From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-lb0-x22a.google.com (mail-lb0-x22a.google.com [IPv6:2a00:1450:4010:c04::22a]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority" (not verified)) by ozlabs.org (Postfix) with ESMTPS id 4C11D2C0087 for ; Tue, 3 Sep 2013 03:49:30 +1000 (EST) Received: by mail-lb0-f170.google.com with SMTP id w7so4102366lbi.29 for ; Mon, 02 Sep 2013 10:49:23 -0700 (PDT) Date: Mon, 2 Sep 2013 19:48:46 +0200 From: Vladimir Murzin To: linuxppc-dev@lists.ozlabs.org Subject: Re: [PATCH] ppc: bpf_jit: support MOD operation Message-ID: <20130902174842.GA1866@hp530> References: <1377643792-10327-1-git-send-email-murzin.v@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=koi8-r In-Reply-To: <1377643792-10327-1-git-send-email-murzin.v@gmail.com> Cc: dborkman@redhat.com, paulus@samba.org, davem@davemloft.net List-Id: Linux on PowerPC Developers Mail List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Ping On Wed, Aug 28, 2013 at 02:49:52AM +0400, Vladimir Murzin wrote: > commit b6069a9570 (filter: add MOD operation) added generic > support for modulus operation in BPF. > > This patch brings JIT support for PPC64 > > Signed-off-by: Vladimir Murzin > --- > arch/powerpc/net/bpf_jit_comp.c | 22 ++++++++++++++++++++++ > 1 file changed, 22 insertions(+) > > diff --git a/arch/powerpc/net/bpf_jit_comp.c b/arch/powerpc/net/bpf_jit_comp.c > index bf56e33..96f24dc 100644 > --- a/arch/powerpc/net/bpf_jit_comp.c > +++ b/arch/powerpc/net/bpf_jit_comp.c > @@ -193,6 +193,28 @@ static int bpf_jit_build_body(struct sk_filter *fp, u32 *image, > PPC_MUL(r_A, r_A, r_scratch1); > } > break; > + case BPF_S_ALU_MOD_X: /* A %= X; */ > + ctx->seen |= SEEN_XREG; > + PPC_CMPWI(r_X, 0); > + if (ctx->pc_ret0 != -1) { > + PPC_BCC(COND_EQ, addrs[ctx->pc_ret0]); > + } else { > + PPC_BCC_SHORT(COND_NE, (ctx->idx*4)+12); > + PPC_LI(r_ret, 0); > + PPC_JMP(exit_addr); > + } > + PPC_DIVWU(r_scratch1, r_A, r_X); > + PPC_MUL(r_scratch1, r_X, r_scratch1); > + PPC_SUB(r_A, r_A, r_scratch1); > + break; > + case BPF_S_ALU_MOD_K: /* A %= K; */ > +#define r_scratch2 (r_scratch1 + 1) > + PPC_LI32(r_scratch2, K); > + PPC_DIVWU(r_scratch1, r_A, r_scratch2); > + PPC_MUL(r_scratch1, r_scratch2, r_scratch1); > + PPC_SUB(r_A, r_A, r_scratch1); > +#undef r_scratch2 > + break; > case BPF_S_ALU_DIV_X: /* A /= X; */ > ctx->seen |= SEEN_XREG; > PPC_CMPWI(r_X, 0); > -- > 1.8.1.5 >