forked from mirrors/linux
		
	 c0e19f2c9a
			
		
	
	
		c0e19f2c9a
		
	
	
	
	
		
			
			Previous patch adds 1:1 mapping between all 211 LSM hooks
and bpf_cgroup program array. Instead of reserving a slot per
possible hook, reserve 10 slots per cgroup for lsm programs.
Those slots are dynamically allocated on demand and reclaimed.
struct cgroup_bpf {
	struct bpf_prog_array *    effective[33];        /*     0   264 */
	/* --- cacheline 4 boundary (256 bytes) was 8 bytes ago --- */
	struct hlist_head          progs[33];            /*   264   264 */
	/* --- cacheline 8 boundary (512 bytes) was 16 bytes ago --- */
	u8                         flags[33];            /*   528    33 */
	/* XXX 7 bytes hole, try to pack */
	struct list_head           storages;             /*   568    16 */
	/* --- cacheline 9 boundary (576 bytes) was 8 bytes ago --- */
	struct bpf_prog_array *    inactive;             /*   584     8 */
	struct percpu_ref          refcnt;               /*   592    16 */
	struct work_struct         release_work;         /*   608    72 */
	/* size: 680, cachelines: 11, members: 7 */
	/* sum members: 673, holes: 1, sum holes: 7 */
	/* last cacheline: 40 bytes */
};
Reviewed-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Stanislav Fomichev <sdf@google.com>
Link: https://lore.kernel.org/r/20220628174314.1216643-5-sdf@google.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
		
	
			
		
			
				
	
	
		
			79 lines
		
	
	
	
		
			2 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			79 lines
		
	
	
	
		
			2 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /* SPDX-License-Identifier: GPL-2.0 */
 | |
| #ifndef _BPF_CGROUP_DEFS_H
 | |
| #define _BPF_CGROUP_DEFS_H
 | |
| 
 | |
| #ifdef CONFIG_CGROUP_BPF
 | |
| 
 | |
| #include <linux/list.h>
 | |
| #include <linux/percpu-refcount.h>
 | |
| #include <linux/workqueue.h>
 | |
| 
 | |
| struct bpf_prog_array;
 | |
| 
 | |
| #ifdef CONFIG_BPF_LSM
 | |
| /* Maximum number of concurrently attachable per-cgroup LSM hooks. */
 | |
| #define CGROUP_LSM_NUM 10
 | |
| #else
 | |
| #define CGROUP_LSM_NUM 0
 | |
| #endif
 | |
| 
 | |
| enum cgroup_bpf_attach_type {
 | |
| 	CGROUP_BPF_ATTACH_TYPE_INVALID = -1,
 | |
| 	CGROUP_INET_INGRESS = 0,
 | |
| 	CGROUP_INET_EGRESS,
 | |
| 	CGROUP_INET_SOCK_CREATE,
 | |
| 	CGROUP_SOCK_OPS,
 | |
| 	CGROUP_DEVICE,
 | |
| 	CGROUP_INET4_BIND,
 | |
| 	CGROUP_INET6_BIND,
 | |
| 	CGROUP_INET4_CONNECT,
 | |
| 	CGROUP_INET6_CONNECT,
 | |
| 	CGROUP_INET4_POST_BIND,
 | |
| 	CGROUP_INET6_POST_BIND,
 | |
| 	CGROUP_UDP4_SENDMSG,
 | |
| 	CGROUP_UDP6_SENDMSG,
 | |
| 	CGROUP_SYSCTL,
 | |
| 	CGROUP_UDP4_RECVMSG,
 | |
| 	CGROUP_UDP6_RECVMSG,
 | |
| 	CGROUP_GETSOCKOPT,
 | |
| 	CGROUP_SETSOCKOPT,
 | |
| 	CGROUP_INET4_GETPEERNAME,
 | |
| 	CGROUP_INET6_GETPEERNAME,
 | |
| 	CGROUP_INET4_GETSOCKNAME,
 | |
| 	CGROUP_INET6_GETSOCKNAME,
 | |
| 	CGROUP_INET_SOCK_RELEASE,
 | |
| 	CGROUP_LSM_START,
 | |
| 	CGROUP_LSM_END = CGROUP_LSM_START + CGROUP_LSM_NUM - 1,
 | |
| 	MAX_CGROUP_BPF_ATTACH_TYPE
 | |
| };
 | |
| 
 | |
| struct cgroup_bpf {
 | |
| 	/* array of effective progs in this cgroup */
 | |
| 	struct bpf_prog_array __rcu *effective[MAX_CGROUP_BPF_ATTACH_TYPE];
 | |
| 
 | |
| 	/* attached progs to this cgroup and attach flags
 | |
| 	 * when flags == 0 or BPF_F_ALLOW_OVERRIDE the progs list will
 | |
| 	 * have either zero or one element
 | |
| 	 * when BPF_F_ALLOW_MULTI the list can have up to BPF_CGROUP_MAX_PROGS
 | |
| 	 */
 | |
| 	struct hlist_head progs[MAX_CGROUP_BPF_ATTACH_TYPE];
 | |
| 	u8 flags[MAX_CGROUP_BPF_ATTACH_TYPE];
 | |
| 
 | |
| 	/* list of cgroup shared storages */
 | |
| 	struct list_head storages;
 | |
| 
 | |
| 	/* temp storage for effective prog array used by prog_attach/detach */
 | |
| 	struct bpf_prog_array *inactive;
 | |
| 
 | |
| 	/* reference counter used to detach bpf programs after cgroup removal */
 | |
| 	struct percpu_ref refcnt;
 | |
| 
 | |
| 	/* cgroup_bpf is released using a work queue */
 | |
| 	struct work_struct release_work;
 | |
| };
 | |
| 
 | |
| #else /* CONFIG_CGROUP_BPF */
 | |
| struct cgroup_bpf {};
 | |
| #endif /* CONFIG_CGROUP_BPF */
 | |
| 
 | |
| #endif
 |