blob: 949e02b1435d7162fd9bf95222a502b7279a9b73 [file] [log] [blame]
Brendan Gregg7bf0e492016-01-27 23:17:40 -08001#!/usr/bin/python
2#
3# wakeuptime Summarize sleep to wakeup time by waker kernel stack
4# For Linux, uses BCC, eBPF.
5#
Brendan Gregg62f4c282016-01-30 11:05:40 -08006# USAGE: wakeuptime [-h] [-u] [-p PID] [-v] [-f] [duration]
Brendan Gregg7bf0e492016-01-27 23:17:40 -08007#
8# The current implementation uses an unrolled loop for x86_64, and was written
9# as a proof of concept. This implementation should be replaced in the future
10# with an appropriate bpf_ call, when available.
11#
12# Currently limited to a stack trace depth of 21 (maxdepth + 1).
13#
14# Copyright 2016 Netflix, Inc.
15# Licensed under the Apache License, Version 2.0 (the "License")
16#
17# 14-Jan-2016 Brendan Gregg Created this.
18
19from __future__ import print_function
20from bcc import BPF
21from time import sleep, strftime
22import argparse
23import signal
24
25# arguments
26examples = """examples:
27 ./wakeuptime # trace blocked time with waker stacks
28 ./wakeuptime 5 # trace for 5 seconds only
29 ./wakeuptime -f 5 # 5 seconds, and output in folded format
30 ./wakeuptime -u # don't include kernel threads (user only)
31 ./wakeuptime -p 185 # trace fo PID 185 only
32"""
33parser = argparse.ArgumentParser(
34 description="Summarize sleep to wakeup time by waker kernel stack",
35 formatter_class=argparse.RawDescriptionHelpFormatter,
36 epilog=examples)
37parser.add_argument("-u", "--useronly", action="store_true",
38 help="user threads only (no kernel threads)")
39parser.add_argument("-p", "--pid",
40 help="trace this PID only")
41parser.add_argument("-v", "--verbose", action="store_true",
42 help="show raw addresses")
43parser.add_argument("-f", "--folded", action="store_true",
44 help="output folded format")
45parser.add_argument("duration", nargs="?", default=99999999,
46 help="duration of trace, in seconds")
47args = parser.parse_args()
48folded = args.folded
49duration = int(args.duration)
50debug = 0
51maxdepth = 20 # and MAXDEPTH
52if args.pid and args.useronly:
53 print("ERROR: use either -p or -u.")
54 exit()
55
56# signal handler
57def signal_ignore(signal, frame):
58 print()
59
60# define BPF program
61bpf_text = """
62#include <uapi/linux/ptrace.h>
63#include <linux/sched.h>
64
65#define MAXDEPTH 20
66#define MINBLOCK_US 1
67
68struct key_t {
69 char waker[TASK_COMM_LEN];
70 char target[TASK_COMM_LEN];
71 // Skip saving the ip
72 u64 ret[MAXDEPTH];
73};
74BPF_HASH(counts, struct key_t);
75BPF_HASH(start, u32);
76
77static u64 get_frame(u64 *bp) {
78 if (*bp) {
79 // The following stack walker is x86_64 specific
80 u64 ret = 0;
81 if (bpf_probe_read(&ret, sizeof(ret), (void *)(*bp+8)))
82 return 0;
83 if (bpf_probe_read(bp, sizeof(*bp), (void *)*bp))
Brenden Blanco04b05d52017-04-20 09:39:57 -070084 return 0;
Brendan Gregg7bf0e492016-01-27 23:17:40 -080085 if (ret < __START_KERNEL_map)
86 return 0;
87 return ret;
88 }
89 return 0;
90}
91
92int offcpu(struct pt_regs *ctx) {
93 u32 pid = bpf_get_current_pid_tgid();
94 u64 ts = bpf_ktime_get_ns();
95 // XXX: should filter here too, but need task_struct
96 start.update(&pid, &ts);
97 return 0;
98}
99
100int waker(struct pt_regs *ctx, struct task_struct *p) {
101 u32 pid = p->pid;
102 u64 delta, *tsp, ts;
103
104 tsp = start.lookup(&pid);
105 if (tsp == 0)
106 return 0; // missed start
107 start.delete(&pid);
108
109 if (FILTER)
110 return 0;
111
112 // calculate delta time
113 delta = bpf_ktime_get_ns() - *tsp;
114 delta = delta / 1000;
115 if (delta < MINBLOCK_US)
116 return 0;
117
118 struct key_t key = {};
119 u64 zero = 0, *val, bp = 0;
120 int depth = 0;
121
122 bpf_probe_read(&key.target, sizeof(key.target), p->comm);
123 bpf_get_current_comm(&key.waker, sizeof(key.waker));
124 bp = ctx->bp;
125
126 // unrolled loop (MAXDEPTH):
127 if (!(key.ret[depth++] = get_frame(&bp))) goto out;
128 if (!(key.ret[depth++] = get_frame(&bp))) goto out;
129 if (!(key.ret[depth++] = get_frame(&bp))) goto out;
130 if (!(key.ret[depth++] = get_frame(&bp))) goto out;
131 if (!(key.ret[depth++] = get_frame(&bp))) goto out;
132 if (!(key.ret[depth++] = get_frame(&bp))) goto out;
133 if (!(key.ret[depth++] = get_frame(&bp))) goto out;
134 if (!(key.ret[depth++] = get_frame(&bp))) goto out;
135 if (!(key.ret[depth++] = get_frame(&bp))) goto out;
136 if (!(key.ret[depth++] = get_frame(&bp))) goto out;
137
138 if (!(key.ret[depth++] = get_frame(&bp))) goto out;
139 if (!(key.ret[depth++] = get_frame(&bp))) goto out;
140 if (!(key.ret[depth++] = get_frame(&bp))) goto out;
141 if (!(key.ret[depth++] = get_frame(&bp))) goto out;
142 if (!(key.ret[depth++] = get_frame(&bp))) goto out;
143 if (!(key.ret[depth++] = get_frame(&bp))) goto out;
144 if (!(key.ret[depth++] = get_frame(&bp))) goto out;
145 if (!(key.ret[depth++] = get_frame(&bp))) goto out;
146 if (!(key.ret[depth++] = get_frame(&bp))) goto out;
147 if (!(key.ret[depth++] = get_frame(&bp))) goto out;
148
149out:
150 val = counts.lookup_or_init(&key, &zero);
151 (*val) += delta;
152 return 0;
153}
154"""
155if args.pid:
156 filter = 'pid != %s' % args.pid
157elif args.useronly:
158 filter = 'p->flags & PF_KTHREAD'
159else:
160 filter = '0'
161bpf_text = bpf_text.replace('FILTER', filter)
162if debug:
163 print(bpf_text)
164
165# initialize BPF
166b = BPF(text=bpf_text)
167b.attach_kprobe(event="schedule", fn_name="offcpu")
168b.attach_kprobe(event="try_to_wake_up", fn_name="waker")
169matched = b.num_open_kprobes()
170if matched == 0:
171 print("0 functions traced. Exiting.")
172 exit()
173
174# header
175if not folded:
176 print("Tracing blocked time (us) by kernel stack", end="")
177 if duration < 99999999:
178 print(" for %d secs." % duration)
179 else:
180 print("... Hit Ctrl-C to end.")
181
182# output
183while (1):
184 try:
185 sleep(duration)
186 except KeyboardInterrupt:
187 # as cleanup can take many seconds, trap Ctrl-C:
188 signal.signal(signal.SIGINT, signal_ignore)
189
190 if not folded:
191 print()
192 counts = b.get_table("counts")
193 for k, v in sorted(counts.items(), key=lambda counts: counts[1].value):
194 if folded:
195 # print folded stack output
Rafael F78948e42017-03-26 14:54:25 +0200196 line = k.waker.decode() + ";"
Brendan Gregg7bf0e492016-01-27 23:17:40 -0800197 for i in reversed(range(0, maxdepth)):
198 if k.ret[i] == 0:
199 continue
200 line = line + b.ksym(k.ret[i])
201 if i != 0:
202 line = line + ";"
Rafael F78948e42017-03-26 14:54:25 +0200203 print("%s;%s %d" % (line, k.target.decode(), v.value))
Brendan Gregg7bf0e492016-01-27 23:17:40 -0800204 else:
205 # print default multi-line stack output
Rafael F78948e42017-03-26 14:54:25 +0200206 print(" %-16s %s" % ("target:", k.target.decode()))
Brendan Gregg7bf0e492016-01-27 23:17:40 -0800207 for i in range(0, maxdepth):
208 if k.ret[i] == 0:
209 break
210 print(" %-16x %s" % (k.ret[i],
211 b.ksym(k.ret[i])))
Rafael F78948e42017-03-26 14:54:25 +0200212 print(" %-16s %s" % ("waker:", k.waker.decode()))
Brendan Gregg7bf0e492016-01-27 23:17:40 -0800213 print(" %d\n" % v.value)
214 counts.clear()
215
216 if not folded:
217 print("Detaching...")
218 exit()