/* * Check bpf syscall decoding. * * Copyright (c) 2015-2017 Dmitry V. Levin * Copyright (c) 2015-2019 The strace developers. * All rights reserved. * * SPDX-License-Identifier: GPL-2.0-or-later */ #include "tests.h" #include #include #include #include #include #include "scno.h" #ifdef HAVE_LINUX_BPF_H # include #endif #include "bpf_attr.h" #include "print_fields.h" #include "xlat.h" #include "xlat/bpf_commands.h" #if defined MPERS_IS_m32 || SIZEOF_KERNEL_LONG_T > 4 # define BIG_ADDR(addr64_, addr32_) addr64_ # define BIG_ADDR_MAYBE(addr_) #elif defined __arm__ || defined __i386__ || defined __mips__ \ || defined __powerpc__ || defined __riscv__ || defined __s390__ \ || defined __sparc__ || defined __tile__ # define BIG_ADDR(addr64_, addr32_) addr64_ " or " addr32_ # define BIG_ADDR_MAYBE(addr_) addr_ " or " #else # define BIG_ADDR(addr64_, addr32_) addr32_ # define BIG_ADDR_MAYBE(addr_) #endif #ifndef HAVE_STRUCT_BPF_INSN struct bpf_insn { uint8_t code; uint8_t dst_reg:4; uint8_t src_reg:4; int16_t off; int32_t imm; }; #endif #define BPF_ATTR_DATA_FIELD(cmd_) struct cmd_ ## _struct cmd_ ## _data union bpf_attr_data { BPF_ATTR_DATA_FIELD(BPF_MAP_CREATE); BPF_ATTR_DATA_FIELD(BPF_MAP_LOOKUP_ELEM); BPF_ATTR_DATA_FIELD(BPF_MAP_UPDATE_ELEM); BPF_ATTR_DATA_FIELD(BPF_MAP_DELETE_ELEM); BPF_ATTR_DATA_FIELD(BPF_MAP_GET_NEXT_KEY); BPF_ATTR_DATA_FIELD(BPF_PROG_LOAD); BPF_ATTR_DATA_FIELD(BPF_OBJ_PIN); BPF_ATTR_DATA_FIELD(BPF_PROG_ATTACH); BPF_ATTR_DATA_FIELD(BPF_PROG_DETACH); BPF_ATTR_DATA_FIELD(BPF_PROG_TEST_RUN); BPF_ATTR_DATA_FIELD(BPF_PROG_GET_NEXT_ID); BPF_ATTR_DATA_FIELD(BPF_PROG_GET_FD_BY_ID); BPF_ATTR_DATA_FIELD(BPF_MAP_GET_FD_BY_ID); BPF_ATTR_DATA_FIELD(BPF_OBJ_GET_INFO_BY_FD); BPF_ATTR_DATA_FIELD(BPF_PROG_QUERY); BPF_ATTR_DATA_FIELD(BPF_RAW_TRACEPOINT_OPEN); BPF_ATTR_DATA_FIELD(BPF_BTF_LOAD); BPF_ATTR_DATA_FIELD(BPF_BTF_GET_FD_BY_ID); BPF_ATTR_DATA_FIELD(BPF_TASK_FD_QUERY); BPF_ATTR_DATA_FIELD(BPF_MAP_FREEZE); char char_data[256]; }; struct bpf_attr_check { union bpf_attr_data data; size_t size; const char *str; void (*init_fn)(struct bpf_attr_check *check); void (*print_fn)(const struct bpf_attr_check *check, unsigned long addr); }; struct bpf_check { kernel_ulong_t cmd; const char *cmd_str; const struct bpf_attr_check *checks; size_t count; }; static const kernel_ulong_t long_bits = (kernel_ulong_t) 0xfacefeed00000000ULL; static const char *errstr; static unsigned int sizeof_attr = sizeof(union bpf_attr_data); static unsigned int page_size; static unsigned long end_of_page; static long sys_bpf(kernel_ulong_t cmd, kernel_ulong_t attr, kernel_ulong_t size) { long rc = syscall(__NR_bpf, cmd, attr, size); errstr = sprintrc(rc); #ifdef INJECT_RETVAL if (rc != INJECT_RETVAL) error_msg_and_fail("Got a return value of %ld != %d", rc, INJECT_RETVAL); static char inj_errstr[4096]; snprintf(inj_errstr, sizeof(inj_errstr), "%s (INJECTED)", errstr); errstr = inj_errstr; #endif return rc; } #if VERBOSE # define print_extra_data(addr_, offs_, size_) \ do { \ printf("/* bytes %u..%u */ ", (offs_), (size_) + (offs_) - 1); \ print_quoted_hex((addr_) + (offs_), (size_)); \ } while (0) #else # define print_extra_data(addr_, offs_, size_) printf("...") #endif static void print_bpf_attr(const struct bpf_attr_check *check, unsigned long addr) { if (check->print_fn) check->print_fn(check, addr); else printf("%s", check->str); } static void test_bpf(const struct bpf_check *cmd_check) { const struct bpf_attr_check *check = 0; const union bpf_attr_data *data = 0; unsigned int offset = 0; /* zero addr */ sys_bpf(cmd_check->cmd, 0, long_bits | sizeof(union bpf_attr_data)); printf("bpf(%s, NULL, %u) = %s\n", cmd_check->cmd_str, sizeof_attr, errstr); /* zero size */ unsigned long addr = end_of_page - sizeof_attr; sys_bpf(cmd_check->cmd, addr, long_bits); printf("bpf(%s, %#lx, 0) = %s\n", cmd_check->cmd_str, addr, errstr); for (size_t i = 0; i < cmd_check->count; i++) { check = &cmd_check->checks[i]; if (check->init_fn) check->init_fn((struct bpf_attr_check *) check); data = &check->data; offset = check->size; addr = end_of_page - offset; memcpy((void *) addr, data, offset); /* starting piece of bpf_attr_data */ sys_bpf(cmd_check->cmd, addr, offset); printf("bpf(%s, {", cmd_check->cmd_str); print_bpf_attr(check, addr); printf("}, %u) = %s\n", offset, errstr); /* short read of the starting piece */ sys_bpf(cmd_check->cmd, addr + 1, offset); printf("bpf(%s, %#lx, %u) = %s\n", cmd_check->cmd_str, addr + 1, offset, errstr); } if (offset < sizeof_attr) { /* short read of the whole bpf_attr_data */ memcpy((void *) end_of_page - sizeof_attr + 1, data, offset); addr = end_of_page - sizeof_attr + 1; memset((void *) addr + offset, 0, sizeof_attr - offset - 1); sys_bpf(cmd_check->cmd, addr, sizeof_attr); printf("bpf(%s, %#lx, %u) = %s\n", cmd_check->cmd_str, addr, sizeof_attr, errstr); /* the whole bpf_attr_data */ memcpy((void *) end_of_page - sizeof_attr, data, offset); addr = end_of_page - sizeof_attr; memset((void *) addr + offset, 0, sizeof_attr - offset); sys_bpf(cmd_check->cmd, addr, sizeof_attr); printf("bpf(%s, {", cmd_check->cmd_str); print_bpf_attr(check, addr); printf("}, %u) = %s\n", sizeof_attr, errstr); /* non-zero bytes after the relevant part */ fill_memory_ex((void *) addr + offset, sizeof_attr - offset, '0', 10); sys_bpf(cmd_check->cmd, addr, sizeof_attr); printf("bpf(%s, {", cmd_check->cmd_str); print_bpf_attr(check, addr); printf(", "); print_extra_data((char *) addr, offset, sizeof_attr - offset); printf("}, %u) = %s\n", sizeof_attr, errstr); } /* short read of the whole page */ memcpy((void *) end_of_page - page_size + 1, data, offset); addr = end_of_page - page_size + 1; memset((void *) addr + offset, 0, page_size - offset - 1); sys_bpf(cmd_check->cmd, addr, page_size); printf("bpf(%s, %#lx, %u) = %s\n", cmd_check->cmd_str, addr, page_size, errstr); /* the whole page */ memcpy((void *) end_of_page - page_size, data, offset); addr = end_of_page - page_size; memset((void *) addr + offset, 0, page_size - offset); sys_bpf(cmd_check->cmd, addr, page_size); printf("bpf(%s, {", cmd_check->cmd_str); print_bpf_attr(check, addr); printf("}, %u) = %s\n", page_size, errstr); /* non-zero bytes after the whole bpf_attr_data */ fill_memory_ex((void *) addr + offset, page_size - offset, '0', 10); sys_bpf(cmd_check->cmd, addr, page_size); printf("bpf(%s, {", cmd_check->cmd_str); print_bpf_attr(check, addr); printf(", "); print_extra_data((char *) addr, offset, page_size - offset); printf("}, %u) = %s\n", page_size, errstr); /* more than a page */ sys_bpf(cmd_check->cmd, addr, page_size + 1); printf("bpf(%s, %#lx, %u) = %s\n", cmd_check->cmd_str, addr, page_size + 1, errstr); } static void init_BPF_MAP_CREATE_attr7(struct bpf_attr_check *check) { struct BPF_MAP_CREATE_struct *attr = &check->data.BPF_MAP_CREATE_data; attr->map_ifindex = ifindex_lo(); } static struct bpf_attr_check BPF_MAP_CREATE_checks[] = { { .data = { .BPF_MAP_CREATE_data = { .map_type = 2 } }, .size = offsetofend(struct BPF_MAP_CREATE_struct, map_type), .str = "map_type=BPF_MAP_TYPE_ARRAY, key_size=0, value_size=0" ", max_entries=0" }, { /* 1 */ .data = { .BPF_MAP_CREATE_data = { .map_type = 20, .key_size = 4, .value_size = 8, .max_entries = 256, .map_flags = 63, .inner_map_fd = -1, .numa_node = 3141592653, .map_name = "0123456789abcde", } }, .size = offsetof(struct BPF_MAP_CREATE_struct, map_name) + 8, .str = "map_type=BPF_MAP_TYPE_REUSEPORT_SOCKARRAY, key_size=4" ", value_size=8, max_entries=256" ", map_flags=BPF_F_NO_PREALLOC|BPF_F_NO_COMMON_LRU" "|BPF_F_NUMA_NODE|BPF_F_RDONLY|BPF_F_WRONLY" "|BPF_F_STACK_BUILD_ID" ", inner_map_fd=-1" ", numa_node=3141592653" ", map_name=\"0123456\"...", }, { /* 2 */ .data = { .BPF_MAP_CREATE_data = { .map_type = 26, .key_size = 0xface1e55, .value_size = 0xbadc0ded, .max_entries = 0xbeefcafe, .map_flags = 0xfffffc00, .inner_map_fd = 2718281828, .numa_node = -1, .map_name = "", .map_ifindex = 3141592653, } }, .size = offsetofend(struct BPF_MAP_CREATE_struct, map_ifindex), .str = "map_type=0x1a /* BPF_MAP_TYPE_??? */" ", key_size=4207812181, value_size=3134983661" ", max_entries=3203386110" ", map_flags=0xfffffc00 /* BPF_F_??? */" ", inner_map_fd=-1576685468" ", map_name=\"\", map_ifindex=3141592653", }, { /* 3 */ .data = { .BPF_MAP_CREATE_data = { .map_type = 0xdeadf00d, .key_size = 0xface1e55, .value_size = 0xbadc0ded, .max_entries = 0xbeefcafe, .map_flags = 0xc0dedead, .inner_map_fd = 2718281828, .numa_node = -1, } }, .size = offsetofend(struct BPF_MAP_CREATE_struct, map_flags), .str = "map_type=0xdeadf00d /* BPF_MAP_TYPE_??? */" ", key_size=4207812181, value_size=3134983661" ", max_entries=3203386110" ", map_flags=BPF_F_NO_PREALLOC|BPF_F_NUMA_NODE" "|BPF_F_RDONLY|BPF_F_STACK_BUILD_ID" "|BPF_F_RDONLY_PROG|BPF_F_CLONE|0xc0dedc00", }, { /* 4 */ .data = { .BPF_MAP_CREATE_data = { .map_type = 0xdeadf00d, .key_size = 0xface1e55, .value_size = 0xbadc0ded, .max_entries = 0xbeefcafe, .map_flags = 0xc0dedead, .inner_map_fd = 2718281828, .numa_node = -1, } }, .size = offsetofend(struct BPF_MAP_CREATE_struct, inner_map_fd), .str = "map_type=0xdeadf00d /* BPF_MAP_TYPE_??? */" ", key_size=4207812181, value_size=3134983661" ", max_entries=3203386110" ", map_flags=BPF_F_NO_PREALLOC|BPF_F_NUMA_NODE" "|BPF_F_RDONLY|BPF_F_STACK_BUILD_ID" "|BPF_F_RDONLY_PROG|BPF_F_CLONE|0xc0dedc00" ", inner_map_fd=-1576685468", }, { /* 5 */ .data = { .BPF_MAP_CREATE_data = { .map_type = 0xdeadf00d, .key_size = 0xface1e55, .value_size = 0xbadc0ded, .max_entries = 0xbeefcafe, .map_flags = 0xc0dedead, .inner_map_fd = 2718281828, .numa_node = -1, } }, .size = offsetofend(struct BPF_MAP_CREATE_struct, numa_node), .str = "map_type=0xdeadf00d /* BPF_MAP_TYPE_??? */" ", key_size=4207812181, value_size=3134983661" ", max_entries=3203386110" ", map_flags=BPF_F_NO_PREALLOC|BPF_F_NUMA_NODE" "|BPF_F_RDONLY|BPF_F_STACK_BUILD_ID" "|BPF_F_RDONLY_PROG|BPF_F_CLONE|0xc0dedc00" ", inner_map_fd=-1576685468" ", numa_node=4294967295 /* NUMA_NO_NODE */", }, { /* 6 */ .data = { .BPF_MAP_CREATE_data = { .map_type = 0xdeadf00d, .key_size = 0xface1e55, .value_size = 0xbadc0ded, .max_entries = 0xbeefcafe, .map_flags = 0xc0dedead, .inner_map_fd = 2718281828, .numa_node = -1, .map_name = "fedcba9876543210", } }, .size = offsetofend(struct BPF_MAP_CREATE_struct, map_name), .str = "map_type=0xdeadf00d /* BPF_MAP_TYPE_??? */" ", key_size=4207812181, value_size=3134983661" ", max_entries=3203386110" ", map_flags=BPF_F_NO_PREALLOC|BPF_F_NUMA_NODE" "|BPF_F_RDONLY|BPF_F_STACK_BUILD_ID" "|BPF_F_RDONLY_PROG|BPF_F_CLONE|0xc0dedc00" ", inner_map_fd=-1576685468" ", numa_node=4294967295 /* NUMA_NO_NODE */" ", map_name=\"fedcba987654321\"...", }, { /* 7 */ .data = { .BPF_MAP_CREATE_data = { .map_type = 0xdeadf00d, .key_size = 0xface1e55, .value_size = 0xbadc0ded, .max_entries = 0xbeefcafe, .map_flags = 0xc0dedead, .inner_map_fd = 2718281828, .numa_node = -1, .map_name = "0123456789abcde", } }, .size = offsetofend(struct BPF_MAP_CREATE_struct, map_ifindex), .str = "map_type=0xdeadf00d /* BPF_MAP_TYPE_??? */" ", key_size=4207812181, value_size=3134983661" ", max_entries=3203386110" ", map_flags=BPF_F_NO_PREALLOC|BPF_F_NUMA_NODE" "|BPF_F_RDONLY|BPF_F_STACK_BUILD_ID" "|BPF_F_RDONLY_PROG|BPF_F_CLONE|0xc0dedc00" ", inner_map_fd=-1576685468" ", numa_node=4294967295 /* NUMA_NO_NODE */" ", map_name=\"0123456789abcde\"" ", map_ifindex=" IFINDEX_LO_STR, .init_fn = init_BPF_MAP_CREATE_attr7, }, { /* 8 */ .data = { .BPF_MAP_CREATE_data = { .btf_fd = 0xbadc0ded, .btf_key_type_id = 0xfacefeed, .btf_value_type_id = 0xcafef00d } }, .size = offsetofend(struct BPF_MAP_CREATE_struct, btf_value_type_id), .str = "map_type=BPF_MAP_TYPE_UNSPEC" ", key_size=0" ", value_size=0" ", max_entries=0" ", map_flags=0" ", inner_map_fd=0" ", map_name=\"\"" ", map_ifindex=0" ", btf_fd=-1159983635" ", btf_key_type_id=4207869677" ", btf_value_type_id=3405705229" }, }; static const struct bpf_attr_check BPF_MAP_LOOKUP_ELEM_checks[] = { { .data = { .BPF_MAP_LOOKUP_ELEM_data = { .map_fd = -1 } }, .size = offsetofend(struct BPF_MAP_LOOKUP_ELEM_struct, map_fd), .str = "map_fd=-1, key=NULL, value=NULL" }, { .data = { .BPF_MAP_LOOKUP_ELEM_data = { .map_fd = -1, .key = 0xdeadbeef, .value = 0xbadc0ded } }, .size = offsetofend(struct BPF_MAP_LOOKUP_ELEM_struct, value), .str = "map_fd=-1, key=0xdeadbeef, value=0xbadc0ded" } }; #define BPF_MAP_LOOKUP_AND_DELETE_ELEM_checks BPF_MAP_LOOKUP_ELEM_checks static const struct bpf_attr_check BPF_MAP_UPDATE_ELEM_checks[] = { { .data = { .BPF_MAP_UPDATE_ELEM_data = { .map_fd = -1 } }, .size = offsetofend(struct BPF_MAP_UPDATE_ELEM_struct, map_fd), .str = "map_fd=-1, key=NULL, value=NULL, flags=BPF_ANY" }, { .data = { .BPF_MAP_UPDATE_ELEM_data = { .map_fd = -1, .key = 0xdeadbeef, .value = 0xbadc0ded, .flags = 2 } }, .size = offsetofend(struct BPF_MAP_UPDATE_ELEM_struct, flags), .str = "map_fd=-1, key=0xdeadbeef, value=0xbadc0ded" ", flags=BPF_EXIST" } }; static const struct bpf_attr_check BPF_MAP_DELETE_ELEM_checks[] = { { .data = { .BPF_MAP_DELETE_ELEM_data = { .map_fd = -1 } }, .size = offsetofend(struct BPF_MAP_DELETE_ELEM_struct, map_fd), .str = "map_fd=-1, key=NULL" }, { .data = { .BPF_MAP_DELETE_ELEM_data = { .map_fd = -1, .key = 0xdeadbeef } }, .size = offsetofend(struct BPF_MAP_DELETE_ELEM_struct, key), .str = "map_fd=-1, key=0xdeadbeef" } }; static const struct bpf_attr_check BPF_MAP_GET_NEXT_KEY_checks[] = { { .data = { .BPF_MAP_GET_NEXT_KEY_data = { .map_fd = -1 } }, .size = offsetofend(struct BPF_MAP_GET_NEXT_KEY_struct, map_fd), .str = "map_fd=-1, key=NULL, next_key=NULL" }, { .data = { .BPF_MAP_GET_NEXT_KEY_data = { .map_fd = -1, .key = 0xdeadbeef, .next_key = 0xbadc0ded } }, .size = offsetofend(struct BPF_MAP_GET_NEXT_KEY_struct, next_key), .str = "map_fd=-1, key=0xdeadbeef, next_key=0xbadc0ded" } }; static const struct bpf_attr_check BPF_MAP_FREEZE_checks[] = { { .data = { .BPF_MAP_FREEZE_data = { .map_fd = -1 } }, .size = offsetofend(struct BPF_MAP_FREEZE_struct, map_fd), .str = "map_fd=-1" } }; static const struct bpf_insn insns[] = { { .code = 0x95, .dst_reg = 10, .src_reg = 11, .off = 0xdead, .imm = 0xbadc0ded, }, }; static const char license[] = "GPL"; static const char pathname[] = "/sys/fs/bpf/foo/bar"; static char *log_buf; /* * This has to be a macro, otherwise the compiler complains that * initializer element is not constant. */ #define log_buf_size 4096U static inline char * get_log_buf(void) { if (!log_buf) log_buf = tail_alloc(log_buf_size); return log_buf; } static inline char * get_log_buf_tail(void) { return get_log_buf() + log_buf_size; } #if VERBOSE # define INSNS_FMT \ "[{code=BPF_JMP|BPF_K|BPF_EXIT, dst_reg=BPF_REG_10" \ ", src_reg=0xb /* BPF_REG_??? */, off=%d, imm=%#x}]" # define INSNS_ARG insns[0].off, insns[0].imm #else # define INSNS_FMT "%p" # define INSNS_ARG insns #endif static void init_BPF_PROG_LOAD_attr3(struct bpf_attr_check *check) { struct BPF_PROG_LOAD_struct *attr = &check->data.BPF_PROG_LOAD_data; attr->insns = (uintptr_t) insns; attr->license = (uintptr_t) license; attr->log_buf = (uintptr_t) get_log_buf_tail(); } static void print_BPF_PROG_LOAD_attr3(const struct bpf_attr_check *check, unsigned long addr) { printf("prog_type=BPF_PROG_TYPE_SOCKET_FILTER, insn_cnt=%u" ", insns=" INSNS_FMT ", license=\"%s\", log_level=2718281828" ", log_size=%u, log_buf=%p" ", kern_version=KERNEL_VERSION(51966, 240, 13)" ", prog_flags=0x10 /* BPF_F_??? */" ", prog_name=\"0123456789abcde\"..., prog_ifindex=3203399405", (unsigned int) ARRAY_SIZE(insns), INSNS_ARG, license, log_buf_size, get_log_buf_tail()); } static void init_BPF_PROG_LOAD_attr4(struct bpf_attr_check *check) { struct BPF_PROG_LOAD_struct *attr = &check->data.BPF_PROG_LOAD_data; attr->insns = (uintptr_t) insns; attr->license = (uintptr_t) license; attr->log_buf = (uintptr_t) get_log_buf(); attr->prog_ifindex = ifindex_lo(); strncpy(log_buf, "log test", 9); } static void print_BPF_PROG_LOAD_attr4(const struct bpf_attr_check *check, unsigned long addr) { printf("prog_type=BPF_PROG_TYPE_UNSPEC, insn_cnt=%u, insns=" INSNS_FMT ", license=\"%s\", log_level=2718281828, log_size=4" ", log_buf=\"log \"..." ", kern_version=KERNEL_VERSION(51966, 240, 13)" ", prog_flags=BPF_F_STRICT_ALIGNMENT|BPF_F_ANY_ALIGNMENT" "|BPF_F_TEST_RND_HI32|BPF_F_TEST_STATE_FREQ|0x10" ", prog_name=\"0123456789abcde\"..., prog_ifindex=%s" ", expected_attach_type=BPF_CGROUP_INET6_BIND", (unsigned int) ARRAY_SIZE(insns), INSNS_ARG, license, IFINDEX_LO_STR); } static struct bpf_attr_check BPF_PROG_LOAD_checks[] = { { .data = { .BPF_PROG_LOAD_data = { .prog_type = 1 } }, .size = offsetofend(struct BPF_PROG_LOAD_struct, prog_type), .str = "prog_type=BPF_PROG_TYPE_SOCKET_FILTER" ", insn_cnt=0, insns=NULL, license=NULL" }, { /* 1 */ .data = { .BPF_PROG_LOAD_data = { .prog_type = 25, .insn_cnt = 0xbadc0ded, .insns = 0, .license = 0, .log_level = 42, .log_size = 3141592653U, .log_buf = 0, .kern_version = 0xcafef00d, .prog_flags = 0, } }, .size = offsetofend(struct BPF_PROG_LOAD_struct, prog_flags), .str = "prog_type=0x19 /* BPF_PROG_TYPE_??? */" ", insn_cnt=3134983661, insns=NULL, license=NULL" ", log_level=42, log_size=3141592653, log_buf=NULL" ", kern_version=KERNEL_VERSION(51966, 240, 13)" ", prog_flags=0", }, { /* 2 */ .data = { .BPF_PROG_LOAD_data = { .prog_type = 20, .insn_cnt = 0xbadc0ded, .insns = 0xffffffff00000000, .license = 0xffffffff00000000, .log_level = 2718281828U, .log_size = log_buf_size, .log_buf = 0xffffffff00000000, .kern_version = 0xcafef00d, .prog_flags = 1, .prog_name = "fedcba987654321", } }, .size = offsetofend(struct BPF_PROG_LOAD_struct, prog_name), .str = "prog_type=BPF_PROG_TYPE_SK_REUSEPORT" ", insn_cnt=3134983661" ", insns=" BIG_ADDR("0xffffffff00000000", "NULL") ", license=" BIG_ADDR("0xffffffff00000000", "NULL") ", log_level=2718281828, log_size=4096" ", log_buf=" BIG_ADDR("0xffffffff00000000", "NULL") ", kern_version=KERNEL_VERSION(51966, 240, 13)" ", prog_flags=BPF_F_STRICT_ALIGNMENT" ", prog_name=\"fedcba987654321\"", }, { /* 3 */ .data = { .BPF_PROG_LOAD_data = { .prog_type = 1, .insn_cnt = ARRAY_SIZE(insns), .log_level = 2718281828U, .log_size = log_buf_size, .kern_version = 0xcafef00d, .prog_flags = 16, .prog_name = "0123456789abcdef", .prog_ifindex = 0xbeeffeed, } }, .size = offsetofend(struct BPF_PROG_LOAD_struct, prog_ifindex), .init_fn = init_BPF_PROG_LOAD_attr3, .print_fn = print_BPF_PROG_LOAD_attr3 }, { /* 4 */ .data = { .BPF_PROG_LOAD_data = { .prog_type = 0, .insn_cnt = ARRAY_SIZE(insns), .log_level = 2718281828U, .log_size = 4, .kern_version = 0xcafef00d, .prog_flags = 0x1f, .prog_name = "0123456789abcdef", .expected_attach_type = 9, } }, .size = offsetofend(struct BPF_PROG_LOAD_struct, expected_attach_type), .init_fn = init_BPF_PROG_LOAD_attr4, .print_fn = print_BPF_PROG_LOAD_attr4 }, { /* 5 */ .data = { .BPF_PROG_LOAD_data = { .prog_flags = 2, .expected_attach_type = 17, .prog_btf_fd = 0xbadc0ded, .func_info_rec_size = 0xdad1bef2, .func_info = 0xfac1fed2fac3fed4, .func_info_cnt = 0xdad3bef4, .line_info_rec_size = 0xdad5bef6, .line_info = 0xfac5fed5fac7fed8, .line_info_cnt = 0xdad7bef8 } }, .size = offsetofend(struct BPF_PROG_LOAD_struct, line_info_cnt), .str = "prog_type=BPF_PROG_TYPE_UNSPEC" ", insn_cnt=0" ", insns=NULL" ", license=NULL" ", log_level=0" ", log_size=0" ", log_buf=NULL" ", kern_version=KERNEL_VERSION(0, 0, 0)" ", prog_flags=BPF_F_ANY_ALIGNMENT" ", prog_name=\"\"" ", prog_ifindex=0" ", expected_attach_type=BPF_FLOW_DISSECTOR" ", prog_btf_fd=-1159983635" ", func_info_rec_size=3671178994" ", func_info=0xfac1fed2fac3fed4" ", func_info_cnt=3671310068" ", line_info_rec_size=3671441142" ", line_info=0xfac5fed5fac7fed8" ", line_info_cnt=3671572216" }, }; static void init_BPF_OBJ_PIN_attr(struct bpf_attr_check *check) { struct BPF_OBJ_PIN_struct *attr = &check->data.BPF_OBJ_PIN_data; attr->pathname = (uintptr_t) pathname; } static struct bpf_attr_check BPF_OBJ_PIN_checks[] = { { .data = { .BPF_OBJ_PIN_data = { .pathname = 0 } }, .size = offsetofend(struct BPF_OBJ_PIN_struct, pathname), .str = "pathname=NULL, bpf_fd=0" }, { .data = { .BPF_OBJ_PIN_data = { .pathname = 0xFFFFFFFFFFFFFFFFULL } }, .size = offsetofend(struct BPF_OBJ_PIN_struct, pathname), .str = "pathname=" BIG_ADDR("0xffffffffffffffff", "0xffffffff") ", bpf_fd=0", }, { .data = { .BPF_OBJ_PIN_data = { .bpf_fd = -1 } }, .size = offsetofend(struct BPF_OBJ_PIN_struct, bpf_fd), .init_fn = init_BPF_OBJ_PIN_attr, .str = "pathname=\"/sys/fs/bpf/foo/bar\", bpf_fd=-1" }, { .data = { .BPF_OBJ_PIN_data = { .bpf_fd = -1, .file_flags = 0x18 } }, .size = offsetofend(struct BPF_OBJ_PIN_struct, file_flags), .init_fn = init_BPF_OBJ_PIN_attr, .str = "pathname=\"/sys/fs/bpf/foo/bar\", bpf_fd=-1" ", file_flags=BPF_F_RDONLY|BPF_F_WRONLY" } }; #define BPF_OBJ_GET_checks BPF_OBJ_PIN_checks static const struct bpf_attr_check BPF_PROG_ATTACH_checks[] = { { .data = { .BPF_PROG_ATTACH_data = { .target_fd = -1 } }, .size = offsetofend(struct BPF_PROG_ATTACH_struct, target_fd), .str = "target_fd=-1, attach_bpf_fd=0" ", attach_type=BPF_CGROUP_INET_INGRESS, attach_flags=0" }, { .data = { .BPF_PROG_ATTACH_data = { .target_fd = -1, .attach_bpf_fd = -2, .attach_type = 2, .attach_flags = 1 } }, .size = offsetofend(struct BPF_PROG_ATTACH_struct, attach_flags), .str = "target_fd=-1, attach_bpf_fd=-2" ", attach_type=BPF_CGROUP_INET_SOCK_CREATE" ", attach_flags=BPF_F_ALLOW_OVERRIDE" } }; static const struct bpf_attr_check BPF_PROG_DETACH_checks[] = { { .data = { .BPF_PROG_DETACH_data = { .target_fd = -1 } }, .size = offsetofend(struct BPF_PROG_DETACH_struct, target_fd), .str = "target_fd=-1, attach_type=BPF_CGROUP_INET_INGRESS" }, { .data = { .BPF_PROG_DETACH_data = { .target_fd = -1, .attach_type = 2 } }, .size = offsetofend(struct BPF_PROG_DETACH_struct, attach_type), .str = "target_fd=-1, attach_type=BPF_CGROUP_INET_SOCK_CREATE" } }; static const struct bpf_attr_check BPF_PROG_TEST_RUN_checks[] = { { .data = { .BPF_PROG_TEST_RUN_data = { .prog_fd = -1 } }, .size = offsetofend(struct BPF_PROG_TEST_RUN_struct, prog_fd), .str = "test={prog_fd=-1, retval=0, data_size_in=0" ", data_size_out=0, data_in=NULL, data_out=NULL" ", repeat=0, duration=0}" }, { .data = { .BPF_PROG_TEST_RUN_data = { .prog_fd = -1, .retval = 0xfac1fed2, .data_size_in = 0xfac3fed4, .data_size_out = 0xfac5fed6, .data_in = (uint64_t) 0xfacef11dbadc2dedULL, .data_out = (uint64_t) 0xfacef33dbadc4dedULL, .repeat = 0xfac7fed8, .duration = 0xfac9feda } }, .size = offsetofend(struct BPF_PROG_TEST_RUN_struct, duration), .str = "test={prog_fd=-1, retval=4207017682" ", data_size_in=4207148756, data_size_out=4207279830" ", data_in=0xfacef11dbadc2ded" ", data_out=0xfacef33dbadc4ded" ", repeat=4207410904, duration=4207541978}" }, { .data = { .BPF_PROG_TEST_RUN_data = { .prog_fd = -1, .retval = 0xfac1fed2, .data_size_in = 0xfac3fed4, .data_size_out = 0xfac5fed6, .data_in = (uint64_t) 0xfacef11dbadc2dedULL, .data_out = (uint64_t) 0xfacef33dbadc4dedULL, .repeat = 0xfac7fed8, .duration = 0xfac9feda, .ctx_size_in = 0xfacbfedc, .ctx_size_out = 0xfacdfede, .ctx_in = (uint64_t) 0xfacef55dbadc6dedULL, .ctx_out = (uint64_t) 0xfacef77dbadc8dedULL } }, .size = offsetofend(struct BPF_PROG_TEST_RUN_struct, ctx_out), .str = "test={prog_fd=-1, retval=4207017682" ", data_size_in=4207148756, data_size_out=4207279830" ", data_in=0xfacef11dbadc2ded" ", data_out=0xfacef33dbadc4ded" ", repeat=4207410904" ", duration=4207541978" ", ctx_size_in=4207673052" ", ctx_size_out=4207804126" ", ctx_in=0xfacef55dbadc6ded" ", ctx_out=0xfacef77dbadc8ded}" } }; static const struct bpf_attr_check BPF_PROG_GET_NEXT_ID_checks[] = { { .data = { .BPF_PROG_GET_NEXT_ID_data = { .start_id = 0xdeadbeef } }, .size = offsetofend(struct BPF_PROG_GET_NEXT_ID_struct, start_id), .str = "start_id=3735928559, next_id=0" }, { .data = { .BPF_PROG_GET_NEXT_ID_data = { .start_id = 0xdeadbeef } }, .size = 1, .str = "start_id=" #if WORDS_BIGENDIAN "3724541952" /* 0xde000000 */ #else "239" /* 0x000000ef */ #endif ", next_id=0" }, { .data = { .BPF_PROG_GET_NEXT_ID_data = { .start_id = 0xbadc0ded, .next_id = 0xcafef00d } }, .size = offsetofend(struct BPF_PROG_GET_NEXT_ID_struct, next_id), .str = "start_id=3134983661, next_id=3405705229" }, { .data = { .BPF_PROG_GET_NEXT_ID_data = { .start_id = 0xbadc0ded, .next_id = 0xcafef00d, .open_flags = 0xffffff27 } }, .size = offsetofend(struct BPF_PROG_GET_NEXT_ID_struct, open_flags), .str = "start_id=3134983661, next_id=3405705229" ", open_flags=0xffffff27 /* BPF_F_??? */" } }; #define BPF_MAP_GET_NEXT_ID_checks BPF_PROG_GET_NEXT_ID_checks static const struct bpf_attr_check BPF_PROG_GET_FD_BY_ID_checks[] = { { .data = { .BPF_PROG_GET_FD_BY_ID_data = { .prog_id = 0xdeadbeef } }, .size = offsetofend(struct BPF_PROG_GET_FD_BY_ID_struct, prog_id), .str = "prog_id=3735928559, next_id=0" }, { .data = { .BPF_PROG_GET_FD_BY_ID_data = { .prog_id = 0xbadc0ded, .next_id = 0xcafef00d } }, .size = offsetofend(struct BPF_PROG_GET_FD_BY_ID_struct, next_id), .str = "prog_id=3134983661, next_id=3405705229" }, { .data = { .BPF_PROG_GET_FD_BY_ID_data = { .prog_id = 0xbadc0ded, .next_id = 0xcafef00d, .open_flags = 0xffffff27 } }, .size = offsetofend(struct BPF_PROG_GET_FD_BY_ID_struct, open_flags), .str = "prog_id=3134983661, next_id=3405705229" ", open_flags=0xffffff27 /* BPF_F_??? */" } }; static const struct bpf_attr_check BPF_MAP_GET_FD_BY_ID_checks[] = { { .data = { .BPF_MAP_GET_FD_BY_ID_data = { .map_id = 0xdeadbeef } }, .size = offsetofend(struct BPF_MAP_GET_FD_BY_ID_struct, map_id), .str = "map_id=3735928559, next_id=0" }, { .data = { .BPF_MAP_GET_FD_BY_ID_data = { .map_id = 0xbadc0ded, .next_id = 0xcafef00d } }, .size = offsetofend(struct BPF_MAP_GET_FD_BY_ID_struct, next_id), .str = "map_id=3134983661, next_id=3405705229" }, { .data = { .BPF_MAP_GET_FD_BY_ID_data = { .map_id = 0xbadc0ded, .next_id = 0xcafef00d, .open_flags = 0xffffff27 } }, .size = offsetofend(struct BPF_MAP_GET_FD_BY_ID_struct, open_flags), .str = "map_id=3134983661, next_id=3405705229" ", open_flags=0xffffff27 /* BPF_F_??? */" } }; static const struct bpf_attr_check BPF_OBJ_GET_INFO_BY_FD_checks[] = { { .data = { .BPF_OBJ_GET_INFO_BY_FD_data = { .bpf_fd = -1 } }, .size = offsetofend(struct BPF_OBJ_GET_INFO_BY_FD_struct, bpf_fd), .str = "info={bpf_fd=-1, info_len=0, info=NULL}" }, { .data = { .BPF_OBJ_GET_INFO_BY_FD_data = { .bpf_fd = -1, .info_len = 0xdeadbeef, .info = (uint64_t) 0xfacefeedbadc0dedULL } }, .size = offsetofend(struct BPF_OBJ_GET_INFO_BY_FD_struct, info), .str = "info={bpf_fd=-1, info_len=3735928559" ", info=0xfacefeedbadc0ded}" } }; static uint32_t prog_load_ids[] = { 0, 1, 0xffffffff, 2718281828, }; uint32_t *prog_load_ids_ptr; static void init_BPF_PROG_QUERY_attr4(struct bpf_attr_check *check) { struct BPF_PROG_QUERY_struct *attr = &check->data.BPF_PROG_QUERY_data; if (!prog_load_ids_ptr) prog_load_ids_ptr = tail_memdup(prog_load_ids, sizeof(prog_load_ids)); attr->prog_ids = (uintptr_t) prog_load_ids_ptr; attr->prog_cnt = ARRAY_SIZE(prog_load_ids); } static void print_BPF_PROG_QUERY_attr4(const struct bpf_attr_check *check, unsigned long addr) { printf("query={target_fd=-1153374643" ", attach_type=0xfeedface /* BPF_??? */" ", query_flags=BPF_F_QUERY_EFFECTIVE|0xdeadf00c" ", attach_flags=BPF_F_ALLOW_MULTI|0xbeefcafc" #if defined(INJECT_RETVAL) && INJECT_RETVAL > 0 ", prog_ids=[0, 1, 4294967295, 2718281828], prog_cnt=4}" #else ", prog_ids=%p, prog_cnt=4}", prog_load_ids_ptr #endif ); } static void init_BPF_PROG_QUERY_attr5(struct bpf_attr_check *check) { struct BPF_PROG_QUERY_struct *attr = &check->data.BPF_PROG_QUERY_data; if (!prog_load_ids_ptr) prog_load_ids_ptr = tail_memdup(prog_load_ids, sizeof(prog_load_ids)); attr->prog_ids = (uintptr_t) prog_load_ids_ptr; attr->prog_cnt = ARRAY_SIZE(prog_load_ids) + 1; } static void print_BPF_PROG_QUERY_attr5(const struct bpf_attr_check *check, unsigned long addr) { printf("query={target_fd=-1153374643" ", attach_type=0xfeedface /* BPF_??? */" ", query_flags=BPF_F_QUERY_EFFECTIVE|0xdeadf00c" ", attach_flags=BPF_F_ALLOW_MULTI|0xbeefcafc" #if defined(INJECT_RETVAL) && INJECT_RETVAL > 0 ", prog_ids=[0, 1, 4294967295, 2718281828, ... /* %p */]" ", prog_cnt=5}", prog_load_ids_ptr + ARRAY_SIZE(prog_load_ids) #else ", prog_ids=%p, prog_cnt=5}", prog_load_ids_ptr #endif ); } static struct bpf_attr_check BPF_PROG_QUERY_checks[] = { { .data = { .BPF_PROG_QUERY_data = { .target_fd = -1 } }, .size = offsetofend(struct BPF_PROG_QUERY_struct, target_fd), .str = "query={target_fd=-1" ", attach_type=BPF_CGROUP_INET_INGRESS, query_flags=0" ", attach_flags=0, prog_ids=NULL, prog_cnt=0}", }, { /* 1 */ .data = { .BPF_PROG_QUERY_data = { .target_fd = 3141592653U, .attach_type = 16, .query_flags = 1, .attach_flags = 3, } }, .size = offsetofend(struct BPF_PROG_QUERY_struct, attach_flags), .str = "query={target_fd=-1153374643" ", attach_type=BPF_LIRC_MODE2" ", query_flags=BPF_F_QUERY_EFFECTIVE" ", attach_flags=BPF_F_ALLOW_OVERRIDE|BPF_F_ALLOW_MULTI" ", prog_ids=NULL, prog_cnt=0}", }, { /* 2 */ .data = { .BPF_PROG_QUERY_data = { .target_fd = 3141592653U, .attach_type = 23, .query_flags = 0xfffffffe, .attach_flags = 0xfffffffc, .prog_ids = 0xffffffffffffffffULL, .prog_cnt = 2718281828, } }, .size = offsetofend(struct BPF_PROG_QUERY_struct, prog_cnt), .str = "query={target_fd=-1153374643" ", attach_type=0x17 /* BPF_??? */" ", query_flags=0xfffffffe /* BPF_F_QUERY_??? */" ", attach_flags=0xfffffffc /* BPF_F_??? */" ", prog_ids=" BIG_ADDR("0xffffffffffffffff", "0xffffffff") ", prog_cnt=2718281828}", }, { /* 3 */ .data = { .BPF_PROG_QUERY_data = { .target_fd = 3141592653U, .attach_type = 0xfeedface, .query_flags = 0xdeadf00d, .attach_flags = 0xbeefcafe, .prog_ids = 0xffffffffffffffffULL, .prog_cnt = 0, } }, .size = offsetofend(struct BPF_PROG_QUERY_struct, prog_cnt), .str = "query={target_fd=-1153374643" ", attach_type=0xfeedface /* BPF_??? */" ", query_flags=BPF_F_QUERY_EFFECTIVE|0xdeadf00c" ", attach_flags=BPF_F_ALLOW_MULTI|0xbeefcafc" ", prog_ids=" BIG_ADDR_MAYBE("0xffffffffffffffff") "[]" ", prog_cnt=0}", }, { /* 4 */ .data = { .BPF_PROG_QUERY_data = { .target_fd = 3141592653U, .attach_type = 0xfeedface, .query_flags = 0xdeadf00d, .attach_flags = 0xbeefcafe, } }, .size = offsetofend(struct BPF_PROG_QUERY_struct, prog_cnt), .init_fn = init_BPF_PROG_QUERY_attr4, .print_fn = print_BPF_PROG_QUERY_attr4, }, { /* 5 */ .data = { .BPF_PROG_QUERY_data = { .target_fd = 3141592653U, .attach_type = 0xfeedface, .query_flags = 0xdeadf00d, .attach_flags = 0xbeefcafe, } }, .size = offsetofend(struct BPF_PROG_QUERY_struct, prog_cnt), .init_fn = init_BPF_PROG_QUERY_attr5, .print_fn = print_BPF_PROG_QUERY_attr5, }, }; static void init_BPF_RAW_TRACEPOINT_attr2(struct bpf_attr_check *check) { /* TODO: test the 128 byte limit */ static const char tp_name[] = "0123456789qwertyuiop0123456789qwe"; struct BPF_RAW_TRACEPOINT_OPEN_struct *attr = &check->data.BPF_RAW_TRACEPOINT_OPEN_data; attr->name = (uintptr_t) tp_name; } static struct bpf_attr_check BPF_RAW_TRACEPOINT_OPEN_checks[] = { { .data = { .BPF_RAW_TRACEPOINT_OPEN_data = { .name = 0 } }, .size = offsetofend(struct BPF_RAW_TRACEPOINT_OPEN_struct, name), .str = "raw_tracepoint={name=NULL, prog_fd=0}", }, { /* 1 */ .data = { .BPF_RAW_TRACEPOINT_OPEN_data = { .name = 0xffffffff00000000ULL, .prog_fd = 0xdeadbeef, } }, .size = offsetofend(struct BPF_RAW_TRACEPOINT_OPEN_struct, prog_fd), .str = "raw_tracepoint=" "{name=" BIG_ADDR("0xffffffff00000000", "NULL") ", prog_fd=-559038737}", }, { .data = { .BPF_RAW_TRACEPOINT_OPEN_data = { .prog_fd = 0xdeadbeef, } }, .size = offsetofend(struct BPF_RAW_TRACEPOINT_OPEN_struct, prog_fd), .init_fn = init_BPF_RAW_TRACEPOINT_attr2, .str = "raw_tracepoint=" "{name=\"0123456789qwertyuiop0123456789qw\"..." ", prog_fd=-559038737}", } }; static void init_BPF_BTF_LOAD_attr(struct bpf_attr_check *check) { static const char sample_btf_data[] = "bPf\0daTum"; static char *btf_data; if (!btf_data) btf_data = tail_memdup(sample_btf_data, sizeof(sample_btf_data) - 1); struct BPF_BTF_LOAD_struct *attr = &check->data.BPF_BTF_LOAD_data; attr->btf = (uintptr_t) btf_data; } static struct bpf_attr_check BPF_BTF_LOAD_checks[] = { { .data = { .BPF_BTF_LOAD_data = { .btf = 0 } }, .size = offsetofend(struct BPF_BTF_LOAD_struct, btf), .str = "btf=NULL, btf_log_buf=NULL, btf_size=0" ", btf_log_size=0, btf_log_level=0" }, { /* 1 */ .data = { .BPF_BTF_LOAD_data = { .btf_log_buf = 0xfacefeeddeadbeefULL, .btf_size = 9, .btf_log_size = -1U, .btf_log_level = 42 } }, .size = offsetofend(struct BPF_BTF_LOAD_struct, btf_log_level), .init_fn = init_BPF_BTF_LOAD_attr, .str = "btf=\"bPf\\0daTum\"" ", btf_log_buf=0xfacefeeddeadbeef" ", btf_size=9" ", btf_log_size=4294967295" ", btf_log_level=42" } }; static const struct bpf_attr_check BPF_BTF_GET_FD_BY_ID_checks[] = { { .data = { .BPF_BTF_GET_FD_BY_ID_data = { .btf_id = 0xdeadbeef } }, .size = offsetofend(struct BPF_BTF_GET_FD_BY_ID_struct, btf_id), .str = "btf_id=3735928559" } }; static const struct bpf_attr_check BPF_TASK_FD_QUERY_checks[] = { { .data = { .BPF_TASK_FD_QUERY_data = { .pid = 0xdeadbeef } }, .size = offsetofend(struct BPF_TASK_FD_QUERY_struct, pid), .str = "task_fd_query={pid=3735928559, fd=0, flags=0" ", buf_len=0, buf=NULL, prog_id=0" ", fd_type=BPF_FD_TYPE_RAW_TRACEPOINT" ", probe_offset=0, probe_addr=0}" }, { /* 1 */ .data = { .BPF_TASK_FD_QUERY_data = { .pid = 0xcafef00d, .fd = 0xdeadbeef, .flags = 0xfacefeed, .buf_len = 0xdefaced, .buf = 0xfffffffffffffffe, .prog_id = 0xbadc0ded, .fd_type = 5, .probe_offset = 0xfac1fed2fac3fed4, .probe_addr = 0xfac5fed5fac7fed8 } }, .size = offsetofend(struct BPF_TASK_FD_QUERY_struct, probe_addr), .str = "task_fd_query={pid=3405705229" ", fd=-559038737" ", flags=4207869677" ", buf_len=233811181" ", buf=" BIG_ADDR("0xfffffffffffffffe", "0xfffffffe") ", prog_id=3134983661" ", fd_type=BPF_FD_TYPE_URETPROBE" ", probe_offset=0xfac1fed2fac3fed4" ", probe_addr=0xfac5fed5fac7fed8}" } }; #define CHK(cmd_) \ { \ cmd_, #cmd_, \ cmd_##_checks, ARRAY_SIZE(cmd_##_checks), \ } \ /* End of CHK definition */ int main(void) { static const struct bpf_check checks[] = { CHK(BPF_MAP_CREATE), CHK(BPF_MAP_LOOKUP_ELEM), CHK(BPF_MAP_UPDATE_ELEM), CHK(BPF_MAP_DELETE_ELEM), CHK(BPF_MAP_GET_NEXT_KEY), CHK(BPF_PROG_LOAD), CHK(BPF_OBJ_PIN), CHK(BPF_OBJ_GET), CHK(BPF_PROG_ATTACH), CHK(BPF_PROG_DETACH), CHK(BPF_PROG_TEST_RUN), CHK(BPF_PROG_GET_NEXT_ID), CHK(BPF_MAP_GET_NEXT_ID), CHK(BPF_PROG_GET_FD_BY_ID), CHK(BPF_MAP_GET_FD_BY_ID), CHK(BPF_OBJ_GET_INFO_BY_FD), CHK(BPF_PROG_QUERY), CHK(BPF_RAW_TRACEPOINT_OPEN), CHK(BPF_BTF_LOAD), CHK(BPF_BTF_GET_FD_BY_ID), CHK(BPF_TASK_FD_QUERY), CHK(BPF_MAP_LOOKUP_AND_DELETE_ELEM), CHK(BPF_MAP_FREEZE), }; page_size = get_page_size(); end_of_page = (unsigned long) tail_alloc(1) + 1; for (size_t i = 0; i < ARRAY_SIZE(checks); i++) test_bpf(checks + i); sys_bpf(0xfacefeed, 0, (kernel_ulong_t) 0xfacefeedbadc0dedULL); printf("bpf(0xfacefeed /* BPF_??? */, NULL, %u) = %s\n", 0xbadc0dedu, errstr); sys_bpf(0xfacefeed, end_of_page, 40); printf("bpf(0xfacefeed /* BPF_??? */, %#lx, 40) = %s\n", end_of_page, errstr); puts("+++ exited with 0 +++"); return 0; }