Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp4112865pxu; Wed, 9 Dec 2020 08:39:39 -0800 (PST) X-Google-Smtp-Source: ABdhPJwMXCHKnLhcJ1uBesHLUJTg9B9V0Q0QzqICj6fYm/1RdBwdJUKhttdAVre1nvgoGMVr1+xv X-Received: by 2002:a50:e083:: with SMTP id f3mr2793667edl.223.1607531979464; Wed, 09 Dec 2020 08:39:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607531979; cv=none; d=google.com; s=arc-20160816; b=cH8b6eFKQhU//Xa8ArKsTAYZj4S35FaWlSbwWtl+k4jiCKG45cAuKhtri8VIpLSBnl gwNtrT8Ran1BtZ1I/II0RbWv3O7MvH/lUYkR6UTDntx8C0ZbVjLX2jsrHwec2+zZXcK+ LKVgQ2lhVJmhw99G4WA8az2KYKBiH50wj8Lk8KdaA0l+qRXhf9CsH3AyrmTRCQjZOl6g Y+1+YWpK2fC5LTcXRNZTcS0a0og5YRehW3ac9IO3IvvtI5JbNCU0chmiuica74mv9wQW btn88Cy4kNgrSgTBqbH6Yvhf0hkJrj0AZPQWuJbcfK/oMZxga2NGK7HCqmqMuFr9MSId td3Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=yAV9JSE89fN5NUWnNEVmAEQPsrCuiF9KIqGO/PwkFfA=; b=Y1NHCsSZG9mutS3mWbrx7/h865Cf7dULemZUmnr22wJqjs4aRD2PoEPV17/hYJk/eD YXY5f8q8Ki/eyxOv538VnqJtKBSlTVelF/Opi9OjYjunrnNsovVG3UYWPJs2BnG99oMA 6sg8O5SUjudor/WkPTynROoiD7CCuo6vbguYZXnuDCFma5c8ae3VPQK8YBd+9+U1FPv1 JE+gWv9trlNkA0o2BCoAH+1YGaKtPlfnnyHOOA3Yh7Exi7GZEIuMfuHIzy4jylRAartv RiTM5eH1/LYJ8g/3OUIUYu39yNzb8ytMYrGrFuaELIoQoxhE2hED8KM+06lYiGPUJ+TU j0/g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d8si1084211edo.441.2020.12.09.08.39.14; Wed, 09 Dec 2020 08:39:39 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730239AbgLIQgB (ORCPT + 99 others); Wed, 9 Dec 2020 11:36:01 -0500 Received: from www62.your-server.de ([213.133.104.62]:46626 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728121AbgLIQgB (ORCPT ); Wed, 9 Dec 2020 11:36:01 -0500 Received: from sslproxy02.your-server.de ([78.47.166.47]) by www62.your-server.de with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92.3) (envelope-from ) id 1kn2Qw-000AWm-AE; Wed, 09 Dec 2020 17:35:18 +0100 Received: from [85.7.101.30] (helo=pc-9.home) by sslproxy02.your-server.de with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1kn2Qw-0001Eu-42; Wed, 09 Dec 2020 17:35:18 +0100 Subject: Re: [PATCH bpf-next v4 2/4] bpf: Expose bpf_get_socket_cookie to tracing programs To: Florent Revest , bpf@vger.kernel.org Cc: ast@kernel.org, andrii@kernel.org, kpsingh@chromium.org, kafai@fb.com, linux-kernel@vger.kernel.org References: <20201209132636.1545761-1-revest@chromium.org> <20201209132636.1545761-2-revest@chromium.org> From: Daniel Borkmann Message-ID: Date: Wed, 9 Dec 2020 17:35:17 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2 MIME-Version: 1.0 In-Reply-To: <20201209132636.1545761-2-revest@chromium.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.102.4/26013/Wed Dec 9 15:33:37 2020) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 12/9/20 2:26 PM, Florent Revest wrote: > This needs two new helpers, one that works in a sleepable context (using > sock_gen_cookie which disables/enables preemption) and one that does not > (for performance reasons). Both take a struct sock pointer and need to > check it for NULLness. > > This helper could also be useful to other BPF program types such as LSM. Looks like this commit description is now stale and needs to be updated since we only really add one helper? > Signed-off-by: Florent Revest > --- > include/linux/bpf.h | 1 + > include/uapi/linux/bpf.h | 7 +++++++ > kernel/trace/bpf_trace.c | 2 ++ > net/core/filter.c | 12 ++++++++++++ > tools/include/uapi/linux/bpf.h | 7 +++++++ > 5 files changed, 29 insertions(+) > > diff --git a/include/linux/bpf.h b/include/linux/bpf.h > index 07cb5d15e743..5a858e8c3f1a 100644 > --- a/include/linux/bpf.h > +++ b/include/linux/bpf.h > @@ -1860,6 +1860,7 @@ extern const struct bpf_func_proto bpf_per_cpu_ptr_proto; > extern const struct bpf_func_proto bpf_this_cpu_ptr_proto; > extern const struct bpf_func_proto bpf_ktime_get_coarse_ns_proto; > extern const struct bpf_func_proto bpf_sock_from_file_proto; > +extern const struct bpf_func_proto bpf_get_socket_ptr_cookie_proto; > > const struct bpf_func_proto *bpf_tracing_func_proto( > enum bpf_func_id func_id, const struct bpf_prog *prog); > diff --git a/include/uapi/linux/bpf.h b/include/uapi/linux/bpf.h > index ba59309f4d18..9ac66cf25959 100644 > --- a/include/uapi/linux/bpf.h > +++ b/include/uapi/linux/bpf.h > @@ -1667,6 +1667,13 @@ union bpf_attr { > * Return > * A 8-byte long unique number. > * > + * u64 bpf_get_socket_cookie(void *sk) > + * Description > + * Equivalent to **bpf_get_socket_cookie**\ () helper that accepts > + * *sk*, but gets socket from a BTF **struct sock**. Maybe add a small comment that this one also works for sleepable [tracing] progs? > + * Return > + * A 8-byte long unique number. ... or 0 if *sk* is NULL. > * u32 bpf_get_socket_uid(struct sk_buff *skb) > * Return > * The owner UID of the socket associated to *skb*. If the socket > diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c > index 52ddd217d6a1..be5e96de306d 100644 > --- a/kernel/trace/bpf_trace.c > +++ b/kernel/trace/bpf_trace.c > @@ -1760,6 +1760,8 @@ tracing_prog_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog) > return &bpf_sk_storage_delete_tracing_proto; > case BPF_FUNC_sock_from_file: > return &bpf_sock_from_file_proto; > + case BPF_FUNC_get_socket_cookie: > + return &bpf_get_socket_ptr_cookie_proto; > #endif > case BPF_FUNC_seq_printf: > return prog->expected_attach_type == BPF_TRACE_ITER ? > diff --git a/net/core/filter.c b/net/core/filter.c > index 255aeee72402..13ad9a64f04f 100644 > --- a/net/core/filter.c > +++ b/net/core/filter.c > @@ -4631,6 +4631,18 @@ static const struct bpf_func_proto bpf_get_socket_cookie_sock_proto = { > .arg1_type = ARG_PTR_TO_CTX, > }; > > +BPF_CALL_1(bpf_get_socket_ptr_cookie, struct sock *, sk) > +{ > + return sk ? sock_gen_cookie(sk) : 0; > +} > + > +const struct bpf_func_proto bpf_get_socket_ptr_cookie_proto = { > + .func = bpf_get_socket_ptr_cookie, > + .gpl_only = false, > + .ret_type = RET_INTEGER, > + .arg1_type = ARG_PTR_TO_BTF_ID_SOCK_COMMON, > +}; > + > BPF_CALL_1(bpf_get_socket_cookie_sock_ops, struct bpf_sock_ops_kern *, ctx) > { > return __sock_gen_cookie(ctx->sk); > diff --git a/tools/include/uapi/linux/bpf.h b/tools/include/uapi/linux/bpf.h > index ba59309f4d18..9ac66cf25959 100644 > --- a/tools/include/uapi/linux/bpf.h > +++ b/tools/include/uapi/linux/bpf.h > @@ -1667,6 +1667,13 @@ union bpf_attr { > * Return > * A 8-byte long unique number. > * > + * u64 bpf_get_socket_cookie(void *sk) > + * Description > + * Equivalent to **bpf_get_socket_cookie**\ () helper that accepts > + * *sk*, but gets socket from a BTF **struct sock**. > + * Return > + * A 8-byte long unique number. > + * > * u32 bpf_get_socket_uid(struct sk_buff *skb) > * Return > * The owner UID of the socket associated to *skb*. If the socket >