Changes in 5.15.46
binfmt_flat: do not stop relocating GOT entries prematurely on riscv
parisc/stifb: Implement fb_is_primary_device()
parisc/stifb: Keep track of hardware path of graphics card
RISC-V: Mark IORESOURCE_EXCLUSIVE for reserved mem instead of IORESOURCE_BUSY
riscv: Initialize thread pointer before calling C functions
riscv: Fix irq_work when SMP is disabled
riscv: Wire up memfd_secret in UAPI header
riscv: Move alternative length validation into subsection
ALSA: hda/realtek - Add new type for ALC245
ALSA: hda/realtek: Enable 4-speaker output for Dell XPS 15 9520 laptop
ALSA: hda/realtek - Fix microphone noise on ASUS TUF B550M-PLUS
ALSA: usb-audio: Cancel pending work at closing a MIDI substream
USB: serial: pl2303: fix type detection for odd device
USB: serial: option: add Quectel BG95 modem
USB: new quirk for Dell Gen 2 devices
usb: isp1760: Fix out-of-bounds array access
usb: dwc3: gadget: Move null pinter check to proper place
usb: core: hcd: Add support for deferring roothub registration
fs/ntfs3: Update valid size if -EIOCBQUEUED
fs/ntfs3: Fix fiemap + fix shrink file size (to remove preallocated space)
fs/ntfs3: Keep preallocated only if option prealloc enabled
fs/ntfs3: Check new size for limits
fs/ntfs3: In function ntfs_set_acl_ex do not change inode->i_mode if called from function ntfs_init_acl
fs/ntfs3: Fix some memory leaks in an error handling path of 'log_replay()'
fs/ntfs3: Update i_ctime when xattr is added
fs/ntfs3: Restore ntfs_xattr_get_acl and ntfs_xattr_set_acl functions
cifs: fix potential double free during failed mount
cifs: when extending a file with falloc we should make files not-sparse
xhci: Allow host runtime PM as default for Intel Alder Lake N xHCI
platform/x86: intel-hid: fix _DSM function index handling
x86/MCE/AMD: Fix memory leak when threshold_create_bank() fails
perf/x86/intel: Fix event constraints for ICL
x86/kexec: fix memory leak of elf header buffer
x86/sgx: Set active memcg prior to shmem allocation
ptrace/um: Replace PT_DTRACE with TIF_SINGLESTEP
ptrace/xtensa: Replace PT_SINGLESTEP with TIF_SINGLESTEP
ptrace: Reimplement PTRACE_KILL by always sending SIGKILL
btrfs: add "0x" prefix for unsupported optional features
btrfs: return correct error number for __extent_writepage_io()
btrfs: repair super block num_devices automatically
btrfs: fix the error handling for submit_extent_page() for btrfs_do_readpage()
iommu/vt-d: Add RPLS to quirk list to skip TE disabling
drm/vmwgfx: validate the screen formats
drm/virtio: fix NULL pointer dereference in virtio_gpu_conn_get_modes
selftests/bpf: Fix vfs_link kprobe definition
selftests/bpf: Fix parsing of prog types in UAPI hdr for bpftool sync
mwifiex: add mutex lock for call in mwifiex_dfs_chan_sw_work_queue
b43legacy: Fix assigning negative value to unsigned variable
b43: Fix assigning negative value to unsigned variable
ipw2x00: Fix potential NULL dereference in libipw_xmit()
ipv6: fix locking issues with loops over idev->addr_list
fbcon: Consistently protect deferred_takeover with console_lock()
x86/platform/uv: Update TSC sync state for UV5
ACPICA: Avoid cache flush inside virtual machines
mac80211: minstrel_ht: fix where rate stats are stored (fixes debugfs output)
drm/komeda: return early if drm_universal_plane_init() fails.
drm/amd/display: Disabling Z10 on DCN31
rcu-tasks: Fix race in schedule and flush work
rcu: Make TASKS_RUDE_RCU select IRQ_WORK
sfc: ef10: Fix assigning negative value to unsigned variable
ALSA: jack: Access input_dev under mutex
rtw88: 8821c: fix debugfs rssi value
spi: spi-rspi: Remove setting {src,dst}_{addr,addr_width} based on DMA direction
tools/power turbostat: fix ICX DRAM power numbers
scsi: lpfc: Move cfg_log_verbose check before calling lpfc_dmp_dbg()
scsi: lpfc: Fix SCSI I/O completion and abort handler deadlock
scsi: lpfc: Fix call trace observed during I/O with CMF enabled
cpuidle: PSCI: Improve support for suspend-to-RAM for PSCI OSI mode
drm/amd/pm: fix double free in si_parse_power_table()
ASoC: rsnd: care default case on rsnd_ssiu_busif_err_status_clear()
ASoC: rsnd: care return value from rsnd_node_fixed_index()
ath9k: fix QCA9561 PA bias level
media: venus: hfi: avoid null dereference in deinit
media: pci: cx23885: Fix the error handling in cx23885_initdev()
media: cx25821: Fix the warning when removing the module
md/bitmap: don't set sb values if can't pass sanity check
mmc: jz4740: Apply DMA engine limits to maximum segment size
drivers: mmc: sdhci_am654: Add the quirk to set TESTCD bit
scsi: megaraid: Fix error check return value of register_chrdev()
drm/amdgpu/sdma: Fix incorrect calculations of the wptr of the doorbells
scsi: ufs: Use pm_runtime_resume_and_get() instead of pm_runtime_get_sync()
scsi: lpfc: Fix resource leak in lpfc_sli4_send_seq_to_ulp()
ath11k: disable spectral scan during spectral deinit
ASoC: Intel: bytcr_rt5640: Add quirk for the HP Pro Tablet 408
drm/plane: Move range check for format_count earlier
drm/amd/pm: fix the compile warning
ath10k: skip ath10k_halt during suspend for driver state RESTARTING
arm64: compat: Do not treat syscall number as ESR_ELx for a bad syscall
drm: msm: fix error check return value of irq_of_parse_and_map()
scsi: target: tcmu: Fix possible data corruption
ipv6: Don't send rs packets to the interface of ARPHRD_TUNNEL
net/mlx5: fs, delete the FTE when there are no rules attached to it
ASoC: dapm: Don't fold register value changes into notifications
mlxsw: spectrum_dcb: Do not warn about priority changes
mlxsw: Treat LLDP packets as control
drm/amdgpu/psp: move PSP memory alloc from hw_init to sw_init
drm/amdgpu/ucode: Remove firmware load type check in amdgpu_ucode_free_bo
regulator: mt6315: Enforce regulator-compatible, not name
HID: bigben: fix slab-out-of-bounds Write in bigben_probe
of: Support more than one crash kernel regions for kexec -s
ASoC: tscs454: Add endianness flag in snd_soc_component_driver
scsi: lpfc: Alter FPIN stat accounting logic
net: remove two BUG() from skb_checksum_help()
s390/preempt: disable __preempt_count_add() optimization for PROFILE_ALL_BRANCHES
perf/amd/ibs: Cascade pmu init functions' return value
sched/core: Avoid obvious double update_rq_clock warning
spi: stm32-qspi: Fix wait_cmd timeout in APM mode
dma-debug: change allocation mode from GFP_NOWAIT to GFP_ATIOMIC
ACPI: PM: Block ASUS B1400CEAE from suspend to idle by default
ipmi:ssif: Check for NULL msg when handling events and messages
ipmi: Fix pr_fmt to avoid compilation issues
rtlwifi: Use pr_warn instead of WARN_ONCE
mt76: mt7921: accept rx frames with non-standard VHT MCS10-11
mt76: fix encap offload ethernet type check
media: rga: fix possible memory leak in rga_probe
media: coda: limit frame interval enumeration to supported encoder frame sizes
media: hantro: HEVC: unconditionnaly set pps_{cb/cr}_qp_offset values
media: ccs-core.c: fix failure to call clk_disable_unprepare
media: imon: reorganize serialization
media: cec-adap.c: fix is_configuring state
usbnet: Run unregister_netdev() before unbind() again
openrisc: start CPU timer early in boot
nvme-pci: fix a NULL pointer dereference in nvme_alloc_admin_tags
ASoC: rt5645: Fix errorenous cleanup order
nbd: Fix hung on disconnect request if socket is closed before
drm/amd/pm: update smartshift powerboost calc for smu12
drm/amd/pm: update smartshift powerboost calc for smu13
net: phy: micrel: Allow probing without .driver_data
media: exynos4-is: Fix compile warning
media: hantro: Stop using H.264 parameter pic_num
ASoC: max98357a: remove dependency on GPIOLIB
ASoC: rt1015p: remove dependency on GPIOLIB
ACPI: CPPC: Assume no transition latency if no PCCT
nvme: set non-mdts limits in nvme_scan_work
can: mcp251xfd: silence clang's -Wunaligned-access warning
x86/microcode: Add explicit CPU vendor dependency
net: ipa: ignore endianness if there is no header
m68k: atari: Make Atari ROM port I/O write macros return void
rxrpc: Return an error to sendmsg if call failed
rxrpc, afs: Fix selection of abort codes
afs: Adjust ACK interpretation to try and cope with NAT
eth: tg3: silence the GCC 12 array-bounds warning
char: tpm: cr50_i2c: Suppress duplicated error message in .remove()
selftests/bpf: fix btf_dump/btf_dump due to recent clang change
gfs2: use i_lock spin_lock for inode qadata
scsi: target: tcmu: Avoid holding XArray lock when calling lock_page
IB/rdmavt: add missing locks in rvt_ruc_loopback
ARM: dts: ox820: align interrupt controller node name with dtschema
ARM: dts: socfpga: align interrupt controller node name with dtschema
ARM: dts: s5pv210: align DMA channels with dtschema
arm64: dts: qcom: msm8994: Fix the cont_splash_mem address
arm64: dts: qcom: msm8994: Fix BLSP[12]_DMA channels count
PM / devfreq: rk3399_dmc: Disable edev on remove()
crypto: ccree - use fine grained DMA mapping dir
soc: ti: ti_sci_pm_domains: Check for null return of devm_kcalloc
fs: jfs: fix possible NULL pointer dereference in dbFree()
arm64: dts: qcom: sdm845-xiaomi-beryllium: fix typo in panel's vddio-supply property
ALSA: usb-audio: Add quirk bits for enabling/disabling generic implicit fb
ALSA: usb-audio: Move generic implicit fb quirk entries into quirks.c
ARM: OMAP1: clock: Fix UART rate reporting algorithm
powerpc/fadump: Fix fadump to work with a different endian capture kernel
fat: add ratelimit to fat*_ent_bread()
pinctrl: renesas: rzn1: Fix possible null-ptr-deref in sh_pfc_map_resources()
ARM: versatile: Add missing of_node_put in dcscb_init
ARM: dts: exynos: add atmel,24c128 fallback to Samsung EEPROM
ARM: hisi: Add missing of_node_put after of_find_compatible_node
cpufreq: Avoid unnecessary frequency updates due to mismatch
powerpc/rtas: Keep MSR[RI] set when calling RTAS
PCI: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store()
KVM: PPC: Book3S HV Nested: L2 LPCR should inherit L1 LPES setting
alpha: fix alloc_zeroed_user_highpage_movable()
tracing: incorrect isolate_mote_t cast in mm_vmscan_lru_isolate
powerpc/powernv/vas: Assign real address to rx_fifo in vas_rx_win_attr
powerpc/xics: fix refcount leak in icp_opal_init()
powerpc/powernv: fix missing of_node_put in uv_init()
macintosh/via-pmu: Fix build failure when CONFIG_INPUT is disabled
powerpc/iommu: Add missing of_node_put in iommu_init_early_dart
smb3: check for null tcon
RDMA/hfi1: Prevent panic when SDMA is disabled
Input: gpio-keys - cancel delayed work only in case of GPIO
drm: fix EDID struct for old ARM OABI format
drm/bridge_connector: enable HPD by default if supported
dt-bindings: display: sitronix, st7735r: Fix backlight in example
drm/vmwgfx: Fix an invalid read
ath11k: acquire ab->base_lock in unassign when finding the peer by addr
drm: bridge: it66121: Fix the register page length
ath9k: fix ar9003_get_eepmisc
drm/edid: fix invalid EDID extension block filtering
drm/bridge: adv7511: clean up CEC adapter when probe fails
drm: bridge: icn6211: Fix register layout
drm: bridge: icn6211: Fix HFP_HSW_HBP_HI and HFP_MIN handling
mtd: spinand: gigadevice: fix Quad IO for GD5F1GQ5UExxG
spi: qcom-qspi: Add minItems to interconnect-names
ASoC: mediatek: Fix error handling in mt8173_max98090_dev_probe
ASoC: mediatek: Fix missing of_node_put in mt2701_wm8960_machine_probe
x86/delay: Fix the wrong asm constraint in delay_loop()
drm/vc4: hvs: Fix frame count register readout
drm/mediatek: Fix mtk_cec_mask()
drm/vc4: hvs: Reset muxes at probe time
drm/vc4: txp: Don't set TXP_VSTART_AT_EOF
drm/vc4: txp: Force alpha to be 0xff if it's disabled
libbpf: Don't error out on CO-RE relos for overriden weak subprogs
x86/PCI: Fix ALi M1487 (IBC) PIRQ router link value interpretation
mptcp: reset the packet scheduler on PRIO change
nl80211: show SSID for P2P_GO interfaces
drm/komeda: Fix an undefined behavior bug in komeda_plane_add()
drm: mali-dp: potential dereference of null pointer
spi: spi-ti-qspi: Fix return value handling of wait_for_completion_timeout
scftorture: Fix distribution of short handler delays
net: dsa: mt7530: 1G can also support 1000BASE-X link mode
ixp4xx_eth: fix error check return value of platform_get_irq()
NFC: NULL out the dev->rfkill to prevent UAF
efi: Add missing prototype for efi_capsule_setup_info
device property: Check fwnode->secondary when finding properties
device property: Allow error pointer to be passed to fwnode APIs
target: remove an incorrect unmap zeroes data deduction
drbd: fix duplicate array initializer
EDAC/dmc520: Don't print an error for each unconfigured interrupt line
mtd: rawnand: denali: Use managed device resources
HID: hid-led: fix maximum brightness for Dream Cheeky
HID: elan: Fix potential double free in elan_input_configured
drm/bridge: Fix error handling in analogix_dp_probe
regulator: da9121: Fix uninit-value in da9121_assign_chip_model()
drm/mediatek: dpi: Use mt8183 output formats for mt8192
signal: Deliver SIGTRAP on perf event asynchronously if blocked
sched/fair: Fix cfs_rq_clock_pelt() for throttled cfs_rq
sched/psi: report zeroes for CPU full at the system level
spi: img-spfi: Fix pm_runtime_get_sync() error checking
cpufreq: Fix possible race in cpufreq online error path
printk: use atomic updates for klogd work
printk: add missing memory barrier to wake_up_klogd()
printk: wake waiters for safe and NMI contexts
ath9k_htc: fix potential out of bounds access with invalid rxstatus->rs_keyix
media: i2c: max9286: Use dev_err_probe() helper
media: i2c: max9286: Use "maxim,gpio-poc" property
media: i2c: max9286: fix kernel oops when removing module
media: hantro: Empty encoder capture buffers by default
drm/panel: simple: Add missing bus flags for Innolux G070Y2-L01
ALSA: pcm: Check for null pointer of pointer substream before dereferencing it
mtdblock: warn if opened on NAND
inotify: show inotify mask flags in proc fdinfo
fsnotify: fix wrong lockdep annotations
spi: rockchip: Stop spi slave dma receiver when cs inactive
spi: rockchip: Preset cs-high and clk polarity in setup progress
spi: rockchip: fix missing error on unsupported SPI_CS_HIGH
of: overlay: do not break notify on NOTIFY_{OK|STOP}
selftests/damon: add damon to selftests root Makefile
drm/msm/dp: Modify prototype of encoder based API
drm/msm/hdmi: switch to drm_bridge_connector
drm/msm/dpu: adjust display_v_end for eDP and DP
scsi: iscsi: Fix harmless double shift bug
scsi: ufs: qcom: Fix ufs_qcom_resume()
scsi: ufs: core: Exclude UECxx from SFR dump list
drm/v3d: Fix null pointer dereference of pointer perfmon
selftests/resctrl: Fix null pointer dereference on open failed
libbpf: Fix logic for finding matching program for CO-RE relocation
mtd: spi-nor: core: Check written SR value in spi_nor_write_16bit_sr_and_check()
x86/pm: Fix false positive kmemleak report in msr_build_context()
mtd: rawnand: cadence: fix possible null-ptr-deref in cadence_nand_dt_probe()
mtd: rawnand: intel: fix possible null-ptr-deref in ebu_nand_probe()
x86/speculation: Add missing prototype for unpriv_ebpf_notify()
ASoC: rk3328: fix disabling mclk on pclk probe failure
perf tools: Add missing headers needed by util/data.h
drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use after memory free during pm runtime resume
drm/msm/dp: stop event kernel thread when DP unbind
drm/msm/dp: fix error check return value of irq_of_parse_and_map()
drm/msm/dp: reset DP controller before transmit phy test pattern
drm/msm/dp: do not stop transmitting phy test pattern during DP phy compliance test
drm/msm/dsi: fix error checks and return values for DSI xmit functions
drm/msm/hdmi: check return value after calling platform_get_resource_byname()
drm/msm/hdmi: fix error check return value of irq_of_parse_and_map()
drm/msm: add missing include to msm_drv.c
drm/panel: panel-simple: Fix proper bpc for AM-1280800N3TZQW-T00H
kunit: fix debugfs code to use enum kunit_status, not bool
drm/rockchip: vop: fix possible null-ptr-deref in vop_bind()
spi: cadence-quadspi: fix Direct Access Mode disable for SoCFPGA
perf tools: Use Python devtools for version autodetection rather than runtime
virtio_blk: fix the discard_granularity and discard_alignment queue limits
nl80211: don't hold RTNL in color change request
x86: Fix return value of __setup handlers
irqchip/exiu: Fix acknowledgment of edge triggered interrupts
irqchip/aspeed-i2c-ic: Fix irq_of_parse_and_map() return value
irqchip/aspeed-scu-ic: Fix irq_of_parse_and_map() return value
x86/mm: Cleanup the control_va_addr_alignment() __setup handler
arm64: fix types in copy_highpage()
regulator: core: Fix enable_count imbalance with EXCLUSIVE_GET
drm/msm/dsi: fix address for second DSI PHY on SDM660
drm/msm/dp: fix event thread stuck in wait_event after kthread_stop()
drm/msm/mdp5: Return error code in mdp5_pipe_release when deadlock is detected
drm/msm/mdp5: Return error code in mdp5_mixer_release when deadlock is detected
drm/msm: return an error pointer in msm_gem_prime_get_sg_table()
media: uvcvideo: Fix missing check to determine if element is found in list
arm64: stackleak: fix current_top_of_stack()
iomap: iomap_write_failed fix
spi: spi-fsl-qspi: check return value after calling platform_get_resource_byname()
Revert "cpufreq: Fix possible race in cpufreq online error path"
regulator: qcom_smd: Fix up PM8950 regulator configuration
samples: bpf: Don't fail for a missing VMLINUX_BTF when VMLINUX_H is provided
perf/amd/ibs: Use interrupt regs ip for stack unwinding
ath11k: Don't check arvif->is_started before sending management frames
wilc1000: fix crash observed in AP mode with cfg80211_register_netdevice()
HID: amd_sfh: Modify the bus name
HID: amd_sfh: Modify the hid name
ASoC: fsl: Use dev_err_probe() helper
ASoC: fsl: Fix refcount leak in imx_sgtl5000_probe
ASoC: imx-hdmi: Fix refcount leak in imx_hdmi_probe
ASoC: mxs-saif: Fix refcount leak in mxs_saif_probe
regulator: pfuze100: Fix refcount leak in pfuze_parse_regulators_dt
dma-direct: factor out a helper for DMA_ATTR_NO_KERNEL_MAPPING allocations
dma-direct: don't fail on highmem CMA pages in dma_direct_alloc_pages
ASoC: samsung: Use dev_err_probe() helper
ASoC: samsung: Fix refcount leak in aries_audio_probe
block: Fix the bio.bi_opf comment
kselftest/cgroup: fix test_stress.sh to use OUTPUT dir
scripts/faddr2line: Fix overlapping text section failures
media: aspeed: Fix an error handling path in aspeed_video_probe()
media: exynos4-is: Fix PM disable depth imbalance in fimc_is_probe
mt76: mt7921: Fix the error handling path of mt7921_pci_probe()
mt76: do not attempt to reorder received 802.3 packets without agg session
media: st-delta: Fix PM disable depth imbalance in delta_probe
media: atmel: atmel-isc: Fix PM disable depth imbalance in atmel_isc_probe
media: i2c: rdacm2x: properly set subdev entity function
media: exynos4-is: Change clk_disable to clk_disable_unprepare
media: pvrusb2: fix array-index-out-of-bounds in pvr2_i2c_core_init
media: vsp1: Fix offset calculation for plane cropping
media: atmel: atmel-sama5d2-isc: fix wrong mask in YUYV format check
media: hantro: HEVC: Fix tile info buffer value computation
Bluetooth: fix dangling sco_conn and use-after-free in sco_sock_timeout
Bluetooth: use hdev lock in activate_scan for hci_is_adv_monitoring
Bluetooth: use hdev lock for accept_list and reject_list in conn req
nvme: set dma alignment to dword
m68k: math-emu: Fix dependencies of math emulation support
sctp: read sk->sk_bound_dev_if once in sctp_rcv()
net: hinic: add missing destroy_workqueue in hinic_pf_to_mgmt_init
ASoC: ti: j721e-evm: Fix refcount leak in j721e_soc_probe_*
kselftest/arm64: bti: force static linking
media: ov7670: remove ov7670_power_off from ov7670_remove
media: i2c: ov5648: fix wrong pointer passed to IS_ERR() and PTR_ERR()
media: staging: media: rkvdec: Make use of the helper function devm_platform_ioremap_resource()
media: rkvdec: h264: Fix dpb_valid implementation
media: rkvdec: h264: Fix bit depth wrap in pps packet
regulator: scmi: Fix refcount leak in scmi_regulator_probe
ext4: reject the 'commit' option on ext2 filesystems
drm/msm/a6xx: Fix refcount leak in a6xx_gpu_init
drm: msm: fix possible memory leak in mdp5_crtc_cursor_set()
x86/sev: Annotate stack change in the #VC handler
drm/msm: don't free the IRQ if it was not requested
selftests/bpf: Add missed ima_setup.sh in Makefile
drm/msm/dpu: handle pm_runtime_get_sync() errors in bind path
drm/i915: Fix CFI violation with show_dynamic_id()
thermal/drivers/bcm2711: Don't clamp temperature at zero
thermal/drivers/broadcom: Fix potential NULL dereference in sr_thermal_probe
thermal/core: Fix memory leak in __thermal_cooling_device_register()
thermal/drivers/imx_sc_thermal: Fix refcount leak in imx_sc_thermal_probe
bfq: Relax waker detection for shared queues
bfq: Allow current waker to defend against a tentative one
ASoC: wm2000: fix missing clk_disable_unprepare() on error in wm2000_anc_transition()
PM: domains: Fix initialization of genpd's next_wakeup
net: macb: Fix PTP one step sync support
NFC: hci: fix sleep in atomic context bugs in nfc_hci_hcp_message_tx
ASoC: max98090: Move check for invalid values before casting in max98090_put_enab_tlv()
net: stmmac: selftests: Use kcalloc() instead of kzalloc()
net: stmmac: fix out-of-bounds access in a selftest
hv_netvsc: Fix potential dereference of NULL pointer
hwmon: (pmbus) Check PEC support before reading other registers
rxrpc: Fix listen() setting the bar too high for the prealloc rings
rxrpc: Don't try to resend the request if we're receiving the reply
rxrpc: Fix overlapping ACK accounting
rxrpc: Don't let ack.previousPacket regress
rxrpc: Fix decision on when to generate an IDLE ACK
net: huawei: hinic: Use devm_kcalloc() instead of devm_kzalloc()
hinic: Avoid some over memory allocation
net: dsa: restrict SMSC_LAN9303_I2C kconfig
net/smc: postpone sk_refcnt increment in connect()
dma-direct: factor out dma_set_{de,en}crypted helpers
dma-direct: don't call dma_set_decrypted for remapped allocations
dma-direct: always leak memory that can't be re-encrypted
dma-direct: don't over-decrypt memory
arm64: dts: rockchip: Move drive-impedance-ohm to emmc phy on rk3399
arm64: dts: mt8192: Fix nor_flash status disable typo
PCI/ACPI: Allow D3 only if Root Port can signal and wake from D3
memory: samsung: exynos5422-dmc: Avoid some over memory allocation
ARM: dts: BCM5301X: update CRU block description
ARM: dts: BCM5301X: Update pin controller node name
ARM: dts: suniv: F1C100: fix watchdog compatible
soc: qcom: smp2p: Fix missing of_node_put() in smp2p_parse_ipc
soc: qcom: smsm: Fix missing of_node_put() in smsm_parse_ipc
PCI: cadence: Fix find_first_zero_bit() limit
PCI: rockchip: Fix find_first_zero_bit() limit
PCI: mediatek: Fix refcount leak in mtk_pcie_subsys_powerup()
PCI: dwc: Fix setting error return on MSI DMA mapping failure
ARM: dts: ci4x10: Adapt to changes in imx6qdl.dtsi regarding fec clocks
soc: qcom: llcc: Add MODULE_DEVICE_TABLE()
KVM: nVMX: Leave most VM-Exit info fields unmodified on failed VM-Entry
KVM: nVMX: Clear IDT vectoring on nested VM-Exit for double/triple fault
crypto: qat - set CIPHER capability for QAT GEN2
crypto: qat - set COMPRESSION capability for QAT GEN2
crypto: qat - set CIPHER capability for DH895XCC
crypto: qat - set COMPRESSION capability for DH895XCC
platform/chrome: cros_ec: fix error handling in cros_ec_register()
ARM: dts: imx6dl-colibri: Fix I2C pinmuxing
platform/chrome: Re-introduce cros_ec_cmd_xfer and use it for ioctls
can: xilinx_can: mark bit timing constants as const
ARM: dts: stm32: Fix PHY post-reset delay on Avenger96
ARM: dts: bcm2835-rpi-zero-w: Fix GPIO line name for Wifi/BT
ARM: dts: bcm2837-rpi-cm3-io3: Fix GPIO line names for SMPS I2C
ARM: dts: bcm2837-rpi-3-b-plus: Fix GPIO line name of power LED
ARM: dts: bcm2835-rpi-b: Fix GPIO line names
misc: ocxl: fix possible double free in ocxl_file_register_afu
crypto: marvell/cesa - ECB does not IV
gpiolib: of: Introduce hook for missing gpio-ranges
pinctrl: bcm2835: implement hook for missing gpio-ranges
arm: mediatek: select arch timer for mt7629
pinctrl/rockchip: support deferring other gpio params
pinctrl: mediatek: mt8195: enable driver on mtk platforms
arm64: dts: qcom: qrb5165-rb5: Fix can-clock node name
Drivers: hv: vmbus: Fix handling of messages with transaction ID of zero
powerpc/fadump: fix PT_LOAD segment for boot memory area
mfd: ipaq-micro: Fix error check return value of platform_get_irq()
scsi: fcoe: Fix Wstringop-overflow warnings in fcoe_wwn_from_mac()
soc: bcm: Check for NULL return of devm_kzalloc()
arm64: dts: ti: k3-am64-mcu: remove incorrect UART base clock rates
ASoC: sh: rz-ssi: Check return value of pm_runtime_resume_and_get()
ASoC: sh: rz-ssi: Propagate error codes returned from platform_get_irq_byname()
ASoC: sh: rz-ssi: Release the DMA channels in rz_ssi_probe() error path
firmware: arm_scmi: Fix list protocols enumeration in the base protocol
nvdimm: Fix firmware activation deadlock scenarios
nvdimm: Allow overwrite in the presence of disabled dimms
pinctrl: mvebu: Fix irq_of_parse_and_map() return value
drivers/base/node.c: fix compaction sysfs file leak
dax: fix cache flush on PMD-mapped pages
drivers/base/memory: fix an unlikely reference counting issue in __add_memory_block()
firmware: arm_ffa: Fix uuid parameter to ffa_partition_probe
firmware: arm_ffa: Remove incorrect assignment of driver_data
list: introduce list_is_head() helper and re-use it in list.h
list: fix a data-race around ep->rdllist
drm/msm/dpu: fix error check return value of irq_of_parse_and_map()
powerpc/8xx: export 'cpm_setbrg' for modules
pinctrl: renesas: r8a779a0: Fix GPIO function on I2C-capable pins
pinctrl: renesas: core: Fix possible null-ptr-deref in sh_pfc_map_resources()
powerpc/idle: Fix return value of __setup() handler
powerpc/4xx/cpm: Fix return value of __setup() handler
RDMA/hns: Add the detection for CMDQ status in the device initialization process
arm64: dts: marvell: espressobin-ultra: fix SPI-NOR config
arm64: dts: marvell: espressobin-ultra: enable front USB3 port
ASoC: atmel-pdmic: Remove endianness flag on pdmic component
ASoC: atmel-classd: Remove endianness flag on class d component
proc: fix dentry/inode overinstantiating under /proc/${pid}/net
ipc/mqueue: use get_tree_nodev() in mqueue_get_tree()
PCI: imx6: Fix PERST# start-up sequence
tty: fix deadlock caused by calling printk() under tty_port->lock
crypto: sun8i-ss - rework handling of IV
crypto: sun8i-ss - handle zero sized sg
crypto: cryptd - Protect per-CPU resource by disabling BH.
ARM: dts: at91: sama7g5: remove interrupt-parent from gic node
hugetlbfs: fix hugetlbfs_statfs() locking
Input: sparcspkr - fix refcount leak in bbc_beep_probe
PCI/AER: Clear MULTI_ERR_COR/UNCOR_RCV bits
PCI: microchip: Fix potential race in interrupt handling
hwrng: omap3-rom - fix using wrong clk_disable() in omap_rom_rng_runtime_resume()
powerpc/64: Only WARN if __pa()/__va() called with bad addresses
powerpc/perf: Fix the threshold compare group constraint for power10
powerpc/perf: Fix the threshold compare group constraint for power9
macintosh: via-pmu and via-cuda need RTC_LIB
powerpc/xive: Add some error handling code to 'xive_spapr_init()'
powerpc/xive: Fix refcount leak in xive_spapr_init
powerpc/fsl_rio: Fix refcount leak in fsl_rio_setup
mfd: davinci_voicecodec: Fix possible null-ptr-deref davinci_vc_probe()
nfsd: destroy percpu stats counters after reply cache shutdown
mailbox: forward the hrtimer if not queued and under a lock
RDMA/hfi1: Prevent use of lock before it is initialized
KVM: LAPIC: Drop pending LAPIC timer injection when canceling the timer
Input: stmfts - do not leave device disabled in stmfts_input_open
OPP: call of_node_put() on error path in _bandwidth_supported()
f2fs: support fault injection for dquot_initialize()
f2fs: fix to do sanity check on inline_dots inode
f2fs: fix dereference of stale list iterator after loop body
iommu/amd: Enable swiotlb in all cases
iommu/mediatek: Fix 2 HW sharing pgtable issue
iommu/mediatek: Add list_del in mtk_iommu_remove
iommu/mediatek: Remove clk_disable in mtk_iommu_remove
iommu/mediatek: Add mutex for m4u_group and m4u_dom in data
i2c: at91: use dma safe buffers
cpufreq: mediatek: Use module_init and add module_exit
cpufreq: mediatek: Unregister platform device on exit
iommu/arm-smmu-v3-sva: Fix mm use-after-free
MIPS: Loongson: Use hwmon_device_register_with_groups() to register hwmon
iommu/mediatek: Fix NULL pointer dereference when printing dev_name
i2c: at91: Initialize dma_buf in at91_twi_xfer()
dmaengine: idxd: Fix the error handling path in idxd_cdev_register()
NFS: Do not report EINTR/ERESTARTSYS as mapping errors
NFS: fsync() should report filesystem errors over EINTR/ERESTARTSYS
NFS: Don't report ENOSPC write errors twice
NFS: Do not report flush errors in nfs_write_end()
NFS: Don't report errors from nfs_pageio_complete() more than once
NFSv4/pNFS: Do not fail I/O when we fail to allocate the pNFS layout
NFS: Further fixes to the writeback error handling
video: fbdev: clcdfb: Fix refcount leak in clcdfb_of_vram_setup
dmaengine: stm32-mdma: remove GISR1 register
dmaengine: stm32-mdma: fix chan initialization in stm32_mdma_irq_handler()
iommu/amd: Increase timeout waiting for GA log enablement
i2c: npcm: Fix timeout calculation
i2c: npcm: Correct register access width
i2c: npcm: Handle spurious interrupts
i2c: rcar: fix PM ref counts in probe error paths
perf build: Fix btf__load_from_kernel_by_id() feature check
perf c2c: Use stdio interface if slang is not supported
perf jevents: Fix event syntax error caused by ExtSel
video: fbdev: vesafb: Fix a use-after-free due early fb_info cleanup
NFS: Always initialise fattr->label in nfs_fattr_alloc()
NFS: Create a new nfs_alloc_fattr_with_label() function
NFS: Convert GFP_NOFS to GFP_KERNEL
NFSv4.1 mark qualified async operations as MOVEABLE tasks
f2fs: fix to avoid f2fs_bug_on() in dec_valid_node_count()
f2fs: fix to do sanity check on block address in f2fs_do_zero_range()
f2fs: fix to clear dirty inode in f2fs_evict_inode()
f2fs: fix deadloop in foreground GC
f2fs: don't need inode lock for system hidden quota
f2fs: fix to do sanity check on total_data_blocks
f2fs: don't use casefolded comparison for "." and ".."
f2fs: fix fallocate to use file_modified to update permissions consistently
f2fs: fix to do sanity check for inline inode
objtool: Fix objtool regression on x32 systems
objtool: Fix symbol creation
wifi: mac80211: fix use-after-free in chanctx code
iwlwifi: mvm: fix assert 1F04 upon reconfig
fs-writeback: writeback_sb_inodes:Recalculate 'wrote' according skipped pages
efi: Do not import certificates from UEFI Secure Boot for T2 Macs
bfq: Avoid false marking of bic as stably merged
bfq: Avoid merging queues with different parents
bfq: Split shared queues on move between cgroups
bfq: Update cgroup information before merging bio
bfq: Drop pointless unlock-lock pair
bfq: Remove pointless bfq_init_rq() calls
bfq: Track whether bfq_group is still online
bfq: Get rid of __bio_blkcg() usage
bfq: Make sure bfqg for which we are queueing requests is online
ext4: mark group as trimmed only if it was fully scanned
ext4: fix use-after-free in ext4_rename_dir_prepare
ext4: fix race condition between ext4_write and ext4_convert_inline_data
ext4: fix warning in ext4_handle_inode_extension
ext4: fix bug_on in ext4_writepages
ext4: filter out EXT4_FC_REPLAY from on-disk superblock field s_state
ext4: fix bug_on in __es_tree_search
ext4: verify dir block before splitting it
ext4: avoid cycles in directory h-tree
ACPI: property: Release subnode properties with data nodes
tty: goldfish: Introduce gf_ioread32()/gf_iowrite32()
tracing: Fix potential double free in create_var_ref()
tracing: Initialize integer variable to prevent garbage return value
drm/amdgpu: add beige goby PCI ID
PCI/PM: Fix bridge_d3_blacklist[] Elo i2 overwrite of Gigabyte X299
PCI: qcom: Fix runtime PM imbalance on probe errors
PCI: qcom: Fix unbalanced PHY init on probe errors
staging: r8188eu: prevent ->Ssid overflow in rtw_wx_set_scan()
mm, compaction: fast_find_migrateblock() should return pfn in the target zone
s390/perf: obtain sie_block from the right address
s390/stp: clock_delta should be signed
dlm: fix plock invalid read
dlm: uninitialized variable on error in dlm_listen_for_all()
dlm: fix missing lkb refcount handling
ocfs2: dlmfs: fix error handling of user_dlm_destroy_lock
scsi: dc395x: Fix a missing check on list iterator
scsi: ufs: qcom: Add a readl() to make sure ref_clk gets enabled
landlock: Add clang-format exceptions
landlock: Format with clang-format
selftests/landlock: Add clang-format exceptions
selftests/landlock: Normalize array assignment
selftests/landlock: Format with clang-format
samples/landlock: Add clang-format exceptions
samples/landlock: Format with clang-format
landlock: Fix landlock_add_rule(2) documentation
selftests/landlock: Make tests build with old libc
selftests/landlock: Extend tests for minimal valid attribute size
selftests/landlock: Add tests for unknown access rights
selftests/landlock: Extend access right tests to directories
selftests/landlock: Fully test file rename with "remove" access
selftests/landlock: Add tests for O_PATH
landlock: Change landlock_add_rule(2) argument check ordering
landlock: Change landlock_restrict_self(2) check ordering
selftests/landlock: Test landlock_create_ruleset(2) argument check ordering
landlock: Define access_mask_t to enforce a consistent access mask size
landlock: Reduce the maximum number of layers to 16
landlock: Create find_rule() from unmask_layers()
landlock: Fix same-layer rule unions
drm/amdgpu/cs: make commands with 0 chunks illegal behaviour.
drm/nouveau/subdev/bus: Ratelimit logging for fault errors
drm/etnaviv: check for reaped mapping in etnaviv_iommu_unmap_gem
drm/nouveau/clk: Fix an incorrect NULL check on list iterator
drm/nouveau/kms/nv50-: atom: fix an incorrect NULL check on list iterator
drm/bridge: analogix_dp: Grab runtime PM reference for DP-AUX
drm/i915/dsi: fix VBT send packet port selection for ICL+
md: fix an incorrect NULL check in does_sb_need_changing
md: fix an incorrect NULL check in md_reload_sb
mtd: cfi_cmdset_0002: Move and rename chip_check/chip_ready/chip_good_for_write
mtd: cfi_cmdset_0002: Use chip_ready() for write on S29GL064N
media: coda: Fix reported H264 profile
media: coda: Add more H264 levels for CODA960
ima: remove the IMA_TEMPLATE Kconfig option
Kconfig: Add option for asm goto w/ tied outputs to workaround clang-13 bug
RDMA/hfi1: Fix potential integer multiplication overflow errors
mmc: core: Allows to override the timeout value for ioctl() path
csky: patch_text: Fixup last cpu should be master
irqchip/armada-370-xp: Do not touch Performance Counter Overflow on A375, A38x, A39x
irqchip: irq-xtensa-mx: fix initial IRQ affinity
thermal: devfreq_cooling: use local ops instead of global ops
cfg80211: declare MODULE_FIRMWARE for regulatory.db
mac80211: upgrade passive scan to active scan on DFS channels after beacon rx
um: Use asm-generic/dma-mapping.h
um: chan_user: Fix winch_tramp() return value
um: Fix out-of-bounds read in LDT setup
kexec_file: drop weak attribute from arch_kexec_apply_relocations[_add]
ftrace: Clean up hash direct_functions on register failures
ksmbd: fix outstanding credits related bugs
iommu/msm: Fix an incorrect NULL check on list iterator
iommu/dma: Fix iova map result check bug
Revert "mm/cma.c: remove redundant cma_mutex lock"
mm/page_alloc: always attempt to allocate at least one page during bulk allocation
nodemask.h: fix compilation error with GCC12
hugetlb: fix huge_pmd_unshare address update
mm/memremap: fix missing call to untrack_pfn() in pagemap_range()
xtensa/simdisk: fix proc_read_simdisk()
rtl818x: Prevent using not initialized queues
ASoC: rt5514: Fix event generation for "DSP Voice Wake Up" control
carl9170: tx: fix an incorrect use of list iterator
stm: ltdc: fix two incorrect NULL checks on list iterator
bcache: improve multithreaded bch_btree_check()
bcache: improve multithreaded bch_sectors_dirty_init()
bcache: remove incremental dirty sector counting for bch_sectors_dirty_init()
bcache: avoid journal no-space deadlock by reserving 1 journal bucket
serial: pch: don't overwrite xmit->buf[0] by x_char
tilcdc: tilcdc_external: fix an incorrect NULL check on list iterator
gma500: fix an incorrect NULL check on list iterator
arm64: dts: qcom: ipq8074: fix the sleep clock frequency
arm64: tegra: Add missing DFLL reset on Tegra210
clk: tegra: Add missing reset deassertion
phy: qcom-qmp: fix struct clk leak on probe errors
ARM: dts: s5pv210: Remove spi-cs-high on panel in Aries
ARM: pxa: maybe fix gpio lookup tables
SMB3: EBADF/EIO errors in rename/open caused by race condition in smb2_compound_op
docs/conf.py: Cope with removal of language=None in Sphinx 5.0.0
dt-bindings: gpio: altera: correct interrupt-cells
vdpasim: allow to enable a vq repeatedly
blk-iolatency: Fix inflight count imbalances and IO hangs on offline
coresight: core: Fix coresight device probe failure issue
phy: qcom-qmp: fix reset-controller leak on probe errors
net: ipa: fix page free in ipa_endpoint_trans_release()
net: ipa: fix page free in ipa_endpoint_replenish_one()
kseltest/cgroup: Make test_stress.sh work if run interactively
list: test: Add a test for list_is_head()
Revert "random: use static branch for crng_ready()"
staging: r8188eu: delete rtw_wx_read/write32()
RDMA/hns: Remove the num_cqc_timer variable
RDMA/rxe: Generate a completion for unsupported/invalid opcode
MIPS: IP27: Remove incorrect `cpu_has_fpu' override
MIPS: IP30: Remove incorrect `cpu_has_fpu' override
ext4: only allow test_dummy_encryption when supported
interconnect: qcom: sc7180: Drop IP0 interconnects
interconnect: qcom: icc-rpmh: Add BCMs to commit list in pre_aggregate
fs: add two trivial lookup helpers
exportfs: support idmapped mounts
fs/ntfs3: Fix invalid free in log_replay
md: Don't set mddev private to NULL in raid0 pers->free
md: fix double free of io_acct_set bioset
md: bcache: check the return value of kzalloc() in detached_dev_do_request()
pinctrl/rockchip: support setting input-enable param
block: fix bio_clone_blkg_association() to associate with proper blkcg_gq
Linux 5.15.46
Signed-off-by: Greg Kroah-Hartman <gregkh@google.com>
Change-Id: I7b65df29c22a01b81a94cd844867a18e73098a15
2296 lines
71 KiB
C
2296 lines
71 KiB
C
/* SPDX-License-Identifier: GPL-2.0-only */
|
|
/* Copyright (c) 2011-2014 PLUMgrid, http://plumgrid.com
|
|
*/
|
|
#ifndef _LINUX_BPF_H
|
|
#define _LINUX_BPF_H 1
|
|
|
|
#include <uapi/linux/bpf.h>
|
|
|
|
#include <linux/workqueue.h>
|
|
#include <linux/file.h>
|
|
#include <linux/percpu.h>
|
|
#include <linux/err.h>
|
|
#include <linux/rbtree_latch.h>
|
|
#include <linux/numa.h>
|
|
#include <linux/mm_types.h>
|
|
#include <linux/wait.h>
|
|
#include <linux/refcount.h>
|
|
#include <linux/mutex.h>
|
|
#include <linux/module.h>
|
|
#include <linux/kallsyms.h>
|
|
#include <linux/capability.h>
|
|
#include <linux/sched/mm.h>
|
|
#include <linux/slab.h>
|
|
#include <linux/percpu-refcount.h>
|
|
#include <linux/bpfptr.h>
|
|
#include <linux/android_kabi.h>
|
|
|
|
struct bpf_verifier_env;
|
|
struct bpf_verifier_log;
|
|
struct perf_event;
|
|
struct bpf_prog;
|
|
struct bpf_prog_aux;
|
|
struct bpf_map;
|
|
struct sock;
|
|
struct seq_file;
|
|
struct btf;
|
|
struct btf_type;
|
|
struct exception_table_entry;
|
|
struct seq_operations;
|
|
struct bpf_iter_aux_info;
|
|
struct bpf_local_storage;
|
|
struct bpf_local_storage_map;
|
|
struct kobject;
|
|
struct mem_cgroup;
|
|
struct module;
|
|
struct bpf_func_state;
|
|
|
|
extern struct idr btf_idr;
|
|
extern spinlock_t btf_idr_lock;
|
|
extern struct kobject *btf_kobj;
|
|
|
|
typedef int (*bpf_iter_init_seq_priv_t)(void *private_data,
|
|
struct bpf_iter_aux_info *aux);
|
|
typedef void (*bpf_iter_fini_seq_priv_t)(void *private_data);
|
|
struct bpf_iter_seq_info {
|
|
const struct seq_operations *seq_ops;
|
|
bpf_iter_init_seq_priv_t init_seq_private;
|
|
bpf_iter_fini_seq_priv_t fini_seq_private;
|
|
u32 seq_priv_size;
|
|
};
|
|
|
|
/* map is generic key/value storage optionally accessible by eBPF programs */
|
|
struct bpf_map_ops {
|
|
/* funcs callable from userspace (via syscall) */
|
|
int (*map_alloc_check)(union bpf_attr *attr);
|
|
struct bpf_map *(*map_alloc)(union bpf_attr *attr);
|
|
void (*map_release)(struct bpf_map *map, struct file *map_file);
|
|
void (*map_free)(struct bpf_map *map);
|
|
int (*map_get_next_key)(struct bpf_map *map, void *key, void *next_key);
|
|
void (*map_release_uref)(struct bpf_map *map);
|
|
void *(*map_lookup_elem_sys_only)(struct bpf_map *map, void *key);
|
|
int (*map_lookup_batch)(struct bpf_map *map, const union bpf_attr *attr,
|
|
union bpf_attr __user *uattr);
|
|
int (*map_lookup_and_delete_elem)(struct bpf_map *map, void *key,
|
|
void *value, u64 flags);
|
|
int (*map_lookup_and_delete_batch)(struct bpf_map *map,
|
|
const union bpf_attr *attr,
|
|
union bpf_attr __user *uattr);
|
|
int (*map_update_batch)(struct bpf_map *map, const union bpf_attr *attr,
|
|
union bpf_attr __user *uattr);
|
|
int (*map_delete_batch)(struct bpf_map *map, const union bpf_attr *attr,
|
|
union bpf_attr __user *uattr);
|
|
|
|
/* funcs callable from userspace and from eBPF programs */
|
|
void *(*map_lookup_elem)(struct bpf_map *map, void *key);
|
|
int (*map_update_elem)(struct bpf_map *map, void *key, void *value, u64 flags);
|
|
int (*map_delete_elem)(struct bpf_map *map, void *key);
|
|
int (*map_push_elem)(struct bpf_map *map, void *value, u64 flags);
|
|
int (*map_pop_elem)(struct bpf_map *map, void *value);
|
|
int (*map_peek_elem)(struct bpf_map *map, void *value);
|
|
|
|
/* funcs called by prog_array and perf_event_array map */
|
|
void *(*map_fd_get_ptr)(struct bpf_map *map, struct file *map_file,
|
|
int fd);
|
|
void (*map_fd_put_ptr)(void *ptr);
|
|
int (*map_gen_lookup)(struct bpf_map *map, struct bpf_insn *insn_buf);
|
|
u32 (*map_fd_sys_lookup_elem)(void *ptr);
|
|
void (*map_seq_show_elem)(struct bpf_map *map, void *key,
|
|
struct seq_file *m);
|
|
int (*map_check_btf)(const struct bpf_map *map,
|
|
const struct btf *btf,
|
|
const struct btf_type *key_type,
|
|
const struct btf_type *value_type);
|
|
|
|
/* Prog poke tracking helpers. */
|
|
int (*map_poke_track)(struct bpf_map *map, struct bpf_prog_aux *aux);
|
|
void (*map_poke_untrack)(struct bpf_map *map, struct bpf_prog_aux *aux);
|
|
void (*map_poke_run)(struct bpf_map *map, u32 key, struct bpf_prog *old,
|
|
struct bpf_prog *new);
|
|
|
|
/* Direct value access helpers. */
|
|
int (*map_direct_value_addr)(const struct bpf_map *map,
|
|
u64 *imm, u32 off);
|
|
int (*map_direct_value_meta)(const struct bpf_map *map,
|
|
u64 imm, u32 *off);
|
|
int (*map_mmap)(struct bpf_map *map, struct vm_area_struct *vma);
|
|
__poll_t (*map_poll)(struct bpf_map *map, struct file *filp,
|
|
struct poll_table_struct *pts);
|
|
|
|
/* Functions called by bpf_local_storage maps */
|
|
int (*map_local_storage_charge)(struct bpf_local_storage_map *smap,
|
|
void *owner, u32 size);
|
|
void (*map_local_storage_uncharge)(struct bpf_local_storage_map *smap,
|
|
void *owner, u32 size);
|
|
struct bpf_local_storage __rcu ** (*map_owner_storage_ptr)(void *owner);
|
|
|
|
/* Misc helpers.*/
|
|
int (*map_redirect)(struct bpf_map *map, u32 ifindex, u64 flags);
|
|
|
|
/* map_meta_equal must be implemented for maps that can be
|
|
* used as an inner map. It is a runtime check to ensure
|
|
* an inner map can be inserted to an outer map.
|
|
*
|
|
* Some properties of the inner map has been used during the
|
|
* verification time. When inserting an inner map at the runtime,
|
|
* map_meta_equal has to ensure the inserting map has the same
|
|
* properties that the verifier has used earlier.
|
|
*/
|
|
bool (*map_meta_equal)(const struct bpf_map *meta0,
|
|
const struct bpf_map *meta1);
|
|
|
|
|
|
int (*map_set_for_each_callback_args)(struct bpf_verifier_env *env,
|
|
struct bpf_func_state *caller,
|
|
struct bpf_func_state *callee);
|
|
int (*map_for_each_callback)(struct bpf_map *map, void *callback_fn,
|
|
void *callback_ctx, u64 flags);
|
|
|
|
/* BTF name and id of struct allocated by map_alloc */
|
|
const char * const map_btf_name;
|
|
int *map_btf_id;
|
|
|
|
/* bpf_iter info used to open a seq_file */
|
|
const struct bpf_iter_seq_info *iter_seq_info;
|
|
|
|
ANDROID_KABI_RESERVE(1);
|
|
ANDROID_KABI_RESERVE(2);
|
|
};
|
|
|
|
struct bpf_map {
|
|
/* The first two cachelines with read-mostly members of which some
|
|
* are also accessed in fast-path (e.g. ops, max_entries).
|
|
*/
|
|
const struct bpf_map_ops *ops ____cacheline_aligned;
|
|
struct bpf_map *inner_map_meta;
|
|
#ifdef CONFIG_SECURITY
|
|
void *security;
|
|
#endif
|
|
enum bpf_map_type map_type;
|
|
u32 key_size;
|
|
u32 value_size;
|
|
u32 max_entries;
|
|
u32 map_flags;
|
|
int spin_lock_off; /* >=0 valid offset, <0 error */
|
|
int timer_off; /* >=0 valid offset, <0 error */
|
|
u32 id;
|
|
int numa_node;
|
|
u32 btf_key_type_id;
|
|
u32 btf_value_type_id;
|
|
struct btf *btf;
|
|
#ifdef CONFIG_MEMCG_KMEM
|
|
struct mem_cgroup *memcg;
|
|
#endif
|
|
char name[BPF_OBJ_NAME_LEN];
|
|
u32 btf_vmlinux_value_type_id;
|
|
bool bypass_spec_v1;
|
|
bool frozen; /* write-once; write-protected by freeze_mutex */
|
|
/* 22 bytes hole */
|
|
|
|
/* The 3rd and 4th cacheline with misc members to avoid false sharing
|
|
* particularly with refcounting.
|
|
*/
|
|
atomic64_t refcnt ____cacheline_aligned;
|
|
atomic64_t usercnt;
|
|
struct work_struct work;
|
|
struct mutex freeze_mutex;
|
|
atomic64_t writecnt;
|
|
};
|
|
|
|
static inline bool map_value_has_spin_lock(const struct bpf_map *map)
|
|
{
|
|
return map->spin_lock_off >= 0;
|
|
}
|
|
|
|
static inline bool map_value_has_timer(const struct bpf_map *map)
|
|
{
|
|
return map->timer_off >= 0;
|
|
}
|
|
|
|
static inline void check_and_init_map_value(struct bpf_map *map, void *dst)
|
|
{
|
|
if (unlikely(map_value_has_spin_lock(map)))
|
|
memset(dst + map->spin_lock_off, 0, sizeof(struct bpf_spin_lock));
|
|
if (unlikely(map_value_has_timer(map)))
|
|
memset(dst + map->timer_off, 0, sizeof(struct bpf_timer));
|
|
}
|
|
|
|
/* copy everything but bpf_spin_lock and bpf_timer. There could be one of each. */
|
|
static inline void copy_map_value(struct bpf_map *map, void *dst, void *src)
|
|
{
|
|
u32 s_off = 0, s_sz = 0, t_off = 0, t_sz = 0;
|
|
|
|
if (unlikely(map_value_has_spin_lock(map))) {
|
|
s_off = map->spin_lock_off;
|
|
s_sz = sizeof(struct bpf_spin_lock);
|
|
}
|
|
if (unlikely(map_value_has_timer(map))) {
|
|
t_off = map->timer_off;
|
|
t_sz = sizeof(struct bpf_timer);
|
|
}
|
|
|
|
if (unlikely(s_sz || t_sz)) {
|
|
if (s_off < t_off || !s_sz) {
|
|
swap(s_off, t_off);
|
|
swap(s_sz, t_sz);
|
|
}
|
|
memcpy(dst, src, t_off);
|
|
memcpy(dst + t_off + t_sz,
|
|
src + t_off + t_sz,
|
|
s_off - t_off - t_sz);
|
|
memcpy(dst + s_off + s_sz,
|
|
src + s_off + s_sz,
|
|
map->value_size - s_off - s_sz);
|
|
} else {
|
|
memcpy(dst, src, map->value_size);
|
|
}
|
|
}
|
|
void copy_map_value_locked(struct bpf_map *map, void *dst, void *src,
|
|
bool lock_src);
|
|
void bpf_timer_cancel_and_free(void *timer);
|
|
int bpf_obj_name_cpy(char *dst, const char *src, unsigned int size);
|
|
|
|
struct bpf_offload_dev;
|
|
struct bpf_offloaded_map;
|
|
|
|
struct bpf_map_dev_ops {
|
|
int (*map_get_next_key)(struct bpf_offloaded_map *map,
|
|
void *key, void *next_key);
|
|
int (*map_lookup_elem)(struct bpf_offloaded_map *map,
|
|
void *key, void *value);
|
|
int (*map_update_elem)(struct bpf_offloaded_map *map,
|
|
void *key, void *value, u64 flags);
|
|
int (*map_delete_elem)(struct bpf_offloaded_map *map, void *key);
|
|
|
|
ANDROID_KABI_RESERVE(1);
|
|
};
|
|
|
|
struct bpf_offloaded_map {
|
|
struct bpf_map map;
|
|
struct net_device *netdev;
|
|
const struct bpf_map_dev_ops *dev_ops;
|
|
void *dev_priv;
|
|
struct list_head offloads;
|
|
};
|
|
|
|
static inline struct bpf_offloaded_map *map_to_offmap(struct bpf_map *map)
|
|
{
|
|
return container_of(map, struct bpf_offloaded_map, map);
|
|
}
|
|
|
|
static inline bool bpf_map_offload_neutral(const struct bpf_map *map)
|
|
{
|
|
return map->map_type == BPF_MAP_TYPE_PERF_EVENT_ARRAY;
|
|
}
|
|
|
|
static inline bool bpf_map_support_seq_show(const struct bpf_map *map)
|
|
{
|
|
return (map->btf_value_type_id || map->btf_vmlinux_value_type_id) &&
|
|
map->ops->map_seq_show_elem;
|
|
}
|
|
|
|
int map_check_no_btf(const struct bpf_map *map,
|
|
const struct btf *btf,
|
|
const struct btf_type *key_type,
|
|
const struct btf_type *value_type);
|
|
|
|
bool bpf_map_meta_equal(const struct bpf_map *meta0,
|
|
const struct bpf_map *meta1);
|
|
|
|
extern const struct bpf_map_ops bpf_map_offload_ops;
|
|
|
|
/* bpf_type_flag contains a set of flags that are applicable to the values of
|
|
* arg_type, ret_type and reg_type. For example, a pointer value may be null,
|
|
* or a memory is read-only. We classify types into two categories: base types
|
|
* and extended types. Extended types are base types combined with a type flag.
|
|
*
|
|
* Currently there are no more than 32 base types in arg_type, ret_type and
|
|
* reg_types.
|
|
*/
|
|
#define BPF_BASE_TYPE_BITS 8
|
|
|
|
enum bpf_type_flag {
|
|
/* PTR may be NULL. */
|
|
PTR_MAYBE_NULL = BIT(0 + BPF_BASE_TYPE_BITS),
|
|
|
|
/* MEM is read-only. When applied on bpf_arg, it indicates the arg is
|
|
* compatible with both mutable and immutable memory.
|
|
*/
|
|
MEM_RDONLY = BIT(1 + BPF_BASE_TYPE_BITS),
|
|
|
|
__BPF_TYPE_LAST_FLAG = MEM_RDONLY,
|
|
};
|
|
|
|
/* Max number of base types. */
|
|
#define BPF_BASE_TYPE_LIMIT (1UL << BPF_BASE_TYPE_BITS)
|
|
|
|
/* Max number of all types. */
|
|
#define BPF_TYPE_LIMIT (__BPF_TYPE_LAST_FLAG | (__BPF_TYPE_LAST_FLAG - 1))
|
|
|
|
/* function argument constraints */
|
|
enum bpf_arg_type {
|
|
ARG_DONTCARE = 0, /* unused argument in helper function */
|
|
|
|
/* the following constraints used to prototype
|
|
* bpf_map_lookup/update/delete_elem() functions
|
|
*/
|
|
ARG_CONST_MAP_PTR, /* const argument used as pointer to bpf_map */
|
|
ARG_PTR_TO_MAP_KEY, /* pointer to stack used as map key */
|
|
ARG_PTR_TO_MAP_VALUE, /* pointer to stack used as map value */
|
|
ARG_PTR_TO_UNINIT_MAP_VALUE, /* pointer to valid memory used to store a map value */
|
|
|
|
/* the following constraints used to prototype bpf_memcmp() and other
|
|
* functions that access data on eBPF program stack
|
|
*/
|
|
ARG_PTR_TO_MEM, /* pointer to valid memory (stack, packet, map value) */
|
|
ARG_PTR_TO_UNINIT_MEM, /* pointer to memory does not need to be initialized,
|
|
* helper function must fill all bytes or clear
|
|
* them in error case.
|
|
*/
|
|
|
|
ARG_CONST_SIZE, /* number of bytes accessed from memory */
|
|
ARG_CONST_SIZE_OR_ZERO, /* number of bytes accessed from memory or 0 */
|
|
|
|
ARG_PTR_TO_CTX, /* pointer to context */
|
|
ARG_ANYTHING, /* any (initialized) argument is ok */
|
|
ARG_PTR_TO_SPIN_LOCK, /* pointer to bpf_spin_lock */
|
|
ARG_PTR_TO_SOCK_COMMON, /* pointer to sock_common */
|
|
ARG_PTR_TO_INT, /* pointer to int */
|
|
ARG_PTR_TO_LONG, /* pointer to long */
|
|
ARG_PTR_TO_SOCKET, /* pointer to bpf_sock (fullsock) */
|
|
ARG_PTR_TO_BTF_ID, /* pointer to in-kernel struct */
|
|
ARG_PTR_TO_ALLOC_MEM, /* pointer to dynamically allocated memory */
|
|
ARG_CONST_ALLOC_SIZE_OR_ZERO, /* number of allocated bytes requested */
|
|
ARG_PTR_TO_BTF_ID_SOCK_COMMON, /* pointer to in-kernel sock_common or bpf-mirrored bpf_sock */
|
|
ARG_PTR_TO_PERCPU_BTF_ID, /* pointer to in-kernel percpu type */
|
|
ARG_PTR_TO_FUNC, /* pointer to a bpf program function */
|
|
ARG_PTR_TO_STACK, /* pointer to stack */
|
|
ARG_PTR_TO_CONST_STR, /* pointer to a null terminated read-only string */
|
|
ARG_PTR_TO_TIMER, /* pointer to bpf_timer */
|
|
__BPF_ARG_TYPE_MAX,
|
|
|
|
/* Extended arg_types. */
|
|
ARG_PTR_TO_MAP_VALUE_OR_NULL = PTR_MAYBE_NULL | ARG_PTR_TO_MAP_VALUE,
|
|
ARG_PTR_TO_MEM_OR_NULL = PTR_MAYBE_NULL | ARG_PTR_TO_MEM,
|
|
ARG_PTR_TO_CTX_OR_NULL = PTR_MAYBE_NULL | ARG_PTR_TO_CTX,
|
|
ARG_PTR_TO_SOCKET_OR_NULL = PTR_MAYBE_NULL | ARG_PTR_TO_SOCKET,
|
|
ARG_PTR_TO_ALLOC_MEM_OR_NULL = PTR_MAYBE_NULL | ARG_PTR_TO_ALLOC_MEM,
|
|
ARG_PTR_TO_STACK_OR_NULL = PTR_MAYBE_NULL | ARG_PTR_TO_STACK,
|
|
|
|
/* This must be the last entry. Its purpose is to ensure the enum is
|
|
* wide enough to hold the higher bits reserved for bpf_type_flag.
|
|
*/
|
|
__BPF_ARG_TYPE_LIMIT = BPF_TYPE_LIMIT,
|
|
};
|
|
static_assert(__BPF_ARG_TYPE_MAX <= BPF_BASE_TYPE_LIMIT);
|
|
|
|
/* type of values returned from helper functions */
|
|
enum bpf_return_type {
|
|
RET_INTEGER, /* function returns integer */
|
|
RET_VOID, /* function doesn't return anything */
|
|
RET_PTR_TO_MAP_VALUE, /* returns a pointer to map elem value */
|
|
RET_PTR_TO_SOCKET, /* returns a pointer to a socket */
|
|
RET_PTR_TO_TCP_SOCK, /* returns a pointer to a tcp_sock */
|
|
RET_PTR_TO_SOCK_COMMON, /* returns a pointer to a sock_common */
|
|
RET_PTR_TO_ALLOC_MEM, /* returns a pointer to dynamically allocated memory */
|
|
RET_PTR_TO_MEM_OR_BTF_ID, /* returns a pointer to a valid memory or a btf_id */
|
|
RET_PTR_TO_BTF_ID, /* returns a pointer to a btf_id */
|
|
__BPF_RET_TYPE_MAX,
|
|
|
|
/* Extended ret_types. */
|
|
RET_PTR_TO_MAP_VALUE_OR_NULL = PTR_MAYBE_NULL | RET_PTR_TO_MAP_VALUE,
|
|
RET_PTR_TO_SOCKET_OR_NULL = PTR_MAYBE_NULL | RET_PTR_TO_SOCKET,
|
|
RET_PTR_TO_TCP_SOCK_OR_NULL = PTR_MAYBE_NULL | RET_PTR_TO_TCP_SOCK,
|
|
RET_PTR_TO_SOCK_COMMON_OR_NULL = PTR_MAYBE_NULL | RET_PTR_TO_SOCK_COMMON,
|
|
RET_PTR_TO_ALLOC_MEM_OR_NULL = PTR_MAYBE_NULL | RET_PTR_TO_ALLOC_MEM,
|
|
RET_PTR_TO_BTF_ID_OR_NULL = PTR_MAYBE_NULL | RET_PTR_TO_BTF_ID,
|
|
|
|
/* This must be the last entry. Its purpose is to ensure the enum is
|
|
* wide enough to hold the higher bits reserved for bpf_type_flag.
|
|
*/
|
|
__BPF_RET_TYPE_LIMIT = BPF_TYPE_LIMIT,
|
|
};
|
|
static_assert(__BPF_RET_TYPE_MAX <= BPF_BASE_TYPE_LIMIT);
|
|
|
|
/* eBPF function prototype used by verifier to allow BPF_CALLs from eBPF programs
|
|
* to in-kernel helper functions and for adjusting imm32 field in BPF_CALL
|
|
* instructions after verifying
|
|
*/
|
|
struct bpf_func_proto {
|
|
u64 (*func)(u64 r1, u64 r2, u64 r3, u64 r4, u64 r5);
|
|
bool gpl_only;
|
|
bool pkt_access;
|
|
enum bpf_return_type ret_type;
|
|
union {
|
|
struct {
|
|
enum bpf_arg_type arg1_type;
|
|
enum bpf_arg_type arg2_type;
|
|
enum bpf_arg_type arg3_type;
|
|
enum bpf_arg_type arg4_type;
|
|
enum bpf_arg_type arg5_type;
|
|
};
|
|
enum bpf_arg_type arg_type[5];
|
|
};
|
|
union {
|
|
struct {
|
|
u32 *arg1_btf_id;
|
|
u32 *arg2_btf_id;
|
|
u32 *arg3_btf_id;
|
|
u32 *arg4_btf_id;
|
|
u32 *arg5_btf_id;
|
|
};
|
|
u32 *arg_btf_id[5];
|
|
};
|
|
int *ret_btf_id; /* return value btf_id */
|
|
bool (*allowed)(const struct bpf_prog *prog);
|
|
};
|
|
|
|
/* bpf_context is intentionally undefined structure. Pointer to bpf_context is
|
|
* the first argument to eBPF programs.
|
|
* For socket filters: 'struct bpf_context *' == 'struct sk_buff *'
|
|
*/
|
|
struct bpf_context;
|
|
|
|
enum bpf_access_type {
|
|
BPF_READ = 1,
|
|
BPF_WRITE = 2
|
|
};
|
|
|
|
/* types of values stored in eBPF registers */
|
|
/* Pointer types represent:
|
|
* pointer
|
|
* pointer + imm
|
|
* pointer + (u16) var
|
|
* pointer + (u16) var + imm
|
|
* if (range > 0) then [ptr, ptr + range - off) is safe to access
|
|
* if (id > 0) means that some 'var' was added
|
|
* if (off > 0) means that 'imm' was added
|
|
*/
|
|
enum bpf_reg_type {
|
|
NOT_INIT = 0, /* nothing was written into register */
|
|
SCALAR_VALUE, /* reg doesn't contain a valid pointer */
|
|
PTR_TO_CTX, /* reg points to bpf_context */
|
|
CONST_PTR_TO_MAP, /* reg points to struct bpf_map */
|
|
PTR_TO_MAP_VALUE, /* reg points to map element value */
|
|
PTR_TO_MAP_KEY, /* reg points to a map element key */
|
|
PTR_TO_STACK, /* reg == frame_pointer + offset */
|
|
PTR_TO_PACKET_META, /* skb->data - meta_len */
|
|
PTR_TO_PACKET, /* reg points to skb->data */
|
|
PTR_TO_PACKET_END, /* skb->data + headlen */
|
|
PTR_TO_FLOW_KEYS, /* reg points to bpf_flow_keys */
|
|
PTR_TO_SOCKET, /* reg points to struct bpf_sock */
|
|
PTR_TO_SOCK_COMMON, /* reg points to sock_common */
|
|
PTR_TO_TCP_SOCK, /* reg points to struct tcp_sock */
|
|
PTR_TO_TP_BUFFER, /* reg points to a writable raw tp's buffer */
|
|
PTR_TO_XDP_SOCK, /* reg points to struct xdp_sock */
|
|
/* PTR_TO_BTF_ID points to a kernel struct that does not need
|
|
* to be null checked by the BPF program. This does not imply the
|
|
* pointer is _not_ null and in practice this can easily be a null
|
|
* pointer when reading pointer chains. The assumption is program
|
|
* context will handle null pointer dereference typically via fault
|
|
* handling. The verifier must keep this in mind and can make no
|
|
* assumptions about null or non-null when doing branch analysis.
|
|
* Further, when passed into helpers the helpers can not, without
|
|
* additional context, assume the value is non-null.
|
|
*/
|
|
PTR_TO_BTF_ID,
|
|
/* PTR_TO_BTF_ID_OR_NULL points to a kernel struct that has not
|
|
* been checked for null. Used primarily to inform the verifier
|
|
* an explicit null check is required for this struct.
|
|
*/
|
|
PTR_TO_MEM, /* reg points to valid memory region */
|
|
PTR_TO_BUF, /* reg points to a read/write buffer */
|
|
PTR_TO_PERCPU_BTF_ID, /* reg points to a percpu kernel variable */
|
|
PTR_TO_FUNC, /* reg points to a bpf program function */
|
|
__BPF_REG_TYPE_MAX,
|
|
|
|
/* Extended reg_types. */
|
|
PTR_TO_MAP_VALUE_OR_NULL = PTR_MAYBE_NULL | PTR_TO_MAP_VALUE,
|
|
PTR_TO_SOCKET_OR_NULL = PTR_MAYBE_NULL | PTR_TO_SOCKET,
|
|
PTR_TO_SOCK_COMMON_OR_NULL = PTR_MAYBE_NULL | PTR_TO_SOCK_COMMON,
|
|
PTR_TO_TCP_SOCK_OR_NULL = PTR_MAYBE_NULL | PTR_TO_TCP_SOCK,
|
|
PTR_TO_BTF_ID_OR_NULL = PTR_MAYBE_NULL | PTR_TO_BTF_ID,
|
|
|
|
/* This must be the last entry. Its purpose is to ensure the enum is
|
|
* wide enough to hold the higher bits reserved for bpf_type_flag.
|
|
*/
|
|
__BPF_REG_TYPE_LIMIT = BPF_TYPE_LIMIT,
|
|
};
|
|
static_assert(__BPF_REG_TYPE_MAX <= BPF_BASE_TYPE_LIMIT);
|
|
|
|
/* The information passed from prog-specific *_is_valid_access
|
|
* back to the verifier.
|
|
*/
|
|
struct bpf_insn_access_aux {
|
|
enum bpf_reg_type reg_type;
|
|
union {
|
|
int ctx_field_size;
|
|
struct {
|
|
struct btf *btf;
|
|
u32 btf_id;
|
|
};
|
|
};
|
|
struct bpf_verifier_log *log; /* for verbose logs */
|
|
};
|
|
|
|
static inline void
|
|
bpf_ctx_record_field_size(struct bpf_insn_access_aux *aux, u32 size)
|
|
{
|
|
aux->ctx_field_size = size;
|
|
}
|
|
|
|
struct bpf_prog_ops {
|
|
int (*test_run)(struct bpf_prog *prog, const union bpf_attr *kattr,
|
|
union bpf_attr __user *uattr);
|
|
};
|
|
|
|
struct bpf_verifier_ops {
|
|
/* return eBPF function prototype for verification */
|
|
const struct bpf_func_proto *
|
|
(*get_func_proto)(enum bpf_func_id func_id,
|
|
const struct bpf_prog *prog);
|
|
|
|
/* return true if 'size' wide access at offset 'off' within bpf_context
|
|
* with 'type' (read or write) is allowed
|
|
*/
|
|
bool (*is_valid_access)(int off, int size, enum bpf_access_type type,
|
|
const struct bpf_prog *prog,
|
|
struct bpf_insn_access_aux *info);
|
|
int (*gen_prologue)(struct bpf_insn *insn, bool direct_write,
|
|
const struct bpf_prog *prog);
|
|
int (*gen_ld_abs)(const struct bpf_insn *orig,
|
|
struct bpf_insn *insn_buf);
|
|
u32 (*convert_ctx_access)(enum bpf_access_type type,
|
|
const struct bpf_insn *src,
|
|
struct bpf_insn *dst,
|
|
struct bpf_prog *prog, u32 *target_size);
|
|
int (*btf_struct_access)(struct bpf_verifier_log *log,
|
|
const struct btf *btf,
|
|
const struct btf_type *t, int off, int size,
|
|
enum bpf_access_type atype,
|
|
u32 *next_btf_id);
|
|
bool (*check_kfunc_call)(u32 kfunc_btf_id);
|
|
ANDROID_KABI_RESERVE(1);
|
|
};
|
|
|
|
struct bpf_prog_offload_ops {
|
|
/* verifier basic callbacks */
|
|
int (*insn_hook)(struct bpf_verifier_env *env,
|
|
int insn_idx, int prev_insn_idx);
|
|
int (*finalize)(struct bpf_verifier_env *env);
|
|
/* verifier optimization callbacks (called after .finalize) */
|
|
int (*replace_insn)(struct bpf_verifier_env *env, u32 off,
|
|
struct bpf_insn *insn);
|
|
int (*remove_insns)(struct bpf_verifier_env *env, u32 off, u32 cnt);
|
|
/* program management callbacks */
|
|
int (*prepare)(struct bpf_prog *prog);
|
|
int (*translate)(struct bpf_prog *prog);
|
|
void (*destroy)(struct bpf_prog *prog);
|
|
ANDROID_KABI_RESERVE(1);
|
|
};
|
|
|
|
struct bpf_prog_offload {
|
|
struct bpf_prog *prog;
|
|
struct net_device *netdev;
|
|
struct bpf_offload_dev *offdev;
|
|
void *dev_priv;
|
|
struct list_head offloads;
|
|
bool dev_state;
|
|
bool opt_failed;
|
|
void *jited_image;
|
|
u32 jited_len;
|
|
ANDROID_KABI_RESERVE(1);
|
|
};
|
|
|
|
enum bpf_cgroup_storage_type {
|
|
BPF_CGROUP_STORAGE_SHARED,
|
|
BPF_CGROUP_STORAGE_PERCPU,
|
|
__BPF_CGROUP_STORAGE_MAX
|
|
};
|
|
|
|
#define MAX_BPF_CGROUP_STORAGE_TYPE __BPF_CGROUP_STORAGE_MAX
|
|
|
|
/* The longest tracepoint has 12 args.
|
|
* See include/trace/bpf_probe.h
|
|
*/
|
|
#define MAX_BPF_FUNC_ARGS 12
|
|
|
|
/* The maximum number of arguments passed through registers
|
|
* a single function may have.
|
|
*/
|
|
#define MAX_BPF_FUNC_REG_ARGS 5
|
|
|
|
struct btf_func_model {
|
|
u8 ret_size;
|
|
u8 nr_args;
|
|
u8 arg_size[MAX_BPF_FUNC_ARGS];
|
|
};
|
|
|
|
/* Restore arguments before returning from trampoline to let original function
|
|
* continue executing. This flag is used for fentry progs when there are no
|
|
* fexit progs.
|
|
*/
|
|
#define BPF_TRAMP_F_RESTORE_REGS BIT(0)
|
|
/* Call original function after fentry progs, but before fexit progs.
|
|
* Makes sense for fentry/fexit, normal calls and indirect calls.
|
|
*/
|
|
#define BPF_TRAMP_F_CALL_ORIG BIT(1)
|
|
/* Skip current frame and return to parent. Makes sense for fentry/fexit
|
|
* programs only. Should not be used with normal calls and indirect calls.
|
|
*/
|
|
#define BPF_TRAMP_F_SKIP_FRAME BIT(2)
|
|
/* Store IP address of the caller on the trampoline stack,
|
|
* so it's available for trampoline's programs.
|
|
*/
|
|
#define BPF_TRAMP_F_IP_ARG BIT(3)
|
|
/* Return the return value of fentry prog. Only used by bpf_struct_ops. */
|
|
#define BPF_TRAMP_F_RET_FENTRY_RET BIT(4)
|
|
|
|
/* Each call __bpf_prog_enter + call bpf_func + call __bpf_prog_exit is ~50
|
|
* bytes on x86. Pick a number to fit into BPF_IMAGE_SIZE / 2
|
|
*/
|
|
#define BPF_MAX_TRAMP_PROGS 38
|
|
|
|
struct bpf_tramp_progs {
|
|
struct bpf_prog *progs[BPF_MAX_TRAMP_PROGS];
|
|
int nr_progs;
|
|
};
|
|
|
|
/* Different use cases for BPF trampoline:
|
|
* 1. replace nop at the function entry (kprobe equivalent)
|
|
* flags = BPF_TRAMP_F_RESTORE_REGS
|
|
* fentry = a set of programs to run before returning from trampoline
|
|
*
|
|
* 2. replace nop at the function entry (kprobe + kretprobe equivalent)
|
|
* flags = BPF_TRAMP_F_CALL_ORIG | BPF_TRAMP_F_SKIP_FRAME
|
|
* orig_call = fentry_ip + MCOUNT_INSN_SIZE
|
|
* fentry = a set of program to run before calling original function
|
|
* fexit = a set of program to run after original function
|
|
*
|
|
* 3. replace direct call instruction anywhere in the function body
|
|
* or assign a function pointer for indirect call (like tcp_congestion_ops->cong_avoid)
|
|
* With flags = 0
|
|
* fentry = a set of programs to run before returning from trampoline
|
|
* With flags = BPF_TRAMP_F_CALL_ORIG
|
|
* orig_call = original callback addr or direct function addr
|
|
* fentry = a set of program to run before calling original function
|
|
* fexit = a set of program to run after original function
|
|
*/
|
|
struct bpf_tramp_image;
|
|
int arch_prepare_bpf_trampoline(struct bpf_tramp_image *tr, void *image, void *image_end,
|
|
const struct btf_func_model *m, u32 flags,
|
|
struct bpf_tramp_progs *tprogs,
|
|
void *orig_call);
|
|
/* these two functions are called from generated trampoline */
|
|
u64 notrace __bpf_prog_enter(struct bpf_prog *prog);
|
|
void notrace __bpf_prog_exit(struct bpf_prog *prog, u64 start);
|
|
u64 notrace __bpf_prog_enter_sleepable(struct bpf_prog *prog);
|
|
void notrace __bpf_prog_exit_sleepable(struct bpf_prog *prog, u64 start);
|
|
void notrace __bpf_tramp_enter(struct bpf_tramp_image *tr);
|
|
void notrace __bpf_tramp_exit(struct bpf_tramp_image *tr);
|
|
|
|
struct bpf_ksym {
|
|
unsigned long start;
|
|
unsigned long end;
|
|
char name[KSYM_NAME_LEN];
|
|
struct list_head lnode;
|
|
struct latch_tree_node tnode;
|
|
bool prog;
|
|
};
|
|
|
|
enum bpf_tramp_prog_type {
|
|
BPF_TRAMP_FENTRY,
|
|
BPF_TRAMP_FEXIT,
|
|
BPF_TRAMP_MODIFY_RETURN,
|
|
BPF_TRAMP_MAX,
|
|
BPF_TRAMP_REPLACE, /* more than MAX */
|
|
};
|
|
|
|
struct bpf_tramp_image {
|
|
void *image;
|
|
struct bpf_ksym ksym;
|
|
struct percpu_ref pcref;
|
|
void *ip_after_call;
|
|
void *ip_epilogue;
|
|
union {
|
|
struct rcu_head rcu;
|
|
struct work_struct work;
|
|
};
|
|
};
|
|
|
|
struct bpf_trampoline {
|
|
/* hlist for trampoline_table */
|
|
struct hlist_node hlist;
|
|
/* serializes access to fields of this trampoline */
|
|
struct mutex mutex;
|
|
refcount_t refcnt;
|
|
u64 key;
|
|
struct {
|
|
struct btf_func_model model;
|
|
void *addr;
|
|
bool ftrace_managed;
|
|
} func;
|
|
/* if !NULL this is BPF_PROG_TYPE_EXT program that extends another BPF
|
|
* program by replacing one of its functions. func.addr is the address
|
|
* of the function it replaced.
|
|
*/
|
|
struct bpf_prog *extension_prog;
|
|
/* list of BPF programs using this trampoline */
|
|
struct hlist_head progs_hlist[BPF_TRAMP_MAX];
|
|
/* Number of attached programs. A counter per kind. */
|
|
int progs_cnt[BPF_TRAMP_MAX];
|
|
/* Executable image of trampoline */
|
|
struct bpf_tramp_image *cur_image;
|
|
u64 selector;
|
|
struct module *mod;
|
|
};
|
|
|
|
struct bpf_attach_target_info {
|
|
struct btf_func_model fmodel;
|
|
long tgt_addr;
|
|
const char *tgt_name;
|
|
const struct btf_type *tgt_type;
|
|
};
|
|
|
|
#define BPF_DISPATCHER_MAX 48 /* Fits in 2048B */
|
|
|
|
struct bpf_dispatcher_prog {
|
|
struct bpf_prog *prog;
|
|
refcount_t users;
|
|
};
|
|
|
|
struct bpf_dispatcher {
|
|
/* dispatcher mutex */
|
|
struct mutex mutex;
|
|
void *func;
|
|
struct bpf_dispatcher_prog progs[BPF_DISPATCHER_MAX];
|
|
int num_progs;
|
|
void *image;
|
|
u32 image_off;
|
|
struct bpf_ksym ksym;
|
|
};
|
|
|
|
static __always_inline __nocfi unsigned int bpf_dispatcher_nop_func(
|
|
const void *ctx,
|
|
const struct bpf_insn *insnsi,
|
|
unsigned int (*bpf_func)(const void *,
|
|
const struct bpf_insn *))
|
|
{
|
|
return bpf_func(ctx, insnsi);
|
|
}
|
|
#ifdef CONFIG_BPF_JIT
|
|
int bpf_trampoline_link_prog(struct bpf_prog *prog, struct bpf_trampoline *tr);
|
|
int bpf_trampoline_unlink_prog(struct bpf_prog *prog, struct bpf_trampoline *tr);
|
|
struct bpf_trampoline *bpf_trampoline_get(u64 key,
|
|
struct bpf_attach_target_info *tgt_info);
|
|
void bpf_trampoline_put(struct bpf_trampoline *tr);
|
|
int arch_prepare_bpf_dispatcher(void *image, s64 *funcs, int num_funcs);
|
|
#define BPF_DISPATCHER_INIT(_name) { \
|
|
.mutex = __MUTEX_INITIALIZER(_name.mutex), \
|
|
.func = &_name##_func, \
|
|
.progs = {}, \
|
|
.num_progs = 0, \
|
|
.image = NULL, \
|
|
.image_off = 0, \
|
|
.ksym = { \
|
|
.name = #_name, \
|
|
.lnode = LIST_HEAD_INIT(_name.ksym.lnode), \
|
|
}, \
|
|
}
|
|
|
|
#define DEFINE_BPF_DISPATCHER(name) \
|
|
noinline __nocfi unsigned int bpf_dispatcher_##name##_func( \
|
|
const void *ctx, \
|
|
const struct bpf_insn *insnsi, \
|
|
unsigned int (*bpf_func)(const void *, \
|
|
const struct bpf_insn *)) \
|
|
{ \
|
|
return bpf_func(ctx, insnsi); \
|
|
} \
|
|
EXPORT_SYMBOL(bpf_dispatcher_##name##_func); \
|
|
struct bpf_dispatcher bpf_dispatcher_##name = \
|
|
BPF_DISPATCHER_INIT(bpf_dispatcher_##name);
|
|
#define DECLARE_BPF_DISPATCHER(name) \
|
|
unsigned int bpf_dispatcher_##name##_func( \
|
|
const void *ctx, \
|
|
const struct bpf_insn *insnsi, \
|
|
unsigned int (*bpf_func)(const void *, \
|
|
const struct bpf_insn *)); \
|
|
extern struct bpf_dispatcher bpf_dispatcher_##name;
|
|
#define BPF_DISPATCHER_FUNC(name) bpf_dispatcher_##name##_func
|
|
#define BPF_DISPATCHER_PTR(name) (&bpf_dispatcher_##name)
|
|
void bpf_dispatcher_change_prog(struct bpf_dispatcher *d, struct bpf_prog *from,
|
|
struct bpf_prog *to);
|
|
/* Called only from JIT-enabled code, so there's no need for stubs. */
|
|
void *bpf_jit_alloc_exec_page(void);
|
|
void bpf_image_ksym_add(void *data, struct bpf_ksym *ksym);
|
|
void bpf_image_ksym_del(struct bpf_ksym *ksym);
|
|
void bpf_ksym_add(struct bpf_ksym *ksym);
|
|
void bpf_ksym_del(struct bpf_ksym *ksym);
|
|
int bpf_jit_charge_modmem(u32 pages);
|
|
void bpf_jit_uncharge_modmem(u32 pages);
|
|
#else
|
|
static inline int bpf_trampoline_link_prog(struct bpf_prog *prog,
|
|
struct bpf_trampoline *tr)
|
|
{
|
|
return -ENOTSUPP;
|
|
}
|
|
static inline int bpf_trampoline_unlink_prog(struct bpf_prog *prog,
|
|
struct bpf_trampoline *tr)
|
|
{
|
|
return -ENOTSUPP;
|
|
}
|
|
static inline struct bpf_trampoline *bpf_trampoline_get(u64 key,
|
|
struct bpf_attach_target_info *tgt_info)
|
|
{
|
|
return ERR_PTR(-EOPNOTSUPP);
|
|
}
|
|
static inline void bpf_trampoline_put(struct bpf_trampoline *tr) {}
|
|
#define DEFINE_BPF_DISPATCHER(name)
|
|
#define DECLARE_BPF_DISPATCHER(name)
|
|
#define BPF_DISPATCHER_FUNC(name) bpf_dispatcher_nop_func
|
|
#define BPF_DISPATCHER_PTR(name) NULL
|
|
static inline void bpf_dispatcher_change_prog(struct bpf_dispatcher *d,
|
|
struct bpf_prog *from,
|
|
struct bpf_prog *to) {}
|
|
static inline bool is_bpf_image_address(unsigned long address)
|
|
{
|
|
return false;
|
|
}
|
|
#endif
|
|
|
|
struct bpf_func_info_aux {
|
|
u16 linkage;
|
|
bool unreliable;
|
|
};
|
|
|
|
enum bpf_jit_poke_reason {
|
|
BPF_POKE_REASON_TAIL_CALL,
|
|
};
|
|
|
|
/* Descriptor of pokes pointing /into/ the JITed image. */
|
|
struct bpf_jit_poke_descriptor {
|
|
void *tailcall_target;
|
|
void *tailcall_bypass;
|
|
void *bypass_addr;
|
|
void *aux;
|
|
union {
|
|
struct {
|
|
struct bpf_map *map;
|
|
u32 key;
|
|
} tail_call;
|
|
};
|
|
bool tailcall_target_stable;
|
|
u8 adj_off;
|
|
u16 reason;
|
|
u32 insn_idx;
|
|
};
|
|
|
|
/* reg_type info for ctx arguments */
|
|
struct bpf_ctx_arg_aux {
|
|
u32 offset;
|
|
enum bpf_reg_type reg_type;
|
|
u32 btf_id;
|
|
};
|
|
|
|
struct btf_mod_pair {
|
|
struct btf *btf;
|
|
struct module *module;
|
|
};
|
|
|
|
struct bpf_kfunc_desc_tab;
|
|
|
|
struct bpf_prog_aux {
|
|
atomic64_t refcnt;
|
|
u32 used_map_cnt;
|
|
u32 used_btf_cnt;
|
|
u32 max_ctx_offset;
|
|
u32 max_pkt_offset;
|
|
u32 max_tp_access;
|
|
u32 stack_depth;
|
|
u32 id;
|
|
u32 func_cnt; /* used by non-func prog as the number of func progs */
|
|
u32 func_idx; /* 0 for non-func prog, the index in func array for func prog */
|
|
u32 attach_btf_id; /* in-kernel BTF type id to attach to */
|
|
u32 ctx_arg_info_size;
|
|
u32 max_rdonly_access;
|
|
u32 max_rdwr_access;
|
|
struct btf *attach_btf;
|
|
const struct bpf_ctx_arg_aux *ctx_arg_info;
|
|
struct mutex dst_mutex; /* protects dst_* pointers below, *after* prog becomes visible */
|
|
struct bpf_prog *dst_prog;
|
|
struct bpf_trampoline *dst_trampoline;
|
|
enum bpf_prog_type saved_dst_prog_type;
|
|
enum bpf_attach_type saved_dst_attach_type;
|
|
bool verifier_zext; /* Zero extensions has been inserted by verifier. */
|
|
bool offload_requested;
|
|
bool attach_btf_trace; /* true if attaching to BTF-enabled raw tp */
|
|
bool func_proto_unreliable;
|
|
bool sleepable;
|
|
bool tail_call_reachable;
|
|
struct hlist_node tramp_hlist;
|
|
/* BTF_KIND_FUNC_PROTO for valid attach_btf_id */
|
|
const struct btf_type *attach_func_proto;
|
|
/* function name for valid attach_btf_id */
|
|
const char *attach_func_name;
|
|
struct bpf_prog **func;
|
|
void *jit_data; /* JIT specific data. arch dependent */
|
|
struct bpf_jit_poke_descriptor *poke_tab;
|
|
struct bpf_kfunc_desc_tab *kfunc_tab;
|
|
u32 size_poke_tab;
|
|
struct bpf_ksym ksym;
|
|
const struct bpf_prog_ops *ops;
|
|
struct bpf_map **used_maps;
|
|
struct mutex used_maps_mutex; /* mutex for used_maps and used_map_cnt */
|
|
struct btf_mod_pair *used_btfs;
|
|
struct bpf_prog *prog;
|
|
struct user_struct *user;
|
|
u64 load_time; /* ns since boottime */
|
|
struct bpf_map *cgroup_storage[MAX_BPF_CGROUP_STORAGE_TYPE];
|
|
char name[BPF_OBJ_NAME_LEN];
|
|
#ifdef CONFIG_SECURITY
|
|
void *security;
|
|
#endif
|
|
struct bpf_prog_offload *offload;
|
|
struct btf *btf;
|
|
struct bpf_func_info *func_info;
|
|
struct bpf_func_info_aux *func_info_aux;
|
|
/* bpf_line_info loaded from userspace. linfo->insn_off
|
|
* has the xlated insn offset.
|
|
* Both the main and sub prog share the same linfo.
|
|
* The subprog can access its first linfo by
|
|
* using the linfo_idx.
|
|
*/
|
|
struct bpf_line_info *linfo;
|
|
/* jited_linfo is the jited addr of the linfo. It has a
|
|
* one to one mapping to linfo:
|
|
* jited_linfo[i] is the jited addr for the linfo[i]->insn_off.
|
|
* Both the main and sub prog share the same jited_linfo.
|
|
* The subprog can access its first jited_linfo by
|
|
* using the linfo_idx.
|
|
*/
|
|
void **jited_linfo;
|
|
u32 func_info_cnt;
|
|
u32 nr_linfo;
|
|
/* subprog can use linfo_idx to access its first linfo and
|
|
* jited_linfo.
|
|
* main prog always has linfo_idx == 0
|
|
*/
|
|
u32 linfo_idx;
|
|
u32 num_exentries;
|
|
struct exception_table_entry *extable;
|
|
union {
|
|
struct work_struct work;
|
|
struct rcu_head rcu;
|
|
};
|
|
ANDROID_KABI_RESERVE(1);
|
|
};
|
|
|
|
struct bpf_array_aux {
|
|
/* 'Ownership' of prog array is claimed by the first program that
|
|
* is going to use this map or by the first program which FD is
|
|
* stored in the map to make sure that all callers and callees have
|
|
* the same prog type and JITed flag.
|
|
*/
|
|
struct {
|
|
spinlock_t lock;
|
|
enum bpf_prog_type type;
|
|
bool jited;
|
|
} owner;
|
|
/* Programs with direct jumps into programs part of this array. */
|
|
struct list_head poke_progs;
|
|
struct bpf_map *map;
|
|
struct mutex poke_mutex;
|
|
struct work_struct work;
|
|
};
|
|
|
|
struct bpf_link {
|
|
atomic64_t refcnt;
|
|
u32 id;
|
|
enum bpf_link_type type;
|
|
const struct bpf_link_ops *ops;
|
|
struct bpf_prog *prog;
|
|
struct work_struct work;
|
|
};
|
|
|
|
struct bpf_link_ops {
|
|
void (*release)(struct bpf_link *link);
|
|
void (*dealloc)(struct bpf_link *link);
|
|
int (*detach)(struct bpf_link *link);
|
|
int (*update_prog)(struct bpf_link *link, struct bpf_prog *new_prog,
|
|
struct bpf_prog *old_prog);
|
|
void (*show_fdinfo)(const struct bpf_link *link, struct seq_file *seq);
|
|
int (*fill_link_info)(const struct bpf_link *link,
|
|
struct bpf_link_info *info);
|
|
ANDROID_KABI_RESERVE(1);
|
|
};
|
|
|
|
struct bpf_link_primer {
|
|
struct bpf_link *link;
|
|
struct file *file;
|
|
int fd;
|
|
u32 id;
|
|
};
|
|
|
|
struct bpf_struct_ops_value;
|
|
struct btf_member;
|
|
|
|
#define BPF_STRUCT_OPS_MAX_NR_MEMBERS 64
|
|
struct bpf_struct_ops {
|
|
const struct bpf_verifier_ops *verifier_ops;
|
|
int (*init)(struct btf *btf);
|
|
int (*check_member)(const struct btf_type *t,
|
|
const struct btf_member *member);
|
|
int (*init_member)(const struct btf_type *t,
|
|
const struct btf_member *member,
|
|
void *kdata, const void *udata);
|
|
int (*reg)(void *kdata);
|
|
void (*unreg)(void *kdata);
|
|
const struct btf_type *type;
|
|
const struct btf_type *value_type;
|
|
const char *name;
|
|
struct btf_func_model func_models[BPF_STRUCT_OPS_MAX_NR_MEMBERS];
|
|
u32 type_id;
|
|
u32 value_id;
|
|
ANDROID_KABI_RESERVE(1);
|
|
};
|
|
|
|
#if defined(CONFIG_BPF_JIT) && defined(CONFIG_BPF_SYSCALL)
|
|
#define BPF_MODULE_OWNER ((void *)((0xeB9FUL << 2) + POISON_POINTER_DELTA))
|
|
const struct bpf_struct_ops *bpf_struct_ops_find(u32 type_id);
|
|
void bpf_struct_ops_init(struct btf *btf, struct bpf_verifier_log *log);
|
|
bool bpf_struct_ops_get(const void *kdata);
|
|
void bpf_struct_ops_put(const void *kdata);
|
|
int bpf_struct_ops_map_sys_lookup_elem(struct bpf_map *map, void *key,
|
|
void *value);
|
|
static inline bool bpf_try_module_get(const void *data, struct module *owner)
|
|
{
|
|
if (owner == BPF_MODULE_OWNER)
|
|
return bpf_struct_ops_get(data);
|
|
else
|
|
return try_module_get(owner);
|
|
}
|
|
static inline void bpf_module_put(const void *data, struct module *owner)
|
|
{
|
|
if (owner == BPF_MODULE_OWNER)
|
|
bpf_struct_ops_put(data);
|
|
else
|
|
module_put(owner);
|
|
}
|
|
#else
|
|
static inline const struct bpf_struct_ops *bpf_struct_ops_find(u32 type_id)
|
|
{
|
|
return NULL;
|
|
}
|
|
static inline void bpf_struct_ops_init(struct btf *btf,
|
|
struct bpf_verifier_log *log)
|
|
{
|
|
}
|
|
static inline bool bpf_try_module_get(const void *data, struct module *owner)
|
|
{
|
|
return try_module_get(owner);
|
|
}
|
|
static inline void bpf_module_put(const void *data, struct module *owner)
|
|
{
|
|
module_put(owner);
|
|
}
|
|
static inline int bpf_struct_ops_map_sys_lookup_elem(struct bpf_map *map,
|
|
void *key,
|
|
void *value)
|
|
{
|
|
return -EINVAL;
|
|
}
|
|
#endif
|
|
|
|
struct bpf_array {
|
|
struct bpf_map map;
|
|
u32 elem_size;
|
|
u32 index_mask;
|
|
struct bpf_array_aux *aux;
|
|
union {
|
|
char value[0] __aligned(8);
|
|
void *ptrs[0] __aligned(8);
|
|
void __percpu *pptrs[0] __aligned(8);
|
|
};
|
|
};
|
|
|
|
#define BPF_COMPLEXITY_LIMIT_INSNS 1000000 /* yes. 1M insns */
|
|
#define MAX_TAIL_CALL_CNT 32
|
|
|
|
#define BPF_F_ACCESS_MASK (BPF_F_RDONLY | \
|
|
BPF_F_RDONLY_PROG | \
|
|
BPF_F_WRONLY | \
|
|
BPF_F_WRONLY_PROG)
|
|
|
|
#define BPF_MAP_CAN_READ BIT(0)
|
|
#define BPF_MAP_CAN_WRITE BIT(1)
|
|
|
|
static inline u32 bpf_map_flags_to_cap(struct bpf_map *map)
|
|
{
|
|
u32 access_flags = map->map_flags & (BPF_F_RDONLY_PROG | BPF_F_WRONLY_PROG);
|
|
|
|
/* Combination of BPF_F_RDONLY_PROG | BPF_F_WRONLY_PROG is
|
|
* not possible.
|
|
*/
|
|
if (access_flags & BPF_F_RDONLY_PROG)
|
|
return BPF_MAP_CAN_READ;
|
|
else if (access_flags & BPF_F_WRONLY_PROG)
|
|
return BPF_MAP_CAN_WRITE;
|
|
else
|
|
return BPF_MAP_CAN_READ | BPF_MAP_CAN_WRITE;
|
|
}
|
|
|
|
static inline bool bpf_map_flags_access_ok(u32 access_flags)
|
|
{
|
|
return (access_flags & (BPF_F_RDONLY_PROG | BPF_F_WRONLY_PROG)) !=
|
|
(BPF_F_RDONLY_PROG | BPF_F_WRONLY_PROG);
|
|
}
|
|
|
|
struct bpf_event_entry {
|
|
struct perf_event *event;
|
|
struct file *perf_file;
|
|
struct file *map_file;
|
|
struct rcu_head rcu;
|
|
};
|
|
|
|
bool bpf_prog_array_compatible(struct bpf_array *array, const struct bpf_prog *fp);
|
|
int bpf_prog_calc_tag(struct bpf_prog *fp);
|
|
|
|
const struct bpf_func_proto *bpf_get_trace_printk_proto(void);
|
|
|
|
typedef unsigned long (*bpf_ctx_copy_t)(void *dst, const void *src,
|
|
unsigned long off, unsigned long len);
|
|
typedef u32 (*bpf_convert_ctx_access_t)(enum bpf_access_type type,
|
|
const struct bpf_insn *src,
|
|
struct bpf_insn *dst,
|
|
struct bpf_prog *prog,
|
|
u32 *target_size);
|
|
|
|
u64 bpf_event_output(struct bpf_map *map, u64 flags, void *meta, u64 meta_size,
|
|
void *ctx, u64 ctx_size, bpf_ctx_copy_t ctx_copy);
|
|
|
|
/* an array of programs to be executed under rcu_lock.
|
|
*
|
|
* Typical usage:
|
|
* ret = BPF_PROG_RUN_ARRAY(&bpf_prog_array, ctx, bpf_prog_run);
|
|
*
|
|
* the structure returned by bpf_prog_array_alloc() should be populated
|
|
* with program pointers and the last pointer must be NULL.
|
|
* The user has to keep refcnt on the program and make sure the program
|
|
* is removed from the array before bpf_prog_put().
|
|
* The 'struct bpf_prog_array *' should only be replaced with xchg()
|
|
* since other cpus are walking the array of pointers in parallel.
|
|
*/
|
|
struct bpf_prog_array_item {
|
|
struct bpf_prog *prog;
|
|
union {
|
|
struct bpf_cgroup_storage *cgroup_storage[MAX_BPF_CGROUP_STORAGE_TYPE];
|
|
u64 bpf_cookie;
|
|
};
|
|
};
|
|
|
|
struct bpf_prog_array {
|
|
struct rcu_head rcu;
|
|
struct bpf_prog_array_item items[];
|
|
};
|
|
|
|
struct bpf_prog_array *bpf_prog_array_alloc(u32 prog_cnt, gfp_t flags);
|
|
void bpf_prog_array_free(struct bpf_prog_array *progs);
|
|
int bpf_prog_array_length(struct bpf_prog_array *progs);
|
|
bool bpf_prog_array_is_empty(struct bpf_prog_array *array);
|
|
int bpf_prog_array_copy_to_user(struct bpf_prog_array *progs,
|
|
__u32 __user *prog_ids, u32 cnt);
|
|
|
|
void bpf_prog_array_delete_safe(struct bpf_prog_array *progs,
|
|
struct bpf_prog *old_prog);
|
|
int bpf_prog_array_delete_safe_at(struct bpf_prog_array *array, int index);
|
|
int bpf_prog_array_update_at(struct bpf_prog_array *array, int index,
|
|
struct bpf_prog *prog);
|
|
int bpf_prog_array_copy_info(struct bpf_prog_array *array,
|
|
u32 *prog_ids, u32 request_cnt,
|
|
u32 *prog_cnt);
|
|
int bpf_prog_array_copy(struct bpf_prog_array *old_array,
|
|
struct bpf_prog *exclude_prog,
|
|
struct bpf_prog *include_prog,
|
|
u64 bpf_cookie,
|
|
struct bpf_prog_array **new_array);
|
|
|
|
struct bpf_run_ctx {};
|
|
|
|
struct bpf_cg_run_ctx {
|
|
struct bpf_run_ctx run_ctx;
|
|
const struct bpf_prog_array_item *prog_item;
|
|
};
|
|
|
|
struct bpf_trace_run_ctx {
|
|
struct bpf_run_ctx run_ctx;
|
|
u64 bpf_cookie;
|
|
};
|
|
|
|
static inline struct bpf_run_ctx *bpf_set_run_ctx(struct bpf_run_ctx *new_ctx)
|
|
{
|
|
struct bpf_run_ctx *old_ctx = NULL;
|
|
|
|
#ifdef CONFIG_BPF_SYSCALL
|
|
old_ctx = current->bpf_ctx;
|
|
current->bpf_ctx = new_ctx;
|
|
#endif
|
|
return old_ctx;
|
|
}
|
|
|
|
static inline void bpf_reset_run_ctx(struct bpf_run_ctx *old_ctx)
|
|
{
|
|
#ifdef CONFIG_BPF_SYSCALL
|
|
current->bpf_ctx = old_ctx;
|
|
#endif
|
|
}
|
|
|
|
/* BPF program asks to bypass CAP_NET_BIND_SERVICE in bind. */
|
|
#define BPF_RET_BIND_NO_CAP_NET_BIND_SERVICE (1 << 0)
|
|
/* BPF program asks to set CN on the packet. */
|
|
#define BPF_RET_SET_CN (1 << 0)
|
|
|
|
typedef u32 (*bpf_prog_run_fn)(const struct bpf_prog *prog, const void *ctx);
|
|
|
|
static __always_inline u32
|
|
BPF_PROG_RUN_ARRAY_CG_FLAGS(const struct bpf_prog_array __rcu *array_rcu,
|
|
const void *ctx, bpf_prog_run_fn run_prog,
|
|
u32 *ret_flags)
|
|
{
|
|
const struct bpf_prog_array_item *item;
|
|
const struct bpf_prog *prog;
|
|
const struct bpf_prog_array *array;
|
|
struct bpf_run_ctx *old_run_ctx;
|
|
struct bpf_cg_run_ctx run_ctx;
|
|
u32 ret = 1;
|
|
u32 func_ret;
|
|
|
|
migrate_disable();
|
|
rcu_read_lock();
|
|
array = rcu_dereference(array_rcu);
|
|
item = &array->items[0];
|
|
old_run_ctx = bpf_set_run_ctx(&run_ctx.run_ctx);
|
|
while ((prog = READ_ONCE(item->prog))) {
|
|
run_ctx.prog_item = item;
|
|
func_ret = run_prog(prog, ctx);
|
|
ret &= (func_ret & 1);
|
|
*(ret_flags) |= (func_ret >> 1);
|
|
item++;
|
|
}
|
|
bpf_reset_run_ctx(old_run_ctx);
|
|
rcu_read_unlock();
|
|
migrate_enable();
|
|
return ret;
|
|
}
|
|
|
|
static __always_inline u32
|
|
BPF_PROG_RUN_ARRAY_CG(const struct bpf_prog_array __rcu *array_rcu,
|
|
const void *ctx, bpf_prog_run_fn run_prog)
|
|
{
|
|
const struct bpf_prog_array_item *item;
|
|
const struct bpf_prog *prog;
|
|
const struct bpf_prog_array *array;
|
|
struct bpf_run_ctx *old_run_ctx;
|
|
struct bpf_cg_run_ctx run_ctx;
|
|
u32 ret = 1;
|
|
|
|
migrate_disable();
|
|
rcu_read_lock();
|
|
array = rcu_dereference(array_rcu);
|
|
item = &array->items[0];
|
|
old_run_ctx = bpf_set_run_ctx(&run_ctx.run_ctx);
|
|
while ((prog = READ_ONCE(item->prog))) {
|
|
run_ctx.prog_item = item;
|
|
ret &= run_prog(prog, ctx);
|
|
item++;
|
|
}
|
|
bpf_reset_run_ctx(old_run_ctx);
|
|
rcu_read_unlock();
|
|
migrate_enable();
|
|
return ret;
|
|
}
|
|
|
|
static __always_inline u32
|
|
BPF_PROG_RUN_ARRAY(const struct bpf_prog_array __rcu *array_rcu,
|
|
const void *ctx, bpf_prog_run_fn run_prog)
|
|
{
|
|
const struct bpf_prog_array_item *item;
|
|
const struct bpf_prog *prog;
|
|
const struct bpf_prog_array *array;
|
|
struct bpf_run_ctx *old_run_ctx;
|
|
struct bpf_trace_run_ctx run_ctx;
|
|
u32 ret = 1;
|
|
|
|
migrate_disable();
|
|
rcu_read_lock();
|
|
array = rcu_dereference(array_rcu);
|
|
if (unlikely(!array))
|
|
goto out;
|
|
old_run_ctx = bpf_set_run_ctx(&run_ctx.run_ctx);
|
|
item = &array->items[0];
|
|
while ((prog = READ_ONCE(item->prog))) {
|
|
run_ctx.bpf_cookie = item->bpf_cookie;
|
|
ret &= run_prog(prog, ctx);
|
|
item++;
|
|
}
|
|
bpf_reset_run_ctx(old_run_ctx);
|
|
out:
|
|
rcu_read_unlock();
|
|
migrate_enable();
|
|
return ret;
|
|
}
|
|
|
|
/* To be used by __cgroup_bpf_run_filter_skb for EGRESS BPF progs
|
|
* so BPF programs can request cwr for TCP packets.
|
|
*
|
|
* Current cgroup skb programs can only return 0 or 1 (0 to drop the
|
|
* packet. This macro changes the behavior so the low order bit
|
|
* indicates whether the packet should be dropped (0) or not (1)
|
|
* and the next bit is a congestion notification bit. This could be
|
|
* used by TCP to call tcp_enter_cwr()
|
|
*
|
|
* Hence, new allowed return values of CGROUP EGRESS BPF programs are:
|
|
* 0: drop packet
|
|
* 1: keep packet
|
|
* 2: drop packet and cn
|
|
* 3: keep packet and cn
|
|
*
|
|
* This macro then converts it to one of the NET_XMIT or an error
|
|
* code that is then interpreted as drop packet (and no cn):
|
|
* 0: NET_XMIT_SUCCESS skb should be transmitted
|
|
* 1: NET_XMIT_DROP skb should be dropped and cn
|
|
* 2: NET_XMIT_CN skb should be transmitted and cn
|
|
* 3: -EPERM skb should be dropped
|
|
*/
|
|
#define BPF_PROG_CGROUP_INET_EGRESS_RUN_ARRAY(array, ctx, func) \
|
|
({ \
|
|
u32 _flags = 0; \
|
|
bool _cn; \
|
|
u32 _ret; \
|
|
_ret = BPF_PROG_RUN_ARRAY_CG_FLAGS(array, ctx, func, &_flags); \
|
|
_cn = _flags & BPF_RET_SET_CN; \
|
|
if (_ret) \
|
|
_ret = (_cn ? NET_XMIT_CN : NET_XMIT_SUCCESS); \
|
|
else \
|
|
_ret = (_cn ? NET_XMIT_DROP : -EPERM); \
|
|
_ret; \
|
|
})
|
|
|
|
#ifdef CONFIG_BPF_SYSCALL
|
|
DECLARE_PER_CPU(int, bpf_prog_active);
|
|
extern struct mutex bpf_stats_enabled_mutex;
|
|
|
|
/*
|
|
* Block execution of BPF programs attached to instrumentation (perf,
|
|
* kprobes, tracepoints) to prevent deadlocks on map operations as any of
|
|
* these events can happen inside a region which holds a map bucket lock
|
|
* and can deadlock on it.
|
|
*/
|
|
static inline void bpf_disable_instrumentation(void)
|
|
{
|
|
migrate_disable();
|
|
this_cpu_inc(bpf_prog_active);
|
|
}
|
|
|
|
static inline void bpf_enable_instrumentation(void)
|
|
{
|
|
this_cpu_dec(bpf_prog_active);
|
|
migrate_enable();
|
|
}
|
|
|
|
extern const struct file_operations bpf_map_fops;
|
|
extern const struct file_operations bpf_prog_fops;
|
|
extern const struct file_operations bpf_iter_fops;
|
|
|
|
#define BPF_PROG_TYPE(_id, _name, prog_ctx_type, kern_ctx_type) \
|
|
extern const struct bpf_prog_ops _name ## _prog_ops; \
|
|
extern const struct bpf_verifier_ops _name ## _verifier_ops;
|
|
#define BPF_MAP_TYPE(_id, _ops) \
|
|
extern const struct bpf_map_ops _ops;
|
|
#define BPF_LINK_TYPE(_id, _name)
|
|
#include <linux/bpf_types.h>
|
|
#undef BPF_PROG_TYPE
|
|
#undef BPF_MAP_TYPE
|
|
#undef BPF_LINK_TYPE
|
|
|
|
extern const struct bpf_prog_ops bpf_offload_prog_ops;
|
|
extern const struct bpf_verifier_ops tc_cls_act_analyzer_ops;
|
|
extern const struct bpf_verifier_ops xdp_analyzer_ops;
|
|
|
|
struct bpf_prog *bpf_prog_get(u32 ufd);
|
|
struct bpf_prog *bpf_prog_get_type_dev(u32 ufd, enum bpf_prog_type type,
|
|
bool attach_drv);
|
|
void bpf_prog_add(struct bpf_prog *prog, int i);
|
|
void bpf_prog_sub(struct bpf_prog *prog, int i);
|
|
void bpf_prog_inc(struct bpf_prog *prog);
|
|
struct bpf_prog * __must_check bpf_prog_inc_not_zero(struct bpf_prog *prog);
|
|
void bpf_prog_put(struct bpf_prog *prog);
|
|
|
|
void bpf_prog_free_id(struct bpf_prog *prog, bool do_idr_lock);
|
|
void bpf_map_free_id(struct bpf_map *map, bool do_idr_lock);
|
|
|
|
struct bpf_map *bpf_map_get(u32 ufd);
|
|
struct bpf_map *bpf_map_get_with_uref(u32 ufd);
|
|
struct bpf_map *__bpf_map_get(struct fd f);
|
|
void bpf_map_inc(struct bpf_map *map);
|
|
void bpf_map_inc_with_uref(struct bpf_map *map);
|
|
struct bpf_map * __must_check bpf_map_inc_not_zero(struct bpf_map *map);
|
|
void bpf_map_put_with_uref(struct bpf_map *map);
|
|
void bpf_map_put(struct bpf_map *map);
|
|
void *bpf_map_area_alloc(u64 size, int numa_node);
|
|
void *bpf_map_area_mmapable_alloc(u64 size, int numa_node);
|
|
void bpf_map_area_free(void *base);
|
|
bool bpf_map_write_active(const struct bpf_map *map);
|
|
void bpf_map_init_from_attr(struct bpf_map *map, union bpf_attr *attr);
|
|
int generic_map_lookup_batch(struct bpf_map *map,
|
|
const union bpf_attr *attr,
|
|
union bpf_attr __user *uattr);
|
|
int generic_map_update_batch(struct bpf_map *map,
|
|
const union bpf_attr *attr,
|
|
union bpf_attr __user *uattr);
|
|
int generic_map_delete_batch(struct bpf_map *map,
|
|
const union bpf_attr *attr,
|
|
union bpf_attr __user *uattr);
|
|
struct bpf_map *bpf_map_get_curr_or_next(u32 *id);
|
|
struct bpf_prog *bpf_prog_get_curr_or_next(u32 *id);
|
|
|
|
#ifdef CONFIG_MEMCG_KMEM
|
|
void *bpf_map_kmalloc_node(const struct bpf_map *map, size_t size, gfp_t flags,
|
|
int node);
|
|
void *bpf_map_kzalloc(const struct bpf_map *map, size_t size, gfp_t flags);
|
|
void __percpu *bpf_map_alloc_percpu(const struct bpf_map *map, size_t size,
|
|
size_t align, gfp_t flags);
|
|
#else
|
|
static inline void *
|
|
bpf_map_kmalloc_node(const struct bpf_map *map, size_t size, gfp_t flags,
|
|
int node)
|
|
{
|
|
return kmalloc_node(size, flags, node);
|
|
}
|
|
|
|
static inline void *
|
|
bpf_map_kzalloc(const struct bpf_map *map, size_t size, gfp_t flags)
|
|
{
|
|
return kzalloc(size, flags);
|
|
}
|
|
|
|
static inline void __percpu *
|
|
bpf_map_alloc_percpu(const struct bpf_map *map, size_t size, size_t align,
|
|
gfp_t flags)
|
|
{
|
|
return __alloc_percpu_gfp(size, align, flags);
|
|
}
|
|
#endif
|
|
|
|
extern int sysctl_unprivileged_bpf_disabled;
|
|
|
|
static inline bool bpf_allow_ptr_leaks(void)
|
|
{
|
|
return perfmon_capable();
|
|
}
|
|
|
|
static inline bool bpf_allow_uninit_stack(void)
|
|
{
|
|
return perfmon_capable();
|
|
}
|
|
|
|
static inline bool bpf_allow_ptr_to_map_access(void)
|
|
{
|
|
return perfmon_capable();
|
|
}
|
|
|
|
static inline bool bpf_bypass_spec_v1(void)
|
|
{
|
|
return perfmon_capable();
|
|
}
|
|
|
|
static inline bool bpf_bypass_spec_v4(void)
|
|
{
|
|
return perfmon_capable();
|
|
}
|
|
|
|
int bpf_map_new_fd(struct bpf_map *map, int flags);
|
|
int bpf_prog_new_fd(struct bpf_prog *prog);
|
|
|
|
void bpf_link_init(struct bpf_link *link, enum bpf_link_type type,
|
|
const struct bpf_link_ops *ops, struct bpf_prog *prog);
|
|
int bpf_link_prime(struct bpf_link *link, struct bpf_link_primer *primer);
|
|
int bpf_link_settle(struct bpf_link_primer *primer);
|
|
void bpf_link_cleanup(struct bpf_link_primer *primer);
|
|
void bpf_link_inc(struct bpf_link *link);
|
|
void bpf_link_put(struct bpf_link *link);
|
|
int bpf_link_new_fd(struct bpf_link *link);
|
|
struct file *bpf_link_new_file(struct bpf_link *link, int *reserved_fd);
|
|
struct bpf_link *bpf_link_get_from_fd(u32 ufd);
|
|
|
|
int bpf_obj_pin_user(u32 ufd, const char __user *pathname);
|
|
int bpf_obj_get_user(const char __user *pathname, int flags);
|
|
|
|
#define BPF_ITER_FUNC_PREFIX "bpf_iter_"
|
|
#define DEFINE_BPF_ITER_FUNC(target, args...) \
|
|
extern int bpf_iter_ ## target(args); \
|
|
int __init bpf_iter_ ## target(args) { return 0; }
|
|
|
|
struct bpf_iter_aux_info {
|
|
struct bpf_map *map;
|
|
};
|
|
|
|
typedef int (*bpf_iter_attach_target_t)(struct bpf_prog *prog,
|
|
union bpf_iter_link_info *linfo,
|
|
struct bpf_iter_aux_info *aux);
|
|
typedef void (*bpf_iter_detach_target_t)(struct bpf_iter_aux_info *aux);
|
|
typedef void (*bpf_iter_show_fdinfo_t) (const struct bpf_iter_aux_info *aux,
|
|
struct seq_file *seq);
|
|
typedef int (*bpf_iter_fill_link_info_t)(const struct bpf_iter_aux_info *aux,
|
|
struct bpf_link_info *info);
|
|
typedef const struct bpf_func_proto *
|
|
(*bpf_iter_get_func_proto_t)(enum bpf_func_id func_id,
|
|
const struct bpf_prog *prog);
|
|
|
|
enum bpf_iter_feature {
|
|
BPF_ITER_RESCHED = BIT(0),
|
|
};
|
|
|
|
#define BPF_ITER_CTX_ARG_MAX 2
|
|
struct bpf_iter_reg {
|
|
const char *target;
|
|
bpf_iter_attach_target_t attach_target;
|
|
bpf_iter_detach_target_t detach_target;
|
|
bpf_iter_show_fdinfo_t show_fdinfo;
|
|
bpf_iter_fill_link_info_t fill_link_info;
|
|
bpf_iter_get_func_proto_t get_func_proto;
|
|
u32 ctx_arg_info_size;
|
|
u32 feature;
|
|
struct bpf_ctx_arg_aux ctx_arg_info[BPF_ITER_CTX_ARG_MAX];
|
|
const struct bpf_iter_seq_info *seq_info;
|
|
};
|
|
|
|
struct bpf_iter_meta {
|
|
__bpf_md_ptr(struct seq_file *, seq);
|
|
u64 session_id;
|
|
u64 seq_num;
|
|
};
|
|
|
|
struct bpf_iter__bpf_map_elem {
|
|
__bpf_md_ptr(struct bpf_iter_meta *, meta);
|
|
__bpf_md_ptr(struct bpf_map *, map);
|
|
__bpf_md_ptr(void *, key);
|
|
__bpf_md_ptr(void *, value);
|
|
};
|
|
|
|
int bpf_iter_reg_target(const struct bpf_iter_reg *reg_info);
|
|
void bpf_iter_unreg_target(const struct bpf_iter_reg *reg_info);
|
|
bool bpf_iter_prog_supported(struct bpf_prog *prog);
|
|
const struct bpf_func_proto *
|
|
bpf_iter_get_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog);
|
|
int bpf_iter_link_attach(const union bpf_attr *attr, bpfptr_t uattr, struct bpf_prog *prog);
|
|
int bpf_iter_new_fd(struct bpf_link *link);
|
|
bool bpf_link_is_iter(struct bpf_link *link);
|
|
struct bpf_prog *bpf_iter_get_info(struct bpf_iter_meta *meta, bool in_stop);
|
|
int bpf_iter_run_prog(struct bpf_prog *prog, void *ctx);
|
|
void bpf_iter_map_show_fdinfo(const struct bpf_iter_aux_info *aux,
|
|
struct seq_file *seq);
|
|
int bpf_iter_map_fill_link_info(const struct bpf_iter_aux_info *aux,
|
|
struct bpf_link_info *info);
|
|
|
|
int map_set_for_each_callback_args(struct bpf_verifier_env *env,
|
|
struct bpf_func_state *caller,
|
|
struct bpf_func_state *callee);
|
|
|
|
int bpf_percpu_hash_copy(struct bpf_map *map, void *key, void *value);
|
|
int bpf_percpu_array_copy(struct bpf_map *map, void *key, void *value);
|
|
int bpf_percpu_hash_update(struct bpf_map *map, void *key, void *value,
|
|
u64 flags);
|
|
int bpf_percpu_array_update(struct bpf_map *map, void *key, void *value,
|
|
u64 flags);
|
|
|
|
int bpf_stackmap_copy(struct bpf_map *map, void *key, void *value);
|
|
|
|
int bpf_fd_array_map_update_elem(struct bpf_map *map, struct file *map_file,
|
|
void *key, void *value, u64 map_flags);
|
|
int bpf_fd_array_map_lookup_elem(struct bpf_map *map, void *key, u32 *value);
|
|
int bpf_fd_htab_map_update_elem(struct bpf_map *map, struct file *map_file,
|
|
void *key, void *value, u64 map_flags);
|
|
int bpf_fd_htab_map_lookup_elem(struct bpf_map *map, void *key, u32 *value);
|
|
|
|
int bpf_get_file_flag(int flags);
|
|
int bpf_check_uarg_tail_zero(bpfptr_t uaddr, size_t expected_size,
|
|
size_t actual_size);
|
|
|
|
/* memcpy that is used with 8-byte aligned pointers, power-of-8 size and
|
|
* forced to use 'long' read/writes to try to atomically copy long counters.
|
|
* Best-effort only. No barriers here, since it _will_ race with concurrent
|
|
* updates from BPF programs. Called from bpf syscall and mostly used with
|
|
* size 8 or 16 bytes, so ask compiler to inline it.
|
|
*/
|
|
static inline void bpf_long_memcpy(void *dst, const void *src, u32 size)
|
|
{
|
|
const long *lsrc = src;
|
|
long *ldst = dst;
|
|
|
|
size /= sizeof(long);
|
|
while (size--)
|
|
*ldst++ = *lsrc++;
|
|
}
|
|
|
|
/* verify correctness of eBPF program */
|
|
int bpf_check(struct bpf_prog **fp, union bpf_attr *attr, bpfptr_t uattr);
|
|
|
|
#ifndef CONFIG_BPF_JIT_ALWAYS_ON
|
|
void bpf_patch_call_args(struct bpf_insn *insn, u32 stack_depth);
|
|
#endif
|
|
|
|
struct btf *bpf_get_btf_vmlinux(void);
|
|
|
|
/* Map specifics */
|
|
struct xdp_buff;
|
|
struct sk_buff;
|
|
struct bpf_dtab_netdev;
|
|
struct bpf_cpu_map_entry;
|
|
|
|
void __dev_flush(void);
|
|
int dev_xdp_enqueue(struct net_device *dev, struct xdp_buff *xdp,
|
|
struct net_device *dev_rx);
|
|
int dev_map_enqueue(struct bpf_dtab_netdev *dst, struct xdp_buff *xdp,
|
|
struct net_device *dev_rx);
|
|
int dev_map_enqueue_multi(struct xdp_buff *xdp, struct net_device *dev_rx,
|
|
struct bpf_map *map, bool exclude_ingress);
|
|
int dev_map_generic_redirect(struct bpf_dtab_netdev *dst, struct sk_buff *skb,
|
|
struct bpf_prog *xdp_prog);
|
|
int dev_map_redirect_multi(struct net_device *dev, struct sk_buff *skb,
|
|
struct bpf_prog *xdp_prog, struct bpf_map *map,
|
|
bool exclude_ingress);
|
|
|
|
void __cpu_map_flush(void);
|
|
int cpu_map_enqueue(struct bpf_cpu_map_entry *rcpu, struct xdp_buff *xdp,
|
|
struct net_device *dev_rx);
|
|
int cpu_map_generic_redirect(struct bpf_cpu_map_entry *rcpu,
|
|
struct sk_buff *skb);
|
|
|
|
/* Return map's numa specified by userspace */
|
|
static inline int bpf_map_attr_numa_node(const union bpf_attr *attr)
|
|
{
|
|
return (attr->map_flags & BPF_F_NUMA_NODE) ?
|
|
attr->numa_node : NUMA_NO_NODE;
|
|
}
|
|
|
|
struct bpf_prog *bpf_prog_get_type_path(const char *name, enum bpf_prog_type type);
|
|
int array_map_alloc_check(union bpf_attr *attr);
|
|
|
|
int bpf_prog_test_run_xdp(struct bpf_prog *prog, const union bpf_attr *kattr,
|
|
union bpf_attr __user *uattr);
|
|
int bpf_prog_test_run_skb(struct bpf_prog *prog, const union bpf_attr *kattr,
|
|
union bpf_attr __user *uattr);
|
|
int bpf_prog_test_run_tracing(struct bpf_prog *prog,
|
|
const union bpf_attr *kattr,
|
|
union bpf_attr __user *uattr);
|
|
int bpf_prog_test_run_flow_dissector(struct bpf_prog *prog,
|
|
const union bpf_attr *kattr,
|
|
union bpf_attr __user *uattr);
|
|
int bpf_prog_test_run_raw_tp(struct bpf_prog *prog,
|
|
const union bpf_attr *kattr,
|
|
union bpf_attr __user *uattr);
|
|
int bpf_prog_test_run_sk_lookup(struct bpf_prog *prog,
|
|
const union bpf_attr *kattr,
|
|
union bpf_attr __user *uattr);
|
|
bool bpf_prog_test_check_kfunc_call(u32 kfunc_id);
|
|
bool btf_ctx_access(int off, int size, enum bpf_access_type type,
|
|
const struct bpf_prog *prog,
|
|
struct bpf_insn_access_aux *info);
|
|
int btf_struct_access(struct bpf_verifier_log *log, const struct btf *btf,
|
|
const struct btf_type *t, int off, int size,
|
|
enum bpf_access_type atype,
|
|
u32 *next_btf_id);
|
|
bool btf_struct_ids_match(struct bpf_verifier_log *log,
|
|
const struct btf *btf, u32 id, int off,
|
|
const struct btf *need_btf, u32 need_type_id);
|
|
|
|
int btf_distill_func_proto(struct bpf_verifier_log *log,
|
|
struct btf *btf,
|
|
const struct btf_type *func_proto,
|
|
const char *func_name,
|
|
struct btf_func_model *m);
|
|
|
|
struct bpf_reg_state;
|
|
int btf_check_subprog_arg_match(struct bpf_verifier_env *env, int subprog,
|
|
struct bpf_reg_state *regs);
|
|
int btf_check_kfunc_arg_match(struct bpf_verifier_env *env,
|
|
const struct btf *btf, u32 func_id,
|
|
struct bpf_reg_state *regs);
|
|
int btf_prepare_func_args(struct bpf_verifier_env *env, int subprog,
|
|
struct bpf_reg_state *reg);
|
|
int btf_check_type_match(struct bpf_verifier_log *log, const struct bpf_prog *prog,
|
|
struct btf *btf, const struct btf_type *t);
|
|
|
|
struct bpf_prog *bpf_prog_by_id(u32 id);
|
|
struct bpf_link *bpf_link_by_id(u32 id);
|
|
|
|
const struct bpf_func_proto *bpf_base_func_proto(enum bpf_func_id func_id);
|
|
void bpf_task_storage_free(struct task_struct *task);
|
|
bool bpf_prog_has_kfunc_call(const struct bpf_prog *prog);
|
|
const struct btf_func_model *
|
|
bpf_jit_find_kfunc_model(const struct bpf_prog *prog,
|
|
const struct bpf_insn *insn);
|
|
|
|
static inline bool unprivileged_ebpf_enabled(void)
|
|
{
|
|
return !sysctl_unprivileged_bpf_disabled;
|
|
}
|
|
|
|
#else /* !CONFIG_BPF_SYSCALL */
|
|
static inline struct bpf_prog *bpf_prog_get(u32 ufd)
|
|
{
|
|
return ERR_PTR(-EOPNOTSUPP);
|
|
}
|
|
|
|
static inline struct bpf_prog *bpf_prog_get_type_dev(u32 ufd,
|
|
enum bpf_prog_type type,
|
|
bool attach_drv)
|
|
{
|
|
return ERR_PTR(-EOPNOTSUPP);
|
|
}
|
|
|
|
static inline void bpf_prog_add(struct bpf_prog *prog, int i)
|
|
{
|
|
}
|
|
|
|
static inline void bpf_prog_sub(struct bpf_prog *prog, int i)
|
|
{
|
|
}
|
|
|
|
static inline void bpf_prog_put(struct bpf_prog *prog)
|
|
{
|
|
}
|
|
|
|
static inline void bpf_prog_inc(struct bpf_prog *prog)
|
|
{
|
|
}
|
|
|
|
static inline struct bpf_prog *__must_check
|
|
bpf_prog_inc_not_zero(struct bpf_prog *prog)
|
|
{
|
|
return ERR_PTR(-EOPNOTSUPP);
|
|
}
|
|
|
|
static inline void bpf_link_init(struct bpf_link *link, enum bpf_link_type type,
|
|
const struct bpf_link_ops *ops,
|
|
struct bpf_prog *prog)
|
|
{
|
|
}
|
|
|
|
static inline int bpf_link_prime(struct bpf_link *link,
|
|
struct bpf_link_primer *primer)
|
|
{
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static inline int bpf_link_settle(struct bpf_link_primer *primer)
|
|
{
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static inline void bpf_link_cleanup(struct bpf_link_primer *primer)
|
|
{
|
|
}
|
|
|
|
static inline void bpf_link_inc(struct bpf_link *link)
|
|
{
|
|
}
|
|
|
|
static inline void bpf_link_put(struct bpf_link *link)
|
|
{
|
|
}
|
|
|
|
static inline int bpf_obj_get_user(const char __user *pathname, int flags)
|
|
{
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static inline bool dev_map_can_have_prog(struct bpf_map *map)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
static inline void __dev_flush(void)
|
|
{
|
|
}
|
|
|
|
struct xdp_buff;
|
|
struct bpf_dtab_netdev;
|
|
struct bpf_cpu_map_entry;
|
|
|
|
static inline
|
|
int dev_xdp_enqueue(struct net_device *dev, struct xdp_buff *xdp,
|
|
struct net_device *dev_rx)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static inline
|
|
int dev_map_enqueue(struct bpf_dtab_netdev *dst, struct xdp_buff *xdp,
|
|
struct net_device *dev_rx)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static inline
|
|
int dev_map_enqueue_multi(struct xdp_buff *xdp, struct net_device *dev_rx,
|
|
struct bpf_map *map, bool exclude_ingress)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
struct sk_buff;
|
|
|
|
static inline int dev_map_generic_redirect(struct bpf_dtab_netdev *dst,
|
|
struct sk_buff *skb,
|
|
struct bpf_prog *xdp_prog)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static inline
|
|
int dev_map_redirect_multi(struct net_device *dev, struct sk_buff *skb,
|
|
struct bpf_prog *xdp_prog, struct bpf_map *map,
|
|
bool exclude_ingress)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static inline void __cpu_map_flush(void)
|
|
{
|
|
}
|
|
|
|
static inline int cpu_map_enqueue(struct bpf_cpu_map_entry *rcpu,
|
|
struct xdp_buff *xdp,
|
|
struct net_device *dev_rx)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static inline int cpu_map_generic_redirect(struct bpf_cpu_map_entry *rcpu,
|
|
struct sk_buff *skb)
|
|
{
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static inline bool cpu_map_prog_allowed(struct bpf_map *map)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
static inline struct bpf_prog *bpf_prog_get_type_path(const char *name,
|
|
enum bpf_prog_type type)
|
|
{
|
|
return ERR_PTR(-EOPNOTSUPP);
|
|
}
|
|
|
|
static inline int bpf_prog_test_run_xdp(struct bpf_prog *prog,
|
|
const union bpf_attr *kattr,
|
|
union bpf_attr __user *uattr)
|
|
{
|
|
return -ENOTSUPP;
|
|
}
|
|
|
|
static inline int bpf_prog_test_run_skb(struct bpf_prog *prog,
|
|
const union bpf_attr *kattr,
|
|
union bpf_attr __user *uattr)
|
|
{
|
|
return -ENOTSUPP;
|
|
}
|
|
|
|
static inline int bpf_prog_test_run_tracing(struct bpf_prog *prog,
|
|
const union bpf_attr *kattr,
|
|
union bpf_attr __user *uattr)
|
|
{
|
|
return -ENOTSUPP;
|
|
}
|
|
|
|
static inline int bpf_prog_test_run_flow_dissector(struct bpf_prog *prog,
|
|
const union bpf_attr *kattr,
|
|
union bpf_attr __user *uattr)
|
|
{
|
|
return -ENOTSUPP;
|
|
}
|
|
|
|
static inline int bpf_prog_test_run_sk_lookup(struct bpf_prog *prog,
|
|
const union bpf_attr *kattr,
|
|
union bpf_attr __user *uattr)
|
|
{
|
|
return -ENOTSUPP;
|
|
}
|
|
|
|
static inline bool bpf_prog_test_check_kfunc_call(u32 kfunc_id)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
static inline void bpf_map_put(struct bpf_map *map)
|
|
{
|
|
}
|
|
|
|
static inline struct bpf_prog *bpf_prog_by_id(u32 id)
|
|
{
|
|
return ERR_PTR(-ENOTSUPP);
|
|
}
|
|
|
|
static inline const struct bpf_func_proto *
|
|
bpf_base_func_proto(enum bpf_func_id func_id)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
static inline void bpf_task_storage_free(struct task_struct *task)
|
|
{
|
|
}
|
|
|
|
static inline bool bpf_prog_has_kfunc_call(const struct bpf_prog *prog)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
static inline const struct btf_func_model *
|
|
bpf_jit_find_kfunc_model(const struct bpf_prog *prog,
|
|
const struct bpf_insn *insn)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
static inline bool unprivileged_ebpf_enabled(void)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
#endif /* CONFIG_BPF_SYSCALL */
|
|
|
|
void __bpf_free_used_btfs(struct bpf_prog_aux *aux,
|
|
struct btf_mod_pair *used_btfs, u32 len);
|
|
|
|
static inline struct bpf_prog *bpf_prog_get_type(u32 ufd,
|
|
enum bpf_prog_type type)
|
|
{
|
|
return bpf_prog_get_type_dev(ufd, type, false);
|
|
}
|
|
|
|
void __bpf_free_used_maps(struct bpf_prog_aux *aux,
|
|
struct bpf_map **used_maps, u32 len);
|
|
|
|
bool bpf_prog_get_ok(struct bpf_prog *, enum bpf_prog_type *, bool);
|
|
|
|
int bpf_prog_offload_compile(struct bpf_prog *prog);
|
|
void bpf_prog_offload_destroy(struct bpf_prog *prog);
|
|
int bpf_prog_offload_info_fill(struct bpf_prog_info *info,
|
|
struct bpf_prog *prog);
|
|
|
|
int bpf_map_offload_info_fill(struct bpf_map_info *info, struct bpf_map *map);
|
|
|
|
int bpf_map_offload_lookup_elem(struct bpf_map *map, void *key, void *value);
|
|
int bpf_map_offload_update_elem(struct bpf_map *map,
|
|
void *key, void *value, u64 flags);
|
|
int bpf_map_offload_delete_elem(struct bpf_map *map, void *key);
|
|
int bpf_map_offload_get_next_key(struct bpf_map *map,
|
|
void *key, void *next_key);
|
|
|
|
bool bpf_offload_prog_map_match(struct bpf_prog *prog, struct bpf_map *map);
|
|
|
|
struct bpf_offload_dev *
|
|
bpf_offload_dev_create(const struct bpf_prog_offload_ops *ops, void *priv);
|
|
void bpf_offload_dev_destroy(struct bpf_offload_dev *offdev);
|
|
void *bpf_offload_dev_priv(struct bpf_offload_dev *offdev);
|
|
int bpf_offload_dev_netdev_register(struct bpf_offload_dev *offdev,
|
|
struct net_device *netdev);
|
|
void bpf_offload_dev_netdev_unregister(struct bpf_offload_dev *offdev,
|
|
struct net_device *netdev);
|
|
bool bpf_offload_dev_match(struct bpf_prog *prog, struct net_device *netdev);
|
|
|
|
void unpriv_ebpf_notify(int new_state);
|
|
|
|
#if defined(CONFIG_NET) && defined(CONFIG_BPF_SYSCALL)
|
|
int bpf_prog_offload_init(struct bpf_prog *prog, union bpf_attr *attr);
|
|
|
|
static inline bool bpf_prog_is_dev_bound(const struct bpf_prog_aux *aux)
|
|
{
|
|
return aux->offload_requested;
|
|
}
|
|
|
|
static inline bool bpf_map_is_dev_bound(struct bpf_map *map)
|
|
{
|
|
return unlikely(map->ops == &bpf_map_offload_ops);
|
|
}
|
|
|
|
struct bpf_map *bpf_map_offload_map_alloc(union bpf_attr *attr);
|
|
void bpf_map_offload_map_free(struct bpf_map *map);
|
|
int bpf_prog_test_run_syscall(struct bpf_prog *prog,
|
|
const union bpf_attr *kattr,
|
|
union bpf_attr __user *uattr);
|
|
|
|
int sock_map_get_from_fd(const union bpf_attr *attr, struct bpf_prog *prog);
|
|
int sock_map_prog_detach(const union bpf_attr *attr, enum bpf_prog_type ptype);
|
|
int sock_map_update_elem_sys(struct bpf_map *map, void *key, void *value, u64 flags);
|
|
void sock_map_unhash(struct sock *sk);
|
|
void sock_map_close(struct sock *sk, long timeout);
|
|
#else
|
|
static inline int bpf_prog_offload_init(struct bpf_prog *prog,
|
|
union bpf_attr *attr)
|
|
{
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static inline bool bpf_prog_is_dev_bound(struct bpf_prog_aux *aux)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
static inline bool bpf_map_is_dev_bound(struct bpf_map *map)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
static inline struct bpf_map *bpf_map_offload_map_alloc(union bpf_attr *attr)
|
|
{
|
|
return ERR_PTR(-EOPNOTSUPP);
|
|
}
|
|
|
|
static inline void bpf_map_offload_map_free(struct bpf_map *map)
|
|
{
|
|
}
|
|
|
|
static inline int bpf_prog_test_run_syscall(struct bpf_prog *prog,
|
|
const union bpf_attr *kattr,
|
|
union bpf_attr __user *uattr)
|
|
{
|
|
return -ENOTSUPP;
|
|
}
|
|
|
|
#ifdef CONFIG_BPF_SYSCALL
|
|
static inline int sock_map_get_from_fd(const union bpf_attr *attr,
|
|
struct bpf_prog *prog)
|
|
{
|
|
return -EINVAL;
|
|
}
|
|
|
|
static inline int sock_map_prog_detach(const union bpf_attr *attr,
|
|
enum bpf_prog_type ptype)
|
|
{
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static inline int sock_map_update_elem_sys(struct bpf_map *map, void *key, void *value,
|
|
u64 flags)
|
|
{
|
|
return -EOPNOTSUPP;
|
|
}
|
|
#endif /* CONFIG_BPF_SYSCALL */
|
|
#endif /* CONFIG_NET && CONFIG_BPF_SYSCALL */
|
|
|
|
#if defined(CONFIG_INET) && defined(CONFIG_BPF_SYSCALL)
|
|
void bpf_sk_reuseport_detach(struct sock *sk);
|
|
int bpf_fd_reuseport_array_lookup_elem(struct bpf_map *map, void *key,
|
|
void *value);
|
|
int bpf_fd_reuseport_array_update_elem(struct bpf_map *map, void *key,
|
|
void *value, u64 map_flags);
|
|
#else
|
|
static inline void bpf_sk_reuseport_detach(struct sock *sk)
|
|
{
|
|
}
|
|
|
|
#ifdef CONFIG_BPF_SYSCALL
|
|
static inline int bpf_fd_reuseport_array_lookup_elem(struct bpf_map *map,
|
|
void *key, void *value)
|
|
{
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static inline int bpf_fd_reuseport_array_update_elem(struct bpf_map *map,
|
|
void *key, void *value,
|
|
u64 map_flags)
|
|
{
|
|
return -EOPNOTSUPP;
|
|
}
|
|
#endif /* CONFIG_BPF_SYSCALL */
|
|
#endif /* defined(CONFIG_INET) && defined(CONFIG_BPF_SYSCALL) */
|
|
|
|
/* verifier prototypes for helper functions called from eBPF programs */
|
|
extern const struct bpf_func_proto bpf_map_lookup_elem_proto;
|
|
extern const struct bpf_func_proto bpf_map_update_elem_proto;
|
|
extern const struct bpf_func_proto bpf_map_delete_elem_proto;
|
|
extern const struct bpf_func_proto bpf_map_push_elem_proto;
|
|
extern const struct bpf_func_proto bpf_map_pop_elem_proto;
|
|
extern const struct bpf_func_proto bpf_map_peek_elem_proto;
|
|
|
|
extern const struct bpf_func_proto bpf_get_prandom_u32_proto;
|
|
extern const struct bpf_func_proto bpf_get_smp_processor_id_proto;
|
|
extern const struct bpf_func_proto bpf_get_numa_node_id_proto;
|
|
extern const struct bpf_func_proto bpf_tail_call_proto;
|
|
extern const struct bpf_func_proto bpf_ktime_get_ns_proto;
|
|
extern const struct bpf_func_proto bpf_ktime_get_boot_ns_proto;
|
|
extern const struct bpf_func_proto bpf_get_current_pid_tgid_proto;
|
|
extern const struct bpf_func_proto bpf_get_current_uid_gid_proto;
|
|
extern const struct bpf_func_proto bpf_get_current_comm_proto;
|
|
extern const struct bpf_func_proto bpf_get_stackid_proto;
|
|
extern const struct bpf_func_proto bpf_get_stack_proto;
|
|
extern const struct bpf_func_proto bpf_get_task_stack_proto;
|
|
extern const struct bpf_func_proto bpf_get_stackid_proto_pe;
|
|
extern const struct bpf_func_proto bpf_get_stack_proto_pe;
|
|
extern const struct bpf_func_proto bpf_sock_map_update_proto;
|
|
extern const struct bpf_func_proto bpf_sock_hash_update_proto;
|
|
extern const struct bpf_func_proto bpf_get_current_cgroup_id_proto;
|
|
extern const struct bpf_func_proto bpf_get_current_ancestor_cgroup_id_proto;
|
|
extern const struct bpf_func_proto bpf_msg_redirect_hash_proto;
|
|
extern const struct bpf_func_proto bpf_msg_redirect_map_proto;
|
|
extern const struct bpf_func_proto bpf_sk_redirect_hash_proto;
|
|
extern const struct bpf_func_proto bpf_sk_redirect_map_proto;
|
|
extern const struct bpf_func_proto bpf_spin_lock_proto;
|
|
extern const struct bpf_func_proto bpf_spin_unlock_proto;
|
|
extern const struct bpf_func_proto bpf_get_local_storage_proto;
|
|
extern const struct bpf_func_proto bpf_strtol_proto;
|
|
extern const struct bpf_func_proto bpf_strtoul_proto;
|
|
extern const struct bpf_func_proto bpf_tcp_sock_proto;
|
|
extern const struct bpf_func_proto bpf_jiffies64_proto;
|
|
extern const struct bpf_func_proto bpf_get_ns_current_pid_tgid_proto;
|
|
extern const struct bpf_func_proto bpf_event_output_data_proto;
|
|
extern const struct bpf_func_proto bpf_ringbuf_output_proto;
|
|
extern const struct bpf_func_proto bpf_ringbuf_reserve_proto;
|
|
extern const struct bpf_func_proto bpf_ringbuf_submit_proto;
|
|
extern const struct bpf_func_proto bpf_ringbuf_discard_proto;
|
|
extern const struct bpf_func_proto bpf_ringbuf_query_proto;
|
|
extern const struct bpf_func_proto bpf_skc_to_tcp6_sock_proto;
|
|
extern const struct bpf_func_proto bpf_skc_to_tcp_sock_proto;
|
|
extern const struct bpf_func_proto bpf_skc_to_tcp_timewait_sock_proto;
|
|
extern const struct bpf_func_proto bpf_skc_to_tcp_request_sock_proto;
|
|
extern const struct bpf_func_proto bpf_skc_to_udp6_sock_proto;
|
|
extern const struct bpf_func_proto bpf_copy_from_user_proto;
|
|
extern const struct bpf_func_proto bpf_snprintf_btf_proto;
|
|
extern const struct bpf_func_proto bpf_snprintf_proto;
|
|
extern const struct bpf_func_proto bpf_per_cpu_ptr_proto;
|
|
extern const struct bpf_func_proto bpf_this_cpu_ptr_proto;
|
|
extern const struct bpf_func_proto bpf_ktime_get_coarse_ns_proto;
|
|
extern const struct bpf_func_proto bpf_sock_from_file_proto;
|
|
extern const struct bpf_func_proto bpf_get_socket_ptr_cookie_proto;
|
|
extern const struct bpf_func_proto bpf_task_storage_get_proto;
|
|
extern const struct bpf_func_proto bpf_task_storage_delete_proto;
|
|
extern const struct bpf_func_proto bpf_for_each_map_elem_proto;
|
|
extern const struct bpf_func_proto bpf_btf_find_by_name_kind_proto;
|
|
extern const struct bpf_func_proto bpf_sk_setsockopt_proto;
|
|
extern const struct bpf_func_proto bpf_sk_getsockopt_proto;
|
|
|
|
const struct bpf_func_proto *tracing_prog_func_proto(
|
|
enum bpf_func_id func_id, const struct bpf_prog *prog);
|
|
|
|
/* Shared helpers among cBPF and eBPF. */
|
|
void bpf_user_rnd_init_once(void);
|
|
u64 bpf_user_rnd_u32(u64 r1, u64 r2, u64 r3, u64 r4, u64 r5);
|
|
u64 bpf_get_raw_cpu_id(u64 r1, u64 r2, u64 r3, u64 r4, u64 r5);
|
|
|
|
#if defined(CONFIG_NET)
|
|
bool bpf_sock_common_is_valid_access(int off, int size,
|
|
enum bpf_access_type type,
|
|
struct bpf_insn_access_aux *info);
|
|
bool bpf_sock_is_valid_access(int off, int size, enum bpf_access_type type,
|
|
struct bpf_insn_access_aux *info);
|
|
u32 bpf_sock_convert_ctx_access(enum bpf_access_type type,
|
|
const struct bpf_insn *si,
|
|
struct bpf_insn *insn_buf,
|
|
struct bpf_prog *prog,
|
|
u32 *target_size);
|
|
#else
|
|
static inline bool bpf_sock_common_is_valid_access(int off, int size,
|
|
enum bpf_access_type type,
|
|
struct bpf_insn_access_aux *info)
|
|
{
|
|
return false;
|
|
}
|
|
static inline bool bpf_sock_is_valid_access(int off, int size,
|
|
enum bpf_access_type type,
|
|
struct bpf_insn_access_aux *info)
|
|
{
|
|
return false;
|
|
}
|
|
static inline u32 bpf_sock_convert_ctx_access(enum bpf_access_type type,
|
|
const struct bpf_insn *si,
|
|
struct bpf_insn *insn_buf,
|
|
struct bpf_prog *prog,
|
|
u32 *target_size)
|
|
{
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
#ifdef CONFIG_INET
|
|
struct sk_reuseport_kern {
|
|
struct sk_buff *skb;
|
|
struct sock *sk;
|
|
struct sock *selected_sk;
|
|
struct sock *migrating_sk;
|
|
void *data_end;
|
|
u32 hash;
|
|
u32 reuseport_id;
|
|
bool bind_inany;
|
|
};
|
|
bool bpf_tcp_sock_is_valid_access(int off, int size, enum bpf_access_type type,
|
|
struct bpf_insn_access_aux *info);
|
|
|
|
u32 bpf_tcp_sock_convert_ctx_access(enum bpf_access_type type,
|
|
const struct bpf_insn *si,
|
|
struct bpf_insn *insn_buf,
|
|
struct bpf_prog *prog,
|
|
u32 *target_size);
|
|
|
|
bool bpf_xdp_sock_is_valid_access(int off, int size, enum bpf_access_type type,
|
|
struct bpf_insn_access_aux *info);
|
|
|
|
u32 bpf_xdp_sock_convert_ctx_access(enum bpf_access_type type,
|
|
const struct bpf_insn *si,
|
|
struct bpf_insn *insn_buf,
|
|
struct bpf_prog *prog,
|
|
u32 *target_size);
|
|
#else
|
|
static inline bool bpf_tcp_sock_is_valid_access(int off, int size,
|
|
enum bpf_access_type type,
|
|
struct bpf_insn_access_aux *info)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
static inline u32 bpf_tcp_sock_convert_ctx_access(enum bpf_access_type type,
|
|
const struct bpf_insn *si,
|
|
struct bpf_insn *insn_buf,
|
|
struct bpf_prog *prog,
|
|
u32 *target_size)
|
|
{
|
|
return 0;
|
|
}
|
|
static inline bool bpf_xdp_sock_is_valid_access(int off, int size,
|
|
enum bpf_access_type type,
|
|
struct bpf_insn_access_aux *info)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
static inline u32 bpf_xdp_sock_convert_ctx_access(enum bpf_access_type type,
|
|
const struct bpf_insn *si,
|
|
struct bpf_insn *insn_buf,
|
|
struct bpf_prog *prog,
|
|
u32 *target_size)
|
|
{
|
|
return 0;
|
|
}
|
|
#endif /* CONFIG_INET */
|
|
|
|
enum bpf_text_poke_type {
|
|
BPF_MOD_CALL,
|
|
BPF_MOD_JUMP,
|
|
};
|
|
|
|
int bpf_arch_text_poke(void *ip, enum bpf_text_poke_type t,
|
|
void *addr1, void *addr2);
|
|
|
|
struct btf_id_set;
|
|
bool btf_id_set_contains(const struct btf_id_set *set, u32 id);
|
|
|
|
int bpf_bprintf_prepare(char *fmt, u32 fmt_size, const u64 *raw_args,
|
|
u32 **bin_buf, u32 num_args);
|
|
void bpf_bprintf_cleanup(void);
|
|
|
|
#endif /* _LINUX_BPF_H */
|