mirror of
https://github.com/eunomia-bpf/bpf-developer-tutorial.git
synced 2026-02-10 13:45:07 +08:00
Deploying to gh-pages from @ eunomia-bpf/bpf-developer-tutorial@4671af2739 🚀
This commit is contained in:
8
32-http2/.gitignore
vendored
Normal file
8
32-http2/.gitignore
vendored
Normal file
@@ -0,0 +1,8 @@
|
||||
.vscode
|
||||
package.json
|
||||
*.o
|
||||
*.skel.json
|
||||
*.skel.yaml
|
||||
package.yaml
|
||||
ecli
|
||||
funclatency
|
||||
141
32-http2/Makefile
Normal file
141
32-http2/Makefile
Normal file
@@ -0,0 +1,141 @@
|
||||
# SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
|
||||
OUTPUT := .output
|
||||
CLANG ?= clang
|
||||
LIBBPF_SRC := $(abspath ../third_party/libbpf/src)
|
||||
BPFTOOL_SRC := $(abspath ../third_party/bpftool/src)
|
||||
LIBBPF_OBJ := $(abspath $(OUTPUT)/libbpf.a)
|
||||
BPFTOOL_OUTPUT ?= $(abspath $(OUTPUT)/bpftool)
|
||||
BPFTOOL ?= $(BPFTOOL_OUTPUT)/funclatency/bpftool
|
||||
LIBBLAZESYM_SRC := $(abspath ../third_party/blazesym/)
|
||||
LIBBLAZESYM_OBJ := $(abspath $(OUTPUT)/libblazesym.a)
|
||||
LIBBLAZESYM_HEADER := $(abspath $(OUTPUT)/blazesym.h)
|
||||
ARCH ?= $(shell uname -m | sed 's/x86_64/x86/' \
|
||||
| sed 's/arm.*/arm/' \
|
||||
| sed 's/aarch64/arm64/' \
|
||||
| sed 's/ppc64le/powerpc/' \
|
||||
| sed 's/mips.*/mips/' \
|
||||
| sed 's/riscv64/riscv/' \
|
||||
| sed 's/loongarch64/loongarch/')
|
||||
VMLINUX := ../third_party/vmlinux/$(ARCH)/vmlinux.h
|
||||
# Use our own libbpf API headers and Linux UAPI headers distributed with
|
||||
# libbpf to avoid dependency on system-wide headers, which could be missing or
|
||||
# outdated
|
||||
INCLUDES := -I$(OUTPUT) -I../third_party/libbpf/include/uapi -I$(dir $(VMLINUX))
|
||||
CFLAGS := -g -Wall
|
||||
ALL_LDFLAGS := $(LDFLAGS) $(EXTRA_LDFLAGS)
|
||||
|
||||
APPS = funclatency # minimal minimal_legacy uprobe kprobe fentry usdt sockfilter tc ksyscall
|
||||
|
||||
CARGO ?= $(shell which cargo)
|
||||
ifeq ($(strip $(CARGO)),)
|
||||
BZS_APPS :=
|
||||
else
|
||||
BZS_APPS := # profile
|
||||
APPS += $(BZS_APPS)
|
||||
# Required by libblazesym
|
||||
ALL_LDFLAGS += -lrt -ldl -lpthread -lm
|
||||
endif
|
||||
|
||||
# Get Clang's default includes on this system. We'll explicitly add these dirs
|
||||
# to the includes list when compiling with `-target bpf` because otherwise some
|
||||
# architecture-specific dirs will be "missing" on some architectures/distros -
|
||||
# headers such as asm/types.h, asm/byteorder.h, asm/socket.h, asm/sockios.h,
|
||||
# sys/cdefs.h etc. might be missing.
|
||||
#
|
||||
# Use '-idirafter': Don't interfere with include mechanics except where the
|
||||
# build would have failed anyways.
|
||||
CLANG_BPF_SYS_INCLUDES ?= $(shell $(CLANG) -v -E - </dev/null 2>&1 \
|
||||
| sed -n '/<...> search starts here:/,/End of search list./{ s| \(/.*\)|-idirafter \1|p }')
|
||||
|
||||
ifeq ($(V),1)
|
||||
Q =
|
||||
msg =
|
||||
else
|
||||
Q = @
|
||||
msg = @printf ' %-8s %s%s\n' \
|
||||
"$(1)" \
|
||||
"$(patsubst $(abspath $(OUTPUT))/%,%,$(2))" \
|
||||
"$(if $(3), $(3))";
|
||||
MAKEFLAGS += --no-print-directory
|
||||
endif
|
||||
|
||||
define allow-override
|
||||
$(if $(or $(findstring environment,$(origin $(1))),\
|
||||
$(findstring command line,$(origin $(1)))),,\
|
||||
$(eval $(1) = $(2)))
|
||||
endef
|
||||
|
||||
$(call allow-override,CC,$(CROSS_COMPILE)cc)
|
||||
$(call allow-override,LD,$(CROSS_COMPILE)ld)
|
||||
|
||||
.PHONY: all
|
||||
all: $(APPS)
|
||||
|
||||
.PHONY: clean
|
||||
clean:
|
||||
$(call msg,CLEAN)
|
||||
$(Q)rm -rf $(OUTPUT) $(APPS)
|
||||
|
||||
$(OUTPUT) $(OUTPUT)/libbpf $(BPFTOOL_OUTPUT):
|
||||
$(call msg,MKDIR,$@)
|
||||
$(Q)mkdir -p $@
|
||||
|
||||
# Build libbpf
|
||||
$(LIBBPF_OBJ): $(wildcard $(LIBBPF_SRC)/*.[ch] $(LIBBPF_SRC)/Makefile) | $(OUTPUT)/libbpf
|
||||
$(call msg,LIB,$@)
|
||||
$(Q)$(MAKE) -C $(LIBBPF_SRC) BUILD_STATIC_ONLY=1 \
|
||||
OBJDIR=$(dir $@)/libbpf DESTDIR=$(dir $@) \
|
||||
INCLUDEDIR= LIBDIR= UAPIDIR= \
|
||||
install
|
||||
|
||||
# Build bpftool
|
||||
$(BPFTOOL): | $(BPFTOOL_OUTPUT)
|
||||
$(call msg,BPFTOOL,$@)
|
||||
$(Q)$(MAKE) ARCH= CROSS_COMPILE= OUTPUT=$(BPFTOOL_OUTPUT)/ -C $(BPFTOOL_SRC) funclatency
|
||||
|
||||
|
||||
$(LIBBLAZESYM_SRC)/target/release/libblazesym.a::
|
||||
$(Q)cd $(LIBBLAZESYM_SRC) && $(CARGO) build --features=cheader,dont-generate-test-files --release
|
||||
|
||||
$(LIBBLAZESYM_OBJ): $(LIBBLAZESYM_SRC)/target/release/libblazesym.a | $(OUTPUT)
|
||||
$(call msg,LIB, $@)
|
||||
$(Q)cp $(LIBBLAZESYM_SRC)/target/release/libblazesym.a $@
|
||||
|
||||
$(LIBBLAZESYM_HEADER): $(LIBBLAZESYM_SRC)/target/release/libblazesym.a | $(OUTPUT)
|
||||
$(call msg,LIB,$@)
|
||||
$(Q)cp $(LIBBLAZESYM_SRC)/target/release/blazesym.h $@
|
||||
|
||||
# Build BPF code
|
||||
$(OUTPUT)/%.bpf.o: %.bpf.c $(LIBBPF_OBJ) $(wildcard %.h) $(VMLINUX) | $(OUTPUT) $(BPFTOOL)
|
||||
$(call msg,BPF,$@)
|
||||
$(Q)$(CLANG) -g -O2 -target bpf -D__TARGET_ARCH_$(ARCH) \
|
||||
$(INCLUDES) $(CLANG_BPF_SYS_INCLUDES) \
|
||||
-c $(filter %.c,$^) -o $(patsubst %.bpf.o,%.tmp.bpf.o,$@)
|
||||
$(Q)$(BPFTOOL) gen object $@ $(patsubst %.bpf.o,%.tmp.bpf.o,$@)
|
||||
|
||||
# Generate BPF skeletons
|
||||
$(OUTPUT)/%.skel.h: $(OUTPUT)/%.bpf.o | $(OUTPUT) $(BPFTOOL)
|
||||
$(call msg,GEN-SKEL,$@)
|
||||
$(Q)$(BPFTOOL) gen skeleton $< > $@
|
||||
|
||||
# Build user-space code
|
||||
$(patsubst %,$(OUTPUT)/%.o,$(APPS)): %.o: %.skel.h
|
||||
|
||||
$(OUTPUT)/%.o: %.c $(wildcard %.h) | $(OUTPUT)
|
||||
$(call msg,CC,$@)
|
||||
$(Q)$(CC) $(CFLAGS) $(INCLUDES) -c $(filter %.c,$^) -o $@
|
||||
|
||||
$(patsubst %,$(OUTPUT)/%.o,$(BZS_APPS)): $(LIBBLAZESYM_HEADER)
|
||||
|
||||
$(BZS_APPS): $(LIBBLAZESYM_OBJ)
|
||||
|
||||
# Build application binary
|
||||
$(APPS): %: $(OUTPUT)/%.o $(LIBBPF_OBJ) | $(OUTPUT)
|
||||
$(call msg,BINARY,$@)
|
||||
$(Q)$(CC) $(CFLAGS) $^ $(ALL_LDFLAGS) -lelf -lz -o $@
|
||||
|
||||
# delete failed targets
|
||||
.DELETE_ON_ERROR:
|
||||
|
||||
# keep intermediate (.skel.h, .bpf.o, etc) targets
|
||||
.SECONDARY:
|
||||
93
32-http2/funclatency.bpf.c
Normal file
93
32-http2/funclatency.bpf.c
Normal file
@@ -0,0 +1,93 @@
|
||||
// SPDX-License-Identifier: GPL-2.0
|
||||
/* Copyright (c) 2021 Google LLC. */
|
||||
#include "vmlinux.h"
|
||||
#include <bpf/bpf_core_read.h>
|
||||
#include <bpf/bpf_helpers.h>
|
||||
#include <bpf/bpf_tracing.h>
|
||||
#include "funclatency.h"
|
||||
#include "bits.bpf.h"
|
||||
|
||||
const volatile pid_t targ_tgid = 0;
|
||||
const volatile int units = 0;
|
||||
|
||||
/* key: pid. value: start time */
|
||||
struct {
|
||||
__uint(type, BPF_MAP_TYPE_HASH);
|
||||
__uint(max_entries, MAX_PIDS);
|
||||
__type(key, u32);
|
||||
__type(value, u64);
|
||||
} starts SEC(".maps");
|
||||
|
||||
__u32 hist[MAX_SLOTS] = {};
|
||||
|
||||
static void entry(void)
|
||||
{
|
||||
u64 id = bpf_get_current_pid_tgid();
|
||||
u32 tgid = id >> 32;
|
||||
u32 pid = id;
|
||||
u64 nsec;
|
||||
|
||||
if (targ_tgid && targ_tgid != tgid)
|
||||
return;
|
||||
nsec = bpf_ktime_get_ns();
|
||||
bpf_map_update_elem(&starts, &pid, &nsec, BPF_ANY);
|
||||
}
|
||||
|
||||
SEC("fentry/dummy_fentry")
|
||||
int BPF_PROG(dummy_fentry)
|
||||
{
|
||||
entry();
|
||||
return 0;
|
||||
}
|
||||
|
||||
SEC("kprobe/dummy_kprobe")
|
||||
int BPF_KPROBE(dummy_kprobe)
|
||||
{
|
||||
entry();
|
||||
return 0;
|
||||
}
|
||||
|
||||
static void exit(void)
|
||||
{
|
||||
u64 *start;
|
||||
u64 nsec = bpf_ktime_get_ns();
|
||||
u64 id = bpf_get_current_pid_tgid();
|
||||
u32 pid = id;
|
||||
u64 slot, delta;
|
||||
|
||||
start = bpf_map_lookup_elem(&starts, &pid);
|
||||
if (!start)
|
||||
return;
|
||||
|
||||
delta = nsec - *start;
|
||||
|
||||
switch (units) {
|
||||
case USEC:
|
||||
delta /= 1000;
|
||||
break;
|
||||
case MSEC:
|
||||
delta /= 1000000;
|
||||
break;
|
||||
}
|
||||
|
||||
slot = log2l(delta);
|
||||
if (slot >= MAX_SLOTS)
|
||||
slot = MAX_SLOTS - 1;
|
||||
__sync_fetch_and_add(&hist[slot], 1);
|
||||
}
|
||||
|
||||
SEC("fexit/dummy_fexit")
|
||||
int BPF_PROG(dummy_fexit)
|
||||
{
|
||||
exit();
|
||||
return 0;
|
||||
}
|
||||
|
||||
SEC("kretprobe/dummy_kretprobe")
|
||||
int BPF_KRETPROBE(dummy_kretprobe)
|
||||
{
|
||||
exit();
|
||||
return 0;
|
||||
}
|
||||
|
||||
char LICENSE[] SEC("license") = "GPL";
|
||||
447
32-http2/funclatency.c
Normal file
447
32-http2/funclatency.c
Normal file
@@ -0,0 +1,447 @@
|
||||
// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
|
||||
/* Copyright (c) 2021 Google LLC.
|
||||
*
|
||||
* Based on funclatency from BCC by Brendan Gregg and others
|
||||
* 2021-02-26 Barret Rhoden Created this.
|
||||
*
|
||||
* TODO:
|
||||
* - support uprobes on libraries without -p PID. (parse ld.so.cache)
|
||||
* - support regexp pattern matching and per-function histograms
|
||||
*/
|
||||
#include <argp.h>
|
||||
#include <errno.h>
|
||||
#include <signal.h>
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
#include <time.h>
|
||||
#include <unistd.h>
|
||||
#include <fcntl.h>
|
||||
|
||||
#include <bpf/libbpf.h>
|
||||
#include <bpf/bpf.h>
|
||||
#include "funclatency.h"
|
||||
#include "funclatency.skel.h"
|
||||
#include "trace_helpers.h"
|
||||
#include "uprobe_helpers.h"
|
||||
|
||||
#define warn(...) fprintf(stderr, __VA_ARGS__)
|
||||
|
||||
static struct prog_env
|
||||
{
|
||||
int units;
|
||||
pid_t pid;
|
||||
unsigned int duration;
|
||||
unsigned int interval;
|
||||
unsigned int iterations;
|
||||
bool timestamp;
|
||||
char *funcname;
|
||||
bool verbose;
|
||||
bool kprobes;
|
||||
bool is_kernel_func;
|
||||
} env = {
|
||||
.interval = 99999999,
|
||||
.iterations = 99999999,
|
||||
};
|
||||
|
||||
const char *argp_program_version = "funclatency 0.1";
|
||||
const char *argp_program_bug_address =
|
||||
"https://github.com/iovisor/bcc/tree/master/libbpf-tools";
|
||||
static const char args_doc[] = "FUNCTION";
|
||||
static const char program_doc[] =
|
||||
"Time functions and print latency as a histogram\n"
|
||||
"\n"
|
||||
"Usage: funclatency [-h] [-m|-u] [-p PID] [-d DURATION] [ -i INTERVAL ]\n"
|
||||
" [-T] FUNCTION\n"
|
||||
" Choices for FUNCTION: FUNCTION (kprobe)\n"
|
||||
" LIBRARY:FUNCTION (uprobe a library in -p PID)\n"
|
||||
" :FUNCTION (uprobe the binary of -p PID)\n"
|
||||
" PROGRAM:FUNCTION (uprobe the binary PROGRAM)\n"
|
||||
"\v"
|
||||
"Examples:\n"
|
||||
" ./funclatency do_sys_open # time the do_sys_open() kernel function\n"
|
||||
" ./funclatency -m do_nanosleep # time do_nanosleep(), in milliseconds\n"
|
||||
" ./funclatency -u vfs_read # time vfs_read(), in microseconds\n"
|
||||
" ./funclatency -p 181 vfs_read # time process 181 only\n"
|
||||
" ./funclatency -p 181 c:read # time the read() C library function\n"
|
||||
" ./funclatency -p 181 :foo # time foo() from pid 181's userspace\n"
|
||||
" ./funclatency -i 2 -d 10 vfs_read # output every 2 seconds, for 10s\n"
|
||||
" ./funclatency -mTi 5 vfs_read # output every 5 seconds, with timestamps\n";
|
||||
|
||||
static const struct argp_option opts[] = {
|
||||
{"milliseconds", 'm', NULL, 0, "Output in milliseconds"},
|
||||
{"microseconds", 'u', NULL, 0, "Output in microseconds"},
|
||||
{0, 0, 0, 0, ""},
|
||||
{"pid", 'p', "PID", 0, "Process ID to trace"},
|
||||
{0, 0, 0, 0, ""},
|
||||
{"interval", 'i', "INTERVAL", 0, "Summary interval in seconds"},
|
||||
{"duration", 'd', "DURATION", 0, "Duration to trace"},
|
||||
{"timestamp", 'T', NULL, 0, "Print timestamp"},
|
||||
{"verbose", 'v', NULL, 0, "Verbose debug output"},
|
||||
{"kprobes", 'k', NULL, 0, "Use kprobes instead of fentry"},
|
||||
{NULL, 'h', NULL, OPTION_HIDDEN, "Show the full help"},
|
||||
{},
|
||||
};
|
||||
|
||||
static error_t parse_arg(int key, char *arg, struct argp_state *state)
|
||||
{
|
||||
struct prog_env *env = state->input;
|
||||
long duration, interval, pid;
|
||||
|
||||
switch (key)
|
||||
{
|
||||
case 'p':
|
||||
errno = 0;
|
||||
pid = strtol(arg, NULL, 10);
|
||||
if (errno || pid <= 0)
|
||||
{
|
||||
warn("Invalid PID: %s\n", arg);
|
||||
argp_usage(state);
|
||||
}
|
||||
env->pid = pid;
|
||||
break;
|
||||
case 'm':
|
||||
if (env->units != NSEC)
|
||||
{
|
||||
warn("only set one of -m or -u\n");
|
||||
argp_usage(state);
|
||||
}
|
||||
env->units = MSEC;
|
||||
break;
|
||||
case 'u':
|
||||
if (env->units != NSEC)
|
||||
{
|
||||
warn("only set one of -m or -u\n");
|
||||
argp_usage(state);
|
||||
}
|
||||
env->units = USEC;
|
||||
break;
|
||||
case 'd':
|
||||
errno = 0;
|
||||
duration = strtol(arg, NULL, 10);
|
||||
if (errno || duration <= 0)
|
||||
{
|
||||
warn("Invalid duration: %s\n", arg);
|
||||
argp_usage(state);
|
||||
}
|
||||
env->duration = duration;
|
||||
break;
|
||||
case 'i':
|
||||
errno = 0;
|
||||
interval = strtol(arg, NULL, 10);
|
||||
if (errno || interval <= 0)
|
||||
{
|
||||
warn("Invalid interval: %s\n", arg);
|
||||
argp_usage(state);
|
||||
}
|
||||
env->interval = interval;
|
||||
break;
|
||||
case 'T':
|
||||
env->timestamp = true;
|
||||
break;
|
||||
case 'k':
|
||||
env->kprobes = true;
|
||||
break;
|
||||
case 'v':
|
||||
env->verbose = true;
|
||||
break;
|
||||
case 'h':
|
||||
argp_state_help(state, stderr, ARGP_HELP_STD_HELP);
|
||||
break;
|
||||
case ARGP_KEY_ARG:
|
||||
if (env->funcname)
|
||||
{
|
||||
warn("Too many function names: %s\n", arg);
|
||||
argp_usage(state);
|
||||
}
|
||||
env->funcname = arg;
|
||||
break;
|
||||
case ARGP_KEY_END:
|
||||
if (!env->funcname)
|
||||
{
|
||||
warn("Need a function to trace\n");
|
||||
argp_usage(state);
|
||||
}
|
||||
if (env->duration)
|
||||
{
|
||||
if (env->interval > env->duration)
|
||||
env->interval = env->duration;
|
||||
env->iterations = env->duration / env->interval;
|
||||
}
|
||||
break;
|
||||
default:
|
||||
return ARGP_ERR_UNKNOWN;
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int libbpf_print_fn(enum libbpf_print_level level, const char *format, va_list args)
|
||||
{
|
||||
if (level == LIBBPF_DEBUG && !env.verbose)
|
||||
return 0;
|
||||
return vfprintf(stderr, format, args);
|
||||
}
|
||||
|
||||
static const char *unit_str(void)
|
||||
{
|
||||
switch (env.units)
|
||||
{
|
||||
case NSEC:
|
||||
return "nsec";
|
||||
case USEC:
|
||||
return "usec";
|
||||
case MSEC:
|
||||
return "msec";
|
||||
};
|
||||
|
||||
return "bad units";
|
||||
}
|
||||
|
||||
static int attach_kprobes(struct funclatency_bpf *obj)
|
||||
{
|
||||
obj->links.dummy_kprobe =
|
||||
bpf_program__attach_kprobe(obj->progs.dummy_kprobe, false,
|
||||
env.funcname);
|
||||
if (!obj->links.dummy_kprobe)
|
||||
{
|
||||
warn("failed to attach kprobe: %d\n", -errno);
|
||||
return -1;
|
||||
}
|
||||
|
||||
obj->links.dummy_kretprobe =
|
||||
bpf_program__attach_kprobe(obj->progs.dummy_kretprobe, true,
|
||||
env.funcname);
|
||||
if (!obj->links.dummy_kretprobe)
|
||||
{
|
||||
warn("failed to attach kretprobe: %d\n", -errno);
|
||||
return -1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int attach_uprobes(struct funclatency_bpf *obj)
|
||||
{
|
||||
char *binary, *function;
|
||||
char bin_path[PATH_MAX];
|
||||
off_t func_off;
|
||||
int ret = -1;
|
||||
long err;
|
||||
|
||||
binary = strdup(env.funcname);
|
||||
if (!binary)
|
||||
{
|
||||
warn("strdup failed");
|
||||
return -1;
|
||||
}
|
||||
function = strchr(binary, ':');
|
||||
if (!function)
|
||||
{
|
||||
warn("Binary should have contained ':' (internal bug!)\n");
|
||||
return -1;
|
||||
}
|
||||
*function = '\0';
|
||||
function++;
|
||||
|
||||
if (resolve_binary_path(binary, env.pid, bin_path, sizeof(bin_path)))
|
||||
goto out_binary;
|
||||
|
||||
func_off = get_elf_func_offset(bin_path, function);
|
||||
if (func_off < 0)
|
||||
{
|
||||
warn("Could not find %s in %s\n", function, bin_path);
|
||||
goto out_binary;
|
||||
}
|
||||
|
||||
obj->links.dummy_kprobe =
|
||||
bpf_program__attach_uprobe(obj->progs.dummy_kprobe, false,
|
||||
env.pid ?: -1, bin_path, func_off);
|
||||
if (!obj->links.dummy_kprobe)
|
||||
{
|
||||
err = -errno;
|
||||
warn("Failed to attach uprobe: %ld\n", err);
|
||||
goto out_binary;
|
||||
}
|
||||
|
||||
obj->links.dummy_kretprobe =
|
||||
bpf_program__attach_uprobe(obj->progs.dummy_kretprobe, true,
|
||||
env.pid ?: -1, bin_path, func_off);
|
||||
if (!obj->links.dummy_kretprobe)
|
||||
{
|
||||
err = -errno;
|
||||
warn("Failed to attach uretprobe: %ld\n", err);
|
||||
goto out_binary;
|
||||
}
|
||||
|
||||
ret = 0;
|
||||
|
||||
out_binary:
|
||||
free(binary);
|
||||
|
||||
return ret;
|
||||
}
|
||||
|
||||
static volatile bool exiting;
|
||||
|
||||
static void sig_hand(int signr)
|
||||
{
|
||||
exiting = true;
|
||||
}
|
||||
|
||||
static struct sigaction sigact = {.sa_handler = sig_hand};
|
||||
|
||||
static void print_stars(unsigned int val, unsigned int val_max, int width)
|
||||
{
|
||||
int num_stars, num_spaces, i;
|
||||
bool need_plus;
|
||||
|
||||
num_stars = min(val, val_max) * width / val_max;
|
||||
num_spaces = width - num_stars;
|
||||
need_plus = val > val_max;
|
||||
|
||||
for (i = 0; i < num_stars; i++)
|
||||
printf("*");
|
||||
for (i = 0; i < num_spaces; i++)
|
||||
printf(" ");
|
||||
if (need_plus)
|
||||
printf("+");
|
||||
}
|
||||
|
||||
void print_log2_hist(unsigned int *vals, int vals_size, const char *val_type)
|
||||
{
|
||||
int stars_max = 40, idx_max = -1;
|
||||
unsigned int val, val_max = 0;
|
||||
unsigned long long low, high;
|
||||
int stars, width, i;
|
||||
|
||||
for (i = 0; i < vals_size; i++)
|
||||
{
|
||||
val = vals[i];
|
||||
if (val > 0)
|
||||
idx_max = i;
|
||||
if (val > val_max)
|
||||
val_max = val;
|
||||
}
|
||||
|
||||
if (idx_max < 0)
|
||||
return;
|
||||
|
||||
printf("%*s%-*s : count distribution\n", idx_max <= 32 ? 5 : 15, "",
|
||||
idx_max <= 32 ? 19 : 29, val_type);
|
||||
|
||||
if (idx_max <= 32)
|
||||
stars = stars_max;
|
||||
else
|
||||
stars = stars_max / 2;
|
||||
|
||||
for (i = 0; i <= idx_max; i++)
|
||||
{
|
||||
low = (1ULL << (i + 1)) >> 1;
|
||||
high = (1ULL << (i + 1)) - 1;
|
||||
if (low == high)
|
||||
low -= 1;
|
||||
val = vals[i];
|
||||
width = idx_max <= 32 ? 10 : 20;
|
||||
printf("%*lld -> %-*lld : %-8d |", width, low, width, high, val);
|
||||
print_stars(val, val_max, stars);
|
||||
printf("|\n");
|
||||
}
|
||||
}
|
||||
|
||||
int main(int argc, char **argv)
|
||||
{
|
||||
LIBBPF_OPTS(bpf_object_open_opts, open_opts);
|
||||
static const struct argp argp = {
|
||||
.options = opts,
|
||||
.parser = parse_arg,
|
||||
.args_doc = args_doc,
|
||||
.doc = program_doc,
|
||||
};
|
||||
struct funclatency_bpf *obj;
|
||||
int i, err;
|
||||
struct tm *tm;
|
||||
char ts[32];
|
||||
time_t t;
|
||||
int idx, cg_map_fd;
|
||||
int cgfd = -1;
|
||||
bool used_fentry = false;
|
||||
|
||||
err = argp_parse(&argp, argc, argv, 0, NULL, &env);
|
||||
if (err)
|
||||
return err;
|
||||
|
||||
env.is_kernel_func = !strchr(env.funcname, ':');
|
||||
|
||||
sigaction(SIGINT, &sigact, 0);
|
||||
|
||||
libbpf_set_print(libbpf_print_fn);
|
||||
|
||||
obj = funclatency_bpf__open_opts(&open_opts);
|
||||
if (!obj)
|
||||
{
|
||||
warn("failed to open BPF object\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
obj->rodata->units = env.units;
|
||||
obj->rodata->targ_tgid = env.pid;
|
||||
|
||||
err = funclatency_bpf__load(obj);
|
||||
if (err)
|
||||
{
|
||||
warn("failed to load BPF object\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
if (!obj->bss)
|
||||
{
|
||||
warn("Memory-mapping BPF maps is supported starting from Linux 5.7, please upgrade.\n");
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
if (env.is_kernel_func)
|
||||
err = attach_kprobes(obj);
|
||||
else
|
||||
err = attach_uprobes(obj);
|
||||
if (err)
|
||||
goto cleanup;
|
||||
|
||||
err = funclatency_bpf__attach(obj);
|
||||
if (err)
|
||||
{
|
||||
fprintf(stderr, "failed to attach BPF programs: %s\n",
|
||||
strerror(-err));
|
||||
goto cleanup;
|
||||
}
|
||||
|
||||
printf("Tracing %s. Hit Ctrl-C to exit\n", env.funcname);
|
||||
|
||||
for (i = 0; i < env.iterations && !exiting; i++)
|
||||
{
|
||||
sleep(env.interval);
|
||||
|
||||
printf("\n");
|
||||
if (env.timestamp)
|
||||
{
|
||||
time(&t);
|
||||
tm = localtime(&t);
|
||||
strftime(ts, sizeof(ts), "%H:%M:%S", tm);
|
||||
printf("%-8s\n", ts);
|
||||
}
|
||||
|
||||
print_log2_hist(obj->bss->hist, MAX_SLOTS, unit_str());
|
||||
|
||||
/* Cleanup histograms for interval output */
|
||||
memset(obj->bss->hist, 0, sizeof(obj->bss->hist));
|
||||
}
|
||||
|
||||
printf("Exiting trace of %s\n", env.funcname);
|
||||
|
||||
cleanup:
|
||||
funclatency_bpf__destroy(obj);
|
||||
cleanup_core_btf(&open_opts);
|
||||
if (cgfd > 0)
|
||||
close(cgfd);
|
||||
|
||||
return err != 0;
|
||||
}
|
||||
18
32-http2/funclatency.h
Normal file
18
32-http2/funclatency.h
Normal file
@@ -0,0 +1,18 @@
|
||||
/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
|
||||
/* Copyright (c) 2020 Facebook */
|
||||
#ifndef __BOOTSTRAP_H
|
||||
#define __BOOTSTRAP_H
|
||||
|
||||
/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
|
||||
#pragma once
|
||||
|
||||
#define MAX_PIDS 102400
|
||||
#define MAX_SLOTS 25
|
||||
|
||||
enum units {
|
||||
NSEC,
|
||||
USEC,
|
||||
MSEC,
|
||||
};
|
||||
|
||||
#endif /* __BOOTSTRAP_H */
|
||||
Reference in New Issue
Block a user