• Kumar Kartikeya Dwivedi's avatar
    bpf: Introduce BPF support for kernel module function calls · 2357672c
    Kumar Kartikeya Dwivedi authored
    This change adds support on the kernel side to allow for BPF programs to
    call kernel module functions. Userspace will prepare an array of module
    BTF fds that is passed in during BPF_PROG_LOAD using fd_array parameter.
    In the kernel, the module BTFs are placed in the auxilliary struct for
    bpf_prog, and loaded as needed.
    
    The verifier then uses insn->off to index into the fd_array. insn->off
    0 is reserved for vmlinux BTF (for backwards compat), so userspace must
    use an fd_array index > 0 for module kfunc support. kfunc_btf_tab is
    sorted based on offset in an array, and each offset corresponds to one
    descriptor, with a max limit up to 256 such module BTFs.
    
    We also change existing kfunc_tab to distinguish each element based on
    imm, off pair as each such call will now be distinct.
    
    Another change is to check_kfunc_call callback, which now include a
    struct module * pointer, this is to be used in later patch such that the
    kfunc_id and module pointer are matched for dynamically registered BTF
    sets from loadable modules, so that same kfunc_id in two modules doesn't
    lead to check_kfunc_call succeeding. For the duration of the
    check_kfunc_call, the reference to struct module exists, as it returns
    the pointer stored in kfunc_btf_tab.
    Signed-off-by: default avatarKumar Kartikeya Dwivedi <memxor@gmail.com>
    Signed-off-by: default avatarAlexei Starovoitov <ast@kernel.org>
    Link: https://lore.kernel.org/bpf/20211002011757.311265-2-memxor@gmail.com
    2357672c
verifier.c 400 KB