mirror of https://github.com/torvalds/linux.git
bpf-fixes
-----BEGIN PGP SIGNATURE----- iQIzBAABCAAdFiEE+soXsSLHKoYyzcli6rmadz2vbToFAmjfBtMACgkQ6rmadz2v bToTuA/+JizieMIW6eqzCDrrhj45DmuKu6gUMrkmM0xte3QCoLly5FDGJ9HMmrqf L5xfz/TAExg/Nh9a0zpCGE7/fMr9P10Z5vVHMe/I06rcW+/fDrAERXDurlfpfliv /7KqF/lq1D6kp7bcBzWX4dzkT66Nh/Ax6ZJKIXF/K3iwFXBb1A/95Wwgqxuc3xNM n0kthEhnX6x5cojy6fla2zYNoebNLVxPvafTcAtnE0QM8vxdOl0Q7KWrdQpVE5V/ z6WF2M822eTQeUIy6k/ZRckFlmEwa++I+w5EnygBFP8INUHARdYNBQpQVFkg31jz GYGlbTs7jaDbMNWkEhKyDbuhL5Xq9/5FGOaLI9CvDtpPjbfYTZMGtIn9L902XtqE VEfBcTA/g/qd8Urx5622sfPwau64LrSAKBRE/4CJ7/dsnPx4BdKavsA5DMVuyRIm Au6tOxlRFhPWhultnmmbFBjwn33xTleYNUF9wpWQnijNq+Ph29gKZk8Ac5eKKS6A dTSCxv7LGafezN/evr779vXohZyF9vWfqHdITVzTo40tsSbi5v4uyfJ2qzoaS7Gf UQ4F2nkjqddhG/O1W2TY8aFzmWXP2q92V6yqkcq5zjA3D1Ue6JOxRzG/3kNzgsLX Gf1DmPosUyeLNpwdDYRD83Dk7tJ7rAI+x3i6Iwh8qivIhC4CzrU= =Kzf9 -----END PGP SIGNATURE----- Merge tag 'bpf-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf Pull bpf fixes from Alexei Starovoitov: - Fix selftests/bpf (typo, conflicts) and unbreak BPF CI (Jiri Olsa) - Remove linux/unaligned.h dependency for libbpf_sha256 (Andrii Nakryiko) and add a test (Eric Biggers) - Reject negative offsets for ALU operations in the verifier (Yazhou Tang) and add a test (Eduard Zingerman) - Skip scalar adjustment for BPF_NEG operation if destination register is a pointer (Brahmajit Das) and add a test (KaFai Wan) * tag 'bpf-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf: libbpf: Fix missing #pragma in libbpf_utils.c selftests/bpf: Add tests for rejection of ALU ops with negative offsets selftests/bpf: Add test for libbpf_sha256() bpf: Reject negative offsets for ALU ops libbpf: remove linux/unaligned.h dependency for libbpf_sha256() libbpf: move libbpf_sha256() implementation into libbpf_utils.c libbpf: move libbpf_errstr() into libbpf_utils.c libbpf: remove unused libbpf_strerror_r and STRERR_BUFSIZE libbpf: make libbpf_errno.c into more generic libbpf_utils.c selftests/bpf: Add test for BPF_NEG alu on CONST_PTR_TO_MAP bpf: Skip scalar adjustment for BPF_NEG if dst is a pointer selftests/bpf: Fix realloc size in bpf_get_addrs selftests/bpf: Fix typo in subtest_basic_usdt after merge conflict selftests/bpf: Fix open-coded gettid syscall in uprobe syscall tests
This commit is contained in:
commit
cbf33b8e0b
|
|
@ -15645,7 +15645,8 @@ static int check_alu_op(struct bpf_verifier_env *env, struct bpf_insn *insn)
|
||||||
}
|
}
|
||||||
|
|
||||||
/* check dest operand */
|
/* check dest operand */
|
||||||
if (opcode == BPF_NEG) {
|
if (opcode == BPF_NEG &&
|
||||||
|
regs[insn->dst_reg].type == SCALAR_VALUE) {
|
||||||
err = check_reg_arg(env, insn->dst_reg, DST_OP_NO_MARK);
|
err = check_reg_arg(env, insn->dst_reg, DST_OP_NO_MARK);
|
||||||
err = err ?: adjust_scalar_min_max_vals(env, insn,
|
err = err ?: adjust_scalar_min_max_vals(env, insn,
|
||||||
®s[insn->dst_reg],
|
®s[insn->dst_reg],
|
||||||
|
|
@ -15803,7 +15804,7 @@ static int check_alu_op(struct bpf_verifier_env *env, struct bpf_insn *insn)
|
||||||
} else { /* all other ALU ops: and, sub, xor, add, ... */
|
} else { /* all other ALU ops: and, sub, xor, add, ... */
|
||||||
|
|
||||||
if (BPF_SRC(insn->code) == BPF_X) {
|
if (BPF_SRC(insn->code) == BPF_X) {
|
||||||
if (insn->imm != 0 || insn->off > 1 ||
|
if (insn->imm != 0 || (insn->off != 0 && insn->off != 1) ||
|
||||||
(insn->off == 1 && opcode != BPF_MOD && opcode != BPF_DIV)) {
|
(insn->off == 1 && opcode != BPF_MOD && opcode != BPF_DIV)) {
|
||||||
verbose(env, "BPF_ALU uses reserved fields\n");
|
verbose(env, "BPF_ALU uses reserved fields\n");
|
||||||
return -EINVAL;
|
return -EINVAL;
|
||||||
|
|
@ -15813,7 +15814,7 @@ static int check_alu_op(struct bpf_verifier_env *env, struct bpf_insn *insn)
|
||||||
if (err)
|
if (err)
|
||||||
return err;
|
return err;
|
||||||
} else {
|
} else {
|
||||||
if (insn->src_reg != BPF_REG_0 || insn->off > 1 ||
|
if (insn->src_reg != BPF_REG_0 || (insn->off != 0 && insn->off != 1) ||
|
||||||
(insn->off == 1 && opcode != BPF_MOD && opcode != BPF_DIV)) {
|
(insn->off == 1 && opcode != BPF_MOD && opcode != BPF_DIV)) {
|
||||||
verbose(env, "BPF_ALU uses reserved fields\n");
|
verbose(env, "BPF_ALU uses reserved fields\n");
|
||||||
return -EINVAL;
|
return -EINVAL;
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,4 @@
|
||||||
libbpf-y := libbpf.o bpf.o nlattr.o btf.o libbpf_errno.o str_error.o \
|
libbpf-y := libbpf.o bpf.o nlattr.o btf.o libbpf_utils.o \
|
||||||
netlink.o bpf_prog_linfo.o libbpf_probes.o hashmap.o \
|
netlink.o bpf_prog_linfo.o libbpf_probes.o hashmap.o \
|
||||||
btf_dump.o ringbuf.o strset.o linker.o gen_loader.o relo_core.o \
|
btf_dump.o ringbuf.o strset.o linker.o gen_loader.o relo_core.o \
|
||||||
usdt.o zip.o elf.o features.o btf_iter.o btf_relocate.o
|
usdt.o zip.o elf.o features.o btf_iter.o btf_relocate.o
|
||||||
|
|
|
||||||
|
|
@ -23,7 +23,6 @@
|
||||||
#include "libbpf_internal.h"
|
#include "libbpf_internal.h"
|
||||||
#include "hashmap.h"
|
#include "hashmap.h"
|
||||||
#include "strset.h"
|
#include "strset.h"
|
||||||
#include "str_error.h"
|
|
||||||
|
|
||||||
#define BTF_MAX_NR_TYPES 0x7fffffffU
|
#define BTF_MAX_NR_TYPES 0x7fffffffU
|
||||||
#define BTF_MAX_STR_OFFSET 0x7fffffffU
|
#define BTF_MAX_STR_OFFSET 0x7fffffffU
|
||||||
|
|
|
||||||
|
|
@ -21,7 +21,6 @@
|
||||||
#include "hashmap.h"
|
#include "hashmap.h"
|
||||||
#include "libbpf.h"
|
#include "libbpf.h"
|
||||||
#include "libbpf_internal.h"
|
#include "libbpf_internal.h"
|
||||||
#include "str_error.h"
|
|
||||||
|
|
||||||
static const char PREFIXES[] = "\t\t\t\t\t\t\t\t\t\t\t\t\t";
|
static const char PREFIXES[] = "\t\t\t\t\t\t\t\t\t\t\t\t\t";
|
||||||
static const size_t PREFIX_CNT = sizeof(PREFIXES) - 1;
|
static const size_t PREFIX_CNT = sizeof(PREFIXES) - 1;
|
||||||
|
|
|
||||||
|
|
@ -9,7 +9,6 @@
|
||||||
#include <linux/kernel.h>
|
#include <linux/kernel.h>
|
||||||
|
|
||||||
#include "libbpf_internal.h"
|
#include "libbpf_internal.h"
|
||||||
#include "str_error.h"
|
|
||||||
|
|
||||||
/* A SHT_GNU_versym section holds 16-bit words. This bit is set if
|
/* A SHT_GNU_versym section holds 16-bit words. This bit is set if
|
||||||
* the symbol is hidden and can only be seen when referenced using an
|
* the symbol is hidden and can only be seen when referenced using an
|
||||||
|
|
|
||||||
|
|
@ -6,7 +6,6 @@
|
||||||
#include "libbpf.h"
|
#include "libbpf.h"
|
||||||
#include "libbpf_common.h"
|
#include "libbpf_common.h"
|
||||||
#include "libbpf_internal.h"
|
#include "libbpf_internal.h"
|
||||||
#include "str_error.h"
|
|
||||||
|
|
||||||
static inline __u64 ptr_to_u64(const void *ptr)
|
static inline __u64 ptr_to_u64(const void *ptr)
|
||||||
{
|
{
|
||||||
|
|
|
||||||
|
|
@ -4,6 +4,7 @@
|
||||||
#include <stdlib.h>
|
#include <stdlib.h>
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
#include <errno.h>
|
#include <errno.h>
|
||||||
|
#include <asm/byteorder.h>
|
||||||
#include <linux/filter.h>
|
#include <linux/filter.h>
|
||||||
#include <sys/param.h>
|
#include <sys/param.h>
|
||||||
#include "btf.h"
|
#include "btf.h"
|
||||||
|
|
@ -13,8 +14,6 @@
|
||||||
#include "hashmap.h"
|
#include "hashmap.h"
|
||||||
#include "bpf_gen_internal.h"
|
#include "bpf_gen_internal.h"
|
||||||
#include "skel_internal.h"
|
#include "skel_internal.h"
|
||||||
#include <asm/byteorder.h>
|
|
||||||
#include "str_error.h"
|
|
||||||
|
|
||||||
#define MAX_USED_MAPS 64
|
#define MAX_USED_MAPS 64
|
||||||
#define MAX_USED_PROGS 32
|
#define MAX_USED_PROGS 32
|
||||||
|
|
|
||||||
|
|
@ -35,7 +35,6 @@
|
||||||
#include <linux/perf_event.h>
|
#include <linux/perf_event.h>
|
||||||
#include <linux/bpf_perf_event.h>
|
#include <linux/bpf_perf_event.h>
|
||||||
#include <linux/ring_buffer.h>
|
#include <linux/ring_buffer.h>
|
||||||
#include <linux/unaligned.h>
|
|
||||||
#include <sys/epoll.h>
|
#include <sys/epoll.h>
|
||||||
#include <sys/ioctl.h>
|
#include <sys/ioctl.h>
|
||||||
#include <sys/mman.h>
|
#include <sys/mman.h>
|
||||||
|
|
@ -51,7 +50,6 @@
|
||||||
#include "libbpf.h"
|
#include "libbpf.h"
|
||||||
#include "bpf.h"
|
#include "bpf.h"
|
||||||
#include "btf.h"
|
#include "btf.h"
|
||||||
#include "str_error.h"
|
|
||||||
#include "libbpf_internal.h"
|
#include "libbpf_internal.h"
|
||||||
#include "hashmap.h"
|
#include "hashmap.h"
|
||||||
#include "bpf_gen_internal.h"
|
#include "bpf_gen_internal.h"
|
||||||
|
|
@ -319,8 +317,6 @@ static void pr_perm_msg(int err)
|
||||||
buf);
|
buf);
|
||||||
}
|
}
|
||||||
|
|
||||||
#define STRERR_BUFSIZE 128
|
|
||||||
|
|
||||||
/* Copied from tools/perf/util/util.h */
|
/* Copied from tools/perf/util/util.h */
|
||||||
#ifndef zfree
|
#ifndef zfree
|
||||||
# define zfree(ptr) ({ free(*ptr); *ptr = NULL; })
|
# define zfree(ptr) ({ free(*ptr); *ptr = NULL; })
|
||||||
|
|
@ -14285,100 +14281,3 @@ void bpf_object__destroy_skeleton(struct bpf_object_skeleton *s)
|
||||||
free(s->progs);
|
free(s->progs);
|
||||||
free(s);
|
free(s);
|
||||||
}
|
}
|
||||||
|
|
||||||
static inline __u32 ror32(__u32 v, int bits)
|
|
||||||
{
|
|
||||||
return (v >> bits) | (v << (32 - bits));
|
|
||||||
}
|
|
||||||
|
|
||||||
#define SHA256_BLOCK_LENGTH 64
|
|
||||||
#define Ch(x, y, z) (((x) & (y)) ^ (~(x) & (z)))
|
|
||||||
#define Maj(x, y, z) (((x) & (y)) ^ ((x) & (z)) ^ ((y) & (z)))
|
|
||||||
#define Sigma_0(x) (ror32((x), 2) ^ ror32((x), 13) ^ ror32((x), 22))
|
|
||||||
#define Sigma_1(x) (ror32((x), 6) ^ ror32((x), 11) ^ ror32((x), 25))
|
|
||||||
#define sigma_0(x) (ror32((x), 7) ^ ror32((x), 18) ^ ((x) >> 3))
|
|
||||||
#define sigma_1(x) (ror32((x), 17) ^ ror32((x), 19) ^ ((x) >> 10))
|
|
||||||
|
|
||||||
static const __u32 sha256_K[64] = {
|
|
||||||
0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, 0x3956c25b, 0x59f111f1,
|
|
||||||
0x923f82a4, 0xab1c5ed5, 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3,
|
|
||||||
0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174, 0xe49b69c1, 0xefbe4786,
|
|
||||||
0x0fc19dc6, 0x240ca1cc, 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,
|
|
||||||
0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7, 0xc6e00bf3, 0xd5a79147,
|
|
||||||
0x06ca6351, 0x14292967, 0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13,
|
|
||||||
0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85, 0xa2bfe8a1, 0xa81a664b,
|
|
||||||
0xc24b8b70, 0xc76c51a3, 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,
|
|
||||||
0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5, 0x391c0cb3, 0x4ed8aa4a,
|
|
||||||
0x5b9cca4f, 0x682e6ff3, 0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208,
|
|
||||||
0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2,
|
|
||||||
};
|
|
||||||
|
|
||||||
#define SHA256_ROUND(i, a, b, c, d, e, f, g, h) \
|
|
||||||
{ \
|
|
||||||
__u32 tmp = h + Sigma_1(e) + Ch(e, f, g) + sha256_K[i] + w[i]; \
|
|
||||||
d += tmp; \
|
|
||||||
h = tmp + Sigma_0(a) + Maj(a, b, c); \
|
|
||||||
}
|
|
||||||
|
|
||||||
static void sha256_blocks(__u32 state[8], const __u8 *data, size_t nblocks)
|
|
||||||
{
|
|
||||||
while (nblocks--) {
|
|
||||||
__u32 a = state[0];
|
|
||||||
__u32 b = state[1];
|
|
||||||
__u32 c = state[2];
|
|
||||||
__u32 d = state[3];
|
|
||||||
__u32 e = state[4];
|
|
||||||
__u32 f = state[5];
|
|
||||||
__u32 g = state[6];
|
|
||||||
__u32 h = state[7];
|
|
||||||
__u32 w[64];
|
|
||||||
int i;
|
|
||||||
|
|
||||||
for (i = 0; i < 16; i++)
|
|
||||||
w[i] = get_unaligned_be32(&data[4 * i]);
|
|
||||||
for (; i < ARRAY_SIZE(w); i++)
|
|
||||||
w[i] = sigma_1(w[i - 2]) + w[i - 7] +
|
|
||||||
sigma_0(w[i - 15]) + w[i - 16];
|
|
||||||
for (i = 0; i < ARRAY_SIZE(w); i += 8) {
|
|
||||||
SHA256_ROUND(i + 0, a, b, c, d, e, f, g, h);
|
|
||||||
SHA256_ROUND(i + 1, h, a, b, c, d, e, f, g);
|
|
||||||
SHA256_ROUND(i + 2, g, h, a, b, c, d, e, f);
|
|
||||||
SHA256_ROUND(i + 3, f, g, h, a, b, c, d, e);
|
|
||||||
SHA256_ROUND(i + 4, e, f, g, h, a, b, c, d);
|
|
||||||
SHA256_ROUND(i + 5, d, e, f, g, h, a, b, c);
|
|
||||||
SHA256_ROUND(i + 6, c, d, e, f, g, h, a, b);
|
|
||||||
SHA256_ROUND(i + 7, b, c, d, e, f, g, h, a);
|
|
||||||
}
|
|
||||||
state[0] += a;
|
|
||||||
state[1] += b;
|
|
||||||
state[2] += c;
|
|
||||||
state[3] += d;
|
|
||||||
state[4] += e;
|
|
||||||
state[5] += f;
|
|
||||||
state[6] += g;
|
|
||||||
state[7] += h;
|
|
||||||
data += SHA256_BLOCK_LENGTH;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
void libbpf_sha256(const void *data, size_t len, __u8 out[SHA256_DIGEST_LENGTH])
|
|
||||||
{
|
|
||||||
__u32 state[8] = { 0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a,
|
|
||||||
0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19 };
|
|
||||||
const __be64 bitcount = cpu_to_be64((__u64)len * 8);
|
|
||||||
__u8 final_data[2 * SHA256_BLOCK_LENGTH] = { 0 };
|
|
||||||
size_t final_len = len % SHA256_BLOCK_LENGTH;
|
|
||||||
int i;
|
|
||||||
|
|
||||||
sha256_blocks(state, data, len / SHA256_BLOCK_LENGTH);
|
|
||||||
|
|
||||||
memcpy(final_data, data + len - final_len, final_len);
|
|
||||||
final_data[final_len] = 0x80;
|
|
||||||
final_len = round_up(final_len + 9, SHA256_BLOCK_LENGTH);
|
|
||||||
memcpy(&final_data[final_len - 8], &bitcount, 8);
|
|
||||||
|
|
||||||
sha256_blocks(state, final_data, final_len / SHA256_BLOCK_LENGTH);
|
|
||||||
|
|
||||||
for (i = 0; i < ARRAY_SIZE(state); i++)
|
|
||||||
put_unaligned_be32(state[i], &out[4 * i]);
|
|
||||||
}
|
|
||||||
|
|
|
||||||
|
|
@ -1,75 +0,0 @@
|
||||||
// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Copyright (C) 2013-2015 Alexei Starovoitov <ast@kernel.org>
|
|
||||||
* Copyright (C) 2015 Wang Nan <wangnan0@huawei.com>
|
|
||||||
* Copyright (C) 2015 Huawei Inc.
|
|
||||||
* Copyright (C) 2017 Nicira, Inc.
|
|
||||||
*/
|
|
||||||
|
|
||||||
#undef _GNU_SOURCE
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <string.h>
|
|
||||||
|
|
||||||
#include "libbpf.h"
|
|
||||||
#include "libbpf_internal.h"
|
|
||||||
|
|
||||||
/* make sure libbpf doesn't use kernel-only integer typedefs */
|
|
||||||
#pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
|
|
||||||
|
|
||||||
#define ERRNO_OFFSET(e) ((e) - __LIBBPF_ERRNO__START)
|
|
||||||
#define ERRCODE_OFFSET(c) ERRNO_OFFSET(LIBBPF_ERRNO__##c)
|
|
||||||
#define NR_ERRNO (__LIBBPF_ERRNO__END - __LIBBPF_ERRNO__START)
|
|
||||||
|
|
||||||
static const char *libbpf_strerror_table[NR_ERRNO] = {
|
|
||||||
[ERRCODE_OFFSET(LIBELF)] = "Something wrong in libelf",
|
|
||||||
[ERRCODE_OFFSET(FORMAT)] = "BPF object format invalid",
|
|
||||||
[ERRCODE_OFFSET(KVERSION)] = "'version' section incorrect or lost",
|
|
||||||
[ERRCODE_OFFSET(ENDIAN)] = "Endian mismatch",
|
|
||||||
[ERRCODE_OFFSET(INTERNAL)] = "Internal error in libbpf",
|
|
||||||
[ERRCODE_OFFSET(RELOC)] = "Relocation failed",
|
|
||||||
[ERRCODE_OFFSET(VERIFY)] = "Kernel verifier blocks program loading",
|
|
||||||
[ERRCODE_OFFSET(PROG2BIG)] = "Program too big",
|
|
||||||
[ERRCODE_OFFSET(KVER)] = "Incorrect kernel version",
|
|
||||||
[ERRCODE_OFFSET(PROGTYPE)] = "Kernel doesn't support this program type",
|
|
||||||
[ERRCODE_OFFSET(WRNGPID)] = "Wrong pid in netlink message",
|
|
||||||
[ERRCODE_OFFSET(INVSEQ)] = "Invalid netlink sequence",
|
|
||||||
[ERRCODE_OFFSET(NLPARSE)] = "Incorrect netlink message parsing",
|
|
||||||
};
|
|
||||||
|
|
||||||
int libbpf_strerror(int err, char *buf, size_t size)
|
|
||||||
{
|
|
||||||
int ret;
|
|
||||||
|
|
||||||
if (!buf || !size)
|
|
||||||
return libbpf_err(-EINVAL);
|
|
||||||
|
|
||||||
err = err > 0 ? err : -err;
|
|
||||||
|
|
||||||
if (err < __LIBBPF_ERRNO__START) {
|
|
||||||
ret = strerror_r(err, buf, size);
|
|
||||||
buf[size - 1] = '\0';
|
|
||||||
return libbpf_err_errno(ret);
|
|
||||||
}
|
|
||||||
|
|
||||||
if (err < __LIBBPF_ERRNO__END) {
|
|
||||||
const char *msg;
|
|
||||||
|
|
||||||
msg = libbpf_strerror_table[ERRNO_OFFSET(err)];
|
|
||||||
ret = snprintf(buf, size, "%s", msg);
|
|
||||||
buf[size - 1] = '\0';
|
|
||||||
/* The length of the buf and msg is positive.
|
|
||||||
* A negative number may be returned only when the
|
|
||||||
* size exceeds INT_MAX. Not likely to appear.
|
|
||||||
*/
|
|
||||||
if (ret >= size)
|
|
||||||
return libbpf_err(-ERANGE);
|
|
||||||
return 0;
|
|
||||||
}
|
|
||||||
|
|
||||||
ret = snprintf(buf, size, "Unknown libbpf error %d", err);
|
|
||||||
buf[size - 1] = '\0';
|
|
||||||
if (ret >= size)
|
|
||||||
return libbpf_err(-ERANGE);
|
|
||||||
return libbpf_err(-ENOENT);
|
|
||||||
}
|
|
||||||
|
|
@ -172,6 +172,16 @@ do { \
|
||||||
#define pr_info(fmt, ...) __pr(LIBBPF_INFO, fmt, ##__VA_ARGS__)
|
#define pr_info(fmt, ...) __pr(LIBBPF_INFO, fmt, ##__VA_ARGS__)
|
||||||
#define pr_debug(fmt, ...) __pr(LIBBPF_DEBUG, fmt, ##__VA_ARGS__)
|
#define pr_debug(fmt, ...) __pr(LIBBPF_DEBUG, fmt, ##__VA_ARGS__)
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @brief **libbpf_errstr()** returns string corresponding to numeric errno
|
||||||
|
* @param err negative numeric errno
|
||||||
|
* @return pointer to string representation of the errno, that is invalidated
|
||||||
|
* upon the next call.
|
||||||
|
*/
|
||||||
|
const char *libbpf_errstr(int err);
|
||||||
|
|
||||||
|
#define errstr(err) libbpf_errstr(err)
|
||||||
|
|
||||||
#ifndef __has_builtin
|
#ifndef __has_builtin
|
||||||
#define __has_builtin(x) 0
|
#define __has_builtin(x) 0
|
||||||
#endif
|
#endif
|
||||||
|
|
@ -712,6 +722,11 @@ static inline bool is_pow_of_2(size_t x)
|
||||||
return x && (x & (x - 1)) == 0;
|
return x && (x & (x - 1)) == 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static inline __u32 ror32(__u32 v, int bits)
|
||||||
|
{
|
||||||
|
return (v >> bits) | (v << (32 - bits));
|
||||||
|
}
|
||||||
|
|
||||||
#define PROG_LOAD_ATTEMPTS 5
|
#define PROG_LOAD_ATTEMPTS 5
|
||||||
int sys_bpf_prog_load(union bpf_attr *attr, unsigned int size, int attempts);
|
int sys_bpf_prog_load(union bpf_attr *attr, unsigned int size, int attempts);
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -0,0 +1,252 @@
|
||||||
|
// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Copyright (C) 2013-2015 Alexei Starovoitov <ast@kernel.org>
|
||||||
|
* Copyright (C) 2015 Wang Nan <wangnan0@huawei.com>
|
||||||
|
* Copyright (C) 2015 Huawei Inc.
|
||||||
|
* Copyright (C) 2017 Nicira, Inc.
|
||||||
|
*/
|
||||||
|
|
||||||
|
#undef _GNU_SOURCE
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <string.h>
|
||||||
|
#include <errno.h>
|
||||||
|
#include <inttypes.h>
|
||||||
|
#include <linux/kernel.h>
|
||||||
|
|
||||||
|
#include "libbpf.h"
|
||||||
|
#include "libbpf_internal.h"
|
||||||
|
|
||||||
|
#ifndef ENOTSUPP
|
||||||
|
#define ENOTSUPP 524
|
||||||
|
#endif
|
||||||
|
|
||||||
|
/* make sure libbpf doesn't use kernel-only integer typedefs */
|
||||||
|
#pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
|
||||||
|
|
||||||
|
#define ERRNO_OFFSET(e) ((e) - __LIBBPF_ERRNO__START)
|
||||||
|
#define ERRCODE_OFFSET(c) ERRNO_OFFSET(LIBBPF_ERRNO__##c)
|
||||||
|
#define NR_ERRNO (__LIBBPF_ERRNO__END - __LIBBPF_ERRNO__START)
|
||||||
|
|
||||||
|
static const char *libbpf_strerror_table[NR_ERRNO] = {
|
||||||
|
[ERRCODE_OFFSET(LIBELF)] = "Something wrong in libelf",
|
||||||
|
[ERRCODE_OFFSET(FORMAT)] = "BPF object format invalid",
|
||||||
|
[ERRCODE_OFFSET(KVERSION)] = "'version' section incorrect or lost",
|
||||||
|
[ERRCODE_OFFSET(ENDIAN)] = "Endian mismatch",
|
||||||
|
[ERRCODE_OFFSET(INTERNAL)] = "Internal error in libbpf",
|
||||||
|
[ERRCODE_OFFSET(RELOC)] = "Relocation failed",
|
||||||
|
[ERRCODE_OFFSET(VERIFY)] = "Kernel verifier blocks program loading",
|
||||||
|
[ERRCODE_OFFSET(PROG2BIG)] = "Program too big",
|
||||||
|
[ERRCODE_OFFSET(KVER)] = "Incorrect kernel version",
|
||||||
|
[ERRCODE_OFFSET(PROGTYPE)] = "Kernel doesn't support this program type",
|
||||||
|
[ERRCODE_OFFSET(WRNGPID)] = "Wrong pid in netlink message",
|
||||||
|
[ERRCODE_OFFSET(INVSEQ)] = "Invalid netlink sequence",
|
||||||
|
[ERRCODE_OFFSET(NLPARSE)] = "Incorrect netlink message parsing",
|
||||||
|
};
|
||||||
|
|
||||||
|
int libbpf_strerror(int err, char *buf, size_t size)
|
||||||
|
{
|
||||||
|
int ret;
|
||||||
|
|
||||||
|
if (!buf || !size)
|
||||||
|
return libbpf_err(-EINVAL);
|
||||||
|
|
||||||
|
err = err > 0 ? err : -err;
|
||||||
|
|
||||||
|
if (err < __LIBBPF_ERRNO__START) {
|
||||||
|
ret = strerror_r(err, buf, size);
|
||||||
|
buf[size - 1] = '\0';
|
||||||
|
return libbpf_err_errno(ret);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (err < __LIBBPF_ERRNO__END) {
|
||||||
|
const char *msg;
|
||||||
|
|
||||||
|
msg = libbpf_strerror_table[ERRNO_OFFSET(err)];
|
||||||
|
ret = snprintf(buf, size, "%s", msg);
|
||||||
|
buf[size - 1] = '\0';
|
||||||
|
/* The length of the buf and msg is positive.
|
||||||
|
* A negative number may be returned only when the
|
||||||
|
* size exceeds INT_MAX. Not likely to appear.
|
||||||
|
*/
|
||||||
|
if (ret >= size)
|
||||||
|
return libbpf_err(-ERANGE);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
ret = snprintf(buf, size, "Unknown libbpf error %d", err);
|
||||||
|
buf[size - 1] = '\0';
|
||||||
|
if (ret >= size)
|
||||||
|
return libbpf_err(-ERANGE);
|
||||||
|
return libbpf_err(-ENOENT);
|
||||||
|
}
|
||||||
|
|
||||||
|
const char *libbpf_errstr(int err)
|
||||||
|
{
|
||||||
|
static __thread char buf[12];
|
||||||
|
|
||||||
|
if (err > 0)
|
||||||
|
err = -err;
|
||||||
|
|
||||||
|
switch (err) {
|
||||||
|
case -E2BIG: return "-E2BIG";
|
||||||
|
case -EACCES: return "-EACCES";
|
||||||
|
case -EADDRINUSE: return "-EADDRINUSE";
|
||||||
|
case -EADDRNOTAVAIL: return "-EADDRNOTAVAIL";
|
||||||
|
case -EAGAIN: return "-EAGAIN";
|
||||||
|
case -EALREADY: return "-EALREADY";
|
||||||
|
case -EBADF: return "-EBADF";
|
||||||
|
case -EBADFD: return "-EBADFD";
|
||||||
|
case -EBUSY: return "-EBUSY";
|
||||||
|
case -ECANCELED: return "-ECANCELED";
|
||||||
|
case -ECHILD: return "-ECHILD";
|
||||||
|
case -EDEADLK: return "-EDEADLK";
|
||||||
|
case -EDOM: return "-EDOM";
|
||||||
|
case -EEXIST: return "-EEXIST";
|
||||||
|
case -EFAULT: return "-EFAULT";
|
||||||
|
case -EFBIG: return "-EFBIG";
|
||||||
|
case -EILSEQ: return "-EILSEQ";
|
||||||
|
case -EINPROGRESS: return "-EINPROGRESS";
|
||||||
|
case -EINTR: return "-EINTR";
|
||||||
|
case -EINVAL: return "-EINVAL";
|
||||||
|
case -EIO: return "-EIO";
|
||||||
|
case -EISDIR: return "-EISDIR";
|
||||||
|
case -ELOOP: return "-ELOOP";
|
||||||
|
case -EMFILE: return "-EMFILE";
|
||||||
|
case -EMLINK: return "-EMLINK";
|
||||||
|
case -EMSGSIZE: return "-EMSGSIZE";
|
||||||
|
case -ENAMETOOLONG: return "-ENAMETOOLONG";
|
||||||
|
case -ENFILE: return "-ENFILE";
|
||||||
|
case -ENODATA: return "-ENODATA";
|
||||||
|
case -ENODEV: return "-ENODEV";
|
||||||
|
case -ENOENT: return "-ENOENT";
|
||||||
|
case -ENOEXEC: return "-ENOEXEC";
|
||||||
|
case -ENOLINK: return "-ENOLINK";
|
||||||
|
case -ENOMEM: return "-ENOMEM";
|
||||||
|
case -ENOSPC: return "-ENOSPC";
|
||||||
|
case -ENOTBLK: return "-ENOTBLK";
|
||||||
|
case -ENOTDIR: return "-ENOTDIR";
|
||||||
|
case -ENOTSUPP: return "-ENOTSUPP";
|
||||||
|
case -ENOTTY: return "-ENOTTY";
|
||||||
|
case -ENXIO: return "-ENXIO";
|
||||||
|
case -EOPNOTSUPP: return "-EOPNOTSUPP";
|
||||||
|
case -EOVERFLOW: return "-EOVERFLOW";
|
||||||
|
case -EPERM: return "-EPERM";
|
||||||
|
case -EPIPE: return "-EPIPE";
|
||||||
|
case -EPROTO: return "-EPROTO";
|
||||||
|
case -EPROTONOSUPPORT: return "-EPROTONOSUPPORT";
|
||||||
|
case -ERANGE: return "-ERANGE";
|
||||||
|
case -EROFS: return "-EROFS";
|
||||||
|
case -ESPIPE: return "-ESPIPE";
|
||||||
|
case -ESRCH: return "-ESRCH";
|
||||||
|
case -ETXTBSY: return "-ETXTBSY";
|
||||||
|
case -EUCLEAN: return "-EUCLEAN";
|
||||||
|
case -EXDEV: return "-EXDEV";
|
||||||
|
default:
|
||||||
|
snprintf(buf, sizeof(buf), "%d", err);
|
||||||
|
return buf;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
#pragma GCC diagnostic push
|
||||||
|
#pragma GCC diagnostic ignored "-Wpacked"
|
||||||
|
#pragma GCC diagnostic ignored "-Wattributes"
|
||||||
|
struct __packed_u32 { __u32 __val; } __attribute__((packed));
|
||||||
|
#pragma GCC diagnostic pop
|
||||||
|
|
||||||
|
#define get_unaligned_be32(p) be32_to_cpu((((struct __packed_u32 *)(p))->__val))
|
||||||
|
#define put_unaligned_be32(v, p) do { \
|
||||||
|
((struct __packed_u32 *)(p))->__val = cpu_to_be32(v); \
|
||||||
|
} while (0)
|
||||||
|
|
||||||
|
#define SHA256_BLOCK_LENGTH 64
|
||||||
|
#define Ch(x, y, z) (((x) & (y)) ^ (~(x) & (z)))
|
||||||
|
#define Maj(x, y, z) (((x) & (y)) ^ ((x) & (z)) ^ ((y) & (z)))
|
||||||
|
#define Sigma_0(x) (ror32((x), 2) ^ ror32((x), 13) ^ ror32((x), 22))
|
||||||
|
#define Sigma_1(x) (ror32((x), 6) ^ ror32((x), 11) ^ ror32((x), 25))
|
||||||
|
#define sigma_0(x) (ror32((x), 7) ^ ror32((x), 18) ^ ((x) >> 3))
|
||||||
|
#define sigma_1(x) (ror32((x), 17) ^ ror32((x), 19) ^ ((x) >> 10))
|
||||||
|
|
||||||
|
static const __u32 sha256_K[64] = {
|
||||||
|
0x428a2f98, 0x71374491, 0xb5c0fbcf, 0xe9b5dba5, 0x3956c25b, 0x59f111f1,
|
||||||
|
0x923f82a4, 0xab1c5ed5, 0xd807aa98, 0x12835b01, 0x243185be, 0x550c7dc3,
|
||||||
|
0x72be5d74, 0x80deb1fe, 0x9bdc06a7, 0xc19bf174, 0xe49b69c1, 0xefbe4786,
|
||||||
|
0x0fc19dc6, 0x240ca1cc, 0x2de92c6f, 0x4a7484aa, 0x5cb0a9dc, 0x76f988da,
|
||||||
|
0x983e5152, 0xa831c66d, 0xb00327c8, 0xbf597fc7, 0xc6e00bf3, 0xd5a79147,
|
||||||
|
0x06ca6351, 0x14292967, 0x27b70a85, 0x2e1b2138, 0x4d2c6dfc, 0x53380d13,
|
||||||
|
0x650a7354, 0x766a0abb, 0x81c2c92e, 0x92722c85, 0xa2bfe8a1, 0xa81a664b,
|
||||||
|
0xc24b8b70, 0xc76c51a3, 0xd192e819, 0xd6990624, 0xf40e3585, 0x106aa070,
|
||||||
|
0x19a4c116, 0x1e376c08, 0x2748774c, 0x34b0bcb5, 0x391c0cb3, 0x4ed8aa4a,
|
||||||
|
0x5b9cca4f, 0x682e6ff3, 0x748f82ee, 0x78a5636f, 0x84c87814, 0x8cc70208,
|
||||||
|
0x90befffa, 0xa4506ceb, 0xbef9a3f7, 0xc67178f2,
|
||||||
|
};
|
||||||
|
|
||||||
|
#define SHA256_ROUND(i, a, b, c, d, e, f, g, h) \
|
||||||
|
{ \
|
||||||
|
__u32 tmp = h + Sigma_1(e) + Ch(e, f, g) + sha256_K[i] + w[i]; \
|
||||||
|
d += tmp; \
|
||||||
|
h = tmp + Sigma_0(a) + Maj(a, b, c); \
|
||||||
|
}
|
||||||
|
|
||||||
|
static void sha256_blocks(__u32 state[8], const __u8 *data, size_t nblocks)
|
||||||
|
{
|
||||||
|
while (nblocks--) {
|
||||||
|
__u32 a = state[0];
|
||||||
|
__u32 b = state[1];
|
||||||
|
__u32 c = state[2];
|
||||||
|
__u32 d = state[3];
|
||||||
|
__u32 e = state[4];
|
||||||
|
__u32 f = state[5];
|
||||||
|
__u32 g = state[6];
|
||||||
|
__u32 h = state[7];
|
||||||
|
__u32 w[64];
|
||||||
|
int i;
|
||||||
|
|
||||||
|
for (i = 0; i < 16; i++)
|
||||||
|
w[i] = get_unaligned_be32(&data[4 * i]);
|
||||||
|
for (; i < ARRAY_SIZE(w); i++)
|
||||||
|
w[i] = sigma_1(w[i - 2]) + w[i - 7] +
|
||||||
|
sigma_0(w[i - 15]) + w[i - 16];
|
||||||
|
for (i = 0; i < ARRAY_SIZE(w); i += 8) {
|
||||||
|
SHA256_ROUND(i + 0, a, b, c, d, e, f, g, h);
|
||||||
|
SHA256_ROUND(i + 1, h, a, b, c, d, e, f, g);
|
||||||
|
SHA256_ROUND(i + 2, g, h, a, b, c, d, e, f);
|
||||||
|
SHA256_ROUND(i + 3, f, g, h, a, b, c, d, e);
|
||||||
|
SHA256_ROUND(i + 4, e, f, g, h, a, b, c, d);
|
||||||
|
SHA256_ROUND(i + 5, d, e, f, g, h, a, b, c);
|
||||||
|
SHA256_ROUND(i + 6, c, d, e, f, g, h, a, b);
|
||||||
|
SHA256_ROUND(i + 7, b, c, d, e, f, g, h, a);
|
||||||
|
}
|
||||||
|
state[0] += a;
|
||||||
|
state[1] += b;
|
||||||
|
state[2] += c;
|
||||||
|
state[3] += d;
|
||||||
|
state[4] += e;
|
||||||
|
state[5] += f;
|
||||||
|
state[6] += g;
|
||||||
|
state[7] += h;
|
||||||
|
data += SHA256_BLOCK_LENGTH;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
void libbpf_sha256(const void *data, size_t len, __u8 out[SHA256_DIGEST_LENGTH])
|
||||||
|
{
|
||||||
|
__u32 state[8] = { 0x6a09e667, 0xbb67ae85, 0x3c6ef372, 0xa54ff53a,
|
||||||
|
0x510e527f, 0x9b05688c, 0x1f83d9ab, 0x5be0cd19 };
|
||||||
|
const __be64 bitcount = cpu_to_be64((__u64)len * 8);
|
||||||
|
__u8 final_data[2 * SHA256_BLOCK_LENGTH] = { 0 };
|
||||||
|
size_t final_len = len % SHA256_BLOCK_LENGTH;
|
||||||
|
int i;
|
||||||
|
|
||||||
|
sha256_blocks(state, data, len / SHA256_BLOCK_LENGTH);
|
||||||
|
|
||||||
|
memcpy(final_data, data + len - final_len, final_len);
|
||||||
|
final_data[final_len] = 0x80;
|
||||||
|
final_len = roundup(final_len + 9, SHA256_BLOCK_LENGTH);
|
||||||
|
memcpy(&final_data[final_len - 8], &bitcount, 8);
|
||||||
|
|
||||||
|
sha256_blocks(state, final_data, final_len / SHA256_BLOCK_LENGTH);
|
||||||
|
|
||||||
|
for (i = 0; i < ARRAY_SIZE(state); i++)
|
||||||
|
put_unaligned_be32(state[i], &out[4 * i]);
|
||||||
|
}
|
||||||
|
|
@ -25,7 +25,6 @@
|
||||||
#include "btf.h"
|
#include "btf.h"
|
||||||
#include "libbpf_internal.h"
|
#include "libbpf_internal.h"
|
||||||
#include "strset.h"
|
#include "strset.h"
|
||||||
#include "str_error.h"
|
|
||||||
|
|
||||||
#define BTF_EXTERN_SEC ".extern"
|
#define BTF_EXTERN_SEC ".extern"
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -64,7 +64,6 @@ enum libbpf_print_level {
|
||||||
#include "libbpf.h"
|
#include "libbpf.h"
|
||||||
#include "bpf.h"
|
#include "bpf.h"
|
||||||
#include "btf.h"
|
#include "btf.h"
|
||||||
#include "str_error.h"
|
|
||||||
#include "libbpf_internal.h"
|
#include "libbpf_internal.h"
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -21,7 +21,6 @@
|
||||||
#include "libbpf.h"
|
#include "libbpf.h"
|
||||||
#include "libbpf_internal.h"
|
#include "libbpf_internal.h"
|
||||||
#include "bpf.h"
|
#include "bpf.h"
|
||||||
#include "str_error.h"
|
|
||||||
|
|
||||||
struct ring {
|
struct ring {
|
||||||
ring_buffer_sample_fn sample_cb;
|
ring_buffer_sample_fn sample_cb;
|
||||||
|
|
|
||||||
|
|
@ -1,104 +0,0 @@
|
||||||
// SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause)
|
|
||||||
#undef _GNU_SOURCE
|
|
||||||
#include <string.h>
|
|
||||||
#include <stdio.h>
|
|
||||||
#include <errno.h>
|
|
||||||
#include "str_error.h"
|
|
||||||
|
|
||||||
#ifndef ENOTSUPP
|
|
||||||
#define ENOTSUPP 524
|
|
||||||
#endif
|
|
||||||
|
|
||||||
/* make sure libbpf doesn't use kernel-only integer typedefs */
|
|
||||||
#pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
|
|
||||||
|
|
||||||
/*
|
|
||||||
* Wrapper to allow for building in non-GNU systems such as Alpine Linux's musl
|
|
||||||
* libc, while checking strerror_r() return to avoid having to check this in
|
|
||||||
* all places calling it.
|
|
||||||
*/
|
|
||||||
char *libbpf_strerror_r(int err, char *dst, int len)
|
|
||||||
{
|
|
||||||
int ret = strerror_r(err < 0 ? -err : err, dst, len);
|
|
||||||
/* on glibc <2.13, ret == -1 and errno is set, if strerror_r() can't
|
|
||||||
* handle the error, on glibc >=2.13 *positive* (errno-like) error
|
|
||||||
* code is returned directly
|
|
||||||
*/
|
|
||||||
if (ret == -1)
|
|
||||||
ret = errno;
|
|
||||||
if (ret) {
|
|
||||||
if (ret == EINVAL)
|
|
||||||
/* strerror_r() doesn't recognize this specific error */
|
|
||||||
snprintf(dst, len, "unknown error (%d)", err < 0 ? err : -err);
|
|
||||||
else
|
|
||||||
snprintf(dst, len, "ERROR: strerror_r(%d)=%d", err, ret);
|
|
||||||
}
|
|
||||||
return dst;
|
|
||||||
}
|
|
||||||
|
|
||||||
const char *libbpf_errstr(int err)
|
|
||||||
{
|
|
||||||
static __thread char buf[12];
|
|
||||||
|
|
||||||
if (err > 0)
|
|
||||||
err = -err;
|
|
||||||
|
|
||||||
switch (err) {
|
|
||||||
case -E2BIG: return "-E2BIG";
|
|
||||||
case -EACCES: return "-EACCES";
|
|
||||||
case -EADDRINUSE: return "-EADDRINUSE";
|
|
||||||
case -EADDRNOTAVAIL: return "-EADDRNOTAVAIL";
|
|
||||||
case -EAGAIN: return "-EAGAIN";
|
|
||||||
case -EALREADY: return "-EALREADY";
|
|
||||||
case -EBADF: return "-EBADF";
|
|
||||||
case -EBADFD: return "-EBADFD";
|
|
||||||
case -EBUSY: return "-EBUSY";
|
|
||||||
case -ECANCELED: return "-ECANCELED";
|
|
||||||
case -ECHILD: return "-ECHILD";
|
|
||||||
case -EDEADLK: return "-EDEADLK";
|
|
||||||
case -EDOM: return "-EDOM";
|
|
||||||
case -EEXIST: return "-EEXIST";
|
|
||||||
case -EFAULT: return "-EFAULT";
|
|
||||||
case -EFBIG: return "-EFBIG";
|
|
||||||
case -EILSEQ: return "-EILSEQ";
|
|
||||||
case -EINPROGRESS: return "-EINPROGRESS";
|
|
||||||
case -EINTR: return "-EINTR";
|
|
||||||
case -EINVAL: return "-EINVAL";
|
|
||||||
case -EIO: return "-EIO";
|
|
||||||
case -EISDIR: return "-EISDIR";
|
|
||||||
case -ELOOP: return "-ELOOP";
|
|
||||||
case -EMFILE: return "-EMFILE";
|
|
||||||
case -EMLINK: return "-EMLINK";
|
|
||||||
case -EMSGSIZE: return "-EMSGSIZE";
|
|
||||||
case -ENAMETOOLONG: return "-ENAMETOOLONG";
|
|
||||||
case -ENFILE: return "-ENFILE";
|
|
||||||
case -ENODATA: return "-ENODATA";
|
|
||||||
case -ENODEV: return "-ENODEV";
|
|
||||||
case -ENOENT: return "-ENOENT";
|
|
||||||
case -ENOEXEC: return "-ENOEXEC";
|
|
||||||
case -ENOLINK: return "-ENOLINK";
|
|
||||||
case -ENOMEM: return "-ENOMEM";
|
|
||||||
case -ENOSPC: return "-ENOSPC";
|
|
||||||
case -ENOTBLK: return "-ENOTBLK";
|
|
||||||
case -ENOTDIR: return "-ENOTDIR";
|
|
||||||
case -ENOTSUPP: return "-ENOTSUPP";
|
|
||||||
case -ENOTTY: return "-ENOTTY";
|
|
||||||
case -ENXIO: return "-ENXIO";
|
|
||||||
case -EOPNOTSUPP: return "-EOPNOTSUPP";
|
|
||||||
case -EOVERFLOW: return "-EOVERFLOW";
|
|
||||||
case -EPERM: return "-EPERM";
|
|
||||||
case -EPIPE: return "-EPIPE";
|
|
||||||
case -EPROTO: return "-EPROTO";
|
|
||||||
case -EPROTONOSUPPORT: return "-EPROTONOSUPPORT";
|
|
||||||
case -ERANGE: return "-ERANGE";
|
|
||||||
case -EROFS: return "-EROFS";
|
|
||||||
case -ESPIPE: return "-ESPIPE";
|
|
||||||
case -ESRCH: return "-ESRCH";
|
|
||||||
case -ETXTBSY: return "-ETXTBSY";
|
|
||||||
case -EUCLEAN: return "-EUCLEAN";
|
|
||||||
case -EXDEV: return "-EXDEV";
|
|
||||||
default:
|
|
||||||
snprintf(buf, sizeof(buf), "%d", err);
|
|
||||||
return buf;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
@ -1,19 +0,0 @@
|
||||||
/* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */
|
|
||||||
#ifndef __LIBBPF_STR_ERROR_H
|
|
||||||
#define __LIBBPF_STR_ERROR_H
|
|
||||||
|
|
||||||
#define STRERR_BUFSIZE 128
|
|
||||||
|
|
||||||
char *libbpf_strerror_r(int err, char *dst, int len);
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @brief **libbpf_errstr()** returns string corresponding to numeric errno
|
|
||||||
* @param err negative numeric errno
|
|
||||||
* @return pointer to string representation of the errno, that is invalidated
|
|
||||||
* upon the next call.
|
|
||||||
*/
|
|
||||||
const char *libbpf_errstr(int err);
|
|
||||||
|
|
||||||
#define errstr(err) libbpf_errstr(err)
|
|
||||||
|
|
||||||
#endif /* __LIBBPF_STR_ERROR_H */
|
|
||||||
|
|
@ -20,7 +20,6 @@
|
||||||
#include "libbpf_common.h"
|
#include "libbpf_common.h"
|
||||||
#include "libbpf_internal.h"
|
#include "libbpf_internal.h"
|
||||||
#include "hashmap.h"
|
#include "hashmap.h"
|
||||||
#include "str_error.h"
|
|
||||||
|
|
||||||
/* libbpf's USDT support consists of BPF-side state/code and user-space
|
/* libbpf's USDT support consists of BPF-side state/code and user-space
|
||||||
* state/code working together in concert. BPF-side parts are defined in
|
* state/code working together in concert. BPF-side parts are defined in
|
||||||
|
|
|
||||||
|
|
@ -0,0 +1,52 @@
|
||||||
|
// SPDX-License-Identifier: GPL-2.0-only
|
||||||
|
/* Copyright 2025 Google LLC */
|
||||||
|
|
||||||
|
#include <test_progs.h>
|
||||||
|
#include "bpf/libbpf_internal.h"
|
||||||
|
|
||||||
|
#define MAX_LEN 4096
|
||||||
|
|
||||||
|
/* Test libbpf_sha256() for all lengths from 0 to MAX_LEN inclusively. */
|
||||||
|
void test_sha256(void)
|
||||||
|
{
|
||||||
|
/*
|
||||||
|
* The correctness of this value was verified by running this test with
|
||||||
|
* libbpf_sha256() replaced by OpenSSL's SHA256().
|
||||||
|
*/
|
||||||
|
static const __u8 expected_digest_of_digests[SHA256_DIGEST_LENGTH] = {
|
||||||
|
0x62, 0x30, 0x0e, 0x1d, 0xea, 0x7f, 0xc4, 0x74,
|
||||||
|
0xfd, 0x8e, 0x64, 0x0b, 0xd8, 0x5f, 0xea, 0x04,
|
||||||
|
0xf3, 0xef, 0x77, 0x42, 0xc2, 0x01, 0xb8, 0x90,
|
||||||
|
0x6e, 0x19, 0x91, 0x1b, 0xca, 0xb3, 0x28, 0x42,
|
||||||
|
};
|
||||||
|
__u64 seed = 0;
|
||||||
|
__u8 *data = NULL, *digests = NULL;
|
||||||
|
__u8 digest_of_digests[SHA256_DIGEST_LENGTH];
|
||||||
|
size_t i;
|
||||||
|
|
||||||
|
data = malloc(MAX_LEN);
|
||||||
|
if (!ASSERT_OK_PTR(data, "malloc"))
|
||||||
|
goto out;
|
||||||
|
digests = malloc((MAX_LEN + 1) * SHA256_DIGEST_LENGTH);
|
||||||
|
if (!ASSERT_OK_PTR(digests, "malloc"))
|
||||||
|
goto out;
|
||||||
|
|
||||||
|
/* Generate MAX_LEN bytes of "random" data deterministically. */
|
||||||
|
for (i = 0; i < MAX_LEN; i++) {
|
||||||
|
seed = (seed * 25214903917 + 11) & ((1ULL << 48) - 1);
|
||||||
|
data[i] = (__u8)(seed >> 16);
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Calculate a digest for each length 0 through MAX_LEN inclusively. */
|
||||||
|
for (i = 0; i <= MAX_LEN; i++)
|
||||||
|
libbpf_sha256(data, i, &digests[i * SHA256_DIGEST_LENGTH]);
|
||||||
|
|
||||||
|
/* Calculate and verify the digest of all the digests. */
|
||||||
|
libbpf_sha256(digests, (MAX_LEN + 1) * SHA256_DIGEST_LENGTH,
|
||||||
|
digest_of_digests);
|
||||||
|
ASSERT_MEMEQ(digest_of_digests, expected_digest_of_digests,
|
||||||
|
SHA256_DIGEST_LENGTH, "digest_of_digests");
|
||||||
|
out:
|
||||||
|
free(data);
|
||||||
|
free(digests);
|
||||||
|
}
|
||||||
|
|
@ -661,7 +661,7 @@ static void *worker_trigger(void *arg)
|
||||||
rounds++;
|
rounds++;
|
||||||
}
|
}
|
||||||
|
|
||||||
printf("tid %d trigger rounds: %lu\n", gettid(), rounds);
|
printf("tid %ld trigger rounds: %lu\n", sys_gettid(), rounds);
|
||||||
return NULL;
|
return NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
@ -704,7 +704,7 @@ static void *worker_attach(void *arg)
|
||||||
rounds++;
|
rounds++;
|
||||||
}
|
}
|
||||||
|
|
||||||
printf("tid %d attach rounds: %lu hits: %d\n", gettid(), rounds, skel->bss->executed);
|
printf("tid %ld attach rounds: %lu hits: %d\n", sys_gettid(), rounds, skel->bss->executed);
|
||||||
uprobe_syscall_executed__destroy(skel);
|
uprobe_syscall_executed__destroy(skel);
|
||||||
free(ref);
|
free(ref);
|
||||||
return NULL;
|
return NULL;
|
||||||
|
|
|
||||||
|
|
@ -142,7 +142,7 @@ static void subtest_basic_usdt(bool optimized)
|
||||||
goto cleanup;
|
goto cleanup;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
alled = TRIGGER(1);
|
called = TRIGGER(1);
|
||||||
|
|
||||||
ASSERT_EQ(bss->usdt0_called, called, "usdt0_called");
|
ASSERT_EQ(bss->usdt0_called, called, "usdt0_called");
|
||||||
ASSERT_EQ(bss->usdt3_called, called, "usdt3_called");
|
ASSERT_EQ(bss->usdt3_called, called, "usdt3_called");
|
||||||
|
|
|
||||||
|
|
@ -3,6 +3,7 @@
|
||||||
|
|
||||||
#include <linux/bpf.h>
|
#include <linux/bpf.h>
|
||||||
#include <bpf/bpf_helpers.h>
|
#include <bpf/bpf_helpers.h>
|
||||||
|
#include "../../../include/linux/filter.h"
|
||||||
#include "bpf_misc.h"
|
#include "bpf_misc.h"
|
||||||
|
|
||||||
#define MAX_ENTRIES 11
|
#define MAX_ENTRIES 11
|
||||||
|
|
@ -146,6 +147,24 @@ l0_%=: exit; \
|
||||||
: __clobber_all);
|
: __clobber_all);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
SEC("socket")
|
||||||
|
__description("map_ptr illegal alu op, map_ptr = -map_ptr")
|
||||||
|
__failure __msg("R0 invalid mem access 'scalar'")
|
||||||
|
__failure_unpriv __msg_unpriv("R0 pointer arithmetic prohibited")
|
||||||
|
__flag(BPF_F_ANY_ALIGNMENT)
|
||||||
|
__naked void map_ptr_illegal_alu_op(void)
|
||||||
|
{
|
||||||
|
asm volatile (" \
|
||||||
|
r0 = %[map_hash_48b] ll; \
|
||||||
|
r0 = -r0; \
|
||||||
|
r1 = 22; \
|
||||||
|
*(u64*)(r0 + 0) = r1; \
|
||||||
|
exit; \
|
||||||
|
" :
|
||||||
|
: __imm_addr(map_hash_48b)
|
||||||
|
: __clobber_all);
|
||||||
|
}
|
||||||
|
|
||||||
SEC("flow_dissector")
|
SEC("flow_dissector")
|
||||||
__description("flow_keys illegal alu op with variable offset")
|
__description("flow_keys illegal alu op with variable offset")
|
||||||
__failure __msg("R7 pointer arithmetic on flow_keys prohibited")
|
__failure __msg("R7 pointer arithmetic on flow_keys prohibited")
|
||||||
|
|
@ -165,4 +184,32 @@ __naked void flow_keys_illegal_variable_offset_alu(void)
|
||||||
: __clobber_all);
|
: __clobber_all);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
#define DEFINE_BAD_OFFSET_TEST(name, op, off, imm) \
|
||||||
|
SEC("socket") \
|
||||||
|
__failure __msg("BPF_ALU uses reserved fields") \
|
||||||
|
__naked void name(void) \
|
||||||
|
{ \
|
||||||
|
asm volatile( \
|
||||||
|
"r0 = 1;" \
|
||||||
|
".8byte %[insn];" \
|
||||||
|
"r0 = 0;" \
|
||||||
|
"exit;" \
|
||||||
|
: \
|
||||||
|
: __imm_insn(insn, BPF_RAW_INSN((op), 0, 0, (off), (imm))) \
|
||||||
|
: __clobber_all); \
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Offset fields of 0 and 1 are legal for BPF_{DIV,MOD} instructions.
|
||||||
|
* Offset fields of 0 are legal for the rest of ALU instructions.
|
||||||
|
* Test that error is reported for illegal offsets, assuming that tests
|
||||||
|
* for legal offsets exist.
|
||||||
|
*/
|
||||||
|
DEFINE_BAD_OFFSET_TEST(bad_offset_divx, BPF_ALU64 | BPF_DIV | BPF_X, -1, 0)
|
||||||
|
DEFINE_BAD_OFFSET_TEST(bad_offset_modk, BPF_ALU64 | BPF_MOD | BPF_K, -1, 1)
|
||||||
|
DEFINE_BAD_OFFSET_TEST(bad_offset_addx, BPF_ALU64 | BPF_ADD | BPF_X, -1, 0)
|
||||||
|
DEFINE_BAD_OFFSET_TEST(bad_offset_divx2, BPF_ALU64 | BPF_DIV | BPF_X, 2, 0)
|
||||||
|
DEFINE_BAD_OFFSET_TEST(bad_offset_modk2, BPF_ALU64 | BPF_MOD | BPF_K, 2, 1)
|
||||||
|
DEFINE_BAD_OFFSET_TEST(bad_offset_addx2, BPF_ALU64 | BPF_ADD | BPF_X, 1, 0)
|
||||||
|
|
||||||
char _license[] SEC("license") = "GPL";
|
char _license[] SEC("license") = "GPL";
|
||||||
|
|
|
||||||
|
|
@ -732,7 +732,7 @@ int bpf_get_addrs(unsigned long **addrsp, size_t *cntp, bool kernel)
|
||||||
|
|
||||||
if (cnt == max_cnt) {
|
if (cnt == max_cnt) {
|
||||||
max_cnt += inc_cnt;
|
max_cnt += inc_cnt;
|
||||||
tmp_addrs = realloc(addrs, max_cnt);
|
tmp_addrs = realloc(addrs, max_cnt * sizeof(long));
|
||||||
if (!tmp_addrs) {
|
if (!tmp_addrs) {
|
||||||
err = -ENOMEM;
|
err = -ENOMEM;
|
||||||
goto error;
|
goto error;
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue