chantra | 3f5e402 | 2022-08-14 00:35:18 +0000 | [diff] [blame] | 1 | #!/usr/bin/env python |
Alexei Starovoitov | bdf0773 | 2016-01-14 10:09:20 -0800 | [diff] [blame] | 2 | # @lint-avoid-python-3-compatibility-imports |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 3 | # |
Alexei Starovoitov | bdf0773 | 2016-01-14 10:09:20 -0800 | [diff] [blame] | 4 | # opensnoop Trace open() syscalls. |
| 5 | # For Linux, uses BCC, eBPF. Embedded C. |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 6 | # |
Paul Chaignon | 702de38 | 2018-01-28 13:41:35 +0100 | [diff] [blame] | 7 | # USAGE: opensnoop [-h] [-T] [-x] [-p PID] [-d DURATION] [-t TID] [-n NAME] |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 8 | # |
| 9 | # Copyright (c) 2015 Brendan Gregg. |
| 10 | # Licensed under the Apache License, Version 2.0 (the "License") |
| 11 | # |
Alexei Starovoitov | bdf0773 | 2016-01-14 10:09:20 -0800 | [diff] [blame] | 12 | # 17-Sep-2015 Brendan Gregg Created this. |
Dina Goldshtein | 99a3bc8 | 2016-10-10 21:37:36 +0300 | [diff] [blame] | 13 | # 29-Apr-2016 Allan McAleavy Updated for BPF_PERF_OUTPUT. |
| 14 | # 08-Oct-2016 Dina Goldshtein Support filtering by PID and TID. |
Tim Douglas | d3583a8 | 2018-12-30 13:18:54 -0500 | [diff] [blame] | 15 | # 28-Dec-2018 Tim Douglas Print flags argument, enable filtering |
takumakume | f899037 | 2019-01-02 17:12:14 +0900 | [diff] [blame] | 16 | # 06-Jan-2019 Takuma Kume Support filtering by UID |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 17 | |
| 18 | from __future__ import print_function |
Gary Lin | 40fd669 | 2018-02-12 16:51:14 +0800 | [diff] [blame] | 19 | from bcc import ArgString, BPF |
Alban Crequy | 32ab858 | 2020-03-22 16:06:44 +0100 | [diff] [blame] | 20 | from bcc.containers import filter_by_containers |
japroc | aed9b1e | 2019-01-04 20:21:46 +0300 | [diff] [blame] | 21 | from bcc.utils import printb |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 22 | import argparse |
Paul Chaignon | 702de38 | 2018-01-28 13:41:35 +0100 | [diff] [blame] | 23 | from datetime import datetime, timedelta |
Tim Douglas | d3583a8 | 2018-12-30 13:18:54 -0500 | [diff] [blame] | 24 | import os |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 25 | |
| 26 | # arguments |
| 27 | examples = """examples: |
| 28 | ./opensnoop # trace all open() syscalls |
Dina Goldshtein | 99a3bc8 | 2016-10-10 21:37:36 +0300 | [diff] [blame] | 29 | ./opensnoop -T # include timestamps |
takumakume | f899037 | 2019-01-02 17:12:14 +0900 | [diff] [blame] | 30 | ./opensnoop -U # include UID |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 31 | ./opensnoop -x # only show failed opens |
| 32 | ./opensnoop -p 181 # only trace PID 181 |
Dina Goldshtein | 99a3bc8 | 2016-10-10 21:37:36 +0300 | [diff] [blame] | 33 | ./opensnoop -t 123 # only trace TID 123 |
takumakume | f899037 | 2019-01-02 17:12:14 +0900 | [diff] [blame] | 34 | ./opensnoop -u 1000 # only trace UID 1000 |
Paul Chaignon | 702de38 | 2018-01-28 13:41:35 +0100 | [diff] [blame] | 35 | ./opensnoop -d 10 # trace for 10 seconds only |
KarimAllah Ahmed | 765dfe2 | 2016-09-10 12:01:07 +0200 | [diff] [blame] | 36 | ./opensnoop -n main # only print process names containing "main" |
Tim Douglas | d3583a8 | 2018-12-30 13:18:54 -0500 | [diff] [blame] | 37 | ./opensnoop -e # show extended fields |
| 38 | ./opensnoop -f O_WRONLY -f O_RDWR # only print calls for writing |
Alban Crequy | 32ab858 | 2020-03-22 16:06:44 +0100 | [diff] [blame] | 39 | ./opensnoop --cgroupmap mappath # only trace cgroups in this BPF map |
| 40 | ./opensnoop --mntnsmap mappath # only trace mount namespaces in the map |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 41 | """ |
| 42 | parser = argparse.ArgumentParser( |
Alexei Starovoitov | bdf0773 | 2016-01-14 10:09:20 -0800 | [diff] [blame] | 43 | description="Trace open() syscalls", |
| 44 | formatter_class=argparse.RawDescriptionHelpFormatter, |
| 45 | epilog=examples) |
Dina Goldshtein | 99a3bc8 | 2016-10-10 21:37:36 +0300 | [diff] [blame] | 46 | parser.add_argument("-T", "--timestamp", action="store_true", |
Alexei Starovoitov | bdf0773 | 2016-01-14 10:09:20 -0800 | [diff] [blame] | 47 | help="include timestamp on output") |
takumakume | f899037 | 2019-01-02 17:12:14 +0900 | [diff] [blame] | 48 | parser.add_argument("-U", "--print-uid", action="store_true", |
| 49 | help="print UID column") |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 50 | parser.add_argument("-x", "--failed", action="store_true", |
Alexei Starovoitov | bdf0773 | 2016-01-14 10:09:20 -0800 | [diff] [blame] | 51 | help="only show failed opens") |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 52 | parser.add_argument("-p", "--pid", |
Alexei Starovoitov | bdf0773 | 2016-01-14 10:09:20 -0800 | [diff] [blame] | 53 | help="trace this PID only") |
Dina Goldshtein | 99a3bc8 | 2016-10-10 21:37:36 +0300 | [diff] [blame] | 54 | parser.add_argument("-t", "--tid", |
| 55 | help="trace this TID only") |
Alban Crequy | b2aa29f | 2019-12-16 10:54:18 +0100 | [diff] [blame] | 56 | parser.add_argument("--cgroupmap", |
| 57 | help="trace cgroups in this BPF map only") |
Alban Crequy | 32ab858 | 2020-03-22 16:06:44 +0100 | [diff] [blame] | 58 | parser.add_argument("--mntnsmap", |
| 59 | help="trace mount namespaces in this BPF map only") |
takumakume | f899037 | 2019-01-02 17:12:14 +0900 | [diff] [blame] | 60 | parser.add_argument("-u", "--uid", |
| 61 | help="trace this UID only") |
Paul Chaignon | 702de38 | 2018-01-28 13:41:35 +0100 | [diff] [blame] | 62 | parser.add_argument("-d", "--duration", |
| 63 | help="total duration of trace in seconds") |
KarimAllah Ahmed | 765dfe2 | 2016-09-10 12:01:07 +0200 | [diff] [blame] | 64 | parser.add_argument("-n", "--name", |
Gary Lin | 40fd669 | 2018-02-12 16:51:14 +0800 | [diff] [blame] | 65 | type=ArgString, |
KarimAllah Ahmed | 765dfe2 | 2016-09-10 12:01:07 +0200 | [diff] [blame] | 66 | help="only print process names containing this name") |
Nathan Scott | cf0792f | 2018-02-02 16:56:50 +1100 | [diff] [blame] | 67 | parser.add_argument("--ebpf", action="store_true", |
| 68 | help=argparse.SUPPRESS) |
Tim Douglas | d3583a8 | 2018-12-30 13:18:54 -0500 | [diff] [blame] | 69 | parser.add_argument("-e", "--extended_fields", action="store_true", |
| 70 | help="show extended fields") |
| 71 | parser.add_argument("-f", "--flag_filter", action="append", |
| 72 | help="filter on flags argument (e.g., O_WRONLY)") |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 73 | args = parser.parse_args() |
| 74 | debug = 0 |
Paul Chaignon | 702de38 | 2018-01-28 13:41:35 +0100 | [diff] [blame] | 75 | if args.duration: |
| 76 | args.duration = timedelta(seconds=int(args.duration)) |
Tim Douglas | d3583a8 | 2018-12-30 13:18:54 -0500 | [diff] [blame] | 77 | flag_filter_mask = 0 |
| 78 | for flag in args.flag_filter or []: |
| 79 | if not flag.startswith('O_'): |
| 80 | exit("Bad flag: %s" % flag) |
| 81 | try: |
| 82 | flag_filter_mask |= getattr(os, flag) |
| 83 | except AttributeError: |
| 84 | exit("Bad flag: %s" % flag) |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 85 | |
| 86 | # define BPF program |
| 87 | bpf_text = """ |
| 88 | #include <uapi/linux/ptrace.h> |
mcaleavya | 3c446c7 | 2016-04-29 13:38:51 +0100 | [diff] [blame] | 89 | #include <uapi/linux/limits.h> |
| 90 | #include <linux/sched.h> |
| 91 | |
| 92 | struct val_t { |
Dina Goldshtein | 99a3bc8 | 2016-10-10 21:37:36 +0300 | [diff] [blame] | 93 | u64 id; |
mcaleavya | 3c446c7 | 2016-04-29 13:38:51 +0100 | [diff] [blame] | 94 | char comm[TASK_COMM_LEN]; |
| 95 | const char *fname; |
Tim Douglas | d3583a8 | 2018-12-30 13:18:54 -0500 | [diff] [blame] | 96 | int flags; // EXTENDED_STRUCT_MEMBER |
mcaleavya | 3c446c7 | 2016-04-29 13:38:51 +0100 | [diff] [blame] | 97 | }; |
| 98 | |
| 99 | struct data_t { |
Dina Goldshtein | 99a3bc8 | 2016-10-10 21:37:36 +0300 | [diff] [blame] | 100 | u64 id; |
mcaleavya | 3c446c7 | 2016-04-29 13:38:51 +0100 | [diff] [blame] | 101 | u64 ts; |
takumakume | f899037 | 2019-01-02 17:12:14 +0900 | [diff] [blame] | 102 | u32 uid; |
mcaleavya | 3c446c7 | 2016-04-29 13:38:51 +0100 | [diff] [blame] | 103 | int ret; |
| 104 | char comm[TASK_COMM_LEN]; |
| 105 | char fname[NAME_MAX]; |
Tim Douglas | d3583a8 | 2018-12-30 13:18:54 -0500 | [diff] [blame] | 106 | int flags; // EXTENDED_STRUCT_MEMBER |
mcaleavya | 3c446c7 | 2016-04-29 13:38:51 +0100 | [diff] [blame] | 107 | }; |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 108 | |
mcaleavya | 3c446c7 | 2016-04-29 13:38:51 +0100 | [diff] [blame] | 109 | BPF_PERF_OUTPUT(events); |
Jiri Olsa | c347fe6 | 2019-12-22 15:52:39 +0100 | [diff] [blame] | 110 | """ |
| 111 | |
| 112 | bpf_text_kprobe = """ |
| 113 | BPF_HASH(infotmp, u64, struct val_t); |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 114 | |
mcaleavya | 3c446c7 | 2016-04-29 13:38:51 +0100 | [diff] [blame] | 115 | int trace_return(struct pt_regs *ctx) |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 116 | { |
Dina Goldshtein | 99a3bc8 | 2016-10-10 21:37:36 +0300 | [diff] [blame] | 117 | u64 id = bpf_get_current_pid_tgid(); |
mcaleavya | 3c446c7 | 2016-04-29 13:38:51 +0100 | [diff] [blame] | 118 | struct val_t *valp; |
| 119 | struct data_t data = {}; |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 120 | |
mcaleavya | 3c446c7 | 2016-04-29 13:38:51 +0100 | [diff] [blame] | 121 | u64 tsp = bpf_ktime_get_ns(); |
| 122 | |
Dina Goldshtein | 99a3bc8 | 2016-10-10 21:37:36 +0300 | [diff] [blame] | 123 | valp = infotmp.lookup(&id); |
mcaleavya | 3c446c7 | 2016-04-29 13:38:51 +0100 | [diff] [blame] | 124 | if (valp == 0) { |
Alexei Starovoitov | bdf0773 | 2016-01-14 10:09:20 -0800 | [diff] [blame] | 125 | // missed entry |
| 126 | return 0; |
| 127 | } |
Sumanth Korikkar | 7f6066d | 2020-05-20 10:49:56 -0500 | [diff] [blame] | 128 | bpf_probe_read_kernel(&data.comm, sizeof(data.comm), valp->comm); |
Sumanth Korikkar | 023154c | 2020-04-20 05:54:57 -0500 | [diff] [blame] | 129 | bpf_probe_read_user(&data.fname, sizeof(data.fname), (void *)valp->fname); |
Dina Goldshtein | 99a3bc8 | 2016-10-10 21:37:36 +0300 | [diff] [blame] | 130 | data.id = valp->id; |
mcaleavya | 3c446c7 | 2016-04-29 13:38:51 +0100 | [diff] [blame] | 131 | data.ts = tsp / 1000; |
takumakume | f899037 | 2019-01-02 17:12:14 +0900 | [diff] [blame] | 132 | data.uid = bpf_get_current_uid_gid(); |
Tim Douglas | d3583a8 | 2018-12-30 13:18:54 -0500 | [diff] [blame] | 133 | data.flags = valp->flags; // EXTENDED_STRUCT_MEMBER |
Naveen N. Rao | 4afa96a | 2016-05-03 14:54:21 +0530 | [diff] [blame] | 134 | data.ret = PT_REGS_RC(ctx); |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 135 | |
mcaleavya | 3c446c7 | 2016-04-29 13:38:51 +0100 | [diff] [blame] | 136 | events.perf_submit(ctx, &data, sizeof(data)); |
Dina Goldshtein | 99a3bc8 | 2016-10-10 21:37:36 +0300 | [diff] [blame] | 137 | infotmp.delete(&id); |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 138 | |
Alexei Starovoitov | bdf0773 | 2016-01-14 10:09:20 -0800 | [diff] [blame] | 139 | return 0; |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 140 | } |
| 141 | """ |
Jiri Olsa | c347fe6 | 2019-12-22 15:52:39 +0100 | [diff] [blame] | 142 | |
He Zhe | 6889afe | 2020-07-20 18:31:56 +0800 | [diff] [blame] | 143 | bpf_text_kprobe_header_open = """ |
| 144 | int syscall__trace_entry_open(struct pt_regs *ctx, const char __user *filename, int flags) |
Jiri Olsa | c347fe6 | 2019-12-22 15:52:39 +0100 | [diff] [blame] | 145 | { |
He Zhe | 6889afe | 2020-07-20 18:31:56 +0800 | [diff] [blame] | 146 | """ |
| 147 | |
| 148 | bpf_text_kprobe_header_openat = """ |
| 149 | int syscall__trace_entry_openat(struct pt_regs *ctx, int dfd, const char __user *filename, int flags) |
| 150 | { |
| 151 | """ |
| 152 | |
| 153 | bpf_text_kprobe_header_openat2 = """ |
| 154 | #include <uapi/linux/openat2.h> |
| 155 | int syscall__trace_entry_openat2(struct pt_regs *ctx, int dfd, const char __user *filename, struct open_how *how) |
| 156 | { |
| 157 | int flags = how->flags; |
| 158 | """ |
| 159 | |
| 160 | bpf_text_kprobe_body = """ |
| 161 | struct val_t val = {}; |
| 162 | u64 id = bpf_get_current_pid_tgid(); |
| 163 | u32 pid = id >> 32; // PID is higher part |
| 164 | u32 tid = id; // Cast and get the lower part |
| 165 | u32 uid = bpf_get_current_uid_gid(); |
| 166 | |
| 167 | PID_TID_FILTER |
| 168 | UID_FILTER |
| 169 | FLAGS_FILTER |
| 170 | |
| 171 | if (container_should_be_filtered()) { |
| 172 | return 0; |
| 173 | } |
| 174 | |
| 175 | if (bpf_get_current_comm(&val.comm, sizeof(val.comm)) == 0) { |
| 176 | val.id = id; |
| 177 | val.fname = filename; |
| 178 | val.flags = flags; // EXTENDED_STRUCT_MEMBER |
| 179 | infotmp.update(&id, &val); |
| 180 | } |
| 181 | |
| 182 | return 0; |
| 183 | }; |
| 184 | """ |
| 185 | |
| 186 | bpf_text_kfunc_header_open = """ |
| 187 | #if defined(CONFIG_ARCH_HAS_SYSCALL_WRAPPER) && !defined(__s390x__) |
| 188 | KRETFUNC_PROBE(FNNAME, struct pt_regs *regs, int ret) |
| 189 | { |
| 190 | const char __user *filename = (char *)PT_REGS_PARM1(regs); |
| 191 | int flags = PT_REGS_PARM2(regs); |
| 192 | #else |
| 193 | KRETFUNC_PROBE(FNNAME, const char __user *filename, int flags, int ret) |
| 194 | { |
| 195 | #endif |
| 196 | """ |
| 197 | |
| 198 | bpf_text_kfunc_header_openat = """ |
| 199 | #if defined(CONFIG_ARCH_HAS_SYSCALL_WRAPPER) && !defined(__s390x__) |
| 200 | KRETFUNC_PROBE(FNNAME, struct pt_regs *regs, int ret) |
| 201 | { |
| 202 | int dfd = PT_REGS_PARM1(regs); |
| 203 | const char __user *filename = (char *)PT_REGS_PARM2(regs); |
| 204 | int flags = PT_REGS_PARM3(regs); |
| 205 | #else |
| 206 | KRETFUNC_PROBE(FNNAME, int dfd, const char __user *filename, int flags, int ret) |
| 207 | { |
| 208 | #endif |
| 209 | """ |
| 210 | |
| 211 | bpf_text_kfunc_header_openat2 = """ |
| 212 | #include <uapi/linux/openat2.h> |
| 213 | #if defined(CONFIG_ARCH_HAS_SYSCALL_WRAPPER) && !defined(__s390x__) |
| 214 | KRETFUNC_PROBE(FNNAME, struct pt_regs *regs, int ret) |
| 215 | { |
| 216 | int dfd = PT_REGS_PARM1(regs); |
| 217 | const char __user *filename = (char *)PT_REGS_PARM2(regs); |
zb3 | 24f4759 | 2020-12-17 11:38:53 +0100 | [diff] [blame] | 218 | struct open_how __user how; |
| 219 | int flags; |
| 220 | |
| 221 | bpf_probe_read_user(&how, sizeof(struct open_how), (struct open_how*)PT_REGS_PARM3(regs)); |
| 222 | flags = how.flags; |
He Zhe | 6889afe | 2020-07-20 18:31:56 +0800 | [diff] [blame] | 223 | #else |
| 224 | KRETFUNC_PROBE(FNNAME, int dfd, const char __user *filename, struct open_how __user *how, int ret) |
| 225 | { |
| 226 | int flags = how->flags; |
| 227 | #endif |
| 228 | """ |
| 229 | |
| 230 | bpf_text_kfunc_body = """ |
Jiri Olsa | c347fe6 | 2019-12-22 15:52:39 +0100 | [diff] [blame] | 231 | u64 id = bpf_get_current_pid_tgid(); |
| 232 | u32 pid = id >> 32; // PID is higher part |
| 233 | u32 tid = id; // Cast and get the lower part |
| 234 | u32 uid = bpf_get_current_uid_gid(); |
| 235 | |
| 236 | PID_TID_FILTER |
| 237 | UID_FILTER |
| 238 | FLAGS_FILTER |
Alban Crequy | 32ab858 | 2020-03-22 16:06:44 +0100 | [diff] [blame] | 239 | if (container_should_be_filtered()) { |
| 240 | return 0; |
Alban Crequy | 510fc74 | 2020-03-19 14:07:38 +0100 | [diff] [blame] | 241 | } |
Jiri Olsa | c347fe6 | 2019-12-22 15:52:39 +0100 | [diff] [blame] | 242 | |
| 243 | struct data_t data = {}; |
| 244 | bpf_get_current_comm(&data.comm, sizeof(data.comm)); |
| 245 | |
| 246 | u64 tsp = bpf_ktime_get_ns(); |
| 247 | |
Sumanth Korikkar | 023154c | 2020-04-20 05:54:57 -0500 | [diff] [blame] | 248 | bpf_probe_read_user(&data.fname, sizeof(data.fname), (void *)filename); |
Jiri Olsa | c347fe6 | 2019-12-22 15:52:39 +0100 | [diff] [blame] | 249 | data.id = id; |
| 250 | data.ts = tsp / 1000; |
| 251 | data.uid = bpf_get_current_uid_gid(); |
| 252 | data.flags = flags; // EXTENDED_STRUCT_MEMBER |
| 253 | data.ret = ret; |
| 254 | |
| 255 | events.perf_submit(ctx, &data, sizeof(data)); |
Mauricio Vásquez | 44e0f43 | 2020-05-21 11:50:52 -0500 | [diff] [blame] | 256 | |
Mauricio Vásquez | 8cd2717 | 2020-06-08 08:12:08 -0500 | [diff] [blame] | 257 | return 0; |
Jiri Olsa | c347fe6 | 2019-12-22 15:52:39 +0100 | [diff] [blame] | 258 | } |
| 259 | """ |
| 260 | |
He Zhe | 6889afe | 2020-07-20 18:31:56 +0800 | [diff] [blame] | 261 | b = BPF(text='') |
| 262 | # open and openat are always in place since 2.6.16 |
| 263 | fnname_open = b.get_syscall_prefix().decode() + 'open' |
| 264 | fnname_openat = b.get_syscall_prefix().decode() + 'openat' |
| 265 | fnname_openat2 = b.get_syscall_prefix().decode() + 'openat2' |
| 266 | if b.ksymname(fnname_openat2) == -1: |
| 267 | fnname_openat2 = None |
| 268 | |
Jiri Olsa | c347fe6 | 2019-12-22 15:52:39 +0100 | [diff] [blame] | 269 | is_support_kfunc = BPF.support_kfunc() |
| 270 | if is_support_kfunc: |
He Zhe | 6889afe | 2020-07-20 18:31:56 +0800 | [diff] [blame] | 271 | bpf_text += bpf_text_kfunc_header_open.replace('FNNAME', fnname_open) |
| 272 | bpf_text += bpf_text_kfunc_body |
| 273 | |
| 274 | bpf_text += bpf_text_kfunc_header_openat.replace('FNNAME', fnname_openat) |
| 275 | bpf_text += bpf_text_kfunc_body |
| 276 | |
| 277 | if fnname_openat2: |
| 278 | bpf_text += bpf_text_kfunc_header_openat2.replace('FNNAME', fnname_openat2) |
| 279 | bpf_text += bpf_text_kfunc_body |
Jiri Olsa | c347fe6 | 2019-12-22 15:52:39 +0100 | [diff] [blame] | 280 | else: |
| 281 | bpf_text += bpf_text_kprobe |
| 282 | |
He Zhe | 6889afe | 2020-07-20 18:31:56 +0800 | [diff] [blame] | 283 | bpf_text += bpf_text_kprobe_header_open |
| 284 | bpf_text += bpf_text_kprobe_body |
| 285 | |
| 286 | bpf_text += bpf_text_kprobe_header_openat |
| 287 | bpf_text += bpf_text_kprobe_body |
| 288 | |
| 289 | if fnname_openat2: |
| 290 | bpf_text += bpf_text_kprobe_header_openat2 |
| 291 | bpf_text += bpf_text_kprobe_body |
| 292 | |
Dina Goldshtein | 99a3bc8 | 2016-10-10 21:37:36 +0300 | [diff] [blame] | 293 | if args.tid: # TID trumps PID |
Tim Douglas | d3583a8 | 2018-12-30 13:18:54 -0500 | [diff] [blame] | 294 | bpf_text = bpf_text.replace('PID_TID_FILTER', |
Dina Goldshtein | 99a3bc8 | 2016-10-10 21:37:36 +0300 | [diff] [blame] | 295 | 'if (tid != %s) { return 0; }' % args.tid) |
| 296 | elif args.pid: |
Tim Douglas | d3583a8 | 2018-12-30 13:18:54 -0500 | [diff] [blame] | 297 | bpf_text = bpf_text.replace('PID_TID_FILTER', |
Alexei Starovoitov | bdf0773 | 2016-01-14 10:09:20 -0800 | [diff] [blame] | 298 | 'if (pid != %s) { return 0; }' % args.pid) |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 299 | else: |
Tim Douglas | d3583a8 | 2018-12-30 13:18:54 -0500 | [diff] [blame] | 300 | bpf_text = bpf_text.replace('PID_TID_FILTER', '') |
takumakume | f899037 | 2019-01-02 17:12:14 +0900 | [diff] [blame] | 301 | if args.uid: |
| 302 | bpf_text = bpf_text.replace('UID_FILTER', |
| 303 | 'if (uid != %s) { return 0; }' % args.uid) |
| 304 | else: |
| 305 | bpf_text = bpf_text.replace('UID_FILTER', '') |
Alban Crequy | 32ab858 | 2020-03-22 16:06:44 +0100 | [diff] [blame] | 306 | bpf_text = filter_by_containers(args) + bpf_text |
Tim Douglas | d3583a8 | 2018-12-30 13:18:54 -0500 | [diff] [blame] | 307 | if args.flag_filter: |
| 308 | bpf_text = bpf_text.replace('FLAGS_FILTER', |
| 309 | 'if (!(flags & %d)) { return 0; }' % flag_filter_mask) |
| 310 | else: |
| 311 | bpf_text = bpf_text.replace('FLAGS_FILTER', '') |
| 312 | if not (args.extended_fields or args.flag_filter): |
| 313 | bpf_text = '\n'.join(x for x in bpf_text.split('\n') |
| 314 | if 'EXTENDED_STRUCT_MEMBER' not in x) |
Nathan Scott | cf0792f | 2018-02-02 16:56:50 +1100 | [diff] [blame] | 315 | if debug or args.ebpf: |
Alexei Starovoitov | bdf0773 | 2016-01-14 10:09:20 -0800 | [diff] [blame] | 316 | print(bpf_text) |
Nathan Scott | cf0792f | 2018-02-02 16:56:50 +1100 | [diff] [blame] | 317 | if args.ebpf: |
| 318 | exit() |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 319 | |
| 320 | # initialize BPF |
| 321 | b = BPF(text=bpf_text) |
Jiri Olsa | c347fe6 | 2019-12-22 15:52:39 +0100 | [diff] [blame] | 322 | if not is_support_kfunc: |
He Zhe | 6889afe | 2020-07-20 18:31:56 +0800 | [diff] [blame] | 323 | b.attach_kprobe(event=fnname_open, fn_name="syscall__trace_entry_open") |
| 324 | b.attach_kretprobe(event=fnname_open, fn_name="trace_return") |
| 325 | |
| 326 | b.attach_kprobe(event=fnname_openat, fn_name="syscall__trace_entry_openat") |
| 327 | b.attach_kretprobe(event=fnname_openat, fn_name="trace_return") |
| 328 | |
| 329 | if fnname_openat2: |
| 330 | b.attach_kprobe(event=fnname_openat2, fn_name="syscall__trace_entry_openat2") |
| 331 | b.attach_kretprobe(event=fnname_openat2, fn_name="trace_return") |
mcaleavya | 3c446c7 | 2016-04-29 13:38:51 +0100 | [diff] [blame] | 332 | |
KarimAllah Ahmed | a17d1e8 | 2016-09-10 12:00:32 +0200 | [diff] [blame] | 333 | initial_ts = 0 |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 334 | |
| 335 | # header |
| 336 | if args.timestamp: |
Alexei Starovoitov | bdf0773 | 2016-01-14 10:09:20 -0800 | [diff] [blame] | 337 | print("%-14s" % ("TIME(s)"), end="") |
takumakume | f899037 | 2019-01-02 17:12:14 +0900 | [diff] [blame] | 338 | if args.print_uid: |
| 339 | print("%-6s" % ("UID"), end="") |
Tim Douglas | d3583a8 | 2018-12-30 13:18:54 -0500 | [diff] [blame] | 340 | print("%-6s %-16s %4s %3s " % |
| 341 | ("TID" if args.tid else "PID", "COMM", "FD", "ERR"), end="") |
| 342 | if args.extended_fields: |
| 343 | print("%-9s" % ("FLAGS"), end="") |
| 344 | print("PATH") |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 345 | |
mcaleavya | 3c446c7 | 2016-04-29 13:38:51 +0100 | [diff] [blame] | 346 | # process event |
| 347 | def print_event(cpu, data, size): |
Xiaozhou Liu | 51d62d3 | 2019-02-15 13:03:05 +0800 | [diff] [blame] | 348 | event = b["events"].event(data) |
KarimAllah Ahmed | a17d1e8 | 2016-09-10 12:00:32 +0200 | [diff] [blame] | 349 | global initial_ts |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 350 | |
Alexei Starovoitov | bdf0773 | 2016-01-14 10:09:20 -0800 | [diff] [blame] | 351 | # split return value into FD and errno columns |
mcaleavya | 3c446c7 | 2016-04-29 13:38:51 +0100 | [diff] [blame] | 352 | if event.ret >= 0: |
| 353 | fd_s = event.ret |
Alexei Starovoitov | bdf0773 | 2016-01-14 10:09:20 -0800 | [diff] [blame] | 354 | err = 0 |
| 355 | else: |
mcaleavya | 3c446c7 | 2016-04-29 13:38:51 +0100 | [diff] [blame] | 356 | fd_s = -1 |
| 357 | err = - event.ret |
Brendan Gregg | bedd150 | 2015-09-17 21:52:52 -0700 | [diff] [blame] | 358 | |
KarimAllah Ahmed | a17d1e8 | 2016-09-10 12:00:32 +0200 | [diff] [blame] | 359 | if not initial_ts: |
| 360 | initial_ts = event.ts |
mcaleavya | 3c446c7 | 2016-04-29 13:38:51 +0100 | [diff] [blame] | 361 | |
KarimAllah Ahmed | a17d1e8 | 2016-09-10 12:00:32 +0200 | [diff] [blame] | 362 | if args.failed and (event.ret >= 0): |
mcaleavya | 3c446c7 | 2016-04-29 13:38:51 +0100 | [diff] [blame] | 363 | return |
| 364 | |
Gary Lin | 40fd669 | 2018-02-12 16:51:14 +0800 | [diff] [blame] | 365 | if args.name and bytes(args.name) not in event.comm: |
KarimAllah Ahmed | 765dfe2 | 2016-09-10 12:01:07 +0200 | [diff] [blame] | 366 | return |
| 367 | |
Alexei Starovoitov | bdf0773 | 2016-01-14 10:09:20 -0800 | [diff] [blame] | 368 | if args.timestamp: |
KarimAllah Ahmed | a17d1e8 | 2016-09-10 12:00:32 +0200 | [diff] [blame] | 369 | delta = event.ts - initial_ts |
Gary Lin | 6c79331 | 2019-04-18 15:17:56 +0800 | [diff] [blame] | 370 | printb(b"%-14.9f" % (float(delta) / 1000000), nl="") |
mcaleavya | 3c446c7 | 2016-04-29 13:38:51 +0100 | [diff] [blame] | 371 | |
takumakume | f899037 | 2019-01-02 17:12:14 +0900 | [diff] [blame] | 372 | if args.print_uid: |
Gary Lin | 6c79331 | 2019-04-18 15:17:56 +0800 | [diff] [blame] | 373 | printb(b"%-6d" % event.uid, nl="") |
takumakume | f899037 | 2019-01-02 17:12:14 +0900 | [diff] [blame] | 374 | |
Gary Lin | 6c79331 | 2019-04-18 15:17:56 +0800 | [diff] [blame] | 375 | printb(b"%-6d %-16s %4d %3d " % |
| 376 | (event.id & 0xffffffff if args.tid else event.id >> 32, |
| 377 | event.comm, fd_s, err), nl="") |
Tim Douglas | d3583a8 | 2018-12-30 13:18:54 -0500 | [diff] [blame] | 378 | |
| 379 | if args.extended_fields: |
Gary Lin | 6c79331 | 2019-04-18 15:17:56 +0800 | [diff] [blame] | 380 | printb(b"%08o " % event.flags, nl="") |
Tim Douglas | d3583a8 | 2018-12-30 13:18:54 -0500 | [diff] [blame] | 381 | |
Yonghong Song | ebe1951 | 2019-01-10 14:54:16 -0800 | [diff] [blame] | 382 | printb(b'%s' % event.fname) |
mcaleavya | 3c446c7 | 2016-04-29 13:38:51 +0100 | [diff] [blame] | 383 | |
| 384 | # loop with callback to print_event |
Mark Drayton | 5f5687e | 2017-02-20 18:13:03 +0000 | [diff] [blame] | 385 | b["events"].open_perf_buffer(print_event, page_cnt=64) |
Paul Chaignon | 702de38 | 2018-01-28 13:41:35 +0100 | [diff] [blame] | 386 | start_time = datetime.now() |
| 387 | while not args.duration or datetime.now() - start_time < args.duration: |
Jerome Marchand | 5167127 | 2018-12-19 01:57:24 +0100 | [diff] [blame] | 388 | try: |
| 389 | b.perf_buffer_poll() |
| 390 | except KeyboardInterrupt: |
| 391 | exit() |