2019-06-01 11:08:55 +03:00
|
|
|
/* SPDX-License-Identifier: GPL-2.0-only */
|
2016-06-22 19:25:07 +03:00
|
|
|
/*
|
|
|
|
* bpf_jit64.h: BPF JIT compiler for PPC64
|
|
|
|
*
|
|
|
|
* Copyright 2016 Naveen N. Rao <naveen.n.rao@linux.vnet.ibm.com>
|
|
|
|
* IBM Corporation
|
|
|
|
*/
|
|
|
|
#ifndef _BPF_JIT64_H
|
|
|
|
#define _BPF_JIT64_H
|
|
|
|
|
|
|
|
#include "bpf_jit.h"
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Stack layout:
|
2016-09-23 23:35:00 +03:00
|
|
|
* Ensure the top half (upto local_tmp_var) stays consistent
|
|
|
|
* with our redzone usage.
|
2016-06-22 19:25:07 +03:00
|
|
|
*
|
|
|
|
* [ prev sp ] <-------------
|
2018-05-04 02:08:21 +03:00
|
|
|
* [ nv gpr save area ] 6*8 |
|
2016-09-23 23:35:00 +03:00
|
|
|
* [ tail_call_cnt ] 8 |
|
|
|
|
* [ local_tmp_var ] 8 |
|
2017-09-01 21:53:01 +03:00
|
|
|
* fp (r31) --> [ ebpf stack space ] upto 512 |
|
2016-06-22 19:25:07 +03:00
|
|
|
* [ frame header ] 32/112 |
|
|
|
|
* sp (r1) ---> [ stack pointer ] --------------
|
|
|
|
*/
|
|
|
|
|
2018-05-04 02:08:21 +03:00
|
|
|
/* for gpr non volatile registers BPG_REG_6 to 10 */
|
|
|
|
#define BPF_PPC_STACK_SAVE (6*8)
|
2016-09-23 23:35:00 +03:00
|
|
|
/* for bpf JIT code internal usage */
|
|
|
|
#define BPF_PPC_STACK_LOCALS 16
|
2017-09-01 21:53:01 +03:00
|
|
|
/* stack frame excluding BPF stack, ensure this is quadword aligned */
|
|
|
|
#define BPF_PPC_STACKFRAME (STACK_FRAME_MIN_SIZE + \
|
2016-09-23 23:35:00 +03:00
|
|
|
BPF_PPC_STACK_LOCALS + BPF_PPC_STACK_SAVE)
|
2016-06-22 19:25:07 +03:00
|
|
|
|
|
|
|
#ifndef __ASSEMBLY__
|
|
|
|
|
|
|
|
/* BPF register usage */
|
2018-05-04 02:08:21 +03:00
|
|
|
#define TMP_REG_1 (MAX_BPF_JIT_REG + 0)
|
|
|
|
#define TMP_REG_2 (MAX_BPF_JIT_REG + 1)
|
2016-06-22 19:25:07 +03:00
|
|
|
|
|
|
|
/* BPF to ppc register mappings */
|
powerpc/bpf: Reallocate BPF registers to volatile registers when possible on PPC32
When the BPF routine doesn't call any function, the non volatile
registers can be reallocated to volatile registers in order to
avoid having to save them/restore on the stack.
Before this patch, the test #359 ADD default X is:
0: 7c 64 1b 78 mr r4,r3
4: 38 60 00 00 li r3,0
8: 94 21 ff b0 stwu r1,-80(r1)
c: 60 00 00 00 nop
10: 92 e1 00 2c stw r23,44(r1)
14: 93 01 00 30 stw r24,48(r1)
18: 93 21 00 34 stw r25,52(r1)
1c: 93 41 00 38 stw r26,56(r1)
20: 39 80 00 00 li r12,0
24: 39 60 00 00 li r11,0
28: 3b 40 00 00 li r26,0
2c: 3b 20 00 00 li r25,0
30: 7c 98 23 78 mr r24,r4
34: 7c 77 1b 78 mr r23,r3
38: 39 80 00 42 li r12,66
3c: 39 60 00 00 li r11,0
40: 7d 8c d2 14 add r12,r12,r26
44: 39 60 00 00 li r11,0
48: 7d 83 63 78 mr r3,r12
4c: 82 e1 00 2c lwz r23,44(r1)
50: 83 01 00 30 lwz r24,48(r1)
54: 83 21 00 34 lwz r25,52(r1)
58: 83 41 00 38 lwz r26,56(r1)
5c: 38 21 00 50 addi r1,r1,80
60: 4e 80 00 20 blr
After this patch, the same test has become:
0: 7c 64 1b 78 mr r4,r3
4: 38 60 00 00 li r3,0
8: 94 21 ff b0 stwu r1,-80(r1)
c: 60 00 00 00 nop
10: 39 80 00 00 li r12,0
14: 39 60 00 00 li r11,0
18: 39 00 00 00 li r8,0
1c: 38 e0 00 00 li r7,0
20: 7c 86 23 78 mr r6,r4
24: 7c 65 1b 78 mr r5,r3
28: 39 80 00 42 li r12,66
2c: 39 60 00 00 li r11,0
30: 7d 8c 42 14 add r12,r12,r8
34: 39 60 00 00 li r11,0
38: 7d 83 63 78 mr r3,r12
3c: 38 21 00 50 addi r1,r1,80
40: 4e 80 00 20 blr
Signed-off-by: Christophe Leroy <christophe.leroy@csgroup.eu>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Link: https://lore.kernel.org/r/b94562d7d2bb21aec89de0c40bb3cd91054b65a2.1616430991.git.christophe.leroy@csgroup.eu
2021-03-22 19:37:53 +03:00
|
|
|
const int b2p[MAX_BPF_JIT_REG + 2] = {
|
2016-06-22 19:25:07 +03:00
|
|
|
/* function return value */
|
|
|
|
[BPF_REG_0] = 8,
|
|
|
|
/* function arguments */
|
|
|
|
[BPF_REG_1] = 3,
|
|
|
|
[BPF_REG_2] = 4,
|
|
|
|
[BPF_REG_3] = 5,
|
|
|
|
[BPF_REG_4] = 6,
|
|
|
|
[BPF_REG_5] = 7,
|
|
|
|
/* non volatile registers */
|
|
|
|
[BPF_REG_6] = 27,
|
|
|
|
[BPF_REG_7] = 28,
|
|
|
|
[BPF_REG_8] = 29,
|
|
|
|
[BPF_REG_9] = 30,
|
|
|
|
/* frame pointer aka BPF_REG_10 */
|
|
|
|
[BPF_REG_FP] = 31,
|
|
|
|
/* eBPF jit internal registers */
|
powerpc/bpf: Add support for bpf constant blinding
In line with similar support for other architectures by Daniel Borkmann.
'MOD Default X' from test_bpf without constant blinding:
84 bytes emitted from JIT compiler (pass:3, flen:7)
d0000000058a4688 + <x>:
0: nop
4: nop
8: std r27,-40(r1)
c: std r28,-32(r1)
10: xor r8,r8,r8
14: xor r28,r28,r28
18: mr r27,r3
1c: li r8,66
20: cmpwi r28,0
24: bne 0x0000000000000030
28: li r8,0
2c: b 0x0000000000000044
30: divwu r9,r8,r28
34: mullw r9,r28,r9
38: subf r8,r9,r8
3c: rotlwi r8,r8,0
40: li r8,66
44: ld r27,-40(r1)
48: ld r28,-32(r1)
4c: mr r3,r8
50: blr
... and with constant blinding:
140 bytes emitted from JIT compiler (pass:3, flen:11)
d00000000bd6ab24 + <x>:
0: nop
4: nop
8: std r27,-40(r1)
c: std r28,-32(r1)
10: xor r8,r8,r8
14: xor r28,r28,r28
18: mr r27,r3
1c: lis r2,-22834
20: ori r2,r2,36083
24: rotlwi r2,r2,0
28: xori r2,r2,36017
2c: xoris r2,r2,42702
30: rotlwi r2,r2,0
34: mr r8,r2
38: rotlwi r8,r8,0
3c: cmpwi r28,0
40: bne 0x000000000000004c
44: li r8,0
48: b 0x000000000000007c
4c: divwu r9,r8,r28
50: mullw r9,r28,r9
54: subf r8,r9,r8
58: rotlwi r8,r8,0
5c: lis r2,-17137
60: ori r2,r2,39065
64: rotlwi r2,r2,0
68: xori r2,r2,39131
6c: xoris r2,r2,48399
70: rotlwi r2,r2,0
74: mr r8,r2
78: rotlwi r8,r8,0
7c: ld r27,-40(r1)
80: ld r28,-32(r1)
84: mr r3,r8
88: blr
Signed-off-by: Naveen N. Rao <naveen.n.rao@linux.vnet.ibm.com>
Acked-by: Daniel Borkmann <daniel@iogearbox.net>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
2016-09-23 23:35:02 +03:00
|
|
|
[BPF_REG_AX] = 2,
|
2016-06-22 19:25:07 +03:00
|
|
|
[TMP_REG_1] = 9,
|
|
|
|
[TMP_REG_2] = 10
|
|
|
|
};
|
|
|
|
|
2018-05-04 02:08:21 +03:00
|
|
|
/* PPC NVR range -- update this if we ever use NVRs below r27 */
|
|
|
|
#define BPF_PPC_NVR_MIN 27
|
2016-06-22 19:25:07 +03:00
|
|
|
|
2019-03-15 17:51:19 +03:00
|
|
|
/*
|
|
|
|
* WARNING: These can use TMP_REG_2 if the offset is not at word boundary,
|
|
|
|
* so ensure that it isn't in use already.
|
|
|
|
*/
|
|
|
|
#define PPC_BPF_LL(r, base, i) do { \
|
|
|
|
if ((i) % 4) { \
|
2020-06-24 14:30:36 +03:00
|
|
|
EMIT(PPC_RAW_LI(b2p[TMP_REG_2], (i)));\
|
|
|
|
EMIT(PPC_RAW_LDX(r, base, \
|
|
|
|
b2p[TMP_REG_2])); \
|
2019-03-15 17:51:19 +03:00
|
|
|
} else \
|
2020-06-24 14:30:35 +03:00
|
|
|
EMIT(PPC_RAW_LD(r, base, i)); \
|
2019-03-15 17:51:19 +03:00
|
|
|
} while(0)
|
|
|
|
#define PPC_BPF_STL(r, base, i) do { \
|
|
|
|
if ((i) % 4) { \
|
2020-06-24 14:30:36 +03:00
|
|
|
EMIT(PPC_RAW_LI(b2p[TMP_REG_2], (i)));\
|
|
|
|
EMIT(PPC_RAW_STDX(r, base, \
|
|
|
|
b2p[TMP_REG_2])); \
|
2019-03-15 17:51:19 +03:00
|
|
|
} else \
|
2020-06-24 14:30:35 +03:00
|
|
|
EMIT(PPC_RAW_STD(r, base, i)); \
|
2019-03-15 17:51:19 +03:00
|
|
|
} while(0)
|
2020-06-24 14:30:36 +03:00
|
|
|
#define PPC_BPF_STLU(r, base, i) do { EMIT(PPC_RAW_STDU(r, base, i)); } while(0)
|
2019-03-15 17:51:19 +03:00
|
|
|
|
2016-06-22 19:25:07 +03:00
|
|
|
#endif /* !__ASSEMBLY__ */
|
|
|
|
|
|
|
|
#endif
|