From nobody Fri Dec 19 07:03:18 2025 Received: from mailgw.kylinos.cn (mailgw.kylinos.cn [124.126.103.232]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 8F6901D618E for ; Wed, 9 Apr 2025 07:23:29 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=124.126.103.232 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1744183413; cv=none; b=jrzCijZzesf021JiIDbYrWs/Zk34z3ouii2HAXjFF6143stfPgjFv+y3AIg44hZ7VWgf/+Avfqo7p4rNvCD4bUY2vlz9FA9EXm5IaWFpmYe+FrGZXD4CPCWYCUe0CHJjXJ9zeE75+5qHLCk6XFsNWQgSP5zGJUtp4UaYJSvqtds= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1744183413; c=relaxed/simple; bh=BkrdT/tCnUnUm3kDyrHICefLnbdq4yfOHpEXONJbDFc=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=h0VipHTk+XbtyjgZDlALuK7BpJ3YSyCvP2dqCivV1emo4Zv4TuWw/farrqPJKiDziNwmgRCwDEkXzXq2fPbY+HRFV2BlHrUxtRFe0+JtWp74hOd2s24yAazMZBSc16ibx5ozMJXDM9YSVD3FXp9BXDT3hl3KNXEqYOC+YQ1bCtQ= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=kylinos.cn; spf=pass smtp.mailfrom=kylinos.cn; arc=none smtp.client-ip=124.126.103.232 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=kylinos.cn Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=kylinos.cn X-UUID: cceaa552151211f0a216b1d71e6e1362-20250409 X-CTIC-Tags: HR_CC_AS_FROM, HR_CC_COUNT, HR_CC_DOMAIN_COUNT, HR_CC_NAME, HR_CTE_8B HR_CTT_MISS, HR_DATE_H, HR_DATE_WKD, HR_DATE_ZONE, HR_FROM_NAME HR_SJ_DIGIT_LEN, HR_SJ_LANG, HR_SJ_LEN, HR_SJ_LETTER, HR_SJ_NOR_SYM HR_SJ_PHRASE, HR_SJ_PHRASE_LEN, HR_SJ_WS, HR_TO_COUNT, HR_TO_DOMAIN_COUNT HR_TO_NO_NAME, IP_TRUSTED, SRC_TRUSTED, DN_TRUSTED, SA_TRUSTED SA_EXISTED, SN_EXISTED, SPF_NOPASS, DKIM_NOPASS, DMARC_NOPASS CIE_BAD, CIE_GOOD, CIE_GOOD_SPF, GTI_FG_BS, GTI_RG_INFO GTI_C_BU, AMN_T1, AMN_GOOD, AMN_C_TI, AMN_C_BU ABX_MISS_RDNS X-CID-O-RULE: Release_Ham X-CID-RULE: Release_Ham X-CID-O-INFO: VERSION:1.1.45,REQID:5fbccbfe-35d3-4848-813a-aa34ed1291fb,IP:10, URL:0,TC:0,Content:0,EDM:25,RT:0,SF:-15,FILE:0,BULK:0,RULE:Release_Ham,ACT ION:release,TS:20 X-CID-INFO: VERSION:1.1.45,REQID:5fbccbfe-35d3-4848-813a-aa34ed1291fb,IP:10,UR L:0,TC:0,Content:0,EDM:25,RT:0,SF:-15,FILE:0,BULK:0,RULE:Release_Ham,ACTIO N:release,TS:20 X-CID-META: VersionHash:6493067,CLOUDID:b8a2fba3c1056a4d083c598e09f7ad39,BulkI D:2504091518160QB0KWHC,BulkQuantity:0,Recheck:0,SF:17|19|24|44|66|78|81|82 |102,TC:nil,Content:0|50,EDM:5,IP:-2,URL:0,File:nil,RT:nil,Bulk:nil,QS:nil ,BEC:nil,COL:0,OSI:0,OSA:0,AV:0,LES:1,SPR:NO,DKR:0,DKP:0,BRR:0,BRE:0,ARC:0 X-CID-BVR: 0 X-CID-BAS: 0,_,0,_ X-CID-FACTOR: TF_CID_SPAM_FAS,TF_CID_SPAM_FSD,TF_CID_SPAM_FSI,TF_CID_SPAM_SNR X-UUID: cceaa552151211f0a216b1d71e6e1362-20250409 X-User: yangang@kylinos.cn Received: from localhost.localdomain [(223.70.159.239)] by mailgw.kylinos.cn (envelope-from ) (Generic MTA with TLSv1.3 TLS_AES_256_GCM_SHA384 256/256) with ESMTP id 2014667068; Wed, 09 Apr 2025 15:18:14 +0800 From: Gang Yan To: mptcp@lists.linux.dev Cc: Gang Yan Subject: [Patch, v2, 1/2] BCC: Python: Support 'fmod_ret' method for eBPF Date: Wed, 9 Apr 2025 15:17:52 +0800 Message-Id: <224f2b589ffd6e6f5aa42a213f5f6410c21f9dcf.1744182834.git.yangang@kylinos.cn> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: Precedence: bulk X-Mailing-List: mptcp@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" In kernel, there exists a lot of 'fmod_ret' functions, such as 'update_socket_protocol'. But it cannot attached in BCC-python directly, so this patch provides an interface for python to use 'fmod_ret' attaching method. But there exists a question about how to check 'fmod_ret' support in kernel, do you have any suggestion? I already considered checking the kernel version which seems not suitable. Signed-off-by: Gang Yan --- src/python/bcc/__init__.py | 34 ++++++++++++++++++++++++++++++++++ 1 file changed, 34 insertions(+) diff --git a/src/python/bcc/__init__.py b/src/python/bcc/__init__.py index 8bc85516..12ce3ef6 100644 --- a/src/python/bcc/__init__.py +++ b/src/python/bcc/__init__.py @@ -461,6 +461,7 @@ class BPF(object): self.raw_tracepoint_fds =3D {} self.kfunc_entry_fds =3D {} self.kfunc_exit_fds =3D {} + self.fmod_ret_fds =3D {} self.lsm_fds =3D {} self.perf_buffers =3D {} self.open_perf_events =3D {} @@ -1157,6 +1158,12 @@ class BPF(object): return True return False =20 + @staticmethod + def support_fmod_ret(): + # It is not clear what can be used to check if 'fmod_ret' + # is supported by the kernel. Assuming checking kfunc is enough + return BPF.support_kfunc() + def detach_kfunc(self, fn_name=3Db""): fn_name =3D _assert_is_bytes(fn_name) fn_name =3D BPF.add_prefix(b"kfunc__", fn_name) @@ -1166,6 +1173,15 @@ class BPF(object): os.close(self.kfunc_entry_fds[fn_name]) del self.kfunc_entry_fds[fn_name] =20 + def detach_fmod_ret(self, fn_name=3Db""): + fn_name =3D _assert_is_bytes(fn_name) + fn_name =3D BPF.add_prefix(b"kmod_ret__", fn_name) + + if fn_name not in self.fmod_ret_fds: + raise Exception("Fmod_ret func %s is not attached" % fn_name) + os.close(self.fmod_ret_fds[fn_name]) + del self.fmod_ret_fds[fn_name] + def detach_kretfunc(self, fn_name=3Db""): fn_name =3D _assert_is_bytes(fn_name) fn_name =3D BPF.add_prefix(b"kretfunc__", fn_name) @@ -1189,6 +1205,22 @@ class BPF(object): self.kfunc_entry_fds[fn_name] =3D fd return self =20 + def attach_fmod_ret(self, fn_name=3Db""): + fn_name =3D _assert_is_bytes(fn_name) + fn_name =3D BPF.add_prefix(b"kmod_ret__", fn_name) + + if fn_name in self.fmod_ret_fds: + raise Exception("Fmod_ret func %s has been attached" % fn_name) + + fn =3D self.load_func(fn_name, BPF.TRACING) + fd =3D lib.bpf_attach_kfunc(fn.fd) + + if fd < 0: + raise Exception("Failed to attach BPF to fmod_ret kernel func") + self.fmod_ret_fds[fn_name] =3D fd + + return self + def attach_kretfunc(self, fn_name=3Db""): fn_name =3D _assert_is_bytes(fn_name) fn_name =3D BPF.add_prefix(b"kretfunc__", fn_name) @@ -1824,6 +1856,8 @@ class BPF(object): self.detach_kretfunc(k) for k, v in list(self.lsm_fds.items()): self.detach_lsm(k) + for k, v in list(self.fmod_ret_fds.items()): + self.detach_fmod_ret(k) =20 # Clean up opened perf ring buffer and perf events table_keys =3D list(self.tables.keys()) --=20 2.25.1