[PATCH RESEND v3 bpf-next 13/14] libbpf: add BPF token support to bpf_prog_load() API
Andrii Nakryiko
andrii at kernel.org
Thu Jun 29 05:18:31 UTC 2023
Wire through token_fd into bpf_prog_load(). Also make sure to pass
allowed_{prog,attach}_types to kernel in bpf_token_create().
Signed-off-by: Andrii Nakryiko <andrii at kernel.org>
---
tools/lib/bpf/bpf.c | 5 ++++-
tools/lib/bpf/bpf.h | 7 +++++--
2 files changed, 9 insertions(+), 3 deletions(-)
diff --git a/tools/lib/bpf/bpf.c b/tools/lib/bpf/bpf.c
index 6fb915069be7..5f331bbf1ad2 100644
--- a/tools/lib/bpf/bpf.c
+++ b/tools/lib/bpf/bpf.c
@@ -234,7 +234,7 @@ int bpf_prog_load(enum bpf_prog_type prog_type,
const struct bpf_insn *insns, size_t insn_cnt,
struct bpf_prog_load_opts *opts)
{
- const size_t attr_sz = offsetofend(union bpf_attr, log_true_size);
+ const size_t attr_sz = offsetofend(union bpf_attr, prog_token_fd);
void *finfo = NULL, *linfo = NULL;
const char *func_info, *line_info;
__u32 log_size, log_level, attach_prog_fd, attach_btf_obj_fd;
@@ -263,6 +263,7 @@ int bpf_prog_load(enum bpf_prog_type prog_type,
attr.prog_flags = OPTS_GET(opts, prog_flags, 0);
attr.prog_ifindex = OPTS_GET(opts, prog_ifindex, 0);
attr.kern_version = OPTS_GET(opts, kern_version, 0);
+ attr.prog_token_fd = OPTS_GET(opts, token_fd, 0);
if (prog_name && kernel_supports(NULL, FEAT_PROG_NAME))
libbpf_strlcpy(attr.prog_name, prog_name, sizeof(attr.prog_name));
@@ -1223,6 +1224,8 @@ int bpf_token_create(int pin_path_fd, const char *pin_pathname, struct bpf_token
attr.token_create.pin_flags = OPTS_GET(opts, pin_flags, 0);
attr.token_create.allowed_cmds = OPTS_GET(opts, allowed_cmds, 0);
attr.token_create.allowed_map_types = OPTS_GET(opts, allowed_map_types, 0);
+ attr.token_create.allowed_prog_types = OPTS_GET(opts, allowed_prog_types, 0);
+ attr.token_create.allowed_attach_types = OPTS_GET(opts, allowed_attach_types, 0);
ret = sys_bpf(BPF_TOKEN_CREATE, &attr, attr_sz);
return libbpf_err_errno(ret);
diff --git a/tools/lib/bpf/bpf.h b/tools/lib/bpf/bpf.h
index dc7c4af21ad9..2ac56fba6027 100644
--- a/tools/lib/bpf/bpf.h
+++ b/tools/lib/bpf/bpf.h
@@ -104,9 +104,10 @@ struct bpf_prog_load_opts {
* If kernel doesn't support this feature, log_size is left unchanged.
*/
__u32 log_true_size;
+ __u32 token_fd;
size_t :0;
};
-#define bpf_prog_load_opts__last_field log_true_size
+#define bpf_prog_load_opts__last_field token_fd
LIBBPF_API int bpf_prog_load(enum bpf_prog_type prog_type,
const char *prog_name, const char *license,
@@ -561,9 +562,11 @@ struct bpf_token_create_opts {
__u32 pin_flags;
__u64 allowed_cmds;
__u64 allowed_map_types;
+ __u64 allowed_prog_types;
+ __u64 allowed_attach_types;
size_t :0;
};
-#define bpf_token_create_opts__last_field allowed_map_types
+#define bpf_token_create_opts__last_field allowed_attach_types
/**
* @brief **bpf_token_create()** creates a new instance of BPF token, pinning
--
2.34.1
More information about the Linux-security-module-archive
mailing list