mirror of
https://github.com/torvalds/linux.git
synced 2024-11-10 06:01:57 +00:00
3dec541b2e
Pointer to BTF object is a pointer to kernel object or NULL. Such pointers can only be used by BPF_LDX instructions. The verifier changed their opcode from LDX|MEM|size to LDX|PROBE_MEM|size to make JITing easier. The number of entries in extable is the number of BPF_LDX insns that access kernel memory via "pointer to BTF type". Only these load instructions can fault. Since x86 extable is relative it has to be allocated in the same memory region as JITed code. Allocate it prior to last pass of JITing and let the last pass populate it. Pointer to extable in bpf_prog_aux is necessary to make page fault handling fast. Page fault handling is done in two steps: 1. bpf_prog_kallsyms_find() finds BPF program that page faulted. It's done by walking rb tree. 2. then extable for given bpf program is binary searched. This process is similar to how page faulting is done for kernel modules. The exception handler skips over faulting x86 instruction and initializes destination register with zero. This mimics exact behavior of bpf_probe_read (when probe_kernel_read faults dest is zeroed). JITs for other architectures can add support in similar way. Until then they will reject unknown opcode and fallback to interpreter. Since extable should be aligned and placed near JITed code make bpf_jit_binary_alloc() return 4 byte aligned image offset, so that extable aligning formula in bpf_int_jit_compile() doesn't need to rely on internal implementation of bpf_jit_binary_alloc(). On x86 gcc defaults to 16-byte alignment for regular kernel functions due to better performance. JITed code may be aligned to 16 in the future, but it will use 4 in the meantime. Signed-off-by: Alexei Starovoitov <ast@kernel.org> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net> Acked-by: Andrii Nakryiko <andriin@fb.com> Acked-by: Martin KaFai Lau <kafai@fb.com> Link: https://lore.kernel.org/bpf/20191016032505.2089704-10-ast@kernel.org
47 lines
1.3 KiB
C
47 lines
1.3 KiB
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
#ifndef _LINUX_EXTABLE_H
|
|
#define _LINUX_EXTABLE_H
|
|
|
|
#include <linux/stddef.h> /* for NULL */
|
|
#include <linux/types.h>
|
|
|
|
struct module;
|
|
struct exception_table_entry;
|
|
|
|
const struct exception_table_entry *
|
|
search_extable(const struct exception_table_entry *base,
|
|
const size_t num,
|
|
unsigned long value);
|
|
void sort_extable(struct exception_table_entry *start,
|
|
struct exception_table_entry *finish);
|
|
void sort_main_extable(void);
|
|
void trim_init_extable(struct module *m);
|
|
|
|
/* Given an address, look for it in the exception tables */
|
|
const struct exception_table_entry *search_exception_tables(unsigned long add);
|
|
const struct exception_table_entry *
|
|
search_kernel_exception_table(unsigned long addr);
|
|
|
|
#ifdef CONFIG_MODULES
|
|
/* For extable.c to search modules' exception tables. */
|
|
const struct exception_table_entry *search_module_extables(unsigned long addr);
|
|
#else
|
|
static inline const struct exception_table_entry *
|
|
search_module_extables(unsigned long addr)
|
|
{
|
|
return NULL;
|
|
}
|
|
#endif /*CONFIG_MODULES*/
|
|
|
|
#ifdef CONFIG_BPF_JIT
|
|
const struct exception_table_entry *search_bpf_extables(unsigned long addr);
|
|
#else
|
|
static inline const struct exception_table_entry *
|
|
search_bpf_extables(unsigned long addr)
|
|
{
|
|
return NULL;
|
|
}
|
|
#endif
|
|
|
|
#endif /* _LINUX_EXTABLE_H */
|