xref: /linux-6.15/kernel/bpf/stackmap.c (revision bd475643)
1d5a3b1f6SAlexei Starovoitov /* Copyright (c) 2016 Facebook
2d5a3b1f6SAlexei Starovoitov  *
3d5a3b1f6SAlexei Starovoitov  * This program is free software; you can redistribute it and/or
4d5a3b1f6SAlexei Starovoitov  * modify it under the terms of version 2 of the GNU General Public
5d5a3b1f6SAlexei Starovoitov  * License as published by the Free Software Foundation.
6d5a3b1f6SAlexei Starovoitov  */
7d5a3b1f6SAlexei Starovoitov #include <linux/bpf.h>
8d5a3b1f6SAlexei Starovoitov #include <linux/jhash.h>
9d5a3b1f6SAlexei Starovoitov #include <linux/filter.h>
10d5a3b1f6SAlexei Starovoitov #include <linux/stacktrace.h>
11d5a3b1f6SAlexei Starovoitov #include <linux/perf_event.h>
12557c0c6eSAlexei Starovoitov #include "percpu_freelist.h"
13d5a3b1f6SAlexei Starovoitov 
146e71b04aSChenbo Feng #define STACK_CREATE_FLAG_MASK \
156e71b04aSChenbo Feng 	(BPF_F_NUMA_NODE | BPF_F_RDONLY | BPF_F_WRONLY)
166e71b04aSChenbo Feng 
17d5a3b1f6SAlexei Starovoitov struct stack_map_bucket {
18557c0c6eSAlexei Starovoitov 	struct pcpu_freelist_node fnode;
19d5a3b1f6SAlexei Starovoitov 	u32 hash;
20d5a3b1f6SAlexei Starovoitov 	u32 nr;
21d5a3b1f6SAlexei Starovoitov 	u64 ip[];
22d5a3b1f6SAlexei Starovoitov };
23d5a3b1f6SAlexei Starovoitov 
24d5a3b1f6SAlexei Starovoitov struct bpf_stack_map {
25d5a3b1f6SAlexei Starovoitov 	struct bpf_map map;
26557c0c6eSAlexei Starovoitov 	void *elems;
27557c0c6eSAlexei Starovoitov 	struct pcpu_freelist freelist;
28d5a3b1f6SAlexei Starovoitov 	u32 n_buckets;
29557c0c6eSAlexei Starovoitov 	struct stack_map_bucket *buckets[];
30d5a3b1f6SAlexei Starovoitov };
31d5a3b1f6SAlexei Starovoitov 
32557c0c6eSAlexei Starovoitov static int prealloc_elems_and_freelist(struct bpf_stack_map *smap)
33557c0c6eSAlexei Starovoitov {
34557c0c6eSAlexei Starovoitov 	u32 elem_size = sizeof(struct stack_map_bucket) + smap->map.value_size;
35557c0c6eSAlexei Starovoitov 	int err;
36557c0c6eSAlexei Starovoitov 
3796eabe7aSMartin KaFai Lau 	smap->elems = bpf_map_area_alloc(elem_size * smap->map.max_entries,
3896eabe7aSMartin KaFai Lau 					 smap->map.numa_node);
39557c0c6eSAlexei Starovoitov 	if (!smap->elems)
40557c0c6eSAlexei Starovoitov 		return -ENOMEM;
41557c0c6eSAlexei Starovoitov 
42557c0c6eSAlexei Starovoitov 	err = pcpu_freelist_init(&smap->freelist);
43557c0c6eSAlexei Starovoitov 	if (err)
44557c0c6eSAlexei Starovoitov 		goto free_elems;
45557c0c6eSAlexei Starovoitov 
46557c0c6eSAlexei Starovoitov 	pcpu_freelist_populate(&smap->freelist, smap->elems, elem_size,
47557c0c6eSAlexei Starovoitov 			       smap->map.max_entries);
48557c0c6eSAlexei Starovoitov 	return 0;
49557c0c6eSAlexei Starovoitov 
50557c0c6eSAlexei Starovoitov free_elems:
51d407bd25SDaniel Borkmann 	bpf_map_area_free(smap->elems);
52557c0c6eSAlexei Starovoitov 	return err;
53557c0c6eSAlexei Starovoitov }
54557c0c6eSAlexei Starovoitov 
55d5a3b1f6SAlexei Starovoitov /* Called from syscall */
56d5a3b1f6SAlexei Starovoitov static struct bpf_map *stack_map_alloc(union bpf_attr *attr)
57d5a3b1f6SAlexei Starovoitov {
58d5a3b1f6SAlexei Starovoitov 	u32 value_size = attr->value_size;
59d5a3b1f6SAlexei Starovoitov 	struct bpf_stack_map *smap;
60d5a3b1f6SAlexei Starovoitov 	u64 cost, n_buckets;
61d5a3b1f6SAlexei Starovoitov 	int err;
62d5a3b1f6SAlexei Starovoitov 
63d5a3b1f6SAlexei Starovoitov 	if (!capable(CAP_SYS_ADMIN))
64d5a3b1f6SAlexei Starovoitov 		return ERR_PTR(-EPERM);
65d5a3b1f6SAlexei Starovoitov 
666e71b04aSChenbo Feng 	if (attr->map_flags & ~STACK_CREATE_FLAG_MASK)
67823707b6SAlexei Starovoitov 		return ERR_PTR(-EINVAL);
68823707b6SAlexei Starovoitov 
69d5a3b1f6SAlexei Starovoitov 	/* check sanity of attributes */
70d5a3b1f6SAlexei Starovoitov 	if (attr->max_entries == 0 || attr->key_size != 4 ||
71d5a3b1f6SAlexei Starovoitov 	    value_size < 8 || value_size % 8 ||
72c5dfd78eSArnaldo Carvalho de Melo 	    value_size / 8 > sysctl_perf_event_max_stack)
73d5a3b1f6SAlexei Starovoitov 		return ERR_PTR(-EINVAL);
74d5a3b1f6SAlexei Starovoitov 
75d5a3b1f6SAlexei Starovoitov 	/* hash table size must be power of 2 */
76d5a3b1f6SAlexei Starovoitov 	n_buckets = roundup_pow_of_two(attr->max_entries);
77d5a3b1f6SAlexei Starovoitov 
78d5a3b1f6SAlexei Starovoitov 	cost = n_buckets * sizeof(struct stack_map_bucket *) + sizeof(*smap);
79d5a3b1f6SAlexei Starovoitov 	if (cost >= U32_MAX - PAGE_SIZE)
80d5a3b1f6SAlexei Starovoitov 		return ERR_PTR(-E2BIG);
81d5a3b1f6SAlexei Starovoitov 
8296eabe7aSMartin KaFai Lau 	smap = bpf_map_area_alloc(cost, bpf_map_attr_numa_node(attr));
83d5a3b1f6SAlexei Starovoitov 	if (!smap)
84d5a3b1f6SAlexei Starovoitov 		return ERR_PTR(-ENOMEM);
85d5a3b1f6SAlexei Starovoitov 
86d5a3b1f6SAlexei Starovoitov 	err = -E2BIG;
87d5a3b1f6SAlexei Starovoitov 	cost += n_buckets * (value_size + sizeof(struct stack_map_bucket));
88d5a3b1f6SAlexei Starovoitov 	if (cost >= U32_MAX - PAGE_SIZE)
89d5a3b1f6SAlexei Starovoitov 		goto free_smap;
90d5a3b1f6SAlexei Starovoitov 
91*bd475643SJakub Kicinski 	bpf_map_init_from_attr(&smap->map, attr);
92d5a3b1f6SAlexei Starovoitov 	smap->map.value_size = value_size;
93d5a3b1f6SAlexei Starovoitov 	smap->n_buckets = n_buckets;
94d5a3b1f6SAlexei Starovoitov 	smap->map.pages = round_up(cost, PAGE_SIZE) >> PAGE_SHIFT;
95d5a3b1f6SAlexei Starovoitov 
96557c0c6eSAlexei Starovoitov 	err = bpf_map_precharge_memlock(smap->map.pages);
97557c0c6eSAlexei Starovoitov 	if (err)
98557c0c6eSAlexei Starovoitov 		goto free_smap;
99557c0c6eSAlexei Starovoitov 
10097c79a38SArnaldo Carvalho de Melo 	err = get_callchain_buffers(sysctl_perf_event_max_stack);
101d5a3b1f6SAlexei Starovoitov 	if (err)
102d5a3b1f6SAlexei Starovoitov 		goto free_smap;
103d5a3b1f6SAlexei Starovoitov 
104557c0c6eSAlexei Starovoitov 	err = prealloc_elems_and_freelist(smap);
105557c0c6eSAlexei Starovoitov 	if (err)
106557c0c6eSAlexei Starovoitov 		goto put_buffers;
107557c0c6eSAlexei Starovoitov 
108d5a3b1f6SAlexei Starovoitov 	return &smap->map;
109d5a3b1f6SAlexei Starovoitov 
110557c0c6eSAlexei Starovoitov put_buffers:
111557c0c6eSAlexei Starovoitov 	put_callchain_buffers();
112d5a3b1f6SAlexei Starovoitov free_smap:
113d407bd25SDaniel Borkmann 	bpf_map_area_free(smap);
114d5a3b1f6SAlexei Starovoitov 	return ERR_PTR(err);
115d5a3b1f6SAlexei Starovoitov }
116d5a3b1f6SAlexei Starovoitov 
117f3694e00SDaniel Borkmann BPF_CALL_3(bpf_get_stackid, struct pt_regs *, regs, struct bpf_map *, map,
118f3694e00SDaniel Borkmann 	   u64, flags)
119d5a3b1f6SAlexei Starovoitov {
120d5a3b1f6SAlexei Starovoitov 	struct bpf_stack_map *smap = container_of(map, struct bpf_stack_map, map);
121d5a3b1f6SAlexei Starovoitov 	struct perf_callchain_entry *trace;
122d5a3b1f6SAlexei Starovoitov 	struct stack_map_bucket *bucket, *new_bucket, *old_bucket;
123d5a3b1f6SAlexei Starovoitov 	u32 max_depth = map->value_size / 8;
124c5dfd78eSArnaldo Carvalho de Melo 	/* stack_map_alloc() checks that max_depth <= sysctl_perf_event_max_stack */
125c5dfd78eSArnaldo Carvalho de Melo 	u32 init_nr = sysctl_perf_event_max_stack - max_depth;
126d5a3b1f6SAlexei Starovoitov 	u32 skip = flags & BPF_F_SKIP_FIELD_MASK;
127d5a3b1f6SAlexei Starovoitov 	u32 hash, id, trace_nr, trace_len;
128d5a3b1f6SAlexei Starovoitov 	bool user = flags & BPF_F_USER_STACK;
129d5a3b1f6SAlexei Starovoitov 	bool kernel = !user;
130d5a3b1f6SAlexei Starovoitov 	u64 *ips;
131d5a3b1f6SAlexei Starovoitov 
132d5a3b1f6SAlexei Starovoitov 	if (unlikely(flags & ~(BPF_F_SKIP_FIELD_MASK | BPF_F_USER_STACK |
133d5a3b1f6SAlexei Starovoitov 			       BPF_F_FAST_STACK_CMP | BPF_F_REUSE_STACKID)))
134d5a3b1f6SAlexei Starovoitov 		return -EINVAL;
135d5a3b1f6SAlexei Starovoitov 
136cfbcf468SArnaldo Carvalho de Melo 	trace = get_perf_callchain(regs, init_nr, kernel, user,
137cfbcf468SArnaldo Carvalho de Melo 				   sysctl_perf_event_max_stack, false, false);
138d5a3b1f6SAlexei Starovoitov 
139d5a3b1f6SAlexei Starovoitov 	if (unlikely(!trace))
140d5a3b1f6SAlexei Starovoitov 		/* couldn't fetch the stack trace */
141d5a3b1f6SAlexei Starovoitov 		return -EFAULT;
142d5a3b1f6SAlexei Starovoitov 
143d5a3b1f6SAlexei Starovoitov 	/* get_perf_callchain() guarantees that trace->nr >= init_nr
144c5dfd78eSArnaldo Carvalho de Melo 	 * and trace-nr <= sysctl_perf_event_max_stack, so trace_nr <= max_depth
145d5a3b1f6SAlexei Starovoitov 	 */
146d5a3b1f6SAlexei Starovoitov 	trace_nr = trace->nr - init_nr;
147d5a3b1f6SAlexei Starovoitov 
148d5a3b1f6SAlexei Starovoitov 	if (trace_nr <= skip)
149d5a3b1f6SAlexei Starovoitov 		/* skipping more than usable stack trace */
150d5a3b1f6SAlexei Starovoitov 		return -EFAULT;
151d5a3b1f6SAlexei Starovoitov 
152d5a3b1f6SAlexei Starovoitov 	trace_nr -= skip;
153d5a3b1f6SAlexei Starovoitov 	trace_len = trace_nr * sizeof(u64);
154d5a3b1f6SAlexei Starovoitov 	ips = trace->ip + skip + init_nr;
155d5a3b1f6SAlexei Starovoitov 	hash = jhash2((u32 *)ips, trace_len / sizeof(u32), 0);
156d5a3b1f6SAlexei Starovoitov 	id = hash & (smap->n_buckets - 1);
157557c0c6eSAlexei Starovoitov 	bucket = READ_ONCE(smap->buckets[id]);
158d5a3b1f6SAlexei Starovoitov 
159d5a3b1f6SAlexei Starovoitov 	if (bucket && bucket->hash == hash) {
160d5a3b1f6SAlexei Starovoitov 		if (flags & BPF_F_FAST_STACK_CMP)
161d5a3b1f6SAlexei Starovoitov 			return id;
162d5a3b1f6SAlexei Starovoitov 		if (bucket->nr == trace_nr &&
163d5a3b1f6SAlexei Starovoitov 		    memcmp(bucket->ip, ips, trace_len) == 0)
164d5a3b1f6SAlexei Starovoitov 			return id;
165d5a3b1f6SAlexei Starovoitov 	}
166d5a3b1f6SAlexei Starovoitov 
167d5a3b1f6SAlexei Starovoitov 	/* this call stack is not in the map, try to add it */
168d5a3b1f6SAlexei Starovoitov 	if (bucket && !(flags & BPF_F_REUSE_STACKID))
169d5a3b1f6SAlexei Starovoitov 		return -EEXIST;
170d5a3b1f6SAlexei Starovoitov 
171557c0c6eSAlexei Starovoitov 	new_bucket = (struct stack_map_bucket *)
172557c0c6eSAlexei Starovoitov 		pcpu_freelist_pop(&smap->freelist);
173d5a3b1f6SAlexei Starovoitov 	if (unlikely(!new_bucket))
174d5a3b1f6SAlexei Starovoitov 		return -ENOMEM;
175d5a3b1f6SAlexei Starovoitov 
176d5a3b1f6SAlexei Starovoitov 	memcpy(new_bucket->ip, ips, trace_len);
177d5a3b1f6SAlexei Starovoitov 	new_bucket->hash = hash;
178d5a3b1f6SAlexei Starovoitov 	new_bucket->nr = trace_nr;
179d5a3b1f6SAlexei Starovoitov 
180d5a3b1f6SAlexei Starovoitov 	old_bucket = xchg(&smap->buckets[id], new_bucket);
181d5a3b1f6SAlexei Starovoitov 	if (old_bucket)
182557c0c6eSAlexei Starovoitov 		pcpu_freelist_push(&smap->freelist, &old_bucket->fnode);
183d5a3b1f6SAlexei Starovoitov 	return id;
184d5a3b1f6SAlexei Starovoitov }
185d5a3b1f6SAlexei Starovoitov 
186d5a3b1f6SAlexei Starovoitov const struct bpf_func_proto bpf_get_stackid_proto = {
187d5a3b1f6SAlexei Starovoitov 	.func		= bpf_get_stackid,
188d5a3b1f6SAlexei Starovoitov 	.gpl_only	= true,
189d5a3b1f6SAlexei Starovoitov 	.ret_type	= RET_INTEGER,
190d5a3b1f6SAlexei Starovoitov 	.arg1_type	= ARG_PTR_TO_CTX,
191d5a3b1f6SAlexei Starovoitov 	.arg2_type	= ARG_CONST_MAP_PTR,
192d5a3b1f6SAlexei Starovoitov 	.arg3_type	= ARG_ANYTHING,
193d5a3b1f6SAlexei Starovoitov };
194d5a3b1f6SAlexei Starovoitov 
195557c0c6eSAlexei Starovoitov /* Called from eBPF program */
196d5a3b1f6SAlexei Starovoitov static void *stack_map_lookup_elem(struct bpf_map *map, void *key)
197d5a3b1f6SAlexei Starovoitov {
198557c0c6eSAlexei Starovoitov 	return NULL;
199557c0c6eSAlexei Starovoitov }
200557c0c6eSAlexei Starovoitov 
201557c0c6eSAlexei Starovoitov /* Called from syscall */
202557c0c6eSAlexei Starovoitov int bpf_stackmap_copy(struct bpf_map *map, void *key, void *value)
203557c0c6eSAlexei Starovoitov {
204d5a3b1f6SAlexei Starovoitov 	struct bpf_stack_map *smap = container_of(map, struct bpf_stack_map, map);
205557c0c6eSAlexei Starovoitov 	struct stack_map_bucket *bucket, *old_bucket;
206557c0c6eSAlexei Starovoitov 	u32 id = *(u32 *)key, trace_len;
207d5a3b1f6SAlexei Starovoitov 
208d5a3b1f6SAlexei Starovoitov 	if (unlikely(id >= smap->n_buckets))
209557c0c6eSAlexei Starovoitov 		return -ENOENT;
210557c0c6eSAlexei Starovoitov 
211557c0c6eSAlexei Starovoitov 	bucket = xchg(&smap->buckets[id], NULL);
212557c0c6eSAlexei Starovoitov 	if (!bucket)
213557c0c6eSAlexei Starovoitov 		return -ENOENT;
214557c0c6eSAlexei Starovoitov 
215557c0c6eSAlexei Starovoitov 	trace_len = bucket->nr * sizeof(u64);
216557c0c6eSAlexei Starovoitov 	memcpy(value, bucket->ip, trace_len);
217557c0c6eSAlexei Starovoitov 	memset(value + trace_len, 0, map->value_size - trace_len);
218557c0c6eSAlexei Starovoitov 
219557c0c6eSAlexei Starovoitov 	old_bucket = xchg(&smap->buckets[id], bucket);
220557c0c6eSAlexei Starovoitov 	if (old_bucket)
221557c0c6eSAlexei Starovoitov 		pcpu_freelist_push(&smap->freelist, &old_bucket->fnode);
222557c0c6eSAlexei Starovoitov 	return 0;
223d5a3b1f6SAlexei Starovoitov }
224d5a3b1f6SAlexei Starovoitov 
22516f07c55SYonghong Song static int stack_map_get_next_key(struct bpf_map *map, void *key,
22616f07c55SYonghong Song 				  void *next_key)
227d5a3b1f6SAlexei Starovoitov {
22816f07c55SYonghong Song 	struct bpf_stack_map *smap = container_of(map,
22916f07c55SYonghong Song 						  struct bpf_stack_map, map);
23016f07c55SYonghong Song 	u32 id;
23116f07c55SYonghong Song 
23216f07c55SYonghong Song 	WARN_ON_ONCE(!rcu_read_lock_held());
23316f07c55SYonghong Song 
23416f07c55SYonghong Song 	if (!key) {
23516f07c55SYonghong Song 		id = 0;
23616f07c55SYonghong Song 	} else {
23716f07c55SYonghong Song 		id = *(u32 *)key;
23816f07c55SYonghong Song 		if (id >= smap->n_buckets || !smap->buckets[id])
23916f07c55SYonghong Song 			id = 0;
24016f07c55SYonghong Song 		else
24116f07c55SYonghong Song 			id++;
24216f07c55SYonghong Song 	}
24316f07c55SYonghong Song 
24416f07c55SYonghong Song 	while (id < smap->n_buckets && !smap->buckets[id])
24516f07c55SYonghong Song 		id++;
24616f07c55SYonghong Song 
24716f07c55SYonghong Song 	if (id >= smap->n_buckets)
24816f07c55SYonghong Song 		return -ENOENT;
24916f07c55SYonghong Song 
25016f07c55SYonghong Song 	*(u32 *)next_key = id;
25116f07c55SYonghong Song 	return 0;
252d5a3b1f6SAlexei Starovoitov }
253d5a3b1f6SAlexei Starovoitov 
254d5a3b1f6SAlexei Starovoitov static int stack_map_update_elem(struct bpf_map *map, void *key, void *value,
255d5a3b1f6SAlexei Starovoitov 				 u64 map_flags)
256d5a3b1f6SAlexei Starovoitov {
257d5a3b1f6SAlexei Starovoitov 	return -EINVAL;
258d5a3b1f6SAlexei Starovoitov }
259d5a3b1f6SAlexei Starovoitov 
260d5a3b1f6SAlexei Starovoitov /* Called from syscall or from eBPF program */
261d5a3b1f6SAlexei Starovoitov static int stack_map_delete_elem(struct bpf_map *map, void *key)
262d5a3b1f6SAlexei Starovoitov {
263d5a3b1f6SAlexei Starovoitov 	struct bpf_stack_map *smap = container_of(map, struct bpf_stack_map, map);
264d5a3b1f6SAlexei Starovoitov 	struct stack_map_bucket *old_bucket;
265d5a3b1f6SAlexei Starovoitov 	u32 id = *(u32 *)key;
266d5a3b1f6SAlexei Starovoitov 
267d5a3b1f6SAlexei Starovoitov 	if (unlikely(id >= smap->n_buckets))
268d5a3b1f6SAlexei Starovoitov 		return -E2BIG;
269d5a3b1f6SAlexei Starovoitov 
270d5a3b1f6SAlexei Starovoitov 	old_bucket = xchg(&smap->buckets[id], NULL);
271d5a3b1f6SAlexei Starovoitov 	if (old_bucket) {
272557c0c6eSAlexei Starovoitov 		pcpu_freelist_push(&smap->freelist, &old_bucket->fnode);
273d5a3b1f6SAlexei Starovoitov 		return 0;
274d5a3b1f6SAlexei Starovoitov 	} else {
275d5a3b1f6SAlexei Starovoitov 		return -ENOENT;
276d5a3b1f6SAlexei Starovoitov 	}
277d5a3b1f6SAlexei Starovoitov }
278d5a3b1f6SAlexei Starovoitov 
279d5a3b1f6SAlexei Starovoitov /* Called when map->refcnt goes to zero, either from workqueue or from syscall */
280d5a3b1f6SAlexei Starovoitov static void stack_map_free(struct bpf_map *map)
281d5a3b1f6SAlexei Starovoitov {
282d5a3b1f6SAlexei Starovoitov 	struct bpf_stack_map *smap = container_of(map, struct bpf_stack_map, map);
283d5a3b1f6SAlexei Starovoitov 
284557c0c6eSAlexei Starovoitov 	/* wait for bpf programs to complete before freeing stack map */
285d5a3b1f6SAlexei Starovoitov 	synchronize_rcu();
286d5a3b1f6SAlexei Starovoitov 
287d407bd25SDaniel Borkmann 	bpf_map_area_free(smap->elems);
288557c0c6eSAlexei Starovoitov 	pcpu_freelist_destroy(&smap->freelist);
289d407bd25SDaniel Borkmann 	bpf_map_area_free(smap);
290d5a3b1f6SAlexei Starovoitov 	put_callchain_buffers();
291d5a3b1f6SAlexei Starovoitov }
292d5a3b1f6SAlexei Starovoitov 
29340077e0cSJohannes Berg const struct bpf_map_ops stack_map_ops = {
294d5a3b1f6SAlexei Starovoitov 	.map_alloc = stack_map_alloc,
295d5a3b1f6SAlexei Starovoitov 	.map_free = stack_map_free,
296d5a3b1f6SAlexei Starovoitov 	.map_get_next_key = stack_map_get_next_key,
297d5a3b1f6SAlexei Starovoitov 	.map_lookup_elem = stack_map_lookup_elem,
298d5a3b1f6SAlexei Starovoitov 	.map_update_elem = stack_map_update_elem,
299d5a3b1f6SAlexei Starovoitov 	.map_delete_elem = stack_map_delete_elem,
300d5a3b1f6SAlexei Starovoitov };
301