Skip to content

Commit c0e3c74

Browse files
hbathiniKernel Patches Daemon
authored and
Kernel Patches Daemon
committed
powerpc64/bpf: fix JIT code size calculation of bpf trampoline
The JIT compile of ldimm instructions can be anywhere between 1-5 instructions long depending on the value being loaded. arch_bpf_trampoline_size() provides JIT size of the BPF trampoline before the buffer for JIT'ing it is allocated. BPF trampoline JIT code has ldimm instructions that need to load the value of pointer to struct bpf_tramp_image. But this pointer value is not same while calling arch_bpf_trampoline_size() & arch_prepare_bpf_trampoline(). So, the size arrived at using arch_bpf_trampoline_size() can vary from the size needed in arch_prepare_bpf_trampoline(). When the number of ldimm instructions emitted in arch_bpf_trampoline_size() is less than the number of ldimm instructions emitted during the actual JIT compile of trampoline, the below warning is produced: WARNING: CPU: 8 PID: 204190 at arch/powerpc/net/bpf_jit_comp.c:981 __arch_prepare_bpf_trampoline.isra.0+0xd2c/0xdcc which is: /* Make sure the trampoline generation logic doesn't overflow */ if (image && WARN_ON_ONCE(&image[ctx->idx] > (u32 *)rw_image_end - BPF_INSN_SAFETY)) { Pass NULL as the first argument to __arch_prepare_bpf_trampoline() call from arch_bpf_trampoline_size() function, to differentiate it from how arch_prepare_bpf_trampoline() calls it and ensure maximum possible instructions are emitted in arch_bpf_trampoline_size() for ldimm instructions that load a different value during the actual JIT compile of BPF trampoline. Fixes: d243b62 ("powerpc64/bpf: Add support for bpf trampolines") Reported-by: Venkat Rao Bagalkote <[email protected]> Closes: https://lore.kernel.org/all/[email protected]/ Cc: [email protected] # v6.13+ Signed-off-by: Hari Bathini <[email protected]>
1 parent 35ab59d commit c0e3c74

File tree

1 file changed

+23
-6
lines changed

1 file changed

+23
-6
lines changed

arch/powerpc/net/bpf_jit_comp.c

+23-6
Original file line numberDiff line numberDiff line change
@@ -833,7 +833,12 @@ static int __arch_prepare_bpf_trampoline(struct bpf_tramp_image *im, void *rw_im
833833
EMIT(PPC_RAW_STL(_R26, _R1, nvr_off + SZL));
834834

835835
if (flags & BPF_TRAMP_F_CALL_ORIG) {
836-
PPC_LI_ADDR(_R3, (unsigned long)im);
836+
/*
837+
* Emit maximum possible instructions while getting the size of
838+
* bpf trampoline to ensure trampoline JIT code doesn't overflow.
839+
*/
840+
PPC_LI_ADDR(_R3, im ? (unsigned long)im :
841+
(unsigned long)(~(1UL << (BITS_PER_LONG - 1))));
837842
ret = bpf_jit_emit_func_call_rel(image, ro_image, ctx,
838843
(unsigned long)__bpf_tramp_enter);
839844
if (ret)
@@ -889,7 +894,8 @@ static int __arch_prepare_bpf_trampoline(struct bpf_tramp_image *im, void *rw_im
889894
bpf_trampoline_restore_tail_call_cnt(image, ctx, func_frame_offset, r4_off);
890895

891896
/* Reserve space to patch branch instruction to skip fexit progs */
892-
im->ip_after_call = &((u32 *)ro_image)[ctx->idx];
897+
if (im)
898+
im->ip_after_call = &((u32 *)ro_image)[ctx->idx];
893899
EMIT(PPC_RAW_NOP());
894900
}
895901

@@ -912,8 +918,14 @@ static int __arch_prepare_bpf_trampoline(struct bpf_tramp_image *im, void *rw_im
912918
}
913919

914920
if (flags & BPF_TRAMP_F_CALL_ORIG) {
915-
im->ip_epilogue = &((u32 *)ro_image)[ctx->idx];
916-
PPC_LI_ADDR(_R3, im);
921+
if (im)
922+
im->ip_epilogue = &((u32 *)ro_image)[ctx->idx];
923+
/*
924+
* Emit maximum possible instructions while getting the size of
925+
* bpf trampoline to ensure trampoline JIT code doesn't overflow.
926+
*/
927+
PPC_LI_ADDR(_R3, im ? (unsigned long)im :
928+
(unsigned long)(~(1UL << (BITS_PER_LONG - 1))));
917929
ret = bpf_jit_emit_func_call_rel(image, ro_image, ctx,
918930
(unsigned long)__bpf_tramp_exit);
919931
if (ret)
@@ -972,7 +984,6 @@ static int __arch_prepare_bpf_trampoline(struct bpf_tramp_image *im, void *rw_im
972984
int arch_bpf_trampoline_size(const struct btf_func_model *m, u32 flags,
973985
struct bpf_tramp_links *tlinks, void *func_addr)
974986
{
975-
struct bpf_tramp_image im;
976987
void *image;
977988
int ret;
978989

@@ -988,7 +999,13 @@ int arch_bpf_trampoline_size(const struct btf_func_model *m, u32 flags,
988999
if (!image)
9891000
return -ENOMEM;
9901001

991-
ret = __arch_prepare_bpf_trampoline(&im, image, image + PAGE_SIZE, image,
1002+
/*
1003+
* Pass NULL as bpf_tramp_image pointer to differentiate the intent to get the
1004+
* buffer size for trampoline here. This differentiation helps in accounting for
1005+
* maximum possible instructions if the JIT code size is likely to vary during
1006+
* the actual JIT compile of the trampoline.
1007+
*/
1008+
ret = __arch_prepare_bpf_trampoline(NULL, image, image + PAGE_SIZE, image,
9921009
m, flags, tlinks, func_addr);
9931010
bpf_jit_free_exec(image);
9941011

0 commit comments

Comments
 (0)