bpf_jit_comp64.c 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Just-In-Time compiler for eBPF bytecode on MIPS.
  4. * Implementation of JIT functions for 64-bit CPUs.
  5. *
  6. * Copyright (c) 2021 Anyfi Networks AB.
  7. * Author: Johan Almbladh <[email protected]>
  8. *
  9. * Based on code and ideas from
  10. * Copyright (c) 2017 Cavium, Inc.
  11. * Copyright (c) 2017 Shubham Bansal <[email protected]>
  12. * Copyright (c) 2011 Mircea Gherzan <[email protected]>
  13. */
  14. #include <linux/errno.h>
  15. #include <linux/filter.h>
  16. #include <linux/bpf.h>
  17. #include <asm/cpu-features.h>
  18. #include <asm/isa-rev.h>
  19. #include <asm/uasm.h>
  20. #include "bpf_jit_comp.h"
  21. /* MIPS t0-t3 are not available in the n64 ABI */
  22. #undef MIPS_R_T0
  23. #undef MIPS_R_T1
  24. #undef MIPS_R_T2
  25. #undef MIPS_R_T3
  26. /* Stack is 16-byte aligned in n64 ABI */
  27. #define MIPS_STACK_ALIGNMENT 16
  28. /* Extra 64-bit eBPF registers used by JIT */
  29. #define JIT_REG_TC (MAX_BPF_JIT_REG + 0)
  30. #define JIT_REG_ZX (MAX_BPF_JIT_REG + 1)
  31. /* Number of prologue bytes to skip when doing a tail call */
  32. #define JIT_TCALL_SKIP 4
  33. /* Callee-saved CPU registers that the JIT must preserve */
  34. #define JIT_CALLEE_REGS \
  35. (BIT(MIPS_R_S0) | \
  36. BIT(MIPS_R_S1) | \
  37. BIT(MIPS_R_S2) | \
  38. BIT(MIPS_R_S3) | \
  39. BIT(MIPS_R_S4) | \
  40. BIT(MIPS_R_S5) | \
  41. BIT(MIPS_R_S6) | \
  42. BIT(MIPS_R_S7) | \
  43. BIT(MIPS_R_GP) | \
  44. BIT(MIPS_R_FP) | \
  45. BIT(MIPS_R_RA))
  46. /* Caller-saved CPU registers available for JIT use */
  47. #define JIT_CALLER_REGS \
  48. (BIT(MIPS_R_A5) | \
  49. BIT(MIPS_R_A6) | \
  50. BIT(MIPS_R_A7))
  51. /*
  52. * Mapping of 64-bit eBPF registers to 64-bit native MIPS registers.
  53. * MIPS registers t4 - t7 may be used by the JIT as temporary registers.
  54. * MIPS registers t8 - t9 are reserved for single-register common functions.
  55. */
  56. static const u8 bpf2mips64[] = {
  57. /* Return value from in-kernel function, and exit value from eBPF */
  58. [BPF_REG_0] = MIPS_R_V0,
  59. /* Arguments from eBPF program to in-kernel function */
  60. [BPF_REG_1] = MIPS_R_A0,
  61. [BPF_REG_2] = MIPS_R_A1,
  62. [BPF_REG_3] = MIPS_R_A2,
  63. [BPF_REG_4] = MIPS_R_A3,
  64. [BPF_REG_5] = MIPS_R_A4,
  65. /* Callee-saved registers that in-kernel function will preserve */
  66. [BPF_REG_6] = MIPS_R_S0,
  67. [BPF_REG_7] = MIPS_R_S1,
  68. [BPF_REG_8] = MIPS_R_S2,
  69. [BPF_REG_9] = MIPS_R_S3,
  70. /* Read-only frame pointer to access the eBPF stack */
  71. [BPF_REG_FP] = MIPS_R_FP,
  72. /* Temporary register for blinding constants */
  73. [BPF_REG_AX] = MIPS_R_AT,
  74. /* Tail call count register, caller-saved */
  75. [JIT_REG_TC] = MIPS_R_A5,
  76. /* Constant for register zero-extension */
  77. [JIT_REG_ZX] = MIPS_R_V1,
  78. };
  79. /*
  80. * MIPS 32-bit operations on 64-bit registers generate a sign-extended
  81. * result. However, the eBPF ISA mandates zero-extension, so we rely on the
  82. * verifier to add that for us (emit_zext_ver). In addition, ALU arithmetic
  83. * operations, right shift and byte swap require properly sign-extended
  84. * operands or the result is unpredictable. We emit explicit sign-extensions
  85. * in those cases.
  86. */
  87. /* Sign extension */
  88. static void emit_sext(struct jit_context *ctx, u8 dst, u8 src)
  89. {
  90. emit(ctx, sll, dst, src, 0);
  91. clobber_reg(ctx, dst);
  92. }
  93. /* Zero extension */
  94. static void emit_zext(struct jit_context *ctx, u8 dst)
  95. {
  96. if (cpu_has_mips64r2 || cpu_has_mips64r6) {
  97. emit(ctx, dinsu, dst, MIPS_R_ZERO, 32, 32);
  98. } else {
  99. emit(ctx, and, dst, dst, bpf2mips64[JIT_REG_ZX]);
  100. access_reg(ctx, JIT_REG_ZX); /* We need the ZX register */
  101. }
  102. clobber_reg(ctx, dst);
  103. }
  104. /* Zero extension, if verifier does not do it for us */
  105. static void emit_zext_ver(struct jit_context *ctx, u8 dst)
  106. {
  107. if (!ctx->program->aux->verifier_zext)
  108. emit_zext(ctx, dst);
  109. }
  110. /* dst = imm (64-bit) */
  111. static void emit_mov_i64(struct jit_context *ctx, u8 dst, u64 imm64)
  112. {
  113. if (imm64 >= 0xffffffffffff8000ULL || imm64 < 0x8000ULL) {
  114. emit(ctx, daddiu, dst, MIPS_R_ZERO, (s16)imm64);
  115. } else if (imm64 >= 0xffffffff80000000ULL ||
  116. (imm64 < 0x80000000 && imm64 > 0xffff)) {
  117. emit(ctx, lui, dst, (s16)(imm64 >> 16));
  118. emit(ctx, ori, dst, dst, (u16)imm64 & 0xffff);
  119. } else {
  120. u8 acc = MIPS_R_ZERO;
  121. int shift = 0;
  122. int k;
  123. for (k = 0; k < 4; k++) {
  124. u16 half = imm64 >> (48 - 16 * k);
  125. if (acc == dst)
  126. shift += 16;
  127. if (half) {
  128. if (shift)
  129. emit(ctx, dsll_safe, dst, dst, shift);
  130. emit(ctx, ori, dst, acc, half);
  131. acc = dst;
  132. shift = 0;
  133. }
  134. }
  135. if (shift)
  136. emit(ctx, dsll_safe, dst, dst, shift);
  137. }
  138. clobber_reg(ctx, dst);
  139. }
  140. /* ALU immediate operation (64-bit) */
  141. static void emit_alu_i64(struct jit_context *ctx, u8 dst, s32 imm, u8 op)
  142. {
  143. switch (BPF_OP(op)) {
  144. /* dst = dst | imm */
  145. case BPF_OR:
  146. emit(ctx, ori, dst, dst, (u16)imm);
  147. break;
  148. /* dst = dst ^ imm */
  149. case BPF_XOR:
  150. emit(ctx, xori, dst, dst, (u16)imm);
  151. break;
  152. /* dst = -dst */
  153. case BPF_NEG:
  154. emit(ctx, dsubu, dst, MIPS_R_ZERO, dst);
  155. break;
  156. /* dst = dst << imm */
  157. case BPF_LSH:
  158. emit(ctx, dsll_safe, dst, dst, imm);
  159. break;
  160. /* dst = dst >> imm */
  161. case BPF_RSH:
  162. emit(ctx, dsrl_safe, dst, dst, imm);
  163. break;
  164. /* dst = dst >> imm (arithmetic) */
  165. case BPF_ARSH:
  166. emit(ctx, dsra_safe, dst, dst, imm);
  167. break;
  168. /* dst = dst + imm */
  169. case BPF_ADD:
  170. emit(ctx, daddiu, dst, dst, imm);
  171. break;
  172. /* dst = dst - imm */
  173. case BPF_SUB:
  174. emit(ctx, daddiu, dst, dst, -imm);
  175. break;
  176. default:
  177. /* Width-generic operations */
  178. emit_alu_i(ctx, dst, imm, op);
  179. }
  180. clobber_reg(ctx, dst);
  181. }
  182. /* ALU register operation (64-bit) */
  183. static void emit_alu_r64(struct jit_context *ctx, u8 dst, u8 src, u8 op)
  184. {
  185. switch (BPF_OP(op)) {
  186. /* dst = dst << src */
  187. case BPF_LSH:
  188. emit(ctx, dsllv, dst, dst, src);
  189. break;
  190. /* dst = dst >> src */
  191. case BPF_RSH:
  192. emit(ctx, dsrlv, dst, dst, src);
  193. break;
  194. /* dst = dst >> src (arithmetic) */
  195. case BPF_ARSH:
  196. emit(ctx, dsrav, dst, dst, src);
  197. break;
  198. /* dst = dst + src */
  199. case BPF_ADD:
  200. emit(ctx, daddu, dst, dst, src);
  201. break;
  202. /* dst = dst - src */
  203. case BPF_SUB:
  204. emit(ctx, dsubu, dst, dst, src);
  205. break;
  206. /* dst = dst * src */
  207. case BPF_MUL:
  208. if (cpu_has_mips64r6) {
  209. emit(ctx, dmulu, dst, dst, src);
  210. } else {
  211. emit(ctx, dmultu, dst, src);
  212. emit(ctx, mflo, dst);
  213. }
  214. break;
  215. /* dst = dst / src */
  216. case BPF_DIV:
  217. if (cpu_has_mips64r6) {
  218. emit(ctx, ddivu_r6, dst, dst, src);
  219. } else {
  220. emit(ctx, ddivu, dst, src);
  221. emit(ctx, mflo, dst);
  222. }
  223. break;
  224. /* dst = dst % src */
  225. case BPF_MOD:
  226. if (cpu_has_mips64r6) {
  227. emit(ctx, dmodu, dst, dst, src);
  228. } else {
  229. emit(ctx, ddivu, dst, src);
  230. emit(ctx, mfhi, dst);
  231. }
  232. break;
  233. default:
  234. /* Width-generic operations */
  235. emit_alu_r(ctx, dst, src, op);
  236. }
  237. clobber_reg(ctx, dst);
  238. }
  239. /* Swap sub words in a register double word */
  240. static void emit_swap_r64(struct jit_context *ctx, u8 dst, u8 mask, u32 bits)
  241. {
  242. u8 tmp = MIPS_R_T9;
  243. emit(ctx, and, tmp, dst, mask); /* tmp = dst & mask */
  244. emit(ctx, dsll, tmp, tmp, bits); /* tmp = tmp << bits */
  245. emit(ctx, dsrl, dst, dst, bits); /* dst = dst >> bits */
  246. emit(ctx, and, dst, dst, mask); /* dst = dst & mask */
  247. emit(ctx, or, dst, dst, tmp); /* dst = dst | tmp */
  248. }
  249. /* Swap bytes and truncate a register double word, word or half word */
  250. static void emit_bswap_r64(struct jit_context *ctx, u8 dst, u32 width)
  251. {
  252. switch (width) {
  253. /* Swap bytes in a double word */
  254. case 64:
  255. if (cpu_has_mips64r2 || cpu_has_mips64r6) {
  256. emit(ctx, dsbh, dst, dst);
  257. emit(ctx, dshd, dst, dst);
  258. } else {
  259. u8 t1 = MIPS_R_T6;
  260. u8 t2 = MIPS_R_T7;
  261. emit(ctx, dsll32, t2, dst, 0); /* t2 = dst << 32 */
  262. emit(ctx, dsrl32, dst, dst, 0); /* dst = dst >> 32 */
  263. emit(ctx, or, dst, dst, t2); /* dst = dst | t2 */
  264. emit(ctx, ori, t2, MIPS_R_ZERO, 0xffff);
  265. emit(ctx, dsll32, t1, t2, 0); /* t1 = t2 << 32 */
  266. emit(ctx, or, t1, t1, t2); /* t1 = t1 | t2 */
  267. emit_swap_r64(ctx, dst, t1, 16);/* dst = swap16(dst) */
  268. emit(ctx, lui, t2, 0xff); /* t2 = 0x00ff0000 */
  269. emit(ctx, ori, t2, t2, 0xff); /* t2 = t2 | 0x00ff */
  270. emit(ctx, dsll32, t1, t2, 0); /* t1 = t2 << 32 */
  271. emit(ctx, or, t1, t1, t2); /* t1 = t1 | t2 */
  272. emit_swap_r64(ctx, dst, t1, 8); /* dst = swap8(dst) */
  273. }
  274. break;
  275. /* Swap bytes in a half word */
  276. /* Swap bytes in a word */
  277. case 32:
  278. case 16:
  279. emit_sext(ctx, dst, dst);
  280. emit_bswap_r(ctx, dst, width);
  281. if (cpu_has_mips64r2 || cpu_has_mips64r6)
  282. emit_zext(ctx, dst);
  283. break;
  284. }
  285. clobber_reg(ctx, dst);
  286. }
  287. /* Truncate a register double word, word or half word */
  288. static void emit_trunc_r64(struct jit_context *ctx, u8 dst, u32 width)
  289. {
  290. switch (width) {
  291. case 64:
  292. break;
  293. /* Zero-extend a word */
  294. case 32:
  295. emit_zext(ctx, dst);
  296. break;
  297. /* Zero-extend a half word */
  298. case 16:
  299. emit(ctx, andi, dst, dst, 0xffff);
  300. break;
  301. }
  302. clobber_reg(ctx, dst);
  303. }
  304. /* Load operation: dst = *(size*)(src + off) */
  305. static void emit_ldx(struct jit_context *ctx, u8 dst, u8 src, s16 off, u8 size)
  306. {
  307. switch (size) {
  308. /* Load a byte */
  309. case BPF_B:
  310. emit(ctx, lbu, dst, off, src);
  311. break;
  312. /* Load a half word */
  313. case BPF_H:
  314. emit(ctx, lhu, dst, off, src);
  315. break;
  316. /* Load a word */
  317. case BPF_W:
  318. emit(ctx, lwu, dst, off, src);
  319. break;
  320. /* Load a double word */
  321. case BPF_DW:
  322. emit(ctx, ld, dst, off, src);
  323. break;
  324. }
  325. clobber_reg(ctx, dst);
  326. }
  327. /* Store operation: *(size *)(dst + off) = src */
  328. static void emit_stx(struct jit_context *ctx, u8 dst, u8 src, s16 off, u8 size)
  329. {
  330. switch (size) {
  331. /* Store a byte */
  332. case BPF_B:
  333. emit(ctx, sb, src, off, dst);
  334. break;
  335. /* Store a half word */
  336. case BPF_H:
  337. emit(ctx, sh, src, off, dst);
  338. break;
  339. /* Store a word */
  340. case BPF_W:
  341. emit(ctx, sw, src, off, dst);
  342. break;
  343. /* Store a double word */
  344. case BPF_DW:
  345. emit(ctx, sd, src, off, dst);
  346. break;
  347. }
  348. }
  349. /* Atomic read-modify-write */
  350. static void emit_atomic_r64(struct jit_context *ctx,
  351. u8 dst, u8 src, s16 off, u8 code)
  352. {
  353. u8 t1 = MIPS_R_T6;
  354. u8 t2 = MIPS_R_T7;
  355. LLSC_sync(ctx);
  356. emit(ctx, lld, t1, off, dst);
  357. switch (code) {
  358. case BPF_ADD:
  359. case BPF_ADD | BPF_FETCH:
  360. emit(ctx, daddu, t2, t1, src);
  361. break;
  362. case BPF_AND:
  363. case BPF_AND | BPF_FETCH:
  364. emit(ctx, and, t2, t1, src);
  365. break;
  366. case BPF_OR:
  367. case BPF_OR | BPF_FETCH:
  368. emit(ctx, or, t2, t1, src);
  369. break;
  370. case BPF_XOR:
  371. case BPF_XOR | BPF_FETCH:
  372. emit(ctx, xor, t2, t1, src);
  373. break;
  374. case BPF_XCHG:
  375. emit(ctx, move, t2, src);
  376. break;
  377. }
  378. emit(ctx, scd, t2, off, dst);
  379. emit(ctx, LLSC_beqz, t2, -16 - LLSC_offset);
  380. emit(ctx, nop); /* Delay slot */
  381. if (code & BPF_FETCH) {
  382. emit(ctx, move, src, t1);
  383. clobber_reg(ctx, src);
  384. }
  385. }
  386. /* Atomic compare-and-exchange */
  387. static void emit_cmpxchg_r64(struct jit_context *ctx, u8 dst, u8 src, s16 off)
  388. {
  389. u8 r0 = bpf2mips64[BPF_REG_0];
  390. u8 t1 = MIPS_R_T6;
  391. u8 t2 = MIPS_R_T7;
  392. LLSC_sync(ctx);
  393. emit(ctx, lld, t1, off, dst);
  394. emit(ctx, bne, t1, r0, 12);
  395. emit(ctx, move, t2, src); /* Delay slot */
  396. emit(ctx, scd, t2, off, dst);
  397. emit(ctx, LLSC_beqz, t2, -20 - LLSC_offset);
  398. emit(ctx, move, r0, t1); /* Delay slot */
  399. clobber_reg(ctx, r0);
  400. }
  401. /* Function call */
  402. static int emit_call(struct jit_context *ctx, const struct bpf_insn *insn)
  403. {
  404. u8 zx = bpf2mips64[JIT_REG_ZX];
  405. u8 tmp = MIPS_R_T6;
  406. bool fixed;
  407. u64 addr;
  408. /* Decode the call address */
  409. if (bpf_jit_get_func_addr(ctx->program, insn, false,
  410. &addr, &fixed) < 0)
  411. return -1;
  412. if (!fixed)
  413. return -1;
  414. /* Push caller-saved registers on stack */
  415. push_regs(ctx, ctx->clobbered & JIT_CALLER_REGS, 0, 0);
  416. /* Emit function call */
  417. emit_mov_i64(ctx, tmp, addr & JALR_MASK);
  418. emit(ctx, jalr, MIPS_R_RA, tmp);
  419. emit(ctx, nop); /* Delay slot */
  420. /* Restore caller-saved registers */
  421. pop_regs(ctx, ctx->clobbered & JIT_CALLER_REGS, 0, 0);
  422. /* Re-initialize the JIT zero-extension register if accessed */
  423. if (ctx->accessed & BIT(JIT_REG_ZX)) {
  424. emit(ctx, daddiu, zx, MIPS_R_ZERO, -1);
  425. emit(ctx, dsrl32, zx, zx, 0);
  426. }
  427. clobber_reg(ctx, MIPS_R_RA);
  428. clobber_reg(ctx, MIPS_R_V0);
  429. clobber_reg(ctx, MIPS_R_V1);
  430. return 0;
  431. }
  432. /* Function tail call */
  433. static int emit_tail_call(struct jit_context *ctx)
  434. {
  435. u8 ary = bpf2mips64[BPF_REG_2];
  436. u8 ind = bpf2mips64[BPF_REG_3];
  437. u8 tcc = bpf2mips64[JIT_REG_TC];
  438. u8 tmp = MIPS_R_T6;
  439. int off;
  440. /*
  441. * Tail call:
  442. * eBPF R1 - function argument (context ptr), passed in a0-a1
  443. * eBPF R2 - ptr to object with array of function entry points
  444. * eBPF R3 - array index of function to be called
  445. */
  446. /* if (ind >= ary->map.max_entries) goto out */
  447. off = offsetof(struct bpf_array, map.max_entries);
  448. if (off > 0x7fff)
  449. return -1;
  450. emit(ctx, lwu, tmp, off, ary); /* tmp = ary->map.max_entrs*/
  451. emit(ctx, sltu, tmp, ind, tmp); /* tmp = ind < t1 */
  452. emit(ctx, beqz, tmp, get_offset(ctx, 1)); /* PC += off(1) if tmp == 0*/
  453. /* if (--TCC < 0) goto out */
  454. emit(ctx, daddiu, tcc, tcc, -1); /* tcc-- (delay slot) */
  455. emit(ctx, bltz, tcc, get_offset(ctx, 1)); /* PC += off(1) if tcc < 0 */
  456. /* (next insn delay slot) */
  457. /* prog = ary->ptrs[ind] */
  458. off = offsetof(struct bpf_array, ptrs);
  459. if (off > 0x7fff)
  460. return -1;
  461. emit(ctx, dsll, tmp, ind, 3); /* tmp = ind << 3 */
  462. emit(ctx, daddu, tmp, tmp, ary); /* tmp += ary */
  463. emit(ctx, ld, tmp, off, tmp); /* tmp = *(tmp + off) */
  464. /* if (prog == 0) goto out */
  465. emit(ctx, beqz, tmp, get_offset(ctx, 1)); /* PC += off(1) if tmp == 0*/
  466. emit(ctx, nop); /* Delay slot */
  467. /* func = prog->bpf_func + 8 (prologue skip offset) */
  468. off = offsetof(struct bpf_prog, bpf_func);
  469. if (off > 0x7fff)
  470. return -1;
  471. emit(ctx, ld, tmp, off, tmp); /* tmp = *(tmp + off) */
  472. emit(ctx, daddiu, tmp, tmp, JIT_TCALL_SKIP); /* tmp += skip (4) */
  473. /* goto func */
  474. build_epilogue(ctx, tmp);
  475. access_reg(ctx, JIT_REG_TC);
  476. return 0;
  477. }
  478. /*
  479. * Stack frame layout for a JITed program (stack grows down).
  480. *
  481. * Higher address : Previous stack frame :
  482. * +===========================+ <--- MIPS sp before call
  483. * | Callee-saved registers, |
  484. * | including RA and FP |
  485. * +---------------------------+ <--- eBPF FP (MIPS fp)
  486. * | Local eBPF variables |
  487. * | allocated by program |
  488. * +---------------------------+
  489. * | Reserved for caller-saved |
  490. * | registers |
  491. * Lower address +===========================+ <--- MIPS sp
  492. */
  493. /* Build program prologue to set up the stack and registers */
  494. void build_prologue(struct jit_context *ctx)
  495. {
  496. u8 fp = bpf2mips64[BPF_REG_FP];
  497. u8 tc = bpf2mips64[JIT_REG_TC];
  498. u8 zx = bpf2mips64[JIT_REG_ZX];
  499. int stack, saved, locals, reserved;
  500. /*
  501. * In the unlikely event that the TCC limit is raised to more
  502. * than 16 bits, it is clamped to the maximum value allowed for
  503. * the generated code (0xffff). It is better fail to compile
  504. * instead of degrading gracefully.
  505. */
  506. BUILD_BUG_ON(MAX_TAIL_CALL_CNT > 0xffff);
  507. /*
  508. * The first instruction initializes the tail call count register.
  509. * On a tail call, the calling function jumps into the prologue
  510. * after this instruction.
  511. */
  512. emit(ctx, ori, tc, MIPS_R_ZERO, MAX_TAIL_CALL_CNT);
  513. /* === Entry-point for tail calls === */
  514. /*
  515. * If the eBPF frame pointer and tail call count registers were
  516. * accessed they must be preserved. Mark them as clobbered here
  517. * to save and restore them on the stack as needed.
  518. */
  519. if (ctx->accessed & BIT(BPF_REG_FP))
  520. clobber_reg(ctx, fp);
  521. if (ctx->accessed & BIT(JIT_REG_TC))
  522. clobber_reg(ctx, tc);
  523. if (ctx->accessed & BIT(JIT_REG_ZX))
  524. clobber_reg(ctx, zx);
  525. /* Compute the stack space needed for callee-saved registers */
  526. saved = hweight32(ctx->clobbered & JIT_CALLEE_REGS) * sizeof(u64);
  527. saved = ALIGN(saved, MIPS_STACK_ALIGNMENT);
  528. /* Stack space used by eBPF program local data */
  529. locals = ALIGN(ctx->program->aux->stack_depth, MIPS_STACK_ALIGNMENT);
  530. /*
  531. * If we are emitting function calls, reserve extra stack space for
  532. * caller-saved registers needed by the JIT. The required space is
  533. * computed automatically during resource usage discovery (pass 1).
  534. */
  535. reserved = ctx->stack_used;
  536. /* Allocate the stack frame */
  537. stack = ALIGN(saved + locals + reserved, MIPS_STACK_ALIGNMENT);
  538. if (stack)
  539. emit(ctx, daddiu, MIPS_R_SP, MIPS_R_SP, -stack);
  540. /* Store callee-saved registers on stack */
  541. push_regs(ctx, ctx->clobbered & JIT_CALLEE_REGS, 0, stack - saved);
  542. /* Initialize the eBPF frame pointer if accessed */
  543. if (ctx->accessed & BIT(BPF_REG_FP))
  544. emit(ctx, daddiu, fp, MIPS_R_SP, stack - saved);
  545. /* Initialize the ePF JIT zero-extension register if accessed */
  546. if (ctx->accessed & BIT(JIT_REG_ZX)) {
  547. emit(ctx, daddiu, zx, MIPS_R_ZERO, -1);
  548. emit(ctx, dsrl32, zx, zx, 0);
  549. }
  550. ctx->saved_size = saved;
  551. ctx->stack_size = stack;
  552. }
  553. /* Build the program epilogue to restore the stack and registers */
  554. void build_epilogue(struct jit_context *ctx, int dest_reg)
  555. {
  556. /* Restore callee-saved registers from stack */
  557. pop_regs(ctx, ctx->clobbered & JIT_CALLEE_REGS, 0,
  558. ctx->stack_size - ctx->saved_size);
  559. /* Release the stack frame */
  560. if (ctx->stack_size)
  561. emit(ctx, daddiu, MIPS_R_SP, MIPS_R_SP, ctx->stack_size);
  562. /* Jump to return address and sign-extend the 32-bit return value */
  563. emit(ctx, jr, dest_reg);
  564. emit(ctx, sll, MIPS_R_V0, MIPS_R_V0, 0); /* Delay slot */
  565. }
  566. /* Build one eBPF instruction */
  567. int build_insn(const struct bpf_insn *insn, struct jit_context *ctx)
  568. {
  569. u8 dst = bpf2mips64[insn->dst_reg];
  570. u8 src = bpf2mips64[insn->src_reg];
  571. u8 res = bpf2mips64[BPF_REG_0];
  572. u8 code = insn->code;
  573. s16 off = insn->off;
  574. s32 imm = insn->imm;
  575. s32 val, rel;
  576. u8 alu, jmp;
  577. switch (code) {
  578. /* ALU operations */
  579. /* dst = imm */
  580. case BPF_ALU | BPF_MOV | BPF_K:
  581. emit_mov_i(ctx, dst, imm);
  582. emit_zext_ver(ctx, dst);
  583. break;
  584. /* dst = src */
  585. case BPF_ALU | BPF_MOV | BPF_X:
  586. if (imm == 1) {
  587. /* Special mov32 for zext */
  588. emit_zext(ctx, dst);
  589. } else {
  590. emit_mov_r(ctx, dst, src);
  591. emit_zext_ver(ctx, dst);
  592. }
  593. break;
  594. /* dst = -dst */
  595. case BPF_ALU | BPF_NEG:
  596. emit_sext(ctx, dst, dst);
  597. emit_alu_i(ctx, dst, 0, BPF_NEG);
  598. emit_zext_ver(ctx, dst);
  599. break;
  600. /* dst = dst & imm */
  601. /* dst = dst | imm */
  602. /* dst = dst ^ imm */
  603. /* dst = dst << imm */
  604. case BPF_ALU | BPF_OR | BPF_K:
  605. case BPF_ALU | BPF_AND | BPF_K:
  606. case BPF_ALU | BPF_XOR | BPF_K:
  607. case BPF_ALU | BPF_LSH | BPF_K:
  608. if (!valid_alu_i(BPF_OP(code), imm)) {
  609. emit_mov_i(ctx, MIPS_R_T4, imm);
  610. emit_alu_r(ctx, dst, MIPS_R_T4, BPF_OP(code));
  611. } else if (rewrite_alu_i(BPF_OP(code), imm, &alu, &val)) {
  612. emit_alu_i(ctx, dst, val, alu);
  613. }
  614. emit_zext_ver(ctx, dst);
  615. break;
  616. /* dst = dst >> imm */
  617. /* dst = dst >> imm (arithmetic) */
  618. /* dst = dst + imm */
  619. /* dst = dst - imm */
  620. /* dst = dst * imm */
  621. /* dst = dst / imm */
  622. /* dst = dst % imm */
  623. case BPF_ALU | BPF_RSH | BPF_K:
  624. case BPF_ALU | BPF_ARSH | BPF_K:
  625. case BPF_ALU | BPF_ADD | BPF_K:
  626. case BPF_ALU | BPF_SUB | BPF_K:
  627. case BPF_ALU | BPF_MUL | BPF_K:
  628. case BPF_ALU | BPF_DIV | BPF_K:
  629. case BPF_ALU | BPF_MOD | BPF_K:
  630. if (!valid_alu_i(BPF_OP(code), imm)) {
  631. emit_sext(ctx, dst, dst);
  632. emit_mov_i(ctx, MIPS_R_T4, imm);
  633. emit_alu_r(ctx, dst, MIPS_R_T4, BPF_OP(code));
  634. } else if (rewrite_alu_i(BPF_OP(code), imm, &alu, &val)) {
  635. emit_sext(ctx, dst, dst);
  636. emit_alu_i(ctx, dst, val, alu);
  637. }
  638. emit_zext_ver(ctx, dst);
  639. break;
  640. /* dst = dst & src */
  641. /* dst = dst | src */
  642. /* dst = dst ^ src */
  643. /* dst = dst << src */
  644. case BPF_ALU | BPF_AND | BPF_X:
  645. case BPF_ALU | BPF_OR | BPF_X:
  646. case BPF_ALU | BPF_XOR | BPF_X:
  647. case BPF_ALU | BPF_LSH | BPF_X:
  648. emit_alu_r(ctx, dst, src, BPF_OP(code));
  649. emit_zext_ver(ctx, dst);
  650. break;
  651. /* dst = dst >> src */
  652. /* dst = dst >> src (arithmetic) */
  653. /* dst = dst + src */
  654. /* dst = dst - src */
  655. /* dst = dst * src */
  656. /* dst = dst / src */
  657. /* dst = dst % src */
  658. case BPF_ALU | BPF_RSH | BPF_X:
  659. case BPF_ALU | BPF_ARSH | BPF_X:
  660. case BPF_ALU | BPF_ADD | BPF_X:
  661. case BPF_ALU | BPF_SUB | BPF_X:
  662. case BPF_ALU | BPF_MUL | BPF_X:
  663. case BPF_ALU | BPF_DIV | BPF_X:
  664. case BPF_ALU | BPF_MOD | BPF_X:
  665. emit_sext(ctx, dst, dst);
  666. emit_sext(ctx, MIPS_R_T4, src);
  667. emit_alu_r(ctx, dst, MIPS_R_T4, BPF_OP(code));
  668. emit_zext_ver(ctx, dst);
  669. break;
  670. /* dst = imm (64-bit) */
  671. case BPF_ALU64 | BPF_MOV | BPF_K:
  672. emit_mov_i(ctx, dst, imm);
  673. break;
  674. /* dst = src (64-bit) */
  675. case BPF_ALU64 | BPF_MOV | BPF_X:
  676. emit_mov_r(ctx, dst, src);
  677. break;
  678. /* dst = -dst (64-bit) */
  679. case BPF_ALU64 | BPF_NEG:
  680. emit_alu_i64(ctx, dst, 0, BPF_NEG);
  681. break;
  682. /* dst = dst & imm (64-bit) */
  683. /* dst = dst | imm (64-bit) */
  684. /* dst = dst ^ imm (64-bit) */
  685. /* dst = dst << imm (64-bit) */
  686. /* dst = dst >> imm (64-bit) */
  687. /* dst = dst >> imm ((64-bit, arithmetic) */
  688. /* dst = dst + imm (64-bit) */
  689. /* dst = dst - imm (64-bit) */
  690. /* dst = dst * imm (64-bit) */
  691. /* dst = dst / imm (64-bit) */
  692. /* dst = dst % imm (64-bit) */
  693. case BPF_ALU64 | BPF_AND | BPF_K:
  694. case BPF_ALU64 | BPF_OR | BPF_K:
  695. case BPF_ALU64 | BPF_XOR | BPF_K:
  696. case BPF_ALU64 | BPF_LSH | BPF_K:
  697. case BPF_ALU64 | BPF_RSH | BPF_K:
  698. case BPF_ALU64 | BPF_ARSH | BPF_K:
  699. case BPF_ALU64 | BPF_ADD | BPF_K:
  700. case BPF_ALU64 | BPF_SUB | BPF_K:
  701. case BPF_ALU64 | BPF_MUL | BPF_K:
  702. case BPF_ALU64 | BPF_DIV | BPF_K:
  703. case BPF_ALU64 | BPF_MOD | BPF_K:
  704. if (!valid_alu_i(BPF_OP(code), imm)) {
  705. emit_mov_i(ctx, MIPS_R_T4, imm);
  706. emit_alu_r64(ctx, dst, MIPS_R_T4, BPF_OP(code));
  707. } else if (rewrite_alu_i(BPF_OP(code), imm, &alu, &val)) {
  708. emit_alu_i64(ctx, dst, val, alu);
  709. }
  710. break;
  711. /* dst = dst & src (64-bit) */
  712. /* dst = dst | src (64-bit) */
  713. /* dst = dst ^ src (64-bit) */
  714. /* dst = dst << src (64-bit) */
  715. /* dst = dst >> src (64-bit) */
  716. /* dst = dst >> src (64-bit, arithmetic) */
  717. /* dst = dst + src (64-bit) */
  718. /* dst = dst - src (64-bit) */
  719. /* dst = dst * src (64-bit) */
  720. /* dst = dst / src (64-bit) */
  721. /* dst = dst % src (64-bit) */
  722. case BPF_ALU64 | BPF_AND | BPF_X:
  723. case BPF_ALU64 | BPF_OR | BPF_X:
  724. case BPF_ALU64 | BPF_XOR | BPF_X:
  725. case BPF_ALU64 | BPF_LSH | BPF_X:
  726. case BPF_ALU64 | BPF_RSH | BPF_X:
  727. case BPF_ALU64 | BPF_ARSH | BPF_X:
  728. case BPF_ALU64 | BPF_ADD | BPF_X:
  729. case BPF_ALU64 | BPF_SUB | BPF_X:
  730. case BPF_ALU64 | BPF_MUL | BPF_X:
  731. case BPF_ALU64 | BPF_DIV | BPF_X:
  732. case BPF_ALU64 | BPF_MOD | BPF_X:
  733. emit_alu_r64(ctx, dst, src, BPF_OP(code));
  734. break;
  735. /* dst = htole(dst) */
  736. /* dst = htobe(dst) */
  737. case BPF_ALU | BPF_END | BPF_FROM_LE:
  738. case BPF_ALU | BPF_END | BPF_FROM_BE:
  739. if (BPF_SRC(code) ==
  740. #ifdef __BIG_ENDIAN
  741. BPF_FROM_LE
  742. #else
  743. BPF_FROM_BE
  744. #endif
  745. )
  746. emit_bswap_r64(ctx, dst, imm);
  747. else
  748. emit_trunc_r64(ctx, dst, imm);
  749. break;
  750. /* dst = imm64 */
  751. case BPF_LD | BPF_IMM | BPF_DW:
  752. emit_mov_i64(ctx, dst, (u32)imm | ((u64)insn[1].imm << 32));
  753. return 1;
  754. /* LDX: dst = *(size *)(src + off) */
  755. case BPF_LDX | BPF_MEM | BPF_W:
  756. case BPF_LDX | BPF_MEM | BPF_H:
  757. case BPF_LDX | BPF_MEM | BPF_B:
  758. case BPF_LDX | BPF_MEM | BPF_DW:
  759. emit_ldx(ctx, dst, src, off, BPF_SIZE(code));
  760. break;
  761. /* ST: *(size *)(dst + off) = imm */
  762. case BPF_ST | BPF_MEM | BPF_W:
  763. case BPF_ST | BPF_MEM | BPF_H:
  764. case BPF_ST | BPF_MEM | BPF_B:
  765. case BPF_ST | BPF_MEM | BPF_DW:
  766. emit_mov_i(ctx, MIPS_R_T4, imm);
  767. emit_stx(ctx, dst, MIPS_R_T4, off, BPF_SIZE(code));
  768. break;
  769. /* STX: *(size *)(dst + off) = src */
  770. case BPF_STX | BPF_MEM | BPF_W:
  771. case BPF_STX | BPF_MEM | BPF_H:
  772. case BPF_STX | BPF_MEM | BPF_B:
  773. case BPF_STX | BPF_MEM | BPF_DW:
  774. emit_stx(ctx, dst, src, off, BPF_SIZE(code));
  775. break;
  776. /* Speculation barrier */
  777. case BPF_ST | BPF_NOSPEC:
  778. break;
  779. /* Atomics */
  780. case BPF_STX | BPF_ATOMIC | BPF_W:
  781. case BPF_STX | BPF_ATOMIC | BPF_DW:
  782. switch (imm) {
  783. case BPF_ADD:
  784. case BPF_ADD | BPF_FETCH:
  785. case BPF_AND:
  786. case BPF_AND | BPF_FETCH:
  787. case BPF_OR:
  788. case BPF_OR | BPF_FETCH:
  789. case BPF_XOR:
  790. case BPF_XOR | BPF_FETCH:
  791. case BPF_XCHG:
  792. if (BPF_SIZE(code) == BPF_DW) {
  793. emit_atomic_r64(ctx, dst, src, off, imm);
  794. } else if (imm & BPF_FETCH) {
  795. u8 tmp = dst;
  796. if (src == dst) { /* Don't overwrite dst */
  797. emit_mov_r(ctx, MIPS_R_T4, dst);
  798. tmp = MIPS_R_T4;
  799. }
  800. emit_sext(ctx, src, src);
  801. emit_atomic_r(ctx, tmp, src, off, imm);
  802. emit_zext_ver(ctx, src);
  803. } else { /* 32-bit, no fetch */
  804. emit_sext(ctx, MIPS_R_T4, src);
  805. emit_atomic_r(ctx, dst, MIPS_R_T4, off, imm);
  806. }
  807. break;
  808. case BPF_CMPXCHG:
  809. if (BPF_SIZE(code) == BPF_DW) {
  810. emit_cmpxchg_r64(ctx, dst, src, off);
  811. } else {
  812. u8 tmp = res;
  813. if (res == dst) /* Don't overwrite dst */
  814. tmp = MIPS_R_T4;
  815. emit_sext(ctx, tmp, res);
  816. emit_sext(ctx, MIPS_R_T5, src);
  817. emit_cmpxchg_r(ctx, dst, MIPS_R_T5, tmp, off);
  818. if (res == dst) /* Restore result */
  819. emit_mov_r(ctx, res, MIPS_R_T4);
  820. /* Result zext inserted by verifier */
  821. }
  822. break;
  823. default:
  824. goto notyet;
  825. }
  826. break;
  827. /* PC += off if dst == src */
  828. /* PC += off if dst != src */
  829. /* PC += off if dst & src */
  830. /* PC += off if dst > src */
  831. /* PC += off if dst >= src */
  832. /* PC += off if dst < src */
  833. /* PC += off if dst <= src */
  834. /* PC += off if dst > src (signed) */
  835. /* PC += off if dst >= src (signed) */
  836. /* PC += off if dst < src (signed) */
  837. /* PC += off if dst <= src (signed) */
  838. case BPF_JMP32 | BPF_JEQ | BPF_X:
  839. case BPF_JMP32 | BPF_JNE | BPF_X:
  840. case BPF_JMP32 | BPF_JSET | BPF_X:
  841. case BPF_JMP32 | BPF_JGT | BPF_X:
  842. case BPF_JMP32 | BPF_JGE | BPF_X:
  843. case BPF_JMP32 | BPF_JLT | BPF_X:
  844. case BPF_JMP32 | BPF_JLE | BPF_X:
  845. case BPF_JMP32 | BPF_JSGT | BPF_X:
  846. case BPF_JMP32 | BPF_JSGE | BPF_X:
  847. case BPF_JMP32 | BPF_JSLT | BPF_X:
  848. case BPF_JMP32 | BPF_JSLE | BPF_X:
  849. if (off == 0)
  850. break;
  851. setup_jmp_r(ctx, dst == src, BPF_OP(code), off, &jmp, &rel);
  852. emit_sext(ctx, MIPS_R_T4, dst); /* Sign-extended dst */
  853. emit_sext(ctx, MIPS_R_T5, src); /* Sign-extended src */
  854. emit_jmp_r(ctx, MIPS_R_T4, MIPS_R_T5, rel, jmp);
  855. if (finish_jmp(ctx, jmp, off) < 0)
  856. goto toofar;
  857. break;
  858. /* PC += off if dst == imm */
  859. /* PC += off if dst != imm */
  860. /* PC += off if dst & imm */
  861. /* PC += off if dst > imm */
  862. /* PC += off if dst >= imm */
  863. /* PC += off if dst < imm */
  864. /* PC += off if dst <= imm */
  865. /* PC += off if dst > imm (signed) */
  866. /* PC += off if dst >= imm (signed) */
  867. /* PC += off if dst < imm (signed) */
  868. /* PC += off if dst <= imm (signed) */
  869. case BPF_JMP32 | BPF_JEQ | BPF_K:
  870. case BPF_JMP32 | BPF_JNE | BPF_K:
  871. case BPF_JMP32 | BPF_JSET | BPF_K:
  872. case BPF_JMP32 | BPF_JGT | BPF_K:
  873. case BPF_JMP32 | BPF_JGE | BPF_K:
  874. case BPF_JMP32 | BPF_JLT | BPF_K:
  875. case BPF_JMP32 | BPF_JLE | BPF_K:
  876. case BPF_JMP32 | BPF_JSGT | BPF_K:
  877. case BPF_JMP32 | BPF_JSGE | BPF_K:
  878. case BPF_JMP32 | BPF_JSLT | BPF_K:
  879. case BPF_JMP32 | BPF_JSLE | BPF_K:
  880. if (off == 0)
  881. break;
  882. setup_jmp_i(ctx, imm, 32, BPF_OP(code), off, &jmp, &rel);
  883. emit_sext(ctx, MIPS_R_T4, dst); /* Sign-extended dst */
  884. if (valid_jmp_i(jmp, imm)) {
  885. emit_jmp_i(ctx, MIPS_R_T4, imm, rel, jmp);
  886. } else {
  887. /* Move large immediate to register, sign-extended */
  888. emit_mov_i(ctx, MIPS_R_T5, imm);
  889. emit_jmp_r(ctx, MIPS_R_T4, MIPS_R_T5, rel, jmp);
  890. }
  891. if (finish_jmp(ctx, jmp, off) < 0)
  892. goto toofar;
  893. break;
  894. /* PC += off if dst == src */
  895. /* PC += off if dst != src */
  896. /* PC += off if dst & src */
  897. /* PC += off if dst > src */
  898. /* PC += off if dst >= src */
  899. /* PC += off if dst < src */
  900. /* PC += off if dst <= src */
  901. /* PC += off if dst > src (signed) */
  902. /* PC += off if dst >= src (signed) */
  903. /* PC += off if dst < src (signed) */
  904. /* PC += off if dst <= src (signed) */
  905. case BPF_JMP | BPF_JEQ | BPF_X:
  906. case BPF_JMP | BPF_JNE | BPF_X:
  907. case BPF_JMP | BPF_JSET | BPF_X:
  908. case BPF_JMP | BPF_JGT | BPF_X:
  909. case BPF_JMP | BPF_JGE | BPF_X:
  910. case BPF_JMP | BPF_JLT | BPF_X:
  911. case BPF_JMP | BPF_JLE | BPF_X:
  912. case BPF_JMP | BPF_JSGT | BPF_X:
  913. case BPF_JMP | BPF_JSGE | BPF_X:
  914. case BPF_JMP | BPF_JSLT | BPF_X:
  915. case BPF_JMP | BPF_JSLE | BPF_X:
  916. if (off == 0)
  917. break;
  918. setup_jmp_r(ctx, dst == src, BPF_OP(code), off, &jmp, &rel);
  919. emit_jmp_r(ctx, dst, src, rel, jmp);
  920. if (finish_jmp(ctx, jmp, off) < 0)
  921. goto toofar;
  922. break;
  923. /* PC += off if dst == imm */
  924. /* PC += off if dst != imm */
  925. /* PC += off if dst & imm */
  926. /* PC += off if dst > imm */
  927. /* PC += off if dst >= imm */
  928. /* PC += off if dst < imm */
  929. /* PC += off if dst <= imm */
  930. /* PC += off if dst > imm (signed) */
  931. /* PC += off if dst >= imm (signed) */
  932. /* PC += off if dst < imm (signed) */
  933. /* PC += off if dst <= imm (signed) */
  934. case BPF_JMP | BPF_JEQ | BPF_K:
  935. case BPF_JMP | BPF_JNE | BPF_K:
  936. case BPF_JMP | BPF_JSET | BPF_K:
  937. case BPF_JMP | BPF_JGT | BPF_K:
  938. case BPF_JMP | BPF_JGE | BPF_K:
  939. case BPF_JMP | BPF_JLT | BPF_K:
  940. case BPF_JMP | BPF_JLE | BPF_K:
  941. case BPF_JMP | BPF_JSGT | BPF_K:
  942. case BPF_JMP | BPF_JSGE | BPF_K:
  943. case BPF_JMP | BPF_JSLT | BPF_K:
  944. case BPF_JMP | BPF_JSLE | BPF_K:
  945. if (off == 0)
  946. break;
  947. setup_jmp_i(ctx, imm, 64, BPF_OP(code), off, &jmp, &rel);
  948. if (valid_jmp_i(jmp, imm)) {
  949. emit_jmp_i(ctx, dst, imm, rel, jmp);
  950. } else {
  951. /* Move large immediate to register */
  952. emit_mov_i(ctx, MIPS_R_T4, imm);
  953. emit_jmp_r(ctx, dst, MIPS_R_T4, rel, jmp);
  954. }
  955. if (finish_jmp(ctx, jmp, off) < 0)
  956. goto toofar;
  957. break;
  958. /* PC += off */
  959. case BPF_JMP | BPF_JA:
  960. if (off == 0)
  961. break;
  962. if (emit_ja(ctx, off) < 0)
  963. goto toofar;
  964. break;
  965. /* Tail call */
  966. case BPF_JMP | BPF_TAIL_CALL:
  967. if (emit_tail_call(ctx) < 0)
  968. goto invalid;
  969. break;
  970. /* Function call */
  971. case BPF_JMP | BPF_CALL:
  972. if (emit_call(ctx, insn) < 0)
  973. goto invalid;
  974. break;
  975. /* Function return */
  976. case BPF_JMP | BPF_EXIT:
  977. /*
  978. * Optimization: when last instruction is EXIT
  979. * simply continue to epilogue.
  980. */
  981. if (ctx->bpf_index == ctx->program->len - 1)
  982. break;
  983. if (emit_exit(ctx) < 0)
  984. goto toofar;
  985. break;
  986. default:
  987. invalid:
  988. pr_err_once("unknown opcode %02x\n", code);
  989. return -EINVAL;
  990. notyet:
  991. pr_info_once("*** NOT YET: opcode %02x ***\n", code);
  992. return -EFAULT;
  993. toofar:
  994. pr_info_once("*** TOO FAR: jump at %u opcode %02x ***\n",
  995. ctx->bpf_index, code);
  996. return -E2BIG;
  997. }
  998. return 0;
  999. }