Loading...
1.. SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
2
3================
4bpftool-map
5================
6-------------------------------------------------------------------------------
7tool for inspection and simple manipulation of eBPF maps
8-------------------------------------------------------------------------------
9
10:Manual section: 8
11
12.. include:: substitutions.rst
13
14SYNOPSIS
15========
16
17**bpftool** [*OPTIONS*] **map** *COMMAND*
18
19*OPTIONS* := { |COMMON_OPTIONS| | { **-f** | **--bpffs** } | { **-n** | **--nomount** } }
20
21*COMMANDS* :=
22{ **show** | **list** | **create** | **dump** | **update** | **lookup** | **getnext** |
23**delete** | **pin** | **help** }
24
25MAP COMMANDS
26=============
27
28| **bpftool** **map** { **show** | **list** } [*MAP*]
29| **bpftool** **map create** *FILE* **type** *TYPE* **key** *KEY_SIZE* **value** *VALUE_SIZE* \
30| **entries** *MAX_ENTRIES* **name** *NAME* [**flags** *FLAGS*] [**inner_map** *MAP*] \
31| [**offload_dev** *NAME*]
32| **bpftool** **map dump** *MAP*
33| **bpftool** **map update** *MAP* [**key** *DATA*] [**value** *VALUE*] [*UPDATE_FLAGS*]
34| **bpftool** **map lookup** *MAP* [**key** *DATA*]
35| **bpftool** **map getnext** *MAP* [**key** *DATA*]
36| **bpftool** **map delete** *MAP* **key** *DATA*
37| **bpftool** **map pin** *MAP* *FILE*
38| **bpftool** **map event_pipe** *MAP* [**cpu** *N* **index** *M*]
39| **bpftool** **map peek** *MAP*
40| **bpftool** **map push** *MAP* **value** *VALUE*
41| **bpftool** **map pop** *MAP*
42| **bpftool** **map enqueue** *MAP* **value** *VALUE*
43| **bpftool** **map dequeue** *MAP*
44| **bpftool** **map freeze** *MAP*
45| **bpftool** **map help**
46|
47| *MAP* := { **id** *MAP_ID* | **pinned** *FILE* | **name** *MAP_NAME* }
48| *DATA* := { [**hex**] *BYTES* }
49| *PROG* := { **id** *PROG_ID* | **pinned** *FILE* | **tag** *PROG_TAG* | **name** *PROG_NAME* }
50| *VALUE* := { *DATA* | *MAP* | *PROG* }
51| *UPDATE_FLAGS* := { **any** | **exist** | **noexist** }
52| *TYPE* := { **hash** | **array** | **prog_array** | **perf_event_array** | **percpu_hash**
53| | **percpu_array** | **stack_trace** | **cgroup_array** | **lru_hash**
54| | **lru_percpu_hash** | **lpm_trie** | **array_of_maps** | **hash_of_maps**
55| | **devmap** | **devmap_hash** | **sockmap** | **cpumap** | **xskmap** | **sockhash**
56| | **cgroup_storage** | **reuseport_sockarray** | **percpu_cgroup_storage**
57| | **queue** | **stack** | **sk_storage** | **struct_ops** | **ringbuf** | **inode_storage**
58| | **task_storage** | **bloom_filter** | **user_ringbuf** | **cgrp_storage** | **arena** }
59
60DESCRIPTION
61===========
62bpftool map { show | list } [*MAP*]
63 Show information about loaded maps. If *MAP* is specified show information
64 only about given maps, otherwise list all maps currently loaded on the
65 system. In case of **name**, *MAP* may match several maps which will all
66 be shown.
67
68 Output will start with map ID followed by map type and zero or more named
69 attributes (depending on kernel version).
70
71 Since Linux 5.8 bpftool is able to discover information about processes
72 that hold open file descriptors (FDs) against BPF maps. On such kernels
73 bpftool will automatically emit this information as well.
74
75bpftool map create *FILE* type *TYPE* key *KEY_SIZE* value *VALUE_SIZE* entries *MAX_ENTRIES* name *NAME* [flags *FLAGS*] [inner_map *MAP*] [offload_dev *NAME*]
76 Create a new map with given parameters and pin it to *bpffs* as *FILE*.
77
78 *FLAGS* should be an integer which is the combination of desired flags,
79 e.g. 1024 for **BPF_F_MMAPABLE** (see bpf.h UAPI header for existing
80 flags).
81
82 To create maps of type array-of-maps or hash-of-maps, the **inner_map**
83 keyword must be used to pass an inner map. The kernel needs it to collect
84 metadata related to the inner maps that the new map will work with.
85
86 Keyword **offload_dev** expects a network interface name, and is used to
87 request hardware offload for the map.
88
89bpftool map dump *MAP*
90 Dump all entries in a given *MAP*. In case of **name**, *MAP* may match
91 several maps which will all be dumped.
92
93bpftool map update *MAP* [key *DATA*] [value *VALUE*] [*UPDATE_FLAGS*]
94 Update map entry for a given *KEY*.
95
96 *UPDATE_FLAGS* can be one of: **any** update existing entry or add if
97 doesn't exit; **exist** update only if entry already exists; **noexist**
98 update only if entry doesn't exist.
99
100 If the **hex** keyword is provided in front of the bytes sequence, the
101 bytes are parsed as hexadecimal values, even if no "0x" prefix is added. If
102 the keyword is not provided, then the bytes are parsed as decimal values,
103 unless a "0x" prefix (for hexadecimal) or a "0" prefix (for octal) is
104 provided.
105
106bpftool map lookup *MAP* [key *DATA*]
107 Lookup **key** in the map.
108
109bpftool map getnext *MAP* [key *DATA*]
110 Get next key. If *key* is not specified, get first key.
111
112bpftool map delete *MAP* key *DATA*
113 Remove entry from the map.
114
115bpftool map pin *MAP* *FILE*
116 Pin map *MAP* as *FILE*.
117
118 Note: *FILE* must be located in *bpffs* mount. It must not contain a dot
119 character ('.'), which is reserved for future extensions of *bpffs*.
120
121bpftool map event_pipe *MAP* [cpu *N* index *M*]
122 Read events from a **BPF_MAP_TYPE_PERF_EVENT_ARRAY** map.
123
124 Install perf rings into a perf event array map and dump output of any
125 **bpf_perf_event_output**\ () call in the kernel. By default read the
126 number of CPUs on the system and install perf ring for each CPU in the
127 corresponding index in the array.
128
129 If **cpu** and **index** are specified, install perf ring for given **cpu**
130 at **index** in the array (single ring).
131
132 Note that installing a perf ring into an array will silently replace any
133 existing ring. Any other application will stop receiving events if it
134 installed its rings earlier.
135
136bpftool map peek *MAP*
137 Peek next value in the queue or stack.
138
139bpftool map push *MAP* value *VALUE*
140 Push *VALUE* onto the stack.
141
142bpftool map pop *MAP*
143 Pop and print value from the stack.
144
145bpftool map enqueue *MAP* value *VALUE*
146 Enqueue *VALUE* into the queue.
147
148bpftool map dequeue *MAP*
149 Dequeue and print value from the queue.
150
151bpftool map freeze *MAP*
152 Freeze the map as read-only from user space. Entries from a frozen map can
153 not longer be updated or deleted with the **bpf**\ () system call. This
154 operation is not reversible, and the map remains immutable from user space
155 until its destruction. However, read and write permissions for BPF programs
156 to the map remain unchanged.
157
158bpftool map help
159 Print short help message.
160
161OPTIONS
162=======
163.. include:: common_options.rst
164
165-f, --bpffs
166 Show file names of pinned maps.
167
168-n, --nomount
169 Do not automatically attempt to mount any virtual file system (such as
170 tracefs or BPF virtual file system) when necessary.
171
172EXAMPLES
173========
174**# bpftool map show**
175
176::
177
178 10: hash name some_map flags 0x0
179 key 4B value 8B max_entries 2048 memlock 167936B
180 pids systemd(1)
181
182The following three commands are equivalent:
183
184|
185| **# bpftool map update id 10 key hex 20 c4 b7 00 value hex 0f ff ff ab 01 02 03 4c**
186| **# bpftool map update id 10 key 0x20 0xc4 0xb7 0x00 value 0x0f 0xff 0xff 0xab 0x01 0x02 0x03 0x4c**
187| **# bpftool map update id 10 key 32 196 183 0 value 15 255 255 171 1 2 3 76**
188
189**# bpftool map lookup id 10 key 0 1 2 3**
190
191::
192
193 key: 00 01 02 03 value: 00 01 02 03 04 05 06 07
194
195
196**# bpftool map dump id 10**
197
198::
199
200 key: 00 01 02 03 value: 00 01 02 03 04 05 06 07
201 key: 0d 00 07 00 value: 02 00 00 00 01 02 03 04
202 Found 2 elements
203
204**# bpftool map getnext id 10 key 0 1 2 3**
205
206::
207
208 key:
209 00 01 02 03
210 next key:
211 0d 00 07 00
212
213|
214| **# mount -t bpf none /sys/fs/bpf/**
215| **# bpftool map pin id 10 /sys/fs/bpf/map**
216| **# bpftool map del pinned /sys/fs/bpf/map key 13 00 07 00**
217
218Note that map update can also be used in order to change the program references
219hold by a program array map. This can be used, for example, to change the
220programs used for tail-call jumps at runtime, without having to reload the
221entry-point program. Below is an example for this use case: we load a program
222defining a prog array map, and with a main function that contains a tail call
223to other programs that can be used either to "process" packets or to "debug"
224processing. Note that the prog array map MUST be pinned into the BPF virtual
225file system for the map update to work successfully, as kernel flushes prog
226array maps when they have no more references from user space (and the update
227would be lost as soon as bpftool exits).
228
229|
230| **# bpftool prog loadall tail_calls.o /sys/fs/bpf/foo type xdp**
231| **# bpftool prog --bpffs**
232
233::
234
235 545: xdp name main_func tag 674b4b5597193dc3 gpl
236 loaded_at 2018-12-12T15:02:58+0000 uid 0
237 xlated 240B jited 257B memlock 4096B map_ids 294
238 pinned /sys/fs/bpf/foo/xdp
239 546: xdp name bpf_func_process tag e369a529024751fc gpl
240 loaded_at 2018-12-12T15:02:58+0000 uid 0
241 xlated 200B jited 164B memlock 4096B
242 pinned /sys/fs/bpf/foo/process
243 547: xdp name bpf_func_debug tag 0b597868bc7f0976 gpl
244 loaded_at 2018-12-12T15:02:58+0000 uid 0
245 xlated 200B jited 164B memlock 4096B
246 pinned /sys/fs/bpf/foo/debug
247
248**# bpftool map**
249
250::
251
252 294: prog_array name jmp_table flags 0x0
253 key 4B value 4B max_entries 1 memlock 4096B
254 owner_prog_type xdp owner jited
255
256|
257| **# bpftool map pin id 294 /sys/fs/bpf/bar**
258| **# bpftool map dump pinned /sys/fs/bpf/bar**
259
260::
261
262 Found 0 elements
263
264|
265| **# bpftool map update pinned /sys/fs/bpf/bar key 0 0 0 0 value pinned /sys/fs/bpf/foo/debug**
266| **# bpftool map dump pinned /sys/fs/bpf/bar**
267
268::
269
270 key: 00 00 00 00 value: 22 02 00 00
271 Found 1 element
1================
2bpftool-map
3================
4-------------------------------------------------------------------------------
5tool for inspection and simple manipulation of eBPF maps
6-------------------------------------------------------------------------------
7
8:Manual section: 8
9
10SYNOPSIS
11========
12
13 **bpftool** [*OPTIONS*] **map** *COMMAND*
14
15 *OPTIONS* := { { **-j** | **--json** } [{ **-p** | **--pretty** }] | { **-f** | **--bpffs** } }
16
17 *COMMANDS* :=
18 { **show** | **list** | **create** | **dump** | **update** | **lookup** | **getnext**
19 | **delete** | **pin** | **help** }
20
21MAP COMMANDS
22=============
23
24| **bpftool** **map { show | list }** [*MAP*]
25| **bpftool** **map create** *FILE* **type** *TYPE* **key** *KEY_SIZE* **value** *VALUE_SIZE* \
26| **entries** *MAX_ENTRIES* **name** *NAME* [**flags** *FLAGS*] [**dev** *NAME*]
27| **bpftool** **map dump** *MAP*
28| **bpftool** **map update** *MAP* [**key** *DATA*] [**value** *VALUE*] [*UPDATE_FLAGS*]
29| **bpftool** **map lookup** *MAP* [**key** *DATA*]
30| **bpftool** **map getnext** *MAP* [**key** *DATA*]
31| **bpftool** **map delete** *MAP* **key** *DATA*
32| **bpftool** **map pin** *MAP* *FILE*
33| **bpftool** **map event_pipe** *MAP* [**cpu** *N* **index** *M*]
34| **bpftool** **map peek** *MAP*
35| **bpftool** **map push** *MAP* **value** *VALUE*
36| **bpftool** **map pop** *MAP*
37| **bpftool** **map enqueue** *MAP* **value** *VALUE*
38| **bpftool** **map dequeue** *MAP*
39| **bpftool** **map freeze** *MAP*
40| **bpftool** **map help**
41|
42| *MAP* := { **id** *MAP_ID* | **pinned** *FILE* }
43| *DATA* := { [**hex**] *BYTES* }
44| *PROG* := { **id** *PROG_ID* | **pinned** *FILE* | **tag** *PROG_TAG* }
45| *VALUE* := { *DATA* | *MAP* | *PROG* }
46| *UPDATE_FLAGS* := { **any** | **exist** | **noexist** }
47| *TYPE* := { **hash** | **array** | **prog_array** | **perf_event_array** | **percpu_hash**
48| | **percpu_array** | **stack_trace** | **cgroup_array** | **lru_hash**
49| | **lru_percpu_hash** | **lpm_trie** | **array_of_maps** | **hash_of_maps**
50| | **devmap** | **devmap_hash** | **sockmap** | **cpumap** | **xskmap** | **sockhash**
51| | **cgroup_storage** | **reuseport_sockarray** | **percpu_cgroup_storage**
52| | **queue** | **stack** }
53
54DESCRIPTION
55===========
56 **bpftool map { show | list }** [*MAP*]
57 Show information about loaded maps. If *MAP* is specified
58 show information only about given map, otherwise list all
59 maps currently loaded on the system.
60
61 Output will start with map ID followed by map type and
62 zero or more named attributes (depending on kernel version).
63
64 **bpftool map create** *FILE* **type** *TYPE* **key** *KEY_SIZE* **value** *VALUE_SIZE* **entries** *MAX_ENTRIES* **name** *NAME* [**flags** *FLAGS*] [**dev** *NAME*]
65 Create a new map with given parameters and pin it to *bpffs*
66 as *FILE*.
67
68 **bpftool map dump** *MAP*
69 Dump all entries in a given *MAP*.
70
71 **bpftool map update** *MAP* [**key** *DATA*] [**value** *VALUE*] [*UPDATE_FLAGS*]
72 Update map entry for a given *KEY*.
73
74 *UPDATE_FLAGS* can be one of: **any** update existing entry
75 or add if doesn't exit; **exist** update only if entry already
76 exists; **noexist** update only if entry doesn't exist.
77
78 If the **hex** keyword is provided in front of the bytes
79 sequence, the bytes are parsed as hexadeximal values, even if
80 no "0x" prefix is added. If the keyword is not provided, then
81 the bytes are parsed as decimal values, unless a "0x" prefix
82 (for hexadecimal) or a "0" prefix (for octal) is provided.
83
84 **bpftool map lookup** *MAP* [**key** *DATA*]
85 Lookup **key** in the map.
86
87 **bpftool map getnext** *MAP* [**key** *DATA*]
88 Get next key. If *key* is not specified, get first key.
89
90 **bpftool map delete** *MAP* **key** *DATA*
91 Remove entry from the map.
92
93 **bpftool map pin** *MAP* *FILE*
94 Pin map *MAP* as *FILE*.
95
96 Note: *FILE* must be located in *bpffs* mount. It must not
97 contain a dot character ('.'), which is reserved for future
98 extensions of *bpffs*.
99
100 **bpftool** **map event_pipe** *MAP* [**cpu** *N* **index** *M*]
101 Read events from a BPF_MAP_TYPE_PERF_EVENT_ARRAY map.
102
103 Install perf rings into a perf event array map and dump
104 output of any bpf_perf_event_output() call in the kernel.
105 By default read the number of CPUs on the system and
106 install perf ring for each CPU in the corresponding index
107 in the array.
108
109 If **cpu** and **index** are specified, install perf ring
110 for given **cpu** at **index** in the array (single ring).
111
112 Note that installing a perf ring into an array will silently
113 replace any existing ring. Any other application will stop
114 receiving events if it installed its rings earlier.
115
116 **bpftool map peek** *MAP*
117 Peek next **value** in the queue or stack.
118
119 **bpftool map push** *MAP* **value** *VALUE*
120 Push **value** onto the stack.
121
122 **bpftool map pop** *MAP*
123 Pop and print **value** from the stack.
124
125 **bpftool map enqueue** *MAP* **value** *VALUE*
126 Enqueue **value** into the queue.
127
128 **bpftool map dequeue** *MAP*
129 Dequeue and print **value** from the queue.
130
131 **bpftool map freeze** *MAP*
132 Freeze the map as read-only from user space. Entries from a
133 frozen map can not longer be updated or deleted with the
134 **bpf\ ()** system call. This operation is not reversible,
135 and the map remains immutable from user space until its
136 destruction. However, read and write permissions for BPF
137 programs to the map remain unchanged.
138
139 **bpftool map help**
140 Print short help message.
141
142OPTIONS
143=======
144 -h, --help
145 Print short generic help message (similar to **bpftool help**).
146
147 -V, --version
148 Print version number (similar to **bpftool version**).
149
150 -j, --json
151 Generate JSON output. For commands that cannot produce JSON, this
152 option has no effect.
153
154 -p, --pretty
155 Generate human-readable JSON output. Implies **-j**.
156
157 -f, --bpffs
158 Show file names of pinned maps.
159
160 -n, --nomount
161 Do not automatically attempt to mount any virtual file system
162 (such as tracefs or BPF virtual file system) when necessary.
163
164 -d, --debug
165 Print all logs available from libbpf, including debug-level
166 information.
167
168EXAMPLES
169========
170**# bpftool map show**
171::
172
173 10: hash name some_map flags 0x0
174 key 4B value 8B max_entries 2048 memlock 167936B
175
176The following three commands are equivalent:
177
178|
179| **# bpftool map update id 10 key hex 20 c4 b7 00 value hex 0f ff ff ab 01 02 03 4c**
180| **# bpftool map update id 10 key 0x20 0xc4 0xb7 0x00 value 0x0f 0xff 0xff 0xab 0x01 0x02 0x03 0x4c**
181| **# bpftool map update id 10 key 32 196 183 0 value 15 255 255 171 1 2 3 76**
182
183**# bpftool map lookup id 10 key 0 1 2 3**
184
185::
186
187 key: 00 01 02 03 value: 00 01 02 03 04 05 06 07
188
189
190**# bpftool map dump id 10**
191::
192
193 key: 00 01 02 03 value: 00 01 02 03 04 05 06 07
194 key: 0d 00 07 00 value: 02 00 00 00 01 02 03 04
195 Found 2 elements
196
197**# bpftool map getnext id 10 key 0 1 2 3**
198::
199
200 key:
201 00 01 02 03
202 next key:
203 0d 00 07 00
204
205|
206| **# mount -t bpf none /sys/fs/bpf/**
207| **# bpftool map pin id 10 /sys/fs/bpf/map**
208| **# bpftool map del pinned /sys/fs/bpf/map key 13 00 07 00**
209
210Note that map update can also be used in order to change the program references
211hold by a program array map. This can be used, for example, to change the
212programs used for tail-call jumps at runtime, without having to reload the
213entry-point program. Below is an example for this use case: we load a program
214defining a prog array map, and with a main function that contains a tail call
215to other programs that can be used either to "process" packets or to "debug"
216processing. Note that the prog array map MUST be pinned into the BPF virtual
217file system for the map update to work successfully, as kernel flushes prog
218array maps when they have no more references from user space (and the update
219would be lost as soon as bpftool exits).
220
221|
222| **# bpftool prog loadall tail_calls.o /sys/fs/bpf/foo type xdp**
223| **# bpftool prog --bpffs**
224
225::
226
227 545: xdp name main_func tag 674b4b5597193dc3 gpl
228 loaded_at 2018-12-12T15:02:58+0000 uid 0
229 xlated 240B jited 257B memlock 4096B map_ids 294
230 pinned /sys/fs/bpf/foo/xdp
231 546: xdp name bpf_func_process tag e369a529024751fc gpl
232 loaded_at 2018-12-12T15:02:58+0000 uid 0
233 xlated 200B jited 164B memlock 4096B
234 pinned /sys/fs/bpf/foo/process
235 547: xdp name bpf_func_debug tag 0b597868bc7f0976 gpl
236 loaded_at 2018-12-12T15:02:58+0000 uid 0
237 xlated 200B jited 164B memlock 4096B
238 pinned /sys/fs/bpf/foo/debug
239
240**# bpftool map**
241
242::
243
244 294: prog_array name jmp_table flags 0x0
245 key 4B value 4B max_entries 1 memlock 4096B
246 owner_prog_type xdp owner jited
247
248|
249| **# bpftool map pin id 294 /sys/fs/bpf/bar**
250| **# bpftool map dump pinned /sys/fs/bpf/bar**
251
252::
253
254 Found 0 elements
255
256|
257| **# bpftool map update pinned /sys/fs/bpf/bar key 0 0 0 0 value pinned /sys/fs/bpf/foo/debug**
258| **# bpftool map dump pinned /sys/fs/bpf/bar**
259
260::
261
262 key: 00 00 00 00 value: 22 02 00 00
263 Found 1 element
264
265SEE ALSO
266========
267 **bpf**\ (2),
268 **bpf-helpers**\ (7),
269 **bpftool**\ (8),
270 **bpftool-prog**\ (8),
271 **bpftool-cgroup**\ (8),
272 **bpftool-feature**\ (8),
273 **bpftool-net**\ (8),
274 **bpftool-perf**\ (8),
275 **bpftool-btf**\ (8)