Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp764712rwb; Sat, 1 Oct 2022 08:05:30 -0700 (PDT) X-Google-Smtp-Source: AMsMyM7ZiXgTrLJbrw5cSVhmaexR4ecYfD5v0ZYz5WCwK7IyrgMlr/SDE3eMB0PuZStweO4J6fdD X-Received: by 2002:a17:90a:1b65:b0:1f7:4725:aa6e with SMTP id q92-20020a17090a1b6500b001f74725aa6emr3681626pjq.179.1664636729728; Sat, 01 Oct 2022 08:05:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1664636729; cv=none; d=google.com; s=arc-20160816; b=czb2y9Tht0NoDfmEsvvVHbHg5gVSf9SCdkLn/crZZvOpzE6jvQU4dIvy01/y+mP0um x6d+951Rz/6Ln2UM9wj2j7lCmux3HRK0q8rjnaVVy56FgwlksjrRQ4RJpSIWJieSAWYo Ms+AZvZcZXKMMTsb9uE0xyYhCYruntI/UvbqRsLYZyRPcJRNl4wkMWFN4YRU6TSwL4E2 D64apOvoGUffm2y9Rq9LPKRTHjD+xoCtozfYFRQt5Cj0o134PC0zKWkdQUBqtDny0TvL gRvnqMR49kIdeCJ8VHoGnFjHABA6o20gEzUnQksIDE6+64UW8GdY2KHlGqIAKZWviEJj +22Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=xOHhqkEX8GkjEzhBZhVsybXwl18+zuU+bDpSzWeRWr0=; b=od4Y1sLQuDo0f3NRspCem1GERrRued25zPV+exaayD6bLd1xK6+PBgfyV7AG0n451Q z81UWS0HaOa23DWBMk9yGojJ5IkmKJzfs25l7I8De5FQGbcSpllBkEuSA2ADxJc/heoi KjpvUm6V3hmvBjsPvooqUZa8fwJDzO86FpqUfYt7T9uCuiebX9toIKsYQ4rClBmpo86S TAl2B0vz3H1N8yYJApK79GrfEsWen/f+bgfWRZ3vo1CqD/WN6TLNCLzBpy+sg8H0Kb2e h3HWogvUZEUfAR1LJN2xMc2OLW8k0EsSQrp7GacPrZlfOxADi3TYaA9yIYsZDaSHTgRM +bwg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w3-20020a63f503000000b0042b57ff2893si5477666pgh.195.2022.10.01.08.05.15; Sat, 01 Oct 2022 08:05:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229558AbiJAOrZ (ORCPT + 99 others); Sat, 1 Oct 2022 10:47:25 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55528 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229462AbiJAOrX (ORCPT ); Sat, 1 Oct 2022 10:47:23 -0400 Received: from mail-qv1-f50.google.com (mail-qv1-f50.google.com [209.85.219.50]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DBFE876444; Sat, 1 Oct 2022 07:47:21 -0700 (PDT) Received: by mail-qv1-f50.google.com with SMTP id i12so4577975qvs.2; Sat, 01 Oct 2022 07:47:21 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date; bh=xOHhqkEX8GkjEzhBZhVsybXwl18+zuU+bDpSzWeRWr0=; b=ArksnCTsHZaQefFNFhUqsuxxVVWv5s55xMOeAHkpRDs+axHjilUEz0rJh3G11j1S3C EnHgd5S90pE6xEVVwNp1rwnplITH+iG+Oc8uIGuU83WY+2JnwKFjptK4D3Y6InDPtNVV x/tYV+EuVTmFQoulx6k2YBbKdBdpejxJmM41BDIt/mP115wpfpFx+GvraqMka3zpvgRR +nMDWFcmOxwnAIGkR28r1A3SxenT6OJdGXPkmSFSJOSWGNrcZjZAgvLtx5rhUNOt5/zT EF25jg2UMQQHSBiYQim/0N4YVIwpy23vF3Tl6qa1ocabjBdrOZT37/ypacHG3+FSmAhG nF0g== X-Gm-Message-State: ACrzQf1bInztsi2MSTkbCqXXF9nTGfuplt4RbV+qreG1o9MaTdHpTdG7 s3BDYKgN3ZEk4EJcy5bxVvk= X-Received: by 2002:a05:6214:246f:b0:4ac:a1f8:4c9b with SMTP id im15-20020a056214246f00b004aca1f84c9bmr10875044qvb.18.1664635640784; Sat, 01 Oct 2022 07:47:20 -0700 (PDT) Received: from localhost ([2620:10d:c091:480::dcb2]) by smtp.gmail.com with ESMTPSA id m13-20020a05620a24cd00b006cec8001bf4sm6490232qkn.26.2022.10.01.07.47.20 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 01 Oct 2022 07:47:20 -0700 (PDT) From: David Vernet To: ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, martin.lau@linux.dev Cc: kernel-team@fb.com, bpf@vger.kernel.org, linux-kernel@vger.kernel.org, yhs@fb.com, song@kernel.org, john.fastabend@gmail.com, kpsingh@kernel.org, sdf@google.com, haoluo@google.com, jolsa@kernel.org, tj@kernel.org, memxor@gmail.com Subject: [PATCH v2 0/2] Support storing struct task_struct objects as kptrs Date: Sat, 1 Oct 2022 09:47:14 -0500 Message-Id: <20221001144716.3403120-1-void@manifault.com> X-Mailer: git-send-email 2.37.3 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.4 required=5.0 tests=BAYES_00, FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM,HEADER_FROM_DIFFERENT_DOMAINS, RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Now that BPF supports adding new kernel functions with kfuncs, and storing kernel objects in maps with kptrs, we can add a set of kfuncs which allow struct task_struct objects to be stored in maps as referenced kptrs. The possible use-cases for doing this are plentiful. During tracing, for example, it would be useful to be able to collect some tasks that performed a certain operation, and then periodically summarize who they are, which cgroup they're in, how much CPU time they've spent, etc. Doing this now would require storing the task's pids along with some relevant data to be exported to user space, and later associating the pids to tasks in other event handlers where the data is recorded. Another useful by-product of this is that it allows a program to pin a task, and by proxy therefore also pin its task local storage. This patch set adds this aforementioned set of kfuncs, along with a new selftest suite for validation. Signed-off-by: David Vernet --- v1 -> v2: - Rename tracing_btf_ids to generic_kfunc_btf_ids, and add the new kfuncs to that list instead of making a separate btf id list (Alexei). - Don't run the new selftest suite on s390x, which doesn't appear to support invoking kfuncs. - Add a missing __diag_ignore block for -Wmissing-prototypes (lkp@intel.com). - Fix formatting on some of the SPDX-License-Identifier tags. - Clarified the function header comment a bit on bpf_task_kptr_get(). David Vernet (2): bpf: Add kfuncs for storing struct task_struct * as a kptr bpf/selftests: Add selftests for new task kfuncs kernel/bpf/helpers.c | 83 ++++++- tools/testing/selftests/bpf/DENYLIST.s390x | 1 + .../selftests/bpf/prog_tests/task_kfunc.c | 155 ++++++++++++ .../selftests/bpf/progs/task_kfunc_common.h | 83 +++++++ .../selftests/bpf/progs/task_kfunc_failure.c | 225 ++++++++++++++++++ .../selftests/bpf/progs/task_kfunc_success.c | 113 +++++++++ 6 files changed, 655 insertions(+), 5 deletions(-) create mode 100644 tools/testing/selftests/bpf/prog_tests/task_kfunc.c create mode 100644 tools/testing/selftests/bpf/progs/task_kfunc_common.h create mode 100644 tools/testing/selftests/bpf/progs/task_kfunc_failure.c create mode 100644 tools/testing/selftests/bpf/progs/task_kfunc_success.c -- 2.37.3