bpf-loader.c 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874
  1. /*
  2. * bpf-loader.c
  3. *
  4. * Copyright (C) 2015 Wang Nan <wangnan0@huawei.com>
  5. * Copyright (C) 2015 Huawei Inc.
  6. */
  7. #include <linux/bpf.h>
  8. #include <bpf/libbpf.h>
  9. #include <linux/err.h>
  10. #include <linux/string.h>
  11. #include "perf.h"
  12. #include "debug.h"
  13. #include "bpf-loader.h"
  14. #include "bpf-prologue.h"
  15. #include "llvm-utils.h"
  16. #include "probe-event.h"
  17. #include "probe-finder.h" // for MAX_PROBES
  18. #include "llvm-utils.h"
  19. #define DEFINE_PRINT_FN(name, level) \
  20. static int libbpf_##name(const char *fmt, ...) \
  21. { \
  22. va_list args; \
  23. int ret; \
  24. \
  25. va_start(args, fmt); \
  26. ret = veprintf(level, verbose, pr_fmt(fmt), args);\
  27. va_end(args); \
  28. return ret; \
  29. }
  30. DEFINE_PRINT_FN(warning, 1)
  31. DEFINE_PRINT_FN(info, 1)
  32. DEFINE_PRINT_FN(debug, 1)
  33. struct bpf_prog_priv {
  34. struct perf_probe_event pev;
  35. bool need_prologue;
  36. struct bpf_insn *insns_buf;
  37. int nr_types;
  38. int *type_mapping;
  39. };
  40. static bool libbpf_initialized;
  41. struct bpf_object *
  42. bpf__prepare_load_buffer(void *obj_buf, size_t obj_buf_sz, const char *name)
  43. {
  44. struct bpf_object *obj;
  45. if (!libbpf_initialized) {
  46. libbpf_set_print(libbpf_warning,
  47. libbpf_info,
  48. libbpf_debug);
  49. libbpf_initialized = true;
  50. }
  51. obj = bpf_object__open_buffer(obj_buf, obj_buf_sz, name);
  52. if (IS_ERR(obj)) {
  53. pr_debug("bpf: failed to load buffer\n");
  54. return ERR_PTR(-EINVAL);
  55. }
  56. return obj;
  57. }
  58. struct bpf_object *bpf__prepare_load(const char *filename, bool source)
  59. {
  60. struct bpf_object *obj;
  61. if (!libbpf_initialized) {
  62. libbpf_set_print(libbpf_warning,
  63. libbpf_info,
  64. libbpf_debug);
  65. libbpf_initialized = true;
  66. }
  67. if (source) {
  68. int err;
  69. void *obj_buf;
  70. size_t obj_buf_sz;
  71. err = llvm__compile_bpf(filename, &obj_buf, &obj_buf_sz);
  72. if (err)
  73. return ERR_PTR(-BPF_LOADER_ERRNO__COMPILE);
  74. obj = bpf_object__open_buffer(obj_buf, obj_buf_sz, filename);
  75. free(obj_buf);
  76. } else
  77. obj = bpf_object__open(filename);
  78. if (IS_ERR(obj)) {
  79. pr_debug("bpf: failed to load %s\n", filename);
  80. return obj;
  81. }
  82. return obj;
  83. }
  84. void bpf__clear(void)
  85. {
  86. struct bpf_object *obj, *tmp;
  87. bpf_object__for_each_safe(obj, tmp) {
  88. bpf__unprobe(obj);
  89. bpf_object__close(obj);
  90. }
  91. }
  92. static void
  93. bpf_prog_priv__clear(struct bpf_program *prog __maybe_unused,
  94. void *_priv)
  95. {
  96. struct bpf_prog_priv *priv = _priv;
  97. cleanup_perf_probe_events(&priv->pev, 1);
  98. zfree(&priv->insns_buf);
  99. zfree(&priv->type_mapping);
  100. free(priv);
  101. }
  102. static int
  103. prog_config__exec(const char *value, struct perf_probe_event *pev)
  104. {
  105. pev->uprobes = true;
  106. pev->target = strdup(value);
  107. if (!pev->target)
  108. return -ENOMEM;
  109. return 0;
  110. }
  111. static int
  112. prog_config__module(const char *value, struct perf_probe_event *pev)
  113. {
  114. pev->uprobes = false;
  115. pev->target = strdup(value);
  116. if (!pev->target)
  117. return -ENOMEM;
  118. return 0;
  119. }
  120. static int
  121. prog_config__bool(const char *value, bool *pbool, bool invert)
  122. {
  123. int err;
  124. bool bool_value;
  125. if (!pbool)
  126. return -EINVAL;
  127. err = strtobool(value, &bool_value);
  128. if (err)
  129. return err;
  130. *pbool = invert ? !bool_value : bool_value;
  131. return 0;
  132. }
  133. static int
  134. prog_config__inlines(const char *value,
  135. struct perf_probe_event *pev __maybe_unused)
  136. {
  137. return prog_config__bool(value, &probe_conf.no_inlines, true);
  138. }
  139. static int
  140. prog_config__force(const char *value,
  141. struct perf_probe_event *pev __maybe_unused)
  142. {
  143. return prog_config__bool(value, &probe_conf.force_add, false);
  144. }
  145. static struct {
  146. const char *key;
  147. const char *usage;
  148. const char *desc;
  149. int (*func)(const char *, struct perf_probe_event *);
  150. } bpf_prog_config_terms[] = {
  151. {
  152. .key = "exec",
  153. .usage = "exec=<full path of file>",
  154. .desc = "Set uprobe target",
  155. .func = prog_config__exec,
  156. },
  157. {
  158. .key = "module",
  159. .usage = "module=<module name> ",
  160. .desc = "Set kprobe module",
  161. .func = prog_config__module,
  162. },
  163. {
  164. .key = "inlines",
  165. .usage = "inlines=[yes|no] ",
  166. .desc = "Probe at inline symbol",
  167. .func = prog_config__inlines,
  168. },
  169. {
  170. .key = "force",
  171. .usage = "force=[yes|no] ",
  172. .desc = "Forcibly add events with existing name",
  173. .func = prog_config__force,
  174. },
  175. };
  176. static int
  177. do_prog_config(const char *key, const char *value,
  178. struct perf_probe_event *pev)
  179. {
  180. unsigned int i;
  181. pr_debug("config bpf program: %s=%s\n", key, value);
  182. for (i = 0; i < ARRAY_SIZE(bpf_prog_config_terms); i++)
  183. if (strcmp(key, bpf_prog_config_terms[i].key) == 0)
  184. return bpf_prog_config_terms[i].func(value, pev);
  185. pr_debug("BPF: ERROR: invalid program config option: %s=%s\n",
  186. key, value);
  187. pr_debug("\nHint: Valid options are:\n");
  188. for (i = 0; i < ARRAY_SIZE(bpf_prog_config_terms); i++)
  189. pr_debug("\t%s:\t%s\n", bpf_prog_config_terms[i].usage,
  190. bpf_prog_config_terms[i].desc);
  191. pr_debug("\n");
  192. return -BPF_LOADER_ERRNO__PROGCONF_TERM;
  193. }
  194. static const char *
  195. parse_prog_config_kvpair(const char *config_str, struct perf_probe_event *pev)
  196. {
  197. char *text = strdup(config_str);
  198. char *sep, *line;
  199. const char *main_str = NULL;
  200. int err = 0;
  201. if (!text) {
  202. pr_debug("No enough memory: dup config_str failed\n");
  203. return ERR_PTR(-ENOMEM);
  204. }
  205. line = text;
  206. while ((sep = strchr(line, ';'))) {
  207. char *equ;
  208. *sep = '\0';
  209. equ = strchr(line, '=');
  210. if (!equ) {
  211. pr_warning("WARNING: invalid config in BPF object: %s\n",
  212. line);
  213. pr_warning("\tShould be 'key=value'.\n");
  214. goto nextline;
  215. }
  216. *equ = '\0';
  217. err = do_prog_config(line, equ + 1, pev);
  218. if (err)
  219. break;
  220. nextline:
  221. line = sep + 1;
  222. }
  223. if (!err)
  224. main_str = config_str + (line - text);
  225. free(text);
  226. return err ? ERR_PTR(err) : main_str;
  227. }
  228. static int
  229. parse_prog_config(const char *config_str, struct perf_probe_event *pev)
  230. {
  231. int err;
  232. const char *main_str = parse_prog_config_kvpair(config_str, pev);
  233. if (IS_ERR(main_str))
  234. return PTR_ERR(main_str);
  235. err = parse_perf_probe_command(main_str, pev);
  236. if (err < 0) {
  237. pr_debug("bpf: '%s' is not a valid config string\n",
  238. config_str);
  239. /* parse failed, don't need clear pev. */
  240. return -BPF_LOADER_ERRNO__CONFIG;
  241. }
  242. return 0;
  243. }
  244. static int
  245. config_bpf_program(struct bpf_program *prog)
  246. {
  247. struct perf_probe_event *pev = NULL;
  248. struct bpf_prog_priv *priv = NULL;
  249. const char *config_str;
  250. int err;
  251. /* Initialize per-program probing setting */
  252. probe_conf.no_inlines = false;
  253. probe_conf.force_add = false;
  254. config_str = bpf_program__title(prog, false);
  255. if (IS_ERR(config_str)) {
  256. pr_debug("bpf: unable to get title for program\n");
  257. return PTR_ERR(config_str);
  258. }
  259. priv = calloc(sizeof(*priv), 1);
  260. if (!priv) {
  261. pr_debug("bpf: failed to alloc priv\n");
  262. return -ENOMEM;
  263. }
  264. pev = &priv->pev;
  265. pr_debug("bpf: config program '%s'\n", config_str);
  266. err = parse_prog_config(config_str, pev);
  267. if (err)
  268. goto errout;
  269. if (pev->group && strcmp(pev->group, PERF_BPF_PROBE_GROUP)) {
  270. pr_debug("bpf: '%s': group for event is set and not '%s'.\n",
  271. config_str, PERF_BPF_PROBE_GROUP);
  272. err = -BPF_LOADER_ERRNO__GROUP;
  273. goto errout;
  274. } else if (!pev->group)
  275. pev->group = strdup(PERF_BPF_PROBE_GROUP);
  276. if (!pev->group) {
  277. pr_debug("bpf: strdup failed\n");
  278. err = -ENOMEM;
  279. goto errout;
  280. }
  281. if (!pev->event) {
  282. pr_debug("bpf: '%s': event name is missing. Section name should be 'key=value'\n",
  283. config_str);
  284. err = -BPF_LOADER_ERRNO__EVENTNAME;
  285. goto errout;
  286. }
  287. pr_debug("bpf: config '%s' is ok\n", config_str);
  288. err = bpf_program__set_private(prog, priv, bpf_prog_priv__clear);
  289. if (err) {
  290. pr_debug("Failed to set priv for program '%s'\n", config_str);
  291. goto errout;
  292. }
  293. return 0;
  294. errout:
  295. if (pev)
  296. clear_perf_probe_event(pev);
  297. free(priv);
  298. return err;
  299. }
  300. static int bpf__prepare_probe(void)
  301. {
  302. static int err = 0;
  303. static bool initialized = false;
  304. /*
  305. * Make err static, so if init failed the first, bpf__prepare_probe()
  306. * fails each time without calling init_probe_symbol_maps multiple
  307. * times.
  308. */
  309. if (initialized)
  310. return err;
  311. initialized = true;
  312. err = init_probe_symbol_maps(false);
  313. if (err < 0)
  314. pr_debug("Failed to init_probe_symbol_maps\n");
  315. probe_conf.max_probes = MAX_PROBES;
  316. return err;
  317. }
  318. static int
  319. preproc_gen_prologue(struct bpf_program *prog, int n,
  320. struct bpf_insn *orig_insns, int orig_insns_cnt,
  321. struct bpf_prog_prep_result *res)
  322. {
  323. struct probe_trace_event *tev;
  324. struct perf_probe_event *pev;
  325. struct bpf_prog_priv *priv;
  326. struct bpf_insn *buf;
  327. size_t prologue_cnt = 0;
  328. int i, err;
  329. err = bpf_program__get_private(prog, (void **)&priv);
  330. if (err || !priv)
  331. goto errout;
  332. pev = &priv->pev;
  333. if (n < 0 || n >= priv->nr_types)
  334. goto errout;
  335. /* Find a tev belongs to that type */
  336. for (i = 0; i < pev->ntevs; i++) {
  337. if (priv->type_mapping[i] == n)
  338. break;
  339. }
  340. if (i >= pev->ntevs) {
  341. pr_debug("Internal error: prologue type %d not found\n", n);
  342. return -BPF_LOADER_ERRNO__PROLOGUE;
  343. }
  344. tev = &pev->tevs[i];
  345. buf = priv->insns_buf;
  346. err = bpf__gen_prologue(tev->args, tev->nargs,
  347. buf, &prologue_cnt,
  348. BPF_MAXINSNS - orig_insns_cnt);
  349. if (err) {
  350. const char *title;
  351. title = bpf_program__title(prog, false);
  352. if (!title)
  353. title = "[unknown]";
  354. pr_debug("Failed to generate prologue for program %s\n",
  355. title);
  356. return err;
  357. }
  358. memcpy(&buf[prologue_cnt], orig_insns,
  359. sizeof(struct bpf_insn) * orig_insns_cnt);
  360. res->new_insn_ptr = buf;
  361. res->new_insn_cnt = prologue_cnt + orig_insns_cnt;
  362. res->pfd = NULL;
  363. return 0;
  364. errout:
  365. pr_debug("Internal error in preproc_gen_prologue\n");
  366. return -BPF_LOADER_ERRNO__PROLOGUE;
  367. }
  368. /*
  369. * compare_tev_args is reflexive, transitive and antisymmetric.
  370. * I can proof it but this margin is too narrow to contain.
  371. */
  372. static int compare_tev_args(const void *ptev1, const void *ptev2)
  373. {
  374. int i, ret;
  375. const struct probe_trace_event *tev1 =
  376. *(const struct probe_trace_event **)ptev1;
  377. const struct probe_trace_event *tev2 =
  378. *(const struct probe_trace_event **)ptev2;
  379. ret = tev2->nargs - tev1->nargs;
  380. if (ret)
  381. return ret;
  382. for (i = 0; i < tev1->nargs; i++) {
  383. struct probe_trace_arg *arg1, *arg2;
  384. struct probe_trace_arg_ref *ref1, *ref2;
  385. arg1 = &tev1->args[i];
  386. arg2 = &tev2->args[i];
  387. ret = strcmp(arg1->value, arg2->value);
  388. if (ret)
  389. return ret;
  390. ref1 = arg1->ref;
  391. ref2 = arg2->ref;
  392. while (ref1 && ref2) {
  393. ret = ref2->offset - ref1->offset;
  394. if (ret)
  395. return ret;
  396. ref1 = ref1->next;
  397. ref2 = ref2->next;
  398. }
  399. if (ref1 || ref2)
  400. return ref2 ? 1 : -1;
  401. }
  402. return 0;
  403. }
  404. /*
  405. * Assign a type number to each tevs in a pev.
  406. * mapping is an array with same slots as tevs in that pev.
  407. * nr_types will be set to number of types.
  408. */
  409. static int map_prologue(struct perf_probe_event *pev, int *mapping,
  410. int *nr_types)
  411. {
  412. int i, type = 0;
  413. struct probe_trace_event **ptevs;
  414. size_t array_sz = sizeof(*ptevs) * pev->ntevs;
  415. ptevs = malloc(array_sz);
  416. if (!ptevs) {
  417. pr_debug("No ehough memory: alloc ptevs failed\n");
  418. return -ENOMEM;
  419. }
  420. pr_debug("In map_prologue, ntevs=%d\n", pev->ntevs);
  421. for (i = 0; i < pev->ntevs; i++)
  422. ptevs[i] = &pev->tevs[i];
  423. qsort(ptevs, pev->ntevs, sizeof(*ptevs),
  424. compare_tev_args);
  425. for (i = 0; i < pev->ntevs; i++) {
  426. int n;
  427. n = ptevs[i] - pev->tevs;
  428. if (i == 0) {
  429. mapping[n] = type;
  430. pr_debug("mapping[%d]=%d\n", n, type);
  431. continue;
  432. }
  433. if (compare_tev_args(ptevs + i, ptevs + i - 1) == 0)
  434. mapping[n] = type;
  435. else
  436. mapping[n] = ++type;
  437. pr_debug("mapping[%d]=%d\n", n, mapping[n]);
  438. }
  439. free(ptevs);
  440. *nr_types = type + 1;
  441. return 0;
  442. }
  443. static int hook_load_preprocessor(struct bpf_program *prog)
  444. {
  445. struct perf_probe_event *pev;
  446. struct bpf_prog_priv *priv;
  447. bool need_prologue = false;
  448. int err, i;
  449. err = bpf_program__get_private(prog, (void **)&priv);
  450. if (err || !priv) {
  451. pr_debug("Internal error when hook preprocessor\n");
  452. return -BPF_LOADER_ERRNO__INTERNAL;
  453. }
  454. pev = &priv->pev;
  455. for (i = 0; i < pev->ntevs; i++) {
  456. struct probe_trace_event *tev = &pev->tevs[i];
  457. if (tev->nargs > 0) {
  458. need_prologue = true;
  459. break;
  460. }
  461. }
  462. /*
  463. * Since all tevs don't have argument, we don't need generate
  464. * prologue.
  465. */
  466. if (!need_prologue) {
  467. priv->need_prologue = false;
  468. return 0;
  469. }
  470. priv->need_prologue = true;
  471. priv->insns_buf = malloc(sizeof(struct bpf_insn) * BPF_MAXINSNS);
  472. if (!priv->insns_buf) {
  473. pr_debug("No enough memory: alloc insns_buf failed\n");
  474. return -ENOMEM;
  475. }
  476. priv->type_mapping = malloc(sizeof(int) * pev->ntevs);
  477. if (!priv->type_mapping) {
  478. pr_debug("No enough memory: alloc type_mapping failed\n");
  479. return -ENOMEM;
  480. }
  481. memset(priv->type_mapping, -1,
  482. sizeof(int) * pev->ntevs);
  483. err = map_prologue(pev, priv->type_mapping, &priv->nr_types);
  484. if (err)
  485. return err;
  486. err = bpf_program__set_prep(prog, priv->nr_types,
  487. preproc_gen_prologue);
  488. return err;
  489. }
  490. int bpf__probe(struct bpf_object *obj)
  491. {
  492. int err = 0;
  493. struct bpf_program *prog;
  494. struct bpf_prog_priv *priv;
  495. struct perf_probe_event *pev;
  496. err = bpf__prepare_probe();
  497. if (err) {
  498. pr_debug("bpf__prepare_probe failed\n");
  499. return err;
  500. }
  501. bpf_object__for_each_program(prog, obj) {
  502. err = config_bpf_program(prog);
  503. if (err)
  504. goto out;
  505. err = bpf_program__get_private(prog, (void **)&priv);
  506. if (err || !priv)
  507. goto out;
  508. pev = &priv->pev;
  509. err = convert_perf_probe_events(pev, 1);
  510. if (err < 0) {
  511. pr_debug("bpf_probe: failed to convert perf probe events");
  512. goto out;
  513. }
  514. err = apply_perf_probe_events(pev, 1);
  515. if (err < 0) {
  516. pr_debug("bpf_probe: failed to apply perf probe events");
  517. goto out;
  518. }
  519. /*
  520. * After probing, let's consider prologue, which
  521. * adds program fetcher to BPF programs.
  522. *
  523. * hook_load_preprocessorr() hooks pre-processor
  524. * to bpf_program, let it generate prologue
  525. * dynamically during loading.
  526. */
  527. err = hook_load_preprocessor(prog);
  528. if (err)
  529. goto out;
  530. }
  531. out:
  532. return err < 0 ? err : 0;
  533. }
  534. #define EVENTS_WRITE_BUFSIZE 4096
  535. int bpf__unprobe(struct bpf_object *obj)
  536. {
  537. int err, ret = 0;
  538. struct bpf_program *prog;
  539. struct bpf_prog_priv *priv;
  540. bpf_object__for_each_program(prog, obj) {
  541. int i;
  542. err = bpf_program__get_private(prog, (void **)&priv);
  543. if (err || !priv)
  544. continue;
  545. for (i = 0; i < priv->pev.ntevs; i++) {
  546. struct probe_trace_event *tev = &priv->pev.tevs[i];
  547. char name_buf[EVENTS_WRITE_BUFSIZE];
  548. struct strfilter *delfilter;
  549. snprintf(name_buf, EVENTS_WRITE_BUFSIZE,
  550. "%s:%s", tev->group, tev->event);
  551. name_buf[EVENTS_WRITE_BUFSIZE - 1] = '\0';
  552. delfilter = strfilter__new(name_buf, NULL);
  553. if (!delfilter) {
  554. pr_debug("Failed to create filter for unprobing\n");
  555. ret = -ENOMEM;
  556. continue;
  557. }
  558. err = del_perf_probe_events(delfilter);
  559. strfilter__delete(delfilter);
  560. if (err) {
  561. pr_debug("Failed to delete %s\n", name_buf);
  562. ret = err;
  563. continue;
  564. }
  565. }
  566. }
  567. return ret;
  568. }
  569. int bpf__load(struct bpf_object *obj)
  570. {
  571. int err;
  572. err = bpf_object__load(obj);
  573. if (err) {
  574. pr_debug("bpf: load objects failed\n");
  575. return err;
  576. }
  577. return 0;
  578. }
  579. int bpf__foreach_tev(struct bpf_object *obj,
  580. bpf_prog_iter_callback_t func,
  581. void *arg)
  582. {
  583. struct bpf_program *prog;
  584. int err;
  585. bpf_object__for_each_program(prog, obj) {
  586. struct probe_trace_event *tev;
  587. struct perf_probe_event *pev;
  588. struct bpf_prog_priv *priv;
  589. int i, fd;
  590. err = bpf_program__get_private(prog,
  591. (void **)&priv);
  592. if (err || !priv) {
  593. pr_debug("bpf: failed to get private field\n");
  594. return -BPF_LOADER_ERRNO__INTERNAL;
  595. }
  596. pev = &priv->pev;
  597. for (i = 0; i < pev->ntevs; i++) {
  598. tev = &pev->tevs[i];
  599. if (priv->need_prologue) {
  600. int type = priv->type_mapping[i];
  601. fd = bpf_program__nth_fd(prog, type);
  602. } else {
  603. fd = bpf_program__fd(prog);
  604. }
  605. if (fd < 0) {
  606. pr_debug("bpf: failed to get file descriptor\n");
  607. return fd;
  608. }
  609. err = (*func)(tev, fd, arg);
  610. if (err) {
  611. pr_debug("bpf: call back failed, stop iterate\n");
  612. return err;
  613. }
  614. }
  615. }
  616. return 0;
  617. }
  618. #define ERRNO_OFFSET(e) ((e) - __BPF_LOADER_ERRNO__START)
  619. #define ERRCODE_OFFSET(c) ERRNO_OFFSET(BPF_LOADER_ERRNO__##c)
  620. #define NR_ERRNO (__BPF_LOADER_ERRNO__END - __BPF_LOADER_ERRNO__START)
  621. static const char *bpf_loader_strerror_table[NR_ERRNO] = {
  622. [ERRCODE_OFFSET(CONFIG)] = "Invalid config string",
  623. [ERRCODE_OFFSET(GROUP)] = "Invalid group name",
  624. [ERRCODE_OFFSET(EVENTNAME)] = "No event name found in config string",
  625. [ERRCODE_OFFSET(INTERNAL)] = "BPF loader internal error",
  626. [ERRCODE_OFFSET(COMPILE)] = "Error when compiling BPF scriptlet",
  627. [ERRCODE_OFFSET(PROGCONF_TERM)] = "Invalid program config term in config string",
  628. [ERRCODE_OFFSET(PROLOGUE)] = "Failed to generate prologue",
  629. [ERRCODE_OFFSET(PROLOGUE2BIG)] = "Prologue too big for program",
  630. [ERRCODE_OFFSET(PROLOGUEOOB)] = "Offset out of bound for prologue",
  631. };
  632. static int
  633. bpf_loader_strerror(int err, char *buf, size_t size)
  634. {
  635. char sbuf[STRERR_BUFSIZE];
  636. const char *msg;
  637. if (!buf || !size)
  638. return -1;
  639. err = err > 0 ? err : -err;
  640. if (err >= __LIBBPF_ERRNO__START)
  641. return libbpf_strerror(err, buf, size);
  642. if (err >= __BPF_LOADER_ERRNO__START && err < __BPF_LOADER_ERRNO__END) {
  643. msg = bpf_loader_strerror_table[ERRNO_OFFSET(err)];
  644. snprintf(buf, size, "%s", msg);
  645. buf[size - 1] = '\0';
  646. return 0;
  647. }
  648. if (err >= __BPF_LOADER_ERRNO__END)
  649. snprintf(buf, size, "Unknown bpf loader error %d", err);
  650. else
  651. snprintf(buf, size, "%s",
  652. strerror_r(err, sbuf, sizeof(sbuf)));
  653. buf[size - 1] = '\0';
  654. return -1;
  655. }
  656. #define bpf__strerror_head(err, buf, size) \
  657. char sbuf[STRERR_BUFSIZE], *emsg;\
  658. if (!size)\
  659. return 0;\
  660. if (err < 0)\
  661. err = -err;\
  662. bpf_loader_strerror(err, sbuf, sizeof(sbuf));\
  663. emsg = sbuf;\
  664. switch (err) {\
  665. default:\
  666. scnprintf(buf, size, "%s", emsg);\
  667. break;
  668. #define bpf__strerror_entry(val, fmt...)\
  669. case val: {\
  670. scnprintf(buf, size, fmt);\
  671. break;\
  672. }
  673. #define bpf__strerror_end(buf, size)\
  674. }\
  675. buf[size - 1] = '\0';
  676. int bpf__strerror_prepare_load(const char *filename, bool source,
  677. int err, char *buf, size_t size)
  678. {
  679. size_t n;
  680. int ret;
  681. n = snprintf(buf, size, "Failed to load %s%s: ",
  682. filename, source ? " from source" : "");
  683. if (n >= size) {
  684. buf[size - 1] = '\0';
  685. return 0;
  686. }
  687. buf += n;
  688. size -= n;
  689. ret = bpf_loader_strerror(err, buf, size);
  690. buf[size - 1] = '\0';
  691. return ret;
  692. }
  693. int bpf__strerror_probe(struct bpf_object *obj __maybe_unused,
  694. int err, char *buf, size_t size)
  695. {
  696. bpf__strerror_head(err, buf, size);
  697. case BPF_LOADER_ERRNO__PROGCONF_TERM: {
  698. scnprintf(buf, size, "%s (add -v to see detail)", emsg);
  699. break;
  700. }
  701. bpf__strerror_entry(EEXIST, "Probe point exist. Try 'perf probe -d \"*\"' and set 'force=yes'");
  702. bpf__strerror_entry(EACCES, "You need to be root");
  703. bpf__strerror_entry(EPERM, "You need to be root, and /proc/sys/kernel/kptr_restrict should be 0");
  704. bpf__strerror_entry(ENOENT, "You need to check probing points in BPF file");
  705. bpf__strerror_end(buf, size);
  706. return 0;
  707. }
  708. int bpf__strerror_load(struct bpf_object *obj,
  709. int err, char *buf, size_t size)
  710. {
  711. bpf__strerror_head(err, buf, size);
  712. case LIBBPF_ERRNO__KVER: {
  713. unsigned int obj_kver = bpf_object__get_kversion(obj);
  714. unsigned int real_kver;
  715. if (fetch_kernel_version(&real_kver, NULL, 0)) {
  716. scnprintf(buf, size, "Unable to fetch kernel version");
  717. break;
  718. }
  719. if (obj_kver != real_kver) {
  720. scnprintf(buf, size,
  721. "'version' ("KVER_FMT") doesn't match running kernel ("KVER_FMT")",
  722. KVER_PARAM(obj_kver),
  723. KVER_PARAM(real_kver));
  724. break;
  725. }
  726. scnprintf(buf, size, "Failed to load program for unknown reason");
  727. break;
  728. }
  729. bpf__strerror_end(buf, size);
  730. return 0;
  731. }