diff options
author | Andrii Nakryiko <andrii@kernel.org> | 2021-12-22 15:10:03 -0800 |
---|---|---|
committer | Alexei Starovoitov <ast@kernel.org> | 2021-12-28 19:20:31 -0800 |
commit | 5b3d72987701d51bf31823b39db49d10970f5c2d (patch) | |
tree | 02e2914a801f88f5ebfa97c884057856e97ec2e1 /tools/lib/bpf/libbpf_probes.c | |
parent | libbpf: Use 100-character limit to make bpf_tracing.h easier to read (diff) | |
download | linux-dev-5b3d72987701d51bf31823b39db49d10970f5c2d.tar.xz linux-dev-5b3d72987701d51bf31823b39db49d10970f5c2d.zip |
libbpf: Improve LINUX_VERSION_CODE detection
Ubuntu reports incorrect kernel version through uname(), which on older
kernels leads to kprobe BPF programs failing to load due to the version
check mismatch.
Accommodate Ubuntu's quirks with LINUX_VERSION_CODE by using
Ubuntu-specific /proc/version_code to fetch major/minor/patch versions
to form LINUX_VERSION_CODE.
While at it, consolide libbpf's kernel version detection code between
libbpf.c and libbpf_probes.c.
[0] Closes: https://github.com/libbpf/libbpf/issues/421
Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: Yonghong Song <yhs@fb.com>
Link: https://lore.kernel.org/bpf/20211222231003.2334940-1-andrii@kernel.org
Diffstat (limited to '')
-rw-r--r-- | tools/lib/bpf/libbpf_probes.c | 16 |
1 files changed, 0 insertions, 16 deletions
diff --git a/tools/lib/bpf/libbpf_probes.c b/tools/lib/bpf/libbpf_probes.c index 9d3985283dfc..97b06cede56f 100644 --- a/tools/lib/bpf/libbpf_probes.c +++ b/tools/lib/bpf/libbpf_probes.c @@ -48,22 +48,6 @@ static int get_vendor_id(int ifindex) return strtol(buf, NULL, 0); } -static int get_kernel_version(void) -{ - int version, subversion, patchlevel; - struct utsname utsn; - - /* Return 0 on failure, and attempt to probe with empty kversion */ - if (uname(&utsn)) - return 0; - - if (sscanf(utsn.release, "%d.%d.%d", - &version, &subversion, &patchlevel) != 3) - return 0; - - return (version << 16) + (subversion << 8) + patchlevel; -} - static int probe_prog_load(enum bpf_prog_type prog_type, const struct bpf_insn *insns, size_t insns_cnt, char *log_buf, size_t log_buf_sz, |