mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-28 11:18:45 +07:00
bcf0cafab4
BPF's control message handler seems like a good base to built on for request-reply control messages. Split it out to allow for reuse. Signed-off-by: Jakub Kicinski <jakub.kicinski@netronome.com> Reviewed-by: Dirk van der Merwe <dirk.vandermerwe@netronome.com> Signed-off-by: David S. Miller <davem@davemloft.net>
314 lines
7.6 KiB
C
314 lines
7.6 KiB
C
// SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
|
|
/* Copyright (C) 2017-2018 Netronome Systems, Inc. */
|
|
|
|
#include <linux/bpf.h>
|
|
#include <linux/bitops.h>
|
|
#include <linux/bug.h>
|
|
#include <linux/jiffies.h>
|
|
#include <linux/skbuff.h>
|
|
|
|
#include "../ccm.h"
|
|
#include "../nfp_app.h"
|
|
#include "../nfp_net.h"
|
|
#include "fw.h"
|
|
#include "main.h"
|
|
|
|
static struct sk_buff *
|
|
nfp_bpf_cmsg_alloc(struct nfp_app_bpf *bpf, unsigned int size)
|
|
{
|
|
struct sk_buff *skb;
|
|
|
|
skb = nfp_app_ctrl_msg_alloc(bpf->app, size, GFP_KERNEL);
|
|
skb_put(skb, size);
|
|
|
|
return skb;
|
|
}
|
|
|
|
static unsigned int
|
|
nfp_bpf_cmsg_map_req_size(struct nfp_app_bpf *bpf, unsigned int n)
|
|
{
|
|
unsigned int size;
|
|
|
|
size = sizeof(struct cmsg_req_map_op);
|
|
size += (bpf->cmsg_key_sz + bpf->cmsg_val_sz) * n;
|
|
|
|
return size;
|
|
}
|
|
|
|
static struct sk_buff *
|
|
nfp_bpf_cmsg_map_req_alloc(struct nfp_app_bpf *bpf, unsigned int n)
|
|
{
|
|
return nfp_bpf_cmsg_alloc(bpf, nfp_bpf_cmsg_map_req_size(bpf, n));
|
|
}
|
|
|
|
static unsigned int
|
|
nfp_bpf_cmsg_map_reply_size(struct nfp_app_bpf *bpf, unsigned int n)
|
|
{
|
|
unsigned int size;
|
|
|
|
size = sizeof(struct cmsg_reply_map_op);
|
|
size += (bpf->cmsg_key_sz + bpf->cmsg_val_sz) * n;
|
|
|
|
return size;
|
|
}
|
|
|
|
static int
|
|
nfp_bpf_ctrl_rc_to_errno(struct nfp_app_bpf *bpf,
|
|
struct cmsg_reply_map_simple *reply)
|
|
{
|
|
static const int res_table[] = {
|
|
[CMSG_RC_SUCCESS] = 0,
|
|
[CMSG_RC_ERR_MAP_FD] = -EBADFD,
|
|
[CMSG_RC_ERR_MAP_NOENT] = -ENOENT,
|
|
[CMSG_RC_ERR_MAP_ERR] = -EINVAL,
|
|
[CMSG_RC_ERR_MAP_PARSE] = -EIO,
|
|
[CMSG_RC_ERR_MAP_EXIST] = -EEXIST,
|
|
[CMSG_RC_ERR_MAP_NOMEM] = -ENOMEM,
|
|
[CMSG_RC_ERR_MAP_E2BIG] = -E2BIG,
|
|
};
|
|
u32 rc;
|
|
|
|
rc = be32_to_cpu(reply->rc);
|
|
if (rc >= ARRAY_SIZE(res_table)) {
|
|
cmsg_warn(bpf, "FW responded with invalid status: %u\n", rc);
|
|
return -EIO;
|
|
}
|
|
|
|
return res_table[rc];
|
|
}
|
|
|
|
long long int
|
|
nfp_bpf_ctrl_alloc_map(struct nfp_app_bpf *bpf, struct bpf_map *map)
|
|
{
|
|
struct cmsg_reply_map_alloc_tbl *reply;
|
|
struct cmsg_req_map_alloc_tbl *req;
|
|
struct sk_buff *skb;
|
|
u32 tid;
|
|
int err;
|
|
|
|
skb = nfp_bpf_cmsg_alloc(bpf, sizeof(*req));
|
|
if (!skb)
|
|
return -ENOMEM;
|
|
|
|
req = (void *)skb->data;
|
|
req->key_size = cpu_to_be32(map->key_size);
|
|
req->value_size = cpu_to_be32(map->value_size);
|
|
req->max_entries = cpu_to_be32(map->max_entries);
|
|
req->map_type = cpu_to_be32(map->map_type);
|
|
req->map_flags = 0;
|
|
|
|
skb = nfp_ccm_communicate(&bpf->ccm, skb, NFP_CCM_TYPE_BPF_MAP_ALLOC,
|
|
sizeof(*reply));
|
|
if (IS_ERR(skb))
|
|
return PTR_ERR(skb);
|
|
|
|
reply = (void *)skb->data;
|
|
err = nfp_bpf_ctrl_rc_to_errno(bpf, &reply->reply_hdr);
|
|
if (err)
|
|
goto err_free;
|
|
|
|
tid = be32_to_cpu(reply->tid);
|
|
dev_consume_skb_any(skb);
|
|
|
|
return tid;
|
|
err_free:
|
|
dev_kfree_skb_any(skb);
|
|
return err;
|
|
}
|
|
|
|
void nfp_bpf_ctrl_free_map(struct nfp_app_bpf *bpf, struct nfp_bpf_map *nfp_map)
|
|
{
|
|
struct cmsg_reply_map_free_tbl *reply;
|
|
struct cmsg_req_map_free_tbl *req;
|
|
struct sk_buff *skb;
|
|
int err;
|
|
|
|
skb = nfp_bpf_cmsg_alloc(bpf, sizeof(*req));
|
|
if (!skb) {
|
|
cmsg_warn(bpf, "leaking map - failed to allocate msg\n");
|
|
return;
|
|
}
|
|
|
|
req = (void *)skb->data;
|
|
req->tid = cpu_to_be32(nfp_map->tid);
|
|
|
|
skb = nfp_ccm_communicate(&bpf->ccm, skb, NFP_CCM_TYPE_BPF_MAP_FREE,
|
|
sizeof(*reply));
|
|
if (IS_ERR(skb)) {
|
|
cmsg_warn(bpf, "leaking map - I/O error\n");
|
|
return;
|
|
}
|
|
|
|
reply = (void *)skb->data;
|
|
err = nfp_bpf_ctrl_rc_to_errno(bpf, &reply->reply_hdr);
|
|
if (err)
|
|
cmsg_warn(bpf, "leaking map - FW responded with: %d\n", err);
|
|
|
|
dev_consume_skb_any(skb);
|
|
}
|
|
|
|
static void *
|
|
nfp_bpf_ctrl_req_key(struct nfp_app_bpf *bpf, struct cmsg_req_map_op *req,
|
|
unsigned int n)
|
|
{
|
|
return &req->data[bpf->cmsg_key_sz * n + bpf->cmsg_val_sz * n];
|
|
}
|
|
|
|
static void *
|
|
nfp_bpf_ctrl_req_val(struct nfp_app_bpf *bpf, struct cmsg_req_map_op *req,
|
|
unsigned int n)
|
|
{
|
|
return &req->data[bpf->cmsg_key_sz * (n + 1) + bpf->cmsg_val_sz * n];
|
|
}
|
|
|
|
static void *
|
|
nfp_bpf_ctrl_reply_key(struct nfp_app_bpf *bpf, struct cmsg_reply_map_op *reply,
|
|
unsigned int n)
|
|
{
|
|
return &reply->data[bpf->cmsg_key_sz * n + bpf->cmsg_val_sz * n];
|
|
}
|
|
|
|
static void *
|
|
nfp_bpf_ctrl_reply_val(struct nfp_app_bpf *bpf, struct cmsg_reply_map_op *reply,
|
|
unsigned int n)
|
|
{
|
|
return &reply->data[bpf->cmsg_key_sz * (n + 1) + bpf->cmsg_val_sz * n];
|
|
}
|
|
|
|
static int
|
|
nfp_bpf_ctrl_entry_op(struct bpf_offloaded_map *offmap, enum nfp_ccm_type op,
|
|
u8 *key, u8 *value, u64 flags, u8 *out_key, u8 *out_value)
|
|
{
|
|
struct nfp_bpf_map *nfp_map = offmap->dev_priv;
|
|
struct nfp_app_bpf *bpf = nfp_map->bpf;
|
|
struct bpf_map *map = &offmap->map;
|
|
struct cmsg_reply_map_op *reply;
|
|
struct cmsg_req_map_op *req;
|
|
struct sk_buff *skb;
|
|
int err;
|
|
|
|
/* FW messages have no space for more than 32 bits of flags */
|
|
if (flags >> 32)
|
|
return -EOPNOTSUPP;
|
|
|
|
skb = nfp_bpf_cmsg_map_req_alloc(bpf, 1);
|
|
if (!skb)
|
|
return -ENOMEM;
|
|
|
|
req = (void *)skb->data;
|
|
req->tid = cpu_to_be32(nfp_map->tid);
|
|
req->count = cpu_to_be32(1);
|
|
req->flags = cpu_to_be32(flags);
|
|
|
|
/* Copy inputs */
|
|
if (key)
|
|
memcpy(nfp_bpf_ctrl_req_key(bpf, req, 0), key, map->key_size);
|
|
if (value)
|
|
memcpy(nfp_bpf_ctrl_req_val(bpf, req, 0), value,
|
|
map->value_size);
|
|
|
|
skb = nfp_ccm_communicate(&bpf->ccm, skb, op,
|
|
nfp_bpf_cmsg_map_reply_size(bpf, 1));
|
|
if (IS_ERR(skb))
|
|
return PTR_ERR(skb);
|
|
|
|
reply = (void *)skb->data;
|
|
err = nfp_bpf_ctrl_rc_to_errno(bpf, &reply->reply_hdr);
|
|
if (err)
|
|
goto err_free;
|
|
|
|
/* Copy outputs */
|
|
if (out_key)
|
|
memcpy(out_key, nfp_bpf_ctrl_reply_key(bpf, reply, 0),
|
|
map->key_size);
|
|
if (out_value)
|
|
memcpy(out_value, nfp_bpf_ctrl_reply_val(bpf, reply, 0),
|
|
map->value_size);
|
|
|
|
dev_consume_skb_any(skb);
|
|
|
|
return 0;
|
|
err_free:
|
|
dev_kfree_skb_any(skb);
|
|
return err;
|
|
}
|
|
|
|
int nfp_bpf_ctrl_update_entry(struct bpf_offloaded_map *offmap,
|
|
void *key, void *value, u64 flags)
|
|
{
|
|
return nfp_bpf_ctrl_entry_op(offmap, NFP_CCM_TYPE_BPF_MAP_UPDATE,
|
|
key, value, flags, NULL, NULL);
|
|
}
|
|
|
|
int nfp_bpf_ctrl_del_entry(struct bpf_offloaded_map *offmap, void *key)
|
|
{
|
|
return nfp_bpf_ctrl_entry_op(offmap, NFP_CCM_TYPE_BPF_MAP_DELETE,
|
|
key, NULL, 0, NULL, NULL);
|
|
}
|
|
|
|
int nfp_bpf_ctrl_lookup_entry(struct bpf_offloaded_map *offmap,
|
|
void *key, void *value)
|
|
{
|
|
return nfp_bpf_ctrl_entry_op(offmap, NFP_CCM_TYPE_BPF_MAP_LOOKUP,
|
|
key, NULL, 0, NULL, value);
|
|
}
|
|
|
|
int nfp_bpf_ctrl_getfirst_entry(struct bpf_offloaded_map *offmap,
|
|
void *next_key)
|
|
{
|
|
return nfp_bpf_ctrl_entry_op(offmap, NFP_CCM_TYPE_BPF_MAP_GETFIRST,
|
|
NULL, NULL, 0, next_key, NULL);
|
|
}
|
|
|
|
int nfp_bpf_ctrl_getnext_entry(struct bpf_offloaded_map *offmap,
|
|
void *key, void *next_key)
|
|
{
|
|
return nfp_bpf_ctrl_entry_op(offmap, NFP_CCM_TYPE_BPF_MAP_GETNEXT,
|
|
key, NULL, 0, next_key, NULL);
|
|
}
|
|
|
|
unsigned int nfp_bpf_ctrl_cmsg_mtu(struct nfp_app_bpf *bpf)
|
|
{
|
|
return max3((unsigned int)NFP_NET_DEFAULT_MTU,
|
|
nfp_bpf_cmsg_map_req_size(bpf, 1),
|
|
nfp_bpf_cmsg_map_reply_size(bpf, 1));
|
|
}
|
|
|
|
void nfp_bpf_ctrl_msg_rx(struct nfp_app *app, struct sk_buff *skb)
|
|
{
|
|
struct nfp_app_bpf *bpf = app->priv;
|
|
|
|
if (unlikely(skb->len < sizeof(struct cmsg_reply_map_simple))) {
|
|
cmsg_warn(bpf, "cmsg drop - too short %d!\n", skb->len);
|
|
dev_kfree_skb_any(skb);
|
|
return;
|
|
}
|
|
|
|
if (nfp_ccm_get_type(skb) == NFP_CCM_TYPE_BPF_BPF_EVENT) {
|
|
if (!nfp_bpf_event_output(bpf, skb->data, skb->len))
|
|
dev_consume_skb_any(skb);
|
|
else
|
|
dev_kfree_skb_any(skb);
|
|
}
|
|
|
|
nfp_ccm_rx(&bpf->ccm, skb);
|
|
}
|
|
|
|
void
|
|
nfp_bpf_ctrl_msg_rx_raw(struct nfp_app *app, const void *data, unsigned int len)
|
|
{
|
|
const struct nfp_ccm_hdr *hdr = data;
|
|
struct nfp_app_bpf *bpf = app->priv;
|
|
|
|
if (unlikely(len < sizeof(struct cmsg_reply_map_simple))) {
|
|
cmsg_warn(bpf, "cmsg drop - too short %d!\n", len);
|
|
return;
|
|
}
|
|
|
|
if (hdr->type == NFP_CCM_TYPE_BPF_BPF_EVENT)
|
|
nfp_bpf_event_output(bpf, data, len);
|
|
else
|
|
cmsg_warn(bpf, "cmsg drop - msg type %d with raw buffer!\n",
|
|
hdr->type);
|
|
}
|