2005-12-06 02:58:12 +00:00
|
|
|
/*-
|
2017-11-20 19:43:44 +00:00
|
|
|
* SPDX-License-Identifier: BSD-3-Clause
|
|
|
|
*
|
2008-08-18 18:59:33 +00:00
|
|
|
* Copyright (C) 2002-2003 NetGroup, Politecnico di Torino (Italy)
|
2017-04-17 22:02:09 +00:00
|
|
|
* Copyright (C) 2005-2017 Jung-uk Kim <jkim@FreeBSD.org>
|
2005-12-06 02:58:12 +00:00
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
*
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. Neither the name of the Politecnico di Torino nor the names of its
|
|
|
|
* contributors may be used to endorse or promote products derived from
|
|
|
|
* this software without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
* "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
|
|
* A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
|
|
* OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
|
|
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
2008-08-25 20:43:13 +00:00
|
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
2005-12-06 02:58:12 +00:00
|
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
|
|
* OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <sys/cdefs.h>
|
|
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
|
2008-08-18 18:59:33 +00:00
|
|
|
#ifdef _KERNEL
|
2005-12-06 02:58:12 +00:00
|
|
|
#include "opt_bpf.h"
|
|
|
|
|
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/kernel.h>
|
|
|
|
#include <sys/malloc.h>
|
|
|
|
#include <sys/mbuf.h>
|
2005-12-07 21:30:47 +00:00
|
|
|
#include <sys/sysctl.h>
|
2008-08-18 18:59:33 +00:00
|
|
|
#else
|
|
|
|
#include <stdlib.h>
|
2009-11-18 19:26:17 +00:00
|
|
|
#include <sys/mman.h>
|
|
|
|
#include <sys/param.h>
|
2008-08-18 18:59:33 +00:00
|
|
|
#include <sys/types.h>
|
|
|
|
#endif
|
2005-12-06 02:58:12 +00:00
|
|
|
|
|
|
|
#include <net/bpf.h>
|
|
|
|
#include <net/bpf_jitter.h>
|
|
|
|
|
2008-08-26 21:06:31 +00:00
|
|
|
static u_int bpf_jit_accept_all(u_char *, u_int, u_int);
|
|
|
|
|
2008-08-18 18:59:33 +00:00
|
|
|
#ifdef _KERNEL
|
|
|
|
MALLOC_DEFINE(M_BPFJIT, "BPF_JIT", "BPF JIT compiler");
|
|
|
|
|
2005-12-07 21:30:47 +00:00
|
|
|
SYSCTL_NODE(_net, OID_AUTO, bpf_jitter, CTLFLAG_RW, 0, "BPF JIT compiler");
|
|
|
|
int bpf_jitter_enable = 1;
|
|
|
|
SYSCTL_INT(_net_bpf_jitter, OID_AUTO, enable, CTLFLAG_RW,
|
|
|
|
&bpf_jitter_enable, 0, "enable BPF JIT compiler");
|
2009-11-20 21:12:40 +00:00
|
|
|
#endif
|
2005-12-07 21:30:47 +00:00
|
|
|
|
2005-12-06 02:58:12 +00:00
|
|
|
bpf_jit_filter *
|
|
|
|
bpf_jitter(struct bpf_insn *fp, int nins)
|
|
|
|
{
|
|
|
|
bpf_jit_filter *filter;
|
|
|
|
|
2009-11-20 21:12:40 +00:00
|
|
|
/* Allocate the filter structure. */
|
|
|
|
#ifdef _KERNEL
|
2008-08-18 18:59:33 +00:00
|
|
|
filter = (struct bpf_jit_filter *)malloc(sizeof(*filter),
|
2009-11-20 18:49:20 +00:00
|
|
|
M_BPFJIT, M_NOWAIT);
|
2009-11-20 21:12:40 +00:00
|
|
|
#else
|
|
|
|
filter = (struct bpf_jit_filter *)malloc(sizeof(*filter));
|
|
|
|
#endif
|
2005-12-06 02:58:12 +00:00
|
|
|
if (filter == NULL)
|
2008-08-18 18:59:33 +00:00
|
|
|
return (NULL);
|
2005-12-06 02:58:12 +00:00
|
|
|
|
2009-11-20 21:12:40 +00:00
|
|
|
/* No filter means accept all. */
|
2008-08-26 21:06:31 +00:00
|
|
|
if (fp == NULL || nins == 0) {
|
|
|
|
filter->func = bpf_jit_accept_all;
|
|
|
|
return (filter);
|
|
|
|
}
|
|
|
|
|
2009-11-20 21:12:40 +00:00
|
|
|
/* Create the binary. */
|
2009-11-20 18:49:20 +00:00
|
|
|
if ((filter->func = bpf_jit_compile(fp, nins, &filter->size)) == NULL) {
|
2009-11-20 21:12:40 +00:00
|
|
|
#ifdef _KERNEL
|
2005-12-06 02:58:12 +00:00
|
|
|
free(filter, M_BPFJIT);
|
2009-11-20 21:12:40 +00:00
|
|
|
#else
|
|
|
|
free(filter);
|
|
|
|
#endif
|
2008-08-18 18:59:33 +00:00
|
|
|
return (NULL);
|
2005-12-06 02:58:12 +00:00
|
|
|
}
|
|
|
|
|
2008-08-18 18:59:33 +00:00
|
|
|
return (filter);
|
2005-12-06 02:58:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
bpf_destroy_jit_filter(bpf_jit_filter *filter)
|
|
|
|
{
|
|
|
|
|
2017-04-17 22:02:09 +00:00
|
|
|
#ifdef _KERNEL
|
Make UMA and malloc(9) return non-executable memory in most cases.
Most kernel memory that is allocated after boot does not need to be
executable. There are a few exceptions. For example, kernel modules
do need executable memory, but they don't use UMA or malloc(9). The
BPF JIT compiler also needs executable memory and did use malloc(9)
until r317072.
(Note that a side effect of r316767 was that the "small allocation"
path in UMA on amd64 already returned non-executable memory. This
meant that some calls to malloc(9) or the UMA zone(9) allocator could
return executable memory, while others could return non-executable
memory. This change makes the behavior consistent.)
This change makes malloc(9) return non-executable memory unless the new
M_EXEC flag is specified. After this change, the UMA zone(9) allocator
will always return non-executable memory, and a KASSERT will catch
attempts to use the M_EXEC flag to allocate executable memory using
uma_zalloc() or its variants.
Allocations that do need executable memory have various choices. They
may use the M_EXEC flag to malloc(9), or they may use a different VM
interfact to obtain executable pages.
Now that malloc(9) again allows executable allocations, this change also
reverts most of r317072.
PR: 228927
Reviewed by: alc, kib, markj, jhb (previous version)
Sponsored by: Netflix
Differential Revision: https://reviews.freebsd.org/D15691
2018-06-13 17:04:41 +00:00
|
|
|
if (filter->func != bpf_jit_accept_all)
|
|
|
|
free(filter->func, M_BPFJIT);
|
2005-12-06 02:58:12 +00:00
|
|
|
free(filter, M_BPFJIT);
|
2008-08-18 18:59:33 +00:00
|
|
|
#else
|
Make UMA and malloc(9) return non-executable memory in most cases.
Most kernel memory that is allocated after boot does not need to be
executable. There are a few exceptions. For example, kernel modules
do need executable memory, but they don't use UMA or malloc(9). The
BPF JIT compiler also needs executable memory and did use malloc(9)
until r317072.
(Note that a side effect of r316767 was that the "small allocation"
path in UMA on amd64 already returned non-executable memory. This
meant that some calls to malloc(9) or the UMA zone(9) allocator could
return executable memory, while others could return non-executable
memory. This change makes the behavior consistent.)
This change makes malloc(9) return non-executable memory unless the new
M_EXEC flag is specified. After this change, the UMA zone(9) allocator
will always return non-executable memory, and a KASSERT will catch
attempts to use the M_EXEC flag to allocate executable memory using
uma_zalloc() or its variants.
Allocations that do need executable memory have various choices. They
may use the M_EXEC flag to malloc(9), or they may use a different VM
interfact to obtain executable pages.
Now that malloc(9) again allows executable allocations, this change also
reverts most of r317072.
PR: 228927
Reviewed by: alc, kib, markj, jhb (previous version)
Sponsored by: Netflix
Differential Revision: https://reviews.freebsd.org/D15691
2018-06-13 17:04:41 +00:00
|
|
|
if (filter->func != bpf_jit_accept_all)
|
|
|
|
munmap(filter->func, filter->size);
|
2008-08-18 18:59:33 +00:00
|
|
|
free(filter);
|
|
|
|
#endif
|
2009-11-20 21:12:40 +00:00
|
|
|
}
|
2008-08-26 21:06:31 +00:00
|
|
|
|
|
|
|
static u_int
|
|
|
|
bpf_jit_accept_all(__unused u_char *p, __unused u_int wirelen,
|
|
|
|
__unused u_int buflen)
|
|
|
|
{
|
|
|
|
|
|
|
|
return ((u_int)-1);
|
|
|
|
}
|