blob: aa784a498c4838c2a70356f7e3902fc19bc59a2a [file] [log] [blame]
Wang Nan69d262a2015-10-14 12:41:13 +00001/*
2 * bpf-loader.c
3 *
4 * Copyright (C) 2015 Wang Nan <wangnan0@huawei.com>
5 * Copyright (C) 2015 Huawei Inc.
6 */
7
8#include <bpf/libbpf.h>
9#include <linux/err.h>
10#include "perf.h"
11#include "debug.h"
12#include "bpf-loader.h"
Wang Nanaa3abf32015-10-14 12:41:15 +000013#include "probe-event.h"
14#include "probe-finder.h" // for MAX_PROBES
Wang Nan69d262a2015-10-14 12:41:13 +000015
16#define DEFINE_PRINT_FN(name, level) \
17static int libbpf_##name(const char *fmt, ...) \
18{ \
19 va_list args; \
20 int ret; \
21 \
22 va_start(args, fmt); \
23 ret = veprintf(level, verbose, pr_fmt(fmt), args);\
24 va_end(args); \
25 return ret; \
26}
27
28DEFINE_PRINT_FN(warning, 0)
29DEFINE_PRINT_FN(info, 0)
30DEFINE_PRINT_FN(debug, 1)
31
Wang Nanaa3abf32015-10-14 12:41:15 +000032struct bpf_prog_priv {
33 struct perf_probe_event pev;
34};
35
Wang Nan69d262a2015-10-14 12:41:13 +000036struct bpf_object *bpf__prepare_load(const char *filename)
37{
38 struct bpf_object *obj;
39 static bool libbpf_initialized;
40
41 if (!libbpf_initialized) {
42 libbpf_set_print(libbpf_warning,
43 libbpf_info,
44 libbpf_debug);
45 libbpf_initialized = true;
46 }
47
48 obj = bpf_object__open(filename);
49 if (!obj) {
50 pr_debug("bpf: failed to load %s\n", filename);
51 return ERR_PTR(-EINVAL);
52 }
53
54 return obj;
55}
56
57void bpf__clear(void)
58{
59 struct bpf_object *obj, *tmp;
60
Wang Nanaa3abf32015-10-14 12:41:15 +000061 bpf_object__for_each_safe(obj, tmp) {
62 bpf__unprobe(obj);
Wang Nan69d262a2015-10-14 12:41:13 +000063 bpf_object__close(obj);
Wang Nanaa3abf32015-10-14 12:41:15 +000064 }
65}
66
67static void
68bpf_prog_priv__clear(struct bpf_program *prog __maybe_unused,
69 void *_priv)
70{
71 struct bpf_prog_priv *priv = _priv;
72
73 cleanup_perf_probe_events(&priv->pev, 1);
74 free(priv);
75}
76
77static int
78config_bpf_program(struct bpf_program *prog)
79{
80 struct perf_probe_event *pev = NULL;
81 struct bpf_prog_priv *priv = NULL;
82 const char *config_str;
83 int err;
84
85 config_str = bpf_program__title(prog, false);
86 if (!config_str) {
87 pr_debug("bpf: unable to get title for program\n");
88 return -EINVAL;
89 }
90
91 priv = calloc(sizeof(*priv), 1);
92 if (!priv) {
93 pr_debug("bpf: failed to alloc priv\n");
94 return -ENOMEM;
95 }
96 pev = &priv->pev;
97
98 pr_debug("bpf: config program '%s'\n", config_str);
99 err = parse_perf_probe_command(config_str, pev);
100 if (err < 0) {
101 pr_debug("bpf: '%s' is not a valid config string\n",
102 config_str);
103 err = -EINVAL;
104 goto errout;
105 }
106
107 if (pev->group && strcmp(pev->group, PERF_BPF_PROBE_GROUP)) {
108 pr_debug("bpf: '%s': group for event is set and not '%s'.\n",
109 config_str, PERF_BPF_PROBE_GROUP);
110 err = -EINVAL;
111 goto errout;
112 } else if (!pev->group)
113 pev->group = strdup(PERF_BPF_PROBE_GROUP);
114
115 if (!pev->group) {
116 pr_debug("bpf: strdup failed\n");
117 err = -ENOMEM;
118 goto errout;
119 }
120
121 if (!pev->event) {
122 pr_debug("bpf: '%s': event name is missing\n",
123 config_str);
124 err = -EINVAL;
125 goto errout;
126 }
127 pr_debug("bpf: config '%s' is ok\n", config_str);
128
129 err = bpf_program__set_private(prog, priv, bpf_prog_priv__clear);
130 if (err) {
131 pr_debug("Failed to set priv for program '%s'\n", config_str);
132 goto errout;
133 }
134
135 return 0;
136
137errout:
138 if (pev)
139 clear_perf_probe_event(pev);
140 free(priv);
141 return err;
142}
143
144static int bpf__prepare_probe(void)
145{
146 static int err = 0;
147 static bool initialized = false;
148
149 /*
150 * Make err static, so if init failed the first, bpf__prepare_probe()
151 * fails each time without calling init_probe_symbol_maps multiple
152 * times.
153 */
154 if (initialized)
155 return err;
156
157 initialized = true;
158 err = init_probe_symbol_maps(false);
159 if (err < 0)
160 pr_debug("Failed to init_probe_symbol_maps\n");
161 probe_conf.max_probes = MAX_PROBES;
162 return err;
163}
164
165int bpf__probe(struct bpf_object *obj)
166{
167 int err = 0;
168 struct bpf_program *prog;
169 struct bpf_prog_priv *priv;
170 struct perf_probe_event *pev;
171
172 err = bpf__prepare_probe();
173 if (err) {
174 pr_debug("bpf__prepare_probe failed\n");
175 return err;
176 }
177
178 bpf_object__for_each_program(prog, obj) {
179 err = config_bpf_program(prog);
180 if (err)
181 goto out;
182
183 err = bpf_program__get_private(prog, (void **)&priv);
184 if (err || !priv)
185 goto out;
186 pev = &priv->pev;
187
188 err = convert_perf_probe_events(pev, 1);
189 if (err < 0) {
190 pr_debug("bpf_probe: failed to convert perf probe events");
191 goto out;
192 }
193
194 err = apply_perf_probe_events(pev, 1);
195 if (err < 0) {
196 pr_debug("bpf_probe: failed to apply perf probe events");
197 goto out;
198 }
199 }
200out:
201 return err < 0 ? err : 0;
202}
203
204#define EVENTS_WRITE_BUFSIZE 4096
205int bpf__unprobe(struct bpf_object *obj)
206{
207 int err, ret = 0;
208 struct bpf_program *prog;
209 struct bpf_prog_priv *priv;
210
211 bpf_object__for_each_program(prog, obj) {
212 int i;
213
214 err = bpf_program__get_private(prog, (void **)&priv);
215 if (err || !priv)
216 continue;
217
218 for (i = 0; i < priv->pev.ntevs; i++) {
219 struct probe_trace_event *tev = &priv->pev.tevs[i];
220 char name_buf[EVENTS_WRITE_BUFSIZE];
221 struct strfilter *delfilter;
222
223 snprintf(name_buf, EVENTS_WRITE_BUFSIZE,
224 "%s:%s", tev->group, tev->event);
225 name_buf[EVENTS_WRITE_BUFSIZE - 1] = '\0';
226
227 delfilter = strfilter__new(name_buf, NULL);
228 if (!delfilter) {
229 pr_debug("Failed to create filter for unprobing\n");
230 ret = -ENOMEM;
231 continue;
232 }
233
234 err = del_perf_probe_events(delfilter);
235 strfilter__delete(delfilter);
236 if (err) {
237 pr_debug("Failed to delete %s\n", name_buf);
238 ret = err;
239 continue;
240 }
241 }
242 }
243 return ret;
244}
245
Wang Nan1e5e3ee2015-10-14 12:41:16 +0000246int bpf__load(struct bpf_object *obj)
247{
248 int err;
249
250 err = bpf_object__load(obj);
251 if (err) {
252 pr_debug("bpf: load objects failed\n");
253 return err;
254 }
255 return 0;
256}
257
Wang Nan4edf30e2015-10-14 12:41:17 +0000258int bpf__foreach_tev(struct bpf_object *obj,
259 bpf_prog_iter_callback_t func,
260 void *arg)
261{
262 struct bpf_program *prog;
263 int err;
264
265 bpf_object__for_each_program(prog, obj) {
266 struct probe_trace_event *tev;
267 struct perf_probe_event *pev;
268 struct bpf_prog_priv *priv;
269 int i, fd;
270
271 err = bpf_program__get_private(prog,
272 (void **)&priv);
273 if (err || !priv) {
274 pr_debug("bpf: failed to get private field\n");
275 return -EINVAL;
276 }
277
278 pev = &priv->pev;
279 for (i = 0; i < pev->ntevs; i++) {
280 tev = &pev->tevs[i];
281
282 fd = bpf_program__fd(prog);
283 if (fd < 0) {
284 pr_debug("bpf: failed to get file descriptor\n");
285 return fd;
286 }
287
288 err = (*func)(tev, fd, arg);
289 if (err) {
290 pr_debug("bpf: call back failed, stop iterate\n");
291 return err;
292 }
293 }
294 }
295 return 0;
296}
297
Wang Nanaa3abf32015-10-14 12:41:15 +0000298#define bpf__strerror_head(err, buf, size) \
299 char sbuf[STRERR_BUFSIZE], *emsg;\
300 if (!size)\
301 return 0;\
302 if (err < 0)\
303 err = -err;\
304 emsg = strerror_r(err, sbuf, sizeof(sbuf));\
305 switch (err) {\
306 default:\
307 scnprintf(buf, size, "%s", emsg);\
308 break;
309
310#define bpf__strerror_entry(val, fmt...)\
311 case val: {\
312 scnprintf(buf, size, fmt);\
313 break;\
314 }
315
316#define bpf__strerror_end(buf, size)\
317 }\
318 buf[size - 1] = '\0';
319
320int bpf__strerror_probe(struct bpf_object *obj __maybe_unused,
321 int err, char *buf, size_t size)
322{
323 bpf__strerror_head(err, buf, size);
324 bpf__strerror_entry(EEXIST, "Probe point exist. Try use 'perf probe -d \"*\"'");
325 bpf__strerror_entry(EPERM, "You need to be root, and /proc/sys/kernel/kptr_restrict should be 0\n");
326 bpf__strerror_entry(ENOENT, "You need to check probing points in BPF file\n");
327 bpf__strerror_end(buf, size);
328 return 0;
Wang Nan69d262a2015-10-14 12:41:13 +0000329}
Wang Nan1e5e3ee2015-10-14 12:41:16 +0000330
331int bpf__strerror_load(struct bpf_object *obj __maybe_unused,
332 int err, char *buf, size_t size)
333{
334 bpf__strerror_head(err, buf, size);
335 bpf__strerror_entry(EINVAL, "%s: Are you root and runing a CONFIG_BPF_SYSCALL kernel?",
336 emsg)
337 bpf__strerror_end(buf, size);
338 return 0;
339}