1*858ea5e5SAndroid Build Coastguard Worker.. SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 2*858ea5e5SAndroid Build Coastguard Worker 3*858ea5e5SAndroid Build Coastguard Worker================ 4*858ea5e5SAndroid Build Coastguard Workerbpftool-prog 5*858ea5e5SAndroid Build Coastguard Worker================ 6*858ea5e5SAndroid Build Coastguard Worker------------------------------------------------------------------------------- 7*858ea5e5SAndroid Build Coastguard Workertool for inspection and simple manipulation of eBPF progs 8*858ea5e5SAndroid Build Coastguard Worker------------------------------------------------------------------------------- 9*858ea5e5SAndroid Build Coastguard Worker 10*858ea5e5SAndroid Build Coastguard Worker:Manual section: 8 11*858ea5e5SAndroid Build Coastguard Worker 12*858ea5e5SAndroid Build Coastguard Worker.. include:: substitutions.rst 13*858ea5e5SAndroid Build Coastguard Worker 14*858ea5e5SAndroid Build Coastguard WorkerSYNOPSIS 15*858ea5e5SAndroid Build Coastguard Worker======== 16*858ea5e5SAndroid Build Coastguard Worker 17*858ea5e5SAndroid Build Coastguard Worker **bpftool** [*OPTIONS*] **prog** *COMMAND* 18*858ea5e5SAndroid Build Coastguard Worker 19*858ea5e5SAndroid Build Coastguard Worker *OPTIONS* := { |COMMON_OPTIONS| | 20*858ea5e5SAndroid Build Coastguard Worker { **-f** | **--bpffs** } | { **-m** | **--mapcompat** } | { **-n** | **--nomount** } | 21*858ea5e5SAndroid Build Coastguard Worker { **-L** | **--use-loader** } } 22*858ea5e5SAndroid Build Coastguard Worker 23*858ea5e5SAndroid Build Coastguard Worker *COMMANDS* := 24*858ea5e5SAndroid Build Coastguard Worker { **show** | **list** | **dump xlated** | **dump jited** | **pin** | **load** | 25*858ea5e5SAndroid Build Coastguard Worker **loadall** | **help** } 26*858ea5e5SAndroid Build Coastguard Worker 27*858ea5e5SAndroid Build Coastguard WorkerPROG COMMANDS 28*858ea5e5SAndroid Build Coastguard Worker============= 29*858ea5e5SAndroid Build Coastguard Worker 30*858ea5e5SAndroid Build Coastguard Worker| **bpftool** **prog** { **show** | **list** } [*PROG*] 31*858ea5e5SAndroid Build Coastguard Worker| **bpftool** **prog dump xlated** *PROG* [{ **file** *FILE* | [**opcodes**] [**linum**] [**visual**] }] 32*858ea5e5SAndroid Build Coastguard Worker| **bpftool** **prog dump jited** *PROG* [{ **file** *FILE* | [**opcodes**] [**linum**] }] 33*858ea5e5SAndroid Build Coastguard Worker| **bpftool** **prog pin** *PROG* *FILE* 34*858ea5e5SAndroid Build Coastguard Worker| **bpftool** **prog** { **load** | **loadall** } *OBJ* *PATH* [**type** *TYPE*] [**map** { **idx** *IDX* | **name** *NAME* } *MAP*] [{ **offload_dev** | **xdpmeta_dev** } *NAME*] [**pinmaps** *MAP_DIR*] [**autoattach**] 35*858ea5e5SAndroid Build Coastguard Worker| **bpftool** **prog attach** *PROG* *ATTACH_TYPE* [*MAP*] 36*858ea5e5SAndroid Build Coastguard Worker| **bpftool** **prog detach** *PROG* *ATTACH_TYPE* [*MAP*] 37*858ea5e5SAndroid Build Coastguard Worker| **bpftool** **prog tracelog** 38*858ea5e5SAndroid Build Coastguard Worker| **bpftool** **prog run** *PROG* **data_in** *FILE* [**data_out** *FILE* [**data_size_out** *L*]] [**ctx_in** *FILE* [**ctx_out** *FILE* [**ctx_size_out** *M*]]] [**repeat** *N*] 39*858ea5e5SAndroid Build Coastguard Worker| **bpftool** **prog profile** *PROG* [**duration** *DURATION*] *METRICs* 40*858ea5e5SAndroid Build Coastguard Worker| **bpftool** **prog help** 41*858ea5e5SAndroid Build Coastguard Worker| 42*858ea5e5SAndroid Build Coastguard Worker| *MAP* := { **id** *MAP_ID* | **pinned** *FILE* } 43*858ea5e5SAndroid Build Coastguard Worker| *PROG* := { **id** *PROG_ID* | **pinned** *FILE* | **tag** *PROG_TAG* | **name** *PROG_NAME* } 44*858ea5e5SAndroid Build Coastguard Worker| *TYPE* := { 45*858ea5e5SAndroid Build Coastguard Worker| **socket** | **kprobe** | **kretprobe** | **classifier** | **action** | 46*858ea5e5SAndroid Build Coastguard Worker| **tracepoint** | **raw_tracepoint** | **xdp** | **perf_event** | **cgroup/skb** | 47*858ea5e5SAndroid Build Coastguard Worker| **cgroup/sock** | **cgroup/dev** | **lwt_in** | **lwt_out** | **lwt_xmit** | 48*858ea5e5SAndroid Build Coastguard Worker| **lwt_seg6local** | **sockops** | **sk_skb** | **sk_msg** | **lirc_mode2** | 49*858ea5e5SAndroid Build Coastguard Worker| **cgroup/bind4** | **cgroup/bind6** | **cgroup/post_bind4** | **cgroup/post_bind6** | 50*858ea5e5SAndroid Build Coastguard Worker| **cgroup/connect4** | **cgroup/connect6** | **cgroup/connect_unix** | 51*858ea5e5SAndroid Build Coastguard Worker| **cgroup/getpeername4** | **cgroup/getpeername6** | **cgroup/getpeername_unix** | 52*858ea5e5SAndroid Build Coastguard Worker| **cgroup/getsockname4** | **cgroup/getsockname6** | **cgroup/getsockname_unix** | 53*858ea5e5SAndroid Build Coastguard Worker| **cgroup/sendmsg4** | **cgroup/sendmsg6** | **cgroup/sendmsg_unix** | 54*858ea5e5SAndroid Build Coastguard Worker| **cgroup/recvmsg4** | **cgroup/recvmsg6** | **cgroup/recvmsg_unix** | **cgroup/sysctl** | 55*858ea5e5SAndroid Build Coastguard Worker| **cgroup/getsockopt** | **cgroup/setsockopt** | **cgroup/sock_release** | 56*858ea5e5SAndroid Build Coastguard Worker| **struct_ops** | **fentry** | **fexit** | **freplace** | **sk_lookup** 57*858ea5e5SAndroid Build Coastguard Worker| } 58*858ea5e5SAndroid Build Coastguard Worker| *ATTACH_TYPE* := { 59*858ea5e5SAndroid Build Coastguard Worker| **sk_msg_verdict** | **sk_skb_verdict** | **sk_skb_stream_verdict** | 60*858ea5e5SAndroid Build Coastguard Worker| **sk_skb_stream_parser** | **flow_dissector** 61*858ea5e5SAndroid Build Coastguard Worker| } 62*858ea5e5SAndroid Build Coastguard Worker| *METRICs* := { 63*858ea5e5SAndroid Build Coastguard Worker| **cycles** | **instructions** | **l1d_loads** | **llc_misses** | 64*858ea5e5SAndroid Build Coastguard Worker| **itlb_misses** | **dtlb_misses** 65*858ea5e5SAndroid Build Coastguard Worker| } 66*858ea5e5SAndroid Build Coastguard Worker 67*858ea5e5SAndroid Build Coastguard Worker 68*858ea5e5SAndroid Build Coastguard WorkerDESCRIPTION 69*858ea5e5SAndroid Build Coastguard Worker=========== 70*858ea5e5SAndroid Build Coastguard Worker **bpftool prog { show | list }** [*PROG*] 71*858ea5e5SAndroid Build Coastguard Worker Show information about loaded programs. If *PROG* is 72*858ea5e5SAndroid Build Coastguard Worker specified show information only about given programs, 73*858ea5e5SAndroid Build Coastguard Worker otherwise list all programs currently loaded on the system. 74*858ea5e5SAndroid Build Coastguard Worker In case of **tag** or **name**, *PROG* may match several 75*858ea5e5SAndroid Build Coastguard Worker programs which will all be shown. 76*858ea5e5SAndroid Build Coastguard Worker 77*858ea5e5SAndroid Build Coastguard Worker Output will start with program ID followed by program type and 78*858ea5e5SAndroid Build Coastguard Worker zero or more named attributes (depending on kernel version). 79*858ea5e5SAndroid Build Coastguard Worker 80*858ea5e5SAndroid Build Coastguard Worker Since Linux 5.1 the kernel can collect statistics on BPF 81*858ea5e5SAndroid Build Coastguard Worker programs (such as the total time spent running the program, 82*858ea5e5SAndroid Build Coastguard Worker and the number of times it was run). If available, bpftool 83*858ea5e5SAndroid Build Coastguard Worker shows such statistics. However, the kernel does not collect 84*858ea5e5SAndroid Build Coastguard Worker them by defaults, as it slightly impacts performance on each 85*858ea5e5SAndroid Build Coastguard Worker program run. Activation or deactivation of the feature is 86*858ea5e5SAndroid Build Coastguard Worker performed via the **kernel.bpf_stats_enabled** sysctl knob. 87*858ea5e5SAndroid Build Coastguard Worker 88*858ea5e5SAndroid Build Coastguard Worker Since Linux 5.8 bpftool is able to discover information about 89*858ea5e5SAndroid Build Coastguard Worker processes that hold open file descriptors (FDs) against BPF 90*858ea5e5SAndroid Build Coastguard Worker programs. On such kernels bpftool will automatically emit this 91*858ea5e5SAndroid Build Coastguard Worker information as well. 92*858ea5e5SAndroid Build Coastguard Worker 93*858ea5e5SAndroid Build Coastguard Worker **bpftool prog dump xlated** *PROG* [{ **file** *FILE* | [**opcodes**] [**linum**] [**visual**] }] 94*858ea5e5SAndroid Build Coastguard Worker Dump eBPF instructions of the programs from the kernel. By 95*858ea5e5SAndroid Build Coastguard Worker default, eBPF will be disassembled and printed to standard 96*858ea5e5SAndroid Build Coastguard Worker output in human-readable format. In this case, **opcodes** 97*858ea5e5SAndroid Build Coastguard Worker controls if raw opcodes should be printed as well. 98*858ea5e5SAndroid Build Coastguard Worker 99*858ea5e5SAndroid Build Coastguard Worker In case of **tag** or **name**, *PROG* may match several 100*858ea5e5SAndroid Build Coastguard Worker programs which will all be dumped. However, if **file** or 101*858ea5e5SAndroid Build Coastguard Worker **visual** is specified, *PROG* must match a single program. 102*858ea5e5SAndroid Build Coastguard Worker 103*858ea5e5SAndroid Build Coastguard Worker If **file** is specified, the binary image will instead be 104*858ea5e5SAndroid Build Coastguard Worker written to *FILE*. 105*858ea5e5SAndroid Build Coastguard Worker 106*858ea5e5SAndroid Build Coastguard Worker If **visual** is specified, control flow graph (CFG) will be 107*858ea5e5SAndroid Build Coastguard Worker built instead, and eBPF instructions will be presented with 108*858ea5e5SAndroid Build Coastguard Worker CFG in DOT format, on standard output. 109*858ea5e5SAndroid Build Coastguard Worker 110*858ea5e5SAndroid Build Coastguard Worker If the programs have line_info available, the source line will 111*858ea5e5SAndroid Build Coastguard Worker be displayed. If **linum** is specified, the filename, line 112*858ea5e5SAndroid Build Coastguard Worker number and line column will also be displayed. 113*858ea5e5SAndroid Build Coastguard Worker 114*858ea5e5SAndroid Build Coastguard Worker **bpftool prog dump jited** *PROG* [{ **file** *FILE* | [**opcodes**] [**linum**] }] 115*858ea5e5SAndroid Build Coastguard Worker Dump jited image (host machine code) of the program. 116*858ea5e5SAndroid Build Coastguard Worker 117*858ea5e5SAndroid Build Coastguard Worker If *FILE* is specified image will be written to a file, 118*858ea5e5SAndroid Build Coastguard Worker otherwise it will be disassembled and printed to stdout. 119*858ea5e5SAndroid Build Coastguard Worker *PROG* must match a single program when **file** is specified. 120*858ea5e5SAndroid Build Coastguard Worker 121*858ea5e5SAndroid Build Coastguard Worker **opcodes** controls if raw opcodes will be printed. 122*858ea5e5SAndroid Build Coastguard Worker 123*858ea5e5SAndroid Build Coastguard Worker If the prog has line_info available, the source line will 124*858ea5e5SAndroid Build Coastguard Worker be displayed. If **linum** is specified, the filename, line 125*858ea5e5SAndroid Build Coastguard Worker number and line column will also be displayed. 126*858ea5e5SAndroid Build Coastguard Worker 127*858ea5e5SAndroid Build Coastguard Worker **bpftool prog pin** *PROG* *FILE* 128*858ea5e5SAndroid Build Coastguard Worker Pin program *PROG* as *FILE*. 129*858ea5e5SAndroid Build Coastguard Worker 130*858ea5e5SAndroid Build Coastguard Worker Note: *FILE* must be located in *bpffs* mount. It must not 131*858ea5e5SAndroid Build Coastguard Worker contain a dot character ('.'), which is reserved for future 132*858ea5e5SAndroid Build Coastguard Worker extensions of *bpffs*. 133*858ea5e5SAndroid Build Coastguard Worker 134*858ea5e5SAndroid Build Coastguard Worker **bpftool prog { load | loadall }** *OBJ* *PATH* [**type** *TYPE*] [**map** { **idx** *IDX* | **name** *NAME* } *MAP*] [{ **offload_dev** | **xdpmeta_dev** } *NAME*] [**pinmaps** *MAP_DIR*] [**autoattach**] 135*858ea5e5SAndroid Build Coastguard Worker Load bpf program(s) from binary *OBJ* and pin as *PATH*. 136*858ea5e5SAndroid Build Coastguard Worker **bpftool prog load** pins only the first program from the 137*858ea5e5SAndroid Build Coastguard Worker *OBJ* as *PATH*. **bpftool prog loadall** pins all programs 138*858ea5e5SAndroid Build Coastguard Worker from the *OBJ* under *PATH* directory. 139*858ea5e5SAndroid Build Coastguard Worker **type** is optional, if not specified program type will be 140*858ea5e5SAndroid Build Coastguard Worker inferred from section names. 141*858ea5e5SAndroid Build Coastguard Worker By default bpftool will create new maps as declared in the ELF 142*858ea5e5SAndroid Build Coastguard Worker object being loaded. **map** parameter allows for the reuse 143*858ea5e5SAndroid Build Coastguard Worker of existing maps. It can be specified multiple times, each 144*858ea5e5SAndroid Build Coastguard Worker time for a different map. *IDX* refers to index of the map 145*858ea5e5SAndroid Build Coastguard Worker to be replaced in the ELF file counting from 0, while *NAME* 146*858ea5e5SAndroid Build Coastguard Worker allows to replace a map by name. *MAP* specifies the map to 147*858ea5e5SAndroid Build Coastguard Worker use, referring to it by **id** or through a **pinned** file. 148*858ea5e5SAndroid Build Coastguard Worker If **offload_dev** *NAME* is specified program will be loaded 149*858ea5e5SAndroid Build Coastguard Worker onto given networking device (offload). 150*858ea5e5SAndroid Build Coastguard Worker If **xdpmeta_dev** *NAME* is specified program will become 151*858ea5e5SAndroid Build Coastguard Worker device-bound without offloading, this facilitates access 152*858ea5e5SAndroid Build Coastguard Worker to XDP metadata. 153*858ea5e5SAndroid Build Coastguard Worker Optional **pinmaps** argument can be provided to pin all 154*858ea5e5SAndroid Build Coastguard Worker maps under *MAP_DIR* directory. 155*858ea5e5SAndroid Build Coastguard Worker 156*858ea5e5SAndroid Build Coastguard Worker If **autoattach** is specified program will be attached 157*858ea5e5SAndroid Build Coastguard Worker before pin. In that case, only the link (representing the 158*858ea5e5SAndroid Build Coastguard Worker program attached to its hook) is pinned, not the program as 159*858ea5e5SAndroid Build Coastguard Worker such, so the path won't show in **bpftool prog show -f**, 160*858ea5e5SAndroid Build Coastguard Worker only show in **bpftool link show -f**. Also, this only works 161*858ea5e5SAndroid Build Coastguard Worker when bpftool (libbpf) is able to infer all necessary 162*858ea5e5SAndroid Build Coastguard Worker information from the object file, in particular, it's not 163*858ea5e5SAndroid Build Coastguard Worker supported for all program types. If a program does not 164*858ea5e5SAndroid Build Coastguard Worker support autoattach, bpftool falls back to regular pinning 165*858ea5e5SAndroid Build Coastguard Worker for that program instead. 166*858ea5e5SAndroid Build Coastguard Worker 167*858ea5e5SAndroid Build Coastguard Worker Note: *PATH* must be located in *bpffs* mount. It must not 168*858ea5e5SAndroid Build Coastguard Worker contain a dot character ('.'), which is reserved for future 169*858ea5e5SAndroid Build Coastguard Worker extensions of *bpffs*. 170*858ea5e5SAndroid Build Coastguard Worker 171*858ea5e5SAndroid Build Coastguard Worker **bpftool prog attach** *PROG* *ATTACH_TYPE* [*MAP*] 172*858ea5e5SAndroid Build Coastguard Worker Attach bpf program *PROG* (with type specified by 173*858ea5e5SAndroid Build Coastguard Worker *ATTACH_TYPE*). Most *ATTACH_TYPEs* require a *MAP* 174*858ea5e5SAndroid Build Coastguard Worker parameter, with the exception of *flow_dissector* which is 175*858ea5e5SAndroid Build Coastguard Worker attached to current networking name space. 176*858ea5e5SAndroid Build Coastguard Worker 177*858ea5e5SAndroid Build Coastguard Worker **bpftool prog detach** *PROG* *ATTACH_TYPE* [*MAP*] 178*858ea5e5SAndroid Build Coastguard Worker Detach bpf program *PROG* (with type specified by 179*858ea5e5SAndroid Build Coastguard Worker *ATTACH_TYPE*). Most *ATTACH_TYPEs* require a *MAP* 180*858ea5e5SAndroid Build Coastguard Worker parameter, with the exception of *flow_dissector* which is 181*858ea5e5SAndroid Build Coastguard Worker detached from the current networking name space. 182*858ea5e5SAndroid Build Coastguard Worker 183*858ea5e5SAndroid Build Coastguard Worker **bpftool prog tracelog** 184*858ea5e5SAndroid Build Coastguard Worker Dump the trace pipe of the system to the console (stdout). 185*858ea5e5SAndroid Build Coastguard Worker Hit <Ctrl+C> to stop printing. BPF programs can write to this 186*858ea5e5SAndroid Build Coastguard Worker trace pipe at runtime with the **bpf_trace_printk**\ () helper. 187*858ea5e5SAndroid Build Coastguard Worker This should be used only for debugging purposes. For 188*858ea5e5SAndroid Build Coastguard Worker streaming data from BPF programs to user space, one can use 189*858ea5e5SAndroid Build Coastguard Worker perf events (see also **bpftool-map**\ (8)). 190*858ea5e5SAndroid Build Coastguard Worker 191*858ea5e5SAndroid Build Coastguard Worker **bpftool prog run** *PROG* **data_in** *FILE* [**data_out** *FILE* [**data_size_out** *L*]] [**ctx_in** *FILE* [**ctx_out** *FILE* [**ctx_size_out** *M*]]] [**repeat** *N*] 192*858ea5e5SAndroid Build Coastguard Worker Run BPF program *PROG* in the kernel testing infrastructure 193*858ea5e5SAndroid Build Coastguard Worker for BPF, meaning that the program works on the data and 194*858ea5e5SAndroid Build Coastguard Worker context provided by the user, and not on actual packets or 195*858ea5e5SAndroid Build Coastguard Worker monitored functions etc. Return value and duration for the 196*858ea5e5SAndroid Build Coastguard Worker test run are printed out to the console. 197*858ea5e5SAndroid Build Coastguard Worker 198*858ea5e5SAndroid Build Coastguard Worker Input data is read from the *FILE* passed with **data_in**. 199*858ea5e5SAndroid Build Coastguard Worker If this *FILE* is "**-**", input data is read from standard 200*858ea5e5SAndroid Build Coastguard Worker input. Input context, if any, is read from *FILE* passed with 201*858ea5e5SAndroid Build Coastguard Worker **ctx_in**. Again, "**-**" can be used to read from standard 202*858ea5e5SAndroid Build Coastguard Worker input, but only if standard input is not already in use for 203*858ea5e5SAndroid Build Coastguard Worker input data. If a *FILE* is passed with **data_out**, output 204*858ea5e5SAndroid Build Coastguard Worker data is written to that file. Similarly, output context is 205*858ea5e5SAndroid Build Coastguard Worker written to the *FILE* passed with **ctx_out**. For both 206*858ea5e5SAndroid Build Coastguard Worker output flows, "**-**" can be used to print to the standard 207*858ea5e5SAndroid Build Coastguard Worker output (as plain text, or JSON if relevant option was 208*858ea5e5SAndroid Build Coastguard Worker passed). If output keywords are omitted, output data and 209*858ea5e5SAndroid Build Coastguard Worker context are discarded. Keywords **data_size_out** and 210*858ea5e5SAndroid Build Coastguard Worker **ctx_size_out** are used to pass the size (in bytes) for the 211*858ea5e5SAndroid Build Coastguard Worker output buffers to the kernel, although the default of 32 kB 212*858ea5e5SAndroid Build Coastguard Worker should be more than enough for most cases. 213*858ea5e5SAndroid Build Coastguard Worker 214*858ea5e5SAndroid Build Coastguard Worker Keyword **repeat** is used to indicate the number of 215*858ea5e5SAndroid Build Coastguard Worker consecutive runs to perform. Note that output data and 216*858ea5e5SAndroid Build Coastguard Worker context printed to files correspond to the last of those 217*858ea5e5SAndroid Build Coastguard Worker runs. The duration printed out at the end of the runs is an 218*858ea5e5SAndroid Build Coastguard Worker average over all runs performed by the command. 219*858ea5e5SAndroid Build Coastguard Worker 220*858ea5e5SAndroid Build Coastguard Worker Not all program types support test run. Among those which do, 221*858ea5e5SAndroid Build Coastguard Worker not all of them can take the **ctx_in**/**ctx_out** 222*858ea5e5SAndroid Build Coastguard Worker arguments. bpftool does not perform checks on program types. 223*858ea5e5SAndroid Build Coastguard Worker 224*858ea5e5SAndroid Build Coastguard Worker **bpftool prog profile** *PROG* [**duration** *DURATION*] *METRICs* 225*858ea5e5SAndroid Build Coastguard Worker Profile *METRICs* for bpf program *PROG* for *DURATION* 226*858ea5e5SAndroid Build Coastguard Worker seconds or until user hits <Ctrl+C>. *DURATION* is optional. 227*858ea5e5SAndroid Build Coastguard Worker If *DURATION* is not specified, the profiling will run up to 228*858ea5e5SAndroid Build Coastguard Worker **UINT_MAX** seconds. 229*858ea5e5SAndroid Build Coastguard Worker 230*858ea5e5SAndroid Build Coastguard Worker **bpftool prog help** 231*858ea5e5SAndroid Build Coastguard Worker Print short help message. 232*858ea5e5SAndroid Build Coastguard Worker 233*858ea5e5SAndroid Build Coastguard WorkerOPTIONS 234*858ea5e5SAndroid Build Coastguard Worker======= 235*858ea5e5SAndroid Build Coastguard Worker .. include:: common_options.rst 236*858ea5e5SAndroid Build Coastguard Worker 237*858ea5e5SAndroid Build Coastguard Worker -f, --bpffs 238*858ea5e5SAndroid Build Coastguard Worker When showing BPF programs, show file names of pinned 239*858ea5e5SAndroid Build Coastguard Worker programs. 240*858ea5e5SAndroid Build Coastguard Worker 241*858ea5e5SAndroid Build Coastguard Worker -m, --mapcompat 242*858ea5e5SAndroid Build Coastguard Worker Allow loading maps with unknown map definitions. 243*858ea5e5SAndroid Build Coastguard Worker 244*858ea5e5SAndroid Build Coastguard Worker -n, --nomount 245*858ea5e5SAndroid Build Coastguard Worker Do not automatically attempt to mount any virtual file system 246*858ea5e5SAndroid Build Coastguard Worker (such as tracefs or BPF virtual file system) when necessary. 247*858ea5e5SAndroid Build Coastguard Worker 248*858ea5e5SAndroid Build Coastguard Worker -L, --use-loader 249*858ea5e5SAndroid Build Coastguard Worker Load program as a "loader" program. This is useful to debug 250*858ea5e5SAndroid Build Coastguard Worker the generation of such programs. When this option is in 251*858ea5e5SAndroid Build Coastguard Worker use, bpftool attempts to load the programs from the object 252*858ea5e5SAndroid Build Coastguard Worker file into the kernel, but does not pin them (therefore, the 253*858ea5e5SAndroid Build Coastguard Worker *PATH* must not be provided). 254*858ea5e5SAndroid Build Coastguard Worker 255*858ea5e5SAndroid Build Coastguard Worker When combined with the **-d**\ \|\ **--debug** option, 256*858ea5e5SAndroid Build Coastguard Worker additional debug messages are generated, and the execution 257*858ea5e5SAndroid Build Coastguard Worker of the loader program will use the **bpf_trace_printk**\ () 258*858ea5e5SAndroid Build Coastguard Worker helper to log each step of loading BTF, creating the maps, 259*858ea5e5SAndroid Build Coastguard Worker and loading the programs (see **bpftool prog tracelog** as 260*858ea5e5SAndroid Build Coastguard Worker a way to dump those messages). 261*858ea5e5SAndroid Build Coastguard Worker 262*858ea5e5SAndroid Build Coastguard WorkerEXAMPLES 263*858ea5e5SAndroid Build Coastguard Worker======== 264*858ea5e5SAndroid Build Coastguard Worker**# bpftool prog show** 265*858ea5e5SAndroid Build Coastguard Worker 266*858ea5e5SAndroid Build Coastguard Worker:: 267*858ea5e5SAndroid Build Coastguard Worker 268*858ea5e5SAndroid Build Coastguard Worker 10: xdp name some_prog tag 005a3d2123620c8b gpl run_time_ns 81632 run_cnt 10 269*858ea5e5SAndroid Build Coastguard Worker loaded_at 2017-09-29T20:11:00+0000 uid 0 270*858ea5e5SAndroid Build Coastguard Worker xlated 528B jited 370B memlock 4096B map_ids 10 271*858ea5e5SAndroid Build Coastguard Worker pids systemd(1) 272*858ea5e5SAndroid Build Coastguard Worker 273*858ea5e5SAndroid Build Coastguard Worker**# bpftool --json --pretty prog show** 274*858ea5e5SAndroid Build Coastguard Worker 275*858ea5e5SAndroid Build Coastguard Worker:: 276*858ea5e5SAndroid Build Coastguard Worker 277*858ea5e5SAndroid Build Coastguard Worker [{ 278*858ea5e5SAndroid Build Coastguard Worker "id": 10, 279*858ea5e5SAndroid Build Coastguard Worker "type": "xdp", 280*858ea5e5SAndroid Build Coastguard Worker "tag": "005a3d2123620c8b", 281*858ea5e5SAndroid Build Coastguard Worker "gpl_compatible": true, 282*858ea5e5SAndroid Build Coastguard Worker "run_time_ns": 81632, 283*858ea5e5SAndroid Build Coastguard Worker "run_cnt": 10, 284*858ea5e5SAndroid Build Coastguard Worker "loaded_at": 1506715860, 285*858ea5e5SAndroid Build Coastguard Worker "uid": 0, 286*858ea5e5SAndroid Build Coastguard Worker "bytes_xlated": 528, 287*858ea5e5SAndroid Build Coastguard Worker "jited": true, 288*858ea5e5SAndroid Build Coastguard Worker "bytes_jited": 370, 289*858ea5e5SAndroid Build Coastguard Worker "bytes_memlock": 4096, 290*858ea5e5SAndroid Build Coastguard Worker "map_ids": [10 291*858ea5e5SAndroid Build Coastguard Worker ], 292*858ea5e5SAndroid Build Coastguard Worker "pids": [{ 293*858ea5e5SAndroid Build Coastguard Worker "pid": 1, 294*858ea5e5SAndroid Build Coastguard Worker "comm": "systemd" 295*858ea5e5SAndroid Build Coastguard Worker } 296*858ea5e5SAndroid Build Coastguard Worker ] 297*858ea5e5SAndroid Build Coastguard Worker } 298*858ea5e5SAndroid Build Coastguard Worker ] 299*858ea5e5SAndroid Build Coastguard Worker 300*858ea5e5SAndroid Build Coastguard Worker| 301*858ea5e5SAndroid Build Coastguard Worker| **# bpftool prog dump xlated id 10 file /tmp/t** 302*858ea5e5SAndroid Build Coastguard Worker| **$ ls -l /tmp/t** 303*858ea5e5SAndroid Build Coastguard Worker 304*858ea5e5SAndroid Build Coastguard Worker:: 305*858ea5e5SAndroid Build Coastguard Worker 306*858ea5e5SAndroid Build Coastguard Worker -rw------- 1 root root 560 Jul 22 01:42 /tmp/t 307*858ea5e5SAndroid Build Coastguard Worker 308*858ea5e5SAndroid Build Coastguard Worker**# bpftool prog dump jited tag 005a3d2123620c8b** 309*858ea5e5SAndroid Build Coastguard Worker 310*858ea5e5SAndroid Build Coastguard Worker:: 311*858ea5e5SAndroid Build Coastguard Worker 312*858ea5e5SAndroid Build Coastguard Worker 0: push %rbp 313*858ea5e5SAndroid Build Coastguard Worker 1: mov %rsp,%rbp 314*858ea5e5SAndroid Build Coastguard Worker 2: sub $0x228,%rsp 315*858ea5e5SAndroid Build Coastguard Worker 3: sub $0x28,%rbp 316*858ea5e5SAndroid Build Coastguard Worker 4: mov %rbx,0x0(%rbp) 317*858ea5e5SAndroid Build Coastguard Worker 318*858ea5e5SAndroid Build Coastguard Worker| 319*858ea5e5SAndroid Build Coastguard Worker| **# mount -t bpf none /sys/fs/bpf/** 320*858ea5e5SAndroid Build Coastguard Worker| **# bpftool prog pin id 10 /sys/fs/bpf/prog** 321*858ea5e5SAndroid Build Coastguard Worker| **# bpftool prog load ./my_prog.o /sys/fs/bpf/prog2** 322*858ea5e5SAndroid Build Coastguard Worker| **# ls -l /sys/fs/bpf/** 323*858ea5e5SAndroid Build Coastguard Worker 324*858ea5e5SAndroid Build Coastguard Worker:: 325*858ea5e5SAndroid Build Coastguard Worker 326*858ea5e5SAndroid Build Coastguard Worker -rw------- 1 root root 0 Jul 22 01:43 prog 327*858ea5e5SAndroid Build Coastguard Worker -rw------- 1 root root 0 Jul 22 01:44 prog2 328*858ea5e5SAndroid Build Coastguard Worker 329*858ea5e5SAndroid Build Coastguard Worker**# bpftool prog dump jited pinned /sys/fs/bpf/prog opcodes** 330*858ea5e5SAndroid Build Coastguard Worker 331*858ea5e5SAndroid Build Coastguard Worker:: 332*858ea5e5SAndroid Build Coastguard Worker 333*858ea5e5SAndroid Build Coastguard Worker 0: push %rbp 334*858ea5e5SAndroid Build Coastguard Worker 55 335*858ea5e5SAndroid Build Coastguard Worker 1: mov %rsp,%rbp 336*858ea5e5SAndroid Build Coastguard Worker 48 89 e5 337*858ea5e5SAndroid Build Coastguard Worker 4: sub $0x228,%rsp 338*858ea5e5SAndroid Build Coastguard Worker 48 81 ec 28 02 00 00 339*858ea5e5SAndroid Build Coastguard Worker b: sub $0x28,%rbp 340*858ea5e5SAndroid Build Coastguard Worker 48 83 ed 28 341*858ea5e5SAndroid Build Coastguard Worker f: mov %rbx,0x0(%rbp) 342*858ea5e5SAndroid Build Coastguard Worker 48 89 5d 00 343*858ea5e5SAndroid Build Coastguard Worker 344*858ea5e5SAndroid Build Coastguard Worker| 345*858ea5e5SAndroid Build Coastguard Worker| **# bpftool prog load xdp1_kern.o /sys/fs/bpf/xdp1 type xdp map name rxcnt id 7** 346*858ea5e5SAndroid Build Coastguard Worker| **# bpftool prog show pinned /sys/fs/bpf/xdp1** 347*858ea5e5SAndroid Build Coastguard Worker 348*858ea5e5SAndroid Build Coastguard Worker:: 349*858ea5e5SAndroid Build Coastguard Worker 350*858ea5e5SAndroid Build Coastguard Worker 9: xdp name xdp_prog1 tag 539ec6ce11b52f98 gpl 351*858ea5e5SAndroid Build Coastguard Worker loaded_at 2018-06-25T16:17:31-0700 uid 0 352*858ea5e5SAndroid Build Coastguard Worker xlated 488B jited 336B memlock 4096B map_ids 7 353*858ea5e5SAndroid Build Coastguard Worker 354*858ea5e5SAndroid Build Coastguard Worker**# rm /sys/fs/bpf/xdp1** 355*858ea5e5SAndroid Build Coastguard Worker 356*858ea5e5SAndroid Build Coastguard Worker| 357*858ea5e5SAndroid Build Coastguard Worker| **# bpftool prog profile id 337 duration 10 cycles instructions llc_misses** 358*858ea5e5SAndroid Build Coastguard Worker 359*858ea5e5SAndroid Build Coastguard Worker:: 360*858ea5e5SAndroid Build Coastguard Worker 361*858ea5e5SAndroid Build Coastguard Worker 51397 run_cnt 362*858ea5e5SAndroid Build Coastguard Worker 40176203 cycles (83.05%) 363*858ea5e5SAndroid Build Coastguard Worker 42518139 instructions # 1.06 insns per cycle (83.39%) 364*858ea5e5SAndroid Build Coastguard Worker 123 llc_misses # 2.89 LLC misses per million insns (83.15%) 365*858ea5e5SAndroid Build Coastguard Worker 366*858ea5e5SAndroid Build Coastguard Worker| 367*858ea5e5SAndroid Build Coastguard Worker| Output below is for the trace logs. 368*858ea5e5SAndroid Build Coastguard Worker| Run in separate terminals: 369*858ea5e5SAndroid Build Coastguard Worker| **# bpftool prog tracelog** 370*858ea5e5SAndroid Build Coastguard Worker| **# bpftool prog load -L -d file.o** 371*858ea5e5SAndroid Build Coastguard Worker 372*858ea5e5SAndroid Build Coastguard Worker:: 373*858ea5e5SAndroid Build Coastguard Worker 374*858ea5e5SAndroid Build Coastguard Worker bpftool-620059 [004] d... 2634685.517903: bpf_trace_printk: btf_load size 665 r=5 375*858ea5e5SAndroid Build Coastguard Worker bpftool-620059 [004] d... 2634685.517912: bpf_trace_printk: map_create sample_map idx 0 type 2 value_size 4 value_btf_id 0 r=6 376*858ea5e5SAndroid Build Coastguard Worker bpftool-620059 [004] d... 2634685.517997: bpf_trace_printk: prog_load sample insn_cnt 13 r=7 377*858ea5e5SAndroid Build Coastguard Worker bpftool-620059 [004] d... 2634685.517999: bpf_trace_printk: close(5) = 0 378