-
Notifications
You must be signed in to change notification settings - Fork 151
bpf: arm64: Indirect jumps #10307
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: bpf-next_base
Are you sure you want to change the base?
bpf: arm64: Indirect jumps #10307
Conversation
|
Upstream branch: 4722981 |
4a6b8b7 to
1efb39d
Compare
|
Upstream branch: 7dc211c |
6de79d9 to
3eb6d28
Compare
|
Upstream branch: 7dc211c |
3eb6d28 to
7409996
Compare
1efb39d to
5b97b4a
Compare
|
Upstream branch: ec12ab2 |
7409996 to
04a1532
Compare
5b97b4a to
7b6b51d
Compare
|
Upstream branch: d6ec090 |
04a1532 to
e473efc
Compare
7b6b51d to
2412df8
Compare
|
Upstream branch: d6ec090 |
e473efc to
17ff594
Compare
2412df8 to
bfb0726
Compare
|
Upstream branch: d088da9 |
17ff594 to
933a1d8
Compare
bfb0726 to
b0a5b86
Compare
Add support for the instructions array map type in the arm64 JIT by calling bpf_prog_update_insn_ptrs() with the offsets that map xlated_offset to the jited_offset in the final image. arm64 JIT already has this offset array which was being used for bpf_prog_fill_jited_linfo() and can be used directly for bpf_prog_update_insn_ptrs. Signed-off-by: Puranjay Mohan <[email protected]> Reviewed-by: Anton Protopopov <[email protected]> Acked-by: Xu Kuohai <[email protected]>
|
Upstream branch: e0940c6 |
Add support for a new instruction BPF_JMP|BPF_X|BPF_JA, SRC=0, DST=Rx, off=0, imm=0 which does an indirect jump to a location stored in Rx. The register Rx should have type PTR_TO_INSN. This new type assures that the Rx register contains a value (or a range of values) loaded from a correct jump table – map of type instruction array. ARM64 JIT supports indirect jumps to all registers through the A64_BR() macro, use it to implement this new instruction. Signed-off-by: Puranjay Mohan <[email protected]> Reviewed-by: Anton Protopopov <[email protected]> Acked-by: Xu Kuohai <[email protected]>
arm64 JIT now supports gotox instruction and jumptables, so run tests in verifier_gotox.c for arm64. Signed-off-by: Puranjay Mohan <[email protected]> Reviewed-by: Anton Protopopov <[email protected]>
933a1d8 to
9ece1e1
Compare
Pull request for series with
subject: bpf: arm64: Indirect jumps
version: 2
url: https://patchwork.kernel.org/project/netdevbpf/list/?series=1024226