diff options
Diffstat (limited to 'lib')
43 files changed, 4501 insertions, 352 deletions
diff --git a/lib/842/842.h b/lib/842/842.h new file mode 100644 index 000000000000..7c200030acf7 --- /dev/null +++ b/lib/842/842.h | |||
@@ -0,0 +1,127 @@ | |||
1 | |||
2 | #ifndef __842_H__ | ||
3 | #define __842_H__ | ||
4 | |||
5 | /* The 842 compressed format is made up of multiple blocks, each of | ||
6 | * which have the format: | ||
7 | * | ||
8 | * <template>[arg1][arg2][arg3][arg4] | ||
9 | * | ||
10 | * where there are between 0 and 4 template args, depending on the specific | ||
11 | * template operation. For normal operations, each arg is either a specific | ||
12 | * number of data bytes to add to the output buffer, or an index pointing | ||
13 | * to a previously-written number of data bytes to copy to the output buffer. | ||
14 | * | ||
15 | * The template code is a 5-bit value. This code indicates what to do with | ||
16 | * the following data. Template codes from 0 to 0x19 should use the template | ||
17 | * table, the static "decomp_ops" table used in decompress. For each template | ||
18 | * (table row), there are between 1 and 4 actions; each action corresponds to | ||
19 | * an arg following the template code bits. Each action is either a "data" | ||
20 | * type action, or a "index" type action, and each action results in 2, 4, or 8 | ||
21 | * bytes being written to the output buffer. Each template (i.e. all actions | ||
22 | * in the table row) will add up to 8 bytes being written to the output buffer. | ||
23 | * Any row with less than 4 actions is padded with noop actions, indicated by | ||
24 | * N0 (for which there is no corresponding arg in the compressed data buffer). | ||
25 | * | ||
26 | * "Data" actions, indicated in the table by D2, D4, and D8, mean that the | ||
27 | * corresponding arg is 2, 4, or 8 bytes, respectively, in the compressed data | ||
28 | * buffer should be copied directly to the output buffer. | ||
29 | * | ||
30 | * "Index" actions, indicated in the table by I2, I4, and I8, mean the | ||
31 | * corresponding arg is an index parameter that points to, respectively, a 2, | ||
32 | * 4, or 8 byte value already in the output buffer, that should be copied to | ||
33 | * the end of the output buffer. Essentially, the index points to a position | ||
34 | * in a ring buffer that contains the last N bytes of output buffer data. | ||
35 | * The number of bits for each index's arg are: 8 bits for I2, 9 bits for I4, | ||
36 | * and 8 bits for I8. Since each index points to a 2, 4, or 8 byte section, | ||
37 | * this means that I2 can reference 512 bytes ((2^8 bits = 256) * 2 bytes), I4 | ||
38 | * can reference 2048 bytes ((2^9 = 512) * 4 bytes), and I8 can reference 2048 | ||
39 | * bytes ((2^8 = 256) * 8 bytes). Think of it as a kind-of ring buffer for | ||
40 | * each of I2, I4, and I8 that are updated for each byte written to the output | ||
41 | * buffer. In this implementation, the output buffer is directly used for each | ||
42 | * index; there is no additional memory required. Note that the index is into | ||
43 | * a ring buffer, not a sliding window; for example, if there have been 260 | ||
44 | * bytes written to the output buffer, an I2 index of 0 would index to byte 256 | ||
45 | * in the output buffer, while an I2 index of 16 would index to byte 16 in the | ||
46 | * output buffer. | ||
47 | * | ||
48 | * There are also 3 special template codes; 0x1b for "repeat", 0x1c for | ||
49 | * "zeros", and 0x1e for "end". The "repeat" operation is followed by a 6 bit | ||
50 | * arg N indicating how many times to repeat. The last 8 bytes written to the | ||
51 | * output buffer are written again to the output buffer, N + 1 times. The | ||
52 | * "zeros" operation, which has no arg bits, writes 8 zeros to the output | ||
53 | * buffer. The "end" operation, which also has no arg bits, signals the end | ||
54 | * of the compressed data. There may be some number of padding (don't care, | ||
55 | * but usually 0) bits after the "end" operation bits, to fill the buffer | ||
56 | * length to a specific byte multiple (usually a multiple of 8, 16, or 32 | ||
57 | * bytes). | ||
58 | * | ||
59 | * This software implementation also uses one of the undefined template values, | ||
60 | * 0x1d as a special "short data" template code, to represent less than 8 bytes | ||
61 | * of uncompressed data. It is followed by a 3 bit arg N indicating how many | ||
62 | * data bytes will follow, and then N bytes of data, which should be copied to | ||
63 | * the output buffer. This allows the software 842 compressor to accept input | ||
64 | * buffers that are not an exact multiple of 8 bytes long. However, those | ||
65 | * compressed buffers containing this sw-only template will be rejected by | ||
66 | * the 842 hardware decompressor, and must be decompressed with this software | ||
67 | * library. The 842 software compression module includes a parameter to | ||
68 | * disable using this sw-only "short data" template, and instead simply | ||
69 | * reject any input buffer that is not a multiple of 8 bytes long. | ||
70 | * | ||
71 | * After all actions for each operation code are processed, another template | ||
72 | * code is in the next 5 bits. The decompression ends once the "end" template | ||
73 | * code is detected. | ||
74 | */ | ||
75 | |||
76 | #include <linux/module.h> | ||
77 | #include <linux/kernel.h> | ||
78 | #include <linux/bitops.h> | ||
79 | #include <asm/unaligned.h> | ||
80 | |||
81 | #include <linux/sw842.h> | ||
82 | |||
83 | /* special templates */ | ||
84 | #define OP_REPEAT (0x1B) | ||
85 | #define OP_ZEROS (0x1C) | ||
86 | #define OP_END (0x1E) | ||
87 | |||
88 | /* sw only template - this is not in the hw design; it's used only by this | ||
89 | * software compressor and decompressor, to allow input buffers that aren't | ||
90 | * a multiple of 8. | ||
91 | */ | ||
92 | #define OP_SHORT_DATA (0x1D) | ||
93 | |||
94 | /* additional bits of each op param */ | ||
95 | #define OP_BITS (5) | ||
96 | #define REPEAT_BITS (6) | ||
97 | #define SHORT_DATA_BITS (3) | ||
98 | #define I2_BITS (8) | ||
99 | #define I4_BITS (9) | ||
100 | #define I8_BITS (8) | ||
101 | |||
102 | #define REPEAT_BITS_MAX (0x3f) | ||
103 | #define SHORT_DATA_BITS_MAX (0x7) | ||
104 | |||
105 | /* Arbitrary values used to indicate action */ | ||
106 | #define OP_ACTION (0x70) | ||
107 | #define OP_ACTION_INDEX (0x10) | ||
108 | #define OP_ACTION_DATA (0x20) | ||
109 | #define OP_ACTION_NOOP (0x40) | ||
110 | #define OP_AMOUNT (0x0f) | ||
111 | #define OP_AMOUNT_0 (0x00) | ||
112 | #define OP_AMOUNT_2 (0x02) | ||
113 | #define OP_AMOUNT_4 (0x04) | ||
114 | #define OP_AMOUNT_8 (0x08) | ||
115 | |||
116 | #define D2 (OP_ACTION_DATA | OP_AMOUNT_2) | ||
117 | #define D4 (OP_ACTION_DATA | OP_AMOUNT_4) | ||
118 | #define D8 (OP_ACTION_DATA | OP_AMOUNT_8) | ||
119 | #define I2 (OP_ACTION_INDEX | OP_AMOUNT_2) | ||
120 | #define I4 (OP_ACTION_INDEX | OP_AMOUNT_4) | ||
121 | #define I8 (OP_ACTION_INDEX | OP_AMOUNT_8) | ||
122 | #define N0 (OP_ACTION_NOOP | OP_AMOUNT_0) | ||
123 | |||
124 | /* the max of the regular templates - not including the special templates */ | ||
125 | #define OPS_MAX (0x1a) | ||
126 | |||
127 | #endif | ||
diff --git a/lib/842/842_compress.c b/lib/842/842_compress.c new file mode 100644 index 000000000000..7ce68948e68c --- /dev/null +++ b/lib/842/842_compress.c | |||
@@ -0,0 +1,626 @@ | |||
1 | /* | ||
2 | * 842 Software Compression | ||
3 | * | ||
4 | * Copyright (C) 2015 Dan Streetman, IBM Corp | ||
5 | * | ||
6 | * This program is free software; you can redistribute it and/or modify | ||
7 | * it under the terms of the GNU General Public License as published by | ||
8 | * the Free Software Foundation; either version 2 of the License, or | ||
9 | * (at your option) any later version. | ||
10 | * | ||
11 | * This program is distributed in the hope that it will be useful, | ||
12 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
13 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
14 | * GNU General Public License for more details. | ||
15 | * | ||
16 | * See 842.h for details of the 842 compressed format. | ||
17 | */ | ||
18 | |||
19 | #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt | ||
20 | #define MODULE_NAME "842_compress" | ||
21 | |||
22 | #include <linux/hashtable.h> | ||
23 | |||
24 | #include "842.h" | ||
25 | #include "842_debugfs.h" | ||
26 | |||
27 | #define SW842_HASHTABLE8_BITS (10) | ||
28 | #define SW842_HASHTABLE4_BITS (11) | ||
29 | #define SW842_HASHTABLE2_BITS (10) | ||
30 | |||
31 | /* By default, we allow compressing input buffers of any length, but we must | ||
32 | * use the non-standard "short data" template so the decompressor can correctly | ||
33 | * reproduce the uncompressed data buffer at the right length. However the | ||
34 | * hardware 842 compressor will not recognize the "short data" template, and | ||
35 | * will fail to decompress any compressed buffer containing it (I have no idea | ||
36 | * why anyone would want to use software to compress and hardware to decompress | ||
37 | * but that's beside the point). This parameter forces the compression | ||
38 | * function to simply reject any input buffer that isn't a multiple of 8 bytes | ||
39 | * long, instead of using the "short data" template, so that all compressed | ||
40 | * buffers produced by this function will be decompressable by the 842 hardware | ||
41 | * decompressor. Unless you have a specific need for that, leave this disabled | ||
42 | * so that any length buffer can be compressed. | ||
43 | */ | ||
44 | static bool sw842_strict; | ||
45 | module_param_named(strict, sw842_strict, bool, 0644); | ||
46 | |||
47 | static u8 comp_ops[OPS_MAX][5] = { /* params size in bits */ | ||
48 | { I8, N0, N0, N0, 0x19 }, /* 8 */ | ||
49 | { I4, I4, N0, N0, 0x18 }, /* 18 */ | ||
50 | { I4, I2, I2, N0, 0x17 }, /* 25 */ | ||
51 | { I2, I2, I4, N0, 0x13 }, /* 25 */ | ||
52 | { I2, I2, I2, I2, 0x12 }, /* 32 */ | ||
53 | { I4, I2, D2, N0, 0x16 }, /* 33 */ | ||
54 | { I4, D2, I2, N0, 0x15 }, /* 33 */ | ||
55 | { I2, D2, I4, N0, 0x0e }, /* 33 */ | ||
56 | { D2, I2, I4, N0, 0x09 }, /* 33 */ | ||
57 | { I2, I2, I2, D2, 0x11 }, /* 40 */ | ||
58 | { I2, I2, D2, I2, 0x10 }, /* 40 */ | ||
59 | { I2, D2, I2, I2, 0x0d }, /* 40 */ | ||
60 | { D2, I2, I2, I2, 0x08 }, /* 40 */ | ||
61 | { I4, D4, N0, N0, 0x14 }, /* 41 */ | ||
62 | { D4, I4, N0, N0, 0x04 }, /* 41 */ | ||
63 | { I2, I2, D4, N0, 0x0f }, /* 48 */ | ||
64 | { I2, D2, I2, D2, 0x0c }, /* 48 */ | ||
65 | { I2, D4, I2, N0, 0x0b }, /* 48 */ | ||
66 | { D2, I2, I2, D2, 0x07 }, /* 48 */ | ||
67 | { D2, I2, D2, I2, 0x06 }, /* 48 */ | ||
68 | { D4, I2, I2, N0, 0x03 }, /* 48 */ | ||
69 | { I2, D2, D4, N0, 0x0a }, /* 56 */ | ||
70 | { D2, I2, D4, N0, 0x05 }, /* 56 */ | ||
71 | { D4, I2, D2, N0, 0x02 }, /* 56 */ | ||
72 | { D4, D2, I2, N0, 0x01 }, /* 56 */ | ||
73 | { D8, N0, N0, N0, 0x00 }, /* 64 */ | ||
74 | }; | ||
75 | |||
76 | struct sw842_hlist_node8 { | ||
77 | struct hlist_node node; | ||
78 | u64 data; | ||
79 | u8 index; | ||
80 | }; | ||
81 | |||
82 | struct sw842_hlist_node4 { | ||
83 | struct hlist_node node; | ||
84 | u32 data; | ||
85 | u16 index; | ||
86 | }; | ||
87 | |||
88 | struct sw842_hlist_node2 { | ||
89 | struct hlist_node node; | ||
90 | u16 data; | ||
91 | u8 index; | ||
92 | }; | ||
93 | |||
94 | #define INDEX_NOT_FOUND (-1) | ||
95 | #define INDEX_NOT_CHECKED (-2) | ||
96 | |||
97 | struct sw842_param { | ||
98 | u8 *in; | ||
99 | u8 *instart; | ||
100 | u64 ilen; | ||
101 | u8 *out; | ||
102 | u64 olen; | ||
103 | u8 bit; | ||
104 | u64 data8[1]; | ||
105 | u32 data4[2]; | ||
106 | u16 data2[4]; | ||
107 | int index8[1]; | ||
108 | int index4[2]; | ||
109 | int index2[4]; | ||
110 | DECLARE_HASHTABLE(htable8, SW842_HASHTABLE8_BITS); | ||
111 | DECLARE_HASHTABLE(htable4, SW842_HASHTABLE4_BITS); | ||
112 | DECLARE_HASHTABLE(htable2, SW842_HASHTABLE2_BITS); | ||
113 | struct sw842_hlist_node8 node8[1 << I8_BITS]; | ||
114 | struct sw842_hlist_node4 node4[1 << I4_BITS]; | ||
115 | struct sw842_hlist_node2 node2[1 << I2_BITS]; | ||
116 | }; | ||
117 | |||
118 | #define get_input_data(p, o, b) \ | ||
119 | be##b##_to_cpu(get_unaligned((__be##b *)((p)->in + (o)))) | ||
120 | |||
121 | #define init_hashtable_nodes(p, b) do { \ | ||
122 | int _i; \ | ||
123 | hash_init((p)->htable##b); \ | ||
124 | for (_i = 0; _i < ARRAY_SIZE((p)->node##b); _i++) { \ | ||
125 | (p)->node##b[_i].index = _i; \ | ||
126 | (p)->node##b[_i].data = 0; \ | ||
127 | INIT_HLIST_NODE(&(p)->node##b[_i].node); \ | ||
128 | } \ | ||
129 | } while (0) | ||
130 | |||
131 | #define find_index(p, b, n) ({ \ | ||
132 | struct sw842_hlist_node##b *_n; \ | ||
133 | p->index##b[n] = INDEX_NOT_FOUND; \ | ||
134 | hash_for_each_possible(p->htable##b, _n, node, p->data##b[n]) { \ | ||
135 | if (p->data##b[n] == _n->data) { \ | ||
136 | p->index##b[n] = _n->index; \ | ||
137 | break; \ | ||
138 | } \ | ||
139 | } \ | ||
140 | p->index##b[n] >= 0; \ | ||
141 | }) | ||
142 | |||
143 | #define check_index(p, b, n) \ | ||
144 | ((p)->index##b[n] == INDEX_NOT_CHECKED \ | ||
145 | ? find_index(p, b, n) \ | ||
146 | : (p)->index##b[n] >= 0) | ||
147 | |||
148 | #define replace_hash(p, b, i, d) do { \ | ||
149 | struct sw842_hlist_node##b *_n = &(p)->node##b[(i)+(d)]; \ | ||
150 | hash_del(&_n->node); \ | ||
151 | _n->data = (p)->data##b[d]; \ | ||
152 | pr_debug("add hash index%x %x pos %x data %lx\n", b, \ | ||
153 | (unsigned int)_n->index, \ | ||
154 | (unsigned int)((p)->in - (p)->instart), \ | ||
155 | (unsigned long)_n->data); \ | ||
156 | hash_add((p)->htable##b, &_n->node, _n->data); \ | ||
157 | } while (0) | ||
158 | |||
159 | static u8 bmask[8] = { 0x00, 0x80, 0xc0, 0xe0, 0xf0, 0xf8, 0xfc, 0xfe }; | ||
160 | |||
161 | static int add_bits(struct sw842_param *p, u64 d, u8 n); | ||
162 | |||
163 | static int __split_add_bits(struct sw842_param *p, u64 d, u8 n, u8 s) | ||
164 | { | ||
165 | int ret; | ||
166 | |||
167 | if (n <= s) | ||
168 | return -EINVAL; | ||
169 | |||
170 | ret = add_bits(p, d >> s, n - s); | ||
171 | if (ret) | ||
172 | return ret; | ||
173 | return add_bits(p, d & GENMASK_ULL(s - 1, 0), s); | ||
174 | } | ||
175 | |||
176 | static int add_bits(struct sw842_param *p, u64 d, u8 n) | ||
177 | { | ||
178 | int b = p->bit, bits = b + n, s = round_up(bits, 8) - bits; | ||
179 | u64 o; | ||
180 | u8 *out = p->out; | ||
181 | |||
182 | pr_debug("add %u bits %lx\n", (unsigned char)n, (unsigned long)d); | ||
183 | |||
184 | if (n > 64) | ||
185 | return -EINVAL; | ||
186 | |||
187 | /* split this up if writing to > 8 bytes (i.e. n == 64 && p->bit > 0), | ||
188 | * or if we're at the end of the output buffer and would write past end | ||
189 | */ | ||
190 | if (bits > 64) | ||
191 | return __split_add_bits(p, d, n, 32); | ||
192 | else if (p->olen < 8 && bits > 32 && bits <= 56) | ||
193 | return __split_add_bits(p, d, n, 16); | ||
194 | else if (p->olen < 4 && bits > 16 && bits <= 24) | ||
195 | return __split_add_bits(p, d, n, 8); | ||
196 | |||
197 | if (DIV_ROUND_UP(bits, 8) > p->olen) | ||
198 | return -ENOSPC; | ||
199 | |||
200 | o = *out & bmask[b]; | ||
201 | d <<= s; | ||
202 | |||
203 | if (bits <= 8) | ||
204 | *out = o | d; | ||
205 | else if (bits <= 16) | ||
206 | put_unaligned(cpu_to_be16(o << 8 | d), (__be16 *)out); | ||
207 | else if (bits <= 24) | ||
208 | put_unaligned(cpu_to_be32(o << 24 | d << 8), (__be32 *)out); | ||
209 | else if (bits <= 32) | ||
210 | put_unaligned(cpu_to_be32(o << 24 | d), (__be32 *)out); | ||
211 | else if (bits <= 40) | ||
212 | put_unaligned(cpu_to_be64(o << 56 | d << 24), (__be64 *)out); | ||
213 | else if (bits <= 48) | ||
214 | put_unaligned(cpu_to_be64(o << 56 | d << 16), (__be64 *)out); | ||
215 | else if (bits <= 56) | ||
216 | put_unaligned(cpu_to_be64(o << 56 | d << 8), (__be64 *)out); | ||
217 | else | ||
218 | put_unaligned(cpu_to_be64(o << 56 | d), (__be64 *)out); | ||
219 | |||
220 | p->bit += n; | ||
221 | |||
222 | if (p->bit > 7) { | ||
223 | p->out += p->bit / 8; | ||
224 | p->olen -= p->bit / 8; | ||
225 | p->bit %= 8; | ||
226 | } | ||
227 | |||
228 | return 0; | ||
229 | } | ||
230 | |||
231 | static int add_template(struct sw842_param *p, u8 c) | ||
232 | { | ||
233 | int ret, i, b = 0; | ||
234 | u8 *t = comp_ops[c]; | ||
235 | bool inv = false; | ||
236 | |||
237 | if (c >= OPS_MAX) | ||
238 | return -EINVAL; | ||
239 | |||
240 | pr_debug("template %x\n", t[4]); | ||
241 | |||
242 | ret = add_bits(p, t[4], OP_BITS); | ||
243 | if (ret) | ||
244 | return ret; | ||
245 | |||
246 | for (i = 0; i < 4; i++) { | ||
247 | pr_debug("op %x\n", t[i]); | ||
248 | |||
249 | switch (t[i] & OP_AMOUNT) { | ||
250 | case OP_AMOUNT_8: | ||
251 | if (b) | ||
252 | inv = true; | ||
253 | else if (t[i] & OP_ACTION_INDEX) | ||
254 | ret = add_bits(p, p->index8[0], I8_BITS); | ||
255 | else if (t[i] & OP_ACTION_DATA) | ||
256 | ret = add_bits(p, p->data8[0], 64); | ||
257 | else | ||
258 | inv = true; | ||
259 | break; | ||
260 | case OP_AMOUNT_4: | ||
261 | if (b == 2 && t[i] & OP_ACTION_DATA) | ||
262 | ret = add_bits(p, get_input_data(p, 2, 32), 32); | ||
263 | else if (b != 0 && b != 4) | ||
264 | inv = true; | ||
265 | else if (t[i] & OP_ACTION_INDEX) | ||
266 | ret = add_bits(p, p->index4[b >> 2], I4_BITS); | ||
267 | else if (t[i] & OP_ACTION_DATA) | ||
268 | ret = add_bits(p, p->data4[b >> 2], 32); | ||
269 | else | ||
270 | inv = true; | ||
271 | break; | ||
272 | case OP_AMOUNT_2: | ||
273 | if (b != 0 && b != 2 && b != 4 && b != 6) | ||
274 | inv = true; | ||
275 | if (t[i] & OP_ACTION_INDEX) | ||
276 | ret = add_bits(p, p->index2[b >> 1], I2_BITS); | ||
277 | else if (t[i] & OP_ACTION_DATA) | ||
278 | ret = add_bits(p, p->data2[b >> 1], 16); | ||
279 | else | ||
280 | inv = true; | ||
281 | break; | ||
282 | case OP_AMOUNT_0: | ||
283 | inv = (b != 8) || !(t[i] & OP_ACTION_NOOP); | ||
284 | break; | ||
285 | default: | ||
286 | inv = true; | ||
287 | break; | ||
288 | } | ||
289 | |||
290 | if (ret) | ||
291 | return ret; | ||
292 | |||
293 | if (inv) { | ||
294 | pr_err("Invalid templ %x op %d : %x %x %x %x\n", | ||
295 | c, i, t[0], t[1], t[2], t[3]); | ||
296 | return -EINVAL; | ||
297 | } | ||
298 | |||
299 | b += t[i] & OP_AMOUNT; | ||
300 | } | ||
301 | |||
302 | if (b != 8) { | ||
303 | pr_err("Invalid template %x len %x : %x %x %x %x\n", | ||
304 | c, b, t[0], t[1], t[2], t[3]); | ||
305 | return -EINVAL; | ||
306 | } | ||
307 | |||
308 | if (sw842_template_counts) | ||
309 | atomic_inc(&template_count[t[4]]); | ||
310 | |||
311 | return 0; | ||
312 | } | ||
313 | |||
314 | static int add_repeat_template(struct sw842_param *p, u8 r) | ||
315 | { | ||
316 | int ret; | ||
317 | |||
318 | /* repeat param is 0-based */ | ||
319 | if (!r || --r > REPEAT_BITS_MAX) | ||
320 | return -EINVAL; | ||
321 | |||
322 | ret = add_bits(p, OP_REPEAT, OP_BITS); | ||
323 | if (ret) | ||
324 | return ret; | ||
325 | |||
326 | ret = add_bits(p, r, REPEAT_BITS); | ||
327 | if (ret) | ||
328 | return ret; | ||
329 | |||
330 | if (sw842_template_counts) | ||
331 | atomic_inc(&template_repeat_count); | ||
332 | |||
333 | return 0; | ||
334 | } | ||
335 | |||
336 | static int add_short_data_template(struct sw842_param *p, u8 b) | ||
337 | { | ||
338 | int ret, i; | ||
339 | |||
340 | if (!b || b > SHORT_DATA_BITS_MAX) | ||
341 | return -EINVAL; | ||
342 | |||
343 | ret = add_bits(p, OP_SHORT_DATA, OP_BITS); | ||
344 | if (ret) | ||
345 | return ret; | ||
346 | |||
347 | ret = add_bits(p, b, SHORT_DATA_BITS); | ||
348 | if (ret) | ||
349 | return ret; | ||
350 | |||
351 | for (i = 0; i < b; i++) { | ||
352 | ret = add_bits(p, p->in[i], 8); | ||
353 | if (ret) | ||
354 | return ret; | ||
355 | } | ||
356 | |||
357 | if (sw842_template_counts) | ||
358 | atomic_inc(&template_short_data_count); | ||
359 | |||
360 | return 0; | ||
361 | } | ||
362 | |||
363 | static int add_zeros_template(struct sw842_param *p) | ||
364 | { | ||
365 | int ret = add_bits(p, OP_ZEROS, OP_BITS); | ||
366 | |||
367 | if (ret) | ||
368 | return ret; | ||
369 | |||
370 | if (sw842_template_counts) | ||
371 | atomic_inc(&template_zeros_count); | ||
372 | |||
373 | return 0; | ||
374 | } | ||
375 | |||
376 | static int add_end_template(struct sw842_param *p) | ||
377 | { | ||
378 | int ret = add_bits(p, OP_END, OP_BITS); | ||
379 | |||
380 | if (ret) | ||
381 | return ret; | ||
382 | |||
383 | if (sw842_template_counts) | ||
384 | atomic_inc(&template_end_count); | ||
385 | |||
386 | return 0; | ||
387 | } | ||
388 | |||
389 | static bool check_template(struct sw842_param *p, u8 c) | ||
390 | { | ||
391 | u8 *t = comp_ops[c]; | ||
392 | int i, match, b = 0; | ||
393 | |||
394 | if (c >= OPS_MAX) | ||
395 | return false; | ||
396 | |||
397 | for (i = 0; i < 4; i++) { | ||
398 | if (t[i] & OP_ACTION_INDEX) { | ||
399 | if (t[i] & OP_AMOUNT_2) | ||
400 | match = check_index(p, 2, b >> 1); | ||
401 | else if (t[i] & OP_AMOUNT_4) | ||
402 | match = check_index(p, 4, b >> 2); | ||
403 | else if (t[i] & OP_AMOUNT_8) | ||
404 | match = check_index(p, 8, 0); | ||
405 | else | ||
406 | return false; | ||
407 | if (!match) | ||
408 | return false; | ||
409 | } | ||
410 | |||
411 | b += t[i] & OP_AMOUNT; | ||
412 | } | ||
413 | |||
414 | return true; | ||
415 | } | ||
416 | |||
417 | static void get_next_data(struct sw842_param *p) | ||
418 | { | ||
419 | p->data8[0] = get_input_data(p, 0, 64); | ||
420 | p->data4[0] = get_input_data(p, 0, 32); | ||
421 | p->data4[1] = get_input_data(p, 4, 32); | ||
422 | p->data2[0] = get_input_data(p, 0, 16); | ||
423 | p->data2[1] = get_input_data(p, 2, 16); | ||
424 | p->data2[2] = get_input_data(p, 4, 16); | ||
425 | p->data2[3] = get_input_data(p, 6, 16); | ||
426 | } | ||
427 | |||
428 | /* update the hashtable entries. | ||
429 | * only call this after finding/adding the current template | ||
430 | * the dataN fields for the current 8 byte block must be already updated | ||
431 | */ | ||
432 | static void update_hashtables(struct sw842_param *p) | ||
433 | { | ||
434 | u64 pos = p->in - p->instart; | ||
435 | u64 n8 = (pos >> 3) % (1 << I8_BITS); | ||
436 | u64 n4 = (pos >> 2) % (1 << I4_BITS); | ||
437 | u64 n2 = (pos >> 1) % (1 << I2_BITS); | ||
438 | |||
439 | replace_hash(p, 8, n8, 0); | ||
440 | replace_hash(p, 4, n4, 0); | ||
441 | replace_hash(p, 4, n4, 1); | ||
442 | replace_hash(p, 2, n2, 0); | ||
443 | replace_hash(p, 2, n2, 1); | ||
444 | replace_hash(p, 2, n2, 2); | ||
445 | replace_hash(p, 2, n2, 3); | ||
446 | } | ||
447 | |||
448 | /* find the next template to use, and add it | ||
449 | * the p->dataN fields must already be set for the current 8 byte block | ||
450 | */ | ||
451 | static int process_next(struct sw842_param *p) | ||
452 | { | ||
453 | int ret, i; | ||
454 | |||
455 | p->index8[0] = INDEX_NOT_CHECKED; | ||
456 | p->index4[0] = INDEX_NOT_CHECKED; | ||
457 | p->index4[1] = INDEX_NOT_CHECKED; | ||
458 | p->index2[0] = INDEX_NOT_CHECKED; | ||
459 | p->index2[1] = INDEX_NOT_CHECKED; | ||
460 | p->index2[2] = INDEX_NOT_CHECKED; | ||
461 | p->index2[3] = INDEX_NOT_CHECKED; | ||
462 | |||
463 | /* check up to OPS_MAX - 1; last op is our fallback */ | ||
464 | for (i = 0; i < OPS_MAX - 1; i++) { | ||
465 | if (check_template(p, i)) | ||
466 | break; | ||
467 | } | ||
468 | |||
469 | ret = add_template(p, i); | ||
470 | if (ret) | ||
471 | return ret; | ||
472 | |||
473 | return 0; | ||
474 | } | ||
475 | |||
476 | /** | ||
477 | * sw842_compress | ||
478 | * | ||
479 | * Compress the uncompressed buffer of length @ilen at @in to the output buffer | ||
480 | * @out, using no more than @olen bytes, using the 842 compression format. | ||
481 | * | ||
482 | * Returns: 0 on success, error on failure. The @olen parameter | ||
483 | * will contain the number of output bytes written on success, or | ||
484 | * 0 on error. | ||
485 | */ | ||
486 | int sw842_compress(const u8 *in, unsigned int ilen, | ||
487 | u8 *out, unsigned int *olen, void *wmem) | ||
488 | { | ||
489 | struct sw842_param *p = (struct sw842_param *)wmem; | ||
490 | int ret; | ||
491 | u64 last, next, pad, total; | ||
492 | u8 repeat_count = 0; | ||
493 | |||
494 | BUILD_BUG_ON(sizeof(*p) > SW842_MEM_COMPRESS); | ||
495 | |||
496 | init_hashtable_nodes(p, 8); | ||
497 | init_hashtable_nodes(p, 4); | ||
498 | init_hashtable_nodes(p, 2); | ||
499 | |||
500 | p->in = (u8 *)in; | ||
501 | p->instart = p->in; | ||
502 | p->ilen = ilen; | ||
503 | p->out = out; | ||
504 | p->olen = *olen; | ||
505 | p->bit = 0; | ||
506 | |||
507 | total = p->olen; | ||
508 | |||
509 | *olen = 0; | ||
510 | |||
511 | /* if using strict mode, we can only compress a multiple of 8 */ | ||
512 | if (sw842_strict && (ilen % 8)) { | ||
513 | pr_err("Using strict mode, can't compress len %d\n", ilen); | ||
514 | return -EINVAL; | ||
515 | } | ||
516 | |||
517 | /* let's compress at least 8 bytes, mkay? */ | ||
518 | if (unlikely(ilen < 8)) | ||
519 | goto skip_comp; | ||
520 | |||
521 | /* make initial 'last' different so we don't match the first time */ | ||
522 | last = ~get_unaligned((u64 *)p->in); | ||
523 | |||
524 | while (p->ilen > 7) { | ||
525 | next = get_unaligned((u64 *)p->in); | ||
526 | |||
527 | /* must get the next data, as we need to update the hashtable | ||
528 | * entries with the new data every time | ||
529 | */ | ||
530 | get_next_data(p); | ||
531 | |||
532 | /* we don't care about endianness in last or next; | ||
533 | * we're just comparing 8 bytes to another 8 bytes, | ||
534 | * they're both the same endianness | ||
535 | */ | ||
536 | if (next == last) { | ||
537 | /* repeat count bits are 0-based, so we stop at +1 */ | ||
538 | if (++repeat_count <= REPEAT_BITS_MAX) | ||
539 | goto repeat; | ||
540 | } | ||
541 | if (repeat_count) { | ||
542 | ret = add_repeat_template(p, repeat_count); | ||
543 | repeat_count = 0; | ||
544 | if (next == last) /* reached max repeat bits */ | ||
545 | goto repeat; | ||
546 | } | ||
547 | |||
548 | if (next == 0) | ||
549 | ret = add_zeros_template(p); | ||
550 | else | ||
551 | ret = process_next(p); | ||
552 | |||
553 | if (ret) | ||
554 | return ret; | ||
555 | |||
556 | repeat: | ||
557 | last = next; | ||
558 | update_hashtables(p); | ||
559 | p->in += 8; | ||
560 | p->ilen -= 8; | ||
561 | } | ||
562 | |||
563 | if (repeat_count) { | ||
564 | ret = add_repeat_template(p, repeat_count); | ||
565 | if (ret) | ||
566 | return ret; | ||
567 | } | ||
568 | |||
569 | skip_comp: | ||
570 | if (p->ilen > 0) { | ||
571 | ret = add_short_data_template(p, p->ilen); | ||
572 | if (ret) | ||
573 | return ret; | ||
574 | |||
575 | p->in += p->ilen; | ||
576 | p->ilen = 0; | ||
577 | } | ||
578 | |||
579 | ret = add_end_template(p); | ||
580 | if (ret) | ||
581 | return ret; | ||
582 | |||
583 | if (p->bit) { | ||
584 | p->out++; | ||
585 | p->olen--; | ||
586 | p->bit = 0; | ||
587 | } | ||
588 | |||
589 | /* pad compressed length to multiple of 8 */ | ||
590 | pad = (8 - ((total - p->olen) % 8)) % 8; | ||
591 | if (pad) { | ||
592 | if (pad > p->olen) /* we were so close! */ | ||
593 | return -ENOSPC; | ||
594 | memset(p->out, 0, pad); | ||
595 | p->out += pad; | ||
596 | p->olen -= pad; | ||
597 | } | ||
598 | |||
599 | if (unlikely((total - p->olen) > UINT_MAX)) | ||
600 | return -ENOSPC; | ||
601 | |||
602 | *olen = total - p->olen; | ||
603 | |||
604 | return 0; | ||
605 | } | ||
606 | EXPORT_SYMBOL_GPL(sw842_compress); | ||
607 | |||
608 | static int __init sw842_init(void) | ||
609 | { | ||
610 | if (sw842_template_counts) | ||
611 | sw842_debugfs_create(); | ||
612 | |||
613 | return 0; | ||
614 | } | ||
615 | module_init(sw842_init); | ||
616 | |||
617 | static void __exit sw842_exit(void) | ||
618 | { | ||
619 | if (sw842_template_counts) | ||
620 | sw842_debugfs_remove(); | ||
621 | } | ||
622 | module_exit(sw842_exit); | ||
623 | |||
624 | MODULE_LICENSE("GPL"); | ||
625 | MODULE_DESCRIPTION("Software 842 Compressor"); | ||
626 | MODULE_AUTHOR("Dan Streetman <ddstreet@ieee.org>"); | ||
diff --git a/lib/842/842_debugfs.h b/lib/842/842_debugfs.h new file mode 100644 index 000000000000..e7f3bffaf255 --- /dev/null +++ b/lib/842/842_debugfs.h | |||
@@ -0,0 +1,52 @@ | |||
1 | |||
2 | #ifndef __842_DEBUGFS_H__ | ||
3 | #define __842_DEBUGFS_H__ | ||
4 | |||
5 | #include <linux/debugfs.h> | ||
6 | |||
7 | static bool sw842_template_counts; | ||
8 | module_param_named(template_counts, sw842_template_counts, bool, 0444); | ||
9 | |||
10 | static atomic_t template_count[OPS_MAX], template_repeat_count, | ||
11 | template_zeros_count, template_short_data_count, template_end_count; | ||
12 | |||
13 | static struct dentry *sw842_debugfs_root; | ||
14 | |||
15 | static int __init sw842_debugfs_create(void) | ||
16 | { | ||
17 | umode_t m = S_IRUGO | S_IWUSR; | ||
18 | int i; | ||
19 | |||
20 | if (!debugfs_initialized()) | ||
21 | return -ENODEV; | ||
22 | |||
23 | sw842_debugfs_root = debugfs_create_dir(MODULE_NAME, NULL); | ||
24 | if (IS_ERR(sw842_debugfs_root)) | ||
25 | return PTR_ERR(sw842_debugfs_root); | ||
26 | |||
27 | for (i = 0; i < ARRAY_SIZE(template_count); i++) { | ||
28 | char name[32]; | ||
29 | |||
30 | snprintf(name, 32, "template_%02x", i); | ||
31 | debugfs_create_atomic_t(name, m, sw842_debugfs_root, | ||
32 | &template_count[i]); | ||
33 | } | ||
34 | debugfs_create_atomic_t("template_repeat", m, sw842_debugfs_root, | ||
35 | &template_repeat_count); | ||
36 | debugfs_create_atomic_t("template_zeros", m, sw842_debugfs_root, | ||
37 | &template_zeros_count); | ||
38 | debugfs_create_atomic_t("template_short_data", m, sw842_debugfs_root, | ||
39 | &template_short_data_count); | ||
40 | debugfs_create_atomic_t("template_end", m, sw842_debugfs_root, | ||
41 | &template_end_count); | ||
42 | |||
43 | return 0; | ||
44 | } | ||
45 | |||
46 | static void __exit sw842_debugfs_remove(void) | ||
47 | { | ||
48 | if (sw842_debugfs_root && !IS_ERR(sw842_debugfs_root)) | ||
49 | debugfs_remove_recursive(sw842_debugfs_root); | ||
50 | } | ||
51 | |||
52 | #endif | ||
diff --git a/lib/842/842_decompress.c b/lib/842/842_decompress.c new file mode 100644 index 000000000000..5446ff0c9ba0 --- /dev/null +++ b/lib/842/842_decompress.c | |||
@@ -0,0 +1,405 @@ | |||
1 | /* | ||
2 | * 842 Software Decompression | ||
3 | * | ||
4 | * Copyright (C) 2015 Dan Streetman, IBM Corp | ||
5 | * | ||
6 | * This program is free software; you can redistribute it and/or modify | ||
7 | * it under the terms of the GNU General Public License as published by | ||
8 | * the Free Software Foundation; either version 2 of the License, or | ||
9 | * (at your option) any later version. | ||
10 | * | ||
11 | * This program is distributed in the hope that it will be useful, | ||
12 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | ||
13 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | ||
14 | * GNU General Public License for more details. | ||
15 | * | ||
16 | * See 842.h for details of the 842 compressed format. | ||
17 | */ | ||
18 | |||
19 | #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt | ||
20 | #define MODULE_NAME "842_decompress" | ||
21 | |||
22 | #include "842.h" | ||
23 | #include "842_debugfs.h" | ||
24 | |||
25 | /* rolling fifo sizes */ | ||
26 | #define I2_FIFO_SIZE (2 * (1 << I2_BITS)) | ||
27 | #define I4_FIFO_SIZE (4 * (1 << I4_BITS)) | ||
28 | #define I8_FIFO_SIZE (8 * (1 << I8_BITS)) | ||
29 | |||
30 | static u8 decomp_ops[OPS_MAX][4] = { | ||
31 | { D8, N0, N0, N0 }, | ||
32 | { D4, D2, I2, N0 }, | ||
33 | { D4, I2, D2, N0 }, | ||
34 | { D4, I2, I2, N0 }, | ||
35 | { D4, I4, N0, N0 }, | ||
36 | { D2, I2, D4, N0 }, | ||
37 | { D2, I2, D2, I2 }, | ||
38 | { D2, I2, I2, D2 }, | ||
39 | { D2, I2, I2, I2 }, | ||
40 | { D2, I2, I4, N0 }, | ||
41 | { I2, D2, D4, N0 }, | ||
42 | { I2, D4, I2, N0 }, | ||
43 | { I2, D2, I2, D2 }, | ||
44 | { I2, D2, I2, I2 }, | ||
45 | { I2, D2, I4, N0 }, | ||
46 | { I2, I2, D4, N0 }, | ||
47 | { I2, I2, D2, I2 }, | ||
48 | { I2, I2, I2, D2 }, | ||
49 | { I2, I2, I2, I2 }, | ||
50 | { I2, I2, I4, N0 }, | ||
51 | { I4, D4, N0, N0 }, | ||
52 | { I4, D2, I2, N0 }, | ||
53 | { I4, I2, D2, N0 }, | ||
54 | { I4, I2, I2, N0 }, | ||
55 | { I4, I4, N0, N0 }, | ||
56 | { I8, N0, N0, N0 } | ||
57 | }; | ||
58 | |||
59 | struct sw842_param { | ||
60 | u8 *in; | ||
61 | u8 bit; | ||
62 | u64 ilen; | ||
63 | u8 *out; | ||
64 | u8 *ostart; | ||
65 | u64 olen; | ||
66 | }; | ||
67 | |||
68 | #define beN_to_cpu(d, s) \ | ||
69 | ((s) == 2 ? be16_to_cpu(get_unaligned((__be16 *)d)) : \ | ||
70 | (s) == 4 ? be32_to_cpu(get_unaligned((__be32 *)d)) : \ | ||
71 | (s) == 8 ? be64_to_cpu(get_unaligned((__be64 *)d)) : \ | ||
72 | WARN(1, "pr_debug param err invalid size %x\n", s)) | ||
73 | |||
74 | static int next_bits(struct sw842_param *p, u64 *d, u8 n); | ||
75 | |||
76 | static int __split_next_bits(struct sw842_param *p, u64 *d, u8 n, u8 s) | ||
77 | { | ||
78 | u64 tmp = 0; | ||
79 | int ret; | ||
80 | |||
81 | if (n <= s) { | ||
82 | pr_debug("split_next_bits invalid n %u s %u\n", n, s); | ||
83 | return -EINVAL; | ||
84 | } | ||
85 | |||
86 | ret = next_bits(p, &tmp, n - s); | ||
87 | if (ret) | ||
88 | return ret; | ||
89 | ret = next_bits(p, d, s); | ||
90 | if (ret) | ||
91 | return ret; | ||
92 | *d |= tmp << s; | ||
93 | return 0; | ||
94 | } | ||
95 | |||
96 | static int next_bits(struct sw842_param *p, u64 *d, u8 n) | ||
97 | { | ||
98 | u8 *in = p->in, b = p->bit, bits = b + n; | ||
99 | |||
100 | if (n > 64) { | ||
101 | pr_debug("next_bits invalid n %u\n", n); | ||
102 | return -EINVAL; | ||
103 | } | ||
104 | |||
105 | /* split this up if reading > 8 bytes, or if we're at the end of | ||
106 | * the input buffer and would read past the end | ||
107 | */ | ||
108 | if (bits > 64) | ||
109 | return __split_next_bits(p, d, n, 32); | ||
110 | else if (p->ilen < 8 && bits > 32 && bits <= 56) | ||
111 | return __split_next_bits(p, d, n, 16); | ||
112 | else if (p->ilen < 4 && bits > 16 && bits <= 24) | ||
113 | return __split_next_bits(p, d, n, 8); | ||
114 | |||
115 | if (DIV_ROUND_UP(bits, 8) > p->ilen) | ||
116 | return -EOVERFLOW; | ||
117 | |||
118 | if (bits <= 8) | ||
119 | *d = *in >> (8 - bits); | ||
120 | else if (bits <= 16) | ||
121 | *d = be16_to_cpu(get_unaligned((__be16 *)in)) >> (16 - bits); | ||
122 | else if (bits <= 32) | ||
123 | *d = be32_to_cpu(get_unaligned((__be32 *)in)) >> (32 - bits); | ||
124 | else | ||
125 | *d = be64_to_cpu(get_unaligned((__be64 *)in)) >> (64 - bits); | ||
126 | |||
127 | *d &= GENMASK_ULL(n - 1, 0); | ||
128 | |||
129 | p->bit += n; | ||
130 | |||
131 | if (p->bit > 7) { | ||
132 | p->in += p->bit / 8; | ||
133 | p->ilen -= p->bit / 8; | ||
134 | p->bit %= 8; | ||
135 | } | ||
136 | |||
137 | return 0; | ||
138 | } | ||
139 | |||
140 | static int do_data(struct sw842_param *p, u8 n) | ||
141 | { | ||
142 | u64 v; | ||
143 | int ret; | ||
144 | |||
145 | if (n > p->olen) | ||
146 | return -ENOSPC; | ||
147 | |||
148 | ret = next_bits(p, &v, n * 8); | ||
149 | if (ret) | ||
150 | return ret; | ||
151 | |||
152 | switch (n) { | ||
153 | case 2: | ||
154 | put_unaligned(cpu_to_be16((u16)v), (__be16 *)p->out); | ||
155 | break; | ||
156 | case 4: | ||
157 | put_unaligned(cpu_to_be32((u32)v), (__be32 *)p->out); | ||
158 | break; | ||
159 | case 8: | ||
160 | put_unaligned(cpu_to_be64((u64)v), (__be64 *)p->out); | ||
161 | break; | ||
162 | default: | ||
163 | return -EINVAL; | ||
164 | } | ||
165 | |||
166 | p->out += n; | ||
167 | p->olen -= n; | ||
168 | |||
169 | return 0; | ||
170 | } | ||
171 | |||
172 | static int __do_index(struct sw842_param *p, u8 size, u8 bits, u64 fsize) | ||
173 | { | ||
174 | u64 index, offset, total = round_down(p->out - p->ostart, 8); | ||
175 | int ret; | ||
176 | |||
177 | ret = next_bits(p, &index, bits); | ||
178 | if (ret) | ||
179 | return ret; | ||
180 | |||
181 | offset = index * size; | ||
182 | |||
183 | /* a ring buffer of fsize is used; correct the offset */ | ||
184 | if (total > fsize) { | ||
185 | /* this is where the current fifo is */ | ||
186 | u64 section = round_down(total, fsize); | ||
187 | /* the current pos in the fifo */ | ||
188 | u64 pos = total - section; | ||
189 | |||
190 | /* if the offset is past/at the pos, we need to | ||
191 | * go back to the last fifo section | ||
192 | */ | ||
193 | if (offset >= pos) | ||
194 | section -= fsize; | ||
195 | |||
196 | offset += section; | ||
197 | } | ||
198 | |||
199 | if (offset + size > total) { | ||
200 | pr_debug("index%x %lx points past end %lx\n", size, | ||
201 | (unsigned long)offset, (unsigned long)total); | ||
202 | return -EINVAL; | ||
203 | } | ||
204 | |||
205 | pr_debug("index%x to %lx off %lx adjoff %lx tot %lx data %lx\n", | ||
206 | size, (unsigned long)index, (unsigned long)(index * size), | ||
207 | (unsigned long)offset, (unsigned long)total, | ||
208 | (unsigned long)beN_to_cpu(&p->ostart[offset], size)); | ||
209 | |||
210 | memcpy(p->out, &p->ostart[offset], size); | ||
211 | p->out += size; | ||
212 | p->olen -= size; | ||
213 | |||
214 | return 0; | ||
215 | } | ||
216 | |||
217 | static int do_index(struct sw842_param *p, u8 n) | ||
218 | { | ||
219 | switch (n) { | ||
220 | case 2: | ||
221 | return __do_index(p, 2, I2_BITS, I2_FIFO_SIZE); | ||
222 | case 4: | ||
223 | return __do_index(p, 4, I4_BITS, I4_FIFO_SIZE); | ||
224 | case 8: | ||
225 | return __do_index(p, 8, I8_BITS, I8_FIFO_SIZE); | ||
226 | default: | ||
227 | return -EINVAL; | ||
228 | } | ||
229 | } | ||
230 | |||
231 | static int do_op(struct sw842_param *p, u8 o) | ||
232 | { | ||
233 | int i, ret = 0; | ||
234 | |||
235 | if (o >= OPS_MAX) | ||
236 | return -EINVAL; | ||
237 | |||
238 | for (i = 0; i < 4; i++) { | ||
239 | u8 op = decomp_ops[o][i]; | ||
240 | |||
241 | pr_debug("op is %x\n", op); | ||
242 | |||
243 | switch (op & OP_ACTION) { | ||
244 | case OP_ACTION_DATA: | ||
245 | ret = do_data(p, op & OP_AMOUNT); | ||
246 | break; | ||
247 | case OP_ACTION_INDEX: | ||
248 | ret = do_index(p, op & OP_AMOUNT); | ||
249 | break; | ||
250 | case OP_ACTION_NOOP: | ||
251 | break; | ||
252 | default: | ||
253 | pr_err("Interal error, invalid op %x\n", op); | ||
254 | return -EINVAL; | ||
255 | } | ||
256 | |||
257 | if (ret) | ||
258 | return ret; | ||
259 | } | ||
260 | |||
261 | if (sw842_template_counts) | ||
262 | atomic_inc(&template_count[o]); | ||
263 | |||
264 | return 0; | ||
265 | } | ||
266 | |||
267 | /** | ||
268 | * sw842_decompress | ||
269 | * | ||
270 | * Decompress the 842-compressed buffer of length @ilen at @in | ||
271 | * to the output buffer @out, using no more than @olen bytes. | ||
272 | * | ||
273 | * The compressed buffer must be only a single 842-compressed buffer, | ||
274 | * with the standard format described in the comments in 842.h | ||
275 | * Processing will stop when the 842 "END" template is detected, | ||
276 | * not the end of the buffer. | ||
277 | * | ||
278 | * Returns: 0 on success, error on failure. The @olen parameter | ||
279 | * will contain the number of output bytes written on success, or | ||
280 | * 0 on error. | ||
281 | */ | ||
282 | int sw842_decompress(const u8 *in, unsigned int ilen, | ||
283 | u8 *out, unsigned int *olen) | ||
284 | { | ||
285 | struct sw842_param p; | ||
286 | int ret; | ||
287 | u64 op, rep, tmp, bytes, total; | ||
288 | |||
289 | p.in = (u8 *)in; | ||
290 | p.bit = 0; | ||
291 | p.ilen = ilen; | ||
292 | p.out = out; | ||
293 | p.ostart = out; | ||
294 | p.olen = *olen; | ||
295 | |||
296 | total = p.olen; | ||
297 | |||
298 | *olen = 0; | ||
299 | |||
300 | do { | ||
301 | ret = next_bits(&p, &op, OP_BITS); | ||
302 | if (ret) | ||
303 | return ret; | ||
304 | |||
305 | pr_debug("template is %lx\n", (unsigned long)op); | ||
306 | |||
307 | switch (op) { | ||
308 | case OP_REPEAT: | ||
309 | ret = next_bits(&p, &rep, REPEAT_BITS); | ||
310 | if (ret) | ||
311 | return ret; | ||
312 | |||
313 | if (p.out == out) /* no previous bytes */ | ||
314 | return -EINVAL; | ||
315 | |||
316 | /* copy rep + 1 */ | ||
317 | rep++; | ||
318 | |||
319 | if (rep * 8 > p.olen) | ||
320 | return -ENOSPC; | ||
321 | |||
322 | while (rep-- > 0) { | ||
323 | memcpy(p.out, p.out - 8, 8); | ||
324 | p.out += 8; | ||
325 | p.olen -= 8; | ||
326 | } | ||
327 | |||
328 | if (sw842_template_counts) | ||
329 | atomic_inc(&template_repeat_count); | ||
330 | |||
331 | break; | ||
332 | case OP_ZEROS: | ||
333 | if (8 > p.olen) | ||
334 | return -ENOSPC; | ||
335 | |||
336 | memset(p.out, 0, 8); | ||
337 | p.out += 8; | ||
338 | p.olen -= 8; | ||
339 | |||
340 | if (sw842_template_counts) | ||
341 | atomic_inc(&template_zeros_count); | ||
342 | |||
343 | break; | ||
344 | case OP_SHORT_DATA: | ||
345 | ret = next_bits(&p, &bytes, SHORT_DATA_BITS); | ||
346 | if (ret) | ||
347 | return ret; | ||
348 | |||
349 | if (!bytes || bytes > SHORT_DATA_BITS_MAX) | ||
350 | return -EINVAL; | ||
351 | |||
352 | while (bytes-- > 0) { | ||
353 | ret = next_bits(&p, &tmp, 8); | ||
354 | if (ret) | ||
355 | return ret; | ||
356 | *p.out = (u8)tmp; | ||
357 | p.out++; | ||
358 | p.olen--; | ||
359 | } | ||
360 | |||
361 | if (sw842_template_counts) | ||
362 | atomic_inc(&template_short_data_count); | ||
363 | |||
364 | break; | ||
365 | case OP_END: | ||
366 | if (sw842_template_counts) | ||
367 | atomic_inc(&template_end_count); | ||
368 | |||
369 | break; | ||
370 | default: /* use template */ | ||
371 | ret = do_op(&p, op); | ||
372 | if (ret) | ||
373 | return ret; | ||
374 | break; | ||
375 | } | ||
376 | } while (op != OP_END); | ||
377 | |||
378 | if (unlikely((total - p.olen) > UINT_MAX)) | ||
379 | return -ENOSPC; | ||
380 | |||
381 | *olen = total - p.olen; | ||
382 | |||
383 | return 0; | ||
384 | } | ||
385 | EXPORT_SYMBOL_GPL(sw842_decompress); | ||
386 | |||
387 | static int __init sw842_init(void) | ||
388 | { | ||
389 | if (sw842_template_counts) | ||
390 | sw842_debugfs_create(); | ||
391 | |||
392 | return 0; | ||
393 | } | ||
394 | module_init(sw842_init); | ||
395 | |||
396 | static void __exit sw842_exit(void) | ||
397 | { | ||
398 | if (sw842_template_counts) | ||
399 | sw842_debugfs_remove(); | ||
400 | } | ||
401 | module_exit(sw842_exit); | ||
402 | |||
403 | MODULE_LICENSE("GPL"); | ||
404 | MODULE_DESCRIPTION("Software 842 Decompressor"); | ||
405 | MODULE_AUTHOR("Dan Streetman <ddstreet@ieee.org>"); | ||
diff --git a/lib/842/Makefile b/lib/842/Makefile new file mode 100644 index 000000000000..5d24c0baff2e --- /dev/null +++ b/lib/842/Makefile | |||
@@ -0,0 +1,2 @@ | |||
1 | obj-$(CONFIG_842_COMPRESS) += 842_compress.o | ||
2 | obj-$(CONFIG_842_DECOMPRESS) += 842_decompress.o | ||
diff --git a/lib/Kconfig b/lib/Kconfig index 601965a948e8..3a2ef67db6c7 100644 --- a/lib/Kconfig +++ b/lib/Kconfig | |||
@@ -212,6 +212,12 @@ config RANDOM32_SELFTEST | |||
212 | # | 212 | # |
213 | # compression support is select'ed if needed | 213 | # compression support is select'ed if needed |
214 | # | 214 | # |
215 | config 842_COMPRESS | ||
216 | tristate | ||
217 | |||
218 | config 842_DECOMPRESS | ||
219 | tristate | ||
220 | |||
215 | config ZLIB_INFLATE | 221 | config ZLIB_INFLATE |
216 | tristate | 222 | tristate |
217 | 223 | ||
@@ -522,4 +528,7 @@ source "lib/fonts/Kconfig" | |||
522 | config ARCH_HAS_SG_CHAIN | 528 | config ARCH_HAS_SG_CHAIN |
523 | def_bool n | 529 | def_bool n |
524 | 530 | ||
531 | config ARCH_HAS_PMEM_API | ||
532 | bool | ||
533 | |||
525 | endmenu | 534 | endmenu |
diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug index 17670573dda8..e2894b23efb6 100644 --- a/lib/Kconfig.debug +++ b/lib/Kconfig.debug | |||
@@ -841,9 +841,14 @@ config SCHED_DEBUG | |||
841 | that can help debug the scheduler. The runtime overhead of this | 841 | that can help debug the scheduler. The runtime overhead of this |
842 | option is minimal. | 842 | option is minimal. |
843 | 843 | ||
844 | config SCHED_INFO | ||
845 | bool | ||
846 | default n | ||
847 | |||
844 | config SCHEDSTATS | 848 | config SCHEDSTATS |
845 | bool "Collect scheduler statistics" | 849 | bool "Collect scheduler statistics" |
846 | depends on DEBUG_KERNEL && PROC_FS | 850 | depends on DEBUG_KERNEL && PROC_FS |
851 | select SCHED_INFO | ||
847 | help | 852 | help |
848 | If you say Y here, additional code will be inserted into the | 853 | If you say Y here, additional code will be inserted into the |
849 | scheduler and related routines to collect statistics about | 854 | scheduler and related routines to collect statistics about |
@@ -1233,6 +1238,7 @@ config RCU_TORTURE_TEST | |||
1233 | depends on DEBUG_KERNEL | 1238 | depends on DEBUG_KERNEL |
1234 | select TORTURE_TEST | 1239 | select TORTURE_TEST |
1235 | select SRCU | 1240 | select SRCU |
1241 | select TASKS_RCU | ||
1236 | default n | 1242 | default n |
1237 | help | 1243 | help |
1238 | This option provides a kernel module that runs torture tests | 1244 | This option provides a kernel module that runs torture tests |
@@ -1261,12 +1267,38 @@ config RCU_TORTURE_TEST_RUNNABLE | |||
1261 | Say N here if you want the RCU torture tests to start only | 1267 | Say N here if you want the RCU torture tests to start only |
1262 | after being manually enabled via /proc. | 1268 | after being manually enabled via /proc. |
1263 | 1269 | ||
1270 | config RCU_TORTURE_TEST_SLOW_PREINIT | ||
1271 | bool "Slow down RCU grace-period pre-initialization to expose races" | ||
1272 | depends on RCU_TORTURE_TEST | ||
1273 | help | ||
1274 | This option delays grace-period pre-initialization (the | ||
1275 | propagation of CPU-hotplug changes up the rcu_node combining | ||
1276 | tree) for a few jiffies between initializing each pair of | ||
1277 | consecutive rcu_node structures. This helps to expose races | ||
1278 | involving grace-period pre-initialization, in other words, it | ||
1279 | makes your kernel less stable. It can also greatly increase | ||
1280 | grace-period latency, especially on systems with large numbers | ||
1281 | of CPUs. This is useful when torture-testing RCU, but in | ||
1282 | almost no other circumstance. | ||
1283 | |||
1284 | Say Y here if you want your system to crash and hang more often. | ||
1285 | Say N if you want a sane system. | ||
1286 | |||
1287 | config RCU_TORTURE_TEST_SLOW_PREINIT_DELAY | ||
1288 | int "How much to slow down RCU grace-period pre-initialization" | ||
1289 | range 0 5 | ||
1290 | default 3 | ||
1291 | depends on RCU_TORTURE_TEST_SLOW_PREINIT | ||
1292 | help | ||
1293 | This option specifies the number of jiffies to wait between | ||
1294 | each rcu_node structure pre-initialization step. | ||
1295 | |||
1264 | config RCU_TORTURE_TEST_SLOW_INIT | 1296 | config RCU_TORTURE_TEST_SLOW_INIT |
1265 | bool "Slow down RCU grace-period initialization to expose races" | 1297 | bool "Slow down RCU grace-period initialization to expose races" |
1266 | depends on RCU_TORTURE_TEST | 1298 | depends on RCU_TORTURE_TEST |
1267 | help | 1299 | help |
1268 | This option makes grace-period initialization block for a | 1300 | This option delays grace-period initialization for a few |
1269 | few jiffies between initializing each pair of consecutive | 1301 | jiffies between initializing each pair of consecutive |
1270 | rcu_node structures. This helps to expose races involving | 1302 | rcu_node structures. This helps to expose races involving |
1271 | grace-period initialization, in other words, it makes your | 1303 | grace-period initialization, in other words, it makes your |
1272 | kernel less stable. It can also greatly increase grace-period | 1304 | kernel less stable. It can also greatly increase grace-period |
@@ -1281,10 +1313,35 @@ config RCU_TORTURE_TEST_SLOW_INIT_DELAY | |||
1281 | int "How much to slow down RCU grace-period initialization" | 1313 | int "How much to slow down RCU grace-period initialization" |
1282 | range 0 5 | 1314 | range 0 5 |
1283 | default 3 | 1315 | default 3 |
1316 | depends on RCU_TORTURE_TEST_SLOW_INIT | ||
1284 | help | 1317 | help |
1285 | This option specifies the number of jiffies to wait between | 1318 | This option specifies the number of jiffies to wait between |
1286 | each rcu_node structure initialization. | 1319 | each rcu_node structure initialization. |
1287 | 1320 | ||
1321 | config RCU_TORTURE_TEST_SLOW_CLEANUP | ||
1322 | bool "Slow down RCU grace-period cleanup to expose races" | ||
1323 | depends on RCU_TORTURE_TEST | ||
1324 | help | ||
1325 | This option delays grace-period cleanup for a few jiffies | ||
1326 | between cleaning up each pair of consecutive rcu_node | ||
1327 | structures. This helps to expose races involving grace-period | ||
1328 | cleanup, in other words, it makes your kernel less stable. | ||
1329 | It can also greatly increase grace-period latency, especially | ||
1330 | on systems with large numbers of CPUs. This is useful when | ||
1331 | torture-testing RCU, but in almost no other circumstance. | ||
1332 | |||
1333 | Say Y here if you want your system to crash and hang more often. | ||
1334 | Say N if you want a sane system. | ||
1335 | |||
1336 | config RCU_TORTURE_TEST_SLOW_CLEANUP_DELAY | ||
1337 | int "How much to slow down RCU grace-period cleanup" | ||
1338 | range 0 5 | ||
1339 | default 3 | ||
1340 | depends on RCU_TORTURE_TEST_SLOW_CLEANUP | ||
1341 | help | ||
1342 | This option specifies the number of jiffies to wait between | ||
1343 | each rcu_node structure cleanup operation. | ||
1344 | |||
1288 | config RCU_CPU_STALL_TIMEOUT | 1345 | config RCU_CPU_STALL_TIMEOUT |
1289 | int "RCU CPU stall timeout in seconds" | 1346 | int "RCU CPU stall timeout in seconds" |
1290 | depends on RCU_STALL_COMMON | 1347 | depends on RCU_STALL_COMMON |
@@ -1321,6 +1378,17 @@ config RCU_TRACE | |||
1321 | Say Y here if you want to enable RCU tracing | 1378 | Say Y here if you want to enable RCU tracing |
1322 | Say N if you are unsure. | 1379 | Say N if you are unsure. |
1323 | 1380 | ||
1381 | config RCU_EQS_DEBUG | ||
1382 | bool "Use this when adding any sort of NO_HZ support to your arch" | ||
1383 | depends on DEBUG_KERNEL | ||
1384 | help | ||
1385 | This option provides consistency checks in RCU's handling of | ||
1386 | NO_HZ. These checks have proven quite helpful in detecting | ||
1387 | bugs in arch-specific NO_HZ code. | ||
1388 | |||
1389 | Say N here if you need ultimate kernel/user switch latencies | ||
1390 | Say Y if you are unsure | ||
1391 | |||
1324 | endmenu # "RCU Debugging" | 1392 | endmenu # "RCU Debugging" |
1325 | 1393 | ||
1326 | config DEBUG_BLOCK_EXT_DEVT | 1394 | config DEBUG_BLOCK_EXT_DEVT |
diff --git a/lib/Kconfig.kasan b/lib/Kconfig.kasan index 4fecaedc80a2..39f24d6721e5 100644 --- a/lib/Kconfig.kasan +++ b/lib/Kconfig.kasan | |||
@@ -10,15 +10,14 @@ config KASAN | |||
10 | help | 10 | help |
11 | Enables kernel address sanitizer - runtime memory debugger, | 11 | Enables kernel address sanitizer - runtime memory debugger, |
12 | designed to find out-of-bounds accesses and use-after-free bugs. | 12 | designed to find out-of-bounds accesses and use-after-free bugs. |
13 | This is strictly debugging feature. It consumes about 1/8 | 13 | This is strictly a debugging feature and it requires a gcc version |
14 | of available memory and brings about ~x3 performance slowdown. | 14 | of 4.9.2 or later. Detection of out of bounds accesses to stack or |
15 | global variables requires gcc 5.0 or later. | ||
16 | This feature consumes about 1/8 of available memory and brings about | ||
17 | ~x3 performance slowdown. | ||
15 | For better error detection enable CONFIG_STACKTRACE, | 18 | For better error detection enable CONFIG_STACKTRACE, |
16 | and add slub_debug=U to boot cmdline. | 19 | and add slub_debug=U to boot cmdline. |
17 | 20 | ||
18 | config KASAN_SHADOW_OFFSET | ||
19 | hex | ||
20 | default 0xdffffc0000000000 if X86_64 | ||
21 | |||
22 | choice | 21 | choice |
23 | prompt "Instrumentation type" | 22 | prompt "Instrumentation type" |
24 | depends on KASAN | 23 | depends on KASAN |
@@ -40,6 +39,7 @@ config KASAN_INLINE | |||
40 | memory accesses. This is faster than outline (in some workloads | 39 | memory accesses. This is faster than outline (in some workloads |
41 | it gives about x2 boost over outline instrumentation), but | 40 | it gives about x2 boost over outline instrumentation), but |
42 | make kernel's .text size much bigger. | 41 | make kernel's .text size much bigger. |
42 | This requires a gcc version of 5.0 or later. | ||
43 | 43 | ||
44 | endchoice | 44 | endchoice |
45 | 45 | ||
diff --git a/lib/Makefile b/lib/Makefile index 6c37933336a0..6897b527581a 100644 --- a/lib/Makefile +++ b/lib/Makefile | |||
@@ -45,6 +45,9 @@ CFLAGS_kobject.o += -DDEBUG | |||
45 | CFLAGS_kobject_uevent.o += -DDEBUG | 45 | CFLAGS_kobject_uevent.o += -DDEBUG |
46 | endif | 46 | endif |
47 | 47 | ||
48 | obj-$(CONFIG_DEBUG_INFO_REDUCED) += debug_info.o | ||
49 | CFLAGS_debug_info.o += $(call cc-option, -femit-struct-debug-detailed=any) | ||
50 | |||
48 | obj-$(CONFIG_GENERIC_IOMAP) += iomap.o | 51 | obj-$(CONFIG_GENERIC_IOMAP) += iomap.o |
49 | obj-$(CONFIG_GENERIC_PCI_IOMAP) += pci_iomap.o | 52 | obj-$(CONFIG_GENERIC_PCI_IOMAP) += pci_iomap.o |
50 | obj-$(CONFIG_HAS_IOMEM) += iomap_copy.o devres.o | 53 | obj-$(CONFIG_HAS_IOMEM) += iomap_copy.o devres.o |
@@ -78,6 +81,8 @@ obj-$(CONFIG_LIBCRC32C) += libcrc32c.o | |||
78 | obj-$(CONFIG_CRC8) += crc8.o | 81 | obj-$(CONFIG_CRC8) += crc8.o |
79 | obj-$(CONFIG_GENERIC_ALLOCATOR) += genalloc.o | 82 | obj-$(CONFIG_GENERIC_ALLOCATOR) += genalloc.o |
80 | 83 | ||
84 | obj-$(CONFIG_842_COMPRESS) += 842/ | ||
85 | obj-$(CONFIG_842_DECOMPRESS) += 842/ | ||
81 | obj-$(CONFIG_ZLIB_INFLATE) += zlib_inflate/ | 86 | obj-$(CONFIG_ZLIB_INFLATE) += zlib_inflate/ |
82 | obj-$(CONFIG_ZLIB_DEFLATE) += zlib_deflate/ | 87 | obj-$(CONFIG_ZLIB_DEFLATE) += zlib_deflate/ |
83 | obj-$(CONFIG_REED_SOLOMON) += reed_solomon/ | 88 | obj-$(CONFIG_REED_SOLOMON) += reed_solomon/ |
diff --git a/lib/bitmap.c b/lib/bitmap.c index 64c0926f5dd8..a578a0189199 100644 --- a/lib/bitmap.c +++ b/lib/bitmap.c | |||
@@ -462,19 +462,20 @@ EXPORT_SYMBOL(bitmap_parse_user); | |||
462 | * Output format is a comma-separated list of decimal numbers and | 462 | * Output format is a comma-separated list of decimal numbers and |
463 | * ranges if list is specified or hex digits grouped into comma-separated | 463 | * ranges if list is specified or hex digits grouped into comma-separated |
464 | * sets of 8 digits/set. Returns the number of characters written to buf. | 464 | * sets of 8 digits/set. Returns the number of characters written to buf. |
465 | * | ||
466 | * It is assumed that @buf is a pointer into a PAGE_SIZE area and that | ||
467 | * sufficient storage remains at @buf to accommodate the | ||
468 | * bitmap_print_to_pagebuf() output. | ||
465 | */ | 469 | */ |
466 | int bitmap_print_to_pagebuf(bool list, char *buf, const unsigned long *maskp, | 470 | int bitmap_print_to_pagebuf(bool list, char *buf, const unsigned long *maskp, |
467 | int nmaskbits) | 471 | int nmaskbits) |
468 | { | 472 | { |
469 | ptrdiff_t len = PTR_ALIGN(buf + PAGE_SIZE - 1, PAGE_SIZE) - buf - 2; | 473 | ptrdiff_t len = PTR_ALIGN(buf + PAGE_SIZE - 1, PAGE_SIZE) - buf; |
470 | int n = 0; | 474 | int n = 0; |
471 | 475 | ||
472 | if (len > 1) { | 476 | if (len > 1) |
473 | n = list ? scnprintf(buf, len, "%*pbl", nmaskbits, maskp) : | 477 | n = list ? scnprintf(buf, len, "%*pbl\n", nmaskbits, maskp) : |
474 | scnprintf(buf, len, "%*pb", nmaskbits, maskp); | 478 | scnprintf(buf, len, "%*pb\n", nmaskbits, maskp); |
475 | buf[n++] = '\n'; | ||
476 | buf[n] = '\0'; | ||
477 | } | ||
478 | return n; | 479 | return n; |
479 | } | 480 | } |
480 | EXPORT_SYMBOL(bitmap_print_to_pagebuf); | 481 | EXPORT_SYMBOL(bitmap_print_to_pagebuf); |
@@ -506,12 +507,12 @@ static int __bitmap_parselist(const char *buf, unsigned int buflen, | |||
506 | unsigned a, b; | 507 | unsigned a, b; |
507 | int c, old_c, totaldigits; | 508 | int c, old_c, totaldigits; |
508 | const char __user __force *ubuf = (const char __user __force *)buf; | 509 | const char __user __force *ubuf = (const char __user __force *)buf; |
509 | int exp_digit, in_range; | 510 | int at_start, in_range; |
510 | 511 | ||
511 | totaldigits = c = 0; | 512 | totaldigits = c = 0; |
512 | bitmap_zero(maskp, nmaskbits); | 513 | bitmap_zero(maskp, nmaskbits); |
513 | do { | 514 | do { |
514 | exp_digit = 1; | 515 | at_start = 1; |
515 | in_range = 0; | 516 | in_range = 0; |
516 | a = b = 0; | 517 | a = b = 0; |
517 | 518 | ||
@@ -540,11 +541,10 @@ static int __bitmap_parselist(const char *buf, unsigned int buflen, | |||
540 | break; | 541 | break; |
541 | 542 | ||
542 | if (c == '-') { | 543 | if (c == '-') { |
543 | if (exp_digit || in_range) | 544 | if (at_start || in_range) |
544 | return -EINVAL; | 545 | return -EINVAL; |
545 | b = 0; | 546 | b = 0; |
546 | in_range = 1; | 547 | in_range = 1; |
547 | exp_digit = 1; | ||
548 | continue; | 548 | continue; |
549 | } | 549 | } |
550 | 550 | ||
@@ -554,16 +554,18 @@ static int __bitmap_parselist(const char *buf, unsigned int buflen, | |||
554 | b = b * 10 + (c - '0'); | 554 | b = b * 10 + (c - '0'); |
555 | if (!in_range) | 555 | if (!in_range) |
556 | a = b; | 556 | a = b; |
557 | exp_digit = 0; | 557 | at_start = 0; |
558 | totaldigits++; | 558 | totaldigits++; |
559 | } | 559 | } |
560 | if (!(a <= b)) | 560 | if (!(a <= b)) |
561 | return -EINVAL; | 561 | return -EINVAL; |
562 | if (b >= nmaskbits) | 562 | if (b >= nmaskbits) |
563 | return -ERANGE; | 563 | return -ERANGE; |
564 | while (a <= b) { | 564 | if (!at_start) { |
565 | set_bit(a, maskp); | 565 | while (a <= b) { |
566 | a++; | 566 | set_bit(a, maskp); |
567 | a++; | ||
568 | } | ||
567 | } | 569 | } |
568 | } while (buflen && c == ','); | 570 | } while (buflen && c == ','); |
569 | return 0; | 571 | return 0; |
@@ -66,7 +66,7 @@ static const struct bug_entry *module_find_bug(unsigned long bugaddr) | |||
66 | struct module *mod; | 66 | struct module *mod; |
67 | const struct bug_entry *bug = NULL; | 67 | const struct bug_entry *bug = NULL; |
68 | 68 | ||
69 | rcu_read_lock(); | 69 | rcu_read_lock_sched(); |
70 | list_for_each_entry_rcu(mod, &module_bug_list, bug_list) { | 70 | list_for_each_entry_rcu(mod, &module_bug_list, bug_list) { |
71 | unsigned i; | 71 | unsigned i; |
72 | 72 | ||
@@ -77,7 +77,7 @@ static const struct bug_entry *module_find_bug(unsigned long bugaddr) | |||
77 | } | 77 | } |
78 | bug = NULL; | 78 | bug = NULL; |
79 | out: | 79 | out: |
80 | rcu_read_unlock(); | 80 | rcu_read_unlock_sched(); |
81 | 81 | ||
82 | return bug; | 82 | return bug; |
83 | } | 83 | } |
@@ -88,6 +88,8 @@ void module_bug_finalize(const Elf_Ehdr *hdr, const Elf_Shdr *sechdrs, | |||
88 | char *secstrings; | 88 | char *secstrings; |
89 | unsigned int i; | 89 | unsigned int i; |
90 | 90 | ||
91 | lockdep_assert_held(&module_mutex); | ||
92 | |||
91 | mod->bug_table = NULL; | 93 | mod->bug_table = NULL; |
92 | mod->num_bugs = 0; | 94 | mod->num_bugs = 0; |
93 | 95 | ||
@@ -113,6 +115,7 @@ void module_bug_finalize(const Elf_Ehdr *hdr, const Elf_Shdr *sechdrs, | |||
113 | 115 | ||
114 | void module_bug_cleanup(struct module *mod) | 116 | void module_bug_cleanup(struct module *mod) |
115 | { | 117 | { |
118 | lockdep_assert_held(&module_mutex); | ||
116 | list_del_rcu(&mod->bug_list); | 119 | list_del_rcu(&mod->bug_list); |
117 | } | 120 | } |
118 | 121 | ||
diff --git a/lib/cpu_rmap.c b/lib/cpu_rmap.c index 4f134d8907a7..f610b2a10b3e 100644 --- a/lib/cpu_rmap.c +++ b/lib/cpu_rmap.c | |||
@@ -191,7 +191,7 @@ int cpu_rmap_update(struct cpu_rmap *rmap, u16 index, | |||
191 | /* Update distances based on topology */ | 191 | /* Update distances based on topology */ |
192 | for_each_cpu(cpu, update_mask) { | 192 | for_each_cpu(cpu, update_mask) { |
193 | if (cpu_rmap_copy_neigh(rmap, cpu, | 193 | if (cpu_rmap_copy_neigh(rmap, cpu, |
194 | topology_thread_cpumask(cpu), 1)) | 194 | topology_sibling_cpumask(cpu), 1)) |
195 | continue; | 195 | continue; |
196 | if (cpu_rmap_copy_neigh(rmap, cpu, | 196 | if (cpu_rmap_copy_neigh(rmap, cpu, |
197 | topology_core_cpumask(cpu), 2)) | 197 | topology_core_cpumask(cpu), 2)) |
diff --git a/lib/cpumask.c b/lib/cpumask.c index 830dd5dec40f..5a70f6196f57 100644 --- a/lib/cpumask.c +++ b/lib/cpumask.c | |||
@@ -16,11 +16,10 @@ | |||
16 | int cpumask_next_and(int n, const struct cpumask *src1p, | 16 | int cpumask_next_and(int n, const struct cpumask *src1p, |
17 | const struct cpumask *src2p) | 17 | const struct cpumask *src2p) |
18 | { | 18 | { |
19 | struct cpumask tmp; | 19 | while ((n = cpumask_next(n, src1p)) < nr_cpu_ids) |
20 | 20 | if (cpumask_test_cpu(n, src2p)) | |
21 | if (cpumask_and(&tmp, src1p, src2p)) | 21 | break; |
22 | return cpumask_next(n, &tmp); | 22 | return n; |
23 | return nr_cpu_ids; | ||
24 | } | 23 | } |
25 | EXPORT_SYMBOL(cpumask_next_and); | 24 | EXPORT_SYMBOL(cpumask_next_and); |
26 | 25 | ||
@@ -139,64 +138,42 @@ void __init free_bootmem_cpumask_var(cpumask_var_t mask) | |||
139 | #endif | 138 | #endif |
140 | 139 | ||
141 | /** | 140 | /** |
142 | * cpumask_set_cpu_local_first - set i'th cpu with local numa cpu's first | 141 | * cpumask_local_spread - select the i'th cpu with local numa cpu's first |
143 | * | ||
144 | * @i: index number | 142 | * @i: index number |
145 | * @numa_node: local numa_node | 143 | * @node: local numa_node |
146 | * @dstp: cpumask with the relevant cpu bit set according to the policy | ||
147 | * | 144 | * |
148 | * This function sets the cpumask according to a numa aware policy. | 145 | * This function selects an online CPU according to a numa aware policy; |
149 | * cpumask could be used as an affinity hint for the IRQ related to a | 146 | * local cpus are returned first, followed by non-local ones, then it |
150 | * queue. When the policy is to spread queues across cores - local cores | 147 | * wraps around. |
151 | * first. | ||
152 | * | 148 | * |
153 | * Returns 0 on success, -ENOMEM for no memory, and -EAGAIN when failed to set | 149 | * It's not very efficient, but useful for setup. |
154 | * the cpu bit and need to re-call the function. | ||
155 | */ | 150 | */ |
156 | int cpumask_set_cpu_local_first(int i, int numa_node, cpumask_t *dstp) | 151 | unsigned int cpumask_local_spread(unsigned int i, int node) |
157 | { | 152 | { |
158 | cpumask_var_t mask; | ||
159 | int cpu; | 153 | int cpu; |
160 | int ret = 0; | ||
161 | |||
162 | if (!zalloc_cpumask_var(&mask, GFP_KERNEL)) | ||
163 | return -ENOMEM; | ||
164 | 154 | ||
155 | /* Wrap: we always want a cpu. */ | ||
165 | i %= num_online_cpus(); | 156 | i %= num_online_cpus(); |
166 | 157 | ||
167 | if (numa_node == -1 || !cpumask_of_node(numa_node)) { | 158 | if (node == -1) { |
168 | /* Use all online cpu's for non numa aware system */ | 159 | for_each_cpu(cpu, cpu_online_mask) |
169 | cpumask_copy(mask, cpu_online_mask); | 160 | if (i-- == 0) |
161 | return cpu; | ||
170 | } else { | 162 | } else { |
171 | int n; | 163 | /* NUMA first. */ |
172 | 164 | for_each_cpu_and(cpu, cpumask_of_node(node), cpu_online_mask) | |
173 | cpumask_and(mask, | 165 | if (i-- == 0) |
174 | cpumask_of_node(numa_node), cpu_online_mask); | 166 | return cpu; |
175 | 167 | ||
176 | n = cpumask_weight(mask); | 168 | for_each_cpu(cpu, cpu_online_mask) { |
177 | if (i >= n) { | 169 | /* Skip NUMA nodes, done above. */ |
178 | i -= n; | 170 | if (cpumask_test_cpu(cpu, cpumask_of_node(node))) |
179 | 171 | continue; | |
180 | /* If index > number of local cpu's, mask out local | 172 | |
181 | * cpu's | 173 | if (i-- == 0) |
182 | */ | 174 | return cpu; |
183 | cpumask_andnot(mask, cpu_online_mask, mask); | ||
184 | } | 175 | } |
185 | } | 176 | } |
186 | 177 | BUG(); | |
187 | for_each_cpu(cpu, mask) { | ||
188 | if (--i < 0) | ||
189 | goto out; | ||
190 | } | ||
191 | |||
192 | ret = -EAGAIN; | ||
193 | |||
194 | out: | ||
195 | free_cpumask_var(mask); | ||
196 | |||
197 | if (!ret) | ||
198 | cpumask_set_cpu(cpu, dstp); | ||
199 | |||
200 | return ret; | ||
201 | } | 178 | } |
202 | EXPORT_SYMBOL(cpumask_set_cpu_local_first); | 179 | EXPORT_SYMBOL(cpumask_local_spread); |
diff --git a/lib/crc-itu-t.c b/lib/crc-itu-t.c index a63472b82416..b3219d0abfb4 100644 --- a/lib/crc-itu-t.c +++ b/lib/crc-itu-t.c | |||
@@ -9,7 +9,7 @@ | |||
9 | #include <linux/module.h> | 9 | #include <linux/module.h> |
10 | #include <linux/crc-itu-t.h> | 10 | #include <linux/crc-itu-t.h> |
11 | 11 | ||
12 | /** CRC table for the CRC ITU-T V.41 0x0x1021 (x^16 + x^12 + x^15 + 1) */ | 12 | /** CRC table for the CRC ITU-T V.41 0x1021 (x^16 + x^12 + x^15 + 1) */ |
13 | const u16 crc_itu_t_table[256] = { | 13 | const u16 crc_itu_t_table[256] = { |
14 | 0x0000, 0x1021, 0x2042, 0x3063, 0x4084, 0x50a5, 0x60c6, 0x70e7, | 14 | 0x0000, 0x1021, 0x2042, 0x3063, 0x4084, 0x50a5, 0x60c6, 0x70e7, |
15 | 0x8108, 0x9129, 0xa14a, 0xb16b, 0xc18c, 0xd1ad, 0xe1ce, 0xf1ef, | 15 | 0x8108, 0x9129, 0xa14a, 0xb16b, 0xc18c, 0xd1ad, 0xe1ce, 0xf1ef, |
diff --git a/lib/crc-t10dif.c b/lib/crc-t10dif.c index dfe6ec17c0a5..1ad33e555805 100644 --- a/lib/crc-t10dif.c +++ b/lib/crc-t10dif.c | |||
@@ -19,7 +19,7 @@ | |||
19 | static struct crypto_shash *crct10dif_tfm; | 19 | static struct crypto_shash *crct10dif_tfm; |
20 | static struct static_key crct10dif_fallback __read_mostly; | 20 | static struct static_key crct10dif_fallback __read_mostly; |
21 | 21 | ||
22 | __u16 crc_t10dif(const unsigned char *buffer, size_t len) | 22 | __u16 crc_t10dif_update(__u16 crc, const unsigned char *buffer, size_t len) |
23 | { | 23 | { |
24 | struct { | 24 | struct { |
25 | struct shash_desc shash; | 25 | struct shash_desc shash; |
@@ -28,17 +28,23 @@ __u16 crc_t10dif(const unsigned char *buffer, size_t len) | |||
28 | int err; | 28 | int err; |
29 | 29 | ||
30 | if (static_key_false(&crct10dif_fallback)) | 30 | if (static_key_false(&crct10dif_fallback)) |
31 | return crc_t10dif_generic(0, buffer, len); | 31 | return crc_t10dif_generic(crc, buffer, len); |
32 | 32 | ||
33 | desc.shash.tfm = crct10dif_tfm; | 33 | desc.shash.tfm = crct10dif_tfm; |
34 | desc.shash.flags = 0; | 34 | desc.shash.flags = 0; |
35 | *(__u16 *)desc.ctx = 0; | 35 | *(__u16 *)desc.ctx = crc; |
36 | 36 | ||
37 | err = crypto_shash_update(&desc.shash, buffer, len); | 37 | err = crypto_shash_update(&desc.shash, buffer, len); |
38 | BUG_ON(err); | 38 | BUG_ON(err); |
39 | 39 | ||
40 | return *(__u16 *)desc.ctx; | 40 | return *(__u16 *)desc.ctx; |
41 | } | 41 | } |
42 | EXPORT_SYMBOL(crc_t10dif_update); | ||
43 | |||
44 | __u16 crc_t10dif(const unsigned char *buffer, size_t len) | ||
45 | { | ||
46 | return crc_t10dif_update(0, buffer, len); | ||
47 | } | ||
42 | EXPORT_SYMBOL(crc_t10dif); | 48 | EXPORT_SYMBOL(crc_t10dif); |
43 | 49 | ||
44 | static int __init crc_t10dif_mod_init(void) | 50 | static int __init crc_t10dif_mod_init(void) |
diff --git a/lib/debug_info.c b/lib/debug_info.c new file mode 100644 index 000000000000..2edbe27517ed --- /dev/null +++ b/lib/debug_info.c | |||
@@ -0,0 +1,27 @@ | |||
1 | /* | ||
2 | * This file exists solely to ensure debug information for some core | ||
3 | * data structures is included in the final image even for | ||
4 | * CONFIG_DEBUG_INFO_REDUCED. Please do not add actual code. However, | ||
5 | * adding appropriate #includes is fine. | ||
6 | */ | ||
7 | #include <stdarg.h> | ||
8 | |||
9 | #include <linux/cred.h> | ||
10 | #include <linux/crypto.h> | ||
11 | #include <linux/dcache.h> | ||
12 | #include <linux/device.h> | ||
13 | #include <linux/fs.h> | ||
14 | #include <linux/fscache-cache.h> | ||
15 | #include <linux/io.h> | ||
16 | #include <linux/kallsyms.h> | ||
17 | #include <linux/kernel.h> | ||
18 | #include <linux/kobject.h> | ||
19 | #include <linux/mm.h> | ||
20 | #include <linux/module.h> | ||
21 | #include <linux/net.h> | ||
22 | #include <linux/sched.h> | ||
23 | #include <linux/slab.h> | ||
24 | #include <linux/types.h> | ||
25 | #include <net/addrconf.h> | ||
26 | #include <net/sock.h> | ||
27 | #include <net/tcp.h> | ||
diff --git a/lib/decompress.c b/lib/decompress.c index 528ff932d8e4..62696dff5730 100644 --- a/lib/decompress.c +++ b/lib/decompress.c | |||
@@ -59,8 +59,11 @@ decompress_fn __init decompress_method(const unsigned char *inbuf, long len, | |||
59 | { | 59 | { |
60 | const struct compress_format *cf; | 60 | const struct compress_format *cf; |
61 | 61 | ||
62 | if (len < 2) | 62 | if (len < 2) { |
63 | if (name) | ||
64 | *name = NULL; | ||
63 | return NULL; /* Need at least this much... */ | 65 | return NULL; /* Need at least this much... */ |
66 | } | ||
64 | 67 | ||
65 | pr_debug("Compressed data magic: %#.2x %#.2x\n", inbuf[0], inbuf[1]); | 68 | pr_debug("Compressed data magic: %#.2x %#.2x\n", inbuf[0], inbuf[1]); |
66 | 69 | ||
diff --git a/lib/dma-debug.c b/lib/dma-debug.c index ae4b65e17e64..dace71fe41f7 100644 --- a/lib/dma-debug.c +++ b/lib/dma-debug.c | |||
@@ -574,6 +574,9 @@ void debug_dma_assert_idle(struct page *page) | |||
574 | unsigned long flags; | 574 | unsigned long flags; |
575 | phys_addr_t cln; | 575 | phys_addr_t cln; |
576 | 576 | ||
577 | if (dma_debug_disabled()) | ||
578 | return; | ||
579 | |||
577 | if (!page) | 580 | if (!page) |
578 | return; | 581 | return; |
579 | 582 | ||
diff --git a/lib/dynamic_debug.c b/lib/dynamic_debug.c index d8f3d3150603..e491e02eff54 100644 --- a/lib/dynamic_debug.c +++ b/lib/dynamic_debug.c | |||
@@ -887,7 +887,7 @@ static int ddebug_dyndbg_param_cb(char *param, char *val, | |||
887 | 887 | ||
888 | /* handle both dyndbg and $module.dyndbg params at boot */ | 888 | /* handle both dyndbg and $module.dyndbg params at boot */ |
889 | static int ddebug_dyndbg_boot_param_cb(char *param, char *val, | 889 | static int ddebug_dyndbg_boot_param_cb(char *param, char *val, |
890 | const char *unused) | 890 | const char *unused, void *arg) |
891 | { | 891 | { |
892 | vpr_info("%s=\"%s\"\n", param, val); | 892 | vpr_info("%s=\"%s\"\n", param, val); |
893 | return ddebug_dyndbg_param_cb(param, val, NULL, 0); | 893 | return ddebug_dyndbg_param_cb(param, val, NULL, 0); |
@@ -1028,7 +1028,7 @@ static int __init dynamic_debug_init(void) | |||
1028 | */ | 1028 | */ |
1029 | cmdline = kstrdup(saved_command_line, GFP_KERNEL); | 1029 | cmdline = kstrdup(saved_command_line, GFP_KERNEL); |
1030 | parse_args("dyndbg params", cmdline, NULL, | 1030 | parse_args("dyndbg params", cmdline, NULL, |
1031 | 0, 0, 0, &ddebug_dyndbg_boot_param_cb); | 1031 | 0, 0, 0, NULL, &ddebug_dyndbg_boot_param_cb); |
1032 | kfree(cmdline); | 1032 | kfree(cmdline); |
1033 | return 0; | 1033 | return 0; |
1034 | 1034 | ||
diff --git a/lib/find_last_bit.c b/lib/find_last_bit.c deleted file mode 100644 index 3e3be40c6a6e..000000000000 --- a/lib/find_last_bit.c +++ /dev/null | |||
@@ -1,41 +0,0 @@ | |||
1 | /* find_last_bit.c: fallback find next bit implementation | ||
2 | * | ||
3 | * Copyright (C) 2008 IBM Corporation | ||
4 | * Written by Rusty Russell <rusty@rustcorp.com.au> | ||
5 | * (Inspired by David Howell's find_next_bit implementation) | ||
6 | * | ||
7 | * Rewritten by Yury Norov <yury.norov@gmail.com> to decrease | ||
8 | * size and improve performance, 2015. | ||
9 | * | ||
10 | * This program is free software; you can redistribute it and/or | ||
11 | * modify it under the terms of the GNU General Public License | ||
12 | * as published by the Free Software Foundation; either version | ||
13 | * 2 of the License, or (at your option) any later version. | ||
14 | */ | ||
15 | |||
16 | #include <linux/bitops.h> | ||
17 | #include <linux/bitmap.h> | ||
18 | #include <linux/export.h> | ||
19 | #include <linux/kernel.h> | ||
20 | |||
21 | #ifndef find_last_bit | ||
22 | |||
23 | unsigned long find_last_bit(const unsigned long *addr, unsigned long size) | ||
24 | { | ||
25 | if (size) { | ||
26 | unsigned long val = BITMAP_LAST_WORD_MASK(size); | ||
27 | unsigned long idx = (size-1) / BITS_PER_LONG; | ||
28 | |||
29 | do { | ||
30 | val &= addr[idx]; | ||
31 | if (val) | ||
32 | return idx * BITS_PER_LONG + __fls(val); | ||
33 | |||
34 | val = ~0ul; | ||
35 | } while (idx--); | ||
36 | } | ||
37 | return size; | ||
38 | } | ||
39 | EXPORT_SYMBOL(find_last_bit); | ||
40 | |||
41 | #endif | ||
diff --git a/lib/genalloc.c b/lib/genalloc.c index d214866eeea2..daf0afb6d979 100644 --- a/lib/genalloc.c +++ b/lib/genalloc.c | |||
@@ -602,12 +602,12 @@ struct gen_pool *devm_gen_pool_create(struct device *dev, int min_alloc_order, | |||
602 | EXPORT_SYMBOL(devm_gen_pool_create); | 602 | EXPORT_SYMBOL(devm_gen_pool_create); |
603 | 603 | ||
604 | /** | 604 | /** |
605 | * dev_get_gen_pool - Obtain the gen_pool (if any) for a device | 605 | * gen_pool_get - Obtain the gen_pool (if any) for a device |
606 | * @dev: device to retrieve the gen_pool from | 606 | * @dev: device to retrieve the gen_pool from |
607 | * | 607 | * |
608 | * Returns the gen_pool for the device if one is present, or NULL. | 608 | * Returns the gen_pool for the device if one is present, or NULL. |
609 | */ | 609 | */ |
610 | struct gen_pool *dev_get_gen_pool(struct device *dev) | 610 | struct gen_pool *gen_pool_get(struct device *dev) |
611 | { | 611 | { |
612 | struct gen_pool **p = devres_find(dev, devm_gen_pool_release, NULL, | 612 | struct gen_pool **p = devres_find(dev, devm_gen_pool_release, NULL, |
613 | NULL); | 613 | NULL); |
@@ -616,11 +616,11 @@ struct gen_pool *dev_get_gen_pool(struct device *dev) | |||
616 | return NULL; | 616 | return NULL; |
617 | return *p; | 617 | return *p; |
618 | } | 618 | } |
619 | EXPORT_SYMBOL_GPL(dev_get_gen_pool); | 619 | EXPORT_SYMBOL_GPL(gen_pool_get); |
620 | 620 | ||
621 | #ifdef CONFIG_OF | 621 | #ifdef CONFIG_OF |
622 | /** | 622 | /** |
623 | * of_get_named_gen_pool - find a pool by phandle property | 623 | * of_gen_pool_get - find a pool by phandle property |
624 | * @np: device node | 624 | * @np: device node |
625 | * @propname: property name containing phandle(s) | 625 | * @propname: property name containing phandle(s) |
626 | * @index: index into the phandle array | 626 | * @index: index into the phandle array |
@@ -629,7 +629,7 @@ EXPORT_SYMBOL_GPL(dev_get_gen_pool); | |||
629 | * address of the device tree node pointed at by the phandle property, | 629 | * address of the device tree node pointed at by the phandle property, |
630 | * or NULL if not found. | 630 | * or NULL if not found. |
631 | */ | 631 | */ |
632 | struct gen_pool *of_get_named_gen_pool(struct device_node *np, | 632 | struct gen_pool *of_gen_pool_get(struct device_node *np, |
633 | const char *propname, int index) | 633 | const char *propname, int index) |
634 | { | 634 | { |
635 | struct platform_device *pdev; | 635 | struct platform_device *pdev; |
@@ -642,7 +642,7 @@ struct gen_pool *of_get_named_gen_pool(struct device_node *np, | |||
642 | of_node_put(np_pool); | 642 | of_node_put(np_pool); |
643 | if (!pdev) | 643 | if (!pdev) |
644 | return NULL; | 644 | return NULL; |
645 | return dev_get_gen_pool(&pdev->dev); | 645 | return gen_pool_get(&pdev->dev); |
646 | } | 646 | } |
647 | EXPORT_SYMBOL_GPL(of_get_named_gen_pool); | 647 | EXPORT_SYMBOL_GPL(of_gen_pool_get); |
648 | #endif /* CONFIG_OF */ | 648 | #endif /* CONFIG_OF */ |
diff --git a/lib/hexdump.c b/lib/hexdump.c index 7ea09699855d..8d74c20d8595 100644 --- a/lib/hexdump.c +++ b/lib/hexdump.c | |||
@@ -11,6 +11,7 @@ | |||
11 | #include <linux/ctype.h> | 11 | #include <linux/ctype.h> |
12 | #include <linux/kernel.h> | 12 | #include <linux/kernel.h> |
13 | #include <linux/export.h> | 13 | #include <linux/export.h> |
14 | #include <asm/unaligned.h> | ||
14 | 15 | ||
15 | const char hex_asc[] = "0123456789abcdef"; | 16 | const char hex_asc[] = "0123456789abcdef"; |
16 | EXPORT_SYMBOL(hex_asc); | 17 | EXPORT_SYMBOL(hex_asc); |
@@ -139,7 +140,7 @@ int hex_dump_to_buffer(const void *buf, size_t len, int rowsize, int groupsize, | |||
139 | for (j = 0; j < ngroups; j++) { | 140 | for (j = 0; j < ngroups; j++) { |
140 | ret = snprintf(linebuf + lx, linebuflen - lx, | 141 | ret = snprintf(linebuf + lx, linebuflen - lx, |
141 | "%s%16.16llx", j ? " " : "", | 142 | "%s%16.16llx", j ? " " : "", |
142 | (unsigned long long)*(ptr8 + j)); | 143 | get_unaligned(ptr8 + j)); |
143 | if (ret >= linebuflen - lx) | 144 | if (ret >= linebuflen - lx) |
144 | goto overflow1; | 145 | goto overflow1; |
145 | lx += ret; | 146 | lx += ret; |
@@ -150,7 +151,7 @@ int hex_dump_to_buffer(const void *buf, size_t len, int rowsize, int groupsize, | |||
150 | for (j = 0; j < ngroups; j++) { | 151 | for (j = 0; j < ngroups; j++) { |
151 | ret = snprintf(linebuf + lx, linebuflen - lx, | 152 | ret = snprintf(linebuf + lx, linebuflen - lx, |
152 | "%s%8.8x", j ? " " : "", | 153 | "%s%8.8x", j ? " " : "", |
153 | *(ptr4 + j)); | 154 | get_unaligned(ptr4 + j)); |
154 | if (ret >= linebuflen - lx) | 155 | if (ret >= linebuflen - lx) |
155 | goto overflow1; | 156 | goto overflow1; |
156 | lx += ret; | 157 | lx += ret; |
@@ -161,7 +162,7 @@ int hex_dump_to_buffer(const void *buf, size_t len, int rowsize, int groupsize, | |||
161 | for (j = 0; j < ngroups; j++) { | 162 | for (j = 0; j < ngroups; j++) { |
162 | ret = snprintf(linebuf + lx, linebuflen - lx, | 163 | ret = snprintf(linebuf + lx, linebuflen - lx, |
163 | "%s%4.4x", j ? " " : "", | 164 | "%s%4.4x", j ? " " : "", |
164 | *(ptr2 + j)); | 165 | get_unaligned(ptr2 + j)); |
165 | if (ret >= linebuflen - lx) | 166 | if (ret >= linebuflen - lx) |
166 | goto overflow1; | 167 | goto overflow1; |
167 | lx += ret; | 168 | lx += ret; |
diff --git a/lib/kobject.c b/lib/kobject.c index 3b841b97fccd..3e3a5c3cb330 100644 --- a/lib/kobject.c +++ b/lib/kobject.c | |||
@@ -257,23 +257,20 @@ static int kobject_add_internal(struct kobject *kobj) | |||
257 | int kobject_set_name_vargs(struct kobject *kobj, const char *fmt, | 257 | int kobject_set_name_vargs(struct kobject *kobj, const char *fmt, |
258 | va_list vargs) | 258 | va_list vargs) |
259 | { | 259 | { |
260 | const char *old_name = kobj->name; | ||
261 | char *s; | 260 | char *s; |
262 | 261 | ||
263 | if (kobj->name && !fmt) | 262 | if (kobj->name && !fmt) |
264 | return 0; | 263 | return 0; |
265 | 264 | ||
266 | kobj->name = kvasprintf(GFP_KERNEL, fmt, vargs); | 265 | s = kvasprintf(GFP_KERNEL, fmt, vargs); |
267 | if (!kobj->name) { | 266 | if (!s) |
268 | kobj->name = old_name; | ||
269 | return -ENOMEM; | 267 | return -ENOMEM; |
270 | } | ||
271 | 268 | ||
272 | /* ewww... some of these buggers have '/' in the name ... */ | 269 | /* ewww... some of these buggers have '/' in the name ... */ |
273 | while ((s = strchr(kobj->name, '/'))) | 270 | strreplace(s, '/', '!'); |
274 | s[0] = '!'; | 271 | kfree(kobj->name); |
272 | kobj->name = s; | ||
275 | 273 | ||
276 | kfree(old_name); | ||
277 | return 0; | 274 | return 0; |
278 | } | 275 | } |
279 | 276 | ||
@@ -340,8 +337,9 @@ error: | |||
340 | } | 337 | } |
341 | EXPORT_SYMBOL(kobject_init); | 338 | EXPORT_SYMBOL(kobject_init); |
342 | 339 | ||
343 | static int kobject_add_varg(struct kobject *kobj, struct kobject *parent, | 340 | static __printf(3, 0) int kobject_add_varg(struct kobject *kobj, |
344 | const char *fmt, va_list vargs) | 341 | struct kobject *parent, |
342 | const char *fmt, va_list vargs) | ||
345 | { | 343 | { |
346 | int retval; | 344 | int retval; |
347 | 345 | ||
@@ -548,6 +546,7 @@ out: | |||
548 | kfree(devpath); | 546 | kfree(devpath); |
549 | return error; | 547 | return error; |
550 | } | 548 | } |
549 | EXPORT_SYMBOL_GPL(kobject_move); | ||
551 | 550 | ||
552 | /** | 551 | /** |
553 | * kobject_del - unlink kobject from hierarchy. | 552 | * kobject_del - unlink kobject from hierarchy. |
diff --git a/lib/list_sort.c b/lib/list_sort.c index b29015102698..3fe401067e20 100644 --- a/lib/list_sort.c +++ b/lib/list_sort.c | |||
@@ -289,5 +289,5 @@ exit: | |||
289 | kfree(elts); | 289 | kfree(elts); |
290 | return err; | 290 | return err; |
291 | } | 291 | } |
292 | module_init(list_sort_test); | 292 | late_initcall(list_sort_test); |
293 | #endif /* CONFIG_TEST_LIST_SORT */ | 293 | #endif /* CONFIG_TEST_LIST_SORT */ |
diff --git a/lib/lz4/lz4_decompress.c b/lib/lz4/lz4_decompress.c index 26cc6029b280..6d940c72b5fc 100644 --- a/lib/lz4/lz4_decompress.c +++ b/lib/lz4/lz4_decompress.c | |||
@@ -140,8 +140,12 @@ static int lz4_uncompress(const char *source, char *dest, int osize) | |||
140 | /* Error: request to write beyond destination buffer */ | 140 | /* Error: request to write beyond destination buffer */ |
141 | if (cpy > oend) | 141 | if (cpy > oend) |
142 | goto _output_error; | 142 | goto _output_error; |
143 | #if LZ4_ARCH64 | ||
144 | if ((ref + COPYLENGTH) > oend) | ||
145 | #else | ||
143 | if ((ref + COPYLENGTH) > oend || | 146 | if ((ref + COPYLENGTH) > oend || |
144 | (op + COPYLENGTH) > oend) | 147 | (op + COPYLENGTH) > oend) |
148 | #endif | ||
145 | goto _output_error; | 149 | goto _output_error; |
146 | LZ4_SECURECOPY(ref, op, (oend - COPYLENGTH)); | 150 | LZ4_SECURECOPY(ref, op, (oend - COPYLENGTH)); |
147 | while (op < cpy) | 151 | while (op < cpy) |
@@ -266,7 +270,13 @@ static int lz4_uncompress_unknownoutputsize(const char *source, char *dest, | |||
266 | if (cpy > oend - COPYLENGTH) { | 270 | if (cpy > oend - COPYLENGTH) { |
267 | if (cpy > oend) | 271 | if (cpy > oend) |
268 | goto _output_error; /* write outside of buf */ | 272 | goto _output_error; /* write outside of buf */ |
269 | 273 | #if LZ4_ARCH64 | |
274 | if ((ref + COPYLENGTH) > oend) | ||
275 | #else | ||
276 | if ((ref + COPYLENGTH) > oend || | ||
277 | (op + COPYLENGTH) > oend) | ||
278 | #endif | ||
279 | goto _output_error; | ||
270 | LZ4_SECURECOPY(ref, op, (oend - COPYLENGTH)); | 280 | LZ4_SECURECOPY(ref, op, (oend - COPYLENGTH)); |
271 | while (op < cpy) | 281 | while (op < cpy) |
272 | *op++ = *ref++; | 282 | *op++ = *ref++; |
diff --git a/lib/mpi/longlong.h b/lib/mpi/longlong.h index aac511417ad1..a89d041592c8 100644 --- a/lib/mpi/longlong.h +++ b/lib/mpi/longlong.h | |||
@@ -639,7 +639,7 @@ do { \ | |||
639 | ************** MIPS ***************** | 639 | ************** MIPS ***************** |
640 | ***************************************/ | 640 | ***************************************/ |
641 | #if defined(__mips__) && W_TYPE_SIZE == 32 | 641 | #if defined(__mips__) && W_TYPE_SIZE == 32 |
642 | #if __GNUC__ >= 4 && __GNUC_MINOR__ >= 4 | 642 | #if (__GNUC__ >= 5) || (__GNUC__ >= 4 && __GNUC_MINOR__ >= 4) |
643 | #define umul_ppmm(w1, w0, u, v) \ | 643 | #define umul_ppmm(w1, w0, u, v) \ |
644 | do { \ | 644 | do { \ |
645 | UDItype __ll = (UDItype)(u) * (v); \ | 645 | UDItype __ll = (UDItype)(u) * (v); \ |
@@ -671,7 +671,7 @@ do { \ | |||
671 | ************** MIPS/64 ************** | 671 | ************** MIPS/64 ************** |
672 | ***************************************/ | 672 | ***************************************/ |
673 | #if (defined(__mips) && __mips >= 3) && W_TYPE_SIZE == 64 | 673 | #if (defined(__mips) && __mips >= 3) && W_TYPE_SIZE == 64 |
674 | #if __GNUC__ >= 4 && __GNUC_MINOR__ >= 4 | 674 | #if (__GNUC__ >= 5) || (__GNUC__ >= 4 && __GNUC_MINOR__ >= 4) |
675 | #define umul_ppmm(w1, w0, u, v) \ | 675 | #define umul_ppmm(w1, w0, u, v) \ |
676 | do { \ | 676 | do { \ |
677 | typedef unsigned int __ll_UTItype __attribute__((mode(TI))); \ | 677 | typedef unsigned int __ll_UTItype __attribute__((mode(TI))); \ |
diff --git a/lib/mpi/mpicoder.c b/lib/mpi/mpicoder.c index 4cc6442733f4..bc0a1da8afba 100644 --- a/lib/mpi/mpicoder.c +++ b/lib/mpi/mpicoder.c | |||
@@ -128,28 +128,36 @@ leave: | |||
128 | } | 128 | } |
129 | EXPORT_SYMBOL_GPL(mpi_read_from_buffer); | 129 | EXPORT_SYMBOL_GPL(mpi_read_from_buffer); |
130 | 130 | ||
131 | /**************** | 131 | /** |
132 | * Return an allocated buffer with the MPI (msb first). | 132 | * mpi_read_buffer() - read MPI to a bufer provided by user (msb first) |
133 | * NBYTES receives the length of this buffer. Caller must free the | 133 | * |
134 | * return string (This function does return a 0 byte buffer with NBYTES | 134 | * @a: a multi precision integer |
135 | * set to zero if the value of A is zero. If sign is not NULL, it will | 135 | * @buf: bufer to which the output will be written to. Needs to be at |
136 | * be set to the sign of the A. | 136 | * leaset mpi_get_size(a) long. |
137 | * @buf_len: size of the buf. | ||
138 | * @nbytes: receives the actual length of the data written. | ||
139 | * @sign: if not NULL, it will be set to the sign of a. | ||
140 | * | ||
141 | * Return: 0 on success or error code in case of error | ||
137 | */ | 142 | */ |
138 | void *mpi_get_buffer(MPI a, unsigned *nbytes, int *sign) | 143 | int mpi_read_buffer(MPI a, uint8_t *buf, unsigned buf_len, unsigned *nbytes, |
144 | int *sign) | ||
139 | { | 145 | { |
140 | uint8_t *p, *buffer; | 146 | uint8_t *p; |
141 | mpi_limb_t alimb; | 147 | mpi_limb_t alimb; |
148 | unsigned int n = mpi_get_size(a); | ||
142 | int i; | 149 | int i; |
143 | unsigned int n; | 150 | |
151 | if (buf_len < n || !buf) | ||
152 | return -EINVAL; | ||
144 | 153 | ||
145 | if (sign) | 154 | if (sign) |
146 | *sign = a->sign; | 155 | *sign = a->sign; |
147 | *nbytes = n = a->nlimbs * BYTES_PER_MPI_LIMB; | 156 | |
148 | if (!n) | 157 | if (nbytes) |
149 | n++; /* avoid zero length allocation */ | 158 | *nbytes = n; |
150 | p = buffer = kmalloc(n, GFP_KERNEL); | 159 | |
151 | if (!p) | 160 | p = buf; |
152 | return NULL; | ||
153 | 161 | ||
154 | for (i = a->nlimbs - 1; i >= 0; i--) { | 162 | for (i = a->nlimbs - 1; i >= 0; i--) { |
155 | alimb = a->d[i]; | 163 | alimb = a->d[i]; |
@@ -171,15 +179,56 @@ void *mpi_get_buffer(MPI a, unsigned *nbytes, int *sign) | |||
171 | #error please implement for this limb size. | 179 | #error please implement for this limb size. |
172 | #endif | 180 | #endif |
173 | } | 181 | } |
182 | return 0; | ||
183 | } | ||
184 | EXPORT_SYMBOL_GPL(mpi_read_buffer); | ||
185 | |||
186 | /* | ||
187 | * mpi_get_buffer() - Returns an allocated buffer with the MPI (msb first). | ||
188 | * Caller must free the return string. | ||
189 | * This function does return a 0 byte buffer with nbytes set to zero if the | ||
190 | * value of A is zero. | ||
191 | * | ||
192 | * @a: a multi precision integer. | ||
193 | * @nbytes: receives the length of this buffer. | ||
194 | * @sign: if not NULL, it will be set to the sign of the a. | ||
195 | * | ||
196 | * Return: Pointer to MPI buffer or NULL on error | ||
197 | */ | ||
198 | void *mpi_get_buffer(MPI a, unsigned *nbytes, int *sign) | ||
199 | { | ||
200 | uint8_t *buf, *p; | ||
201 | unsigned int n; | ||
202 | int ret; | ||
203 | |||
204 | if (!nbytes) | ||
205 | return NULL; | ||
206 | |||
207 | n = mpi_get_size(a); | ||
208 | |||
209 | if (!n) | ||
210 | n++; | ||
211 | |||
212 | buf = kmalloc(n, GFP_KERNEL); | ||
213 | |||
214 | if (!buf) | ||
215 | return NULL; | ||
216 | |||
217 | ret = mpi_read_buffer(a, buf, n, nbytes, sign); | ||
218 | |||
219 | if (ret) { | ||
220 | kfree(buf); | ||
221 | return NULL; | ||
222 | } | ||
174 | 223 | ||
175 | /* this is sub-optimal but we need to do the shift operation | 224 | /* this is sub-optimal but we need to do the shift operation |
176 | * because the caller has to free the returned buffer */ | 225 | * because the caller has to free the returned buffer */ |
177 | for (p = buffer; !*p && *nbytes; p++, --*nbytes) | 226 | for (p = buf; !*p && *nbytes; p++, --*nbytes) |
178 | ; | 227 | ; |
179 | if (p != buffer) | 228 | if (p != buf) |
180 | memmove(buffer, p, *nbytes); | 229 | memmove(buf, p, *nbytes); |
181 | 230 | ||
182 | return buffer; | 231 | return buf; |
183 | } | 232 | } |
184 | EXPORT_SYMBOL_GPL(mpi_get_buffer); | 233 | EXPORT_SYMBOL_GPL(mpi_get_buffer); |
185 | 234 | ||
diff --git a/lib/mpi/mpiutil.c b/lib/mpi/mpiutil.c index bf076d281d40..314f4dfa603e 100644 --- a/lib/mpi/mpiutil.c +++ b/lib/mpi/mpiutil.c | |||
@@ -69,7 +69,7 @@ void mpi_free_limb_space(mpi_ptr_t a) | |||
69 | if (!a) | 69 | if (!a) |
70 | return; | 70 | return; |
71 | 71 | ||
72 | kfree(a); | 72 | kzfree(a); |
73 | } | 73 | } |
74 | 74 | ||
75 | void mpi_assign_limb_space(MPI a, mpi_ptr_t ap, unsigned nlimbs) | 75 | void mpi_assign_limb_space(MPI a, mpi_ptr_t ap, unsigned nlimbs) |
@@ -95,7 +95,7 @@ int mpi_resize(MPI a, unsigned nlimbs) | |||
95 | if (!p) | 95 | if (!p) |
96 | return -ENOMEM; | 96 | return -ENOMEM; |
97 | memcpy(p, a->d, a->alloced * sizeof(mpi_limb_t)); | 97 | memcpy(p, a->d, a->alloced * sizeof(mpi_limb_t)); |
98 | kfree(a->d); | 98 | kzfree(a->d); |
99 | a->d = p; | 99 | a->d = p; |
100 | } else { | 100 | } else { |
101 | a->d = kzalloc(nlimbs * sizeof(mpi_limb_t), GFP_KERNEL); | 101 | a->d = kzalloc(nlimbs * sizeof(mpi_limb_t), GFP_KERNEL); |
@@ -112,7 +112,7 @@ void mpi_free(MPI a) | |||
112 | return; | 112 | return; |
113 | 113 | ||
114 | if (a->flags & 4) | 114 | if (a->flags & 4) |
115 | kfree(a->d); | 115 | kzfree(a->d); |
116 | else | 116 | else |
117 | mpi_free_limb_space(a->d); | 117 | mpi_free_limb_space(a->d); |
118 | 118 | ||
diff --git a/lib/percpu_counter.c b/lib/percpu_counter.c index 48144cdae819..f051d69f0910 100644 --- a/lib/percpu_counter.c +++ b/lib/percpu_counter.c | |||
@@ -197,13 +197,13 @@ static int percpu_counter_hotcpu_callback(struct notifier_block *nb, | |||
197 | * Compare counter against given value. | 197 | * Compare counter against given value. |
198 | * Return 1 if greater, 0 if equal and -1 if less | 198 | * Return 1 if greater, 0 if equal and -1 if less |
199 | */ | 199 | */ |
200 | int percpu_counter_compare(struct percpu_counter *fbc, s64 rhs) | 200 | int __percpu_counter_compare(struct percpu_counter *fbc, s64 rhs, s32 batch) |
201 | { | 201 | { |
202 | s64 count; | 202 | s64 count; |
203 | 203 | ||
204 | count = percpu_counter_read(fbc); | 204 | count = percpu_counter_read(fbc); |
205 | /* Check to see if rough count will be sufficient for comparison */ | 205 | /* Check to see if rough count will be sufficient for comparison */ |
206 | if (abs(count - rhs) > (percpu_counter_batch*num_online_cpus())) { | 206 | if (abs(count - rhs) > (batch * num_online_cpus())) { |
207 | if (count > rhs) | 207 | if (count > rhs) |
208 | return 1; | 208 | return 1; |
209 | else | 209 | else |
@@ -218,7 +218,7 @@ int percpu_counter_compare(struct percpu_counter *fbc, s64 rhs) | |||
218 | else | 218 | else |
219 | return 0; | 219 | return 0; |
220 | } | 220 | } |
221 | EXPORT_SYMBOL(percpu_counter_compare); | 221 | EXPORT_SYMBOL(__percpu_counter_compare); |
222 | 222 | ||
223 | static int __init percpu_counter_startup(void) | 223 | static int __init percpu_counter_startup(void) |
224 | { | 224 | { |
diff --git a/lib/radix-tree.c b/lib/radix-tree.c index 3d2aa27b845b..f9ebe1c82060 100644 --- a/lib/radix-tree.c +++ b/lib/radix-tree.c | |||
@@ -33,7 +33,7 @@ | |||
33 | #include <linux/string.h> | 33 | #include <linux/string.h> |
34 | #include <linux/bitops.h> | 34 | #include <linux/bitops.h> |
35 | #include <linux/rcupdate.h> | 35 | #include <linux/rcupdate.h> |
36 | #include <linux/preempt_mask.h> /* in_interrupt() */ | 36 | #include <linux/preempt.h> /* in_interrupt() */ |
37 | 37 | ||
38 | 38 | ||
39 | /* | 39 | /* |
@@ -65,7 +65,8 @@ static struct kmem_cache *radix_tree_node_cachep; | |||
65 | */ | 65 | */ |
66 | struct radix_tree_preload { | 66 | struct radix_tree_preload { |
67 | int nr; | 67 | int nr; |
68 | struct radix_tree_node *nodes[RADIX_TREE_PRELOAD_SIZE]; | 68 | /* nodes->private_data points to next preallocated node */ |
69 | struct radix_tree_node *nodes; | ||
69 | }; | 70 | }; |
70 | static DEFINE_PER_CPU(struct radix_tree_preload, radix_tree_preloads) = { 0, }; | 71 | static DEFINE_PER_CPU(struct radix_tree_preload, radix_tree_preloads) = { 0, }; |
71 | 72 | ||
@@ -197,8 +198,9 @@ radix_tree_node_alloc(struct radix_tree_root *root) | |||
197 | */ | 198 | */ |
198 | rtp = this_cpu_ptr(&radix_tree_preloads); | 199 | rtp = this_cpu_ptr(&radix_tree_preloads); |
199 | if (rtp->nr) { | 200 | if (rtp->nr) { |
200 | ret = rtp->nodes[rtp->nr - 1]; | 201 | ret = rtp->nodes; |
201 | rtp->nodes[rtp->nr - 1] = NULL; | 202 | rtp->nodes = ret->private_data; |
203 | ret->private_data = NULL; | ||
202 | rtp->nr--; | 204 | rtp->nr--; |
203 | } | 205 | } |
204 | /* | 206 | /* |
@@ -257,17 +259,20 @@ static int __radix_tree_preload(gfp_t gfp_mask) | |||
257 | 259 | ||
258 | preempt_disable(); | 260 | preempt_disable(); |
259 | rtp = this_cpu_ptr(&radix_tree_preloads); | 261 | rtp = this_cpu_ptr(&radix_tree_preloads); |
260 | while (rtp->nr < ARRAY_SIZE(rtp->nodes)) { | 262 | while (rtp->nr < RADIX_TREE_PRELOAD_SIZE) { |
261 | preempt_enable(); | 263 | preempt_enable(); |
262 | node = kmem_cache_alloc(radix_tree_node_cachep, gfp_mask); | 264 | node = kmem_cache_alloc(radix_tree_node_cachep, gfp_mask); |
263 | if (node == NULL) | 265 | if (node == NULL) |
264 | goto out; | 266 | goto out; |
265 | preempt_disable(); | 267 | preempt_disable(); |
266 | rtp = this_cpu_ptr(&radix_tree_preloads); | 268 | rtp = this_cpu_ptr(&radix_tree_preloads); |
267 | if (rtp->nr < ARRAY_SIZE(rtp->nodes)) | 269 | if (rtp->nr < RADIX_TREE_PRELOAD_SIZE) { |
268 | rtp->nodes[rtp->nr++] = node; | 270 | node->private_data = rtp->nodes; |
269 | else | 271 | rtp->nodes = node; |
272 | rtp->nr++; | ||
273 | } else { | ||
270 | kmem_cache_free(radix_tree_node_cachep, node); | 274 | kmem_cache_free(radix_tree_node_cachep, node); |
275 | } | ||
271 | } | 276 | } |
272 | ret = 0; | 277 | ret = 0; |
273 | out: | 278 | out: |
@@ -1463,15 +1468,16 @@ static int radix_tree_callback(struct notifier_block *nfb, | |||
1463 | { | 1468 | { |
1464 | int cpu = (long)hcpu; | 1469 | int cpu = (long)hcpu; |
1465 | struct radix_tree_preload *rtp; | 1470 | struct radix_tree_preload *rtp; |
1471 | struct radix_tree_node *node; | ||
1466 | 1472 | ||
1467 | /* Free per-cpu pool of perloaded nodes */ | 1473 | /* Free per-cpu pool of perloaded nodes */ |
1468 | if (action == CPU_DEAD || action == CPU_DEAD_FROZEN) { | 1474 | if (action == CPU_DEAD || action == CPU_DEAD_FROZEN) { |
1469 | rtp = &per_cpu(radix_tree_preloads, cpu); | 1475 | rtp = &per_cpu(radix_tree_preloads, cpu); |
1470 | while (rtp->nr) { | 1476 | while (rtp->nr) { |
1471 | kmem_cache_free(radix_tree_node_cachep, | 1477 | node = rtp->nodes; |
1472 | rtp->nodes[rtp->nr-1]); | 1478 | rtp->nodes = node->private_data; |
1473 | rtp->nodes[rtp->nr-1] = NULL; | 1479 | kmem_cache_free(radix_tree_node_cachep, node); |
1474 | rtp->nr--; | 1480 | rtp->nr--; |
1475 | } | 1481 | } |
1476 | } | 1482 | } |
1477 | return NOTIFY_OK; | 1483 | return NOTIFY_OK; |
diff --git a/lib/raid6/Makefile b/lib/raid6/Makefile index c7dab0645554..3b10a48fa040 100644 --- a/lib/raid6/Makefile +++ b/lib/raid6/Makefile | |||
@@ -15,7 +15,7 @@ quiet_cmd_unroll = UNROLL $@ | |||
15 | < $< > $@ || ( rm -f $@ && exit 1 ) | 15 | < $< > $@ || ( rm -f $@ && exit 1 ) |
16 | 16 | ||
17 | ifeq ($(CONFIG_ALTIVEC),y) | 17 | ifeq ($(CONFIG_ALTIVEC),y) |
18 | altivec_flags := -maltivec -mabi=altivec | 18 | altivec_flags := -maltivec $(call cc-option,-mabi=altivec) |
19 | endif | 19 | endif |
20 | 20 | ||
21 | # The GCC option -ffreestanding is required in order to compile code containing | 21 | # The GCC option -ffreestanding is required in order to compile code containing |
diff --git a/lib/raid6/x86.h b/lib/raid6/x86.h index b7595484a815..8fe9d9662abb 100644 --- a/lib/raid6/x86.h +++ b/lib/raid6/x86.h | |||
@@ -23,7 +23,7 @@ | |||
23 | 23 | ||
24 | #ifdef __KERNEL__ /* Real code */ | 24 | #ifdef __KERNEL__ /* Real code */ |
25 | 25 | ||
26 | #include <asm/i387.h> | 26 | #include <asm/fpu/api.h> |
27 | 27 | ||
28 | #else /* Dummy code for user space testing */ | 28 | #else /* Dummy code for user space testing */ |
29 | 29 | ||
diff --git a/lib/rbtree.c b/lib/rbtree.c index c16c81a3d430..1356454e36de 100644 --- a/lib/rbtree.c +++ b/lib/rbtree.c | |||
@@ -44,6 +44,30 @@ | |||
44 | * parentheses and have some accompanying text comment. | 44 | * parentheses and have some accompanying text comment. |
45 | */ | 45 | */ |
46 | 46 | ||
47 | /* | ||
48 | * Notes on lockless lookups: | ||
49 | * | ||
50 | * All stores to the tree structure (rb_left and rb_right) must be done using | ||
51 | * WRITE_ONCE(). And we must not inadvertently cause (temporary) loops in the | ||
52 | * tree structure as seen in program order. | ||
53 | * | ||
54 | * These two requirements will allow lockless iteration of the tree -- not | ||
55 | * correct iteration mind you, tree rotations are not atomic so a lookup might | ||
56 | * miss entire subtrees. | ||
57 | * | ||
58 | * But they do guarantee that any such traversal will only see valid elements | ||
59 | * and that it will indeed complete -- does not get stuck in a loop. | ||
60 | * | ||
61 | * It also guarantees that if the lookup returns an element it is the 'correct' | ||
62 | * one. But not returning an element does _NOT_ mean it's not present. | ||
63 | * | ||
64 | * NOTE: | ||
65 | * | ||
66 | * Stores to __rb_parent_color are not important for simple lookups so those | ||
67 | * are left undone as of now. Nor did I check for loops involving parent | ||
68 | * pointers. | ||
69 | */ | ||
70 | |||
47 | static inline void rb_set_black(struct rb_node *rb) | 71 | static inline void rb_set_black(struct rb_node *rb) |
48 | { | 72 | { |
49 | rb->__rb_parent_color |= RB_BLACK; | 73 | rb->__rb_parent_color |= RB_BLACK; |
@@ -129,8 +153,9 @@ __rb_insert(struct rb_node *node, struct rb_root *root, | |||
129 | * This still leaves us in violation of 4), the | 153 | * This still leaves us in violation of 4), the |
130 | * continuation into Case 3 will fix that. | 154 | * continuation into Case 3 will fix that. |
131 | */ | 155 | */ |
132 | parent->rb_right = tmp = node->rb_left; | 156 | tmp = node->rb_left; |
133 | node->rb_left = parent; | 157 | WRITE_ONCE(parent->rb_right, tmp); |
158 | WRITE_ONCE(node->rb_left, parent); | ||
134 | if (tmp) | 159 | if (tmp) |
135 | rb_set_parent_color(tmp, parent, | 160 | rb_set_parent_color(tmp, parent, |
136 | RB_BLACK); | 161 | RB_BLACK); |
@@ -149,8 +174,8 @@ __rb_insert(struct rb_node *node, struct rb_root *root, | |||
149 | * / \ | 174 | * / \ |
150 | * n U | 175 | * n U |
151 | */ | 176 | */ |
152 | gparent->rb_left = tmp; /* == parent->rb_right */ | 177 | WRITE_ONCE(gparent->rb_left, tmp); /* == parent->rb_right */ |
153 | parent->rb_right = gparent; | 178 | WRITE_ONCE(parent->rb_right, gparent); |
154 | if (tmp) | 179 | if (tmp) |
155 | rb_set_parent_color(tmp, gparent, RB_BLACK); | 180 | rb_set_parent_color(tmp, gparent, RB_BLACK); |
156 | __rb_rotate_set_parents(gparent, parent, root, RB_RED); | 181 | __rb_rotate_set_parents(gparent, parent, root, RB_RED); |
@@ -171,8 +196,9 @@ __rb_insert(struct rb_node *node, struct rb_root *root, | |||
171 | tmp = parent->rb_left; | 196 | tmp = parent->rb_left; |
172 | if (node == tmp) { | 197 | if (node == tmp) { |
173 | /* Case 2 - right rotate at parent */ | 198 | /* Case 2 - right rotate at parent */ |
174 | parent->rb_left = tmp = node->rb_right; | 199 | tmp = node->rb_right; |
175 | node->rb_right = parent; | 200 | WRITE_ONCE(parent->rb_left, tmp); |
201 | WRITE_ONCE(node->rb_right, parent); | ||
176 | if (tmp) | 202 | if (tmp) |
177 | rb_set_parent_color(tmp, parent, | 203 | rb_set_parent_color(tmp, parent, |
178 | RB_BLACK); | 204 | RB_BLACK); |
@@ -183,8 +209,8 @@ __rb_insert(struct rb_node *node, struct rb_root *root, | |||
183 | } | 209 | } |
184 | 210 | ||
185 | /* Case 3 - left rotate at gparent */ | 211 | /* Case 3 - left rotate at gparent */ |
186 | gparent->rb_right = tmp; /* == parent->rb_left */ | 212 | WRITE_ONCE(gparent->rb_right, tmp); /* == parent->rb_left */ |
187 | parent->rb_left = gparent; | 213 | WRITE_ONCE(parent->rb_left, gparent); |
188 | if (tmp) | 214 | if (tmp) |
189 | rb_set_parent_color(tmp, gparent, RB_BLACK); | 215 | rb_set_parent_color(tmp, gparent, RB_BLACK); |
190 | __rb_rotate_set_parents(gparent, parent, root, RB_RED); | 216 | __rb_rotate_set_parents(gparent, parent, root, RB_RED); |
@@ -224,8 +250,9 @@ ____rb_erase_color(struct rb_node *parent, struct rb_root *root, | |||
224 | * / \ / \ | 250 | * / \ / \ |
225 | * Sl Sr N Sl | 251 | * Sl Sr N Sl |
226 | */ | 252 | */ |
227 | parent->rb_right = tmp1 = sibling->rb_left; | 253 | tmp1 = sibling->rb_left; |
228 | sibling->rb_left = parent; | 254 | WRITE_ONCE(parent->rb_right, tmp1); |
255 | WRITE_ONCE(sibling->rb_left, parent); | ||
229 | rb_set_parent_color(tmp1, parent, RB_BLACK); | 256 | rb_set_parent_color(tmp1, parent, RB_BLACK); |
230 | __rb_rotate_set_parents(parent, sibling, root, | 257 | __rb_rotate_set_parents(parent, sibling, root, |
231 | RB_RED); | 258 | RB_RED); |
@@ -275,9 +302,10 @@ ____rb_erase_color(struct rb_node *parent, struct rb_root *root, | |||
275 | * \ | 302 | * \ |
276 | * Sr | 303 | * Sr |
277 | */ | 304 | */ |
278 | sibling->rb_left = tmp1 = tmp2->rb_right; | 305 | tmp1 = tmp2->rb_right; |
279 | tmp2->rb_right = sibling; | 306 | WRITE_ONCE(sibling->rb_left, tmp1); |
280 | parent->rb_right = tmp2; | 307 | WRITE_ONCE(tmp2->rb_right, sibling); |
308 | WRITE_ONCE(parent->rb_right, tmp2); | ||
281 | if (tmp1) | 309 | if (tmp1) |
282 | rb_set_parent_color(tmp1, sibling, | 310 | rb_set_parent_color(tmp1, sibling, |
283 | RB_BLACK); | 311 | RB_BLACK); |
@@ -297,8 +325,9 @@ ____rb_erase_color(struct rb_node *parent, struct rb_root *root, | |||
297 | * / \ / \ | 325 | * / \ / \ |
298 | * (sl) sr N (sl) | 326 | * (sl) sr N (sl) |
299 | */ | 327 | */ |
300 | parent->rb_right = tmp2 = sibling->rb_left; | 328 | tmp2 = sibling->rb_left; |
301 | sibling->rb_left = parent; | 329 | WRITE_ONCE(parent->rb_right, tmp2); |
330 | WRITE_ONCE(sibling->rb_left, parent); | ||
302 | rb_set_parent_color(tmp1, sibling, RB_BLACK); | 331 | rb_set_parent_color(tmp1, sibling, RB_BLACK); |
303 | if (tmp2) | 332 | if (tmp2) |
304 | rb_set_parent(tmp2, parent); | 333 | rb_set_parent(tmp2, parent); |
@@ -310,8 +339,9 @@ ____rb_erase_color(struct rb_node *parent, struct rb_root *root, | |||
310 | sibling = parent->rb_left; | 339 | sibling = parent->rb_left; |
311 | if (rb_is_red(sibling)) { | 340 | if (rb_is_red(sibling)) { |
312 | /* Case 1 - right rotate at parent */ | 341 | /* Case 1 - right rotate at parent */ |
313 | parent->rb_left = tmp1 = sibling->rb_right; | 342 | tmp1 = sibling->rb_right; |
314 | sibling->rb_right = parent; | 343 | WRITE_ONCE(parent->rb_left, tmp1); |
344 | WRITE_ONCE(sibling->rb_right, parent); | ||
315 | rb_set_parent_color(tmp1, parent, RB_BLACK); | 345 | rb_set_parent_color(tmp1, parent, RB_BLACK); |
316 | __rb_rotate_set_parents(parent, sibling, root, | 346 | __rb_rotate_set_parents(parent, sibling, root, |
317 | RB_RED); | 347 | RB_RED); |
@@ -336,9 +366,10 @@ ____rb_erase_color(struct rb_node *parent, struct rb_root *root, | |||
336 | break; | 366 | break; |
337 | } | 367 | } |
338 | /* Case 3 - right rotate at sibling */ | 368 | /* Case 3 - right rotate at sibling */ |
339 | sibling->rb_right = tmp1 = tmp2->rb_left; | 369 | tmp1 = tmp2->rb_left; |
340 | tmp2->rb_left = sibling; | 370 | WRITE_ONCE(sibling->rb_right, tmp1); |
341 | parent->rb_left = tmp2; | 371 | WRITE_ONCE(tmp2->rb_left, sibling); |
372 | WRITE_ONCE(parent->rb_left, tmp2); | ||
342 | if (tmp1) | 373 | if (tmp1) |
343 | rb_set_parent_color(tmp1, sibling, | 374 | rb_set_parent_color(tmp1, sibling, |
344 | RB_BLACK); | 375 | RB_BLACK); |
@@ -347,8 +378,9 @@ ____rb_erase_color(struct rb_node *parent, struct rb_root *root, | |||
347 | sibling = tmp2; | 378 | sibling = tmp2; |
348 | } | 379 | } |
349 | /* Case 4 - left rotate at parent + color flips */ | 380 | /* Case 4 - left rotate at parent + color flips */ |
350 | parent->rb_left = tmp2 = sibling->rb_right; | 381 | tmp2 = sibling->rb_right; |
351 | sibling->rb_right = parent; | 382 | WRITE_ONCE(parent->rb_left, tmp2); |
383 | WRITE_ONCE(sibling->rb_right, parent); | ||
352 | rb_set_parent_color(tmp1, sibling, RB_BLACK); | 384 | rb_set_parent_color(tmp1, sibling, RB_BLACK); |
353 | if (tmp2) | 385 | if (tmp2) |
354 | rb_set_parent(tmp2, parent); | 386 | rb_set_parent(tmp2, parent); |
diff --git a/lib/rhashtable.c b/lib/rhashtable.c index 4898442b837f..cc0c69710dcf 100644 --- a/lib/rhashtable.c +++ b/lib/rhashtable.c | |||
@@ -14,6 +14,7 @@ | |||
14 | * published by the Free Software Foundation. | 14 | * published by the Free Software Foundation. |
15 | */ | 15 | */ |
16 | 16 | ||
17 | #include <linux/atomic.h> | ||
17 | #include <linux/kernel.h> | 18 | #include <linux/kernel.h> |
18 | #include <linux/init.h> | 19 | #include <linux/init.h> |
19 | #include <linux/log2.h> | 20 | #include <linux/log2.h> |
@@ -25,6 +26,7 @@ | |||
25 | #include <linux/random.h> | 26 | #include <linux/random.h> |
26 | #include <linux/rhashtable.h> | 27 | #include <linux/rhashtable.h> |
27 | #include <linux/err.h> | 28 | #include <linux/err.h> |
29 | #include <linux/export.h> | ||
28 | 30 | ||
29 | #define HASH_DEFAULT_SIZE 64UL | 31 | #define HASH_DEFAULT_SIZE 64UL |
30 | #define HASH_MIN_SIZE 4U | 32 | #define HASH_MIN_SIZE 4U |
@@ -405,13 +407,18 @@ int rhashtable_insert_rehash(struct rhashtable *ht) | |||
405 | 407 | ||
406 | if (rht_grow_above_75(ht, tbl)) | 408 | if (rht_grow_above_75(ht, tbl)) |
407 | size *= 2; | 409 | size *= 2; |
408 | /* More than two rehashes (not resizes) detected. */ | 410 | /* Do not schedule more than one rehash */ |
409 | else if (WARN_ON(old_tbl != tbl && old_tbl->size == size)) | 411 | else if (old_tbl != tbl) |
410 | return -EBUSY; | 412 | return -EBUSY; |
411 | 413 | ||
412 | new_tbl = bucket_table_alloc(ht, size, GFP_ATOMIC); | 414 | new_tbl = bucket_table_alloc(ht, size, GFP_ATOMIC); |
413 | if (new_tbl == NULL) | 415 | if (new_tbl == NULL) { |
416 | /* Schedule async resize/rehash to try allocation | ||
417 | * non-atomic context. | ||
418 | */ | ||
419 | schedule_work(&ht->run_work); | ||
414 | return -ENOMEM; | 420 | return -ENOMEM; |
421 | } | ||
415 | 422 | ||
416 | err = rhashtable_rehash_attach(ht, tbl, new_tbl); | 423 | err = rhashtable_rehash_attach(ht, tbl, new_tbl); |
417 | if (err) { | 424 | if (err) { |
@@ -441,6 +448,10 @@ int rhashtable_insert_slow(struct rhashtable *ht, const void *key, | |||
441 | if (key && rhashtable_lookup_fast(ht, key, ht->p)) | 448 | if (key && rhashtable_lookup_fast(ht, key, ht->p)) |
442 | goto exit; | 449 | goto exit; |
443 | 450 | ||
451 | err = -E2BIG; | ||
452 | if (unlikely(rht_grow_above_max(ht, tbl))) | ||
453 | goto exit; | ||
454 | |||
444 | err = -EAGAIN; | 455 | err = -EAGAIN; |
445 | if (rhashtable_check_elasticity(ht, tbl, hash) || | 456 | if (rhashtable_check_elasticity(ht, tbl, hash) || |
446 | rht_grow_above_100(ht, tbl)) | 457 | rht_grow_above_100(ht, tbl)) |
@@ -574,7 +585,6 @@ void *rhashtable_walk_next(struct rhashtable_iter *iter) | |||
574 | struct bucket_table *tbl = iter->walker->tbl; | 585 | struct bucket_table *tbl = iter->walker->tbl; |
575 | struct rhashtable *ht = iter->ht; | 586 | struct rhashtable *ht = iter->ht; |
576 | struct rhash_head *p = iter->p; | 587 | struct rhash_head *p = iter->p; |
577 | void *obj = NULL; | ||
578 | 588 | ||
579 | if (p) { | 589 | if (p) { |
580 | p = rht_dereference_bucket_rcu(p->next, tbl, iter->slot); | 590 | p = rht_dereference_bucket_rcu(p->next, tbl, iter->slot); |
@@ -594,13 +604,14 @@ next: | |||
594 | if (!rht_is_a_nulls(p)) { | 604 | if (!rht_is_a_nulls(p)) { |
595 | iter->skip++; | 605 | iter->skip++; |
596 | iter->p = p; | 606 | iter->p = p; |
597 | obj = rht_obj(ht, p); | 607 | return rht_obj(ht, p); |
598 | goto out; | ||
599 | } | 608 | } |
600 | 609 | ||
601 | iter->skip = 0; | 610 | iter->skip = 0; |
602 | } | 611 | } |
603 | 612 | ||
613 | iter->p = NULL; | ||
614 | |||
604 | /* Ensure we see any new tables. */ | 615 | /* Ensure we see any new tables. */ |
605 | smp_rmb(); | 616 | smp_rmb(); |
606 | 617 | ||
@@ -611,11 +622,7 @@ next: | |||
611 | return ERR_PTR(-EAGAIN); | 622 | return ERR_PTR(-EAGAIN); |
612 | } | 623 | } |
613 | 624 | ||
614 | iter->p = NULL; | 625 | return NULL; |
615 | |||
616 | out: | ||
617 | |||
618 | return obj; | ||
619 | } | 626 | } |
620 | EXPORT_SYMBOL_GPL(rhashtable_walk_next); | 627 | EXPORT_SYMBOL_GPL(rhashtable_walk_next); |
621 | 628 | ||
@@ -733,6 +740,12 @@ int rhashtable_init(struct rhashtable *ht, | |||
733 | if (params->max_size) | 740 | if (params->max_size) |
734 | ht->p.max_size = rounddown_pow_of_two(params->max_size); | 741 | ht->p.max_size = rounddown_pow_of_two(params->max_size); |
735 | 742 | ||
743 | if (params->insecure_max_entries) | ||
744 | ht->p.insecure_max_entries = | ||
745 | rounddown_pow_of_two(params->insecure_max_entries); | ||
746 | else | ||
747 | ht->p.insecure_max_entries = ht->p.max_size * 2; | ||
748 | |||
736 | ht->p.min_size = max(ht->p.min_size, HASH_MIN_SIZE); | 749 | ht->p.min_size = max(ht->p.min_size, HASH_MIN_SIZE); |
737 | 750 | ||
738 | /* The maximum (not average) chain length grows with the | 751 | /* The maximum (not average) chain length grows with the |
diff --git a/lib/scatterlist.c b/lib/scatterlist.c index c9f2e8c6ccc9..d105a9f56878 100644 --- a/lib/scatterlist.c +++ b/lib/scatterlist.c | |||
@@ -56,6 +56,38 @@ int sg_nents(struct scatterlist *sg) | |||
56 | } | 56 | } |
57 | EXPORT_SYMBOL(sg_nents); | 57 | EXPORT_SYMBOL(sg_nents); |
58 | 58 | ||
59 | /** | ||
60 | * sg_nents_for_len - return total count of entries in scatterlist | ||
61 | * needed to satisfy the supplied length | ||
62 | * @sg: The scatterlist | ||
63 | * @len: The total required length | ||
64 | * | ||
65 | * Description: | ||
66 | * Determines the number of entries in sg that are required to meet | ||
67 | * the supplied length, taking into acount chaining as well | ||
68 | * | ||
69 | * Returns: | ||
70 | * the number of sg entries needed, negative error on failure | ||
71 | * | ||
72 | **/ | ||
73 | int sg_nents_for_len(struct scatterlist *sg, u64 len) | ||
74 | { | ||
75 | int nents; | ||
76 | u64 total; | ||
77 | |||
78 | if (!len) | ||
79 | return 0; | ||
80 | |||
81 | for (nents = 0, total = 0; sg; sg = sg_next(sg)) { | ||
82 | nents++; | ||
83 | total += sg->length; | ||
84 | if (total >= len) | ||
85 | return nents; | ||
86 | } | ||
87 | |||
88 | return -EINVAL; | ||
89 | } | ||
90 | EXPORT_SYMBOL(sg_nents_for_len); | ||
59 | 91 | ||
60 | /** | 92 | /** |
61 | * sg_last - return the last scatterlist entry in a list | 93 | * sg_last - return the last scatterlist entry in a list |
@@ -618,9 +650,8 @@ EXPORT_SYMBOL(sg_miter_stop); | |||
618 | * Returns the number of copied bytes. | 650 | * Returns the number of copied bytes. |
619 | * | 651 | * |
620 | **/ | 652 | **/ |
621 | static size_t sg_copy_buffer(struct scatterlist *sgl, unsigned int nents, | 653 | size_t sg_copy_buffer(struct scatterlist *sgl, unsigned int nents, void *buf, |
622 | void *buf, size_t buflen, off_t skip, | 654 | size_t buflen, off_t skip, bool to_buffer) |
623 | bool to_buffer) | ||
624 | { | 655 | { |
625 | unsigned int offset = 0; | 656 | unsigned int offset = 0; |
626 | struct sg_mapping_iter miter; | 657 | struct sg_mapping_iter miter; |
@@ -657,6 +688,7 @@ static size_t sg_copy_buffer(struct scatterlist *sgl, unsigned int nents, | |||
657 | local_irq_restore(flags); | 688 | local_irq_restore(flags); |
658 | return offset; | 689 | return offset; |
659 | } | 690 | } |
691 | EXPORT_SYMBOL(sg_copy_buffer); | ||
660 | 692 | ||
661 | /** | 693 | /** |
662 | * sg_copy_from_buffer - Copy from a linear buffer to an SG list | 694 | * sg_copy_from_buffer - Copy from a linear buffer to an SG list |
@@ -669,9 +701,9 @@ static size_t sg_copy_buffer(struct scatterlist *sgl, unsigned int nents, | |||
669 | * | 701 | * |
670 | **/ | 702 | **/ |
671 | size_t sg_copy_from_buffer(struct scatterlist *sgl, unsigned int nents, | 703 | size_t sg_copy_from_buffer(struct scatterlist *sgl, unsigned int nents, |
672 | void *buf, size_t buflen) | 704 | const void *buf, size_t buflen) |
673 | { | 705 | { |
674 | return sg_copy_buffer(sgl, nents, buf, buflen, 0, false); | 706 | return sg_copy_buffer(sgl, nents, (void *)buf, buflen, 0, false); |
675 | } | 707 | } |
676 | EXPORT_SYMBOL(sg_copy_from_buffer); | 708 | EXPORT_SYMBOL(sg_copy_from_buffer); |
677 | 709 | ||
@@ -697,16 +729,16 @@ EXPORT_SYMBOL(sg_copy_to_buffer); | |||
697 | * @sgl: The SG list | 729 | * @sgl: The SG list |
698 | * @nents: Number of SG entries | 730 | * @nents: Number of SG entries |
699 | * @buf: Where to copy from | 731 | * @buf: Where to copy from |
700 | * @skip: Number of bytes to skip before copying | ||
701 | * @buflen: The number of bytes to copy | 732 | * @buflen: The number of bytes to copy |
733 | * @skip: Number of bytes to skip before copying | ||
702 | * | 734 | * |
703 | * Returns the number of copied bytes. | 735 | * Returns the number of copied bytes. |
704 | * | 736 | * |
705 | **/ | 737 | **/ |
706 | size_t sg_pcopy_from_buffer(struct scatterlist *sgl, unsigned int nents, | 738 | size_t sg_pcopy_from_buffer(struct scatterlist *sgl, unsigned int nents, |
707 | void *buf, size_t buflen, off_t skip) | 739 | const void *buf, size_t buflen, off_t skip) |
708 | { | 740 | { |
709 | return sg_copy_buffer(sgl, nents, buf, buflen, skip, false); | 741 | return sg_copy_buffer(sgl, nents, (void *)buf, buflen, skip, false); |
710 | } | 742 | } |
711 | EXPORT_SYMBOL(sg_pcopy_from_buffer); | 743 | EXPORT_SYMBOL(sg_pcopy_from_buffer); |
712 | 744 | ||
@@ -715,8 +747,8 @@ EXPORT_SYMBOL(sg_pcopy_from_buffer); | |||
715 | * @sgl: The SG list | 747 | * @sgl: The SG list |
716 | * @nents: Number of SG entries | 748 | * @nents: Number of SG entries |
717 | * @buf: Where to copy to | 749 | * @buf: Where to copy to |
718 | * @skip: Number of bytes to skip before copying | ||
719 | * @buflen: The number of bytes to copy | 750 | * @buflen: The number of bytes to copy |
751 | * @skip: Number of bytes to skip before copying | ||
720 | * | 752 | * |
721 | * Returns the number of copied bytes. | 753 | * Returns the number of copied bytes. |
722 | * | 754 | * |
diff --git a/lib/sort.c b/lib/sort.c index 43c9fe73ae2e..fc20df42aa6f 100644 --- a/lib/sort.c +++ b/lib/sort.c | |||
@@ -8,6 +8,12 @@ | |||
8 | #include <linux/export.h> | 8 | #include <linux/export.h> |
9 | #include <linux/sort.h> | 9 | #include <linux/sort.h> |
10 | 10 | ||
11 | static int alignment_ok(const void *base, int align) | ||
12 | { | ||
13 | return IS_ENABLED(CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS) || | ||
14 | ((unsigned long)base & (align - 1)) == 0; | ||
15 | } | ||
16 | |||
11 | static void u32_swap(void *a, void *b, int size) | 17 | static void u32_swap(void *a, void *b, int size) |
12 | { | 18 | { |
13 | u32 t = *(u32 *)a; | 19 | u32 t = *(u32 *)a; |
@@ -15,6 +21,13 @@ static void u32_swap(void *a, void *b, int size) | |||
15 | *(u32 *)b = t; | 21 | *(u32 *)b = t; |
16 | } | 22 | } |
17 | 23 | ||
24 | static void u64_swap(void *a, void *b, int size) | ||
25 | { | ||
26 | u64 t = *(u64 *)a; | ||
27 | *(u64 *)a = *(u64 *)b; | ||
28 | *(u64 *)b = t; | ||
29 | } | ||
30 | |||
18 | static void generic_swap(void *a, void *b, int size) | 31 | static void generic_swap(void *a, void *b, int size) |
19 | { | 32 | { |
20 | char t; | 33 | char t; |
@@ -50,8 +63,14 @@ void sort(void *base, size_t num, size_t size, | |||
50 | /* pre-scale counters for performance */ | 63 | /* pre-scale counters for performance */ |
51 | int i = (num/2 - 1) * size, n = num * size, c, r; | 64 | int i = (num/2 - 1) * size, n = num * size, c, r; |
52 | 65 | ||
53 | if (!swap_func) | 66 | if (!swap_func) { |
54 | swap_func = (size == 4 ? u32_swap : generic_swap); | 67 | if (size == 4 && alignment_ok(base, 4)) |
68 | swap_func = u32_swap; | ||
69 | else if (size == 8 && alignment_ok(base, 8)) | ||
70 | swap_func = u64_swap; | ||
71 | else | ||
72 | swap_func = generic_swap; | ||
73 | } | ||
55 | 74 | ||
56 | /* heapify */ | 75 | /* heapify */ |
57 | for ( ; i >= 0; i -= size) { | 76 | for ( ; i >= 0; i -= size) { |
diff --git a/lib/string.c b/lib/string.c index a5792019193c..13d1e84ddb80 100644 --- a/lib/string.c +++ b/lib/string.c | |||
@@ -607,7 +607,7 @@ EXPORT_SYMBOL(memset); | |||
607 | void memzero_explicit(void *s, size_t count) | 607 | void memzero_explicit(void *s, size_t count) |
608 | { | 608 | { |
609 | memset(s, 0, count); | 609 | memset(s, 0, count); |
610 | barrier(); | 610 | barrier_data(s); |
611 | } | 611 | } |
612 | EXPORT_SYMBOL(memzero_explicit); | 612 | EXPORT_SYMBOL(memzero_explicit); |
613 | 613 | ||
@@ -849,3 +849,20 @@ void *memchr_inv(const void *start, int c, size_t bytes) | |||
849 | return check_bytes8(start, value, bytes % 8); | 849 | return check_bytes8(start, value, bytes % 8); |
850 | } | 850 | } |
851 | EXPORT_SYMBOL(memchr_inv); | 851 | EXPORT_SYMBOL(memchr_inv); |
852 | |||
853 | /** | ||
854 | * strreplace - Replace all occurrences of character in string. | ||
855 | * @s: The string to operate on. | ||
856 | * @old: The character being replaced. | ||
857 | * @new: The character @old is replaced with. | ||
858 | * | ||
859 | * Returns pointer to the nul byte at the end of @s. | ||
860 | */ | ||
861 | char *strreplace(char *s, char old, char new) | ||
862 | { | ||
863 | for (; *s; ++s) | ||
864 | if (*s == old) | ||
865 | *s = new; | ||
866 | return s; | ||
867 | } | ||
868 | EXPORT_SYMBOL(strreplace); | ||
diff --git a/lib/strnlen_user.c b/lib/strnlen_user.c index a28df5206d95..3a5f2b366d84 100644 --- a/lib/strnlen_user.c +++ b/lib/strnlen_user.c | |||
@@ -57,7 +57,8 @@ static inline long do_strnlen_user(const char __user *src, unsigned long count, | |||
57 | return res + find_zero(data) + 1 - align; | 57 | return res + find_zero(data) + 1 - align; |
58 | } | 58 | } |
59 | res += sizeof(unsigned long); | 59 | res += sizeof(unsigned long); |
60 | if (unlikely(max < sizeof(unsigned long))) | 60 | /* We already handled 'unsigned long' bytes. Did we do it all ? */ |
61 | if (unlikely(max <= sizeof(unsigned long))) | ||
61 | break; | 62 | break; |
62 | max -= sizeof(unsigned long); | 63 | max -= sizeof(unsigned long); |
63 | if (unlikely(__get_user(c,(unsigned long __user *)(src+res)))) | 64 | if (unlikely(__get_user(c,(unsigned long __user *)(src+res)))) |
@@ -84,13 +85,21 @@ static inline long do_strnlen_user(const char __user *src, unsigned long count, | |||
84 | * @str: The string to measure. | 85 | * @str: The string to measure. |
85 | * @count: Maximum count (including NUL character) | 86 | * @count: Maximum count (including NUL character) |
86 | * | 87 | * |
87 | * Context: User context only. This function may sleep. | 88 | * Context: User context only. This function may sleep if pagefaults are |
89 | * enabled. | ||
88 | * | 90 | * |
89 | * Get the size of a NUL-terminated string in user space. | 91 | * Get the size of a NUL-terminated string in user space. |
90 | * | 92 | * |
91 | * Returns the size of the string INCLUDING the terminating NUL. | 93 | * Returns the size of the string INCLUDING the terminating NUL. |
92 | * If the string is too long, returns 'count+1'. | 94 | * If the string is too long, returns a number larger than @count. User |
95 | * has to check the return value against "> count". | ||
93 | * On exception (or invalid count), returns 0. | 96 | * On exception (or invalid count), returns 0. |
97 | * | ||
98 | * NOTE! You should basically never use this function. There is | ||
99 | * almost never any valid case for using the length of a user space | ||
100 | * string, since the string can be changed at any time by other | ||
101 | * threads. Use "strncpy_from_user()" instead to get a stable copy | ||
102 | * of the string. | ||
94 | */ | 103 | */ |
95 | long strnlen_user(const char __user *str, long count) | 104 | long strnlen_user(const char __user *str, long count) |
96 | { | 105 | { |
@@ -113,7 +122,8 @@ EXPORT_SYMBOL(strnlen_user); | |||
113 | * strlen_user: - Get the size of a user string INCLUDING final NUL. | 122 | * strlen_user: - Get the size of a user string INCLUDING final NUL. |
114 | * @str: The string to measure. | 123 | * @str: The string to measure. |
115 | * | 124 | * |
116 | * Context: User context only. This function may sleep. | 125 | * Context: User context only. This function may sleep if pagefaults are |
126 | * enabled. | ||
117 | * | 127 | * |
118 | * Get the size of a NUL-terminated string in user space. | 128 | * Get the size of a NUL-terminated string in user space. |
119 | * | 129 | * |
diff --git a/lib/swiotlb.c b/lib/swiotlb.c index 4abda074ea45..76f29ecba8f4 100644 --- a/lib/swiotlb.c +++ b/lib/swiotlb.c | |||
@@ -29,10 +29,10 @@ | |||
29 | #include <linux/ctype.h> | 29 | #include <linux/ctype.h> |
30 | #include <linux/highmem.h> | 30 | #include <linux/highmem.h> |
31 | #include <linux/gfp.h> | 31 | #include <linux/gfp.h> |
32 | #include <linux/scatterlist.h> | ||
32 | 33 | ||
33 | #include <asm/io.h> | 34 | #include <asm/io.h> |
34 | #include <asm/dma.h> | 35 | #include <asm/dma.h> |
35 | #include <asm/scatterlist.h> | ||
36 | 36 | ||
37 | #include <linux/init.h> | 37 | #include <linux/init.h> |
38 | #include <linux/bootmem.h> | 38 | #include <linux/bootmem.h> |
@@ -537,8 +537,9 @@ EXPORT_SYMBOL_GPL(swiotlb_tbl_map_single); | |||
537 | * Allocates bounce buffer and returns its kernel virtual address. | 537 | * Allocates bounce buffer and returns its kernel virtual address. |
538 | */ | 538 | */ |
539 | 539 | ||
540 | phys_addr_t map_single(struct device *hwdev, phys_addr_t phys, size_t size, | 540 | static phys_addr_t |
541 | enum dma_data_direction dir) | 541 | map_single(struct device *hwdev, phys_addr_t phys, size_t size, |
542 | enum dma_data_direction dir) | ||
542 | { | 543 | { |
543 | dma_addr_t start_dma_addr = phys_to_dma(hwdev, io_tlb_start); | 544 | dma_addr_t start_dma_addr = phys_to_dma(hwdev, io_tlb_start); |
544 | 545 | ||
@@ -655,7 +656,7 @@ swiotlb_alloc_coherent(struct device *hwdev, size_t size, | |||
655 | */ | 656 | */ |
656 | phys_addr_t paddr = map_single(hwdev, 0, size, DMA_FROM_DEVICE); | 657 | phys_addr_t paddr = map_single(hwdev, 0, size, DMA_FROM_DEVICE); |
657 | if (paddr == SWIOTLB_MAP_ERROR) | 658 | if (paddr == SWIOTLB_MAP_ERROR) |
658 | return NULL; | 659 | goto err_warn; |
659 | 660 | ||
660 | ret = phys_to_virt(paddr); | 661 | ret = phys_to_virt(paddr); |
661 | dev_addr = phys_to_dma(hwdev, paddr); | 662 | dev_addr = phys_to_dma(hwdev, paddr); |
@@ -669,7 +670,7 @@ swiotlb_alloc_coherent(struct device *hwdev, size_t size, | |||
669 | /* DMA_TO_DEVICE to avoid memcpy in unmap_single */ | 670 | /* DMA_TO_DEVICE to avoid memcpy in unmap_single */ |
670 | swiotlb_tbl_unmap_single(hwdev, paddr, | 671 | swiotlb_tbl_unmap_single(hwdev, paddr, |
671 | size, DMA_TO_DEVICE); | 672 | size, DMA_TO_DEVICE); |
672 | return NULL; | 673 | goto err_warn; |
673 | } | 674 | } |
674 | } | 675 | } |
675 | 676 | ||
@@ -677,6 +678,13 @@ swiotlb_alloc_coherent(struct device *hwdev, size_t size, | |||
677 | memset(ret, 0, size); | 678 | memset(ret, 0, size); |
678 | 679 | ||
679 | return ret; | 680 | return ret; |
681 | |||
682 | err_warn: | ||
683 | pr_warn("swiotlb: coherent allocation failed for device %s size=%zu\n", | ||
684 | dev_name(hwdev), size); | ||
685 | dump_stack(); | ||
686 | |||
687 | return NULL; | ||
680 | } | 688 | } |
681 | EXPORT_SYMBOL(swiotlb_alloc_coherent); | 689 | EXPORT_SYMBOL(swiotlb_alloc_coherent); |
682 | 690 | ||
diff --git a/lib/test-hexdump.c b/lib/test-hexdump.c index c227cc43ec0a..5241df36eedf 100644 --- a/lib/test-hexdump.c +++ b/lib/test-hexdump.c | |||
@@ -25,19 +25,19 @@ static const char * const test_data_1_le[] __initconst = { | |||
25 | "4c", "d1", "19", "99", "43", "b1", "af", "0c", | 25 | "4c", "d1", "19", "99", "43", "b1", "af", "0c", |
26 | }; | 26 | }; |
27 | 27 | ||
28 | static const char *test_data_2_le[] __initdata = { | 28 | static const char * const test_data_2_le[] __initconst = { |
29 | "32be", "7bdb", "180a", "b293", | 29 | "32be", "7bdb", "180a", "b293", |
30 | "ba70", "24c4", "837d", "9b34", | 30 | "ba70", "24c4", "837d", "9b34", |
31 | "9ca6", "ad31", "0f9c", "e9ac", | 31 | "9ca6", "ad31", "0f9c", "e9ac", |
32 | "d14c", "9919", "b143", "0caf", | 32 | "d14c", "9919", "b143", "0caf", |
33 | }; | 33 | }; |
34 | 34 | ||
35 | static const char *test_data_4_le[] __initdata = { | 35 | static const char * const test_data_4_le[] __initconst = { |
36 | "7bdb32be", "b293180a", "24c4ba70", "9b34837d", | 36 | "7bdb32be", "b293180a", "24c4ba70", "9b34837d", |
37 | "ad319ca6", "e9ac0f9c", "9919d14c", "0cafb143", | 37 | "ad319ca6", "e9ac0f9c", "9919d14c", "0cafb143", |
38 | }; | 38 | }; |
39 | 39 | ||
40 | static const char *test_data_8_le[] __initdata = { | 40 | static const char * const test_data_8_le[] __initconst = { |
41 | "b293180a7bdb32be", "9b34837d24c4ba70", | 41 | "b293180a7bdb32be", "9b34837d24c4ba70", |
42 | "e9ac0f9cad319ca6", "0cafb1439919d14c", | 42 | "e9ac0f9cad319ca6", "0cafb1439919d14c", |
43 | }; | 43 | }; |
diff --git a/lib/test_bpf.c b/lib/test_bpf.c index 80d78c51f65f..7f58c735d745 100644 --- a/lib/test_bpf.c +++ b/lib/test_bpf.c | |||
@@ -21,6 +21,7 @@ | |||
21 | #include <linux/skbuff.h> | 21 | #include <linux/skbuff.h> |
22 | #include <linux/netdevice.h> | 22 | #include <linux/netdevice.h> |
23 | #include <linux/if_vlan.h> | 23 | #include <linux/if_vlan.h> |
24 | #include <linux/random.h> | ||
24 | 25 | ||
25 | /* General test specific settings */ | 26 | /* General test specific settings */ |
26 | #define MAX_SUBTESTS 3 | 27 | #define MAX_SUBTESTS 3 |
@@ -67,6 +68,10 @@ struct bpf_test { | |||
67 | union { | 68 | union { |
68 | struct sock_filter insns[MAX_INSNS]; | 69 | struct sock_filter insns[MAX_INSNS]; |
69 | struct bpf_insn insns_int[MAX_INSNS]; | 70 | struct bpf_insn insns_int[MAX_INSNS]; |
71 | struct { | ||
72 | void *insns; | ||
73 | unsigned int len; | ||
74 | } ptr; | ||
70 | } u; | 75 | } u; |
71 | __u8 aux; | 76 | __u8 aux; |
72 | __u8 data[MAX_DATA]; | 77 | __u8 data[MAX_DATA]; |
@@ -74,8 +79,282 @@ struct bpf_test { | |||
74 | int data_size; | 79 | int data_size; |
75 | __u32 result; | 80 | __u32 result; |
76 | } test[MAX_SUBTESTS]; | 81 | } test[MAX_SUBTESTS]; |
82 | int (*fill_helper)(struct bpf_test *self); | ||
77 | }; | 83 | }; |
78 | 84 | ||
85 | /* Large test cases need separate allocation and fill handler. */ | ||
86 | |||
87 | static int bpf_fill_maxinsns1(struct bpf_test *self) | ||
88 | { | ||
89 | unsigned int len = BPF_MAXINSNS; | ||
90 | struct sock_filter *insn; | ||
91 | __u32 k = ~0; | ||
92 | int i; | ||
93 | |||
94 | insn = kmalloc_array(len, sizeof(*insn), GFP_KERNEL); | ||
95 | if (!insn) | ||
96 | return -ENOMEM; | ||
97 | |||
98 | for (i = 0; i < len; i++, k--) | ||
99 | insn[i] = __BPF_STMT(BPF_RET | BPF_K, k); | ||
100 | |||
101 | self->u.ptr.insns = insn; | ||
102 | self->u.ptr.len = len; | ||
103 | |||
104 | return 0; | ||
105 | } | ||
106 | |||
107 | static int bpf_fill_maxinsns2(struct bpf_test *self) | ||
108 | { | ||
109 | unsigned int len = BPF_MAXINSNS; | ||
110 | struct sock_filter *insn; | ||
111 | int i; | ||
112 | |||
113 | insn = kmalloc_array(len, sizeof(*insn), GFP_KERNEL); | ||
114 | if (!insn) | ||
115 | return -ENOMEM; | ||
116 | |||
117 | for (i = 0; i < len; i++) | ||
118 | insn[i] = __BPF_STMT(BPF_RET | BPF_K, 0xfefefefe); | ||
119 | |||
120 | self->u.ptr.insns = insn; | ||
121 | self->u.ptr.len = len; | ||
122 | |||
123 | return 0; | ||
124 | } | ||
125 | |||
126 | static int bpf_fill_maxinsns3(struct bpf_test *self) | ||
127 | { | ||
128 | unsigned int len = BPF_MAXINSNS; | ||
129 | struct sock_filter *insn; | ||
130 | struct rnd_state rnd; | ||
131 | int i; | ||
132 | |||
133 | insn = kmalloc_array(len, sizeof(*insn), GFP_KERNEL); | ||
134 | if (!insn) | ||
135 | return -ENOMEM; | ||
136 | |||
137 | prandom_seed_state(&rnd, 3141592653589793238ULL); | ||
138 | |||
139 | for (i = 0; i < len - 1; i++) { | ||
140 | __u32 k = prandom_u32_state(&rnd); | ||
141 | |||
142 | insn[i] = __BPF_STMT(BPF_ALU | BPF_ADD | BPF_K, k); | ||
143 | } | ||
144 | |||
145 | insn[len - 1] = __BPF_STMT(BPF_RET | BPF_A, 0); | ||
146 | |||
147 | self->u.ptr.insns = insn; | ||
148 | self->u.ptr.len = len; | ||
149 | |||
150 | return 0; | ||
151 | } | ||
152 | |||
153 | static int bpf_fill_maxinsns4(struct bpf_test *self) | ||
154 | { | ||
155 | unsigned int len = BPF_MAXINSNS + 1; | ||
156 | struct sock_filter *insn; | ||
157 | int i; | ||
158 | |||
159 | insn = kmalloc_array(len, sizeof(*insn), GFP_KERNEL); | ||
160 | if (!insn) | ||
161 | return -ENOMEM; | ||
162 | |||
163 | for (i = 0; i < len; i++) | ||
164 | insn[i] = __BPF_STMT(BPF_RET | BPF_K, 0xfefefefe); | ||
165 | |||
166 | self->u.ptr.insns = insn; | ||
167 | self->u.ptr.len = len; | ||
168 | |||
169 | return 0; | ||
170 | } | ||
171 | |||
172 | static int bpf_fill_maxinsns5(struct bpf_test *self) | ||
173 | { | ||
174 | unsigned int len = BPF_MAXINSNS; | ||
175 | struct sock_filter *insn; | ||
176 | int i; | ||
177 | |||
178 | insn = kmalloc_array(len, sizeof(*insn), GFP_KERNEL); | ||
179 | if (!insn) | ||
180 | return -ENOMEM; | ||
181 | |||
182 | insn[0] = __BPF_JUMP(BPF_JMP | BPF_JA, len - 2, 0, 0); | ||
183 | |||
184 | for (i = 1; i < len - 1; i++) | ||
185 | insn[i] = __BPF_STMT(BPF_RET | BPF_K, 0xfefefefe); | ||
186 | |||
187 | insn[len - 1] = __BPF_STMT(BPF_RET | BPF_K, 0xabababab); | ||
188 | |||
189 | self->u.ptr.insns = insn; | ||
190 | self->u.ptr.len = len; | ||
191 | |||
192 | return 0; | ||
193 | } | ||
194 | |||
195 | static int bpf_fill_maxinsns6(struct bpf_test *self) | ||
196 | { | ||
197 | unsigned int len = BPF_MAXINSNS; | ||
198 | struct sock_filter *insn; | ||
199 | int i; | ||
200 | |||
201 | insn = kmalloc_array(len, sizeof(*insn), GFP_KERNEL); | ||
202 | if (!insn) | ||
203 | return -ENOMEM; | ||
204 | |||
205 | for (i = 0; i < len - 1; i++) | ||
206 | insn[i] = __BPF_STMT(BPF_LD | BPF_W | BPF_ABS, SKF_AD_OFF + | ||
207 | SKF_AD_VLAN_TAG_PRESENT); | ||
208 | |||
209 | insn[len - 1] = __BPF_STMT(BPF_RET | BPF_A, 0); | ||
210 | |||
211 | self->u.ptr.insns = insn; | ||
212 | self->u.ptr.len = len; | ||
213 | |||
214 | return 0; | ||
215 | } | ||
216 | |||
217 | static int bpf_fill_maxinsns7(struct bpf_test *self) | ||
218 | { | ||
219 | unsigned int len = BPF_MAXINSNS; | ||
220 | struct sock_filter *insn; | ||
221 | int i; | ||
222 | |||
223 | insn = kmalloc_array(len, sizeof(*insn), GFP_KERNEL); | ||
224 | if (!insn) | ||
225 | return -ENOMEM; | ||
226 | |||
227 | for (i = 0; i < len - 4; i++) | ||
228 | insn[i] = __BPF_STMT(BPF_LD | BPF_W | BPF_ABS, SKF_AD_OFF + | ||
229 | SKF_AD_CPU); | ||
230 | |||
231 | insn[len - 4] = __BPF_STMT(BPF_MISC | BPF_TAX, 0); | ||
232 | insn[len - 3] = __BPF_STMT(BPF_LD | BPF_W | BPF_ABS, SKF_AD_OFF + | ||
233 | SKF_AD_CPU); | ||
234 | insn[len - 2] = __BPF_STMT(BPF_ALU | BPF_SUB | BPF_X, 0); | ||
235 | insn[len - 1] = __BPF_STMT(BPF_RET | BPF_A, 0); | ||
236 | |||
237 | self->u.ptr.insns = insn; | ||
238 | self->u.ptr.len = len; | ||
239 | |||
240 | return 0; | ||
241 | } | ||
242 | |||
243 | static int bpf_fill_maxinsns8(struct bpf_test *self) | ||
244 | { | ||
245 | unsigned int len = BPF_MAXINSNS; | ||
246 | struct sock_filter *insn; | ||
247 | int i, jmp_off = len - 3; | ||
248 | |||
249 | insn = kmalloc_array(len, sizeof(*insn), GFP_KERNEL); | ||
250 | if (!insn) | ||
251 | return -ENOMEM; | ||
252 | |||
253 | insn[0] = __BPF_STMT(BPF_LD | BPF_IMM, 0xffffffff); | ||
254 | |||
255 | for (i = 1; i < len - 1; i++) | ||
256 | insn[i] = __BPF_JUMP(BPF_JMP | BPF_JGT, 0xffffffff, jmp_off--, 0); | ||
257 | |||
258 | insn[len - 1] = __BPF_STMT(BPF_RET | BPF_A, 0); | ||
259 | |||
260 | self->u.ptr.insns = insn; | ||
261 | self->u.ptr.len = len; | ||
262 | |||
263 | return 0; | ||
264 | } | ||
265 | |||
266 | static int bpf_fill_maxinsns9(struct bpf_test *self) | ||
267 | { | ||
268 | unsigned int len = BPF_MAXINSNS; | ||
269 | struct bpf_insn *insn; | ||
270 | int i; | ||
271 | |||
272 | insn = kmalloc_array(len, sizeof(*insn), GFP_KERNEL); | ||
273 | if (!insn) | ||
274 | return -ENOMEM; | ||
275 | |||
276 | insn[0] = BPF_JMP_IMM(BPF_JA, 0, 0, len - 2); | ||
277 | insn[1] = BPF_ALU32_IMM(BPF_MOV, R0, 0xcbababab); | ||
278 | insn[2] = BPF_EXIT_INSN(); | ||
279 | |||
280 | for (i = 3; i < len - 2; i++) | ||
281 | insn[i] = BPF_ALU32_IMM(BPF_MOV, R0, 0xfefefefe); | ||
282 | |||
283 | insn[len - 2] = BPF_EXIT_INSN(); | ||
284 | insn[len - 1] = BPF_JMP_IMM(BPF_JA, 0, 0, -(len - 1)); | ||
285 | |||
286 | self->u.ptr.insns = insn; | ||
287 | self->u.ptr.len = len; | ||
288 | |||
289 | return 0; | ||
290 | } | ||
291 | |||
292 | static int bpf_fill_maxinsns10(struct bpf_test *self) | ||
293 | { | ||
294 | unsigned int len = BPF_MAXINSNS, hlen = len - 2; | ||
295 | struct bpf_insn *insn; | ||
296 | int i; | ||
297 | |||
298 | insn = kmalloc_array(len, sizeof(*insn), GFP_KERNEL); | ||
299 | if (!insn) | ||
300 | return -ENOMEM; | ||
301 | |||
302 | for (i = 0; i < hlen / 2; i++) | ||
303 | insn[i] = BPF_JMP_IMM(BPF_JA, 0, 0, hlen - 2 - 2 * i); | ||
304 | for (i = hlen - 1; i > hlen / 2; i--) | ||
305 | insn[i] = BPF_JMP_IMM(BPF_JA, 0, 0, hlen - 1 - 2 * i); | ||
306 | |||
307 | insn[hlen / 2] = BPF_JMP_IMM(BPF_JA, 0, 0, hlen / 2 - 1); | ||
308 | insn[hlen] = BPF_ALU32_IMM(BPF_MOV, R0, 0xabababac); | ||
309 | insn[hlen + 1] = BPF_EXIT_INSN(); | ||
310 | |||
311 | self->u.ptr.insns = insn; | ||
312 | self->u.ptr.len = len; | ||
313 | |||
314 | return 0; | ||
315 | } | ||
316 | |||
317 | static int __bpf_fill_ja(struct bpf_test *self, unsigned int len, | ||
318 | unsigned int plen) | ||
319 | { | ||
320 | struct sock_filter *insn; | ||
321 | unsigned int rlen; | ||
322 | int i, j; | ||
323 | |||
324 | insn = kmalloc_array(len, sizeof(*insn), GFP_KERNEL); | ||
325 | if (!insn) | ||
326 | return -ENOMEM; | ||
327 | |||
328 | rlen = (len % plen) - 1; | ||
329 | |||
330 | for (i = 0; i + plen < len; i += plen) | ||
331 | for (j = 0; j < plen; j++) | ||
332 | insn[i + j] = __BPF_JUMP(BPF_JMP | BPF_JA, | ||
333 | plen - 1 - j, 0, 0); | ||
334 | for (j = 0; j < rlen; j++) | ||
335 | insn[i + j] = __BPF_JUMP(BPF_JMP | BPF_JA, rlen - 1 - j, | ||
336 | 0, 0); | ||
337 | |||
338 | insn[len - 1] = __BPF_STMT(BPF_RET | BPF_K, 0xababcbac); | ||
339 | |||
340 | self->u.ptr.insns = insn; | ||
341 | self->u.ptr.len = len; | ||
342 | |||
343 | return 0; | ||
344 | } | ||
345 | |||
346 | static int bpf_fill_maxinsns11(struct bpf_test *self) | ||
347 | { | ||
348 | /* Hits 70 passes on x86_64, so cannot get JITed there. */ | ||
349 | return __bpf_fill_ja(self, BPF_MAXINSNS, 68); | ||
350 | } | ||
351 | |||
352 | static int bpf_fill_ja(struct bpf_test *self) | ||
353 | { | ||
354 | /* Hits exactly 11 passes on x86_64 JIT. */ | ||
355 | return __bpf_fill_ja(self, 12, 9); | ||
356 | } | ||
357 | |||
79 | static struct bpf_test tests[] = { | 358 | static struct bpf_test tests[] = { |
80 | { | 359 | { |
81 | "TAX", | 360 | "TAX", |
@@ -1755,7 +2034,8 @@ static struct bpf_test tests[] = { | |||
1755 | BPF_EXIT_INSN(), | 2034 | BPF_EXIT_INSN(), |
1756 | BPF_JMP_IMM(BPF_JEQ, R3, 0x1234, 1), | 2035 | BPF_JMP_IMM(BPF_JEQ, R3, 0x1234, 1), |
1757 | BPF_EXIT_INSN(), | 2036 | BPF_EXIT_INSN(), |
1758 | BPF_ALU64_IMM(BPF_MOV, R0, 1), | 2037 | BPF_LD_IMM64(R0, 0x1ffffffffLL), |
2038 | BPF_ALU64_IMM(BPF_RSH, R0, 32), /* R0 = 1 */ | ||
1759 | BPF_EXIT_INSN(), | 2039 | BPF_EXIT_INSN(), |
1760 | }, | 2040 | }, |
1761 | INTERNAL, | 2041 | INTERNAL, |
@@ -1805,6 +2085,2313 @@ static struct bpf_test tests[] = { | |||
1805 | 0x10, 0xbf, 0x48, 0xd6, 0x43, 0xd6}, | 2085 | 0x10, 0xbf, 0x48, 0xd6, 0x43, 0xd6}, |
1806 | { { 38, 256 } } | 2086 | { { 38, 256 } } |
1807 | }, | 2087 | }, |
2088 | /* BPF_ALU | BPF_MOV | BPF_X */ | ||
2089 | { | ||
2090 | "ALU_MOV_X: dst = 2", | ||
2091 | .u.insns_int = { | ||
2092 | BPF_ALU32_IMM(BPF_MOV, R1, 2), | ||
2093 | BPF_ALU32_REG(BPF_MOV, R0, R1), | ||
2094 | BPF_EXIT_INSN(), | ||
2095 | }, | ||
2096 | INTERNAL, | ||
2097 | { }, | ||
2098 | { { 0, 2 } }, | ||
2099 | }, | ||
2100 | { | ||
2101 | "ALU_MOV_X: dst = 4294967295", | ||
2102 | .u.insns_int = { | ||
2103 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967295U), | ||
2104 | BPF_ALU32_REG(BPF_MOV, R0, R1), | ||
2105 | BPF_EXIT_INSN(), | ||
2106 | }, | ||
2107 | INTERNAL, | ||
2108 | { }, | ||
2109 | { { 0, 4294967295U } }, | ||
2110 | }, | ||
2111 | { | ||
2112 | "ALU64_MOV_X: dst = 2", | ||
2113 | .u.insns_int = { | ||
2114 | BPF_ALU32_IMM(BPF_MOV, R1, 2), | ||
2115 | BPF_ALU64_REG(BPF_MOV, R0, R1), | ||
2116 | BPF_EXIT_INSN(), | ||
2117 | }, | ||
2118 | INTERNAL, | ||
2119 | { }, | ||
2120 | { { 0, 2 } }, | ||
2121 | }, | ||
2122 | { | ||
2123 | "ALU64_MOV_X: dst = 4294967295", | ||
2124 | .u.insns_int = { | ||
2125 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967295U), | ||
2126 | BPF_ALU64_REG(BPF_MOV, R0, R1), | ||
2127 | BPF_EXIT_INSN(), | ||
2128 | }, | ||
2129 | INTERNAL, | ||
2130 | { }, | ||
2131 | { { 0, 4294967295U } }, | ||
2132 | }, | ||
2133 | /* BPF_ALU | BPF_MOV | BPF_K */ | ||
2134 | { | ||
2135 | "ALU_MOV_K: dst = 2", | ||
2136 | .u.insns_int = { | ||
2137 | BPF_ALU32_IMM(BPF_MOV, R0, 2), | ||
2138 | BPF_EXIT_INSN(), | ||
2139 | }, | ||
2140 | INTERNAL, | ||
2141 | { }, | ||
2142 | { { 0, 2 } }, | ||
2143 | }, | ||
2144 | { | ||
2145 | "ALU_MOV_K: dst = 4294967295", | ||
2146 | .u.insns_int = { | ||
2147 | BPF_ALU32_IMM(BPF_MOV, R0, 4294967295U), | ||
2148 | BPF_EXIT_INSN(), | ||
2149 | }, | ||
2150 | INTERNAL, | ||
2151 | { }, | ||
2152 | { { 0, 4294967295U } }, | ||
2153 | }, | ||
2154 | { | ||
2155 | "ALU_MOV_K: 0x0000ffffffff0000 = 0x00000000ffffffff", | ||
2156 | .u.insns_int = { | ||
2157 | BPF_LD_IMM64(R2, 0x0000ffffffff0000LL), | ||
2158 | BPF_LD_IMM64(R3, 0x00000000ffffffffLL), | ||
2159 | BPF_ALU32_IMM(BPF_MOV, R2, 0xffffffff), | ||
2160 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | ||
2161 | BPF_MOV32_IMM(R0, 2), | ||
2162 | BPF_EXIT_INSN(), | ||
2163 | BPF_MOV32_IMM(R0, 1), | ||
2164 | BPF_EXIT_INSN(), | ||
2165 | }, | ||
2166 | INTERNAL, | ||
2167 | { }, | ||
2168 | { { 0, 0x1 } }, | ||
2169 | }, | ||
2170 | { | ||
2171 | "ALU64_MOV_K: dst = 2", | ||
2172 | .u.insns_int = { | ||
2173 | BPF_ALU64_IMM(BPF_MOV, R0, 2), | ||
2174 | BPF_EXIT_INSN(), | ||
2175 | }, | ||
2176 | INTERNAL, | ||
2177 | { }, | ||
2178 | { { 0, 2 } }, | ||
2179 | }, | ||
2180 | { | ||
2181 | "ALU64_MOV_K: dst = 2147483647", | ||
2182 | .u.insns_int = { | ||
2183 | BPF_ALU64_IMM(BPF_MOV, R0, 2147483647), | ||
2184 | BPF_EXIT_INSN(), | ||
2185 | }, | ||
2186 | INTERNAL, | ||
2187 | { }, | ||
2188 | { { 0, 2147483647 } }, | ||
2189 | }, | ||
2190 | { | ||
2191 | "ALU64_OR_K: dst = 0x0", | ||
2192 | .u.insns_int = { | ||
2193 | BPF_LD_IMM64(R2, 0x0000ffffffff0000LL), | ||
2194 | BPF_LD_IMM64(R3, 0x0), | ||
2195 | BPF_ALU64_IMM(BPF_MOV, R2, 0x0), | ||
2196 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | ||
2197 | BPF_MOV32_IMM(R0, 2), | ||
2198 | BPF_EXIT_INSN(), | ||
2199 | BPF_MOV32_IMM(R0, 1), | ||
2200 | BPF_EXIT_INSN(), | ||
2201 | }, | ||
2202 | INTERNAL, | ||
2203 | { }, | ||
2204 | { { 0, 0x1 } }, | ||
2205 | }, | ||
2206 | { | ||
2207 | "ALU64_MOV_K: dst = -1", | ||
2208 | .u.insns_int = { | ||
2209 | BPF_LD_IMM64(R2, 0x0000ffffffff0000LL), | ||
2210 | BPF_LD_IMM64(R3, 0xffffffffffffffffLL), | ||
2211 | BPF_ALU64_IMM(BPF_MOV, R2, 0xffffffff), | ||
2212 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | ||
2213 | BPF_MOV32_IMM(R0, 2), | ||
2214 | BPF_EXIT_INSN(), | ||
2215 | BPF_MOV32_IMM(R0, 1), | ||
2216 | BPF_EXIT_INSN(), | ||
2217 | }, | ||
2218 | INTERNAL, | ||
2219 | { }, | ||
2220 | { { 0, 0x1 } }, | ||
2221 | }, | ||
2222 | /* BPF_ALU | BPF_ADD | BPF_X */ | ||
2223 | { | ||
2224 | "ALU_ADD_X: 1 + 2 = 3", | ||
2225 | .u.insns_int = { | ||
2226 | BPF_LD_IMM64(R0, 1), | ||
2227 | BPF_ALU32_IMM(BPF_MOV, R1, 2), | ||
2228 | BPF_ALU32_REG(BPF_ADD, R0, R1), | ||
2229 | BPF_EXIT_INSN(), | ||
2230 | }, | ||
2231 | INTERNAL, | ||
2232 | { }, | ||
2233 | { { 0, 3 } }, | ||
2234 | }, | ||
2235 | { | ||
2236 | "ALU_ADD_X: 1 + 4294967294 = 4294967295", | ||
2237 | .u.insns_int = { | ||
2238 | BPF_LD_IMM64(R0, 1), | ||
2239 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967294U), | ||
2240 | BPF_ALU32_REG(BPF_ADD, R0, R1), | ||
2241 | BPF_EXIT_INSN(), | ||
2242 | }, | ||
2243 | INTERNAL, | ||
2244 | { }, | ||
2245 | { { 0, 4294967295U } }, | ||
2246 | }, | ||
2247 | { | ||
2248 | "ALU64_ADD_X: 1 + 2 = 3", | ||
2249 | .u.insns_int = { | ||
2250 | BPF_LD_IMM64(R0, 1), | ||
2251 | BPF_ALU32_IMM(BPF_MOV, R1, 2), | ||
2252 | BPF_ALU64_REG(BPF_ADD, R0, R1), | ||
2253 | BPF_EXIT_INSN(), | ||
2254 | }, | ||
2255 | INTERNAL, | ||
2256 | { }, | ||
2257 | { { 0, 3 } }, | ||
2258 | }, | ||
2259 | { | ||
2260 | "ALU64_ADD_X: 1 + 4294967294 = 4294967295", | ||
2261 | .u.insns_int = { | ||
2262 | BPF_LD_IMM64(R0, 1), | ||
2263 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967294U), | ||
2264 | BPF_ALU64_REG(BPF_ADD, R0, R1), | ||
2265 | BPF_EXIT_INSN(), | ||
2266 | }, | ||
2267 | INTERNAL, | ||
2268 | { }, | ||
2269 | { { 0, 4294967295U } }, | ||
2270 | }, | ||
2271 | /* BPF_ALU | BPF_ADD | BPF_K */ | ||
2272 | { | ||
2273 | "ALU_ADD_K: 1 + 2 = 3", | ||
2274 | .u.insns_int = { | ||
2275 | BPF_LD_IMM64(R0, 1), | ||
2276 | BPF_ALU32_IMM(BPF_ADD, R0, 2), | ||
2277 | BPF_EXIT_INSN(), | ||
2278 | }, | ||
2279 | INTERNAL, | ||
2280 | { }, | ||
2281 | { { 0, 3 } }, | ||
2282 | }, | ||
2283 | { | ||
2284 | "ALU_ADD_K: 3 + 0 = 3", | ||
2285 | .u.insns_int = { | ||
2286 | BPF_LD_IMM64(R0, 3), | ||
2287 | BPF_ALU32_IMM(BPF_ADD, R0, 0), | ||
2288 | BPF_EXIT_INSN(), | ||
2289 | }, | ||
2290 | INTERNAL, | ||
2291 | { }, | ||
2292 | { { 0, 3 } }, | ||
2293 | }, | ||
2294 | { | ||
2295 | "ALU_ADD_K: 1 + 4294967294 = 4294967295", | ||
2296 | .u.insns_int = { | ||
2297 | BPF_LD_IMM64(R0, 1), | ||
2298 | BPF_ALU32_IMM(BPF_ADD, R0, 4294967294U), | ||
2299 | BPF_EXIT_INSN(), | ||
2300 | }, | ||
2301 | INTERNAL, | ||
2302 | { }, | ||
2303 | { { 0, 4294967295U } }, | ||
2304 | }, | ||
2305 | { | ||
2306 | "ALU_ADD_K: 0 + (-1) = 0x00000000ffffffff", | ||
2307 | .u.insns_int = { | ||
2308 | BPF_LD_IMM64(R2, 0x0), | ||
2309 | BPF_LD_IMM64(R3, 0x00000000ffffffff), | ||
2310 | BPF_ALU32_IMM(BPF_ADD, R2, 0xffffffff), | ||
2311 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | ||
2312 | BPF_MOV32_IMM(R0, 2), | ||
2313 | BPF_EXIT_INSN(), | ||
2314 | BPF_MOV32_IMM(R0, 1), | ||
2315 | BPF_EXIT_INSN(), | ||
2316 | }, | ||
2317 | INTERNAL, | ||
2318 | { }, | ||
2319 | { { 0, 0x1 } }, | ||
2320 | }, | ||
2321 | { | ||
2322 | "ALU64_ADD_K: 1 + 2 = 3", | ||
2323 | .u.insns_int = { | ||
2324 | BPF_LD_IMM64(R0, 1), | ||
2325 | BPF_ALU64_IMM(BPF_ADD, R0, 2), | ||
2326 | BPF_EXIT_INSN(), | ||
2327 | }, | ||
2328 | INTERNAL, | ||
2329 | { }, | ||
2330 | { { 0, 3 } }, | ||
2331 | }, | ||
2332 | { | ||
2333 | "ALU64_ADD_K: 3 + 0 = 3", | ||
2334 | .u.insns_int = { | ||
2335 | BPF_LD_IMM64(R0, 3), | ||
2336 | BPF_ALU64_IMM(BPF_ADD, R0, 0), | ||
2337 | BPF_EXIT_INSN(), | ||
2338 | }, | ||
2339 | INTERNAL, | ||
2340 | { }, | ||
2341 | { { 0, 3 } }, | ||
2342 | }, | ||
2343 | { | ||
2344 | "ALU64_ADD_K: 1 + 2147483646 = 2147483647", | ||
2345 | .u.insns_int = { | ||
2346 | BPF_LD_IMM64(R0, 1), | ||
2347 | BPF_ALU64_IMM(BPF_ADD, R0, 2147483646), | ||
2348 | BPF_EXIT_INSN(), | ||
2349 | }, | ||
2350 | INTERNAL, | ||
2351 | { }, | ||
2352 | { { 0, 2147483647 } }, | ||
2353 | }, | ||
2354 | { | ||
2355 | "ALU64_ADD_K: 2147483646 + -2147483647 = -1", | ||
2356 | .u.insns_int = { | ||
2357 | BPF_LD_IMM64(R0, 2147483646), | ||
2358 | BPF_ALU64_IMM(BPF_ADD, R0, -2147483647), | ||
2359 | BPF_EXIT_INSN(), | ||
2360 | }, | ||
2361 | INTERNAL, | ||
2362 | { }, | ||
2363 | { { 0, -1 } }, | ||
2364 | }, | ||
2365 | { | ||
2366 | "ALU64_ADD_K: 1 + 0 = 1", | ||
2367 | .u.insns_int = { | ||
2368 | BPF_LD_IMM64(R2, 0x1), | ||
2369 | BPF_LD_IMM64(R3, 0x1), | ||
2370 | BPF_ALU64_IMM(BPF_ADD, R2, 0x0), | ||
2371 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | ||
2372 | BPF_MOV32_IMM(R0, 2), | ||
2373 | BPF_EXIT_INSN(), | ||
2374 | BPF_MOV32_IMM(R0, 1), | ||
2375 | BPF_EXIT_INSN(), | ||
2376 | }, | ||
2377 | INTERNAL, | ||
2378 | { }, | ||
2379 | { { 0, 0x1 } }, | ||
2380 | }, | ||
2381 | { | ||
2382 | "ALU64_ADD_K: 0 + (-1) = 0xffffffffffffffff", | ||
2383 | .u.insns_int = { | ||
2384 | BPF_LD_IMM64(R2, 0x0), | ||
2385 | BPF_LD_IMM64(R3, 0xffffffffffffffffLL), | ||
2386 | BPF_ALU64_IMM(BPF_ADD, R2, 0xffffffff), | ||
2387 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | ||
2388 | BPF_MOV32_IMM(R0, 2), | ||
2389 | BPF_EXIT_INSN(), | ||
2390 | BPF_MOV32_IMM(R0, 1), | ||
2391 | BPF_EXIT_INSN(), | ||
2392 | }, | ||
2393 | INTERNAL, | ||
2394 | { }, | ||
2395 | { { 0, 0x1 } }, | ||
2396 | }, | ||
2397 | /* BPF_ALU | BPF_SUB | BPF_X */ | ||
2398 | { | ||
2399 | "ALU_SUB_X: 3 - 1 = 2", | ||
2400 | .u.insns_int = { | ||
2401 | BPF_LD_IMM64(R0, 3), | ||
2402 | BPF_ALU32_IMM(BPF_MOV, R1, 1), | ||
2403 | BPF_ALU32_REG(BPF_SUB, R0, R1), | ||
2404 | BPF_EXIT_INSN(), | ||
2405 | }, | ||
2406 | INTERNAL, | ||
2407 | { }, | ||
2408 | { { 0, 2 } }, | ||
2409 | }, | ||
2410 | { | ||
2411 | "ALU_SUB_X: 4294967295 - 4294967294 = 1", | ||
2412 | .u.insns_int = { | ||
2413 | BPF_LD_IMM64(R0, 4294967295U), | ||
2414 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967294U), | ||
2415 | BPF_ALU32_REG(BPF_SUB, R0, R1), | ||
2416 | BPF_EXIT_INSN(), | ||
2417 | }, | ||
2418 | INTERNAL, | ||
2419 | { }, | ||
2420 | { { 0, 1 } }, | ||
2421 | }, | ||
2422 | { | ||
2423 | "ALU64_SUB_X: 3 - 1 = 2", | ||
2424 | .u.insns_int = { | ||
2425 | BPF_LD_IMM64(R0, 3), | ||
2426 | BPF_ALU32_IMM(BPF_MOV, R1, 1), | ||
2427 | BPF_ALU64_REG(BPF_SUB, R0, R1), | ||
2428 | BPF_EXIT_INSN(), | ||
2429 | }, | ||
2430 | INTERNAL, | ||
2431 | { }, | ||
2432 | { { 0, 2 } }, | ||
2433 | }, | ||
2434 | { | ||
2435 | "ALU64_SUB_X: 4294967295 - 4294967294 = 1", | ||
2436 | .u.insns_int = { | ||
2437 | BPF_LD_IMM64(R0, 4294967295U), | ||
2438 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967294U), | ||
2439 | BPF_ALU64_REG(BPF_SUB, R0, R1), | ||
2440 | BPF_EXIT_INSN(), | ||
2441 | }, | ||
2442 | INTERNAL, | ||
2443 | { }, | ||
2444 | { { 0, 1 } }, | ||
2445 | }, | ||
2446 | /* BPF_ALU | BPF_SUB | BPF_K */ | ||
2447 | { | ||
2448 | "ALU_SUB_K: 3 - 1 = 2", | ||
2449 | .u.insns_int = { | ||
2450 | BPF_LD_IMM64(R0, 3), | ||
2451 | BPF_ALU32_IMM(BPF_SUB, R0, 1), | ||
2452 | BPF_EXIT_INSN(), | ||
2453 | }, | ||
2454 | INTERNAL, | ||
2455 | { }, | ||
2456 | { { 0, 2 } }, | ||
2457 | }, | ||
2458 | { | ||
2459 | "ALU_SUB_K: 3 - 0 = 3", | ||
2460 | .u.insns_int = { | ||
2461 | BPF_LD_IMM64(R0, 3), | ||
2462 | BPF_ALU32_IMM(BPF_SUB, R0, 0), | ||
2463 | BPF_EXIT_INSN(), | ||
2464 | }, | ||
2465 | INTERNAL, | ||
2466 | { }, | ||
2467 | { { 0, 3 } }, | ||
2468 | }, | ||
2469 | { | ||
2470 | "ALU_SUB_K: 4294967295 - 4294967294 = 1", | ||
2471 | .u.insns_int = { | ||
2472 | BPF_LD_IMM64(R0, 4294967295U), | ||
2473 | BPF_ALU32_IMM(BPF_SUB, R0, 4294967294U), | ||
2474 | BPF_EXIT_INSN(), | ||
2475 | }, | ||
2476 | INTERNAL, | ||
2477 | { }, | ||
2478 | { { 0, 1 } }, | ||
2479 | }, | ||
2480 | { | ||
2481 | "ALU64_SUB_K: 3 - 1 = 2", | ||
2482 | .u.insns_int = { | ||
2483 | BPF_LD_IMM64(R0, 3), | ||
2484 | BPF_ALU64_IMM(BPF_SUB, R0, 1), | ||
2485 | BPF_EXIT_INSN(), | ||
2486 | }, | ||
2487 | INTERNAL, | ||
2488 | { }, | ||
2489 | { { 0, 2 } }, | ||
2490 | }, | ||
2491 | { | ||
2492 | "ALU64_SUB_K: 3 - 0 = 3", | ||
2493 | .u.insns_int = { | ||
2494 | BPF_LD_IMM64(R0, 3), | ||
2495 | BPF_ALU64_IMM(BPF_SUB, R0, 0), | ||
2496 | BPF_EXIT_INSN(), | ||
2497 | }, | ||
2498 | INTERNAL, | ||
2499 | { }, | ||
2500 | { { 0, 3 } }, | ||
2501 | }, | ||
2502 | { | ||
2503 | "ALU64_SUB_K: 4294967294 - 4294967295 = -1", | ||
2504 | .u.insns_int = { | ||
2505 | BPF_LD_IMM64(R0, 4294967294U), | ||
2506 | BPF_ALU64_IMM(BPF_SUB, R0, 4294967295U), | ||
2507 | BPF_EXIT_INSN(), | ||
2508 | }, | ||
2509 | INTERNAL, | ||
2510 | { }, | ||
2511 | { { 0, -1 } }, | ||
2512 | }, | ||
2513 | { | ||
2514 | "ALU64_ADD_K: 2147483646 - 2147483647 = -1", | ||
2515 | .u.insns_int = { | ||
2516 | BPF_LD_IMM64(R0, 2147483646), | ||
2517 | BPF_ALU64_IMM(BPF_SUB, R0, 2147483647), | ||
2518 | BPF_EXIT_INSN(), | ||
2519 | }, | ||
2520 | INTERNAL, | ||
2521 | { }, | ||
2522 | { { 0, -1 } }, | ||
2523 | }, | ||
2524 | /* BPF_ALU | BPF_MUL | BPF_X */ | ||
2525 | { | ||
2526 | "ALU_MUL_X: 2 * 3 = 6", | ||
2527 | .u.insns_int = { | ||
2528 | BPF_LD_IMM64(R0, 2), | ||
2529 | BPF_ALU32_IMM(BPF_MOV, R1, 3), | ||
2530 | BPF_ALU32_REG(BPF_MUL, R0, R1), | ||
2531 | BPF_EXIT_INSN(), | ||
2532 | }, | ||
2533 | INTERNAL, | ||
2534 | { }, | ||
2535 | { { 0, 6 } }, | ||
2536 | }, | ||
2537 | { | ||
2538 | "ALU_MUL_X: 2 * 0x7FFFFFF8 = 0xFFFFFFF0", | ||
2539 | .u.insns_int = { | ||
2540 | BPF_LD_IMM64(R0, 2), | ||
2541 | BPF_ALU32_IMM(BPF_MOV, R1, 0x7FFFFFF8), | ||
2542 | BPF_ALU32_REG(BPF_MUL, R0, R1), | ||
2543 | BPF_EXIT_INSN(), | ||
2544 | }, | ||
2545 | INTERNAL, | ||
2546 | { }, | ||
2547 | { { 0, 0xFFFFFFF0 } }, | ||
2548 | }, | ||
2549 | { | ||
2550 | "ALU_MUL_X: -1 * -1 = 1", | ||
2551 | .u.insns_int = { | ||
2552 | BPF_LD_IMM64(R0, -1), | ||
2553 | BPF_ALU32_IMM(BPF_MOV, R1, -1), | ||
2554 | BPF_ALU32_REG(BPF_MUL, R0, R1), | ||
2555 | BPF_EXIT_INSN(), | ||
2556 | }, | ||
2557 | INTERNAL, | ||
2558 | { }, | ||
2559 | { { 0, 1 } }, | ||
2560 | }, | ||
2561 | { | ||
2562 | "ALU64_MUL_X: 2 * 3 = 6", | ||
2563 | .u.insns_int = { | ||
2564 | BPF_LD_IMM64(R0, 2), | ||
2565 | BPF_ALU32_IMM(BPF_MOV, R1, 3), | ||
2566 | BPF_ALU64_REG(BPF_MUL, R0, R1), | ||
2567 | BPF_EXIT_INSN(), | ||
2568 | }, | ||
2569 | INTERNAL, | ||
2570 | { }, | ||
2571 | { { 0, 6 } }, | ||
2572 | }, | ||
2573 | { | ||
2574 | "ALU64_MUL_X: 1 * 2147483647 = 2147483647", | ||
2575 | .u.insns_int = { | ||
2576 | BPF_LD_IMM64(R0, 1), | ||
2577 | BPF_ALU32_IMM(BPF_MOV, R1, 2147483647), | ||
2578 | BPF_ALU64_REG(BPF_MUL, R0, R1), | ||
2579 | BPF_EXIT_INSN(), | ||
2580 | }, | ||
2581 | INTERNAL, | ||
2582 | { }, | ||
2583 | { { 0, 2147483647 } }, | ||
2584 | }, | ||
2585 | /* BPF_ALU | BPF_MUL | BPF_K */ | ||
2586 | { | ||
2587 | "ALU_MUL_K: 2 * 3 = 6", | ||
2588 | .u.insns_int = { | ||
2589 | BPF_LD_IMM64(R0, 2), | ||
2590 | BPF_ALU32_IMM(BPF_MUL, R0, 3), | ||
2591 | BPF_EXIT_INSN(), | ||
2592 | }, | ||
2593 | INTERNAL, | ||
2594 | { }, | ||
2595 | { { 0, 6 } }, | ||
2596 | }, | ||
2597 | { | ||
2598 | "ALU_MUL_K: 3 * 1 = 3", | ||
2599 | .u.insns_int = { | ||
2600 | BPF_LD_IMM64(R0, 3), | ||
2601 | BPF_ALU32_IMM(BPF_MUL, R0, 1), | ||
2602 | BPF_EXIT_INSN(), | ||
2603 | }, | ||
2604 | INTERNAL, | ||
2605 | { }, | ||
2606 | { { 0, 3 } }, | ||
2607 | }, | ||
2608 | { | ||
2609 | "ALU_MUL_K: 2 * 0x7FFFFFF8 = 0xFFFFFFF0", | ||
2610 | .u.insns_int = { | ||
2611 | BPF_LD_IMM64(R0, 2), | ||
2612 | BPF_ALU32_IMM(BPF_MUL, R0, 0x7FFFFFF8), | ||
2613 | BPF_EXIT_INSN(), | ||
2614 | }, | ||
2615 | INTERNAL, | ||
2616 | { }, | ||
2617 | { { 0, 0xFFFFFFF0 } }, | ||
2618 | }, | ||
2619 | { | ||
2620 | "ALU_MUL_K: 1 * (-1) = 0x00000000ffffffff", | ||
2621 | .u.insns_int = { | ||
2622 | BPF_LD_IMM64(R2, 0x1), | ||
2623 | BPF_LD_IMM64(R3, 0x00000000ffffffff), | ||
2624 | BPF_ALU32_IMM(BPF_MUL, R2, 0xffffffff), | ||
2625 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | ||
2626 | BPF_MOV32_IMM(R0, 2), | ||
2627 | BPF_EXIT_INSN(), | ||
2628 | BPF_MOV32_IMM(R0, 1), | ||
2629 | BPF_EXIT_INSN(), | ||
2630 | }, | ||
2631 | INTERNAL, | ||
2632 | { }, | ||
2633 | { { 0, 0x1 } }, | ||
2634 | }, | ||
2635 | { | ||
2636 | "ALU64_MUL_K: 2 * 3 = 6", | ||
2637 | .u.insns_int = { | ||
2638 | BPF_LD_IMM64(R0, 2), | ||
2639 | BPF_ALU64_IMM(BPF_MUL, R0, 3), | ||
2640 | BPF_EXIT_INSN(), | ||
2641 | }, | ||
2642 | INTERNAL, | ||
2643 | { }, | ||
2644 | { { 0, 6 } }, | ||
2645 | }, | ||
2646 | { | ||
2647 | "ALU64_MUL_K: 3 * 1 = 3", | ||
2648 | .u.insns_int = { | ||
2649 | BPF_LD_IMM64(R0, 3), | ||
2650 | BPF_ALU64_IMM(BPF_MUL, R0, 1), | ||
2651 | BPF_EXIT_INSN(), | ||
2652 | }, | ||
2653 | INTERNAL, | ||
2654 | { }, | ||
2655 | { { 0, 3 } }, | ||
2656 | }, | ||
2657 | { | ||
2658 | "ALU64_MUL_K: 1 * 2147483647 = 2147483647", | ||
2659 | .u.insns_int = { | ||
2660 | BPF_LD_IMM64(R0, 1), | ||
2661 | BPF_ALU64_IMM(BPF_MUL, R0, 2147483647), | ||
2662 | BPF_EXIT_INSN(), | ||
2663 | }, | ||
2664 | INTERNAL, | ||
2665 | { }, | ||
2666 | { { 0, 2147483647 } }, | ||
2667 | }, | ||
2668 | { | ||
2669 | "ALU64_MUL_K: 1 * -2147483647 = -2147483647", | ||
2670 | .u.insns_int = { | ||
2671 | BPF_LD_IMM64(R0, 1), | ||
2672 | BPF_ALU64_IMM(BPF_MUL, R0, -2147483647), | ||
2673 | BPF_EXIT_INSN(), | ||
2674 | }, | ||
2675 | INTERNAL, | ||
2676 | { }, | ||
2677 | { { 0, -2147483647 } }, | ||
2678 | }, | ||
2679 | { | ||
2680 | "ALU64_MUL_K: 1 * (-1) = 0xffffffffffffffff", | ||
2681 | .u.insns_int = { | ||
2682 | BPF_LD_IMM64(R2, 0x1), | ||
2683 | BPF_LD_IMM64(R3, 0xffffffffffffffffLL), | ||
2684 | BPF_ALU64_IMM(BPF_MUL, R2, 0xffffffff), | ||
2685 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | ||
2686 | BPF_MOV32_IMM(R0, 2), | ||
2687 | BPF_EXIT_INSN(), | ||
2688 | BPF_MOV32_IMM(R0, 1), | ||
2689 | BPF_EXIT_INSN(), | ||
2690 | }, | ||
2691 | INTERNAL, | ||
2692 | { }, | ||
2693 | { { 0, 0x1 } }, | ||
2694 | }, | ||
2695 | /* BPF_ALU | BPF_DIV | BPF_X */ | ||
2696 | { | ||
2697 | "ALU_DIV_X: 6 / 2 = 3", | ||
2698 | .u.insns_int = { | ||
2699 | BPF_LD_IMM64(R0, 6), | ||
2700 | BPF_ALU32_IMM(BPF_MOV, R1, 2), | ||
2701 | BPF_ALU32_REG(BPF_DIV, R0, R1), | ||
2702 | BPF_EXIT_INSN(), | ||
2703 | }, | ||
2704 | INTERNAL, | ||
2705 | { }, | ||
2706 | { { 0, 3 } }, | ||
2707 | }, | ||
2708 | { | ||
2709 | "ALU_DIV_X: 4294967295 / 4294967295 = 1", | ||
2710 | .u.insns_int = { | ||
2711 | BPF_LD_IMM64(R0, 4294967295U), | ||
2712 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967295U), | ||
2713 | BPF_ALU32_REG(BPF_DIV, R0, R1), | ||
2714 | BPF_EXIT_INSN(), | ||
2715 | }, | ||
2716 | INTERNAL, | ||
2717 | { }, | ||
2718 | { { 0, 1 } }, | ||
2719 | }, | ||
2720 | { | ||
2721 | "ALU64_DIV_X: 6 / 2 = 3", | ||
2722 | .u.insns_int = { | ||
2723 | BPF_LD_IMM64(R0, 6), | ||
2724 | BPF_ALU32_IMM(BPF_MOV, R1, 2), | ||
2725 | BPF_ALU64_REG(BPF_DIV, R0, R1), | ||
2726 | BPF_EXIT_INSN(), | ||
2727 | }, | ||
2728 | INTERNAL, | ||
2729 | { }, | ||
2730 | { { 0, 3 } }, | ||
2731 | }, | ||
2732 | { | ||
2733 | "ALU64_DIV_X: 2147483647 / 2147483647 = 1", | ||
2734 | .u.insns_int = { | ||
2735 | BPF_LD_IMM64(R0, 2147483647), | ||
2736 | BPF_ALU32_IMM(BPF_MOV, R1, 2147483647), | ||
2737 | BPF_ALU64_REG(BPF_DIV, R0, R1), | ||
2738 | BPF_EXIT_INSN(), | ||
2739 | }, | ||
2740 | INTERNAL, | ||
2741 | { }, | ||
2742 | { { 0, 1 } }, | ||
2743 | }, | ||
2744 | { | ||
2745 | "ALU64_DIV_X: 0xffffffffffffffff / (-1) = 0x0000000000000001", | ||
2746 | .u.insns_int = { | ||
2747 | BPF_LD_IMM64(R2, 0xffffffffffffffffLL), | ||
2748 | BPF_LD_IMM64(R4, 0xffffffffffffffffLL), | ||
2749 | BPF_LD_IMM64(R3, 0x0000000000000001LL), | ||
2750 | BPF_ALU64_REG(BPF_DIV, R2, R4), | ||
2751 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | ||
2752 | BPF_MOV32_IMM(R0, 2), | ||
2753 | BPF_EXIT_INSN(), | ||
2754 | BPF_MOV32_IMM(R0, 1), | ||
2755 | BPF_EXIT_INSN(), | ||
2756 | }, | ||
2757 | INTERNAL, | ||
2758 | { }, | ||
2759 | { { 0, 0x1 } }, | ||
2760 | }, | ||
2761 | /* BPF_ALU | BPF_DIV | BPF_K */ | ||
2762 | { | ||
2763 | "ALU_DIV_K: 6 / 2 = 3", | ||
2764 | .u.insns_int = { | ||
2765 | BPF_LD_IMM64(R0, 6), | ||
2766 | BPF_ALU32_IMM(BPF_DIV, R0, 2), | ||
2767 | BPF_EXIT_INSN(), | ||
2768 | }, | ||
2769 | INTERNAL, | ||
2770 | { }, | ||
2771 | { { 0, 3 } }, | ||
2772 | }, | ||
2773 | { | ||
2774 | "ALU_DIV_K: 3 / 1 = 3", | ||
2775 | .u.insns_int = { | ||
2776 | BPF_LD_IMM64(R0, 3), | ||
2777 | BPF_ALU32_IMM(BPF_DIV, R0, 1), | ||
2778 | BPF_EXIT_INSN(), | ||
2779 | }, | ||
2780 | INTERNAL, | ||
2781 | { }, | ||
2782 | { { 0, 3 } }, | ||
2783 | }, | ||
2784 | { | ||
2785 | "ALU_DIV_K: 4294967295 / 4294967295 = 1", | ||
2786 | .u.insns_int = { | ||
2787 | BPF_LD_IMM64(R0, 4294967295U), | ||
2788 | BPF_ALU32_IMM(BPF_DIV, R0, 4294967295U), | ||
2789 | BPF_EXIT_INSN(), | ||
2790 | }, | ||
2791 | INTERNAL, | ||
2792 | { }, | ||
2793 | { { 0, 1 } }, | ||
2794 | }, | ||
2795 | { | ||
2796 | "ALU_DIV_K: 0xffffffffffffffff / (-1) = 0x1", | ||
2797 | .u.insns_int = { | ||
2798 | BPF_LD_IMM64(R2, 0xffffffffffffffffLL), | ||
2799 | BPF_LD_IMM64(R3, 0x1UL), | ||
2800 | BPF_ALU32_IMM(BPF_DIV, R2, 0xffffffff), | ||
2801 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | ||
2802 | BPF_MOV32_IMM(R0, 2), | ||
2803 | BPF_EXIT_INSN(), | ||
2804 | BPF_MOV32_IMM(R0, 1), | ||
2805 | BPF_EXIT_INSN(), | ||
2806 | }, | ||
2807 | INTERNAL, | ||
2808 | { }, | ||
2809 | { { 0, 0x1 } }, | ||
2810 | }, | ||
2811 | { | ||
2812 | "ALU64_DIV_K: 6 / 2 = 3", | ||
2813 | .u.insns_int = { | ||
2814 | BPF_LD_IMM64(R0, 6), | ||
2815 | BPF_ALU64_IMM(BPF_DIV, R0, 2), | ||
2816 | BPF_EXIT_INSN(), | ||
2817 | }, | ||
2818 | INTERNAL, | ||
2819 | { }, | ||
2820 | { { 0, 3 } }, | ||
2821 | }, | ||
2822 | { | ||
2823 | "ALU64_DIV_K: 3 / 1 = 3", | ||
2824 | .u.insns_int = { | ||
2825 | BPF_LD_IMM64(R0, 3), | ||
2826 | BPF_ALU64_IMM(BPF_DIV, R0, 1), | ||
2827 | BPF_EXIT_INSN(), | ||
2828 | }, | ||
2829 | INTERNAL, | ||
2830 | { }, | ||
2831 | { { 0, 3 } }, | ||
2832 | }, | ||
2833 | { | ||
2834 | "ALU64_DIV_K: 2147483647 / 2147483647 = 1", | ||
2835 | .u.insns_int = { | ||
2836 | BPF_LD_IMM64(R0, 2147483647), | ||
2837 | BPF_ALU64_IMM(BPF_DIV, R0, 2147483647), | ||
2838 | BPF_EXIT_INSN(), | ||
2839 | }, | ||
2840 | INTERNAL, | ||
2841 | { }, | ||
2842 | { { 0, 1 } }, | ||
2843 | }, | ||
2844 | { | ||
2845 | "ALU64_DIV_K: 0xffffffffffffffff / (-1) = 0x0000000000000001", | ||
2846 | .u.insns_int = { | ||
2847 | BPF_LD_IMM64(R2, 0xffffffffffffffffLL), | ||
2848 | BPF_LD_IMM64(R3, 0x0000000000000001LL), | ||
2849 | BPF_ALU64_IMM(BPF_DIV, R2, 0xffffffff), | ||
2850 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | ||
2851 | BPF_MOV32_IMM(R0, 2), | ||
2852 | BPF_EXIT_INSN(), | ||
2853 | BPF_MOV32_IMM(R0, 1), | ||
2854 | BPF_EXIT_INSN(), | ||
2855 | }, | ||
2856 | INTERNAL, | ||
2857 | { }, | ||
2858 | { { 0, 0x1 } }, | ||
2859 | }, | ||
2860 | /* BPF_ALU | BPF_MOD | BPF_X */ | ||
2861 | { | ||
2862 | "ALU_MOD_X: 3 % 2 = 1", | ||
2863 | .u.insns_int = { | ||
2864 | BPF_LD_IMM64(R0, 3), | ||
2865 | BPF_ALU32_IMM(BPF_MOV, R1, 2), | ||
2866 | BPF_ALU32_REG(BPF_MOD, R0, R1), | ||
2867 | BPF_EXIT_INSN(), | ||
2868 | }, | ||
2869 | INTERNAL, | ||
2870 | { }, | ||
2871 | { { 0, 1 } }, | ||
2872 | }, | ||
2873 | { | ||
2874 | "ALU_MOD_X: 4294967295 % 4294967293 = 2", | ||
2875 | .u.insns_int = { | ||
2876 | BPF_LD_IMM64(R0, 4294967295U), | ||
2877 | BPF_ALU32_IMM(BPF_MOV, R1, 4294967293U), | ||
2878 | BPF_ALU32_REG(BPF_MOD, R0, R1), | ||
2879 | BPF_EXIT_INSN(), | ||
2880 | }, | ||
2881 | INTERNAL, | ||
2882 | { }, | ||
2883 | { { 0, 2 } }, | ||
2884 | }, | ||
2885 | { | ||
2886 | "ALU64_MOD_X: 3 % 2 = 1", | ||
2887 | .u.insns_int = { | ||
2888 | BPF_LD_IMM64(R0, 3), | ||
2889 | BPF_ALU32_IMM(BPF_MOV, R1, 2), | ||
2890 | BPF_ALU64_REG(BPF_MOD, R0, R1), | ||
2891 | BPF_EXIT_INSN(), | ||
2892 | }, | ||
2893 | INTERNAL, | ||
2894 | { }, | ||
2895 | { { 0, 1 } }, | ||
2896 | }, | ||
2897 | { | ||
2898 | "ALU64_MOD_X: 2147483647 % 2147483645 = 2", | ||
2899 | .u.insns_int = { | ||
2900 | BPF_LD_IMM64(R0, 2147483647), | ||
2901 | BPF_ALU32_IMM(BPF_MOV, R1, 2147483645), | ||
2902 | BPF_ALU64_REG(BPF_MOD, R0, R1), | ||
2903 | BPF_EXIT_INSN(), | ||
2904 | }, | ||
2905 | INTERNAL, | ||
2906 | { }, | ||
2907 | { { 0, 2 } }, | ||
2908 | }, | ||
2909 | /* BPF_ALU | BPF_MOD | BPF_K */ | ||
2910 | { | ||
2911 | "ALU_MOD_K: 3 % 2 = 1", | ||
2912 | .u.insns_int = { | ||
2913 | BPF_LD_IMM64(R0, 3), | ||
2914 | BPF_ALU32_IMM(BPF_MOD, R0, 2), | ||
2915 | BPF_EXIT_INSN(), | ||
2916 | }, | ||
2917 | INTERNAL, | ||
2918 | { }, | ||
2919 | { { 0, 1 } }, | ||
2920 | }, | ||
2921 | { | ||
2922 | "ALU_MOD_K: 3 % 1 = 0", | ||
2923 | .u.insns_int = { | ||
2924 | BPF_LD_IMM64(R0, 3), | ||
2925 | BPF_ALU32_IMM(BPF_MOD, R0, 1), | ||
2926 | BPF_EXIT_INSN(), | ||
2927 | }, | ||
2928 | INTERNAL, | ||
2929 | { }, | ||
2930 | { { 0, 0 } }, | ||
2931 | }, | ||
2932 | { | ||
2933 | "ALU_MOD_K: 4294967295 % 4294967293 = 2", | ||
2934 | .u.insns_int = { | ||
2935 | BPF_LD_IMM64(R0, 4294967295U), | ||
2936 | BPF_ALU32_IMM(BPF_MOD, R0, 4294967293U), | ||
2937 | BPF_EXIT_INSN(), | ||
2938 | }, | ||
2939 | INTERNAL, | ||
2940 | { }, | ||
2941 | { { 0, 2 } }, | ||
2942 | }, | ||
2943 | { | ||
2944 | "ALU64_MOD_K: 3 % 2 = 1", | ||
2945 | .u.insns_int = { | ||
2946 | BPF_LD_IMM64(R0, 3), | ||
2947 | BPF_ALU64_IMM(BPF_MOD, R0, 2), | ||
2948 | BPF_EXIT_INSN(), | ||
2949 | }, | ||
2950 | INTERNAL, | ||
2951 | { }, | ||
2952 | { { 0, 1 } }, | ||
2953 | }, | ||
2954 | { | ||
2955 | "ALU64_MOD_K: 3 % 1 = 0", | ||
2956 | .u.insns_int = { | ||
2957 | BPF_LD_IMM64(R0, 3), | ||
2958 | BPF_ALU64_IMM(BPF_MOD, R0, 1), | ||
2959 | BPF_EXIT_INSN(), | ||
2960 | }, | ||
2961 | INTERNAL, | ||
2962 | { }, | ||
2963 | { { 0, 0 } }, | ||
2964 | }, | ||
2965 | { | ||
2966 | "ALU64_MOD_K: 2147483647 % 2147483645 = 2", | ||
2967 | .u.insns_int = { | ||
2968 | BPF_LD_IMM64(R0, 2147483647), | ||
2969 | BPF_ALU64_IMM(BPF_MOD, R0, 2147483645), | ||
2970 | BPF_EXIT_INSN(), | ||
2971 | }, | ||
2972 | INTERNAL, | ||
2973 | { }, | ||
2974 | { { 0, 2 } }, | ||
2975 | }, | ||
2976 | /* BPF_ALU | BPF_AND | BPF_X */ | ||
2977 | { | ||
2978 | "ALU_AND_X: 3 & 2 = 2", | ||
2979 | .u.insns_int = { | ||
2980 | BPF_LD_IMM64(R0, 3), | ||
2981 | BPF_ALU32_IMM(BPF_MOV, R1, 2), | ||
2982 | BPF_ALU32_REG(BPF_AND, R0, R1), | ||
2983 | BPF_EXIT_INSN(), | ||
2984 | }, | ||
2985 | INTERNAL, | ||
2986 | { }, | ||
2987 | { { 0, 2 } }, | ||
2988 | }, | ||
2989 | { | ||
2990 | "ALU_AND_X: 0xffffffff & 0xffffffff = 0xffffffff", | ||
2991 | .u.insns_int = { | ||
2992 | BPF_LD_IMM64(R0, 0xffffffff), | ||
2993 | BPF_ALU32_IMM(BPF_MOV, R1, 0xffffffff), | ||
2994 | BPF_ALU32_REG(BPF_AND, R0, R1), | ||
2995 | BPF_EXIT_INSN(), | ||
2996 | }, | ||
2997 | INTERNAL, | ||
2998 | { }, | ||
2999 | { { 0, 0xffffffff } }, | ||
3000 | }, | ||
3001 | { | ||
3002 | "ALU64_AND_X: 3 & 2 = 2", | ||
3003 | .u.insns_int = { | ||
3004 | BPF_LD_IMM64(R0, 3), | ||
3005 | BPF_ALU32_IMM(BPF_MOV, R1, 2), | ||
3006 | BPF_ALU64_REG(BPF_AND, R0, R1), | ||
3007 | BPF_EXIT_INSN(), | ||
3008 | }, | ||
3009 | INTERNAL, | ||
3010 | { }, | ||
3011 | { { 0, 2 } }, | ||
3012 | }, | ||
3013 | { | ||
3014 | "ALU64_AND_X: 0xffffffff & 0xffffffff = 0xffffffff", | ||
3015 | .u.insns_int = { | ||
3016 | BPF_LD_IMM64(R0, 0xffffffff), | ||
3017 | BPF_ALU32_IMM(BPF_MOV, R1, 0xffffffff), | ||
3018 | BPF_ALU64_REG(BPF_AND, R0, R1), | ||
3019 | BPF_EXIT_INSN(), | ||
3020 | }, | ||
3021 | INTERNAL, | ||
3022 | { }, | ||
3023 | { { 0, 0xffffffff } }, | ||
3024 | }, | ||
3025 | /* BPF_ALU | BPF_AND | BPF_K */ | ||
3026 | { | ||
3027 | "ALU_AND_K: 3 & 2 = 2", | ||
3028 | .u.insns_int = { | ||
3029 | BPF_LD_IMM64(R0, 3), | ||
3030 | BPF_ALU32_IMM(BPF_AND, R0, 2), | ||
3031 | BPF_EXIT_INSN(), | ||
3032 | }, | ||
3033 | INTERNAL, | ||
3034 | { }, | ||
3035 | { { 0, 2 } }, | ||
3036 | }, | ||
3037 | { | ||
3038 | "ALU_AND_K: 0xffffffff & 0xffffffff = 0xffffffff", | ||
3039 | .u.insns_int = { | ||
3040 | BPF_LD_IMM64(R0, 0xffffffff), | ||
3041 | BPF_ALU32_IMM(BPF_AND, R0, 0xffffffff), | ||
3042 | BPF_EXIT_INSN(), | ||
3043 | }, | ||
3044 | INTERNAL, | ||
3045 | { }, | ||
3046 | { { 0, 0xffffffff } }, | ||
3047 | }, | ||
3048 | { | ||
3049 | "ALU64_AND_K: 3 & 2 = 2", | ||
3050 | .u.insns_int = { | ||
3051 | BPF_LD_IMM64(R0, 3), | ||
3052 | BPF_ALU64_IMM(BPF_AND, R0, 2), | ||
3053 | BPF_EXIT_INSN(), | ||
3054 | }, | ||
3055 | INTERNAL, | ||
3056 | { }, | ||
3057 | { { 0, 2 } }, | ||
3058 | }, | ||
3059 | { | ||
3060 | "ALU64_AND_K: 0xffffffff & 0xffffffff = 0xffffffff", | ||
3061 | .u.insns_int = { | ||
3062 | BPF_LD_IMM64(R0, 0xffffffff), | ||
3063 | BPF_ALU64_IMM(BPF_AND, R0, 0xffffffff), | ||
3064 | BPF_EXIT_INSN(), | ||
3065 | }, | ||
3066 | INTERNAL, | ||
3067 | { }, | ||
3068 | { { 0, 0xffffffff } }, | ||
3069 | }, | ||
3070 | { | ||
3071 | "ALU64_AND_K: 0x0000ffffffff0000 & 0x0 = 0x0000ffff00000000", | ||
3072 | .u.insns_int = { | ||
3073 | BPF_LD_IMM64(R2, 0x0000ffffffff0000LL), | ||
3074 | BPF_LD_IMM64(R3, 0x0000000000000000LL), | ||
3075 | BPF_ALU64_IMM(BPF_AND, R2, 0x0), | ||
3076 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | ||
3077 | BPF_MOV32_IMM(R0, 2), | ||
3078 | BPF_EXIT_INSN(), | ||
3079 | BPF_MOV32_IMM(R0, 1), | ||
3080 | BPF_EXIT_INSN(), | ||
3081 | }, | ||
3082 | INTERNAL, | ||
3083 | { }, | ||
3084 | { { 0, 0x1 } }, | ||
3085 | }, | ||
3086 | { | ||
3087 | "ALU64_AND_K: 0x0000ffffffff0000 & -1 = 0x0000ffffffffffff", | ||
3088 | .u.insns_int = { | ||
3089 | BPF_LD_IMM64(R2, 0x0000ffffffff0000LL), | ||
3090 | BPF_LD_IMM64(R3, 0x0000ffffffff0000LL), | ||
3091 | BPF_ALU64_IMM(BPF_AND, R2, 0xffffffff), | ||
3092 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | ||
3093 | BPF_MOV32_IMM(R0, 2), | ||
3094 | BPF_EXIT_INSN(), | ||
3095 | BPF_MOV32_IMM(R0, 1), | ||
3096 | BPF_EXIT_INSN(), | ||
3097 | }, | ||
3098 | INTERNAL, | ||
3099 | { }, | ||
3100 | { { 0, 0x1 } }, | ||
3101 | }, | ||
3102 | { | ||
3103 | "ALU64_AND_K: 0xffffffffffffffff & -1 = 0xffffffffffffffff", | ||
3104 | .u.insns_int = { | ||
3105 | BPF_LD_IMM64(R2, 0xffffffffffffffffLL), | ||
3106 | BPF_LD_IMM64(R3, 0xffffffffffffffffLL), | ||
3107 | BPF_ALU64_IMM(BPF_AND, R2, 0xffffffff), | ||
3108 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | ||
3109 | BPF_MOV32_IMM(R0, 2), | ||
3110 | BPF_EXIT_INSN(), | ||
3111 | BPF_MOV32_IMM(R0, 1), | ||
3112 | BPF_EXIT_INSN(), | ||
3113 | }, | ||
3114 | INTERNAL, | ||
3115 | { }, | ||
3116 | { { 0, 0x1 } }, | ||
3117 | }, | ||
3118 | /* BPF_ALU | BPF_OR | BPF_X */ | ||
3119 | { | ||
3120 | "ALU_OR_X: 1 | 2 = 3", | ||
3121 | .u.insns_int = { | ||
3122 | BPF_LD_IMM64(R0, 1), | ||
3123 | BPF_ALU32_IMM(BPF_MOV, R1, 2), | ||
3124 | BPF_ALU32_REG(BPF_OR, R0, R1), | ||
3125 | BPF_EXIT_INSN(), | ||
3126 | }, | ||
3127 | INTERNAL, | ||
3128 | { }, | ||
3129 | { { 0, 3 } }, | ||
3130 | }, | ||
3131 | { | ||
3132 | "ALU_OR_X: 0x0 | 0xffffffff = 0xffffffff", | ||
3133 | .u.insns_int = { | ||
3134 | BPF_LD_IMM64(R0, 0), | ||
3135 | BPF_ALU32_IMM(BPF_MOV, R1, 0xffffffff), | ||
3136 | BPF_ALU32_REG(BPF_OR, R0, R1), | ||
3137 | BPF_EXIT_INSN(), | ||
3138 | }, | ||
3139 | INTERNAL, | ||
3140 | { }, | ||
3141 | { { 0, 0xffffffff } }, | ||
3142 | }, | ||
3143 | { | ||
3144 | "ALU64_OR_X: 1 | 2 = 3", | ||
3145 | .u.insns_int = { | ||
3146 | BPF_LD_IMM64(R0, 1), | ||
3147 | BPF_ALU32_IMM(BPF_MOV, R1, 2), | ||
3148 | BPF_ALU64_REG(BPF_OR, R0, R1), | ||
3149 | BPF_EXIT_INSN(), | ||
3150 | }, | ||
3151 | INTERNAL, | ||
3152 | { }, | ||
3153 | { { 0, 3 } }, | ||
3154 | }, | ||
3155 | { | ||
3156 | "ALU64_OR_X: 0 | 0xffffffff = 0xffffffff", | ||
3157 | .u.insns_int = { | ||
3158 | BPF_LD_IMM64(R0, 0), | ||
3159 | BPF_ALU32_IMM(BPF_MOV, R1, 0xffffffff), | ||
3160 | BPF_ALU64_REG(BPF_OR, R0, R1), | ||
3161 | BPF_EXIT_INSN(), | ||
3162 | }, | ||
3163 | INTERNAL, | ||
3164 | { }, | ||
3165 | { { 0, 0xffffffff } }, | ||
3166 | }, | ||
3167 | /* BPF_ALU | BPF_OR | BPF_K */ | ||
3168 | { | ||
3169 | "ALU_OR_K: 1 | 2 = 3", | ||
3170 | .u.insns_int = { | ||
3171 | BPF_LD_IMM64(R0, 1), | ||
3172 | BPF_ALU32_IMM(BPF_OR, R0, 2), | ||
3173 | BPF_EXIT_INSN(), | ||
3174 | }, | ||
3175 | INTERNAL, | ||
3176 | { }, | ||
3177 | { { 0, 3 } }, | ||
3178 | }, | ||
3179 | { | ||
3180 | "ALU_OR_K: 0 & 0xffffffff = 0xffffffff", | ||
3181 | .u.insns_int = { | ||
3182 | BPF_LD_IMM64(R0, 0), | ||
3183 | BPF_ALU32_IMM(BPF_OR, R0, 0xffffffff), | ||
3184 | BPF_EXIT_INSN(), | ||
3185 | }, | ||
3186 | INTERNAL, | ||
3187 | { }, | ||
3188 | { { 0, 0xffffffff } }, | ||
3189 | }, | ||
3190 | { | ||
3191 | "ALU64_OR_K: 1 | 2 = 3", | ||
3192 | .u.insns_int = { | ||
3193 | BPF_LD_IMM64(R0, 1), | ||
3194 | BPF_ALU64_IMM(BPF_OR, R0, 2), | ||
3195 | BPF_EXIT_INSN(), | ||
3196 | }, | ||
3197 | INTERNAL, | ||
3198 | { }, | ||
3199 | { { 0, 3 } }, | ||
3200 | }, | ||
3201 | { | ||
3202 | "ALU64_OR_K: 0 & 0xffffffff = 0xffffffff", | ||
3203 | .u.insns_int = { | ||
3204 | BPF_LD_IMM64(R0, 0), | ||
3205 | BPF_ALU64_IMM(BPF_OR, R0, 0xffffffff), | ||
3206 | BPF_EXIT_INSN(), | ||
3207 | }, | ||
3208 | INTERNAL, | ||
3209 | { }, | ||
3210 | { { 0, 0xffffffff } }, | ||
3211 | }, | ||
3212 | { | ||
3213 | "ALU64_OR_K: 0x0000ffffffff0000 | 0x0 = 0x0000ffff00000000", | ||
3214 | .u.insns_int = { | ||
3215 | BPF_LD_IMM64(R2, 0x0000ffffffff0000LL), | ||
3216 | BPF_LD_IMM64(R3, 0x0000ffffffff0000LL), | ||
3217 | BPF_ALU64_IMM(BPF_OR, R2, 0x0), | ||
3218 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | ||
3219 | BPF_MOV32_IMM(R0, 2), | ||
3220 | BPF_EXIT_INSN(), | ||
3221 | BPF_MOV32_IMM(R0, 1), | ||
3222 | BPF_EXIT_INSN(), | ||
3223 | }, | ||
3224 | INTERNAL, | ||
3225 | { }, | ||
3226 | { { 0, 0x1 } }, | ||
3227 | }, | ||
3228 | { | ||
3229 | "ALU64_OR_K: 0x0000ffffffff0000 | -1 = 0xffffffffffffffff", | ||
3230 | .u.insns_int = { | ||
3231 | BPF_LD_IMM64(R2, 0x0000ffffffff0000LL), | ||
3232 | BPF_LD_IMM64(R3, 0xffffffffffffffffLL), | ||
3233 | BPF_ALU64_IMM(BPF_OR, R2, 0xffffffff), | ||
3234 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | ||
3235 | BPF_MOV32_IMM(R0, 2), | ||
3236 | BPF_EXIT_INSN(), | ||
3237 | BPF_MOV32_IMM(R0, 1), | ||
3238 | BPF_EXIT_INSN(), | ||
3239 | }, | ||
3240 | INTERNAL, | ||
3241 | { }, | ||
3242 | { { 0, 0x1 } }, | ||
3243 | }, | ||
3244 | { | ||
3245 | "ALU64_OR_K: 0x000000000000000 | -1 = 0xffffffffffffffff", | ||
3246 | .u.insns_int = { | ||
3247 | BPF_LD_IMM64(R2, 0x0000000000000000LL), | ||
3248 | BPF_LD_IMM64(R3, 0xffffffffffffffffLL), | ||
3249 | BPF_ALU64_IMM(BPF_OR, R2, 0xffffffff), | ||
3250 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | ||
3251 | BPF_MOV32_IMM(R0, 2), | ||
3252 | BPF_EXIT_INSN(), | ||
3253 | BPF_MOV32_IMM(R0, 1), | ||
3254 | BPF_EXIT_INSN(), | ||
3255 | }, | ||
3256 | INTERNAL, | ||
3257 | { }, | ||
3258 | { { 0, 0x1 } }, | ||
3259 | }, | ||
3260 | /* BPF_ALU | BPF_XOR | BPF_X */ | ||
3261 | { | ||
3262 | "ALU_XOR_X: 5 ^ 6 = 3", | ||
3263 | .u.insns_int = { | ||
3264 | BPF_LD_IMM64(R0, 5), | ||
3265 | BPF_ALU32_IMM(BPF_MOV, R1, 6), | ||
3266 | BPF_ALU32_REG(BPF_XOR, R0, R1), | ||
3267 | BPF_EXIT_INSN(), | ||
3268 | }, | ||
3269 | INTERNAL, | ||
3270 | { }, | ||
3271 | { { 0, 3 } }, | ||
3272 | }, | ||
3273 | { | ||
3274 | "ALU_XOR_X: 0x1 ^ 0xffffffff = 0xfffffffe", | ||
3275 | .u.insns_int = { | ||
3276 | BPF_LD_IMM64(R0, 1), | ||
3277 | BPF_ALU32_IMM(BPF_MOV, R1, 0xffffffff), | ||
3278 | BPF_ALU32_REG(BPF_XOR, R0, R1), | ||
3279 | BPF_EXIT_INSN(), | ||
3280 | }, | ||
3281 | INTERNAL, | ||
3282 | { }, | ||
3283 | { { 0, 0xfffffffe } }, | ||
3284 | }, | ||
3285 | { | ||
3286 | "ALU64_XOR_X: 5 ^ 6 = 3", | ||
3287 | .u.insns_int = { | ||
3288 | BPF_LD_IMM64(R0, 5), | ||
3289 | BPF_ALU32_IMM(BPF_MOV, R1, 6), | ||
3290 | BPF_ALU64_REG(BPF_XOR, R0, R1), | ||
3291 | BPF_EXIT_INSN(), | ||
3292 | }, | ||
3293 | INTERNAL, | ||
3294 | { }, | ||
3295 | { { 0, 3 } }, | ||
3296 | }, | ||
3297 | { | ||
3298 | "ALU64_XOR_X: 1 ^ 0xffffffff = 0xfffffffe", | ||
3299 | .u.insns_int = { | ||
3300 | BPF_LD_IMM64(R0, 1), | ||
3301 | BPF_ALU32_IMM(BPF_MOV, R1, 0xffffffff), | ||
3302 | BPF_ALU64_REG(BPF_XOR, R0, R1), | ||
3303 | BPF_EXIT_INSN(), | ||
3304 | }, | ||
3305 | INTERNAL, | ||
3306 | { }, | ||
3307 | { { 0, 0xfffffffe } }, | ||
3308 | }, | ||
3309 | /* BPF_ALU | BPF_XOR | BPF_K */ | ||
3310 | { | ||
3311 | "ALU_XOR_K: 5 ^ 6 = 3", | ||
3312 | .u.insns_int = { | ||
3313 | BPF_LD_IMM64(R0, 5), | ||
3314 | BPF_ALU32_IMM(BPF_XOR, R0, 6), | ||
3315 | BPF_EXIT_INSN(), | ||
3316 | }, | ||
3317 | INTERNAL, | ||
3318 | { }, | ||
3319 | { { 0, 3 } }, | ||
3320 | }, | ||
3321 | { | ||
3322 | "ALU_XOR_K: 1 ^ 0xffffffff = 0xfffffffe", | ||
3323 | .u.insns_int = { | ||
3324 | BPF_LD_IMM64(R0, 1), | ||
3325 | BPF_ALU32_IMM(BPF_XOR, R0, 0xffffffff), | ||
3326 | BPF_EXIT_INSN(), | ||
3327 | }, | ||
3328 | INTERNAL, | ||
3329 | { }, | ||
3330 | { { 0, 0xfffffffe } }, | ||
3331 | }, | ||
3332 | { | ||
3333 | "ALU64_XOR_K: 5 ^ 6 = 3", | ||
3334 | .u.insns_int = { | ||
3335 | BPF_LD_IMM64(R0, 5), | ||
3336 | BPF_ALU64_IMM(BPF_XOR, R0, 6), | ||
3337 | BPF_EXIT_INSN(), | ||
3338 | }, | ||
3339 | INTERNAL, | ||
3340 | { }, | ||
3341 | { { 0, 3 } }, | ||
3342 | }, | ||
3343 | { | ||
3344 | "ALU64_XOR_K: 1 & 0xffffffff = 0xfffffffe", | ||
3345 | .u.insns_int = { | ||
3346 | BPF_LD_IMM64(R0, 1), | ||
3347 | BPF_ALU64_IMM(BPF_XOR, R0, 0xffffffff), | ||
3348 | BPF_EXIT_INSN(), | ||
3349 | }, | ||
3350 | INTERNAL, | ||
3351 | { }, | ||
3352 | { { 0, 0xfffffffe } }, | ||
3353 | }, | ||
3354 | { | ||
3355 | "ALU64_XOR_K: 0x0000ffffffff0000 ^ 0x0 = 0x0000ffffffff0000", | ||
3356 | .u.insns_int = { | ||
3357 | BPF_LD_IMM64(R2, 0x0000ffffffff0000LL), | ||
3358 | BPF_LD_IMM64(R3, 0x0000ffffffff0000LL), | ||
3359 | BPF_ALU64_IMM(BPF_XOR, R2, 0x0), | ||
3360 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | ||
3361 | BPF_MOV32_IMM(R0, 2), | ||
3362 | BPF_EXIT_INSN(), | ||
3363 | BPF_MOV32_IMM(R0, 1), | ||
3364 | BPF_EXIT_INSN(), | ||
3365 | }, | ||
3366 | INTERNAL, | ||
3367 | { }, | ||
3368 | { { 0, 0x1 } }, | ||
3369 | }, | ||
3370 | { | ||
3371 | "ALU64_XOR_K: 0x0000ffffffff0000 ^ -1 = 0xffff00000000ffff", | ||
3372 | .u.insns_int = { | ||
3373 | BPF_LD_IMM64(R2, 0x0000ffffffff0000LL), | ||
3374 | BPF_LD_IMM64(R3, 0xffff00000000ffffLL), | ||
3375 | BPF_ALU64_IMM(BPF_XOR, R2, 0xffffffff), | ||
3376 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | ||
3377 | BPF_MOV32_IMM(R0, 2), | ||
3378 | BPF_EXIT_INSN(), | ||
3379 | BPF_MOV32_IMM(R0, 1), | ||
3380 | BPF_EXIT_INSN(), | ||
3381 | }, | ||
3382 | INTERNAL, | ||
3383 | { }, | ||
3384 | { { 0, 0x1 } }, | ||
3385 | }, | ||
3386 | { | ||
3387 | "ALU64_XOR_K: 0x000000000000000 ^ -1 = 0xffffffffffffffff", | ||
3388 | .u.insns_int = { | ||
3389 | BPF_LD_IMM64(R2, 0x0000000000000000LL), | ||
3390 | BPF_LD_IMM64(R3, 0xffffffffffffffffLL), | ||
3391 | BPF_ALU64_IMM(BPF_XOR, R2, 0xffffffff), | ||
3392 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | ||
3393 | BPF_MOV32_IMM(R0, 2), | ||
3394 | BPF_EXIT_INSN(), | ||
3395 | BPF_MOV32_IMM(R0, 1), | ||
3396 | BPF_EXIT_INSN(), | ||
3397 | }, | ||
3398 | INTERNAL, | ||
3399 | { }, | ||
3400 | { { 0, 0x1 } }, | ||
3401 | }, | ||
3402 | /* BPF_ALU | BPF_LSH | BPF_X */ | ||
3403 | { | ||
3404 | "ALU_LSH_X: 1 << 1 = 2", | ||
3405 | .u.insns_int = { | ||
3406 | BPF_LD_IMM64(R0, 1), | ||
3407 | BPF_ALU32_IMM(BPF_MOV, R1, 1), | ||
3408 | BPF_ALU32_REG(BPF_LSH, R0, R1), | ||
3409 | BPF_EXIT_INSN(), | ||
3410 | }, | ||
3411 | INTERNAL, | ||
3412 | { }, | ||
3413 | { { 0, 2 } }, | ||
3414 | }, | ||
3415 | { | ||
3416 | "ALU_LSH_X: 1 << 31 = 0x80000000", | ||
3417 | .u.insns_int = { | ||
3418 | BPF_LD_IMM64(R0, 1), | ||
3419 | BPF_ALU32_IMM(BPF_MOV, R1, 31), | ||
3420 | BPF_ALU32_REG(BPF_LSH, R0, R1), | ||
3421 | BPF_EXIT_INSN(), | ||
3422 | }, | ||
3423 | INTERNAL, | ||
3424 | { }, | ||
3425 | { { 0, 0x80000000 } }, | ||
3426 | }, | ||
3427 | { | ||
3428 | "ALU64_LSH_X: 1 << 1 = 2", | ||
3429 | .u.insns_int = { | ||
3430 | BPF_LD_IMM64(R0, 1), | ||
3431 | BPF_ALU32_IMM(BPF_MOV, R1, 1), | ||
3432 | BPF_ALU64_REG(BPF_LSH, R0, R1), | ||
3433 | BPF_EXIT_INSN(), | ||
3434 | }, | ||
3435 | INTERNAL, | ||
3436 | { }, | ||
3437 | { { 0, 2 } }, | ||
3438 | }, | ||
3439 | { | ||
3440 | "ALU64_LSH_X: 1 << 31 = 0x80000000", | ||
3441 | .u.insns_int = { | ||
3442 | BPF_LD_IMM64(R0, 1), | ||
3443 | BPF_ALU32_IMM(BPF_MOV, R1, 31), | ||
3444 | BPF_ALU64_REG(BPF_LSH, R0, R1), | ||
3445 | BPF_EXIT_INSN(), | ||
3446 | }, | ||
3447 | INTERNAL, | ||
3448 | { }, | ||
3449 | { { 0, 0x80000000 } }, | ||
3450 | }, | ||
3451 | /* BPF_ALU | BPF_LSH | BPF_K */ | ||
3452 | { | ||
3453 | "ALU_LSH_K: 1 << 1 = 2", | ||
3454 | .u.insns_int = { | ||
3455 | BPF_LD_IMM64(R0, 1), | ||
3456 | BPF_ALU32_IMM(BPF_LSH, R0, 1), | ||
3457 | BPF_EXIT_INSN(), | ||
3458 | }, | ||
3459 | INTERNAL, | ||
3460 | { }, | ||
3461 | { { 0, 2 } }, | ||
3462 | }, | ||
3463 | { | ||
3464 | "ALU_LSH_K: 1 << 31 = 0x80000000", | ||
3465 | .u.insns_int = { | ||
3466 | BPF_LD_IMM64(R0, 1), | ||
3467 | BPF_ALU32_IMM(BPF_LSH, R0, 31), | ||
3468 | BPF_EXIT_INSN(), | ||
3469 | }, | ||
3470 | INTERNAL, | ||
3471 | { }, | ||
3472 | { { 0, 0x80000000 } }, | ||
3473 | }, | ||
3474 | { | ||
3475 | "ALU64_LSH_K: 1 << 1 = 2", | ||
3476 | .u.insns_int = { | ||
3477 | BPF_LD_IMM64(R0, 1), | ||
3478 | BPF_ALU64_IMM(BPF_LSH, R0, 1), | ||
3479 | BPF_EXIT_INSN(), | ||
3480 | }, | ||
3481 | INTERNAL, | ||
3482 | { }, | ||
3483 | { { 0, 2 } }, | ||
3484 | }, | ||
3485 | { | ||
3486 | "ALU64_LSH_K: 1 << 31 = 0x80000000", | ||
3487 | .u.insns_int = { | ||
3488 | BPF_LD_IMM64(R0, 1), | ||
3489 | BPF_ALU64_IMM(BPF_LSH, R0, 31), | ||
3490 | BPF_EXIT_INSN(), | ||
3491 | }, | ||
3492 | INTERNAL, | ||
3493 | { }, | ||
3494 | { { 0, 0x80000000 } }, | ||
3495 | }, | ||
3496 | /* BPF_ALU | BPF_RSH | BPF_X */ | ||
3497 | { | ||
3498 | "ALU_RSH_X: 2 >> 1 = 1", | ||
3499 | .u.insns_int = { | ||
3500 | BPF_LD_IMM64(R0, 2), | ||
3501 | BPF_ALU32_IMM(BPF_MOV, R1, 1), | ||
3502 | BPF_ALU32_REG(BPF_RSH, R0, R1), | ||
3503 | BPF_EXIT_INSN(), | ||
3504 | }, | ||
3505 | INTERNAL, | ||
3506 | { }, | ||
3507 | { { 0, 1 } }, | ||
3508 | }, | ||
3509 | { | ||
3510 | "ALU_RSH_X: 0x80000000 >> 31 = 1", | ||
3511 | .u.insns_int = { | ||
3512 | BPF_LD_IMM64(R0, 0x80000000), | ||
3513 | BPF_ALU32_IMM(BPF_MOV, R1, 31), | ||
3514 | BPF_ALU32_REG(BPF_RSH, R0, R1), | ||
3515 | BPF_EXIT_INSN(), | ||
3516 | }, | ||
3517 | INTERNAL, | ||
3518 | { }, | ||
3519 | { { 0, 1 } }, | ||
3520 | }, | ||
3521 | { | ||
3522 | "ALU64_RSH_X: 2 >> 1 = 1", | ||
3523 | .u.insns_int = { | ||
3524 | BPF_LD_IMM64(R0, 2), | ||
3525 | BPF_ALU32_IMM(BPF_MOV, R1, 1), | ||
3526 | BPF_ALU64_REG(BPF_RSH, R0, R1), | ||
3527 | BPF_EXIT_INSN(), | ||
3528 | }, | ||
3529 | INTERNAL, | ||
3530 | { }, | ||
3531 | { { 0, 1 } }, | ||
3532 | }, | ||
3533 | { | ||
3534 | "ALU64_RSH_X: 0x80000000 >> 31 = 1", | ||
3535 | .u.insns_int = { | ||
3536 | BPF_LD_IMM64(R0, 0x80000000), | ||
3537 | BPF_ALU32_IMM(BPF_MOV, R1, 31), | ||
3538 | BPF_ALU64_REG(BPF_RSH, R0, R1), | ||
3539 | BPF_EXIT_INSN(), | ||
3540 | }, | ||
3541 | INTERNAL, | ||
3542 | { }, | ||
3543 | { { 0, 1 } }, | ||
3544 | }, | ||
3545 | /* BPF_ALU | BPF_RSH | BPF_K */ | ||
3546 | { | ||
3547 | "ALU_RSH_K: 2 >> 1 = 1", | ||
3548 | .u.insns_int = { | ||
3549 | BPF_LD_IMM64(R0, 2), | ||
3550 | BPF_ALU32_IMM(BPF_RSH, R0, 1), | ||
3551 | BPF_EXIT_INSN(), | ||
3552 | }, | ||
3553 | INTERNAL, | ||
3554 | { }, | ||
3555 | { { 0, 1 } }, | ||
3556 | }, | ||
3557 | { | ||
3558 | "ALU_RSH_K: 0x80000000 >> 31 = 1", | ||
3559 | .u.insns_int = { | ||
3560 | BPF_LD_IMM64(R0, 0x80000000), | ||
3561 | BPF_ALU32_IMM(BPF_RSH, R0, 31), | ||
3562 | BPF_EXIT_INSN(), | ||
3563 | }, | ||
3564 | INTERNAL, | ||
3565 | { }, | ||
3566 | { { 0, 1 } }, | ||
3567 | }, | ||
3568 | { | ||
3569 | "ALU64_RSH_K: 2 >> 1 = 1", | ||
3570 | .u.insns_int = { | ||
3571 | BPF_LD_IMM64(R0, 2), | ||
3572 | BPF_ALU64_IMM(BPF_RSH, R0, 1), | ||
3573 | BPF_EXIT_INSN(), | ||
3574 | }, | ||
3575 | INTERNAL, | ||
3576 | { }, | ||
3577 | { { 0, 1 } }, | ||
3578 | }, | ||
3579 | { | ||
3580 | "ALU64_RSH_K: 0x80000000 >> 31 = 1", | ||
3581 | .u.insns_int = { | ||
3582 | BPF_LD_IMM64(R0, 0x80000000), | ||
3583 | BPF_ALU64_IMM(BPF_RSH, R0, 31), | ||
3584 | BPF_EXIT_INSN(), | ||
3585 | }, | ||
3586 | INTERNAL, | ||
3587 | { }, | ||
3588 | { { 0, 1 } }, | ||
3589 | }, | ||
3590 | /* BPF_ALU | BPF_ARSH | BPF_X */ | ||
3591 | { | ||
3592 | "ALU_ARSH_X: 0xff00ff0000000000 >> 40 = 0xffffffffffff00ff", | ||
3593 | .u.insns_int = { | ||
3594 | BPF_LD_IMM64(R0, 0xff00ff0000000000LL), | ||
3595 | BPF_ALU32_IMM(BPF_MOV, R1, 40), | ||
3596 | BPF_ALU64_REG(BPF_ARSH, R0, R1), | ||
3597 | BPF_EXIT_INSN(), | ||
3598 | }, | ||
3599 | INTERNAL, | ||
3600 | { }, | ||
3601 | { { 0, 0xffff00ff } }, | ||
3602 | }, | ||
3603 | /* BPF_ALU | BPF_ARSH | BPF_K */ | ||
3604 | { | ||
3605 | "ALU_ARSH_K: 0xff00ff0000000000 >> 40 = 0xffffffffffff00ff", | ||
3606 | .u.insns_int = { | ||
3607 | BPF_LD_IMM64(R0, 0xff00ff0000000000LL), | ||
3608 | BPF_ALU64_IMM(BPF_ARSH, R0, 40), | ||
3609 | BPF_EXIT_INSN(), | ||
3610 | }, | ||
3611 | INTERNAL, | ||
3612 | { }, | ||
3613 | { { 0, 0xffff00ff } }, | ||
3614 | }, | ||
3615 | /* BPF_ALU | BPF_NEG */ | ||
3616 | { | ||
3617 | "ALU_NEG: -(3) = -3", | ||
3618 | .u.insns_int = { | ||
3619 | BPF_ALU32_IMM(BPF_MOV, R0, 3), | ||
3620 | BPF_ALU32_IMM(BPF_NEG, R0, 0), | ||
3621 | BPF_EXIT_INSN(), | ||
3622 | }, | ||
3623 | INTERNAL, | ||
3624 | { }, | ||
3625 | { { 0, -3 } }, | ||
3626 | }, | ||
3627 | { | ||
3628 | "ALU_NEG: -(-3) = 3", | ||
3629 | .u.insns_int = { | ||
3630 | BPF_ALU32_IMM(BPF_MOV, R0, -3), | ||
3631 | BPF_ALU32_IMM(BPF_NEG, R0, 0), | ||
3632 | BPF_EXIT_INSN(), | ||
3633 | }, | ||
3634 | INTERNAL, | ||
3635 | { }, | ||
3636 | { { 0, 3 } }, | ||
3637 | }, | ||
3638 | { | ||
3639 | "ALU64_NEG: -(3) = -3", | ||
3640 | .u.insns_int = { | ||
3641 | BPF_LD_IMM64(R0, 3), | ||
3642 | BPF_ALU64_IMM(BPF_NEG, R0, 0), | ||
3643 | BPF_EXIT_INSN(), | ||
3644 | }, | ||
3645 | INTERNAL, | ||
3646 | { }, | ||
3647 | { { 0, -3 } }, | ||
3648 | }, | ||
3649 | { | ||
3650 | "ALU64_NEG: -(-3) = 3", | ||
3651 | .u.insns_int = { | ||
3652 | BPF_LD_IMM64(R0, -3), | ||
3653 | BPF_ALU64_IMM(BPF_NEG, R0, 0), | ||
3654 | BPF_EXIT_INSN(), | ||
3655 | }, | ||
3656 | INTERNAL, | ||
3657 | { }, | ||
3658 | { { 0, 3 } }, | ||
3659 | }, | ||
3660 | /* BPF_ALU | BPF_END | BPF_FROM_BE */ | ||
3661 | { | ||
3662 | "ALU_END_FROM_BE 16: 0x0123456789abcdef -> 0xcdef", | ||
3663 | .u.insns_int = { | ||
3664 | BPF_LD_IMM64(R0, 0x0123456789abcdefLL), | ||
3665 | BPF_ENDIAN(BPF_FROM_BE, R0, 16), | ||
3666 | BPF_EXIT_INSN(), | ||
3667 | }, | ||
3668 | INTERNAL, | ||
3669 | { }, | ||
3670 | { { 0, cpu_to_be16(0xcdef) } }, | ||
3671 | }, | ||
3672 | { | ||
3673 | "ALU_END_FROM_BE 32: 0x0123456789abcdef -> 0x89abcdef", | ||
3674 | .u.insns_int = { | ||
3675 | BPF_LD_IMM64(R0, 0x0123456789abcdefLL), | ||
3676 | BPF_ENDIAN(BPF_FROM_BE, R0, 32), | ||
3677 | BPF_EXIT_INSN(), | ||
3678 | }, | ||
3679 | INTERNAL, | ||
3680 | { }, | ||
3681 | { { 0, cpu_to_be32(0x89abcdef) } }, | ||
3682 | }, | ||
3683 | { | ||
3684 | "ALU_END_FROM_BE 64: 0x0123456789abcdef -> 0x89abcdef", | ||
3685 | .u.insns_int = { | ||
3686 | BPF_LD_IMM64(R0, 0x0123456789abcdefLL), | ||
3687 | BPF_ENDIAN(BPF_FROM_BE, R0, 64), | ||
3688 | BPF_EXIT_INSN(), | ||
3689 | }, | ||
3690 | INTERNAL, | ||
3691 | { }, | ||
3692 | { { 0, (u32) cpu_to_be64(0x0123456789abcdefLL) } }, | ||
3693 | }, | ||
3694 | /* BPF_ALU | BPF_END | BPF_FROM_LE */ | ||
3695 | { | ||
3696 | "ALU_END_FROM_LE 16: 0x0123456789abcdef -> 0xefcd", | ||
3697 | .u.insns_int = { | ||
3698 | BPF_LD_IMM64(R0, 0x0123456789abcdefLL), | ||
3699 | BPF_ENDIAN(BPF_FROM_LE, R0, 16), | ||
3700 | BPF_EXIT_INSN(), | ||
3701 | }, | ||
3702 | INTERNAL, | ||
3703 | { }, | ||
3704 | { { 0, cpu_to_le16(0xcdef) } }, | ||
3705 | }, | ||
3706 | { | ||
3707 | "ALU_END_FROM_LE 32: 0x0123456789abcdef -> 0xefcdab89", | ||
3708 | .u.insns_int = { | ||
3709 | BPF_LD_IMM64(R0, 0x0123456789abcdefLL), | ||
3710 | BPF_ENDIAN(BPF_FROM_LE, R0, 32), | ||
3711 | BPF_EXIT_INSN(), | ||
3712 | }, | ||
3713 | INTERNAL, | ||
3714 | { }, | ||
3715 | { { 0, cpu_to_le32(0x89abcdef) } }, | ||
3716 | }, | ||
3717 | { | ||
3718 | "ALU_END_FROM_LE 64: 0x0123456789abcdef -> 0x67452301", | ||
3719 | .u.insns_int = { | ||
3720 | BPF_LD_IMM64(R0, 0x0123456789abcdefLL), | ||
3721 | BPF_ENDIAN(BPF_FROM_LE, R0, 64), | ||
3722 | BPF_EXIT_INSN(), | ||
3723 | }, | ||
3724 | INTERNAL, | ||
3725 | { }, | ||
3726 | { { 0, (u32) cpu_to_le64(0x0123456789abcdefLL) } }, | ||
3727 | }, | ||
3728 | /* BPF_ST(X) | BPF_MEM | BPF_B/H/W/DW */ | ||
3729 | { | ||
3730 | "ST_MEM_B: Store/Load byte: max negative", | ||
3731 | .u.insns_int = { | ||
3732 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
3733 | BPF_ST_MEM(BPF_B, R10, -40, 0xff), | ||
3734 | BPF_LDX_MEM(BPF_B, R0, R10, -40), | ||
3735 | BPF_EXIT_INSN(), | ||
3736 | }, | ||
3737 | INTERNAL, | ||
3738 | { }, | ||
3739 | { { 0, 0xff } }, | ||
3740 | }, | ||
3741 | { | ||
3742 | "ST_MEM_B: Store/Load byte: max positive", | ||
3743 | .u.insns_int = { | ||
3744 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
3745 | BPF_ST_MEM(BPF_H, R10, -40, 0x7f), | ||
3746 | BPF_LDX_MEM(BPF_H, R0, R10, -40), | ||
3747 | BPF_EXIT_INSN(), | ||
3748 | }, | ||
3749 | INTERNAL, | ||
3750 | { }, | ||
3751 | { { 0, 0x7f } }, | ||
3752 | }, | ||
3753 | { | ||
3754 | "STX_MEM_B: Store/Load byte: max negative", | ||
3755 | .u.insns_int = { | ||
3756 | BPF_LD_IMM64(R0, 0), | ||
3757 | BPF_LD_IMM64(R1, 0xffLL), | ||
3758 | BPF_STX_MEM(BPF_B, R10, R1, -40), | ||
3759 | BPF_LDX_MEM(BPF_B, R0, R10, -40), | ||
3760 | BPF_EXIT_INSN(), | ||
3761 | }, | ||
3762 | INTERNAL, | ||
3763 | { }, | ||
3764 | { { 0, 0xff } }, | ||
3765 | }, | ||
3766 | { | ||
3767 | "ST_MEM_H: Store/Load half word: max negative", | ||
3768 | .u.insns_int = { | ||
3769 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
3770 | BPF_ST_MEM(BPF_H, R10, -40, 0xffff), | ||
3771 | BPF_LDX_MEM(BPF_H, R0, R10, -40), | ||
3772 | BPF_EXIT_INSN(), | ||
3773 | }, | ||
3774 | INTERNAL, | ||
3775 | { }, | ||
3776 | { { 0, 0xffff } }, | ||
3777 | }, | ||
3778 | { | ||
3779 | "ST_MEM_H: Store/Load half word: max positive", | ||
3780 | .u.insns_int = { | ||
3781 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
3782 | BPF_ST_MEM(BPF_H, R10, -40, 0x7fff), | ||
3783 | BPF_LDX_MEM(BPF_H, R0, R10, -40), | ||
3784 | BPF_EXIT_INSN(), | ||
3785 | }, | ||
3786 | INTERNAL, | ||
3787 | { }, | ||
3788 | { { 0, 0x7fff } }, | ||
3789 | }, | ||
3790 | { | ||
3791 | "STX_MEM_H: Store/Load half word: max negative", | ||
3792 | .u.insns_int = { | ||
3793 | BPF_LD_IMM64(R0, 0), | ||
3794 | BPF_LD_IMM64(R1, 0xffffLL), | ||
3795 | BPF_STX_MEM(BPF_H, R10, R1, -40), | ||
3796 | BPF_LDX_MEM(BPF_H, R0, R10, -40), | ||
3797 | BPF_EXIT_INSN(), | ||
3798 | }, | ||
3799 | INTERNAL, | ||
3800 | { }, | ||
3801 | { { 0, 0xffff } }, | ||
3802 | }, | ||
3803 | { | ||
3804 | "ST_MEM_W: Store/Load word: max negative", | ||
3805 | .u.insns_int = { | ||
3806 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
3807 | BPF_ST_MEM(BPF_W, R10, -40, 0xffffffff), | ||
3808 | BPF_LDX_MEM(BPF_W, R0, R10, -40), | ||
3809 | BPF_EXIT_INSN(), | ||
3810 | }, | ||
3811 | INTERNAL, | ||
3812 | { }, | ||
3813 | { { 0, 0xffffffff } }, | ||
3814 | }, | ||
3815 | { | ||
3816 | "ST_MEM_W: Store/Load word: max positive", | ||
3817 | .u.insns_int = { | ||
3818 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
3819 | BPF_ST_MEM(BPF_W, R10, -40, 0x7fffffff), | ||
3820 | BPF_LDX_MEM(BPF_W, R0, R10, -40), | ||
3821 | BPF_EXIT_INSN(), | ||
3822 | }, | ||
3823 | INTERNAL, | ||
3824 | { }, | ||
3825 | { { 0, 0x7fffffff } }, | ||
3826 | }, | ||
3827 | { | ||
3828 | "STX_MEM_W: Store/Load word: max negative", | ||
3829 | .u.insns_int = { | ||
3830 | BPF_LD_IMM64(R0, 0), | ||
3831 | BPF_LD_IMM64(R1, 0xffffffffLL), | ||
3832 | BPF_STX_MEM(BPF_W, R10, R1, -40), | ||
3833 | BPF_LDX_MEM(BPF_W, R0, R10, -40), | ||
3834 | BPF_EXIT_INSN(), | ||
3835 | }, | ||
3836 | INTERNAL, | ||
3837 | { }, | ||
3838 | { { 0, 0xffffffff } }, | ||
3839 | }, | ||
3840 | { | ||
3841 | "ST_MEM_DW: Store/Load double word: max negative", | ||
3842 | .u.insns_int = { | ||
3843 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
3844 | BPF_ST_MEM(BPF_DW, R10, -40, 0xffffffff), | ||
3845 | BPF_LDX_MEM(BPF_DW, R0, R10, -40), | ||
3846 | BPF_EXIT_INSN(), | ||
3847 | }, | ||
3848 | INTERNAL, | ||
3849 | { }, | ||
3850 | { { 0, 0xffffffff } }, | ||
3851 | }, | ||
3852 | { | ||
3853 | "ST_MEM_DW: Store/Load double word: max negative 2", | ||
3854 | .u.insns_int = { | ||
3855 | BPF_LD_IMM64(R2, 0xffff00000000ffffLL), | ||
3856 | BPF_LD_IMM64(R3, 0xffffffffffffffffLL), | ||
3857 | BPF_ST_MEM(BPF_DW, R10, -40, 0xffffffff), | ||
3858 | BPF_LDX_MEM(BPF_DW, R2, R10, -40), | ||
3859 | BPF_JMP_REG(BPF_JEQ, R2, R3, 2), | ||
3860 | BPF_MOV32_IMM(R0, 2), | ||
3861 | BPF_EXIT_INSN(), | ||
3862 | BPF_MOV32_IMM(R0, 1), | ||
3863 | BPF_EXIT_INSN(), | ||
3864 | }, | ||
3865 | INTERNAL, | ||
3866 | { }, | ||
3867 | { { 0, 0x1 } }, | ||
3868 | }, | ||
3869 | { | ||
3870 | "ST_MEM_DW: Store/Load double word: max positive", | ||
3871 | .u.insns_int = { | ||
3872 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
3873 | BPF_ST_MEM(BPF_DW, R10, -40, 0x7fffffff), | ||
3874 | BPF_LDX_MEM(BPF_DW, R0, R10, -40), | ||
3875 | BPF_EXIT_INSN(), | ||
3876 | }, | ||
3877 | INTERNAL, | ||
3878 | { }, | ||
3879 | { { 0, 0x7fffffff } }, | ||
3880 | }, | ||
3881 | { | ||
3882 | "STX_MEM_DW: Store/Load double word: max negative", | ||
3883 | .u.insns_int = { | ||
3884 | BPF_LD_IMM64(R0, 0), | ||
3885 | BPF_LD_IMM64(R1, 0xffffffffffffffffLL), | ||
3886 | BPF_STX_MEM(BPF_W, R10, R1, -40), | ||
3887 | BPF_LDX_MEM(BPF_W, R0, R10, -40), | ||
3888 | BPF_EXIT_INSN(), | ||
3889 | }, | ||
3890 | INTERNAL, | ||
3891 | { }, | ||
3892 | { { 0, 0xffffffff } }, | ||
3893 | }, | ||
3894 | /* BPF_STX | BPF_XADD | BPF_W/DW */ | ||
3895 | { | ||
3896 | "STX_XADD_W: Test: 0x12 + 0x10 = 0x22", | ||
3897 | .u.insns_int = { | ||
3898 | BPF_ALU32_IMM(BPF_MOV, R0, 0x12), | ||
3899 | BPF_ST_MEM(BPF_W, R10, -40, 0x10), | ||
3900 | BPF_STX_XADD(BPF_W, R10, R0, -40), | ||
3901 | BPF_LDX_MEM(BPF_W, R0, R10, -40), | ||
3902 | BPF_EXIT_INSN(), | ||
3903 | }, | ||
3904 | INTERNAL, | ||
3905 | { }, | ||
3906 | { { 0, 0x22 } }, | ||
3907 | }, | ||
3908 | { | ||
3909 | "STX_XADD_DW: Test: 0x12 + 0x10 = 0x22", | ||
3910 | .u.insns_int = { | ||
3911 | BPF_ALU32_IMM(BPF_MOV, R0, 0x12), | ||
3912 | BPF_ST_MEM(BPF_DW, R10, -40, 0x10), | ||
3913 | BPF_STX_XADD(BPF_DW, R10, R0, -40), | ||
3914 | BPF_LDX_MEM(BPF_DW, R0, R10, -40), | ||
3915 | BPF_EXIT_INSN(), | ||
3916 | }, | ||
3917 | INTERNAL, | ||
3918 | { }, | ||
3919 | { { 0, 0x22 } }, | ||
3920 | }, | ||
3921 | /* BPF_JMP | BPF_EXIT */ | ||
3922 | { | ||
3923 | "JMP_EXIT", | ||
3924 | .u.insns_int = { | ||
3925 | BPF_ALU32_IMM(BPF_MOV, R0, 0x4711), | ||
3926 | BPF_EXIT_INSN(), | ||
3927 | BPF_ALU32_IMM(BPF_MOV, R0, 0x4712), | ||
3928 | }, | ||
3929 | INTERNAL, | ||
3930 | { }, | ||
3931 | { { 0, 0x4711 } }, | ||
3932 | }, | ||
3933 | /* BPF_JMP | BPF_JA */ | ||
3934 | { | ||
3935 | "JMP_JA: Unconditional jump: if (true) return 1", | ||
3936 | .u.insns_int = { | ||
3937 | BPF_ALU32_IMM(BPF_MOV, R0, 0), | ||
3938 | BPF_JMP_IMM(BPF_JA, 0, 0, 1), | ||
3939 | BPF_EXIT_INSN(), | ||
3940 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
3941 | BPF_EXIT_INSN(), | ||
3942 | }, | ||
3943 | INTERNAL, | ||
3944 | { }, | ||
3945 | { { 0, 1 } }, | ||
3946 | }, | ||
3947 | /* BPF_JMP | BPF_JSGT | BPF_K */ | ||
3948 | { | ||
3949 | "JMP_JSGT_K: Signed jump: if (-1 > -2) return 1", | ||
3950 | .u.insns_int = { | ||
3951 | BPF_ALU32_IMM(BPF_MOV, R0, 0), | ||
3952 | BPF_LD_IMM64(R1, 0xffffffffffffffffLL), | ||
3953 | BPF_JMP_IMM(BPF_JSGT, R1, -2, 1), | ||
3954 | BPF_EXIT_INSN(), | ||
3955 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
3956 | BPF_EXIT_INSN(), | ||
3957 | }, | ||
3958 | INTERNAL, | ||
3959 | { }, | ||
3960 | { { 0, 1 } }, | ||
3961 | }, | ||
3962 | { | ||
3963 | "JMP_JSGT_K: Signed jump: if (-1 > -1) return 0", | ||
3964 | .u.insns_int = { | ||
3965 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
3966 | BPF_LD_IMM64(R1, 0xffffffffffffffffLL), | ||
3967 | BPF_JMP_IMM(BPF_JSGT, R1, -1, 1), | ||
3968 | BPF_EXIT_INSN(), | ||
3969 | BPF_ALU32_IMM(BPF_MOV, R0, 0), | ||
3970 | BPF_EXIT_INSN(), | ||
3971 | }, | ||
3972 | INTERNAL, | ||
3973 | { }, | ||
3974 | { { 0, 1 } }, | ||
3975 | }, | ||
3976 | /* BPF_JMP | BPF_JSGE | BPF_K */ | ||
3977 | { | ||
3978 | "JMP_JSGE_K: Signed jump: if (-1 >= -2) return 1", | ||
3979 | .u.insns_int = { | ||
3980 | BPF_ALU32_IMM(BPF_MOV, R0, 0), | ||
3981 | BPF_LD_IMM64(R1, 0xffffffffffffffffLL), | ||
3982 | BPF_JMP_IMM(BPF_JSGE, R1, -2, 1), | ||
3983 | BPF_EXIT_INSN(), | ||
3984 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
3985 | BPF_EXIT_INSN(), | ||
3986 | }, | ||
3987 | INTERNAL, | ||
3988 | { }, | ||
3989 | { { 0, 1 } }, | ||
3990 | }, | ||
3991 | { | ||
3992 | "JMP_JSGE_K: Signed jump: if (-1 >= -1) return 1", | ||
3993 | .u.insns_int = { | ||
3994 | BPF_ALU32_IMM(BPF_MOV, R0, 0), | ||
3995 | BPF_LD_IMM64(R1, 0xffffffffffffffffLL), | ||
3996 | BPF_JMP_IMM(BPF_JSGE, R1, -1, 1), | ||
3997 | BPF_EXIT_INSN(), | ||
3998 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
3999 | BPF_EXIT_INSN(), | ||
4000 | }, | ||
4001 | INTERNAL, | ||
4002 | { }, | ||
4003 | { { 0, 1 } }, | ||
4004 | }, | ||
4005 | /* BPF_JMP | BPF_JGT | BPF_K */ | ||
4006 | { | ||
4007 | "JMP_JGT_K: if (3 > 2) return 1", | ||
4008 | .u.insns_int = { | ||
4009 | BPF_ALU32_IMM(BPF_MOV, R0, 0), | ||
4010 | BPF_LD_IMM64(R1, 3), | ||
4011 | BPF_JMP_IMM(BPF_JGT, R1, 2, 1), | ||
4012 | BPF_EXIT_INSN(), | ||
4013 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
4014 | BPF_EXIT_INSN(), | ||
4015 | }, | ||
4016 | INTERNAL, | ||
4017 | { }, | ||
4018 | { { 0, 1 } }, | ||
4019 | }, | ||
4020 | /* BPF_JMP | BPF_JGE | BPF_K */ | ||
4021 | { | ||
4022 | "JMP_JGE_K: if (3 >= 2) return 1", | ||
4023 | .u.insns_int = { | ||
4024 | BPF_ALU32_IMM(BPF_MOV, R0, 0), | ||
4025 | BPF_LD_IMM64(R1, 3), | ||
4026 | BPF_JMP_IMM(BPF_JGE, R1, 2, 1), | ||
4027 | BPF_EXIT_INSN(), | ||
4028 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
4029 | BPF_EXIT_INSN(), | ||
4030 | }, | ||
4031 | INTERNAL, | ||
4032 | { }, | ||
4033 | { { 0, 1 } }, | ||
4034 | }, | ||
4035 | /* BPF_JMP | BPF_JGT | BPF_K jump backwards */ | ||
4036 | { | ||
4037 | "JMP_JGT_K: if (3 > 2) return 1 (jump backwards)", | ||
4038 | .u.insns_int = { | ||
4039 | BPF_JMP_IMM(BPF_JA, 0, 0, 2), /* goto start */ | ||
4040 | BPF_ALU32_IMM(BPF_MOV, R0, 1), /* out: */ | ||
4041 | BPF_EXIT_INSN(), | ||
4042 | BPF_ALU32_IMM(BPF_MOV, R0, 0), /* start: */ | ||
4043 | BPF_LD_IMM64(R1, 3), /* note: this takes 2 insns */ | ||
4044 | BPF_JMP_IMM(BPF_JGT, R1, 2, -6), /* goto out */ | ||
4045 | BPF_EXIT_INSN(), | ||
4046 | }, | ||
4047 | INTERNAL, | ||
4048 | { }, | ||
4049 | { { 0, 1 } }, | ||
4050 | }, | ||
4051 | { | ||
4052 | "JMP_JGE_K: if (3 >= 3) return 1", | ||
4053 | .u.insns_int = { | ||
4054 | BPF_ALU32_IMM(BPF_MOV, R0, 0), | ||
4055 | BPF_LD_IMM64(R1, 3), | ||
4056 | BPF_JMP_IMM(BPF_JGE, R1, 3, 1), | ||
4057 | BPF_EXIT_INSN(), | ||
4058 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
4059 | BPF_EXIT_INSN(), | ||
4060 | }, | ||
4061 | INTERNAL, | ||
4062 | { }, | ||
4063 | { { 0, 1 } }, | ||
4064 | }, | ||
4065 | /* BPF_JMP | BPF_JNE | BPF_K */ | ||
4066 | { | ||
4067 | "JMP_JNE_K: if (3 != 2) return 1", | ||
4068 | .u.insns_int = { | ||
4069 | BPF_ALU32_IMM(BPF_MOV, R0, 0), | ||
4070 | BPF_LD_IMM64(R1, 3), | ||
4071 | BPF_JMP_IMM(BPF_JNE, R1, 2, 1), | ||
4072 | BPF_EXIT_INSN(), | ||
4073 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
4074 | BPF_EXIT_INSN(), | ||
4075 | }, | ||
4076 | INTERNAL, | ||
4077 | { }, | ||
4078 | { { 0, 1 } }, | ||
4079 | }, | ||
4080 | /* BPF_JMP | BPF_JEQ | BPF_K */ | ||
4081 | { | ||
4082 | "JMP_JEQ_K: if (3 == 3) return 1", | ||
4083 | .u.insns_int = { | ||
4084 | BPF_ALU32_IMM(BPF_MOV, R0, 0), | ||
4085 | BPF_LD_IMM64(R1, 3), | ||
4086 | BPF_JMP_IMM(BPF_JEQ, R1, 3, 1), | ||
4087 | BPF_EXIT_INSN(), | ||
4088 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
4089 | BPF_EXIT_INSN(), | ||
4090 | }, | ||
4091 | INTERNAL, | ||
4092 | { }, | ||
4093 | { { 0, 1 } }, | ||
4094 | }, | ||
4095 | /* BPF_JMP | BPF_JSET | BPF_K */ | ||
4096 | { | ||
4097 | "JMP_JSET_K: if (0x3 & 0x2) return 1", | ||
4098 | .u.insns_int = { | ||
4099 | BPF_ALU32_IMM(BPF_MOV, R0, 0), | ||
4100 | BPF_LD_IMM64(R1, 3), | ||
4101 | BPF_JMP_IMM(BPF_JNE, R1, 2, 1), | ||
4102 | BPF_EXIT_INSN(), | ||
4103 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
4104 | BPF_EXIT_INSN(), | ||
4105 | }, | ||
4106 | INTERNAL, | ||
4107 | { }, | ||
4108 | { { 0, 1 } }, | ||
4109 | }, | ||
4110 | { | ||
4111 | "JMP_JSET_K: if (0x3 & 0xffffffff) return 1", | ||
4112 | .u.insns_int = { | ||
4113 | BPF_ALU32_IMM(BPF_MOV, R0, 0), | ||
4114 | BPF_LD_IMM64(R1, 3), | ||
4115 | BPF_JMP_IMM(BPF_JNE, R1, 0xffffffff, 1), | ||
4116 | BPF_EXIT_INSN(), | ||
4117 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
4118 | BPF_EXIT_INSN(), | ||
4119 | }, | ||
4120 | INTERNAL, | ||
4121 | { }, | ||
4122 | { { 0, 1 } }, | ||
4123 | }, | ||
4124 | /* BPF_JMP | BPF_JSGT | BPF_X */ | ||
4125 | { | ||
4126 | "JMP_JSGT_X: Signed jump: if (-1 > -2) return 1", | ||
4127 | .u.insns_int = { | ||
4128 | BPF_ALU32_IMM(BPF_MOV, R0, 0), | ||
4129 | BPF_LD_IMM64(R1, -1), | ||
4130 | BPF_LD_IMM64(R2, -2), | ||
4131 | BPF_JMP_REG(BPF_JSGT, R1, R2, 1), | ||
4132 | BPF_EXIT_INSN(), | ||
4133 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
4134 | BPF_EXIT_INSN(), | ||
4135 | }, | ||
4136 | INTERNAL, | ||
4137 | { }, | ||
4138 | { { 0, 1 } }, | ||
4139 | }, | ||
4140 | { | ||
4141 | "JMP_JSGT_X: Signed jump: if (-1 > -1) return 0", | ||
4142 | .u.insns_int = { | ||
4143 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
4144 | BPF_LD_IMM64(R1, -1), | ||
4145 | BPF_LD_IMM64(R2, -1), | ||
4146 | BPF_JMP_REG(BPF_JSGT, R1, R2, 1), | ||
4147 | BPF_EXIT_INSN(), | ||
4148 | BPF_ALU32_IMM(BPF_MOV, R0, 0), | ||
4149 | BPF_EXIT_INSN(), | ||
4150 | }, | ||
4151 | INTERNAL, | ||
4152 | { }, | ||
4153 | { { 0, 1 } }, | ||
4154 | }, | ||
4155 | /* BPF_JMP | BPF_JSGE | BPF_X */ | ||
4156 | { | ||
4157 | "JMP_JSGE_X: Signed jump: if (-1 >= -2) return 1", | ||
4158 | .u.insns_int = { | ||
4159 | BPF_ALU32_IMM(BPF_MOV, R0, 0), | ||
4160 | BPF_LD_IMM64(R1, -1), | ||
4161 | BPF_LD_IMM64(R2, -2), | ||
4162 | BPF_JMP_REG(BPF_JSGE, R1, R2, 1), | ||
4163 | BPF_EXIT_INSN(), | ||
4164 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
4165 | BPF_EXIT_INSN(), | ||
4166 | }, | ||
4167 | INTERNAL, | ||
4168 | { }, | ||
4169 | { { 0, 1 } }, | ||
4170 | }, | ||
4171 | { | ||
4172 | "JMP_JSGE_X: Signed jump: if (-1 >= -1) return 1", | ||
4173 | .u.insns_int = { | ||
4174 | BPF_ALU32_IMM(BPF_MOV, R0, 0), | ||
4175 | BPF_LD_IMM64(R1, -1), | ||
4176 | BPF_LD_IMM64(R2, -1), | ||
4177 | BPF_JMP_REG(BPF_JSGE, R1, R2, 1), | ||
4178 | BPF_EXIT_INSN(), | ||
4179 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
4180 | BPF_EXIT_INSN(), | ||
4181 | }, | ||
4182 | INTERNAL, | ||
4183 | { }, | ||
4184 | { { 0, 1 } }, | ||
4185 | }, | ||
4186 | /* BPF_JMP | BPF_JGT | BPF_X */ | ||
4187 | { | ||
4188 | "JMP_JGT_X: if (3 > 2) return 1", | ||
4189 | .u.insns_int = { | ||
4190 | BPF_ALU32_IMM(BPF_MOV, R0, 0), | ||
4191 | BPF_LD_IMM64(R1, 3), | ||
4192 | BPF_LD_IMM64(R2, 2), | ||
4193 | BPF_JMP_REG(BPF_JGT, R1, R2, 1), | ||
4194 | BPF_EXIT_INSN(), | ||
4195 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
4196 | BPF_EXIT_INSN(), | ||
4197 | }, | ||
4198 | INTERNAL, | ||
4199 | { }, | ||
4200 | { { 0, 1 } }, | ||
4201 | }, | ||
4202 | /* BPF_JMP | BPF_JGE | BPF_X */ | ||
4203 | { | ||
4204 | "JMP_JGE_X: if (3 >= 2) return 1", | ||
4205 | .u.insns_int = { | ||
4206 | BPF_ALU32_IMM(BPF_MOV, R0, 0), | ||
4207 | BPF_LD_IMM64(R1, 3), | ||
4208 | BPF_LD_IMM64(R2, 2), | ||
4209 | BPF_JMP_REG(BPF_JGE, R1, R2, 1), | ||
4210 | BPF_EXIT_INSN(), | ||
4211 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
4212 | BPF_EXIT_INSN(), | ||
4213 | }, | ||
4214 | INTERNAL, | ||
4215 | { }, | ||
4216 | { { 0, 1 } }, | ||
4217 | }, | ||
4218 | { | ||
4219 | "JMP_JGE_X: if (3 >= 3) return 1", | ||
4220 | .u.insns_int = { | ||
4221 | BPF_ALU32_IMM(BPF_MOV, R0, 0), | ||
4222 | BPF_LD_IMM64(R1, 3), | ||
4223 | BPF_LD_IMM64(R2, 3), | ||
4224 | BPF_JMP_REG(BPF_JGE, R1, R2, 1), | ||
4225 | BPF_EXIT_INSN(), | ||
4226 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
4227 | BPF_EXIT_INSN(), | ||
4228 | }, | ||
4229 | INTERNAL, | ||
4230 | { }, | ||
4231 | { { 0, 1 } }, | ||
4232 | }, | ||
4233 | /* BPF_JMP | BPF_JNE | BPF_X */ | ||
4234 | { | ||
4235 | "JMP_JNE_X: if (3 != 2) return 1", | ||
4236 | .u.insns_int = { | ||
4237 | BPF_ALU32_IMM(BPF_MOV, R0, 0), | ||
4238 | BPF_LD_IMM64(R1, 3), | ||
4239 | BPF_LD_IMM64(R2, 2), | ||
4240 | BPF_JMP_REG(BPF_JNE, R1, R2, 1), | ||
4241 | BPF_EXIT_INSN(), | ||
4242 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
4243 | BPF_EXIT_INSN(), | ||
4244 | }, | ||
4245 | INTERNAL, | ||
4246 | { }, | ||
4247 | { { 0, 1 } }, | ||
4248 | }, | ||
4249 | /* BPF_JMP | BPF_JEQ | BPF_X */ | ||
4250 | { | ||
4251 | "JMP_JEQ_X: if (3 == 3) return 1", | ||
4252 | .u.insns_int = { | ||
4253 | BPF_ALU32_IMM(BPF_MOV, R0, 0), | ||
4254 | BPF_LD_IMM64(R1, 3), | ||
4255 | BPF_LD_IMM64(R2, 3), | ||
4256 | BPF_JMP_REG(BPF_JEQ, R1, R2, 1), | ||
4257 | BPF_EXIT_INSN(), | ||
4258 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
4259 | BPF_EXIT_INSN(), | ||
4260 | }, | ||
4261 | INTERNAL, | ||
4262 | { }, | ||
4263 | { { 0, 1 } }, | ||
4264 | }, | ||
4265 | /* BPF_JMP | BPF_JSET | BPF_X */ | ||
4266 | { | ||
4267 | "JMP_JSET_X: if (0x3 & 0x2) return 1", | ||
4268 | .u.insns_int = { | ||
4269 | BPF_ALU32_IMM(BPF_MOV, R0, 0), | ||
4270 | BPF_LD_IMM64(R1, 3), | ||
4271 | BPF_LD_IMM64(R2, 2), | ||
4272 | BPF_JMP_REG(BPF_JNE, R1, R2, 1), | ||
4273 | BPF_EXIT_INSN(), | ||
4274 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
4275 | BPF_EXIT_INSN(), | ||
4276 | }, | ||
4277 | INTERNAL, | ||
4278 | { }, | ||
4279 | { { 0, 1 } }, | ||
4280 | }, | ||
4281 | { | ||
4282 | "JMP_JSET_X: if (0x3 & 0xffffffff) return 1", | ||
4283 | .u.insns_int = { | ||
4284 | BPF_ALU32_IMM(BPF_MOV, R0, 0), | ||
4285 | BPF_LD_IMM64(R1, 3), | ||
4286 | BPF_LD_IMM64(R2, 0xffffffff), | ||
4287 | BPF_JMP_REG(BPF_JNE, R1, R2, 1), | ||
4288 | BPF_EXIT_INSN(), | ||
4289 | BPF_ALU32_IMM(BPF_MOV, R0, 1), | ||
4290 | BPF_EXIT_INSN(), | ||
4291 | }, | ||
4292 | INTERNAL, | ||
4293 | { }, | ||
4294 | { { 0, 1 } }, | ||
4295 | }, | ||
4296 | { | ||
4297 | "JMP_JA: Jump, gap, jump, ...", | ||
4298 | { }, | ||
4299 | CLASSIC | FLAG_NO_DATA, | ||
4300 | { }, | ||
4301 | { { 0, 0xababcbac } }, | ||
4302 | .fill_helper = bpf_fill_ja, | ||
4303 | }, | ||
4304 | { /* Mainly checking JIT here. */ | ||
4305 | "BPF_MAXINSNS: Maximum possible literals", | ||
4306 | { }, | ||
4307 | CLASSIC | FLAG_NO_DATA, | ||
4308 | { }, | ||
4309 | { { 0, 0xffffffff } }, | ||
4310 | .fill_helper = bpf_fill_maxinsns1, | ||
4311 | }, | ||
4312 | { /* Mainly checking JIT here. */ | ||
4313 | "BPF_MAXINSNS: Single literal", | ||
4314 | { }, | ||
4315 | CLASSIC | FLAG_NO_DATA, | ||
4316 | { }, | ||
4317 | { { 0, 0xfefefefe } }, | ||
4318 | .fill_helper = bpf_fill_maxinsns2, | ||
4319 | }, | ||
4320 | { /* Mainly checking JIT here. */ | ||
4321 | "BPF_MAXINSNS: Run/add until end", | ||
4322 | { }, | ||
4323 | CLASSIC | FLAG_NO_DATA, | ||
4324 | { }, | ||
4325 | { { 0, 0x947bf368 } }, | ||
4326 | .fill_helper = bpf_fill_maxinsns3, | ||
4327 | }, | ||
4328 | { | ||
4329 | "BPF_MAXINSNS: Too many instructions", | ||
4330 | { }, | ||
4331 | CLASSIC | FLAG_NO_DATA | FLAG_EXPECTED_FAIL, | ||
4332 | { }, | ||
4333 | { }, | ||
4334 | .fill_helper = bpf_fill_maxinsns4, | ||
4335 | }, | ||
4336 | { /* Mainly checking JIT here. */ | ||
4337 | "BPF_MAXINSNS: Very long jump", | ||
4338 | { }, | ||
4339 | CLASSIC | FLAG_NO_DATA, | ||
4340 | { }, | ||
4341 | { { 0, 0xabababab } }, | ||
4342 | .fill_helper = bpf_fill_maxinsns5, | ||
4343 | }, | ||
4344 | { /* Mainly checking JIT here. */ | ||
4345 | "BPF_MAXINSNS: Ctx heavy transformations", | ||
4346 | { }, | ||
4347 | CLASSIC, | ||
4348 | { }, | ||
4349 | { | ||
4350 | { 1, !!(SKB_VLAN_TCI & VLAN_TAG_PRESENT) }, | ||
4351 | { 10, !!(SKB_VLAN_TCI & VLAN_TAG_PRESENT) } | ||
4352 | }, | ||
4353 | .fill_helper = bpf_fill_maxinsns6, | ||
4354 | }, | ||
4355 | { /* Mainly checking JIT here. */ | ||
4356 | "BPF_MAXINSNS: Call heavy transformations", | ||
4357 | { }, | ||
4358 | CLASSIC | FLAG_NO_DATA, | ||
4359 | { }, | ||
4360 | { { 1, 0 }, { 10, 0 } }, | ||
4361 | .fill_helper = bpf_fill_maxinsns7, | ||
4362 | }, | ||
4363 | { /* Mainly checking JIT here. */ | ||
4364 | "BPF_MAXINSNS: Jump heavy test", | ||
4365 | { }, | ||
4366 | CLASSIC | FLAG_NO_DATA, | ||
4367 | { }, | ||
4368 | { { 0, 0xffffffff } }, | ||
4369 | .fill_helper = bpf_fill_maxinsns8, | ||
4370 | }, | ||
4371 | { /* Mainly checking JIT here. */ | ||
4372 | "BPF_MAXINSNS: Very long jump backwards", | ||
4373 | { }, | ||
4374 | INTERNAL | FLAG_NO_DATA, | ||
4375 | { }, | ||
4376 | { { 0, 0xcbababab } }, | ||
4377 | .fill_helper = bpf_fill_maxinsns9, | ||
4378 | }, | ||
4379 | { /* Mainly checking JIT here. */ | ||
4380 | "BPF_MAXINSNS: Edge hopping nuthouse", | ||
4381 | { }, | ||
4382 | INTERNAL | FLAG_NO_DATA, | ||
4383 | { }, | ||
4384 | { { 0, 0xabababac } }, | ||
4385 | .fill_helper = bpf_fill_maxinsns10, | ||
4386 | }, | ||
4387 | { | ||
4388 | "BPF_MAXINSNS: Jump, gap, jump, ...", | ||
4389 | { }, | ||
4390 | CLASSIC | FLAG_NO_DATA, | ||
4391 | { }, | ||
4392 | { { 0, 0xababcbac } }, | ||
4393 | .fill_helper = bpf_fill_maxinsns11, | ||
4394 | }, | ||
1808 | }; | 4395 | }; |
1809 | 4396 | ||
1810 | static struct net_device dev; | 4397 | static struct net_device dev; |
@@ -1858,10 +4445,15 @@ static void release_test_data(const struct bpf_test *test, void *data) | |||
1858 | kfree_skb(data); | 4445 | kfree_skb(data); |
1859 | } | 4446 | } |
1860 | 4447 | ||
1861 | static int probe_filter_length(struct sock_filter *fp) | 4448 | static int filter_length(int which) |
1862 | { | 4449 | { |
1863 | int len = 0; | 4450 | struct sock_filter *fp; |
4451 | int len; | ||
1864 | 4452 | ||
4453 | if (tests[which].fill_helper) | ||
4454 | return tests[which].u.ptr.len; | ||
4455 | |||
4456 | fp = tests[which].u.insns; | ||
1865 | for (len = MAX_INSNS - 1; len > 0; --len) | 4457 | for (len = MAX_INSNS - 1; len > 0; --len) |
1866 | if (fp[len].code != 0 || fp[len].k != 0) | 4458 | if (fp[len].code != 0 || fp[len].k != 0) |
1867 | break; | 4459 | break; |
@@ -1869,16 +4461,25 @@ static int probe_filter_length(struct sock_filter *fp) | |||
1869 | return len + 1; | 4461 | return len + 1; |
1870 | } | 4462 | } |
1871 | 4463 | ||
4464 | static void *filter_pointer(int which) | ||
4465 | { | ||
4466 | if (tests[which].fill_helper) | ||
4467 | return tests[which].u.ptr.insns; | ||
4468 | else | ||
4469 | return tests[which].u.insns; | ||
4470 | } | ||
4471 | |||
1872 | static struct bpf_prog *generate_filter(int which, int *err) | 4472 | static struct bpf_prog *generate_filter(int which, int *err) |
1873 | { | 4473 | { |
1874 | struct bpf_prog *fp; | ||
1875 | struct sock_fprog_kern fprog; | ||
1876 | unsigned int flen = probe_filter_length(tests[which].u.insns); | ||
1877 | __u8 test_type = tests[which].aux & TEST_TYPE_MASK; | 4474 | __u8 test_type = tests[which].aux & TEST_TYPE_MASK; |
4475 | unsigned int flen = filter_length(which); | ||
4476 | void *fptr = filter_pointer(which); | ||
4477 | struct sock_fprog_kern fprog; | ||
4478 | struct bpf_prog *fp; | ||
1878 | 4479 | ||
1879 | switch (test_type) { | 4480 | switch (test_type) { |
1880 | case CLASSIC: | 4481 | case CLASSIC: |
1881 | fprog.filter = tests[which].u.insns; | 4482 | fprog.filter = fptr; |
1882 | fprog.len = flen; | 4483 | fprog.len = flen; |
1883 | 4484 | ||
1884 | *err = bpf_prog_create(&fp, &fprog); | 4485 | *err = bpf_prog_create(&fp, &fprog); |
@@ -1914,8 +4515,7 @@ static struct bpf_prog *generate_filter(int which, int *err) | |||
1914 | } | 4515 | } |
1915 | 4516 | ||
1916 | fp->len = flen; | 4517 | fp->len = flen; |
1917 | memcpy(fp->insnsi, tests[which].u.insns_int, | 4518 | memcpy(fp->insnsi, fptr, fp->len * sizeof(struct bpf_insn)); |
1918 | fp->len * sizeof(struct bpf_insn)); | ||
1919 | 4519 | ||
1920 | bpf_prog_select_runtime(fp); | 4520 | bpf_prog_select_runtime(fp); |
1921 | break; | 4521 | break; |
@@ -1987,9 +4587,33 @@ static int run_one(const struct bpf_prog *fp, struct bpf_test *test) | |||
1987 | return err_cnt; | 4587 | return err_cnt; |
1988 | } | 4588 | } |
1989 | 4589 | ||
4590 | static __init int prepare_bpf_tests(void) | ||
4591 | { | ||
4592 | int i; | ||
4593 | |||
4594 | for (i = 0; i < ARRAY_SIZE(tests); i++) { | ||
4595 | if (tests[i].fill_helper && | ||
4596 | tests[i].fill_helper(&tests[i]) < 0) | ||
4597 | return -ENOMEM; | ||
4598 | } | ||
4599 | |||
4600 | return 0; | ||
4601 | } | ||
4602 | |||
4603 | static __init void destroy_bpf_tests(void) | ||
4604 | { | ||
4605 | int i; | ||
4606 | |||
4607 | for (i = 0; i < ARRAY_SIZE(tests); i++) { | ||
4608 | if (tests[i].fill_helper) | ||
4609 | kfree(tests[i].u.ptr.insns); | ||
4610 | } | ||
4611 | } | ||
4612 | |||
1990 | static __init int test_bpf(void) | 4613 | static __init int test_bpf(void) |
1991 | { | 4614 | { |
1992 | int i, err_cnt = 0, pass_cnt = 0; | 4615 | int i, err_cnt = 0, pass_cnt = 0; |
4616 | int jit_cnt = 0, run_cnt = 0; | ||
1993 | 4617 | ||
1994 | for (i = 0; i < ARRAY_SIZE(tests); i++) { | 4618 | for (i = 0; i < ARRAY_SIZE(tests); i++) { |
1995 | struct bpf_prog *fp; | 4619 | struct bpf_prog *fp; |
@@ -2006,6 +4630,13 @@ static __init int test_bpf(void) | |||
2006 | 4630 | ||
2007 | return err; | 4631 | return err; |
2008 | } | 4632 | } |
4633 | |||
4634 | pr_cont("jited:%u ", fp->jited); | ||
4635 | |||
4636 | run_cnt++; | ||
4637 | if (fp->jited) | ||
4638 | jit_cnt++; | ||
4639 | |||
2009 | err = run_one(fp, &tests[i]); | 4640 | err = run_one(fp, &tests[i]); |
2010 | release_filter(fp, i); | 4641 | release_filter(fp, i); |
2011 | 4642 | ||
@@ -2018,13 +4649,24 @@ static __init int test_bpf(void) | |||
2018 | } | 4649 | } |
2019 | } | 4650 | } |
2020 | 4651 | ||
2021 | pr_info("Summary: %d PASSED, %d FAILED\n", pass_cnt, err_cnt); | 4652 | pr_info("Summary: %d PASSED, %d FAILED, [%d/%d JIT'ed]\n", |
4653 | pass_cnt, err_cnt, jit_cnt, run_cnt); | ||
4654 | |||
2022 | return err_cnt ? -EINVAL : 0; | 4655 | return err_cnt ? -EINVAL : 0; |
2023 | } | 4656 | } |
2024 | 4657 | ||
2025 | static int __init test_bpf_init(void) | 4658 | static int __init test_bpf_init(void) |
2026 | { | 4659 | { |
2027 | return test_bpf(); | 4660 | int ret; |
4661 | |||
4662 | ret = prepare_bpf_tests(); | ||
4663 | if (ret < 0) | ||
4664 | return ret; | ||
4665 | |||
4666 | ret = test_bpf(); | ||
4667 | |||
4668 | destroy_bpf_tests(); | ||
4669 | return ret; | ||
2028 | } | 4670 | } |
2029 | 4671 | ||
2030 | static void __exit test_bpf_exit(void) | 4672 | static void __exit test_bpf_exit(void) |
diff --git a/lib/test_rhashtable.c b/lib/test_rhashtable.c index b2957540d3c7..c90777eae1f8 100644 --- a/lib/test_rhashtable.c +++ b/lib/test_rhashtable.c | |||
@@ -1,14 +1,9 @@ | |||
1 | /* | 1 | /* |
2 | * Resizable, Scalable, Concurrent Hash Table | 2 | * Resizable, Scalable, Concurrent Hash Table |
3 | * | 3 | * |
4 | * Copyright (c) 2014 Thomas Graf <tgraf@suug.ch> | 4 | * Copyright (c) 2014-2015 Thomas Graf <tgraf@suug.ch> |
5 | * Copyright (c) 2008-2014 Patrick McHardy <kaber@trash.net> | 5 | * Copyright (c) 2008-2014 Patrick McHardy <kaber@trash.net> |
6 | * | 6 | * |
7 | * Based on the following paper: | ||
8 | * https://www.usenix.org/legacy/event/atc11/tech/final_files/Triplett.pdf | ||
9 | * | ||
10 | * Code partially derived from nft_hash | ||
11 | * | ||
12 | * This program is free software; you can redistribute it and/or modify | 7 | * This program is free software; you can redistribute it and/or modify |
13 | * it under the terms of the GNU General Public License version 2 as | 8 | * it under the terms of the GNU General Public License version 2 as |
14 | * published by the Free Software Foundation. | 9 | * published by the Free Software Foundation. |
@@ -26,20 +21,37 @@ | |||
26 | #include <linux/rhashtable.h> | 21 | #include <linux/rhashtable.h> |
27 | #include <linux/slab.h> | 22 | #include <linux/slab.h> |
28 | 23 | ||
24 | #define MAX_ENTRIES 1000000 | ||
25 | #define TEST_INSERT_FAIL INT_MAX | ||
26 | |||
27 | static int entries = 50000; | ||
28 | module_param(entries, int, 0); | ||
29 | MODULE_PARM_DESC(entries, "Number of entries to add (default: 50000)"); | ||
30 | |||
31 | static int runs = 4; | ||
32 | module_param(runs, int, 0); | ||
33 | MODULE_PARM_DESC(runs, "Number of test runs per variant (default: 4)"); | ||
34 | |||
35 | static int max_size = 65536; | ||
36 | module_param(max_size, int, 0); | ||
37 | MODULE_PARM_DESC(runs, "Maximum table size (default: 65536)"); | ||
29 | 38 | ||
30 | #define TEST_HT_SIZE 8 | 39 | static bool shrinking = false; |
31 | #define TEST_ENTRIES 2048 | 40 | module_param(shrinking, bool, 0); |
32 | #define TEST_PTR ((void *) 0xdeadbeef) | 41 | MODULE_PARM_DESC(shrinking, "Enable automatic shrinking (default: off)"); |
33 | #define TEST_NEXPANDS 4 | 42 | |
43 | static int size = 8; | ||
44 | module_param(size, int, 0); | ||
45 | MODULE_PARM_DESC(size, "Initial size hint of table (default: 8)"); | ||
34 | 46 | ||
35 | struct test_obj { | 47 | struct test_obj { |
36 | void *ptr; | ||
37 | int value; | 48 | int value; |
38 | struct rhash_head node; | 49 | struct rhash_head node; |
39 | }; | 50 | }; |
40 | 51 | ||
41 | static const struct rhashtable_params test_rht_params = { | 52 | static struct test_obj array[MAX_ENTRIES]; |
42 | .nelem_hint = TEST_HT_SIZE, | 53 | |
54 | static struct rhashtable_params test_rht_params = { | ||
43 | .head_offset = offsetof(struct test_obj, node), | 55 | .head_offset = offsetof(struct test_obj, node), |
44 | .key_offset = offsetof(struct test_obj, value), | 56 | .key_offset = offsetof(struct test_obj, value), |
45 | .key_len = sizeof(int), | 57 | .key_len = sizeof(int), |
@@ -51,11 +63,14 @@ static int __init test_rht_lookup(struct rhashtable *ht) | |||
51 | { | 63 | { |
52 | unsigned int i; | 64 | unsigned int i; |
53 | 65 | ||
54 | for (i = 0; i < TEST_ENTRIES * 2; i++) { | 66 | for (i = 0; i < entries * 2; i++) { |
55 | struct test_obj *obj; | 67 | struct test_obj *obj; |
56 | bool expected = !(i % 2); | 68 | bool expected = !(i % 2); |
57 | u32 key = i; | 69 | u32 key = i; |
58 | 70 | ||
71 | if (array[i / 2].value == TEST_INSERT_FAIL) | ||
72 | expected = false; | ||
73 | |||
59 | obj = rhashtable_lookup_fast(ht, &key, test_rht_params); | 74 | obj = rhashtable_lookup_fast(ht, &key, test_rht_params); |
60 | 75 | ||
61 | if (expected && !obj) { | 76 | if (expected && !obj) { |
@@ -66,9 +81,9 @@ static int __init test_rht_lookup(struct rhashtable *ht) | |||
66 | key); | 81 | key); |
67 | return -EEXIST; | 82 | return -EEXIST; |
68 | } else if (expected && obj) { | 83 | } else if (expected && obj) { |
69 | if (obj->ptr != TEST_PTR || obj->value != i) { | 84 | if (obj->value != i) { |
70 | pr_warn("Test failed: Lookup value mismatch %p!=%p, %u!=%u\n", | 85 | pr_warn("Test failed: Lookup value mismatch %u!=%u\n", |
71 | obj->ptr, TEST_PTR, obj->value, i); | 86 | obj->value, i); |
72 | return -EINVAL; | 87 | return -EINVAL; |
73 | } | 88 | } |
74 | } | 89 | } |
@@ -77,129 +92,147 @@ static int __init test_rht_lookup(struct rhashtable *ht) | |||
77 | return 0; | 92 | return 0; |
78 | } | 93 | } |
79 | 94 | ||
80 | static void test_bucket_stats(struct rhashtable *ht, bool quiet) | 95 | static void test_bucket_stats(struct rhashtable *ht) |
81 | { | 96 | { |
82 | unsigned int cnt, rcu_cnt, i, total = 0; | 97 | unsigned int err, total = 0, chain_len = 0; |
98 | struct rhashtable_iter hti; | ||
83 | struct rhash_head *pos; | 99 | struct rhash_head *pos; |
84 | struct test_obj *obj; | ||
85 | struct bucket_table *tbl; | ||
86 | 100 | ||
87 | tbl = rht_dereference_rcu(ht->tbl, ht); | 101 | err = rhashtable_walk_init(ht, &hti); |
88 | for (i = 0; i < tbl->size; i++) { | 102 | if (err) { |
89 | rcu_cnt = cnt = 0; | 103 | pr_warn("Test failed: allocation error"); |
104 | return; | ||
105 | } | ||
90 | 106 | ||
91 | if (!quiet) | 107 | err = rhashtable_walk_start(&hti); |
92 | pr_info(" [%#4x/%u]", i, tbl->size); | 108 | if (err && err != -EAGAIN) { |
109 | pr_warn("Test failed: iterator failed: %d\n", err); | ||
110 | return; | ||
111 | } | ||
93 | 112 | ||
94 | rht_for_each_entry_rcu(obj, pos, tbl, i, node) { | 113 | while ((pos = rhashtable_walk_next(&hti))) { |
95 | cnt++; | 114 | if (PTR_ERR(pos) == -EAGAIN) { |
96 | total++; | 115 | pr_info("Info: encountered resize\n"); |
97 | if (!quiet) | 116 | chain_len++; |
98 | pr_cont(" [%p],", obj); | 117 | continue; |
118 | } else if (IS_ERR(pos)) { | ||
119 | pr_warn("Test failed: rhashtable_walk_next() error: %ld\n", | ||
120 | PTR_ERR(pos)); | ||
121 | break; | ||
99 | } | 122 | } |
100 | 123 | ||
101 | rht_for_each_entry_rcu(obj, pos, tbl, i, node) | 124 | total++; |
102 | rcu_cnt++; | ||
103 | |||
104 | if (rcu_cnt != cnt) | ||
105 | pr_warn("Test failed: Chain count mismach %d != %d", | ||
106 | cnt, rcu_cnt); | ||
107 | |||
108 | if (!quiet) | ||
109 | pr_cont("\n [%#x] first element: %p, chain length: %u\n", | ||
110 | i, tbl->buckets[i], cnt); | ||
111 | } | 125 | } |
112 | 126 | ||
113 | pr_info(" Traversal complete: counted=%u, nelems=%u, entries=%d\n", | 127 | rhashtable_walk_stop(&hti); |
114 | total, atomic_read(&ht->nelems), TEST_ENTRIES); | 128 | rhashtable_walk_exit(&hti); |
129 | |||
130 | pr_info(" Traversal complete: counted=%u, nelems=%u, entries=%d, table-jumps=%u\n", | ||
131 | total, atomic_read(&ht->nelems), entries, chain_len); | ||
115 | 132 | ||
116 | if (total != atomic_read(&ht->nelems) || total != TEST_ENTRIES) | 133 | if (total != atomic_read(&ht->nelems) || total != entries) |
117 | pr_warn("Test failed: Total count mismatch ^^^"); | 134 | pr_warn("Test failed: Total count mismatch ^^^"); |
118 | } | 135 | } |
119 | 136 | ||
120 | static int __init test_rhashtable(struct rhashtable *ht) | 137 | static s64 __init test_rhashtable(struct rhashtable *ht) |
121 | { | 138 | { |
122 | struct bucket_table *tbl; | ||
123 | struct test_obj *obj; | 139 | struct test_obj *obj; |
124 | struct rhash_head *pos, *next; | ||
125 | int err; | 140 | int err; |
126 | unsigned int i; | 141 | unsigned int i, insert_fails = 0; |
142 | s64 start, end; | ||
127 | 143 | ||
128 | /* | 144 | /* |
129 | * Insertion Test: | 145 | * Insertion Test: |
130 | * Insert TEST_ENTRIES into table with all keys even numbers | 146 | * Insert entries into table with all keys even numbers |
131 | */ | 147 | */ |
132 | pr_info(" Adding %d keys\n", TEST_ENTRIES); | 148 | pr_info(" Adding %d keys\n", entries); |
133 | for (i = 0; i < TEST_ENTRIES; i++) { | 149 | start = ktime_get_ns(); |
134 | struct test_obj *obj; | 150 | for (i = 0; i < entries; i++) { |
135 | 151 | struct test_obj *obj = &array[i]; | |
136 | obj = kzalloc(sizeof(*obj), GFP_KERNEL); | ||
137 | if (!obj) { | ||
138 | err = -ENOMEM; | ||
139 | goto error; | ||
140 | } | ||
141 | 152 | ||
142 | obj->ptr = TEST_PTR; | ||
143 | obj->value = i * 2; | 153 | obj->value = i * 2; |
144 | 154 | ||
145 | err = rhashtable_insert_fast(ht, &obj->node, test_rht_params); | 155 | err = rhashtable_insert_fast(ht, &obj->node, test_rht_params); |
146 | if (err) { | 156 | if (err == -ENOMEM || err == -EBUSY) { |
147 | kfree(obj); | 157 | /* Mark failed inserts but continue */ |
148 | goto error; | 158 | obj->value = TEST_INSERT_FAIL; |
159 | insert_fails++; | ||
160 | } else if (err) { | ||
161 | return err; | ||
149 | } | 162 | } |
150 | } | 163 | } |
151 | 164 | ||
165 | if (insert_fails) | ||
166 | pr_info(" %u insertions failed due to memory pressure\n", | ||
167 | insert_fails); | ||
168 | |||
169 | test_bucket_stats(ht); | ||
152 | rcu_read_lock(); | 170 | rcu_read_lock(); |
153 | test_bucket_stats(ht, true); | ||
154 | test_rht_lookup(ht); | 171 | test_rht_lookup(ht); |
155 | rcu_read_unlock(); | 172 | rcu_read_unlock(); |
156 | 173 | ||
157 | rcu_read_lock(); | 174 | test_bucket_stats(ht); |
158 | test_bucket_stats(ht, true); | ||
159 | rcu_read_unlock(); | ||
160 | 175 | ||
161 | pr_info(" Deleting %d keys\n", TEST_ENTRIES); | 176 | pr_info(" Deleting %d keys\n", entries); |
162 | for (i = 0; i < TEST_ENTRIES; i++) { | 177 | for (i = 0; i < entries; i++) { |
163 | u32 key = i * 2; | 178 | u32 key = i * 2; |
164 | 179 | ||
165 | obj = rhashtable_lookup_fast(ht, &key, test_rht_params); | 180 | if (array[i].value != TEST_INSERT_FAIL) { |
166 | BUG_ON(!obj); | 181 | obj = rhashtable_lookup_fast(ht, &key, test_rht_params); |
182 | BUG_ON(!obj); | ||
167 | 183 | ||
168 | rhashtable_remove_fast(ht, &obj->node, test_rht_params); | 184 | rhashtable_remove_fast(ht, &obj->node, test_rht_params); |
169 | kfree(obj); | 185 | } |
170 | } | 186 | } |
171 | 187 | ||
172 | return 0; | 188 | end = ktime_get_ns(); |
173 | 189 | pr_info(" Duration of test: %lld ns\n", end - start); | |
174 | error: | ||
175 | tbl = rht_dereference_rcu(ht->tbl, ht); | ||
176 | for (i = 0; i < tbl->size; i++) | ||
177 | rht_for_each_entry_safe(obj, pos, next, tbl, i, node) | ||
178 | kfree(obj); | ||
179 | 190 | ||
180 | return err; | 191 | return end - start; |
181 | } | 192 | } |
182 | 193 | ||
183 | static struct rhashtable ht; | 194 | static struct rhashtable ht; |
184 | 195 | ||
185 | static int __init test_rht_init(void) | 196 | static int __init test_rht_init(void) |
186 | { | 197 | { |
187 | int err; | 198 | int i, err; |
199 | u64 total_time = 0; | ||
188 | 200 | ||
189 | pr_info("Running resizable hashtable tests...\n"); | 201 | entries = min(entries, MAX_ENTRIES); |
190 | 202 | ||
191 | err = rhashtable_init(&ht, &test_rht_params); | 203 | test_rht_params.automatic_shrinking = shrinking; |
192 | if (err < 0) { | 204 | test_rht_params.max_size = max_size; |
193 | pr_warn("Test failed: Unable to initialize hashtable: %d\n", | 205 | test_rht_params.nelem_hint = size; |
194 | err); | ||
195 | return err; | ||
196 | } | ||
197 | 206 | ||
198 | err = test_rhashtable(&ht); | 207 | pr_info("Running rhashtable test nelem=%d, max_size=%d, shrinking=%d\n", |
208 | size, max_size, shrinking); | ||
199 | 209 | ||
200 | rhashtable_destroy(&ht); | 210 | for (i = 0; i < runs; i++) { |
211 | s64 time; | ||
201 | 212 | ||
202 | return err; | 213 | pr_info("Test %02d:\n", i); |
214 | memset(&array, 0, sizeof(array)); | ||
215 | err = rhashtable_init(&ht, &test_rht_params); | ||
216 | if (err < 0) { | ||
217 | pr_warn("Test failed: Unable to initialize hashtable: %d\n", | ||
218 | err); | ||
219 | continue; | ||
220 | } | ||
221 | |||
222 | time = test_rhashtable(&ht); | ||
223 | rhashtable_destroy(&ht); | ||
224 | if (time < 0) { | ||
225 | pr_warn("Test failed: return code %lld\n", time); | ||
226 | return -EINVAL; | ||
227 | } | ||
228 | |||
229 | total_time += time; | ||
230 | } | ||
231 | |||
232 | do_div(total_time, runs); | ||
233 | pr_info("Average test time: %llu\n", total_time); | ||
234 | |||
235 | return 0; | ||
203 | } | 236 | } |
204 | 237 | ||
205 | static void __exit test_rht_exit(void) | 238 | static void __exit test_rht_exit(void) |
diff --git a/lib/timerqueue.c b/lib/timerqueue.c index a382e4a32609..782ae8ca2c06 100644 --- a/lib/timerqueue.c +++ b/lib/timerqueue.c | |||
@@ -36,7 +36,7 @@ | |||
36 | * Adds the timer node to the timerqueue, sorted by the | 36 | * Adds the timer node to the timerqueue, sorted by the |
37 | * node's expires value. | 37 | * node's expires value. |
38 | */ | 38 | */ |
39 | void timerqueue_add(struct timerqueue_head *head, struct timerqueue_node *node) | 39 | bool timerqueue_add(struct timerqueue_head *head, struct timerqueue_node *node) |
40 | { | 40 | { |
41 | struct rb_node **p = &head->head.rb_node; | 41 | struct rb_node **p = &head->head.rb_node; |
42 | struct rb_node *parent = NULL; | 42 | struct rb_node *parent = NULL; |
@@ -56,8 +56,11 @@ void timerqueue_add(struct timerqueue_head *head, struct timerqueue_node *node) | |||
56 | rb_link_node(&node->node, parent, p); | 56 | rb_link_node(&node->node, parent, p); |
57 | rb_insert_color(&node->node, &head->head); | 57 | rb_insert_color(&node->node, &head->head); |
58 | 58 | ||
59 | if (!head->next || node->expires.tv64 < head->next->expires.tv64) | 59 | if (!head->next || node->expires.tv64 < head->next->expires.tv64) { |
60 | head->next = node; | 60 | head->next = node; |
61 | return true; | ||
62 | } | ||
63 | return false; | ||
61 | } | 64 | } |
62 | EXPORT_SYMBOL_GPL(timerqueue_add); | 65 | EXPORT_SYMBOL_GPL(timerqueue_add); |
63 | 66 | ||
@@ -69,7 +72,7 @@ EXPORT_SYMBOL_GPL(timerqueue_add); | |||
69 | * | 72 | * |
70 | * Removes the timer node from the timerqueue. | 73 | * Removes the timer node from the timerqueue. |
71 | */ | 74 | */ |
72 | void timerqueue_del(struct timerqueue_head *head, struct timerqueue_node *node) | 75 | bool timerqueue_del(struct timerqueue_head *head, struct timerqueue_node *node) |
73 | { | 76 | { |
74 | WARN_ON_ONCE(RB_EMPTY_NODE(&node->node)); | 77 | WARN_ON_ONCE(RB_EMPTY_NODE(&node->node)); |
75 | 78 | ||
@@ -82,6 +85,7 @@ void timerqueue_del(struct timerqueue_head *head, struct timerqueue_node *node) | |||
82 | } | 85 | } |
83 | rb_erase(&node->node, &head->head); | 86 | rb_erase(&node->node, &head->head); |
84 | RB_CLEAR_NODE(&node->node); | 87 | RB_CLEAR_NODE(&node->node); |
88 | return head->next != NULL; | ||
85 | } | 89 | } |
86 | EXPORT_SYMBOL_GPL(timerqueue_del); | 90 | EXPORT_SYMBOL_GPL(timerqueue_del); |
87 | 91 | ||