Message ID | 20230720113550.369257-5-jolsa@kernel.org (mailing list archive) |
---|---|
State | Superseded |
Delegated to: | BPF |
Headers | show |
Series | bpf: Add multi uprobe link | expand |
Context | Check | Description |
---|---|---|
netdev/tree_selection | success | Clearly marked for bpf-next, async |
netdev/apply | fail | Patch does not apply to bpf-next |
bpf/vmtest-bpf-next-PR | success | PR summary |
bpf/vmtest-bpf-next-VM_Test-1 | success | Logs for ShellCheck |
bpf/vmtest-bpf-next-VM_Test-2 | success | Logs for build for aarch64 with gcc |
bpf/vmtest-bpf-next-VM_Test-3 | success | Logs for build for s390x with gcc |
bpf/vmtest-bpf-next-VM_Test-4 | success | Logs for build for x86_64 with gcc |
bpf/vmtest-bpf-next-VM_Test-5 | success | Logs for build for x86_64 with llvm-16 |
bpf/vmtest-bpf-next-VM_Test-6 | success | Logs for set-matrix |
bpf/vmtest-bpf-next-VM_Test-7 | success | Logs for test_maps on aarch64 with gcc |
bpf/vmtest-bpf-next-VM_Test-8 | success | Logs for test_maps on s390x with gcc |
bpf/vmtest-bpf-next-VM_Test-9 | success | Logs for test_maps on x86_64 with gcc |
bpf/vmtest-bpf-next-VM_Test-10 | success | Logs for test_maps on x86_64 with llvm-16 |
bpf/vmtest-bpf-next-VM_Test-11 | success | Logs for test_progs on aarch64 with gcc |
bpf/vmtest-bpf-next-VM_Test-12 | success | Logs for test_progs on s390x with gcc |
bpf/vmtest-bpf-next-VM_Test-13 | success | Logs for test_progs on x86_64 with gcc |
bpf/vmtest-bpf-next-VM_Test-14 | success | Logs for test_progs on x86_64 with llvm-16 |
bpf/vmtest-bpf-next-VM_Test-15 | success | Logs for test_progs_no_alu32 on aarch64 with gcc |
bpf/vmtest-bpf-next-VM_Test-16 | success | Logs for test_progs_no_alu32 on s390x with gcc |
bpf/vmtest-bpf-next-VM_Test-17 | success | Logs for test_progs_no_alu32 on x86_64 with gcc |
bpf/vmtest-bpf-next-VM_Test-18 | success | Logs for test_progs_no_alu32 on x86_64 with llvm-16 |
bpf/vmtest-bpf-next-VM_Test-19 | success | Logs for test_progs_no_alu32_parallel on aarch64 with gcc |
bpf/vmtest-bpf-next-VM_Test-20 | success | Logs for test_progs_no_alu32_parallel on x86_64 with gcc |
bpf/vmtest-bpf-next-VM_Test-21 | success | Logs for test_progs_no_alu32_parallel on x86_64 with llvm-16 |
bpf/vmtest-bpf-next-VM_Test-22 | success | Logs for test_progs_parallel on aarch64 with gcc |
bpf/vmtest-bpf-next-VM_Test-23 | success | Logs for test_progs_parallel on x86_64 with gcc |
bpf/vmtest-bpf-next-VM_Test-24 | success | Logs for test_progs_parallel on x86_64 with llvm-16 |
bpf/vmtest-bpf-next-VM_Test-25 | success | Logs for test_verifier on aarch64 with gcc |
bpf/vmtest-bpf-next-VM_Test-26 | success | Logs for test_verifier on s390x with gcc |
bpf/vmtest-bpf-next-VM_Test-27 | success | Logs for test_verifier on x86_64 with gcc |
bpf/vmtest-bpf-next-VM_Test-28 | success | Logs for test_verifier on x86_64 with llvm-16 |
bpf/vmtest-bpf-next-VM_Test-29 | success | Logs for veristat |
On Thu, Jul 20, 2023 at 7:36 PM Jiri Olsa <jolsa@kernel.org> wrote: > > Adding support to specify cookies array for uprobe_multi link. > > The cookies array share indexes and length with other uprobe_multi > arrays (offsets/ref_ctr_offsets). > > The cookies[i] value defines cookie for i-the uprobe and will be > returned by bpf_get_attach_cookie helper when called from ebpf > program hooked to that specific uprobe. > > Acked-by: Andrii Nakryiko <andrii@kernel.org> > Signed-off-by: Jiri Olsa <jolsa@kernel.org> > --- > include/uapi/linux/bpf.h | 1 + > kernel/bpf/syscall.c | 2 +- > kernel/trace/bpf_trace.c | 45 +++++++++++++++++++++++++++++++--- > tools/include/uapi/linux/bpf.h | 1 + > 4 files changed, 44 insertions(+), 5 deletions(-) > > diff --git a/include/uapi/linux/bpf.h b/include/uapi/linux/bpf.h > index e764af513425..c6fbb0f948f4 100644 > --- a/include/uapi/linux/bpf.h > +++ b/include/uapi/linux/bpf.h > @@ -1604,6 +1604,7 @@ union bpf_attr { > __aligned_u64 path; > __aligned_u64 offsets; > __aligned_u64 ref_ctr_offsets; > + __aligned_u64 cookies; > __u32 cnt; > __u32 flags; > } uprobe_multi; > diff --git a/kernel/bpf/syscall.c b/kernel/bpf/syscall.c > index f4c6a265731e..840b622b7db1 100644 > --- a/kernel/bpf/syscall.c > +++ b/kernel/bpf/syscall.c > @@ -4832,7 +4832,7 @@ static int bpf_map_do_batch(const union bpf_attr *attr, > return err; > } > > -#define BPF_LINK_CREATE_LAST_FIELD link_create.kprobe_multi.cookies > +#define BPF_LINK_CREATE_LAST_FIELD link_create.uprobe_multi.cookies Shouldn't it be : #define BPF_LINK_CREATE_LAST_FIELD link_create.uprobe_multi.flags ? other than that, this patch looks good. > static int link_create(union bpf_attr *attr, bpfptr_t uattr) > { > struct bpf_prog *prog; > diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c > index 10284fd46f98..d73a47bd2bbd 100644 > --- a/kernel/trace/bpf_trace.c > +++ b/kernel/trace/bpf_trace.c > @@ -87,6 +87,8 @@ static int bpf_btf_printf_prepare(struct btf_ptr *ptr, u32 btf_ptr_size, > static u64 bpf_kprobe_multi_cookie(struct bpf_run_ctx *ctx); > static u64 bpf_kprobe_multi_entry_ip(struct bpf_run_ctx *ctx); > > +static u64 bpf_uprobe_multi_cookie(struct bpf_run_ctx *ctx); > + > /** > * trace_call_bpf - invoke BPF program > * @call: tracepoint event > @@ -1099,6 +1101,18 @@ static const struct bpf_func_proto bpf_get_attach_cookie_proto_kmulti = { > .arg1_type = ARG_PTR_TO_CTX, > }; > > +BPF_CALL_1(bpf_get_attach_cookie_uprobe_multi, struct pt_regs *, regs) > +{ > + return bpf_uprobe_multi_cookie(current->bpf_ctx); > +} > + > +static const struct bpf_func_proto bpf_get_attach_cookie_proto_umulti = { > + .func = bpf_get_attach_cookie_uprobe_multi, > + .gpl_only = false, > + .ret_type = RET_INTEGER, > + .arg1_type = ARG_PTR_TO_CTX, > +}; > + > BPF_CALL_1(bpf_get_attach_cookie_trace, void *, ctx) > { > struct bpf_trace_run_ctx *run_ctx; > @@ -1545,9 +1559,11 @@ kprobe_prog_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog) > &bpf_get_func_ip_proto_kprobe_multi : > &bpf_get_func_ip_proto_kprobe; > case BPF_FUNC_get_attach_cookie: > - return prog->expected_attach_type == BPF_TRACE_KPROBE_MULTI ? > - &bpf_get_attach_cookie_proto_kmulti : > - &bpf_get_attach_cookie_proto_trace; > + if (prog->expected_attach_type == BPF_TRACE_KPROBE_MULTI) > + return &bpf_get_attach_cookie_proto_kmulti; > + if (prog->expected_attach_type == BPF_TRACE_UPROBE_MULTI) > + return &bpf_get_attach_cookie_proto_umulti; > + return &bpf_get_attach_cookie_proto_trace; > default: > return bpf_tracing_func_proto(func_id, prog); > } > @@ -2973,6 +2989,7 @@ struct bpf_uprobe_multi_link; > struct bpf_uprobe { > struct bpf_uprobe_multi_link *link; > loff_t offset; > + u64 cookie; > struct uprobe_consumer consumer; > }; > > @@ -2986,6 +3003,7 @@ struct bpf_uprobe_multi_link { > struct bpf_uprobe_multi_run_ctx { > struct bpf_run_ctx run_ctx; > unsigned long entry_ip; > + struct bpf_uprobe *uprobe; > }; > > static void bpf_uprobe_unregister(struct path *path, struct bpf_uprobe *uprobes, > @@ -3029,6 +3047,7 @@ static int uprobe_prog_run(struct bpf_uprobe *uprobe, > struct bpf_uprobe_multi_link *link = uprobe->link; > struct bpf_uprobe_multi_run_ctx run_ctx = { > .entry_ip = entry_ip, > + .uprobe = uprobe, > }; > struct bpf_prog *prog = link->link.prog; > bool sleepable = prog->aux->sleepable; > @@ -3075,6 +3094,14 @@ uprobe_multi_link_ret_handler(struct uprobe_consumer *con, unsigned long func, s > return uprobe_prog_run(uprobe, func, regs); > } > > +static u64 bpf_uprobe_multi_cookie(struct bpf_run_ctx *ctx) > +{ > + struct bpf_uprobe_multi_run_ctx *run_ctx; > + > + run_ctx = container_of(current->bpf_ctx, struct bpf_uprobe_multi_run_ctx, run_ctx); > + return run_ctx->uprobe->cookie; > +} > + > int bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *prog) > { > struct bpf_uprobe_multi_link *link = NULL; > @@ -3083,6 +3110,7 @@ int bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *pr > struct bpf_link_primer link_primer; > struct bpf_uprobe *uprobes = NULL; > unsigned long __user *uoffsets; > + u64 __user *ucookies; > void __user *upath; > u32 flags, cnt, i; > struct path path; > @@ -3102,7 +3130,7 @@ int bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *pr > > /* > * path, offsets and cnt are mandatory, > - * ref_ctr_offsets is optional > + * ref_ctr_offsets and cookies are optional > */ > upath = u64_to_user_ptr(attr->link_create.uprobe_multi.path); > uoffsets = u64_to_user_ptr(attr->link_create.uprobe_multi.offsets); > @@ -3112,6 +3140,7 @@ int bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *pr > return -EINVAL; > > uref_ctr_offsets = u64_to_user_ptr(attr->link_create.uprobe_multi.ref_ctr_offsets); > + ucookies = u64_to_user_ptr(attr->link_create.uprobe_multi.cookies); > > name = strndup_user(upath, PATH_MAX); > if (IS_ERR(name)) { > @@ -3144,6 +3173,10 @@ int bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *pr > } > > for (i = 0; i < cnt; i++) { > + if (ucookies && __get_user(uprobes[i].cookie, ucookies + i)) { > + err = -EFAULT; > + goto error_free; > + } > if (uref_ctr_offsets && __get_user(ref_ctr_offsets[i], uref_ctr_offsets + i)) { > err = -EFAULT; > goto error_free; > @@ -3201,4 +3234,8 @@ int bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *pr > { > return -EOPNOTSUPP; > } > +static u64 bpf_uprobe_multi_cookie(struct bpf_run_ctx *ctx) > +{ > + return 0; > +} > #endif /* CONFIG_UPROBES */ > diff --git a/tools/include/uapi/linux/bpf.h b/tools/include/uapi/linux/bpf.h > index 659afbf9bb8b..492072ef5029 100644 > --- a/tools/include/uapi/linux/bpf.h > +++ b/tools/include/uapi/linux/bpf.h > @@ -1604,6 +1604,7 @@ union bpf_attr { > __aligned_u64 path; > __aligned_u64 offsets; > __aligned_u64 ref_ctr_offsets; > + __aligned_u64 cookies; > __u32 cnt; > __u32 flags; > } uprobe_multi; > -- > 2.41.0 > >
On Fri, Jul 21, 2023 at 10:18:27AM +0800, Yafang Shao wrote: > On Thu, Jul 20, 2023 at 7:36 PM Jiri Olsa <jolsa@kernel.org> wrote: > > > > Adding support to specify cookies array for uprobe_multi link. > > > > The cookies array share indexes and length with other uprobe_multi > > arrays (offsets/ref_ctr_offsets). > > > > The cookies[i] value defines cookie for i-the uprobe and will be > > returned by bpf_get_attach_cookie helper when called from ebpf > > program hooked to that specific uprobe. > > > > Acked-by: Andrii Nakryiko <andrii@kernel.org> > > Signed-off-by: Jiri Olsa <jolsa@kernel.org> > > --- > > include/uapi/linux/bpf.h | 1 + > > kernel/bpf/syscall.c | 2 +- > > kernel/trace/bpf_trace.c | 45 +++++++++++++++++++++++++++++++--- > > tools/include/uapi/linux/bpf.h | 1 + > > 4 files changed, 44 insertions(+), 5 deletions(-) > > > > diff --git a/include/uapi/linux/bpf.h b/include/uapi/linux/bpf.h > > index e764af513425..c6fbb0f948f4 100644 > > --- a/include/uapi/linux/bpf.h > > +++ b/include/uapi/linux/bpf.h > > @@ -1604,6 +1604,7 @@ union bpf_attr { > > __aligned_u64 path; > > __aligned_u64 offsets; > > __aligned_u64 ref_ctr_offsets; > > + __aligned_u64 cookies; > > __u32 cnt; > > __u32 flags; > > } uprobe_multi; > > diff --git a/kernel/bpf/syscall.c b/kernel/bpf/syscall.c > > index f4c6a265731e..840b622b7db1 100644 > > --- a/kernel/bpf/syscall.c > > +++ b/kernel/bpf/syscall.c > > @@ -4832,7 +4832,7 @@ static int bpf_map_do_batch(const union bpf_attr *attr, > > return err; > > } > > > > -#define BPF_LINK_CREATE_LAST_FIELD link_create.kprobe_multi.cookies > > +#define BPF_LINK_CREATE_LAST_FIELD link_create.uprobe_multi.cookies > > Shouldn't it be : > > #define BPF_LINK_CREATE_LAST_FIELD link_create.uprobe_multi.flags ? > > other than that, this patch looks good. ugh, I changed order of fields and forgot to update last fields, will fix that in next version thanks, jirka > > > > static int link_create(union bpf_attr *attr, bpfptr_t uattr) > > { > > struct bpf_prog *prog; > > diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c > > index 10284fd46f98..d73a47bd2bbd 100644 > > --- a/kernel/trace/bpf_trace.c > > +++ b/kernel/trace/bpf_trace.c > > @@ -87,6 +87,8 @@ static int bpf_btf_printf_prepare(struct btf_ptr *ptr, u32 btf_ptr_size, > > static u64 bpf_kprobe_multi_cookie(struct bpf_run_ctx *ctx); > > static u64 bpf_kprobe_multi_entry_ip(struct bpf_run_ctx *ctx); > > > > +static u64 bpf_uprobe_multi_cookie(struct bpf_run_ctx *ctx); > > + > > /** > > * trace_call_bpf - invoke BPF program > > * @call: tracepoint event > > @@ -1099,6 +1101,18 @@ static const struct bpf_func_proto bpf_get_attach_cookie_proto_kmulti = { > > .arg1_type = ARG_PTR_TO_CTX, > > }; > > > > +BPF_CALL_1(bpf_get_attach_cookie_uprobe_multi, struct pt_regs *, regs) > > +{ > > + return bpf_uprobe_multi_cookie(current->bpf_ctx); > > +} > > + > > +static const struct bpf_func_proto bpf_get_attach_cookie_proto_umulti = { > > + .func = bpf_get_attach_cookie_uprobe_multi, > > + .gpl_only = false, > > + .ret_type = RET_INTEGER, > > + .arg1_type = ARG_PTR_TO_CTX, > > +}; > > + > > BPF_CALL_1(bpf_get_attach_cookie_trace, void *, ctx) > > { > > struct bpf_trace_run_ctx *run_ctx; > > @@ -1545,9 +1559,11 @@ kprobe_prog_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog) > > &bpf_get_func_ip_proto_kprobe_multi : > > &bpf_get_func_ip_proto_kprobe; > > case BPF_FUNC_get_attach_cookie: > > - return prog->expected_attach_type == BPF_TRACE_KPROBE_MULTI ? > > - &bpf_get_attach_cookie_proto_kmulti : > > - &bpf_get_attach_cookie_proto_trace; > > + if (prog->expected_attach_type == BPF_TRACE_KPROBE_MULTI) > > + return &bpf_get_attach_cookie_proto_kmulti; > > + if (prog->expected_attach_type == BPF_TRACE_UPROBE_MULTI) > > + return &bpf_get_attach_cookie_proto_umulti; > > + return &bpf_get_attach_cookie_proto_trace; > > default: > > return bpf_tracing_func_proto(func_id, prog); > > } > > @@ -2973,6 +2989,7 @@ struct bpf_uprobe_multi_link; > > struct bpf_uprobe { > > struct bpf_uprobe_multi_link *link; > > loff_t offset; > > + u64 cookie; > > struct uprobe_consumer consumer; > > }; > > > > @@ -2986,6 +3003,7 @@ struct bpf_uprobe_multi_link { > > struct bpf_uprobe_multi_run_ctx { > > struct bpf_run_ctx run_ctx; > > unsigned long entry_ip; > > + struct bpf_uprobe *uprobe; > > }; > > > > static void bpf_uprobe_unregister(struct path *path, struct bpf_uprobe *uprobes, > > @@ -3029,6 +3047,7 @@ static int uprobe_prog_run(struct bpf_uprobe *uprobe, > > struct bpf_uprobe_multi_link *link = uprobe->link; > > struct bpf_uprobe_multi_run_ctx run_ctx = { > > .entry_ip = entry_ip, > > + .uprobe = uprobe, > > }; > > struct bpf_prog *prog = link->link.prog; > > bool sleepable = prog->aux->sleepable; > > @@ -3075,6 +3094,14 @@ uprobe_multi_link_ret_handler(struct uprobe_consumer *con, unsigned long func, s > > return uprobe_prog_run(uprobe, func, regs); > > } > > > > +static u64 bpf_uprobe_multi_cookie(struct bpf_run_ctx *ctx) > > +{ > > + struct bpf_uprobe_multi_run_ctx *run_ctx; > > + > > + run_ctx = container_of(current->bpf_ctx, struct bpf_uprobe_multi_run_ctx, run_ctx); > > + return run_ctx->uprobe->cookie; > > +} > > + > > int bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *prog) > > { > > struct bpf_uprobe_multi_link *link = NULL; > > @@ -3083,6 +3110,7 @@ int bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *pr > > struct bpf_link_primer link_primer; > > struct bpf_uprobe *uprobes = NULL; > > unsigned long __user *uoffsets; > > + u64 __user *ucookies; > > void __user *upath; > > u32 flags, cnt, i; > > struct path path; > > @@ -3102,7 +3130,7 @@ int bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *pr > > > > /* > > * path, offsets and cnt are mandatory, > > - * ref_ctr_offsets is optional > > + * ref_ctr_offsets and cookies are optional > > */ > > upath = u64_to_user_ptr(attr->link_create.uprobe_multi.path); > > uoffsets = u64_to_user_ptr(attr->link_create.uprobe_multi.offsets); > > @@ -3112,6 +3140,7 @@ int bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *pr > > return -EINVAL; > > > > uref_ctr_offsets = u64_to_user_ptr(attr->link_create.uprobe_multi.ref_ctr_offsets); > > + ucookies = u64_to_user_ptr(attr->link_create.uprobe_multi.cookies); > > > > name = strndup_user(upath, PATH_MAX); > > if (IS_ERR(name)) { > > @@ -3144,6 +3173,10 @@ int bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *pr > > } > > > > for (i = 0; i < cnt; i++) { > > + if (ucookies && __get_user(uprobes[i].cookie, ucookies + i)) { > > + err = -EFAULT; > > + goto error_free; > > + } > > if (uref_ctr_offsets && __get_user(ref_ctr_offsets[i], uref_ctr_offsets + i)) { > > err = -EFAULT; > > goto error_free; > > @@ -3201,4 +3234,8 @@ int bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *pr > > { > > return -EOPNOTSUPP; > > } > > +static u64 bpf_uprobe_multi_cookie(struct bpf_run_ctx *ctx) > > +{ > > + return 0; > > +} > > #endif /* CONFIG_UPROBES */ > > diff --git a/tools/include/uapi/linux/bpf.h b/tools/include/uapi/linux/bpf.h > > index 659afbf9bb8b..492072ef5029 100644 > > --- a/tools/include/uapi/linux/bpf.h > > +++ b/tools/include/uapi/linux/bpf.h > > @@ -1604,6 +1604,7 @@ union bpf_attr { > > __aligned_u64 path; > > __aligned_u64 offsets; > > __aligned_u64 ref_ctr_offsets; > > + __aligned_u64 cookies; > > __u32 cnt; > > __u32 flags; > > } uprobe_multi; > > -- > > 2.41.0 > > > > > > > -- > Regards > Yafang
diff --git a/include/uapi/linux/bpf.h b/include/uapi/linux/bpf.h index e764af513425..c6fbb0f948f4 100644 --- a/include/uapi/linux/bpf.h +++ b/include/uapi/linux/bpf.h @@ -1604,6 +1604,7 @@ union bpf_attr { __aligned_u64 path; __aligned_u64 offsets; __aligned_u64 ref_ctr_offsets; + __aligned_u64 cookies; __u32 cnt; __u32 flags; } uprobe_multi; diff --git a/kernel/bpf/syscall.c b/kernel/bpf/syscall.c index f4c6a265731e..840b622b7db1 100644 --- a/kernel/bpf/syscall.c +++ b/kernel/bpf/syscall.c @@ -4832,7 +4832,7 @@ static int bpf_map_do_batch(const union bpf_attr *attr, return err; } -#define BPF_LINK_CREATE_LAST_FIELD link_create.kprobe_multi.cookies +#define BPF_LINK_CREATE_LAST_FIELD link_create.uprobe_multi.cookies static int link_create(union bpf_attr *attr, bpfptr_t uattr) { struct bpf_prog *prog; diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c index 10284fd46f98..d73a47bd2bbd 100644 --- a/kernel/trace/bpf_trace.c +++ b/kernel/trace/bpf_trace.c @@ -87,6 +87,8 @@ static int bpf_btf_printf_prepare(struct btf_ptr *ptr, u32 btf_ptr_size, static u64 bpf_kprobe_multi_cookie(struct bpf_run_ctx *ctx); static u64 bpf_kprobe_multi_entry_ip(struct bpf_run_ctx *ctx); +static u64 bpf_uprobe_multi_cookie(struct bpf_run_ctx *ctx); + /** * trace_call_bpf - invoke BPF program * @call: tracepoint event @@ -1099,6 +1101,18 @@ static const struct bpf_func_proto bpf_get_attach_cookie_proto_kmulti = { .arg1_type = ARG_PTR_TO_CTX, }; +BPF_CALL_1(bpf_get_attach_cookie_uprobe_multi, struct pt_regs *, regs) +{ + return bpf_uprobe_multi_cookie(current->bpf_ctx); +} + +static const struct bpf_func_proto bpf_get_attach_cookie_proto_umulti = { + .func = bpf_get_attach_cookie_uprobe_multi, + .gpl_only = false, + .ret_type = RET_INTEGER, + .arg1_type = ARG_PTR_TO_CTX, +}; + BPF_CALL_1(bpf_get_attach_cookie_trace, void *, ctx) { struct bpf_trace_run_ctx *run_ctx; @@ -1545,9 +1559,11 @@ kprobe_prog_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog) &bpf_get_func_ip_proto_kprobe_multi : &bpf_get_func_ip_proto_kprobe; case BPF_FUNC_get_attach_cookie: - return prog->expected_attach_type == BPF_TRACE_KPROBE_MULTI ? - &bpf_get_attach_cookie_proto_kmulti : - &bpf_get_attach_cookie_proto_trace; + if (prog->expected_attach_type == BPF_TRACE_KPROBE_MULTI) + return &bpf_get_attach_cookie_proto_kmulti; + if (prog->expected_attach_type == BPF_TRACE_UPROBE_MULTI) + return &bpf_get_attach_cookie_proto_umulti; + return &bpf_get_attach_cookie_proto_trace; default: return bpf_tracing_func_proto(func_id, prog); } @@ -2973,6 +2989,7 @@ struct bpf_uprobe_multi_link; struct bpf_uprobe { struct bpf_uprobe_multi_link *link; loff_t offset; + u64 cookie; struct uprobe_consumer consumer; }; @@ -2986,6 +3003,7 @@ struct bpf_uprobe_multi_link { struct bpf_uprobe_multi_run_ctx { struct bpf_run_ctx run_ctx; unsigned long entry_ip; + struct bpf_uprobe *uprobe; }; static void bpf_uprobe_unregister(struct path *path, struct bpf_uprobe *uprobes, @@ -3029,6 +3047,7 @@ static int uprobe_prog_run(struct bpf_uprobe *uprobe, struct bpf_uprobe_multi_link *link = uprobe->link; struct bpf_uprobe_multi_run_ctx run_ctx = { .entry_ip = entry_ip, + .uprobe = uprobe, }; struct bpf_prog *prog = link->link.prog; bool sleepable = prog->aux->sleepable; @@ -3075,6 +3094,14 @@ uprobe_multi_link_ret_handler(struct uprobe_consumer *con, unsigned long func, s return uprobe_prog_run(uprobe, func, regs); } +static u64 bpf_uprobe_multi_cookie(struct bpf_run_ctx *ctx) +{ + struct bpf_uprobe_multi_run_ctx *run_ctx; + + run_ctx = container_of(current->bpf_ctx, struct bpf_uprobe_multi_run_ctx, run_ctx); + return run_ctx->uprobe->cookie; +} + int bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *prog) { struct bpf_uprobe_multi_link *link = NULL; @@ -3083,6 +3110,7 @@ int bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *pr struct bpf_link_primer link_primer; struct bpf_uprobe *uprobes = NULL; unsigned long __user *uoffsets; + u64 __user *ucookies; void __user *upath; u32 flags, cnt, i; struct path path; @@ -3102,7 +3130,7 @@ int bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *pr /* * path, offsets and cnt are mandatory, - * ref_ctr_offsets is optional + * ref_ctr_offsets and cookies are optional */ upath = u64_to_user_ptr(attr->link_create.uprobe_multi.path); uoffsets = u64_to_user_ptr(attr->link_create.uprobe_multi.offsets); @@ -3112,6 +3140,7 @@ int bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *pr return -EINVAL; uref_ctr_offsets = u64_to_user_ptr(attr->link_create.uprobe_multi.ref_ctr_offsets); + ucookies = u64_to_user_ptr(attr->link_create.uprobe_multi.cookies); name = strndup_user(upath, PATH_MAX); if (IS_ERR(name)) { @@ -3144,6 +3173,10 @@ int bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *pr } for (i = 0; i < cnt; i++) { + if (ucookies && __get_user(uprobes[i].cookie, ucookies + i)) { + err = -EFAULT; + goto error_free; + } if (uref_ctr_offsets && __get_user(ref_ctr_offsets[i], uref_ctr_offsets + i)) { err = -EFAULT; goto error_free; @@ -3201,4 +3234,8 @@ int bpf_uprobe_multi_link_attach(const union bpf_attr *attr, struct bpf_prog *pr { return -EOPNOTSUPP; } +static u64 bpf_uprobe_multi_cookie(struct bpf_run_ctx *ctx) +{ + return 0; +} #endif /* CONFIG_UPROBES */ diff --git a/tools/include/uapi/linux/bpf.h b/tools/include/uapi/linux/bpf.h index 659afbf9bb8b..492072ef5029 100644 --- a/tools/include/uapi/linux/bpf.h +++ b/tools/include/uapi/linux/bpf.h @@ -1604,6 +1604,7 @@ union bpf_attr { __aligned_u64 path; __aligned_u64 offsets; __aligned_u64 ref_ctr_offsets; + __aligned_u64 cookies; __u32 cnt; __u32 flags; } uprobe_multi;