offload.c 6.2 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49
/*
 * Copyright (C) 2016 Netronome Systems, Inc.
 *
 * This software is dual licensed under the GNU General License Version 2,
 * June 1991 as shown in the file COPYING in the top-level directory of this
 * source tree or the BSD 2-Clause License provided below.  You have the
 * option to license this software under the complete terms of either license.
 *
 * The BSD 2-Clause License:
 *
 *     Redistribution and use in source and binary forms, with or
 *     without modification, are permitted provided that the following
 *     conditions are met:
 *
 *      1. Redistributions of source code must retain the above
 *         copyright notice, this list of conditions and the following
 *         disclaimer.
 *
 *      2. Redistributions in binary form must reproduce the above
 *         copyright notice, this list of conditions and the following
 *         disclaimer in the documentation and/or other materials
 *         provided with the distribution.
 *
 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
 * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
 * SOFTWARE.
 */

/*
 * nfp_net_offload.c
 * Netronome network device driver: TC offload functions for PF and VF
 */

#include <linux/kernel.h>
#include <linux/netdevice.h>
#include <linux/pci.h>
#include <linux/jiffies.h>
#include <linux/timer.h>
#include <linux/list.h>

#include <net/pkt_cls.h>
#include <net/tc_act/tc_gact.h>
#include <net/tc_act/tc_mirred.h>

50 51 52
#include "main.h"
#include "../nfp_net_ctrl.h"
#include "../nfp_net.h"
53

54
static int
55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75
nfp_prog_prepare(struct nfp_prog *nfp_prog, const struct bpf_insn *prog,
		 unsigned int cnt)
{
	unsigned int i;

	for (i = 0; i < cnt; i++) {
		struct nfp_insn_meta *meta;

		meta = kzalloc(sizeof(*meta), GFP_KERNEL);
		if (!meta)
			return -ENOMEM;

		meta->insn = prog[i];
		meta->n = i;

		list_add_tail(&meta->l, &nfp_prog->insns);
	}

	return 0;
}

76
static void nfp_prog_free(struct nfp_prog *nfp_prog)
77 78 79 80 81 82 83 84 85 86
{
	struct nfp_insn_meta *meta, *tmp;

	list_for_each_entry_safe(meta, tmp, &nfp_prog->insns, l) {
		list_del(&meta->l);
		kfree(meta);
	}
	kfree(nfp_prog);
}

87 88
int nfp_bpf_verifier_prep(struct nfp_app *app, struct nfp_net *nn,
			  struct netdev_bpf *bpf)
89
{
90
	struct bpf_prog *prog = bpf->verifier.prog;
91
	struct nfp_prog *nfp_prog;
92 93
	int ret;

94 95
	nfp_prog = kzalloc(sizeof(*nfp_prog), GFP_KERNEL);
	if (!nfp_prog)
96 97
		return -ENOMEM;
	prog->aux->offload->dev_priv = nfp_prog;
98 99 100

	INIT_LIST_HEAD(&nfp_prog->insns);
	nfp_prog->type = prog->type;
101

102 103 104 105
	ret = nfp_prog_prepare(nfp_prog, prog->insnsi, prog->len);
	if (ret)
		goto err_free;

106 107 108 109
	nfp_prog->verifier_meta = nfp_prog_first_meta(nfp_prog);
	bpf->verifier.ops = &nfp_bpf_analyzer_ops;

	return 0;
110 111 112 113

err_free:
	nfp_prog_free(nfp_prog);

114
	return ret;
115 116
}

117 118
int nfp_bpf_translate(struct nfp_app *app, struct nfp_net *nn,
		      struct bpf_prog *prog)
119
{
120
	struct nfp_prog *nfp_prog = prog->aux->offload->dev_priv;
121 122
	unsigned int stack_size;
	unsigned int max_instr;
123

J
Jakub Kicinski 已提交
124
	stack_size = nn_readb(nn, NFP_NET_CFG_BPF_STACK_SZ) * 64;
J
Jakub Kicinski 已提交
125
	if (prog->aux->stack_depth > stack_size) {
J
Jakub Kicinski 已提交
126
		nn_info(nn, "stack too large: program %dB > FW stack %dB\n",
J
Jakub Kicinski 已提交
127
			prog->aux->stack_depth, stack_size);
J
Jakub Kicinski 已提交
128 129 130
		return -EOPNOTSUPP;
	}

131 132 133 134 135 136 137 138 139
	nfp_prog->stack_depth = prog->aux->stack_depth;
	nfp_prog->start_off = nn_readw(nn, NFP_NET_CFG_BPF_START);
	nfp_prog->tgt_done = nn_readw(nn, NFP_NET_CFG_BPF_DONE);

	max_instr = nn_readw(nn, NFP_NET_CFG_BPF_MAX_LEN);
	nfp_prog->__prog_alloc_len = max_instr * sizeof(u64);

	nfp_prog->prog = kmalloc(nfp_prog->__prog_alloc_len, GFP_KERNEL);
	if (!nfp_prog->prog)
140 141
		return -ENOMEM;

142
	return nfp_bpf_jit(nfp_prog);
143 144
}

145 146
int nfp_bpf_destroy(struct nfp_app *app, struct nfp_net *nn,
		    struct bpf_prog *prog)
147
{
148 149
	struct nfp_prog *nfp_prog = prog->aux->offload->dev_priv;

150 151
	kfree(nfp_prog->prog);
	nfp_prog_free(nfp_prog);
152 153

	return 0;
154 155
}

156
static int nfp_net_bpf_load(struct nfp_net *nn, struct bpf_prog *prog)
157
{
158
	struct nfp_prog *nfp_prog = prog->aux->offload->dev_priv;
159
	unsigned int max_mtu;
160
	dma_addr_t dma_addr;
161 162 163 164 165
	int err;

	max_mtu = nn_readb(nn, NFP_NET_CFG_BPF_INL_MTU) * 64 - 32;
	if (max_mtu < nn->dp.netdev->mtu) {
		nn_info(nn, "BPF offload not supported with MTU larger than HW packet split boundary\n");
166
		return -EOPNOTSUPP;
167 168
	}

169 170 171 172 173
	dma_addr = dma_map_single(nn->dp.dev, nfp_prog->prog,
				  nfp_prog->prog_len * sizeof(u64),
				  DMA_TO_DEVICE);
	if (dma_mapping_error(nn->dp.dev, dma_addr))
		return -ENOMEM;
174

175
	nn_writew(nn, NFP_NET_CFG_BPF_SIZE, nfp_prog->prog_len);
176
	nn_writeq(nn, NFP_NET_CFG_BPF_ADDR, dma_addr);
177 178 179 180 181 182

	/* Load up the JITed code */
	err = nfp_net_reconfig(nn, NFP_NET_CFG_UPDATE_BPF);
	if (err)
		nn_err(nn, "FW command error while loading BPF: %d\n", err);

183 184
	dma_unmap_single(nn->dp.dev, dma_addr, nfp_prog->prog_len * sizeof(u64),
			 DMA_TO_DEVICE);
185 186

	return err;
187 188 189 190 191 192
}

static void nfp_net_bpf_start(struct nfp_net *nn)
{
	int err;

193
	/* Enable passing packets through BPF function */
194 195
	nn->dp.ctrl |= NFP_NET_CFG_CTRL_BPF;
	nn_writel(nn, NFP_NET_CFG_CTRL, nn->dp.ctrl);
196 197 198 199 200 201 202
	err = nfp_net_reconfig(nn, NFP_NET_CFG_UPDATE_GEN);
	if (err)
		nn_err(nn, "FW command error while enabling BPF: %d\n", err);
}

static int nfp_net_bpf_stop(struct nfp_net *nn)
{
203
	if (!(nn->dp.ctrl & NFP_NET_CFG_CTRL_BPF))
204 205
		return 0;

206 207
	nn->dp.ctrl &= ~NFP_NET_CFG_CTRL_BPF;
	nn_writel(nn, NFP_NET_CFG_CTRL, nn->dp.ctrl);
208 209 210 211

	return nfp_net_reconfig(nn, NFP_NET_CFG_UPDATE_GEN);
}

J
Jakub Kicinski 已提交
212
int nfp_net_bpf_offload(struct nfp_net *nn, struct bpf_prog *prog,
213
			bool old_prog)
214
{
215 216 217 218
	int err;

	if (prog && !prog->aux->offload)
		return -EINVAL;
219

220 221 222 223 224 225 226 227 228
	if (prog && old_prog) {
		u8 cap;

		cap = nn_readb(nn, NFP_NET_CFG_BPF_CAP);
		if (!(cap & NFP_NET_BPF_CAP_RELO)) {
			nn_err(nn, "FW does not support live reload\n");
			return -EBUSY;
		}
	}
J
Jakub Kicinski 已提交
229 230 231 232 233

	/* Something else is loaded, different program type? */
	if (!old_prog && nn->dp.ctrl & NFP_NET_CFG_CTRL_BPF)
		return -EBUSY;

234 235
	if (old_prog && !prog)
		return nfp_net_bpf_stop(nn);
236

237 238 239
	err = nfp_net_bpf_load(nn, prog);
	if (err)
		return err;
240

241 242
	if (!old_prog)
		nfp_net_bpf_start(nn);
243

J
Jakub Kicinski 已提交
244
	return 0;
245
}