On 5/3/26 06:21, Jiri Olsa wrote:
> Adding benchmark test that attaches to (almost) all allowed tracing
> functions and display attach/detach times.
> 
>   # ./test_progs -t tracing_multi_bench_attach -v
>   bpf_testmod.ko is already unloaded.
>   Loading bpf_testmod.ko...
>   Successfully loaded bpf_testmod.ko.
>   serial_test_tracing_multi_bench_attach:PASS:btf__load_vmlinux_btf 0 nsec
>   
> serial_test_tracing_multi_bench_attach:PASS:tracing_multi_bench__open_and_load
>  0 nsec
>   serial_test_tracing_multi_bench_attach:PASS:get_syms 0 nsec
>   
> serial_test_tracing_multi_bench_attach:PASS:bpf_program__attach_tracing_multi 
> 0 nsec
>   serial_test_tracing_multi_bench_attach: found 51186 functions
>   serial_test_tracing_multi_bench_attach: attached in   1.295s
>   serial_test_tracing_multi_bench_attach: detached in   0.243s
>   #507     tracing_multi_bench_attach:OK
>   Summary: 1/0 PASSED, 0 SKIPPED, 0 FAILED
>   Successfully unloaded bpf_testmod.ko.
> 
> Signed-off-by: Jiri Olsa <[email protected]>
> ---
>  .../selftests/bpf/prog_tests/tracing_multi.c  | 178 ++++++++++++++++++
>  .../selftests/bpf/progs/tracing_multi_bench.c |  13 ++
>  2 files changed, 191 insertions(+)
>  create mode 100644 tools/testing/selftests/bpf/progs/tracing_multi_bench.c
> 
> diff --git a/tools/testing/selftests/bpf/prog_tests/tracing_multi.c 
> b/tools/testing/selftests/bpf/prog_tests/tracing_multi.c
> index d64d90f4e086..585d6b646d20 100644
> --- a/tools/testing/selftests/bpf/prog_tests/tracing_multi.c
> +++ b/tools/testing/selftests/bpf/prog_tests/tracing_multi.c
> @@ -9,6 +9,7 @@
>  #include "tracing_multi_intersect.skel.h"
>  #include "tracing_multi_session.skel.h"
>  #include "tracing_multi_fail.skel.h"
> +#include "tracing_multi_bench.skel.h"
>  #include "trace_helpers.h"
>  
>  static __u64 bpf_fentry_test_cookies[] = {
> @@ -543,6 +544,183 @@ static void test_attach_api_fails(void)
>       tracing_multi_fail__destroy(skel);
>  }
>  
> +/*
> + * Skip several kernel symbols that might not be safe or could cause delays.
> + */
> +static bool skip_symbol(char *name)
> +{
> +     if (!strcmp(name, "arch_cpu_idle"))
> +             return true;
> +     if (!strcmp(name, "default_idle"))
> +             return true;
> +     if (!strncmp(name, "rcu_", 4))
> +             return true;
> +     if (!strcmp(name, "bpf_dispatcher_xdp_func"))
> +             return true;
> +     if (strstr(name, "rcu"))
> +             return true;
> +     if (strstr(name, "trace"))
> +             return true;
> +     if (strstr(name, "irq"))
> +             return true;
> +     if (strstr(name, "bpf_lsm_"))
> +             return true;
> +     if (!strcmp(name, "migrate_enable"))
> +             return true;
> +     if (!strcmp(name, "migrate_disable"))
> +             return true;
> +     if (!strcmp(name, "preempt_count_sub"))
> +             return true;
> +     if (!strcmp(name, "preempt_count_add"))
> +             return true;
> +     return false;
> +}

These names intersect with the list in trace_helpers.c::skip_entry().

It would be better to move this list to trace_helpers.c.

> +
> +#define MAX_BPF_FUNC_ARGS 12
> +
> +static bool btf_type_is_modifier(const struct btf_type *t)
> +{
> +     switch (BTF_INFO_KIND(t->info)) {
> +     case BTF_KIND_TYPEDEF:
> +     case BTF_KIND_VOLATILE:
> +     case BTF_KIND_CONST:
> +     case BTF_KIND_RESTRICT:
> +     case BTF_KIND_TYPE_TAG:
> +             return true;
> +     }
> +     return false;
> +}
> +
> +static bool is_allowed_func(const struct btf *btf, const struct btf_type *t)
> +{
> +     const struct btf_type *proto;
> +     const struct btf_param *args;
> +     __u32 i, nargs;
> +     __s64 ret;
> +
> +     proto = btf_type_by_id(btf, t->type);
> +     if (BTF_INFO_KIND(proto->info) != BTF_KIND_FUNC_PROTO)
> +             return false;
> +
> +     args = (const struct btf_param *)(proto + 1);
> +     nargs = btf_vlen(proto);
> +     if (nargs > MAX_BPF_FUNC_ARGS)
> +             return false;
> +
> +     t = btf__type_by_id(btf, proto->type);
> +     while (t && btf_type_is_modifier(t))
> +             t = btf__type_by_id(btf, t->type);
> +
> +     if (btf_is_struct(t) || btf_is_union(t))
> +             return false;
> +
> +     for (i = 0; i < nargs; i++) {
> +             /* No support for variable args */
> +             if (i == nargs - 1 && args[i].type == 0)
> +                     return false;
> +
> +             /* No support of struct argument size greater than 16 bytes */
> +             ret = btf__resolve_size(btf, args[i].type);
> +             if (ret < 0 || ret > 16)
> +                     return false;
> +     }
> +
> +     return true;
> +}

NIT: can we avoid copy/pasting the code snippet from libbpf.c?

Thanks,
Leon

[...]


Reply via email to