offload.c 6.4 KB
Newer Older
1
/*
2
 * Copyright (C) 2016-2017 Netronome Systems, Inc.
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49
 *
 * This software is dual licensed under the GNU General License Version 2,
 * June 1991 as shown in the file COPYING in the top-level directory of this
 * source tree or the BSD 2-Clause License provided below.  You have the
 * option to license this software under the complete terms of either license.
 *
 * The BSD 2-Clause License:
 *
 *     Redistribution and use in source and binary forms, with or
 *     without modification, are permitted provided that the following
 *     conditions are met:
 *
 *      1. Redistributions of source code must retain the above
 *         copyright notice, this list of conditions and the following
 *         disclaimer.
 *
 *      2. Redistributions in binary form must reproduce the above
 *         copyright notice, this list of conditions and the following
 *         disclaimer in the documentation and/or other materials
 *         provided with the distribution.
 *
 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
 * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
 * SOFTWARE.
 */

/*
 * nfp_net_offload.c
 * Netronome network device driver: TC offload functions for PF and VF
 */

#include <linux/kernel.h>
#include <linux/netdevice.h>
#include <linux/pci.h>
#include <linux/jiffies.h>
#include <linux/timer.h>
#include <linux/list.h>

#include <net/pkt_cls.h>
#include <net/tc_act/tc_gact.h>
#include <net/tc_act/tc_mirred.h>

50
#include "main.h"
51
#include "../nfp_app.h"
52 53
#include "../nfp_net_ctrl.h"
#include "../nfp_net.h"
54

55
static int
56 57 58
nfp_prog_prepare(struct nfp_prog *nfp_prog, const struct bpf_insn *prog,
		 unsigned int cnt)
{
59
	struct nfp_insn_meta *meta;
60 61 62 63 64 65 66 67 68 69 70 71 72
	unsigned int i;

	for (i = 0; i < cnt; i++) {
		meta = kzalloc(sizeof(*meta), GFP_KERNEL);
		if (!meta)
			return -ENOMEM;

		meta->insn = prog[i];
		meta->n = i;

		list_add_tail(&meta->l, &nfp_prog->insns);
	}

73
	nfp_bpf_jit_prepare(nfp_prog, cnt);
74

75 76 77
	return 0;
}

78
static void nfp_prog_free(struct nfp_prog *nfp_prog)
79 80 81 82 83 84 85 86 87 88
{
	struct nfp_insn_meta *meta, *tmp;

	list_for_each_entry_safe(meta, tmp, &nfp_prog->insns, l) {
		list_del(&meta->l);
		kfree(meta);
	}
	kfree(nfp_prog);
}

89 90
int nfp_bpf_verifier_prep(struct nfp_app *app, struct nfp_net *nn,
			  struct netdev_bpf *bpf)
91
{
92
	struct bpf_prog *prog = bpf->verifier.prog;
93
	struct nfp_prog *nfp_prog;
94 95
	int ret;

96 97
	nfp_prog = kzalloc(sizeof(*nfp_prog), GFP_KERNEL);
	if (!nfp_prog)
98 99
		return -ENOMEM;
	prog->aux->offload->dev_priv = nfp_prog;
100 101 102

	INIT_LIST_HEAD(&nfp_prog->insns);
	nfp_prog->type = prog->type;
103
	nfp_prog->bpf = app->priv;
104

105 106 107 108
	ret = nfp_prog_prepare(nfp_prog, prog->insnsi, prog->len);
	if (ret)
		goto err_free;

109 110 111 112
	nfp_prog->verifier_meta = nfp_prog_first_meta(nfp_prog);
	bpf->verifier.ops = &nfp_bpf_analyzer_ops;

	return 0;
113 114 115 116

err_free:
	nfp_prog_free(nfp_prog);

117
	return ret;
118 119
}

120 121
int nfp_bpf_translate(struct nfp_app *app, struct nfp_net *nn,
		      struct bpf_prog *prog)
122
{
123
	struct nfp_prog *nfp_prog = prog->aux->offload->dev_priv;
124 125
	unsigned int stack_size;
	unsigned int max_instr;
126

J
Jakub Kicinski 已提交
127
	stack_size = nn_readb(nn, NFP_NET_CFG_BPF_STACK_SZ) * 64;
J
Jakub Kicinski 已提交
128
	if (prog->aux->stack_depth > stack_size) {
J
Jakub Kicinski 已提交
129
		nn_info(nn, "stack too large: program %dB > FW stack %dB\n",
J
Jakub Kicinski 已提交
130
			prog->aux->stack_depth, stack_size);
J
Jakub Kicinski 已提交
131 132
		return -EOPNOTSUPP;
	}
133
	nfp_prog->stack_depth = round_up(prog->aux->stack_depth, 4);
134 135 136 137 138 139

	max_instr = nn_readw(nn, NFP_NET_CFG_BPF_MAX_LEN);
	nfp_prog->__prog_alloc_len = max_instr * sizeof(u64);

	nfp_prog->prog = kmalloc(nfp_prog->__prog_alloc_len, GFP_KERNEL);
	if (!nfp_prog->prog)
140 141
		return -ENOMEM;

142
	return nfp_bpf_jit(nfp_prog);
143 144
}

145 146
int nfp_bpf_destroy(struct nfp_app *app, struct nfp_net *nn,
		    struct bpf_prog *prog)
147
{
148 149
	struct nfp_prog *nfp_prog = prog->aux->offload->dev_priv;

150 151
	kfree(nfp_prog->prog);
	nfp_prog_free(nfp_prog);
152 153

	return 0;
154 155
}

156
static int nfp_net_bpf_load(struct nfp_net *nn, struct bpf_prog *prog)
157
{
158
	struct nfp_prog *nfp_prog = prog->aux->offload->dev_priv;
159
	unsigned int max_mtu;
160
	dma_addr_t dma_addr;
161
	void *img;
162 163 164 165 166
	int err;

	max_mtu = nn_readb(nn, NFP_NET_CFG_BPF_INL_MTU) * 64 - 32;
	if (max_mtu < nn->dp.netdev->mtu) {
		nn_info(nn, "BPF offload not supported with MTU larger than HW packet split boundary\n");
167
		return -EOPNOTSUPP;
168 169
	}

170 171 172 173 174
	img = nfp_bpf_relo_for_vnic(nfp_prog, nn->app_priv);
	if (IS_ERR(img))
		return PTR_ERR(img);

	dma_addr = dma_map_single(nn->dp.dev, img,
175 176
				  nfp_prog->prog_len * sizeof(u64),
				  DMA_TO_DEVICE);
177 178
	if (dma_mapping_error(nn->dp.dev, dma_addr)) {
		kfree(img);
179
		return -ENOMEM;
180
	}
181

182
	nn_writew(nn, NFP_NET_CFG_BPF_SIZE, nfp_prog->prog_len);
183
	nn_writeq(nn, NFP_NET_CFG_BPF_ADDR, dma_addr);
184 185 186 187 188 189

	/* Load up the JITed code */
	err = nfp_net_reconfig(nn, NFP_NET_CFG_UPDATE_BPF);
	if (err)
		nn_err(nn, "FW command error while loading BPF: %d\n", err);

190 191
	dma_unmap_single(nn->dp.dev, dma_addr, nfp_prog->prog_len * sizeof(u64),
			 DMA_TO_DEVICE);
192
	kfree(img);
193 194

	return err;
195 196 197 198 199 200
}

static void nfp_net_bpf_start(struct nfp_net *nn)
{
	int err;

201
	/* Enable passing packets through BPF function */
202 203
	nn->dp.ctrl |= NFP_NET_CFG_CTRL_BPF;
	nn_writel(nn, NFP_NET_CFG_CTRL, nn->dp.ctrl);
204 205 206 207 208 209 210
	err = nfp_net_reconfig(nn, NFP_NET_CFG_UPDATE_GEN);
	if (err)
		nn_err(nn, "FW command error while enabling BPF: %d\n", err);
}

static int nfp_net_bpf_stop(struct nfp_net *nn)
{
211
	if (!(nn->dp.ctrl & NFP_NET_CFG_CTRL_BPF))
212 213
		return 0;

214 215
	nn->dp.ctrl &= ~NFP_NET_CFG_CTRL_BPF;
	nn_writel(nn, NFP_NET_CFG_CTRL, nn->dp.ctrl);
216 217 218 219

	return nfp_net_reconfig(nn, NFP_NET_CFG_UPDATE_GEN);
}

J
Jakub Kicinski 已提交
220
int nfp_net_bpf_offload(struct nfp_net *nn, struct bpf_prog *prog,
221
			bool old_prog)
222
{
223 224
	int err;

225 226 227 228 229 230 231 232
	if (prog) {
		struct bpf_dev_offload *offload = prog->aux->offload;

		if (!offload)
			return -EINVAL;
		if (offload->netdev != nn->dp.netdev)
			return -EINVAL;
	}
233

234 235 236 237 238 239 240 241 242
	if (prog && old_prog) {
		u8 cap;

		cap = nn_readb(nn, NFP_NET_CFG_BPF_CAP);
		if (!(cap & NFP_NET_BPF_CAP_RELO)) {
			nn_err(nn, "FW does not support live reload\n");
			return -EBUSY;
		}
	}
J
Jakub Kicinski 已提交
243 244 245 246 247

	/* Something else is loaded, different program type? */
	if (!old_prog && nn->dp.ctrl & NFP_NET_CFG_CTRL_BPF)
		return -EBUSY;

248 249
	if (old_prog && !prog)
		return nfp_net_bpf_stop(nn);
250

251 252 253
	err = nfp_net_bpf_load(nn, prog);
	if (err)
		return err;
254

255 256
	if (!old_prog)
		nfp_net_bpf_start(nn);
257

J
Jakub Kicinski 已提交
258
	return 0;
259
}