In the next commit, it will be able to report logs via extended common
attributes, which will report 'log_true_size' via the extended common
attributes meanwhile.

Therefore, refactor the way of 'btf_log_true_size' reporting in order to
report 'log_true_size' via the extended common attributes easily.

Signed-off-by: Leon Hwang <[email protected]>
---
 include/linux/btf.h  |  2 +-
 kernel/bpf/btf.c     | 25 +++++--------------------
 kernel/bpf/syscall.c | 19 ++++++++++++++++---
 3 files changed, 22 insertions(+), 24 deletions(-)

diff --git a/include/linux/btf.h b/include/linux/btf.h
index 691f09784933..2b27fdd567f5 100644
--- a/include/linux/btf.h
+++ b/include/linux/btf.h
@@ -144,7 +144,7 @@ const char *btf_get_name(const struct btf *btf);
 void btf_get(struct btf *btf);
 void btf_put(struct btf *btf);
 const struct btf_header *btf_header(const struct btf *btf);
-int btf_new_fd(const union bpf_attr *attr, bpfptr_t uattr, u32 uattr_sz);
+int btf_new_fd(union bpf_attr *attr, bpfptr_t uattr);
 struct btf *btf_get_by_fd(int fd);
 int btf_get_info_by_fd(const struct btf *btf,
                       const union bpf_attr *attr,
diff --git a/kernel/bpf/btf.c b/kernel/bpf/btf.c
index 539c9fdea41d..9efcbb489edb 100644
--- a/kernel/bpf/btf.c
+++ b/kernel/bpf/btf.c
@@ -5745,22 +5745,7 @@ static int btf_check_type_tags(struct btf_verifier_env 
*env,
        return 0;
 }
 
-static int finalize_log(struct bpf_verifier_log *log, bpfptr_t uattr, u32 
uattr_size)
-{
-       u32 log_true_size;
-       int err;
-
-       err = bpf_vlog_finalize(log, &log_true_size);
-
-       if (uattr_size >= offsetofend(union bpf_attr, btf_log_true_size) &&
-           copy_to_bpfptr_offset(uattr, offsetof(union bpf_attr, 
btf_log_true_size),
-                                 &log_true_size, sizeof(log_true_size)))
-               err = -EFAULT;
-
-       return err;
-}
-
-static struct btf *btf_parse(const union bpf_attr *attr, bpfptr_t uattr, u32 
uattr_size)
+static struct btf *btf_parse(union bpf_attr *attr, bpfptr_t uattr)
 {
        bpfptr_t btf_data = make_bpfptr(attr->btf, uattr.is_kernel);
        char __user *log_ubuf = u64_to_user_ptr(attr->btf_log_buf);
@@ -5841,7 +5826,7 @@ static struct btf *btf_parse(const union bpf_attr *attr, 
bpfptr_t uattr, u32 uat
                }
        }
 
-       err = finalize_log(&env->log, uattr, uattr_size);
+       err = bpf_vlog_finalize(&env->log, &attr->btf_log_true_size);
        if (err)
                goto errout_free;
 
@@ -5853,7 +5838,7 @@ static struct btf *btf_parse(const union bpf_attr *attr, 
bpfptr_t uattr, u32 uat
        btf_free_struct_meta_tab(btf);
 errout:
        /* overwrite err with -ENOSPC or -EFAULT */
-       ret = finalize_log(&env->log, uattr, uattr_size);
+       ret = bpf_vlog_finalize(&env->log, &attr->btf_log_true_size);
        if (ret)
                err = ret;
 errout_free:
@@ -8017,12 +8002,12 @@ static int __btf_new_fd(struct btf *btf)
        return anon_inode_getfd("btf", &btf_fops, btf, O_RDONLY | O_CLOEXEC);
 }
 
-int btf_new_fd(const union bpf_attr *attr, bpfptr_t uattr, u32 uattr_size)
+int btf_new_fd(union bpf_attr *attr, bpfptr_t uattr)
 {
        struct btf *btf;
        int ret;
 
-       btf = btf_parse(attr, uattr, uattr_size);
+       btf = btf_parse(attr, uattr);
        if (IS_ERR(btf))
                return PTR_ERR(btf);
 
diff --git a/kernel/bpf/syscall.c b/kernel/bpf/syscall.c
index ad565f569a4f..ce349a059d5d 100644
--- a/kernel/bpf/syscall.c
+++ b/kernel/bpf/syscall.c
@@ -5422,7 +5422,7 @@ static int bpf_obj_get_info_by_fd(const union bpf_attr 
*attr,
 
 #define BPF_BTF_LOAD_LAST_FIELD btf_token_fd
 
-static int bpf_btf_load(const union bpf_attr *attr, bpfptr_t uattr, __u32 
uattr_size)
+static int bpf_btf_load(union bpf_attr *attr, bpfptr_t uattr)
 {
        struct bpf_token *token = NULL;
 
@@ -5449,7 +5449,7 @@ static int bpf_btf_load(const union bpf_attr *attr, 
bpfptr_t uattr, __u32 uattr_
 
        bpf_token_put(token);
 
-       return btf_new_fd(attr, uattr, uattr_size);
+       return btf_new_fd(attr, uattr);
 }
 
 #define BPF_BTF_GET_FD_BY_ID_LAST_FIELD fd_by_id_token_fd
@@ -6211,6 +6211,16 @@ static int copy_prog_load_log_true_size(union bpf_attr 
*attr, bpfptr_t uattr, un
                                              &attr->log_true_size);
 }
 
+static int copy_btf_load_log_true_size(union bpf_attr *attr, bpfptr_t uattr, 
unsigned int size)
+{
+       if (size >= offsetofend(union bpf_attr, btf_log_true_size) &&
+           copy_to_bpfptr_offset(uattr, offsetof(union bpf_attr, 
btf_log_true_size),
+                                 &attr->btf_log_true_size, 
sizeof(attr->btf_log_true_size)))
+               return -EFAULT;
+
+       return 0;
+}
+
 static int __sys_bpf(enum bpf_cmd cmd, bpfptr_t uattr, unsigned int size,
                     bpfptr_t uattr_common, unsigned int size_common)
 {
@@ -6318,7 +6328,10 @@ static int __sys_bpf(enum bpf_cmd cmd, bpfptr_t uattr, 
unsigned int size,
                err = bpf_raw_tracepoint_open(&attr);
                break;
        case BPF_BTF_LOAD:
-               err = bpf_btf_load(&attr, uattr, size);
+               attr.btf_log_true_size = 0;
+               err = bpf_btf_load(&attr, uattr);
+               ret = copy_btf_load_log_true_size(&attr, uattr, size);
+               err = ret ? ret : err;
                break;
        case BPF_BTF_GET_FD_BY_ID:
                err = bpf_btf_get_fd_by_id(&attr);
-- 
2.52.0


Reply via email to