Blame view

kernel/bpf/prog_iter.c 2.39 KB
a228a64fc   Alexei Starovoitov   bpf: Add bpf_prog...
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
  // SPDX-License-Identifier: GPL-2.0-only
  /* Copyright (c) 2020 Facebook */
  #include <linux/bpf.h>
  #include <linux/fs.h>
  #include <linux/filter.h>
  #include <linux/kernel.h>
  #include <linux/btf_ids.h>
  
  struct bpf_iter_seq_prog_info {
  	u32 prog_id;
  };
  
  static void *bpf_prog_seq_start(struct seq_file *seq, loff_t *pos)
  {
  	struct bpf_iter_seq_prog_info *info = seq->private;
  	struct bpf_prog *prog;
  
  	prog = bpf_prog_get_curr_or_next(&info->prog_id);
  	if (!prog)
  		return NULL;
  
  	if (*pos == 0)
  		++*pos;
  	return prog;
  }
  
  static void *bpf_prog_seq_next(struct seq_file *seq, void *v, loff_t *pos)
  {
  	struct bpf_iter_seq_prog_info *info = seq->private;
  
  	++*pos;
  	++info->prog_id;
  	bpf_prog_put((struct bpf_prog *)v);
  	return bpf_prog_get_curr_or_next(&info->prog_id);
  }
  
  struct bpf_iter__bpf_prog {
  	__bpf_md_ptr(struct bpf_iter_meta *, meta);
  	__bpf_md_ptr(struct bpf_prog *, prog);
  };
  
  DEFINE_BPF_ITER_FUNC(bpf_prog, struct bpf_iter_meta *meta, struct bpf_prog *prog)
  
  static int __bpf_prog_seq_show(struct seq_file *seq, void *v, bool in_stop)
  {
  	struct bpf_iter__bpf_prog ctx;
  	struct bpf_iter_meta meta;
  	struct bpf_prog *prog;
  	int ret = 0;
  
  	ctx.meta = &meta;
  	ctx.prog = v;
  	meta.seq = seq;
  	prog = bpf_iter_get_info(&meta, in_stop);
  	if (prog)
  		ret = bpf_iter_run_prog(prog, &ctx);
  
  	return ret;
  }
  
  static int bpf_prog_seq_show(struct seq_file *seq, void *v)
  {
  	return __bpf_prog_seq_show(seq, v, false);
  }
  
  static void bpf_prog_seq_stop(struct seq_file *seq, void *v)
  {
  	if (!v)
  		(void)__bpf_prog_seq_show(seq, v, true);
  	else
  		bpf_prog_put((struct bpf_prog *)v);
  }
  
  static const struct seq_operations bpf_prog_seq_ops = {
  	.start	= bpf_prog_seq_start,
  	.next	= bpf_prog_seq_next,
  	.stop	= bpf_prog_seq_stop,
  	.show	= bpf_prog_seq_show,
  };
  
  BTF_ID_LIST(btf_bpf_prog_id)
  BTF_ID(struct, bpf_prog)
14fc6bd6b   Yonghong Song   bpf: Refactor bpf...
83
  static const struct bpf_iter_seq_info bpf_prog_seq_info = {
a228a64fc   Alexei Starovoitov   bpf: Add bpf_prog...
84
85
86
87
  	.seq_ops		= &bpf_prog_seq_ops,
  	.init_seq_private	= NULL,
  	.fini_seq_private	= NULL,
  	.seq_priv_size		= sizeof(struct bpf_iter_seq_prog_info),
14fc6bd6b   Yonghong Song   bpf: Refactor bpf...
88
89
90
91
  };
  
  static struct bpf_iter_reg bpf_prog_reg_info = {
  	.target			= "bpf_prog",
a228a64fc   Alexei Starovoitov   bpf: Add bpf_prog...
92
93
94
95
96
  	.ctx_arg_info_size	= 1,
  	.ctx_arg_info		= {
  		{ offsetof(struct bpf_iter__bpf_prog, prog),
  		  PTR_TO_BTF_ID_OR_NULL },
  	},
14fc6bd6b   Yonghong Song   bpf: Refactor bpf...
97
  	.seq_info		= &bpf_prog_seq_info,
a228a64fc   Alexei Starovoitov   bpf: Add bpf_prog...
98
99
100
101
102
103
104
105
106
  };
  
  static int __init bpf_prog_iter_init(void)
  {
  	bpf_prog_reg_info.ctx_arg_info[0].btf_id = *btf_bpf_prog_id;
  	return bpf_iter_reg_target(&bpf_prog_reg_info);
  }
  
  late_initcall(bpf_prog_iter_init);