Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp1451673pxb; Fri, 1 Apr 2022 14:01:05 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwh8IJwRChONSvdptpVfJhoY35MxcLWU6khbb35+o89wFqFHzvHdMJDlitrgk3egXhqbq5l X-Received: by 2002:a05:6402:270f:b0:419:5b71:3493 with SMTP id y15-20020a056402270f00b004195b713493mr22733617edd.72.1648846865293; Fri, 01 Apr 2022 14:01:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1648846865; cv=none; d=google.com; s=arc-20160816; b=Nl9N62ouJqc7y3jr7ezy/L5fO7vcOba4/z6J2jshiQ6hZq2wOqUKfl9oQoGu6qw3XY ZJFHQZb/DwD5kR09f1I2tQYuwD/5wfnta1KlwCa9YoAHpoVGpkCgo4cIhBoeFwGm3TL7 rSHf0Vl8QFNuNA/xYh8o4rrSG1FcSyhXWrEvaHPrz4qw9E0Cg3ZWipDuK/YvBYDHPd4d xHMApttAPfORtoZpmi14+SENr+E9atAugkAvd3uXEsXEYRrnzln5EKEdak2Vo0C46A6K AyKg7wlkbraLfEfdB+Tf/xDfYktNayPkKaLC2PFdHdGBWmBRJ3b4BtBdnPtIaCJgkgol kDOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:to:content-language:subject:user-agent:mime-version:date :message-id:sender:hmm_source_type:hmm_attache_num:hmm_source_ip; bh=RNE7Z+Y0C/1gKxbPxvE6KuJ2QkeJu/j/Ezkni3rB2wI=; b=0jDL6iSVZxzZ1Iud84qa4gMD9kpwkwwdexi/QN+qZeSXHSg65DNeS+rmvyc3393ZPW avWVtc7mOrQvdj94ZWzTnFk+2w7fEZQlZEc1tOv70V5u70zGT/jY5p09pH4NSKfGs5gS AJPTiVsWkj04oP1H7IUb8CJ3Va5YYQuX+EHE74UX6dP654aPLMwCuVpTXDwEo4/XSn1E ln4H+Xyhyof4f+kWVuuqohRge++x71qebOVWjyaZ6WQAqs6X7pU5Y9JWjWAqgtecTq0g TDRdlmIxpn0DpFPlZBMDcCYEB4d59ZiohWTTkoRVrytUoU1GjFvI3NNxdnWl6vSoO/O4 yqtw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id kk6-20020a170907766600b006df76385e55si2158456ejc.757.2022.04.01.14.00.40; Fri, 01 Apr 2022 14:01:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244647AbiDADjC (ORCPT + 99 others); Thu, 31 Mar 2022 23:39:02 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55234 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244625AbiDADjA (ORCPT ); Thu, 31 Mar 2022 23:39:00 -0400 Received: from 189.cn (ptr.189.cn [183.61.185.104]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id A1D1D1D66CA; Thu, 31 Mar 2022 20:37:10 -0700 (PDT) HMM_SOURCE_IP: 10.64.8.41:56850.577092616 HMM_ATTACHE_NUM: 0000 HMM_SOURCE_TYPE: SMTP Received: from clientip-123.150.8.42 (unknown [10.64.8.41]) by 189.cn (HERMES) with SMTP id 7D5331002AF; Fri, 1 Apr 2022 11:37:08 +0800 (CST) Received: from ([123.150.8.42]) by gateway-153622-dep-749df8664c-mvcg4 with ESMTP id a969fd7db226468788809b02151552bc for yhs@fb.com; Fri, 01 Apr 2022 11:37:09 CST X-Transaction-ID: a969fd7db226468788809b02151552bc X-Real-From: chensong_2000@189.cn X-Receive-IP: 123.150.8.42 X-MEDUSA-Status: 0 Sender: chensong_2000@189.cn Message-ID: <306ab457-9f3d-4d90-bb31-e6fb08b6a5ad@189.cn> Date: Fri, 1 Apr 2022 11:37:07 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.7.0 Subject: Re: [PATCH] sample: bpf: syscall_tp_user: print result of verify_map Content-Language: en-US To: Yonghong Song , ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, kafai@fb.com, songliubraving@fb.com, john.fastabend@gmail.com, kpsingh@kernel.org, netdev@vger.kernel.org, bpf@vger.kernel.org, linux-kernel@vger.kernel.org References: <1648777272-21473-1-git-send-email-chensong_2000@189.cn> <882349c0-123d-3deb-88e8-d400ec702d1f@fb.com> From: Song Chen In-Reply-To: <882349c0-123d-3deb-88e8-d400ec702d1f@fb.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.7 required=5.0 tests=BAYES_00, FREEMAIL_ENVFROM_END_DIGIT,FREEMAIL_FROM,NICE_REPLY_A,SPF_HELO_PASS, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 在 2022/4/1 11:01, Yonghong Song 写道: > > > On 3/31/22 6:41 PM, Song Chen wrote: >> syscall_tp only prints the map id and messages when something goes wrong, >> but it doesn't print the value passed from bpf map. I think it's better >> to show that value to users. >> >> What's more, i also added a 2-second sleep before calling verify_map, >> to make the value more obvious. >> >> Signed-off-by: Song Chen >> --- >>   samples/bpf/syscall_tp_user.c | 4 ++++ >>   1 file changed, 4 insertions(+) >> >> diff --git a/samples/bpf/syscall_tp_user.c >> b/samples/bpf/syscall_tp_user.c >> index a0ebf1833ed3..1faa7f08054e 100644 >> --- a/samples/bpf/syscall_tp_user.c >> +++ b/samples/bpf/syscall_tp_user.c >> @@ -36,6 +36,9 @@ static void verify_map(int map_id) >>           fprintf(stderr, "failed: map #%d returns value 0\n", map_id); >>           return; >>       } >> + >> +    printf("verify map:%d val: %d\n", map_id, val); > > I am not sure how useful it is or anybody really cares. > This is just a sample to demonstrate how bpf tracepoint works. > The error path has error print out already. > >> + >>       val = 0; >>       if (bpf_map_update_elem(map_id, &key, &val, BPF_ANY) != 0) { >>           fprintf(stderr, "map_update failed: %s\n", strerror(errno)); >> @@ -98,6 +101,7 @@ static int test(char *filename, int num_progs) >>       } >>       close(fd); >> +    sleep(2); > > The commit message mentioned this sleep(2) is > to make the value more obvious. I don't know what does this mean. > sleep(2) can be added only if it fixed a bug. The value in bpf map means how many times trace_enter_open_at are triggered with tracepoint,sys_enter_openat. Sleep(2) is to enlarge the result, tell the user how many files are opened in the last 2 seconds. It shows like this: sudo ./samples/bpf/syscall_tp prog #0: map ids 4 5 verify map:4 val: 253 verify map:5 val: 252 If we work harder, we can also print those files' name and opened by which process. It's just an improvement instead of a bug fix, i will drop it if reviewers think it's unnecessary. Thanks. BR chensong > >>       /* verify the map */ >>       for (i = 0; i < num_progs; i++) { >>           verify_map(map0_fds[i]); >