It's good to be able to compile bpf_iter selftest even on systems that don't have the very latest vmlinux.h, e.g., for libbpf tests against older kernels in Travis CI. To that extent, re-define bpf_iter_meta and corresponding bpf_iter context structs in each selftest. To avoid type clashes with vmlinux.h, rename vmlinux.h's definitions to get them out of the way. Signed-off-by: Andrii Nakryiko <andriin@fb.com> Signed-off-by: Alexei Starovoitov <ast@kernel.org> Acked-by: Yonghong Song <yhs@fb.com> Acked-by: Jesper Dangaard Brouer <brouer@redhat.com> Link: https://lore.kernel.org/bpf/20200518234516.3915052-1-andriin@fb.com
83 lines
2.1 KiB
C
83 lines
2.1 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
/* Copyright (c) 2020 Facebook */
|
|
/* "undefine" structs in vmlinux.h, because we "override" them below */
|
|
#define bpf_iter_meta bpf_iter_meta___not_used
|
|
#define bpf_iter__netlink bpf_iter__netlink___not_used
|
|
#include "vmlinux.h"
|
|
#undef bpf_iter_meta
|
|
#undef bpf_iter__netlink
|
|
#include <bpf/bpf_helpers.h>
|
|
#include <bpf/bpf_tracing.h>
|
|
|
|
char _license[] SEC("license") = "GPL";
|
|
|
|
#define sk_rmem_alloc sk_backlog.rmem_alloc
|
|
#define sk_refcnt __sk_common.skc_refcnt
|
|
|
|
struct bpf_iter_meta {
|
|
struct seq_file *seq;
|
|
__u64 session_id;
|
|
__u64 seq_num;
|
|
} __attribute__((preserve_access_index));
|
|
|
|
struct bpf_iter__netlink {
|
|
struct bpf_iter_meta *meta;
|
|
struct netlink_sock *sk;
|
|
} __attribute__((preserve_access_index));
|
|
|
|
static inline struct inode *SOCK_INODE(struct socket *socket)
|
|
{
|
|
return &container_of(socket, struct socket_alloc, socket)->vfs_inode;
|
|
}
|
|
|
|
SEC("iter/netlink")
|
|
int dump_netlink(struct bpf_iter__netlink *ctx)
|
|
{
|
|
struct seq_file *seq = ctx->meta->seq;
|
|
struct netlink_sock *nlk = ctx->sk;
|
|
unsigned long group, ino;
|
|
struct inode *inode;
|
|
struct socket *sk;
|
|
struct sock *s;
|
|
|
|
if (nlk == (void *)0)
|
|
return 0;
|
|
|
|
if (ctx->meta->seq_num == 0)
|
|
BPF_SEQ_PRINTF(seq, "sk Eth Pid Groups "
|
|
"Rmem Wmem Dump Locks Drops "
|
|
"Inode\n");
|
|
|
|
s = &nlk->sk;
|
|
BPF_SEQ_PRINTF(seq, "%pK %-3d ", s, s->sk_protocol);
|
|
|
|
if (!nlk->groups) {
|
|
group = 0;
|
|
} else {
|
|
/* FIXME: temporary use bpf_probe_read here, needs
|
|
* verifier support to do direct access.
|
|
*/
|
|
bpf_probe_read(&group, sizeof(group), &nlk->groups[0]);
|
|
}
|
|
BPF_SEQ_PRINTF(seq, "%-10u %08x %-8d %-8d %-5d %-8d ",
|
|
nlk->portid, (u32)group,
|
|
s->sk_rmem_alloc.counter,
|
|
s->sk_wmem_alloc.refs.counter - 1,
|
|
nlk->cb_running, s->sk_refcnt.refs.counter);
|
|
|
|
sk = s->sk_socket;
|
|
if (!sk) {
|
|
ino = 0;
|
|
} else {
|
|
/* FIXME: container_of inside SOCK_INODE has a forced
|
|
* type conversion, and direct access cannot be used
|
|
* with current verifier.
|
|
*/
|
|
inode = SOCK_INODE(sk);
|
|
bpf_probe_read(&ino, sizeof(ino), &inode->i_ino);
|
|
}
|
|
BPF_SEQ_PRINTF(seq, "%-8u %-8lu\n", s->sk_drops.counter, ino);
|
|
|
|
return 0;
|
|
}
|