mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-12-04 09:34:12 +08:00
d71fa5c976
Add kernel module with user mode driver that populates bpffs with BPF iterators. $ mount bpffs /my/bpffs/ -t bpf $ ls -la /my/bpffs/ total 4 drwxrwxrwt 2 root root 0 Jul 2 00:27 . drwxr-xr-x 19 root root 4096 Jul 2 00:09 .. -rw------- 1 root root 0 Jul 2 00:27 maps.debug -rw------- 1 root root 0 Jul 2 00:27 progs.debug The user mode driver will load BPF Type Formats, create BPF maps, populate BPF maps, load two BPF programs, attach them to BPF iterators, and finally send two bpf_link IDs back to the kernel. The kernel will pin two bpf_links into newly mounted bpffs instance under names "progs.debug" and "maps.debug". These two files become human readable. $ cat /my/bpffs/progs.debug id name attached 11 dump_bpf_map bpf_iter_bpf_map 12 dump_bpf_prog bpf_iter_bpf_prog 27 test_pkt_access 32 test_main test_pkt_access test_pkt_access 33 test_subprog1 test_pkt_access_subprog1 test_pkt_access 34 test_subprog2 test_pkt_access_subprog2 test_pkt_access 35 test_subprog3 test_pkt_access_subprog3 test_pkt_access 36 new_get_skb_len get_skb_len test_pkt_access 37 new_get_skb_ifindex get_skb_ifindex test_pkt_access 38 new_get_constant get_constant test_pkt_access The BPF program dump_bpf_prog() in iterators.bpf.c is printing this data about all BPF programs currently loaded in the system. This information is unstable and will change from kernel to kernel as ".debug" suffix conveys. Signed-off-by: Alexei Starovoitov <ast@kernel.org> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net> Link: https://lore.kernel.org/bpf/20200819042759.51280-4-alexei.starovoitov@gmail.com
92 lines
2.0 KiB
C
92 lines
2.0 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
|
|
#include <linux/init.h>
|
|
#include <linux/module.h>
|
|
#include <linux/pid.h>
|
|
#include <linux/fs.h>
|
|
#include <linux/sched/signal.h>
|
|
#include "bpf_preload.h"
|
|
|
|
extern char bpf_preload_umd_start;
|
|
extern char bpf_preload_umd_end;
|
|
|
|
static int preload(struct bpf_preload_info *obj);
|
|
static int finish(void);
|
|
|
|
static struct bpf_preload_ops umd_ops = {
|
|
.info.driver_name = "bpf_preload",
|
|
.preload = preload,
|
|
.finish = finish,
|
|
.owner = THIS_MODULE,
|
|
};
|
|
|
|
static int preload(struct bpf_preload_info *obj)
|
|
{
|
|
int magic = BPF_PRELOAD_START;
|
|
loff_t pos = 0;
|
|
int i, err;
|
|
ssize_t n;
|
|
|
|
err = fork_usermode_driver(&umd_ops.info);
|
|
if (err)
|
|
return err;
|
|
|
|
/* send the start magic to let UMD proceed with loading BPF progs */
|
|
n = kernel_write(umd_ops.info.pipe_to_umh,
|
|
&magic, sizeof(magic), &pos);
|
|
if (n != sizeof(magic))
|
|
return -EPIPE;
|
|
|
|
/* receive bpf_link IDs and names from UMD */
|
|
pos = 0;
|
|
for (i = 0; i < BPF_PRELOAD_LINKS; i++) {
|
|
n = kernel_read(umd_ops.info.pipe_from_umh,
|
|
&obj[i], sizeof(*obj), &pos);
|
|
if (n != sizeof(*obj))
|
|
return -EPIPE;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static int finish(void)
|
|
{
|
|
int magic = BPF_PRELOAD_END;
|
|
struct pid *tgid;
|
|
loff_t pos = 0;
|
|
ssize_t n;
|
|
|
|
/* send the last magic to UMD. It will do a normal exit. */
|
|
n = kernel_write(umd_ops.info.pipe_to_umh,
|
|
&magic, sizeof(magic), &pos);
|
|
if (n != sizeof(magic))
|
|
return -EPIPE;
|
|
tgid = umd_ops.info.tgid;
|
|
wait_event(tgid->wait_pidfd, thread_group_exited(tgid));
|
|
umd_ops.info.tgid = NULL;
|
|
return 0;
|
|
}
|
|
|
|
static int __init load_umd(void)
|
|
{
|
|
int err;
|
|
|
|
err = umd_load_blob(&umd_ops.info, &bpf_preload_umd_start,
|
|
&bpf_preload_umd_end - &bpf_preload_umd_start);
|
|
if (err)
|
|
return err;
|
|
bpf_preload_ops = &umd_ops;
|
|
return err;
|
|
}
|
|
|
|
static void __exit fini_umd(void)
|
|
{
|
|
bpf_preload_ops = NULL;
|
|
/* kill UMD in case it's still there due to earlier error */
|
|
kill_pid(umd_ops.info.tgid, SIGKILL, 1);
|
|
umd_ops.info.tgid = NULL;
|
|
umd_unload_blob(&umd_ops.info);
|
|
}
|
|
late_initcall(load_umd);
|
|
module_exit(fini_umd);
|
|
MODULE_LICENSE("GPL");
|