Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp10906226ybl; Fri, 27 Dec 2019 04:23:51 -0800 (PST) X-Google-Smtp-Source: APXvYqyq1K+2yPQukU8OoNV5sP1Rek0NUG4KvkDV4IyhW2QWXVXlfY84YPCrOTNrv8JjJDFfGW80 X-Received: by 2002:a05:6830:1185:: with SMTP id u5mr52890956otq.147.1577449431077; Fri, 27 Dec 2019 04:23:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1577449431; cv=none; d=google.com; s=arc-20160816; b=HBod3eRFoz7j/uL/0h3X739ClCy1Gb7Xv1TAE/srVxDmNkJYgcepAW00tf8ZNG3SSw YUEBRxe7InrNPx+Tc0XGeHAOofa3nCW2papbAyQhuT69NCDafRXHFJ/zfLAg8POpjJaJ v4E358QFIPLjJw7gzOwIN12L/H0+aISwjW50d84sVuZpNdlfB7b2arj70O8+wnwSJKQv FVBWb3KVMR/1WBju5NQ+UAazDThnMnv8GfloGCRjld50nmVFoY8MWI50qtMX+gKw9y0L JH4qO89zmkmawi/eb/Jl+FWlNKhimWcf+gROG/k2+K/R4hldSNB+NwcUDbXrZ/X+PjGN IK2w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=W4aTPbsGSBvnf51jUWec40cVJPKO1EEj83M/HF8KcJ0=; b=nXGW40KgfAmweEoH/JE/6FoEBGVyZpxAGEJdjA5iq7m94+uH+R50e6TCrdbFV8QxMx WP7VWLC/x5kNDKoXKncOMj8o1D51IkEZ6A/aBqhLldEgTa/ExhpPdWSHk4ucUEnrT24g t4FHqVrnFb1jQndNY8LgcRncg5oaG1O6lbc04rLQuyrQ3I873uWBu2omDXUa8hNVvCCZ cRR3mJjcNzS7GX4fEYyo119fGHCAeqoY61VDq6tknaedPA32/d5AxfHfsvav6AmW/BA/ dGNhbHIGF36hL29Z05b6CA8xqfc3vFjGNB8iw9onhR3j2AYH0Q6BaUzX/7seMFrv403h A4MA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k23si11145856oiw.238.2019.12.27.04.23.38; Fri, 27 Dec 2019 04:23:51 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727200AbfL0MWA (ORCPT + 99 others); Fri, 27 Dec 2019 07:22:00 -0500 Received: from mx2.suse.de ([195.135.220.15]:38838 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726379AbfL0MVu (ORCPT ); Fri, 27 Dec 2019 07:21:50 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 62D25B277; Fri, 27 Dec 2019 12:21:48 +0000 (UTC) From: Michal Rostecki To: bpf@vger.kernel.org Cc: Alexei Starovoitov , Daniel Borkmann , Martin KaFai Lau , Song Liu , Yonghong Song , Andrii Nakryiko , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Michal Rostecki Subject: [PATCH bpf-next 1/2] libbpf: Add probe for large INSN limit Date: Fri, 27 Dec 2019 12:06:04 +0100 Message-Id: <20191227110605.1757-2-mrostecki@suse.de> X-Mailer: git-send-email 2.16.4 In-Reply-To: <20191227110605.1757-1-mrostecki@suse.de> References: <20191227110605.1757-1-mrostecki@suse.de> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Introduce a new probe which checks whether kernel has large maximum program size (1M) which was increased in commit c04c0d2b968a ("bpf: increase complexity limit and maximum program size"). Based on the similar check in Cilium[0], authored by Daniel Borkmann. [0] https://github.com/cilium/cilium/commit/657d0f585afd26232cfa5d4e70b6f64d2ea91596 Co-authored-by: Daniel Borkmann Signed-off-by: Michal Rostecki --- tools/lib/bpf/libbpf.h | 1 + tools/lib/bpf/libbpf.map | 1 + tools/lib/bpf/libbpf_probes.c | 23 +++++++++++++++++++++++ 3 files changed, 25 insertions(+) diff --git a/tools/lib/bpf/libbpf.h b/tools/lib/bpf/libbpf.h index fe592ef48f1b..26bf539f1b3c 100644 --- a/tools/lib/bpf/libbpf.h +++ b/tools/lib/bpf/libbpf.h @@ -521,6 +521,7 @@ LIBBPF_API bool bpf_probe_prog_type(enum bpf_prog_type prog_type, LIBBPF_API bool bpf_probe_map_type(enum bpf_map_type map_type, __u32 ifindex); LIBBPF_API bool bpf_probe_helper(enum bpf_func_id id, enum bpf_prog_type prog_type, __u32 ifindex); +LIBBPF_API bool bpf_probe_large_insn_limit(__u32 ifindex); /* * Get bpf_prog_info in continuous memory diff --git a/tools/lib/bpf/libbpf.map b/tools/lib/bpf/libbpf.map index e9713a574243..b300d74c921a 100644 --- a/tools/lib/bpf/libbpf.map +++ b/tools/lib/bpf/libbpf.map @@ -219,6 +219,7 @@ LIBBPF_0.0.7 { bpf_object__detach_skeleton; bpf_object__load_skeleton; bpf_object__open_skeleton; + bpf_probe_large_insn_limit; bpf_prog_attach_xattr; bpf_program__attach; bpf_program__name; diff --git a/tools/lib/bpf/libbpf_probes.c b/tools/lib/bpf/libbpf_probes.c index a9eb8b322671..925f95106a52 100644 --- a/tools/lib/bpf/libbpf_probes.c +++ b/tools/lib/bpf/libbpf_probes.c @@ -17,6 +17,8 @@ #include "libbpf.h" #include "libbpf_internal.h" +#define INSN_REPEAT 4128 + static bool grep(const char *buffer, const char *pattern) { return !!strstr(buffer, pattern); @@ -321,3 +323,24 @@ bool bpf_probe_helper(enum bpf_func_id id, enum bpf_prog_type prog_type, return res; } + +/* + * Probe for availability of kernel commit (5.3): + * + * c04c0d2b968a ("bpf: increase complexity limit and maximum program size") + */ +bool bpf_probe_large_insn_limit(__u32 ifindex) +{ + struct bpf_insn insns[INSN_REPEAT + 1]; + int i; + + for (i = 0; i < INSN_REPEAT; i++) + insns[i] = BPF_MOV64_IMM(BPF_REG_0, 1); + insns[INSN_REPEAT] = BPF_EXIT_INSN(); + + errno = 0; + probe_load(BPF_PROG_TYPE_SCHED_CLS, insns, ARRAY_SIZE(insns), NULL, 0, + ifindex); + + return errno != E2BIG && errno != EINVAL; +} -- 2.16.4