xref: /linux/tools/bpf/bpftool/Documentation/bpftool-prog.rst (revision 25489a4f556414445d342951615178368ee45cde)
1.. SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
2
3================
4bpftool-prog
5================
6-------------------------------------------------------------------------------
7tool for inspection and simple manipulation of eBPF progs
8-------------------------------------------------------------------------------
9
10:Manual section: 8
11
12.. include:: substitutions.rst
13
14SYNOPSIS
15========
16
17**bpftool** [*OPTIONS*] **prog** *COMMAND*
18
19*OPTIONS* := { |COMMON_OPTIONS| |
20{ **-f** | **--bpffs** } | { **-m** | **--mapcompat** } | { **-n** | **--nomount** } |
21{ **-L** | **--use-loader** } }
22
23*COMMANDS* :=
24{ **show** | **list** | **dump xlated** | **dump jited** | **pin** | **load** |
25**loadall** | **help** }
26
27PROG COMMANDS
28=============
29
30| **bpftool** **prog** { **show** | **list** } [*PROG*]
31| **bpftool** **prog dump xlated** *PROG* [{ **file** *FILE* | [**opcodes**] [**linum**] [**visual**] }]
32| **bpftool** **prog dump jited**  *PROG* [{ **file** *FILE* | [**opcodes**] [**linum**] }]
33| **bpftool** **prog pin** *PROG* *FILE*
34| **bpftool** **prog** { **load** | **loadall** } *OBJ* *PATH* [**type** *TYPE*] [**map** { **idx** *IDX* | **name** *NAME* } *MAP*] [{ **offload_dev** | **xdpmeta_dev** } *NAME*] [**pinmaps** *MAP_DIR*] [**autoattach**] [**kernel_btf** *BTF_FILE*]
35| **bpftool** **prog attach** *PROG* *ATTACH_TYPE* [*MAP*]
36| **bpftool** **prog detach** *PROG* *ATTACH_TYPE* [*MAP*]
37| **bpftool** **prog tracelog**
38| **bpftool** **prog run** *PROG* **data_in** *FILE* [**data_out** *FILE* [**data_size_out** *L*]] [**ctx_in** *FILE* [**ctx_out** *FILE* [**ctx_size_out** *M*]]] [**repeat** *N*]
39| **bpftool** **prog profile** *PROG* [**duration** *DURATION*] *METRICs*
40| **bpftool** **prog help**
41|
42| *MAP* := { **id** *MAP_ID* | **pinned** *FILE* | **name** *MAP_NAME* }
43| *PROG* := { **id** *PROG_ID* | **pinned** *FILE* | **tag** *PROG_TAG* | **name** *PROG_NAME* }
44| *TYPE* := {
45|     **socket** | **kprobe** | **kretprobe** | **classifier** | **action** |
46|     **tracepoint** | **raw_tracepoint** | **xdp** | **perf_event** | **cgroup/skb** |
47|     **cgroup/sock** | **cgroup/dev** | **lwt_in** | **lwt_out** | **lwt_xmit** |
48|     **lwt_seg6local** | **sockops** | **sk_skb** | **sk_msg** | **lirc_mode2** |
49|     **cgroup/bind4** | **cgroup/bind6** | **cgroup/post_bind4** | **cgroup/post_bind6** |
50|     **cgroup/connect4** | **cgroup/connect6** | **cgroup/connect_unix** |
51|     **cgroup/getpeername4** | **cgroup/getpeername6** | **cgroup/getpeername_unix** |
52|     **cgroup/getsockname4** | **cgroup/getsockname6** | **cgroup/getsockname_unix** |
53|     **cgroup/sendmsg4** | **cgroup/sendmsg6** | **cgroup/sendmsg_unix** |
54|     **cgroup/recvmsg4** | **cgroup/recvmsg6** | **cgroup/recvmsg_unix** | **cgroup/sysctl** |
55|     **cgroup/getsockopt** | **cgroup/setsockopt** | **cgroup/sock_release** |
56|     **struct_ops** | **fentry** | **fexit** | **freplace** | **sk_lookup**
57| }
58| *ATTACH_TYPE* := {
59|     **sk_msg_verdict** | **sk_skb_verdict** | **sk_skb_stream_verdict** |
60|     **sk_skb_stream_parser** | **flow_dissector**
61| }
62| *METRICs* := {
63|     **cycles** | **instructions** | **l1d_loads** | **llc_misses** |
64|     **itlb_misses** | **dtlb_misses**
65| }
66
67
68DESCRIPTION
69===========
70bpftool prog { show | list } [*PROG*]
71    Show information about loaded programs.  If *PROG* is specified show
72    information only about given programs, otherwise list all programs
73    currently loaded on the system. In case of **tag** or **name**, *PROG* may
74    match several programs which will all be shown.
75
76    Output will start with program ID followed by program type and zero or more
77    named attributes (depending on kernel version).
78
79    Since Linux 5.1 the kernel can collect statistics on BPF programs (such as
80    the total time spent running the program, and the number of times it was
81    run). If available, bpftool shows such statistics. However, the kernel does
82    not collect them by defaults, as it slightly impacts performance on each
83    program run. Activation or deactivation of the feature is performed via the
84    **kernel.bpf_stats_enabled** sysctl knob.
85
86    Since Linux 5.8 bpftool is able to discover information about processes
87    that hold open file descriptors (FDs) against BPF programs. On such kernels
88    bpftool will automatically emit this information as well.
89
90bpftool prog dump xlated *PROG* [{ file *FILE* | [opcodes] [linum] [visual] }]
91    Dump eBPF instructions of the programs from the kernel. By default, eBPF
92    will be disassembled and printed to standard output in human-readable
93    format. In this case, **opcodes** controls if raw opcodes should be printed
94    as well.
95
96    In case of **tag** or **name**, *PROG* may match several programs which
97    will all be dumped.  However, if **file** or **visual** is specified,
98    *PROG* must match a single program.
99
100    If **file** is specified, the binary image will instead be written to
101    *FILE*.
102
103    If **visual** is specified, control flow graph (CFG) will be built instead,
104    and eBPF instructions will be presented with CFG in DOT format, on standard
105    output.
106
107    If the programs have line_info available, the source line will be
108    displayed.  If **linum** is specified, the filename, line number and line
109    column will also be displayed.
110
111bpftool prog dump jited  *PROG* [{ file *FILE* | [opcodes] [linum] }]
112    Dump jited image (host machine code) of the program.
113
114    If *FILE* is specified image will be written to a file, otherwise it will
115    be disassembled and printed to stdout. *PROG* must match a single program
116    when **file** is specified.
117
118    **opcodes** controls if raw opcodes will be printed.
119
120    If the prog has line_info available, the source line will be displayed. If
121    **linum** is specified, the filename, line number and line column will also
122    be displayed.
123
124bpftool prog pin *PROG* *FILE*
125    Pin program *PROG* as *FILE*.
126
127    Note: *FILE* must be located in *bpffs* mount. It must not contain a dot
128    character ('.'), which is reserved for future extensions of *bpffs*.
129
130bpftool prog { load | loadall } *OBJ* *PATH* [type *TYPE*] [map { idx *IDX* | name *NAME* } *MAP*] [{ offload_dev | xdpmeta_dev } *NAME*] [pinmaps *MAP_DIR*] [autoattach] [kernel_btf *BTF_FILE*]
131    Load bpf program(s) from binary *OBJ* and pin as *PATH*. **bpftool prog
132    load** pins only the first program from the *OBJ* as *PATH*. **bpftool prog
133    loadall** pins all programs from the *OBJ* under *PATH* directory. **type**
134    is optional, if not specified program type will be inferred from section
135    names. By default bpftool will create new maps as declared in the ELF
136    object being loaded.  **map** parameter allows for the reuse of existing
137    maps. It can be specified multiple times, each time for a different map.
138    *IDX* refers to index of the map to be replaced in the ELF file counting
139    from 0, while *NAME* allows to replace a map by name. *MAP* specifies the
140    map to use, referring to it by **id** or through a **pinned** file. If
141    **offload_dev** *NAME* is specified program will be loaded onto given
142    networking device (offload). If **xdpmeta_dev** *NAME* is specified program
143    will become device-bound without offloading, this facilitates access to XDP
144    metadata. Optional **pinmaps** argument can be provided to pin all maps
145    under *MAP_DIR* directory.
146
147    If **autoattach** is specified program will be attached before pin. In that
148    case, only the link (representing the program attached to its hook) is
149    pinned, not the program as such, so the path won't show in **bpftool prog
150    show -f**, only show in **bpftool link show -f**. Also, this only works
151    when bpftool (libbpf) is able to infer all necessary information from the
152    object file, in particular, it's not supported for all program types. If a
153    program does not support autoattach, bpftool falls back to regular pinning
154    for that program instead.
155
156    The **kernel_btf** option allows specifying an external BTF file to replace
157    the system's own vmlinux BTF file for CO-RE relocations. Note that any
158    other feature relying on BTF (such as fentry/fexit programs, struct_ops)
159    requires the BTF file for the actual kernel running on the host, often
160    exposed at /sys/kernel/btf/vmlinux.
161
162    Note: *PATH* must be located in *bpffs* mount. It must not contain a dot
163    character ('.'), which is reserved for future extensions of *bpffs*.
164
165bpftool prog attach *PROG* *ATTACH_TYPE* [*MAP*]
166    Attach bpf program *PROG* (with type specified by *ATTACH_TYPE*). Most
167    *ATTACH_TYPEs* require a *MAP* parameter, with the exception of
168    *flow_dissector* which is attached to current networking name space.
169
170bpftool prog detach *PROG* *ATTACH_TYPE* [*MAP*]
171    Detach bpf program *PROG* (with type specified by *ATTACH_TYPE*). Most
172    *ATTACH_TYPEs* require a *MAP* parameter, with the exception of
173    *flow_dissector* which is detached from the current networking name space.
174
175bpftool prog tracelog
176    Dump the trace pipe of the system to the console (stdout). Hit <Ctrl+C> to
177    stop printing. BPF programs can write to this trace pipe at runtime with
178    the **bpf_trace_printk**\ () helper. This should be used only for debugging
179    purposes. For streaming data from BPF programs to user space, one can use
180    perf events (see also **bpftool-map**\ (8)).
181
182bpftool prog run *PROG* data_in *FILE* [data_out *FILE* [data_size_out *L*]] [ctx_in *FILE* [ctx_out *FILE* [ctx_size_out *M*]]] [repeat *N*]
183    Run BPF program *PROG* in the kernel testing infrastructure for BPF,
184    meaning that the program works on the data and context provided by the
185    user, and not on actual packets or monitored functions etc. Return value
186    and duration for the test run are printed out to the console.
187
188    Input data is read from the *FILE* passed with **data_in**. If this *FILE*
189    is "**-**", input data is read from standard input. Input context, if any,
190    is read from *FILE* passed with **ctx_in**. Again, "**-**" can be used to
191    read from standard input, but only if standard input is not already in use
192    for input data. If a *FILE* is passed with **data_out**, output data is
193    written to that file. Similarly, output context is written to the *FILE*
194    passed with **ctx_out**. For both output flows, "**-**" can be used to
195    print to the standard output (as plain text, or JSON if relevant option was
196    passed). If output keywords are omitted, output data and context are
197    discarded. Keywords **data_size_out** and **ctx_size_out** are used to pass
198    the size (in bytes) for the output buffers to the kernel, although the
199    default of 32 kB should be more than enough for most cases.
200
201    Keyword **repeat** is used to indicate the number of consecutive runs to
202    perform. Note that output data and context printed to files correspond to
203    the last of those runs. The duration printed out at the end of the runs is
204    an average over all runs performed by the command.
205
206    Not all program types support test run. Among those which do, not all of
207    them can take the **ctx_in**/**ctx_out** arguments. bpftool does not
208    perform checks on program types.
209
210bpftool prog profile *PROG* [duration *DURATION*] *METRICs*
211    Profile *METRICs* for bpf program *PROG* for *DURATION* seconds or until
212    user hits <Ctrl+C>. *DURATION* is optional. If *DURATION* is not specified,
213    the profiling will run up to **UINT_MAX** seconds.
214
215bpftool prog help
216    Print short help message.
217
218OPTIONS
219=======
220.. include:: common_options.rst
221
222-f, --bpffs
223    When showing BPF programs, show file names of pinned programs.
224
225-m, --mapcompat
226    Allow loading maps with unknown map definitions.
227
228-n, --nomount
229    Do not automatically attempt to mount any virtual file system (such as
230    tracefs or BPF virtual file system) when necessary.
231
232-L, --use-loader
233    Load program as a "loader" program. This is useful to debug the generation
234    of such programs. When this option is in use, bpftool attempts to load the
235    programs from the object file into the kernel, but does not pin them
236    (therefore, the *PATH* must not be provided).
237
238    When combined with the **-d**\ \|\ **--debug** option, additional debug
239    messages are generated, and the execution of the loader program will use
240    the **bpf_trace_printk**\ () helper to log each step of loading BTF,
241    creating the maps, and loading the programs (see **bpftool prog tracelog**
242    as a way to dump those messages).
243
244EXAMPLES
245========
246**# bpftool prog show**
247
248::
249
250    10: xdp  name some_prog  tag 005a3d2123620c8b  gpl run_time_ns 81632 run_cnt 10
251            loaded_at 2017-09-29T20:11:00+0000  uid 0
252            xlated 528B  jited 370B  memlock 4096B  map_ids 10
253            pids systemd(1)
254
255**# bpftool --json --pretty prog show**
256
257::
258
259    [{
260            "id": 10,
261            "type": "xdp",
262            "tag": "005a3d2123620c8b",
263            "gpl_compatible": true,
264            "run_time_ns": 81632,
265            "run_cnt": 10,
266            "loaded_at": 1506715860,
267            "uid": 0,
268            "bytes_xlated": 528,
269            "jited": true,
270            "bytes_jited": 370,
271            "bytes_memlock": 4096,
272            "map_ids": [10
273            ],
274            "pids": [{
275                    "pid": 1,
276                    "comm": "systemd"
277                }
278            ]
279        }
280    ]
281
282|
283| **# bpftool prog dump xlated id 10 file /tmp/t**
284| **$ ls -l /tmp/t**
285
286::
287
288    -rw------- 1 root root 560 Jul 22 01:42 /tmp/t
289
290**# bpftool prog dump jited tag 005a3d2123620c8b**
291
292::
293
294    0:   push   %rbp
295    1:   mov    %rsp,%rbp
296    2:   sub    $0x228,%rsp
297    3:   sub    $0x28,%rbp
298    4:   mov    %rbx,0x0(%rbp)
299
300|
301| **# mount -t bpf none /sys/fs/bpf/**
302| **# bpftool prog pin id 10 /sys/fs/bpf/prog**
303| **# bpftool prog load ./my_prog.o /sys/fs/bpf/prog2**
304| **# ls -l /sys/fs/bpf/**
305
306::
307
308    -rw------- 1 root root 0 Jul 22 01:43 prog
309    -rw------- 1 root root 0 Jul 22 01:44 prog2
310
311**# bpftool prog dump jited pinned /sys/fs/bpf/prog opcodes**
312
313::
314
315   0:   push   %rbp
316        55
317   1:   mov    %rsp,%rbp
318        48 89 e5
319   4:   sub    $0x228,%rsp
320        48 81 ec 28 02 00 00
321   b:   sub    $0x28,%rbp
322        48 83 ed 28
323   f:   mov    %rbx,0x0(%rbp)
324        48 89 5d 00
325
326|
327| **# bpftool prog load xdp1_kern.o /sys/fs/bpf/xdp1 type xdp map name rxcnt id 7**
328| **# bpftool prog show pinned /sys/fs/bpf/xdp1**
329
330::
331
332    9: xdp  name xdp_prog1  tag 539ec6ce11b52f98  gpl
333            loaded_at 2018-06-25T16:17:31-0700  uid 0
334            xlated 488B  jited 336B  memlock 4096B  map_ids 7
335
336**# rm /sys/fs/bpf/xdp1**
337
338|
339| **# bpftool prog profile id 337 duration 10 cycles instructions llc_misses**
340
341::
342
343         51397 run_cnt
344      40176203 cycles                                                 (83.05%)
345      42518139 instructions    #   1.06 insns per cycle               (83.39%)
346           123 llc_misses      #   2.89 LLC misses per million insns  (83.15%)
347
348|
349| Output below is for the trace logs.
350| Run in separate terminals:
351| **# bpftool prog tracelog**
352| **# bpftool prog load -L -d file.o**
353
354::
355
356    bpftool-620059  [004] d... 2634685.517903: bpf_trace_printk: btf_load size 665 r=5
357    bpftool-620059  [004] d... 2634685.517912: bpf_trace_printk: map_create sample_map idx 0 type 2 value_size 4 value_btf_id 0 r=6
358    bpftool-620059  [004] d... 2634685.517997: bpf_trace_printk: prog_load sample insn_cnt 13 r=7
359    bpftool-620059  [004] d... 2634685.517999: bpf_trace_printk: close(5) = 0
360