mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2025-04-13 05:58:02 +07:00
bpf, verifier: avoid retpoline for map push/pop/peek operation
Extend prior work from 09772d92cd
("bpf: avoid retpoline for
lookup/update/delete calls on maps") to also apply to the recently
added map helpers that perform push/pop/peek operations so that
the indirect call can be avoided.
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
This commit is contained in:
parent
ad38911dcd
commit
84430d4232
@ -6178,7 +6178,10 @@ static int fixup_bpf_calls(struct bpf_verifier_env *env)
|
|||||||
if (prog->jit_requested && BITS_PER_LONG == 64 &&
|
if (prog->jit_requested && BITS_PER_LONG == 64 &&
|
||||||
(insn->imm == BPF_FUNC_map_lookup_elem ||
|
(insn->imm == BPF_FUNC_map_lookup_elem ||
|
||||||
insn->imm == BPF_FUNC_map_update_elem ||
|
insn->imm == BPF_FUNC_map_update_elem ||
|
||||||
insn->imm == BPF_FUNC_map_delete_elem)) {
|
insn->imm == BPF_FUNC_map_delete_elem ||
|
||||||
|
insn->imm == BPF_FUNC_map_push_elem ||
|
||||||
|
insn->imm == BPF_FUNC_map_pop_elem ||
|
||||||
|
insn->imm == BPF_FUNC_map_peek_elem)) {
|
||||||
aux = &env->insn_aux_data[i + delta];
|
aux = &env->insn_aux_data[i + delta];
|
||||||
if (bpf_map_ptr_poisoned(aux))
|
if (bpf_map_ptr_poisoned(aux))
|
||||||
goto patch_call_imm;
|
goto patch_call_imm;
|
||||||
@ -6211,6 +6214,14 @@ static int fixup_bpf_calls(struct bpf_verifier_env *env)
|
|||||||
BUILD_BUG_ON(!__same_type(ops->map_update_elem,
|
BUILD_BUG_ON(!__same_type(ops->map_update_elem,
|
||||||
(int (*)(struct bpf_map *map, void *key, void *value,
|
(int (*)(struct bpf_map *map, void *key, void *value,
|
||||||
u64 flags))NULL));
|
u64 flags))NULL));
|
||||||
|
BUILD_BUG_ON(!__same_type(ops->map_push_elem,
|
||||||
|
(int (*)(struct bpf_map *map, void *value,
|
||||||
|
u64 flags))NULL));
|
||||||
|
BUILD_BUG_ON(!__same_type(ops->map_pop_elem,
|
||||||
|
(int (*)(struct bpf_map *map, void *value))NULL));
|
||||||
|
BUILD_BUG_ON(!__same_type(ops->map_peek_elem,
|
||||||
|
(int (*)(struct bpf_map *map, void *value))NULL));
|
||||||
|
|
||||||
switch (insn->imm) {
|
switch (insn->imm) {
|
||||||
case BPF_FUNC_map_lookup_elem:
|
case BPF_FUNC_map_lookup_elem:
|
||||||
insn->imm = BPF_CAST_CALL(ops->map_lookup_elem) -
|
insn->imm = BPF_CAST_CALL(ops->map_lookup_elem) -
|
||||||
@ -6224,6 +6235,18 @@ static int fixup_bpf_calls(struct bpf_verifier_env *env)
|
|||||||
insn->imm = BPF_CAST_CALL(ops->map_delete_elem) -
|
insn->imm = BPF_CAST_CALL(ops->map_delete_elem) -
|
||||||
__bpf_call_base;
|
__bpf_call_base;
|
||||||
continue;
|
continue;
|
||||||
|
case BPF_FUNC_map_push_elem:
|
||||||
|
insn->imm = BPF_CAST_CALL(ops->map_push_elem) -
|
||||||
|
__bpf_call_base;
|
||||||
|
continue;
|
||||||
|
case BPF_FUNC_map_pop_elem:
|
||||||
|
insn->imm = BPF_CAST_CALL(ops->map_pop_elem) -
|
||||||
|
__bpf_call_base;
|
||||||
|
continue;
|
||||||
|
case BPF_FUNC_map_peek_elem:
|
||||||
|
insn->imm = BPF_CAST_CALL(ops->map_peek_elem) -
|
||||||
|
__bpf_call_base;
|
||||||
|
continue;
|
||||||
}
|
}
|
||||||
|
|
||||||
goto patch_call_imm;
|
goto patch_call_imm;
|
||||||
|
Loading…
Reference in New Issue
Block a user