Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp2270134rwl; Sun, 26 Mar 2023 19:47:12 -0700 (PDT) X-Google-Smtp-Source: AKy350YIhZMXtgIh5tP/cqh3ZMRWN9jYfGJHxMr7LmVvD7quWylivONCaQ/Jaa4Su5fMKf8fGxXQ X-Received: by 2002:a05:6402:70a:b0:4fb:9b54:ccb8 with SMTP id w10-20020a056402070a00b004fb9b54ccb8mr10516501edx.21.1679885232469; Sun, 26 Mar 2023 19:47:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1679885232; cv=none; d=google.com; s=arc-20160816; b=A4c+8fq4KCNvveIM8QT/QzRQZaxOtS6nLBOnDfM0430wg7YfV2lac8XKYR/eTkoIgF UJLY202sjYIRyUNvmqOjf9+IS96oqlxfX4G9Po4qn798LO67Qe8UNkw5XRczjNRz9tUM IP1IL7WMiOWH3MUldxd/x5ARQYa1RZIggcGs2GoOGdkCGYUa6L39JTYtH1DSNiX/035s y/+b1oRs5prMDUIp9RjXpkX5mkYP1OD5eiQgBrXHgRJ2lds0EKBs/nYOi75UEGJnCKCH 94KC+KmrFL+oYIFy8Ea7s/Eg5O1QWtTs9g0+4UndlYeKDevoqPXjZKsou8i98JkKxqJI JxAA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=CjPRw7a8pMHELQ53oymZFeBvbCGiVm/Rg9umw+16D4A=; b=I1lCyzsyU88+dzgQ8G/Po/T8waURQdjZQ3dq5zXGV57TzP/AFki4b9hVUDF8kAnZKC GdiGRWEbpwkLWNMXywsYQPrpmSjJqp7wKPzQoijYnE3iNfOhNuSwRFqluIHUQmJjxBiu Tt859sfqLVHjm2xbJQtgySlemX4E715Ize79LB6SC0y/cfXYOZlJPDpgfG7wcGqv9mBS f43cKABd/Jfsz4ELKhESkmMGSzuv9BSCLVfMOFlArghY9CJqbRfXJ0b2vcwZmeVUWJIN FsndydpZeQ2NruBH+a/JU8XhBDajO4nDvY9rai1pbjTPcamSFwEQ/m/6VYbaWewPB7wi QqTQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=R2EoaN+p; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c8-20020aa7d608000000b004aab3450a00si5292982edr.498.2023.03.26.19.46.47; Sun, 26 Mar 2023 19:47:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=R2EoaN+p; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231881AbjC0Cox (ORCPT + 99 others); Sun, 26 Mar 2023 22:44:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56668 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229793AbjC0Cov (ORCPT ); Sun, 26 Mar 2023 22:44:51 -0400 Received: from mail-qt1-x82a.google.com (mail-qt1-x82a.google.com [IPv6:2607:f8b0:4864:20::82a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E83AF46BD; Sun, 26 Mar 2023 19:44:48 -0700 (PDT) Received: by mail-qt1-x82a.google.com with SMTP id n14so7237388qta.10; Sun, 26 Mar 2023 19:44:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; t=1679885088; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=CjPRw7a8pMHELQ53oymZFeBvbCGiVm/Rg9umw+16D4A=; b=R2EoaN+p6+koB5S3sZg0C8WmMZ1DNFr+GTnOprbfL1XkZnwG/V69NyBkMuUaNPx1V3 TW6G0ueC6Vu4cQLsZfY2cCYdT88jioE9o8SWhGgNH5Rp7LCiNOnzNdMyPvs5WmmLWw2/ iXPN+WoIk+rDF04qQTRmhUnS+FLZ1vH7XGhsMjyxrAykIBuQKkQvhPDJ5Qd/mAeCA4Ck ztzQA3qiPyAKfICjPw1MxfKYpQcUX13DCEl3jePOtycKyaVL8f4G9YhovyXd2Y3B5cpr /giI9cOvp1xDNx9Q25YcAStpxEHpmSCJMjvVgj9xaIsU54NzXjYRBCdns9Mn78kqIeY7 54UQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1679885088; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=CjPRw7a8pMHELQ53oymZFeBvbCGiVm/Rg9umw+16D4A=; b=79skYBIDCmDb98R+rEBOsfFczwWyLl5BRP20q4IDeUB4XFf8c8L/DgKJHOexJqiuAi e1x9LbEvLKakNOnvkYbV1bB5WPjNg6HufxWOqcaipsQhGrtJus0NJAwxLCZFPWh3nP1a 2BnEyzFN0sUt/mnw46w2lX8UMX0r11h2AyqSv5YYjZq5BGJ5Maoegx9DRIrPS/xx8gbv NBH4ti01Mr7QZJQyepCTDItOcLOdF2Yo5H9fjcgl54LMIbf/YaPYQrL0b/QCmNeOi6vX 5IsY+DBYzlfbzvpYRLCDRQ+Rbg3WmeUqW4xaqJ2hUE99eOZdbL6ku5pBy7Nbn1Eaeb5a dHxw== X-Gm-Message-State: AO0yUKVg/PL5WjI8IRbKSMDx7LY199t3tFuPuRjPmTcae45KOcx+AHRD VxLpeK9cvYBNOQggtNtpo9Mox3+pCCCy8DzJs10= X-Received: by 2002:a05:622a:199f:b0:3c0:2b0b:84c with SMTP id u31-20020a05622a199f00b003c02b0b084cmr3971968qtc.6.1679885088035; Sun, 26 Mar 2023 19:44:48 -0700 (PDT) MIME-Version: 1.0 References: <20230326092208.13613-1-laoar.shao@gmail.com> <20230326092208.13613-9-laoar.shao@gmail.com> <87mt3z7pm5.fsf@toke.dk> In-Reply-To: <87mt3z7pm5.fsf@toke.dk> From: Yafang Shao Date: Mon, 27 Mar 2023 10:44:12 +0800 Message-ID: Subject: Re: [RFC PATCH bpf-next 08/13] bpf: Alloc and free bpf_map id in bpf namespace To: =?UTF-8?B?VG9rZSBIw7hpbGFuZC1Kw7hyZ2Vuc2Vu?= Cc: ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, kafai@fb.com, songliubraving@fb.com, yhs@fb.com, john.fastabend@gmail.com, kpsingh@kernel.org, sdf@google.com, haoluo@google.com, jolsa@kernel.org, bpf@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-0.2 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Mar 26, 2023 at 6:51=E2=80=AFPM Toke H=C3=B8iland-J=C3=B8rgensen wrote: > > Yafang Shao writes: > > > We only expose the bpf map id under current bpf namespace to user. The > > map->id is still the id in the init bpf namespace. > > > > The result as follows, > > > > Run bpftool in a new bpf namespace > > $ bpftool map show > > 4: array name kprobe_b.rodata flags 0x80 > > key 4B value 37B max_entries 1 memlock 360B > > btf_id 159 frozen > > The btf_id is identical for all the different objects in this example > output; surely that can't be right? Copy-paste error? Same thing in the > other patches... > The bpf progs {"kretprobe_run","kprobe_run"} and the bpf maps {"kprobe_b.rodata","kprobe_b.data"} belong to the same bpf program. So the btf_id of them are always the same. For example, below is the result when I rerun it on my test server, $ bpftool btf show ... 943: name size 1086B prog_ids 48824,48822 map_ids 43712,43711 pids kprobe(3599801) ... $ bpftool map show 43711: array name kprobe_b.rodata flags 0x80 key 4B value 37B max_entries 1 memlock 360B btf_id 943 frozen pids kprobe(3599801) 43712: array name kprobe_b.data flags 0x400 key 4B value 4B max_entries 1 memlock 8192B btf_id 943 pids kprobe(3599801) $ bpftool prog show 48822: kprobe name kretprobe_run tag 0de47cc241a2b1b3 gpl loaded_at 2023-03-27T10:35:01+0800 uid 0 xlated 112B jited 78B memlock 4096B map_ids 43711 btf_id 943 pids kprobe(3599801) 48824: kprobe name kprobe_run tag bf163b23cd3b174d gpl loaded_at 2023-03-27T10:35:01+0800 uid 0 xlated 104B jited 75B memlock 4096B map_ids 43711 btf_id 943 pids kprobe(3599801) The btf_id hasn't been added into the bpf namespace, so the btf id in init bpf namespace and child bpf namespace are the same value. --=20 Regards Yafang