Server IP : 192.64.112.168 / Your IP : 18.188.106.47 Web Server : Apache System : Linux nc-ph-2300-85.bluforrest.com 4.18.0-513.9.1.el8_9.x86_64 #1 SMP Sat Dec 2 05:23:44 EST 2023 x86_64 User : expressoneac ( 1128) PHP Version : 8.0.30 Disable Function : exec,passthru,shell_exec,system MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /lib/python3.6/site-packages/sos/report/plugins/ |
Upload File : |
# This file is part of the sos project: https://github.com/sosreport/sos # # This copyrighted material is made available to anyone wishing to use, # modify, copy, or redistribute it subject to the terms and conditions of # version 2 of the GNU General Public License. # # See the LICENSE file in the source distribution for further information. import json from sos.report.plugins import Plugin, IndependentPlugin, PluginOpt class Ebpf(Plugin, IndependentPlugin): short_desc = 'eBPF tool' plugin_name = 'ebpf' profiles = ('system', 'kernel', 'network') commands = ('bpftool',) option_list = [ PluginOpt("namespaces", default=None, val_type=int, desc="Number of namespaces to collect, 0 for unlimited"), ] def get_bpftool_prog_ids(self, prog_json): """ Collect the list of program IDs """ out = [] try: prog_data = json.loads(prog_json) except Exception as err: # pylint: disable=broad-except self._log_info(f"Couldn't parse bpftool prog list: {err}") return out for _, item in enumerate(prog_data): if "id" in item: out.append(item["id"]) return out def get_bpftool_map_ids(self, map_json): """ Collect the list of mapIDs """ out = [] try: map_data = json.loads(map_json) except Exception as err: # pylint: disable=broad-except self._log_info(f"Could not parse bpftool map list: {err}") return out for _, item in enumerate(map_data): if "id" in item: out.append(item["id"]) return out def setup(self): # collect list of eBPF programs and maps and their dumps progs = self.collect_cmd_output("bpftool -j prog list") for prog_id in self.get_bpftool_prog_ids(progs['output']): for dumpcmd in ["xlated", "jited"]: self.add_cmd_output(f"bpftool prog dump {dumpcmd} id " f"{prog_id}") maps = self.collect_cmd_output("bpftool -j map list") for map_id in self.get_bpftool_map_ids(maps['output']): self.add_cmd_output(f"bpftool map dump id {map_id}") self.add_cmd_output([ # collect list of eBPF programs and maps and their dumps # in human readable form "bpftool prog list", "bpftool map list", # Iterate over all cgroups and list all attached programs "bpftool cgroup tree", # collect list of bpf program attachments in the kernel # networking subsystem "bpftool net list", # collect all struct_ops currently existing in the system "bpftool struct_ops dump" ]) # Capture list of bpf program attachments from namespaces cmd_prefix = "ip netns exec " nsps = self.get_option('namespaces') for namespace in self.get_network_namespaces(ns_max=nsps): ns_cmd_prefix = cmd_prefix + namespace + " " self.add_cmd_output(ns_cmd_prefix + "bpftool net list") # vim: set et ts=4 sw=4 :