Skip to content

Commit 063188f

Browse files
puranjaymohanKernel Patches Daemon
authored andcommitted
powerpc64/bpf: Add jit support for load_acquire and store_release
Add JIT support for the load_acquire and store_release instructions. The implementation is similar to the kernel where: load_acquire => plain load -> lwsync store_release => lwsync -> plain store To test the correctness of the implementation, following selftests were run: [fedora@linux-kernel bpf]$ sudo ./test_progs -a \ verifier_load_acquire,verifier_store_release,atomics #11/1 atomics/add:OK #11/2 atomics/sub:OK #11/3 atomics/and:OK #11/4 atomics/or:OK #11/5 atomics/xor:OK #11/6 atomics/cmpxchg:OK #11/7 atomics/xchg:OK #11 atomics:OK #519/1 verifier_load_acquire/load-acquire, 8-bit:OK #519/2 verifier_load_acquire/load-acquire, 8-bit @unpriv:OK #519/3 verifier_load_acquire/load-acquire, 16-bit:OK #519/4 verifier_load_acquire/load-acquire, 16-bit @unpriv:OK #519/5 verifier_load_acquire/load-acquire, 32-bit:OK #519/6 verifier_load_acquire/load-acquire, 32-bit @unpriv:OK #519/7 verifier_load_acquire/load-acquire, 64-bit:OK #519/8 verifier_load_acquire/load-acquire, 64-bit @unpriv:OK #519/9 verifier_load_acquire/load-acquire with uninitialized src_reg:OK #519/10 verifier_load_acquire/load-acquire with uninitialized src_reg @unpriv:OK #519/11 verifier_load_acquire/load-acquire with non-pointer src_reg:OK #519/12 verifier_load_acquire/load-acquire with non-pointer src_reg @unpriv:OK #519/13 verifier_load_acquire/misaligned load-acquire:OK #519/14 verifier_load_acquire/misaligned load-acquire @unpriv:OK #519/15 verifier_load_acquire/load-acquire from ctx pointer:OK #519/16 verifier_load_acquire/load-acquire from ctx pointer @unpriv:OK #519/17 verifier_load_acquire/load-acquire with invalid register R15:OK #519/18 verifier_load_acquire/load-acquire with invalid register R15 @unpriv:OK #519/19 verifier_load_acquire/load-acquire from pkt pointer:OK #519/20 verifier_load_acquire/load-acquire from flow_keys pointer:OK #519/21 verifier_load_acquire/load-acquire from sock pointer:OK #519 verifier_load_acquire:OK #556/1 verifier_store_release/store-release, 8-bit:OK #556/2 verifier_store_release/store-release, 8-bit @unpriv:OK #556/3 verifier_store_release/store-release, 16-bit:OK #556/4 verifier_store_release/store-release, 16-bit @unpriv:OK #556/5 verifier_store_release/store-release, 32-bit:OK #556/6 verifier_store_release/store-release, 32-bit @unpriv:OK #556/7 verifier_store_release/store-release, 64-bit:OK #556/8 verifier_store_release/store-release, 64-bit @unpriv:OK #556/9 verifier_store_release/store-release with uninitialized src_reg:OK #556/10 verifier_store_release/store-release with uninitialized src_reg @unpriv:OK #556/11 verifier_store_release/store-release with uninitialized dst_reg:OK #556/12 verifier_store_release/store-release with uninitialized dst_reg @unpriv:OK #556/13 verifier_store_release/store-release with non-pointer dst_reg:OK #556/14 verifier_store_release/store-release with non-pointer dst_reg @unpriv:OK #556/15 verifier_store_release/misaligned store-release:OK #556/16 verifier_store_release/misaligned store-release @unpriv:OK #556/17 verifier_store_release/store-release to ctx pointer:OK #556/18 verifier_store_release/store-release to ctx pointer @unpriv:OK #556/19 verifier_store_release/store-release, leak pointer to stack:OK #556/20 verifier_store_release/store-release, leak pointer to stack @unpriv:OK #556/21 verifier_store_release/store-release, leak pointer to map:OK #556/22 verifier_store_release/store-release, leak pointer to map @unpriv:OK #556/23 verifier_store_release/store-release with invalid register R15:OK #556/24 verifier_store_release/store-release with invalid register R15 @unpriv:OK #556/25 verifier_store_release/store-release to pkt pointer:OK #556/26 verifier_store_release/store-release to flow_keys pointer:OK #556/27 verifier_store_release/store-release to sock pointer:OK #556 verifier_store_release:OK Summary: 3/55 PASSED, 0 SKIPPED, 0 FAILED Signed-off-by: Puranjay Mohan <[email protected]>
1 parent 1c4f46e commit 063188f

File tree

3 files changed

+85
-1
lines changed

3 files changed

+85
-1
lines changed

arch/powerpc/include/asm/ppc-opcode.h

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -425,6 +425,7 @@
425425
#define PPC_RAW_SC() (0x44000002)
426426
#define PPC_RAW_SYNC() (0x7c0004ac)
427427
#define PPC_RAW_ISYNC() (0x4c00012c)
428+
#define PPC_RAW_LWSYNC() (0x7c2004ac)
428429

429430
/*
430431
* Define what the VSX XX1 form instructions will look like, then add

arch/powerpc/net/bpf_jit_comp64.c

Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -409,6 +409,71 @@ asm (
409409
" blr ;"
410410
);
411411

412+
static int emit_atomic_ld_st(const struct bpf_insn insn, struct codegen_context *ctx, u32 *image)
413+
{
414+
u32 code = insn.code;
415+
u32 dst_reg = bpf_to_ppc(insn.dst_reg);
416+
u32 src_reg = bpf_to_ppc(insn.src_reg);
417+
u32 size = BPF_SIZE(code);
418+
u32 tmp1_reg = bpf_to_ppc(TMP_REG_1);
419+
u32 tmp2_reg = bpf_to_ppc(TMP_REG_2);
420+
s16 off = insn.off;
421+
s32 imm = insn.imm;
422+
423+
switch (imm) {
424+
case BPF_LOAD_ACQ:
425+
switch (size) {
426+
case BPF_B:
427+
EMIT(PPC_RAW_LBZ(dst_reg, src_reg, off));
428+
break;
429+
case BPF_H:
430+
EMIT(PPC_RAW_LHZ(dst_reg, src_reg, off));
431+
break;
432+
case BPF_W:
433+
EMIT(PPC_RAW_LWZ(dst_reg, src_reg, off));
434+
break;
435+
case BPF_DW:
436+
if (off % 4) {
437+
EMIT(PPC_RAW_LI(tmp1_reg, off));
438+
EMIT(PPC_RAW_LDX(dst_reg, src_reg, tmp1_reg));
439+
} else {
440+
EMIT(PPC_RAW_LD(dst_reg, src_reg, off));
441+
}
442+
break;
443+
}
444+
EMIT(PPC_RAW_LWSYNC());
445+
break;
446+
case BPF_STORE_REL:
447+
EMIT(PPC_RAW_LWSYNC());
448+
switch (size) {
449+
case BPF_B:
450+
EMIT(PPC_RAW_STB(src_reg, dst_reg, off));
451+
break;
452+
case BPF_H:
453+
EMIT(PPC_RAW_STH(src_reg, dst_reg, off));
454+
break;
455+
case BPF_W:
456+
EMIT(PPC_RAW_STW(src_reg, dst_reg, off));
457+
break;
458+
case BPF_DW:
459+
if (off % 4) {
460+
EMIT(PPC_RAW_LI(tmp2_reg, off));
461+
EMIT(PPC_RAW_STDX(src_reg, dst_reg, tmp2_reg));
462+
} else {
463+
EMIT(PPC_RAW_STD(src_reg, dst_reg, off));
464+
}
465+
break;
466+
}
467+
break;
468+
default:
469+
pr_err_ratelimited("unexpected atomic load/store op code %02x\n",
470+
imm);
471+
return -EINVAL;
472+
}
473+
474+
return 0;
475+
}
476+
412477
/* Assemble the body code between the prologue & epilogue */
413478
int bpf_jit_build_body(struct bpf_prog *fp, u32 *image, u32 *fimage, struct codegen_context *ctx,
414479
u32 *addrs, int pass, bool extra_pass)
@@ -898,8 +963,25 @@ int bpf_jit_build_body(struct bpf_prog *fp, u32 *image, u32 *fimage, struct code
898963
/*
899964
* BPF_STX ATOMIC (atomic ops)
900965
*/
966+
case BPF_STX | BPF_ATOMIC | BPF_B:
967+
case BPF_STX | BPF_ATOMIC | BPF_H:
901968
case BPF_STX | BPF_ATOMIC | BPF_W:
902969
case BPF_STX | BPF_ATOMIC | BPF_DW:
970+
if (bpf_atomic_is_load_store(&insn[i])) {
971+
ret = emit_atomic_ld_st(insn[i], ctx, image);
972+
if (ret)
973+
return ret;
974+
975+
if (size != BPF_DW && insn_is_zext(&insn[i + 1]))
976+
addrs[++i] = ctx->idx * 4;
977+
break;
978+
} else if (size == BPF_B || size == BPF_H) {
979+
pr_err_ratelimited(
980+
"eBPF filter atomic op code %02x (@%d) unsupported\n",
981+
code, i);
982+
return -EOPNOTSUPP;
983+
}
984+
903985
save_reg = tmp2_reg;
904986
ret_reg = src_reg;
905987

tools/testing/selftests/bpf/progs/bpf_misc.h

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -229,7 +229,8 @@
229229

230230
#if __clang_major__ >= 18 && defined(ENABLE_ATOMICS_TESTS) && \
231231
(defined(__TARGET_ARCH_arm64) || defined(__TARGET_ARCH_x86) || \
232-
(defined(__TARGET_ARCH_riscv) && __riscv_xlen == 64))
232+
(defined(__TARGET_ARCH_riscv) && __riscv_xlen == 64)) || \
233+
(defined(__TARGET_ARCH_powerpc))
233234
#define CAN_USE_LOAD_ACQ_STORE_REL
234235
#endif
235236

0 commit comments

Comments
 (0)