tools/lib/bpf: add support for BPF_PROG_TEST_RUN command
authorAlexei Starovoitov <ast@fb.com>
Fri, 31 Mar 2017 04:45:39 +0000 (21:45 -0700)
committerDavid S. Miller <davem@davemloft.net>
Sat, 1 Apr 2017 19:45:57 +0000 (12:45 -0700)
add support for BPF_PROG_TEST_RUN command to libbpf.a

Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Martin KaFai Lau <kafai@fb.com>
Acked-by: Wang Nan <wangnan0@huawei.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
tools/include/uapi/linux/bpf.h
tools/lib/bpf/bpf.c
tools/lib/bpf/bpf.h

index 1ea08ce355678c0cd3f20d67ebb7b82dbe7f4a93..a1d95386f562fe7ec7e5a2783346f55c8a1cfbd9 100644 (file)
@@ -81,6 +81,7 @@ enum bpf_cmd {
        BPF_OBJ_GET,
        BPF_PROG_ATTACH,
        BPF_PROG_DETACH,
+       BPF_PROG_TEST_RUN,
 };
 
 enum bpf_map_type {
@@ -189,6 +190,17 @@ union bpf_attr {
                __u32           attach_type;
                __u32           attach_flags;
        };
+
+       struct { /* anonymous struct used by BPF_PROG_TEST_RUN command */
+               __u32           prog_fd;
+               __u32           retval;
+               __u32           data_size_in;
+               __u32           data_size_out;
+               __aligned_u64   data_in;
+               __aligned_u64   data_out;
+               __u32           repeat;
+               __u32           duration;
+       } test;
 } __attribute__((aligned(8)));
 
 /* BPF helper function descriptions:
@@ -459,6 +471,18 @@ union bpf_attr {
  *     Return:
  *       > 0 length of the string including the trailing NUL on success
  *       < 0 error
+ *
+ * u64 bpf_bpf_get_socket_cookie(skb)
+ *     Get the cookie for the socket stored inside sk_buff.
+ *     @skb: pointer to skb
+ *     Return: 8 Bytes non-decreasing number on success or 0 if the socket
+ *     field is missing inside sk_buff
+ *
+ * u32 bpf_get_socket_uid(skb)
+ *     Get the owner uid of the socket stored inside sk_buff.
+ *     @skb: pointer to skb
+ *     Return: uid of the socket owner on success or 0 if the socket pointer
+ *     inside sk_buff is NULL
  */
 #define __BPF_FUNC_MAPPER(FN)          \
        FN(unspec),                     \
index 9b58d20e8c93f002ac1e3932d60b707cd6539510..f84c398c11f4c3f1637c32f07d4ecd4da4df74ef 100644 (file)
@@ -209,3 +209,27 @@ int bpf_prog_detach(int target_fd, enum bpf_attach_type type)
 
        return sys_bpf(BPF_PROG_DETACH, &attr, sizeof(attr));
 }
+
+int bpf_prog_test_run(int prog_fd, int repeat, void *data, __u32 size,
+                     void *data_out, __u32 *size_out, __u32 *retval,
+                     __u32 *duration)
+{
+       union bpf_attr attr;
+       int ret;
+
+       bzero(&attr, sizeof(attr));
+       attr.test.prog_fd = prog_fd;
+       attr.test.data_in = ptr_to_u64(data);
+       attr.test.data_out = ptr_to_u64(data_out);
+       attr.test.data_size_in = size;
+       attr.test.repeat = repeat;
+
+       ret = sys_bpf(BPF_PROG_TEST_RUN, &attr, sizeof(attr));
+       if (size_out)
+               *size_out = attr.test.data_size_out;
+       if (retval)
+               *retval = attr.test.retval;
+       if (duration)
+               *duration = attr.test.duration;
+       return ret;
+}
index 93f021932623cb1d156b5fae2fc4b44b77f9cdf8..edb4daeff7a52c44f6bc366c265a7f5a3aadfc10 100644 (file)
@@ -47,6 +47,8 @@ int bpf_obj_get(const char *pathname);
 int bpf_prog_attach(int prog_fd, int attachable_fd, enum bpf_attach_type type,
                    unsigned int flags);
 int bpf_prog_detach(int attachable_fd, enum bpf_attach_type type);
-
+int bpf_prog_test_run(int prog_fd, int repeat, void *data, __u32 size,
+                     void *data_out, __u32 *size_out, __u32 *retval,
+                     __u32 *duration);
 
 #endif