diff mbox series

[v2,bpf-next,03/11] bpftool: Show probed function in kprobe_multi link info

Message ID 20230608103523.102267-4-laoar.shao@gmail.com (mailing list archive)
State Superseded
Delegated to: BPF
Headers show
Series bpf: Support ->fill_link_info for kprobe_multi and perf_event links | expand

Checks

Context Check Description
bpf/vmtest-bpf-next-PR success PR summary
bpf/vmtest-bpf-next-VM_Test-1 success Logs for ShellCheck
bpf/vmtest-bpf-next-VM_Test-2 success Logs for build for aarch64 with gcc
bpf/vmtest-bpf-next-VM_Test-4 success Logs for build for x86_64 with gcc
bpf/vmtest-bpf-next-VM_Test-5 success Logs for build for x86_64 with llvm-16
bpf/vmtest-bpf-next-VM_Test-6 success Logs for set-matrix
bpf/vmtest-bpf-next-VM_Test-3 success Logs for build for s390x with gcc
bpf/vmtest-bpf-next-VM_Test-7 success Logs for test_maps on aarch64 with gcc
bpf/vmtest-bpf-next-VM_Test-19 success Logs for test_progs_no_alu32_parallel on aarch64 with gcc
bpf/vmtest-bpf-next-VM_Test-22 success Logs for test_progs_parallel on aarch64 with gcc
bpf/vmtest-bpf-next-VM_Test-25 success Logs for test_verifier on aarch64 with gcc
bpf/vmtest-bpf-next-VM_Test-9 success Logs for test_maps on x86_64 with gcc
bpf/vmtest-bpf-next-VM_Test-10 success Logs for test_maps on x86_64 with llvm-16
bpf/vmtest-bpf-next-VM_Test-11 success Logs for test_progs on aarch64 with gcc
bpf/vmtest-bpf-next-VM_Test-13 success Logs for test_progs on x86_64 with gcc
bpf/vmtest-bpf-next-VM_Test-14 success Logs for test_progs on x86_64 with llvm-16
bpf/vmtest-bpf-next-VM_Test-15 success Logs for test_progs_no_alu32 on aarch64 with gcc
bpf/vmtest-bpf-next-VM_Test-17 success Logs for test_progs_no_alu32 on x86_64 with gcc
bpf/vmtest-bpf-next-VM_Test-18 success Logs for test_progs_no_alu32 on x86_64 with llvm-16
bpf/vmtest-bpf-next-VM_Test-20 success Logs for test_progs_no_alu32_parallel on x86_64 with gcc
bpf/vmtest-bpf-next-VM_Test-21 success Logs for test_progs_no_alu32_parallel on x86_64 with llvm-16
bpf/vmtest-bpf-next-VM_Test-23 success Logs for test_progs_parallel on x86_64 with gcc
bpf/vmtest-bpf-next-VM_Test-24 success Logs for test_progs_parallel on x86_64 with llvm-16
bpf/vmtest-bpf-next-VM_Test-27 success Logs for test_verifier on x86_64 with gcc
bpf/vmtest-bpf-next-VM_Test-28 success Logs for test_verifier on x86_64 with llvm-16
bpf/vmtest-bpf-next-VM_Test-29 success Logs for veristat
bpf/vmtest-bpf-next-VM_Test-26 success Logs for test_verifier on s390x with gcc
bpf/vmtest-bpf-next-VM_Test-16 success Logs for test_progs_no_alu32 on s390x with gcc
bpf/vmtest-bpf-next-VM_Test-12 success Logs for test_progs on s390x with gcc
netdev/series_format success Posting correctly formatted
netdev/tree_selection success Clearly marked for bpf-next, async
netdev/fixes_present success Fixes tag not required for -next series
netdev/header_inline success No static functions without inline keyword in header files
netdev/build_32bit success Errors and warnings before: 8 this patch: 8
netdev/cc_maintainers success CCed 13 of 13 maintainers
netdev/build_clang success Errors and warnings before: 8 this patch: 8
netdev/verify_signedoff success Signed-off-by tag matches author and committer
netdev/deprecated_api success None detected
netdev/check_selftest success No net selftest shell script
netdev/verify_fixes success No Fixes tag
netdev/build_allmodconfig_warn success Errors and warnings before: 8 this patch: 8
netdev/checkpatch success total: 0 errors, 0 warnings, 0 checks, 131 lines checked
netdev/kdoc success Errors and warnings before: 0 this patch: 0
netdev/source_inline success Was 0 now: 0
bpf/vmtest-bpf-next-VM_Test-8 success Logs for test_maps on s390x with gcc

Commit Message

Yafang Shao June 8, 2023, 10:35 a.m. UTC
Show the already expose kprobe_multi link info in bpftool. The result as
follows,

$ tools/bpf/bpftool/bpftool link show
4: kprobe_multi  prog 29
        retprobe 0  func_cnt 4
        addrs ffffffffb5d475b0  funcs schedule_timeout_interruptible
              ffffffffb5d475f0        schedule_timeout_killable
              ffffffffb5d47630        schedule_timeout_uninterruptible
              ffffffffb5d47670        schedule_timeout_idle
        pids trace(276245)

$ tools/bpf/bpftool/bpftool link show -j
[{"id":4,"type":"kprobe_multi","prog_id":29,"retprobe":0,"func_cnt":4,"funcs":[{"addr":18446744072465184176,"func":"schedule_timeout_interruptible"},{"addr":18446744072465184240,"func":"schedule_timeout_killable"},{"addr":18446744072465184304,"func":"schedule_timeout_uninterruptible"},{"addr":18446744072465184368,"func":"schedule_timeout_idle"}],"pids":[{"pid":276245,"comm":"trace"}]}]

Signed-off-by: Yafang Shao <laoar.shao@gmail.com>
---
 tools/bpf/bpftool/link.c | 82 ++++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 82 insertions(+)

Comments

Andrii Nakryiko June 8, 2023, 11:08 p.m. UTC | #1
On Thu, Jun 8, 2023 at 3:35 AM Yafang Shao <laoar.shao@gmail.com> wrote:
>
> Show the already expose kprobe_multi link info in bpftool. The result as
> follows,
>
> $ tools/bpf/bpftool/bpftool link show
> 4: kprobe_multi  prog 29
>         retprobe 0  func_cnt 4
>         addrs ffffffffb5d475b0  funcs schedule_timeout_interruptible
>               ffffffffb5d475f0        schedule_timeout_killable
>               ffffffffb5d47630        schedule_timeout_uninterruptible
>               ffffffffb5d47670        schedule_timeout_idle

what about module names? kallsyms has this information and it is quite
important, in addition to function name


>         pids trace(276245)
>
> $ tools/bpf/bpftool/bpftool link show -j
> [{"id":4,"type":"kprobe_multi","prog_id":29,"retprobe":0,"func_cnt":4,"funcs":[{"addr":18446744072465184176,"func":"schedule_timeout_interruptible"},{"addr":18446744072465184240,"func":"schedule_timeout_killable"},{"addr":18446744072465184304,"func":"schedule_timeout_uninterruptible"},{"addr":18446744072465184368,"func":"schedule_timeout_idle"}],"pids":[{"pid":276245,"comm":"trace"}]}]
>
> Signed-off-by: Yafang Shao <laoar.shao@gmail.com>
> ---
>  tools/bpf/bpftool/link.c | 82 ++++++++++++++++++++++++++++++++++++++++++++++++
>  1 file changed, 82 insertions(+)
>
> diff --git a/tools/bpf/bpftool/link.c b/tools/bpf/bpftool/link.c
> index 2d78607..c8033c3 100644
> --- a/tools/bpf/bpftool/link.c
> +++ b/tools/bpf/bpftool/link.c
> @@ -14,6 +14,7 @@
>
>  #include "json_writer.h"
>  #include "main.h"
> +#include "xlated_dumper.h"
>
>  static struct hashmap *link_table;
>
> @@ -166,6 +167,34 @@ static int get_prog_info(int prog_id, struct bpf_prog_info *info)
>         return err;
>  }
>
> +static void
> +show_kprobe_multi_json(struct bpf_link_info *info, json_writer_t *wtr)
> +{
> +       struct dump_data dd = {};
> +       const __u64 *addrs;
> +       __u32 i;
> +       int err;
> +
> +       jsonw_uint_field(json_wtr, "retprobe", info->kprobe_multi.retprobe);
> +       jsonw_uint_field(json_wtr, "func_cnt", info->kprobe_multi.count);
> +       jsonw_name(json_wtr, "funcs");
> +       jsonw_start_array(json_wtr);
> +       addrs = (const __u64 *)u64_to_ptr(info->kprobe_multi.addrs);
> +       err = kernel_syms_load(&dd, addrs, info->kprobe_multi.count);
> +       if (err) {
> +               jsonw_end_array(json_wtr);
> +               return;
> +       }
> +       for (i = 0; i < dd.sym_count; i++) {
> +               jsonw_start_object(json_wtr);
> +               jsonw_uint_field(json_wtr, "addr", dd.sym_mapping[i].address);
> +               jsonw_string_field(json_wtr, "func", dd.sym_mapping[i].name);
> +               jsonw_end_object(json_wtr);
> +       }
> +       jsonw_end_array(json_wtr);
> +       kernel_syms_destroy(&dd);
> +}
> +
>  static int show_link_close_json(int fd, struct bpf_link_info *info)
>  {
>         struct bpf_prog_info prog_info;
> @@ -218,6 +247,9 @@ static int show_link_close_json(int fd, struct bpf_link_info *info)
>                 jsonw_uint_field(json_wtr, "map_id",
>                                  info->struct_ops.map_id);
>                 break;
> +       case BPF_LINK_TYPE_KPROBE_MULTI:
> +               show_kprobe_multi_json(info, json_wtr);
> +               break;
>         default:
>                 break;
>         }
> @@ -351,6 +383,35 @@ void netfilter_dump_plain(const struct bpf_link_info *info)
>                 printf(" flags 0x%x", info->netfilter.flags);
>  }
>
> +static void show_kprobe_multi_plain(struct bpf_link_info *info)
> +{
> +       struct dump_data dd = {};
> +       const __u64 *addrs;
> +       __u32 i;
> +       int err;
> +
> +       if (!info->kprobe_multi.count)
> +               return;
> +
> +       printf("\n\tretprobe %d  func_cnt %u  ",
> +              info->kprobe_multi.retprobe, info->kprobe_multi.count);
> +       addrs = (const __u64 *)u64_to_ptr(info->kprobe_multi.addrs);
> +       err = kernel_syms_load(&dd, addrs, info->kprobe_multi.count);
> +       if (err)
> +               return;
> +       for (i = 0; i < dd.sym_count; i++) {
> +               if (!i)
> +                       printf("\n\taddrs %016lx  funcs %s  ",
> +                              dd.sym_mapping[i].address,
> +                              dd.sym_mapping[i].name);
> +               else
> +                       printf("\n\t      %016lx        %s  ",
> +                              dd.sym_mapping[i].address,
> +                              dd.sym_mapping[i].name);
> +       }
> +       kernel_syms_destroy(&dd);
> +}
> +
>  static int show_link_close_plain(int fd, struct bpf_link_info *info)
>  {
>         struct bpf_prog_info prog_info;
> @@ -396,6 +457,9 @@ static int show_link_close_plain(int fd, struct bpf_link_info *info)
>         case BPF_LINK_TYPE_NETFILTER:
>                 netfilter_dump_plain(info);
>                 break;
> +       case BPF_LINK_TYPE_KPROBE_MULTI:
> +               show_kprobe_multi_plain(info);
> +               break;
>         default:
>                 break;
>         }
> @@ -417,7 +481,9 @@ static int do_show_link(int fd)
>  {
>         struct bpf_link_info info;
>         __u32 len = sizeof(info);
> +       __u64 *addrs = NULL;
>         char buf[256];
> +       int count;
>         int err;
>
>         memset(&info, 0, sizeof(info));
> @@ -441,12 +507,28 @@ static int do_show_link(int fd)
>                 info.iter.target_name_len = sizeof(buf);
>                 goto again;
>         }
> +       if (info.type == BPF_LINK_TYPE_KPROBE_MULTI &&
> +           !info.kprobe_multi.addrs) {
> +               count = info.kprobe_multi.count;
> +               if (count) {
> +                       addrs = calloc(count, sizeof(__u64));
> +                       if (!addrs) {
> +                               p_err("mem alloc failed");
> +                               close(fd);
> +                               return -1;
> +                       }
> +                       info.kprobe_multi.addrs = (unsigned long)addrs;
> +                       goto again;
> +               }
> +       }
>
>         if (json_output)
>                 show_link_close_json(fd, &info);
>         else
>                 show_link_close_plain(fd, &info);
>
> +       if (addrs)
> +               free(addrs);
>         close(fd);
>         return 0;
>  }
> --
> 1.8.3.1
>
Yafang Shao June 9, 2023, 9:15 a.m. UTC | #2
On Fri, Jun 9, 2023 at 7:08 AM Andrii Nakryiko
<andrii.nakryiko@gmail.com> wrote:
>
> On Thu, Jun 8, 2023 at 3:35 AM Yafang Shao <laoar.shao@gmail.com> wrote:
> >
> > Show the already expose kprobe_multi link info in bpftool. The result as
> > follows,
> >
> > $ tools/bpf/bpftool/bpftool link show
> > 4: kprobe_multi  prog 29
> >         retprobe 0  func_cnt 4
> >         addrs ffffffffb5d475b0  funcs schedule_timeout_interruptible
> >               ffffffffb5d475f0        schedule_timeout_killable
> >               ffffffffb5d47630        schedule_timeout_uninterruptible
> >               ffffffffb5d47670        schedule_timeout_idle
>
> what about module names? kallsyms has this information and it is quite
> important, in addition to function name

Thanks for your suggestion. I will add it.
diff mbox series

Patch

diff --git a/tools/bpf/bpftool/link.c b/tools/bpf/bpftool/link.c
index 2d78607..c8033c3 100644
--- a/tools/bpf/bpftool/link.c
+++ b/tools/bpf/bpftool/link.c
@@ -14,6 +14,7 @@ 
 
 #include "json_writer.h"
 #include "main.h"
+#include "xlated_dumper.h"
 
 static struct hashmap *link_table;
 
@@ -166,6 +167,34 @@  static int get_prog_info(int prog_id, struct bpf_prog_info *info)
 	return err;
 }
 
+static void
+show_kprobe_multi_json(struct bpf_link_info *info, json_writer_t *wtr)
+{
+	struct dump_data dd = {};
+	const __u64 *addrs;
+	__u32 i;
+	int err;
+
+	jsonw_uint_field(json_wtr, "retprobe", info->kprobe_multi.retprobe);
+	jsonw_uint_field(json_wtr, "func_cnt", info->kprobe_multi.count);
+	jsonw_name(json_wtr, "funcs");
+	jsonw_start_array(json_wtr);
+	addrs = (const __u64 *)u64_to_ptr(info->kprobe_multi.addrs);
+	err = kernel_syms_load(&dd, addrs, info->kprobe_multi.count);
+	if (err) {
+		jsonw_end_array(json_wtr);
+		return;
+	}
+	for (i = 0; i < dd.sym_count; i++) {
+		jsonw_start_object(json_wtr);
+		jsonw_uint_field(json_wtr, "addr", dd.sym_mapping[i].address);
+		jsonw_string_field(json_wtr, "func", dd.sym_mapping[i].name);
+		jsonw_end_object(json_wtr);
+	}
+	jsonw_end_array(json_wtr);
+	kernel_syms_destroy(&dd);
+}
+
 static int show_link_close_json(int fd, struct bpf_link_info *info)
 {
 	struct bpf_prog_info prog_info;
@@ -218,6 +247,9 @@  static int show_link_close_json(int fd, struct bpf_link_info *info)
 		jsonw_uint_field(json_wtr, "map_id",
 				 info->struct_ops.map_id);
 		break;
+	case BPF_LINK_TYPE_KPROBE_MULTI:
+		show_kprobe_multi_json(info, json_wtr);
+		break;
 	default:
 		break;
 	}
@@ -351,6 +383,35 @@  void netfilter_dump_plain(const struct bpf_link_info *info)
 		printf(" flags 0x%x", info->netfilter.flags);
 }
 
+static void show_kprobe_multi_plain(struct bpf_link_info *info)
+{
+	struct dump_data dd = {};
+	const __u64 *addrs;
+	__u32 i;
+	int err;
+
+	if (!info->kprobe_multi.count)
+		return;
+
+	printf("\n\tretprobe %d  func_cnt %u  ",
+	       info->kprobe_multi.retprobe, info->kprobe_multi.count);
+	addrs = (const __u64 *)u64_to_ptr(info->kprobe_multi.addrs);
+	err = kernel_syms_load(&dd, addrs, info->kprobe_multi.count);
+	if (err)
+		return;
+	for (i = 0; i < dd.sym_count; i++) {
+		if (!i)
+			printf("\n\taddrs %016lx  funcs %s  ",
+			       dd.sym_mapping[i].address,
+			       dd.sym_mapping[i].name);
+		else
+			printf("\n\t      %016lx        %s  ",
+			       dd.sym_mapping[i].address,
+			       dd.sym_mapping[i].name);
+	}
+	kernel_syms_destroy(&dd);
+}
+
 static int show_link_close_plain(int fd, struct bpf_link_info *info)
 {
 	struct bpf_prog_info prog_info;
@@ -396,6 +457,9 @@  static int show_link_close_plain(int fd, struct bpf_link_info *info)
 	case BPF_LINK_TYPE_NETFILTER:
 		netfilter_dump_plain(info);
 		break;
+	case BPF_LINK_TYPE_KPROBE_MULTI:
+		show_kprobe_multi_plain(info);
+		break;
 	default:
 		break;
 	}
@@ -417,7 +481,9 @@  static int do_show_link(int fd)
 {
 	struct bpf_link_info info;
 	__u32 len = sizeof(info);
+	__u64 *addrs = NULL;
 	char buf[256];
+	int count;
 	int err;
 
 	memset(&info, 0, sizeof(info));
@@ -441,12 +507,28 @@  static int do_show_link(int fd)
 		info.iter.target_name_len = sizeof(buf);
 		goto again;
 	}
+	if (info.type == BPF_LINK_TYPE_KPROBE_MULTI &&
+	    !info.kprobe_multi.addrs) {
+		count = info.kprobe_multi.count;
+		if (count) {
+			addrs = calloc(count, sizeof(__u64));
+			if (!addrs) {
+				p_err("mem alloc failed");
+				close(fd);
+				return -1;
+			}
+			info.kprobe_multi.addrs = (unsigned long)addrs;
+			goto again;
+		}
+	}
 
 	if (json_output)
 		show_link_close_json(fd, &info);
 	else
 		show_link_close_plain(fd, &info);
 
+	if (addrs)
+		free(addrs);
 	close(fd);
 	return 0;
 }