blob: e3afa1b60bb56bcd13db678ec0ea4d70b9197327 [file] [log] [blame]
Wang Nan69d262a2015-10-14 12:41:13 +00001/*
2 * bpf-loader.c
3 *
4 * Copyright (C) 2015 Wang Nan <wangnan0@huawei.com>
5 * Copyright (C) 2015 Huawei Inc.
6 */
7
8#include <bpf/libbpf.h>
9#include <linux/err.h>
10#include "perf.h"
11#include "debug.h"
12#include "bpf-loader.h"
Wang Nanaa3abf32015-10-14 12:41:15 +000013#include "probe-event.h"
14#include "probe-finder.h" // for MAX_PROBES
Wang Nand509db02015-10-14 12:41:20 +000015#include "llvm-utils.h"
Wang Nan69d262a2015-10-14 12:41:13 +000016
17#define DEFINE_PRINT_FN(name, level) \
18static int libbpf_##name(const char *fmt, ...) \
19{ \
20 va_list args; \
21 int ret; \
22 \
23 va_start(args, fmt); \
24 ret = veprintf(level, verbose, pr_fmt(fmt), args);\
25 va_end(args); \
26 return ret; \
27}
28
Wang Nan7a011942015-11-03 10:44:43 +000029DEFINE_PRINT_FN(warning, 1)
30DEFINE_PRINT_FN(info, 1)
Wang Nan69d262a2015-10-14 12:41:13 +000031DEFINE_PRINT_FN(debug, 1)
32
Wang Nanaa3abf32015-10-14 12:41:15 +000033struct bpf_prog_priv {
34 struct perf_probe_event pev;
35};
36
Wang Nand509db02015-10-14 12:41:20 +000037struct bpf_object *bpf__prepare_load(const char *filename, bool source)
Wang Nan69d262a2015-10-14 12:41:13 +000038{
39 struct bpf_object *obj;
40 static bool libbpf_initialized;
41
42 if (!libbpf_initialized) {
43 libbpf_set_print(libbpf_warning,
44 libbpf_info,
45 libbpf_debug);
46 libbpf_initialized = true;
47 }
48
Wang Nand509db02015-10-14 12:41:20 +000049 if (source) {
50 int err;
51 void *obj_buf;
52 size_t obj_buf_sz;
53
54 err = llvm__compile_bpf(filename, &obj_buf, &obj_buf_sz);
55 if (err)
Wang Nand3e0ce32015-11-06 13:58:09 +000056 return ERR_PTR(-BPF_LOADER_ERRNO__COMPILE);
Wang Nand509db02015-10-14 12:41:20 +000057 obj = bpf_object__open_buffer(obj_buf, obj_buf_sz, filename);
58 free(obj_buf);
59 } else
60 obj = bpf_object__open(filename);
61
Wang Nan6371ca3b2015-11-06 13:49:37 +000062 if (IS_ERR(obj)) {
Wang Nan69d262a2015-10-14 12:41:13 +000063 pr_debug("bpf: failed to load %s\n", filename);
Wang Nan6371ca3b2015-11-06 13:49:37 +000064 return obj;
Wang Nan69d262a2015-10-14 12:41:13 +000065 }
66
67 return obj;
68}
69
70void bpf__clear(void)
71{
72 struct bpf_object *obj, *tmp;
73
Wang Nanaa3abf32015-10-14 12:41:15 +000074 bpf_object__for_each_safe(obj, tmp) {
75 bpf__unprobe(obj);
Wang Nan69d262a2015-10-14 12:41:13 +000076 bpf_object__close(obj);
Wang Nanaa3abf32015-10-14 12:41:15 +000077 }
78}
79
80static void
81bpf_prog_priv__clear(struct bpf_program *prog __maybe_unused,
82 void *_priv)
83{
84 struct bpf_prog_priv *priv = _priv;
85
86 cleanup_perf_probe_events(&priv->pev, 1);
87 free(priv);
88}
89
90static int
91config_bpf_program(struct bpf_program *prog)
92{
93 struct perf_probe_event *pev = NULL;
94 struct bpf_prog_priv *priv = NULL;
95 const char *config_str;
96 int err;
97
98 config_str = bpf_program__title(prog, false);
Wang Nan6371ca3b2015-11-06 13:49:37 +000099 if (IS_ERR(config_str)) {
Wang Nanaa3abf32015-10-14 12:41:15 +0000100 pr_debug("bpf: unable to get title for program\n");
Wang Nan6371ca3b2015-11-06 13:49:37 +0000101 return PTR_ERR(config_str);
Wang Nanaa3abf32015-10-14 12:41:15 +0000102 }
103
104 priv = calloc(sizeof(*priv), 1);
105 if (!priv) {
106 pr_debug("bpf: failed to alloc priv\n");
107 return -ENOMEM;
108 }
109 pev = &priv->pev;
110
111 pr_debug("bpf: config program '%s'\n", config_str);
112 err = parse_perf_probe_command(config_str, pev);
113 if (err < 0) {
114 pr_debug("bpf: '%s' is not a valid config string\n",
115 config_str);
Wang Nand3e0ce32015-11-06 13:58:09 +0000116 err = -BPF_LOADER_ERRNO__CONFIG;
Wang Nanaa3abf32015-10-14 12:41:15 +0000117 goto errout;
118 }
119
120 if (pev->group && strcmp(pev->group, PERF_BPF_PROBE_GROUP)) {
121 pr_debug("bpf: '%s': group for event is set and not '%s'.\n",
122 config_str, PERF_BPF_PROBE_GROUP);
Wang Nand3e0ce32015-11-06 13:58:09 +0000123 err = -BPF_LOADER_ERRNO__GROUP;
Wang Nanaa3abf32015-10-14 12:41:15 +0000124 goto errout;
125 } else if (!pev->group)
126 pev->group = strdup(PERF_BPF_PROBE_GROUP);
127
128 if (!pev->group) {
129 pr_debug("bpf: strdup failed\n");
130 err = -ENOMEM;
131 goto errout;
132 }
133
134 if (!pev->event) {
Wang Nand3e0ce32015-11-06 13:58:09 +0000135 pr_debug("bpf: '%s': event name is missing. Section name should be 'key=value'\n",
Wang Nanaa3abf32015-10-14 12:41:15 +0000136 config_str);
Wang Nand3e0ce32015-11-06 13:58:09 +0000137 err = -BPF_LOADER_ERRNO__EVENTNAME;
Wang Nanaa3abf32015-10-14 12:41:15 +0000138 goto errout;
139 }
140 pr_debug("bpf: config '%s' is ok\n", config_str);
141
142 err = bpf_program__set_private(prog, priv, bpf_prog_priv__clear);
143 if (err) {
144 pr_debug("Failed to set priv for program '%s'\n", config_str);
145 goto errout;
146 }
147
148 return 0;
149
150errout:
151 if (pev)
152 clear_perf_probe_event(pev);
153 free(priv);
154 return err;
155}
156
157static int bpf__prepare_probe(void)
158{
159 static int err = 0;
160 static bool initialized = false;
161
162 /*
163 * Make err static, so if init failed the first, bpf__prepare_probe()
164 * fails each time without calling init_probe_symbol_maps multiple
165 * times.
166 */
167 if (initialized)
168 return err;
169
170 initialized = true;
171 err = init_probe_symbol_maps(false);
172 if (err < 0)
173 pr_debug("Failed to init_probe_symbol_maps\n");
174 probe_conf.max_probes = MAX_PROBES;
175 return err;
176}
177
178int bpf__probe(struct bpf_object *obj)
179{
180 int err = 0;
181 struct bpf_program *prog;
182 struct bpf_prog_priv *priv;
183 struct perf_probe_event *pev;
184
185 err = bpf__prepare_probe();
186 if (err) {
187 pr_debug("bpf__prepare_probe failed\n");
188 return err;
189 }
190
191 bpf_object__for_each_program(prog, obj) {
192 err = config_bpf_program(prog);
193 if (err)
194 goto out;
195
196 err = bpf_program__get_private(prog, (void **)&priv);
197 if (err || !priv)
198 goto out;
199 pev = &priv->pev;
200
201 err = convert_perf_probe_events(pev, 1);
202 if (err < 0) {
203 pr_debug("bpf_probe: failed to convert perf probe events");
204 goto out;
205 }
206
207 err = apply_perf_probe_events(pev, 1);
208 if (err < 0) {
209 pr_debug("bpf_probe: failed to apply perf probe events");
210 goto out;
211 }
212 }
213out:
214 return err < 0 ? err : 0;
215}
216
217#define EVENTS_WRITE_BUFSIZE 4096
218int bpf__unprobe(struct bpf_object *obj)
219{
220 int err, ret = 0;
221 struct bpf_program *prog;
222 struct bpf_prog_priv *priv;
223
224 bpf_object__for_each_program(prog, obj) {
225 int i;
226
227 err = bpf_program__get_private(prog, (void **)&priv);
228 if (err || !priv)
229 continue;
230
231 for (i = 0; i < priv->pev.ntevs; i++) {
232 struct probe_trace_event *tev = &priv->pev.tevs[i];
233 char name_buf[EVENTS_WRITE_BUFSIZE];
234 struct strfilter *delfilter;
235
236 snprintf(name_buf, EVENTS_WRITE_BUFSIZE,
237 "%s:%s", tev->group, tev->event);
238 name_buf[EVENTS_WRITE_BUFSIZE - 1] = '\0';
239
240 delfilter = strfilter__new(name_buf, NULL);
241 if (!delfilter) {
242 pr_debug("Failed to create filter for unprobing\n");
243 ret = -ENOMEM;
244 continue;
245 }
246
247 err = del_perf_probe_events(delfilter);
248 strfilter__delete(delfilter);
249 if (err) {
250 pr_debug("Failed to delete %s\n", name_buf);
251 ret = err;
252 continue;
253 }
254 }
255 }
256 return ret;
257}
258
Wang Nan1e5e3ee2015-10-14 12:41:16 +0000259int bpf__load(struct bpf_object *obj)
260{
261 int err;
262
263 err = bpf_object__load(obj);
264 if (err) {
265 pr_debug("bpf: load objects failed\n");
266 return err;
267 }
268 return 0;
269}
270
Wang Nan4edf30e2015-10-14 12:41:17 +0000271int bpf__foreach_tev(struct bpf_object *obj,
272 bpf_prog_iter_callback_t func,
273 void *arg)
274{
275 struct bpf_program *prog;
276 int err;
277
278 bpf_object__for_each_program(prog, obj) {
279 struct probe_trace_event *tev;
280 struct perf_probe_event *pev;
281 struct bpf_prog_priv *priv;
282 int i, fd;
283
284 err = bpf_program__get_private(prog,
285 (void **)&priv);
286 if (err || !priv) {
287 pr_debug("bpf: failed to get private field\n");
Wang Nand3e0ce32015-11-06 13:58:09 +0000288 return -BPF_LOADER_ERRNO__INTERNAL;
Wang Nan4edf30e2015-10-14 12:41:17 +0000289 }
290
291 pev = &priv->pev;
292 for (i = 0; i < pev->ntevs; i++) {
293 tev = &pev->tevs[i];
294
295 fd = bpf_program__fd(prog);
296 if (fd < 0) {
297 pr_debug("bpf: failed to get file descriptor\n");
298 return fd;
299 }
300
301 err = (*func)(tev, fd, arg);
302 if (err) {
303 pr_debug("bpf: call back failed, stop iterate\n");
304 return err;
305 }
306 }
307 }
308 return 0;
309}
310
Wang Nand3e0ce32015-11-06 13:58:09 +0000311#define ERRNO_OFFSET(e) ((e) - __BPF_LOADER_ERRNO__START)
312#define ERRCODE_OFFSET(c) ERRNO_OFFSET(BPF_LOADER_ERRNO__##c)
313#define NR_ERRNO (__BPF_LOADER_ERRNO__END - __BPF_LOADER_ERRNO__START)
314
315static const char *bpf_loader_strerror_table[NR_ERRNO] = {
316 [ERRCODE_OFFSET(CONFIG)] = "Invalid config string",
317 [ERRCODE_OFFSET(GROUP)] = "Invalid group name",
318 [ERRCODE_OFFSET(EVENTNAME)] = "No event name found in config string",
319 [ERRCODE_OFFSET(INTERNAL)] = "BPF loader internal error",
320 [ERRCODE_OFFSET(COMPILE)] = "Error when compiling BPF scriptlet",
321};
322
Wang Nan6371ca3b2015-11-06 13:49:37 +0000323static int
324bpf_loader_strerror(int err, char *buf, size_t size)
325{
326 char sbuf[STRERR_BUFSIZE];
327 const char *msg;
328
329 if (!buf || !size)
330 return -1;
331
332 err = err > 0 ? err : -err;
333
334 if (err >= __LIBBPF_ERRNO__START)
335 return libbpf_strerror(err, buf, size);
336
Wang Nand3e0ce32015-11-06 13:58:09 +0000337 if (err >= __BPF_LOADER_ERRNO__START && err < __BPF_LOADER_ERRNO__END) {
338 msg = bpf_loader_strerror_table[ERRNO_OFFSET(err)];
339 snprintf(buf, size, "%s", msg);
340 buf[size - 1] = '\0';
341 return 0;
342 }
343
344 if (err >= __BPF_LOADER_ERRNO__END)
345 snprintf(buf, size, "Unknown bpf loader error %d", err);
346 else
347 snprintf(buf, size, "%s",
348 strerror_r(err, sbuf, sizeof(sbuf)));
349
Wang Nan6371ca3b2015-11-06 13:49:37 +0000350 buf[size - 1] = '\0';
Wang Nand3e0ce32015-11-06 13:58:09 +0000351 return -1;
Wang Nan6371ca3b2015-11-06 13:49:37 +0000352}
353
Wang Nanaa3abf32015-10-14 12:41:15 +0000354#define bpf__strerror_head(err, buf, size) \
355 char sbuf[STRERR_BUFSIZE], *emsg;\
356 if (!size)\
357 return 0;\
358 if (err < 0)\
359 err = -err;\
Wang Nan6371ca3b2015-11-06 13:49:37 +0000360 bpf_loader_strerror(err, sbuf, sizeof(sbuf));\
361 emsg = sbuf;\
Wang Nanaa3abf32015-10-14 12:41:15 +0000362 switch (err) {\
363 default:\
364 scnprintf(buf, size, "%s", emsg);\
365 break;
366
367#define bpf__strerror_entry(val, fmt...)\
368 case val: {\
369 scnprintf(buf, size, fmt);\
370 break;\
371 }
372
373#define bpf__strerror_end(buf, size)\
374 }\
375 buf[size - 1] = '\0';
376
Wang Nand3e0ce32015-11-06 13:58:09 +0000377int bpf__strerror_prepare_load(const char *filename, bool source,
378 int err, char *buf, size_t size)
379{
380 size_t n;
381 int ret;
382
383 n = snprintf(buf, size, "Failed to load %s%s: ",
384 filename, source ? " from source" : "");
385 if (n >= size) {
386 buf[size - 1] = '\0';
387 return 0;
388 }
389 buf += n;
390 size -= n;
391
392 ret = bpf_loader_strerror(err, buf, size);
393 buf[size - 1] = '\0';
394 return ret;
395}
396
Wang Nanaa3abf32015-10-14 12:41:15 +0000397int bpf__strerror_probe(struct bpf_object *obj __maybe_unused,
398 int err, char *buf, size_t size)
399{
400 bpf__strerror_head(err, buf, size);
401 bpf__strerror_entry(EEXIST, "Probe point exist. Try use 'perf probe -d \"*\"'");
Wang Nand3e0ce32015-11-06 13:58:09 +0000402 bpf__strerror_entry(EACCES, "You need to be root");
403 bpf__strerror_entry(EPERM, "You need to be root, and /proc/sys/kernel/kptr_restrict should be 0");
404 bpf__strerror_entry(ENOENT, "You need to check probing points in BPF file");
Wang Nanaa3abf32015-10-14 12:41:15 +0000405 bpf__strerror_end(buf, size);
406 return 0;
Wang Nan69d262a2015-10-14 12:41:13 +0000407}
Wang Nan1e5e3ee2015-10-14 12:41:16 +0000408
Wang Nand3e0ce32015-11-06 13:58:09 +0000409int bpf__strerror_load(struct bpf_object *obj,
Wang Nan1e5e3ee2015-10-14 12:41:16 +0000410 int err, char *buf, size_t size)
411{
412 bpf__strerror_head(err, buf, size);
Wang Nand3e0ce32015-11-06 13:58:09 +0000413 case LIBBPF_ERRNO__KVER: {
414 unsigned int obj_kver = bpf_object__get_kversion(obj);
415 unsigned int real_kver;
416
417 if (fetch_kernel_version(&real_kver, NULL, 0)) {
418 scnprintf(buf, size, "Unable to fetch kernel version");
419 break;
420 }
421
422 if (obj_kver != real_kver) {
423 scnprintf(buf, size,
424 "'version' ("KVER_FMT") doesn't match running kernel ("KVER_FMT")",
425 KVER_PARAM(obj_kver),
426 KVER_PARAM(real_kver));
427 break;
428 }
429
430 scnprintf(buf, size, "Failed to load program for unknown reason");
431 break;
432 }
Wang Nan1e5e3ee2015-10-14 12:41:16 +0000433 bpf__strerror_end(buf, size);
434 return 0;
435}