[PATCH 2/2] bpf: support new fields for BPF_PROG_LOAD
Paul Chaignon
paul.chaignon at gmail.com
Mon Dec 9 17:19:45 UTC 2019
* bpf_attr.h (BPF_PROG_LOAD_struct): New fields introduced in Linux
commits v5.5-rc1~174^2~310^2~19^2~7 and v5.5-rc1~174^2~49^2~12^2~3.
* bpf.c (BEGIN_BPF_CMD_DECODER(BPF_PROG_LOAD)): Decode the new fields.
* tests/bpf.c (BPF_PROG_LOAD_checks): Update expected outputs.
* tests/bpf-obj_get_info_by_fd.c (print_prog_load): Likewise.
* tests/kernel_version.c (print_bpf_attr): Likewise.
Signed-off-by: Paul Chaignon <paul.chaignon at gmail.com>
---
bpf.c | 10 ++++++++++
bpf_attr.h | 6 ++++--
tests/bpf-obj_get_info_by_fd.c | 4 ++++
tests/bpf.c | 14 +++++++++-----
tests/kernel_version.c | 4 +++-
5 files changed, 30 insertions(+), 8 deletions(-)
diff --git a/bpf.c b/bpf.c
index 9b6fb488..b42cf29d 100644
--- a/bpf.c
+++ b/bpf.c
@@ -343,6 +343,16 @@ BEGIN_BPF_CMD_DECODER(BPF_PROG_LOAD)
PRINT_FIELD_U(", ", attr, line_info_rec_size);
PRINT_FIELD_ADDR64(", ", attr, line_info);
PRINT_FIELD_U(", ", attr, line_info_cnt);
+
+ /* attach_btf_id was added in Linux commit v5.5-rc1~174^2~310^2~19^2~7 */
+ if (len <= offsetof(struct BPF_PROG_LOAD_struct, attach_btf_id))
+ break;
+ PRINT_FIELD_U(", ", attr, attach_btf_id);
+
+ /* attach_prog_fd was added in Linux commit v5.5-rc1~174^2~49^2~12^2~3 */
+ if (len <= offsetof(struct BPF_PROG_LOAD_struct, attach_prog_fd))
+ break;
+ PRINT_FIELD_FD(", ", attr, attach_prog_fd, tcp);
}
END_BPF_CMD_DECODER(RVAL_DECODED | RVAL_FD)
diff --git a/bpf_attr.h b/bpf_attr.h
index 6695a2fe..33dd54af 100644
--- a/bpf_attr.h
+++ b/bpf_attr.h
@@ -124,11 +124,13 @@ struct BPF_PROG_LOAD_struct {
uint32_t line_info_rec_size;
uint64_t ATTRIBUTE_ALIGNED(8) line_info;
uint32_t line_info_cnt;
+ uint32_t attach_btf_id;
+ uint32_t attach_prog_fd;
};
# define BPF_PROG_LOAD_struct_size \
- offsetofend(struct BPF_PROG_LOAD_struct, line_info_cnt)
-# define expected_BPF_PROG_LOAD_struct_size 108
+ offsetofend(struct BPF_PROG_LOAD_struct, attach_prog_fd)
+# define expected_BPF_PROG_LOAD_struct_size 116
struct BPF_OBJ_PIN_struct {
uint64_t ATTRIBUTE_ALIGNED(8) pathname;
diff --git a/tests/bpf-obj_get_info_by_fd.c b/tests/bpf-obj_get_info_by_fd.c
index 3bfa6402..c486d77f 100644
--- a/tests/bpf-obj_get_info_by_fd.c
+++ b/tests/bpf-obj_get_info_by_fd.c
@@ -205,6 +205,10 @@ print_prog_load(void *attr_void, size_t size, long rc)
printf(", line_info=NULL");
if (size > offsetof(struct BPF_PROG_LOAD_struct, line_info_cnt))
printf(", line_info_cnt=0");
+ if (size > offsetof(struct BPF_PROG_LOAD_struct, attach_btf_id))
+ printf(", attach_btf_id=0");
+ if (size > offsetof(struct BPF_PROG_LOAD_struct, attach_prog_fd))
+ printf(", attach_prog_fd=0</dev/null>");
printf("}, %zu) = ", size);
if (rc >= 0)
printf("%ld<anon_inode:bpf-prog>\n", rc);
diff --git a/tests/bpf.c b/tests/bpf.c
index 5cf79531..24b70339 100644
--- a/tests/bpf.c
+++ b/tests/bpf.c
@@ -606,7 +606,7 @@ print_BPF_PROG_LOAD_attr4(const struct bpf_attr_check *check, unsigned long addr
license, IFINDEX_LO_STR);
}
-static_assert(ARRAY_SIZE(bpf_prog_types_xdata) == 26,
+static_assert(ARRAY_SIZE(bpf_prog_types_xdata) == 27,
"The prog_type for test 5 below needs to be updated");
static struct bpf_attr_check BPF_PROG_LOAD_checks[] = {
{
@@ -691,7 +691,7 @@ static struct bpf_attr_check BPF_PROG_LOAD_checks[] = {
},
{ /* 5 */
.data = { .BPF_PROG_LOAD_data = {
- .prog_type = 25,
+ .prog_type = 26,
.insn_cnt = 0xbadc0ded,
.insns = 0xffffffff00000000,
.license = 0xffffffff00000000,
@@ -703,7 +703,7 @@ static struct bpf_attr_check BPF_PROG_LOAD_checks[] = {
.prog_name = "fedcba987654321",
} },
.size = offsetofend(struct BPF_PROG_LOAD_struct, prog_name),
- .str = "prog_type=BPF_PROG_TYPE_CGROUP_SOCKOPT"
+ .str = "prog_type=BPF_PROG_TYPE_TRACING"
", insn_cnt=3134983661"
", insns=" BIG_ADDR("0xffffffff00000000", "NULL")
", license=" BIG_ADDR("0xffffffff00000000", "NULL")
@@ -723,10 +723,12 @@ static struct bpf_attr_check BPF_PROG_LOAD_checks[] = {
.func_info_cnt = 0xdad3bef4,
.line_info_rec_size = 0xdad5bef6,
.line_info = 0xfac5fed5fac7fed8,
- .line_info_cnt = 0xdad7bef8
+ .line_info_cnt = 0xdad7bef8,
+ .attach_btf_id = 0xdad7befa,
+ .attach_prog_fd = 0xbadc0def,
} },
.size = offsetofend(struct BPF_PROG_LOAD_struct,
- line_info_cnt),
+ attach_prog_fd),
.str = "prog_type=BPF_PROG_TYPE_UNSPEC"
", insn_cnt=0"
", insns=NULL"
@@ -746,6 +748,8 @@ static struct bpf_attr_check BPF_PROG_LOAD_checks[] = {
", line_info_rec_size=3671441142"
", line_info=0xfac5fed5fac7fed8"
", line_info_cnt=3671572216"
+ ", attach_btf_id=3671572218"
+ ", attach_prog_fd=-1159983633"
},
};
diff --git a/tests/kernel_version.c b/tests/kernel_version.c
index 009f9fd5..a667b584 100644
--- a/tests/kernel_version.c
+++ b/tests/kernel_version.c
@@ -69,7 +69,9 @@ print_bpf_attr(void)
", func_info_cnt=0"
", line_info_rec_size=0"
", line_info=NULL"
- ", line_info_cnt=0}");
+ ", line_info_cnt=0"
+ ", attach_btf_id=0"
+ ", attach_prog_fd=0}");
}
int
--
2.17.1
More information about the Strace-devel
mailing list