The branch main has been updated by glebius:

URL: 
https://cgit.FreeBSD.org/src/commit/?id=0bf42a0a05b9c802a6d9ca4a6b8696b29a26e08b

commit 0bf42a0a05b9c802a6d9ca4a6b8696b29a26e08b
Author:     Gleb Smirnoff <[email protected]>
AuthorDate: 2025-12-17 20:41:05 +0000
Commit:     Gleb Smirnoff <[email protected]>
CommitDate: 2025-12-17 20:41:05 +0000

    bpf: virtualize bpf_iflist
    
    The reason the global list worked before 8774a990ee40 is that bpf_setif()
    used if_unit(), which is a VNET-aware function, and then went through the
    global list looking for bpf_if with matching pointer.
    
    PR:     291735
    Fixes:  8774a990ee4094f16d596d4b78e0f3239e5d0c88
---
 sys/net/bpf.c | 28 +++++++++++++++-------------
 1 file changed, 15 insertions(+), 13 deletions(-)

diff --git a/sys/net/bpf.c b/sys/net/bpf.c
index 4026c44112ab..54da49f3d656 100644
--- a/sys/net/bpf.c
+++ b/sys/net/bpf.c
@@ -221,7 +221,8 @@ struct bpf_dltlist32 {
  * structures registered by different layers in the stack (i.e., 802.11
  * frames, ethernet frames, etc).
  */
-static LIST_HEAD(, bpf_if) bpf_iflist = LIST_HEAD_INITIALIZER();
+VNET_DEFINE_STATIC(LIST_HEAD(, bpf_if), bpf_iflist) = LIST_HEAD_INITIALIZER();
+#define        V_bpf_iflist    VNET(bpf_iflist)
 static struct sx       bpf_sx;         /* bpf global lock */
 
 static void    bpfif_ref(struct bpf_if *);
@@ -257,7 +258,8 @@ SYSCTL_INT(_net_bpf, OID_AUTO, maxinsns, CTLFLAG_RW,
 static int bpf_zerocopy_enable = 0;
 SYSCTL_INT(_net_bpf, OID_AUTO, zerocopy_enable, CTLFLAG_RW,
     &bpf_zerocopy_enable, 0, "Enable new zero-copy BPF buffer sessions");
-static SYSCTL_NODE(_net_bpf, OID_AUTO, stats, CTLFLAG_MPSAFE | CTLFLAG_RW,
+static SYSCTL_NODE(_net_bpf, OID_AUTO, stats,
+    CTLFLAG_VNET | CTLFLAG_MPSAFE | CTLFLAG_RW,
     bpf_stats_sysctl, "bpf statistics portal");
 
 VNET_DEFINE_STATIC(int, bpf_optimize_writers) = 0;
@@ -1401,7 +1403,7 @@ bpfioctl(struct cdev *dev, u_long cmd, caddr_t addr, int 
flags,
                /*
                 * Look through attached interfaces for the named one.
                 */
-               LIST_FOREACH(bp, &bpf_iflist, bif_next) {
+               LIST_FOREACH(bp, &V_bpf_iflist, bif_next) {
                        if (strncmp(ifr->ifr_name, bp->bif_name,
                            sizeof(ifr->ifr_name)) == 0)
                                break;
@@ -1728,7 +1730,7 @@ bpf_getiflist(struct bpf_iflist *bi)
        BPF_LOCK();
 
        cnt = allsize = size = 0;
-       LIST_FOREACH(bp, &bpf_iflist, bif_next) {
+       LIST_FOREACH(bp, &V_bpf_iflist, bif_next) {
                allsize += strlen(bp->bif_name) + 1;
                if (++cnt == bi->bi_count)
                        size = allsize;
@@ -1748,7 +1750,7 @@ bpf_getiflist(struct bpf_iflist *bi)
 
        uaddr = bi->bi_ubuf;
        cnt = 0;
-       LIST_FOREACH(bp, &bpf_iflist, bif_next) {
+       LIST_FOREACH(bp, &V_bpf_iflist, bif_next) {
                u_int len;
                int error;
 
@@ -2654,7 +2656,7 @@ bpf_attach(const char *name, u_int dlt, u_int hdrlen,
        bp->bif_methods = methods;
        refcount_init(&bp->bif_refcnt, 1);
        BPF_LOCK();
-       LIST_INSERT_HEAD(&bpf_iflist, bp, bif_next);
+       LIST_INSERT_HEAD(&V_bpf_iflist, bp, bif_next);
        BPF_UNLOCK();
 
        return (bp);
@@ -2672,7 +2674,7 @@ bpf_ifdetach(struct ifnet *ifp)
        struct bpf_d *d;
 
        BPF_LOCK();
-       LIST_FOREACH(bp, &bpf_iflist, bif_next) {
+       LIST_FOREACH(bp, &V_bpf_iflist, bif_next) {
                /* XXXGL: assuming softc is ifnet here */
                if (bp->bif_softc != ifp)
                        continue;
@@ -2743,7 +2745,7 @@ bpf_getdltlist(struct bpf_d *d, struct bpf_dltlist *bfl)
 
        name = d->bd_bif->bif_name;
        n1 = 0;
-       LIST_FOREACH(bp, &bpf_iflist, bif_next) {
+       LIST_FOREACH(bp, &V_bpf_iflist, bif_next) {
                if (bp->bif_name == name)
                        n1++;
        }
@@ -2756,7 +2758,7 @@ bpf_getdltlist(struct bpf_d *d, struct bpf_dltlist *bfl)
 
        lst = malloc(n1 * sizeof(u_int), M_TEMP, M_WAITOK);
        n = 0;
-       LIST_FOREACH(bp, &bpf_iflist, bif_next) {
+       LIST_FOREACH(bp, &V_bpf_iflist, bif_next) {
                if (bp->bif_name != name)
                        continue;
                lst[n++] = bp->bif_dlt;
@@ -2795,7 +2797,7 @@ bpf_setdlt(struct bpf_d *d, u_int dlt)
                return (0);
 
        name = d->bd_bif->bif_name;
-       LIST_FOREACH(bp, &bpf_iflist, bif_next) {
+       LIST_FOREACH(bp, &V_bpf_iflist, bif_next) {
                if (bp->bif_name == name && bp->bif_dlt == dlt)
                        break;
        }
@@ -2843,7 +2845,7 @@ bpf_zero_counters(void)
         * We are protected by global lock here, interfaces and
         * descriptors can not be deleted while we hold it.
         */
-       LIST_FOREACH(bp, &bpf_iflist, bif_next) {
+       LIST_FOREACH(bp, &V_bpf_iflist, bif_next) {
                CK_LIST_FOREACH(bd, &bp->bif_dlist, bd_next) {
                        counter_u64_zero(bd->bd_rcount);
                        counter_u64_zero(bd->bd_dcount);
@@ -2930,7 +2932,7 @@ bpf_stats_sysctl(SYSCTL_HANDLER_ARGS)
        }
        bpfd_cnt = 0;
        BPF_LOCK();
-       LIST_FOREACH(bp, &bpf_iflist, bif_next) {
+       LIST_FOREACH(bp, &V_bpf_iflist, bif_next) {
                CK_LIST_FOREACH(bd, &bp->bif_wlist, bd_next)
                        bpfd_cnt++;
                CK_LIST_FOREACH(bd, &bp->bif_dlist, bd_next)
@@ -2946,7 +2948,7 @@ bpf_stats_sysctl(SYSCTL_HANDLER_ARGS)
        }
        xbdbuf = malloc(bpfd_cnt * sizeof(*xbd), M_BPF, M_WAITOK);
        index = 0;
-       LIST_FOREACH(bp, &bpf_iflist, bif_next) {
+       LIST_FOREACH(bp, &V_bpf_iflist, bif_next) {
                /* Send writers-only first */
                CK_LIST_FOREACH(bd, &bp->bif_wlist, bd_next) {
                        MPASS(index <= bpfd_cnt);

Reply via email to