>
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Jiri Olsa <jolsa@redhat.com>
Link: https://lore.kernel.org/r/20211027080334.365596-4-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2021-10-27 16:03:31 +08:00
|
|
|
if (ptq->sample_ipc)
|
2021-02-06 01:53:48 +08:00
|
|
|
sample.cyc_cnt = ptq->ipc_cyc_cnt - ptq->last_in_cyc_cnt;
|
2019-05-20 19:37:13 +08:00
|
|
|
if (sample.cyc_cnt) {
|
|
|
|
sample.insn_cnt = ptq->ipc_insn_cnt - ptq->last_in_insn_cnt;
|
|
|
|
ptq->last_in_insn_cnt = ptq->ipc_insn_cnt;
|
|
|
|
ptq->last_in_cyc_cnt = ptq->ipc_cyc_cnt;
|
|
|
|
}
|
|
|
|
|
2017-05-26 16:17:27 +08:00
|
|
|
ptq->last_insn_cnt = ptq->state->tot_insn_cnt;
|
2015-07-18 00:33:41 +08:00
|
|
|
|
2020-04-29 23:07:45 +08:00
|
|
|
return intel_pt_deliver_synth_event(pt, event, &sample,
|
2017-05-26 16:17:27 +08:00
|
|
|
pt->instructions_sample_type);
|
|
|
|
}
|
2015-07-18 00:33:41 +08:00
|
|
|
|
perf intel-pt: Synthesize cycle events
There is no good reason why we cannot synthesize "cycle" events from
Intel PT just as we can synthesize "instruction" events, in particular
when CYC packets are available. This enables using PT to getting much
more accurate cycle profiles than regular sampling (record -e cycles)
when the work last for very short periods (<10 ms). Thus, add support
for this, based off of the existing IPC calculation framework. The new
option to --itrace is "y" (for cYcles), as c was taken for calls. Cycle
and instruction events can be synthesized together, and are by default.
The only real caveat is that CYC packets are only emitted whenever some
other packet is, which in practice is when a branch instruction is
encountered (and not even all branches). Thus, even at no subsampling
(e.g. --itrace=y0ns), it is impossible to get more accuracy than a
single basic block, and all cycles spent executing that block will get
attributed to the branch instruction that ends the packet. Thus, one
cannot know whether the cycles came from e.g. a specific load, a
mispredicted branch, or something else. When subsampling (which is the
default), the cycle events will get smeared out even more, but will
still be generally useful to attribute cycle counts to functions.
Reviewed-by: Adrian Hunter <adrian.hunter@intel.com>
Signed-off-by: Steinar H. Gunderson <sesse@google.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Link: https://lore.kernel.org/r/20220322082452.1429091-1-sesse@google.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2022-03-22 16:24:52 +08:00
|
|
|
static int intel_pt_synth_cycle_sample(struct intel_pt_queue *ptq)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = ptq->pt;
|
|
|
|
union perf_event *event = ptq->event_buf;
|
|
|
|
struct perf_sample sample = { .ip = 0, };
|
|
|
|
u64 period = 0;
|
|
|
|
|
|
|
|
if (ptq->sample_ipc)
|
|
|
|
period = ptq->ipc_cyc_cnt - ptq->last_cy_cyc_cnt;
|
|
|
|
|
|
|
|
if (!period || intel_pt_skip_event(pt))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
intel_pt_prep_sample(pt, ptq, event, &sample);
|
|
|
|
|
|
|
|
sample.id = ptq->pt->cycles_id;
|
|
|
|
sample.stream_id = ptq->pt->cycles_id;
|
|
|
|
sample.period = period;
|
|
|
|
|
|
|
|
sample.cyc_cnt = period;
|
|
|
|
sample.insn_cnt = ptq->ipc_insn_cnt - ptq->last_cy_insn_cnt;
|
|
|
|
ptq->last_cy_insn_cnt = ptq->ipc_insn_cnt;
|
|
|
|
ptq->last_cy_cyc_cnt = ptq->ipc_cyc_cnt;
|
|
|
|
|
|
|
|
return intel_pt_deliver_synth_event(pt, event, &sample, pt->cycles_sample_type);
|
|
|
|
}
|
|
|
|
|
2017-05-26 16:17:27 +08:00
|
|
|
static int intel_pt_synth_transaction_sample(struct intel_pt_queue *ptq)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = ptq->pt;
|
|
|
|
union perf_event *event = ptq->event_buf;
|
|
|
|
struct perf_sample sample = { .ip = 0, };
|
2015-09-25 21:15:45 +08:00
|
|
|
|
2017-05-26 16:17:27 +08:00
|
|
|
if (intel_pt_skip_event(pt))
|
|
|
|
return 0;
|
2015-07-18 00:33:41 +08:00
|
|
|
|
2017-05-26 16:17:27 +08:00
|
|
|
intel_pt_prep_sample(pt, ptq, event, &sample);
|
2015-07-18 00:33:41 +08:00
|
|
|
|
2017-05-26 16:17:27 +08:00
|
|
|
sample.id = ptq->pt->transactions_id;
|
|
|
|
sample.stream_id = ptq->pt->transactions_id;
|
2015-09-25 21:15:45 +08:00
|
|
|
|
2020-04-29 23:07:45 +08:00
|
|
|
return intel_pt_deliver_synth_event(pt, event, &sample,
|
2017-05-26 16:17:27 +08:00
|
|
|
pt->transactions_sample_type);
|
2015-07-18 00:33:41 +08:00
|
|
|
}
|
|
|
|
|
2017-06-30 16:36:45 +08:00
|
|
|
static void intel_pt_prep_p_sample(struct intel_pt *pt,
|
|
|
|
struct intel_pt_queue *ptq,
|
|
|
|
union perf_event *event,
|
|
|
|
struct perf_sample *sample)
|
|
|
|
{
|
|
|
|
intel_pt_prep_sample(pt, ptq, event, sample);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Zero IP is used to mean "trace start" but that is not the case for
|
|
|
|
* power or PTWRITE events with no IP, so clear the flags.
|
|
|
|
*/
|
|
|
|
if (!sample->ip)
|
|
|
|
sample->flags = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int intel_pt_synth_ptwrite_sample(struct intel_pt_queue *ptq)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = ptq->pt;
|
|
|
|
union perf_event *event = ptq->event_buf;
|
|
|
|
struct perf_sample sample = { .ip = 0, };
|
|
|
|
struct perf_synth_intel_ptwrite raw;
|
|
|
|
|
|
|
|
if (intel_pt_skip_event(pt))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
intel_pt_prep_p_sample(pt, ptq, event, &sample);
|
|
|
|
|
|
|
|
sample.id = ptq->pt->ptwrites_id;
|
|
|
|
sample.stream_id = ptq->pt->ptwrites_id;
|
|
|
|
|
|
|
|
raw.flags = 0;
|
|
|
|
raw.ip = !!(ptq->state->flags & INTEL_PT_FUP_IP);
|
|
|
|
raw.payload = cpu_to_le64(ptq->state->ptw_payload);
|
|
|
|
|
|
|
|
sample.raw_size = perf_synth__raw_size(raw);
|
|
|
|
sample.raw_data = perf_synth__raw_data(&raw);
|
|
|
|
|
2020-04-29 23:07:45 +08:00
|
|
|
return intel_pt_deliver_synth_event(pt, event, &sample,
|
2017-06-30 16:36:45 +08:00
|
|
|
pt->ptwrites_sample_type);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int intel_pt_synth_cbr_sample(struct intel_pt_queue *ptq)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = ptq->pt;
|
|
|
|
union perf_event *event = ptq->event_buf;
|
|
|
|
struct perf_sample sample = { .ip = 0, };
|
|
|
|
struct perf_synth_intel_cbr raw;
|
|
|
|
u32 flags;
|
|
|
|
|
2019-06-22 17:32:45 +08:00
|
|
|
if (intel_pt_skip_cbr_event(pt))
|
2017-06-30 16:36:45 +08:00
|
|
|
return 0;
|
|
|
|
|
2019-06-22 17:32:45 +08:00
|
|
|
ptq->cbr_seen = ptq->state->cbr;
|
|
|
|
|
2017-06-30 16:36:45 +08:00
|
|
|
intel_pt_prep_p_sample(pt, ptq, event, &sample);
|
|
|
|
|
|
|
|
sample.id = ptq->pt->cbr_id;
|
|
|
|
sample.stream_id = ptq->pt->cbr_id;
|
|
|
|
|
|
|
|
flags = (u16)ptq->state->cbr_payload | (pt->max_non_turbo_ratio << 16);
|
|
|
|
raw.flags = cpu_to_le32(flags);
|
|
|
|
raw.freq = cpu_to_le32(raw.cbr * pt->cbr2khz);
|
|
|
|
raw.reserved3 = 0;
|
|
|
|
|
|
|
|
sample.raw_size = perf_synth__raw_size(raw);
|
|
|
|
sample.raw_data = perf_synth__raw_data(&raw);
|
|
|
|
|
2020-04-29 23:07:45 +08:00
|
|
|
return intel_pt_deliver_synth_event(pt, event, &sample,
|
2017-06-30 16:36:45 +08:00
|
|
|
pt->pwr_events_sample_type);
|
|
|
|
}
|
|
|
|
|
2021-02-06 01:53:50 +08:00
|
|
|
static int intel_pt_synth_psb_sample(struct intel_pt_queue *ptq)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = ptq->pt;
|
|
|
|
union perf_event *event = ptq->event_buf;
|
|
|
|
struct perf_sample sample = { .ip = 0, };
|
|
|
|
struct perf_synth_intel_psb raw;
|
|
|
|
|
|
|
|
if (intel_pt_skip_event(pt))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
intel_pt_prep_p_sample(pt, ptq, event, &sample);
|
|
|
|
|
|
|
|
sample.id = ptq->pt->psb_id;
|
|
|
|
sample.stream_id = ptq->pt->psb_id;
|
|
|
|
sample.flags = 0;
|
|
|
|
|
|
|
|
raw.reserved = 0;
|
|
|
|
raw.offset = ptq->state->psb_offset;
|
|
|
|
|
|
|
|
sample.raw_size = perf_synth__raw_size(raw);
|
|
|
|
sample.raw_data = perf_synth__raw_data(&raw);
|
|
|
|
|
|
|
|
return intel_pt_deliver_synth_event(pt, event, &sample,
|
|
|
|
pt->pwr_events_sample_type);
|
|
|
|
}
|
|
|
|
|
2017-06-30 16:36:45 +08:00
|
|
|
static int intel_pt_synth_mwait_sample(struct intel_pt_queue *ptq)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = ptq->pt;
|
|
|
|
union perf_event *event = ptq->event_buf;
|
|
|
|
struct perf_sample sample = { .ip = 0, };
|
|
|
|
struct perf_synth_intel_mwait raw;
|
|
|
|
|
|
|
|
if (intel_pt_skip_event(pt))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
intel_pt_prep_p_sample(pt, ptq, event, &sample);
|
|
|
|
|
|
|
|
sample.id = ptq->pt->mwait_id;
|
|
|
|
sample.stream_id = ptq->pt->mwait_id;
|
|
|
|
|
|
|
|
raw.reserved = 0;
|
|
|
|
raw.payload = cpu_to_le64(ptq->state->mwait_payload);
|
|
|
|
|
|
|
|
sample.raw_size = perf_synth__raw_size(raw);
|
|
|
|
sample.raw_data = perf_synth__raw_data(&raw);
|
|
|
|
|
2020-04-29 23:07:45 +08:00
|
|
|
return intel_pt_deliver_synth_event(pt, event, &sample,
|
2017-06-30 16:36:45 +08:00
|
|
|
pt->pwr_events_sample_type);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int intel_pt_synth_pwre_sample(struct intel_pt_queue *ptq)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = ptq->pt;
|
|
|
|
union perf_event *event = ptq->event_buf;
|
|
|
|
struct perf_sample sample = { .ip = 0, };
|
|
|
|
struct perf_synth_intel_pwre raw;
|
|
|
|
|
|
|
|
if (intel_pt_skip_event(pt))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
intel_pt_prep_p_sample(pt, ptq, event, &sample);
|
|
|
|
|
|
|
|
sample.id = ptq->pt->pwre_id;
|
|
|
|
sample.stream_id = ptq->pt->pwre_id;
|
|
|
|
|
|
|
|
raw.reserved = 0;
|
|
|
|
raw.payload = cpu_to_le64(ptq->state->pwre_payload);
|
|
|
|
|
|
|
|
sample.raw_size = perf_synth__raw_size(raw);
|
|
|
|
sample.raw_data = perf_synth__raw_data(&raw);
|
|
|
|
|
2020-04-29 23:07:45 +08:00
|
|
|
return intel_pt_deliver_synth_event(pt, event, &sample,
|
2017-06-30 16:36:45 +08:00
|
|
|
pt->pwr_events_sample_type);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int intel_pt_synth_exstop_sample(struct intel_pt_queue *ptq)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = ptq->pt;
|
|
|
|
union perf_event *event = ptq->event_buf;
|
|
|
|
struct perf_sample sample = { .ip = 0, };
|
|
|
|
struct perf_synth_intel_exstop raw;
|
|
|
|
|
|
|
|
if (intel_pt_skip_event(pt))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
intel_pt_prep_p_sample(pt, ptq, event, &sample);
|
|
|
|
|
|
|
|
sample.id = ptq->pt->exstop_id;
|
|
|
|
sample.stream_id = ptq->pt->exstop_id;
|
|
|
|
|
|
|
|
raw.flags = 0;
|
|
|
|
raw.ip = !!(ptq->state->flags & INTEL_PT_FUP_IP);
|
|
|
|
|
|
|
|
sample.raw_size = perf_synth__raw_size(raw);
|
|
|
|
sample.raw_data = perf_synth__raw_data(&raw);
|
|
|
|
|
2020-04-29 23:07:45 +08:00
|
|
|
return intel_pt_deliver_synth_event(pt, event, &sample,
|
2017-06-30 16:36:45 +08:00
|
|
|
pt->pwr_events_sample_type);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int intel_pt_synth_pwrx_sample(struct intel_pt_queue *ptq)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = ptq->pt;
|
|
|
|
union perf_event *event = ptq->event_buf;
|
|
|
|
struct perf_sample sample = { .ip = 0, };
|
|
|
|
struct perf_synth_intel_pwrx raw;
|
|
|
|
|
|
|
|
if (intel_pt_skip_event(pt))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
intel_pt_prep_p_sample(pt, ptq, event, &sample);
|
|
|
|
|
|
|
|
sample.id = ptq->pt->pwrx_id;
|
|
|
|
sample.stream_id = ptq->pt->pwrx_id;
|
|
|
|
|
|
|
|
raw.reserved = 0;
|
|
|
|
raw.payload = cpu_to_le64(ptq->state->pwrx_payload);
|
|
|
|
|
|
|
|
sample.raw_size = perf_synth__raw_size(raw);
|
|
|
|
sample.raw_data = perf_synth__raw_data(&raw);
|
|
|
|
|
2020-04-29 23:07:45 +08:00
|
|
|
return intel_pt_deliver_synth_event(pt, event, &sample,
|
2017-06-30 16:36:45 +08:00
|
|
|
pt->pwr_events_sample_type);
|
|
|
|
}
|
|
|
|
|
2019-06-10 15:27:59 +08:00
|
|
|
/*
|
|
|
|
* PEBS gp_regs array indexes plus 1 so that 0 means not present. Refer
|
|
|
|
* intel_pt_add_gp_regs().
|
|
|
|
*/
|
|
|
|
static const int pebs_gp_regs[] = {
|
|
|
|
[PERF_REG_X86_FLAGS] = 1,
|
|
|
|
[PERF_REG_X86_IP] = 2,
|
|
|
|
[PERF_REG_X86_AX] = 3,
|
|
|
|
[PERF_REG_X86_CX] = 4,
|
|
|
|
[PERF_REG_X86_DX] = 5,
|
|
|
|
[PERF_REG_X86_BX] = 6,
|
|
|
|
[PERF_REG_X86_SP] = 7,
|
|
|
|
[PERF_REG_X86_BP] = 8,
|
|
|
|
[PERF_REG_X86_SI] = 9,
|
|
|
|
[PERF_REG_X86_DI] = 10,
|
|
|
|
[PERF_REG_X86_R8] = 11,
|
|
|
|
[PERF_REG_X86_R9] = 12,
|
|
|
|
[PERF_REG_X86_R10] = 13,
|
|
|
|
[PERF_REG_X86_R11] = 14,
|
|
|
|
[PERF_REG_X86_R12] = 15,
|
|
|
|
[PERF_REG_X86_R13] = 16,
|
|
|
|
[PERF_REG_X86_R14] = 17,
|
|
|
|
[PERF_REG_X86_R15] = 18,
|
|
|
|
};
|
|
|
|
|
|
|
|
static u64 *intel_pt_add_gp_regs(struct regs_dump *intr_regs, u64 *pos,
|
|
|
|
const struct intel_pt_blk_items *items,
|
|
|
|
u64 regs_mask)
|
|
|
|
{
|
|
|
|
const u64 *gp_regs = items->val[INTEL_PT_GP_REGS_POS];
|
|
|
|
u32 mask = items->mask[INTEL_PT_GP_REGS_POS];
|
|
|
|
u32 bit;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0, bit = 1; i < PERF_REG_X86_64_MAX; i++, bit <<= 1) {
|
|
|
|
/* Get the PEBS gp_regs array index */
|
|
|
|
int n = pebs_gp_regs[i] - 1;
|
|
|
|
|
|
|
|
if (n < 0)
|
|
|
|
continue;
|
|
|
|
/*
|
|
|
|
* Add only registers that were requested (i.e. 'regs_mask') and
|
|
|
|
* that were provided (i.e. 'mask'), and update the resulting
|
|
|
|
* mask (i.e. 'intr_regs->mask') accordingly.
|
|
|
|
*/
|
|
|
|
if (mask & 1 << n && regs_mask & bit) {
|
|
|
|
intr_regs->mask |= bit;
|
|
|
|
*pos++ = gp_regs[n];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return pos;
|
|
|
|
}
|
|
|
|
|
2019-06-10 15:28:00 +08:00
|
|
|
#ifndef PERF_REG_X86_XMM0
|
|
|
|
#define PERF_REG_X86_XMM0 32
|
|
|
|
#endif
|
|
|
|
|
|
|
|
static void intel_pt_add_xmm(struct regs_dump *intr_regs, u64 *pos,
|
|
|
|
const struct intel_pt_blk_items *items,
|
|
|
|
u64 regs_mask)
|
|
|
|
{
|
|
|
|
u32 mask = items->has_xmm & (regs_mask >> PERF_REG_X86_XMM0);
|
|
|
|
const u64 *xmm = items->xmm;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If there are any XMM registers, then there should be all of them.
|
|
|
|
* Nevertheless, follow the logic to add only registers that were
|
|
|
|
* requested (i.e. 'regs_mask') and that were provided (i.e. 'mask'),
|
|
|
|
* and update the resulting mask (i.e. 'intr_regs->mask') accordingly.
|
|
|
|
*/
|
|
|
|
intr_regs->mask |= (u64)mask << PERF_REG_X86_XMM0;
|
|
|
|
|
|
|
|
for (; mask; mask >>= 1, xmm++) {
|
|
|
|
if (mask & 1)
|
|
|
|
*pos++ = *xmm;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-10 15:28:01 +08:00
|
|
|
#define LBR_INFO_MISPRED (1ULL << 63)
|
|
|
|
#define LBR_INFO_IN_TX (1ULL << 62)
|
|
|
|
#define LBR_INFO_ABORT (1ULL << 61)
|
|
|
|
#define LBR_INFO_CYCLES 0xffff
|
|
|
|
|
|
|
|
/* Refer kernel's intel_pmu_store_pebs_lbrs() */
|
|
|
|
static u64 intel_pt_lbr_flags(u64 info)
|
|
|
|
{
|
|
|
|
union {
|
|
|
|
struct branch_flags flags;
|
|
|
|
u64 result;
|
perf callchain: Stitch LBR call stack
In LBR call stack mode, the depth of reconstructed LBR call stack limits
to the number of LBR registers.
For example, on skylake, the depth of reconstructed LBR call stack is
always <= 32.
# To display the perf.data header info, please use
# --header/--header-only options.
#
#
# Total Lost Samples: 0
#
# Samples: 6K of event 'cycles'
# Event count (approx.): 6487119731
#
# Children Self Command Shared Object Symbol
# ........ ........ ............... ..................
# ................................
99.97% 99.97% tchain_edit tchain_edit [.] f43
|
--99.64%--f11
f12
f13
f14
f15
f16
f17
f18
f19
f20
f21
f22
f23
f24
f25
f26
f27
f28
f29
f30
f31
f32
f33
f34
f35
f36
f37
f38
f39
f40
f41
f42
f43
For a call stack which is deeper than LBR limit, HW will overwrite the
LBR register with oldest branch. Only partial call stacks can be
reconstructed.
However, the overwritten LBRs may still be retrieved from previous
sample. At that moment, HW hasn't overwritten the LBR registers yet.
Perf tools can stitch those overwritten LBRs on current call stacks to
get a more complete call stack.
To determine if LBRs can be stitched, perf tools need to compare current
sample with previous sample.
- They should have identical LBR records (Same from, to and flags
values, and the same physical index of LBR registers).
- The searching starts from the base-of-stack of current sample.
Once perf determines to stitch the previous LBRs, the corresponding LBR
cursor nodes will be copied to 'lists'. The 'lists' is to track the LBR
cursor nodes which are going to be stitched.
When the stitching is over, the nodes will not be freed immediately.
They will be moved to 'free_lists'. Next stitching may reuse the space.
Both 'lists' and 'free_lists' will be freed when all samples are
processed.
Committer notes:
Fix the intel-pt.c initialization of the union with 'struct
branch_flags', that breaks the build with its unnamed union on older gcc
versions.
Uninline thread__free_stitch_list(), as it grew big and started dragging
includes to thread.h, so move it to thread.c where what it needs in
terms of headers are already there.
This fixes the build in several systems such as debian:experimental when
cross building to the MIPS32 architecture, i.e. in the other cases what
was needed was being included by sheer luck.
In file included from builtin-sched.c:11:
util/thread.h: In function 'thread__free_stitch_list':
util/thread.h:169:3: error: implicit declaration of function 'free' [-Werror=implicit-function-declaration]
169 | free(pos);
| ^~~~
util/thread.h:169:3: error: incompatible implicit declaration of built-in function 'free' [-Werror]
util/thread.h:19:1: note: include '<stdlib.h>' or provide a declaration of 'free'
18 | #include "callchain.h"
+++ |+#include <stdlib.h>
19 |
util/thread.h:174:3: error: incompatible implicit declaration of built-in function 'free' [-Werror]
174 | free(pos);
| ^~~~
util/thread.h:174:3: note: include '<stdlib.h>' or provide a declaration of 'free'
Signed-off-by: Kan Liang <kan.liang@linux.intel.com>
Reviewed-by: Andi Kleen <ak@linux.intel.com>
Acked-by: Jiri Olsa <jolsa@redhat.com>
Cc: Adrian Hunter <adrian.hunter@intel.com>
Cc: Alexey Budankov <alexey.budankov@linux.intel.com>
Cc: Mathieu Poirier <mathieu.poirier@linaro.org>
Cc: Michael Ellerman <mpe@ellerman.id.au>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Pavel Gerasimov <pavel.gerasimov@intel.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Ravi Bangoria <ravi.bangoria@linux.ibm.com>
Cc: Stephane Eranian <eranian@google.com>
Cc: Vitaly Slobodskoy <vitaly.slobodskoy@intel.com>
Link: http://lore.kernel.org/lkml/20200319202517.23423-13-kan.liang@linux.intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2020-03-20 04:25:12 +08:00
|
|
|
} u;
|
|
|
|
|
|
|
|
u.result = 0;
|
|
|
|
u.flags.mispred = !!(info & LBR_INFO_MISPRED);
|
|
|
|
u.flags.predicted = !(info & LBR_INFO_MISPRED);
|
|
|
|
u.flags.in_tx = !!(info & LBR_INFO_IN_TX);
|
|
|
|
u.flags.abort = !!(info & LBR_INFO_ABORT);
|
|
|
|
u.flags.cycles = info & LBR_INFO_CYCLES;
|
2019-06-10 15:28:01 +08:00
|
|
|
|
|
|
|
return u.result;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void intel_pt_add_lbrs(struct branch_stack *br_stack,
|
|
|
|
const struct intel_pt_blk_items *items)
|
|
|
|
{
|
|
|
|
u64 *to;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
br_stack->nr = 0;
|
|
|
|
|
|
|
|
to = &br_stack->entries[0].from;
|
|
|
|
|
|
|
|
for (i = INTEL_PT_LBR_0_POS; i <= INTEL_PT_LBR_2_POS; i++) {
|
|
|
|
u32 mask = items->mask[i];
|
|
|
|
const u64 *from = items->val[i];
|
|
|
|
|
|
|
|
for (; mask; mask >>= 3, from += 3) {
|
|
|
|
if ((mask & 7) == 7) {
|
|
|
|
*to++ = from[0];
|
|
|
|
*to++ = from[1];
|
|
|
|
*to++ = intel_pt_lbr_flags(from[2]);
|
|
|
|
br_stack->nr += 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-09-08 00:39:03 +08:00
|
|
|
static int intel_pt_do_synth_pebs_sample(struct intel_pt_queue *ptq, struct evsel *evsel, u64 id)
|
2019-06-10 15:27:56 +08:00
|
|
|
{
|
2019-06-10 15:27:58 +08:00
|
|
|
const struct intel_pt_blk_items *items = &ptq->state->items;
|
|
|
|
struct perf_sample sample = { .ip = 0, };
|
|
|
|
union perf_event *event = ptq->event_buf;
|
|
|
|
struct intel_pt *pt = ptq->pt;
|
2019-07-21 19:24:29 +08:00
|
|
|
u64 sample_type = evsel->core.attr.sample_type;
|
2019-06-10 15:27:58 +08:00
|
|
|
u8 cpumode;
|
2020-06-30 21:39:35 +08:00
|
|
|
u64 regs[8 * sizeof(sample.intr_regs.mask)];
|
2019-06-10 15:27:58 +08:00
|
|
|
|
|
|
|
if (intel_pt_skip_event(pt))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
intel_pt_prep_a_sample(ptq, event, &sample);
|
|
|
|
|
|
|
|
sample.id = id;
|
|
|
|
sample.stream_id = id;
|
|
|
|
|
2019-07-21 19:24:29 +08:00
|
|
|
if (!evsel->core.attr.freq)
|
|
|
|
sample.period = evsel->core.attr.sample_period;
|
2019-06-10 15:27:58 +08:00
|
|
|
|
|
|
|
/* No support for non-zero CS base */
|
|
|
|
if (items->has_ip)
|
|
|
|
sample.ip = items->ip;
|
|
|
|
else if (items->has_rip)
|
|
|
|
sample.ip = items->rip;
|
|
|
|
else
|
|
|
|
sample.ip = ptq->state->from_ip;
|
|
|
|
|
2021-02-18 17:57:57 +08:00
|
|
|
cpumode = intel_pt_cpumode(ptq, sample.ip, 0);
|
2019-06-10 15:27:58 +08:00
|
|
|
|
|
|
|
event->sample.header.misc = cpumode | PERF_RECORD_MISC_EXACT_IP;
|
|
|
|
|
|
|
|
sample.cpumode = cpumode;
|
|
|
|
|
|
|
|
if (sample_type & PERF_SAMPLE_TIME) {
|
|
|
|
u64 timestamp = 0;
|
|
|
|
|
|
|
|
if (items->has_timestamp)
|
|
|
|
timestamp = items->timestamp;
|
|
|
|
else if (!pt->timeless_decoding)
|
|
|
|
timestamp = ptq->timestamp;
|
|
|
|
if (timestamp)
|
|
|
|
sample.time = tsc_to_perf_time(timestamp, &pt->tc);
|
|
|
|
}
|
|
|
|
|
2019-06-10 15:28:03 +08:00
|
|
|
if (sample_type & PERF_SAMPLE_CALLCHAIN &&
|
|
|
|
pt->synth_opts.callchain) {
|
|
|
|
thread_stack__sample(ptq->thread, ptq->cpu, ptq->chain,
|
|
|
|
pt->synth_opts.callchain_sz, sample.ip,
|
|
|
|
pt->kernel_start);
|
|
|
|
sample.callchain = ptq->chain;
|
|
|
|
}
|
|
|
|
|
2019-06-10 15:27:59 +08:00
|
|
|
if (sample_type & PERF_SAMPLE_REGS_INTR &&
|
2020-06-30 21:39:35 +08:00
|
|
|
(items->mask[INTEL_PT_GP_REGS_POS] ||
|
|
|
|
items->mask[INTEL_PT_XMM_POS])) {
|
2019-07-21 19:24:29 +08:00
|
|
|
u64 regs_mask = evsel->core.attr.sample_regs_intr;
|
2019-06-10 15:28:00 +08:00
|
|
|
u64 *pos;
|
2019-06-10 15:27:59 +08:00
|
|
|
|
|
|
|
sample.intr_regs.abi = items->is_32_bit ?
|
|
|
|
PERF_SAMPLE_REGS_ABI_32 :
|
|
|
|
PERF_SAMPLE_REGS_ABI_64;
|
|
|
|
sample.intr_regs.regs = regs;
|
|
|
|
|
2019-06-10 15:28:00 +08:00
|
|
|
pos = intel_pt_add_gp_regs(&sample.intr_regs, regs, items, regs_mask);
|
|
|
|
|
|
|
|
intel_pt_add_xmm(&sample.intr_regs, pos, items, regs_mask);
|
2019-06-10 15:27:59 +08:00
|
|
|
}
|
|
|
|
|
2019-06-10 15:28:01 +08:00
|
|
|
if (sample_type & PERF_SAMPLE_BRANCH_STACK) {
|
|
|
|
if (items->mask[INTEL_PT_LBR_0_POS] ||
|
|
|
|
items->mask[INTEL_PT_LBR_1_POS] ||
|
|
|
|
items->mask[INTEL_PT_LBR_2_POS]) {
|
2020-05-16 20:35:48 +08:00
|
|
|
intel_pt_add_lbrs(ptq->last_branch, items);
|
2019-06-10 15:28:01 +08:00
|
|
|
} else if (pt->synth_opts.last_branch) {
|
2020-04-29 23:07:45 +08:00
|
|
|
thread_stack__br_sample(ptq->thread, ptq->cpu,
|
|
|
|
ptq->last_branch,
|
|
|
|
pt->br_stack_sz);
|
2019-06-10 15:28:01 +08:00
|
|
|
} else {
|
2020-05-16 20:35:48 +08:00
|
|
|
ptq->last_branch->nr = 0;
|
2019-06-10 15:28:01 +08:00
|
|
|
}
|
2020-05-16 20:35:48 +08:00
|
|
|
sample.branch_stack = ptq->last_branch;
|
2019-06-10 15:28:01 +08:00
|
|
|
}
|
|
|
|
|
2019-06-10 15:28:02 +08:00
|
|
|
if (sample_type & PERF_SAMPLE_ADDR && items->has_mem_access_address)
|
|
|
|
sample.addr = items->mem_access_address;
|
|
|
|
|
2021-02-03 04:09:09 +08:00
|
|
|
if (sample_type & PERF_SAMPLE_WEIGHT_TYPE) {
|
2019-06-10 15:28:02 +08:00
|
|
|
/*
|
|
|
|
* Refer kernel's setup_pebs_adaptive_sample_data() and
|
|
|
|
* intel_hsw_weight().
|
|
|
|
*/
|
2021-02-03 04:09:09 +08:00
|
|
|
if (items->has_mem_access_latency) {
|
|
|
|
u64 weight = items->mem_access_latency >> 32;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Starts from SPR, the mem access latency field
|
|
|
|
* contains both cache latency [47:32] and instruction
|
|
|
|
* latency [15:0]. The cache latency is the same as the
|
|
|
|
* mem access latency on previous platforms.
|
|
|
|
*
|
|
|
|
* In practice, no memory access could last than 4G
|
|
|
|
* cycles. Use latency >> 32 to distinguish the
|
|
|
|
* different format of the mem access latency field.
|
|
|
|
*/
|
2021-02-03 04:09:10 +08:00
|
|
|
if (weight > 0) {
|
2021-02-03 04:09:09 +08:00
|
|
|
sample.weight = weight & 0xffff;
|
2021-02-03 04:09:10 +08:00
|
|
|
sample.ins_lat = items->mem_access_latency & 0xffff;
|
|
|
|
} else
|
2021-02-03 04:09:09 +08:00
|
|
|
sample.weight = items->mem_access_latency;
|
|
|
|
}
|
2019-06-10 15:28:02 +08:00
|
|
|
if (!sample.weight && items->has_tsx_aux_info) {
|
|
|
|
/* Cycles last block */
|
|
|
|
sample.weight = (u32)items->tsx_aux_info;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sample_type & PERF_SAMPLE_TRANSACTION && items->has_tsx_aux_info) {
|
|
|
|
u64 ax = items->has_rax ? items->rax : 0;
|
|
|
|
/* Refer kernel's intel_hsw_transaction() */
|
|
|
|
u64 txn = (u8)(items->tsx_aux_info >> 32);
|
|
|
|
|
|
|
|
/* For RTM XABORTs also log the abort code from AX */
|
|
|
|
if (txn & PERF_TXN_TRANSACTION && ax & 1)
|
|
|
|
txn |= ((ax >> 24) & 0xff) << PERF_TXN_ABORT_SHIFT;
|
|
|
|
sample.transaction = txn;
|
|
|
|
}
|
|
|
|
|
2020-04-29 23:07:45 +08:00
|
|
|
return intel_pt_deliver_synth_event(pt, event, &sample, sample_type);
|
2019-06-10 15:27:56 +08:00
|
|
|
}
|
|
|
|
|
2021-09-08 00:39:03 +08:00
|
|
|
static int intel_pt_synth_single_pebs_sample(struct intel_pt_queue *ptq)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = ptq->pt;
|
|
|
|
struct evsel *evsel = pt->pebs_evsel;
|
|
|
|
u64 id = evsel->core.id[0];
|
|
|
|
|
|
|
|
return intel_pt_do_synth_pebs_sample(ptq, evsel, id);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int intel_pt_synth_pebs_sample(struct intel_pt_queue *ptq)
|
|
|
|
{
|
|
|
|
const struct intel_pt_blk_items *items = &ptq->state->items;
|
|
|
|
struct intel_pt_pebs_event *pe;
|
|
|
|
struct intel_pt *pt = ptq->pt;
|
|
|
|
int err = -EINVAL;
|
|
|
|
int hw_id;
|
|
|
|
|
|
|
|
if (!items->has_applicable_counters || !items->applicable_counters) {
|
|
|
|
if (!pt->single_pebs)
|
|
|
|
pr_err("PEBS-via-PT record with no applicable_counters\n");
|
|
|
|
return intel_pt_synth_single_pebs_sample(ptq);
|
|
|
|
}
|
|
|
|
|
|
|
|
for_each_set_bit(hw_id, (unsigned long *)&items->applicable_counters, INTEL_PT_MAX_PEBS) {
|
|
|
|
pe = &ptq->pebs[hw_id];
|
|
|
|
if (!pe->evsel) {
|
|
|
|
if (!pt->single_pebs)
|
|
|
|
pr_err("PEBS-via-PT record with no matching event, hw_id %d\n",
|
|
|
|
hw_id);
|
|
|
|
return intel_pt_synth_single_pebs_sample(ptq);
|
|
|
|
}
|
|
|
|
err = intel_pt_do_synth_pebs_sample(ptq, pe->evsel, pe->id);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2022-01-24 16:41:50 +08:00
|
|
|
static int intel_pt_synth_events_sample(struct intel_pt_queue *ptq)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = ptq->pt;
|
|
|
|
union perf_event *event = ptq->event_buf;
|
|
|
|
struct perf_sample sample = { .ip = 0, };
|
|
|
|
struct {
|
|
|
|
struct perf_synth_intel_evt cfe;
|
|
|
|
struct perf_synth_intel_evd evd[INTEL_PT_MAX_EVDS];
|
|
|
|
} raw;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (intel_pt_skip_event(pt))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
intel_pt_prep_p_sample(pt, ptq, event, &sample);
|
|
|
|
|
|
|
|
sample.id = ptq->pt->evt_id;
|
|
|
|
sample.stream_id = ptq->pt->evt_id;
|
|
|
|
|
|
|
|
raw.cfe.type = ptq->state->cfe_type;
|
|
|
|
raw.cfe.reserved = 0;
|
|
|
|
raw.cfe.ip = !!(ptq->state->flags & INTEL_PT_FUP_IP);
|
|
|
|
raw.cfe.vector = ptq->state->cfe_vector;
|
|
|
|
raw.cfe.evd_cnt = ptq->state->evd_cnt;
|
|
|
|
|
|
|
|
for (i = 0; i < ptq->state->evd_cnt; i++) {
|
|
|
|
raw.evd[i].et = 0;
|
|
|
|
raw.evd[i].evd_type = ptq->state->evd[i].type;
|
|
|
|
raw.evd[i].payload = ptq->state->evd[i].payload;
|
|
|
|
}
|
|
|
|
|
|
|
|
sample.raw_size = perf_synth__raw_size(raw) +
|
|
|
|
ptq->state->evd_cnt * sizeof(struct perf_synth_intel_evd);
|
|
|
|
sample.raw_data = perf_synth__raw_data(&raw);
|
|
|
|
|
|
|
|
return intel_pt_deliver_synth_event(pt, event, &sample,
|
|
|
|
pt->evt_sample_type);
|
|
|
|
}
|
|
|
|
|
2022-01-24 16:41:51 +08:00
|
|
|
static int intel_pt_synth_iflag_chg_sample(struct intel_pt_queue *ptq)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = ptq->pt;
|
|
|
|
union perf_event *event = ptq->event_buf;
|
|
|
|
struct perf_sample sample = { .ip = 0, };
|
|
|
|
struct perf_synth_intel_iflag_chg raw;
|
|
|
|
|
|
|
|
if (intel_pt_skip_event(pt))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
intel_pt_prep_p_sample(pt, ptq, event, &sample);
|
|
|
|
|
|
|
|
sample.id = ptq->pt->iflag_chg_id;
|
|
|
|
sample.stream_id = ptq->pt->iflag_chg_id;
|
|
|
|
|
|
|
|
raw.flags = 0;
|
|
|
|
raw.iflag = ptq->state->to_iflag;
|
|
|
|
|
|
|
|
if (ptq->state->type & INTEL_PT_BRANCH) {
|
|
|
|
raw.via_branch = 1;
|
|
|
|
raw.branch_ip = ptq->state->to_ip;
|
|
|
|
} else {
|
|
|
|
sample.addr = 0;
|
|
|
|
}
|
|
|
|
sample.flags = ptq->flags;
|
|
|
|
|
|
|
|
sample.raw_size = perf_synth__raw_size(raw);
|
|
|
|
sample.raw_data = perf_synth__raw_data(&raw);
|
|
|
|
|
|
|
|
return intel_pt_deliver_synth_event(pt, event, &sample,
|
|
|
|
pt->iflag_chg_sample_type);
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
static int intel_pt_synth_error(struct intel_pt *pt, int code, int cpu,
|
2022-07-11 17:32:16 +08:00
|
|
|
pid_t pid, pid_t tid, u64 ip, u64 timestamp,
|
|
|
|
pid_t machine_pid, int vcpu)
|
2015-07-18 00:33:41 +08:00
|
|
|
{
|
2022-09-05 15:34:23 +08:00
|
|
|
bool dump_log_on_error = pt->synth_opts.log_plus_flags & AUXTRACE_LOG_FLG_ON_ERROR;
|
|
|
|
bool log_on_stdout = pt->synth_opts.log_plus_flags & AUXTRACE_LOG_FLG_USE_STDOUT;
|
2015-07-18 00:33:41 +08:00
|
|
|
union perf_event event;
|
|
|
|
char msg[MAX_AUXTRACE_ERROR_MSG];
|
|
|
|
int err;
|
|
|
|
|
2020-07-10 23:10:58 +08:00
|
|
|
if (pt->synth_opts.error_minus_flags) {
|
|
|
|
if (code == INTEL_PT_ERR_OVR &&
|
|
|
|
pt->synth_opts.error_minus_flags & AUXTRACE_ERR_FLG_OVERFLOW)
|
|
|
|
return 0;
|
|
|
|
if (code == INTEL_PT_ERR_LOST &&
|
|
|
|
pt->synth_opts.error_minus_flags & AUXTRACE_ERR_FLG_DATA_LOST)
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
intel_pt__strerror(code, msg, MAX_AUXTRACE_ERROR_MSG);
|
|
|
|
|
2022-07-11 17:32:16 +08:00
|
|
|
auxtrace_synth_guest_error(&event.auxtrace_error, PERF_AUXTRACE_ERROR_ITRACE,
|
|
|
|
code, cpu, pid, tid, ip, msg, timestamp,
|
|
|
|
machine_pid, vcpu);
|
2015-07-18 00:33:41 +08:00
|
|
|
|
2022-09-05 15:34:23 +08:00
|
|
|
if (intel_pt_enable_logging && !log_on_stdout) {
|
|
|
|
FILE *fp = intel_pt_log_fp();
|
|
|
|
|
|
|
|
if (fp)
|
|
|
|
perf_event__fprintf_auxtrace_error(&event, fp);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (code != INTEL_PT_ERR_LOST && dump_log_on_error)
|
|
|
|
intel_pt_log_dump_buf();
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
err = perf_session__deliver_synth_event(pt->session, &event, NULL);
|
|
|
|
if (err)
|
|
|
|
pr_err("Intel Processor Trace: failed to deliver error event, error %d\n",
|
|
|
|
err);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2019-02-06 18:39:47 +08:00
|
|
|
static int intel_ptq_synth_error(struct intel_pt_queue *ptq,
|
|
|
|
const struct intel_pt_state *state)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = ptq->pt;
|
|
|
|
u64 tm = ptq->timestamp;
|
2022-07-11 17:32:16 +08:00
|
|
|
pid_t machine_pid = 0;
|
|
|
|
pid_t pid = ptq->pid;
|
|
|
|
pid_t tid = ptq->tid;
|
|
|
|
int vcpu = -1;
|
2019-02-06 18:39:47 +08:00
|
|
|
|
|
|
|
tm = pt->timeless_decoding ? 0 : tsc_to_perf_time(tm, &pt->tc);
|
|
|
|
|
2022-07-11 17:32:16 +08:00
|
|
|
if (pt->have_guest_sideband && state->from_nr) {
|
|
|
|
machine_pid = ptq->guest_machine_pid;
|
|
|
|
vcpu = ptq->vcpu;
|
|
|
|
pid = ptq->guest_pid;
|
|
|
|
tid = ptq->guest_tid;
|
|
|
|
}
|
|
|
|
|
|
|
|
return intel_pt_synth_error(pt, state->err, ptq->cpu, pid, tid,
|
|
|
|
state->from_ip, tm, machine_pid, vcpu);
|
2019-02-06 18:39:47 +08:00
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
static int intel_pt_next_tid(struct intel_pt *pt, struct intel_pt_queue *ptq)
|
|
|
|
{
|
|
|
|
struct auxtrace_queue *queue;
|
|
|
|
pid_t tid = ptq->next_tid;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
if (tid == -1)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
intel_pt_log("switch: cpu %d tid %d\n", ptq->cpu, tid);
|
|
|
|
|
|
|
|
err = machine__set_current_tid(pt->machine, ptq->cpu, -1, tid);
|
|
|
|
|
|
|
|
queue = &pt->queues.queue_array[ptq->queue_nr];
|
|
|
|
intel_pt_set_pid_tid_cpu(pt, queue);
|
|
|
|
|
|
|
|
ptq->next_tid = -1;
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool intel_pt_is_switch_ip(struct intel_pt_queue *ptq, u64 ip)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = ptq->pt;
|
|
|
|
|
|
|
|
return ip == pt->switch_ip &&
|
|
|
|
(ptq->flags & PERF_IP_FLAG_BRANCH) &&
|
|
|
|
!(ptq->flags & (PERF_IP_FLAG_CONDITIONAL | PERF_IP_FLAG_ASYNC |
|
|
|
|
PERF_IP_FLAG_INTERRUPT | PERF_IP_FLAG_TX_ABORT));
|
|
|
|
}
|
|
|
|
|
2017-06-30 16:36:45 +08:00
|
|
|
#define INTEL_PT_PWR_EVT (INTEL_PT_MWAIT_OP | INTEL_PT_PWR_ENTRY | \
|
2019-06-22 17:32:45 +08:00
|
|
|
INTEL_PT_EX_STOP | INTEL_PT_PWR_EXIT)
|
2017-06-30 16:36:45 +08:00
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
static int intel_pt_sample(struct intel_pt_queue *ptq)
|
|
|
|
{
|
|
|
|
const struct intel_pt_state *state = ptq->state;
|
|
|
|
struct intel_pt *pt = ptq->pt;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
if (!ptq->have_sample)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
ptq->have_sample = false;
|
|
|
|
|
perf intel-pt: Support itrace A option to approximate IPC
Normally, for cycle-acccurate mode, IPC values are an exact number of
instructions and cycles. Due to the granularity of timestamps, that happens
only when a CYC packet correlates to the event.
Support the itrace 'A' option, to use instead, the number of cycles
associated with the current timestamp. This provides IPC information for
every change of timestamp, but at the expense of accuracy. Due to the
granularity of timestamps, the actual number of cycles increases even
though the cycles reported does not. The number of instructions is known,
but if IPC is reported, cycles can be too low and so IPC is too high. Note
that inaccuracy decreases as the period of sampling increases i.e. if the
number of cycles is too low by a small amount, that becomes less
significant if the number of cycles is large.
Furthermore, it can be used in conjunction with dlfilter-show-cycles.so
to provide higher granularity cycle information.
Reviewed-by: Andi Kleen <ak@linux.intel.com>
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Jiri Olsa <jolsa@redhat.com>
Link: https://lore.kernel.org/r/20211027080334.365596-4-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2021-10-27 16:03:31 +08:00
|
|
|
if (pt->synth_opts.approx_ipc) {
|
|
|
|
ptq->ipc_insn_cnt = ptq->state->tot_insn_cnt;
|
|
|
|
ptq->ipc_cyc_cnt = ptq->state->cycles;
|
|
|
|
ptq->sample_ipc = true;
|
|
|
|
} else {
|
|
|
|
ptq->ipc_insn_cnt = ptq->state->tot_insn_cnt;
|
|
|
|
ptq->ipc_cyc_cnt = ptq->state->tot_cyc_cnt;
|
|
|
|
ptq->sample_ipc = ptq->state->flags & INTEL_PT_SAMPLE_IPC;
|
|
|
|
}
|
2019-05-20 19:37:13 +08:00
|
|
|
|
perf intel-pt: Add guest_code support
A common case for KVM test programs is that the test program acts as the
hypervisor, creating, running and destroying the virtual machine, and
providing the guest object code from its own object code. In this case,
the VM is not running an OS, but only the functions loaded into it by the
hypervisor test program, and conveniently, loaded at the same virtual
addresses.
To support that, a new option "--guest-code" has been added in
previous patches.
In this patch, add support also to Intel PT.
In particular, ensure guest_code thread is set up before attempting to
walk object code or synthesize samples.
Example:
# perf record --kcore -e intel_pt/cyc/ -- tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.280 MB perf.data ]
# perf script --guest-code --itrace=bep --ns -F-period,+addr,+flags
[SNIP]
tsc_msrs_test 18436 [007] 10897.962087733: branches: call ffffffffc13b2ff5 __vmx_vcpu_run+0x15 (vmlinux) => ffffffffc13b2f50 vmx_update_host_rsp+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962087733: branches: return ffffffffc13b2f5d vmx_update_host_rsp+0xd (vmlinux) => ffffffffc13b2ffa __vmx_vcpu_run+0x1a (vmlinux)
tsc_msrs_test 18436 [007] 10897.962087733: branches: call ffffffffc13b303b __vmx_vcpu_run+0x5b (vmlinux) => ffffffffc13b2f80 vmx_vmenter+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962087836: branches: vmentry ffffffffc13b2f82 vmx_vmenter+0x2 (vmlinux) => 0 [unknown] ([unknown])
[guest/18436] 18436 [007] 10897.962087836: branches: vmentry 0 [unknown] ([unknown]) => 402c81 guest_code+0x131 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962087836: branches: call 402c81 guest_code+0x131 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dba0 ucall+0x0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962088248: branches: vmexit 40dba0 ucall+0x0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 0 [unknown] ([unknown])
tsc_msrs_test 18436 [007] 10897.962088248: branches: vmexit 0 [unknown] ([unknown]) => ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962088248: branches: jmp ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux) => ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962088256: branches: return ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux) => ffffffffc13b3040 __vmx_vcpu_run+0x60 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962088270: branches: return ffffffffc13b30b6 __vmx_vcpu_run+0xd6 (vmlinux) => ffffffffc13b2f2e vmx_vcpu_enter_exit+0x4e (vmlinux)
[SNIP]
tsc_msrs_test 18436 [007] 10897.962089321: branches: call ffffffffc13b2ff5 __vmx_vcpu_run+0x15 (vmlinux) => ffffffffc13b2f50 vmx_update_host_rsp+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089321: branches: return ffffffffc13b2f5d vmx_update_host_rsp+0xd (vmlinux) => ffffffffc13b2ffa __vmx_vcpu_run+0x1a (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089321: branches: call ffffffffc13b303b __vmx_vcpu_run+0x5b (vmlinux) => ffffffffc13b2f80 vmx_vmenter+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089424: branches: vmentry ffffffffc13b2f82 vmx_vmenter+0x2 (vmlinux) => 0 [unknown] ([unknown])
[guest/18436] 18436 [007] 10897.962089424: branches: vmentry 0 [unknown] ([unknown]) => 40dba0 ucall+0x0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jmp 40dc1b ucall+0x7b (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc39 ucall+0x99 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jcc 40dc3c ucall+0x9c (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc20 ucall+0x80 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jcc 40dc3c ucall+0x9c (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc20 ucall+0x80 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089701: branches: jcc 40dc37 ucall+0x97 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 40dc50 ucall+0xb0 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test)
[guest/18436] 18436 [007] 10897.962089878: branches: vmexit 40dc55 ucall+0xb5 (/home/ahunter/git/work/tools/testing/selftests/kselftest_install/kvm/tsc_msrs_test) => 0 [unknown] ([unknown])
tsc_msrs_test 18436 [007] 10897.962089878: branches: vmexit 0 [unknown] ([unknown]) => ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089878: branches: jmp ffffffffc13b2fa0 vmx_vmexit+0x0 (vmlinux) => ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089887: branches: return ffffffffc13b2fd2 vmx_vmexit+0x32 (vmlinux) => ffffffffc13b3040 __vmx_vcpu_run+0x60 (vmlinux)
tsc_msrs_test 18436 [007] 10897.962089901: branches: return ffffffffc13b30b6 __vmx_vcpu_run+0xd6 (vmlinux) => ffffffffc13b2f2e vmx_vcpu_enter_exit+0x4e (vmlinux)
[SNIP]
# perf kvm --guest-code --guest --host report -i perf.data --stdio | head -20
# To display the perf.data header info, please use --header/--header-only options.
#
#
# Total Lost Samples: 0
#
# Samples: 12 of event 'instructions'
# Event count (approx.): 2274583
#
# Children Self Command Shared Object Symbol
# ........ ........ ............. .................... ...........................................
#
54.70% 0.00% tsc_msrs_test [kernel.vmlinux] [k] entry_SYSCALL_64_after_hwframe
|
---entry_SYSCALL_64_after_hwframe
do_syscall_64
|
|--29.44%--syscall_exit_to_user_mode
| exit_to_user_mode_prepare
| task_work_run
| __fput
For more information about Perf tools support for Intel® Processor Trace
refer:
https://perf.wiki.kernel.org/index.php/Perf_tools_support_for_Intel%C2%AE_Processor_Trace
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Andi Kleen <ak@linux.intel.com>
Cc: Ian Rogers <irogers@google.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: kvm@vger.kernel.org
Link: https://lore.kernel.org/r/20220517131011.6117-7-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2022-05-17 21:10:11 +08:00
|
|
|
/* Ensure guest code maps are set up */
|
|
|
|
if (symbol_conf.guest_code && (state->from_nr || state->to_nr))
|
|
|
|
intel_pt_get_guest(ptq);
|
|
|
|
|
2019-06-10 15:27:56 +08:00
|
|
|
/*
|
|
|
|
* Do PEBS first to allow for the possibility that the PEBS timestamp
|
|
|
|
* precedes the current timestamp.
|
|
|
|
*/
|
|
|
|
if (pt->sample_pebs && state->type & INTEL_PT_BLK_ITEMS) {
|
|
|
|
err = intel_pt_synth_pebs_sample(ptq);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2022-01-24 16:41:50 +08:00
|
|
|
if (pt->synth_opts.intr_events) {
|
|
|
|
if (state->type & INTEL_PT_EVT) {
|
|
|
|
err = intel_pt_synth_events_sample(ptq);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
}
|
2022-01-24 16:41:51 +08:00
|
|
|
if (state->type & INTEL_PT_IFLAG_CHG) {
|
|
|
|
err = intel_pt_synth_iflag_chg_sample(ptq);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
}
|
2022-01-24 16:41:50 +08:00
|
|
|
}
|
|
|
|
|
2019-06-22 17:32:45 +08:00
|
|
|
if (pt->sample_pwr_events) {
|
2021-02-06 01:53:50 +08:00
|
|
|
if (state->type & INTEL_PT_PSB_EVT) {
|
|
|
|
err = intel_pt_synth_psb_sample(ptq);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
}
|
2019-06-22 17:32:45 +08:00
|
|
|
if (ptq->state->cbr != ptq->cbr_seen) {
|
2017-06-30 16:36:45 +08:00
|
|
|
err = intel_pt_synth_cbr_sample(ptq);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
}
|
2019-06-22 17:32:45 +08:00
|
|
|
if (state->type & INTEL_PT_PWR_EVT) {
|
|
|
|
if (state->type & INTEL_PT_MWAIT_OP) {
|
|
|
|
err = intel_pt_synth_mwait_sample(ptq);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
if (state->type & INTEL_PT_PWR_ENTRY) {
|
|
|
|
err = intel_pt_synth_pwre_sample(ptq);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
if (state->type & INTEL_PT_EX_STOP) {
|
|
|
|
err = intel_pt_synth_exstop_sample(ptq);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
if (state->type & INTEL_PT_PWR_EXIT) {
|
|
|
|
err = intel_pt_synth_pwrx_sample(ptq);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
}
|
2017-06-30 16:36:45 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
perf intel-pt: Synthesize cycle events
There is no good reason why we cannot synthesize "cycle" events from
Intel PT just as we can synthesize "instruction" events, in particular
when CYC packets are available. This enables using PT to getting much
more accurate cycle profiles than regular sampling (record -e cycles)
when the work last for very short periods (<10 ms). Thus, add support
for this, based off of the existing IPC calculation framework. The new
option to --itrace is "y" (for cYcles), as c was taken for calls. Cycle
and instruction events can be synthesized together, and are by default.
The only real caveat is that CYC packets are only emitted whenever some
other packet is, which in practice is when a branch instruction is
encountered (and not even all branches). Thus, even at no subsampling
(e.g. --itrace=y0ns), it is impossible to get more accuracy than a
single basic block, and all cycles spent executing that block will get
attributed to the branch instruction that ends the packet. Thus, one
cannot know whether the cycles came from e.g. a specific load, a
mispredicted branch, or something else. When subsampling (which is the
default), the cycle events will get smeared out even more, but will
still be generally useful to attribute cycle counts to functions.
Reviewed-by: Adrian Hunter <adrian.hunter@intel.com>
Signed-off-by: Steinar H. Gunderson <sesse@google.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Link: https://lore.kernel.org/r/20220322082452.1429091-1-sesse@google.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2022-03-22 16:24:52 +08:00
|
|
|
if (state->type & INTEL_PT_INSTRUCTION) {
|
|
|
|
if (pt->sample_instructions) {
|
|
|
|
err = intel_pt_synth_instruction_sample(ptq);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
if (pt->sample_cycles) {
|
|
|
|
err = intel_pt_synth_cycle_sample(ptq);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
}
|
2015-07-18 00:33:41 +08:00
|
|
|
}
|
|
|
|
|
2017-05-26 16:17:29 +08:00
|
|
|
if (pt->sample_transactions && (state->type & INTEL_PT_TRANSACTION)) {
|
2015-07-18 00:33:41 +08:00
|
|
|
err = intel_pt_synth_transaction_sample(ptq);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2017-06-30 16:36:45 +08:00
|
|
|
if (pt->sample_ptwrites && (state->type & INTEL_PT_PTW)) {
|
|
|
|
err = intel_pt_synth_ptwrite_sample(ptq);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
if (!(state->type & INTEL_PT_BRANCH))
|
|
|
|
return 0;
|
|
|
|
|
2020-04-29 23:07:45 +08:00
|
|
|
if (pt->use_thread_stack) {
|
|
|
|
thread_stack__event(ptq->thread, ptq->cpu, ptq->flags,
|
|
|
|
state->from_ip, state->to_ip, ptq->insn_len,
|
|
|
|
state->trace_nr, pt->callstack,
|
2020-04-29 23:07:49 +08:00
|
|
|
pt->br_stack_sz_plus,
|
2020-04-29 23:07:45 +08:00
|
|
|
pt->mispred_all);
|
|
|
|
} else {
|
2018-12-21 20:06:19 +08:00
|
|
|
thread_stack__set_trace_nr(ptq->thread, ptq->cpu, state->trace_nr);
|
2020-04-29 23:07:45 +08:00
|
|
|
}
|
2015-07-18 00:33:41 +08:00
|
|
|
|
|
|
|
if (pt->sample_branches) {
|
2021-02-18 17:58:00 +08:00
|
|
|
if (state->from_nr != state->to_nr &&
|
|
|
|
state->from_ip && state->to_ip) {
|
|
|
|
struct intel_pt_state *st = (struct intel_pt_state *)state;
|
|
|
|
u64 to_ip = st->to_ip;
|
|
|
|
u64 from_ip = st->from_ip;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* perf cannot handle having different machines for ip
|
|
|
|
* and addr, so create 2 branches.
|
|
|
|
*/
|
|
|
|
st->to_ip = 0;
|
|
|
|
err = intel_pt_synth_branch_sample(ptq);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
st->from_ip = 0;
|
|
|
|
st->to_ip = to_ip;
|
|
|
|
err = intel_pt_synth_branch_sample(ptq);
|
|
|
|
st->from_ip = from_ip;
|
|
|
|
} else {
|
|
|
|
err = intel_pt_synth_branch_sample(ptq);
|
|
|
|
}
|
2015-07-18 00:33:41 +08:00
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2018-03-07 22:02:22 +08:00
|
|
|
if (!ptq->sync_switch)
|
2015-07-18 00:33:41 +08:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (intel_pt_is_switch_ip(ptq, state->to_ip)) {
|
|
|
|
switch (ptq->switch_state) {
|
2018-05-31 18:23:42 +08:00
|
|
|
case INTEL_PT_SS_NOT_TRACING:
|
2015-07-18 00:33:41 +08:00
|
|
|
case INTEL_PT_SS_UNKNOWN:
|
|
|
|
case INTEL_PT_SS_EXPECTING_SWITCH_IP:
|
|
|
|
err = intel_pt_next_tid(pt, ptq);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
ptq->switch_state = INTEL_PT_SS_TRACING;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ptq->switch_state = INTEL_PT_SS_EXPECTING_SWITCH_EVENT;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
} else if (!state->to_ip) {
|
|
|
|
ptq->switch_state = INTEL_PT_SS_NOT_TRACING;
|
|
|
|
} else if (ptq->switch_state == INTEL_PT_SS_NOT_TRACING) {
|
|
|
|
ptq->switch_state = INTEL_PT_SS_UNKNOWN;
|
|
|
|
} else if (ptq->switch_state == INTEL_PT_SS_UNKNOWN &&
|
|
|
|
state->to_ip == pt->ptss_ip &&
|
|
|
|
(ptq->flags & PERF_IP_FLAG_CALL)) {
|
|
|
|
ptq->switch_state = INTEL_PT_SS_TRACING;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-08-13 17:40:57 +08:00
|
|
|
static u64 intel_pt_switch_ip(struct intel_pt *pt, u64 *ptss_ip)
|
2015-07-18 00:33:41 +08:00
|
|
|
{
|
2015-08-13 17:40:57 +08:00
|
|
|
struct machine *machine = pt->machine;
|
2015-07-18 00:33:41 +08:00
|
|
|
struct map *map;
|
|
|
|
struct symbol *sym, *start;
|
|
|
|
u64 ip, switch_ip = 0;
|
2015-08-13 17:40:57 +08:00
|
|
|
const char *ptss;
|
2015-07-18 00:33:41 +08:00
|
|
|
|
|
|
|
if (ptss_ip)
|
|
|
|
*ptss_ip = 0;
|
|
|
|
|
2015-09-30 22:54:04 +08:00
|
|
|
map = machine__kernel_map(machine);
|
2015-07-18 00:33:41 +08:00
|
|
|
if (!map)
|
|
|
|
return 0;
|
|
|
|
|
2016-09-02 06:25:52 +08:00
|
|
|
if (map__load(map))
|
2015-07-18 00:33:41 +08:00
|
|
|
return 0;
|
|
|
|
|
2023-03-21 05:22:35 +08:00
|
|
|
start = dso__first_symbol(map__dso(map));
|
2015-07-18 00:33:41 +08:00
|
|
|
|
|
|
|
for (sym = start; sym; sym = dso__next_symbol(sym)) {
|
|
|
|
if (sym->binding == STB_GLOBAL &&
|
|
|
|
!strcmp(sym->name, "__switch_to")) {
|
2023-04-05 04:59:44 +08:00
|
|
|
ip = map__unmap_ip(map, sym->start);
|
2023-03-21 05:22:36 +08:00
|
|
|
if (ip >= map__start(map) && ip < map__end(map)) {
|
2015-07-18 00:33:41 +08:00
|
|
|
switch_ip = ip;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!switch_ip || !ptss_ip)
|
|
|
|
return 0;
|
|
|
|
|
2015-08-13 17:40:57 +08:00
|
|
|
if (pt->have_sched_switch == 1)
|
|
|
|
ptss = "perf_trace_sched_switch";
|
|
|
|
else
|
|
|
|
ptss = "__perf_event_task_sched_out";
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
for (sym = start; sym; sym = dso__next_symbol(sym)) {
|
2015-08-13 17:40:57 +08:00
|
|
|
if (!strcmp(sym->name, ptss)) {
|
2023-04-05 04:59:44 +08:00
|
|
|
ip = map__unmap_ip(map, sym->start);
|
2023-03-21 05:22:36 +08:00
|
|
|
if (ip >= map__start(map) && ip < map__end(map)) {
|
2015-07-18 00:33:41 +08:00
|
|
|
*ptss_ip = ip;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return switch_ip;
|
|
|
|
}
|
|
|
|
|
2018-03-07 22:02:22 +08:00
|
|
|
static void intel_pt_enable_sync_switch(struct intel_pt *pt)
|
|
|
|
{
|
|
|
|
unsigned int i;
|
|
|
|
|
2022-07-11 17:32:14 +08:00
|
|
|
if (pt->sync_switch_not_supported)
|
|
|
|
return;
|
|
|
|
|
2018-03-07 22:02:22 +08:00
|
|
|
pt->sync_switch = true;
|
|
|
|
|
|
|
|
for (i = 0; i < pt->queues.nr_queues; i++) {
|
|
|
|
struct auxtrace_queue *queue = &pt->queues.queue_array[i];
|
|
|
|
struct intel_pt_queue *ptq = queue->priv;
|
|
|
|
|
|
|
|
if (ptq)
|
|
|
|
ptq->sync_switch = true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-07-11 17:32:14 +08:00
|
|
|
static void intel_pt_disable_sync_switch(struct intel_pt *pt)
|
|
|
|
{
|
|
|
|
unsigned int i;
|
|
|
|
|
|
|
|
pt->sync_switch = false;
|
|
|
|
|
|
|
|
for (i = 0; i < pt->queues.nr_queues; i++) {
|
|
|
|
struct auxtrace_queue *queue = &pt->queues.queue_array[i];
|
|
|
|
struct intel_pt_queue *ptq = queue->priv;
|
|
|
|
|
|
|
|
if (ptq) {
|
|
|
|
ptq->sync_switch = false;
|
|
|
|
intel_pt_next_tid(pt, ptq);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-04 21:00:09 +08:00
|
|
|
/*
|
|
|
|
* To filter against time ranges, it is only necessary to look at the next start
|
|
|
|
* or end time.
|
|
|
|
*/
|
|
|
|
static bool intel_pt_next_time(struct intel_pt_queue *ptq)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = ptq->pt;
|
|
|
|
|
|
|
|
if (ptq->sel_start) {
|
|
|
|
/* Next time is an end time */
|
|
|
|
ptq->sel_start = false;
|
|
|
|
ptq->sel_timestamp = pt->time_ranges[ptq->sel_idx].end;
|
|
|
|
return true;
|
|
|
|
} else if (ptq->sel_idx + 1 < pt->range_cnt) {
|
|
|
|
/* Next time is a start time */
|
|
|
|
ptq->sel_start = true;
|
|
|
|
ptq->sel_idx += 1;
|
|
|
|
ptq->sel_timestamp = pt->time_ranges[ptq->sel_idx].start;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* No next time */
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int intel_pt_time_filter(struct intel_pt_queue *ptq, u64 *ff_timestamp)
|
|
|
|
{
|
|
|
|
int err;
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
if (ptq->sel_start) {
|
|
|
|
if (ptq->timestamp >= ptq->sel_timestamp) {
|
|
|
|
/* After start time, so consider next time */
|
|
|
|
intel_pt_next_time(ptq);
|
|
|
|
if (!ptq->sel_timestamp) {
|
|
|
|
/* No end time */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
/* Check against end time */
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
/* Before start time, so fast forward */
|
|
|
|
ptq->have_sample = false;
|
|
|
|
if (ptq->sel_timestamp > *ff_timestamp) {
|
|
|
|
if (ptq->sync_switch) {
|
|
|
|
intel_pt_next_tid(ptq->pt, ptq);
|
|
|
|
ptq->switch_state = INTEL_PT_SS_UNKNOWN;
|
|
|
|
}
|
|
|
|
*ff_timestamp = ptq->sel_timestamp;
|
|
|
|
err = intel_pt_fast_forward(ptq->decoder,
|
|
|
|
ptq->sel_timestamp);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
} else if (ptq->timestamp > ptq->sel_timestamp) {
|
|
|
|
/* After end time, so consider next time */
|
|
|
|
if (!intel_pt_next_time(ptq)) {
|
|
|
|
/* No next time range, so stop decoding */
|
|
|
|
ptq->have_sample = false;
|
|
|
|
ptq->switch_state = INTEL_PT_SS_NOT_TRACING;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
/* Check against next start time */
|
|
|
|
continue;
|
|
|
|
} else {
|
|
|
|
/* Before end time */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
static int intel_pt_run_decoder(struct intel_pt_queue *ptq, u64 *timestamp)
|
|
|
|
{
|
|
|
|
const struct intel_pt_state *state = ptq->state;
|
|
|
|
struct intel_pt *pt = ptq->pt;
|
2019-06-04 21:00:09 +08:00
|
|
|
u64 ff_timestamp = 0;
|
2015-07-18 00:33:41 +08:00
|
|
|
int err;
|
|
|
|
|
|
|
|
if (!pt->kernel_start) {
|
|
|
|
pt->kernel_start = machine__kernel_start(pt->machine);
|
2015-08-13 17:40:57 +08:00
|
|
|
if (pt->per_cpu_mmaps &&
|
|
|
|
(pt->have_sched_switch == 1 || pt->have_sched_switch == 3) &&
|
2015-07-18 00:33:41 +08:00
|
|
|
!pt->timeless_decoding && intel_pt_tracing_kernel(pt) &&
|
2021-04-30 15:03:09 +08:00
|
|
|
!pt->sampling_mode && !pt->synth_opts.vm_time_correlation) {
|
2015-08-13 17:40:57 +08:00
|
|
|
pt->switch_ip = intel_pt_switch_ip(pt, &pt->ptss_ip);
|
2015-07-18 00:33:41 +08:00
|
|
|
if (pt->switch_ip) {
|
|
|
|
intel_pt_log("switch_ip: %"PRIx64" ptss_ip: %"PRIx64"\n",
|
|
|
|
pt->switch_ip, pt->ptss_ip);
|
2018-03-07 22:02:22 +08:00
|
|
|
intel_pt_enable_sync_switch(pt);
|
2015-07-18 00:33:41 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
intel_pt_log("queue %u decoding cpu %d pid %d tid %d\n",
|
|
|
|
ptq->queue_nr, ptq->cpu, ptq->pid, ptq->tid);
|
|
|
|
while (1) {
|
|
|
|
err = intel_pt_sample(ptq);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
state = intel_pt_decode(ptq->decoder);
|
|
|
|
if (state->err) {
|
|
|
|
if (state->err == INTEL_PT_ERR_NODATA)
|
|
|
|
return 1;
|
2018-03-07 22:02:22 +08:00
|
|
|
if (ptq->sync_switch &&
|
2015-07-18 00:33:41 +08:00
|
|
|
state->from_ip >= pt->kernel_start) {
|
2018-03-07 22:02:22 +08:00
|
|
|
ptq->sync_switch = false;
|
2015-07-18 00:33:41 +08:00
|
|
|
intel_pt_next_tid(pt, ptq);
|
|
|
|
}
|
2021-12-11 00:23:03 +08:00
|
|
|
ptq->timestamp = state->est_timestamp;
|
2015-07-18 00:33:41 +08:00
|
|
|
if (pt->synth_opts.errors) {
|
2019-02-06 18:39:47 +08:00
|
|
|
err = intel_ptq_synth_error(ptq, state);
|
2015-07-18 00:33:41 +08:00
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
ptq->state = state;
|
|
|
|
ptq->have_sample = true;
|
|
|
|
intel_pt_sample_flags(ptq);
|
|
|
|
|
|
|
|
/* Use estimated TSC upon return to user space */
|
|
|
|
if (pt->est_tsc &&
|
|
|
|
(state->from_ip >= pt->kernel_start || !state->from_ip) &&
|
|
|
|
state->to_ip && state->to_ip < pt->kernel_start) {
|
|
|
|
intel_pt_log("TSC %"PRIx64" est. TSC %"PRIx64"\n",
|
|
|
|
state->timestamp, state->est_timestamp);
|
|
|
|
ptq->timestamp = state->est_timestamp;
|
|
|
|
/* Use estimated TSC in unknown switch state */
|
2018-03-07 22:02:22 +08:00
|
|
|
} else if (ptq->sync_switch &&
|
2015-07-18 00:33:41 +08:00
|
|
|
ptq->switch_state == INTEL_PT_SS_UNKNOWN &&
|
|
|
|
intel_pt_is_switch_ip(ptq, state->to_ip) &&
|
|
|
|
ptq->next_tid == -1) {
|
|
|
|
intel_pt_log("TSC %"PRIx64" est. TSC %"PRIx64"\n",
|
|
|
|
state->timestamp, state->est_timestamp);
|
|
|
|
ptq->timestamp = state->est_timestamp;
|
|
|
|
} else if (state->timestamp > ptq->timestamp) {
|
|
|
|
ptq->timestamp = state->timestamp;
|
|
|
|
}
|
|
|
|
|
2019-06-04 21:00:09 +08:00
|
|
|
if (ptq->sel_timestamp) {
|
|
|
|
err = intel_pt_time_filter(ptq, &ff_timestamp);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
if (!pt->timeless_decoding && ptq->timestamp >= *timestamp) {
|
|
|
|
*timestamp = ptq->timestamp;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int intel_pt_update_queues(struct intel_pt *pt)
|
|
|
|
{
|
|
|
|
if (pt->queues.new_data) {
|
|
|
|
pt->queues.new_data = false;
|
|
|
|
return intel_pt_setup_queues(pt);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int intel_pt_process_queues(struct intel_pt *pt, u64 timestamp)
|
|
|
|
{
|
|
|
|
unsigned int queue_nr;
|
|
|
|
u64 ts;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
struct auxtrace_queue *queue;
|
|
|
|
struct intel_pt_queue *ptq;
|
|
|
|
|
|
|
|
if (!pt->heap.heap_cnt)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (pt->heap.heap_array[0].ordinal >= timestamp)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
queue_nr = pt->heap.heap_array[0].queue_nr;
|
|
|
|
queue = &pt->queues.queue_array[queue_nr];
|
|
|
|
ptq = queue->priv;
|
|
|
|
|
|
|
|
intel_pt_log("queue %u processing 0x%" PRIx64 " to 0x%" PRIx64 "\n",
|
|
|
|
queue_nr, pt->heap.heap_array[0].ordinal,
|
|
|
|
timestamp);
|
|
|
|
|
|
|
|
auxtrace_heap__pop(&pt->heap);
|
|
|
|
|
|
|
|
if (pt->heap.heap_cnt) {
|
|
|
|
ts = pt->heap.heap_array[0].ordinal + 1;
|
|
|
|
if (ts > timestamp)
|
|
|
|
ts = timestamp;
|
|
|
|
} else {
|
|
|
|
ts = timestamp;
|
|
|
|
}
|
|
|
|
|
|
|
|
intel_pt_set_pid_tid_cpu(pt, queue);
|
|
|
|
|
|
|
|
ret = intel_pt_run_decoder(ptq, &ts);
|
|
|
|
|
|
|
|
if (ret < 0) {
|
|
|
|
auxtrace_heap__add(&pt->heap, queue_nr, ts);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!ret) {
|
|
|
|
ret = auxtrace_heap__add(&pt->heap, queue_nr, ts);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
} else {
|
|
|
|
ptq->on_heap = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int intel_pt_process_timeless_queues(struct intel_pt *pt, pid_t tid,
|
|
|
|
u64 time_)
|
|
|
|
{
|
|
|
|
struct auxtrace_queues *queues = &pt->queues;
|
|
|
|
unsigned int i;
|
|
|
|
u64 ts = 0;
|
|
|
|
|
|
|
|
for (i = 0; i < queues->nr_queues; i++) {
|
|
|
|
struct auxtrace_queue *queue = &pt->queues.queue_array[i];
|
|
|
|
struct intel_pt_queue *ptq = queue->priv;
|
|
|
|
|
|
|
|
if (ptq && (tid == -1 || ptq->tid == tid)) {
|
|
|
|
ptq->time = time_;
|
|
|
|
intel_pt_set_pid_tid_cpu(pt, queue);
|
|
|
|
intel_pt_run_decoder(ptq, &ts);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-11-15 20:42:24 +08:00
|
|
|
static void intel_pt_sample_set_pid_tid_cpu(struct intel_pt_queue *ptq,
|
|
|
|
struct auxtrace_queue *queue,
|
|
|
|
struct perf_sample *sample)
|
|
|
|
{
|
|
|
|
struct machine *m = ptq->pt->machine;
|
|
|
|
|
|
|
|
ptq->pid = sample->pid;
|
|
|
|
ptq->tid = sample->tid;
|
|
|
|
ptq->cpu = queue->cpu;
|
|
|
|
|
|
|
|
intel_pt_log("queue %u cpu %d pid %d tid %d\n",
|
|
|
|
ptq->queue_nr, ptq->cpu, ptq->pid, ptq->tid);
|
|
|
|
|
|
|
|
thread__zput(ptq->thread);
|
|
|
|
|
|
|
|
if (ptq->tid == -1)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (ptq->pid == -1) {
|
|
|
|
ptq->thread = machine__find_thread(m, -1, ptq->tid);
|
|
|
|
if (ptq->thread)
|
2023-06-09 07:28:00 +08:00
|
|
|
ptq->pid = thread__pid(ptq->thread);
|
2019-11-15 20:42:24 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
ptq->thread = machine__findnew_thread(m, ptq->pid, ptq->tid);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int intel_pt_process_timeless_sample(struct intel_pt *pt,
|
|
|
|
struct perf_sample *sample)
|
|
|
|
{
|
|
|
|
struct auxtrace_queue *queue;
|
|
|
|
struct intel_pt_queue *ptq;
|
|
|
|
u64 ts = 0;
|
|
|
|
|
|
|
|
queue = auxtrace_queues__sample_queue(&pt->queues, sample, pt->session);
|
|
|
|
if (!queue)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
ptq = queue->priv;
|
|
|
|
if (!ptq)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
ptq->stop = false;
|
|
|
|
ptq->time = sample->time;
|
|
|
|
intel_pt_sample_set_pid_tid_cpu(ptq, queue, sample);
|
|
|
|
intel_pt_run_decoder(ptq, &ts);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
static int intel_pt_lost(struct intel_pt *pt, struct perf_sample *sample)
|
|
|
|
{
|
|
|
|
return intel_pt_synth_error(pt, INTEL_PT_ERR_LOST, sample->cpu,
|
2022-07-11 17:32:16 +08:00
|
|
|
sample->pid, sample->tid, 0, sample->time,
|
|
|
|
sample->machine_pid, sample->vcpu);
|
2015-07-18 00:33:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct intel_pt_queue *intel_pt_cpu_to_ptq(struct intel_pt *pt, int cpu)
|
|
|
|
{
|
|
|
|
unsigned i, j;
|
|
|
|
|
|
|
|
if (cpu < 0 || !pt->queues.nr_queues)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
if ((unsigned)cpu >= pt->queues.nr_queues)
|
|
|
|
i = pt->queues.nr_queues - 1;
|
|
|
|
else
|
|
|
|
i = cpu;
|
|
|
|
|
|
|
|
if (pt->queues.queue_array[i].cpu == cpu)
|
|
|
|
return pt->queues.queue_array[i].priv;
|
|
|
|
|
|
|
|
for (j = 0; i > 0; j++) {
|
|
|
|
if (pt->queues.queue_array[--i].cpu == cpu)
|
|
|
|
return pt->queues.queue_array[i].priv;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (; j < pt->queues.nr_queues; j++) {
|
|
|
|
if (pt->queues.queue_array[j].cpu == cpu)
|
|
|
|
return pt->queues.queue_array[j].priv;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2015-08-13 17:40:57 +08:00
|
|
|
static int intel_pt_sync_switch(struct intel_pt *pt, int cpu, pid_t tid,
|
|
|
|
u64 timestamp)
|
2015-07-18 00:33:41 +08:00
|
|
|
{
|
|
|
|
struct intel_pt_queue *ptq;
|
2015-08-13 17:40:57 +08:00
|
|
|
int err;
|
2015-07-18 00:33:41 +08:00
|
|
|
|
|
|
|
if (!pt->sync_switch)
|
2015-08-13 17:40:57 +08:00
|
|
|
return 1;
|
2015-07-18 00:33:41 +08:00
|
|
|
|
|
|
|
ptq = intel_pt_cpu_to_ptq(pt, cpu);
|
2018-03-07 22:02:22 +08:00
|
|
|
if (!ptq || !ptq->sync_switch)
|
2015-08-13 17:40:57 +08:00
|
|
|
return 1;
|
2015-07-18 00:33:41 +08:00
|
|
|
|
|
|
|
switch (ptq->switch_state) {
|
|
|
|
case INTEL_PT_SS_NOT_TRACING:
|
|
|
|
break;
|
|
|
|
case INTEL_PT_SS_UNKNOWN:
|
|
|
|
case INTEL_PT_SS_TRACING:
|
|
|
|
ptq->next_tid = tid;
|
|
|
|
ptq->switch_state = INTEL_PT_SS_EXPECTING_SWITCH_IP;
|
|
|
|
return 0;
|
|
|
|
case INTEL_PT_SS_EXPECTING_SWITCH_EVENT:
|
|
|
|
if (!ptq->on_heap) {
|
2015-08-13 17:40:57 +08:00
|
|
|
ptq->timestamp = perf_time_to_tsc(timestamp,
|
2015-07-18 00:33:41 +08:00
|
|
|
&pt->tc);
|
|
|
|
err = auxtrace_heap__add(&pt->heap, ptq->queue_nr,
|
|
|
|
ptq->timestamp);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
ptq->on_heap = true;
|
|
|
|
}
|
|
|
|
ptq->switch_state = INTEL_PT_SS_TRACING;
|
|
|
|
break;
|
|
|
|
case INTEL_PT_SS_EXPECTING_SWITCH_IP:
|
|
|
|
intel_pt_log("ERROR: cpu %d expecting switch ip\n", cpu);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
2015-08-13 17:40:57 +08:00
|
|
|
|
2019-04-12 19:38:30 +08:00
|
|
|
ptq->next_tid = -1;
|
|
|
|
|
2015-08-13 17:40:57 +08:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
perf build: Use libtraceevent from the system
Remove the LIBTRACEEVENT_DYNAMIC and LIBTRACEFS_DYNAMIC make command
line variables.
If libtraceevent isn't installed or NO_LIBTRACEEVENT=1 is passed to the
build, don't compile in libtraceevent and libtracefs support.
This also disables CONFIG_TRACE that controls "perf trace".
CONFIG_LIBTRACEEVENT is used to control enablement in Build/Makefiles,
HAVE_LIBTRACEEVENT is used in C code.
Without HAVE_LIBTRACEEVENT tracepoints are disabled and as such the
commands kmem, kwork, lock, sched and timechart are removed. The
majority of commands continue to work including "perf test".
Committer notes:
Fixed up a tools/perf/util/Build reject and added:
#include <traceevent/event-parse.h>
to tools/perf/util/scripting-engines/trace-event-perl.c.
Committer testing:
$ rpm -qi libtraceevent-devel
Name : libtraceevent-devel
Version : 1.5.3
Release : 2.fc36
Architecture: x86_64
Install Date: Mon 25 Jul 2022 03:20:19 PM -03
Group : Unspecified
Size : 27728
License : LGPLv2+ and GPLv2+
Signature : RSA/SHA256, Fri 15 Apr 2022 02:11:58 PM -03, Key ID 999f7cbf38ab71f4
Source RPM : libtraceevent-1.5.3-2.fc36.src.rpm
Build Date : Fri 15 Apr 2022 10:57:01 AM -03
Build Host : buildvm-x86-05.iad2.fedoraproject.org
Packager : Fedora Project
Vendor : Fedora Project
URL : https://git.kernel.org/pub/scm/libs/libtrace/libtraceevent.git/
Bug URL : https://bugz.fedoraproject.org/libtraceevent
Summary : Development headers of libtraceevent
Description :
Development headers of libtraceevent-libs
$
Default build:
$ ldd ~/bin/perf | grep tracee
libtraceevent.so.1 => /lib64/libtraceevent.so.1 (0x00007f1dcaf8f000)
$
# perf trace -e sched:* --max-events 10
0.000 migration/0/17 sched:sched_migrate_task(comm: "", pid: 1603763 (perf), prio: 120, dest_cpu: 1)
0.005 migration/0/17 sched:sched_wake_idle_without_ipi(cpu: 1)
0.011 migration/0/17 sched:sched_switch(prev_comm: "", prev_pid: 17 (migration/0), prev_state: 1, next_comm: "", next_prio: 120)
1.173 :0/0 sched:sched_wakeup(comm: "", pid: 3138 (gnome-terminal-), prio: 120)
1.180 :0/0 sched:sched_switch(prev_comm: "", prev_prio: 120, next_comm: "", next_pid: 3138 (gnome-terminal-), next_prio: 120)
0.156 migration/1/21 sched:sched_migrate_task(comm: "", pid: 1603763 (perf), prio: 120, orig_cpu: 1, dest_cpu: 2)
0.160 migration/1/21 sched:sched_wake_idle_without_ipi(cpu: 2)
0.166 migration/1/21 sched:sched_switch(prev_comm: "", prev_pid: 21 (migration/1), prev_state: 1, next_comm: "", next_prio: 120)
1.183 :0/0 sched:sched_wakeup(comm: "", pid: 1602985 (kworker/u16:0-f), prio: 120, target_cpu: 1)
1.186 :0/0 sched:sched_switch(prev_comm: "", prev_prio: 120, next_comm: "", next_pid: 1602985 (kworker/u16:0-f), next_prio: 120)
#
Had to tweak tools/perf/util/setup.py to make sure the python binding
shared object links with libtraceevent if -DHAVE_LIBTRACEEVENT is
present in CFLAGS.
Building with NO_LIBTRACEEVENT=1 uncovered some more build failures:
- Make building of data-convert-bt.c to CONFIG_LIBTRACEEVENT=y
- perf-$(CONFIG_LIBTRACEEVENT) += scripts/
- bpf_kwork.o needs also to be dependent on CONFIG_LIBTRACEEVENT=y
- The python binding needed some fixups and util/trace-event.c can't be
built and linked with the python binding shared object, so remove it
in tools/perf/util/setup.py and exclude it from the list of
dependencies in the python/perf.so Makefile.perf target.
Building without libtraceevent-devel installed uncovered more build
failures:
- The python binding tools/perf/util/python.c was assuming that
traceevent/parse-events.h was always available, which was the case
when we defaulted to using the in-kernel tools/lib/traceevent/ files,
now we need to enclose it under ifdef HAVE_LIBTRACEEVENT, just like
the other parts of it that deal with tracepoints.
- We have to ifdef the rules in the Build files with
CONFIG_LIBTRACEEVENT=y to build builtin-trace.c and
tools/perf/trace/beauty/ as we only ifdef setting CONFIG_TRACE=y when
setting NO_LIBTRACEEVENT=1 in the make command line, not when we don't
detect libtraceevent-devel installed in the system. Simplification here
to avoid these two ways of disabling builtin-trace.c and not having
CONFIG_TRACE=y when libtraceevent-devel isn't installed is the clean
way.
From Athira:
<quote>
tools/perf/arch/powerpc/util/Build
-perf-y += kvm-stat.o
+perf-$(CONFIG_LIBTRACEEVENT) += kvm-stat.o
</quote>
Then, ditto for arm64 and s390, detected by container cross build tests.
- s/390 uses test__checkevent_tracepoint() that is now only available if
HAVE_LIBTRACEEVENT is defined, enclose the callsite with ifder HAVE_LIBTRACEEVENT.
Also from Athira:
<quote>
With this change, I could successfully compile in these environment:
- Without libtraceevent-devel installed
- With libtraceevent-devel installed
- With “make NO_LIBTRACEEVENT=1”
</quote>
Then, finally rename CONFIG_TRACEEVENT to CONFIG_LIBTRACEEVENT for
consistency with other libraries detected in tools/perf/.
Signed-off-by: Ian Rogers <irogers@google.com>
Tested-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Tested-by: Athira Rajeev <atrajeev@linux.vnet.ibm.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Nick Desaulniers <ndesaulniers@google.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Stephane Eranian <eranian@google.com>
Cc: bpf@vger.kernel.org
Link: http://lore.kernel.org/lkml/20221205225940.3079667-3-irogers@google.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2022-12-06 06:59:39 +08:00
|
|
|
#ifdef HAVE_LIBTRACEEVENT
|
2015-08-13 17:40:57 +08:00
|
|
|
static int intel_pt_process_switch(struct intel_pt *pt,
|
|
|
|
struct perf_sample *sample)
|
|
|
|
{
|
|
|
|
pid_t tid;
|
|
|
|
int cpu, ret;
|
2020-12-01 01:17:57 +08:00
|
|
|
struct evsel *evsel = evlist__id2evsel(pt->session->evlist, sample->id);
|
2015-08-13 17:40:57 +08:00
|
|
|
|
|
|
|
if (evsel != pt->switch_evsel)
|
|
|
|
return 0;
|
|
|
|
|
2020-04-30 03:26:57 +08:00
|
|
|
tid = evsel__intval(evsel, sample, "next_pid");
|
2015-08-13 17:40:57 +08:00
|
|
|
cpu = sample->cpu;
|
|
|
|
|
|
|
|
intel_pt_log("sched_switch: cpu %d tid %d time %"PRIu64" tsc %#"PRIx64"\n",
|
|
|
|
cpu, tid, sample->time, perf_time_to_tsc(sample->time,
|
|
|
|
&pt->tc));
|
|
|
|
|
|
|
|
ret = intel_pt_sync_switch(pt, cpu, tid, sample->time);
|
|
|
|
if (ret <= 0)
|
|
|
|
return ret;
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
return machine__set_current_tid(pt->machine, cpu, -1, tid);
|
|
|
|
}
|
perf build: Use libtraceevent from the system
Remove the LIBTRACEEVENT_DYNAMIC and LIBTRACEFS_DYNAMIC make command
line variables.
If libtraceevent isn't installed or NO_LIBTRACEEVENT=1 is passed to the
build, don't compile in libtraceevent and libtracefs support.
This also disables CONFIG_TRACE that controls "perf trace".
CONFIG_LIBTRACEEVENT is used to control enablement in Build/Makefiles,
HAVE_LIBTRACEEVENT is used in C code.
Without HAVE_LIBTRACEEVENT tracepoints are disabled and as such the
commands kmem, kwork, lock, sched and timechart are removed. The
majority of commands continue to work including "perf test".
Committer notes:
Fixed up a tools/perf/util/Build reject and added:
#include <traceevent/event-parse.h>
to tools/perf/util/scripting-engines/trace-event-perl.c.
Committer testing:
$ rpm -qi libtraceevent-devel
Name : libtraceevent-devel
Version : 1.5.3
Release : 2.fc36
Architecture: x86_64
Install Date: Mon 25 Jul 2022 03:20:19 PM -03
Group : Unspecified
Size : 27728
License : LGPLv2+ and GPLv2+
Signature : RSA/SHA256, Fri 15 Apr 2022 02:11:58 PM -03, Key ID 999f7cbf38ab71f4
Source RPM : libtraceevent-1.5.3-2.fc36.src.rpm
Build Date : Fri 15 Apr 2022 10:57:01 AM -03
Build Host : buildvm-x86-05.iad2.fedoraproject.org
Packager : Fedora Project
Vendor : Fedora Project
URL : https://git.kernel.org/pub/scm/libs/libtrace/libtraceevent.git/
Bug URL : https://bugz.fedoraproject.org/libtraceevent
Summary : Development headers of libtraceevent
Description :
Development headers of libtraceevent-libs
$
Default build:
$ ldd ~/bin/perf | grep tracee
libtraceevent.so.1 => /lib64/libtraceevent.so.1 (0x00007f1dcaf8f000)
$
# perf trace -e sched:* --max-events 10
0.000 migration/0/17 sched:sched_migrate_task(comm: "", pid: 1603763 (perf), prio: 120, dest_cpu: 1)
0.005 migration/0/17 sched:sched_wake_idle_without_ipi(cpu: 1)
0.011 migration/0/17 sched:sched_switch(prev_comm: "", prev_pid: 17 (migration/0), prev_state: 1, next_comm: "", next_prio: 120)
1.173 :0/0 sched:sched_wakeup(comm: "", pid: 3138 (gnome-terminal-), prio: 120)
1.180 :0/0 sched:sched_switch(prev_comm: "", prev_prio: 120, next_comm: "", next_pid: 3138 (gnome-terminal-), next_prio: 120)
0.156 migration/1/21 sched:sched_migrate_task(comm: "", pid: 1603763 (perf), prio: 120, orig_cpu: 1, dest_cpu: 2)
0.160 migration/1/21 sched:sched_wake_idle_without_ipi(cpu: 2)
0.166 migration/1/21 sched:sched_switch(prev_comm: "", prev_pid: 21 (migration/1), prev_state: 1, next_comm: "", next_prio: 120)
1.183 :0/0 sched:sched_wakeup(comm: "", pid: 1602985 (kworker/u16:0-f), prio: 120, target_cpu: 1)
1.186 :0/0 sched:sched_switch(prev_comm: "", prev_prio: 120, next_comm: "", next_pid: 1602985 (kworker/u16:0-f), next_prio: 120)
#
Had to tweak tools/perf/util/setup.py to make sure the python binding
shared object links with libtraceevent if -DHAVE_LIBTRACEEVENT is
present in CFLAGS.
Building with NO_LIBTRACEEVENT=1 uncovered some more build failures:
- Make building of data-convert-bt.c to CONFIG_LIBTRACEEVENT=y
- perf-$(CONFIG_LIBTRACEEVENT) += scripts/
- bpf_kwork.o needs also to be dependent on CONFIG_LIBTRACEEVENT=y
- The python binding needed some fixups and util/trace-event.c can't be
built and linked with the python binding shared object, so remove it
in tools/perf/util/setup.py and exclude it from the list of
dependencies in the python/perf.so Makefile.perf target.
Building without libtraceevent-devel installed uncovered more build
failures:
- The python binding tools/perf/util/python.c was assuming that
traceevent/parse-events.h was always available, which was the case
when we defaulted to using the in-kernel tools/lib/traceevent/ files,
now we need to enclose it under ifdef HAVE_LIBTRACEEVENT, just like
the other parts of it that deal with tracepoints.
- We have to ifdef the rules in the Build files with
CONFIG_LIBTRACEEVENT=y to build builtin-trace.c and
tools/perf/trace/beauty/ as we only ifdef setting CONFIG_TRACE=y when
setting NO_LIBTRACEEVENT=1 in the make command line, not when we don't
detect libtraceevent-devel installed in the system. Simplification here
to avoid these two ways of disabling builtin-trace.c and not having
CONFIG_TRACE=y when libtraceevent-devel isn't installed is the clean
way.
From Athira:
<quote>
tools/perf/arch/powerpc/util/Build
-perf-y += kvm-stat.o
+perf-$(CONFIG_LIBTRACEEVENT) += kvm-stat.o
</quote>
Then, ditto for arm64 and s390, detected by container cross build tests.
- s/390 uses test__checkevent_tracepoint() that is now only available if
HAVE_LIBTRACEEVENT is defined, enclose the callsite with ifder HAVE_LIBTRACEEVENT.
Also from Athira:
<quote>
With this change, I could successfully compile in these environment:
- Without libtraceevent-devel installed
- With libtraceevent-devel installed
- With “make NO_LIBTRACEEVENT=1”
</quote>
Then, finally rename CONFIG_TRACEEVENT to CONFIG_LIBTRACEEVENT for
consistency with other libraries detected in tools/perf/.
Signed-off-by: Ian Rogers <irogers@google.com>
Tested-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Tested-by: Athira Rajeev <atrajeev@linux.vnet.ibm.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Nick Desaulniers <ndesaulniers@google.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Stephane Eranian <eranian@google.com>
Cc: bpf@vger.kernel.org
Link: http://lore.kernel.org/lkml/20221205225940.3079667-3-irogers@google.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2022-12-06 06:59:39 +08:00
|
|
|
#endif /* HAVE_LIBTRACEEVENT */
|
2015-07-18 00:33:41 +08:00
|
|
|
|
2019-04-12 19:38:29 +08:00
|
|
|
static int intel_pt_context_switch_in(struct intel_pt *pt,
|
|
|
|
struct perf_sample *sample)
|
|
|
|
{
|
|
|
|
pid_t pid = sample->pid;
|
|
|
|
pid_t tid = sample->tid;
|
|
|
|
int cpu = sample->cpu;
|
|
|
|
|
|
|
|
if (pt->sync_switch) {
|
|
|
|
struct intel_pt_queue *ptq;
|
|
|
|
|
|
|
|
ptq = intel_pt_cpu_to_ptq(pt, cpu);
|
|
|
|
if (ptq && ptq->sync_switch) {
|
|
|
|
ptq->next_tid = -1;
|
|
|
|
switch (ptq->switch_state) {
|
|
|
|
case INTEL_PT_SS_NOT_TRACING:
|
|
|
|
case INTEL_PT_SS_UNKNOWN:
|
|
|
|
case INTEL_PT_SS_TRACING:
|
|
|
|
break;
|
|
|
|
case INTEL_PT_SS_EXPECTING_SWITCH_EVENT:
|
|
|
|
case INTEL_PT_SS_EXPECTING_SWITCH_IP:
|
|
|
|
ptq->switch_state = INTEL_PT_SS_TRACING;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If the current tid has not been updated yet, ensure it is now that
|
|
|
|
* a "switch in" event has occurred.
|
|
|
|
*/
|
|
|
|
if (machine__get_current_tid(pt->machine, cpu) == tid)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return machine__set_current_tid(pt->machine, cpu, pid, tid);
|
|
|
|
}
|
|
|
|
|
2022-07-11 17:32:13 +08:00
|
|
|
static int intel_pt_guest_context_switch(struct intel_pt *pt,
|
|
|
|
union perf_event *event,
|
|
|
|
struct perf_sample *sample)
|
|
|
|
{
|
|
|
|
bool out = event->header.misc & PERF_RECORD_MISC_SWITCH_OUT;
|
|
|
|
struct machines *machines = &pt->session->machines;
|
|
|
|
struct machine *machine = machines__find(machines, sample->machine_pid);
|
|
|
|
|
|
|
|
pt->have_guest_sideband = true;
|
|
|
|
|
2022-07-11 17:32:14 +08:00
|
|
|
/*
|
|
|
|
* sync_switch cannot handle guest machines at present, so just disable
|
|
|
|
* it.
|
|
|
|
*/
|
|
|
|
pt->sync_switch_not_supported = true;
|
|
|
|
if (pt->sync_switch)
|
|
|
|
intel_pt_disable_sync_switch(pt);
|
|
|
|
|
2022-07-11 17:32:13 +08:00
|
|
|
if (out)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (!machine)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
return machine__set_current_tid(machine, sample->vcpu, sample->pid, sample->tid);
|
|
|
|
}
|
|
|
|
|
2015-08-13 17:40:57 +08:00
|
|
|
static int intel_pt_context_switch(struct intel_pt *pt, union perf_event *event,
|
|
|
|
struct perf_sample *sample)
|
|
|
|
{
|
|
|
|
bool out = event->header.misc & PERF_RECORD_MISC_SWITCH_OUT;
|
|
|
|
pid_t pid, tid;
|
|
|
|
int cpu, ret;
|
|
|
|
|
2022-07-11 17:32:13 +08:00
|
|
|
if (perf_event__is_guest(event))
|
|
|
|
return intel_pt_guest_context_switch(pt, event, sample);
|
|
|
|
|
2015-08-13 17:40:57 +08:00
|
|
|
cpu = sample->cpu;
|
|
|
|
|
|
|
|
if (pt->have_sched_switch == 3) {
|
|
|
|
if (!out)
|
2019-04-12 19:38:29 +08:00
|
|
|
return intel_pt_context_switch_in(pt, sample);
|
2015-08-13 17:40:57 +08:00
|
|
|
if (event->header.type != PERF_RECORD_SWITCH_CPU_WIDE) {
|
|
|
|
pr_err("Expecting CPU-wide context switch event\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
pid = event->context_switch.next_prev_pid;
|
|
|
|
tid = event->context_switch.next_prev_tid;
|
|
|
|
} else {
|
|
|
|
if (out)
|
|
|
|
return 0;
|
|
|
|
pid = sample->pid;
|
|
|
|
tid = sample->tid;
|
|
|
|
}
|
|
|
|
|
2020-09-09 16:49:23 +08:00
|
|
|
if (tid == -1)
|
|
|
|
intel_pt_log("context_switch event has no tid\n");
|
2015-08-13 17:40:57 +08:00
|
|
|
|
|
|
|
ret = intel_pt_sync_switch(pt, cpu, tid, sample->time);
|
|
|
|
if (ret <= 0)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
return machine__set_current_tid(pt->machine, cpu, pid, tid);
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
static int intel_pt_process_itrace_start(struct intel_pt *pt,
|
|
|
|
union perf_event *event,
|
|
|
|
struct perf_sample *sample)
|
|
|
|
{
|
|
|
|
if (!pt->per_cpu_mmaps)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
intel_pt_log("itrace_start: cpu %d pid %d tid %d time %"PRIu64" tsc %#"PRIx64"\n",
|
|
|
|
sample->cpu, event->itrace_start.pid,
|
|
|
|
event->itrace_start.tid, sample->time,
|
|
|
|
perf_time_to_tsc(sample->time, &pt->tc));
|
|
|
|
|
|
|
|
return machine__set_current_tid(pt->machine, sample->cpu,
|
|
|
|
event->itrace_start.pid,
|
|
|
|
event->itrace_start.tid);
|
|
|
|
}
|
|
|
|
|
2021-09-08 00:39:03 +08:00
|
|
|
static int intel_pt_process_aux_output_hw_id(struct intel_pt *pt,
|
|
|
|
union perf_event *event,
|
|
|
|
struct perf_sample *sample)
|
|
|
|
{
|
|
|
|
u64 hw_id = event->aux_output_hw_id.hw_id;
|
|
|
|
struct auxtrace_queue *queue;
|
|
|
|
struct intel_pt_queue *ptq;
|
|
|
|
struct evsel *evsel;
|
|
|
|
|
|
|
|
queue = auxtrace_queues__sample_queue(&pt->queues, sample, pt->session);
|
|
|
|
evsel = evlist__id2evsel_strict(pt->session->evlist, sample->id);
|
|
|
|
if (!queue || !queue->priv || !evsel || hw_id > INTEL_PT_MAX_PEBS) {
|
|
|
|
pr_err("Bad AUX output hardware ID\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
ptq = queue->priv;
|
|
|
|
|
|
|
|
ptq->pebs[hw_id].evsel = evsel;
|
|
|
|
ptq->pebs[hw_id].id = sample->id;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
perf intel-pt: Add support for text poke events
Select text poke events when available and the kernel is being traced.
Process text poke events to invalidate entries in Intel PT's instruction
cache.
Example:
The example requires kernel config:
CONFIG_PROC_SYSCTL=y
CONFIG_SCHED_DEBUG=y
CONFIG_SCHEDSTATS=y
Before:
# perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 3.341 MB perf.data.before ]
[1]+ Terminated perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.before --itrace=e >/dev/null
Warning:
474 instruction trace errors
After:
# perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 2.646 MB perf.data.after ]
[1]+ Terminated perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.after --itrace=e >/dev/null
Example:
The example requires kernel config:
# CONFIG_FUNCTION_TRACER is not set
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.026 MB perf.data (68 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.268 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
207 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.028 MB perf.data (107 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 39.978 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
6 565303693547 0x291f18 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027a000 len 4096 type 2 flags 0x0 name kprobe_insn_page
6 565303697010 0x291f68 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 0 new len 6
6 565303838278 0x291fa8 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027c000 len 4096 type 2 flags 0x0 name kprobe_optinsn_page
6 565303848286 0x291ff8 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 0 new len 106
6 565369336743 0x292af8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
7 566434327704 0x217c208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
6 566456313475 0x293198 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 106 new len 0
6 566456314935 0x293238 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 6 new len 0
Example:
The example requires kernel config:
CONFIG_FUNCTION_TRACER=y
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.022 MB perf.data (6 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 2 times to write data ]
[ perf record: Captured and wrote 43.850 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
8 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.037 MB perf.data (206 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.442 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
5 312216133258 0x8bafe0 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc0360000 len 415 type 2 flags 0x0 name ftrace_trampoline
5 312216133494 0x8bb030 [0x1d8]: PERF_RECORD_TEXT_POKE addr 0xffffffffc0360000 old len 0 new len 415
5 312216229563 0x8bb208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216239063 0x8bb248 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
5 312216727230 0x8bb288 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
5 312216739322 0x8bb2c8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216748321 0x8bb308 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287163462 0x2817430 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287174890 0x2817470 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287818979 0x28174b0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
7 313287829357 0x28174f0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287841246 0x2817530 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Masami Hiramatsu <mhiramat@kernel.org>
Cc: Mathieu Poirier <mathieu.poirier@linaro.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Steven Rostedt (VMware) <rostedt@goodmis.org>
Cc: x86@kernel.org
Link: http://lore.kernel.org/lkml/20200512121922.8997-14-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2020-05-12 20:19:20 +08:00
|
|
|
static int intel_pt_find_map(struct thread *thread, u8 cpumode, u64 addr,
|
|
|
|
struct addr_location *al)
|
|
|
|
{
|
2023-03-21 05:22:36 +08:00
|
|
|
if (!al->map || addr < map__start(al->map) || addr >= map__end(al->map)) {
|
perf intel-pt: Add support for text poke events
Select text poke events when available and the kernel is being traced.
Process text poke events to invalidate entries in Intel PT's instruction
cache.
Example:
The example requires kernel config:
CONFIG_PROC_SYSCTL=y
CONFIG_SCHED_DEBUG=y
CONFIG_SCHEDSTATS=y
Before:
# perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 3.341 MB perf.data.before ]
[1]+ Terminated perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.before --itrace=e >/dev/null
Warning:
474 instruction trace errors
After:
# perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 2.646 MB perf.data.after ]
[1]+ Terminated perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.after --itrace=e >/dev/null
Example:
The example requires kernel config:
# CONFIG_FUNCTION_TRACER is not set
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.026 MB perf.data (68 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.268 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
207 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.028 MB perf.data (107 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 39.978 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
6 565303693547 0x291f18 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027a000 len 4096 type 2 flags 0x0 name kprobe_insn_page
6 565303697010 0x291f68 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 0 new len 6
6 565303838278 0x291fa8 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027c000 len 4096 type 2 flags 0x0 name kprobe_optinsn_page
6 565303848286 0x291ff8 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 0 new len 106
6 565369336743 0x292af8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
7 566434327704 0x217c208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
6 566456313475 0x293198 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 106 new len 0
6 566456314935 0x293238 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 6 new len 0
Example:
The example requires kernel config:
CONFIG_FUNCTION_TRACER=y
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.022 MB perf.data (6 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 2 times to write data ]
[ perf record: Captured and wrote 43.850 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
8 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.037 MB perf.data (206 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.442 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
5 312216133258 0x8bafe0 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc0360000 len 415 type 2 flags 0x0 name ftrace_trampoline
5 312216133494 0x8bb030 [0x1d8]: PERF_RECORD_TEXT_POKE addr 0xffffffffc0360000 old len 0 new len 415
5 312216229563 0x8bb208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216239063 0x8bb248 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
5 312216727230 0x8bb288 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
5 312216739322 0x8bb2c8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216748321 0x8bb308 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287163462 0x2817430 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287174890 0x2817470 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287818979 0x28174b0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
7 313287829357 0x28174f0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287841246 0x2817530 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Masami Hiramatsu <mhiramat@kernel.org>
Cc: Mathieu Poirier <mathieu.poirier@linaro.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Steven Rostedt (VMware) <rostedt@goodmis.org>
Cc: x86@kernel.org
Link: http://lore.kernel.org/lkml/20200512121922.8997-14-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2020-05-12 20:19:20 +08:00
|
|
|
if (!thread__find_map(thread, cpumode, addr, al))
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Invalidate all instruction cache entries that overlap the text poke */
|
|
|
|
static int intel_pt_text_poke(struct intel_pt *pt, union perf_event *event)
|
|
|
|
{
|
|
|
|
u8 cpumode = event->header.misc & PERF_RECORD_MISC_CPUMODE_MASK;
|
|
|
|
u64 addr = event->text_poke.addr + event->text_poke.new_len - 1;
|
|
|
|
/* Assume text poke begins in a basic block no more than 4096 bytes */
|
|
|
|
int cnt = 4096 + event->text_poke.new_len;
|
|
|
|
struct thread *thread = pt->unknown_thread;
|
2023-06-09 07:28:03 +08:00
|
|
|
struct addr_location al;
|
perf intel-pt: Add support for text poke events
Select text poke events when available and the kernel is being traced.
Process text poke events to invalidate entries in Intel PT's instruction
cache.
Example:
The example requires kernel config:
CONFIG_PROC_SYSCTL=y
CONFIG_SCHED_DEBUG=y
CONFIG_SCHEDSTATS=y
Before:
# perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 3.341 MB perf.data.before ]
[1]+ Terminated perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.before --itrace=e >/dev/null
Warning:
474 instruction trace errors
After:
# perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 2.646 MB perf.data.after ]
[1]+ Terminated perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.after --itrace=e >/dev/null
Example:
The example requires kernel config:
# CONFIG_FUNCTION_TRACER is not set
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.026 MB perf.data (68 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.268 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
207 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.028 MB perf.data (107 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 39.978 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
6 565303693547 0x291f18 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027a000 len 4096 type 2 flags 0x0 name kprobe_insn_page
6 565303697010 0x291f68 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 0 new len 6
6 565303838278 0x291fa8 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027c000 len 4096 type 2 flags 0x0 name kprobe_optinsn_page
6 565303848286 0x291ff8 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 0 new len 106
6 565369336743 0x292af8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
7 566434327704 0x217c208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
6 566456313475 0x293198 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 106 new len 0
6 566456314935 0x293238 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 6 new len 0
Example:
The example requires kernel config:
CONFIG_FUNCTION_TRACER=y
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.022 MB perf.data (6 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 2 times to write data ]
[ perf record: Captured and wrote 43.850 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
8 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.037 MB perf.data (206 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.442 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
5 312216133258 0x8bafe0 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc0360000 len 415 type 2 flags 0x0 name ftrace_trampoline
5 312216133494 0x8bb030 [0x1d8]: PERF_RECORD_TEXT_POKE addr 0xffffffffc0360000 old len 0 new len 415
5 312216229563 0x8bb208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216239063 0x8bb248 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
5 312216727230 0x8bb288 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
5 312216739322 0x8bb2c8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216748321 0x8bb308 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287163462 0x2817430 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287174890 0x2817470 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287818979 0x28174b0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
7 313287829357 0x28174f0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287841246 0x2817530 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Masami Hiramatsu <mhiramat@kernel.org>
Cc: Mathieu Poirier <mathieu.poirier@linaro.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Steven Rostedt (VMware) <rostedt@goodmis.org>
Cc: x86@kernel.org
Link: http://lore.kernel.org/lkml/20200512121922.8997-14-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2020-05-12 20:19:20 +08:00
|
|
|
struct machine *machine = pt->machine;
|
|
|
|
struct intel_pt_cache_entry *e;
|
|
|
|
u64 offset;
|
2023-06-09 07:28:03 +08:00
|
|
|
int ret = 0;
|
perf intel-pt: Add support for text poke events
Select text poke events when available and the kernel is being traced.
Process text poke events to invalidate entries in Intel PT's instruction
cache.
Example:
The example requires kernel config:
CONFIG_PROC_SYSCTL=y
CONFIG_SCHED_DEBUG=y
CONFIG_SCHEDSTATS=y
Before:
# perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 3.341 MB perf.data.before ]
[1]+ Terminated perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.before --itrace=e >/dev/null
Warning:
474 instruction trace errors
After:
# perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 2.646 MB perf.data.after ]
[1]+ Terminated perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.after --itrace=e >/dev/null
Example:
The example requires kernel config:
# CONFIG_FUNCTION_TRACER is not set
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.026 MB perf.data (68 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.268 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
207 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.028 MB perf.data (107 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 39.978 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
6 565303693547 0x291f18 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027a000 len 4096 type 2 flags 0x0 name kprobe_insn_page
6 565303697010 0x291f68 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 0 new len 6
6 565303838278 0x291fa8 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027c000 len 4096 type 2 flags 0x0 name kprobe_optinsn_page
6 565303848286 0x291ff8 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 0 new len 106
6 565369336743 0x292af8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
7 566434327704 0x217c208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
6 566456313475 0x293198 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 106 new len 0
6 566456314935 0x293238 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 6 new len 0
Example:
The example requires kernel config:
CONFIG_FUNCTION_TRACER=y
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.022 MB perf.data (6 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 2 times to write data ]
[ perf record: Captured and wrote 43.850 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
8 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.037 MB perf.data (206 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.442 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
5 312216133258 0x8bafe0 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc0360000 len 415 type 2 flags 0x0 name ftrace_trampoline
5 312216133494 0x8bb030 [0x1d8]: PERF_RECORD_TEXT_POKE addr 0xffffffffc0360000 old len 0 new len 415
5 312216229563 0x8bb208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216239063 0x8bb248 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
5 312216727230 0x8bb288 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
5 312216739322 0x8bb2c8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216748321 0x8bb308 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287163462 0x2817430 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287174890 0x2817470 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287818979 0x28174b0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
7 313287829357 0x28174f0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287841246 0x2817530 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Masami Hiramatsu <mhiramat@kernel.org>
Cc: Mathieu Poirier <mathieu.poirier@linaro.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Steven Rostedt (VMware) <rostedt@goodmis.org>
Cc: x86@kernel.org
Link: http://lore.kernel.org/lkml/20200512121922.8997-14-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2020-05-12 20:19:20 +08:00
|
|
|
|
2023-06-09 07:28:03 +08:00
|
|
|
addr_location__init(&al);
|
perf intel-pt: Add support for text poke events
Select text poke events when available and the kernel is being traced.
Process text poke events to invalidate entries in Intel PT's instruction
cache.
Example:
The example requires kernel config:
CONFIG_PROC_SYSCTL=y
CONFIG_SCHED_DEBUG=y
CONFIG_SCHEDSTATS=y
Before:
# perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 3.341 MB perf.data.before ]
[1]+ Terminated perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.before --itrace=e >/dev/null
Warning:
474 instruction trace errors
After:
# perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 2.646 MB perf.data.after ]
[1]+ Terminated perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.after --itrace=e >/dev/null
Example:
The example requires kernel config:
# CONFIG_FUNCTION_TRACER is not set
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.026 MB perf.data (68 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.268 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
207 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.028 MB perf.data (107 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 39.978 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
6 565303693547 0x291f18 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027a000 len 4096 type 2 flags 0x0 name kprobe_insn_page
6 565303697010 0x291f68 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 0 new len 6
6 565303838278 0x291fa8 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027c000 len 4096 type 2 flags 0x0 name kprobe_optinsn_page
6 565303848286 0x291ff8 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 0 new len 106
6 565369336743 0x292af8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
7 566434327704 0x217c208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
6 566456313475 0x293198 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 106 new len 0
6 566456314935 0x293238 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 6 new len 0
Example:
The example requires kernel config:
CONFIG_FUNCTION_TRACER=y
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.022 MB perf.data (6 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 2 times to write data ]
[ perf record: Captured and wrote 43.850 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
8 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.037 MB perf.data (206 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.442 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
5 312216133258 0x8bafe0 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc0360000 len 415 type 2 flags 0x0 name ftrace_trampoline
5 312216133494 0x8bb030 [0x1d8]: PERF_RECORD_TEXT_POKE addr 0xffffffffc0360000 old len 0 new len 415
5 312216229563 0x8bb208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216239063 0x8bb248 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
5 312216727230 0x8bb288 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
5 312216739322 0x8bb2c8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216748321 0x8bb308 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287163462 0x2817430 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287174890 0x2817470 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287818979 0x28174b0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
7 313287829357 0x28174f0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287841246 0x2817530 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Masami Hiramatsu <mhiramat@kernel.org>
Cc: Mathieu Poirier <mathieu.poirier@linaro.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Steven Rostedt (VMware) <rostedt@goodmis.org>
Cc: x86@kernel.org
Link: http://lore.kernel.org/lkml/20200512121922.8997-14-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2020-05-12 20:19:20 +08:00
|
|
|
if (!event->text_poke.new_len)
|
2023-06-09 07:28:03 +08:00
|
|
|
goto out;
|
perf intel-pt: Add support for text poke events
Select text poke events when available and the kernel is being traced.
Process text poke events to invalidate entries in Intel PT's instruction
cache.
Example:
The example requires kernel config:
CONFIG_PROC_SYSCTL=y
CONFIG_SCHED_DEBUG=y
CONFIG_SCHEDSTATS=y
Before:
# perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 3.341 MB perf.data.before ]
[1]+ Terminated perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.before --itrace=e >/dev/null
Warning:
474 instruction trace errors
After:
# perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 2.646 MB perf.data.after ]
[1]+ Terminated perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.after --itrace=e >/dev/null
Example:
The example requires kernel config:
# CONFIG_FUNCTION_TRACER is not set
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.026 MB perf.data (68 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.268 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
207 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.028 MB perf.data (107 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 39.978 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
6 565303693547 0x291f18 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027a000 len 4096 type 2 flags 0x0 name kprobe_insn_page
6 565303697010 0x291f68 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 0 new len 6
6 565303838278 0x291fa8 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027c000 len 4096 type 2 flags 0x0 name kprobe_optinsn_page
6 565303848286 0x291ff8 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 0 new len 106
6 565369336743 0x292af8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
7 566434327704 0x217c208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
6 566456313475 0x293198 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 106 new len 0
6 566456314935 0x293238 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 6 new len 0
Example:
The example requires kernel config:
CONFIG_FUNCTION_TRACER=y
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.022 MB perf.data (6 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 2 times to write data ]
[ perf record: Captured and wrote 43.850 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
8 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.037 MB perf.data (206 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.442 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
5 312216133258 0x8bafe0 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc0360000 len 415 type 2 flags 0x0 name ftrace_trampoline
5 312216133494 0x8bb030 [0x1d8]: PERF_RECORD_TEXT_POKE addr 0xffffffffc0360000 old len 0 new len 415
5 312216229563 0x8bb208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216239063 0x8bb248 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
5 312216727230 0x8bb288 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
5 312216739322 0x8bb2c8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216748321 0x8bb308 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287163462 0x2817430 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287174890 0x2817470 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287818979 0x28174b0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
7 313287829357 0x28174f0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287841246 0x2817530 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Masami Hiramatsu <mhiramat@kernel.org>
Cc: Mathieu Poirier <mathieu.poirier@linaro.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Steven Rostedt (VMware) <rostedt@goodmis.org>
Cc: x86@kernel.org
Link: http://lore.kernel.org/lkml/20200512121922.8997-14-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2020-05-12 20:19:20 +08:00
|
|
|
|
|
|
|
for (; cnt; cnt--, addr--) {
|
2023-03-21 05:22:35 +08:00
|
|
|
struct dso *dso;
|
|
|
|
|
perf intel-pt: Add support for text poke events
Select text poke events when available and the kernel is being traced.
Process text poke events to invalidate entries in Intel PT's instruction
cache.
Example:
The example requires kernel config:
CONFIG_PROC_SYSCTL=y
CONFIG_SCHED_DEBUG=y
CONFIG_SCHEDSTATS=y
Before:
# perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 3.341 MB perf.data.before ]
[1]+ Terminated perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.before --itrace=e >/dev/null
Warning:
474 instruction trace errors
After:
# perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 2.646 MB perf.data.after ]
[1]+ Terminated perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.after --itrace=e >/dev/null
Example:
The example requires kernel config:
# CONFIG_FUNCTION_TRACER is not set
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.026 MB perf.data (68 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.268 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
207 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.028 MB perf.data (107 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 39.978 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
6 565303693547 0x291f18 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027a000 len 4096 type 2 flags 0x0 name kprobe_insn_page
6 565303697010 0x291f68 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 0 new len 6
6 565303838278 0x291fa8 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027c000 len 4096 type 2 flags 0x0 name kprobe_optinsn_page
6 565303848286 0x291ff8 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 0 new len 106
6 565369336743 0x292af8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
7 566434327704 0x217c208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
6 566456313475 0x293198 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 106 new len 0
6 566456314935 0x293238 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 6 new len 0
Example:
The example requires kernel config:
CONFIG_FUNCTION_TRACER=y
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.022 MB perf.data (6 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 2 times to write data ]
[ perf record: Captured and wrote 43.850 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
8 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.037 MB perf.data (206 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.442 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
5 312216133258 0x8bafe0 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc0360000 len 415 type 2 flags 0x0 name ftrace_trampoline
5 312216133494 0x8bb030 [0x1d8]: PERF_RECORD_TEXT_POKE addr 0xffffffffc0360000 old len 0 new len 415
5 312216229563 0x8bb208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216239063 0x8bb248 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
5 312216727230 0x8bb288 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
5 312216739322 0x8bb2c8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216748321 0x8bb308 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287163462 0x2817430 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287174890 0x2817470 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287818979 0x28174b0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
7 313287829357 0x28174f0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287841246 0x2817530 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Masami Hiramatsu <mhiramat@kernel.org>
Cc: Mathieu Poirier <mathieu.poirier@linaro.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Steven Rostedt (VMware) <rostedt@goodmis.org>
Cc: x86@kernel.org
Link: http://lore.kernel.org/lkml/20200512121922.8997-14-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2020-05-12 20:19:20 +08:00
|
|
|
if (intel_pt_find_map(thread, cpumode, addr, &al)) {
|
|
|
|
if (addr < event->text_poke.addr)
|
2023-06-09 07:28:03 +08:00
|
|
|
goto out;
|
perf intel-pt: Add support for text poke events
Select text poke events when available and the kernel is being traced.
Process text poke events to invalidate entries in Intel PT's instruction
cache.
Example:
The example requires kernel config:
CONFIG_PROC_SYSCTL=y
CONFIG_SCHED_DEBUG=y
CONFIG_SCHEDSTATS=y
Before:
# perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 3.341 MB perf.data.before ]
[1]+ Terminated perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.before --itrace=e >/dev/null
Warning:
474 instruction trace errors
After:
# perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 2.646 MB perf.data.after ]
[1]+ Terminated perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.after --itrace=e >/dev/null
Example:
The example requires kernel config:
# CONFIG_FUNCTION_TRACER is not set
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.026 MB perf.data (68 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.268 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
207 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.028 MB perf.data (107 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 39.978 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
6 565303693547 0x291f18 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027a000 len 4096 type 2 flags 0x0 name kprobe_insn_page
6 565303697010 0x291f68 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 0 new len 6
6 565303838278 0x291fa8 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027c000 len 4096 type 2 flags 0x0 name kprobe_optinsn_page
6 565303848286 0x291ff8 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 0 new len 106
6 565369336743 0x292af8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
7 566434327704 0x217c208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
6 566456313475 0x293198 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 106 new len 0
6 566456314935 0x293238 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 6 new len 0
Example:
The example requires kernel config:
CONFIG_FUNCTION_TRACER=y
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.022 MB perf.data (6 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 2 times to write data ]
[ perf record: Captured and wrote 43.850 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
8 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.037 MB perf.data (206 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.442 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
5 312216133258 0x8bafe0 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc0360000 len 415 type 2 flags 0x0 name ftrace_trampoline
5 312216133494 0x8bb030 [0x1d8]: PERF_RECORD_TEXT_POKE addr 0xffffffffc0360000 old len 0 new len 415
5 312216229563 0x8bb208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216239063 0x8bb248 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
5 312216727230 0x8bb288 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
5 312216739322 0x8bb2c8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216748321 0x8bb308 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287163462 0x2817430 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287174890 0x2817470 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287818979 0x28174b0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
7 313287829357 0x28174f0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287841246 0x2817530 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Masami Hiramatsu <mhiramat@kernel.org>
Cc: Mathieu Poirier <mathieu.poirier@linaro.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Steven Rostedt (VMware) <rostedt@goodmis.org>
Cc: x86@kernel.org
Link: http://lore.kernel.org/lkml/20200512121922.8997-14-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2020-05-12 20:19:20 +08:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2023-03-21 05:22:35 +08:00
|
|
|
dso = map__dso(al.map);
|
|
|
|
if (!dso || !dso->auxtrace_cache)
|
perf intel-pt: Add support for text poke events
Select text poke events when available and the kernel is being traced.
Process text poke events to invalidate entries in Intel PT's instruction
cache.
Example:
The example requires kernel config:
CONFIG_PROC_SYSCTL=y
CONFIG_SCHED_DEBUG=y
CONFIG_SCHEDSTATS=y
Before:
# perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 3.341 MB perf.data.before ]
[1]+ Terminated perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.before --itrace=e >/dev/null
Warning:
474 instruction trace errors
After:
# perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 2.646 MB perf.data.after ]
[1]+ Terminated perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.after --itrace=e >/dev/null
Example:
The example requires kernel config:
# CONFIG_FUNCTION_TRACER is not set
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.026 MB perf.data (68 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.268 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
207 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.028 MB perf.data (107 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 39.978 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
6 565303693547 0x291f18 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027a000 len 4096 type 2 flags 0x0 name kprobe_insn_page
6 565303697010 0x291f68 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 0 new len 6
6 565303838278 0x291fa8 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027c000 len 4096 type 2 flags 0x0 name kprobe_optinsn_page
6 565303848286 0x291ff8 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 0 new len 106
6 565369336743 0x292af8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
7 566434327704 0x217c208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
6 566456313475 0x293198 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 106 new len 0
6 566456314935 0x293238 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 6 new len 0
Example:
The example requires kernel config:
CONFIG_FUNCTION_TRACER=y
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.022 MB perf.data (6 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 2 times to write data ]
[ perf record: Captured and wrote 43.850 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
8 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.037 MB perf.data (206 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.442 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
5 312216133258 0x8bafe0 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc0360000 len 415 type 2 flags 0x0 name ftrace_trampoline
5 312216133494 0x8bb030 [0x1d8]: PERF_RECORD_TEXT_POKE addr 0xffffffffc0360000 old len 0 new len 415
5 312216229563 0x8bb208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216239063 0x8bb248 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
5 312216727230 0x8bb288 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
5 312216739322 0x8bb2c8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216748321 0x8bb308 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287163462 0x2817430 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287174890 0x2817470 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287818979 0x28174b0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
7 313287829357 0x28174f0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287841246 0x2817530 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Masami Hiramatsu <mhiramat@kernel.org>
Cc: Mathieu Poirier <mathieu.poirier@linaro.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Steven Rostedt (VMware) <rostedt@goodmis.org>
Cc: x86@kernel.org
Link: http://lore.kernel.org/lkml/20200512121922.8997-14-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2020-05-12 20:19:20 +08:00
|
|
|
continue;
|
|
|
|
|
2023-04-05 04:59:44 +08:00
|
|
|
offset = map__map_ip(al.map, addr);
|
perf intel-pt: Add support for text poke events
Select text poke events when available and the kernel is being traced.
Process text poke events to invalidate entries in Intel PT's instruction
cache.
Example:
The example requires kernel config:
CONFIG_PROC_SYSCTL=y
CONFIG_SCHED_DEBUG=y
CONFIG_SCHEDSTATS=y
Before:
# perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 3.341 MB perf.data.before ]
[1]+ Terminated perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.before --itrace=e >/dev/null
Warning:
474 instruction trace errors
After:
# perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 2.646 MB perf.data.after ]
[1]+ Terminated perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.after --itrace=e >/dev/null
Example:
The example requires kernel config:
# CONFIG_FUNCTION_TRACER is not set
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.026 MB perf.data (68 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.268 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
207 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.028 MB perf.data (107 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 39.978 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
6 565303693547 0x291f18 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027a000 len 4096 type 2 flags 0x0 name kprobe_insn_page
6 565303697010 0x291f68 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 0 new len 6
6 565303838278 0x291fa8 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027c000 len 4096 type 2 flags 0x0 name kprobe_optinsn_page
6 565303848286 0x291ff8 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 0 new len 106
6 565369336743 0x292af8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
7 566434327704 0x217c208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
6 566456313475 0x293198 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 106 new len 0
6 566456314935 0x293238 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 6 new len 0
Example:
The example requires kernel config:
CONFIG_FUNCTION_TRACER=y
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.022 MB perf.data (6 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 2 times to write data ]
[ perf record: Captured and wrote 43.850 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
8 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.037 MB perf.data (206 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.442 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
5 312216133258 0x8bafe0 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc0360000 len 415 type 2 flags 0x0 name ftrace_trampoline
5 312216133494 0x8bb030 [0x1d8]: PERF_RECORD_TEXT_POKE addr 0xffffffffc0360000 old len 0 new len 415
5 312216229563 0x8bb208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216239063 0x8bb248 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
5 312216727230 0x8bb288 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
5 312216739322 0x8bb2c8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216748321 0x8bb308 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287163462 0x2817430 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287174890 0x2817470 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287818979 0x28174b0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
7 313287829357 0x28174f0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287841246 0x2817530 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Masami Hiramatsu <mhiramat@kernel.org>
Cc: Mathieu Poirier <mathieu.poirier@linaro.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Steven Rostedt (VMware) <rostedt@goodmis.org>
Cc: x86@kernel.org
Link: http://lore.kernel.org/lkml/20200512121922.8997-14-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2020-05-12 20:19:20 +08:00
|
|
|
|
2023-03-21 05:22:35 +08:00
|
|
|
e = intel_pt_cache_lookup(dso, machine, offset);
|
perf intel-pt: Add support for text poke events
Select text poke events when available and the kernel is being traced.
Process text poke events to invalidate entries in Intel PT's instruction
cache.
Example:
The example requires kernel config:
CONFIG_PROC_SYSCTL=y
CONFIG_SCHED_DEBUG=y
CONFIG_SCHEDSTATS=y
Before:
# perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 3.341 MB perf.data.before ]
[1]+ Terminated perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.before --itrace=e >/dev/null
Warning:
474 instruction trace errors
After:
# perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 2.646 MB perf.data.after ]
[1]+ Terminated perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.after --itrace=e >/dev/null
Example:
The example requires kernel config:
# CONFIG_FUNCTION_TRACER is not set
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.026 MB perf.data (68 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.268 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
207 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.028 MB perf.data (107 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 39.978 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
6 565303693547 0x291f18 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027a000 len 4096 type 2 flags 0x0 name kprobe_insn_page
6 565303697010 0x291f68 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 0 new len 6
6 565303838278 0x291fa8 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027c000 len 4096 type 2 flags 0x0 name kprobe_optinsn_page
6 565303848286 0x291ff8 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 0 new len 106
6 565369336743 0x292af8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
7 566434327704 0x217c208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
6 566456313475 0x293198 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 106 new len 0
6 566456314935 0x293238 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 6 new len 0
Example:
The example requires kernel config:
CONFIG_FUNCTION_TRACER=y
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.022 MB perf.data (6 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 2 times to write data ]
[ perf record: Captured and wrote 43.850 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
8 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.037 MB perf.data (206 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.442 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
5 312216133258 0x8bafe0 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc0360000 len 415 type 2 flags 0x0 name ftrace_trampoline
5 312216133494 0x8bb030 [0x1d8]: PERF_RECORD_TEXT_POKE addr 0xffffffffc0360000 old len 0 new len 415
5 312216229563 0x8bb208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216239063 0x8bb248 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
5 312216727230 0x8bb288 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
5 312216739322 0x8bb2c8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216748321 0x8bb308 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287163462 0x2817430 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287174890 0x2817470 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287818979 0x28174b0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
7 313287829357 0x28174f0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287841246 0x2817530 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Masami Hiramatsu <mhiramat@kernel.org>
Cc: Mathieu Poirier <mathieu.poirier@linaro.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Steven Rostedt (VMware) <rostedt@goodmis.org>
Cc: x86@kernel.org
Link: http://lore.kernel.org/lkml/20200512121922.8997-14-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2020-05-12 20:19:20 +08:00
|
|
|
if (!e)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (addr + e->byte_cnt + e->length <= event->text_poke.addr) {
|
|
|
|
/*
|
|
|
|
* No overlap. Working backwards there cannot be another
|
|
|
|
* basic block that overlaps the text poke if there is a
|
|
|
|
* branch instruction before the text poke address.
|
|
|
|
*/
|
|
|
|
if (e->branch != INTEL_PT_BR_NO_BRANCH)
|
2023-06-09 07:28:03 +08:00
|
|
|
goto out;
|
perf intel-pt: Add support for text poke events
Select text poke events when available and the kernel is being traced.
Process text poke events to invalidate entries in Intel PT's instruction
cache.
Example:
The example requires kernel config:
CONFIG_PROC_SYSCTL=y
CONFIG_SCHED_DEBUG=y
CONFIG_SCHEDSTATS=y
Before:
# perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 3.341 MB perf.data.before ]
[1]+ Terminated perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.before --itrace=e >/dev/null
Warning:
474 instruction trace errors
After:
# perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 2.646 MB perf.data.after ]
[1]+ Terminated perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.after --itrace=e >/dev/null
Example:
The example requires kernel config:
# CONFIG_FUNCTION_TRACER is not set
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.026 MB perf.data (68 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.268 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
207 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.028 MB perf.data (107 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 39.978 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
6 565303693547 0x291f18 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027a000 len 4096 type 2 flags 0x0 name kprobe_insn_page
6 565303697010 0x291f68 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 0 new len 6
6 565303838278 0x291fa8 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027c000 len 4096 type 2 flags 0x0 name kprobe_optinsn_page
6 565303848286 0x291ff8 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 0 new len 106
6 565369336743 0x292af8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
7 566434327704 0x217c208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
6 566456313475 0x293198 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 106 new len 0
6 566456314935 0x293238 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 6 new len 0
Example:
The example requires kernel config:
CONFIG_FUNCTION_TRACER=y
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.022 MB perf.data (6 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 2 times to write data ]
[ perf record: Captured and wrote 43.850 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
8 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.037 MB perf.data (206 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.442 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
5 312216133258 0x8bafe0 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc0360000 len 415 type 2 flags 0x0 name ftrace_trampoline
5 312216133494 0x8bb030 [0x1d8]: PERF_RECORD_TEXT_POKE addr 0xffffffffc0360000 old len 0 new len 415
5 312216229563 0x8bb208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216239063 0x8bb248 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
5 312216727230 0x8bb288 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
5 312216739322 0x8bb2c8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216748321 0x8bb308 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287163462 0x2817430 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287174890 0x2817470 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287818979 0x28174b0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
7 313287829357 0x28174f0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287841246 0x2817530 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Masami Hiramatsu <mhiramat@kernel.org>
Cc: Mathieu Poirier <mathieu.poirier@linaro.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Steven Rostedt (VMware) <rostedt@goodmis.org>
Cc: x86@kernel.org
Link: http://lore.kernel.org/lkml/20200512121922.8997-14-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2020-05-12 20:19:20 +08:00
|
|
|
} else {
|
2023-03-21 05:22:35 +08:00
|
|
|
intel_pt_cache_invalidate(dso, machine, offset);
|
perf intel-pt: Add support for text poke events
Select text poke events when available and the kernel is being traced.
Process text poke events to invalidate entries in Intel PT's instruction
cache.
Example:
The example requires kernel config:
CONFIG_PROC_SYSCTL=y
CONFIG_SCHED_DEBUG=y
CONFIG_SCHEDSTATS=y
Before:
# perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 3.341 MB perf.data.before ]
[1]+ Terminated perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.before --itrace=e >/dev/null
Warning:
474 instruction trace errors
After:
# perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 2.646 MB perf.data.after ]
[1]+ Terminated perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.after --itrace=e >/dev/null
Example:
The example requires kernel config:
# CONFIG_FUNCTION_TRACER is not set
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.026 MB perf.data (68 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.268 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
207 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.028 MB perf.data (107 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 39.978 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
6 565303693547 0x291f18 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027a000 len 4096 type 2 flags 0x0 name kprobe_insn_page
6 565303697010 0x291f68 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 0 new len 6
6 565303838278 0x291fa8 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027c000 len 4096 type 2 flags 0x0 name kprobe_optinsn_page
6 565303848286 0x291ff8 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 0 new len 106
6 565369336743 0x292af8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
7 566434327704 0x217c208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
6 566456313475 0x293198 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 106 new len 0
6 566456314935 0x293238 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 6 new len 0
Example:
The example requires kernel config:
CONFIG_FUNCTION_TRACER=y
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.022 MB perf.data (6 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 2 times to write data ]
[ perf record: Captured and wrote 43.850 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
8 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.037 MB perf.data (206 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.442 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
5 312216133258 0x8bafe0 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc0360000 len 415 type 2 flags 0x0 name ftrace_trampoline
5 312216133494 0x8bb030 [0x1d8]: PERF_RECORD_TEXT_POKE addr 0xffffffffc0360000 old len 0 new len 415
5 312216229563 0x8bb208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216239063 0x8bb248 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
5 312216727230 0x8bb288 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
5 312216739322 0x8bb2c8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216748321 0x8bb308 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287163462 0x2817430 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287174890 0x2817470 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287818979 0x28174b0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
7 313287829357 0x28174f0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287841246 0x2817530 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Masami Hiramatsu <mhiramat@kernel.org>
Cc: Mathieu Poirier <mathieu.poirier@linaro.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Steven Rostedt (VMware) <rostedt@goodmis.org>
Cc: x86@kernel.org
Link: http://lore.kernel.org/lkml/20200512121922.8997-14-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2020-05-12 20:19:20 +08:00
|
|
|
intel_pt_log("Invalidated instruction cache for %s at %#"PRIx64"\n",
|
2023-03-21 05:22:35 +08:00
|
|
|
dso->long_name, addr);
|
perf intel-pt: Add support for text poke events
Select text poke events when available and the kernel is being traced.
Process text poke events to invalidate entries in Intel PT's instruction
cache.
Example:
The example requires kernel config:
CONFIG_PROC_SYSCTL=y
CONFIG_SCHED_DEBUG=y
CONFIG_SCHEDSTATS=y
Before:
# perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 3.341 MB perf.data.before ]
[1]+ Terminated perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.before --itrace=e >/dev/null
Warning:
474 instruction trace errors
After:
# perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 2.646 MB perf.data.after ]
[1]+ Terminated perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.after --itrace=e >/dev/null
Example:
The example requires kernel config:
# CONFIG_FUNCTION_TRACER is not set
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.026 MB perf.data (68 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.268 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
207 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.028 MB perf.data (107 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 39.978 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
6 565303693547 0x291f18 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027a000 len 4096 type 2 flags 0x0 name kprobe_insn_page
6 565303697010 0x291f68 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 0 new len 6
6 565303838278 0x291fa8 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027c000 len 4096 type 2 flags 0x0 name kprobe_optinsn_page
6 565303848286 0x291ff8 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 0 new len 106
6 565369336743 0x292af8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
7 566434327704 0x217c208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
6 566456313475 0x293198 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 106 new len 0
6 566456314935 0x293238 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 6 new len 0
Example:
The example requires kernel config:
CONFIG_FUNCTION_TRACER=y
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.022 MB perf.data (6 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 2 times to write data ]
[ perf record: Captured and wrote 43.850 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
8 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.037 MB perf.data (206 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.442 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
5 312216133258 0x8bafe0 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc0360000 len 415 type 2 flags 0x0 name ftrace_trampoline
5 312216133494 0x8bb030 [0x1d8]: PERF_RECORD_TEXT_POKE addr 0xffffffffc0360000 old len 0 new len 415
5 312216229563 0x8bb208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216239063 0x8bb248 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
5 312216727230 0x8bb288 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
5 312216739322 0x8bb2c8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216748321 0x8bb308 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287163462 0x2817430 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287174890 0x2817470 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287818979 0x28174b0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
7 313287829357 0x28174f0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287841246 0x2817530 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Masami Hiramatsu <mhiramat@kernel.org>
Cc: Mathieu Poirier <mathieu.poirier@linaro.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Steven Rostedt (VMware) <rostedt@goodmis.org>
Cc: x86@kernel.org
Link: http://lore.kernel.org/lkml/20200512121922.8997-14-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2020-05-12 20:19:20 +08:00
|
|
|
}
|
|
|
|
}
|
2023-06-09 07:28:03 +08:00
|
|
|
out:
|
|
|
|
addr_location__exit(&al);
|
|
|
|
return ret;
|
perf intel-pt: Add support for text poke events
Select text poke events when available and the kernel is being traced.
Process text poke events to invalidate entries in Intel PT's instruction
cache.
Example:
The example requires kernel config:
CONFIG_PROC_SYSCTL=y
CONFIG_SCHED_DEBUG=y
CONFIG_SCHEDSTATS=y
Before:
# perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 3.341 MB perf.data.before ]
[1]+ Terminated perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.before --itrace=e >/dev/null
Warning:
474 instruction trace errors
After:
# perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 2.646 MB perf.data.after ]
[1]+ Terminated perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.after --itrace=e >/dev/null
Example:
The example requires kernel config:
# CONFIG_FUNCTION_TRACER is not set
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.026 MB perf.data (68 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.268 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
207 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.028 MB perf.data (107 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 39.978 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
6 565303693547 0x291f18 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027a000 len 4096 type 2 flags 0x0 name kprobe_insn_page
6 565303697010 0x291f68 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 0 new len 6
6 565303838278 0x291fa8 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027c000 len 4096 type 2 flags 0x0 name kprobe_optinsn_page
6 565303848286 0x291ff8 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 0 new len 106
6 565369336743 0x292af8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
7 566434327704 0x217c208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
6 566456313475 0x293198 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 106 new len 0
6 566456314935 0x293238 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 6 new len 0
Example:
The example requires kernel config:
CONFIG_FUNCTION_TRACER=y
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.022 MB perf.data (6 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 2 times to write data ]
[ perf record: Captured and wrote 43.850 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
8 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.037 MB perf.data (206 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.442 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
5 312216133258 0x8bafe0 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc0360000 len 415 type 2 flags 0x0 name ftrace_trampoline
5 312216133494 0x8bb030 [0x1d8]: PERF_RECORD_TEXT_POKE addr 0xffffffffc0360000 old len 0 new len 415
5 312216229563 0x8bb208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216239063 0x8bb248 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
5 312216727230 0x8bb288 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
5 312216739322 0x8bb2c8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216748321 0x8bb308 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287163462 0x2817430 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287174890 0x2817470 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287818979 0x28174b0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
7 313287829357 0x28174f0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287841246 0x2817530 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Masami Hiramatsu <mhiramat@kernel.org>
Cc: Mathieu Poirier <mathieu.poirier@linaro.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Steven Rostedt (VMware) <rostedt@goodmis.org>
Cc: x86@kernel.org
Link: http://lore.kernel.org/lkml/20200512121922.8997-14-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2020-05-12 20:19:20 +08:00
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
static int intel_pt_process_event(struct perf_session *session,
|
|
|
|
union perf_event *event,
|
|
|
|
struct perf_sample *sample,
|
|
|
|
struct perf_tool *tool)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = container_of(session->auxtrace, struct intel_pt,
|
|
|
|
auxtrace);
|
|
|
|
u64 timestamp;
|
|
|
|
int err = 0;
|
|
|
|
|
|
|
|
if (dump_trace)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (!tool->ordered_events) {
|
|
|
|
pr_err("Intel Processor Trace requires ordered events\n");
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2015-08-20 16:51:32 +08:00
|
|
|
if (sample->time && sample->time != (u64)-1)
|
2015-07-18 00:33:41 +08:00
|
|
|
timestamp = perf_time_to_tsc(sample->time, &pt->tc);
|
|
|
|
else
|
|
|
|
timestamp = 0;
|
|
|
|
|
|
|
|
if (timestamp || pt->timeless_decoding) {
|
|
|
|
err = intel_pt_update_queues(pt);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pt->timeless_decoding) {
|
2019-11-15 20:42:24 +08:00
|
|
|
if (pt->sampling_mode) {
|
|
|
|
if (sample->aux_sample.size)
|
|
|
|
err = intel_pt_process_timeless_sample(pt,
|
|
|
|
sample);
|
|
|
|
} else if (event->header.type == PERF_RECORD_EXIT) {
|
2015-07-18 00:33:41 +08:00
|
|
|
err = intel_pt_process_timeless_queues(pt,
|
2015-08-18 17:07:05 +08:00
|
|
|
event->fork.tid,
|
2015-07-18 00:33:41 +08:00
|
|
|
sample->time);
|
|
|
|
}
|
|
|
|
} else if (timestamp) {
|
2021-04-30 15:03:06 +08:00
|
|
|
if (!pt->first_timestamp)
|
|
|
|
intel_pt_first_timestamp(pt, timestamp);
|
2015-07-18 00:33:41 +08:00
|
|
|
err = intel_pt_process_queues(pt, timestamp);
|
|
|
|
}
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
2020-04-01 18:16:08 +08:00
|
|
|
if (event->header.type == PERF_RECORD_SAMPLE) {
|
|
|
|
if (pt->synth_opts.add_callchain && !sample->callchain)
|
|
|
|
intel_pt_add_callchain(pt, sample);
|
2020-04-29 23:07:49 +08:00
|
|
|
if (pt->synth_opts.add_last_branch && !sample->branch_stack)
|
|
|
|
intel_pt_add_br_stack(pt, sample);
|
2020-04-01 18:16:08 +08:00
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
if (event->header.type == PERF_RECORD_AUX &&
|
|
|
|
(event->aux.flags & PERF_AUX_FLAG_TRUNCATED) &&
|
|
|
|
pt->synth_opts.errors) {
|
|
|
|
err = intel_pt_lost(pt, sample);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
perf build: Use libtraceevent from the system
Remove the LIBTRACEEVENT_DYNAMIC and LIBTRACEFS_DYNAMIC make command
line variables.
If libtraceevent isn't installed or NO_LIBTRACEEVENT=1 is passed to the
build, don't compile in libtraceevent and libtracefs support.
This also disables CONFIG_TRACE that controls "perf trace".
CONFIG_LIBTRACEEVENT is used to control enablement in Build/Makefiles,
HAVE_LIBTRACEEVENT is used in C code.
Without HAVE_LIBTRACEEVENT tracepoints are disabled and as such the
commands kmem, kwork, lock, sched and timechart are removed. The
majority of commands continue to work including "perf test".
Committer notes:
Fixed up a tools/perf/util/Build reject and added:
#include <traceevent/event-parse.h>
to tools/perf/util/scripting-engines/trace-event-perl.c.
Committer testing:
$ rpm -qi libtraceevent-devel
Name : libtraceevent-devel
Version : 1.5.3
Release : 2.fc36
Architecture: x86_64
Install Date: Mon 25 Jul 2022 03:20:19 PM -03
Group : Unspecified
Size : 27728
License : LGPLv2+ and GPLv2+
Signature : RSA/SHA256, Fri 15 Apr 2022 02:11:58 PM -03, Key ID 999f7cbf38ab71f4
Source RPM : libtraceevent-1.5.3-2.fc36.src.rpm
Build Date : Fri 15 Apr 2022 10:57:01 AM -03
Build Host : buildvm-x86-05.iad2.fedoraproject.org
Packager : Fedora Project
Vendor : Fedora Project
URL : https://git.kernel.org/pub/scm/libs/libtrace/libtraceevent.git/
Bug URL : https://bugz.fedoraproject.org/libtraceevent
Summary : Development headers of libtraceevent
Description :
Development headers of libtraceevent-libs
$
Default build:
$ ldd ~/bin/perf | grep tracee
libtraceevent.so.1 => /lib64/libtraceevent.so.1 (0x00007f1dcaf8f000)
$
# perf trace -e sched:* --max-events 10
0.000 migration/0/17 sched:sched_migrate_task(comm: "", pid: 1603763 (perf), prio: 120, dest_cpu: 1)
0.005 migration/0/17 sched:sched_wake_idle_without_ipi(cpu: 1)
0.011 migration/0/17 sched:sched_switch(prev_comm: "", prev_pid: 17 (migration/0), prev_state: 1, next_comm: "", next_prio: 120)
1.173 :0/0 sched:sched_wakeup(comm: "", pid: 3138 (gnome-terminal-), prio: 120)
1.180 :0/0 sched:sched_switch(prev_comm: "", prev_prio: 120, next_comm: "", next_pid: 3138 (gnome-terminal-), next_prio: 120)
0.156 migration/1/21 sched:sched_migrate_task(comm: "", pid: 1603763 (perf), prio: 120, orig_cpu: 1, dest_cpu: 2)
0.160 migration/1/21 sched:sched_wake_idle_without_ipi(cpu: 2)
0.166 migration/1/21 sched:sched_switch(prev_comm: "", prev_pid: 21 (migration/1), prev_state: 1, next_comm: "", next_prio: 120)
1.183 :0/0 sched:sched_wakeup(comm: "", pid: 1602985 (kworker/u16:0-f), prio: 120, target_cpu: 1)
1.186 :0/0 sched:sched_switch(prev_comm: "", prev_prio: 120, next_comm: "", next_pid: 1602985 (kworker/u16:0-f), next_prio: 120)
#
Had to tweak tools/perf/util/setup.py to make sure the python binding
shared object links with libtraceevent if -DHAVE_LIBTRACEEVENT is
present in CFLAGS.
Building with NO_LIBTRACEEVENT=1 uncovered some more build failures:
- Make building of data-convert-bt.c to CONFIG_LIBTRACEEVENT=y
- perf-$(CONFIG_LIBTRACEEVENT) += scripts/
- bpf_kwork.o needs also to be dependent on CONFIG_LIBTRACEEVENT=y
- The python binding needed some fixups and util/trace-event.c can't be
built and linked with the python binding shared object, so remove it
in tools/perf/util/setup.py and exclude it from the list of
dependencies in the python/perf.so Makefile.perf target.
Building without libtraceevent-devel installed uncovered more build
failures:
- The python binding tools/perf/util/python.c was assuming that
traceevent/parse-events.h was always available, which was the case
when we defaulted to using the in-kernel tools/lib/traceevent/ files,
now we need to enclose it under ifdef HAVE_LIBTRACEEVENT, just like
the other parts of it that deal with tracepoints.
- We have to ifdef the rules in the Build files with
CONFIG_LIBTRACEEVENT=y to build builtin-trace.c and
tools/perf/trace/beauty/ as we only ifdef setting CONFIG_TRACE=y when
setting NO_LIBTRACEEVENT=1 in the make command line, not when we don't
detect libtraceevent-devel installed in the system. Simplification here
to avoid these two ways of disabling builtin-trace.c and not having
CONFIG_TRACE=y when libtraceevent-devel isn't installed is the clean
way.
From Athira:
<quote>
tools/perf/arch/powerpc/util/Build
-perf-y += kvm-stat.o
+perf-$(CONFIG_LIBTRACEEVENT) += kvm-stat.o
</quote>
Then, ditto for arm64 and s390, detected by container cross build tests.
- s/390 uses test__checkevent_tracepoint() that is now only available if
HAVE_LIBTRACEEVENT is defined, enclose the callsite with ifder HAVE_LIBTRACEEVENT.
Also from Athira:
<quote>
With this change, I could successfully compile in these environment:
- Without libtraceevent-devel installed
- With libtraceevent-devel installed
- With “make NO_LIBTRACEEVENT=1”
</quote>
Then, finally rename CONFIG_TRACEEVENT to CONFIG_LIBTRACEEVENT for
consistency with other libraries detected in tools/perf/.
Signed-off-by: Ian Rogers <irogers@google.com>
Tested-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Tested-by: Athira Rajeev <atrajeev@linux.vnet.ibm.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Nick Desaulniers <ndesaulniers@google.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Stephane Eranian <eranian@google.com>
Cc: bpf@vger.kernel.org
Link: http://lore.kernel.org/lkml/20221205225940.3079667-3-irogers@google.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2022-12-06 06:59:39 +08:00
|
|
|
#ifdef HAVE_LIBTRACEEVENT
|
2015-07-18 00:33:41 +08:00
|
|
|
if (pt->switch_evsel && event->header.type == PERF_RECORD_SAMPLE)
|
|
|
|
err = intel_pt_process_switch(pt, sample);
|
perf build: Use libtraceevent from the system
Remove the LIBTRACEEVENT_DYNAMIC and LIBTRACEFS_DYNAMIC make command
line variables.
If libtraceevent isn't installed or NO_LIBTRACEEVENT=1 is passed to the
build, don't compile in libtraceevent and libtracefs support.
This also disables CONFIG_TRACE that controls "perf trace".
CONFIG_LIBTRACEEVENT is used to control enablement in Build/Makefiles,
HAVE_LIBTRACEEVENT is used in C code.
Without HAVE_LIBTRACEEVENT tracepoints are disabled and as such the
commands kmem, kwork, lock, sched and timechart are removed. The
majority of commands continue to work including "perf test".
Committer notes:
Fixed up a tools/perf/util/Build reject and added:
#include <traceevent/event-parse.h>
to tools/perf/util/scripting-engines/trace-event-perl.c.
Committer testing:
$ rpm -qi libtraceevent-devel
Name : libtraceevent-devel
Version : 1.5.3
Release : 2.fc36
Architecture: x86_64
Install Date: Mon 25 Jul 2022 03:20:19 PM -03
Group : Unspecified
Size : 27728
License : LGPLv2+ and GPLv2+
Signature : RSA/SHA256, Fri 15 Apr 2022 02:11:58 PM -03, Key ID 999f7cbf38ab71f4
Source RPM : libtraceevent-1.5.3-2.fc36.src.rpm
Build Date : Fri 15 Apr 2022 10:57:01 AM -03
Build Host : buildvm-x86-05.iad2.fedoraproject.org
Packager : Fedora Project
Vendor : Fedora Project
URL : https://git.kernel.org/pub/scm/libs/libtrace/libtraceevent.git/
Bug URL : https://bugz.fedoraproject.org/libtraceevent
Summary : Development headers of libtraceevent
Description :
Development headers of libtraceevent-libs
$
Default build:
$ ldd ~/bin/perf | grep tracee
libtraceevent.so.1 => /lib64/libtraceevent.so.1 (0x00007f1dcaf8f000)
$
# perf trace -e sched:* --max-events 10
0.000 migration/0/17 sched:sched_migrate_task(comm: "", pid: 1603763 (perf), prio: 120, dest_cpu: 1)
0.005 migration/0/17 sched:sched_wake_idle_without_ipi(cpu: 1)
0.011 migration/0/17 sched:sched_switch(prev_comm: "", prev_pid: 17 (migration/0), prev_state: 1, next_comm: "", next_prio: 120)
1.173 :0/0 sched:sched_wakeup(comm: "", pid: 3138 (gnome-terminal-), prio: 120)
1.180 :0/0 sched:sched_switch(prev_comm: "", prev_prio: 120, next_comm: "", next_pid: 3138 (gnome-terminal-), next_prio: 120)
0.156 migration/1/21 sched:sched_migrate_task(comm: "", pid: 1603763 (perf), prio: 120, orig_cpu: 1, dest_cpu: 2)
0.160 migration/1/21 sched:sched_wake_idle_without_ipi(cpu: 2)
0.166 migration/1/21 sched:sched_switch(prev_comm: "", prev_pid: 21 (migration/1), prev_state: 1, next_comm: "", next_prio: 120)
1.183 :0/0 sched:sched_wakeup(comm: "", pid: 1602985 (kworker/u16:0-f), prio: 120, target_cpu: 1)
1.186 :0/0 sched:sched_switch(prev_comm: "", prev_prio: 120, next_comm: "", next_pid: 1602985 (kworker/u16:0-f), next_prio: 120)
#
Had to tweak tools/perf/util/setup.py to make sure the python binding
shared object links with libtraceevent if -DHAVE_LIBTRACEEVENT is
present in CFLAGS.
Building with NO_LIBTRACEEVENT=1 uncovered some more build failures:
- Make building of data-convert-bt.c to CONFIG_LIBTRACEEVENT=y
- perf-$(CONFIG_LIBTRACEEVENT) += scripts/
- bpf_kwork.o needs also to be dependent on CONFIG_LIBTRACEEVENT=y
- The python binding needed some fixups and util/trace-event.c can't be
built and linked with the python binding shared object, so remove it
in tools/perf/util/setup.py and exclude it from the list of
dependencies in the python/perf.so Makefile.perf target.
Building without libtraceevent-devel installed uncovered more build
failures:
- The python binding tools/perf/util/python.c was assuming that
traceevent/parse-events.h was always available, which was the case
when we defaulted to using the in-kernel tools/lib/traceevent/ files,
now we need to enclose it under ifdef HAVE_LIBTRACEEVENT, just like
the other parts of it that deal with tracepoints.
- We have to ifdef the rules in the Build files with
CONFIG_LIBTRACEEVENT=y to build builtin-trace.c and
tools/perf/trace/beauty/ as we only ifdef setting CONFIG_TRACE=y when
setting NO_LIBTRACEEVENT=1 in the make command line, not when we don't
detect libtraceevent-devel installed in the system. Simplification here
to avoid these two ways of disabling builtin-trace.c and not having
CONFIG_TRACE=y when libtraceevent-devel isn't installed is the clean
way.
From Athira:
<quote>
tools/perf/arch/powerpc/util/Build
-perf-y += kvm-stat.o
+perf-$(CONFIG_LIBTRACEEVENT) += kvm-stat.o
</quote>
Then, ditto for arm64 and s390, detected by container cross build tests.
- s/390 uses test__checkevent_tracepoint() that is now only available if
HAVE_LIBTRACEEVENT is defined, enclose the callsite with ifder HAVE_LIBTRACEEVENT.
Also from Athira:
<quote>
With this change, I could successfully compile in these environment:
- Without libtraceevent-devel installed
- With libtraceevent-devel installed
- With “make NO_LIBTRACEEVENT=1”
</quote>
Then, finally rename CONFIG_TRACEEVENT to CONFIG_LIBTRACEEVENT for
consistency with other libraries detected in tools/perf/.
Signed-off-by: Ian Rogers <irogers@google.com>
Tested-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Tested-by: Athira Rajeev <atrajeev@linux.vnet.ibm.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Nick Desaulniers <ndesaulniers@google.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Stephane Eranian <eranian@google.com>
Cc: bpf@vger.kernel.org
Link: http://lore.kernel.org/lkml/20221205225940.3079667-3-irogers@google.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2022-12-06 06:59:39 +08:00
|
|
|
else
|
|
|
|
#endif
|
|
|
|
if (event->header.type == PERF_RECORD_ITRACE_START)
|
2015-07-18 00:33:41 +08:00
|
|
|
err = intel_pt_process_itrace_start(pt, event, sample);
|
2021-09-08 00:39:03 +08:00
|
|
|
else if (event->header.type == PERF_RECORD_AUX_OUTPUT_HW_ID)
|
|
|
|
err = intel_pt_process_aux_output_hw_id(pt, event, sample);
|
2015-08-13 17:40:57 +08:00
|
|
|
else if (event->header.type == PERF_RECORD_SWITCH ||
|
|
|
|
event->header.type == PERF_RECORD_SWITCH_CPU_WIDE)
|
|
|
|
err = intel_pt_context_switch(pt, event, sample);
|
2015-07-18 00:33:41 +08:00
|
|
|
|
perf intel-pt: Add support for text poke events
Select text poke events when available and the kernel is being traced.
Process text poke events to invalidate entries in Intel PT's instruction
cache.
Example:
The example requires kernel config:
CONFIG_PROC_SYSCTL=y
CONFIG_SCHED_DEBUG=y
CONFIG_SCHEDSTATS=y
Before:
# perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 3.341 MB perf.data.before ]
[1]+ Terminated perf record -o perf.data.before --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.before --itrace=e >/dev/null
Warning:
474 instruction trace errors
After:
# perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M &
# cat /proc/sys/kernel/sched_schedstats
0
# echo 1 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
1
# echo 0 > /proc/sys/kernel/sched_schedstats
# cat /proc/sys/kernel/sched_schedstats
0
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 2.646 MB perf.data.after ]
[1]+ Terminated perf record -o perf.data.after --kcore -a -e intel_pt//k -m,64M
# perf script -i perf.data.after --itrace=e >/dev/null
Example:
The example requires kernel config:
# CONFIG_FUNCTION_TRACER is not set
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.026 MB perf.data (68 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.268 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
207 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __schedule
Added new event:
probe:__schedule (on __schedule)
You can now use it in all perf tools, such as:
perf record -e probe:__schedule -aR sleep 1
# perf record -e probe:__schedule -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.028 MB perf.data (107 samples) ]
# perf probe -d probe:__schedule
Removed event: probe:__schedule
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 39.978 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
6 565303693547 0x291f18 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027a000 len 4096 type 2 flags 0x0 name kprobe_insn_page
6 565303697010 0x291f68 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 0 new len 6
6 565303838278 0x291fa8 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc027c000 len 4096 type 2 flags 0x0 name kprobe_optinsn_page
6 565303848286 0x291ff8 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 0 new len 106
6 565369336743 0x292af8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
7 566434327704 0x217c208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffff88ab8890 old len 5 new len 5
6 566456313475 0x293198 [0xa0]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027c000 old len 106 new len 0
6 566456314935 0x293238 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffc027a000 old len 6 new len 0
Example:
The example requires kernel config:
CONFIG_FUNCTION_TRACER=y
Before:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.022 MB perf.data (6 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 2 times to write data ]
[ perf record: Captured and wrote 43.850 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
Warning:
8 instruction trace errors
After:
# perf record --kcore -m,64M -o t1 -a -e intel_pt//k &
# perf probe __kmalloc
Added new event:
probe:__kmalloc (on __kmalloc)
You can now use it in all perf tools, such as:
perf record -e probe:__kmalloc -aR sleep 1
# perf record -e probe:__kmalloc -aR sleep 1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.037 MB perf.data (206 samples) ]
# perf probe -d probe:__kmalloc
Removed event: probe:__kmalloc
# kill %1
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 41.442 MB t1 ]
[1]+ Terminated perf record --kcore -m,64M -o t1 -a -e intel_pt//k
# perf script -i t1 --itrace=e >/dev/null
# perf script -i t1 --no-itrace -D | grep 'POKE\|KSYMBOL'
5 312216133258 0x8bafe0 [0x50]: PERF_RECORD_KSYMBOL addr ffffffffc0360000 len 415 type 2 flags 0x0 name ftrace_trampoline
5 312216133494 0x8bb030 [0x1d8]: PERF_RECORD_TEXT_POKE addr 0xffffffffc0360000 old len 0 new len 415
5 312216229563 0x8bb208 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216239063 0x8bb248 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
5 312216727230 0x8bb288 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
5 312216739322 0x8bb2c8 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
5 312216748321 0x8bb308 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287163462 0x2817430 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287174890 0x2817470 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
7 313287818979 0x28174b0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffabbea190 old len 5 new len 5
7 313287829357 0x28174f0 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac6016f5 old len 5 new len 5
7 313287841246 0x2817530 [0x40]: PERF_RECORD_TEXT_POKE addr 0xffffffffac601803 old len 5 new len 5
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Masami Hiramatsu <mhiramat@kernel.org>
Cc: Mathieu Poirier <mathieu.poirier@linaro.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Steven Rostedt (VMware) <rostedt@goodmis.org>
Cc: x86@kernel.org
Link: http://lore.kernel.org/lkml/20200512121922.8997-14-adrian.hunter@intel.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2020-05-12 20:19:20 +08:00
|
|
|
if (!err && event->header.type == PERF_RECORD_TEXT_POKE)
|
|
|
|
err = intel_pt_text_poke(pt, event);
|
|
|
|
|
2020-07-10 23:11:01 +08:00
|
|
|
if (intel_pt_enable_logging && intel_pt_log_events(pt, sample->time)) {
|
2020-07-10 23:11:00 +08:00
|
|
|
intel_pt_log("event %u: cpu %d time %"PRIu64" tsc %#"PRIx64" ",
|
|
|
|
event->header.type, sample->cpu, sample->time, timestamp);
|
|
|
|
intel_pt_log_event(event);
|
|
|
|
}
|
2015-07-18 00:33:41 +08:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int intel_pt_flush(struct perf_session *session, struct perf_tool *tool)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = container_of(session->auxtrace, struct intel_pt,
|
|
|
|
auxtrace);
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (dump_trace)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (!tool->ordered_events)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
ret = intel_pt_update_queues(pt);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
if (pt->timeless_decoding)
|
|
|
|
return intel_pt_process_timeless_queues(pt, -1,
|
|
|
|
MAX_TIMESTAMP - 1);
|
|
|
|
|
|
|
|
return intel_pt_process_queues(pt, MAX_TIMESTAMP);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void intel_pt_free_events(struct perf_session *session)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = container_of(session->auxtrace, struct intel_pt,
|
|
|
|
auxtrace);
|
|
|
|
struct auxtrace_queues *queues = &pt->queues;
|
|
|
|
unsigned int i;
|
|
|
|
|
|
|
|
for (i = 0; i < queues->nr_queues; i++) {
|
|
|
|
intel_pt_free_queue(queues->queue_array[i].priv);
|
|
|
|
queues->queue_array[i].priv = NULL;
|
|
|
|
}
|
|
|
|
intel_pt_log_disable();
|
|
|
|
auxtrace_queues__free(queues);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void intel_pt_free(struct perf_session *session)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = container_of(session->auxtrace, struct intel_pt,
|
|
|
|
auxtrace);
|
|
|
|
|
|
|
|
auxtrace_heap__free(&pt->heap);
|
|
|
|
intel_pt_free_events(session);
|
|
|
|
session->auxtrace = NULL;
|
2021-04-30 15:03:05 +08:00
|
|
|
intel_pt_free_vmcs_info(pt);
|
2015-12-12 06:11:23 +08:00
|
|
|
thread__put(pt->unknown_thread);
|
2016-09-23 22:38:48 +08:00
|
|
|
addr_filters__exit(&pt->filts);
|
2020-04-01 18:16:08 +08:00
|
|
|
zfree(&pt->chain);
|
2016-09-23 22:38:46 +08:00
|
|
|
zfree(&pt->filter);
|
2019-06-04 21:00:09 +08:00
|
|
|
zfree(&pt->time_ranges);
|
2023-06-09 07:28:09 +08:00
|
|
|
zfree(&pt->br_stack);
|
2015-07-18 00:33:41 +08:00
|
|
|
free(pt);
|
|
|
|
}
|
|
|
|
|
2020-04-01 18:15:59 +08:00
|
|
|
static bool intel_pt_evsel_is_auxtrace(struct perf_session *session,
|
|
|
|
struct evsel *evsel)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = container_of(session->auxtrace, struct intel_pt,
|
|
|
|
auxtrace);
|
|
|
|
|
|
|
|
return evsel->core.attr.type == pt->pmu_type;
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
static int intel_pt_process_auxtrace_event(struct perf_session *session,
|
|
|
|
union perf_event *event,
|
|
|
|
struct perf_tool *tool __maybe_unused)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = container_of(session->auxtrace, struct intel_pt,
|
|
|
|
auxtrace);
|
|
|
|
|
|
|
|
if (!pt->data_queued) {
|
|
|
|
struct auxtrace_buffer *buffer;
|
|
|
|
off_t data_offset;
|
2017-01-24 05:07:59 +08:00
|
|
|
int fd = perf_data__fd(session->data);
|
2015-07-18 00:33:41 +08:00
|
|
|
int err;
|
|
|
|
|
2017-01-24 05:07:59 +08:00
|
|
|
if (perf_data__is_pipe(session->data)) {
|
2015-07-18 00:33:41 +08:00
|
|
|
data_offset = 0;
|
|
|
|
} else {
|
|
|
|
data_offset = lseek(fd, 0, SEEK_CUR);
|
|
|
|
if (data_offset == -1)
|
|
|
|
return -errno;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = auxtrace_queues__add_event(&pt->queues, session, event,
|
|
|
|
data_offset, &buffer);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
/* Dump here now we have copied a piped trace out of the pipe */
|
|
|
|
if (dump_trace) {
|
|
|
|
if (auxtrace_buffer__get_data(buffer, fd)) {
|
|
|
|
intel_pt_dump_event(pt, buffer->data,
|
|
|
|
buffer->size);
|
|
|
|
auxtrace_buffer__put_data(buffer);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-11-15 20:42:24 +08:00
|
|
|
static int intel_pt_queue_data(struct perf_session *session,
|
|
|
|
struct perf_sample *sample,
|
|
|
|
union perf_event *event, u64 data_offset)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = container_of(session->auxtrace, struct intel_pt,
|
|
|
|
auxtrace);
|
|
|
|
u64 timestamp;
|
|
|
|
|
|
|
|
if (event) {
|
|
|
|
return auxtrace_queues__add_event(&pt->queues, session, event,
|
|
|
|
data_offset, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (sample->time && sample->time != (u64)-1)
|
|
|
|
timestamp = perf_time_to_tsc(sample->time, &pt->tc);
|
|
|
|
else
|
|
|
|
timestamp = 0;
|
|
|
|
|
|
|
|
return auxtrace_queues__add_sample(&pt->queues, session, sample,
|
|
|
|
data_offset, timestamp);
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
struct intel_pt_synth {
|
|
|
|
struct perf_tool dummy_tool;
|
|
|
|
struct perf_session *session;
|
|
|
|
};
|
|
|
|
|
|
|
|
static int intel_pt_event_synth(struct perf_tool *tool,
|
|
|
|
union perf_event *event,
|
|
|
|
struct perf_sample *sample __maybe_unused,
|
|
|
|
struct machine *machine __maybe_unused)
|
|
|
|
{
|
|
|
|
struct intel_pt_synth *intel_pt_synth =
|
|
|
|
container_of(tool, struct intel_pt_synth, dummy_tool);
|
|
|
|
|
|
|
|
return perf_session__deliver_synth_event(intel_pt_synth->session, event,
|
|
|
|
NULL);
|
|
|
|
}
|
|
|
|
|
2017-05-26 16:17:31 +08:00
|
|
|
static int intel_pt_synth_event(struct perf_session *session, const char *name,
|
2015-07-18 00:33:41 +08:00
|
|
|
struct perf_event_attr *attr, u64 id)
|
|
|
|
{
|
|
|
|
struct intel_pt_synth intel_pt_synth;
|
2017-05-26 16:17:31 +08:00
|
|
|
int err;
|
|
|
|
|
|
|
|
pr_debug("Synthesizing '%s' event with id %" PRIu64 " sample type %#" PRIx64 "\n",
|
|
|
|
name, id, (u64)attr->sample_type);
|
2015-07-18 00:33:41 +08:00
|
|
|
|
|
|
|
memset(&intel_pt_synth, 0, sizeof(struct intel_pt_synth));
|
|
|
|
intel_pt_synth.session = session;
|
|
|
|
|
2017-05-26 16:17:31 +08:00
|
|
|
err = perf_event__synthesize_attr(&intel_pt_synth.dummy_tool, attr, 1,
|
|
|
|
&id, intel_pt_event_synth);
|
|
|
|
if (err)
|
|
|
|
pr_err("%s: failed to synthesize '%s' event type\n",
|
|
|
|
__func__, name);
|
|
|
|
|
|
|
|
return err;
|
2015-07-18 00:33:41 +08:00
|
|
|
}
|
|
|
|
|
2019-07-21 19:23:52 +08:00
|
|
|
static void intel_pt_set_event_name(struct evlist *evlist, u64 id,
|
2017-05-26 16:17:32 +08:00
|
|
|
const char *name)
|
|
|
|
{
|
2019-07-21 19:23:51 +08:00
|
|
|
struct evsel *evsel;
|
2017-05-26 16:17:32 +08:00
|
|
|
|
|
|
|
evlist__for_each_entry(evlist, evsel) {
|
2019-09-03 04:12:26 +08:00
|
|
|
if (evsel->core.id && evsel->core.id[0] == id) {
|
2017-05-26 16:17:32 +08:00
|
|
|
if (evsel->name)
|
|
|
|
zfree(&evsel->name);
|
|
|
|
evsel->name = strdup(name);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-21 19:23:51 +08:00
|
|
|
static struct evsel *intel_pt_evsel(struct intel_pt *pt,
|
2019-07-21 19:23:52 +08:00
|
|
|
struct evlist *evlist)
|
2017-05-26 16:17:30 +08:00
|
|
|
{
|
2019-07-21 19:23:51 +08:00
|
|
|
struct evsel *evsel;
|
2017-05-26 16:17:30 +08:00
|
|
|
|
|
|
|
evlist__for_each_entry(evlist, evsel) {
|
2019-09-03 04:15:47 +08:00
|
|
|
if (evsel->core.attr.type == pt->pmu_type && evsel->core.ids)
|
2017-05-26 16:17:30 +08:00
|
|
|
return evsel;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
static int intel_pt_synth_events(struct intel_pt *pt,
|
|
|
|
struct perf_session *session)
|
|
|
|
{
|
2019-07-21 19:23:52 +08:00
|
|
|
struct evlist *evlist = session->evlist;
|
2019-07-21 19:23:51 +08:00
|
|
|
struct evsel *evsel = intel_pt_evsel(pt, evlist);
|
2015-07-18 00:33:41 +08:00
|
|
|
struct perf_event_attr attr;
|
|
|
|
u64 id;
|
|
|
|
int err;
|
|
|
|
|
2017-05-26 16:17:30 +08:00
|
|
|
if (!evsel) {
|
2015-07-18 00:33:41 +08:00
|
|
|
pr_debug("There are no selected events with Intel Processor Trace data\n");
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
memset(&attr, 0, sizeof(struct perf_event_attr));
|
|
|
|
attr.size = sizeof(struct perf_event_attr);
|
|
|
|
attr.type = PERF_TYPE_HARDWARE;
|
2019-07-21 19:24:29 +08:00
|
|
|
attr.sample_type = evsel->core.attr.sample_type & PERF_SAMPLE_MASK;
|
2015-07-18 00:33:41 +08:00
|
|
|
attr.sample_type |= PERF_SAMPLE_IP | PERF_SAMPLE_TID |
|
|
|
|
PERF_SAMPLE_PERIOD;
|
|
|
|
if (pt->timeless_decoding)
|
|
|
|
attr.sample_type &= ~(u64)PERF_SAMPLE_TIME;
|
|
|
|
else
|
|
|
|
attr.sample_type |= PERF_SAMPLE_TIME;
|
|
|
|
if (!pt->per_cpu_mmaps)
|
|
|
|
attr.sample_type &= ~(u64)PERF_SAMPLE_CPU;
|
2019-07-21 19:24:29 +08:00
|
|
|
attr.exclude_user = evsel->core.attr.exclude_user;
|
|
|
|
attr.exclude_kernel = evsel->core.attr.exclude_kernel;
|
|
|
|
attr.exclude_hv = evsel->core.attr.exclude_hv;
|
|
|
|
attr.exclude_host = evsel->core.attr.exclude_host;
|
|
|
|
attr.exclude_guest = evsel->core.attr.exclude_guest;
|
|
|
|
attr.sample_id_all = evsel->core.attr.sample_id_all;
|
|
|
|
attr.read_format = evsel->core.attr.read_format;
|
2015-07-18 00:33:41 +08:00
|
|
|
|
2019-09-03 04:12:26 +08:00
|
|
|
id = evsel->core.id[0] + 1000000000;
|
2015-07-18 00:33:41 +08:00
|
|
|
if (!id)
|
|
|
|
id = 1;
|
|
|
|
|
2017-05-26 16:17:33 +08:00
|
|
|
if (pt->synth_opts.branches) {
|
|
|
|
attr.config = PERF_COUNT_HW_BRANCH_INSTRUCTIONS;
|
|
|
|
attr.sample_period = 1;
|
|
|
|
attr.sample_type |= PERF_SAMPLE_ADDR;
|
|
|
|
err = intel_pt_synth_event(session, "branches", &attr, id);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
pt->sample_branches = true;
|
|
|
|
pt->branches_sample_type = attr.sample_type;
|
|
|
|
pt->branches_id = id;
|
|
|
|
id += 1;
|
|
|
|
attr.sample_type &= ~(u64)PERF_SAMPLE_ADDR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pt->synth_opts.callchain)
|
|
|
|
attr.sample_type |= PERF_SAMPLE_CALLCHAIN;
|
2020-08-19 16:47:51 +08:00
|
|
|
if (pt->synth_opts.last_branch) {
|
2017-05-26 16:17:33 +08:00
|
|
|
attr.sample_type |= PERF_SAMPLE_BRANCH_STACK;
|
2020-08-19 16:47:51 +08:00
|
|
|
/*
|
|
|
|
* We don't use the hardware index, but the sample generation
|
|
|
|
* code uses the new format branch_stack with this field,
|
|
|
|
* so the event attributes must indicate that it's present.
|
|
|
|
*/
|
|
|
|
attr.branch_sample_type |= PERF_SAMPLE_BRANCH_HW_INDEX;
|
|
|
|
}
|
2017-05-26 16:17:33 +08:00
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
if (pt->synth_opts.instructions) {
|
|
|
|
attr.config = PERF_COUNT_HW_INSTRUCTIONS;
|
|
|
|
if (pt->synth_opts.period_type == PERF_ITRACE_PERIOD_NANOSECS)
|
|
|
|
attr.sample_period =
|
|
|
|
intel_pt_ns_to_ticks(pt, pt->synth_opts.period);
|
|
|
|
else
|
|
|
|
attr.sample_period = pt->synth_opts.period;
|
2017-05-26 16:17:31 +08:00
|
|
|
err = intel_pt_synth_event(session, "instructions", &attr, id);
|
|
|
|
if (err)
|
2015-07-18 00:33:41 +08:00
|
|
|
return err;
|
|
|
|
pt->sample_instructions = true;
|
|
|
|
pt->instructions_sample_type = attr.sample_type;
|
|
|
|
pt->instructions_id = id;
|
|
|
|
id += 1;
|
|
|
|
}
|
|
|
|
|
perf intel-pt: Synthesize cycle events
There is no good reason why we cannot synthesize "cycle" events from
Intel PT just as we can synthesize "instruction" events, in particular
when CYC packets are available. This enables using PT to getting much
more accurate cycle profiles than regular sampling (record -e cycles)
when the work last for very short periods (<10 ms). Thus, add support
for this, based off of the existing IPC calculation framework. The new
option to --itrace is "y" (for cYcles), as c was taken for calls. Cycle
and instruction events can be synthesized together, and are by default.
The only real caveat is that CYC packets are only emitted whenever some
other packet is, which in practice is when a branch instruction is
encountered (and not even all branches). Thus, even at no subsampling
(e.g. --itrace=y0ns), it is impossible to get more accuracy than a
single basic block, and all cycles spent executing that block will get
attributed to the branch instruction that ends the packet. Thus, one
cannot know whether the cycles came from e.g. a specific load, a
mispredicted branch, or something else. When subsampling (which is the
default), the cycle events will get smeared out even more, but will
still be generally useful to attribute cycle counts to functions.
Reviewed-by: Adrian Hunter <adrian.hunter@intel.com>
Signed-off-by: Steinar H. Gunderson <sesse@google.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Jiri Olsa <jolsa@kernel.org>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Link: https://lore.kernel.org/r/20220322082452.1429091-1-sesse@google.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2022-03-22 16:24:52 +08:00
|
|
|
if (pt->synth_opts.cycles) {
|
|
|
|
attr.config = PERF_COUNT_HW_CPU_CYCLES;
|
|
|
|
if (pt->synth_opts.period_type == PERF_ITRACE_PERIOD_NANOSECS)
|
|
|
|
attr.sample_period =
|
|
|
|
intel_pt_ns_to_ticks(pt, pt->synth_opts.period);
|
|
|
|
else
|
|
|
|
attr.sample_period = pt->synth_opts.period;
|
|
|
|
err = intel_pt_synth_event(session, "cycles", &attr, id);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
pt->sample_cycles = true;
|
|
|
|
pt->cycles_sample_type = attr.sample_type;
|
|
|
|
pt->cycles_id = id;
|
|
|
|
id += 1;
|
|
|
|
}
|
|
|
|
|
2017-05-26 16:17:33 +08:00
|
|
|
attr.sample_type &= ~(u64)PERF_SAMPLE_PERIOD;
|
|
|
|
attr.sample_period = 1;
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
if (pt->synth_opts.transactions) {
|
|
|
|
attr.config = PERF_COUNT_HW_INSTRUCTIONS;
|
2017-05-26 16:17:31 +08:00
|
|
|
err = intel_pt_synth_event(session, "transactions", &attr, id);
|
|
|
|
if (err)
|
2015-07-18 00:33:41 +08:00
|
|
|
return err;
|
|
|
|
pt->sample_transactions = true;
|
2017-05-26 16:17:18 +08:00
|
|
|
pt->transactions_sample_type = attr.sample_type;
|
2015-07-18 00:33:41 +08:00
|
|
|
pt->transactions_id = id;
|
2017-05-26 16:17:32 +08:00
|
|
|
intel_pt_set_event_name(evlist, id, "transactions");
|
2015-07-18 00:33:41 +08:00
|
|
|
id += 1;
|
|
|
|
}
|
|
|
|
|
2017-06-30 16:36:45 +08:00
|
|
|
attr.type = PERF_TYPE_SYNTH;
|
|
|
|
attr.sample_type |= PERF_SAMPLE_RAW;
|
|
|
|
|
|
|
|
if (pt->synth_opts.ptwrites) {
|
|
|
|
attr.config = PERF_SYNTH_INTEL_PTWRITE;
|
|
|
|
err = intel_pt_synth_event(session, "ptwrite", &attr, id);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
pt->sample_ptwrites = true;
|
|
|
|
pt->ptwrites_sample_type = attr.sample_type;
|
|
|
|
pt->ptwrites_id = id;
|
|
|
|
intel_pt_set_event_name(evlist, id, "ptwrite");
|
|
|
|
id += 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pt->synth_opts.pwr_events) {
|
|
|
|
pt->sample_pwr_events = true;
|
|
|
|
pt->pwr_events_sample_type = attr.sample_type;
|
|
|
|
|
|
|
|
attr.config = PERF_SYNTH_INTEL_CBR;
|
|
|
|
err = intel_pt_synth_event(session, "cbr", &attr, id);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
pt->cbr_id = id;
|
|
|
|
intel_pt_set_event_name(evlist, id, "cbr");
|
|
|
|
id += 1;
|
2021-02-06 01:53:50 +08:00
|
|
|
|
|
|
|
attr.config = PERF_SYNTH_INTEL_PSB;
|
|
|
|
err = intel_pt_synth_event(session, "psb", &attr, id);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
pt->psb_id = id;
|
|
|
|
intel_pt_set_event_name(evlist, id, "psb");
|
|
|
|
id += 1;
|
2017-06-30 16:36:45 +08:00
|
|
|
}
|
|
|
|
|
2022-01-24 16:41:41 +08:00
|
|
|
if (pt->synth_opts.pwr_events && (evsel->core.attr.config & INTEL_PT_CFG_PWR_EVT_EN)) {
|
2017-06-30 16:36:45 +08:00
|
|
|
attr.config = PERF_SYNTH_INTEL_MWAIT;
|
|
|
|
err = intel_pt_synth_event(session, "mwait", &attr, id);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
pt->mwait_id = id;
|
|
|
|
intel_pt_set_event_name(evlist, id, "mwait");
|
|
|
|
id += 1;
|
|
|
|
|
|
|
|
attr.config = PERF_SYNTH_INTEL_PWRE;
|
|
|
|
err = intel_pt_synth_event(session, "pwre", &attr, id);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
pt->pwre_id = id;
|
|
|
|
intel_pt_set_event_name(evlist, id, "pwre");
|
|
|
|
id += 1;
|
|
|
|
|
|
|
|
attr.config = PERF_SYNTH_INTEL_EXSTOP;
|
|
|
|
err = intel_pt_synth_event(session, "exstop", &attr, id);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
pt->exstop_id = id;
|
|
|
|
intel_pt_set_event_name(evlist, id, "exstop");
|
|
|
|
id += 1;
|
|
|
|
|
|
|
|
attr.config = PERF_SYNTH_INTEL_PWRX;
|
|
|
|
err = intel_pt_synth_event(session, "pwrx", &attr, id);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
pt->pwrx_id = id;
|
|
|
|
intel_pt_set_event_name(evlist, id, "pwrx");
|
|
|
|
id += 1;
|
|
|
|
}
|
|
|
|
|
2022-01-24 16:41:50 +08:00
|
|
|
if (pt->synth_opts.intr_events && (evsel->core.attr.config & INTEL_PT_CFG_EVT_EN)) {
|
|
|
|
attr.config = PERF_SYNTH_INTEL_EVT;
|
|
|
|
err = intel_pt_synth_event(session, "evt", &attr, id);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
pt->evt_sample_type = attr.sample_type;
|
|
|
|
pt->evt_id = id;
|
|
|
|
intel_pt_set_event_name(evlist, id, "evt");
|
|
|
|
id += 1;
|
|
|
|
}
|
|
|
|
|
2022-01-24 16:41:51 +08:00
|
|
|
if (pt->synth_opts.intr_events && pt->cap_event_trace) {
|
|
|
|
attr.config = PERF_SYNTH_INTEL_IFLAG_CHG;
|
|
|
|
err = intel_pt_synth_event(session, "iflag", &attr, id);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
pt->iflag_chg_sample_type = attr.sample_type;
|
|
|
|
pt->iflag_chg_id = id;
|
|
|
|
intel_pt_set_event_name(evlist, id, "iflag");
|
|
|
|
id += 1;
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-08-06 16:46:04 +08:00
|
|
|
static void intel_pt_setup_pebs_events(struct intel_pt *pt)
|
|
|
|
{
|
|
|
|
struct evsel *evsel;
|
|
|
|
|
|
|
|
if (!pt->synth_opts.other_events)
|
|
|
|
return;
|
|
|
|
|
|
|
|
evlist__for_each_entry(pt->session->evlist, evsel) {
|
2019-09-03 04:12:26 +08:00
|
|
|
if (evsel->core.attr.aux_output && evsel->core.id) {
|
2021-09-08 00:39:03 +08:00
|
|
|
if (pt->single_pebs) {
|
|
|
|
pt->single_pebs = false;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
pt->single_pebs = true;
|
2019-08-06 16:46:04 +08:00
|
|
|
pt->sample_pebs = true;
|
|
|
|
pt->pebs_evsel = evsel;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-07-21 19:23:52 +08:00
|
|
|
static struct evsel *intel_pt_find_sched_switch(struct evlist *evlist)
|
2015-07-18 00:33:41 +08:00
|
|
|
{
|
2019-07-21 19:23:51 +08:00
|
|
|
struct evsel *evsel;
|
2015-07-18 00:33:41 +08:00
|
|
|
|
2016-06-23 22:26:15 +08:00
|
|
|
evlist__for_each_entry_reverse(evlist, evsel) {
|
2020-04-30 03:07:09 +08:00
|
|
|
const char *name = evsel__name(evsel);
|
2015-07-18 00:33:41 +08:00
|
|
|
|
|
|
|
if (!strcmp(name, "sched:sched_switch"))
|
|
|
|
return evsel;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2019-07-21 19:23:52 +08:00
|
|
|
static bool intel_pt_find_switch(struct evlist *evlist)
|
2015-08-13 17:40:57 +08:00
|
|
|
{
|
2019-07-21 19:23:51 +08:00
|
|
|
struct evsel *evsel;
|
2015-08-13 17:40:57 +08:00
|
|
|
|
2016-06-23 22:26:15 +08:00
|
|
|
evlist__for_each_entry(evlist, evsel) {
|
2019-07-21 19:24:29 +08:00
|
|
|
if (evsel->core.attr.context_switch)
|
2015-08-13 17:40:57 +08:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2015-09-25 21:15:56 +08:00
|
|
|
static int intel_pt_perf_config(const char *var, const char *value, void *data)
|
|
|
|
{
|
|
|
|
struct intel_pt *pt = data;
|
|
|
|
|
|
|
|
if (!strcmp(var, "intel-pt.mispred-all"))
|
|
|
|
pt->mispred_all = perf_config_bool(var, value);
|
|
|
|
|
2021-07-02 01:51:32 +08:00
|
|
|
if (!strcmp(var, "intel-pt.max-loops"))
|
|
|
|
perf_config_int(&pt->max_loops, var, value);
|
|
|
|
|
2015-09-25 21:15:56 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2019-06-04 21:00:09 +08:00
|
|
|
/* Find least TSC which converts to ns or later */
|
|
|
|
static u64 intel_pt_tsc_start(u64 ns, struct intel_pt *pt)
|
|
|
|
{
|
|
|
|
u64 tsc, tm;
|
|
|
|
|
|
|
|
tsc = perf_time_to_tsc(ns, &pt->tc);
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
tm = tsc_to_perf_time(tsc, &pt->tc);
|
|
|
|
if (tm < ns)
|
|
|
|
break;
|
|
|
|
tsc -= 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
while (tm < ns)
|
|
|
|
tm = tsc_to_perf_time(++tsc, &pt->tc);
|
|
|
|
|
|
|
|
return tsc;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Find greatest TSC which converts to ns or earlier */
|
|
|
|
static u64 intel_pt_tsc_end(u64 ns, struct intel_pt *pt)
|
|
|
|
{
|
|
|
|
u64 tsc, tm;
|
|
|
|
|
|
|
|
tsc = perf_time_to_tsc(ns, &pt->tc);
|
|
|
|
|
|
|
|
while (1) {
|
|
|
|
tm = tsc_to_perf_time(tsc, &pt->tc);
|
|
|
|
if (tm > ns)
|
|
|
|
break;
|
|
|
|
tsc += 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
while (tm > ns)
|
|
|
|
tm = tsc_to_perf_time(--tsc, &pt->tc);
|
|
|
|
|
|
|
|
return tsc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int intel_pt_setup_time_ranges(struct intel_pt *pt,
|
|
|
|
struct itrace_synth_opts *opts)
|
|
|
|
{
|
|
|
|
struct perf_time_interval *p = opts->ptime_range;
|
|
|
|
int n = opts->range_num;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (!n || !p || pt->timeless_decoding)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
pt->time_ranges = calloc(n, sizeof(struct range));
|
|
|
|
if (!pt->time_ranges)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
pt->range_cnt = n;
|
|
|
|
|
|
|
|
intel_pt_log("%s: %u range(s)\n", __func__, n);
|
|
|
|
|
|
|
|
for (i = 0; i < n; i++) {
|
|
|
|
struct range *r = &pt->time_ranges[i];
|
|
|
|
u64 ts = p[i].start;
|
|
|
|
u64 te = p[i].end;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Take care to ensure the TSC range matches the perf-time range
|
|
|
|
* when converted back to perf-time.
|
|
|
|
*/
|
|
|
|
r->start = ts ? intel_pt_tsc_start(ts, pt) : 0;
|
|
|
|
r->end = te ? intel_pt_tsc_end(te, pt) : 0;
|
|
|
|
|
|
|
|
intel_pt_log("range %d: perf time interval: %"PRIu64" to %"PRIu64"\n",
|
|
|
|
i, ts, te);
|
|
|
|
intel_pt_log("range %d: TSC time interval: %#"PRIx64" to %#"PRIx64"\n",
|
|
|
|
i, r->start, r->end);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2021-04-30 15:03:09 +08:00
|
|
|
static int intel_pt_parse_vm_tm_corr_arg(struct intel_pt *pt, char **args)
|
|
|
|
{
|
|
|
|
struct intel_pt_vmcs_info *vmcs_info;
|
|
|
|
u64 tsc_offset, vmcs;
|
|
|
|
char *p = *args;
|
|
|
|
|
|
|
|
errno = 0;
|
|
|
|
|
|
|
|
p = skip_spaces(p);
|
|
|
|
if (!*p)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
tsc_offset = strtoull(p, &p, 0);
|
|
|
|
if (errno)
|
|
|
|
return -errno;
|
|
|
|
p = skip_spaces(p);
|
|
|
|
if (*p != ':') {
|
|
|
|
pt->dflt_tsc_offset = tsc_offset;
|
|
|
|
*args = p;
|
|
|
|
return 0;
|
|
|
|
}
|
2021-12-15 16:06:34 +08:00
|
|
|
p += 1;
|
2021-04-30 15:03:09 +08:00
|
|
|
while (1) {
|
|
|
|
vmcs = strtoull(p, &p, 0);
|
|
|
|
if (errno)
|
|
|
|
return -errno;
|
|
|
|
if (!vmcs)
|
|
|
|
return -EINVAL;
|
|
|
|
vmcs_info = intel_pt_findnew_vmcs(&pt->vmcs_info, vmcs, tsc_offset);
|
|
|
|
if (!vmcs_info)
|
|
|
|
return -ENOMEM;
|
|
|
|
p = skip_spaces(p);
|
|
|
|
if (*p != ',')
|
|
|
|
break;
|
|
|
|
p += 1;
|
|
|
|
}
|
|
|
|
*args = p;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int intel_pt_parse_vm_tm_corr_args(struct intel_pt *pt)
|
|
|
|
{
|
|
|
|
char *args = pt->synth_opts.vm_tm_corr_args;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (!args)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
do {
|
|
|
|
ret = intel_pt_parse_vm_tm_corr_arg(pt, &args);
|
|
|
|
} while (!ret);
|
|
|
|
|
|
|
|
if (ret < 0) {
|
|
|
|
pr_err("Failed to parse VM Time Correlation options\n");
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
static const char * const intel_pt_info_fmts[] = {
|
2015-07-18 00:33:54 +08:00
|
|
|
[INTEL_PT_PMU_TYPE] = " PMU Type %"PRId64"\n",
|
|
|
|
[INTEL_PT_TIME_SHIFT] = " Time Shift %"PRIu64"\n",
|
|
|
|
[INTEL_PT_TIME_MULT] = " Time Muliplier %"PRIu64"\n",
|
|
|
|
[INTEL_PT_TIME_ZERO] = " Time Zero %"PRIu64"\n",
|
|
|
|
[INTEL_PT_CAP_USER_TIME_ZERO] = " Cap Time Zero %"PRId64"\n",
|
|
|
|
[INTEL_PT_TSC_BIT] = " TSC bit %#"PRIx64"\n",
|
|
|
|
[INTEL_PT_NORETCOMP_BIT] = " NoRETComp bit %#"PRIx64"\n",
|
|
|
|
[INTEL_PT_HAVE_SCHED_SWITCH] = " Have sched_switch %"PRId64"\n",
|
|
|
|
[INTEL_PT_SNAPSHOT_MODE] = " Snapshot mode %"PRId64"\n",
|
|
|
|
[INTEL_PT_PER_CPU_MMAPS] = " Per-cpu maps %"PRId64"\n",
|
|
|
|
[INTEL_PT_MTC_BIT] = " MTC bit %#"PRIx64"\n",
|
2022-10-12 16:22:58 +08:00
|
|
|
[INTEL_PT_MTC_FREQ_BITS] = " MTC freq bits %#"PRIx64"\n",
|
2015-07-18 00:33:54 +08:00
|
|
|
[INTEL_PT_TSC_CTC_N] = " TSC:CTC numerator %"PRIu64"\n",
|
|
|
|
[INTEL_PT_TSC_CTC_D] = " TSC:CTC denominator %"PRIu64"\n",
|
|
|
|
[INTEL_PT_CYC_BIT] = " CYC bit %#"PRIx64"\n",
|
2016-09-23 22:38:42 +08:00
|
|
|
[INTEL_PT_MAX_NONTURBO_RATIO] = " Max non-turbo ratio %"PRIu64"\n",
|
2016-09-23 22:38:46 +08:00
|
|
|
[INTEL_PT_FILTER_STR_LEN] = " Filter string len. %"PRIu64"\n",
|
2015-07-18 00:33:41 +08:00
|
|
|
};
|
|
|
|
|
2019-08-28 21:57:02 +08:00
|
|
|
static void intel_pt_print_info(__u64 *arr, int start, int finish)
|
2015-07-18 00:33:41 +08:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (!dump_trace)
|
|
|
|
return;
|
|
|
|
|
2022-10-12 16:22:58 +08:00
|
|
|
for (i = start; i <= finish; i++) {
|
|
|
|
const char *fmt = intel_pt_info_fmts[i];
|
|
|
|
|
|
|
|
if (fmt)
|
|
|
|
fprintf(stdout, fmt, arr[i]);
|
|
|
|
}
|
2015-07-18 00:33:41 +08:00
|
|
|
}
|
|
|
|
|
2016-09-23 22:38:46 +08:00
|
|
|
static void intel_pt_print_info_str(const char *name, const char *str)
|
|
|
|
{
|
|
|
|
if (!dump_trace)
|
|
|
|
return;
|
|
|
|
|
|
|
|
fprintf(stdout, " %-20s%s\n", name, str ? str : "");
|
|
|
|
}
|
|
|
|
|
2019-08-28 21:57:16 +08:00
|
|
|
static bool intel_pt_has(struct perf_record_auxtrace_info *auxtrace_info, int pos)
|
2016-09-23 22:38:44 +08:00
|
|
|
{
|
|
|
|
return auxtrace_info->header.size >=
|
2019-08-28 21:57:16 +08:00
|
|
|
sizeof(struct perf_record_auxtrace_info) + (sizeof(u64) * (pos + 1));
|
2016-09-23 22:38:44 +08:00
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
int intel_pt_process_auxtrace_info(union perf_event *event,
|
|
|
|
struct perf_session *session)
|
|
|
|
{
|
2019-08-28 21:57:16 +08:00
|
|
|
struct perf_record_auxtrace_info *auxtrace_info = &event->auxtrace_info;
|
2015-07-18 00:33:41 +08:00
|
|
|
size_t min_sz = sizeof(u64) * INTEL_PT_PER_CPU_MMAPS;
|
|
|
|
struct intel_pt *pt;
|
2016-09-23 22:38:46 +08:00
|
|
|
void *info_end;
|
2019-08-28 21:57:02 +08:00
|
|
|
__u64 *info;
|
2015-07-18 00:33:41 +08:00
|
|
|
int err;
|
|
|
|
|
2019-08-28 21:57:16 +08:00
|
|
|
if (auxtrace_info->header.size < sizeof(struct perf_record_auxtrace_info) +
|
2015-07-18 00:33:41 +08:00
|
|
|
min_sz)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
pt = zalloc(sizeof(struct intel_pt));
|
|
|
|
if (!pt)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2021-04-30 15:03:05 +08:00
|
|
|
pt->vmcs_info = RB_ROOT;
|
|
|
|
|
2016-09-23 22:38:48 +08:00
|
|
|
addr_filters__init(&pt->filts);
|
|
|
|
|
2017-01-25 00:44:10 +08:00
|
|
|
err = perf_config(intel_pt_perf_config, pt);
|
|
|
|
if (err)
|
|
|
|
goto err_free;
|
2015-09-25 21:15:56 +08:00
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
err = auxtrace_queues__init(&pt->queues);
|
|
|
|
if (err)
|
|
|
|
goto err_free;
|
|
|
|
|
2021-04-30 15:02:59 +08:00
|
|
|
if (session->itrace_synth_opts->set) {
|
|
|
|
pt->synth_opts = *session->itrace_synth_opts;
|
|
|
|
} else {
|
|
|
|
struct itrace_synth_opts *opts = session->itrace_synth_opts;
|
|
|
|
|
|
|
|
itrace_synth_opts__set_default(&pt->synth_opts, opts->default_no_sample);
|
|
|
|
if (!opts->default_no_sample && !opts->inject) {
|
|
|
|
pt->synth_opts.branches = false;
|
|
|
|
pt->synth_opts.callchain = true;
|
|
|
|
pt->synth_opts.add_callchain = true;
|
|
|
|
}
|
|
|
|
pt->synth_opts.thread_stack = opts->thread_stack;
|
|
|
|
}
|
|
|
|
|
2021-10-27 16:03:34 +08:00
|
|
|
if (!(pt->synth_opts.log_plus_flags & AUXTRACE_LOG_FLG_USE_STDOUT))
|
|
|
|
intel_pt_log_set_name(INTEL_PT_PMU_NAME);
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
pt->session = session;
|
|
|
|
pt->machine = &session->machines.host; /* No kvm support */
|
|
|
|
pt->auxtrace_type = auxtrace_info->type;
|
|
|
|
pt->pmu_type = auxtrace_info->priv[INTEL_PT_PMU_TYPE];
|
|
|
|
pt->tc.time_shift = auxtrace_info->priv[INTEL_PT_TIME_SHIFT];
|
|
|
|
pt->tc.time_mult = auxtrace_info->priv[INTEL_PT_TIME_MULT];
|
|
|
|
pt->tc.time_zero = auxtrace_info->priv[INTEL_PT_TIME_ZERO];
|
|
|
|
pt->cap_user_time_zero = auxtrace_info->priv[INTEL_PT_CAP_USER_TIME_ZERO];
|
|
|
|
pt->tsc_bit = auxtrace_info->priv[INTEL_PT_TSC_BIT];
|
|
|
|
pt->noretcomp_bit = auxtrace_info->priv[INTEL_PT_NORETCOMP_BIT];
|
|
|
|
pt->have_sched_switch = auxtrace_info->priv[INTEL_PT_HAVE_SCHED_SWITCH];
|
|
|
|
pt->snapshot_mode = auxtrace_info->priv[INTEL_PT_SNAPSHOT_MODE];
|
|
|
|
pt->per_cpu_mmaps = auxtrace_info->priv[INTEL_PT_PER_CPU_MMAPS];
|
|
|
|
intel_pt_print_info(&auxtrace_info->priv[0], INTEL_PT_PMU_TYPE,
|
|
|
|
INTEL_PT_PER_CPU_MMAPS);
|
|
|
|
|
2016-09-23 22:38:44 +08:00
|
|
|
if (intel_pt_has(auxtrace_info, INTEL_PT_CYC_BIT)) {
|
2015-07-18 00:33:54 +08:00
|
|
|
pt->mtc_bit = auxtrace_info->priv[INTEL_PT_MTC_BIT];
|
|
|
|
pt->mtc_freq_bits = auxtrace_info->priv[INTEL_PT_MTC_FREQ_BITS];
|
|
|
|
pt->tsc_ctc_ratio_n = auxtrace_info->priv[INTEL_PT_TSC_CTC_N];
|
|
|
|
pt->tsc_ctc_ratio_d = auxtrace_info->priv[INTEL_PT_TSC_CTC_D];
|
|
|
|
pt->cyc_bit = auxtrace_info->priv[INTEL_PT_CYC_BIT];
|
|
|
|
intel_pt_print_info(&auxtrace_info->priv[0], INTEL_PT_MTC_BIT,
|
|
|
|
INTEL_PT_CYC_BIT);
|
|
|
|
}
|
|
|
|
|
2016-09-23 22:38:44 +08:00
|
|
|
if (intel_pt_has(auxtrace_info, INTEL_PT_MAX_NONTURBO_RATIO)) {
|
2016-09-23 22:38:42 +08:00
|
|
|
pt->max_non_turbo_ratio =
|
|
|
|
auxtrace_info->priv[INTEL_PT_MAX_NONTURBO_RATIO];
|
|
|
|
intel_pt_print_info(&auxtrace_info->priv[0],
|
|
|
|
INTEL_PT_MAX_NONTURBO_RATIO,
|
|
|
|
INTEL_PT_MAX_NONTURBO_RATIO);
|
|
|
|
}
|
|
|
|
|
2016-09-23 22:38:46 +08:00
|
|
|
info = &auxtrace_info->priv[INTEL_PT_FILTER_STR_LEN] + 1;
|
2022-01-24 16:41:49 +08:00
|
|
|
info_end = (void *)auxtrace_info + auxtrace_info->header.size;
|
2016-09-23 22:38:46 +08:00
|
|
|
|
|
|
|
if (intel_pt_has(auxtrace_info, INTEL_PT_FILTER_STR_LEN)) {
|
|
|
|
size_t len;
|
|
|
|
|
|
|
|
len = auxtrace_info->priv[INTEL_PT_FILTER_STR_LEN];
|
|
|
|
intel_pt_print_info(&auxtrace_info->priv[0],
|
|
|
|
INTEL_PT_FILTER_STR_LEN,
|
|
|
|
INTEL_PT_FILTER_STR_LEN);
|
|
|
|
if (len) {
|
|
|
|
const char *filter = (const char *)info;
|
|
|
|
|
|
|
|
len = roundup(len + 1, 8);
|
|
|
|
info += len >> 3;
|
|
|
|
if ((void *)info > info_end) {
|
|
|
|
pr_err("%s: bad filter string length\n", __func__);
|
|
|
|
err = -EINVAL;
|
|
|
|
goto err_free_queues;
|
|
|
|
}
|
|
|
|
pt->filter = memdup(filter, len);
|
|
|
|
if (!pt->filter) {
|
|
|
|
err = -ENOMEM;
|
|
|
|
goto err_free_queues;
|
|
|
|
}
|
|
|
|
if (session->header.needs_swap)
|
|
|
|
mem_bswap_64(pt->filter, len);
|
|
|
|
if (pt->filter[len - 1]) {
|
|
|
|
pr_err("%s: filter string not null terminated\n", __func__);
|
|
|
|
err = -EINVAL;
|
|
|
|
goto err_free_queues;
|
|
|
|
}
|
2016-09-23 22:38:48 +08:00
|
|
|
err = addr_filters__parse_bare_filter(&pt->filts,
|
|
|
|
filter);
|
|
|
|
if (err)
|
|
|
|
goto err_free_queues;
|
2016-09-23 22:38:46 +08:00
|
|
|
}
|
|
|
|
intel_pt_print_info_str("Filter string", pt->filter);
|
|
|
|
}
|
|
|
|
|
2022-01-24 16:41:49 +08:00
|
|
|
if ((void *)info < info_end) {
|
|
|
|
pt->cap_event_trace = *info++;
|
|
|
|
if (dump_trace)
|
|
|
|
fprintf(stdout, " Cap Event Trace %d\n",
|
|
|
|
pt->cap_event_trace);
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
pt->timeless_decoding = intel_pt_timeless_decoding(pt);
|
2019-03-01 18:35:36 +08:00
|
|
|
if (pt->timeless_decoding && !pt->tc.time_mult)
|
|
|
|
pt->tc.time_mult = 1;
|
2015-07-18 00:33:41 +08:00
|
|
|
pt->have_tsc = intel_pt_have_tsc(pt);
|
2019-11-15 20:42:24 +08:00
|
|
|
pt->sampling_mode = intel_pt_sampling_mode(pt);
|
2015-07-18 00:33:41 +08:00
|
|
|
pt->est_tsc = !pt->timeless_decoding;
|
|
|
|
|
2021-04-30 15:03:09 +08:00
|
|
|
if (pt->synth_opts.vm_time_correlation) {
|
|
|
|
if (pt->timeless_decoding) {
|
|
|
|
pr_err("Intel PT has no time information for VM Time Correlation\n");
|
|
|
|
err = -EINVAL;
|
|
|
|
goto err_free_queues;
|
|
|
|
}
|
|
|
|
if (session->itrace_synth_opts->ptime_range) {
|
|
|
|
pr_err("Time ranges cannot be specified with VM Time Correlation\n");
|
|
|
|
err = -EINVAL;
|
|
|
|
goto err_free_queues;
|
|
|
|
}
|
|
|
|
/* Currently TSC Offset is calculated using MTC packets */
|
|
|
|
if (!intel_pt_have_mtc(pt)) {
|
|
|
|
pr_err("MTC packets must have been enabled for VM Time Correlation\n");
|
|
|
|
err = -EINVAL;
|
|
|
|
goto err_free_queues;
|
|
|
|
}
|
|
|
|
err = intel_pt_parse_vm_tm_corr_args(pt);
|
|
|
|
if (err)
|
|
|
|
goto err_free_queues;
|
|
|
|
}
|
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
pt->unknown_thread = thread__new(999999999, 999999999);
|
|
|
|
if (!pt->unknown_thread) {
|
|
|
|
err = -ENOMEM;
|
|
|
|
goto err_free_queues;
|
|
|
|
}
|
perf tools: Fix thread lifetime related segfaut in intel_pt
intel_pt_process_auxtrace_info() creates a pt->unknown_thread thread
that eventually needs to be freed by the last thread__put() on it, when
its refcount hits zero, which may happen in
intel_pt_process_auxtrace_info() error handling path and triggers the
following segfault, which would happen as well at intel_pt_free, when
tools using this intel_pt codebase frees up resources:
# perf record -I -e intel_pt/tsc=1,noretcomp=1/u /bin/ls
0 a anaconda-ks.cfg bin perf.data perf.data.old perf-f23-bringup.todo
[ perf record: Woken up 1 times to write data ]
[ perf record: Captured and wrote 0.217 MB perf.data ]
#
# perf script -F event,comm,pid,tid,time,addr,ip,sym,dso,iregs
Samples for 'instructions:u' event do not have IREGS attribute set. Cannot print 'iregs' field.
intel_pt_synth_events: failed to synthesize 'instructions' event type
Segmentation fault (core dumped)
#
The problem is: there's a union in 'struct thread' combines a list_head
and a rb_node. The standard life cycle of a thread is: init rb_node in
the constructor, insert it into machine->threads rbtree using rb_node,
move it to machine->dead_threads using list_head, clean in the last
thread__put: list_del_init(&thread->node).
In the above command, it clean a thread before adding it into list,
causes the above segfault.
Since pt->unknown_thread will never live in an rbtree, initialize its
list node so that when list_del_init() is done on it we don't segfault.
After this patch:
# perf script -F event,comm,pid,tid,time,addr,ip,sym,dso,iregs
Samples for 'instructions:u' event do not have IREGS attribute set. Cannot print 'iregs' field.
intel_pt_synth_events: failed to synthesize 'instructions' event type
0x248 [0x88]: failed to process type: 70
#
Reported-by: Tong Zhang <ztong@vt.edu>
Reported-by: Wang Nan <wangnan0@huawei.com>
Signed-off-by: Adrian Hunter <adrian.hunter@intel.com>
Tested-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Cc: Josh Poimboeuf <jpoimboe@redhat.com>
Link: http://lkml.kernel.org/r/1454296865-19749-1-git-send-email-wangnan0@huawei.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
2016-02-01 11:21:04 +08:00
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
err = thread__set_comm(pt->unknown_thread, "unknown", 0);
|
|
|
|
if (err)
|
|
|
|
goto err_delete_thread;
|
2019-11-26 08:58:33 +08:00
|
|
|
if (thread__init_maps(pt->unknown_thread, pt->machine)) {
|
2015-07-18 00:33:41 +08:00
|
|
|
err = -ENOMEM;
|
|
|
|
goto err_delete_thread;
|
|
|
|
}
|
|
|
|
|
|
|
|
pt->auxtrace.process_event = intel_pt_process_event;
|
|
|
|
pt->auxtrace.process_auxtrace_event = intel_pt_process_auxtrace_event;
|
2019-11-15 20:42:24 +08:00
|
|
|
pt->auxtrace.queue_data = intel_pt_queue_data;
|
|
|
|
pt->auxtrace.dump_auxtrace_sample = intel_pt_dump_sample;
|
2015-07-18 00:33:41 +08:00
|
|
|
pt->auxtrace.flush_events = intel_pt_flush;
|
|
|
|
pt->auxtrace.free_events = intel_pt_free_events;
|
|
|
|
pt->auxtrace.free = intel_pt_free;
|
2020-04-01 18:15:59 +08:00
|
|
|
pt->auxtrace.evsel_is_auxtrace = intel_pt_evsel_is_auxtrace;
|
2015-07-18 00:33:41 +08:00
|
|
|
session->auxtrace = &pt->auxtrace;
|
|
|
|
|
|
|
|
if (dump_trace)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (pt->have_sched_switch == 1) {
|
|
|
|
pt->switch_evsel = intel_pt_find_sched_switch(session->evlist);
|
|
|
|
if (!pt->switch_evsel) {
|
|
|
|
pr_err("%s: missing sched_switch event\n", __func__);
|
2016-09-23 22:38:43 +08:00
|
|
|
err = -EINVAL;
|
2015-07-18 00:33:41 +08:00
|
|
|
goto err_delete_thread;
|
|
|
|
}
|
2015-08-13 17:40:57 +08:00
|
|
|
} else if (pt->have_sched_switch == 2 &&
|
|
|
|
!intel_pt_find_switch(session->evlist)) {
|
|
|
|
pr_err("%s: missing context_switch attribute flag\n", __func__);
|
2016-09-23 22:38:43 +08:00
|
|
|
err = -EINVAL;
|
2015-08-13 17:40:57 +08:00
|
|
|
goto err_delete_thread;
|
2015-07-18 00:33:41 +08:00
|
|
|
}
|
|
|
|
|
2022-09-05 15:34:23 +08:00
|
|
|
if (pt->synth_opts.log) {
|
|
|
|
bool log_on_error = pt->synth_opts.log_plus_flags & AUXTRACE_LOG_FLG_ON_ERROR;
|
|
|
|
unsigned int log_on_error_size = pt->synth_opts.log_on_error_size;
|
|
|
|
|
|
|
|
intel_pt_log_enable(log_on_error, log_on_error_size);
|
|
|
|
}
|
2015-07-18 00:33:41 +08:00
|
|
|
|
|
|
|
/* Maximum non-turbo ratio is TSC freq / 100 MHz */
|
|
|
|
if (pt->tc.time_mult) {
|
|
|
|
u64 tsc_freq = intel_pt_ns_to_ticks(pt, 1000000000);
|
|
|
|
|
2016-09-23 22:38:42 +08:00
|
|
|
if (!pt->max_non_turbo_ratio)
|
|
|
|
pt->max_non_turbo_ratio =
|
|
|
|
(tsc_freq + 50000000) / 100000000;
|
2015-07-18 00:33:41 +08:00
|
|
|
intel_pt_log("TSC frequency %"PRIu64"\n", tsc_freq);
|
|
|
|
intel_pt_log("Maximum non-turbo ratio %u\n",
|
|
|
|
pt->max_non_turbo_ratio);
|
2017-06-30 16:36:45 +08:00
|
|
|
pt->cbr2khz = tsc_freq / pt->max_non_turbo_ratio / 1000;
|
2015-07-18 00:33:41 +08:00
|
|
|
}
|
|
|
|
|
2019-07-08 22:39:36 +08:00
|
|
|
err = intel_pt_setup_time_ranges(pt, session->itrace_synth_opts);
|
|
|
|
if (err)
|
|
|
|
goto err_delete_thread;
|
2019-06-04 21:00:09 +08:00
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
if (pt->synth_opts.calls)
|
|
|
|
pt->branches_filter |= PERF_IP_FLAG_CALL | PERF_IP_FLAG_ASYNC |
|
|
|
|
PERF_IP_FLAG_TRACE_END;
|
|
|
|
if (pt->synth_opts.returns)
|
|
|
|
pt->branches_filter |= PERF_IP_FLAG_RETURN |
|
|
|
|
PERF_IP_FLAG_TRACE_BEGIN;
|
|
|
|
|
2020-04-01 18:16:08 +08:00
|
|
|
if ((pt->synth_opts.callchain || pt->synth_opts.add_callchain) &&
|
|
|
|
!symbol_conf.use_callchain) {
|
2015-07-18 00:33:41 +08:00
|
|
|
symbol_conf.use_callchain = true;
|
|
|
|
if (callchain_register_param(&callchain_param) < 0) {
|
|
|
|
symbol_conf.use_callchain = false;
|
|
|
|
pt->synth_opts.callchain = false;
|
2020-04-01 18:16:08 +08:00
|
|
|
pt->synth_opts.add_callchain = false;
|
2015-07-18 00:33:41 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-01 18:16:08 +08:00
|
|
|
if (pt->synth_opts.add_callchain) {
|
|
|
|
err = intel_pt_callchain_init(pt);
|
|
|
|
if (err)
|
|
|
|
goto err_delete_thread;
|
|
|
|
}
|
|
|
|
|
2020-04-29 23:07:49 +08:00
|
|
|
if (pt->synth_opts.last_branch || pt->synth_opts.add_last_branch) {
|
2020-04-29 23:07:45 +08:00
|
|
|
pt->br_stack_sz = pt->synth_opts.last_branch_sz;
|
2020-04-29 23:07:49 +08:00
|
|
|
pt->br_stack_sz_plus = pt->br_stack_sz;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pt->synth_opts.add_last_branch) {
|
|
|
|
err = intel_pt_br_stack_init(pt);
|
|
|
|
if (err)
|
|
|
|
goto err_delete_thread;
|
|
|
|
/*
|
|
|
|
* Additional branch stack size to cater for tracing from the
|
|
|
|
* actual sample ip to where the sample time is recorded.
|
|
|
|
* Measured at about 200 branches, but generously set to 1024.
|
|
|
|
* If kernel space is not being traced, then add just 1 for the
|
|
|
|
* branch to kernel space.
|
|
|
|
*/
|
|
|
|
if (intel_pt_tracing_kernel(pt))
|
|
|
|
pt->br_stack_sz_plus += 1024;
|
|
|
|
else
|
|
|
|
pt->br_stack_sz_plus += 1;
|
|
|
|
}
|
2020-04-29 23:07:45 +08:00
|
|
|
|
2020-04-29 23:07:44 +08:00
|
|
|
pt->use_thread_stack = pt->synth_opts.callchain ||
|
|
|
|
pt->synth_opts.add_callchain ||
|
2020-04-29 23:07:45 +08:00
|
|
|
pt->synth_opts.thread_stack ||
|
2020-04-29 23:07:49 +08:00
|
|
|
pt->synth_opts.last_branch ||
|
|
|
|
pt->synth_opts.add_last_branch;
|
2020-04-29 23:07:45 +08:00
|
|
|
|
|
|
|
pt->callstack = pt->synth_opts.callchain ||
|
|
|
|
pt->synth_opts.add_callchain ||
|
|
|
|
pt->synth_opts.thread_stack;
|
2020-04-29 23:07:44 +08:00
|
|
|
|
2015-07-18 00:33:41 +08:00
|
|
|
err = intel_pt_synth_events(pt, session);
|
|
|
|
if (err)
|
|
|
|
goto err_delete_thread;
|
|
|
|
|
2019-08-06 16:46:04 +08:00
|
|
|
intel_pt_setup_pebs_events(pt);
|
|
|
|
|
2023-01-31 10:33:48 +08:00
|
|
|
if (perf_data__is_pipe(session->data)) {
|
|
|
|
pr_warning("WARNING: Intel PT with pipe mode is not recommended.\n"
|
|
|
|
" The output cannot relied upon. In particular,\n"
|
|
|
|
" timestamps and the order of events may be incorrect.\n");
|
|
|
|
}
|
|
|
|
|
2019-11-15 20:42:24 +08:00
|
|
|
if (pt->sampling_mode || list_empty(&session->auxtrace_index))
|
|
|
|
err = auxtrace_queue_data(session, true, true);
|
|
|
|
else
|
|
|
|
err = auxtrace_queues__process_index(&pt->queues, session);
|
2015-07-18 00:33:41 +08:00
|
|
|
if (err)
|
|
|
|
goto err_delete_thread;
|
|
|
|
|
|
|
|
if (pt->queues.populated)
|
|
|
|
pt->data_queued = true;
|
|
|
|
|
|
|
|
if (pt->timeless_decoding)
|
|
|
|
pr_debug2("Intel PT decoding without timestamps\n");
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
err_delete_thread:
|
2020-04-01 18:16:08 +08:00
|
|
|
zfree(&pt->chain);
|
2015-12-12 06:11:23 +08:00
|
|
|
thread__zput(pt->unknown_thread);
|
2015-07-18 00:33:41 +08:00
|
|
|
err_free_queues:
|
|
|
|
intel_pt_log_disable();
|
|
|
|
auxtrace_queues__free(&pt->queues);
|
|
|
|
session->auxtrace = NULL;
|
|
|
|
err_free:
|
2016-09-23 22:38:48 +08:00
|
|
|
addr_filters__exit(&pt->filts);
|
2016-09-23 22:38:46 +08:00
|
|
|
zfree(&pt->filter);
|
2019-06-04 21:00:09 +08:00
|
|
|
zfree(&pt->time_ranges);
|
2015-07-18 00:33:41 +08:00
|
|
|
free(pt);
|
|
|
|
return err;
|
|
|
|
}
|