-
Notifications
You must be signed in to change notification settings - Fork 111
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
bpf: Show target_{obj,btf}_id for tracing link #5078
Conversation
Upstream branch: 108598c |
e35e124
to
4d9941c
Compare
Upstream branch: 108598c |
6e17ac5
to
2e2b852
Compare
4d9941c
to
73bb5bc
Compare
Upstream branch: 108598c |
2e2b852
to
812f485
Compare
73bb5bc
to
5ef086f
Compare
Upstream branch: 3879122 |
812f485
to
d456bdb
Compare
5ef086f
to
380f2de
Compare
Upstream branch: de58ef4 |
d456bdb
to
c00ba5e
Compare
380f2de
to
ecc5371
Compare
Upstream branch: 0697e43 |
c00ba5e
to
7d55da6
Compare
ecc5371
to
95cf174
Compare
Upstream branch: cff3639 |
7d55da6
to
2d80a87
Compare
Upstream branch: cff3639 |
2d80a87
to
fe9b786
Compare
95cf174
to
bf42de8
Compare
Upstream branch: 2a36c26 |
fe9b786
to
1a693c8
Compare
bf42de8
to
528fccf
Compare
Upstream branch: 8819495 |
1a693c8
to
5e415b6
Compare
528fccf
to
aed7442
Compare
Upstream branch: effcf62 |
5e415b6
to
d53f6d3
Compare
aed7442
to
b48ebc5
Compare
Upstream branch: effcf62 |
d53f6d3
to
8c09875
Compare
b48ebc5
to
878ccbd
Compare
Upstream branch: effcf62 |
8c09875
to
47d663d
Compare
878ccbd
to
3e8b61d
Compare
Upstream branch: effcf62 |
The target_btf_id can help us understand which kernel function is linked by a tracing prog. The target_btf_id and target_obj_id have already been exposed to userspace, so we just need to show them. The result as follows, $ cat /proc/10673/fdinfo/10 pos: 0 flags: 02000000 mnt_id: 15 ino: 2094 link_type: tracing link_id: 2 prog_tag: a04f5eef06a7f555 prog_id: 13 attach_type: 24 target_obj_id: 1 target_btf_id: 13964 Signed-off-by: Yafang Shao <laoar.shao@gmail.com> Acked-by: Song Liu <song@kernel.org>
The target_btf_id can help us understand which kernel function is linked by a tracing prog. The target_btf_id and target_obj_id have already been exposed to userspace, so we just need to show them. The result as follows, $ tools/bpf/bpftool/bpftool link show 2: tracing prog 13 prog_type tracing attach_type trace_fentry target_obj_id 1 target_btf_id 13964 pids trace(10673) $ tools/bpf/bpftool/bpftool link show -j [{"id":2,"type":"tracing","prog_id":13,"prog_type":"tracing","attach_type":"trace_fentry","target_obj_id":1,"target_btf_id":13964,"pids":[{"pid":10673,"comm":"trace"}]}] Signed-off-by: Yafang Shao <laoar.shao@gmail.com> Acked-by: Song Liu <song@kernel.org>
47d663d
to
c986c8a
Compare
3e8b61d
to
4bcf361
Compare
At least one diff in series https://patchwork.kernel.org/project/netdevbpf/list/?series=748370 irrelevant now. Closing PR. |
Pull request for series with
subject: bpf: Show target_{obj,btf}_id for tracing link
version: 1
url: https://patchwork.kernel.org/project/netdevbpf/list/?series=747977