[PATCH bpf-next v4 3/4] bpf, arm64: adjust the offset of str/ldr(immediate) to positive number
Daniel Borkmann
daniel at iogearbox.net
Fri Mar 18 07:41:10 PDT 2022
On 3/17/22 3:02 PM, Xu Kuohai wrote:
> The BPF STX/LDX instruction uses offset relative to the FP to address
> stack space. Since the BPF_FP locates at the top of the frame, the offset
> is usually a negative number. However, arm64 str/ldr immediate instruction
> requires that offset be a positive number. Therefore, this patch tries to
> convert the offsets.
>
> The method is to find the negative offset furthest from the FP firstly.
> Then add it to the FP, calculate a bottom position, called FPB, and then
> adjust the offsets in other STR/LDX instructions relative to FPB.
>
> FPB is saved using the callee-saved register x27 of arm64 which is not
> used yet.
>
> Before adjusting the offset, the patch checks every instruction to ensure
> that the FP does not change in run-time. If the FP may change, no offset
> is adjusted.
>
> For example, for the following bpftrace command:
>
> bpftrace -e 'kprobe:do_sys_open { printf("opening: %s\n", str(arg1)); }'
>
> Without this patch, jited code(fragment):
>
> 0: bti c
> 4: stp x29, x30, [sp, #-16]!
> 8: mov x29, sp
> c: stp x19, x20, [sp, #-16]!
> 10: stp x21, x22, [sp, #-16]!
> 14: stp x25, x26, [sp, #-16]!
> 18: mov x25, sp
> 1c: mov x26, #0x0 // #0
> 20: bti j
> 24: sub sp, sp, #0x90
> 28: add x19, x0, #0x0
> 2c: mov x0, #0x0 // #0
> 30: mov x10, #0xffffffffffffff78 // #-136
> 34: str x0, [x25, x10]
> 38: mov x10, #0xffffffffffffff80 // #-128
> 3c: str x0, [x25, x10]
> 40: mov x10, #0xffffffffffffff88 // #-120
> 44: str x0, [x25, x10]
> 48: mov x10, #0xffffffffffffff90 // #-112
> 4c: str x0, [x25, x10]
> 50: mov x10, #0xffffffffffffff98 // #-104
> 54: str x0, [x25, x10]
> 58: mov x10, #0xffffffffffffffa0 // #-96
> 5c: str x0, [x25, x10]
> 60: mov x10, #0xffffffffffffffa8 // #-88
> 64: str x0, [x25, x10]
> 68: mov x10, #0xffffffffffffffb0 // #-80
> 6c: str x0, [x25, x10]
> 70: mov x10, #0xffffffffffffffb8 // #-72
> 74: str x0, [x25, x10]
> 78: mov x10, #0xffffffffffffffc0 // #-64
> 7c: str x0, [x25, x10]
> 80: mov x10, #0xffffffffffffffc8 // #-56
> 84: str x0, [x25, x10]
> 88: mov x10, #0xffffffffffffffd0 // #-48
> 8c: str x0, [x25, x10]
> 90: mov x10, #0xffffffffffffffd8 // #-40
> 94: str x0, [x25, x10]
> 98: mov x10, #0xffffffffffffffe0 // #-32
> 9c: str x0, [x25, x10]
> a0: mov x10, #0xffffffffffffffe8 // #-24
> a4: str x0, [x25, x10]
> a8: mov x10, #0xfffffffffffffff0 // #-16
> ac: str x0, [x25, x10]
> b0: mov x10, #0xfffffffffffffff8 // #-8
> b4: str x0, [x25, x10]
> b8: mov x10, #0x8 // #8
> bc: ldr x2, [x19, x10]
> [...]
>
> With this patch, jited code(fragment):
>
> 0: bti c
> 4: stp x29, x30, [sp, #-16]!
> 8: mov x29, sp
> c: stp x19, x20, [sp, #-16]!
> 10: stp x21, x22, [sp, #-16]!
> 14: stp x25, x26, [sp, #-16]!
> 18: stp x27, x28, [sp, #-16]!
> 1c: mov x25, sp
> 20: sub x27, x25, #0x88
> 24: mov x26, #0x0 // #0
> 28: bti j
> 2c: sub sp, sp, #0x90
> 30: add x19, x0, #0x0
> 34: mov x0, #0x0 // #0
> 38: str x0, [x27]
> 3c: str x0, [x27, #8]
> 40: str x0, [x27, #16]
> 44: str x0, [x27, #24]
> 48: str x0, [x27, #32]
> 4c: str x0, [x27, #40]
> 50: str x0, [x27, #48]
> 54: str x0, [x27, #56]
> 58: str x0, [x27, #64]
> 5c: str x0, [x27, #72]
> 60: str x0, [x27, #80]
> 64: str x0, [x27, #88]
> 68: str x0, [x27, #96]
> 6c: str x0, [x27, #104]
> 70: str x0, [x27, #112]
> 74: str x0, [x27, #120]
> 78: str x0, [x27, #128]
> 7c: ldr x2, [x19, #8]
> [...]
>
> Signed-off-by: Xu Kuohai <xukuohai at huawei.com>
Could you elaborate how this works across tail calls / bpf2bpf calls? Could we
run into a situation where is_lsi_offset() on off_adj doesn't hold true anymore
and we ended up emitting e.g. STR32I instead of MOV_I+STR32?
Thanks,
Daniel
More information about the linux-arm-kernel
mailing list