On Sun, Mar 29, 2026 at 09:43:38PM +0900, Hoyeon Lee wrote:
> bpf_program__attach_kprobe_opts() currently attaches a single kprobe only
> by func_name, with an optional offset. This covers only the symbol-
> based form, not the raw-address form that the kernel already supports
> for both kprobe PMU events and legacy tracefs/debugfs kprobes. Callers
> that already have a target IP still have to drop down to
> perf_event_open() or direct tracefs writes.
> 
> libbpf already exposes address-based attach for kprobe_multi through
> bpf_kprobe_multi_opts.addrs. This commit adds bpf_kprobe_opts.addr so
> that single kprobes can be attached either by func_name + offset or by
> raw address.

curious, is this change just for the api to be complete or you do have
a usecase where you can't use kprobe_multi and need to attach kprobe
by address?

SNIP

>  static void gen_probe_legacy_event_name(char *buf, size_t buf_sz,
> -                                     const char *name, size_t offset)
> +                                     const char *name,
> +                                     uint64_t offset_or_addr)
>  {
>       static int index = 0;
>       int i;
>  
> -     snprintf(buf, buf_sz, "libbpf_%u_%d_%s_0x%zx", getpid(),
> -              __sync_fetch_and_add(&index, 1), name, offset);
> +     snprintf(buf, buf_sz, "libbpf_%u_%d_%s_0x%" PRIx64, getpid(),
> +              __sync_fetch_and_add(&index, 1), name ?: "addr",
> +              offset_or_addr);
>  
>       /* sanitize name in the probe name */
>       for (i = 0; buf[i]; i++) {
> @@ -11648,13 +11651,28 @@ static void gen_probe_legacy_event_name(char *buf, 
> size_t buf_sz,
>       }
>  }
>  
> +static void gen_kprobe_target(char *buf, size_t buf_sz, const char *name,
> +                           uint64_t offset_or_addr)
> +{
> +     if (name)
> +             snprintf(buf, buf_sz, "%s+0x%" PRIx64, name, offset_or_addr);
> +     else
> +             snprintf(buf, buf_sz, "0x%" PRIx64, offset_or_addr);
> +}
> +
>  static int add_kprobe_event_legacy(const char *probe_name, bool retprobe,
> -                                const char *kfunc_name, size_t offset)
> +                                const char *kfunc_name,
> +                                uint64_t offset_or_addr)
>  {
> -     return append_to_file(tracefs_kprobe_events(), "%c:%s/%s %s+0x%zx",
> +     char probe_target[128];
> +
> +     gen_kprobe_target(probe_target, sizeof(probe_target), kfunc_name,
> +                       offset_or_addr);
> +

it seems like it'd be easier to get probe_target (via gen_kprobe_target)
in bpf_program__attach_kprobe_opts and pass it down instead of generating
it over and over again

> +     return append_to_file(tracefs_kprobe_events(), "%c:%s/%s %s",
>                             retprobe ? 'r' : 'p',
>                             retprobe ? "kretprobes" : "kprobes",
> -                           probe_name, kfunc_name, offset);
> +                           probe_name, probe_target);
>  }
>  
>  static int remove_kprobe_event_legacy(const char *probe_name, bool retprobe)
> @@ -11674,25 +11692,29 @@ static int determine_kprobe_perf_type_legacy(const 
> char *probe_name, bool retpro
>  }
>  
>  static int perf_event_kprobe_open_legacy(const char *probe_name, bool 
> retprobe,
> -                                      const char *kfunc_name, size_t offset, 
> int pid)
> +                                      const char *kfunc_name,
> +                                      uint64_t offset_or_addr, int pid)
>  {
>       const size_t attr_sz = sizeof(struct perf_event_attr);
>       struct perf_event_attr attr;
>       int type, pfd, err;
> +     char probe_target[128];

we need bigger buffer as explained by sashiko [1]

[1] https://sashiko.dev/#/patchset/20260329124429.689912-1-hoyeon.lee%40suse.com

jirka

>  
> -     err = add_kprobe_event_legacy(probe_name, retprobe, kfunc_name, offset);
> +     gen_kprobe_target(probe_target, sizeof(probe_target), kfunc_name,
> +                       offset_or_addr);
> +
> +     err = add_kprobe_event_legacy(probe_name, retprobe, kfunc_name,
> +                                   offset_or_addr);
>       if (err < 0) {
> -             pr_warn("failed to add legacy kprobe event for '%s+0x%zx': 
> %s\n",
> -                     kfunc_name, offset,
> -                     errstr(err));
> +             pr_warn("failed to add legacy kprobe event for '%s': %s\n",
> +                     probe_target, errstr(err));
>               return err;
>       }
>       type = determine_kprobe_perf_type_legacy(probe_name, retprobe);
>       if (type < 0) {
>               err = type;
> -             pr_warn("failed to determine legacy kprobe event id for 
> '%s+0x%zx': %s\n",
> -                     kfunc_name, offset,
> -                     errstr(err));
> +             pr_warn("failed to determine legacy kprobe event id for '%s': 
> %s\n",
> +                     probe_target, errstr(err));
>               goto err_clean_legacy;
>       }
>  

SNIP

Reply via email to