Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp293507pxf; Wed, 17 Mar 2021 23:39:12 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxWhpThtA/iYcldC7D2s808aCnqvBwO218QpKYKqJZo/TqU+gKRtTdV8BQDdI8TwV2a+LIZ X-Received: by 2002:a17:906:c08f:: with SMTP id f15mr39498058ejz.318.1616049552539; Wed, 17 Mar 2021 23:39:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616049552; cv=none; d=google.com; s=arc-20160816; b=BR5l+x0pEERUMo+2lCZk3bbMrGqg6EnTM4n+NXIQf3TLM9ijIFjcxOehZWgRHlXAdm iLYfxzt9As9VR0Lnqp0glHnsXggCRFAteXt3R3gqtUSaYM7318nmQua2ZfhZz5Msb5Nw /eq7DQE3o0nvjAH+xnMAN3thbnkjNLGn3QJuytk6x3TgUW23/7inJkhp9VQsKp65ooUt DZRF3qOARmtkW+gh/flaLBKgOmk1MkJgaOpMClug4yqSClnpO39e4FUSNPf4rDK2jtOP OqPQGQjPM8TEo+QU1mAvQCv4TS1y/1cKRblp6PrcEuqD7vhsJR5fEXuW08iMjtmbVcdE ahQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=3miFIWM+GNc9DgdFmFbZZ14wfm11h2P9MpqQd15wdDQ=; b=lXWETXG9x9d4/FderzJP8BEhyOEI41SShR3VzEqYe+gCMtxosDG9YxByJCFSUOYYCy liYg/m+fyrqAooDKm2TI0Z4S4oCzY2kB5sb8xxYAPXnAuFC+baqjdxNJAX/33a/BjXku S+V0piNbgl5fEntvrvvp/yb+Hltp9n1X2ILq2olfpgK809/qX9XnjfyOHgH5q9WejRNy ykISDdPQ5exrCNPL2mDQJFJTaktVpDLopUL2BoggmRLSmJU+i3bxXh0Cc7mNWtGQkyHC 1hRmTEfGk4qDfJvfSdD8GlScLbBpgGpJuUTobdzL4nm/TvU/9l4YrlqTaaEt5NCLbzRe cMng== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n12si940367eje.173.2021.03.17.23.38.49; Wed, 17 Mar 2021 23:39:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229727AbhCRGhN (ORCPT + 99 others); Thu, 18 Mar 2021 02:37:13 -0400 Received: from foss.arm.com ([217.140.110.172]:60498 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229558AbhCRGgs (ORCPT ); Thu, 18 Mar 2021 02:36:48 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id E96C8ED1; Wed, 17 Mar 2021 23:36:46 -0700 (PDT) Received: from net-arm-thunderx2-02.shanghai.arm.com (net-arm-thunderx2-02.shanghai.arm.com [10.169.208.224]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 7BF6E3F718; Wed, 17 Mar 2021 23:36:41 -0700 (PDT) From: Jianlin Lv To: bpf@vger.kernel.org Cc: kuba@kernel.org, simon.horman@netronome.com, davem@davemloft.net, ast@kernel.org, alexei.starovoitov@gmail.com, daniel@iogearbox.net, andrii@kernel.org, kafai@fb.com, songliubraving@fb.com, yhs@fb.com, john.fastabend@gmail.com, kpsingh@kernel.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, oss-drivers@netronome.com, linux-api@vger.kernel.org, Jianlin.Lv@arm.com, iecedge@gmail.com Subject: [PATCH bpf-next v2] bpf: Simplify expression for identify bpf mem type Date: Thu, 18 Mar 2021 14:36:26 +0800 Message-Id: <20210318063626.216024-1-Jianlin.Lv@arm.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Added BPF_LD_ST_SIZE_MASK macro as mask of size modifier that help to reduce the evaluation of expressions in if statements, and remove BPF_SIZE_MASK in netronome driver. Signed-off-by: Jianlin Lv --- v2: Move the bpf_LD_ST_SIZE_MASK macro definition to include/linux/bpf.h --- drivers/net/ethernet/netronome/nfp/bpf/main.h | 8 +++----- include/linux/bpf.h | 1 + kernel/bpf/verifier.c | 12 ++++-------- 3 files changed, 8 insertions(+), 13 deletions(-) diff --git a/drivers/net/ethernet/netronome/nfp/bpf/main.h b/drivers/net/ethernet/netronome/nfp/bpf/main.h index d0e17eebddd9..e90981e69763 100644 --- a/drivers/net/ethernet/netronome/nfp/bpf/main.h +++ b/drivers/net/ethernet/netronome/nfp/bpf/main.h @@ -346,8 +346,6 @@ struct nfp_insn_meta { struct list_head l; }; -#define BPF_SIZE_MASK 0x18 - static inline u8 mbpf_class(const struct nfp_insn_meta *meta) { return BPF_CLASS(meta->insn.code); @@ -375,7 +373,7 @@ static inline bool is_mbpf_alu(const struct nfp_insn_meta *meta) static inline bool is_mbpf_load(const struct nfp_insn_meta *meta) { - return (meta->insn.code & ~BPF_SIZE_MASK) == (BPF_LDX | BPF_MEM); + return (meta->insn.code & ~BPF_LD_ST_SIZE_MASK) == (BPF_LDX | BPF_MEM); } static inline bool is_mbpf_jmp32(const struct nfp_insn_meta *meta) @@ -395,7 +393,7 @@ static inline bool is_mbpf_jmp(const struct nfp_insn_meta *meta) static inline bool is_mbpf_store(const struct nfp_insn_meta *meta) { - return (meta->insn.code & ~BPF_SIZE_MASK) == (BPF_STX | BPF_MEM); + return (meta->insn.code & ~BPF_LD_ST_SIZE_MASK) == (BPF_STX | BPF_MEM); } static inline bool is_mbpf_load_pkt(const struct nfp_insn_meta *meta) @@ -430,7 +428,7 @@ static inline bool is_mbpf_classic_store_pkt(const struct nfp_insn_meta *meta) static inline bool is_mbpf_atomic(const struct nfp_insn_meta *meta) { - return (meta->insn.code & ~BPF_SIZE_MASK) == (BPF_STX | BPF_ATOMIC); + return (meta->insn.code & ~BPF_LD_ST_SIZE_MASK) == (BPF_STX | BPF_ATOMIC); } static inline bool is_mbpf_mul(const struct nfp_insn_meta *meta) diff --git a/include/linux/bpf.h b/include/linux/bpf.h index a25730eaa148..e85924719c65 100644 --- a/include/linux/bpf.h +++ b/include/linux/bpf.h @@ -995,6 +995,7 @@ struct bpf_array { BPF_F_RDONLY_PROG | \ BPF_F_WRONLY | \ BPF_F_WRONLY_PROG) +#define BPF_LD_ST_SIZE_MASK 0x18 /* mask of size modifier */ #define BPF_MAP_CAN_READ BIT(0) #define BPF_MAP_CAN_WRITE BIT(1) diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c index f9096b049cd6..29fdfdb8abfa 100644 --- a/kernel/bpf/verifier.c +++ b/kernel/bpf/verifier.c @@ -11384,15 +11384,11 @@ static int convert_ctx_accesses(struct bpf_verifier_env *env) for (i = 0; i < insn_cnt; i++, insn++) { bpf_convert_ctx_access_t convert_ctx_access; - if (insn->code == (BPF_LDX | BPF_MEM | BPF_B) || - insn->code == (BPF_LDX | BPF_MEM | BPF_H) || - insn->code == (BPF_LDX | BPF_MEM | BPF_W) || - insn->code == (BPF_LDX | BPF_MEM | BPF_DW)) + /* opcode: BPF_MEM | | BPF_LDX */ + if ((insn->code & ~BPF_LD_ST_SIZE_MASK) == (BPF_LDX | BPF_MEM)) type = BPF_READ; - else if (insn->code == (BPF_STX | BPF_MEM | BPF_B) || - insn->code == (BPF_STX | BPF_MEM | BPF_H) || - insn->code == (BPF_STX | BPF_MEM | BPF_W) || - insn->code == (BPF_STX | BPF_MEM | BPF_DW)) + /* opcode: BPF_MEM | | BPF_STX */ + else if ((insn->code & ~BPF_LD_ST_SIZE_MASK) == (BPF_STX | BPF_MEM)) type = BPF_WRITE; else continue; -- 2.25.1