From patchwork Fri Feb 14 00:26:52 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Juntong Deng X-Patchwork-Id: 13974225 X-Patchwork-Delegate: bpf@iogearbox.net Received: from EUR03-AM7-obe.outbound.protection.outlook.com (mail-am7eur03olkn2089.outbound.protection.outlook.com [40.92.59.89]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 872CE17E; Fri, 14 Feb 2025 00:30:29 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=40.92.59.89 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1739493031; cv=fail; b=JBxxtHvX9Iz7yCZL0I8qNiXCxh4AIVNCCgHwEJ0UA2Rt7vP06b46w6NLHbFNRhihDTyxqWt7O0UJlOuuQGiqQge3cgMLrVyITBYi3v2tB1WW9fW1jEHRloaBPkeu/eatNamAOkVCQJQf2XKPLlU53JsfoO1kteZBK3W/HOIDiik= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1739493031; c=relaxed/simple; bh=4V5fRtJCFPW+Z88o3Ix9DGOKqPb5kh0vZyKNVcPpQTk=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: Content-Type:MIME-Version; b=pyv7Ub2X8RQVMvkOey6NQmMRbjENvdcN8j6fEAbfULBU1Try4ODbfxMekX8/A5pMwI+w1rmrT/O+NfP8Qnfft+c9FFeUP+4o+LCRuOgGIgHUsH52pxkMW8wwt/3jVPcqKtgsucM5d92KD1AIlmmAqitjCoi5eBDKKjjDp+vIEvk= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=outlook.com; spf=pass smtp.mailfrom=outlook.com; dkim=pass (2048-bit key) header.d=outlook.com header.i=@outlook.com header.b=ryAijmhd; arc=fail smtp.client-ip=40.92.59.89 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=outlook.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=outlook.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=outlook.com header.i=@outlook.com header.b="ryAijmhd" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=WZFjDzDBHYvwpsszz8+yX8ENCiZkphRKjgo70L77Hv9NPz+5vymd18uVKf/TdsFAoObjwjry/PLK0+IX4LsNUGm41NTg9YNMKbsFn+Qvy8JhEg/QNLuDfHVQneQYFi+MBPHgH3IV61qOwjKK3qvuH9UwamFC2YHakGlyrfqxGyWaCfABQE14j6n7KpYRzV6aqsFC4/INCuHrIpk3xdQHNd5ypmIf1F9M0FgZ90CWnZ8eyldXxjlziAJDNpp3m5oYn8R7yLvwt7ZimKV4KLLrI/tyIwMCy6LWiV3iTTGT7WbkiuTPAamSOM4//IYpJDGUWjVjuTocVLy70MV3/jA15g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=c8h9eAWOlNwSuFY9+CZjcjE2yBlZrLhmvuFY03rs+Jo=; b=O2PY9nyQBrXCtazm1h9KkeIGiMwGYzNJeKgB8l2igum5naI8xyH5jiO4wifxOUQrq797J1XEHx7DP2RxFvjfKkdl2dBH/tcubnO98Od8ezSKoY9I6Ma3j5mZxzpx7QL89itgjILsdh7jDsqC+U+XTluLDW2nH9fpa3WX74TnggZNKpuw4SMnkFOlBKYHJh4nd1n7gLomLAHtnflUuV1YFhH+HZbS8gb2cfhfSktUumkwl/9AOSVqbWMXwTlhNklR8LSGBvKHwxy7ixDVt9P/vloAk1tvgCsAUAPhDXFmnrivNEQ516loOdKT2NCU7AYRvRPO73gNkMHZmodIzEPcJg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=outlook.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=c8h9eAWOlNwSuFY9+CZjcjE2yBlZrLhmvuFY03rs+Jo=; b=ryAijmhd2D2KgpwpnMACLfpGCaAk8bNuG9Hx11cjYSYto/PKQc7FakbnHd5huoZN22ONDvId48BG7lhSLqiebHp8JV8FIf9JyTz7v5UnGbFkr7DIxEe/PTeJP5jb0ZwcnmtWf86ob+FTioucvf/1R2K7NuzQRZQ2uiP0gtUSs1Pv5yqDnXhk8nzFTd1YF8hLsGD6TDxppTNhS78w1iqZr7dwyyOEpuAm9XCK6Q0gYYmrGPSL8KGCt6emlTvCED85BtIUMJ/jiyLDa8lNlu8y1ttQ8jRD0CSFN+U2Q2EHPyYzRhQwADpbVI1YT0S/yG78Rj/lixCm5t1DDnkLtbV1vg== Received: from AM6PR03MB5080.eurprd03.prod.outlook.com (2603:10a6:20b:90::20) by DB9PR03MB8869.eurprd03.prod.outlook.com (2603:10a6:10:3df::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8445.16; Fri, 14 Feb 2025 00:30:26 +0000 Received: from AM6PR03MB5080.eurprd03.prod.outlook.com ([fe80::a16:9eb8:6868:f6d8]) by AM6PR03MB5080.eurprd03.prod.outlook.com ([fe80::a16:9eb8:6868:f6d8%4]) with mapi id 15.20.8422.015; Fri, 14 Feb 2025 00:30:26 +0000 From: Juntong Deng To: ast@kernel.org, daniel@iogearbox.net, john.fastabend@gmail.com, andrii@kernel.org, martin.lau@linux.dev, eddyz87@gmail.com, song@kernel.org, yonghong.song@linux.dev, kpsingh@kernel.org, sdf@fomichev.me, haoluo@google.com, jolsa@kernel.org, memxor@gmail.com, snorcht@gmail.com Cc: bpf@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [RFC PATCH bpf-next 1/6] bpf: Pairing data structure types with acquire/release kfuncs Date: Fri, 14 Feb 2025 00:26:52 +0000 Message-ID: X-Mailer: git-send-email 2.39.5 In-Reply-To: References: X-ClientProxiedBy: LO4P123CA0229.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:1a6::18) To AM6PR03MB5080.eurprd03.prod.outlook.com (2603:10a6:20b:90::20) X-Microsoft-Original-Message-ID: <20250214002657.68279-1-juntong.deng@outlook.com> Precedence: bulk X-Mailing-List: bpf@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: AM6PR03MB5080:EE_|DB9PR03MB8869:EE_ X-MS-Office365-Filtering-Correlation-Id: 07cdda27-aa3c-4e35-4e5c-08dd4c8ec68e X-Microsoft-Antispam: BCL:0;ARA:14566002|8060799006|19110799003|5072599009|15080799006|461199028|41001999003|3412199025|440099028; X-Microsoft-Antispam-Message-Info: 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 X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 07cdda27-aa3c-4e35-4e5c-08dd4c8ec68e X-MS-Exchange-CrossTenant-AuthSource: AM6PR03MB5080.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Feb 2025 00:30:25.9387 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg: 00000000-0000-0000-0000-000000000000 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR03MB8869 X-Patchwork-Delegate: bpf@iogearbox.net X-Patchwork-State: RFC This patch pairs data structure types with corresponding acquire/release kfuncs. Currently all kfuncs with KF_ACQUIRE have only one return value, and all kfuncs with KF_RELEASE have only one argument, so we can pair kfuncs with the btf id of the data structure type that can be acquired/released to construct tables. btf_struct_kfunc_set_add is used to add kfunc to acquire_kfunc_tab or release_kfunc_tab/release_kfunc_btf_tab depending on whether kfuncs is acquired or released, where the data structure type is converted to btf id and the kfunc name is converted to the memory address of kfunc. For acquiring kfuncs, we only need a table acquire_kfunc_tab, the kfuncs memory address is used as a key to find the type of the acquired object based on kfuncs when acquiring a reference. For releasing kfuncs, we need two tables release_kfunc_tab/ release_kfunc_btf_tab. In release_kfunc_btf_tab, the btf id is used as the key to find the kfunc that can be used to release the object according to the type of the object when the object needs to be released. In release_kfunc_tab, the kfuncs memory address is used as the key. Currently, release_kfunc_tab is only used to determine whether a kfunc is a releasing kfunc. Signed-off-by: Juntong Deng --- kernel/bpf/btf.c | 126 ++++++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 125 insertions(+), 1 deletion(-) diff --git a/kernel/bpf/btf.c b/kernel/bpf/btf.c index 9433b6467bbe..3548b52ca9c2 100644 --- a/kernel/bpf/btf.c +++ b/kernel/bpf/btf.c @@ -249,6 +249,17 @@ struct btf_struct_ops_tab { struct bpf_struct_ops_desc ops[]; }; +struct btf_struct_kfunc { + u32 struct_btf_id; + unsigned long kfunc_addr; +}; + +struct btf_struct_kfunc_tab { + u32 cnt; + u32 capacity; + struct btf_struct_kfunc *set; +}; + struct btf { void *data; struct btf_type **types; @@ -267,6 +278,9 @@ struct btf { struct btf_id_dtor_kfunc_tab *dtor_kfunc_tab; struct btf_struct_metas *struct_meta_tab; struct btf_struct_ops_tab *struct_ops_tab; + struct btf_struct_kfunc_tab *acquire_kfunc_tab; + struct btf_struct_kfunc_tab *release_kfunc_tab; + struct btf_struct_kfunc_tab *release_kfunc_btf_tab; /* split BTF support */ struct btf *base_btf; @@ -8357,6 +8371,112 @@ static int btf_check_kfunc_protos(struct btf *btf, u32 func_id, u32 func_flags) return 0; } +static inline int btf_kfunc_addr_cmp_func(const void *a, const void *b) +{ + const struct btf_struct_kfunc *pa = a, *pb = b; + + return pa->kfunc_addr - pb->kfunc_addr; +} + +static int __btf_struct_kfunc_set_add(struct btf_struct_kfunc_tab **kfunc_tab, u32 struct_btf_id, + unsigned long kfunc_addr, void *key, cmp_func_t cmp_func) +{ + struct btf_struct_kfunc_tab *tab; + struct btf_struct_kfunc *set; + int ret; + + tab = *kfunc_tab; + if (!tab) { + tab = kzalloc(sizeof(*tab), GFP_KERNEL | __GFP_NOWARN); + if (!tab) + return -ENOMEM; + + tab->cnt = 0; + tab->capacity = 0; + + *kfunc_tab = tab; + } + + set = tab->set; + if (set && bsearch(key, set, tab->cnt, sizeof(struct btf_struct_kfunc), cmp_func)) + return 0; + + if (tab->cnt + 1 > tab->capacity) { + set = krealloc(tab->set, sizeof(struct btf_struct_kfunc) * (tab->capacity + 16), + GFP_KERNEL | __GFP_NOWARN); + if (!set) { + ret = -ENOMEM; + goto end; + } + tab->capacity += 16; + } + + set[tab->cnt].struct_btf_id = struct_btf_id; + set[tab->cnt].kfunc_addr = kfunc_addr; + + tab->set = set; + tab->cnt += 1; + + sort(tab->set, tab->cnt, sizeof(struct btf_struct_kfunc), cmp_func, NULL); + + return 0; +end: + kfree(tab->set); + kfree(tab); + return ret; +} + +static int btf_struct_kfunc_set_add(struct btf *btf, u32 kfunc_id, u32 kfunc_flags) +{ + const struct btf_type *kfunc, *kfunc_proto, *sturct_type; + struct btf_struct_kfunc dummy_key; + unsigned long kfunc_addr; + const char *kfunc_name; + u32 struct_btf_id; + int ret; + + kfunc = btf_type_by_id(btf, kfunc_id); + kfunc_name = btf_name_by_offset(btf, kfunc->name_off); + if (!kfunc_name) + return -EINVAL; + + kfunc_proto = btf_type_by_id(btf, kfunc->type); + if (!kfunc_proto || !btf_type_is_func_proto(kfunc_proto)) + return -EINVAL; + + if (kfunc_flags & KF_ACQUIRE) { + sturct_type = btf_type_skip_modifiers(btf, kfunc_proto->type, NULL); + } else { /* kfunc_flags & KF_RELEASE */ + if (btf_type_vlen(kfunc_proto) < 1) + return -EINVAL; + + sturct_type = btf_type_skip_modifiers(btf, btf_params(kfunc_proto)[0].type, NULL); + } + + if (!sturct_type || !btf_type_is_ptr(sturct_type)) + return -EINVAL; + sturct_type = btf_type_skip_modifiers(btf, sturct_type->type, &struct_btf_id); + if (!sturct_type || !__btf_type_is_struct(sturct_type)) + return -EINVAL; + + kfunc_addr = kallsyms_lookup_name(kfunc_name); + dummy_key.kfunc_addr = kfunc_addr; + + if (kfunc_flags & KF_ACQUIRE) { + ret = __btf_struct_kfunc_set_add(&btf->acquire_kfunc_tab, struct_btf_id, + kfunc_addr, &dummy_key, btf_kfunc_addr_cmp_func); + } else { /* kfunc_flags & KF_RELEASE */ + ret = __btf_struct_kfunc_set_add(&btf->release_kfunc_tab, struct_btf_id, + kfunc_addr, &dummy_key, btf_kfunc_addr_cmp_func); + if (ret) + return ret; + ret = __btf_struct_kfunc_set_add(&btf->release_kfunc_btf_tab, struct_btf_id, + kfunc_addr, &struct_btf_id, btf_id_cmp_func); + } + + return ret; +} + /* Kernel Function (kfunc) BTF ID set registration API */ static int btf_populate_kfunc_set(struct btf *btf, enum btf_kfunc_hook hook, @@ -8453,9 +8573,13 @@ static int btf_populate_kfunc_set(struct btf *btf, enum btf_kfunc_hook hook, /* Concatenate the two sets */ memcpy(set->pairs + set->cnt, add_set->pairs, add_set->cnt * sizeof(set->pairs[0])); /* Now that the set is copied, update with relocated BTF ids */ - for (i = set->cnt; i < set->cnt + add_set->cnt; i++) + for (i = set->cnt; i < set->cnt + add_set->cnt; i++) { set->pairs[i].id = btf_relocate_id(btf, set->pairs[i].id); + if (set->pairs[i].flags & (KF_ACQUIRE | KF_RELEASE)) + btf_struct_kfunc_set_add(btf, set->pairs[i].id, set->pairs[i].flags); + } + set->cnt += add_set->cnt; sort(set->pairs, set->cnt, sizeof(set->pairs[0]), btf_id_cmp_func, NULL); From patchwork Fri Feb 14 00:26:53 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Juntong Deng X-Patchwork-Id: 13974226 X-Patchwork-Delegate: bpf@iogearbox.net Received: from EUR03-DBA-obe.outbound.protection.outlook.com (mail-dbaeur03olkn2021.outbound.protection.outlook.com [40.92.58.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D6B7317E; Fri, 14 Feb 2025 00:31:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=40.92.58.21 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1739493082; cv=fail; b=Bmsotc4P6HyS4FJBBAhP9XG3m2hkoMCUfF677nTOXWWiBlzQdlZZwMR/wmIWaambg83Hf6Q9Z/lxejhDf6p/k8SpHDyVlQ7yQMK6J/S+esiHJPbg5+llWpVI2gN6AY130NNWwfgG84T6ykxY7r/pDgbf3C6o1Rjs4e5kfb/t5hQ= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1739493082; c=relaxed/simple; bh=sm4fcQXPRhn+cB/EWMv3cWGE2PaP9EnIy7SevCXFUww=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: Content-Type:MIME-Version; b=QBux3WIYcanEcFCOX6tVxzrzjPVLa9bWYu2HNqTl7djdd0yHYWiTfU4m2bsfSAMv3F+6h9yAywYjiHEj6IHvnmEfMocf9HXAUjVhWrSA6zmZ42deBPJ49OUJPkRvbS324Bu+aynckv1DEGQURrBL0v40apebWiSmGuNMFN8jfzs= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=outlook.com; spf=pass smtp.mailfrom=outlook.com; dkim=pass (2048-bit key) header.d=outlook.com header.i=@outlook.com header.b=onHKDsjz; arc=fail smtp.client-ip=40.92.58.21 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=outlook.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=outlook.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=outlook.com header.i=@outlook.com header.b="onHKDsjz" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=hw4Cq83sY/kbXPRJ8ptDfKHogDQIeNaShGt34Uwpz8ukkHlE5kO27pSTaDN6LkliUM7ZdhdQ8tucRj9f11Lro4ZJfAfOXVzaYpDxFxRz4Q1nX1jCzTtUowbTCx0ijwcyQ9G2yNO9767sieLZg0rnZ+Cu2wr15TU0kGbNOYn2z4/JzIGn4yr0flsQmd363M6kAn8Q2wJMvaXRr9cSXJEjmbfepYopeQBECotHE9Trww/iX5mBZY3Ut/hkL+oPgp4Tjtm9Dr7G04AWG/YCDJAo3H3LaMQwXwL8uqQFISKKjmQMsi+aa1Pjca1bShs+anxFLyx1gBD6GbDEpEnvB+Tf3Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Nd6UG5sJ6D8bYn5ZzB1SAka3sw4Qj7oIstrGT1doitU=; b=QMs29jvai0GXbI/+OyBZ0QE1DTU8lU3c8SRJ4TJgWS4zUmt5v/CvTgNEOEggs9EQ+5VIPESsFRaYKREOsnOFyTllg/vfCG0pu3fufEybXXK0znhtFiR0epp12B2pUSr8axWoHKsznk4gIZHzzQ9mQ1EpgrQdSfeLGl9ki7CUmOJ8kQXr/NvXGEvwOSr/kujR2FGNIFHi58giiF6zaDd7DJ7SZqGnygBH8syT2kSdCudj4sicoddK+4/g3u9ZD2JoAs9nSxo+sYfvxmQla+eyc6EY/1RmoOlQf4vrMCAbKpgec49IuAbxns2kI1ba6XywI76Ktqk68XMzJYHeZC54xA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=outlook.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Nd6UG5sJ6D8bYn5ZzB1SAka3sw4Qj7oIstrGT1doitU=; b=onHKDsjzIEsjLyfJTNf/E15cCi81W/RV7iTZVwm7gth2B4EkZ/80fVcJVy4hChphmSzQsLPvZzLjWTFnbzYoCZ+eoWm3TWsvbiSW2YRwrG/IXb1eHCk9oAcgtQJe2mH0jyJPFbF2VSgjewIWzo00nOfwalzPZ1EHv6kkRGUBsB2dqEsXQrNELWTLqnVrJp5gAVOjPZE0Eqd3tO5FpQoMUTZa5TeniKY378TRzsvrFw/AMurGZ23CzZD08ArvlN6C8ej/0aKuqojWnH8Kj/T7hS7/Mx45htkPZ8Tw0hHBVLSf+vtlC7CVnqpV41FkgNy+U0dGNbI8cDaO44dGvxH/PA== Received: from AM6PR03MB5080.eurprd03.prod.outlook.com (2603:10a6:20b:90::20) by DB9PR03MB8869.eurprd03.prod.outlook.com (2603:10a6:10:3df::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8445.16; Fri, 14 Feb 2025 00:31:16 +0000 Received: from AM6PR03MB5080.eurprd03.prod.outlook.com ([fe80::a16:9eb8:6868:f6d8]) by AM6PR03MB5080.eurprd03.prod.outlook.com ([fe80::a16:9eb8:6868:f6d8%4]) with mapi id 15.20.8422.015; Fri, 14 Feb 2025 00:31:16 +0000 From: Juntong Deng To: ast@kernel.org, daniel@iogearbox.net, john.fastabend@gmail.com, andrii@kernel.org, martin.lau@linux.dev, eddyz87@gmail.com, song@kernel.org, yonghong.song@linux.dev, kpsingh@kernel.org, sdf@fomichev.me, haoluo@google.com, jolsa@kernel.org, memxor@gmail.com, snorcht@gmail.com Cc: bpf@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [RFC PATCH bpf-next 2/6] bpf: Add max_acquired_refs to struct bpf_prog Date: Fri, 14 Feb 2025 00:26:53 +0000 Message-ID: X-Mailer: git-send-email 2.39.5 In-Reply-To: References: X-ClientProxiedBy: LO4P123CA0229.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:1a6::18) To AM6PR03MB5080.eurprd03.prod.outlook.com (2603:10a6:20b:90::20) X-Microsoft-Original-Message-ID: <20250214002657.68279-2-juntong.deng@outlook.com> Precedence: bulk X-Mailing-List: bpf@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: AM6PR03MB5080:EE_|DB9PR03MB8869:EE_ X-MS-Office365-Filtering-Correlation-Id: f4a81d44-a550-419c-ed11-08dd4c8ee48b X-Microsoft-Antispam: BCL:0;ARA:14566002|8060799006|19110799003|5072599009|15080799006|461199028|41001999003|3412199025|440099028; X-Microsoft-Antispam-Message-Info: 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 X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: f4a81d44-a550-419c-ed11-08dd4c8ee48b X-MS-Exchange-CrossTenant-AuthSource: AM6PR03MB5080.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Feb 2025 00:31:16.2489 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg: 00000000-0000-0000-0000-000000000000 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR03MB8869 X-Patchwork-Delegate: bpf@iogearbox.net X-Patchwork-State: RFC This patch adds max_acquired_refs to struct bpf_prog. max_acquired_refs is used to record the maximum number of references that a bpf program may have acquired at the same time. Signed-off-by: Juntong Deng --- include/linux/bpf.h | 1 + kernel/bpf/verifier.c | 5 +++++ 2 files changed, 6 insertions(+) diff --git a/include/linux/bpf.h b/include/linux/bpf.h index f3f50e29d639..3ccc20f936b2 100644 --- a/include/linux/bpf.h +++ b/include/linux/bpf.h @@ -1618,6 +1618,7 @@ struct bpf_prog { enum bpf_attach_type expected_attach_type; /* For some prog types */ u32 len; /* Number of filter blocks */ u32 jited_len; /* Size of jited insns in bytes */ + u32 max_acquired_refs; u8 tag[BPF_TAG_SIZE]; struct bpf_prog_stats __percpu *stats; int __percpu *active; diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c index 9971c03adfd5..2d7f5aea90df 100644 --- a/kernel/bpf/verifier.c +++ b/kernel/bpf/verifier.c @@ -1479,6 +1479,9 @@ static struct bpf_reference_state *acquire_reference_state(struct bpf_verifier_e return NULL; state->refs[new_ofs].insn_idx = insn_idx; + if (env->prog->max_acquired_refs < state->acquired_refs) + env->prog->max_acquired_refs = state->acquired_refs; + return &state->refs[new_ofs]; } @@ -18927,6 +18930,8 @@ static int do_check(struct bpf_verifier_env *env) bool do_print_state = false; int prev_insn_idx = -1; + env->prog->max_acquired_refs = 0; + for (;;) { bool exception_exit = false; struct bpf_insn *insn; From patchwork Fri Feb 14 00:26:54 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Juntong Deng X-Patchwork-Id: 13974227 X-Patchwork-Delegate: bpf@iogearbox.net Received: from EUR03-AM7-obe.outbound.protection.outlook.com (mail-am7eur03olkn2014.outbound.protection.outlook.com [40.92.59.14]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 853A1134D4; Fri, 14 Feb 2025 00:33:16 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=40.92.59.14 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1739493199; cv=fail; b=shexH1cmcs7a9Q/4pwQsNcIiIko+royZ08CBjjEAmTV+bJEh+b22Zcl13R01fjw87eV+3+1fFxSq4NqTQ+HNs4LzeSs1xb17nr21gGD9mLDr1DQ0sMNDKrRhJ5gWnPY2myUesE5+z6gmCJlXy8iYQn3txVbHN+MuJd6jGPjKWeo= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1739493199; c=relaxed/simple; bh=JWuiJasS8860QMkmztej+3oDPfd77uxfjQQ6S45LRWA=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: Content-Type:MIME-Version; b=O6FELRe+DPYWlG/+9Ie9/3BKvIkNLVTISJA7XUvPrP8sQaycB3L+Jy/Zwgmrb8TUejG/tioknbfydtR0NmVNV3yaa0XuP4NmH7U6o6pBj0FsMPIlH/bDey/aT4cs26Kqk2qNVh2AV863oV3n/RWR3ElDcEiAEZKVsPYeHY4JBII= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=outlook.com; spf=pass smtp.mailfrom=outlook.com; dkim=pass (2048-bit key) header.d=outlook.com header.i=@outlook.com header.b=RWuc/OKy; arc=fail smtp.client-ip=40.92.59.14 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=outlook.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=outlook.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=outlook.com header.i=@outlook.com header.b="RWuc/OKy" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=RRyzplAU4J79vKvDDTkkMTN4rW1UKcZow5Ux+w0f2Yh4LQwCUp/7l9UU6krv0Ci+EH3FuQQ+oT2fu69FBeZa1TsmwU6u2NllpnGf5vZij3fB6cK+aWRxxVKXetjekXKMJg5ViapsFiqkvq/2bzm5HGbyb4GZxudFDqUL8HmzoPCewFlIvoo+b42CbOAJIrz7Iw8myQJLjaQiQrF8kEQOx4nxNHPJqpSOUKVGP9E4smNPgLANVdbVEHZzLd/L+fFno6nkdbdSRQgfmbjXEZDqdyTAZx0wwZm8em8MwT2aTDnn3OAPAWvTyC25y8kvVEfaFOcRvgzMODUiAuPZ/G09Mw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=2TZOmdi257EbXTuOknlFZlojF6sQOigQnIyaFQt0mgw=; b=sNtEYEglgzJGy9fbUeq3Njc/W2PLiJgGcjcJCsVZY1/g0b7QsrEnIW8QKX5Tg9P/QwDHXgIXvaw9jT/Wb84jzOjXrbp9KmnHCdkoDHZZSGgsE3M6GTvWnTylYOvZc/dGzCPzs+7OTwQKlHNw5UypxQTh3wm21945980YOJreZaNg6vV8CVuNcFVy0UmNo1RPsVCfikIWHB5RMqMotA1Dz+dUJ21mweD/ZcNhyja6edb1Eg4e+ZmpmJNAxu7ZhDhSrWjevXEweuQPJuGo1/MR/R5x/ZSrMiqgdL/QyYFWbYfie9DvK2QaMo5X3AOCrrr8xFnbmPCsZ9RC7ILRez3nmw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=outlook.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2TZOmdi257EbXTuOknlFZlojF6sQOigQnIyaFQt0mgw=; b=RWuc/OKyz3PeVA41ejg9gaTgg0QZvw1Gph4+kzjn5XQJWhE7RNCczQOrTCDEoGZvdUHrqpLmwLQVIMbdo2ZBFkkFcMvDaZ0LhPZtAkifuluyTe5eJHOEB/tfaB5qjb/WrUnaY0LUBk/mLW4f63eoLDmVuNowMoIgTs1ukDC1Bj/JYoLx+tslxbXl7+WaTxe+r0Unu/Ovff8BZ7cOhQkInfZbsgJ2MFVRzigMkGUVel+neCxo+D0YmSuGjBSljfWg0pdY/c3uDaq2GM0qmszf1eXfD6TqFNhmdQ4hqK2zvOnPIQHAqv6+5tqWTUPg/QtihdZOBxhfYRc6KNEaJuA69g== Received: from AM6PR03MB5080.eurprd03.prod.outlook.com (2603:10a6:20b:90::20) by DB9PR03MB8869.eurprd03.prod.outlook.com (2603:10a6:10:3df::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8445.16; Fri, 14 Feb 2025 00:33:13 +0000 Received: from AM6PR03MB5080.eurprd03.prod.outlook.com ([fe80::a16:9eb8:6868:f6d8]) by AM6PR03MB5080.eurprd03.prod.outlook.com ([fe80::a16:9eb8:6868:f6d8%4]) with mapi id 15.20.8422.015; Fri, 14 Feb 2025 00:33:13 +0000 From: Juntong Deng To: ast@kernel.org, daniel@iogearbox.net, john.fastabend@gmail.com, andrii@kernel.org, martin.lau@linux.dev, eddyz87@gmail.com, song@kernel.org, yonghong.song@linux.dev, kpsingh@kernel.org, sdf@fomichev.me, haoluo@google.com, jolsa@kernel.org, memxor@gmail.com, snorcht@gmail.com Cc: bpf@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [RFC PATCH bpf-next 3/6] bpf: Add active reference hash table and free reference list to struct bpf_run_ctx Date: Fri, 14 Feb 2025 00:26:54 +0000 Message-ID: X-Mailer: git-send-email 2.39.5 In-Reply-To: References: X-ClientProxiedBy: LO4P123CA0229.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:1a6::18) To AM6PR03MB5080.eurprd03.prod.outlook.com (2603:10a6:20b:90::20) X-Microsoft-Original-Message-ID: <20250214002657.68279-3-juntong.deng@outlook.com> Precedence: bulk X-Mailing-List: bpf@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: AM6PR03MB5080:EE_|DB9PR03MB8869:EE_ X-MS-Office365-Filtering-Correlation-Id: 3b6ac04c-519c-430c-46c8-08dd4c8f2aa7 X-Microsoft-Antispam: BCL:0;ARA:14566002|8060799006|19110799003|5072599009|15080799006|461199028|41001999003|12091999003|11031999003|3412199025|440099028; X-Microsoft-Antispam-Message-Info: WbJg2gn0KzeGqTnTLcIGFqqNMpuVmuZm3oJF0KibBIAVuoQpuxkGRuVRd4xgLh+x27HWJNuofEidv00UhXxyZP3ED/bWcgJmW2QO3lclkQVEo5gM0kigcxjuLLezOp6itxKjwBx/Lgl9zh4fsVJ8fC3lxca0w1+m7yhnr3S6N5WiRKc8WcF5a8gsc70XanUzF88BGgADS9ipv7+J0JcOHRLD17NHJkocc9TVo4S40/iBJf54Q2T2JM8E2KVlhSMB+Q/CiqpQfBrCYBzHftyhYmGFUogdL580TkmPpja7+Eb9pKtTfhfRBiaqRp4oupWRJpROdTFCNVAZWF/cHerjfdODDBS6vPBBircqDXNabqIWkBXAXPWp5GTVPsSUjwSdQQhGi7L00kkbgqh3/PrvqDbOm1O5kIQ3DAC+rL28RYxQnCdGrFCQXgnwI3SjsSYHyGHo1FnghL1ZaB/sJeqpQSLBp3WCwVTuvLCyb1vxackiGoMMQvXkbs1wz/GwnZrr2C2sE4x42UiyTegE9K9E9Fds4eOUJgrtwbgKQm3NOuQLfiLF590rAugcVtosnGZAQfxltNKxLhX8Vy0nigU2kZbFAz6wwdHXeVbsdznS9zJXkN0AsvijPNY7L1QXWroOHE6CVwTYlAslOEJISkVUeRMWu3pAn909L2LWEmD8jpCcAipHx2lsY22AKr9xQDa0Y6YmcWZeCp+y3y3v1lYhF8qYVl4P12naefHiUgSW8EyI4VD2UJTVOuDWoBRABm3KX/LYVXdMnxOQqX9zwRo0F6SjgdX3qCAS3HJOa95yT7jTd2twtgsbo2aKCvdnXZSsLyGJqBXZL8eb+WhQ7HOXHoZJh7wC4KQ0zlf2SYZYtqpeSgyPZ53YwbWgXC3oSxawWjjO2GiOurJx5HJ9Kj7/em3wwSJydB63v3XYpbitUJVQvetQw64HMjFu/bVyk8yW2kFY9XHHJYLzK5vlDZ0EBuFTNNhD8sPbfKbPL4rsnAbO/YVbta+HSsZl9aGJ5USTEFWCQgbRiQHtWvHWtnrEg1U867gfhM0p9oPSH/p3G4gW5oq/m3XApkNZRHpYqhitLsdoUb2jXeshp4XLFYz8bFnPIENEOVYaaEBUWX7iKFye8wu4rDJC1WSIgrIEeNGMHQRIf5ab8wEfKGoo2gg37A== X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 3b6ac04c-519c-430c-46c8-08dd4c8f2aa7 X-MS-Exchange-CrossTenant-AuthSource: AM6PR03MB5080.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Feb 2025 00:33:13.8633 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg: 00000000-0000-0000-0000-000000000000 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR03MB8869 X-Patchwork-Delegate: bpf@iogearbox.net X-Patchwork-State: RFC This patch adds active references hash table and free references list to struct bpf_run_ctx. The active reference hash table stores active reference nodes that record the references currently held by the bpf program. The free reference list stores free reference nodes. At the beginning all reference nodes are free. During initialization, max_acquired_refs number of reference nodes will be created to record information about the references held by the bpf program. A reference node records information including the object btf id and the object memory address. The bpf context will be initialized through init_bpf_context before the bpf program runs, and cleared through clear_bpf_context after the bpf program ends. Currently only used to demonstrate the idea, so only applied to the syscall program type (only added to bpf_prog_test_run_syscall). Signed-off-by: Juntong Deng --- include/linux/bpf.h | 6 +++++- include/linux/btf.h | 7 +++++++ net/bpf/test_run.c | 37 +++++++++++++++++++++++++++++++++++++ 3 files changed, 49 insertions(+), 1 deletion(-) diff --git a/include/linux/bpf.h b/include/linux/bpf.h index 3ccc20f936b2..1bc90d805872 100644 --- a/include/linux/bpf.h +++ b/include/linux/bpf.h @@ -11,6 +11,7 @@ #include #include #include +#include #include #include #include @@ -2109,7 +2110,10 @@ int bpf_prog_array_copy(struct bpf_prog_array *old_array, u64 bpf_cookie, struct bpf_prog_array **new_array); -struct bpf_run_ctx {}; +struct bpf_run_ctx { + DECLARE_HASHTABLE(active_ref_list, 5); + struct list_head free_ref_list; +}; struct bpf_cg_run_ctx { struct bpf_run_ctx run_ctx; diff --git a/include/linux/btf.h b/include/linux/btf.h index ebc0c0c9b944..2bd7fc996756 100644 --- a/include/linux/btf.h +++ b/include/linux/btf.h @@ -139,6 +139,13 @@ struct btf_struct_metas { struct btf_struct_meta types[]; }; +struct bpf_ref_node { + struct hlist_node hnode; + struct list_head lnode; + u32 struct_btf_id; + unsigned long obj_addr; +}; + extern const struct file_operations btf_fops; const char *btf_get_name(const struct btf *btf); diff --git a/net/bpf/test_run.c b/net/bpf/test_run.c index 8f6f7db48d4e..13d0994883c0 100644 --- a/net/bpf/test_run.c +++ b/net/bpf/test_run.c @@ -1530,12 +1530,43 @@ int bpf_prog_test_run_sk_lookup(struct bpf_prog *prog, const union bpf_attr *kat return ret; } +static void init_bpf_context(struct bpf_run_ctx *ctx, struct bpf_prog *prog) +{ + struct bpf_ref_node *node; + int i; + + hash_init(ctx->active_ref_list); + INIT_LIST_HEAD(&ctx->free_ref_list); + + for (i = 0; i < prog->max_acquired_refs; i++) { + node = kmalloc(sizeof(*node), GFP_KERNEL); + list_add(&node->lnode, &ctx->free_ref_list); + } +} + +static void clear_bpf_context(struct bpf_run_ctx *ctx) +{ + struct bpf_ref_node *node, *tmp; + int bkt; + + hash_for_each(ctx->active_ref_list, bkt, node, hnode) { + hash_del(&node->hnode); + kfree(node); + } + + list_for_each_entry_safe(node, tmp, &ctx->free_ref_list, lnode) { + list_del(&node->lnode); + kfree(node); + } +} + int bpf_prog_test_run_syscall(struct bpf_prog *prog, const union bpf_attr *kattr, union bpf_attr __user *uattr) { void __user *ctx_in = u64_to_user_ptr(kattr->test.ctx_in); __u32 ctx_size_in = kattr->test.ctx_size_in; + struct bpf_run_ctx *old_ctx, run_ctx; void *ctx = NULL; u32 retval; int err = 0; @@ -1557,10 +1588,16 @@ int bpf_prog_test_run_syscall(struct bpf_prog *prog, return PTR_ERR(ctx); } + init_bpf_context(&run_ctx, prog); + old_ctx = bpf_set_run_ctx(&run_ctx); + rcu_read_lock_trace(); retval = bpf_prog_run_pin_on_cpu(prog, ctx); rcu_read_unlock_trace(); + bpf_reset_run_ctx(old_ctx); + clear_bpf_context(&run_ctx); + if (copy_to_user(&uattr->test.retval, &retval, sizeof(u32))) { err = -EFAULT; goto out; From patchwork Fri Feb 14 00:26:55 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Juntong Deng X-Patchwork-Id: 13974232 X-Patchwork-Delegate: bpf@iogearbox.net Received: from EUR03-DBA-obe.outbound.protection.outlook.com (mail-dbaeur03olkn2107.outbound.protection.outlook.com [40.92.58.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 8C21A17E; Fri, 14 Feb 2025 00:36:06 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=40.92.58.107 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1739493369; cv=fail; b=Nko12Q5HbR16VwcYidXOYOtXolF5ZAeLu4flNMfg79rAS/KYI3PNUhKvg2fM37ZTh443TuX39PO6KFyyBTCWg2ax2UbgmoBlvHNcs25eo+zEpgK4Vg8Max4up9dk5b7HtV3zVBdULX2tpkGIOEkB4xArA5MjZRnpiFjifd8W9po= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1739493369; c=relaxed/simple; bh=e4p3PeZyB8cvPxX32hj0dA28u4inhIt7RFLAvYB4J+k=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: Content-Type:MIME-Version; b=WAkzvvY1pJagly9C5cPruHOco15531wBbF0Cwj3nlW/b7yi6osF2qHuJ6xHzDggekAcBtO54J7d3DXuyOOOr6hfAkmPBNznQeMgir8SmdUCwdvxPIvtJiMp8bDt5t/27nO46TeL5v/gH84al5ygK29EriOtUujR1mXjEwQ112jQ= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=outlook.com; spf=pass smtp.mailfrom=outlook.com; dkim=pass (2048-bit key) header.d=outlook.com header.i=@outlook.com header.b=BuLkp5tp; arc=fail smtp.client-ip=40.92.58.107 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=outlook.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=outlook.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=outlook.com header.i=@outlook.com header.b="BuLkp5tp" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=x0hXTYpWzP52BhVwfuor87nG5rCqwvDM32tRBSa5uz/dxzcBU2F4BU0EbAvr+Qkra4RJHvjL8rIfnDhQXXCcnS2AcoKS1BU0yi63Eev9j66At2tm8LTuoHlhC07xVhVPU8f/1aEBKreVzsT3FmiThfXbVY5tV3VW2HSpbcFxsf+pT0MPOuQ3MDXTtGT85lkqg0RrzCQol84G2D0ZlWMp41idEu1XosrvdyLw8+iEbdeiv29RaP/VM52dpIn40OIrHwetBJyXZHJPcvIsah7fd5ZCf2MDrKgarGaMZEe907Yj0IbsoDIkwnU9fr5A6N6h93fiU+LK2tNE8vzmiX3EBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=KfwD4HQD4UcnWnBQz/K1V8zcIvmPD7KuyxTcWwPf9V8=; b=GYSTp30HrG/wZE1kOK7S2rAVIgirUDp5wAcx/Ou3veXGH/tIQG7f2lRf65ROZGfaUKhrEkpHmvvGBP5fsoT1sUMtSLDPaRuu2IDaczpf2B/BQGl1hlri99aw7lYaQo7o6u6vB5ir8izrmD2Ro74Evxt814U867pGbzAnwDvvn3R9WZtb9GVVziFhg7+PVM0YMEceTr7AlJtECw5uuZnyIdiTRu5UzkOioeSktQR6/0U7bs5/gnpkVkD54rhXYoKu6KoiDaPwlnx2X2aF9c3JLpnrDj+NzoYDZHsyp147hxkemPOLwkyP6t+hEIinNsxbrjuNjLGb28q4MK5g4bjPSQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=outlook.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KfwD4HQD4UcnWnBQz/K1V8zcIvmPD7KuyxTcWwPf9V8=; b=BuLkp5tpnghgVhhfZjO4lkoKpLoJXO2MdcowpPNPQdtyDaIDQl7gV6sToP3SPCt5gsHk7khQ+3QOZn84UxQs1rFCp3aY0dWIMPHTdX/106h1i2A6TtaU7MUDX4lpnXti4lbnuu9dY1Xn+R2t6zsY59cfZpzpJa29voxq+A+EfWvI/uEWqbJ8psPD+HcBQvvENT6/PYtUTb0lKunCIDtnkG08KhTbClpD/LxrTrSNrP2Uo9nv8F1DFhrr4na/MOiHpKLnjz33ZygzceAZjT3KXs95URN3lDRcE+2vImSxZ2/ELYnob5JVO5xNbayon9pr4zCRBf/NTe0VdOXIXqMQ9Q== Received: from AM6PR03MB5080.eurprd03.prod.outlook.com (2603:10a6:20b:90::20) by DB9PR03MB8869.eurprd03.prod.outlook.com (2603:10a6:10:3df::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8445.16; Fri, 14 Feb 2025 00:35:59 +0000 Received: from AM6PR03MB5080.eurprd03.prod.outlook.com ([fe80::a16:9eb8:6868:f6d8]) by AM6PR03MB5080.eurprd03.prod.outlook.com ([fe80::a16:9eb8:6868:f6d8%4]) with mapi id 15.20.8422.015; Fri, 14 Feb 2025 00:35:58 +0000 From: Juntong Deng To: ast@kernel.org, daniel@iogearbox.net, john.fastabend@gmail.com, andrii@kernel.org, martin.lau@linux.dev, eddyz87@gmail.com, song@kernel.org, yonghong.song@linux.dev, kpsingh@kernel.org, sdf@fomichev.me, haoluo@google.com, jolsa@kernel.org, memxor@gmail.com, snorcht@gmail.com Cc: bpf@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [RFC PATCH bpf-next 4/6] bpf: Add bpf runtime hooks for tracking runtime acquire/release Date: Fri, 14 Feb 2025 00:26:55 +0000 Message-ID: X-Mailer: git-send-email 2.39.5 In-Reply-To: References: X-ClientProxiedBy: LO4P123CA0229.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:1a6::18) To AM6PR03MB5080.eurprd03.prod.outlook.com (2603:10a6:20b:90::20) X-Microsoft-Original-Message-ID: <20250214002657.68279-4-juntong.deng@outlook.com> Precedence: bulk X-Mailing-List: bpf@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: AM6PR03MB5080:EE_|DB9PR03MB8869:EE_ X-MS-Office365-Filtering-Correlation-Id: bdc060f8-06c9-42a1-ca76-08dd4c8f8cf6 X-Microsoft-Antispam: BCL:0;ARA:14566002|8060799006|19110799003|5072599009|15080799006|461199028|41001999003|12091999003|13041999003|3412199025|440099028; X-Microsoft-Antispam-Message-Info: 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 X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: bdc060f8-06c9-42a1-ca76-08dd4c8f8cf6 X-MS-Exchange-CrossTenant-AuthSource: AM6PR03MB5080.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Feb 2025 00:35:58.8324 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg: 00000000-0000-0000-0000-000000000000 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR03MB8869 X-Patchwork-Delegate: bpf@iogearbox.net X-Patchwork-State: RFC This patch adds runtime hooks for tracking runtime acquire/release. According to the bpf instruction set, all functions can have a maximum of 5 arguments. The first 5 arguments of the BPF runtime hook function are used to pass the original arguments of the kfunc, and the 6th argument is used to pass the memory address of the kfunc. All bpf runtime hook functions must follow this calling convention. bpf_runtime_acquire is used to record the information of the referenced object to the reference node, including the memory address of the object and the btf id of the data structure. First, call the original kfunc. If it returns NULL, it means that the reference acquisition failed and no record is needed. The btf id is obtained from acquire_kfunc_tab according to the memory address of kfunc. The reference node is taken from the free reference list and put into the active reference hash table after recording the information. bpf_runtime_release is used to take out the reference node from the active reference hash table according to the memory address of object and put it into the free reference list. Since currently releasing kfunc has no return value, bpf_runtime_release does not need a return value either. print_bpf_active_ref is used only for demonstration purposes to print all entries in the active reference hash table. Signed-off-by: Juntong Deng --- include/linux/btf.h | 4 ++ kernel/bpf/btf.c | 108 ++++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 112 insertions(+) diff --git a/include/linux/btf.h b/include/linux/btf.h index 2bd7fc996756..39f12d101809 100644 --- a/include/linux/btf.h +++ b/include/linux/btf.h @@ -567,6 +567,10 @@ struct btf_field_iter { }; #ifdef CONFIG_BPF_SYSCALL +void *bpf_runtime_acquire_hook(void *arg1, void *arg2, void *arg3, + void *arg4, void *arg5, void *arg6); +void bpf_runtime_release_hook(void *arg1, void *arg2, void *arg3, + void *arg4, void *arg5, void *arg6); const struct btf_type *btf_type_by_id(const struct btf *btf, u32 type_id); void btf_set_base_btf(struct btf *btf, const struct btf *base_btf); int btf_relocate(struct btf *btf, const struct btf *base_btf, __u32 **map_ids); diff --git a/kernel/bpf/btf.c b/kernel/bpf/btf.c index 3548b52ca9c2..93ca804d52e3 100644 --- a/kernel/bpf/btf.c +++ b/kernel/bpf/btf.c @@ -9532,3 +9532,111 @@ bool btf_param_match_suffix(const struct btf *btf, param_name += len - suffix_len; return !strncmp(param_name, suffix, suffix_len); } + +static void print_bpf_active_refs(void) +{ + /* This function is only used to demonstrate the idea */ + struct btf_struct_kfunc_tab *tab; + struct btf_struct_kfunc *kfunc; + struct bpf_run_ctx *bpf_ctx; + struct bpf_ref_node *node; + char sym[KSYM_SYMBOL_LEN]; + int bkt, num = 0; + struct btf *btf; + + btf = bpf_get_btf_vmlinux(); + bpf_ctx = current->bpf_ctx; + tab = btf->release_kfunc_btf_tab; + + pr_info("bpf prog current release table:\n"); + + if (hash_empty(bpf_ctx->active_ref_list)) { + pr_info("table empty\n"); + return; + } + + hash_for_each(bpf_ctx->active_ref_list, bkt, node, hnode) { + kfunc = bsearch(&node->struct_btf_id, tab->set, tab->cnt, + sizeof(struct btf_struct_kfunc), btf_id_cmp_func); + sprint_symbol(sym, kfunc->kfunc_addr); + pr_info("obj %d, obj addr = %lx, btf id = %d, can be released by %s\n", + num, node->obj_addr, node->struct_btf_id, sym); + num++; + /* + * If we want to release this object, we can use + * void (*release_kfunc)(void *) = (void (*)(void *))kfunc->kfunc_addr; + * release_kfunc((void *)node->obj_addr); + */ + } +} + +typedef void *(*bpf_kfunc_t)(void *arg1, void *arg2, void *arg3, + void *arg4, void *arg5); + +void *bpf_runtime_acquire_hook(void *arg1, void *arg2, void *arg3, + void *arg4, void *arg5, void *arg6 /* kfunc addr */) +{ + struct btf_struct_kfunc *struct_kfunc, dummy_key; + struct btf_struct_kfunc_tab *tab; + struct bpf_run_ctx *bpf_ctx; + struct bpf_ref_node *node; + bpf_kfunc_t kfunc; + struct btf *btf; + void *kfunc_ret; + + kfunc = (bpf_kfunc_t)arg6; + kfunc_ret = kfunc(arg1, arg2, arg3, arg4, arg5); + + if (!kfunc_ret) + return kfunc_ret; + + bpf_ctx = current->bpf_ctx; + btf = bpf_get_btf_vmlinux(); + + tab = btf->acquire_kfunc_tab; + if (!tab) + return kfunc_ret; + + dummy_key.kfunc_addr = (unsigned long)arg6; + struct_kfunc = bsearch(&dummy_key, tab->set, tab->cnt, + sizeof(struct btf_struct_kfunc), + btf_kfunc_addr_cmp_func); + + node = list_first_entry(&bpf_ctx->free_ref_list, struct bpf_ref_node, lnode); + node->obj_addr = (unsigned long)kfunc_ret; + node->struct_btf_id = struct_kfunc->struct_btf_id; + + list_del(&node->lnode); + hash_add(bpf_ctx->active_ref_list, &node->hnode, node->obj_addr); + + pr_info("bpf prog acquire obj addr = %lx, btf id = %d\n", + node->obj_addr, node->struct_btf_id); + print_bpf_active_refs(); + + return kfunc_ret; +} + +void bpf_runtime_release_hook(void *arg1, void *arg2, void *arg3, + void *arg4, void *arg5, void *arg6 /* kfunc addr */) +{ + struct bpf_run_ctx *bpf_ctx; + struct bpf_ref_node *node; + bpf_kfunc_t kfunc; + + kfunc = (bpf_kfunc_t)arg6; + kfunc(arg1, arg2, arg3, arg4, arg5); + + bpf_ctx = current->bpf_ctx; + + hash_for_each_possible(bpf_ctx->active_ref_list, node, hnode, (unsigned long)arg1) { + if (node->obj_addr == (unsigned long)arg1) { + hash_del(&node->hnode); + list_add(&node->lnode, &bpf_ctx->free_ref_list); + + pr_info("bpf prog release obj addr = %lx, btf id = %d\n", + node->obj_addr, node->struct_btf_id); + } + } + + print_bpf_active_refs(); +} From patchwork Fri Feb 14 00:26:56 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Juntong Deng X-Patchwork-Id: 13974233 X-Patchwork-Delegate: bpf@iogearbox.net Received: from EUR03-VI1-obe.outbound.protection.outlook.com (mail-vi1eur03olkn2017.outbound.protection.outlook.com [40.92.57.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 1BA9617E; Fri, 14 Feb 2025 00:37:56 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=40.92.57.17 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1739493479; cv=fail; b=cWxFaScwQK4Friwvp8RJEr3VC4rqWg5DPLBqitLceUJnANsscjBbDLkNtQJgt7vqlC4tlWko13BJIrPY9UkLITGHxV5N3pdLSWGIMnaea3aJXRd6FlgFWDL+6qpQJjnkRWrqxsrENglWhywz4xDfUKgVvkTps3CBcPZrpTtCosI= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1739493479; c=relaxed/simple; bh=RzKnncb6qyeRbd/9x9Sv1jkkrveDQQJuzeVSJOcRla0=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: Content-Type:MIME-Version; b=frE4V9fRJamKMzHOy1z6lk3RsA2SHuiGNUDOMXuz/j1iMqJg3uC02lOZiFIUMA+nc+44X5iJ8p6/CTRYvf4G8knvklKrkqq0HvQPbzNIQmMJS2n8tfhQbhjEMVk96u4kKZUwLfH8GDb1rJQf6I5a5VCLm3pnprVhBriPoi+KNYc= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=outlook.com; spf=pass smtp.mailfrom=outlook.com; dkim=pass (2048-bit key) header.d=outlook.com header.i=@outlook.com header.b=F9Ht9mpk; arc=fail smtp.client-ip=40.92.57.17 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=outlook.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=outlook.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=outlook.com header.i=@outlook.com header.b="F9Ht9mpk" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=dM6jYcH21LvaxQFREvldIrQ8fCjyvAuOsrnyKeY0O9tEI9JENNsHAQQ/aNWSc6rf7h+APONEZrjQbo3kjPubDFtDoxmrWvH/PdItbxVzwlx/qi6cEal8NQ6rxdVwYBhrlPXi3MuMs7E3A1fJpOUOYRZqT56Cf9evvmIRtVihOBDrmtS9E0g1JY6Z9/3L37QniarjW6HZqj10xYrzPe3IjZMixqQrq1I5ceu0vojx2DXwZVOHilJXzL51axnwCzSYBOxp3vXoFwVuFaYMizcKJew8+2+mL1P0H3yY8ch/rvllOqBDlcshebw6dj/ZaqjlReJw1XJ3XgAbg6AoAesfsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=1Z+4j8OG9PFvEE0Ic8rWsgK5OpC2y2TVRkA2w88Csqw=; b=CNuAtTH1bhk0U0q8w3d49uuMGEKO2EcBPcfsNqtQCazhRaawJhGGRSXe72GAk7YoIwuivkiR/zEIkrq8QVFlVKTt5NzsychF5l/SeTu+6lLIl/9m0jd2Ab6O1BIBvCEjqEYPSHBa3rsIDod18jc4juovAdH7Z6ski9CmxbH/5ej/zJIPz7atRtZbgzC/TzW54RY+09TONqMZiiz/F5NHMLtR4JfPDR3seAXpxWM49VeQWpY6iezvwMkK3yHUIh3TU4auGMytuJp3AyakqUIM55NmPV9rYZkGvUtsYzhHSH/96telJaeiFI2Hl965bhN26ETtEaOLso5V0TZl/llHyw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=outlook.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1Z+4j8OG9PFvEE0Ic8rWsgK5OpC2y2TVRkA2w88Csqw=; b=F9Ht9mpks9v4pGhhaKDwLLsucECx0+5iYKlJU5zQm9nZeoC86LCoWQU4bOopLRuE5Z6YLLlvyEL1C6snSNyqWNdbIg9MYjsUEA+3i/rvzmvKCmPWGlicbI3HRO5hhiH7rBl37I8UfJHxLvc3M7rfiooHtK6bor0RWGZFbirebeoEmyHEMRuw12rA2wM1Hj7FF+qRKLjharGYFKIlg9Yj8T0kEYa2LFFjdWnnF3bQ5Ra33H1mKxEh/wuRGxO+mCLI4A8qnpiYBN08rut8n+v3p1COQ3oEWX1ICi0Dgz3nSXWrBYKWyt28wXbHe8VN5vm7IXNUad3NBrS3PSwRqf/PDQ== Received: from AM6PR03MB5080.eurprd03.prod.outlook.com (2603:10a6:20b:90::20) by DB9PR03MB8869.eurprd03.prod.outlook.com (2603:10a6:10:3df::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8445.16; Fri, 14 Feb 2025 00:37:54 +0000 Received: from AM6PR03MB5080.eurprd03.prod.outlook.com ([fe80::a16:9eb8:6868:f6d8]) by AM6PR03MB5080.eurprd03.prod.outlook.com ([fe80::a16:9eb8:6868:f6d8%4]) with mapi id 15.20.8422.015; Fri, 14 Feb 2025 00:37:54 +0000 From: Juntong Deng To: ast@kernel.org, daniel@iogearbox.net, john.fastabend@gmail.com, andrii@kernel.org, martin.lau@linux.dev, eddyz87@gmail.com, song@kernel.org, yonghong.song@linux.dev, kpsingh@kernel.org, sdf@fomichev.me, haoluo@google.com, jolsa@kernel.org, memxor@gmail.com, snorcht@gmail.com Cc: bpf@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [RFC PATCH bpf-next 5/6] bpf: Make BPF JIT support installation of bpf runtime hooks Date: Fri, 14 Feb 2025 00:26:56 +0000 Message-ID: X-Mailer: git-send-email 2.39.5 In-Reply-To: References: X-ClientProxiedBy: LO4P123CA0229.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:1a6::18) To AM6PR03MB5080.eurprd03.prod.outlook.com (2603:10a6:20b:90::20) X-Microsoft-Original-Message-ID: <20250214002657.68279-5-juntong.deng@outlook.com> Precedence: bulk X-Mailing-List: bpf@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: AM6PR03MB5080:EE_|DB9PR03MB8869:EE_ X-MS-Office365-Filtering-Correlation-Id: e1f4c91d-9958-4b8a-fd75-08dd4c8fd1b2 X-Microsoft-Antispam: BCL:0;ARA:14566002|8060799006|19110799003|5072599009|15080799006|461199028|41001999003|3412199025|440099028; X-Microsoft-Antispam-Message-Info: DRW3hNX1VnJOLP+XgRyD/gyw29eQzoXgqhgnc7Bmozkxt5IT9qhdOahz6y41XzyewsjoJNxg6GDCpDWsmOjVmWrP62X8fVLVgYB5dhPC6gJJcBBFDR+PiFKtPWTEUnUJaXTkvrLxaV7punElkDA7FLvenMhbVzxSRzUQhDEwJU90Al5XnFZmWcKXP7Cu3J4LPonp0cbZTxGgh3MCPYcnRKkoRiK3veMx9x8aWji5veWBJMoneWrxlv87FjF7bj3b+8FTmITZsMOaraMBgc/n6KiBvS67iNqBhdAXZ2eHRy9ipZ/qOhv5ZH3x3yTTK8FQAHBb/wh+LwCrGDHxAaDsY4oZVNmmSVcr0eWNQhfrc68evbc7QWqnc8FmyiuDMvUBiWR0q3xlL59UJWI/yH+2fnHveyVyvjGZWt6ByidpKDRqAcF8+twAwPxigg+o+V5XPc6c2KW6TyliiPmssA8dLjDAk+hIFRdno+Ddn5O0cZ8a+3oerxWcJnCHBeyN1PQ/tMy/nkvycHosmxqhO3rvfvQc3LIBNxBerpWBUo5ioIrxx8zSQG6b2shtXQO5/yL7/1Ckhw1LlQ9RkZJuCqSZEigA+Q9XLZYC1VKjTvjcT8gpfqdS+pDbePNZIWUuU319T/zGTWLSMH/C010Ghv+TfI0YJLoiAmFT45fLfc+u/NnxXUwVpgGziJlshX6Tiu6+nQybRMmh/EIpl8PSQBbhXtUynvI5CE8BpnDtw/Tk0FxfzF0BnpkRNEAhe7mMEmwChjbTB8Q4Opi4VH70X5GIg3pStOMp/dz7dzwMYPVN01XuMLyQv01/iEz+jbBpaxzGg2ozEZnCEjaNFIFC4jNLBBn1AwThdmpw3ESRX8IBkbb2uAc3tTZ+iM9Nybm1IHtldFaa5nd/zxrS9wI94CSE89fPxJF21nlBFhqaPOgVPZ98nK61l5WO5OIKc++FxvxgfnI1CE3vP8lMD8+8s9HVoDcCyIo7d9rs21JGS2hRkLJJUmfnBGfSE5GBZdOMJvdc54ugKSJMHjsuEn+I2tEOk5gLCKZMAEQYOPk0/6/OY/g9x/mhBGNwG2e7pZ3D6keG3Ij6q1OB/CF5l1Y0f4bL7w== X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: ZnAhxL2cE+ZydgYp4PME9/B+MA+PTZFfkAdqGyJY1ad7id1wTlWAx0QGVGNTRYJS1q+SjgmmogB/VNIu+59movBR7+1mY6rVEfDyeqVTLTUTbOT+wUV39DQGdKvpAQivIjiqdoLMYrHCmV6jE3rK6+tuhNRSUMCQ7wDjdMfb5FTu3VWy/cb6aYVK0UBzBBu/jpBIrYUrk8xdQzQu6cFisLpUyU4Lpe/YFyN83hmr5h8Y/jaR4WxDy/Z0NSQa8CF4hjdf4xJE/aB8tBKk4MNdYf1R8XabPgBvo2RkzhnVZLl0fyK/TzrA0PE2t24yh0kvd4y6/o8zUOYlIMrLL0nts8LJfx5/tVAzndHOV7nVC3BSNCh5jwHFasDxSuLuCLxLp6kBta4dNZtq/gCJWuBjb+jjVt3t/p6FYxUN55qAovVHfjV12znMR2ycZPRJXlbs6u3d+oCW7VcAxlYk6W7+kL5RGB43xLbOYhOb6RyWiDs8DH8TLE1qjYBWZsiOpApx2z8RUYOjWUjbmeQk6ESdNnLx3A6Fagy0301SCetbSWIoNQj1lvuIbs3zvcXHyVw1pYtj2W0BleTfD+TyVBKptjfNbd9wcI45NAWxCiE9uGz51TLfGdcn/GQpZmIokE5miNh+s9xJa4OcscJBPVwMlLS2yJIh3Q9ewalz0IIrMpOKlUpz70hs4bkLSc5M5gKxE+Aywvgz0L3jbl3LWly4XuuoyZi0pbrKAJb001B+uWZHrp6icRe0WjXWT8ydH4KllGrzbxHuA+dSPhFDBKIZmdGv8nZEf51vJuhAQdVQaAXy6lkqaYjqHBCRsaKfNFeHahAq8jafqjS6v1GPzQj8fqq2hlUNyr3BUBTvuk35h6011QuoX0YGtqSA2GeS+FV0bEXSVyqOqVxIvztdymCYzDbuPj4yZn7S0d7plZYjYZz7f5pij73Vj9dRycuSjkgGDDHocuyY5FIvQMwWcNlEsIzNIlRzF/DFvbsCJbrAek4/j+AcxD+Rums05QfFJOYGnoenQyRlz12NrhNZoTUvhdK+F6C/f+t74ncOY3CgzUyFC+JVztXoKISI6Yv2AlQiwMlId6lvvwW1WFaujANQ4ar56jw/It1BGmFWCMmQ6kZU2XMYEpgQ/4w6EOoJUjFYr9iznyinTR8x41jcnTLtTnPdvk1L60pfUNcrx8YzzB4MFqbqA6NEvbEj/rclgWbJq0vk3mzYMVRdh/sJz2b2F9RRAmmmcgCdiyUM6xbAf1sqgto7zU2Q98WoGzlKPpx5 X-OriginatorOrg: outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: e1f4c91d-9958-4b8a-fd75-08dd4c8fd1b2 X-MS-Exchange-CrossTenant-AuthSource: AM6PR03MB5080.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Feb 2025 00:37:54.0895 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg: 00000000-0000-0000-0000-000000000000 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9PR03MB8869 X-Patchwork-Delegate: bpf@iogearbox.net X-Patchwork-State: RFC This patch makes BPF JIT support installation of bpf runtime hooks. The principle of bpf runtime hook is simple, by replacing the memory address of kfunc in the CALL instruction with the memory address of the hook function, and inserting the memory address of kfunc as the 6th argument. select_bpf_runtime_hook is used to select the runtime hook to be installed, based on kfunc. If it is acquiring kfunc, install bpf_runtime_acquire_hook, if it is releasing kfunc, install bpf_runtime_release_hook. Maybe in the future we can use this to install watchdog hooks. In the hook function, we can read the arguments passed to the original kfunc. Normally, we will call the original kfunc with the same arguments in the hook function, and return the return value returned by the original kfunc. After the BPF JIT, the function calling convention of the bpf program will be the same as the calling convention of the native architecture (regardless of the architecture), so this approach will always work. Since this is only for demonstration purposes, only support for the x86_64 architecture is implemented. This approach is easily portable to support other architectures, the only thing we need to do is replace the call address and insert a argument. Signed-off-by: Juntong Deng --- arch/x86/net/bpf_jit_comp.c | 8 ++++++++ include/linux/btf.h | 1 + kernel/bpf/btf.c | 39 +++++++++++++++++++++++++++++++++++++ 3 files changed, 48 insertions(+) diff --git a/arch/x86/net/bpf_jit_comp.c b/arch/x86/net/bpf_jit_comp.c index a43fc5af973d..da579e835731 100644 --- a/arch/x86/net/bpf_jit_comp.c +++ b/arch/x86/net/bpf_jit_comp.c @@ -2184,6 +2184,7 @@ st: if (is_imm8(insn->off)) /* call */ case BPF_JMP | BPF_CALL: { u8 *ip = image + addrs[i - 1]; + void *runtime_hook; func = (u8 *) __bpf_call_base + imm32; if (src_reg == BPF_PSEUDO_CALL && tail_call_reachable) { @@ -2197,6 +2198,13 @@ st: if (is_imm8(insn->off)) ip += 2; } ip += x86_call_depth_emit_accounting(&prog, func, ip); + runtime_hook = select_bpf_runtime_hook(func); + if (runtime_hook) { + emit_mov_imm64(&prog, X86_REG_R9, (long)func >> 32, + (u32) (long)func); + ip += 6; + func = (u8 *)runtime_hook; + } if (emit_call(&prog, func, ip)) return -EINVAL; if (priv_frame_ptr) diff --git a/include/linux/btf.h b/include/linux/btf.h index 39f12d101809..46681181e2bc 100644 --- a/include/linux/btf.h +++ b/include/linux/btf.h @@ -571,6 +571,7 @@ void *bpf_runtime_acquire_hook(void *arg1, void *arg2, void *arg3, void *arg4, void *arg5, void *arg6); void bpf_runtime_release_hook(void *arg1, void *arg2, void *arg3, void *arg4, void *arg5, void *arg6); +void *select_bpf_runtime_hook(void *kfunc); const struct btf_type *btf_type_by_id(const struct btf *btf, u32 type_id); void btf_set_base_btf(struct btf *btf, const struct btf *base_btf); int btf_relocate(struct btf *btf, const struct btf *base_btf, __u32 **map_ids); diff --git a/kernel/bpf/btf.c b/kernel/bpf/btf.c index 93ca804d52e3..f99b9f746674 100644 --- a/kernel/bpf/btf.c +++ b/kernel/bpf/btf.c @@ -9640,3 +9640,42 @@ void bpf_runtime_release_hook(void *arg1, void *arg2, void *arg3, print_bpf_active_refs(); } + +void *select_bpf_runtime_hook(void *kfunc) +{ + struct btf_struct_kfunc *struct_kfunc, dummy_key; + struct btf_struct_kfunc_tab *tab; + struct btf *btf; + + btf = bpf_get_btf_vmlinux(); + dummy_key.kfunc_addr = (unsigned long)kfunc; + + tab = btf->acquire_kfunc_tab; + if (tab) { + struct_kfunc = bsearch(&dummy_key, tab->set, tab->cnt, + sizeof(struct btf_struct_kfunc), + btf_kfunc_addr_cmp_func); + if (struct_kfunc) + return bpf_runtime_acquire_hook; + } + + tab = btf->release_kfunc_tab; + if (tab) { + struct_kfunc = bsearch(&dummy_key, tab->set, tab->cnt, + sizeof(struct btf_struct_kfunc), + btf_kfunc_addr_cmp_func); + if (struct_kfunc) + return bpf_runtime_release_hook; + } + + /* + * For watchdog we may need + * + * tab = btf->may_run_repeatedly_long_time_kfunc_tab + * struct_kfunc = bsearch(&dummy_key, tab->set, tab->cnt, sizeof(struct btf_struct_kfunc), + * btf_kfunc_addr_cmp_func); + * if (struct_kfunc) + * return bpf_runtime_watchdog_hook; + */ + return NULL; +} From patchwork Fri Feb 14 00:26:57 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Juntong Deng X-Patchwork-Id: 13974234 X-Patchwork-Delegate: bpf@iogearbox.net Received: from EUR03-AM7-obe.outbound.protection.outlook.com (mail-am7eur03olkn2069.outbound.protection.outlook.com [40.92.59.69]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 85B971863E; Fri, 14 Feb 2025 00:40:23 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=40.92.59.69 ARC-Seal: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1739493625; cv=fail; b=YoohuAwCCap/9ncYFW9M1OC4hgeyayWisybsWqskQRk7FCJyGkOb4+6LwfAd6rAs4gkI9brrmMOsbkFHoUjHFEQw1uLfxLBQRxk+9G+jtSfPX65aiKCh78g8YXiAVeUpjx9EJUeuyemxn6uf/qTDbvDmj5U8TI39Mog4e6OnNNU= ARC-Message-Signature: i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1739493625; c=relaxed/simple; bh=RHyu8iP9eN84DuDluqXLOKucNdaptC5YwmTdZnn7RWI=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: Content-Type:MIME-Version; b=Hec5PcK+7EESQI2tpDGV3bT3GGg4Zn0DsBxl8T9JVBTWMTFVMu59O8X767IUpsPpgAPgnyOszKwSids1GGtxXSjvet3G5xNgbd1BbWMsgBaZc/pI6aHlma3RCJoAuAJyG2ZVw0oQz/rCG5cVGzz57Kqei/YxmdT3E93QWL2t9vI= ARC-Authentication-Results: i=2; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=outlook.com; spf=pass smtp.mailfrom=outlook.com; dkim=pass (2048-bit key) header.d=outlook.com header.i=@outlook.com header.b=lweEzeTt; arc=fail smtp.client-ip=40.92.59.69 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=outlook.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=outlook.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=outlook.com header.i=@outlook.com header.b="lweEzeTt" ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Ol9wg5ddCn0YyuImE441AVA8yWyxUqcaZK4YpHT/44tLDMve6zU5dJAVzBTtGtZcfSDmRfdZZIrvTaRJgujVdP4UTcyCWg6pKuAw+g63DAp4xuEUwhDD0oHvuZDXheBD4Vpe0nU1JIbhpPS9PvfQrk6ICLLJszUzJkVtcnlirUyGzYrpZP/B3/ODo6q7Fo0cMVKXEP8Pb4P2xJhkXYY/qKNc3qKonsTQrXhUhca/heZS3x0BfbaUlxaVsz+pb2eQyuimjKbdkeXpWtSzNy2c2pvR2vypsz9vpEX4DaZCJlWU/tzkDt3jI3SWFsFc0nV8vh+635MEocT7nTkz8Wn0dQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=iSaGOC+54QbVHkXb7qIbugj3rZQ0zRzi4tXZEVfEh28=; b=hPjxLpJCeuiCCEx1aiEYUm9sSltipysyMnHFJUg8HcyYu/fkKFwgcvckbupgN3NWmwgpQ0oAWgKvBDP99aA+z7oivCRDnaL0XTZ8gkJ8p2N+hLsDWvFECjJjRU9UF5rHf1yGci/6Py3FkoFtzhukD6Ju0jvSsc07QL/vgjp9YXbk1qW+K9rnF+WAxW6IpjX6Ksa3tYP2kXjUIIbDAqNI/PQ7HxvY9E18KGXWmd+Xz7YXmS2tLu9ntzFnMZxpbkzYTyneHxscWqJiFzEJfLV1oKiuk4jW/oT1d+rfkzJRMrXBspSQsiNS/xA0/aHLmCHI+4+RTukPv9P4YQWfQnGd4w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=outlook.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=iSaGOC+54QbVHkXb7qIbugj3rZQ0zRzi4tXZEVfEh28=; b=lweEzeTtkVKNxub6QNh0oQPwLiBR8YU8YgPT8BG6gzejgOwXm1ldkFLTZlGQT9REWGHg8m8ubuDsJxdmhC5mf/QEddy8aq+4O8/PYJE1AQThMzSm6BYf3dkLGkQqP7vjMYTtxWD9cwEdX0rafV3OIUO1CyqL8vacATlA3kwFpHImIJpLkBUU9T22Pf1h9kTRbTwQdI2WcMof2xbfRAfU+1igloPokdGQB3HzNv4e8JvOKtULk3tTiVGkfWssj3afl/oULbUiD33CQOmdWdw6LhpnaTrNp/fq2WrwyeyNaMc5wq7ey3gxw2o3DtEsuOqnOlIEskZNa6zCRN1EXQS8Bg== Received: from AM6PR03MB5080.eurprd03.prod.outlook.com (2603:10a6:20b:90::20) by AS8PR03MB9817.eurprd03.prod.outlook.com (2603:10a6:20b:61b::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8445.15; Fri, 14 Feb 2025 00:40:20 +0000 Received: from AM6PR03MB5080.eurprd03.prod.outlook.com ([fe80::a16:9eb8:6868:f6d8]) by AM6PR03MB5080.eurprd03.prod.outlook.com ([fe80::a16:9eb8:6868:f6d8%4]) with mapi id 15.20.8422.015; Fri, 14 Feb 2025 00:40:20 +0000 From: Juntong Deng To: ast@kernel.org, daniel@iogearbox.net, john.fastabend@gmail.com, andrii@kernel.org, martin.lau@linux.dev, eddyz87@gmail.com, song@kernel.org, yonghong.song@linux.dev, kpsingh@kernel.org, sdf@fomichev.me, haoluo@google.com, jolsa@kernel.org, memxor@gmail.com, snorcht@gmail.com Cc: bpf@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [RFC PATCH bpf-next 6/6] selftests/bpf: Add test cases for demonstrating runtime acquire/release reference tracking Date: Fri, 14 Feb 2025 00:26:57 +0000 Message-ID: X-Mailer: git-send-email 2.39.5 In-Reply-To: References: X-ClientProxiedBy: LO4P123CA0229.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:1a6::18) To AM6PR03MB5080.eurprd03.prod.outlook.com (2603:10a6:20b:90::20) X-Microsoft-Original-Message-ID: <20250214002657.68279-6-juntong.deng@outlook.com> Precedence: bulk X-Mailing-List: bpf@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: AM6PR03MB5080:EE_|AS8PR03MB9817:EE_ X-MS-Office365-Filtering-Correlation-Id: 641a2aac-a60e-416d-a884-08dd4c9028ff X-Microsoft-Antispam: BCL:0;ARA:14566002|8060799006|461199028|15080799006|19110799003|5072599009|13041999003|3412199025|41001999003|440099028; X-Microsoft-Antispam-Message-Info: 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 X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-OriginatorOrg: outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 641a2aac-a60e-416d-a884-08dd4c9028ff X-MS-Exchange-CrossTenant-AuthSource: AM6PR03MB5080.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 14 Feb 2025 00:40:20.5633 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg: 00000000-0000-0000-0000-000000000000 X-MS-Exchange-Transport-CrossTenantHeadersStamped: AS8PR03MB9817 X-Patchwork-Delegate: bpf@iogearbox.net X-Patchwork-State: RFC This patch adds test cases for demonstrating runtime acquire/release reference tracking. Test cases include simple, branch, and loop. Simple test case has no branches or loops. Branch test case contains if statements. Loop test case contains the bpf_iter_num iterator. Signed-off-by: Juntong Deng --- tools/testing/selftests/runtime/Makefile | 20 ++++++++++ tools/testing/selftests/runtime/branch.bpf.c | 42 ++++++++++++++++++++ tools/testing/selftests/runtime/branch.c | 19 +++++++++ tools/testing/selftests/runtime/loop.bpf.c | 37 +++++++++++++++++ tools/testing/selftests/runtime/loop.c | 19 +++++++++ tools/testing/selftests/runtime/simple.bpf.c | 35 ++++++++++++++++ tools/testing/selftests/runtime/simple.c | 19 +++++++++ 7 files changed, 191 insertions(+) create mode 100644 tools/testing/selftests/runtime/Makefile create mode 100644 tools/testing/selftests/runtime/branch.bpf.c create mode 100644 tools/testing/selftests/runtime/branch.c create mode 100644 tools/testing/selftests/runtime/loop.bpf.c create mode 100644 tools/testing/selftests/runtime/loop.c create mode 100644 tools/testing/selftests/runtime/simple.bpf.c create mode 100644 tools/testing/selftests/runtime/simple.c diff --git a/tools/testing/selftests/runtime/Makefile b/tools/testing/selftests/runtime/Makefile new file mode 100644 index 000000000000..d03133786a26 --- /dev/null +++ b/tools/testing/selftests/runtime/Makefile @@ -0,0 +1,20 @@ +targets = simple branch loop + +all: $(targets) + +vmlinux.h: + bpftool btf dump file /sys/kernel/btf/vmlinux format c > vmlinux.h + +%.bpf.o: %.bpf.c vmlinux.h + clang -O2 -g -target bpf -c $*.bpf.c -o $*.bpf.o + +%.skel.h: %.bpf.o + bpftool gen skeleton $*.bpf.o > $*.skel.h + +$(targets): %: %.c %.skel.h + clang $< -lelf -lbpf -o $@ + +clean: + rm -f *.o *.skel.h vmlinux.h $(targets) + +.SECONDARY: diff --git a/tools/testing/selftests/runtime/branch.bpf.c b/tools/testing/selftests/runtime/branch.bpf.c new file mode 100644 index 000000000000..87697151299c --- /dev/null +++ b/tools/testing/selftests/runtime/branch.bpf.c @@ -0,0 +1,42 @@ +// SPDX-License-Identifier: GPL-2.0 + +#include "vmlinux.h" +#include +#include +#include + +char LICENSE[] SEC("license") = "GPL"; + +void bpf_task_release(struct task_struct *p) __ksym; +struct task_struct *bpf_task_from_pid(s32 pid) __ksym; + +int test = 5; + +SEC("syscall") +int test_branch(void *arg) +{ + struct task_struct *task1; + + task1 = bpf_task_from_pid(1); + + if (test > 2) { + struct task_struct *task2; + + task2 = bpf_task_from_pid(2); + if (task2) + bpf_task_release(task2); + } + + if (test < 2) { + struct task_struct *task3; + + task3 = bpf_task_from_pid(3); + if (task3) + bpf_task_release(task3); + } + + if (task1) + bpf_task_release(task1); + + return 0; +} diff --git a/tools/testing/selftests/runtime/branch.c b/tools/testing/selftests/runtime/branch.c new file mode 100644 index 000000000000..3592e14f1f75 --- /dev/null +++ b/tools/testing/selftests/runtime/branch.c @@ -0,0 +1,19 @@ +// SPDX-License-Identifier: GPL-2.0 + +#include +#include +#include +#include "branch.skel.h" + +int main(int argc, char **argv) +{ + struct branch_bpf *skel; + int err, prog_fd; + + skel = branch_bpf__open_and_load(); + prog_fd = bpf_program__fd(skel->progs.test_branch); + err = bpf_prog_test_run_opts(prog_fd, NULL); + + branch_bpf__destroy(skel); + return err; +} diff --git a/tools/testing/selftests/runtime/loop.bpf.c b/tools/testing/selftests/runtime/loop.bpf.c new file mode 100644 index 000000000000..2b49ec9e1058 --- /dev/null +++ b/tools/testing/selftests/runtime/loop.bpf.c @@ -0,0 +1,37 @@ +// SPDX-License-Identifier: GPL-2.0 + +#include "vmlinux.h" +#include +#include +#include + +char LICENSE[] SEC("license") = "GPL"; + +void bpf_task_release(struct task_struct *p) __ksym; +struct task_struct *bpf_task_from_pid(s32 pid) __ksym; + +SEC("syscall") +int test_loop(void *arg) +{ + struct task_struct *task_loop; + struct task_struct *task1; + int *v; + + task1 = bpf_task_from_pid(1); + + struct bpf_iter_num it; + + bpf_iter_num_new(&it, 1, 3); + while ((v = bpf_iter_num_next(&it))) { + task_loop = bpf_task_from_pid(*v); + if (task_loop) + bpf_task_release(task_loop); + } + + bpf_iter_num_destroy(&it); + + if (task1) + bpf_task_release(task1); + + return 0; +} diff --git a/tools/testing/selftests/runtime/loop.c b/tools/testing/selftests/runtime/loop.c new file mode 100644 index 000000000000..bde83e5595e4 --- /dev/null +++ b/tools/testing/selftests/runtime/loop.c @@ -0,0 +1,19 @@ +// SPDX-License-Identifier: GPL-2.0 + +#include +#include +#include +#include "loop.skel.h" + +int main(int argc, char **argv) +{ + struct loop_bpf *skel; + int err, prog_fd; + + skel = loop_bpf__open_and_load(); + prog_fd = bpf_program__fd(skel->progs.test_loop); + err = bpf_prog_test_run_opts(prog_fd, NULL); + + loop_bpf__destroy(skel); + return err; +} diff --git a/tools/testing/selftests/runtime/simple.bpf.c b/tools/testing/selftests/runtime/simple.bpf.c new file mode 100644 index 000000000000..ad7989ebb7d4 --- /dev/null +++ b/tools/testing/selftests/runtime/simple.bpf.c @@ -0,0 +1,35 @@ +// SPDX-License-Identifier: GPL-2.0 + +#include "vmlinux.h" +#include +#include +#include + +char LICENSE[] SEC("license") = "GPL"; + +void bpf_task_release(struct task_struct *p) __ksym; +struct task_struct *bpf_task_from_pid(s32 pid) __ksym; + +struct bpf_cpumask *bpf_cpumask_create(void) __ksym; +void bpf_cpumask_release(struct bpf_cpumask *cpumask) __ksym; + +SEC("syscall") +int test_simple(void *arg) +{ + struct task_struct *task; + struct bpf_cpumask *cpumask; + + task = bpf_task_from_pid(1); + if (!task) + return 0; + + cpumask = bpf_cpumask_create(); + if (!cpumask) + goto error_cpumask; + + bpf_cpumask_release(cpumask); +error_cpumask: + bpf_task_release(task); + + return 0; +} diff --git a/tools/testing/selftests/runtime/simple.c b/tools/testing/selftests/runtime/simple.c new file mode 100644 index 000000000000..e65959aac89b --- /dev/null +++ b/tools/testing/selftests/runtime/simple.c @@ -0,0 +1,19 @@ +// SPDX-License-Identifier: GPL-2.0 + +#include +#include +#include +#include "simple.skel.h" + +int main(int argc, char **argv) +{ + struct simple_bpf *skel; + int err, prog_fd; + + skel = simple_bpf__open_and_load(); + prog_fd = bpf_program__fd(skel->progs.test_simple); + err = bpf_prog_test_run_opts(prog_fd, NULL); + + simple_bpf__destroy(skel); + return err; +}