From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0CDCCECAAD8 for ; Wed, 21 Sep 2022 17:00:29 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 9D1A66B0081; Wed, 21 Sep 2022 13:00:28 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 95A716B0082; Wed, 21 Sep 2022 13:00:28 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 69B4B6B0083; Wed, 21 Sep 2022 13:00:28 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0017.hostedemail.com [216.40.44.17]) by kanga.kvack.org (Postfix) with ESMTP id 5C2A36B0081 for ; Wed, 21 Sep 2022 13:00:28 -0400 (EDT) Received: from smtpin01.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay03.hostedemail.com (Postfix) with ESMTP id 2DC35A0228 for ; Wed, 21 Sep 2022 17:00:28 +0000 (UTC) X-FDA: 79936706136.01.F6661C6 Received: from mail-pl1-f181.google.com (mail-pl1-f181.google.com [209.85.214.181]) by imf10.hostedemail.com (Postfix) with ESMTP id D3F07C005C for ; Wed, 21 Sep 2022 17:00:27 +0000 (UTC) Received: by mail-pl1-f181.google.com with SMTP id iw17so6330263plb.0 for ; Wed, 21 Sep 2022 10:00:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date; bh=gba3u0+gd94mB6GmfPdadjDps/EFMbhme8baw/BzKk0=; b=eWDIZ3rFab2okkRLajKM5mxi8K6wMkkS84fi9NRdZCYncHKadFI1wpoWOZHwSuU0SK p+iaWwWdjR/bQtukKkpUcmpO9XbTRmNduklhIpBL40Kxs9yMpkE0pBcKSCR1amGLvOpq 9egmfQUOrGMJQ29NSGMv1RrH46RO3w+aFQvFs0wv62z90Yr0WlesxS5tEMkH7/VyIMmw Wo04CFfnI+a+iYXt5W8MgC6gcw8sV2FmjQ2Ub7/DXPixGt/6GKHtRExemrlo9RbObcml RkcTaTt7hy83mKnbvK/XHsXEwgkk5i+125gADjKkLhjT0MjRqyIg2IBayiGHLOOx6m4B eaBA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date; bh=gba3u0+gd94mB6GmfPdadjDps/EFMbhme8baw/BzKk0=; b=1YBEGzakjeVhVqJn1PlrUfzVJ/fkhujYukZvbAXRpbyiVdVKGgnEHzZtxuLBHGBFqR 8adkpsJTOYfc/jrq9tklZGSCN/23Le+vD4H+Jj6V+gHMRWw7ikEYv2tbx4zoHvmGakTF as9Mi+1AJtDELSd8fAnptrJB3F1JZs3e9llfLkyp0+sKxTkHb4+9vL5Kit1c34HNOxES d6CV0R7F/18PaU6pkRxLdFWOg587GKexgytinyN0szJkUBmv9oB1icQD6XLBNozi5t4o rKYemlBI6UQUolDRH3ZiLPVbtuoPSDycM1fCNGrGmsulB1BgzttoC4PuEiRZmx82A1l3 im1w== X-Gm-Message-State: ACrzQf1kWgDVbmj2sVSDc+SgvqvaUN2sjav5+DTpkYk6fWjQmvxgVwMV 8nJpXNTYYjulVa5oU5j+wwI= X-Google-Smtp-Source: AMsMyM5UUh5UGXfBN7hdQyZZoZIfKCCpq9e3N25yua41v8owfxVZSErG70KBKf17D7b1lz68CI8HQg== X-Received: by 2002:a17:90a:1b0a:b0:203:6731:4c98 with SMTP id q10-20020a17090a1b0a00b0020367314c98mr10340586pjq.10.1663779627393; Wed, 21 Sep 2022 10:00:27 -0700 (PDT) Received: from vultr.guest ([2001:19f0:6001:488e:5400:4ff:fe25:7db8]) by smtp.gmail.com with ESMTPSA id mp4-20020a17090b190400b002006f8e7688sm2102495pjb.32.2022.09.21.10.00.25 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 21 Sep 2022 10:00:26 -0700 (PDT) From: Yafang Shao To: ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, kafai@fb.com, songliubraving@fb.com, yhs@fb.com, john.fastabend@gmail.com, kpsingh@kernel.org, sdf@google.com, haoluo@google.com, jolsa@kernel.org, hannes@cmpxchg.org, mhocko@kernel.org, roman.gushchin@linux.dev, shakeelb@google.com, songmuchun@bytedance.com, akpm@linux-foundation.org, tj@kernel.org, lizefan.x@bytedance.com Cc: cgroups@vger.kernel.org, netdev@vger.kernel.org, bpf@vger.kernel.org, linux-mm@kvack.org, Yafang Shao Subject: [RFC PATCH bpf-next 09/10] bpf: Add bpf map free helpers Date: Wed, 21 Sep 2022 17:00:01 +0000 Message-Id: <20220921170002.29557-10-laoar.shao@gmail.com> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20220921170002.29557-1-laoar.shao@gmail.com> References: <20220921170002.29557-1-laoar.shao@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit ARC-Authentication-Results: i=1; imf10.hostedemail.com; dkim=pass header.d=gmail.com header.s=20210112 header.b=eWDIZ3rF; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (imf10.hostedemail.com: domain of laoar.shao@gmail.com designates 209.85.214.181 as permitted sender) smtp.mailfrom=laoar.shao@gmail.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1663779627; a=rsa-sha256; cv=none; b=m7oJqD0HOobDxf6rrReww4PvoidJjwbrvo6CYvpwoVeEdAU5hyJJD9VfSupHMvyFaV5bcl JJfaOwDzV5zu49giI/UxXKtTCU1R3e9hr/T8SWhT7dvdSXiTQAxry1nfD09QfnImlOToki VZZqwG1RWGbQEHrE28CpY7QnZ5fstJY= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1663779627; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=gba3u0+gd94mB6GmfPdadjDps/EFMbhme8baw/BzKk0=; b=cWQ3vTdust52kwab/GArRfV1R6A+Cjq+GlSYpTapZ38kE21N59OJr67Fz42tO417atJp9j wzOS5QCyAnOkpSGCha9YHE8jZYRVQJHA2PWvUW/OEJ1XsV17/mU7GCtfCf9B/UNv2CYbPg WgF/GF2bZJ+hPFTrVBFvJlFYffODe1E= Authentication-Results: imf10.hostedemail.com; dkim=pass header.d=gmail.com header.s=20210112 header.b=eWDIZ3rF; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (imf10.hostedemail.com: domain of laoar.shao@gmail.com designates 209.85.214.181 as permitted sender) smtp.mailfrom=laoar.shao@gmail.com X-Rspamd-Server: rspam06 X-Stat-Signature: fo7wsithzyde1gzw6gxtea71mgzio1g8 X-Rspam-User: X-Rspamd-Queue-Id: D3F07C005C X-HE-Tag: 1663779627-5729 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Some new helpers are introduced to allocate memory, instead of using the general free helpers. Then we can do something in these new helpers to track the free of bpf memory in the future. Signed-off-by: Yafang Shao --- include/linux/bpf.h | 24 ++++++++++++++++++++++++ kernel/bpf/arraymap.c | 4 ++-- kernel/bpf/bpf_local_storage.c | 10 +++++----- kernel/bpf/cpumap.c | 13 ++++++------- kernel/bpf/devmap.c | 10 ++++++---- kernel/bpf/hashtab.c | 2 +- kernel/bpf/helpers.c | 2 +- kernel/bpf/local_storage.c | 10 +++++----- kernel/bpf/lpm_trie.c | 2 +- kernel/bpf/ringbuf.c | 7 ++++++- kernel/bpf/syscall.c | 14 ++++++++++++++ net/xdp/xskmap.c | 2 +- 12 files changed, 72 insertions(+), 28 deletions(-) diff --git a/include/linux/bpf.h b/include/linux/bpf.h index e1e5ada..f7a4cfc 100644 --- a/include/linux/bpf.h +++ b/include/linux/bpf.h @@ -1721,6 +1721,12 @@ void *bpf_map_kvcalloc(struct bpf_map *map, size_t n, size_t size, gfp_t flags); void __percpu *bpf_map_alloc_percpu(const struct bpf_map *map, size_t size, size_t align, gfp_t flags); +void bpf_map_kfree(const void *ptr); +void bpf_map_kvfree(const void *ptr); +void bpf_map_free_percpu(void __percpu *ptr); + +#define bpf_map_kfree_rcu(ptr, rhf...) kvfree_rcu(ptr, ## rhf) + #else static inline void * bpf_map_kmalloc_node(const struct bpf_map *map, size_t size, gfp_t flags, @@ -1747,6 +1753,24 @@ void __percpu *bpf_map_alloc_percpu(const struct bpf_map *map, size_t size, { return __alloc_percpu_gfp(size, align, flags); } + +static inline void bpf_map_kfree(const void *ptr) +{ + kfree(ptr); +} + +static inline void bpf_map_kvfree(const void *ptr) +{ + kvfree(ptr); +} + +static inline void bpf_map_free_percpu(void __percpu *ptr) +{ + free_percpu(ptr); +} + +#define bpf_map_kfree_rcu(ptr, rhf...) kvfree_rcu(ptr, ## rhf) + #endif extern int sysctl_unprivileged_bpf_disabled; diff --git a/kernel/bpf/arraymap.c b/kernel/bpf/arraymap.c index 7f1766c..9bdb99d 100644 --- a/kernel/bpf/arraymap.c +++ b/kernel/bpf/arraymap.c @@ -24,7 +24,7 @@ static void bpf_array_free_percpu(struct bpf_array *array) int i; for (i = 0; i < array->map.max_entries; i++) { - free_percpu(array->pptrs[i]); + bpf_map_free_percpu(array->pptrs[i]); cond_resched(); } } @@ -1141,7 +1141,7 @@ static void prog_array_map_free(struct bpf_map *map) list_del_init(&elem->list); kfree(elem); } - kfree(aux); + bpf_map_kfree(aux); fd_array_map_free(map); } diff --git a/kernel/bpf/bpf_local_storage.c b/kernel/bpf/bpf_local_storage.c index 8a24828..6ef49aa 100644 --- a/kernel/bpf/bpf_local_storage.c +++ b/kernel/bpf/bpf_local_storage.c @@ -89,7 +89,7 @@ void bpf_local_storage_free_rcu(struct rcu_head *rcu) struct bpf_local_storage *local_storage; local_storage = container_of(rcu, struct bpf_local_storage, rcu); - kfree_rcu(local_storage, rcu); + bpf_map_kfree_rcu(local_storage, rcu); } static void bpf_selem_free_rcu(struct rcu_head *rcu) @@ -97,7 +97,7 @@ static void bpf_selem_free_rcu(struct rcu_head *rcu) struct bpf_local_storage_elem *selem; selem = container_of(rcu, struct bpf_local_storage_elem, rcu); - kfree_rcu(selem, rcu); + bpf_map_kfree_rcu(selem, rcu); } /* local_storage->lock must be held and selem->local_storage == local_storage. @@ -153,7 +153,7 @@ bool bpf_selem_unlink_storage_nolock(struct bpf_local_storage *local_storage, if (use_trace_rcu) call_rcu_tasks_trace(&selem->rcu, bpf_selem_free_rcu); else - kfree_rcu(selem, rcu); + bpf_map_kfree_rcu(selem, rcu); return free_local_storage; } @@ -348,7 +348,7 @@ int bpf_local_storage_alloc(void *owner, return 0; uncharge: - kfree(storage); + bpf_map_kfree(storage); mem_uncharge(smap, owner, sizeof(*storage)); return err; } @@ -581,7 +581,7 @@ void bpf_local_storage_map_free(struct bpf_local_storage_map *smap, */ synchronize_rcu(); - kvfree(smap->buckets); + bpf_map_kvfree(smap->buckets); bpf_map_area_free(smap, &smap->map); } diff --git a/kernel/bpf/cpumap.c b/kernel/bpf/cpumap.c index b593157..5ee774e 100644 --- a/kernel/bpf/cpumap.c +++ b/kernel/bpf/cpumap.c @@ -166,8 +166,8 @@ static void put_cpu_map_entry(struct bpf_cpu_map_entry *rcpu) /* The queue should be empty at this point */ __cpu_map_ring_cleanup(rcpu->queue); ptr_ring_cleanup(rcpu->queue, NULL); - kfree(rcpu->queue); - kfree(rcpu); + bpf_map_kfree(rcpu->queue); + bpf_map_kfree(rcpu); } } @@ -486,11 +486,11 @@ static int __cpu_map_load_bpf_program(struct bpf_cpu_map_entry *rcpu, free_ptr_ring: ptr_ring_cleanup(rcpu->queue, NULL); free_queue: - kfree(rcpu->queue); + bpf_map_kfree(rcpu->queue); free_bulkq: - free_percpu(rcpu->bulkq); + bpf_map_free_percpu(rcpu->bulkq); free_rcu: - kfree(rcpu); + bpf_map_kfree(rcpu); return NULL; } @@ -504,8 +504,7 @@ static void __cpu_map_entry_free(struct rcu_head *rcu) * find this entry. */ rcpu = container_of(rcu, struct bpf_cpu_map_entry, rcu); - - free_percpu(rcpu->bulkq); + bpf_map_free_percpu(rcpu->bulkq); /* Cannot kthread_stop() here, last put free rcpu resources */ put_cpu_map_entry(rcpu); } diff --git a/kernel/bpf/devmap.c b/kernel/bpf/devmap.c index 807a4cd..38bd7be 100644 --- a/kernel/bpf/devmap.c +++ b/kernel/bpf/devmap.c @@ -220,7 +220,7 @@ static void dev_map_free(struct bpf_map *map) if (dev->xdp_prog) bpf_prog_put(dev->xdp_prog); dev_put(dev->dev); - kfree(dev); + bpf_map_kfree(dev); } } @@ -236,7 +236,7 @@ static void dev_map_free(struct bpf_map *map) if (dev->xdp_prog) bpf_prog_put(dev->xdp_prog); dev_put(dev->dev); - kfree(dev); + bpf_map_kfree(dev); } bpf_map_area_free(dtab->netdev_map, NULL); @@ -793,12 +793,14 @@ static void *dev_map_hash_lookup_elem(struct bpf_map *map, void *key) static void __dev_map_entry_free(struct rcu_head *rcu) { struct bpf_dtab_netdev *dev; + struct bpf_dtab *dtab; dev = container_of(rcu, struct bpf_dtab_netdev, rcu); if (dev->xdp_prog) bpf_prog_put(dev->xdp_prog); dev_put(dev->dev); - kfree(dev); + dtab = dev->dtab; + bpf_map_kfree(dev); } static int dev_map_delete_elem(struct bpf_map *map, void *key) @@ -883,7 +885,7 @@ static struct bpf_dtab_netdev *__dev_map_alloc_node(struct net *net, err_put_dev: dev_put(dev->dev); err_out: - kfree(dev); + bpf_map_kfree(dev); return ERR_PTR(-EINVAL); } diff --git a/kernel/bpf/hashtab.c b/kernel/bpf/hashtab.c index 89887df..7f43371 100644 --- a/kernel/bpf/hashtab.c +++ b/kernel/bpf/hashtab.c @@ -1562,7 +1562,7 @@ static void htab_map_free(struct bpf_map *map) } bpf_map_free_kptr_off_tab(map); - free_percpu(htab->extra_elems); + bpf_map_free_percpu(htab->extra_elems); bpf_map_area_free(htab->buckets, NULL); bpf_mem_alloc_destroy(&htab->pcpu_ma); bpf_mem_alloc_destroy(&htab->ma); diff --git a/kernel/bpf/helpers.c b/kernel/bpf/helpers.c index 41aeaf3..fd0549b 100644 --- a/kernel/bpf/helpers.c +++ b/kernel/bpf/helpers.c @@ -1366,7 +1366,7 @@ void bpf_timer_cancel_and_free(void *val) */ if (this_cpu_read(hrtimer_running) != t) hrtimer_cancel(&t->timer); - kfree(t); + bpf_map_kfree(t); } BPF_CALL_2(bpf_kptr_xchg, void *, map_value, void *, ptr) diff --git a/kernel/bpf/local_storage.c b/kernel/bpf/local_storage.c index fcc7ece..035ef9e 100644 --- a/kernel/bpf/local_storage.c +++ b/kernel/bpf/local_storage.c @@ -174,7 +174,7 @@ static int cgroup_storage_update_elem(struct bpf_map *map, void *key, check_and_init_map_value(map, new->data); new = xchg(&storage->buf, new); - kfree_rcu(new, rcu); + bpf_map_kfree_rcu(new, rcu); return 0; } @@ -526,7 +526,7 @@ struct bpf_cgroup_storage *bpf_cgroup_storage_alloc(struct bpf_prog *prog, return storage; enomem: - kfree(storage); + bpf_map_kfree(storage); return ERR_PTR(-ENOMEM); } @@ -535,8 +535,8 @@ static void free_shared_cgroup_storage_rcu(struct rcu_head *rcu) struct bpf_cgroup_storage *storage = container_of(rcu, struct bpf_cgroup_storage, rcu); - kfree(storage->buf); - kfree(storage); + bpf_map_kfree(storage->buf); + bpf_map_kfree(storage); } static void free_percpu_cgroup_storage_rcu(struct rcu_head *rcu) @@ -545,7 +545,7 @@ static void free_percpu_cgroup_storage_rcu(struct rcu_head *rcu) container_of(rcu, struct bpf_cgroup_storage, rcu); free_percpu(storage->percpu_buf); - kfree(storage); + bpf_map_kfree(storage); } void bpf_cgroup_storage_free(struct bpf_cgroup_storage *storage) diff --git a/kernel/bpf/lpm_trie.c b/kernel/bpf/lpm_trie.c index 3d329ae..815e5d4 100644 --- a/kernel/bpf/lpm_trie.c +++ b/kernel/bpf/lpm_trie.c @@ -602,7 +602,7 @@ static void trie_free(struct bpf_map *map) continue; } - kfree(node); + bpf_map_kfree(node); RCU_INIT_POINTER(*slot, NULL); break; } diff --git a/kernel/bpf/ringbuf.c b/kernel/bpf/ringbuf.c index 1e7284c..535e440 100644 --- a/kernel/bpf/ringbuf.c +++ b/kernel/bpf/ringbuf.c @@ -59,12 +59,17 @@ struct bpf_ringbuf_hdr { u32 pg_off; }; +static inline void bpf_map_free_page(struct page *page) +{ + __free_page(page); +} + static void bpf_ringbuf_pages_free(struct page **pages, int nr_pages) { int i; for (i = 0; i < nr_pages; i++) - __free_page(pages[i]); + bpf_map_free_page(pages[i]); bpf_map_area_free(pages, NULL); } diff --git a/kernel/bpf/syscall.c b/kernel/bpf/syscall.c index 6123c71..b9250c8 100644 --- a/kernel/bpf/syscall.c +++ b/kernel/bpf/syscall.c @@ -519,6 +519,20 @@ void __percpu *bpf_map_alloc_percpu(const struct bpf_map *map, size_t size, return ptr; } +void bpf_map_kfree(const void *ptr) +{ + kfree(ptr); +} + +void bpf_map_kvfree(const void *ptr) +{ + kvfree(ptr); +} + +void bpf_map_free_percpu(void __percpu *ptr) +{ + free_percpu(ptr); +} #endif static int bpf_map_kptr_off_cmp(const void *a, const void *b) diff --git a/net/xdp/xskmap.c b/net/xdp/xskmap.c index beb11fd..e9d93b8 100644 --- a/net/xdp/xskmap.c +++ b/net/xdp/xskmap.c @@ -33,7 +33,7 @@ static struct xsk_map_node *xsk_map_node_alloc(struct xsk_map *map, static void xsk_map_node_free(struct xsk_map_node *node) { bpf_map_put(&node->map->map); - kfree(node); + bpf_map_kfree(node); } static void xsk_map_sock_add(struct xdp_sock *xs, struct xsk_map_node *node) -- 1.8.3.1