x86/bpf: Fix IP for relocating call depth accounting
authorJoan Bruguera Micó <joanbrugueram@gmail.com>
Mon, 1 Apr 2024 18:55:30 +0000 (20:55 +0200)
committerAlexei Starovoitov <ast@kernel.org>
Tue, 2 Apr 2024 03:37:56 +0000 (20:37 -0700)
commit6a537453000a916392fcac1acb96c1d9d1e05b74
tree69ebdb5ddaa504511a9b2f1e327246b1591ba08e
parent9d98aa088386aee3db1b7b60b800c0fde0654a4a
x86/bpf: Fix IP for relocating call depth accounting

The commit:

  59bec00ace28 ("x86/percpu: Introduce %rip-relative addressing to PER_CPU_VAR()")

made PER_CPU_VAR() to use rip-relative addressing, hence
INCREMENT_CALL_DEPTH macro and skl_call_thunk_template got rip-relative
asm code inside of it. A follow up commit:

  17bce3b2ae2d ("x86/callthunks: Handle %rip-relative relocations in call thunk template")

changed x86_call_depth_emit_accounting() to use apply_relocation(),
but mistakenly assumed that the code is being patched in-place (where
the destination of the relocation matches the address of the code),
using *pprog as the destination ip. This is not true for the call depth
accounting, emitted by the BPF JIT, so the calculated address was wrong,
JIT-ed BPF progs on kernels with call depth tracking got broken and
usually caused a page fault.

Pass the destination IP when the BPF JIT emits call depth accounting.

Fixes: 17bce3b2ae2d ("x86/callthunks: Handle %rip-relative relocations in call thunk template")
Signed-off-by: Joan Bruguera Micó <joanbrugueram@gmail.com>
Reviewed-by: Uros Bizjak <ubizjak@gmail.com>
Acked-by: Ingo Molnar <mingo@kernel.org>
Cc: Alexei Starovoitov <ast@kernel.org>
Cc: Daniel Borkmann <daniel@iogearbox.net>
Link: https://lore.kernel.org/r/20240401185821.224068-3-ubizjak@gmail.com
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
arch/x86/include/asm/alternative.h
arch/x86/kernel/callthunks.c
arch/x86/net/bpf_jit_comp.c