mirror of
https://gitee.com/bianbu-linux/linux-6.6
synced 2025-04-24 14:07:52 -04:00
When building bpftool with !CONFIG_PERF_EVENTS:
skeleton/pid_iter.bpf.c:47:14: error: incomplete definition of type 'struct bpf_perf_link'
perf_link = container_of(link, struct bpf_perf_link, link);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
tools/bpf/bpftool/bootstrap/libbpf/include/bpf/bpf_helpers.h:74:22: note: expanded from macro 'container_of'
((type *)(__mptr - offsetof(type, member))); \
^~~~~~~~~~~~~~~~~~~~~~
tools/bpf/bpftool/bootstrap/libbpf/include/bpf/bpf_helpers.h:68:60: note: expanded from macro 'offsetof'
#define offsetof(TYPE, MEMBER) ((unsigned long)&((TYPE *)0)->MEMBER)
~~~~~~~~~~~^
skeleton/pid_iter.bpf.c:44:9: note: forward declaration of 'struct bpf_perf_link'
struct bpf_perf_link *perf_link;
^
&bpf_perf_link is being defined and used only under the ifdef.
Define struct bpf_perf_link___local with the `preserve_access_index`
attribute inside the pid_iter BPF prog to allow compiling on any
configs. CO-RE will substitute it with the real struct bpf_perf_link
accesses later on.
container_of() uses offsetof(), which does the necessary CO-RE
relocation if the field is specified with `preserve_access_index` - as
is the case for struct bpf_perf_link___local.
Fixes: cbdaf71f7e
("bpftool: Add bpf_cookie to link output")
Suggested-by: Andrii Nakryiko <andrii@kernel.org>
Signed-off-by: Alexander Lobakin <alobakin@pm.me>
Signed-off-by: Quentin Monnet <quentin@isovalent.com>
Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
Link: https://lore.kernel.org/bpf/20230707095425.168126-3-quentin@isovalent.com
112 lines
2.6 KiB
C
112 lines
2.6 KiB
C
// SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
|
|
/* Copyright (c) 2020 Facebook */
|
|
#include <vmlinux.h>
|
|
#include <bpf/bpf_helpers.h>
|
|
#include <bpf/bpf_core_read.h>
|
|
#include <bpf/bpf_tracing.h>
|
|
#include "pid_iter.h"
|
|
|
|
/* keep in sync with the definition in main.h */
|
|
enum bpf_obj_type {
|
|
BPF_OBJ_UNKNOWN,
|
|
BPF_OBJ_PROG,
|
|
BPF_OBJ_MAP,
|
|
BPF_OBJ_LINK,
|
|
BPF_OBJ_BTF,
|
|
};
|
|
|
|
struct bpf_perf_link___local {
|
|
struct bpf_link link;
|
|
struct file *perf_file;
|
|
} __attribute__((preserve_access_index));
|
|
|
|
struct perf_event___local {
|
|
u64 bpf_cookie;
|
|
} __attribute__((preserve_access_index));
|
|
|
|
extern const void bpf_link_fops __ksym;
|
|
extern const void bpf_map_fops __ksym;
|
|
extern const void bpf_prog_fops __ksym;
|
|
extern const void btf_fops __ksym;
|
|
|
|
const volatile enum bpf_obj_type obj_type = BPF_OBJ_UNKNOWN;
|
|
|
|
static __always_inline __u32 get_obj_id(void *ent, enum bpf_obj_type type)
|
|
{
|
|
switch (type) {
|
|
case BPF_OBJ_PROG:
|
|
return BPF_CORE_READ((struct bpf_prog *)ent, aux, id);
|
|
case BPF_OBJ_MAP:
|
|
return BPF_CORE_READ((struct bpf_map *)ent, id);
|
|
case BPF_OBJ_BTF:
|
|
return BPF_CORE_READ((struct btf *)ent, id);
|
|
case BPF_OBJ_LINK:
|
|
return BPF_CORE_READ((struct bpf_link *)ent, id);
|
|
default:
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
/* could be used only with BPF_LINK_TYPE_PERF_EVENT links */
|
|
static __u64 get_bpf_cookie(struct bpf_link *link)
|
|
{
|
|
struct bpf_perf_link___local *perf_link;
|
|
struct perf_event___local *event;
|
|
|
|
perf_link = container_of(link, struct bpf_perf_link___local, link);
|
|
event = BPF_CORE_READ(perf_link, perf_file, private_data);
|
|
return BPF_CORE_READ(event, bpf_cookie);
|
|
}
|
|
|
|
SEC("iter/task_file")
|
|
int iter(struct bpf_iter__task_file *ctx)
|
|
{
|
|
struct file *file = ctx->file;
|
|
struct task_struct *task = ctx->task;
|
|
struct pid_iter_entry e;
|
|
const void *fops;
|
|
|
|
if (!file || !task)
|
|
return 0;
|
|
|
|
switch (obj_type) {
|
|
case BPF_OBJ_PROG:
|
|
fops = &bpf_prog_fops;
|
|
break;
|
|
case BPF_OBJ_MAP:
|
|
fops = &bpf_map_fops;
|
|
break;
|
|
case BPF_OBJ_BTF:
|
|
fops = &btf_fops;
|
|
break;
|
|
case BPF_OBJ_LINK:
|
|
fops = &bpf_link_fops;
|
|
break;
|
|
default:
|
|
return 0;
|
|
}
|
|
|
|
if (file->f_op != fops)
|
|
return 0;
|
|
|
|
__builtin_memset(&e, 0, sizeof(e));
|
|
e.pid = task->tgid;
|
|
e.id = get_obj_id(file->private_data, obj_type);
|
|
|
|
if (obj_type == BPF_OBJ_LINK) {
|
|
struct bpf_link *link = (struct bpf_link *) file->private_data;
|
|
|
|
if (BPF_CORE_READ(link, type) == BPF_LINK_TYPE_PERF_EVENT) {
|
|
e.has_bpf_cookie = true;
|
|
e.bpf_cookie = get_bpf_cookie(link);
|
|
}
|
|
}
|
|
|
|
bpf_probe_read_kernel_str(&e.comm, sizeof(e.comm),
|
|
task->group_leader->comm);
|
|
bpf_seq_write(ctx->meta->seq, &e, sizeof(e));
|
|
|
|
return 0;
|
|
}
|
|
|
|
char LICENSE[] SEC("license") = "Dual BSD/GPL";
|