Currently, most access to sys_bpf() is limited to root. However, there are use cases that would benefit from non-privileged use of sys_bpf(), e.g. systemd. This set introduces a new model to control the access to sys_bpf(). A special device, /dev/bpf, is introduced to manage access to sys_bpf(). Users with access to open /dev/bpf will be able to access most of sys_bpf() features. The use can get access to sys_bpf() by opening /dev/bpf and use ioctl to get/put permission. The permission to access sys_bpf() is marked by bit TASK_BPF_FLAG_PERMITTED in task_struct. During fork(), child will not inherit this bit. libbpf APIs libbpf_[get|put]_bpf_permission() are added to help get and put the permission. bpftool is updated to use these APIs. Song Liu (4): bpf: unprivileged BPF access via /dev/bpf bpf: sync tools/include/uapi/linux/bpf.h libbpf: add libbpf_[get|put]_bpf_permission() bpftool: use libbpf_[get|put]_bpf_permission() Documentation/ioctl/ioctl-number.txt | 1 + include/linux/bpf.h | 12 +++++ include/linux/sched.h | 8 ++++ include/uapi/linux/bpf.h | 5 ++ kernel/bpf/arraymap.c | 2 +- kernel/bpf/cgroup.c | 2 +- kernel/bpf/core.c | 4 +- kernel/bpf/cpumap.c | 2 +- kernel/bpf/devmap.c | 2 +- kernel/bpf/hashtab.c | 4 +- kernel/bpf/lpm_trie.c | 2 +- kernel/bpf/offload.c | 2 +- kernel/bpf/queue_stack_maps.c | 2 +- kernel/bpf/reuseport_array.c | 2 +- kernel/bpf/stackmap.c | 2 +- kernel/bpf/syscall.c | 72 +++++++++++++++++++++------- kernel/bpf/verifier.c | 2 +- kernel/bpf/xskmap.c | 2 +- kernel/fork.c | 4 ++ net/core/filter.c | 6 +-- tools/bpf/bpftool/feature.c | 2 +- tools/bpf/bpftool/main.c | 5 ++ tools/include/uapi/linux/bpf.h | 5 ++ tools/lib/bpf/libbpf.c | 54 +++++++++++++++++++++ tools/lib/bpf/libbpf.h | 7 +++ tools/lib/bpf/libbpf.map | 2 + 26 files changed, 178 insertions(+), 35 deletions(-) -- 2.17.1