bpf-loader.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751
  1. /*
  2. * bpf-loader.c
  3. *
  4. * Copyright (C) 2015 Wang Nan <wangnan0@huawei.com>
  5. * Copyright (C) 2015 Huawei Inc.
  6. */
  7. #include <linux/bpf.h>
  8. #include <bpf/libbpf.h>
  9. #include <linux/err.h>
  10. #include <linux/string.h>
  11. #include "perf.h"
  12. #include "debug.h"
  13. #include "bpf-loader.h"
  14. #include "bpf-prologue.h"
  15. #include "llvm-utils.h"
  16. #include "probe-event.h"
  17. #include "probe-finder.h" // for MAX_PROBES
  18. #include "llvm-utils.h"
  19. #define DEFINE_PRINT_FN(name, level) \
  20. static int libbpf_##name(const char *fmt, ...) \
  21. { \
  22. va_list args; \
  23. int ret; \
  24. \
  25. va_start(args, fmt); \
  26. ret = veprintf(level, verbose, pr_fmt(fmt), args);\
  27. va_end(args); \
  28. return ret; \
  29. }
  30. DEFINE_PRINT_FN(warning, 1)
  31. DEFINE_PRINT_FN(info, 1)
  32. DEFINE_PRINT_FN(debug, 1)
  33. struct bpf_prog_priv {
  34. struct perf_probe_event pev;
  35. bool need_prologue;
  36. struct bpf_insn *insns_buf;
  37. };
  38. static bool libbpf_initialized;
  39. struct bpf_object *
  40. bpf__prepare_load_buffer(void *obj_buf, size_t obj_buf_sz, const char *name)
  41. {
  42. struct bpf_object *obj;
  43. if (!libbpf_initialized) {
  44. libbpf_set_print(libbpf_warning,
  45. libbpf_info,
  46. libbpf_debug);
  47. libbpf_initialized = true;
  48. }
  49. obj = bpf_object__open_buffer(obj_buf, obj_buf_sz, name);
  50. if (IS_ERR(obj)) {
  51. pr_debug("bpf: failed to load buffer\n");
  52. return ERR_PTR(-EINVAL);
  53. }
  54. return obj;
  55. }
  56. struct bpf_object *bpf__prepare_load(const char *filename, bool source)
  57. {
  58. struct bpf_object *obj;
  59. if (!libbpf_initialized) {
  60. libbpf_set_print(libbpf_warning,
  61. libbpf_info,
  62. libbpf_debug);
  63. libbpf_initialized = true;
  64. }
  65. if (source) {
  66. int err;
  67. void *obj_buf;
  68. size_t obj_buf_sz;
  69. err = llvm__compile_bpf(filename, &obj_buf, &obj_buf_sz);
  70. if (err)
  71. return ERR_PTR(-BPF_LOADER_ERRNO__COMPILE);
  72. obj = bpf_object__open_buffer(obj_buf, obj_buf_sz, filename);
  73. free(obj_buf);
  74. } else
  75. obj = bpf_object__open(filename);
  76. if (IS_ERR(obj)) {
  77. pr_debug("bpf: failed to load %s\n", filename);
  78. return obj;
  79. }
  80. return obj;
  81. }
  82. void bpf__clear(void)
  83. {
  84. struct bpf_object *obj, *tmp;
  85. bpf_object__for_each_safe(obj, tmp) {
  86. bpf__unprobe(obj);
  87. bpf_object__close(obj);
  88. }
  89. }
  90. static void
  91. bpf_prog_priv__clear(struct bpf_program *prog __maybe_unused,
  92. void *_priv)
  93. {
  94. struct bpf_prog_priv *priv = _priv;
  95. cleanup_perf_probe_events(&priv->pev, 1);
  96. zfree(&priv->insns_buf);
  97. free(priv);
  98. }
  99. static int
  100. config__exec(const char *value, struct perf_probe_event *pev)
  101. {
  102. pev->uprobes = true;
  103. pev->target = strdup(value);
  104. if (!pev->target)
  105. return -ENOMEM;
  106. return 0;
  107. }
  108. static int
  109. config__module(const char *value, struct perf_probe_event *pev)
  110. {
  111. pev->uprobes = false;
  112. pev->target = strdup(value);
  113. if (!pev->target)
  114. return -ENOMEM;
  115. return 0;
  116. }
  117. static int
  118. config__bool(const char *value,
  119. bool *pbool, bool invert)
  120. {
  121. int err;
  122. bool bool_value;
  123. if (!pbool)
  124. return -EINVAL;
  125. err = strtobool(value, &bool_value);
  126. if (err)
  127. return err;
  128. *pbool = invert ? !bool_value : bool_value;
  129. return 0;
  130. }
  131. static int
  132. config__inlines(const char *value,
  133. struct perf_probe_event *pev __maybe_unused)
  134. {
  135. return config__bool(value, &probe_conf.no_inlines, true);
  136. }
  137. static int
  138. config__force(const char *value,
  139. struct perf_probe_event *pev __maybe_unused)
  140. {
  141. return config__bool(value, &probe_conf.force_add, false);
  142. }
  143. static struct {
  144. const char *key;
  145. const char *usage;
  146. const char *desc;
  147. int (*func)(const char *, struct perf_probe_event *);
  148. } bpf_config_terms[] = {
  149. {
  150. .key = "exec",
  151. .usage = "exec=<full path of file>",
  152. .desc = "Set uprobe target",
  153. .func = config__exec,
  154. },
  155. {
  156. .key = "module",
  157. .usage = "module=<module name> ",
  158. .desc = "Set kprobe module",
  159. .func = config__module,
  160. },
  161. {
  162. .key = "inlines",
  163. .usage = "inlines=[yes|no] ",
  164. .desc = "Probe at inline symbol",
  165. .func = config__inlines,
  166. },
  167. {
  168. .key = "force",
  169. .usage = "force=[yes|no] ",
  170. .desc = "Forcibly add events with existing name",
  171. .func = config__force,
  172. },
  173. };
  174. static int
  175. do_config(const char *key, const char *value,
  176. struct perf_probe_event *pev)
  177. {
  178. unsigned int i;
  179. pr_debug("config bpf program: %s=%s\n", key, value);
  180. for (i = 0; i < ARRAY_SIZE(bpf_config_terms); i++)
  181. if (strcmp(key, bpf_config_terms[i].key) == 0)
  182. return bpf_config_terms[i].func(value, pev);
  183. pr_debug("BPF: ERROR: invalid config option in object: %s=%s\n",
  184. key, value);
  185. pr_debug("\nHint: Currently valid options are:\n");
  186. for (i = 0; i < ARRAY_SIZE(bpf_config_terms); i++)
  187. pr_debug("\t%s:\t%s\n", bpf_config_terms[i].usage,
  188. bpf_config_terms[i].desc);
  189. pr_debug("\n");
  190. return -BPF_LOADER_ERRNO__CONFIG_TERM;
  191. }
  192. static const char *
  193. parse_config_kvpair(const char *config_str, struct perf_probe_event *pev)
  194. {
  195. char *text = strdup(config_str);
  196. char *sep, *line;
  197. const char *main_str = NULL;
  198. int err = 0;
  199. if (!text) {
  200. pr_debug("No enough memory: dup config_str failed\n");
  201. return ERR_PTR(-ENOMEM);
  202. }
  203. line = text;
  204. while ((sep = strchr(line, ';'))) {
  205. char *equ;
  206. *sep = '\0';
  207. equ = strchr(line, '=');
  208. if (!equ) {
  209. pr_warning("WARNING: invalid config in BPF object: %s\n",
  210. line);
  211. pr_warning("\tShould be 'key=value'.\n");
  212. goto nextline;
  213. }
  214. *equ = '\0';
  215. err = do_config(line, equ + 1, pev);
  216. if (err)
  217. break;
  218. nextline:
  219. line = sep + 1;
  220. }
  221. if (!err)
  222. main_str = config_str + (line - text);
  223. free(text);
  224. return err ? ERR_PTR(err) : main_str;
  225. }
  226. static int
  227. parse_config(const char *config_str, struct perf_probe_event *pev)
  228. {
  229. int err;
  230. const char *main_str = parse_config_kvpair(config_str, pev);
  231. if (IS_ERR(main_str))
  232. return PTR_ERR(main_str);
  233. err = parse_perf_probe_command(main_str, pev);
  234. if (err < 0) {
  235. pr_debug("bpf: '%s' is not a valid config string\n",
  236. config_str);
  237. /* parse failed, don't need clear pev. */
  238. return -BPF_LOADER_ERRNO__CONFIG;
  239. }
  240. return 0;
  241. }
  242. static int
  243. config_bpf_program(struct bpf_program *prog)
  244. {
  245. struct perf_probe_event *pev = NULL;
  246. struct bpf_prog_priv *priv = NULL;
  247. const char *config_str;
  248. int err;
  249. /* Initialize per-program probing setting */
  250. probe_conf.no_inlines = false;
  251. probe_conf.force_add = false;
  252. config_str = bpf_program__title(prog, false);
  253. if (IS_ERR(config_str)) {
  254. pr_debug("bpf: unable to get title for program\n");
  255. return PTR_ERR(config_str);
  256. }
  257. priv = calloc(sizeof(*priv), 1);
  258. if (!priv) {
  259. pr_debug("bpf: failed to alloc priv\n");
  260. return -ENOMEM;
  261. }
  262. pev = &priv->pev;
  263. pr_debug("bpf: config program '%s'\n", config_str);
  264. err = parse_config(config_str, pev);
  265. if (err)
  266. goto errout;
  267. if (pev->group && strcmp(pev->group, PERF_BPF_PROBE_GROUP)) {
  268. pr_debug("bpf: '%s': group for event is set and not '%s'.\n",
  269. config_str, PERF_BPF_PROBE_GROUP);
  270. err = -BPF_LOADER_ERRNO__GROUP;
  271. goto errout;
  272. } else if (!pev->group)
  273. pev->group = strdup(PERF_BPF_PROBE_GROUP);
  274. if (!pev->group) {
  275. pr_debug("bpf: strdup failed\n");
  276. err = -ENOMEM;
  277. goto errout;
  278. }
  279. if (!pev->event) {
  280. pr_debug("bpf: '%s': event name is missing. Section name should be 'key=value'\n",
  281. config_str);
  282. err = -BPF_LOADER_ERRNO__EVENTNAME;
  283. goto errout;
  284. }
  285. pr_debug("bpf: config '%s' is ok\n", config_str);
  286. err = bpf_program__set_private(prog, priv, bpf_prog_priv__clear);
  287. if (err) {
  288. pr_debug("Failed to set priv for program '%s'\n", config_str);
  289. goto errout;
  290. }
  291. return 0;
  292. errout:
  293. if (pev)
  294. clear_perf_probe_event(pev);
  295. free(priv);
  296. return err;
  297. }
  298. static int bpf__prepare_probe(void)
  299. {
  300. static int err = 0;
  301. static bool initialized = false;
  302. /*
  303. * Make err static, so if init failed the first, bpf__prepare_probe()
  304. * fails each time without calling init_probe_symbol_maps multiple
  305. * times.
  306. */
  307. if (initialized)
  308. return err;
  309. initialized = true;
  310. err = init_probe_symbol_maps(false);
  311. if (err < 0)
  312. pr_debug("Failed to init_probe_symbol_maps\n");
  313. probe_conf.max_probes = MAX_PROBES;
  314. return err;
  315. }
  316. static int
  317. preproc_gen_prologue(struct bpf_program *prog, int n,
  318. struct bpf_insn *orig_insns, int orig_insns_cnt,
  319. struct bpf_prog_prep_result *res)
  320. {
  321. struct probe_trace_event *tev;
  322. struct perf_probe_event *pev;
  323. struct bpf_prog_priv *priv;
  324. struct bpf_insn *buf;
  325. size_t prologue_cnt = 0;
  326. int err;
  327. err = bpf_program__get_private(prog, (void **)&priv);
  328. if (err || !priv)
  329. goto errout;
  330. pev = &priv->pev;
  331. if (n < 0 || n >= pev->ntevs)
  332. goto errout;
  333. tev = &pev->tevs[n];
  334. buf = priv->insns_buf;
  335. err = bpf__gen_prologue(tev->args, tev->nargs,
  336. buf, &prologue_cnt,
  337. BPF_MAXINSNS - orig_insns_cnt);
  338. if (err) {
  339. const char *title;
  340. title = bpf_program__title(prog, false);
  341. if (!title)
  342. title = "[unknown]";
  343. pr_debug("Failed to generate prologue for program %s\n",
  344. title);
  345. return err;
  346. }
  347. memcpy(&buf[prologue_cnt], orig_insns,
  348. sizeof(struct bpf_insn) * orig_insns_cnt);
  349. res->new_insn_ptr = buf;
  350. res->new_insn_cnt = prologue_cnt + orig_insns_cnt;
  351. res->pfd = NULL;
  352. return 0;
  353. errout:
  354. pr_debug("Internal error in preproc_gen_prologue\n");
  355. return -BPF_LOADER_ERRNO__PROLOGUE;
  356. }
  357. static int hook_load_preprocessor(struct bpf_program *prog)
  358. {
  359. struct perf_probe_event *pev;
  360. struct bpf_prog_priv *priv;
  361. bool need_prologue = false;
  362. int err, i;
  363. err = bpf_program__get_private(prog, (void **)&priv);
  364. if (err || !priv) {
  365. pr_debug("Internal error when hook preprocessor\n");
  366. return -BPF_LOADER_ERRNO__INTERNAL;
  367. }
  368. pev = &priv->pev;
  369. for (i = 0; i < pev->ntevs; i++) {
  370. struct probe_trace_event *tev = &pev->tevs[i];
  371. if (tev->nargs > 0) {
  372. need_prologue = true;
  373. break;
  374. }
  375. }
  376. /*
  377. * Since all tevs don't have argument, we don't need generate
  378. * prologue.
  379. */
  380. if (!need_prologue) {
  381. priv->need_prologue = false;
  382. return 0;
  383. }
  384. priv->need_prologue = true;
  385. priv->insns_buf = malloc(sizeof(struct bpf_insn) * BPF_MAXINSNS);
  386. if (!priv->insns_buf) {
  387. pr_debug("No enough memory: alloc insns_buf failed\n");
  388. return -ENOMEM;
  389. }
  390. err = bpf_program__set_prep(prog, pev->ntevs,
  391. preproc_gen_prologue);
  392. return err;
  393. }
  394. int bpf__probe(struct bpf_object *obj)
  395. {
  396. int err = 0;
  397. struct bpf_program *prog;
  398. struct bpf_prog_priv *priv;
  399. struct perf_probe_event *pev;
  400. err = bpf__prepare_probe();
  401. if (err) {
  402. pr_debug("bpf__prepare_probe failed\n");
  403. return err;
  404. }
  405. bpf_object__for_each_program(prog, obj) {
  406. err = config_bpf_program(prog);
  407. if (err)
  408. goto out;
  409. err = bpf_program__get_private(prog, (void **)&priv);
  410. if (err || !priv)
  411. goto out;
  412. pev = &priv->pev;
  413. err = convert_perf_probe_events(pev, 1);
  414. if (err < 0) {
  415. pr_debug("bpf_probe: failed to convert perf probe events");
  416. goto out;
  417. }
  418. err = apply_perf_probe_events(pev, 1);
  419. if (err < 0) {
  420. pr_debug("bpf_probe: failed to apply perf probe events");
  421. goto out;
  422. }
  423. /*
  424. * After probing, let's consider prologue, which
  425. * adds program fetcher to BPF programs.
  426. *
  427. * hook_load_preprocessorr() hooks pre-processor
  428. * to bpf_program, let it generate prologue
  429. * dynamically during loading.
  430. */
  431. err = hook_load_preprocessor(prog);
  432. if (err)
  433. goto out;
  434. }
  435. out:
  436. return err < 0 ? err : 0;
  437. }
  438. #define EVENTS_WRITE_BUFSIZE 4096
  439. int bpf__unprobe(struct bpf_object *obj)
  440. {
  441. int err, ret = 0;
  442. struct bpf_program *prog;
  443. struct bpf_prog_priv *priv;
  444. bpf_object__for_each_program(prog, obj) {
  445. int i;
  446. err = bpf_program__get_private(prog, (void **)&priv);
  447. if (err || !priv)
  448. continue;
  449. for (i = 0; i < priv->pev.ntevs; i++) {
  450. struct probe_trace_event *tev = &priv->pev.tevs[i];
  451. char name_buf[EVENTS_WRITE_BUFSIZE];
  452. struct strfilter *delfilter;
  453. snprintf(name_buf, EVENTS_WRITE_BUFSIZE,
  454. "%s:%s", tev->group, tev->event);
  455. name_buf[EVENTS_WRITE_BUFSIZE - 1] = '\0';
  456. delfilter = strfilter__new(name_buf, NULL);
  457. if (!delfilter) {
  458. pr_debug("Failed to create filter for unprobing\n");
  459. ret = -ENOMEM;
  460. continue;
  461. }
  462. err = del_perf_probe_events(delfilter);
  463. strfilter__delete(delfilter);
  464. if (err) {
  465. pr_debug("Failed to delete %s\n", name_buf);
  466. ret = err;
  467. continue;
  468. }
  469. }
  470. }
  471. return ret;
  472. }
  473. int bpf__load(struct bpf_object *obj)
  474. {
  475. int err;
  476. err = bpf_object__load(obj);
  477. if (err) {
  478. pr_debug("bpf: load objects failed\n");
  479. return err;
  480. }
  481. return 0;
  482. }
  483. int bpf__foreach_tev(struct bpf_object *obj,
  484. bpf_prog_iter_callback_t func,
  485. void *arg)
  486. {
  487. struct bpf_program *prog;
  488. int err;
  489. bpf_object__for_each_program(prog, obj) {
  490. struct probe_trace_event *tev;
  491. struct perf_probe_event *pev;
  492. struct bpf_prog_priv *priv;
  493. int i, fd;
  494. err = bpf_program__get_private(prog,
  495. (void **)&priv);
  496. if (err || !priv) {
  497. pr_debug("bpf: failed to get private field\n");
  498. return -BPF_LOADER_ERRNO__INTERNAL;
  499. }
  500. pev = &priv->pev;
  501. for (i = 0; i < pev->ntevs; i++) {
  502. tev = &pev->tevs[i];
  503. if (priv->need_prologue)
  504. fd = bpf_program__nth_fd(prog, i);
  505. else
  506. fd = bpf_program__fd(prog);
  507. if (fd < 0) {
  508. pr_debug("bpf: failed to get file descriptor\n");
  509. return fd;
  510. }
  511. err = (*func)(tev, fd, arg);
  512. if (err) {
  513. pr_debug("bpf: call back failed, stop iterate\n");
  514. return err;
  515. }
  516. }
  517. }
  518. return 0;
  519. }
  520. #define ERRNO_OFFSET(e) ((e) - __BPF_LOADER_ERRNO__START)
  521. #define ERRCODE_OFFSET(c) ERRNO_OFFSET(BPF_LOADER_ERRNO__##c)
  522. #define NR_ERRNO (__BPF_LOADER_ERRNO__END - __BPF_LOADER_ERRNO__START)
  523. static const char *bpf_loader_strerror_table[NR_ERRNO] = {
  524. [ERRCODE_OFFSET(CONFIG)] = "Invalid config string",
  525. [ERRCODE_OFFSET(GROUP)] = "Invalid group name",
  526. [ERRCODE_OFFSET(EVENTNAME)] = "No event name found in config string",
  527. [ERRCODE_OFFSET(INTERNAL)] = "BPF loader internal error",
  528. [ERRCODE_OFFSET(COMPILE)] = "Error when compiling BPF scriptlet",
  529. [ERRCODE_OFFSET(CONFIG_TERM)] = "Invalid config term in config string",
  530. [ERRCODE_OFFSET(PROLOGUE)] = "Failed to generate prologue",
  531. [ERRCODE_OFFSET(PROLOGUE2BIG)] = "Prologue too big for program",
  532. [ERRCODE_OFFSET(PROLOGUEOOB)] = "Offset out of bound for prologue",
  533. };
  534. static int
  535. bpf_loader_strerror(int err, char *buf, size_t size)
  536. {
  537. char sbuf[STRERR_BUFSIZE];
  538. const char *msg;
  539. if (!buf || !size)
  540. return -1;
  541. err = err > 0 ? err : -err;
  542. if (err >= __LIBBPF_ERRNO__START)
  543. return libbpf_strerror(err, buf, size);
  544. if (err >= __BPF_LOADER_ERRNO__START && err < __BPF_LOADER_ERRNO__END) {
  545. msg = bpf_loader_strerror_table[ERRNO_OFFSET(err)];
  546. snprintf(buf, size, "%s", msg);
  547. buf[size - 1] = '\0';
  548. return 0;
  549. }
  550. if (err >= __BPF_LOADER_ERRNO__END)
  551. snprintf(buf, size, "Unknown bpf loader error %d", err);
  552. else
  553. snprintf(buf, size, "%s",
  554. strerror_r(err, sbuf, sizeof(sbuf)));
  555. buf[size - 1] = '\0';
  556. return -1;
  557. }
  558. #define bpf__strerror_head(err, buf, size) \
  559. char sbuf[STRERR_BUFSIZE], *emsg;\
  560. if (!size)\
  561. return 0;\
  562. if (err < 0)\
  563. err = -err;\
  564. bpf_loader_strerror(err, sbuf, sizeof(sbuf));\
  565. emsg = sbuf;\
  566. switch (err) {\
  567. default:\
  568. scnprintf(buf, size, "%s", emsg);\
  569. break;
  570. #define bpf__strerror_entry(val, fmt...)\
  571. case val: {\
  572. scnprintf(buf, size, fmt);\
  573. break;\
  574. }
  575. #define bpf__strerror_end(buf, size)\
  576. }\
  577. buf[size - 1] = '\0';
  578. int bpf__strerror_prepare_load(const char *filename, bool source,
  579. int err, char *buf, size_t size)
  580. {
  581. size_t n;
  582. int ret;
  583. n = snprintf(buf, size, "Failed to load %s%s: ",
  584. filename, source ? " from source" : "");
  585. if (n >= size) {
  586. buf[size - 1] = '\0';
  587. return 0;
  588. }
  589. buf += n;
  590. size -= n;
  591. ret = bpf_loader_strerror(err, buf, size);
  592. buf[size - 1] = '\0';
  593. return ret;
  594. }
  595. int bpf__strerror_probe(struct bpf_object *obj __maybe_unused,
  596. int err, char *buf, size_t size)
  597. {
  598. bpf__strerror_head(err, buf, size);
  599. case BPF_LOADER_ERRNO__CONFIG_TERM: {
  600. scnprintf(buf, size, "%s (add -v to see detail)", emsg);
  601. break;
  602. }
  603. bpf__strerror_entry(EEXIST, "Probe point exist. Try 'perf probe -d \"*\"' and set 'force=yes'");
  604. bpf__strerror_entry(EACCES, "You need to be root");
  605. bpf__strerror_entry(EPERM, "You need to be root, and /proc/sys/kernel/kptr_restrict should be 0");
  606. bpf__strerror_entry(ENOENT, "You need to check probing points in BPF file");
  607. bpf__strerror_end(buf, size);
  608. return 0;
  609. }
  610. int bpf__strerror_load(struct bpf_object *obj,
  611. int err, char *buf, size_t size)
  612. {
  613. bpf__strerror_head(err, buf, size);
  614. case LIBBPF_ERRNO__KVER: {
  615. unsigned int obj_kver = bpf_object__get_kversion(obj);
  616. unsigned int real_kver;
  617. if (fetch_kernel_version(&real_kver, NULL, 0)) {
  618. scnprintf(buf, size, "Unable to fetch kernel version");
  619. break;
  620. }
  621. if (obj_kver != real_kver) {
  622. scnprintf(buf, size,
  623. "'version' ("KVER_FMT") doesn't match running kernel ("KVER_FMT")",
  624. KVER_PARAM(obj_kver),
  625. KVER_PARAM(real_kver));
  626. break;
  627. }
  628. scnprintf(buf, size, "Failed to load program for unknown reason");
  629. break;
  630. }
  631. bpf__strerror_end(buf, size);
  632. return 0;
  633. }