Blame SOURCES/rhbz1643997.0006-stapbpf-assembler-WIP-5-basic-kernel_string-implemen.patch

e4e640
From f614583a605f4c23d2f6e1a2ad31e089d10f8d8e Mon Sep 17 00:00:00 2001
e4e640
From: Serhei Makarov <smakarov@redhat.com>
e4e640
Date: Tue, 16 Oct 2018 18:17:25 -0400
e4e640
Subject: [PATCH 06/32] stapbpf assembler WIP #5 :: basic kernel_string()
e4e640
 implementation
e4e640
e4e640
---
e4e640
 tapset/bpf/conversions.stp | 108 +++++++++++++++++++++++++++++++++++++++++++++
e4e640
 1 file changed, 108 insertions(+)
e4e640
 create mode 100644 tapset/bpf/conversions.stp
e4e640
e4e640
diff --git a/tapset/bpf/conversions.stp b/tapset/bpf/conversions.stp
e4e640
new file mode 100644
e4e640
index 000000000..d741ec584
e4e640
--- /dev/null
e4e640
+++ b/tapset/bpf/conversions.stp
e4e640
@@ -0,0 +1,108 @@
e4e640
+// conversions tapset -- eBPF version
e4e640
+// Copyright (C) 2018 Red Hat Inc.
e4e640
+//
e4e640
+// This file is part of systemtap, and is free software.  You can
e4e640
+// redistribute it and/or modify it under the terms of the GNU General
e4e640
+// Public License (GPL); either version 2, or (at your option) any
e4e640
+// later version.
e4e640
+
e4e640
+/**
e4e640
+ * sfunction kernel_string - Retrieves string from kernel memory
e4e640
+ * @addr: The kernel address to retrieve the string from
e4e640
+ *
e4e640
+ * Description: This function returns the null terminated C string
e4e640
+ * from a given kernel memory address. Reports an error on string
e4e640
+ * copy fault.
e4e640
+ */
e4e640
+function kernel_string:string (addr:long) {
e4e640
+  return kernel_string_n(addr, 64 /*TODO: define BPF_MAXSTRINGLEN*/)
e4e640
+}
e4e640
+
e4e640
+// TODO kernel_string:string(addr:long, err_msg:string)
e4e640
+// TODO kernel_string2:string(addr:long, err_msg:string)
e4e640
+
e4e640
+/**
e4e640
+ * sfunction kernel_string - Retrieves string from kernel memory with alternative error string
e4e640
+ * @addr: The kernel address to retrieve the string from
e4e640
+ * @err_msg: The error message to return when data isn't available
e4e640
+ *
e4e640
+ * Description: This function returns the null terminated C string
e4e640
+ * from a given kernel memory address. Reports the given error message
e4e640
+ * on string copy fault.
e4e640
+ */
e4e640
+function kernel_string:string (addr:long, err_msg:string)
e4e640
+%{ /* bpf */ /* pure */
e4e640
+  /* buf = bpf_stk_alloc(BPF_MAXSTRINGLEN);
e4e640
+     buf[0] = 0x0; // guarantee NUL byte
e4e640
+     rc = bpf_probe_read_str(buf, n, addr); */
e4e640
+  alloc, $buf, BPF_MAXSTRINGLEN;
e4e640
+  0x62, $buf, -, -, 0x0; /* stw [$buf+0], 0x0 -- guarantee NUL byte */
e4e640
+  call, $rc, bpf_probe_read_str, $buf, BPF_MAXSTRINGLEN, $addr;
e4e640
+
e4e640
+  /* if (rc < 0) return err_msg;
e4e640
+     return buf; */
e4e640
+  0xa5, rc, 0, _err, -; /* jlt $rc, 0, _err */
e4e640
+  0xbf, $$, $buf, -, -; /* mov $$, $buf */
e4e640
+  0x05, -, -, _done, -; /* ja _done; */
e4e640
+  label, _err;
e4e640
+  0xbf, $$, $err_msg, -, -; /* mov $$, $err_msg */
e4e640
+  label, _done;
e4e640
+%}
e4e640
+function kernel_string2:string (addr:long, err_msg:string) {
e4e640
+  return kernel_string(addr, err_msg);
e4e640
+}
e4e640
+
e4e640
+// TODO kernel_string_quoted:string(addr:long) -- requires pseudo-loop to quote unprintable chars
e4e640
+
e4e640
+/**
e4e640
+ * sfunction kernel_string_n - Retrieves string of given length from kernel memory
e4e640
+ * @addr: The kernel address to retrieve the string from
e4e640
+ * @n: The maximum length of the string (if not null terminated)
e4e640
+ *
e4e640
+ * Description: Returns the C string of a maximum given length from a
e4e640
+ * given kernel memory address. Reports an error on string copy fault.
e4e640
+ */
e4e640
+function kernel_string_n:string (addr:long, n:long)
e4e640
+%{ /* bpf */ /* pure */
e4e640
+  /* if (n > BPF_MAXSTRINGLEN) n = BPF_MAXSTRINGLEN; */
e4e640
+  0xb5, $n, -, _skip, BPF_MAXSTRINGLEN; /* jle n, BPF_MAXSTRINGLEN, _skip */
e4e640
+  0xb7, $n, -, -, BPF_MAXSTRINGLEN; /* mov $n, BPF_MAXSTRINGLEN */
e4e640
+  label, _skip;
e4e640
+
e4e640
+  /* buf = bpf_stk_alloc(BPF_MAXSTRINGLEN);
e4e640
+     buf[0] = 0x0; // guarantee NUL byte
e4e640
+     rc = bpf_probe_read_str(buf, n, addr); */
e4e640
+  alloc, $buf, BPF_MAXSTRINGLEN;
e4e640
+  0x62, $buf, -, -, 0x0; /* stw [buf+0], 0 -- guarantee NUL byte */
e4e640
+  call, $rc, probe_read_str, $buf, $n, $addr; /* TODO: should work with bpf_probe_read_str too */
e4e640
+
e4e640
+  /* TODO pending implementation of error */
e4e640
+  /* if (rc < 0) error("...", addr); */
e4e640
+  /*0x35, $rc, 0, _done, -; /* jge rc, 0, _done */
e4e640
+  /*error, "kernel string copy fault at 0x%p [man error::fault]", $addr; /* TODO document bpf version of error::fault */
e4e640
+  /*label, _done;*/
e4e640
+
e4e640
+  /* return buf; */
e4e640
+  0xbf, $$, $buf, -, -; /* mov $$, buf */
e4e640
+%}
e4e640
+
e4e640
+// TODO kernel_string_utf32:string(addr:long)
e4e640
+// TODO kernel_string_utf32:string(addr:long,err_msg:string)
e4e640
+// TODO kernel_string2_utf32:string(addr:long,err_msg:string)
e4e640
+// TODO kernel_string_quoted_utf32:string(addr:long)
e4e640
+
e4e640
+// TODO kernel_string_utf16:string(addr:long)
e4e640
+// TODO kernel_string_utf16:string(addr:long,err_msg:string)
e4e640
+// TODO kernel_string2_utf16:string(addr:long,err_msg:string)
e4e640
+// TODO kernel_string_quoted_utf16:string(addr:long)
e4e640
+
e4e640
+// TODO kernel_long:long(addr:long)
e4e640
+// TODO kernel_int:long(addr:long)
e4e640
+// TODO kernel_short:long(addr:long)
e4e640
+// TODO kernel_char:long(addr:long)
e4e640
+
e4e640
+// TODO kernel_pointer:long(addr:long)
e4e640
+
e4e640
+// TODO kernel_buffer_quoted:string(addr:long,inlen:long)
e4e640
+// TODO kernel_buffer_quoted:string(addr:long,inlen:long,outlen:long)
e4e640
+// TODO kernel_buffer_quoted_error:string(addr:long,inlen:long,outlen:long)
e4e640
-- 
e4e640
2.14.5
e4e640