mirror of
git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
synced 2025-08-05 16:54:27 +00:00

The '@' prefix in bpftrace map keys is specific to bpftrace and can be safely removed when processing results. This patch modifies the bpftrace utility to strip the '@' from map keys before storing them in the result dictionary, making the keys more consistent with Python conventions. Signed-off-by: Breno Leitao <leitao@debian.org> Link: https://patch.msgid.link/20250714-netpoll_test-v7-2-c0220cfaa63e@debian.org Signed-off-by: Jakub Kicinski <kuba@kernel.org>
251 lines
7.4 KiB
Python
251 lines
7.4 KiB
Python
# SPDX-License-Identifier: GPL-2.0
|
|
|
|
import errno
|
|
import json as _json
|
|
import os
|
|
import random
|
|
import re
|
|
import select
|
|
import socket
|
|
import subprocess
|
|
import time
|
|
|
|
|
|
class CmdExitFailure(Exception):
|
|
def __init__(self, msg, cmd_obj):
|
|
super().__init__(msg)
|
|
self.cmd = cmd_obj
|
|
|
|
|
|
def fd_read_timeout(fd, timeout):
|
|
rlist, _, _ = select.select([fd], [], [], timeout)
|
|
if rlist:
|
|
return os.read(fd, 1024)
|
|
else:
|
|
raise TimeoutError("Timeout waiting for fd read")
|
|
|
|
|
|
class cmd:
|
|
"""
|
|
Execute a command on local or remote host.
|
|
|
|
Use bkg() instead to run a command in the background.
|
|
"""
|
|
def __init__(self, comm, shell=True, fail=True, ns=None, background=False,
|
|
host=None, timeout=5, ksft_wait=None):
|
|
if ns:
|
|
comm = f'ip netns exec {ns} ' + comm
|
|
|
|
self.stdout = None
|
|
self.stderr = None
|
|
self.ret = None
|
|
self.ksft_term_fd = None
|
|
|
|
self.comm = comm
|
|
if host:
|
|
self.proc = host.cmd(comm)
|
|
else:
|
|
# ksft_wait lets us wait for the background process to fully start,
|
|
# we pass an FD to the child process, and wait for it to write back.
|
|
# Similarly term_fd tells child it's time to exit.
|
|
pass_fds = ()
|
|
env = os.environ.copy()
|
|
if ksft_wait is not None:
|
|
rfd, ready_fd = os.pipe()
|
|
wait_fd, self.ksft_term_fd = os.pipe()
|
|
pass_fds = (ready_fd, wait_fd, )
|
|
env["KSFT_READY_FD"] = str(ready_fd)
|
|
env["KSFT_WAIT_FD"] = str(wait_fd)
|
|
|
|
self.proc = subprocess.Popen(comm, shell=shell, stdout=subprocess.PIPE,
|
|
stderr=subprocess.PIPE, pass_fds=pass_fds,
|
|
env=env)
|
|
if ksft_wait is not None:
|
|
os.close(ready_fd)
|
|
os.close(wait_fd)
|
|
msg = fd_read_timeout(rfd, ksft_wait)
|
|
os.close(rfd)
|
|
if not msg:
|
|
raise Exception("Did not receive ready message")
|
|
if not background:
|
|
self.process(terminate=False, fail=fail, timeout=timeout)
|
|
|
|
def process(self, terminate=True, fail=None, timeout=5):
|
|
if fail is None:
|
|
fail = not terminate
|
|
|
|
if self.ksft_term_fd:
|
|
os.write(self.ksft_term_fd, b"1")
|
|
if terminate:
|
|
self.proc.terminate()
|
|
stdout, stderr = self.proc.communicate(timeout)
|
|
self.stdout = stdout.decode("utf-8")
|
|
self.stderr = stderr.decode("utf-8")
|
|
self.proc.stdout.close()
|
|
self.proc.stderr.close()
|
|
self.ret = self.proc.returncode
|
|
|
|
if self.proc.returncode != 0 and fail:
|
|
if len(stderr) > 0 and stderr[-1] == "\n":
|
|
stderr = stderr[:-1]
|
|
raise CmdExitFailure("Command failed: %s\nSTDOUT: %s\nSTDERR: %s" %
|
|
(self.proc.args, stdout, stderr), self)
|
|
|
|
|
|
class bkg(cmd):
|
|
"""
|
|
Run a command in the background.
|
|
|
|
Examples usage:
|
|
|
|
Run a command on remote host, and wait for it to finish.
|
|
This is usually paired with wait_port_listen() to make sure
|
|
the command has initialized:
|
|
|
|
with bkg("socat ...", exit_wait=True, host=cfg.remote) as nc:
|
|
...
|
|
|
|
Run a command and expect it to let us know that it's ready
|
|
by writing to a special file descriptor passed via KSFT_READY_FD.
|
|
Command will be terminated when we exit the context manager:
|
|
|
|
with bkg("my_binary", ksft_wait=5):
|
|
"""
|
|
def __init__(self, comm, shell=True, fail=None, ns=None, host=None,
|
|
exit_wait=False, ksft_wait=None):
|
|
super().__init__(comm, background=True,
|
|
shell=shell, fail=fail, ns=ns, host=host,
|
|
ksft_wait=ksft_wait)
|
|
self.terminate = not exit_wait and not ksft_wait
|
|
self.check_fail = fail
|
|
|
|
if shell and self.terminate:
|
|
print("# Warning: combining shell and terminate is risky!")
|
|
print("# SIGTERM may not reach the child on zsh/ksh!")
|
|
|
|
def __enter__(self):
|
|
return self
|
|
|
|
def __exit__(self, ex_type, ex_value, ex_tb):
|
|
return self.process(terminate=self.terminate, fail=self.check_fail)
|
|
|
|
|
|
global_defer_queue = []
|
|
|
|
|
|
class defer:
|
|
def __init__(self, func, *args, **kwargs):
|
|
global global_defer_queue
|
|
|
|
if not callable(func):
|
|
raise Exception("defer created with un-callable object, did you call the function instead of passing its name?")
|
|
|
|
self.func = func
|
|
self.args = args
|
|
self.kwargs = kwargs
|
|
|
|
self._queue = global_defer_queue
|
|
self._queue.append(self)
|
|
|
|
def __enter__(self):
|
|
return self
|
|
|
|
def __exit__(self, ex_type, ex_value, ex_tb):
|
|
return self.exec()
|
|
|
|
def exec_only(self):
|
|
self.func(*self.args, **self.kwargs)
|
|
|
|
def cancel(self):
|
|
self._queue.remove(self)
|
|
|
|
def exec(self):
|
|
self.cancel()
|
|
self.exec_only()
|
|
|
|
|
|
def tool(name, args, json=None, ns=None, host=None):
|
|
cmd_str = name + ' '
|
|
if json:
|
|
cmd_str += '--json '
|
|
cmd_str += args
|
|
cmd_obj = cmd(cmd_str, ns=ns, host=host)
|
|
if json:
|
|
return _json.loads(cmd_obj.stdout)
|
|
return cmd_obj
|
|
|
|
|
|
def bpftool(args, json=None, ns=None, host=None):
|
|
return tool('bpftool', args, json=json, ns=ns, host=host)
|
|
|
|
|
|
def ip(args, json=None, ns=None, host=None):
|
|
if ns:
|
|
args = f'-netns {ns} ' + args
|
|
return tool('ip', args, json=json, host=host)
|
|
|
|
|
|
def ethtool(args, json=None, ns=None, host=None):
|
|
return tool('ethtool', args, json=json, ns=ns, host=host)
|
|
|
|
|
|
def bpftrace(expr, json=None, ns=None, host=None, timeout=None):
|
|
"""
|
|
Run bpftrace and return map data (if json=True).
|
|
The output of bpftrace is inconvenient, so the helper converts
|
|
to a dict indexed by map name, e.g.:
|
|
{
|
|
"@": { ... },
|
|
"@map2": { ... },
|
|
}
|
|
"""
|
|
cmd_arr = ['bpftrace']
|
|
# Throw in --quiet if json, otherwise the output has two objects
|
|
if json:
|
|
cmd_arr += ['-f', 'json', '-q']
|
|
if timeout:
|
|
expr += ' interval:s:' + str(timeout) + ' { exit(); }'
|
|
cmd_arr += ['-e', expr]
|
|
cmd_obj = cmd(cmd_arr, ns=ns, host=host, shell=False)
|
|
if json:
|
|
# bpftrace prints objects as lines
|
|
ret = {}
|
|
for l in cmd_obj.stdout.split('\n'):
|
|
if not l.strip():
|
|
continue
|
|
one = _json.loads(l)
|
|
if one.get('type') != 'map':
|
|
continue
|
|
for k, v in one["data"].items():
|
|
if k.startswith('@'):
|
|
k = k.lstrip('@')
|
|
ret[k] = v
|
|
return ret
|
|
return cmd_obj
|
|
|
|
|
|
def rand_port(type=socket.SOCK_STREAM):
|
|
"""
|
|
Get a random unprivileged port.
|
|
"""
|
|
with socket.socket(socket.AF_INET6, type) as s:
|
|
s.bind(("", 0))
|
|
return s.getsockname()[1]
|
|
|
|
|
|
def wait_port_listen(port, proto="tcp", ns=None, host=None, sleep=0.005, deadline=5):
|
|
end = time.monotonic() + deadline
|
|
|
|
pattern = f":{port:04X} .* "
|
|
if proto == "tcp": # for tcp protocol additionally check the socket state
|
|
pattern += "0A"
|
|
pattern = re.compile(pattern)
|
|
|
|
while True:
|
|
data = cmd(f'cat /proc/net/{proto}*', ns=ns, host=host, shell=True).stdout
|
|
for row in data.split("\n"):
|
|
if pattern.search(row):
|
|
return
|
|
if time.monotonic() > end:
|
|
raise Exception("Waiting for port listen timed out")
|
|
time.sleep(sleep)
|