3232#include <asm/set_memory.h>
3333#include <asm/text-patching.h>
3434#include <asm/unwind.h>
35- #include "bpf_jit.h"
3635
3736struct bpf_jit {
3837 u32 seen ; /* Flags to remember seen eBPF instructions */
@@ -54,6 +53,7 @@ struct bpf_jit {
5453 int prologue_plt ; /* Start of prologue hotpatch PLT */
5554 int kern_arena ; /* Pool offset of kernel arena address */
5655 u64 user_arena ; /* User arena address */
56+ u32 frame_off ; /* Offset of struct bpf_prog from %r15 */
5757};
5858
5959#define SEEN_MEM BIT(0) /* use mem[] for temporary storage */
@@ -425,12 +425,26 @@ static void jit_fill_hole(void *area, unsigned int size)
425425 memset (area , 0 , size );
426426}
427427
428+ /*
429+ * Caller-allocated part of the frame.
430+ * Thanks to packed stack, its otherwise unused initial part can be used for
431+ * the BPF stack and for the next frame.
432+ */
433+ struct prog_frame {
434+ u64 unused [8 ];
435+ /* BPF stack starts here and grows towards 0 */
436+ u32 tail_call_cnt ;
437+ u32 pad ;
438+ u64 r6 [10 ]; /* r6 - r15 */
439+ u64 backchain ;
440+ } __packed ;
441+
428442/*
429443 * Save registers from "rs" (register start) to "re" (register end) on stack
430444 */
431445static void save_regs (struct bpf_jit * jit , u32 rs , u32 re )
432446{
433- u32 off = STK_OFF_R6 + (rs - 6 ) * 8 ;
447+ u32 off = offsetof( struct prog_frame , r6 ) + (rs - 6 ) * 8 ;
434448
435449 if (rs == re )
436450 /* stg %rs,off(%r15) */
@@ -443,12 +457,9 @@ static void save_regs(struct bpf_jit *jit, u32 rs, u32 re)
443457/*
444458 * Restore registers from "rs" (register start) to "re" (register end) on stack
445459 */
446- static void restore_regs (struct bpf_jit * jit , u32 rs , u32 re , u32 stack_depth )
460+ static void restore_regs (struct bpf_jit * jit , u32 rs , u32 re )
447461{
448- u32 off = STK_OFF_R6 + (rs - 6 ) * 8 ;
449-
450- if (jit -> seen & SEEN_STACK )
451- off += STK_OFF + stack_depth ;
462+ u32 off = jit -> frame_off + offsetof(struct prog_frame , r6 ) + (rs - 6 ) * 8 ;
452463
453464 if (rs == re )
454465 /* lg %rs,off(%r15) */
@@ -492,8 +503,7 @@ static int get_end(u16 seen_regs, int start)
492503 * Save and restore clobbered registers (6-15) on stack.
493504 * We save/restore registers in chunks with gap >= 2 registers.
494505 */
495- static void save_restore_regs (struct bpf_jit * jit , int op , u32 stack_depth ,
496- u16 extra_regs )
506+ static void save_restore_regs (struct bpf_jit * jit , int op , u16 extra_regs )
497507{
498508 u16 seen_regs = jit -> seen_regs | extra_regs ;
499509 const int last = 15 , save_restore_size = 6 ;
@@ -516,7 +526,7 @@ static void save_restore_regs(struct bpf_jit *jit, int op, u32 stack_depth,
516526 if (op == REGS_SAVE )
517527 save_regs (jit , rs , re );
518528 else
519- restore_regs (jit , rs , re , stack_depth );
529+ restore_regs (jit , rs , re );
520530 re ++ ;
521531 } while (re <= last );
522532}
@@ -573,20 +583,22 @@ static void bpf_jit_plt(struct bpf_plt *plt, void *ret, void *target)
573583 * Emit function prologue
574584 *
575585 * Save registers and create stack frame if necessary.
576- * See stack frame layout description in "bpf_jit.h"!
586+ * Stack frame layout is described by struct prog_frame.
577587 */
578- static void bpf_jit_prologue (struct bpf_jit * jit , struct bpf_prog * fp ,
579- u32 stack_depth )
588+ static void bpf_jit_prologue (struct bpf_jit * jit , struct bpf_prog * fp )
580589{
590+ BUILD_BUG_ON (sizeof (struct prog_frame ) != STACK_FRAME_OVERHEAD );
591+
581592 /* No-op for hotpatching */
582593 /* brcl 0,prologue_plt */
583594 EMIT6_PCREL_RILC (0xc0040000 , 0 , jit -> prologue_plt );
584595 jit -> prologue_plt_ret = jit -> prg ;
585596
586597 if (!bpf_is_subprog (fp )) {
587598 /* Initialize the tail call counter in the main program. */
588- /* xc STK_OFF_TCCNT(4,%r15),STK_OFF_TCCNT(%r15) */
589- _EMIT6 (0xd703f000 | STK_OFF_TCCNT , 0xf000 | STK_OFF_TCCNT );
599+ /* xc tail_call_cnt(4,%r15),tail_call_cnt(%r15) */
600+ _EMIT6 (0xd703f000 | offsetof(struct prog_frame , tail_call_cnt ),
601+ 0xf000 | offsetof(struct prog_frame , tail_call_cnt ));
590602 } else {
591603 /*
592604 * Skip the tail call counter initialization in subprograms.
@@ -609,7 +621,7 @@ static void bpf_jit_prologue(struct bpf_jit *jit, struct bpf_prog *fp,
609621 jit -> seen_regs |= NVREGS ;
610622 } else {
611623 /* Save registers */
612- save_restore_regs (jit , REGS_SAVE , stack_depth ,
624+ save_restore_regs (jit , REGS_SAVE ,
613625 fp -> aux -> exception_boundary ? NVREGS : 0 );
614626 }
615627 /* Setup literal pool */
@@ -629,13 +641,15 @@ static void bpf_jit_prologue(struct bpf_jit *jit, struct bpf_prog *fp,
629641 if (is_first_pass (jit ) || (jit -> seen & SEEN_STACK )) {
630642 /* lgr %w1,%r15 (backchain) */
631643 EMIT4 (0xb9040000 , REG_W1 , REG_15 );
632- /* la %bfp,STK_160_UNUSED(%r15) (BPF frame pointer) */
633- EMIT4_DISP (0x41000000 , BPF_REG_FP , REG_15 , STK_160_UNUSED );
634- /* aghi %r15,-STK_OFF */
635- EMIT4_IMM (0xa70b0000 , REG_15 , - (STK_OFF + stack_depth ));
636- /* stg %w1,152(%r15) (backchain) */
644+ /* la %bfp,unused_end(%r15) (BPF frame pointer) */
645+ EMIT4_DISP (0x41000000 , BPF_REG_FP , REG_15 ,
646+ offsetofend (struct prog_frame , unused ));
647+ /* aghi %r15,-frame_off */
648+ EMIT4_IMM (0xa70b0000 , REG_15 , - jit -> frame_off );
649+ /* stg %w1,backchain(%r15) */
637650 EMIT6_DISP_LH (0xe3000000 , 0x0024 , REG_W1 , REG_0 ,
638- REG_15 , 152 );
651+ REG_15 ,
652+ offsetof(struct prog_frame , backchain ));
639653 }
640654}
641655
@@ -669,13 +683,13 @@ static void call_r1(struct bpf_jit *jit)
669683/*
670684 * Function epilogue
671685 */
672- static void bpf_jit_epilogue (struct bpf_jit * jit , u32 stack_depth )
686+ static void bpf_jit_epilogue (struct bpf_jit * jit )
673687{
674688 jit -> exit_ip = jit -> prg ;
675689 /* Load exit code: lgr %r2,%b0 */
676690 EMIT4 (0xb9040000 , REG_2 , BPF_REG_0 );
677691 /* Restore registers */
678- save_restore_regs (jit , REGS_RESTORE , stack_depth , 0 );
692+ save_restore_regs (jit , REGS_RESTORE , 0 );
679693 EMIT_JUMP_REG (14 );
680694
681695 jit -> prg = ALIGN (jit -> prg , 8 );
@@ -857,7 +871,7 @@ static int sign_extend(struct bpf_jit *jit, int r, u8 size, u8 flags)
857871 * stack space for the large switch statement.
858872 */
859873static noinline int bpf_jit_insn (struct bpf_jit * jit , struct bpf_prog * fp ,
860- int i , bool extra_pass , u32 stack_depth )
874+ int i , bool extra_pass )
861875{
862876 struct bpf_insn * insn = & fp -> insnsi [i ];
863877 s32 branch_oc_off = insn -> off ;
@@ -1778,9 +1792,10 @@ static noinline int bpf_jit_insn(struct bpf_jit *jit, struct bpf_prog *fp,
17781792 * Note 2: We assume that the verifier does not let us call the
17791793 * main program, which clears the tail call counter on entry.
17801794 */
1781- /* mvc STK_OFF_TCCNT(4,%r15),N(%r15) */
1782- _EMIT6 (0xd203f000 | STK_OFF_TCCNT ,
1783- 0xf000 | (STK_OFF_TCCNT + STK_OFF + stack_depth ));
1795+ /* mvc tail_call_cnt(4,%r15),frame_off+tail_call_cnt(%r15) */
1796+ _EMIT6 (0xd203f000 | offsetof(struct prog_frame , tail_call_cnt ),
1797+ 0xf000 | (jit -> frame_off +
1798+ offsetof(struct prog_frame , tail_call_cnt )));
17841799
17851800 /* Sign-extend the kfunc arguments. */
17861801 if (insn -> src_reg == BPF_PSEUDO_KFUNC_CALL ) {
@@ -1831,10 +1846,8 @@ static noinline int bpf_jit_insn(struct bpf_jit *jit, struct bpf_prog *fp,
18311846 * goto out;
18321847 */
18331848
1834- if (jit -> seen & SEEN_STACK )
1835- off = STK_OFF_TCCNT + STK_OFF + stack_depth ;
1836- else
1837- off = STK_OFF_TCCNT ;
1849+ off = jit -> frame_off +
1850+ offsetof(struct prog_frame , tail_call_cnt );
18381851 /* lhi %w0,1 */
18391852 EMIT4_IMM (0xa7080000 , REG_W0 , 1 );
18401853 /* laal %w1,%w0,off(%r15) */
@@ -1864,7 +1877,7 @@ static noinline int bpf_jit_insn(struct bpf_jit *jit, struct bpf_prog *fp,
18641877 /*
18651878 * Restore registers before calling function
18661879 */
1867- save_restore_regs (jit , REGS_RESTORE , stack_depth , 0 );
1880+ save_restore_regs (jit , REGS_RESTORE , 0 );
18681881
18691882 /*
18701883 * goto *(prog->bpf_func + tail_call_start);
@@ -2157,7 +2170,7 @@ static int bpf_set_addr(struct bpf_jit *jit, int i)
21572170 * Compile eBPF program into s390x code
21582171 */
21592172static int bpf_jit_prog (struct bpf_jit * jit , struct bpf_prog * fp ,
2160- bool extra_pass , u32 stack_depth )
2173+ bool extra_pass )
21612174{
21622175 int i , insn_count , lit32_size , lit64_size ;
21632176 u64 kern_arena ;
@@ -2166,24 +2179,30 @@ static int bpf_jit_prog(struct bpf_jit *jit, struct bpf_prog *fp,
21662179 jit -> lit64 = jit -> lit64_start ;
21672180 jit -> prg = 0 ;
21682181 jit -> excnt = 0 ;
2182+ if (is_first_pass (jit ) || (jit -> seen & SEEN_STACK ))
2183+ jit -> frame_off = sizeof (struct prog_frame ) -
2184+ offsetofend (struct prog_frame , unused ) +
2185+ round_up (fp -> aux -> stack_depth , 8 );
2186+ else
2187+ jit -> frame_off = 0 ;
21692188
21702189 kern_arena = bpf_arena_get_kern_vm_start (fp -> aux -> arena );
21712190 if (kern_arena )
21722191 jit -> kern_arena = _EMIT_CONST_U64 (kern_arena );
21732192 jit -> user_arena = bpf_arena_get_user_vm_start (fp -> aux -> arena );
21742193
2175- bpf_jit_prologue (jit , fp , stack_depth );
2194+ bpf_jit_prologue (jit , fp );
21762195 if (bpf_set_addr (jit , 0 ) < 0 )
21772196 return -1 ;
21782197 for (i = 0 ; i < fp -> len ; i += insn_count ) {
2179- insn_count = bpf_jit_insn (jit , fp , i , extra_pass , stack_depth );
2198+ insn_count = bpf_jit_insn (jit , fp , i , extra_pass );
21802199 if (insn_count < 0 )
21812200 return -1 ;
21822201 /* Next instruction address */
21832202 if (bpf_set_addr (jit , i + insn_count ) < 0 )
21842203 return -1 ;
21852204 }
2186- bpf_jit_epilogue (jit , stack_depth );
2205+ bpf_jit_epilogue (jit );
21872206
21882207 lit32_size = jit -> lit32 - jit -> lit32_start ;
21892208 lit64_size = jit -> lit64 - jit -> lit64_start ;
@@ -2259,7 +2278,6 @@ static struct bpf_binary_header *bpf_jit_alloc(struct bpf_jit *jit,
22592278 */
22602279struct bpf_prog * bpf_int_jit_compile (struct bpf_prog * fp )
22612280{
2262- u32 stack_depth = round_up (fp -> aux -> stack_depth , 8 );
22632281 struct bpf_prog * tmp , * orig_fp = fp ;
22642282 struct bpf_binary_header * header ;
22652283 struct s390_jit_data * jit_data ;
@@ -2312,7 +2330,7 @@ struct bpf_prog *bpf_int_jit_compile(struct bpf_prog *fp)
23122330 * - 3: Calculate program size and addrs array
23132331 */
23142332 for (pass = 1 ; pass <= 3 ; pass ++ ) {
2315- if (bpf_jit_prog (& jit , fp , extra_pass , stack_depth )) {
2333+ if (bpf_jit_prog (& jit , fp , extra_pass )) {
23162334 fp = orig_fp ;
23172335 goto free_addrs ;
23182336 }
@@ -2326,7 +2344,7 @@ struct bpf_prog *bpf_int_jit_compile(struct bpf_prog *fp)
23262344 goto free_addrs ;
23272345 }
23282346skip_init_ctx :
2329- if (bpf_jit_prog (& jit , fp , extra_pass , stack_depth )) {
2347+ if (bpf_jit_prog (& jit , fp , extra_pass )) {
23302348 bpf_jit_binary_free (header );
23312349 fp = orig_fp ;
23322350 goto free_addrs ;
@@ -2646,9 +2664,10 @@ static int __arch_prepare_bpf_trampoline(struct bpf_tramp_image *im,
26462664 /* stg %r1,backchain_off(%r15) */
26472665 EMIT6_DISP_LH (0xe3000000 , 0x0024 , REG_1 , REG_0 , REG_15 ,
26482666 tjit -> backchain_off );
2649- /* mvc tccnt_off(4,%r15),stack_size+STK_OFF_TCCNT (%r15) */
2667+ /* mvc tccnt_off(4,%r15),stack_size+tail_call_cnt (%r15) */
26502668 _EMIT6 (0xd203f000 | tjit -> tccnt_off ,
2651- 0xf000 | (tjit -> stack_size + STK_OFF_TCCNT ));
2669+ 0xf000 | (tjit -> stack_size +
2670+ offsetof(struct prog_frame , tail_call_cnt )));
26522671 /* stmg %r2,%rN,fwd_reg_args_off(%r15) */
26532672 if (nr_reg_args )
26542673 EMIT6_DISP_LH (0xeb000000 , 0x0024 , REG_2 ,
@@ -2785,8 +2804,9 @@ static int __arch_prepare_bpf_trampoline(struct bpf_tramp_image *im,
27852804 (nr_stack_args * sizeof (u64 ) - 1 ) << 16 |
27862805 tjit -> stack_args_off ,
27872806 0xf000 | tjit -> orig_stack_args_off );
2788- /* mvc STK_OFF_TCCNT(4,%r15),tccnt_off(%r15) */
2789- _EMIT6 (0xd203f000 | STK_OFF_TCCNT , 0xf000 | tjit -> tccnt_off );
2807+ /* mvc tail_call_cnt(4,%r15),tccnt_off(%r15) */
2808+ _EMIT6 (0xd203f000 | offsetof(struct prog_frame , tail_call_cnt ),
2809+ 0xf000 | tjit -> tccnt_off );
27902810 /* lgr %r1,%r8 */
27912811 EMIT4 (0xb9040000 , REG_1 , REG_8 );
27922812 /* %r1() */
@@ -2843,8 +2863,9 @@ static int __arch_prepare_bpf_trampoline(struct bpf_tramp_image *im,
28432863 if (flags & (BPF_TRAMP_F_CALL_ORIG | BPF_TRAMP_F_RET_FENTRY_RET ))
28442864 EMIT6_DISP_LH (0xe3000000 , 0x0004 , REG_2 , REG_0 , REG_15 ,
28452865 tjit -> retval_off );
2846- /* mvc stack_size+STK_OFF_TCCNT(4,%r15),tccnt_off(%r15) */
2847- _EMIT6 (0xd203f000 | (tjit -> stack_size + STK_OFF_TCCNT ),
2866+ /* mvc stack_size+tail_call_cnt(4,%r15),tccnt_off(%r15) */
2867+ _EMIT6 (0xd203f000 | (tjit -> stack_size +
2868+ offsetof(struct prog_frame , tail_call_cnt )),
28482869 0xf000 | tjit -> tccnt_off );
28492870 /* aghi %r15,stack_size */
28502871 EMIT4_IMM (0xa70b0000 , REG_15 , tjit -> stack_size );
0 commit comments