Commit 075c7766 authored by Andrii Nakryiko's avatar Andrii Nakryiko Committed by Alexei Starovoitov

tools/bpftool: Add documentation and sample output for process info

Add statements about bpftool being able to discover process info, holding
reference to BPF map, prog, link, or BTF. Show example output as well.
Signed-off-by: default avatarAndrii Nakryiko <andriin@fb.com>
Signed-off-by: default avatarAlexei Starovoitov <ast@kernel.org>
Reviewed-by: default avatarQuentin Monnet <quentin@isovalent.com>
Link: https://lore.kernel.org/bpf/20200619231703.738941-10-andriin@fb.com
parent d53dee3f
...@@ -36,6 +36,11 @@ DESCRIPTION ...@@ -36,6 +36,11 @@ DESCRIPTION
otherwise list all BTF objects currently loaded on the otherwise list all BTF objects currently loaded on the
system. system.
Since Linux 5.8 bpftool is able to discover information about
processes that hold open file descriptors (FDs) against BTF
objects. On such kernels bpftool will automatically emit this
information as well.
**bpftool btf dump** *BTF_SRC* **bpftool btf dump** *BTF_SRC*
Dump BTF entries from a given *BTF_SRC*. Dump BTF entries from a given *BTF_SRC*.
......
...@@ -37,6 +37,11 @@ DESCRIPTION ...@@ -37,6 +37,11 @@ DESCRIPTION
zero or more named attributes, some of which depend on type zero or more named attributes, some of which depend on type
of link. of link.
Since Linux 5.8 bpftool is able to discover information about
processes that hold open file descriptors (FDs) against BPF
links. On such kernels bpftool will automatically emit this
information as well.
**bpftool link pin** *LINK* *FILE* **bpftool link pin** *LINK* *FILE*
Pin link *LINK* as *FILE*. Pin link *LINK* as *FILE*.
...@@ -82,6 +87,7 @@ EXAMPLES ...@@ -82,6 +87,7 @@ EXAMPLES
10: cgroup prog 25 10: cgroup prog 25
cgroup_id 614 attach_type egress cgroup_id 614 attach_type egress
pids test_progs(223)
**# bpftool --json --pretty link show** **# bpftool --json --pretty link show**
...@@ -91,7 +97,12 @@ EXAMPLES ...@@ -91,7 +97,12 @@ EXAMPLES
"type": "cgroup", "type": "cgroup",
"prog_id": 25, "prog_id": 25,
"cgroup_id": 614, "cgroup_id": 614,
"attach_type": "egress" "attach_type": "egress",
"pids": [{
"pid": 223,
"comm": "test_progs"
}
]
} }
] ]
......
...@@ -62,6 +62,11 @@ DESCRIPTION ...@@ -62,6 +62,11 @@ DESCRIPTION
Output will start with map ID followed by map type and Output will start with map ID followed by map type and
zero or more named attributes (depending on kernel version). zero or more named attributes (depending on kernel version).
Since Linux 5.8 bpftool is able to discover information about
processes that hold open file descriptors (FDs) against BPF
maps. On such kernels bpftool will automatically emit this
information as well.
**bpftool map create** *FILE* **type** *TYPE* **key** *KEY_SIZE* **value** *VALUE_SIZE* **entries** *MAX_ENTRIES* **name** *NAME* [**flags** *FLAGS*] [**dev** *NAME*] **bpftool map create** *FILE* **type** *TYPE* **key** *KEY_SIZE* **value** *VALUE_SIZE* **entries** *MAX_ENTRIES* **name** *NAME* [**flags** *FLAGS*] [**dev** *NAME*]
Create a new map with given parameters and pin it to *bpffs* Create a new map with given parameters and pin it to *bpffs*
as *FILE*. as *FILE*.
...@@ -181,6 +186,7 @@ EXAMPLES ...@@ -181,6 +186,7 @@ EXAMPLES
10: hash name some_map flags 0x0 10: hash name some_map flags 0x0
key 4B value 8B max_entries 2048 memlock 167936B key 4B value 8B max_entries 2048 memlock 167936B
pids systemd(1)
The following three commands are equivalent: The following three commands are equivalent:
......
...@@ -75,6 +75,11 @@ DESCRIPTION ...@@ -75,6 +75,11 @@ DESCRIPTION
program run. Activation or deactivation of the feature is program run. Activation or deactivation of the feature is
performed via the **kernel.bpf_stats_enabled** sysctl knob. performed via the **kernel.bpf_stats_enabled** sysctl knob.
Since Linux 5.8 bpftool is able to discover information about
processes that hold open file descriptors (FDs) against BPF
programs. On such kernels bpftool will automatically emit this
information as well.
**bpftool prog dump xlated** *PROG* [{ **file** *FILE* | **opcodes** | **visual** | **linum** }] **bpftool prog dump xlated** *PROG* [{ **file** *FILE* | **opcodes** | **visual** | **linum** }]
Dump eBPF instructions of the programs from the kernel. By Dump eBPF instructions of the programs from the kernel. By
default, eBPF will be disassembled and printed to standard default, eBPF will be disassembled and printed to standard
...@@ -243,6 +248,7 @@ EXAMPLES ...@@ -243,6 +248,7 @@ EXAMPLES
10: xdp name some_prog tag 005a3d2123620c8b gpl run_time_ns 81632 run_cnt 10 10: xdp name some_prog tag 005a3d2123620c8b gpl run_time_ns 81632 run_cnt 10
loaded_at 2017-09-29T20:11:00+0000 uid 0 loaded_at 2017-09-29T20:11:00+0000 uid 0
xlated 528B jited 370B memlock 4096B map_ids 10 xlated 528B jited 370B memlock 4096B map_ids 10
pids systemd(1)
**# bpftool --json --pretty prog show** **# bpftool --json --pretty prog show**
...@@ -262,6 +268,11 @@ EXAMPLES ...@@ -262,6 +268,11 @@ EXAMPLES
"bytes_jited": 370, "bytes_jited": 370,
"bytes_memlock": 4096, "bytes_memlock": 4096,
"map_ids": [10 "map_ids": [10
],
"pids": [{
"pid": 1,
"comm": "systemd"
}
] ]
} }
] ]
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment