Message ID | 20231018061746.111364-1-zhouchuyi@bytedance.com |
---|---|
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:612c:2908:b0:403:3b70:6f57 with SMTP id ib8csp4594800vqb; Tue, 17 Oct 2023 23:19:53 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFLBo3qmtAE0yGem8dDJBXNEfybF/a8cg5pKe/aWrV0t2v8xAa90xpgYdQEk557IOEXkpJ9 X-Received: by 2002:a05:6a00:180f:b0:68f:c8b3:3077 with SMTP id y15-20020a056a00180f00b0068fc8b33077mr4408264pfa.1.1697609993119; Tue, 17 Oct 2023 23:19:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697609993; cv=none; d=google.com; s=arc-20160816; b=MF5/lNQna1cK9ozB00zJD3eCtGJofa1HMHTSbqnbWNEga78/uV0oJTCYRnPRW1rybv bqgW0pbak5XeGP6wh/498lSyP0w5bcTbnAw521gBviA1m9Du8nkrToWWCV19aGERu58S pWRt61KqDQnLupeX/svP5XPI6hNPdxnRQxrzx8NL7LprV/oPjM+AvyHAlrV0jUbuNs3f W1VNdDdoufi3ELZIFuunEINbFSS3R2gc5q8A06gM24pGDXNlziJcSnPrK/9VZ7ZsU1Y0 8It/l5HpoQR9S0lVZdNmyLTValoO7aibrqGj7wNH4FBY3blehFpmqAJy4RLKaGzeKvej XonA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=7WGehLvi+FTWeGkTWKP/DHbfVzwre07LJ9bBGVXupS4=; fh=DR7g1EcWKOXTEoooUPBSJXUaklSrDEYzv6YDdhz1CwE=; b=whDAZDvvhP/Ck6UZuaX/0a5d/JCfDga/R8kr+qBsg915k/gUc99pOlLV2e1BIZXhQl x5TvBkEQhYHK0UqiWqE9B23isYWrjv5NBdTg/qXFn3qeIwQaifEQ6OI4gq+5m+W7YDue GM+gznC/WjRVAXi1VPvEIj3XkNWuCzQpJPOrCBTFSZDv8BSPW13qL99yWX2Co8/RrHO3 0AItz7tulRuE1lKSY+cxvB+NSjJh2yAhW/VBpUCUYS23zXbsFQY5+FPyrt+tkrUT9eCh abjPtkWIvakHFpvjMS7gRhLH8R6lltHy8wTC08alK9ya7qhcEN65yonsu8T9NFju0T/D tIZw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@bytedance.com header.s=google header.b=ifdtDxmJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=bytedance.com Received: from agentk.vger.email (agentk.vger.email. [23.128.96.32]) by mx.google.com with ESMTPS id g18-20020a056a001a1200b006be322191desi3527855pfv.112.2023.10.17.23.19.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 17 Oct 2023 23:19:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) client-ip=23.128.96.32; Authentication-Results: mx.google.com; dkim=pass header.i=@bytedance.com header.s=google header.b=ifdtDxmJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=bytedance.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 1B6AD802407D; Tue, 17 Oct 2023 23:19:49 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235032AbjJRGTi (ORCPT <rfc822;zwp10758@gmail.com> + 23 others); Wed, 18 Oct 2023 02:19:38 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:32954 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229714AbjJRGSc (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Wed, 18 Oct 2023 02:18:32 -0400 Received: from mail-pj1-x1033.google.com (mail-pj1-x1033.google.com [IPv6:2607:f8b0:4864:20::1033]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A7CA3D45 for <linux-kernel@vger.kernel.org>; Tue, 17 Oct 2023 23:17:56 -0700 (PDT) Received: by mail-pj1-x1033.google.com with SMTP id 98e67ed59e1d1-27cfb8442f9so4113204a91.2 for <linux-kernel@vger.kernel.org>; Tue, 17 Oct 2023 23:17:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bytedance.com; s=google; t=1697609875; x=1698214675; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=7WGehLvi+FTWeGkTWKP/DHbfVzwre07LJ9bBGVXupS4=; b=ifdtDxmJ2hvbsEOUlsNcxitO6NodJJ1mFQZweYGCky2DFCSXiyT37RzSu8xiT5nqJZ NqjxUg2Rgnyfc24AZSV9FE7guW66zD8A8yX4woJLonSi+CDc1e4bW/IFmqEtvDqOX2e6 HorCDrJLaEGKWhH5pYuV0EI0Wd23fO8PU8WbUM7EIQnbRBn3Mf/gpXPS60nnK00whH8c FVzUnFVC7htM79kO04lcMdOC5ZJ6DNWl6y76a+9ScS+RtuDKnU6QKcrn2vWsh+tY5yj2 Cff/11dx+fITiJF8/uZVF8HDuVmsBUist/DjyvlRXMzYMhW0XxV1YSPRCKdLjpqYOIdS 9E/Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1697609875; x=1698214675; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=7WGehLvi+FTWeGkTWKP/DHbfVzwre07LJ9bBGVXupS4=; b=LfRl8IX1E/g+xxzzWYTZ3rxr+eaiAywGYmi8cZQoFq3eBXv/GARcgNj7xNkyORiaSo nlyoWbglJDJCRDjAwJND2RLp0pBtI+rdg/xipEnheeaxWSnZkyII6MPfos2lB4nzPB4h BwAilvUhh/VzNFsivPvaK3JR6hkxIWafDolakjGPHlxsIwzP748QUPl6QzjnTuGVy7hb 5RVgGgOeoN+jREqxOUAAjWTn6fgmr0lN312ImZgARZUeCblHrAutg/kTDpEBLB1fnQdF HHxNoSoou5rG1O7Jne3V0OjCQQ/00I+pm9SLOYPT0X4L9OskvSWvD3ozbrp0atHWxzdN WwQA== X-Gm-Message-State: AOJu0YyO9TUIsZtcOiJhFbbZUEUmA38tRKSh5TBX0d/NPKJVh7PoJ/iH M/ey2ETVEPfS/KVIW/QrF2ScUyqbL9p8lz++jdM= X-Received: by 2002:a17:90a:ec88:b0:27d:2e39:25da with SMTP id f8-20020a17090aec8800b0027d2e3925damr4090446pjy.39.1697609875037; Tue, 17 Oct 2023 23:17:55 -0700 (PDT) Received: from n37-019-243.byted.org ([180.184.103.200]) by smtp.gmail.com with ESMTPSA id ix13-20020a170902f80d00b001c61acd5bd2sm2659116plb.112.2023.10.17.23.17.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 17 Oct 2023 23:17:54 -0700 (PDT) From: Chuyi Zhou <zhouchuyi@bytedance.com> To: bpf@vger.kernel.org Cc: ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, martin.lau@kernel.org, tj@kernel.org, linux-kernel@vger.kernel.org, Chuyi Zhou <zhouchuyi@bytedance.com> Subject: [RESEND PATCH bpf-next v6 0/8] Add Open-coded task, css_task and css iters Date: Wed, 18 Oct 2023 14:17:38 +0800 Message-Id: <20231018061746.111364-1-zhouchuyi@bytedance.com> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-0.8 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Tue, 17 Oct 2023 23:19:49 -0700 (PDT) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1780072121378679131 X-GMAIL-MSGID: 1780073095781194773 |
Series |
Add Open-coded task, css_task and css iters
|
|
Message
Chuyi Zhou
Oct. 18, 2023, 6:17 a.m. UTC
This is version 6 of task, css_task and css iters support. --- Changelog --- v5 -> v6: Patch #3: * In bpf_iter_task_next, return pos rather than goto out. (Andrii) Patch #2, #3, #4: * Add the missing __diag_ignore_all to avoid kernel build warning Patch #5, #6, #7: * Add Andrii's ack Patch #8: * In BPF prog iter_css_task_for_each, return -EPERM rather than 0, and ensure stack_mprotect() in iters.c not success. If not, it would cause the subsequent 'test_lsm' fail, since the 'is_stack' check in test_int_hook(lsm.c) would not be guaranteed. (https://github.com/kernel-patches/bpf/actions/runs/6489662214/job/17624665086?pr=5790) v4 -> v5:https://lore.kernel.org/lkml/20231007124522.34834-1-zhouchuyi@bytedance.com/ Patch 3~4: * Relax the BUILD_BUG_ON check in bpf_iter_task_new and bpf_iter_css_new to avoid netdev/build_32bit CI error. (https://netdev.bots.linux.dev/static/nipa/790929/13412333/build_32bit/stderr) Patch 8: * Initialize skel pointer to fix the LLVM-16 build CI error (https://github.com/kernel-patches/bpf/actions/runs/6462875618/job/17545170863) v3 -> v4:https://lore.kernel.org/all/20230925105552.817513-1-zhouchuyi@bytedance.com/ * Address all the comments from Andrii in patch-3 ~ patch-6 * Collect Tejun's ack * Add a extra patch to rename bpf_iter_task.c to bpf_iter_tasks.c * Seperate three BPF program files for selftests (iters_task.c iters_css_task.c iters_css.c) v2 -> v3:https://lore.kernel.org/lkml/20230912070149.969939-1-zhouchuyi@bytedance.com/ Patch 1 (cgroup: Prepare for using css_task_iter_*() in BPF) * Add tj's ack and Alexei's suggest-by. Patch 2 (bpf: Introduce css_task open-coded iterator kfuncs) * Use bpf_mem_alloc/bpf_mem_free rather than kzalloc() * Add KF_TRUSTED_ARGS for bpf_iter_css_task_new (Alexei) * Move bpf_iter_css_task's definition from uapi/linux/bpf.h to kernel/bpf/task_iter.c and we can use it from vmlinux.h * Move bpf_iter_css_task_XXX's declaration from bpf_helpers.h to bpf_experimental.h Patch 3 (Introduce task open coded iterator kfuncs) * Change th API design keep consistent with SEC("iter/task"), support iterating all threads(BPF_TASK_ITERATE_ALL) and threads of a specific task (BPF_TASK_ITERATE_THREAD).(Andrii) * Move bpf_iter_task's definition from uapi/linux/bpf.h to kernel/bpf/task_iter.c and we can use it from vmlinux.h * Move bpf_iter_task_XXX's declaration from bpf_helpers.h to bpf_experimental.h Patch 4 (Introduce css open-coded iterator kfuncs) * Change th API design keep consistent with cgroup_iters, reuse BPF_CGROUP_ITER_DESCENDANTS_PRE/BPF_CGROUP_ITER_DESCENDANTS_POST /BPF_CGROUP_ITER_ANCESTORS_UP(Andrii) * Add KF_TRUSTED_ARGS for bpf_iter_css_new * Move bpf_iter_css's definition from uapi/linux/bpf.h to kernel/bpf/task_iter.c and we can use it from vmlinux.h * Move bpf_iter_css_XXX's declaration from bpf_helpers.h to bpf_experimental.h Patch 5 (teach the verifier to enforce css_iter and task_iter in RCU CS) * Add KF flag KF_RCU_PROTECTED to maintain kfuncs which need RCU CS.(Andrii) * Consider STACK_ITER when using bpf_for_each_spilled_reg. Patch 6 (Let bpf_iter_task_new accept null task ptr) * Add this extra patch to let bpf_iter_task_new accept a 'nullable' * task pointer(Andrii) Patch 7 (selftests/bpf: Add tests for open-coded task and css iter) * Add failure testcase(Alexei) Changes from v1(https://lore.kernel.org/lkml/20230827072057.1591929-1-zhouchuyi@bytedance.com/): - Add a pre-patch to make some preparations before supporting css_task iters.(Alexei) - Add an allowlist for css_task iters(Alexei) - Let bpf progs do explicit bpf_rcu_read_lock() when using process iters and css_descendant iters.(Alexei) --------------------- In some BPF usage scenarios, it will be useful to iterate the process and css directly in the BPF program. One of the expected scenarios is customizable OOM victim selection via BPF[1]. Inspired by Dave's task_vma iter[2], this patchset adds three types of open-coded iterator kfuncs: 1. bpf_task_iters. It can be used to 1) iterate all process in the system, like for_each_forcess() in kernel. 2) iterate all threads in the system. 3) iterate all threads of a specific task 2. bpf_css_iters. It works like css_task_iter_{start, next, end} and would be used to iterating tasks/threads under a css. 3. css_iters. It works like css_next_descendant_{pre, post} to iterating all descendant css. BPF programs can use these kfuncs directly or through bpf_for_each macro. link[1]: https://lore.kernel.org/lkml/20230810081319.65668-1-zhouchuyi@bytedance.com/ link[2]: https://lore.kernel.org/all/20230810183513.684836-1-davemarchevsky@fb.com/ Chuyi Zhou (8): cgroup: Prepare for using css_task_iter_*() in BPF bpf: Introduce css_task open-coded iterator kfuncs bpf: Introduce task open coded iterator kfuncs bpf: Introduce css open-coded iterator kfuncs bpf: teach the verifier to enforce css_iter and task_iter in RCU CS bpf: Let bpf_iter_task_new accept null task ptr selftests/bpf: rename bpf_iter_task.c to bpf_iter_tasks.c selftests/bpf: Add tests for open-coded task and css iter include/linux/bpf_verifier.h | 19 ++- include/linux/btf.h | 1 + include/linux/cgroup.h | 12 +- kernel/bpf/cgroup_iter.c | 65 ++++++++ kernel/bpf/helpers.c | 9 ++ kernel/bpf/task_iter.c | 151 ++++++++++++++++++ kernel/bpf/verifier.c | 86 ++++++++-- kernel/cgroup/cgroup.c | 18 ++- .../testing/selftests/bpf/bpf_experimental.h | 19 +++ .../selftests/bpf/prog_tests/bpf_iter.c | 18 +-- .../testing/selftests/bpf/prog_tests/iters.c | 150 +++++++++++++++++ .../{bpf_iter_task.c => bpf_iter_tasks.c} | 0 tools/testing/selftests/bpf/progs/iters_css.c | 72 +++++++++ .../selftests/bpf/progs/iters_css_task.c | 47 ++++++ .../testing/selftests/bpf/progs/iters_task.c | 41 +++++ .../selftests/bpf/progs/iters_task_failure.c | 105 ++++++++++++ 16 files changed, 771 insertions(+), 42 deletions(-) rename tools/testing/selftests/bpf/progs/{bpf_iter_task.c => bpf_iter_tasks.c} (100%) create mode 100644 tools/testing/selftests/bpf/progs/iters_css.c create mode 100644 tools/testing/selftests/bpf/progs/iters_css_task.c create mode 100644 tools/testing/selftests/bpf/progs/iters_task.c create mode 100644 tools/testing/selftests/bpf/progs/iters_task_failure.c
Comments
在 2023/10/18 14:17, Chuyi Zhou 写道: > This is version 6 of task, css_task and css iters support. > I resend this patchset since my network broken when I sent it first time. > --- Changelog --- > > v5 -> v6: > > Patch #3: > * In bpf_iter_task_next, return pos rather than goto out. (Andrii) > Patch #2, #3, #4: > * Add the missing __diag_ignore_all to avoid kernel build warning > Patch #5, #6, #7: > * Add Andrii's ack > > Patch #8: > * In BPF prog iter_css_task_for_each, return -EPERM rather than 0, and > ensure stack_mprotect() in iters.c not success. If not, it would cause > the subsequent 'test_lsm' fail, since the 'is_stack' check in > test_int_hook(lsm.c) would not be guaranteed. > (https://github.com/kernel-patches/bpf/actions/runs/6489662214/job/17624665086?pr=5790) > > v4 -> v5:https://lore.kernel.org/lkml/20231007124522.34834-1-zhouchuyi@bytedance.com/ > > Patch 3~4: > * Relax the BUILD_BUG_ON check in bpf_iter_task_new and bpf_iter_css_new to avoid > netdev/build_32bit CI error. > (https://netdev.bots.linux.dev/static/nipa/790929/13412333/build_32bit/stderr) > Patch 8: > * Initialize skel pointer to fix the LLVM-16 build CI error > (https://github.com/kernel-patches/bpf/actions/runs/6462875618/job/17545170863) > > v3 -> v4:https://lore.kernel.org/all/20230925105552.817513-1-zhouchuyi@bytedance.com/ > > * Address all the comments from Andrii in patch-3 ~ patch-6 > * Collect Tejun's ack > * Add a extra patch to rename bpf_iter_task.c to bpf_iter_tasks.c > * Seperate three BPF program files for selftests (iters_task.c iters_css_task.c iters_css.c) > > v2 -> v3:https://lore.kernel.org/lkml/20230912070149.969939-1-zhouchuyi@bytedance.com/ > > Patch 1 (cgroup: Prepare for using css_task_iter_*() in BPF) > * Add tj's ack and Alexei's suggest-by. > Patch 2 (bpf: Introduce css_task open-coded iterator kfuncs) > * Use bpf_mem_alloc/bpf_mem_free rather than kzalloc() > * Add KF_TRUSTED_ARGS for bpf_iter_css_task_new (Alexei) > * Move bpf_iter_css_task's definition from uapi/linux/bpf.h to > kernel/bpf/task_iter.c and we can use it from vmlinux.h > * Move bpf_iter_css_task_XXX's declaration from bpf_helpers.h to > bpf_experimental.h > Patch 3 (Introduce task open coded iterator kfuncs) > * Change th API design keep consistent with SEC("iter/task"), support > iterating all threads(BPF_TASK_ITERATE_ALL) and threads of a > specific task (BPF_TASK_ITERATE_THREAD).(Andrii) > * Move bpf_iter_task's definition from uapi/linux/bpf.h to > kernel/bpf/task_iter.c and we can use it from vmlinux.h > * Move bpf_iter_task_XXX's declaration from bpf_helpers.h to > bpf_experimental.h > Patch 4 (Introduce css open-coded iterator kfuncs) > * Change th API design keep consistent with cgroup_iters, reuse > BPF_CGROUP_ITER_DESCENDANTS_PRE/BPF_CGROUP_ITER_DESCENDANTS_POST > /BPF_CGROUP_ITER_ANCESTORS_UP(Andrii) > * Add KF_TRUSTED_ARGS for bpf_iter_css_new > * Move bpf_iter_css's definition from uapi/linux/bpf.h to > kernel/bpf/task_iter.c and we can use it from vmlinux.h > * Move bpf_iter_css_XXX's declaration from bpf_helpers.h to > bpf_experimental.h > Patch 5 (teach the verifier to enforce css_iter and task_iter in RCU CS) > * Add KF flag KF_RCU_PROTECTED to maintain kfuncs which need RCU CS.(Andrii) > * Consider STACK_ITER when using bpf_for_each_spilled_reg. > Patch 6 (Let bpf_iter_task_new accept null task ptr) > * Add this extra patch to let bpf_iter_task_new accept a 'nullable' > * task pointer(Andrii) > Patch 7 (selftests/bpf: Add tests for open-coded task and css iter) > * Add failure testcase(Alexei) > > > Changes from v1(https://lore.kernel.org/lkml/20230827072057.1591929-1-zhouchuyi@bytedance.com/): > - Add a pre-patch to make some preparations before supporting css_task > iters.(Alexei) > - Add an allowlist for css_task iters(Alexei) > - Let bpf progs do explicit bpf_rcu_read_lock() when using process > iters and css_descendant iters.(Alexei) > --------------------- > > In some BPF usage scenarios, it will be useful to iterate the process and > css directly in the BPF program. One of the expected scenarios is > customizable OOM victim selection via BPF[1]. > > Inspired by Dave's task_vma iter[2], this patchset adds three types of > open-coded iterator kfuncs: > > 1. bpf_task_iters. It can be used to > 1) iterate all process in the system, like for_each_forcess() in kernel. > 2) iterate all threads in the system. > 3) iterate all threads of a specific task > > 2. bpf_css_iters. It works like css_task_iter_{start, next, end} and would > be used to iterating tasks/threads under a css. > > 3. css_iters. It works like css_next_descendant_{pre, post} to iterating all > descendant css. > > BPF programs can use these kfuncs directly or through bpf_for_each macro. > > link[1]: https://lore.kernel.org/lkml/20230810081319.65668-1-zhouchuyi@bytedance.com/ > link[2]: https://lore.kernel.org/all/20230810183513.684836-1-davemarchevsky@fb.com/ > > Chuyi Zhou (8): > cgroup: Prepare for using css_task_iter_*() in BPF > bpf: Introduce css_task open-coded iterator kfuncs > bpf: Introduce task open coded iterator kfuncs > bpf: Introduce css open-coded iterator kfuncs > bpf: teach the verifier to enforce css_iter and task_iter in RCU CS > bpf: Let bpf_iter_task_new accept null task ptr > selftests/bpf: rename bpf_iter_task.c to bpf_iter_tasks.c > selftests/bpf: Add tests for open-coded task and css iter > > include/linux/bpf_verifier.h | 19 ++- > include/linux/btf.h | 1 + > include/linux/cgroup.h | 12 +- > kernel/bpf/cgroup_iter.c | 65 ++++++++ > kernel/bpf/helpers.c | 9 ++ > kernel/bpf/task_iter.c | 151 ++++++++++++++++++ > kernel/bpf/verifier.c | 86 ++++++++-- > kernel/cgroup/cgroup.c | 18 ++- > .../testing/selftests/bpf/bpf_experimental.h | 19 +++ > .../selftests/bpf/prog_tests/bpf_iter.c | 18 +-- > .../testing/selftests/bpf/prog_tests/iters.c | 150 +++++++++++++++++ > .../{bpf_iter_task.c => bpf_iter_tasks.c} | 0 > tools/testing/selftests/bpf/progs/iters_css.c | 72 +++++++++ > .../selftests/bpf/progs/iters_css_task.c | 47 ++++++ > .../testing/selftests/bpf/progs/iters_task.c | 41 +++++ > .../selftests/bpf/progs/iters_task_failure.c | 105 ++++++++++++ > 16 files changed, 771 insertions(+), 42 deletions(-) > rename tools/testing/selftests/bpf/progs/{bpf_iter_task.c => bpf_iter_tasks.c} (100%) > create mode 100644 tools/testing/selftests/bpf/progs/iters_css.c > create mode 100644 tools/testing/selftests/bpf/progs/iters_css_task.c > create mode 100644 tools/testing/selftests/bpf/progs/iters_task.c > create mode 100644 tools/testing/selftests/bpf/progs/iters_task_failure.c >
Hello: This series was applied to bpf/bpf-next.git (master) by Alexei Starovoitov <ast@kernel.org>: On Wed, 18 Oct 2023 14:17:38 +0800 you wrote: > This is version 6 of task, css_task and css iters support. > > --- Changelog --- > > v5 -> v6: > > Patch #3: > * In bpf_iter_task_next, return pos rather than goto out. (Andrii) > Patch #2, #3, #4: > * Add the missing __diag_ignore_all to avoid kernel build warning > Patch #5, #6, #7: > * Add Andrii's ack > > [...] Here is the summary with links: - [RESEND,bpf-next,v6,1/8] cgroup: Prepare for using css_task_iter_*() in BPF https://git.kernel.org/bpf/bpf-next/c/6da88306811b - [RESEND,bpf-next,v6,2/8] bpf: Introduce css_task open-coded iterator kfuncs https://git.kernel.org/bpf/bpf-next/c/9c66dc94b62a - [RESEND,bpf-next,v6,3/8] bpf: Introduce task open coded iterator kfuncs https://git.kernel.org/bpf/bpf-next/c/c68a78ffe2cb - [RESEND,bpf-next,v6,4/8] bpf: Introduce css open-coded iterator kfuncs https://git.kernel.org/bpf/bpf-next/c/7251d0905e75 - [RESEND,bpf-next,v6,5/8] bpf: teach the verifier to enforce css_iter and task_iter in RCU CS https://git.kernel.org/bpf/bpf-next/c/dfab99df147b - [RESEND,bpf-next,v6,6/8] bpf: Let bpf_iter_task_new accept null task ptr https://git.kernel.org/bpf/bpf-next/c/cb3ecf7915a1 - [RESEND,bpf-next,v6,7/8] selftests/bpf: rename bpf_iter_task.c to bpf_iter_tasks.c https://git.kernel.org/bpf/bpf-next/c/ddab78cbb52f - [RESEND,bpf-next,v6,8/8] selftests/bpf: Add tests for open-coded task and css iter https://git.kernel.org/bpf/bpf-next/c/130e0f7af9fc You are awesome, thank you!