summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAbhishek Dubey <adubey@linux.ibm.com>2026-04-01 18:21:30 +0300
committerMadhavan Srinivasan <maddy@linux.ibm.com>2026-04-03 11:44:25 +0300
commit1e4bac7eb95a5a1aed5b39971ef77dca5b0f8a9f (patch)
tree076d21383fe4766a183d1d0d67f82fd6c53cbad9
parent92258b5bf1ec10204c23a793793a65dc92d17014 (diff)
downloadlinux-1e4bac7eb95a5a1aed5b39971ef77dca5b0f8a9f.tar.xz
powerpc/bpf: Add support for instruction array
On loading the BPF program, the verifier might adjust/omit some instructions. The adjusted instruction offset is accounted in the map containing original instruction -> xlated mapping. This patch add ppc64 JIT support to additionally build the xlated->jitted mapping for every instruction present in instruction array. This change is needed to enable support for indirect jumps, added in a subsequent patch. Invoke bpf_prog_update_insn_ptrs() with offset pair of xlated_offset and jited_offset. The offset mapping is already available, which is being used for bpf_prog_fill_jited_linfo() and can be directly used for bpf_prog_update_insn_ptrs() as well. Additional details present at: commit b4ce5923e780 ("bpf, x86: add new map type: instructions array") Signed-off-by: Abhishek Dubey <adubey@linux.ibm.com> Acked-by: Hari Bathini <hbathini@linux.ibm.com> Signed-off-by: Madhavan Srinivasan <maddy@linux.ibm.com> Link: https://patch.msgid.link/20260401152133.42544-2-adubey@linux.ibm.com
-rw-r--r--arch/powerpc/net/bpf_jit_comp.c7
1 files changed, 7 insertions, 0 deletions
diff --git a/arch/powerpc/net/bpf_jit_comp.c b/arch/powerpc/net/bpf_jit_comp.c
index b2fdf8ff9c60..50103b3794fb 100644
--- a/arch/powerpc/net/bpf_jit_comp.c
+++ b/arch/powerpc/net/bpf_jit_comp.c
@@ -373,6 +373,13 @@ skip_init_ctx:
goto out_addrs;
}
bpf_prog_fill_jited_linfo(fp, addrs);
+ /*
+ * On ABI V1, executable code starts after the function
+ * descriptor, so adjust base accordingly.
+ */
+ bpf_prog_update_insn_ptrs(fp, addrs,
+ (void *)fimage + FUNCTION_DESCR_SIZE);
+
out_addrs:
if (!image && priv_stack_ptr) {
fp->aux->priv_stack_ptr = NULL;