mirror of
https://github.com/Fishwaldo/Star64_linux.git
synced 2025-06-25 08:02:56 +00:00
sock_map: Introduce BPF_SK_SKB_VERDICT
Reusing BPF_SK_SKB_STREAM_VERDICT is possible but its name is confusing and more importantly we still want to distinguish them from user-space. So we can just reuse the stream verdict code but introduce a new type of eBPF program, skb_verdict. Users are not allowed to attach stream_verdict and skb_verdict programs to the same map. Signed-off-by: Cong Wang <cong.wang@bytedance.com> Signed-off-by: Alexei Starovoitov <ast@kernel.org> Acked-by: John Fastabend <john.fastabend@gmail.com> Link: https://lore.kernel.org/bpf/20210331023237.41094-10-xiyou.wangcong@gmail.com
This commit is contained in:
parent
b017055255
commit
a7ba4558e6
8 changed files with 38 additions and 1 deletions
|
@ -156,6 +156,8 @@ static void sock_map_del_link(struct sock *sk,
|
|||
strp_stop = true;
|
||||
if (psock->saved_data_ready && stab->progs.stream_verdict)
|
||||
verdict_stop = true;
|
||||
if (psock->saved_data_ready && stab->progs.skb_verdict)
|
||||
verdict_stop = true;
|
||||
list_del(&link->list);
|
||||
sk_psock_free_link(link);
|
||||
}
|
||||
|
@ -232,6 +234,7 @@ static int sock_map_link(struct bpf_map *map, struct sock *sk)
|
|||
struct sk_psock_progs *progs = sock_map_progs(map);
|
||||
struct bpf_prog *stream_verdict = NULL;
|
||||
struct bpf_prog *stream_parser = NULL;
|
||||
struct bpf_prog *skb_verdict = NULL;
|
||||
struct bpf_prog *msg_parser = NULL;
|
||||
struct sk_psock *psock;
|
||||
int ret;
|
||||
|
@ -268,6 +271,15 @@ static int sock_map_link(struct bpf_map *map, struct sock *sk)
|
|||
}
|
||||
}
|
||||
|
||||
skb_verdict = READ_ONCE(progs->skb_verdict);
|
||||
if (skb_verdict) {
|
||||
skb_verdict = bpf_prog_inc_not_zero(skb_verdict);
|
||||
if (IS_ERR(skb_verdict)) {
|
||||
ret = PTR_ERR(skb_verdict);
|
||||
goto out_put_msg_parser;
|
||||
}
|
||||
}
|
||||
|
||||
no_progs:
|
||||
psock = sock_map_psock_get_checked(sk);
|
||||
if (IS_ERR(psock)) {
|
||||
|
@ -278,6 +290,9 @@ no_progs:
|
|||
if (psock) {
|
||||
if ((msg_parser && READ_ONCE(psock->progs.msg_parser)) ||
|
||||
(stream_parser && READ_ONCE(psock->progs.stream_parser)) ||
|
||||
(skb_verdict && READ_ONCE(psock->progs.skb_verdict)) ||
|
||||
(skb_verdict && READ_ONCE(psock->progs.stream_verdict)) ||
|
||||
(stream_verdict && READ_ONCE(psock->progs.skb_verdict)) ||
|
||||
(stream_verdict && READ_ONCE(psock->progs.stream_verdict))) {
|
||||
sk_psock_put(sk, psock);
|
||||
ret = -EBUSY;
|
||||
|
@ -309,6 +324,9 @@ no_progs:
|
|||
} else if (!stream_parser && stream_verdict && !psock->saved_data_ready) {
|
||||
psock_set_prog(&psock->progs.stream_verdict, stream_verdict);
|
||||
sk_psock_start_verdict(sk,psock);
|
||||
} else if (!stream_verdict && skb_verdict && !psock->saved_data_ready) {
|
||||
psock_set_prog(&psock->progs.skb_verdict, skb_verdict);
|
||||
sk_psock_start_verdict(sk, psock);
|
||||
}
|
||||
write_unlock_bh(&sk->sk_callback_lock);
|
||||
return 0;
|
||||
|
@ -317,6 +335,9 @@ out_unlock_drop:
|
|||
out_drop:
|
||||
sk_psock_put(sk, psock);
|
||||
out_progs:
|
||||
if (skb_verdict)
|
||||
bpf_prog_put(skb_verdict);
|
||||
out_put_msg_parser:
|
||||
if (msg_parser)
|
||||
bpf_prog_put(msg_parser);
|
||||
out_put_stream_parser:
|
||||
|
@ -1442,8 +1463,15 @@ static int sock_map_prog_update(struct bpf_map *map, struct bpf_prog *prog,
|
|||
break;
|
||||
#endif
|
||||
case BPF_SK_SKB_STREAM_VERDICT:
|
||||
if (progs->skb_verdict)
|
||||
return -EBUSY;
|
||||
pprog = &progs->stream_verdict;
|
||||
break;
|
||||
case BPF_SK_SKB_VERDICT:
|
||||
if (progs->stream_verdict)
|
||||
return -EBUSY;
|
||||
pprog = &progs->skb_verdict;
|
||||
break;
|
||||
default:
|
||||
return -EOPNOTSUPP;
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue