mirror of
				https://github.com/torvalds/linux.git
				synced 2025-11-04 10:40:15 +02:00 
			
		
		
		
	Add kernel module with user mode driver that populates bpffs with BPF iterators. $ mount bpffs /my/bpffs/ -t bpf $ ls -la /my/bpffs/ total 4 drwxrwxrwt 2 root root 0 Jul 2 00:27 . drwxr-xr-x 19 root root 4096 Jul 2 00:09 .. -rw------- 1 root root 0 Jul 2 00:27 maps.debug -rw------- 1 root root 0 Jul 2 00:27 progs.debug The user mode driver will load BPF Type Formats, create BPF maps, populate BPF maps, load two BPF programs, attach them to BPF iterators, and finally send two bpf_link IDs back to the kernel. The kernel will pin two bpf_links into newly mounted bpffs instance under names "progs.debug" and "maps.debug". These two files become human readable. $ cat /my/bpffs/progs.debug id name attached 11 dump_bpf_map bpf_iter_bpf_map 12 dump_bpf_prog bpf_iter_bpf_prog 27 test_pkt_access 32 test_main test_pkt_access test_pkt_access 33 test_subprog1 test_pkt_access_subprog1 test_pkt_access 34 test_subprog2 test_pkt_access_subprog2 test_pkt_access 35 test_subprog3 test_pkt_access_subprog3 test_pkt_access 36 new_get_skb_len get_skb_len test_pkt_access 37 new_get_skb_ifindex get_skb_ifindex test_pkt_access 38 new_get_constant get_constant test_pkt_access The BPF program dump_bpf_prog() in iterators.bpf.c is printing this data about all BPF programs currently loaded in the system. This information is unstable and will change from kernel to kernel as ".debug" suffix conveys. Signed-off-by: Alexei Starovoitov <ast@kernel.org> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net> Link: https://lore.kernel.org/bpf/20200819042759.51280-4-alexei.starovoitov@gmail.com
		
			
				
	
	
		
			91 lines
		
	
	
	
		
			2 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			91 lines
		
	
	
	
		
			2 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
// SPDX-License-Identifier: GPL-2.0
 | 
						|
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
 | 
						|
#include <linux/init.h>
 | 
						|
#include <linux/module.h>
 | 
						|
#include <linux/pid.h>
 | 
						|
#include <linux/fs.h>
 | 
						|
#include <linux/sched/signal.h>
 | 
						|
#include "bpf_preload.h"
 | 
						|
 | 
						|
extern char bpf_preload_umd_start;
 | 
						|
extern char bpf_preload_umd_end;
 | 
						|
 | 
						|
static int preload(struct bpf_preload_info *obj);
 | 
						|
static int finish(void);
 | 
						|
 | 
						|
static struct bpf_preload_ops umd_ops = {
 | 
						|
	.info.driver_name = "bpf_preload",
 | 
						|
	.preload = preload,
 | 
						|
	.finish = finish,
 | 
						|
	.owner = THIS_MODULE,
 | 
						|
};
 | 
						|
 | 
						|
static int preload(struct bpf_preload_info *obj)
 | 
						|
{
 | 
						|
	int magic = BPF_PRELOAD_START;
 | 
						|
	loff_t pos = 0;
 | 
						|
	int i, err;
 | 
						|
	ssize_t n;
 | 
						|
 | 
						|
	err = fork_usermode_driver(&umd_ops.info);
 | 
						|
	if (err)
 | 
						|
		return err;
 | 
						|
 | 
						|
	/* send the start magic to let UMD proceed with loading BPF progs */
 | 
						|
	n = kernel_write(umd_ops.info.pipe_to_umh,
 | 
						|
			 &magic, sizeof(magic), &pos);
 | 
						|
	if (n != sizeof(magic))
 | 
						|
		return -EPIPE;
 | 
						|
 | 
						|
	/* receive bpf_link IDs and names from UMD */
 | 
						|
	pos = 0;
 | 
						|
	for (i = 0; i < BPF_PRELOAD_LINKS; i++) {
 | 
						|
		n = kernel_read(umd_ops.info.pipe_from_umh,
 | 
						|
				&obj[i], sizeof(*obj), &pos);
 | 
						|
		if (n != sizeof(*obj))
 | 
						|
			return -EPIPE;
 | 
						|
	}
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int finish(void)
 | 
						|
{
 | 
						|
	int magic = BPF_PRELOAD_END;
 | 
						|
	struct pid *tgid;
 | 
						|
	loff_t pos = 0;
 | 
						|
	ssize_t n;
 | 
						|
 | 
						|
	/* send the last magic to UMD. It will do a normal exit. */
 | 
						|
	n = kernel_write(umd_ops.info.pipe_to_umh,
 | 
						|
			 &magic, sizeof(magic), &pos);
 | 
						|
	if (n != sizeof(magic))
 | 
						|
		return -EPIPE;
 | 
						|
	tgid = umd_ops.info.tgid;
 | 
						|
	wait_event(tgid->wait_pidfd, thread_group_exited(tgid));
 | 
						|
	umd_ops.info.tgid = NULL;
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int __init load_umd(void)
 | 
						|
{
 | 
						|
	int err;
 | 
						|
 | 
						|
	err = umd_load_blob(&umd_ops.info, &bpf_preload_umd_start,
 | 
						|
			    &bpf_preload_umd_end - &bpf_preload_umd_start);
 | 
						|
	if (err)
 | 
						|
		return err;
 | 
						|
	bpf_preload_ops = &umd_ops;
 | 
						|
	return err;
 | 
						|
}
 | 
						|
 | 
						|
static void __exit fini_umd(void)
 | 
						|
{
 | 
						|
	bpf_preload_ops = NULL;
 | 
						|
	/* kill UMD in case it's still there due to earlier error */
 | 
						|
	kill_pid(umd_ops.info.tgid, SIGKILL, 1);
 | 
						|
	umd_ops.info.tgid = NULL;
 | 
						|
	umd_unload_blob(&umd_ops.info);
 | 
						|
}
 | 
						|
late_initcall(load_umd);
 | 
						|
module_exit(fini_umd);
 | 
						|
MODULE_LICENSE("GPL");
 |