xref: /linux/arch/arc/net/bpf_jit_core.c (revision 5c1672705a1a2389f5ad78e0fea6f08ed32d6f18)
1 // SPDX-License-Identifier: GPL-2.0
2 /*
3  * The back-end-agnostic part of Just-In-Time compiler for eBPF bytecode.
4  *
5  * Copyright (c) 2024 Synopsys Inc.
6  * Author: Shahab Vahedi <shahab@synopsys.com>
7  */
8 #include <linux/bug.h>
9 #include "bpf_jit.h"
10 
11 /*
12  * Check for the return value. A pattern used often in this file.
13  * There must be a "ret" variable of type "int" in the scope.
14  */
15 #define CHECK_RET(cmd)			\
16 	do {				\
17 		ret = (cmd);		\
18 		if (ret < 0)		\
19 			return ret;	\
20 	} while (0)
21 
22 #ifdef ARC_BPF_JIT_DEBUG
23 /* Dumps bytes in /var/log/messages at KERN_INFO level (4). */
24 static void dump_bytes(const u8 *buf, u32 len, const char *header)
25 {
26 	u8 line[64];
27 	size_t i, j;
28 
29 	pr_info("-----------------[ %s ]-----------------\n", header);
30 
31 	for (i = 0, j = 0; i < len; i++) {
32 		/* Last input byte? */
33 		if (i == len - 1) {
34 			j += scnprintf(line + j, 64 - j, "0x%02x", buf[i]);
35 			pr_info("%s\n", line);
36 			break;
37 		}
38 		/* End of line? */
39 		else if (i % 8 == 7) {
40 			j += scnprintf(line + j, 64 - j, "0x%02x", buf[i]);
41 			pr_info("%s\n", line);
42 			j = 0;
43 		} else {
44 			j += scnprintf(line + j, 64 - j, "0x%02x, ", buf[i]);
45 		}
46 	}
47 }
48 #endif /* ARC_BPF_JIT_DEBUG */
49 
50 /********************* JIT context ***********************/
51 
52 /*
53  * buf:		Translated instructions end up here.
54  * len:		The length of whole block in bytes.
55  * index:	The offset at which the _next_ instruction may be put.
56  */
57 struct jit_buffer {
58 	u8	*buf;
59 	u32	len;
60 	u32	index;
61 };
62 
63 /*
64  * This is a subset of "struct jit_context" that its information is deemed
65  * necessary for the next extra pass to come.
66  *
67  * bpf_header:	Needed to finally lock the region.
68  * bpf2insn:	Used to find the translation for instructions of interest.
69  *
70  * Things like "jit.buf" and "jit.len" can be retrieved respectively from
71  * "prog->bpf_func" and "prog->jited_len".
72  */
73 struct arc_jit_data {
74 	struct bpf_binary_header *bpf_header;
75 	u32                      *bpf2insn;
76 };
77 
78 /*
79  * The JIT pertinent context that is used by different functions.
80  *
81  * prog:		The current eBPF program being handled.
82  * orig_prog:		The original eBPF program before any possible change.
83  * jit:			The JIT buffer and its length.
84  * bpf_header:		The JITed program header. "jit.buf" points inside it.
85  * emit:		If set, opcodes are written to memory; else, a dry-run.
86  * do_zext:		If true, 32-bit sub-regs must be zero extended.
87  * bpf2insn:		Maps BPF insn indices to their counterparts in jit.buf.
88  * bpf2insn_valid:	Indicates if "bpf2ins" is populated with the mappings.
89  * jit_data:		A piece of memory to transfer data to the next pass.
90  * arc_regs_clobbered:	Each bit status determines if that arc reg is clobbered.
91  * save_blink:		Whether ARC's "blink" register needs to be saved.
92  * frame_size:		Derived from "prog->aux->stack_depth".
93  * epilogue_offset:	Used by early "return"s in the code to jump here.
94  * need_extra_pass:	A forecast if an "extra_pass" will occur.
95  * is_extra_pass:	Indicates if the current pass is an extra pass.
96  * user_bpf_prog:	True, if VM opcodes come from a real program.
97  * blinded:		True if "constant blinding" step returned a new "prog".
98  * success:		Indicates if the whole JIT went OK.
99  */
100 struct jit_context {
101 	struct bpf_prog			*prog;
102 	struct bpf_prog			*orig_prog;
103 	struct jit_buffer		jit;
104 	struct bpf_binary_header	*bpf_header;
105 	bool				emit;
106 	bool				do_zext;
107 	u32				*bpf2insn;
108 	bool				bpf2insn_valid;
109 	struct arc_jit_data		*jit_data;
110 	u32				arc_regs_clobbered;
111 	bool				save_blink;
112 	u16				frame_size;
113 	u32				epilogue_offset;
114 	bool				need_extra_pass;
115 	bool				is_extra_pass;
116 	bool				user_bpf_prog;
117 	bool				blinded;
118 	bool				success;
119 };
120 
121 /*
122  * If we're in ARC_BPF_JIT_DEBUG mode and the debug level is right, dump the
123  * input BPF stream. "bpf_jit_dump()" is not fully suited for this purpose.
124  */
125 static void vm_dump(const struct bpf_prog *prog)
126 {
127 #ifdef ARC_BPF_JIT_DEBUG
128 	if (bpf_jit_enable > 1)
129 		dump_bytes((u8 *)prog->insns, 8 * prog->len, " VM  ");
130 #endif
131 }
132 
133 /*
134  * If the right level of debug is set, dump the bytes. There are 2 variants
135  * of this function:
136  *
137  * 1. Use the standard bpf_jit_dump() which is meant only for JITed code.
138  * 2. Use the dump_bytes() to match its "vm_dump()" instance.
139  */
140 static void jit_dump(const struct jit_context *ctx)
141 {
142 #ifdef ARC_BPF_JIT_DEBUG
143 	u8 header[8];
144 #endif
145 	const int pass = ctx->is_extra_pass ? 2 : 1;
146 
147 	if (bpf_jit_enable <= 1 || !ctx->prog->jited)
148 		return;
149 
150 #ifdef ARC_BPF_JIT_DEBUG
151 	scnprintf(header, sizeof(header), "JIT:%d", pass);
152 	dump_bytes(ctx->jit.buf, ctx->jit.len, header);
153 	pr_info("\n");
154 #else
155 	bpf_jit_dump(ctx->prog->len, ctx->jit.len, pass, ctx->jit.buf);
156 #endif
157 }
158 
159 /* Initialise the context so there's no garbage. */
160 static int jit_ctx_init(struct jit_context *ctx, struct bpf_prog *prog)
161 {
162 	memset(ctx, 0, sizeof(ctx));
163 
164 	ctx->orig_prog = prog;
165 
166 	/* If constant blinding was requested but failed, scram. */
167 	ctx->prog = bpf_jit_blind_constants(prog);
168 	if (IS_ERR(ctx->prog))
169 		return PTR_ERR(ctx->prog);
170 	ctx->blinded = (ctx->prog == ctx->orig_prog ? false : true);
171 
172 	/* If the verifier doesn't zero-extend, then we have to do it. */
173 	ctx->do_zext = !ctx->prog->aux->verifier_zext;
174 
175 	ctx->is_extra_pass = ctx->prog->jited;
176 	ctx->user_bpf_prog = ctx->prog->is_func;
177 
178 	return 0;
179 }
180 
181 /*
182  * Only after the first iteration of normal pass (the dry-run),
183  * there are valid offsets in ctx->bpf2insn array.
184  */
185 static inline bool offsets_available(const struct jit_context *ctx)
186 {
187 	return ctx->bpf2insn_valid;
188 }
189 
190 /*
191  * "*mem" should be freed when there is no "extra pass" to come,
192  * or the compilation terminated abruptly. A few of such memory
193  * allocations are: ctx->jit_data and ctx->bpf2insn.
194  */
195 static inline void maybe_free(struct jit_context *ctx, void **mem)
196 {
197 	if (*mem) {
198 		if (!ctx->success || !ctx->need_extra_pass) {
199 			kfree(*mem);
200 			*mem = NULL;
201 		}
202 	}
203 }
204 
205 /*
206  * Free memories based on the status of the context.
207  *
208  * A note about "bpf_header": On successful runs, "bpf_header" is
209  * not freed, because "jit.buf", a sub-array of it, is returned as
210  * the "bpf_func". However, "bpf_header" is lost and nothing points
211  * to it. This should not cause a leakage, because apparently
212  * "bpf_header" can be revived by "bpf_jit_binary_hdr()". This is
213  * how "bpf_jit_free()" in "kernel/bpf/core.c" releases the memory.
214  */
215 static void jit_ctx_cleanup(struct jit_context *ctx)
216 {
217 	if (ctx->blinded) {
218 		/* if all went well, release the orig_prog. */
219 		if (ctx->success)
220 			bpf_jit_prog_release_other(ctx->prog, ctx->orig_prog);
221 		else
222 			bpf_jit_prog_release_other(ctx->orig_prog, ctx->prog);
223 	}
224 
225 	maybe_free(ctx, (void **)&ctx->bpf2insn);
226 	maybe_free(ctx, (void **)&ctx->jit_data);
227 
228 	if (!ctx->bpf2insn)
229 		ctx->bpf2insn_valid = false;
230 
231 	/* Freeing "bpf_header" is enough. "jit.buf" is a sub-array of it. */
232 	if (!ctx->success && ctx->bpf_header) {
233 		bpf_jit_binary_free(ctx->bpf_header);
234 		ctx->bpf_header = NULL;
235 		ctx->jit.buf    = NULL;
236 		ctx->jit.index  = 0;
237 		ctx->jit.len    = 0;
238 	}
239 
240 	ctx->emit = false;
241 	ctx->do_zext = false;
242 }
243 
244 /*
245  * Analyse the register usage and record the frame size.
246  * The register usage is determined by consulting the back-end.
247  */
248 static void analyze_reg_usage(struct jit_context *ctx)
249 {
250 	size_t i;
251 	u32 usage = 0;
252 	const struct bpf_insn *insn = ctx->prog->insnsi;
253 
254 	for (i = 0; i < ctx->prog->len; i++) {
255 		u8 bpf_reg;
256 		bool call;
257 
258 		bpf_reg = insn[i].dst_reg;
259 		call = (insn[i].code == (BPF_JMP | BPF_CALL)) ? true : false;
260 		usage |= mask_for_used_regs(bpf_reg, call);
261 	}
262 
263 	ctx->arc_regs_clobbered = usage;
264 	ctx->frame_size = ctx->prog->aux->stack_depth;
265 }
266 
267 /* Verify that no instruction will be emitted when there is no buffer. */
268 static inline int jit_buffer_check(const struct jit_context *ctx)
269 {
270 	if (ctx->emit) {
271 		if (!ctx->jit.buf) {
272 			pr_err("bpf-jit: inconsistence state; no "
273 			       "buffer to emit instructions.\n");
274 			return -EINVAL;
275 		} else if (ctx->jit.index > ctx->jit.len) {
276 			pr_err("bpf-jit: estimated JIT length is less "
277 			       "than the emitted instructions.\n");
278 			return -EFAULT;
279 		}
280 	}
281 	return 0;
282 }
283 
284 /* On a dry-run (emit=false), "jit.len" is growing gradually. */
285 static inline void jit_buffer_update(struct jit_context *ctx, u32 n)
286 {
287 	if (!ctx->emit)
288 		ctx->jit.len += n;
289 	else
290 		ctx->jit.index += n;
291 }
292 
293 /* Based on "emit", determine the address where instructions are emitted. */
294 static inline u8 *effective_jit_buf(const struct jit_context *ctx)
295 {
296 	return ctx->emit ? (ctx->jit.buf + ctx->jit.index) : NULL;
297 }
298 
299 /* Prologue based on context variables set by "analyze_reg_usage()". */
300 static int handle_prologue(struct jit_context *ctx)
301 {
302 	int ret;
303 	u8 *buf = effective_jit_buf(ctx);
304 	u32 len = 0;
305 
306 	CHECK_RET(jit_buffer_check(ctx));
307 
308 	len = arc_prologue(buf, ctx->arc_regs_clobbered, ctx->frame_size);
309 	jit_buffer_update(ctx, len);
310 
311 	return 0;
312 }
313 
314 /* The counter part for "handle_prologue()". */
315 static int handle_epilogue(struct jit_context *ctx)
316 {
317 	int ret;
318 	u8 *buf = effective_jit_buf(ctx);
319 	u32 len = 0;
320 
321 	CHECK_RET(jit_buffer_check(ctx));
322 
323 	len = arc_epilogue(buf, ctx->arc_regs_clobbered, ctx->frame_size);
324 	jit_buffer_update(ctx, len);
325 
326 	return 0;
327 }
328 
329 /* Tell which number of the BPF instruction we are dealing with. */
330 static inline s32 get_index_for_insn(const struct jit_context *ctx,
331 				     const struct bpf_insn *insn)
332 {
333 	return (insn - ctx->prog->insnsi);
334 }
335 
336 /*
337  * In most of the cases, the "offset" is read from "insn->off". However,
338  * if it is an unconditional BPF_JMP32, then it comes from "insn->imm".
339  *
340  * (Courtesy of "cpu=v4" support)
341  */
342 static inline s32 get_offset(const struct bpf_insn *insn)
343 {
344 	if ((BPF_CLASS(insn->code) == BPF_JMP32) &&
345 	    (BPF_OP(insn->code) == BPF_JA))
346 		return insn->imm;
347 	else
348 		return insn->off;
349 }
350 
351 /*
352  * Determine to which number of the BPF instruction we're jumping to.
353  *
354  * The "offset" is interpreted as the "number" of BPF instructions
355  * from the _next_ BPF instruction. e.g.:
356  *
357  *  4 means 4 instructions after  the next insn
358  *  0 means 0 instructions after  the next insn -> fallthrough.
359  * -1 means 1 instruction  before the next insn -> jmp to current insn.
360  *
361  *  Another way to look at this, "offset" is the number of instructions
362  *  that exist between the current instruction and the target instruction.
363  *
364  *  It is worth noting that a "mov r,i64", which is 16-byte long, is
365  *  treated as two instructions long, therefore "offset" needn't be
366  *  treated specially for those. Everything is uniform.
367  */
368 static inline s32 get_target_index_for_insn(const struct jit_context *ctx,
369 					    const struct bpf_insn *insn)
370 {
371 	return (get_index_for_insn(ctx, insn) + 1) + get_offset(insn);
372 }
373 
374 /* Is there an immediate operand encoded in the "insn"? */
375 static inline bool has_imm(const struct bpf_insn *insn)
376 {
377 	return BPF_SRC(insn->code) == BPF_K;
378 }
379 
380 /* Is the last BPF instruction? */
381 static inline bool is_last_insn(const struct bpf_prog *prog, u32 idx)
382 {
383 	return idx == (prog->len - 1);
384 }
385 
386 /*
387  * Invocation of this function, conditionally signals the need for
388  * an extra pass. The conditions that must be met are:
389  *
390  * 1. The current pass itself shouldn't be an extra pass.
391  * 2. The stream of bytes being JITed must come from a user program.
392  */
393 static inline void set_need_for_extra_pass(struct jit_context *ctx)
394 {
395 	if (!ctx->is_extra_pass)
396 		ctx->need_extra_pass = ctx->user_bpf_prog;
397 }
398 
399 /*
400  * Check if the "size" is valid and then transfer the control to
401  * the back-end for the swap.
402  */
403 static int handle_swap(u8 *buf, u8 rd, u8 size, u8 endian,
404 		       bool force, bool do_zext, u8 *len)
405 {
406 	/* Sanity check on the size. */
407 	switch (size) {
408 	case 16:
409 	case 32:
410 	case 64:
411 		break;
412 	default:
413 		pr_err("bpf-jit: invalid size for swap.\n");
414 		return -EINVAL;
415 	}
416 
417 	*len = gen_swap(buf, rd, size, endian, force, do_zext);
418 
419 	return 0;
420 }
421 
422 /* Checks if the (instruction) index is in valid range. */
423 static inline bool check_insn_idx_valid(const struct jit_context *ctx,
424 					const s32 idx)
425 {
426 	return (idx >= 0 && idx < ctx->prog->len);
427 }
428 
429 /*
430  * Decouple the back-end from BPF by converting BPF conditions
431  * to internal enum. ARC_CC_* start from 0 and are used as index
432  * to an array. BPF_J* usage must end after this conversion.
433  */
434 static int bpf_cond_to_arc(const u8 op, u8 *arc_cc)
435 {
436 	switch (op) {
437 	case BPF_JA:
438 		*arc_cc = ARC_CC_AL;
439 		break;
440 	case BPF_JEQ:
441 		*arc_cc = ARC_CC_EQ;
442 		break;
443 	case BPF_JGT:
444 		*arc_cc = ARC_CC_UGT;
445 		break;
446 	case BPF_JGE:
447 		*arc_cc = ARC_CC_UGE;
448 		break;
449 	case BPF_JSET:
450 		*arc_cc = ARC_CC_SET;
451 		break;
452 	case BPF_JNE:
453 		*arc_cc = ARC_CC_NE;
454 		break;
455 	case BPF_JSGT:
456 		*arc_cc = ARC_CC_SGT;
457 		break;
458 	case BPF_JSGE:
459 		*arc_cc = ARC_CC_SGE;
460 		break;
461 	case BPF_JLT:
462 		*arc_cc = ARC_CC_ULT;
463 		break;
464 	case BPF_JLE:
465 		*arc_cc = ARC_CC_ULE;
466 		break;
467 	case BPF_JSLT:
468 		*arc_cc = ARC_CC_SLT;
469 		break;
470 	case BPF_JSLE:
471 		*arc_cc = ARC_CC_SLE;
472 		break;
473 	default:
474 		pr_err("bpf-jit: can't handle condition 0x%02X\n", op);
475 		return -EINVAL;
476 	}
477 	return 0;
478 }
479 
480 /*
481  * Check a few things for a supposedly "jump" instruction:
482  *
483  * 0. "insn" is a "jump" instruction, but not the "call/exit" variant.
484  * 1. The current "insn" index is in valid range.
485  * 2. The index of target instruction is in valid range.
486  */
487 static int check_bpf_jump(const struct jit_context *ctx,
488 			  const struct bpf_insn *insn)
489 {
490 	const u8 class = BPF_CLASS(insn->code);
491 	const u8 op = BPF_OP(insn->code);
492 
493 	/* Must be a jmp(32) instruction that is not a "call/exit". */
494 	if ((class != BPF_JMP && class != BPF_JMP32) ||
495 	    (op == BPF_CALL || op == BPF_EXIT)) {
496 		pr_err("bpf-jit: not a jump instruction.\n");
497 		return -EINVAL;
498 	}
499 
500 	if (!check_insn_idx_valid(ctx, get_index_for_insn(ctx, insn))) {
501 		pr_err("bpf-jit: the bpf jump insn is not in prog.\n");
502 		return -EINVAL;
503 	}
504 
505 	if (!check_insn_idx_valid(ctx, get_target_index_for_insn(ctx, insn))) {
506 		pr_err("bpf-jit: bpf jump label is out of range.\n");
507 		return -EINVAL;
508 	}
509 
510 	return 0;
511 }
512 
513 /*
514  * Based on input "insn", consult "ctx->bpf2insn" to get the
515  * related index (offset) of the translation in JIT stream.
516  */
517 static u32 get_curr_jit_off(const struct jit_context *ctx,
518 			    const struct bpf_insn *insn)
519 {
520 	const s32 idx = get_index_for_insn(ctx, insn);
521 #ifdef ARC_BPF_JIT_DEBUG
522 	BUG_ON(!offsets_available(ctx) || !check_insn_idx_valid(ctx, idx));
523 #endif
524 	return ctx->bpf2insn[idx];
525 }
526 
527 /*
528  * The input "insn" must be a jump instruction.
529  *
530  * Based on input "insn", consult "ctx->bpf2insn" to get the
531  * related JIT index (offset) of "target instruction" that
532  * "insn" would jump to.
533  */
534 static u32 get_targ_jit_off(const struct jit_context *ctx,
535 			    const struct bpf_insn *insn)
536 {
537 	const s32 tidx = get_target_index_for_insn(ctx, insn);
538 #ifdef ARC_BPF_JIT_DEBUG
539 	BUG_ON(!offsets_available(ctx) || !check_insn_idx_valid(ctx, tidx));
540 #endif
541 	return ctx->bpf2insn[tidx];
542 }
543 
544 /*
545  * This function will return 0 for a feasible jump.
546  *
547  * Consult the back-end to check if it finds it feasible to emit
548  * the necessary instructions based on "cond" and the displacement
549  * between the "from_off" and the "to_off".
550  */
551 static int feasible_jit_jump(u32 from_off, u32 to_off, u8 cond, bool j32)
552 {
553 	int ret = 0;
554 
555 	if (j32) {
556 		if (!check_jmp_32(from_off, to_off, cond))
557 			ret = -EFAULT;
558 	} else {
559 		if (!check_jmp_64(from_off, to_off, cond))
560 			ret = -EFAULT;
561 	}
562 
563 	if (ret != 0)
564 		pr_err("bpf-jit: the JIT displacement is not OK.\n");
565 
566 	return ret;
567 }
568 
569 /*
570  * This jump handler performs the following steps:
571  *
572  * 1. Compute ARC's internal condition code from BPF's
573  * 2. Determine the bitness of the operation (32 vs. 64)
574  * 3. Sanity check on BPF stream
575  * 4. Sanity check on what is supposed to be JIT's displacement
576  * 5. And finally, emit the necessary instructions
577  *
578  * The last two steps are performed through the back-end.
579  * The value of steps 1 and 2 are necessary inputs for the back-end.
580  */
581 static int handle_jumps(const struct jit_context *ctx,
582 			const struct bpf_insn *insn,
583 			u8 *len)
584 {
585 	u8 cond;
586 	int ret = 0;
587 	u8 *buf = effective_jit_buf(ctx);
588 	const bool j32 = (BPF_CLASS(insn->code) == BPF_JMP32) ? true : false;
589 	const u8 rd = insn->dst_reg;
590 	u8 rs = insn->src_reg;
591 	u32 curr_off = 0, targ_off = 0;
592 
593 	*len = 0;
594 
595 	/* Map the BPF condition to internal enum. */
596 	CHECK_RET(bpf_cond_to_arc(BPF_OP(insn->code), &cond));
597 
598 	/* Sanity check on the BPF byte stream. */
599 	CHECK_RET(check_bpf_jump(ctx, insn));
600 
601 	/*
602 	 * Move the immediate into a temporary register _now_ for 2 reasons:
603 	 *
604 	 * 1. "gen_jmp_{32,64}()" deal with operands in registers.
605 	 *
606 	 * 2. The "len" parameter will grow so that the current jit offset
607 	 *    (curr_off) will have increased to a point where the necessary
608 	 *    instructions can be inserted by "gen_jmp_{32,64}()".
609 	 */
610 	if (has_imm(insn) && cond != ARC_CC_AL) {
611 		if (j32) {
612 			*len += mov_r32_i32(BUF(buf, *len), JIT_REG_TMP,
613 					    insn->imm);
614 		} else {
615 			*len += mov_r64_i32(BUF(buf, *len), JIT_REG_TMP,
616 					    insn->imm);
617 		}
618 		rs = JIT_REG_TMP;
619 	}
620 
621 	/* If the offsets are known, check if the branch can occur. */
622 	if (offsets_available(ctx)) {
623 		curr_off = get_curr_jit_off(ctx, insn) + *len;
624 		targ_off = get_targ_jit_off(ctx, insn);
625 
626 		/* Sanity check on the back-end side. */
627 		CHECK_RET(feasible_jit_jump(curr_off, targ_off, cond, j32));
628 	}
629 
630 	if (j32) {
631 		*len += gen_jmp_32(BUF(buf, *len), rd, rs, cond,
632 				   curr_off, targ_off);
633 	} else {
634 		*len += gen_jmp_64(BUF(buf, *len), rd, rs, cond,
635 				   curr_off, targ_off);
636 	}
637 
638 	return ret;
639 }
640 
641 /* Jump to translated epilogue address. */
642 static int handle_jmp_epilogue(struct jit_context *ctx,
643 			       const struct bpf_insn *insn, u8 *len)
644 {
645 	u8 *buf = effective_jit_buf(ctx);
646 	u32 curr_off = 0, epi_off = 0;
647 
648 	/* Check the offset only if the data is available. */
649 	if (offsets_available(ctx)) {
650 		curr_off = get_curr_jit_off(ctx, insn);
651 		epi_off = ctx->epilogue_offset;
652 
653 		if (!check_jmp_64(curr_off, epi_off, ARC_CC_AL)) {
654 			pr_err("bpf-jit: epilogue offset is not valid.\n");
655 			return -EINVAL;
656 		}
657 	}
658 
659 	/* Jump to "epilogue offset" (rd and rs don't matter). */
660 	*len = gen_jmp_64(buf, 0, 0, ARC_CC_AL, curr_off, epi_off);
661 
662 	return 0;
663 }
664 
665 /* Try to get the resolved address and generate the instructions. */
666 static int handle_call(struct jit_context *ctx,
667 		       const struct bpf_insn *insn,
668 		       u8 *len)
669 {
670 	int  ret;
671 	bool in_kernel_func, fixed = false;
672 	u64  addr = 0;
673 	u8  *buf = effective_jit_buf(ctx);
674 
675 	ret = bpf_jit_get_func_addr(ctx->prog, insn, ctx->is_extra_pass,
676 				    &addr, &fixed);
677 	if (ret < 0) {
678 		pr_err("bpf-jit: can't get the address for call.\n");
679 		return ret;
680 	}
681 	in_kernel_func = (fixed ? true : false);
682 
683 	/* No valuable address retrieved (yet). */
684 	if (!fixed && !addr)
685 		set_need_for_extra_pass(ctx);
686 
687 	*len = gen_func_call(buf, (ARC_ADDR)addr, in_kernel_func);
688 
689 	if (insn->src_reg != BPF_PSEUDO_CALL) {
690 		/* Assigning ABI's return reg to JIT's return reg. */
691 		*len += arc_to_bpf_return(BUF(buf, *len));
692 	}
693 
694 	return 0;
695 }
696 
697 /*
698  * Try to generate instructions for loading a 64-bit immediate.
699  * These sort of instructions are usually associated with the 64-bit
700  * relocations: R_BPF_64_64. Therefore, signal the need for an extra
701  * pass if the circumstances are right.
702  */
703 static int handle_ld_imm64(struct jit_context *ctx,
704 			   const struct bpf_insn *insn,
705 			   u8 *len)
706 {
707 	const s32 idx = get_index_for_insn(ctx, insn);
708 	u8 *buf = effective_jit_buf(ctx);
709 
710 	/* We're about to consume 2 VM instructions. */
711 	if (is_last_insn(ctx->prog, idx)) {
712 		pr_err("bpf-jit: need more data for 64-bit immediate.\n");
713 		return -EINVAL;
714 	}
715 
716 	*len = mov_r64_i64(buf, insn->dst_reg, insn->imm, (insn + 1)->imm);
717 
718 	if (bpf_pseudo_func(insn))
719 		set_need_for_extra_pass(ctx);
720 
721 	return 0;
722 }
723 
724 /*
725  * Handles one eBPF instruction at a time. To make this function faster,
726  * it does not call "jit_buffer_check()". Else, it would call it for every
727  * instruction. As a result, it should not be invoked directly. Only
728  * "handle_body()", that has already executed the "check", may call this
729  * function.
730  *
731  * If the "ret" value is negative, something has went wrong. Else,
732  * it mostly holds the value 0 and rarely 1. Number 1 signals
733  * the loop in "handle_body()" to skip the next instruction, because
734  * it has been consumed as part of a 64-bit immediate value.
735  */
736 static int handle_insn(struct jit_context *ctx, u32 idx)
737 {
738 	const struct bpf_insn *insn = &ctx->prog->insnsi[idx];
739 	const u8  code = insn->code;
740 	const u8  dst  = insn->dst_reg;
741 	const u8  src  = insn->src_reg;
742 	const s16 off  = insn->off;
743 	const s32 imm  = insn->imm;
744 	u8 *buf = effective_jit_buf(ctx);
745 	u8  len = 0;
746 	int ret = 0;
747 
748 	switch (code) {
749 	/* dst += src (32-bit) */
750 	case BPF_ALU | BPF_ADD | BPF_X:
751 		len = add_r32(buf, dst, src);
752 		break;
753 	/* dst += imm (32-bit) */
754 	case BPF_ALU | BPF_ADD | BPF_K:
755 		len = add_r32_i32(buf, dst, imm);
756 		break;
757 	/* dst -= src (32-bit) */
758 	case BPF_ALU | BPF_SUB | BPF_X:
759 		len = sub_r32(buf, dst, src);
760 		break;
761 	/* dst -= imm (32-bit) */
762 	case BPF_ALU | BPF_SUB | BPF_K:
763 		len = sub_r32_i32(buf, dst, imm);
764 		break;
765 	/* dst = -dst (32-bit) */
766 	case BPF_ALU | BPF_NEG:
767 		len = neg_r32(buf, dst);
768 		break;
769 	/* dst *= src (32-bit) */
770 	case BPF_ALU | BPF_MUL | BPF_X:
771 		len = mul_r32(buf, dst, src);
772 		break;
773 	/* dst *= imm (32-bit) */
774 	case BPF_ALU | BPF_MUL | BPF_K:
775 		len = mul_r32_i32(buf, dst, imm);
776 		break;
777 	/* dst /= src (32-bit) */
778 	case BPF_ALU | BPF_DIV | BPF_X:
779 		len = div_r32(buf, dst, src, off == 1);
780 		break;
781 	/* dst /= imm (32-bit) */
782 	case BPF_ALU | BPF_DIV | BPF_K:
783 		len = div_r32_i32(buf, dst, imm, off == 1);
784 		break;
785 	/* dst %= src (32-bit) */
786 	case BPF_ALU | BPF_MOD | BPF_X:
787 		len = mod_r32(buf, dst, src, off == 1);
788 		break;
789 	/* dst %= imm (32-bit) */
790 	case BPF_ALU | BPF_MOD | BPF_K:
791 		len = mod_r32_i32(buf, dst, imm, off == 1);
792 		break;
793 	/* dst &= src (32-bit) */
794 	case BPF_ALU | BPF_AND | BPF_X:
795 		len = and_r32(buf, dst, src);
796 		break;
797 	/* dst &= imm (32-bit) */
798 	case BPF_ALU | BPF_AND | BPF_K:
799 		len = and_r32_i32(buf, dst, imm);
800 		break;
801 	/* dst |= src (32-bit) */
802 	case BPF_ALU | BPF_OR | BPF_X:
803 		len = or_r32(buf, dst, src);
804 		break;
805 	/* dst |= imm (32-bit) */
806 	case BPF_ALU | BPF_OR | BPF_K:
807 		len = or_r32_i32(buf, dst, imm);
808 		break;
809 	/* dst ^= src (32-bit) */
810 	case BPF_ALU | BPF_XOR | BPF_X:
811 		len = xor_r32(buf, dst, src);
812 		break;
813 	/* dst ^= imm (32-bit) */
814 	case BPF_ALU | BPF_XOR | BPF_K:
815 		len = xor_r32_i32(buf, dst, imm);
816 		break;
817 	/* dst <<= src (32-bit) */
818 	case BPF_ALU | BPF_LSH | BPF_X:
819 		len = lsh_r32(buf, dst, src);
820 		break;
821 	/* dst <<= imm (32-bit) */
822 	case BPF_ALU | BPF_LSH | BPF_K:
823 		len = lsh_r32_i32(buf, dst, imm);
824 		break;
825 	/* dst >>= src (32-bit) [unsigned] */
826 	case BPF_ALU | BPF_RSH | BPF_X:
827 		len = rsh_r32(buf, dst, src);
828 		break;
829 	/* dst >>= imm (32-bit) [unsigned] */
830 	case BPF_ALU | BPF_RSH | BPF_K:
831 		len = rsh_r32_i32(buf, dst, imm);
832 		break;
833 	/* dst >>= src (32-bit) [signed] */
834 	case BPF_ALU | BPF_ARSH | BPF_X:
835 		len = arsh_r32(buf, dst, src);
836 		break;
837 	/* dst >>= imm (32-bit) [signed] */
838 	case BPF_ALU | BPF_ARSH | BPF_K:
839 		len = arsh_r32_i32(buf, dst, imm);
840 		break;
841 	/* dst = src (32-bit) */
842 	case BPF_ALU | BPF_MOV | BPF_X:
843 		len = mov_r32(buf, dst, src, (u8)off);
844 		break;
845 	/* dst = imm32 (32-bit) */
846 	case BPF_ALU | BPF_MOV | BPF_K:
847 		len = mov_r32_i32(buf, dst, imm);
848 		break;
849 	/* dst = swap(dst) */
850 	case BPF_ALU   | BPF_END | BPF_FROM_LE:
851 	case BPF_ALU   | BPF_END | BPF_FROM_BE:
852 	case BPF_ALU64 | BPF_END | BPF_FROM_LE: {
853 		CHECK_RET(handle_swap(buf, dst, imm, BPF_SRC(code),
854 				      BPF_CLASS(code) == BPF_ALU64,
855 				      ctx->do_zext, &len));
856 		break;
857 	}
858 	/* dst += src (64-bit) */
859 	case BPF_ALU64 | BPF_ADD | BPF_X:
860 		len = add_r64(buf, dst, src);
861 		break;
862 	/* dst += imm32 (64-bit) */
863 	case BPF_ALU64 | BPF_ADD | BPF_K:
864 		len = add_r64_i32(buf, dst, imm);
865 		break;
866 	/* dst -= src (64-bit) */
867 	case BPF_ALU64 | BPF_SUB | BPF_X:
868 		len = sub_r64(buf, dst, src);
869 		break;
870 	/* dst -= imm32 (64-bit) */
871 	case BPF_ALU64 | BPF_SUB | BPF_K:
872 		len = sub_r64_i32(buf, dst, imm);
873 		break;
874 	/* dst = -dst (64-bit) */
875 	case BPF_ALU64 | BPF_NEG:
876 		len = neg_r64(buf, dst);
877 		break;
878 	/* dst *= src (64-bit) */
879 	case BPF_ALU64 | BPF_MUL | BPF_X:
880 		len = mul_r64(buf, dst, src);
881 		break;
882 	/* dst *= imm32 (64-bit) */
883 	case BPF_ALU64 | BPF_MUL | BPF_K:
884 		len = mul_r64_i32(buf, dst, imm);
885 		break;
886 	/* dst &= src (64-bit) */
887 	case BPF_ALU64 | BPF_AND | BPF_X:
888 		len = and_r64(buf, dst, src);
889 		break;
890 	/* dst &= imm32 (64-bit) */
891 	case BPF_ALU64 | BPF_AND | BPF_K:
892 		len = and_r64_i32(buf, dst, imm);
893 		break;
894 	/* dst |= src (64-bit) */
895 	case BPF_ALU64 | BPF_OR | BPF_X:
896 		len = or_r64(buf, dst, src);
897 		break;
898 	/* dst |= imm32 (64-bit) */
899 	case BPF_ALU64 | BPF_OR | BPF_K:
900 		len = or_r64_i32(buf, dst, imm);
901 		break;
902 	/* dst ^= src (64-bit) */
903 	case BPF_ALU64 | BPF_XOR | BPF_X:
904 		len = xor_r64(buf, dst, src);
905 		break;
906 	/* dst ^= imm32 (64-bit) */
907 	case BPF_ALU64 | BPF_XOR | BPF_K:
908 		len = xor_r64_i32(buf, dst, imm);
909 		break;
910 	/* dst <<= src (64-bit) */
911 	case BPF_ALU64 | BPF_LSH | BPF_X:
912 		len = lsh_r64(buf, dst, src);
913 		break;
914 	/* dst <<= imm32 (64-bit) */
915 	case BPF_ALU64 | BPF_LSH | BPF_K:
916 		len = lsh_r64_i32(buf, dst, imm);
917 		break;
918 	/* dst >>= src (64-bit) [unsigned] */
919 	case BPF_ALU64 | BPF_RSH | BPF_X:
920 		len = rsh_r64(buf, dst, src);
921 		break;
922 	/* dst >>= imm32 (64-bit) [unsigned] */
923 	case BPF_ALU64 | BPF_RSH | BPF_K:
924 		len = rsh_r64_i32(buf, dst, imm);
925 		break;
926 	/* dst >>= src (64-bit) [signed] */
927 	case BPF_ALU64 | BPF_ARSH | BPF_X:
928 		len = arsh_r64(buf, dst, src);
929 		break;
930 	/* dst >>= imm32 (64-bit) [signed] */
931 	case BPF_ALU64 | BPF_ARSH | BPF_K:
932 		len = arsh_r64_i32(buf, dst, imm);
933 		break;
934 	/* dst = src (64-bit) */
935 	case BPF_ALU64 | BPF_MOV | BPF_X:
936 		len = mov_r64(buf, dst, src, (u8)off);
937 		break;
938 	/* dst = imm32 (sign extend to 64-bit) */
939 	case BPF_ALU64 | BPF_MOV | BPF_K:
940 		len = mov_r64_i32(buf, dst, imm);
941 		break;
942 	/* dst = imm64 */
943 	case BPF_LD | BPF_DW | BPF_IMM:
944 		CHECK_RET(handle_ld_imm64(ctx, insn, &len));
945 		/* Tell the loop to skip the next instruction. */
946 		ret = 1;
947 		break;
948 	/* dst = *(size *)(src + off) */
949 	case BPF_LDX | BPF_MEM | BPF_W:
950 	case BPF_LDX | BPF_MEM | BPF_H:
951 	case BPF_LDX | BPF_MEM | BPF_B:
952 	case BPF_LDX | BPF_MEM | BPF_DW:
953 		len = load_r(buf, dst, src, off, BPF_SIZE(code), false);
954 		break;
955 	case BPF_LDX | BPF_MEMSX | BPF_W:
956 	case BPF_LDX | BPF_MEMSX | BPF_H:
957 	case BPF_LDX | BPF_MEMSX | BPF_B:
958 		len = load_r(buf, dst, src, off, BPF_SIZE(code), true);
959 		break;
960 	/* *(size *)(dst + off) = src */
961 	case BPF_STX | BPF_MEM | BPF_W:
962 	case BPF_STX | BPF_MEM | BPF_H:
963 	case BPF_STX | BPF_MEM | BPF_B:
964 	case BPF_STX | BPF_MEM | BPF_DW:
965 		len = store_r(buf, src, dst, off, BPF_SIZE(code));
966 		break;
967 	case BPF_ST | BPF_MEM | BPF_W:
968 	case BPF_ST | BPF_MEM | BPF_H:
969 	case BPF_ST | BPF_MEM | BPF_B:
970 	case BPF_ST | BPF_MEM | BPF_DW:
971 		len = store_i(buf, imm, dst, off, BPF_SIZE(code));
972 		break;
973 	case BPF_JMP   | BPF_JA:
974 	case BPF_JMP   | BPF_JEQ  | BPF_X:
975 	case BPF_JMP   | BPF_JEQ  | BPF_K:
976 	case BPF_JMP   | BPF_JNE  | BPF_X:
977 	case BPF_JMP   | BPF_JNE  | BPF_K:
978 	case BPF_JMP   | BPF_JSET | BPF_X:
979 	case BPF_JMP   | BPF_JSET | BPF_K:
980 	case BPF_JMP   | BPF_JGT  | BPF_X:
981 	case BPF_JMP   | BPF_JGT  | BPF_K:
982 	case BPF_JMP   | BPF_JGE  | BPF_X:
983 	case BPF_JMP   | BPF_JGE  | BPF_K:
984 	case BPF_JMP   | BPF_JSGT | BPF_X:
985 	case BPF_JMP   | BPF_JSGT | BPF_K:
986 	case BPF_JMP   | BPF_JSGE | BPF_X:
987 	case BPF_JMP   | BPF_JSGE | BPF_K:
988 	case BPF_JMP   | BPF_JLT  | BPF_X:
989 	case BPF_JMP   | BPF_JLT  | BPF_K:
990 	case BPF_JMP   | BPF_JLE  | BPF_X:
991 	case BPF_JMP   | BPF_JLE  | BPF_K:
992 	case BPF_JMP   | BPF_JSLT | BPF_X:
993 	case BPF_JMP   | BPF_JSLT | BPF_K:
994 	case BPF_JMP   | BPF_JSLE | BPF_X:
995 	case BPF_JMP   | BPF_JSLE | BPF_K:
996 	case BPF_JMP32 | BPF_JA:
997 	case BPF_JMP32 | BPF_JEQ  | BPF_X:
998 	case BPF_JMP32 | BPF_JEQ  | BPF_K:
999 	case BPF_JMP32 | BPF_JNE  | BPF_X:
1000 	case BPF_JMP32 | BPF_JNE  | BPF_K:
1001 	case BPF_JMP32 | BPF_JSET | BPF_X:
1002 	case BPF_JMP32 | BPF_JSET | BPF_K:
1003 	case BPF_JMP32 | BPF_JGT  | BPF_X:
1004 	case BPF_JMP32 | BPF_JGT  | BPF_K:
1005 	case BPF_JMP32 | BPF_JGE  | BPF_X:
1006 	case BPF_JMP32 | BPF_JGE  | BPF_K:
1007 	case BPF_JMP32 | BPF_JSGT | BPF_X:
1008 	case BPF_JMP32 | BPF_JSGT | BPF_K:
1009 	case BPF_JMP32 | BPF_JSGE | BPF_X:
1010 	case BPF_JMP32 | BPF_JSGE | BPF_K:
1011 	case BPF_JMP32 | BPF_JLT  | BPF_X:
1012 	case BPF_JMP32 | BPF_JLT  | BPF_K:
1013 	case BPF_JMP32 | BPF_JLE  | BPF_X:
1014 	case BPF_JMP32 | BPF_JLE  | BPF_K:
1015 	case BPF_JMP32 | BPF_JSLT | BPF_X:
1016 	case BPF_JMP32 | BPF_JSLT | BPF_K:
1017 	case BPF_JMP32 | BPF_JSLE | BPF_X:
1018 	case BPF_JMP32 | BPF_JSLE | BPF_K:
1019 		CHECK_RET(handle_jumps(ctx, insn, &len));
1020 		break;
1021 	case BPF_JMP | BPF_CALL:
1022 		CHECK_RET(handle_call(ctx, insn, &len));
1023 		break;
1024 
1025 	case BPF_JMP | BPF_EXIT:
1026 		/* If this is the last instruction, epilogue will follow. */
1027 		if (is_last_insn(ctx->prog, idx))
1028 			break;
1029 		CHECK_RET(handle_jmp_epilogue(ctx, insn, &len));
1030 		break;
1031 	default:
1032 		pr_err("bpf-jit: can't handle instruction code 0x%02X\n", code);
1033 		return -EOPNOTSUPP;
1034 	}
1035 
1036 	if (BPF_CLASS(code) == BPF_ALU) {
1037 		/*
1038 		 * Skip the "swap" instructions. Even 64-bit swaps are of type
1039 		 * BPF_ALU (and not BPF_ALU64). Therefore, for the swaps, one
1040 		 * has to look at the "size" of the operations rather than the
1041 		 * ALU type. "gen_swap()" specifically takes care of that.
1042 		 */
1043 		if (BPF_OP(code) != BPF_END && ctx->do_zext)
1044 			len += zext(BUF(buf, len), dst);
1045 	}
1046 
1047 	jit_buffer_update(ctx, len);
1048 
1049 	return ret;
1050 }
1051 
1052 static int handle_body(struct jit_context *ctx)
1053 {
1054 	int ret;
1055 	bool populate_bpf2insn = false;
1056 	const struct bpf_prog *prog = ctx->prog;
1057 
1058 	CHECK_RET(jit_buffer_check(ctx));
1059 
1060 	/*
1061 	 * Record the mapping for the instructions during the dry-run.
1062 	 * Doing it this way allows us to have the mapping ready for
1063 	 * the jump instructions during the real compilation phase.
1064 	 */
1065 	if (!ctx->emit)
1066 		populate_bpf2insn = true;
1067 
1068 	for (u32 i = 0; i < prog->len; i++) {
1069 		/* During the dry-run, jit.len grows gradually per BPF insn. */
1070 		if (populate_bpf2insn)
1071 			ctx->bpf2insn[i] = ctx->jit.len;
1072 
1073 		CHECK_RET(handle_insn(ctx, i));
1074 		if (ret > 0) {
1075 			/* "ret" is 1 if two (64-bit) chunks were consumed. */
1076 			ctx->bpf2insn[i + 1] = ctx->bpf2insn[i];
1077 			i++;
1078 		}
1079 	}
1080 
1081 	/* If bpf2insn had to be populated, then it is done at this point. */
1082 	if (populate_bpf2insn)
1083 		ctx->bpf2insn_valid = true;
1084 
1085 	return 0;
1086 }
1087 
1088 /*
1089  * Initialize the memory with "unimp_s" which is the mnemonic for
1090  * "unimplemented" instruction and always raises an exception.
1091  *
1092  * The instruction is 2 bytes. If "size" is odd, there is not much
1093  * that can be done about the last byte in "area". Because, the
1094  * CPU always fetches instructions in two bytes. Therefore, the
1095  * byte beyond the last one is going to accompany it during a
1096  * possible fetch. In the most likely case of a little endian
1097  * system, that beyond-byte will become the major opcode and
1098  * we have no control over its initialisation.
1099  */
1100 static void fill_ill_insn(void *area, unsigned int size)
1101 {
1102 	const u16 unimp_s = 0x79e0;
1103 
1104 	if (size & 1) {
1105 		*((u8 *)area + (size - 1)) = 0xff;
1106 		size -= 1;
1107 	}
1108 
1109 	memset16(area, unimp_s, size >> 1);
1110 }
1111 
1112 /* Piece of memory that can be allocated at the beginning of jit_prepare(). */
1113 static int jit_prepare_early_mem_alloc(struct jit_context *ctx)
1114 {
1115 	ctx->bpf2insn = kcalloc(ctx->prog->len, sizeof(ctx->jit.len),
1116 				GFP_KERNEL);
1117 
1118 	if (!ctx->bpf2insn) {
1119 		pr_err("bpf-jit: could not allocate memory for "
1120 		       "mapping of the instructions.\n");
1121 		return -ENOMEM;
1122 	}
1123 
1124 	return 0;
1125 }
1126 
1127 /*
1128  * Memory allocations that rely on parameters known at the end of
1129  * jit_prepare().
1130  */
1131 static int jit_prepare_final_mem_alloc(struct jit_context *ctx)
1132 {
1133 	const size_t alignment = sizeof(u32);
1134 
1135 	ctx->bpf_header = bpf_jit_binary_alloc(ctx->jit.len, &ctx->jit.buf,
1136 					       alignment, fill_ill_insn);
1137 	if (!ctx->bpf_header) {
1138 		pr_err("bpf-jit: could not allocate memory for translation.\n");
1139 		return -ENOMEM;
1140 	}
1141 
1142 	if (ctx->need_extra_pass) {
1143 		ctx->jit_data = kzalloc(sizeof(*ctx->jit_data), GFP_KERNEL);
1144 		if (!ctx->jit_data)
1145 			return -ENOMEM;
1146 	}
1147 
1148 	return 0;
1149 }
1150 
1151 /*
1152  * The first phase of the translation without actually emitting any
1153  * instruction. It helps in getting a forecast on some aspects, such
1154  * as the length of the whole program or where the epilogue starts.
1155  *
1156  * Whenever the necessary parameters are known, memories are allocated.
1157  */
1158 static int jit_prepare(struct jit_context *ctx)
1159 {
1160 	int ret;
1161 
1162 	/* Dry run. */
1163 	ctx->emit = false;
1164 
1165 	CHECK_RET(jit_prepare_early_mem_alloc(ctx));
1166 
1167 	/* Get the length of prologue section after some register analysis. */
1168 	analyze_reg_usage(ctx);
1169 	CHECK_RET(handle_prologue(ctx));
1170 
1171 	CHECK_RET(handle_body(ctx));
1172 
1173 	/* Record at which offset epilogue begins. */
1174 	ctx->epilogue_offset = ctx->jit.len;
1175 
1176 	/* Process the epilogue section now. */
1177 	CHECK_RET(handle_epilogue(ctx));
1178 
1179 	CHECK_RET(jit_prepare_final_mem_alloc(ctx));
1180 
1181 	return 0;
1182 }
1183 
1184 /*
1185  * All the "handle_*()" functions have been called before by the
1186  * "jit_prepare()". If there was an error, we would know by now.
1187  * Therefore, no extra error checking at this point, other than
1188  * a sanity check at the end that expects the calculated length
1189  * (jit.len) to be equal to the length of generated instructions
1190  * (jit.index).
1191  */
1192 static int jit_compile(struct jit_context *ctx)
1193 {
1194 	int ret;
1195 
1196 	/* Let there be code. */
1197 	ctx->emit = true;
1198 
1199 	CHECK_RET(handle_prologue(ctx));
1200 
1201 	CHECK_RET(handle_body(ctx));
1202 
1203 	CHECK_RET(handle_epilogue(ctx));
1204 
1205 	if (ctx->jit.index != ctx->jit.len) {
1206 		pr_err("bpf-jit: divergence between the phases; "
1207 		       "%u vs. %u (bytes).\n",
1208 		       ctx->jit.len, ctx->jit.index);
1209 		return -EFAULT;
1210 	}
1211 
1212 	return 0;
1213 }
1214 
1215 /*
1216  * Calling this function implies a successful JIT. A successful
1217  * translation is signaled by setting the right parameters:
1218  *
1219  * prog->jited=1, prog->jited_len=..., prog->bpf_func=...
1220  */
1221 static int jit_finalize(struct jit_context *ctx)
1222 {
1223 	struct bpf_prog *prog = ctx->prog;
1224 
1225 	/* We're going to need this information for the "do_extra_pass()". */
1226 	if (ctx->need_extra_pass) {
1227 		ctx->jit_data->bpf_header = ctx->bpf_header;
1228 		ctx->jit_data->bpf2insn = ctx->bpf2insn;
1229 		prog->aux->jit_data = (void *)ctx->jit_data;
1230 	} else {
1231 		/*
1232 		 * If things seem finalised, then mark the JITed memory
1233 		 * as R-X and flush it.
1234 		 */
1235 		if (bpf_jit_binary_lock_ro(ctx->bpf_header)) {
1236 			pr_err("bpf-jit: Could not lock the JIT memory.\n");
1237 			return -EFAULT;
1238 		}
1239 		flush_icache_range((unsigned long)ctx->bpf_header,
1240 				   (unsigned long)
1241 				   BUF(ctx->jit.buf, ctx->jit.len));
1242 		prog->aux->jit_data = NULL;
1243 		bpf_prog_fill_jited_linfo(prog, ctx->bpf2insn);
1244 	}
1245 
1246 	ctx->success = true;
1247 	prog->bpf_func = (void *)ctx->jit.buf;
1248 	prog->jited_len = ctx->jit.len;
1249 	prog->jited = 1;
1250 
1251 	jit_ctx_cleanup(ctx);
1252 	jit_dump(ctx);
1253 
1254 	return 0;
1255 }
1256 
1257 /*
1258  * A lenient verification for the existence of JIT context in "prog".
1259  * Apparently the JIT internals, namely jit_subprogs() in bpf/verifier.c,
1260  * may request for a second compilation although nothing needs to be done.
1261  */
1262 static inline int check_jit_context(const struct bpf_prog *prog)
1263 {
1264 	if (!prog->aux->jit_data) {
1265 		pr_notice("bpf-jit: no jit data for the extra pass.\n");
1266 		return 1;
1267 	} else {
1268 		return 0;
1269 	}
1270 }
1271 
1272 /* Reuse the previous pass's data. */
1273 static int jit_resume_context(struct jit_context *ctx)
1274 {
1275 	struct arc_jit_data *jdata =
1276 		(struct arc_jit_data *)ctx->prog->aux->jit_data;
1277 
1278 	if (!jdata) {
1279 		pr_err("bpf-jit: no jit data for the extra pass.\n");
1280 		return -EINVAL;
1281 	}
1282 
1283 	ctx->jit.buf = (u8 *)ctx->prog->bpf_func;
1284 	ctx->jit.len = ctx->prog->jited_len;
1285 	ctx->bpf_header = jdata->bpf_header;
1286 	ctx->bpf2insn = (u32 *)jdata->bpf2insn;
1287 	ctx->bpf2insn_valid = ctx->bpf2insn ? true : false;
1288 	ctx->jit_data = jdata;
1289 
1290 	return 0;
1291 }
1292 
1293 /*
1294  * Patch in the new addresses. The instructions of interest are:
1295  *
1296  * - call
1297  * - ld r64, imm64
1298  *
1299  * For "call"s, it resolves the addresses one more time through the
1300  * handle_call().
1301  *
1302  * For 64-bit immediate loads, it just retranslates them, because the BPF
1303  * core in kernel might have changed the value since the normal pass.
1304  */
1305 static int jit_patch_relocations(struct jit_context *ctx)
1306 {
1307 	const u8 bpf_opc_call = BPF_JMP | BPF_CALL;
1308 	const u8 bpf_opc_ldi64 = BPF_LD | BPF_DW | BPF_IMM;
1309 	const struct bpf_prog *prog = ctx->prog;
1310 	int ret;
1311 
1312 	ctx->emit = true;
1313 	for (u32 i = 0; i < prog->len; i++) {
1314 		const struct bpf_insn *insn = &prog->insnsi[i];
1315 		u8 dummy;
1316 		/*
1317 		 * Adjust "ctx.jit.index", so "gen_*()" functions below
1318 		 * can use it for their output addresses.
1319 		 */
1320 		ctx->jit.index = ctx->bpf2insn[i];
1321 
1322 		if (insn->code == bpf_opc_call) {
1323 			CHECK_RET(handle_call(ctx, insn, &dummy));
1324 		} else if (insn->code == bpf_opc_ldi64) {
1325 			CHECK_RET(handle_ld_imm64(ctx, insn, &dummy));
1326 			/* Skip the next instruction. */
1327 			++i;
1328 		}
1329 	}
1330 	return 0;
1331 }
1332 
1333 /*
1334  * A normal pass that involves a "dry-run" phase, jit_prepare(),
1335  * to get the necessary data for the real compilation phase,
1336  * jit_compile().
1337  */
1338 static struct bpf_prog *do_normal_pass(struct bpf_prog *prog)
1339 {
1340 	struct jit_context ctx;
1341 
1342 	/* Bail out if JIT is disabled. */
1343 	if (!prog->jit_requested)
1344 		return prog;
1345 
1346 	if (jit_ctx_init(&ctx, prog)) {
1347 		jit_ctx_cleanup(&ctx);
1348 		return prog;
1349 	}
1350 
1351 	/* Get the lengths and allocate buffer. */
1352 	if (jit_prepare(&ctx)) {
1353 		jit_ctx_cleanup(&ctx);
1354 		return prog;
1355 	}
1356 
1357 	if (jit_compile(&ctx)) {
1358 		jit_ctx_cleanup(&ctx);
1359 		return prog;
1360 	}
1361 
1362 	if (jit_finalize(&ctx)) {
1363 		jit_ctx_cleanup(&ctx);
1364 		return prog;
1365 	}
1366 
1367 	return ctx.prog;
1368 }
1369 
1370 /*
1371  * If there are multi-function BPF programs that call each other,
1372  * their translated addresses are not known all at once. Therefore,
1373  * an extra pass is needed to consult the bpf_jit_get_func_addr()
1374  * again to get the newly translated addresses in order to resolve
1375  * the "call"s.
1376  */
1377 static struct bpf_prog *do_extra_pass(struct bpf_prog *prog)
1378 {
1379 	struct jit_context ctx;
1380 
1381 	/* Skip if there's no context to resume from. */
1382 	if (check_jit_context(prog))
1383 		return prog;
1384 
1385 	if (jit_ctx_init(&ctx, prog)) {
1386 		jit_ctx_cleanup(&ctx);
1387 		return prog;
1388 	}
1389 
1390 	if (jit_resume_context(&ctx)) {
1391 		jit_ctx_cleanup(&ctx);
1392 		return prog;
1393 	}
1394 
1395 	if (jit_patch_relocations(&ctx)) {
1396 		jit_ctx_cleanup(&ctx);
1397 		return prog;
1398 	}
1399 
1400 	if (jit_finalize(&ctx)) {
1401 		jit_ctx_cleanup(&ctx);
1402 		return prog;
1403 	}
1404 
1405 	return ctx.prog;
1406 }
1407 
1408 /*
1409  * This function may be invoked twice for the same stream of BPF
1410  * instructions. The "extra pass" happens, when there are "call"s
1411  * involved that their addresses are not known during the first
1412  * invocation.
1413  */
1414 struct bpf_prog *bpf_int_jit_compile(struct bpf_prog *prog)
1415 {
1416 	vm_dump(prog);
1417 
1418 	/* Was this program already translated? */
1419 	if (!prog->jited)
1420 		return do_normal_pass(prog);
1421 	else
1422 		return do_extra_pass(prog);
1423 
1424 	return prog;
1425 }
1426