nfp: bpf: implement helpers for FW map ops
authorJakub Kicinski <jakub.kicinski@netronome.com>
Fri, 12 Jan 2018 04:29:12 +0000 (20:29 -0800)
committerDaniel Borkmann <daniel@iogearbox.net>
Sun, 14 Jan 2018 22:36:30 +0000 (23:36 +0100)
Implement calls for FW map communication.

Signed-off-by: Jakub Kicinski <jakub.kicinski@netronome.com>
Reviewed-by: Quentin Monnet <quentin.monnet@netronome.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
drivers/net/ethernet/netronome/nfp/bpf/cmsg.c
drivers/net/ethernet/netronome/nfp/bpf/fw.h
drivers/net/ethernet/netronome/nfp/bpf/main.h

index 46753ee9f7c57e3b3d450de3afe337c57135c668..71e6586acc367518934be289268ec5ce08f4fd1c 100644 (file)
@@ -31,6 +31,7 @@
  * SOFTWARE.
  */
 
+#include <linux/bpf.h>
 #include <linux/bitops.h>
 #include <linux/bug.h>
 #include <linux/jiffies.h>
@@ -79,6 +80,28 @@ static void nfp_bpf_free_tag(struct nfp_app_bpf *bpf, u16 tag)
                bpf->tag_alloc_last++;
 }
 
+static struct sk_buff *
+nfp_bpf_cmsg_alloc(struct nfp_app_bpf *bpf, unsigned int size)
+{
+       struct sk_buff *skb;
+
+       skb = nfp_app_ctrl_msg_alloc(bpf->app, size, GFP_KERNEL);
+       skb_put(skb, size);
+
+       return skb;
+}
+
+static struct sk_buff *
+nfp_bpf_cmsg_map_req_alloc(struct nfp_app_bpf *bpf, unsigned int n)
+{
+       unsigned int size;
+
+       size = sizeof(struct cmsg_req_map_op);
+       size += sizeof(struct cmsg_key_value_pair) * n;
+
+       return nfp_bpf_cmsg_alloc(bpf, size);
+}
+
 static unsigned int nfp_bpf_cmsg_get_tag(struct sk_buff *skb)
 {
        struct cmsg_hdr *hdr;
@@ -159,7 +182,7 @@ nfp_bpf_cmsg_wait_reply(struct nfp_app_bpf *bpf, enum nfp_bpf_cmsg_type type,
        return skb;
 }
 
-struct sk_buff *
+static struct sk_buff *
 nfp_bpf_cmsg_communicate(struct nfp_app_bpf *bpf, struct sk_buff *skb,
                         enum nfp_bpf_cmsg_type type, unsigned int reply_size)
 {
@@ -206,6 +229,191 @@ err_free:
        return ERR_PTR(-EIO);
 }
 
+static int
+nfp_bpf_ctrl_rc_to_errno(struct nfp_app_bpf *bpf,
+                        struct cmsg_reply_map_simple *reply)
+{
+       static const int res_table[] = {
+               [CMSG_RC_SUCCESS]       = 0,
+               [CMSG_RC_ERR_MAP_FD]    = -EBADFD,
+               [CMSG_RC_ERR_MAP_NOENT] = -ENOENT,
+               [CMSG_RC_ERR_MAP_ERR]   = -EINVAL,
+               [CMSG_RC_ERR_MAP_PARSE] = -EIO,
+               [CMSG_RC_ERR_MAP_EXIST] = -EEXIST,
+               [CMSG_RC_ERR_MAP_NOMEM] = -ENOMEM,
+               [CMSG_RC_ERR_MAP_E2BIG] = -E2BIG,
+       };
+       u32 rc;
+
+       rc = be32_to_cpu(reply->rc);
+       if (rc >= ARRAY_SIZE(res_table)) {
+               cmsg_warn(bpf, "FW responded with invalid status: %u\n", rc);
+               return -EIO;
+       }
+
+       return res_table[rc];
+}
+
+long long int
+nfp_bpf_ctrl_alloc_map(struct nfp_app_bpf *bpf, struct bpf_map *map)
+{
+       struct cmsg_reply_map_alloc_tbl *reply;
+       struct cmsg_req_map_alloc_tbl *req;
+       struct sk_buff *skb;
+       u32 tid;
+       int err;
+
+       skb = nfp_bpf_cmsg_alloc(bpf, sizeof(*req));
+       if (!skb)
+               return -ENOMEM;
+
+       req = (void *)skb->data;
+       req->key_size = cpu_to_be32(map->key_size);
+       req->value_size = cpu_to_be32(map->value_size);
+       req->max_entries = cpu_to_be32(map->max_entries);
+       req->map_type = cpu_to_be32(map->map_type);
+       req->map_flags = 0;
+
+       skb = nfp_bpf_cmsg_communicate(bpf, skb, CMSG_TYPE_MAP_ALLOC,
+                                      sizeof(*reply));
+       if (IS_ERR(skb))
+               return PTR_ERR(skb);
+
+       reply = (void *)skb->data;
+       err = nfp_bpf_ctrl_rc_to_errno(bpf, &reply->reply_hdr);
+       if (err)
+               goto err_free;
+
+       tid = be32_to_cpu(reply->tid);
+       dev_consume_skb_any(skb);
+
+       return tid;
+err_free:
+       dev_kfree_skb_any(skb);
+       return err;
+}
+
+void nfp_bpf_ctrl_free_map(struct nfp_app_bpf *bpf, struct nfp_bpf_map *nfp_map)
+{
+       struct cmsg_reply_map_free_tbl *reply;
+       struct cmsg_req_map_free_tbl *req;
+       struct sk_buff *skb;
+       int err;
+
+       skb = nfp_bpf_cmsg_alloc(bpf, sizeof(*req));
+       if (!skb) {
+               cmsg_warn(bpf, "leaking map - failed to allocate msg\n");
+               return;
+       }
+
+       req = (void *)skb->data;
+       req->tid = cpu_to_be32(nfp_map->tid);
+
+       skb = nfp_bpf_cmsg_communicate(bpf, skb, CMSG_TYPE_MAP_FREE,
+                                      sizeof(*reply));
+       if (IS_ERR(skb)) {
+               cmsg_warn(bpf, "leaking map - I/O error\n");
+               return;
+       }
+
+       reply = (void *)skb->data;
+       err = nfp_bpf_ctrl_rc_to_errno(bpf, &reply->reply_hdr);
+       if (err)
+               cmsg_warn(bpf, "leaking map - FW responded with: %d\n", err);
+
+       dev_consume_skb_any(skb);
+}
+
+static int
+nfp_bpf_ctrl_entry_op(struct bpf_offloaded_map *offmap,
+                     enum nfp_bpf_cmsg_type op,
+                     u8 *key, u8 *value, u64 flags, u8 *out_key, u8 *out_value)
+{
+       struct nfp_bpf_map *nfp_map = offmap->dev_priv;
+       struct nfp_app_bpf *bpf = nfp_map->bpf;
+       struct bpf_map *map = &offmap->map;
+       struct cmsg_reply_map_op *reply;
+       struct cmsg_req_map_op *req;
+       struct sk_buff *skb;
+       int err;
+
+       /* FW messages have no space for more than 32 bits of flags */
+       if (flags >> 32)
+               return -EOPNOTSUPP;
+
+       skb = nfp_bpf_cmsg_map_req_alloc(bpf, 1);
+       if (!skb)
+               return -ENOMEM;
+
+       req = (void *)skb->data;
+       req->tid = cpu_to_be32(nfp_map->tid);
+       req->count = cpu_to_be32(1);
+       req->flags = cpu_to_be32(flags);
+
+       /* Copy inputs */
+       if (key)
+               memcpy(&req->elem[0].key, key, map->key_size);
+       if (value)
+               memcpy(&req->elem[0].value, value, map->value_size);
+
+       skb = nfp_bpf_cmsg_communicate(bpf, skb, op,
+                                      sizeof(*reply) + sizeof(*reply->elem));
+       if (IS_ERR(skb))
+               return PTR_ERR(skb);
+
+       reply = (void *)skb->data;
+       err = nfp_bpf_ctrl_rc_to_errno(bpf, &reply->reply_hdr);
+       if (err)
+               goto err_free;
+
+       /* Copy outputs */
+       if (out_key)
+               memcpy(out_key, &reply->elem[0].key, map->key_size);
+       if (out_value)
+               memcpy(out_value, &reply->elem[0].value, map->value_size);
+
+       dev_consume_skb_any(skb);
+
+       return 0;
+err_free:
+       dev_kfree_skb_any(skb);
+       return err;
+}
+
+int nfp_bpf_ctrl_update_entry(struct bpf_offloaded_map *offmap,
+                             void *key, void *value, u64 flags)
+{
+       return nfp_bpf_ctrl_entry_op(offmap, CMSG_TYPE_MAP_UPDATE,
+                                    key, value, flags, NULL, NULL);
+}
+
+int nfp_bpf_ctrl_del_entry(struct bpf_offloaded_map *offmap, void *key)
+{
+       return nfp_bpf_ctrl_entry_op(offmap, CMSG_TYPE_MAP_DELETE,
+                                    key, NULL, 0, NULL, NULL);
+}
+
+int nfp_bpf_ctrl_lookup_entry(struct bpf_offloaded_map *offmap,
+                             void *key, void *value)
+{
+       return nfp_bpf_ctrl_entry_op(offmap, CMSG_TYPE_MAP_LOOKUP,
+                                    key, NULL, 0, NULL, value);
+}
+
+int nfp_bpf_ctrl_getfirst_entry(struct bpf_offloaded_map *offmap,
+                               void *next_key)
+{
+       return nfp_bpf_ctrl_entry_op(offmap, CMSG_TYPE_MAP_GETFIRST,
+                                    NULL, NULL, 0, next_key, NULL);
+}
+
+int nfp_bpf_ctrl_getnext_entry(struct bpf_offloaded_map *offmap,
+                              void *key, void *next_key)
+{
+       return nfp_bpf_ctrl_entry_op(offmap, CMSG_TYPE_MAP_GETNEXT,
+                                    key, NULL, 0, next_key, NULL);
+}
+
 void nfp_bpf_ctrl_msg_rx(struct nfp_app *app, struct sk_buff *skb)
 {
        struct nfp_app_bpf *bpf = app->priv;
index 107676b3476089234ea35de3fa644bcbf25d83fd..e0ff68fc9562e6ce0ee83cb680aa902c4263d747 100644 (file)
@@ -57,12 +57,33 @@ struct nfp_bpf_cap_tlv_adjust_head {
 #define CMSG_MAP_ABI_VERSION           1
 
 enum nfp_bpf_cmsg_type {
+       CMSG_TYPE_MAP_ALLOC     = 1,
+       CMSG_TYPE_MAP_FREE      = 2,
+       CMSG_TYPE_MAP_LOOKUP    = 3,
+       CMSG_TYPE_MAP_UPDATE    = 4,
+       CMSG_TYPE_MAP_DELETE    = 5,
+       CMSG_TYPE_MAP_GETNEXT   = 6,
+       CMSG_TYPE_MAP_GETFIRST  = 7,
        __CMSG_TYPE_MAP_MAX,
 };
 
 #define CMSG_TYPE_MAP_REPLY_BIT                7
 #define __CMSG_REPLY(req)              (BIT(CMSG_TYPE_MAP_REPLY_BIT) | (req))
 
+#define CMSG_MAP_KEY_LW                        16
+#define CMSG_MAP_VALUE_LW              16
+
+enum nfp_bpf_cmsg_status {
+       CMSG_RC_SUCCESS                 = 0,
+       CMSG_RC_ERR_MAP_FD              = 1,
+       CMSG_RC_ERR_MAP_NOENT           = 2,
+       CMSG_RC_ERR_MAP_ERR             = 3,
+       CMSG_RC_ERR_MAP_PARSE           = 4,
+       CMSG_RC_ERR_MAP_EXIST           = 5,
+       CMSG_RC_ERR_MAP_NOMEM           = 6,
+       CMSG_RC_ERR_MAP_E2BIG           = 7,
+};
+
 struct cmsg_hdr {
        u8 type;
        u8 ver;
@@ -73,4 +94,48 @@ struct cmsg_reply_map_simple {
        struct cmsg_hdr hdr;
        __be32 rc;
 };
+
+struct cmsg_req_map_alloc_tbl {
+       struct cmsg_hdr hdr;
+       __be32 key_size;                /* in bytes */
+       __be32 value_size;              /* in bytes */
+       __be32 max_entries;
+       __be32 map_type;
+       __be32 map_flags;               /* reserved */
+};
+
+struct cmsg_reply_map_alloc_tbl {
+       struct cmsg_reply_map_simple reply_hdr;
+       __be32 tid;
+};
+
+struct cmsg_req_map_free_tbl {
+       struct cmsg_hdr hdr;
+       __be32 tid;
+};
+
+struct cmsg_reply_map_free_tbl {
+       struct cmsg_reply_map_simple reply_hdr;
+       __be32 count;
+};
+
+struct cmsg_key_value_pair {
+       __be32 key[CMSG_MAP_KEY_LW];
+       __be32 value[CMSG_MAP_VALUE_LW];
+};
+
+struct cmsg_req_map_op {
+       struct cmsg_hdr hdr;
+       __be32 tid;
+       __be32 count;
+       __be32 flags;
+       struct cmsg_key_value_pair elem[0];
+};
+
+struct cmsg_reply_map_op {
+       struct cmsg_reply_map_simple reply_hdr;
+       __be32 count;
+       __be32 resv;
+       struct cmsg_key_value_pair elem[0];
+};
 #endif
index e00a7de2a9c2f5c1d796b28c464b1f1a5af47b5b..047f253fc58107f58a71634e0f8636c7b0172568 100644 (file)
@@ -303,8 +303,19 @@ nfp_bpf_goto_meta(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
 
 void *nfp_bpf_relo_for_vnic(struct nfp_prog *nfp_prog, struct nfp_bpf_vnic *bv);
 
-struct sk_buff *
-nfp_bpf_cmsg_communicate(struct nfp_app_bpf *bpf, struct sk_buff *skb,
-                        enum nfp_bpf_cmsg_type type, unsigned int reply_size);
+long long int
+nfp_bpf_ctrl_alloc_map(struct nfp_app_bpf *bpf, struct bpf_map *map);
+void
+nfp_bpf_ctrl_free_map(struct nfp_app_bpf *bpf, struct nfp_bpf_map *nfp_map);
+int nfp_bpf_ctrl_getfirst_entry(struct bpf_offloaded_map *offmap,
+                               void *next_key);
+int nfp_bpf_ctrl_update_entry(struct bpf_offloaded_map *offmap,
+                             void *key, void *value, u64 flags);
+int nfp_bpf_ctrl_del_entry(struct bpf_offloaded_map *offmap, void *key);
+int nfp_bpf_ctrl_lookup_entry(struct bpf_offloaded_map *offmap,
+                             void *key, void *value);
+int nfp_bpf_ctrl_getnext_entry(struct bpf_offloaded_map *offmap,
+                              void *key, void *next_key);
+
 void nfp_bpf_ctrl_msg_rx(struct nfp_app *app, struct sk_buff *skb);
 #endif