Arnaldo Carvalho de Melo | dd8e4ea | 2018-05-04 12:23:29 -0300 | [diff] [blame] | 1 | // SPDX-License-Identifier: GPL-2.0 |
| 2 | #ifndef _PERF_BPF_H |
| 3 | #define _PERF_BPF_H |
Arnaldo Carvalho de Melo | 822c262 | 2018-08-01 10:50:51 -0300 | [diff] [blame] | 4 | |
| 5 | #include <uapi/linux/bpf.h> |
| 6 | |
Arnaldo Carvalho de Melo | 7402e54 | 2018-08-06 09:02:26 -0300 | [diff] [blame] | 7 | /* |
| 8 | * A helper structure used by eBPF C program to describe map attributes to |
| 9 | * elf_bpf loader, taken from tools/testing/selftests/bpf/bpf_helpers.h: |
| 10 | */ |
| 11 | struct bpf_map { |
| 12 | unsigned int type; |
| 13 | unsigned int key_size; |
| 14 | unsigned int value_size; |
| 15 | unsigned int max_entries; |
| 16 | unsigned int map_flags; |
| 17 | unsigned int inner_map_idx; |
| 18 | unsigned int numa_node; |
| 19 | }; |
| 20 | |
Arnaldo Carvalho de Melo | b45d551 | 2019-01-24 15:01:46 +0100 | [diff] [blame] | 21 | #define bpf_map(name, _type, type_key, type_val, _max_entries) \ |
| 22 | struct bpf_map SEC("maps") name = { \ |
| 23 | .type = BPF_MAP_TYPE_##_type, \ |
| 24 | .key_size = sizeof(type_key), \ |
| 25 | .value_size = sizeof(type_val), \ |
| 26 | .max_entries = _max_entries, \ |
Arnaldo Carvalho de Melo | 3163613 | 2019-03-01 16:09:31 -0300 | [diff] [blame] | 27 | }; \ |
| 28 | struct ____btf_map_##name { \ |
| 29 | type_key key; \ |
| 30 | type_val value; \ |
| 31 | }; \ |
| 32 | struct ____btf_map_##name __attribute__((section(".maps." #name), used)) \ |
| 33 | ____btf_map_##name = { } |
Arnaldo Carvalho de Melo | b45d551 | 2019-01-24 15:01:46 +0100 | [diff] [blame] | 34 | |
Arnaldo Carvalho de Melo | 0f7c2de | 2018-11-07 14:49:27 -0300 | [diff] [blame] | 35 | /* |
| 36 | * FIXME: this should receive .max_entries as a parameter, as careful |
| 37 | * tuning of these limits is needed to avoid hitting limits that |
| 38 | * prevents other BPF constructs, such as tracepoint handlers, |
| 39 | * to get installed, with cryptic messages from libbpf, etc. |
| 40 | * For the current need, 'perf trace --filter-pids', 64 should |
| 41 | * be good enough, but this surely needs to be revisited. |
| 42 | */ |
Arnaldo Carvalho de Melo | c657d76 | 2019-01-24 15:11:28 +0100 | [diff] [blame] | 43 | #define pid_map(name, value_type) bpf_map(name, HASH, pid_t, value_type, 64) |
Arnaldo Carvalho de Melo | 382b55d | 2018-11-06 15:46:27 -0300 | [diff] [blame] | 44 | |
| 45 | static int (*bpf_map_update_elem)(struct bpf_map *map, void *key, void *value, u64 flags) = (void *)BPF_FUNC_map_update_elem; |
| 46 | static void *(*bpf_map_lookup_elem)(struct bpf_map *map, void *key) = (void *)BPF_FUNC_map_lookup_elem; |
| 47 | |
Arnaldo Carvalho de Melo | 941a765 | 2019-07-15 15:25:41 -0300 | [diff] [blame] | 48 | static void (*bpf_tail_call)(void *ctx, void *map, int index) = (void *)BPF_FUNC_tail_call; |
| 49 | |
Arnaldo Carvalho de Melo | dd8e4ea | 2018-05-04 12:23:29 -0300 | [diff] [blame] | 50 | #define SEC(NAME) __attribute__((section(NAME), used)) |
Arnaldo Carvalho de Melo | 1f47730 | 2018-05-04 15:18:31 -0300 | [diff] [blame] | 51 | |
Arnaldo Carvalho de Melo | d8fc764 | 2018-05-04 15:59:16 -0300 | [diff] [blame] | 52 | #define probe(function, vars) \ |
| 53 | SEC(#function "=" #function " " #vars) function |
| 54 | |
Arnaldo Carvalho de Melo | dda9ac9 | 2018-08-03 16:28:35 -0300 | [diff] [blame] | 55 | #define syscall_enter(name) \ |
| 56 | SEC("syscalls:sys_enter_" #name) syscall_enter_ ## name |
| 57 | |
Arnaldo Carvalho de Melo | 664b6a9 | 2018-08-30 08:48:44 -0300 | [diff] [blame] | 58 | #define syscall_exit(name) \ |
| 59 | SEC("syscalls:sys_exit_" #name) syscall_exit_ ## name |
| 60 | |
Arnaldo Carvalho de Melo | 1f47730 | 2018-05-04 15:18:31 -0300 | [diff] [blame] | 61 | #define license(name) \ |
| 62 | char _license[] SEC("license") = #name; \ |
| 63 | int _version SEC("version") = LINUX_VERSION_CODE; |
| 64 | |
Arnaldo Carvalho de Melo | 8fa25f3 | 2018-08-07 15:10:19 -0300 | [diff] [blame] | 65 | static int (*probe_read)(void *dst, int size, const void *unsafe_addr) = (void *)BPF_FUNC_probe_read; |
| 66 | static int (*probe_read_str)(void *dst, int size, const void *unsafe_addr) = (void *)BPF_FUNC_probe_read_str; |
| 67 | |
Arnaldo Carvalho de Melo | 61d0071 | 2018-12-12 15:31:28 -0300 | [diff] [blame] | 68 | static int (*perf_event_output)(void *, struct bpf_map *, int, void *, unsigned long) = (void *)BPF_FUNC_perf_event_output; |
| 69 | |
Arnaldo Carvalho de Melo | dd8e4ea | 2018-05-04 12:23:29 -0300 | [diff] [blame] | 70 | #endif /* _PERF_BPF_H */ |