1d9ae7f2bSJakub Kicinski /*
29816dd35SJakub Kicinski  * Copyright (C) 2016-2018 Netronome Systems, Inc.
3d9ae7f2bSJakub Kicinski  *
4d9ae7f2bSJakub Kicinski  * This software is dual licensed under the GNU General License Version 2,
5d9ae7f2bSJakub Kicinski  * June 1991 as shown in the file COPYING in the top-level directory of this
6d9ae7f2bSJakub Kicinski  * source tree or the BSD 2-Clause License provided below.  You have the
7d9ae7f2bSJakub Kicinski  * option to license this software under the complete terms of either license.
8d9ae7f2bSJakub Kicinski  *
9d9ae7f2bSJakub Kicinski  * The BSD 2-Clause License:
10d9ae7f2bSJakub Kicinski  *
11d9ae7f2bSJakub Kicinski  *     Redistribution and use in source and binary forms, with or
12d9ae7f2bSJakub Kicinski  *     without modification, are permitted provided that the following
13d9ae7f2bSJakub Kicinski  *     conditions are met:
14d9ae7f2bSJakub Kicinski  *
15d9ae7f2bSJakub Kicinski  *      1. Redistributions of source code must retain the above
16d9ae7f2bSJakub Kicinski  *         copyright notice, this list of conditions and the following
17d9ae7f2bSJakub Kicinski  *         disclaimer.
18d9ae7f2bSJakub Kicinski  *
19d9ae7f2bSJakub Kicinski  *      2. Redistributions in binary form must reproduce the above
20d9ae7f2bSJakub Kicinski  *         copyright notice, this list of conditions and the following
21d9ae7f2bSJakub Kicinski  *         disclaimer in the documentation and/or other materials
22d9ae7f2bSJakub Kicinski  *         provided with the distribution.
23d9ae7f2bSJakub Kicinski  *
24d9ae7f2bSJakub Kicinski  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
25d9ae7f2bSJakub Kicinski  * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
26d9ae7f2bSJakub Kicinski  * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
27d9ae7f2bSJakub Kicinski  * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
28d9ae7f2bSJakub Kicinski  * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
29d9ae7f2bSJakub Kicinski  * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
30d9ae7f2bSJakub Kicinski  * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
31d9ae7f2bSJakub Kicinski  * SOFTWARE.
32d9ae7f2bSJakub Kicinski  */
33d9ae7f2bSJakub Kicinski 
34d9ae7f2bSJakub Kicinski #define pr_fmt(fmt)	"NFP net bpf: " fmt
35d9ae7f2bSJakub Kicinski 
360d49eaf4SJakub Kicinski #include <linux/bug.h>
37d9ae7f2bSJakub Kicinski #include <linux/bpf.h>
38d9ae7f2bSJakub Kicinski #include <linux/filter.h>
392a952b03SJiong Wang #include <linux/kernel.h>
40d9ae7f2bSJakub Kicinski #include <linux/pkt_cls.h>
412a952b03SJiong Wang #include <linux/reciprocal_div.h>
42d9ae7f2bSJakub Kicinski #include <linux/unistd.h>
43d9ae7f2bSJakub Kicinski 
44d9ae7f2bSJakub Kicinski #include "main.h"
45d9ae7f2bSJakub Kicinski #include "../nfp_asm.h"
46d985888fSJakub Kicinski #include "../nfp_net_ctrl.h"
47d9ae7f2bSJakub Kicinski 
48d9ae7f2bSJakub Kicinski /* --- NFP prog --- */
49d9ae7f2bSJakub Kicinski /* Foreach "multiple" entries macros provide pos and next<n> pointers.
50d9ae7f2bSJakub Kicinski  * It's safe to modify the next pointers (but not pos).
51d9ae7f2bSJakub Kicinski  */
52d9ae7f2bSJakub Kicinski #define nfp_for_each_insn_walk2(nfp_prog, pos, next)			\
53d9ae7f2bSJakub Kicinski 	for (pos = list_first_entry(&(nfp_prog)->insns, typeof(*pos), l), \
54d9ae7f2bSJakub Kicinski 	     next = list_next_entry(pos, l);			\
55d9ae7f2bSJakub Kicinski 	     &(nfp_prog)->insns != &pos->l &&			\
56d9ae7f2bSJakub Kicinski 	     &(nfp_prog)->insns != &next->l;			\
57d9ae7f2bSJakub Kicinski 	     pos = nfp_meta_next(pos),				\
58d9ae7f2bSJakub Kicinski 	     next = nfp_meta_next(pos))
59d9ae7f2bSJakub Kicinski 
60d9ae7f2bSJakub Kicinski #define nfp_for_each_insn_walk3(nfp_prog, pos, next, next2)		\
61d9ae7f2bSJakub Kicinski 	for (pos = list_first_entry(&(nfp_prog)->insns, typeof(*pos), l), \
62d9ae7f2bSJakub Kicinski 	     next = list_next_entry(pos, l),			\
63d9ae7f2bSJakub Kicinski 	     next2 = list_next_entry(next, l);			\
64d9ae7f2bSJakub Kicinski 	     &(nfp_prog)->insns != &pos->l &&			\
65d9ae7f2bSJakub Kicinski 	     &(nfp_prog)->insns != &next->l &&			\
66d9ae7f2bSJakub Kicinski 	     &(nfp_prog)->insns != &next2->l;			\
67d9ae7f2bSJakub Kicinski 	     pos = nfp_meta_next(pos),				\
68d9ae7f2bSJakub Kicinski 	     next = nfp_meta_next(pos),				\
69d9ae7f2bSJakub Kicinski 	     next2 = nfp_meta_next(next))
70d9ae7f2bSJakub Kicinski 
71d9ae7f2bSJakub Kicinski static bool
72d9ae7f2bSJakub Kicinski nfp_meta_has_prev(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
73d9ae7f2bSJakub Kicinski {
74d9ae7f2bSJakub Kicinski 	return meta->l.prev != &nfp_prog->insns;
75d9ae7f2bSJakub Kicinski }
76d9ae7f2bSJakub Kicinski 
77d9ae7f2bSJakub Kicinski static void nfp_prog_push(struct nfp_prog *nfp_prog, u64 insn)
78d9ae7f2bSJakub Kicinski {
79e8a4796eSJakub Kicinski 	if (nfp_prog->__prog_alloc_len / sizeof(u64) == nfp_prog->prog_len) {
80e8a4796eSJakub Kicinski 		pr_warn("instruction limit reached (%u NFP instructions)\n",
81e8a4796eSJakub Kicinski 			nfp_prog->prog_len);
82d9ae7f2bSJakub Kicinski 		nfp_prog->error = -ENOSPC;
83d9ae7f2bSJakub Kicinski 		return;
84d9ae7f2bSJakub Kicinski 	}
85d9ae7f2bSJakub Kicinski 
86d9ae7f2bSJakub Kicinski 	nfp_prog->prog[nfp_prog->prog_len] = insn;
87d9ae7f2bSJakub Kicinski 	nfp_prog->prog_len++;
88d9ae7f2bSJakub Kicinski }
89d9ae7f2bSJakub Kicinski 
90d9ae7f2bSJakub Kicinski static unsigned int nfp_prog_current_offset(struct nfp_prog *nfp_prog)
91d9ae7f2bSJakub Kicinski {
922314fe9eSJakub Kicinski 	return nfp_prog->prog_len;
93d9ae7f2bSJakub Kicinski }
94d9ae7f2bSJakub Kicinski 
950d49eaf4SJakub Kicinski static bool
960d49eaf4SJakub Kicinski nfp_prog_confirm_current_offset(struct nfp_prog *nfp_prog, unsigned int off)
970d49eaf4SJakub Kicinski {
980d49eaf4SJakub Kicinski 	/* If there is a recorded error we may have dropped instructions;
990d49eaf4SJakub Kicinski 	 * that doesn't have to be due to translator bug, and the translation
1000d49eaf4SJakub Kicinski 	 * will fail anyway, so just return OK.
1010d49eaf4SJakub Kicinski 	 */
1020d49eaf4SJakub Kicinski 	if (nfp_prog->error)
1030d49eaf4SJakub Kicinski 		return true;
1040d49eaf4SJakub Kicinski 	return !WARN_ON_ONCE(nfp_prog_current_offset(nfp_prog) != off);
1050d49eaf4SJakub Kicinski }
1060d49eaf4SJakub Kicinski 
107d9ae7f2bSJakub Kicinski /* --- Emitters --- */
108d9ae7f2bSJakub Kicinski static void
109d9ae7f2bSJakub Kicinski __emit_cmd(struct nfp_prog *nfp_prog, enum cmd_tgt_map op,
110b556ddd9SJakub Kicinski 	   u8 mode, u8 xfer, u8 areg, u8 breg, u8 size, enum cmd_ctx_swap ctx,
111b556ddd9SJakub Kicinski 	   bool indir)
112d9ae7f2bSJakub Kicinski {
113d9ae7f2bSJakub Kicinski 	u64 insn;
114d9ae7f2bSJakub Kicinski 
115d9ae7f2bSJakub Kicinski 	insn =	FIELD_PREP(OP_CMD_A_SRC, areg) |
116d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_CMD_CTX, ctx) |
117d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_CMD_B_SRC, breg) |
118d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_CMD_TOKEN, cmd_tgt_act[op].token) |
119d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_CMD_XFER, xfer) |
120d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_CMD_CNT, size) |
121b556ddd9SJakub Kicinski 		FIELD_PREP(OP_CMD_SIG, ctx != CMD_CTX_NO_SWAP) |
122d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_CMD_TGT_CMD, cmd_tgt_act[op].tgt_cmd) |
1235468a8b9SJakub Kicinski 		FIELD_PREP(OP_CMD_INDIR, indir) |
124d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_CMD_MODE, mode);
125d9ae7f2bSJakub Kicinski 
126d9ae7f2bSJakub Kicinski 	nfp_prog_push(nfp_prog, insn);
127d9ae7f2bSJakub Kicinski }
128d9ae7f2bSJakub Kicinski 
129d9ae7f2bSJakub Kicinski static void
1305468a8b9SJakub Kicinski emit_cmd_any(struct nfp_prog *nfp_prog, enum cmd_tgt_map op, u8 mode, u8 xfer,
131b556ddd9SJakub Kicinski 	     swreg lreg, swreg rreg, u8 size, enum cmd_ctx_swap ctx, bool indir)
132d9ae7f2bSJakub Kicinski {
133d9ae7f2bSJakub Kicinski 	struct nfp_insn_re_regs reg;
134d9ae7f2bSJakub Kicinski 	int err;
135d9ae7f2bSJakub Kicinski 
136d9ae7f2bSJakub Kicinski 	err = swreg_to_restricted(reg_none(), lreg, rreg, &reg, false);
137d9ae7f2bSJakub Kicinski 	if (err) {
138d9ae7f2bSJakub Kicinski 		nfp_prog->error = err;
139d9ae7f2bSJakub Kicinski 		return;
140d9ae7f2bSJakub Kicinski 	}
141d9ae7f2bSJakub Kicinski 	if (reg.swap) {
142d9ae7f2bSJakub Kicinski 		pr_err("cmd can't swap arguments\n");
143d9ae7f2bSJakub Kicinski 		nfp_prog->error = -EFAULT;
144d9ae7f2bSJakub Kicinski 		return;
145d9ae7f2bSJakub Kicinski 	}
146995e101fSJakub Kicinski 	if (reg.dst_lmextn || reg.src_lmextn) {
147995e101fSJakub Kicinski 		pr_err("cmd can't use LMextn\n");
148995e101fSJakub Kicinski 		nfp_prog->error = -EFAULT;
149995e101fSJakub Kicinski 		return;
150995e101fSJakub Kicinski 	}
151d9ae7f2bSJakub Kicinski 
152b556ddd9SJakub Kicinski 	__emit_cmd(nfp_prog, op, mode, xfer, reg.areg, reg.breg, size, ctx,
1535468a8b9SJakub Kicinski 		   indir);
1545468a8b9SJakub Kicinski }
1555468a8b9SJakub Kicinski 
1565468a8b9SJakub Kicinski static void
1575468a8b9SJakub Kicinski emit_cmd(struct nfp_prog *nfp_prog, enum cmd_tgt_map op, u8 mode, u8 xfer,
158b556ddd9SJakub Kicinski 	 swreg lreg, swreg rreg, u8 size, enum cmd_ctx_swap ctx)
1595468a8b9SJakub Kicinski {
160b556ddd9SJakub Kicinski 	emit_cmd_any(nfp_prog, op, mode, xfer, lreg, rreg, size, ctx, false);
161d9ae7f2bSJakub Kicinski }
162d9ae7f2bSJakub Kicinski 
163d9ae7f2bSJakub Kicinski static void
1649879a381SJiong Wang emit_cmd_indir(struct nfp_prog *nfp_prog, enum cmd_tgt_map op, u8 mode, u8 xfer,
165b556ddd9SJakub Kicinski 	       swreg lreg, swreg rreg, u8 size, enum cmd_ctx_swap ctx)
1669879a381SJiong Wang {
167b556ddd9SJakub Kicinski 	emit_cmd_any(nfp_prog, op, mode, xfer, lreg, rreg, size, ctx, true);
1689879a381SJiong Wang }
1699879a381SJiong Wang 
1709879a381SJiong Wang static void
171d9ae7f2bSJakub Kicinski __emit_br(struct nfp_prog *nfp_prog, enum br_mask mask, enum br_ev_pip ev_pip,
172d9ae7f2bSJakub Kicinski 	  enum br_ctx_signal_state css, u16 addr, u8 defer)
173d9ae7f2bSJakub Kicinski {
174d9ae7f2bSJakub Kicinski 	u16 addr_lo, addr_hi;
175d9ae7f2bSJakub Kicinski 	u64 insn;
176d9ae7f2bSJakub Kicinski 
177d9ae7f2bSJakub Kicinski 	addr_lo = addr & (OP_BR_ADDR_LO >> __bf_shf(OP_BR_ADDR_LO));
178d9ae7f2bSJakub Kicinski 	addr_hi = addr != addr_lo;
179d9ae7f2bSJakub Kicinski 
180d9ae7f2bSJakub Kicinski 	insn = OP_BR_BASE |
181d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_BR_MASK, mask) |
182d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_BR_EV_PIP, ev_pip) |
183d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_BR_CSS, css) |
184d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_BR_DEFBR, defer) |
185d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_BR_ADDR_LO, addr_lo) |
186d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_BR_ADDR_HI, addr_hi);
187d9ae7f2bSJakub Kicinski 
188d9ae7f2bSJakub Kicinski 	nfp_prog_push(nfp_prog, insn);
189d9ae7f2bSJakub Kicinski }
190d9ae7f2bSJakub Kicinski 
1912314fe9eSJakub Kicinski static void
1922314fe9eSJakub Kicinski emit_br_relo(struct nfp_prog *nfp_prog, enum br_mask mask, u16 addr, u8 defer,
1932314fe9eSJakub Kicinski 	     enum nfp_relo_type relo)
194d9ae7f2bSJakub Kicinski {
1952314fe9eSJakub Kicinski 	if (mask == BR_UNC && defer > 2) {
196d9ae7f2bSJakub Kicinski 		pr_err("BUG: branch defer out of bounds %d\n", defer);
197d9ae7f2bSJakub Kicinski 		nfp_prog->error = -EFAULT;
198d9ae7f2bSJakub Kicinski 		return;
199d9ae7f2bSJakub Kicinski 	}
2002314fe9eSJakub Kicinski 
2012314fe9eSJakub Kicinski 	__emit_br(nfp_prog, mask,
2022314fe9eSJakub Kicinski 		  mask != BR_UNC ? BR_EV_PIP_COND : BR_EV_PIP_UNCOND,
2032314fe9eSJakub Kicinski 		  BR_CSS_NONE, addr, defer);
2042314fe9eSJakub Kicinski 
2052314fe9eSJakub Kicinski 	nfp_prog->prog[nfp_prog->prog_len - 1] |=
2062314fe9eSJakub Kicinski 		FIELD_PREP(OP_RELO_TYPE, relo);
207d9ae7f2bSJakub Kicinski }
208d9ae7f2bSJakub Kicinski 
209d9ae7f2bSJakub Kicinski static void
210d9ae7f2bSJakub Kicinski emit_br(struct nfp_prog *nfp_prog, enum br_mask mask, u16 addr, u8 defer)
211d9ae7f2bSJakub Kicinski {
2122314fe9eSJakub Kicinski 	emit_br_relo(nfp_prog, mask, addr, defer, RELO_BR_REL);
213d9ae7f2bSJakub Kicinski }
214d9ae7f2bSJakub Kicinski 
215d9ae7f2bSJakub Kicinski static void
216991f5b36SJiong Wang __emit_br_bit(struct nfp_prog *nfp_prog, u16 areg, u16 breg, u16 addr, u8 defer,
217991f5b36SJiong Wang 	      bool set, bool src_lmextn)
218991f5b36SJiong Wang {
219991f5b36SJiong Wang 	u16 addr_lo, addr_hi;
220991f5b36SJiong Wang 	u64 insn;
221991f5b36SJiong Wang 
222991f5b36SJiong Wang 	addr_lo = addr & (OP_BR_BIT_ADDR_LO >> __bf_shf(OP_BR_BIT_ADDR_LO));
223991f5b36SJiong Wang 	addr_hi = addr != addr_lo;
224991f5b36SJiong Wang 
225991f5b36SJiong Wang 	insn = OP_BR_BIT_BASE |
226991f5b36SJiong Wang 		FIELD_PREP(OP_BR_BIT_A_SRC, areg) |
227991f5b36SJiong Wang 		FIELD_PREP(OP_BR_BIT_B_SRC, breg) |
228991f5b36SJiong Wang 		FIELD_PREP(OP_BR_BIT_BV, set) |
229991f5b36SJiong Wang 		FIELD_PREP(OP_BR_BIT_DEFBR, defer) |
230991f5b36SJiong Wang 		FIELD_PREP(OP_BR_BIT_ADDR_LO, addr_lo) |
231991f5b36SJiong Wang 		FIELD_PREP(OP_BR_BIT_ADDR_HI, addr_hi) |
232991f5b36SJiong Wang 		FIELD_PREP(OP_BR_BIT_SRC_LMEXTN, src_lmextn);
233991f5b36SJiong Wang 
234991f5b36SJiong Wang 	nfp_prog_push(nfp_prog, insn);
235991f5b36SJiong Wang }
236991f5b36SJiong Wang 
237991f5b36SJiong Wang static void
238991f5b36SJiong Wang emit_br_bit_relo(struct nfp_prog *nfp_prog, swreg src, u8 bit, u16 addr,
239991f5b36SJiong Wang 		 u8 defer, bool set, enum nfp_relo_type relo)
240991f5b36SJiong Wang {
241991f5b36SJiong Wang 	struct nfp_insn_re_regs reg;
242991f5b36SJiong Wang 	int err;
243991f5b36SJiong Wang 
244991f5b36SJiong Wang 	/* NOTE: The bit to test is specified as an rotation amount, such that
245991f5b36SJiong Wang 	 *	 the bit to test will be placed on the MSB of the result when
246991f5b36SJiong Wang 	 *	 doing a rotate right. For bit X, we need right rotate X + 1.
247991f5b36SJiong Wang 	 */
248991f5b36SJiong Wang 	bit += 1;
249991f5b36SJiong Wang 
250991f5b36SJiong Wang 	err = swreg_to_restricted(reg_none(), src, reg_imm(bit), &reg, false);
251991f5b36SJiong Wang 	if (err) {
252991f5b36SJiong Wang 		nfp_prog->error = err;
253991f5b36SJiong Wang 		return;
254991f5b36SJiong Wang 	}
255991f5b36SJiong Wang 
256991f5b36SJiong Wang 	__emit_br_bit(nfp_prog, reg.areg, reg.breg, addr, defer, set,
257991f5b36SJiong Wang 		      reg.src_lmextn);
258991f5b36SJiong Wang 
259991f5b36SJiong Wang 	nfp_prog->prog[nfp_prog->prog_len - 1] |=
260991f5b36SJiong Wang 		FIELD_PREP(OP_RELO_TYPE, relo);
261991f5b36SJiong Wang }
262991f5b36SJiong Wang 
263991f5b36SJiong Wang static void
264991f5b36SJiong Wang emit_br_bset(struct nfp_prog *nfp_prog, swreg src, u8 bit, u16 addr, u8 defer)
265991f5b36SJiong Wang {
266991f5b36SJiong Wang 	emit_br_bit_relo(nfp_prog, src, bit, addr, defer, true, RELO_BR_REL);
267991f5b36SJiong Wang }
268991f5b36SJiong Wang 
269991f5b36SJiong Wang static void
270389f263bSQuentin Monnet __emit_br_alu(struct nfp_prog *nfp_prog, u16 areg, u16 breg, u16 imm_hi,
271389f263bSQuentin Monnet 	      u8 defer, bool dst_lmextn, bool src_lmextn)
272389f263bSQuentin Monnet {
273389f263bSQuentin Monnet 	u64 insn;
274389f263bSQuentin Monnet 
275389f263bSQuentin Monnet 	insn = OP_BR_ALU_BASE |
276389f263bSQuentin Monnet 		FIELD_PREP(OP_BR_ALU_A_SRC, areg) |
277389f263bSQuentin Monnet 		FIELD_PREP(OP_BR_ALU_B_SRC, breg) |
278389f263bSQuentin Monnet 		FIELD_PREP(OP_BR_ALU_DEFBR, defer) |
279389f263bSQuentin Monnet 		FIELD_PREP(OP_BR_ALU_IMM_HI, imm_hi) |
280389f263bSQuentin Monnet 		FIELD_PREP(OP_BR_ALU_SRC_LMEXTN, src_lmextn) |
281389f263bSQuentin Monnet 		FIELD_PREP(OP_BR_ALU_DST_LMEXTN, dst_lmextn);
282389f263bSQuentin Monnet 
283389f263bSQuentin Monnet 	nfp_prog_push(nfp_prog, insn);
284389f263bSQuentin Monnet }
285389f263bSQuentin Monnet 
286389f263bSQuentin Monnet static void emit_rtn(struct nfp_prog *nfp_prog, swreg base, u8 defer)
287389f263bSQuentin Monnet {
288389f263bSQuentin Monnet 	struct nfp_insn_ur_regs reg;
289389f263bSQuentin Monnet 	int err;
290389f263bSQuentin Monnet 
291389f263bSQuentin Monnet 	err = swreg_to_unrestricted(reg_none(), base, reg_imm(0), &reg);
292389f263bSQuentin Monnet 	if (err) {
293389f263bSQuentin Monnet 		nfp_prog->error = err;
294389f263bSQuentin Monnet 		return;
295389f263bSQuentin Monnet 	}
296389f263bSQuentin Monnet 
297389f263bSQuentin Monnet 	__emit_br_alu(nfp_prog, reg.areg, reg.breg, 0, defer, reg.dst_lmextn,
298389f263bSQuentin Monnet 		      reg.src_lmextn);
299389f263bSQuentin Monnet }
300389f263bSQuentin Monnet 
301389f263bSQuentin Monnet static void
302d9ae7f2bSJakub Kicinski __emit_immed(struct nfp_prog *nfp_prog, u16 areg, u16 breg, u16 imm_hi,
303d9ae7f2bSJakub Kicinski 	     enum immed_width width, bool invert,
304995e101fSJakub Kicinski 	     enum immed_shift shift, bool wr_both,
305995e101fSJakub Kicinski 	     bool dst_lmextn, bool src_lmextn)
306d9ae7f2bSJakub Kicinski {
307d9ae7f2bSJakub Kicinski 	u64 insn;
308d9ae7f2bSJakub Kicinski 
309d9ae7f2bSJakub Kicinski 	insn = OP_IMMED_BASE |
310d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_IMMED_A_SRC, areg) |
311d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_IMMED_B_SRC, breg) |
312d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_IMMED_IMM, imm_hi) |
313d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_IMMED_WIDTH, width) |
314d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_IMMED_INV, invert) |
315d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_IMMED_SHIFT, shift) |
316995e101fSJakub Kicinski 		FIELD_PREP(OP_IMMED_WR_AB, wr_both) |
317995e101fSJakub Kicinski 		FIELD_PREP(OP_IMMED_SRC_LMEXTN, src_lmextn) |
318995e101fSJakub Kicinski 		FIELD_PREP(OP_IMMED_DST_LMEXTN, dst_lmextn);
319d9ae7f2bSJakub Kicinski 
320d9ae7f2bSJakub Kicinski 	nfp_prog_push(nfp_prog, insn);
321d9ae7f2bSJakub Kicinski }
322d9ae7f2bSJakub Kicinski 
323d9ae7f2bSJakub Kicinski static void
324b3f868dfSJakub Kicinski emit_immed(struct nfp_prog *nfp_prog, swreg dst, u16 imm,
325d9ae7f2bSJakub Kicinski 	   enum immed_width width, bool invert, enum immed_shift shift)
326d9ae7f2bSJakub Kicinski {
327d9ae7f2bSJakub Kicinski 	struct nfp_insn_ur_regs reg;
328d9ae7f2bSJakub Kicinski 	int err;
329d9ae7f2bSJakub Kicinski 
330b3f868dfSJakub Kicinski 	if (swreg_type(dst) == NN_REG_IMM) {
331d9ae7f2bSJakub Kicinski 		nfp_prog->error = -EFAULT;
332d9ae7f2bSJakub Kicinski 		return;
333d9ae7f2bSJakub Kicinski 	}
334d9ae7f2bSJakub Kicinski 
335d9ae7f2bSJakub Kicinski 	err = swreg_to_unrestricted(dst, dst, reg_imm(imm & 0xff), &reg);
336d9ae7f2bSJakub Kicinski 	if (err) {
337d9ae7f2bSJakub Kicinski 		nfp_prog->error = err;
338d9ae7f2bSJakub Kicinski 		return;
339d9ae7f2bSJakub Kicinski 	}
340d9ae7f2bSJakub Kicinski 
3413239e7bbSJiong Wang 	/* Use reg.dst when destination is No-Dest. */
3423239e7bbSJiong Wang 	__emit_immed(nfp_prog,
3433239e7bbSJiong Wang 		     swreg_type(dst) == NN_REG_NONE ? reg.dst : reg.areg,
3443239e7bbSJiong Wang 		     reg.breg, imm >> 8, width, invert, shift,
3453239e7bbSJiong Wang 		     reg.wr_both, reg.dst_lmextn, reg.src_lmextn);
346d9ae7f2bSJakub Kicinski }
347d9ae7f2bSJakub Kicinski 
348d9ae7f2bSJakub Kicinski static void
349d9ae7f2bSJakub Kicinski __emit_shf(struct nfp_prog *nfp_prog, u16 dst, enum alu_dst_ab dst_ab,
350d9ae7f2bSJakub Kicinski 	   enum shf_sc sc, u8 shift,
351995e101fSJakub Kicinski 	   u16 areg, enum shf_op op, u16 breg, bool i8, bool sw, bool wr_both,
352995e101fSJakub Kicinski 	   bool dst_lmextn, bool src_lmextn)
353d9ae7f2bSJakub Kicinski {
354d9ae7f2bSJakub Kicinski 	u64 insn;
355d9ae7f2bSJakub Kicinski 
356d9ae7f2bSJakub Kicinski 	if (!FIELD_FIT(OP_SHF_SHIFT, shift)) {
357d9ae7f2bSJakub Kicinski 		nfp_prog->error = -EFAULT;
358d9ae7f2bSJakub Kicinski 		return;
359d9ae7f2bSJakub Kicinski 	}
360d9ae7f2bSJakub Kicinski 
361d9ae7f2bSJakub Kicinski 	if (sc == SHF_SC_L_SHF)
362d9ae7f2bSJakub Kicinski 		shift = 32 - shift;
363d9ae7f2bSJakub Kicinski 
364d9ae7f2bSJakub Kicinski 	insn = OP_SHF_BASE |
365d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_A_SRC, areg) |
366d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_SC, sc) |
367d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_B_SRC, breg) |
368d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_I8, i8) |
369d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_SW, sw) |
370d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_DST, dst) |
371d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_SHIFT, shift) |
372d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_OP, op) |
373d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_DST_AB, dst_ab) |
374995e101fSJakub Kicinski 		FIELD_PREP(OP_SHF_WR_AB, wr_both) |
375995e101fSJakub Kicinski 		FIELD_PREP(OP_SHF_SRC_LMEXTN, src_lmextn) |
376995e101fSJakub Kicinski 		FIELD_PREP(OP_SHF_DST_LMEXTN, dst_lmextn);
377d9ae7f2bSJakub Kicinski 
378d9ae7f2bSJakub Kicinski 	nfp_prog_push(nfp_prog, insn);
379d9ae7f2bSJakub Kicinski }
380d9ae7f2bSJakub Kicinski 
381d9ae7f2bSJakub Kicinski static void
382b3f868dfSJakub Kicinski emit_shf(struct nfp_prog *nfp_prog, swreg dst,
383b3f868dfSJakub Kicinski 	 swreg lreg, enum shf_op op, swreg rreg, enum shf_sc sc, u8 shift)
384d9ae7f2bSJakub Kicinski {
385d9ae7f2bSJakub Kicinski 	struct nfp_insn_re_regs reg;
386d9ae7f2bSJakub Kicinski 	int err;
387d9ae7f2bSJakub Kicinski 
388d9ae7f2bSJakub Kicinski 	err = swreg_to_restricted(dst, lreg, rreg, &reg, true);
389d9ae7f2bSJakub Kicinski 	if (err) {
390d9ae7f2bSJakub Kicinski 		nfp_prog->error = err;
391d9ae7f2bSJakub Kicinski 		return;
392d9ae7f2bSJakub Kicinski 	}
393d9ae7f2bSJakub Kicinski 
394d9ae7f2bSJakub Kicinski 	__emit_shf(nfp_prog, reg.dst, reg.dst_ab, sc, shift,
395995e101fSJakub Kicinski 		   reg.areg, op, reg.breg, reg.i8, reg.swap, reg.wr_both,
396995e101fSJakub Kicinski 		   reg.dst_lmextn, reg.src_lmextn);
397d9ae7f2bSJakub Kicinski }
398d9ae7f2bSJakub Kicinski 
399d9ae7f2bSJakub Kicinski static void
400991f5b36SJiong Wang emit_shf_indir(struct nfp_prog *nfp_prog, swreg dst,
401991f5b36SJiong Wang 	       swreg lreg, enum shf_op op, swreg rreg, enum shf_sc sc)
402991f5b36SJiong Wang {
403991f5b36SJiong Wang 	if (sc == SHF_SC_R_ROT) {
404991f5b36SJiong Wang 		pr_err("indirect shift is not allowed on rotation\n");
405991f5b36SJiong Wang 		nfp_prog->error = -EFAULT;
406991f5b36SJiong Wang 		return;
407991f5b36SJiong Wang 	}
408991f5b36SJiong Wang 
409991f5b36SJiong Wang 	emit_shf(nfp_prog, dst, lreg, op, rreg, sc, 0);
410991f5b36SJiong Wang }
411991f5b36SJiong Wang 
412991f5b36SJiong Wang static void
413d9ae7f2bSJakub Kicinski __emit_alu(struct nfp_prog *nfp_prog, u16 dst, enum alu_dst_ab dst_ab,
414995e101fSJakub Kicinski 	   u16 areg, enum alu_op op, u16 breg, bool swap, bool wr_both,
415995e101fSJakub Kicinski 	   bool dst_lmextn, bool src_lmextn)
416d9ae7f2bSJakub Kicinski {
417d9ae7f2bSJakub Kicinski 	u64 insn;
418d9ae7f2bSJakub Kicinski 
419d9ae7f2bSJakub Kicinski 	insn = OP_ALU_BASE |
420d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_ALU_A_SRC, areg) |
421d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_ALU_B_SRC, breg) |
422d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_ALU_DST, dst) |
423d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_ALU_SW, swap) |
424d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_ALU_OP, op) |
425d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_ALU_DST_AB, dst_ab) |
426995e101fSJakub Kicinski 		FIELD_PREP(OP_ALU_WR_AB, wr_both) |
427995e101fSJakub Kicinski 		FIELD_PREP(OP_ALU_SRC_LMEXTN, src_lmextn) |
428995e101fSJakub Kicinski 		FIELD_PREP(OP_ALU_DST_LMEXTN, dst_lmextn);
429d9ae7f2bSJakub Kicinski 
430d9ae7f2bSJakub Kicinski 	nfp_prog_push(nfp_prog, insn);
431d9ae7f2bSJakub Kicinski }
432d9ae7f2bSJakub Kicinski 
433d9ae7f2bSJakub Kicinski static void
434b3f868dfSJakub Kicinski emit_alu(struct nfp_prog *nfp_prog, swreg dst,
435b3f868dfSJakub Kicinski 	 swreg lreg, enum alu_op op, swreg rreg)
436d9ae7f2bSJakub Kicinski {
437d9ae7f2bSJakub Kicinski 	struct nfp_insn_ur_regs reg;
438d9ae7f2bSJakub Kicinski 	int err;
439d9ae7f2bSJakub Kicinski 
440d9ae7f2bSJakub Kicinski 	err = swreg_to_unrestricted(dst, lreg, rreg, &reg);
441d9ae7f2bSJakub Kicinski 	if (err) {
442d9ae7f2bSJakub Kicinski 		nfp_prog->error = err;
443d9ae7f2bSJakub Kicinski 		return;
444d9ae7f2bSJakub Kicinski 	}
445d9ae7f2bSJakub Kicinski 
446d9ae7f2bSJakub Kicinski 	__emit_alu(nfp_prog, reg.dst, reg.dst_ab,
447995e101fSJakub Kicinski 		   reg.areg, op, reg.breg, reg.swap, reg.wr_both,
448995e101fSJakub Kicinski 		   reg.dst_lmextn, reg.src_lmextn);
449d9ae7f2bSJakub Kicinski }
450d9ae7f2bSJakub Kicinski 
451d9ae7f2bSJakub Kicinski static void
452d3d23fdbSJiong Wang __emit_mul(struct nfp_prog *nfp_prog, enum alu_dst_ab dst_ab, u16 areg,
453d3d23fdbSJiong Wang 	   enum mul_type type, enum mul_step step, u16 breg, bool swap,
454d3d23fdbSJiong Wang 	   bool wr_both, bool dst_lmextn, bool src_lmextn)
455d3d23fdbSJiong Wang {
456d3d23fdbSJiong Wang 	u64 insn;
457d3d23fdbSJiong Wang 
458d3d23fdbSJiong Wang 	insn = OP_MUL_BASE |
459d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_A_SRC, areg) |
460d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_B_SRC, breg) |
461d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_STEP, step) |
462d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_DST_AB, dst_ab) |
463d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_SW, swap) |
464d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_TYPE, type) |
465d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_WR_AB, wr_both) |
466d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_SRC_LMEXTN, src_lmextn) |
467d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_DST_LMEXTN, dst_lmextn);
468d3d23fdbSJiong Wang 
469d3d23fdbSJiong Wang 	nfp_prog_push(nfp_prog, insn);
470d3d23fdbSJiong Wang }
471d3d23fdbSJiong Wang 
472d3d23fdbSJiong Wang static void
473d3d23fdbSJiong Wang emit_mul(struct nfp_prog *nfp_prog, swreg lreg, enum mul_type type,
474d3d23fdbSJiong Wang 	 enum mul_step step, swreg rreg)
475d3d23fdbSJiong Wang {
476d3d23fdbSJiong Wang 	struct nfp_insn_ur_regs reg;
477d3d23fdbSJiong Wang 	u16 areg;
478d3d23fdbSJiong Wang 	int err;
479d3d23fdbSJiong Wang 
480d3d23fdbSJiong Wang 	if (type == MUL_TYPE_START && step != MUL_STEP_NONE) {
481d3d23fdbSJiong Wang 		nfp_prog->error = -EINVAL;
482d3d23fdbSJiong Wang 		return;
483d3d23fdbSJiong Wang 	}
484d3d23fdbSJiong Wang 
485d3d23fdbSJiong Wang 	if (step == MUL_LAST || step == MUL_LAST_2) {
486d3d23fdbSJiong Wang 		/* When type is step and step Number is LAST or LAST2, left
487d3d23fdbSJiong Wang 		 * source is used as destination.
488d3d23fdbSJiong Wang 		 */
489d3d23fdbSJiong Wang 		err = swreg_to_unrestricted(lreg, reg_none(), rreg, &reg);
490d3d23fdbSJiong Wang 		areg = reg.dst;
491d3d23fdbSJiong Wang 	} else {
492d3d23fdbSJiong Wang 		err = swreg_to_unrestricted(reg_none(), lreg, rreg, &reg);
493d3d23fdbSJiong Wang 		areg = reg.areg;
494d3d23fdbSJiong Wang 	}
495d3d23fdbSJiong Wang 
496d3d23fdbSJiong Wang 	if (err) {
497d3d23fdbSJiong Wang 		nfp_prog->error = err;
498d3d23fdbSJiong Wang 		return;
499d3d23fdbSJiong Wang 	}
500d3d23fdbSJiong Wang 
501d3d23fdbSJiong Wang 	__emit_mul(nfp_prog, reg.dst_ab, areg, type, step, reg.breg, reg.swap,
502d3d23fdbSJiong Wang 		   reg.wr_both, reg.dst_lmextn, reg.src_lmextn);
503d3d23fdbSJiong Wang }
504d3d23fdbSJiong Wang 
505d3d23fdbSJiong Wang static void
506d9ae7f2bSJakub Kicinski __emit_ld_field(struct nfp_prog *nfp_prog, enum shf_sc sc,
507d9ae7f2bSJakub Kicinski 		u8 areg, u8 bmask, u8 breg, u8 shift, bool imm8,
508995e101fSJakub Kicinski 		bool zero, bool swap, bool wr_both,
509995e101fSJakub Kicinski 		bool dst_lmextn, bool src_lmextn)
510d9ae7f2bSJakub Kicinski {
511d9ae7f2bSJakub Kicinski 	u64 insn;
512d9ae7f2bSJakub Kicinski 
513d9ae7f2bSJakub Kicinski 	insn = OP_LDF_BASE |
514d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_A_SRC, areg) |
515d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_SC, sc) |
516d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_B_SRC, breg) |
517d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_I8, imm8) |
518d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_SW, swap) |
519d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_ZF, zero) |
520d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_BMASK, bmask) |
521d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_SHF, shift) |
522995e101fSJakub Kicinski 		FIELD_PREP(OP_LDF_WR_AB, wr_both) |
523995e101fSJakub Kicinski 		FIELD_PREP(OP_LDF_SRC_LMEXTN, src_lmextn) |
524995e101fSJakub Kicinski 		FIELD_PREP(OP_LDF_DST_LMEXTN, dst_lmextn);
525d9ae7f2bSJakub Kicinski 
526d9ae7f2bSJakub Kicinski 	nfp_prog_push(nfp_prog, insn);
527d9ae7f2bSJakub Kicinski }
528d9ae7f2bSJakub Kicinski 
529d9ae7f2bSJakub Kicinski static void
530bc8c80a8SJakub Kicinski emit_ld_field_any(struct nfp_prog *nfp_prog, swreg dst, u8 bmask, swreg src,
531bc8c80a8SJakub Kicinski 		  enum shf_sc sc, u8 shift, bool zero)
532d9ae7f2bSJakub Kicinski {
533d9ae7f2bSJakub Kicinski 	struct nfp_insn_re_regs reg;
534d9ae7f2bSJakub Kicinski 	int err;
535d9ae7f2bSJakub Kicinski 
5362de1be1dSJakub Kicinski 	/* Note: ld_field is special as it uses one of the src regs as dst */
5372de1be1dSJakub Kicinski 	err = swreg_to_restricted(dst, dst, src, &reg, true);
538d9ae7f2bSJakub Kicinski 	if (err) {
539d9ae7f2bSJakub Kicinski 		nfp_prog->error = err;
540d9ae7f2bSJakub Kicinski 		return;
541d9ae7f2bSJakub Kicinski 	}
542d9ae7f2bSJakub Kicinski 
543d9ae7f2bSJakub Kicinski 	__emit_ld_field(nfp_prog, sc, reg.areg, bmask, reg.breg, shift,
544995e101fSJakub Kicinski 			reg.i8, zero, reg.swap, reg.wr_both,
545995e101fSJakub Kicinski 			reg.dst_lmextn, reg.src_lmextn);
546d9ae7f2bSJakub Kicinski }
547d9ae7f2bSJakub Kicinski 
548d9ae7f2bSJakub Kicinski static void
549b3f868dfSJakub Kicinski emit_ld_field(struct nfp_prog *nfp_prog, swreg dst, u8 bmask, swreg src,
550d9ae7f2bSJakub Kicinski 	      enum shf_sc sc, u8 shift)
551d9ae7f2bSJakub Kicinski {
552bc8c80a8SJakub Kicinski 	emit_ld_field_any(nfp_prog, dst, bmask, src, sc, shift, false);
553d9ae7f2bSJakub Kicinski }
554d9ae7f2bSJakub Kicinski 
5552df03a50SJakub Kicinski static void
5562df03a50SJakub Kicinski __emit_lcsr(struct nfp_prog *nfp_prog, u16 areg, u16 breg, bool wr, u16 addr,
5572df03a50SJakub Kicinski 	    bool dst_lmextn, bool src_lmextn)
5582df03a50SJakub Kicinski {
5592df03a50SJakub Kicinski 	u64 insn;
5602df03a50SJakub Kicinski 
5612df03a50SJakub Kicinski 	insn = OP_LCSR_BASE |
5622df03a50SJakub Kicinski 		FIELD_PREP(OP_LCSR_A_SRC, areg) |
5632df03a50SJakub Kicinski 		FIELD_PREP(OP_LCSR_B_SRC, breg) |
5642df03a50SJakub Kicinski 		FIELD_PREP(OP_LCSR_WRITE, wr) |
565df4a37d8SJakub Kicinski 		FIELD_PREP(OP_LCSR_ADDR, addr / 4) |
5662df03a50SJakub Kicinski 		FIELD_PREP(OP_LCSR_SRC_LMEXTN, src_lmextn) |
5672df03a50SJakub Kicinski 		FIELD_PREP(OP_LCSR_DST_LMEXTN, dst_lmextn);
5682df03a50SJakub Kicinski 
5692df03a50SJakub Kicinski 	nfp_prog_push(nfp_prog, insn);
5702df03a50SJakub Kicinski }
5712df03a50SJakub Kicinski 
5722df03a50SJakub Kicinski static void emit_csr_wr(struct nfp_prog *nfp_prog, swreg src, u16 addr)
5732df03a50SJakub Kicinski {
5742df03a50SJakub Kicinski 	struct nfp_insn_ur_regs reg;
5752df03a50SJakub Kicinski 	int err;
5762df03a50SJakub Kicinski 
5772df03a50SJakub Kicinski 	/* This instruction takes immeds instead of reg_none() for the ignored
5782df03a50SJakub Kicinski 	 * operand, but we can't encode 2 immeds in one instr with our normal
5792df03a50SJakub Kicinski 	 * swreg infra so if param is an immed, we encode as reg_none() and
5802df03a50SJakub Kicinski 	 * copy the immed to both operands.
5812df03a50SJakub Kicinski 	 */
5822df03a50SJakub Kicinski 	if (swreg_type(src) == NN_REG_IMM) {
5832df03a50SJakub Kicinski 		err = swreg_to_unrestricted(reg_none(), src, reg_none(), &reg);
5842df03a50SJakub Kicinski 		reg.breg = reg.areg;
5852df03a50SJakub Kicinski 	} else {
5862df03a50SJakub Kicinski 		err = swreg_to_unrestricted(reg_none(), src, reg_imm(0), &reg);
5872df03a50SJakub Kicinski 	}
5882df03a50SJakub Kicinski 	if (err) {
5892df03a50SJakub Kicinski 		nfp_prog->error = err;
5902df03a50SJakub Kicinski 		return;
5912df03a50SJakub Kicinski 	}
5922df03a50SJakub Kicinski 
593df4a37d8SJakub Kicinski 	__emit_lcsr(nfp_prog, reg.areg, reg.breg, true, addr,
5942df03a50SJakub Kicinski 		    false, reg.src_lmextn);
5952df03a50SJakub Kicinski }
5962df03a50SJakub Kicinski 
597df4a37d8SJakub Kicinski /* CSR value is read in following immed[gpr, 0] */
598df4a37d8SJakub Kicinski static void __emit_csr_rd(struct nfp_prog *nfp_prog, u16 addr)
599df4a37d8SJakub Kicinski {
600df4a37d8SJakub Kicinski 	__emit_lcsr(nfp_prog, 0, 0, false, addr, false, false);
601df4a37d8SJakub Kicinski }
602df4a37d8SJakub Kicinski 
6031c03e03fSJakub Kicinski static void emit_nop(struct nfp_prog *nfp_prog)
6041c03e03fSJakub Kicinski {
6051c03e03fSJakub Kicinski 	__emit_immed(nfp_prog, UR_REG_IMM, UR_REG_IMM, 0, 0, 0, 0, 0, 0, 0);
6061c03e03fSJakub Kicinski }
6071c03e03fSJakub Kicinski 
608d9ae7f2bSJakub Kicinski /* --- Wrappers --- */
609d9ae7f2bSJakub Kicinski static bool pack_immed(u32 imm, u16 *val, enum immed_shift *shift)
610d9ae7f2bSJakub Kicinski {
611d9ae7f2bSJakub Kicinski 	if (!(imm & 0xffff0000)) {
612d9ae7f2bSJakub Kicinski 		*val = imm;
613d9ae7f2bSJakub Kicinski 		*shift = IMMED_SHIFT_0B;
614d9ae7f2bSJakub Kicinski 	} else if (!(imm & 0xff0000ff)) {
615d9ae7f2bSJakub Kicinski 		*val = imm >> 8;
616d9ae7f2bSJakub Kicinski 		*shift = IMMED_SHIFT_1B;
617d9ae7f2bSJakub Kicinski 	} else if (!(imm & 0x0000ffff)) {
618d9ae7f2bSJakub Kicinski 		*val = imm >> 16;
619d9ae7f2bSJakub Kicinski 		*shift = IMMED_SHIFT_2B;
620d9ae7f2bSJakub Kicinski 	} else {
621d9ae7f2bSJakub Kicinski 		return false;
622d9ae7f2bSJakub Kicinski 	}
623d9ae7f2bSJakub Kicinski 
624d9ae7f2bSJakub Kicinski 	return true;
625d9ae7f2bSJakub Kicinski }
626d9ae7f2bSJakub Kicinski 
627b3f868dfSJakub Kicinski static void wrp_immed(struct nfp_prog *nfp_prog, swreg dst, u32 imm)
628d9ae7f2bSJakub Kicinski {
629d9ae7f2bSJakub Kicinski 	enum immed_shift shift;
630d9ae7f2bSJakub Kicinski 	u16 val;
631d9ae7f2bSJakub Kicinski 
632d9ae7f2bSJakub Kicinski 	if (pack_immed(imm, &val, &shift)) {
633d9ae7f2bSJakub Kicinski 		emit_immed(nfp_prog, dst, val, IMMED_WIDTH_ALL, false, shift);
634d9ae7f2bSJakub Kicinski 	} else if (pack_immed(~imm, &val, &shift)) {
635d9ae7f2bSJakub Kicinski 		emit_immed(nfp_prog, dst, val, IMMED_WIDTH_ALL, true, shift);
636d9ae7f2bSJakub Kicinski 	} else {
637d9ae7f2bSJakub Kicinski 		emit_immed(nfp_prog, dst, imm & 0xffff, IMMED_WIDTH_ALL,
638d9ae7f2bSJakub Kicinski 			   false, IMMED_SHIFT_0B);
639d9ae7f2bSJakub Kicinski 		emit_immed(nfp_prog, dst, imm >> 16, IMMED_WIDTH_WORD,
640d9ae7f2bSJakub Kicinski 			   false, IMMED_SHIFT_2B);
641d9ae7f2bSJakub Kicinski 	}
642d9ae7f2bSJakub Kicinski }
643d9ae7f2bSJakub Kicinski 
64477a3d311SJakub Kicinski static void
64577a3d311SJakub Kicinski wrp_immed_relo(struct nfp_prog *nfp_prog, swreg dst, u32 imm,
64677a3d311SJakub Kicinski 	       enum nfp_relo_type relo)
64777a3d311SJakub Kicinski {
64877a3d311SJakub Kicinski 	if (imm > 0xffff) {
64977a3d311SJakub Kicinski 		pr_err("relocation of a large immediate!\n");
65077a3d311SJakub Kicinski 		nfp_prog->error = -EFAULT;
65177a3d311SJakub Kicinski 		return;
65277a3d311SJakub Kicinski 	}
65377a3d311SJakub Kicinski 	emit_immed(nfp_prog, dst, imm, IMMED_WIDTH_ALL, false, IMMED_SHIFT_0B);
65477a3d311SJakub Kicinski 
65577a3d311SJakub Kicinski 	nfp_prog->prog[nfp_prog->prog_len - 1] |=
65677a3d311SJakub Kicinski 		FIELD_PREP(OP_RELO_TYPE, relo);
65777a3d311SJakub Kicinski }
65877a3d311SJakub Kicinski 
659d9ae7f2bSJakub Kicinski /* ur_load_imm_any() - encode immediate or use tmp register (unrestricted)
660d9ae7f2bSJakub Kicinski  * If the @imm is small enough encode it directly in operand and return
661d9ae7f2bSJakub Kicinski  * otherwise load @imm to a spare register and return its encoding.
662d9ae7f2bSJakub Kicinski  */
663b3f868dfSJakub Kicinski static swreg ur_load_imm_any(struct nfp_prog *nfp_prog, u32 imm, swreg tmp_reg)
664d9ae7f2bSJakub Kicinski {
665d9ae7f2bSJakub Kicinski 	if (FIELD_FIT(UR_REG_IMM_MAX, imm))
666d9ae7f2bSJakub Kicinski 		return reg_imm(imm);
667d9ae7f2bSJakub Kicinski 
668d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, tmp_reg, imm);
669d9ae7f2bSJakub Kicinski 	return tmp_reg;
670d9ae7f2bSJakub Kicinski }
671d9ae7f2bSJakub Kicinski 
672d9ae7f2bSJakub Kicinski /* re_load_imm_any() - encode immediate or use tmp register (restricted)
673d9ae7f2bSJakub Kicinski  * If the @imm is small enough encode it directly in operand and return
674d9ae7f2bSJakub Kicinski  * otherwise load @imm to a spare register and return its encoding.
675d9ae7f2bSJakub Kicinski  */
676b3f868dfSJakub Kicinski static swreg re_load_imm_any(struct nfp_prog *nfp_prog, u32 imm, swreg tmp_reg)
677d9ae7f2bSJakub Kicinski {
678d9ae7f2bSJakub Kicinski 	if (FIELD_FIT(RE_REG_IMM_MAX, imm))
679d9ae7f2bSJakub Kicinski 		return reg_imm(imm);
680d9ae7f2bSJakub Kicinski 
681d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, tmp_reg, imm);
682d9ae7f2bSJakub Kicinski 	return tmp_reg;
683d9ae7f2bSJakub Kicinski }
684d9ae7f2bSJakub Kicinski 
685ff42bb9fSJakub Kicinski static void wrp_nops(struct nfp_prog *nfp_prog, unsigned int count)
686ff42bb9fSJakub Kicinski {
687ff42bb9fSJakub Kicinski 	while (count--)
688ff42bb9fSJakub Kicinski 		emit_nop(nfp_prog);
689ff42bb9fSJakub Kicinski }
690ff42bb9fSJakub Kicinski 
691c000dfb5SJakub Kicinski static void wrp_mov(struct nfp_prog *nfp_prog, swreg dst, swreg src)
692c000dfb5SJakub Kicinski {
693c000dfb5SJakub Kicinski 	emit_alu(nfp_prog, dst, reg_none(), ALU_OP_NONE, src);
694c000dfb5SJakub Kicinski }
695c000dfb5SJakub Kicinski 
696d9ae7f2bSJakub Kicinski static void wrp_reg_mov(struct nfp_prog *nfp_prog, u16 dst, u16 src)
697d9ae7f2bSJakub Kicinski {
698c000dfb5SJakub Kicinski 	wrp_mov(nfp_prog, reg_both(dst), reg_b(src));
699d9ae7f2bSJakub Kicinski }
700d9ae7f2bSJakub Kicinski 
7019879a381SJiong Wang /* wrp_reg_subpart() - load @field_len bytes from @offset of @src, write the
7029879a381SJiong Wang  * result to @dst from low end.
7039879a381SJiong Wang  */
7049879a381SJiong Wang static void
7059879a381SJiong Wang wrp_reg_subpart(struct nfp_prog *nfp_prog, swreg dst, swreg src, u8 field_len,
7069879a381SJiong Wang 		u8 offset)
7079879a381SJiong Wang {
7089879a381SJiong Wang 	enum shf_sc sc = offset ? SHF_SC_R_SHF : SHF_SC_NONE;
7099879a381SJiong Wang 	u8 mask = (1 << field_len) - 1;
7109879a381SJiong Wang 
7119879a381SJiong Wang 	emit_ld_field_any(nfp_prog, dst, mask, src, sc, offset * 8, true);
7129879a381SJiong Wang }
7139879a381SJiong Wang 
71491ff69e8SJiong Wang /* wrp_reg_or_subpart() - load @field_len bytes from low end of @src, or the
71591ff69e8SJiong Wang  * result to @dst from offset, there is no change on the other bits of @dst.
71691ff69e8SJiong Wang  */
71791ff69e8SJiong Wang static void
71891ff69e8SJiong Wang wrp_reg_or_subpart(struct nfp_prog *nfp_prog, swreg dst, swreg src,
71991ff69e8SJiong Wang 		   u8 field_len, u8 offset)
72091ff69e8SJiong Wang {
72191ff69e8SJiong Wang 	enum shf_sc sc = offset ? SHF_SC_L_SHF : SHF_SC_NONE;
72291ff69e8SJiong Wang 	u8 mask = ((1 << field_len) - 1) << offset;
72391ff69e8SJiong Wang 
72491ff69e8SJiong Wang 	emit_ld_field(nfp_prog, dst, mask, src, sc, 32 - offset * 8);
72591ff69e8SJiong Wang }
72691ff69e8SJiong Wang 
7273dd43c33SJakub Kicinski static void
7283dd43c33SJakub Kicinski addr40_offset(struct nfp_prog *nfp_prog, u8 src_gpr, swreg offset,
7293dd43c33SJakub Kicinski 	      swreg *rega, swreg *regb)
7303dd43c33SJakub Kicinski {
7313dd43c33SJakub Kicinski 	if (offset == reg_imm(0)) {
7323dd43c33SJakub Kicinski 		*rega = reg_a(src_gpr);
7333dd43c33SJakub Kicinski 		*regb = reg_b(src_gpr + 1);
7343dd43c33SJakub Kicinski 		return;
7353dd43c33SJakub Kicinski 	}
7363dd43c33SJakub Kicinski 
7373dd43c33SJakub Kicinski 	emit_alu(nfp_prog, imm_a(nfp_prog), reg_a(src_gpr), ALU_OP_ADD, offset);
7383dd43c33SJakub Kicinski 	emit_alu(nfp_prog, imm_b(nfp_prog), reg_b(src_gpr + 1), ALU_OP_ADD_C,
7393dd43c33SJakub Kicinski 		 reg_imm(0));
7403dd43c33SJakub Kicinski 	*rega = imm_a(nfp_prog);
7413dd43c33SJakub Kicinski 	*regb = imm_b(nfp_prog);
7423dd43c33SJakub Kicinski }
7433dd43c33SJakub Kicinski 
7449879a381SJiong Wang /* NFP has Command Push Pull bus which supports bluk memory operations. */
7459879a381SJiong Wang static int nfp_cpp_memcpy(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
7469879a381SJiong Wang {
7479879a381SJiong Wang 	bool descending_seq = meta->ldst_gather_len < 0;
7489879a381SJiong Wang 	s16 len = abs(meta->ldst_gather_len);
7499879a381SJiong Wang 	swreg src_base, off;
7503dd43c33SJakub Kicinski 	bool src_40bit_addr;
7519879a381SJiong Wang 	unsigned int i;
7529879a381SJiong Wang 	u8 xfer_num;
7539879a381SJiong Wang 
7549879a381SJiong Wang 	off = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
7553dd43c33SJakub Kicinski 	src_40bit_addr = meta->ptr.type == PTR_TO_MAP_VALUE;
7569879a381SJiong Wang 	src_base = reg_a(meta->insn.src_reg * 2);
7579879a381SJiong Wang 	xfer_num = round_up(len, 4) / 4;
7589879a381SJiong Wang 
7593dd43c33SJakub Kicinski 	if (src_40bit_addr)
760cc0dff6dSJiong Wang 		addr40_offset(nfp_prog, meta->insn.src_reg * 2, off, &src_base,
7613dd43c33SJakub Kicinski 			      &off);
7623dd43c33SJakub Kicinski 
7638c900538SJiong Wang 	/* Setup PREV_ALU fields to override memory read length. */
7648c900538SJiong Wang 	if (len > 32)
7658c900538SJiong Wang 		wrp_immed(nfp_prog, reg_none(),
7668c900538SJiong Wang 			  CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, xfer_num - 1));
7678c900538SJiong Wang 
7689879a381SJiong Wang 	/* Memory read from source addr into transfer-in registers. */
7693dd43c33SJakub Kicinski 	emit_cmd_any(nfp_prog, CMD_TGT_READ32_SWAP,
7703dd43c33SJakub Kicinski 		     src_40bit_addr ? CMD_MODE_40b_BA : CMD_MODE_32b, 0,
771b556ddd9SJakub Kicinski 		     src_base, off, xfer_num - 1, CMD_CTX_SWAP, len > 32);
7729879a381SJiong Wang 
7739879a381SJiong Wang 	/* Move from transfer-in to transfer-out. */
7749879a381SJiong Wang 	for (i = 0; i < xfer_num; i++)
7759879a381SJiong Wang 		wrp_mov(nfp_prog, reg_xfer(i), reg_xfer(i));
7769879a381SJiong Wang 
7779879a381SJiong Wang 	off = re_load_imm_any(nfp_prog, meta->paired_st->off, imm_b(nfp_prog));
7789879a381SJiong Wang 
7799879a381SJiong Wang 	if (len <= 8) {
7809879a381SJiong Wang 		/* Use single direct_ref write8. */
7819879a381SJiong Wang 		emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0,
7829879a381SJiong Wang 			 reg_a(meta->paired_st->dst_reg * 2), off, len - 1,
783b556ddd9SJakub Kicinski 			 CMD_CTX_SWAP);
7848c900538SJiong Wang 	} else if (len <= 32 && IS_ALIGNED(len, 4)) {
7859879a381SJiong Wang 		/* Use single direct_ref write32. */
7869879a381SJiong Wang 		emit_cmd(nfp_prog, CMD_TGT_WRITE32_SWAP, CMD_MODE_32b, 0,
7879879a381SJiong Wang 			 reg_a(meta->paired_st->dst_reg * 2), off, xfer_num - 1,
788b556ddd9SJakub Kicinski 			 CMD_CTX_SWAP);
7898c900538SJiong Wang 	} else if (len <= 32) {
7909879a381SJiong Wang 		/* Use single indirect_ref write8. */
7919879a381SJiong Wang 		wrp_immed(nfp_prog, reg_none(),
7929879a381SJiong Wang 			  CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, len - 1));
7939879a381SJiong Wang 		emit_cmd_indir(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0,
7949879a381SJiong Wang 			       reg_a(meta->paired_st->dst_reg * 2), off,
795b556ddd9SJakub Kicinski 			       len - 1, CMD_CTX_SWAP);
7968c900538SJiong Wang 	} else if (IS_ALIGNED(len, 4)) {
7978c900538SJiong Wang 		/* Use single indirect_ref write32. */
7988c900538SJiong Wang 		wrp_immed(nfp_prog, reg_none(),
7998c900538SJiong Wang 			  CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, xfer_num - 1));
8008c900538SJiong Wang 		emit_cmd_indir(nfp_prog, CMD_TGT_WRITE32_SWAP, CMD_MODE_32b, 0,
8018c900538SJiong Wang 			       reg_a(meta->paired_st->dst_reg * 2), off,
802b556ddd9SJakub Kicinski 			       xfer_num - 1, CMD_CTX_SWAP);
8038c900538SJiong Wang 	} else if (len <= 40) {
8048c900538SJiong Wang 		/* Use one direct_ref write32 to write the first 32-bytes, then
8058c900538SJiong Wang 		 * another direct_ref write8 to write the remaining bytes.
8068c900538SJiong Wang 		 */
8078c900538SJiong Wang 		emit_cmd(nfp_prog, CMD_TGT_WRITE32_SWAP, CMD_MODE_32b, 0,
8088c900538SJiong Wang 			 reg_a(meta->paired_st->dst_reg * 2), off, 7,
809b556ddd9SJakub Kicinski 			 CMD_CTX_SWAP);
8108c900538SJiong Wang 
8118c900538SJiong Wang 		off = re_load_imm_any(nfp_prog, meta->paired_st->off + 32,
8128c900538SJiong Wang 				      imm_b(nfp_prog));
8138c900538SJiong Wang 		emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 8,
8148c900538SJiong Wang 			 reg_a(meta->paired_st->dst_reg * 2), off, len - 33,
815b556ddd9SJakub Kicinski 			 CMD_CTX_SWAP);
8168c900538SJiong Wang 	} else {
8178c900538SJiong Wang 		/* Use one indirect_ref write32 to write 4-bytes aligned length,
8188c900538SJiong Wang 		 * then another direct_ref write8 to write the remaining bytes.
8198c900538SJiong Wang 		 */
8208c900538SJiong Wang 		u8 new_off;
8218c900538SJiong Wang 
8228c900538SJiong Wang 		wrp_immed(nfp_prog, reg_none(),
8238c900538SJiong Wang 			  CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, xfer_num - 2));
8248c900538SJiong Wang 		emit_cmd_indir(nfp_prog, CMD_TGT_WRITE32_SWAP, CMD_MODE_32b, 0,
8258c900538SJiong Wang 			       reg_a(meta->paired_st->dst_reg * 2), off,
826b556ddd9SJakub Kicinski 			       xfer_num - 2, CMD_CTX_SWAP);
8278c900538SJiong Wang 		new_off = meta->paired_st->off + (xfer_num - 1) * 4;
8288c900538SJiong Wang 		off = re_load_imm_any(nfp_prog, new_off, imm_b(nfp_prog));
8298c900538SJiong Wang 		emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b,
8308c900538SJiong Wang 			 xfer_num - 1, reg_a(meta->paired_st->dst_reg * 2), off,
831b556ddd9SJakub Kicinski 			 (len & 0x3) - 1, CMD_CTX_SWAP);
8329879a381SJiong Wang 	}
8339879a381SJiong Wang 
8349879a381SJiong Wang 	/* TODO: The following extra load is to make sure data flow be identical
8359879a381SJiong Wang 	 *  before and after we do memory copy optimization.
8369879a381SJiong Wang 	 *
8379879a381SJiong Wang 	 *  The load destination register is not guaranteed to be dead, so we
8389879a381SJiong Wang 	 *  need to make sure it is loaded with the value the same as before
8399879a381SJiong Wang 	 *  this transformation.
8409879a381SJiong Wang 	 *
8419879a381SJiong Wang 	 *  These extra loads could be removed once we have accurate register
8429879a381SJiong Wang 	 *  usage information.
8439879a381SJiong Wang 	 */
8449879a381SJiong Wang 	if (descending_seq)
8459879a381SJiong Wang 		xfer_num = 0;
8469879a381SJiong Wang 	else if (BPF_SIZE(meta->insn.code) != BPF_DW)
8479879a381SJiong Wang 		xfer_num = xfer_num - 1;
8489879a381SJiong Wang 	else
8499879a381SJiong Wang 		xfer_num = xfer_num - 2;
8509879a381SJiong Wang 
8519879a381SJiong Wang 	switch (BPF_SIZE(meta->insn.code)) {
8529879a381SJiong Wang 	case BPF_B:
8539879a381SJiong Wang 		wrp_reg_subpart(nfp_prog, reg_both(meta->insn.dst_reg * 2),
8549879a381SJiong Wang 				reg_xfer(xfer_num), 1,
8559879a381SJiong Wang 				IS_ALIGNED(len, 4) ? 3 : (len & 3) - 1);
8569879a381SJiong Wang 		break;
8579879a381SJiong Wang 	case BPF_H:
8589879a381SJiong Wang 		wrp_reg_subpart(nfp_prog, reg_both(meta->insn.dst_reg * 2),
8599879a381SJiong Wang 				reg_xfer(xfer_num), 2, (len & 3) ^ 2);
8609879a381SJiong Wang 		break;
8619879a381SJiong Wang 	case BPF_W:
8629879a381SJiong Wang 		wrp_mov(nfp_prog, reg_both(meta->insn.dst_reg * 2),
8639879a381SJiong Wang 			reg_xfer(0));
8649879a381SJiong Wang 		break;
8659879a381SJiong Wang 	case BPF_DW:
8669879a381SJiong Wang 		wrp_mov(nfp_prog, reg_both(meta->insn.dst_reg * 2),
8679879a381SJiong Wang 			reg_xfer(xfer_num));
8689879a381SJiong Wang 		wrp_mov(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1),
8699879a381SJiong Wang 			reg_xfer(xfer_num + 1));
8709879a381SJiong Wang 		break;
8719879a381SJiong Wang 	}
8729879a381SJiong Wang 
8739879a381SJiong Wang 	if (BPF_SIZE(meta->insn.code) != BPF_DW)
8749879a381SJiong Wang 		wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
8759879a381SJiong Wang 
8769879a381SJiong Wang 	return 0;
8779879a381SJiong Wang }
8789879a381SJiong Wang 
879d9ae7f2bSJakub Kicinski static int
8800a793977SJakub Kicinski data_ld(struct nfp_prog *nfp_prog, swreg offset, u8 dst_gpr, int size)
881d9ae7f2bSJakub Kicinski {
882d9ae7f2bSJakub Kicinski 	unsigned int i;
883d9ae7f2bSJakub Kicinski 	u16 shift, sz;
884d9ae7f2bSJakub Kicinski 
885d9ae7f2bSJakub Kicinski 	/* We load the value from the address indicated in @offset and then
886d9ae7f2bSJakub Kicinski 	 * shift out the data we don't need.  Note: this is big endian!
887d9ae7f2bSJakub Kicinski 	 */
8880a793977SJakub Kicinski 	sz = max(size, 4);
889d9ae7f2bSJakub Kicinski 	shift = size < 4 ? 4 - size : 0;
890d9ae7f2bSJakub Kicinski 
8910a793977SJakub Kicinski 	emit_cmd(nfp_prog, CMD_TGT_READ8, CMD_MODE_32b, 0,
892b556ddd9SJakub Kicinski 		 pptr_reg(nfp_prog), offset, sz - 1, CMD_CTX_SWAP);
8930a793977SJakub Kicinski 
8940a793977SJakub Kicinski 	i = 0;
8950a793977SJakub Kicinski 	if (shift)
8960a793977SJakub Kicinski 		emit_shf(nfp_prog, reg_both(dst_gpr), reg_none(), SHF_OP_NONE,
8970a793977SJakub Kicinski 			 reg_xfer(0), SHF_SC_R_SHF, shift * 8);
8980a793977SJakub Kicinski 	else
8990a793977SJakub Kicinski 		for (; i * 4 < size; i++)
9000a793977SJakub Kicinski 			wrp_mov(nfp_prog, reg_both(dst_gpr + i), reg_xfer(i));
9010a793977SJakub Kicinski 
9020a793977SJakub Kicinski 	if (i < 2)
9030a793977SJakub Kicinski 		wrp_immed(nfp_prog, reg_both(dst_gpr + 1), 0);
9040a793977SJakub Kicinski 
9050a793977SJakub Kicinski 	return 0;
9060a793977SJakub Kicinski }
9070a793977SJakub Kicinski 
9080a793977SJakub Kicinski static int
9093dd43c33SJakub Kicinski data_ld_host_order(struct nfp_prog *nfp_prog, u8 dst_gpr,
9103dd43c33SJakub Kicinski 		   swreg lreg, swreg rreg, int size, enum cmd_mode mode)
9112ca71441SJakub Kicinski {
9122ca71441SJakub Kicinski 	unsigned int i;
9132ca71441SJakub Kicinski 	u8 mask, sz;
9142ca71441SJakub Kicinski 
9153dd43c33SJakub Kicinski 	/* We load the value from the address indicated in rreg + lreg and then
9162ca71441SJakub Kicinski 	 * mask out the data we don't need.  Note: this is little endian!
9172ca71441SJakub Kicinski 	 */
9182ca71441SJakub Kicinski 	sz = max(size, 4);
9192ca71441SJakub Kicinski 	mask = size < 4 ? GENMASK(size - 1, 0) : 0;
9202ca71441SJakub Kicinski 
9213dd43c33SJakub Kicinski 	emit_cmd(nfp_prog, CMD_TGT_READ32_SWAP, mode, 0,
922b556ddd9SJakub Kicinski 		 lreg, rreg, sz / 4 - 1, CMD_CTX_SWAP);
9232ca71441SJakub Kicinski 
9242ca71441SJakub Kicinski 	i = 0;
9252ca71441SJakub Kicinski 	if (mask)
9262ca71441SJakub Kicinski 		emit_ld_field_any(nfp_prog, reg_both(dst_gpr), mask,
9272ca71441SJakub Kicinski 				  reg_xfer(0), SHF_SC_NONE, 0, true);
9282ca71441SJakub Kicinski 	else
9292ca71441SJakub Kicinski 		for (; i * 4 < size; i++)
9302ca71441SJakub Kicinski 			wrp_mov(nfp_prog, reg_both(dst_gpr + i), reg_xfer(i));
9312ca71441SJakub Kicinski 
9322ca71441SJakub Kicinski 	if (i < 2)
9332ca71441SJakub Kicinski 		wrp_immed(nfp_prog, reg_both(dst_gpr + 1), 0);
9342ca71441SJakub Kicinski 
9352ca71441SJakub Kicinski 	return 0;
9362ca71441SJakub Kicinski }
9372ca71441SJakub Kicinski 
9382ca71441SJakub Kicinski static int
9393dd43c33SJakub Kicinski data_ld_host_order_addr32(struct nfp_prog *nfp_prog, u8 src_gpr, swreg offset,
9403dd43c33SJakub Kicinski 			  u8 dst_gpr, u8 size)
9413dd43c33SJakub Kicinski {
9423dd43c33SJakub Kicinski 	return data_ld_host_order(nfp_prog, dst_gpr, reg_a(src_gpr), offset,
9433dd43c33SJakub Kicinski 				  size, CMD_MODE_32b);
9443dd43c33SJakub Kicinski }
9453dd43c33SJakub Kicinski 
9463dd43c33SJakub Kicinski static int
9473dd43c33SJakub Kicinski data_ld_host_order_addr40(struct nfp_prog *nfp_prog, u8 src_gpr, swreg offset,
9483dd43c33SJakub Kicinski 			  u8 dst_gpr, u8 size)
9493dd43c33SJakub Kicinski {
9503dd43c33SJakub Kicinski 	swreg rega, regb;
9513dd43c33SJakub Kicinski 
9523dd43c33SJakub Kicinski 	addr40_offset(nfp_prog, src_gpr, offset, &rega, &regb);
9533dd43c33SJakub Kicinski 
9543dd43c33SJakub Kicinski 	return data_ld_host_order(nfp_prog, dst_gpr, rega, regb,
9553dd43c33SJakub Kicinski 				  size, CMD_MODE_40b_BA);
9563dd43c33SJakub Kicinski }
9573dd43c33SJakub Kicinski 
9583dd43c33SJakub Kicinski static int
9590a793977SJakub Kicinski construct_data_ind_ld(struct nfp_prog *nfp_prog, u16 offset, u16 src, u8 size)
9600a793977SJakub Kicinski {
9610a793977SJakub Kicinski 	swreg tmp_reg;
9620a793977SJakub Kicinski 
963d9ae7f2bSJakub Kicinski 	/* Calculate the true offset (src_reg + imm) */
964d9ae7f2bSJakub Kicinski 	tmp_reg = ur_load_imm_any(nfp_prog, offset, imm_b(nfp_prog));
9650a793977SJakub Kicinski 	emit_alu(nfp_prog, imm_both(nfp_prog), reg_a(src), ALU_OP_ADD, tmp_reg);
9660a793977SJakub Kicinski 
967d9ae7f2bSJakub Kicinski 	/* Check packet length (size guaranteed to fit b/c it's u8) */
968d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, imm_a(nfp_prog),
969d9ae7f2bSJakub Kicinski 		 imm_a(nfp_prog), ALU_OP_ADD, reg_imm(size));
970d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
97118e53b6cSJakub Kicinski 		 plen_reg(nfp_prog), ALU_OP_SUB, imm_a(nfp_prog));
972e84797feSJakub Kicinski 	emit_br_relo(nfp_prog, BR_BLO, BR_OFF_RELO, 0, RELO_BR_GO_ABORT);
9730a793977SJakub Kicinski 
974d9ae7f2bSJakub Kicinski 	/* Load data */
9750a793977SJakub Kicinski 	return data_ld(nfp_prog, imm_b(nfp_prog), 0, size);
976d9ae7f2bSJakub Kicinski }
977d9ae7f2bSJakub Kicinski 
978d9ae7f2bSJakub Kicinski static int construct_data_ld(struct nfp_prog *nfp_prog, u16 offset, u8 size)
979d9ae7f2bSJakub Kicinski {
9800a793977SJakub Kicinski 	swreg tmp_reg;
9810a793977SJakub Kicinski 
9820a793977SJakub Kicinski 	/* Check packet length */
9830a793977SJakub Kicinski 	tmp_reg = ur_load_imm_any(nfp_prog, offset + size, imm_a(nfp_prog));
9840a793977SJakub Kicinski 	emit_alu(nfp_prog, reg_none(), plen_reg(nfp_prog), ALU_OP_SUB, tmp_reg);
985e84797feSJakub Kicinski 	emit_br_relo(nfp_prog, BR_BLO, BR_OFF_RELO, 0, RELO_BR_GO_ABORT);
9860a793977SJakub Kicinski 
9870a793977SJakub Kicinski 	/* Load data */
9880a793977SJakub Kicinski 	tmp_reg = re_load_imm_any(nfp_prog, offset, imm_b(nfp_prog));
9890a793977SJakub Kicinski 	return data_ld(nfp_prog, tmp_reg, 0, size);
990d9ae7f2bSJakub Kicinski }
991d9ae7f2bSJakub Kicinski 
992e663fe38SJakub Kicinski static int
993e663fe38SJakub Kicinski data_stx_host_order(struct nfp_prog *nfp_prog, u8 dst_gpr, swreg offset,
994e663fe38SJakub Kicinski 		    u8 src_gpr, u8 size)
995e663fe38SJakub Kicinski {
996e663fe38SJakub Kicinski 	unsigned int i;
997e663fe38SJakub Kicinski 
998e663fe38SJakub Kicinski 	for (i = 0; i * 4 < size; i++)
999e663fe38SJakub Kicinski 		wrp_mov(nfp_prog, reg_xfer(i), reg_a(src_gpr + i));
1000e663fe38SJakub Kicinski 
1001e663fe38SJakub Kicinski 	emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0,
1002b556ddd9SJakub Kicinski 		 reg_a(dst_gpr), offset, size - 1, CMD_CTX_SWAP);
1003e663fe38SJakub Kicinski 
1004e663fe38SJakub Kicinski 	return 0;
1005e663fe38SJakub Kicinski }
1006e663fe38SJakub Kicinski 
1007e663fe38SJakub Kicinski static int
1008e663fe38SJakub Kicinski data_st_host_order(struct nfp_prog *nfp_prog, u8 dst_gpr, swreg offset,
1009e663fe38SJakub Kicinski 		   u64 imm, u8 size)
1010e663fe38SJakub Kicinski {
1011e663fe38SJakub Kicinski 	wrp_immed(nfp_prog, reg_xfer(0), imm);
1012e663fe38SJakub Kicinski 	if (size == 8)
1013e663fe38SJakub Kicinski 		wrp_immed(nfp_prog, reg_xfer(1), imm >> 32);
1014e663fe38SJakub Kicinski 
1015e663fe38SJakub Kicinski 	emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0,
1016b556ddd9SJakub Kicinski 		 reg_a(dst_gpr), offset, size - 1, CMD_CTX_SWAP);
1017e663fe38SJakub Kicinski 
1018e663fe38SJakub Kicinski 	return 0;
1019e663fe38SJakub Kicinski }
1020e663fe38SJakub Kicinski 
1021ee9133a8SJakub Kicinski typedef int
1022ee9133a8SJakub Kicinski (*lmem_step)(struct nfp_prog *nfp_prog, u8 gpr, u8 gpr_byte, s32 off,
10232df03a50SJakub Kicinski 	     unsigned int size, bool first, bool new_gpr, bool last, bool lm3,
10242df03a50SJakub Kicinski 	     bool needs_inc);
1025a82b23fbSJakub Kicinski 
1026a82b23fbSJakub Kicinski static int
1027a82b23fbSJakub Kicinski wrp_lmem_load(struct nfp_prog *nfp_prog, u8 dst, u8 dst_byte, s32 off,
10282df03a50SJakub Kicinski 	      unsigned int size, bool first, bool new_gpr, bool last, bool lm3,
10292df03a50SJakub Kicinski 	      bool needs_inc)
1030a82b23fbSJakub Kicinski {
10312df03a50SJakub Kicinski 	bool should_inc = needs_inc && new_gpr && !last;
1032a82b23fbSJakub Kicinski 	u32 idx, src_byte;
1033a82b23fbSJakub Kicinski 	enum shf_sc sc;
1034a82b23fbSJakub Kicinski 	swreg reg;
1035a82b23fbSJakub Kicinski 	int shf;
1036a82b23fbSJakub Kicinski 	u8 mask;
1037a82b23fbSJakub Kicinski 
1038a82b23fbSJakub Kicinski 	if (WARN_ON_ONCE(dst_byte + size > 4 || off % 4 + size > 4))
1039a82b23fbSJakub Kicinski 		return -EOPNOTSUPP;
1040a82b23fbSJakub Kicinski 
1041a82b23fbSJakub Kicinski 	idx = off / 4;
1042a82b23fbSJakub Kicinski 
1043a82b23fbSJakub Kicinski 	/* Move the entire word */
1044a82b23fbSJakub Kicinski 	if (size == 4) {
10452df03a50SJakub Kicinski 		wrp_mov(nfp_prog, reg_both(dst),
10462df03a50SJakub Kicinski 			should_inc ? reg_lm_inc(3) : reg_lm(lm3 ? 3 : 0, idx));
1047a82b23fbSJakub Kicinski 		return 0;
1048a82b23fbSJakub Kicinski 	}
1049a82b23fbSJakub Kicinski 
10502df03a50SJakub Kicinski 	if (WARN_ON_ONCE(lm3 && idx > RE_REG_LM_IDX_MAX))
10512df03a50SJakub Kicinski 		return -EOPNOTSUPP;
10522df03a50SJakub Kicinski 
1053a82b23fbSJakub Kicinski 	src_byte = off % 4;
1054a82b23fbSJakub Kicinski 
1055a82b23fbSJakub Kicinski 	mask = (1 << size) - 1;
1056a82b23fbSJakub Kicinski 	mask <<= dst_byte;
1057a82b23fbSJakub Kicinski 
1058a82b23fbSJakub Kicinski 	if (WARN_ON_ONCE(mask > 0xf))
1059a82b23fbSJakub Kicinski 		return -EOPNOTSUPP;
1060a82b23fbSJakub Kicinski 
1061a82b23fbSJakub Kicinski 	shf = abs(src_byte - dst_byte) * 8;
1062a82b23fbSJakub Kicinski 	if (src_byte == dst_byte) {
1063a82b23fbSJakub Kicinski 		sc = SHF_SC_NONE;
1064a82b23fbSJakub Kicinski 	} else if (src_byte < dst_byte) {
1065a82b23fbSJakub Kicinski 		shf = 32 - shf;
1066a82b23fbSJakub Kicinski 		sc = SHF_SC_L_SHF;
1067a82b23fbSJakub Kicinski 	} else {
1068a82b23fbSJakub Kicinski 		sc = SHF_SC_R_SHF;
1069a82b23fbSJakub Kicinski 	}
1070a82b23fbSJakub Kicinski 
1071a82b23fbSJakub Kicinski 	/* ld_field can address fewer indexes, if offset too large do RMW.
1072a82b23fbSJakub Kicinski 	 * Because we RMV twice we waste 2 cycles on unaligned 8 byte writes.
1073a82b23fbSJakub Kicinski 	 */
1074a82b23fbSJakub Kicinski 	if (idx <= RE_REG_LM_IDX_MAX) {
10752df03a50SJakub Kicinski 		reg = reg_lm(lm3 ? 3 : 0, idx);
1076a82b23fbSJakub Kicinski 	} else {
1077a82b23fbSJakub Kicinski 		reg = imm_a(nfp_prog);
10789a90c83cSJakub Kicinski 		/* If it's not the first part of the load and we start a new GPR
10799a90c83cSJakub Kicinski 		 * that means we are loading a second part of the LMEM word into
10809a90c83cSJakub Kicinski 		 * a new GPR.  IOW we've already looked that LMEM word and
10819a90c83cSJakub Kicinski 		 * therefore it has been loaded into imm_a().
10829a90c83cSJakub Kicinski 		 */
10839a90c83cSJakub Kicinski 		if (first || !new_gpr)
1084a82b23fbSJakub Kicinski 			wrp_mov(nfp_prog, reg, reg_lm(0, idx));
1085a82b23fbSJakub Kicinski 	}
1086a82b23fbSJakub Kicinski 
1087a82b23fbSJakub Kicinski 	emit_ld_field_any(nfp_prog, reg_both(dst), mask, reg, sc, shf, new_gpr);
1088a82b23fbSJakub Kicinski 
10892df03a50SJakub Kicinski 	if (should_inc)
10902df03a50SJakub Kicinski 		wrp_mov(nfp_prog, reg_none(), reg_lm_inc(3));
10912df03a50SJakub Kicinski 
1092a82b23fbSJakub Kicinski 	return 0;
1093a82b23fbSJakub Kicinski }
1094ee9133a8SJakub Kicinski 
1095ee9133a8SJakub Kicinski static int
1096ee9133a8SJakub Kicinski wrp_lmem_store(struct nfp_prog *nfp_prog, u8 src, u8 src_byte, s32 off,
10972df03a50SJakub Kicinski 	       unsigned int size, bool first, bool new_gpr, bool last, bool lm3,
10982df03a50SJakub Kicinski 	       bool needs_inc)
1099ee9133a8SJakub Kicinski {
11002df03a50SJakub Kicinski 	bool should_inc = needs_inc && new_gpr && !last;
1101ee9133a8SJakub Kicinski 	u32 idx, dst_byte;
1102ee9133a8SJakub Kicinski 	enum shf_sc sc;
1103ee9133a8SJakub Kicinski 	swreg reg;
1104ee9133a8SJakub Kicinski 	int shf;
1105ee9133a8SJakub Kicinski 	u8 mask;
1106ee9133a8SJakub Kicinski 
1107ee9133a8SJakub Kicinski 	if (WARN_ON_ONCE(src_byte + size > 4 || off % 4 + size > 4))
1108ee9133a8SJakub Kicinski 		return -EOPNOTSUPP;
1109ee9133a8SJakub Kicinski 
1110ee9133a8SJakub Kicinski 	idx = off / 4;
1111ee9133a8SJakub Kicinski 
1112ee9133a8SJakub Kicinski 	/* Move the entire word */
1113ee9133a8SJakub Kicinski 	if (size == 4) {
11142df03a50SJakub Kicinski 		wrp_mov(nfp_prog,
11152df03a50SJakub Kicinski 			should_inc ? reg_lm_inc(3) : reg_lm(lm3 ? 3 : 0, idx),
11162df03a50SJakub Kicinski 			reg_b(src));
1117ee9133a8SJakub Kicinski 		return 0;
1118ee9133a8SJakub Kicinski 	}
1119ee9133a8SJakub Kicinski 
11202df03a50SJakub Kicinski 	if (WARN_ON_ONCE(lm3 && idx > RE_REG_LM_IDX_MAX))
11212df03a50SJakub Kicinski 		return -EOPNOTSUPP;
11222df03a50SJakub Kicinski 
1123ee9133a8SJakub Kicinski 	dst_byte = off % 4;
1124ee9133a8SJakub Kicinski 
1125ee9133a8SJakub Kicinski 	mask = (1 << size) - 1;
1126ee9133a8SJakub Kicinski 	mask <<= dst_byte;
1127ee9133a8SJakub Kicinski 
1128ee9133a8SJakub Kicinski 	if (WARN_ON_ONCE(mask > 0xf))
1129ee9133a8SJakub Kicinski 		return -EOPNOTSUPP;
1130ee9133a8SJakub Kicinski 
1131ee9133a8SJakub Kicinski 	shf = abs(src_byte - dst_byte) * 8;
1132ee9133a8SJakub Kicinski 	if (src_byte == dst_byte) {
1133ee9133a8SJakub Kicinski 		sc = SHF_SC_NONE;
1134ee9133a8SJakub Kicinski 	} else if (src_byte < dst_byte) {
1135ee9133a8SJakub Kicinski 		shf = 32 - shf;
1136ee9133a8SJakub Kicinski 		sc = SHF_SC_L_SHF;
1137ee9133a8SJakub Kicinski 	} else {
1138ee9133a8SJakub Kicinski 		sc = SHF_SC_R_SHF;
1139ee9133a8SJakub Kicinski 	}
1140ee9133a8SJakub Kicinski 
1141ee9133a8SJakub Kicinski 	/* ld_field can address fewer indexes, if offset too large do RMW.
1142ee9133a8SJakub Kicinski 	 * Because we RMV twice we waste 2 cycles on unaligned 8 byte writes.
1143ee9133a8SJakub Kicinski 	 */
1144ee9133a8SJakub Kicinski 	if (idx <= RE_REG_LM_IDX_MAX) {
11452df03a50SJakub Kicinski 		reg = reg_lm(lm3 ? 3 : 0, idx);
1146ee9133a8SJakub Kicinski 	} else {
1147ee9133a8SJakub Kicinski 		reg = imm_a(nfp_prog);
11489a90c83cSJakub Kicinski 		/* Only first and last LMEM locations are going to need RMW,
11499a90c83cSJakub Kicinski 		 * the middle location will be overwritten fully.
11509a90c83cSJakub Kicinski 		 */
11519a90c83cSJakub Kicinski 		if (first || last)
1152ee9133a8SJakub Kicinski 			wrp_mov(nfp_prog, reg, reg_lm(0, idx));
1153ee9133a8SJakub Kicinski 	}
1154ee9133a8SJakub Kicinski 
1155ee9133a8SJakub Kicinski 	emit_ld_field(nfp_prog, reg, mask, reg_b(src), sc, shf);
1156ee9133a8SJakub Kicinski 
11579a90c83cSJakub Kicinski 	if (new_gpr || last) {
1158ee9133a8SJakub Kicinski 		if (idx > RE_REG_LM_IDX_MAX)
1159ee9133a8SJakub Kicinski 			wrp_mov(nfp_prog, reg_lm(0, idx), reg);
11602df03a50SJakub Kicinski 		if (should_inc)
11612df03a50SJakub Kicinski 			wrp_mov(nfp_prog, reg_none(), reg_lm_inc(3));
11629a90c83cSJakub Kicinski 	}
1163ee9133a8SJakub Kicinski 
1164ee9133a8SJakub Kicinski 	return 0;
1165ee9133a8SJakub Kicinski }
1166ee9133a8SJakub Kicinski 
1167ee9133a8SJakub Kicinski static int
1168ee9133a8SJakub Kicinski mem_op_stack(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1169b14157eeSJakub Kicinski 	     unsigned int size, unsigned int ptr_off, u8 gpr, u8 ptr_gpr,
1170b14157eeSJakub Kicinski 	     bool clr_gpr, lmem_step step)
1171ee9133a8SJakub Kicinski {
11721a7e62e6SQuentin Monnet 	s32 off = nfp_prog->stack_frame_depth + meta->insn.off + ptr_off;
11739a90c83cSJakub Kicinski 	bool first = true, last;
11742df03a50SJakub Kicinski 	bool needs_inc = false;
11752df03a50SJakub Kicinski 	swreg stack_off_reg;
1176a82b23fbSJakub Kicinski 	u8 prev_gpr = 255;
1177ee9133a8SJakub Kicinski 	u32 gpr_byte = 0;
11782df03a50SJakub Kicinski 	bool lm3 = true;
1179ee9133a8SJakub Kicinski 	int ret;
1180ee9133a8SJakub Kicinski 
1181b14157eeSJakub Kicinski 	if (meta->ptr_not_const) {
1182b14157eeSJakub Kicinski 		/* Use of the last encountered ptr_off is OK, they all have
1183b14157eeSJakub Kicinski 		 * the same alignment.  Depend on low bits of value being
1184b14157eeSJakub Kicinski 		 * discarded when written to LMaddr register.
1185b14157eeSJakub Kicinski 		 */
1186b14157eeSJakub Kicinski 		stack_off_reg = ur_load_imm_any(nfp_prog, meta->insn.off,
1187b14157eeSJakub Kicinski 						stack_imm(nfp_prog));
1188b14157eeSJakub Kicinski 
1189b14157eeSJakub Kicinski 		emit_alu(nfp_prog, imm_b(nfp_prog),
1190b14157eeSJakub Kicinski 			 reg_a(ptr_gpr), ALU_OP_ADD, stack_off_reg);
1191b14157eeSJakub Kicinski 
1192b14157eeSJakub Kicinski 		needs_inc = true;
1193b14157eeSJakub Kicinski 	} else if (off + size <= 64) {
11942df03a50SJakub Kicinski 		/* We can reach bottom 64B with LMaddr0 */
11952df03a50SJakub Kicinski 		lm3 = false;
11962df03a50SJakub Kicinski 	} else if (round_down(off, 32) == round_down(off + size - 1, 32)) {
11972df03a50SJakub Kicinski 		/* We have to set up a new pointer.  If we know the offset
11982df03a50SJakub Kicinski 		 * and the entire access falls into a single 32 byte aligned
11992df03a50SJakub Kicinski 		 * window we won't have to increment the LM pointer.
12002df03a50SJakub Kicinski 		 * The 32 byte alignment is imporant because offset is ORed in
12012df03a50SJakub Kicinski 		 * not added when doing *l$indexN[off].
12022df03a50SJakub Kicinski 		 */
12032df03a50SJakub Kicinski 		stack_off_reg = ur_load_imm_any(nfp_prog, round_down(off, 32),
12042df03a50SJakub Kicinski 						stack_imm(nfp_prog));
12052df03a50SJakub Kicinski 		emit_alu(nfp_prog, imm_b(nfp_prog),
12062df03a50SJakub Kicinski 			 stack_reg(nfp_prog), ALU_OP_ADD, stack_off_reg);
12072df03a50SJakub Kicinski 
12082df03a50SJakub Kicinski 		off %= 32;
12092df03a50SJakub Kicinski 	} else {
12102df03a50SJakub Kicinski 		stack_off_reg = ur_load_imm_any(nfp_prog, round_down(off, 4),
12112df03a50SJakub Kicinski 						stack_imm(nfp_prog));
12122df03a50SJakub Kicinski 
12132df03a50SJakub Kicinski 		emit_alu(nfp_prog, imm_b(nfp_prog),
12142df03a50SJakub Kicinski 			 stack_reg(nfp_prog), ALU_OP_ADD, stack_off_reg);
12152df03a50SJakub Kicinski 
12162df03a50SJakub Kicinski 		needs_inc = true;
12172df03a50SJakub Kicinski 	}
12182df03a50SJakub Kicinski 	if (lm3) {
12192df03a50SJakub Kicinski 		emit_csr_wr(nfp_prog, imm_b(nfp_prog), NFP_CSR_ACT_LM_ADDR3);
12202df03a50SJakub Kicinski 		/* For size < 4 one slot will be filled by zeroing of upper. */
12212df03a50SJakub Kicinski 		wrp_nops(nfp_prog, clr_gpr && size < 8 ? 2 : 3);
12222df03a50SJakub Kicinski 	}
12232df03a50SJakub Kicinski 
1224a82b23fbSJakub Kicinski 	if (clr_gpr && size < 8)
1225a82b23fbSJakub Kicinski 		wrp_immed(nfp_prog, reg_both(gpr + 1), 0);
1226a82b23fbSJakub Kicinski 
1227ee9133a8SJakub Kicinski 	while (size) {
1228ee9133a8SJakub Kicinski 		u32 slice_end;
1229ee9133a8SJakub Kicinski 		u8 slice_size;
1230ee9133a8SJakub Kicinski 
1231ee9133a8SJakub Kicinski 		slice_size = min(size, 4 - gpr_byte);
1232ee9133a8SJakub Kicinski 		slice_end = min(off + slice_size, round_up(off + 1, 4));
1233ee9133a8SJakub Kicinski 		slice_size = slice_end - off;
1234ee9133a8SJakub Kicinski 
12359a90c83cSJakub Kicinski 		last = slice_size == size;
12369a90c83cSJakub Kicinski 
12372df03a50SJakub Kicinski 		if (needs_inc)
12382df03a50SJakub Kicinski 			off %= 4;
12392df03a50SJakub Kicinski 
1240a82b23fbSJakub Kicinski 		ret = step(nfp_prog, gpr, gpr_byte, off, slice_size,
12412df03a50SJakub Kicinski 			   first, gpr != prev_gpr, last, lm3, needs_inc);
1242ee9133a8SJakub Kicinski 		if (ret)
1243ee9133a8SJakub Kicinski 			return ret;
1244ee9133a8SJakub Kicinski 
1245a82b23fbSJakub Kicinski 		prev_gpr = gpr;
12469a90c83cSJakub Kicinski 		first = false;
12479a90c83cSJakub Kicinski 
1248ee9133a8SJakub Kicinski 		gpr_byte += slice_size;
1249ee9133a8SJakub Kicinski 		if (gpr_byte >= 4) {
1250ee9133a8SJakub Kicinski 			gpr_byte -= 4;
1251ee9133a8SJakub Kicinski 			gpr++;
1252ee9133a8SJakub Kicinski 		}
1253ee9133a8SJakub Kicinski 
1254ee9133a8SJakub Kicinski 		size -= slice_size;
1255ee9133a8SJakub Kicinski 		off += slice_size;
1256ee9133a8SJakub Kicinski 	}
1257ee9133a8SJakub Kicinski 
1258ee9133a8SJakub Kicinski 	return 0;
1259ee9133a8SJakub Kicinski }
1260ee9133a8SJakub Kicinski 
1261d9ae7f2bSJakub Kicinski static void
1262d9ae7f2bSJakub Kicinski wrp_alu_imm(struct nfp_prog *nfp_prog, u8 dst, enum alu_op alu_op, u32 imm)
1263d9ae7f2bSJakub Kicinski {
1264b3f868dfSJakub Kicinski 	swreg tmp_reg;
1265d9ae7f2bSJakub Kicinski 
1266d9ae7f2bSJakub Kicinski 	if (alu_op == ALU_OP_AND) {
1267d9ae7f2bSJakub Kicinski 		if (!imm)
1268d9ae7f2bSJakub Kicinski 			wrp_immed(nfp_prog, reg_both(dst), 0);
1269d9ae7f2bSJakub Kicinski 		if (!imm || !~imm)
1270d9ae7f2bSJakub Kicinski 			return;
1271d9ae7f2bSJakub Kicinski 	}
1272d9ae7f2bSJakub Kicinski 	if (alu_op == ALU_OP_OR) {
1273d9ae7f2bSJakub Kicinski 		if (!~imm)
1274d9ae7f2bSJakub Kicinski 			wrp_immed(nfp_prog, reg_both(dst), ~0U);
1275d9ae7f2bSJakub Kicinski 		if (!imm || !~imm)
1276d9ae7f2bSJakub Kicinski 			return;
1277d9ae7f2bSJakub Kicinski 	}
1278d9ae7f2bSJakub Kicinski 	if (alu_op == ALU_OP_XOR) {
1279d9ae7f2bSJakub Kicinski 		if (!~imm)
1280d9ae7f2bSJakub Kicinski 			emit_alu(nfp_prog, reg_both(dst), reg_none(),
12815d42ced1SJiong Wang 				 ALU_OP_NOT, reg_b(dst));
1282d9ae7f2bSJakub Kicinski 		if (!imm || !~imm)
1283d9ae7f2bSJakub Kicinski 			return;
1284d9ae7f2bSJakub Kicinski 	}
1285d9ae7f2bSJakub Kicinski 
1286d9ae7f2bSJakub Kicinski 	tmp_reg = ur_load_imm_any(nfp_prog, imm, imm_b(nfp_prog));
1287d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, tmp_reg);
1288d9ae7f2bSJakub Kicinski }
1289d9ae7f2bSJakub Kicinski 
1290d9ae7f2bSJakub Kicinski static int
1291d9ae7f2bSJakub Kicinski wrp_alu64_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1292d9ae7f2bSJakub Kicinski 	      enum alu_op alu_op, bool skip)
1293d9ae7f2bSJakub Kicinski {
1294d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1295d9ae7f2bSJakub Kicinski 	u64 imm = insn->imm; /* sign extend */
1296d9ae7f2bSJakub Kicinski 
1297d9ae7f2bSJakub Kicinski 	if (skip) {
1298d9ae7f2bSJakub Kicinski 		meta->skip = true;
1299d9ae7f2bSJakub Kicinski 		return 0;
1300d9ae7f2bSJakub Kicinski 	}
1301d9ae7f2bSJakub Kicinski 
1302d9ae7f2bSJakub Kicinski 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, alu_op, imm & ~0U);
1303d9ae7f2bSJakub Kicinski 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, alu_op, imm >> 32);
1304d9ae7f2bSJakub Kicinski 
1305d9ae7f2bSJakub Kicinski 	return 0;
1306d9ae7f2bSJakub Kicinski }
1307d9ae7f2bSJakub Kicinski 
1308d9ae7f2bSJakub Kicinski static int
1309d9ae7f2bSJakub Kicinski wrp_alu64_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1310d9ae7f2bSJakub Kicinski 	      enum alu_op alu_op)
1311d9ae7f2bSJakub Kicinski {
1312d9ae7f2bSJakub Kicinski 	u8 dst = meta->insn.dst_reg * 2, src = meta->insn.src_reg * 2;
1313d9ae7f2bSJakub Kicinski 
1314d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, reg_b(src));
1315d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(dst + 1),
1316d9ae7f2bSJakub Kicinski 		 reg_a(dst + 1), alu_op, reg_b(src + 1));
1317d9ae7f2bSJakub Kicinski 
1318d9ae7f2bSJakub Kicinski 	return 0;
1319d9ae7f2bSJakub Kicinski }
1320d9ae7f2bSJakub Kicinski 
1321d9ae7f2bSJakub Kicinski static int
1322d9ae7f2bSJakub Kicinski wrp_alu32_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1323d9ae7f2bSJakub Kicinski 	      enum alu_op alu_op, bool skip)
1324d9ae7f2bSJakub Kicinski {
1325d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1326d9ae7f2bSJakub Kicinski 
1327d9ae7f2bSJakub Kicinski 	if (skip) {
1328d9ae7f2bSJakub Kicinski 		meta->skip = true;
1329d9ae7f2bSJakub Kicinski 		return 0;
1330d9ae7f2bSJakub Kicinski 	}
1331d9ae7f2bSJakub Kicinski 
1332d9ae7f2bSJakub Kicinski 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, alu_op, insn->imm);
1333d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
1334d9ae7f2bSJakub Kicinski 
1335d9ae7f2bSJakub Kicinski 	return 0;
1336d9ae7f2bSJakub Kicinski }
1337d9ae7f2bSJakub Kicinski 
1338d9ae7f2bSJakub Kicinski static int
1339d9ae7f2bSJakub Kicinski wrp_alu32_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1340d9ae7f2bSJakub Kicinski 	      enum alu_op alu_op)
1341d9ae7f2bSJakub Kicinski {
1342d9ae7f2bSJakub Kicinski 	u8 dst = meta->insn.dst_reg * 2, src = meta->insn.src_reg * 2;
1343d9ae7f2bSJakub Kicinski 
1344d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, reg_b(src));
1345d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
1346d9ae7f2bSJakub Kicinski 
1347d9ae7f2bSJakub Kicinski 	return 0;
1348d9ae7f2bSJakub Kicinski }
1349d9ae7f2bSJakub Kicinski 
1350d9ae7f2bSJakub Kicinski static void
1351d9ae7f2bSJakub Kicinski wrp_test_reg_one(struct nfp_prog *nfp_prog, u8 dst, enum alu_op alu_op, u8 src,
1352d9ae7f2bSJakub Kicinski 		 enum br_mask br_mask, u16 off)
1353d9ae7f2bSJakub Kicinski {
1354d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_a(dst), alu_op, reg_b(src));
1355d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, br_mask, off, 0);
1356d9ae7f2bSJakub Kicinski }
1357d9ae7f2bSJakub Kicinski 
1358d9ae7f2bSJakub Kicinski static int
1359d9ae7f2bSJakub Kicinski wrp_test_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1360d9ae7f2bSJakub Kicinski 	     enum alu_op alu_op, enum br_mask br_mask)
1361d9ae7f2bSJakub Kicinski {
1362d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1363d9ae7f2bSJakub Kicinski 
1364d9ae7f2bSJakub Kicinski 	wrp_test_reg_one(nfp_prog, insn->dst_reg * 2, alu_op,
1365d9ae7f2bSJakub Kicinski 			 insn->src_reg * 2, br_mask, insn->off);
1366d9ae7f2bSJakub Kicinski 	wrp_test_reg_one(nfp_prog, insn->dst_reg * 2 + 1, alu_op,
1367d9ae7f2bSJakub Kicinski 			 insn->src_reg * 2 + 1, br_mask, insn->off);
1368d9ae7f2bSJakub Kicinski 
1369d9ae7f2bSJakub Kicinski 	return 0;
1370d9ae7f2bSJakub Kicinski }
1371d9ae7f2bSJakub Kicinski 
137261dd8f00SJakub Kicinski static const struct jmp_code_map {
137361dd8f00SJakub Kicinski 	enum br_mask br_mask;
137461dd8f00SJakub Kicinski 	bool swap;
137561dd8f00SJakub Kicinski } jmp_code_map[] = {
137661dd8f00SJakub Kicinski 	[BPF_JGT >> 4]	= { BR_BLO, true },
137761dd8f00SJakub Kicinski 	[BPF_JGE >> 4]	= { BR_BHS, false },
137861dd8f00SJakub Kicinski 	[BPF_JLT >> 4]	= { BR_BLO, false },
137961dd8f00SJakub Kicinski 	[BPF_JLE >> 4]	= { BR_BHS, true },
138061dd8f00SJakub Kicinski 	[BPF_JSGT >> 4]	= { BR_BLT, true },
138161dd8f00SJakub Kicinski 	[BPF_JSGE >> 4]	= { BR_BGE, false },
138261dd8f00SJakub Kicinski 	[BPF_JSLT >> 4]	= { BR_BLT, false },
138361dd8f00SJakub Kicinski 	[BPF_JSLE >> 4]	= { BR_BGE, true },
138461dd8f00SJakub Kicinski };
138561dd8f00SJakub Kicinski 
138661dd8f00SJakub Kicinski static const struct jmp_code_map *nfp_jmp_code_get(struct nfp_insn_meta *meta)
138761dd8f00SJakub Kicinski {
138861dd8f00SJakub Kicinski 	unsigned int op;
138961dd8f00SJakub Kicinski 
139061dd8f00SJakub Kicinski 	op = BPF_OP(meta->insn.code) >> 4;
139161dd8f00SJakub Kicinski 	/* br_mask of 0 is BR_BEQ which we don't use in jump code table */
139261dd8f00SJakub Kicinski 	if (WARN_ONCE(op >= ARRAY_SIZE(jmp_code_map) ||
139361dd8f00SJakub Kicinski 		      !jmp_code_map[op].br_mask,
139461dd8f00SJakub Kicinski 		      "no code found for jump instruction"))
139561dd8f00SJakub Kicinski 		return NULL;
139661dd8f00SJakub Kicinski 
139761dd8f00SJakub Kicinski 	return &jmp_code_map[op];
139861dd8f00SJakub Kicinski }
139961dd8f00SJakub Kicinski 
140061dd8f00SJakub Kicinski static int cmp_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1401d9ae7f2bSJakub Kicinski {
1402d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1403d9ae7f2bSJakub Kicinski 	u64 imm = insn->imm; /* sign extend */
140461dd8f00SJakub Kicinski 	const struct jmp_code_map *code;
14057bdc97beSJakub Kicinski 	enum alu_op alu_op, carry_op;
1406d9ae7f2bSJakub Kicinski 	u8 reg = insn->dst_reg * 2;
1407b3f868dfSJakub Kicinski 	swreg tmp_reg;
1408d9ae7f2bSJakub Kicinski 
140961dd8f00SJakub Kicinski 	code = nfp_jmp_code_get(meta);
141061dd8f00SJakub Kicinski 	if (!code)
141161dd8f00SJakub Kicinski 		return -EINVAL;
141261dd8f00SJakub Kicinski 
14137bdc97beSJakub Kicinski 	alu_op = meta->jump_neg_op ? ALU_OP_ADD : ALU_OP_SUB;
14147bdc97beSJakub Kicinski 	carry_op = meta->jump_neg_op ? ALU_OP_ADD_C : ALU_OP_SUB_C;
14157bdc97beSJakub Kicinski 
1416d9ae7f2bSJakub Kicinski 	tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
141761dd8f00SJakub Kicinski 	if (!code->swap)
14187bdc97beSJakub Kicinski 		emit_alu(nfp_prog, reg_none(), reg_a(reg), alu_op, tmp_reg);
1419d9ae7f2bSJakub Kicinski 	else
14207bdc97beSJakub Kicinski 		emit_alu(nfp_prog, reg_none(), tmp_reg, alu_op, reg_a(reg));
1421d9ae7f2bSJakub Kicinski 
1422d9ae7f2bSJakub Kicinski 	tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
142361dd8f00SJakub Kicinski 	if (!code->swap)
1424d9ae7f2bSJakub Kicinski 		emit_alu(nfp_prog, reg_none(),
14257bdc97beSJakub Kicinski 			 reg_a(reg + 1), carry_op, tmp_reg);
1426d9ae7f2bSJakub Kicinski 	else
1427d9ae7f2bSJakub Kicinski 		emit_alu(nfp_prog, reg_none(),
14287bdc97beSJakub Kicinski 			 tmp_reg, carry_op, reg_a(reg + 1));
1429d9ae7f2bSJakub Kicinski 
143061dd8f00SJakub Kicinski 	emit_br(nfp_prog, code->br_mask, insn->off, 0);
1431d9ae7f2bSJakub Kicinski 
1432d9ae7f2bSJakub Kicinski 	return 0;
1433d9ae7f2bSJakub Kicinski }
1434d9ae7f2bSJakub Kicinski 
143561dd8f00SJakub Kicinski static int cmp_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1436d9ae7f2bSJakub Kicinski {
1437d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
143861dd8f00SJakub Kicinski 	const struct jmp_code_map *code;
143926fa818dSJakub Kicinski 	u8 areg, breg;
144026fa818dSJakub Kicinski 
144161dd8f00SJakub Kicinski 	code = nfp_jmp_code_get(meta);
144261dd8f00SJakub Kicinski 	if (!code)
144361dd8f00SJakub Kicinski 		return -EINVAL;
144461dd8f00SJakub Kicinski 
144526fa818dSJakub Kicinski 	areg = insn->dst_reg * 2;
144626fa818dSJakub Kicinski 	breg = insn->src_reg * 2;
1447d9ae7f2bSJakub Kicinski 
144861dd8f00SJakub Kicinski 	if (code->swap) {
1449d9ae7f2bSJakub Kicinski 		areg ^= breg;
1450d9ae7f2bSJakub Kicinski 		breg ^= areg;
1451d9ae7f2bSJakub Kicinski 		areg ^= breg;
1452d9ae7f2bSJakub Kicinski 	}
1453d9ae7f2bSJakub Kicinski 
1454d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_a(areg), ALU_OP_SUB, reg_b(breg));
1455d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
1456d9ae7f2bSJakub Kicinski 		 reg_a(areg + 1), ALU_OP_SUB_C, reg_b(breg + 1));
145761dd8f00SJakub Kicinski 	emit_br(nfp_prog, code->br_mask, insn->off, 0);
1458d9ae7f2bSJakub Kicinski 
1459d9ae7f2bSJakub Kicinski 	return 0;
1460d9ae7f2bSJakub Kicinski }
1461d9ae7f2bSJakub Kicinski 
14623119d1fdSJakub Kicinski static void wrp_end32(struct nfp_prog *nfp_prog, swreg reg_in, u8 gpr_out)
14633119d1fdSJakub Kicinski {
14643119d1fdSJakub Kicinski 	emit_ld_field(nfp_prog, reg_both(gpr_out), 0xf, reg_in,
14653119d1fdSJakub Kicinski 		      SHF_SC_R_ROT, 8);
14663119d1fdSJakub Kicinski 	emit_ld_field(nfp_prog, reg_both(gpr_out), 0x5, reg_a(gpr_out),
14673119d1fdSJakub Kicinski 		      SHF_SC_R_ROT, 16);
14683119d1fdSJakub Kicinski }
14693119d1fdSJakub Kicinski 
1470d3d23fdbSJiong Wang static void
1471d3d23fdbSJiong Wang wrp_mul_u32(struct nfp_prog *nfp_prog, swreg dst_hi, swreg dst_lo, swreg lreg,
1472d3d23fdbSJiong Wang 	    swreg rreg, bool gen_high_half)
1473d3d23fdbSJiong Wang {
1474d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_START, MUL_STEP_NONE, rreg);
1475d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_32x32, MUL_STEP_1, rreg);
1476d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_32x32, MUL_STEP_2, rreg);
1477d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_32x32, MUL_STEP_3, rreg);
1478d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_32x32, MUL_STEP_4, rreg);
1479d3d23fdbSJiong Wang 	emit_mul(nfp_prog, dst_lo, MUL_TYPE_STEP_32x32, MUL_LAST, reg_none());
1480d3d23fdbSJiong Wang 	if (gen_high_half)
1481d3d23fdbSJiong Wang 		emit_mul(nfp_prog, dst_hi, MUL_TYPE_STEP_32x32, MUL_LAST_2,
1482d3d23fdbSJiong Wang 			 reg_none());
1483d3d23fdbSJiong Wang 	else
1484d3d23fdbSJiong Wang 		wrp_immed(nfp_prog, dst_hi, 0);
1485d3d23fdbSJiong Wang }
1486d3d23fdbSJiong Wang 
1487d3d23fdbSJiong Wang static void
1488d3d23fdbSJiong Wang wrp_mul_u16(struct nfp_prog *nfp_prog, swreg dst_hi, swreg dst_lo, swreg lreg,
1489d3d23fdbSJiong Wang 	    swreg rreg)
1490d3d23fdbSJiong Wang {
1491d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_START, MUL_STEP_NONE, rreg);
1492d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_16x16, MUL_STEP_1, rreg);
1493d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_16x16, MUL_STEP_2, rreg);
1494d3d23fdbSJiong Wang 	emit_mul(nfp_prog, dst_lo, MUL_TYPE_STEP_16x16, MUL_LAST, reg_none());
1495d3d23fdbSJiong Wang }
1496d3d23fdbSJiong Wang 
1497d3d23fdbSJiong Wang static int
1498d3d23fdbSJiong Wang wrp_mul(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1499d3d23fdbSJiong Wang 	bool gen_high_half, bool ropnd_from_reg)
1500d3d23fdbSJiong Wang {
1501d3d23fdbSJiong Wang 	swreg multiplier, multiplicand, dst_hi, dst_lo;
1502d3d23fdbSJiong Wang 	const struct bpf_insn *insn = &meta->insn;
1503d3d23fdbSJiong Wang 	u32 lopnd_max, ropnd_max;
1504d3d23fdbSJiong Wang 	u8 dst_reg;
1505d3d23fdbSJiong Wang 
1506d3d23fdbSJiong Wang 	dst_reg = insn->dst_reg;
1507d3d23fdbSJiong Wang 	multiplicand = reg_a(dst_reg * 2);
1508d3d23fdbSJiong Wang 	dst_hi = reg_both(dst_reg * 2 + 1);
1509d3d23fdbSJiong Wang 	dst_lo = reg_both(dst_reg * 2);
1510d3d23fdbSJiong Wang 	lopnd_max = meta->umax_dst;
1511d3d23fdbSJiong Wang 	if (ropnd_from_reg) {
1512d3d23fdbSJiong Wang 		multiplier = reg_b(insn->src_reg * 2);
1513d3d23fdbSJiong Wang 		ropnd_max = meta->umax_src;
1514d3d23fdbSJiong Wang 	} else {
1515d3d23fdbSJiong Wang 		u32 imm = insn->imm;
1516d3d23fdbSJiong Wang 
1517d3d23fdbSJiong Wang 		multiplier = ur_load_imm_any(nfp_prog, imm, imm_b(nfp_prog));
1518d3d23fdbSJiong Wang 		ropnd_max = imm;
1519d3d23fdbSJiong Wang 	}
1520d3d23fdbSJiong Wang 	if (lopnd_max > U16_MAX || ropnd_max > U16_MAX)
1521d3d23fdbSJiong Wang 		wrp_mul_u32(nfp_prog, dst_hi, dst_lo, multiplicand, multiplier,
1522d3d23fdbSJiong Wang 			    gen_high_half);
1523d3d23fdbSJiong Wang 	else
1524d3d23fdbSJiong Wang 		wrp_mul_u16(nfp_prog, dst_hi, dst_lo, multiplicand, multiplier);
1525d3d23fdbSJiong Wang 
1526d3d23fdbSJiong Wang 	return 0;
1527d3d23fdbSJiong Wang }
1528d3d23fdbSJiong Wang 
15292a952b03SJiong Wang static int wrp_div_imm(struct nfp_prog *nfp_prog, u8 dst, u64 imm)
15302a952b03SJiong Wang {
15312a952b03SJiong Wang 	swreg dst_both = reg_both(dst), dst_a = reg_a(dst), dst_b = reg_a(dst);
15329fb410a8SJiong Wang 	struct reciprocal_value_adv rvalue;
15339fb410a8SJiong Wang 	u8 pre_shift, exp;
15342a952b03SJiong Wang 	swreg magic;
15352a952b03SJiong Wang 
15362a952b03SJiong Wang 	if (imm > U32_MAX) {
15372a952b03SJiong Wang 		wrp_immed(nfp_prog, dst_both, 0);
15382a952b03SJiong Wang 		return 0;
15392a952b03SJiong Wang 	}
15402a952b03SJiong Wang 
15419fb410a8SJiong Wang 	/* NOTE: because we are using "reciprocal_value_adv" which doesn't
15429fb410a8SJiong Wang 	 * support "divisor > (1u << 31)", we need to JIT separate NFP sequence
15439fb410a8SJiong Wang 	 * to handle such case which actually equals to the result of unsigned
15449fb410a8SJiong Wang 	 * comparison "dst >= imm" which could be calculated using the following
15459fb410a8SJiong Wang 	 * NFP sequence:
15469fb410a8SJiong Wang 	 *
15479fb410a8SJiong Wang 	 *  alu[--, dst, -, imm]
15489fb410a8SJiong Wang 	 *  immed[imm, 0]
15499fb410a8SJiong Wang 	 *  alu[dst, imm, +carry, 0]
15509fb410a8SJiong Wang 	 *
15519fb410a8SJiong Wang 	 */
15529fb410a8SJiong Wang 	if (imm > 1U << 31) {
15539fb410a8SJiong Wang 		swreg tmp_b = ur_load_imm_any(nfp_prog, imm, imm_b(nfp_prog));
15549fb410a8SJiong Wang 
15559fb410a8SJiong Wang 		emit_alu(nfp_prog, reg_none(), dst_a, ALU_OP_SUB, tmp_b);
15569fb410a8SJiong Wang 		wrp_immed(nfp_prog, imm_a(nfp_prog), 0);
15579fb410a8SJiong Wang 		emit_alu(nfp_prog, dst_both, imm_a(nfp_prog), ALU_OP_ADD_C,
15589fb410a8SJiong Wang 			 reg_imm(0));
15599fb410a8SJiong Wang 		return 0;
15609fb410a8SJiong Wang 	}
15619fb410a8SJiong Wang 
15629fb410a8SJiong Wang 	rvalue = reciprocal_value_adv(imm, 32);
15639fb410a8SJiong Wang 	exp = rvalue.exp;
15649fb410a8SJiong Wang 	if (rvalue.is_wide_m && !(imm & 1)) {
15659fb410a8SJiong Wang 		pre_shift = fls(imm & -imm) - 1;
15669fb410a8SJiong Wang 		rvalue = reciprocal_value_adv(imm >> pre_shift, 32 - pre_shift);
15679fb410a8SJiong Wang 	} else {
15689fb410a8SJiong Wang 		pre_shift = 0;
15699fb410a8SJiong Wang 	}
15702a952b03SJiong Wang 	magic = ur_load_imm_any(nfp_prog, rvalue.m, imm_b(nfp_prog));
15719fb410a8SJiong Wang 	if (imm == 1U << exp) {
15722a952b03SJiong Wang 		emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE, dst_b,
15739fb410a8SJiong Wang 			 SHF_SC_R_SHF, exp);
15749fb410a8SJiong Wang 	} else if (rvalue.is_wide_m) {
15759fb410a8SJiong Wang 		wrp_mul_u32(nfp_prog, imm_both(nfp_prog), reg_none(), dst_a,
15769fb410a8SJiong Wang 			    magic, true);
15779fb410a8SJiong Wang 		emit_alu(nfp_prog, dst_both, dst_a, ALU_OP_SUB,
15789fb410a8SJiong Wang 			 imm_b(nfp_prog));
15792a952b03SJiong Wang 		emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE, dst_b,
15809fb410a8SJiong Wang 			 SHF_SC_R_SHF, 1);
15819fb410a8SJiong Wang 		emit_alu(nfp_prog, dst_both, dst_a, ALU_OP_ADD,
15829fb410a8SJiong Wang 			 imm_b(nfp_prog));
15839fb410a8SJiong Wang 		emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE, dst_b,
15849fb410a8SJiong Wang 			 SHF_SC_R_SHF, rvalue.sh - 1);
15859fb410a8SJiong Wang 	} else {
15869fb410a8SJiong Wang 		if (pre_shift)
15879fb410a8SJiong Wang 			emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE,
15889fb410a8SJiong Wang 				 dst_b, SHF_SC_R_SHF, pre_shift);
15899fb410a8SJiong Wang 		wrp_mul_u32(nfp_prog, dst_both, reg_none(), dst_a, magic, true);
15909fb410a8SJiong Wang 		emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE,
15919fb410a8SJiong Wang 			 dst_b, SHF_SC_R_SHF, rvalue.sh);
15929fb410a8SJiong Wang 	}
15932a952b03SJiong Wang 
15942a952b03SJiong Wang 	return 0;
15952a952b03SJiong Wang }
15962a952b03SJiong Wang 
15970d49eaf4SJakub Kicinski static int adjust_head(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
15980d49eaf4SJakub Kicinski {
15990d49eaf4SJakub Kicinski 	swreg tmp = imm_a(nfp_prog), tmp_len = imm_b(nfp_prog);
16000d49eaf4SJakub Kicinski 	struct nfp_bpf_cap_adjust_head *adjust_head;
16010d49eaf4SJakub Kicinski 	u32 ret_einval, end;
16020d49eaf4SJakub Kicinski 
16030d49eaf4SJakub Kicinski 	adjust_head = &nfp_prog->bpf->adjust_head;
16040d49eaf4SJakub Kicinski 
16058231f844SJakub Kicinski 	/* Optimized version - 5 vs 14 cycles */
16068231f844SJakub Kicinski 	if (nfp_prog->adjust_head_location != UINT_MAX) {
16078231f844SJakub Kicinski 		if (WARN_ON_ONCE(nfp_prog->adjust_head_location != meta->n))
16088231f844SJakub Kicinski 			return -EINVAL;
16098231f844SJakub Kicinski 
16108231f844SJakub Kicinski 		emit_alu(nfp_prog, pptr_reg(nfp_prog),
16118231f844SJakub Kicinski 			 reg_a(2 * 2), ALU_OP_ADD, pptr_reg(nfp_prog));
16128231f844SJakub Kicinski 		emit_alu(nfp_prog, plen_reg(nfp_prog),
16138231f844SJakub Kicinski 			 plen_reg(nfp_prog), ALU_OP_SUB, reg_a(2 * 2));
16148231f844SJakub Kicinski 		emit_alu(nfp_prog, pv_len(nfp_prog),
16158231f844SJakub Kicinski 			 pv_len(nfp_prog), ALU_OP_SUB, reg_a(2 * 2));
16168231f844SJakub Kicinski 
16178231f844SJakub Kicinski 		wrp_immed(nfp_prog, reg_both(0), 0);
16188231f844SJakub Kicinski 		wrp_immed(nfp_prog, reg_both(1), 0);
16198231f844SJakub Kicinski 
16208231f844SJakub Kicinski 		/* TODO: when adjust head is guaranteed to succeed we can
16218231f844SJakub Kicinski 		 * also eliminate the following if (r0 == 0) branch.
16228231f844SJakub Kicinski 		 */
16238231f844SJakub Kicinski 
16248231f844SJakub Kicinski 		return 0;
16258231f844SJakub Kicinski 	}
16268231f844SJakub Kicinski 
16270d49eaf4SJakub Kicinski 	ret_einval = nfp_prog_current_offset(nfp_prog) + 14;
16280d49eaf4SJakub Kicinski 	end = ret_einval + 2;
16290d49eaf4SJakub Kicinski 
16300d49eaf4SJakub Kicinski 	/* We need to use a temp because offset is just a part of the pkt ptr */
16310d49eaf4SJakub Kicinski 	emit_alu(nfp_prog, tmp,
16320d49eaf4SJakub Kicinski 		 reg_a(2 * 2), ALU_OP_ADD_2B, pptr_reg(nfp_prog));
16330d49eaf4SJakub Kicinski 
16340d49eaf4SJakub Kicinski 	/* Validate result will fit within FW datapath constraints */
16350d49eaf4SJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
16360d49eaf4SJakub Kicinski 		 tmp, ALU_OP_SUB, reg_imm(adjust_head->off_min));
16370d49eaf4SJakub Kicinski 	emit_br(nfp_prog, BR_BLO, ret_einval, 0);
16380d49eaf4SJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
16390d49eaf4SJakub Kicinski 		 reg_imm(adjust_head->off_max), ALU_OP_SUB, tmp);
16400d49eaf4SJakub Kicinski 	emit_br(nfp_prog, BR_BLO, ret_einval, 0);
16410d49eaf4SJakub Kicinski 
16420d49eaf4SJakub Kicinski 	/* Validate the length is at least ETH_HLEN */
16430d49eaf4SJakub Kicinski 	emit_alu(nfp_prog, tmp_len,
16440d49eaf4SJakub Kicinski 		 plen_reg(nfp_prog), ALU_OP_SUB, reg_a(2 * 2));
16450d49eaf4SJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
16460d49eaf4SJakub Kicinski 		 tmp_len, ALU_OP_SUB, reg_imm(ETH_HLEN));
16470d49eaf4SJakub Kicinski 	emit_br(nfp_prog, BR_BMI, ret_einval, 0);
16480d49eaf4SJakub Kicinski 
16490d49eaf4SJakub Kicinski 	/* Load the ret code */
16500d49eaf4SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(0), 0);
16510d49eaf4SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(1), 0);
16520d49eaf4SJakub Kicinski 
16530d49eaf4SJakub Kicinski 	/* Modify the packet metadata */
16540d49eaf4SJakub Kicinski 	emit_ld_field(nfp_prog, pptr_reg(nfp_prog), 0x3, tmp, SHF_SC_NONE, 0);
16550d49eaf4SJakub Kicinski 
16560d49eaf4SJakub Kicinski 	/* Skip over the -EINVAL ret code (defer 2) */
16572314fe9eSJakub Kicinski 	emit_br(nfp_prog, BR_UNC, end, 2);
16580d49eaf4SJakub Kicinski 
16590d49eaf4SJakub Kicinski 	emit_alu(nfp_prog, plen_reg(nfp_prog),
16600d49eaf4SJakub Kicinski 		 plen_reg(nfp_prog), ALU_OP_SUB, reg_a(2 * 2));
16610d49eaf4SJakub Kicinski 	emit_alu(nfp_prog, pv_len(nfp_prog),
16620d49eaf4SJakub Kicinski 		 pv_len(nfp_prog), ALU_OP_SUB, reg_a(2 * 2));
16630d49eaf4SJakub Kicinski 
16640d49eaf4SJakub Kicinski 	/* return -EINVAL target */
16650d49eaf4SJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, ret_einval))
16660d49eaf4SJakub Kicinski 		return -EINVAL;
16670d49eaf4SJakub Kicinski 
16680d49eaf4SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(0), -22);
16690d49eaf4SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(1), ~0);
16700d49eaf4SJakub Kicinski 
16710d49eaf4SJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, end))
16720d49eaf4SJakub Kicinski 		return -EINVAL;
16730d49eaf4SJakub Kicinski 
16740d49eaf4SJakub Kicinski 	return 0;
16750d49eaf4SJakub Kicinski }
16760d49eaf4SJakub Kicinski 
16770c261593SJakub Kicinski static int adjust_tail(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
16780c261593SJakub Kicinski {
16790c261593SJakub Kicinski 	u32 ret_einval, end;
16800c261593SJakub Kicinski 	swreg plen, delta;
16810c261593SJakub Kicinski 
16820c261593SJakub Kicinski 	BUILD_BUG_ON(plen_reg(nfp_prog) != reg_b(STATIC_REG_PKT_LEN));
16830c261593SJakub Kicinski 
16840c261593SJakub Kicinski 	plen = imm_a(nfp_prog);
16850c261593SJakub Kicinski 	delta = reg_a(2 * 2);
16860c261593SJakub Kicinski 
16870c261593SJakub Kicinski 	ret_einval = nfp_prog_current_offset(nfp_prog) + 9;
16880c261593SJakub Kicinski 	end = nfp_prog_current_offset(nfp_prog) + 11;
16890c261593SJakub Kicinski 
16900c261593SJakub Kicinski 	/* Calculate resulting length */
16910c261593SJakub Kicinski 	emit_alu(nfp_prog, plen, plen_reg(nfp_prog), ALU_OP_ADD, delta);
16920c261593SJakub Kicinski 	/* delta == 0 is not allowed by the kernel, add must overflow to make
16930c261593SJakub Kicinski 	 * length smaller.
16940c261593SJakub Kicinski 	 */
16950c261593SJakub Kicinski 	emit_br(nfp_prog, BR_BCC, ret_einval, 0);
16960c261593SJakub Kicinski 
16970c261593SJakub Kicinski 	/* if (new_len < 14) then -EINVAL */
16980c261593SJakub Kicinski 	emit_alu(nfp_prog, reg_none(), plen, ALU_OP_SUB, reg_imm(ETH_HLEN));
16990c261593SJakub Kicinski 	emit_br(nfp_prog, BR_BMI, ret_einval, 0);
17000c261593SJakub Kicinski 
17010c261593SJakub Kicinski 	emit_alu(nfp_prog, plen_reg(nfp_prog),
17020c261593SJakub Kicinski 		 plen_reg(nfp_prog), ALU_OP_ADD, delta);
17030c261593SJakub Kicinski 	emit_alu(nfp_prog, pv_len(nfp_prog),
17040c261593SJakub Kicinski 		 pv_len(nfp_prog), ALU_OP_ADD, delta);
17050c261593SJakub Kicinski 
17060c261593SJakub Kicinski 	emit_br(nfp_prog, BR_UNC, end, 2);
17070c261593SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(0), 0);
17080c261593SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(1), 0);
17090c261593SJakub Kicinski 
17100c261593SJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, ret_einval))
17110c261593SJakub Kicinski 		return -EINVAL;
17120c261593SJakub Kicinski 
17130c261593SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(0), -22);
17140c261593SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(1), ~0);
17150c261593SJakub Kicinski 
17160c261593SJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, end))
17170c261593SJakub Kicinski 		return -EINVAL;
17180c261593SJakub Kicinski 
17190c261593SJakub Kicinski 	return 0;
17200c261593SJakub Kicinski }
17210c261593SJakub Kicinski 
172277a3d311SJakub Kicinski static int
1723fc448497SJakub Kicinski map_call_stack_common(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
172477a3d311SJakub Kicinski {
172577a3d311SJakub Kicinski 	bool load_lm_ptr;
172677a3d311SJakub Kicinski 	u32 ret_tgt;
172777a3d311SJakub Kicinski 	s64 lm_off;
172877a3d311SJakub Kicinski 
172977a3d311SJakub Kicinski 	/* We only have to reload LM0 if the key is not at start of stack */
17301a7e62e6SQuentin Monnet 	lm_off = nfp_prog->stack_frame_depth;
17312f46e0c1SJakub Kicinski 	lm_off += meta->arg2.reg.var_off.value + meta->arg2.reg.off;
17322f46e0c1SJakub Kicinski 	load_lm_ptr = meta->arg2.var_off || lm_off;
173377a3d311SJakub Kicinski 
173477a3d311SJakub Kicinski 	/* Set LM0 to start of key */
173577a3d311SJakub Kicinski 	if (load_lm_ptr)
173677a3d311SJakub Kicinski 		emit_csr_wr(nfp_prog, reg_b(2 * 2), NFP_CSR_ACT_LM_ADDR0);
173744d65a47SJakub Kicinski 	if (meta->func_id == BPF_FUNC_map_update_elem)
173844d65a47SJakub Kicinski 		emit_csr_wr(nfp_prog, reg_b(3 * 2), NFP_CSR_ACT_LM_ADDR2);
173977a3d311SJakub Kicinski 
1740fc448497SJakub Kicinski 	emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO + meta->func_id,
174177a3d311SJakub Kicinski 		     2, RELO_BR_HELPER);
174277a3d311SJakub Kicinski 	ret_tgt = nfp_prog_current_offset(nfp_prog) + 2;
174377a3d311SJakub Kicinski 
174477a3d311SJakub Kicinski 	/* Load map ID into A0 */
1745b4264c96SJakub Kicinski 	wrp_mov(nfp_prog, reg_a(0), reg_a(2));
174677a3d311SJakub Kicinski 
174777a3d311SJakub Kicinski 	/* Load the return address into B0 */
174877a3d311SJakub Kicinski 	wrp_immed_relo(nfp_prog, reg_b(0), ret_tgt, RELO_IMMED_REL);
174977a3d311SJakub Kicinski 
175077a3d311SJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, ret_tgt))
175177a3d311SJakub Kicinski 		return -EINVAL;
175277a3d311SJakub Kicinski 
175377a3d311SJakub Kicinski 	/* Reset the LM0 pointer */
175477a3d311SJakub Kicinski 	if (!load_lm_ptr)
175577a3d311SJakub Kicinski 		return 0;
175677a3d311SJakub Kicinski 
175777a3d311SJakub Kicinski 	emit_csr_wr(nfp_prog, stack_reg(nfp_prog), NFP_CSR_ACT_LM_ADDR0);
175877a3d311SJakub Kicinski 	wrp_nops(nfp_prog, 3);
175977a3d311SJakub Kicinski 
176077a3d311SJakub Kicinski 	return 0;
176177a3d311SJakub Kicinski }
176277a3d311SJakub Kicinski 
1763df4a37d8SJakub Kicinski static int
1764df4a37d8SJakub Kicinski nfp_get_prandom_u32(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1765df4a37d8SJakub Kicinski {
1766df4a37d8SJakub Kicinski 	__emit_csr_rd(nfp_prog, NFP_CSR_PSEUDO_RND_NUM);
1767df4a37d8SJakub Kicinski 	/* CSR value is read in following immed[gpr, 0] */
1768df4a37d8SJakub Kicinski 	emit_immed(nfp_prog, reg_both(0), 0,
1769df4a37d8SJakub Kicinski 		   IMMED_WIDTH_ALL, false, IMMED_SHIFT_0B);
1770df4a37d8SJakub Kicinski 	emit_immed(nfp_prog, reg_both(1), 0,
1771df4a37d8SJakub Kicinski 		   IMMED_WIDTH_ALL, false, IMMED_SHIFT_0B);
1772df4a37d8SJakub Kicinski 	return 0;
1773df4a37d8SJakub Kicinski }
1774df4a37d8SJakub Kicinski 
17759816dd35SJakub Kicinski static int
17769816dd35SJakub Kicinski nfp_perf_event_output(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
17779816dd35SJakub Kicinski {
17789816dd35SJakub Kicinski 	swreg ptr_type;
17799816dd35SJakub Kicinski 	u32 ret_tgt;
17809816dd35SJakub Kicinski 
17819816dd35SJakub Kicinski 	ptr_type = ur_load_imm_any(nfp_prog, meta->arg1.type, imm_a(nfp_prog));
17829816dd35SJakub Kicinski 
17839816dd35SJakub Kicinski 	ret_tgt = nfp_prog_current_offset(nfp_prog) + 3;
17849816dd35SJakub Kicinski 
17859816dd35SJakub Kicinski 	emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO + meta->func_id,
17869816dd35SJakub Kicinski 		     2, RELO_BR_HELPER);
17879816dd35SJakub Kicinski 
17889816dd35SJakub Kicinski 	/* Load ptr type into A1 */
17899816dd35SJakub Kicinski 	wrp_mov(nfp_prog, reg_a(1), ptr_type);
17909816dd35SJakub Kicinski 
17919816dd35SJakub Kicinski 	/* Load the return address into B0 */
17929816dd35SJakub Kicinski 	wrp_immed_relo(nfp_prog, reg_b(0), ret_tgt, RELO_IMMED_REL);
17939816dd35SJakub Kicinski 
17949816dd35SJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, ret_tgt))
17959816dd35SJakub Kicinski 		return -EINVAL;
17969816dd35SJakub Kicinski 
17979816dd35SJakub Kicinski 	return 0;
17989816dd35SJakub Kicinski }
17999816dd35SJakub Kicinski 
1800d985888fSJakub Kicinski static int
1801d985888fSJakub Kicinski nfp_queue_select(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1802d985888fSJakub Kicinski {
1803d985888fSJakub Kicinski 	u32 jmp_tgt;
1804d985888fSJakub Kicinski 
1805d985888fSJakub Kicinski 	jmp_tgt = nfp_prog_current_offset(nfp_prog) + 5;
1806d985888fSJakub Kicinski 
1807d985888fSJakub Kicinski 	/* Make sure the queue id fits into FW field */
1808d985888fSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_a(meta->insn.src_reg * 2),
1809d985888fSJakub Kicinski 		 ALU_OP_AND_NOT_B, reg_imm(0xff));
1810d985888fSJakub Kicinski 	emit_br(nfp_prog, BR_BEQ, jmp_tgt, 2);
1811d985888fSJakub Kicinski 
1812d985888fSJakub Kicinski 	/* Set the 'queue selected' bit and the queue value */
1813d985888fSJakub Kicinski 	emit_shf(nfp_prog, pv_qsel_set(nfp_prog),
1814d985888fSJakub Kicinski 		 pv_qsel_set(nfp_prog), SHF_OP_OR, reg_imm(1),
1815d985888fSJakub Kicinski 		 SHF_SC_L_SHF, PKT_VEL_QSEL_SET_BIT);
1816d985888fSJakub Kicinski 	emit_ld_field(nfp_prog,
1817d985888fSJakub Kicinski 		      pv_qsel_val(nfp_prog), 0x1, reg_b(meta->insn.src_reg * 2),
1818d985888fSJakub Kicinski 		      SHF_SC_NONE, 0);
1819d985888fSJakub Kicinski 	/* Delay slots end here, we will jump over next instruction if queue
1820d985888fSJakub Kicinski 	 * value fits into the field.
1821d985888fSJakub Kicinski 	 */
1822d985888fSJakub Kicinski 	emit_ld_field(nfp_prog,
1823d985888fSJakub Kicinski 		      pv_qsel_val(nfp_prog), 0x1, reg_imm(NFP_NET_RXR_MAX),
1824d985888fSJakub Kicinski 		      SHF_SC_NONE, 0);
1825d985888fSJakub Kicinski 
1826d985888fSJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, jmp_tgt))
1827d985888fSJakub Kicinski 		return -EINVAL;
1828d985888fSJakub Kicinski 
1829d985888fSJakub Kicinski 	return 0;
1830d985888fSJakub Kicinski }
1831d985888fSJakub Kicinski 
1832d9ae7f2bSJakub Kicinski /* --- Callbacks --- */
1833d9ae7f2bSJakub Kicinski static int mov_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1834d9ae7f2bSJakub Kicinski {
1835d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1836b14157eeSJakub Kicinski 	u8 dst = insn->dst_reg * 2;
1837b14157eeSJakub Kicinski 	u8 src = insn->src_reg * 2;
1838d9ae7f2bSJakub Kicinski 
1839b14157eeSJakub Kicinski 	if (insn->src_reg == BPF_REG_10) {
1840b14157eeSJakub Kicinski 		swreg stack_depth_reg;
1841b14157eeSJakub Kicinski 
1842b14157eeSJakub Kicinski 		stack_depth_reg = ur_load_imm_any(nfp_prog,
18431a7e62e6SQuentin Monnet 						  nfp_prog->stack_frame_depth,
1844b14157eeSJakub Kicinski 						  stack_imm(nfp_prog));
18451a7e62e6SQuentin Monnet 		emit_alu(nfp_prog, reg_both(dst), stack_reg(nfp_prog),
18461a7e62e6SQuentin Monnet 			 ALU_OP_ADD, stack_depth_reg);
1847b14157eeSJakub Kicinski 		wrp_immed(nfp_prog, reg_both(dst + 1), 0);
1848b14157eeSJakub Kicinski 	} else {
1849b14157eeSJakub Kicinski 		wrp_reg_mov(nfp_prog, dst, src);
1850b14157eeSJakub Kicinski 		wrp_reg_mov(nfp_prog, dst + 1, src + 1);
1851b14157eeSJakub Kicinski 	}
1852d9ae7f2bSJakub Kicinski 
1853d9ae7f2bSJakub Kicinski 	return 0;
1854d9ae7f2bSJakub Kicinski }
1855d9ae7f2bSJakub Kicinski 
1856d9ae7f2bSJakub Kicinski static int mov_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1857d9ae7f2bSJakub Kicinski {
1858d9ae7f2bSJakub Kicinski 	u64 imm = meta->insn.imm; /* sign extend */
1859d9ae7f2bSJakub Kicinski 
1860d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2), imm & ~0U);
1861d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), imm >> 32);
1862d9ae7f2bSJakub Kicinski 
1863d9ae7f2bSJakub Kicinski 	return 0;
1864d9ae7f2bSJakub Kicinski }
1865d9ae7f2bSJakub Kicinski 
1866d9ae7f2bSJakub Kicinski static int xor_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1867d9ae7f2bSJakub Kicinski {
1868d9ae7f2bSJakub Kicinski 	return wrp_alu64_reg(nfp_prog, meta, ALU_OP_XOR);
1869d9ae7f2bSJakub Kicinski }
1870d9ae7f2bSJakub Kicinski 
1871d9ae7f2bSJakub Kicinski static int xor_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1872d9ae7f2bSJakub Kicinski {
1873d9ae7f2bSJakub Kicinski 	return wrp_alu64_imm(nfp_prog, meta, ALU_OP_XOR, !meta->insn.imm);
1874d9ae7f2bSJakub Kicinski }
1875d9ae7f2bSJakub Kicinski 
1876d9ae7f2bSJakub Kicinski static int and_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1877d9ae7f2bSJakub Kicinski {
1878d9ae7f2bSJakub Kicinski 	return wrp_alu64_reg(nfp_prog, meta, ALU_OP_AND);
1879d9ae7f2bSJakub Kicinski }
1880d9ae7f2bSJakub Kicinski 
1881d9ae7f2bSJakub Kicinski static int and_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1882d9ae7f2bSJakub Kicinski {
1883d9ae7f2bSJakub Kicinski 	return wrp_alu64_imm(nfp_prog, meta, ALU_OP_AND, !~meta->insn.imm);
1884d9ae7f2bSJakub Kicinski }
1885d9ae7f2bSJakub Kicinski 
1886d9ae7f2bSJakub Kicinski static int or_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1887d9ae7f2bSJakub Kicinski {
1888d9ae7f2bSJakub Kicinski 	return wrp_alu64_reg(nfp_prog, meta, ALU_OP_OR);
1889d9ae7f2bSJakub Kicinski }
1890d9ae7f2bSJakub Kicinski 
1891d9ae7f2bSJakub Kicinski static int or_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1892d9ae7f2bSJakub Kicinski {
1893d9ae7f2bSJakub Kicinski 	return wrp_alu64_imm(nfp_prog, meta, ALU_OP_OR, !meta->insn.imm);
1894d9ae7f2bSJakub Kicinski }
1895d9ae7f2bSJakub Kicinski 
1896d9ae7f2bSJakub Kicinski static int add_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1897d9ae7f2bSJakub Kicinski {
1898d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1899d9ae7f2bSJakub Kicinski 
1900d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2),
1901d9ae7f2bSJakub Kicinski 		 reg_a(insn->dst_reg * 2), ALU_OP_ADD,
1902d9ae7f2bSJakub Kicinski 		 reg_b(insn->src_reg * 2));
1903d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1),
1904d9ae7f2bSJakub Kicinski 		 reg_a(insn->dst_reg * 2 + 1), ALU_OP_ADD_C,
1905d9ae7f2bSJakub Kicinski 		 reg_b(insn->src_reg * 2 + 1));
1906d9ae7f2bSJakub Kicinski 
1907d9ae7f2bSJakub Kicinski 	return 0;
1908d9ae7f2bSJakub Kicinski }
1909d9ae7f2bSJakub Kicinski 
1910d9ae7f2bSJakub Kicinski static int add_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1911d9ae7f2bSJakub Kicinski {
1912d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1913d9ae7f2bSJakub Kicinski 	u64 imm = insn->imm; /* sign extend */
1914d9ae7f2bSJakub Kicinski 
1915d9ae7f2bSJakub Kicinski 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, ALU_OP_ADD, imm & ~0U);
1916d9ae7f2bSJakub Kicinski 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, ALU_OP_ADD_C, imm >> 32);
1917d9ae7f2bSJakub Kicinski 
1918d9ae7f2bSJakub Kicinski 	return 0;
1919d9ae7f2bSJakub Kicinski }
1920d9ae7f2bSJakub Kicinski 
1921d9ae7f2bSJakub Kicinski static int sub_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1922d9ae7f2bSJakub Kicinski {
1923d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1924d9ae7f2bSJakub Kicinski 
1925d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2),
1926d9ae7f2bSJakub Kicinski 		 reg_a(insn->dst_reg * 2), ALU_OP_SUB,
1927d9ae7f2bSJakub Kicinski 		 reg_b(insn->src_reg * 2));
1928d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1),
1929d9ae7f2bSJakub Kicinski 		 reg_a(insn->dst_reg * 2 + 1), ALU_OP_SUB_C,
1930d9ae7f2bSJakub Kicinski 		 reg_b(insn->src_reg * 2 + 1));
1931d9ae7f2bSJakub Kicinski 
1932d9ae7f2bSJakub Kicinski 	return 0;
1933d9ae7f2bSJakub Kicinski }
1934d9ae7f2bSJakub Kicinski 
1935d9ae7f2bSJakub Kicinski static int sub_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1936d9ae7f2bSJakub Kicinski {
1937d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1938d9ae7f2bSJakub Kicinski 	u64 imm = insn->imm; /* sign extend */
1939d9ae7f2bSJakub Kicinski 
1940d9ae7f2bSJakub Kicinski 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, ALU_OP_SUB, imm & ~0U);
1941d9ae7f2bSJakub Kicinski 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, ALU_OP_SUB_C, imm >> 32);
1942d9ae7f2bSJakub Kicinski 
1943d9ae7f2bSJakub Kicinski 	return 0;
1944d9ae7f2bSJakub Kicinski }
1945d9ae7f2bSJakub Kicinski 
1946d3d23fdbSJiong Wang static int mul_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1947d3d23fdbSJiong Wang {
1948d3d23fdbSJiong Wang 	return wrp_mul(nfp_prog, meta, true, true);
1949d3d23fdbSJiong Wang }
1950d3d23fdbSJiong Wang 
1951d3d23fdbSJiong Wang static int mul_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1952d3d23fdbSJiong Wang {
1953d3d23fdbSJiong Wang 	return wrp_mul(nfp_prog, meta, true, false);
1954d3d23fdbSJiong Wang }
1955d3d23fdbSJiong Wang 
19562a952b03SJiong Wang static int div_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
19572a952b03SJiong Wang {
19582a952b03SJiong Wang 	const struct bpf_insn *insn = &meta->insn;
19592a952b03SJiong Wang 
19602a952b03SJiong Wang 	return wrp_div_imm(nfp_prog, insn->dst_reg * 2, insn->imm);
19612a952b03SJiong Wang }
19622a952b03SJiong Wang 
19632a952b03SJiong Wang static int div_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
19642a952b03SJiong Wang {
19652a952b03SJiong Wang 	/* NOTE: verifier hook has rejected cases for which verifier doesn't
19662a952b03SJiong Wang 	 * know whether the source operand is constant or not.
19672a952b03SJiong Wang 	 */
19682a952b03SJiong Wang 	return wrp_div_imm(nfp_prog, meta->insn.dst_reg * 2, meta->umin_src);
19692a952b03SJiong Wang }
19702a952b03SJiong Wang 
1971254ef4d7SJiong Wang static int neg_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1972254ef4d7SJiong Wang {
1973254ef4d7SJiong Wang 	const struct bpf_insn *insn = &meta->insn;
1974254ef4d7SJiong Wang 
1975254ef4d7SJiong Wang 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2), reg_imm(0),
1976254ef4d7SJiong Wang 		 ALU_OP_SUB, reg_b(insn->dst_reg * 2));
1977254ef4d7SJiong Wang 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1), reg_imm(0),
1978254ef4d7SJiong Wang 		 ALU_OP_SUB_C, reg_b(insn->dst_reg * 2 + 1));
1979254ef4d7SJiong Wang 
1980254ef4d7SJiong Wang 	return 0;
1981254ef4d7SJiong Wang }
1982254ef4d7SJiong Wang 
1983991f5b36SJiong Wang /* Pseudo code:
1984991f5b36SJiong Wang  *   if shift_amt >= 32
1985991f5b36SJiong Wang  *     dst_high = dst_low << shift_amt[4:0]
1986991f5b36SJiong Wang  *     dst_low = 0;
1987991f5b36SJiong Wang  *   else
1988991f5b36SJiong Wang  *     dst_high = (dst_high, dst_low) >> (32 - shift_amt)
1989991f5b36SJiong Wang  *     dst_low = dst_low << shift_amt
1990991f5b36SJiong Wang  *
1991991f5b36SJiong Wang  * The indirect shift will use the same logic at runtime.
1992991f5b36SJiong Wang  */
1993991f5b36SJiong Wang static int __shl_imm64(struct nfp_prog *nfp_prog, u8 dst, u8 shift_amt)
1994991f5b36SJiong Wang {
1995991f5b36SJiong Wang 	if (shift_amt < 32) {
1996991f5b36SJiong Wang 		emit_shf(nfp_prog, reg_both(dst + 1), reg_a(dst + 1),
1997991f5b36SJiong Wang 			 SHF_OP_NONE, reg_b(dst), SHF_SC_R_DSHF,
1998991f5b36SJiong Wang 			 32 - shift_amt);
1999991f5b36SJiong Wang 		emit_shf(nfp_prog, reg_both(dst), reg_none(), SHF_OP_NONE,
2000991f5b36SJiong Wang 			 reg_b(dst), SHF_SC_L_SHF, shift_amt);
2001991f5b36SJiong Wang 	} else if (shift_amt == 32) {
2002991f5b36SJiong Wang 		wrp_reg_mov(nfp_prog, dst + 1, dst);
2003991f5b36SJiong Wang 		wrp_immed(nfp_prog, reg_both(dst), 0);
2004991f5b36SJiong Wang 	} else if (shift_amt > 32) {
2005991f5b36SJiong Wang 		emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_NONE,
2006991f5b36SJiong Wang 			 reg_b(dst), SHF_SC_L_SHF, shift_amt - 32);
2007991f5b36SJiong Wang 		wrp_immed(nfp_prog, reg_both(dst), 0);
2008991f5b36SJiong Wang 	}
2009991f5b36SJiong Wang 
2010991f5b36SJiong Wang 	return 0;
2011991f5b36SJiong Wang }
2012991f5b36SJiong Wang 
2013d9ae7f2bSJakub Kicinski static int shl_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2014d9ae7f2bSJakub Kicinski {
2015d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
20163cae1319SJakub Kicinski 	u8 dst = insn->dst_reg * 2;
2017d9ae7f2bSJakub Kicinski 
2018991f5b36SJiong Wang 	return __shl_imm64(nfp_prog, dst, insn->imm);
2019991f5b36SJiong Wang }
2020991f5b36SJiong Wang 
2021991f5b36SJiong Wang static void shl_reg64_lt32_high(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2022991f5b36SJiong Wang {
2023991f5b36SJiong Wang 	emit_alu(nfp_prog, imm_both(nfp_prog), reg_imm(32), ALU_OP_SUB,
2024991f5b36SJiong Wang 		 reg_b(src));
2025991f5b36SJiong Wang 	emit_alu(nfp_prog, reg_none(), imm_a(nfp_prog), ALU_OP_OR, reg_imm(0));
2026991f5b36SJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst + 1), reg_a(dst + 1), SHF_OP_NONE,
2027991f5b36SJiong Wang 		       reg_b(dst), SHF_SC_R_DSHF);
2028991f5b36SJiong Wang }
2029991f5b36SJiong Wang 
2030991f5b36SJiong Wang /* NOTE: for indirect left shift, HIGH part should be calculated first. */
2031991f5b36SJiong Wang static void shl_reg64_lt32_low(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2032991f5b36SJiong Wang {
2033991f5b36SJiong Wang 	emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0));
2034991f5b36SJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst), reg_none(), SHF_OP_NONE,
2035991f5b36SJiong Wang 		       reg_b(dst), SHF_SC_L_SHF);
2036991f5b36SJiong Wang }
2037991f5b36SJiong Wang 
2038991f5b36SJiong Wang static void shl_reg64_lt32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2039991f5b36SJiong Wang {
2040991f5b36SJiong Wang 	shl_reg64_lt32_high(nfp_prog, dst, src);
2041991f5b36SJiong Wang 	shl_reg64_lt32_low(nfp_prog, dst, src);
2042991f5b36SJiong Wang }
2043991f5b36SJiong Wang 
2044991f5b36SJiong Wang static void shl_reg64_ge32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2045991f5b36SJiong Wang {
2046991f5b36SJiong Wang 	emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0));
2047991f5b36SJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_NONE,
2048991f5b36SJiong Wang 		       reg_b(dst), SHF_SC_L_SHF);
20493cae1319SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(dst), 0);
2050991f5b36SJiong Wang }
2051991f5b36SJiong Wang 
2052991f5b36SJiong Wang static int shl_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2053991f5b36SJiong Wang {
2054991f5b36SJiong Wang 	const struct bpf_insn *insn = &meta->insn;
2055991f5b36SJiong Wang 	u64 umin, umax;
2056991f5b36SJiong Wang 	u8 dst, src;
2057991f5b36SJiong Wang 
2058991f5b36SJiong Wang 	dst = insn->dst_reg * 2;
2059662c5472SJiong Wang 	umin = meta->umin_src;
2060662c5472SJiong Wang 	umax = meta->umax_src;
2061991f5b36SJiong Wang 	if (umin == umax)
2062991f5b36SJiong Wang 		return __shl_imm64(nfp_prog, dst, umin);
2063991f5b36SJiong Wang 
2064991f5b36SJiong Wang 	src = insn->src_reg * 2;
2065991f5b36SJiong Wang 	if (umax < 32) {
2066991f5b36SJiong Wang 		shl_reg64_lt32(nfp_prog, dst, src);
2067991f5b36SJiong Wang 	} else if (umin >= 32) {
2068991f5b36SJiong Wang 		shl_reg64_ge32(nfp_prog, dst, src);
2069991f5b36SJiong Wang 	} else {
2070991f5b36SJiong Wang 		/* Generate different instruction sequences depending on runtime
2071991f5b36SJiong Wang 		 * value of shift amount.
2072991f5b36SJiong Wang 		 */
2073991f5b36SJiong Wang 		u16 label_ge32, label_end;
2074991f5b36SJiong Wang 
2075991f5b36SJiong Wang 		label_ge32 = nfp_prog_current_offset(nfp_prog) + 7;
2076991f5b36SJiong Wang 		emit_br_bset(nfp_prog, reg_a(src), 5, label_ge32, 0);
2077991f5b36SJiong Wang 
2078991f5b36SJiong Wang 		shl_reg64_lt32_high(nfp_prog, dst, src);
2079991f5b36SJiong Wang 		label_end = nfp_prog_current_offset(nfp_prog) + 6;
2080991f5b36SJiong Wang 		emit_br(nfp_prog, BR_UNC, label_end, 2);
2081991f5b36SJiong Wang 		/* shl_reg64_lt32_low packed in delay slot. */
2082991f5b36SJiong Wang 		shl_reg64_lt32_low(nfp_prog, dst, src);
2083991f5b36SJiong Wang 
2084991f5b36SJiong Wang 		if (!nfp_prog_confirm_current_offset(nfp_prog, label_ge32))
2085991f5b36SJiong Wang 			return -EINVAL;
2086991f5b36SJiong Wang 		shl_reg64_ge32(nfp_prog, dst, src);
2087991f5b36SJiong Wang 
2088991f5b36SJiong Wang 		if (!nfp_prog_confirm_current_offset(nfp_prog, label_end))
2089991f5b36SJiong Wang 			return -EINVAL;
2090991f5b36SJiong Wang 	}
2091991f5b36SJiong Wang 
2092991f5b36SJiong Wang 	return 0;
2093991f5b36SJiong Wang }
2094991f5b36SJiong Wang 
2095991f5b36SJiong Wang /* Pseudo code:
2096991f5b36SJiong Wang  *   if shift_amt >= 32
2097991f5b36SJiong Wang  *     dst_high = 0;
2098991f5b36SJiong Wang  *     dst_low = dst_high >> shift_amt[4:0]
2099991f5b36SJiong Wang  *   else
2100991f5b36SJiong Wang  *     dst_high = dst_high >> shift_amt
2101991f5b36SJiong Wang  *     dst_low = (dst_high, dst_low) >> shift_amt
2102991f5b36SJiong Wang  *
2103991f5b36SJiong Wang  * The indirect shift will use the same logic at runtime.
2104991f5b36SJiong Wang  */
2105991f5b36SJiong Wang static int __shr_imm64(struct nfp_prog *nfp_prog, u8 dst, u8 shift_amt)
2106991f5b36SJiong Wang {
2107991f5b36SJiong Wang 	if (shift_amt < 32) {
2108991f5b36SJiong Wang 		emit_shf(nfp_prog, reg_both(dst), reg_a(dst + 1), SHF_OP_NONE,
2109991f5b36SJiong Wang 			 reg_b(dst), SHF_SC_R_DSHF, shift_amt);
2110991f5b36SJiong Wang 		emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_NONE,
2111991f5b36SJiong Wang 			 reg_b(dst + 1), SHF_SC_R_SHF, shift_amt);
2112991f5b36SJiong Wang 	} else if (shift_amt == 32) {
2113991f5b36SJiong Wang 		wrp_reg_mov(nfp_prog, dst, dst + 1);
2114991f5b36SJiong Wang 		wrp_immed(nfp_prog, reg_both(dst + 1), 0);
2115991f5b36SJiong Wang 	} else if (shift_amt > 32) {
2116991f5b36SJiong Wang 		emit_shf(nfp_prog, reg_both(dst), reg_none(), SHF_OP_NONE,
2117991f5b36SJiong Wang 			 reg_b(dst + 1), SHF_SC_R_SHF, shift_amt - 32);
2118991f5b36SJiong Wang 		wrp_immed(nfp_prog, reg_both(dst + 1), 0);
21193cae1319SJakub Kicinski 	}
2120d9ae7f2bSJakub Kicinski 
2121d9ae7f2bSJakub Kicinski 	return 0;
2122d9ae7f2bSJakub Kicinski }
2123d9ae7f2bSJakub Kicinski 
2124d9ae7f2bSJakub Kicinski static int shr_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2125d9ae7f2bSJakub Kicinski {
2126d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
21273cae1319SJakub Kicinski 	u8 dst = insn->dst_reg * 2;
2128d9ae7f2bSJakub Kicinski 
2129991f5b36SJiong Wang 	return __shr_imm64(nfp_prog, dst, insn->imm);
2130991f5b36SJiong Wang }
2131991f5b36SJiong Wang 
2132991f5b36SJiong Wang /* NOTE: for indirect right shift, LOW part should be calculated first. */
2133991f5b36SJiong Wang static void shr_reg64_lt32_high(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2134991f5b36SJiong Wang {
2135991f5b36SJiong Wang 	emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0));
2136991f5b36SJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_NONE,
2137991f5b36SJiong Wang 		       reg_b(dst + 1), SHF_SC_R_SHF);
2138991f5b36SJiong Wang }
2139991f5b36SJiong Wang 
2140991f5b36SJiong Wang static void shr_reg64_lt32_low(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2141991f5b36SJiong Wang {
2142991f5b36SJiong Wang 	emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0));
2143991f5b36SJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst), reg_a(dst + 1), SHF_OP_NONE,
2144991f5b36SJiong Wang 		       reg_b(dst), SHF_SC_R_DSHF);
2145991f5b36SJiong Wang }
2146991f5b36SJiong Wang 
2147991f5b36SJiong Wang static void shr_reg64_lt32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2148991f5b36SJiong Wang {
2149991f5b36SJiong Wang 	shr_reg64_lt32_low(nfp_prog, dst, src);
2150991f5b36SJiong Wang 	shr_reg64_lt32_high(nfp_prog, dst, src);
2151991f5b36SJiong Wang }
2152991f5b36SJiong Wang 
2153991f5b36SJiong Wang static void shr_reg64_ge32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2154991f5b36SJiong Wang {
2155991f5b36SJiong Wang 	emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0));
2156991f5b36SJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst), reg_none(), SHF_OP_NONE,
2157991f5b36SJiong Wang 		       reg_b(dst + 1), SHF_SC_R_SHF);
21583cae1319SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(dst + 1), 0);
2159991f5b36SJiong Wang }
2160991f5b36SJiong Wang 
2161991f5b36SJiong Wang static int shr_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2162991f5b36SJiong Wang {
2163991f5b36SJiong Wang 	const struct bpf_insn *insn = &meta->insn;
2164991f5b36SJiong Wang 	u64 umin, umax;
2165991f5b36SJiong Wang 	u8 dst, src;
2166991f5b36SJiong Wang 
2167991f5b36SJiong Wang 	dst = insn->dst_reg * 2;
2168662c5472SJiong Wang 	umin = meta->umin_src;
2169662c5472SJiong Wang 	umax = meta->umax_src;
2170991f5b36SJiong Wang 	if (umin == umax)
2171991f5b36SJiong Wang 		return __shr_imm64(nfp_prog, dst, umin);
2172991f5b36SJiong Wang 
2173991f5b36SJiong Wang 	src = insn->src_reg * 2;
2174991f5b36SJiong Wang 	if (umax < 32) {
2175991f5b36SJiong Wang 		shr_reg64_lt32(nfp_prog, dst, src);
2176991f5b36SJiong Wang 	} else if (umin >= 32) {
2177991f5b36SJiong Wang 		shr_reg64_ge32(nfp_prog, dst, src);
2178991f5b36SJiong Wang 	} else {
2179991f5b36SJiong Wang 		/* Generate different instruction sequences depending on runtime
2180991f5b36SJiong Wang 		 * value of shift amount.
2181991f5b36SJiong Wang 		 */
2182991f5b36SJiong Wang 		u16 label_ge32, label_end;
2183991f5b36SJiong Wang 
2184991f5b36SJiong Wang 		label_ge32 = nfp_prog_current_offset(nfp_prog) + 6;
2185991f5b36SJiong Wang 		emit_br_bset(nfp_prog, reg_a(src), 5, label_ge32, 0);
2186991f5b36SJiong Wang 		shr_reg64_lt32_low(nfp_prog, dst, src);
2187991f5b36SJiong Wang 		label_end = nfp_prog_current_offset(nfp_prog) + 6;
2188991f5b36SJiong Wang 		emit_br(nfp_prog, BR_UNC, label_end, 2);
2189991f5b36SJiong Wang 		/* shr_reg64_lt32_high packed in delay slot. */
2190991f5b36SJiong Wang 		shr_reg64_lt32_high(nfp_prog, dst, src);
2191991f5b36SJiong Wang 
2192991f5b36SJiong Wang 		if (!nfp_prog_confirm_current_offset(nfp_prog, label_ge32))
2193991f5b36SJiong Wang 			return -EINVAL;
2194991f5b36SJiong Wang 		shr_reg64_ge32(nfp_prog, dst, src);
2195991f5b36SJiong Wang 
2196991f5b36SJiong Wang 		if (!nfp_prog_confirm_current_offset(nfp_prog, label_end))
2197991f5b36SJiong Wang 			return -EINVAL;
21983cae1319SJakub Kicinski 	}
2199d9ae7f2bSJakub Kicinski 
2200d9ae7f2bSJakub Kicinski 	return 0;
2201d9ae7f2bSJakub Kicinski }
2202d9ae7f2bSJakub Kicinski 
2203f43d0f17SJiong Wang /* Code logic is the same as __shr_imm64 except ashr requires signedness bit
2204f43d0f17SJiong Wang  * told through PREV_ALU result.
2205f43d0f17SJiong Wang  */
2206c217abccSJiong Wang static int __ashr_imm64(struct nfp_prog *nfp_prog, u8 dst, u8 shift_amt)
2207c217abccSJiong Wang {
2208c217abccSJiong Wang 	if (shift_amt < 32) {
2209c217abccSJiong Wang 		emit_shf(nfp_prog, reg_both(dst), reg_a(dst + 1), SHF_OP_NONE,
2210c217abccSJiong Wang 			 reg_b(dst), SHF_SC_R_DSHF, shift_amt);
2211c217abccSJiong Wang 		/* Set signedness bit. */
2212c217abccSJiong Wang 		emit_alu(nfp_prog, reg_none(), reg_a(dst + 1), ALU_OP_OR,
2213c217abccSJiong Wang 			 reg_imm(0));
2214c217abccSJiong Wang 		emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR,
2215c217abccSJiong Wang 			 reg_b(dst + 1), SHF_SC_R_SHF, shift_amt);
2216c217abccSJiong Wang 	} else if (shift_amt == 32) {
2217c217abccSJiong Wang 		/* NOTE: this also helps setting signedness bit. */
2218c217abccSJiong Wang 		wrp_reg_mov(nfp_prog, dst, dst + 1);
2219c217abccSJiong Wang 		emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR,
2220c217abccSJiong Wang 			 reg_b(dst + 1), SHF_SC_R_SHF, 31);
2221c217abccSJiong Wang 	} else if (shift_amt > 32) {
2222c217abccSJiong Wang 		emit_alu(nfp_prog, reg_none(), reg_a(dst + 1), ALU_OP_OR,
2223c217abccSJiong Wang 			 reg_imm(0));
2224c217abccSJiong Wang 		emit_shf(nfp_prog, reg_both(dst), reg_none(), SHF_OP_ASHR,
2225c217abccSJiong Wang 			 reg_b(dst + 1), SHF_SC_R_SHF, shift_amt - 32);
2226c217abccSJiong Wang 		emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR,
2227c217abccSJiong Wang 			 reg_b(dst + 1), SHF_SC_R_SHF, 31);
2228c217abccSJiong Wang 	}
2229c217abccSJiong Wang 
2230c217abccSJiong Wang 	return 0;
2231c217abccSJiong Wang }
2232c217abccSJiong Wang 
2233f43d0f17SJiong Wang static int ashr_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2234f43d0f17SJiong Wang {
2235f43d0f17SJiong Wang 	const struct bpf_insn *insn = &meta->insn;
2236f43d0f17SJiong Wang 	u8 dst = insn->dst_reg * 2;
2237f43d0f17SJiong Wang 
2238c217abccSJiong Wang 	return __ashr_imm64(nfp_prog, dst, insn->imm);
2239c217abccSJiong Wang }
2240c217abccSJiong Wang 
2241c217abccSJiong Wang static void ashr_reg64_lt32_high(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2242c217abccSJiong Wang {
2243c217abccSJiong Wang 	/* NOTE: the first insn will set both indirect shift amount (source A)
2244c217abccSJiong Wang 	 * and signedness bit (MSB of result).
2245c217abccSJiong Wang 	 */
2246c217abccSJiong Wang 	emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_b(dst + 1));
2247c217abccSJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR,
2248c217abccSJiong Wang 		       reg_b(dst + 1), SHF_SC_R_SHF);
2249c217abccSJiong Wang }
2250c217abccSJiong Wang 
2251c217abccSJiong Wang static void ashr_reg64_lt32_low(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2252c217abccSJiong Wang {
2253c217abccSJiong Wang 	/* NOTE: it is the same as logic shift because we don't need to shift in
2254c217abccSJiong Wang 	 * signedness bit when the shift amount is less than 32.
2255c217abccSJiong Wang 	 */
2256c217abccSJiong Wang 	return shr_reg64_lt32_low(nfp_prog, dst, src);
2257c217abccSJiong Wang }
2258c217abccSJiong Wang 
2259c217abccSJiong Wang static void ashr_reg64_lt32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2260c217abccSJiong Wang {
2261c217abccSJiong Wang 	ashr_reg64_lt32_low(nfp_prog, dst, src);
2262c217abccSJiong Wang 	ashr_reg64_lt32_high(nfp_prog, dst, src);
2263c217abccSJiong Wang }
2264c217abccSJiong Wang 
2265c217abccSJiong Wang static void ashr_reg64_ge32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2266c217abccSJiong Wang {
2267c217abccSJiong Wang 	emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_b(dst + 1));
2268c217abccSJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst), reg_none(), SHF_OP_ASHR,
2269c217abccSJiong Wang 		       reg_b(dst + 1), SHF_SC_R_SHF);
2270f43d0f17SJiong Wang 	emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR,
2271f43d0f17SJiong Wang 		 reg_b(dst + 1), SHF_SC_R_SHF, 31);
2272c217abccSJiong Wang }
2273c217abccSJiong Wang 
2274c217abccSJiong Wang /* Like ashr_imm64, but need to use indirect shift. */
2275c217abccSJiong Wang static int ashr_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2276c217abccSJiong Wang {
2277c217abccSJiong Wang 	const struct bpf_insn *insn = &meta->insn;
2278c217abccSJiong Wang 	u64 umin, umax;
2279c217abccSJiong Wang 	u8 dst, src;
2280c217abccSJiong Wang 
2281c217abccSJiong Wang 	dst = insn->dst_reg * 2;
2282662c5472SJiong Wang 	umin = meta->umin_src;
2283662c5472SJiong Wang 	umax = meta->umax_src;
2284c217abccSJiong Wang 	if (umin == umax)
2285c217abccSJiong Wang 		return __ashr_imm64(nfp_prog, dst, umin);
2286c217abccSJiong Wang 
2287c217abccSJiong Wang 	src = insn->src_reg * 2;
2288c217abccSJiong Wang 	if (umax < 32) {
2289c217abccSJiong Wang 		ashr_reg64_lt32(nfp_prog, dst, src);
2290c217abccSJiong Wang 	} else if (umin >= 32) {
2291c217abccSJiong Wang 		ashr_reg64_ge32(nfp_prog, dst, src);
2292c217abccSJiong Wang 	} else {
2293c217abccSJiong Wang 		u16 label_ge32, label_end;
2294c217abccSJiong Wang 
2295c217abccSJiong Wang 		label_ge32 = nfp_prog_current_offset(nfp_prog) + 6;
2296c217abccSJiong Wang 		emit_br_bset(nfp_prog, reg_a(src), 5, label_ge32, 0);
2297c217abccSJiong Wang 		ashr_reg64_lt32_low(nfp_prog, dst, src);
2298c217abccSJiong Wang 		label_end = nfp_prog_current_offset(nfp_prog) + 6;
2299c217abccSJiong Wang 		emit_br(nfp_prog, BR_UNC, label_end, 2);
2300c217abccSJiong Wang 		/* ashr_reg64_lt32_high packed in delay slot. */
2301c217abccSJiong Wang 		ashr_reg64_lt32_high(nfp_prog, dst, src);
2302c217abccSJiong Wang 
2303c217abccSJiong Wang 		if (!nfp_prog_confirm_current_offset(nfp_prog, label_ge32))
2304c217abccSJiong Wang 			return -EINVAL;
2305c217abccSJiong Wang 		ashr_reg64_ge32(nfp_prog, dst, src);
2306c217abccSJiong Wang 
2307c217abccSJiong Wang 		if (!nfp_prog_confirm_current_offset(nfp_prog, label_end))
2308c217abccSJiong Wang 			return -EINVAL;
2309f43d0f17SJiong Wang 	}
2310f43d0f17SJiong Wang 
2311f43d0f17SJiong Wang 	return 0;
2312f43d0f17SJiong Wang }
2313f43d0f17SJiong Wang 
2314d9ae7f2bSJakub Kicinski static int mov_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2315d9ae7f2bSJakub Kicinski {
2316d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
2317d9ae7f2bSJakub Kicinski 
2318d9ae7f2bSJakub Kicinski 	wrp_reg_mov(nfp_prog, insn->dst_reg * 2,  insn->src_reg * 2);
2319d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
2320d9ae7f2bSJakub Kicinski 
2321d9ae7f2bSJakub Kicinski 	return 0;
2322d9ae7f2bSJakub Kicinski }
2323d9ae7f2bSJakub Kicinski 
2324d9ae7f2bSJakub Kicinski static int mov_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2325d9ae7f2bSJakub Kicinski {
2326d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
2327d9ae7f2bSJakub Kicinski 
2328d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2), insn->imm);
2329d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
2330d9ae7f2bSJakub Kicinski 
2331d9ae7f2bSJakub Kicinski 	return 0;
2332d9ae7f2bSJakub Kicinski }
2333d9ae7f2bSJakub Kicinski 
2334d9ae7f2bSJakub Kicinski static int xor_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2335d9ae7f2bSJakub Kicinski {
2336d9ae7f2bSJakub Kicinski 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_XOR);
2337d9ae7f2bSJakub Kicinski }
2338d9ae7f2bSJakub Kicinski 
2339d9ae7f2bSJakub Kicinski static int xor_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2340d9ae7f2bSJakub Kicinski {
2341d9ae7f2bSJakub Kicinski 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_XOR, !~meta->insn.imm);
2342d9ae7f2bSJakub Kicinski }
2343d9ae7f2bSJakub Kicinski 
2344d9ae7f2bSJakub Kicinski static int and_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2345d9ae7f2bSJakub Kicinski {
2346d9ae7f2bSJakub Kicinski 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_AND);
2347d9ae7f2bSJakub Kicinski }
2348d9ae7f2bSJakub Kicinski 
2349d9ae7f2bSJakub Kicinski static int and_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2350d9ae7f2bSJakub Kicinski {
2351d9ae7f2bSJakub Kicinski 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_AND, !~meta->insn.imm);
2352d9ae7f2bSJakub Kicinski }
2353d9ae7f2bSJakub Kicinski 
2354d9ae7f2bSJakub Kicinski static int or_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2355d9ae7f2bSJakub Kicinski {
2356d9ae7f2bSJakub Kicinski 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_OR);
2357d9ae7f2bSJakub Kicinski }
2358d9ae7f2bSJakub Kicinski 
2359d9ae7f2bSJakub Kicinski static int or_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2360d9ae7f2bSJakub Kicinski {
2361d9ae7f2bSJakub Kicinski 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_OR, !meta->insn.imm);
2362d9ae7f2bSJakub Kicinski }
2363d9ae7f2bSJakub Kicinski 
2364d9ae7f2bSJakub Kicinski static int add_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2365d9ae7f2bSJakub Kicinski {
2366d9ae7f2bSJakub Kicinski 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_ADD);
2367d9ae7f2bSJakub Kicinski }
2368d9ae7f2bSJakub Kicinski 
2369d9ae7f2bSJakub Kicinski static int add_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2370d9ae7f2bSJakub Kicinski {
2371d9ae7f2bSJakub Kicinski 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_ADD, !meta->insn.imm);
2372d9ae7f2bSJakub Kicinski }
2373d9ae7f2bSJakub Kicinski 
2374d9ae7f2bSJakub Kicinski static int sub_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2375d9ae7f2bSJakub Kicinski {
2376d9ae7f2bSJakub Kicinski 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_SUB);
2377d9ae7f2bSJakub Kicinski }
2378d9ae7f2bSJakub Kicinski 
2379d9ae7f2bSJakub Kicinski static int sub_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2380d9ae7f2bSJakub Kicinski {
2381d9ae7f2bSJakub Kicinski 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_SUB, !meta->insn.imm);
2382d9ae7f2bSJakub Kicinski }
2383d9ae7f2bSJakub Kicinski 
2384d3d23fdbSJiong Wang static int mul_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2385d3d23fdbSJiong Wang {
2386d3d23fdbSJiong Wang 	return wrp_mul(nfp_prog, meta, false, true);
2387d3d23fdbSJiong Wang }
2388d3d23fdbSJiong Wang 
2389d3d23fdbSJiong Wang static int mul_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2390d3d23fdbSJiong Wang {
2391d3d23fdbSJiong Wang 	return wrp_mul(nfp_prog, meta, false, false);
2392d3d23fdbSJiong Wang }
2393d3d23fdbSJiong Wang 
23942a952b03SJiong Wang static int div_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
23952a952b03SJiong Wang {
23962a952b03SJiong Wang 	return div_reg64(nfp_prog, meta);
23972a952b03SJiong Wang }
23982a952b03SJiong Wang 
23992a952b03SJiong Wang static int div_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
24002a952b03SJiong Wang {
24012a952b03SJiong Wang 	return div_imm64(nfp_prog, meta);
24022a952b03SJiong Wang }
24032a952b03SJiong Wang 
2404254ef4d7SJiong Wang static int neg_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2405254ef4d7SJiong Wang {
2406254ef4d7SJiong Wang 	u8 dst = meta->insn.dst_reg * 2;
2407254ef4d7SJiong Wang 
2408254ef4d7SJiong Wang 	emit_alu(nfp_prog, reg_both(dst), reg_imm(0), ALU_OP_SUB, reg_b(dst));
2409254ef4d7SJiong Wang 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
2410254ef4d7SJiong Wang 
2411254ef4d7SJiong Wang 	return 0;
2412254ef4d7SJiong Wang }
2413254ef4d7SJiong Wang 
2414d9ae7f2bSJakub Kicinski static int shl_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2415d9ae7f2bSJakub Kicinski {
2416d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
2417d9ae7f2bSJakub Kicinski 
2418d9ae7f2bSJakub Kicinski 	if (!insn->imm)
2419d9ae7f2bSJakub Kicinski 		return 1; /* TODO: zero shift means indirect */
2420d9ae7f2bSJakub Kicinski 
2421d9ae7f2bSJakub Kicinski 	emit_shf(nfp_prog, reg_both(insn->dst_reg * 2),
2422d9ae7f2bSJakub Kicinski 		 reg_none(), SHF_OP_NONE, reg_b(insn->dst_reg * 2),
2423d9ae7f2bSJakub Kicinski 		 SHF_SC_L_SHF, insn->imm);
2424d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
2425d9ae7f2bSJakub Kicinski 
2426d9ae7f2bSJakub Kicinski 	return 0;
2427d9ae7f2bSJakub Kicinski }
2428d9ae7f2bSJakub Kicinski 
24293119d1fdSJakub Kicinski static int end_reg32(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
24303119d1fdSJakub Kicinski {
24313119d1fdSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
24323119d1fdSJakub Kicinski 	u8 gpr = insn->dst_reg * 2;
24333119d1fdSJakub Kicinski 
24343119d1fdSJakub Kicinski 	switch (insn->imm) {
24353119d1fdSJakub Kicinski 	case 16:
24363119d1fdSJakub Kicinski 		emit_ld_field(nfp_prog, reg_both(gpr), 0x9, reg_b(gpr),
24373119d1fdSJakub Kicinski 			      SHF_SC_R_ROT, 8);
24383119d1fdSJakub Kicinski 		emit_ld_field(nfp_prog, reg_both(gpr), 0xe, reg_a(gpr),
24393119d1fdSJakub Kicinski 			      SHF_SC_R_SHF, 16);
24403119d1fdSJakub Kicinski 
24413119d1fdSJakub Kicinski 		wrp_immed(nfp_prog, reg_both(gpr + 1), 0);
24423119d1fdSJakub Kicinski 		break;
24433119d1fdSJakub Kicinski 	case 32:
24443119d1fdSJakub Kicinski 		wrp_end32(nfp_prog, reg_a(gpr), gpr);
24453119d1fdSJakub Kicinski 		wrp_immed(nfp_prog, reg_both(gpr + 1), 0);
24463119d1fdSJakub Kicinski 		break;
24473119d1fdSJakub Kicinski 	case 64:
24483119d1fdSJakub Kicinski 		wrp_mov(nfp_prog, imm_a(nfp_prog), reg_b(gpr + 1));
24493119d1fdSJakub Kicinski 
24503119d1fdSJakub Kicinski 		wrp_end32(nfp_prog, reg_a(gpr), gpr + 1);
24513119d1fdSJakub Kicinski 		wrp_end32(nfp_prog, imm_a(nfp_prog), gpr);
24523119d1fdSJakub Kicinski 		break;
24533119d1fdSJakub Kicinski 	}
24543119d1fdSJakub Kicinski 
24553119d1fdSJakub Kicinski 	return 0;
24563119d1fdSJakub Kicinski }
24573119d1fdSJakub Kicinski 
2458d9ae7f2bSJakub Kicinski static int imm_ld8_part2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2459d9ae7f2bSJakub Kicinski {
24609f16c8abSJakub Kicinski 	struct nfp_insn_meta *prev = nfp_meta_prev(meta);
24619f16c8abSJakub Kicinski 	u32 imm_lo, imm_hi;
24629f16c8abSJakub Kicinski 	u8 dst;
24639f16c8abSJakub Kicinski 
24649f16c8abSJakub Kicinski 	dst = prev->insn.dst_reg * 2;
24659f16c8abSJakub Kicinski 	imm_lo = prev->insn.imm;
24669f16c8abSJakub Kicinski 	imm_hi = meta->insn.imm;
24679f16c8abSJakub Kicinski 
24689f16c8abSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(dst), imm_lo);
24699f16c8abSJakub Kicinski 
24709f16c8abSJakub Kicinski 	/* mov is always 1 insn, load imm may be two, so try to use mov */
24719f16c8abSJakub Kicinski 	if (imm_hi == imm_lo)
24729f16c8abSJakub Kicinski 		wrp_mov(nfp_prog, reg_both(dst + 1), reg_a(dst));
24739f16c8abSJakub Kicinski 	else
24749f16c8abSJakub Kicinski 		wrp_immed(nfp_prog, reg_both(dst + 1), imm_hi);
2475d9ae7f2bSJakub Kicinski 
2476d9ae7f2bSJakub Kicinski 	return 0;
2477d9ae7f2bSJakub Kicinski }
2478d9ae7f2bSJakub Kicinski 
2479d9ae7f2bSJakub Kicinski static int imm_ld8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2480d9ae7f2bSJakub Kicinski {
2481d9ae7f2bSJakub Kicinski 	meta->double_cb = imm_ld8_part2;
2482d9ae7f2bSJakub Kicinski 	return 0;
2483d9ae7f2bSJakub Kicinski }
2484d9ae7f2bSJakub Kicinski 
2485d9ae7f2bSJakub Kicinski static int data_ld1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2486d9ae7f2bSJakub Kicinski {
2487d9ae7f2bSJakub Kicinski 	return construct_data_ld(nfp_prog, meta->insn.imm, 1);
2488d9ae7f2bSJakub Kicinski }
2489d9ae7f2bSJakub Kicinski 
2490d9ae7f2bSJakub Kicinski static int data_ld2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2491d9ae7f2bSJakub Kicinski {
2492d9ae7f2bSJakub Kicinski 	return construct_data_ld(nfp_prog, meta->insn.imm, 2);
2493d9ae7f2bSJakub Kicinski }
2494d9ae7f2bSJakub Kicinski 
2495d9ae7f2bSJakub Kicinski static int data_ld4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2496d9ae7f2bSJakub Kicinski {
2497d9ae7f2bSJakub Kicinski 	return construct_data_ld(nfp_prog, meta->insn.imm, 4);
2498d9ae7f2bSJakub Kicinski }
2499d9ae7f2bSJakub Kicinski 
2500d9ae7f2bSJakub Kicinski static int data_ind_ld1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2501d9ae7f2bSJakub Kicinski {
2502d9ae7f2bSJakub Kicinski 	return construct_data_ind_ld(nfp_prog, meta->insn.imm,
25030a793977SJakub Kicinski 				     meta->insn.src_reg * 2, 1);
2504d9ae7f2bSJakub Kicinski }
2505d9ae7f2bSJakub Kicinski 
2506d9ae7f2bSJakub Kicinski static int data_ind_ld2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2507d9ae7f2bSJakub Kicinski {
2508d9ae7f2bSJakub Kicinski 	return construct_data_ind_ld(nfp_prog, meta->insn.imm,
25090a793977SJakub Kicinski 				     meta->insn.src_reg * 2, 2);
2510d9ae7f2bSJakub Kicinski }
2511d9ae7f2bSJakub Kicinski 
2512d9ae7f2bSJakub Kicinski static int data_ind_ld4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2513d9ae7f2bSJakub Kicinski {
2514d9ae7f2bSJakub Kicinski 	return construct_data_ind_ld(nfp_prog, meta->insn.imm,
25150a793977SJakub Kicinski 				     meta->insn.src_reg * 2, 4);
2516d9ae7f2bSJakub Kicinski }
2517d9ae7f2bSJakub Kicinski 
2518a82b23fbSJakub Kicinski static int
2519a82b23fbSJakub Kicinski mem_ldx_stack(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2520d3488480SJakub Kicinski 	      unsigned int size, unsigned int ptr_off)
2521a82b23fbSJakub Kicinski {
2522d3488480SJakub Kicinski 	return mem_op_stack(nfp_prog, meta, size, ptr_off,
2523b14157eeSJakub Kicinski 			    meta->insn.dst_reg * 2, meta->insn.src_reg * 2,
2524b14157eeSJakub Kicinski 			    true, wrp_lmem_load);
2525a82b23fbSJakub Kicinski }
2526a82b23fbSJakub Kicinski 
2527943c57b9SJakub Kicinski static int mem_ldx_skb(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2528943c57b9SJakub Kicinski 		       u8 size)
2529d9ae7f2bSJakub Kicinski {
2530bfddbc8aSJakub Kicinski 	swreg dst = reg_both(meta->insn.dst_reg * 2);
2531bfddbc8aSJakub Kicinski 
2532943c57b9SJakub Kicinski 	switch (meta->insn.off) {
2533c6c580d7SJakub Kicinski 	case offsetof(struct __sk_buff, len):
2534c6c580d7SJakub Kicinski 		if (size != FIELD_SIZEOF(struct __sk_buff, len))
2535943c57b9SJakub Kicinski 			return -EOPNOTSUPP;
2536bfddbc8aSJakub Kicinski 		wrp_mov(nfp_prog, dst, plen_reg(nfp_prog));
2537bfddbc8aSJakub Kicinski 		break;
2538c6c580d7SJakub Kicinski 	case offsetof(struct __sk_buff, data):
2539c6c580d7SJakub Kicinski 		if (size != FIELD_SIZEOF(struct __sk_buff, data))
2540bfddbc8aSJakub Kicinski 			return -EOPNOTSUPP;
2541bfddbc8aSJakub Kicinski 		wrp_mov(nfp_prog, dst, pptr_reg(nfp_prog));
2542bfddbc8aSJakub Kicinski 		break;
2543c6c580d7SJakub Kicinski 	case offsetof(struct __sk_buff, data_end):
2544c6c580d7SJakub Kicinski 		if (size != FIELD_SIZEOF(struct __sk_buff, data_end))
2545bfddbc8aSJakub Kicinski 			return -EOPNOTSUPP;
2546bfddbc8aSJakub Kicinski 		emit_alu(nfp_prog, dst,
2547bfddbc8aSJakub Kicinski 			 plen_reg(nfp_prog), ALU_OP_ADD, pptr_reg(nfp_prog));
2548943c57b9SJakub Kicinski 		break;
2549943c57b9SJakub Kicinski 	default:
2550d9ae7f2bSJakub Kicinski 		return -EOPNOTSUPP;
2551943c57b9SJakub Kicinski 	}
2552943c57b9SJakub Kicinski 
2553943c57b9SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
2554d9ae7f2bSJakub Kicinski 
2555d9ae7f2bSJakub Kicinski 	return 0;
2556d9ae7f2bSJakub Kicinski }
2557d9ae7f2bSJakub Kicinski 
2558943c57b9SJakub Kicinski static int mem_ldx_xdp(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2559943c57b9SJakub Kicinski 		       u8 size)
2560d9ae7f2bSJakub Kicinski {
2561b3f868dfSJakub Kicinski 	swreg dst = reg_both(meta->insn.dst_reg * 2);
2562d9ae7f2bSJakub Kicinski 
2563943c57b9SJakub Kicinski 	switch (meta->insn.off) {
2564c6c580d7SJakub Kicinski 	case offsetof(struct xdp_md, data):
2565c6c580d7SJakub Kicinski 		if (size != FIELD_SIZEOF(struct xdp_md, data))
2566c6c580d7SJakub Kicinski 			return -EOPNOTSUPP;
2567c000dfb5SJakub Kicinski 		wrp_mov(nfp_prog, dst, pptr_reg(nfp_prog));
2568943c57b9SJakub Kicinski 		break;
2569c6c580d7SJakub Kicinski 	case offsetof(struct xdp_md, data_end):
2570c6c580d7SJakub Kicinski 		if (size != FIELD_SIZEOF(struct xdp_md, data_end))
2571c6c580d7SJakub Kicinski 			return -EOPNOTSUPP;
2572943c57b9SJakub Kicinski 		emit_alu(nfp_prog, dst,
2573943c57b9SJakub Kicinski 			 plen_reg(nfp_prog), ALU_OP_ADD, pptr_reg(nfp_prog));
2574943c57b9SJakub Kicinski 		break;
2575943c57b9SJakub Kicinski 	default:
2576943c57b9SJakub Kicinski 		return -EOPNOTSUPP;
2577943c57b9SJakub Kicinski 	}
2578d9ae7f2bSJakub Kicinski 
2579943c57b9SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
2580d9ae7f2bSJakub Kicinski 
2581d9ae7f2bSJakub Kicinski 	return 0;
2582d9ae7f2bSJakub Kicinski }
2583d9ae7f2bSJakub Kicinski 
25842ca71441SJakub Kicinski static int
25852ca71441SJakub Kicinski mem_ldx_data(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
25862ca71441SJakub Kicinski 	     unsigned int size)
25872ca71441SJakub Kicinski {
25882ca71441SJakub Kicinski 	swreg tmp_reg;
25892ca71441SJakub Kicinski 
25902ca71441SJakub Kicinski 	tmp_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
25912ca71441SJakub Kicinski 
25923dd43c33SJakub Kicinski 	return data_ld_host_order_addr32(nfp_prog, meta->insn.src_reg * 2,
25933dd43c33SJakub Kicinski 					 tmp_reg, meta->insn.dst_reg * 2, size);
25943dd43c33SJakub Kicinski }
25953dd43c33SJakub Kicinski 
25963dd43c33SJakub Kicinski static int
25973dd43c33SJakub Kicinski mem_ldx_emem(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
25983dd43c33SJakub Kicinski 	     unsigned int size)
25993dd43c33SJakub Kicinski {
26003dd43c33SJakub Kicinski 	swreg tmp_reg;
26013dd43c33SJakub Kicinski 
26023dd43c33SJakub Kicinski 	tmp_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
26033dd43c33SJakub Kicinski 
26043dd43c33SJakub Kicinski 	return data_ld_host_order_addr40(nfp_prog, meta->insn.src_reg * 2,
26053dd43c33SJakub Kicinski 					 tmp_reg, meta->insn.dst_reg * 2, size);
26062ca71441SJakub Kicinski }
26072ca71441SJakub Kicinski 
2608be759237SJiong Wang static void
2609be759237SJiong Wang mem_ldx_data_init_pktcache(struct nfp_prog *nfp_prog,
2610be759237SJiong Wang 			   struct nfp_insn_meta *meta)
2611be759237SJiong Wang {
2612be759237SJiong Wang 	s16 range_start = meta->pkt_cache.range_start;
2613be759237SJiong Wang 	s16 range_end = meta->pkt_cache.range_end;
2614be759237SJiong Wang 	swreg src_base, off;
2615be759237SJiong Wang 	u8 xfer_num, len;
2616be759237SJiong Wang 	bool indir;
2617be759237SJiong Wang 
2618be759237SJiong Wang 	off = re_load_imm_any(nfp_prog, range_start, imm_b(nfp_prog));
2619be759237SJiong Wang 	src_base = reg_a(meta->insn.src_reg * 2);
2620be759237SJiong Wang 	len = range_end - range_start;
2621be759237SJiong Wang 	xfer_num = round_up(len, REG_WIDTH) / REG_WIDTH;
2622be759237SJiong Wang 
2623be759237SJiong Wang 	indir = len > 8 * REG_WIDTH;
2624be759237SJiong Wang 	/* Setup PREV_ALU for indirect mode. */
2625be759237SJiong Wang 	if (indir)
2626be759237SJiong Wang 		wrp_immed(nfp_prog, reg_none(),
2627be759237SJiong Wang 			  CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, xfer_num - 1));
2628be759237SJiong Wang 
2629be759237SJiong Wang 	/* Cache memory into transfer-in registers. */
2630be759237SJiong Wang 	emit_cmd_any(nfp_prog, CMD_TGT_READ32_SWAP, CMD_MODE_32b, 0, src_base,
2631b556ddd9SJakub Kicinski 		     off, xfer_num - 1, CMD_CTX_SWAP, indir);
2632be759237SJiong Wang }
2633be759237SJiong Wang 
2634be759237SJiong Wang static int
263591ff69e8SJiong Wang mem_ldx_data_from_pktcache_unaligned(struct nfp_prog *nfp_prog,
263691ff69e8SJiong Wang 				     struct nfp_insn_meta *meta,
263791ff69e8SJiong Wang 				     unsigned int size)
263891ff69e8SJiong Wang {
263991ff69e8SJiong Wang 	s16 range_start = meta->pkt_cache.range_start;
264091ff69e8SJiong Wang 	s16 insn_off = meta->insn.off - range_start;
264191ff69e8SJiong Wang 	swreg dst_lo, dst_hi, src_lo, src_mid;
264291ff69e8SJiong Wang 	u8 dst_gpr = meta->insn.dst_reg * 2;
264391ff69e8SJiong Wang 	u8 len_lo = size, len_mid = 0;
264491ff69e8SJiong Wang 	u8 idx = insn_off / REG_WIDTH;
264591ff69e8SJiong Wang 	u8 off = insn_off % REG_WIDTH;
264691ff69e8SJiong Wang 
264791ff69e8SJiong Wang 	dst_hi = reg_both(dst_gpr + 1);
264891ff69e8SJiong Wang 	dst_lo = reg_both(dst_gpr);
264991ff69e8SJiong Wang 	src_lo = reg_xfer(idx);
265091ff69e8SJiong Wang 
265191ff69e8SJiong Wang 	/* The read length could involve as many as three registers. */
265291ff69e8SJiong Wang 	if (size > REG_WIDTH - off) {
265391ff69e8SJiong Wang 		/* Calculate the part in the second register. */
265491ff69e8SJiong Wang 		len_lo = REG_WIDTH - off;
265591ff69e8SJiong Wang 		len_mid = size - len_lo;
265691ff69e8SJiong Wang 
265791ff69e8SJiong Wang 		/* Calculate the part in the third register. */
265891ff69e8SJiong Wang 		if (size > 2 * REG_WIDTH - off)
265991ff69e8SJiong Wang 			len_mid = REG_WIDTH;
266091ff69e8SJiong Wang 	}
266191ff69e8SJiong Wang 
266291ff69e8SJiong Wang 	wrp_reg_subpart(nfp_prog, dst_lo, src_lo, len_lo, off);
266391ff69e8SJiong Wang 
266491ff69e8SJiong Wang 	if (!len_mid) {
266591ff69e8SJiong Wang 		wrp_immed(nfp_prog, dst_hi, 0);
266691ff69e8SJiong Wang 		return 0;
266791ff69e8SJiong Wang 	}
266891ff69e8SJiong Wang 
266991ff69e8SJiong Wang 	src_mid = reg_xfer(idx + 1);
267091ff69e8SJiong Wang 
267191ff69e8SJiong Wang 	if (size <= REG_WIDTH) {
267291ff69e8SJiong Wang 		wrp_reg_or_subpart(nfp_prog, dst_lo, src_mid, len_mid, len_lo);
267391ff69e8SJiong Wang 		wrp_immed(nfp_prog, dst_hi, 0);
267491ff69e8SJiong Wang 	} else {
267591ff69e8SJiong Wang 		swreg src_hi = reg_xfer(idx + 2);
267691ff69e8SJiong Wang 
267791ff69e8SJiong Wang 		wrp_reg_or_subpart(nfp_prog, dst_lo, src_mid,
267891ff69e8SJiong Wang 				   REG_WIDTH - len_lo, len_lo);
267991ff69e8SJiong Wang 		wrp_reg_subpart(nfp_prog, dst_hi, src_mid, len_lo,
268091ff69e8SJiong Wang 				REG_WIDTH - len_lo);
268191ff69e8SJiong Wang 		wrp_reg_or_subpart(nfp_prog, dst_hi, src_hi, REG_WIDTH - len_lo,
268291ff69e8SJiong Wang 				   len_lo);
268391ff69e8SJiong Wang 	}
268491ff69e8SJiong Wang 
268591ff69e8SJiong Wang 	return 0;
268691ff69e8SJiong Wang }
268791ff69e8SJiong Wang 
268891ff69e8SJiong Wang static int
2689be759237SJiong Wang mem_ldx_data_from_pktcache_aligned(struct nfp_prog *nfp_prog,
2690be759237SJiong Wang 				   struct nfp_insn_meta *meta,
2691be759237SJiong Wang 				   unsigned int size)
2692be759237SJiong Wang {
2693be759237SJiong Wang 	swreg dst_lo, dst_hi, src_lo;
2694be759237SJiong Wang 	u8 dst_gpr, idx;
2695be759237SJiong Wang 
2696be759237SJiong Wang 	idx = (meta->insn.off - meta->pkt_cache.range_start) / REG_WIDTH;
2697be759237SJiong Wang 	dst_gpr = meta->insn.dst_reg * 2;
2698be759237SJiong Wang 	dst_hi = reg_both(dst_gpr + 1);
2699be759237SJiong Wang 	dst_lo = reg_both(dst_gpr);
2700be759237SJiong Wang 	src_lo = reg_xfer(idx);
2701be759237SJiong Wang 
2702be759237SJiong Wang 	if (size < REG_WIDTH) {
2703be759237SJiong Wang 		wrp_reg_subpart(nfp_prog, dst_lo, src_lo, size, 0);
2704be759237SJiong Wang 		wrp_immed(nfp_prog, dst_hi, 0);
2705be759237SJiong Wang 	} else if (size == REG_WIDTH) {
2706be759237SJiong Wang 		wrp_mov(nfp_prog, dst_lo, src_lo);
2707be759237SJiong Wang 		wrp_immed(nfp_prog, dst_hi, 0);
2708be759237SJiong Wang 	} else {
2709be759237SJiong Wang 		swreg src_hi = reg_xfer(idx + 1);
2710be759237SJiong Wang 
2711be759237SJiong Wang 		wrp_mov(nfp_prog, dst_lo, src_lo);
2712be759237SJiong Wang 		wrp_mov(nfp_prog, dst_hi, src_hi);
2713be759237SJiong Wang 	}
2714be759237SJiong Wang 
2715be759237SJiong Wang 	return 0;
2716be759237SJiong Wang }
2717be759237SJiong Wang 
2718be759237SJiong Wang static int
2719be759237SJiong Wang mem_ldx_data_from_pktcache(struct nfp_prog *nfp_prog,
2720be759237SJiong Wang 			   struct nfp_insn_meta *meta, unsigned int size)
2721be759237SJiong Wang {
2722be759237SJiong Wang 	u8 off = meta->insn.off - meta->pkt_cache.range_start;
2723be759237SJiong Wang 
272491ff69e8SJiong Wang 	if (IS_ALIGNED(off, REG_WIDTH))
2725be759237SJiong Wang 		return mem_ldx_data_from_pktcache_aligned(nfp_prog, meta, size);
272691ff69e8SJiong Wang 
272791ff69e8SJiong Wang 	return mem_ldx_data_from_pktcache_unaligned(nfp_prog, meta, size);
2728be759237SJiong Wang }
2729be759237SJiong Wang 
27302ca71441SJakub Kicinski static int
27312ca71441SJakub Kicinski mem_ldx(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
27322ca71441SJakub Kicinski 	unsigned int size)
27332ca71441SJakub Kicinski {
27349879a381SJiong Wang 	if (meta->ldst_gather_len)
27359879a381SJiong Wang 		return nfp_cpp_memcpy(nfp_prog, meta);
27369879a381SJiong Wang 
27372ca71441SJakub Kicinski 	if (meta->ptr.type == PTR_TO_CTX) {
2738012bb8a8SJakub Kicinski 		if (nfp_prog->type == BPF_PROG_TYPE_XDP)
27392ca71441SJakub Kicinski 			return mem_ldx_xdp(nfp_prog, meta, size);
27402ca71441SJakub Kicinski 		else
27412ca71441SJakub Kicinski 			return mem_ldx_skb(nfp_prog, meta, size);
27422ca71441SJakub Kicinski 	}
27432ca71441SJakub Kicinski 
2744be759237SJiong Wang 	if (meta->ptr.type == PTR_TO_PACKET) {
2745be759237SJiong Wang 		if (meta->pkt_cache.range_end) {
2746be759237SJiong Wang 			if (meta->pkt_cache.do_init)
2747be759237SJiong Wang 				mem_ldx_data_init_pktcache(nfp_prog, meta);
2748be759237SJiong Wang 
2749be759237SJiong Wang 			return mem_ldx_data_from_pktcache(nfp_prog, meta, size);
2750be759237SJiong Wang 		} else {
27512ca71441SJakub Kicinski 			return mem_ldx_data(nfp_prog, meta, size);
2752be759237SJiong Wang 		}
2753be759237SJiong Wang 	}
27542ca71441SJakub Kicinski 
2755a82b23fbSJakub Kicinski 	if (meta->ptr.type == PTR_TO_STACK)
2756d3488480SJakub Kicinski 		return mem_ldx_stack(nfp_prog, meta, size,
2757d3488480SJakub Kicinski 				     meta->ptr.off + meta->ptr.var_off.value);
2758a82b23fbSJakub Kicinski 
27593dd43c33SJakub Kicinski 	if (meta->ptr.type == PTR_TO_MAP_VALUE)
27603dd43c33SJakub Kicinski 		return mem_ldx_emem(nfp_prog, meta, size);
27613dd43c33SJakub Kicinski 
27622ca71441SJakub Kicinski 	return -EOPNOTSUPP;
27632ca71441SJakub Kicinski }
27642ca71441SJakub Kicinski 
27652ca71441SJakub Kicinski static int mem_ldx1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
27662ca71441SJakub Kicinski {
27672ca71441SJakub Kicinski 	return mem_ldx(nfp_prog, meta, 1);
27682ca71441SJakub Kicinski }
27692ca71441SJakub Kicinski 
27702ca71441SJakub Kicinski static int mem_ldx2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
27712ca71441SJakub Kicinski {
27722ca71441SJakub Kicinski 	return mem_ldx(nfp_prog, meta, 2);
27732ca71441SJakub Kicinski }
27742ca71441SJakub Kicinski 
2775d9ae7f2bSJakub Kicinski static int mem_ldx4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2776d9ae7f2bSJakub Kicinski {
27772ca71441SJakub Kicinski 	return mem_ldx(nfp_prog, meta, 4);
27782ca71441SJakub Kicinski }
27792ca71441SJakub Kicinski 
27802ca71441SJakub Kicinski static int mem_ldx8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
27812ca71441SJakub Kicinski {
27822ca71441SJakub Kicinski 	return mem_ldx(nfp_prog, meta, 8);
2783d9ae7f2bSJakub Kicinski }
2784d9ae7f2bSJakub Kicinski 
2785e663fe38SJakub Kicinski static int
2786e663fe38SJakub Kicinski mem_st_data(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2787e663fe38SJakub Kicinski 	    unsigned int size)
2788d9ae7f2bSJakub Kicinski {
2789e663fe38SJakub Kicinski 	u64 imm = meta->insn.imm; /* sign extend */
2790e663fe38SJakub Kicinski 	swreg off_reg;
2791e663fe38SJakub Kicinski 
2792e663fe38SJakub Kicinski 	off_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
2793e663fe38SJakub Kicinski 
2794e663fe38SJakub Kicinski 	return data_st_host_order(nfp_prog, meta->insn.dst_reg * 2, off_reg,
2795e663fe38SJakub Kicinski 				  imm, size);
2796e663fe38SJakub Kicinski }
2797e663fe38SJakub Kicinski 
2798e663fe38SJakub Kicinski static int mem_st(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2799e663fe38SJakub Kicinski 		  unsigned int size)
2800e663fe38SJakub Kicinski {
2801e663fe38SJakub Kicinski 	if (meta->ptr.type == PTR_TO_PACKET)
2802e663fe38SJakub Kicinski 		return mem_st_data(nfp_prog, meta, size);
2803e663fe38SJakub Kicinski 
2804d9ae7f2bSJakub Kicinski 	return -EOPNOTSUPP;
2805d9ae7f2bSJakub Kicinski }
2806d9ae7f2bSJakub Kicinski 
2807e663fe38SJakub Kicinski static int mem_st1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2808d9ae7f2bSJakub Kicinski {
2809e663fe38SJakub Kicinski 	return mem_st(nfp_prog, meta, 1);
2810e663fe38SJakub Kicinski }
2811e663fe38SJakub Kicinski 
2812e663fe38SJakub Kicinski static int mem_st2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2813e663fe38SJakub Kicinski {
2814e663fe38SJakub Kicinski 	return mem_st(nfp_prog, meta, 2);
2815e663fe38SJakub Kicinski }
2816e663fe38SJakub Kicinski 
2817e663fe38SJakub Kicinski static int mem_st4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2818e663fe38SJakub Kicinski {
2819e663fe38SJakub Kicinski 	return mem_st(nfp_prog, meta, 4);
2820e663fe38SJakub Kicinski }
2821e663fe38SJakub Kicinski 
2822e663fe38SJakub Kicinski static int mem_st8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2823e663fe38SJakub Kicinski {
2824e663fe38SJakub Kicinski 	return mem_st(nfp_prog, meta, 8);
2825e663fe38SJakub Kicinski }
2826e663fe38SJakub Kicinski 
2827e663fe38SJakub Kicinski static int
2828e663fe38SJakub Kicinski mem_stx_data(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2829e663fe38SJakub Kicinski 	     unsigned int size)
2830e663fe38SJakub Kicinski {
2831e663fe38SJakub Kicinski 	swreg off_reg;
2832e663fe38SJakub Kicinski 
2833e663fe38SJakub Kicinski 	off_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
2834e663fe38SJakub Kicinski 
2835e663fe38SJakub Kicinski 	return data_stx_host_order(nfp_prog, meta->insn.dst_reg * 2, off_reg,
2836e663fe38SJakub Kicinski 				   meta->insn.src_reg * 2, size);
2837e663fe38SJakub Kicinski }
2838e663fe38SJakub Kicinski 
2839e663fe38SJakub Kicinski static int
2840ee9133a8SJakub Kicinski mem_stx_stack(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2841d3488480SJakub Kicinski 	      unsigned int size, unsigned int ptr_off)
2842ee9133a8SJakub Kicinski {
2843d3488480SJakub Kicinski 	return mem_op_stack(nfp_prog, meta, size, ptr_off,
2844b14157eeSJakub Kicinski 			    meta->insn.src_reg * 2, meta->insn.dst_reg * 2,
2845b14157eeSJakub Kicinski 			    false, wrp_lmem_store);
2846ee9133a8SJakub Kicinski }
2847ee9133a8SJakub Kicinski 
2848d985888fSJakub Kicinski static int mem_stx_xdp(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2849d985888fSJakub Kicinski {
2850d985888fSJakub Kicinski 	switch (meta->insn.off) {
2851d985888fSJakub Kicinski 	case offsetof(struct xdp_md, rx_queue_index):
2852d985888fSJakub Kicinski 		return nfp_queue_select(nfp_prog, meta);
2853d985888fSJakub Kicinski 	}
2854d985888fSJakub Kicinski 
2855d985888fSJakub Kicinski 	WARN_ON_ONCE(1); /* verifier should have rejected bad accesses */
2856d985888fSJakub Kicinski 	return -EOPNOTSUPP;
2857d985888fSJakub Kicinski }
2858d985888fSJakub Kicinski 
2859ee9133a8SJakub Kicinski static int
2860e663fe38SJakub Kicinski mem_stx(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2861e663fe38SJakub Kicinski 	unsigned int size)
2862e663fe38SJakub Kicinski {
2863e663fe38SJakub Kicinski 	if (meta->ptr.type == PTR_TO_PACKET)
2864e663fe38SJakub Kicinski 		return mem_stx_data(nfp_prog, meta, size);
2865e663fe38SJakub Kicinski 
2866ee9133a8SJakub Kicinski 	if (meta->ptr.type == PTR_TO_STACK)
2867d3488480SJakub Kicinski 		return mem_stx_stack(nfp_prog, meta, size,
2868d3488480SJakub Kicinski 				     meta->ptr.off + meta->ptr.var_off.value);
2869ee9133a8SJakub Kicinski 
2870d9ae7f2bSJakub Kicinski 	return -EOPNOTSUPP;
2871d9ae7f2bSJakub Kicinski }
2872d9ae7f2bSJakub Kicinski 
2873e663fe38SJakub Kicinski static int mem_stx1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2874e663fe38SJakub Kicinski {
2875e663fe38SJakub Kicinski 	return mem_stx(nfp_prog, meta, 1);
2876e663fe38SJakub Kicinski }
2877e663fe38SJakub Kicinski 
2878e663fe38SJakub Kicinski static int mem_stx2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2879e663fe38SJakub Kicinski {
2880e663fe38SJakub Kicinski 	return mem_stx(nfp_prog, meta, 2);
2881e663fe38SJakub Kicinski }
2882e663fe38SJakub Kicinski 
2883d9ae7f2bSJakub Kicinski static int mem_stx4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2884d9ae7f2bSJakub Kicinski {
2885d985888fSJakub Kicinski 	if (meta->ptr.type == PTR_TO_CTX)
2886d985888fSJakub Kicinski 		if (nfp_prog->type == BPF_PROG_TYPE_XDP)
2887d985888fSJakub Kicinski 			return mem_stx_xdp(nfp_prog, meta);
2888e663fe38SJakub Kicinski 	return mem_stx(nfp_prog, meta, 4);
2889e663fe38SJakub Kicinski }
28902ca71441SJakub Kicinski 
2891e663fe38SJakub Kicinski static int mem_stx8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2892e663fe38SJakub Kicinski {
2893e663fe38SJakub Kicinski 	return mem_stx(nfp_prog, meta, 8);
2894d9ae7f2bSJakub Kicinski }
2895d9ae7f2bSJakub Kicinski 
2896dcb0c27fSJakub Kicinski static int
2897dcb0c27fSJakub Kicinski mem_xadd(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, bool is64)
2898dcb0c27fSJakub Kicinski {
2899dcb0c27fSJakub Kicinski 	u8 dst_gpr = meta->insn.dst_reg * 2;
2900dcb0c27fSJakub Kicinski 	u8 src_gpr = meta->insn.src_reg * 2;
290141aed09cSJakub Kicinski 	unsigned int full_add, out;
290241aed09cSJakub Kicinski 	swreg addra, addrb, off;
2903dcb0c27fSJakub Kicinski 
2904dcb0c27fSJakub Kicinski 	off = ur_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
2905dcb0c27fSJakub Kicinski 
290641aed09cSJakub Kicinski 	/* We can fit 16 bits into command immediate, if we know the immediate
290741aed09cSJakub Kicinski 	 * is guaranteed to either always or never fit into 16 bit we only
290841aed09cSJakub Kicinski 	 * generate code to handle that particular case, otherwise generate
290941aed09cSJakub Kicinski 	 * code for both.
291041aed09cSJakub Kicinski 	 */
291141aed09cSJakub Kicinski 	out = nfp_prog_current_offset(nfp_prog);
291241aed09cSJakub Kicinski 	full_add = nfp_prog_current_offset(nfp_prog);
291341aed09cSJakub Kicinski 
291441aed09cSJakub Kicinski 	if (meta->insn.off) {
291541aed09cSJakub Kicinski 		out += 2;
291641aed09cSJakub Kicinski 		full_add += 2;
291741aed09cSJakub Kicinski 	}
291841aed09cSJakub Kicinski 	if (meta->xadd_maybe_16bit) {
291941aed09cSJakub Kicinski 		out += 3;
292041aed09cSJakub Kicinski 		full_add += 3;
292141aed09cSJakub Kicinski 	}
292241aed09cSJakub Kicinski 	if (meta->xadd_over_16bit)
292341aed09cSJakub Kicinski 		out += 2 + is64;
292441aed09cSJakub Kicinski 	if (meta->xadd_maybe_16bit && meta->xadd_over_16bit) {
292541aed09cSJakub Kicinski 		out += 5;
292641aed09cSJakub Kicinski 		full_add += 5;
292741aed09cSJakub Kicinski 	}
292841aed09cSJakub Kicinski 
292941aed09cSJakub Kicinski 	/* Generate the branch for choosing add_imm vs add */
293041aed09cSJakub Kicinski 	if (meta->xadd_maybe_16bit && meta->xadd_over_16bit) {
293141aed09cSJakub Kicinski 		swreg max_imm = imm_a(nfp_prog);
293241aed09cSJakub Kicinski 
293341aed09cSJakub Kicinski 		wrp_immed(nfp_prog, max_imm, 0xffff);
293441aed09cSJakub Kicinski 		emit_alu(nfp_prog, reg_none(),
293541aed09cSJakub Kicinski 			 max_imm, ALU_OP_SUB, reg_b(src_gpr));
293641aed09cSJakub Kicinski 		emit_alu(nfp_prog, reg_none(),
293741aed09cSJakub Kicinski 			 reg_imm(0), ALU_OP_SUB_C, reg_b(src_gpr + 1));
293841aed09cSJakub Kicinski 		emit_br(nfp_prog, BR_BLO, full_add, meta->insn.off ? 2 : 0);
293941aed09cSJakub Kicinski 		/* defer for add */
294041aed09cSJakub Kicinski 	}
294141aed09cSJakub Kicinski 
2942dcb0c27fSJakub Kicinski 	/* If insn has an offset add to the address */
2943dcb0c27fSJakub Kicinski 	if (!meta->insn.off) {
2944dcb0c27fSJakub Kicinski 		addra = reg_a(dst_gpr);
2945dcb0c27fSJakub Kicinski 		addrb = reg_b(dst_gpr + 1);
2946dcb0c27fSJakub Kicinski 	} else {
2947dcb0c27fSJakub Kicinski 		emit_alu(nfp_prog, imma_a(nfp_prog),
2948dcb0c27fSJakub Kicinski 			 reg_a(dst_gpr), ALU_OP_ADD, off);
2949dcb0c27fSJakub Kicinski 		emit_alu(nfp_prog, imma_b(nfp_prog),
2950dcb0c27fSJakub Kicinski 			 reg_a(dst_gpr + 1), ALU_OP_ADD_C, reg_imm(0));
2951dcb0c27fSJakub Kicinski 		addra = imma_a(nfp_prog);
2952dcb0c27fSJakub Kicinski 		addrb = imma_b(nfp_prog);
2953dcb0c27fSJakub Kicinski 	}
2954dcb0c27fSJakub Kicinski 
295541aed09cSJakub Kicinski 	/* Generate the add_imm if 16 bits are possible */
295641aed09cSJakub Kicinski 	if (meta->xadd_maybe_16bit) {
295741aed09cSJakub Kicinski 		swreg prev_alu = imm_a(nfp_prog);
295841aed09cSJakub Kicinski 
2959dcb0c27fSJakub Kicinski 		wrp_immed(nfp_prog, prev_alu,
2960dcb0c27fSJakub Kicinski 			  FIELD_PREP(CMD_OVE_DATA, 2) |
2961dcb0c27fSJakub Kicinski 			  CMD_OVE_LEN |
2962dcb0c27fSJakub Kicinski 			  FIELD_PREP(CMD_OV_LEN, 0x8 | is64 << 2));
2963dcb0c27fSJakub Kicinski 		wrp_reg_or_subpart(nfp_prog, prev_alu, reg_b(src_gpr), 2, 2);
2964dcb0c27fSJakub Kicinski 		emit_cmd_indir(nfp_prog, CMD_TGT_ADD_IMM, CMD_MODE_40b_BA, 0,
2965b556ddd9SJakub Kicinski 			       addra, addrb, 0, CMD_CTX_NO_SWAP);
2966dcb0c27fSJakub Kicinski 
296741aed09cSJakub Kicinski 		if (meta->xadd_over_16bit)
296841aed09cSJakub Kicinski 			emit_br(nfp_prog, BR_UNC, out, 0);
296941aed09cSJakub Kicinski 	}
297041aed09cSJakub Kicinski 
297141aed09cSJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, full_add))
297241aed09cSJakub Kicinski 		return -EINVAL;
297341aed09cSJakub Kicinski 
297441aed09cSJakub Kicinski 	/* Generate the add if 16 bits are not guaranteed */
297541aed09cSJakub Kicinski 	if (meta->xadd_over_16bit) {
297641aed09cSJakub Kicinski 		emit_cmd(nfp_prog, CMD_TGT_ADD, CMD_MODE_40b_BA, 0,
297741aed09cSJakub Kicinski 			 addra, addrb, is64 << 2,
297841aed09cSJakub Kicinski 			 is64 ? CMD_CTX_SWAP_DEFER2 : CMD_CTX_SWAP_DEFER1);
297941aed09cSJakub Kicinski 
298041aed09cSJakub Kicinski 		wrp_mov(nfp_prog, reg_xfer(0), reg_a(src_gpr));
298141aed09cSJakub Kicinski 		if (is64)
298241aed09cSJakub Kicinski 			wrp_mov(nfp_prog, reg_xfer(1), reg_a(src_gpr + 1));
298341aed09cSJakub Kicinski 	}
298441aed09cSJakub Kicinski 
298541aed09cSJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, out))
298641aed09cSJakub Kicinski 		return -EINVAL;
298741aed09cSJakub Kicinski 
2988dcb0c27fSJakub Kicinski 	return 0;
2989dcb0c27fSJakub Kicinski }
2990dcb0c27fSJakub Kicinski 
2991dcb0c27fSJakub Kicinski static int mem_xadd4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2992dcb0c27fSJakub Kicinski {
2993dcb0c27fSJakub Kicinski 	return mem_xadd(nfp_prog, meta, false);
2994dcb0c27fSJakub Kicinski }
2995dcb0c27fSJakub Kicinski 
2996dcb0c27fSJakub Kicinski static int mem_xadd8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2997dcb0c27fSJakub Kicinski {
2998dcb0c27fSJakub Kicinski 	return mem_xadd(nfp_prog, meta, true);
2999dcb0c27fSJakub Kicinski }
3000dcb0c27fSJakub Kicinski 
3001d9ae7f2bSJakub Kicinski static int jump(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3002d9ae7f2bSJakub Kicinski {
3003d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, BR_UNC, meta->insn.off, 0);
3004d9ae7f2bSJakub Kicinski 
3005d9ae7f2bSJakub Kicinski 	return 0;
3006d9ae7f2bSJakub Kicinski }
3007d9ae7f2bSJakub Kicinski 
3008d9ae7f2bSJakub Kicinski static int jeq_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3009d9ae7f2bSJakub Kicinski {
3010d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
3011d9ae7f2bSJakub Kicinski 	u64 imm = insn->imm; /* sign extend */
3012b3f868dfSJakub Kicinski 	swreg or1, or2, tmp_reg;
3013b3f868dfSJakub Kicinski 
3014b3f868dfSJakub Kicinski 	or1 = reg_a(insn->dst_reg * 2);
3015b3f868dfSJakub Kicinski 	or2 = reg_b(insn->dst_reg * 2 + 1);
3016d9ae7f2bSJakub Kicinski 
3017d9ae7f2bSJakub Kicinski 	if (imm & ~0U) {
3018d9ae7f2bSJakub Kicinski 		tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
3019d9ae7f2bSJakub Kicinski 		emit_alu(nfp_prog, imm_a(nfp_prog),
3020d9ae7f2bSJakub Kicinski 			 reg_a(insn->dst_reg * 2), ALU_OP_XOR, tmp_reg);
3021d9ae7f2bSJakub Kicinski 		or1 = imm_a(nfp_prog);
3022d9ae7f2bSJakub Kicinski 	}
3023d9ae7f2bSJakub Kicinski 
3024d9ae7f2bSJakub Kicinski 	if (imm >> 32) {
3025d9ae7f2bSJakub Kicinski 		tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
3026d9ae7f2bSJakub Kicinski 		emit_alu(nfp_prog, imm_b(nfp_prog),
3027d9ae7f2bSJakub Kicinski 			 reg_a(insn->dst_reg * 2 + 1), ALU_OP_XOR, tmp_reg);
3028d9ae7f2bSJakub Kicinski 		or2 = imm_b(nfp_prog);
3029d9ae7f2bSJakub Kicinski 	}
3030d9ae7f2bSJakub Kicinski 
3031d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), or1, ALU_OP_OR, or2);
3032d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, BR_BEQ, insn->off, 0);
3033d9ae7f2bSJakub Kicinski 
3034d9ae7f2bSJakub Kicinski 	return 0;
3035d9ae7f2bSJakub Kicinski }
3036d9ae7f2bSJakub Kicinski 
3037d9ae7f2bSJakub Kicinski static int jset_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3038d9ae7f2bSJakub Kicinski {
3039d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
3040d9ae7f2bSJakub Kicinski 	u64 imm = insn->imm; /* sign extend */
3041b3f868dfSJakub Kicinski 	swreg tmp_reg;
3042d9ae7f2bSJakub Kicinski 
3043d9ae7f2bSJakub Kicinski 	if (!imm) {
3044d9ae7f2bSJakub Kicinski 		meta->skip = true;
3045d9ae7f2bSJakub Kicinski 		return 0;
3046d9ae7f2bSJakub Kicinski 	}
3047d9ae7f2bSJakub Kicinski 
3048d9ae7f2bSJakub Kicinski 	if (imm & ~0U) {
3049d9ae7f2bSJakub Kicinski 		tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
3050d9ae7f2bSJakub Kicinski 		emit_alu(nfp_prog, reg_none(),
3051d9ae7f2bSJakub Kicinski 			 reg_a(insn->dst_reg * 2), ALU_OP_AND, tmp_reg);
3052d9ae7f2bSJakub Kicinski 		emit_br(nfp_prog, BR_BNE, insn->off, 0);
3053d9ae7f2bSJakub Kicinski 	}
3054d9ae7f2bSJakub Kicinski 
3055d9ae7f2bSJakub Kicinski 	if (imm >> 32) {
3056d9ae7f2bSJakub Kicinski 		tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
3057d9ae7f2bSJakub Kicinski 		emit_alu(nfp_prog, reg_none(),
3058d9ae7f2bSJakub Kicinski 			 reg_a(insn->dst_reg * 2 + 1), ALU_OP_AND, tmp_reg);
3059d9ae7f2bSJakub Kicinski 		emit_br(nfp_prog, BR_BNE, insn->off, 0);
3060d9ae7f2bSJakub Kicinski 	}
3061d9ae7f2bSJakub Kicinski 
3062d9ae7f2bSJakub Kicinski 	return 0;
3063d9ae7f2bSJakub Kicinski }
3064d9ae7f2bSJakub Kicinski 
3065d9ae7f2bSJakub Kicinski static int jne_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3066d9ae7f2bSJakub Kicinski {
3067d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
3068d9ae7f2bSJakub Kicinski 	u64 imm = insn->imm; /* sign extend */
3069b3f868dfSJakub Kicinski 	swreg tmp_reg;
3070d9ae7f2bSJakub Kicinski 
3071d9ae7f2bSJakub Kicinski 	if (!imm) {
3072d9ae7f2bSJakub Kicinski 		emit_alu(nfp_prog, reg_none(), reg_a(insn->dst_reg * 2),
3073d9ae7f2bSJakub Kicinski 			 ALU_OP_OR, reg_b(insn->dst_reg * 2 + 1));
3074d9ae7f2bSJakub Kicinski 		emit_br(nfp_prog, BR_BNE, insn->off, 0);
307582837370SJakub Kicinski 		return 0;
3076d9ae7f2bSJakub Kicinski 	}
3077d9ae7f2bSJakub Kicinski 
3078d9ae7f2bSJakub Kicinski 	tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
3079d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
3080d9ae7f2bSJakub Kicinski 		 reg_a(insn->dst_reg * 2), ALU_OP_XOR, tmp_reg);
3081d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, BR_BNE, insn->off, 0);
3082d9ae7f2bSJakub Kicinski 
3083d9ae7f2bSJakub Kicinski 	tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
3084d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
3085d9ae7f2bSJakub Kicinski 		 reg_a(insn->dst_reg * 2 + 1), ALU_OP_XOR, tmp_reg);
3086d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, BR_BNE, insn->off, 0);
3087d9ae7f2bSJakub Kicinski 
3088d9ae7f2bSJakub Kicinski 	return 0;
3089d9ae7f2bSJakub Kicinski }
3090d9ae7f2bSJakub Kicinski 
3091d9ae7f2bSJakub Kicinski static int jeq_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3092d9ae7f2bSJakub Kicinski {
3093d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
3094d9ae7f2bSJakub Kicinski 
3095d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, imm_a(nfp_prog), reg_a(insn->dst_reg * 2),
3096d9ae7f2bSJakub Kicinski 		 ALU_OP_XOR, reg_b(insn->src_reg * 2));
3097d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, imm_b(nfp_prog), reg_a(insn->dst_reg * 2 + 1),
3098d9ae7f2bSJakub Kicinski 		 ALU_OP_XOR, reg_b(insn->src_reg * 2 + 1));
3099d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
3100d9ae7f2bSJakub Kicinski 		 imm_a(nfp_prog), ALU_OP_OR, imm_b(nfp_prog));
3101d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, BR_BEQ, insn->off, 0);
3102d9ae7f2bSJakub Kicinski 
3103d9ae7f2bSJakub Kicinski 	return 0;
3104d9ae7f2bSJakub Kicinski }
3105d9ae7f2bSJakub Kicinski 
3106d9ae7f2bSJakub Kicinski static int jset_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3107d9ae7f2bSJakub Kicinski {
3108d9ae7f2bSJakub Kicinski 	return wrp_test_reg(nfp_prog, meta, ALU_OP_AND, BR_BNE);
3109d9ae7f2bSJakub Kicinski }
3110d9ae7f2bSJakub Kicinski 
3111d9ae7f2bSJakub Kicinski static int jne_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3112d9ae7f2bSJakub Kicinski {
3113d9ae7f2bSJakub Kicinski 	return wrp_test_reg(nfp_prog, meta, ALU_OP_XOR, BR_BNE);
3114d9ae7f2bSJakub Kicinski }
3115d9ae7f2bSJakub Kicinski 
3116389f263bSQuentin Monnet static int
3117389f263bSQuentin Monnet bpf_to_bpf_call(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3118389f263bSQuentin Monnet {
3119bdf4c66fSQuentin Monnet 	u32 ret_tgt, stack_depth, offset_br;
3120389f263bSQuentin Monnet 	swreg tmp_reg;
3121389f263bSQuentin Monnet 
3122389f263bSQuentin Monnet 	stack_depth = round_up(nfp_prog->stack_frame_depth, STACK_FRAME_ALIGN);
3123389f263bSQuentin Monnet 	/* Space for saving the return address is accounted for by the callee,
3124389f263bSQuentin Monnet 	 * so stack_depth can be zero for the main function.
3125389f263bSQuentin Monnet 	 */
3126389f263bSQuentin Monnet 	if (stack_depth) {
3127389f263bSQuentin Monnet 		tmp_reg = ur_load_imm_any(nfp_prog, stack_depth,
3128389f263bSQuentin Monnet 					  stack_imm(nfp_prog));
3129389f263bSQuentin Monnet 		emit_alu(nfp_prog, stack_reg(nfp_prog),
3130389f263bSQuentin Monnet 			 stack_reg(nfp_prog), ALU_OP_ADD, tmp_reg);
3131389f263bSQuentin Monnet 		emit_csr_wr(nfp_prog, stack_reg(nfp_prog),
3132389f263bSQuentin Monnet 			    NFP_CSR_ACT_LM_ADDR0);
3133389f263bSQuentin Monnet 	}
3134389f263bSQuentin Monnet 
3135389f263bSQuentin Monnet 	/* The following steps are performed:
3136389f263bSQuentin Monnet 	 *     1. Put the start offset of the callee into imm_b(). This will
3137389f263bSQuentin Monnet 	 *        require a fixup step, as we do not necessarily know this
3138389f263bSQuentin Monnet 	 *        address yet.
3139389f263bSQuentin Monnet 	 *     2. Put the return address from the callee to the caller into
3140389f263bSQuentin Monnet 	 *        register ret_reg().
3141389f263bSQuentin Monnet 	 *     3. (After defer slots are consumed) Jump to the subroutine that
3142389f263bSQuentin Monnet 	 *        pushes the registers to the stack.
3143389f263bSQuentin Monnet 	 * The subroutine acts as a trampoline, and returns to the address in
3144389f263bSQuentin Monnet 	 * imm_b(), i.e. jumps to the callee.
3145389f263bSQuentin Monnet 	 *
3146389f263bSQuentin Monnet 	 * Using ret_reg() to pass the return address to the callee is set here
3147389f263bSQuentin Monnet 	 * as a convention. The callee can then push this address onto its
3148389f263bSQuentin Monnet 	 * stack frame in its prologue. The advantages of passing the return
3149389f263bSQuentin Monnet 	 * address through ret_reg(), instead of pushing it to the stack right
3150389f263bSQuentin Monnet 	 * here, are the following:
3151389f263bSQuentin Monnet 	 * - It looks cleaner.
3152389f263bSQuentin Monnet 	 * - If the called function is called multiple time, we get a lower
3153389f263bSQuentin Monnet 	 *   program size.
3154389f263bSQuentin Monnet 	 * - We save two no-op instructions that should be added just before
3155389f263bSQuentin Monnet 	 *   the emit_br() when stack depth is not null otherwise.
3156389f263bSQuentin Monnet 	 * - If we ever find a register to hold the return address during whole
3157389f263bSQuentin Monnet 	 *   execution of the callee, we will not have to push the return
3158389f263bSQuentin Monnet 	 *   address to the stack for leaf functions.
3159389f263bSQuentin Monnet 	 */
3160389f263bSQuentin Monnet 	ret_tgt = nfp_prog_current_offset(nfp_prog) + 3;
3161389f263bSQuentin Monnet 	emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2,
3162389f263bSQuentin Monnet 		     RELO_BR_GO_CALL_PUSH_REGS);
3163bdf4c66fSQuentin Monnet 	offset_br = nfp_prog_current_offset(nfp_prog);
3164389f263bSQuentin Monnet 	wrp_immed_relo(nfp_prog, imm_b(nfp_prog), 0, RELO_IMMED_REL);
3165389f263bSQuentin Monnet 	wrp_immed_relo(nfp_prog, ret_reg(nfp_prog), ret_tgt, RELO_IMMED_REL);
3166389f263bSQuentin Monnet 
3167389f263bSQuentin Monnet 	if (!nfp_prog_confirm_current_offset(nfp_prog, ret_tgt))
3168389f263bSQuentin Monnet 		return -EINVAL;
3169389f263bSQuentin Monnet 
3170389f263bSQuentin Monnet 	if (stack_depth) {
3171389f263bSQuentin Monnet 		tmp_reg = ur_load_imm_any(nfp_prog, stack_depth,
3172389f263bSQuentin Monnet 					  stack_imm(nfp_prog));
3173389f263bSQuentin Monnet 		emit_alu(nfp_prog, stack_reg(nfp_prog),
3174389f263bSQuentin Monnet 			 stack_reg(nfp_prog), ALU_OP_SUB, tmp_reg);
3175389f263bSQuentin Monnet 		emit_csr_wr(nfp_prog, stack_reg(nfp_prog),
3176389f263bSQuentin Monnet 			    NFP_CSR_ACT_LM_ADDR0);
3177389f263bSQuentin Monnet 		wrp_nops(nfp_prog, 3);
3178389f263bSQuentin Monnet 	}
3179389f263bSQuentin Monnet 
3180bdf4c66fSQuentin Monnet 	meta->num_insns_after_br = nfp_prog_current_offset(nfp_prog);
3181bdf4c66fSQuentin Monnet 	meta->num_insns_after_br -= offset_br;
3182bdf4c66fSQuentin Monnet 
3183389f263bSQuentin Monnet 	return 0;
3184389f263bSQuentin Monnet }
3185389f263bSQuentin Monnet 
3186389f263bSQuentin Monnet static int helper_call(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
31872cb230bdSJakub Kicinski {
31882cb230bdSJakub Kicinski 	switch (meta->insn.imm) {
31890d49eaf4SJakub Kicinski 	case BPF_FUNC_xdp_adjust_head:
31900d49eaf4SJakub Kicinski 		return adjust_head(nfp_prog, meta);
31910c261593SJakub Kicinski 	case BPF_FUNC_xdp_adjust_tail:
31920c261593SJakub Kicinski 		return adjust_tail(nfp_prog, meta);
319377a3d311SJakub Kicinski 	case BPF_FUNC_map_lookup_elem:
319444d65a47SJakub Kicinski 	case BPF_FUNC_map_update_elem:
3195bfee64deSJakub Kicinski 	case BPF_FUNC_map_delete_elem:
3196fc448497SJakub Kicinski 		return map_call_stack_common(nfp_prog, meta);
3197df4a37d8SJakub Kicinski 	case BPF_FUNC_get_prandom_u32:
3198df4a37d8SJakub Kicinski 		return nfp_get_prandom_u32(nfp_prog, meta);
31999816dd35SJakub Kicinski 	case BPF_FUNC_perf_event_output:
32009816dd35SJakub Kicinski 		return nfp_perf_event_output(nfp_prog, meta);
32012cb230bdSJakub Kicinski 	default:
32022cb230bdSJakub Kicinski 		WARN_ONCE(1, "verifier allowed unsupported function\n");
32032cb230bdSJakub Kicinski 		return -EOPNOTSUPP;
32042cb230bdSJakub Kicinski 	}
32052cb230bdSJakub Kicinski }
32062cb230bdSJakub Kicinski 
3207389f263bSQuentin Monnet static int call(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3208389f263bSQuentin Monnet {
3209389f263bSQuentin Monnet 	if (is_mbpf_pseudo_call(meta))
3210389f263bSQuentin Monnet 		return bpf_to_bpf_call(nfp_prog, meta);
3211389f263bSQuentin Monnet 	else
3212389f263bSQuentin Monnet 		return helper_call(nfp_prog, meta);
3213389f263bSQuentin Monnet }
3214389f263bSQuentin Monnet 
3215389f263bSQuentin Monnet static bool nfp_is_main_function(struct nfp_insn_meta *meta)
3216389f263bSQuentin Monnet {
3217389f263bSQuentin Monnet 	return meta->subprog_idx == 0;
3218389f263bSQuentin Monnet }
3219389f263bSQuentin Monnet 
3220d9ae7f2bSJakub Kicinski static int goto_out(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3221d9ae7f2bSJakub Kicinski {
3222e84797feSJakub Kicinski 	emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 0, RELO_BR_GO_OUT);
3223d9ae7f2bSJakub Kicinski 
3224d9ae7f2bSJakub Kicinski 	return 0;
3225d9ae7f2bSJakub Kicinski }
3226d9ae7f2bSJakub Kicinski 
3227389f263bSQuentin Monnet static int
3228389f263bSQuentin Monnet nfp_subprog_epilogue(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3229389f263bSQuentin Monnet {
3230389f263bSQuentin Monnet 	/* Pop R6~R9 to the stack via related subroutine.
3231389f263bSQuentin Monnet 	 * Pop return address for BPF-to-BPF call from the stack and load it
3232389f263bSQuentin Monnet 	 * into ret_reg() before we jump. This means that the subroutine does
3233389f263bSQuentin Monnet 	 * not come back here, we make it jump back to the subprogram caller
3234389f263bSQuentin Monnet 	 * directly!
3235389f263bSQuentin Monnet 	 */
3236389f263bSQuentin Monnet 	emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 1,
3237389f263bSQuentin Monnet 		     RELO_BR_GO_CALL_POP_REGS);
3238389f263bSQuentin Monnet 	wrp_mov(nfp_prog, ret_reg(nfp_prog), reg_lm(0, 0));
3239389f263bSQuentin Monnet 
3240389f263bSQuentin Monnet 	return 0;
3241389f263bSQuentin Monnet }
3242389f263bSQuentin Monnet 
3243389f263bSQuentin Monnet static int jmp_exit(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3244389f263bSQuentin Monnet {
3245389f263bSQuentin Monnet 	if (nfp_is_main_function(meta))
3246389f263bSQuentin Monnet 		return goto_out(nfp_prog, meta);
3247389f263bSQuentin Monnet 	else
3248389f263bSQuentin Monnet 		return nfp_subprog_epilogue(nfp_prog, meta);
3249389f263bSQuentin Monnet }
3250389f263bSQuentin Monnet 
3251d9ae7f2bSJakub Kicinski static const instr_cb_t instr_cb[256] = {
3252d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_MOV | BPF_X] =	mov_reg64,
3253d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_MOV | BPF_K] =	mov_imm64,
3254d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_XOR | BPF_X] =	xor_reg64,
3255d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_XOR | BPF_K] =	xor_imm64,
3256d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_AND | BPF_X] =	and_reg64,
3257d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_AND | BPF_K] =	and_imm64,
3258d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_OR | BPF_X] =	or_reg64,
3259d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_OR | BPF_K] =	or_imm64,
3260d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_ADD | BPF_X] =	add_reg64,
3261d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_ADD | BPF_K] =	add_imm64,
3262d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_SUB | BPF_X] =	sub_reg64,
3263d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_SUB | BPF_K] =	sub_imm64,
3264d3d23fdbSJiong Wang 	[BPF_ALU64 | BPF_MUL | BPF_X] =	mul_reg64,
3265d3d23fdbSJiong Wang 	[BPF_ALU64 | BPF_MUL | BPF_K] =	mul_imm64,
32662a952b03SJiong Wang 	[BPF_ALU64 | BPF_DIV | BPF_X] =	div_reg64,
32672a952b03SJiong Wang 	[BPF_ALU64 | BPF_DIV | BPF_K] =	div_imm64,
3268254ef4d7SJiong Wang 	[BPF_ALU64 | BPF_NEG] =		neg_reg64,
3269991f5b36SJiong Wang 	[BPF_ALU64 | BPF_LSH | BPF_X] =	shl_reg64,
3270d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_LSH | BPF_K] =	shl_imm64,
3271991f5b36SJiong Wang 	[BPF_ALU64 | BPF_RSH | BPF_X] =	shr_reg64,
3272d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_RSH | BPF_K] =	shr_imm64,
3273c217abccSJiong Wang 	[BPF_ALU64 | BPF_ARSH | BPF_X] = ashr_reg64,
3274f43d0f17SJiong Wang 	[BPF_ALU64 | BPF_ARSH | BPF_K] = ashr_imm64,
3275d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_MOV | BPF_X] =	mov_reg,
3276d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_MOV | BPF_K] =	mov_imm,
3277d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_XOR | BPF_X] =	xor_reg,
3278d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_XOR | BPF_K] =	xor_imm,
3279d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_AND | BPF_X] =	and_reg,
3280d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_AND | BPF_K] =	and_imm,
3281d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_OR | BPF_X] =	or_reg,
3282d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_OR | BPF_K] =	or_imm,
3283d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_ADD | BPF_X] =	add_reg,
3284d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_ADD | BPF_K] =	add_imm,
3285d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_SUB | BPF_X] =	sub_reg,
3286d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_SUB | BPF_K] =	sub_imm,
3287d3d23fdbSJiong Wang 	[BPF_ALU | BPF_MUL | BPF_X] =	mul_reg,
3288d3d23fdbSJiong Wang 	[BPF_ALU | BPF_MUL | BPF_K] =	mul_imm,
32892a952b03SJiong Wang 	[BPF_ALU | BPF_DIV | BPF_X] =	div_reg,
32902a952b03SJiong Wang 	[BPF_ALU | BPF_DIV | BPF_K] =	div_imm,
3291254ef4d7SJiong Wang 	[BPF_ALU | BPF_NEG] =		neg_reg,
3292d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_LSH | BPF_K] =	shl_imm,
32933119d1fdSJakub Kicinski 	[BPF_ALU | BPF_END | BPF_X] =	end_reg32,
3294d9ae7f2bSJakub Kicinski 	[BPF_LD | BPF_IMM | BPF_DW] =	imm_ld8,
3295d9ae7f2bSJakub Kicinski 	[BPF_LD | BPF_ABS | BPF_B] =	data_ld1,
3296d9ae7f2bSJakub Kicinski 	[BPF_LD | BPF_ABS | BPF_H] =	data_ld2,
3297d9ae7f2bSJakub Kicinski 	[BPF_LD | BPF_ABS | BPF_W] =	data_ld4,
3298d9ae7f2bSJakub Kicinski 	[BPF_LD | BPF_IND | BPF_B] =	data_ind_ld1,
3299d9ae7f2bSJakub Kicinski 	[BPF_LD | BPF_IND | BPF_H] =	data_ind_ld2,
3300d9ae7f2bSJakub Kicinski 	[BPF_LD | BPF_IND | BPF_W] =	data_ind_ld4,
33012ca71441SJakub Kicinski 	[BPF_LDX | BPF_MEM | BPF_B] =	mem_ldx1,
33022ca71441SJakub Kicinski 	[BPF_LDX | BPF_MEM | BPF_H] =	mem_ldx2,
3303d9ae7f2bSJakub Kicinski 	[BPF_LDX | BPF_MEM | BPF_W] =	mem_ldx4,
33042ca71441SJakub Kicinski 	[BPF_LDX | BPF_MEM | BPF_DW] =	mem_ldx8,
3305e663fe38SJakub Kicinski 	[BPF_STX | BPF_MEM | BPF_B] =	mem_stx1,
3306e663fe38SJakub Kicinski 	[BPF_STX | BPF_MEM | BPF_H] =	mem_stx2,
3307d9ae7f2bSJakub Kicinski 	[BPF_STX | BPF_MEM | BPF_W] =	mem_stx4,
3308e663fe38SJakub Kicinski 	[BPF_STX | BPF_MEM | BPF_DW] =	mem_stx8,
3309dcb0c27fSJakub Kicinski 	[BPF_STX | BPF_XADD | BPF_W] =	mem_xadd4,
3310dcb0c27fSJakub Kicinski 	[BPF_STX | BPF_XADD | BPF_DW] =	mem_xadd8,
3311e663fe38SJakub Kicinski 	[BPF_ST | BPF_MEM | BPF_B] =	mem_st1,
3312e663fe38SJakub Kicinski 	[BPF_ST | BPF_MEM | BPF_H] =	mem_st2,
3313e663fe38SJakub Kicinski 	[BPF_ST | BPF_MEM | BPF_W] =	mem_st4,
3314e663fe38SJakub Kicinski 	[BPF_ST | BPF_MEM | BPF_DW] =	mem_st8,
3315d9ae7f2bSJakub Kicinski 	[BPF_JMP | BPF_JA | BPF_K] =	jump,
3316d9ae7f2bSJakub Kicinski 	[BPF_JMP | BPF_JEQ | BPF_K] =	jeq_imm,
331761dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JGT | BPF_K] =	cmp_imm,
331861dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JGE | BPF_K] =	cmp_imm,
331961dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JLT | BPF_K] =	cmp_imm,
332061dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JLE | BPF_K] =	cmp_imm,
332161dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSGT | BPF_K] =  cmp_imm,
332261dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSGE | BPF_K] =  cmp_imm,
332361dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSLT | BPF_K] =  cmp_imm,
332461dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSLE | BPF_K] =  cmp_imm,
3325d9ae7f2bSJakub Kicinski 	[BPF_JMP | BPF_JSET | BPF_K] =	jset_imm,
3326d9ae7f2bSJakub Kicinski 	[BPF_JMP | BPF_JNE | BPF_K] =	jne_imm,
3327d9ae7f2bSJakub Kicinski 	[BPF_JMP | BPF_JEQ | BPF_X] =	jeq_reg,
332861dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JGT | BPF_X] =	cmp_reg,
332961dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JGE | BPF_X] =	cmp_reg,
333061dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JLT | BPF_X] =	cmp_reg,
333161dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JLE | BPF_X] =	cmp_reg,
333261dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSGT | BPF_X] =  cmp_reg,
333361dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSGE | BPF_X] =  cmp_reg,
333461dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSLT | BPF_X] =  cmp_reg,
333561dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSLE | BPF_X] =  cmp_reg,
3336d9ae7f2bSJakub Kicinski 	[BPF_JMP | BPF_JSET | BPF_X] =	jset_reg,
3337d9ae7f2bSJakub Kicinski 	[BPF_JMP | BPF_JNE | BPF_X] =	jne_reg,
33382cb230bdSJakub Kicinski 	[BPF_JMP | BPF_CALL] =		call,
3339389f263bSQuentin Monnet 	[BPF_JMP | BPF_EXIT] =		jmp_exit,
3340d9ae7f2bSJakub Kicinski };
3341d9ae7f2bSJakub Kicinski 
3342d9ae7f2bSJakub Kicinski /* --- Assembler logic --- */
33432178f3f0SQuentin Monnet static int
33442178f3f0SQuentin Monnet nfp_fixup_immed_relo(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
33452178f3f0SQuentin Monnet 		     struct nfp_insn_meta *jmp_dst, u32 br_idx)
33462178f3f0SQuentin Monnet {
33472178f3f0SQuentin Monnet 	if (immed_get_value(nfp_prog->prog[br_idx + 1])) {
33482178f3f0SQuentin Monnet 		pr_err("BUG: failed to fix up callee register saving\n");
33492178f3f0SQuentin Monnet 		return -EINVAL;
33502178f3f0SQuentin Monnet 	}
33512178f3f0SQuentin Monnet 
33522178f3f0SQuentin Monnet 	immed_set_value(&nfp_prog->prog[br_idx + 1], jmp_dst->off);
33532178f3f0SQuentin Monnet 
33542178f3f0SQuentin Monnet 	return 0;
33552178f3f0SQuentin Monnet }
33562178f3f0SQuentin Monnet 
3357d9ae7f2bSJakub Kicinski static int nfp_fixup_branches(struct nfp_prog *nfp_prog)
3358d9ae7f2bSJakub Kicinski {
33595b674140SJiong Wang 	struct nfp_insn_meta *meta, *jmp_dst;
3360854dc87dSJiong Wang 	u32 idx, br_idx;
33612178f3f0SQuentin Monnet 	int err;
3362d9ae7f2bSJakub Kicinski 
3363854dc87dSJiong Wang 	list_for_each_entry(meta, &nfp_prog->insns, l) {
3364d9ae7f2bSJakub Kicinski 		if (meta->skip)
3365d9ae7f2bSJakub Kicinski 			continue;
3366d9ae7f2bSJakub Kicinski 		if (BPF_CLASS(meta->insn.code) != BPF_JMP)
3367d9ae7f2bSJakub Kicinski 			continue;
3368bdf4c66fSQuentin Monnet 		if (meta->insn.code == (BPF_JMP | BPF_EXIT) &&
3369bdf4c66fSQuentin Monnet 		    !nfp_is_main_function(meta))
3370bdf4c66fSQuentin Monnet 			continue;
3371bdf4c66fSQuentin Monnet 		if (is_mbpf_helper_call(meta))
3372bdf4c66fSQuentin Monnet 			continue;
3373d9ae7f2bSJakub Kicinski 
33745b674140SJiong Wang 		if (list_is_last(&meta->l, &nfp_prog->insns))
33752314fe9eSJakub Kicinski 			br_idx = nfp_prog->last_bpf_off;
33765b674140SJiong Wang 		else
33772314fe9eSJakub Kicinski 			br_idx = list_next_entry(meta, l)->off - 1;
3378854dc87dSJiong Wang 
3379bdf4c66fSQuentin Monnet 		/* For BPF-to-BPF function call, a stack adjustment sequence is
3380bdf4c66fSQuentin Monnet 		 * generated after the return instruction. Therefore, we must
3381bdf4c66fSQuentin Monnet 		 * withdraw the length of this sequence to have br_idx pointing
3382bdf4c66fSQuentin Monnet 		 * to where the "branch" NFP instruction is expected to be.
3383bdf4c66fSQuentin Monnet 		 */
3384bdf4c66fSQuentin Monnet 		if (is_mbpf_pseudo_call(meta))
3385bdf4c66fSQuentin Monnet 			br_idx -= meta->num_insns_after_br;
3386bdf4c66fSQuentin Monnet 
3387d9ae7f2bSJakub Kicinski 		if (!nfp_is_br(nfp_prog->prog[br_idx])) {
3388d9ae7f2bSJakub Kicinski 			pr_err("Fixup found block not ending in branch %d %02x %016llx!!\n",
3389d9ae7f2bSJakub Kicinski 			       br_idx, meta->insn.code, nfp_prog->prog[br_idx]);
3390d9ae7f2bSJakub Kicinski 			return -ELOOP;
3391d9ae7f2bSJakub Kicinski 		}
3392bdf4c66fSQuentin Monnet 
3393bdf4c66fSQuentin Monnet 		if (meta->insn.code == (BPF_JMP | BPF_EXIT))
3394bdf4c66fSQuentin Monnet 			continue;
3395bdf4c66fSQuentin Monnet 
3396d9ae7f2bSJakub Kicinski 		/* Leave special branches for later */
33972314fe9eSJakub Kicinski 		if (FIELD_GET(OP_RELO_TYPE, nfp_prog->prog[br_idx]) !=
33982178f3f0SQuentin Monnet 		    RELO_BR_REL && !is_mbpf_pseudo_call(meta))
3399d9ae7f2bSJakub Kicinski 			continue;
3400d9ae7f2bSJakub Kicinski 
34015b674140SJiong Wang 		if (!meta->jmp_dst) {
34025b674140SJiong Wang 			pr_err("Non-exit jump doesn't have destination info recorded!!\n");
3403d9ae7f2bSJakub Kicinski 			return -ELOOP;
3404d9ae7f2bSJakub Kicinski 		}
3405d9ae7f2bSJakub Kicinski 
34065b674140SJiong Wang 		jmp_dst = meta->jmp_dst;
3407854dc87dSJiong Wang 
34085b674140SJiong Wang 		if (jmp_dst->skip) {
3409d9ae7f2bSJakub Kicinski 			pr_err("Branch landing on removed instruction!!\n");
3410d9ae7f2bSJakub Kicinski 			return -ELOOP;
3411d9ae7f2bSJakub Kicinski 		}
3412d9ae7f2bSJakub Kicinski 
34132178f3f0SQuentin Monnet 		if (is_mbpf_pseudo_call(meta)) {
34142178f3f0SQuentin Monnet 			err = nfp_fixup_immed_relo(nfp_prog, meta,
34152178f3f0SQuentin Monnet 						   jmp_dst, br_idx);
34162178f3f0SQuentin Monnet 			if (err)
34172178f3f0SQuentin Monnet 				return err;
34182178f3f0SQuentin Monnet 		}
34192178f3f0SQuentin Monnet 
34202178f3f0SQuentin Monnet 		if (FIELD_GET(OP_RELO_TYPE, nfp_prog->prog[br_idx]) !=
34212178f3f0SQuentin Monnet 		    RELO_BR_REL)
34222178f3f0SQuentin Monnet 			continue;
34232178f3f0SQuentin Monnet 
34242314fe9eSJakub Kicinski 		for (idx = meta->off; idx <= br_idx; idx++) {
3425d9ae7f2bSJakub Kicinski 			if (!nfp_is_br(nfp_prog->prog[idx]))
3426d9ae7f2bSJakub Kicinski 				continue;
34275b674140SJiong Wang 			br_set_offset(&nfp_prog->prog[idx], jmp_dst->off);
3428d9ae7f2bSJakub Kicinski 		}
3429d9ae7f2bSJakub Kicinski 	}
3430d9ae7f2bSJakub Kicinski 
3431d9ae7f2bSJakub Kicinski 	return 0;
3432d9ae7f2bSJakub Kicinski }
3433d9ae7f2bSJakub Kicinski 
3434d9ae7f2bSJakub Kicinski static void nfp_intro(struct nfp_prog *nfp_prog)
3435d9ae7f2bSJakub Kicinski {
343618e53b6cSJakub Kicinski 	wrp_immed(nfp_prog, plen_reg(nfp_prog), GENMASK(13, 0));
343718e53b6cSJakub Kicinski 	emit_alu(nfp_prog, plen_reg(nfp_prog),
343818e53b6cSJakub Kicinski 		 plen_reg(nfp_prog), ALU_OP_AND, pv_len(nfp_prog));
3439d9ae7f2bSJakub Kicinski }
3440d9ae7f2bSJakub Kicinski 
3441389f263bSQuentin Monnet static void
3442389f263bSQuentin Monnet nfp_subprog_prologue(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3443389f263bSQuentin Monnet {
3444389f263bSQuentin Monnet 	/* Save return address into the stack. */
3445389f263bSQuentin Monnet 	wrp_mov(nfp_prog, reg_lm(0, 0), ret_reg(nfp_prog));
3446389f263bSQuentin Monnet }
3447389f263bSQuentin Monnet 
3448389f263bSQuentin Monnet static void
3449389f263bSQuentin Monnet nfp_start_subprog(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3450389f263bSQuentin Monnet {
3451389f263bSQuentin Monnet 	unsigned int depth = nfp_prog->subprog[meta->subprog_idx].stack_depth;
3452389f263bSQuentin Monnet 
3453389f263bSQuentin Monnet 	nfp_prog->stack_frame_depth = round_up(depth, 4);
3454389f263bSQuentin Monnet 	nfp_subprog_prologue(nfp_prog, meta);
3455389f263bSQuentin Monnet }
3456389f263bSQuentin Monnet 
3457389f263bSQuentin Monnet bool nfp_is_subprog_start(struct nfp_insn_meta *meta)
3458389f263bSQuentin Monnet {
3459389f263bSQuentin Monnet 	return meta->flags & FLAG_INSN_IS_SUBPROG_START;
3460389f263bSQuentin Monnet }
3461389f263bSQuentin Monnet 
3462d9ae7f2bSJakub Kicinski static void nfp_outro_tc_da(struct nfp_prog *nfp_prog)
3463d9ae7f2bSJakub Kicinski {
3464d9ae7f2bSJakub Kicinski 	/* TC direct-action mode:
3465d9ae7f2bSJakub Kicinski 	 *   0,1   ok        NOT SUPPORTED[1]
3466d9ae7f2bSJakub Kicinski 	 *   2   drop  0x22 -> drop,  count as stat1
3467d9ae7f2bSJakub Kicinski 	 *   4,5 nuke  0x02 -> drop
3468d9ae7f2bSJakub Kicinski 	 *   7  redir  0x44 -> redir, count as stat2
3469d9ae7f2bSJakub Kicinski 	 *   * unspec  0x11 -> pass,  count as stat0
3470d9ae7f2bSJakub Kicinski 	 *
3471d9ae7f2bSJakub Kicinski 	 * [1] We can't support OK and RECLASSIFY because we can't tell TC
3472d9ae7f2bSJakub Kicinski 	 *     the exact decision made.  We are forced to support UNSPEC
3473d9ae7f2bSJakub Kicinski 	 *     to handle aborts so that's the only one we handle for passing
3474d9ae7f2bSJakub Kicinski 	 *     packets up the stack.
3475d9ae7f2bSJakub Kicinski 	 */
3476d9ae7f2bSJakub Kicinski 	/* Target for aborts */
3477d9ae7f2bSJakub Kicinski 	nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog);
3478d9ae7f2bSJakub Kicinski 
3479e84797feSJakub Kicinski 	emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2, RELO_BR_NEXT_PKT);
3480d9ae7f2bSJakub Kicinski 
3481c000dfb5SJakub Kicinski 	wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS);
3482d9ae7f2bSJakub Kicinski 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x11), SHF_SC_L_SHF, 16);
3483d9ae7f2bSJakub Kicinski 
3484d9ae7f2bSJakub Kicinski 	/* Target for normal exits */
3485d9ae7f2bSJakub Kicinski 	nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog);
3486d9ae7f2bSJakub Kicinski 
3487d9ae7f2bSJakub Kicinski 	/* if R0 > 7 jump to abort */
3488d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_imm(7), ALU_OP_SUB, reg_b(0));
3489d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, BR_BLO, nfp_prog->tgt_abort, 0);
3490c000dfb5SJakub Kicinski 	wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS);
3491d9ae7f2bSJakub Kicinski 
3492d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_b(2), 0x41221211);
3493d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_b(3), 0x41001211);
3494d9ae7f2bSJakub Kicinski 
3495d9ae7f2bSJakub Kicinski 	emit_shf(nfp_prog, reg_a(1),
3496d9ae7f2bSJakub Kicinski 		 reg_none(), SHF_OP_NONE, reg_b(0), SHF_SC_L_SHF, 2);
3497d9ae7f2bSJakub Kicinski 
3498d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0));
3499d9ae7f2bSJakub Kicinski 	emit_shf(nfp_prog, reg_a(2),
3500d9ae7f2bSJakub Kicinski 		 reg_imm(0xf), SHF_OP_AND, reg_b(2), SHF_SC_R_SHF, 0);
3501d9ae7f2bSJakub Kicinski 
3502d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0));
3503d9ae7f2bSJakub Kicinski 	emit_shf(nfp_prog, reg_b(2),
3504d9ae7f2bSJakub Kicinski 		 reg_imm(0xf), SHF_OP_AND, reg_b(3), SHF_SC_R_SHF, 0);
3505d9ae7f2bSJakub Kicinski 
3506e84797feSJakub Kicinski 	emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2, RELO_BR_NEXT_PKT);
3507d9ae7f2bSJakub Kicinski 
3508d9ae7f2bSJakub Kicinski 	emit_shf(nfp_prog, reg_b(2),
3509d9ae7f2bSJakub Kicinski 		 reg_a(2), SHF_OP_OR, reg_b(2), SHF_SC_L_SHF, 4);
3510d9ae7f2bSJakub Kicinski 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_b(2), SHF_SC_L_SHF, 16);
3511d9ae7f2bSJakub Kicinski }
3512d9ae7f2bSJakub Kicinski 
3513d9ae7f2bSJakub Kicinski static void nfp_outro_xdp(struct nfp_prog *nfp_prog)
3514d9ae7f2bSJakub Kicinski {
3515d9ae7f2bSJakub Kicinski 	/* XDP return codes:
3516d9ae7f2bSJakub Kicinski 	 *   0 aborted  0x82 -> drop,  count as stat3
3517d9ae7f2bSJakub Kicinski 	 *   1    drop  0x22 -> drop,  count as stat1
3518d9ae7f2bSJakub Kicinski 	 *   2    pass  0x11 -> pass,  count as stat0
3519d9ae7f2bSJakub Kicinski 	 *   3      tx  0x44 -> redir, count as stat2
3520d9ae7f2bSJakub Kicinski 	 *   * unknown  0x82 -> drop,  count as stat3
3521d9ae7f2bSJakub Kicinski 	 */
3522d9ae7f2bSJakub Kicinski 	/* Target for aborts */
3523d9ae7f2bSJakub Kicinski 	nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog);
3524d9ae7f2bSJakub Kicinski 
3525e84797feSJakub Kicinski 	emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2, RELO_BR_NEXT_PKT);
3526d9ae7f2bSJakub Kicinski 
3527c000dfb5SJakub Kicinski 	wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS);
3528d9ae7f2bSJakub Kicinski 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x82), SHF_SC_L_SHF, 16);
3529d9ae7f2bSJakub Kicinski 
3530d9ae7f2bSJakub Kicinski 	/* Target for normal exits */
3531d9ae7f2bSJakub Kicinski 	nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog);
3532d9ae7f2bSJakub Kicinski 
3533d9ae7f2bSJakub Kicinski 	/* if R0 > 3 jump to abort */
3534d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_imm(3), ALU_OP_SUB, reg_b(0));
3535d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, BR_BLO, nfp_prog->tgt_abort, 0);
3536d9ae7f2bSJakub Kicinski 
3537d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_b(2), 0x44112282);
3538d9ae7f2bSJakub Kicinski 
3539d9ae7f2bSJakub Kicinski 	emit_shf(nfp_prog, reg_a(1),
3540d9ae7f2bSJakub Kicinski 		 reg_none(), SHF_OP_NONE, reg_b(0), SHF_SC_L_SHF, 3);
3541d9ae7f2bSJakub Kicinski 
3542d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0));
3543d9ae7f2bSJakub Kicinski 	emit_shf(nfp_prog, reg_b(2),
3544d9ae7f2bSJakub Kicinski 		 reg_imm(0xff), SHF_OP_AND, reg_b(2), SHF_SC_R_SHF, 0);
3545d9ae7f2bSJakub Kicinski 
3546e84797feSJakub Kicinski 	emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2, RELO_BR_NEXT_PKT);
3547d9ae7f2bSJakub Kicinski 
3548c000dfb5SJakub Kicinski 	wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS);
3549d9ae7f2bSJakub Kicinski 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_b(2), SHF_SC_L_SHF, 16);
3550d9ae7f2bSJakub Kicinski }
3551d9ae7f2bSJakub Kicinski 
3552389f263bSQuentin Monnet static void nfp_push_callee_registers(struct nfp_prog *nfp_prog)
3553389f263bSQuentin Monnet {
3554389f263bSQuentin Monnet 	u8 reg;
3555389f263bSQuentin Monnet 
3556389f263bSQuentin Monnet 	/* Subroutine: Save all callee saved registers (R6 ~ R9).
3557389f263bSQuentin Monnet 	 * imm_b() holds the return address.
3558389f263bSQuentin Monnet 	 */
3559389f263bSQuentin Monnet 	nfp_prog->tgt_call_push_regs = nfp_prog_current_offset(nfp_prog);
3560389f263bSQuentin Monnet 	for (reg = BPF_REG_6; reg <= BPF_REG_9; reg++) {
3561389f263bSQuentin Monnet 		u8 adj = (reg - BPF_REG_0) * 2;
3562389f263bSQuentin Monnet 		u8 idx = (reg - BPF_REG_6) * 2;
3563389f263bSQuentin Monnet 
3564389f263bSQuentin Monnet 		/* The first slot in the stack frame is used to push the return
3565389f263bSQuentin Monnet 		 * address in bpf_to_bpf_call(), start just after.
3566389f263bSQuentin Monnet 		 */
3567389f263bSQuentin Monnet 		wrp_mov(nfp_prog, reg_lm(0, 1 + idx), reg_b(adj));
3568389f263bSQuentin Monnet 
3569389f263bSQuentin Monnet 		if (reg == BPF_REG_8)
3570389f263bSQuentin Monnet 			/* Prepare to jump back, last 3 insns use defer slots */
3571389f263bSQuentin Monnet 			emit_rtn(nfp_prog, imm_b(nfp_prog), 3);
3572389f263bSQuentin Monnet 
3573389f263bSQuentin Monnet 		wrp_mov(nfp_prog, reg_lm(0, 1 + idx + 1), reg_b(adj + 1));
3574389f263bSQuentin Monnet 	}
3575389f263bSQuentin Monnet }
3576389f263bSQuentin Monnet 
3577389f263bSQuentin Monnet static void nfp_pop_callee_registers(struct nfp_prog *nfp_prog)
3578389f263bSQuentin Monnet {
3579389f263bSQuentin Monnet 	u8 reg;
3580389f263bSQuentin Monnet 
3581389f263bSQuentin Monnet 	/* Subroutine: Restore all callee saved registers (R6 ~ R9).
3582389f263bSQuentin Monnet 	 * ret_reg() holds the return address.
3583389f263bSQuentin Monnet 	 */
3584389f263bSQuentin Monnet 	nfp_prog->tgt_call_pop_regs = nfp_prog_current_offset(nfp_prog);
3585389f263bSQuentin Monnet 	for (reg = BPF_REG_6; reg <= BPF_REG_9; reg++) {
3586389f263bSQuentin Monnet 		u8 adj = (reg - BPF_REG_0) * 2;
3587389f263bSQuentin Monnet 		u8 idx = (reg - BPF_REG_6) * 2;
3588389f263bSQuentin Monnet 
3589389f263bSQuentin Monnet 		/* The first slot in the stack frame holds the return address,
3590389f263bSQuentin Monnet 		 * start popping just after that.
3591389f263bSQuentin Monnet 		 */
3592389f263bSQuentin Monnet 		wrp_mov(nfp_prog, reg_both(adj), reg_lm(0, 1 + idx));
3593389f263bSQuentin Monnet 
3594389f263bSQuentin Monnet 		if (reg == BPF_REG_8)
3595389f263bSQuentin Monnet 			/* Prepare to jump back, last 3 insns use defer slots */
3596389f263bSQuentin Monnet 			emit_rtn(nfp_prog, ret_reg(nfp_prog), 3);
3597389f263bSQuentin Monnet 
3598389f263bSQuentin Monnet 		wrp_mov(nfp_prog, reg_both(adj + 1), reg_lm(0, 1 + idx + 1));
3599389f263bSQuentin Monnet 	}
3600389f263bSQuentin Monnet }
3601389f263bSQuentin Monnet 
3602d9ae7f2bSJakub Kicinski static void nfp_outro(struct nfp_prog *nfp_prog)
3603d9ae7f2bSJakub Kicinski {
3604012bb8a8SJakub Kicinski 	switch (nfp_prog->type) {
3605012bb8a8SJakub Kicinski 	case BPF_PROG_TYPE_SCHED_CLS:
3606d9ae7f2bSJakub Kicinski 		nfp_outro_tc_da(nfp_prog);
3607d9ae7f2bSJakub Kicinski 		break;
3608012bb8a8SJakub Kicinski 	case BPF_PROG_TYPE_XDP:
3609d9ae7f2bSJakub Kicinski 		nfp_outro_xdp(nfp_prog);
3610d9ae7f2bSJakub Kicinski 		break;
3611012bb8a8SJakub Kicinski 	default:
3612012bb8a8SJakub Kicinski 		WARN_ON(1);
3613d9ae7f2bSJakub Kicinski 	}
3614389f263bSQuentin Monnet 
3615389f263bSQuentin Monnet 	if (nfp_prog->subprog_cnt == 1)
3616389f263bSQuentin Monnet 		return;
3617389f263bSQuentin Monnet 
3618389f263bSQuentin Monnet 	nfp_push_callee_registers(nfp_prog);
3619389f263bSQuentin Monnet 	nfp_pop_callee_registers(nfp_prog);
3620d9ae7f2bSJakub Kicinski }
3621d9ae7f2bSJakub Kicinski 
3622d9ae7f2bSJakub Kicinski static int nfp_translate(struct nfp_prog *nfp_prog)
3623d9ae7f2bSJakub Kicinski {
3624d9ae7f2bSJakub Kicinski 	struct nfp_insn_meta *meta;
3625389f263bSQuentin Monnet 	unsigned int depth;
3626ff42bb9fSJakub Kicinski 	int err;
3627d9ae7f2bSJakub Kicinski 
3628389f263bSQuentin Monnet 	depth = nfp_prog->subprog[0].stack_depth;
3629389f263bSQuentin Monnet 	nfp_prog->stack_frame_depth = round_up(depth, 4);
3630389f263bSQuentin Monnet 
3631d9ae7f2bSJakub Kicinski 	nfp_intro(nfp_prog);
3632d9ae7f2bSJakub Kicinski 	if (nfp_prog->error)
3633d9ae7f2bSJakub Kicinski 		return nfp_prog->error;
3634d9ae7f2bSJakub Kicinski 
3635d9ae7f2bSJakub Kicinski 	list_for_each_entry(meta, &nfp_prog->insns, l) {
3636d9ae7f2bSJakub Kicinski 		instr_cb_t cb = instr_cb[meta->insn.code];
3637d9ae7f2bSJakub Kicinski 
3638d9ae7f2bSJakub Kicinski 		meta->off = nfp_prog_current_offset(nfp_prog);
3639d9ae7f2bSJakub Kicinski 
3640389f263bSQuentin Monnet 		if (nfp_is_subprog_start(meta)) {
3641389f263bSQuentin Monnet 			nfp_start_subprog(nfp_prog, meta);
3642389f263bSQuentin Monnet 			if (nfp_prog->error)
3643389f263bSQuentin Monnet 				return nfp_prog->error;
3644389f263bSQuentin Monnet 		}
3645389f263bSQuentin Monnet 
3646d9ae7f2bSJakub Kicinski 		if (meta->skip) {
3647d9ae7f2bSJakub Kicinski 			nfp_prog->n_translated++;
3648d9ae7f2bSJakub Kicinski 			continue;
3649d9ae7f2bSJakub Kicinski 		}
3650d9ae7f2bSJakub Kicinski 
3651d9ae7f2bSJakub Kicinski 		if (nfp_meta_has_prev(nfp_prog, meta) &&
3652d9ae7f2bSJakub Kicinski 		    nfp_meta_prev(meta)->double_cb)
3653d9ae7f2bSJakub Kicinski 			cb = nfp_meta_prev(meta)->double_cb;
3654d9ae7f2bSJakub Kicinski 		if (!cb)
3655d9ae7f2bSJakub Kicinski 			return -ENOENT;
3656d9ae7f2bSJakub Kicinski 		err = cb(nfp_prog, meta);
3657d9ae7f2bSJakub Kicinski 		if (err)
3658d9ae7f2bSJakub Kicinski 			return err;
3659e8a4796eSJakub Kicinski 		if (nfp_prog->error)
3660e8a4796eSJakub Kicinski 			return nfp_prog->error;
3661d9ae7f2bSJakub Kicinski 
3662d9ae7f2bSJakub Kicinski 		nfp_prog->n_translated++;
3663d9ae7f2bSJakub Kicinski 	}
3664d9ae7f2bSJakub Kicinski 
3665854dc87dSJiong Wang 	nfp_prog->last_bpf_off = nfp_prog_current_offset(nfp_prog) - 1;
3666854dc87dSJiong Wang 
3667d9ae7f2bSJakub Kicinski 	nfp_outro(nfp_prog);
3668d9ae7f2bSJakub Kicinski 	if (nfp_prog->error)
3669d9ae7f2bSJakub Kicinski 		return nfp_prog->error;
3670d9ae7f2bSJakub Kicinski 
3671ff42bb9fSJakub Kicinski 	wrp_nops(nfp_prog, NFP_USTORE_PREFETCH_WINDOW);
36721c03e03fSJakub Kicinski 	if (nfp_prog->error)
36731c03e03fSJakub Kicinski 		return nfp_prog->error;
36741c03e03fSJakub Kicinski 
3675d9ae7f2bSJakub Kicinski 	return nfp_fixup_branches(nfp_prog);
3676d9ae7f2bSJakub Kicinski }
3677d9ae7f2bSJakub Kicinski 
3678d9ae7f2bSJakub Kicinski /* --- Optimizations --- */
3679d9ae7f2bSJakub Kicinski static void nfp_bpf_opt_reg_init(struct nfp_prog *nfp_prog)
3680d9ae7f2bSJakub Kicinski {
3681d9ae7f2bSJakub Kicinski 	struct nfp_insn_meta *meta;
3682d9ae7f2bSJakub Kicinski 
3683d9ae7f2bSJakub Kicinski 	list_for_each_entry(meta, &nfp_prog->insns, l) {
3684d9ae7f2bSJakub Kicinski 		struct bpf_insn insn = meta->insn;
3685d9ae7f2bSJakub Kicinski 
3686d9ae7f2bSJakub Kicinski 		/* Programs converted from cBPF start with register xoring */
3687d9ae7f2bSJakub Kicinski 		if (insn.code == (BPF_ALU64 | BPF_XOR | BPF_X) &&
3688d9ae7f2bSJakub Kicinski 		    insn.src_reg == insn.dst_reg)
3689d9ae7f2bSJakub Kicinski 			continue;
3690d9ae7f2bSJakub Kicinski 
3691d9ae7f2bSJakub Kicinski 		/* Programs start with R6 = R1 but we ignore the skb pointer */
3692d9ae7f2bSJakub Kicinski 		if (insn.code == (BPF_ALU64 | BPF_MOV | BPF_X) &&
3693d9ae7f2bSJakub Kicinski 		    insn.src_reg == 1 && insn.dst_reg == 6)
3694d9ae7f2bSJakub Kicinski 			meta->skip = true;
3695d9ae7f2bSJakub Kicinski 
3696d9ae7f2bSJakub Kicinski 		/* Return as soon as something doesn't match */
3697d9ae7f2bSJakub Kicinski 		if (!meta->skip)
3698d9ae7f2bSJakub Kicinski 			return;
3699d9ae7f2bSJakub Kicinski 	}
3700d9ae7f2bSJakub Kicinski }
3701d9ae7f2bSJakub Kicinski 
37026c59500cSJakub Kicinski /* abs(insn.imm) will fit better into unrestricted reg immediate -
37036c59500cSJakub Kicinski  * convert add/sub of a negative number into a sub/add of a positive one.
37046c59500cSJakub Kicinski  */
37056c59500cSJakub Kicinski static void nfp_bpf_opt_neg_add_sub(struct nfp_prog *nfp_prog)
37066c59500cSJakub Kicinski {
37076c59500cSJakub Kicinski 	struct nfp_insn_meta *meta;
37086c59500cSJakub Kicinski 
37096c59500cSJakub Kicinski 	list_for_each_entry(meta, &nfp_prog->insns, l) {
37106c59500cSJakub Kicinski 		struct bpf_insn insn = meta->insn;
37116c59500cSJakub Kicinski 
37126c59500cSJakub Kicinski 		if (meta->skip)
37136c59500cSJakub Kicinski 			continue;
37146c59500cSJakub Kicinski 
37156c59500cSJakub Kicinski 		if (BPF_CLASS(insn.code) != BPF_ALU &&
37167bdc97beSJakub Kicinski 		    BPF_CLASS(insn.code) != BPF_ALU64 &&
37177bdc97beSJakub Kicinski 		    BPF_CLASS(insn.code) != BPF_JMP)
37186c59500cSJakub Kicinski 			continue;
37196c59500cSJakub Kicinski 		if (BPF_SRC(insn.code) != BPF_K)
37206c59500cSJakub Kicinski 			continue;
37216c59500cSJakub Kicinski 		if (insn.imm >= 0)
37226c59500cSJakub Kicinski 			continue;
37236c59500cSJakub Kicinski 
37247bdc97beSJakub Kicinski 		if (BPF_CLASS(insn.code) == BPF_JMP) {
37257bdc97beSJakub Kicinski 			switch (BPF_OP(insn.code)) {
37267bdc97beSJakub Kicinski 			case BPF_JGE:
37277bdc97beSJakub Kicinski 			case BPF_JSGE:
37287bdc97beSJakub Kicinski 			case BPF_JLT:
37297bdc97beSJakub Kicinski 			case BPF_JSLT:
37307bdc97beSJakub Kicinski 				meta->jump_neg_op = true;
37317bdc97beSJakub Kicinski 				break;
37327bdc97beSJakub Kicinski 			default:
37337bdc97beSJakub Kicinski 				continue;
37347bdc97beSJakub Kicinski 			}
37357bdc97beSJakub Kicinski 		} else {
37366c59500cSJakub Kicinski 			if (BPF_OP(insn.code) == BPF_ADD)
37376c59500cSJakub Kicinski 				insn.code = BPF_CLASS(insn.code) | BPF_SUB;
37386c59500cSJakub Kicinski 			else if (BPF_OP(insn.code) == BPF_SUB)
37396c59500cSJakub Kicinski 				insn.code = BPF_CLASS(insn.code) | BPF_ADD;
37406c59500cSJakub Kicinski 			else
37416c59500cSJakub Kicinski 				continue;
37426c59500cSJakub Kicinski 
37436c59500cSJakub Kicinski 			meta->insn.code = insn.code | BPF_K;
37447bdc97beSJakub Kicinski 		}
37456c59500cSJakub Kicinski 
37466c59500cSJakub Kicinski 		meta->insn.imm = -insn.imm;
37476c59500cSJakub Kicinski 	}
37486c59500cSJakub Kicinski }
37496c59500cSJakub Kicinski 
3750d9ae7f2bSJakub Kicinski /* Remove masking after load since our load guarantees this is not needed */
3751d9ae7f2bSJakub Kicinski static void nfp_bpf_opt_ld_mask(struct nfp_prog *nfp_prog)
3752d9ae7f2bSJakub Kicinski {
3753d9ae7f2bSJakub Kicinski 	struct nfp_insn_meta *meta1, *meta2;
3754d9ae7f2bSJakub Kicinski 	const s32 exp_mask[] = {
3755d9ae7f2bSJakub Kicinski 		[BPF_B] = 0x000000ffU,
3756d9ae7f2bSJakub Kicinski 		[BPF_H] = 0x0000ffffU,
3757d9ae7f2bSJakub Kicinski 		[BPF_W] = 0xffffffffU,
3758d9ae7f2bSJakub Kicinski 	};
3759d9ae7f2bSJakub Kicinski 
3760d9ae7f2bSJakub Kicinski 	nfp_for_each_insn_walk2(nfp_prog, meta1, meta2) {
3761d9ae7f2bSJakub Kicinski 		struct bpf_insn insn, next;
3762d9ae7f2bSJakub Kicinski 
3763d9ae7f2bSJakub Kicinski 		insn = meta1->insn;
3764d9ae7f2bSJakub Kicinski 		next = meta2->insn;
3765d9ae7f2bSJakub Kicinski 
3766d9ae7f2bSJakub Kicinski 		if (BPF_CLASS(insn.code) != BPF_LD)
3767d9ae7f2bSJakub Kicinski 			continue;
3768d9ae7f2bSJakub Kicinski 		if (BPF_MODE(insn.code) != BPF_ABS &&
3769d9ae7f2bSJakub Kicinski 		    BPF_MODE(insn.code) != BPF_IND)
3770d9ae7f2bSJakub Kicinski 			continue;
3771d9ae7f2bSJakub Kicinski 
3772d9ae7f2bSJakub Kicinski 		if (next.code != (BPF_ALU64 | BPF_AND | BPF_K))
3773d9ae7f2bSJakub Kicinski 			continue;
3774d9ae7f2bSJakub Kicinski 
3775d9ae7f2bSJakub Kicinski 		if (!exp_mask[BPF_SIZE(insn.code)])
3776d9ae7f2bSJakub Kicinski 			continue;
3777d9ae7f2bSJakub Kicinski 		if (exp_mask[BPF_SIZE(insn.code)] != next.imm)
3778d9ae7f2bSJakub Kicinski 			continue;
3779d9ae7f2bSJakub Kicinski 
3780d9ae7f2bSJakub Kicinski 		if (next.src_reg || next.dst_reg)
3781d9ae7f2bSJakub Kicinski 			continue;
3782d9ae7f2bSJakub Kicinski 
37831266f5d6SJiong Wang 		if (meta2->flags & FLAG_INSN_IS_JUMP_DST)
37841266f5d6SJiong Wang 			continue;
37851266f5d6SJiong Wang 
3786d9ae7f2bSJakub Kicinski 		meta2->skip = true;
3787d9ae7f2bSJakub Kicinski 	}
3788d9ae7f2bSJakub Kicinski }
3789d9ae7f2bSJakub Kicinski 
3790d9ae7f2bSJakub Kicinski static void nfp_bpf_opt_ld_shift(struct nfp_prog *nfp_prog)
3791d9ae7f2bSJakub Kicinski {
3792d9ae7f2bSJakub Kicinski 	struct nfp_insn_meta *meta1, *meta2, *meta3;
3793d9ae7f2bSJakub Kicinski 
3794d9ae7f2bSJakub Kicinski 	nfp_for_each_insn_walk3(nfp_prog, meta1, meta2, meta3) {
3795d9ae7f2bSJakub Kicinski 		struct bpf_insn insn, next1, next2;
3796d9ae7f2bSJakub Kicinski 
3797d9ae7f2bSJakub Kicinski 		insn = meta1->insn;
3798d9ae7f2bSJakub Kicinski 		next1 = meta2->insn;
3799d9ae7f2bSJakub Kicinski 		next2 = meta3->insn;
3800d9ae7f2bSJakub Kicinski 
3801d9ae7f2bSJakub Kicinski 		if (BPF_CLASS(insn.code) != BPF_LD)
3802d9ae7f2bSJakub Kicinski 			continue;
3803d9ae7f2bSJakub Kicinski 		if (BPF_MODE(insn.code) != BPF_ABS &&
3804d9ae7f2bSJakub Kicinski 		    BPF_MODE(insn.code) != BPF_IND)
3805d9ae7f2bSJakub Kicinski 			continue;
3806d9ae7f2bSJakub Kicinski 		if (BPF_SIZE(insn.code) != BPF_W)
3807d9ae7f2bSJakub Kicinski 			continue;
3808d9ae7f2bSJakub Kicinski 
3809d9ae7f2bSJakub Kicinski 		if (!(next1.code == (BPF_LSH | BPF_K | BPF_ALU64) &&
3810d9ae7f2bSJakub Kicinski 		      next2.code == (BPF_RSH | BPF_K | BPF_ALU64)) &&
3811d9ae7f2bSJakub Kicinski 		    !(next1.code == (BPF_RSH | BPF_K | BPF_ALU64) &&
3812d9ae7f2bSJakub Kicinski 		      next2.code == (BPF_LSH | BPF_K | BPF_ALU64)))
3813d9ae7f2bSJakub Kicinski 			continue;
3814d9ae7f2bSJakub Kicinski 
3815d9ae7f2bSJakub Kicinski 		if (next1.src_reg || next1.dst_reg ||
3816d9ae7f2bSJakub Kicinski 		    next2.src_reg || next2.dst_reg)
3817d9ae7f2bSJakub Kicinski 			continue;
3818d9ae7f2bSJakub Kicinski 
3819d9ae7f2bSJakub Kicinski 		if (next1.imm != 0x20 || next2.imm != 0x20)
3820d9ae7f2bSJakub Kicinski 			continue;
3821d9ae7f2bSJakub Kicinski 
382229fe46efSJiong Wang 		if (meta2->flags & FLAG_INSN_IS_JUMP_DST ||
382329fe46efSJiong Wang 		    meta3->flags & FLAG_INSN_IS_JUMP_DST)
382429fe46efSJiong Wang 			continue;
382529fe46efSJiong Wang 
3826d9ae7f2bSJakub Kicinski 		meta2->skip = true;
3827d9ae7f2bSJakub Kicinski 		meta3->skip = true;
3828d9ae7f2bSJakub Kicinski 	}
3829d9ae7f2bSJakub Kicinski }
3830d9ae7f2bSJakub Kicinski 
38316bc7103cSJiong Wang /* load/store pair that forms memory copy sould look like the following:
38326bc7103cSJiong Wang  *
38336bc7103cSJiong Wang  *   ld_width R, [addr_src + offset_src]
38346bc7103cSJiong Wang  *   st_width [addr_dest + offset_dest], R
38356bc7103cSJiong Wang  *
38366bc7103cSJiong Wang  * The destination register of load and source register of store should
38376bc7103cSJiong Wang  * be the same, load and store should also perform at the same width.
38386bc7103cSJiong Wang  * If either of addr_src or addr_dest is stack pointer, we don't do the
38396bc7103cSJiong Wang  * CPP optimization as stack is modelled by registers on NFP.
38406bc7103cSJiong Wang  */
38416bc7103cSJiong Wang static bool
38426bc7103cSJiong Wang curr_pair_is_memcpy(struct nfp_insn_meta *ld_meta,
38436bc7103cSJiong Wang 		    struct nfp_insn_meta *st_meta)
38446bc7103cSJiong Wang {
38456bc7103cSJiong Wang 	struct bpf_insn *ld = &ld_meta->insn;
38466bc7103cSJiong Wang 	struct bpf_insn *st = &st_meta->insn;
38476bc7103cSJiong Wang 
38486bc7103cSJiong Wang 	if (!is_mbpf_load(ld_meta) || !is_mbpf_store(st_meta))
38496bc7103cSJiong Wang 		return false;
38506bc7103cSJiong Wang 
3851cc0dff6dSJiong Wang 	if (ld_meta->ptr.type != PTR_TO_PACKET &&
3852cc0dff6dSJiong Wang 	    ld_meta->ptr.type != PTR_TO_MAP_VALUE)
38536bc7103cSJiong Wang 		return false;
38546bc7103cSJiong Wang 
38556bc7103cSJiong Wang 	if (st_meta->ptr.type != PTR_TO_PACKET)
38566bc7103cSJiong Wang 		return false;
38576bc7103cSJiong Wang 
38586bc7103cSJiong Wang 	if (BPF_SIZE(ld->code) != BPF_SIZE(st->code))
38596bc7103cSJiong Wang 		return false;
38606bc7103cSJiong Wang 
38616bc7103cSJiong Wang 	if (ld->dst_reg != st->src_reg)
38626bc7103cSJiong Wang 		return false;
38636bc7103cSJiong Wang 
38646bc7103cSJiong Wang 	/* There is jump to the store insn in this pair. */
38656bc7103cSJiong Wang 	if (st_meta->flags & FLAG_INSN_IS_JUMP_DST)
38666bc7103cSJiong Wang 		return false;
38676bc7103cSJiong Wang 
38686bc7103cSJiong Wang 	return true;
38696bc7103cSJiong Wang }
38706bc7103cSJiong Wang 
38716bc7103cSJiong Wang /* Currently, we only support chaining load/store pairs if:
38726bc7103cSJiong Wang  *
38736bc7103cSJiong Wang  *  - Their address base registers are the same.
38746bc7103cSJiong Wang  *  - Their address offsets are in the same order.
38756bc7103cSJiong Wang  *  - They operate at the same memory width.
38766bc7103cSJiong Wang  *  - There is no jump into the middle of them.
38776bc7103cSJiong Wang  */
38786bc7103cSJiong Wang static bool
38796bc7103cSJiong Wang curr_pair_chain_with_previous(struct nfp_insn_meta *ld_meta,
38806bc7103cSJiong Wang 			      struct nfp_insn_meta *st_meta,
38816bc7103cSJiong Wang 			      struct bpf_insn *prev_ld,
38826bc7103cSJiong Wang 			      struct bpf_insn *prev_st)
38836bc7103cSJiong Wang {
38846bc7103cSJiong Wang 	u8 prev_size, curr_size, prev_ld_base, prev_st_base, prev_ld_dst;
38856bc7103cSJiong Wang 	struct bpf_insn *ld = &ld_meta->insn;
38866bc7103cSJiong Wang 	struct bpf_insn *st = &st_meta->insn;
38876bc7103cSJiong Wang 	s16 prev_ld_off, prev_st_off;
38886bc7103cSJiong Wang 
38896bc7103cSJiong Wang 	/* This pair is the start pair. */
38906bc7103cSJiong Wang 	if (!prev_ld)
38916bc7103cSJiong Wang 		return true;
38926bc7103cSJiong Wang 
38936bc7103cSJiong Wang 	prev_size = BPF_LDST_BYTES(prev_ld);
38946bc7103cSJiong Wang 	curr_size = BPF_LDST_BYTES(ld);
38956bc7103cSJiong Wang 	prev_ld_base = prev_ld->src_reg;
38966bc7103cSJiong Wang 	prev_st_base = prev_st->dst_reg;
38976bc7103cSJiong Wang 	prev_ld_dst = prev_ld->dst_reg;
38986bc7103cSJiong Wang 	prev_ld_off = prev_ld->off;
38996bc7103cSJiong Wang 	prev_st_off = prev_st->off;
39006bc7103cSJiong Wang 
39016bc7103cSJiong Wang 	if (ld->dst_reg != prev_ld_dst)
39026bc7103cSJiong Wang 		return false;
39036bc7103cSJiong Wang 
39046bc7103cSJiong Wang 	if (ld->src_reg != prev_ld_base || st->dst_reg != prev_st_base)
39056bc7103cSJiong Wang 		return false;
39066bc7103cSJiong Wang 
39076bc7103cSJiong Wang 	if (curr_size != prev_size)
39086bc7103cSJiong Wang 		return false;
39096bc7103cSJiong Wang 
39106bc7103cSJiong Wang 	/* There is jump to the head of this pair. */
39116bc7103cSJiong Wang 	if (ld_meta->flags & FLAG_INSN_IS_JUMP_DST)
39126bc7103cSJiong Wang 		return false;
39136bc7103cSJiong Wang 
39146bc7103cSJiong Wang 	/* Both in ascending order. */
39156bc7103cSJiong Wang 	if (prev_ld_off + prev_size == ld->off &&
39166bc7103cSJiong Wang 	    prev_st_off + prev_size == st->off)
39176bc7103cSJiong Wang 		return true;
39186bc7103cSJiong Wang 
39196bc7103cSJiong Wang 	/* Both in descending order. */
39206bc7103cSJiong Wang 	if (ld->off + curr_size == prev_ld_off &&
39216bc7103cSJiong Wang 	    st->off + curr_size == prev_st_off)
39226bc7103cSJiong Wang 		return true;
39236bc7103cSJiong Wang 
39246bc7103cSJiong Wang 	return false;
39256bc7103cSJiong Wang }
39266bc7103cSJiong Wang 
39276bc7103cSJiong Wang /* Return TRUE if cross memory access happens. Cross memory access means
39286bc7103cSJiong Wang  * store area is overlapping with load area that a later load might load
39296bc7103cSJiong Wang  * the value from previous store, for this case we can't treat the sequence
39306bc7103cSJiong Wang  * as an memory copy.
39316bc7103cSJiong Wang  */
39326bc7103cSJiong Wang static bool
39336bc7103cSJiong Wang cross_mem_access(struct bpf_insn *ld, struct nfp_insn_meta *head_ld_meta,
39346bc7103cSJiong Wang 		 struct nfp_insn_meta *head_st_meta)
39356bc7103cSJiong Wang {
39366bc7103cSJiong Wang 	s16 head_ld_off, head_st_off, ld_off;
39376bc7103cSJiong Wang 
39386bc7103cSJiong Wang 	/* Different pointer types does not overlap. */
39396bc7103cSJiong Wang 	if (head_ld_meta->ptr.type != head_st_meta->ptr.type)
39406bc7103cSJiong Wang 		return false;
39416bc7103cSJiong Wang 
39426bc7103cSJiong Wang 	/* load and store are both PTR_TO_PACKET, check ID info.  */
39436bc7103cSJiong Wang 	if (head_ld_meta->ptr.id != head_st_meta->ptr.id)
39446bc7103cSJiong Wang 		return true;
39456bc7103cSJiong Wang 
39466bc7103cSJiong Wang 	/* Canonicalize the offsets. Turn all of them against the original
39476bc7103cSJiong Wang 	 * base register.
39486bc7103cSJiong Wang 	 */
39496bc7103cSJiong Wang 	head_ld_off = head_ld_meta->insn.off + head_ld_meta->ptr.off;
39506bc7103cSJiong Wang 	head_st_off = head_st_meta->insn.off + head_st_meta->ptr.off;
39516bc7103cSJiong Wang 	ld_off = ld->off + head_ld_meta->ptr.off;
39526bc7103cSJiong Wang 
39536bc7103cSJiong Wang 	/* Ascending order cross. */
39546bc7103cSJiong Wang 	if (ld_off > head_ld_off &&
39556bc7103cSJiong Wang 	    head_ld_off < head_st_off && ld_off >= head_st_off)
39566bc7103cSJiong Wang 		return true;
39576bc7103cSJiong Wang 
39586bc7103cSJiong Wang 	/* Descending order cross. */
39596bc7103cSJiong Wang 	if (ld_off < head_ld_off &&
39606bc7103cSJiong Wang 	    head_ld_off > head_st_off && ld_off <= head_st_off)
39616bc7103cSJiong Wang 		return true;
39626bc7103cSJiong Wang 
39636bc7103cSJiong Wang 	return false;
39646bc7103cSJiong Wang }
39656bc7103cSJiong Wang 
39666bc7103cSJiong Wang /* This pass try to identify the following instructoin sequences.
39676bc7103cSJiong Wang  *
39686bc7103cSJiong Wang  *   load R, [regA + offA]
39696bc7103cSJiong Wang  *   store [regB + offB], R
39706bc7103cSJiong Wang  *   load R, [regA + offA + const_imm_A]
39716bc7103cSJiong Wang  *   store [regB + offB + const_imm_A], R
39726bc7103cSJiong Wang  *   load R, [regA + offA + 2 * const_imm_A]
39736bc7103cSJiong Wang  *   store [regB + offB + 2 * const_imm_A], R
39746bc7103cSJiong Wang  *   ...
39756bc7103cSJiong Wang  *
39766bc7103cSJiong Wang  * Above sequence is typically generated by compiler when lowering
39776bc7103cSJiong Wang  * memcpy. NFP prefer using CPP instructions to accelerate it.
39786bc7103cSJiong Wang  */
39796bc7103cSJiong Wang static void nfp_bpf_opt_ldst_gather(struct nfp_prog *nfp_prog)
39806bc7103cSJiong Wang {
39816bc7103cSJiong Wang 	struct nfp_insn_meta *head_ld_meta = NULL;
39826bc7103cSJiong Wang 	struct nfp_insn_meta *head_st_meta = NULL;
39836bc7103cSJiong Wang 	struct nfp_insn_meta *meta1, *meta2;
39846bc7103cSJiong Wang 	struct bpf_insn *prev_ld = NULL;
39856bc7103cSJiong Wang 	struct bpf_insn *prev_st = NULL;
39866bc7103cSJiong Wang 	u8 count = 0;
39876bc7103cSJiong Wang 
39886bc7103cSJiong Wang 	nfp_for_each_insn_walk2(nfp_prog, meta1, meta2) {
39896bc7103cSJiong Wang 		struct bpf_insn *ld = &meta1->insn;
39906bc7103cSJiong Wang 		struct bpf_insn *st = &meta2->insn;
39916bc7103cSJiong Wang 
39926bc7103cSJiong Wang 		/* Reset record status if any of the following if true:
39936bc7103cSJiong Wang 		 *   - The current insn pair is not load/store.
39946bc7103cSJiong Wang 		 *   - The load/store pair doesn't chain with previous one.
39956bc7103cSJiong Wang 		 *   - The chained load/store pair crossed with previous pair.
39966bc7103cSJiong Wang 		 *   - The chained load/store pair has a total size of memory
39976bc7103cSJiong Wang 		 *     copy beyond 128 bytes which is the maximum length a
39986bc7103cSJiong Wang 		 *     single NFP CPP command can transfer.
39996bc7103cSJiong Wang 		 */
40006bc7103cSJiong Wang 		if (!curr_pair_is_memcpy(meta1, meta2) ||
40016bc7103cSJiong Wang 		    !curr_pair_chain_with_previous(meta1, meta2, prev_ld,
40026bc7103cSJiong Wang 						   prev_st) ||
40036bc7103cSJiong Wang 		    (head_ld_meta && (cross_mem_access(ld, head_ld_meta,
40046bc7103cSJiong Wang 						       head_st_meta) ||
40056bc7103cSJiong Wang 				      head_ld_meta->ldst_gather_len >= 128))) {
40066bc7103cSJiong Wang 			if (!count)
40076bc7103cSJiong Wang 				continue;
40086bc7103cSJiong Wang 
40096bc7103cSJiong Wang 			if (count > 1) {
40106bc7103cSJiong Wang 				s16 prev_ld_off = prev_ld->off;
40116bc7103cSJiong Wang 				s16 prev_st_off = prev_st->off;
40126bc7103cSJiong Wang 				s16 head_ld_off = head_ld_meta->insn.off;
40136bc7103cSJiong Wang 
40146bc7103cSJiong Wang 				if (prev_ld_off < head_ld_off) {
40156bc7103cSJiong Wang 					head_ld_meta->insn.off = prev_ld_off;
40166bc7103cSJiong Wang 					head_st_meta->insn.off = prev_st_off;
40176bc7103cSJiong Wang 					head_ld_meta->ldst_gather_len =
40186bc7103cSJiong Wang 						-head_ld_meta->ldst_gather_len;
40196bc7103cSJiong Wang 				}
40206bc7103cSJiong Wang 
40216bc7103cSJiong Wang 				head_ld_meta->paired_st = &head_st_meta->insn;
40226bc7103cSJiong Wang 				head_st_meta->skip = true;
40236bc7103cSJiong Wang 			} else {
40246bc7103cSJiong Wang 				head_ld_meta->ldst_gather_len = 0;
40256bc7103cSJiong Wang 			}
40266bc7103cSJiong Wang 
40276bc7103cSJiong Wang 			/* If the chain is ended by an load/store pair then this
40286bc7103cSJiong Wang 			 * could serve as the new head of the the next chain.
40296bc7103cSJiong Wang 			 */
40306bc7103cSJiong Wang 			if (curr_pair_is_memcpy(meta1, meta2)) {
40316bc7103cSJiong Wang 				head_ld_meta = meta1;
40326bc7103cSJiong Wang 				head_st_meta = meta2;
40336bc7103cSJiong Wang 				head_ld_meta->ldst_gather_len =
40346bc7103cSJiong Wang 					BPF_LDST_BYTES(ld);
40356bc7103cSJiong Wang 				meta1 = nfp_meta_next(meta1);
40366bc7103cSJiong Wang 				meta2 = nfp_meta_next(meta2);
40376bc7103cSJiong Wang 				prev_ld = ld;
40386bc7103cSJiong Wang 				prev_st = st;
40396bc7103cSJiong Wang 				count = 1;
40406bc7103cSJiong Wang 			} else {
40416bc7103cSJiong Wang 				head_ld_meta = NULL;
40426bc7103cSJiong Wang 				head_st_meta = NULL;
40436bc7103cSJiong Wang 				prev_ld = NULL;
40446bc7103cSJiong Wang 				prev_st = NULL;
40456bc7103cSJiong Wang 				count = 0;
40466bc7103cSJiong Wang 			}
40476bc7103cSJiong Wang 
40486bc7103cSJiong Wang 			continue;
40496bc7103cSJiong Wang 		}
40506bc7103cSJiong Wang 
40516bc7103cSJiong Wang 		if (!head_ld_meta) {
40526bc7103cSJiong Wang 			head_ld_meta = meta1;
40536bc7103cSJiong Wang 			head_st_meta = meta2;
40546bc7103cSJiong Wang 		} else {
40556bc7103cSJiong Wang 			meta1->skip = true;
40566bc7103cSJiong Wang 			meta2->skip = true;
40576bc7103cSJiong Wang 		}
40586bc7103cSJiong Wang 
40596bc7103cSJiong Wang 		head_ld_meta->ldst_gather_len += BPF_LDST_BYTES(ld);
40606bc7103cSJiong Wang 		meta1 = nfp_meta_next(meta1);
40616bc7103cSJiong Wang 		meta2 = nfp_meta_next(meta2);
40626bc7103cSJiong Wang 		prev_ld = ld;
40636bc7103cSJiong Wang 		prev_st = st;
40646bc7103cSJiong Wang 		count++;
40656bc7103cSJiong Wang 	}
40666bc7103cSJiong Wang }
40676bc7103cSJiong Wang 
406887b10ecdSJiong Wang static void nfp_bpf_opt_pkt_cache(struct nfp_prog *nfp_prog)
406987b10ecdSJiong Wang {
407087b10ecdSJiong Wang 	struct nfp_insn_meta *meta, *range_node = NULL;
407187b10ecdSJiong Wang 	s16 range_start = 0, range_end = 0;
407287b10ecdSJiong Wang 	bool cache_avail = false;
407387b10ecdSJiong Wang 	struct bpf_insn *insn;
407487b10ecdSJiong Wang 	s32 range_ptr_off = 0;
407587b10ecdSJiong Wang 	u32 range_ptr_id = 0;
407687b10ecdSJiong Wang 
407787b10ecdSJiong Wang 	list_for_each_entry(meta, &nfp_prog->insns, l) {
407887b10ecdSJiong Wang 		if (meta->flags & FLAG_INSN_IS_JUMP_DST)
407987b10ecdSJiong Wang 			cache_avail = false;
408087b10ecdSJiong Wang 
408187b10ecdSJiong Wang 		if (meta->skip)
408287b10ecdSJiong Wang 			continue;
408387b10ecdSJiong Wang 
408487b10ecdSJiong Wang 		insn = &meta->insn;
408587b10ecdSJiong Wang 
408687b10ecdSJiong Wang 		if (is_mbpf_store_pkt(meta) ||
408787b10ecdSJiong Wang 		    insn->code == (BPF_JMP | BPF_CALL) ||
408887b10ecdSJiong Wang 		    is_mbpf_classic_store_pkt(meta) ||
408987b10ecdSJiong Wang 		    is_mbpf_classic_load(meta)) {
409087b10ecdSJiong Wang 			cache_avail = false;
409187b10ecdSJiong Wang 			continue;
409287b10ecdSJiong Wang 		}
409387b10ecdSJiong Wang 
409487b10ecdSJiong Wang 		if (!is_mbpf_load(meta))
409587b10ecdSJiong Wang 			continue;
409687b10ecdSJiong Wang 
409787b10ecdSJiong Wang 		if (meta->ptr.type != PTR_TO_PACKET || meta->ldst_gather_len) {
409887b10ecdSJiong Wang 			cache_avail = false;
409987b10ecdSJiong Wang 			continue;
410087b10ecdSJiong Wang 		}
410187b10ecdSJiong Wang 
410287b10ecdSJiong Wang 		if (!cache_avail) {
410387b10ecdSJiong Wang 			cache_avail = true;
410487b10ecdSJiong Wang 			if (range_node)
410587b10ecdSJiong Wang 				goto end_current_then_start_new;
410687b10ecdSJiong Wang 			goto start_new;
410787b10ecdSJiong Wang 		}
410887b10ecdSJiong Wang 
410987b10ecdSJiong Wang 		/* Check ID to make sure two reads share the same
411087b10ecdSJiong Wang 		 * variable offset against PTR_TO_PACKET, and check OFF
411187b10ecdSJiong Wang 		 * to make sure they also share the same constant
411287b10ecdSJiong Wang 		 * offset.
411387b10ecdSJiong Wang 		 *
411487b10ecdSJiong Wang 		 * OFFs don't really need to be the same, because they
411587b10ecdSJiong Wang 		 * are the constant offsets against PTR_TO_PACKET, so
411687b10ecdSJiong Wang 		 * for different OFFs, we could canonicalize them to
411787b10ecdSJiong Wang 		 * offsets against original packet pointer. We don't
411887b10ecdSJiong Wang 		 * support this.
411987b10ecdSJiong Wang 		 */
412087b10ecdSJiong Wang 		if (meta->ptr.id == range_ptr_id &&
412187b10ecdSJiong Wang 		    meta->ptr.off == range_ptr_off) {
412287b10ecdSJiong Wang 			s16 new_start = range_start;
412387b10ecdSJiong Wang 			s16 end, off = insn->off;
412487b10ecdSJiong Wang 			s16 new_end = range_end;
412587b10ecdSJiong Wang 			bool changed = false;
412687b10ecdSJiong Wang 
412787b10ecdSJiong Wang 			if (off < range_start) {
412887b10ecdSJiong Wang 				new_start = off;
412987b10ecdSJiong Wang 				changed = true;
413087b10ecdSJiong Wang 			}
413187b10ecdSJiong Wang 
413287b10ecdSJiong Wang 			end = off + BPF_LDST_BYTES(insn);
413387b10ecdSJiong Wang 			if (end > range_end) {
413487b10ecdSJiong Wang 				new_end = end;
413587b10ecdSJiong Wang 				changed = true;
413687b10ecdSJiong Wang 			}
413787b10ecdSJiong Wang 
413887b10ecdSJiong Wang 			if (!changed)
413987b10ecdSJiong Wang 				continue;
414087b10ecdSJiong Wang 
414187b10ecdSJiong Wang 			if (new_end - new_start <= 64) {
414287b10ecdSJiong Wang 				/* Install new range. */
414387b10ecdSJiong Wang 				range_start = new_start;
414487b10ecdSJiong Wang 				range_end = new_end;
414587b10ecdSJiong Wang 				continue;
414687b10ecdSJiong Wang 			}
414787b10ecdSJiong Wang 		}
414887b10ecdSJiong Wang 
414987b10ecdSJiong Wang end_current_then_start_new:
415087b10ecdSJiong Wang 		range_node->pkt_cache.range_start = range_start;
415187b10ecdSJiong Wang 		range_node->pkt_cache.range_end = range_end;
415287b10ecdSJiong Wang start_new:
415387b10ecdSJiong Wang 		range_node = meta;
415487b10ecdSJiong Wang 		range_node->pkt_cache.do_init = true;
415587b10ecdSJiong Wang 		range_ptr_id = range_node->ptr.id;
415687b10ecdSJiong Wang 		range_ptr_off = range_node->ptr.off;
415787b10ecdSJiong Wang 		range_start = insn->off;
415887b10ecdSJiong Wang 		range_end = insn->off + BPF_LDST_BYTES(insn);
415987b10ecdSJiong Wang 	}
416087b10ecdSJiong Wang 
416187b10ecdSJiong Wang 	if (range_node) {
416287b10ecdSJiong Wang 		range_node->pkt_cache.range_start = range_start;
416387b10ecdSJiong Wang 		range_node->pkt_cache.range_end = range_end;
416487b10ecdSJiong Wang 	}
416587b10ecdSJiong Wang 
416687b10ecdSJiong Wang 	list_for_each_entry(meta, &nfp_prog->insns, l) {
416787b10ecdSJiong Wang 		if (meta->skip)
416887b10ecdSJiong Wang 			continue;
416987b10ecdSJiong Wang 
417087b10ecdSJiong Wang 		if (is_mbpf_load_pkt(meta) && !meta->ldst_gather_len) {
417187b10ecdSJiong Wang 			if (meta->pkt_cache.do_init) {
417287b10ecdSJiong Wang 				range_start = meta->pkt_cache.range_start;
417387b10ecdSJiong Wang 				range_end = meta->pkt_cache.range_end;
417487b10ecdSJiong Wang 			} else {
417587b10ecdSJiong Wang 				meta->pkt_cache.range_start = range_start;
417687b10ecdSJiong Wang 				meta->pkt_cache.range_end = range_end;
417787b10ecdSJiong Wang 			}
417887b10ecdSJiong Wang 		}
417987b10ecdSJiong Wang 	}
418087b10ecdSJiong Wang }
418187b10ecdSJiong Wang 
4182d9ae7f2bSJakub Kicinski static int nfp_bpf_optimize(struct nfp_prog *nfp_prog)
4183d9ae7f2bSJakub Kicinski {
4184d9ae7f2bSJakub Kicinski 	nfp_bpf_opt_reg_init(nfp_prog);
4185d9ae7f2bSJakub Kicinski 
41866c59500cSJakub Kicinski 	nfp_bpf_opt_neg_add_sub(nfp_prog);
4187d9ae7f2bSJakub Kicinski 	nfp_bpf_opt_ld_mask(nfp_prog);
4188d9ae7f2bSJakub Kicinski 	nfp_bpf_opt_ld_shift(nfp_prog);
41896bc7103cSJiong Wang 	nfp_bpf_opt_ldst_gather(nfp_prog);
419087b10ecdSJiong Wang 	nfp_bpf_opt_pkt_cache(nfp_prog);
4191d9ae7f2bSJakub Kicinski 
4192d9ae7f2bSJakub Kicinski 	return 0;
4193d9ae7f2bSJakub Kicinski }
4194d9ae7f2bSJakub Kicinski 
4195b4264c96SJakub Kicinski static int nfp_bpf_replace_map_ptrs(struct nfp_prog *nfp_prog)
4196b4264c96SJakub Kicinski {
4197b4264c96SJakub Kicinski 	struct nfp_insn_meta *meta1, *meta2;
4198b4264c96SJakub Kicinski 	struct nfp_bpf_map *nfp_map;
4199b4264c96SJakub Kicinski 	struct bpf_map *map;
4200ab01f4acSJakub Kicinski 	u32 id;
4201b4264c96SJakub Kicinski 
4202b4264c96SJakub Kicinski 	nfp_for_each_insn_walk2(nfp_prog, meta1, meta2) {
4203b4264c96SJakub Kicinski 		if (meta1->skip || meta2->skip)
4204b4264c96SJakub Kicinski 			continue;
4205b4264c96SJakub Kicinski 
4206b4264c96SJakub Kicinski 		if (meta1->insn.code != (BPF_LD | BPF_IMM | BPF_DW) ||
4207b4264c96SJakub Kicinski 		    meta1->insn.src_reg != BPF_PSEUDO_MAP_FD)
4208b4264c96SJakub Kicinski 			continue;
4209b4264c96SJakub Kicinski 
4210b4264c96SJakub Kicinski 		map = (void *)(unsigned long)((u32)meta1->insn.imm |
4211b4264c96SJakub Kicinski 					      (u64)meta2->insn.imm << 32);
4212ab01f4acSJakub Kicinski 		if (bpf_map_offload_neutral(map)) {
4213ab01f4acSJakub Kicinski 			id = map->id;
4214ab01f4acSJakub Kicinski 		} else {
4215b4264c96SJakub Kicinski 			nfp_map = map_to_offmap(map)->dev_priv;
4216ab01f4acSJakub Kicinski 			id = nfp_map->tid;
4217ab01f4acSJakub Kicinski 		}
4218b4264c96SJakub Kicinski 
4219ab01f4acSJakub Kicinski 		meta1->insn.imm = id;
4220b4264c96SJakub Kicinski 		meta2->insn.imm = 0;
4221b4264c96SJakub Kicinski 	}
4222b4264c96SJakub Kicinski 
4223b4264c96SJakub Kicinski 	return 0;
4224b4264c96SJakub Kicinski }
4225b4264c96SJakub Kicinski 
42262314fe9eSJakub Kicinski static int nfp_bpf_ustore_calc(u64 *prog, unsigned int len)
4227fd068ddcSJakub Kicinski {
42282314fe9eSJakub Kicinski 	__le64 *ustore = (__force __le64 *)prog;
4229fd068ddcSJakub Kicinski 	int i;
4230fd068ddcSJakub Kicinski 
42312314fe9eSJakub Kicinski 	for (i = 0; i < len; i++) {
4232fd068ddcSJakub Kicinski 		int err;
4233fd068ddcSJakub Kicinski 
42342314fe9eSJakub Kicinski 		err = nfp_ustore_check_valid_no_ecc(prog[i]);
4235fd068ddcSJakub Kicinski 		if (err)
4236fd068ddcSJakub Kicinski 			return err;
4237fd068ddcSJakub Kicinski 
42382314fe9eSJakub Kicinski 		ustore[i] = cpu_to_le64(nfp_ustore_calc_ecc_insn(prog[i]));
4239fd068ddcSJakub Kicinski 	}
4240fd068ddcSJakub Kicinski 
4241fd068ddcSJakub Kicinski 	return 0;
4242fd068ddcSJakub Kicinski }
4243fd068ddcSJakub Kicinski 
424444a12eccSJakub Kicinski static void nfp_bpf_prog_trim(struct nfp_prog *nfp_prog)
424544a12eccSJakub Kicinski {
424644a12eccSJakub Kicinski 	void *prog;
424744a12eccSJakub Kicinski 
424844a12eccSJakub Kicinski 	prog = kvmalloc_array(nfp_prog->prog_len, sizeof(u64), GFP_KERNEL);
424944a12eccSJakub Kicinski 	if (!prog)
425044a12eccSJakub Kicinski 		return;
425144a12eccSJakub Kicinski 
425244a12eccSJakub Kicinski 	nfp_prog->__prog_alloc_len = nfp_prog->prog_len * sizeof(u64);
425344a12eccSJakub Kicinski 	memcpy(prog, nfp_prog->prog, nfp_prog->__prog_alloc_len);
425444a12eccSJakub Kicinski 	kvfree(nfp_prog->prog);
425544a12eccSJakub Kicinski 	nfp_prog->prog = prog;
425644a12eccSJakub Kicinski }
425744a12eccSJakub Kicinski 
4258c6c580d7SJakub Kicinski int nfp_bpf_jit(struct nfp_prog *nfp_prog)
4259d9ae7f2bSJakub Kicinski {
4260d9ae7f2bSJakub Kicinski 	int ret;
4261d9ae7f2bSJakub Kicinski 
4262b4264c96SJakub Kicinski 	ret = nfp_bpf_replace_map_ptrs(nfp_prog);
4263b4264c96SJakub Kicinski 	if (ret)
4264b4264c96SJakub Kicinski 		return ret;
4265b4264c96SJakub Kicinski 
4266d9ae7f2bSJakub Kicinski 	ret = nfp_bpf_optimize(nfp_prog);
4267d9ae7f2bSJakub Kicinski 	if (ret)
42689314c442SJakub Kicinski 		return ret;
4269d9ae7f2bSJakub Kicinski 
4270d9ae7f2bSJakub Kicinski 	ret = nfp_translate(nfp_prog);
4271d9ae7f2bSJakub Kicinski 	if (ret) {
4272d9ae7f2bSJakub Kicinski 		pr_err("Translation failed with error %d (translated: %u)\n",
4273d9ae7f2bSJakub Kicinski 		       ret, nfp_prog->n_translated);
42749314c442SJakub Kicinski 		return -EINVAL;
4275d9ae7f2bSJakub Kicinski 	}
4276d9ae7f2bSJakub Kicinski 
427744a12eccSJakub Kicinski 	nfp_bpf_prog_trim(nfp_prog);
427844a12eccSJakub Kicinski 
42792314fe9eSJakub Kicinski 	return ret;
4280d9ae7f2bSJakub Kicinski }
42811549921dSJakub Kicinski 
42821549921dSJakub Kicinski void nfp_bpf_jit_prepare(struct nfp_prog *nfp_prog, unsigned int cnt)
42831549921dSJakub Kicinski {
42841549921dSJakub Kicinski 	struct nfp_insn_meta *meta;
42851549921dSJakub Kicinski 
42861549921dSJakub Kicinski 	/* Another pass to record jump information. */
42871549921dSJakub Kicinski 	list_for_each_entry(meta, &nfp_prog->insns, l) {
42881549921dSJakub Kicinski 		struct nfp_insn_meta *dst_meta;
4289e3b49dc6SQuentin Monnet 		u64 code = meta->insn.code;
4290e3b49dc6SQuentin Monnet 		unsigned int dst_idx;
4291e3b49dc6SQuentin Monnet 		bool pseudo_call;
42921549921dSJakub Kicinski 
4293e3b49dc6SQuentin Monnet 		if (BPF_CLASS(code) != BPF_JMP)
4294e3b49dc6SQuentin Monnet 			continue;
4295e3b49dc6SQuentin Monnet 		if (BPF_OP(code) == BPF_EXIT)
4296e3b49dc6SQuentin Monnet 			continue;
4297e3b49dc6SQuentin Monnet 		if (is_mbpf_helper_call(meta))
4298e3b49dc6SQuentin Monnet 			continue;
42991549921dSJakub Kicinski 
4300e3b49dc6SQuentin Monnet 		/* If opcode is BPF_CALL at this point, this can only be a
4301e3b49dc6SQuentin Monnet 		 * BPF-to-BPF call (a.k.a pseudo call).
4302e3b49dc6SQuentin Monnet 		 */
4303e3b49dc6SQuentin Monnet 		pseudo_call = BPF_OP(code) == BPF_CALL;
4304e3b49dc6SQuentin Monnet 
4305e3b49dc6SQuentin Monnet 		if (pseudo_call)
4306e3b49dc6SQuentin Monnet 			dst_idx = meta->n + 1 + meta->insn.imm;
4307e3b49dc6SQuentin Monnet 		else
4308e3b49dc6SQuentin Monnet 			dst_idx = meta->n + 1 + meta->insn.off;
4309e3b49dc6SQuentin Monnet 
4310e3b49dc6SQuentin Monnet 		dst_meta = nfp_bpf_goto_meta(nfp_prog, meta, dst_idx, cnt);
4311e3b49dc6SQuentin Monnet 
4312e3b49dc6SQuentin Monnet 		if (pseudo_call)
4313e3b49dc6SQuentin Monnet 			dst_meta->flags |= FLAG_INSN_IS_SUBPROG_START;
4314e3b49dc6SQuentin Monnet 
43151549921dSJakub Kicinski 		dst_meta->flags |= FLAG_INSN_IS_JUMP_DST;
4316e3b49dc6SQuentin Monnet 		meta->jmp_dst = dst_meta;
43171549921dSJakub Kicinski 	}
43181549921dSJakub Kicinski }
43192314fe9eSJakub Kicinski 
432074801e50SQuentin Monnet bool nfp_bpf_supported_opcode(u8 code)
432174801e50SQuentin Monnet {
432274801e50SQuentin Monnet 	return !!instr_cb[code];
432374801e50SQuentin Monnet }
432474801e50SQuentin Monnet 
43252314fe9eSJakub Kicinski void *nfp_bpf_relo_for_vnic(struct nfp_prog *nfp_prog, struct nfp_bpf_vnic *bv)
43262314fe9eSJakub Kicinski {
43272314fe9eSJakub Kicinski 	unsigned int i;
43282314fe9eSJakub Kicinski 	u64 *prog;
43292314fe9eSJakub Kicinski 	int err;
43302314fe9eSJakub Kicinski 
43312314fe9eSJakub Kicinski 	prog = kmemdup(nfp_prog->prog, nfp_prog->prog_len * sizeof(u64),
43322314fe9eSJakub Kicinski 		       GFP_KERNEL);
43332314fe9eSJakub Kicinski 	if (!prog)
43342314fe9eSJakub Kicinski 		return ERR_PTR(-ENOMEM);
43352314fe9eSJakub Kicinski 
43362314fe9eSJakub Kicinski 	for (i = 0; i < nfp_prog->prog_len; i++) {
43372314fe9eSJakub Kicinski 		enum nfp_relo_type special;
433877a3d311SJakub Kicinski 		u32 val;
4339389f263bSQuentin Monnet 		u16 off;
43402314fe9eSJakub Kicinski 
43412314fe9eSJakub Kicinski 		special = FIELD_GET(OP_RELO_TYPE, prog[i]);
43422314fe9eSJakub Kicinski 		switch (special) {
43432314fe9eSJakub Kicinski 		case RELO_NONE:
43442314fe9eSJakub Kicinski 			continue;
43452314fe9eSJakub Kicinski 		case RELO_BR_REL:
43462314fe9eSJakub Kicinski 			br_add_offset(&prog[i], bv->start_off);
43472314fe9eSJakub Kicinski 			break;
43482314fe9eSJakub Kicinski 		case RELO_BR_GO_OUT:
43492314fe9eSJakub Kicinski 			br_set_offset(&prog[i],
43502314fe9eSJakub Kicinski 				      nfp_prog->tgt_out + bv->start_off);
43512314fe9eSJakub Kicinski 			break;
43522314fe9eSJakub Kicinski 		case RELO_BR_GO_ABORT:
43532314fe9eSJakub Kicinski 			br_set_offset(&prog[i],
43542314fe9eSJakub Kicinski 				      nfp_prog->tgt_abort + bv->start_off);
43552314fe9eSJakub Kicinski 			break;
4356389f263bSQuentin Monnet 		case RELO_BR_GO_CALL_PUSH_REGS:
4357389f263bSQuentin Monnet 			off = nfp_prog->tgt_call_push_regs + bv->start_off;
4358389f263bSQuentin Monnet 			br_set_offset(&prog[i], off);
4359389f263bSQuentin Monnet 			break;
4360389f263bSQuentin Monnet 		case RELO_BR_GO_CALL_POP_REGS:
4361389f263bSQuentin Monnet 			off = nfp_prog->tgt_call_pop_regs + bv->start_off;
4362389f263bSQuentin Monnet 			br_set_offset(&prog[i], off);
4363389f263bSQuentin Monnet 			break;
43642314fe9eSJakub Kicinski 		case RELO_BR_NEXT_PKT:
43652314fe9eSJakub Kicinski 			br_set_offset(&prog[i], bv->tgt_done);
43662314fe9eSJakub Kicinski 			break;
436777a3d311SJakub Kicinski 		case RELO_BR_HELPER:
436877a3d311SJakub Kicinski 			val = br_get_offset(prog[i]);
436977a3d311SJakub Kicinski 			val -= BR_OFF_RELO;
437077a3d311SJakub Kicinski 			switch (val) {
437177a3d311SJakub Kicinski 			case BPF_FUNC_map_lookup_elem:
437277a3d311SJakub Kicinski 				val = nfp_prog->bpf->helpers.map_lookup;
437377a3d311SJakub Kicinski 				break;
437444d65a47SJakub Kicinski 			case BPF_FUNC_map_update_elem:
437544d65a47SJakub Kicinski 				val = nfp_prog->bpf->helpers.map_update;
437644d65a47SJakub Kicinski 				break;
4377bfee64deSJakub Kicinski 			case BPF_FUNC_map_delete_elem:
4378bfee64deSJakub Kicinski 				val = nfp_prog->bpf->helpers.map_delete;
4379bfee64deSJakub Kicinski 				break;
43809816dd35SJakub Kicinski 			case BPF_FUNC_perf_event_output:
43819816dd35SJakub Kicinski 				val = nfp_prog->bpf->helpers.perf_event_output;
43829816dd35SJakub Kicinski 				break;
438377a3d311SJakub Kicinski 			default:
438477a3d311SJakub Kicinski 				pr_err("relocation of unknown helper %d\n",
438577a3d311SJakub Kicinski 				       val);
438677a3d311SJakub Kicinski 				err = -EINVAL;
438777a3d311SJakub Kicinski 				goto err_free_prog;
438877a3d311SJakub Kicinski 			}
438977a3d311SJakub Kicinski 			br_set_offset(&prog[i], val);
439077a3d311SJakub Kicinski 			break;
439177a3d311SJakub Kicinski 		case RELO_IMMED_REL:
439277a3d311SJakub Kicinski 			immed_add_value(&prog[i], bv->start_off);
439377a3d311SJakub Kicinski 			break;
43942314fe9eSJakub Kicinski 		}
43952314fe9eSJakub Kicinski 
43962314fe9eSJakub Kicinski 		prog[i] &= ~OP_RELO_TYPE;
43972314fe9eSJakub Kicinski 	}
43982314fe9eSJakub Kicinski 
43992314fe9eSJakub Kicinski 	err = nfp_bpf_ustore_calc(prog, nfp_prog->prog_len);
44002314fe9eSJakub Kicinski 	if (err)
44012314fe9eSJakub Kicinski 		goto err_free_prog;
44022314fe9eSJakub Kicinski 
44032314fe9eSJakub Kicinski 	return prog;
44042314fe9eSJakub Kicinski 
44052314fe9eSJakub Kicinski err_free_prog:
44062314fe9eSJakub Kicinski 	kfree(prog);
44072314fe9eSJakub Kicinski 	return ERR_PTR(err);
44082314fe9eSJakub Kicinski }
4409