From patchwork Wed Aug 27 02:29:41 2014 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Alexei Starovoitov X-Patchwork-Id: 383257 X-Patchwork-Delegate: davem@davemloft.net Return-Path: X-Original-To: patchwork-incoming@ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id C07A51400B2 for ; Wed, 27 Aug 2014 12:31:37 +1000 (EST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932193AbaH0CbV (ORCPT ); Tue, 26 Aug 2014 22:31:21 -0400 Received: from mail-pa0-f50.google.com ([209.85.220.50]:47727 "EHLO mail-pa0-f50.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1758169AbaH0CbL (ORCPT ); Tue, 26 Aug 2014 22:31:11 -0400 Received: by mail-pa0-f50.google.com with SMTP id et14so24639131pad.23 for ; Tue, 26 Aug 2014 19:31:11 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=DY4Fue9izW+U5kmcAQLuJ12XnBhaWTFjy79DLncgCYY=; b=kL/gXyj5xrev2tsdBYXFFdQ4fyQp6JnKnbC01Uk3A7y5arF0mcVIoeBU23HXQ6q9H1 dJC4XAGV+W2fR7RNaJbsXAm8dYk287o+jG7dWP97aLygPuskxz643sdoDbAedtsQ83rI sDMtt47Zc9WpaNmob98Ak9nJXpNlmCKkscZTARBYv8I6/Q5ME0fkI0eCAGYnC9K4d8Zh rXlX1Dz3HkeIhdB58Bslpj3rLso9hyK4xE2TFhew/fQviYF3B5cdflhnFf2GWvysBw/x zSZrvdRmNMYlKw3mI7rNo8zPYbcWmMRfXohLhxk8wObXR7fXWgu9wTfzuPU6Hji3d95v TODA== X-Gm-Message-State: ALoCoQkRyWy6oHj5oh58omsH6118V86u2uiBx4mCLs7cDTCSuwfEFZc+dFbp0McLgQgDmIE1h+AL X-Received: by 10.69.18.234 with SMTP id gp10mr42031592pbd.11.1409106670994; Tue, 26 Aug 2014 19:31:10 -0700 (PDT) Received: from pg-vmw-gw1.plumgrid.com ([67.21.3.149]) by mx.google.com with ESMTPSA id xj5sm4755897pbb.7.2014.08.26.19.31.08 for (version=TLSv1.1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 26 Aug 2014 19:31:10 -0700 (PDT) From: Alexei Starovoitov To: "David S. Miller" Cc: Ingo Molnar , Linus Torvalds , Andy Lutomirski , Steven Rostedt , Daniel Borkmann , Chema Gonzalez , Eric Dumazet , Peter Zijlstra , Brendan Gregg , Namhyung Kim , "H. Peter Anvin" , Andrew Morton , Kees Cook , linux-api@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH RFC v7 net-next 27/28] samples: bpf: counting eBPF example in C Date: Tue, 26 Aug 2014 19:29:41 -0700 Message-Id: <1409106582-10095-28-git-send-email-ast@plumgrid.com> X-Mailer: git-send-email 1.7.9.5 In-Reply-To: <1409106582-10095-1-git-send-email-ast@plumgrid.com> References: <1409106582-10095-1-git-send-email-ast@plumgrid.com> Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org this example has two probes in C that use two different maps. 1st probe is the similar to dropmon.c. It attaches to kfree_skb tracepoint and count number of packet drops at different locations 2nd probe attaches to kprobe/sys_write and computes a histogram of different write sizes Usage: $ sudo ex2 Should see: writing bpf-5 -> /sys/kernel/debug/tracing/events/skb/kfree_skb/filter writing bpf-8 -> /sys/kernel/debug/tracing/events/kprobes/sys_write/filter location 0xffffffff816efc67 count 1 location 0xffffffff815d8030 count 1 location 0xffffffff816efc67 count 3 location 0xffffffff815d8030 count 4 location 0xffffffff816efc67 count 9 syscall write() stats byte_size : count distribution 1 -> 1 : 3141 |**** | 2 -> 3 : 2 | | 4 -> 7 : 14 | | 8 -> 15 : 3268 |***** | 16 -> 31 : 732 | | 32 -> 63 : 20042 |************************************* | 64 -> 127 : 12154 |********************** | 128 -> 255 : 2215 |*** | 256 -> 511 : 9 | | 512 -> 1023 : 0 | | 1024 -> 2047 : 1 | | Ctrl-C at any time. Kernel will auto cleanup maps and programs Signed-off-by: Alexei Starovoitov --- samples/bpf/Makefile | 6 ++-- samples/bpf/ex2_kern.c | 73 +++++++++++++++++++++++++++++++++++++ samples/bpf/ex2_user.c | 94 ++++++++++++++++++++++++++++++++++++++++++++++++ 3 files changed, 171 insertions(+), 2 deletions(-) create mode 100644 samples/bpf/ex2_kern.c create mode 100644 samples/bpf/ex2_user.c diff --git a/samples/bpf/Makefile b/samples/bpf/Makefile index 7ce9e6b0d3d0..d2de86188925 100644 --- a/samples/bpf/Makefile +++ b/samples/bpf/Makefile @@ -2,19 +2,21 @@ obj- := dummy.o # List of programs to build -hostprogs-y := dropmon test_verifier ex1 +hostprogs-y := dropmon test_verifier ex1 ex2 dropmon-objs := dropmon.o libbpf.o test_verifier-objs := test_verifier.o libbpf.o ex1-objs := bpf_load.o libbpf.o ex1_user.o +ex2-objs := bpf_load.o libbpf.o ex2_user.o # Tell kbuild to always build the programs -always := $(hostprogs-y) ex1_kern.o +always := $(hostprogs-y) ex1_kern.o ex2_kern.o HOSTCFLAGS += -I$(objtree)/usr/include HOSTCFLAGS_bpf_load.o += -I$(objtree)/usr/include -Wno-unused-variable HOSTLOADLIBES_ex1 += -lelf +HOSTLOADLIBES_ex2 += -lelf LLC=$(srctree)/tools/bpf/llvm/bld/Debug+Asserts/bin/llc diff --git a/samples/bpf/ex2_kern.c b/samples/bpf/ex2_kern.c new file mode 100644 index 000000000000..2daa50b27ce5 --- /dev/null +++ b/samples/bpf/ex2_kern.c @@ -0,0 +1,73 @@ +#include +#include +#include +#include +#include "bpf_helpers.h" + +struct bpf_map_def SEC("maps") my_map = { + .type = BPF_MAP_TYPE_HASH, + .key_size = sizeof(long), + .value_size = sizeof(long), + .max_entries = 1024, +}; + +SEC("events/skb/kfree_skb") +int bpf_prog2(struct bpf_context *ctx) +{ + long loc = ctx->arg2; + long init_val = 1; + void *value; + + value = bpf_map_lookup_elem(&my_map, &loc); + if (value) + (*(long *) value) += 1; + else + bpf_map_update_elem(&my_map, &loc, &init_val); + return 0; +} + +static unsigned int log2(unsigned int v) +{ + unsigned int r; + unsigned int shift; + + r = (v > 0xFFFF) << 4; v >>= r; + shift = (v > 0xFF) << 3; v >>= shift; r |= shift; + shift = (v > 0xF) << 2; v >>= shift; r |= shift; + shift = (v > 0x3) << 1; v >>= shift; r |= shift; + r |= (v >> 1); + return r; +} + +static unsigned int log2l(unsigned long v) +{ + unsigned int hi = v >> 32; + if (hi) + return log2(hi) + 32; + else + return log2(v); +} + +struct bpf_map_def SEC("maps") my_hist_map = { + .type = BPF_MAP_TYPE_HASH, + .key_size = sizeof(u32), + .value_size = sizeof(long), + .max_entries = 64, +}; + +SEC("events/kprobes/sys_write") +int bpf_prog3(struct bpf_context *ctx) +{ + long write_size = ctx->arg3; + long init_val = 1; + void *value; + u32 index = log2l(write_size); + + value = bpf_map_lookup_elem(&my_hist_map, &index); + if (value) + __sync_fetch_and_add((long *)value, 1); + else + bpf_map_update_elem(&my_hist_map, &index, &init_val); + return 0; +} +char license[] SEC("license") = "GPL"; diff --git a/samples/bpf/ex2_user.c b/samples/bpf/ex2_user.c new file mode 100644 index 000000000000..fd5ce21ae60a --- /dev/null +++ b/samples/bpf/ex2_user.c @@ -0,0 +1,94 @@ +#include +#include +#include +#include +#include +#include "libbpf.h" +#include "bpf_load.h" + +#define MAX_INDEX 64 +#define MAX_STARS 38 + +static void stars(char *str, long val, long max, int width) +{ + int i; + + for (i = 0; i < (width * val / max) - 1 && i < width - 1; i++) + str[i] = '*'; + if (val > max) + str[i - 1] = '+'; + str[i] = '\0'; +} + +static void print_hist(int fd) +{ + int key, next_key; + long value; + long data[MAX_INDEX] = {}; + char starstr[MAX_STARS]; + int i; + int max_ind = -1; + long max_value = 0; + + key = -1; /* some unknown key */ + while (bpf_get_next_key(fd, &key, &next_key) == 0) { + bpf_lookup_elem(fd, &next_key, &value); + if (next_key > MAX_INDEX) { + printf("BUG: invalid index %d\n", next_key); + } else { + data[next_key] = value; + if (next_key > max_ind) + max_ind = next_key; + if (value > max_value) + max_value = value; + } + key = next_key; + } + + printf(" syscall write() stats\n"); + printf(" byte_size : count distribution\n"); + for (i = 1; i <= max_ind + 1; i++) { + stars(starstr, data[i - 1], max_value, MAX_STARS); + printf("%8ld -> %-8ld : %-8ld |%-*s|\n", + (1l << i) >> 1, (1l << i) - 1, data[i - 1], + MAX_STARS, starstr); + } +} +static void int_exit(int sig) +{ + print_hist(map_fd[1]); + exit(0); +} + +int main(int ac, char **argv) +{ + char filename[256]; + long key, next_key, value; + int i; + + snprintf(filename, sizeof(filename), "%s_kern.o", argv[0]); + + signal(SIGINT, int_exit); + + i = system("echo 'p:sys_write sys_write' > /sys/kernel/debug/tracing/kprobe_events"); + + if (load_bpf_file(filename)) { + printf("%s", bpf_log_buf); + return 1; + } + + for (i = 0; i < 5; i++) { + key = 0; + while (bpf_get_next_key(map_fd[0], &key, &next_key) == 0) { + bpf_lookup_elem(map_fd[0], &next_key, &value); + printf("location 0x%lx count %ld\n", next_key, value); + key = next_key; + } + if (key) + printf("\n"); + sleep(1); + } + print_hist(map_fd[1]); + + return 0; +}