• Xu Kuohai's avatar
    bpf, arm64: Adjust the offset of str/ldr(immediate) to positive number · 5b3d19b9
    Xu Kuohai authored
    The BPF STX/LDX instruction uses offset relative to the FP to address
    stack space. Since the BPF_FP locates at the top of the frame, the offset
    is usually a negative number. However, arm64 str/ldr immediate instruction
    requires that offset be a positive number.  Therefore, this patch tries to
    convert the offsets.
    
    The method is to find the negative offset furthest from the FP firstly.
    Then add it to the FP, calculate a bottom position, called FPB, and then
    adjust the offsets in other STR/LDX instructions relative to FPB.
    
    FPB is saved using the callee-saved register x27 of arm64 which is not
    used yet.
    
    Before adjusting the offset, the patch checks every instruction to ensure
    that the FP does not change in run-time. If the FP may change, no offset
    is adjusted.
    
    For example, for the following bpftrace command:
    
      bpftrace -e 'kprobe:do_sys_open { printf("opening: %s\n", str(arg1)); }'
    
    Without this patch, jited code(fragment):
    
       0:   bti     c
       4:   stp     x29, x30, [sp, #-16]!
       8:   mov     x29, sp
       c:   stp     x19, x20, [sp, #-16]!
      10:   stp     x21, x22, [sp, #-16]!
      14:   stp     x25, x26, [sp, #-16]!
      18:   mov     x25, sp
      1c:   mov     x26, #0x0                       // #0
      20:   bti     j
      24:   sub     sp, sp, #0x90
      28:   add     x19, x0, #0x0
      2c:   mov     x0, #0x0                        // #0
      30:   mov     x10, #0xffffffffffffff78        // #-136
      34:   str     x0, [x25, x10]
      38:   mov     x10, #0xffffffffffffff80        // #-128
      3c:   str     x0, [x25, x10]
      40:   mov     x10, #0xffffffffffffff88        // #-120
      44:   str     x0, [x25, x10]
      48:   mov     x10, #0xffffffffffffff90        // #-112
      4c:   str     x0, [x25, x10]
      50:   mov     x10, #0xffffffffffffff98        // #-104
      54:   str     x0, [x25, x10]
      58:   mov     x10, #0xffffffffffffffa0        // #-96
      5c:   str     x0, [x25, x10]
      60:   mov     x10, #0xffffffffffffffa8        // #-88
      64:   str     x0, [x25, x10]
      68:   mov     x10, #0xffffffffffffffb0        // #-80
      6c:   str     x0, [x25, x10]
      70:   mov     x10, #0xffffffffffffffb8        // #-72
      74:   str     x0, [x25, x10]
      78:   mov     x10, #0xffffffffffffffc0        // #-64
      7c:   str     x0, [x25, x10]
      80:   mov     x10, #0xffffffffffffffc8        // #-56
      84:   str     x0, [x25, x10]
      88:   mov     x10, #0xffffffffffffffd0        // #-48
      8c:   str     x0, [x25, x10]
      90:   mov     x10, #0xffffffffffffffd8        // #-40
      94:   str     x0, [x25, x10]
      98:   mov     x10, #0xffffffffffffffe0        // #-32
      9c:   str     x0, [x25, x10]
      a0:   mov     x10, #0xffffffffffffffe8        // #-24
      a4:   str     x0, [x25, x10]
      a8:   mov     x10, #0xfffffffffffffff0        // #-16
      ac:   str     x0, [x25, x10]
      b0:   mov     x10, #0xfffffffffffffff8        // #-8
      b4:   str     x0, [x25, x10]
      b8:   mov     x10, #0x8                       // #8
      bc:   ldr     x2, [x19, x10]
      [...]
    
    With this patch, jited code(fragment):
    
       0:   bti     c
       4:   stp     x29, x30, [sp, #-16]!
       8:   mov     x29, sp
       c:   stp     x19, x20, [sp, #-16]!
      10:   stp     x21, x22, [sp, #-16]!
      14:   stp     x25, x26, [sp, #-16]!
      18:   stp     x27, x28, [sp, #-16]!
      1c:   mov     x25, sp
      20:   sub     x27, x25, #0x88
      24:   mov     x26, #0x0                       // #0
      28:   bti     j
      2c:   sub     sp, sp, #0x90
      30:   add     x19, x0, #0x0
      34:   mov     x0, #0x0                        // #0
      38:   str     x0, [x27]
      3c:   str     x0, [x27, #8]
      40:   str     x0, [x27, #16]
      44:   str     x0, [x27, #24]
      48:   str     x0, [x27, #32]
      4c:   str     x0, [x27, #40]
      50:   str     x0, [x27, #48]
      54:   str     x0, [x27, #56]
      58:   str     x0, [x27, #64]
      5c:   str     x0, [x27, #72]
      60:   str     x0, [x27, #80]
      64:   str     x0, [x27, #88]
      68:   str     x0, [x27, #96]
      6c:   str     x0, [x27, #104]
      70:   str     x0, [x27, #112]
      74:   str     x0, [x27, #120]
      78:   str     x0, [x27, #128]
      7c:   ldr     x2, [x19, #8]
      [...]
    Signed-off-by: default avatarXu Kuohai <xukuohai@huawei.com>
    Signed-off-by: default avatarDaniel Borkmann <daniel@iogearbox.net>
    Link: https://lore.kernel.org/bpf/20220321152852.2334294-4-xukuohai@huawei.com
    5b3d19b9
bpf_jit_comp.c 38.9 KB