Re: [RFC bpf-next v1 2/4] bpf: Support cookie for linked-based struct_ops attachment

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 7/10/25 11:39 AM, Amery Hung wrote:
On 7/8/25 4:08 PM, Amery Hung wrote:
@@ -906,6 +904,10 @@ static long bpf_struct_ops_map_update_elem(struct bpf_map *map, void *key,
               goto unlock;
       }

+     err = bpf_struct_ops_prepare_attach(st_map, 0);
A follow-up on the "using the map->id as the cookie" comment in the cover
letter. I meant to use the map->id here instead of 0. If the cookie is intended
to identify a particular struct_ops instance (i.e., the struct_ops map), then
map->id should be a good fit, and it is automatically generated by the kernel
during the map creation. As a result, I suspect that most of the changes in
patch 1 and patch 2 will not be needed.

Do you mean keep using cookie as the mechanism to associate programs,
but for struct_ops the cookie will be map->id (i.e.,
bpf_get_attah_cookie() in struct_ops will return map->id)?

I meant to use the map->id as the bpf_cookie stored in the bpf_tramp_run_ctx. Then there is no need for user space to generate a unique cookie during link_create. The kernel has already generated a unique ID in the map->id. The map->id is available during the bpf_struct_ops_map_update_elem(). Then there is also no need to distinguish between SEC(".struct_ops") vs SEC(".struct_ops.link"). Most of the patch 1 and patch 2 will not be needed.

A minor detail: note that the same struct ops program can be used in different trampolines. Thus, to be specific, the bpf cookie is stored in the trampoline.

If the question is about bpf global variable vs bpf cookie, yeah, I think using a bpf global variable should also work. The global variable can be initialized before libbpf's bpf_map__attach_struct_ops(). At that time, the map->id should be known already. I don't have a strong opinion on reusing the bpf cookie in the struct ops trampoline. No one is using it now, so it is available to be used. Exposing BPF_FUNC_get_attach_cookie for struct ops programs is pretty cheap also. Using bpf cookie to allow the struct ops program to tell which struct_ops map is calling it seems to fit well also after sleeping on it a bit. bpf global variable will also break if a bpf_prog.o has more than one SEC(".struct_ops").

For tracing program, the bpf cookie seems to be an existing mechanism that can have any value (?). Thus, user space is free to store the map->id in it also. It can also choose to store the map->id in a bpf global variable if it has other uses for the bpf cookie. I think both should work similarly.




[Index of Archives]     [Linux Samsung SoC]     [Linux Rockchip SoC]     [Linux Actions SoC]     [Linux for Synopsys ARC Processors]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]


  Powered by Linux