From patchwork Thu Oct 14 14:34:29 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lorenz Bauer X-Patchwork-Id: 12558687 X-Patchwork-Delegate: bpf@iogearbox.net Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 740C2C433FE for ; Thu, 14 Oct 2021 14:35:01 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 5A75461181 for ; Thu, 14 Oct 2021 14:35:01 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231255AbhJNOhF (ORCPT ); Thu, 14 Oct 2021 10:37:05 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41490 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231199AbhJNOhF (ORCPT ); Thu, 14 Oct 2021 10:37:05 -0400 Received: from mail-wr1-x435.google.com (mail-wr1-x435.google.com [IPv6:2a00:1450:4864:20::435]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1A57EC061570 for ; Thu, 14 Oct 2021 07:35:00 -0700 (PDT) Received: by mail-wr1-x435.google.com with SMTP id k7so20043305wrd.13 for ; Thu, 14 Oct 2021 07:35:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cloudflare.com; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=BaOtCYQh3cbTMyIcLbI8dZ1B4xBleHXT37uXDX2iTiI=; b=tx0XH3+r46t3Y8dyml5p0EBHiZnyslFSKj8H/uG+hZmNW+I1v/+MPbydZalyvrj7rF qdoZEjgcE8i5NrZjrGpWnaH+ABuQWL0EUOMdJ0q/KUpk7v8oFhlse0b6y9xhV06bdR/w 7lEfyPyrc9OS5AdnQxg5BCDxOweApIVSDUIBs= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=BaOtCYQh3cbTMyIcLbI8dZ1B4xBleHXT37uXDX2iTiI=; b=mPrZAj9zwLH3QeqY5+2Iyii8Ke8IsVBbbsmP/3ByNiEt82fYK6rXnxLqMLtH0dzRlw s7R3JfCAyIvFLTu84SS2xtLErncEAopkJFuvkiNcTeSGDzO+sC19BYVaz6Lyh8XHJJEV fHtn0KtO8Ee36+nMWx5n85SZME3rLX5qD3+rMvzbgIxvvg7gtR4GwcVKKr2eOldSmRWz YewOKil5SF8WEtCH6u0sK4hEuOvemBljWNFlN7LSboGAUVSTB4KsfLjja35lRUiHQtez 6SCr6QvHPMnhe/QgBhtwdOm0Ctc6SwQTS5iHYlVBX5q4UKDOK6j3Z5OKqcAeOIkD2GRd /gIg== X-Gm-Message-State: AOAM530zEf8l/9ghV/9a3AdwxpHIgOqSDufxihQx/oZp4O/iIpQHuL97 cpMwP+5CYDVS5Bp1NZYqgx4SxttRgfM= X-Google-Smtp-Source: ABdhPJyLhtBcUhctyAARUBl3LNeEaQwyGnsBVRSLB1xMQ6DxiwyrYvNnVpmfDUF3BemfhMkT9rxkpw== X-Received: by 2002:a1c:a9d5:: with SMTP id s204mr6165708wme.193.1634222098484; Thu, 14 Oct 2021 07:34:58 -0700 (PDT) Received: from antares.. (4.4.a.7.5.8.b.d.d.b.6.7.4.d.a.6.f.f.6.2.a.5.a.7.0.b.8.0.1.0.0.2.ip6.arpa. [2001:8b0:7a5a:26ff:6ad4:76bd:db85:7a44]) by smtp.gmail.com with ESMTPSA id k6sm2656439wri.83.2021.10.14.07.34.58 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 14 Oct 2021 07:34:58 -0700 (PDT) From: Lorenz Bauer To: andrii@kernel.org, ast@kernel.org, daniel@iogearbox.net Cc: bpf@vger.kernel.org, kernel-team@cloudflare.com, Lorenz Bauer Subject: [RFC 5/9] bpf: enum bpf_map_create_attr Date: Thu, 14 Oct 2021 15:34:29 +0100 Message-Id: <20211014143436.54470-6-lmb@cloudflare.com> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20211014143436.54470-1-lmb@cloudflare.com> References: <20211014143436.54470-1-lmb@cloudflare.com> MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: bpf@vger.kernel.org X-Patchwork-Delegate: bpf@iogearbox.net X-Patchwork-State: RFC --- include/linux/bpf.h | 4 +-- include/uapi/linux/bpf.h | 62 ++++++++++++++++++++++++++-------------- kernel/bpf/syscall.c | 27 +++++++++++------ 3 files changed, 60 insertions(+), 33 deletions(-) diff --git a/include/linux/bpf.h b/include/linux/bpf.h index b6c45a6cbbba..80791db7945a 100644 --- a/include/linux/bpf.h +++ b/include/linux/bpf.h @@ -1613,8 +1613,8 @@ int cpu_map_generic_redirect(struct bpf_cpu_map_entry *rcpu, /* Return map's numa specified by userspace */ static inline int bpf_map_attr_numa_node(const union bpf_attr *attr) { - return (attr->map_flags & BPF_F_NUMA_NODE) ? - attr->numa_node : NUMA_NO_NODE; + return (attr->map_create.map_flags & BPF_F_NUMA_NODE) ? + attr->map_create.numa_node : NUMA_NO_NODE; } struct bpf_prog *bpf_prog_get_type_path(const char *name, enum bpf_prog_type type); diff --git a/include/uapi/linux/bpf.h b/include/uapi/linux/bpf.h index c1b1ce0e26a6..f1c163778d7a 100644 --- a/include/uapi/linux/bpf.h +++ b/include/uapi/linux/bpf.h @@ -1271,29 +1271,31 @@ enum { BPF_OBJ_NAME_LEN = 16U, }; +struct bpf_map_create_attr { + __u32 map_type; /* one of enum bpf_map_type */ + __u32 key_size; /* size of key in bytes */ + __u32 value_size; /* size of value in bytes */ + __u32 max_entries; /* max number of entries in a map */ + __u32 map_flags; /* BPF_MAP_CREATE related + * flags defined above. + */ + __u32 inner_map_fd; /* fd pointing to the inner map */ + __u32 numa_node; /* numa node (effective only if + * BPF_F_NUMA_NODE is set). + */ + char map_name[BPF_OBJ_NAME_LEN]; + __u32 map_ifindex; /* ifindex of netdev to create on */ + __u32 btf_fd; /* fd pointing to a BTF type data */ + __u32 btf_key_type_id; /* BTF type_id of the key */ + __u32 btf_value_type_id; /* BTF type_id of the value */ + __u32 btf_vmlinux_value_type_id; /* BTF type_id of a kernel- + * struct stored as the + * map value + */ +}; + union bpf_attr { - struct { /* anonymous struct used by BPF_MAP_CREATE command */ - __u32 map_type; /* one of enum bpf_map_type */ - __u32 key_size; /* size of key in bytes */ - __u32 value_size; /* size of value in bytes */ - __u32 max_entries; /* max number of entries in a map */ - __u32 map_flags; /* BPF_MAP_CREATE related - * flags defined above. - */ - __u32 inner_map_fd; /* fd pointing to the inner map */ - __u32 numa_node; /* numa node (effective only if - * BPF_F_NUMA_NODE is set). - */ - char map_name[BPF_OBJ_NAME_LEN]; - __u32 map_ifindex; /* ifindex of netdev to create on */ - __u32 btf_fd; /* fd pointing to a BTF type data */ - __u32 btf_key_type_id; /* BTF type_id of the key */ - __u32 btf_value_type_id; /* BTF type_id of the value */ - __u32 btf_vmlinux_value_type_id;/* BTF type_id of a kernel- - * struct stored as the - * map value - */ - }; + struct bpf_map_create_attr map_create; struct { /* anonymous struct used by BPF_MAP_*_ELEM commands */ __u32 map_fd; @@ -1506,6 +1508,22 @@ union bpf_attr { __u32 flags; /* extra flags */ } prog_bind_map; + /* DEPRECATED: these are kept for compatibility purposes. */ + struct { /* anonymous struct used by BPF_MAP_CREATE command */ + __u32 map_type; + __u32 key_size; + __u32 value_size; + __u32 max_entries; + __u32 map_flags; + __u32 inner_map_fd; + __u32 numa_node; + char map_name[BPF_OBJ_NAME_LEN]; + __u32 map_ifindex; + __u32 btf_fd; + __u32 btf_key_type_id; + __u32 btf_value_type_id; + __u32 btf_vmlinux_value_type_id; + }; } __attribute__((aligned(8))); /* The description below is an attempt at providing documentation to eBPF diff --git a/kernel/bpf/syscall.c b/kernel/bpf/syscall.c index 4e50c0bfdb7d..f7b57877acd2 100644 --- a/kernel/bpf/syscall.c +++ b/kernel/bpf/syscall.c @@ -103,7 +103,7 @@ const struct bpf_map_ops bpf_map_offload_ops = { .map_check_btf = map_check_no_btf, }; -static struct bpf_map *find_and_alloc_map(union bpf_attr *attr) +static struct bpf_map *find_and_alloc_map(struct bpf_map_create_attr *attr) { const struct bpf_map_ops *ops; u32 type = attr->map_type; @@ -118,13 +118,13 @@ static struct bpf_map *find_and_alloc_map(union bpf_attr *attr) return ERR_PTR(-EINVAL); if (ops->map_alloc_check) { - err = ops->map_alloc_check(attr); + err = ops->map_alloc_check((union bpf_attr *)attr); /* XXX: Dodgy cast */ if (err) return ERR_PTR(err); } if (attr->map_ifindex) ops = &bpf_map_offload_ops; - map = ops->map_alloc(attr); + map = ops->map_alloc((union bpf_attr *)attr); /* XXX: Dodgy cast */ if (IS_ERR(map)) return map; map->ops = ops; @@ -719,6 +719,15 @@ int bpf_get_file_flag(int flags) offsetof(union bpf_attr, CMD##_LAST_FIELD) - \ sizeof(attr->CMD##_LAST_FIELD)) != NULL +/* helper macro to extract a field from union bpf_attr while checking that the tail is zero. */ +#define ATTR_FIELD(attr, field) ({ \ + typeof(&((attr)->field)) __tmp = &((attr)->field); \ + if (memchr_inv((void *)__tmp + sizeof((attr)->field), 0, sizeof(*(attr)) - sizeof((attr)->field))) { \ + __tmp = NULL; \ + } \ + __tmp; \ + }) + /* dst and src must have at least "size" number of bytes. * Return strlen on success and < 0 on error. */ @@ -810,19 +819,19 @@ static int map_check_btf(struct bpf_map *map, const struct btf *btf, return ret; } -#define BPF_MAP_CREATE_LAST_FIELD btf_vmlinux_value_type_id /* called via syscall */ -static int map_create(union bpf_attr *attr) +static int map_create(struct bpf_map_create_attr *attr) { - int numa_node = bpf_map_attr_numa_node(attr); + int numa_node; struct bpf_map *map; int f_flags; int err; - err = CHECK_ATTR(BPF_MAP_CREATE); - if (err) + if (!attr) return -EINVAL; + numa_node = bpf_map_attr_numa_node((union bpf_attr *)attr); /* Dodgy cast */ + if (attr->btf_vmlinux_value_type_id) { if (attr->map_type != BPF_MAP_TYPE_STRUCT_OPS || attr->btf_key_type_id || attr->btf_value_type_id) @@ -4566,7 +4575,7 @@ static int __sys_bpf(int cmd, bpfptr_t uattr, unsigned int size) switch (cmd) { case BPF_MAP_CREATE: - err = map_create(&attr); + err = map_create(ATTR_FIELD(&attr, map_create)); break; case BPF_MAP_LOOKUP_ELEM: err = map_lookup_elem(&attr);