mirror of
https://github.com/netdata/libbpf.git
synced 2026-03-28 20:29:07 +08:00
Compare commits
241 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
ab067ed371 | ||
|
|
9b69fbe4d1 | ||
|
|
04d8fc50ab | ||
|
|
ceff1e0363 | ||
|
|
d28acc595f | ||
|
|
9ef191ea7d | ||
|
|
1add860402 | ||
|
|
c658f21738 | ||
|
|
9f519af7f4 | ||
|
|
b7bdc604ef | ||
|
|
354dd9844e | ||
|
|
9b91dce691 | ||
|
|
83535cb2bf | ||
|
|
3f05b513d4 | ||
|
|
0d0d05de08 | ||
|
|
44409068f7 | ||
|
|
16ecc53e73 | ||
|
|
38f66776db | ||
|
|
e9d33df74d | ||
|
|
05b515de7d | ||
|
|
c2bbeaa900 | ||
|
|
799d153f41 | ||
|
|
69ff3960eb | ||
|
|
b91f53ec5f | ||
|
|
dd8f1bdd45 | ||
|
|
3720f31852 | ||
|
|
c51c492a65 | ||
|
|
d3e68e036e | ||
|
|
6ce8910d4d | ||
|
|
79b1d813f9 | ||
|
|
26954e103d | ||
|
|
c8c02fca3a | ||
|
|
0e2f5f9615 | ||
|
|
b539321838 | ||
|
|
0f15f88443 | ||
|
|
bada95a5f3 | ||
|
|
fb929625dc | ||
|
|
1a828b3d58 | ||
|
|
330f4683e2 | ||
|
|
2ef7f5607c | ||
|
|
4da243c179 | ||
|
|
4d8fc6d438 | ||
|
|
6d4abdda08 | ||
|
|
67ab4c0f82 | ||
|
|
df45cf7a3e | ||
|
|
4438972ccc | ||
|
|
09cd9ff2db | ||
|
|
e7d860d2fc | ||
|
|
ff3d2702d8 | ||
|
|
44f9712f79 | ||
|
|
fe4cb796df | ||
|
|
15de8ad80d | ||
|
|
d7a137510a | ||
|
|
91e4f27dd7 | ||
|
|
1339ef70a3 | ||
|
|
c204e3d610 | ||
|
|
32d0a03332 | ||
|
|
05346cfd90 | ||
|
|
a7a32b899c | ||
|
|
68a051f2d2 | ||
|
|
8e80367637 | ||
|
|
9a5adecc62 | ||
|
|
b923d0e3c6 | ||
|
|
f02e248ae1 | ||
|
|
e152510d72 | ||
|
|
59ac1946b0 | ||
|
|
5150a4a0fb | ||
|
|
2a25957df6 | ||
|
|
e441f55089 | ||
|
|
beb9f88080 | ||
|
|
c7b5116f71 | ||
|
|
2b0cd55bf5 | ||
|
|
188276ca5f | ||
|
|
87c4984da8 | ||
|
|
a5611ba6e8 | ||
|
|
c6e01425b6 | ||
|
|
58e3a8fac1 | ||
|
|
1b27702c14 | ||
|
|
39cf9fc90f | ||
|
|
bc4a6e9709 | ||
|
|
4a50ceb043 | ||
|
|
4d86cae4f0 | ||
|
|
33b374395f | ||
|
|
ade4409352 | ||
|
|
2f9abb2a26 | ||
|
|
fca60960ea | ||
|
|
0db22b01a1 | ||
|
|
807b9d7be1 | ||
|
|
a3d02f9ab4 | ||
|
|
54aac21f7e | ||
|
|
d8dd0beb98 | ||
|
|
e94f57a9ab | ||
|
|
bda436be4a | ||
|
|
a30df5c09f | ||
|
|
e776bf7ec7 | ||
|
|
46688687d5 | ||
|
|
19cbbd8f52 | ||
|
|
c87b3a6065 | ||
|
|
4c55ba2b19 | ||
|
|
104006a054 | ||
|
|
bf83a95dee | ||
|
|
732f598282 | ||
|
|
de3c5a17cb | ||
|
|
1a8a75037b | ||
|
|
1a26b51b1c | ||
|
|
2cc0829775 | ||
|
|
92cb475558 | ||
|
|
8b2782a1f2 | ||
|
|
886e8149a0 | ||
|
|
d275397111 | ||
|
|
ede18f80d8 | ||
|
|
07cd489681 | ||
|
|
d2f307c7f6 | ||
|
|
990cef2a0c | ||
|
|
4c2c521513 | ||
|
|
b1e911e9ba | ||
|
|
ae673dc91f | ||
|
|
5a256d12bf | ||
|
|
ae8edc7624 | ||
|
|
8f8b4a14fa | ||
|
|
476e158b07 | ||
|
|
13e1ee420e | ||
|
|
3e2bab6d2c | ||
|
|
9084f4cd4d | ||
|
|
66d20edaf0 | ||
|
|
d8d6772ab8 | ||
|
|
4397d09cd8 | ||
|
|
5771dacd3d | ||
|
|
d34efeeef1 | ||
|
|
db63a5aa5d | ||
|
|
d60f568961 | ||
|
|
e78a36f4b0 | ||
|
|
c8a7eb06bd | ||
|
|
b48c14807b | ||
|
|
a3b4055ec7 | ||
|
|
30603852f4 | ||
|
|
1a28fa5dac | ||
|
|
def5576b37 | ||
|
|
3e45a16621 | ||
|
|
2c0e53cb08 | ||
|
|
6227c6f8dd | ||
|
|
00ad180d07 | ||
|
|
715a58d593 | ||
|
|
11052fc1be | ||
|
|
97ecda3b25 | ||
|
|
342bcfa319 | ||
|
|
c020432531 | ||
|
|
99ce275b52 | ||
|
|
c0a5f7ee11 | ||
|
|
0da9ba439f | ||
|
|
c4735d9e05 | ||
|
|
563f1d3fff | ||
|
|
c5d4295fc5 | ||
|
|
b606dc725e | ||
|
|
f615047aa0 | ||
|
|
84a508a51f | ||
|
|
c59016e100 | ||
|
|
509ef92905 | ||
|
|
2c9394f2a3 | ||
|
|
0f4d83f3ab | ||
|
|
6a7b28b6a1 | ||
|
|
d76d264ac0 | ||
|
|
63a3bdf23a | ||
|
|
12fa15e89a | ||
|
|
b987dcfecb | ||
|
|
9c1ab4d070 | ||
|
|
550aa56dd4 | ||
|
|
54facd3fce | ||
|
|
1346b5b538 | ||
|
|
78d3666065 | ||
|
|
ce2eb85588 | ||
|
|
6d4104b077 | ||
|
|
43c14e871c | ||
|
|
e61f4b8269 | ||
|
|
80a0eca14b | ||
|
|
5a8c675d0a | ||
|
|
45ad862601 | ||
|
|
5e4da17d43 | ||
|
|
2d8ab5cf2c | ||
|
|
fe1ce6bd74 | ||
|
|
9007494e6c | ||
|
|
8b82b9c82b | ||
|
|
9a361d2fdd | ||
|
|
01272d3040 | ||
|
|
0a216f37f8 | ||
|
|
04f987a89a | ||
|
|
86171433b7 | ||
|
|
3e8f8914cb | ||
|
|
960ec9ace6 | ||
|
|
0cc3d9d332 | ||
|
|
50a63f31b6 | ||
|
|
32a605a9a6 | ||
|
|
5efb454851 | ||
|
|
e0ee1593fd | ||
|
|
421ecf02c8 | ||
|
|
38b91c640f | ||
|
|
f925686015 | ||
|
|
be0f832d40 | ||
|
|
f29b6fd1da | ||
|
|
1ed7b6ade1 | ||
|
|
ec13b30349 | ||
|
|
e64e62d19f | ||
|
|
115c0e02cb | ||
|
|
67057c6b7d | ||
|
|
bdf65f9fea | ||
|
|
0559e41969 | ||
|
|
abc096b71d | ||
|
|
7586f784e6 | ||
|
|
76ff616fcd | ||
|
|
04a05786c3 | ||
|
|
ddba4024c0 | ||
|
|
52ec16bce8 | ||
|
|
a4e4dbc35a | ||
|
|
21742bc952 | ||
|
|
39de671179 | ||
|
|
49967c1f5a | ||
|
|
4f260bccf5 | ||
|
|
80aeaa33e7 | ||
|
|
fcbc2604c8 | ||
|
|
896c231d8c | ||
|
|
e13049a667 | ||
|
|
8e01ffc179 | ||
|
|
c7b8b2e3a5 | ||
|
|
e977af8516 | ||
|
|
dd55058989 | ||
|
|
64852b2fb9 | ||
|
|
1aedc35d5d | ||
|
|
d5013de6a5 | ||
|
|
0e37e0d03a | ||
|
|
75db50f4a0 | ||
|
|
d714245dd9 | ||
|
|
1d0ddcdbda | ||
|
|
edf3123942 | ||
|
|
1f8e2f7208 | ||
|
|
ca76b123f1 | ||
|
|
4fe8a54efe | ||
|
|
5f3f74892a | ||
|
|
553db8ba73 | ||
|
|
939da1eb3f | ||
|
|
d557b32f71 | ||
|
|
e60460f4e5 |
14
.lgtm.yml
Normal file
14
.lgtm.yml
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
# vi: set ts=2 sw=2:
|
||||||
|
extraction:
|
||||||
|
cpp:
|
||||||
|
prepare:
|
||||||
|
packages:
|
||||||
|
- libelf-dev
|
||||||
|
- pkg-config
|
||||||
|
after_prepare:
|
||||||
|
# As the buildsystem detection by LGTM is performed _only_ during the
|
||||||
|
# 'configure' phase, we need to trick LGTM we use a supported build
|
||||||
|
# system (configure, meson, cmake, etc.). This way LGTM correctly detects
|
||||||
|
# that our sources are in the src/ subfolder.
|
||||||
|
- touch src/configure
|
||||||
|
- chmod +x src/configure
|
||||||
77
.travis.yml
77
.travis.yml
@@ -1,14 +1,24 @@
|
|||||||
sudo: required
|
sudo: required
|
||||||
dist: xenial
|
dist: bionic
|
||||||
services:
|
services:
|
||||||
- docker
|
- docker
|
||||||
|
|
||||||
env:
|
env:
|
||||||
global:
|
global:
|
||||||
- AUTHOR_EMAIL="$(git log -1 $TRAVIS_COMMIT --pretty=\"%aE\")"
|
- AUTHOR_EMAIL="$(git log -1 --pretty=\"%aE\")"
|
||||||
- CI_MANAGERS="$TRAVIS_BUILD_DIR/travis-ci/managers"
|
- CI_MANAGERS="$TRAVIS_BUILD_DIR/travis-ci/managers"
|
||||||
- REPO_ROOT="$TRAVIS_BUILD_DIR"
|
- REPO_ROOT="$TRAVIS_BUILD_DIR"
|
||||||
|
|
||||||
|
stages:
|
||||||
|
# Run Coverity periodically instead of for each PR for following reasons:
|
||||||
|
# 1) Coverity jobs are heavily rate-limited
|
||||||
|
# 2) Due to security restrictions of encrypted environment variables
|
||||||
|
# in Travis CI, pull requests made from forks can't access encrypted
|
||||||
|
# env variables, making Coverity unusable
|
||||||
|
# See: https://docs.travis-ci.com/user/pull-requests#pull-requests-and-security-restrictions
|
||||||
|
- name: Coverity
|
||||||
|
if: type = cron
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
include:
|
include:
|
||||||
- stage: Build & test
|
- stage: Build & test
|
||||||
@@ -23,9 +33,7 @@ jobs:
|
|||||||
install:
|
install:
|
||||||
- $CI_MANAGERS/debian.sh SETUP
|
- $CI_MANAGERS/debian.sh SETUP
|
||||||
script:
|
script:
|
||||||
- set -e
|
- $CI_MANAGERS/debian.sh RUN || travis_terminate
|
||||||
- $CI_MANAGERS/debian.sh RUN
|
|
||||||
- set +e
|
|
||||||
after_script:
|
after_script:
|
||||||
- $CI_MANAGERS/debian.sh CLEANUP
|
- $CI_MANAGERS/debian.sh CLEANUP
|
||||||
|
|
||||||
@@ -40,9 +48,7 @@ jobs:
|
|||||||
install:
|
install:
|
||||||
- $CI_MANAGERS/debian.sh SETUP
|
- $CI_MANAGERS/debian.sh SETUP
|
||||||
script:
|
script:
|
||||||
- set -e
|
- $CI_MANAGERS/debian.sh RUN_ASAN || travis_terminate
|
||||||
- $CI_MANAGERS/debian.sh RUN_ASAN
|
|
||||||
- set +e
|
|
||||||
after_script:
|
after_script:
|
||||||
- $CI_MANAGERS/debian.sh CLEANUP
|
- $CI_MANAGERS/debian.sh CLEANUP
|
||||||
|
|
||||||
@@ -57,9 +63,7 @@ jobs:
|
|||||||
install:
|
install:
|
||||||
- $CI_MANAGERS/debian.sh SETUP
|
- $CI_MANAGERS/debian.sh SETUP
|
||||||
script:
|
script:
|
||||||
- set -e
|
- $CI_MANAGERS/debian.sh RUN_CLANG || travis_terminate
|
||||||
- $CI_MANAGERS/debian.sh RUN_CLANG
|
|
||||||
- set +e
|
|
||||||
after_script:
|
after_script:
|
||||||
- $CI_MANAGERS/debian.sh CLEANUP
|
- $CI_MANAGERS/debian.sh CLEANUP
|
||||||
|
|
||||||
@@ -74,9 +78,7 @@ jobs:
|
|||||||
install:
|
install:
|
||||||
- $CI_MANAGERS/debian.sh SETUP
|
- $CI_MANAGERS/debian.sh SETUP
|
||||||
script:
|
script:
|
||||||
- set -e
|
- $CI_MANAGERS/debian.sh RUN_CLANG_ASAN || travis_terminate
|
||||||
- $CI_MANAGERS/debian.sh RUN_CLANG_ASAN
|
|
||||||
- set +e
|
|
||||||
after_script:
|
after_script:
|
||||||
- $CI_MANAGERS/debian.sh CLEANUP
|
- $CI_MANAGERS/debian.sh CLEANUP
|
||||||
|
|
||||||
@@ -91,9 +93,7 @@ jobs:
|
|||||||
install:
|
install:
|
||||||
- $CI_MANAGERS/debian.sh SETUP
|
- $CI_MANAGERS/debian.sh SETUP
|
||||||
script:
|
script:
|
||||||
- set -e
|
- $CI_MANAGERS/debian.sh RUN_GCC8 || travis_terminate
|
||||||
- $CI_MANAGERS/debian.sh RUN_GCC8
|
|
||||||
- set +e
|
|
||||||
after_script:
|
after_script:
|
||||||
- $CI_MANAGERS/debian.sh CLEANUP
|
- $CI_MANAGERS/debian.sh CLEANUP
|
||||||
|
|
||||||
@@ -108,15 +108,44 @@ jobs:
|
|||||||
install:
|
install:
|
||||||
- $CI_MANAGERS/debian.sh SETUP
|
- $CI_MANAGERS/debian.sh SETUP
|
||||||
script:
|
script:
|
||||||
- set -e
|
- $CI_MANAGERS/debian.sh RUN_GCC8_ASAN || travis_terminate
|
||||||
- $CI_MANAGERS/debian.sh RUN_GCC8_ASAN
|
|
||||||
- set +e
|
|
||||||
after_script:
|
after_script:
|
||||||
- $CI_MANAGERS/debian.sh CLEANUP
|
- $CI_MANAGERS/debian.sh CLEANUP
|
||||||
|
|
||||||
- name: Ubuntu Xenial
|
- name: Ubuntu Bionic
|
||||||
language: bash
|
language: bash
|
||||||
script:
|
script:
|
||||||
- set -e
|
- sudo $CI_MANAGERS/ubuntu.sh || travis_terminate
|
||||||
- sudo $CI_MANAGERS/xenial.sh
|
|
||||||
- set +e
|
- name: Ubuntu Bionic (arm)
|
||||||
|
arch: arm64
|
||||||
|
language: bash
|
||||||
|
script:
|
||||||
|
- sudo $CI_MANAGERS/ubuntu.sh || travis_terminate
|
||||||
|
|
||||||
|
- name: Ubuntu Bionic (s390x)
|
||||||
|
arch: s390x
|
||||||
|
language: bash
|
||||||
|
script:
|
||||||
|
- sudo $CI_MANAGERS/ubuntu.sh || travis_terminate
|
||||||
|
|
||||||
|
- stage: Coverity
|
||||||
|
language: bash
|
||||||
|
env:
|
||||||
|
# Coverity configuration
|
||||||
|
# COVERITY_SCAN_TOKEN=xxx
|
||||||
|
# Encrypted using `travis encrypt --repo libbpf/libbpf COVERITY_SCAN_TOKEN=xxx`
|
||||||
|
- secure: "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"
|
||||||
|
- COVERITY_SCAN_PROJECT_NAME="libbpf"
|
||||||
|
- COVERITY_SCAN_NOTIFICATION_EMAIL="${AUTHOR_EMAIL}"
|
||||||
|
- COVERITY_SCAN_BRANCH_PATTERN="$TRAVIS_BRANCH"
|
||||||
|
# Note: `make -C src/` as a BUILD_COMMAND will not work here
|
||||||
|
- COVERITY_SCAN_BUILD_COMMAND_PREPEND="cd src/"
|
||||||
|
- COVERITY_SCAN_BUILD_COMMAND="make"
|
||||||
|
install:
|
||||||
|
- sudo echo 'deb-src http://archive.ubuntu.com/ubuntu/ bionic main restricted universe multiverse' >>/etc/apt/sources.list
|
||||||
|
- sudo apt-get update
|
||||||
|
- sudo apt-get -y build-dep libelf-dev
|
||||||
|
- sudo apt-get install -y libelf-dev pkg-config
|
||||||
|
script:
|
||||||
|
- scripts/coverity.sh || travis_terminate
|
||||||
|
|||||||
1
BPF-CHECKPOINT-COMMIT
Normal file
1
BPF-CHECKPOINT-COMMIT
Normal file
@@ -0,0 +1 @@
|
|||||||
|
e42617b825f8073569da76dc4510bfa019b1c35a
|
||||||
@@ -1 +1 @@
|
|||||||
f49aa1de98363b6c5fba4637678d6b0ba3d18065
|
e7096c131e5161fa3b8e52a650d7719d2857adfd
|
||||||
|
|||||||
32
LICENSE.BSD-2-Clause
Normal file
32
LICENSE.BSD-2-Clause
Normal file
@@ -0,0 +1,32 @@
|
|||||||
|
Valid-License-Identifier: BSD-2-Clause
|
||||||
|
SPDX-URL: https://spdx.org/licenses/BSD-2-Clause.html
|
||||||
|
Usage-Guide:
|
||||||
|
To use the BSD 2-clause "Simplified" License put the following SPDX
|
||||||
|
tag/value pair into a comment according to the placement guidelines in
|
||||||
|
the licensing rules documentation:
|
||||||
|
SPDX-License-Identifier: BSD-2-Clause
|
||||||
|
License-Text:
|
||||||
|
|
||||||
|
Copyright (c) <year> <owner> . All rights reserved.
|
||||||
|
|
||||||
|
Redistribution and use in source and binary forms, with or without
|
||||||
|
modification, are permitted provided that the following conditions are met:
|
||||||
|
|
||||||
|
1. Redistributions of source code must retain the above copyright notice,
|
||||||
|
this list of conditions and the following disclaimer.
|
||||||
|
|
||||||
|
2. Redistributions in binary form must reproduce the above copyright
|
||||||
|
notice, this list of conditions and the following disclaimer in the
|
||||||
|
documentation and/or other materials provided with the distribution.
|
||||||
|
|
||||||
|
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
||||||
|
AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||||||
|
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||||||
|
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
|
||||||
|
LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
||||||
|
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
||||||
|
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
||||||
|
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
||||||
|
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||||||
|
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
||||||
|
POSSIBILITY OF SUCH DAMAGE.
|
||||||
503
LICENSE.LPGL-2.1
Normal file
503
LICENSE.LPGL-2.1
Normal file
@@ -0,0 +1,503 @@
|
|||||||
|
Valid-License-Identifier: LGPL-2.1
|
||||||
|
Valid-License-Identifier: LGPL-2.1+
|
||||||
|
SPDX-URL: https://spdx.org/licenses/LGPL-2.1.html
|
||||||
|
Usage-Guide:
|
||||||
|
To use this license in source code, put one of the following SPDX
|
||||||
|
tag/value pairs into a comment according to the placement
|
||||||
|
guidelines in the licensing rules documentation.
|
||||||
|
For 'GNU Lesser General Public License (LGPL) version 2.1 only' use:
|
||||||
|
SPDX-License-Identifier: LGPL-2.1
|
||||||
|
For 'GNU Lesser General Public License (LGPL) version 2.1 or any later
|
||||||
|
version' use:
|
||||||
|
SPDX-License-Identifier: LGPL-2.1+
|
||||||
|
License-Text:
|
||||||
|
|
||||||
|
GNU LESSER GENERAL PUBLIC LICENSE
|
||||||
|
Version 2.1, February 1999
|
||||||
|
|
||||||
|
Copyright (C) 1991, 1999 Free Software Foundation, Inc.
|
||||||
|
51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
||||||
|
|
||||||
|
Everyone is permitted to copy and distribute verbatim copies of this
|
||||||
|
license document, but changing it is not allowed.
|
||||||
|
|
||||||
|
[This is the first released version of the Lesser GPL. It also counts as
|
||||||
|
the successor of the GNU Library Public License, version 2, hence the
|
||||||
|
version number 2.1.]
|
||||||
|
|
||||||
|
Preamble
|
||||||
|
|
||||||
|
The licenses for most software are designed to take away your freedom to
|
||||||
|
share and change it. By contrast, the GNU General Public Licenses are
|
||||||
|
intended to guarantee your freedom to share and change free software--to
|
||||||
|
make sure the software is free for all its users.
|
||||||
|
|
||||||
|
This license, the Lesser General Public License, applies to some specially
|
||||||
|
designated software packages--typically libraries--of the Free Software
|
||||||
|
Foundation and other authors who decide to use it. You can use it too, but
|
||||||
|
we suggest you first think carefully about whether this license or the
|
||||||
|
ordinary General Public License is the better strategy to use in any
|
||||||
|
particular case, based on the explanations below.
|
||||||
|
|
||||||
|
When we speak of free software, we are referring to freedom of use, not
|
||||||
|
price. Our General Public Licenses are designed to make sure that you have
|
||||||
|
the freedom to distribute copies of free software (and charge for this
|
||||||
|
service if you wish); that you receive source code or can get it if you
|
||||||
|
want it; that you can change the software and use pieces of it in new free
|
||||||
|
programs; and that you are informed that you can do these things.
|
||||||
|
|
||||||
|
To protect your rights, we need to make restrictions that forbid
|
||||||
|
distributors to deny you these rights or to ask you to surrender these
|
||||||
|
rights. These restrictions translate to certain responsibilities for you if
|
||||||
|
you distribute copies of the library or if you modify it.
|
||||||
|
|
||||||
|
For example, if you distribute copies of the library, whether gratis or for
|
||||||
|
a fee, you must give the recipients all the rights that we gave you. You
|
||||||
|
must make sure that they, too, receive or can get the source code. If you
|
||||||
|
link other code with the library, you must provide complete object files to
|
||||||
|
the recipients, so that they can relink them with the library after making
|
||||||
|
changes to the library and recompiling it. And you must show them these
|
||||||
|
terms so they know their rights.
|
||||||
|
|
||||||
|
We protect your rights with a two-step method: (1) we copyright the
|
||||||
|
library, and (2) we offer you this license, which gives you legal
|
||||||
|
permission to copy, distribute and/or modify the library.
|
||||||
|
|
||||||
|
To protect each distributor, we want to make it very clear that there is no
|
||||||
|
warranty for the free library. Also, if the library is modified by someone
|
||||||
|
else and passed on, the recipients should know that what they have is not
|
||||||
|
the original version, so that the original author's reputation will not be
|
||||||
|
affected by problems that might be introduced by others.
|
||||||
|
|
||||||
|
Finally, software patents pose a constant threat to the existence of any
|
||||||
|
free program. We wish to make sure that a company cannot effectively
|
||||||
|
restrict the users of a free program by obtaining a restrictive license
|
||||||
|
from a patent holder. Therefore, we insist that any patent license obtained
|
||||||
|
for a version of the library must be consistent with the full freedom of
|
||||||
|
use specified in this license.
|
||||||
|
|
||||||
|
Most GNU software, including some libraries, is covered by the ordinary GNU
|
||||||
|
General Public License. This license, the GNU Lesser General Public
|
||||||
|
License, applies to certain designated libraries, and is quite different
|
||||||
|
from the ordinary General Public License. We use this license for certain
|
||||||
|
libraries in order to permit linking those libraries into non-free
|
||||||
|
programs.
|
||||||
|
|
||||||
|
When a program is linked with a library, whether statically or using a
|
||||||
|
shared library, the combination of the two is legally speaking a combined
|
||||||
|
work, a derivative of the original library. The ordinary General Public
|
||||||
|
License therefore permits such linking only if the entire combination fits
|
||||||
|
its criteria of freedom. The Lesser General Public License permits more lax
|
||||||
|
criteria for linking other code with the library.
|
||||||
|
|
||||||
|
We call this license the "Lesser" General Public License because it does
|
||||||
|
Less to protect the user's freedom than the ordinary General Public
|
||||||
|
License. It also provides other free software developers Less of an
|
||||||
|
advantage over competing non-free programs. These disadvantages are the
|
||||||
|
reason we use the ordinary General Public License for many
|
||||||
|
libraries. However, the Lesser license provides advantages in certain
|
||||||
|
special circumstances.
|
||||||
|
|
||||||
|
For example, on rare occasions, there may be a special need to encourage
|
||||||
|
the widest possible use of a certain library, so that it becomes a de-facto
|
||||||
|
standard. To achieve this, non-free programs must be allowed to use the
|
||||||
|
library. A more frequent case is that a free library does the same job as
|
||||||
|
widely used non-free libraries. In this case, there is little to gain by
|
||||||
|
limiting the free library to free software only, so we use the Lesser
|
||||||
|
General Public License.
|
||||||
|
|
||||||
|
In other cases, permission to use a particular library in non-free programs
|
||||||
|
enables a greater number of people to use a large body of free
|
||||||
|
software. For example, permission to use the GNU C Library in non-free
|
||||||
|
programs enables many more people to use the whole GNU operating system, as
|
||||||
|
well as its variant, the GNU/Linux operating system.
|
||||||
|
|
||||||
|
Although the Lesser General Public License is Less protective of the users'
|
||||||
|
freedom, it does ensure that the user of a program that is linked with the
|
||||||
|
Library has the freedom and the wherewithal to run that program using a
|
||||||
|
modified version of the Library.
|
||||||
|
|
||||||
|
The precise terms and conditions for copying, distribution and modification
|
||||||
|
follow. Pay close attention to the difference between a "work based on the
|
||||||
|
library" and a "work that uses the library". The former contains code
|
||||||
|
derived from the library, whereas the latter must be combined with the
|
||||||
|
library in order to run.
|
||||||
|
|
||||||
|
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
|
||||||
|
|
||||||
|
0. This License Agreement applies to any software library or other program
|
||||||
|
which contains a notice placed by the copyright holder or other
|
||||||
|
authorized party saying it may be distributed under the terms of this
|
||||||
|
Lesser General Public License (also called "this License"). Each
|
||||||
|
licensee is addressed as "you".
|
||||||
|
|
||||||
|
A "library" means a collection of software functions and/or data
|
||||||
|
prepared so as to be conveniently linked with application programs
|
||||||
|
(which use some of those functions and data) to form executables.
|
||||||
|
|
||||||
|
The "Library", below, refers to any such software library or work which
|
||||||
|
has been distributed under these terms. A "work based on the Library"
|
||||||
|
means either the Library or any derivative work under copyright law:
|
||||||
|
that is to say, a work containing the Library or a portion of it, either
|
||||||
|
verbatim or with modifications and/or translated straightforwardly into
|
||||||
|
another language. (Hereinafter, translation is included without
|
||||||
|
limitation in the term "modification".)
|
||||||
|
|
||||||
|
"Source code" for a work means the preferred form of the work for making
|
||||||
|
modifications to it. For a library, complete source code means all the
|
||||||
|
source code for all modules it contains, plus any associated interface
|
||||||
|
definition files, plus the scripts used to control compilation and
|
||||||
|
installation of the library.
|
||||||
|
|
||||||
|
Activities other than copying, distribution and modification are not
|
||||||
|
covered by this License; they are outside its scope. The act of running
|
||||||
|
a program using the Library is not restricted, and output from such a
|
||||||
|
program is covered only if its contents constitute a work based on the
|
||||||
|
Library (independent of the use of the Library in a tool for writing
|
||||||
|
it). Whether that is true depends on what the Library does and what the
|
||||||
|
program that uses the Library does.
|
||||||
|
|
||||||
|
1. You may copy and distribute verbatim copies of the Library's complete
|
||||||
|
source code as you receive it, in any medium, provided that you
|
||||||
|
conspicuously and appropriately publish on each copy an appropriate
|
||||||
|
copyright notice and disclaimer of warranty; keep intact all the notices
|
||||||
|
that refer to this License and to the absence of any warranty; and
|
||||||
|
distribute a copy of this License along with the Library.
|
||||||
|
|
||||||
|
You may charge a fee for the physical act of transferring a copy, and
|
||||||
|
you may at your option offer warranty protection in exchange for a fee.
|
||||||
|
|
||||||
|
2. You may modify your copy or copies of the Library or any portion of it,
|
||||||
|
thus forming a work based on the Library, and copy and distribute such
|
||||||
|
modifications or work under the terms of Section 1 above, provided that
|
||||||
|
you also meet all of these conditions:
|
||||||
|
|
||||||
|
a) The modified work must itself be a software library.
|
||||||
|
|
||||||
|
b) You must cause the files modified to carry prominent notices stating
|
||||||
|
that you changed the files and the date of any change.
|
||||||
|
|
||||||
|
c) You must cause the whole of the work to be licensed at no charge to
|
||||||
|
all third parties under the terms of this License.
|
||||||
|
|
||||||
|
d) If a facility in the modified Library refers to a function or a table
|
||||||
|
of data to be supplied by an application program that uses the
|
||||||
|
facility, other than as an argument passed when the facility is
|
||||||
|
invoked, then you must make a good faith effort to ensure that, in
|
||||||
|
the event an application does not supply such function or table, the
|
||||||
|
facility still operates, and performs whatever part of its purpose
|
||||||
|
remains meaningful.
|
||||||
|
|
||||||
|
(For example, a function in a library to compute square roots has a
|
||||||
|
purpose that is entirely well-defined independent of the
|
||||||
|
application. Therefore, Subsection 2d requires that any
|
||||||
|
application-supplied function or table used by this function must be
|
||||||
|
optional: if the application does not supply it, the square root
|
||||||
|
function must still compute square roots.)
|
||||||
|
|
||||||
|
These requirements apply to the modified work as a whole. If
|
||||||
|
identifiable sections of that work are not derived from the Library, and
|
||||||
|
can be reasonably considered independent and separate works in
|
||||||
|
themselves, then this License, and its terms, do not apply to those
|
||||||
|
sections when you distribute them as separate works. But when you
|
||||||
|
distribute the same sections as part of a whole which is a work based on
|
||||||
|
the Library, the distribution of the whole must be on the terms of this
|
||||||
|
License, whose permissions for other licensees extend to the entire
|
||||||
|
whole, and thus to each and every part regardless of who wrote it.
|
||||||
|
|
||||||
|
Thus, it is not the intent of this section to claim rights or contest
|
||||||
|
your rights to work written entirely by you; rather, the intent is to
|
||||||
|
exercise the right to control the distribution of derivative or
|
||||||
|
collective works based on the Library.
|
||||||
|
|
||||||
|
In addition, mere aggregation of another work not based on the Library
|
||||||
|
with the Library (or with a work based on the Library) on a volume of a
|
||||||
|
storage or distribution medium does not bring the other work under the
|
||||||
|
scope of this License.
|
||||||
|
|
||||||
|
3. You may opt to apply the terms of the ordinary GNU General Public
|
||||||
|
License instead of this License to a given copy of the Library. To do
|
||||||
|
this, you must alter all the notices that refer to this License, so that
|
||||||
|
they refer to the ordinary GNU General Public License, version 2,
|
||||||
|
instead of to this License. (If a newer version than version 2 of the
|
||||||
|
ordinary GNU General Public License has appeared, then you can specify
|
||||||
|
that version instead if you wish.) Do not make any other change in these
|
||||||
|
notices.
|
||||||
|
|
||||||
|
Once this change is made in a given copy, it is irreversible for that
|
||||||
|
copy, so the ordinary GNU General Public License applies to all
|
||||||
|
subsequent copies and derivative works made from that copy.
|
||||||
|
|
||||||
|
This option is useful when you wish to copy part of the code of the
|
||||||
|
Library into a program that is not a library.
|
||||||
|
|
||||||
|
4. You may copy and distribute the Library (or a portion or derivative of
|
||||||
|
it, under Section 2) in object code or executable form under the terms
|
||||||
|
of Sections 1 and 2 above provided that you accompany it with the
|
||||||
|
complete corresponding machine-readable source code, which must be
|
||||||
|
distributed under the terms of Sections 1 and 2 above on a medium
|
||||||
|
customarily used for software interchange.
|
||||||
|
|
||||||
|
If distribution of object code is made by offering access to copy from a
|
||||||
|
designated place, then offering equivalent access to copy the source
|
||||||
|
code from the same place satisfies the requirement to distribute the
|
||||||
|
source code, even though third parties are not compelled to copy the
|
||||||
|
source along with the object code.
|
||||||
|
|
||||||
|
5. A program that contains no derivative of any portion of the Library, but
|
||||||
|
is designed to work with the Library by being compiled or linked with
|
||||||
|
it, is called a "work that uses the Library". Such a work, in isolation,
|
||||||
|
is not a derivative work of the Library, and therefore falls outside the
|
||||||
|
scope of this License.
|
||||||
|
|
||||||
|
However, linking a "work that uses the Library" with the Library creates
|
||||||
|
an executable that is a derivative of the Library (because it contains
|
||||||
|
portions of the Library), rather than a "work that uses the
|
||||||
|
library". The executable is therefore covered by this License. Section 6
|
||||||
|
states terms for distribution of such executables.
|
||||||
|
|
||||||
|
When a "work that uses the Library" uses material from a header file
|
||||||
|
that is part of the Library, the object code for the work may be a
|
||||||
|
derivative work of the Library even though the source code is
|
||||||
|
not. Whether this is true is especially significant if the work can be
|
||||||
|
linked without the Library, or if the work is itself a library. The
|
||||||
|
threshold for this to be true is not precisely defined by law.
|
||||||
|
|
||||||
|
If such an object file uses only numerical parameters, data structure
|
||||||
|
layouts and accessors, and small macros and small inline functions (ten
|
||||||
|
lines or less in length), then the use of the object file is
|
||||||
|
unrestricted, regardless of whether it is legally a derivative
|
||||||
|
work. (Executables containing this object code plus portions of the
|
||||||
|
Library will still fall under Section 6.)
|
||||||
|
|
||||||
|
Otherwise, if the work is a derivative of the Library, you may
|
||||||
|
distribute the object code for the work under the terms of Section
|
||||||
|
6. Any executables containing that work also fall under Section 6,
|
||||||
|
whether or not they are linked directly with the Library itself.
|
||||||
|
|
||||||
|
6. As an exception to the Sections above, you may also combine or link a
|
||||||
|
"work that uses the Library" with the Library to produce a work
|
||||||
|
containing portions of the Library, and distribute that work under terms
|
||||||
|
of your choice, provided that the terms permit modification of the work
|
||||||
|
for the customer's own use and reverse engineering for debugging such
|
||||||
|
modifications.
|
||||||
|
|
||||||
|
You must give prominent notice with each copy of the work that the
|
||||||
|
Library is used in it and that the Library and its use are covered by
|
||||||
|
this License. You must supply a copy of this License. If the work during
|
||||||
|
execution displays copyright notices, you must include the copyright
|
||||||
|
notice for the Library among them, as well as a reference directing the
|
||||||
|
user to the copy of this License. Also, you must do one of these things:
|
||||||
|
|
||||||
|
a) Accompany the work with the complete corresponding machine-readable
|
||||||
|
source code for the Library including whatever changes were used in
|
||||||
|
the work (which must be distributed under Sections 1 and 2 above);
|
||||||
|
and, if the work is an executable linked with the Library, with the
|
||||||
|
complete machine-readable "work that uses the Library", as object
|
||||||
|
code and/or source code, so that the user can modify the Library and
|
||||||
|
then relink to produce a modified executable containing the modified
|
||||||
|
Library. (It is understood that the user who changes the contents of
|
||||||
|
definitions files in the Library will not necessarily be able to
|
||||||
|
recompile the application to use the modified definitions.)
|
||||||
|
|
||||||
|
b) Use a suitable shared library mechanism for linking with the
|
||||||
|
Library. A suitable mechanism is one that (1) uses at run time a copy
|
||||||
|
of the library already present on the user's computer system, rather
|
||||||
|
than copying library functions into the executable, and (2) will
|
||||||
|
operate properly with a modified version of the library, if the user
|
||||||
|
installs one, as long as the modified version is interface-compatible
|
||||||
|
with the version that the work was made with.
|
||||||
|
|
||||||
|
c) Accompany the work with a written offer, valid for at least three
|
||||||
|
years, to give the same user the materials specified in Subsection
|
||||||
|
6a, above, for a charge no more than the cost of performing this
|
||||||
|
distribution.
|
||||||
|
|
||||||
|
d) If distribution of the work is made by offering access to copy from a
|
||||||
|
designated place, offer equivalent access to copy the above specified
|
||||||
|
materials from the same place.
|
||||||
|
|
||||||
|
e) Verify that the user has already received a copy of these materials
|
||||||
|
or that you have already sent this user a copy.
|
||||||
|
|
||||||
|
For an executable, the required form of the "work that uses the Library"
|
||||||
|
must include any data and utility programs needed for reproducing the
|
||||||
|
executable from it. However, as a special exception, the materials to be
|
||||||
|
distributed need not include anything that is normally distributed (in
|
||||||
|
either source or binary form) with the major components (compiler,
|
||||||
|
kernel, and so on) of the operating system on which the executable runs,
|
||||||
|
unless that component itself accompanies the executable.
|
||||||
|
|
||||||
|
It may happen that this requirement contradicts the license restrictions
|
||||||
|
of other proprietary libraries that do not normally accompany the
|
||||||
|
operating system. Such a contradiction means you cannot use both them
|
||||||
|
and the Library together in an executable that you distribute.
|
||||||
|
|
||||||
|
7. You may place library facilities that are a work based on the Library
|
||||||
|
side-by-side in a single library together with other library facilities
|
||||||
|
not covered by this License, and distribute such a combined library,
|
||||||
|
provided that the separate distribution of the work based on the Library
|
||||||
|
and of the other library facilities is otherwise permitted, and provided
|
||||||
|
that you do these two things:
|
||||||
|
|
||||||
|
a) Accompany the combined library with a copy of the same work based on
|
||||||
|
the Library, uncombined with any other library facilities. This must
|
||||||
|
be distributed under the terms of the Sections above.
|
||||||
|
|
||||||
|
b) Give prominent notice with the combined library of the fact that part
|
||||||
|
of it is a work based on the Library, and explaining where to find
|
||||||
|
the accompanying uncombined form of the same work.
|
||||||
|
|
||||||
|
8. You may not copy, modify, sublicense, link with, or distribute the
|
||||||
|
Library except as expressly provided under this License. Any attempt
|
||||||
|
otherwise to copy, modify, sublicense, link with, or distribute the
|
||||||
|
Library is void, and will automatically terminate your rights under this
|
||||||
|
License. However, parties who have received copies, or rights, from you
|
||||||
|
under this License will not have their licenses terminated so long as
|
||||||
|
such parties remain in full compliance.
|
||||||
|
|
||||||
|
9. You are not required to accept this License, since you have not signed
|
||||||
|
it. However, nothing else grants you permission to modify or distribute
|
||||||
|
the Library or its derivative works. These actions are prohibited by law
|
||||||
|
if you do not accept this License. Therefore, by modifying or
|
||||||
|
distributing the Library (or any work based on the Library), you
|
||||||
|
indicate your acceptance of this License to do so, and all its terms and
|
||||||
|
conditions for copying, distributing or modifying the Library or works
|
||||||
|
based on it.
|
||||||
|
|
||||||
|
10. Each time you redistribute the Library (or any work based on the
|
||||||
|
Library), the recipient automatically receives a license from the
|
||||||
|
original licensor to copy, distribute, link with or modify the Library
|
||||||
|
subject to these terms and conditions. You may not impose any further
|
||||||
|
restrictions on the recipients' exercise of the rights granted
|
||||||
|
herein. You are not responsible for enforcing compliance by third
|
||||||
|
parties with this License.
|
||||||
|
|
||||||
|
11. If, as a consequence of a court judgment or allegation of patent
|
||||||
|
infringement or for any other reason (not limited to patent issues),
|
||||||
|
conditions are imposed on you (whether by court order, agreement or
|
||||||
|
otherwise) that contradict the conditions of this License, they do not
|
||||||
|
excuse you from the conditions of this License. If you cannot
|
||||||
|
distribute so as to satisfy simultaneously your obligations under this
|
||||||
|
License and any other pertinent obligations, then as a consequence you
|
||||||
|
may not distribute the Library at all. For example, if a patent license
|
||||||
|
would not permit royalty-free redistribution of the Library by all
|
||||||
|
those who receive copies directly or indirectly through you, then the
|
||||||
|
only way you could satisfy both it and this License would be to refrain
|
||||||
|
entirely from distribution of the Library.
|
||||||
|
|
||||||
|
If any portion of this section is held invalid or unenforceable under
|
||||||
|
any particular circumstance, the balance of the section is intended to
|
||||||
|
apply, and the section as a whole is intended to apply in other
|
||||||
|
circumstances.
|
||||||
|
|
||||||
|
It is not the purpose of this section to induce you to infringe any
|
||||||
|
patents or other property right claims or to contest validity of any
|
||||||
|
such claims; this section has the sole purpose of protecting the
|
||||||
|
integrity of the free software distribution system which is implemented
|
||||||
|
by public license practices. Many people have made generous
|
||||||
|
contributions to the wide range of software distributed through that
|
||||||
|
system in reliance on consistent application of that system; it is up
|
||||||
|
to the author/donor to decide if he or she is willing to distribute
|
||||||
|
software through any other system and a licensee cannot impose that
|
||||||
|
choice.
|
||||||
|
|
||||||
|
This section is intended to make thoroughly clear what is believed to
|
||||||
|
be a consequence of the rest of this License.
|
||||||
|
|
||||||
|
12. If the distribution and/or use of the Library is restricted in certain
|
||||||
|
countries either by patents or by copyrighted interfaces, the original
|
||||||
|
copyright holder who places the Library under this License may add an
|
||||||
|
explicit geographical distribution limitation excluding those
|
||||||
|
countries, so that distribution is permitted only in or among countries
|
||||||
|
not thus excluded. In such case, this License incorporates the
|
||||||
|
limitation as if written in the body of this License.
|
||||||
|
|
||||||
|
13. The Free Software Foundation may publish revised and/or new versions of
|
||||||
|
the Lesser General Public License from time to time. Such new versions
|
||||||
|
will be similar in spirit to the present version, but may differ in
|
||||||
|
detail to address new problems or concerns.
|
||||||
|
|
||||||
|
Each version is given a distinguishing version number. If the Library
|
||||||
|
specifies a version number of this License which applies to it and "any
|
||||||
|
later version", you have the option of following the terms and
|
||||||
|
conditions either of that version or of any later version published by
|
||||||
|
the Free Software Foundation. If the Library does not specify a license
|
||||||
|
version number, you may choose any version ever published by the Free
|
||||||
|
Software Foundation.
|
||||||
|
|
||||||
|
14. If you wish to incorporate parts of the Library into other free
|
||||||
|
programs whose distribution conditions are incompatible with these,
|
||||||
|
write to the author to ask for permission. For software which is
|
||||||
|
copyrighted by the Free Software Foundation, write to the Free Software
|
||||||
|
Foundation; we sometimes make exceptions for this. Our decision will be
|
||||||
|
guided by the two goals of preserving the free status of all
|
||||||
|
derivatives of our free software and of promoting the sharing and reuse
|
||||||
|
of software generally.
|
||||||
|
|
||||||
|
NO WARRANTY
|
||||||
|
|
||||||
|
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY
|
||||||
|
FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN
|
||||||
|
OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES
|
||||||
|
PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
|
||||||
|
EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
||||||
|
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE
|
||||||
|
ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH
|
||||||
|
YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL
|
||||||
|
NECESSARY SERVICING, REPAIR OR CORRECTION.
|
||||||
|
|
||||||
|
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||||
|
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR
|
||||||
|
REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR
|
||||||
|
DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL
|
||||||
|
DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY
|
||||||
|
(INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED
|
||||||
|
INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF
|
||||||
|
THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR
|
||||||
|
OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
|
||||||
|
|
||||||
|
END OF TERMS AND CONDITIONS
|
||||||
|
|
||||||
|
How to Apply These Terms to Your New Libraries
|
||||||
|
|
||||||
|
If you develop a new library, and you want it to be of the greatest
|
||||||
|
possible use to the public, we recommend making it free software that
|
||||||
|
everyone can redistribute and change. You can do so by permitting
|
||||||
|
redistribution under these terms (or, alternatively, under the terms of the
|
||||||
|
ordinary General Public License).
|
||||||
|
|
||||||
|
To apply these terms, attach the following notices to the library. It is
|
||||||
|
safest to attach them to the start of each source file to most effectively
|
||||||
|
convey the exclusion of warranty; and each file should have at least the
|
||||||
|
"copyright" line and a pointer to where the full notice is found.
|
||||||
|
|
||||||
|
one line to give the library's name and an idea of what it does.
|
||||||
|
Copyright (C) year name of author
|
||||||
|
|
||||||
|
This library is free software; you can redistribute it and/or modify it
|
||||||
|
under the terms of the GNU Lesser General Public License as published by
|
||||||
|
the Free Software Foundation; either version 2.1 of the License, or (at
|
||||||
|
your option) any later version.
|
||||||
|
|
||||||
|
This library is distributed in the hope that it will be useful, but WITHOUT
|
||||||
|
ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||||
|
FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License
|
||||||
|
for more details.
|
||||||
|
|
||||||
|
You should have received a copy of the GNU Lesser General Public License
|
||||||
|
along with this library; if not, write to the Free Software Foundation,
|
||||||
|
Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Also add
|
||||||
|
information on how to contact you by electronic and paper mail.
|
||||||
|
|
||||||
|
You should also get your employer (if you work as a programmer) or your
|
||||||
|
school, if any, to sign a "copyright disclaimer" for the library, if
|
||||||
|
necessary. Here is a sample; alter the names:
|
||||||
|
|
||||||
|
Yoyodyne, Inc., hereby disclaims all copyright interest in
|
||||||
|
the library `Frob' (a library for tweaking knobs) written
|
||||||
|
by James Random Hacker.
|
||||||
|
|
||||||
|
signature of Ty Coon, 1 April 1990
|
||||||
|
Ty Coon, President of Vice
|
||||||
|
That's all there is to it!
|
||||||
28
README.md
28
README.md
@@ -16,7 +16,10 @@ Other header files at this repo (`include/linux/*.h`) are reduced versions of
|
|||||||
their counterpart files at bpf-next's `tools/include/linux/*.h` to make compilation
|
their counterpart files at bpf-next's `tools/include/linux/*.h` to make compilation
|
||||||
successful.
|
successful.
|
||||||
|
|
||||||
Build [](https://travis-ci.org/libbpf/libbpf)
|
Build
|
||||||
|
[](https://travis-ci.org/libbpf/libbpf)
|
||||||
|
[](https://lgtm.com/projects/g/libbpf/libbpf/alerts/)
|
||||||
|
[](https://scan.coverity.com/projects/libbpf)
|
||||||
=====
|
=====
|
||||||
libelf is an internal dependency of libbpf and thus it is required to link
|
libelf is an internal dependency of libbpf and thus it is required to link
|
||||||
against and must be installed on the system for applications to work.
|
against and must be installed on the system for applications to work.
|
||||||
@@ -48,23 +51,10 @@ $ cd src
|
|||||||
$ PKG_CONFIG_PATH=/build/root/lib64/pkgconfig DESTDIR=/build/root make install
|
$ PKG_CONFIG_PATH=/build/root/lib64/pkgconfig DESTDIR=/build/root make install
|
||||||
```
|
```
|
||||||
|
|
||||||
To integrate libbpf into a project which uses Meson building system define
|
License
|
||||||
`[wrap-git]` file in `subprojects` folder.
|
=====
|
||||||
To add libbpf dependency to the parent parent project, e.g. for
|
|
||||||
libbpf_static_dep:
|
|
||||||
```
|
|
||||||
libbpf_obj = subproject('libbpf', required : true)
|
|
||||||
libbpf_static_dep = libbpf_proj.get_variable('libbpf_static_dep')
|
|
||||||
```
|
|
||||||
|
|
||||||
To validate changes to meson.build
|
This work is dual-licensed under BSD 2-clause license and GNU LGPL v2.1 license.
|
||||||
```bash
|
You can choose between one of them if you use this work.
|
||||||
$ python3 meson.py build
|
|
||||||
$ ninja -C build/
|
|
||||||
```
|
|
||||||
|
|
||||||
To install headers, libs and pkgconfig
|
`SPDX-License-Identifier: BSD-2-Clause OR LGPL-2.1`
|
||||||
```bash
|
|
||||||
$ cd build
|
|
||||||
$ ninja install
|
|
||||||
```
|
|
||||||
|
|||||||
@@ -30,4 +30,9 @@ static inline bool IS_ERR_OR_NULL(const void *ptr)
|
|||||||
return (!ptr) || IS_ERR_VALUE((unsigned long)ptr);
|
return (!ptr) || IS_ERR_VALUE((unsigned long)ptr);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static inline long PTR_ERR_OR_ZERO(const void *ptr)
|
||||||
|
{
|
||||||
|
return IS_ERR(ptr) ? PTR_ERR(ptr) : 0;
|
||||||
|
}
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -96,7 +96,7 @@
|
|||||||
MAP_FD, 0)
|
MAP_FD, 0)
|
||||||
|
|
||||||
#define BPF_LD_MAP_VALUE(DST, MAP_FD, VALUE_OFF) \
|
#define BPF_LD_MAP_VALUE(DST, MAP_FD, VALUE_OFF) \
|
||||||
BPF_LD_IMM64_RAW_FULL(DST, BPF_PSEUDO_MAP_FD, 0, 0, \
|
BPF_LD_IMM64_RAW_FULL(DST, BPF_PSEUDO_MAP_VALUE, 0, 0, \
|
||||||
MAP_FD, VALUE_OFF)
|
MAP_FD, VALUE_OFF)
|
||||||
|
|
||||||
#define BPF_JMP_IMM(OP, DST, IMM, OFF) \
|
#define BPF_JMP_IMM(OP, DST, IMM, OFF) \
|
||||||
@@ -107,5 +107,12 @@
|
|||||||
.off = OFF, \
|
.off = OFF, \
|
||||||
.imm = IMM })
|
.imm = IMM })
|
||||||
|
|
||||||
|
#define BPF_JMP32_IMM(OP, DST, IMM, OFF) \
|
||||||
|
((struct bpf_insn) { \
|
||||||
|
.code = BPF_JMP32 | BPF_OP(OP) | BPF_K, \
|
||||||
|
.dst_reg = DST, \
|
||||||
|
.src_reg = 0, \
|
||||||
|
.off = OFF, \
|
||||||
|
.imm = IMM })
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -106,6 +106,7 @@ enum bpf_cmd {
|
|||||||
BPF_TASK_FD_QUERY,
|
BPF_TASK_FD_QUERY,
|
||||||
BPF_MAP_LOOKUP_AND_DELETE_ELEM,
|
BPF_MAP_LOOKUP_AND_DELETE_ELEM,
|
||||||
BPF_MAP_FREEZE,
|
BPF_MAP_FREEZE,
|
||||||
|
BPF_BTF_GET_NEXT_ID,
|
||||||
};
|
};
|
||||||
|
|
||||||
enum bpf_map_type {
|
enum bpf_map_type {
|
||||||
@@ -134,6 +135,7 @@ enum bpf_map_type {
|
|||||||
BPF_MAP_TYPE_QUEUE,
|
BPF_MAP_TYPE_QUEUE,
|
||||||
BPF_MAP_TYPE_STACK,
|
BPF_MAP_TYPE_STACK,
|
||||||
BPF_MAP_TYPE_SK_STORAGE,
|
BPF_MAP_TYPE_SK_STORAGE,
|
||||||
|
BPF_MAP_TYPE_DEVMAP_HASH,
|
||||||
};
|
};
|
||||||
|
|
||||||
/* Note that tracing related programs such as
|
/* Note that tracing related programs such as
|
||||||
@@ -170,6 +172,8 @@ enum bpf_prog_type {
|
|||||||
BPF_PROG_TYPE_FLOW_DISSECTOR,
|
BPF_PROG_TYPE_FLOW_DISSECTOR,
|
||||||
BPF_PROG_TYPE_CGROUP_SYSCTL,
|
BPF_PROG_TYPE_CGROUP_SYSCTL,
|
||||||
BPF_PROG_TYPE_RAW_TRACEPOINT_WRITABLE,
|
BPF_PROG_TYPE_RAW_TRACEPOINT_WRITABLE,
|
||||||
|
BPF_PROG_TYPE_CGROUP_SOCKOPT,
|
||||||
|
BPF_PROG_TYPE_TRACING,
|
||||||
};
|
};
|
||||||
|
|
||||||
enum bpf_attach_type {
|
enum bpf_attach_type {
|
||||||
@@ -192,6 +196,13 @@ enum bpf_attach_type {
|
|||||||
BPF_LIRC_MODE2,
|
BPF_LIRC_MODE2,
|
||||||
BPF_FLOW_DISSECTOR,
|
BPF_FLOW_DISSECTOR,
|
||||||
BPF_CGROUP_SYSCTL,
|
BPF_CGROUP_SYSCTL,
|
||||||
|
BPF_CGROUP_UDP4_RECVMSG,
|
||||||
|
BPF_CGROUP_UDP6_RECVMSG,
|
||||||
|
BPF_CGROUP_GETSOCKOPT,
|
||||||
|
BPF_CGROUP_SETSOCKOPT,
|
||||||
|
BPF_TRACE_RAW_TP,
|
||||||
|
BPF_TRACE_FENTRY,
|
||||||
|
BPF_TRACE_FEXIT,
|
||||||
__MAX_BPF_ATTACH_TYPE
|
__MAX_BPF_ATTACH_TYPE
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -260,6 +271,27 @@ enum bpf_attach_type {
|
|||||||
*/
|
*/
|
||||||
#define BPF_F_ANY_ALIGNMENT (1U << 1)
|
#define BPF_F_ANY_ALIGNMENT (1U << 1)
|
||||||
|
|
||||||
|
/* BPF_F_TEST_RND_HI32 is used in BPF_PROG_LOAD command for testing purpose.
|
||||||
|
* Verifier does sub-register def/use analysis and identifies instructions whose
|
||||||
|
* def only matters for low 32-bit, high 32-bit is never referenced later
|
||||||
|
* through implicit zero extension. Therefore verifier notifies JIT back-ends
|
||||||
|
* that it is safe to ignore clearing high 32-bit for these instructions. This
|
||||||
|
* saves some back-ends a lot of code-gen. However such optimization is not
|
||||||
|
* necessary on some arches, for example x86_64, arm64 etc, whose JIT back-ends
|
||||||
|
* hence hasn't used verifier's analysis result. But, we really want to have a
|
||||||
|
* way to be able to verify the correctness of the described optimization on
|
||||||
|
* x86_64 on which testsuites are frequently exercised.
|
||||||
|
*
|
||||||
|
* So, this flag is introduced. Once it is set, verifier will randomize high
|
||||||
|
* 32-bit for those instructions who has been identified as safe to ignore them.
|
||||||
|
* Then, if verifier is not doing correct analysis, such randomization will
|
||||||
|
* regress tests to expose bugs.
|
||||||
|
*/
|
||||||
|
#define BPF_F_TEST_RND_HI32 (1U << 2)
|
||||||
|
|
||||||
|
/* The verifier internal test flag. Behavior is undefined */
|
||||||
|
#define BPF_F_TEST_STATE_FREQ (1U << 3)
|
||||||
|
|
||||||
/* When BPF ldimm64's insn[0].src_reg != 0 then this can have
|
/* When BPF ldimm64's insn[0].src_reg != 0 then this can have
|
||||||
* two extensions:
|
* two extensions:
|
||||||
*
|
*
|
||||||
@@ -313,6 +345,12 @@ enum bpf_attach_type {
|
|||||||
#define BPF_F_RDONLY_PROG (1U << 7)
|
#define BPF_F_RDONLY_PROG (1U << 7)
|
||||||
#define BPF_F_WRONLY_PROG (1U << 8)
|
#define BPF_F_WRONLY_PROG (1U << 8)
|
||||||
|
|
||||||
|
/* Clone map from listener for newly accepted socket */
|
||||||
|
#define BPF_F_CLONE (1U << 9)
|
||||||
|
|
||||||
|
/* Enable memory-mapping BPF map */
|
||||||
|
#define BPF_F_MMAPABLE (1U << 10)
|
||||||
|
|
||||||
/* flags for BPF_PROG_QUERY */
|
/* flags for BPF_PROG_QUERY */
|
||||||
#define BPF_F_QUERY_EFFECTIVE (1U << 0)
|
#define BPF_F_QUERY_EFFECTIVE (1U << 0)
|
||||||
|
|
||||||
@@ -389,6 +427,8 @@ union bpf_attr {
|
|||||||
__u32 line_info_rec_size; /* userspace bpf_line_info size */
|
__u32 line_info_rec_size; /* userspace bpf_line_info size */
|
||||||
__aligned_u64 line_info; /* line info */
|
__aligned_u64 line_info; /* line info */
|
||||||
__u32 line_info_cnt; /* number of bpf_line_info records */
|
__u32 line_info_cnt; /* number of bpf_line_info records */
|
||||||
|
__u32 attach_btf_id; /* in-kernel BTF type id to attach to */
|
||||||
|
__u32 attach_prog_fd; /* 0 to attach to vmlinux */
|
||||||
};
|
};
|
||||||
|
|
||||||
struct { /* anonymous struct used by BPF_OBJ_* commands */
|
struct { /* anonymous struct used by BPF_OBJ_* commands */
|
||||||
@@ -529,10 +569,13 @@ union bpf_attr {
|
|||||||
* Return
|
* Return
|
||||||
* 0 on success, or a negative error in case of failure.
|
* 0 on success, or a negative error in case of failure.
|
||||||
*
|
*
|
||||||
* int bpf_probe_read(void *dst, u32 size, const void *src)
|
* int bpf_probe_read(void *dst, u32 size, const void *unsafe_ptr)
|
||||||
* Description
|
* Description
|
||||||
* For tracing programs, safely attempt to read *size* bytes from
|
* For tracing programs, safely attempt to read *size* bytes from
|
||||||
* address *src* and store the data in *dst*.
|
* kernel space address *unsafe_ptr* and store the data in *dst*.
|
||||||
|
*
|
||||||
|
* Generally, use bpf_probe_read_user() or bpf_probe_read_kernel()
|
||||||
|
* instead.
|
||||||
* Return
|
* Return
|
||||||
* 0 on success, or a negative error in case of failure.
|
* 0 on success, or a negative error in case of failure.
|
||||||
*
|
*
|
||||||
@@ -552,6 +595,8 @@ union bpf_attr {
|
|||||||
* limited to five).
|
* limited to five).
|
||||||
*
|
*
|
||||||
* Each time the helper is called, it appends a line to the trace.
|
* Each time the helper is called, it appends a line to the trace.
|
||||||
|
* Lines are discarded while *\/sys/kernel/debug/tracing/trace* is
|
||||||
|
* open, use *\/sys/kernel/debug/tracing/trace_pipe* to avoid this.
|
||||||
* The format of the trace is customizable, and the exact output
|
* The format of the trace is customizable, and the exact output
|
||||||
* one will get depends on the options set in
|
* one will get depends on the options set in
|
||||||
* *\/sys/kernel/debug/tracing/trace_options* (see also the
|
* *\/sys/kernel/debug/tracing/trace_options* (see also the
|
||||||
@@ -761,7 +806,7 @@ union bpf_attr {
|
|||||||
* A 64-bit integer containing the current GID and UID, and
|
* A 64-bit integer containing the current GID and UID, and
|
||||||
* created as such: *current_gid* **<< 32 \|** *current_uid*.
|
* created as such: *current_gid* **<< 32 \|** *current_uid*.
|
||||||
*
|
*
|
||||||
* int bpf_get_current_comm(char *buf, u32 size_of_buf)
|
* int bpf_get_current_comm(void *buf, u32 size_of_buf)
|
||||||
* Description
|
* Description
|
||||||
* Copy the **comm** attribute of the current task into *buf* of
|
* Copy the **comm** attribute of the current task into *buf* of
|
||||||
* *size_of_buf*. The **comm** attribute contains the name of
|
* *size_of_buf*. The **comm** attribute contains the name of
|
||||||
@@ -783,7 +828,7 @@ union bpf_attr {
|
|||||||
* based on a user-provided identifier for all traffic coming from
|
* based on a user-provided identifier for all traffic coming from
|
||||||
* the tasks belonging to the related cgroup. See also the related
|
* the tasks belonging to the related cgroup. See also the related
|
||||||
* kernel documentation, available from the Linux sources in file
|
* kernel documentation, available from the Linux sources in file
|
||||||
* *Documentation/cgroup-v1/net_cls.txt*.
|
* *Documentation/admin-guide/cgroup-v1/net_cls.rst*.
|
||||||
*
|
*
|
||||||
* The Linux kernel has two versions for cgroups: there are
|
* The Linux kernel has two versions for cgroups: there are
|
||||||
* cgroups v1 and cgroups v2. Both are available to users, who can
|
* cgroups v1 and cgroups v2. Both are available to users, who can
|
||||||
@@ -990,7 +1035,7 @@ union bpf_attr {
|
|||||||
* The realm of the route for the packet associated to *skb*, or 0
|
* The realm of the route for the packet associated to *skb*, or 0
|
||||||
* if none was found.
|
* if none was found.
|
||||||
*
|
*
|
||||||
* int bpf_perf_event_output(struct pt_reg *ctx, struct bpf_map *map, u64 flags, void *data, u64 size)
|
* int bpf_perf_event_output(void *ctx, struct bpf_map *map, u64 flags, void *data, u64 size)
|
||||||
* Description
|
* Description
|
||||||
* Write raw *data* blob into a special BPF perf event held by
|
* Write raw *data* blob into a special BPF perf event held by
|
||||||
* *map* of type **BPF_MAP_TYPE_PERF_EVENT_ARRAY**. This perf
|
* *map* of type **BPF_MAP_TYPE_PERF_EVENT_ARRAY**. This perf
|
||||||
@@ -1035,7 +1080,7 @@ union bpf_attr {
|
|||||||
* Return
|
* Return
|
||||||
* 0 on success, or a negative error in case of failure.
|
* 0 on success, or a negative error in case of failure.
|
||||||
*
|
*
|
||||||
* int bpf_skb_load_bytes(const struct sk_buff *skb, u32 offset, void *to, u32 len)
|
* int bpf_skb_load_bytes(const void *skb, u32 offset, void *to, u32 len)
|
||||||
* Description
|
* Description
|
||||||
* This helper was provided as an easy way to load data from a
|
* This helper was provided as an easy way to load data from a
|
||||||
* packet. It can be used to load *len* bytes from *offset* from
|
* packet. It can be used to load *len* bytes from *offset* from
|
||||||
@@ -1052,7 +1097,7 @@ union bpf_attr {
|
|||||||
* Return
|
* Return
|
||||||
* 0 on success, or a negative error in case of failure.
|
* 0 on success, or a negative error in case of failure.
|
||||||
*
|
*
|
||||||
* int bpf_get_stackid(struct pt_reg *ctx, struct bpf_map *map, u64 flags)
|
* int bpf_get_stackid(void *ctx, struct bpf_map *map, u64 flags)
|
||||||
* Description
|
* Description
|
||||||
* Walk a user or a kernel stack and return its id. To achieve
|
* Walk a user or a kernel stack and return its id. To achieve
|
||||||
* this, the helper needs *ctx*, which is a pointer to the context
|
* this, the helper needs *ctx*, which is a pointer to the context
|
||||||
@@ -1121,7 +1166,7 @@ union bpf_attr {
|
|||||||
* The checksum result, or a negative error code in case of
|
* The checksum result, or a negative error code in case of
|
||||||
* failure.
|
* failure.
|
||||||
*
|
*
|
||||||
* int bpf_skb_get_tunnel_opt(struct sk_buff *skb, u8 *opt, u32 size)
|
* int bpf_skb_get_tunnel_opt(struct sk_buff *skb, void *opt, u32 size)
|
||||||
* Description
|
* Description
|
||||||
* Retrieve tunnel options metadata for the packet associated to
|
* Retrieve tunnel options metadata for the packet associated to
|
||||||
* *skb*, and store the raw tunnel option data to the buffer *opt*
|
* *skb*, and store the raw tunnel option data to the buffer *opt*
|
||||||
@@ -1139,7 +1184,7 @@ union bpf_attr {
|
|||||||
* Return
|
* Return
|
||||||
* The size of the option data retrieved.
|
* The size of the option data retrieved.
|
||||||
*
|
*
|
||||||
* int bpf_skb_set_tunnel_opt(struct sk_buff *skb, u8 *opt, u32 size)
|
* int bpf_skb_set_tunnel_opt(struct sk_buff *skb, void *opt, u32 size)
|
||||||
* Description
|
* Description
|
||||||
* Set tunnel options metadata for the packet associated to *skb*
|
* Set tunnel options metadata for the packet associated to *skb*
|
||||||
* to the option data contained in the raw buffer *opt* of *size*.
|
* to the option data contained in the raw buffer *opt* of *size*.
|
||||||
@@ -1392,45 +1437,14 @@ union bpf_attr {
|
|||||||
* Return
|
* Return
|
||||||
* 0 on success, or a negative error in case of failure.
|
* 0 on success, or a negative error in case of failure.
|
||||||
*
|
*
|
||||||
* int bpf_probe_read_str(void *dst, int size, const void *unsafe_ptr)
|
* int bpf_probe_read_str(void *dst, u32 size, const void *unsafe_ptr)
|
||||||
* Description
|
* Description
|
||||||
* Copy a NUL terminated string from an unsafe address
|
* Copy a NUL terminated string from an unsafe kernel address
|
||||||
* *unsafe_ptr* to *dst*. The *size* should include the
|
* *unsafe_ptr* to *dst*. See bpf_probe_read_kernel_str() for
|
||||||
* terminating NUL byte. In case the string length is smaller than
|
* more details.
|
||||||
* *size*, the target is not padded with further NUL bytes. If the
|
|
||||||
* string length is larger than *size*, just *size*-1 bytes are
|
|
||||||
* copied and the last byte is set to NUL.
|
|
||||||
*
|
*
|
||||||
* On success, the length of the copied string is returned. This
|
* Generally, use bpf_probe_read_user_str() or bpf_probe_read_kernel_str()
|
||||||
* makes this helper useful in tracing programs for reading
|
* instead.
|
||||||
* strings, and more importantly to get its length at runtime. See
|
|
||||||
* the following snippet:
|
|
||||||
*
|
|
||||||
* ::
|
|
||||||
*
|
|
||||||
* SEC("kprobe/sys_open")
|
|
||||||
* void bpf_sys_open(struct pt_regs *ctx)
|
|
||||||
* {
|
|
||||||
* char buf[PATHLEN]; // PATHLEN is defined to 256
|
|
||||||
* int res = bpf_probe_read_str(buf, sizeof(buf),
|
|
||||||
* ctx->di);
|
|
||||||
*
|
|
||||||
* // Consume buf, for example push it to
|
|
||||||
* // userspace via bpf_perf_event_output(); we
|
|
||||||
* // can use res (the string length) as event
|
|
||||||
* // size, after checking its boundaries.
|
|
||||||
* }
|
|
||||||
*
|
|
||||||
* In comparison, using **bpf_probe_read()** helper here instead
|
|
||||||
* to read the string would require to estimate the length at
|
|
||||||
* compile time, and would often result in copying more memory
|
|
||||||
* than necessary.
|
|
||||||
*
|
|
||||||
* Another useful use case is when parsing individual process
|
|
||||||
* arguments or individual environment variables navigating
|
|
||||||
* *current*\ **->mm->arg_start** and *current*\
|
|
||||||
* **->mm->env_start**: using this helper and the return value,
|
|
||||||
* one can quickly iterate at the right offset of the memory area.
|
|
||||||
* Return
|
* Return
|
||||||
* On success, the strictly positive length of the string,
|
* On success, the strictly positive length of the string,
|
||||||
* including the trailing NUL character. On error, a negative
|
* including the trailing NUL character. On error, a negative
|
||||||
@@ -1443,8 +1457,8 @@ union bpf_attr {
|
|||||||
* If no cookie has been set yet, generate a new cookie. Once
|
* If no cookie has been set yet, generate a new cookie. Once
|
||||||
* generated, the socket cookie remains stable for the life of the
|
* generated, the socket cookie remains stable for the life of the
|
||||||
* socket. This helper can be useful for monitoring per socket
|
* socket. This helper can be useful for monitoring per socket
|
||||||
* networking traffic statistics as it provides a unique socket
|
* networking traffic statistics as it provides a global socket
|
||||||
* identifier per namespace.
|
* identifier that can be assumed unique.
|
||||||
* Return
|
* Return
|
||||||
* A 8-byte long non-decreasing number on success, or 0 if the
|
* A 8-byte long non-decreasing number on success, or 0 if the
|
||||||
* socket field is missing inside *skb*.
|
* socket field is missing inside *skb*.
|
||||||
@@ -1478,7 +1492,7 @@ union bpf_attr {
|
|||||||
* Return
|
* Return
|
||||||
* 0
|
* 0
|
||||||
*
|
*
|
||||||
* int bpf_setsockopt(struct bpf_sock_ops *bpf_socket, int level, int optname, char *optval, int optlen)
|
* int bpf_setsockopt(struct bpf_sock_ops *bpf_socket, int level, int optname, void *optval, int optlen)
|
||||||
* Description
|
* Description
|
||||||
* Emulate a call to **setsockopt()** on the socket associated to
|
* Emulate a call to **setsockopt()** on the socket associated to
|
||||||
* *bpf_socket*, which must be a full socket. The *level* at
|
* *bpf_socket*, which must be a full socket. The *level* at
|
||||||
@@ -1548,8 +1562,11 @@ union bpf_attr {
|
|||||||
* but this is only implemented for native XDP (with driver
|
* but this is only implemented for native XDP (with driver
|
||||||
* support) as of this writing).
|
* support) as of this writing).
|
||||||
*
|
*
|
||||||
* All values for *flags* are reserved for future usage, and must
|
* The lower two bits of *flags* are used as the return code if
|
||||||
* be left at zero.
|
* the map lookup fails. This is so that the return value can be
|
||||||
|
* one of the XDP program return codes up to XDP_TX, as chosen by
|
||||||
|
* the caller. Any higher bits in the *flags* argument must be
|
||||||
|
* unset.
|
||||||
*
|
*
|
||||||
* When used to redirect packets to net devices, this helper
|
* When used to redirect packets to net devices, this helper
|
||||||
* provides a high performance increase over **bpf_redirect**\ ().
|
* provides a high performance increase over **bpf_redirect**\ ().
|
||||||
@@ -1559,7 +1576,7 @@ union bpf_attr {
|
|||||||
* Return
|
* Return
|
||||||
* **XDP_REDIRECT** on success, or **XDP_ABORTED** on error.
|
* **XDP_REDIRECT** on success, or **XDP_ABORTED** on error.
|
||||||
*
|
*
|
||||||
* int bpf_sk_redirect_map(struct bpf_map *map, u32 key, u64 flags)
|
* int bpf_sk_redirect_map(struct sk_buff *skb, struct bpf_map *map, u32 key, u64 flags)
|
||||||
* Description
|
* Description
|
||||||
* Redirect the packet to the socket referenced by *map* (of type
|
* Redirect the packet to the socket referenced by *map* (of type
|
||||||
* **BPF_MAP_TYPE_SOCKMAP**) at index *key*. Both ingress and
|
* **BPF_MAP_TYPE_SOCKMAP**) at index *key*. Both ingress and
|
||||||
@@ -1679,7 +1696,7 @@ union bpf_attr {
|
|||||||
* Return
|
* Return
|
||||||
* 0 on success, or a negative error in case of failure.
|
* 0 on success, or a negative error in case of failure.
|
||||||
*
|
*
|
||||||
* int bpf_getsockopt(struct bpf_sock_ops *bpf_socket, int level, int optname, char *optval, int optlen)
|
* int bpf_getsockopt(struct bpf_sock_ops *bpf_socket, int level, int optname, void *optval, int optlen)
|
||||||
* Description
|
* Description
|
||||||
* Emulate a call to **getsockopt()** on the socket associated to
|
* Emulate a call to **getsockopt()** on the socket associated to
|
||||||
* *bpf_socket*, which must be a full socket. The *level* at
|
* *bpf_socket*, which must be a full socket. The *level* at
|
||||||
@@ -1698,7 +1715,7 @@ union bpf_attr {
|
|||||||
* Return
|
* Return
|
||||||
* 0 on success, or a negative error in case of failure.
|
* 0 on success, or a negative error in case of failure.
|
||||||
*
|
*
|
||||||
* int bpf_override_return(struct pt_reg *regs, u64 rc)
|
* int bpf_override_return(struct pt_regs *regs, u64 rc)
|
||||||
* Description
|
* Description
|
||||||
* Used for error injection, this helper uses kprobes to override
|
* Used for error injection, this helper uses kprobes to override
|
||||||
* the return value of the probed function, and to set it to *rc*.
|
* the return value of the probed function, and to set it to *rc*.
|
||||||
@@ -1744,6 +1761,7 @@ union bpf_attr {
|
|||||||
* * **BPF_SOCK_OPS_RTO_CB_FLAG** (retransmission time out)
|
* * **BPF_SOCK_OPS_RTO_CB_FLAG** (retransmission time out)
|
||||||
* * **BPF_SOCK_OPS_RETRANS_CB_FLAG** (retransmission)
|
* * **BPF_SOCK_OPS_RETRANS_CB_FLAG** (retransmission)
|
||||||
* * **BPF_SOCK_OPS_STATE_CB_FLAG** (TCP state change)
|
* * **BPF_SOCK_OPS_STATE_CB_FLAG** (TCP state change)
|
||||||
|
* * **BPF_SOCK_OPS_RTT_CB_FLAG** (every RTT)
|
||||||
*
|
*
|
||||||
* Therefore, this function can be used to clear a callback flag by
|
* Therefore, this function can be used to clear a callback flag by
|
||||||
* setting the appropriate bit to zero. e.g. to disable the RTO
|
* setting the appropriate bit to zero. e.g. to disable the RTO
|
||||||
@@ -1910,7 +1928,7 @@ union bpf_attr {
|
|||||||
* Return
|
* Return
|
||||||
* 0 on success, or a negative error in case of failure.
|
* 0 on success, or a negative error in case of failure.
|
||||||
*
|
*
|
||||||
* int bpf_get_stack(struct pt_regs *regs, void *buf, u32 size, u64 flags)
|
* int bpf_get_stack(void *ctx, void *buf, u32 size, u64 flags)
|
||||||
* Description
|
* Description
|
||||||
* Return a user or a kernel stack in bpf program provided buffer.
|
* Return a user or a kernel stack in bpf program provided buffer.
|
||||||
* To achieve this, the helper needs *ctx*, which is a pointer
|
* To achieve this, the helper needs *ctx*, which is a pointer
|
||||||
@@ -1943,7 +1961,7 @@ union bpf_attr {
|
|||||||
* A non-negative value equal to or less than *size* on success,
|
* A non-negative value equal to or less than *size* on success,
|
||||||
* or a negative error in case of failure.
|
* or a negative error in case of failure.
|
||||||
*
|
*
|
||||||
* int bpf_skb_load_bytes_relative(const struct sk_buff *skb, u32 offset, void *to, u32 len, u32 start_header)
|
* int bpf_skb_load_bytes_relative(const void *skb, u32 offset, void *to, u32 len, u32 start_header)
|
||||||
* Description
|
* Description
|
||||||
* This helper is similar to **bpf_skb_load_bytes**\ () in that
|
* This helper is similar to **bpf_skb_load_bytes**\ () in that
|
||||||
* it provides an easy way to load *len* bytes from *offset*
|
* it provides an easy way to load *len* bytes from *offset*
|
||||||
@@ -1996,7 +2014,7 @@ union bpf_attr {
|
|||||||
* * > 0 one of **BPF_FIB_LKUP_RET_** codes explaining why the
|
* * > 0 one of **BPF_FIB_LKUP_RET_** codes explaining why the
|
||||||
* packet is not forwarded or needs assist from full stack
|
* packet is not forwarded or needs assist from full stack
|
||||||
*
|
*
|
||||||
* int bpf_sock_hash_update(struct bpf_sock_ops_kern *skops, struct bpf_map *map, void *key, u64 flags)
|
* int bpf_sock_hash_update(struct bpf_sock_ops *skops, struct bpf_map *map, void *key, u64 flags)
|
||||||
* Description
|
* Description
|
||||||
* Add an entry to, or update a sockhash *map* referencing sockets.
|
* Add an entry to, or update a sockhash *map* referencing sockets.
|
||||||
* The *skops* is used as a new value for the entry associated to
|
* The *skops* is used as a new value for the entry associated to
|
||||||
@@ -2355,7 +2373,7 @@ union bpf_attr {
|
|||||||
* Return
|
* Return
|
||||||
* 0 on success, or a negative error in case of failure.
|
* 0 on success, or a negative error in case of failure.
|
||||||
*
|
*
|
||||||
* int bpf_msg_push_data(struct sk_buff *skb, u32 start, u32 len, u64 flags)
|
* int bpf_msg_push_data(struct sk_msg_buff *msg, u32 start, u32 len, u64 flags)
|
||||||
* Description
|
* Description
|
||||||
* For socket policies, insert *len* bytes into *msg* at offset
|
* For socket policies, insert *len* bytes into *msg* at offset
|
||||||
* *start*.
|
* *start*.
|
||||||
@@ -2371,9 +2389,9 @@ union bpf_attr {
|
|||||||
* Return
|
* Return
|
||||||
* 0 on success, or a negative error in case of failure.
|
* 0 on success, or a negative error in case of failure.
|
||||||
*
|
*
|
||||||
* int bpf_msg_pop_data(struct sk_msg_buff *msg, u32 start, u32 pop, u64 flags)
|
* int bpf_msg_pop_data(struct sk_msg_buff *msg, u32 start, u32 len, u64 flags)
|
||||||
* Description
|
* Description
|
||||||
* Will remove *pop* bytes from a *msg* starting at byte *start*.
|
* Will remove *len* bytes from a *msg* starting at byte *start*.
|
||||||
* This may result in **ENOMEM** errors under certain situations if
|
* This may result in **ENOMEM** errors under certain situations if
|
||||||
* an allocation and copy are required due to a full ring buffer.
|
* an allocation and copy are required due to a full ring buffer.
|
||||||
* However, the helper will try to avoid doing the allocation
|
* However, the helper will try to avoid doing the allocation
|
||||||
@@ -2468,7 +2486,7 @@ union bpf_attr {
|
|||||||
* A **struct bpf_tcp_sock** pointer on success, or **NULL** in
|
* A **struct bpf_tcp_sock** pointer on success, or **NULL** in
|
||||||
* case of failure.
|
* case of failure.
|
||||||
*
|
*
|
||||||
* int bpf_skb_ecn_set_ce(struct sk_buf *skb)
|
* int bpf_skb_ecn_set_ce(struct sk_buff *skb)
|
||||||
* Description
|
* Description
|
||||||
* Set ECN (Explicit Congestion Notification) field of IP header
|
* Set ECN (Explicit Congestion Notification) field of IP header
|
||||||
* to **CE** (Congestion Encountered) if current value is **ECT**
|
* to **CE** (Congestion Encountered) if current value is **ECT**
|
||||||
@@ -2672,6 +2690,137 @@ union bpf_attr {
|
|||||||
* 0 on success.
|
* 0 on success.
|
||||||
*
|
*
|
||||||
* **-ENOENT** if the bpf-local-storage cannot be found.
|
* **-ENOENT** if the bpf-local-storage cannot be found.
|
||||||
|
*
|
||||||
|
* int bpf_send_signal(u32 sig)
|
||||||
|
* Description
|
||||||
|
* Send signal *sig* to the current task.
|
||||||
|
* Return
|
||||||
|
* 0 on success or successfully queued.
|
||||||
|
*
|
||||||
|
* **-EBUSY** if work queue under nmi is full.
|
||||||
|
*
|
||||||
|
* **-EINVAL** if *sig* is invalid.
|
||||||
|
*
|
||||||
|
* **-EPERM** if no permission to send the *sig*.
|
||||||
|
*
|
||||||
|
* **-EAGAIN** if bpf program can try again.
|
||||||
|
*
|
||||||
|
* s64 bpf_tcp_gen_syncookie(struct bpf_sock *sk, void *iph, u32 iph_len, struct tcphdr *th, u32 th_len)
|
||||||
|
* Description
|
||||||
|
* Try to issue a SYN cookie for the packet with corresponding
|
||||||
|
* IP/TCP headers, *iph* and *th*, on the listening socket in *sk*.
|
||||||
|
*
|
||||||
|
* *iph* points to the start of the IPv4 or IPv6 header, while
|
||||||
|
* *iph_len* contains **sizeof**\ (**struct iphdr**) or
|
||||||
|
* **sizeof**\ (**struct ip6hdr**).
|
||||||
|
*
|
||||||
|
* *th* points to the start of the TCP header, while *th_len*
|
||||||
|
* contains the length of the TCP header.
|
||||||
|
*
|
||||||
|
* Return
|
||||||
|
* On success, lower 32 bits hold the generated SYN cookie in
|
||||||
|
* followed by 16 bits which hold the MSS value for that cookie,
|
||||||
|
* and the top 16 bits are unused.
|
||||||
|
*
|
||||||
|
* On failure, the returned value is one of the following:
|
||||||
|
*
|
||||||
|
* **-EINVAL** SYN cookie cannot be issued due to error
|
||||||
|
*
|
||||||
|
* **-ENOENT** SYN cookie should not be issued (no SYN flood)
|
||||||
|
*
|
||||||
|
* **-EOPNOTSUPP** kernel configuration does not enable SYN cookies
|
||||||
|
*
|
||||||
|
* **-EPROTONOSUPPORT** IP packet version is not 4 or 6
|
||||||
|
*
|
||||||
|
* int bpf_skb_output(void *ctx, struct bpf_map *map, u64 flags, void *data, u64 size)
|
||||||
|
* Description
|
||||||
|
* Write raw *data* blob into a special BPF perf event held by
|
||||||
|
* *map* of type **BPF_MAP_TYPE_PERF_EVENT_ARRAY**. This perf
|
||||||
|
* event must have the following attributes: **PERF_SAMPLE_RAW**
|
||||||
|
* as **sample_type**, **PERF_TYPE_SOFTWARE** as **type**, and
|
||||||
|
* **PERF_COUNT_SW_BPF_OUTPUT** as **config**.
|
||||||
|
*
|
||||||
|
* The *flags* are used to indicate the index in *map* for which
|
||||||
|
* the value must be put, masked with **BPF_F_INDEX_MASK**.
|
||||||
|
* Alternatively, *flags* can be set to **BPF_F_CURRENT_CPU**
|
||||||
|
* to indicate that the index of the current CPU core should be
|
||||||
|
* used.
|
||||||
|
*
|
||||||
|
* The value to write, of *size*, is passed through eBPF stack and
|
||||||
|
* pointed by *data*.
|
||||||
|
*
|
||||||
|
* *ctx* is a pointer to in-kernel struct sk_buff.
|
||||||
|
*
|
||||||
|
* This helper is similar to **bpf_perf_event_output**\ () but
|
||||||
|
* restricted to raw_tracepoint bpf programs.
|
||||||
|
* Return
|
||||||
|
* 0 on success, or a negative error in case of failure.
|
||||||
|
*
|
||||||
|
* int bpf_probe_read_user(void *dst, u32 size, const void *unsafe_ptr)
|
||||||
|
* Description
|
||||||
|
* Safely attempt to read *size* bytes from user space address
|
||||||
|
* *unsafe_ptr* and store the data in *dst*.
|
||||||
|
* Return
|
||||||
|
* 0 on success, or a negative error in case of failure.
|
||||||
|
*
|
||||||
|
* int bpf_probe_read_kernel(void *dst, u32 size, const void *unsafe_ptr)
|
||||||
|
* Description
|
||||||
|
* Safely attempt to read *size* bytes from kernel space address
|
||||||
|
* *unsafe_ptr* and store the data in *dst*.
|
||||||
|
* Return
|
||||||
|
* 0 on success, or a negative error in case of failure.
|
||||||
|
*
|
||||||
|
* int bpf_probe_read_user_str(void *dst, u32 size, const void *unsafe_ptr)
|
||||||
|
* Description
|
||||||
|
* Copy a NUL terminated string from an unsafe user address
|
||||||
|
* *unsafe_ptr* to *dst*. The *size* should include the
|
||||||
|
* terminating NUL byte. In case the string length is smaller than
|
||||||
|
* *size*, the target is not padded with further NUL bytes. If the
|
||||||
|
* string length is larger than *size*, just *size*-1 bytes are
|
||||||
|
* copied and the last byte is set to NUL.
|
||||||
|
*
|
||||||
|
* On success, the length of the copied string is returned. This
|
||||||
|
* makes this helper useful in tracing programs for reading
|
||||||
|
* strings, and more importantly to get its length at runtime. See
|
||||||
|
* the following snippet:
|
||||||
|
*
|
||||||
|
* ::
|
||||||
|
*
|
||||||
|
* SEC("kprobe/sys_open")
|
||||||
|
* void bpf_sys_open(struct pt_regs *ctx)
|
||||||
|
* {
|
||||||
|
* char buf[PATHLEN]; // PATHLEN is defined to 256
|
||||||
|
* int res = bpf_probe_read_user_str(buf, sizeof(buf),
|
||||||
|
* ctx->di);
|
||||||
|
*
|
||||||
|
* // Consume buf, for example push it to
|
||||||
|
* // userspace via bpf_perf_event_output(); we
|
||||||
|
* // can use res (the string length) as event
|
||||||
|
* // size, after checking its boundaries.
|
||||||
|
* }
|
||||||
|
*
|
||||||
|
* In comparison, using **bpf_probe_read_user()** helper here
|
||||||
|
* instead to read the string would require to estimate the length
|
||||||
|
* at compile time, and would often result in copying more memory
|
||||||
|
* than necessary.
|
||||||
|
*
|
||||||
|
* Another useful use case is when parsing individual process
|
||||||
|
* arguments or individual environment variables navigating
|
||||||
|
* *current*\ **->mm->arg_start** and *current*\
|
||||||
|
* **->mm->env_start**: using this helper and the return value,
|
||||||
|
* one can quickly iterate at the right offset of the memory area.
|
||||||
|
* Return
|
||||||
|
* On success, the strictly positive length of the string,
|
||||||
|
* including the trailing NUL character. On error, a negative
|
||||||
|
* value.
|
||||||
|
*
|
||||||
|
* int bpf_probe_read_kernel_str(void *dst, u32 size, const void *unsafe_ptr)
|
||||||
|
* Description
|
||||||
|
* Copy a NUL terminated string from an unsafe kernel address *unsafe_ptr*
|
||||||
|
* to *dst*. Same semantics as with bpf_probe_read_user_str() apply.
|
||||||
|
* Return
|
||||||
|
* On success, the strictly positive length of the string, including
|
||||||
|
* the trailing NUL character. On error, a negative value.
|
||||||
*/
|
*/
|
||||||
#define __BPF_FUNC_MAPPER(FN) \
|
#define __BPF_FUNC_MAPPER(FN) \
|
||||||
FN(unspec), \
|
FN(unspec), \
|
||||||
@@ -2782,7 +2931,14 @@ union bpf_attr {
|
|||||||
FN(strtol), \
|
FN(strtol), \
|
||||||
FN(strtoul), \
|
FN(strtoul), \
|
||||||
FN(sk_storage_get), \
|
FN(sk_storage_get), \
|
||||||
FN(sk_storage_delete),
|
FN(sk_storage_delete), \
|
||||||
|
FN(send_signal), \
|
||||||
|
FN(tcp_gen_syncookie), \
|
||||||
|
FN(skb_output), \
|
||||||
|
FN(probe_read_user), \
|
||||||
|
FN(probe_read_kernel), \
|
||||||
|
FN(probe_read_user_str), \
|
||||||
|
FN(probe_read_kernel_str),
|
||||||
|
|
||||||
/* integer value in 'imm' field of BPF_CALL instruction selects which helper
|
/* integer value in 'imm' field of BPF_CALL instruction selects which helper
|
||||||
* function eBPF program intends to call
|
* function eBPF program intends to call
|
||||||
@@ -3031,6 +3187,12 @@ struct bpf_tcp_sock {
|
|||||||
* sum(delta(snd_una)), or how many bytes
|
* sum(delta(snd_una)), or how many bytes
|
||||||
* were acked.
|
* were acked.
|
||||||
*/
|
*/
|
||||||
|
__u32 dsack_dups; /* RFC4898 tcpEStatsStackDSACKDups
|
||||||
|
* total number of DSACK blocks received
|
||||||
|
*/
|
||||||
|
__u32 delivered; /* Total data packets delivered incl. rexmits */
|
||||||
|
__u32 delivered_ce; /* Like the above but only ECE marked packets */
|
||||||
|
__u32 icsk_retransmits; /* Number of unrecovered [RTO] timeouts */
|
||||||
};
|
};
|
||||||
|
|
||||||
struct bpf_sock_tuple {
|
struct bpf_sock_tuple {
|
||||||
@@ -3050,6 +3212,10 @@ struct bpf_sock_tuple {
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
struct bpf_xdp_sock {
|
||||||
|
__u32 queue_id;
|
||||||
|
};
|
||||||
|
|
||||||
#define XDP_PACKET_HEADROOM 256
|
#define XDP_PACKET_HEADROOM 256
|
||||||
|
|
||||||
/* User return codes for XDP prog type.
|
/* User return codes for XDP prog type.
|
||||||
@@ -3141,6 +3307,7 @@ struct bpf_prog_info {
|
|||||||
char name[BPF_OBJ_NAME_LEN];
|
char name[BPF_OBJ_NAME_LEN];
|
||||||
__u32 ifindex;
|
__u32 ifindex;
|
||||||
__u32 gpl_compatible:1;
|
__u32 gpl_compatible:1;
|
||||||
|
__u32 :31; /* alignment pad */
|
||||||
__u64 netns_dev;
|
__u64 netns_dev;
|
||||||
__u64 netns_ino;
|
__u64 netns_ino;
|
||||||
__u32 nr_jited_ksyms;
|
__u32 nr_jited_ksyms;
|
||||||
@@ -3195,7 +3362,7 @@ struct bpf_sock_addr {
|
|||||||
__u32 user_ip4; /* Allows 1,2,4-byte read and 4-byte write.
|
__u32 user_ip4; /* Allows 1,2,4-byte read and 4-byte write.
|
||||||
* Stored in network byte order.
|
* Stored in network byte order.
|
||||||
*/
|
*/
|
||||||
__u32 user_ip6[4]; /* Allows 1,2,4-byte read an 4-byte write.
|
__u32 user_ip6[4]; /* Allows 1,2,4,8-byte read and 4,8-byte write.
|
||||||
* Stored in network byte order.
|
* Stored in network byte order.
|
||||||
*/
|
*/
|
||||||
__u32 user_port; /* Allows 4-byte read and write.
|
__u32 user_port; /* Allows 4-byte read and write.
|
||||||
@@ -3204,12 +3371,13 @@ struct bpf_sock_addr {
|
|||||||
__u32 family; /* Allows 4-byte read, but no write */
|
__u32 family; /* Allows 4-byte read, but no write */
|
||||||
__u32 type; /* Allows 4-byte read, but no write */
|
__u32 type; /* Allows 4-byte read, but no write */
|
||||||
__u32 protocol; /* Allows 4-byte read, but no write */
|
__u32 protocol; /* Allows 4-byte read, but no write */
|
||||||
__u32 msg_src_ip4; /* Allows 1,2,4-byte read an 4-byte write.
|
__u32 msg_src_ip4; /* Allows 1,2,4-byte read and 4-byte write.
|
||||||
* Stored in network byte order.
|
* Stored in network byte order.
|
||||||
*/
|
*/
|
||||||
__u32 msg_src_ip6[4]; /* Allows 1,2,4-byte read an 4-byte write.
|
__u32 msg_src_ip6[4]; /* Allows 1,2,4,8-byte read and 4,8-byte write.
|
||||||
* Stored in network byte order.
|
* Stored in network byte order.
|
||||||
*/
|
*/
|
||||||
|
__bpf_md_ptr(struct bpf_sock *, sk);
|
||||||
};
|
};
|
||||||
|
|
||||||
/* User bpf_sock_ops struct to access socket values and specify request ops
|
/* User bpf_sock_ops struct to access socket values and specify request ops
|
||||||
@@ -3261,13 +3429,15 @@ struct bpf_sock_ops {
|
|||||||
__u32 sk_txhash;
|
__u32 sk_txhash;
|
||||||
__u64 bytes_received;
|
__u64 bytes_received;
|
||||||
__u64 bytes_acked;
|
__u64 bytes_acked;
|
||||||
|
__bpf_md_ptr(struct bpf_sock *, sk);
|
||||||
};
|
};
|
||||||
|
|
||||||
/* Definitions for bpf_sock_ops_cb_flags */
|
/* Definitions for bpf_sock_ops_cb_flags */
|
||||||
#define BPF_SOCK_OPS_RTO_CB_FLAG (1<<0)
|
#define BPF_SOCK_OPS_RTO_CB_FLAG (1<<0)
|
||||||
#define BPF_SOCK_OPS_RETRANS_CB_FLAG (1<<1)
|
#define BPF_SOCK_OPS_RETRANS_CB_FLAG (1<<1)
|
||||||
#define BPF_SOCK_OPS_STATE_CB_FLAG (1<<2)
|
#define BPF_SOCK_OPS_STATE_CB_FLAG (1<<2)
|
||||||
#define BPF_SOCK_OPS_ALL_CB_FLAGS 0x7 /* Mask of all currently
|
#define BPF_SOCK_OPS_RTT_CB_FLAG (1<<3)
|
||||||
|
#define BPF_SOCK_OPS_ALL_CB_FLAGS 0xF /* Mask of all currently
|
||||||
* supported cb flags
|
* supported cb flags
|
||||||
*/
|
*/
|
||||||
|
|
||||||
@@ -3322,6 +3492,8 @@ enum {
|
|||||||
BPF_SOCK_OPS_TCP_LISTEN_CB, /* Called on listen(2), right after
|
BPF_SOCK_OPS_TCP_LISTEN_CB, /* Called on listen(2), right after
|
||||||
* socket transition to LISTEN state.
|
* socket transition to LISTEN state.
|
||||||
*/
|
*/
|
||||||
|
BPF_SOCK_OPS_RTT_CB, /* Called on every RTT.
|
||||||
|
*/
|
||||||
};
|
};
|
||||||
|
|
||||||
/* List of TCP states. There is a build check in net/ipv4/tcp.c to detect
|
/* List of TCP states. There is a build check in net/ipv4/tcp.c to detect
|
||||||
@@ -3376,8 +3548,8 @@ struct bpf_raw_tracepoint_args {
|
|||||||
/* DIRECT: Skip the FIB rules and go to FIB table associated with device
|
/* DIRECT: Skip the FIB rules and go to FIB table associated with device
|
||||||
* OUTPUT: Do lookup from egress perspective; default is ingress
|
* OUTPUT: Do lookup from egress perspective; default is ingress
|
||||||
*/
|
*/
|
||||||
#define BPF_FIB_LOOKUP_DIRECT BIT(0)
|
#define BPF_FIB_LOOKUP_DIRECT (1U << 0)
|
||||||
#define BPF_FIB_LOOKUP_OUTPUT BIT(1)
|
#define BPF_FIB_LOOKUP_OUTPUT (1U << 1)
|
||||||
|
|
||||||
enum {
|
enum {
|
||||||
BPF_FIB_LKUP_RET_SUCCESS, /* lookup successful */
|
BPF_FIB_LKUP_RET_SUCCESS, /* lookup successful */
|
||||||
@@ -3449,6 +3621,10 @@ enum bpf_task_fd_type {
|
|||||||
BPF_FD_TYPE_URETPROBE, /* filename + offset */
|
BPF_FD_TYPE_URETPROBE, /* filename + offset */
|
||||||
};
|
};
|
||||||
|
|
||||||
|
#define BPF_FLOW_DISSECTOR_F_PARSE_1ST_FRAG (1U << 0)
|
||||||
|
#define BPF_FLOW_DISSECTOR_F_STOP_AT_FLOW_LABEL (1U << 1)
|
||||||
|
#define BPF_FLOW_DISSECTOR_F_STOP_AT_ENCAP (1U << 2)
|
||||||
|
|
||||||
struct bpf_flow_keys {
|
struct bpf_flow_keys {
|
||||||
__u16 nhoff;
|
__u16 nhoff;
|
||||||
__u16 thoff;
|
__u16 thoff;
|
||||||
@@ -3470,6 +3646,8 @@ struct bpf_flow_keys {
|
|||||||
__u32 ipv6_dst[4]; /* in6_addr; network order */
|
__u32 ipv6_dst[4]; /* in6_addr; network order */
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
__u32 flags;
|
||||||
|
__be32 flow_label;
|
||||||
};
|
};
|
||||||
|
|
||||||
struct bpf_func_info {
|
struct bpf_func_info {
|
||||||
@@ -3500,4 +3678,15 @@ struct bpf_sysctl {
|
|||||||
*/
|
*/
|
||||||
};
|
};
|
||||||
|
|
||||||
|
struct bpf_sockopt {
|
||||||
|
__bpf_md_ptr(struct bpf_sock *, sk);
|
||||||
|
__bpf_md_ptr(void *, optval);
|
||||||
|
__bpf_md_ptr(void *, optval_end);
|
||||||
|
|
||||||
|
__s32 level;
|
||||||
|
__s32 optname;
|
||||||
|
__s32 optlen;
|
||||||
|
__s32 retval;
|
||||||
|
};
|
||||||
|
|
||||||
#endif /* _UAPI__LINUX_BPF_H__ */
|
#endif /* _UAPI__LINUX_BPF_H__ */
|
||||||
|
|||||||
@@ -167,6 +167,8 @@ enum {
|
|||||||
IFLA_NEW_IFINDEX,
|
IFLA_NEW_IFINDEX,
|
||||||
IFLA_MIN_MTU,
|
IFLA_MIN_MTU,
|
||||||
IFLA_MAX_MTU,
|
IFLA_MAX_MTU,
|
||||||
|
IFLA_PROP_LIST,
|
||||||
|
IFLA_ALT_IFNAME, /* Alternative ifname */
|
||||||
__IFLA_MAX
|
__IFLA_MAX
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -636,6 +638,7 @@ enum {
|
|||||||
IFLA_BOND_AD_USER_PORT_KEY,
|
IFLA_BOND_AD_USER_PORT_KEY,
|
||||||
IFLA_BOND_AD_ACTOR_SYSTEM,
|
IFLA_BOND_AD_ACTOR_SYSTEM,
|
||||||
IFLA_BOND_TLB_DYNAMIC_LB,
|
IFLA_BOND_TLB_DYNAMIC_LB,
|
||||||
|
IFLA_BOND_PEER_NOTIF_DELAY,
|
||||||
__IFLA_BOND_MAX,
|
__IFLA_BOND_MAX,
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -694,6 +697,7 @@ enum {
|
|||||||
IFLA_VF_IB_NODE_GUID, /* VF Infiniband node GUID */
|
IFLA_VF_IB_NODE_GUID, /* VF Infiniband node GUID */
|
||||||
IFLA_VF_IB_PORT_GUID, /* VF Infiniband port GUID */
|
IFLA_VF_IB_PORT_GUID, /* VF Infiniband port GUID */
|
||||||
IFLA_VF_VLAN_LIST, /* nested list of vlans, option for QinQ */
|
IFLA_VF_VLAN_LIST, /* nested list of vlans, option for QinQ */
|
||||||
|
IFLA_VF_BROADCAST, /* VF broadcast */
|
||||||
__IFLA_VF_MAX,
|
__IFLA_VF_MAX,
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -704,6 +708,10 @@ struct ifla_vf_mac {
|
|||||||
__u8 mac[32]; /* MAX_ADDR_LEN */
|
__u8 mac[32]; /* MAX_ADDR_LEN */
|
||||||
};
|
};
|
||||||
|
|
||||||
|
struct ifla_vf_broadcast {
|
||||||
|
__u8 broadcast[32];
|
||||||
|
};
|
||||||
|
|
||||||
struct ifla_vf_vlan {
|
struct ifla_vf_vlan {
|
||||||
__u32 vf;
|
__u32 vf;
|
||||||
__u32 vlan; /* 0 - 4095, 0 disables VLAN filter */
|
__u32 vlan; /* 0 - 4095, 0 disables VLAN filter */
|
||||||
|
|||||||
@@ -16,6 +16,18 @@
|
|||||||
#define XDP_SHARED_UMEM (1 << 0)
|
#define XDP_SHARED_UMEM (1 << 0)
|
||||||
#define XDP_COPY (1 << 1) /* Force copy-mode */
|
#define XDP_COPY (1 << 1) /* Force copy-mode */
|
||||||
#define XDP_ZEROCOPY (1 << 2) /* Force zero-copy mode */
|
#define XDP_ZEROCOPY (1 << 2) /* Force zero-copy mode */
|
||||||
|
/* If this option is set, the driver might go sleep and in that case
|
||||||
|
* the XDP_RING_NEED_WAKEUP flag in the fill and/or Tx rings will be
|
||||||
|
* set. If it is set, the application need to explicitly wake up the
|
||||||
|
* driver with a poll() (Rx and Tx) or sendto() (Tx only). If you are
|
||||||
|
* running the driver and the application on the same core, you should
|
||||||
|
* use this option so that the kernel will yield to the user space
|
||||||
|
* application.
|
||||||
|
*/
|
||||||
|
#define XDP_USE_NEED_WAKEUP (1 << 3)
|
||||||
|
|
||||||
|
/* Flags for xsk_umem_config flags */
|
||||||
|
#define XDP_UMEM_UNALIGNED_CHUNK_FLAG (1 << 0)
|
||||||
|
|
||||||
struct sockaddr_xdp {
|
struct sockaddr_xdp {
|
||||||
__u16 sxdp_family;
|
__u16 sxdp_family;
|
||||||
@@ -25,10 +37,14 @@ struct sockaddr_xdp {
|
|||||||
__u32 sxdp_shared_umem_fd;
|
__u32 sxdp_shared_umem_fd;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
/* XDP_RING flags */
|
||||||
|
#define XDP_RING_NEED_WAKEUP (1 << 0)
|
||||||
|
|
||||||
struct xdp_ring_offset {
|
struct xdp_ring_offset {
|
||||||
__u64 producer;
|
__u64 producer;
|
||||||
__u64 consumer;
|
__u64 consumer;
|
||||||
__u64 desc;
|
__u64 desc;
|
||||||
|
__u64 flags;
|
||||||
};
|
};
|
||||||
|
|
||||||
struct xdp_mmap_offsets {
|
struct xdp_mmap_offsets {
|
||||||
@@ -46,12 +62,14 @@ struct xdp_mmap_offsets {
|
|||||||
#define XDP_UMEM_FILL_RING 5
|
#define XDP_UMEM_FILL_RING 5
|
||||||
#define XDP_UMEM_COMPLETION_RING 6
|
#define XDP_UMEM_COMPLETION_RING 6
|
||||||
#define XDP_STATISTICS 7
|
#define XDP_STATISTICS 7
|
||||||
|
#define XDP_OPTIONS 8
|
||||||
|
|
||||||
struct xdp_umem_reg {
|
struct xdp_umem_reg {
|
||||||
__u64 addr; /* Start of packet data area */
|
__u64 addr; /* Start of packet data area */
|
||||||
__u64 len; /* Length of packet data area */
|
__u64 len; /* Length of packet data area */
|
||||||
__u32 chunk_size;
|
__u32 chunk_size;
|
||||||
__u32 headroom;
|
__u32 headroom;
|
||||||
|
__u32 flags;
|
||||||
};
|
};
|
||||||
|
|
||||||
struct xdp_statistics {
|
struct xdp_statistics {
|
||||||
@@ -60,12 +78,24 @@ struct xdp_statistics {
|
|||||||
__u64 tx_invalid_descs; /* Dropped due to invalid descriptor */
|
__u64 tx_invalid_descs; /* Dropped due to invalid descriptor */
|
||||||
};
|
};
|
||||||
|
|
||||||
|
struct xdp_options {
|
||||||
|
__u32 flags;
|
||||||
|
};
|
||||||
|
|
||||||
|
/* Flags for the flags field of struct xdp_options */
|
||||||
|
#define XDP_OPTIONS_ZEROCOPY (1 << 0)
|
||||||
|
|
||||||
/* Pgoff for mmaping the rings */
|
/* Pgoff for mmaping the rings */
|
||||||
#define XDP_PGOFF_RX_RING 0
|
#define XDP_PGOFF_RX_RING 0
|
||||||
#define XDP_PGOFF_TX_RING 0x80000000
|
#define XDP_PGOFF_TX_RING 0x80000000
|
||||||
#define XDP_UMEM_PGOFF_FILL_RING 0x100000000ULL
|
#define XDP_UMEM_PGOFF_FILL_RING 0x100000000ULL
|
||||||
#define XDP_UMEM_PGOFF_COMPLETION_RING 0x180000000ULL
|
#define XDP_UMEM_PGOFF_COMPLETION_RING 0x180000000ULL
|
||||||
|
|
||||||
|
/* Masks for unaligned chunks mode */
|
||||||
|
#define XSK_UNALIGNED_BUF_OFFSET_SHIFT 48
|
||||||
|
#define XSK_UNALIGNED_BUF_ADDR_MASK \
|
||||||
|
((1ULL << XSK_UNALIGNED_BUF_OFFSET_SHIFT) - 1)
|
||||||
|
|
||||||
/* Rx/Tx descriptor */
|
/* Rx/Tx descriptor */
|
||||||
struct xdp_desc {
|
struct xdp_desc {
|
||||||
__u64 addr;
|
__u64 addr;
|
||||||
|
|||||||
95
meson.build
95
meson.build
@@ -1,95 +0,0 @@
|
|||||||
# SPDX-License-Identifier: LGPL-2.1 OR BSD-2-Clause
|
|
||||||
project('libbpf', 'c',
|
|
||||||
version : '0.0.3',
|
|
||||||
license : 'LGPL-2.1 OR BSD-2-Clause',
|
|
||||||
default_options : [
|
|
||||||
'prefix=/usr',
|
|
||||||
],
|
|
||||||
meson_version : '>= 0.46',
|
|
||||||
)
|
|
||||||
|
|
||||||
patchlevel = meson.project_version().split('.')[1]
|
|
||||||
|
|
||||||
libbpf_source_dir = './'
|
|
||||||
|
|
||||||
libbpf_sources = files(run_command('find',
|
|
||||||
[
|
|
||||||
'@0@/src'.format(libbpf_source_dir),
|
|
||||||
'-type',
|
|
||||||
'f',
|
|
||||||
'-name',
|
|
||||||
'*.[h|c]']).stdout().split())
|
|
||||||
|
|
||||||
libbpf_headers = files(
|
|
||||||
join_paths(libbpf_source_dir, 'src/bpf.h'),
|
|
||||||
join_paths(libbpf_source_dir, 'src/btf.h'),
|
|
||||||
join_paths(libbpf_source_dir, 'src/libbpf.h'))
|
|
||||||
|
|
||||||
feature_rellocarray = run_command(join_paths(libbpf_source_dir, 'scripts/check-reallocarray.sh'))
|
|
||||||
|
|
||||||
libbpf_c_args = ['-g',
|
|
||||||
'-O2',
|
|
||||||
'-Werror',
|
|
||||||
'-Wall',
|
|
||||||
]
|
|
||||||
|
|
||||||
if feature_rellocarray.stdout().strip() != ''
|
|
||||||
libbpf_c_args += '-DCOMPAT_NEED_REALLOCARRAY'
|
|
||||||
endif
|
|
||||||
|
|
||||||
# bpf_includes are required to include bpf.h, btf.h, libbpf.h
|
|
||||||
bpf_includes = include_directories(
|
|
||||||
join_paths(libbpf_source_dir, 'src'))
|
|
||||||
|
|
||||||
libbpf_includes = include_directories(
|
|
||||||
join_paths(libbpf_source_dir, 'include'),
|
|
||||||
join_paths(libbpf_source_dir, 'include/uapi'))
|
|
||||||
|
|
||||||
libelf = dependency('libelf')
|
|
||||||
libelf = dependency('libelf', required: false)
|
|
||||||
if not libelf.found()
|
|
||||||
libelf = cc.find_library('elf', required: true)
|
|
||||||
endif
|
|
||||||
|
|
||||||
deps = [libelf]
|
|
||||||
|
|
||||||
libbpf_static = static_library(
|
|
||||||
'bpf',
|
|
||||||
libbpf_sources,
|
|
||||||
c_args : libbpf_c_args,
|
|
||||||
dependencies : deps,
|
|
||||||
include_directories : libbpf_includes,
|
|
||||||
install : true)
|
|
||||||
|
|
||||||
libbpf_static_dep = declare_dependency(link_with : libbpf_static)
|
|
||||||
|
|
||||||
libbpf_map_source_path = join_paths(libbpf_source_dir, 'src/libbpf.map')
|
|
||||||
libbpf_map_abs_path = join_paths(meson.current_source_dir(), libbpf_map_source_path)
|
|
||||||
|
|
||||||
libbpf_c_args += ['-fPIC', '-fvisibility=hidden']
|
|
||||||
|
|
||||||
libbpf_link_args = ['-Wl,--version-script=@0@'.format(libbpf_map_abs_path)]
|
|
||||||
|
|
||||||
libbpf_shared = shared_library(
|
|
||||||
'bpf',
|
|
||||||
libbpf_sources,
|
|
||||||
c_args : libbpf_c_args,
|
|
||||||
dependencies : deps,
|
|
||||||
include_directories : libbpf_includes,
|
|
||||||
install : true,
|
|
||||||
link_args : libbpf_link_args,
|
|
||||||
link_depends : libbpf_map_source_path,
|
|
||||||
soversion : patchlevel,
|
|
||||||
version : meson.project_version())
|
|
||||||
|
|
||||||
libbpf_shared_dep = declare_dependency(link_with : libbpf_shared)
|
|
||||||
|
|
||||||
install_headers(libbpf_headers, subdir : 'bpf')
|
|
||||||
|
|
||||||
pkg = import('pkgconfig')
|
|
||||||
pkg.generate(
|
|
||||||
name: meson.project_name(),
|
|
||||||
version: meson.project_version(),
|
|
||||||
libraries: libbpf_shared,
|
|
||||||
requires_private: ['libelf'],
|
|
||||||
description: '''BPF library''')
|
|
||||||
105
scripts/coverity.sh
Executable file
105
scripts/coverity.sh
Executable file
@@ -0,0 +1,105 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
# Taken from: https://scan.coverity.com/scripts/travisci_build_coverity_scan.sh
|
||||||
|
# Local changes are annotated with "#[local]"
|
||||||
|
|
||||||
|
set -e
|
||||||
|
|
||||||
|
# Environment check
|
||||||
|
echo -e "\033[33;1mNote: COVERITY_SCAN_PROJECT_NAME and COVERITY_SCAN_TOKEN are available on Project Settings page on scan.coverity.com\033[0m"
|
||||||
|
[ -z "$COVERITY_SCAN_PROJECT_NAME" ] && echo "ERROR: COVERITY_SCAN_PROJECT_NAME must be set" && exit 1
|
||||||
|
[ -z "$COVERITY_SCAN_NOTIFICATION_EMAIL" ] && echo "ERROR: COVERITY_SCAN_NOTIFICATION_EMAIL must be set" && exit 1
|
||||||
|
[ -z "$COVERITY_SCAN_BRANCH_PATTERN" ] && echo "ERROR: COVERITY_SCAN_BRANCH_PATTERN must be set" && exit 1
|
||||||
|
[ -z "$COVERITY_SCAN_BUILD_COMMAND" ] && echo "ERROR: COVERITY_SCAN_BUILD_COMMAND must be set" && exit 1
|
||||||
|
[ -z "$COVERITY_SCAN_TOKEN" ] && echo "ERROR: COVERITY_SCAN_TOKEN must be set" && exit 1
|
||||||
|
|
||||||
|
PLATFORM=`uname`
|
||||||
|
#[local] Use /var/tmp for TOOL_ARCHIVE and TOOL_BASE, as on certain systems
|
||||||
|
# /tmp is tmpfs and is sometimes too small to handle all necessary tooling
|
||||||
|
TOOL_ARCHIVE=/var//tmp/cov-analysis-${PLATFORM}.tgz
|
||||||
|
TOOL_URL=https://scan.coverity.com/download/${PLATFORM}
|
||||||
|
TOOL_BASE=/var/tmp/coverity-scan-analysis
|
||||||
|
UPLOAD_URL="https://scan.coverity.com/builds"
|
||||||
|
SCAN_URL="https://scan.coverity.com"
|
||||||
|
|
||||||
|
# Do not run on pull requests
|
||||||
|
if [ "${TRAVIS_PULL_REQUEST}" = "true" ]; then
|
||||||
|
echo -e "\033[33;1mINFO: Skipping Coverity Analysis: branch is a pull request.\033[0m"
|
||||||
|
exit 0
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Verify this branch should run
|
||||||
|
IS_COVERITY_SCAN_BRANCH=`ruby -e "puts '${TRAVIS_BRANCH}' =~ /\\A$COVERITY_SCAN_BRANCH_PATTERN\\z/ ? 1 : 0"`
|
||||||
|
if [ "$IS_COVERITY_SCAN_BRANCH" = "1" ]; then
|
||||||
|
echo -e "\033[33;1mCoverity Scan configured to run on branch ${TRAVIS_BRANCH}\033[0m"
|
||||||
|
else
|
||||||
|
echo -e "\033[33;1mCoverity Scan NOT configured to run on branch ${TRAVIS_BRANCH}\033[0m"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Verify upload is permitted
|
||||||
|
AUTH_RES=`curl -s --form project="$COVERITY_SCAN_PROJECT_NAME" --form token="$COVERITY_SCAN_TOKEN" $SCAN_URL/api/upload_permitted`
|
||||||
|
if [ "$AUTH_RES" = "Access denied" ]; then
|
||||||
|
echo -e "\033[33;1mCoverity Scan API access denied. Check COVERITY_SCAN_PROJECT_NAME and COVERITY_SCAN_TOKEN.\033[0m"
|
||||||
|
exit 1
|
||||||
|
else
|
||||||
|
AUTH=`echo $AUTH_RES | ruby -e "require 'rubygems'; require 'json'; puts JSON[STDIN.read]['upload_permitted']"`
|
||||||
|
if [ "$AUTH" = "true" ]; then
|
||||||
|
echo -e "\033[33;1mCoverity Scan analysis authorized per quota.\033[0m"
|
||||||
|
else
|
||||||
|
WHEN=`echo $AUTH_RES | ruby -e "require 'rubygems'; require 'json'; puts JSON[STDIN.read]['next_upload_permitted_at']"`
|
||||||
|
echo -e "\033[33;1mCoverity Scan analysis NOT authorized until $WHEN.\033[0m"
|
||||||
|
exit 0
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ ! -d $TOOL_BASE ]; then
|
||||||
|
# Download Coverity Scan Analysis Tool
|
||||||
|
if [ ! -e $TOOL_ARCHIVE ]; then
|
||||||
|
echo -e "\033[33;1mDownloading Coverity Scan Analysis Tool...\033[0m"
|
||||||
|
wget -nv -O $TOOL_ARCHIVE $TOOL_URL --post-data "project=$COVERITY_SCAN_PROJECT_NAME&token=$COVERITY_SCAN_TOKEN"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Extract Coverity Scan Analysis Tool
|
||||||
|
echo -e "\033[33;1mExtracting Coverity Scan Analysis Tool...\033[0m"
|
||||||
|
mkdir -p $TOOL_BASE
|
||||||
|
pushd $TOOL_BASE
|
||||||
|
tar xzf $TOOL_ARCHIVE
|
||||||
|
popd
|
||||||
|
fi
|
||||||
|
|
||||||
|
TOOL_DIR=`find $TOOL_BASE -type d -name 'cov-analysis*'`
|
||||||
|
export PATH=$TOOL_DIR/bin:$PATH
|
||||||
|
|
||||||
|
# Build
|
||||||
|
echo -e "\033[33;1mRunning Coverity Scan Analysis Tool...\033[0m"
|
||||||
|
COV_BUILD_OPTIONS=""
|
||||||
|
#COV_BUILD_OPTIONS="--return-emit-failures 8 --parse-error-threshold 85"
|
||||||
|
RESULTS_DIR="cov-int"
|
||||||
|
eval "${COVERITY_SCAN_BUILD_COMMAND_PREPEND}"
|
||||||
|
COVERITY_UNSUPPORTED=1 cov-build --dir $RESULTS_DIR $COV_BUILD_OPTIONS $COVERITY_SCAN_BUILD_COMMAND
|
||||||
|
cov-import-scm --dir $RESULTS_DIR --scm git --log $RESULTS_DIR/scm_log.txt 2>&1
|
||||||
|
|
||||||
|
# Upload results
|
||||||
|
echo -e "\033[33;1mTarring Coverity Scan Analysis results...\033[0m"
|
||||||
|
RESULTS_ARCHIVE=analysis-results.tgz
|
||||||
|
tar czf $RESULTS_ARCHIVE $RESULTS_DIR
|
||||||
|
SHA=`git rev-parse --short HEAD`
|
||||||
|
|
||||||
|
echo -e "\033[33;1mUploading Coverity Scan Analysis results...\033[0m"
|
||||||
|
response=$(curl \
|
||||||
|
--silent --write-out "\n%{http_code}\n" \
|
||||||
|
--form project=$COVERITY_SCAN_PROJECT_NAME \
|
||||||
|
--form token=$COVERITY_SCAN_TOKEN \
|
||||||
|
--form email=$COVERITY_SCAN_NOTIFICATION_EMAIL \
|
||||||
|
--form file=@$RESULTS_ARCHIVE \
|
||||||
|
--form version=$SHA \
|
||||||
|
--form description="Travis CI build" \
|
||||||
|
$UPLOAD_URL)
|
||||||
|
status_code=$(echo "$response" | sed -n '$p')
|
||||||
|
#[local] Coverity used to return 201 on success, but it's 200 now
|
||||||
|
# See https://github.com/systemd/systemd/blob/master/tools/coverity.sh#L145
|
||||||
|
if [ "$status_code" != "200" ]; then
|
||||||
|
TEXT=$(echo "$response" | sed '$d')
|
||||||
|
echo -e "\033[33;1mCoverity Scan upload failed: $TEXT.\033[0m"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
@@ -1,40 +1,212 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
usage () {
|
usage () {
|
||||||
echo "USAGE: ./sync-kernel.sh <kernel-repo> <libbpf-repo> [<baseline-commit>]"
|
echo "USAGE: ./sync-kernel.sh <libbpf-repo> <kernel-repo> <bpf-branch>"
|
||||||
echo ""
|
echo ""
|
||||||
echo "If <baseline-commit> is not specified, it's read from <libbpf-repo>/CHECKPOINT-COMMIT"
|
echo "Set BPF_NEXT_BASELINE to override bpf-next tree commit, otherwise read from <libbpf-repo>/CHECKPOINT-COMMIT."
|
||||||
exit 1
|
echo "Set BPF_BASELINE to override bpf tree commit, otherwise read from <libbpf-repo>/BPF-CHECKPOINT-COMMIT."
|
||||||
|
echo "Set MANUAL_MODE to 1 to manually control every cherry-picked commits."
|
||||||
|
echo "Set IGNORE_CONSISTENCY to 1 to ignore failed contents consistency check."
|
||||||
|
exit 1
|
||||||
}
|
}
|
||||||
|
|
||||||
LINUX_REPO=${1-""}
|
|
||||||
LIBBPF_REPO=${2-""}
|
|
||||||
|
|
||||||
if [ -z "${LINUX_REPO}" ]; then
|
|
||||||
usage
|
|
||||||
fi
|
|
||||||
if [ -z "${LIBBPF_REPO}" ]; then
|
|
||||||
usage
|
|
||||||
fi
|
|
||||||
|
|
||||||
set -eu
|
set -eu
|
||||||
|
|
||||||
WORKDIR=$(pwd)
|
LIBBPF_REPO=${1-""}
|
||||||
trap "cd ${WORKDIR}; exit" INT TERM EXIT
|
LINUX_REPO=${2-""}
|
||||||
|
BPF_BRANCH=${3-""}
|
||||||
|
BASELINE_COMMIT=${BPF_NEXT_BASELINE:-$(cat ${LIBBPF_REPO}/CHECKPOINT-COMMIT)}
|
||||||
|
BPF_BASELINE_COMMIT=${BPF_BASELINE:-$(cat ${LIBBPF_REPO}/BPF-CHECKPOINT-COMMIT)}
|
||||||
|
|
||||||
echo "WORKDIR: ${WORKDIR}"
|
if [ -z "${LIBBPF_REPO}" ] || [ -z "${LINUX_REPO}" ] || [ -z "${BPF_BRANCH}" ]; then
|
||||||
echo "LINUX REPO: ${LINUX_REPO}"
|
echo "Error: libbpf or linux repos are not specified"
|
||||||
echo "LIBBPF REPO: ${LIBBPF_REPO}"
|
usage
|
||||||
|
fi
|
||||||
|
if [ -z "${BPF_BRANCH}" ]; then
|
||||||
|
echo "Error: linux's bpf tree branch is not specified"
|
||||||
|
usage
|
||||||
|
fi
|
||||||
|
if [ -z "${BASELINE_COMMIT}" ] || [ -z "${BPF_BASELINE_COMMIT}" ]; then
|
||||||
|
echo "Error: bpf or bpf-next baseline commits are not provided"
|
||||||
|
usage
|
||||||
|
fi
|
||||||
|
|
||||||
SUFFIX=$(date --utc +%Y-%m-%dT%H-%M-%S.%3NZ)
|
SUFFIX=$(date --utc +%Y-%m-%dT%H-%M-%S.%3NZ)
|
||||||
BASELINE_COMMIT=${3-$(cat ${LIBBPF_REPO}/CHECKPOINT-COMMIT)}
|
WORKDIR=$(pwd)
|
||||||
|
TMP_DIR=$(mktemp -d)
|
||||||
|
|
||||||
|
trap "cd ${WORKDIR}; exit" INT TERM EXIT
|
||||||
|
|
||||||
|
declare -A PATH_MAP
|
||||||
|
PATH_MAP=( \
|
||||||
|
[tools/lib/bpf]=src \
|
||||||
|
[tools/include/uapi/linux/bpf_common.h]=include/uapi/linux/bpf_common.h \
|
||||||
|
[tools/include/uapi/linux/bpf.h]=include/uapi/linux/bpf.h \
|
||||||
|
[tools/include/uapi/linux/btf.h]=include/uapi/linux/btf.h \
|
||||||
|
[tools/include/uapi/linux/if_link.h]=include/uapi/linux/if_link.h \
|
||||||
|
[tools/include/uapi/linux/if_xdp.h]=include/uapi/linux/if_xdp.h \
|
||||||
|
[tools/include/uapi/linux/netlink.h]=include/uapi/linux/netlink.h \
|
||||||
|
[tools/include/tools/libc_compat.h]=include/tools/libc_compat.h \
|
||||||
|
)
|
||||||
|
|
||||||
|
LIBBPF_PATHS="${!PATH_MAP[@]}"
|
||||||
|
LIBBPF_VIEW_PATHS="${PATH_MAP[@]}"
|
||||||
|
LIBBPF_VIEW_EXCLUDE_REGEX='^src/(Makefile|Build|test_libbpf\.c|bpf_helper_defs\.h|\.gitignore)$'
|
||||||
|
|
||||||
|
LIBBPF_TREE_FILTER="mkdir -p __libbpf/include/uapi/linux __libbpf/include/tools && "$'\\\n'
|
||||||
|
for p in "${!PATH_MAP[@]}"; do
|
||||||
|
LIBBPF_TREE_FILTER+="git mv -kf ${p} __libbpf/${PATH_MAP[${p}]} && "$'\\\n'
|
||||||
|
done
|
||||||
|
LIBBPF_TREE_FILTER+="git rm --ignore-unmatch -f __libbpf/src/{Makefile,Build,test_libbpf.c,.gitignore} >/dev/null"
|
||||||
|
|
||||||
|
cd_to()
|
||||||
|
{
|
||||||
|
cd ${WORKDIR} && cd "$1"
|
||||||
|
}
|
||||||
|
|
||||||
|
# Output brief single-line commit description
|
||||||
|
# $1 - commit ref
|
||||||
|
commit_desc()
|
||||||
|
{
|
||||||
|
git log -n1 --pretty='%h ("%s")' $1
|
||||||
|
}
|
||||||
|
|
||||||
|
# Create commit single-line signature, which consists of:
|
||||||
|
# - full commit hash
|
||||||
|
# - author date in ISO8601 format
|
||||||
|
# - full commit body with newlines replaced with vertical bars (|)
|
||||||
|
# - shortstat appended at the end
|
||||||
|
# The idea is that this single-line signature is good enough to make final
|
||||||
|
# decision about whether two commits are the same, across different repos.
|
||||||
|
# $1 - commit ref
|
||||||
|
commit_signature()
|
||||||
|
{
|
||||||
|
git log -n1 --pretty='("%s")|%aI|%b' --shortstat $1 | tr '\n' '|'
|
||||||
|
}
|
||||||
|
|
||||||
|
# Validate there are no non-empty merges (we can't handle them)
|
||||||
|
# $1 - baseline tag
|
||||||
|
# $2 - tip tag
|
||||||
|
validate_merges()
|
||||||
|
{
|
||||||
|
local baseline_tag=$1
|
||||||
|
local tip_tag=$2
|
||||||
|
local new_merges
|
||||||
|
local merge_change_cnt
|
||||||
|
local ignore_merge_resolutions
|
||||||
|
local desc
|
||||||
|
|
||||||
|
new_merges=$(git rev-list --merges --topo-order --reverse ${baseline_tag}..${tip_tag} ${LIBBPF_PATHS[@]})
|
||||||
|
for new_merge in ${new_merges}; do
|
||||||
|
desc=$(commit_desc ${new_merge})
|
||||||
|
echo "MERGE: ${desc}"
|
||||||
|
merge_change_cnt=$(git show --format='' ${new_merge} | wc -l)
|
||||||
|
if ((${merge_change_cnt} > 0)); then
|
||||||
|
read -p "Merge '${desc}' is non-empty, which will cause conflicts! Do you want to proceed? [y/N]: " ignore_merge_resolutions
|
||||||
|
case "${ignore_merge_resolutions}" in
|
||||||
|
"y" | "Y")
|
||||||
|
echo "Skipping '${desc}'..."
|
||||||
|
continue
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
exit 3
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
}
|
||||||
|
|
||||||
|
# Cherry-pick commits touching libbpf-related files
|
||||||
|
# $1 - baseline_tag
|
||||||
|
# $2 - tip_tag
|
||||||
|
cherry_pick_commits()
|
||||||
|
{
|
||||||
|
local manual_mode=${MANUAL_MODE:-0}
|
||||||
|
local baseline_tag=$1
|
||||||
|
local tip_tag=$2
|
||||||
|
local new_commits
|
||||||
|
local signature
|
||||||
|
local should_skip
|
||||||
|
local synced_cnt
|
||||||
|
local manual_check
|
||||||
|
local libbpf_conflict_cnt
|
||||||
|
local desc
|
||||||
|
|
||||||
|
new_commits=$(git rev-list --no-merges --topo-order --reverse ${baseline_tag}..${tip_tag} ${LIBBPF_PATHS[@]})
|
||||||
|
for new_commit in ${new_commits}; do
|
||||||
|
desc="$(commit_desc ${new_commit})"
|
||||||
|
signature="$(commit_signature ${new_commit})"
|
||||||
|
synced_cnt=$(grep -F "${signature}" ${TMP_DIR}/libbpf_commits.txt | wc -l)
|
||||||
|
manual_check=0
|
||||||
|
if ((${synced_cnt} > 0)); then
|
||||||
|
# commit with the same subject is already in libbpf, but it's
|
||||||
|
# not 100% the same commit, so check with user
|
||||||
|
echo "Commit '${desc}' is synced into libbpf as:"
|
||||||
|
grep -F "${signature}" ${TMP_DIR}/libbpf_commits.txt | \
|
||||||
|
cut -d'|' -f1 | sed -e 's/^/- /'
|
||||||
|
if ((${manual_mode} != 1 && ${synced_cnt} == 1)); then
|
||||||
|
echo "Skipping '${desc}' due to unique match..."
|
||||||
|
continue
|
||||||
|
fi
|
||||||
|
if ((${synced_cnt} > 1)); then
|
||||||
|
echo "'${desc} matches multiple commits, please, double-check!"
|
||||||
|
manual_check=1
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
if ((${manual_mode} == 1 || ${manual_check} == 1)); then
|
||||||
|
read -p "Do you want to skip '${desc}'? [y/N]: " should_skip
|
||||||
|
case "${should_skip}" in
|
||||||
|
"y" | "Y")
|
||||||
|
echo "Skipping '${desc}'..."
|
||||||
|
continue
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
fi
|
||||||
|
# commit hasn't been synced into libbpf yet
|
||||||
|
echo "Picking '${desc}'..."
|
||||||
|
if ! git cherry-pick ${new_commit} &>/dev/null; then
|
||||||
|
echo "Warning! Cherry-picking '${desc} failed, checking if it's non-libbpf files causing problems..."
|
||||||
|
libbpf_conflict_cnt=$(git diff --name-only --diff-filter=U -- ${LIBBPF_PATHS[@]} | wc -l)
|
||||||
|
conflict_cnt=$(git diff --name-only | wc -l)
|
||||||
|
|
||||||
|
if ((${libbpf_conflict_cnt} == 0)); then
|
||||||
|
echo "Looks like only non-libbpf files have conflicts, ignoring..."
|
||||||
|
if ((${conflict_cnt} == 0)); then
|
||||||
|
echo "Empty cherry-pick, skipping it..."
|
||||||
|
git cherry-pick --abort
|
||||||
|
continue
|
||||||
|
fi
|
||||||
|
|
||||||
|
git add .
|
||||||
|
# GIT_EDITOR=true to avoid editor popping up to edit commit message
|
||||||
|
if ! GIT_EDITOR=true git cherry-pick --continue &>/dev/null; then
|
||||||
|
echo "Error! That still failed! Please resolve manually."
|
||||||
|
else
|
||||||
|
echo "Success! All cherry-pick conflicts were resolved for '${desc}'!"
|
||||||
|
continue
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
read -p "Error! Cherry-picking '${desc}' failed, please fix manually and press <return> to proceed..."
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
}
|
||||||
|
|
||||||
|
cd_to ${LIBBPF_REPO}
|
||||||
|
GITHUB_ABS_DIR=$(pwd)
|
||||||
|
echo "Dumping existing libbpf commit signatures..."
|
||||||
|
for h in $(git log --pretty='%h' -n500); do
|
||||||
|
echo $h "$(commit_signature $h)" >> ${TMP_DIR}/libbpf_commits.txt
|
||||||
|
done
|
||||||
|
|
||||||
# Use current kernel repo HEAD as a source of patches
|
# Use current kernel repo HEAD as a source of patches
|
||||||
cd ${LINUX_REPO}
|
cd_to ${LINUX_REPO}
|
||||||
|
LINUX_ABS_DIR=$(pwd)
|
||||||
TIP_SYM_REF=$(git symbolic-ref -q --short HEAD || git rev-parse HEAD)
|
TIP_SYM_REF=$(git symbolic-ref -q --short HEAD || git rev-parse HEAD)
|
||||||
TIP_COMMIT=$(git rev-parse HEAD)
|
TIP_COMMIT=$(git rev-parse HEAD)
|
||||||
|
BPF_TIP_COMMIT=$(git rev-parse ${BPF_BRANCH})
|
||||||
BASELINE_TAG=libbpf-baseline-${SUFFIX}
|
BASELINE_TAG=libbpf-baseline-${SUFFIX}
|
||||||
TIP_TAG=libbpf-tip-${SUFFIX}
|
TIP_TAG=libbpf-tip-${SUFFIX}
|
||||||
|
BPF_BASELINE_TAG=libbpf-bpf-baseline-${SUFFIX}
|
||||||
|
BPF_TIP_TAG=libbpf-bpf-tip-${SUFFIX}
|
||||||
VIEW_TAG=libbpf-view-${SUFFIX}
|
VIEW_TAG=libbpf-view-${SUFFIX}
|
||||||
LIBBPF_SYNC_TAG=libbpf-sync-${SUFFIX}
|
LIBBPF_SYNC_TAG=libbpf-sync-${SUFFIX}
|
||||||
|
|
||||||
@@ -43,75 +215,41 @@ SQUASH_BASE_TAG=libbpf-squash-base-${SUFFIX}
|
|||||||
SQUASH_TIP_TAG=libbpf-squash-tip-${SUFFIX}
|
SQUASH_TIP_TAG=libbpf-squash-tip-${SUFFIX}
|
||||||
SQUASH_COMMIT=$(git commit-tree ${BASELINE_COMMIT}^{tree} -m "BASELINE SQUASH ${BASELINE_COMMIT}")
|
SQUASH_COMMIT=$(git commit-tree ${BASELINE_COMMIT}^{tree} -m "BASELINE SQUASH ${BASELINE_COMMIT}")
|
||||||
|
|
||||||
echo "SUFFIX: ${SUFFIX}"
|
echo "WORKDIR: ${WORKDIR}"
|
||||||
echo "BASELINE COMMIT: $(git log --pretty=oneline --no-walk ${BASELINE_COMMIT})"
|
echo "LINUX REPO: ${LINUX_REPO}"
|
||||||
echo "TIP COMMIT: $(git log --pretty=oneline --no-walk ${TIP_COMMIT})"
|
echo "LIBBPF REPO: ${LIBBPF_REPO}"
|
||||||
echo "SQUASH COMMIT: ${SQUASH_COMMIT}"
|
echo "TEMP DIR: ${TMP_DIR}"
|
||||||
echo "BASELINE TAG: ${BASELINE_TAG}"
|
echo "SUFFIX: ${SUFFIX}"
|
||||||
echo "TIP TAG: ${TIP_TAG}"
|
echo "BASE COMMIT: '$(commit_desc ${BASELINE_COMMIT})'"
|
||||||
echo "SQUASH BASE TAG: ${SQUASH_BASE_TAG}"
|
echo "TIP COMMIT: '$(commit_desc ${TIP_COMMIT})'"
|
||||||
echo "SQUASH TIP TAG: ${SQUASH_TIP_TAG}"
|
echo "BPF BASE COMMIT: '$(commit_desc ${BPF_BASELINE_COMMIT})'"
|
||||||
echo "VIEW TAG: ${VIEW_TAG}"
|
echo "BPF TIP COMMIT: '$(commit_desc ${BPF_TIP_COMMIT})'"
|
||||||
echo "LIBBPF SYNC TAG: ${LIBBPF_SYNC_TAG}"
|
echo "SQUASH COMMIT: ${SQUASH_COMMIT}"
|
||||||
|
echo "BASELINE TAG: ${BASELINE_TAG}"
|
||||||
TMP_DIR=$(mktemp -d)
|
echo "TIP TAG: ${TIP_TAG}"
|
||||||
echo "TEMP DIR: ${TMP_DIR}"
|
echo "BPF BASELINE TAG: ${BPF_BASELINE_TAG}"
|
||||||
echo "PATCHES+COVER: ${TMP_DIR}/patches"
|
echo "BPF TIP TAG: ${BPF_TIP_TAG}"
|
||||||
echo "PATCHSET: ${TMP_DIR}/patchset.patch"
|
echo "SQUASH BASE TAG: ${SQUASH_BASE_TAG}"
|
||||||
|
echo "SQUASH TIP TAG: ${SQUASH_TIP_TAG}"
|
||||||
|
echo "VIEW TAG: ${VIEW_TAG}"
|
||||||
|
echo "LIBBPF SYNC TAG: ${LIBBPF_SYNC_TAG}"
|
||||||
|
echo "PATCHES: ${TMP_DIR}/patches"
|
||||||
|
|
||||||
git branch ${BASELINE_TAG} ${BASELINE_COMMIT}
|
git branch ${BASELINE_TAG} ${BASELINE_COMMIT}
|
||||||
git branch ${TIP_TAG} ${TIP_COMMIT}
|
git branch ${TIP_TAG} ${TIP_COMMIT}
|
||||||
|
git branch ${BPF_BASELINE_TAG} ${BPF_BASELINE_COMMIT}
|
||||||
|
git branch ${BPF_TIP_TAG} ${BPF_TIP_COMMIT}
|
||||||
git branch ${SQUASH_BASE_TAG} ${SQUASH_COMMIT}
|
git branch ${SQUASH_BASE_TAG} ${SQUASH_COMMIT}
|
||||||
git checkout -b ${SQUASH_TIP_TAG} ${SQUASH_COMMIT}
|
git checkout -b ${SQUASH_TIP_TAG} ${SQUASH_COMMIT}
|
||||||
|
|
||||||
|
# Validate there are no non-empty merges in bpf-next and bpf trees
|
||||||
|
validate_merges ${BASELINE_TAG} ${TIP_TAG}
|
||||||
|
validate_merges ${BPF_BASELINE_TAG} ${BPF_TIP_TAG}
|
||||||
|
|
||||||
# Cherry-pick new commits onto squashed baseline commit
|
# Cherry-pick new commits onto squashed baseline commit
|
||||||
LIBBPF_PATHS=(tools/lib/bpf tools/include/uapi/linux/{bpf_common.h,bpf.h,btf.h,if_link.h,netlink.h} tools/include/tools/libc_compat.h)
|
cherry_pick_commits ${BASELINE_TAG} ${TIP_TAG}
|
||||||
|
cherry_pick_commits ${BPF_BASELINE_TAG} ${BPF_TIP_TAG}
|
||||||
|
|
||||||
LIBBPF_NEW_MERGES=$(git rev-list --merges --topo-order --reverse ${BASELINE_TAG}..${TIP_TAG} ${LIBBPF_PATHS[@]})
|
|
||||||
for LIBBPF_NEW_MERGE in ${LIBBPF_NEW_MERGES}; do
|
|
||||||
printf "MERGE:\t" && git log --oneline -n1 ${LIBBPF_NEW_MERGE}
|
|
||||||
MERGE_CHANGES=$(git log --format='' -n1 ${LIBBPF_NEW_MERGE} | wc -l)
|
|
||||||
if ((${MERGE_CHANGES} > 0)); then
|
|
||||||
echo "Merge is non empty, aborting!.."
|
|
||||||
exit 3
|
|
||||||
fi
|
|
||||||
done
|
|
||||||
|
|
||||||
cd ${WORKDIR} && cd ${LIBBPF_REPO}
|
|
||||||
git log --oneline -n500 > ${TMP_DIR}/libbpf_commits.txt
|
|
||||||
cd ${WORKDIR} && cd ${LINUX_REPO}
|
|
||||||
|
|
||||||
LIBBPF_NEW_COMMITS=$(git rev-list --no-merges --topo-order --reverse ${BASELINE_TAG}..${TIP_TAG} ${LIBBPF_PATHS[@]})
|
|
||||||
for LIBBPF_NEW_COMMIT in ${LIBBPF_NEW_COMMITS}; do
|
|
||||||
echo "Checking commit '${LIBBPF_NEW_COMMIT}'"
|
|
||||||
SYNCED_COMMITS=$(grep -F "$(git log -n1 --pretty=format:%s ${LIBBPF_NEW_COMMIT})" ${TMP_DIR}/libbpf_commits.txt || echo "")
|
|
||||||
if [ -n "${SYNCED_COMMITS}" ]; then
|
|
||||||
# commit with the same subject is already in libbpf, but it's not 100% the same commit, so check with user
|
|
||||||
echo "Commit '$(git log -n1 --oneline ${LIBBPF_NEW_COMMIT})' appears to be already synced into libbpf..."
|
|
||||||
echo "Corresponding libbpf commit(s):"
|
|
||||||
echo "${SYNCED_COMMITS}"
|
|
||||||
read -p "Do you want to skip it? [y/N]: " SHOULD_SKIP
|
|
||||||
case "${SHOULD_SKIP}" in
|
|
||||||
"y" | "Y")
|
|
||||||
echo "Skipping '$(git log -n1 --oneline ${LIBBPF_NEW_COMMIT})'..."
|
|
||||||
continue
|
|
||||||
;;
|
|
||||||
esac
|
|
||||||
fi
|
|
||||||
# commit hasn't been synced into libbpf yet
|
|
||||||
if ! git cherry-pick ${LIBBPF_NEW_COMMIT}; then
|
|
||||||
read -p "Cherry-picking '$(git log --oneline -n1 ${LIBBPF_NEW_COMMIT})' failed, please fix manually and press <return> to proceed..."
|
|
||||||
fi
|
|
||||||
done
|
|
||||||
|
|
||||||
LIBBPF_TREE_FILTER=' \
|
|
||||||
mkdir -p __libbpf/include/uapi/linux __libbpf/include/tools && \
|
|
||||||
git mv -kf tools/lib/bpf __libbpf/src && \
|
|
||||||
git mv -kf tools/include/uapi/linux/{bpf_common.h,bpf.h,btf.h,if_link.h,if_xdp.h,netlink.h} \
|
|
||||||
__libbpf/include/uapi/linux && \
|
|
||||||
git mv -kf tools/include/tools/libc_compat.h __libbpf/include/tools && \
|
|
||||||
git rm --ignore-unmatch -f __libbpf/src/{Makefile,Build,test_libbpf.cpp,.gitignore} \
|
|
||||||
'
|
|
||||||
# Move all libbpf files into __libbpf directory.
|
# Move all libbpf files into __libbpf directory.
|
||||||
git filter-branch --prune-empty -f --tree-filter "${LIBBPF_TREE_FILTER}" ${SQUASH_TIP_TAG} ${SQUASH_BASE_TAG}
|
git filter-branch --prune-empty -f --tree-filter "${LIBBPF_TREE_FILTER}" ${SQUASH_TIP_TAG} ${SQUASH_BASE_TAG}
|
||||||
# Make __libbpf a new root directory
|
# Make __libbpf a new root directory
|
||||||
@@ -126,59 +264,92 @@ fi
|
|||||||
|
|
||||||
# Exclude baseline commit and generate nice cover letter with summary
|
# Exclude baseline commit and generate nice cover letter with summary
|
||||||
git format-patch ${SQUASH_BASE_TAG}..${SQUASH_TIP_TAG} --cover-letter -o ${TMP_DIR}/patches
|
git format-patch ${SQUASH_BASE_TAG}..${SQUASH_TIP_TAG} --cover-letter -o ${TMP_DIR}/patches
|
||||||
# Now generate single-file patchset w/o cover to apply on top of libbpf repo
|
|
||||||
git format-patch ${SQUASH_BASE_TAG}..${SQUASH_TIP_TAG} --stdout > ${TMP_DIR}/patchset.patch
|
|
||||||
|
|
||||||
# Now is time to re-apply libbpf-related linux patches to libbpf repo
|
# Now is time to re-apply libbpf-related linux patches to libbpf repo
|
||||||
cd ${WORKDIR} && cd ${LIBBPF_REPO}
|
cd_to ${LIBBPF_REPO}
|
||||||
git checkout -b ${LIBBPF_SYNC_TAG}
|
git checkout -b ${LIBBPF_SYNC_TAG}
|
||||||
git am --committer-date-is-author-date ${TMP_DIR}/patchset.patch
|
|
||||||
|
for patch in $(ls -1 ${TMP_DIR}/patches | tail -n +2); do
|
||||||
|
if ! git am --committer-date-is-author-date "${TMP_DIR}/patches/${patch}"; then
|
||||||
|
read -p "Applying ${TMP_DIR}/patches/${patch} failed, please resolve manually and press <return> to proceed..."
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
|
||||||
|
# Generate bpf_helper_defs.h and commit, if anything changed
|
||||||
|
# restore Linux tip to use bpf_helpers_doc.py
|
||||||
|
cd_to ${LINUX_REPO}
|
||||||
|
git checkout ${TIP_TAG}
|
||||||
|
# re-generate bpf_helper_defs.h
|
||||||
|
cd_to ${LIBBPF_REPO}
|
||||||
|
"${LINUX_ABS_DIR}/scripts/bpf_helpers_doc.py" --header \
|
||||||
|
--file include/uapi/linux/bpf.h > src/bpf_helper_defs.h
|
||||||
|
# if anything changed, commit it
|
||||||
|
helpers_changes=$(git status --porcelain src/bpf_helper_defs.h | wc -l)
|
||||||
|
if ((${helpers_changes} == 1)); then
|
||||||
|
git add src/bpf_helper_defs.h
|
||||||
|
git commit -m "sync: auto-generate latest BPF helpers
|
||||||
|
|
||||||
|
Latest changes to BPF helper definitions.
|
||||||
|
" -- src/bpf_helper_defs.h
|
||||||
|
fi
|
||||||
|
|
||||||
# Use generated cover-letter as a template for "sync commit" with
|
# Use generated cover-letter as a template for "sync commit" with
|
||||||
# baseline and checkpoint commits from kernel repo (and leave summary
|
# baseline and checkpoint commits from kernel repo (and leave summary
|
||||||
# from cover letter intact, of course)
|
# from cover letter intact, of course)
|
||||||
echo ${TIP_COMMIT} > CHECKPOINT-COMMIT && \
|
echo ${TIP_COMMIT} > CHECKPOINT-COMMIT && \
|
||||||
|
echo ${BPF_TIP_COMMIT} > BPF-CHECKPOINT-COMMIT && \
|
||||||
git add CHECKPOINT-COMMIT && \
|
git add CHECKPOINT-COMMIT && \
|
||||||
|
git add BPF-CHECKPOINT-COMMIT && \
|
||||||
awk '/\*\*\* BLURB HERE \*\*\*/ {p=1} p' ${TMP_DIR}/patches/0000-cover-letter.patch | \
|
awk '/\*\*\* BLURB HERE \*\*\*/ {p=1} p' ${TMP_DIR}/patches/0000-cover-letter.patch | \
|
||||||
sed "s/\*\*\* BLURB HERE \*\*\*/\
|
sed "s/\*\*\* BLURB HERE \*\*\*/\
|
||||||
sync: latest libbpf changes from kernel\n\
|
sync: latest libbpf changes from kernel\n\
|
||||||
\n\
|
\n\
|
||||||
Syncing latest libbpf commits from kernel repository.\n\
|
Syncing latest libbpf commits from kernel repository.\n\
|
||||||
Baseline commit: ${BASELINE_COMMIT}\n\
|
Baseline bpf-next commit: ${BASELINE_COMMIT}\n\
|
||||||
Checkpoint commit: ${TIP_COMMIT}/" | \
|
Checkpoint bpf-next commit: ${TIP_COMMIT}\n\
|
||||||
|
Baseline bpf commit: ${BPF_BASELINE_COMMIT}\n\
|
||||||
|
Checkpoint bpf commit: ${BPF_TIP_COMMIT}/" | \
|
||||||
git commit --file=-
|
git commit --file=-
|
||||||
|
|
||||||
echo "SUCCESS! ${COMMIT_CNT} commits synced."
|
echo "SUCCESS! ${COMMIT_CNT} commits synced."
|
||||||
|
|
||||||
echo "Verifying Linux's and Github's libbpf state"
|
echo "Verifying Linux's and Github's libbpf state"
|
||||||
LIBBPF_VIEW_PATHS=(src include/uapi/linux/{bpf_common.h,bpf.h,btf.h,if_link.h,if_xdp.h,netlink.h} include/tools/libc_compat.h)
|
|
||||||
LIBBPF_VIEW_EXCLUDE_REGEX='^src/(Makefile|Build|test_libbpf.cpp|\.gitignore)$'
|
|
||||||
|
|
||||||
cd ${WORKDIR} && cd ${LINUX_REPO}
|
cd_to ${LINUX_REPO}
|
||||||
LINUX_ABS_DIR=$(pwd)
|
|
||||||
git checkout -b ${VIEW_TAG} ${TIP_COMMIT}
|
git checkout -b ${VIEW_TAG} ${TIP_COMMIT}
|
||||||
git filter-branch -f --tree-filter "${LIBBPF_TREE_FILTER}" ${VIEW_TAG}^..${VIEW_TAG}
|
git filter-branch -f --tree-filter "${LIBBPF_TREE_FILTER}" ${VIEW_TAG}^..${VIEW_TAG}
|
||||||
git filter-branch -f --subdirectory-filter __libbpf ${VIEW_TAG}^..${VIEW_TAG}
|
git filter-branch -f --subdirectory-filter __libbpf ${VIEW_TAG}^..${VIEW_TAG}
|
||||||
git ls-files -- ${LIBBPF_VIEW_PATHS[@]} > ${TMP_DIR}/linux-view.ls
|
git ls-files -- ${LIBBPF_VIEW_PATHS[@]} > ${TMP_DIR}/linux-view.ls
|
||||||
|
|
||||||
cd ${WORKDIR} && cd ${LIBBPF_REPO}
|
cd_to ${LIBBPF_REPO}
|
||||||
GITHUB_ABS_DIR=$(pwd)
|
|
||||||
git ls-files -- ${LIBBPF_VIEW_PATHS[@]} | grep -v -E "${LIBBPF_VIEW_EXCLUDE_REGEX}" > ${TMP_DIR}/github-view.ls
|
git ls-files -- ${LIBBPF_VIEW_PATHS[@]} | grep -v -E "${LIBBPF_VIEW_EXCLUDE_REGEX}" > ${TMP_DIR}/github-view.ls
|
||||||
|
|
||||||
echo "Comparing list of files..."
|
echo "Comparing list of files..."
|
||||||
diff ${TMP_DIR}/linux-view.ls ${TMP_DIR}/github-view.ls
|
diff -u ${TMP_DIR}/linux-view.ls ${TMP_DIR}/github-view.ls
|
||||||
echo "Comparing file contents..."
|
echo "Comparing file contents..."
|
||||||
|
CONSISTENT=1
|
||||||
for F in $(cat ${TMP_DIR}/linux-view.ls); do
|
for F in $(cat ${TMP_DIR}/linux-view.ls); do
|
||||||
diff "${LINUX_ABS_DIR}/${F}" "${GITHUB_ABS_DIR}/${F}"
|
if ! diff -u "${LINUX_ABS_DIR}/${F}" "${GITHUB_ABS_DIR}/${F}"; then
|
||||||
|
echo "${LINUX_ABS_DIR}/${F} and ${GITHUB_ABS_DIR}/${F} are different!"
|
||||||
|
CONSISTENT=0
|
||||||
|
fi
|
||||||
done
|
done
|
||||||
echo "Contents appear identical!"
|
if ((${CONSISTENT} == 1)); then
|
||||||
|
echo "Great! Content is identical!"
|
||||||
|
else
|
||||||
|
echo "Unfortunately, there are consistency problems!"
|
||||||
|
if ((${IGNORE_CONSISTENCY-0} != 1)); then
|
||||||
|
exit 4
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
echo "Cleaning up..."
|
echo "Cleaning up..."
|
||||||
rm -r ${TMP_DIR}
|
rm -r ${TMP_DIR}
|
||||||
cd ${WORKDIR} && cd ${LINUX_REPO}
|
cd_to ${LINUX_REPO}
|
||||||
git checkout ${TIP_SYM_REF}
|
git checkout ${TIP_SYM_REF}
|
||||||
git branch -D ${BASELINE_TAG} ${TIP_TAG} ${SQUASH_BASE_TAG} ${SQUASH_TIP_TAG} ${VIEW_TAG}
|
git branch -D ${BASELINE_TAG} ${TIP_TAG} ${BPF_BASELINE_TAG} ${BPF_TIP_TAG} \
|
||||||
|
${SQUASH_BASE_TAG} ${SQUASH_TIP_TAG} ${VIEW_TAG}
|
||||||
|
|
||||||
cd ${WORKDIR}
|
cd_to .
|
||||||
echo "DONE."
|
echo "DONE."
|
||||||
|
|
||||||
|
|||||||
4
src/.gitignore
vendored
4
src/.gitignore
vendored
@@ -1,2 +1,6 @@
|
|||||||
*.o
|
*.o
|
||||||
*.a
|
*.a
|
||||||
|
/libbpf.pc
|
||||||
|
/libbpf.so*
|
||||||
|
/staticobjs
|
||||||
|
/sharedobjs
|
||||||
|
|||||||
72
src/Makefile
72
src/Makefile
@@ -1,10 +1,9 @@
|
|||||||
# SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
|
# SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
|
||||||
|
|
||||||
VERSION = 0
|
LIBBPF_VERSION := $(shell \
|
||||||
PATCHLEVEL = 0
|
grep -oE '^LIBBPF_([0-9.]+)' libbpf.map | \
|
||||||
EXTRAVERSION = 3
|
sort -rV | head -n1 | cut -d'_' -f2)
|
||||||
|
LIBBPF_MAJOR_VERSION := $(firstword $(subst ., ,$(LIBBPF_VERSION)))
|
||||||
LIBBPF_VERSION = $(VERSION).$(PATCHLEVEL).$(EXTRAVERSION)
|
|
||||||
|
|
||||||
TOPDIR = ..
|
TOPDIR = ..
|
||||||
|
|
||||||
@@ -16,12 +15,10 @@ ifneq ($(FEATURE_REALLOCARRAY),)
|
|||||||
ALL_CFLAGS += -DCOMPAT_NEED_REALLOCARRAY
|
ALL_CFLAGS += -DCOMPAT_NEED_REALLOCARRAY
|
||||||
endif
|
endif
|
||||||
|
|
||||||
ifndef BUILD_STATIC_ONLY
|
SHARED_CFLAGS += -fPIC -fvisibility=hidden -DSHARED
|
||||||
ALL_CFLAGS += -fPIC -fvisibility=hidden
|
|
||||||
endif
|
|
||||||
|
|
||||||
CFLAGS ?= -g -O2 -Werror -Wall
|
CFLAGS ?= -g -O2 -Werror -Wall
|
||||||
ALL_CFLAGS += $(CFLAGS)
|
ALL_CFLAGS += $(CFLAGS) -D_LARGEFILE64_SOURCE -D_FILE_OFFSET_BITS=64
|
||||||
ALL_LDFLAGS += $(LDFLAGS)
|
ALL_LDFLAGS += $(LDFLAGS)
|
||||||
ifdef NO_PKG_CONFIG
|
ifdef NO_PKG_CONFIG
|
||||||
ALL_LDFLAGS += -lelf
|
ALL_LDFLAGS += -lelf
|
||||||
@@ -32,21 +29,27 @@ else
|
|||||||
endif
|
endif
|
||||||
|
|
||||||
OBJDIR ?= .
|
OBJDIR ?= .
|
||||||
|
SHARED_OBJDIR := $(OBJDIR)/sharedobjs
|
||||||
|
STATIC_OBJDIR := $(OBJDIR)/staticobjs
|
||||||
|
OBJS := bpf.o btf.o libbpf.o libbpf_errno.o netlink.o \
|
||||||
|
nlattr.o str_error.o libbpf_probes.o bpf_prog_linfo.o xsk.o \
|
||||||
|
btf_dump.o hashmap.o
|
||||||
|
SHARED_OBJS := $(addprefix $(SHARED_OBJDIR)/,$(OBJS))
|
||||||
|
STATIC_OBJS := $(addprefix $(STATIC_OBJDIR)/,$(OBJS))
|
||||||
|
|
||||||
OBJS := $(addprefix $(OBJDIR)/,bpf.o btf.o libbpf.o libbpf_errno.o netlink.o \
|
STATIC_LIBS := $(OBJDIR)/libbpf.a
|
||||||
nlattr.o str_error.o libbpf_probes.o bpf_prog_linfo.o xsk.o)
|
|
||||||
|
|
||||||
LIBS := $(OBJDIR)/libbpf.a
|
|
||||||
ifndef BUILD_STATIC_ONLY
|
ifndef BUILD_STATIC_ONLY
|
||||||
LIBS += $(OBJDIR)/libbpf.so \
|
SHARED_LIBS := $(OBJDIR)/libbpf.so \
|
||||||
$(OBJDIR)/libbpf.so.$(VERSION) \
|
$(OBJDIR)/libbpf.so.$(LIBBPF_MAJOR_VERSION) \
|
||||||
$(OBJDIR)/libbpf.so.$(LIBBPF_VERSION)
|
$(OBJDIR)/libbpf.so.$(LIBBPF_VERSION)
|
||||||
VERSION_SCRIPT := libbpf.map
|
VERSION_SCRIPT := libbpf.map
|
||||||
endif
|
endif
|
||||||
|
|
||||||
HEADERS := bpf.h libbpf.h btf.h xsk.h libbpf_util.h
|
HEADERS := bpf.h libbpf.h btf.h xsk.h libbpf_util.h \
|
||||||
UAPI_HEADERS := $(addprefix $(TOPDIR)/include/uapi/linux/,bpf.h bpf_common.h \
|
bpf_helpers.h bpf_helper_defs.h bpf_tracing.h \
|
||||||
btf.h)
|
bpf_endian.h bpf_core_read.h
|
||||||
|
UAPI_HEADERS := $(addprefix $(TOPDIR)/include/uapi/linux/,\
|
||||||
|
bpf.h bpf_common.h btf.h)
|
||||||
|
|
||||||
PC_FILE := $(OBJDIR)/libbpf.pc
|
PC_FILE := $(OBJDIR)/libbpf.pc
|
||||||
|
|
||||||
@@ -65,21 +68,21 @@ LIBDIR ?= $(PREFIX)/$(LIBSUBDIR)
|
|||||||
INCLUDEDIR ?= $(PREFIX)/include
|
INCLUDEDIR ?= $(PREFIX)/include
|
||||||
UAPIDIR ?= $(PREFIX)/include
|
UAPIDIR ?= $(PREFIX)/include
|
||||||
|
|
||||||
all: $(LIBS) $(PC_FILE)
|
all: $(STATIC_LIBS) $(SHARED_LIBS) $(PC_FILE)
|
||||||
|
|
||||||
$(OBJDIR)/libbpf.a: $(OBJS)
|
$(OBJDIR)/libbpf.a: $(STATIC_OBJS)
|
||||||
$(AR) rcs $@ $^
|
$(AR) rcs $@ $^
|
||||||
|
|
||||||
$(OBJDIR)/libbpf.so: $(OBJDIR)/libbpf.so.$(VERSION)
|
$(OBJDIR)/libbpf.so: $(OBJDIR)/libbpf.so.$(LIBBPF_MAJOR_VERSION)
|
||||||
ln -sf $(^F) $@
|
ln -sf $(^F) $@
|
||||||
|
|
||||||
$(OBJDIR)/libbpf.so.$(VERSION): $(OBJDIR)/libbpf.so.$(LIBBPF_VERSION)
|
$(OBJDIR)/libbpf.so.$(LIBBPF_MAJOR_VERSION): $(OBJDIR)/libbpf.so.$(LIBBPF_VERSION)
|
||||||
ln -sf $(^F) $@
|
ln -sf $(^F) $@
|
||||||
|
|
||||||
$(OBJDIR)/libbpf.so.$(LIBBPF_VERSION): $(OBJS)
|
$(OBJDIR)/libbpf.so.$(LIBBPF_VERSION): $(SHARED_OBJS)
|
||||||
$(CC) -shared $(ALL_LDFLAGS) -Wl,--version-script=$(VERSION_SCRIPT) \
|
$(CC) -shared -Wl,--version-script=$(VERSION_SCRIPT) \
|
||||||
-Wl,-soname,libbpf.so.$(VERSION) \
|
-Wl,-soname,libbpf.so.$(LIBBPF_MAJOR_VERSION) \
|
||||||
$^ -o $@
|
$^ $(ALL_LDFLAGS) -o $@
|
||||||
|
|
||||||
$(OBJDIR)/libbpf.pc:
|
$(OBJDIR)/libbpf.pc:
|
||||||
sed -e "s|@PREFIX@|$(PREFIX)|" \
|
sed -e "s|@PREFIX@|$(PREFIX)|" \
|
||||||
@@ -87,9 +90,18 @@ $(OBJDIR)/libbpf.pc:
|
|||||||
-e "s|@VERSION@|$(LIBBPF_VERSION)|" \
|
-e "s|@VERSION@|$(LIBBPF_VERSION)|" \
|
||||||
< libbpf.pc.template > $@
|
< libbpf.pc.template > $@
|
||||||
|
|
||||||
$(OBJDIR)/%.o: %.c
|
$(STATIC_OBJDIR):
|
||||||
|
mkdir -p $(STATIC_OBJDIR)
|
||||||
|
|
||||||
|
$(SHARED_OBJDIR):
|
||||||
|
mkdir -p $(SHARED_OBJDIR)
|
||||||
|
|
||||||
|
$(STATIC_OBJDIR)/%.o: %.c | $(STATIC_OBJDIR)
|
||||||
$(CC) $(ALL_CFLAGS) $(CPPFLAGS) -c $< -o $@
|
$(CC) $(ALL_CFLAGS) $(CPPFLAGS) -c $< -o $@
|
||||||
|
|
||||||
|
$(SHARED_OBJDIR)/%.o: %.c | $(SHARED_OBJDIR)
|
||||||
|
$(CC) $(ALL_CFLAGS) $(SHARED_CFLAGS) $(CPPFLAGS) -c $< -o $@
|
||||||
|
|
||||||
define do_install
|
define do_install
|
||||||
if [ ! -d '$(DESTDIR)$2' ]; then \
|
if [ ! -d '$(DESTDIR)$2' ]; then \
|
||||||
$(INSTALL) -d -m 755 '$(DESTDIR)$2'; \
|
$(INSTALL) -d -m 755 '$(DESTDIR)$2'; \
|
||||||
@@ -106,7 +118,7 @@ define do_s_install
|
|||||||
endef
|
endef
|
||||||
|
|
||||||
install: all install_headers install_pkgconfig
|
install: all install_headers install_pkgconfig
|
||||||
$(call do_s_install,$(LIBS),$(LIBDIR))
|
$(call do_s_install,$(STATIC_LIBS) $(SHARED_LIBS),$(LIBDIR))
|
||||||
|
|
||||||
install_headers:
|
install_headers:
|
||||||
$(call do_install,$(HEADERS),$(INCLUDEDIR)/bpf,644)
|
$(call do_install,$(HEADERS),$(INCLUDEDIR)/bpf,644)
|
||||||
@@ -120,4 +132,4 @@ install_pkgconfig: $(PC_FILE)
|
|||||||
$(call do_install,$(PC_FILE),$(LIBDIR)/pkgconfig,644)
|
$(call do_install,$(PC_FILE),$(LIBDIR)/pkgconfig,644)
|
||||||
|
|
||||||
clean:
|
clean:
|
||||||
rm -f *.o *.a *.so *.so.* *.pc
|
rm -rf *.o *.a *.so *.so.* *.pc $(SHARED_OBJDIR) $(STATIC_OBJDIR)
|
||||||
|
|||||||
@@ -9,7 +9,8 @@ described here. It's recommended to follow these conventions whenever a
|
|||||||
new function or type is added to keep libbpf API clean and consistent.
|
new function or type is added to keep libbpf API clean and consistent.
|
||||||
|
|
||||||
All types and functions provided by libbpf API should have one of the
|
All types and functions provided by libbpf API should have one of the
|
||||||
following prefixes: ``bpf_``, ``btf_``, ``libbpf_``, ``xsk_``.
|
following prefixes: ``bpf_``, ``btf_``, ``libbpf_``, ``xsk_``,
|
||||||
|
``perf_buffer_``.
|
||||||
|
|
||||||
System call wrappers
|
System call wrappers
|
||||||
--------------------
|
--------------------
|
||||||
|
|||||||
43
src/bpf.c
43
src/bpf.c
@@ -26,10 +26,11 @@
|
|||||||
#include <memory.h>
|
#include <memory.h>
|
||||||
#include <unistd.h>
|
#include <unistd.h>
|
||||||
#include <asm/unistd.h>
|
#include <asm/unistd.h>
|
||||||
|
#include <errno.h>
|
||||||
#include <linux/bpf.h>
|
#include <linux/bpf.h>
|
||||||
#include "bpf.h"
|
#include "bpf.h"
|
||||||
#include "libbpf.h"
|
#include "libbpf.h"
|
||||||
#include <errno.h>
|
#include "libbpf_internal.h"
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* When building perf, unistd.h is overridden. __NR_bpf is
|
* When building perf, unistd.h is overridden. __NR_bpf is
|
||||||
@@ -53,10 +54,6 @@
|
|||||||
# endif
|
# endif
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#ifndef min
|
|
||||||
#define min(x, y) ((x) < (y) ? (x) : (y))
|
|
||||||
#endif
|
|
||||||
|
|
||||||
static inline __u64 ptr_to_u64(const void *ptr)
|
static inline __u64 ptr_to_u64(const void *ptr)
|
||||||
{
|
{
|
||||||
return (__u64) (unsigned long) ptr;
|
return (__u64) (unsigned long) ptr;
|
||||||
@@ -192,7 +189,7 @@ static void *
|
|||||||
alloc_zero_tailing_info(const void *orecord, __u32 cnt,
|
alloc_zero_tailing_info(const void *orecord, __u32 cnt,
|
||||||
__u32 actual_rec_size, __u32 expected_rec_size)
|
__u32 actual_rec_size, __u32 expected_rec_size)
|
||||||
{
|
{
|
||||||
__u64 info_len = actual_rec_size * cnt;
|
__u64 info_len = (__u64)actual_rec_size * cnt;
|
||||||
void *info, *nrecord;
|
void *info, *nrecord;
|
||||||
int i;
|
int i;
|
||||||
|
|
||||||
@@ -231,6 +228,13 @@ int bpf_load_program_xattr(const struct bpf_load_program_attr *load_attr,
|
|||||||
memset(&attr, 0, sizeof(attr));
|
memset(&attr, 0, sizeof(attr));
|
||||||
attr.prog_type = load_attr->prog_type;
|
attr.prog_type = load_attr->prog_type;
|
||||||
attr.expected_attach_type = load_attr->expected_attach_type;
|
attr.expected_attach_type = load_attr->expected_attach_type;
|
||||||
|
if (attr.prog_type == BPF_PROG_TYPE_TRACING) {
|
||||||
|
attr.attach_btf_id = load_attr->attach_btf_id;
|
||||||
|
attr.attach_prog_fd = load_attr->attach_prog_fd;
|
||||||
|
} else {
|
||||||
|
attr.prog_ifindex = load_attr->prog_ifindex;
|
||||||
|
attr.kern_version = load_attr->kern_version;
|
||||||
|
}
|
||||||
attr.insn_cnt = (__u32)load_attr->insns_cnt;
|
attr.insn_cnt = (__u32)load_attr->insns_cnt;
|
||||||
attr.insns = ptr_to_u64(load_attr->insns);
|
attr.insns = ptr_to_u64(load_attr->insns);
|
||||||
attr.license = ptr_to_u64(load_attr->license);
|
attr.license = ptr_to_u64(load_attr->license);
|
||||||
@@ -244,8 +248,6 @@ int bpf_load_program_xattr(const struct bpf_load_program_attr *load_attr,
|
|||||||
attr.log_size = 0;
|
attr.log_size = 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
attr.kern_version = load_attr->kern_version;
|
|
||||||
attr.prog_ifindex = load_attr->prog_ifindex;
|
|
||||||
attr.prog_btf_fd = load_attr->prog_btf_fd;
|
attr.prog_btf_fd = load_attr->prog_btf_fd;
|
||||||
attr.func_info_rec_size = load_attr->func_info_rec_size;
|
attr.func_info_rec_size = load_attr->func_info_rec_size;
|
||||||
attr.func_info_cnt = load_attr->func_info_cnt;
|
attr.func_info_cnt = load_attr->func_info_cnt;
|
||||||
@@ -256,6 +258,7 @@ int bpf_load_program_xattr(const struct bpf_load_program_attr *load_attr,
|
|||||||
if (load_attr->name)
|
if (load_attr->name)
|
||||||
memcpy(attr.prog_name, load_attr->name,
|
memcpy(attr.prog_name, load_attr->name,
|
||||||
min(strlen(load_attr->name), BPF_OBJ_NAME_LEN - 1));
|
min(strlen(load_attr->name), BPF_OBJ_NAME_LEN - 1));
|
||||||
|
attr.prog_flags = load_attr->prog_flags;
|
||||||
|
|
||||||
fd = sys_bpf_prog_load(&attr, sizeof(attr));
|
fd = sys_bpf_prog_load(&attr, sizeof(attr));
|
||||||
if (fd >= 0)
|
if (fd >= 0)
|
||||||
@@ -570,7 +573,7 @@ int bpf_prog_test_run_xattr(struct bpf_prog_test_run_attr *test_attr)
|
|||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
int bpf_prog_get_next_id(__u32 start_id, __u32 *next_id)
|
static int bpf_obj_get_next_id(__u32 start_id, __u32 *next_id, int cmd)
|
||||||
{
|
{
|
||||||
union bpf_attr attr;
|
union bpf_attr attr;
|
||||||
int err;
|
int err;
|
||||||
@@ -578,26 +581,26 @@ int bpf_prog_get_next_id(__u32 start_id, __u32 *next_id)
|
|||||||
memset(&attr, 0, sizeof(attr));
|
memset(&attr, 0, sizeof(attr));
|
||||||
attr.start_id = start_id;
|
attr.start_id = start_id;
|
||||||
|
|
||||||
err = sys_bpf(BPF_PROG_GET_NEXT_ID, &attr, sizeof(attr));
|
err = sys_bpf(cmd, &attr, sizeof(attr));
|
||||||
if (!err)
|
if (!err)
|
||||||
*next_id = attr.next_id;
|
*next_id = attr.next_id;
|
||||||
|
|
||||||
return err;
|
return err;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
int bpf_prog_get_next_id(__u32 start_id, __u32 *next_id)
|
||||||
|
{
|
||||||
|
return bpf_obj_get_next_id(start_id, next_id, BPF_PROG_GET_NEXT_ID);
|
||||||
|
}
|
||||||
|
|
||||||
int bpf_map_get_next_id(__u32 start_id, __u32 *next_id)
|
int bpf_map_get_next_id(__u32 start_id, __u32 *next_id)
|
||||||
{
|
{
|
||||||
union bpf_attr attr;
|
return bpf_obj_get_next_id(start_id, next_id, BPF_MAP_GET_NEXT_ID);
|
||||||
int err;
|
}
|
||||||
|
|
||||||
memset(&attr, 0, sizeof(attr));
|
int bpf_btf_get_next_id(__u32 start_id, __u32 *next_id)
|
||||||
attr.start_id = start_id;
|
{
|
||||||
|
return bpf_obj_get_next_id(start_id, next_id, BPF_BTF_GET_NEXT_ID);
|
||||||
err = sys_bpf(BPF_MAP_GET_NEXT_ID, &attr, sizeof(attr));
|
|
||||||
if (!err)
|
|
||||||
*next_id = attr.next_id;
|
|
||||||
|
|
||||||
return err;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
int bpf_prog_get_fd_by_id(__u32 id)
|
int bpf_prog_get_fd_by_id(__u32 id)
|
||||||
|
|||||||
12
src/bpf.h
12
src/bpf.h
@@ -77,8 +77,14 @@ struct bpf_load_program_attr {
|
|||||||
const struct bpf_insn *insns;
|
const struct bpf_insn *insns;
|
||||||
size_t insns_cnt;
|
size_t insns_cnt;
|
||||||
const char *license;
|
const char *license;
|
||||||
__u32 kern_version;
|
union {
|
||||||
__u32 prog_ifindex;
|
__u32 kern_version;
|
||||||
|
__u32 attach_prog_fd;
|
||||||
|
};
|
||||||
|
union {
|
||||||
|
__u32 prog_ifindex;
|
||||||
|
__u32 attach_btf_id;
|
||||||
|
};
|
||||||
__u32 prog_btf_fd;
|
__u32 prog_btf_fd;
|
||||||
__u32 func_info_rec_size;
|
__u32 func_info_rec_size;
|
||||||
const void *func_info;
|
const void *func_info;
|
||||||
@@ -87,6 +93,7 @@ struct bpf_load_program_attr {
|
|||||||
const void *line_info;
|
const void *line_info;
|
||||||
__u32 line_info_cnt;
|
__u32 line_info_cnt;
|
||||||
__u32 log_level;
|
__u32 log_level;
|
||||||
|
__u32 prog_flags;
|
||||||
};
|
};
|
||||||
|
|
||||||
/* Flags to direct loading requirements */
|
/* Flags to direct loading requirements */
|
||||||
@@ -155,6 +162,7 @@ LIBBPF_API int bpf_prog_test_run(int prog_fd, int repeat, void *data,
|
|||||||
__u32 *retval, __u32 *duration);
|
__u32 *retval, __u32 *duration);
|
||||||
LIBBPF_API int bpf_prog_get_next_id(__u32 start_id, __u32 *next_id);
|
LIBBPF_API int bpf_prog_get_next_id(__u32 start_id, __u32 *next_id);
|
||||||
LIBBPF_API int bpf_map_get_next_id(__u32 start_id, __u32 *next_id);
|
LIBBPF_API int bpf_map_get_next_id(__u32 start_id, __u32 *next_id);
|
||||||
|
LIBBPF_API int bpf_btf_get_next_id(__u32 start_id, __u32 *next_id);
|
||||||
LIBBPF_API int bpf_prog_get_fd_by_id(__u32 id);
|
LIBBPF_API int bpf_prog_get_fd_by_id(__u32 id);
|
||||||
LIBBPF_API int bpf_map_get_fd_by_id(__u32 id);
|
LIBBPF_API int bpf_map_get_fd_by_id(__u32 id);
|
||||||
LIBBPF_API int bpf_btf_get_fd_by_id(__u32 id);
|
LIBBPF_API int bpf_btf_get_fd_by_id(__u32 id);
|
||||||
|
|||||||
263
src/bpf_core_read.h
Normal file
263
src/bpf_core_read.h
Normal file
@@ -0,0 +1,263 @@
|
|||||||
|
/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
|
||||||
|
#ifndef __BPF_CORE_READ_H__
|
||||||
|
#define __BPF_CORE_READ_H__
|
||||||
|
|
||||||
|
/*
|
||||||
|
* enum bpf_field_info_kind is passed as a second argument into
|
||||||
|
* __builtin_preserve_field_info() built-in to get a specific aspect of
|
||||||
|
* a field, captured as a first argument. __builtin_preserve_field_info(field,
|
||||||
|
* info_kind) returns __u32 integer and produces BTF field relocation, which
|
||||||
|
* is understood and processed by libbpf during BPF object loading. See
|
||||||
|
* selftests/bpf for examples.
|
||||||
|
*/
|
||||||
|
enum bpf_field_info_kind {
|
||||||
|
BPF_FIELD_BYTE_OFFSET = 0, /* field byte offset */
|
||||||
|
BPF_FIELD_BYTE_SIZE = 1,
|
||||||
|
BPF_FIELD_EXISTS = 2, /* field existence in target kernel */
|
||||||
|
BPF_FIELD_SIGNED = 3,
|
||||||
|
BPF_FIELD_LSHIFT_U64 = 4,
|
||||||
|
BPF_FIELD_RSHIFT_U64 = 5,
|
||||||
|
};
|
||||||
|
|
||||||
|
#define __CORE_RELO(src, field, info) \
|
||||||
|
__builtin_preserve_field_info((src)->field, BPF_FIELD_##info)
|
||||||
|
|
||||||
|
#if __BYTE_ORDER == __LITTLE_ENDIAN
|
||||||
|
#define __CORE_BITFIELD_PROBE_READ(dst, src, fld) \
|
||||||
|
bpf_probe_read((void *)dst, \
|
||||||
|
__CORE_RELO(src, fld, BYTE_SIZE), \
|
||||||
|
(const void *)src + __CORE_RELO(src, fld, BYTE_OFFSET))
|
||||||
|
#else
|
||||||
|
/* semantics of LSHIFT_64 assumes loading values into low-ordered bytes, so
|
||||||
|
* for big-endian we need to adjust destination pointer accordingly, based on
|
||||||
|
* field byte size
|
||||||
|
*/
|
||||||
|
#define __CORE_BITFIELD_PROBE_READ(dst, src, fld) \
|
||||||
|
bpf_probe_read((void *)dst + (8 - __CORE_RELO(src, fld, BYTE_SIZE)), \
|
||||||
|
__CORE_RELO(src, fld, BYTE_SIZE), \
|
||||||
|
(const void *)src + __CORE_RELO(src, fld, BYTE_OFFSET))
|
||||||
|
#endif
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Extract bitfield, identified by s->field, and return its value as u64.
|
||||||
|
* All this is done in relocatable manner, so bitfield changes such as
|
||||||
|
* signedness, bit size, offset changes, this will be handled automatically.
|
||||||
|
* This version of macro is using bpf_probe_read() to read underlying integer
|
||||||
|
* storage. Macro functions as an expression and its return type is
|
||||||
|
* bpf_probe_read()'s return value: 0, on success, <0 on error.
|
||||||
|
*/
|
||||||
|
#define BPF_CORE_READ_BITFIELD_PROBED(s, field) ({ \
|
||||||
|
unsigned long long val = 0; \
|
||||||
|
\
|
||||||
|
__CORE_BITFIELD_PROBE_READ(&val, s, field); \
|
||||||
|
val <<= __CORE_RELO(s, field, LSHIFT_U64); \
|
||||||
|
if (__CORE_RELO(s, field, SIGNED)) \
|
||||||
|
val = ((long long)val) >> __CORE_RELO(s, field, RSHIFT_U64); \
|
||||||
|
else \
|
||||||
|
val = val >> __CORE_RELO(s, field, RSHIFT_U64); \
|
||||||
|
val; \
|
||||||
|
})
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Extract bitfield, identified by s->field, and return its value as u64.
|
||||||
|
* This version of macro is using direct memory reads and should be used from
|
||||||
|
* BPF program types that support such functionality (e.g., typed raw
|
||||||
|
* tracepoints).
|
||||||
|
*/
|
||||||
|
#define BPF_CORE_READ_BITFIELD(s, field) ({ \
|
||||||
|
const void *p = (const void *)s + __CORE_RELO(s, field, BYTE_OFFSET); \
|
||||||
|
unsigned long long val; \
|
||||||
|
\
|
||||||
|
switch (__CORE_RELO(s, field, BYTE_SIZE)) { \
|
||||||
|
case 1: val = *(const unsigned char *)p; \
|
||||||
|
case 2: val = *(const unsigned short *)p; \
|
||||||
|
case 4: val = *(const unsigned int *)p; \
|
||||||
|
case 8: val = *(const unsigned long long *)p; \
|
||||||
|
} \
|
||||||
|
val <<= __CORE_RELO(s, field, LSHIFT_U64); \
|
||||||
|
if (__CORE_RELO(s, field, SIGNED)) \
|
||||||
|
val = ((long long)val) >> __CORE_RELO(s, field, RSHIFT_U64); \
|
||||||
|
else \
|
||||||
|
val = val >> __CORE_RELO(s, field, RSHIFT_U64); \
|
||||||
|
val; \
|
||||||
|
})
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Convenience macro to check that field actually exists in target kernel's.
|
||||||
|
* Returns:
|
||||||
|
* 1, if matching field is present in target kernel;
|
||||||
|
* 0, if no matching field found.
|
||||||
|
*/
|
||||||
|
#define bpf_core_field_exists(field) \
|
||||||
|
__builtin_preserve_field_info(field, BPF_FIELD_EXISTS)
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Convenience macro to get byte size of a field. Works for integers,
|
||||||
|
* struct/unions, pointers, arrays, and enums.
|
||||||
|
*/
|
||||||
|
#define bpf_core_field_size(field) \
|
||||||
|
__builtin_preserve_field_info(field, BPF_FIELD_BYTE_SIZE)
|
||||||
|
|
||||||
|
/*
|
||||||
|
* bpf_core_read() abstracts away bpf_probe_read() call and captures offset
|
||||||
|
* relocation for source address using __builtin_preserve_access_index()
|
||||||
|
* built-in, provided by Clang.
|
||||||
|
*
|
||||||
|
* __builtin_preserve_access_index() takes as an argument an expression of
|
||||||
|
* taking an address of a field within struct/union. It makes compiler emit
|
||||||
|
* a relocation, which records BTF type ID describing root struct/union and an
|
||||||
|
* accessor string which describes exact embedded field that was used to take
|
||||||
|
* an address. See detailed description of this relocation format and
|
||||||
|
* semantics in comments to struct bpf_field_reloc in libbpf_internal.h.
|
||||||
|
*
|
||||||
|
* This relocation allows libbpf to adjust BPF instruction to use correct
|
||||||
|
* actual field offset, based on target kernel BTF type that matches original
|
||||||
|
* (local) BTF, used to record relocation.
|
||||||
|
*/
|
||||||
|
#define bpf_core_read(dst, sz, src) \
|
||||||
|
bpf_probe_read(dst, sz, \
|
||||||
|
(const void *)__builtin_preserve_access_index(src))
|
||||||
|
|
||||||
|
/*
|
||||||
|
* bpf_core_read_str() is a thin wrapper around bpf_probe_read_str()
|
||||||
|
* additionally emitting BPF CO-RE field relocation for specified source
|
||||||
|
* argument.
|
||||||
|
*/
|
||||||
|
#define bpf_core_read_str(dst, sz, src) \
|
||||||
|
bpf_probe_read_str(dst, sz, \
|
||||||
|
(const void *)__builtin_preserve_access_index(src))
|
||||||
|
|
||||||
|
#define ___concat(a, b) a ## b
|
||||||
|
#define ___apply(fn, n) ___concat(fn, n)
|
||||||
|
#define ___nth(_1, _2, _3, _4, _5, _6, _7, _8, _9, _10, __11, N, ...) N
|
||||||
|
|
||||||
|
/*
|
||||||
|
* return number of provided arguments; used for switch-based variadic macro
|
||||||
|
* definitions (see ___last, ___arrow, etc below)
|
||||||
|
*/
|
||||||
|
#define ___narg(...) ___nth(_, ##__VA_ARGS__, 10, 9, 8, 7, 6, 5, 4, 3, 2, 1, 0)
|
||||||
|
/*
|
||||||
|
* return 0 if no arguments are passed, N - otherwise; used for
|
||||||
|
* recursively-defined macros to specify termination (0) case, and generic
|
||||||
|
* (N) case (e.g., ___read_ptrs, ___core_read)
|
||||||
|
*/
|
||||||
|
#define ___empty(...) ___nth(_, ##__VA_ARGS__, N, N, N, N, N, N, N, N, N, N, 0)
|
||||||
|
|
||||||
|
#define ___last1(x) x
|
||||||
|
#define ___last2(a, x) x
|
||||||
|
#define ___last3(a, b, x) x
|
||||||
|
#define ___last4(a, b, c, x) x
|
||||||
|
#define ___last5(a, b, c, d, x) x
|
||||||
|
#define ___last6(a, b, c, d, e, x) x
|
||||||
|
#define ___last7(a, b, c, d, e, f, x) x
|
||||||
|
#define ___last8(a, b, c, d, e, f, g, x) x
|
||||||
|
#define ___last9(a, b, c, d, e, f, g, h, x) x
|
||||||
|
#define ___last10(a, b, c, d, e, f, g, h, i, x) x
|
||||||
|
#define ___last(...) ___apply(___last, ___narg(__VA_ARGS__))(__VA_ARGS__)
|
||||||
|
|
||||||
|
#define ___nolast2(a, _) a
|
||||||
|
#define ___nolast3(a, b, _) a, b
|
||||||
|
#define ___nolast4(a, b, c, _) a, b, c
|
||||||
|
#define ___nolast5(a, b, c, d, _) a, b, c, d
|
||||||
|
#define ___nolast6(a, b, c, d, e, _) a, b, c, d, e
|
||||||
|
#define ___nolast7(a, b, c, d, e, f, _) a, b, c, d, e, f
|
||||||
|
#define ___nolast8(a, b, c, d, e, f, g, _) a, b, c, d, e, f, g
|
||||||
|
#define ___nolast9(a, b, c, d, e, f, g, h, _) a, b, c, d, e, f, g, h
|
||||||
|
#define ___nolast10(a, b, c, d, e, f, g, h, i, _) a, b, c, d, e, f, g, h, i
|
||||||
|
#define ___nolast(...) ___apply(___nolast, ___narg(__VA_ARGS__))(__VA_ARGS__)
|
||||||
|
|
||||||
|
#define ___arrow1(a) a
|
||||||
|
#define ___arrow2(a, b) a->b
|
||||||
|
#define ___arrow3(a, b, c) a->b->c
|
||||||
|
#define ___arrow4(a, b, c, d) a->b->c->d
|
||||||
|
#define ___arrow5(a, b, c, d, e) a->b->c->d->e
|
||||||
|
#define ___arrow6(a, b, c, d, e, f) a->b->c->d->e->f
|
||||||
|
#define ___arrow7(a, b, c, d, e, f, g) a->b->c->d->e->f->g
|
||||||
|
#define ___arrow8(a, b, c, d, e, f, g, h) a->b->c->d->e->f->g->h
|
||||||
|
#define ___arrow9(a, b, c, d, e, f, g, h, i) a->b->c->d->e->f->g->h->i
|
||||||
|
#define ___arrow10(a, b, c, d, e, f, g, h, i, j) a->b->c->d->e->f->g->h->i->j
|
||||||
|
#define ___arrow(...) ___apply(___arrow, ___narg(__VA_ARGS__))(__VA_ARGS__)
|
||||||
|
|
||||||
|
#define ___type(...) typeof(___arrow(__VA_ARGS__))
|
||||||
|
|
||||||
|
#define ___read(read_fn, dst, src_type, src, accessor) \
|
||||||
|
read_fn((void *)(dst), sizeof(*(dst)), &((src_type)(src))->accessor)
|
||||||
|
|
||||||
|
/* "recursively" read a sequence of inner pointers using local __t var */
|
||||||
|
#define ___rd_first(src, a) ___read(bpf_core_read, &__t, ___type(src), src, a);
|
||||||
|
#define ___rd_last(...) \
|
||||||
|
___read(bpf_core_read, &__t, \
|
||||||
|
___type(___nolast(__VA_ARGS__)), __t, ___last(__VA_ARGS__));
|
||||||
|
#define ___rd_p1(...) const void *__t; ___rd_first(__VA_ARGS__)
|
||||||
|
#define ___rd_p2(...) ___rd_p1(___nolast(__VA_ARGS__)) ___rd_last(__VA_ARGS__)
|
||||||
|
#define ___rd_p3(...) ___rd_p2(___nolast(__VA_ARGS__)) ___rd_last(__VA_ARGS__)
|
||||||
|
#define ___rd_p4(...) ___rd_p3(___nolast(__VA_ARGS__)) ___rd_last(__VA_ARGS__)
|
||||||
|
#define ___rd_p5(...) ___rd_p4(___nolast(__VA_ARGS__)) ___rd_last(__VA_ARGS__)
|
||||||
|
#define ___rd_p6(...) ___rd_p5(___nolast(__VA_ARGS__)) ___rd_last(__VA_ARGS__)
|
||||||
|
#define ___rd_p7(...) ___rd_p6(___nolast(__VA_ARGS__)) ___rd_last(__VA_ARGS__)
|
||||||
|
#define ___rd_p8(...) ___rd_p7(___nolast(__VA_ARGS__)) ___rd_last(__VA_ARGS__)
|
||||||
|
#define ___rd_p9(...) ___rd_p8(___nolast(__VA_ARGS__)) ___rd_last(__VA_ARGS__)
|
||||||
|
#define ___read_ptrs(src, ...) \
|
||||||
|
___apply(___rd_p, ___narg(__VA_ARGS__))(src, __VA_ARGS__)
|
||||||
|
|
||||||
|
#define ___core_read0(fn, dst, src, a) \
|
||||||
|
___read(fn, dst, ___type(src), src, a);
|
||||||
|
#define ___core_readN(fn, dst, src, ...) \
|
||||||
|
___read_ptrs(src, ___nolast(__VA_ARGS__)) \
|
||||||
|
___read(fn, dst, ___type(src, ___nolast(__VA_ARGS__)), __t, \
|
||||||
|
___last(__VA_ARGS__));
|
||||||
|
#define ___core_read(fn, dst, src, a, ...) \
|
||||||
|
___apply(___core_read, ___empty(__VA_ARGS__))(fn, dst, \
|
||||||
|
src, a, ##__VA_ARGS__)
|
||||||
|
|
||||||
|
/*
|
||||||
|
* BPF_CORE_READ_INTO() is a more performance-conscious variant of
|
||||||
|
* BPF_CORE_READ(), in which final field is read into user-provided storage.
|
||||||
|
* See BPF_CORE_READ() below for more details on general usage.
|
||||||
|
*/
|
||||||
|
#define BPF_CORE_READ_INTO(dst, src, a, ...) \
|
||||||
|
({ \
|
||||||
|
___core_read(bpf_core_read, dst, src, a, ##__VA_ARGS__) \
|
||||||
|
})
|
||||||
|
|
||||||
|
/*
|
||||||
|
* BPF_CORE_READ_STR_INTO() does same "pointer chasing" as
|
||||||
|
* BPF_CORE_READ() for intermediate pointers, but then executes (and returns
|
||||||
|
* corresponding error code) bpf_core_read_str() for final string read.
|
||||||
|
*/
|
||||||
|
#define BPF_CORE_READ_STR_INTO(dst, src, a, ...) \
|
||||||
|
({ \
|
||||||
|
___core_read(bpf_core_read_str, dst, src, a, ##__VA_ARGS__) \
|
||||||
|
})
|
||||||
|
|
||||||
|
/*
|
||||||
|
* BPF_CORE_READ() is used to simplify BPF CO-RE relocatable read, especially
|
||||||
|
* when there are few pointer chasing steps.
|
||||||
|
* E.g., what in non-BPF world (or in BPF w/ BCC) would be something like:
|
||||||
|
* int x = s->a.b.c->d.e->f->g;
|
||||||
|
* can be succinctly achieved using BPF_CORE_READ as:
|
||||||
|
* int x = BPF_CORE_READ(s, a.b.c, d.e, f, g);
|
||||||
|
*
|
||||||
|
* BPF_CORE_READ will decompose above statement into 4 bpf_core_read (BPF
|
||||||
|
* CO-RE relocatable bpf_probe_read() wrapper) calls, logically equivalent to:
|
||||||
|
* 1. const void *__t = s->a.b.c;
|
||||||
|
* 2. __t = __t->d.e;
|
||||||
|
* 3. __t = __t->f;
|
||||||
|
* 4. return __t->g;
|
||||||
|
*
|
||||||
|
* Equivalence is logical, because there is a heavy type casting/preservation
|
||||||
|
* involved, as well as all the reads are happening through bpf_probe_read()
|
||||||
|
* calls using __builtin_preserve_access_index() to emit CO-RE relocations.
|
||||||
|
*
|
||||||
|
* N.B. Only up to 9 "field accessors" are supported, which should be more
|
||||||
|
* than enough for any practical purpose.
|
||||||
|
*/
|
||||||
|
#define BPF_CORE_READ(src, a, ...) \
|
||||||
|
({ \
|
||||||
|
___type(src, a, ##__VA_ARGS__) __r; \
|
||||||
|
BPF_CORE_READ_INTO(&__r, src, a, ##__VA_ARGS__); \
|
||||||
|
__r; \
|
||||||
|
})
|
||||||
|
|
||||||
|
#endif
|
||||||
|
|
||||||
72
src/bpf_endian.h
Normal file
72
src/bpf_endian.h
Normal file
@@ -0,0 +1,72 @@
|
|||||||
|
/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
|
||||||
|
#ifndef __BPF_ENDIAN__
|
||||||
|
#define __BPF_ENDIAN__
|
||||||
|
|
||||||
|
#include <linux/stddef.h>
|
||||||
|
#include <linux/swab.h>
|
||||||
|
|
||||||
|
/* LLVM's BPF target selects the endianness of the CPU
|
||||||
|
* it compiles on, or the user specifies (bpfel/bpfeb),
|
||||||
|
* respectively. The used __BYTE_ORDER__ is defined by
|
||||||
|
* the compiler, we cannot rely on __BYTE_ORDER from
|
||||||
|
* libc headers, since it doesn't reflect the actual
|
||||||
|
* requested byte order.
|
||||||
|
*
|
||||||
|
* Note, LLVM's BPF target has different __builtin_bswapX()
|
||||||
|
* semantics. It does map to BPF_ALU | BPF_END | BPF_TO_BE
|
||||||
|
* in bpfel and bpfeb case, which means below, that we map
|
||||||
|
* to cpu_to_be16(). We could use it unconditionally in BPF
|
||||||
|
* case, but better not rely on it, so that this header here
|
||||||
|
* can be used from application and BPF program side, which
|
||||||
|
* use different targets.
|
||||||
|
*/
|
||||||
|
#if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
|
||||||
|
# define __bpf_ntohs(x) __builtin_bswap16(x)
|
||||||
|
# define __bpf_htons(x) __builtin_bswap16(x)
|
||||||
|
# define __bpf_constant_ntohs(x) ___constant_swab16(x)
|
||||||
|
# define __bpf_constant_htons(x) ___constant_swab16(x)
|
||||||
|
# define __bpf_ntohl(x) __builtin_bswap32(x)
|
||||||
|
# define __bpf_htonl(x) __builtin_bswap32(x)
|
||||||
|
# define __bpf_constant_ntohl(x) ___constant_swab32(x)
|
||||||
|
# define __bpf_constant_htonl(x) ___constant_swab32(x)
|
||||||
|
# define __bpf_be64_to_cpu(x) __builtin_bswap64(x)
|
||||||
|
# define __bpf_cpu_to_be64(x) __builtin_bswap64(x)
|
||||||
|
# define __bpf_constant_be64_to_cpu(x) ___constant_swab64(x)
|
||||||
|
# define __bpf_constant_cpu_to_be64(x) ___constant_swab64(x)
|
||||||
|
#elif __BYTE_ORDER__ == __ORDER_BIG_ENDIAN__
|
||||||
|
# define __bpf_ntohs(x) (x)
|
||||||
|
# define __bpf_htons(x) (x)
|
||||||
|
# define __bpf_constant_ntohs(x) (x)
|
||||||
|
# define __bpf_constant_htons(x) (x)
|
||||||
|
# define __bpf_ntohl(x) (x)
|
||||||
|
# define __bpf_htonl(x) (x)
|
||||||
|
# define __bpf_constant_ntohl(x) (x)
|
||||||
|
# define __bpf_constant_htonl(x) (x)
|
||||||
|
# define __bpf_be64_to_cpu(x) (x)
|
||||||
|
# define __bpf_cpu_to_be64(x) (x)
|
||||||
|
# define __bpf_constant_be64_to_cpu(x) (x)
|
||||||
|
# define __bpf_constant_cpu_to_be64(x) (x)
|
||||||
|
#else
|
||||||
|
# error "Fix your compiler's __BYTE_ORDER__?!"
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#define bpf_htons(x) \
|
||||||
|
(__builtin_constant_p(x) ? \
|
||||||
|
__bpf_constant_htons(x) : __bpf_htons(x))
|
||||||
|
#define bpf_ntohs(x) \
|
||||||
|
(__builtin_constant_p(x) ? \
|
||||||
|
__bpf_constant_ntohs(x) : __bpf_ntohs(x))
|
||||||
|
#define bpf_htonl(x) \
|
||||||
|
(__builtin_constant_p(x) ? \
|
||||||
|
__bpf_constant_htonl(x) : __bpf_htonl(x))
|
||||||
|
#define bpf_ntohl(x) \
|
||||||
|
(__builtin_constant_p(x) ? \
|
||||||
|
__bpf_constant_ntohl(x) : __bpf_ntohl(x))
|
||||||
|
#define bpf_cpu_to_be64(x) \
|
||||||
|
(__builtin_constant_p(x) ? \
|
||||||
|
__bpf_constant_cpu_to_be64(x) : __bpf_cpu_to_be64(x))
|
||||||
|
#define bpf_be64_to_cpu(x) \
|
||||||
|
(__builtin_constant_p(x) ? \
|
||||||
|
__bpf_constant_be64_to_cpu(x) : __bpf_be64_to_cpu(x))
|
||||||
|
|
||||||
|
#endif /* __BPF_ENDIAN__ */
|
||||||
2759
src/bpf_helper_defs.h
Normal file
2759
src/bpf_helper_defs.h
Normal file
File diff suppressed because it is too large
Load Diff
47
src/bpf_helpers.h
Normal file
47
src/bpf_helpers.h
Normal file
@@ -0,0 +1,47 @@
|
|||||||
|
/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
|
||||||
|
#ifndef __BPF_HELPERS__
|
||||||
|
#define __BPF_HELPERS__
|
||||||
|
|
||||||
|
#include "bpf_helper_defs.h"
|
||||||
|
|
||||||
|
#define __uint(name, val) int (*name)[val]
|
||||||
|
#define __type(name, val) typeof(val) *name
|
||||||
|
|
||||||
|
/* Helper macro to print out debug messages */
|
||||||
|
#define bpf_printk(fmt, ...) \
|
||||||
|
({ \
|
||||||
|
char ____fmt[] = fmt; \
|
||||||
|
bpf_trace_printk(____fmt, sizeof(____fmt), \
|
||||||
|
##__VA_ARGS__); \
|
||||||
|
})
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Helper macro to place programs, maps, license in
|
||||||
|
* different sections in elf_bpf file. Section names
|
||||||
|
* are interpreted by elf_bpf loader
|
||||||
|
*/
|
||||||
|
#define SEC(NAME) __attribute__((section(NAME), used))
|
||||||
|
|
||||||
|
#ifndef __always_inline
|
||||||
|
#define __always_inline __attribute__((always_inline))
|
||||||
|
#endif
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Helper structure used by eBPF C program
|
||||||
|
* to describe BPF map attributes to libbpf loader
|
||||||
|
*/
|
||||||
|
struct bpf_map_def {
|
||||||
|
unsigned int type;
|
||||||
|
unsigned int key_size;
|
||||||
|
unsigned int value_size;
|
||||||
|
unsigned int max_entries;
|
||||||
|
unsigned int map_flags;
|
||||||
|
};
|
||||||
|
|
||||||
|
enum libbpf_pin_type {
|
||||||
|
LIBBPF_PIN_NONE,
|
||||||
|
/* PIN_BY_NAME: pin maps by name (in /sys/fs/bpf by default) */
|
||||||
|
LIBBPF_PIN_BY_NAME,
|
||||||
|
};
|
||||||
|
|
||||||
|
#endif
|
||||||
@@ -6,10 +6,7 @@
|
|||||||
#include <linux/err.h>
|
#include <linux/err.h>
|
||||||
#include <linux/bpf.h>
|
#include <linux/bpf.h>
|
||||||
#include "libbpf.h"
|
#include "libbpf.h"
|
||||||
|
#include "libbpf_internal.h"
|
||||||
#ifndef min
|
|
||||||
#define min(x, y) ((x) < (y) ? (x) : (y))
|
|
||||||
#endif
|
|
||||||
|
|
||||||
struct bpf_prog_linfo {
|
struct bpf_prog_linfo {
|
||||||
void *raw_linfo;
|
void *raw_linfo;
|
||||||
@@ -104,6 +101,7 @@ struct bpf_prog_linfo *bpf_prog_linfo__new(const struct bpf_prog_info *info)
|
|||||||
{
|
{
|
||||||
struct bpf_prog_linfo *prog_linfo;
|
struct bpf_prog_linfo *prog_linfo;
|
||||||
__u32 nr_linfo, nr_jited_func;
|
__u32 nr_linfo, nr_jited_func;
|
||||||
|
__u64 data_sz;
|
||||||
|
|
||||||
nr_linfo = info->nr_line_info;
|
nr_linfo = info->nr_line_info;
|
||||||
|
|
||||||
@@ -125,11 +123,11 @@ struct bpf_prog_linfo *bpf_prog_linfo__new(const struct bpf_prog_info *info)
|
|||||||
/* Copy xlated line_info */
|
/* Copy xlated line_info */
|
||||||
prog_linfo->nr_linfo = nr_linfo;
|
prog_linfo->nr_linfo = nr_linfo;
|
||||||
prog_linfo->rec_size = info->line_info_rec_size;
|
prog_linfo->rec_size = info->line_info_rec_size;
|
||||||
prog_linfo->raw_linfo = malloc(nr_linfo * prog_linfo->rec_size);
|
data_sz = (__u64)nr_linfo * prog_linfo->rec_size;
|
||||||
|
prog_linfo->raw_linfo = malloc(data_sz);
|
||||||
if (!prog_linfo->raw_linfo)
|
if (!prog_linfo->raw_linfo)
|
||||||
goto err_free;
|
goto err_free;
|
||||||
memcpy(prog_linfo->raw_linfo, (void *)(long)info->line_info,
|
memcpy(prog_linfo->raw_linfo, (void *)(long)info->line_info, data_sz);
|
||||||
nr_linfo * prog_linfo->rec_size);
|
|
||||||
|
|
||||||
nr_jited_func = info->nr_jited_ksyms;
|
nr_jited_func = info->nr_jited_ksyms;
|
||||||
if (!nr_jited_func ||
|
if (!nr_jited_func ||
|
||||||
@@ -145,13 +143,12 @@ struct bpf_prog_linfo *bpf_prog_linfo__new(const struct bpf_prog_info *info)
|
|||||||
/* Copy jited_line_info */
|
/* Copy jited_line_info */
|
||||||
prog_linfo->nr_jited_func = nr_jited_func;
|
prog_linfo->nr_jited_func = nr_jited_func;
|
||||||
prog_linfo->jited_rec_size = info->jited_line_info_rec_size;
|
prog_linfo->jited_rec_size = info->jited_line_info_rec_size;
|
||||||
prog_linfo->raw_jited_linfo = malloc(nr_linfo *
|
data_sz = (__u64)nr_linfo * prog_linfo->jited_rec_size;
|
||||||
prog_linfo->jited_rec_size);
|
prog_linfo->raw_jited_linfo = malloc(data_sz);
|
||||||
if (!prog_linfo->raw_jited_linfo)
|
if (!prog_linfo->raw_jited_linfo)
|
||||||
goto err_free;
|
goto err_free;
|
||||||
memcpy(prog_linfo->raw_jited_linfo,
|
memcpy(prog_linfo->raw_jited_linfo,
|
||||||
(void *)(long)info->jited_line_info,
|
(void *)(long)info->jited_line_info, data_sz);
|
||||||
nr_linfo * prog_linfo->jited_rec_size);
|
|
||||||
|
|
||||||
/* Number of jited_line_info per jited func */
|
/* Number of jited_line_info per jited func */
|
||||||
prog_linfo->nr_jited_linfo_per_func = malloc(nr_jited_func *
|
prog_linfo->nr_jited_linfo_per_func = malloc(nr_jited_func *
|
||||||
|
|||||||
195
src/bpf_tracing.h
Normal file
195
src/bpf_tracing.h
Normal file
@@ -0,0 +1,195 @@
|
|||||||
|
/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
|
||||||
|
#ifndef __BPF_TRACING_H__
|
||||||
|
#define __BPF_TRACING_H__
|
||||||
|
|
||||||
|
/* Scan the ARCH passed in from ARCH env variable (see Makefile) */
|
||||||
|
#if defined(__TARGET_ARCH_x86)
|
||||||
|
#define bpf_target_x86
|
||||||
|
#define bpf_target_defined
|
||||||
|
#elif defined(__TARGET_ARCH_s390)
|
||||||
|
#define bpf_target_s390
|
||||||
|
#define bpf_target_defined
|
||||||
|
#elif defined(__TARGET_ARCH_arm)
|
||||||
|
#define bpf_target_arm
|
||||||
|
#define bpf_target_defined
|
||||||
|
#elif defined(__TARGET_ARCH_arm64)
|
||||||
|
#define bpf_target_arm64
|
||||||
|
#define bpf_target_defined
|
||||||
|
#elif defined(__TARGET_ARCH_mips)
|
||||||
|
#define bpf_target_mips
|
||||||
|
#define bpf_target_defined
|
||||||
|
#elif defined(__TARGET_ARCH_powerpc)
|
||||||
|
#define bpf_target_powerpc
|
||||||
|
#define bpf_target_defined
|
||||||
|
#elif defined(__TARGET_ARCH_sparc)
|
||||||
|
#define bpf_target_sparc
|
||||||
|
#define bpf_target_defined
|
||||||
|
#else
|
||||||
|
#undef bpf_target_defined
|
||||||
|
#endif
|
||||||
|
|
||||||
|
/* Fall back to what the compiler says */
|
||||||
|
#ifndef bpf_target_defined
|
||||||
|
#if defined(__x86_64__)
|
||||||
|
#define bpf_target_x86
|
||||||
|
#elif defined(__s390__)
|
||||||
|
#define bpf_target_s390
|
||||||
|
#elif defined(__arm__)
|
||||||
|
#define bpf_target_arm
|
||||||
|
#elif defined(__aarch64__)
|
||||||
|
#define bpf_target_arm64
|
||||||
|
#elif defined(__mips__)
|
||||||
|
#define bpf_target_mips
|
||||||
|
#elif defined(__powerpc__)
|
||||||
|
#define bpf_target_powerpc
|
||||||
|
#elif defined(__sparc__)
|
||||||
|
#define bpf_target_sparc
|
||||||
|
#endif
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(bpf_target_x86)
|
||||||
|
|
||||||
|
#ifdef __KERNEL__
|
||||||
|
#define PT_REGS_PARM1(x) ((x)->di)
|
||||||
|
#define PT_REGS_PARM2(x) ((x)->si)
|
||||||
|
#define PT_REGS_PARM3(x) ((x)->dx)
|
||||||
|
#define PT_REGS_PARM4(x) ((x)->cx)
|
||||||
|
#define PT_REGS_PARM5(x) ((x)->r8)
|
||||||
|
#define PT_REGS_RET(x) ((x)->sp)
|
||||||
|
#define PT_REGS_FP(x) ((x)->bp)
|
||||||
|
#define PT_REGS_RC(x) ((x)->ax)
|
||||||
|
#define PT_REGS_SP(x) ((x)->sp)
|
||||||
|
#define PT_REGS_IP(x) ((x)->ip)
|
||||||
|
#else
|
||||||
|
#ifdef __i386__
|
||||||
|
/* i386 kernel is built with -mregparm=3 */
|
||||||
|
#define PT_REGS_PARM1(x) ((x)->eax)
|
||||||
|
#define PT_REGS_PARM2(x) ((x)->edx)
|
||||||
|
#define PT_REGS_PARM3(x) ((x)->ecx)
|
||||||
|
#define PT_REGS_PARM4(x) 0
|
||||||
|
#define PT_REGS_PARM5(x) 0
|
||||||
|
#define PT_REGS_RET(x) ((x)->esp)
|
||||||
|
#define PT_REGS_FP(x) ((x)->ebp)
|
||||||
|
#define PT_REGS_RC(x) ((x)->eax)
|
||||||
|
#define PT_REGS_SP(x) ((x)->esp)
|
||||||
|
#define PT_REGS_IP(x) ((x)->eip)
|
||||||
|
#else
|
||||||
|
#define PT_REGS_PARM1(x) ((x)->rdi)
|
||||||
|
#define PT_REGS_PARM2(x) ((x)->rsi)
|
||||||
|
#define PT_REGS_PARM3(x) ((x)->rdx)
|
||||||
|
#define PT_REGS_PARM4(x) ((x)->rcx)
|
||||||
|
#define PT_REGS_PARM5(x) ((x)->r8)
|
||||||
|
#define PT_REGS_RET(x) ((x)->rsp)
|
||||||
|
#define PT_REGS_FP(x) ((x)->rbp)
|
||||||
|
#define PT_REGS_RC(x) ((x)->rax)
|
||||||
|
#define PT_REGS_SP(x) ((x)->rsp)
|
||||||
|
#define PT_REGS_IP(x) ((x)->rip)
|
||||||
|
#endif
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#elif defined(bpf_target_s390)
|
||||||
|
|
||||||
|
/* s390 provides user_pt_regs instead of struct pt_regs to userspace */
|
||||||
|
struct pt_regs;
|
||||||
|
#define PT_REGS_S390 const volatile user_pt_regs
|
||||||
|
#define PT_REGS_PARM1(x) (((PT_REGS_S390 *)(x))->gprs[2])
|
||||||
|
#define PT_REGS_PARM2(x) (((PT_REGS_S390 *)(x))->gprs[3])
|
||||||
|
#define PT_REGS_PARM3(x) (((PT_REGS_S390 *)(x))->gprs[4])
|
||||||
|
#define PT_REGS_PARM4(x) (((PT_REGS_S390 *)(x))->gprs[5])
|
||||||
|
#define PT_REGS_PARM5(x) (((PT_REGS_S390 *)(x))->gprs[6])
|
||||||
|
#define PT_REGS_RET(x) (((PT_REGS_S390 *)(x))->gprs[14])
|
||||||
|
/* Works only with CONFIG_FRAME_POINTER */
|
||||||
|
#define PT_REGS_FP(x) (((PT_REGS_S390 *)(x))->gprs[11])
|
||||||
|
#define PT_REGS_RC(x) (((PT_REGS_S390 *)(x))->gprs[2])
|
||||||
|
#define PT_REGS_SP(x) (((PT_REGS_S390 *)(x))->gprs[15])
|
||||||
|
#define PT_REGS_IP(x) (((PT_REGS_S390 *)(x))->psw.addr)
|
||||||
|
|
||||||
|
#elif defined(bpf_target_arm)
|
||||||
|
|
||||||
|
#define PT_REGS_PARM1(x) ((x)->uregs[0])
|
||||||
|
#define PT_REGS_PARM2(x) ((x)->uregs[1])
|
||||||
|
#define PT_REGS_PARM3(x) ((x)->uregs[2])
|
||||||
|
#define PT_REGS_PARM4(x) ((x)->uregs[3])
|
||||||
|
#define PT_REGS_PARM5(x) ((x)->uregs[4])
|
||||||
|
#define PT_REGS_RET(x) ((x)->uregs[14])
|
||||||
|
#define PT_REGS_FP(x) ((x)->uregs[11]) /* Works only with CONFIG_FRAME_POINTER */
|
||||||
|
#define PT_REGS_RC(x) ((x)->uregs[0])
|
||||||
|
#define PT_REGS_SP(x) ((x)->uregs[13])
|
||||||
|
#define PT_REGS_IP(x) ((x)->uregs[12])
|
||||||
|
|
||||||
|
#elif defined(bpf_target_arm64)
|
||||||
|
|
||||||
|
/* arm64 provides struct user_pt_regs instead of struct pt_regs to userspace */
|
||||||
|
struct pt_regs;
|
||||||
|
#define PT_REGS_ARM64 const volatile struct user_pt_regs
|
||||||
|
#define PT_REGS_PARM1(x) (((PT_REGS_ARM64 *)(x))->regs[0])
|
||||||
|
#define PT_REGS_PARM2(x) (((PT_REGS_ARM64 *)(x))->regs[1])
|
||||||
|
#define PT_REGS_PARM3(x) (((PT_REGS_ARM64 *)(x))->regs[2])
|
||||||
|
#define PT_REGS_PARM4(x) (((PT_REGS_ARM64 *)(x))->regs[3])
|
||||||
|
#define PT_REGS_PARM5(x) (((PT_REGS_ARM64 *)(x))->regs[4])
|
||||||
|
#define PT_REGS_RET(x) (((PT_REGS_ARM64 *)(x))->regs[30])
|
||||||
|
/* Works only with CONFIG_FRAME_POINTER */
|
||||||
|
#define PT_REGS_FP(x) (((PT_REGS_ARM64 *)(x))->regs[29])
|
||||||
|
#define PT_REGS_RC(x) (((PT_REGS_ARM64 *)(x))->regs[0])
|
||||||
|
#define PT_REGS_SP(x) (((PT_REGS_ARM64 *)(x))->sp)
|
||||||
|
#define PT_REGS_IP(x) (((PT_REGS_ARM64 *)(x))->pc)
|
||||||
|
|
||||||
|
#elif defined(bpf_target_mips)
|
||||||
|
|
||||||
|
#define PT_REGS_PARM1(x) ((x)->regs[4])
|
||||||
|
#define PT_REGS_PARM2(x) ((x)->regs[5])
|
||||||
|
#define PT_REGS_PARM3(x) ((x)->regs[6])
|
||||||
|
#define PT_REGS_PARM4(x) ((x)->regs[7])
|
||||||
|
#define PT_REGS_PARM5(x) ((x)->regs[8])
|
||||||
|
#define PT_REGS_RET(x) ((x)->regs[31])
|
||||||
|
#define PT_REGS_FP(x) ((x)->regs[30]) /* Works only with CONFIG_FRAME_POINTER */
|
||||||
|
#define PT_REGS_RC(x) ((x)->regs[1])
|
||||||
|
#define PT_REGS_SP(x) ((x)->regs[29])
|
||||||
|
#define PT_REGS_IP(x) ((x)->cp0_epc)
|
||||||
|
|
||||||
|
#elif defined(bpf_target_powerpc)
|
||||||
|
|
||||||
|
#define PT_REGS_PARM1(x) ((x)->gpr[3])
|
||||||
|
#define PT_REGS_PARM2(x) ((x)->gpr[4])
|
||||||
|
#define PT_REGS_PARM3(x) ((x)->gpr[5])
|
||||||
|
#define PT_REGS_PARM4(x) ((x)->gpr[6])
|
||||||
|
#define PT_REGS_PARM5(x) ((x)->gpr[7])
|
||||||
|
#define PT_REGS_RC(x) ((x)->gpr[3])
|
||||||
|
#define PT_REGS_SP(x) ((x)->sp)
|
||||||
|
#define PT_REGS_IP(x) ((x)->nip)
|
||||||
|
|
||||||
|
#elif defined(bpf_target_sparc)
|
||||||
|
|
||||||
|
#define PT_REGS_PARM1(x) ((x)->u_regs[UREG_I0])
|
||||||
|
#define PT_REGS_PARM2(x) ((x)->u_regs[UREG_I1])
|
||||||
|
#define PT_REGS_PARM3(x) ((x)->u_regs[UREG_I2])
|
||||||
|
#define PT_REGS_PARM4(x) ((x)->u_regs[UREG_I3])
|
||||||
|
#define PT_REGS_PARM5(x) ((x)->u_regs[UREG_I4])
|
||||||
|
#define PT_REGS_RET(x) ((x)->u_regs[UREG_I7])
|
||||||
|
#define PT_REGS_RC(x) ((x)->u_regs[UREG_I0])
|
||||||
|
#define PT_REGS_SP(x) ((x)->u_regs[UREG_FP])
|
||||||
|
|
||||||
|
/* Should this also be a bpf_target check for the sparc case? */
|
||||||
|
#if defined(__arch64__)
|
||||||
|
#define PT_REGS_IP(x) ((x)->tpc)
|
||||||
|
#else
|
||||||
|
#define PT_REGS_IP(x) ((x)->pc)
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#if defined(bpf_target_powerpc)
|
||||||
|
#define BPF_KPROBE_READ_RET_IP(ip, ctx) ({ (ip) = (ctx)->link; })
|
||||||
|
#define BPF_KRETPROBE_READ_RET_IP BPF_KPROBE_READ_RET_IP
|
||||||
|
#elif defined(bpf_target_sparc)
|
||||||
|
#define BPF_KPROBE_READ_RET_IP(ip, ctx) ({ (ip) = PT_REGS_RET(ctx); })
|
||||||
|
#define BPF_KRETPROBE_READ_RET_IP BPF_KPROBE_READ_RET_IP
|
||||||
|
#else
|
||||||
|
#define BPF_KPROBE_READ_RET_IP(ip, ctx) \
|
||||||
|
({ bpf_probe_read(&(ip), sizeof(ip), (void *)PT_REGS_RET(ctx)); })
|
||||||
|
#define BPF_KRETPROBE_READ_RET_IP(ip, ctx) \
|
||||||
|
({ bpf_probe_read(&(ip), sizeof(ip), \
|
||||||
|
(void *)(PT_REGS_FP(ctx) + sizeof(ip))); })
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#endif
|
||||||
204
src/btf.h
204
src/btf.h
@@ -4,6 +4,8 @@
|
|||||||
#ifndef __LIBBPF_BTF_H
|
#ifndef __LIBBPF_BTF_H
|
||||||
#define __LIBBPF_BTF_H
|
#define __LIBBPF_BTF_H
|
||||||
|
|
||||||
|
#include <stdarg.h>
|
||||||
|
#include <linux/btf.h>
|
||||||
#include <linux/types.h>
|
#include <linux/types.h>
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
@@ -16,6 +18,7 @@ extern "C" {
|
|||||||
|
|
||||||
#define BTF_ELF_SEC ".BTF"
|
#define BTF_ELF_SEC ".BTF"
|
||||||
#define BTF_EXT_ELF_SEC ".BTF.ext"
|
#define BTF_EXT_ELF_SEC ".BTF.ext"
|
||||||
|
#define MAPS_ELF_SEC ".maps"
|
||||||
|
|
||||||
struct btf;
|
struct btf;
|
||||||
struct btf_ext;
|
struct btf_ext;
|
||||||
@@ -55,14 +58,22 @@ struct btf_ext_header {
|
|||||||
__u32 func_info_len;
|
__u32 func_info_len;
|
||||||
__u32 line_info_off;
|
__u32 line_info_off;
|
||||||
__u32 line_info_len;
|
__u32 line_info_len;
|
||||||
|
|
||||||
|
/* optional part of .BTF.ext header */
|
||||||
|
__u32 field_reloc_off;
|
||||||
|
__u32 field_reloc_len;
|
||||||
};
|
};
|
||||||
|
|
||||||
LIBBPF_API void btf__free(struct btf *btf);
|
LIBBPF_API void btf__free(struct btf *btf);
|
||||||
LIBBPF_API struct btf *btf__new(__u8 *data, __u32 size);
|
LIBBPF_API struct btf *btf__new(__u8 *data, __u32 size);
|
||||||
|
LIBBPF_API struct btf *btf__parse_elf(const char *path,
|
||||||
|
struct btf_ext **btf_ext);
|
||||||
LIBBPF_API int btf__finalize_data(struct bpf_object *obj, struct btf *btf);
|
LIBBPF_API int btf__finalize_data(struct bpf_object *obj, struct btf *btf);
|
||||||
LIBBPF_API int btf__load(struct btf *btf);
|
LIBBPF_API int btf__load(struct btf *btf);
|
||||||
LIBBPF_API __s32 btf__find_by_name(const struct btf *btf,
|
LIBBPF_API __s32 btf__find_by_name(const struct btf *btf,
|
||||||
const char *type_name);
|
const char *type_name);
|
||||||
|
LIBBPF_API __s32 btf__find_by_name_kind(const struct btf *btf,
|
||||||
|
const char *type_name, __u32 kind);
|
||||||
LIBBPF_API __u32 btf__get_nr_types(const struct btf *btf);
|
LIBBPF_API __u32 btf__get_nr_types(const struct btf *btf);
|
||||||
LIBBPF_API const struct btf_type *btf__type_by_id(const struct btf *btf,
|
LIBBPF_API const struct btf_type *btf__type_by_id(const struct btf *btf,
|
||||||
__u32 id);
|
__u32 id);
|
||||||
@@ -100,6 +111,199 @@ struct btf_dedup_opts {
|
|||||||
LIBBPF_API int btf__dedup(struct btf *btf, struct btf_ext *btf_ext,
|
LIBBPF_API int btf__dedup(struct btf *btf, struct btf_ext *btf_ext,
|
||||||
const struct btf_dedup_opts *opts);
|
const struct btf_dedup_opts *opts);
|
||||||
|
|
||||||
|
struct btf_dump;
|
||||||
|
|
||||||
|
struct btf_dump_opts {
|
||||||
|
void *ctx;
|
||||||
|
};
|
||||||
|
|
||||||
|
typedef void (*btf_dump_printf_fn_t)(void *ctx, const char *fmt, va_list args);
|
||||||
|
|
||||||
|
LIBBPF_API struct btf_dump *btf_dump__new(const struct btf *btf,
|
||||||
|
const struct btf_ext *btf_ext,
|
||||||
|
const struct btf_dump_opts *opts,
|
||||||
|
btf_dump_printf_fn_t printf_fn);
|
||||||
|
LIBBPF_API void btf_dump__free(struct btf_dump *d);
|
||||||
|
|
||||||
|
LIBBPF_API int btf_dump__dump_type(struct btf_dump *d, __u32 id);
|
||||||
|
|
||||||
|
/*
|
||||||
|
* A set of helpers for easier BTF types handling
|
||||||
|
*/
|
||||||
|
static inline __u16 btf_kind(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return BTF_INFO_KIND(t->info);
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline __u16 btf_vlen(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return BTF_INFO_VLEN(t->info);
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline bool btf_kflag(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return BTF_INFO_KFLAG(t->info);
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline bool btf_is_int(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return btf_kind(t) == BTF_KIND_INT;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline bool btf_is_ptr(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return btf_kind(t) == BTF_KIND_PTR;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline bool btf_is_array(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return btf_kind(t) == BTF_KIND_ARRAY;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline bool btf_is_struct(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return btf_kind(t) == BTF_KIND_STRUCT;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline bool btf_is_union(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return btf_kind(t) == BTF_KIND_UNION;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline bool btf_is_composite(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
__u16 kind = btf_kind(t);
|
||||||
|
|
||||||
|
return kind == BTF_KIND_STRUCT || kind == BTF_KIND_UNION;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline bool btf_is_enum(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return btf_kind(t) == BTF_KIND_ENUM;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline bool btf_is_fwd(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return btf_kind(t) == BTF_KIND_FWD;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline bool btf_is_typedef(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return btf_kind(t) == BTF_KIND_TYPEDEF;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline bool btf_is_volatile(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return btf_kind(t) == BTF_KIND_VOLATILE;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline bool btf_is_const(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return btf_kind(t) == BTF_KIND_CONST;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline bool btf_is_restrict(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return btf_kind(t) == BTF_KIND_RESTRICT;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline bool btf_is_mod(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
__u16 kind = btf_kind(t);
|
||||||
|
|
||||||
|
return kind == BTF_KIND_VOLATILE ||
|
||||||
|
kind == BTF_KIND_CONST ||
|
||||||
|
kind == BTF_KIND_RESTRICT;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline bool btf_is_func(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return btf_kind(t) == BTF_KIND_FUNC;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline bool btf_is_func_proto(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return btf_kind(t) == BTF_KIND_FUNC_PROTO;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline bool btf_is_var(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return btf_kind(t) == BTF_KIND_VAR;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline bool btf_is_datasec(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return btf_kind(t) == BTF_KIND_DATASEC;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline __u8 btf_int_encoding(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return BTF_INT_ENCODING(*(__u32 *)(t + 1));
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline __u8 btf_int_offset(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return BTF_INT_OFFSET(*(__u32 *)(t + 1));
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline __u8 btf_int_bits(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return BTF_INT_BITS(*(__u32 *)(t + 1));
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline struct btf_array *btf_array(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return (struct btf_array *)(t + 1);
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline struct btf_enum *btf_enum(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return (struct btf_enum *)(t + 1);
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline struct btf_member *btf_members(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return (struct btf_member *)(t + 1);
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Get bit offset of a member with specified index. */
|
||||||
|
static inline __u32 btf_member_bit_offset(const struct btf_type *t,
|
||||||
|
__u32 member_idx)
|
||||||
|
{
|
||||||
|
const struct btf_member *m = btf_members(t) + member_idx;
|
||||||
|
bool kflag = btf_kflag(t);
|
||||||
|
|
||||||
|
return kflag ? BTF_MEMBER_BIT_OFFSET(m->offset) : m->offset;
|
||||||
|
}
|
||||||
|
/*
|
||||||
|
* Get bitfield size of a member, assuming t is BTF_KIND_STRUCT or
|
||||||
|
* BTF_KIND_UNION. If member is not a bitfield, zero is returned.
|
||||||
|
*/
|
||||||
|
static inline __u32 btf_member_bitfield_size(const struct btf_type *t,
|
||||||
|
__u32 member_idx)
|
||||||
|
{
|
||||||
|
const struct btf_member *m = btf_members(t) + member_idx;
|
||||||
|
bool kflag = btf_kflag(t);
|
||||||
|
|
||||||
|
return kflag ? BTF_MEMBER_BITFIELD_SIZE(m->offset) : 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline struct btf_param *btf_params(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return (struct btf_param *)(t + 1);
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline struct btf_var *btf_var(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return (struct btf_var *)(t + 1);
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline struct btf_var_secinfo *
|
||||||
|
btf_var_secinfos(const struct btf_type *t)
|
||||||
|
{
|
||||||
|
return (struct btf_var_secinfo *)(t + 1);
|
||||||
|
}
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
} /* extern "C" */
|
} /* extern "C" */
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
1386
src/btf_dump.c
Normal file
1386
src/btf_dump.c
Normal file
File diff suppressed because it is too large
Load Diff
229
src/hashmap.c
Normal file
229
src/hashmap.c
Normal file
@@ -0,0 +1,229 @@
|
|||||||
|
// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Generic non-thread safe hash map implementation.
|
||||||
|
*
|
||||||
|
* Copyright (c) 2019 Facebook
|
||||||
|
*/
|
||||||
|
#include <stdint.h>
|
||||||
|
#include <stdlib.h>
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <errno.h>
|
||||||
|
#include <linux/err.h>
|
||||||
|
#include "hashmap.h"
|
||||||
|
|
||||||
|
/* start with 4 buckets */
|
||||||
|
#define HASHMAP_MIN_CAP_BITS 2
|
||||||
|
|
||||||
|
static void hashmap_add_entry(struct hashmap_entry **pprev,
|
||||||
|
struct hashmap_entry *entry)
|
||||||
|
{
|
||||||
|
entry->next = *pprev;
|
||||||
|
*pprev = entry;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void hashmap_del_entry(struct hashmap_entry **pprev,
|
||||||
|
struct hashmap_entry *entry)
|
||||||
|
{
|
||||||
|
*pprev = entry->next;
|
||||||
|
entry->next = NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
void hashmap__init(struct hashmap *map, hashmap_hash_fn hash_fn,
|
||||||
|
hashmap_equal_fn equal_fn, void *ctx)
|
||||||
|
{
|
||||||
|
map->hash_fn = hash_fn;
|
||||||
|
map->equal_fn = equal_fn;
|
||||||
|
map->ctx = ctx;
|
||||||
|
|
||||||
|
map->buckets = NULL;
|
||||||
|
map->cap = 0;
|
||||||
|
map->cap_bits = 0;
|
||||||
|
map->sz = 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
struct hashmap *hashmap__new(hashmap_hash_fn hash_fn,
|
||||||
|
hashmap_equal_fn equal_fn,
|
||||||
|
void *ctx)
|
||||||
|
{
|
||||||
|
struct hashmap *map = malloc(sizeof(struct hashmap));
|
||||||
|
|
||||||
|
if (!map)
|
||||||
|
return ERR_PTR(-ENOMEM);
|
||||||
|
hashmap__init(map, hash_fn, equal_fn, ctx);
|
||||||
|
return map;
|
||||||
|
}
|
||||||
|
|
||||||
|
void hashmap__clear(struct hashmap *map)
|
||||||
|
{
|
||||||
|
free(map->buckets);
|
||||||
|
map->cap = map->cap_bits = map->sz = 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
void hashmap__free(struct hashmap *map)
|
||||||
|
{
|
||||||
|
if (!map)
|
||||||
|
return;
|
||||||
|
|
||||||
|
hashmap__clear(map);
|
||||||
|
free(map);
|
||||||
|
}
|
||||||
|
|
||||||
|
size_t hashmap__size(const struct hashmap *map)
|
||||||
|
{
|
||||||
|
return map->sz;
|
||||||
|
}
|
||||||
|
|
||||||
|
size_t hashmap__capacity(const struct hashmap *map)
|
||||||
|
{
|
||||||
|
return map->cap;
|
||||||
|
}
|
||||||
|
|
||||||
|
static bool hashmap_needs_to_grow(struct hashmap *map)
|
||||||
|
{
|
||||||
|
/* grow if empty or more than 75% filled */
|
||||||
|
return (map->cap == 0) || ((map->sz + 1) * 4 / 3 > map->cap);
|
||||||
|
}
|
||||||
|
|
||||||
|
static int hashmap_grow(struct hashmap *map)
|
||||||
|
{
|
||||||
|
struct hashmap_entry **new_buckets;
|
||||||
|
struct hashmap_entry *cur, *tmp;
|
||||||
|
size_t new_cap_bits, new_cap;
|
||||||
|
size_t h;
|
||||||
|
int bkt;
|
||||||
|
|
||||||
|
new_cap_bits = map->cap_bits + 1;
|
||||||
|
if (new_cap_bits < HASHMAP_MIN_CAP_BITS)
|
||||||
|
new_cap_bits = HASHMAP_MIN_CAP_BITS;
|
||||||
|
|
||||||
|
new_cap = 1UL << new_cap_bits;
|
||||||
|
new_buckets = calloc(new_cap, sizeof(new_buckets[0]));
|
||||||
|
if (!new_buckets)
|
||||||
|
return -ENOMEM;
|
||||||
|
|
||||||
|
hashmap__for_each_entry_safe(map, cur, tmp, bkt) {
|
||||||
|
h = hash_bits(map->hash_fn(cur->key, map->ctx), new_cap_bits);
|
||||||
|
hashmap_add_entry(&new_buckets[h], cur);
|
||||||
|
}
|
||||||
|
|
||||||
|
map->cap = new_cap;
|
||||||
|
map->cap_bits = new_cap_bits;
|
||||||
|
free(map->buckets);
|
||||||
|
map->buckets = new_buckets;
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
static bool hashmap_find_entry(const struct hashmap *map,
|
||||||
|
const void *key, size_t hash,
|
||||||
|
struct hashmap_entry ***pprev,
|
||||||
|
struct hashmap_entry **entry)
|
||||||
|
{
|
||||||
|
struct hashmap_entry *cur, **prev_ptr;
|
||||||
|
|
||||||
|
if (!map->buckets)
|
||||||
|
return false;
|
||||||
|
|
||||||
|
for (prev_ptr = &map->buckets[hash], cur = *prev_ptr;
|
||||||
|
cur;
|
||||||
|
prev_ptr = &cur->next, cur = cur->next) {
|
||||||
|
if (map->equal_fn(cur->key, key, map->ctx)) {
|
||||||
|
if (pprev)
|
||||||
|
*pprev = prev_ptr;
|
||||||
|
*entry = cur;
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
int hashmap__insert(struct hashmap *map, const void *key, void *value,
|
||||||
|
enum hashmap_insert_strategy strategy,
|
||||||
|
const void **old_key, void **old_value)
|
||||||
|
{
|
||||||
|
struct hashmap_entry *entry;
|
||||||
|
size_t h;
|
||||||
|
int err;
|
||||||
|
|
||||||
|
if (old_key)
|
||||||
|
*old_key = NULL;
|
||||||
|
if (old_value)
|
||||||
|
*old_value = NULL;
|
||||||
|
|
||||||
|
h = hash_bits(map->hash_fn(key, map->ctx), map->cap_bits);
|
||||||
|
if (strategy != HASHMAP_APPEND &&
|
||||||
|
hashmap_find_entry(map, key, h, NULL, &entry)) {
|
||||||
|
if (old_key)
|
||||||
|
*old_key = entry->key;
|
||||||
|
if (old_value)
|
||||||
|
*old_value = entry->value;
|
||||||
|
|
||||||
|
if (strategy == HASHMAP_SET || strategy == HASHMAP_UPDATE) {
|
||||||
|
entry->key = key;
|
||||||
|
entry->value = value;
|
||||||
|
return 0;
|
||||||
|
} else if (strategy == HASHMAP_ADD) {
|
||||||
|
return -EEXIST;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (strategy == HASHMAP_UPDATE)
|
||||||
|
return -ENOENT;
|
||||||
|
|
||||||
|
if (hashmap_needs_to_grow(map)) {
|
||||||
|
err = hashmap_grow(map);
|
||||||
|
if (err)
|
||||||
|
return err;
|
||||||
|
h = hash_bits(map->hash_fn(key, map->ctx), map->cap_bits);
|
||||||
|
}
|
||||||
|
|
||||||
|
entry = malloc(sizeof(struct hashmap_entry));
|
||||||
|
if (!entry)
|
||||||
|
return -ENOMEM;
|
||||||
|
|
||||||
|
entry->key = key;
|
||||||
|
entry->value = value;
|
||||||
|
hashmap_add_entry(&map->buckets[h], entry);
|
||||||
|
map->sz++;
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
bool hashmap__find(const struct hashmap *map, const void *key, void **value)
|
||||||
|
{
|
||||||
|
struct hashmap_entry *entry;
|
||||||
|
size_t h;
|
||||||
|
|
||||||
|
h = hash_bits(map->hash_fn(key, map->ctx), map->cap_bits);
|
||||||
|
if (!hashmap_find_entry(map, key, h, NULL, &entry))
|
||||||
|
return false;
|
||||||
|
|
||||||
|
if (value)
|
||||||
|
*value = entry->value;
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
bool hashmap__delete(struct hashmap *map, const void *key,
|
||||||
|
const void **old_key, void **old_value)
|
||||||
|
{
|
||||||
|
struct hashmap_entry **pprev, *entry;
|
||||||
|
size_t h;
|
||||||
|
|
||||||
|
h = hash_bits(map->hash_fn(key, map->ctx), map->cap_bits);
|
||||||
|
if (!hashmap_find_entry(map, key, h, &pprev, &entry))
|
||||||
|
return false;
|
||||||
|
|
||||||
|
if (old_key)
|
||||||
|
*old_key = entry->key;
|
||||||
|
if (old_value)
|
||||||
|
*old_value = entry->value;
|
||||||
|
|
||||||
|
hashmap_del_entry(pprev, entry);
|
||||||
|
free(entry);
|
||||||
|
map->sz--;
|
||||||
|
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
178
src/hashmap.h
Normal file
178
src/hashmap.h
Normal file
@@ -0,0 +1,178 @@
|
|||||||
|
/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Generic non-thread safe hash map implementation.
|
||||||
|
*
|
||||||
|
* Copyright (c) 2019 Facebook
|
||||||
|
*/
|
||||||
|
#ifndef __LIBBPF_HASHMAP_H
|
||||||
|
#define __LIBBPF_HASHMAP_H
|
||||||
|
|
||||||
|
#include <stdbool.h>
|
||||||
|
#include <stddef.h>
|
||||||
|
#ifdef __GLIBC__
|
||||||
|
#include <bits/wordsize.h>
|
||||||
|
#else
|
||||||
|
#include <bits/reg.h>
|
||||||
|
#endif
|
||||||
|
#include "libbpf_internal.h"
|
||||||
|
|
||||||
|
static inline size_t hash_bits(size_t h, int bits)
|
||||||
|
{
|
||||||
|
/* shuffle bits and return requested number of upper bits */
|
||||||
|
return (h * 11400714819323198485llu) >> (__WORDSIZE - bits);
|
||||||
|
}
|
||||||
|
|
||||||
|
typedef size_t (*hashmap_hash_fn)(const void *key, void *ctx);
|
||||||
|
typedef bool (*hashmap_equal_fn)(const void *key1, const void *key2, void *ctx);
|
||||||
|
|
||||||
|
struct hashmap_entry {
|
||||||
|
const void *key;
|
||||||
|
void *value;
|
||||||
|
struct hashmap_entry *next;
|
||||||
|
};
|
||||||
|
|
||||||
|
struct hashmap {
|
||||||
|
hashmap_hash_fn hash_fn;
|
||||||
|
hashmap_equal_fn equal_fn;
|
||||||
|
void *ctx;
|
||||||
|
|
||||||
|
struct hashmap_entry **buckets;
|
||||||
|
size_t cap;
|
||||||
|
size_t cap_bits;
|
||||||
|
size_t sz;
|
||||||
|
};
|
||||||
|
|
||||||
|
#define HASHMAP_INIT(hash_fn, equal_fn, ctx) { \
|
||||||
|
.hash_fn = (hash_fn), \
|
||||||
|
.equal_fn = (equal_fn), \
|
||||||
|
.ctx = (ctx), \
|
||||||
|
.buckets = NULL, \
|
||||||
|
.cap = 0, \
|
||||||
|
.cap_bits = 0, \
|
||||||
|
.sz = 0, \
|
||||||
|
}
|
||||||
|
|
||||||
|
void hashmap__init(struct hashmap *map, hashmap_hash_fn hash_fn,
|
||||||
|
hashmap_equal_fn equal_fn, void *ctx);
|
||||||
|
struct hashmap *hashmap__new(hashmap_hash_fn hash_fn,
|
||||||
|
hashmap_equal_fn equal_fn,
|
||||||
|
void *ctx);
|
||||||
|
void hashmap__clear(struct hashmap *map);
|
||||||
|
void hashmap__free(struct hashmap *map);
|
||||||
|
|
||||||
|
size_t hashmap__size(const struct hashmap *map);
|
||||||
|
size_t hashmap__capacity(const struct hashmap *map);
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Hashmap insertion strategy:
|
||||||
|
* - HASHMAP_ADD - only add key/value if key doesn't exist yet;
|
||||||
|
* - HASHMAP_SET - add key/value pair if key doesn't exist yet; otherwise,
|
||||||
|
* update value;
|
||||||
|
* - HASHMAP_UPDATE - update value, if key already exists; otherwise, do
|
||||||
|
* nothing and return -ENOENT;
|
||||||
|
* - HASHMAP_APPEND - always add key/value pair, even if key already exists.
|
||||||
|
* This turns hashmap into a multimap by allowing multiple values to be
|
||||||
|
* associated with the same key. Most useful read API for such hashmap is
|
||||||
|
* hashmap__for_each_key_entry() iteration. If hashmap__find() is still
|
||||||
|
* used, it will return last inserted key/value entry (first in a bucket
|
||||||
|
* chain).
|
||||||
|
*/
|
||||||
|
enum hashmap_insert_strategy {
|
||||||
|
HASHMAP_ADD,
|
||||||
|
HASHMAP_SET,
|
||||||
|
HASHMAP_UPDATE,
|
||||||
|
HASHMAP_APPEND,
|
||||||
|
};
|
||||||
|
|
||||||
|
/*
|
||||||
|
* hashmap__insert() adds key/value entry w/ various semantics, depending on
|
||||||
|
* provided strategy value. If a given key/value pair replaced already
|
||||||
|
* existing key/value pair, both old key and old value will be returned
|
||||||
|
* through old_key and old_value to allow calling code do proper memory
|
||||||
|
* management.
|
||||||
|
*/
|
||||||
|
int hashmap__insert(struct hashmap *map, const void *key, void *value,
|
||||||
|
enum hashmap_insert_strategy strategy,
|
||||||
|
const void **old_key, void **old_value);
|
||||||
|
|
||||||
|
static inline int hashmap__add(struct hashmap *map,
|
||||||
|
const void *key, void *value)
|
||||||
|
{
|
||||||
|
return hashmap__insert(map, key, value, HASHMAP_ADD, NULL, NULL);
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline int hashmap__set(struct hashmap *map,
|
||||||
|
const void *key, void *value,
|
||||||
|
const void **old_key, void **old_value)
|
||||||
|
{
|
||||||
|
return hashmap__insert(map, key, value, HASHMAP_SET,
|
||||||
|
old_key, old_value);
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline int hashmap__update(struct hashmap *map,
|
||||||
|
const void *key, void *value,
|
||||||
|
const void **old_key, void **old_value)
|
||||||
|
{
|
||||||
|
return hashmap__insert(map, key, value, HASHMAP_UPDATE,
|
||||||
|
old_key, old_value);
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline int hashmap__append(struct hashmap *map,
|
||||||
|
const void *key, void *value)
|
||||||
|
{
|
||||||
|
return hashmap__insert(map, key, value, HASHMAP_APPEND, NULL, NULL);
|
||||||
|
}
|
||||||
|
|
||||||
|
bool hashmap__delete(struct hashmap *map, const void *key,
|
||||||
|
const void **old_key, void **old_value);
|
||||||
|
|
||||||
|
bool hashmap__find(const struct hashmap *map, const void *key, void **value);
|
||||||
|
|
||||||
|
/*
|
||||||
|
* hashmap__for_each_entry - iterate over all entries in hashmap
|
||||||
|
* @map: hashmap to iterate
|
||||||
|
* @cur: struct hashmap_entry * used as a loop cursor
|
||||||
|
* @bkt: integer used as a bucket loop cursor
|
||||||
|
*/
|
||||||
|
#define hashmap__for_each_entry(map, cur, bkt) \
|
||||||
|
for (bkt = 0; bkt < map->cap; bkt++) \
|
||||||
|
for (cur = map->buckets[bkt]; cur; cur = cur->next)
|
||||||
|
|
||||||
|
/*
|
||||||
|
* hashmap__for_each_entry_safe - iterate over all entries in hashmap, safe
|
||||||
|
* against removals
|
||||||
|
* @map: hashmap to iterate
|
||||||
|
* @cur: struct hashmap_entry * used as a loop cursor
|
||||||
|
* @tmp: struct hashmap_entry * used as a temporary next cursor storage
|
||||||
|
* @bkt: integer used as a bucket loop cursor
|
||||||
|
*/
|
||||||
|
#define hashmap__for_each_entry_safe(map, cur, tmp, bkt) \
|
||||||
|
for (bkt = 0; bkt < map->cap; bkt++) \
|
||||||
|
for (cur = map->buckets[bkt]; \
|
||||||
|
cur && ({tmp = cur->next; true; }); \
|
||||||
|
cur = tmp)
|
||||||
|
|
||||||
|
/*
|
||||||
|
* hashmap__for_each_key_entry - iterate over entries associated with given key
|
||||||
|
* @map: hashmap to iterate
|
||||||
|
* @cur: struct hashmap_entry * used as a loop cursor
|
||||||
|
* @key: key to iterate entries for
|
||||||
|
*/
|
||||||
|
#define hashmap__for_each_key_entry(map, cur, _key) \
|
||||||
|
for (cur = ({ size_t bkt = hash_bits(map->hash_fn((_key), map->ctx),\
|
||||||
|
map->cap_bits); \
|
||||||
|
map->buckets ? map->buckets[bkt] : NULL; }); \
|
||||||
|
cur; \
|
||||||
|
cur = cur->next) \
|
||||||
|
if (map->equal_fn(cur->key, (_key), map->ctx))
|
||||||
|
|
||||||
|
#define hashmap__for_each_key_entry_safe(map, cur, tmp, _key) \
|
||||||
|
for (cur = ({ size_t bkt = hash_bits(map->hash_fn((_key), map->ctx),\
|
||||||
|
map->cap_bits); \
|
||||||
|
cur = map->buckets ? map->buckets[bkt] : NULL; }); \
|
||||||
|
cur && ({ tmp = cur->next; true; }); \
|
||||||
|
cur = tmp) \
|
||||||
|
if (map->equal_fn(cur->key, (_key), map->ctx))
|
||||||
|
|
||||||
|
#endif /* __LIBBPF_HASHMAP_H */
|
||||||
4390
src/libbpf.c
4390
src/libbpf.c
File diff suppressed because it is too large
Load Diff
257
src/libbpf.h
257
src/libbpf.h
@@ -57,7 +57,7 @@ enum libbpf_print_level {
|
|||||||
typedef int (*libbpf_print_fn_t)(enum libbpf_print_level level,
|
typedef int (*libbpf_print_fn_t)(enum libbpf_print_level level,
|
||||||
const char *, va_list ap);
|
const char *, va_list ap);
|
||||||
|
|
||||||
LIBBPF_API void libbpf_set_print(libbpf_print_fn_t fn);
|
LIBBPF_API libbpf_print_fn_t libbpf_set_print(libbpf_print_fn_t fn);
|
||||||
|
|
||||||
/* Hide internal to user */
|
/* Hide internal to user */
|
||||||
struct bpf_object;
|
struct bpf_object;
|
||||||
@@ -67,18 +67,80 @@ struct bpf_object_open_attr {
|
|||||||
enum bpf_prog_type prog_type;
|
enum bpf_prog_type prog_type;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
/* Helper macro to declare and initialize libbpf options struct
|
||||||
|
*
|
||||||
|
* This dance with uninitialized declaration, followed by memset to zero,
|
||||||
|
* followed by assignment using compound literal syntax is done to preserve
|
||||||
|
* ability to use a nice struct field initialization syntax and **hopefully**
|
||||||
|
* have all the padding bytes initialized to zero. It's not guaranteed though,
|
||||||
|
* when copying literal, that compiler won't copy garbage in literal's padding
|
||||||
|
* bytes, but that's the best way I've found and it seems to work in practice.
|
||||||
|
*
|
||||||
|
* Macro declares opts struct of given type and name, zero-initializes,
|
||||||
|
* including any extra padding, it with memset() and then assigns initial
|
||||||
|
* values provided by users in struct initializer-syntax as varargs.
|
||||||
|
*/
|
||||||
|
#define DECLARE_LIBBPF_OPTS(TYPE, NAME, ...) \
|
||||||
|
struct TYPE NAME = ({ \
|
||||||
|
memset(&NAME, 0, sizeof(struct TYPE)); \
|
||||||
|
(struct TYPE) { \
|
||||||
|
.sz = sizeof(struct TYPE), \
|
||||||
|
__VA_ARGS__ \
|
||||||
|
}; \
|
||||||
|
})
|
||||||
|
|
||||||
|
struct bpf_object_open_opts {
|
||||||
|
/* size of this struct, for forward/backward compatiblity */
|
||||||
|
size_t sz;
|
||||||
|
/* object name override, if provided:
|
||||||
|
* - for object open from file, this will override setting object
|
||||||
|
* name from file path's base name;
|
||||||
|
* - for object open from memory buffer, this will specify an object
|
||||||
|
* name and will override default "<addr>-<buf-size>" name;
|
||||||
|
*/
|
||||||
|
const char *object_name;
|
||||||
|
/* parse map definitions non-strictly, allowing extra attributes/data */
|
||||||
|
bool relaxed_maps;
|
||||||
|
/* process CO-RE relocations non-strictly, allowing them to fail */
|
||||||
|
bool relaxed_core_relocs;
|
||||||
|
/* maps that set the 'pinning' attribute in their definition will have
|
||||||
|
* their pin_path attribute set to a file in this directory, and be
|
||||||
|
* auto-pinned to that path on load; defaults to "/sys/fs/bpf".
|
||||||
|
*/
|
||||||
|
const char *pin_root_path;
|
||||||
|
__u32 attach_prog_fd;
|
||||||
|
};
|
||||||
|
#define bpf_object_open_opts__last_field attach_prog_fd
|
||||||
|
|
||||||
LIBBPF_API struct bpf_object *bpf_object__open(const char *path);
|
LIBBPF_API struct bpf_object *bpf_object__open(const char *path);
|
||||||
LIBBPF_API struct bpf_object *
|
LIBBPF_API struct bpf_object *
|
||||||
|
bpf_object__open_file(const char *path, struct bpf_object_open_opts *opts);
|
||||||
|
LIBBPF_API struct bpf_object *
|
||||||
|
bpf_object__open_mem(const void *obj_buf, size_t obj_buf_sz,
|
||||||
|
struct bpf_object_open_opts *opts);
|
||||||
|
|
||||||
|
/* deprecated bpf_object__open variants */
|
||||||
|
LIBBPF_API struct bpf_object *
|
||||||
|
bpf_object__open_buffer(const void *obj_buf, size_t obj_buf_sz,
|
||||||
|
const char *name);
|
||||||
|
LIBBPF_API struct bpf_object *
|
||||||
bpf_object__open_xattr(struct bpf_object_open_attr *attr);
|
bpf_object__open_xattr(struct bpf_object_open_attr *attr);
|
||||||
struct bpf_object *__bpf_object__open_xattr(struct bpf_object_open_attr *attr,
|
|
||||||
int flags);
|
|
||||||
LIBBPF_API struct bpf_object *bpf_object__open_buffer(void *obj_buf,
|
|
||||||
size_t obj_buf_sz,
|
|
||||||
const char *name);
|
|
||||||
int bpf_object__section_size(const struct bpf_object *obj, const char *name,
|
int bpf_object__section_size(const struct bpf_object *obj, const char *name,
|
||||||
__u32 *size);
|
__u32 *size);
|
||||||
int bpf_object__variable_offset(const struct bpf_object *obj, const char *name,
|
int bpf_object__variable_offset(const struct bpf_object *obj, const char *name,
|
||||||
__u32 *off);
|
__u32 *off);
|
||||||
|
|
||||||
|
enum libbpf_pin_type {
|
||||||
|
LIBBPF_PIN_NONE,
|
||||||
|
/* PIN_BY_NAME: pin maps by name (in /sys/fs/bpf by default) */
|
||||||
|
LIBBPF_PIN_BY_NAME,
|
||||||
|
};
|
||||||
|
|
||||||
|
/* pin_maps and unpin_maps can both be called with a NULL path, in which case
|
||||||
|
* they will use the pin_path attribute of each map (and ignore all maps that
|
||||||
|
* don't have a pin_path set).
|
||||||
|
*/
|
||||||
LIBBPF_API int bpf_object__pin_maps(struct bpf_object *obj, const char *path);
|
LIBBPF_API int bpf_object__pin_maps(struct bpf_object *obj, const char *path);
|
||||||
LIBBPF_API int bpf_object__unpin_maps(struct bpf_object *obj,
|
LIBBPF_API int bpf_object__unpin_maps(struct bpf_object *obj,
|
||||||
const char *path);
|
const char *path);
|
||||||
@@ -89,18 +151,26 @@ LIBBPF_API int bpf_object__unpin_programs(struct bpf_object *obj,
|
|||||||
LIBBPF_API int bpf_object__pin(struct bpf_object *object, const char *path);
|
LIBBPF_API int bpf_object__pin(struct bpf_object *object, const char *path);
|
||||||
LIBBPF_API void bpf_object__close(struct bpf_object *object);
|
LIBBPF_API void bpf_object__close(struct bpf_object *object);
|
||||||
|
|
||||||
|
struct bpf_object_load_attr {
|
||||||
|
struct bpf_object *obj;
|
||||||
|
int log_level;
|
||||||
|
const char *target_btf_path;
|
||||||
|
};
|
||||||
|
|
||||||
/* Load/unload object into/from kernel */
|
/* Load/unload object into/from kernel */
|
||||||
LIBBPF_API int bpf_object__load(struct bpf_object *obj);
|
LIBBPF_API int bpf_object__load(struct bpf_object *obj);
|
||||||
|
LIBBPF_API int bpf_object__load_xattr(struct bpf_object_load_attr *attr);
|
||||||
LIBBPF_API int bpf_object__unload(struct bpf_object *obj);
|
LIBBPF_API int bpf_object__unload(struct bpf_object *obj);
|
||||||
LIBBPF_API const char *bpf_object__name(struct bpf_object *obj);
|
LIBBPF_API const char *bpf_object__name(const struct bpf_object *obj);
|
||||||
LIBBPF_API unsigned int bpf_object__kversion(struct bpf_object *obj);
|
LIBBPF_API unsigned int bpf_object__kversion(const struct bpf_object *obj);
|
||||||
|
|
||||||
struct btf;
|
struct btf;
|
||||||
LIBBPF_API struct btf *bpf_object__btf(struct bpf_object *obj);
|
LIBBPF_API struct btf *bpf_object__btf(const struct bpf_object *obj);
|
||||||
LIBBPF_API int bpf_object__btf_fd(const struct bpf_object *obj);
|
LIBBPF_API int bpf_object__btf_fd(const struct bpf_object *obj);
|
||||||
|
|
||||||
LIBBPF_API struct bpf_program *
|
LIBBPF_API struct bpf_program *
|
||||||
bpf_object__find_program_by_title(struct bpf_object *obj, const char *title);
|
bpf_object__find_program_by_title(const struct bpf_object *obj,
|
||||||
|
const char *title);
|
||||||
|
|
||||||
LIBBPF_API struct bpf_object *bpf_object__next(struct bpf_object *prev);
|
LIBBPF_API struct bpf_object *bpf_object__next(struct bpf_object *prev);
|
||||||
#define bpf_object__for_each_safe(pos, tmp) \
|
#define bpf_object__for_each_safe(pos, tmp) \
|
||||||
@@ -112,18 +182,20 @@ LIBBPF_API struct bpf_object *bpf_object__next(struct bpf_object *prev);
|
|||||||
typedef void (*bpf_object_clear_priv_t)(struct bpf_object *, void *);
|
typedef void (*bpf_object_clear_priv_t)(struct bpf_object *, void *);
|
||||||
LIBBPF_API int bpf_object__set_priv(struct bpf_object *obj, void *priv,
|
LIBBPF_API int bpf_object__set_priv(struct bpf_object *obj, void *priv,
|
||||||
bpf_object_clear_priv_t clear_priv);
|
bpf_object_clear_priv_t clear_priv);
|
||||||
LIBBPF_API void *bpf_object__priv(struct bpf_object *prog);
|
LIBBPF_API void *bpf_object__priv(const struct bpf_object *prog);
|
||||||
|
|
||||||
LIBBPF_API int
|
LIBBPF_API int
|
||||||
libbpf_prog_type_by_name(const char *name, enum bpf_prog_type *prog_type,
|
libbpf_prog_type_by_name(const char *name, enum bpf_prog_type *prog_type,
|
||||||
enum bpf_attach_type *expected_attach_type);
|
enum bpf_attach_type *expected_attach_type);
|
||||||
LIBBPF_API int libbpf_attach_type_by_name(const char *name,
|
LIBBPF_API int libbpf_attach_type_by_name(const char *name,
|
||||||
enum bpf_attach_type *attach_type);
|
enum bpf_attach_type *attach_type);
|
||||||
|
LIBBPF_API int libbpf_find_vmlinux_btf_id(const char *name,
|
||||||
|
enum bpf_attach_type attach_type);
|
||||||
|
|
||||||
/* Accessors of bpf_program */
|
/* Accessors of bpf_program */
|
||||||
struct bpf_program;
|
struct bpf_program;
|
||||||
LIBBPF_API struct bpf_program *bpf_program__next(struct bpf_program *prog,
|
LIBBPF_API struct bpf_program *bpf_program__next(struct bpf_program *prog,
|
||||||
struct bpf_object *obj);
|
const struct bpf_object *obj);
|
||||||
|
|
||||||
#define bpf_object__for_each_program(pos, obj) \
|
#define bpf_object__for_each_program(pos, obj) \
|
||||||
for ((pos) = bpf_program__next(NULL, (obj)); \
|
for ((pos) = bpf_program__next(NULL, (obj)); \
|
||||||
@@ -131,24 +203,26 @@ LIBBPF_API struct bpf_program *bpf_program__next(struct bpf_program *prog,
|
|||||||
(pos) = bpf_program__next((pos), (obj)))
|
(pos) = bpf_program__next((pos), (obj)))
|
||||||
|
|
||||||
LIBBPF_API struct bpf_program *bpf_program__prev(struct bpf_program *prog,
|
LIBBPF_API struct bpf_program *bpf_program__prev(struct bpf_program *prog,
|
||||||
struct bpf_object *obj);
|
const struct bpf_object *obj);
|
||||||
|
|
||||||
typedef void (*bpf_program_clear_priv_t)(struct bpf_program *,
|
typedef void (*bpf_program_clear_priv_t)(struct bpf_program *, void *);
|
||||||
void *);
|
|
||||||
|
|
||||||
LIBBPF_API int bpf_program__set_priv(struct bpf_program *prog, void *priv,
|
LIBBPF_API int bpf_program__set_priv(struct bpf_program *prog, void *priv,
|
||||||
bpf_program_clear_priv_t clear_priv);
|
bpf_program_clear_priv_t clear_priv);
|
||||||
|
|
||||||
LIBBPF_API void *bpf_program__priv(struct bpf_program *prog);
|
LIBBPF_API void *bpf_program__priv(const struct bpf_program *prog);
|
||||||
LIBBPF_API void bpf_program__set_ifindex(struct bpf_program *prog,
|
LIBBPF_API void bpf_program__set_ifindex(struct bpf_program *prog,
|
||||||
__u32 ifindex);
|
__u32 ifindex);
|
||||||
|
|
||||||
LIBBPF_API const char *bpf_program__title(struct bpf_program *prog,
|
LIBBPF_API const char *bpf_program__title(const struct bpf_program *prog,
|
||||||
bool needs_copy);
|
bool needs_copy);
|
||||||
|
|
||||||
|
/* returns program size in bytes */
|
||||||
|
LIBBPF_API size_t bpf_program__size(const struct bpf_program *prog);
|
||||||
|
|
||||||
LIBBPF_API int bpf_program__load(struct bpf_program *prog, char *license,
|
LIBBPF_API int bpf_program__load(struct bpf_program *prog, char *license,
|
||||||
__u32 kern_version);
|
__u32 kern_version);
|
||||||
LIBBPF_API int bpf_program__fd(struct bpf_program *prog);
|
LIBBPF_API int bpf_program__fd(const struct bpf_program *prog);
|
||||||
LIBBPF_API int bpf_program__pin_instance(struct bpf_program *prog,
|
LIBBPF_API int bpf_program__pin_instance(struct bpf_program *prog,
|
||||||
const char *path,
|
const char *path,
|
||||||
int instance);
|
int instance);
|
||||||
@@ -159,6 +233,29 @@ LIBBPF_API int bpf_program__pin(struct bpf_program *prog, const char *path);
|
|||||||
LIBBPF_API int bpf_program__unpin(struct bpf_program *prog, const char *path);
|
LIBBPF_API int bpf_program__unpin(struct bpf_program *prog, const char *path);
|
||||||
LIBBPF_API void bpf_program__unload(struct bpf_program *prog);
|
LIBBPF_API void bpf_program__unload(struct bpf_program *prog);
|
||||||
|
|
||||||
|
struct bpf_link;
|
||||||
|
|
||||||
|
LIBBPF_API int bpf_link__destroy(struct bpf_link *link);
|
||||||
|
|
||||||
|
LIBBPF_API struct bpf_link *
|
||||||
|
bpf_program__attach_perf_event(struct bpf_program *prog, int pfd);
|
||||||
|
LIBBPF_API struct bpf_link *
|
||||||
|
bpf_program__attach_kprobe(struct bpf_program *prog, bool retprobe,
|
||||||
|
const char *func_name);
|
||||||
|
LIBBPF_API struct bpf_link *
|
||||||
|
bpf_program__attach_uprobe(struct bpf_program *prog, bool retprobe,
|
||||||
|
pid_t pid, const char *binary_path,
|
||||||
|
size_t func_offset);
|
||||||
|
LIBBPF_API struct bpf_link *
|
||||||
|
bpf_program__attach_tracepoint(struct bpf_program *prog,
|
||||||
|
const char *tp_category,
|
||||||
|
const char *tp_name);
|
||||||
|
LIBBPF_API struct bpf_link *
|
||||||
|
bpf_program__attach_raw_tracepoint(struct bpf_program *prog,
|
||||||
|
const char *tp_name);
|
||||||
|
|
||||||
|
LIBBPF_API struct bpf_link *
|
||||||
|
bpf_program__attach_trace(struct bpf_program *prog);
|
||||||
struct bpf_insn;
|
struct bpf_insn;
|
||||||
|
|
||||||
/*
|
/*
|
||||||
@@ -221,7 +318,7 @@ typedef int (*bpf_program_prep_t)(struct bpf_program *prog, int n,
|
|||||||
LIBBPF_API int bpf_program__set_prep(struct bpf_program *prog, int nr_instance,
|
LIBBPF_API int bpf_program__set_prep(struct bpf_program *prog, int nr_instance,
|
||||||
bpf_program_prep_t prep);
|
bpf_program_prep_t prep);
|
||||||
|
|
||||||
LIBBPF_API int bpf_program__nth_fd(struct bpf_program *prog, int n);
|
LIBBPF_API int bpf_program__nth_fd(const struct bpf_program *prog, int n);
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Adjust type of BPF program. Default is kprobe.
|
* Adjust type of BPF program. Default is kprobe.
|
||||||
@@ -234,20 +331,27 @@ LIBBPF_API int bpf_program__set_sched_cls(struct bpf_program *prog);
|
|||||||
LIBBPF_API int bpf_program__set_sched_act(struct bpf_program *prog);
|
LIBBPF_API int bpf_program__set_sched_act(struct bpf_program *prog);
|
||||||
LIBBPF_API int bpf_program__set_xdp(struct bpf_program *prog);
|
LIBBPF_API int bpf_program__set_xdp(struct bpf_program *prog);
|
||||||
LIBBPF_API int bpf_program__set_perf_event(struct bpf_program *prog);
|
LIBBPF_API int bpf_program__set_perf_event(struct bpf_program *prog);
|
||||||
|
LIBBPF_API int bpf_program__set_tracing(struct bpf_program *prog);
|
||||||
|
|
||||||
|
LIBBPF_API enum bpf_prog_type bpf_program__get_type(struct bpf_program *prog);
|
||||||
LIBBPF_API void bpf_program__set_type(struct bpf_program *prog,
|
LIBBPF_API void bpf_program__set_type(struct bpf_program *prog,
|
||||||
enum bpf_prog_type type);
|
enum bpf_prog_type type);
|
||||||
|
|
||||||
|
LIBBPF_API enum bpf_attach_type
|
||||||
|
bpf_program__get_expected_attach_type(struct bpf_program *prog);
|
||||||
LIBBPF_API void
|
LIBBPF_API void
|
||||||
bpf_program__set_expected_attach_type(struct bpf_program *prog,
|
bpf_program__set_expected_attach_type(struct bpf_program *prog,
|
||||||
enum bpf_attach_type type);
|
enum bpf_attach_type type);
|
||||||
|
|
||||||
LIBBPF_API bool bpf_program__is_socket_filter(struct bpf_program *prog);
|
LIBBPF_API bool bpf_program__is_socket_filter(const struct bpf_program *prog);
|
||||||
LIBBPF_API bool bpf_program__is_tracepoint(struct bpf_program *prog);
|
LIBBPF_API bool bpf_program__is_tracepoint(const struct bpf_program *prog);
|
||||||
LIBBPF_API bool bpf_program__is_raw_tracepoint(struct bpf_program *prog);
|
LIBBPF_API bool bpf_program__is_raw_tracepoint(const struct bpf_program *prog);
|
||||||
LIBBPF_API bool bpf_program__is_kprobe(struct bpf_program *prog);
|
LIBBPF_API bool bpf_program__is_kprobe(const struct bpf_program *prog);
|
||||||
LIBBPF_API bool bpf_program__is_sched_cls(struct bpf_program *prog);
|
LIBBPF_API bool bpf_program__is_sched_cls(const struct bpf_program *prog);
|
||||||
LIBBPF_API bool bpf_program__is_sched_act(struct bpf_program *prog);
|
LIBBPF_API bool bpf_program__is_sched_act(const struct bpf_program *prog);
|
||||||
LIBBPF_API bool bpf_program__is_xdp(struct bpf_program *prog);
|
LIBBPF_API bool bpf_program__is_xdp(const struct bpf_program *prog);
|
||||||
LIBBPF_API bool bpf_program__is_perf_event(struct bpf_program *prog);
|
LIBBPF_API bool bpf_program__is_perf_event(const struct bpf_program *prog);
|
||||||
|
LIBBPF_API bool bpf_program__is_tracing(const struct bpf_program *prog);
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* No need for __attribute__((packed)), all members of 'bpf_map_def'
|
* No need for __attribute__((packed)), all members of 'bpf_map_def'
|
||||||
@@ -269,10 +373,10 @@ struct bpf_map_def {
|
|||||||
*/
|
*/
|
||||||
struct bpf_map;
|
struct bpf_map;
|
||||||
LIBBPF_API struct bpf_map *
|
LIBBPF_API struct bpf_map *
|
||||||
bpf_object__find_map_by_name(struct bpf_object *obj, const char *name);
|
bpf_object__find_map_by_name(const struct bpf_object *obj, const char *name);
|
||||||
|
|
||||||
LIBBPF_API int
|
LIBBPF_API int
|
||||||
bpf_object__find_map_fd_by_name(struct bpf_object *obj, const char *name);
|
bpf_object__find_map_fd_by_name(const struct bpf_object *obj, const char *name);
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Get bpf_map through the offset of corresponding struct bpf_map_def
|
* Get bpf_map through the offset of corresponding struct bpf_map_def
|
||||||
@@ -282,7 +386,7 @@ LIBBPF_API struct bpf_map *
|
|||||||
bpf_object__find_map_by_offset(struct bpf_object *obj, size_t offset);
|
bpf_object__find_map_by_offset(struct bpf_object *obj, size_t offset);
|
||||||
|
|
||||||
LIBBPF_API struct bpf_map *
|
LIBBPF_API struct bpf_map *
|
||||||
bpf_map__next(struct bpf_map *map, struct bpf_object *obj);
|
bpf_map__next(const struct bpf_map *map, const struct bpf_object *obj);
|
||||||
#define bpf_object__for_each_map(pos, obj) \
|
#define bpf_object__for_each_map(pos, obj) \
|
||||||
for ((pos) = bpf_map__next(NULL, (obj)); \
|
for ((pos) = bpf_map__next(NULL, (obj)); \
|
||||||
(pos) != NULL; \
|
(pos) != NULL; \
|
||||||
@@ -290,23 +394,26 @@ bpf_map__next(struct bpf_map *map, struct bpf_object *obj);
|
|||||||
#define bpf_map__for_each bpf_object__for_each_map
|
#define bpf_map__for_each bpf_object__for_each_map
|
||||||
|
|
||||||
LIBBPF_API struct bpf_map *
|
LIBBPF_API struct bpf_map *
|
||||||
bpf_map__prev(struct bpf_map *map, struct bpf_object *obj);
|
bpf_map__prev(const struct bpf_map *map, const struct bpf_object *obj);
|
||||||
|
|
||||||
LIBBPF_API int bpf_map__fd(struct bpf_map *map);
|
LIBBPF_API int bpf_map__fd(const struct bpf_map *map);
|
||||||
LIBBPF_API const struct bpf_map_def *bpf_map__def(struct bpf_map *map);
|
LIBBPF_API const struct bpf_map_def *bpf_map__def(const struct bpf_map *map);
|
||||||
LIBBPF_API const char *bpf_map__name(struct bpf_map *map);
|
LIBBPF_API const char *bpf_map__name(const struct bpf_map *map);
|
||||||
LIBBPF_API __u32 bpf_map__btf_key_type_id(const struct bpf_map *map);
|
LIBBPF_API __u32 bpf_map__btf_key_type_id(const struct bpf_map *map);
|
||||||
LIBBPF_API __u32 bpf_map__btf_value_type_id(const struct bpf_map *map);
|
LIBBPF_API __u32 bpf_map__btf_value_type_id(const struct bpf_map *map);
|
||||||
|
|
||||||
typedef void (*bpf_map_clear_priv_t)(struct bpf_map *, void *);
|
typedef void (*bpf_map_clear_priv_t)(struct bpf_map *, void *);
|
||||||
LIBBPF_API int bpf_map__set_priv(struct bpf_map *map, void *priv,
|
LIBBPF_API int bpf_map__set_priv(struct bpf_map *map, void *priv,
|
||||||
bpf_map_clear_priv_t clear_priv);
|
bpf_map_clear_priv_t clear_priv);
|
||||||
LIBBPF_API void *bpf_map__priv(struct bpf_map *map);
|
LIBBPF_API void *bpf_map__priv(const struct bpf_map *map);
|
||||||
LIBBPF_API int bpf_map__reuse_fd(struct bpf_map *map, int fd);
|
LIBBPF_API int bpf_map__reuse_fd(struct bpf_map *map, int fd);
|
||||||
LIBBPF_API int bpf_map__resize(struct bpf_map *map, __u32 max_entries);
|
LIBBPF_API int bpf_map__resize(struct bpf_map *map, __u32 max_entries);
|
||||||
LIBBPF_API bool bpf_map__is_offload_neutral(struct bpf_map *map);
|
LIBBPF_API bool bpf_map__is_offload_neutral(const struct bpf_map *map);
|
||||||
LIBBPF_API bool bpf_map__is_internal(struct bpf_map *map);
|
LIBBPF_API bool bpf_map__is_internal(const struct bpf_map *map);
|
||||||
LIBBPF_API void bpf_map__set_ifindex(struct bpf_map *map, __u32 ifindex);
|
LIBBPF_API void bpf_map__set_ifindex(struct bpf_map *map, __u32 ifindex);
|
||||||
|
LIBBPF_API int bpf_map__set_pin_path(struct bpf_map *map, const char *path);
|
||||||
|
LIBBPF_API const char *bpf_map__get_pin_path(const struct bpf_map *map);
|
||||||
|
LIBBPF_API bool bpf_map__is_pinned(const struct bpf_map *map);
|
||||||
LIBBPF_API int bpf_map__pin(struct bpf_map *map, const char *path);
|
LIBBPF_API int bpf_map__pin(struct bpf_map *map, const char *path);
|
||||||
LIBBPF_API int bpf_map__unpin(struct bpf_map *map, const char *path);
|
LIBBPF_API int bpf_map__unpin(struct bpf_map *map, const char *path);
|
||||||
|
|
||||||
@@ -320,6 +427,7 @@ struct bpf_prog_load_attr {
|
|||||||
enum bpf_attach_type expected_attach_type;
|
enum bpf_attach_type expected_attach_type;
|
||||||
int ifindex;
|
int ifindex;
|
||||||
int log_level;
|
int log_level;
|
||||||
|
int prog_flags;
|
||||||
};
|
};
|
||||||
|
|
||||||
LIBBPF_API int bpf_prog_load_xattr(const struct bpf_prog_load_attr *attr,
|
LIBBPF_API int bpf_prog_load_xattr(const struct bpf_prog_load_attr *attr,
|
||||||
@@ -327,8 +435,38 @@ LIBBPF_API int bpf_prog_load_xattr(const struct bpf_prog_load_attr *attr,
|
|||||||
LIBBPF_API int bpf_prog_load(const char *file, enum bpf_prog_type type,
|
LIBBPF_API int bpf_prog_load(const char *file, enum bpf_prog_type type,
|
||||||
struct bpf_object **pobj, int *prog_fd);
|
struct bpf_object **pobj, int *prog_fd);
|
||||||
|
|
||||||
|
struct xdp_link_info {
|
||||||
|
__u32 prog_id;
|
||||||
|
__u32 drv_prog_id;
|
||||||
|
__u32 hw_prog_id;
|
||||||
|
__u32 skb_prog_id;
|
||||||
|
__u8 attach_mode;
|
||||||
|
};
|
||||||
|
|
||||||
LIBBPF_API int bpf_set_link_xdp_fd(int ifindex, int fd, __u32 flags);
|
LIBBPF_API int bpf_set_link_xdp_fd(int ifindex, int fd, __u32 flags);
|
||||||
LIBBPF_API int bpf_get_link_xdp_id(int ifindex, __u32 *prog_id, __u32 flags);
|
LIBBPF_API int bpf_get_link_xdp_id(int ifindex, __u32 *prog_id, __u32 flags);
|
||||||
|
LIBBPF_API int bpf_get_link_xdp_info(int ifindex, struct xdp_link_info *info,
|
||||||
|
size_t info_size, __u32 flags);
|
||||||
|
|
||||||
|
struct perf_buffer;
|
||||||
|
|
||||||
|
typedef void (*perf_buffer_sample_fn)(void *ctx, int cpu,
|
||||||
|
void *data, __u32 size);
|
||||||
|
typedef void (*perf_buffer_lost_fn)(void *ctx, int cpu, __u64 cnt);
|
||||||
|
|
||||||
|
/* common use perf buffer options */
|
||||||
|
struct perf_buffer_opts {
|
||||||
|
/* if specified, sample_cb is called for each sample */
|
||||||
|
perf_buffer_sample_fn sample_cb;
|
||||||
|
/* if specified, lost_cb is called for each batch of lost samples */
|
||||||
|
perf_buffer_lost_fn lost_cb;
|
||||||
|
/* ctx is provided to sample_cb and lost_cb */
|
||||||
|
void *ctx;
|
||||||
|
};
|
||||||
|
|
||||||
|
LIBBPF_API struct perf_buffer *
|
||||||
|
perf_buffer__new(int map_fd, size_t page_cnt,
|
||||||
|
const struct perf_buffer_opts *opts);
|
||||||
|
|
||||||
enum bpf_perf_event_ret {
|
enum bpf_perf_event_ret {
|
||||||
LIBBPF_PERF_EVENT_DONE = 0,
|
LIBBPF_PERF_EVENT_DONE = 0,
|
||||||
@@ -337,6 +475,35 @@ enum bpf_perf_event_ret {
|
|||||||
};
|
};
|
||||||
|
|
||||||
struct perf_event_header;
|
struct perf_event_header;
|
||||||
|
|
||||||
|
typedef enum bpf_perf_event_ret
|
||||||
|
(*perf_buffer_event_fn)(void *ctx, int cpu, struct perf_event_header *event);
|
||||||
|
|
||||||
|
/* raw perf buffer options, giving most power and control */
|
||||||
|
struct perf_buffer_raw_opts {
|
||||||
|
/* perf event attrs passed directly into perf_event_open() */
|
||||||
|
struct perf_event_attr *attr;
|
||||||
|
/* raw event callback */
|
||||||
|
perf_buffer_event_fn event_cb;
|
||||||
|
/* ctx is provided to event_cb */
|
||||||
|
void *ctx;
|
||||||
|
/* if cpu_cnt == 0, open all on all possible CPUs (up to the number of
|
||||||
|
* max_entries of given PERF_EVENT_ARRAY map)
|
||||||
|
*/
|
||||||
|
int cpu_cnt;
|
||||||
|
/* if cpu_cnt > 0, cpus is an array of CPUs to open ring buffers on */
|
||||||
|
int *cpus;
|
||||||
|
/* if cpu_cnt > 0, map_keys specify map keys to set per-CPU FDs for */
|
||||||
|
int *map_keys;
|
||||||
|
};
|
||||||
|
|
||||||
|
LIBBPF_API struct perf_buffer *
|
||||||
|
perf_buffer__new_raw(int map_fd, size_t page_cnt,
|
||||||
|
const struct perf_buffer_raw_opts *opts);
|
||||||
|
|
||||||
|
LIBBPF_API void perf_buffer__free(struct perf_buffer *pb);
|
||||||
|
LIBBPF_API int perf_buffer__poll(struct perf_buffer *pb, int timeout_ms);
|
||||||
|
|
||||||
typedef enum bpf_perf_event_ret
|
typedef enum bpf_perf_event_ret
|
||||||
(*bpf_perf_event_print_t)(struct perf_event_header *hdr,
|
(*bpf_perf_event_print_t)(struct perf_event_header *hdr,
|
||||||
void *private_data);
|
void *private_data);
|
||||||
@@ -447,6 +614,22 @@ bpf_program__bpil_addr_to_offs(struct bpf_prog_info_linear *info_linear);
|
|||||||
LIBBPF_API void
|
LIBBPF_API void
|
||||||
bpf_program__bpil_offs_to_addr(struct bpf_prog_info_linear *info_linear);
|
bpf_program__bpil_offs_to_addr(struct bpf_prog_info_linear *info_linear);
|
||||||
|
|
||||||
|
/*
|
||||||
|
* A helper function to get the number of possible CPUs before looking up
|
||||||
|
* per-CPU maps. Negative errno is returned on failure.
|
||||||
|
*
|
||||||
|
* Example usage:
|
||||||
|
*
|
||||||
|
* int ncpus = libbpf_num_possible_cpus();
|
||||||
|
* if (ncpus < 0) {
|
||||||
|
* // error handling
|
||||||
|
* }
|
||||||
|
* long values[ncpus];
|
||||||
|
* bpf_map_lookup_elem(per_cpu_map_fd, key, values);
|
||||||
|
*
|
||||||
|
*/
|
||||||
|
LIBBPF_API int libbpf_num_possible_cpus(void);
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
} /* extern "C" */
|
} /* extern "C" */
|
||||||
#endif
|
#endif
|
||||||
|
|||||||
@@ -164,3 +164,47 @@ LIBBPF_0.0.3 {
|
|||||||
bpf_map_freeze;
|
bpf_map_freeze;
|
||||||
btf__finalize_data;
|
btf__finalize_data;
|
||||||
} LIBBPF_0.0.2;
|
} LIBBPF_0.0.2;
|
||||||
|
|
||||||
|
LIBBPF_0.0.4 {
|
||||||
|
global:
|
||||||
|
bpf_link__destroy;
|
||||||
|
bpf_object__load_xattr;
|
||||||
|
bpf_program__attach_kprobe;
|
||||||
|
bpf_program__attach_perf_event;
|
||||||
|
bpf_program__attach_raw_tracepoint;
|
||||||
|
bpf_program__attach_tracepoint;
|
||||||
|
bpf_program__attach_uprobe;
|
||||||
|
btf_dump__dump_type;
|
||||||
|
btf_dump__free;
|
||||||
|
btf_dump__new;
|
||||||
|
btf__parse_elf;
|
||||||
|
libbpf_num_possible_cpus;
|
||||||
|
perf_buffer__free;
|
||||||
|
perf_buffer__new;
|
||||||
|
perf_buffer__new_raw;
|
||||||
|
perf_buffer__poll;
|
||||||
|
xsk_umem__create;
|
||||||
|
} LIBBPF_0.0.3;
|
||||||
|
|
||||||
|
LIBBPF_0.0.5 {
|
||||||
|
global:
|
||||||
|
bpf_btf_get_next_id;
|
||||||
|
} LIBBPF_0.0.4;
|
||||||
|
|
||||||
|
LIBBPF_0.0.6 {
|
||||||
|
global:
|
||||||
|
bpf_get_link_xdp_info;
|
||||||
|
bpf_map__get_pin_path;
|
||||||
|
bpf_map__is_pinned;
|
||||||
|
bpf_map__set_pin_path;
|
||||||
|
bpf_object__open_file;
|
||||||
|
bpf_object__open_mem;
|
||||||
|
bpf_program__attach_trace;
|
||||||
|
bpf_program__get_expected_attach_type;
|
||||||
|
bpf_program__get_type;
|
||||||
|
bpf_program__is_tracing;
|
||||||
|
bpf_program__set_tracing;
|
||||||
|
bpf_program__size;
|
||||||
|
btf__find_by_name_kind;
|
||||||
|
libbpf_find_vmlinux_btf_id;
|
||||||
|
} LIBBPF_0.0.5;
|
||||||
|
|||||||
@@ -9,6 +9,8 @@
|
|||||||
#ifndef __LIBBPF_LIBBPF_INTERNAL_H
|
#ifndef __LIBBPF_LIBBPF_INTERNAL_H
|
||||||
#define __LIBBPF_LIBBPF_INTERNAL_H
|
#define __LIBBPF_LIBBPF_INTERNAL_H
|
||||||
|
|
||||||
|
#include "libbpf.h"
|
||||||
|
|
||||||
#define BTF_INFO_ENC(kind, kind_flag, vlen) \
|
#define BTF_INFO_ENC(kind, kind_flag, vlen) \
|
||||||
((!!(kind_flag) << 31) | ((kind) << 24) | ((vlen) & BTF_MAX_VLEN))
|
((!!(kind_flag) << 31) | ((kind) << 24) | ((vlen) & BTF_MAX_VLEN))
|
||||||
#define BTF_TYPE_ENC(name, info, size_or_type) (name), (info), (size_or_type)
|
#define BTF_TYPE_ENC(name, info, size_or_type) (name), (info), (size_or_type)
|
||||||
@@ -21,6 +23,33 @@
|
|||||||
#define BTF_PARAM_ENC(name, type) (name), (type)
|
#define BTF_PARAM_ENC(name, type) (name), (type)
|
||||||
#define BTF_VAR_SECINFO_ENC(type, offset, size) (type), (offset), (size)
|
#define BTF_VAR_SECINFO_ENC(type, offset, size) (type), (offset), (size)
|
||||||
|
|
||||||
|
#ifndef min
|
||||||
|
# define min(x, y) ((x) < (y) ? (x) : (y))
|
||||||
|
#endif
|
||||||
|
#ifndef max
|
||||||
|
# define max(x, y) ((x) < (y) ? (y) : (x))
|
||||||
|
#endif
|
||||||
|
#ifndef offsetofend
|
||||||
|
# define offsetofend(TYPE, FIELD) \
|
||||||
|
(offsetof(TYPE, FIELD) + sizeof(((TYPE *)0)->FIELD))
|
||||||
|
#endif
|
||||||
|
|
||||||
|
/* Symbol versioning is different between static and shared library.
|
||||||
|
* Properly versioned symbols are needed for shared library, but
|
||||||
|
* only the symbol of the new version is needed for static library.
|
||||||
|
*/
|
||||||
|
#ifdef SHARED
|
||||||
|
# define COMPAT_VERSION(internal_name, api_name, version) \
|
||||||
|
asm(".symver " #internal_name "," #api_name "@" #version);
|
||||||
|
# define DEFAULT_VERSION(internal_name, api_name, version) \
|
||||||
|
asm(".symver " #internal_name "," #api_name "@@" #version);
|
||||||
|
#else
|
||||||
|
# define COMPAT_VERSION(internal_name, api_name, version)
|
||||||
|
# define DEFAULT_VERSION(internal_name, api_name, version) \
|
||||||
|
extern typeof(internal_name) api_name \
|
||||||
|
__attribute__((alias(#internal_name)));
|
||||||
|
#endif
|
||||||
|
|
||||||
extern void libbpf_print(enum libbpf_print_level level,
|
extern void libbpf_print(enum libbpf_print_level level,
|
||||||
const char *format, ...)
|
const char *format, ...)
|
||||||
__attribute__((format(printf, 2, 3)));
|
__attribute__((format(printf, 2, 3)));
|
||||||
@@ -30,11 +59,159 @@ do { \
|
|||||||
libbpf_print(level, "libbpf: " fmt, ##__VA_ARGS__); \
|
libbpf_print(level, "libbpf: " fmt, ##__VA_ARGS__); \
|
||||||
} while (0)
|
} while (0)
|
||||||
|
|
||||||
#define pr_warning(fmt, ...) __pr(LIBBPF_WARN, fmt, ##__VA_ARGS__)
|
#define pr_warn(fmt, ...) __pr(LIBBPF_WARN, fmt, ##__VA_ARGS__)
|
||||||
#define pr_info(fmt, ...) __pr(LIBBPF_INFO, fmt, ##__VA_ARGS__)
|
#define pr_info(fmt, ...) __pr(LIBBPF_INFO, fmt, ##__VA_ARGS__)
|
||||||
#define pr_debug(fmt, ...) __pr(LIBBPF_DEBUG, fmt, ##__VA_ARGS__)
|
#define pr_debug(fmt, ...) __pr(LIBBPF_DEBUG, fmt, ##__VA_ARGS__)
|
||||||
|
|
||||||
int libbpf__probe_raw_btf(const char *raw_types, size_t types_len,
|
static inline bool libbpf_validate_opts(const char *opts,
|
||||||
const char *str_sec, size_t str_len);
|
size_t opts_sz, size_t user_sz,
|
||||||
|
const char *type_name)
|
||||||
|
{
|
||||||
|
if (user_sz < sizeof(size_t)) {
|
||||||
|
pr_warn("%s size (%zu) is too small\n", type_name, user_sz);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
if (user_sz > opts_sz) {
|
||||||
|
size_t i;
|
||||||
|
|
||||||
|
for (i = opts_sz; i < user_sz; i++) {
|
||||||
|
if (opts[i]) {
|
||||||
|
pr_warn("%s has non-zero extra bytes",
|
||||||
|
type_name);
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
|
||||||
|
#define OPTS_VALID(opts, type) \
|
||||||
|
(!(opts) || libbpf_validate_opts((const char *)opts, \
|
||||||
|
offsetofend(struct type, \
|
||||||
|
type##__last_field), \
|
||||||
|
(opts)->sz, #type))
|
||||||
|
#define OPTS_HAS(opts, field) \
|
||||||
|
((opts) && opts->sz >= offsetofend(typeof(*(opts)), field))
|
||||||
|
#define OPTS_GET(opts, field, fallback_value) \
|
||||||
|
(OPTS_HAS(opts, field) ? (opts)->field : fallback_value)
|
||||||
|
|
||||||
|
int libbpf__load_raw_btf(const char *raw_types, size_t types_len,
|
||||||
|
const char *str_sec, size_t str_len);
|
||||||
|
|
||||||
|
struct btf_ext_info {
|
||||||
|
/*
|
||||||
|
* info points to the individual info section (e.g. func_info and
|
||||||
|
* line_info) from the .BTF.ext. It does not include the __u32 rec_size.
|
||||||
|
*/
|
||||||
|
void *info;
|
||||||
|
__u32 rec_size;
|
||||||
|
__u32 len;
|
||||||
|
};
|
||||||
|
|
||||||
|
#define for_each_btf_ext_sec(seg, sec) \
|
||||||
|
for (sec = (seg)->info; \
|
||||||
|
(void *)sec < (seg)->info + (seg)->len; \
|
||||||
|
sec = (void *)sec + sizeof(struct btf_ext_info_sec) + \
|
||||||
|
(seg)->rec_size * sec->num_info)
|
||||||
|
|
||||||
|
#define for_each_btf_ext_rec(seg, sec, i, rec) \
|
||||||
|
for (i = 0, rec = (void *)&(sec)->data; \
|
||||||
|
i < (sec)->num_info; \
|
||||||
|
i++, rec = (void *)rec + (seg)->rec_size)
|
||||||
|
|
||||||
|
struct btf_ext {
|
||||||
|
union {
|
||||||
|
struct btf_ext_header *hdr;
|
||||||
|
void *data;
|
||||||
|
};
|
||||||
|
struct btf_ext_info func_info;
|
||||||
|
struct btf_ext_info line_info;
|
||||||
|
struct btf_ext_info field_reloc_info;
|
||||||
|
__u32 data_size;
|
||||||
|
};
|
||||||
|
|
||||||
|
struct btf_ext_info_sec {
|
||||||
|
__u32 sec_name_off;
|
||||||
|
__u32 num_info;
|
||||||
|
/* Followed by num_info * record_size number of bytes */
|
||||||
|
__u8 data[0];
|
||||||
|
};
|
||||||
|
|
||||||
|
/* The minimum bpf_func_info checked by the loader */
|
||||||
|
struct bpf_func_info_min {
|
||||||
|
__u32 insn_off;
|
||||||
|
__u32 type_id;
|
||||||
|
};
|
||||||
|
|
||||||
|
/* The minimum bpf_line_info checked by the loader */
|
||||||
|
struct bpf_line_info_min {
|
||||||
|
__u32 insn_off;
|
||||||
|
__u32 file_name_off;
|
||||||
|
__u32 line_off;
|
||||||
|
__u32 line_col;
|
||||||
|
};
|
||||||
|
|
||||||
|
/* bpf_field_info_kind encodes which aspect of captured field has to be
|
||||||
|
* adjusted by relocations. Currently supported values are:
|
||||||
|
* - BPF_FIELD_BYTE_OFFSET: field offset (in bytes);
|
||||||
|
* - BPF_FIELD_EXISTS: field existence (1, if field exists; 0, otherwise);
|
||||||
|
*/
|
||||||
|
enum bpf_field_info_kind {
|
||||||
|
BPF_FIELD_BYTE_OFFSET = 0, /* field byte offset */
|
||||||
|
BPF_FIELD_BYTE_SIZE = 1,
|
||||||
|
BPF_FIELD_EXISTS = 2, /* field existence in target kernel */
|
||||||
|
BPF_FIELD_SIGNED = 3,
|
||||||
|
BPF_FIELD_LSHIFT_U64 = 4,
|
||||||
|
BPF_FIELD_RSHIFT_U64 = 5,
|
||||||
|
};
|
||||||
|
|
||||||
|
/* The minimum bpf_field_reloc checked by the loader
|
||||||
|
*
|
||||||
|
* Field relocation captures the following data:
|
||||||
|
* - insn_off - instruction offset (in bytes) within a BPF program that needs
|
||||||
|
* its insn->imm field to be relocated with actual field info;
|
||||||
|
* - type_id - BTF type ID of the "root" (containing) entity of a relocatable
|
||||||
|
* field;
|
||||||
|
* - access_str_off - offset into corresponding .BTF string section. String
|
||||||
|
* itself encodes an accessed field using a sequence of field and array
|
||||||
|
* indicies, separated by colon (:). It's conceptually very close to LLVM's
|
||||||
|
* getelementptr ([0]) instruction's arguments for identifying offset to
|
||||||
|
* a field.
|
||||||
|
*
|
||||||
|
* Example to provide a better feel.
|
||||||
|
*
|
||||||
|
* struct sample {
|
||||||
|
* int a;
|
||||||
|
* struct {
|
||||||
|
* int b[10];
|
||||||
|
* };
|
||||||
|
* };
|
||||||
|
*
|
||||||
|
* struct sample *s = ...;
|
||||||
|
* int x = &s->a; // encoded as "0:0" (a is field #0)
|
||||||
|
* int y = &s->b[5]; // encoded as "0:1:0:5" (anon struct is field #1,
|
||||||
|
* // b is field #0 inside anon struct, accessing elem #5)
|
||||||
|
* int z = &s[10]->b; // encoded as "10:1" (ptr is used as an array)
|
||||||
|
*
|
||||||
|
* type_id for all relocs in this example will capture BTF type id of
|
||||||
|
* `struct sample`.
|
||||||
|
*
|
||||||
|
* Such relocation is emitted when using __builtin_preserve_access_index()
|
||||||
|
* Clang built-in, passing expression that captures field address, e.g.:
|
||||||
|
*
|
||||||
|
* bpf_probe_read(&dst, sizeof(dst),
|
||||||
|
* __builtin_preserve_access_index(&src->a.b.c));
|
||||||
|
*
|
||||||
|
* In this case Clang will emit field relocation recording necessary data to
|
||||||
|
* be able to find offset of embedded `a.b.c` field within `src` struct.
|
||||||
|
*
|
||||||
|
* [0] https://llvm.org/docs/LangRef.html#getelementptr-instruction
|
||||||
|
*/
|
||||||
|
struct bpf_field_reloc {
|
||||||
|
__u32 insn_off;
|
||||||
|
__u32 type_id;
|
||||||
|
__u32 access_str_off;
|
||||||
|
enum bpf_field_info_kind kind;
|
||||||
|
};
|
||||||
|
|
||||||
#endif /* __LIBBPF_LIBBPF_INTERNAL_H */
|
#endif /* __LIBBPF_LIBBPF_INTERNAL_H */
|
||||||
|
|||||||
@@ -101,6 +101,8 @@ probe_load(enum bpf_prog_type prog_type, const struct bpf_insn *insns,
|
|||||||
case BPF_PROG_TYPE_SK_REUSEPORT:
|
case BPF_PROG_TYPE_SK_REUSEPORT:
|
||||||
case BPF_PROG_TYPE_FLOW_DISSECTOR:
|
case BPF_PROG_TYPE_FLOW_DISSECTOR:
|
||||||
case BPF_PROG_TYPE_CGROUP_SYSCTL:
|
case BPF_PROG_TYPE_CGROUP_SYSCTL:
|
||||||
|
case BPF_PROG_TYPE_CGROUP_SOCKOPT:
|
||||||
|
case BPF_PROG_TYPE_TRACING:
|
||||||
default:
|
default:
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
@@ -133,8 +135,8 @@ bool bpf_probe_prog_type(enum bpf_prog_type prog_type, __u32 ifindex)
|
|||||||
return errno != EINVAL && errno != EOPNOTSUPP;
|
return errno != EINVAL && errno != EOPNOTSUPP;
|
||||||
}
|
}
|
||||||
|
|
||||||
int libbpf__probe_raw_btf(const char *raw_types, size_t types_len,
|
int libbpf__load_raw_btf(const char *raw_types, size_t types_len,
|
||||||
const char *str_sec, size_t str_len)
|
const char *str_sec, size_t str_len)
|
||||||
{
|
{
|
||||||
struct btf_header hdr = {
|
struct btf_header hdr = {
|
||||||
.magic = BTF_MAGIC,
|
.magic = BTF_MAGIC,
|
||||||
@@ -157,14 +159,9 @@ int libbpf__probe_raw_btf(const char *raw_types, size_t types_len,
|
|||||||
memcpy(raw_btf + hdr.hdr_len + hdr.type_len, str_sec, hdr.str_len);
|
memcpy(raw_btf + hdr.hdr_len + hdr.type_len, str_sec, hdr.str_len);
|
||||||
|
|
||||||
btf_fd = bpf_load_btf(raw_btf, btf_len, NULL, 0, false);
|
btf_fd = bpf_load_btf(raw_btf, btf_len, NULL, 0, false);
|
||||||
if (btf_fd < 0) {
|
|
||||||
free(raw_btf);
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
close(btf_fd);
|
|
||||||
free(raw_btf);
|
free(raw_btf);
|
||||||
return 1;
|
return btf_fd;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int load_sk_storage_btf(void)
|
static int load_sk_storage_btf(void)
|
||||||
@@ -190,7 +187,7 @@ static int load_sk_storage_btf(void)
|
|||||||
BTF_MEMBER_ENC(23, 2, 32),/* struct bpf_spin_lock l; */
|
BTF_MEMBER_ENC(23, 2, 32),/* struct bpf_spin_lock l; */
|
||||||
};
|
};
|
||||||
|
|
||||||
return libbpf__probe_raw_btf((char *)types, sizeof(types),
|
return libbpf__load_raw_btf((char *)types, sizeof(types),
|
||||||
strs, sizeof(strs));
|
strs, sizeof(strs));
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -248,6 +245,7 @@ bool bpf_probe_map_type(enum bpf_map_type map_type, __u32 ifindex)
|
|||||||
case BPF_MAP_TYPE_ARRAY_OF_MAPS:
|
case BPF_MAP_TYPE_ARRAY_OF_MAPS:
|
||||||
case BPF_MAP_TYPE_HASH_OF_MAPS:
|
case BPF_MAP_TYPE_HASH_OF_MAPS:
|
||||||
case BPF_MAP_TYPE_DEVMAP:
|
case BPF_MAP_TYPE_DEVMAP:
|
||||||
|
case BPF_MAP_TYPE_DEVMAP_HASH:
|
||||||
case BPF_MAP_TYPE_SOCKMAP:
|
case BPF_MAP_TYPE_SOCKMAP:
|
||||||
case BPF_MAP_TYPE_CPUMAP:
|
case BPF_MAP_TYPE_CPUMAP:
|
||||||
case BPF_MAP_TYPE_XSKMAP:
|
case BPF_MAP_TYPE_XSKMAP:
|
||||||
|
|||||||
@@ -12,6 +12,7 @@
|
|||||||
|
|
||||||
#include "bpf.h"
|
#include "bpf.h"
|
||||||
#include "libbpf.h"
|
#include "libbpf.h"
|
||||||
|
#include "libbpf_internal.h"
|
||||||
#include "nlattr.h"
|
#include "nlattr.h"
|
||||||
|
|
||||||
#ifndef SOL_NETLINK
|
#ifndef SOL_NETLINK
|
||||||
@@ -24,7 +25,7 @@ typedef int (*__dump_nlmsg_t)(struct nlmsghdr *nlmsg, libbpf_dump_nlmsg_t,
|
|||||||
struct xdp_id_md {
|
struct xdp_id_md {
|
||||||
int ifindex;
|
int ifindex;
|
||||||
__u32 flags;
|
__u32 flags;
|
||||||
__u32 id;
|
struct xdp_link_info info;
|
||||||
};
|
};
|
||||||
|
|
||||||
int libbpf_netlink_open(__u32 *nl_pid)
|
int libbpf_netlink_open(__u32 *nl_pid)
|
||||||
@@ -43,7 +44,7 @@ int libbpf_netlink_open(__u32 *nl_pid)
|
|||||||
|
|
||||||
if (setsockopt(sock, SOL_NETLINK, NETLINK_EXT_ACK,
|
if (setsockopt(sock, SOL_NETLINK, NETLINK_EXT_ACK,
|
||||||
&one, sizeof(one)) < 0) {
|
&one, sizeof(one)) < 0) {
|
||||||
fprintf(stderr, "Netlink error reporting not supported\n");
|
pr_warn("Netlink error reporting not supported\n");
|
||||||
}
|
}
|
||||||
|
|
||||||
if (bind(sock, (struct sockaddr *)&sa, sizeof(sa)) < 0) {
|
if (bind(sock, (struct sockaddr *)&sa, sizeof(sa)) < 0) {
|
||||||
@@ -202,26 +203,11 @@ static int __dump_link_nlmsg(struct nlmsghdr *nlh,
|
|||||||
return dump_link_nlmsg(cookie, ifi, tb);
|
return dump_link_nlmsg(cookie, ifi, tb);
|
||||||
}
|
}
|
||||||
|
|
||||||
static unsigned char get_xdp_id_attr(unsigned char mode, __u32 flags)
|
static int get_xdp_info(void *cookie, void *msg, struct nlattr **tb)
|
||||||
{
|
|
||||||
if (mode != XDP_ATTACHED_MULTI)
|
|
||||||
return IFLA_XDP_PROG_ID;
|
|
||||||
if (flags & XDP_FLAGS_DRV_MODE)
|
|
||||||
return IFLA_XDP_DRV_PROG_ID;
|
|
||||||
if (flags & XDP_FLAGS_HW_MODE)
|
|
||||||
return IFLA_XDP_HW_PROG_ID;
|
|
||||||
if (flags & XDP_FLAGS_SKB_MODE)
|
|
||||||
return IFLA_XDP_SKB_PROG_ID;
|
|
||||||
|
|
||||||
return IFLA_XDP_UNSPEC;
|
|
||||||
}
|
|
||||||
|
|
||||||
static int get_xdp_id(void *cookie, void *msg, struct nlattr **tb)
|
|
||||||
{
|
{
|
||||||
struct nlattr *xdp_tb[IFLA_XDP_MAX + 1];
|
struct nlattr *xdp_tb[IFLA_XDP_MAX + 1];
|
||||||
struct xdp_id_md *xdp_id = cookie;
|
struct xdp_id_md *xdp_id = cookie;
|
||||||
struct ifinfomsg *ifinfo = msg;
|
struct ifinfomsg *ifinfo = msg;
|
||||||
unsigned char mode, xdp_attr;
|
|
||||||
int ret;
|
int ret;
|
||||||
|
|
||||||
if (xdp_id->ifindex && xdp_id->ifindex != ifinfo->ifi_index)
|
if (xdp_id->ifindex && xdp_id->ifindex != ifinfo->ifi_index)
|
||||||
@@ -237,27 +223,40 @@ static int get_xdp_id(void *cookie, void *msg, struct nlattr **tb)
|
|||||||
if (!xdp_tb[IFLA_XDP_ATTACHED])
|
if (!xdp_tb[IFLA_XDP_ATTACHED])
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
mode = libbpf_nla_getattr_u8(xdp_tb[IFLA_XDP_ATTACHED]);
|
xdp_id->info.attach_mode = libbpf_nla_getattr_u8(
|
||||||
if (mode == XDP_ATTACHED_NONE)
|
xdp_tb[IFLA_XDP_ATTACHED]);
|
||||||
|
|
||||||
|
if (xdp_id->info.attach_mode == XDP_ATTACHED_NONE)
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
xdp_attr = get_xdp_id_attr(mode, xdp_id->flags);
|
if (xdp_tb[IFLA_XDP_PROG_ID])
|
||||||
if (!xdp_attr || !xdp_tb[xdp_attr])
|
xdp_id->info.prog_id = libbpf_nla_getattr_u32(
|
||||||
return 0;
|
xdp_tb[IFLA_XDP_PROG_ID]);
|
||||||
|
|
||||||
xdp_id->id = libbpf_nla_getattr_u32(xdp_tb[xdp_attr]);
|
if (xdp_tb[IFLA_XDP_SKB_PROG_ID])
|
||||||
|
xdp_id->info.skb_prog_id = libbpf_nla_getattr_u32(
|
||||||
|
xdp_tb[IFLA_XDP_SKB_PROG_ID]);
|
||||||
|
|
||||||
|
if (xdp_tb[IFLA_XDP_DRV_PROG_ID])
|
||||||
|
xdp_id->info.drv_prog_id = libbpf_nla_getattr_u32(
|
||||||
|
xdp_tb[IFLA_XDP_DRV_PROG_ID]);
|
||||||
|
|
||||||
|
if (xdp_tb[IFLA_XDP_HW_PROG_ID])
|
||||||
|
xdp_id->info.hw_prog_id = libbpf_nla_getattr_u32(
|
||||||
|
xdp_tb[IFLA_XDP_HW_PROG_ID]);
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
int bpf_get_link_xdp_id(int ifindex, __u32 *prog_id, __u32 flags)
|
int bpf_get_link_xdp_info(int ifindex, struct xdp_link_info *info,
|
||||||
|
size_t info_size, __u32 flags)
|
||||||
{
|
{
|
||||||
struct xdp_id_md xdp_id = {};
|
struct xdp_id_md xdp_id = {};
|
||||||
int sock, ret;
|
int sock, ret;
|
||||||
__u32 nl_pid;
|
__u32 nl_pid;
|
||||||
__u32 mask;
|
__u32 mask;
|
||||||
|
|
||||||
if (flags & ~XDP_FLAGS_MASK)
|
if (flags & ~XDP_FLAGS_MASK || !info_size)
|
||||||
return -EINVAL;
|
return -EINVAL;
|
||||||
|
|
||||||
/* Check whether the single {HW,DRV,SKB} mode is set */
|
/* Check whether the single {HW,DRV,SKB} mode is set */
|
||||||
@@ -273,14 +272,44 @@ int bpf_get_link_xdp_id(int ifindex, __u32 *prog_id, __u32 flags)
|
|||||||
xdp_id.ifindex = ifindex;
|
xdp_id.ifindex = ifindex;
|
||||||
xdp_id.flags = flags;
|
xdp_id.flags = flags;
|
||||||
|
|
||||||
ret = libbpf_nl_get_link(sock, nl_pid, get_xdp_id, &xdp_id);
|
ret = libbpf_nl_get_link(sock, nl_pid, get_xdp_info, &xdp_id);
|
||||||
if (!ret)
|
if (!ret) {
|
||||||
*prog_id = xdp_id.id;
|
size_t sz = min(info_size, sizeof(xdp_id.info));
|
||||||
|
|
||||||
|
memcpy(info, &xdp_id.info, sz);
|
||||||
|
memset((void *) info + sz, 0, info_size - sz);
|
||||||
|
}
|
||||||
|
|
||||||
close(sock);
|
close(sock);
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static __u32 get_xdp_id(struct xdp_link_info *info, __u32 flags)
|
||||||
|
{
|
||||||
|
if (info->attach_mode != XDP_ATTACHED_MULTI)
|
||||||
|
return info->prog_id;
|
||||||
|
if (flags & XDP_FLAGS_DRV_MODE)
|
||||||
|
return info->drv_prog_id;
|
||||||
|
if (flags & XDP_FLAGS_HW_MODE)
|
||||||
|
return info->hw_prog_id;
|
||||||
|
if (flags & XDP_FLAGS_SKB_MODE)
|
||||||
|
return info->skb_prog_id;
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
int bpf_get_link_xdp_id(int ifindex, __u32 *prog_id, __u32 flags)
|
||||||
|
{
|
||||||
|
struct xdp_link_info info;
|
||||||
|
int ret;
|
||||||
|
|
||||||
|
ret = bpf_get_link_xdp_info(ifindex, &info, sizeof(info), flags);
|
||||||
|
if (!ret)
|
||||||
|
*prog_id = get_xdp_id(&info, flags);
|
||||||
|
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
int libbpf_nl_get_link(int sock, unsigned int nl_pid,
|
int libbpf_nl_get_link(int sock, unsigned int nl_pid,
|
||||||
libbpf_dump_nlmsg_t dump_link_nlmsg, void *cookie)
|
libbpf_dump_nlmsg_t dump_link_nlmsg, void *cookie)
|
||||||
{
|
{
|
||||||
|
|||||||
10
src/nlattr.c
10
src/nlattr.c
@@ -8,6 +8,7 @@
|
|||||||
|
|
||||||
#include <errno.h>
|
#include <errno.h>
|
||||||
#include "nlattr.h"
|
#include "nlattr.h"
|
||||||
|
#include "libbpf_internal.h"
|
||||||
#include <linux/rtnetlink.h>
|
#include <linux/rtnetlink.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include <stdio.h>
|
#include <stdio.h>
|
||||||
@@ -121,8 +122,8 @@ int libbpf_nla_parse(struct nlattr *tb[], int maxtype, struct nlattr *head,
|
|||||||
}
|
}
|
||||||
|
|
||||||
if (tb[type])
|
if (tb[type])
|
||||||
fprintf(stderr, "Attribute of type %#x found multiple times in message, "
|
pr_warn("Attribute of type %#x found multiple times in message, "
|
||||||
"previous attribute is being ignored.\n", type);
|
"previous attribute is being ignored.\n", type);
|
||||||
|
|
||||||
tb[type] = nla;
|
tb[type] = nla;
|
||||||
}
|
}
|
||||||
@@ -181,15 +182,14 @@ int libbpf_nla_dump_errormsg(struct nlmsghdr *nlh)
|
|||||||
|
|
||||||
if (libbpf_nla_parse(tb, NLMSGERR_ATTR_MAX, attr, alen,
|
if (libbpf_nla_parse(tb, NLMSGERR_ATTR_MAX, attr, alen,
|
||||||
extack_policy) != 0) {
|
extack_policy) != 0) {
|
||||||
fprintf(stderr,
|
pr_warn("Failed to parse extended error attributes\n");
|
||||||
"Failed to parse extended error attributes\n");
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (tb[NLMSGERR_ATTR_MSG])
|
if (tb[NLMSGERR_ATTR_MSG])
|
||||||
errmsg = (char *) libbpf_nla_data(tb[NLMSGERR_ATTR_MSG]);
|
errmsg = (char *) libbpf_nla_data(tb[NLMSGERR_ATTR_MSG]);
|
||||||
|
|
||||||
fprintf(stderr, "Kernel error message: %s\n", errmsg);
|
pr_warn("Kernel error message: %s\n", errmsg);
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -11,7 +11,7 @@
|
|||||||
*/
|
*/
|
||||||
char *libbpf_strerror_r(int err, char *dst, int len)
|
char *libbpf_strerror_r(int err, char *dst, int len)
|
||||||
{
|
{
|
||||||
int ret = strerror_r(err, dst, len);
|
int ret = strerror_r(err < 0 ? -err : err, dst, len);
|
||||||
if (ret)
|
if (ret)
|
||||||
snprintf(dst, len, "ERROR: strerror_r(%d)=%d", err, ret);
|
snprintf(dst, len, "ERROR: strerror_r(%d)=%d", err, ret);
|
||||||
return dst;
|
return dst;
|
||||||
|
|||||||
364
src/xsk.c
364
src/xsk.c
@@ -60,10 +60,8 @@ struct xsk_socket {
|
|||||||
struct xsk_umem *umem;
|
struct xsk_umem *umem;
|
||||||
struct xsk_socket_config config;
|
struct xsk_socket_config config;
|
||||||
int fd;
|
int fd;
|
||||||
int xsks_map;
|
|
||||||
int ifindex;
|
int ifindex;
|
||||||
int prog_fd;
|
int prog_fd;
|
||||||
int qidconf_map_fd;
|
|
||||||
int xsks_map_fd;
|
int xsks_map_fd;
|
||||||
__u32 queue_id;
|
__u32 queue_id;
|
||||||
char ifname[IFNAMSIZ];
|
char ifname[IFNAMSIZ];
|
||||||
@@ -75,22 +73,20 @@ struct xsk_nl_info {
|
|||||||
int fd;
|
int fd;
|
||||||
};
|
};
|
||||||
|
|
||||||
/* For 32-bit systems, we need to use mmap2 as the offsets are 64-bit.
|
/* Up until and including Linux 5.3 */
|
||||||
* Unfortunately, it is not part of glibc.
|
struct xdp_ring_offset_v1 {
|
||||||
*/
|
__u64 producer;
|
||||||
static inline void *xsk_mmap(void *addr, size_t length, int prot, int flags,
|
__u64 consumer;
|
||||||
int fd, __u64 offset)
|
__u64 desc;
|
||||||
{
|
};
|
||||||
#ifdef __NR_mmap2
|
|
||||||
unsigned int page_shift = __builtin_ffs(getpagesize()) - 1;
|
|
||||||
long ret = syscall(__NR_mmap2, addr, length, prot, flags, fd,
|
|
||||||
(off_t)(offset >> page_shift));
|
|
||||||
|
|
||||||
return (void *)ret;
|
/* Up until and including Linux 5.3 */
|
||||||
#else
|
struct xdp_mmap_offsets_v1 {
|
||||||
return mmap(addr, length, prot, flags, fd, offset);
|
struct xdp_ring_offset_v1 rx;
|
||||||
#endif
|
struct xdp_ring_offset_v1 tx;
|
||||||
}
|
struct xdp_ring_offset_v1 fr;
|
||||||
|
struct xdp_ring_offset_v1 cr;
|
||||||
|
};
|
||||||
|
|
||||||
int xsk_umem__fd(const struct xsk_umem *umem)
|
int xsk_umem__fd(const struct xsk_umem *umem)
|
||||||
{
|
{
|
||||||
@@ -117,6 +113,7 @@ static void xsk_set_umem_config(struct xsk_umem_config *cfg,
|
|||||||
cfg->comp_size = XSK_RING_CONS__DEFAULT_NUM_DESCS;
|
cfg->comp_size = XSK_RING_CONS__DEFAULT_NUM_DESCS;
|
||||||
cfg->frame_size = XSK_UMEM__DEFAULT_FRAME_SIZE;
|
cfg->frame_size = XSK_UMEM__DEFAULT_FRAME_SIZE;
|
||||||
cfg->frame_headroom = XSK_UMEM__DEFAULT_FRAME_HEADROOM;
|
cfg->frame_headroom = XSK_UMEM__DEFAULT_FRAME_HEADROOM;
|
||||||
|
cfg->flags = XSK_UMEM__DEFAULT_FLAGS;
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -124,6 +121,7 @@ static void xsk_set_umem_config(struct xsk_umem_config *cfg,
|
|||||||
cfg->comp_size = usr_cfg->comp_size;
|
cfg->comp_size = usr_cfg->comp_size;
|
||||||
cfg->frame_size = usr_cfg->frame_size;
|
cfg->frame_size = usr_cfg->frame_size;
|
||||||
cfg->frame_headroom = usr_cfg->frame_headroom;
|
cfg->frame_headroom = usr_cfg->frame_headroom;
|
||||||
|
cfg->flags = usr_cfg->flags;
|
||||||
}
|
}
|
||||||
|
|
||||||
static int xsk_set_xdp_socket_config(struct xsk_socket_config *cfg,
|
static int xsk_set_xdp_socket_config(struct xsk_socket_config *cfg,
|
||||||
@@ -150,14 +148,66 @@ static int xsk_set_xdp_socket_config(struct xsk_socket_config *cfg,
|
|||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
int xsk_umem__create(struct xsk_umem **umem_ptr, void *umem_area, __u64 size,
|
static void xsk_mmap_offsets_v1(struct xdp_mmap_offsets *off)
|
||||||
struct xsk_ring_prod *fill, struct xsk_ring_cons *comp,
|
{
|
||||||
const struct xsk_umem_config *usr_config)
|
struct xdp_mmap_offsets_v1 off_v1;
|
||||||
|
|
||||||
|
/* getsockopt on a kernel <= 5.3 has no flags fields.
|
||||||
|
* Copy over the offsets to the correct places in the >=5.4 format
|
||||||
|
* and put the flags where they would have been on that kernel.
|
||||||
|
*/
|
||||||
|
memcpy(&off_v1, off, sizeof(off_v1));
|
||||||
|
|
||||||
|
off->rx.producer = off_v1.rx.producer;
|
||||||
|
off->rx.consumer = off_v1.rx.consumer;
|
||||||
|
off->rx.desc = off_v1.rx.desc;
|
||||||
|
off->rx.flags = off_v1.rx.consumer + sizeof(__u32);
|
||||||
|
|
||||||
|
off->tx.producer = off_v1.tx.producer;
|
||||||
|
off->tx.consumer = off_v1.tx.consumer;
|
||||||
|
off->tx.desc = off_v1.tx.desc;
|
||||||
|
off->tx.flags = off_v1.tx.consumer + sizeof(__u32);
|
||||||
|
|
||||||
|
off->fr.producer = off_v1.fr.producer;
|
||||||
|
off->fr.consumer = off_v1.fr.consumer;
|
||||||
|
off->fr.desc = off_v1.fr.desc;
|
||||||
|
off->fr.flags = off_v1.fr.consumer + sizeof(__u32);
|
||||||
|
|
||||||
|
off->cr.producer = off_v1.cr.producer;
|
||||||
|
off->cr.consumer = off_v1.cr.consumer;
|
||||||
|
off->cr.desc = off_v1.cr.desc;
|
||||||
|
off->cr.flags = off_v1.cr.consumer + sizeof(__u32);
|
||||||
|
}
|
||||||
|
|
||||||
|
static int xsk_get_mmap_offsets(int fd, struct xdp_mmap_offsets *off)
|
||||||
|
{
|
||||||
|
socklen_t optlen;
|
||||||
|
int err;
|
||||||
|
|
||||||
|
optlen = sizeof(*off);
|
||||||
|
err = getsockopt(fd, SOL_XDP, XDP_MMAP_OFFSETS, off, &optlen);
|
||||||
|
if (err)
|
||||||
|
return err;
|
||||||
|
|
||||||
|
if (optlen == sizeof(*off))
|
||||||
|
return 0;
|
||||||
|
|
||||||
|
if (optlen == sizeof(struct xdp_mmap_offsets_v1)) {
|
||||||
|
xsk_mmap_offsets_v1(off);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
return -EINVAL;
|
||||||
|
}
|
||||||
|
|
||||||
|
int xsk_umem__create_v0_0_4(struct xsk_umem **umem_ptr, void *umem_area,
|
||||||
|
__u64 size, struct xsk_ring_prod *fill,
|
||||||
|
struct xsk_ring_cons *comp,
|
||||||
|
const struct xsk_umem_config *usr_config)
|
||||||
{
|
{
|
||||||
struct xdp_mmap_offsets off;
|
struct xdp_mmap_offsets off;
|
||||||
struct xdp_umem_reg mr;
|
struct xdp_umem_reg mr;
|
||||||
struct xsk_umem *umem;
|
struct xsk_umem *umem;
|
||||||
socklen_t optlen;
|
|
||||||
void *map;
|
void *map;
|
||||||
int err;
|
int err;
|
||||||
|
|
||||||
@@ -179,10 +229,12 @@ int xsk_umem__create(struct xsk_umem **umem_ptr, void *umem_area, __u64 size,
|
|||||||
umem->umem_area = umem_area;
|
umem->umem_area = umem_area;
|
||||||
xsk_set_umem_config(&umem->config, usr_config);
|
xsk_set_umem_config(&umem->config, usr_config);
|
||||||
|
|
||||||
|
memset(&mr, 0, sizeof(mr));
|
||||||
mr.addr = (uintptr_t)umem_area;
|
mr.addr = (uintptr_t)umem_area;
|
||||||
mr.len = size;
|
mr.len = size;
|
||||||
mr.chunk_size = umem->config.frame_size;
|
mr.chunk_size = umem->config.frame_size;
|
||||||
mr.headroom = umem->config.frame_headroom;
|
mr.headroom = umem->config.frame_headroom;
|
||||||
|
mr.flags = umem->config.flags;
|
||||||
|
|
||||||
err = setsockopt(umem->fd, SOL_XDP, XDP_UMEM_REG, &mr, sizeof(mr));
|
err = setsockopt(umem->fd, SOL_XDP, XDP_UMEM_REG, &mr, sizeof(mr));
|
||||||
if (err) {
|
if (err) {
|
||||||
@@ -204,17 +256,15 @@ int xsk_umem__create(struct xsk_umem **umem_ptr, void *umem_area, __u64 size,
|
|||||||
goto out_socket;
|
goto out_socket;
|
||||||
}
|
}
|
||||||
|
|
||||||
optlen = sizeof(off);
|
err = xsk_get_mmap_offsets(umem->fd, &off);
|
||||||
err = getsockopt(umem->fd, SOL_XDP, XDP_MMAP_OFFSETS, &off, &optlen);
|
|
||||||
if (err) {
|
if (err) {
|
||||||
err = -errno;
|
err = -errno;
|
||||||
goto out_socket;
|
goto out_socket;
|
||||||
}
|
}
|
||||||
|
|
||||||
map = xsk_mmap(NULL, off.fr.desc +
|
map = mmap(NULL, off.fr.desc + umem->config.fill_size * sizeof(__u64),
|
||||||
umem->config.fill_size * sizeof(__u64),
|
PROT_READ | PROT_WRITE, MAP_SHARED | MAP_POPULATE, umem->fd,
|
||||||
PROT_READ | PROT_WRITE, MAP_SHARED | MAP_POPULATE,
|
XDP_UMEM_PGOFF_FILL_RING);
|
||||||
umem->fd, XDP_UMEM_PGOFF_FILL_RING);
|
|
||||||
if (map == MAP_FAILED) {
|
if (map == MAP_FAILED) {
|
||||||
err = -errno;
|
err = -errno;
|
||||||
goto out_socket;
|
goto out_socket;
|
||||||
@@ -225,13 +275,13 @@ int xsk_umem__create(struct xsk_umem **umem_ptr, void *umem_area, __u64 size,
|
|||||||
fill->size = umem->config.fill_size;
|
fill->size = umem->config.fill_size;
|
||||||
fill->producer = map + off.fr.producer;
|
fill->producer = map + off.fr.producer;
|
||||||
fill->consumer = map + off.fr.consumer;
|
fill->consumer = map + off.fr.consumer;
|
||||||
|
fill->flags = map + off.fr.flags;
|
||||||
fill->ring = map + off.fr.desc;
|
fill->ring = map + off.fr.desc;
|
||||||
fill->cached_cons = umem->config.fill_size;
|
fill->cached_cons = umem->config.fill_size;
|
||||||
|
|
||||||
map = xsk_mmap(NULL,
|
map = mmap(NULL, off.cr.desc + umem->config.comp_size * sizeof(__u64),
|
||||||
off.cr.desc + umem->config.comp_size * sizeof(__u64),
|
PROT_READ | PROT_WRITE, MAP_SHARED | MAP_POPULATE, umem->fd,
|
||||||
PROT_READ | PROT_WRITE, MAP_SHARED | MAP_POPULATE,
|
XDP_UMEM_PGOFF_COMPLETION_RING);
|
||||||
umem->fd, XDP_UMEM_PGOFF_COMPLETION_RING);
|
|
||||||
if (map == MAP_FAILED) {
|
if (map == MAP_FAILED) {
|
||||||
err = -errno;
|
err = -errno;
|
||||||
goto out_mmap;
|
goto out_mmap;
|
||||||
@@ -242,6 +292,7 @@ int xsk_umem__create(struct xsk_umem **umem_ptr, void *umem_area, __u64 size,
|
|||||||
comp->size = umem->config.comp_size;
|
comp->size = umem->config.comp_size;
|
||||||
comp->producer = map + off.cr.producer;
|
comp->producer = map + off.cr.producer;
|
||||||
comp->consumer = map + off.cr.consumer;
|
comp->consumer = map + off.cr.consumer;
|
||||||
|
comp->flags = map + off.cr.flags;
|
||||||
comp->ring = map + off.cr.desc;
|
comp->ring = map + off.cr.desc;
|
||||||
|
|
||||||
*umem_ptr = umem;
|
*umem_ptr = umem;
|
||||||
@@ -256,6 +307,29 @@ out_umem_alloc:
|
|||||||
return err;
|
return err;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
struct xsk_umem_config_v1 {
|
||||||
|
__u32 fill_size;
|
||||||
|
__u32 comp_size;
|
||||||
|
__u32 frame_size;
|
||||||
|
__u32 frame_headroom;
|
||||||
|
};
|
||||||
|
|
||||||
|
int xsk_umem__create_v0_0_2(struct xsk_umem **umem_ptr, void *umem_area,
|
||||||
|
__u64 size, struct xsk_ring_prod *fill,
|
||||||
|
struct xsk_ring_cons *comp,
|
||||||
|
const struct xsk_umem_config *usr_config)
|
||||||
|
{
|
||||||
|
struct xsk_umem_config config;
|
||||||
|
|
||||||
|
memcpy(&config, usr_config, sizeof(struct xsk_umem_config_v1));
|
||||||
|
config.flags = 0;
|
||||||
|
|
||||||
|
return xsk_umem__create_v0_0_4(umem_ptr, umem_area, size, fill, comp,
|
||||||
|
&config);
|
||||||
|
}
|
||||||
|
COMPAT_VERSION(xsk_umem__create_v0_0_2, xsk_umem__create, LIBBPF_0.0.2)
|
||||||
|
DEFAULT_VERSION(xsk_umem__create_v0_0_4, xsk_umem__create, LIBBPF_0.0.4)
|
||||||
|
|
||||||
static int xsk_load_xdp_prog(struct xsk_socket *xsk)
|
static int xsk_load_xdp_prog(struct xsk_socket *xsk)
|
||||||
{
|
{
|
||||||
static const int log_buf_size = 16 * 1024;
|
static const int log_buf_size = 16 * 1024;
|
||||||
@@ -265,42 +339,55 @@ static int xsk_load_xdp_prog(struct xsk_socket *xsk)
|
|||||||
/* This is the C-program:
|
/* This is the C-program:
|
||||||
* SEC("xdp_sock") int xdp_sock_prog(struct xdp_md *ctx)
|
* SEC("xdp_sock") int xdp_sock_prog(struct xdp_md *ctx)
|
||||||
* {
|
* {
|
||||||
* int *qidconf, index = ctx->rx_queue_index;
|
* int ret, index = ctx->rx_queue_index;
|
||||||
*
|
*
|
||||||
* // A set entry here means that the correspnding queue_id
|
* // A set entry here means that the correspnding queue_id
|
||||||
* // has an active AF_XDP socket bound to it.
|
* // has an active AF_XDP socket bound to it.
|
||||||
* qidconf = bpf_map_lookup_elem(&qidconf_map, &index);
|
* ret = bpf_redirect_map(&xsks_map, index, XDP_PASS);
|
||||||
* if (!qidconf)
|
* if (ret > 0)
|
||||||
* return XDP_ABORTED;
|
* return ret;
|
||||||
*
|
*
|
||||||
* if (*qidconf)
|
* // Fallback for pre-5.3 kernels, not supporting default
|
||||||
|
* // action in the flags parameter.
|
||||||
|
* if (bpf_map_lookup_elem(&xsks_map, &index))
|
||||||
* return bpf_redirect_map(&xsks_map, index, 0);
|
* return bpf_redirect_map(&xsks_map, index, 0);
|
||||||
*
|
|
||||||
* return XDP_PASS;
|
* return XDP_PASS;
|
||||||
* }
|
* }
|
||||||
*/
|
*/
|
||||||
struct bpf_insn prog[] = {
|
struct bpf_insn prog[] = {
|
||||||
/* r1 = *(u32 *)(r1 + 16) */
|
/* r2 = *(u32 *)(r1 + 16) */
|
||||||
BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_1, 16),
|
BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_1, 16),
|
||||||
/* *(u32 *)(r10 - 4) = r1 */
|
/* *(u32 *)(r10 - 4) = r2 */
|
||||||
BPF_STX_MEM(BPF_W, BPF_REG_10, BPF_REG_1, -4),
|
BPF_STX_MEM(BPF_W, BPF_REG_10, BPF_REG_2, -4),
|
||||||
|
/* r1 = xskmap[] */
|
||||||
|
BPF_LD_MAP_FD(BPF_REG_1, xsk->xsks_map_fd),
|
||||||
|
/* r3 = XDP_PASS */
|
||||||
|
BPF_MOV64_IMM(BPF_REG_3, 2),
|
||||||
|
/* call bpf_redirect_map */
|
||||||
|
BPF_EMIT_CALL(BPF_FUNC_redirect_map),
|
||||||
|
/* if w0 != 0 goto pc+13 */
|
||||||
|
BPF_JMP32_IMM(BPF_JSGT, BPF_REG_0, 0, 13),
|
||||||
|
/* r2 = r10 */
|
||||||
BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
|
BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
|
||||||
|
/* r2 += -4 */
|
||||||
BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -4),
|
BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -4),
|
||||||
BPF_LD_MAP_FD(BPF_REG_1, xsk->qidconf_map_fd),
|
/* r1 = xskmap[] */
|
||||||
|
BPF_LD_MAP_FD(BPF_REG_1, xsk->xsks_map_fd),
|
||||||
|
/* call bpf_map_lookup_elem */
|
||||||
BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
|
BPF_EMIT_CALL(BPF_FUNC_map_lookup_elem),
|
||||||
|
/* r1 = r0 */
|
||||||
BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
|
BPF_MOV64_REG(BPF_REG_1, BPF_REG_0),
|
||||||
BPF_MOV32_IMM(BPF_REG_0, 0),
|
/* r0 = XDP_PASS */
|
||||||
/* if r1 == 0 goto +8 */
|
BPF_MOV64_IMM(BPF_REG_0, 2),
|
||||||
BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 8),
|
/* if r1 == 0 goto pc+5 */
|
||||||
BPF_MOV32_IMM(BPF_REG_0, 2),
|
|
||||||
/* r1 = *(u32 *)(r1 + 0) */
|
|
||||||
BPF_LDX_MEM(BPF_W, BPF_REG_1, BPF_REG_1, 0),
|
|
||||||
/* if r1 == 0 goto +5 */
|
|
||||||
BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 5),
|
BPF_JMP_IMM(BPF_JEQ, BPF_REG_1, 0, 5),
|
||||||
/* r2 = *(u32 *)(r10 - 4) */
|
/* r2 = *(u32 *)(r10 - 4) */
|
||||||
BPF_LD_MAP_FD(BPF_REG_1, xsk->xsks_map_fd),
|
|
||||||
BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_10, -4),
|
BPF_LDX_MEM(BPF_W, BPF_REG_2, BPF_REG_10, -4),
|
||||||
BPF_MOV32_IMM(BPF_REG_3, 0),
|
/* r1 = xskmap[] */
|
||||||
|
BPF_LD_MAP_FD(BPF_REG_1, xsk->xsks_map_fd),
|
||||||
|
/* r3 = 0 */
|
||||||
|
BPF_MOV64_IMM(BPF_REG_3, 0),
|
||||||
|
/* call bpf_redirect_map */
|
||||||
BPF_EMIT_CALL(BPF_FUNC_redirect_map),
|
BPF_EMIT_CALL(BPF_FUNC_redirect_map),
|
||||||
/* The jumps are to this instruction */
|
/* The jumps are to this instruction */
|
||||||
BPF_EXIT_INSN(),
|
BPF_EXIT_INSN(),
|
||||||
@@ -311,7 +398,7 @@ static int xsk_load_xdp_prog(struct xsk_socket *xsk)
|
|||||||
"LGPL-2.1 or BSD-2-Clause", 0, log_buf,
|
"LGPL-2.1 or BSD-2-Clause", 0, log_buf,
|
||||||
log_buf_size);
|
log_buf_size);
|
||||||
if (prog_fd < 0) {
|
if (prog_fd < 0) {
|
||||||
pr_warning("BPF log buffer:\n%s", log_buf);
|
pr_warn("BPF log buffer:\n%s", log_buf);
|
||||||
return prog_fd;
|
return prog_fd;
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -327,30 +414,35 @@ static int xsk_load_xdp_prog(struct xsk_socket *xsk)
|
|||||||
|
|
||||||
static int xsk_get_max_queues(struct xsk_socket *xsk)
|
static int xsk_get_max_queues(struct xsk_socket *xsk)
|
||||||
{
|
{
|
||||||
struct ethtool_channels channels;
|
struct ethtool_channels channels = { .cmd = ETHTOOL_GCHANNELS };
|
||||||
struct ifreq ifr;
|
struct ifreq ifr = {};
|
||||||
int fd, err, ret;
|
int fd, err, ret;
|
||||||
|
|
||||||
fd = socket(AF_INET, SOCK_DGRAM, 0);
|
fd = socket(AF_INET, SOCK_DGRAM, 0);
|
||||||
if (fd < 0)
|
if (fd < 0)
|
||||||
return -errno;
|
return -errno;
|
||||||
|
|
||||||
channels.cmd = ETHTOOL_GCHANNELS;
|
|
||||||
ifr.ifr_data = (void *)&channels;
|
ifr.ifr_data = (void *)&channels;
|
||||||
strncpy(ifr.ifr_name, xsk->ifname, IFNAMSIZ);
|
memcpy(ifr.ifr_name, xsk->ifname, IFNAMSIZ - 1);
|
||||||
|
ifr.ifr_name[IFNAMSIZ - 1] = '\0';
|
||||||
err = ioctl(fd, SIOCETHTOOL, &ifr);
|
err = ioctl(fd, SIOCETHTOOL, &ifr);
|
||||||
if (err && errno != EOPNOTSUPP) {
|
if (err && errno != EOPNOTSUPP) {
|
||||||
ret = -errno;
|
ret = -errno;
|
||||||
goto out;
|
goto out;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (channels.max_combined == 0 || errno == EOPNOTSUPP)
|
if (err) {
|
||||||
/* If the device says it has no channels, then all traffic
|
/* If the device says it has no channels, then all traffic
|
||||||
* is sent to a single stream, so max queues = 1.
|
* is sent to a single stream, so max queues = 1.
|
||||||
*/
|
*/
|
||||||
ret = 1;
|
ret = 1;
|
||||||
else
|
} else {
|
||||||
ret = channels.max_combined;
|
/* Take the max of rx, tx, combined. Drivers return
|
||||||
|
* the number of channels in different ways.
|
||||||
|
*/
|
||||||
|
ret = max(channels.max_rx, channels.max_tx);
|
||||||
|
ret = max(ret, (int)channels.max_combined);
|
||||||
|
}
|
||||||
|
|
||||||
out:
|
out:
|
||||||
close(fd);
|
close(fd);
|
||||||
@@ -366,18 +458,11 @@ static int xsk_create_bpf_maps(struct xsk_socket *xsk)
|
|||||||
if (max_queues < 0)
|
if (max_queues < 0)
|
||||||
return max_queues;
|
return max_queues;
|
||||||
|
|
||||||
fd = bpf_create_map_name(BPF_MAP_TYPE_ARRAY, "qidconf_map",
|
fd = bpf_create_map_name(BPF_MAP_TYPE_XSKMAP, "xsks_map",
|
||||||
sizeof(int), sizeof(int), max_queues, 0);
|
sizeof(int), sizeof(int), max_queues, 0);
|
||||||
if (fd < 0)
|
if (fd < 0)
|
||||||
return fd;
|
return fd;
|
||||||
xsk->qidconf_map_fd = fd;
|
|
||||||
|
|
||||||
fd = bpf_create_map_name(BPF_MAP_TYPE_XSKMAP, "xsks_map",
|
|
||||||
sizeof(int), sizeof(int), max_queues, 0);
|
|
||||||
if (fd < 0) {
|
|
||||||
close(xsk->qidconf_map_fd);
|
|
||||||
return fd;
|
|
||||||
}
|
|
||||||
xsk->xsks_map_fd = fd;
|
xsk->xsks_map_fd = fd;
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
@@ -385,10 +470,8 @@ static int xsk_create_bpf_maps(struct xsk_socket *xsk)
|
|||||||
|
|
||||||
static void xsk_delete_bpf_maps(struct xsk_socket *xsk)
|
static void xsk_delete_bpf_maps(struct xsk_socket *xsk)
|
||||||
{
|
{
|
||||||
close(xsk->qidconf_map_fd);
|
bpf_map_delete_elem(xsk->xsks_map_fd, &xsk->queue_id);
|
||||||
close(xsk->xsks_map_fd);
|
close(xsk->xsks_map_fd);
|
||||||
xsk->qidconf_map_fd = -1;
|
|
||||||
xsk->xsks_map_fd = -1;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
static int xsk_lookup_bpf_maps(struct xsk_socket *xsk)
|
static int xsk_lookup_bpf_maps(struct xsk_socket *xsk)
|
||||||
@@ -417,10 +500,9 @@ static int xsk_lookup_bpf_maps(struct xsk_socket *xsk)
|
|||||||
if (err)
|
if (err)
|
||||||
goto out_map_ids;
|
goto out_map_ids;
|
||||||
|
|
||||||
for (i = 0; i < prog_info.nr_map_ids; i++) {
|
xsk->xsks_map_fd = -1;
|
||||||
if (xsk->qidconf_map_fd != -1 && xsk->xsks_map_fd != -1)
|
|
||||||
break;
|
|
||||||
|
|
||||||
|
for (i = 0; i < prog_info.nr_map_ids; i++) {
|
||||||
fd = bpf_map_get_fd_by_id(map_ids[i]);
|
fd = bpf_map_get_fd_by_id(map_ids[i]);
|
||||||
if (fd < 0)
|
if (fd < 0)
|
||||||
continue;
|
continue;
|
||||||
@@ -431,11 +513,6 @@ static int xsk_lookup_bpf_maps(struct xsk_socket *xsk)
|
|||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!strcmp(map_info.name, "qidconf_map")) {
|
|
||||||
xsk->qidconf_map_fd = fd;
|
|
||||||
continue;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (!strcmp(map_info.name, "xsks_map")) {
|
if (!strcmp(map_info.name, "xsks_map")) {
|
||||||
xsk->xsks_map_fd = fd;
|
xsk->xsks_map_fd = fd;
|
||||||
continue;
|
continue;
|
||||||
@@ -445,40 +522,18 @@ static int xsk_lookup_bpf_maps(struct xsk_socket *xsk)
|
|||||||
}
|
}
|
||||||
|
|
||||||
err = 0;
|
err = 0;
|
||||||
if (xsk->qidconf_map_fd < 0 || xsk->xsks_map_fd < 0) {
|
if (xsk->xsks_map_fd == -1)
|
||||||
err = -ENOENT;
|
err = -ENOENT;
|
||||||
xsk_delete_bpf_maps(xsk);
|
|
||||||
}
|
|
||||||
|
|
||||||
out_map_ids:
|
out_map_ids:
|
||||||
free(map_ids);
|
free(map_ids);
|
||||||
return err;
|
return err;
|
||||||
}
|
}
|
||||||
|
|
||||||
static void xsk_clear_bpf_maps(struct xsk_socket *xsk)
|
|
||||||
{
|
|
||||||
int qid = false;
|
|
||||||
|
|
||||||
bpf_map_update_elem(xsk->qidconf_map_fd, &xsk->queue_id, &qid, 0);
|
|
||||||
bpf_map_delete_elem(xsk->xsks_map_fd, &xsk->queue_id);
|
|
||||||
}
|
|
||||||
|
|
||||||
static int xsk_set_bpf_maps(struct xsk_socket *xsk)
|
static int xsk_set_bpf_maps(struct xsk_socket *xsk)
|
||||||
{
|
{
|
||||||
int qid = true, fd = xsk->fd, err;
|
return bpf_map_update_elem(xsk->xsks_map_fd, &xsk->queue_id,
|
||||||
|
&xsk->fd, 0);
|
||||||
err = bpf_map_update_elem(xsk->qidconf_map_fd, &xsk->queue_id, &qid, 0);
|
|
||||||
if (err)
|
|
||||||
goto out;
|
|
||||||
|
|
||||||
err = bpf_map_update_elem(xsk->xsks_map_fd, &xsk->queue_id, &fd, 0);
|
|
||||||
if (err)
|
|
||||||
goto out;
|
|
||||||
|
|
||||||
return 0;
|
|
||||||
out:
|
|
||||||
xsk_clear_bpf_maps(xsk);
|
|
||||||
return err;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
static int xsk_setup_xdp_prog(struct xsk_socket *xsk)
|
static int xsk_setup_xdp_prog(struct xsk_socket *xsk)
|
||||||
@@ -497,26 +552,30 @@ static int xsk_setup_xdp_prog(struct xsk_socket *xsk)
|
|||||||
return err;
|
return err;
|
||||||
|
|
||||||
err = xsk_load_xdp_prog(xsk);
|
err = xsk_load_xdp_prog(xsk);
|
||||||
if (err)
|
if (err) {
|
||||||
goto out_maps;
|
xsk_delete_bpf_maps(xsk);
|
||||||
|
return err;
|
||||||
|
}
|
||||||
} else {
|
} else {
|
||||||
xsk->prog_fd = bpf_prog_get_fd_by_id(prog_id);
|
xsk->prog_fd = bpf_prog_get_fd_by_id(prog_id);
|
||||||
|
if (xsk->prog_fd < 0)
|
||||||
|
return -errno;
|
||||||
err = xsk_lookup_bpf_maps(xsk);
|
err = xsk_lookup_bpf_maps(xsk);
|
||||||
if (err)
|
if (err) {
|
||||||
goto out_load;
|
close(xsk->prog_fd);
|
||||||
|
return err;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
err = xsk_set_bpf_maps(xsk);
|
if (xsk->rx)
|
||||||
if (err)
|
err = xsk_set_bpf_maps(xsk);
|
||||||
goto out_load;
|
if (err) {
|
||||||
|
xsk_delete_bpf_maps(xsk);
|
||||||
|
close(xsk->prog_fd);
|
||||||
|
return err;
|
||||||
|
}
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
out_load:
|
|
||||||
close(xsk->prog_fd);
|
|
||||||
out_maps:
|
|
||||||
xsk_delete_bpf_maps(xsk);
|
|
||||||
return err;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
int xsk_socket__create(struct xsk_socket **xsk_ptr, const char *ifname,
|
int xsk_socket__create(struct xsk_socket **xsk_ptr, const char *ifname,
|
||||||
@@ -528,21 +587,26 @@ int xsk_socket__create(struct xsk_socket **xsk_ptr, const char *ifname,
|
|||||||
struct sockaddr_xdp sxdp = {};
|
struct sockaddr_xdp sxdp = {};
|
||||||
struct xdp_mmap_offsets off;
|
struct xdp_mmap_offsets off;
|
||||||
struct xsk_socket *xsk;
|
struct xsk_socket *xsk;
|
||||||
socklen_t optlen;
|
|
||||||
int err;
|
int err;
|
||||||
|
|
||||||
if (!umem || !xsk_ptr || !rx || !tx)
|
if (!umem || !xsk_ptr || !(rx || tx))
|
||||||
return -EFAULT;
|
return -EFAULT;
|
||||||
|
|
||||||
if (umem->refcount) {
|
|
||||||
pr_warning("Error: shared umems not supported by libbpf.\n");
|
|
||||||
return -EBUSY;
|
|
||||||
}
|
|
||||||
|
|
||||||
xsk = calloc(1, sizeof(*xsk));
|
xsk = calloc(1, sizeof(*xsk));
|
||||||
if (!xsk)
|
if (!xsk)
|
||||||
return -ENOMEM;
|
return -ENOMEM;
|
||||||
|
|
||||||
|
err = xsk_set_xdp_socket_config(&xsk->config, usr_config);
|
||||||
|
if (err)
|
||||||
|
goto out_xsk_alloc;
|
||||||
|
|
||||||
|
if (umem->refcount &&
|
||||||
|
!(xsk->config.libbpf_flags & XSK_LIBBPF_FLAGS__INHIBIT_PROG_LOAD)) {
|
||||||
|
pr_warn("Error: shared umems not supported by libbpf supplied XDP program.\n");
|
||||||
|
err = -EBUSY;
|
||||||
|
goto out_xsk_alloc;
|
||||||
|
}
|
||||||
|
|
||||||
if (umem->refcount++ > 0) {
|
if (umem->refcount++ > 0) {
|
||||||
xsk->fd = socket(AF_XDP, SOCK_RAW, 0);
|
xsk->fd = socket(AF_XDP, SOCK_RAW, 0);
|
||||||
if (xsk->fd < 0) {
|
if (xsk->fd < 0) {
|
||||||
@@ -561,11 +625,8 @@ int xsk_socket__create(struct xsk_socket **xsk_ptr, const char *ifname,
|
|||||||
err = -errno;
|
err = -errno;
|
||||||
goto out_socket;
|
goto out_socket;
|
||||||
}
|
}
|
||||||
strncpy(xsk->ifname, ifname, IFNAMSIZ);
|
memcpy(xsk->ifname, ifname, IFNAMSIZ - 1);
|
||||||
|
xsk->ifname[IFNAMSIZ - 1] = '\0';
|
||||||
err = xsk_set_xdp_socket_config(&xsk->config, usr_config);
|
|
||||||
if (err)
|
|
||||||
goto out_socket;
|
|
||||||
|
|
||||||
if (rx) {
|
if (rx) {
|
||||||
err = setsockopt(xsk->fd, SOL_XDP, XDP_RX_RING,
|
err = setsockopt(xsk->fd, SOL_XDP, XDP_RX_RING,
|
||||||
@@ -586,19 +647,17 @@ int xsk_socket__create(struct xsk_socket **xsk_ptr, const char *ifname,
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
optlen = sizeof(off);
|
err = xsk_get_mmap_offsets(xsk->fd, &off);
|
||||||
err = getsockopt(xsk->fd, SOL_XDP, XDP_MMAP_OFFSETS, &off, &optlen);
|
|
||||||
if (err) {
|
if (err) {
|
||||||
err = -errno;
|
err = -errno;
|
||||||
goto out_socket;
|
goto out_socket;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (rx) {
|
if (rx) {
|
||||||
rx_map = xsk_mmap(NULL, off.rx.desc +
|
rx_map = mmap(NULL, off.rx.desc +
|
||||||
xsk->config.rx_size * sizeof(struct xdp_desc),
|
xsk->config.rx_size * sizeof(struct xdp_desc),
|
||||||
PROT_READ | PROT_WRITE,
|
PROT_READ | PROT_WRITE, MAP_SHARED | MAP_POPULATE,
|
||||||
MAP_SHARED | MAP_POPULATE,
|
xsk->fd, XDP_PGOFF_RX_RING);
|
||||||
xsk->fd, XDP_PGOFF_RX_RING);
|
|
||||||
if (rx_map == MAP_FAILED) {
|
if (rx_map == MAP_FAILED) {
|
||||||
err = -errno;
|
err = -errno;
|
||||||
goto out_socket;
|
goto out_socket;
|
||||||
@@ -608,16 +667,16 @@ int xsk_socket__create(struct xsk_socket **xsk_ptr, const char *ifname,
|
|||||||
rx->size = xsk->config.rx_size;
|
rx->size = xsk->config.rx_size;
|
||||||
rx->producer = rx_map + off.rx.producer;
|
rx->producer = rx_map + off.rx.producer;
|
||||||
rx->consumer = rx_map + off.rx.consumer;
|
rx->consumer = rx_map + off.rx.consumer;
|
||||||
|
rx->flags = rx_map + off.rx.flags;
|
||||||
rx->ring = rx_map + off.rx.desc;
|
rx->ring = rx_map + off.rx.desc;
|
||||||
}
|
}
|
||||||
xsk->rx = rx;
|
xsk->rx = rx;
|
||||||
|
|
||||||
if (tx) {
|
if (tx) {
|
||||||
tx_map = xsk_mmap(NULL, off.tx.desc +
|
tx_map = mmap(NULL, off.tx.desc +
|
||||||
xsk->config.tx_size * sizeof(struct xdp_desc),
|
xsk->config.tx_size * sizeof(struct xdp_desc),
|
||||||
PROT_READ | PROT_WRITE,
|
PROT_READ | PROT_WRITE, MAP_SHARED | MAP_POPULATE,
|
||||||
MAP_SHARED | MAP_POPULATE,
|
xsk->fd, XDP_PGOFF_TX_RING);
|
||||||
xsk->fd, XDP_PGOFF_TX_RING);
|
|
||||||
if (tx_map == MAP_FAILED) {
|
if (tx_map == MAP_FAILED) {
|
||||||
err = -errno;
|
err = -errno;
|
||||||
goto out_mmap_rx;
|
goto out_mmap_rx;
|
||||||
@@ -627,6 +686,7 @@ int xsk_socket__create(struct xsk_socket **xsk_ptr, const char *ifname,
|
|||||||
tx->size = xsk->config.tx_size;
|
tx->size = xsk->config.tx_size;
|
||||||
tx->producer = tx_map + off.tx.producer;
|
tx->producer = tx_map + off.tx.producer;
|
||||||
tx->consumer = tx_map + off.tx.consumer;
|
tx->consumer = tx_map + off.tx.consumer;
|
||||||
|
tx->flags = tx_map + off.tx.flags;
|
||||||
tx->ring = tx_map + off.tx.desc;
|
tx->ring = tx_map + off.tx.desc;
|
||||||
tx->cached_cons = xsk->config.tx_size;
|
tx->cached_cons = xsk->config.tx_size;
|
||||||
}
|
}
|
||||||
@@ -635,7 +695,12 @@ int xsk_socket__create(struct xsk_socket **xsk_ptr, const char *ifname,
|
|||||||
sxdp.sxdp_family = PF_XDP;
|
sxdp.sxdp_family = PF_XDP;
|
||||||
sxdp.sxdp_ifindex = xsk->ifindex;
|
sxdp.sxdp_ifindex = xsk->ifindex;
|
||||||
sxdp.sxdp_queue_id = xsk->queue_id;
|
sxdp.sxdp_queue_id = xsk->queue_id;
|
||||||
sxdp.sxdp_flags = xsk->config.bind_flags;
|
if (umem->refcount > 1) {
|
||||||
|
sxdp.sxdp_flags = XDP_SHARED_UMEM;
|
||||||
|
sxdp.sxdp_shared_umem_fd = umem->fd;
|
||||||
|
} else {
|
||||||
|
sxdp.sxdp_flags = xsk->config.bind_flags;
|
||||||
|
}
|
||||||
|
|
||||||
err = bind(xsk->fd, (struct sockaddr *)&sxdp, sizeof(sxdp));
|
err = bind(xsk->fd, (struct sockaddr *)&sxdp, sizeof(sxdp));
|
||||||
if (err) {
|
if (err) {
|
||||||
@@ -643,8 +708,7 @@ int xsk_socket__create(struct xsk_socket **xsk_ptr, const char *ifname,
|
|||||||
goto out_mmap_tx;
|
goto out_mmap_tx;
|
||||||
}
|
}
|
||||||
|
|
||||||
xsk->qidconf_map_fd = -1;
|
xsk->prog_fd = -1;
|
||||||
xsk->xsks_map_fd = -1;
|
|
||||||
|
|
||||||
if (!(xsk->config.libbpf_flags & XSK_LIBBPF_FLAGS__INHIBIT_PROG_LOAD)) {
|
if (!(xsk->config.libbpf_flags & XSK_LIBBPF_FLAGS__INHIBIT_PROG_LOAD)) {
|
||||||
err = xsk_setup_xdp_prog(xsk);
|
err = xsk_setup_xdp_prog(xsk);
|
||||||
@@ -674,7 +738,6 @@ out_xsk_alloc:
|
|||||||
int xsk_umem__delete(struct xsk_umem *umem)
|
int xsk_umem__delete(struct xsk_umem *umem)
|
||||||
{
|
{
|
||||||
struct xdp_mmap_offsets off;
|
struct xdp_mmap_offsets off;
|
||||||
socklen_t optlen;
|
|
||||||
int err;
|
int err;
|
||||||
|
|
||||||
if (!umem)
|
if (!umem)
|
||||||
@@ -683,8 +746,7 @@ int xsk_umem__delete(struct xsk_umem *umem)
|
|||||||
if (umem->refcount)
|
if (umem->refcount)
|
||||||
return -EBUSY;
|
return -EBUSY;
|
||||||
|
|
||||||
optlen = sizeof(off);
|
err = xsk_get_mmap_offsets(umem->fd, &off);
|
||||||
err = getsockopt(umem->fd, SOL_XDP, XDP_MMAP_OFFSETS, &off, &optlen);
|
|
||||||
if (!err) {
|
if (!err) {
|
||||||
munmap(umem->fill->ring - off.fr.desc,
|
munmap(umem->fill->ring - off.fr.desc,
|
||||||
off.fr.desc + umem->config.fill_size * sizeof(__u64));
|
off.fr.desc + umem->config.fill_size * sizeof(__u64));
|
||||||
@@ -702,17 +764,17 @@ void xsk_socket__delete(struct xsk_socket *xsk)
|
|||||||
{
|
{
|
||||||
size_t desc_sz = sizeof(struct xdp_desc);
|
size_t desc_sz = sizeof(struct xdp_desc);
|
||||||
struct xdp_mmap_offsets off;
|
struct xdp_mmap_offsets off;
|
||||||
socklen_t optlen;
|
|
||||||
int err;
|
int err;
|
||||||
|
|
||||||
if (!xsk)
|
if (!xsk)
|
||||||
return;
|
return;
|
||||||
|
|
||||||
xsk_clear_bpf_maps(xsk);
|
if (xsk->prog_fd != -1) {
|
||||||
xsk_delete_bpf_maps(xsk);
|
xsk_delete_bpf_maps(xsk);
|
||||||
|
close(xsk->prog_fd);
|
||||||
|
}
|
||||||
|
|
||||||
optlen = sizeof(off);
|
err = xsk_get_mmap_offsets(xsk->fd, &off);
|
||||||
err = getsockopt(xsk->fd, SOL_XDP, XDP_MMAP_OFFSETS, &off, &optlen);
|
|
||||||
if (!err) {
|
if (!err) {
|
||||||
if (xsk->rx) {
|
if (xsk->rx) {
|
||||||
munmap(xsk->rx->ring - off.rx.desc,
|
munmap(xsk->rx->ring - off.rx.desc,
|
||||||
|
|||||||
35
src/xsk.h
35
src/xsk.h
@@ -32,6 +32,7 @@ struct name { \
|
|||||||
__u32 *producer; \
|
__u32 *producer; \
|
||||||
__u32 *consumer; \
|
__u32 *consumer; \
|
||||||
void *ring; \
|
void *ring; \
|
||||||
|
__u32 *flags; \
|
||||||
}
|
}
|
||||||
|
|
||||||
DEFINE_XSK_RING(xsk_ring_prod);
|
DEFINE_XSK_RING(xsk_ring_prod);
|
||||||
@@ -76,6 +77,11 @@ xsk_ring_cons__rx_desc(const struct xsk_ring_cons *rx, __u32 idx)
|
|||||||
return &descs[idx & rx->mask];
|
return &descs[idx & rx->mask];
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static inline int xsk_ring_prod__needs_wakeup(const struct xsk_ring_prod *r)
|
||||||
|
{
|
||||||
|
return *r->flags & XDP_RING_NEED_WAKEUP;
|
||||||
|
}
|
||||||
|
|
||||||
static inline __u32 xsk_prod_nb_free(struct xsk_ring_prod *r, __u32 nb)
|
static inline __u32 xsk_prod_nb_free(struct xsk_ring_prod *r, __u32 nb)
|
||||||
{
|
{
|
||||||
__u32 free_entries = r->cached_cons - r->cached_prod;
|
__u32 free_entries = r->cached_cons - r->cached_prod;
|
||||||
@@ -162,20 +168,37 @@ static inline void *xsk_umem__get_data(void *umem_area, __u64 addr)
|
|||||||
return &((char *)umem_area)[addr];
|
return &((char *)umem_area)[addr];
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static inline __u64 xsk_umem__extract_addr(__u64 addr)
|
||||||
|
{
|
||||||
|
return addr & XSK_UNALIGNED_BUF_ADDR_MASK;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline __u64 xsk_umem__extract_offset(__u64 addr)
|
||||||
|
{
|
||||||
|
return addr >> XSK_UNALIGNED_BUF_OFFSET_SHIFT;
|
||||||
|
}
|
||||||
|
|
||||||
|
static inline __u64 xsk_umem__add_offset_to_addr(__u64 addr)
|
||||||
|
{
|
||||||
|
return xsk_umem__extract_addr(addr) + xsk_umem__extract_offset(addr);
|
||||||
|
}
|
||||||
|
|
||||||
LIBBPF_API int xsk_umem__fd(const struct xsk_umem *umem);
|
LIBBPF_API int xsk_umem__fd(const struct xsk_umem *umem);
|
||||||
LIBBPF_API int xsk_socket__fd(const struct xsk_socket *xsk);
|
LIBBPF_API int xsk_socket__fd(const struct xsk_socket *xsk);
|
||||||
|
|
||||||
#define XSK_RING_CONS__DEFAULT_NUM_DESCS 2048
|
#define XSK_RING_CONS__DEFAULT_NUM_DESCS 2048
|
||||||
#define XSK_RING_PROD__DEFAULT_NUM_DESCS 2048
|
#define XSK_RING_PROD__DEFAULT_NUM_DESCS 2048
|
||||||
#define XSK_UMEM__DEFAULT_FRAME_SHIFT 11 /* 2048 bytes */
|
#define XSK_UMEM__DEFAULT_FRAME_SHIFT 12 /* 4096 bytes */
|
||||||
#define XSK_UMEM__DEFAULT_FRAME_SIZE (1 << XSK_UMEM__DEFAULT_FRAME_SHIFT)
|
#define XSK_UMEM__DEFAULT_FRAME_SIZE (1 << XSK_UMEM__DEFAULT_FRAME_SHIFT)
|
||||||
#define XSK_UMEM__DEFAULT_FRAME_HEADROOM 0
|
#define XSK_UMEM__DEFAULT_FRAME_HEADROOM 0
|
||||||
|
#define XSK_UMEM__DEFAULT_FLAGS 0
|
||||||
|
|
||||||
struct xsk_umem_config {
|
struct xsk_umem_config {
|
||||||
__u32 fill_size;
|
__u32 fill_size;
|
||||||
__u32 comp_size;
|
__u32 comp_size;
|
||||||
__u32 frame_size;
|
__u32 frame_size;
|
||||||
__u32 frame_headroom;
|
__u32 frame_headroom;
|
||||||
|
__u32 flags;
|
||||||
};
|
};
|
||||||
|
|
||||||
/* Flags for the libbpf_flags field. */
|
/* Flags for the libbpf_flags field. */
|
||||||
@@ -195,6 +218,16 @@ LIBBPF_API int xsk_umem__create(struct xsk_umem **umem,
|
|||||||
struct xsk_ring_prod *fill,
|
struct xsk_ring_prod *fill,
|
||||||
struct xsk_ring_cons *comp,
|
struct xsk_ring_cons *comp,
|
||||||
const struct xsk_umem_config *config);
|
const struct xsk_umem_config *config);
|
||||||
|
LIBBPF_API int xsk_umem__create_v0_0_2(struct xsk_umem **umem,
|
||||||
|
void *umem_area, __u64 size,
|
||||||
|
struct xsk_ring_prod *fill,
|
||||||
|
struct xsk_ring_cons *comp,
|
||||||
|
const struct xsk_umem_config *config);
|
||||||
|
LIBBPF_API int xsk_umem__create_v0_0_4(struct xsk_umem **umem,
|
||||||
|
void *umem_area, __u64 size,
|
||||||
|
struct xsk_ring_prod *fill,
|
||||||
|
struct xsk_ring_cons *comp,
|
||||||
|
const struct xsk_umem_config *config);
|
||||||
LIBBPF_API int xsk_socket__create(struct xsk_socket **xsk,
|
LIBBPF_API int xsk_socket__create(struct xsk_socket **xsk,
|
||||||
const char *ifname, __u32 queue_id,
|
const char *ifname, __u32 queue_id,
|
||||||
struct xsk_umem *umem,
|
struct xsk_umem *umem,
|
||||||
|
|||||||
@@ -13,6 +13,10 @@ function info() {
|
|||||||
echo -e "\033[33;1m$1\033[0m"
|
echo -e "\033[33;1m$1\033[0m"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
function error() {
|
||||||
|
echo -e "\033[31;1m$1\033[0m"
|
||||||
|
}
|
||||||
|
|
||||||
function docker_exec() {
|
function docker_exec() {
|
||||||
docker exec $ENV_VARS -it $CONT_NAME "$@"
|
docker exec $ENV_VARS -it $CONT_NAME "$@"
|
||||||
}
|
}
|
||||||
@@ -26,43 +30,43 @@ for phase in "${PHASES[@]}"; do
|
|||||||
SETUP)
|
SETUP)
|
||||||
info "Setup phase"
|
info "Setup phase"
|
||||||
info "Using Debian $DEBIAN_RELEASE"
|
info "Using Debian $DEBIAN_RELEASE"
|
||||||
docker pull debian:$DEBIAN_RELEASE
|
docker pull debian:$DEBIAN_RELEASE
|
||||||
info "Starting container $CONT_NAME"
|
info "Starting container $CONT_NAME"
|
||||||
$DOCKER_RUN -v $REPO_ROOT:/build:rw \
|
$DOCKER_RUN -v $REPO_ROOT:/build:rw \
|
||||||
-w /build --privileged=true --name $CONT_NAME \
|
-w /build --privileged=true --name $CONT_NAME \
|
||||||
-dit --net=host debian:$DEBIAN_RELEASE /bin/bash
|
-dit --net=host debian:$DEBIAN_RELEASE /bin/bash
|
||||||
docker_exec bash -c "echo deb-src http://deb.debian.org/debian $DEBIAN_RELEASE main >>/etc/apt/sources.list"
|
docker_exec bash -c "echo deb-src http://deb.debian.org/debian $DEBIAN_RELEASE main >>/etc/apt/sources.list"
|
||||||
docker_exec apt-get -y update
|
docker_exec apt-get -y update
|
||||||
docker_exec apt-get -y build-dep libelf-dev
|
docker_exec apt-get -y build-dep libelf-dev
|
||||||
docker_exec apt-get -y install libelf-dev
|
docker_exec apt-get -y install libelf-dev
|
||||||
docker_exec apt-get -y install "${ADDITIONAL_DEPS[@]}"
|
docker_exec apt-get -y install "${ADDITIONAL_DEPS[@]}"
|
||||||
;;
|
;;
|
||||||
RUN|RUN_CLANG|RUN_GCC8)
|
RUN|RUN_CLANG|RUN_GCC8|RUN_ASAN|RUN_CLANG_ASAN|RUN_GCC8_ASAN)
|
||||||
if [[ "$phase" = "RUN_CLANG" ]]; then
|
if [[ "$phase" = *"CLANG"* ]]; then
|
||||||
ENV_VARS="-e CC=clang -e CXX=clang++"
|
ENV_VARS="-e CC=clang -e CXX=clang++"
|
||||||
CC="clang"
|
CC="clang"
|
||||||
elif [[ "$phase" = "RUN_GCC8" ]]; then
|
elif [[ "$phase" = *"GCC8"* ]]; then
|
||||||
ENV_VARS="-e CC=gcc-8 -e CXX=g++-8"
|
ENV_VARS="-e CC=gcc-8 -e CXX=g++-8"
|
||||||
CC="gcc-8"
|
CC="gcc-8"
|
||||||
|
else
|
||||||
|
CFLAGS="${CFLAGS} -Wno-stringop-truncation"
|
||||||
fi
|
fi
|
||||||
docker_exec mkdir build
|
if [[ "$phase" = *"ASAN"* ]]; then
|
||||||
docker_exec ${CC:-cc} --version
|
CFLAGS="${CFLAGS} -fsanitize=address,undefined"
|
||||||
docker_exec make CFLAGS="${CFLAGS}" -C ./src -B OBJDIR=../build
|
|
||||||
docker_exec rm -rf build
|
|
||||||
;;
|
|
||||||
RUN_ASAN|RUN_CLANG_ASAN|RUN_GCC8_ASAN)
|
|
||||||
if [[ "$phase" = "RUN_CLANG_ASAN" ]]; then
|
|
||||||
ENV_VARS="-e CC=clang -e CXX=clang++"
|
|
||||||
CC="clang"
|
|
||||||
elif [[ "$phase" = "RUN_GCC8_ASAN" ]]; then
|
|
||||||
ENV_VARS="-e CC=gcc-8 -e CXX=g++-8"
|
|
||||||
CC="gcc-8"
|
|
||||||
fi
|
fi
|
||||||
CFLAGS="${CFLAGS} -fsanitize=address,undefined"
|
docker_exec mkdir build install
|
||||||
docker_exec mkdir build
|
|
||||||
docker_exec ${CC:-cc} --version
|
docker_exec ${CC:-cc} --version
|
||||||
|
info "build"
|
||||||
docker_exec make CFLAGS="${CFLAGS}" -C ./src -B OBJDIR=../build
|
docker_exec make CFLAGS="${CFLAGS}" -C ./src -B OBJDIR=../build
|
||||||
docker_exec rm -rf build
|
info "ldd build/libbpf.so:"
|
||||||
|
docker_exec ldd build/libbpf.so
|
||||||
|
if ! docker_exec ldd build/libbpf.so | grep -q libelf; then
|
||||||
|
error "No reference to libelf.so in libbpf.so!"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
info "install"
|
||||||
|
docker_exec make -C src OBJDIR=../build DESTDIR=../install install
|
||||||
|
docker_exec rm -rf build install
|
||||||
;;
|
;;
|
||||||
CLEANUP)
|
CLEANUP)
|
||||||
info "Cleanup phase"
|
info "Cleanup phase"
|
||||||
|
|||||||
27
travis-ci/managers/ubuntu.sh
Executable file
27
travis-ci/managers/ubuntu.sh
Executable file
@@ -0,0 +1,27 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
set -e
|
||||||
|
set -x
|
||||||
|
|
||||||
|
RELEASE="bionic"
|
||||||
|
|
||||||
|
echo "deb-src http://archive.ubuntu.com/ubuntu/ $RELEASE main restricted universe multiverse" >>/etc/apt/sources.list
|
||||||
|
|
||||||
|
apt-get update
|
||||||
|
apt-get -y build-dep libelf-dev
|
||||||
|
apt-get install -y libelf-dev pkg-config
|
||||||
|
|
||||||
|
source "$(dirname $0)/travis_wait.bash"
|
||||||
|
|
||||||
|
cd $REPO_ROOT
|
||||||
|
|
||||||
|
CFLAGS="-g -O2 -Werror -Wall -fsanitize=address,undefined"
|
||||||
|
mkdir build install
|
||||||
|
cc --version
|
||||||
|
make CFLAGS="${CFLAGS}" -C ./src -B OBJDIR=../build
|
||||||
|
ldd build/libbpf.so
|
||||||
|
if ! ldd build/libbpf.so | grep -q libelf; then
|
||||||
|
echo "FAIL: No reference to libelf.so in libbpf.so!"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
make -C src OBJDIR=../build DESTDIR=../install install
|
||||||
|
rm -rf build install
|
||||||
@@ -1,17 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
set -e
|
|
||||||
set -x
|
|
||||||
|
|
||||||
apt-get update
|
|
||||||
apt-get -y build-dep libelf-dev
|
|
||||||
apt-get install -y libelf-dev
|
|
||||||
|
|
||||||
source "$(dirname $0)/travis_wait.bash"
|
|
||||||
|
|
||||||
cd $REPO_ROOT
|
|
||||||
|
|
||||||
CFLAGS="-g -O2 -Werror -Wall -fsanitize=address,undefined"
|
|
||||||
mkdir build
|
|
||||||
cc --version
|
|
||||||
make CFLAGS="${CFLAGS}" -C ./src -B OBJDIR=../build
|
|
||||||
rm -rf build
|
|
||||||
Reference in New Issue
Block a user