prog.c 55 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419
  1. // SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
  2. /* Copyright (C) 2017-2018 Netronome Systems, Inc. */
  3. #define _GNU_SOURCE
  4. #include <errno.h>
  5. #include <fcntl.h>
  6. #include <signal.h>
  7. #include <stdarg.h>
  8. #include <stdio.h>
  9. #include <stdlib.h>
  10. #include <string.h>
  11. #include <time.h>
  12. #include <unistd.h>
  13. #include <net/if.h>
  14. #include <sys/ioctl.h>
  15. #include <sys/types.h>
  16. #include <sys/stat.h>
  17. #include <sys/syscall.h>
  18. #include <dirent.h>
  19. #include <linux/err.h>
  20. #include <linux/perf_event.h>
  21. #include <linux/sizes.h>
  22. #include <bpf/bpf.h>
  23. #include <bpf/btf.h>
  24. #include <bpf/hashmap.h>
  25. #include <bpf/libbpf.h>
  26. #include <bpf/libbpf_internal.h>
  27. #include <bpf/skel_internal.h>
  28. #include "cfg.h"
  29. #include "main.h"
  30. #include "xlated_dumper.h"
  31. #define BPF_METADATA_PREFIX "bpf_metadata_"
  32. #define BPF_METADATA_PREFIX_LEN (sizeof(BPF_METADATA_PREFIX) - 1)
  33. enum dump_mode {
  34. DUMP_JITED,
  35. DUMP_XLATED,
  36. };
  37. static const bool attach_types[] = {
  38. [BPF_SK_SKB_STREAM_PARSER] = true,
  39. [BPF_SK_SKB_STREAM_VERDICT] = true,
  40. [BPF_SK_SKB_VERDICT] = true,
  41. [BPF_SK_MSG_VERDICT] = true,
  42. [BPF_FLOW_DISSECTOR] = true,
  43. [__MAX_BPF_ATTACH_TYPE] = false,
  44. };
  45. /* Textual representations traditionally used by the program and kept around
  46. * for the sake of backwards compatibility.
  47. */
  48. static const char * const attach_type_strings[] = {
  49. [BPF_SK_SKB_STREAM_PARSER] = "stream_parser",
  50. [BPF_SK_SKB_STREAM_VERDICT] = "stream_verdict",
  51. [BPF_SK_SKB_VERDICT] = "skb_verdict",
  52. [BPF_SK_MSG_VERDICT] = "msg_verdict",
  53. [__MAX_BPF_ATTACH_TYPE] = NULL,
  54. };
  55. static struct hashmap *prog_table;
  56. static enum bpf_attach_type parse_attach_type(const char *str)
  57. {
  58. enum bpf_attach_type type;
  59. for (type = 0; type < __MAX_BPF_ATTACH_TYPE; type++) {
  60. if (attach_types[type]) {
  61. const char *attach_type_str;
  62. attach_type_str = libbpf_bpf_attach_type_str(type);
  63. if (!strcmp(str, attach_type_str))
  64. return type;
  65. }
  66. if (attach_type_strings[type] &&
  67. is_prefix(str, attach_type_strings[type]))
  68. return type;
  69. }
  70. return __MAX_BPF_ATTACH_TYPE;
  71. }
  72. static int prep_prog_info(struct bpf_prog_info *const info, enum dump_mode mode,
  73. void **info_data, size_t *const info_data_sz)
  74. {
  75. struct bpf_prog_info holder = {};
  76. size_t needed = 0;
  77. void *ptr;
  78. if (mode == DUMP_JITED) {
  79. holder.jited_prog_len = info->jited_prog_len;
  80. needed += info->jited_prog_len;
  81. } else {
  82. holder.xlated_prog_len = info->xlated_prog_len;
  83. needed += info->xlated_prog_len;
  84. }
  85. holder.nr_jited_ksyms = info->nr_jited_ksyms;
  86. needed += info->nr_jited_ksyms * sizeof(__u64);
  87. holder.nr_jited_func_lens = info->nr_jited_func_lens;
  88. needed += info->nr_jited_func_lens * sizeof(__u32);
  89. holder.nr_func_info = info->nr_func_info;
  90. holder.func_info_rec_size = info->func_info_rec_size;
  91. needed += info->nr_func_info * info->func_info_rec_size;
  92. holder.nr_line_info = info->nr_line_info;
  93. holder.line_info_rec_size = info->line_info_rec_size;
  94. needed += info->nr_line_info * info->line_info_rec_size;
  95. holder.nr_jited_line_info = info->nr_jited_line_info;
  96. holder.jited_line_info_rec_size = info->jited_line_info_rec_size;
  97. needed += info->nr_jited_line_info * info->jited_line_info_rec_size;
  98. if (needed > *info_data_sz) {
  99. ptr = realloc(*info_data, needed);
  100. if (!ptr)
  101. return -1;
  102. *info_data = ptr;
  103. *info_data_sz = needed;
  104. }
  105. ptr = *info_data;
  106. if (mode == DUMP_JITED) {
  107. holder.jited_prog_insns = ptr_to_u64(ptr);
  108. ptr += holder.jited_prog_len;
  109. } else {
  110. holder.xlated_prog_insns = ptr_to_u64(ptr);
  111. ptr += holder.xlated_prog_len;
  112. }
  113. holder.jited_ksyms = ptr_to_u64(ptr);
  114. ptr += holder.nr_jited_ksyms * sizeof(__u64);
  115. holder.jited_func_lens = ptr_to_u64(ptr);
  116. ptr += holder.nr_jited_func_lens * sizeof(__u32);
  117. holder.func_info = ptr_to_u64(ptr);
  118. ptr += holder.nr_func_info * holder.func_info_rec_size;
  119. holder.line_info = ptr_to_u64(ptr);
  120. ptr += holder.nr_line_info * holder.line_info_rec_size;
  121. holder.jited_line_info = ptr_to_u64(ptr);
  122. ptr += holder.nr_jited_line_info * holder.jited_line_info_rec_size;
  123. *info = holder;
  124. return 0;
  125. }
  126. static void print_boot_time(__u64 nsecs, char *buf, unsigned int size)
  127. {
  128. struct timespec real_time_ts, boot_time_ts;
  129. time_t wallclock_secs;
  130. struct tm load_tm;
  131. buf[--size] = '\0';
  132. if (clock_gettime(CLOCK_REALTIME, &real_time_ts) ||
  133. clock_gettime(CLOCK_BOOTTIME, &boot_time_ts)) {
  134. perror("Can't read clocks");
  135. snprintf(buf, size, "%llu", nsecs / 1000000000);
  136. return;
  137. }
  138. wallclock_secs = (real_time_ts.tv_sec - boot_time_ts.tv_sec) +
  139. (real_time_ts.tv_nsec - boot_time_ts.tv_nsec + nsecs) /
  140. 1000000000;
  141. if (!localtime_r(&wallclock_secs, &load_tm)) {
  142. snprintf(buf, size, "%llu", nsecs / 1000000000);
  143. return;
  144. }
  145. if (json_output)
  146. strftime(buf, size, "%s", &load_tm);
  147. else
  148. strftime(buf, size, "%FT%T%z", &load_tm);
  149. }
  150. static void show_prog_maps(int fd, __u32 num_maps)
  151. {
  152. struct bpf_prog_info info = {};
  153. __u32 len = sizeof(info);
  154. __u32 map_ids[num_maps];
  155. unsigned int i;
  156. int err;
  157. info.nr_map_ids = num_maps;
  158. info.map_ids = ptr_to_u64(map_ids);
  159. err = bpf_obj_get_info_by_fd(fd, &info, &len);
  160. if (err || !info.nr_map_ids)
  161. return;
  162. if (json_output) {
  163. jsonw_name(json_wtr, "map_ids");
  164. jsonw_start_array(json_wtr);
  165. for (i = 0; i < info.nr_map_ids; i++)
  166. jsonw_uint(json_wtr, map_ids[i]);
  167. jsonw_end_array(json_wtr);
  168. } else {
  169. printf(" map_ids ");
  170. for (i = 0; i < info.nr_map_ids; i++)
  171. printf("%u%s", map_ids[i],
  172. i == info.nr_map_ids - 1 ? "" : ",");
  173. }
  174. }
  175. static void *find_metadata(int prog_fd, struct bpf_map_info *map_info)
  176. {
  177. struct bpf_prog_info prog_info;
  178. __u32 prog_info_len;
  179. __u32 map_info_len;
  180. void *value = NULL;
  181. __u32 *map_ids;
  182. int nr_maps;
  183. int key = 0;
  184. int map_fd;
  185. int ret;
  186. __u32 i;
  187. memset(&prog_info, 0, sizeof(prog_info));
  188. prog_info_len = sizeof(prog_info);
  189. ret = bpf_obj_get_info_by_fd(prog_fd, &prog_info, &prog_info_len);
  190. if (ret)
  191. return NULL;
  192. if (!prog_info.nr_map_ids)
  193. return NULL;
  194. map_ids = calloc(prog_info.nr_map_ids, sizeof(__u32));
  195. if (!map_ids)
  196. return NULL;
  197. nr_maps = prog_info.nr_map_ids;
  198. memset(&prog_info, 0, sizeof(prog_info));
  199. prog_info.nr_map_ids = nr_maps;
  200. prog_info.map_ids = ptr_to_u64(map_ids);
  201. prog_info_len = sizeof(prog_info);
  202. ret = bpf_obj_get_info_by_fd(prog_fd, &prog_info, &prog_info_len);
  203. if (ret)
  204. goto free_map_ids;
  205. for (i = 0; i < prog_info.nr_map_ids; i++) {
  206. map_fd = bpf_map_get_fd_by_id(map_ids[i]);
  207. if (map_fd < 0)
  208. goto free_map_ids;
  209. memset(map_info, 0, sizeof(*map_info));
  210. map_info_len = sizeof(*map_info);
  211. ret = bpf_obj_get_info_by_fd(map_fd, map_info, &map_info_len);
  212. if (ret < 0) {
  213. close(map_fd);
  214. goto free_map_ids;
  215. }
  216. if (map_info->type != BPF_MAP_TYPE_ARRAY ||
  217. map_info->key_size != sizeof(int) ||
  218. map_info->max_entries != 1 ||
  219. !map_info->btf_value_type_id ||
  220. !strstr(map_info->name, ".rodata")) {
  221. close(map_fd);
  222. continue;
  223. }
  224. value = malloc(map_info->value_size);
  225. if (!value) {
  226. close(map_fd);
  227. goto free_map_ids;
  228. }
  229. if (bpf_map_lookup_elem(map_fd, &key, value)) {
  230. close(map_fd);
  231. free(value);
  232. value = NULL;
  233. goto free_map_ids;
  234. }
  235. close(map_fd);
  236. break;
  237. }
  238. free_map_ids:
  239. free(map_ids);
  240. return value;
  241. }
  242. static bool has_metadata_prefix(const char *s)
  243. {
  244. return strncmp(s, BPF_METADATA_PREFIX, BPF_METADATA_PREFIX_LEN) == 0;
  245. }
  246. static void show_prog_metadata(int fd, __u32 num_maps)
  247. {
  248. const struct btf_type *t_datasec, *t_var;
  249. struct bpf_map_info map_info;
  250. struct btf_var_secinfo *vsi;
  251. bool printed_header = false;
  252. unsigned int i, vlen;
  253. void *value = NULL;
  254. const char *name;
  255. struct btf *btf;
  256. int err;
  257. if (!num_maps)
  258. return;
  259. memset(&map_info, 0, sizeof(map_info));
  260. value = find_metadata(fd, &map_info);
  261. if (!value)
  262. return;
  263. btf = btf__load_from_kernel_by_id(map_info.btf_id);
  264. if (libbpf_get_error(btf))
  265. goto out_free;
  266. t_datasec = btf__type_by_id(btf, map_info.btf_value_type_id);
  267. if (!btf_is_datasec(t_datasec))
  268. goto out_free;
  269. vlen = btf_vlen(t_datasec);
  270. vsi = btf_var_secinfos(t_datasec);
  271. /* We don't proceed to check the kinds of the elements of the DATASEC.
  272. * The verifier enforces them to be BTF_KIND_VAR.
  273. */
  274. if (json_output) {
  275. struct btf_dumper d = {
  276. .btf = btf,
  277. .jw = json_wtr,
  278. .is_plain_text = false,
  279. };
  280. for (i = 0; i < vlen; i++, vsi++) {
  281. t_var = btf__type_by_id(btf, vsi->type);
  282. name = btf__name_by_offset(btf, t_var->name_off);
  283. if (!has_metadata_prefix(name))
  284. continue;
  285. if (!printed_header) {
  286. jsonw_name(json_wtr, "metadata");
  287. jsonw_start_object(json_wtr);
  288. printed_header = true;
  289. }
  290. jsonw_name(json_wtr, name + BPF_METADATA_PREFIX_LEN);
  291. err = btf_dumper_type(&d, t_var->type, value + vsi->offset);
  292. if (err) {
  293. p_err("btf dump failed: %d", err);
  294. break;
  295. }
  296. }
  297. if (printed_header)
  298. jsonw_end_object(json_wtr);
  299. } else {
  300. json_writer_t *btf_wtr;
  301. struct btf_dumper d = {
  302. .btf = btf,
  303. .is_plain_text = true,
  304. };
  305. for (i = 0; i < vlen; i++, vsi++) {
  306. t_var = btf__type_by_id(btf, vsi->type);
  307. name = btf__name_by_offset(btf, t_var->name_off);
  308. if (!has_metadata_prefix(name))
  309. continue;
  310. if (!printed_header) {
  311. printf("\tmetadata:");
  312. btf_wtr = jsonw_new(stdout);
  313. if (!btf_wtr) {
  314. p_err("jsonw alloc failed");
  315. goto out_free;
  316. }
  317. d.jw = btf_wtr,
  318. printed_header = true;
  319. }
  320. printf("\n\t\t%s = ", name + BPF_METADATA_PREFIX_LEN);
  321. jsonw_reset(btf_wtr);
  322. err = btf_dumper_type(&d, t_var->type, value + vsi->offset);
  323. if (err) {
  324. p_err("btf dump failed: %d", err);
  325. break;
  326. }
  327. }
  328. if (printed_header)
  329. jsonw_destroy(&btf_wtr);
  330. }
  331. out_free:
  332. btf__free(btf);
  333. free(value);
  334. }
  335. static void print_prog_header_json(struct bpf_prog_info *info, int fd)
  336. {
  337. const char *prog_type_str;
  338. char prog_name[MAX_PROG_FULL_NAME];
  339. jsonw_uint_field(json_wtr, "id", info->id);
  340. prog_type_str = libbpf_bpf_prog_type_str(info->type);
  341. if (prog_type_str)
  342. jsonw_string_field(json_wtr, "type", prog_type_str);
  343. else
  344. jsonw_uint_field(json_wtr, "type", info->type);
  345. if (*info->name) {
  346. get_prog_full_name(info, fd, prog_name, sizeof(prog_name));
  347. jsonw_string_field(json_wtr, "name", prog_name);
  348. }
  349. jsonw_name(json_wtr, "tag");
  350. jsonw_printf(json_wtr, "\"" BPF_TAG_FMT "\"",
  351. info->tag[0], info->tag[1], info->tag[2], info->tag[3],
  352. info->tag[4], info->tag[5], info->tag[6], info->tag[7]);
  353. jsonw_bool_field(json_wtr, "gpl_compatible", info->gpl_compatible);
  354. if (info->run_time_ns) {
  355. jsonw_uint_field(json_wtr, "run_time_ns", info->run_time_ns);
  356. jsonw_uint_field(json_wtr, "run_cnt", info->run_cnt);
  357. }
  358. if (info->recursion_misses)
  359. jsonw_uint_field(json_wtr, "recursion_misses", info->recursion_misses);
  360. }
  361. static void print_prog_json(struct bpf_prog_info *info, int fd)
  362. {
  363. char *memlock;
  364. jsonw_start_object(json_wtr);
  365. print_prog_header_json(info, fd);
  366. print_dev_json(info->ifindex, info->netns_dev, info->netns_ino);
  367. if (info->load_time) {
  368. char buf[32];
  369. print_boot_time(info->load_time, buf, sizeof(buf));
  370. /* Piggy back on load_time, since 0 uid is a valid one */
  371. jsonw_name(json_wtr, "loaded_at");
  372. jsonw_printf(json_wtr, "%s", buf);
  373. jsonw_uint_field(json_wtr, "uid", info->created_by_uid);
  374. }
  375. jsonw_uint_field(json_wtr, "bytes_xlated", info->xlated_prog_len);
  376. if (info->jited_prog_len) {
  377. jsonw_bool_field(json_wtr, "jited", true);
  378. jsonw_uint_field(json_wtr, "bytes_jited", info->jited_prog_len);
  379. } else {
  380. jsonw_bool_field(json_wtr, "jited", false);
  381. }
  382. memlock = get_fdinfo(fd, "memlock");
  383. if (memlock)
  384. jsonw_int_field(json_wtr, "bytes_memlock", atoll(memlock));
  385. free(memlock);
  386. if (info->nr_map_ids)
  387. show_prog_maps(fd, info->nr_map_ids);
  388. if (info->btf_id)
  389. jsonw_int_field(json_wtr, "btf_id", info->btf_id);
  390. if (!hashmap__empty(prog_table)) {
  391. struct hashmap_entry *entry;
  392. jsonw_name(json_wtr, "pinned");
  393. jsonw_start_array(json_wtr);
  394. hashmap__for_each_key_entry(prog_table, entry,
  395. u32_as_hash_field(info->id))
  396. jsonw_string(json_wtr, entry->value);
  397. jsonw_end_array(json_wtr);
  398. }
  399. emit_obj_refs_json(refs_table, info->id, json_wtr);
  400. show_prog_metadata(fd, info->nr_map_ids);
  401. jsonw_end_object(json_wtr);
  402. }
  403. static void print_prog_header_plain(struct bpf_prog_info *info, int fd)
  404. {
  405. const char *prog_type_str;
  406. char prog_name[MAX_PROG_FULL_NAME];
  407. printf("%u: ", info->id);
  408. prog_type_str = libbpf_bpf_prog_type_str(info->type);
  409. if (prog_type_str)
  410. printf("%s ", prog_type_str);
  411. else
  412. printf("type %u ", info->type);
  413. if (*info->name) {
  414. get_prog_full_name(info, fd, prog_name, sizeof(prog_name));
  415. printf("name %s ", prog_name);
  416. }
  417. printf("tag ");
  418. fprint_hex(stdout, info->tag, BPF_TAG_SIZE, "");
  419. print_dev_plain(info->ifindex, info->netns_dev, info->netns_ino);
  420. printf("%s", info->gpl_compatible ? " gpl" : "");
  421. if (info->run_time_ns)
  422. printf(" run_time_ns %lld run_cnt %lld",
  423. info->run_time_ns, info->run_cnt);
  424. if (info->recursion_misses)
  425. printf(" recursion_misses %lld", info->recursion_misses);
  426. printf("\n");
  427. }
  428. static void print_prog_plain(struct bpf_prog_info *info, int fd)
  429. {
  430. char *memlock;
  431. print_prog_header_plain(info, fd);
  432. if (info->load_time) {
  433. char buf[32];
  434. print_boot_time(info->load_time, buf, sizeof(buf));
  435. /* Piggy back on load_time, since 0 uid is a valid one */
  436. printf("\tloaded_at %s uid %u\n", buf, info->created_by_uid);
  437. }
  438. printf("\txlated %uB", info->xlated_prog_len);
  439. if (info->jited_prog_len)
  440. printf(" jited %uB", info->jited_prog_len);
  441. else
  442. printf(" not jited");
  443. memlock = get_fdinfo(fd, "memlock");
  444. if (memlock)
  445. printf(" memlock %sB", memlock);
  446. free(memlock);
  447. if (info->nr_map_ids)
  448. show_prog_maps(fd, info->nr_map_ids);
  449. if (!hashmap__empty(prog_table)) {
  450. struct hashmap_entry *entry;
  451. hashmap__for_each_key_entry(prog_table, entry,
  452. u32_as_hash_field(info->id))
  453. printf("\n\tpinned %s", (char *)entry->value);
  454. }
  455. if (info->btf_id)
  456. printf("\n\tbtf_id %d", info->btf_id);
  457. emit_obj_refs_plain(refs_table, info->id, "\n\tpids ");
  458. printf("\n");
  459. show_prog_metadata(fd, info->nr_map_ids);
  460. }
  461. static int show_prog(int fd)
  462. {
  463. struct bpf_prog_info info = {};
  464. __u32 len = sizeof(info);
  465. int err;
  466. err = bpf_obj_get_info_by_fd(fd, &info, &len);
  467. if (err) {
  468. p_err("can't get prog info: %s", strerror(errno));
  469. return -1;
  470. }
  471. if (json_output)
  472. print_prog_json(&info, fd);
  473. else
  474. print_prog_plain(&info, fd);
  475. return 0;
  476. }
  477. static int do_show_subset(int argc, char **argv)
  478. {
  479. int *fds = NULL;
  480. int nb_fds, i;
  481. int err = -1;
  482. fds = malloc(sizeof(int));
  483. if (!fds) {
  484. p_err("mem alloc failed");
  485. return -1;
  486. }
  487. nb_fds = prog_parse_fds(&argc, &argv, &fds);
  488. if (nb_fds < 1)
  489. goto exit_free;
  490. if (json_output && nb_fds > 1)
  491. jsonw_start_array(json_wtr); /* root array */
  492. for (i = 0; i < nb_fds; i++) {
  493. err = show_prog(fds[i]);
  494. if (err) {
  495. for (; i < nb_fds; i++)
  496. close(fds[i]);
  497. break;
  498. }
  499. close(fds[i]);
  500. }
  501. if (json_output && nb_fds > 1)
  502. jsonw_end_array(json_wtr); /* root array */
  503. exit_free:
  504. free(fds);
  505. return err;
  506. }
  507. static int do_show(int argc, char **argv)
  508. {
  509. __u32 id = 0;
  510. int err;
  511. int fd;
  512. if (show_pinned) {
  513. prog_table = hashmap__new(hash_fn_for_key_as_id,
  514. equal_fn_for_key_as_id, NULL);
  515. if (IS_ERR(prog_table)) {
  516. p_err("failed to create hashmap for pinned paths");
  517. return -1;
  518. }
  519. build_pinned_obj_table(prog_table, BPF_OBJ_PROG);
  520. }
  521. build_obj_refs_table(&refs_table, BPF_OBJ_PROG);
  522. if (argc == 2)
  523. return do_show_subset(argc, argv);
  524. if (argc)
  525. return BAD_ARG();
  526. if (json_output)
  527. jsonw_start_array(json_wtr);
  528. while (true) {
  529. err = bpf_prog_get_next_id(id, &id);
  530. if (err) {
  531. if (errno == ENOENT) {
  532. err = 0;
  533. break;
  534. }
  535. p_err("can't get next program: %s%s", strerror(errno),
  536. errno == EINVAL ? " -- kernel too old?" : "");
  537. err = -1;
  538. break;
  539. }
  540. fd = bpf_prog_get_fd_by_id(id);
  541. if (fd < 0) {
  542. if (errno == ENOENT)
  543. continue;
  544. p_err("can't get prog by id (%u): %s",
  545. id, strerror(errno));
  546. err = -1;
  547. break;
  548. }
  549. err = show_prog(fd);
  550. close(fd);
  551. if (err)
  552. break;
  553. }
  554. if (json_output)
  555. jsonw_end_array(json_wtr);
  556. delete_obj_refs_table(refs_table);
  557. if (show_pinned)
  558. delete_pinned_obj_table(prog_table);
  559. return err;
  560. }
  561. static int
  562. prog_dump(struct bpf_prog_info *info, enum dump_mode mode,
  563. char *filepath, bool opcodes, bool visual, bool linum)
  564. {
  565. struct bpf_prog_linfo *prog_linfo = NULL;
  566. const char *disasm_opt = NULL;
  567. struct dump_data dd = {};
  568. void *func_info = NULL;
  569. struct btf *btf = NULL;
  570. char func_sig[1024];
  571. unsigned char *buf;
  572. __u32 member_len;
  573. int fd, err = -1;
  574. ssize_t n;
  575. if (mode == DUMP_JITED) {
  576. if (info->jited_prog_len == 0 || !info->jited_prog_insns) {
  577. p_info("no instructions returned");
  578. return -1;
  579. }
  580. buf = u64_to_ptr(info->jited_prog_insns);
  581. member_len = info->jited_prog_len;
  582. } else { /* DUMP_XLATED */
  583. if (info->xlated_prog_len == 0 || !info->xlated_prog_insns) {
  584. p_err("error retrieving insn dump: kernel.kptr_restrict set?");
  585. return -1;
  586. }
  587. buf = u64_to_ptr(info->xlated_prog_insns);
  588. member_len = info->xlated_prog_len;
  589. }
  590. if (info->btf_id) {
  591. btf = btf__load_from_kernel_by_id(info->btf_id);
  592. if (libbpf_get_error(btf)) {
  593. p_err("failed to get btf");
  594. return -1;
  595. }
  596. }
  597. func_info = u64_to_ptr(info->func_info);
  598. if (info->nr_line_info) {
  599. prog_linfo = bpf_prog_linfo__new(info);
  600. if (!prog_linfo)
  601. p_info("error in processing bpf_line_info. continue without it.");
  602. }
  603. if (filepath) {
  604. fd = open(filepath, O_WRONLY | O_CREAT | O_TRUNC, 0600);
  605. if (fd < 0) {
  606. p_err("can't open file %s: %s", filepath,
  607. strerror(errno));
  608. goto exit_free;
  609. }
  610. n = write(fd, buf, member_len);
  611. close(fd);
  612. if (n != (ssize_t)member_len) {
  613. p_err("error writing output file: %s",
  614. n < 0 ? strerror(errno) : "short write");
  615. goto exit_free;
  616. }
  617. if (json_output)
  618. jsonw_null(json_wtr);
  619. } else if (mode == DUMP_JITED) {
  620. const char *name = NULL;
  621. if (info->ifindex) {
  622. name = ifindex_to_bfd_params(info->ifindex,
  623. info->netns_dev,
  624. info->netns_ino,
  625. &disasm_opt);
  626. if (!name)
  627. goto exit_free;
  628. }
  629. if (info->nr_jited_func_lens && info->jited_func_lens) {
  630. struct kernel_sym *sym = NULL;
  631. struct bpf_func_info *record;
  632. char sym_name[SYM_MAX_NAME];
  633. unsigned char *img = buf;
  634. __u64 *ksyms = NULL;
  635. __u32 *lens;
  636. __u32 i;
  637. if (info->nr_jited_ksyms) {
  638. kernel_syms_load(&dd);
  639. ksyms = u64_to_ptr(info->jited_ksyms);
  640. }
  641. if (json_output)
  642. jsonw_start_array(json_wtr);
  643. lens = u64_to_ptr(info->jited_func_lens);
  644. for (i = 0; i < info->nr_jited_func_lens; i++) {
  645. if (ksyms) {
  646. sym = kernel_syms_search(&dd, ksyms[i]);
  647. if (sym)
  648. sprintf(sym_name, "%s", sym->name);
  649. else
  650. sprintf(sym_name, "0x%016llx", ksyms[i]);
  651. } else {
  652. strcpy(sym_name, "unknown");
  653. }
  654. if (func_info) {
  655. record = func_info + i * info->func_info_rec_size;
  656. btf_dumper_type_only(btf, record->type_id,
  657. func_sig,
  658. sizeof(func_sig));
  659. }
  660. if (json_output) {
  661. jsonw_start_object(json_wtr);
  662. if (func_info && func_sig[0] != '\0') {
  663. jsonw_name(json_wtr, "proto");
  664. jsonw_string(json_wtr, func_sig);
  665. }
  666. jsonw_name(json_wtr, "name");
  667. jsonw_string(json_wtr, sym_name);
  668. jsonw_name(json_wtr, "insns");
  669. } else {
  670. if (func_info && func_sig[0] != '\0')
  671. printf("%s:\n", func_sig);
  672. printf("%s:\n", sym_name);
  673. }
  674. disasm_print_insn(img, lens[i], opcodes,
  675. name, disasm_opt, btf,
  676. prog_linfo, ksyms[i], i,
  677. linum);
  678. img += lens[i];
  679. if (json_output)
  680. jsonw_end_object(json_wtr);
  681. else
  682. printf("\n");
  683. }
  684. if (json_output)
  685. jsonw_end_array(json_wtr);
  686. } else {
  687. disasm_print_insn(buf, member_len, opcodes, name,
  688. disasm_opt, btf, NULL, 0, 0, false);
  689. }
  690. } else if (visual) {
  691. if (json_output)
  692. jsonw_null(json_wtr);
  693. else
  694. dump_xlated_cfg(buf, member_len);
  695. } else {
  696. kernel_syms_load(&dd);
  697. dd.nr_jited_ksyms = info->nr_jited_ksyms;
  698. dd.jited_ksyms = u64_to_ptr(info->jited_ksyms);
  699. dd.btf = btf;
  700. dd.func_info = func_info;
  701. dd.finfo_rec_size = info->func_info_rec_size;
  702. dd.prog_linfo = prog_linfo;
  703. if (json_output)
  704. dump_xlated_json(&dd, buf, member_len, opcodes,
  705. linum);
  706. else
  707. dump_xlated_plain(&dd, buf, member_len, opcodes,
  708. linum);
  709. kernel_syms_destroy(&dd);
  710. }
  711. err = 0;
  712. exit_free:
  713. btf__free(btf);
  714. bpf_prog_linfo__free(prog_linfo);
  715. return err;
  716. }
  717. static int do_dump(int argc, char **argv)
  718. {
  719. struct bpf_prog_info info;
  720. __u32 info_len = sizeof(info);
  721. size_t info_data_sz = 0;
  722. void *info_data = NULL;
  723. char *filepath = NULL;
  724. bool opcodes = false;
  725. bool visual = false;
  726. enum dump_mode mode;
  727. bool linum = false;
  728. int nb_fds, i = 0;
  729. int *fds = NULL;
  730. int err = -1;
  731. if (is_prefix(*argv, "jited")) {
  732. if (disasm_init())
  733. return -1;
  734. mode = DUMP_JITED;
  735. } else if (is_prefix(*argv, "xlated")) {
  736. mode = DUMP_XLATED;
  737. } else {
  738. p_err("expected 'xlated' or 'jited', got: %s", *argv);
  739. return -1;
  740. }
  741. NEXT_ARG();
  742. if (argc < 2)
  743. usage();
  744. fds = malloc(sizeof(int));
  745. if (!fds) {
  746. p_err("mem alloc failed");
  747. return -1;
  748. }
  749. nb_fds = prog_parse_fds(&argc, &argv, &fds);
  750. if (nb_fds < 1)
  751. goto exit_free;
  752. if (is_prefix(*argv, "file")) {
  753. NEXT_ARG();
  754. if (!argc) {
  755. p_err("expected file path");
  756. goto exit_close;
  757. }
  758. if (nb_fds > 1) {
  759. p_err("several programs matched");
  760. goto exit_close;
  761. }
  762. filepath = *argv;
  763. NEXT_ARG();
  764. } else if (is_prefix(*argv, "opcodes")) {
  765. opcodes = true;
  766. NEXT_ARG();
  767. } else if (is_prefix(*argv, "visual")) {
  768. if (nb_fds > 1) {
  769. p_err("several programs matched");
  770. goto exit_close;
  771. }
  772. visual = true;
  773. NEXT_ARG();
  774. } else if (is_prefix(*argv, "linum")) {
  775. linum = true;
  776. NEXT_ARG();
  777. }
  778. if (argc) {
  779. usage();
  780. goto exit_close;
  781. }
  782. if (json_output && nb_fds > 1)
  783. jsonw_start_array(json_wtr); /* root array */
  784. for (i = 0; i < nb_fds; i++) {
  785. memset(&info, 0, sizeof(info));
  786. err = bpf_obj_get_info_by_fd(fds[i], &info, &info_len);
  787. if (err) {
  788. p_err("can't get prog info: %s", strerror(errno));
  789. break;
  790. }
  791. err = prep_prog_info(&info, mode, &info_data, &info_data_sz);
  792. if (err) {
  793. p_err("can't grow prog info_data");
  794. break;
  795. }
  796. err = bpf_obj_get_info_by_fd(fds[i], &info, &info_len);
  797. if (err) {
  798. p_err("can't get prog info: %s", strerror(errno));
  799. break;
  800. }
  801. if (json_output && nb_fds > 1) {
  802. jsonw_start_object(json_wtr); /* prog object */
  803. print_prog_header_json(&info, fds[i]);
  804. jsonw_name(json_wtr, "insns");
  805. } else if (nb_fds > 1) {
  806. print_prog_header_plain(&info, fds[i]);
  807. }
  808. err = prog_dump(&info, mode, filepath, opcodes, visual, linum);
  809. if (json_output && nb_fds > 1)
  810. jsonw_end_object(json_wtr); /* prog object */
  811. else if (i != nb_fds - 1 && nb_fds > 1)
  812. printf("\n");
  813. if (err)
  814. break;
  815. close(fds[i]);
  816. }
  817. if (json_output && nb_fds > 1)
  818. jsonw_end_array(json_wtr); /* root array */
  819. exit_close:
  820. for (; i < nb_fds; i++)
  821. close(fds[i]);
  822. exit_free:
  823. free(info_data);
  824. free(fds);
  825. return err;
  826. }
  827. static int do_pin(int argc, char **argv)
  828. {
  829. int err;
  830. err = do_pin_any(argc, argv, prog_parse_fd);
  831. if (!err && json_output)
  832. jsonw_null(json_wtr);
  833. return err;
  834. }
  835. struct map_replace {
  836. int idx;
  837. int fd;
  838. char *name;
  839. };
  840. static int map_replace_compar(const void *p1, const void *p2)
  841. {
  842. const struct map_replace *a = p1, *b = p2;
  843. return a->idx - b->idx;
  844. }
  845. static int parse_attach_detach_args(int argc, char **argv, int *progfd,
  846. enum bpf_attach_type *attach_type,
  847. int *mapfd)
  848. {
  849. if (!REQ_ARGS(3))
  850. return -EINVAL;
  851. *progfd = prog_parse_fd(&argc, &argv);
  852. if (*progfd < 0)
  853. return *progfd;
  854. *attach_type = parse_attach_type(*argv);
  855. if (*attach_type == __MAX_BPF_ATTACH_TYPE) {
  856. p_err("invalid attach/detach type");
  857. return -EINVAL;
  858. }
  859. if (*attach_type == BPF_FLOW_DISSECTOR) {
  860. *mapfd = 0;
  861. return 0;
  862. }
  863. NEXT_ARG();
  864. if (!REQ_ARGS(2))
  865. return -EINVAL;
  866. *mapfd = map_parse_fd(&argc, &argv);
  867. if (*mapfd < 0)
  868. return *mapfd;
  869. return 0;
  870. }
  871. static int do_attach(int argc, char **argv)
  872. {
  873. enum bpf_attach_type attach_type;
  874. int err, progfd;
  875. int mapfd;
  876. err = parse_attach_detach_args(argc, argv,
  877. &progfd, &attach_type, &mapfd);
  878. if (err)
  879. return err;
  880. err = bpf_prog_attach(progfd, mapfd, attach_type, 0);
  881. if (err) {
  882. p_err("failed prog attach to map");
  883. return -EINVAL;
  884. }
  885. if (json_output)
  886. jsonw_null(json_wtr);
  887. return 0;
  888. }
  889. static int do_detach(int argc, char **argv)
  890. {
  891. enum bpf_attach_type attach_type;
  892. int err, progfd;
  893. int mapfd;
  894. err = parse_attach_detach_args(argc, argv,
  895. &progfd, &attach_type, &mapfd);
  896. if (err)
  897. return err;
  898. err = bpf_prog_detach2(progfd, mapfd, attach_type);
  899. if (err) {
  900. p_err("failed prog detach from map");
  901. return -EINVAL;
  902. }
  903. if (json_output)
  904. jsonw_null(json_wtr);
  905. return 0;
  906. }
  907. static int check_single_stdin(char *file_data_in, char *file_ctx_in)
  908. {
  909. if (file_data_in && file_ctx_in &&
  910. !strcmp(file_data_in, "-") && !strcmp(file_ctx_in, "-")) {
  911. p_err("cannot use standard input for both data_in and ctx_in");
  912. return -1;
  913. }
  914. return 0;
  915. }
  916. static int get_run_data(const char *fname, void **data_ptr, unsigned int *size)
  917. {
  918. size_t block_size = 256;
  919. size_t buf_size = block_size;
  920. size_t nb_read = 0;
  921. void *tmp;
  922. FILE *f;
  923. if (!fname) {
  924. *data_ptr = NULL;
  925. *size = 0;
  926. return 0;
  927. }
  928. if (!strcmp(fname, "-"))
  929. f = stdin;
  930. else
  931. f = fopen(fname, "r");
  932. if (!f) {
  933. p_err("failed to open %s: %s", fname, strerror(errno));
  934. return -1;
  935. }
  936. *data_ptr = malloc(block_size);
  937. if (!*data_ptr) {
  938. p_err("failed to allocate memory for data_in/ctx_in: %s",
  939. strerror(errno));
  940. goto err_fclose;
  941. }
  942. while ((nb_read += fread(*data_ptr + nb_read, 1, block_size, f))) {
  943. if (feof(f))
  944. break;
  945. if (ferror(f)) {
  946. p_err("failed to read data_in/ctx_in from %s: %s",
  947. fname, strerror(errno));
  948. goto err_free;
  949. }
  950. if (nb_read > buf_size - block_size) {
  951. if (buf_size == UINT32_MAX) {
  952. p_err("data_in/ctx_in is too long (max: %d)",
  953. UINT32_MAX);
  954. goto err_free;
  955. }
  956. /* No space for fread()-ing next chunk; realloc() */
  957. buf_size *= 2;
  958. tmp = realloc(*data_ptr, buf_size);
  959. if (!tmp) {
  960. p_err("failed to reallocate data_in/ctx_in: %s",
  961. strerror(errno));
  962. goto err_free;
  963. }
  964. *data_ptr = tmp;
  965. }
  966. }
  967. if (f != stdin)
  968. fclose(f);
  969. *size = nb_read;
  970. return 0;
  971. err_free:
  972. free(*data_ptr);
  973. *data_ptr = NULL;
  974. err_fclose:
  975. if (f != stdin)
  976. fclose(f);
  977. return -1;
  978. }
  979. static void hex_print(void *data, unsigned int size, FILE *f)
  980. {
  981. size_t i, j;
  982. char c;
  983. for (i = 0; i < size; i += 16) {
  984. /* Row offset */
  985. fprintf(f, "%07zx\t", i);
  986. /* Hexadecimal values */
  987. for (j = i; j < i + 16 && j < size; j++)
  988. fprintf(f, "%02x%s", *(uint8_t *)(data + j),
  989. j % 2 ? " " : "");
  990. for (; j < i + 16; j++)
  991. fprintf(f, " %s", j % 2 ? " " : "");
  992. /* ASCII values (if relevant), '.' otherwise */
  993. fprintf(f, "| ");
  994. for (j = i; j < i + 16 && j < size; j++) {
  995. c = *(char *)(data + j);
  996. if (c < ' ' || c > '~')
  997. c = '.';
  998. fprintf(f, "%c%s", c, j == i + 7 ? " " : "");
  999. }
  1000. fprintf(f, "\n");
  1001. }
  1002. }
  1003. static int
  1004. print_run_output(void *data, unsigned int size, const char *fname,
  1005. const char *json_key)
  1006. {
  1007. size_t nb_written;
  1008. FILE *f;
  1009. if (!fname)
  1010. return 0;
  1011. if (!strcmp(fname, "-")) {
  1012. f = stdout;
  1013. if (json_output) {
  1014. jsonw_name(json_wtr, json_key);
  1015. print_data_json(data, size);
  1016. } else {
  1017. hex_print(data, size, f);
  1018. }
  1019. return 0;
  1020. }
  1021. f = fopen(fname, "w");
  1022. if (!f) {
  1023. p_err("failed to open %s: %s", fname, strerror(errno));
  1024. return -1;
  1025. }
  1026. nb_written = fwrite(data, 1, size, f);
  1027. fclose(f);
  1028. if (nb_written != size) {
  1029. p_err("failed to write output data/ctx: %s", strerror(errno));
  1030. return -1;
  1031. }
  1032. return 0;
  1033. }
  1034. static int alloc_run_data(void **data_ptr, unsigned int size_out)
  1035. {
  1036. *data_ptr = calloc(size_out, 1);
  1037. if (!*data_ptr) {
  1038. p_err("failed to allocate memory for output data/ctx: %s",
  1039. strerror(errno));
  1040. return -1;
  1041. }
  1042. return 0;
  1043. }
  1044. static int do_run(int argc, char **argv)
  1045. {
  1046. char *data_fname_in = NULL, *data_fname_out = NULL;
  1047. char *ctx_fname_in = NULL, *ctx_fname_out = NULL;
  1048. const unsigned int default_size = SZ_32K;
  1049. void *data_in = NULL, *data_out = NULL;
  1050. void *ctx_in = NULL, *ctx_out = NULL;
  1051. unsigned int repeat = 1;
  1052. int fd, err;
  1053. LIBBPF_OPTS(bpf_test_run_opts, test_attr);
  1054. if (!REQ_ARGS(4))
  1055. return -1;
  1056. fd = prog_parse_fd(&argc, &argv);
  1057. if (fd < 0)
  1058. return -1;
  1059. while (argc) {
  1060. if (detect_common_prefix(*argv, "data_in", "data_out",
  1061. "data_size_out", NULL))
  1062. return -1;
  1063. if (detect_common_prefix(*argv, "ctx_in", "ctx_out",
  1064. "ctx_size_out", NULL))
  1065. return -1;
  1066. if (is_prefix(*argv, "data_in")) {
  1067. NEXT_ARG();
  1068. if (!REQ_ARGS(1))
  1069. return -1;
  1070. data_fname_in = GET_ARG();
  1071. if (check_single_stdin(data_fname_in, ctx_fname_in))
  1072. return -1;
  1073. } else if (is_prefix(*argv, "data_out")) {
  1074. NEXT_ARG();
  1075. if (!REQ_ARGS(1))
  1076. return -1;
  1077. data_fname_out = GET_ARG();
  1078. } else if (is_prefix(*argv, "data_size_out")) {
  1079. char *endptr;
  1080. NEXT_ARG();
  1081. if (!REQ_ARGS(1))
  1082. return -1;
  1083. test_attr.data_size_out = strtoul(*argv, &endptr, 0);
  1084. if (*endptr) {
  1085. p_err("can't parse %s as output data size",
  1086. *argv);
  1087. return -1;
  1088. }
  1089. NEXT_ARG();
  1090. } else if (is_prefix(*argv, "ctx_in")) {
  1091. NEXT_ARG();
  1092. if (!REQ_ARGS(1))
  1093. return -1;
  1094. ctx_fname_in = GET_ARG();
  1095. if (check_single_stdin(data_fname_in, ctx_fname_in))
  1096. return -1;
  1097. } else if (is_prefix(*argv, "ctx_out")) {
  1098. NEXT_ARG();
  1099. if (!REQ_ARGS(1))
  1100. return -1;
  1101. ctx_fname_out = GET_ARG();
  1102. } else if (is_prefix(*argv, "ctx_size_out")) {
  1103. char *endptr;
  1104. NEXT_ARG();
  1105. if (!REQ_ARGS(1))
  1106. return -1;
  1107. test_attr.ctx_size_out = strtoul(*argv, &endptr, 0);
  1108. if (*endptr) {
  1109. p_err("can't parse %s as output context size",
  1110. *argv);
  1111. return -1;
  1112. }
  1113. NEXT_ARG();
  1114. } else if (is_prefix(*argv, "repeat")) {
  1115. char *endptr;
  1116. NEXT_ARG();
  1117. if (!REQ_ARGS(1))
  1118. return -1;
  1119. repeat = strtoul(*argv, &endptr, 0);
  1120. if (*endptr) {
  1121. p_err("can't parse %s as repeat number",
  1122. *argv);
  1123. return -1;
  1124. }
  1125. NEXT_ARG();
  1126. } else {
  1127. p_err("expected no more arguments, 'data_in', 'data_out', 'data_size_out', 'ctx_in', 'ctx_out', 'ctx_size_out' or 'repeat', got: '%s'?",
  1128. *argv);
  1129. return -1;
  1130. }
  1131. }
  1132. err = get_run_data(data_fname_in, &data_in, &test_attr.data_size_in);
  1133. if (err)
  1134. return -1;
  1135. if (data_in) {
  1136. if (!test_attr.data_size_out)
  1137. test_attr.data_size_out = default_size;
  1138. err = alloc_run_data(&data_out, test_attr.data_size_out);
  1139. if (err)
  1140. goto free_data_in;
  1141. }
  1142. err = get_run_data(ctx_fname_in, &ctx_in, &test_attr.ctx_size_in);
  1143. if (err)
  1144. goto free_data_out;
  1145. if (ctx_in) {
  1146. if (!test_attr.ctx_size_out)
  1147. test_attr.ctx_size_out = default_size;
  1148. err = alloc_run_data(&ctx_out, test_attr.ctx_size_out);
  1149. if (err)
  1150. goto free_ctx_in;
  1151. }
  1152. test_attr.repeat = repeat;
  1153. test_attr.data_in = data_in;
  1154. test_attr.data_out = data_out;
  1155. test_attr.ctx_in = ctx_in;
  1156. test_attr.ctx_out = ctx_out;
  1157. err = bpf_prog_test_run_opts(fd, &test_attr);
  1158. if (err) {
  1159. p_err("failed to run program: %s", strerror(errno));
  1160. goto free_ctx_out;
  1161. }
  1162. err = 0;
  1163. if (json_output)
  1164. jsonw_start_object(json_wtr); /* root */
  1165. /* Do not exit on errors occurring when printing output data/context,
  1166. * we still want to print return value and duration for program run.
  1167. */
  1168. if (test_attr.data_size_out)
  1169. err += print_run_output(test_attr.data_out,
  1170. test_attr.data_size_out,
  1171. data_fname_out, "data_out");
  1172. if (test_attr.ctx_size_out)
  1173. err += print_run_output(test_attr.ctx_out,
  1174. test_attr.ctx_size_out,
  1175. ctx_fname_out, "ctx_out");
  1176. if (json_output) {
  1177. jsonw_uint_field(json_wtr, "retval", test_attr.retval);
  1178. jsonw_uint_field(json_wtr, "duration", test_attr.duration);
  1179. jsonw_end_object(json_wtr); /* root */
  1180. } else {
  1181. fprintf(stdout, "Return value: %u, duration%s: %uns\n",
  1182. test_attr.retval,
  1183. repeat > 1 ? " (average)" : "", test_attr.duration);
  1184. }
  1185. free_ctx_out:
  1186. free(ctx_out);
  1187. free_ctx_in:
  1188. free(ctx_in);
  1189. free_data_out:
  1190. free(data_out);
  1191. free_data_in:
  1192. free(data_in);
  1193. return err;
  1194. }
  1195. static int
  1196. get_prog_type_by_name(const char *name, enum bpf_prog_type *prog_type,
  1197. enum bpf_attach_type *expected_attach_type)
  1198. {
  1199. libbpf_print_fn_t print_backup;
  1200. int ret;
  1201. ret = libbpf_prog_type_by_name(name, prog_type, expected_attach_type);
  1202. if (!ret)
  1203. return ret;
  1204. /* libbpf_prog_type_by_name() failed, let's re-run with debug level */
  1205. print_backup = libbpf_set_print(print_all_levels);
  1206. ret = libbpf_prog_type_by_name(name, prog_type, expected_attach_type);
  1207. libbpf_set_print(print_backup);
  1208. return ret;
  1209. }
  1210. static int load_with_options(int argc, char **argv, bool first_prog_only)
  1211. {
  1212. enum bpf_prog_type common_prog_type = BPF_PROG_TYPE_UNSPEC;
  1213. DECLARE_LIBBPF_OPTS(bpf_object_open_opts, open_opts,
  1214. .relaxed_maps = relaxed_maps,
  1215. );
  1216. enum bpf_attach_type expected_attach_type;
  1217. struct map_replace *map_replace = NULL;
  1218. struct bpf_program *prog = NULL, *pos;
  1219. unsigned int old_map_fds = 0;
  1220. const char *pinmaps = NULL;
  1221. struct bpf_object *obj;
  1222. struct bpf_map *map;
  1223. const char *pinfile;
  1224. unsigned int i, j;
  1225. __u32 ifindex = 0;
  1226. const char *file;
  1227. int idx, err;
  1228. if (!REQ_ARGS(2))
  1229. return -1;
  1230. file = GET_ARG();
  1231. pinfile = GET_ARG();
  1232. while (argc) {
  1233. if (is_prefix(*argv, "type")) {
  1234. NEXT_ARG();
  1235. if (common_prog_type != BPF_PROG_TYPE_UNSPEC) {
  1236. p_err("program type already specified");
  1237. goto err_free_reuse_maps;
  1238. }
  1239. if (!REQ_ARGS(1))
  1240. goto err_free_reuse_maps;
  1241. err = libbpf_prog_type_by_name(*argv, &common_prog_type,
  1242. &expected_attach_type);
  1243. if (err < 0) {
  1244. /* Put a '/' at the end of type to appease libbpf */
  1245. char *type = malloc(strlen(*argv) + 2);
  1246. if (!type) {
  1247. p_err("mem alloc failed");
  1248. goto err_free_reuse_maps;
  1249. }
  1250. *type = 0;
  1251. strcat(type, *argv);
  1252. strcat(type, "/");
  1253. err = get_prog_type_by_name(type, &common_prog_type,
  1254. &expected_attach_type);
  1255. free(type);
  1256. if (err < 0)
  1257. goto err_free_reuse_maps;
  1258. }
  1259. NEXT_ARG();
  1260. } else if (is_prefix(*argv, "map")) {
  1261. void *new_map_replace;
  1262. char *endptr, *name;
  1263. int fd;
  1264. NEXT_ARG();
  1265. if (!REQ_ARGS(4))
  1266. goto err_free_reuse_maps;
  1267. if (is_prefix(*argv, "idx")) {
  1268. NEXT_ARG();
  1269. idx = strtoul(*argv, &endptr, 0);
  1270. if (*endptr) {
  1271. p_err("can't parse %s as IDX", *argv);
  1272. goto err_free_reuse_maps;
  1273. }
  1274. name = NULL;
  1275. } else if (is_prefix(*argv, "name")) {
  1276. NEXT_ARG();
  1277. name = *argv;
  1278. idx = -1;
  1279. } else {
  1280. p_err("expected 'idx' or 'name', got: '%s'?",
  1281. *argv);
  1282. goto err_free_reuse_maps;
  1283. }
  1284. NEXT_ARG();
  1285. fd = map_parse_fd(&argc, &argv);
  1286. if (fd < 0)
  1287. goto err_free_reuse_maps;
  1288. new_map_replace = libbpf_reallocarray(map_replace,
  1289. old_map_fds + 1,
  1290. sizeof(*map_replace));
  1291. if (!new_map_replace) {
  1292. p_err("mem alloc failed");
  1293. goto err_free_reuse_maps;
  1294. }
  1295. map_replace = new_map_replace;
  1296. map_replace[old_map_fds].idx = idx;
  1297. map_replace[old_map_fds].name = name;
  1298. map_replace[old_map_fds].fd = fd;
  1299. old_map_fds++;
  1300. } else if (is_prefix(*argv, "dev")) {
  1301. NEXT_ARG();
  1302. if (ifindex) {
  1303. p_err("offload device already specified");
  1304. goto err_free_reuse_maps;
  1305. }
  1306. if (!REQ_ARGS(1))
  1307. goto err_free_reuse_maps;
  1308. ifindex = if_nametoindex(*argv);
  1309. if (!ifindex) {
  1310. p_err("unrecognized netdevice '%s': %s",
  1311. *argv, strerror(errno));
  1312. goto err_free_reuse_maps;
  1313. }
  1314. NEXT_ARG();
  1315. } else if (is_prefix(*argv, "pinmaps")) {
  1316. NEXT_ARG();
  1317. if (!REQ_ARGS(1))
  1318. goto err_free_reuse_maps;
  1319. pinmaps = GET_ARG();
  1320. } else {
  1321. p_err("expected no more arguments, 'type', 'map' or 'dev', got: '%s'?",
  1322. *argv);
  1323. goto err_free_reuse_maps;
  1324. }
  1325. }
  1326. set_max_rlimit();
  1327. if (verifier_logs)
  1328. /* log_level1 + log_level2 + stats, but not stable UAPI */
  1329. open_opts.kernel_log_level = 1 + 2 + 4;
  1330. obj = bpf_object__open_file(file, &open_opts);
  1331. if (libbpf_get_error(obj)) {
  1332. p_err("failed to open object file");
  1333. goto err_free_reuse_maps;
  1334. }
  1335. bpf_object__for_each_program(pos, obj) {
  1336. enum bpf_prog_type prog_type = common_prog_type;
  1337. if (prog_type == BPF_PROG_TYPE_UNSPEC) {
  1338. const char *sec_name = bpf_program__section_name(pos);
  1339. err = get_prog_type_by_name(sec_name, &prog_type,
  1340. &expected_attach_type);
  1341. if (err < 0)
  1342. goto err_close_obj;
  1343. }
  1344. bpf_program__set_ifindex(pos, ifindex);
  1345. bpf_program__set_type(pos, prog_type);
  1346. bpf_program__set_expected_attach_type(pos, expected_attach_type);
  1347. }
  1348. qsort(map_replace, old_map_fds, sizeof(*map_replace),
  1349. map_replace_compar);
  1350. /* After the sort maps by name will be first on the list, because they
  1351. * have idx == -1. Resolve them.
  1352. */
  1353. j = 0;
  1354. while (j < old_map_fds && map_replace[j].name) {
  1355. i = 0;
  1356. bpf_object__for_each_map(map, obj) {
  1357. if (!strcmp(bpf_map__name(map), map_replace[j].name)) {
  1358. map_replace[j].idx = i;
  1359. break;
  1360. }
  1361. i++;
  1362. }
  1363. if (map_replace[j].idx == -1) {
  1364. p_err("unable to find map '%s'", map_replace[j].name);
  1365. goto err_close_obj;
  1366. }
  1367. j++;
  1368. }
  1369. /* Resort if any names were resolved */
  1370. if (j)
  1371. qsort(map_replace, old_map_fds, sizeof(*map_replace),
  1372. map_replace_compar);
  1373. /* Set ifindex and name reuse */
  1374. j = 0;
  1375. idx = 0;
  1376. bpf_object__for_each_map(map, obj) {
  1377. if (bpf_map__type(map) != BPF_MAP_TYPE_PERF_EVENT_ARRAY)
  1378. bpf_map__set_ifindex(map, ifindex);
  1379. if (j < old_map_fds && idx == map_replace[j].idx) {
  1380. err = bpf_map__reuse_fd(map, map_replace[j++].fd);
  1381. if (err) {
  1382. p_err("unable to set up map reuse: %d", err);
  1383. goto err_close_obj;
  1384. }
  1385. /* Next reuse wants to apply to the same map */
  1386. if (j < old_map_fds && map_replace[j].idx == idx) {
  1387. p_err("replacement for map idx %d specified more than once",
  1388. idx);
  1389. goto err_close_obj;
  1390. }
  1391. }
  1392. idx++;
  1393. }
  1394. if (j < old_map_fds) {
  1395. p_err("map idx '%d' not used", map_replace[j].idx);
  1396. goto err_close_obj;
  1397. }
  1398. err = bpf_object__load(obj);
  1399. if (err) {
  1400. p_err("failed to load object file");
  1401. goto err_close_obj;
  1402. }
  1403. err = mount_bpffs_for_pin(pinfile);
  1404. if (err)
  1405. goto err_close_obj;
  1406. if (first_prog_only) {
  1407. prog = bpf_object__next_program(obj, NULL);
  1408. if (!prog) {
  1409. p_err("object file doesn't contain any bpf program");
  1410. goto err_close_obj;
  1411. }
  1412. err = bpf_obj_pin(bpf_program__fd(prog), pinfile);
  1413. if (err) {
  1414. p_err("failed to pin program %s",
  1415. bpf_program__section_name(prog));
  1416. goto err_close_obj;
  1417. }
  1418. } else {
  1419. err = bpf_object__pin_programs(obj, pinfile);
  1420. if (err) {
  1421. p_err("failed to pin all programs");
  1422. goto err_close_obj;
  1423. }
  1424. }
  1425. if (pinmaps) {
  1426. err = bpf_object__pin_maps(obj, pinmaps);
  1427. if (err) {
  1428. p_err("failed to pin all maps");
  1429. goto err_unpin;
  1430. }
  1431. }
  1432. if (json_output)
  1433. jsonw_null(json_wtr);
  1434. bpf_object__close(obj);
  1435. for (i = 0; i < old_map_fds; i++)
  1436. close(map_replace[i].fd);
  1437. free(map_replace);
  1438. return 0;
  1439. err_unpin:
  1440. if (first_prog_only)
  1441. unlink(pinfile);
  1442. else
  1443. bpf_object__unpin_programs(obj, pinfile);
  1444. err_close_obj:
  1445. if (!legacy_libbpf) {
  1446. p_info("Warning: bpftool is now running in libbpf strict mode and has more stringent requirements about BPF programs.\n"
  1447. "If it used to work for this object file but now doesn't, see --legacy option for more details.\n");
  1448. }
  1449. bpf_object__close(obj);
  1450. err_free_reuse_maps:
  1451. for (i = 0; i < old_map_fds; i++)
  1452. close(map_replace[i].fd);
  1453. free(map_replace);
  1454. return -1;
  1455. }
  1456. static int count_open_fds(void)
  1457. {
  1458. DIR *dp = opendir("/proc/self/fd");
  1459. struct dirent *de;
  1460. int cnt = -3;
  1461. if (!dp)
  1462. return -1;
  1463. while ((de = readdir(dp)))
  1464. cnt++;
  1465. closedir(dp);
  1466. return cnt;
  1467. }
  1468. static int try_loader(struct gen_loader_opts *gen)
  1469. {
  1470. struct bpf_load_and_run_opts opts = {};
  1471. struct bpf_loader_ctx *ctx;
  1472. int ctx_sz = sizeof(*ctx) + 64 * max(sizeof(struct bpf_map_desc),
  1473. sizeof(struct bpf_prog_desc));
  1474. int log_buf_sz = (1u << 24) - 1;
  1475. int err, fds_before, fd_delta;
  1476. char *log_buf = NULL;
  1477. ctx = alloca(ctx_sz);
  1478. memset(ctx, 0, ctx_sz);
  1479. ctx->sz = ctx_sz;
  1480. if (verifier_logs) {
  1481. ctx->log_level = 1 + 2 + 4;
  1482. ctx->log_size = log_buf_sz;
  1483. log_buf = malloc(log_buf_sz);
  1484. if (!log_buf)
  1485. return -ENOMEM;
  1486. ctx->log_buf = (long) log_buf;
  1487. }
  1488. opts.ctx = ctx;
  1489. opts.data = gen->data;
  1490. opts.data_sz = gen->data_sz;
  1491. opts.insns = gen->insns;
  1492. opts.insns_sz = gen->insns_sz;
  1493. fds_before = count_open_fds();
  1494. err = bpf_load_and_run(&opts);
  1495. fd_delta = count_open_fds() - fds_before;
  1496. if (err < 0 || verifier_logs) {
  1497. fprintf(stderr, "err %d\n%s\n%s", err, opts.errstr, log_buf);
  1498. if (fd_delta && err < 0)
  1499. fprintf(stderr, "loader prog leaked %d FDs\n",
  1500. fd_delta);
  1501. }
  1502. free(log_buf);
  1503. return err;
  1504. }
  1505. static int do_loader(int argc, char **argv)
  1506. {
  1507. DECLARE_LIBBPF_OPTS(bpf_object_open_opts, open_opts);
  1508. DECLARE_LIBBPF_OPTS(gen_loader_opts, gen);
  1509. struct bpf_object *obj;
  1510. const char *file;
  1511. int err = 0;
  1512. if (!REQ_ARGS(1))
  1513. return -1;
  1514. file = GET_ARG();
  1515. if (verifier_logs)
  1516. /* log_level1 + log_level2 + stats, but not stable UAPI */
  1517. open_opts.kernel_log_level = 1 + 2 + 4;
  1518. obj = bpf_object__open_file(file, &open_opts);
  1519. if (libbpf_get_error(obj)) {
  1520. p_err("failed to open object file");
  1521. goto err_close_obj;
  1522. }
  1523. err = bpf_object__gen_loader(obj, &gen);
  1524. if (err)
  1525. goto err_close_obj;
  1526. err = bpf_object__load(obj);
  1527. if (err) {
  1528. p_err("failed to load object file");
  1529. goto err_close_obj;
  1530. }
  1531. if (verifier_logs) {
  1532. struct dump_data dd = {};
  1533. kernel_syms_load(&dd);
  1534. dump_xlated_plain(&dd, (void *)gen.insns, gen.insns_sz, false, false);
  1535. kernel_syms_destroy(&dd);
  1536. }
  1537. err = try_loader(&gen);
  1538. err_close_obj:
  1539. bpf_object__close(obj);
  1540. return err;
  1541. }
  1542. static int do_load(int argc, char **argv)
  1543. {
  1544. if (use_loader)
  1545. return do_loader(argc, argv);
  1546. return load_with_options(argc, argv, true);
  1547. }
  1548. static int do_loadall(int argc, char **argv)
  1549. {
  1550. return load_with_options(argc, argv, false);
  1551. }
  1552. #ifdef BPFTOOL_WITHOUT_SKELETONS
  1553. static int do_profile(int argc, char **argv)
  1554. {
  1555. p_err("bpftool prog profile command is not supported. Please build bpftool with clang >= 10.0.0");
  1556. return 0;
  1557. }
  1558. #else /* BPFTOOL_WITHOUT_SKELETONS */
  1559. #include "profiler.skel.h"
  1560. struct profile_metric {
  1561. const char *name;
  1562. struct bpf_perf_event_value val;
  1563. struct perf_event_attr attr;
  1564. bool selected;
  1565. /* calculate ratios like instructions per cycle */
  1566. const int ratio_metric; /* 0 for N/A, 1 for index 0 (cycles) */
  1567. const char *ratio_desc;
  1568. const float ratio_mul;
  1569. } metrics[] = {
  1570. {
  1571. .name = "cycles",
  1572. .attr = {
  1573. .type = PERF_TYPE_HARDWARE,
  1574. .config = PERF_COUNT_HW_CPU_CYCLES,
  1575. .exclude_user = 1,
  1576. },
  1577. },
  1578. {
  1579. .name = "instructions",
  1580. .attr = {
  1581. .type = PERF_TYPE_HARDWARE,
  1582. .config = PERF_COUNT_HW_INSTRUCTIONS,
  1583. .exclude_user = 1,
  1584. },
  1585. .ratio_metric = 1,
  1586. .ratio_desc = "insns per cycle",
  1587. .ratio_mul = 1.0,
  1588. },
  1589. {
  1590. .name = "l1d_loads",
  1591. .attr = {
  1592. .type = PERF_TYPE_HW_CACHE,
  1593. .config =
  1594. PERF_COUNT_HW_CACHE_L1D |
  1595. (PERF_COUNT_HW_CACHE_OP_READ << 8) |
  1596. (PERF_COUNT_HW_CACHE_RESULT_ACCESS << 16),
  1597. .exclude_user = 1,
  1598. },
  1599. },
  1600. {
  1601. .name = "llc_misses",
  1602. .attr = {
  1603. .type = PERF_TYPE_HW_CACHE,
  1604. .config =
  1605. PERF_COUNT_HW_CACHE_LL |
  1606. (PERF_COUNT_HW_CACHE_OP_READ << 8) |
  1607. (PERF_COUNT_HW_CACHE_RESULT_MISS << 16),
  1608. .exclude_user = 1
  1609. },
  1610. .ratio_metric = 2,
  1611. .ratio_desc = "LLC misses per million insns",
  1612. .ratio_mul = 1e6,
  1613. },
  1614. {
  1615. .name = "itlb_misses",
  1616. .attr = {
  1617. .type = PERF_TYPE_HW_CACHE,
  1618. .config =
  1619. PERF_COUNT_HW_CACHE_ITLB |
  1620. (PERF_COUNT_HW_CACHE_OP_READ << 8) |
  1621. (PERF_COUNT_HW_CACHE_RESULT_MISS << 16),
  1622. .exclude_user = 1
  1623. },
  1624. .ratio_metric = 2,
  1625. .ratio_desc = "itlb misses per million insns",
  1626. .ratio_mul = 1e6,
  1627. },
  1628. {
  1629. .name = "dtlb_misses",
  1630. .attr = {
  1631. .type = PERF_TYPE_HW_CACHE,
  1632. .config =
  1633. PERF_COUNT_HW_CACHE_DTLB |
  1634. (PERF_COUNT_HW_CACHE_OP_READ << 8) |
  1635. (PERF_COUNT_HW_CACHE_RESULT_MISS << 16),
  1636. .exclude_user = 1
  1637. },
  1638. .ratio_metric = 2,
  1639. .ratio_desc = "dtlb misses per million insns",
  1640. .ratio_mul = 1e6,
  1641. },
  1642. };
  1643. static __u64 profile_total_count;
  1644. #define MAX_NUM_PROFILE_METRICS 4
  1645. static int profile_parse_metrics(int argc, char **argv)
  1646. {
  1647. unsigned int metric_cnt;
  1648. int selected_cnt = 0;
  1649. unsigned int i;
  1650. metric_cnt = ARRAY_SIZE(metrics);
  1651. while (argc > 0) {
  1652. for (i = 0; i < metric_cnt; i++) {
  1653. if (is_prefix(argv[0], metrics[i].name)) {
  1654. if (!metrics[i].selected)
  1655. selected_cnt++;
  1656. metrics[i].selected = true;
  1657. break;
  1658. }
  1659. }
  1660. if (i == metric_cnt) {
  1661. p_err("unknown metric %s", argv[0]);
  1662. return -1;
  1663. }
  1664. NEXT_ARG();
  1665. }
  1666. if (selected_cnt > MAX_NUM_PROFILE_METRICS) {
  1667. p_err("too many (%d) metrics, please specify no more than %d metrics at at time",
  1668. selected_cnt, MAX_NUM_PROFILE_METRICS);
  1669. return -1;
  1670. }
  1671. return selected_cnt;
  1672. }
  1673. static void profile_read_values(struct profiler_bpf *obj)
  1674. {
  1675. __u32 m, cpu, num_cpu = obj->rodata->num_cpu;
  1676. int reading_map_fd, count_map_fd;
  1677. __u64 counts[num_cpu];
  1678. __u32 key = 0;
  1679. int err;
  1680. reading_map_fd = bpf_map__fd(obj->maps.accum_readings);
  1681. count_map_fd = bpf_map__fd(obj->maps.counts);
  1682. if (reading_map_fd < 0 || count_map_fd < 0) {
  1683. p_err("failed to get fd for map");
  1684. return;
  1685. }
  1686. err = bpf_map_lookup_elem(count_map_fd, &key, counts);
  1687. if (err) {
  1688. p_err("failed to read count_map: %s", strerror(errno));
  1689. return;
  1690. }
  1691. profile_total_count = 0;
  1692. for (cpu = 0; cpu < num_cpu; cpu++)
  1693. profile_total_count += counts[cpu];
  1694. for (m = 0; m < ARRAY_SIZE(metrics); m++) {
  1695. struct bpf_perf_event_value values[num_cpu];
  1696. if (!metrics[m].selected)
  1697. continue;
  1698. err = bpf_map_lookup_elem(reading_map_fd, &key, values);
  1699. if (err) {
  1700. p_err("failed to read reading_map: %s",
  1701. strerror(errno));
  1702. return;
  1703. }
  1704. for (cpu = 0; cpu < num_cpu; cpu++) {
  1705. metrics[m].val.counter += values[cpu].counter;
  1706. metrics[m].val.enabled += values[cpu].enabled;
  1707. metrics[m].val.running += values[cpu].running;
  1708. }
  1709. key++;
  1710. }
  1711. }
  1712. static void profile_print_readings_json(void)
  1713. {
  1714. __u32 m;
  1715. jsonw_start_array(json_wtr);
  1716. for (m = 0; m < ARRAY_SIZE(metrics); m++) {
  1717. if (!metrics[m].selected)
  1718. continue;
  1719. jsonw_start_object(json_wtr);
  1720. jsonw_string_field(json_wtr, "metric", metrics[m].name);
  1721. jsonw_lluint_field(json_wtr, "run_cnt", profile_total_count);
  1722. jsonw_lluint_field(json_wtr, "value", metrics[m].val.counter);
  1723. jsonw_lluint_field(json_wtr, "enabled", metrics[m].val.enabled);
  1724. jsonw_lluint_field(json_wtr, "running", metrics[m].val.running);
  1725. jsonw_end_object(json_wtr);
  1726. }
  1727. jsonw_end_array(json_wtr);
  1728. }
  1729. static void profile_print_readings_plain(void)
  1730. {
  1731. __u32 m;
  1732. printf("\n%18llu %-20s\n", profile_total_count, "run_cnt");
  1733. for (m = 0; m < ARRAY_SIZE(metrics); m++) {
  1734. struct bpf_perf_event_value *val = &metrics[m].val;
  1735. int r;
  1736. if (!metrics[m].selected)
  1737. continue;
  1738. printf("%18llu %-20s", val->counter, metrics[m].name);
  1739. r = metrics[m].ratio_metric - 1;
  1740. if (r >= 0 && metrics[r].selected &&
  1741. metrics[r].val.counter > 0) {
  1742. printf("# %8.2f %-30s",
  1743. val->counter * metrics[m].ratio_mul /
  1744. metrics[r].val.counter,
  1745. metrics[m].ratio_desc);
  1746. } else {
  1747. printf("%-41s", "");
  1748. }
  1749. if (val->enabled > val->running)
  1750. printf("(%4.2f%%)",
  1751. val->running * 100.0 / val->enabled);
  1752. printf("\n");
  1753. }
  1754. }
  1755. static void profile_print_readings(void)
  1756. {
  1757. if (json_output)
  1758. profile_print_readings_json();
  1759. else
  1760. profile_print_readings_plain();
  1761. }
  1762. static char *profile_target_name(int tgt_fd)
  1763. {
  1764. struct bpf_func_info func_info;
  1765. struct bpf_prog_info info = {};
  1766. __u32 info_len = sizeof(info);
  1767. const struct btf_type *t;
  1768. __u32 func_info_rec_size;
  1769. struct btf *btf = NULL;
  1770. char *name = NULL;
  1771. int err;
  1772. err = bpf_obj_get_info_by_fd(tgt_fd, &info, &info_len);
  1773. if (err) {
  1774. p_err("failed to bpf_obj_get_info_by_fd for prog FD %d", tgt_fd);
  1775. goto out;
  1776. }
  1777. if (info.btf_id == 0) {
  1778. p_err("prog FD %d doesn't have valid btf", tgt_fd);
  1779. goto out;
  1780. }
  1781. func_info_rec_size = info.func_info_rec_size;
  1782. if (info.nr_func_info == 0) {
  1783. p_err("bpf_obj_get_info_by_fd for prog FD %d found 0 func_info", tgt_fd);
  1784. goto out;
  1785. }
  1786. memset(&info, 0, sizeof(info));
  1787. info.nr_func_info = 1;
  1788. info.func_info_rec_size = func_info_rec_size;
  1789. info.func_info = ptr_to_u64(&func_info);
  1790. err = bpf_obj_get_info_by_fd(tgt_fd, &info, &info_len);
  1791. if (err) {
  1792. p_err("failed to get func_info for prog FD %d", tgt_fd);
  1793. goto out;
  1794. }
  1795. btf = btf__load_from_kernel_by_id(info.btf_id);
  1796. if (libbpf_get_error(btf)) {
  1797. p_err("failed to load btf for prog FD %d", tgt_fd);
  1798. goto out;
  1799. }
  1800. t = btf__type_by_id(btf, func_info.type_id);
  1801. if (!t) {
  1802. p_err("btf %d doesn't have type %d",
  1803. info.btf_id, func_info.type_id);
  1804. goto out;
  1805. }
  1806. name = strdup(btf__name_by_offset(btf, t->name_off));
  1807. out:
  1808. btf__free(btf);
  1809. return name;
  1810. }
  1811. static struct profiler_bpf *profile_obj;
  1812. static int profile_tgt_fd = -1;
  1813. static char *profile_tgt_name;
  1814. static int *profile_perf_events;
  1815. static int profile_perf_event_cnt;
  1816. static void profile_close_perf_events(struct profiler_bpf *obj)
  1817. {
  1818. int i;
  1819. for (i = profile_perf_event_cnt - 1; i >= 0; i--)
  1820. close(profile_perf_events[i]);
  1821. free(profile_perf_events);
  1822. profile_perf_event_cnt = 0;
  1823. }
  1824. static int profile_open_perf_event(int mid, int cpu, int map_fd)
  1825. {
  1826. int pmu_fd;
  1827. pmu_fd = syscall(__NR_perf_event_open, &metrics[mid].attr,
  1828. -1 /*pid*/, cpu, -1 /*group_fd*/, 0);
  1829. if (pmu_fd < 0) {
  1830. if (errno == ENODEV) {
  1831. p_info("cpu %d may be offline, skip %s profiling.",
  1832. cpu, metrics[mid].name);
  1833. profile_perf_event_cnt++;
  1834. return 0;
  1835. }
  1836. return -1;
  1837. }
  1838. if (bpf_map_update_elem(map_fd,
  1839. &profile_perf_event_cnt,
  1840. &pmu_fd, BPF_ANY) ||
  1841. ioctl(pmu_fd, PERF_EVENT_IOC_ENABLE, 0)) {
  1842. close(pmu_fd);
  1843. return -1;
  1844. }
  1845. profile_perf_events[profile_perf_event_cnt++] = pmu_fd;
  1846. return 0;
  1847. }
  1848. static int profile_open_perf_events(struct profiler_bpf *obj)
  1849. {
  1850. unsigned int cpu, m;
  1851. int map_fd;
  1852. profile_perf_events = calloc(
  1853. sizeof(int), obj->rodata->num_cpu * obj->rodata->num_metric);
  1854. if (!profile_perf_events) {
  1855. p_err("failed to allocate memory for perf_event array: %s",
  1856. strerror(errno));
  1857. return -1;
  1858. }
  1859. map_fd = bpf_map__fd(obj->maps.events);
  1860. if (map_fd < 0) {
  1861. p_err("failed to get fd for events map");
  1862. return -1;
  1863. }
  1864. for (m = 0; m < ARRAY_SIZE(metrics); m++) {
  1865. if (!metrics[m].selected)
  1866. continue;
  1867. for (cpu = 0; cpu < obj->rodata->num_cpu; cpu++) {
  1868. if (profile_open_perf_event(m, cpu, map_fd)) {
  1869. p_err("failed to create event %s on cpu %d",
  1870. metrics[m].name, cpu);
  1871. return -1;
  1872. }
  1873. }
  1874. }
  1875. return 0;
  1876. }
  1877. static void profile_print_and_cleanup(void)
  1878. {
  1879. profile_close_perf_events(profile_obj);
  1880. profile_read_values(profile_obj);
  1881. profile_print_readings();
  1882. profiler_bpf__destroy(profile_obj);
  1883. close(profile_tgt_fd);
  1884. free(profile_tgt_name);
  1885. }
  1886. static void int_exit(int signo)
  1887. {
  1888. profile_print_and_cleanup();
  1889. exit(0);
  1890. }
  1891. static int do_profile(int argc, char **argv)
  1892. {
  1893. int num_metric, num_cpu, err = -1;
  1894. struct bpf_program *prog;
  1895. unsigned long duration;
  1896. char *endptr;
  1897. /* we at least need two args for the prog and one metric */
  1898. if (!REQ_ARGS(3))
  1899. return -EINVAL;
  1900. /* parse target fd */
  1901. profile_tgt_fd = prog_parse_fd(&argc, &argv);
  1902. if (profile_tgt_fd < 0) {
  1903. p_err("failed to parse fd");
  1904. return -1;
  1905. }
  1906. /* parse profiling optional duration */
  1907. if (argc > 2 && is_prefix(argv[0], "duration")) {
  1908. NEXT_ARG();
  1909. duration = strtoul(*argv, &endptr, 0);
  1910. if (*endptr)
  1911. usage();
  1912. NEXT_ARG();
  1913. } else {
  1914. duration = UINT_MAX;
  1915. }
  1916. num_metric = profile_parse_metrics(argc, argv);
  1917. if (num_metric <= 0)
  1918. goto out;
  1919. num_cpu = libbpf_num_possible_cpus();
  1920. if (num_cpu <= 0) {
  1921. p_err("failed to identify number of CPUs");
  1922. goto out;
  1923. }
  1924. profile_obj = profiler_bpf__open();
  1925. if (!profile_obj) {
  1926. p_err("failed to open and/or load BPF object");
  1927. goto out;
  1928. }
  1929. profile_obj->rodata->num_cpu = num_cpu;
  1930. profile_obj->rodata->num_metric = num_metric;
  1931. /* adjust map sizes */
  1932. bpf_map__set_max_entries(profile_obj->maps.events, num_metric * num_cpu);
  1933. bpf_map__set_max_entries(profile_obj->maps.fentry_readings, num_metric);
  1934. bpf_map__set_max_entries(profile_obj->maps.accum_readings, num_metric);
  1935. bpf_map__set_max_entries(profile_obj->maps.counts, 1);
  1936. /* change target name */
  1937. profile_tgt_name = profile_target_name(profile_tgt_fd);
  1938. if (!profile_tgt_name)
  1939. goto out;
  1940. bpf_object__for_each_program(prog, profile_obj->obj) {
  1941. err = bpf_program__set_attach_target(prog, profile_tgt_fd,
  1942. profile_tgt_name);
  1943. if (err) {
  1944. p_err("failed to set attach target\n");
  1945. goto out;
  1946. }
  1947. }
  1948. set_max_rlimit();
  1949. err = profiler_bpf__load(profile_obj);
  1950. if (err) {
  1951. p_err("failed to load profile_obj");
  1952. goto out;
  1953. }
  1954. err = profile_open_perf_events(profile_obj);
  1955. if (err)
  1956. goto out;
  1957. err = profiler_bpf__attach(profile_obj);
  1958. if (err) {
  1959. p_err("failed to attach profile_obj");
  1960. goto out;
  1961. }
  1962. signal(SIGINT, int_exit);
  1963. sleep(duration);
  1964. profile_print_and_cleanup();
  1965. return 0;
  1966. out:
  1967. profile_close_perf_events(profile_obj);
  1968. if (profile_obj)
  1969. profiler_bpf__destroy(profile_obj);
  1970. close(profile_tgt_fd);
  1971. free(profile_tgt_name);
  1972. return err;
  1973. }
  1974. #endif /* BPFTOOL_WITHOUT_SKELETONS */
  1975. static int do_help(int argc, char **argv)
  1976. {
  1977. if (json_output) {
  1978. jsonw_null(json_wtr);
  1979. return 0;
  1980. }
  1981. fprintf(stderr,
  1982. "Usage: %1$s %2$s { show | list } [PROG]\n"
  1983. " %1$s %2$s dump xlated PROG [{ file FILE | opcodes | visual | linum }]\n"
  1984. " %1$s %2$s dump jited PROG [{ file FILE | opcodes | linum }]\n"
  1985. " %1$s %2$s pin PROG FILE\n"
  1986. " %1$s %2$s { load | loadall } OBJ PATH \\\n"
  1987. " [type TYPE] [dev NAME] \\\n"
  1988. " [map { idx IDX | name NAME } MAP]\\\n"
  1989. " [pinmaps MAP_DIR]\n"
  1990. " %1$s %2$s attach PROG ATTACH_TYPE [MAP]\n"
  1991. " %1$s %2$s detach PROG ATTACH_TYPE [MAP]\n"
  1992. " %1$s %2$s run PROG \\\n"
  1993. " data_in FILE \\\n"
  1994. " [data_out FILE [data_size_out L]] \\\n"
  1995. " [ctx_in FILE [ctx_out FILE [ctx_size_out M]]] \\\n"
  1996. " [repeat N]\n"
  1997. " %1$s %2$s profile PROG [duration DURATION] METRICs\n"
  1998. " %1$s %2$s tracelog\n"
  1999. " %1$s %2$s help\n"
  2000. "\n"
  2001. " " HELP_SPEC_MAP "\n"
  2002. " " HELP_SPEC_PROGRAM "\n"
  2003. " TYPE := { socket | kprobe | kretprobe | classifier | action |\n"
  2004. " tracepoint | raw_tracepoint | xdp | perf_event | cgroup/skb |\n"
  2005. " cgroup/sock | cgroup/dev | lwt_in | lwt_out | lwt_xmit |\n"
  2006. " lwt_seg6local | sockops | sk_skb | sk_msg | lirc_mode2 |\n"
  2007. " sk_reuseport | flow_dissector | cgroup/sysctl |\n"
  2008. " cgroup/bind4 | cgroup/bind6 | cgroup/post_bind4 |\n"
  2009. " cgroup/post_bind6 | cgroup/connect4 | cgroup/connect6 |\n"
  2010. " cgroup/getpeername4 | cgroup/getpeername6 |\n"
  2011. " cgroup/getsockname4 | cgroup/getsockname6 | cgroup/sendmsg4 |\n"
  2012. " cgroup/sendmsg6 | cgroup/recvmsg4 | cgroup/recvmsg6 |\n"
  2013. " cgroup/getsockopt | cgroup/setsockopt | cgroup/sock_release |\n"
  2014. " struct_ops | fentry | fexit | freplace | sk_lookup }\n"
  2015. " ATTACH_TYPE := { sk_msg_verdict | sk_skb_verdict | sk_skb_stream_verdict |\n"
  2016. " sk_skb_stream_parser | flow_dissector }\n"
  2017. " METRIC := { cycles | instructions | l1d_loads | llc_misses | itlb_misses | dtlb_misses }\n"
  2018. " " HELP_SPEC_OPTIONS " |\n"
  2019. " {-f|--bpffs} | {-m|--mapcompat} | {-n|--nomount} |\n"
  2020. " {-L|--use-loader} }\n"
  2021. "",
  2022. bin_name, argv[-2]);
  2023. return 0;
  2024. }
  2025. static const struct cmd cmds[] = {
  2026. { "show", do_show },
  2027. { "list", do_show },
  2028. { "help", do_help },
  2029. { "dump", do_dump },
  2030. { "pin", do_pin },
  2031. { "load", do_load },
  2032. { "loadall", do_loadall },
  2033. { "attach", do_attach },
  2034. { "detach", do_detach },
  2035. { "tracelog", do_tracelog },
  2036. { "run", do_run },
  2037. { "profile", do_profile },
  2038. { 0 }
  2039. };
  2040. int do_prog(int argc, char **argv)
  2041. {
  2042. return cmd_select(cmds, argc, argv, do_help);
  2043. }