X-Git-Url: https://git.proxmox.com/?a=blobdiff_plain;f=tc%2Fm_bpf.c;h=3e8468c683246955145269b650de73791e132d8b;hb=HEAD;hp=576f69ccdab098668ea92e48c6bb4c57959bad70;hpb=3572e01a090a298e2f4c4f796bad6639b652e031;p=mirror_iproute2.git diff --git a/tc/m_bpf.c b/tc/m_bpf.c index 576f69cc..af5ba5ce 100644 --- a/tc/m_bpf.c +++ b/tc/m_bpf.c @@ -25,32 +25,34 @@ static const enum bpf_prog_type bpf_type = BPF_PROG_TYPE_SCHED_ACT; static void explain(void) { - fprintf(stderr, "Usage: ... bpf ... [ index INDEX ]\n"); - fprintf(stderr, "\n"); - fprintf(stderr, "BPF use case:\n"); - fprintf(stderr, " bytecode BPF_BYTECODE\n"); - fprintf(stderr, " bytecode-file FILE\n"); - fprintf(stderr, "\n"); - fprintf(stderr, "eBPF use case:\n"); - fprintf(stderr, " object-file FILE [ section ACT_NAME ] [ export UDS_FILE ]"); - fprintf(stderr, " [ verbose ]\n"); - fprintf(stderr, " object-pinned FILE\n"); - fprintf(stderr, "\n"); - fprintf(stderr, "Where BPF_BYTECODE := \'s,c t f k,c t f k,c t f k,...\'\n"); - fprintf(stderr, "c,t,f,k and s are decimals; s denotes number of 4-tuples\n"); - fprintf(stderr, "\n"); - fprintf(stderr, "Where FILE points to a file containing the BPF_BYTECODE string,\n"); - fprintf(stderr, "an ELF file containing eBPF map definitions and bytecode, or a\n"); - fprintf(stderr, "pinned eBPF program.\n"); - fprintf(stderr, "\n"); - fprintf(stderr, "Where ACT_NAME refers to the section name containing the\n"); - fprintf(stderr, "action (default \'%s\').\n", bpf_prog_to_default_section(bpf_type)); - fprintf(stderr, "\n"); - fprintf(stderr, "Where UDS_FILE points to a unix domain socket file in order\n"); - fprintf(stderr, "to hand off control of all created eBPF maps to an agent.\n"); - fprintf(stderr, "\n"); - fprintf(stderr, "Where optionally INDEX points to an existing action, or\n"); - fprintf(stderr, "explicitly specifies an action index upon creation.\n"); + fprintf(stderr, + "Usage: ... bpf ... [ index INDEX ]\n" + "\n" + "BPF use case:\n" + " bytecode BPF_BYTECODE\n" + " bytecode-file FILE\n" + "\n" + "eBPF use case:\n" + " object-file FILE [ section ACT_NAME ] [ export UDS_FILE ]" + " [ verbose ]\n" + " object-pinned FILE\n" + "\n" + "Where BPF_BYTECODE := \'s,c t f k,c t f k,c t f k,...\'\n" + "c,t,f,k and s are decimals; s denotes number of 4-tuples\n" + "\n" + "Where FILE points to a file containing the BPF_BYTECODE string,\n" + "an ELF file containing eBPF map definitions and bytecode, or a\n" + "pinned eBPF program.\n" + "\n" + "Where ACT_NAME refers to the section name containing the\n" + "action (default \'%s\').\n" + "\n" + "Where UDS_FILE points to a unix domain socket file in order\n" + "to hand off control of all created eBPF maps to an agent.\n" + "\n" + "Where optionally INDEX points to an existing action, or\n" + "explicitly specifies an action index upon creation.\n", + bpf_prog_to_default_section(bpf_type)); } static void bpf_cbpf_cb(void *nl, const struct sock_filter *ops, int ops_len) @@ -90,8 +92,7 @@ static int bpf_parse_opt(struct action_util *a, int *ptr_argc, char ***ptr_argv, NEXT_ARG(); - tail = NLMSG_TAIL(n); - addattr_l(n, MAX_MSG, tca_id, NULL, 0); + tail = addattr_nest(n, MAX_MSG, tca_id); while (argc > 0) { if (matches(*argv, "run") == 0) { @@ -129,7 +130,6 @@ opt_bpf: parse_action_control_dflt(&argc, &argv, &parm.action, false, TC_ACT_PIPE); - NEXT_ARG_FWD(); if (argc) { if (matches(*argv, "index") == 0) { @@ -144,7 +144,7 @@ opt_bpf: } addattr_l(n, MAX_MSG, TCA_ACT_BPF_PARMS, &parm, sizeof(parm)); - tail->rta_len = (char *)NLMSG_TAIL(n) - (char *)tail; + addattr_nest_end(n, tail); if (bpf_uds_name) ret = bpf_send_map_fds(bpf_uds_name, bpf_obj); @@ -159,44 +159,46 @@ static int bpf_print_opt(struct action_util *au, FILE *f, struct rtattr *arg) { struct rtattr *tb[TCA_ACT_BPF_MAX + 1]; struct tc_act_bpf *parm; - int dump_ok = 0; + int d_ok = 0; + print_string(PRINT_ANY, "kind", "%s ", "bpf"); if (arg == NULL) - return -1; + return 0; parse_rtattr_nested(tb, TCA_ACT_BPF_MAX, arg); if (!tb[TCA_ACT_BPF_PARMS]) { - fprintf(f, "[NULL bpf parameters]"); + fprintf(stderr, "Missing bpf parameters\n"); return -1; } parm = RTA_DATA(tb[TCA_ACT_BPF_PARMS]); - fprintf(f, "bpf "); if (tb[TCA_ACT_BPF_NAME]) - fprintf(f, "%s ", rta_getattr_str(tb[TCA_ACT_BPF_NAME])); - + print_string(PRINT_ANY, "bpf_name", "%s ", + rta_getattr_str(tb[TCA_ACT_BPF_NAME])); if (tb[TCA_ACT_BPF_OPS] && tb[TCA_ACT_BPF_OPS_LEN]) { - bpf_print_ops(f, tb[TCA_ACT_BPF_OPS], + bpf_print_ops(tb[TCA_ACT_BPF_OPS], rta_getattr_u16(tb[TCA_ACT_BPF_OPS_LEN])); - fprintf(f, " "); + print_string(PRINT_FP, NULL, "%s", " "); } if (tb[TCA_ACT_BPF_ID]) - dump_ok = bpf_dump_prog_info(f, rta_getattr_u32(tb[TCA_ACT_BPF_ID])); - if (!dump_ok && tb[TCA_ACT_BPF_TAG]) { + d_ok = bpf_dump_prog_info(f, + rta_getattr_u32(tb[TCA_ACT_BPF_ID])); + if (!d_ok && tb[TCA_ACT_BPF_TAG]) { SPRINT_BUF(b); - fprintf(f, "tag %s ", - hexstring_n2a(RTA_DATA(tb[TCA_ACT_BPF_TAG]), - RTA_PAYLOAD(tb[TCA_ACT_BPF_TAG]), - b, sizeof(b))); + print_string(PRINT_ANY, "tag", "tag %s ", + hexstring_n2a(RTA_DATA(tb[TCA_ACT_BPF_TAG]), + RTA_PAYLOAD(tb[TCA_ACT_BPF_TAG]), + b, sizeof(b))); } - print_action_control(f, "default-action ", parm->action, "\n"); - fprintf(f, "\tindex %u ref %d bind %d", parm->index, parm->refcnt, - parm->bindcnt); + print_action_control(f, "default-action ", parm->action, _SL_); + print_uint(PRINT_ANY, "index", "\t index %u", parm->index); + print_int(PRINT_ANY, "ref", " ref %d", parm->refcnt); + print_int(PRINT_ANY, "bind", " bind %d", parm->bindcnt); if (show_stats) { if (tb[TCA_ACT_BPF_TM]) {