1d9ae7f2bSJakub Kicinski /*
29816dd35SJakub Kicinski  * Copyright (C) 2016-2018 Netronome Systems, Inc.
3d9ae7f2bSJakub Kicinski  *
4d9ae7f2bSJakub Kicinski  * This software is dual licensed under the GNU General License Version 2,
5d9ae7f2bSJakub Kicinski  * June 1991 as shown in the file COPYING in the top-level directory of this
6d9ae7f2bSJakub Kicinski  * source tree or the BSD 2-Clause License provided below.  You have the
7d9ae7f2bSJakub Kicinski  * option to license this software under the complete terms of either license.
8d9ae7f2bSJakub Kicinski  *
9d9ae7f2bSJakub Kicinski  * The BSD 2-Clause License:
10d9ae7f2bSJakub Kicinski  *
11d9ae7f2bSJakub Kicinski  *     Redistribution and use in source and binary forms, with or
12d9ae7f2bSJakub Kicinski  *     without modification, are permitted provided that the following
13d9ae7f2bSJakub Kicinski  *     conditions are met:
14d9ae7f2bSJakub Kicinski  *
15d9ae7f2bSJakub Kicinski  *      1. Redistributions of source code must retain the above
16d9ae7f2bSJakub Kicinski  *         copyright notice, this list of conditions and the following
17d9ae7f2bSJakub Kicinski  *         disclaimer.
18d9ae7f2bSJakub Kicinski  *
19d9ae7f2bSJakub Kicinski  *      2. Redistributions in binary form must reproduce the above
20d9ae7f2bSJakub Kicinski  *         copyright notice, this list of conditions and the following
21d9ae7f2bSJakub Kicinski  *         disclaimer in the documentation and/or other materials
22d9ae7f2bSJakub Kicinski  *         provided with the distribution.
23d9ae7f2bSJakub Kicinski  *
24d9ae7f2bSJakub Kicinski  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
25d9ae7f2bSJakub Kicinski  * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
26d9ae7f2bSJakub Kicinski  * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
27d9ae7f2bSJakub Kicinski  * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
28d9ae7f2bSJakub Kicinski  * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
29d9ae7f2bSJakub Kicinski  * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
30d9ae7f2bSJakub Kicinski  * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
31d9ae7f2bSJakub Kicinski  * SOFTWARE.
32d9ae7f2bSJakub Kicinski  */
33d9ae7f2bSJakub Kicinski 
34d9ae7f2bSJakub Kicinski #define pr_fmt(fmt)	"NFP net bpf: " fmt
35d9ae7f2bSJakub Kicinski 
360d49eaf4SJakub Kicinski #include <linux/bug.h>
37d9ae7f2bSJakub Kicinski #include <linux/bpf.h>
38d9ae7f2bSJakub Kicinski #include <linux/filter.h>
392a952b03SJiong Wang #include <linux/kernel.h>
40d9ae7f2bSJakub Kicinski #include <linux/pkt_cls.h>
412a952b03SJiong Wang #include <linux/reciprocal_div.h>
42d9ae7f2bSJakub Kicinski #include <linux/unistd.h>
43d9ae7f2bSJakub Kicinski 
44d9ae7f2bSJakub Kicinski #include "main.h"
45d9ae7f2bSJakub Kicinski #include "../nfp_asm.h"
46d985888fSJakub Kicinski #include "../nfp_net_ctrl.h"
47d9ae7f2bSJakub Kicinski 
48d9ae7f2bSJakub Kicinski /* --- NFP prog --- */
49d9ae7f2bSJakub Kicinski /* Foreach "multiple" entries macros provide pos and next<n> pointers.
50d9ae7f2bSJakub Kicinski  * It's safe to modify the next pointers (but not pos).
51d9ae7f2bSJakub Kicinski  */
52d9ae7f2bSJakub Kicinski #define nfp_for_each_insn_walk2(nfp_prog, pos, next)			\
53d9ae7f2bSJakub Kicinski 	for (pos = list_first_entry(&(nfp_prog)->insns, typeof(*pos), l), \
54d9ae7f2bSJakub Kicinski 	     next = list_next_entry(pos, l);			\
55d9ae7f2bSJakub Kicinski 	     &(nfp_prog)->insns != &pos->l &&			\
56d9ae7f2bSJakub Kicinski 	     &(nfp_prog)->insns != &next->l;			\
57d9ae7f2bSJakub Kicinski 	     pos = nfp_meta_next(pos),				\
58d9ae7f2bSJakub Kicinski 	     next = nfp_meta_next(pos))
59d9ae7f2bSJakub Kicinski 
60d9ae7f2bSJakub Kicinski #define nfp_for_each_insn_walk3(nfp_prog, pos, next, next2)		\
61d9ae7f2bSJakub Kicinski 	for (pos = list_first_entry(&(nfp_prog)->insns, typeof(*pos), l), \
62d9ae7f2bSJakub Kicinski 	     next = list_next_entry(pos, l),			\
63d9ae7f2bSJakub Kicinski 	     next2 = list_next_entry(next, l);			\
64d9ae7f2bSJakub Kicinski 	     &(nfp_prog)->insns != &pos->l &&			\
65d9ae7f2bSJakub Kicinski 	     &(nfp_prog)->insns != &next->l &&			\
66d9ae7f2bSJakub Kicinski 	     &(nfp_prog)->insns != &next2->l;			\
67d9ae7f2bSJakub Kicinski 	     pos = nfp_meta_next(pos),				\
68d9ae7f2bSJakub Kicinski 	     next = nfp_meta_next(pos),				\
69d9ae7f2bSJakub Kicinski 	     next2 = nfp_meta_next(next))
70d9ae7f2bSJakub Kicinski 
71d9ae7f2bSJakub Kicinski static bool
72d9ae7f2bSJakub Kicinski nfp_meta_has_prev(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
73d9ae7f2bSJakub Kicinski {
74d9ae7f2bSJakub Kicinski 	return meta->l.prev != &nfp_prog->insns;
75d9ae7f2bSJakub Kicinski }
76d9ae7f2bSJakub Kicinski 
77d9ae7f2bSJakub Kicinski static void nfp_prog_push(struct nfp_prog *nfp_prog, u64 insn)
78d9ae7f2bSJakub Kicinski {
79e8a4796eSJakub Kicinski 	if (nfp_prog->__prog_alloc_len / sizeof(u64) == nfp_prog->prog_len) {
80e8a4796eSJakub Kicinski 		pr_warn("instruction limit reached (%u NFP instructions)\n",
81e8a4796eSJakub Kicinski 			nfp_prog->prog_len);
82d9ae7f2bSJakub Kicinski 		nfp_prog->error = -ENOSPC;
83d9ae7f2bSJakub Kicinski 		return;
84d9ae7f2bSJakub Kicinski 	}
85d9ae7f2bSJakub Kicinski 
86d9ae7f2bSJakub Kicinski 	nfp_prog->prog[nfp_prog->prog_len] = insn;
87d9ae7f2bSJakub Kicinski 	nfp_prog->prog_len++;
88d9ae7f2bSJakub Kicinski }
89d9ae7f2bSJakub Kicinski 
90d9ae7f2bSJakub Kicinski static unsigned int nfp_prog_current_offset(struct nfp_prog *nfp_prog)
91d9ae7f2bSJakub Kicinski {
922314fe9eSJakub Kicinski 	return nfp_prog->prog_len;
93d9ae7f2bSJakub Kicinski }
94d9ae7f2bSJakub Kicinski 
950d49eaf4SJakub Kicinski static bool
960d49eaf4SJakub Kicinski nfp_prog_confirm_current_offset(struct nfp_prog *nfp_prog, unsigned int off)
970d49eaf4SJakub Kicinski {
980d49eaf4SJakub Kicinski 	/* If there is a recorded error we may have dropped instructions;
990d49eaf4SJakub Kicinski 	 * that doesn't have to be due to translator bug, and the translation
1000d49eaf4SJakub Kicinski 	 * will fail anyway, so just return OK.
1010d49eaf4SJakub Kicinski 	 */
1020d49eaf4SJakub Kicinski 	if (nfp_prog->error)
1030d49eaf4SJakub Kicinski 		return true;
1040d49eaf4SJakub Kicinski 	return !WARN_ON_ONCE(nfp_prog_current_offset(nfp_prog) != off);
1050d49eaf4SJakub Kicinski }
1060d49eaf4SJakub Kicinski 
107d9ae7f2bSJakub Kicinski /* --- Emitters --- */
108d9ae7f2bSJakub Kicinski static void
109d9ae7f2bSJakub Kicinski __emit_cmd(struct nfp_prog *nfp_prog, enum cmd_tgt_map op,
110b556ddd9SJakub Kicinski 	   u8 mode, u8 xfer, u8 areg, u8 breg, u8 size, enum cmd_ctx_swap ctx,
111b556ddd9SJakub Kicinski 	   bool indir)
112d9ae7f2bSJakub Kicinski {
113d9ae7f2bSJakub Kicinski 	u64 insn;
114d9ae7f2bSJakub Kicinski 
115d9ae7f2bSJakub Kicinski 	insn =	FIELD_PREP(OP_CMD_A_SRC, areg) |
116d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_CMD_CTX, ctx) |
117d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_CMD_B_SRC, breg) |
118d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_CMD_TOKEN, cmd_tgt_act[op].token) |
119d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_CMD_XFER, xfer) |
120d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_CMD_CNT, size) |
121b556ddd9SJakub Kicinski 		FIELD_PREP(OP_CMD_SIG, ctx != CMD_CTX_NO_SWAP) |
122d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_CMD_TGT_CMD, cmd_tgt_act[op].tgt_cmd) |
1235468a8b9SJakub Kicinski 		FIELD_PREP(OP_CMD_INDIR, indir) |
124d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_CMD_MODE, mode);
125d9ae7f2bSJakub Kicinski 
126d9ae7f2bSJakub Kicinski 	nfp_prog_push(nfp_prog, insn);
127d9ae7f2bSJakub Kicinski }
128d9ae7f2bSJakub Kicinski 
129d9ae7f2bSJakub Kicinski static void
1305468a8b9SJakub Kicinski emit_cmd_any(struct nfp_prog *nfp_prog, enum cmd_tgt_map op, u8 mode, u8 xfer,
131b556ddd9SJakub Kicinski 	     swreg lreg, swreg rreg, u8 size, enum cmd_ctx_swap ctx, bool indir)
132d9ae7f2bSJakub Kicinski {
133d9ae7f2bSJakub Kicinski 	struct nfp_insn_re_regs reg;
134d9ae7f2bSJakub Kicinski 	int err;
135d9ae7f2bSJakub Kicinski 
136d9ae7f2bSJakub Kicinski 	err = swreg_to_restricted(reg_none(), lreg, rreg, &reg, false);
137d9ae7f2bSJakub Kicinski 	if (err) {
138d9ae7f2bSJakub Kicinski 		nfp_prog->error = err;
139d9ae7f2bSJakub Kicinski 		return;
140d9ae7f2bSJakub Kicinski 	}
141d9ae7f2bSJakub Kicinski 	if (reg.swap) {
142d9ae7f2bSJakub Kicinski 		pr_err("cmd can't swap arguments\n");
143d9ae7f2bSJakub Kicinski 		nfp_prog->error = -EFAULT;
144d9ae7f2bSJakub Kicinski 		return;
145d9ae7f2bSJakub Kicinski 	}
146995e101fSJakub Kicinski 	if (reg.dst_lmextn || reg.src_lmextn) {
147995e101fSJakub Kicinski 		pr_err("cmd can't use LMextn\n");
148995e101fSJakub Kicinski 		nfp_prog->error = -EFAULT;
149995e101fSJakub Kicinski 		return;
150995e101fSJakub Kicinski 	}
151d9ae7f2bSJakub Kicinski 
152b556ddd9SJakub Kicinski 	__emit_cmd(nfp_prog, op, mode, xfer, reg.areg, reg.breg, size, ctx,
1535468a8b9SJakub Kicinski 		   indir);
1545468a8b9SJakub Kicinski }
1555468a8b9SJakub Kicinski 
1565468a8b9SJakub Kicinski static void
1575468a8b9SJakub Kicinski emit_cmd(struct nfp_prog *nfp_prog, enum cmd_tgt_map op, u8 mode, u8 xfer,
158b556ddd9SJakub Kicinski 	 swreg lreg, swreg rreg, u8 size, enum cmd_ctx_swap ctx)
1595468a8b9SJakub Kicinski {
160b556ddd9SJakub Kicinski 	emit_cmd_any(nfp_prog, op, mode, xfer, lreg, rreg, size, ctx, false);
161d9ae7f2bSJakub Kicinski }
162d9ae7f2bSJakub Kicinski 
163d9ae7f2bSJakub Kicinski static void
1649879a381SJiong Wang emit_cmd_indir(struct nfp_prog *nfp_prog, enum cmd_tgt_map op, u8 mode, u8 xfer,
165b556ddd9SJakub Kicinski 	       swreg lreg, swreg rreg, u8 size, enum cmd_ctx_swap ctx)
1669879a381SJiong Wang {
167b556ddd9SJakub Kicinski 	emit_cmd_any(nfp_prog, op, mode, xfer, lreg, rreg, size, ctx, true);
1689879a381SJiong Wang }
1699879a381SJiong Wang 
1709879a381SJiong Wang static void
171d9ae7f2bSJakub Kicinski __emit_br(struct nfp_prog *nfp_prog, enum br_mask mask, enum br_ev_pip ev_pip,
172d9ae7f2bSJakub Kicinski 	  enum br_ctx_signal_state css, u16 addr, u8 defer)
173d9ae7f2bSJakub Kicinski {
174d9ae7f2bSJakub Kicinski 	u16 addr_lo, addr_hi;
175d9ae7f2bSJakub Kicinski 	u64 insn;
176d9ae7f2bSJakub Kicinski 
177d9ae7f2bSJakub Kicinski 	addr_lo = addr & (OP_BR_ADDR_LO >> __bf_shf(OP_BR_ADDR_LO));
178d9ae7f2bSJakub Kicinski 	addr_hi = addr != addr_lo;
179d9ae7f2bSJakub Kicinski 
180d9ae7f2bSJakub Kicinski 	insn = OP_BR_BASE |
181d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_BR_MASK, mask) |
182d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_BR_EV_PIP, ev_pip) |
183d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_BR_CSS, css) |
184d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_BR_DEFBR, defer) |
185d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_BR_ADDR_LO, addr_lo) |
186d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_BR_ADDR_HI, addr_hi);
187d9ae7f2bSJakub Kicinski 
188d9ae7f2bSJakub Kicinski 	nfp_prog_push(nfp_prog, insn);
189d9ae7f2bSJakub Kicinski }
190d9ae7f2bSJakub Kicinski 
1912314fe9eSJakub Kicinski static void
1922314fe9eSJakub Kicinski emit_br_relo(struct nfp_prog *nfp_prog, enum br_mask mask, u16 addr, u8 defer,
1932314fe9eSJakub Kicinski 	     enum nfp_relo_type relo)
194d9ae7f2bSJakub Kicinski {
1952314fe9eSJakub Kicinski 	if (mask == BR_UNC && defer > 2) {
196d9ae7f2bSJakub Kicinski 		pr_err("BUG: branch defer out of bounds %d\n", defer);
197d9ae7f2bSJakub Kicinski 		nfp_prog->error = -EFAULT;
198d9ae7f2bSJakub Kicinski 		return;
199d9ae7f2bSJakub Kicinski 	}
2002314fe9eSJakub Kicinski 
2012314fe9eSJakub Kicinski 	__emit_br(nfp_prog, mask,
2022314fe9eSJakub Kicinski 		  mask != BR_UNC ? BR_EV_PIP_COND : BR_EV_PIP_UNCOND,
2032314fe9eSJakub Kicinski 		  BR_CSS_NONE, addr, defer);
2042314fe9eSJakub Kicinski 
2052314fe9eSJakub Kicinski 	nfp_prog->prog[nfp_prog->prog_len - 1] |=
2062314fe9eSJakub Kicinski 		FIELD_PREP(OP_RELO_TYPE, relo);
207d9ae7f2bSJakub Kicinski }
208d9ae7f2bSJakub Kicinski 
209d9ae7f2bSJakub Kicinski static void
210d9ae7f2bSJakub Kicinski emit_br(struct nfp_prog *nfp_prog, enum br_mask mask, u16 addr, u8 defer)
211d9ae7f2bSJakub Kicinski {
2122314fe9eSJakub Kicinski 	emit_br_relo(nfp_prog, mask, addr, defer, RELO_BR_REL);
213d9ae7f2bSJakub Kicinski }
214d9ae7f2bSJakub Kicinski 
215d9ae7f2bSJakub Kicinski static void
216991f5b36SJiong Wang __emit_br_bit(struct nfp_prog *nfp_prog, u16 areg, u16 breg, u16 addr, u8 defer,
217991f5b36SJiong Wang 	      bool set, bool src_lmextn)
218991f5b36SJiong Wang {
219991f5b36SJiong Wang 	u16 addr_lo, addr_hi;
220991f5b36SJiong Wang 	u64 insn;
221991f5b36SJiong Wang 
222991f5b36SJiong Wang 	addr_lo = addr & (OP_BR_BIT_ADDR_LO >> __bf_shf(OP_BR_BIT_ADDR_LO));
223991f5b36SJiong Wang 	addr_hi = addr != addr_lo;
224991f5b36SJiong Wang 
225991f5b36SJiong Wang 	insn = OP_BR_BIT_BASE |
226991f5b36SJiong Wang 		FIELD_PREP(OP_BR_BIT_A_SRC, areg) |
227991f5b36SJiong Wang 		FIELD_PREP(OP_BR_BIT_B_SRC, breg) |
228991f5b36SJiong Wang 		FIELD_PREP(OP_BR_BIT_BV, set) |
229991f5b36SJiong Wang 		FIELD_PREP(OP_BR_BIT_DEFBR, defer) |
230991f5b36SJiong Wang 		FIELD_PREP(OP_BR_BIT_ADDR_LO, addr_lo) |
231991f5b36SJiong Wang 		FIELD_PREP(OP_BR_BIT_ADDR_HI, addr_hi) |
232991f5b36SJiong Wang 		FIELD_PREP(OP_BR_BIT_SRC_LMEXTN, src_lmextn);
233991f5b36SJiong Wang 
234991f5b36SJiong Wang 	nfp_prog_push(nfp_prog, insn);
235991f5b36SJiong Wang }
236991f5b36SJiong Wang 
237991f5b36SJiong Wang static void
238991f5b36SJiong Wang emit_br_bit_relo(struct nfp_prog *nfp_prog, swreg src, u8 bit, u16 addr,
239991f5b36SJiong Wang 		 u8 defer, bool set, enum nfp_relo_type relo)
240991f5b36SJiong Wang {
241991f5b36SJiong Wang 	struct nfp_insn_re_regs reg;
242991f5b36SJiong Wang 	int err;
243991f5b36SJiong Wang 
244991f5b36SJiong Wang 	/* NOTE: The bit to test is specified as an rotation amount, such that
245991f5b36SJiong Wang 	 *	 the bit to test will be placed on the MSB of the result when
246991f5b36SJiong Wang 	 *	 doing a rotate right. For bit X, we need right rotate X + 1.
247991f5b36SJiong Wang 	 */
248991f5b36SJiong Wang 	bit += 1;
249991f5b36SJiong Wang 
250991f5b36SJiong Wang 	err = swreg_to_restricted(reg_none(), src, reg_imm(bit), &reg, false);
251991f5b36SJiong Wang 	if (err) {
252991f5b36SJiong Wang 		nfp_prog->error = err;
253991f5b36SJiong Wang 		return;
254991f5b36SJiong Wang 	}
255991f5b36SJiong Wang 
256991f5b36SJiong Wang 	__emit_br_bit(nfp_prog, reg.areg, reg.breg, addr, defer, set,
257991f5b36SJiong Wang 		      reg.src_lmextn);
258991f5b36SJiong Wang 
259991f5b36SJiong Wang 	nfp_prog->prog[nfp_prog->prog_len - 1] |=
260991f5b36SJiong Wang 		FIELD_PREP(OP_RELO_TYPE, relo);
261991f5b36SJiong Wang }
262991f5b36SJiong Wang 
263991f5b36SJiong Wang static void
264991f5b36SJiong Wang emit_br_bset(struct nfp_prog *nfp_prog, swreg src, u8 bit, u16 addr, u8 defer)
265991f5b36SJiong Wang {
266991f5b36SJiong Wang 	emit_br_bit_relo(nfp_prog, src, bit, addr, defer, true, RELO_BR_REL);
267991f5b36SJiong Wang }
268991f5b36SJiong Wang 
269991f5b36SJiong Wang static void
270389f263bSQuentin Monnet __emit_br_alu(struct nfp_prog *nfp_prog, u16 areg, u16 breg, u16 imm_hi,
271389f263bSQuentin Monnet 	      u8 defer, bool dst_lmextn, bool src_lmextn)
272389f263bSQuentin Monnet {
273389f263bSQuentin Monnet 	u64 insn;
274389f263bSQuentin Monnet 
275389f263bSQuentin Monnet 	insn = OP_BR_ALU_BASE |
276389f263bSQuentin Monnet 		FIELD_PREP(OP_BR_ALU_A_SRC, areg) |
277389f263bSQuentin Monnet 		FIELD_PREP(OP_BR_ALU_B_SRC, breg) |
278389f263bSQuentin Monnet 		FIELD_PREP(OP_BR_ALU_DEFBR, defer) |
279389f263bSQuentin Monnet 		FIELD_PREP(OP_BR_ALU_IMM_HI, imm_hi) |
280389f263bSQuentin Monnet 		FIELD_PREP(OP_BR_ALU_SRC_LMEXTN, src_lmextn) |
281389f263bSQuentin Monnet 		FIELD_PREP(OP_BR_ALU_DST_LMEXTN, dst_lmextn);
282389f263bSQuentin Monnet 
283389f263bSQuentin Monnet 	nfp_prog_push(nfp_prog, insn);
284389f263bSQuentin Monnet }
285389f263bSQuentin Monnet 
286389f263bSQuentin Monnet static void emit_rtn(struct nfp_prog *nfp_prog, swreg base, u8 defer)
287389f263bSQuentin Monnet {
288389f263bSQuentin Monnet 	struct nfp_insn_ur_regs reg;
289389f263bSQuentin Monnet 	int err;
290389f263bSQuentin Monnet 
291389f263bSQuentin Monnet 	err = swreg_to_unrestricted(reg_none(), base, reg_imm(0), &reg);
292389f263bSQuentin Monnet 	if (err) {
293389f263bSQuentin Monnet 		nfp_prog->error = err;
294389f263bSQuentin Monnet 		return;
295389f263bSQuentin Monnet 	}
296389f263bSQuentin Monnet 
297389f263bSQuentin Monnet 	__emit_br_alu(nfp_prog, reg.areg, reg.breg, 0, defer, reg.dst_lmextn,
298389f263bSQuentin Monnet 		      reg.src_lmextn);
299389f263bSQuentin Monnet }
300389f263bSQuentin Monnet 
301389f263bSQuentin Monnet static void
302d9ae7f2bSJakub Kicinski __emit_immed(struct nfp_prog *nfp_prog, u16 areg, u16 breg, u16 imm_hi,
303d9ae7f2bSJakub Kicinski 	     enum immed_width width, bool invert,
304995e101fSJakub Kicinski 	     enum immed_shift shift, bool wr_both,
305995e101fSJakub Kicinski 	     bool dst_lmextn, bool src_lmextn)
306d9ae7f2bSJakub Kicinski {
307d9ae7f2bSJakub Kicinski 	u64 insn;
308d9ae7f2bSJakub Kicinski 
309d9ae7f2bSJakub Kicinski 	insn = OP_IMMED_BASE |
310d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_IMMED_A_SRC, areg) |
311d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_IMMED_B_SRC, breg) |
312d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_IMMED_IMM, imm_hi) |
313d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_IMMED_WIDTH, width) |
314d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_IMMED_INV, invert) |
315d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_IMMED_SHIFT, shift) |
316995e101fSJakub Kicinski 		FIELD_PREP(OP_IMMED_WR_AB, wr_both) |
317995e101fSJakub Kicinski 		FIELD_PREP(OP_IMMED_SRC_LMEXTN, src_lmextn) |
318995e101fSJakub Kicinski 		FIELD_PREP(OP_IMMED_DST_LMEXTN, dst_lmextn);
319d9ae7f2bSJakub Kicinski 
320d9ae7f2bSJakub Kicinski 	nfp_prog_push(nfp_prog, insn);
321d9ae7f2bSJakub Kicinski }
322d9ae7f2bSJakub Kicinski 
323d9ae7f2bSJakub Kicinski static void
324b3f868dfSJakub Kicinski emit_immed(struct nfp_prog *nfp_prog, swreg dst, u16 imm,
325d9ae7f2bSJakub Kicinski 	   enum immed_width width, bool invert, enum immed_shift shift)
326d9ae7f2bSJakub Kicinski {
327d9ae7f2bSJakub Kicinski 	struct nfp_insn_ur_regs reg;
328d9ae7f2bSJakub Kicinski 	int err;
329d9ae7f2bSJakub Kicinski 
330b3f868dfSJakub Kicinski 	if (swreg_type(dst) == NN_REG_IMM) {
331d9ae7f2bSJakub Kicinski 		nfp_prog->error = -EFAULT;
332d9ae7f2bSJakub Kicinski 		return;
333d9ae7f2bSJakub Kicinski 	}
334d9ae7f2bSJakub Kicinski 
335d9ae7f2bSJakub Kicinski 	err = swreg_to_unrestricted(dst, dst, reg_imm(imm & 0xff), &reg);
336d9ae7f2bSJakub Kicinski 	if (err) {
337d9ae7f2bSJakub Kicinski 		nfp_prog->error = err;
338d9ae7f2bSJakub Kicinski 		return;
339d9ae7f2bSJakub Kicinski 	}
340d9ae7f2bSJakub Kicinski 
3413239e7bbSJiong Wang 	/* Use reg.dst when destination is No-Dest. */
3423239e7bbSJiong Wang 	__emit_immed(nfp_prog,
3433239e7bbSJiong Wang 		     swreg_type(dst) == NN_REG_NONE ? reg.dst : reg.areg,
3443239e7bbSJiong Wang 		     reg.breg, imm >> 8, width, invert, shift,
3453239e7bbSJiong Wang 		     reg.wr_both, reg.dst_lmextn, reg.src_lmextn);
346d9ae7f2bSJakub Kicinski }
347d9ae7f2bSJakub Kicinski 
348d9ae7f2bSJakub Kicinski static void
349d9ae7f2bSJakub Kicinski __emit_shf(struct nfp_prog *nfp_prog, u16 dst, enum alu_dst_ab dst_ab,
350d9ae7f2bSJakub Kicinski 	   enum shf_sc sc, u8 shift,
351995e101fSJakub Kicinski 	   u16 areg, enum shf_op op, u16 breg, bool i8, bool sw, bool wr_both,
352995e101fSJakub Kicinski 	   bool dst_lmextn, bool src_lmextn)
353d9ae7f2bSJakub Kicinski {
354d9ae7f2bSJakub Kicinski 	u64 insn;
355d9ae7f2bSJakub Kicinski 
356d9ae7f2bSJakub Kicinski 	if (!FIELD_FIT(OP_SHF_SHIFT, shift)) {
357d9ae7f2bSJakub Kicinski 		nfp_prog->error = -EFAULT;
358d9ae7f2bSJakub Kicinski 		return;
359d9ae7f2bSJakub Kicinski 	}
360d9ae7f2bSJakub Kicinski 
361d9ae7f2bSJakub Kicinski 	if (sc == SHF_SC_L_SHF)
362d9ae7f2bSJakub Kicinski 		shift = 32 - shift;
363d9ae7f2bSJakub Kicinski 
364d9ae7f2bSJakub Kicinski 	insn = OP_SHF_BASE |
365d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_A_SRC, areg) |
366d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_SC, sc) |
367d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_B_SRC, breg) |
368d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_I8, i8) |
369d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_SW, sw) |
370d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_DST, dst) |
371d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_SHIFT, shift) |
372d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_OP, op) |
373d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_SHF_DST_AB, dst_ab) |
374995e101fSJakub Kicinski 		FIELD_PREP(OP_SHF_WR_AB, wr_both) |
375995e101fSJakub Kicinski 		FIELD_PREP(OP_SHF_SRC_LMEXTN, src_lmextn) |
376995e101fSJakub Kicinski 		FIELD_PREP(OP_SHF_DST_LMEXTN, dst_lmextn);
377d9ae7f2bSJakub Kicinski 
378d9ae7f2bSJakub Kicinski 	nfp_prog_push(nfp_prog, insn);
379d9ae7f2bSJakub Kicinski }
380d9ae7f2bSJakub Kicinski 
381d9ae7f2bSJakub Kicinski static void
382b3f868dfSJakub Kicinski emit_shf(struct nfp_prog *nfp_prog, swreg dst,
383b3f868dfSJakub Kicinski 	 swreg lreg, enum shf_op op, swreg rreg, enum shf_sc sc, u8 shift)
384d9ae7f2bSJakub Kicinski {
385d9ae7f2bSJakub Kicinski 	struct nfp_insn_re_regs reg;
386d9ae7f2bSJakub Kicinski 	int err;
387d9ae7f2bSJakub Kicinski 
388d9ae7f2bSJakub Kicinski 	err = swreg_to_restricted(dst, lreg, rreg, &reg, true);
389d9ae7f2bSJakub Kicinski 	if (err) {
390d9ae7f2bSJakub Kicinski 		nfp_prog->error = err;
391d9ae7f2bSJakub Kicinski 		return;
392d9ae7f2bSJakub Kicinski 	}
393d9ae7f2bSJakub Kicinski 
394d9ae7f2bSJakub Kicinski 	__emit_shf(nfp_prog, reg.dst, reg.dst_ab, sc, shift,
395995e101fSJakub Kicinski 		   reg.areg, op, reg.breg, reg.i8, reg.swap, reg.wr_both,
396995e101fSJakub Kicinski 		   reg.dst_lmextn, reg.src_lmextn);
397d9ae7f2bSJakub Kicinski }
398d9ae7f2bSJakub Kicinski 
399d9ae7f2bSJakub Kicinski static void
400991f5b36SJiong Wang emit_shf_indir(struct nfp_prog *nfp_prog, swreg dst,
401991f5b36SJiong Wang 	       swreg lreg, enum shf_op op, swreg rreg, enum shf_sc sc)
402991f5b36SJiong Wang {
403991f5b36SJiong Wang 	if (sc == SHF_SC_R_ROT) {
404991f5b36SJiong Wang 		pr_err("indirect shift is not allowed on rotation\n");
405991f5b36SJiong Wang 		nfp_prog->error = -EFAULT;
406991f5b36SJiong Wang 		return;
407991f5b36SJiong Wang 	}
408991f5b36SJiong Wang 
409991f5b36SJiong Wang 	emit_shf(nfp_prog, dst, lreg, op, rreg, sc, 0);
410991f5b36SJiong Wang }
411991f5b36SJiong Wang 
412991f5b36SJiong Wang static void
413d9ae7f2bSJakub Kicinski __emit_alu(struct nfp_prog *nfp_prog, u16 dst, enum alu_dst_ab dst_ab,
414995e101fSJakub Kicinski 	   u16 areg, enum alu_op op, u16 breg, bool swap, bool wr_both,
415995e101fSJakub Kicinski 	   bool dst_lmextn, bool src_lmextn)
416d9ae7f2bSJakub Kicinski {
417d9ae7f2bSJakub Kicinski 	u64 insn;
418d9ae7f2bSJakub Kicinski 
419d9ae7f2bSJakub Kicinski 	insn = OP_ALU_BASE |
420d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_ALU_A_SRC, areg) |
421d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_ALU_B_SRC, breg) |
422d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_ALU_DST, dst) |
423d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_ALU_SW, swap) |
424d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_ALU_OP, op) |
425d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_ALU_DST_AB, dst_ab) |
426995e101fSJakub Kicinski 		FIELD_PREP(OP_ALU_WR_AB, wr_both) |
427995e101fSJakub Kicinski 		FIELD_PREP(OP_ALU_SRC_LMEXTN, src_lmextn) |
428995e101fSJakub Kicinski 		FIELD_PREP(OP_ALU_DST_LMEXTN, dst_lmextn);
429d9ae7f2bSJakub Kicinski 
430d9ae7f2bSJakub Kicinski 	nfp_prog_push(nfp_prog, insn);
431d9ae7f2bSJakub Kicinski }
432d9ae7f2bSJakub Kicinski 
433d9ae7f2bSJakub Kicinski static void
434b3f868dfSJakub Kicinski emit_alu(struct nfp_prog *nfp_prog, swreg dst,
435b3f868dfSJakub Kicinski 	 swreg lreg, enum alu_op op, swreg rreg)
436d9ae7f2bSJakub Kicinski {
437d9ae7f2bSJakub Kicinski 	struct nfp_insn_ur_regs reg;
438d9ae7f2bSJakub Kicinski 	int err;
439d9ae7f2bSJakub Kicinski 
440d9ae7f2bSJakub Kicinski 	err = swreg_to_unrestricted(dst, lreg, rreg, &reg);
441d9ae7f2bSJakub Kicinski 	if (err) {
442d9ae7f2bSJakub Kicinski 		nfp_prog->error = err;
443d9ae7f2bSJakub Kicinski 		return;
444d9ae7f2bSJakub Kicinski 	}
445d9ae7f2bSJakub Kicinski 
446d9ae7f2bSJakub Kicinski 	__emit_alu(nfp_prog, reg.dst, reg.dst_ab,
447995e101fSJakub Kicinski 		   reg.areg, op, reg.breg, reg.swap, reg.wr_both,
448995e101fSJakub Kicinski 		   reg.dst_lmextn, reg.src_lmextn);
449d9ae7f2bSJakub Kicinski }
450d9ae7f2bSJakub Kicinski 
451d9ae7f2bSJakub Kicinski static void
452d3d23fdbSJiong Wang __emit_mul(struct nfp_prog *nfp_prog, enum alu_dst_ab dst_ab, u16 areg,
453d3d23fdbSJiong Wang 	   enum mul_type type, enum mul_step step, u16 breg, bool swap,
454d3d23fdbSJiong Wang 	   bool wr_both, bool dst_lmextn, bool src_lmextn)
455d3d23fdbSJiong Wang {
456d3d23fdbSJiong Wang 	u64 insn;
457d3d23fdbSJiong Wang 
458d3d23fdbSJiong Wang 	insn = OP_MUL_BASE |
459d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_A_SRC, areg) |
460d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_B_SRC, breg) |
461d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_STEP, step) |
462d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_DST_AB, dst_ab) |
463d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_SW, swap) |
464d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_TYPE, type) |
465d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_WR_AB, wr_both) |
466d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_SRC_LMEXTN, src_lmextn) |
467d3d23fdbSJiong Wang 		FIELD_PREP(OP_MUL_DST_LMEXTN, dst_lmextn);
468d3d23fdbSJiong Wang 
469d3d23fdbSJiong Wang 	nfp_prog_push(nfp_prog, insn);
470d3d23fdbSJiong Wang }
471d3d23fdbSJiong Wang 
472d3d23fdbSJiong Wang static void
473d3d23fdbSJiong Wang emit_mul(struct nfp_prog *nfp_prog, swreg lreg, enum mul_type type,
474d3d23fdbSJiong Wang 	 enum mul_step step, swreg rreg)
475d3d23fdbSJiong Wang {
476d3d23fdbSJiong Wang 	struct nfp_insn_ur_regs reg;
477d3d23fdbSJiong Wang 	u16 areg;
478d3d23fdbSJiong Wang 	int err;
479d3d23fdbSJiong Wang 
480d3d23fdbSJiong Wang 	if (type == MUL_TYPE_START && step != MUL_STEP_NONE) {
481d3d23fdbSJiong Wang 		nfp_prog->error = -EINVAL;
482d3d23fdbSJiong Wang 		return;
483d3d23fdbSJiong Wang 	}
484d3d23fdbSJiong Wang 
485d3d23fdbSJiong Wang 	if (step == MUL_LAST || step == MUL_LAST_2) {
486d3d23fdbSJiong Wang 		/* When type is step and step Number is LAST or LAST2, left
487d3d23fdbSJiong Wang 		 * source is used as destination.
488d3d23fdbSJiong Wang 		 */
489d3d23fdbSJiong Wang 		err = swreg_to_unrestricted(lreg, reg_none(), rreg, &reg);
490d3d23fdbSJiong Wang 		areg = reg.dst;
491d3d23fdbSJiong Wang 	} else {
492d3d23fdbSJiong Wang 		err = swreg_to_unrestricted(reg_none(), lreg, rreg, &reg);
493d3d23fdbSJiong Wang 		areg = reg.areg;
494d3d23fdbSJiong Wang 	}
495d3d23fdbSJiong Wang 
496d3d23fdbSJiong Wang 	if (err) {
497d3d23fdbSJiong Wang 		nfp_prog->error = err;
498d3d23fdbSJiong Wang 		return;
499d3d23fdbSJiong Wang 	}
500d3d23fdbSJiong Wang 
501d3d23fdbSJiong Wang 	__emit_mul(nfp_prog, reg.dst_ab, areg, type, step, reg.breg, reg.swap,
502d3d23fdbSJiong Wang 		   reg.wr_both, reg.dst_lmextn, reg.src_lmextn);
503d3d23fdbSJiong Wang }
504d3d23fdbSJiong Wang 
505d3d23fdbSJiong Wang static void
506d9ae7f2bSJakub Kicinski __emit_ld_field(struct nfp_prog *nfp_prog, enum shf_sc sc,
507d9ae7f2bSJakub Kicinski 		u8 areg, u8 bmask, u8 breg, u8 shift, bool imm8,
508995e101fSJakub Kicinski 		bool zero, bool swap, bool wr_both,
509995e101fSJakub Kicinski 		bool dst_lmextn, bool src_lmextn)
510d9ae7f2bSJakub Kicinski {
511d9ae7f2bSJakub Kicinski 	u64 insn;
512d9ae7f2bSJakub Kicinski 
513d9ae7f2bSJakub Kicinski 	insn = OP_LDF_BASE |
514d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_A_SRC, areg) |
515d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_SC, sc) |
516d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_B_SRC, breg) |
517d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_I8, imm8) |
518d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_SW, swap) |
519d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_ZF, zero) |
520d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_BMASK, bmask) |
521d9ae7f2bSJakub Kicinski 		FIELD_PREP(OP_LDF_SHF, shift) |
522995e101fSJakub Kicinski 		FIELD_PREP(OP_LDF_WR_AB, wr_both) |
523995e101fSJakub Kicinski 		FIELD_PREP(OP_LDF_SRC_LMEXTN, src_lmextn) |
524995e101fSJakub Kicinski 		FIELD_PREP(OP_LDF_DST_LMEXTN, dst_lmextn);
525d9ae7f2bSJakub Kicinski 
526d9ae7f2bSJakub Kicinski 	nfp_prog_push(nfp_prog, insn);
527d9ae7f2bSJakub Kicinski }
528d9ae7f2bSJakub Kicinski 
529d9ae7f2bSJakub Kicinski static void
530bc8c80a8SJakub Kicinski emit_ld_field_any(struct nfp_prog *nfp_prog, swreg dst, u8 bmask, swreg src,
531bc8c80a8SJakub Kicinski 		  enum shf_sc sc, u8 shift, bool zero)
532d9ae7f2bSJakub Kicinski {
533d9ae7f2bSJakub Kicinski 	struct nfp_insn_re_regs reg;
534d9ae7f2bSJakub Kicinski 	int err;
535d9ae7f2bSJakub Kicinski 
5362de1be1dSJakub Kicinski 	/* Note: ld_field is special as it uses one of the src regs as dst */
5372de1be1dSJakub Kicinski 	err = swreg_to_restricted(dst, dst, src, &reg, true);
538d9ae7f2bSJakub Kicinski 	if (err) {
539d9ae7f2bSJakub Kicinski 		nfp_prog->error = err;
540d9ae7f2bSJakub Kicinski 		return;
541d9ae7f2bSJakub Kicinski 	}
542d9ae7f2bSJakub Kicinski 
543d9ae7f2bSJakub Kicinski 	__emit_ld_field(nfp_prog, sc, reg.areg, bmask, reg.breg, shift,
544995e101fSJakub Kicinski 			reg.i8, zero, reg.swap, reg.wr_both,
545995e101fSJakub Kicinski 			reg.dst_lmextn, reg.src_lmextn);
546d9ae7f2bSJakub Kicinski }
547d9ae7f2bSJakub Kicinski 
548d9ae7f2bSJakub Kicinski static void
549b3f868dfSJakub Kicinski emit_ld_field(struct nfp_prog *nfp_prog, swreg dst, u8 bmask, swreg src,
550d9ae7f2bSJakub Kicinski 	      enum shf_sc sc, u8 shift)
551d9ae7f2bSJakub Kicinski {
552bc8c80a8SJakub Kicinski 	emit_ld_field_any(nfp_prog, dst, bmask, src, sc, shift, false);
553d9ae7f2bSJakub Kicinski }
554d9ae7f2bSJakub Kicinski 
5552df03a50SJakub Kicinski static void
5562df03a50SJakub Kicinski __emit_lcsr(struct nfp_prog *nfp_prog, u16 areg, u16 breg, bool wr, u16 addr,
5572df03a50SJakub Kicinski 	    bool dst_lmextn, bool src_lmextn)
5582df03a50SJakub Kicinski {
5592df03a50SJakub Kicinski 	u64 insn;
5602df03a50SJakub Kicinski 
5612df03a50SJakub Kicinski 	insn = OP_LCSR_BASE |
5622df03a50SJakub Kicinski 		FIELD_PREP(OP_LCSR_A_SRC, areg) |
5632df03a50SJakub Kicinski 		FIELD_PREP(OP_LCSR_B_SRC, breg) |
5642df03a50SJakub Kicinski 		FIELD_PREP(OP_LCSR_WRITE, wr) |
565df4a37d8SJakub Kicinski 		FIELD_PREP(OP_LCSR_ADDR, addr / 4) |
5662df03a50SJakub Kicinski 		FIELD_PREP(OP_LCSR_SRC_LMEXTN, src_lmextn) |
5672df03a50SJakub Kicinski 		FIELD_PREP(OP_LCSR_DST_LMEXTN, dst_lmextn);
5682df03a50SJakub Kicinski 
5692df03a50SJakub Kicinski 	nfp_prog_push(nfp_prog, insn);
5702df03a50SJakub Kicinski }
5712df03a50SJakub Kicinski 
5722df03a50SJakub Kicinski static void emit_csr_wr(struct nfp_prog *nfp_prog, swreg src, u16 addr)
5732df03a50SJakub Kicinski {
5742df03a50SJakub Kicinski 	struct nfp_insn_ur_regs reg;
5752df03a50SJakub Kicinski 	int err;
5762df03a50SJakub Kicinski 
5772df03a50SJakub Kicinski 	/* This instruction takes immeds instead of reg_none() for the ignored
5782df03a50SJakub Kicinski 	 * operand, but we can't encode 2 immeds in one instr with our normal
5792df03a50SJakub Kicinski 	 * swreg infra so if param is an immed, we encode as reg_none() and
5802df03a50SJakub Kicinski 	 * copy the immed to both operands.
5812df03a50SJakub Kicinski 	 */
5822df03a50SJakub Kicinski 	if (swreg_type(src) == NN_REG_IMM) {
5832df03a50SJakub Kicinski 		err = swreg_to_unrestricted(reg_none(), src, reg_none(), &reg);
5842df03a50SJakub Kicinski 		reg.breg = reg.areg;
5852df03a50SJakub Kicinski 	} else {
5862df03a50SJakub Kicinski 		err = swreg_to_unrestricted(reg_none(), src, reg_imm(0), &reg);
5872df03a50SJakub Kicinski 	}
5882df03a50SJakub Kicinski 	if (err) {
5892df03a50SJakub Kicinski 		nfp_prog->error = err;
5902df03a50SJakub Kicinski 		return;
5912df03a50SJakub Kicinski 	}
5922df03a50SJakub Kicinski 
593df4a37d8SJakub Kicinski 	__emit_lcsr(nfp_prog, reg.areg, reg.breg, true, addr,
5942df03a50SJakub Kicinski 		    false, reg.src_lmextn);
5952df03a50SJakub Kicinski }
5962df03a50SJakub Kicinski 
597df4a37d8SJakub Kicinski /* CSR value is read in following immed[gpr, 0] */
598df4a37d8SJakub Kicinski static void __emit_csr_rd(struct nfp_prog *nfp_prog, u16 addr)
599df4a37d8SJakub Kicinski {
600df4a37d8SJakub Kicinski 	__emit_lcsr(nfp_prog, 0, 0, false, addr, false, false);
601df4a37d8SJakub Kicinski }
602df4a37d8SJakub Kicinski 
6031c03e03fSJakub Kicinski static void emit_nop(struct nfp_prog *nfp_prog)
6041c03e03fSJakub Kicinski {
6051c03e03fSJakub Kicinski 	__emit_immed(nfp_prog, UR_REG_IMM, UR_REG_IMM, 0, 0, 0, 0, 0, 0, 0);
6061c03e03fSJakub Kicinski }
6071c03e03fSJakub Kicinski 
608d9ae7f2bSJakub Kicinski /* --- Wrappers --- */
609d9ae7f2bSJakub Kicinski static bool pack_immed(u32 imm, u16 *val, enum immed_shift *shift)
610d9ae7f2bSJakub Kicinski {
611d9ae7f2bSJakub Kicinski 	if (!(imm & 0xffff0000)) {
612d9ae7f2bSJakub Kicinski 		*val = imm;
613d9ae7f2bSJakub Kicinski 		*shift = IMMED_SHIFT_0B;
614d9ae7f2bSJakub Kicinski 	} else if (!(imm & 0xff0000ff)) {
615d9ae7f2bSJakub Kicinski 		*val = imm >> 8;
616d9ae7f2bSJakub Kicinski 		*shift = IMMED_SHIFT_1B;
617d9ae7f2bSJakub Kicinski 	} else if (!(imm & 0x0000ffff)) {
618d9ae7f2bSJakub Kicinski 		*val = imm >> 16;
619d9ae7f2bSJakub Kicinski 		*shift = IMMED_SHIFT_2B;
620d9ae7f2bSJakub Kicinski 	} else {
621d9ae7f2bSJakub Kicinski 		return false;
622d9ae7f2bSJakub Kicinski 	}
623d9ae7f2bSJakub Kicinski 
624d9ae7f2bSJakub Kicinski 	return true;
625d9ae7f2bSJakub Kicinski }
626d9ae7f2bSJakub Kicinski 
627b3f868dfSJakub Kicinski static void wrp_immed(struct nfp_prog *nfp_prog, swreg dst, u32 imm)
628d9ae7f2bSJakub Kicinski {
629d9ae7f2bSJakub Kicinski 	enum immed_shift shift;
630d9ae7f2bSJakub Kicinski 	u16 val;
631d9ae7f2bSJakub Kicinski 
632d9ae7f2bSJakub Kicinski 	if (pack_immed(imm, &val, &shift)) {
633d9ae7f2bSJakub Kicinski 		emit_immed(nfp_prog, dst, val, IMMED_WIDTH_ALL, false, shift);
634d9ae7f2bSJakub Kicinski 	} else if (pack_immed(~imm, &val, &shift)) {
635d9ae7f2bSJakub Kicinski 		emit_immed(nfp_prog, dst, val, IMMED_WIDTH_ALL, true, shift);
636d9ae7f2bSJakub Kicinski 	} else {
637d9ae7f2bSJakub Kicinski 		emit_immed(nfp_prog, dst, imm & 0xffff, IMMED_WIDTH_ALL,
638d9ae7f2bSJakub Kicinski 			   false, IMMED_SHIFT_0B);
639d9ae7f2bSJakub Kicinski 		emit_immed(nfp_prog, dst, imm >> 16, IMMED_WIDTH_WORD,
640d9ae7f2bSJakub Kicinski 			   false, IMMED_SHIFT_2B);
641d9ae7f2bSJakub Kicinski 	}
642d9ae7f2bSJakub Kicinski }
643d9ae7f2bSJakub Kicinski 
64477a3d311SJakub Kicinski static void
64577a3d311SJakub Kicinski wrp_immed_relo(struct nfp_prog *nfp_prog, swreg dst, u32 imm,
64677a3d311SJakub Kicinski 	       enum nfp_relo_type relo)
64777a3d311SJakub Kicinski {
64877a3d311SJakub Kicinski 	if (imm > 0xffff) {
64977a3d311SJakub Kicinski 		pr_err("relocation of a large immediate!\n");
65077a3d311SJakub Kicinski 		nfp_prog->error = -EFAULT;
65177a3d311SJakub Kicinski 		return;
65277a3d311SJakub Kicinski 	}
65377a3d311SJakub Kicinski 	emit_immed(nfp_prog, dst, imm, IMMED_WIDTH_ALL, false, IMMED_SHIFT_0B);
65477a3d311SJakub Kicinski 
65577a3d311SJakub Kicinski 	nfp_prog->prog[nfp_prog->prog_len - 1] |=
65677a3d311SJakub Kicinski 		FIELD_PREP(OP_RELO_TYPE, relo);
65777a3d311SJakub Kicinski }
65877a3d311SJakub Kicinski 
659d9ae7f2bSJakub Kicinski /* ur_load_imm_any() - encode immediate or use tmp register (unrestricted)
660d9ae7f2bSJakub Kicinski  * If the @imm is small enough encode it directly in operand and return
661d9ae7f2bSJakub Kicinski  * otherwise load @imm to a spare register and return its encoding.
662d9ae7f2bSJakub Kicinski  */
663b3f868dfSJakub Kicinski static swreg ur_load_imm_any(struct nfp_prog *nfp_prog, u32 imm, swreg tmp_reg)
664d9ae7f2bSJakub Kicinski {
665d9ae7f2bSJakub Kicinski 	if (FIELD_FIT(UR_REG_IMM_MAX, imm))
666d9ae7f2bSJakub Kicinski 		return reg_imm(imm);
667d9ae7f2bSJakub Kicinski 
668d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, tmp_reg, imm);
669d9ae7f2bSJakub Kicinski 	return tmp_reg;
670d9ae7f2bSJakub Kicinski }
671d9ae7f2bSJakub Kicinski 
672d9ae7f2bSJakub Kicinski /* re_load_imm_any() - encode immediate or use tmp register (restricted)
673d9ae7f2bSJakub Kicinski  * If the @imm is small enough encode it directly in operand and return
674d9ae7f2bSJakub Kicinski  * otherwise load @imm to a spare register and return its encoding.
675d9ae7f2bSJakub Kicinski  */
676b3f868dfSJakub Kicinski static swreg re_load_imm_any(struct nfp_prog *nfp_prog, u32 imm, swreg tmp_reg)
677d9ae7f2bSJakub Kicinski {
678d9ae7f2bSJakub Kicinski 	if (FIELD_FIT(RE_REG_IMM_MAX, imm))
679d9ae7f2bSJakub Kicinski 		return reg_imm(imm);
680d9ae7f2bSJakub Kicinski 
681d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, tmp_reg, imm);
682d9ae7f2bSJakub Kicinski 	return tmp_reg;
683d9ae7f2bSJakub Kicinski }
684d9ae7f2bSJakub Kicinski 
685ff42bb9fSJakub Kicinski static void wrp_nops(struct nfp_prog *nfp_prog, unsigned int count)
686ff42bb9fSJakub Kicinski {
687ff42bb9fSJakub Kicinski 	while (count--)
688ff42bb9fSJakub Kicinski 		emit_nop(nfp_prog);
689ff42bb9fSJakub Kicinski }
690ff42bb9fSJakub Kicinski 
691c000dfb5SJakub Kicinski static void wrp_mov(struct nfp_prog *nfp_prog, swreg dst, swreg src)
692c000dfb5SJakub Kicinski {
693c000dfb5SJakub Kicinski 	emit_alu(nfp_prog, dst, reg_none(), ALU_OP_NONE, src);
694c000dfb5SJakub Kicinski }
695c000dfb5SJakub Kicinski 
696d9ae7f2bSJakub Kicinski static void wrp_reg_mov(struct nfp_prog *nfp_prog, u16 dst, u16 src)
697d9ae7f2bSJakub Kicinski {
698c000dfb5SJakub Kicinski 	wrp_mov(nfp_prog, reg_both(dst), reg_b(src));
699d9ae7f2bSJakub Kicinski }
700d9ae7f2bSJakub Kicinski 
7019879a381SJiong Wang /* wrp_reg_subpart() - load @field_len bytes from @offset of @src, write the
7029879a381SJiong Wang  * result to @dst from low end.
7039879a381SJiong Wang  */
7049879a381SJiong Wang static void
7059879a381SJiong Wang wrp_reg_subpart(struct nfp_prog *nfp_prog, swreg dst, swreg src, u8 field_len,
7069879a381SJiong Wang 		u8 offset)
7079879a381SJiong Wang {
7089879a381SJiong Wang 	enum shf_sc sc = offset ? SHF_SC_R_SHF : SHF_SC_NONE;
7099879a381SJiong Wang 	u8 mask = (1 << field_len) - 1;
7109879a381SJiong Wang 
7119879a381SJiong Wang 	emit_ld_field_any(nfp_prog, dst, mask, src, sc, offset * 8, true);
7129879a381SJiong Wang }
7139879a381SJiong Wang 
71491ff69e8SJiong Wang /* wrp_reg_or_subpart() - load @field_len bytes from low end of @src, or the
71591ff69e8SJiong Wang  * result to @dst from offset, there is no change on the other bits of @dst.
71691ff69e8SJiong Wang  */
71791ff69e8SJiong Wang static void
71891ff69e8SJiong Wang wrp_reg_or_subpart(struct nfp_prog *nfp_prog, swreg dst, swreg src,
71991ff69e8SJiong Wang 		   u8 field_len, u8 offset)
72091ff69e8SJiong Wang {
72191ff69e8SJiong Wang 	enum shf_sc sc = offset ? SHF_SC_L_SHF : SHF_SC_NONE;
72291ff69e8SJiong Wang 	u8 mask = ((1 << field_len) - 1) << offset;
72391ff69e8SJiong Wang 
72491ff69e8SJiong Wang 	emit_ld_field(nfp_prog, dst, mask, src, sc, 32 - offset * 8);
72591ff69e8SJiong Wang }
72691ff69e8SJiong Wang 
7273dd43c33SJakub Kicinski static void
7283dd43c33SJakub Kicinski addr40_offset(struct nfp_prog *nfp_prog, u8 src_gpr, swreg offset,
7293dd43c33SJakub Kicinski 	      swreg *rega, swreg *regb)
7303dd43c33SJakub Kicinski {
7313dd43c33SJakub Kicinski 	if (offset == reg_imm(0)) {
7323dd43c33SJakub Kicinski 		*rega = reg_a(src_gpr);
7333dd43c33SJakub Kicinski 		*regb = reg_b(src_gpr + 1);
7343dd43c33SJakub Kicinski 		return;
7353dd43c33SJakub Kicinski 	}
7363dd43c33SJakub Kicinski 
7373dd43c33SJakub Kicinski 	emit_alu(nfp_prog, imm_a(nfp_prog), reg_a(src_gpr), ALU_OP_ADD, offset);
7383dd43c33SJakub Kicinski 	emit_alu(nfp_prog, imm_b(nfp_prog), reg_b(src_gpr + 1), ALU_OP_ADD_C,
7393dd43c33SJakub Kicinski 		 reg_imm(0));
7403dd43c33SJakub Kicinski 	*rega = imm_a(nfp_prog);
7413dd43c33SJakub Kicinski 	*regb = imm_b(nfp_prog);
7423dd43c33SJakub Kicinski }
7433dd43c33SJakub Kicinski 
7449879a381SJiong Wang /* NFP has Command Push Pull bus which supports bluk memory operations. */
7459879a381SJiong Wang static int nfp_cpp_memcpy(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
7469879a381SJiong Wang {
7479879a381SJiong Wang 	bool descending_seq = meta->ldst_gather_len < 0;
7489879a381SJiong Wang 	s16 len = abs(meta->ldst_gather_len);
7499879a381SJiong Wang 	swreg src_base, off;
7503dd43c33SJakub Kicinski 	bool src_40bit_addr;
7519879a381SJiong Wang 	unsigned int i;
7529879a381SJiong Wang 	u8 xfer_num;
7539879a381SJiong Wang 
7549879a381SJiong Wang 	off = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
7553dd43c33SJakub Kicinski 	src_40bit_addr = meta->ptr.type == PTR_TO_MAP_VALUE;
7569879a381SJiong Wang 	src_base = reg_a(meta->insn.src_reg * 2);
7579879a381SJiong Wang 	xfer_num = round_up(len, 4) / 4;
7589879a381SJiong Wang 
7593dd43c33SJakub Kicinski 	if (src_40bit_addr)
760cc0dff6dSJiong Wang 		addr40_offset(nfp_prog, meta->insn.src_reg * 2, off, &src_base,
7613dd43c33SJakub Kicinski 			      &off);
7623dd43c33SJakub Kicinski 
7638c900538SJiong Wang 	/* Setup PREV_ALU fields to override memory read length. */
7648c900538SJiong Wang 	if (len > 32)
7658c900538SJiong Wang 		wrp_immed(nfp_prog, reg_none(),
7668c900538SJiong Wang 			  CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, xfer_num - 1));
7678c900538SJiong Wang 
7689879a381SJiong Wang 	/* Memory read from source addr into transfer-in registers. */
7693dd43c33SJakub Kicinski 	emit_cmd_any(nfp_prog, CMD_TGT_READ32_SWAP,
7703dd43c33SJakub Kicinski 		     src_40bit_addr ? CMD_MODE_40b_BA : CMD_MODE_32b, 0,
771b556ddd9SJakub Kicinski 		     src_base, off, xfer_num - 1, CMD_CTX_SWAP, len > 32);
7729879a381SJiong Wang 
7739879a381SJiong Wang 	/* Move from transfer-in to transfer-out. */
7749879a381SJiong Wang 	for (i = 0; i < xfer_num; i++)
7759879a381SJiong Wang 		wrp_mov(nfp_prog, reg_xfer(i), reg_xfer(i));
7769879a381SJiong Wang 
7779879a381SJiong Wang 	off = re_load_imm_any(nfp_prog, meta->paired_st->off, imm_b(nfp_prog));
7789879a381SJiong Wang 
7799879a381SJiong Wang 	if (len <= 8) {
7809879a381SJiong Wang 		/* Use single direct_ref write8. */
7819879a381SJiong Wang 		emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0,
7829879a381SJiong Wang 			 reg_a(meta->paired_st->dst_reg * 2), off, len - 1,
783b556ddd9SJakub Kicinski 			 CMD_CTX_SWAP);
7848c900538SJiong Wang 	} else if (len <= 32 && IS_ALIGNED(len, 4)) {
7859879a381SJiong Wang 		/* Use single direct_ref write32. */
7869879a381SJiong Wang 		emit_cmd(nfp_prog, CMD_TGT_WRITE32_SWAP, CMD_MODE_32b, 0,
7879879a381SJiong Wang 			 reg_a(meta->paired_st->dst_reg * 2), off, xfer_num - 1,
788b556ddd9SJakub Kicinski 			 CMD_CTX_SWAP);
7898c900538SJiong Wang 	} else if (len <= 32) {
7909879a381SJiong Wang 		/* Use single indirect_ref write8. */
7919879a381SJiong Wang 		wrp_immed(nfp_prog, reg_none(),
7929879a381SJiong Wang 			  CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, len - 1));
7939879a381SJiong Wang 		emit_cmd_indir(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0,
7949879a381SJiong Wang 			       reg_a(meta->paired_st->dst_reg * 2), off,
795b556ddd9SJakub Kicinski 			       len - 1, CMD_CTX_SWAP);
7968c900538SJiong Wang 	} else if (IS_ALIGNED(len, 4)) {
7978c900538SJiong Wang 		/* Use single indirect_ref write32. */
7988c900538SJiong Wang 		wrp_immed(nfp_prog, reg_none(),
7998c900538SJiong Wang 			  CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, xfer_num - 1));
8008c900538SJiong Wang 		emit_cmd_indir(nfp_prog, CMD_TGT_WRITE32_SWAP, CMD_MODE_32b, 0,
8018c900538SJiong Wang 			       reg_a(meta->paired_st->dst_reg * 2), off,
802b556ddd9SJakub Kicinski 			       xfer_num - 1, CMD_CTX_SWAP);
8038c900538SJiong Wang 	} else if (len <= 40) {
8048c900538SJiong Wang 		/* Use one direct_ref write32 to write the first 32-bytes, then
8058c900538SJiong Wang 		 * another direct_ref write8 to write the remaining bytes.
8068c900538SJiong Wang 		 */
8078c900538SJiong Wang 		emit_cmd(nfp_prog, CMD_TGT_WRITE32_SWAP, CMD_MODE_32b, 0,
8088c900538SJiong Wang 			 reg_a(meta->paired_st->dst_reg * 2), off, 7,
809b556ddd9SJakub Kicinski 			 CMD_CTX_SWAP);
8108c900538SJiong Wang 
8118c900538SJiong Wang 		off = re_load_imm_any(nfp_prog, meta->paired_st->off + 32,
8128c900538SJiong Wang 				      imm_b(nfp_prog));
8138c900538SJiong Wang 		emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 8,
8148c900538SJiong Wang 			 reg_a(meta->paired_st->dst_reg * 2), off, len - 33,
815b556ddd9SJakub Kicinski 			 CMD_CTX_SWAP);
8168c900538SJiong Wang 	} else {
8178c900538SJiong Wang 		/* Use one indirect_ref write32 to write 4-bytes aligned length,
8188c900538SJiong Wang 		 * then another direct_ref write8 to write the remaining bytes.
8198c900538SJiong Wang 		 */
8208c900538SJiong Wang 		u8 new_off;
8218c900538SJiong Wang 
8228c900538SJiong Wang 		wrp_immed(nfp_prog, reg_none(),
8238c900538SJiong Wang 			  CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, xfer_num - 2));
8248c900538SJiong Wang 		emit_cmd_indir(nfp_prog, CMD_TGT_WRITE32_SWAP, CMD_MODE_32b, 0,
8258c900538SJiong Wang 			       reg_a(meta->paired_st->dst_reg * 2), off,
826b556ddd9SJakub Kicinski 			       xfer_num - 2, CMD_CTX_SWAP);
8278c900538SJiong Wang 		new_off = meta->paired_st->off + (xfer_num - 1) * 4;
8288c900538SJiong Wang 		off = re_load_imm_any(nfp_prog, new_off, imm_b(nfp_prog));
8298c900538SJiong Wang 		emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b,
8308c900538SJiong Wang 			 xfer_num - 1, reg_a(meta->paired_st->dst_reg * 2), off,
831b556ddd9SJakub Kicinski 			 (len & 0x3) - 1, CMD_CTX_SWAP);
8329879a381SJiong Wang 	}
8339879a381SJiong Wang 
8349879a381SJiong Wang 	/* TODO: The following extra load is to make sure data flow be identical
8359879a381SJiong Wang 	 *  before and after we do memory copy optimization.
8369879a381SJiong Wang 	 *
8379879a381SJiong Wang 	 *  The load destination register is not guaranteed to be dead, so we
8389879a381SJiong Wang 	 *  need to make sure it is loaded with the value the same as before
8399879a381SJiong Wang 	 *  this transformation.
8409879a381SJiong Wang 	 *
8419879a381SJiong Wang 	 *  These extra loads could be removed once we have accurate register
8429879a381SJiong Wang 	 *  usage information.
8439879a381SJiong Wang 	 */
8449879a381SJiong Wang 	if (descending_seq)
8459879a381SJiong Wang 		xfer_num = 0;
8469879a381SJiong Wang 	else if (BPF_SIZE(meta->insn.code) != BPF_DW)
8479879a381SJiong Wang 		xfer_num = xfer_num - 1;
8489879a381SJiong Wang 	else
8499879a381SJiong Wang 		xfer_num = xfer_num - 2;
8509879a381SJiong Wang 
8519879a381SJiong Wang 	switch (BPF_SIZE(meta->insn.code)) {
8529879a381SJiong Wang 	case BPF_B:
8539879a381SJiong Wang 		wrp_reg_subpart(nfp_prog, reg_both(meta->insn.dst_reg * 2),
8549879a381SJiong Wang 				reg_xfer(xfer_num), 1,
8559879a381SJiong Wang 				IS_ALIGNED(len, 4) ? 3 : (len & 3) - 1);
8569879a381SJiong Wang 		break;
8579879a381SJiong Wang 	case BPF_H:
8589879a381SJiong Wang 		wrp_reg_subpart(nfp_prog, reg_both(meta->insn.dst_reg * 2),
8599879a381SJiong Wang 				reg_xfer(xfer_num), 2, (len & 3) ^ 2);
8609879a381SJiong Wang 		break;
8619879a381SJiong Wang 	case BPF_W:
8629879a381SJiong Wang 		wrp_mov(nfp_prog, reg_both(meta->insn.dst_reg * 2),
8639879a381SJiong Wang 			reg_xfer(0));
8649879a381SJiong Wang 		break;
8659879a381SJiong Wang 	case BPF_DW:
8669879a381SJiong Wang 		wrp_mov(nfp_prog, reg_both(meta->insn.dst_reg * 2),
8679879a381SJiong Wang 			reg_xfer(xfer_num));
8689879a381SJiong Wang 		wrp_mov(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1),
8699879a381SJiong Wang 			reg_xfer(xfer_num + 1));
8709879a381SJiong Wang 		break;
8719879a381SJiong Wang 	}
8729879a381SJiong Wang 
8739879a381SJiong Wang 	if (BPF_SIZE(meta->insn.code) != BPF_DW)
8749879a381SJiong Wang 		wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
8759879a381SJiong Wang 
8769879a381SJiong Wang 	return 0;
8779879a381SJiong Wang }
8789879a381SJiong Wang 
879d9ae7f2bSJakub Kicinski static int
8800a793977SJakub Kicinski data_ld(struct nfp_prog *nfp_prog, swreg offset, u8 dst_gpr, int size)
881d9ae7f2bSJakub Kicinski {
882d9ae7f2bSJakub Kicinski 	unsigned int i;
883d9ae7f2bSJakub Kicinski 	u16 shift, sz;
884d9ae7f2bSJakub Kicinski 
885d9ae7f2bSJakub Kicinski 	/* We load the value from the address indicated in @offset and then
886d9ae7f2bSJakub Kicinski 	 * shift out the data we don't need.  Note: this is big endian!
887d9ae7f2bSJakub Kicinski 	 */
8880a793977SJakub Kicinski 	sz = max(size, 4);
889d9ae7f2bSJakub Kicinski 	shift = size < 4 ? 4 - size : 0;
890d9ae7f2bSJakub Kicinski 
8910a793977SJakub Kicinski 	emit_cmd(nfp_prog, CMD_TGT_READ8, CMD_MODE_32b, 0,
892b556ddd9SJakub Kicinski 		 pptr_reg(nfp_prog), offset, sz - 1, CMD_CTX_SWAP);
8930a793977SJakub Kicinski 
8940a793977SJakub Kicinski 	i = 0;
8950a793977SJakub Kicinski 	if (shift)
8960a793977SJakub Kicinski 		emit_shf(nfp_prog, reg_both(dst_gpr), reg_none(), SHF_OP_NONE,
8970a793977SJakub Kicinski 			 reg_xfer(0), SHF_SC_R_SHF, shift * 8);
8980a793977SJakub Kicinski 	else
8990a793977SJakub Kicinski 		for (; i * 4 < size; i++)
9000a793977SJakub Kicinski 			wrp_mov(nfp_prog, reg_both(dst_gpr + i), reg_xfer(i));
9010a793977SJakub Kicinski 
9020a793977SJakub Kicinski 	if (i < 2)
9030a793977SJakub Kicinski 		wrp_immed(nfp_prog, reg_both(dst_gpr + 1), 0);
9040a793977SJakub Kicinski 
9050a793977SJakub Kicinski 	return 0;
9060a793977SJakub Kicinski }
9070a793977SJakub Kicinski 
9080a793977SJakub Kicinski static int
9093dd43c33SJakub Kicinski data_ld_host_order(struct nfp_prog *nfp_prog, u8 dst_gpr,
9103dd43c33SJakub Kicinski 		   swreg lreg, swreg rreg, int size, enum cmd_mode mode)
9112ca71441SJakub Kicinski {
9122ca71441SJakub Kicinski 	unsigned int i;
9132ca71441SJakub Kicinski 	u8 mask, sz;
9142ca71441SJakub Kicinski 
9153dd43c33SJakub Kicinski 	/* We load the value from the address indicated in rreg + lreg and then
9162ca71441SJakub Kicinski 	 * mask out the data we don't need.  Note: this is little endian!
9172ca71441SJakub Kicinski 	 */
9182ca71441SJakub Kicinski 	sz = max(size, 4);
9192ca71441SJakub Kicinski 	mask = size < 4 ? GENMASK(size - 1, 0) : 0;
9202ca71441SJakub Kicinski 
9213dd43c33SJakub Kicinski 	emit_cmd(nfp_prog, CMD_TGT_READ32_SWAP, mode, 0,
922b556ddd9SJakub Kicinski 		 lreg, rreg, sz / 4 - 1, CMD_CTX_SWAP);
9232ca71441SJakub Kicinski 
9242ca71441SJakub Kicinski 	i = 0;
9252ca71441SJakub Kicinski 	if (mask)
9262ca71441SJakub Kicinski 		emit_ld_field_any(nfp_prog, reg_both(dst_gpr), mask,
9272ca71441SJakub Kicinski 				  reg_xfer(0), SHF_SC_NONE, 0, true);
9282ca71441SJakub Kicinski 	else
9292ca71441SJakub Kicinski 		for (; i * 4 < size; i++)
9302ca71441SJakub Kicinski 			wrp_mov(nfp_prog, reg_both(dst_gpr + i), reg_xfer(i));
9312ca71441SJakub Kicinski 
9322ca71441SJakub Kicinski 	if (i < 2)
9332ca71441SJakub Kicinski 		wrp_immed(nfp_prog, reg_both(dst_gpr + 1), 0);
9342ca71441SJakub Kicinski 
9352ca71441SJakub Kicinski 	return 0;
9362ca71441SJakub Kicinski }
9372ca71441SJakub Kicinski 
9382ca71441SJakub Kicinski static int
9393dd43c33SJakub Kicinski data_ld_host_order_addr32(struct nfp_prog *nfp_prog, u8 src_gpr, swreg offset,
9403dd43c33SJakub Kicinski 			  u8 dst_gpr, u8 size)
9413dd43c33SJakub Kicinski {
9423dd43c33SJakub Kicinski 	return data_ld_host_order(nfp_prog, dst_gpr, reg_a(src_gpr), offset,
9433dd43c33SJakub Kicinski 				  size, CMD_MODE_32b);
9443dd43c33SJakub Kicinski }
9453dd43c33SJakub Kicinski 
9463dd43c33SJakub Kicinski static int
9473dd43c33SJakub Kicinski data_ld_host_order_addr40(struct nfp_prog *nfp_prog, u8 src_gpr, swreg offset,
9483dd43c33SJakub Kicinski 			  u8 dst_gpr, u8 size)
9493dd43c33SJakub Kicinski {
9503dd43c33SJakub Kicinski 	swreg rega, regb;
9513dd43c33SJakub Kicinski 
9523dd43c33SJakub Kicinski 	addr40_offset(nfp_prog, src_gpr, offset, &rega, &regb);
9533dd43c33SJakub Kicinski 
9543dd43c33SJakub Kicinski 	return data_ld_host_order(nfp_prog, dst_gpr, rega, regb,
9553dd43c33SJakub Kicinski 				  size, CMD_MODE_40b_BA);
9563dd43c33SJakub Kicinski }
9573dd43c33SJakub Kicinski 
9583dd43c33SJakub Kicinski static int
9590a793977SJakub Kicinski construct_data_ind_ld(struct nfp_prog *nfp_prog, u16 offset, u16 src, u8 size)
9600a793977SJakub Kicinski {
9610a793977SJakub Kicinski 	swreg tmp_reg;
9620a793977SJakub Kicinski 
963d9ae7f2bSJakub Kicinski 	/* Calculate the true offset (src_reg + imm) */
964d9ae7f2bSJakub Kicinski 	tmp_reg = ur_load_imm_any(nfp_prog, offset, imm_b(nfp_prog));
9650a793977SJakub Kicinski 	emit_alu(nfp_prog, imm_both(nfp_prog), reg_a(src), ALU_OP_ADD, tmp_reg);
9660a793977SJakub Kicinski 
967d9ae7f2bSJakub Kicinski 	/* Check packet length (size guaranteed to fit b/c it's u8) */
968d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, imm_a(nfp_prog),
969d9ae7f2bSJakub Kicinski 		 imm_a(nfp_prog), ALU_OP_ADD, reg_imm(size));
970d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
97118e53b6cSJakub Kicinski 		 plen_reg(nfp_prog), ALU_OP_SUB, imm_a(nfp_prog));
972e84797feSJakub Kicinski 	emit_br_relo(nfp_prog, BR_BLO, BR_OFF_RELO, 0, RELO_BR_GO_ABORT);
9730a793977SJakub Kicinski 
974d9ae7f2bSJakub Kicinski 	/* Load data */
9750a793977SJakub Kicinski 	return data_ld(nfp_prog, imm_b(nfp_prog), 0, size);
976d9ae7f2bSJakub Kicinski }
977d9ae7f2bSJakub Kicinski 
978d9ae7f2bSJakub Kicinski static int construct_data_ld(struct nfp_prog *nfp_prog, u16 offset, u8 size)
979d9ae7f2bSJakub Kicinski {
9800a793977SJakub Kicinski 	swreg tmp_reg;
9810a793977SJakub Kicinski 
9820a793977SJakub Kicinski 	/* Check packet length */
9830a793977SJakub Kicinski 	tmp_reg = ur_load_imm_any(nfp_prog, offset + size, imm_a(nfp_prog));
9840a793977SJakub Kicinski 	emit_alu(nfp_prog, reg_none(), plen_reg(nfp_prog), ALU_OP_SUB, tmp_reg);
985e84797feSJakub Kicinski 	emit_br_relo(nfp_prog, BR_BLO, BR_OFF_RELO, 0, RELO_BR_GO_ABORT);
9860a793977SJakub Kicinski 
9870a793977SJakub Kicinski 	/* Load data */
9880a793977SJakub Kicinski 	tmp_reg = re_load_imm_any(nfp_prog, offset, imm_b(nfp_prog));
9890a793977SJakub Kicinski 	return data_ld(nfp_prog, tmp_reg, 0, size);
990d9ae7f2bSJakub Kicinski }
991d9ae7f2bSJakub Kicinski 
992e663fe38SJakub Kicinski static int
993e663fe38SJakub Kicinski data_stx_host_order(struct nfp_prog *nfp_prog, u8 dst_gpr, swreg offset,
994e663fe38SJakub Kicinski 		    u8 src_gpr, u8 size)
995e663fe38SJakub Kicinski {
996e663fe38SJakub Kicinski 	unsigned int i;
997e663fe38SJakub Kicinski 
998e663fe38SJakub Kicinski 	for (i = 0; i * 4 < size; i++)
999e663fe38SJakub Kicinski 		wrp_mov(nfp_prog, reg_xfer(i), reg_a(src_gpr + i));
1000e663fe38SJakub Kicinski 
1001e663fe38SJakub Kicinski 	emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0,
1002b556ddd9SJakub Kicinski 		 reg_a(dst_gpr), offset, size - 1, CMD_CTX_SWAP);
1003e663fe38SJakub Kicinski 
1004e663fe38SJakub Kicinski 	return 0;
1005e663fe38SJakub Kicinski }
1006e663fe38SJakub Kicinski 
1007e663fe38SJakub Kicinski static int
1008e663fe38SJakub Kicinski data_st_host_order(struct nfp_prog *nfp_prog, u8 dst_gpr, swreg offset,
1009e663fe38SJakub Kicinski 		   u64 imm, u8 size)
1010e663fe38SJakub Kicinski {
1011e663fe38SJakub Kicinski 	wrp_immed(nfp_prog, reg_xfer(0), imm);
1012e663fe38SJakub Kicinski 	if (size == 8)
1013e663fe38SJakub Kicinski 		wrp_immed(nfp_prog, reg_xfer(1), imm >> 32);
1014e663fe38SJakub Kicinski 
1015e663fe38SJakub Kicinski 	emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0,
1016b556ddd9SJakub Kicinski 		 reg_a(dst_gpr), offset, size - 1, CMD_CTX_SWAP);
1017e663fe38SJakub Kicinski 
1018e663fe38SJakub Kicinski 	return 0;
1019e663fe38SJakub Kicinski }
1020e663fe38SJakub Kicinski 
1021ee9133a8SJakub Kicinski typedef int
1022ee9133a8SJakub Kicinski (*lmem_step)(struct nfp_prog *nfp_prog, u8 gpr, u8 gpr_byte, s32 off,
10232df03a50SJakub Kicinski 	     unsigned int size, bool first, bool new_gpr, bool last, bool lm3,
10242df03a50SJakub Kicinski 	     bool needs_inc);
1025a82b23fbSJakub Kicinski 
1026a82b23fbSJakub Kicinski static int
1027a82b23fbSJakub Kicinski wrp_lmem_load(struct nfp_prog *nfp_prog, u8 dst, u8 dst_byte, s32 off,
10282df03a50SJakub Kicinski 	      unsigned int size, bool first, bool new_gpr, bool last, bool lm3,
10292df03a50SJakub Kicinski 	      bool needs_inc)
1030a82b23fbSJakub Kicinski {
10312df03a50SJakub Kicinski 	bool should_inc = needs_inc && new_gpr && !last;
1032a82b23fbSJakub Kicinski 	u32 idx, src_byte;
1033a82b23fbSJakub Kicinski 	enum shf_sc sc;
1034a82b23fbSJakub Kicinski 	swreg reg;
1035a82b23fbSJakub Kicinski 	int shf;
1036a82b23fbSJakub Kicinski 	u8 mask;
1037a82b23fbSJakub Kicinski 
1038a82b23fbSJakub Kicinski 	if (WARN_ON_ONCE(dst_byte + size > 4 || off % 4 + size > 4))
1039a82b23fbSJakub Kicinski 		return -EOPNOTSUPP;
1040a82b23fbSJakub Kicinski 
1041a82b23fbSJakub Kicinski 	idx = off / 4;
1042a82b23fbSJakub Kicinski 
1043a82b23fbSJakub Kicinski 	/* Move the entire word */
1044a82b23fbSJakub Kicinski 	if (size == 4) {
10452df03a50SJakub Kicinski 		wrp_mov(nfp_prog, reg_both(dst),
10462df03a50SJakub Kicinski 			should_inc ? reg_lm_inc(3) : reg_lm(lm3 ? 3 : 0, idx));
1047a82b23fbSJakub Kicinski 		return 0;
1048a82b23fbSJakub Kicinski 	}
1049a82b23fbSJakub Kicinski 
10502df03a50SJakub Kicinski 	if (WARN_ON_ONCE(lm3 && idx > RE_REG_LM_IDX_MAX))
10512df03a50SJakub Kicinski 		return -EOPNOTSUPP;
10522df03a50SJakub Kicinski 
1053a82b23fbSJakub Kicinski 	src_byte = off % 4;
1054a82b23fbSJakub Kicinski 
1055a82b23fbSJakub Kicinski 	mask = (1 << size) - 1;
1056a82b23fbSJakub Kicinski 	mask <<= dst_byte;
1057a82b23fbSJakub Kicinski 
1058a82b23fbSJakub Kicinski 	if (WARN_ON_ONCE(mask > 0xf))
1059a82b23fbSJakub Kicinski 		return -EOPNOTSUPP;
1060a82b23fbSJakub Kicinski 
1061a82b23fbSJakub Kicinski 	shf = abs(src_byte - dst_byte) * 8;
1062a82b23fbSJakub Kicinski 	if (src_byte == dst_byte) {
1063a82b23fbSJakub Kicinski 		sc = SHF_SC_NONE;
1064a82b23fbSJakub Kicinski 	} else if (src_byte < dst_byte) {
1065a82b23fbSJakub Kicinski 		shf = 32 - shf;
1066a82b23fbSJakub Kicinski 		sc = SHF_SC_L_SHF;
1067a82b23fbSJakub Kicinski 	} else {
1068a82b23fbSJakub Kicinski 		sc = SHF_SC_R_SHF;
1069a82b23fbSJakub Kicinski 	}
1070a82b23fbSJakub Kicinski 
1071a82b23fbSJakub Kicinski 	/* ld_field can address fewer indexes, if offset too large do RMW.
1072a82b23fbSJakub Kicinski 	 * Because we RMV twice we waste 2 cycles on unaligned 8 byte writes.
1073a82b23fbSJakub Kicinski 	 */
1074a82b23fbSJakub Kicinski 	if (idx <= RE_REG_LM_IDX_MAX) {
10752df03a50SJakub Kicinski 		reg = reg_lm(lm3 ? 3 : 0, idx);
1076a82b23fbSJakub Kicinski 	} else {
1077a82b23fbSJakub Kicinski 		reg = imm_a(nfp_prog);
10789a90c83cSJakub Kicinski 		/* If it's not the first part of the load and we start a new GPR
10799a90c83cSJakub Kicinski 		 * that means we are loading a second part of the LMEM word into
10809a90c83cSJakub Kicinski 		 * a new GPR.  IOW we've already looked that LMEM word and
10819a90c83cSJakub Kicinski 		 * therefore it has been loaded into imm_a().
10829a90c83cSJakub Kicinski 		 */
10839a90c83cSJakub Kicinski 		if (first || !new_gpr)
1084a82b23fbSJakub Kicinski 			wrp_mov(nfp_prog, reg, reg_lm(0, idx));
1085a82b23fbSJakub Kicinski 	}
1086a82b23fbSJakub Kicinski 
1087a82b23fbSJakub Kicinski 	emit_ld_field_any(nfp_prog, reg_both(dst), mask, reg, sc, shf, new_gpr);
1088a82b23fbSJakub Kicinski 
10892df03a50SJakub Kicinski 	if (should_inc)
10902df03a50SJakub Kicinski 		wrp_mov(nfp_prog, reg_none(), reg_lm_inc(3));
10912df03a50SJakub Kicinski 
1092a82b23fbSJakub Kicinski 	return 0;
1093a82b23fbSJakub Kicinski }
1094ee9133a8SJakub Kicinski 
1095ee9133a8SJakub Kicinski static int
1096ee9133a8SJakub Kicinski wrp_lmem_store(struct nfp_prog *nfp_prog, u8 src, u8 src_byte, s32 off,
10972df03a50SJakub Kicinski 	       unsigned int size, bool first, bool new_gpr, bool last, bool lm3,
10982df03a50SJakub Kicinski 	       bool needs_inc)
1099ee9133a8SJakub Kicinski {
11002df03a50SJakub Kicinski 	bool should_inc = needs_inc && new_gpr && !last;
1101ee9133a8SJakub Kicinski 	u32 idx, dst_byte;
1102ee9133a8SJakub Kicinski 	enum shf_sc sc;
1103ee9133a8SJakub Kicinski 	swreg reg;
1104ee9133a8SJakub Kicinski 	int shf;
1105ee9133a8SJakub Kicinski 	u8 mask;
1106ee9133a8SJakub Kicinski 
1107ee9133a8SJakub Kicinski 	if (WARN_ON_ONCE(src_byte + size > 4 || off % 4 + size > 4))
1108ee9133a8SJakub Kicinski 		return -EOPNOTSUPP;
1109ee9133a8SJakub Kicinski 
1110ee9133a8SJakub Kicinski 	idx = off / 4;
1111ee9133a8SJakub Kicinski 
1112ee9133a8SJakub Kicinski 	/* Move the entire word */
1113ee9133a8SJakub Kicinski 	if (size == 4) {
11142df03a50SJakub Kicinski 		wrp_mov(nfp_prog,
11152df03a50SJakub Kicinski 			should_inc ? reg_lm_inc(3) : reg_lm(lm3 ? 3 : 0, idx),
11162df03a50SJakub Kicinski 			reg_b(src));
1117ee9133a8SJakub Kicinski 		return 0;
1118ee9133a8SJakub Kicinski 	}
1119ee9133a8SJakub Kicinski 
11202df03a50SJakub Kicinski 	if (WARN_ON_ONCE(lm3 && idx > RE_REG_LM_IDX_MAX))
11212df03a50SJakub Kicinski 		return -EOPNOTSUPP;
11222df03a50SJakub Kicinski 
1123ee9133a8SJakub Kicinski 	dst_byte = off % 4;
1124ee9133a8SJakub Kicinski 
1125ee9133a8SJakub Kicinski 	mask = (1 << size) - 1;
1126ee9133a8SJakub Kicinski 	mask <<= dst_byte;
1127ee9133a8SJakub Kicinski 
1128ee9133a8SJakub Kicinski 	if (WARN_ON_ONCE(mask > 0xf))
1129ee9133a8SJakub Kicinski 		return -EOPNOTSUPP;
1130ee9133a8SJakub Kicinski 
1131ee9133a8SJakub Kicinski 	shf = abs(src_byte - dst_byte) * 8;
1132ee9133a8SJakub Kicinski 	if (src_byte == dst_byte) {
1133ee9133a8SJakub Kicinski 		sc = SHF_SC_NONE;
1134ee9133a8SJakub Kicinski 	} else if (src_byte < dst_byte) {
1135ee9133a8SJakub Kicinski 		shf = 32 - shf;
1136ee9133a8SJakub Kicinski 		sc = SHF_SC_L_SHF;
1137ee9133a8SJakub Kicinski 	} else {
1138ee9133a8SJakub Kicinski 		sc = SHF_SC_R_SHF;
1139ee9133a8SJakub Kicinski 	}
1140ee9133a8SJakub Kicinski 
1141ee9133a8SJakub Kicinski 	/* ld_field can address fewer indexes, if offset too large do RMW.
1142ee9133a8SJakub Kicinski 	 * Because we RMV twice we waste 2 cycles on unaligned 8 byte writes.
1143ee9133a8SJakub Kicinski 	 */
1144ee9133a8SJakub Kicinski 	if (idx <= RE_REG_LM_IDX_MAX) {
11452df03a50SJakub Kicinski 		reg = reg_lm(lm3 ? 3 : 0, idx);
1146ee9133a8SJakub Kicinski 	} else {
1147ee9133a8SJakub Kicinski 		reg = imm_a(nfp_prog);
11489a90c83cSJakub Kicinski 		/* Only first and last LMEM locations are going to need RMW,
11499a90c83cSJakub Kicinski 		 * the middle location will be overwritten fully.
11509a90c83cSJakub Kicinski 		 */
11519a90c83cSJakub Kicinski 		if (first || last)
1152ee9133a8SJakub Kicinski 			wrp_mov(nfp_prog, reg, reg_lm(0, idx));
1153ee9133a8SJakub Kicinski 	}
1154ee9133a8SJakub Kicinski 
1155ee9133a8SJakub Kicinski 	emit_ld_field(nfp_prog, reg, mask, reg_b(src), sc, shf);
1156ee9133a8SJakub Kicinski 
11579a90c83cSJakub Kicinski 	if (new_gpr || last) {
1158ee9133a8SJakub Kicinski 		if (idx > RE_REG_LM_IDX_MAX)
1159ee9133a8SJakub Kicinski 			wrp_mov(nfp_prog, reg_lm(0, idx), reg);
11602df03a50SJakub Kicinski 		if (should_inc)
11612df03a50SJakub Kicinski 			wrp_mov(nfp_prog, reg_none(), reg_lm_inc(3));
11629a90c83cSJakub Kicinski 	}
1163ee9133a8SJakub Kicinski 
1164ee9133a8SJakub Kicinski 	return 0;
1165ee9133a8SJakub Kicinski }
1166ee9133a8SJakub Kicinski 
1167ee9133a8SJakub Kicinski static int
1168ee9133a8SJakub Kicinski mem_op_stack(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1169b14157eeSJakub Kicinski 	     unsigned int size, unsigned int ptr_off, u8 gpr, u8 ptr_gpr,
1170b14157eeSJakub Kicinski 	     bool clr_gpr, lmem_step step)
1171ee9133a8SJakub Kicinski {
11721a7e62e6SQuentin Monnet 	s32 off = nfp_prog->stack_frame_depth + meta->insn.off + ptr_off;
11739a90c83cSJakub Kicinski 	bool first = true, last;
11742df03a50SJakub Kicinski 	bool needs_inc = false;
11752df03a50SJakub Kicinski 	swreg stack_off_reg;
1176a82b23fbSJakub Kicinski 	u8 prev_gpr = 255;
1177ee9133a8SJakub Kicinski 	u32 gpr_byte = 0;
11782df03a50SJakub Kicinski 	bool lm3 = true;
1179ee9133a8SJakub Kicinski 	int ret;
1180ee9133a8SJakub Kicinski 
1181b14157eeSJakub Kicinski 	if (meta->ptr_not_const) {
1182b14157eeSJakub Kicinski 		/* Use of the last encountered ptr_off is OK, they all have
1183b14157eeSJakub Kicinski 		 * the same alignment.  Depend on low bits of value being
1184b14157eeSJakub Kicinski 		 * discarded when written to LMaddr register.
1185b14157eeSJakub Kicinski 		 */
1186b14157eeSJakub Kicinski 		stack_off_reg = ur_load_imm_any(nfp_prog, meta->insn.off,
1187b14157eeSJakub Kicinski 						stack_imm(nfp_prog));
1188b14157eeSJakub Kicinski 
1189b14157eeSJakub Kicinski 		emit_alu(nfp_prog, imm_b(nfp_prog),
1190b14157eeSJakub Kicinski 			 reg_a(ptr_gpr), ALU_OP_ADD, stack_off_reg);
1191b14157eeSJakub Kicinski 
1192b14157eeSJakub Kicinski 		needs_inc = true;
1193b14157eeSJakub Kicinski 	} else if (off + size <= 64) {
11942df03a50SJakub Kicinski 		/* We can reach bottom 64B with LMaddr0 */
11952df03a50SJakub Kicinski 		lm3 = false;
11962df03a50SJakub Kicinski 	} else if (round_down(off, 32) == round_down(off + size - 1, 32)) {
11972df03a50SJakub Kicinski 		/* We have to set up a new pointer.  If we know the offset
11982df03a50SJakub Kicinski 		 * and the entire access falls into a single 32 byte aligned
11992df03a50SJakub Kicinski 		 * window we won't have to increment the LM pointer.
12002df03a50SJakub Kicinski 		 * The 32 byte alignment is imporant because offset is ORed in
12012df03a50SJakub Kicinski 		 * not added when doing *l$indexN[off].
12022df03a50SJakub Kicinski 		 */
12032df03a50SJakub Kicinski 		stack_off_reg = ur_load_imm_any(nfp_prog, round_down(off, 32),
12042df03a50SJakub Kicinski 						stack_imm(nfp_prog));
12052df03a50SJakub Kicinski 		emit_alu(nfp_prog, imm_b(nfp_prog),
12062df03a50SJakub Kicinski 			 stack_reg(nfp_prog), ALU_OP_ADD, stack_off_reg);
12072df03a50SJakub Kicinski 
12082df03a50SJakub Kicinski 		off %= 32;
12092df03a50SJakub Kicinski 	} else {
12102df03a50SJakub Kicinski 		stack_off_reg = ur_load_imm_any(nfp_prog, round_down(off, 4),
12112df03a50SJakub Kicinski 						stack_imm(nfp_prog));
12122df03a50SJakub Kicinski 
12132df03a50SJakub Kicinski 		emit_alu(nfp_prog, imm_b(nfp_prog),
12142df03a50SJakub Kicinski 			 stack_reg(nfp_prog), ALU_OP_ADD, stack_off_reg);
12152df03a50SJakub Kicinski 
12162df03a50SJakub Kicinski 		needs_inc = true;
12172df03a50SJakub Kicinski 	}
12182df03a50SJakub Kicinski 	if (lm3) {
12192df03a50SJakub Kicinski 		emit_csr_wr(nfp_prog, imm_b(nfp_prog), NFP_CSR_ACT_LM_ADDR3);
12202df03a50SJakub Kicinski 		/* For size < 4 one slot will be filled by zeroing of upper. */
12212df03a50SJakub Kicinski 		wrp_nops(nfp_prog, clr_gpr && size < 8 ? 2 : 3);
12222df03a50SJakub Kicinski 	}
12232df03a50SJakub Kicinski 
1224a82b23fbSJakub Kicinski 	if (clr_gpr && size < 8)
1225a82b23fbSJakub Kicinski 		wrp_immed(nfp_prog, reg_both(gpr + 1), 0);
1226a82b23fbSJakub Kicinski 
1227ee9133a8SJakub Kicinski 	while (size) {
1228ee9133a8SJakub Kicinski 		u32 slice_end;
1229ee9133a8SJakub Kicinski 		u8 slice_size;
1230ee9133a8SJakub Kicinski 
1231ee9133a8SJakub Kicinski 		slice_size = min(size, 4 - gpr_byte);
1232ee9133a8SJakub Kicinski 		slice_end = min(off + slice_size, round_up(off + 1, 4));
1233ee9133a8SJakub Kicinski 		slice_size = slice_end - off;
1234ee9133a8SJakub Kicinski 
12359a90c83cSJakub Kicinski 		last = slice_size == size;
12369a90c83cSJakub Kicinski 
12372df03a50SJakub Kicinski 		if (needs_inc)
12382df03a50SJakub Kicinski 			off %= 4;
12392df03a50SJakub Kicinski 
1240a82b23fbSJakub Kicinski 		ret = step(nfp_prog, gpr, gpr_byte, off, slice_size,
12412df03a50SJakub Kicinski 			   first, gpr != prev_gpr, last, lm3, needs_inc);
1242ee9133a8SJakub Kicinski 		if (ret)
1243ee9133a8SJakub Kicinski 			return ret;
1244ee9133a8SJakub Kicinski 
1245a82b23fbSJakub Kicinski 		prev_gpr = gpr;
12469a90c83cSJakub Kicinski 		first = false;
12479a90c83cSJakub Kicinski 
1248ee9133a8SJakub Kicinski 		gpr_byte += slice_size;
1249ee9133a8SJakub Kicinski 		if (gpr_byte >= 4) {
1250ee9133a8SJakub Kicinski 			gpr_byte -= 4;
1251ee9133a8SJakub Kicinski 			gpr++;
1252ee9133a8SJakub Kicinski 		}
1253ee9133a8SJakub Kicinski 
1254ee9133a8SJakub Kicinski 		size -= slice_size;
1255ee9133a8SJakub Kicinski 		off += slice_size;
1256ee9133a8SJakub Kicinski 	}
1257ee9133a8SJakub Kicinski 
1258ee9133a8SJakub Kicinski 	return 0;
1259ee9133a8SJakub Kicinski }
1260ee9133a8SJakub Kicinski 
1261d9ae7f2bSJakub Kicinski static void
1262d9ae7f2bSJakub Kicinski wrp_alu_imm(struct nfp_prog *nfp_prog, u8 dst, enum alu_op alu_op, u32 imm)
1263d9ae7f2bSJakub Kicinski {
1264b3f868dfSJakub Kicinski 	swreg tmp_reg;
1265d9ae7f2bSJakub Kicinski 
1266d9ae7f2bSJakub Kicinski 	if (alu_op == ALU_OP_AND) {
1267d9ae7f2bSJakub Kicinski 		if (!imm)
1268d9ae7f2bSJakub Kicinski 			wrp_immed(nfp_prog, reg_both(dst), 0);
1269d9ae7f2bSJakub Kicinski 		if (!imm || !~imm)
1270d9ae7f2bSJakub Kicinski 			return;
1271d9ae7f2bSJakub Kicinski 	}
1272d9ae7f2bSJakub Kicinski 	if (alu_op == ALU_OP_OR) {
1273d9ae7f2bSJakub Kicinski 		if (!~imm)
1274d9ae7f2bSJakub Kicinski 			wrp_immed(nfp_prog, reg_both(dst), ~0U);
1275d9ae7f2bSJakub Kicinski 		if (!imm || !~imm)
1276d9ae7f2bSJakub Kicinski 			return;
1277d9ae7f2bSJakub Kicinski 	}
1278d9ae7f2bSJakub Kicinski 	if (alu_op == ALU_OP_XOR) {
1279d9ae7f2bSJakub Kicinski 		if (!~imm)
1280d9ae7f2bSJakub Kicinski 			emit_alu(nfp_prog, reg_both(dst), reg_none(),
12815d42ced1SJiong Wang 				 ALU_OP_NOT, reg_b(dst));
1282d9ae7f2bSJakub Kicinski 		if (!imm || !~imm)
1283d9ae7f2bSJakub Kicinski 			return;
1284d9ae7f2bSJakub Kicinski 	}
1285d9ae7f2bSJakub Kicinski 
1286d9ae7f2bSJakub Kicinski 	tmp_reg = ur_load_imm_any(nfp_prog, imm, imm_b(nfp_prog));
1287d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, tmp_reg);
1288d9ae7f2bSJakub Kicinski }
1289d9ae7f2bSJakub Kicinski 
1290d9ae7f2bSJakub Kicinski static int
1291d9ae7f2bSJakub Kicinski wrp_alu64_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1292d9ae7f2bSJakub Kicinski 	      enum alu_op alu_op, bool skip)
1293d9ae7f2bSJakub Kicinski {
1294d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1295d9ae7f2bSJakub Kicinski 	u64 imm = insn->imm; /* sign extend */
1296d9ae7f2bSJakub Kicinski 
1297d9ae7f2bSJakub Kicinski 	if (skip) {
1298d9ae7f2bSJakub Kicinski 		meta->skip = true;
1299d9ae7f2bSJakub Kicinski 		return 0;
1300d9ae7f2bSJakub Kicinski 	}
1301d9ae7f2bSJakub Kicinski 
1302d9ae7f2bSJakub Kicinski 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, alu_op, imm & ~0U);
1303d9ae7f2bSJakub Kicinski 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, alu_op, imm >> 32);
1304d9ae7f2bSJakub Kicinski 
1305d9ae7f2bSJakub Kicinski 	return 0;
1306d9ae7f2bSJakub Kicinski }
1307d9ae7f2bSJakub Kicinski 
1308d9ae7f2bSJakub Kicinski static int
1309d9ae7f2bSJakub Kicinski wrp_alu64_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1310d9ae7f2bSJakub Kicinski 	      enum alu_op alu_op)
1311d9ae7f2bSJakub Kicinski {
1312d9ae7f2bSJakub Kicinski 	u8 dst = meta->insn.dst_reg * 2, src = meta->insn.src_reg * 2;
1313d9ae7f2bSJakub Kicinski 
1314d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, reg_b(src));
1315d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(dst + 1),
1316d9ae7f2bSJakub Kicinski 		 reg_a(dst + 1), alu_op, reg_b(src + 1));
1317d9ae7f2bSJakub Kicinski 
1318d9ae7f2bSJakub Kicinski 	return 0;
1319d9ae7f2bSJakub Kicinski }
1320d9ae7f2bSJakub Kicinski 
1321d9ae7f2bSJakub Kicinski static int
1322d9ae7f2bSJakub Kicinski wrp_alu32_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1323d9ae7f2bSJakub Kicinski 	      enum alu_op alu_op, bool skip)
1324d9ae7f2bSJakub Kicinski {
1325d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1326d9ae7f2bSJakub Kicinski 
1327d9ae7f2bSJakub Kicinski 	if (skip) {
1328d9ae7f2bSJakub Kicinski 		meta->skip = true;
1329d9ae7f2bSJakub Kicinski 		return 0;
1330d9ae7f2bSJakub Kicinski 	}
1331d9ae7f2bSJakub Kicinski 
1332d9ae7f2bSJakub Kicinski 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, alu_op, insn->imm);
1333d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
1334d9ae7f2bSJakub Kicinski 
1335d9ae7f2bSJakub Kicinski 	return 0;
1336d9ae7f2bSJakub Kicinski }
1337d9ae7f2bSJakub Kicinski 
1338d9ae7f2bSJakub Kicinski static int
1339d9ae7f2bSJakub Kicinski wrp_alu32_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1340d9ae7f2bSJakub Kicinski 	      enum alu_op alu_op)
1341d9ae7f2bSJakub Kicinski {
1342d9ae7f2bSJakub Kicinski 	u8 dst = meta->insn.dst_reg * 2, src = meta->insn.src_reg * 2;
1343d9ae7f2bSJakub Kicinski 
1344d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, reg_b(src));
1345d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
1346d9ae7f2bSJakub Kicinski 
1347d9ae7f2bSJakub Kicinski 	return 0;
1348d9ae7f2bSJakub Kicinski }
1349d9ae7f2bSJakub Kicinski 
1350d9ae7f2bSJakub Kicinski static void
1351d9ae7f2bSJakub Kicinski wrp_test_reg_one(struct nfp_prog *nfp_prog, u8 dst, enum alu_op alu_op, u8 src,
1352d9ae7f2bSJakub Kicinski 		 enum br_mask br_mask, u16 off)
1353d9ae7f2bSJakub Kicinski {
1354d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_a(dst), alu_op, reg_b(src));
1355d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, br_mask, off, 0);
1356d9ae7f2bSJakub Kicinski }
1357d9ae7f2bSJakub Kicinski 
1358d9ae7f2bSJakub Kicinski static int
1359d9ae7f2bSJakub Kicinski wrp_test_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1360d9ae7f2bSJakub Kicinski 	     enum alu_op alu_op, enum br_mask br_mask)
1361d9ae7f2bSJakub Kicinski {
1362d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1363d9ae7f2bSJakub Kicinski 
1364d9ae7f2bSJakub Kicinski 	wrp_test_reg_one(nfp_prog, insn->dst_reg * 2, alu_op,
1365d9ae7f2bSJakub Kicinski 			 insn->src_reg * 2, br_mask, insn->off);
1366d9ae7f2bSJakub Kicinski 	wrp_test_reg_one(nfp_prog, insn->dst_reg * 2 + 1, alu_op,
1367d9ae7f2bSJakub Kicinski 			 insn->src_reg * 2 + 1, br_mask, insn->off);
1368d9ae7f2bSJakub Kicinski 
1369d9ae7f2bSJakub Kicinski 	return 0;
1370d9ae7f2bSJakub Kicinski }
1371d9ae7f2bSJakub Kicinski 
137261dd8f00SJakub Kicinski static const struct jmp_code_map {
137361dd8f00SJakub Kicinski 	enum br_mask br_mask;
137461dd8f00SJakub Kicinski 	bool swap;
137561dd8f00SJakub Kicinski } jmp_code_map[] = {
137661dd8f00SJakub Kicinski 	[BPF_JGT >> 4]	= { BR_BLO, true },
137761dd8f00SJakub Kicinski 	[BPF_JGE >> 4]	= { BR_BHS, false },
137861dd8f00SJakub Kicinski 	[BPF_JLT >> 4]	= { BR_BLO, false },
137961dd8f00SJakub Kicinski 	[BPF_JLE >> 4]	= { BR_BHS, true },
138061dd8f00SJakub Kicinski 	[BPF_JSGT >> 4]	= { BR_BLT, true },
138161dd8f00SJakub Kicinski 	[BPF_JSGE >> 4]	= { BR_BGE, false },
138261dd8f00SJakub Kicinski 	[BPF_JSLT >> 4]	= { BR_BLT, false },
138361dd8f00SJakub Kicinski 	[BPF_JSLE >> 4]	= { BR_BGE, true },
138461dd8f00SJakub Kicinski };
138561dd8f00SJakub Kicinski 
138661dd8f00SJakub Kicinski static const struct jmp_code_map *nfp_jmp_code_get(struct nfp_insn_meta *meta)
138761dd8f00SJakub Kicinski {
138861dd8f00SJakub Kicinski 	unsigned int op;
138961dd8f00SJakub Kicinski 
139061dd8f00SJakub Kicinski 	op = BPF_OP(meta->insn.code) >> 4;
139161dd8f00SJakub Kicinski 	/* br_mask of 0 is BR_BEQ which we don't use in jump code table */
139261dd8f00SJakub Kicinski 	if (WARN_ONCE(op >= ARRAY_SIZE(jmp_code_map) ||
139361dd8f00SJakub Kicinski 		      !jmp_code_map[op].br_mask,
139461dd8f00SJakub Kicinski 		      "no code found for jump instruction"))
139561dd8f00SJakub Kicinski 		return NULL;
139661dd8f00SJakub Kicinski 
139761dd8f00SJakub Kicinski 	return &jmp_code_map[op];
139861dd8f00SJakub Kicinski }
139961dd8f00SJakub Kicinski 
140061dd8f00SJakub Kicinski static int cmp_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1401d9ae7f2bSJakub Kicinski {
1402d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1403d9ae7f2bSJakub Kicinski 	u64 imm = insn->imm; /* sign extend */
140461dd8f00SJakub Kicinski 	const struct jmp_code_map *code;
14057bdc97beSJakub Kicinski 	enum alu_op alu_op, carry_op;
1406d9ae7f2bSJakub Kicinski 	u8 reg = insn->dst_reg * 2;
1407b3f868dfSJakub Kicinski 	swreg tmp_reg;
1408d9ae7f2bSJakub Kicinski 
140961dd8f00SJakub Kicinski 	code = nfp_jmp_code_get(meta);
141061dd8f00SJakub Kicinski 	if (!code)
141161dd8f00SJakub Kicinski 		return -EINVAL;
141261dd8f00SJakub Kicinski 
14137bdc97beSJakub Kicinski 	alu_op = meta->jump_neg_op ? ALU_OP_ADD : ALU_OP_SUB;
14147bdc97beSJakub Kicinski 	carry_op = meta->jump_neg_op ? ALU_OP_ADD_C : ALU_OP_SUB_C;
14157bdc97beSJakub Kicinski 
1416d9ae7f2bSJakub Kicinski 	tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
141761dd8f00SJakub Kicinski 	if (!code->swap)
14187bdc97beSJakub Kicinski 		emit_alu(nfp_prog, reg_none(), reg_a(reg), alu_op, tmp_reg);
1419d9ae7f2bSJakub Kicinski 	else
14207bdc97beSJakub Kicinski 		emit_alu(nfp_prog, reg_none(), tmp_reg, alu_op, reg_a(reg));
1421d9ae7f2bSJakub Kicinski 
1422d9ae7f2bSJakub Kicinski 	tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
142361dd8f00SJakub Kicinski 	if (!code->swap)
1424d9ae7f2bSJakub Kicinski 		emit_alu(nfp_prog, reg_none(),
14257bdc97beSJakub Kicinski 			 reg_a(reg + 1), carry_op, tmp_reg);
1426d9ae7f2bSJakub Kicinski 	else
1427d9ae7f2bSJakub Kicinski 		emit_alu(nfp_prog, reg_none(),
14287bdc97beSJakub Kicinski 			 tmp_reg, carry_op, reg_a(reg + 1));
1429d9ae7f2bSJakub Kicinski 
143061dd8f00SJakub Kicinski 	emit_br(nfp_prog, code->br_mask, insn->off, 0);
1431d9ae7f2bSJakub Kicinski 
1432d9ae7f2bSJakub Kicinski 	return 0;
1433d9ae7f2bSJakub Kicinski }
1434d9ae7f2bSJakub Kicinski 
143561dd8f00SJakub Kicinski static int cmp_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1436d9ae7f2bSJakub Kicinski {
1437d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
143861dd8f00SJakub Kicinski 	const struct jmp_code_map *code;
143926fa818dSJakub Kicinski 	u8 areg, breg;
144026fa818dSJakub Kicinski 
144161dd8f00SJakub Kicinski 	code = nfp_jmp_code_get(meta);
144261dd8f00SJakub Kicinski 	if (!code)
144361dd8f00SJakub Kicinski 		return -EINVAL;
144461dd8f00SJakub Kicinski 
144526fa818dSJakub Kicinski 	areg = insn->dst_reg * 2;
144626fa818dSJakub Kicinski 	breg = insn->src_reg * 2;
1447d9ae7f2bSJakub Kicinski 
144861dd8f00SJakub Kicinski 	if (code->swap) {
1449d9ae7f2bSJakub Kicinski 		areg ^= breg;
1450d9ae7f2bSJakub Kicinski 		breg ^= areg;
1451d9ae7f2bSJakub Kicinski 		areg ^= breg;
1452d9ae7f2bSJakub Kicinski 	}
1453d9ae7f2bSJakub Kicinski 
1454d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_a(areg), ALU_OP_SUB, reg_b(breg));
1455d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
1456d9ae7f2bSJakub Kicinski 		 reg_a(areg + 1), ALU_OP_SUB_C, reg_b(breg + 1));
145761dd8f00SJakub Kicinski 	emit_br(nfp_prog, code->br_mask, insn->off, 0);
1458d9ae7f2bSJakub Kicinski 
1459d9ae7f2bSJakub Kicinski 	return 0;
1460d9ae7f2bSJakub Kicinski }
1461d9ae7f2bSJakub Kicinski 
14623119d1fdSJakub Kicinski static void wrp_end32(struct nfp_prog *nfp_prog, swreg reg_in, u8 gpr_out)
14633119d1fdSJakub Kicinski {
14643119d1fdSJakub Kicinski 	emit_ld_field(nfp_prog, reg_both(gpr_out), 0xf, reg_in,
14653119d1fdSJakub Kicinski 		      SHF_SC_R_ROT, 8);
14663119d1fdSJakub Kicinski 	emit_ld_field(nfp_prog, reg_both(gpr_out), 0x5, reg_a(gpr_out),
14673119d1fdSJakub Kicinski 		      SHF_SC_R_ROT, 16);
14683119d1fdSJakub Kicinski }
14693119d1fdSJakub Kicinski 
1470d3d23fdbSJiong Wang static void
1471d3d23fdbSJiong Wang wrp_mul_u32(struct nfp_prog *nfp_prog, swreg dst_hi, swreg dst_lo, swreg lreg,
1472d3d23fdbSJiong Wang 	    swreg rreg, bool gen_high_half)
1473d3d23fdbSJiong Wang {
1474d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_START, MUL_STEP_NONE, rreg);
1475d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_32x32, MUL_STEP_1, rreg);
1476d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_32x32, MUL_STEP_2, rreg);
1477d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_32x32, MUL_STEP_3, rreg);
1478d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_32x32, MUL_STEP_4, rreg);
1479d3d23fdbSJiong Wang 	emit_mul(nfp_prog, dst_lo, MUL_TYPE_STEP_32x32, MUL_LAST, reg_none());
1480d3d23fdbSJiong Wang 	if (gen_high_half)
1481d3d23fdbSJiong Wang 		emit_mul(nfp_prog, dst_hi, MUL_TYPE_STEP_32x32, MUL_LAST_2,
1482d3d23fdbSJiong Wang 			 reg_none());
1483d3d23fdbSJiong Wang 	else
1484d3d23fdbSJiong Wang 		wrp_immed(nfp_prog, dst_hi, 0);
1485d3d23fdbSJiong Wang }
1486d3d23fdbSJiong Wang 
1487d3d23fdbSJiong Wang static void
1488d3d23fdbSJiong Wang wrp_mul_u16(struct nfp_prog *nfp_prog, swreg dst_hi, swreg dst_lo, swreg lreg,
1489d3d23fdbSJiong Wang 	    swreg rreg)
1490d3d23fdbSJiong Wang {
1491d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_START, MUL_STEP_NONE, rreg);
1492d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_16x16, MUL_STEP_1, rreg);
1493d3d23fdbSJiong Wang 	emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_16x16, MUL_STEP_2, rreg);
1494d3d23fdbSJiong Wang 	emit_mul(nfp_prog, dst_lo, MUL_TYPE_STEP_16x16, MUL_LAST, reg_none());
1495d3d23fdbSJiong Wang }
1496d3d23fdbSJiong Wang 
1497d3d23fdbSJiong Wang static int
1498d3d23fdbSJiong Wang wrp_mul(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
1499d3d23fdbSJiong Wang 	bool gen_high_half, bool ropnd_from_reg)
1500d3d23fdbSJiong Wang {
1501d3d23fdbSJiong Wang 	swreg multiplier, multiplicand, dst_hi, dst_lo;
1502d3d23fdbSJiong Wang 	const struct bpf_insn *insn = &meta->insn;
1503d3d23fdbSJiong Wang 	u32 lopnd_max, ropnd_max;
1504d3d23fdbSJiong Wang 	u8 dst_reg;
1505d3d23fdbSJiong Wang 
1506d3d23fdbSJiong Wang 	dst_reg = insn->dst_reg;
1507d3d23fdbSJiong Wang 	multiplicand = reg_a(dst_reg * 2);
1508d3d23fdbSJiong Wang 	dst_hi = reg_both(dst_reg * 2 + 1);
1509d3d23fdbSJiong Wang 	dst_lo = reg_both(dst_reg * 2);
1510d3d23fdbSJiong Wang 	lopnd_max = meta->umax_dst;
1511d3d23fdbSJiong Wang 	if (ropnd_from_reg) {
1512d3d23fdbSJiong Wang 		multiplier = reg_b(insn->src_reg * 2);
1513d3d23fdbSJiong Wang 		ropnd_max = meta->umax_src;
1514d3d23fdbSJiong Wang 	} else {
1515d3d23fdbSJiong Wang 		u32 imm = insn->imm;
1516d3d23fdbSJiong Wang 
1517d3d23fdbSJiong Wang 		multiplier = ur_load_imm_any(nfp_prog, imm, imm_b(nfp_prog));
1518d3d23fdbSJiong Wang 		ropnd_max = imm;
1519d3d23fdbSJiong Wang 	}
1520d3d23fdbSJiong Wang 	if (lopnd_max > U16_MAX || ropnd_max > U16_MAX)
1521d3d23fdbSJiong Wang 		wrp_mul_u32(nfp_prog, dst_hi, dst_lo, multiplicand, multiplier,
1522d3d23fdbSJiong Wang 			    gen_high_half);
1523d3d23fdbSJiong Wang 	else
1524d3d23fdbSJiong Wang 		wrp_mul_u16(nfp_prog, dst_hi, dst_lo, multiplicand, multiplier);
1525d3d23fdbSJiong Wang 
1526d3d23fdbSJiong Wang 	return 0;
1527d3d23fdbSJiong Wang }
1528d3d23fdbSJiong Wang 
15292a952b03SJiong Wang static int wrp_div_imm(struct nfp_prog *nfp_prog, u8 dst, u64 imm)
15302a952b03SJiong Wang {
15312a952b03SJiong Wang 	swreg dst_both = reg_both(dst), dst_a = reg_a(dst), dst_b = reg_a(dst);
15329fb410a8SJiong Wang 	struct reciprocal_value_adv rvalue;
15339fb410a8SJiong Wang 	u8 pre_shift, exp;
15342a952b03SJiong Wang 	swreg magic;
15352a952b03SJiong Wang 
15362a952b03SJiong Wang 	if (imm > U32_MAX) {
15372a952b03SJiong Wang 		wrp_immed(nfp_prog, dst_both, 0);
15382a952b03SJiong Wang 		return 0;
15392a952b03SJiong Wang 	}
15402a952b03SJiong Wang 
15419fb410a8SJiong Wang 	/* NOTE: because we are using "reciprocal_value_adv" which doesn't
15429fb410a8SJiong Wang 	 * support "divisor > (1u << 31)", we need to JIT separate NFP sequence
15439fb410a8SJiong Wang 	 * to handle such case which actually equals to the result of unsigned
15449fb410a8SJiong Wang 	 * comparison "dst >= imm" which could be calculated using the following
15459fb410a8SJiong Wang 	 * NFP sequence:
15469fb410a8SJiong Wang 	 *
15479fb410a8SJiong Wang 	 *  alu[--, dst, -, imm]
15489fb410a8SJiong Wang 	 *  immed[imm, 0]
15499fb410a8SJiong Wang 	 *  alu[dst, imm, +carry, 0]
15509fb410a8SJiong Wang 	 *
15519fb410a8SJiong Wang 	 */
15529fb410a8SJiong Wang 	if (imm > 1U << 31) {
15539fb410a8SJiong Wang 		swreg tmp_b = ur_load_imm_any(nfp_prog, imm, imm_b(nfp_prog));
15549fb410a8SJiong Wang 
15559fb410a8SJiong Wang 		emit_alu(nfp_prog, reg_none(), dst_a, ALU_OP_SUB, tmp_b);
15569fb410a8SJiong Wang 		wrp_immed(nfp_prog, imm_a(nfp_prog), 0);
15579fb410a8SJiong Wang 		emit_alu(nfp_prog, dst_both, imm_a(nfp_prog), ALU_OP_ADD_C,
15589fb410a8SJiong Wang 			 reg_imm(0));
15599fb410a8SJiong Wang 		return 0;
15609fb410a8SJiong Wang 	}
15619fb410a8SJiong Wang 
15629fb410a8SJiong Wang 	rvalue = reciprocal_value_adv(imm, 32);
15639fb410a8SJiong Wang 	exp = rvalue.exp;
15649fb410a8SJiong Wang 	if (rvalue.is_wide_m && !(imm & 1)) {
15659fb410a8SJiong Wang 		pre_shift = fls(imm & -imm) - 1;
15669fb410a8SJiong Wang 		rvalue = reciprocal_value_adv(imm >> pre_shift, 32 - pre_shift);
15679fb410a8SJiong Wang 	} else {
15689fb410a8SJiong Wang 		pre_shift = 0;
15699fb410a8SJiong Wang 	}
15702a952b03SJiong Wang 	magic = ur_load_imm_any(nfp_prog, rvalue.m, imm_b(nfp_prog));
15719fb410a8SJiong Wang 	if (imm == 1U << exp) {
15722a952b03SJiong Wang 		emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE, dst_b,
15739fb410a8SJiong Wang 			 SHF_SC_R_SHF, exp);
15749fb410a8SJiong Wang 	} else if (rvalue.is_wide_m) {
15759fb410a8SJiong Wang 		wrp_mul_u32(nfp_prog, imm_both(nfp_prog), reg_none(), dst_a,
15769fb410a8SJiong Wang 			    magic, true);
15779fb410a8SJiong Wang 		emit_alu(nfp_prog, dst_both, dst_a, ALU_OP_SUB,
15789fb410a8SJiong Wang 			 imm_b(nfp_prog));
15792a952b03SJiong Wang 		emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE, dst_b,
15809fb410a8SJiong Wang 			 SHF_SC_R_SHF, 1);
15819fb410a8SJiong Wang 		emit_alu(nfp_prog, dst_both, dst_a, ALU_OP_ADD,
15829fb410a8SJiong Wang 			 imm_b(nfp_prog));
15839fb410a8SJiong Wang 		emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE, dst_b,
15849fb410a8SJiong Wang 			 SHF_SC_R_SHF, rvalue.sh - 1);
15859fb410a8SJiong Wang 	} else {
15869fb410a8SJiong Wang 		if (pre_shift)
15879fb410a8SJiong Wang 			emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE,
15889fb410a8SJiong Wang 				 dst_b, SHF_SC_R_SHF, pre_shift);
15899fb410a8SJiong Wang 		wrp_mul_u32(nfp_prog, dst_both, reg_none(), dst_a, magic, true);
15909fb410a8SJiong Wang 		emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE,
15919fb410a8SJiong Wang 			 dst_b, SHF_SC_R_SHF, rvalue.sh);
15929fb410a8SJiong Wang 	}
15932a952b03SJiong Wang 
15942a952b03SJiong Wang 	return 0;
15952a952b03SJiong Wang }
15962a952b03SJiong Wang 
15970d49eaf4SJakub Kicinski static int adjust_head(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
15980d49eaf4SJakub Kicinski {
15990d49eaf4SJakub Kicinski 	swreg tmp = imm_a(nfp_prog), tmp_len = imm_b(nfp_prog);
16000d49eaf4SJakub Kicinski 	struct nfp_bpf_cap_adjust_head *adjust_head;
16010d49eaf4SJakub Kicinski 	u32 ret_einval, end;
16020d49eaf4SJakub Kicinski 
16030d49eaf4SJakub Kicinski 	adjust_head = &nfp_prog->bpf->adjust_head;
16040d49eaf4SJakub Kicinski 
16058231f844SJakub Kicinski 	/* Optimized version - 5 vs 14 cycles */
16068231f844SJakub Kicinski 	if (nfp_prog->adjust_head_location != UINT_MAX) {
16078231f844SJakub Kicinski 		if (WARN_ON_ONCE(nfp_prog->adjust_head_location != meta->n))
16088231f844SJakub Kicinski 			return -EINVAL;
16098231f844SJakub Kicinski 
16108231f844SJakub Kicinski 		emit_alu(nfp_prog, pptr_reg(nfp_prog),
16118231f844SJakub Kicinski 			 reg_a(2 * 2), ALU_OP_ADD, pptr_reg(nfp_prog));
16128231f844SJakub Kicinski 		emit_alu(nfp_prog, plen_reg(nfp_prog),
16138231f844SJakub Kicinski 			 plen_reg(nfp_prog), ALU_OP_SUB, reg_a(2 * 2));
16148231f844SJakub Kicinski 		emit_alu(nfp_prog, pv_len(nfp_prog),
16158231f844SJakub Kicinski 			 pv_len(nfp_prog), ALU_OP_SUB, reg_a(2 * 2));
16168231f844SJakub Kicinski 
16178231f844SJakub Kicinski 		wrp_immed(nfp_prog, reg_both(0), 0);
16188231f844SJakub Kicinski 		wrp_immed(nfp_prog, reg_both(1), 0);
16198231f844SJakub Kicinski 
16208231f844SJakub Kicinski 		/* TODO: when adjust head is guaranteed to succeed we can
16218231f844SJakub Kicinski 		 * also eliminate the following if (r0 == 0) branch.
16228231f844SJakub Kicinski 		 */
16238231f844SJakub Kicinski 
16248231f844SJakub Kicinski 		return 0;
16258231f844SJakub Kicinski 	}
16268231f844SJakub Kicinski 
16270d49eaf4SJakub Kicinski 	ret_einval = nfp_prog_current_offset(nfp_prog) + 14;
16280d49eaf4SJakub Kicinski 	end = ret_einval + 2;
16290d49eaf4SJakub Kicinski 
16300d49eaf4SJakub Kicinski 	/* We need to use a temp because offset is just a part of the pkt ptr */
16310d49eaf4SJakub Kicinski 	emit_alu(nfp_prog, tmp,
16320d49eaf4SJakub Kicinski 		 reg_a(2 * 2), ALU_OP_ADD_2B, pptr_reg(nfp_prog));
16330d49eaf4SJakub Kicinski 
16340d49eaf4SJakub Kicinski 	/* Validate result will fit within FW datapath constraints */
16350d49eaf4SJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
16360d49eaf4SJakub Kicinski 		 tmp, ALU_OP_SUB, reg_imm(adjust_head->off_min));
16370d49eaf4SJakub Kicinski 	emit_br(nfp_prog, BR_BLO, ret_einval, 0);
16380d49eaf4SJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
16390d49eaf4SJakub Kicinski 		 reg_imm(adjust_head->off_max), ALU_OP_SUB, tmp);
16400d49eaf4SJakub Kicinski 	emit_br(nfp_prog, BR_BLO, ret_einval, 0);
16410d49eaf4SJakub Kicinski 
16420d49eaf4SJakub Kicinski 	/* Validate the length is at least ETH_HLEN */
16430d49eaf4SJakub Kicinski 	emit_alu(nfp_prog, tmp_len,
16440d49eaf4SJakub Kicinski 		 plen_reg(nfp_prog), ALU_OP_SUB, reg_a(2 * 2));
16450d49eaf4SJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
16460d49eaf4SJakub Kicinski 		 tmp_len, ALU_OP_SUB, reg_imm(ETH_HLEN));
16470d49eaf4SJakub Kicinski 	emit_br(nfp_prog, BR_BMI, ret_einval, 0);
16480d49eaf4SJakub Kicinski 
16490d49eaf4SJakub Kicinski 	/* Load the ret code */
16500d49eaf4SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(0), 0);
16510d49eaf4SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(1), 0);
16520d49eaf4SJakub Kicinski 
16530d49eaf4SJakub Kicinski 	/* Modify the packet metadata */
16540d49eaf4SJakub Kicinski 	emit_ld_field(nfp_prog, pptr_reg(nfp_prog), 0x3, tmp, SHF_SC_NONE, 0);
16550d49eaf4SJakub Kicinski 
16560d49eaf4SJakub Kicinski 	/* Skip over the -EINVAL ret code (defer 2) */
16572314fe9eSJakub Kicinski 	emit_br(nfp_prog, BR_UNC, end, 2);
16580d49eaf4SJakub Kicinski 
16590d49eaf4SJakub Kicinski 	emit_alu(nfp_prog, plen_reg(nfp_prog),
16600d49eaf4SJakub Kicinski 		 plen_reg(nfp_prog), ALU_OP_SUB, reg_a(2 * 2));
16610d49eaf4SJakub Kicinski 	emit_alu(nfp_prog, pv_len(nfp_prog),
16620d49eaf4SJakub Kicinski 		 pv_len(nfp_prog), ALU_OP_SUB, reg_a(2 * 2));
16630d49eaf4SJakub Kicinski 
16640d49eaf4SJakub Kicinski 	/* return -EINVAL target */
16650d49eaf4SJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, ret_einval))
16660d49eaf4SJakub Kicinski 		return -EINVAL;
16670d49eaf4SJakub Kicinski 
16680d49eaf4SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(0), -22);
16690d49eaf4SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(1), ~0);
16700d49eaf4SJakub Kicinski 
16710d49eaf4SJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, end))
16720d49eaf4SJakub Kicinski 		return -EINVAL;
16730d49eaf4SJakub Kicinski 
16740d49eaf4SJakub Kicinski 	return 0;
16750d49eaf4SJakub Kicinski }
16760d49eaf4SJakub Kicinski 
16770c261593SJakub Kicinski static int adjust_tail(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
16780c261593SJakub Kicinski {
16790c261593SJakub Kicinski 	u32 ret_einval, end;
16800c261593SJakub Kicinski 	swreg plen, delta;
16810c261593SJakub Kicinski 
16820c261593SJakub Kicinski 	BUILD_BUG_ON(plen_reg(nfp_prog) != reg_b(STATIC_REG_PKT_LEN));
16830c261593SJakub Kicinski 
16840c261593SJakub Kicinski 	plen = imm_a(nfp_prog);
16850c261593SJakub Kicinski 	delta = reg_a(2 * 2);
16860c261593SJakub Kicinski 
16870c261593SJakub Kicinski 	ret_einval = nfp_prog_current_offset(nfp_prog) + 9;
16880c261593SJakub Kicinski 	end = nfp_prog_current_offset(nfp_prog) + 11;
16890c261593SJakub Kicinski 
16900c261593SJakub Kicinski 	/* Calculate resulting length */
16910c261593SJakub Kicinski 	emit_alu(nfp_prog, plen, plen_reg(nfp_prog), ALU_OP_ADD, delta);
16920c261593SJakub Kicinski 	/* delta == 0 is not allowed by the kernel, add must overflow to make
16930c261593SJakub Kicinski 	 * length smaller.
16940c261593SJakub Kicinski 	 */
16950c261593SJakub Kicinski 	emit_br(nfp_prog, BR_BCC, ret_einval, 0);
16960c261593SJakub Kicinski 
16970c261593SJakub Kicinski 	/* if (new_len < 14) then -EINVAL */
16980c261593SJakub Kicinski 	emit_alu(nfp_prog, reg_none(), plen, ALU_OP_SUB, reg_imm(ETH_HLEN));
16990c261593SJakub Kicinski 	emit_br(nfp_prog, BR_BMI, ret_einval, 0);
17000c261593SJakub Kicinski 
17010c261593SJakub Kicinski 	emit_alu(nfp_prog, plen_reg(nfp_prog),
17020c261593SJakub Kicinski 		 plen_reg(nfp_prog), ALU_OP_ADD, delta);
17030c261593SJakub Kicinski 	emit_alu(nfp_prog, pv_len(nfp_prog),
17040c261593SJakub Kicinski 		 pv_len(nfp_prog), ALU_OP_ADD, delta);
17050c261593SJakub Kicinski 
17060c261593SJakub Kicinski 	emit_br(nfp_prog, BR_UNC, end, 2);
17070c261593SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(0), 0);
17080c261593SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(1), 0);
17090c261593SJakub Kicinski 
17100c261593SJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, ret_einval))
17110c261593SJakub Kicinski 		return -EINVAL;
17120c261593SJakub Kicinski 
17130c261593SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(0), -22);
17140c261593SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(1), ~0);
17150c261593SJakub Kicinski 
17160c261593SJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, end))
17170c261593SJakub Kicinski 		return -EINVAL;
17180c261593SJakub Kicinski 
17190c261593SJakub Kicinski 	return 0;
17200c261593SJakub Kicinski }
17210c261593SJakub Kicinski 
172277a3d311SJakub Kicinski static int
1723fc448497SJakub Kicinski map_call_stack_common(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
172477a3d311SJakub Kicinski {
172577a3d311SJakub Kicinski 	bool load_lm_ptr;
172677a3d311SJakub Kicinski 	u32 ret_tgt;
172777a3d311SJakub Kicinski 	s64 lm_off;
172877a3d311SJakub Kicinski 
172977a3d311SJakub Kicinski 	/* We only have to reload LM0 if the key is not at start of stack */
17301a7e62e6SQuentin Monnet 	lm_off = nfp_prog->stack_frame_depth;
17312f46e0c1SJakub Kicinski 	lm_off += meta->arg2.reg.var_off.value + meta->arg2.reg.off;
17322f46e0c1SJakub Kicinski 	load_lm_ptr = meta->arg2.var_off || lm_off;
173377a3d311SJakub Kicinski 
173477a3d311SJakub Kicinski 	/* Set LM0 to start of key */
173577a3d311SJakub Kicinski 	if (load_lm_ptr)
173677a3d311SJakub Kicinski 		emit_csr_wr(nfp_prog, reg_b(2 * 2), NFP_CSR_ACT_LM_ADDR0);
173744d65a47SJakub Kicinski 	if (meta->func_id == BPF_FUNC_map_update_elem)
173844d65a47SJakub Kicinski 		emit_csr_wr(nfp_prog, reg_b(3 * 2), NFP_CSR_ACT_LM_ADDR2);
173977a3d311SJakub Kicinski 
1740fc448497SJakub Kicinski 	emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO + meta->func_id,
174177a3d311SJakub Kicinski 		     2, RELO_BR_HELPER);
174277a3d311SJakub Kicinski 	ret_tgt = nfp_prog_current_offset(nfp_prog) + 2;
174377a3d311SJakub Kicinski 
174477a3d311SJakub Kicinski 	/* Load map ID into A0 */
1745b4264c96SJakub Kicinski 	wrp_mov(nfp_prog, reg_a(0), reg_a(2));
174677a3d311SJakub Kicinski 
174777a3d311SJakub Kicinski 	/* Load the return address into B0 */
174877a3d311SJakub Kicinski 	wrp_immed_relo(nfp_prog, reg_b(0), ret_tgt, RELO_IMMED_REL);
174977a3d311SJakub Kicinski 
175077a3d311SJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, ret_tgt))
175177a3d311SJakub Kicinski 		return -EINVAL;
175277a3d311SJakub Kicinski 
175377a3d311SJakub Kicinski 	/* Reset the LM0 pointer */
175477a3d311SJakub Kicinski 	if (!load_lm_ptr)
175577a3d311SJakub Kicinski 		return 0;
175677a3d311SJakub Kicinski 
175777a3d311SJakub Kicinski 	emit_csr_wr(nfp_prog, stack_reg(nfp_prog), NFP_CSR_ACT_LM_ADDR0);
175877a3d311SJakub Kicinski 	wrp_nops(nfp_prog, 3);
175977a3d311SJakub Kicinski 
176077a3d311SJakub Kicinski 	return 0;
176177a3d311SJakub Kicinski }
176277a3d311SJakub Kicinski 
1763df4a37d8SJakub Kicinski static int
1764df4a37d8SJakub Kicinski nfp_get_prandom_u32(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1765df4a37d8SJakub Kicinski {
1766df4a37d8SJakub Kicinski 	__emit_csr_rd(nfp_prog, NFP_CSR_PSEUDO_RND_NUM);
1767df4a37d8SJakub Kicinski 	/* CSR value is read in following immed[gpr, 0] */
1768df4a37d8SJakub Kicinski 	emit_immed(nfp_prog, reg_both(0), 0,
1769df4a37d8SJakub Kicinski 		   IMMED_WIDTH_ALL, false, IMMED_SHIFT_0B);
1770df4a37d8SJakub Kicinski 	emit_immed(nfp_prog, reg_both(1), 0,
1771df4a37d8SJakub Kicinski 		   IMMED_WIDTH_ALL, false, IMMED_SHIFT_0B);
1772df4a37d8SJakub Kicinski 	return 0;
1773df4a37d8SJakub Kicinski }
1774df4a37d8SJakub Kicinski 
17759816dd35SJakub Kicinski static int
17769816dd35SJakub Kicinski nfp_perf_event_output(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
17779816dd35SJakub Kicinski {
17789816dd35SJakub Kicinski 	swreg ptr_type;
17799816dd35SJakub Kicinski 	u32 ret_tgt;
17809816dd35SJakub Kicinski 
17819816dd35SJakub Kicinski 	ptr_type = ur_load_imm_any(nfp_prog, meta->arg1.type, imm_a(nfp_prog));
17829816dd35SJakub Kicinski 
17839816dd35SJakub Kicinski 	ret_tgt = nfp_prog_current_offset(nfp_prog) + 3;
17849816dd35SJakub Kicinski 
17859816dd35SJakub Kicinski 	emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO + meta->func_id,
17869816dd35SJakub Kicinski 		     2, RELO_BR_HELPER);
17879816dd35SJakub Kicinski 
17889816dd35SJakub Kicinski 	/* Load ptr type into A1 */
17899816dd35SJakub Kicinski 	wrp_mov(nfp_prog, reg_a(1), ptr_type);
17909816dd35SJakub Kicinski 
17919816dd35SJakub Kicinski 	/* Load the return address into B0 */
17929816dd35SJakub Kicinski 	wrp_immed_relo(nfp_prog, reg_b(0), ret_tgt, RELO_IMMED_REL);
17939816dd35SJakub Kicinski 
17949816dd35SJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, ret_tgt))
17959816dd35SJakub Kicinski 		return -EINVAL;
17969816dd35SJakub Kicinski 
17979816dd35SJakub Kicinski 	return 0;
17989816dd35SJakub Kicinski }
17999816dd35SJakub Kicinski 
1800d985888fSJakub Kicinski static int
1801d985888fSJakub Kicinski nfp_queue_select(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1802d985888fSJakub Kicinski {
1803d985888fSJakub Kicinski 	u32 jmp_tgt;
1804d985888fSJakub Kicinski 
1805d985888fSJakub Kicinski 	jmp_tgt = nfp_prog_current_offset(nfp_prog) + 5;
1806d985888fSJakub Kicinski 
1807d985888fSJakub Kicinski 	/* Make sure the queue id fits into FW field */
1808d985888fSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_a(meta->insn.src_reg * 2),
1809d985888fSJakub Kicinski 		 ALU_OP_AND_NOT_B, reg_imm(0xff));
1810d985888fSJakub Kicinski 	emit_br(nfp_prog, BR_BEQ, jmp_tgt, 2);
1811d985888fSJakub Kicinski 
1812d985888fSJakub Kicinski 	/* Set the 'queue selected' bit and the queue value */
1813d985888fSJakub Kicinski 	emit_shf(nfp_prog, pv_qsel_set(nfp_prog),
1814d985888fSJakub Kicinski 		 pv_qsel_set(nfp_prog), SHF_OP_OR, reg_imm(1),
1815d985888fSJakub Kicinski 		 SHF_SC_L_SHF, PKT_VEL_QSEL_SET_BIT);
1816d985888fSJakub Kicinski 	emit_ld_field(nfp_prog,
1817d985888fSJakub Kicinski 		      pv_qsel_val(nfp_prog), 0x1, reg_b(meta->insn.src_reg * 2),
1818d985888fSJakub Kicinski 		      SHF_SC_NONE, 0);
1819d985888fSJakub Kicinski 	/* Delay slots end here, we will jump over next instruction if queue
1820d985888fSJakub Kicinski 	 * value fits into the field.
1821d985888fSJakub Kicinski 	 */
1822d985888fSJakub Kicinski 	emit_ld_field(nfp_prog,
1823d985888fSJakub Kicinski 		      pv_qsel_val(nfp_prog), 0x1, reg_imm(NFP_NET_RXR_MAX),
1824d985888fSJakub Kicinski 		      SHF_SC_NONE, 0);
1825d985888fSJakub Kicinski 
1826d985888fSJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, jmp_tgt))
1827d985888fSJakub Kicinski 		return -EINVAL;
1828d985888fSJakub Kicinski 
1829d985888fSJakub Kicinski 	return 0;
1830d985888fSJakub Kicinski }
1831d985888fSJakub Kicinski 
1832d9ae7f2bSJakub Kicinski /* --- Callbacks --- */
1833d9ae7f2bSJakub Kicinski static int mov_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1834d9ae7f2bSJakub Kicinski {
1835d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1836b14157eeSJakub Kicinski 	u8 dst = insn->dst_reg * 2;
1837b14157eeSJakub Kicinski 	u8 src = insn->src_reg * 2;
1838d9ae7f2bSJakub Kicinski 
1839b14157eeSJakub Kicinski 	if (insn->src_reg == BPF_REG_10) {
1840b14157eeSJakub Kicinski 		swreg stack_depth_reg;
1841b14157eeSJakub Kicinski 
1842b14157eeSJakub Kicinski 		stack_depth_reg = ur_load_imm_any(nfp_prog,
18431a7e62e6SQuentin Monnet 						  nfp_prog->stack_frame_depth,
1844b14157eeSJakub Kicinski 						  stack_imm(nfp_prog));
18451a7e62e6SQuentin Monnet 		emit_alu(nfp_prog, reg_both(dst), stack_reg(nfp_prog),
18461a7e62e6SQuentin Monnet 			 ALU_OP_ADD, stack_depth_reg);
1847b14157eeSJakub Kicinski 		wrp_immed(nfp_prog, reg_both(dst + 1), 0);
1848b14157eeSJakub Kicinski 	} else {
1849b14157eeSJakub Kicinski 		wrp_reg_mov(nfp_prog, dst, src);
1850b14157eeSJakub Kicinski 		wrp_reg_mov(nfp_prog, dst + 1, src + 1);
1851b14157eeSJakub Kicinski 	}
1852d9ae7f2bSJakub Kicinski 
1853d9ae7f2bSJakub Kicinski 	return 0;
1854d9ae7f2bSJakub Kicinski }
1855d9ae7f2bSJakub Kicinski 
1856d9ae7f2bSJakub Kicinski static int mov_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1857d9ae7f2bSJakub Kicinski {
1858d9ae7f2bSJakub Kicinski 	u64 imm = meta->insn.imm; /* sign extend */
1859d9ae7f2bSJakub Kicinski 
1860d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2), imm & ~0U);
1861d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), imm >> 32);
1862d9ae7f2bSJakub Kicinski 
1863d9ae7f2bSJakub Kicinski 	return 0;
1864d9ae7f2bSJakub Kicinski }
1865d9ae7f2bSJakub Kicinski 
1866d9ae7f2bSJakub Kicinski static int xor_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1867d9ae7f2bSJakub Kicinski {
1868d9ae7f2bSJakub Kicinski 	return wrp_alu64_reg(nfp_prog, meta, ALU_OP_XOR);
1869d9ae7f2bSJakub Kicinski }
1870d9ae7f2bSJakub Kicinski 
1871d9ae7f2bSJakub Kicinski static int xor_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1872d9ae7f2bSJakub Kicinski {
1873d9ae7f2bSJakub Kicinski 	return wrp_alu64_imm(nfp_prog, meta, ALU_OP_XOR, !meta->insn.imm);
1874d9ae7f2bSJakub Kicinski }
1875d9ae7f2bSJakub Kicinski 
1876d9ae7f2bSJakub Kicinski static int and_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1877d9ae7f2bSJakub Kicinski {
1878d9ae7f2bSJakub Kicinski 	return wrp_alu64_reg(nfp_prog, meta, ALU_OP_AND);
1879d9ae7f2bSJakub Kicinski }
1880d9ae7f2bSJakub Kicinski 
1881d9ae7f2bSJakub Kicinski static int and_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1882d9ae7f2bSJakub Kicinski {
1883d9ae7f2bSJakub Kicinski 	return wrp_alu64_imm(nfp_prog, meta, ALU_OP_AND, !~meta->insn.imm);
1884d9ae7f2bSJakub Kicinski }
1885d9ae7f2bSJakub Kicinski 
1886d9ae7f2bSJakub Kicinski static int or_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1887d9ae7f2bSJakub Kicinski {
1888d9ae7f2bSJakub Kicinski 	return wrp_alu64_reg(nfp_prog, meta, ALU_OP_OR);
1889d9ae7f2bSJakub Kicinski }
1890d9ae7f2bSJakub Kicinski 
1891d9ae7f2bSJakub Kicinski static int or_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1892d9ae7f2bSJakub Kicinski {
1893d9ae7f2bSJakub Kicinski 	return wrp_alu64_imm(nfp_prog, meta, ALU_OP_OR, !meta->insn.imm);
1894d9ae7f2bSJakub Kicinski }
1895d9ae7f2bSJakub Kicinski 
1896d9ae7f2bSJakub Kicinski static int add_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1897d9ae7f2bSJakub Kicinski {
1898d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1899d9ae7f2bSJakub Kicinski 
1900d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2),
1901d9ae7f2bSJakub Kicinski 		 reg_a(insn->dst_reg * 2), ALU_OP_ADD,
1902d9ae7f2bSJakub Kicinski 		 reg_b(insn->src_reg * 2));
1903d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1),
1904d9ae7f2bSJakub Kicinski 		 reg_a(insn->dst_reg * 2 + 1), ALU_OP_ADD_C,
1905d9ae7f2bSJakub Kicinski 		 reg_b(insn->src_reg * 2 + 1));
1906d9ae7f2bSJakub Kicinski 
1907d9ae7f2bSJakub Kicinski 	return 0;
1908d9ae7f2bSJakub Kicinski }
1909d9ae7f2bSJakub Kicinski 
1910d9ae7f2bSJakub Kicinski static int add_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1911d9ae7f2bSJakub Kicinski {
1912d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1913d9ae7f2bSJakub Kicinski 	u64 imm = insn->imm; /* sign extend */
1914d9ae7f2bSJakub Kicinski 
1915d9ae7f2bSJakub Kicinski 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, ALU_OP_ADD, imm & ~0U);
1916d9ae7f2bSJakub Kicinski 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, ALU_OP_ADD_C, imm >> 32);
1917d9ae7f2bSJakub Kicinski 
1918d9ae7f2bSJakub Kicinski 	return 0;
1919d9ae7f2bSJakub Kicinski }
1920d9ae7f2bSJakub Kicinski 
1921d9ae7f2bSJakub Kicinski static int sub_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1922d9ae7f2bSJakub Kicinski {
1923d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1924d9ae7f2bSJakub Kicinski 
1925d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2),
1926d9ae7f2bSJakub Kicinski 		 reg_a(insn->dst_reg * 2), ALU_OP_SUB,
1927d9ae7f2bSJakub Kicinski 		 reg_b(insn->src_reg * 2));
1928d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1),
1929d9ae7f2bSJakub Kicinski 		 reg_a(insn->dst_reg * 2 + 1), ALU_OP_SUB_C,
1930d9ae7f2bSJakub Kicinski 		 reg_b(insn->src_reg * 2 + 1));
1931d9ae7f2bSJakub Kicinski 
1932d9ae7f2bSJakub Kicinski 	return 0;
1933d9ae7f2bSJakub Kicinski }
1934d9ae7f2bSJakub Kicinski 
1935d9ae7f2bSJakub Kicinski static int sub_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1936d9ae7f2bSJakub Kicinski {
1937d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
1938d9ae7f2bSJakub Kicinski 	u64 imm = insn->imm; /* sign extend */
1939d9ae7f2bSJakub Kicinski 
1940d9ae7f2bSJakub Kicinski 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, ALU_OP_SUB, imm & ~0U);
1941d9ae7f2bSJakub Kicinski 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, ALU_OP_SUB_C, imm >> 32);
1942d9ae7f2bSJakub Kicinski 
1943d9ae7f2bSJakub Kicinski 	return 0;
1944d9ae7f2bSJakub Kicinski }
1945d9ae7f2bSJakub Kicinski 
1946d3d23fdbSJiong Wang static int mul_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1947d3d23fdbSJiong Wang {
1948d3d23fdbSJiong Wang 	return wrp_mul(nfp_prog, meta, true, true);
1949d3d23fdbSJiong Wang }
1950d3d23fdbSJiong Wang 
1951d3d23fdbSJiong Wang static int mul_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1952d3d23fdbSJiong Wang {
1953d3d23fdbSJiong Wang 	return wrp_mul(nfp_prog, meta, true, false);
1954d3d23fdbSJiong Wang }
1955d3d23fdbSJiong Wang 
19562a952b03SJiong Wang static int div_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
19572a952b03SJiong Wang {
19582a952b03SJiong Wang 	const struct bpf_insn *insn = &meta->insn;
19592a952b03SJiong Wang 
19602a952b03SJiong Wang 	return wrp_div_imm(nfp_prog, insn->dst_reg * 2, insn->imm);
19612a952b03SJiong Wang }
19622a952b03SJiong Wang 
19632a952b03SJiong Wang static int div_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
19642a952b03SJiong Wang {
19652a952b03SJiong Wang 	/* NOTE: verifier hook has rejected cases for which verifier doesn't
19662a952b03SJiong Wang 	 * know whether the source operand is constant or not.
19672a952b03SJiong Wang 	 */
19682a952b03SJiong Wang 	return wrp_div_imm(nfp_prog, meta->insn.dst_reg * 2, meta->umin_src);
19692a952b03SJiong Wang }
19702a952b03SJiong Wang 
1971254ef4d7SJiong Wang static int neg_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1972254ef4d7SJiong Wang {
1973254ef4d7SJiong Wang 	const struct bpf_insn *insn = &meta->insn;
1974254ef4d7SJiong Wang 
1975254ef4d7SJiong Wang 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2), reg_imm(0),
1976254ef4d7SJiong Wang 		 ALU_OP_SUB, reg_b(insn->dst_reg * 2));
1977254ef4d7SJiong Wang 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1), reg_imm(0),
1978254ef4d7SJiong Wang 		 ALU_OP_SUB_C, reg_b(insn->dst_reg * 2 + 1));
1979254ef4d7SJiong Wang 
1980254ef4d7SJiong Wang 	return 0;
1981254ef4d7SJiong Wang }
1982254ef4d7SJiong Wang 
1983991f5b36SJiong Wang /* Pseudo code:
1984991f5b36SJiong Wang  *   if shift_amt >= 32
1985991f5b36SJiong Wang  *     dst_high = dst_low << shift_amt[4:0]
1986991f5b36SJiong Wang  *     dst_low = 0;
1987991f5b36SJiong Wang  *   else
1988991f5b36SJiong Wang  *     dst_high = (dst_high, dst_low) >> (32 - shift_amt)
1989991f5b36SJiong Wang  *     dst_low = dst_low << shift_amt
1990991f5b36SJiong Wang  *
1991991f5b36SJiong Wang  * The indirect shift will use the same logic at runtime.
1992991f5b36SJiong Wang  */
1993991f5b36SJiong Wang static int __shl_imm64(struct nfp_prog *nfp_prog, u8 dst, u8 shift_amt)
1994991f5b36SJiong Wang {
1995991f5b36SJiong Wang 	if (shift_amt < 32) {
1996991f5b36SJiong Wang 		emit_shf(nfp_prog, reg_both(dst + 1), reg_a(dst + 1),
1997991f5b36SJiong Wang 			 SHF_OP_NONE, reg_b(dst), SHF_SC_R_DSHF,
1998991f5b36SJiong Wang 			 32 - shift_amt);
1999991f5b36SJiong Wang 		emit_shf(nfp_prog, reg_both(dst), reg_none(), SHF_OP_NONE,
2000991f5b36SJiong Wang 			 reg_b(dst), SHF_SC_L_SHF, shift_amt);
2001991f5b36SJiong Wang 	} else if (shift_amt == 32) {
2002991f5b36SJiong Wang 		wrp_reg_mov(nfp_prog, dst + 1, dst);
2003991f5b36SJiong Wang 		wrp_immed(nfp_prog, reg_both(dst), 0);
2004991f5b36SJiong Wang 	} else if (shift_amt > 32) {
2005991f5b36SJiong Wang 		emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_NONE,
2006991f5b36SJiong Wang 			 reg_b(dst), SHF_SC_L_SHF, shift_amt - 32);
2007991f5b36SJiong Wang 		wrp_immed(nfp_prog, reg_both(dst), 0);
2008991f5b36SJiong Wang 	}
2009991f5b36SJiong Wang 
2010991f5b36SJiong Wang 	return 0;
2011991f5b36SJiong Wang }
2012991f5b36SJiong Wang 
2013d9ae7f2bSJakub Kicinski static int shl_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2014d9ae7f2bSJakub Kicinski {
2015d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
20163cae1319SJakub Kicinski 	u8 dst = insn->dst_reg * 2;
2017d9ae7f2bSJakub Kicinski 
2018991f5b36SJiong Wang 	return __shl_imm64(nfp_prog, dst, insn->imm);
2019991f5b36SJiong Wang }
2020991f5b36SJiong Wang 
2021991f5b36SJiong Wang static void shl_reg64_lt32_high(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2022991f5b36SJiong Wang {
2023991f5b36SJiong Wang 	emit_alu(nfp_prog, imm_both(nfp_prog), reg_imm(32), ALU_OP_SUB,
2024991f5b36SJiong Wang 		 reg_b(src));
2025991f5b36SJiong Wang 	emit_alu(nfp_prog, reg_none(), imm_a(nfp_prog), ALU_OP_OR, reg_imm(0));
2026991f5b36SJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst + 1), reg_a(dst + 1), SHF_OP_NONE,
2027991f5b36SJiong Wang 		       reg_b(dst), SHF_SC_R_DSHF);
2028991f5b36SJiong Wang }
2029991f5b36SJiong Wang 
2030991f5b36SJiong Wang /* NOTE: for indirect left shift, HIGH part should be calculated first. */
2031991f5b36SJiong Wang static void shl_reg64_lt32_low(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2032991f5b36SJiong Wang {
2033991f5b36SJiong Wang 	emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0));
2034991f5b36SJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst), reg_none(), SHF_OP_NONE,
2035991f5b36SJiong Wang 		       reg_b(dst), SHF_SC_L_SHF);
2036991f5b36SJiong Wang }
2037991f5b36SJiong Wang 
2038991f5b36SJiong Wang static void shl_reg64_lt32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2039991f5b36SJiong Wang {
2040991f5b36SJiong Wang 	shl_reg64_lt32_high(nfp_prog, dst, src);
2041991f5b36SJiong Wang 	shl_reg64_lt32_low(nfp_prog, dst, src);
2042991f5b36SJiong Wang }
2043991f5b36SJiong Wang 
2044991f5b36SJiong Wang static void shl_reg64_ge32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2045991f5b36SJiong Wang {
2046991f5b36SJiong Wang 	emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0));
2047991f5b36SJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_NONE,
2048991f5b36SJiong Wang 		       reg_b(dst), SHF_SC_L_SHF);
20493cae1319SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(dst), 0);
2050991f5b36SJiong Wang }
2051991f5b36SJiong Wang 
2052991f5b36SJiong Wang static int shl_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2053991f5b36SJiong Wang {
2054991f5b36SJiong Wang 	const struct bpf_insn *insn = &meta->insn;
2055991f5b36SJiong Wang 	u64 umin, umax;
2056991f5b36SJiong Wang 	u8 dst, src;
2057991f5b36SJiong Wang 
2058991f5b36SJiong Wang 	dst = insn->dst_reg * 2;
2059662c5472SJiong Wang 	umin = meta->umin_src;
2060662c5472SJiong Wang 	umax = meta->umax_src;
2061991f5b36SJiong Wang 	if (umin == umax)
2062991f5b36SJiong Wang 		return __shl_imm64(nfp_prog, dst, umin);
2063991f5b36SJiong Wang 
2064991f5b36SJiong Wang 	src = insn->src_reg * 2;
2065991f5b36SJiong Wang 	if (umax < 32) {
2066991f5b36SJiong Wang 		shl_reg64_lt32(nfp_prog, dst, src);
2067991f5b36SJiong Wang 	} else if (umin >= 32) {
2068991f5b36SJiong Wang 		shl_reg64_ge32(nfp_prog, dst, src);
2069991f5b36SJiong Wang 	} else {
2070991f5b36SJiong Wang 		/* Generate different instruction sequences depending on runtime
2071991f5b36SJiong Wang 		 * value of shift amount.
2072991f5b36SJiong Wang 		 */
2073991f5b36SJiong Wang 		u16 label_ge32, label_end;
2074991f5b36SJiong Wang 
2075991f5b36SJiong Wang 		label_ge32 = nfp_prog_current_offset(nfp_prog) + 7;
2076991f5b36SJiong Wang 		emit_br_bset(nfp_prog, reg_a(src), 5, label_ge32, 0);
2077991f5b36SJiong Wang 
2078991f5b36SJiong Wang 		shl_reg64_lt32_high(nfp_prog, dst, src);
2079991f5b36SJiong Wang 		label_end = nfp_prog_current_offset(nfp_prog) + 6;
2080991f5b36SJiong Wang 		emit_br(nfp_prog, BR_UNC, label_end, 2);
2081991f5b36SJiong Wang 		/* shl_reg64_lt32_low packed in delay slot. */
2082991f5b36SJiong Wang 		shl_reg64_lt32_low(nfp_prog, dst, src);
2083991f5b36SJiong Wang 
2084991f5b36SJiong Wang 		if (!nfp_prog_confirm_current_offset(nfp_prog, label_ge32))
2085991f5b36SJiong Wang 			return -EINVAL;
2086991f5b36SJiong Wang 		shl_reg64_ge32(nfp_prog, dst, src);
2087991f5b36SJiong Wang 
2088991f5b36SJiong Wang 		if (!nfp_prog_confirm_current_offset(nfp_prog, label_end))
2089991f5b36SJiong Wang 			return -EINVAL;
2090991f5b36SJiong Wang 	}
2091991f5b36SJiong Wang 
2092991f5b36SJiong Wang 	return 0;
2093991f5b36SJiong Wang }
2094991f5b36SJiong Wang 
2095991f5b36SJiong Wang /* Pseudo code:
2096991f5b36SJiong Wang  *   if shift_amt >= 32
2097991f5b36SJiong Wang  *     dst_high = 0;
2098991f5b36SJiong Wang  *     dst_low = dst_high >> shift_amt[4:0]
2099991f5b36SJiong Wang  *   else
2100991f5b36SJiong Wang  *     dst_high = dst_high >> shift_amt
2101991f5b36SJiong Wang  *     dst_low = (dst_high, dst_low) >> shift_amt
2102991f5b36SJiong Wang  *
2103991f5b36SJiong Wang  * The indirect shift will use the same logic at runtime.
2104991f5b36SJiong Wang  */
2105991f5b36SJiong Wang static int __shr_imm64(struct nfp_prog *nfp_prog, u8 dst, u8 shift_amt)
2106991f5b36SJiong Wang {
2107991f5b36SJiong Wang 	if (shift_amt < 32) {
2108991f5b36SJiong Wang 		emit_shf(nfp_prog, reg_both(dst), reg_a(dst + 1), SHF_OP_NONE,
2109991f5b36SJiong Wang 			 reg_b(dst), SHF_SC_R_DSHF, shift_amt);
2110991f5b36SJiong Wang 		emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_NONE,
2111991f5b36SJiong Wang 			 reg_b(dst + 1), SHF_SC_R_SHF, shift_amt);
2112991f5b36SJiong Wang 	} else if (shift_amt == 32) {
2113991f5b36SJiong Wang 		wrp_reg_mov(nfp_prog, dst, dst + 1);
2114991f5b36SJiong Wang 		wrp_immed(nfp_prog, reg_both(dst + 1), 0);
2115991f5b36SJiong Wang 	} else if (shift_amt > 32) {
2116991f5b36SJiong Wang 		emit_shf(nfp_prog, reg_both(dst), reg_none(), SHF_OP_NONE,
2117991f5b36SJiong Wang 			 reg_b(dst + 1), SHF_SC_R_SHF, shift_amt - 32);
2118991f5b36SJiong Wang 		wrp_immed(nfp_prog, reg_both(dst + 1), 0);
21193cae1319SJakub Kicinski 	}
2120d9ae7f2bSJakub Kicinski 
2121d9ae7f2bSJakub Kicinski 	return 0;
2122d9ae7f2bSJakub Kicinski }
2123d9ae7f2bSJakub Kicinski 
2124d9ae7f2bSJakub Kicinski static int shr_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2125d9ae7f2bSJakub Kicinski {
2126d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
21273cae1319SJakub Kicinski 	u8 dst = insn->dst_reg * 2;
2128d9ae7f2bSJakub Kicinski 
2129991f5b36SJiong Wang 	return __shr_imm64(nfp_prog, dst, insn->imm);
2130991f5b36SJiong Wang }
2131991f5b36SJiong Wang 
2132991f5b36SJiong Wang /* NOTE: for indirect right shift, LOW part should be calculated first. */
2133991f5b36SJiong Wang static void shr_reg64_lt32_high(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2134991f5b36SJiong Wang {
2135991f5b36SJiong Wang 	emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0));
2136991f5b36SJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_NONE,
2137991f5b36SJiong Wang 		       reg_b(dst + 1), SHF_SC_R_SHF);
2138991f5b36SJiong Wang }
2139991f5b36SJiong Wang 
2140991f5b36SJiong Wang static void shr_reg64_lt32_low(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2141991f5b36SJiong Wang {
2142991f5b36SJiong Wang 	emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0));
2143991f5b36SJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst), reg_a(dst + 1), SHF_OP_NONE,
2144991f5b36SJiong Wang 		       reg_b(dst), SHF_SC_R_DSHF);
2145991f5b36SJiong Wang }
2146991f5b36SJiong Wang 
2147991f5b36SJiong Wang static void shr_reg64_lt32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2148991f5b36SJiong Wang {
2149991f5b36SJiong Wang 	shr_reg64_lt32_low(nfp_prog, dst, src);
2150991f5b36SJiong Wang 	shr_reg64_lt32_high(nfp_prog, dst, src);
2151991f5b36SJiong Wang }
2152991f5b36SJiong Wang 
2153991f5b36SJiong Wang static void shr_reg64_ge32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2154991f5b36SJiong Wang {
2155991f5b36SJiong Wang 	emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0));
2156991f5b36SJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst), reg_none(), SHF_OP_NONE,
2157991f5b36SJiong Wang 		       reg_b(dst + 1), SHF_SC_R_SHF);
21583cae1319SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(dst + 1), 0);
2159991f5b36SJiong Wang }
2160991f5b36SJiong Wang 
2161991f5b36SJiong Wang static int shr_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2162991f5b36SJiong Wang {
2163991f5b36SJiong Wang 	const struct bpf_insn *insn = &meta->insn;
2164991f5b36SJiong Wang 	u64 umin, umax;
2165991f5b36SJiong Wang 	u8 dst, src;
2166991f5b36SJiong Wang 
2167991f5b36SJiong Wang 	dst = insn->dst_reg * 2;
2168662c5472SJiong Wang 	umin = meta->umin_src;
2169662c5472SJiong Wang 	umax = meta->umax_src;
2170991f5b36SJiong Wang 	if (umin == umax)
2171991f5b36SJiong Wang 		return __shr_imm64(nfp_prog, dst, umin);
2172991f5b36SJiong Wang 
2173991f5b36SJiong Wang 	src = insn->src_reg * 2;
2174991f5b36SJiong Wang 	if (umax < 32) {
2175991f5b36SJiong Wang 		shr_reg64_lt32(nfp_prog, dst, src);
2176991f5b36SJiong Wang 	} else if (umin >= 32) {
2177991f5b36SJiong Wang 		shr_reg64_ge32(nfp_prog, dst, src);
2178991f5b36SJiong Wang 	} else {
2179991f5b36SJiong Wang 		/* Generate different instruction sequences depending on runtime
2180991f5b36SJiong Wang 		 * value of shift amount.
2181991f5b36SJiong Wang 		 */
2182991f5b36SJiong Wang 		u16 label_ge32, label_end;
2183991f5b36SJiong Wang 
2184991f5b36SJiong Wang 		label_ge32 = nfp_prog_current_offset(nfp_prog) + 6;
2185991f5b36SJiong Wang 		emit_br_bset(nfp_prog, reg_a(src), 5, label_ge32, 0);
2186991f5b36SJiong Wang 		shr_reg64_lt32_low(nfp_prog, dst, src);
2187991f5b36SJiong Wang 		label_end = nfp_prog_current_offset(nfp_prog) + 6;
2188991f5b36SJiong Wang 		emit_br(nfp_prog, BR_UNC, label_end, 2);
2189991f5b36SJiong Wang 		/* shr_reg64_lt32_high packed in delay slot. */
2190991f5b36SJiong Wang 		shr_reg64_lt32_high(nfp_prog, dst, src);
2191991f5b36SJiong Wang 
2192991f5b36SJiong Wang 		if (!nfp_prog_confirm_current_offset(nfp_prog, label_ge32))
2193991f5b36SJiong Wang 			return -EINVAL;
2194991f5b36SJiong Wang 		shr_reg64_ge32(nfp_prog, dst, src);
2195991f5b36SJiong Wang 
2196991f5b36SJiong Wang 		if (!nfp_prog_confirm_current_offset(nfp_prog, label_end))
2197991f5b36SJiong Wang 			return -EINVAL;
21983cae1319SJakub Kicinski 	}
2199d9ae7f2bSJakub Kicinski 
2200d9ae7f2bSJakub Kicinski 	return 0;
2201d9ae7f2bSJakub Kicinski }
2202d9ae7f2bSJakub Kicinski 
2203f43d0f17SJiong Wang /* Code logic is the same as __shr_imm64 except ashr requires signedness bit
2204f43d0f17SJiong Wang  * told through PREV_ALU result.
2205f43d0f17SJiong Wang  */
2206c217abccSJiong Wang static int __ashr_imm64(struct nfp_prog *nfp_prog, u8 dst, u8 shift_amt)
2207c217abccSJiong Wang {
2208c217abccSJiong Wang 	if (shift_amt < 32) {
2209c217abccSJiong Wang 		emit_shf(nfp_prog, reg_both(dst), reg_a(dst + 1), SHF_OP_NONE,
2210c217abccSJiong Wang 			 reg_b(dst), SHF_SC_R_DSHF, shift_amt);
2211c217abccSJiong Wang 		/* Set signedness bit. */
2212c217abccSJiong Wang 		emit_alu(nfp_prog, reg_none(), reg_a(dst + 1), ALU_OP_OR,
2213c217abccSJiong Wang 			 reg_imm(0));
2214c217abccSJiong Wang 		emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR,
2215c217abccSJiong Wang 			 reg_b(dst + 1), SHF_SC_R_SHF, shift_amt);
2216c217abccSJiong Wang 	} else if (shift_amt == 32) {
2217c217abccSJiong Wang 		/* NOTE: this also helps setting signedness bit. */
2218c217abccSJiong Wang 		wrp_reg_mov(nfp_prog, dst, dst + 1);
2219c217abccSJiong Wang 		emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR,
2220c217abccSJiong Wang 			 reg_b(dst + 1), SHF_SC_R_SHF, 31);
2221c217abccSJiong Wang 	} else if (shift_amt > 32) {
2222c217abccSJiong Wang 		emit_alu(nfp_prog, reg_none(), reg_a(dst + 1), ALU_OP_OR,
2223c217abccSJiong Wang 			 reg_imm(0));
2224c217abccSJiong Wang 		emit_shf(nfp_prog, reg_both(dst), reg_none(), SHF_OP_ASHR,
2225c217abccSJiong Wang 			 reg_b(dst + 1), SHF_SC_R_SHF, shift_amt - 32);
2226c217abccSJiong Wang 		emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR,
2227c217abccSJiong Wang 			 reg_b(dst + 1), SHF_SC_R_SHF, 31);
2228c217abccSJiong Wang 	}
2229c217abccSJiong Wang 
2230c217abccSJiong Wang 	return 0;
2231c217abccSJiong Wang }
2232c217abccSJiong Wang 
2233f43d0f17SJiong Wang static int ashr_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2234f43d0f17SJiong Wang {
2235f43d0f17SJiong Wang 	const struct bpf_insn *insn = &meta->insn;
2236f43d0f17SJiong Wang 	u8 dst = insn->dst_reg * 2;
2237f43d0f17SJiong Wang 
2238c217abccSJiong Wang 	return __ashr_imm64(nfp_prog, dst, insn->imm);
2239c217abccSJiong Wang }
2240c217abccSJiong Wang 
2241c217abccSJiong Wang static void ashr_reg64_lt32_high(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2242c217abccSJiong Wang {
2243c217abccSJiong Wang 	/* NOTE: the first insn will set both indirect shift amount (source A)
2244c217abccSJiong Wang 	 * and signedness bit (MSB of result).
2245c217abccSJiong Wang 	 */
2246c217abccSJiong Wang 	emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_b(dst + 1));
2247c217abccSJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR,
2248c217abccSJiong Wang 		       reg_b(dst + 1), SHF_SC_R_SHF);
2249c217abccSJiong Wang }
2250c217abccSJiong Wang 
2251c217abccSJiong Wang static void ashr_reg64_lt32_low(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2252c217abccSJiong Wang {
2253c217abccSJiong Wang 	/* NOTE: it is the same as logic shift because we don't need to shift in
2254c217abccSJiong Wang 	 * signedness bit when the shift amount is less than 32.
2255c217abccSJiong Wang 	 */
2256c217abccSJiong Wang 	return shr_reg64_lt32_low(nfp_prog, dst, src);
2257c217abccSJiong Wang }
2258c217abccSJiong Wang 
2259c217abccSJiong Wang static void ashr_reg64_lt32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2260c217abccSJiong Wang {
2261c217abccSJiong Wang 	ashr_reg64_lt32_low(nfp_prog, dst, src);
2262c217abccSJiong Wang 	ashr_reg64_lt32_high(nfp_prog, dst, src);
2263c217abccSJiong Wang }
2264c217abccSJiong Wang 
2265c217abccSJiong Wang static void ashr_reg64_ge32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
2266c217abccSJiong Wang {
2267c217abccSJiong Wang 	emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_b(dst + 1));
2268c217abccSJiong Wang 	emit_shf_indir(nfp_prog, reg_both(dst), reg_none(), SHF_OP_ASHR,
2269c217abccSJiong Wang 		       reg_b(dst + 1), SHF_SC_R_SHF);
2270f43d0f17SJiong Wang 	emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR,
2271f43d0f17SJiong Wang 		 reg_b(dst + 1), SHF_SC_R_SHF, 31);
2272c217abccSJiong Wang }
2273c217abccSJiong Wang 
2274c217abccSJiong Wang /* Like ashr_imm64, but need to use indirect shift. */
2275c217abccSJiong Wang static int ashr_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2276c217abccSJiong Wang {
2277c217abccSJiong Wang 	const struct bpf_insn *insn = &meta->insn;
2278c217abccSJiong Wang 	u64 umin, umax;
2279c217abccSJiong Wang 	u8 dst, src;
2280c217abccSJiong Wang 
2281c217abccSJiong Wang 	dst = insn->dst_reg * 2;
2282662c5472SJiong Wang 	umin = meta->umin_src;
2283662c5472SJiong Wang 	umax = meta->umax_src;
2284c217abccSJiong Wang 	if (umin == umax)
2285c217abccSJiong Wang 		return __ashr_imm64(nfp_prog, dst, umin);
2286c217abccSJiong Wang 
2287c217abccSJiong Wang 	src = insn->src_reg * 2;
2288c217abccSJiong Wang 	if (umax < 32) {
2289c217abccSJiong Wang 		ashr_reg64_lt32(nfp_prog, dst, src);
2290c217abccSJiong Wang 	} else if (umin >= 32) {
2291c217abccSJiong Wang 		ashr_reg64_ge32(nfp_prog, dst, src);
2292c217abccSJiong Wang 	} else {
2293c217abccSJiong Wang 		u16 label_ge32, label_end;
2294c217abccSJiong Wang 
2295c217abccSJiong Wang 		label_ge32 = nfp_prog_current_offset(nfp_prog) + 6;
2296c217abccSJiong Wang 		emit_br_bset(nfp_prog, reg_a(src), 5, label_ge32, 0);
2297c217abccSJiong Wang 		ashr_reg64_lt32_low(nfp_prog, dst, src);
2298c217abccSJiong Wang 		label_end = nfp_prog_current_offset(nfp_prog) + 6;
2299c217abccSJiong Wang 		emit_br(nfp_prog, BR_UNC, label_end, 2);
2300c217abccSJiong Wang 		/* ashr_reg64_lt32_high packed in delay slot. */
2301c217abccSJiong Wang 		ashr_reg64_lt32_high(nfp_prog, dst, src);
2302c217abccSJiong Wang 
2303c217abccSJiong Wang 		if (!nfp_prog_confirm_current_offset(nfp_prog, label_ge32))
2304c217abccSJiong Wang 			return -EINVAL;
2305c217abccSJiong Wang 		ashr_reg64_ge32(nfp_prog, dst, src);
2306c217abccSJiong Wang 
2307c217abccSJiong Wang 		if (!nfp_prog_confirm_current_offset(nfp_prog, label_end))
2308c217abccSJiong Wang 			return -EINVAL;
2309f43d0f17SJiong Wang 	}
2310f43d0f17SJiong Wang 
2311f43d0f17SJiong Wang 	return 0;
2312f43d0f17SJiong Wang }
2313f43d0f17SJiong Wang 
2314d9ae7f2bSJakub Kicinski static int mov_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2315d9ae7f2bSJakub Kicinski {
2316d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
2317d9ae7f2bSJakub Kicinski 
2318d9ae7f2bSJakub Kicinski 	wrp_reg_mov(nfp_prog, insn->dst_reg * 2,  insn->src_reg * 2);
2319d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
2320d9ae7f2bSJakub Kicinski 
2321d9ae7f2bSJakub Kicinski 	return 0;
2322d9ae7f2bSJakub Kicinski }
2323d9ae7f2bSJakub Kicinski 
2324d9ae7f2bSJakub Kicinski static int mov_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2325d9ae7f2bSJakub Kicinski {
2326d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
2327d9ae7f2bSJakub Kicinski 
2328d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2), insn->imm);
2329d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
2330d9ae7f2bSJakub Kicinski 
2331d9ae7f2bSJakub Kicinski 	return 0;
2332d9ae7f2bSJakub Kicinski }
2333d9ae7f2bSJakub Kicinski 
2334d9ae7f2bSJakub Kicinski static int xor_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2335d9ae7f2bSJakub Kicinski {
2336d9ae7f2bSJakub Kicinski 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_XOR);
2337d9ae7f2bSJakub Kicinski }
2338d9ae7f2bSJakub Kicinski 
2339d9ae7f2bSJakub Kicinski static int xor_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2340d9ae7f2bSJakub Kicinski {
2341d9ae7f2bSJakub Kicinski 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_XOR, !~meta->insn.imm);
2342d9ae7f2bSJakub Kicinski }
2343d9ae7f2bSJakub Kicinski 
2344d9ae7f2bSJakub Kicinski static int and_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2345d9ae7f2bSJakub Kicinski {
2346d9ae7f2bSJakub Kicinski 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_AND);
2347d9ae7f2bSJakub Kicinski }
2348d9ae7f2bSJakub Kicinski 
2349d9ae7f2bSJakub Kicinski static int and_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2350d9ae7f2bSJakub Kicinski {
2351d9ae7f2bSJakub Kicinski 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_AND, !~meta->insn.imm);
2352d9ae7f2bSJakub Kicinski }
2353d9ae7f2bSJakub Kicinski 
2354d9ae7f2bSJakub Kicinski static int or_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2355d9ae7f2bSJakub Kicinski {
2356d9ae7f2bSJakub Kicinski 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_OR);
2357d9ae7f2bSJakub Kicinski }
2358d9ae7f2bSJakub Kicinski 
2359d9ae7f2bSJakub Kicinski static int or_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2360d9ae7f2bSJakub Kicinski {
2361d9ae7f2bSJakub Kicinski 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_OR, !meta->insn.imm);
2362d9ae7f2bSJakub Kicinski }
2363d9ae7f2bSJakub Kicinski 
2364d9ae7f2bSJakub Kicinski static int add_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2365d9ae7f2bSJakub Kicinski {
2366d9ae7f2bSJakub Kicinski 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_ADD);
2367d9ae7f2bSJakub Kicinski }
2368d9ae7f2bSJakub Kicinski 
2369d9ae7f2bSJakub Kicinski static int add_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2370d9ae7f2bSJakub Kicinski {
2371d9ae7f2bSJakub Kicinski 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_ADD, !meta->insn.imm);
2372d9ae7f2bSJakub Kicinski }
2373d9ae7f2bSJakub Kicinski 
2374d9ae7f2bSJakub Kicinski static int sub_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2375d9ae7f2bSJakub Kicinski {
2376d9ae7f2bSJakub Kicinski 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_SUB);
2377d9ae7f2bSJakub Kicinski }
2378d9ae7f2bSJakub Kicinski 
2379d9ae7f2bSJakub Kicinski static int sub_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2380d9ae7f2bSJakub Kicinski {
2381d9ae7f2bSJakub Kicinski 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_SUB, !meta->insn.imm);
2382d9ae7f2bSJakub Kicinski }
2383d9ae7f2bSJakub Kicinski 
2384d3d23fdbSJiong Wang static int mul_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2385d3d23fdbSJiong Wang {
2386d3d23fdbSJiong Wang 	return wrp_mul(nfp_prog, meta, false, true);
2387d3d23fdbSJiong Wang }
2388d3d23fdbSJiong Wang 
2389d3d23fdbSJiong Wang static int mul_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2390d3d23fdbSJiong Wang {
2391d3d23fdbSJiong Wang 	return wrp_mul(nfp_prog, meta, false, false);
2392d3d23fdbSJiong Wang }
2393d3d23fdbSJiong Wang 
23942a952b03SJiong Wang static int div_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
23952a952b03SJiong Wang {
23962a952b03SJiong Wang 	return div_reg64(nfp_prog, meta);
23972a952b03SJiong Wang }
23982a952b03SJiong Wang 
23992a952b03SJiong Wang static int div_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
24002a952b03SJiong Wang {
24012a952b03SJiong Wang 	return div_imm64(nfp_prog, meta);
24022a952b03SJiong Wang }
24032a952b03SJiong Wang 
2404254ef4d7SJiong Wang static int neg_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2405254ef4d7SJiong Wang {
2406254ef4d7SJiong Wang 	u8 dst = meta->insn.dst_reg * 2;
2407254ef4d7SJiong Wang 
2408254ef4d7SJiong Wang 	emit_alu(nfp_prog, reg_both(dst), reg_imm(0), ALU_OP_SUB, reg_b(dst));
2409254ef4d7SJiong Wang 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
2410254ef4d7SJiong Wang 
2411254ef4d7SJiong Wang 	return 0;
2412254ef4d7SJiong Wang }
2413254ef4d7SJiong Wang 
2414d9ae7f2bSJakub Kicinski static int shl_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2415d9ae7f2bSJakub Kicinski {
2416d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
2417d9ae7f2bSJakub Kicinski 
2418d9ae7f2bSJakub Kicinski 	if (!insn->imm)
2419d9ae7f2bSJakub Kicinski 		return 1; /* TODO: zero shift means indirect */
2420d9ae7f2bSJakub Kicinski 
2421d9ae7f2bSJakub Kicinski 	emit_shf(nfp_prog, reg_both(insn->dst_reg * 2),
2422d9ae7f2bSJakub Kicinski 		 reg_none(), SHF_OP_NONE, reg_b(insn->dst_reg * 2),
2423d9ae7f2bSJakub Kicinski 		 SHF_SC_L_SHF, insn->imm);
2424d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
2425d9ae7f2bSJakub Kicinski 
2426d9ae7f2bSJakub Kicinski 	return 0;
2427d9ae7f2bSJakub Kicinski }
2428d9ae7f2bSJakub Kicinski 
24293119d1fdSJakub Kicinski static int end_reg32(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
24303119d1fdSJakub Kicinski {
24313119d1fdSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
24323119d1fdSJakub Kicinski 	u8 gpr = insn->dst_reg * 2;
24333119d1fdSJakub Kicinski 
24343119d1fdSJakub Kicinski 	switch (insn->imm) {
24353119d1fdSJakub Kicinski 	case 16:
24363119d1fdSJakub Kicinski 		emit_ld_field(nfp_prog, reg_both(gpr), 0x9, reg_b(gpr),
24373119d1fdSJakub Kicinski 			      SHF_SC_R_ROT, 8);
24383119d1fdSJakub Kicinski 		emit_ld_field(nfp_prog, reg_both(gpr), 0xe, reg_a(gpr),
24393119d1fdSJakub Kicinski 			      SHF_SC_R_SHF, 16);
24403119d1fdSJakub Kicinski 
24413119d1fdSJakub Kicinski 		wrp_immed(nfp_prog, reg_both(gpr + 1), 0);
24423119d1fdSJakub Kicinski 		break;
24433119d1fdSJakub Kicinski 	case 32:
24443119d1fdSJakub Kicinski 		wrp_end32(nfp_prog, reg_a(gpr), gpr);
24453119d1fdSJakub Kicinski 		wrp_immed(nfp_prog, reg_both(gpr + 1), 0);
24463119d1fdSJakub Kicinski 		break;
24473119d1fdSJakub Kicinski 	case 64:
24483119d1fdSJakub Kicinski 		wrp_mov(nfp_prog, imm_a(nfp_prog), reg_b(gpr + 1));
24493119d1fdSJakub Kicinski 
24503119d1fdSJakub Kicinski 		wrp_end32(nfp_prog, reg_a(gpr), gpr + 1);
24513119d1fdSJakub Kicinski 		wrp_end32(nfp_prog, imm_a(nfp_prog), gpr);
24523119d1fdSJakub Kicinski 		break;
24533119d1fdSJakub Kicinski 	}
24543119d1fdSJakub Kicinski 
24553119d1fdSJakub Kicinski 	return 0;
24563119d1fdSJakub Kicinski }
24573119d1fdSJakub Kicinski 
2458d9ae7f2bSJakub Kicinski static int imm_ld8_part2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2459d9ae7f2bSJakub Kicinski {
24609f16c8abSJakub Kicinski 	struct nfp_insn_meta *prev = nfp_meta_prev(meta);
24619f16c8abSJakub Kicinski 	u32 imm_lo, imm_hi;
24629f16c8abSJakub Kicinski 	u8 dst;
24639f16c8abSJakub Kicinski 
24649f16c8abSJakub Kicinski 	dst = prev->insn.dst_reg * 2;
24659f16c8abSJakub Kicinski 	imm_lo = prev->insn.imm;
24669f16c8abSJakub Kicinski 	imm_hi = meta->insn.imm;
24679f16c8abSJakub Kicinski 
24689f16c8abSJakub Kicinski 	wrp_immed(nfp_prog, reg_both(dst), imm_lo);
24699f16c8abSJakub Kicinski 
24709f16c8abSJakub Kicinski 	/* mov is always 1 insn, load imm may be two, so try to use mov */
24719f16c8abSJakub Kicinski 	if (imm_hi == imm_lo)
24729f16c8abSJakub Kicinski 		wrp_mov(nfp_prog, reg_both(dst + 1), reg_a(dst));
24739f16c8abSJakub Kicinski 	else
24749f16c8abSJakub Kicinski 		wrp_immed(nfp_prog, reg_both(dst + 1), imm_hi);
2475d9ae7f2bSJakub Kicinski 
2476d9ae7f2bSJakub Kicinski 	return 0;
2477d9ae7f2bSJakub Kicinski }
2478d9ae7f2bSJakub Kicinski 
2479d9ae7f2bSJakub Kicinski static int imm_ld8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2480d9ae7f2bSJakub Kicinski {
2481d9ae7f2bSJakub Kicinski 	meta->double_cb = imm_ld8_part2;
2482d9ae7f2bSJakub Kicinski 	return 0;
2483d9ae7f2bSJakub Kicinski }
2484d9ae7f2bSJakub Kicinski 
2485d9ae7f2bSJakub Kicinski static int data_ld1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2486d9ae7f2bSJakub Kicinski {
2487d9ae7f2bSJakub Kicinski 	return construct_data_ld(nfp_prog, meta->insn.imm, 1);
2488d9ae7f2bSJakub Kicinski }
2489d9ae7f2bSJakub Kicinski 
2490d9ae7f2bSJakub Kicinski static int data_ld2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2491d9ae7f2bSJakub Kicinski {
2492d9ae7f2bSJakub Kicinski 	return construct_data_ld(nfp_prog, meta->insn.imm, 2);
2493d9ae7f2bSJakub Kicinski }
2494d9ae7f2bSJakub Kicinski 
2495d9ae7f2bSJakub Kicinski static int data_ld4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2496d9ae7f2bSJakub Kicinski {
2497d9ae7f2bSJakub Kicinski 	return construct_data_ld(nfp_prog, meta->insn.imm, 4);
2498d9ae7f2bSJakub Kicinski }
2499d9ae7f2bSJakub Kicinski 
2500d9ae7f2bSJakub Kicinski static int data_ind_ld1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2501d9ae7f2bSJakub Kicinski {
2502d9ae7f2bSJakub Kicinski 	return construct_data_ind_ld(nfp_prog, meta->insn.imm,
25030a793977SJakub Kicinski 				     meta->insn.src_reg * 2, 1);
2504d9ae7f2bSJakub Kicinski }
2505d9ae7f2bSJakub Kicinski 
2506d9ae7f2bSJakub Kicinski static int data_ind_ld2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2507d9ae7f2bSJakub Kicinski {
2508d9ae7f2bSJakub Kicinski 	return construct_data_ind_ld(nfp_prog, meta->insn.imm,
25090a793977SJakub Kicinski 				     meta->insn.src_reg * 2, 2);
2510d9ae7f2bSJakub Kicinski }
2511d9ae7f2bSJakub Kicinski 
2512d9ae7f2bSJakub Kicinski static int data_ind_ld4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2513d9ae7f2bSJakub Kicinski {
2514d9ae7f2bSJakub Kicinski 	return construct_data_ind_ld(nfp_prog, meta->insn.imm,
25150a793977SJakub Kicinski 				     meta->insn.src_reg * 2, 4);
2516d9ae7f2bSJakub Kicinski }
2517d9ae7f2bSJakub Kicinski 
2518a82b23fbSJakub Kicinski static int
2519a82b23fbSJakub Kicinski mem_ldx_stack(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2520d3488480SJakub Kicinski 	      unsigned int size, unsigned int ptr_off)
2521a82b23fbSJakub Kicinski {
2522d3488480SJakub Kicinski 	return mem_op_stack(nfp_prog, meta, size, ptr_off,
2523b14157eeSJakub Kicinski 			    meta->insn.dst_reg * 2, meta->insn.src_reg * 2,
2524b14157eeSJakub Kicinski 			    true, wrp_lmem_load);
2525a82b23fbSJakub Kicinski }
2526a82b23fbSJakub Kicinski 
2527943c57b9SJakub Kicinski static int mem_ldx_skb(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2528943c57b9SJakub Kicinski 		       u8 size)
2529d9ae7f2bSJakub Kicinski {
2530bfddbc8aSJakub Kicinski 	swreg dst = reg_both(meta->insn.dst_reg * 2);
2531bfddbc8aSJakub Kicinski 
2532943c57b9SJakub Kicinski 	switch (meta->insn.off) {
2533c6c580d7SJakub Kicinski 	case offsetof(struct __sk_buff, len):
2534c6c580d7SJakub Kicinski 		if (size != FIELD_SIZEOF(struct __sk_buff, len))
2535943c57b9SJakub Kicinski 			return -EOPNOTSUPP;
2536bfddbc8aSJakub Kicinski 		wrp_mov(nfp_prog, dst, plen_reg(nfp_prog));
2537bfddbc8aSJakub Kicinski 		break;
2538c6c580d7SJakub Kicinski 	case offsetof(struct __sk_buff, data):
2539c6c580d7SJakub Kicinski 		if (size != FIELD_SIZEOF(struct __sk_buff, data))
2540bfddbc8aSJakub Kicinski 			return -EOPNOTSUPP;
2541bfddbc8aSJakub Kicinski 		wrp_mov(nfp_prog, dst, pptr_reg(nfp_prog));
2542bfddbc8aSJakub Kicinski 		break;
2543c6c580d7SJakub Kicinski 	case offsetof(struct __sk_buff, data_end):
2544c6c580d7SJakub Kicinski 		if (size != FIELD_SIZEOF(struct __sk_buff, data_end))
2545bfddbc8aSJakub Kicinski 			return -EOPNOTSUPP;
2546bfddbc8aSJakub Kicinski 		emit_alu(nfp_prog, dst,
2547bfddbc8aSJakub Kicinski 			 plen_reg(nfp_prog), ALU_OP_ADD, pptr_reg(nfp_prog));
2548943c57b9SJakub Kicinski 		break;
2549943c57b9SJakub Kicinski 	default:
2550d9ae7f2bSJakub Kicinski 		return -EOPNOTSUPP;
2551943c57b9SJakub Kicinski 	}
2552943c57b9SJakub Kicinski 
2553943c57b9SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
2554d9ae7f2bSJakub Kicinski 
2555d9ae7f2bSJakub Kicinski 	return 0;
2556d9ae7f2bSJakub Kicinski }
2557d9ae7f2bSJakub Kicinski 
2558943c57b9SJakub Kicinski static int mem_ldx_xdp(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2559943c57b9SJakub Kicinski 		       u8 size)
2560d9ae7f2bSJakub Kicinski {
2561b3f868dfSJakub Kicinski 	swreg dst = reg_both(meta->insn.dst_reg * 2);
2562d9ae7f2bSJakub Kicinski 
2563943c57b9SJakub Kicinski 	switch (meta->insn.off) {
2564c6c580d7SJakub Kicinski 	case offsetof(struct xdp_md, data):
2565c6c580d7SJakub Kicinski 		if (size != FIELD_SIZEOF(struct xdp_md, data))
2566c6c580d7SJakub Kicinski 			return -EOPNOTSUPP;
2567c000dfb5SJakub Kicinski 		wrp_mov(nfp_prog, dst, pptr_reg(nfp_prog));
2568943c57b9SJakub Kicinski 		break;
2569c6c580d7SJakub Kicinski 	case offsetof(struct xdp_md, data_end):
2570c6c580d7SJakub Kicinski 		if (size != FIELD_SIZEOF(struct xdp_md, data_end))
2571c6c580d7SJakub Kicinski 			return -EOPNOTSUPP;
2572943c57b9SJakub Kicinski 		emit_alu(nfp_prog, dst,
2573943c57b9SJakub Kicinski 			 plen_reg(nfp_prog), ALU_OP_ADD, pptr_reg(nfp_prog));
2574943c57b9SJakub Kicinski 		break;
2575943c57b9SJakub Kicinski 	default:
2576943c57b9SJakub Kicinski 		return -EOPNOTSUPP;
2577943c57b9SJakub Kicinski 	}
2578d9ae7f2bSJakub Kicinski 
2579943c57b9SJakub Kicinski 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
2580d9ae7f2bSJakub Kicinski 
2581d9ae7f2bSJakub Kicinski 	return 0;
2582d9ae7f2bSJakub Kicinski }
2583d9ae7f2bSJakub Kicinski 
25842ca71441SJakub Kicinski static int
25852ca71441SJakub Kicinski mem_ldx_data(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
25862ca71441SJakub Kicinski 	     unsigned int size)
25872ca71441SJakub Kicinski {
25882ca71441SJakub Kicinski 	swreg tmp_reg;
25892ca71441SJakub Kicinski 
25902ca71441SJakub Kicinski 	tmp_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
25912ca71441SJakub Kicinski 
25923dd43c33SJakub Kicinski 	return data_ld_host_order_addr32(nfp_prog, meta->insn.src_reg * 2,
25933dd43c33SJakub Kicinski 					 tmp_reg, meta->insn.dst_reg * 2, size);
25943dd43c33SJakub Kicinski }
25953dd43c33SJakub Kicinski 
25963dd43c33SJakub Kicinski static int
25973dd43c33SJakub Kicinski mem_ldx_emem(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
25983dd43c33SJakub Kicinski 	     unsigned int size)
25993dd43c33SJakub Kicinski {
26003dd43c33SJakub Kicinski 	swreg tmp_reg;
26013dd43c33SJakub Kicinski 
26023dd43c33SJakub Kicinski 	tmp_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
26033dd43c33SJakub Kicinski 
26043dd43c33SJakub Kicinski 	return data_ld_host_order_addr40(nfp_prog, meta->insn.src_reg * 2,
26053dd43c33SJakub Kicinski 					 tmp_reg, meta->insn.dst_reg * 2, size);
26062ca71441SJakub Kicinski }
26072ca71441SJakub Kicinski 
2608be759237SJiong Wang static void
2609be759237SJiong Wang mem_ldx_data_init_pktcache(struct nfp_prog *nfp_prog,
2610be759237SJiong Wang 			   struct nfp_insn_meta *meta)
2611be759237SJiong Wang {
2612be759237SJiong Wang 	s16 range_start = meta->pkt_cache.range_start;
2613be759237SJiong Wang 	s16 range_end = meta->pkt_cache.range_end;
2614be759237SJiong Wang 	swreg src_base, off;
2615be759237SJiong Wang 	u8 xfer_num, len;
2616be759237SJiong Wang 	bool indir;
2617be759237SJiong Wang 
2618be759237SJiong Wang 	off = re_load_imm_any(nfp_prog, range_start, imm_b(nfp_prog));
2619be759237SJiong Wang 	src_base = reg_a(meta->insn.src_reg * 2);
2620be759237SJiong Wang 	len = range_end - range_start;
2621be759237SJiong Wang 	xfer_num = round_up(len, REG_WIDTH) / REG_WIDTH;
2622be759237SJiong Wang 
2623be759237SJiong Wang 	indir = len > 8 * REG_WIDTH;
2624be759237SJiong Wang 	/* Setup PREV_ALU for indirect mode. */
2625be759237SJiong Wang 	if (indir)
2626be759237SJiong Wang 		wrp_immed(nfp_prog, reg_none(),
2627be759237SJiong Wang 			  CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, xfer_num - 1));
2628be759237SJiong Wang 
2629be759237SJiong Wang 	/* Cache memory into transfer-in registers. */
2630be759237SJiong Wang 	emit_cmd_any(nfp_prog, CMD_TGT_READ32_SWAP, CMD_MODE_32b, 0, src_base,
2631b556ddd9SJakub Kicinski 		     off, xfer_num - 1, CMD_CTX_SWAP, indir);
2632be759237SJiong Wang }
2633be759237SJiong Wang 
2634be759237SJiong Wang static int
263591ff69e8SJiong Wang mem_ldx_data_from_pktcache_unaligned(struct nfp_prog *nfp_prog,
263691ff69e8SJiong Wang 				     struct nfp_insn_meta *meta,
263791ff69e8SJiong Wang 				     unsigned int size)
263891ff69e8SJiong Wang {
263991ff69e8SJiong Wang 	s16 range_start = meta->pkt_cache.range_start;
264091ff69e8SJiong Wang 	s16 insn_off = meta->insn.off - range_start;
264191ff69e8SJiong Wang 	swreg dst_lo, dst_hi, src_lo, src_mid;
264291ff69e8SJiong Wang 	u8 dst_gpr = meta->insn.dst_reg * 2;
264391ff69e8SJiong Wang 	u8 len_lo = size, len_mid = 0;
264491ff69e8SJiong Wang 	u8 idx = insn_off / REG_WIDTH;
264591ff69e8SJiong Wang 	u8 off = insn_off % REG_WIDTH;
264691ff69e8SJiong Wang 
264791ff69e8SJiong Wang 	dst_hi = reg_both(dst_gpr + 1);
264891ff69e8SJiong Wang 	dst_lo = reg_both(dst_gpr);
264991ff69e8SJiong Wang 	src_lo = reg_xfer(idx);
265091ff69e8SJiong Wang 
265191ff69e8SJiong Wang 	/* The read length could involve as many as three registers. */
265291ff69e8SJiong Wang 	if (size > REG_WIDTH - off) {
265391ff69e8SJiong Wang 		/* Calculate the part in the second register. */
265491ff69e8SJiong Wang 		len_lo = REG_WIDTH - off;
265591ff69e8SJiong Wang 		len_mid = size - len_lo;
265691ff69e8SJiong Wang 
265791ff69e8SJiong Wang 		/* Calculate the part in the third register. */
265891ff69e8SJiong Wang 		if (size > 2 * REG_WIDTH - off)
265991ff69e8SJiong Wang 			len_mid = REG_WIDTH;
266091ff69e8SJiong Wang 	}
266191ff69e8SJiong Wang 
266291ff69e8SJiong Wang 	wrp_reg_subpart(nfp_prog, dst_lo, src_lo, len_lo, off);
266391ff69e8SJiong Wang 
266491ff69e8SJiong Wang 	if (!len_mid) {
266591ff69e8SJiong Wang 		wrp_immed(nfp_prog, dst_hi, 0);
266691ff69e8SJiong Wang 		return 0;
266791ff69e8SJiong Wang 	}
266891ff69e8SJiong Wang 
266991ff69e8SJiong Wang 	src_mid = reg_xfer(idx + 1);
267091ff69e8SJiong Wang 
267191ff69e8SJiong Wang 	if (size <= REG_WIDTH) {
267291ff69e8SJiong Wang 		wrp_reg_or_subpart(nfp_prog, dst_lo, src_mid, len_mid, len_lo);
267391ff69e8SJiong Wang 		wrp_immed(nfp_prog, dst_hi, 0);
267491ff69e8SJiong Wang 	} else {
267591ff69e8SJiong Wang 		swreg src_hi = reg_xfer(idx + 2);
267691ff69e8SJiong Wang 
267791ff69e8SJiong Wang 		wrp_reg_or_subpart(nfp_prog, dst_lo, src_mid,
267891ff69e8SJiong Wang 				   REG_WIDTH - len_lo, len_lo);
267991ff69e8SJiong Wang 		wrp_reg_subpart(nfp_prog, dst_hi, src_mid, len_lo,
268091ff69e8SJiong Wang 				REG_WIDTH - len_lo);
268191ff69e8SJiong Wang 		wrp_reg_or_subpart(nfp_prog, dst_hi, src_hi, REG_WIDTH - len_lo,
268291ff69e8SJiong Wang 				   len_lo);
268391ff69e8SJiong Wang 	}
268491ff69e8SJiong Wang 
268591ff69e8SJiong Wang 	return 0;
268691ff69e8SJiong Wang }
268791ff69e8SJiong Wang 
268891ff69e8SJiong Wang static int
2689be759237SJiong Wang mem_ldx_data_from_pktcache_aligned(struct nfp_prog *nfp_prog,
2690be759237SJiong Wang 				   struct nfp_insn_meta *meta,
2691be759237SJiong Wang 				   unsigned int size)
2692be759237SJiong Wang {
2693be759237SJiong Wang 	swreg dst_lo, dst_hi, src_lo;
2694be759237SJiong Wang 	u8 dst_gpr, idx;
2695be759237SJiong Wang 
2696be759237SJiong Wang 	idx = (meta->insn.off - meta->pkt_cache.range_start) / REG_WIDTH;
2697be759237SJiong Wang 	dst_gpr = meta->insn.dst_reg * 2;
2698be759237SJiong Wang 	dst_hi = reg_both(dst_gpr + 1);
2699be759237SJiong Wang 	dst_lo = reg_both(dst_gpr);
2700be759237SJiong Wang 	src_lo = reg_xfer(idx);
2701be759237SJiong Wang 
2702be759237SJiong Wang 	if (size < REG_WIDTH) {
2703be759237SJiong Wang 		wrp_reg_subpart(nfp_prog, dst_lo, src_lo, size, 0);
2704be759237SJiong Wang 		wrp_immed(nfp_prog, dst_hi, 0);
2705be759237SJiong Wang 	} else if (size == REG_WIDTH) {
2706be759237SJiong Wang 		wrp_mov(nfp_prog, dst_lo, src_lo);
2707be759237SJiong Wang 		wrp_immed(nfp_prog, dst_hi, 0);
2708be759237SJiong Wang 	} else {
2709be759237SJiong Wang 		swreg src_hi = reg_xfer(idx + 1);
2710be759237SJiong Wang 
2711be759237SJiong Wang 		wrp_mov(nfp_prog, dst_lo, src_lo);
2712be759237SJiong Wang 		wrp_mov(nfp_prog, dst_hi, src_hi);
2713be759237SJiong Wang 	}
2714be759237SJiong Wang 
2715be759237SJiong Wang 	return 0;
2716be759237SJiong Wang }
2717be759237SJiong Wang 
2718be759237SJiong Wang static int
2719be759237SJiong Wang mem_ldx_data_from_pktcache(struct nfp_prog *nfp_prog,
2720be759237SJiong Wang 			   struct nfp_insn_meta *meta, unsigned int size)
2721be759237SJiong Wang {
2722be759237SJiong Wang 	u8 off = meta->insn.off - meta->pkt_cache.range_start;
2723be759237SJiong Wang 
272491ff69e8SJiong Wang 	if (IS_ALIGNED(off, REG_WIDTH))
2725be759237SJiong Wang 		return mem_ldx_data_from_pktcache_aligned(nfp_prog, meta, size);
272691ff69e8SJiong Wang 
272791ff69e8SJiong Wang 	return mem_ldx_data_from_pktcache_unaligned(nfp_prog, meta, size);
2728be759237SJiong Wang }
2729be759237SJiong Wang 
27302ca71441SJakub Kicinski static int
27312ca71441SJakub Kicinski mem_ldx(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
27322ca71441SJakub Kicinski 	unsigned int size)
27332ca71441SJakub Kicinski {
27349879a381SJiong Wang 	if (meta->ldst_gather_len)
27359879a381SJiong Wang 		return nfp_cpp_memcpy(nfp_prog, meta);
27369879a381SJiong Wang 
27372ca71441SJakub Kicinski 	if (meta->ptr.type == PTR_TO_CTX) {
2738012bb8a8SJakub Kicinski 		if (nfp_prog->type == BPF_PROG_TYPE_XDP)
27392ca71441SJakub Kicinski 			return mem_ldx_xdp(nfp_prog, meta, size);
27402ca71441SJakub Kicinski 		else
27412ca71441SJakub Kicinski 			return mem_ldx_skb(nfp_prog, meta, size);
27422ca71441SJakub Kicinski 	}
27432ca71441SJakub Kicinski 
2744be759237SJiong Wang 	if (meta->ptr.type == PTR_TO_PACKET) {
2745be759237SJiong Wang 		if (meta->pkt_cache.range_end) {
2746be759237SJiong Wang 			if (meta->pkt_cache.do_init)
2747be759237SJiong Wang 				mem_ldx_data_init_pktcache(nfp_prog, meta);
2748be759237SJiong Wang 
2749be759237SJiong Wang 			return mem_ldx_data_from_pktcache(nfp_prog, meta, size);
2750be759237SJiong Wang 		} else {
27512ca71441SJakub Kicinski 			return mem_ldx_data(nfp_prog, meta, size);
2752be759237SJiong Wang 		}
2753be759237SJiong Wang 	}
27542ca71441SJakub Kicinski 
2755a82b23fbSJakub Kicinski 	if (meta->ptr.type == PTR_TO_STACK)
2756d3488480SJakub Kicinski 		return mem_ldx_stack(nfp_prog, meta, size,
2757d3488480SJakub Kicinski 				     meta->ptr.off + meta->ptr.var_off.value);
2758a82b23fbSJakub Kicinski 
27593dd43c33SJakub Kicinski 	if (meta->ptr.type == PTR_TO_MAP_VALUE)
27603dd43c33SJakub Kicinski 		return mem_ldx_emem(nfp_prog, meta, size);
27613dd43c33SJakub Kicinski 
27622ca71441SJakub Kicinski 	return -EOPNOTSUPP;
27632ca71441SJakub Kicinski }
27642ca71441SJakub Kicinski 
27652ca71441SJakub Kicinski static int mem_ldx1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
27662ca71441SJakub Kicinski {
27672ca71441SJakub Kicinski 	return mem_ldx(nfp_prog, meta, 1);
27682ca71441SJakub Kicinski }
27692ca71441SJakub Kicinski 
27702ca71441SJakub Kicinski static int mem_ldx2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
27712ca71441SJakub Kicinski {
27722ca71441SJakub Kicinski 	return mem_ldx(nfp_prog, meta, 2);
27732ca71441SJakub Kicinski }
27742ca71441SJakub Kicinski 
2775d9ae7f2bSJakub Kicinski static int mem_ldx4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2776d9ae7f2bSJakub Kicinski {
27772ca71441SJakub Kicinski 	return mem_ldx(nfp_prog, meta, 4);
27782ca71441SJakub Kicinski }
27792ca71441SJakub Kicinski 
27802ca71441SJakub Kicinski static int mem_ldx8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
27812ca71441SJakub Kicinski {
27822ca71441SJakub Kicinski 	return mem_ldx(nfp_prog, meta, 8);
2783d9ae7f2bSJakub Kicinski }
2784d9ae7f2bSJakub Kicinski 
2785e663fe38SJakub Kicinski static int
2786e663fe38SJakub Kicinski mem_st_data(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2787e663fe38SJakub Kicinski 	    unsigned int size)
2788d9ae7f2bSJakub Kicinski {
2789e663fe38SJakub Kicinski 	u64 imm = meta->insn.imm; /* sign extend */
2790e663fe38SJakub Kicinski 	swreg off_reg;
2791e663fe38SJakub Kicinski 
2792e663fe38SJakub Kicinski 	off_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
2793e663fe38SJakub Kicinski 
2794e663fe38SJakub Kicinski 	return data_st_host_order(nfp_prog, meta->insn.dst_reg * 2, off_reg,
2795e663fe38SJakub Kicinski 				  imm, size);
2796e663fe38SJakub Kicinski }
2797e663fe38SJakub Kicinski 
2798e663fe38SJakub Kicinski static int mem_st(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2799e663fe38SJakub Kicinski 		  unsigned int size)
2800e663fe38SJakub Kicinski {
2801e663fe38SJakub Kicinski 	if (meta->ptr.type == PTR_TO_PACKET)
2802e663fe38SJakub Kicinski 		return mem_st_data(nfp_prog, meta, size);
2803e663fe38SJakub Kicinski 
2804d9ae7f2bSJakub Kicinski 	return -EOPNOTSUPP;
2805d9ae7f2bSJakub Kicinski }
2806d9ae7f2bSJakub Kicinski 
2807e663fe38SJakub Kicinski static int mem_st1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2808d9ae7f2bSJakub Kicinski {
2809e663fe38SJakub Kicinski 	return mem_st(nfp_prog, meta, 1);
2810e663fe38SJakub Kicinski }
2811e663fe38SJakub Kicinski 
2812e663fe38SJakub Kicinski static int mem_st2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2813e663fe38SJakub Kicinski {
2814e663fe38SJakub Kicinski 	return mem_st(nfp_prog, meta, 2);
2815e663fe38SJakub Kicinski }
2816e663fe38SJakub Kicinski 
2817e663fe38SJakub Kicinski static int mem_st4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2818e663fe38SJakub Kicinski {
2819e663fe38SJakub Kicinski 	return mem_st(nfp_prog, meta, 4);
2820e663fe38SJakub Kicinski }
2821e663fe38SJakub Kicinski 
2822e663fe38SJakub Kicinski static int mem_st8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2823e663fe38SJakub Kicinski {
2824e663fe38SJakub Kicinski 	return mem_st(nfp_prog, meta, 8);
2825e663fe38SJakub Kicinski }
2826e663fe38SJakub Kicinski 
2827e663fe38SJakub Kicinski static int
2828e663fe38SJakub Kicinski mem_stx_data(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2829e663fe38SJakub Kicinski 	     unsigned int size)
2830e663fe38SJakub Kicinski {
2831e663fe38SJakub Kicinski 	swreg off_reg;
2832e663fe38SJakub Kicinski 
2833e663fe38SJakub Kicinski 	off_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
2834e663fe38SJakub Kicinski 
2835e663fe38SJakub Kicinski 	return data_stx_host_order(nfp_prog, meta->insn.dst_reg * 2, off_reg,
2836e663fe38SJakub Kicinski 				   meta->insn.src_reg * 2, size);
2837e663fe38SJakub Kicinski }
2838e663fe38SJakub Kicinski 
2839e663fe38SJakub Kicinski static int
2840ee9133a8SJakub Kicinski mem_stx_stack(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2841d3488480SJakub Kicinski 	      unsigned int size, unsigned int ptr_off)
2842ee9133a8SJakub Kicinski {
2843d3488480SJakub Kicinski 	return mem_op_stack(nfp_prog, meta, size, ptr_off,
2844b14157eeSJakub Kicinski 			    meta->insn.src_reg * 2, meta->insn.dst_reg * 2,
2845b14157eeSJakub Kicinski 			    false, wrp_lmem_store);
2846ee9133a8SJakub Kicinski }
2847ee9133a8SJakub Kicinski 
2848d985888fSJakub Kicinski static int mem_stx_xdp(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2849d985888fSJakub Kicinski {
2850d985888fSJakub Kicinski 	switch (meta->insn.off) {
2851d985888fSJakub Kicinski 	case offsetof(struct xdp_md, rx_queue_index):
2852d985888fSJakub Kicinski 		return nfp_queue_select(nfp_prog, meta);
2853d985888fSJakub Kicinski 	}
2854d985888fSJakub Kicinski 
2855d985888fSJakub Kicinski 	WARN_ON_ONCE(1); /* verifier should have rejected bad accesses */
2856d985888fSJakub Kicinski 	return -EOPNOTSUPP;
2857d985888fSJakub Kicinski }
2858d985888fSJakub Kicinski 
2859ee9133a8SJakub Kicinski static int
2860e663fe38SJakub Kicinski mem_stx(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
2861e663fe38SJakub Kicinski 	unsigned int size)
2862e663fe38SJakub Kicinski {
2863e663fe38SJakub Kicinski 	if (meta->ptr.type == PTR_TO_PACKET)
2864e663fe38SJakub Kicinski 		return mem_stx_data(nfp_prog, meta, size);
2865e663fe38SJakub Kicinski 
2866ee9133a8SJakub Kicinski 	if (meta->ptr.type == PTR_TO_STACK)
2867d3488480SJakub Kicinski 		return mem_stx_stack(nfp_prog, meta, size,
2868d3488480SJakub Kicinski 				     meta->ptr.off + meta->ptr.var_off.value);
2869ee9133a8SJakub Kicinski 
2870d9ae7f2bSJakub Kicinski 	return -EOPNOTSUPP;
2871d9ae7f2bSJakub Kicinski }
2872d9ae7f2bSJakub Kicinski 
2873e663fe38SJakub Kicinski static int mem_stx1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2874e663fe38SJakub Kicinski {
2875e663fe38SJakub Kicinski 	return mem_stx(nfp_prog, meta, 1);
2876e663fe38SJakub Kicinski }
2877e663fe38SJakub Kicinski 
2878e663fe38SJakub Kicinski static int mem_stx2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2879e663fe38SJakub Kicinski {
2880e663fe38SJakub Kicinski 	return mem_stx(nfp_prog, meta, 2);
2881e663fe38SJakub Kicinski }
2882e663fe38SJakub Kicinski 
2883d9ae7f2bSJakub Kicinski static int mem_stx4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2884d9ae7f2bSJakub Kicinski {
2885d985888fSJakub Kicinski 	if (meta->ptr.type == PTR_TO_CTX)
2886d985888fSJakub Kicinski 		if (nfp_prog->type == BPF_PROG_TYPE_XDP)
2887d985888fSJakub Kicinski 			return mem_stx_xdp(nfp_prog, meta);
2888e663fe38SJakub Kicinski 	return mem_stx(nfp_prog, meta, 4);
2889e663fe38SJakub Kicinski }
28902ca71441SJakub Kicinski 
2891e663fe38SJakub Kicinski static int mem_stx8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2892e663fe38SJakub Kicinski {
2893e663fe38SJakub Kicinski 	return mem_stx(nfp_prog, meta, 8);
2894d9ae7f2bSJakub Kicinski }
2895d9ae7f2bSJakub Kicinski 
2896dcb0c27fSJakub Kicinski static int
2897dcb0c27fSJakub Kicinski mem_xadd(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, bool is64)
2898dcb0c27fSJakub Kicinski {
2899dcb0c27fSJakub Kicinski 	u8 dst_gpr = meta->insn.dst_reg * 2;
2900dcb0c27fSJakub Kicinski 	u8 src_gpr = meta->insn.src_reg * 2;
290141aed09cSJakub Kicinski 	unsigned int full_add, out;
290241aed09cSJakub Kicinski 	swreg addra, addrb, off;
2903dcb0c27fSJakub Kicinski 
2904dcb0c27fSJakub Kicinski 	off = ur_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
2905dcb0c27fSJakub Kicinski 
290641aed09cSJakub Kicinski 	/* We can fit 16 bits into command immediate, if we know the immediate
290741aed09cSJakub Kicinski 	 * is guaranteed to either always or never fit into 16 bit we only
290841aed09cSJakub Kicinski 	 * generate code to handle that particular case, otherwise generate
290941aed09cSJakub Kicinski 	 * code for both.
291041aed09cSJakub Kicinski 	 */
291141aed09cSJakub Kicinski 	out = nfp_prog_current_offset(nfp_prog);
291241aed09cSJakub Kicinski 	full_add = nfp_prog_current_offset(nfp_prog);
291341aed09cSJakub Kicinski 
291441aed09cSJakub Kicinski 	if (meta->insn.off) {
291541aed09cSJakub Kicinski 		out += 2;
291641aed09cSJakub Kicinski 		full_add += 2;
291741aed09cSJakub Kicinski 	}
291841aed09cSJakub Kicinski 	if (meta->xadd_maybe_16bit) {
291941aed09cSJakub Kicinski 		out += 3;
292041aed09cSJakub Kicinski 		full_add += 3;
292141aed09cSJakub Kicinski 	}
292241aed09cSJakub Kicinski 	if (meta->xadd_over_16bit)
292341aed09cSJakub Kicinski 		out += 2 + is64;
292441aed09cSJakub Kicinski 	if (meta->xadd_maybe_16bit && meta->xadd_over_16bit) {
292541aed09cSJakub Kicinski 		out += 5;
292641aed09cSJakub Kicinski 		full_add += 5;
292741aed09cSJakub Kicinski 	}
292841aed09cSJakub Kicinski 
292941aed09cSJakub Kicinski 	/* Generate the branch for choosing add_imm vs add */
293041aed09cSJakub Kicinski 	if (meta->xadd_maybe_16bit && meta->xadd_over_16bit) {
293141aed09cSJakub Kicinski 		swreg max_imm = imm_a(nfp_prog);
293241aed09cSJakub Kicinski 
293341aed09cSJakub Kicinski 		wrp_immed(nfp_prog, max_imm, 0xffff);
293441aed09cSJakub Kicinski 		emit_alu(nfp_prog, reg_none(),
293541aed09cSJakub Kicinski 			 max_imm, ALU_OP_SUB, reg_b(src_gpr));
293641aed09cSJakub Kicinski 		emit_alu(nfp_prog, reg_none(),
293741aed09cSJakub Kicinski 			 reg_imm(0), ALU_OP_SUB_C, reg_b(src_gpr + 1));
293841aed09cSJakub Kicinski 		emit_br(nfp_prog, BR_BLO, full_add, meta->insn.off ? 2 : 0);
293941aed09cSJakub Kicinski 		/* defer for add */
294041aed09cSJakub Kicinski 	}
294141aed09cSJakub Kicinski 
2942dcb0c27fSJakub Kicinski 	/* If insn has an offset add to the address */
2943dcb0c27fSJakub Kicinski 	if (!meta->insn.off) {
2944dcb0c27fSJakub Kicinski 		addra = reg_a(dst_gpr);
2945dcb0c27fSJakub Kicinski 		addrb = reg_b(dst_gpr + 1);
2946dcb0c27fSJakub Kicinski 	} else {
2947dcb0c27fSJakub Kicinski 		emit_alu(nfp_prog, imma_a(nfp_prog),
2948dcb0c27fSJakub Kicinski 			 reg_a(dst_gpr), ALU_OP_ADD, off);
2949dcb0c27fSJakub Kicinski 		emit_alu(nfp_prog, imma_b(nfp_prog),
2950dcb0c27fSJakub Kicinski 			 reg_a(dst_gpr + 1), ALU_OP_ADD_C, reg_imm(0));
2951dcb0c27fSJakub Kicinski 		addra = imma_a(nfp_prog);
2952dcb0c27fSJakub Kicinski 		addrb = imma_b(nfp_prog);
2953dcb0c27fSJakub Kicinski 	}
2954dcb0c27fSJakub Kicinski 
295541aed09cSJakub Kicinski 	/* Generate the add_imm if 16 bits are possible */
295641aed09cSJakub Kicinski 	if (meta->xadd_maybe_16bit) {
295741aed09cSJakub Kicinski 		swreg prev_alu = imm_a(nfp_prog);
295841aed09cSJakub Kicinski 
2959dcb0c27fSJakub Kicinski 		wrp_immed(nfp_prog, prev_alu,
2960dcb0c27fSJakub Kicinski 			  FIELD_PREP(CMD_OVE_DATA, 2) |
2961dcb0c27fSJakub Kicinski 			  CMD_OVE_LEN |
2962dcb0c27fSJakub Kicinski 			  FIELD_PREP(CMD_OV_LEN, 0x8 | is64 << 2));
2963dcb0c27fSJakub Kicinski 		wrp_reg_or_subpart(nfp_prog, prev_alu, reg_b(src_gpr), 2, 2);
2964dcb0c27fSJakub Kicinski 		emit_cmd_indir(nfp_prog, CMD_TGT_ADD_IMM, CMD_MODE_40b_BA, 0,
2965b556ddd9SJakub Kicinski 			       addra, addrb, 0, CMD_CTX_NO_SWAP);
2966dcb0c27fSJakub Kicinski 
296741aed09cSJakub Kicinski 		if (meta->xadd_over_16bit)
296841aed09cSJakub Kicinski 			emit_br(nfp_prog, BR_UNC, out, 0);
296941aed09cSJakub Kicinski 	}
297041aed09cSJakub Kicinski 
297141aed09cSJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, full_add))
297241aed09cSJakub Kicinski 		return -EINVAL;
297341aed09cSJakub Kicinski 
297441aed09cSJakub Kicinski 	/* Generate the add if 16 bits are not guaranteed */
297541aed09cSJakub Kicinski 	if (meta->xadd_over_16bit) {
297641aed09cSJakub Kicinski 		emit_cmd(nfp_prog, CMD_TGT_ADD, CMD_MODE_40b_BA, 0,
297741aed09cSJakub Kicinski 			 addra, addrb, is64 << 2,
297841aed09cSJakub Kicinski 			 is64 ? CMD_CTX_SWAP_DEFER2 : CMD_CTX_SWAP_DEFER1);
297941aed09cSJakub Kicinski 
298041aed09cSJakub Kicinski 		wrp_mov(nfp_prog, reg_xfer(0), reg_a(src_gpr));
298141aed09cSJakub Kicinski 		if (is64)
298241aed09cSJakub Kicinski 			wrp_mov(nfp_prog, reg_xfer(1), reg_a(src_gpr + 1));
298341aed09cSJakub Kicinski 	}
298441aed09cSJakub Kicinski 
298541aed09cSJakub Kicinski 	if (!nfp_prog_confirm_current_offset(nfp_prog, out))
298641aed09cSJakub Kicinski 		return -EINVAL;
298741aed09cSJakub Kicinski 
2988dcb0c27fSJakub Kicinski 	return 0;
2989dcb0c27fSJakub Kicinski }
2990dcb0c27fSJakub Kicinski 
2991dcb0c27fSJakub Kicinski static int mem_xadd4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2992dcb0c27fSJakub Kicinski {
2993dcb0c27fSJakub Kicinski 	return mem_xadd(nfp_prog, meta, false);
2994dcb0c27fSJakub Kicinski }
2995dcb0c27fSJakub Kicinski 
2996dcb0c27fSJakub Kicinski static int mem_xadd8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
2997dcb0c27fSJakub Kicinski {
2998dcb0c27fSJakub Kicinski 	return mem_xadd(nfp_prog, meta, true);
2999dcb0c27fSJakub Kicinski }
3000dcb0c27fSJakub Kicinski 
3001d9ae7f2bSJakub Kicinski static int jump(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3002d9ae7f2bSJakub Kicinski {
3003d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, BR_UNC, meta->insn.off, 0);
3004d9ae7f2bSJakub Kicinski 
3005d9ae7f2bSJakub Kicinski 	return 0;
3006d9ae7f2bSJakub Kicinski }
3007d9ae7f2bSJakub Kicinski 
3008d9ae7f2bSJakub Kicinski static int jeq_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3009d9ae7f2bSJakub Kicinski {
3010d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
3011d9ae7f2bSJakub Kicinski 	u64 imm = insn->imm; /* sign extend */
3012b3f868dfSJakub Kicinski 	swreg or1, or2, tmp_reg;
3013b3f868dfSJakub Kicinski 
3014b3f868dfSJakub Kicinski 	or1 = reg_a(insn->dst_reg * 2);
3015b3f868dfSJakub Kicinski 	or2 = reg_b(insn->dst_reg * 2 + 1);
3016d9ae7f2bSJakub Kicinski 
3017d9ae7f2bSJakub Kicinski 	if (imm & ~0U) {
3018d9ae7f2bSJakub Kicinski 		tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
3019d9ae7f2bSJakub Kicinski 		emit_alu(nfp_prog, imm_a(nfp_prog),
3020d9ae7f2bSJakub Kicinski 			 reg_a(insn->dst_reg * 2), ALU_OP_XOR, tmp_reg);
3021d9ae7f2bSJakub Kicinski 		or1 = imm_a(nfp_prog);
3022d9ae7f2bSJakub Kicinski 	}
3023d9ae7f2bSJakub Kicinski 
3024d9ae7f2bSJakub Kicinski 	if (imm >> 32) {
3025d9ae7f2bSJakub Kicinski 		tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
3026d9ae7f2bSJakub Kicinski 		emit_alu(nfp_prog, imm_b(nfp_prog),
3027d9ae7f2bSJakub Kicinski 			 reg_a(insn->dst_reg * 2 + 1), ALU_OP_XOR, tmp_reg);
3028d9ae7f2bSJakub Kicinski 		or2 = imm_b(nfp_prog);
3029d9ae7f2bSJakub Kicinski 	}
3030d9ae7f2bSJakub Kicinski 
3031d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), or1, ALU_OP_OR, or2);
3032d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, BR_BEQ, insn->off, 0);
3033d9ae7f2bSJakub Kicinski 
3034d9ae7f2bSJakub Kicinski 	return 0;
3035d9ae7f2bSJakub Kicinski }
3036d9ae7f2bSJakub Kicinski 
3037d9ae7f2bSJakub Kicinski static int jset_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3038d9ae7f2bSJakub Kicinski {
3039d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
3040d9ae7f2bSJakub Kicinski 	u64 imm = insn->imm; /* sign extend */
3041b3f868dfSJakub Kicinski 	swreg tmp_reg;
3042d9ae7f2bSJakub Kicinski 
3043d9ae7f2bSJakub Kicinski 	if (!imm) {
3044d9ae7f2bSJakub Kicinski 		meta->skip = true;
3045d9ae7f2bSJakub Kicinski 		return 0;
3046d9ae7f2bSJakub Kicinski 	}
3047d9ae7f2bSJakub Kicinski 
3048d9ae7f2bSJakub Kicinski 	if (imm & ~0U) {
3049d9ae7f2bSJakub Kicinski 		tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
3050d9ae7f2bSJakub Kicinski 		emit_alu(nfp_prog, reg_none(),
3051d9ae7f2bSJakub Kicinski 			 reg_a(insn->dst_reg * 2), ALU_OP_AND, tmp_reg);
3052d9ae7f2bSJakub Kicinski 		emit_br(nfp_prog, BR_BNE, insn->off, 0);
3053d9ae7f2bSJakub Kicinski 	}
3054d9ae7f2bSJakub Kicinski 
3055d9ae7f2bSJakub Kicinski 	if (imm >> 32) {
3056d9ae7f2bSJakub Kicinski 		tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
3057d9ae7f2bSJakub Kicinski 		emit_alu(nfp_prog, reg_none(),
3058d9ae7f2bSJakub Kicinski 			 reg_a(insn->dst_reg * 2 + 1), ALU_OP_AND, tmp_reg);
3059d9ae7f2bSJakub Kicinski 		emit_br(nfp_prog, BR_BNE, insn->off, 0);
3060d9ae7f2bSJakub Kicinski 	}
3061d9ae7f2bSJakub Kicinski 
3062d9ae7f2bSJakub Kicinski 	return 0;
3063d9ae7f2bSJakub Kicinski }
3064d9ae7f2bSJakub Kicinski 
3065d9ae7f2bSJakub Kicinski static int jne_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3066d9ae7f2bSJakub Kicinski {
3067d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
3068d9ae7f2bSJakub Kicinski 	u64 imm = insn->imm; /* sign extend */
3069b3f868dfSJakub Kicinski 	swreg tmp_reg;
3070d9ae7f2bSJakub Kicinski 
3071d9ae7f2bSJakub Kicinski 	if (!imm) {
3072d9ae7f2bSJakub Kicinski 		emit_alu(nfp_prog, reg_none(), reg_a(insn->dst_reg * 2),
3073d9ae7f2bSJakub Kicinski 			 ALU_OP_OR, reg_b(insn->dst_reg * 2 + 1));
3074d9ae7f2bSJakub Kicinski 		emit_br(nfp_prog, BR_BNE, insn->off, 0);
307582837370SJakub Kicinski 		return 0;
3076d9ae7f2bSJakub Kicinski 	}
3077d9ae7f2bSJakub Kicinski 
3078d9ae7f2bSJakub Kicinski 	tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
3079d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
3080d9ae7f2bSJakub Kicinski 		 reg_a(insn->dst_reg * 2), ALU_OP_XOR, tmp_reg);
3081d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, BR_BNE, insn->off, 0);
3082d9ae7f2bSJakub Kicinski 
3083d9ae7f2bSJakub Kicinski 	tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
3084d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
3085d9ae7f2bSJakub Kicinski 		 reg_a(insn->dst_reg * 2 + 1), ALU_OP_XOR, tmp_reg);
3086d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, BR_BNE, insn->off, 0);
3087d9ae7f2bSJakub Kicinski 
3088d9ae7f2bSJakub Kicinski 	return 0;
3089d9ae7f2bSJakub Kicinski }
3090d9ae7f2bSJakub Kicinski 
3091d9ae7f2bSJakub Kicinski static int jeq_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3092d9ae7f2bSJakub Kicinski {
3093d9ae7f2bSJakub Kicinski 	const struct bpf_insn *insn = &meta->insn;
3094d9ae7f2bSJakub Kicinski 
3095d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, imm_a(nfp_prog), reg_a(insn->dst_reg * 2),
3096d9ae7f2bSJakub Kicinski 		 ALU_OP_XOR, reg_b(insn->src_reg * 2));
3097d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, imm_b(nfp_prog), reg_a(insn->dst_reg * 2 + 1),
3098d9ae7f2bSJakub Kicinski 		 ALU_OP_XOR, reg_b(insn->src_reg * 2 + 1));
3099d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(),
3100d9ae7f2bSJakub Kicinski 		 imm_a(nfp_prog), ALU_OP_OR, imm_b(nfp_prog));
3101d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, BR_BEQ, insn->off, 0);
3102d9ae7f2bSJakub Kicinski 
3103d9ae7f2bSJakub Kicinski 	return 0;
3104d9ae7f2bSJakub Kicinski }
3105d9ae7f2bSJakub Kicinski 
3106d9ae7f2bSJakub Kicinski static int jset_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3107d9ae7f2bSJakub Kicinski {
3108d9ae7f2bSJakub Kicinski 	return wrp_test_reg(nfp_prog, meta, ALU_OP_AND, BR_BNE);
3109d9ae7f2bSJakub Kicinski }
3110d9ae7f2bSJakub Kicinski 
3111d9ae7f2bSJakub Kicinski static int jne_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3112d9ae7f2bSJakub Kicinski {
3113d9ae7f2bSJakub Kicinski 	return wrp_test_reg(nfp_prog, meta, ALU_OP_XOR, BR_BNE);
3114d9ae7f2bSJakub Kicinski }
3115d9ae7f2bSJakub Kicinski 
3116389f263bSQuentin Monnet static int
3117389f263bSQuentin Monnet bpf_to_bpf_call(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3118389f263bSQuentin Monnet {
3119bdf4c66fSQuentin Monnet 	u32 ret_tgt, stack_depth, offset_br;
3120389f263bSQuentin Monnet 	swreg tmp_reg;
3121389f263bSQuentin Monnet 
3122389f263bSQuentin Monnet 	stack_depth = round_up(nfp_prog->stack_frame_depth, STACK_FRAME_ALIGN);
3123389f263bSQuentin Monnet 	/* Space for saving the return address is accounted for by the callee,
3124389f263bSQuentin Monnet 	 * so stack_depth can be zero for the main function.
3125389f263bSQuentin Monnet 	 */
3126389f263bSQuentin Monnet 	if (stack_depth) {
3127389f263bSQuentin Monnet 		tmp_reg = ur_load_imm_any(nfp_prog, stack_depth,
3128389f263bSQuentin Monnet 					  stack_imm(nfp_prog));
3129389f263bSQuentin Monnet 		emit_alu(nfp_prog, stack_reg(nfp_prog),
3130389f263bSQuentin Monnet 			 stack_reg(nfp_prog), ALU_OP_ADD, tmp_reg);
3131389f263bSQuentin Monnet 		emit_csr_wr(nfp_prog, stack_reg(nfp_prog),
3132389f263bSQuentin Monnet 			    NFP_CSR_ACT_LM_ADDR0);
3133389f263bSQuentin Monnet 	}
3134389f263bSQuentin Monnet 
313544549623SQuentin Monnet 	/* Two cases for jumping to the callee:
313644549623SQuentin Monnet 	 *
313744549623SQuentin Monnet 	 * - If callee uses and needs to save R6~R9 then:
3138389f263bSQuentin Monnet 	 *     1. Put the start offset of the callee into imm_b(). This will
3139389f263bSQuentin Monnet 	 *        require a fixup step, as we do not necessarily know this
3140389f263bSQuentin Monnet 	 *        address yet.
3141389f263bSQuentin Monnet 	 *     2. Put the return address from the callee to the caller into
3142389f263bSQuentin Monnet 	 *        register ret_reg().
3143389f263bSQuentin Monnet 	 *     3. (After defer slots are consumed) Jump to the subroutine that
3144389f263bSQuentin Monnet 	 *        pushes the registers to the stack.
3145389f263bSQuentin Monnet 	 *   The subroutine acts as a trampoline, and returns to the address in
3146389f263bSQuentin Monnet 	 *   imm_b(), i.e. jumps to the callee.
3147389f263bSQuentin Monnet 	 *
314844549623SQuentin Monnet 	 * - If callee does not need to save R6~R9 then just load return
314944549623SQuentin Monnet 	 *   address to the caller in ret_reg(), and jump to the callee
315044549623SQuentin Monnet 	 *   directly.
315144549623SQuentin Monnet 	 *
3152389f263bSQuentin Monnet 	 * Using ret_reg() to pass the return address to the callee is set here
3153389f263bSQuentin Monnet 	 * as a convention. The callee can then push this address onto its
3154389f263bSQuentin Monnet 	 * stack frame in its prologue. The advantages of passing the return
3155389f263bSQuentin Monnet 	 * address through ret_reg(), instead of pushing it to the stack right
3156389f263bSQuentin Monnet 	 * here, are the following:
3157389f263bSQuentin Monnet 	 * - It looks cleaner.
3158389f263bSQuentin Monnet 	 * - If the called function is called multiple time, we get a lower
3159389f263bSQuentin Monnet 	 *   program size.
3160389f263bSQuentin Monnet 	 * - We save two no-op instructions that should be added just before
3161389f263bSQuentin Monnet 	 *   the emit_br() when stack depth is not null otherwise.
3162389f263bSQuentin Monnet 	 * - If we ever find a register to hold the return address during whole
3163389f263bSQuentin Monnet 	 *   execution of the callee, we will not have to push the return
3164389f263bSQuentin Monnet 	 *   address to the stack for leaf functions.
3165389f263bSQuentin Monnet 	 */
316644549623SQuentin Monnet 	if (!meta->jmp_dst) {
316744549623SQuentin Monnet 		pr_err("BUG: BPF-to-BPF call has no destination recorded\n");
316844549623SQuentin Monnet 		return -ELOOP;
316944549623SQuentin Monnet 	}
317044549623SQuentin Monnet 	if (nfp_prog->subprog[meta->jmp_dst->subprog_idx].needs_reg_push) {
3171389f263bSQuentin Monnet 		ret_tgt = nfp_prog_current_offset(nfp_prog) + 3;
3172389f263bSQuentin Monnet 		emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2,
3173389f263bSQuentin Monnet 			     RELO_BR_GO_CALL_PUSH_REGS);
3174bdf4c66fSQuentin Monnet 		offset_br = nfp_prog_current_offset(nfp_prog);
3175389f263bSQuentin Monnet 		wrp_immed_relo(nfp_prog, imm_b(nfp_prog), 0, RELO_IMMED_REL);
317644549623SQuentin Monnet 	} else {
317744549623SQuentin Monnet 		ret_tgt = nfp_prog_current_offset(nfp_prog) + 2;
317844549623SQuentin Monnet 		emit_br(nfp_prog, BR_UNC, meta->n + 1 + meta->insn.imm, 1);
317944549623SQuentin Monnet 		offset_br = nfp_prog_current_offset(nfp_prog);
318044549623SQuentin Monnet 	}
3181389f263bSQuentin Monnet 	wrp_immed_relo(nfp_prog, ret_reg(nfp_prog), ret_tgt, RELO_IMMED_REL);
3182389f263bSQuentin Monnet 
3183389f263bSQuentin Monnet 	if (!nfp_prog_confirm_current_offset(nfp_prog, ret_tgt))
3184389f263bSQuentin Monnet 		return -EINVAL;
3185389f263bSQuentin Monnet 
3186389f263bSQuentin Monnet 	if (stack_depth) {
3187389f263bSQuentin Monnet 		tmp_reg = ur_load_imm_any(nfp_prog, stack_depth,
3188389f263bSQuentin Monnet 					  stack_imm(nfp_prog));
3189389f263bSQuentin Monnet 		emit_alu(nfp_prog, stack_reg(nfp_prog),
3190389f263bSQuentin Monnet 			 stack_reg(nfp_prog), ALU_OP_SUB, tmp_reg);
3191389f263bSQuentin Monnet 		emit_csr_wr(nfp_prog, stack_reg(nfp_prog),
3192389f263bSQuentin Monnet 			    NFP_CSR_ACT_LM_ADDR0);
3193389f263bSQuentin Monnet 		wrp_nops(nfp_prog, 3);
3194389f263bSQuentin Monnet 	}
3195389f263bSQuentin Monnet 
3196bdf4c66fSQuentin Monnet 	meta->num_insns_after_br = nfp_prog_current_offset(nfp_prog);
3197bdf4c66fSQuentin Monnet 	meta->num_insns_after_br -= offset_br;
3198bdf4c66fSQuentin Monnet 
3199389f263bSQuentin Monnet 	return 0;
3200389f263bSQuentin Monnet }
3201389f263bSQuentin Monnet 
3202389f263bSQuentin Monnet static int helper_call(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
32032cb230bdSJakub Kicinski {
32042cb230bdSJakub Kicinski 	switch (meta->insn.imm) {
32050d49eaf4SJakub Kicinski 	case BPF_FUNC_xdp_adjust_head:
32060d49eaf4SJakub Kicinski 		return adjust_head(nfp_prog, meta);
32070c261593SJakub Kicinski 	case BPF_FUNC_xdp_adjust_tail:
32080c261593SJakub Kicinski 		return adjust_tail(nfp_prog, meta);
320977a3d311SJakub Kicinski 	case BPF_FUNC_map_lookup_elem:
321044d65a47SJakub Kicinski 	case BPF_FUNC_map_update_elem:
3211bfee64deSJakub Kicinski 	case BPF_FUNC_map_delete_elem:
3212fc448497SJakub Kicinski 		return map_call_stack_common(nfp_prog, meta);
3213df4a37d8SJakub Kicinski 	case BPF_FUNC_get_prandom_u32:
3214df4a37d8SJakub Kicinski 		return nfp_get_prandom_u32(nfp_prog, meta);
32159816dd35SJakub Kicinski 	case BPF_FUNC_perf_event_output:
32169816dd35SJakub Kicinski 		return nfp_perf_event_output(nfp_prog, meta);
32172cb230bdSJakub Kicinski 	default:
32182cb230bdSJakub Kicinski 		WARN_ONCE(1, "verifier allowed unsupported function\n");
32192cb230bdSJakub Kicinski 		return -EOPNOTSUPP;
32202cb230bdSJakub Kicinski 	}
32212cb230bdSJakub Kicinski }
32222cb230bdSJakub Kicinski 
3223389f263bSQuentin Monnet static int call(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3224389f263bSQuentin Monnet {
3225389f263bSQuentin Monnet 	if (is_mbpf_pseudo_call(meta))
3226389f263bSQuentin Monnet 		return bpf_to_bpf_call(nfp_prog, meta);
3227389f263bSQuentin Monnet 	else
3228389f263bSQuentin Monnet 		return helper_call(nfp_prog, meta);
3229389f263bSQuentin Monnet }
3230389f263bSQuentin Monnet 
3231389f263bSQuentin Monnet static bool nfp_is_main_function(struct nfp_insn_meta *meta)
3232389f263bSQuentin Monnet {
3233389f263bSQuentin Monnet 	return meta->subprog_idx == 0;
3234389f263bSQuentin Monnet }
3235389f263bSQuentin Monnet 
3236d9ae7f2bSJakub Kicinski static int goto_out(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3237d9ae7f2bSJakub Kicinski {
3238e84797feSJakub Kicinski 	emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 0, RELO_BR_GO_OUT);
3239d9ae7f2bSJakub Kicinski 
3240d9ae7f2bSJakub Kicinski 	return 0;
3241d9ae7f2bSJakub Kicinski }
3242d9ae7f2bSJakub Kicinski 
3243389f263bSQuentin Monnet static int
3244389f263bSQuentin Monnet nfp_subprog_epilogue(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3245389f263bSQuentin Monnet {
324644549623SQuentin Monnet 	if (nfp_prog->subprog[meta->subprog_idx].needs_reg_push) {
3247389f263bSQuentin Monnet 		/* Pop R6~R9 to the stack via related subroutine.
324844549623SQuentin Monnet 		 * We loaded the return address to the caller into ret_reg().
324944549623SQuentin Monnet 		 * This means that the subroutine does not come back here, we
325044549623SQuentin Monnet 		 * make it jump back to the subprogram caller directly!
3251389f263bSQuentin Monnet 		 */
3252389f263bSQuentin Monnet 		emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 1,
3253389f263bSQuentin Monnet 			     RELO_BR_GO_CALL_POP_REGS);
325444549623SQuentin Monnet 		/* Pop return address from the stack. */
3255389f263bSQuentin Monnet 		wrp_mov(nfp_prog, ret_reg(nfp_prog), reg_lm(0, 0));
325644549623SQuentin Monnet 	} else {
325744549623SQuentin Monnet 		/* Pop return address from the stack. */
325844549623SQuentin Monnet 		wrp_mov(nfp_prog, ret_reg(nfp_prog), reg_lm(0, 0));
325944549623SQuentin Monnet 		/* Jump back to caller if no callee-saved registers were used
326044549623SQuentin Monnet 		 * by the subprogram.
326144549623SQuentin Monnet 		 */
326244549623SQuentin Monnet 		emit_rtn(nfp_prog, ret_reg(nfp_prog), 0);
326344549623SQuentin Monnet 	}
3264389f263bSQuentin Monnet 
3265389f263bSQuentin Monnet 	return 0;
3266389f263bSQuentin Monnet }
3267389f263bSQuentin Monnet 
3268389f263bSQuentin Monnet static int jmp_exit(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3269389f263bSQuentin Monnet {
3270389f263bSQuentin Monnet 	if (nfp_is_main_function(meta))
3271389f263bSQuentin Monnet 		return goto_out(nfp_prog, meta);
3272389f263bSQuentin Monnet 	else
3273389f263bSQuentin Monnet 		return nfp_subprog_epilogue(nfp_prog, meta);
3274389f263bSQuentin Monnet }
3275389f263bSQuentin Monnet 
3276d9ae7f2bSJakub Kicinski static const instr_cb_t instr_cb[256] = {
3277d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_MOV | BPF_X] =	mov_reg64,
3278d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_MOV | BPF_K] =	mov_imm64,
3279d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_XOR | BPF_X] =	xor_reg64,
3280d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_XOR | BPF_K] =	xor_imm64,
3281d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_AND | BPF_X] =	and_reg64,
3282d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_AND | BPF_K] =	and_imm64,
3283d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_OR | BPF_X] =	or_reg64,
3284d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_OR | BPF_K] =	or_imm64,
3285d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_ADD | BPF_X] =	add_reg64,
3286d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_ADD | BPF_K] =	add_imm64,
3287d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_SUB | BPF_X] =	sub_reg64,
3288d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_SUB | BPF_K] =	sub_imm64,
3289d3d23fdbSJiong Wang 	[BPF_ALU64 | BPF_MUL | BPF_X] =	mul_reg64,
3290d3d23fdbSJiong Wang 	[BPF_ALU64 | BPF_MUL | BPF_K] =	mul_imm64,
32912a952b03SJiong Wang 	[BPF_ALU64 | BPF_DIV | BPF_X] =	div_reg64,
32922a952b03SJiong Wang 	[BPF_ALU64 | BPF_DIV | BPF_K] =	div_imm64,
3293254ef4d7SJiong Wang 	[BPF_ALU64 | BPF_NEG] =		neg_reg64,
3294991f5b36SJiong Wang 	[BPF_ALU64 | BPF_LSH | BPF_X] =	shl_reg64,
3295d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_LSH | BPF_K] =	shl_imm64,
3296991f5b36SJiong Wang 	[BPF_ALU64 | BPF_RSH | BPF_X] =	shr_reg64,
3297d9ae7f2bSJakub Kicinski 	[BPF_ALU64 | BPF_RSH | BPF_K] =	shr_imm64,
3298c217abccSJiong Wang 	[BPF_ALU64 | BPF_ARSH | BPF_X] = ashr_reg64,
3299f43d0f17SJiong Wang 	[BPF_ALU64 | BPF_ARSH | BPF_K] = ashr_imm64,
3300d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_MOV | BPF_X] =	mov_reg,
3301d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_MOV | BPF_K] =	mov_imm,
3302d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_XOR | BPF_X] =	xor_reg,
3303d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_XOR | BPF_K] =	xor_imm,
3304d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_AND | BPF_X] =	and_reg,
3305d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_AND | BPF_K] =	and_imm,
3306d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_OR | BPF_X] =	or_reg,
3307d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_OR | BPF_K] =	or_imm,
3308d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_ADD | BPF_X] =	add_reg,
3309d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_ADD | BPF_K] =	add_imm,
3310d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_SUB | BPF_X] =	sub_reg,
3311d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_SUB | BPF_K] =	sub_imm,
3312d3d23fdbSJiong Wang 	[BPF_ALU | BPF_MUL | BPF_X] =	mul_reg,
3313d3d23fdbSJiong Wang 	[BPF_ALU | BPF_MUL | BPF_K] =	mul_imm,
33142a952b03SJiong Wang 	[BPF_ALU | BPF_DIV | BPF_X] =	div_reg,
33152a952b03SJiong Wang 	[BPF_ALU | BPF_DIV | BPF_K] =	div_imm,
3316254ef4d7SJiong Wang 	[BPF_ALU | BPF_NEG] =		neg_reg,
3317d9ae7f2bSJakub Kicinski 	[BPF_ALU | BPF_LSH | BPF_K] =	shl_imm,
33183119d1fdSJakub Kicinski 	[BPF_ALU | BPF_END | BPF_X] =	end_reg32,
3319d9ae7f2bSJakub Kicinski 	[BPF_LD | BPF_IMM | BPF_DW] =	imm_ld8,
3320d9ae7f2bSJakub Kicinski 	[BPF_LD | BPF_ABS | BPF_B] =	data_ld1,
3321d9ae7f2bSJakub Kicinski 	[BPF_LD | BPF_ABS | BPF_H] =	data_ld2,
3322d9ae7f2bSJakub Kicinski 	[BPF_LD | BPF_ABS | BPF_W] =	data_ld4,
3323d9ae7f2bSJakub Kicinski 	[BPF_LD | BPF_IND | BPF_B] =	data_ind_ld1,
3324d9ae7f2bSJakub Kicinski 	[BPF_LD | BPF_IND | BPF_H] =	data_ind_ld2,
3325d9ae7f2bSJakub Kicinski 	[BPF_LD | BPF_IND | BPF_W] =	data_ind_ld4,
33262ca71441SJakub Kicinski 	[BPF_LDX | BPF_MEM | BPF_B] =	mem_ldx1,
33272ca71441SJakub Kicinski 	[BPF_LDX | BPF_MEM | BPF_H] =	mem_ldx2,
3328d9ae7f2bSJakub Kicinski 	[BPF_LDX | BPF_MEM | BPF_W] =	mem_ldx4,
33292ca71441SJakub Kicinski 	[BPF_LDX | BPF_MEM | BPF_DW] =	mem_ldx8,
3330e663fe38SJakub Kicinski 	[BPF_STX | BPF_MEM | BPF_B] =	mem_stx1,
3331e663fe38SJakub Kicinski 	[BPF_STX | BPF_MEM | BPF_H] =	mem_stx2,
3332d9ae7f2bSJakub Kicinski 	[BPF_STX | BPF_MEM | BPF_W] =	mem_stx4,
3333e663fe38SJakub Kicinski 	[BPF_STX | BPF_MEM | BPF_DW] =	mem_stx8,
3334dcb0c27fSJakub Kicinski 	[BPF_STX | BPF_XADD | BPF_W] =	mem_xadd4,
3335dcb0c27fSJakub Kicinski 	[BPF_STX | BPF_XADD | BPF_DW] =	mem_xadd8,
3336e663fe38SJakub Kicinski 	[BPF_ST | BPF_MEM | BPF_B] =	mem_st1,
3337e663fe38SJakub Kicinski 	[BPF_ST | BPF_MEM | BPF_H] =	mem_st2,
3338e663fe38SJakub Kicinski 	[BPF_ST | BPF_MEM | BPF_W] =	mem_st4,
3339e663fe38SJakub Kicinski 	[BPF_ST | BPF_MEM | BPF_DW] =	mem_st8,
3340d9ae7f2bSJakub Kicinski 	[BPF_JMP | BPF_JA | BPF_K] =	jump,
3341d9ae7f2bSJakub Kicinski 	[BPF_JMP | BPF_JEQ | BPF_K] =	jeq_imm,
334261dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JGT | BPF_K] =	cmp_imm,
334361dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JGE | BPF_K] =	cmp_imm,
334461dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JLT | BPF_K] =	cmp_imm,
334561dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JLE | BPF_K] =	cmp_imm,
334661dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSGT | BPF_K] =  cmp_imm,
334761dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSGE | BPF_K] =  cmp_imm,
334861dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSLT | BPF_K] =  cmp_imm,
334961dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSLE | BPF_K] =  cmp_imm,
3350d9ae7f2bSJakub Kicinski 	[BPF_JMP | BPF_JSET | BPF_K] =	jset_imm,
3351d9ae7f2bSJakub Kicinski 	[BPF_JMP | BPF_JNE | BPF_K] =	jne_imm,
3352d9ae7f2bSJakub Kicinski 	[BPF_JMP | BPF_JEQ | BPF_X] =	jeq_reg,
335361dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JGT | BPF_X] =	cmp_reg,
335461dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JGE | BPF_X] =	cmp_reg,
335561dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JLT | BPF_X] =	cmp_reg,
335661dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JLE | BPF_X] =	cmp_reg,
335761dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSGT | BPF_X] =  cmp_reg,
335861dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSGE | BPF_X] =  cmp_reg,
335961dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSLT | BPF_X] =  cmp_reg,
336061dd8f00SJakub Kicinski 	[BPF_JMP | BPF_JSLE | BPF_X] =  cmp_reg,
3361d9ae7f2bSJakub Kicinski 	[BPF_JMP | BPF_JSET | BPF_X] =	jset_reg,
3362d9ae7f2bSJakub Kicinski 	[BPF_JMP | BPF_JNE | BPF_X] =	jne_reg,
33632cb230bdSJakub Kicinski 	[BPF_JMP | BPF_CALL] =		call,
3364389f263bSQuentin Monnet 	[BPF_JMP | BPF_EXIT] =		jmp_exit,
3365d9ae7f2bSJakub Kicinski };
3366d9ae7f2bSJakub Kicinski 
3367d9ae7f2bSJakub Kicinski /* --- Assembler logic --- */
33682178f3f0SQuentin Monnet static int
33692178f3f0SQuentin Monnet nfp_fixup_immed_relo(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
33702178f3f0SQuentin Monnet 		     struct nfp_insn_meta *jmp_dst, u32 br_idx)
33712178f3f0SQuentin Monnet {
33722178f3f0SQuentin Monnet 	if (immed_get_value(nfp_prog->prog[br_idx + 1])) {
33732178f3f0SQuentin Monnet 		pr_err("BUG: failed to fix up callee register saving\n");
33742178f3f0SQuentin Monnet 		return -EINVAL;
33752178f3f0SQuentin Monnet 	}
33762178f3f0SQuentin Monnet 
33772178f3f0SQuentin Monnet 	immed_set_value(&nfp_prog->prog[br_idx + 1], jmp_dst->off);
33782178f3f0SQuentin Monnet 
33792178f3f0SQuentin Monnet 	return 0;
33802178f3f0SQuentin Monnet }
33812178f3f0SQuentin Monnet 
3382d9ae7f2bSJakub Kicinski static int nfp_fixup_branches(struct nfp_prog *nfp_prog)
3383d9ae7f2bSJakub Kicinski {
33845b674140SJiong Wang 	struct nfp_insn_meta *meta, *jmp_dst;
3385854dc87dSJiong Wang 	u32 idx, br_idx;
33862178f3f0SQuentin Monnet 	int err;
3387d9ae7f2bSJakub Kicinski 
3388854dc87dSJiong Wang 	list_for_each_entry(meta, &nfp_prog->insns, l) {
3389d9ae7f2bSJakub Kicinski 		if (meta->skip)
3390d9ae7f2bSJakub Kicinski 			continue;
3391d9ae7f2bSJakub Kicinski 		if (BPF_CLASS(meta->insn.code) != BPF_JMP)
3392d9ae7f2bSJakub Kicinski 			continue;
3393bdf4c66fSQuentin Monnet 		if (meta->insn.code == (BPF_JMP | BPF_EXIT) &&
3394bdf4c66fSQuentin Monnet 		    !nfp_is_main_function(meta))
3395bdf4c66fSQuentin Monnet 			continue;
3396bdf4c66fSQuentin Monnet 		if (is_mbpf_helper_call(meta))
3397bdf4c66fSQuentin Monnet 			continue;
3398d9ae7f2bSJakub Kicinski 
33995b674140SJiong Wang 		if (list_is_last(&meta->l, &nfp_prog->insns))
34002314fe9eSJakub Kicinski 			br_idx = nfp_prog->last_bpf_off;
34015b674140SJiong Wang 		else
34022314fe9eSJakub Kicinski 			br_idx = list_next_entry(meta, l)->off - 1;
3403854dc87dSJiong Wang 
3404bdf4c66fSQuentin Monnet 		/* For BPF-to-BPF function call, a stack adjustment sequence is
3405bdf4c66fSQuentin Monnet 		 * generated after the return instruction. Therefore, we must
3406bdf4c66fSQuentin Monnet 		 * withdraw the length of this sequence to have br_idx pointing
3407bdf4c66fSQuentin Monnet 		 * to where the "branch" NFP instruction is expected to be.
3408bdf4c66fSQuentin Monnet 		 */
3409bdf4c66fSQuentin Monnet 		if (is_mbpf_pseudo_call(meta))
3410bdf4c66fSQuentin Monnet 			br_idx -= meta->num_insns_after_br;
3411bdf4c66fSQuentin Monnet 
3412d9ae7f2bSJakub Kicinski 		if (!nfp_is_br(nfp_prog->prog[br_idx])) {
3413d9ae7f2bSJakub Kicinski 			pr_err("Fixup found block not ending in branch %d %02x %016llx!!\n",
3414d9ae7f2bSJakub Kicinski 			       br_idx, meta->insn.code, nfp_prog->prog[br_idx]);
3415d9ae7f2bSJakub Kicinski 			return -ELOOP;
3416d9ae7f2bSJakub Kicinski 		}
3417bdf4c66fSQuentin Monnet 
3418bdf4c66fSQuentin Monnet 		if (meta->insn.code == (BPF_JMP | BPF_EXIT))
3419bdf4c66fSQuentin Monnet 			continue;
3420bdf4c66fSQuentin Monnet 
3421d9ae7f2bSJakub Kicinski 		/* Leave special branches for later */
34222314fe9eSJakub Kicinski 		if (FIELD_GET(OP_RELO_TYPE, nfp_prog->prog[br_idx]) !=
34232178f3f0SQuentin Monnet 		    RELO_BR_REL && !is_mbpf_pseudo_call(meta))
3424d9ae7f2bSJakub Kicinski 			continue;
3425d9ae7f2bSJakub Kicinski 
34265b674140SJiong Wang 		if (!meta->jmp_dst) {
34275b674140SJiong Wang 			pr_err("Non-exit jump doesn't have destination info recorded!!\n");
3428d9ae7f2bSJakub Kicinski 			return -ELOOP;
3429d9ae7f2bSJakub Kicinski 		}
3430d9ae7f2bSJakub Kicinski 
34315b674140SJiong Wang 		jmp_dst = meta->jmp_dst;
3432854dc87dSJiong Wang 
34335b674140SJiong Wang 		if (jmp_dst->skip) {
3434d9ae7f2bSJakub Kicinski 			pr_err("Branch landing on removed instruction!!\n");
3435d9ae7f2bSJakub Kicinski 			return -ELOOP;
3436d9ae7f2bSJakub Kicinski 		}
3437d9ae7f2bSJakub Kicinski 
343844549623SQuentin Monnet 		if (is_mbpf_pseudo_call(meta) &&
343944549623SQuentin Monnet 		    nfp_prog->subprog[jmp_dst->subprog_idx].needs_reg_push) {
34402178f3f0SQuentin Monnet 			err = nfp_fixup_immed_relo(nfp_prog, meta,
34412178f3f0SQuentin Monnet 						   jmp_dst, br_idx);
34422178f3f0SQuentin Monnet 			if (err)
34432178f3f0SQuentin Monnet 				return err;
34442178f3f0SQuentin Monnet 		}
34452178f3f0SQuentin Monnet 
34462178f3f0SQuentin Monnet 		if (FIELD_GET(OP_RELO_TYPE, nfp_prog->prog[br_idx]) !=
34472178f3f0SQuentin Monnet 		    RELO_BR_REL)
34482178f3f0SQuentin Monnet 			continue;
34492178f3f0SQuentin Monnet 
34502314fe9eSJakub Kicinski 		for (idx = meta->off; idx <= br_idx; idx++) {
3451d9ae7f2bSJakub Kicinski 			if (!nfp_is_br(nfp_prog->prog[idx]))
3452d9ae7f2bSJakub Kicinski 				continue;
34535b674140SJiong Wang 			br_set_offset(&nfp_prog->prog[idx], jmp_dst->off);
3454d9ae7f2bSJakub Kicinski 		}
3455d9ae7f2bSJakub Kicinski 	}
3456d9ae7f2bSJakub Kicinski 
3457d9ae7f2bSJakub Kicinski 	return 0;
3458d9ae7f2bSJakub Kicinski }
3459d9ae7f2bSJakub Kicinski 
3460d9ae7f2bSJakub Kicinski static void nfp_intro(struct nfp_prog *nfp_prog)
3461d9ae7f2bSJakub Kicinski {
346218e53b6cSJakub Kicinski 	wrp_immed(nfp_prog, plen_reg(nfp_prog), GENMASK(13, 0));
346318e53b6cSJakub Kicinski 	emit_alu(nfp_prog, plen_reg(nfp_prog),
346418e53b6cSJakub Kicinski 		 plen_reg(nfp_prog), ALU_OP_AND, pv_len(nfp_prog));
3465d9ae7f2bSJakub Kicinski }
3466d9ae7f2bSJakub Kicinski 
3467389f263bSQuentin Monnet static void
3468389f263bSQuentin Monnet nfp_subprog_prologue(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3469389f263bSQuentin Monnet {
3470389f263bSQuentin Monnet 	/* Save return address into the stack. */
3471389f263bSQuentin Monnet 	wrp_mov(nfp_prog, reg_lm(0, 0), ret_reg(nfp_prog));
3472389f263bSQuentin Monnet }
3473389f263bSQuentin Monnet 
3474389f263bSQuentin Monnet static void
3475389f263bSQuentin Monnet nfp_start_subprog(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
3476389f263bSQuentin Monnet {
3477389f263bSQuentin Monnet 	unsigned int depth = nfp_prog->subprog[meta->subprog_idx].stack_depth;
3478389f263bSQuentin Monnet 
3479389f263bSQuentin Monnet 	nfp_prog->stack_frame_depth = round_up(depth, 4);
3480389f263bSQuentin Monnet 	nfp_subprog_prologue(nfp_prog, meta);
3481389f263bSQuentin Monnet }
3482389f263bSQuentin Monnet 
3483389f263bSQuentin Monnet bool nfp_is_subprog_start(struct nfp_insn_meta *meta)
3484389f263bSQuentin Monnet {
3485389f263bSQuentin Monnet 	return meta->flags & FLAG_INSN_IS_SUBPROG_START;
3486389f263bSQuentin Monnet }
3487389f263bSQuentin Monnet 
3488d9ae7f2bSJakub Kicinski static void nfp_outro_tc_da(struct nfp_prog *nfp_prog)
3489d9ae7f2bSJakub Kicinski {
3490d9ae7f2bSJakub Kicinski 	/* TC direct-action mode:
3491d9ae7f2bSJakub Kicinski 	 *   0,1   ok        NOT SUPPORTED[1]
3492d9ae7f2bSJakub Kicinski 	 *   2   drop  0x22 -> drop,  count as stat1
3493d9ae7f2bSJakub Kicinski 	 *   4,5 nuke  0x02 -> drop
3494d9ae7f2bSJakub Kicinski 	 *   7  redir  0x44 -> redir, count as stat2
3495d9ae7f2bSJakub Kicinski 	 *   * unspec  0x11 -> pass,  count as stat0
3496d9ae7f2bSJakub Kicinski 	 *
3497d9ae7f2bSJakub Kicinski 	 * [1] We can't support OK and RECLASSIFY because we can't tell TC
3498d9ae7f2bSJakub Kicinski 	 *     the exact decision made.  We are forced to support UNSPEC
3499d9ae7f2bSJakub Kicinski 	 *     to handle aborts so that's the only one we handle for passing
3500d9ae7f2bSJakub Kicinski 	 *     packets up the stack.
3501d9ae7f2bSJakub Kicinski 	 */
3502d9ae7f2bSJakub Kicinski 	/* Target for aborts */
3503d9ae7f2bSJakub Kicinski 	nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog);
3504d9ae7f2bSJakub Kicinski 
3505e84797feSJakub Kicinski 	emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2, RELO_BR_NEXT_PKT);
3506d9ae7f2bSJakub Kicinski 
3507c000dfb5SJakub Kicinski 	wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS);
3508d9ae7f2bSJakub Kicinski 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x11), SHF_SC_L_SHF, 16);
3509d9ae7f2bSJakub Kicinski 
3510d9ae7f2bSJakub Kicinski 	/* Target for normal exits */
3511d9ae7f2bSJakub Kicinski 	nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog);
3512d9ae7f2bSJakub Kicinski 
3513d9ae7f2bSJakub Kicinski 	/* if R0 > 7 jump to abort */
3514d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_imm(7), ALU_OP_SUB, reg_b(0));
3515d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, BR_BLO, nfp_prog->tgt_abort, 0);
3516c000dfb5SJakub Kicinski 	wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS);
3517d9ae7f2bSJakub Kicinski 
3518d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_b(2), 0x41221211);
3519d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_b(3), 0x41001211);
3520d9ae7f2bSJakub Kicinski 
3521d9ae7f2bSJakub Kicinski 	emit_shf(nfp_prog, reg_a(1),
3522d9ae7f2bSJakub Kicinski 		 reg_none(), SHF_OP_NONE, reg_b(0), SHF_SC_L_SHF, 2);
3523d9ae7f2bSJakub Kicinski 
3524d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0));
3525d9ae7f2bSJakub Kicinski 	emit_shf(nfp_prog, reg_a(2),
3526d9ae7f2bSJakub Kicinski 		 reg_imm(0xf), SHF_OP_AND, reg_b(2), SHF_SC_R_SHF, 0);
3527d9ae7f2bSJakub Kicinski 
3528d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0));
3529d9ae7f2bSJakub Kicinski 	emit_shf(nfp_prog, reg_b(2),
3530d9ae7f2bSJakub Kicinski 		 reg_imm(0xf), SHF_OP_AND, reg_b(3), SHF_SC_R_SHF, 0);
3531d9ae7f2bSJakub Kicinski 
3532e84797feSJakub Kicinski 	emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2, RELO_BR_NEXT_PKT);
3533d9ae7f2bSJakub Kicinski 
3534d9ae7f2bSJakub Kicinski 	emit_shf(nfp_prog, reg_b(2),
3535d9ae7f2bSJakub Kicinski 		 reg_a(2), SHF_OP_OR, reg_b(2), SHF_SC_L_SHF, 4);
3536d9ae7f2bSJakub Kicinski 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_b(2), SHF_SC_L_SHF, 16);
3537d9ae7f2bSJakub Kicinski }
3538d9ae7f2bSJakub Kicinski 
3539d9ae7f2bSJakub Kicinski static void nfp_outro_xdp(struct nfp_prog *nfp_prog)
3540d9ae7f2bSJakub Kicinski {
3541d9ae7f2bSJakub Kicinski 	/* XDP return codes:
3542d9ae7f2bSJakub Kicinski 	 *   0 aborted  0x82 -> drop,  count as stat3
3543d9ae7f2bSJakub Kicinski 	 *   1    drop  0x22 -> drop,  count as stat1
3544d9ae7f2bSJakub Kicinski 	 *   2    pass  0x11 -> pass,  count as stat0
3545d9ae7f2bSJakub Kicinski 	 *   3      tx  0x44 -> redir, count as stat2
3546d9ae7f2bSJakub Kicinski 	 *   * unknown  0x82 -> drop,  count as stat3
3547d9ae7f2bSJakub Kicinski 	 */
3548d9ae7f2bSJakub Kicinski 	/* Target for aborts */
3549d9ae7f2bSJakub Kicinski 	nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog);
3550d9ae7f2bSJakub Kicinski 
3551e84797feSJakub Kicinski 	emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2, RELO_BR_NEXT_PKT);
3552d9ae7f2bSJakub Kicinski 
3553c000dfb5SJakub Kicinski 	wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS);
3554d9ae7f2bSJakub Kicinski 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x82), SHF_SC_L_SHF, 16);
3555d9ae7f2bSJakub Kicinski 
3556d9ae7f2bSJakub Kicinski 	/* Target for normal exits */
3557d9ae7f2bSJakub Kicinski 	nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog);
3558d9ae7f2bSJakub Kicinski 
3559d9ae7f2bSJakub Kicinski 	/* if R0 > 3 jump to abort */
3560d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_imm(3), ALU_OP_SUB, reg_b(0));
3561d9ae7f2bSJakub Kicinski 	emit_br(nfp_prog, BR_BLO, nfp_prog->tgt_abort, 0);
3562d9ae7f2bSJakub Kicinski 
3563d9ae7f2bSJakub Kicinski 	wrp_immed(nfp_prog, reg_b(2), 0x44112282);
3564d9ae7f2bSJakub Kicinski 
3565d9ae7f2bSJakub Kicinski 	emit_shf(nfp_prog, reg_a(1),
3566d9ae7f2bSJakub Kicinski 		 reg_none(), SHF_OP_NONE, reg_b(0), SHF_SC_L_SHF, 3);
3567d9ae7f2bSJakub Kicinski 
3568d9ae7f2bSJakub Kicinski 	emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0));
3569d9ae7f2bSJakub Kicinski 	emit_shf(nfp_prog, reg_b(2),
3570d9ae7f2bSJakub Kicinski 		 reg_imm(0xff), SHF_OP_AND, reg_b(2), SHF_SC_R_SHF, 0);
3571d9ae7f2bSJakub Kicinski 
3572e84797feSJakub Kicinski 	emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2, RELO_BR_NEXT_PKT);
3573d9ae7f2bSJakub Kicinski 
3574c000dfb5SJakub Kicinski 	wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS);
3575d9ae7f2bSJakub Kicinski 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_b(2), SHF_SC_L_SHF, 16);
3576d9ae7f2bSJakub Kicinski }
3577d9ae7f2bSJakub Kicinski 
357844549623SQuentin Monnet static bool nfp_prog_needs_callee_reg_save(struct nfp_prog *nfp_prog)
357944549623SQuentin Monnet {
358044549623SQuentin Monnet 	unsigned int idx;
358144549623SQuentin Monnet 
358244549623SQuentin Monnet 	for (idx = 1; idx < nfp_prog->subprog_cnt; idx++)
358344549623SQuentin Monnet 		if (nfp_prog->subprog[idx].needs_reg_push)
358444549623SQuentin Monnet 			return true;
358544549623SQuentin Monnet 
358644549623SQuentin Monnet 	return false;
358744549623SQuentin Monnet }
358844549623SQuentin Monnet 
3589389f263bSQuentin Monnet static void nfp_push_callee_registers(struct nfp_prog *nfp_prog)
3590389f263bSQuentin Monnet {
3591389f263bSQuentin Monnet 	u8 reg;
3592389f263bSQuentin Monnet 
3593389f263bSQuentin Monnet 	/* Subroutine: Save all callee saved registers (R6 ~ R9).
3594389f263bSQuentin Monnet 	 * imm_b() holds the return address.
3595389f263bSQuentin Monnet 	 */
3596389f263bSQuentin Monnet 	nfp_prog->tgt_call_push_regs = nfp_prog_current_offset(nfp_prog);
3597389f263bSQuentin Monnet 	for (reg = BPF_REG_6; reg <= BPF_REG_9; reg++) {
3598389f263bSQuentin Monnet 		u8 adj = (reg - BPF_REG_0) * 2;
3599389f263bSQuentin Monnet 		u8 idx = (reg - BPF_REG_6) * 2;
3600389f263bSQuentin Monnet 
3601389f263bSQuentin Monnet 		/* The first slot in the stack frame is used to push the return
3602389f263bSQuentin Monnet 		 * address in bpf_to_bpf_call(), start just after.
3603389f263bSQuentin Monnet 		 */
3604389f263bSQuentin Monnet 		wrp_mov(nfp_prog, reg_lm(0, 1 + idx), reg_b(adj));
3605389f263bSQuentin Monnet 
3606389f263bSQuentin Monnet 		if (reg == BPF_REG_8)
3607389f263bSQuentin Monnet 			/* Prepare to jump back, last 3 insns use defer slots */
3608389f263bSQuentin Monnet 			emit_rtn(nfp_prog, imm_b(nfp_prog), 3);
3609389f263bSQuentin Monnet 
3610389f263bSQuentin Monnet 		wrp_mov(nfp_prog, reg_lm(0, 1 + idx + 1), reg_b(adj + 1));
3611389f263bSQuentin Monnet 	}
3612389f263bSQuentin Monnet }
3613389f263bSQuentin Monnet 
3614389f263bSQuentin Monnet static void nfp_pop_callee_registers(struct nfp_prog *nfp_prog)
3615389f263bSQuentin Monnet {
3616389f263bSQuentin Monnet 	u8 reg;
3617389f263bSQuentin Monnet 
3618389f263bSQuentin Monnet 	/* Subroutine: Restore all callee saved registers (R6 ~ R9).
3619389f263bSQuentin Monnet 	 * ret_reg() holds the return address.
3620389f263bSQuentin Monnet 	 */
3621389f263bSQuentin Monnet 	nfp_prog->tgt_call_pop_regs = nfp_prog_current_offset(nfp_prog);
3622389f263bSQuentin Monnet 	for (reg = BPF_REG_6; reg <= BPF_REG_9; reg++) {
3623389f263bSQuentin Monnet 		u8 adj = (reg - BPF_REG_0) * 2;
3624389f263bSQuentin Monnet 		u8 idx = (reg - BPF_REG_6) * 2;
3625389f263bSQuentin Monnet 
3626389f263bSQuentin Monnet 		/* The first slot in the stack frame holds the return address,
3627389f263bSQuentin Monnet 		 * start popping just after that.
3628389f263bSQuentin Monnet 		 */
3629389f263bSQuentin Monnet 		wrp_mov(nfp_prog, reg_both(adj), reg_lm(0, 1 + idx));
3630389f263bSQuentin Monnet 
3631389f263bSQuentin Monnet 		if (reg == BPF_REG_8)
3632389f263bSQuentin Monnet 			/* Prepare to jump back, last 3 insns use defer slots */
3633389f263bSQuentin Monnet 			emit_rtn(nfp_prog, ret_reg(nfp_prog), 3);
3634389f263bSQuentin Monnet 
3635389f263bSQuentin Monnet 		wrp_mov(nfp_prog, reg_both(adj + 1), reg_lm(0, 1 + idx + 1));
3636389f263bSQuentin Monnet 	}
3637389f263bSQuentin Monnet }
3638389f263bSQuentin Monnet 
3639d9ae7f2bSJakub Kicinski static void nfp_outro(struct nfp_prog *nfp_prog)
3640d9ae7f2bSJakub Kicinski {
3641012bb8a8SJakub Kicinski 	switch (nfp_prog->type) {
3642012bb8a8SJakub Kicinski 	case BPF_PROG_TYPE_SCHED_CLS:
3643d9ae7f2bSJakub Kicinski 		nfp_outro_tc_da(nfp_prog);
3644d9ae7f2bSJakub Kicinski 		break;
3645012bb8a8SJakub Kicinski 	case BPF_PROG_TYPE_XDP:
3646d9ae7f2bSJakub Kicinski 		nfp_outro_xdp(nfp_prog);
3647d9ae7f2bSJakub Kicinski 		break;
3648012bb8a8SJakub Kicinski 	default:
3649012bb8a8SJakub Kicinski 		WARN_ON(1);
3650d9ae7f2bSJakub Kicinski 	}
3651389f263bSQuentin Monnet 
365244549623SQuentin Monnet 	if (!nfp_prog_needs_callee_reg_save(nfp_prog))
3653389f263bSQuentin Monnet 		return;
3654389f263bSQuentin Monnet 
3655389f263bSQuentin Monnet 	nfp_push_callee_registers(nfp_prog);
3656389f263bSQuentin Monnet 	nfp_pop_callee_registers(nfp_prog);
3657d9ae7f2bSJakub Kicinski }
3658d9ae7f2bSJakub Kicinski 
3659d9ae7f2bSJakub Kicinski static int nfp_translate(struct nfp_prog *nfp_prog)
3660d9ae7f2bSJakub Kicinski {
3661d9ae7f2bSJakub Kicinski 	struct nfp_insn_meta *meta;
3662389f263bSQuentin Monnet 	unsigned int depth;
3663ff42bb9fSJakub Kicinski 	int err;
3664d9ae7f2bSJakub Kicinski 
3665389f263bSQuentin Monnet 	depth = nfp_prog->subprog[0].stack_depth;
3666389f263bSQuentin Monnet 	nfp_prog->stack_frame_depth = round_up(depth, 4);
3667389f263bSQuentin Monnet 
3668d9ae7f2bSJakub Kicinski 	nfp_intro(nfp_prog);
3669d9ae7f2bSJakub Kicinski 	if (nfp_prog->error)
3670d9ae7f2bSJakub Kicinski 		return nfp_prog->error;
3671d9ae7f2bSJakub Kicinski 
3672d9ae7f2bSJakub Kicinski 	list_for_each_entry(meta, &nfp_prog->insns, l) {
3673d9ae7f2bSJakub Kicinski 		instr_cb_t cb = instr_cb[meta->insn.code];
3674d9ae7f2bSJakub Kicinski 
3675d9ae7f2bSJakub Kicinski 		meta->off = nfp_prog_current_offset(nfp_prog);
3676d9ae7f2bSJakub Kicinski 
3677389f263bSQuentin Monnet 		if (nfp_is_subprog_start(meta)) {
3678389f263bSQuentin Monnet 			nfp_start_subprog(nfp_prog, meta);
3679389f263bSQuentin Monnet 			if (nfp_prog->error)
3680389f263bSQuentin Monnet 				return nfp_prog->error;
3681389f263bSQuentin Monnet 		}
3682389f263bSQuentin Monnet 
3683d9ae7f2bSJakub Kicinski 		if (meta->skip) {
3684d9ae7f2bSJakub Kicinski 			nfp_prog->n_translated++;
3685d9ae7f2bSJakub Kicinski 			continue;
3686d9ae7f2bSJakub Kicinski 		}
3687d9ae7f2bSJakub Kicinski 
3688d9ae7f2bSJakub Kicinski 		if (nfp_meta_has_prev(nfp_prog, meta) &&
3689d9ae7f2bSJakub Kicinski 		    nfp_meta_prev(meta)->double_cb)
3690d9ae7f2bSJakub Kicinski 			cb = nfp_meta_prev(meta)->double_cb;
3691d9ae7f2bSJakub Kicinski 		if (!cb)
3692d9ae7f2bSJakub Kicinski 			return -ENOENT;
3693d9ae7f2bSJakub Kicinski 		err = cb(nfp_prog, meta);
3694d9ae7f2bSJakub Kicinski 		if (err)
3695d9ae7f2bSJakub Kicinski 			return err;
3696e8a4796eSJakub Kicinski 		if (nfp_prog->error)
3697e8a4796eSJakub Kicinski 			return nfp_prog->error;
3698d9ae7f2bSJakub Kicinski 
3699d9ae7f2bSJakub Kicinski 		nfp_prog->n_translated++;
3700d9ae7f2bSJakub Kicinski 	}
3701d9ae7f2bSJakub Kicinski 
3702854dc87dSJiong Wang 	nfp_prog->last_bpf_off = nfp_prog_current_offset(nfp_prog) - 1;
3703854dc87dSJiong Wang 
3704d9ae7f2bSJakub Kicinski 	nfp_outro(nfp_prog);
3705d9ae7f2bSJakub Kicinski 	if (nfp_prog->error)
3706d9ae7f2bSJakub Kicinski 		return nfp_prog->error;
3707d9ae7f2bSJakub Kicinski 
3708ff42bb9fSJakub Kicinski 	wrp_nops(nfp_prog, NFP_USTORE_PREFETCH_WINDOW);
37091c03e03fSJakub Kicinski 	if (nfp_prog->error)
37101c03e03fSJakub Kicinski 		return nfp_prog->error;
37111c03e03fSJakub Kicinski 
3712d9ae7f2bSJakub Kicinski 	return nfp_fixup_branches(nfp_prog);
3713d9ae7f2bSJakub Kicinski }
3714d9ae7f2bSJakub Kicinski 
3715d9ae7f2bSJakub Kicinski /* --- Optimizations --- */
3716d9ae7f2bSJakub Kicinski static void nfp_bpf_opt_reg_init(struct nfp_prog *nfp_prog)
3717d9ae7f2bSJakub Kicinski {
3718d9ae7f2bSJakub Kicinski 	struct nfp_insn_meta *meta;
3719d9ae7f2bSJakub Kicinski 
3720d9ae7f2bSJakub Kicinski 	list_for_each_entry(meta, &nfp_prog->insns, l) {
3721d9ae7f2bSJakub Kicinski 		struct bpf_insn insn = meta->insn;
3722d9ae7f2bSJakub Kicinski 
3723d9ae7f2bSJakub Kicinski 		/* Programs converted from cBPF start with register xoring */
3724d9ae7f2bSJakub Kicinski 		if (insn.code == (BPF_ALU64 | BPF_XOR | BPF_X) &&
3725d9ae7f2bSJakub Kicinski 		    insn.src_reg == insn.dst_reg)
3726d9ae7f2bSJakub Kicinski 			continue;
3727d9ae7f2bSJakub Kicinski 
3728d9ae7f2bSJakub Kicinski 		/* Programs start with R6 = R1 but we ignore the skb pointer */
3729d9ae7f2bSJakub Kicinski 		if (insn.code == (BPF_ALU64 | BPF_MOV | BPF_X) &&
3730d9ae7f2bSJakub Kicinski 		    insn.src_reg == 1 && insn.dst_reg == 6)
3731d9ae7f2bSJakub Kicinski 			meta->skip = true;
3732d9ae7f2bSJakub Kicinski 
3733d9ae7f2bSJakub Kicinski 		/* Return as soon as something doesn't match */
3734d9ae7f2bSJakub Kicinski 		if (!meta->skip)
3735d9ae7f2bSJakub Kicinski 			return;
3736d9ae7f2bSJakub Kicinski 	}
3737d9ae7f2bSJakub Kicinski }
3738d9ae7f2bSJakub Kicinski 
37396c59500cSJakub Kicinski /* abs(insn.imm) will fit better into unrestricted reg immediate -
37406c59500cSJakub Kicinski  * convert add/sub of a negative number into a sub/add of a positive one.
37416c59500cSJakub Kicinski  */
37426c59500cSJakub Kicinski static void nfp_bpf_opt_neg_add_sub(struct nfp_prog *nfp_prog)
37436c59500cSJakub Kicinski {
37446c59500cSJakub Kicinski 	struct nfp_insn_meta *meta;
37456c59500cSJakub Kicinski 
37466c59500cSJakub Kicinski 	list_for_each_entry(meta, &nfp_prog->insns, l) {
37476c59500cSJakub Kicinski 		struct bpf_insn insn = meta->insn;
37486c59500cSJakub Kicinski 
37496c59500cSJakub Kicinski 		if (meta->skip)
37506c59500cSJakub Kicinski 			continue;
37516c59500cSJakub Kicinski 
37526c59500cSJakub Kicinski 		if (BPF_CLASS(insn.code) != BPF_ALU &&
37537bdc97beSJakub Kicinski 		    BPF_CLASS(insn.code) != BPF_ALU64 &&
37547bdc97beSJakub Kicinski 		    BPF_CLASS(insn.code) != BPF_JMP)
37556c59500cSJakub Kicinski 			continue;
37566c59500cSJakub Kicinski 		if (BPF_SRC(insn.code) != BPF_K)
37576c59500cSJakub Kicinski 			continue;
37586c59500cSJakub Kicinski 		if (insn.imm >= 0)
37596c59500cSJakub Kicinski 			continue;
37606c59500cSJakub Kicinski 
37617bdc97beSJakub Kicinski 		if (BPF_CLASS(insn.code) == BPF_JMP) {
37627bdc97beSJakub Kicinski 			switch (BPF_OP(insn.code)) {
37637bdc97beSJakub Kicinski 			case BPF_JGE:
37647bdc97beSJakub Kicinski 			case BPF_JSGE:
37657bdc97beSJakub Kicinski 			case BPF_JLT:
37667bdc97beSJakub Kicinski 			case BPF_JSLT:
37677bdc97beSJakub Kicinski 				meta->jump_neg_op = true;
37687bdc97beSJakub Kicinski 				break;
37697bdc97beSJakub Kicinski 			default:
37707bdc97beSJakub Kicinski 				continue;
37717bdc97beSJakub Kicinski 			}
37727bdc97beSJakub Kicinski 		} else {
37736c59500cSJakub Kicinski 			if (BPF_OP(insn.code) == BPF_ADD)
37746c59500cSJakub Kicinski 				insn.code = BPF_CLASS(insn.code) | BPF_SUB;
37756c59500cSJakub Kicinski 			else if (BPF_OP(insn.code) == BPF_SUB)
37766c59500cSJakub Kicinski 				insn.code = BPF_CLASS(insn.code) | BPF_ADD;
37776c59500cSJakub Kicinski 			else
37786c59500cSJakub Kicinski 				continue;
37796c59500cSJakub Kicinski 
37806c59500cSJakub Kicinski 			meta->insn.code = insn.code | BPF_K;
37817bdc97beSJakub Kicinski 		}
37826c59500cSJakub Kicinski 
37836c59500cSJakub Kicinski 		meta->insn.imm = -insn.imm;
37846c59500cSJakub Kicinski 	}
37856c59500cSJakub Kicinski }
37866c59500cSJakub Kicinski 
3787d9ae7f2bSJakub Kicinski /* Remove masking after load since our load guarantees this is not needed */
3788d9ae7f2bSJakub Kicinski static void nfp_bpf_opt_ld_mask(struct nfp_prog *nfp_prog)
3789d9ae7f2bSJakub Kicinski {
3790d9ae7f2bSJakub Kicinski 	struct nfp_insn_meta *meta1, *meta2;
3791d9ae7f2bSJakub Kicinski 	const s32 exp_mask[] = {
3792d9ae7f2bSJakub Kicinski 		[BPF_B] = 0x000000ffU,
3793d9ae7f2bSJakub Kicinski 		[BPF_H] = 0x0000ffffU,
3794d9ae7f2bSJakub Kicinski 		[BPF_W] = 0xffffffffU,
3795d9ae7f2bSJakub Kicinski 	};
3796d9ae7f2bSJakub Kicinski 
3797d9ae7f2bSJakub Kicinski 	nfp_for_each_insn_walk2(nfp_prog, meta1, meta2) {
3798d9ae7f2bSJakub Kicinski 		struct bpf_insn insn, next;
3799d9ae7f2bSJakub Kicinski 
3800d9ae7f2bSJakub Kicinski 		insn = meta1->insn;
3801d9ae7f2bSJakub Kicinski 		next = meta2->insn;
3802d9ae7f2bSJakub Kicinski 
3803d9ae7f2bSJakub Kicinski 		if (BPF_CLASS(insn.code) != BPF_LD)
3804d9ae7f2bSJakub Kicinski 			continue;
3805d9ae7f2bSJakub Kicinski 		if (BPF_MODE(insn.code) != BPF_ABS &&
3806d9ae7f2bSJakub Kicinski 		    BPF_MODE(insn.code) != BPF_IND)
3807d9ae7f2bSJakub Kicinski 			continue;
3808d9ae7f2bSJakub Kicinski 
3809d9ae7f2bSJakub Kicinski 		if (next.code != (BPF_ALU64 | BPF_AND | BPF_K))
3810d9ae7f2bSJakub Kicinski 			continue;
3811d9ae7f2bSJakub Kicinski 
3812d9ae7f2bSJakub Kicinski 		if (!exp_mask[BPF_SIZE(insn.code)])
3813d9ae7f2bSJakub Kicinski 			continue;
3814d9ae7f2bSJakub Kicinski 		if (exp_mask[BPF_SIZE(insn.code)] != next.imm)
3815d9ae7f2bSJakub Kicinski 			continue;
3816d9ae7f2bSJakub Kicinski 
3817d9ae7f2bSJakub Kicinski 		if (next.src_reg || next.dst_reg)
3818d9ae7f2bSJakub Kicinski 			continue;
3819d9ae7f2bSJakub Kicinski 
38201266f5d6SJiong Wang 		if (meta2->flags & FLAG_INSN_IS_JUMP_DST)
38211266f5d6SJiong Wang 			continue;
38221266f5d6SJiong Wang 
3823d9ae7f2bSJakub Kicinski 		meta2->skip = true;
3824d9ae7f2bSJakub Kicinski 	}
3825d9ae7f2bSJakub Kicinski }
3826d9ae7f2bSJakub Kicinski 
3827d9ae7f2bSJakub Kicinski static void nfp_bpf_opt_ld_shift(struct nfp_prog *nfp_prog)
3828d9ae7f2bSJakub Kicinski {
3829d9ae7f2bSJakub Kicinski 	struct nfp_insn_meta *meta1, *meta2, *meta3;
3830d9ae7f2bSJakub Kicinski 
3831d9ae7f2bSJakub Kicinski 	nfp_for_each_insn_walk3(nfp_prog, meta1, meta2, meta3) {
3832d9ae7f2bSJakub Kicinski 		struct bpf_insn insn, next1, next2;
3833d9ae7f2bSJakub Kicinski 
3834d9ae7f2bSJakub Kicinski 		insn = meta1->insn;
3835d9ae7f2bSJakub Kicinski 		next1 = meta2->insn;
3836d9ae7f2bSJakub Kicinski 		next2 = meta3->insn;
3837d9ae7f2bSJakub Kicinski 
3838d9ae7f2bSJakub Kicinski 		if (BPF_CLASS(insn.code) != BPF_LD)
3839d9ae7f2bSJakub Kicinski 			continue;
3840d9ae7f2bSJakub Kicinski 		if (BPF_MODE(insn.code) != BPF_ABS &&
3841d9ae7f2bSJakub Kicinski 		    BPF_MODE(insn.code) != BPF_IND)
3842d9ae7f2bSJakub Kicinski 			continue;
3843d9ae7f2bSJakub Kicinski 		if (BPF_SIZE(insn.code) != BPF_W)
3844d9ae7f2bSJakub Kicinski 			continue;
3845d9ae7f2bSJakub Kicinski 
3846d9ae7f2bSJakub Kicinski 		if (!(next1.code == (BPF_LSH | BPF_K | BPF_ALU64) &&
3847d9ae7f2bSJakub Kicinski 		      next2.code == (BPF_RSH | BPF_K | BPF_ALU64)) &&
3848d9ae7f2bSJakub Kicinski 		    !(next1.code == (BPF_RSH | BPF_K | BPF_ALU64) &&
3849d9ae7f2bSJakub Kicinski 		      next2.code == (BPF_LSH | BPF_K | BPF_ALU64)))
3850d9ae7f2bSJakub Kicinski 			continue;
3851d9ae7f2bSJakub Kicinski 
3852d9ae7f2bSJakub Kicinski 		if (next1.src_reg || next1.dst_reg ||
3853d9ae7f2bSJakub Kicinski 		    next2.src_reg || next2.dst_reg)
3854d9ae7f2bSJakub Kicinski 			continue;
3855d9ae7f2bSJakub Kicinski 
3856d9ae7f2bSJakub Kicinski 		if (next1.imm != 0x20 || next2.imm != 0x20)
3857d9ae7f2bSJakub Kicinski 			continue;
3858d9ae7f2bSJakub Kicinski 
385929fe46efSJiong Wang 		if (meta2->flags & FLAG_INSN_IS_JUMP_DST ||
386029fe46efSJiong Wang 		    meta3->flags & FLAG_INSN_IS_JUMP_DST)
386129fe46efSJiong Wang 			continue;
386229fe46efSJiong Wang 
3863d9ae7f2bSJakub Kicinski 		meta2->skip = true;
3864d9ae7f2bSJakub Kicinski 		meta3->skip = true;
3865d9ae7f2bSJakub Kicinski 	}
3866d9ae7f2bSJakub Kicinski }
3867d9ae7f2bSJakub Kicinski 
38686bc7103cSJiong Wang /* load/store pair that forms memory copy sould look like the following:
38696bc7103cSJiong Wang  *
38706bc7103cSJiong Wang  *   ld_width R, [addr_src + offset_src]
38716bc7103cSJiong Wang  *   st_width [addr_dest + offset_dest], R
38726bc7103cSJiong Wang  *
38736bc7103cSJiong Wang  * The destination register of load and source register of store should
38746bc7103cSJiong Wang  * be the same, load and store should also perform at the same width.
38756bc7103cSJiong Wang  * If either of addr_src or addr_dest is stack pointer, we don't do the
38766bc7103cSJiong Wang  * CPP optimization as stack is modelled by registers on NFP.
38776bc7103cSJiong Wang  */
38786bc7103cSJiong Wang static bool
38796bc7103cSJiong Wang curr_pair_is_memcpy(struct nfp_insn_meta *ld_meta,
38806bc7103cSJiong Wang 		    struct nfp_insn_meta *st_meta)
38816bc7103cSJiong Wang {
38826bc7103cSJiong Wang 	struct bpf_insn *ld = &ld_meta->insn;
38836bc7103cSJiong Wang 	struct bpf_insn *st = &st_meta->insn;
38846bc7103cSJiong Wang 
38856bc7103cSJiong Wang 	if (!is_mbpf_load(ld_meta) || !is_mbpf_store(st_meta))
38866bc7103cSJiong Wang 		return false;
38876bc7103cSJiong Wang 
3888cc0dff6dSJiong Wang 	if (ld_meta->ptr.type != PTR_TO_PACKET &&
3889cc0dff6dSJiong Wang 	    ld_meta->ptr.type != PTR_TO_MAP_VALUE)
38906bc7103cSJiong Wang 		return false;
38916bc7103cSJiong Wang 
38926bc7103cSJiong Wang 	if (st_meta->ptr.type != PTR_TO_PACKET)
38936bc7103cSJiong Wang 		return false;
38946bc7103cSJiong Wang 
38956bc7103cSJiong Wang 	if (BPF_SIZE(ld->code) != BPF_SIZE(st->code))
38966bc7103cSJiong Wang 		return false;
38976bc7103cSJiong Wang 
38986bc7103cSJiong Wang 	if (ld->dst_reg != st->src_reg)
38996bc7103cSJiong Wang 		return false;
39006bc7103cSJiong Wang 
39016bc7103cSJiong Wang 	/* There is jump to the store insn in this pair. */
39026bc7103cSJiong Wang 	if (st_meta->flags & FLAG_INSN_IS_JUMP_DST)
39036bc7103cSJiong Wang 		return false;
39046bc7103cSJiong Wang 
39056bc7103cSJiong Wang 	return true;
39066bc7103cSJiong Wang }
39076bc7103cSJiong Wang 
39086bc7103cSJiong Wang /* Currently, we only support chaining load/store pairs if:
39096bc7103cSJiong Wang  *
39106bc7103cSJiong Wang  *  - Their address base registers are the same.
39116bc7103cSJiong Wang  *  - Their address offsets are in the same order.
39126bc7103cSJiong Wang  *  - They operate at the same memory width.
39136bc7103cSJiong Wang  *  - There is no jump into the middle of them.
39146bc7103cSJiong Wang  */
39156bc7103cSJiong Wang static bool
39166bc7103cSJiong Wang curr_pair_chain_with_previous(struct nfp_insn_meta *ld_meta,
39176bc7103cSJiong Wang 			      struct nfp_insn_meta *st_meta,
39186bc7103cSJiong Wang 			      struct bpf_insn *prev_ld,
39196bc7103cSJiong Wang 			      struct bpf_insn *prev_st)
39206bc7103cSJiong Wang {
39216bc7103cSJiong Wang 	u8 prev_size, curr_size, prev_ld_base, prev_st_base, prev_ld_dst;
39226bc7103cSJiong Wang 	struct bpf_insn *ld = &ld_meta->insn;
39236bc7103cSJiong Wang 	struct bpf_insn *st = &st_meta->insn;
39246bc7103cSJiong Wang 	s16 prev_ld_off, prev_st_off;
39256bc7103cSJiong Wang 
39266bc7103cSJiong Wang 	/* This pair is the start pair. */
39276bc7103cSJiong Wang 	if (!prev_ld)
39286bc7103cSJiong Wang 		return true;
39296bc7103cSJiong Wang 
39306bc7103cSJiong Wang 	prev_size = BPF_LDST_BYTES(prev_ld);
39316bc7103cSJiong Wang 	curr_size = BPF_LDST_BYTES(ld);
39326bc7103cSJiong Wang 	prev_ld_base = prev_ld->src_reg;
39336bc7103cSJiong Wang 	prev_st_base = prev_st->dst_reg;
39346bc7103cSJiong Wang 	prev_ld_dst = prev_ld->dst_reg;
39356bc7103cSJiong Wang 	prev_ld_off = prev_ld->off;
39366bc7103cSJiong Wang 	prev_st_off = prev_st->off;
39376bc7103cSJiong Wang 
39386bc7103cSJiong Wang 	if (ld->dst_reg != prev_ld_dst)
39396bc7103cSJiong Wang 		return false;
39406bc7103cSJiong Wang 
39416bc7103cSJiong Wang 	if (ld->src_reg != prev_ld_base || st->dst_reg != prev_st_base)
39426bc7103cSJiong Wang 		return false;
39436bc7103cSJiong Wang 
39446bc7103cSJiong Wang 	if (curr_size != prev_size)
39456bc7103cSJiong Wang 		return false;
39466bc7103cSJiong Wang 
39476bc7103cSJiong Wang 	/* There is jump to the head of this pair. */
39486bc7103cSJiong Wang 	if (ld_meta->flags & FLAG_INSN_IS_JUMP_DST)
39496bc7103cSJiong Wang 		return false;
39506bc7103cSJiong Wang 
39516bc7103cSJiong Wang 	/* Both in ascending order. */
39526bc7103cSJiong Wang 	if (prev_ld_off + prev_size == ld->off &&
39536bc7103cSJiong Wang 	    prev_st_off + prev_size == st->off)
39546bc7103cSJiong Wang 		return true;
39556bc7103cSJiong Wang 
39566bc7103cSJiong Wang 	/* Both in descending order. */
39576bc7103cSJiong Wang 	if (ld->off + curr_size == prev_ld_off &&
39586bc7103cSJiong Wang 	    st->off + curr_size == prev_st_off)
39596bc7103cSJiong Wang 		return true;
39606bc7103cSJiong Wang 
39616bc7103cSJiong Wang 	return false;
39626bc7103cSJiong Wang }
39636bc7103cSJiong Wang 
39646bc7103cSJiong Wang /* Return TRUE if cross memory access happens. Cross memory access means
39656bc7103cSJiong Wang  * store area is overlapping with load area that a later load might load
39666bc7103cSJiong Wang  * the value from previous store, for this case we can't treat the sequence
39676bc7103cSJiong Wang  * as an memory copy.
39686bc7103cSJiong Wang  */
39696bc7103cSJiong Wang static bool
39706bc7103cSJiong Wang cross_mem_access(struct bpf_insn *ld, struct nfp_insn_meta *head_ld_meta,
39716bc7103cSJiong Wang 		 struct nfp_insn_meta *head_st_meta)
39726bc7103cSJiong Wang {
39736bc7103cSJiong Wang 	s16 head_ld_off, head_st_off, ld_off;
39746bc7103cSJiong Wang 
39756bc7103cSJiong Wang 	/* Different pointer types does not overlap. */
39766bc7103cSJiong Wang 	if (head_ld_meta->ptr.type != head_st_meta->ptr.type)
39776bc7103cSJiong Wang 		return false;
39786bc7103cSJiong Wang 
39796bc7103cSJiong Wang 	/* load and store are both PTR_TO_PACKET, check ID info.  */
39806bc7103cSJiong Wang 	if (head_ld_meta->ptr.id != head_st_meta->ptr.id)
39816bc7103cSJiong Wang 		return true;
39826bc7103cSJiong Wang 
39836bc7103cSJiong Wang 	/* Canonicalize the offsets. Turn all of them against the original
39846bc7103cSJiong Wang 	 * base register.
39856bc7103cSJiong Wang 	 */
39866bc7103cSJiong Wang 	head_ld_off = head_ld_meta->insn.off + head_ld_meta->ptr.off;
39876bc7103cSJiong Wang 	head_st_off = head_st_meta->insn.off + head_st_meta->ptr.off;
39886bc7103cSJiong Wang 	ld_off = ld->off + head_ld_meta->ptr.off;
39896bc7103cSJiong Wang 
39906bc7103cSJiong Wang 	/* Ascending order cross. */
39916bc7103cSJiong Wang 	if (ld_off > head_ld_off &&
39926bc7103cSJiong Wang 	    head_ld_off < head_st_off && ld_off >= head_st_off)
39936bc7103cSJiong Wang 		return true;
39946bc7103cSJiong Wang 
39956bc7103cSJiong Wang 	/* Descending order cross. */
39966bc7103cSJiong Wang 	if (ld_off < head_ld_off &&
39976bc7103cSJiong Wang 	    head_ld_off > head_st_off && ld_off <= head_st_off)
39986bc7103cSJiong Wang 		return true;
39996bc7103cSJiong Wang 
40006bc7103cSJiong Wang 	return false;
40016bc7103cSJiong Wang }
40026bc7103cSJiong Wang 
40036bc7103cSJiong Wang /* This pass try to identify the following instructoin sequences.
40046bc7103cSJiong Wang  *
40056bc7103cSJiong Wang  *   load R, [regA + offA]
40066bc7103cSJiong Wang  *   store [regB + offB], R
40076bc7103cSJiong Wang  *   load R, [regA + offA + const_imm_A]
40086bc7103cSJiong Wang  *   store [regB + offB + const_imm_A], R
40096bc7103cSJiong Wang  *   load R, [regA + offA + 2 * const_imm_A]
40106bc7103cSJiong Wang  *   store [regB + offB + 2 * const_imm_A], R
40116bc7103cSJiong Wang  *   ...
40126bc7103cSJiong Wang  *
40136bc7103cSJiong Wang  * Above sequence is typically generated by compiler when lowering
40146bc7103cSJiong Wang  * memcpy. NFP prefer using CPP instructions to accelerate it.
40156bc7103cSJiong Wang  */
40166bc7103cSJiong Wang static void nfp_bpf_opt_ldst_gather(struct nfp_prog *nfp_prog)
40176bc7103cSJiong Wang {
40186bc7103cSJiong Wang 	struct nfp_insn_meta *head_ld_meta = NULL;
40196bc7103cSJiong Wang 	struct nfp_insn_meta *head_st_meta = NULL;
40206bc7103cSJiong Wang 	struct nfp_insn_meta *meta1, *meta2;
40216bc7103cSJiong Wang 	struct bpf_insn *prev_ld = NULL;
40226bc7103cSJiong Wang 	struct bpf_insn *prev_st = NULL;
40236bc7103cSJiong Wang 	u8 count = 0;
40246bc7103cSJiong Wang 
40256bc7103cSJiong Wang 	nfp_for_each_insn_walk2(nfp_prog, meta1, meta2) {
40266bc7103cSJiong Wang 		struct bpf_insn *ld = &meta1->insn;
40276bc7103cSJiong Wang 		struct bpf_insn *st = &meta2->insn;
40286bc7103cSJiong Wang 
40296bc7103cSJiong Wang 		/* Reset record status if any of the following if true:
40306bc7103cSJiong Wang 		 *   - The current insn pair is not load/store.
40316bc7103cSJiong Wang 		 *   - The load/store pair doesn't chain with previous one.
40326bc7103cSJiong Wang 		 *   - The chained load/store pair crossed with previous pair.
40336bc7103cSJiong Wang 		 *   - The chained load/store pair has a total size of memory
40346bc7103cSJiong Wang 		 *     copy beyond 128 bytes which is the maximum length a
40356bc7103cSJiong Wang 		 *     single NFP CPP command can transfer.
40366bc7103cSJiong Wang 		 */
40376bc7103cSJiong Wang 		if (!curr_pair_is_memcpy(meta1, meta2) ||
40386bc7103cSJiong Wang 		    !curr_pair_chain_with_previous(meta1, meta2, prev_ld,
40396bc7103cSJiong Wang 						   prev_st) ||
40406bc7103cSJiong Wang 		    (head_ld_meta && (cross_mem_access(ld, head_ld_meta,
40416bc7103cSJiong Wang 						       head_st_meta) ||
40426bc7103cSJiong Wang 				      head_ld_meta->ldst_gather_len >= 128))) {
40436bc7103cSJiong Wang 			if (!count)
40446bc7103cSJiong Wang 				continue;
40456bc7103cSJiong Wang 
40466bc7103cSJiong Wang 			if (count > 1) {
40476bc7103cSJiong Wang 				s16 prev_ld_off = prev_ld->off;
40486bc7103cSJiong Wang 				s16 prev_st_off = prev_st->off;
40496bc7103cSJiong Wang 				s16 head_ld_off = head_ld_meta->insn.off;
40506bc7103cSJiong Wang 
40516bc7103cSJiong Wang 				if (prev_ld_off < head_ld_off) {
40526bc7103cSJiong Wang 					head_ld_meta->insn.off = prev_ld_off;
40536bc7103cSJiong Wang 					head_st_meta->insn.off = prev_st_off;
40546bc7103cSJiong Wang 					head_ld_meta->ldst_gather_len =
40556bc7103cSJiong Wang 						-head_ld_meta->ldst_gather_len;
40566bc7103cSJiong Wang 				}
40576bc7103cSJiong Wang 
40586bc7103cSJiong Wang 				head_ld_meta->paired_st = &head_st_meta->insn;
40596bc7103cSJiong Wang 				head_st_meta->skip = true;
40606bc7103cSJiong Wang 			} else {
40616bc7103cSJiong Wang 				head_ld_meta->ldst_gather_len = 0;
40626bc7103cSJiong Wang 			}
40636bc7103cSJiong Wang 
40646bc7103cSJiong Wang 			/* If the chain is ended by an load/store pair then this
40656bc7103cSJiong Wang 			 * could serve as the new head of the the next chain.
40666bc7103cSJiong Wang 			 */
40676bc7103cSJiong Wang 			if (curr_pair_is_memcpy(meta1, meta2)) {
40686bc7103cSJiong Wang 				head_ld_meta = meta1;
40696bc7103cSJiong Wang 				head_st_meta = meta2;
40706bc7103cSJiong Wang 				head_ld_meta->ldst_gather_len =
40716bc7103cSJiong Wang 					BPF_LDST_BYTES(ld);
40726bc7103cSJiong Wang 				meta1 = nfp_meta_next(meta1);
40736bc7103cSJiong Wang 				meta2 = nfp_meta_next(meta2);
40746bc7103cSJiong Wang 				prev_ld = ld;
40756bc7103cSJiong Wang 				prev_st = st;
40766bc7103cSJiong Wang 				count = 1;
40776bc7103cSJiong Wang 			} else {
40786bc7103cSJiong Wang 				head_ld_meta = NULL;
40796bc7103cSJiong Wang 				head_st_meta = NULL;
40806bc7103cSJiong Wang 				prev_ld = NULL;
40816bc7103cSJiong Wang 				prev_st = NULL;
40826bc7103cSJiong Wang 				count = 0;
40836bc7103cSJiong Wang 			}
40846bc7103cSJiong Wang 
40856bc7103cSJiong Wang 			continue;
40866bc7103cSJiong Wang 		}
40876bc7103cSJiong Wang 
40886bc7103cSJiong Wang 		if (!head_ld_meta) {
40896bc7103cSJiong Wang 			head_ld_meta = meta1;
40906bc7103cSJiong Wang 			head_st_meta = meta2;
40916bc7103cSJiong Wang 		} else {
40926bc7103cSJiong Wang 			meta1->skip = true;
40936bc7103cSJiong Wang 			meta2->skip = true;
40946bc7103cSJiong Wang 		}
40956bc7103cSJiong Wang 
40966bc7103cSJiong Wang 		head_ld_meta->ldst_gather_len += BPF_LDST_BYTES(ld);
40976bc7103cSJiong Wang 		meta1 = nfp_meta_next(meta1);
40986bc7103cSJiong Wang 		meta2 = nfp_meta_next(meta2);
40996bc7103cSJiong Wang 		prev_ld = ld;
41006bc7103cSJiong Wang 		prev_st = st;
41016bc7103cSJiong Wang 		count++;
41026bc7103cSJiong Wang 	}
41036bc7103cSJiong Wang }
41046bc7103cSJiong Wang 
410587b10ecdSJiong Wang static void nfp_bpf_opt_pkt_cache(struct nfp_prog *nfp_prog)
410687b10ecdSJiong Wang {
410787b10ecdSJiong Wang 	struct nfp_insn_meta *meta, *range_node = NULL;
410887b10ecdSJiong Wang 	s16 range_start = 0, range_end = 0;
410987b10ecdSJiong Wang 	bool cache_avail = false;
411087b10ecdSJiong Wang 	struct bpf_insn *insn;
411187b10ecdSJiong Wang 	s32 range_ptr_off = 0;
411287b10ecdSJiong Wang 	u32 range_ptr_id = 0;
411387b10ecdSJiong Wang 
411487b10ecdSJiong Wang 	list_for_each_entry(meta, &nfp_prog->insns, l) {
411587b10ecdSJiong Wang 		if (meta->flags & FLAG_INSN_IS_JUMP_DST)
411687b10ecdSJiong Wang 			cache_avail = false;
411787b10ecdSJiong Wang 
411887b10ecdSJiong Wang 		if (meta->skip)
411987b10ecdSJiong Wang 			continue;
412087b10ecdSJiong Wang 
412187b10ecdSJiong Wang 		insn = &meta->insn;
412287b10ecdSJiong Wang 
412387b10ecdSJiong Wang 		if (is_mbpf_store_pkt(meta) ||
412487b10ecdSJiong Wang 		    insn->code == (BPF_JMP | BPF_CALL) ||
412587b10ecdSJiong Wang 		    is_mbpf_classic_store_pkt(meta) ||
412687b10ecdSJiong Wang 		    is_mbpf_classic_load(meta)) {
412787b10ecdSJiong Wang 			cache_avail = false;
412887b10ecdSJiong Wang 			continue;
412987b10ecdSJiong Wang 		}
413087b10ecdSJiong Wang 
413187b10ecdSJiong Wang 		if (!is_mbpf_load(meta))
413287b10ecdSJiong Wang 			continue;
413387b10ecdSJiong Wang 
413487b10ecdSJiong Wang 		if (meta->ptr.type != PTR_TO_PACKET || meta->ldst_gather_len) {
413587b10ecdSJiong Wang 			cache_avail = false;
413687b10ecdSJiong Wang 			continue;
413787b10ecdSJiong Wang 		}
413887b10ecdSJiong Wang 
413987b10ecdSJiong Wang 		if (!cache_avail) {
414087b10ecdSJiong Wang 			cache_avail = true;
414187b10ecdSJiong Wang 			if (range_node)
414287b10ecdSJiong Wang 				goto end_current_then_start_new;
414387b10ecdSJiong Wang 			goto start_new;
414487b10ecdSJiong Wang 		}
414587b10ecdSJiong Wang 
414687b10ecdSJiong Wang 		/* Check ID to make sure two reads share the same
414787b10ecdSJiong Wang 		 * variable offset against PTR_TO_PACKET, and check OFF
414887b10ecdSJiong Wang 		 * to make sure they also share the same constant
414987b10ecdSJiong Wang 		 * offset.
415087b10ecdSJiong Wang 		 *
415187b10ecdSJiong Wang 		 * OFFs don't really need to be the same, because they
415287b10ecdSJiong Wang 		 * are the constant offsets against PTR_TO_PACKET, so
415387b10ecdSJiong Wang 		 * for different OFFs, we could canonicalize them to
415487b10ecdSJiong Wang 		 * offsets against original packet pointer. We don't
415587b10ecdSJiong Wang 		 * support this.
415687b10ecdSJiong Wang 		 */
415787b10ecdSJiong Wang 		if (meta->ptr.id == range_ptr_id &&
415887b10ecdSJiong Wang 		    meta->ptr.off == range_ptr_off) {
415987b10ecdSJiong Wang 			s16 new_start = range_start;
416087b10ecdSJiong Wang 			s16 end, off = insn->off;
416187b10ecdSJiong Wang 			s16 new_end = range_end;
416287b10ecdSJiong Wang 			bool changed = false;
416387b10ecdSJiong Wang 
416487b10ecdSJiong Wang 			if (off < range_start) {
416587b10ecdSJiong Wang 				new_start = off;
416687b10ecdSJiong Wang 				changed = true;
416787b10ecdSJiong Wang 			}
416887b10ecdSJiong Wang 
416987b10ecdSJiong Wang 			end = off + BPF_LDST_BYTES(insn);
417087b10ecdSJiong Wang 			if (end > range_end) {
417187b10ecdSJiong Wang 				new_end = end;
417287b10ecdSJiong Wang 				changed = true;
417387b10ecdSJiong Wang 			}
417487b10ecdSJiong Wang 
417587b10ecdSJiong Wang 			if (!changed)
417687b10ecdSJiong Wang 				continue;
417787b10ecdSJiong Wang 
417887b10ecdSJiong Wang 			if (new_end - new_start <= 64) {
417987b10ecdSJiong Wang 				/* Install new range. */
418087b10ecdSJiong Wang 				range_start = new_start;
418187b10ecdSJiong Wang 				range_end = new_end;
418287b10ecdSJiong Wang 				continue;
418387b10ecdSJiong Wang 			}
418487b10ecdSJiong Wang 		}
418587b10ecdSJiong Wang 
418687b10ecdSJiong Wang end_current_then_start_new:
418787b10ecdSJiong Wang 		range_node->pkt_cache.range_start = range_start;
418887b10ecdSJiong Wang 		range_node->pkt_cache.range_end = range_end;
418987b10ecdSJiong Wang start_new:
419087b10ecdSJiong Wang 		range_node = meta;
419187b10ecdSJiong Wang 		range_node->pkt_cache.do_init = true;
419287b10ecdSJiong Wang 		range_ptr_id = range_node->ptr.id;
419387b10ecdSJiong Wang 		range_ptr_off = range_node->ptr.off;
419487b10ecdSJiong Wang 		range_start = insn->off;
419587b10ecdSJiong Wang 		range_end = insn->off + BPF_LDST_BYTES(insn);
419687b10ecdSJiong Wang 	}
419787b10ecdSJiong Wang 
419887b10ecdSJiong Wang 	if (range_node) {
419987b10ecdSJiong Wang 		range_node->pkt_cache.range_start = range_start;
420087b10ecdSJiong Wang 		range_node->pkt_cache.range_end = range_end;
420187b10ecdSJiong Wang 	}
420287b10ecdSJiong Wang 
420387b10ecdSJiong Wang 	list_for_each_entry(meta, &nfp_prog->insns, l) {
420487b10ecdSJiong Wang 		if (meta->skip)
420587b10ecdSJiong Wang 			continue;
420687b10ecdSJiong Wang 
420787b10ecdSJiong Wang 		if (is_mbpf_load_pkt(meta) && !meta->ldst_gather_len) {
420887b10ecdSJiong Wang 			if (meta->pkt_cache.do_init) {
420987b10ecdSJiong Wang 				range_start = meta->pkt_cache.range_start;
421087b10ecdSJiong Wang 				range_end = meta->pkt_cache.range_end;
421187b10ecdSJiong Wang 			} else {
421287b10ecdSJiong Wang 				meta->pkt_cache.range_start = range_start;
421387b10ecdSJiong Wang 				meta->pkt_cache.range_end = range_end;
421487b10ecdSJiong Wang 			}
421587b10ecdSJiong Wang 		}
421687b10ecdSJiong Wang 	}
421787b10ecdSJiong Wang }
421887b10ecdSJiong Wang 
4219d9ae7f2bSJakub Kicinski static int nfp_bpf_optimize(struct nfp_prog *nfp_prog)
4220d9ae7f2bSJakub Kicinski {
4221d9ae7f2bSJakub Kicinski 	nfp_bpf_opt_reg_init(nfp_prog);
4222d9ae7f2bSJakub Kicinski 
42236c59500cSJakub Kicinski 	nfp_bpf_opt_neg_add_sub(nfp_prog);
4224d9ae7f2bSJakub Kicinski 	nfp_bpf_opt_ld_mask(nfp_prog);
4225d9ae7f2bSJakub Kicinski 	nfp_bpf_opt_ld_shift(nfp_prog);
42266bc7103cSJiong Wang 	nfp_bpf_opt_ldst_gather(nfp_prog);
422787b10ecdSJiong Wang 	nfp_bpf_opt_pkt_cache(nfp_prog);
4228d9ae7f2bSJakub Kicinski 
4229d9ae7f2bSJakub Kicinski 	return 0;
4230d9ae7f2bSJakub Kicinski }
4231d9ae7f2bSJakub Kicinski 
4232b4264c96SJakub Kicinski static int nfp_bpf_replace_map_ptrs(struct nfp_prog *nfp_prog)
4233b4264c96SJakub Kicinski {
4234b4264c96SJakub Kicinski 	struct nfp_insn_meta *meta1, *meta2;
4235b4264c96SJakub Kicinski 	struct nfp_bpf_map *nfp_map;
4236b4264c96SJakub Kicinski 	struct bpf_map *map;
4237ab01f4acSJakub Kicinski 	u32 id;
4238b4264c96SJakub Kicinski 
4239b4264c96SJakub Kicinski 	nfp_for_each_insn_walk2(nfp_prog, meta1, meta2) {
4240b4264c96SJakub Kicinski 		if (meta1->skip || meta2->skip)
4241b4264c96SJakub Kicinski 			continue;
4242b4264c96SJakub Kicinski 
4243b4264c96SJakub Kicinski 		if (meta1->insn.code != (BPF_LD | BPF_IMM | BPF_DW) ||
4244b4264c96SJakub Kicinski 		    meta1->insn.src_reg != BPF_PSEUDO_MAP_FD)
4245b4264c96SJakub Kicinski 			continue;
4246b4264c96SJakub Kicinski 
4247b4264c96SJakub Kicinski 		map = (void *)(unsigned long)((u32)meta1->insn.imm |
4248b4264c96SJakub Kicinski 					      (u64)meta2->insn.imm << 32);
4249ab01f4acSJakub Kicinski 		if (bpf_map_offload_neutral(map)) {
4250ab01f4acSJakub Kicinski 			id = map->id;
4251ab01f4acSJakub Kicinski 		} else {
4252b4264c96SJakub Kicinski 			nfp_map = map_to_offmap(map)->dev_priv;
4253ab01f4acSJakub Kicinski 			id = nfp_map->tid;
4254ab01f4acSJakub Kicinski 		}
4255b4264c96SJakub Kicinski 
4256ab01f4acSJakub Kicinski 		meta1->insn.imm = id;
4257b4264c96SJakub Kicinski 		meta2->insn.imm = 0;
4258b4264c96SJakub Kicinski 	}
4259b4264c96SJakub Kicinski 
4260b4264c96SJakub Kicinski 	return 0;
4261b4264c96SJakub Kicinski }
4262b4264c96SJakub Kicinski 
42632314fe9eSJakub Kicinski static int nfp_bpf_ustore_calc(u64 *prog, unsigned int len)
4264fd068ddcSJakub Kicinski {
42652314fe9eSJakub Kicinski 	__le64 *ustore = (__force __le64 *)prog;
4266fd068ddcSJakub Kicinski 	int i;
4267fd068ddcSJakub Kicinski 
42682314fe9eSJakub Kicinski 	for (i = 0; i < len; i++) {
4269fd068ddcSJakub Kicinski 		int err;
4270fd068ddcSJakub Kicinski 
42712314fe9eSJakub Kicinski 		err = nfp_ustore_check_valid_no_ecc(prog[i]);
4272fd068ddcSJakub Kicinski 		if (err)
4273fd068ddcSJakub Kicinski 			return err;
4274fd068ddcSJakub Kicinski 
42752314fe9eSJakub Kicinski 		ustore[i] = cpu_to_le64(nfp_ustore_calc_ecc_insn(prog[i]));
4276fd068ddcSJakub Kicinski 	}
4277fd068ddcSJakub Kicinski 
4278fd068ddcSJakub Kicinski 	return 0;
4279fd068ddcSJakub Kicinski }
4280fd068ddcSJakub Kicinski 
428144a12eccSJakub Kicinski static void nfp_bpf_prog_trim(struct nfp_prog *nfp_prog)
428244a12eccSJakub Kicinski {
428344a12eccSJakub Kicinski 	void *prog;
428444a12eccSJakub Kicinski 
428544a12eccSJakub Kicinski 	prog = kvmalloc_array(nfp_prog->prog_len, sizeof(u64), GFP_KERNEL);
428644a12eccSJakub Kicinski 	if (!prog)
428744a12eccSJakub Kicinski 		return;
428844a12eccSJakub Kicinski 
428944a12eccSJakub Kicinski 	nfp_prog->__prog_alloc_len = nfp_prog->prog_len * sizeof(u64);
429044a12eccSJakub Kicinski 	memcpy(prog, nfp_prog->prog, nfp_prog->__prog_alloc_len);
429144a12eccSJakub Kicinski 	kvfree(nfp_prog->prog);
429244a12eccSJakub Kicinski 	nfp_prog->prog = prog;
429344a12eccSJakub Kicinski }
429444a12eccSJakub Kicinski 
4295c6c580d7SJakub Kicinski int nfp_bpf_jit(struct nfp_prog *nfp_prog)
4296d9ae7f2bSJakub Kicinski {
4297d9ae7f2bSJakub Kicinski 	int ret;
4298d9ae7f2bSJakub Kicinski 
4299b4264c96SJakub Kicinski 	ret = nfp_bpf_replace_map_ptrs(nfp_prog);
4300b4264c96SJakub Kicinski 	if (ret)
4301b4264c96SJakub Kicinski 		return ret;
4302b4264c96SJakub Kicinski 
4303d9ae7f2bSJakub Kicinski 	ret = nfp_bpf_optimize(nfp_prog);
4304d9ae7f2bSJakub Kicinski 	if (ret)
43059314c442SJakub Kicinski 		return ret;
4306d9ae7f2bSJakub Kicinski 
4307d9ae7f2bSJakub Kicinski 	ret = nfp_translate(nfp_prog);
4308d9ae7f2bSJakub Kicinski 	if (ret) {
4309d9ae7f2bSJakub Kicinski 		pr_err("Translation failed with error %d (translated: %u)\n",
4310d9ae7f2bSJakub Kicinski 		       ret, nfp_prog->n_translated);
43119314c442SJakub Kicinski 		return -EINVAL;
4312d9ae7f2bSJakub Kicinski 	}
4313d9ae7f2bSJakub Kicinski 
431444a12eccSJakub Kicinski 	nfp_bpf_prog_trim(nfp_prog);
431544a12eccSJakub Kicinski 
43162314fe9eSJakub Kicinski 	return ret;
4317d9ae7f2bSJakub Kicinski }
43181549921dSJakub Kicinski 
43191549921dSJakub Kicinski void nfp_bpf_jit_prepare(struct nfp_prog *nfp_prog, unsigned int cnt)
43201549921dSJakub Kicinski {
43211549921dSJakub Kicinski 	struct nfp_insn_meta *meta;
43221549921dSJakub Kicinski 
43231549921dSJakub Kicinski 	/* Another pass to record jump information. */
43241549921dSJakub Kicinski 	list_for_each_entry(meta, &nfp_prog->insns, l) {
43251549921dSJakub Kicinski 		struct nfp_insn_meta *dst_meta;
4326e3b49dc6SQuentin Monnet 		u64 code = meta->insn.code;
4327e3b49dc6SQuentin Monnet 		unsigned int dst_idx;
4328e3b49dc6SQuentin Monnet 		bool pseudo_call;
43291549921dSJakub Kicinski 
4330e3b49dc6SQuentin Monnet 		if (BPF_CLASS(code) != BPF_JMP)
4331e3b49dc6SQuentin Monnet 			continue;
4332e3b49dc6SQuentin Monnet 		if (BPF_OP(code) == BPF_EXIT)
4333e3b49dc6SQuentin Monnet 			continue;
4334e3b49dc6SQuentin Monnet 		if (is_mbpf_helper_call(meta))
4335e3b49dc6SQuentin Monnet 			continue;
43361549921dSJakub Kicinski 
4337e3b49dc6SQuentin Monnet 		/* If opcode is BPF_CALL at this point, this can only be a
4338e3b49dc6SQuentin Monnet 		 * BPF-to-BPF call (a.k.a pseudo call).
4339e3b49dc6SQuentin Monnet 		 */
4340e3b49dc6SQuentin Monnet 		pseudo_call = BPF_OP(code) == BPF_CALL;
4341e3b49dc6SQuentin Monnet 
4342e3b49dc6SQuentin Monnet 		if (pseudo_call)
4343e3b49dc6SQuentin Monnet 			dst_idx = meta->n + 1 + meta->insn.imm;
4344e3b49dc6SQuentin Monnet 		else
4345e3b49dc6SQuentin Monnet 			dst_idx = meta->n + 1 + meta->insn.off;
4346e3b49dc6SQuentin Monnet 
4347e3b49dc6SQuentin Monnet 		dst_meta = nfp_bpf_goto_meta(nfp_prog, meta, dst_idx, cnt);
4348e3b49dc6SQuentin Monnet 
4349e3b49dc6SQuentin Monnet 		if (pseudo_call)
4350e3b49dc6SQuentin Monnet 			dst_meta->flags |= FLAG_INSN_IS_SUBPROG_START;
4351e3b49dc6SQuentin Monnet 
43521549921dSJakub Kicinski 		dst_meta->flags |= FLAG_INSN_IS_JUMP_DST;
4353e3b49dc6SQuentin Monnet 		meta->jmp_dst = dst_meta;
43541549921dSJakub Kicinski 	}
43551549921dSJakub Kicinski }
43562314fe9eSJakub Kicinski 
435774801e50SQuentin Monnet bool nfp_bpf_supported_opcode(u8 code)
435874801e50SQuentin Monnet {
435974801e50SQuentin Monnet 	return !!instr_cb[code];
436074801e50SQuentin Monnet }
436174801e50SQuentin Monnet 
43622314fe9eSJakub Kicinski void *nfp_bpf_relo_for_vnic(struct nfp_prog *nfp_prog, struct nfp_bpf_vnic *bv)
43632314fe9eSJakub Kicinski {
43642314fe9eSJakub Kicinski 	unsigned int i;
43652314fe9eSJakub Kicinski 	u64 *prog;
43662314fe9eSJakub Kicinski 	int err;
43672314fe9eSJakub Kicinski 
43682314fe9eSJakub Kicinski 	prog = kmemdup(nfp_prog->prog, nfp_prog->prog_len * sizeof(u64),
43692314fe9eSJakub Kicinski 		       GFP_KERNEL);
43702314fe9eSJakub Kicinski 	if (!prog)
43712314fe9eSJakub Kicinski 		return ERR_PTR(-ENOMEM);
43722314fe9eSJakub Kicinski 
43732314fe9eSJakub Kicinski 	for (i = 0; i < nfp_prog->prog_len; i++) {
43742314fe9eSJakub Kicinski 		enum nfp_relo_type special;
437577a3d311SJakub Kicinski 		u32 val;
4376389f263bSQuentin Monnet 		u16 off;
43772314fe9eSJakub Kicinski 
43782314fe9eSJakub Kicinski 		special = FIELD_GET(OP_RELO_TYPE, prog[i]);
43792314fe9eSJakub Kicinski 		switch (special) {
43802314fe9eSJakub Kicinski 		case RELO_NONE:
43812314fe9eSJakub Kicinski 			continue;
43822314fe9eSJakub Kicinski 		case RELO_BR_REL:
43832314fe9eSJakub Kicinski 			br_add_offset(&prog[i], bv->start_off);
43842314fe9eSJakub Kicinski 			break;
43852314fe9eSJakub Kicinski 		case RELO_BR_GO_OUT:
43862314fe9eSJakub Kicinski 			br_set_offset(&prog[i],
43872314fe9eSJakub Kicinski 				      nfp_prog->tgt_out + bv->start_off);
43882314fe9eSJakub Kicinski 			break;
43892314fe9eSJakub Kicinski 		case RELO_BR_GO_ABORT:
43902314fe9eSJakub Kicinski 			br_set_offset(&prog[i],
43912314fe9eSJakub Kicinski 				      nfp_prog->tgt_abort + bv->start_off);
43922314fe9eSJakub Kicinski 			break;
4393389f263bSQuentin Monnet 		case RELO_BR_GO_CALL_PUSH_REGS:
439444549623SQuentin Monnet 			if (!nfp_prog->tgt_call_push_regs) {
439544549623SQuentin Monnet 				pr_err("BUG: failed to detect subprogram registers needs\n");
439644549623SQuentin Monnet 				err = -EINVAL;
439744549623SQuentin Monnet 				goto err_free_prog;
439844549623SQuentin Monnet 			}
4399389f263bSQuentin Monnet 			off = nfp_prog->tgt_call_push_regs + bv->start_off;
4400389f263bSQuentin Monnet 			br_set_offset(&prog[i], off);
4401389f263bSQuentin Monnet 			break;
4402389f263bSQuentin Monnet 		case RELO_BR_GO_CALL_POP_REGS:
440344549623SQuentin Monnet 			if (!nfp_prog->tgt_call_pop_regs) {
440444549623SQuentin Monnet 				pr_err("BUG: failed to detect subprogram registers needs\n");
440544549623SQuentin Monnet 				err = -EINVAL;
440644549623SQuentin Monnet 				goto err_free_prog;
440744549623SQuentin Monnet 			}
4408389f263bSQuentin Monnet 			off = nfp_prog->tgt_call_pop_regs + bv->start_off;
4409389f263bSQuentin Monnet 			br_set_offset(&prog[i], off);
4410389f263bSQuentin Monnet 			break;
44112314fe9eSJakub Kicinski 		case RELO_BR_NEXT_PKT:
44122314fe9eSJakub Kicinski 			br_set_offset(&prog[i], bv->tgt_done);
44132314fe9eSJakub Kicinski 			break;
441477a3d311SJakub Kicinski 		case RELO_BR_HELPER:
441577a3d311SJakub Kicinski 			val = br_get_offset(prog[i]);
441677a3d311SJakub Kicinski 			val -= BR_OFF_RELO;
441777a3d311SJakub Kicinski 			switch (val) {
441877a3d311SJakub Kicinski 			case BPF_FUNC_map_lookup_elem:
441977a3d311SJakub Kicinski 				val = nfp_prog->bpf->helpers.map_lookup;
442077a3d311SJakub Kicinski 				break;
442144d65a47SJakub Kicinski 			case BPF_FUNC_map_update_elem:
442244d65a47SJakub Kicinski 				val = nfp_prog->bpf->helpers.map_update;
442344d65a47SJakub Kicinski 				break;
4424bfee64deSJakub Kicinski 			case BPF_FUNC_map_delete_elem:
4425bfee64deSJakub Kicinski 				val = nfp_prog->bpf->helpers.map_delete;
4426bfee64deSJakub Kicinski 				break;
44279816dd35SJakub Kicinski 			case BPF_FUNC_perf_event_output:
44289816dd35SJakub Kicinski 				val = nfp_prog->bpf->helpers.perf_event_output;
44299816dd35SJakub Kicinski 				break;
443077a3d311SJakub Kicinski 			default:
443177a3d311SJakub Kicinski 				pr_err("relocation of unknown helper %d\n",
443277a3d311SJakub Kicinski 				       val);
443377a3d311SJakub Kicinski 				err = -EINVAL;
443477a3d311SJakub Kicinski 				goto err_free_prog;
443577a3d311SJakub Kicinski 			}
443677a3d311SJakub Kicinski 			br_set_offset(&prog[i], val);
443777a3d311SJakub Kicinski 			break;
443877a3d311SJakub Kicinski 		case RELO_IMMED_REL:
443977a3d311SJakub Kicinski 			immed_add_value(&prog[i], bv->start_off);
444077a3d311SJakub Kicinski 			break;
44412314fe9eSJakub Kicinski 		}
44422314fe9eSJakub Kicinski 
44432314fe9eSJakub Kicinski 		prog[i] &= ~OP_RELO_TYPE;
44442314fe9eSJakub Kicinski 	}
44452314fe9eSJakub Kicinski 
44462314fe9eSJakub Kicinski 	err = nfp_bpf_ustore_calc(prog, nfp_prog->prog_len);
44472314fe9eSJakub Kicinski 	if (err)
44482314fe9eSJakub Kicinski 		goto err_free_prog;
44492314fe9eSJakub Kicinski 
44502314fe9eSJakub Kicinski 	return prog;
44512314fe9eSJakub Kicinski 
44522314fe9eSJakub Kicinski err_free_prog:
44532314fe9eSJakub Kicinski 	kfree(prog);
44542314fe9eSJakub Kicinski 	return ERR_PTR(err);
44552314fe9eSJakub Kicinski }
4456