Alexei Starovoitov 0a542a86d7 bpf: handle pseudo BPF_CALL insn
in native eBPF programs userspace is using pseudo BPF_CALL instructions
which encode one of 'enum bpf_func_id' inside insn->imm field.
Verifier checks that program using correct function arguments to given func_id.
If all checks passed, kernel needs to fixup BPF_CALL->imm fields by
replacing func_id with in-kernel function pointer.
eBPF interpreter just calls the function.

In-kernel eBPF users continue to use generic BPF_CALL.

Signed-off-by: Alexei Starovoitov <ast@plumgrid.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-26 15:05:14 -04:00
..
2014-09-26 15:05:14 -04:00
2014-06-12 16:18:45 +02:00
2014-08-25 21:13:30 +02:00
2014-08-08 15:57:18 -07:00
2014-09-18 12:32:52 -04:00
2014-07-05 11:17:45 +02:00
2014-09-10 15:42:12 -07:00
2014-08-08 15:57:32 -07:00
2014-08-08 15:57:24 -07:00
2014-07-17 22:07:37 +02:00
2013-09-11 15:58:27 -07:00
2014-08-08 15:57:22 -07:00
2014-08-08 15:57:24 -07:00