A simple abstraction around a series of instructions that transparently handles resizing. Currently, we have insn_buf[16] in convert_ctx_accesses which might not be enough for xdp kfuncs. If we find this abstraction helpful, we might convert existing insn_buf[16] to it in the future. Cc: John Fastabend <john.fastabend@xxxxxxxxx> Cc: David Ahern <dsahern@xxxxxxxxx> Cc: Martin KaFai Lau <martin.lau@xxxxxxxxx> Cc: Jakub Kicinski <kuba@xxxxxxxxxx> Cc: Willem de Bruijn <willemb@xxxxxxxxxx> Cc: Jesper Dangaard Brouer <brouer@xxxxxxxxxx> Cc: Anatoly Burakov <anatoly.burakov@xxxxxxxxx> Cc: Alexander Lobakin <alexandr.lobakin@xxxxxxxxx> Cc: Magnus Karlsson <magnus.karlsson@xxxxxxxxx> Cc: Maryam Tahhan <mtahhan@xxxxxxxxxx> Cc: xdp-hints@xxxxxxxxxxxxxxx Cc: netdev@xxxxxxxxxxxxxxx Signed-off-by: Stanislav Fomichev <sdf@xxxxxxxxxx> --- include/linux/bpf_patch.h | 27 +++++++++++++++++++++ kernel/bpf/Makefile | 2 +- kernel/bpf/bpf_patch.c | 51 +++++++++++++++++++++++++++++++++++++++ 3 files changed, 79 insertions(+), 1 deletion(-) create mode 100644 include/linux/bpf_patch.h create mode 100644 kernel/bpf/bpf_patch.c diff --git a/include/linux/bpf_patch.h b/include/linux/bpf_patch.h new file mode 100644 index 000000000000..81ff738eef8d --- /dev/null +++ b/include/linux/bpf_patch.h @@ -0,0 +1,27 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +#ifndef _LINUX_BPF_PATCH_H +#define _LINUX_BPF_PATCH_H 1 + +#include <linux/bpf.h> + +struct bpf_patch { + struct bpf_insn *insn; + size_t capacity; + size_t len; + int err; +}; + +void bpf_patch_free(struct bpf_patch *patch); +size_t bpf_patch_len(const struct bpf_patch *patch); +int bpf_patch_err(const struct bpf_patch *patch); +void __bpf_patch_append(struct bpf_patch *patch, struct bpf_insn insn); +struct bpf_insn *bpf_patch_data(const struct bpf_patch *patch); + +#define bpf_patch_append(patch, ...) ({ \ + struct bpf_insn insn[] = { __VA_ARGS__ }; \ + int i; \ + for (i = 0; i < ARRAY_SIZE(insn); i++) \ + __bpf_patch_append(patch, insn[i]); \ +}) + +#endif diff --git a/kernel/bpf/Makefile b/kernel/bpf/Makefile index 3a12e6b400a2..5724f36292a5 100644 --- a/kernel/bpf/Makefile +++ b/kernel/bpf/Makefile @@ -13,7 +13,7 @@ obj-$(CONFIG_BPF_SYSCALL) += bpf_local_storage.o bpf_task_storage.o obj-${CONFIG_BPF_LSM} += bpf_inode_storage.o obj-$(CONFIG_BPF_SYSCALL) += disasm.o obj-$(CONFIG_BPF_JIT) += trampoline.o -obj-$(CONFIG_BPF_SYSCALL) += btf.o memalloc.o +obj-$(CONFIG_BPF_SYSCALL) += btf.o memalloc.o bpf_patch.o obj-$(CONFIG_BPF_JIT) += dispatcher.o ifeq ($(CONFIG_NET),y) obj-$(CONFIG_BPF_SYSCALL) += devmap.o diff --git a/kernel/bpf/bpf_patch.c b/kernel/bpf/bpf_patch.c new file mode 100644 index 000000000000..82a10bf5624a --- /dev/null +++ b/kernel/bpf/bpf_patch.c @@ -0,0 +1,51 @@ +// SPDX-License-Identifier: GPL-2.0-only + +#include <linux/bpf_patch.h> + +void bpf_patch_free(struct bpf_patch *patch) +{ + kfree(patch->insn); +} + +size_t bpf_patch_len(const struct bpf_patch *patch) +{ + return patch->len; +} + +int bpf_patch_err(const struct bpf_patch *patch) +{ + return patch->err; +} + +void __bpf_patch_append(struct bpf_patch *patch, struct bpf_insn insn) +{ + void *arr; + + if (patch->err) + return; + + if (patch->len + 1 > patch->capacity) { + if (!patch->capacity) + patch->capacity = 16; + else + patch->capacity *= 2; + + arr = krealloc_array(patch->insn, patch->capacity, sizeof(insn), GFP_KERNEL); + if (!arr) { + patch->err = -ENOMEM; + kfree(patch->insn); + return; + } + + patch->insn = arr; + patch->capacity *= 2; + } + + patch->insn[patch->len++] = insn; +} +EXPORT_SYMBOL(__bpf_patch_append); + +struct bpf_insn *bpf_patch_data(const struct bpf_patch *patch) +{ + return patch->insn; +} -- 2.38.1.431.g37b22c650d-goog