Ktap — yet another kernel tracer
Ktap appears to be strongly oriented toward the needs of embedded users; that has affected a number of the design decisions that have been made. At the top of the list was the decision to embed a byte-code interpreter into the kernel and compile tracing scripts for that interpreter. That is a big difference from SystemTap, which, in its current implementation, compiles a tracing script into a separate module that must be loaded into the kernel. This difference matters because an embedded target often will not have a full compiler toolchain installed on it; even if the tools are available, compiling and linking a module can be a slow process. Compiling a ktap script, instead, requires a simple utility to produce byte code for the ktap kernel module.
That compiler implements a language that is based on Lua. It is C-like, but it is dynamically typed, has a dictionary-like "table" type, and lacks arrays and pointers. There is a simple function definition mechanism which can be used like this:
function eventfun (e) { printf("%d %d\t%s\t%s", cpu(), pid(), execname(), e.tostring()) }
The resulting function will, when called, output the current CPU number, process ID, executing program name, and the string representation of the passed-in event e. There is a probe-placement function, so ktap could arrange to call the above function on system call entry with:
kdebug.probe("tp:syscalls", eventfun)
A quick run on your editor's system produced a bunch of output like:
3 2745 Xorg sys_setitimer(which: 0, value: 7fff05967ec0, ovalue: 0) 3 2745 Xorg sys_setitimer -> 0x0 2 27467 as sys_mmap(addr: 0, len: 81000, prot: 3, flags: 22, fd: ffffffff, off: 0) 2 27467 as sys_mmap -> 0x2aaaab67c000 2 3402 gnome-shell sys_mmap(addr: 0, len: 97b, prot: 1, flags: 2, fd: 21, off: 0) 2 3402 gnome-shell sys_mmap -> 0x7f4ec4bfb000
There are various utility functions for generating timer requests, creating histograms, and so on. So, for example, this script:
hist = {} function eventfun (e) { if (e.sc_is_enter) { inplace_inc(hist, e.name) } } kdebug.probe("tp:syscalls", eventfun) kdebug.probe_end(function () { histogram(hist) })
is sufficient to generate a histogram of system calls over the period of time from when it starts until when the user interrupts it. Your editor ran it with a kernel build running and got output looking like this:
value ------------- Distribution ------------- count sys_enter_open |@@@@@@@@ 587779 sys_enter_close |@@@@ 343728 sys_enter_newfstat |@@@@ 331459 sys_enter_read |@@@ 283217 sys_enter_mmap |@@@ 243458 sys_enter_ioctl |@@ 219364 sys_enter_munmap |@@ 165006 sys_enter_write |@ 128003 sys_enter_poll |@ 77311 sys_enter_recvfrom | 52898
The syntax for setting probe points closely matches that used by perf; probes can be set on specific functions or tracepoints, for example. It is possible to hook into the perf events mechanism to get other types of hardware or software events, and memory breakpoints are supported. The (sparse) documentation packaged with the code also suggests that ktap is able to set user-space probes, but none of the example scripts packaged with the tool demonstrate that capability.
Ktap scripts can manipulate the return value of probed functions within the kernel. There does not currently appear to be a way to manipulate kernel-space data directly, but that could presumably be added (along with lots of other features) in the future. What's there now is a proof of concept as much as anything; it is a quick way to get some data out of the kernel but does not offer a whole lot that is not available using the existing ftrace interface.
For those who want to play with it, the first step is a simple:
git clone https://github.com/ktap/ktap.git
From there, building the code and running the sample scripts is a matter of a few minutes of relatively painless work. There is the ktapvm module, which must, naturally, be loaded into the kernel. That module creates a special virtual file (ktap/ktapvm under the debugfs root) that is used by the ktap binary to load and run compiled scripts.
Ktap in its current form is limited, without a lot of exciting new
functionality. Even so, it seems to have generated a certain amount of
interest in the development community. Getting started with most tracing
tools usually seems to involve a fair amount of up-front learning; ktap,
perhaps, is a more approachable solution for a number of users. The whole
thing is about 10,000 lines of code; it shouldn't be hard for others to run
with and extend. If developers start to take the bait, interesting things
could happen with this project.
Index entries for this article | |
---|---|
Kernel | Development tools/Kernel tracing |
Kernel | Tracing |
Posted May 23, 2013 9:05 UTC (Thu)
by nix (subscriber, #2304)
[Link] (3 responses)
Of course, in a privileged tracer there are lots of other ways to cause trouble inside the kernel, and there is not yet any DTrace port for Linux which implements unprivileged tracing -- but at least unprivileged tracing is implementable there. I don't see how it could be implemented in ktap without a crude timeout or something of that ilk. Nonetheless, ktap looks very interesting and I am cheering from the sidelines, since a bytecode interpreter is much more elegant than the module-compilation approach taken by SystemTap.
(one note: DTrace for Linux is available to everyone, not just paying customers, though you do need to use the UEK2 kernel. The source for the userspace component I work on is not available, though :( )
Posted May 23, 2013 13:31 UTC (Thu)
by corbet (editor, #1)
[Link] (2 responses)
Posted May 27, 2013 20:52 UTC (Mon)
by nix (subscriber, #2304)
[Link] (1 responses)
Posted May 31, 2013 2:46 UTC (Fri)
by bluss (guest, #47454)
[Link]
So if it's like Lua's tables, then you can delete key-value pairs during iteration fine, but you shouldn't add key-value pairs during iteration; if you do, I think iteration is unpredictable.
I think it's a bit misleading that no notice is given in the license header of the files with copies of lua code (even if lua authors are credited elsewhere). It becomes misleading when the file lists 'Author:' without declaring all of them.
https://github.com/ktap/ktap/blob/master/interpreter/table.c
Ktap — yet another kernel tracer
From what I can tell, ktap's loops are limited to bounded integer iteration (a Fortran "DO" loop, essentially) or iterating over a table. So, while the execution time could be unacceptably high, everything should terminate.
Loops
Loops
Loops