[PATCH bpf-next 0/5] Make struct bpf_cpumask RCU safe
From: David Vernet
Date: Wed Mar 15 2023 - 21:41:30 EST
The struct bpf_cpumask type is currently not RCU safe. It uses the
bpf_mem_cache_{alloc,free}() APIs to allocate and release cpumasks, and
those allocations may be reused before an RCU grace period has elapsed.
We want to be able to enable using this pattern in BPF programs:
private(MASK) static struct bpf_cpumask __kptr *global;
int BPF_PROG(prog, ...)
{
struct bpf_cpumask *cpumask;
bpf_rcu_read_lock();
cpumask = global;
if (!cpumask) {
bpf_rcu_read_unlock();
return -1;
}
bpf_cpumask_setall(cpumask);
...
bpf_rcu_read_unlock();
}
In other words, to be able to pass a kptr to KF_RCU bpf_cpumask kfuncs
without requiring the acquisition and release of refcounts using
bpf_cpumask_kptr_get(). This patchset enables this by making the struct
bpf_cpumask type RCU safe, and removing the bpf_cpumask_kptr_get()
function.
David Vernet (5):
bpf: Free struct bpf_cpumask in call_rcu handler
bpf: Mark struct bpf_cpumask as rcu protected
bpf/selftests: Test using global cpumask kptr with RCU
bpf: Remove bpf_cpumask_kptr_get() kfunc
bpf,docs: Remove bpf_cpumask_kptr_get() from documentation
Documentation/bpf/cpumasks.rst | 30 +++-----
kernel/bpf/cpumask.c | 37 +++-------
kernel/bpf/verifier.c | 1 +
.../selftests/bpf/prog_tests/cpumask.c | 2 +-
.../selftests/bpf/progs/cpumask_common.h | 7 +-
.../selftests/bpf/progs/cpumask_failure.c | 68 +++++++++++++++----
.../selftests/bpf/progs/cpumask_success.c | 29 ++++----
7 files changed, 95 insertions(+), 79 deletions(-)
--
2.39.0