mirror of
				https://github.com/torvalds/linux.git
				synced 2025-10-31 00:28:52 +02:00 
			
		
		
		
	 f88886de09
			
		
	
	
		f88886de09
		
	
	
	
	
		
			
			Add namespace to BPF internal symbols used by light skeleton
to prevent abuse and document with the code their allowed usage.
Fixes: b1d18a7574 ("bpf: Extend sys_bpf commands for bpf_syscall programs.")
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
Acked-by: Kumar Kartikeya Dwivedi <memxor@gmail.com>
Link: https://lore.kernel.org/bpf/20250425014542.62385-1-alexei.starovoitov@gmail.com
		
	
			
		
			
				
	
	
		
			94 lines
		
	
	
	
		
			2.1 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			94 lines
		
	
	
	
		
			2.1 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| // SPDX-License-Identifier: GPL-2.0
 | |
| #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
 | |
| #include <linux/init.h>
 | |
| #include <linux/module.h>
 | |
| #include "bpf_preload.h"
 | |
| #if __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__
 | |
| #include "iterators/iterators.lskel-little-endian.h"
 | |
| #else
 | |
| #include "iterators/iterators.lskel-big-endian.h"
 | |
| #endif
 | |
| 
 | |
| static struct bpf_link *maps_link, *progs_link;
 | |
| static struct iterators_bpf *skel;
 | |
| 
 | |
| static void free_links_and_skel(void)
 | |
| {
 | |
| 	if (!IS_ERR_OR_NULL(maps_link))
 | |
| 		bpf_link_put(maps_link);
 | |
| 	if (!IS_ERR_OR_NULL(progs_link))
 | |
| 		bpf_link_put(progs_link);
 | |
| 	iterators_bpf__destroy(skel);
 | |
| }
 | |
| 
 | |
| static int preload(struct bpf_preload_info *obj)
 | |
| {
 | |
| 	strscpy(obj[0].link_name, "maps.debug", sizeof(obj[0].link_name));
 | |
| 	obj[0].link = maps_link;
 | |
| 	strscpy(obj[1].link_name, "progs.debug", sizeof(obj[1].link_name));
 | |
| 	obj[1].link = progs_link;
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| static struct bpf_preload_ops ops = {
 | |
| 	.preload = preload,
 | |
| 	.owner = THIS_MODULE,
 | |
| };
 | |
| 
 | |
| static int load_skel(void)
 | |
| {
 | |
| 	int err;
 | |
| 
 | |
| 	skel = iterators_bpf__open();
 | |
| 	if (!skel)
 | |
| 		return -ENOMEM;
 | |
| 	err = iterators_bpf__load(skel);
 | |
| 	if (err)
 | |
| 		goto out;
 | |
| 	err = iterators_bpf__attach(skel);
 | |
| 	if (err)
 | |
| 		goto out;
 | |
| 	maps_link = bpf_link_get_from_fd(skel->links.dump_bpf_map_fd);
 | |
| 	if (IS_ERR(maps_link)) {
 | |
| 		err = PTR_ERR(maps_link);
 | |
| 		goto out;
 | |
| 	}
 | |
| 	progs_link = bpf_link_get_from_fd(skel->links.dump_bpf_prog_fd);
 | |
| 	if (IS_ERR(progs_link)) {
 | |
| 		err = PTR_ERR(progs_link);
 | |
| 		goto out;
 | |
| 	}
 | |
| 	/* Avoid taking over stdin/stdout/stderr of init process. Zeroing out
 | |
| 	 * makes skel_closenz() a no-op later in iterators_bpf__destroy().
 | |
| 	 */
 | |
| 	close_fd(skel->links.dump_bpf_map_fd);
 | |
| 	skel->links.dump_bpf_map_fd = 0;
 | |
| 	close_fd(skel->links.dump_bpf_prog_fd);
 | |
| 	skel->links.dump_bpf_prog_fd = 0;
 | |
| 	return 0;
 | |
| out:
 | |
| 	free_links_and_skel();
 | |
| 	return err;
 | |
| }
 | |
| 
 | |
| static int __init load(void)
 | |
| {
 | |
| 	int err;
 | |
| 
 | |
| 	err = load_skel();
 | |
| 	if (err)
 | |
| 		return err;
 | |
| 	bpf_preload_ops = &ops;
 | |
| 	return err;
 | |
| }
 | |
| 
 | |
| static void __exit fini(void)
 | |
| {
 | |
| 	bpf_preload_ops = NULL;
 | |
| 	free_links_and_skel();
 | |
| }
 | |
| late_initcall(load);
 | |
| module_exit(fini);
 | |
| MODULE_IMPORT_NS("BPF_INTERNAL");
 | |
| MODULE_LICENSE("GPL");
 | |
| MODULE_DESCRIPTION("Embedded BPF programs for introspection in bpffs");
 |