196de2506SJakub Kicinski // SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 296de2506SJakub Kicinski /* Copyright (C) 2016-2018 Netronome Systems, Inc. */ 3d9ae7f2bSJakub Kicinski 4d9ae7f2bSJakub Kicinski #define pr_fmt(fmt) "NFP net bpf: " fmt 5d9ae7f2bSJakub Kicinski 60d49eaf4SJakub Kicinski #include <linux/bug.h> 7d9ae7f2bSJakub Kicinski #include <linux/bpf.h> 8d9ae7f2bSJakub Kicinski #include <linux/filter.h> 92a952b03SJiong Wang #include <linux/kernel.h> 10d9ae7f2bSJakub Kicinski #include <linux/pkt_cls.h> 112a952b03SJiong Wang #include <linux/reciprocal_div.h> 12d9ae7f2bSJakub Kicinski #include <linux/unistd.h> 13d9ae7f2bSJakub Kicinski 14d9ae7f2bSJakub Kicinski #include "main.h" 15d9ae7f2bSJakub Kicinski #include "../nfp_asm.h" 16d985888fSJakub Kicinski #include "../nfp_net_ctrl.h" 17d9ae7f2bSJakub Kicinski 18d9ae7f2bSJakub Kicinski /* --- NFP prog --- */ 19d9ae7f2bSJakub Kicinski /* Foreach "multiple" entries macros provide pos and next<n> pointers. 20d9ae7f2bSJakub Kicinski * It's safe to modify the next pointers (but not pos). 21d9ae7f2bSJakub Kicinski */ 22d9ae7f2bSJakub Kicinski #define nfp_for_each_insn_walk2(nfp_prog, pos, next) \ 23d9ae7f2bSJakub Kicinski for (pos = list_first_entry(&(nfp_prog)->insns, typeof(*pos), l), \ 24d9ae7f2bSJakub Kicinski next = list_next_entry(pos, l); \ 25d9ae7f2bSJakub Kicinski &(nfp_prog)->insns != &pos->l && \ 26d9ae7f2bSJakub Kicinski &(nfp_prog)->insns != &next->l; \ 27d9ae7f2bSJakub Kicinski pos = nfp_meta_next(pos), \ 28d9ae7f2bSJakub Kicinski next = nfp_meta_next(pos)) 29d9ae7f2bSJakub Kicinski 30d9ae7f2bSJakub Kicinski #define nfp_for_each_insn_walk3(nfp_prog, pos, next, next2) \ 31d9ae7f2bSJakub Kicinski for (pos = list_first_entry(&(nfp_prog)->insns, typeof(*pos), l), \ 32d9ae7f2bSJakub Kicinski next = list_next_entry(pos, l), \ 33d9ae7f2bSJakub Kicinski next2 = list_next_entry(next, l); \ 34d9ae7f2bSJakub Kicinski &(nfp_prog)->insns != &pos->l && \ 35d9ae7f2bSJakub Kicinski &(nfp_prog)->insns != &next->l && \ 36d9ae7f2bSJakub Kicinski &(nfp_prog)->insns != &next2->l; \ 37d9ae7f2bSJakub Kicinski pos = nfp_meta_next(pos), \ 38d9ae7f2bSJakub Kicinski next = nfp_meta_next(pos), \ 39d9ae7f2bSJakub Kicinski next2 = nfp_meta_next(next)) 40d9ae7f2bSJakub Kicinski 41d9ae7f2bSJakub Kicinski static bool 42d9ae7f2bSJakub Kicinski nfp_meta_has_prev(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 43d9ae7f2bSJakub Kicinski { 44d9ae7f2bSJakub Kicinski return meta->l.prev != &nfp_prog->insns; 45d9ae7f2bSJakub Kicinski } 46d9ae7f2bSJakub Kicinski 47d9ae7f2bSJakub Kicinski static void nfp_prog_push(struct nfp_prog *nfp_prog, u64 insn) 48d9ae7f2bSJakub Kicinski { 49e8a4796eSJakub Kicinski if (nfp_prog->__prog_alloc_len / sizeof(u64) == nfp_prog->prog_len) { 50e8a4796eSJakub Kicinski pr_warn("instruction limit reached (%u NFP instructions)\n", 51e8a4796eSJakub Kicinski nfp_prog->prog_len); 52d9ae7f2bSJakub Kicinski nfp_prog->error = -ENOSPC; 53d9ae7f2bSJakub Kicinski return; 54d9ae7f2bSJakub Kicinski } 55d9ae7f2bSJakub Kicinski 56d9ae7f2bSJakub Kicinski nfp_prog->prog[nfp_prog->prog_len] = insn; 57d9ae7f2bSJakub Kicinski nfp_prog->prog_len++; 58d9ae7f2bSJakub Kicinski } 59d9ae7f2bSJakub Kicinski 60d9ae7f2bSJakub Kicinski static unsigned int nfp_prog_current_offset(struct nfp_prog *nfp_prog) 61d9ae7f2bSJakub Kicinski { 622314fe9eSJakub Kicinski return nfp_prog->prog_len; 63d9ae7f2bSJakub Kicinski } 64d9ae7f2bSJakub Kicinski 650d49eaf4SJakub Kicinski static bool 660d49eaf4SJakub Kicinski nfp_prog_confirm_current_offset(struct nfp_prog *nfp_prog, unsigned int off) 670d49eaf4SJakub Kicinski { 680d49eaf4SJakub Kicinski /* If there is a recorded error we may have dropped instructions; 690d49eaf4SJakub Kicinski * that doesn't have to be due to translator bug, and the translation 700d49eaf4SJakub Kicinski * will fail anyway, so just return OK. 710d49eaf4SJakub Kicinski */ 720d49eaf4SJakub Kicinski if (nfp_prog->error) 730d49eaf4SJakub Kicinski return true; 740d49eaf4SJakub Kicinski return !WARN_ON_ONCE(nfp_prog_current_offset(nfp_prog) != off); 750d49eaf4SJakub Kicinski } 760d49eaf4SJakub Kicinski 77d9ae7f2bSJakub Kicinski /* --- Emitters --- */ 78d9ae7f2bSJakub Kicinski static void 79d9ae7f2bSJakub Kicinski __emit_cmd(struct nfp_prog *nfp_prog, enum cmd_tgt_map op, 80b556ddd9SJakub Kicinski u8 mode, u8 xfer, u8 areg, u8 breg, u8 size, enum cmd_ctx_swap ctx, 81b556ddd9SJakub Kicinski bool indir) 82d9ae7f2bSJakub Kicinski { 83d9ae7f2bSJakub Kicinski u64 insn; 84d9ae7f2bSJakub Kicinski 85d9ae7f2bSJakub Kicinski insn = FIELD_PREP(OP_CMD_A_SRC, areg) | 86d9ae7f2bSJakub Kicinski FIELD_PREP(OP_CMD_CTX, ctx) | 87d9ae7f2bSJakub Kicinski FIELD_PREP(OP_CMD_B_SRC, breg) | 88d9ae7f2bSJakub Kicinski FIELD_PREP(OP_CMD_TOKEN, cmd_tgt_act[op].token) | 89d9ae7f2bSJakub Kicinski FIELD_PREP(OP_CMD_XFER, xfer) | 90d9ae7f2bSJakub Kicinski FIELD_PREP(OP_CMD_CNT, size) | 91b556ddd9SJakub Kicinski FIELD_PREP(OP_CMD_SIG, ctx != CMD_CTX_NO_SWAP) | 92d9ae7f2bSJakub Kicinski FIELD_PREP(OP_CMD_TGT_CMD, cmd_tgt_act[op].tgt_cmd) | 935468a8b9SJakub Kicinski FIELD_PREP(OP_CMD_INDIR, indir) | 94d9ae7f2bSJakub Kicinski FIELD_PREP(OP_CMD_MODE, mode); 95d9ae7f2bSJakub Kicinski 96d9ae7f2bSJakub Kicinski nfp_prog_push(nfp_prog, insn); 97d9ae7f2bSJakub Kicinski } 98d9ae7f2bSJakub Kicinski 99d9ae7f2bSJakub Kicinski static void 1005468a8b9SJakub Kicinski emit_cmd_any(struct nfp_prog *nfp_prog, enum cmd_tgt_map op, u8 mode, u8 xfer, 101b556ddd9SJakub Kicinski swreg lreg, swreg rreg, u8 size, enum cmd_ctx_swap ctx, bool indir) 102d9ae7f2bSJakub Kicinski { 103d9ae7f2bSJakub Kicinski struct nfp_insn_re_regs reg; 104d9ae7f2bSJakub Kicinski int err; 105d9ae7f2bSJakub Kicinski 106d9ae7f2bSJakub Kicinski err = swreg_to_restricted(reg_none(), lreg, rreg, ®, false); 107d9ae7f2bSJakub Kicinski if (err) { 108d9ae7f2bSJakub Kicinski nfp_prog->error = err; 109d9ae7f2bSJakub Kicinski return; 110d9ae7f2bSJakub Kicinski } 111d9ae7f2bSJakub Kicinski if (reg.swap) { 112d9ae7f2bSJakub Kicinski pr_err("cmd can't swap arguments\n"); 113d9ae7f2bSJakub Kicinski nfp_prog->error = -EFAULT; 114d9ae7f2bSJakub Kicinski return; 115d9ae7f2bSJakub Kicinski } 116995e101fSJakub Kicinski if (reg.dst_lmextn || reg.src_lmextn) { 117995e101fSJakub Kicinski pr_err("cmd can't use LMextn\n"); 118995e101fSJakub Kicinski nfp_prog->error = -EFAULT; 119995e101fSJakub Kicinski return; 120995e101fSJakub Kicinski } 121d9ae7f2bSJakub Kicinski 122b556ddd9SJakub Kicinski __emit_cmd(nfp_prog, op, mode, xfer, reg.areg, reg.breg, size, ctx, 1235468a8b9SJakub Kicinski indir); 1245468a8b9SJakub Kicinski } 1255468a8b9SJakub Kicinski 1265468a8b9SJakub Kicinski static void 1275468a8b9SJakub Kicinski emit_cmd(struct nfp_prog *nfp_prog, enum cmd_tgt_map op, u8 mode, u8 xfer, 128b556ddd9SJakub Kicinski swreg lreg, swreg rreg, u8 size, enum cmd_ctx_swap ctx) 1295468a8b9SJakub Kicinski { 130b556ddd9SJakub Kicinski emit_cmd_any(nfp_prog, op, mode, xfer, lreg, rreg, size, ctx, false); 131d9ae7f2bSJakub Kicinski } 132d9ae7f2bSJakub Kicinski 133d9ae7f2bSJakub Kicinski static void 1349879a381SJiong Wang emit_cmd_indir(struct nfp_prog *nfp_prog, enum cmd_tgt_map op, u8 mode, u8 xfer, 135b556ddd9SJakub Kicinski swreg lreg, swreg rreg, u8 size, enum cmd_ctx_swap ctx) 1369879a381SJiong Wang { 137b556ddd9SJakub Kicinski emit_cmd_any(nfp_prog, op, mode, xfer, lreg, rreg, size, ctx, true); 1389879a381SJiong Wang } 1399879a381SJiong Wang 1409879a381SJiong Wang static void 141d9ae7f2bSJakub Kicinski __emit_br(struct nfp_prog *nfp_prog, enum br_mask mask, enum br_ev_pip ev_pip, 142d9ae7f2bSJakub Kicinski enum br_ctx_signal_state css, u16 addr, u8 defer) 143d9ae7f2bSJakub Kicinski { 144d9ae7f2bSJakub Kicinski u16 addr_lo, addr_hi; 145d9ae7f2bSJakub Kicinski u64 insn; 146d9ae7f2bSJakub Kicinski 147d9ae7f2bSJakub Kicinski addr_lo = addr & (OP_BR_ADDR_LO >> __bf_shf(OP_BR_ADDR_LO)); 148d9ae7f2bSJakub Kicinski addr_hi = addr != addr_lo; 149d9ae7f2bSJakub Kicinski 150d9ae7f2bSJakub Kicinski insn = OP_BR_BASE | 151d9ae7f2bSJakub Kicinski FIELD_PREP(OP_BR_MASK, mask) | 152d9ae7f2bSJakub Kicinski FIELD_PREP(OP_BR_EV_PIP, ev_pip) | 153d9ae7f2bSJakub Kicinski FIELD_PREP(OP_BR_CSS, css) | 154d9ae7f2bSJakub Kicinski FIELD_PREP(OP_BR_DEFBR, defer) | 155d9ae7f2bSJakub Kicinski FIELD_PREP(OP_BR_ADDR_LO, addr_lo) | 156d9ae7f2bSJakub Kicinski FIELD_PREP(OP_BR_ADDR_HI, addr_hi); 157d9ae7f2bSJakub Kicinski 158d9ae7f2bSJakub Kicinski nfp_prog_push(nfp_prog, insn); 159d9ae7f2bSJakub Kicinski } 160d9ae7f2bSJakub Kicinski 1612314fe9eSJakub Kicinski static void 1622314fe9eSJakub Kicinski emit_br_relo(struct nfp_prog *nfp_prog, enum br_mask mask, u16 addr, u8 defer, 1632314fe9eSJakub Kicinski enum nfp_relo_type relo) 164d9ae7f2bSJakub Kicinski { 1652314fe9eSJakub Kicinski if (mask == BR_UNC && defer > 2) { 166d9ae7f2bSJakub Kicinski pr_err("BUG: branch defer out of bounds %d\n", defer); 167d9ae7f2bSJakub Kicinski nfp_prog->error = -EFAULT; 168d9ae7f2bSJakub Kicinski return; 169d9ae7f2bSJakub Kicinski } 1702314fe9eSJakub Kicinski 1712314fe9eSJakub Kicinski __emit_br(nfp_prog, mask, 1722314fe9eSJakub Kicinski mask != BR_UNC ? BR_EV_PIP_COND : BR_EV_PIP_UNCOND, 1732314fe9eSJakub Kicinski BR_CSS_NONE, addr, defer); 1742314fe9eSJakub Kicinski 1752314fe9eSJakub Kicinski nfp_prog->prog[nfp_prog->prog_len - 1] |= 1762314fe9eSJakub Kicinski FIELD_PREP(OP_RELO_TYPE, relo); 177d9ae7f2bSJakub Kicinski } 178d9ae7f2bSJakub Kicinski 179d9ae7f2bSJakub Kicinski static void 180d9ae7f2bSJakub Kicinski emit_br(struct nfp_prog *nfp_prog, enum br_mask mask, u16 addr, u8 defer) 181d9ae7f2bSJakub Kicinski { 1822314fe9eSJakub Kicinski emit_br_relo(nfp_prog, mask, addr, defer, RELO_BR_REL); 183d9ae7f2bSJakub Kicinski } 184d9ae7f2bSJakub Kicinski 185d9ae7f2bSJakub Kicinski static void 186991f5b36SJiong Wang __emit_br_bit(struct nfp_prog *nfp_prog, u16 areg, u16 breg, u16 addr, u8 defer, 187991f5b36SJiong Wang bool set, bool src_lmextn) 188991f5b36SJiong Wang { 189991f5b36SJiong Wang u16 addr_lo, addr_hi; 190991f5b36SJiong Wang u64 insn; 191991f5b36SJiong Wang 192991f5b36SJiong Wang addr_lo = addr & (OP_BR_BIT_ADDR_LO >> __bf_shf(OP_BR_BIT_ADDR_LO)); 193991f5b36SJiong Wang addr_hi = addr != addr_lo; 194991f5b36SJiong Wang 195991f5b36SJiong Wang insn = OP_BR_BIT_BASE | 196991f5b36SJiong Wang FIELD_PREP(OP_BR_BIT_A_SRC, areg) | 197991f5b36SJiong Wang FIELD_PREP(OP_BR_BIT_B_SRC, breg) | 198991f5b36SJiong Wang FIELD_PREP(OP_BR_BIT_BV, set) | 199991f5b36SJiong Wang FIELD_PREP(OP_BR_BIT_DEFBR, defer) | 200991f5b36SJiong Wang FIELD_PREP(OP_BR_BIT_ADDR_LO, addr_lo) | 201991f5b36SJiong Wang FIELD_PREP(OP_BR_BIT_ADDR_HI, addr_hi) | 202991f5b36SJiong Wang FIELD_PREP(OP_BR_BIT_SRC_LMEXTN, src_lmextn); 203991f5b36SJiong Wang 204991f5b36SJiong Wang nfp_prog_push(nfp_prog, insn); 205991f5b36SJiong Wang } 206991f5b36SJiong Wang 207991f5b36SJiong Wang static void 208991f5b36SJiong Wang emit_br_bit_relo(struct nfp_prog *nfp_prog, swreg src, u8 bit, u16 addr, 209991f5b36SJiong Wang u8 defer, bool set, enum nfp_relo_type relo) 210991f5b36SJiong Wang { 211991f5b36SJiong Wang struct nfp_insn_re_regs reg; 212991f5b36SJiong Wang int err; 213991f5b36SJiong Wang 214991f5b36SJiong Wang /* NOTE: The bit to test is specified as an rotation amount, such that 215991f5b36SJiong Wang * the bit to test will be placed on the MSB of the result when 216991f5b36SJiong Wang * doing a rotate right. For bit X, we need right rotate X + 1. 217991f5b36SJiong Wang */ 218991f5b36SJiong Wang bit += 1; 219991f5b36SJiong Wang 220991f5b36SJiong Wang err = swreg_to_restricted(reg_none(), src, reg_imm(bit), ®, false); 221991f5b36SJiong Wang if (err) { 222991f5b36SJiong Wang nfp_prog->error = err; 223991f5b36SJiong Wang return; 224991f5b36SJiong Wang } 225991f5b36SJiong Wang 226991f5b36SJiong Wang __emit_br_bit(nfp_prog, reg.areg, reg.breg, addr, defer, set, 227991f5b36SJiong Wang reg.src_lmextn); 228991f5b36SJiong Wang 229991f5b36SJiong Wang nfp_prog->prog[nfp_prog->prog_len - 1] |= 230991f5b36SJiong Wang FIELD_PREP(OP_RELO_TYPE, relo); 231991f5b36SJiong Wang } 232991f5b36SJiong Wang 233991f5b36SJiong Wang static void 234991f5b36SJiong Wang emit_br_bset(struct nfp_prog *nfp_prog, swreg src, u8 bit, u16 addr, u8 defer) 235991f5b36SJiong Wang { 236991f5b36SJiong Wang emit_br_bit_relo(nfp_prog, src, bit, addr, defer, true, RELO_BR_REL); 237991f5b36SJiong Wang } 238991f5b36SJiong Wang 239991f5b36SJiong Wang static void 240389f263bSQuentin Monnet __emit_br_alu(struct nfp_prog *nfp_prog, u16 areg, u16 breg, u16 imm_hi, 241389f263bSQuentin Monnet u8 defer, bool dst_lmextn, bool src_lmextn) 242389f263bSQuentin Monnet { 243389f263bSQuentin Monnet u64 insn; 244389f263bSQuentin Monnet 245389f263bSQuentin Monnet insn = OP_BR_ALU_BASE | 246389f263bSQuentin Monnet FIELD_PREP(OP_BR_ALU_A_SRC, areg) | 247389f263bSQuentin Monnet FIELD_PREP(OP_BR_ALU_B_SRC, breg) | 248389f263bSQuentin Monnet FIELD_PREP(OP_BR_ALU_DEFBR, defer) | 249389f263bSQuentin Monnet FIELD_PREP(OP_BR_ALU_IMM_HI, imm_hi) | 250389f263bSQuentin Monnet FIELD_PREP(OP_BR_ALU_SRC_LMEXTN, src_lmextn) | 251389f263bSQuentin Monnet FIELD_PREP(OP_BR_ALU_DST_LMEXTN, dst_lmextn); 252389f263bSQuentin Monnet 253389f263bSQuentin Monnet nfp_prog_push(nfp_prog, insn); 254389f263bSQuentin Monnet } 255389f263bSQuentin Monnet 256389f263bSQuentin Monnet static void emit_rtn(struct nfp_prog *nfp_prog, swreg base, u8 defer) 257389f263bSQuentin Monnet { 258389f263bSQuentin Monnet struct nfp_insn_ur_regs reg; 259389f263bSQuentin Monnet int err; 260389f263bSQuentin Monnet 261389f263bSQuentin Monnet err = swreg_to_unrestricted(reg_none(), base, reg_imm(0), ®); 262389f263bSQuentin Monnet if (err) { 263389f263bSQuentin Monnet nfp_prog->error = err; 264389f263bSQuentin Monnet return; 265389f263bSQuentin Monnet } 266389f263bSQuentin Monnet 267389f263bSQuentin Monnet __emit_br_alu(nfp_prog, reg.areg, reg.breg, 0, defer, reg.dst_lmextn, 268389f263bSQuentin Monnet reg.src_lmextn); 269389f263bSQuentin Monnet } 270389f263bSQuentin Monnet 271389f263bSQuentin Monnet static void 272d9ae7f2bSJakub Kicinski __emit_immed(struct nfp_prog *nfp_prog, u16 areg, u16 breg, u16 imm_hi, 273d9ae7f2bSJakub Kicinski enum immed_width width, bool invert, 274995e101fSJakub Kicinski enum immed_shift shift, bool wr_both, 275995e101fSJakub Kicinski bool dst_lmextn, bool src_lmextn) 276d9ae7f2bSJakub Kicinski { 277d9ae7f2bSJakub Kicinski u64 insn; 278d9ae7f2bSJakub Kicinski 279d9ae7f2bSJakub Kicinski insn = OP_IMMED_BASE | 280d9ae7f2bSJakub Kicinski FIELD_PREP(OP_IMMED_A_SRC, areg) | 281d9ae7f2bSJakub Kicinski FIELD_PREP(OP_IMMED_B_SRC, breg) | 282d9ae7f2bSJakub Kicinski FIELD_PREP(OP_IMMED_IMM, imm_hi) | 283d9ae7f2bSJakub Kicinski FIELD_PREP(OP_IMMED_WIDTH, width) | 284d9ae7f2bSJakub Kicinski FIELD_PREP(OP_IMMED_INV, invert) | 285d9ae7f2bSJakub Kicinski FIELD_PREP(OP_IMMED_SHIFT, shift) | 286995e101fSJakub Kicinski FIELD_PREP(OP_IMMED_WR_AB, wr_both) | 287995e101fSJakub Kicinski FIELD_PREP(OP_IMMED_SRC_LMEXTN, src_lmextn) | 288995e101fSJakub Kicinski FIELD_PREP(OP_IMMED_DST_LMEXTN, dst_lmextn); 289d9ae7f2bSJakub Kicinski 290d9ae7f2bSJakub Kicinski nfp_prog_push(nfp_prog, insn); 291d9ae7f2bSJakub Kicinski } 292d9ae7f2bSJakub Kicinski 293d9ae7f2bSJakub Kicinski static void 294b3f868dfSJakub Kicinski emit_immed(struct nfp_prog *nfp_prog, swreg dst, u16 imm, 295d9ae7f2bSJakub Kicinski enum immed_width width, bool invert, enum immed_shift shift) 296d9ae7f2bSJakub Kicinski { 297d9ae7f2bSJakub Kicinski struct nfp_insn_ur_regs reg; 298d9ae7f2bSJakub Kicinski int err; 299d9ae7f2bSJakub Kicinski 300b3f868dfSJakub Kicinski if (swreg_type(dst) == NN_REG_IMM) { 301d9ae7f2bSJakub Kicinski nfp_prog->error = -EFAULT; 302d9ae7f2bSJakub Kicinski return; 303d9ae7f2bSJakub Kicinski } 304d9ae7f2bSJakub Kicinski 305d9ae7f2bSJakub Kicinski err = swreg_to_unrestricted(dst, dst, reg_imm(imm & 0xff), ®); 306d9ae7f2bSJakub Kicinski if (err) { 307d9ae7f2bSJakub Kicinski nfp_prog->error = err; 308d9ae7f2bSJakub Kicinski return; 309d9ae7f2bSJakub Kicinski } 310d9ae7f2bSJakub Kicinski 3113239e7bbSJiong Wang /* Use reg.dst when destination is No-Dest. */ 3123239e7bbSJiong Wang __emit_immed(nfp_prog, 3133239e7bbSJiong Wang swreg_type(dst) == NN_REG_NONE ? reg.dst : reg.areg, 3143239e7bbSJiong Wang reg.breg, imm >> 8, width, invert, shift, 3153239e7bbSJiong Wang reg.wr_both, reg.dst_lmextn, reg.src_lmextn); 316d9ae7f2bSJakub Kicinski } 317d9ae7f2bSJakub Kicinski 318d9ae7f2bSJakub Kicinski static void 319d9ae7f2bSJakub Kicinski __emit_shf(struct nfp_prog *nfp_prog, u16 dst, enum alu_dst_ab dst_ab, 320d9ae7f2bSJakub Kicinski enum shf_sc sc, u8 shift, 321995e101fSJakub Kicinski u16 areg, enum shf_op op, u16 breg, bool i8, bool sw, bool wr_both, 322995e101fSJakub Kicinski bool dst_lmextn, bool src_lmextn) 323d9ae7f2bSJakub Kicinski { 324d9ae7f2bSJakub Kicinski u64 insn; 325d9ae7f2bSJakub Kicinski 326d9ae7f2bSJakub Kicinski if (!FIELD_FIT(OP_SHF_SHIFT, shift)) { 327d9ae7f2bSJakub Kicinski nfp_prog->error = -EFAULT; 328d9ae7f2bSJakub Kicinski return; 329d9ae7f2bSJakub Kicinski } 330d9ae7f2bSJakub Kicinski 331d9ae7f2bSJakub Kicinski if (sc == SHF_SC_L_SHF) 332d9ae7f2bSJakub Kicinski shift = 32 - shift; 333d9ae7f2bSJakub Kicinski 334d9ae7f2bSJakub Kicinski insn = OP_SHF_BASE | 335d9ae7f2bSJakub Kicinski FIELD_PREP(OP_SHF_A_SRC, areg) | 336d9ae7f2bSJakub Kicinski FIELD_PREP(OP_SHF_SC, sc) | 337d9ae7f2bSJakub Kicinski FIELD_PREP(OP_SHF_B_SRC, breg) | 338d9ae7f2bSJakub Kicinski FIELD_PREP(OP_SHF_I8, i8) | 339d9ae7f2bSJakub Kicinski FIELD_PREP(OP_SHF_SW, sw) | 340d9ae7f2bSJakub Kicinski FIELD_PREP(OP_SHF_DST, dst) | 341d9ae7f2bSJakub Kicinski FIELD_PREP(OP_SHF_SHIFT, shift) | 342d9ae7f2bSJakub Kicinski FIELD_PREP(OP_SHF_OP, op) | 343d9ae7f2bSJakub Kicinski FIELD_PREP(OP_SHF_DST_AB, dst_ab) | 344995e101fSJakub Kicinski FIELD_PREP(OP_SHF_WR_AB, wr_both) | 345995e101fSJakub Kicinski FIELD_PREP(OP_SHF_SRC_LMEXTN, src_lmextn) | 346995e101fSJakub Kicinski FIELD_PREP(OP_SHF_DST_LMEXTN, dst_lmextn); 347d9ae7f2bSJakub Kicinski 348d9ae7f2bSJakub Kicinski nfp_prog_push(nfp_prog, insn); 349d9ae7f2bSJakub Kicinski } 350d9ae7f2bSJakub Kicinski 351d9ae7f2bSJakub Kicinski static void 352b3f868dfSJakub Kicinski emit_shf(struct nfp_prog *nfp_prog, swreg dst, 353b3f868dfSJakub Kicinski swreg lreg, enum shf_op op, swreg rreg, enum shf_sc sc, u8 shift) 354d9ae7f2bSJakub Kicinski { 355d9ae7f2bSJakub Kicinski struct nfp_insn_re_regs reg; 356d9ae7f2bSJakub Kicinski int err; 357d9ae7f2bSJakub Kicinski 358d9ae7f2bSJakub Kicinski err = swreg_to_restricted(dst, lreg, rreg, ®, true); 359d9ae7f2bSJakub Kicinski if (err) { 360d9ae7f2bSJakub Kicinski nfp_prog->error = err; 361d9ae7f2bSJakub Kicinski return; 362d9ae7f2bSJakub Kicinski } 363d9ae7f2bSJakub Kicinski 364d9ae7f2bSJakub Kicinski __emit_shf(nfp_prog, reg.dst, reg.dst_ab, sc, shift, 365995e101fSJakub Kicinski reg.areg, op, reg.breg, reg.i8, reg.swap, reg.wr_both, 366995e101fSJakub Kicinski reg.dst_lmextn, reg.src_lmextn); 367d9ae7f2bSJakub Kicinski } 368d9ae7f2bSJakub Kicinski 369d9ae7f2bSJakub Kicinski static void 370991f5b36SJiong Wang emit_shf_indir(struct nfp_prog *nfp_prog, swreg dst, 371991f5b36SJiong Wang swreg lreg, enum shf_op op, swreg rreg, enum shf_sc sc) 372991f5b36SJiong Wang { 373991f5b36SJiong Wang if (sc == SHF_SC_R_ROT) { 374991f5b36SJiong Wang pr_err("indirect shift is not allowed on rotation\n"); 375991f5b36SJiong Wang nfp_prog->error = -EFAULT; 376991f5b36SJiong Wang return; 377991f5b36SJiong Wang } 378991f5b36SJiong Wang 379991f5b36SJiong Wang emit_shf(nfp_prog, dst, lreg, op, rreg, sc, 0); 380991f5b36SJiong Wang } 381991f5b36SJiong Wang 382991f5b36SJiong Wang static void 383d9ae7f2bSJakub Kicinski __emit_alu(struct nfp_prog *nfp_prog, u16 dst, enum alu_dst_ab dst_ab, 384995e101fSJakub Kicinski u16 areg, enum alu_op op, u16 breg, bool swap, bool wr_both, 385995e101fSJakub Kicinski bool dst_lmextn, bool src_lmextn) 386d9ae7f2bSJakub Kicinski { 387d9ae7f2bSJakub Kicinski u64 insn; 388d9ae7f2bSJakub Kicinski 389d9ae7f2bSJakub Kicinski insn = OP_ALU_BASE | 390d9ae7f2bSJakub Kicinski FIELD_PREP(OP_ALU_A_SRC, areg) | 391d9ae7f2bSJakub Kicinski FIELD_PREP(OP_ALU_B_SRC, breg) | 392d9ae7f2bSJakub Kicinski FIELD_PREP(OP_ALU_DST, dst) | 393d9ae7f2bSJakub Kicinski FIELD_PREP(OP_ALU_SW, swap) | 394d9ae7f2bSJakub Kicinski FIELD_PREP(OP_ALU_OP, op) | 395d9ae7f2bSJakub Kicinski FIELD_PREP(OP_ALU_DST_AB, dst_ab) | 396995e101fSJakub Kicinski FIELD_PREP(OP_ALU_WR_AB, wr_both) | 397995e101fSJakub Kicinski FIELD_PREP(OP_ALU_SRC_LMEXTN, src_lmextn) | 398995e101fSJakub Kicinski FIELD_PREP(OP_ALU_DST_LMEXTN, dst_lmextn); 399d9ae7f2bSJakub Kicinski 400d9ae7f2bSJakub Kicinski nfp_prog_push(nfp_prog, insn); 401d9ae7f2bSJakub Kicinski } 402d9ae7f2bSJakub Kicinski 403d9ae7f2bSJakub Kicinski static void 404b3f868dfSJakub Kicinski emit_alu(struct nfp_prog *nfp_prog, swreg dst, 405b3f868dfSJakub Kicinski swreg lreg, enum alu_op op, swreg rreg) 406d9ae7f2bSJakub Kicinski { 407d9ae7f2bSJakub Kicinski struct nfp_insn_ur_regs reg; 408d9ae7f2bSJakub Kicinski int err; 409d9ae7f2bSJakub Kicinski 410d9ae7f2bSJakub Kicinski err = swreg_to_unrestricted(dst, lreg, rreg, ®); 411d9ae7f2bSJakub Kicinski if (err) { 412d9ae7f2bSJakub Kicinski nfp_prog->error = err; 413d9ae7f2bSJakub Kicinski return; 414d9ae7f2bSJakub Kicinski } 415d9ae7f2bSJakub Kicinski 416d9ae7f2bSJakub Kicinski __emit_alu(nfp_prog, reg.dst, reg.dst_ab, 417995e101fSJakub Kicinski reg.areg, op, reg.breg, reg.swap, reg.wr_both, 418995e101fSJakub Kicinski reg.dst_lmextn, reg.src_lmextn); 419d9ae7f2bSJakub Kicinski } 420d9ae7f2bSJakub Kicinski 421d9ae7f2bSJakub Kicinski static void 422d3d23fdbSJiong Wang __emit_mul(struct nfp_prog *nfp_prog, enum alu_dst_ab dst_ab, u16 areg, 423d3d23fdbSJiong Wang enum mul_type type, enum mul_step step, u16 breg, bool swap, 424d3d23fdbSJiong Wang bool wr_both, bool dst_lmextn, bool src_lmextn) 425d3d23fdbSJiong Wang { 426d3d23fdbSJiong Wang u64 insn; 427d3d23fdbSJiong Wang 428d3d23fdbSJiong Wang insn = OP_MUL_BASE | 429d3d23fdbSJiong Wang FIELD_PREP(OP_MUL_A_SRC, areg) | 430d3d23fdbSJiong Wang FIELD_PREP(OP_MUL_B_SRC, breg) | 431d3d23fdbSJiong Wang FIELD_PREP(OP_MUL_STEP, step) | 432d3d23fdbSJiong Wang FIELD_PREP(OP_MUL_DST_AB, dst_ab) | 433d3d23fdbSJiong Wang FIELD_PREP(OP_MUL_SW, swap) | 434d3d23fdbSJiong Wang FIELD_PREP(OP_MUL_TYPE, type) | 435d3d23fdbSJiong Wang FIELD_PREP(OP_MUL_WR_AB, wr_both) | 436d3d23fdbSJiong Wang FIELD_PREP(OP_MUL_SRC_LMEXTN, src_lmextn) | 437d3d23fdbSJiong Wang FIELD_PREP(OP_MUL_DST_LMEXTN, dst_lmextn); 438d3d23fdbSJiong Wang 439d3d23fdbSJiong Wang nfp_prog_push(nfp_prog, insn); 440d3d23fdbSJiong Wang } 441d3d23fdbSJiong Wang 442d3d23fdbSJiong Wang static void 443d3d23fdbSJiong Wang emit_mul(struct nfp_prog *nfp_prog, swreg lreg, enum mul_type type, 444d3d23fdbSJiong Wang enum mul_step step, swreg rreg) 445d3d23fdbSJiong Wang { 446d3d23fdbSJiong Wang struct nfp_insn_ur_regs reg; 447d3d23fdbSJiong Wang u16 areg; 448d3d23fdbSJiong Wang int err; 449d3d23fdbSJiong Wang 450d3d23fdbSJiong Wang if (type == MUL_TYPE_START && step != MUL_STEP_NONE) { 451d3d23fdbSJiong Wang nfp_prog->error = -EINVAL; 452d3d23fdbSJiong Wang return; 453d3d23fdbSJiong Wang } 454d3d23fdbSJiong Wang 455d3d23fdbSJiong Wang if (step == MUL_LAST || step == MUL_LAST_2) { 456d3d23fdbSJiong Wang /* When type is step and step Number is LAST or LAST2, left 457d3d23fdbSJiong Wang * source is used as destination. 458d3d23fdbSJiong Wang */ 459d3d23fdbSJiong Wang err = swreg_to_unrestricted(lreg, reg_none(), rreg, ®); 460d3d23fdbSJiong Wang areg = reg.dst; 461d3d23fdbSJiong Wang } else { 462d3d23fdbSJiong Wang err = swreg_to_unrestricted(reg_none(), lreg, rreg, ®); 463d3d23fdbSJiong Wang areg = reg.areg; 464d3d23fdbSJiong Wang } 465d3d23fdbSJiong Wang 466d3d23fdbSJiong Wang if (err) { 467d3d23fdbSJiong Wang nfp_prog->error = err; 468d3d23fdbSJiong Wang return; 469d3d23fdbSJiong Wang } 470d3d23fdbSJiong Wang 471d3d23fdbSJiong Wang __emit_mul(nfp_prog, reg.dst_ab, areg, type, step, reg.breg, reg.swap, 472d3d23fdbSJiong Wang reg.wr_both, reg.dst_lmextn, reg.src_lmextn); 473d3d23fdbSJiong Wang } 474d3d23fdbSJiong Wang 475d3d23fdbSJiong Wang static void 476d9ae7f2bSJakub Kicinski __emit_ld_field(struct nfp_prog *nfp_prog, enum shf_sc sc, 477d9ae7f2bSJakub Kicinski u8 areg, u8 bmask, u8 breg, u8 shift, bool imm8, 478995e101fSJakub Kicinski bool zero, bool swap, bool wr_both, 479995e101fSJakub Kicinski bool dst_lmextn, bool src_lmextn) 480d9ae7f2bSJakub Kicinski { 481d9ae7f2bSJakub Kicinski u64 insn; 482d9ae7f2bSJakub Kicinski 483d9ae7f2bSJakub Kicinski insn = OP_LDF_BASE | 484d9ae7f2bSJakub Kicinski FIELD_PREP(OP_LDF_A_SRC, areg) | 485d9ae7f2bSJakub Kicinski FIELD_PREP(OP_LDF_SC, sc) | 486d9ae7f2bSJakub Kicinski FIELD_PREP(OP_LDF_B_SRC, breg) | 487d9ae7f2bSJakub Kicinski FIELD_PREP(OP_LDF_I8, imm8) | 488d9ae7f2bSJakub Kicinski FIELD_PREP(OP_LDF_SW, swap) | 489d9ae7f2bSJakub Kicinski FIELD_PREP(OP_LDF_ZF, zero) | 490d9ae7f2bSJakub Kicinski FIELD_PREP(OP_LDF_BMASK, bmask) | 491d9ae7f2bSJakub Kicinski FIELD_PREP(OP_LDF_SHF, shift) | 492995e101fSJakub Kicinski FIELD_PREP(OP_LDF_WR_AB, wr_both) | 493995e101fSJakub Kicinski FIELD_PREP(OP_LDF_SRC_LMEXTN, src_lmextn) | 494995e101fSJakub Kicinski FIELD_PREP(OP_LDF_DST_LMEXTN, dst_lmextn); 495d9ae7f2bSJakub Kicinski 496d9ae7f2bSJakub Kicinski nfp_prog_push(nfp_prog, insn); 497d9ae7f2bSJakub Kicinski } 498d9ae7f2bSJakub Kicinski 499d9ae7f2bSJakub Kicinski static void 500bc8c80a8SJakub Kicinski emit_ld_field_any(struct nfp_prog *nfp_prog, swreg dst, u8 bmask, swreg src, 501bc8c80a8SJakub Kicinski enum shf_sc sc, u8 shift, bool zero) 502d9ae7f2bSJakub Kicinski { 503d9ae7f2bSJakub Kicinski struct nfp_insn_re_regs reg; 504d9ae7f2bSJakub Kicinski int err; 505d9ae7f2bSJakub Kicinski 5062de1be1dSJakub Kicinski /* Note: ld_field is special as it uses one of the src regs as dst */ 5072de1be1dSJakub Kicinski err = swreg_to_restricted(dst, dst, src, ®, true); 508d9ae7f2bSJakub Kicinski if (err) { 509d9ae7f2bSJakub Kicinski nfp_prog->error = err; 510d9ae7f2bSJakub Kicinski return; 511d9ae7f2bSJakub Kicinski } 512d9ae7f2bSJakub Kicinski 513d9ae7f2bSJakub Kicinski __emit_ld_field(nfp_prog, sc, reg.areg, bmask, reg.breg, shift, 514995e101fSJakub Kicinski reg.i8, zero, reg.swap, reg.wr_both, 515995e101fSJakub Kicinski reg.dst_lmextn, reg.src_lmextn); 516d9ae7f2bSJakub Kicinski } 517d9ae7f2bSJakub Kicinski 518d9ae7f2bSJakub Kicinski static void 519b3f868dfSJakub Kicinski emit_ld_field(struct nfp_prog *nfp_prog, swreg dst, u8 bmask, swreg src, 520d9ae7f2bSJakub Kicinski enum shf_sc sc, u8 shift) 521d9ae7f2bSJakub Kicinski { 522bc8c80a8SJakub Kicinski emit_ld_field_any(nfp_prog, dst, bmask, src, sc, shift, false); 523d9ae7f2bSJakub Kicinski } 524d9ae7f2bSJakub Kicinski 5252df03a50SJakub Kicinski static void 5262df03a50SJakub Kicinski __emit_lcsr(struct nfp_prog *nfp_prog, u16 areg, u16 breg, bool wr, u16 addr, 5272df03a50SJakub Kicinski bool dst_lmextn, bool src_lmextn) 5282df03a50SJakub Kicinski { 5292df03a50SJakub Kicinski u64 insn; 5302df03a50SJakub Kicinski 5312df03a50SJakub Kicinski insn = OP_LCSR_BASE | 5322df03a50SJakub Kicinski FIELD_PREP(OP_LCSR_A_SRC, areg) | 5332df03a50SJakub Kicinski FIELD_PREP(OP_LCSR_B_SRC, breg) | 5342df03a50SJakub Kicinski FIELD_PREP(OP_LCSR_WRITE, wr) | 535df4a37d8SJakub Kicinski FIELD_PREP(OP_LCSR_ADDR, addr / 4) | 5362df03a50SJakub Kicinski FIELD_PREP(OP_LCSR_SRC_LMEXTN, src_lmextn) | 5372df03a50SJakub Kicinski FIELD_PREP(OP_LCSR_DST_LMEXTN, dst_lmextn); 5382df03a50SJakub Kicinski 5392df03a50SJakub Kicinski nfp_prog_push(nfp_prog, insn); 5402df03a50SJakub Kicinski } 5412df03a50SJakub Kicinski 5422df03a50SJakub Kicinski static void emit_csr_wr(struct nfp_prog *nfp_prog, swreg src, u16 addr) 5432df03a50SJakub Kicinski { 5442df03a50SJakub Kicinski struct nfp_insn_ur_regs reg; 5452df03a50SJakub Kicinski int err; 5462df03a50SJakub Kicinski 5472df03a50SJakub Kicinski /* This instruction takes immeds instead of reg_none() for the ignored 5482df03a50SJakub Kicinski * operand, but we can't encode 2 immeds in one instr with our normal 5492df03a50SJakub Kicinski * swreg infra so if param is an immed, we encode as reg_none() and 5502df03a50SJakub Kicinski * copy the immed to both operands. 5512df03a50SJakub Kicinski */ 5522df03a50SJakub Kicinski if (swreg_type(src) == NN_REG_IMM) { 5532df03a50SJakub Kicinski err = swreg_to_unrestricted(reg_none(), src, reg_none(), ®); 5542df03a50SJakub Kicinski reg.breg = reg.areg; 5552df03a50SJakub Kicinski } else { 5562df03a50SJakub Kicinski err = swreg_to_unrestricted(reg_none(), src, reg_imm(0), ®); 5572df03a50SJakub Kicinski } 5582df03a50SJakub Kicinski if (err) { 5592df03a50SJakub Kicinski nfp_prog->error = err; 5602df03a50SJakub Kicinski return; 5612df03a50SJakub Kicinski } 5622df03a50SJakub Kicinski 563df4a37d8SJakub Kicinski __emit_lcsr(nfp_prog, reg.areg, reg.breg, true, addr, 5642df03a50SJakub Kicinski false, reg.src_lmextn); 5652df03a50SJakub Kicinski } 5662df03a50SJakub Kicinski 567df4a37d8SJakub Kicinski /* CSR value is read in following immed[gpr, 0] */ 568df4a37d8SJakub Kicinski static void __emit_csr_rd(struct nfp_prog *nfp_prog, u16 addr) 569df4a37d8SJakub Kicinski { 570df4a37d8SJakub Kicinski __emit_lcsr(nfp_prog, 0, 0, false, addr, false, false); 571df4a37d8SJakub Kicinski } 572df4a37d8SJakub Kicinski 5731c03e03fSJakub Kicinski static void emit_nop(struct nfp_prog *nfp_prog) 5741c03e03fSJakub Kicinski { 5751c03e03fSJakub Kicinski __emit_immed(nfp_prog, UR_REG_IMM, UR_REG_IMM, 0, 0, 0, 0, 0, 0, 0); 5761c03e03fSJakub Kicinski } 5771c03e03fSJakub Kicinski 578d9ae7f2bSJakub Kicinski /* --- Wrappers --- */ 579d9ae7f2bSJakub Kicinski static bool pack_immed(u32 imm, u16 *val, enum immed_shift *shift) 580d9ae7f2bSJakub Kicinski { 581d9ae7f2bSJakub Kicinski if (!(imm & 0xffff0000)) { 582d9ae7f2bSJakub Kicinski *val = imm; 583d9ae7f2bSJakub Kicinski *shift = IMMED_SHIFT_0B; 584d9ae7f2bSJakub Kicinski } else if (!(imm & 0xff0000ff)) { 585d9ae7f2bSJakub Kicinski *val = imm >> 8; 586d9ae7f2bSJakub Kicinski *shift = IMMED_SHIFT_1B; 587d9ae7f2bSJakub Kicinski } else if (!(imm & 0x0000ffff)) { 588d9ae7f2bSJakub Kicinski *val = imm >> 16; 589d9ae7f2bSJakub Kicinski *shift = IMMED_SHIFT_2B; 590d9ae7f2bSJakub Kicinski } else { 591d9ae7f2bSJakub Kicinski return false; 592d9ae7f2bSJakub Kicinski } 593d9ae7f2bSJakub Kicinski 594d9ae7f2bSJakub Kicinski return true; 595d9ae7f2bSJakub Kicinski } 596d9ae7f2bSJakub Kicinski 597b3f868dfSJakub Kicinski static void wrp_immed(struct nfp_prog *nfp_prog, swreg dst, u32 imm) 598d9ae7f2bSJakub Kicinski { 599d9ae7f2bSJakub Kicinski enum immed_shift shift; 600d9ae7f2bSJakub Kicinski u16 val; 601d9ae7f2bSJakub Kicinski 602d9ae7f2bSJakub Kicinski if (pack_immed(imm, &val, &shift)) { 603d9ae7f2bSJakub Kicinski emit_immed(nfp_prog, dst, val, IMMED_WIDTH_ALL, false, shift); 604d9ae7f2bSJakub Kicinski } else if (pack_immed(~imm, &val, &shift)) { 605d9ae7f2bSJakub Kicinski emit_immed(nfp_prog, dst, val, IMMED_WIDTH_ALL, true, shift); 606d9ae7f2bSJakub Kicinski } else { 607d9ae7f2bSJakub Kicinski emit_immed(nfp_prog, dst, imm & 0xffff, IMMED_WIDTH_ALL, 608d9ae7f2bSJakub Kicinski false, IMMED_SHIFT_0B); 609d9ae7f2bSJakub Kicinski emit_immed(nfp_prog, dst, imm >> 16, IMMED_WIDTH_WORD, 610d9ae7f2bSJakub Kicinski false, IMMED_SHIFT_2B); 611d9ae7f2bSJakub Kicinski } 612d9ae7f2bSJakub Kicinski } 613d9ae7f2bSJakub Kicinski 61477a3d311SJakub Kicinski static void 61577a3d311SJakub Kicinski wrp_immed_relo(struct nfp_prog *nfp_prog, swreg dst, u32 imm, 61677a3d311SJakub Kicinski enum nfp_relo_type relo) 61777a3d311SJakub Kicinski { 61877a3d311SJakub Kicinski if (imm > 0xffff) { 61977a3d311SJakub Kicinski pr_err("relocation of a large immediate!\n"); 62077a3d311SJakub Kicinski nfp_prog->error = -EFAULT; 62177a3d311SJakub Kicinski return; 62277a3d311SJakub Kicinski } 62377a3d311SJakub Kicinski emit_immed(nfp_prog, dst, imm, IMMED_WIDTH_ALL, false, IMMED_SHIFT_0B); 62477a3d311SJakub Kicinski 62577a3d311SJakub Kicinski nfp_prog->prog[nfp_prog->prog_len - 1] |= 62677a3d311SJakub Kicinski FIELD_PREP(OP_RELO_TYPE, relo); 62777a3d311SJakub Kicinski } 62877a3d311SJakub Kicinski 629d9ae7f2bSJakub Kicinski /* ur_load_imm_any() - encode immediate or use tmp register (unrestricted) 630d9ae7f2bSJakub Kicinski * If the @imm is small enough encode it directly in operand and return 631d9ae7f2bSJakub Kicinski * otherwise load @imm to a spare register and return its encoding. 632d9ae7f2bSJakub Kicinski */ 633b3f868dfSJakub Kicinski static swreg ur_load_imm_any(struct nfp_prog *nfp_prog, u32 imm, swreg tmp_reg) 634d9ae7f2bSJakub Kicinski { 635d9ae7f2bSJakub Kicinski if (FIELD_FIT(UR_REG_IMM_MAX, imm)) 636d9ae7f2bSJakub Kicinski return reg_imm(imm); 637d9ae7f2bSJakub Kicinski 638d9ae7f2bSJakub Kicinski wrp_immed(nfp_prog, tmp_reg, imm); 639d9ae7f2bSJakub Kicinski return tmp_reg; 640d9ae7f2bSJakub Kicinski } 641d9ae7f2bSJakub Kicinski 642d9ae7f2bSJakub Kicinski /* re_load_imm_any() - encode immediate or use tmp register (restricted) 643d9ae7f2bSJakub Kicinski * If the @imm is small enough encode it directly in operand and return 644d9ae7f2bSJakub Kicinski * otherwise load @imm to a spare register and return its encoding. 645d9ae7f2bSJakub Kicinski */ 646b3f868dfSJakub Kicinski static swreg re_load_imm_any(struct nfp_prog *nfp_prog, u32 imm, swreg tmp_reg) 647d9ae7f2bSJakub Kicinski { 648d9ae7f2bSJakub Kicinski if (FIELD_FIT(RE_REG_IMM_MAX, imm)) 649d9ae7f2bSJakub Kicinski return reg_imm(imm); 650d9ae7f2bSJakub Kicinski 651d9ae7f2bSJakub Kicinski wrp_immed(nfp_prog, tmp_reg, imm); 652d9ae7f2bSJakub Kicinski return tmp_reg; 653d9ae7f2bSJakub Kicinski } 654d9ae7f2bSJakub Kicinski 655ff42bb9fSJakub Kicinski static void wrp_nops(struct nfp_prog *nfp_prog, unsigned int count) 656ff42bb9fSJakub Kicinski { 657ff42bb9fSJakub Kicinski while (count--) 658ff42bb9fSJakub Kicinski emit_nop(nfp_prog); 659ff42bb9fSJakub Kicinski } 660ff42bb9fSJakub Kicinski 661c000dfb5SJakub Kicinski static void wrp_mov(struct nfp_prog *nfp_prog, swreg dst, swreg src) 662c000dfb5SJakub Kicinski { 663c000dfb5SJakub Kicinski emit_alu(nfp_prog, dst, reg_none(), ALU_OP_NONE, src); 664c000dfb5SJakub Kicinski } 665c000dfb5SJakub Kicinski 666d9ae7f2bSJakub Kicinski static void wrp_reg_mov(struct nfp_prog *nfp_prog, u16 dst, u16 src) 667d9ae7f2bSJakub Kicinski { 668c000dfb5SJakub Kicinski wrp_mov(nfp_prog, reg_both(dst), reg_b(src)); 669d9ae7f2bSJakub Kicinski } 670d9ae7f2bSJakub Kicinski 6719879a381SJiong Wang /* wrp_reg_subpart() - load @field_len bytes from @offset of @src, write the 6729879a381SJiong Wang * result to @dst from low end. 6739879a381SJiong Wang */ 6749879a381SJiong Wang static void 6759879a381SJiong Wang wrp_reg_subpart(struct nfp_prog *nfp_prog, swreg dst, swreg src, u8 field_len, 6769879a381SJiong Wang u8 offset) 6779879a381SJiong Wang { 6789879a381SJiong Wang enum shf_sc sc = offset ? SHF_SC_R_SHF : SHF_SC_NONE; 6799879a381SJiong Wang u8 mask = (1 << field_len) - 1; 6809879a381SJiong Wang 6819879a381SJiong Wang emit_ld_field_any(nfp_prog, dst, mask, src, sc, offset * 8, true); 6829879a381SJiong Wang } 6839879a381SJiong Wang 68491ff69e8SJiong Wang /* wrp_reg_or_subpart() - load @field_len bytes from low end of @src, or the 68591ff69e8SJiong Wang * result to @dst from offset, there is no change on the other bits of @dst. 68691ff69e8SJiong Wang */ 68791ff69e8SJiong Wang static void 68891ff69e8SJiong Wang wrp_reg_or_subpart(struct nfp_prog *nfp_prog, swreg dst, swreg src, 68991ff69e8SJiong Wang u8 field_len, u8 offset) 69091ff69e8SJiong Wang { 69191ff69e8SJiong Wang enum shf_sc sc = offset ? SHF_SC_L_SHF : SHF_SC_NONE; 69291ff69e8SJiong Wang u8 mask = ((1 << field_len) - 1) << offset; 69391ff69e8SJiong Wang 69491ff69e8SJiong Wang emit_ld_field(nfp_prog, dst, mask, src, sc, 32 - offset * 8); 69591ff69e8SJiong Wang } 69691ff69e8SJiong Wang 6973dd43c33SJakub Kicinski static void 6983dd43c33SJakub Kicinski addr40_offset(struct nfp_prog *nfp_prog, u8 src_gpr, swreg offset, 6993dd43c33SJakub Kicinski swreg *rega, swreg *regb) 7003dd43c33SJakub Kicinski { 7013dd43c33SJakub Kicinski if (offset == reg_imm(0)) { 7023dd43c33SJakub Kicinski *rega = reg_a(src_gpr); 7033dd43c33SJakub Kicinski *regb = reg_b(src_gpr + 1); 7043dd43c33SJakub Kicinski return; 7053dd43c33SJakub Kicinski } 7063dd43c33SJakub Kicinski 7073dd43c33SJakub Kicinski emit_alu(nfp_prog, imm_a(nfp_prog), reg_a(src_gpr), ALU_OP_ADD, offset); 7083dd43c33SJakub Kicinski emit_alu(nfp_prog, imm_b(nfp_prog), reg_b(src_gpr + 1), ALU_OP_ADD_C, 7093dd43c33SJakub Kicinski reg_imm(0)); 7103dd43c33SJakub Kicinski *rega = imm_a(nfp_prog); 7113dd43c33SJakub Kicinski *regb = imm_b(nfp_prog); 7123dd43c33SJakub Kicinski } 7133dd43c33SJakub Kicinski 7149879a381SJiong Wang /* NFP has Command Push Pull bus which supports bluk memory operations. */ 7159879a381SJiong Wang static int nfp_cpp_memcpy(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 7169879a381SJiong Wang { 7179879a381SJiong Wang bool descending_seq = meta->ldst_gather_len < 0; 7189879a381SJiong Wang s16 len = abs(meta->ldst_gather_len); 7199879a381SJiong Wang swreg src_base, off; 7203dd43c33SJakub Kicinski bool src_40bit_addr; 7219879a381SJiong Wang unsigned int i; 7229879a381SJiong Wang u8 xfer_num; 7239879a381SJiong Wang 7249879a381SJiong Wang off = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog)); 7253dd43c33SJakub Kicinski src_40bit_addr = meta->ptr.type == PTR_TO_MAP_VALUE; 7269879a381SJiong Wang src_base = reg_a(meta->insn.src_reg * 2); 7279879a381SJiong Wang xfer_num = round_up(len, 4) / 4; 7289879a381SJiong Wang 7293dd43c33SJakub Kicinski if (src_40bit_addr) 730cc0dff6dSJiong Wang addr40_offset(nfp_prog, meta->insn.src_reg * 2, off, &src_base, 7313dd43c33SJakub Kicinski &off); 7323dd43c33SJakub Kicinski 7338c900538SJiong Wang /* Setup PREV_ALU fields to override memory read length. */ 7348c900538SJiong Wang if (len > 32) 7358c900538SJiong Wang wrp_immed(nfp_prog, reg_none(), 7368c900538SJiong Wang CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, xfer_num - 1)); 7378c900538SJiong Wang 7389879a381SJiong Wang /* Memory read from source addr into transfer-in registers. */ 7393dd43c33SJakub Kicinski emit_cmd_any(nfp_prog, CMD_TGT_READ32_SWAP, 7403dd43c33SJakub Kicinski src_40bit_addr ? CMD_MODE_40b_BA : CMD_MODE_32b, 0, 741b556ddd9SJakub Kicinski src_base, off, xfer_num - 1, CMD_CTX_SWAP, len > 32); 7429879a381SJiong Wang 7439879a381SJiong Wang /* Move from transfer-in to transfer-out. */ 7449879a381SJiong Wang for (i = 0; i < xfer_num; i++) 7459879a381SJiong Wang wrp_mov(nfp_prog, reg_xfer(i), reg_xfer(i)); 7469879a381SJiong Wang 7479879a381SJiong Wang off = re_load_imm_any(nfp_prog, meta->paired_st->off, imm_b(nfp_prog)); 7489879a381SJiong Wang 7499879a381SJiong Wang if (len <= 8) { 7509879a381SJiong Wang /* Use single direct_ref write8. */ 7519879a381SJiong Wang emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0, 7529879a381SJiong Wang reg_a(meta->paired_st->dst_reg * 2), off, len - 1, 753b556ddd9SJakub Kicinski CMD_CTX_SWAP); 7548c900538SJiong Wang } else if (len <= 32 && IS_ALIGNED(len, 4)) { 7559879a381SJiong Wang /* Use single direct_ref write32. */ 7569879a381SJiong Wang emit_cmd(nfp_prog, CMD_TGT_WRITE32_SWAP, CMD_MODE_32b, 0, 7579879a381SJiong Wang reg_a(meta->paired_st->dst_reg * 2), off, xfer_num - 1, 758b556ddd9SJakub Kicinski CMD_CTX_SWAP); 7598c900538SJiong Wang } else if (len <= 32) { 7609879a381SJiong Wang /* Use single indirect_ref write8. */ 7619879a381SJiong Wang wrp_immed(nfp_prog, reg_none(), 7629879a381SJiong Wang CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, len - 1)); 7639879a381SJiong Wang emit_cmd_indir(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0, 7649879a381SJiong Wang reg_a(meta->paired_st->dst_reg * 2), off, 765b556ddd9SJakub Kicinski len - 1, CMD_CTX_SWAP); 7668c900538SJiong Wang } else if (IS_ALIGNED(len, 4)) { 7678c900538SJiong Wang /* Use single indirect_ref write32. */ 7688c900538SJiong Wang wrp_immed(nfp_prog, reg_none(), 7698c900538SJiong Wang CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, xfer_num - 1)); 7708c900538SJiong Wang emit_cmd_indir(nfp_prog, CMD_TGT_WRITE32_SWAP, CMD_MODE_32b, 0, 7718c900538SJiong Wang reg_a(meta->paired_st->dst_reg * 2), off, 772b556ddd9SJakub Kicinski xfer_num - 1, CMD_CTX_SWAP); 7738c900538SJiong Wang } else if (len <= 40) { 7748c900538SJiong Wang /* Use one direct_ref write32 to write the first 32-bytes, then 7758c900538SJiong Wang * another direct_ref write8 to write the remaining bytes. 7768c900538SJiong Wang */ 7778c900538SJiong Wang emit_cmd(nfp_prog, CMD_TGT_WRITE32_SWAP, CMD_MODE_32b, 0, 7788c900538SJiong Wang reg_a(meta->paired_st->dst_reg * 2), off, 7, 779b556ddd9SJakub Kicinski CMD_CTX_SWAP); 7808c900538SJiong Wang 7818c900538SJiong Wang off = re_load_imm_any(nfp_prog, meta->paired_st->off + 32, 7828c900538SJiong Wang imm_b(nfp_prog)); 7838c900538SJiong Wang emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 8, 7848c900538SJiong Wang reg_a(meta->paired_st->dst_reg * 2), off, len - 33, 785b556ddd9SJakub Kicinski CMD_CTX_SWAP); 7868c900538SJiong Wang } else { 7878c900538SJiong Wang /* Use one indirect_ref write32 to write 4-bytes aligned length, 7888c900538SJiong Wang * then another direct_ref write8 to write the remaining bytes. 7898c900538SJiong Wang */ 7908c900538SJiong Wang u8 new_off; 7918c900538SJiong Wang 7928c900538SJiong Wang wrp_immed(nfp_prog, reg_none(), 7938c900538SJiong Wang CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, xfer_num - 2)); 7948c900538SJiong Wang emit_cmd_indir(nfp_prog, CMD_TGT_WRITE32_SWAP, CMD_MODE_32b, 0, 7958c900538SJiong Wang reg_a(meta->paired_st->dst_reg * 2), off, 796b556ddd9SJakub Kicinski xfer_num - 2, CMD_CTX_SWAP); 7978c900538SJiong Wang new_off = meta->paired_st->off + (xfer_num - 1) * 4; 7988c900538SJiong Wang off = re_load_imm_any(nfp_prog, new_off, imm_b(nfp_prog)); 7998c900538SJiong Wang emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 8008c900538SJiong Wang xfer_num - 1, reg_a(meta->paired_st->dst_reg * 2), off, 801b556ddd9SJakub Kicinski (len & 0x3) - 1, CMD_CTX_SWAP); 8029879a381SJiong Wang } 8039879a381SJiong Wang 8049879a381SJiong Wang /* TODO: The following extra load is to make sure data flow be identical 8059879a381SJiong Wang * before and after we do memory copy optimization. 8069879a381SJiong Wang * 8079879a381SJiong Wang * The load destination register is not guaranteed to be dead, so we 8089879a381SJiong Wang * need to make sure it is loaded with the value the same as before 8099879a381SJiong Wang * this transformation. 8109879a381SJiong Wang * 8119879a381SJiong Wang * These extra loads could be removed once we have accurate register 8129879a381SJiong Wang * usage information. 8139879a381SJiong Wang */ 8149879a381SJiong Wang if (descending_seq) 8159879a381SJiong Wang xfer_num = 0; 8169879a381SJiong Wang else if (BPF_SIZE(meta->insn.code) != BPF_DW) 8179879a381SJiong Wang xfer_num = xfer_num - 1; 8189879a381SJiong Wang else 8199879a381SJiong Wang xfer_num = xfer_num - 2; 8209879a381SJiong Wang 8219879a381SJiong Wang switch (BPF_SIZE(meta->insn.code)) { 8229879a381SJiong Wang case BPF_B: 8239879a381SJiong Wang wrp_reg_subpart(nfp_prog, reg_both(meta->insn.dst_reg * 2), 8249879a381SJiong Wang reg_xfer(xfer_num), 1, 8259879a381SJiong Wang IS_ALIGNED(len, 4) ? 3 : (len & 3) - 1); 8269879a381SJiong Wang break; 8279879a381SJiong Wang case BPF_H: 8289879a381SJiong Wang wrp_reg_subpart(nfp_prog, reg_both(meta->insn.dst_reg * 2), 8299879a381SJiong Wang reg_xfer(xfer_num), 2, (len & 3) ^ 2); 8309879a381SJiong Wang break; 8319879a381SJiong Wang case BPF_W: 8329879a381SJiong Wang wrp_mov(nfp_prog, reg_both(meta->insn.dst_reg * 2), 8339879a381SJiong Wang reg_xfer(0)); 8349879a381SJiong Wang break; 8359879a381SJiong Wang case BPF_DW: 8369879a381SJiong Wang wrp_mov(nfp_prog, reg_both(meta->insn.dst_reg * 2), 8379879a381SJiong Wang reg_xfer(xfer_num)); 8389879a381SJiong Wang wrp_mov(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 8399879a381SJiong Wang reg_xfer(xfer_num + 1)); 8409879a381SJiong Wang break; 8419879a381SJiong Wang } 8429879a381SJiong Wang 8439879a381SJiong Wang if (BPF_SIZE(meta->insn.code) != BPF_DW) 8449879a381SJiong Wang wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0); 8459879a381SJiong Wang 8469879a381SJiong Wang return 0; 8479879a381SJiong Wang } 8489879a381SJiong Wang 849d9ae7f2bSJakub Kicinski static int 8500a793977SJakub Kicinski data_ld(struct nfp_prog *nfp_prog, swreg offset, u8 dst_gpr, int size) 851d9ae7f2bSJakub Kicinski { 852d9ae7f2bSJakub Kicinski unsigned int i; 853d9ae7f2bSJakub Kicinski u16 shift, sz; 854d9ae7f2bSJakub Kicinski 855d9ae7f2bSJakub Kicinski /* We load the value from the address indicated in @offset and then 856d9ae7f2bSJakub Kicinski * shift out the data we don't need. Note: this is big endian! 857d9ae7f2bSJakub Kicinski */ 8580a793977SJakub Kicinski sz = max(size, 4); 859d9ae7f2bSJakub Kicinski shift = size < 4 ? 4 - size : 0; 860d9ae7f2bSJakub Kicinski 8610a793977SJakub Kicinski emit_cmd(nfp_prog, CMD_TGT_READ8, CMD_MODE_32b, 0, 862b556ddd9SJakub Kicinski pptr_reg(nfp_prog), offset, sz - 1, CMD_CTX_SWAP); 8630a793977SJakub Kicinski 8640a793977SJakub Kicinski i = 0; 8650a793977SJakub Kicinski if (shift) 8660a793977SJakub Kicinski emit_shf(nfp_prog, reg_both(dst_gpr), reg_none(), SHF_OP_NONE, 8670a793977SJakub Kicinski reg_xfer(0), SHF_SC_R_SHF, shift * 8); 8680a793977SJakub Kicinski else 8690a793977SJakub Kicinski for (; i * 4 < size; i++) 8700a793977SJakub Kicinski wrp_mov(nfp_prog, reg_both(dst_gpr + i), reg_xfer(i)); 8710a793977SJakub Kicinski 8720a793977SJakub Kicinski if (i < 2) 8730a793977SJakub Kicinski wrp_immed(nfp_prog, reg_both(dst_gpr + 1), 0); 8740a793977SJakub Kicinski 8750a793977SJakub Kicinski return 0; 8760a793977SJakub Kicinski } 8770a793977SJakub Kicinski 8780a793977SJakub Kicinski static int 8793dd43c33SJakub Kicinski data_ld_host_order(struct nfp_prog *nfp_prog, u8 dst_gpr, 8803dd43c33SJakub Kicinski swreg lreg, swreg rreg, int size, enum cmd_mode mode) 8812ca71441SJakub Kicinski { 8822ca71441SJakub Kicinski unsigned int i; 8832ca71441SJakub Kicinski u8 mask, sz; 8842ca71441SJakub Kicinski 8853dd43c33SJakub Kicinski /* We load the value from the address indicated in rreg + lreg and then 8862ca71441SJakub Kicinski * mask out the data we don't need. Note: this is little endian! 8872ca71441SJakub Kicinski */ 8882ca71441SJakub Kicinski sz = max(size, 4); 8892ca71441SJakub Kicinski mask = size < 4 ? GENMASK(size - 1, 0) : 0; 8902ca71441SJakub Kicinski 8913dd43c33SJakub Kicinski emit_cmd(nfp_prog, CMD_TGT_READ32_SWAP, mode, 0, 892b556ddd9SJakub Kicinski lreg, rreg, sz / 4 - 1, CMD_CTX_SWAP); 8932ca71441SJakub Kicinski 8942ca71441SJakub Kicinski i = 0; 8952ca71441SJakub Kicinski if (mask) 8962ca71441SJakub Kicinski emit_ld_field_any(nfp_prog, reg_both(dst_gpr), mask, 8972ca71441SJakub Kicinski reg_xfer(0), SHF_SC_NONE, 0, true); 8982ca71441SJakub Kicinski else 8992ca71441SJakub Kicinski for (; i * 4 < size; i++) 9002ca71441SJakub Kicinski wrp_mov(nfp_prog, reg_both(dst_gpr + i), reg_xfer(i)); 9012ca71441SJakub Kicinski 9022ca71441SJakub Kicinski if (i < 2) 9032ca71441SJakub Kicinski wrp_immed(nfp_prog, reg_both(dst_gpr + 1), 0); 9042ca71441SJakub Kicinski 9052ca71441SJakub Kicinski return 0; 9062ca71441SJakub Kicinski } 9072ca71441SJakub Kicinski 9082ca71441SJakub Kicinski static int 9093dd43c33SJakub Kicinski data_ld_host_order_addr32(struct nfp_prog *nfp_prog, u8 src_gpr, swreg offset, 9103dd43c33SJakub Kicinski u8 dst_gpr, u8 size) 9113dd43c33SJakub Kicinski { 9123dd43c33SJakub Kicinski return data_ld_host_order(nfp_prog, dst_gpr, reg_a(src_gpr), offset, 9133dd43c33SJakub Kicinski size, CMD_MODE_32b); 9143dd43c33SJakub Kicinski } 9153dd43c33SJakub Kicinski 9163dd43c33SJakub Kicinski static int 9173dd43c33SJakub Kicinski data_ld_host_order_addr40(struct nfp_prog *nfp_prog, u8 src_gpr, swreg offset, 9183dd43c33SJakub Kicinski u8 dst_gpr, u8 size) 9193dd43c33SJakub Kicinski { 9203dd43c33SJakub Kicinski swreg rega, regb; 9213dd43c33SJakub Kicinski 9223dd43c33SJakub Kicinski addr40_offset(nfp_prog, src_gpr, offset, ®a, ®b); 9233dd43c33SJakub Kicinski 9243dd43c33SJakub Kicinski return data_ld_host_order(nfp_prog, dst_gpr, rega, regb, 9253dd43c33SJakub Kicinski size, CMD_MODE_40b_BA); 9263dd43c33SJakub Kicinski } 9273dd43c33SJakub Kicinski 9283dd43c33SJakub Kicinski static int 9290a793977SJakub Kicinski construct_data_ind_ld(struct nfp_prog *nfp_prog, u16 offset, u16 src, u8 size) 9300a793977SJakub Kicinski { 9310a793977SJakub Kicinski swreg tmp_reg; 9320a793977SJakub Kicinski 933d9ae7f2bSJakub Kicinski /* Calculate the true offset (src_reg + imm) */ 934d9ae7f2bSJakub Kicinski tmp_reg = ur_load_imm_any(nfp_prog, offset, imm_b(nfp_prog)); 9350a793977SJakub Kicinski emit_alu(nfp_prog, imm_both(nfp_prog), reg_a(src), ALU_OP_ADD, tmp_reg); 9360a793977SJakub Kicinski 937d9ae7f2bSJakub Kicinski /* Check packet length (size guaranteed to fit b/c it's u8) */ 938d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, imm_a(nfp_prog), 939d9ae7f2bSJakub Kicinski imm_a(nfp_prog), ALU_OP_ADD, reg_imm(size)); 940d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_none(), 94118e53b6cSJakub Kicinski plen_reg(nfp_prog), ALU_OP_SUB, imm_a(nfp_prog)); 942e84797feSJakub Kicinski emit_br_relo(nfp_prog, BR_BLO, BR_OFF_RELO, 0, RELO_BR_GO_ABORT); 9430a793977SJakub Kicinski 944d9ae7f2bSJakub Kicinski /* Load data */ 9450a793977SJakub Kicinski return data_ld(nfp_prog, imm_b(nfp_prog), 0, size); 946d9ae7f2bSJakub Kicinski } 947d9ae7f2bSJakub Kicinski 948d9ae7f2bSJakub Kicinski static int construct_data_ld(struct nfp_prog *nfp_prog, u16 offset, u8 size) 949d9ae7f2bSJakub Kicinski { 9500a793977SJakub Kicinski swreg tmp_reg; 9510a793977SJakub Kicinski 9520a793977SJakub Kicinski /* Check packet length */ 9530a793977SJakub Kicinski tmp_reg = ur_load_imm_any(nfp_prog, offset + size, imm_a(nfp_prog)); 9540a793977SJakub Kicinski emit_alu(nfp_prog, reg_none(), plen_reg(nfp_prog), ALU_OP_SUB, tmp_reg); 955e84797feSJakub Kicinski emit_br_relo(nfp_prog, BR_BLO, BR_OFF_RELO, 0, RELO_BR_GO_ABORT); 9560a793977SJakub Kicinski 9570a793977SJakub Kicinski /* Load data */ 9580a793977SJakub Kicinski tmp_reg = re_load_imm_any(nfp_prog, offset, imm_b(nfp_prog)); 9590a793977SJakub Kicinski return data_ld(nfp_prog, tmp_reg, 0, size); 960d9ae7f2bSJakub Kicinski } 961d9ae7f2bSJakub Kicinski 962e663fe38SJakub Kicinski static int 963e663fe38SJakub Kicinski data_stx_host_order(struct nfp_prog *nfp_prog, u8 dst_gpr, swreg offset, 964e663fe38SJakub Kicinski u8 src_gpr, u8 size) 965e663fe38SJakub Kicinski { 966e663fe38SJakub Kicinski unsigned int i; 967e663fe38SJakub Kicinski 968e663fe38SJakub Kicinski for (i = 0; i * 4 < size; i++) 969e663fe38SJakub Kicinski wrp_mov(nfp_prog, reg_xfer(i), reg_a(src_gpr + i)); 970e663fe38SJakub Kicinski 971e663fe38SJakub Kicinski emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0, 972b556ddd9SJakub Kicinski reg_a(dst_gpr), offset, size - 1, CMD_CTX_SWAP); 973e663fe38SJakub Kicinski 974e663fe38SJakub Kicinski return 0; 975e663fe38SJakub Kicinski } 976e663fe38SJakub Kicinski 977e663fe38SJakub Kicinski static int 978e663fe38SJakub Kicinski data_st_host_order(struct nfp_prog *nfp_prog, u8 dst_gpr, swreg offset, 979e663fe38SJakub Kicinski u64 imm, u8 size) 980e663fe38SJakub Kicinski { 981e663fe38SJakub Kicinski wrp_immed(nfp_prog, reg_xfer(0), imm); 982e663fe38SJakub Kicinski if (size == 8) 983e663fe38SJakub Kicinski wrp_immed(nfp_prog, reg_xfer(1), imm >> 32); 984e663fe38SJakub Kicinski 985e663fe38SJakub Kicinski emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0, 986b556ddd9SJakub Kicinski reg_a(dst_gpr), offset, size - 1, CMD_CTX_SWAP); 987e663fe38SJakub Kicinski 988e663fe38SJakub Kicinski return 0; 989e663fe38SJakub Kicinski } 990e663fe38SJakub Kicinski 991ee9133a8SJakub Kicinski typedef int 992ee9133a8SJakub Kicinski (*lmem_step)(struct nfp_prog *nfp_prog, u8 gpr, u8 gpr_byte, s32 off, 9932df03a50SJakub Kicinski unsigned int size, bool first, bool new_gpr, bool last, bool lm3, 9942df03a50SJakub Kicinski bool needs_inc); 995a82b23fbSJakub Kicinski 996a82b23fbSJakub Kicinski static int 997a82b23fbSJakub Kicinski wrp_lmem_load(struct nfp_prog *nfp_prog, u8 dst, u8 dst_byte, s32 off, 9982df03a50SJakub Kicinski unsigned int size, bool first, bool new_gpr, bool last, bool lm3, 9992df03a50SJakub Kicinski bool needs_inc) 1000a82b23fbSJakub Kicinski { 10012df03a50SJakub Kicinski bool should_inc = needs_inc && new_gpr && !last; 1002a82b23fbSJakub Kicinski u32 idx, src_byte; 1003a82b23fbSJakub Kicinski enum shf_sc sc; 1004a82b23fbSJakub Kicinski swreg reg; 1005a82b23fbSJakub Kicinski int shf; 1006a82b23fbSJakub Kicinski u8 mask; 1007a82b23fbSJakub Kicinski 1008a82b23fbSJakub Kicinski if (WARN_ON_ONCE(dst_byte + size > 4 || off % 4 + size > 4)) 1009a82b23fbSJakub Kicinski return -EOPNOTSUPP; 1010a82b23fbSJakub Kicinski 1011a82b23fbSJakub Kicinski idx = off / 4; 1012a82b23fbSJakub Kicinski 1013a82b23fbSJakub Kicinski /* Move the entire word */ 1014a82b23fbSJakub Kicinski if (size == 4) { 10152df03a50SJakub Kicinski wrp_mov(nfp_prog, reg_both(dst), 10162df03a50SJakub Kicinski should_inc ? reg_lm_inc(3) : reg_lm(lm3 ? 3 : 0, idx)); 1017a82b23fbSJakub Kicinski return 0; 1018a82b23fbSJakub Kicinski } 1019a82b23fbSJakub Kicinski 10202df03a50SJakub Kicinski if (WARN_ON_ONCE(lm3 && idx > RE_REG_LM_IDX_MAX)) 10212df03a50SJakub Kicinski return -EOPNOTSUPP; 10222df03a50SJakub Kicinski 1023a82b23fbSJakub Kicinski src_byte = off % 4; 1024a82b23fbSJakub Kicinski 1025a82b23fbSJakub Kicinski mask = (1 << size) - 1; 1026a82b23fbSJakub Kicinski mask <<= dst_byte; 1027a82b23fbSJakub Kicinski 1028a82b23fbSJakub Kicinski if (WARN_ON_ONCE(mask > 0xf)) 1029a82b23fbSJakub Kicinski return -EOPNOTSUPP; 1030a82b23fbSJakub Kicinski 1031a82b23fbSJakub Kicinski shf = abs(src_byte - dst_byte) * 8; 1032a82b23fbSJakub Kicinski if (src_byte == dst_byte) { 1033a82b23fbSJakub Kicinski sc = SHF_SC_NONE; 1034a82b23fbSJakub Kicinski } else if (src_byte < dst_byte) { 1035a82b23fbSJakub Kicinski shf = 32 - shf; 1036a82b23fbSJakub Kicinski sc = SHF_SC_L_SHF; 1037a82b23fbSJakub Kicinski } else { 1038a82b23fbSJakub Kicinski sc = SHF_SC_R_SHF; 1039a82b23fbSJakub Kicinski } 1040a82b23fbSJakub Kicinski 1041a82b23fbSJakub Kicinski /* ld_field can address fewer indexes, if offset too large do RMW. 1042a82b23fbSJakub Kicinski * Because we RMV twice we waste 2 cycles on unaligned 8 byte writes. 1043a82b23fbSJakub Kicinski */ 1044a82b23fbSJakub Kicinski if (idx <= RE_REG_LM_IDX_MAX) { 10452df03a50SJakub Kicinski reg = reg_lm(lm3 ? 3 : 0, idx); 1046a82b23fbSJakub Kicinski } else { 1047a82b23fbSJakub Kicinski reg = imm_a(nfp_prog); 10489a90c83cSJakub Kicinski /* If it's not the first part of the load and we start a new GPR 10499a90c83cSJakub Kicinski * that means we are loading a second part of the LMEM word into 10509a90c83cSJakub Kicinski * a new GPR. IOW we've already looked that LMEM word and 10519a90c83cSJakub Kicinski * therefore it has been loaded into imm_a(). 10529a90c83cSJakub Kicinski */ 10539a90c83cSJakub Kicinski if (first || !new_gpr) 1054a82b23fbSJakub Kicinski wrp_mov(nfp_prog, reg, reg_lm(0, idx)); 1055a82b23fbSJakub Kicinski } 1056a82b23fbSJakub Kicinski 1057a82b23fbSJakub Kicinski emit_ld_field_any(nfp_prog, reg_both(dst), mask, reg, sc, shf, new_gpr); 1058a82b23fbSJakub Kicinski 10592df03a50SJakub Kicinski if (should_inc) 10602df03a50SJakub Kicinski wrp_mov(nfp_prog, reg_none(), reg_lm_inc(3)); 10612df03a50SJakub Kicinski 1062a82b23fbSJakub Kicinski return 0; 1063a82b23fbSJakub Kicinski } 1064ee9133a8SJakub Kicinski 1065ee9133a8SJakub Kicinski static int 1066ee9133a8SJakub Kicinski wrp_lmem_store(struct nfp_prog *nfp_prog, u8 src, u8 src_byte, s32 off, 10672df03a50SJakub Kicinski unsigned int size, bool first, bool new_gpr, bool last, bool lm3, 10682df03a50SJakub Kicinski bool needs_inc) 1069ee9133a8SJakub Kicinski { 10702df03a50SJakub Kicinski bool should_inc = needs_inc && new_gpr && !last; 1071ee9133a8SJakub Kicinski u32 idx, dst_byte; 1072ee9133a8SJakub Kicinski enum shf_sc sc; 1073ee9133a8SJakub Kicinski swreg reg; 1074ee9133a8SJakub Kicinski int shf; 1075ee9133a8SJakub Kicinski u8 mask; 1076ee9133a8SJakub Kicinski 1077ee9133a8SJakub Kicinski if (WARN_ON_ONCE(src_byte + size > 4 || off % 4 + size > 4)) 1078ee9133a8SJakub Kicinski return -EOPNOTSUPP; 1079ee9133a8SJakub Kicinski 1080ee9133a8SJakub Kicinski idx = off / 4; 1081ee9133a8SJakub Kicinski 1082ee9133a8SJakub Kicinski /* Move the entire word */ 1083ee9133a8SJakub Kicinski if (size == 4) { 10842df03a50SJakub Kicinski wrp_mov(nfp_prog, 10852df03a50SJakub Kicinski should_inc ? reg_lm_inc(3) : reg_lm(lm3 ? 3 : 0, idx), 10862df03a50SJakub Kicinski reg_b(src)); 1087ee9133a8SJakub Kicinski return 0; 1088ee9133a8SJakub Kicinski } 1089ee9133a8SJakub Kicinski 10902df03a50SJakub Kicinski if (WARN_ON_ONCE(lm3 && idx > RE_REG_LM_IDX_MAX)) 10912df03a50SJakub Kicinski return -EOPNOTSUPP; 10922df03a50SJakub Kicinski 1093ee9133a8SJakub Kicinski dst_byte = off % 4; 1094ee9133a8SJakub Kicinski 1095ee9133a8SJakub Kicinski mask = (1 << size) - 1; 1096ee9133a8SJakub Kicinski mask <<= dst_byte; 1097ee9133a8SJakub Kicinski 1098ee9133a8SJakub Kicinski if (WARN_ON_ONCE(mask > 0xf)) 1099ee9133a8SJakub Kicinski return -EOPNOTSUPP; 1100ee9133a8SJakub Kicinski 1101ee9133a8SJakub Kicinski shf = abs(src_byte - dst_byte) * 8; 1102ee9133a8SJakub Kicinski if (src_byte == dst_byte) { 1103ee9133a8SJakub Kicinski sc = SHF_SC_NONE; 1104ee9133a8SJakub Kicinski } else if (src_byte < dst_byte) { 1105ee9133a8SJakub Kicinski shf = 32 - shf; 1106ee9133a8SJakub Kicinski sc = SHF_SC_L_SHF; 1107ee9133a8SJakub Kicinski } else { 1108ee9133a8SJakub Kicinski sc = SHF_SC_R_SHF; 1109ee9133a8SJakub Kicinski } 1110ee9133a8SJakub Kicinski 1111ee9133a8SJakub Kicinski /* ld_field can address fewer indexes, if offset too large do RMW. 1112ee9133a8SJakub Kicinski * Because we RMV twice we waste 2 cycles on unaligned 8 byte writes. 1113ee9133a8SJakub Kicinski */ 1114ee9133a8SJakub Kicinski if (idx <= RE_REG_LM_IDX_MAX) { 11152df03a50SJakub Kicinski reg = reg_lm(lm3 ? 3 : 0, idx); 1116ee9133a8SJakub Kicinski } else { 1117ee9133a8SJakub Kicinski reg = imm_a(nfp_prog); 11189a90c83cSJakub Kicinski /* Only first and last LMEM locations are going to need RMW, 11199a90c83cSJakub Kicinski * the middle location will be overwritten fully. 11209a90c83cSJakub Kicinski */ 11219a90c83cSJakub Kicinski if (first || last) 1122ee9133a8SJakub Kicinski wrp_mov(nfp_prog, reg, reg_lm(0, idx)); 1123ee9133a8SJakub Kicinski } 1124ee9133a8SJakub Kicinski 1125ee9133a8SJakub Kicinski emit_ld_field(nfp_prog, reg, mask, reg_b(src), sc, shf); 1126ee9133a8SJakub Kicinski 11279a90c83cSJakub Kicinski if (new_gpr || last) { 1128ee9133a8SJakub Kicinski if (idx > RE_REG_LM_IDX_MAX) 1129ee9133a8SJakub Kicinski wrp_mov(nfp_prog, reg_lm(0, idx), reg); 11302df03a50SJakub Kicinski if (should_inc) 11312df03a50SJakub Kicinski wrp_mov(nfp_prog, reg_none(), reg_lm_inc(3)); 11329a90c83cSJakub Kicinski } 1133ee9133a8SJakub Kicinski 1134ee9133a8SJakub Kicinski return 0; 1135ee9133a8SJakub Kicinski } 1136ee9133a8SJakub Kicinski 1137ee9133a8SJakub Kicinski static int 1138ee9133a8SJakub Kicinski mem_op_stack(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 1139b14157eeSJakub Kicinski unsigned int size, unsigned int ptr_off, u8 gpr, u8 ptr_gpr, 1140b14157eeSJakub Kicinski bool clr_gpr, lmem_step step) 1141ee9133a8SJakub Kicinski { 11421a7e62e6SQuentin Monnet s32 off = nfp_prog->stack_frame_depth + meta->insn.off + ptr_off; 11439a90c83cSJakub Kicinski bool first = true, last; 11442df03a50SJakub Kicinski bool needs_inc = false; 11452df03a50SJakub Kicinski swreg stack_off_reg; 1146a82b23fbSJakub Kicinski u8 prev_gpr = 255; 1147ee9133a8SJakub Kicinski u32 gpr_byte = 0; 11482df03a50SJakub Kicinski bool lm3 = true; 1149ee9133a8SJakub Kicinski int ret; 1150ee9133a8SJakub Kicinski 11517ff0ccdeSQuentin Monnet if (meta->ptr_not_const || 11527ff0ccdeSQuentin Monnet meta->flags & FLAG_INSN_PTR_CALLER_STACK_FRAME) { 1153b14157eeSJakub Kicinski /* Use of the last encountered ptr_off is OK, they all have 1154b14157eeSJakub Kicinski * the same alignment. Depend on low bits of value being 1155b14157eeSJakub Kicinski * discarded when written to LMaddr register. 1156b14157eeSJakub Kicinski */ 1157b14157eeSJakub Kicinski stack_off_reg = ur_load_imm_any(nfp_prog, meta->insn.off, 1158b14157eeSJakub Kicinski stack_imm(nfp_prog)); 1159b14157eeSJakub Kicinski 1160b14157eeSJakub Kicinski emit_alu(nfp_prog, imm_b(nfp_prog), 1161b14157eeSJakub Kicinski reg_a(ptr_gpr), ALU_OP_ADD, stack_off_reg); 1162b14157eeSJakub Kicinski 1163b14157eeSJakub Kicinski needs_inc = true; 1164b14157eeSJakub Kicinski } else if (off + size <= 64) { 11652df03a50SJakub Kicinski /* We can reach bottom 64B with LMaddr0 */ 11662df03a50SJakub Kicinski lm3 = false; 11672df03a50SJakub Kicinski } else if (round_down(off, 32) == round_down(off + size - 1, 32)) { 11682df03a50SJakub Kicinski /* We have to set up a new pointer. If we know the offset 11692df03a50SJakub Kicinski * and the entire access falls into a single 32 byte aligned 11702df03a50SJakub Kicinski * window we won't have to increment the LM pointer. 11712df03a50SJakub Kicinski * The 32 byte alignment is imporant because offset is ORed in 11722df03a50SJakub Kicinski * not added when doing *l$indexN[off]. 11732df03a50SJakub Kicinski */ 11742df03a50SJakub Kicinski stack_off_reg = ur_load_imm_any(nfp_prog, round_down(off, 32), 11752df03a50SJakub Kicinski stack_imm(nfp_prog)); 11762df03a50SJakub Kicinski emit_alu(nfp_prog, imm_b(nfp_prog), 11772df03a50SJakub Kicinski stack_reg(nfp_prog), ALU_OP_ADD, stack_off_reg); 11782df03a50SJakub Kicinski 11792df03a50SJakub Kicinski off %= 32; 11802df03a50SJakub Kicinski } else { 11812df03a50SJakub Kicinski stack_off_reg = ur_load_imm_any(nfp_prog, round_down(off, 4), 11822df03a50SJakub Kicinski stack_imm(nfp_prog)); 11832df03a50SJakub Kicinski 11842df03a50SJakub Kicinski emit_alu(nfp_prog, imm_b(nfp_prog), 11852df03a50SJakub Kicinski stack_reg(nfp_prog), ALU_OP_ADD, stack_off_reg); 11862df03a50SJakub Kicinski 11872df03a50SJakub Kicinski needs_inc = true; 11882df03a50SJakub Kicinski } 11892df03a50SJakub Kicinski if (lm3) { 11902df03a50SJakub Kicinski emit_csr_wr(nfp_prog, imm_b(nfp_prog), NFP_CSR_ACT_LM_ADDR3); 11912df03a50SJakub Kicinski /* For size < 4 one slot will be filled by zeroing of upper. */ 11922df03a50SJakub Kicinski wrp_nops(nfp_prog, clr_gpr && size < 8 ? 2 : 3); 11932df03a50SJakub Kicinski } 11942df03a50SJakub Kicinski 1195a82b23fbSJakub Kicinski if (clr_gpr && size < 8) 1196a82b23fbSJakub Kicinski wrp_immed(nfp_prog, reg_both(gpr + 1), 0); 1197a82b23fbSJakub Kicinski 1198ee9133a8SJakub Kicinski while (size) { 1199ee9133a8SJakub Kicinski u32 slice_end; 1200ee9133a8SJakub Kicinski u8 slice_size; 1201ee9133a8SJakub Kicinski 1202ee9133a8SJakub Kicinski slice_size = min(size, 4 - gpr_byte); 1203ee9133a8SJakub Kicinski slice_end = min(off + slice_size, round_up(off + 1, 4)); 1204ee9133a8SJakub Kicinski slice_size = slice_end - off; 1205ee9133a8SJakub Kicinski 12069a90c83cSJakub Kicinski last = slice_size == size; 12079a90c83cSJakub Kicinski 12082df03a50SJakub Kicinski if (needs_inc) 12092df03a50SJakub Kicinski off %= 4; 12102df03a50SJakub Kicinski 1211a82b23fbSJakub Kicinski ret = step(nfp_prog, gpr, gpr_byte, off, slice_size, 12122df03a50SJakub Kicinski first, gpr != prev_gpr, last, lm3, needs_inc); 1213ee9133a8SJakub Kicinski if (ret) 1214ee9133a8SJakub Kicinski return ret; 1215ee9133a8SJakub Kicinski 1216a82b23fbSJakub Kicinski prev_gpr = gpr; 12179a90c83cSJakub Kicinski first = false; 12189a90c83cSJakub Kicinski 1219ee9133a8SJakub Kicinski gpr_byte += slice_size; 1220ee9133a8SJakub Kicinski if (gpr_byte >= 4) { 1221ee9133a8SJakub Kicinski gpr_byte -= 4; 1222ee9133a8SJakub Kicinski gpr++; 1223ee9133a8SJakub Kicinski } 1224ee9133a8SJakub Kicinski 1225ee9133a8SJakub Kicinski size -= slice_size; 1226ee9133a8SJakub Kicinski off += slice_size; 1227ee9133a8SJakub Kicinski } 1228ee9133a8SJakub Kicinski 1229ee9133a8SJakub Kicinski return 0; 1230ee9133a8SJakub Kicinski } 1231ee9133a8SJakub Kicinski 1232d9ae7f2bSJakub Kicinski static void 1233d9ae7f2bSJakub Kicinski wrp_alu_imm(struct nfp_prog *nfp_prog, u8 dst, enum alu_op alu_op, u32 imm) 1234d9ae7f2bSJakub Kicinski { 1235b3f868dfSJakub Kicinski swreg tmp_reg; 1236d9ae7f2bSJakub Kicinski 1237d9ae7f2bSJakub Kicinski if (alu_op == ALU_OP_AND) { 1238d9ae7f2bSJakub Kicinski if (!imm) 1239d9ae7f2bSJakub Kicinski wrp_immed(nfp_prog, reg_both(dst), 0); 1240d9ae7f2bSJakub Kicinski if (!imm || !~imm) 1241d9ae7f2bSJakub Kicinski return; 1242d9ae7f2bSJakub Kicinski } 1243d9ae7f2bSJakub Kicinski if (alu_op == ALU_OP_OR) { 1244d9ae7f2bSJakub Kicinski if (!~imm) 1245d9ae7f2bSJakub Kicinski wrp_immed(nfp_prog, reg_both(dst), ~0U); 1246d9ae7f2bSJakub Kicinski if (!imm || !~imm) 1247d9ae7f2bSJakub Kicinski return; 1248d9ae7f2bSJakub Kicinski } 1249d9ae7f2bSJakub Kicinski if (alu_op == ALU_OP_XOR) { 1250d9ae7f2bSJakub Kicinski if (!~imm) 1251d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_both(dst), reg_none(), 12525d42ced1SJiong Wang ALU_OP_NOT, reg_b(dst)); 1253d9ae7f2bSJakub Kicinski if (!imm || !~imm) 1254d9ae7f2bSJakub Kicinski return; 1255d9ae7f2bSJakub Kicinski } 1256d9ae7f2bSJakub Kicinski 1257d9ae7f2bSJakub Kicinski tmp_reg = ur_load_imm_any(nfp_prog, imm, imm_b(nfp_prog)); 1258d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, tmp_reg); 1259d9ae7f2bSJakub Kicinski } 1260d9ae7f2bSJakub Kicinski 1261d9ae7f2bSJakub Kicinski static int 1262d9ae7f2bSJakub Kicinski wrp_alu64_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 1263d9ae7f2bSJakub Kicinski enum alu_op alu_op, bool skip) 1264d9ae7f2bSJakub Kicinski { 1265d9ae7f2bSJakub Kicinski const struct bpf_insn *insn = &meta->insn; 1266d9ae7f2bSJakub Kicinski u64 imm = insn->imm; /* sign extend */ 1267d9ae7f2bSJakub Kicinski 1268d9ae7f2bSJakub Kicinski if (skip) { 1269d9ae7f2bSJakub Kicinski meta->skip = true; 1270d9ae7f2bSJakub Kicinski return 0; 1271d9ae7f2bSJakub Kicinski } 1272d9ae7f2bSJakub Kicinski 1273d9ae7f2bSJakub Kicinski wrp_alu_imm(nfp_prog, insn->dst_reg * 2, alu_op, imm & ~0U); 1274d9ae7f2bSJakub Kicinski wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, alu_op, imm >> 32); 1275d9ae7f2bSJakub Kicinski 1276d9ae7f2bSJakub Kicinski return 0; 1277d9ae7f2bSJakub Kicinski } 1278d9ae7f2bSJakub Kicinski 1279d9ae7f2bSJakub Kicinski static int 1280d9ae7f2bSJakub Kicinski wrp_alu64_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 1281d9ae7f2bSJakub Kicinski enum alu_op alu_op) 1282d9ae7f2bSJakub Kicinski { 1283d9ae7f2bSJakub Kicinski u8 dst = meta->insn.dst_reg * 2, src = meta->insn.src_reg * 2; 1284d9ae7f2bSJakub Kicinski 1285d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, reg_b(src)); 1286d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_both(dst + 1), 1287d9ae7f2bSJakub Kicinski reg_a(dst + 1), alu_op, reg_b(src + 1)); 1288d9ae7f2bSJakub Kicinski 1289d9ae7f2bSJakub Kicinski return 0; 1290d9ae7f2bSJakub Kicinski } 1291d9ae7f2bSJakub Kicinski 1292d9ae7f2bSJakub Kicinski static int 1293d9ae7f2bSJakub Kicinski wrp_alu32_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 1294f036ebd9SJiong Wang enum alu_op alu_op) 1295d9ae7f2bSJakub Kicinski { 1296d9ae7f2bSJakub Kicinski const struct bpf_insn *insn = &meta->insn; 1297d9ae7f2bSJakub Kicinski 1298d9ae7f2bSJakub Kicinski wrp_alu_imm(nfp_prog, insn->dst_reg * 2, alu_op, insn->imm); 1299d9ae7f2bSJakub Kicinski wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0); 1300d9ae7f2bSJakub Kicinski 1301d9ae7f2bSJakub Kicinski return 0; 1302d9ae7f2bSJakub Kicinski } 1303d9ae7f2bSJakub Kicinski 1304d9ae7f2bSJakub Kicinski static int 1305d9ae7f2bSJakub Kicinski wrp_alu32_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 1306d9ae7f2bSJakub Kicinski enum alu_op alu_op) 1307d9ae7f2bSJakub Kicinski { 1308d9ae7f2bSJakub Kicinski u8 dst = meta->insn.dst_reg * 2, src = meta->insn.src_reg * 2; 1309d9ae7f2bSJakub Kicinski 1310d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, reg_b(src)); 1311d9ae7f2bSJakub Kicinski wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0); 1312d9ae7f2bSJakub Kicinski 1313d9ae7f2bSJakub Kicinski return 0; 1314d9ae7f2bSJakub Kicinski } 1315d9ae7f2bSJakub Kicinski 1316d9ae7f2bSJakub Kicinski static void 1317d9ae7f2bSJakub Kicinski wrp_test_reg_one(struct nfp_prog *nfp_prog, u8 dst, enum alu_op alu_op, u8 src, 1318d9ae7f2bSJakub Kicinski enum br_mask br_mask, u16 off) 1319d9ae7f2bSJakub Kicinski { 1320d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_none(), reg_a(dst), alu_op, reg_b(src)); 1321d9ae7f2bSJakub Kicinski emit_br(nfp_prog, br_mask, off, 0); 1322d9ae7f2bSJakub Kicinski } 1323d9ae7f2bSJakub Kicinski 1324d9ae7f2bSJakub Kicinski static int 1325d9ae7f2bSJakub Kicinski wrp_test_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 1326d9ae7f2bSJakub Kicinski enum alu_op alu_op, enum br_mask br_mask) 1327d9ae7f2bSJakub Kicinski { 1328d9ae7f2bSJakub Kicinski const struct bpf_insn *insn = &meta->insn; 1329d9ae7f2bSJakub Kicinski 1330d9ae7f2bSJakub Kicinski wrp_test_reg_one(nfp_prog, insn->dst_reg * 2, alu_op, 1331d9ae7f2bSJakub Kicinski insn->src_reg * 2, br_mask, insn->off); 1332d9ae7f2bSJakub Kicinski wrp_test_reg_one(nfp_prog, insn->dst_reg * 2 + 1, alu_op, 1333d9ae7f2bSJakub Kicinski insn->src_reg * 2 + 1, br_mask, insn->off); 1334d9ae7f2bSJakub Kicinski 1335d9ae7f2bSJakub Kicinski return 0; 1336d9ae7f2bSJakub Kicinski } 1337d9ae7f2bSJakub Kicinski 133861dd8f00SJakub Kicinski static const struct jmp_code_map { 133961dd8f00SJakub Kicinski enum br_mask br_mask; 134061dd8f00SJakub Kicinski bool swap; 134161dd8f00SJakub Kicinski } jmp_code_map[] = { 134261dd8f00SJakub Kicinski [BPF_JGT >> 4] = { BR_BLO, true }, 134361dd8f00SJakub Kicinski [BPF_JGE >> 4] = { BR_BHS, false }, 134461dd8f00SJakub Kicinski [BPF_JLT >> 4] = { BR_BLO, false }, 134561dd8f00SJakub Kicinski [BPF_JLE >> 4] = { BR_BHS, true }, 134661dd8f00SJakub Kicinski [BPF_JSGT >> 4] = { BR_BLT, true }, 134761dd8f00SJakub Kicinski [BPF_JSGE >> 4] = { BR_BGE, false }, 134861dd8f00SJakub Kicinski [BPF_JSLT >> 4] = { BR_BLT, false }, 134961dd8f00SJakub Kicinski [BPF_JSLE >> 4] = { BR_BGE, true }, 135061dd8f00SJakub Kicinski }; 135161dd8f00SJakub Kicinski 135261dd8f00SJakub Kicinski static const struct jmp_code_map *nfp_jmp_code_get(struct nfp_insn_meta *meta) 135361dd8f00SJakub Kicinski { 135461dd8f00SJakub Kicinski unsigned int op; 135561dd8f00SJakub Kicinski 135661dd8f00SJakub Kicinski op = BPF_OP(meta->insn.code) >> 4; 135761dd8f00SJakub Kicinski /* br_mask of 0 is BR_BEQ which we don't use in jump code table */ 135861dd8f00SJakub Kicinski if (WARN_ONCE(op >= ARRAY_SIZE(jmp_code_map) || 135961dd8f00SJakub Kicinski !jmp_code_map[op].br_mask, 136061dd8f00SJakub Kicinski "no code found for jump instruction")) 136161dd8f00SJakub Kicinski return NULL; 136261dd8f00SJakub Kicinski 136361dd8f00SJakub Kicinski return &jmp_code_map[op]; 136461dd8f00SJakub Kicinski } 136561dd8f00SJakub Kicinski 136661dd8f00SJakub Kicinski static int cmp_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1367d9ae7f2bSJakub Kicinski { 1368d9ae7f2bSJakub Kicinski const struct bpf_insn *insn = &meta->insn; 1369d9ae7f2bSJakub Kicinski u64 imm = insn->imm; /* sign extend */ 137061dd8f00SJakub Kicinski const struct jmp_code_map *code; 13717bdc97beSJakub Kicinski enum alu_op alu_op, carry_op; 1372d9ae7f2bSJakub Kicinski u8 reg = insn->dst_reg * 2; 1373b3f868dfSJakub Kicinski swreg tmp_reg; 1374d9ae7f2bSJakub Kicinski 137561dd8f00SJakub Kicinski code = nfp_jmp_code_get(meta); 137661dd8f00SJakub Kicinski if (!code) 137761dd8f00SJakub Kicinski return -EINVAL; 137861dd8f00SJakub Kicinski 13797bdc97beSJakub Kicinski alu_op = meta->jump_neg_op ? ALU_OP_ADD : ALU_OP_SUB; 13807bdc97beSJakub Kicinski carry_op = meta->jump_neg_op ? ALU_OP_ADD_C : ALU_OP_SUB_C; 13817bdc97beSJakub Kicinski 1382d9ae7f2bSJakub Kicinski tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog)); 138361dd8f00SJakub Kicinski if (!code->swap) 13847bdc97beSJakub Kicinski emit_alu(nfp_prog, reg_none(), reg_a(reg), alu_op, tmp_reg); 1385d9ae7f2bSJakub Kicinski else 13867bdc97beSJakub Kicinski emit_alu(nfp_prog, reg_none(), tmp_reg, alu_op, reg_a(reg)); 1387d9ae7f2bSJakub Kicinski 1388d9ae7f2bSJakub Kicinski tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog)); 138961dd8f00SJakub Kicinski if (!code->swap) 1390d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_none(), 13917bdc97beSJakub Kicinski reg_a(reg + 1), carry_op, tmp_reg); 1392d9ae7f2bSJakub Kicinski else 1393d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_none(), 13947bdc97beSJakub Kicinski tmp_reg, carry_op, reg_a(reg + 1)); 1395d9ae7f2bSJakub Kicinski 139661dd8f00SJakub Kicinski emit_br(nfp_prog, code->br_mask, insn->off, 0); 1397d9ae7f2bSJakub Kicinski 1398d9ae7f2bSJakub Kicinski return 0; 1399d9ae7f2bSJakub Kicinski } 1400d9ae7f2bSJakub Kicinski 140161dd8f00SJakub Kicinski static int cmp_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1402d9ae7f2bSJakub Kicinski { 1403d9ae7f2bSJakub Kicinski const struct bpf_insn *insn = &meta->insn; 140461dd8f00SJakub Kicinski const struct jmp_code_map *code; 140526fa818dSJakub Kicinski u8 areg, breg; 140626fa818dSJakub Kicinski 140761dd8f00SJakub Kicinski code = nfp_jmp_code_get(meta); 140861dd8f00SJakub Kicinski if (!code) 140961dd8f00SJakub Kicinski return -EINVAL; 141061dd8f00SJakub Kicinski 141126fa818dSJakub Kicinski areg = insn->dst_reg * 2; 141226fa818dSJakub Kicinski breg = insn->src_reg * 2; 1413d9ae7f2bSJakub Kicinski 141461dd8f00SJakub Kicinski if (code->swap) { 1415d9ae7f2bSJakub Kicinski areg ^= breg; 1416d9ae7f2bSJakub Kicinski breg ^= areg; 1417d9ae7f2bSJakub Kicinski areg ^= breg; 1418d9ae7f2bSJakub Kicinski } 1419d9ae7f2bSJakub Kicinski 1420d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_none(), reg_a(areg), ALU_OP_SUB, reg_b(breg)); 1421d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_none(), 1422d9ae7f2bSJakub Kicinski reg_a(areg + 1), ALU_OP_SUB_C, reg_b(breg + 1)); 142361dd8f00SJakub Kicinski emit_br(nfp_prog, code->br_mask, insn->off, 0); 1424d9ae7f2bSJakub Kicinski 1425d9ae7f2bSJakub Kicinski return 0; 1426d9ae7f2bSJakub Kicinski } 1427d9ae7f2bSJakub Kicinski 14283119d1fdSJakub Kicinski static void wrp_end32(struct nfp_prog *nfp_prog, swreg reg_in, u8 gpr_out) 14293119d1fdSJakub Kicinski { 14303119d1fdSJakub Kicinski emit_ld_field(nfp_prog, reg_both(gpr_out), 0xf, reg_in, 14313119d1fdSJakub Kicinski SHF_SC_R_ROT, 8); 14323119d1fdSJakub Kicinski emit_ld_field(nfp_prog, reg_both(gpr_out), 0x5, reg_a(gpr_out), 14333119d1fdSJakub Kicinski SHF_SC_R_ROT, 16); 14343119d1fdSJakub Kicinski } 14353119d1fdSJakub Kicinski 1436d3d23fdbSJiong Wang static void 1437d3d23fdbSJiong Wang wrp_mul_u32(struct nfp_prog *nfp_prog, swreg dst_hi, swreg dst_lo, swreg lreg, 1438d3d23fdbSJiong Wang swreg rreg, bool gen_high_half) 1439d3d23fdbSJiong Wang { 1440d3d23fdbSJiong Wang emit_mul(nfp_prog, lreg, MUL_TYPE_START, MUL_STEP_NONE, rreg); 1441d3d23fdbSJiong Wang emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_32x32, MUL_STEP_1, rreg); 1442d3d23fdbSJiong Wang emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_32x32, MUL_STEP_2, rreg); 1443d3d23fdbSJiong Wang emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_32x32, MUL_STEP_3, rreg); 1444d3d23fdbSJiong Wang emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_32x32, MUL_STEP_4, rreg); 1445d3d23fdbSJiong Wang emit_mul(nfp_prog, dst_lo, MUL_TYPE_STEP_32x32, MUL_LAST, reg_none()); 1446d3d23fdbSJiong Wang if (gen_high_half) 1447d3d23fdbSJiong Wang emit_mul(nfp_prog, dst_hi, MUL_TYPE_STEP_32x32, MUL_LAST_2, 1448d3d23fdbSJiong Wang reg_none()); 1449d3d23fdbSJiong Wang else 1450d3d23fdbSJiong Wang wrp_immed(nfp_prog, dst_hi, 0); 1451d3d23fdbSJiong Wang } 1452d3d23fdbSJiong Wang 1453d3d23fdbSJiong Wang static void 1454d3d23fdbSJiong Wang wrp_mul_u16(struct nfp_prog *nfp_prog, swreg dst_hi, swreg dst_lo, swreg lreg, 1455d3d23fdbSJiong Wang swreg rreg) 1456d3d23fdbSJiong Wang { 1457d3d23fdbSJiong Wang emit_mul(nfp_prog, lreg, MUL_TYPE_START, MUL_STEP_NONE, rreg); 1458d3d23fdbSJiong Wang emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_16x16, MUL_STEP_1, rreg); 1459d3d23fdbSJiong Wang emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_16x16, MUL_STEP_2, rreg); 1460d3d23fdbSJiong Wang emit_mul(nfp_prog, dst_lo, MUL_TYPE_STEP_16x16, MUL_LAST, reg_none()); 1461d3d23fdbSJiong Wang } 1462d3d23fdbSJiong Wang 1463d3d23fdbSJiong Wang static int 1464d3d23fdbSJiong Wang wrp_mul(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 1465d3d23fdbSJiong Wang bool gen_high_half, bool ropnd_from_reg) 1466d3d23fdbSJiong Wang { 1467d3d23fdbSJiong Wang swreg multiplier, multiplicand, dst_hi, dst_lo; 1468d3d23fdbSJiong Wang const struct bpf_insn *insn = &meta->insn; 1469d3d23fdbSJiong Wang u32 lopnd_max, ropnd_max; 1470d3d23fdbSJiong Wang u8 dst_reg; 1471d3d23fdbSJiong Wang 1472d3d23fdbSJiong Wang dst_reg = insn->dst_reg; 1473d3d23fdbSJiong Wang multiplicand = reg_a(dst_reg * 2); 1474d3d23fdbSJiong Wang dst_hi = reg_both(dst_reg * 2 + 1); 1475d3d23fdbSJiong Wang dst_lo = reg_both(dst_reg * 2); 1476d3d23fdbSJiong Wang lopnd_max = meta->umax_dst; 1477d3d23fdbSJiong Wang if (ropnd_from_reg) { 1478d3d23fdbSJiong Wang multiplier = reg_b(insn->src_reg * 2); 1479d3d23fdbSJiong Wang ropnd_max = meta->umax_src; 1480d3d23fdbSJiong Wang } else { 1481d3d23fdbSJiong Wang u32 imm = insn->imm; 1482d3d23fdbSJiong Wang 1483d3d23fdbSJiong Wang multiplier = ur_load_imm_any(nfp_prog, imm, imm_b(nfp_prog)); 1484d3d23fdbSJiong Wang ropnd_max = imm; 1485d3d23fdbSJiong Wang } 1486d3d23fdbSJiong Wang if (lopnd_max > U16_MAX || ropnd_max > U16_MAX) 1487d3d23fdbSJiong Wang wrp_mul_u32(nfp_prog, dst_hi, dst_lo, multiplicand, multiplier, 1488d3d23fdbSJiong Wang gen_high_half); 1489d3d23fdbSJiong Wang else 1490d3d23fdbSJiong Wang wrp_mul_u16(nfp_prog, dst_hi, dst_lo, multiplicand, multiplier); 1491d3d23fdbSJiong Wang 1492d3d23fdbSJiong Wang return 0; 1493d3d23fdbSJiong Wang } 1494d3d23fdbSJiong Wang 14952a952b03SJiong Wang static int wrp_div_imm(struct nfp_prog *nfp_prog, u8 dst, u64 imm) 14962a952b03SJiong Wang { 14972a952b03SJiong Wang swreg dst_both = reg_both(dst), dst_a = reg_a(dst), dst_b = reg_a(dst); 14989fb410a8SJiong Wang struct reciprocal_value_adv rvalue; 14999fb410a8SJiong Wang u8 pre_shift, exp; 15002a952b03SJiong Wang swreg magic; 15012a952b03SJiong Wang 15022a952b03SJiong Wang if (imm > U32_MAX) { 15032a952b03SJiong Wang wrp_immed(nfp_prog, dst_both, 0); 15042a952b03SJiong Wang return 0; 15052a952b03SJiong Wang } 15062a952b03SJiong Wang 15079fb410a8SJiong Wang /* NOTE: because we are using "reciprocal_value_adv" which doesn't 15089fb410a8SJiong Wang * support "divisor > (1u << 31)", we need to JIT separate NFP sequence 15099fb410a8SJiong Wang * to handle such case which actually equals to the result of unsigned 15109fb410a8SJiong Wang * comparison "dst >= imm" which could be calculated using the following 15119fb410a8SJiong Wang * NFP sequence: 15129fb410a8SJiong Wang * 15139fb410a8SJiong Wang * alu[--, dst, -, imm] 15149fb410a8SJiong Wang * immed[imm, 0] 15159fb410a8SJiong Wang * alu[dst, imm, +carry, 0] 15169fb410a8SJiong Wang * 15179fb410a8SJiong Wang */ 15189fb410a8SJiong Wang if (imm > 1U << 31) { 15199fb410a8SJiong Wang swreg tmp_b = ur_load_imm_any(nfp_prog, imm, imm_b(nfp_prog)); 15209fb410a8SJiong Wang 15219fb410a8SJiong Wang emit_alu(nfp_prog, reg_none(), dst_a, ALU_OP_SUB, tmp_b); 15229fb410a8SJiong Wang wrp_immed(nfp_prog, imm_a(nfp_prog), 0); 15239fb410a8SJiong Wang emit_alu(nfp_prog, dst_both, imm_a(nfp_prog), ALU_OP_ADD_C, 15249fb410a8SJiong Wang reg_imm(0)); 15259fb410a8SJiong Wang return 0; 15269fb410a8SJiong Wang } 15279fb410a8SJiong Wang 15289fb410a8SJiong Wang rvalue = reciprocal_value_adv(imm, 32); 15299fb410a8SJiong Wang exp = rvalue.exp; 15309fb410a8SJiong Wang if (rvalue.is_wide_m && !(imm & 1)) { 15319fb410a8SJiong Wang pre_shift = fls(imm & -imm) - 1; 15329fb410a8SJiong Wang rvalue = reciprocal_value_adv(imm >> pre_shift, 32 - pre_shift); 15339fb410a8SJiong Wang } else { 15349fb410a8SJiong Wang pre_shift = 0; 15359fb410a8SJiong Wang } 15362a952b03SJiong Wang magic = ur_load_imm_any(nfp_prog, rvalue.m, imm_b(nfp_prog)); 15379fb410a8SJiong Wang if (imm == 1U << exp) { 15382a952b03SJiong Wang emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE, dst_b, 15399fb410a8SJiong Wang SHF_SC_R_SHF, exp); 15409fb410a8SJiong Wang } else if (rvalue.is_wide_m) { 15419fb410a8SJiong Wang wrp_mul_u32(nfp_prog, imm_both(nfp_prog), reg_none(), dst_a, 15429fb410a8SJiong Wang magic, true); 15439fb410a8SJiong Wang emit_alu(nfp_prog, dst_both, dst_a, ALU_OP_SUB, 15449fb410a8SJiong Wang imm_b(nfp_prog)); 15452a952b03SJiong Wang emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE, dst_b, 15469fb410a8SJiong Wang SHF_SC_R_SHF, 1); 15479fb410a8SJiong Wang emit_alu(nfp_prog, dst_both, dst_a, ALU_OP_ADD, 15489fb410a8SJiong Wang imm_b(nfp_prog)); 15499fb410a8SJiong Wang emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE, dst_b, 15509fb410a8SJiong Wang SHF_SC_R_SHF, rvalue.sh - 1); 15519fb410a8SJiong Wang } else { 15529fb410a8SJiong Wang if (pre_shift) 15539fb410a8SJiong Wang emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE, 15549fb410a8SJiong Wang dst_b, SHF_SC_R_SHF, pre_shift); 15559fb410a8SJiong Wang wrp_mul_u32(nfp_prog, dst_both, reg_none(), dst_a, magic, true); 15569fb410a8SJiong Wang emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE, 15579fb410a8SJiong Wang dst_b, SHF_SC_R_SHF, rvalue.sh); 15589fb410a8SJiong Wang } 15592a952b03SJiong Wang 15602a952b03SJiong Wang return 0; 15612a952b03SJiong Wang } 15622a952b03SJiong Wang 15630d49eaf4SJakub Kicinski static int adjust_head(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 15640d49eaf4SJakub Kicinski { 15650d49eaf4SJakub Kicinski swreg tmp = imm_a(nfp_prog), tmp_len = imm_b(nfp_prog); 15660d49eaf4SJakub Kicinski struct nfp_bpf_cap_adjust_head *adjust_head; 15670d49eaf4SJakub Kicinski u32 ret_einval, end; 15680d49eaf4SJakub Kicinski 15690d49eaf4SJakub Kicinski adjust_head = &nfp_prog->bpf->adjust_head; 15700d49eaf4SJakub Kicinski 15718231f844SJakub Kicinski /* Optimized version - 5 vs 14 cycles */ 15728231f844SJakub Kicinski if (nfp_prog->adjust_head_location != UINT_MAX) { 15738231f844SJakub Kicinski if (WARN_ON_ONCE(nfp_prog->adjust_head_location != meta->n)) 15748231f844SJakub Kicinski return -EINVAL; 15758231f844SJakub Kicinski 15768231f844SJakub Kicinski emit_alu(nfp_prog, pptr_reg(nfp_prog), 15778231f844SJakub Kicinski reg_a(2 * 2), ALU_OP_ADD, pptr_reg(nfp_prog)); 15788231f844SJakub Kicinski emit_alu(nfp_prog, plen_reg(nfp_prog), 15798231f844SJakub Kicinski plen_reg(nfp_prog), ALU_OP_SUB, reg_a(2 * 2)); 15808231f844SJakub Kicinski emit_alu(nfp_prog, pv_len(nfp_prog), 15818231f844SJakub Kicinski pv_len(nfp_prog), ALU_OP_SUB, reg_a(2 * 2)); 15828231f844SJakub Kicinski 15838231f844SJakub Kicinski wrp_immed(nfp_prog, reg_both(0), 0); 15848231f844SJakub Kicinski wrp_immed(nfp_prog, reg_both(1), 0); 15858231f844SJakub Kicinski 15868231f844SJakub Kicinski /* TODO: when adjust head is guaranteed to succeed we can 15878231f844SJakub Kicinski * also eliminate the following if (r0 == 0) branch. 15888231f844SJakub Kicinski */ 15898231f844SJakub Kicinski 15908231f844SJakub Kicinski return 0; 15918231f844SJakub Kicinski } 15928231f844SJakub Kicinski 15930d49eaf4SJakub Kicinski ret_einval = nfp_prog_current_offset(nfp_prog) + 14; 15940d49eaf4SJakub Kicinski end = ret_einval + 2; 15950d49eaf4SJakub Kicinski 15960d49eaf4SJakub Kicinski /* We need to use a temp because offset is just a part of the pkt ptr */ 15970d49eaf4SJakub Kicinski emit_alu(nfp_prog, tmp, 15980d49eaf4SJakub Kicinski reg_a(2 * 2), ALU_OP_ADD_2B, pptr_reg(nfp_prog)); 15990d49eaf4SJakub Kicinski 16000d49eaf4SJakub Kicinski /* Validate result will fit within FW datapath constraints */ 16010d49eaf4SJakub Kicinski emit_alu(nfp_prog, reg_none(), 16020d49eaf4SJakub Kicinski tmp, ALU_OP_SUB, reg_imm(adjust_head->off_min)); 16030d49eaf4SJakub Kicinski emit_br(nfp_prog, BR_BLO, ret_einval, 0); 16040d49eaf4SJakub Kicinski emit_alu(nfp_prog, reg_none(), 16050d49eaf4SJakub Kicinski reg_imm(adjust_head->off_max), ALU_OP_SUB, tmp); 16060d49eaf4SJakub Kicinski emit_br(nfp_prog, BR_BLO, ret_einval, 0); 16070d49eaf4SJakub Kicinski 16080d49eaf4SJakub Kicinski /* Validate the length is at least ETH_HLEN */ 16090d49eaf4SJakub Kicinski emit_alu(nfp_prog, tmp_len, 16100d49eaf4SJakub Kicinski plen_reg(nfp_prog), ALU_OP_SUB, reg_a(2 * 2)); 16110d49eaf4SJakub Kicinski emit_alu(nfp_prog, reg_none(), 16120d49eaf4SJakub Kicinski tmp_len, ALU_OP_SUB, reg_imm(ETH_HLEN)); 16130d49eaf4SJakub Kicinski emit_br(nfp_prog, BR_BMI, ret_einval, 0); 16140d49eaf4SJakub Kicinski 16150d49eaf4SJakub Kicinski /* Load the ret code */ 16160d49eaf4SJakub Kicinski wrp_immed(nfp_prog, reg_both(0), 0); 16170d49eaf4SJakub Kicinski wrp_immed(nfp_prog, reg_both(1), 0); 16180d49eaf4SJakub Kicinski 16190d49eaf4SJakub Kicinski /* Modify the packet metadata */ 16200d49eaf4SJakub Kicinski emit_ld_field(nfp_prog, pptr_reg(nfp_prog), 0x3, tmp, SHF_SC_NONE, 0); 16210d49eaf4SJakub Kicinski 16220d49eaf4SJakub Kicinski /* Skip over the -EINVAL ret code (defer 2) */ 16232314fe9eSJakub Kicinski emit_br(nfp_prog, BR_UNC, end, 2); 16240d49eaf4SJakub Kicinski 16250d49eaf4SJakub Kicinski emit_alu(nfp_prog, plen_reg(nfp_prog), 16260d49eaf4SJakub Kicinski plen_reg(nfp_prog), ALU_OP_SUB, reg_a(2 * 2)); 16270d49eaf4SJakub Kicinski emit_alu(nfp_prog, pv_len(nfp_prog), 16280d49eaf4SJakub Kicinski pv_len(nfp_prog), ALU_OP_SUB, reg_a(2 * 2)); 16290d49eaf4SJakub Kicinski 16300d49eaf4SJakub Kicinski /* return -EINVAL target */ 16310d49eaf4SJakub Kicinski if (!nfp_prog_confirm_current_offset(nfp_prog, ret_einval)) 16320d49eaf4SJakub Kicinski return -EINVAL; 16330d49eaf4SJakub Kicinski 16340d49eaf4SJakub Kicinski wrp_immed(nfp_prog, reg_both(0), -22); 16350d49eaf4SJakub Kicinski wrp_immed(nfp_prog, reg_both(1), ~0); 16360d49eaf4SJakub Kicinski 16370d49eaf4SJakub Kicinski if (!nfp_prog_confirm_current_offset(nfp_prog, end)) 16380d49eaf4SJakub Kicinski return -EINVAL; 16390d49eaf4SJakub Kicinski 16400d49eaf4SJakub Kicinski return 0; 16410d49eaf4SJakub Kicinski } 16420d49eaf4SJakub Kicinski 16430c261593SJakub Kicinski static int adjust_tail(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 16440c261593SJakub Kicinski { 16450c261593SJakub Kicinski u32 ret_einval, end; 16460c261593SJakub Kicinski swreg plen, delta; 16470c261593SJakub Kicinski 16480c261593SJakub Kicinski BUILD_BUG_ON(plen_reg(nfp_prog) != reg_b(STATIC_REG_PKT_LEN)); 16490c261593SJakub Kicinski 16500c261593SJakub Kicinski plen = imm_a(nfp_prog); 16510c261593SJakub Kicinski delta = reg_a(2 * 2); 16520c261593SJakub Kicinski 16530c261593SJakub Kicinski ret_einval = nfp_prog_current_offset(nfp_prog) + 9; 16540c261593SJakub Kicinski end = nfp_prog_current_offset(nfp_prog) + 11; 16550c261593SJakub Kicinski 16560c261593SJakub Kicinski /* Calculate resulting length */ 16570c261593SJakub Kicinski emit_alu(nfp_prog, plen, plen_reg(nfp_prog), ALU_OP_ADD, delta); 16580c261593SJakub Kicinski /* delta == 0 is not allowed by the kernel, add must overflow to make 16590c261593SJakub Kicinski * length smaller. 16600c261593SJakub Kicinski */ 16610c261593SJakub Kicinski emit_br(nfp_prog, BR_BCC, ret_einval, 0); 16620c261593SJakub Kicinski 16630c261593SJakub Kicinski /* if (new_len < 14) then -EINVAL */ 16640c261593SJakub Kicinski emit_alu(nfp_prog, reg_none(), plen, ALU_OP_SUB, reg_imm(ETH_HLEN)); 16650c261593SJakub Kicinski emit_br(nfp_prog, BR_BMI, ret_einval, 0); 16660c261593SJakub Kicinski 16670c261593SJakub Kicinski emit_alu(nfp_prog, plen_reg(nfp_prog), 16680c261593SJakub Kicinski plen_reg(nfp_prog), ALU_OP_ADD, delta); 16690c261593SJakub Kicinski emit_alu(nfp_prog, pv_len(nfp_prog), 16700c261593SJakub Kicinski pv_len(nfp_prog), ALU_OP_ADD, delta); 16710c261593SJakub Kicinski 16720c261593SJakub Kicinski emit_br(nfp_prog, BR_UNC, end, 2); 16730c261593SJakub Kicinski wrp_immed(nfp_prog, reg_both(0), 0); 16740c261593SJakub Kicinski wrp_immed(nfp_prog, reg_both(1), 0); 16750c261593SJakub Kicinski 16760c261593SJakub Kicinski if (!nfp_prog_confirm_current_offset(nfp_prog, ret_einval)) 16770c261593SJakub Kicinski return -EINVAL; 16780c261593SJakub Kicinski 16790c261593SJakub Kicinski wrp_immed(nfp_prog, reg_both(0), -22); 16800c261593SJakub Kicinski wrp_immed(nfp_prog, reg_both(1), ~0); 16810c261593SJakub Kicinski 16820c261593SJakub Kicinski if (!nfp_prog_confirm_current_offset(nfp_prog, end)) 16830c261593SJakub Kicinski return -EINVAL; 16840c261593SJakub Kicinski 16850c261593SJakub Kicinski return 0; 16860c261593SJakub Kicinski } 16870c261593SJakub Kicinski 168877a3d311SJakub Kicinski static int 1689fc448497SJakub Kicinski map_call_stack_common(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 169077a3d311SJakub Kicinski { 169177a3d311SJakub Kicinski bool load_lm_ptr; 169277a3d311SJakub Kicinski u32 ret_tgt; 169377a3d311SJakub Kicinski s64 lm_off; 169477a3d311SJakub Kicinski 169577a3d311SJakub Kicinski /* We only have to reload LM0 if the key is not at start of stack */ 16961a7e62e6SQuentin Monnet lm_off = nfp_prog->stack_frame_depth; 16972f46e0c1SJakub Kicinski lm_off += meta->arg2.reg.var_off.value + meta->arg2.reg.off; 16982f46e0c1SJakub Kicinski load_lm_ptr = meta->arg2.var_off || lm_off; 169977a3d311SJakub Kicinski 170077a3d311SJakub Kicinski /* Set LM0 to start of key */ 170177a3d311SJakub Kicinski if (load_lm_ptr) 170277a3d311SJakub Kicinski emit_csr_wr(nfp_prog, reg_b(2 * 2), NFP_CSR_ACT_LM_ADDR0); 170344d65a47SJakub Kicinski if (meta->func_id == BPF_FUNC_map_update_elem) 170444d65a47SJakub Kicinski emit_csr_wr(nfp_prog, reg_b(3 * 2), NFP_CSR_ACT_LM_ADDR2); 170577a3d311SJakub Kicinski 1706fc448497SJakub Kicinski emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO + meta->func_id, 170777a3d311SJakub Kicinski 2, RELO_BR_HELPER); 170877a3d311SJakub Kicinski ret_tgt = nfp_prog_current_offset(nfp_prog) + 2; 170977a3d311SJakub Kicinski 171077a3d311SJakub Kicinski /* Load map ID into A0 */ 1711b4264c96SJakub Kicinski wrp_mov(nfp_prog, reg_a(0), reg_a(2)); 171277a3d311SJakub Kicinski 171377a3d311SJakub Kicinski /* Load the return address into B0 */ 171477a3d311SJakub Kicinski wrp_immed_relo(nfp_prog, reg_b(0), ret_tgt, RELO_IMMED_REL); 171577a3d311SJakub Kicinski 171677a3d311SJakub Kicinski if (!nfp_prog_confirm_current_offset(nfp_prog, ret_tgt)) 171777a3d311SJakub Kicinski return -EINVAL; 171877a3d311SJakub Kicinski 171977a3d311SJakub Kicinski /* Reset the LM0 pointer */ 172077a3d311SJakub Kicinski if (!load_lm_ptr) 172177a3d311SJakub Kicinski return 0; 172277a3d311SJakub Kicinski 172377a3d311SJakub Kicinski emit_csr_wr(nfp_prog, stack_reg(nfp_prog), NFP_CSR_ACT_LM_ADDR0); 172477a3d311SJakub Kicinski wrp_nops(nfp_prog, 3); 172577a3d311SJakub Kicinski 172677a3d311SJakub Kicinski return 0; 172777a3d311SJakub Kicinski } 172877a3d311SJakub Kicinski 1729df4a37d8SJakub Kicinski static int 1730df4a37d8SJakub Kicinski nfp_get_prandom_u32(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1731df4a37d8SJakub Kicinski { 1732df4a37d8SJakub Kicinski __emit_csr_rd(nfp_prog, NFP_CSR_PSEUDO_RND_NUM); 1733df4a37d8SJakub Kicinski /* CSR value is read in following immed[gpr, 0] */ 1734df4a37d8SJakub Kicinski emit_immed(nfp_prog, reg_both(0), 0, 1735df4a37d8SJakub Kicinski IMMED_WIDTH_ALL, false, IMMED_SHIFT_0B); 1736df4a37d8SJakub Kicinski emit_immed(nfp_prog, reg_both(1), 0, 1737df4a37d8SJakub Kicinski IMMED_WIDTH_ALL, false, IMMED_SHIFT_0B); 1738df4a37d8SJakub Kicinski return 0; 1739df4a37d8SJakub Kicinski } 1740df4a37d8SJakub Kicinski 17419816dd35SJakub Kicinski static int 17429816dd35SJakub Kicinski nfp_perf_event_output(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 17439816dd35SJakub Kicinski { 17449816dd35SJakub Kicinski swreg ptr_type; 17459816dd35SJakub Kicinski u32 ret_tgt; 17469816dd35SJakub Kicinski 17479816dd35SJakub Kicinski ptr_type = ur_load_imm_any(nfp_prog, meta->arg1.type, imm_a(nfp_prog)); 17489816dd35SJakub Kicinski 17499816dd35SJakub Kicinski ret_tgt = nfp_prog_current_offset(nfp_prog) + 3; 17509816dd35SJakub Kicinski 17519816dd35SJakub Kicinski emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO + meta->func_id, 17529816dd35SJakub Kicinski 2, RELO_BR_HELPER); 17539816dd35SJakub Kicinski 17549816dd35SJakub Kicinski /* Load ptr type into A1 */ 17559816dd35SJakub Kicinski wrp_mov(nfp_prog, reg_a(1), ptr_type); 17569816dd35SJakub Kicinski 17579816dd35SJakub Kicinski /* Load the return address into B0 */ 17589816dd35SJakub Kicinski wrp_immed_relo(nfp_prog, reg_b(0), ret_tgt, RELO_IMMED_REL); 17599816dd35SJakub Kicinski 17609816dd35SJakub Kicinski if (!nfp_prog_confirm_current_offset(nfp_prog, ret_tgt)) 17619816dd35SJakub Kicinski return -EINVAL; 17629816dd35SJakub Kicinski 17639816dd35SJakub Kicinski return 0; 17649816dd35SJakub Kicinski } 17659816dd35SJakub Kicinski 1766d985888fSJakub Kicinski static int 1767d985888fSJakub Kicinski nfp_queue_select(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1768d985888fSJakub Kicinski { 1769d985888fSJakub Kicinski u32 jmp_tgt; 1770d985888fSJakub Kicinski 1771d985888fSJakub Kicinski jmp_tgt = nfp_prog_current_offset(nfp_prog) + 5; 1772d985888fSJakub Kicinski 1773d985888fSJakub Kicinski /* Make sure the queue id fits into FW field */ 1774d985888fSJakub Kicinski emit_alu(nfp_prog, reg_none(), reg_a(meta->insn.src_reg * 2), 1775d985888fSJakub Kicinski ALU_OP_AND_NOT_B, reg_imm(0xff)); 1776d985888fSJakub Kicinski emit_br(nfp_prog, BR_BEQ, jmp_tgt, 2); 1777d985888fSJakub Kicinski 1778d985888fSJakub Kicinski /* Set the 'queue selected' bit and the queue value */ 1779d985888fSJakub Kicinski emit_shf(nfp_prog, pv_qsel_set(nfp_prog), 1780d985888fSJakub Kicinski pv_qsel_set(nfp_prog), SHF_OP_OR, reg_imm(1), 1781d985888fSJakub Kicinski SHF_SC_L_SHF, PKT_VEL_QSEL_SET_BIT); 1782d985888fSJakub Kicinski emit_ld_field(nfp_prog, 1783d985888fSJakub Kicinski pv_qsel_val(nfp_prog), 0x1, reg_b(meta->insn.src_reg * 2), 1784d985888fSJakub Kicinski SHF_SC_NONE, 0); 1785d985888fSJakub Kicinski /* Delay slots end here, we will jump over next instruction if queue 1786d985888fSJakub Kicinski * value fits into the field. 1787d985888fSJakub Kicinski */ 1788d985888fSJakub Kicinski emit_ld_field(nfp_prog, 1789d985888fSJakub Kicinski pv_qsel_val(nfp_prog), 0x1, reg_imm(NFP_NET_RXR_MAX), 1790d985888fSJakub Kicinski SHF_SC_NONE, 0); 1791d985888fSJakub Kicinski 1792d985888fSJakub Kicinski if (!nfp_prog_confirm_current_offset(nfp_prog, jmp_tgt)) 1793d985888fSJakub Kicinski return -EINVAL; 1794d985888fSJakub Kicinski 1795d985888fSJakub Kicinski return 0; 1796d985888fSJakub Kicinski } 1797d985888fSJakub Kicinski 1798d9ae7f2bSJakub Kicinski /* --- Callbacks --- */ 1799d9ae7f2bSJakub Kicinski static int mov_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1800d9ae7f2bSJakub Kicinski { 1801d9ae7f2bSJakub Kicinski const struct bpf_insn *insn = &meta->insn; 1802b14157eeSJakub Kicinski u8 dst = insn->dst_reg * 2; 1803b14157eeSJakub Kicinski u8 src = insn->src_reg * 2; 1804d9ae7f2bSJakub Kicinski 1805b14157eeSJakub Kicinski if (insn->src_reg == BPF_REG_10) { 1806b14157eeSJakub Kicinski swreg stack_depth_reg; 1807b14157eeSJakub Kicinski 1808b14157eeSJakub Kicinski stack_depth_reg = ur_load_imm_any(nfp_prog, 18091a7e62e6SQuentin Monnet nfp_prog->stack_frame_depth, 1810b14157eeSJakub Kicinski stack_imm(nfp_prog)); 18111a7e62e6SQuentin Monnet emit_alu(nfp_prog, reg_both(dst), stack_reg(nfp_prog), 18121a7e62e6SQuentin Monnet ALU_OP_ADD, stack_depth_reg); 1813b14157eeSJakub Kicinski wrp_immed(nfp_prog, reg_both(dst + 1), 0); 1814b14157eeSJakub Kicinski } else { 1815b14157eeSJakub Kicinski wrp_reg_mov(nfp_prog, dst, src); 1816b14157eeSJakub Kicinski wrp_reg_mov(nfp_prog, dst + 1, src + 1); 1817b14157eeSJakub Kicinski } 1818d9ae7f2bSJakub Kicinski 1819d9ae7f2bSJakub Kicinski return 0; 1820d9ae7f2bSJakub Kicinski } 1821d9ae7f2bSJakub Kicinski 1822d9ae7f2bSJakub Kicinski static int mov_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1823d9ae7f2bSJakub Kicinski { 1824d9ae7f2bSJakub Kicinski u64 imm = meta->insn.imm; /* sign extend */ 1825d9ae7f2bSJakub Kicinski 1826d9ae7f2bSJakub Kicinski wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2), imm & ~0U); 1827d9ae7f2bSJakub Kicinski wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), imm >> 32); 1828d9ae7f2bSJakub Kicinski 1829d9ae7f2bSJakub Kicinski return 0; 1830d9ae7f2bSJakub Kicinski } 1831d9ae7f2bSJakub Kicinski 1832d9ae7f2bSJakub Kicinski static int xor_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1833d9ae7f2bSJakub Kicinski { 1834d9ae7f2bSJakub Kicinski return wrp_alu64_reg(nfp_prog, meta, ALU_OP_XOR); 1835d9ae7f2bSJakub Kicinski } 1836d9ae7f2bSJakub Kicinski 1837d9ae7f2bSJakub Kicinski static int xor_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1838d9ae7f2bSJakub Kicinski { 1839d9ae7f2bSJakub Kicinski return wrp_alu64_imm(nfp_prog, meta, ALU_OP_XOR, !meta->insn.imm); 1840d9ae7f2bSJakub Kicinski } 1841d9ae7f2bSJakub Kicinski 1842d9ae7f2bSJakub Kicinski static int and_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1843d9ae7f2bSJakub Kicinski { 1844d9ae7f2bSJakub Kicinski return wrp_alu64_reg(nfp_prog, meta, ALU_OP_AND); 1845d9ae7f2bSJakub Kicinski } 1846d9ae7f2bSJakub Kicinski 1847d9ae7f2bSJakub Kicinski static int and_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1848d9ae7f2bSJakub Kicinski { 1849d9ae7f2bSJakub Kicinski return wrp_alu64_imm(nfp_prog, meta, ALU_OP_AND, !~meta->insn.imm); 1850d9ae7f2bSJakub Kicinski } 1851d9ae7f2bSJakub Kicinski 1852d9ae7f2bSJakub Kicinski static int or_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1853d9ae7f2bSJakub Kicinski { 1854d9ae7f2bSJakub Kicinski return wrp_alu64_reg(nfp_prog, meta, ALU_OP_OR); 1855d9ae7f2bSJakub Kicinski } 1856d9ae7f2bSJakub Kicinski 1857d9ae7f2bSJakub Kicinski static int or_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1858d9ae7f2bSJakub Kicinski { 1859d9ae7f2bSJakub Kicinski return wrp_alu64_imm(nfp_prog, meta, ALU_OP_OR, !meta->insn.imm); 1860d9ae7f2bSJakub Kicinski } 1861d9ae7f2bSJakub Kicinski 1862d9ae7f2bSJakub Kicinski static int add_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1863d9ae7f2bSJakub Kicinski { 1864d9ae7f2bSJakub Kicinski const struct bpf_insn *insn = &meta->insn; 1865d9ae7f2bSJakub Kicinski 1866d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_both(insn->dst_reg * 2), 1867d9ae7f2bSJakub Kicinski reg_a(insn->dst_reg * 2), ALU_OP_ADD, 1868d9ae7f2bSJakub Kicinski reg_b(insn->src_reg * 2)); 1869d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 1870d9ae7f2bSJakub Kicinski reg_a(insn->dst_reg * 2 + 1), ALU_OP_ADD_C, 1871d9ae7f2bSJakub Kicinski reg_b(insn->src_reg * 2 + 1)); 1872d9ae7f2bSJakub Kicinski 1873d9ae7f2bSJakub Kicinski return 0; 1874d9ae7f2bSJakub Kicinski } 1875d9ae7f2bSJakub Kicinski 1876d9ae7f2bSJakub Kicinski static int add_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1877d9ae7f2bSJakub Kicinski { 1878d9ae7f2bSJakub Kicinski const struct bpf_insn *insn = &meta->insn; 1879d9ae7f2bSJakub Kicinski u64 imm = insn->imm; /* sign extend */ 1880d9ae7f2bSJakub Kicinski 1881d9ae7f2bSJakub Kicinski wrp_alu_imm(nfp_prog, insn->dst_reg * 2, ALU_OP_ADD, imm & ~0U); 1882d9ae7f2bSJakub Kicinski wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, ALU_OP_ADD_C, imm >> 32); 1883d9ae7f2bSJakub Kicinski 1884d9ae7f2bSJakub Kicinski return 0; 1885d9ae7f2bSJakub Kicinski } 1886d9ae7f2bSJakub Kicinski 1887d9ae7f2bSJakub Kicinski static int sub_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1888d9ae7f2bSJakub Kicinski { 1889d9ae7f2bSJakub Kicinski const struct bpf_insn *insn = &meta->insn; 1890d9ae7f2bSJakub Kicinski 1891d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_both(insn->dst_reg * 2), 1892d9ae7f2bSJakub Kicinski reg_a(insn->dst_reg * 2), ALU_OP_SUB, 1893d9ae7f2bSJakub Kicinski reg_b(insn->src_reg * 2)); 1894d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 1895d9ae7f2bSJakub Kicinski reg_a(insn->dst_reg * 2 + 1), ALU_OP_SUB_C, 1896d9ae7f2bSJakub Kicinski reg_b(insn->src_reg * 2 + 1)); 1897d9ae7f2bSJakub Kicinski 1898d9ae7f2bSJakub Kicinski return 0; 1899d9ae7f2bSJakub Kicinski } 1900d9ae7f2bSJakub Kicinski 1901d9ae7f2bSJakub Kicinski static int sub_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1902d9ae7f2bSJakub Kicinski { 1903d9ae7f2bSJakub Kicinski const struct bpf_insn *insn = &meta->insn; 1904d9ae7f2bSJakub Kicinski u64 imm = insn->imm; /* sign extend */ 1905d9ae7f2bSJakub Kicinski 1906d9ae7f2bSJakub Kicinski wrp_alu_imm(nfp_prog, insn->dst_reg * 2, ALU_OP_SUB, imm & ~0U); 1907d9ae7f2bSJakub Kicinski wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, ALU_OP_SUB_C, imm >> 32); 1908d9ae7f2bSJakub Kicinski 1909d9ae7f2bSJakub Kicinski return 0; 1910d9ae7f2bSJakub Kicinski } 1911d9ae7f2bSJakub Kicinski 1912d3d23fdbSJiong Wang static int mul_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1913d3d23fdbSJiong Wang { 1914d3d23fdbSJiong Wang return wrp_mul(nfp_prog, meta, true, true); 1915d3d23fdbSJiong Wang } 1916d3d23fdbSJiong Wang 1917d3d23fdbSJiong Wang static int mul_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1918d3d23fdbSJiong Wang { 1919d3d23fdbSJiong Wang return wrp_mul(nfp_prog, meta, true, false); 1920d3d23fdbSJiong Wang } 1921d3d23fdbSJiong Wang 19222a952b03SJiong Wang static int div_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 19232a952b03SJiong Wang { 19242a952b03SJiong Wang const struct bpf_insn *insn = &meta->insn; 19252a952b03SJiong Wang 19262a952b03SJiong Wang return wrp_div_imm(nfp_prog, insn->dst_reg * 2, insn->imm); 19272a952b03SJiong Wang } 19282a952b03SJiong Wang 19292a952b03SJiong Wang static int div_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 19302a952b03SJiong Wang { 19312a952b03SJiong Wang /* NOTE: verifier hook has rejected cases for which verifier doesn't 19322a952b03SJiong Wang * know whether the source operand is constant or not. 19332a952b03SJiong Wang */ 19342a952b03SJiong Wang return wrp_div_imm(nfp_prog, meta->insn.dst_reg * 2, meta->umin_src); 19352a952b03SJiong Wang } 19362a952b03SJiong Wang 1937254ef4d7SJiong Wang static int neg_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1938254ef4d7SJiong Wang { 1939254ef4d7SJiong Wang const struct bpf_insn *insn = &meta->insn; 1940254ef4d7SJiong Wang 1941254ef4d7SJiong Wang emit_alu(nfp_prog, reg_both(insn->dst_reg * 2), reg_imm(0), 1942254ef4d7SJiong Wang ALU_OP_SUB, reg_b(insn->dst_reg * 2)); 1943254ef4d7SJiong Wang emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1), reg_imm(0), 1944254ef4d7SJiong Wang ALU_OP_SUB_C, reg_b(insn->dst_reg * 2 + 1)); 1945254ef4d7SJiong Wang 1946254ef4d7SJiong Wang return 0; 1947254ef4d7SJiong Wang } 1948254ef4d7SJiong Wang 1949991f5b36SJiong Wang /* Pseudo code: 1950991f5b36SJiong Wang * if shift_amt >= 32 1951991f5b36SJiong Wang * dst_high = dst_low << shift_amt[4:0] 1952991f5b36SJiong Wang * dst_low = 0; 1953991f5b36SJiong Wang * else 1954991f5b36SJiong Wang * dst_high = (dst_high, dst_low) >> (32 - shift_amt) 1955991f5b36SJiong Wang * dst_low = dst_low << shift_amt 1956991f5b36SJiong Wang * 1957991f5b36SJiong Wang * The indirect shift will use the same logic at runtime. 1958991f5b36SJiong Wang */ 1959991f5b36SJiong Wang static int __shl_imm64(struct nfp_prog *nfp_prog, u8 dst, u8 shift_amt) 1960991f5b36SJiong Wang { 1961991f5b36SJiong Wang if (shift_amt < 32) { 1962991f5b36SJiong Wang emit_shf(nfp_prog, reg_both(dst + 1), reg_a(dst + 1), 1963991f5b36SJiong Wang SHF_OP_NONE, reg_b(dst), SHF_SC_R_DSHF, 1964991f5b36SJiong Wang 32 - shift_amt); 1965991f5b36SJiong Wang emit_shf(nfp_prog, reg_both(dst), reg_none(), SHF_OP_NONE, 1966991f5b36SJiong Wang reg_b(dst), SHF_SC_L_SHF, shift_amt); 1967991f5b36SJiong Wang } else if (shift_amt == 32) { 1968991f5b36SJiong Wang wrp_reg_mov(nfp_prog, dst + 1, dst); 1969991f5b36SJiong Wang wrp_immed(nfp_prog, reg_both(dst), 0); 1970991f5b36SJiong Wang } else if (shift_amt > 32) { 1971991f5b36SJiong Wang emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_NONE, 1972991f5b36SJiong Wang reg_b(dst), SHF_SC_L_SHF, shift_amt - 32); 1973991f5b36SJiong Wang wrp_immed(nfp_prog, reg_both(dst), 0); 1974991f5b36SJiong Wang } 1975991f5b36SJiong Wang 1976991f5b36SJiong Wang return 0; 1977991f5b36SJiong Wang } 1978991f5b36SJiong Wang 1979d9ae7f2bSJakub Kicinski static int shl_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1980d9ae7f2bSJakub Kicinski { 1981d9ae7f2bSJakub Kicinski const struct bpf_insn *insn = &meta->insn; 19823cae1319SJakub Kicinski u8 dst = insn->dst_reg * 2; 1983d9ae7f2bSJakub Kicinski 1984991f5b36SJiong Wang return __shl_imm64(nfp_prog, dst, insn->imm); 1985991f5b36SJiong Wang } 1986991f5b36SJiong Wang 1987991f5b36SJiong Wang static void shl_reg64_lt32_high(struct nfp_prog *nfp_prog, u8 dst, u8 src) 1988991f5b36SJiong Wang { 1989991f5b36SJiong Wang emit_alu(nfp_prog, imm_both(nfp_prog), reg_imm(32), ALU_OP_SUB, 1990991f5b36SJiong Wang reg_b(src)); 1991991f5b36SJiong Wang emit_alu(nfp_prog, reg_none(), imm_a(nfp_prog), ALU_OP_OR, reg_imm(0)); 1992991f5b36SJiong Wang emit_shf_indir(nfp_prog, reg_both(dst + 1), reg_a(dst + 1), SHF_OP_NONE, 1993991f5b36SJiong Wang reg_b(dst), SHF_SC_R_DSHF); 1994991f5b36SJiong Wang } 1995991f5b36SJiong Wang 1996991f5b36SJiong Wang /* NOTE: for indirect left shift, HIGH part should be calculated first. */ 1997991f5b36SJiong Wang static void shl_reg64_lt32_low(struct nfp_prog *nfp_prog, u8 dst, u8 src) 1998991f5b36SJiong Wang { 1999991f5b36SJiong Wang emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0)); 2000991f5b36SJiong Wang emit_shf_indir(nfp_prog, reg_both(dst), reg_none(), SHF_OP_NONE, 2001991f5b36SJiong Wang reg_b(dst), SHF_SC_L_SHF); 2002991f5b36SJiong Wang } 2003991f5b36SJiong Wang 2004991f5b36SJiong Wang static void shl_reg64_lt32(struct nfp_prog *nfp_prog, u8 dst, u8 src) 2005991f5b36SJiong Wang { 2006991f5b36SJiong Wang shl_reg64_lt32_high(nfp_prog, dst, src); 2007991f5b36SJiong Wang shl_reg64_lt32_low(nfp_prog, dst, src); 2008991f5b36SJiong Wang } 2009991f5b36SJiong Wang 2010991f5b36SJiong Wang static void shl_reg64_ge32(struct nfp_prog *nfp_prog, u8 dst, u8 src) 2011991f5b36SJiong Wang { 2012991f5b36SJiong Wang emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0)); 2013991f5b36SJiong Wang emit_shf_indir(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_NONE, 2014991f5b36SJiong Wang reg_b(dst), SHF_SC_L_SHF); 20153cae1319SJakub Kicinski wrp_immed(nfp_prog, reg_both(dst), 0); 2016991f5b36SJiong Wang } 2017991f5b36SJiong Wang 2018991f5b36SJiong Wang static int shl_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2019991f5b36SJiong Wang { 2020991f5b36SJiong Wang const struct bpf_insn *insn = &meta->insn; 2021991f5b36SJiong Wang u64 umin, umax; 2022991f5b36SJiong Wang u8 dst, src; 2023991f5b36SJiong Wang 2024991f5b36SJiong Wang dst = insn->dst_reg * 2; 2025662c5472SJiong Wang umin = meta->umin_src; 2026662c5472SJiong Wang umax = meta->umax_src; 2027991f5b36SJiong Wang if (umin == umax) 2028991f5b36SJiong Wang return __shl_imm64(nfp_prog, dst, umin); 2029991f5b36SJiong Wang 2030991f5b36SJiong Wang src = insn->src_reg * 2; 2031991f5b36SJiong Wang if (umax < 32) { 2032991f5b36SJiong Wang shl_reg64_lt32(nfp_prog, dst, src); 2033991f5b36SJiong Wang } else if (umin >= 32) { 2034991f5b36SJiong Wang shl_reg64_ge32(nfp_prog, dst, src); 2035991f5b36SJiong Wang } else { 2036991f5b36SJiong Wang /* Generate different instruction sequences depending on runtime 2037991f5b36SJiong Wang * value of shift amount. 2038991f5b36SJiong Wang */ 2039991f5b36SJiong Wang u16 label_ge32, label_end; 2040991f5b36SJiong Wang 2041991f5b36SJiong Wang label_ge32 = nfp_prog_current_offset(nfp_prog) + 7; 2042991f5b36SJiong Wang emit_br_bset(nfp_prog, reg_a(src), 5, label_ge32, 0); 2043991f5b36SJiong Wang 2044991f5b36SJiong Wang shl_reg64_lt32_high(nfp_prog, dst, src); 2045991f5b36SJiong Wang label_end = nfp_prog_current_offset(nfp_prog) + 6; 2046991f5b36SJiong Wang emit_br(nfp_prog, BR_UNC, label_end, 2); 2047991f5b36SJiong Wang /* shl_reg64_lt32_low packed in delay slot. */ 2048991f5b36SJiong Wang shl_reg64_lt32_low(nfp_prog, dst, src); 2049991f5b36SJiong Wang 2050991f5b36SJiong Wang if (!nfp_prog_confirm_current_offset(nfp_prog, label_ge32)) 2051991f5b36SJiong Wang return -EINVAL; 2052991f5b36SJiong Wang shl_reg64_ge32(nfp_prog, dst, src); 2053991f5b36SJiong Wang 2054991f5b36SJiong Wang if (!nfp_prog_confirm_current_offset(nfp_prog, label_end)) 2055991f5b36SJiong Wang return -EINVAL; 2056991f5b36SJiong Wang } 2057991f5b36SJiong Wang 2058991f5b36SJiong Wang return 0; 2059991f5b36SJiong Wang } 2060991f5b36SJiong Wang 2061991f5b36SJiong Wang /* Pseudo code: 2062991f5b36SJiong Wang * if shift_amt >= 32 2063991f5b36SJiong Wang * dst_high = 0; 2064991f5b36SJiong Wang * dst_low = dst_high >> shift_amt[4:0] 2065991f5b36SJiong Wang * else 2066991f5b36SJiong Wang * dst_high = dst_high >> shift_amt 2067991f5b36SJiong Wang * dst_low = (dst_high, dst_low) >> shift_amt 2068991f5b36SJiong Wang * 2069991f5b36SJiong Wang * The indirect shift will use the same logic at runtime. 2070991f5b36SJiong Wang */ 2071991f5b36SJiong Wang static int __shr_imm64(struct nfp_prog *nfp_prog, u8 dst, u8 shift_amt) 2072991f5b36SJiong Wang { 2073991f5b36SJiong Wang if (shift_amt < 32) { 2074991f5b36SJiong Wang emit_shf(nfp_prog, reg_both(dst), reg_a(dst + 1), SHF_OP_NONE, 2075991f5b36SJiong Wang reg_b(dst), SHF_SC_R_DSHF, shift_amt); 2076991f5b36SJiong Wang emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_NONE, 2077991f5b36SJiong Wang reg_b(dst + 1), SHF_SC_R_SHF, shift_amt); 2078991f5b36SJiong Wang } else if (shift_amt == 32) { 2079991f5b36SJiong Wang wrp_reg_mov(nfp_prog, dst, dst + 1); 2080991f5b36SJiong Wang wrp_immed(nfp_prog, reg_both(dst + 1), 0); 2081991f5b36SJiong Wang } else if (shift_amt > 32) { 2082991f5b36SJiong Wang emit_shf(nfp_prog, reg_both(dst), reg_none(), SHF_OP_NONE, 2083991f5b36SJiong Wang reg_b(dst + 1), SHF_SC_R_SHF, shift_amt - 32); 2084991f5b36SJiong Wang wrp_immed(nfp_prog, reg_both(dst + 1), 0); 20853cae1319SJakub Kicinski } 2086d9ae7f2bSJakub Kicinski 2087d9ae7f2bSJakub Kicinski return 0; 2088d9ae7f2bSJakub Kicinski } 2089d9ae7f2bSJakub Kicinski 2090d9ae7f2bSJakub Kicinski static int shr_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2091d9ae7f2bSJakub Kicinski { 2092d9ae7f2bSJakub Kicinski const struct bpf_insn *insn = &meta->insn; 20933cae1319SJakub Kicinski u8 dst = insn->dst_reg * 2; 2094d9ae7f2bSJakub Kicinski 2095991f5b36SJiong Wang return __shr_imm64(nfp_prog, dst, insn->imm); 2096991f5b36SJiong Wang } 2097991f5b36SJiong Wang 2098991f5b36SJiong Wang /* NOTE: for indirect right shift, LOW part should be calculated first. */ 2099991f5b36SJiong Wang static void shr_reg64_lt32_high(struct nfp_prog *nfp_prog, u8 dst, u8 src) 2100991f5b36SJiong Wang { 2101991f5b36SJiong Wang emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0)); 2102991f5b36SJiong Wang emit_shf_indir(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_NONE, 2103991f5b36SJiong Wang reg_b(dst + 1), SHF_SC_R_SHF); 2104991f5b36SJiong Wang } 2105991f5b36SJiong Wang 2106991f5b36SJiong Wang static void shr_reg64_lt32_low(struct nfp_prog *nfp_prog, u8 dst, u8 src) 2107991f5b36SJiong Wang { 2108991f5b36SJiong Wang emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0)); 2109991f5b36SJiong Wang emit_shf_indir(nfp_prog, reg_both(dst), reg_a(dst + 1), SHF_OP_NONE, 2110991f5b36SJiong Wang reg_b(dst), SHF_SC_R_DSHF); 2111991f5b36SJiong Wang } 2112991f5b36SJiong Wang 2113991f5b36SJiong Wang static void shr_reg64_lt32(struct nfp_prog *nfp_prog, u8 dst, u8 src) 2114991f5b36SJiong Wang { 2115991f5b36SJiong Wang shr_reg64_lt32_low(nfp_prog, dst, src); 2116991f5b36SJiong Wang shr_reg64_lt32_high(nfp_prog, dst, src); 2117991f5b36SJiong Wang } 2118991f5b36SJiong Wang 2119991f5b36SJiong Wang static void shr_reg64_ge32(struct nfp_prog *nfp_prog, u8 dst, u8 src) 2120991f5b36SJiong Wang { 2121991f5b36SJiong Wang emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0)); 2122991f5b36SJiong Wang emit_shf_indir(nfp_prog, reg_both(dst), reg_none(), SHF_OP_NONE, 2123991f5b36SJiong Wang reg_b(dst + 1), SHF_SC_R_SHF); 21243cae1319SJakub Kicinski wrp_immed(nfp_prog, reg_both(dst + 1), 0); 2125991f5b36SJiong Wang } 2126991f5b36SJiong Wang 2127991f5b36SJiong Wang static int shr_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2128991f5b36SJiong Wang { 2129991f5b36SJiong Wang const struct bpf_insn *insn = &meta->insn; 2130991f5b36SJiong Wang u64 umin, umax; 2131991f5b36SJiong Wang u8 dst, src; 2132991f5b36SJiong Wang 2133991f5b36SJiong Wang dst = insn->dst_reg * 2; 2134662c5472SJiong Wang umin = meta->umin_src; 2135662c5472SJiong Wang umax = meta->umax_src; 2136991f5b36SJiong Wang if (umin == umax) 2137991f5b36SJiong Wang return __shr_imm64(nfp_prog, dst, umin); 2138991f5b36SJiong Wang 2139991f5b36SJiong Wang src = insn->src_reg * 2; 2140991f5b36SJiong Wang if (umax < 32) { 2141991f5b36SJiong Wang shr_reg64_lt32(nfp_prog, dst, src); 2142991f5b36SJiong Wang } else if (umin >= 32) { 2143991f5b36SJiong Wang shr_reg64_ge32(nfp_prog, dst, src); 2144991f5b36SJiong Wang } else { 2145991f5b36SJiong Wang /* Generate different instruction sequences depending on runtime 2146991f5b36SJiong Wang * value of shift amount. 2147991f5b36SJiong Wang */ 2148991f5b36SJiong Wang u16 label_ge32, label_end; 2149991f5b36SJiong Wang 2150991f5b36SJiong Wang label_ge32 = nfp_prog_current_offset(nfp_prog) + 6; 2151991f5b36SJiong Wang emit_br_bset(nfp_prog, reg_a(src), 5, label_ge32, 0); 2152991f5b36SJiong Wang shr_reg64_lt32_low(nfp_prog, dst, src); 2153991f5b36SJiong Wang label_end = nfp_prog_current_offset(nfp_prog) + 6; 2154991f5b36SJiong Wang emit_br(nfp_prog, BR_UNC, label_end, 2); 2155991f5b36SJiong Wang /* shr_reg64_lt32_high packed in delay slot. */ 2156991f5b36SJiong Wang shr_reg64_lt32_high(nfp_prog, dst, src); 2157991f5b36SJiong Wang 2158991f5b36SJiong Wang if (!nfp_prog_confirm_current_offset(nfp_prog, label_ge32)) 2159991f5b36SJiong Wang return -EINVAL; 2160991f5b36SJiong Wang shr_reg64_ge32(nfp_prog, dst, src); 2161991f5b36SJiong Wang 2162991f5b36SJiong Wang if (!nfp_prog_confirm_current_offset(nfp_prog, label_end)) 2163991f5b36SJiong Wang return -EINVAL; 21643cae1319SJakub Kicinski } 2165d9ae7f2bSJakub Kicinski 2166d9ae7f2bSJakub Kicinski return 0; 2167d9ae7f2bSJakub Kicinski } 2168d9ae7f2bSJakub Kicinski 2169f43d0f17SJiong Wang /* Code logic is the same as __shr_imm64 except ashr requires signedness bit 2170f43d0f17SJiong Wang * told through PREV_ALU result. 2171f43d0f17SJiong Wang */ 2172c217abccSJiong Wang static int __ashr_imm64(struct nfp_prog *nfp_prog, u8 dst, u8 shift_amt) 2173c217abccSJiong Wang { 2174c217abccSJiong Wang if (shift_amt < 32) { 2175c217abccSJiong Wang emit_shf(nfp_prog, reg_both(dst), reg_a(dst + 1), SHF_OP_NONE, 2176c217abccSJiong Wang reg_b(dst), SHF_SC_R_DSHF, shift_amt); 2177c217abccSJiong Wang /* Set signedness bit. */ 2178c217abccSJiong Wang emit_alu(nfp_prog, reg_none(), reg_a(dst + 1), ALU_OP_OR, 2179c217abccSJiong Wang reg_imm(0)); 2180c217abccSJiong Wang emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR, 2181c217abccSJiong Wang reg_b(dst + 1), SHF_SC_R_SHF, shift_amt); 2182c217abccSJiong Wang } else if (shift_amt == 32) { 2183c217abccSJiong Wang /* NOTE: this also helps setting signedness bit. */ 2184c217abccSJiong Wang wrp_reg_mov(nfp_prog, dst, dst + 1); 2185c217abccSJiong Wang emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR, 2186c217abccSJiong Wang reg_b(dst + 1), SHF_SC_R_SHF, 31); 2187c217abccSJiong Wang } else if (shift_amt > 32) { 2188c217abccSJiong Wang emit_alu(nfp_prog, reg_none(), reg_a(dst + 1), ALU_OP_OR, 2189c217abccSJiong Wang reg_imm(0)); 2190c217abccSJiong Wang emit_shf(nfp_prog, reg_both(dst), reg_none(), SHF_OP_ASHR, 2191c217abccSJiong Wang reg_b(dst + 1), SHF_SC_R_SHF, shift_amt - 32); 2192c217abccSJiong Wang emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR, 2193c217abccSJiong Wang reg_b(dst + 1), SHF_SC_R_SHF, 31); 2194c217abccSJiong Wang } 2195c217abccSJiong Wang 2196c217abccSJiong Wang return 0; 2197c217abccSJiong Wang } 2198c217abccSJiong Wang 2199f43d0f17SJiong Wang static int ashr_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2200f43d0f17SJiong Wang { 2201f43d0f17SJiong Wang const struct bpf_insn *insn = &meta->insn; 2202f43d0f17SJiong Wang u8 dst = insn->dst_reg * 2; 2203f43d0f17SJiong Wang 2204c217abccSJiong Wang return __ashr_imm64(nfp_prog, dst, insn->imm); 2205c217abccSJiong Wang } 2206c217abccSJiong Wang 2207c217abccSJiong Wang static void ashr_reg64_lt32_high(struct nfp_prog *nfp_prog, u8 dst, u8 src) 2208c217abccSJiong Wang { 2209c217abccSJiong Wang /* NOTE: the first insn will set both indirect shift amount (source A) 2210c217abccSJiong Wang * and signedness bit (MSB of result). 2211c217abccSJiong Wang */ 2212c217abccSJiong Wang emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_b(dst + 1)); 2213c217abccSJiong Wang emit_shf_indir(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR, 2214c217abccSJiong Wang reg_b(dst + 1), SHF_SC_R_SHF); 2215c217abccSJiong Wang } 2216c217abccSJiong Wang 2217c217abccSJiong Wang static void ashr_reg64_lt32_low(struct nfp_prog *nfp_prog, u8 dst, u8 src) 2218c217abccSJiong Wang { 2219c217abccSJiong Wang /* NOTE: it is the same as logic shift because we don't need to shift in 2220c217abccSJiong Wang * signedness bit when the shift amount is less than 32. 2221c217abccSJiong Wang */ 2222c217abccSJiong Wang return shr_reg64_lt32_low(nfp_prog, dst, src); 2223c217abccSJiong Wang } 2224c217abccSJiong Wang 2225c217abccSJiong Wang static void ashr_reg64_lt32(struct nfp_prog *nfp_prog, u8 dst, u8 src) 2226c217abccSJiong Wang { 2227c217abccSJiong Wang ashr_reg64_lt32_low(nfp_prog, dst, src); 2228c217abccSJiong Wang ashr_reg64_lt32_high(nfp_prog, dst, src); 2229c217abccSJiong Wang } 2230c217abccSJiong Wang 2231c217abccSJiong Wang static void ashr_reg64_ge32(struct nfp_prog *nfp_prog, u8 dst, u8 src) 2232c217abccSJiong Wang { 2233c217abccSJiong Wang emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_b(dst + 1)); 2234c217abccSJiong Wang emit_shf_indir(nfp_prog, reg_both(dst), reg_none(), SHF_OP_ASHR, 2235c217abccSJiong Wang reg_b(dst + 1), SHF_SC_R_SHF); 2236f43d0f17SJiong Wang emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR, 2237f43d0f17SJiong Wang reg_b(dst + 1), SHF_SC_R_SHF, 31); 2238c217abccSJiong Wang } 2239c217abccSJiong Wang 2240c217abccSJiong Wang /* Like ashr_imm64, but need to use indirect shift. */ 2241c217abccSJiong Wang static int ashr_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2242c217abccSJiong Wang { 2243c217abccSJiong Wang const struct bpf_insn *insn = &meta->insn; 2244c217abccSJiong Wang u64 umin, umax; 2245c217abccSJiong Wang u8 dst, src; 2246c217abccSJiong Wang 2247c217abccSJiong Wang dst = insn->dst_reg * 2; 2248662c5472SJiong Wang umin = meta->umin_src; 2249662c5472SJiong Wang umax = meta->umax_src; 2250c217abccSJiong Wang if (umin == umax) 2251c217abccSJiong Wang return __ashr_imm64(nfp_prog, dst, umin); 2252c217abccSJiong Wang 2253c217abccSJiong Wang src = insn->src_reg * 2; 2254c217abccSJiong Wang if (umax < 32) { 2255c217abccSJiong Wang ashr_reg64_lt32(nfp_prog, dst, src); 2256c217abccSJiong Wang } else if (umin >= 32) { 2257c217abccSJiong Wang ashr_reg64_ge32(nfp_prog, dst, src); 2258c217abccSJiong Wang } else { 2259c217abccSJiong Wang u16 label_ge32, label_end; 2260c217abccSJiong Wang 2261c217abccSJiong Wang label_ge32 = nfp_prog_current_offset(nfp_prog) + 6; 2262c217abccSJiong Wang emit_br_bset(nfp_prog, reg_a(src), 5, label_ge32, 0); 2263c217abccSJiong Wang ashr_reg64_lt32_low(nfp_prog, dst, src); 2264c217abccSJiong Wang label_end = nfp_prog_current_offset(nfp_prog) + 6; 2265c217abccSJiong Wang emit_br(nfp_prog, BR_UNC, label_end, 2); 2266c217abccSJiong Wang /* ashr_reg64_lt32_high packed in delay slot. */ 2267c217abccSJiong Wang ashr_reg64_lt32_high(nfp_prog, dst, src); 2268c217abccSJiong Wang 2269c217abccSJiong Wang if (!nfp_prog_confirm_current_offset(nfp_prog, label_ge32)) 2270c217abccSJiong Wang return -EINVAL; 2271c217abccSJiong Wang ashr_reg64_ge32(nfp_prog, dst, src); 2272c217abccSJiong Wang 2273c217abccSJiong Wang if (!nfp_prog_confirm_current_offset(nfp_prog, label_end)) 2274c217abccSJiong Wang return -EINVAL; 2275f43d0f17SJiong Wang } 2276f43d0f17SJiong Wang 2277f43d0f17SJiong Wang return 0; 2278f43d0f17SJiong Wang } 2279f43d0f17SJiong Wang 2280d9ae7f2bSJakub Kicinski static int mov_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2281d9ae7f2bSJakub Kicinski { 2282d9ae7f2bSJakub Kicinski const struct bpf_insn *insn = &meta->insn; 2283d9ae7f2bSJakub Kicinski 2284d9ae7f2bSJakub Kicinski wrp_reg_mov(nfp_prog, insn->dst_reg * 2, insn->src_reg * 2); 2285d9ae7f2bSJakub Kicinski wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0); 2286d9ae7f2bSJakub Kicinski 2287d9ae7f2bSJakub Kicinski return 0; 2288d9ae7f2bSJakub Kicinski } 2289d9ae7f2bSJakub Kicinski 2290d9ae7f2bSJakub Kicinski static int mov_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2291d9ae7f2bSJakub Kicinski { 2292d9ae7f2bSJakub Kicinski const struct bpf_insn *insn = &meta->insn; 2293d9ae7f2bSJakub Kicinski 2294d9ae7f2bSJakub Kicinski wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2), insn->imm); 2295d9ae7f2bSJakub Kicinski wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0); 2296d9ae7f2bSJakub Kicinski 2297d9ae7f2bSJakub Kicinski return 0; 2298d9ae7f2bSJakub Kicinski } 2299d9ae7f2bSJakub Kicinski 2300d9ae7f2bSJakub Kicinski static int xor_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2301d9ae7f2bSJakub Kicinski { 2302d9ae7f2bSJakub Kicinski return wrp_alu32_reg(nfp_prog, meta, ALU_OP_XOR); 2303d9ae7f2bSJakub Kicinski } 2304d9ae7f2bSJakub Kicinski 2305d9ae7f2bSJakub Kicinski static int xor_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2306d9ae7f2bSJakub Kicinski { 2307f036ebd9SJiong Wang return wrp_alu32_imm(nfp_prog, meta, ALU_OP_XOR); 2308d9ae7f2bSJakub Kicinski } 2309d9ae7f2bSJakub Kicinski 2310d9ae7f2bSJakub Kicinski static int and_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2311d9ae7f2bSJakub Kicinski { 2312d9ae7f2bSJakub Kicinski return wrp_alu32_reg(nfp_prog, meta, ALU_OP_AND); 2313d9ae7f2bSJakub Kicinski } 2314d9ae7f2bSJakub Kicinski 2315d9ae7f2bSJakub Kicinski static int and_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2316d9ae7f2bSJakub Kicinski { 2317f036ebd9SJiong Wang return wrp_alu32_imm(nfp_prog, meta, ALU_OP_AND); 2318d9ae7f2bSJakub Kicinski } 2319d9ae7f2bSJakub Kicinski 2320d9ae7f2bSJakub Kicinski static int or_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2321d9ae7f2bSJakub Kicinski { 2322d9ae7f2bSJakub Kicinski return wrp_alu32_reg(nfp_prog, meta, ALU_OP_OR); 2323d9ae7f2bSJakub Kicinski } 2324d9ae7f2bSJakub Kicinski 2325d9ae7f2bSJakub Kicinski static int or_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2326d9ae7f2bSJakub Kicinski { 2327f036ebd9SJiong Wang return wrp_alu32_imm(nfp_prog, meta, ALU_OP_OR); 2328d9ae7f2bSJakub Kicinski } 2329d9ae7f2bSJakub Kicinski 2330d9ae7f2bSJakub Kicinski static int add_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2331d9ae7f2bSJakub Kicinski { 2332d9ae7f2bSJakub Kicinski return wrp_alu32_reg(nfp_prog, meta, ALU_OP_ADD); 2333d9ae7f2bSJakub Kicinski } 2334d9ae7f2bSJakub Kicinski 2335d9ae7f2bSJakub Kicinski static int add_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2336d9ae7f2bSJakub Kicinski { 2337f036ebd9SJiong Wang return wrp_alu32_imm(nfp_prog, meta, ALU_OP_ADD); 2338d9ae7f2bSJakub Kicinski } 2339d9ae7f2bSJakub Kicinski 2340d9ae7f2bSJakub Kicinski static int sub_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2341d9ae7f2bSJakub Kicinski { 2342d9ae7f2bSJakub Kicinski return wrp_alu32_reg(nfp_prog, meta, ALU_OP_SUB); 2343d9ae7f2bSJakub Kicinski } 2344d9ae7f2bSJakub Kicinski 2345d9ae7f2bSJakub Kicinski static int sub_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2346d9ae7f2bSJakub Kicinski { 2347f036ebd9SJiong Wang return wrp_alu32_imm(nfp_prog, meta, ALU_OP_SUB); 2348d9ae7f2bSJakub Kicinski } 2349d9ae7f2bSJakub Kicinski 2350d3d23fdbSJiong Wang static int mul_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2351d3d23fdbSJiong Wang { 2352d3d23fdbSJiong Wang return wrp_mul(nfp_prog, meta, false, true); 2353d3d23fdbSJiong Wang } 2354d3d23fdbSJiong Wang 2355d3d23fdbSJiong Wang static int mul_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2356d3d23fdbSJiong Wang { 2357d3d23fdbSJiong Wang return wrp_mul(nfp_prog, meta, false, false); 2358d3d23fdbSJiong Wang } 2359d3d23fdbSJiong Wang 23602a952b03SJiong Wang static int div_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 23612a952b03SJiong Wang { 23622a952b03SJiong Wang return div_reg64(nfp_prog, meta); 23632a952b03SJiong Wang } 23642a952b03SJiong Wang 23652a952b03SJiong Wang static int div_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 23662a952b03SJiong Wang { 23672a952b03SJiong Wang return div_imm64(nfp_prog, meta); 23682a952b03SJiong Wang } 23692a952b03SJiong Wang 2370254ef4d7SJiong Wang static int neg_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2371254ef4d7SJiong Wang { 2372254ef4d7SJiong Wang u8 dst = meta->insn.dst_reg * 2; 2373254ef4d7SJiong Wang 2374254ef4d7SJiong Wang emit_alu(nfp_prog, reg_both(dst), reg_imm(0), ALU_OP_SUB, reg_b(dst)); 2375254ef4d7SJiong Wang wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0); 2376254ef4d7SJiong Wang 2377254ef4d7SJiong Wang return 0; 2378254ef4d7SJiong Wang } 2379254ef4d7SJiong Wang 238084708c13SJiong Wang static int __ashr_imm(struct nfp_prog *nfp_prog, u8 dst, u8 shift_amt) 238184708c13SJiong Wang { 238284708c13SJiong Wang /* Set signedness bit (MSB of result). */ 238384708c13SJiong Wang emit_alu(nfp_prog, reg_none(), reg_a(dst), ALU_OP_OR, reg_imm(0)); 238484708c13SJiong Wang emit_shf(nfp_prog, reg_both(dst), reg_none(), SHF_OP_ASHR, reg_b(dst), 238584708c13SJiong Wang SHF_SC_R_SHF, shift_amt); 238684708c13SJiong Wang wrp_immed(nfp_prog, reg_both(dst + 1), 0); 238784708c13SJiong Wang 238884708c13SJiong Wang return 0; 238984708c13SJiong Wang } 239084708c13SJiong Wang 239184708c13SJiong Wang static int ashr_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 239284708c13SJiong Wang { 239384708c13SJiong Wang const struct bpf_insn *insn = &meta->insn; 239484708c13SJiong Wang u64 umin, umax; 239584708c13SJiong Wang u8 dst, src; 239684708c13SJiong Wang 239784708c13SJiong Wang dst = insn->dst_reg * 2; 239884708c13SJiong Wang umin = meta->umin_src; 239984708c13SJiong Wang umax = meta->umax_src; 240084708c13SJiong Wang if (umin == umax) 240184708c13SJiong Wang return __ashr_imm(nfp_prog, dst, umin); 240284708c13SJiong Wang 240384708c13SJiong Wang src = insn->src_reg * 2; 240484708c13SJiong Wang /* NOTE: the first insn will set both indirect shift amount (source A) 240584708c13SJiong Wang * and signedness bit (MSB of result). 240684708c13SJiong Wang */ 240784708c13SJiong Wang emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_b(dst)); 240884708c13SJiong Wang emit_shf_indir(nfp_prog, reg_both(dst), reg_none(), SHF_OP_ASHR, 240984708c13SJiong Wang reg_b(dst), SHF_SC_R_SHF); 241084708c13SJiong Wang wrp_immed(nfp_prog, reg_both(dst + 1), 0); 241184708c13SJiong Wang 241284708c13SJiong Wang return 0; 241384708c13SJiong Wang } 241484708c13SJiong Wang 241584708c13SJiong Wang static int ashr_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 241684708c13SJiong Wang { 241784708c13SJiong Wang const struct bpf_insn *insn = &meta->insn; 241884708c13SJiong Wang u8 dst = insn->dst_reg * 2; 241984708c13SJiong Wang 242084708c13SJiong Wang return __ashr_imm(nfp_prog, dst, insn->imm); 242184708c13SJiong Wang } 242284708c13SJiong Wang 2423d9ae7f2bSJakub Kicinski static int shl_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2424d9ae7f2bSJakub Kicinski { 2425d9ae7f2bSJakub Kicinski const struct bpf_insn *insn = &meta->insn; 2426d9ae7f2bSJakub Kicinski 2427d9ae7f2bSJakub Kicinski if (!insn->imm) 2428d9ae7f2bSJakub Kicinski return 1; /* TODO: zero shift means indirect */ 2429d9ae7f2bSJakub Kicinski 2430d9ae7f2bSJakub Kicinski emit_shf(nfp_prog, reg_both(insn->dst_reg * 2), 2431d9ae7f2bSJakub Kicinski reg_none(), SHF_OP_NONE, reg_b(insn->dst_reg * 2), 2432d9ae7f2bSJakub Kicinski SHF_SC_L_SHF, insn->imm); 2433d9ae7f2bSJakub Kicinski wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0); 2434d9ae7f2bSJakub Kicinski 2435d9ae7f2bSJakub Kicinski return 0; 2436d9ae7f2bSJakub Kicinski } 2437d9ae7f2bSJakub Kicinski 24383119d1fdSJakub Kicinski static int end_reg32(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 24393119d1fdSJakub Kicinski { 24403119d1fdSJakub Kicinski const struct bpf_insn *insn = &meta->insn; 24413119d1fdSJakub Kicinski u8 gpr = insn->dst_reg * 2; 24423119d1fdSJakub Kicinski 24433119d1fdSJakub Kicinski switch (insn->imm) { 24443119d1fdSJakub Kicinski case 16: 24453119d1fdSJakub Kicinski emit_ld_field(nfp_prog, reg_both(gpr), 0x9, reg_b(gpr), 24463119d1fdSJakub Kicinski SHF_SC_R_ROT, 8); 24473119d1fdSJakub Kicinski emit_ld_field(nfp_prog, reg_both(gpr), 0xe, reg_a(gpr), 24483119d1fdSJakub Kicinski SHF_SC_R_SHF, 16); 24493119d1fdSJakub Kicinski 24503119d1fdSJakub Kicinski wrp_immed(nfp_prog, reg_both(gpr + 1), 0); 24513119d1fdSJakub Kicinski break; 24523119d1fdSJakub Kicinski case 32: 24533119d1fdSJakub Kicinski wrp_end32(nfp_prog, reg_a(gpr), gpr); 24543119d1fdSJakub Kicinski wrp_immed(nfp_prog, reg_both(gpr + 1), 0); 24553119d1fdSJakub Kicinski break; 24563119d1fdSJakub Kicinski case 64: 24573119d1fdSJakub Kicinski wrp_mov(nfp_prog, imm_a(nfp_prog), reg_b(gpr + 1)); 24583119d1fdSJakub Kicinski 24593119d1fdSJakub Kicinski wrp_end32(nfp_prog, reg_a(gpr), gpr + 1); 24603119d1fdSJakub Kicinski wrp_end32(nfp_prog, imm_a(nfp_prog), gpr); 24613119d1fdSJakub Kicinski break; 24623119d1fdSJakub Kicinski } 24633119d1fdSJakub Kicinski 24643119d1fdSJakub Kicinski return 0; 24653119d1fdSJakub Kicinski } 24663119d1fdSJakub Kicinski 2467d9ae7f2bSJakub Kicinski static int imm_ld8_part2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2468d9ae7f2bSJakub Kicinski { 24699f16c8abSJakub Kicinski struct nfp_insn_meta *prev = nfp_meta_prev(meta); 24709f16c8abSJakub Kicinski u32 imm_lo, imm_hi; 24719f16c8abSJakub Kicinski u8 dst; 24729f16c8abSJakub Kicinski 24739f16c8abSJakub Kicinski dst = prev->insn.dst_reg * 2; 24749f16c8abSJakub Kicinski imm_lo = prev->insn.imm; 24759f16c8abSJakub Kicinski imm_hi = meta->insn.imm; 24769f16c8abSJakub Kicinski 24779f16c8abSJakub Kicinski wrp_immed(nfp_prog, reg_both(dst), imm_lo); 24789f16c8abSJakub Kicinski 24799f16c8abSJakub Kicinski /* mov is always 1 insn, load imm may be two, so try to use mov */ 24809f16c8abSJakub Kicinski if (imm_hi == imm_lo) 24819f16c8abSJakub Kicinski wrp_mov(nfp_prog, reg_both(dst + 1), reg_a(dst)); 24829f16c8abSJakub Kicinski else 24839f16c8abSJakub Kicinski wrp_immed(nfp_prog, reg_both(dst + 1), imm_hi); 2484d9ae7f2bSJakub Kicinski 2485d9ae7f2bSJakub Kicinski return 0; 2486d9ae7f2bSJakub Kicinski } 2487d9ae7f2bSJakub Kicinski 2488d9ae7f2bSJakub Kicinski static int imm_ld8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2489d9ae7f2bSJakub Kicinski { 2490d9ae7f2bSJakub Kicinski meta->double_cb = imm_ld8_part2; 2491d9ae7f2bSJakub Kicinski return 0; 2492d9ae7f2bSJakub Kicinski } 2493d9ae7f2bSJakub Kicinski 2494d9ae7f2bSJakub Kicinski static int data_ld1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2495d9ae7f2bSJakub Kicinski { 2496d9ae7f2bSJakub Kicinski return construct_data_ld(nfp_prog, meta->insn.imm, 1); 2497d9ae7f2bSJakub Kicinski } 2498d9ae7f2bSJakub Kicinski 2499d9ae7f2bSJakub Kicinski static int data_ld2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2500d9ae7f2bSJakub Kicinski { 2501d9ae7f2bSJakub Kicinski return construct_data_ld(nfp_prog, meta->insn.imm, 2); 2502d9ae7f2bSJakub Kicinski } 2503d9ae7f2bSJakub Kicinski 2504d9ae7f2bSJakub Kicinski static int data_ld4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2505d9ae7f2bSJakub Kicinski { 2506d9ae7f2bSJakub Kicinski return construct_data_ld(nfp_prog, meta->insn.imm, 4); 2507d9ae7f2bSJakub Kicinski } 2508d9ae7f2bSJakub Kicinski 2509d9ae7f2bSJakub Kicinski static int data_ind_ld1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2510d9ae7f2bSJakub Kicinski { 2511d9ae7f2bSJakub Kicinski return construct_data_ind_ld(nfp_prog, meta->insn.imm, 25120a793977SJakub Kicinski meta->insn.src_reg * 2, 1); 2513d9ae7f2bSJakub Kicinski } 2514d9ae7f2bSJakub Kicinski 2515d9ae7f2bSJakub Kicinski static int data_ind_ld2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2516d9ae7f2bSJakub Kicinski { 2517d9ae7f2bSJakub Kicinski return construct_data_ind_ld(nfp_prog, meta->insn.imm, 25180a793977SJakub Kicinski meta->insn.src_reg * 2, 2); 2519d9ae7f2bSJakub Kicinski } 2520d9ae7f2bSJakub Kicinski 2521d9ae7f2bSJakub Kicinski static int data_ind_ld4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2522d9ae7f2bSJakub Kicinski { 2523d9ae7f2bSJakub Kicinski return construct_data_ind_ld(nfp_prog, meta->insn.imm, 25240a793977SJakub Kicinski meta->insn.src_reg * 2, 4); 2525d9ae7f2bSJakub Kicinski } 2526d9ae7f2bSJakub Kicinski 2527a82b23fbSJakub Kicinski static int 2528a82b23fbSJakub Kicinski mem_ldx_stack(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 2529d3488480SJakub Kicinski unsigned int size, unsigned int ptr_off) 2530a82b23fbSJakub Kicinski { 2531d3488480SJakub Kicinski return mem_op_stack(nfp_prog, meta, size, ptr_off, 2532b14157eeSJakub Kicinski meta->insn.dst_reg * 2, meta->insn.src_reg * 2, 2533b14157eeSJakub Kicinski true, wrp_lmem_load); 2534a82b23fbSJakub Kicinski } 2535a82b23fbSJakub Kicinski 2536943c57b9SJakub Kicinski static int mem_ldx_skb(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 2537943c57b9SJakub Kicinski u8 size) 2538d9ae7f2bSJakub Kicinski { 2539bfddbc8aSJakub Kicinski swreg dst = reg_both(meta->insn.dst_reg * 2); 2540bfddbc8aSJakub Kicinski 2541943c57b9SJakub Kicinski switch (meta->insn.off) { 2542c6c580d7SJakub Kicinski case offsetof(struct __sk_buff, len): 2543c6c580d7SJakub Kicinski if (size != FIELD_SIZEOF(struct __sk_buff, len)) 2544943c57b9SJakub Kicinski return -EOPNOTSUPP; 2545bfddbc8aSJakub Kicinski wrp_mov(nfp_prog, dst, plen_reg(nfp_prog)); 2546bfddbc8aSJakub Kicinski break; 2547c6c580d7SJakub Kicinski case offsetof(struct __sk_buff, data): 2548c6c580d7SJakub Kicinski if (size != FIELD_SIZEOF(struct __sk_buff, data)) 2549bfddbc8aSJakub Kicinski return -EOPNOTSUPP; 2550bfddbc8aSJakub Kicinski wrp_mov(nfp_prog, dst, pptr_reg(nfp_prog)); 2551bfddbc8aSJakub Kicinski break; 2552c6c580d7SJakub Kicinski case offsetof(struct __sk_buff, data_end): 2553c6c580d7SJakub Kicinski if (size != FIELD_SIZEOF(struct __sk_buff, data_end)) 2554bfddbc8aSJakub Kicinski return -EOPNOTSUPP; 2555bfddbc8aSJakub Kicinski emit_alu(nfp_prog, dst, 2556bfddbc8aSJakub Kicinski plen_reg(nfp_prog), ALU_OP_ADD, pptr_reg(nfp_prog)); 2557943c57b9SJakub Kicinski break; 2558943c57b9SJakub Kicinski default: 2559d9ae7f2bSJakub Kicinski return -EOPNOTSUPP; 2560943c57b9SJakub Kicinski } 2561943c57b9SJakub Kicinski 2562943c57b9SJakub Kicinski wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0); 2563d9ae7f2bSJakub Kicinski 2564d9ae7f2bSJakub Kicinski return 0; 2565d9ae7f2bSJakub Kicinski } 2566d9ae7f2bSJakub Kicinski 2567943c57b9SJakub Kicinski static int mem_ldx_xdp(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 2568943c57b9SJakub Kicinski u8 size) 2569d9ae7f2bSJakub Kicinski { 2570b3f868dfSJakub Kicinski swreg dst = reg_both(meta->insn.dst_reg * 2); 2571d9ae7f2bSJakub Kicinski 2572943c57b9SJakub Kicinski switch (meta->insn.off) { 2573c6c580d7SJakub Kicinski case offsetof(struct xdp_md, data): 2574c6c580d7SJakub Kicinski if (size != FIELD_SIZEOF(struct xdp_md, data)) 2575c6c580d7SJakub Kicinski return -EOPNOTSUPP; 2576c000dfb5SJakub Kicinski wrp_mov(nfp_prog, dst, pptr_reg(nfp_prog)); 2577943c57b9SJakub Kicinski break; 2578c6c580d7SJakub Kicinski case offsetof(struct xdp_md, data_end): 2579c6c580d7SJakub Kicinski if (size != FIELD_SIZEOF(struct xdp_md, data_end)) 2580c6c580d7SJakub Kicinski return -EOPNOTSUPP; 2581943c57b9SJakub Kicinski emit_alu(nfp_prog, dst, 2582943c57b9SJakub Kicinski plen_reg(nfp_prog), ALU_OP_ADD, pptr_reg(nfp_prog)); 2583943c57b9SJakub Kicinski break; 2584943c57b9SJakub Kicinski default: 2585943c57b9SJakub Kicinski return -EOPNOTSUPP; 2586943c57b9SJakub Kicinski } 2587d9ae7f2bSJakub Kicinski 2588943c57b9SJakub Kicinski wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0); 2589d9ae7f2bSJakub Kicinski 2590d9ae7f2bSJakub Kicinski return 0; 2591d9ae7f2bSJakub Kicinski } 2592d9ae7f2bSJakub Kicinski 25932ca71441SJakub Kicinski static int 25942ca71441SJakub Kicinski mem_ldx_data(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 25952ca71441SJakub Kicinski unsigned int size) 25962ca71441SJakub Kicinski { 25972ca71441SJakub Kicinski swreg tmp_reg; 25982ca71441SJakub Kicinski 25992ca71441SJakub Kicinski tmp_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog)); 26002ca71441SJakub Kicinski 26013dd43c33SJakub Kicinski return data_ld_host_order_addr32(nfp_prog, meta->insn.src_reg * 2, 26023dd43c33SJakub Kicinski tmp_reg, meta->insn.dst_reg * 2, size); 26033dd43c33SJakub Kicinski } 26043dd43c33SJakub Kicinski 26053dd43c33SJakub Kicinski static int 26063dd43c33SJakub Kicinski mem_ldx_emem(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 26073dd43c33SJakub Kicinski unsigned int size) 26083dd43c33SJakub Kicinski { 26093dd43c33SJakub Kicinski swreg tmp_reg; 26103dd43c33SJakub Kicinski 26113dd43c33SJakub Kicinski tmp_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog)); 26123dd43c33SJakub Kicinski 26133dd43c33SJakub Kicinski return data_ld_host_order_addr40(nfp_prog, meta->insn.src_reg * 2, 26143dd43c33SJakub Kicinski tmp_reg, meta->insn.dst_reg * 2, size); 26152ca71441SJakub Kicinski } 26162ca71441SJakub Kicinski 2617be759237SJiong Wang static void 2618be759237SJiong Wang mem_ldx_data_init_pktcache(struct nfp_prog *nfp_prog, 2619be759237SJiong Wang struct nfp_insn_meta *meta) 2620be759237SJiong Wang { 2621be759237SJiong Wang s16 range_start = meta->pkt_cache.range_start; 2622be759237SJiong Wang s16 range_end = meta->pkt_cache.range_end; 2623be759237SJiong Wang swreg src_base, off; 2624be759237SJiong Wang u8 xfer_num, len; 2625be759237SJiong Wang bool indir; 2626be759237SJiong Wang 2627be759237SJiong Wang off = re_load_imm_any(nfp_prog, range_start, imm_b(nfp_prog)); 2628be759237SJiong Wang src_base = reg_a(meta->insn.src_reg * 2); 2629be759237SJiong Wang len = range_end - range_start; 2630be759237SJiong Wang xfer_num = round_up(len, REG_WIDTH) / REG_WIDTH; 2631be759237SJiong Wang 2632be759237SJiong Wang indir = len > 8 * REG_WIDTH; 2633be759237SJiong Wang /* Setup PREV_ALU for indirect mode. */ 2634be759237SJiong Wang if (indir) 2635be759237SJiong Wang wrp_immed(nfp_prog, reg_none(), 2636be759237SJiong Wang CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, xfer_num - 1)); 2637be759237SJiong Wang 2638be759237SJiong Wang /* Cache memory into transfer-in registers. */ 2639be759237SJiong Wang emit_cmd_any(nfp_prog, CMD_TGT_READ32_SWAP, CMD_MODE_32b, 0, src_base, 2640b556ddd9SJakub Kicinski off, xfer_num - 1, CMD_CTX_SWAP, indir); 2641be759237SJiong Wang } 2642be759237SJiong Wang 2643be759237SJiong Wang static int 264491ff69e8SJiong Wang mem_ldx_data_from_pktcache_unaligned(struct nfp_prog *nfp_prog, 264591ff69e8SJiong Wang struct nfp_insn_meta *meta, 264691ff69e8SJiong Wang unsigned int size) 264791ff69e8SJiong Wang { 264891ff69e8SJiong Wang s16 range_start = meta->pkt_cache.range_start; 264991ff69e8SJiong Wang s16 insn_off = meta->insn.off - range_start; 265091ff69e8SJiong Wang swreg dst_lo, dst_hi, src_lo, src_mid; 265191ff69e8SJiong Wang u8 dst_gpr = meta->insn.dst_reg * 2; 265291ff69e8SJiong Wang u8 len_lo = size, len_mid = 0; 265391ff69e8SJiong Wang u8 idx = insn_off / REG_WIDTH; 265491ff69e8SJiong Wang u8 off = insn_off % REG_WIDTH; 265591ff69e8SJiong Wang 265691ff69e8SJiong Wang dst_hi = reg_both(dst_gpr + 1); 265791ff69e8SJiong Wang dst_lo = reg_both(dst_gpr); 265891ff69e8SJiong Wang src_lo = reg_xfer(idx); 265991ff69e8SJiong Wang 266091ff69e8SJiong Wang /* The read length could involve as many as three registers. */ 266191ff69e8SJiong Wang if (size > REG_WIDTH - off) { 266291ff69e8SJiong Wang /* Calculate the part in the second register. */ 266391ff69e8SJiong Wang len_lo = REG_WIDTH - off; 266491ff69e8SJiong Wang len_mid = size - len_lo; 266591ff69e8SJiong Wang 266691ff69e8SJiong Wang /* Calculate the part in the third register. */ 266791ff69e8SJiong Wang if (size > 2 * REG_WIDTH - off) 266891ff69e8SJiong Wang len_mid = REG_WIDTH; 266991ff69e8SJiong Wang } 267091ff69e8SJiong Wang 267191ff69e8SJiong Wang wrp_reg_subpart(nfp_prog, dst_lo, src_lo, len_lo, off); 267291ff69e8SJiong Wang 267391ff69e8SJiong Wang if (!len_mid) { 267491ff69e8SJiong Wang wrp_immed(nfp_prog, dst_hi, 0); 267591ff69e8SJiong Wang return 0; 267691ff69e8SJiong Wang } 267791ff69e8SJiong Wang 267891ff69e8SJiong Wang src_mid = reg_xfer(idx + 1); 267991ff69e8SJiong Wang 268091ff69e8SJiong Wang if (size <= REG_WIDTH) { 268191ff69e8SJiong Wang wrp_reg_or_subpart(nfp_prog, dst_lo, src_mid, len_mid, len_lo); 268291ff69e8SJiong Wang wrp_immed(nfp_prog, dst_hi, 0); 268391ff69e8SJiong Wang } else { 268491ff69e8SJiong Wang swreg src_hi = reg_xfer(idx + 2); 268591ff69e8SJiong Wang 268691ff69e8SJiong Wang wrp_reg_or_subpart(nfp_prog, dst_lo, src_mid, 268791ff69e8SJiong Wang REG_WIDTH - len_lo, len_lo); 268891ff69e8SJiong Wang wrp_reg_subpart(nfp_prog, dst_hi, src_mid, len_lo, 268991ff69e8SJiong Wang REG_WIDTH - len_lo); 269091ff69e8SJiong Wang wrp_reg_or_subpart(nfp_prog, dst_hi, src_hi, REG_WIDTH - len_lo, 269191ff69e8SJiong Wang len_lo); 269291ff69e8SJiong Wang } 269391ff69e8SJiong Wang 269491ff69e8SJiong Wang return 0; 269591ff69e8SJiong Wang } 269691ff69e8SJiong Wang 269791ff69e8SJiong Wang static int 2698be759237SJiong Wang mem_ldx_data_from_pktcache_aligned(struct nfp_prog *nfp_prog, 2699be759237SJiong Wang struct nfp_insn_meta *meta, 2700be759237SJiong Wang unsigned int size) 2701be759237SJiong Wang { 2702be759237SJiong Wang swreg dst_lo, dst_hi, src_lo; 2703be759237SJiong Wang u8 dst_gpr, idx; 2704be759237SJiong Wang 2705be759237SJiong Wang idx = (meta->insn.off - meta->pkt_cache.range_start) / REG_WIDTH; 2706be759237SJiong Wang dst_gpr = meta->insn.dst_reg * 2; 2707be759237SJiong Wang dst_hi = reg_both(dst_gpr + 1); 2708be759237SJiong Wang dst_lo = reg_both(dst_gpr); 2709be759237SJiong Wang src_lo = reg_xfer(idx); 2710be759237SJiong Wang 2711be759237SJiong Wang if (size < REG_WIDTH) { 2712be759237SJiong Wang wrp_reg_subpart(nfp_prog, dst_lo, src_lo, size, 0); 2713be759237SJiong Wang wrp_immed(nfp_prog, dst_hi, 0); 2714be759237SJiong Wang } else if (size == REG_WIDTH) { 2715be759237SJiong Wang wrp_mov(nfp_prog, dst_lo, src_lo); 2716be759237SJiong Wang wrp_immed(nfp_prog, dst_hi, 0); 2717be759237SJiong Wang } else { 2718be759237SJiong Wang swreg src_hi = reg_xfer(idx + 1); 2719be759237SJiong Wang 2720be759237SJiong Wang wrp_mov(nfp_prog, dst_lo, src_lo); 2721be759237SJiong Wang wrp_mov(nfp_prog, dst_hi, src_hi); 2722be759237SJiong Wang } 2723be759237SJiong Wang 2724be759237SJiong Wang return 0; 2725be759237SJiong Wang } 2726be759237SJiong Wang 2727be759237SJiong Wang static int 2728be759237SJiong Wang mem_ldx_data_from_pktcache(struct nfp_prog *nfp_prog, 2729be759237SJiong Wang struct nfp_insn_meta *meta, unsigned int size) 2730be759237SJiong Wang { 2731be759237SJiong Wang u8 off = meta->insn.off - meta->pkt_cache.range_start; 2732be759237SJiong Wang 273391ff69e8SJiong Wang if (IS_ALIGNED(off, REG_WIDTH)) 2734be759237SJiong Wang return mem_ldx_data_from_pktcache_aligned(nfp_prog, meta, size); 273591ff69e8SJiong Wang 273691ff69e8SJiong Wang return mem_ldx_data_from_pktcache_unaligned(nfp_prog, meta, size); 2737be759237SJiong Wang } 2738be759237SJiong Wang 27392ca71441SJakub Kicinski static int 27402ca71441SJakub Kicinski mem_ldx(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 27412ca71441SJakub Kicinski unsigned int size) 27422ca71441SJakub Kicinski { 27439879a381SJiong Wang if (meta->ldst_gather_len) 27449879a381SJiong Wang return nfp_cpp_memcpy(nfp_prog, meta); 27459879a381SJiong Wang 27462ca71441SJakub Kicinski if (meta->ptr.type == PTR_TO_CTX) { 2747012bb8a8SJakub Kicinski if (nfp_prog->type == BPF_PROG_TYPE_XDP) 27482ca71441SJakub Kicinski return mem_ldx_xdp(nfp_prog, meta, size); 27492ca71441SJakub Kicinski else 27502ca71441SJakub Kicinski return mem_ldx_skb(nfp_prog, meta, size); 27512ca71441SJakub Kicinski } 27522ca71441SJakub Kicinski 2753be759237SJiong Wang if (meta->ptr.type == PTR_TO_PACKET) { 2754be759237SJiong Wang if (meta->pkt_cache.range_end) { 2755be759237SJiong Wang if (meta->pkt_cache.do_init) 2756be759237SJiong Wang mem_ldx_data_init_pktcache(nfp_prog, meta); 2757be759237SJiong Wang 2758be759237SJiong Wang return mem_ldx_data_from_pktcache(nfp_prog, meta, size); 2759be759237SJiong Wang } else { 27602ca71441SJakub Kicinski return mem_ldx_data(nfp_prog, meta, size); 2761be759237SJiong Wang } 2762be759237SJiong Wang } 27632ca71441SJakub Kicinski 2764a82b23fbSJakub Kicinski if (meta->ptr.type == PTR_TO_STACK) 2765d3488480SJakub Kicinski return mem_ldx_stack(nfp_prog, meta, size, 2766d3488480SJakub Kicinski meta->ptr.off + meta->ptr.var_off.value); 2767a82b23fbSJakub Kicinski 27683dd43c33SJakub Kicinski if (meta->ptr.type == PTR_TO_MAP_VALUE) 27693dd43c33SJakub Kicinski return mem_ldx_emem(nfp_prog, meta, size); 27703dd43c33SJakub Kicinski 27712ca71441SJakub Kicinski return -EOPNOTSUPP; 27722ca71441SJakub Kicinski } 27732ca71441SJakub Kicinski 27742ca71441SJakub Kicinski static int mem_ldx1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 27752ca71441SJakub Kicinski { 27762ca71441SJakub Kicinski return mem_ldx(nfp_prog, meta, 1); 27772ca71441SJakub Kicinski } 27782ca71441SJakub Kicinski 27792ca71441SJakub Kicinski static int mem_ldx2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 27802ca71441SJakub Kicinski { 27812ca71441SJakub Kicinski return mem_ldx(nfp_prog, meta, 2); 27822ca71441SJakub Kicinski } 27832ca71441SJakub Kicinski 2784d9ae7f2bSJakub Kicinski static int mem_ldx4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2785d9ae7f2bSJakub Kicinski { 27862ca71441SJakub Kicinski return mem_ldx(nfp_prog, meta, 4); 27872ca71441SJakub Kicinski } 27882ca71441SJakub Kicinski 27892ca71441SJakub Kicinski static int mem_ldx8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 27902ca71441SJakub Kicinski { 27912ca71441SJakub Kicinski return mem_ldx(nfp_prog, meta, 8); 2792d9ae7f2bSJakub Kicinski } 2793d9ae7f2bSJakub Kicinski 2794e663fe38SJakub Kicinski static int 2795e663fe38SJakub Kicinski mem_st_data(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 2796e663fe38SJakub Kicinski unsigned int size) 2797d9ae7f2bSJakub Kicinski { 2798e663fe38SJakub Kicinski u64 imm = meta->insn.imm; /* sign extend */ 2799e663fe38SJakub Kicinski swreg off_reg; 2800e663fe38SJakub Kicinski 2801e663fe38SJakub Kicinski off_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog)); 2802e663fe38SJakub Kicinski 2803e663fe38SJakub Kicinski return data_st_host_order(nfp_prog, meta->insn.dst_reg * 2, off_reg, 2804e663fe38SJakub Kicinski imm, size); 2805e663fe38SJakub Kicinski } 2806e663fe38SJakub Kicinski 2807e663fe38SJakub Kicinski static int mem_st(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 2808e663fe38SJakub Kicinski unsigned int size) 2809e663fe38SJakub Kicinski { 2810e663fe38SJakub Kicinski if (meta->ptr.type == PTR_TO_PACKET) 2811e663fe38SJakub Kicinski return mem_st_data(nfp_prog, meta, size); 2812e663fe38SJakub Kicinski 2813d9ae7f2bSJakub Kicinski return -EOPNOTSUPP; 2814d9ae7f2bSJakub Kicinski } 2815d9ae7f2bSJakub Kicinski 2816e663fe38SJakub Kicinski static int mem_st1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2817d9ae7f2bSJakub Kicinski { 2818e663fe38SJakub Kicinski return mem_st(nfp_prog, meta, 1); 2819e663fe38SJakub Kicinski } 2820e663fe38SJakub Kicinski 2821e663fe38SJakub Kicinski static int mem_st2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2822e663fe38SJakub Kicinski { 2823e663fe38SJakub Kicinski return mem_st(nfp_prog, meta, 2); 2824e663fe38SJakub Kicinski } 2825e663fe38SJakub Kicinski 2826e663fe38SJakub Kicinski static int mem_st4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2827e663fe38SJakub Kicinski { 2828e663fe38SJakub Kicinski return mem_st(nfp_prog, meta, 4); 2829e663fe38SJakub Kicinski } 2830e663fe38SJakub Kicinski 2831e663fe38SJakub Kicinski static int mem_st8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2832e663fe38SJakub Kicinski { 2833e663fe38SJakub Kicinski return mem_st(nfp_prog, meta, 8); 2834e663fe38SJakub Kicinski } 2835e663fe38SJakub Kicinski 2836e663fe38SJakub Kicinski static int 2837e663fe38SJakub Kicinski mem_stx_data(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 2838e663fe38SJakub Kicinski unsigned int size) 2839e663fe38SJakub Kicinski { 2840e663fe38SJakub Kicinski swreg off_reg; 2841e663fe38SJakub Kicinski 2842e663fe38SJakub Kicinski off_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog)); 2843e663fe38SJakub Kicinski 2844e663fe38SJakub Kicinski return data_stx_host_order(nfp_prog, meta->insn.dst_reg * 2, off_reg, 2845e663fe38SJakub Kicinski meta->insn.src_reg * 2, size); 2846e663fe38SJakub Kicinski } 2847e663fe38SJakub Kicinski 2848e663fe38SJakub Kicinski static int 2849ee9133a8SJakub Kicinski mem_stx_stack(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 2850d3488480SJakub Kicinski unsigned int size, unsigned int ptr_off) 2851ee9133a8SJakub Kicinski { 2852d3488480SJakub Kicinski return mem_op_stack(nfp_prog, meta, size, ptr_off, 2853b14157eeSJakub Kicinski meta->insn.src_reg * 2, meta->insn.dst_reg * 2, 2854b14157eeSJakub Kicinski false, wrp_lmem_store); 2855ee9133a8SJakub Kicinski } 2856ee9133a8SJakub Kicinski 2857d985888fSJakub Kicinski static int mem_stx_xdp(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2858d985888fSJakub Kicinski { 2859d985888fSJakub Kicinski switch (meta->insn.off) { 2860d985888fSJakub Kicinski case offsetof(struct xdp_md, rx_queue_index): 2861d985888fSJakub Kicinski return nfp_queue_select(nfp_prog, meta); 2862d985888fSJakub Kicinski } 2863d985888fSJakub Kicinski 2864d985888fSJakub Kicinski WARN_ON_ONCE(1); /* verifier should have rejected bad accesses */ 2865d985888fSJakub Kicinski return -EOPNOTSUPP; 2866d985888fSJakub Kicinski } 2867d985888fSJakub Kicinski 2868ee9133a8SJakub Kicinski static int 2869e663fe38SJakub Kicinski mem_stx(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 2870e663fe38SJakub Kicinski unsigned int size) 2871e663fe38SJakub Kicinski { 2872e663fe38SJakub Kicinski if (meta->ptr.type == PTR_TO_PACKET) 2873e663fe38SJakub Kicinski return mem_stx_data(nfp_prog, meta, size); 2874e663fe38SJakub Kicinski 2875ee9133a8SJakub Kicinski if (meta->ptr.type == PTR_TO_STACK) 2876d3488480SJakub Kicinski return mem_stx_stack(nfp_prog, meta, size, 2877d3488480SJakub Kicinski meta->ptr.off + meta->ptr.var_off.value); 2878ee9133a8SJakub Kicinski 2879d9ae7f2bSJakub Kicinski return -EOPNOTSUPP; 2880d9ae7f2bSJakub Kicinski } 2881d9ae7f2bSJakub Kicinski 2882e663fe38SJakub Kicinski static int mem_stx1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2883e663fe38SJakub Kicinski { 2884e663fe38SJakub Kicinski return mem_stx(nfp_prog, meta, 1); 2885e663fe38SJakub Kicinski } 2886e663fe38SJakub Kicinski 2887e663fe38SJakub Kicinski static int mem_stx2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2888e663fe38SJakub Kicinski { 2889e663fe38SJakub Kicinski return mem_stx(nfp_prog, meta, 2); 2890e663fe38SJakub Kicinski } 2891e663fe38SJakub Kicinski 2892d9ae7f2bSJakub Kicinski static int mem_stx4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2893d9ae7f2bSJakub Kicinski { 2894d985888fSJakub Kicinski if (meta->ptr.type == PTR_TO_CTX) 2895d985888fSJakub Kicinski if (nfp_prog->type == BPF_PROG_TYPE_XDP) 2896d985888fSJakub Kicinski return mem_stx_xdp(nfp_prog, meta); 2897e663fe38SJakub Kicinski return mem_stx(nfp_prog, meta, 4); 2898e663fe38SJakub Kicinski } 28992ca71441SJakub Kicinski 2900e663fe38SJakub Kicinski static int mem_stx8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 2901e663fe38SJakub Kicinski { 2902e663fe38SJakub Kicinski return mem_stx(nfp_prog, meta, 8); 2903d9ae7f2bSJakub Kicinski } 2904d9ae7f2bSJakub Kicinski 2905dcb0c27fSJakub Kicinski static int 2906dcb0c27fSJakub Kicinski mem_xadd(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, bool is64) 2907dcb0c27fSJakub Kicinski { 2908dcb0c27fSJakub Kicinski u8 dst_gpr = meta->insn.dst_reg * 2; 2909dcb0c27fSJakub Kicinski u8 src_gpr = meta->insn.src_reg * 2; 291041aed09cSJakub Kicinski unsigned int full_add, out; 291141aed09cSJakub Kicinski swreg addra, addrb, off; 2912dcb0c27fSJakub Kicinski 2913dcb0c27fSJakub Kicinski off = ur_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog)); 2914dcb0c27fSJakub Kicinski 291541aed09cSJakub Kicinski /* We can fit 16 bits into command immediate, if we know the immediate 291641aed09cSJakub Kicinski * is guaranteed to either always or never fit into 16 bit we only 291741aed09cSJakub Kicinski * generate code to handle that particular case, otherwise generate 291841aed09cSJakub Kicinski * code for both. 291941aed09cSJakub Kicinski */ 292041aed09cSJakub Kicinski out = nfp_prog_current_offset(nfp_prog); 292141aed09cSJakub Kicinski full_add = nfp_prog_current_offset(nfp_prog); 292241aed09cSJakub Kicinski 292341aed09cSJakub Kicinski if (meta->insn.off) { 292441aed09cSJakub Kicinski out += 2; 292541aed09cSJakub Kicinski full_add += 2; 292641aed09cSJakub Kicinski } 292741aed09cSJakub Kicinski if (meta->xadd_maybe_16bit) { 292841aed09cSJakub Kicinski out += 3; 292941aed09cSJakub Kicinski full_add += 3; 293041aed09cSJakub Kicinski } 293141aed09cSJakub Kicinski if (meta->xadd_over_16bit) 293241aed09cSJakub Kicinski out += 2 + is64; 293341aed09cSJakub Kicinski if (meta->xadd_maybe_16bit && meta->xadd_over_16bit) { 293441aed09cSJakub Kicinski out += 5; 293541aed09cSJakub Kicinski full_add += 5; 293641aed09cSJakub Kicinski } 293741aed09cSJakub Kicinski 293841aed09cSJakub Kicinski /* Generate the branch for choosing add_imm vs add */ 293941aed09cSJakub Kicinski if (meta->xadd_maybe_16bit && meta->xadd_over_16bit) { 294041aed09cSJakub Kicinski swreg max_imm = imm_a(nfp_prog); 294141aed09cSJakub Kicinski 294241aed09cSJakub Kicinski wrp_immed(nfp_prog, max_imm, 0xffff); 294341aed09cSJakub Kicinski emit_alu(nfp_prog, reg_none(), 294441aed09cSJakub Kicinski max_imm, ALU_OP_SUB, reg_b(src_gpr)); 294541aed09cSJakub Kicinski emit_alu(nfp_prog, reg_none(), 294641aed09cSJakub Kicinski reg_imm(0), ALU_OP_SUB_C, reg_b(src_gpr + 1)); 294741aed09cSJakub Kicinski emit_br(nfp_prog, BR_BLO, full_add, meta->insn.off ? 2 : 0); 294841aed09cSJakub Kicinski /* defer for add */ 294941aed09cSJakub Kicinski } 295041aed09cSJakub Kicinski 2951dcb0c27fSJakub Kicinski /* If insn has an offset add to the address */ 2952dcb0c27fSJakub Kicinski if (!meta->insn.off) { 2953dcb0c27fSJakub Kicinski addra = reg_a(dst_gpr); 2954dcb0c27fSJakub Kicinski addrb = reg_b(dst_gpr + 1); 2955dcb0c27fSJakub Kicinski } else { 2956dcb0c27fSJakub Kicinski emit_alu(nfp_prog, imma_a(nfp_prog), 2957dcb0c27fSJakub Kicinski reg_a(dst_gpr), ALU_OP_ADD, off); 2958dcb0c27fSJakub Kicinski emit_alu(nfp_prog, imma_b(nfp_prog), 2959dcb0c27fSJakub Kicinski reg_a(dst_gpr + 1), ALU_OP_ADD_C, reg_imm(0)); 2960dcb0c27fSJakub Kicinski addra = imma_a(nfp_prog); 2961dcb0c27fSJakub Kicinski addrb = imma_b(nfp_prog); 2962dcb0c27fSJakub Kicinski } 2963dcb0c27fSJakub Kicinski 296441aed09cSJakub Kicinski /* Generate the add_imm if 16 bits are possible */ 296541aed09cSJakub Kicinski if (meta->xadd_maybe_16bit) { 296641aed09cSJakub Kicinski swreg prev_alu = imm_a(nfp_prog); 296741aed09cSJakub Kicinski 2968dcb0c27fSJakub Kicinski wrp_immed(nfp_prog, prev_alu, 2969dcb0c27fSJakub Kicinski FIELD_PREP(CMD_OVE_DATA, 2) | 2970dcb0c27fSJakub Kicinski CMD_OVE_LEN | 2971dcb0c27fSJakub Kicinski FIELD_PREP(CMD_OV_LEN, 0x8 | is64 << 2)); 2972dcb0c27fSJakub Kicinski wrp_reg_or_subpart(nfp_prog, prev_alu, reg_b(src_gpr), 2, 2); 2973dcb0c27fSJakub Kicinski emit_cmd_indir(nfp_prog, CMD_TGT_ADD_IMM, CMD_MODE_40b_BA, 0, 2974b556ddd9SJakub Kicinski addra, addrb, 0, CMD_CTX_NO_SWAP); 2975dcb0c27fSJakub Kicinski 297641aed09cSJakub Kicinski if (meta->xadd_over_16bit) 297741aed09cSJakub Kicinski emit_br(nfp_prog, BR_UNC, out, 0); 297841aed09cSJakub Kicinski } 297941aed09cSJakub Kicinski 298041aed09cSJakub Kicinski if (!nfp_prog_confirm_current_offset(nfp_prog, full_add)) 298141aed09cSJakub Kicinski return -EINVAL; 298241aed09cSJakub Kicinski 298341aed09cSJakub Kicinski /* Generate the add if 16 bits are not guaranteed */ 298441aed09cSJakub Kicinski if (meta->xadd_over_16bit) { 298541aed09cSJakub Kicinski emit_cmd(nfp_prog, CMD_TGT_ADD, CMD_MODE_40b_BA, 0, 298641aed09cSJakub Kicinski addra, addrb, is64 << 2, 298741aed09cSJakub Kicinski is64 ? CMD_CTX_SWAP_DEFER2 : CMD_CTX_SWAP_DEFER1); 298841aed09cSJakub Kicinski 298941aed09cSJakub Kicinski wrp_mov(nfp_prog, reg_xfer(0), reg_a(src_gpr)); 299041aed09cSJakub Kicinski if (is64) 299141aed09cSJakub Kicinski wrp_mov(nfp_prog, reg_xfer(1), reg_a(src_gpr + 1)); 299241aed09cSJakub Kicinski } 299341aed09cSJakub Kicinski 299441aed09cSJakub Kicinski if (!nfp_prog_confirm_current_offset(nfp_prog, out)) 299541aed09cSJakub Kicinski return -EINVAL; 299641aed09cSJakub Kicinski 2997dcb0c27fSJakub Kicinski return 0; 2998dcb0c27fSJakub Kicinski } 2999dcb0c27fSJakub Kicinski 3000dcb0c27fSJakub Kicinski static int mem_xadd4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 3001dcb0c27fSJakub Kicinski { 3002dcb0c27fSJakub Kicinski return mem_xadd(nfp_prog, meta, false); 3003dcb0c27fSJakub Kicinski } 3004dcb0c27fSJakub Kicinski 3005dcb0c27fSJakub Kicinski static int mem_xadd8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 3006dcb0c27fSJakub Kicinski { 3007dcb0c27fSJakub Kicinski return mem_xadd(nfp_prog, meta, true); 3008dcb0c27fSJakub Kicinski } 3009dcb0c27fSJakub Kicinski 3010d9ae7f2bSJakub Kicinski static int jump(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 3011d9ae7f2bSJakub Kicinski { 3012d9ae7f2bSJakub Kicinski emit_br(nfp_prog, BR_UNC, meta->insn.off, 0); 3013d9ae7f2bSJakub Kicinski 3014d9ae7f2bSJakub Kicinski return 0; 3015d9ae7f2bSJakub Kicinski } 3016d9ae7f2bSJakub Kicinski 3017d9ae7f2bSJakub Kicinski static int jeq_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 3018d9ae7f2bSJakub Kicinski { 3019d9ae7f2bSJakub Kicinski const struct bpf_insn *insn = &meta->insn; 3020d9ae7f2bSJakub Kicinski u64 imm = insn->imm; /* sign extend */ 3021b3f868dfSJakub Kicinski swreg or1, or2, tmp_reg; 3022b3f868dfSJakub Kicinski 3023b3f868dfSJakub Kicinski or1 = reg_a(insn->dst_reg * 2); 3024b3f868dfSJakub Kicinski or2 = reg_b(insn->dst_reg * 2 + 1); 3025d9ae7f2bSJakub Kicinski 3026d9ae7f2bSJakub Kicinski if (imm & ~0U) { 3027d9ae7f2bSJakub Kicinski tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog)); 3028d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, imm_a(nfp_prog), 3029d9ae7f2bSJakub Kicinski reg_a(insn->dst_reg * 2), ALU_OP_XOR, tmp_reg); 3030d9ae7f2bSJakub Kicinski or1 = imm_a(nfp_prog); 3031d9ae7f2bSJakub Kicinski } 3032d9ae7f2bSJakub Kicinski 3033d9ae7f2bSJakub Kicinski if (imm >> 32) { 3034d9ae7f2bSJakub Kicinski tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog)); 3035d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, imm_b(nfp_prog), 3036d9ae7f2bSJakub Kicinski reg_a(insn->dst_reg * 2 + 1), ALU_OP_XOR, tmp_reg); 3037d9ae7f2bSJakub Kicinski or2 = imm_b(nfp_prog); 3038d9ae7f2bSJakub Kicinski } 3039d9ae7f2bSJakub Kicinski 3040d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_none(), or1, ALU_OP_OR, or2); 3041d9ae7f2bSJakub Kicinski emit_br(nfp_prog, BR_BEQ, insn->off, 0); 3042d9ae7f2bSJakub Kicinski 3043d9ae7f2bSJakub Kicinski return 0; 3044d9ae7f2bSJakub Kicinski } 3045d9ae7f2bSJakub Kicinski 3046d9ae7f2bSJakub Kicinski static int jset_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 3047d9ae7f2bSJakub Kicinski { 3048d9ae7f2bSJakub Kicinski const struct bpf_insn *insn = &meta->insn; 3049d9ae7f2bSJakub Kicinski u64 imm = insn->imm; /* sign extend */ 30504987eaccSJakub Kicinski u8 dst_gpr = insn->dst_reg * 2; 3051b3f868dfSJakub Kicinski swreg tmp_reg; 3052d9ae7f2bSJakub Kicinski 3053d9ae7f2bSJakub Kicinski tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog)); 30544987eaccSJakub Kicinski emit_alu(nfp_prog, imm_b(nfp_prog), 30554987eaccSJakub Kicinski reg_a(dst_gpr), ALU_OP_AND, tmp_reg); 30564987eaccSJakub Kicinski /* Upper word of the mask can only be 0 or ~0 from sign extension, 30574987eaccSJakub Kicinski * so either ignore it or OR the whole thing in. 30584987eaccSJakub Kicinski */ 30594987eaccSJakub Kicinski if (imm >> 32) 3060d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_none(), 30614987eaccSJakub Kicinski reg_a(dst_gpr + 1), ALU_OP_OR, imm_b(nfp_prog)); 3062d9ae7f2bSJakub Kicinski emit_br(nfp_prog, BR_BNE, insn->off, 0); 3063d9ae7f2bSJakub Kicinski 3064d9ae7f2bSJakub Kicinski return 0; 3065d9ae7f2bSJakub Kicinski } 3066d9ae7f2bSJakub Kicinski 3067d9ae7f2bSJakub Kicinski static int jne_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 3068d9ae7f2bSJakub Kicinski { 3069d9ae7f2bSJakub Kicinski const struct bpf_insn *insn = &meta->insn; 3070d9ae7f2bSJakub Kicinski u64 imm = insn->imm; /* sign extend */ 3071b3f868dfSJakub Kicinski swreg tmp_reg; 3072d9ae7f2bSJakub Kicinski 3073d9ae7f2bSJakub Kicinski if (!imm) { 3074d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_none(), reg_a(insn->dst_reg * 2), 3075d9ae7f2bSJakub Kicinski ALU_OP_OR, reg_b(insn->dst_reg * 2 + 1)); 3076d9ae7f2bSJakub Kicinski emit_br(nfp_prog, BR_BNE, insn->off, 0); 307782837370SJakub Kicinski return 0; 3078d9ae7f2bSJakub Kicinski } 3079d9ae7f2bSJakub Kicinski 3080d9ae7f2bSJakub Kicinski tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog)); 3081d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_none(), 3082d9ae7f2bSJakub Kicinski reg_a(insn->dst_reg * 2), ALU_OP_XOR, tmp_reg); 3083d9ae7f2bSJakub Kicinski emit_br(nfp_prog, BR_BNE, insn->off, 0); 3084d9ae7f2bSJakub Kicinski 3085d9ae7f2bSJakub Kicinski tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog)); 3086d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_none(), 3087d9ae7f2bSJakub Kicinski reg_a(insn->dst_reg * 2 + 1), ALU_OP_XOR, tmp_reg); 3088d9ae7f2bSJakub Kicinski emit_br(nfp_prog, BR_BNE, insn->off, 0); 3089d9ae7f2bSJakub Kicinski 3090d9ae7f2bSJakub Kicinski return 0; 3091d9ae7f2bSJakub Kicinski } 3092d9ae7f2bSJakub Kicinski 3093d9ae7f2bSJakub Kicinski static int jeq_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 3094d9ae7f2bSJakub Kicinski { 3095d9ae7f2bSJakub Kicinski const struct bpf_insn *insn = &meta->insn; 3096d9ae7f2bSJakub Kicinski 3097d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, imm_a(nfp_prog), reg_a(insn->dst_reg * 2), 3098d9ae7f2bSJakub Kicinski ALU_OP_XOR, reg_b(insn->src_reg * 2)); 3099d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, imm_b(nfp_prog), reg_a(insn->dst_reg * 2 + 1), 3100d9ae7f2bSJakub Kicinski ALU_OP_XOR, reg_b(insn->src_reg * 2 + 1)); 3101d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_none(), 3102d9ae7f2bSJakub Kicinski imm_a(nfp_prog), ALU_OP_OR, imm_b(nfp_prog)); 3103d9ae7f2bSJakub Kicinski emit_br(nfp_prog, BR_BEQ, insn->off, 0); 3104d9ae7f2bSJakub Kicinski 3105d9ae7f2bSJakub Kicinski return 0; 3106d9ae7f2bSJakub Kicinski } 3107d9ae7f2bSJakub Kicinski 3108d9ae7f2bSJakub Kicinski static int jset_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 3109d9ae7f2bSJakub Kicinski { 3110d9ae7f2bSJakub Kicinski return wrp_test_reg(nfp_prog, meta, ALU_OP_AND, BR_BNE); 3111d9ae7f2bSJakub Kicinski } 3112d9ae7f2bSJakub Kicinski 3113d9ae7f2bSJakub Kicinski static int jne_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 3114d9ae7f2bSJakub Kicinski { 3115d9ae7f2bSJakub Kicinski return wrp_test_reg(nfp_prog, meta, ALU_OP_XOR, BR_BNE); 3116d9ae7f2bSJakub Kicinski } 3117d9ae7f2bSJakub Kicinski 3118389f263bSQuentin Monnet static int 3119389f263bSQuentin Monnet bpf_to_bpf_call(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 3120389f263bSQuentin Monnet { 3121bdf4c66fSQuentin Monnet u32 ret_tgt, stack_depth, offset_br; 3122389f263bSQuentin Monnet swreg tmp_reg; 3123389f263bSQuentin Monnet 3124389f263bSQuentin Monnet stack_depth = round_up(nfp_prog->stack_frame_depth, STACK_FRAME_ALIGN); 3125389f263bSQuentin Monnet /* Space for saving the return address is accounted for by the callee, 3126389f263bSQuentin Monnet * so stack_depth can be zero for the main function. 3127389f263bSQuentin Monnet */ 3128389f263bSQuentin Monnet if (stack_depth) { 3129389f263bSQuentin Monnet tmp_reg = ur_load_imm_any(nfp_prog, stack_depth, 3130389f263bSQuentin Monnet stack_imm(nfp_prog)); 3131389f263bSQuentin Monnet emit_alu(nfp_prog, stack_reg(nfp_prog), 3132389f263bSQuentin Monnet stack_reg(nfp_prog), ALU_OP_ADD, tmp_reg); 3133389f263bSQuentin Monnet emit_csr_wr(nfp_prog, stack_reg(nfp_prog), 3134389f263bSQuentin Monnet NFP_CSR_ACT_LM_ADDR0); 3135389f263bSQuentin Monnet } 3136389f263bSQuentin Monnet 313744549623SQuentin Monnet /* Two cases for jumping to the callee: 313844549623SQuentin Monnet * 313944549623SQuentin Monnet * - If callee uses and needs to save R6~R9 then: 3140389f263bSQuentin Monnet * 1. Put the start offset of the callee into imm_b(). This will 3141389f263bSQuentin Monnet * require a fixup step, as we do not necessarily know this 3142389f263bSQuentin Monnet * address yet. 3143389f263bSQuentin Monnet * 2. Put the return address from the callee to the caller into 3144389f263bSQuentin Monnet * register ret_reg(). 3145389f263bSQuentin Monnet * 3. (After defer slots are consumed) Jump to the subroutine that 3146389f263bSQuentin Monnet * pushes the registers to the stack. 3147389f263bSQuentin Monnet * The subroutine acts as a trampoline, and returns to the address in 3148389f263bSQuentin Monnet * imm_b(), i.e. jumps to the callee. 3149389f263bSQuentin Monnet * 315044549623SQuentin Monnet * - If callee does not need to save R6~R9 then just load return 315144549623SQuentin Monnet * address to the caller in ret_reg(), and jump to the callee 315244549623SQuentin Monnet * directly. 315344549623SQuentin Monnet * 3154389f263bSQuentin Monnet * Using ret_reg() to pass the return address to the callee is set here 3155389f263bSQuentin Monnet * as a convention. The callee can then push this address onto its 3156389f263bSQuentin Monnet * stack frame in its prologue. The advantages of passing the return 3157389f263bSQuentin Monnet * address through ret_reg(), instead of pushing it to the stack right 3158389f263bSQuentin Monnet * here, are the following: 3159389f263bSQuentin Monnet * - It looks cleaner. 3160389f263bSQuentin Monnet * - If the called function is called multiple time, we get a lower 3161389f263bSQuentin Monnet * program size. 3162389f263bSQuentin Monnet * - We save two no-op instructions that should be added just before 3163389f263bSQuentin Monnet * the emit_br() when stack depth is not null otherwise. 3164389f263bSQuentin Monnet * - If we ever find a register to hold the return address during whole 3165389f263bSQuentin Monnet * execution of the callee, we will not have to push the return 3166389f263bSQuentin Monnet * address to the stack for leaf functions. 3167389f263bSQuentin Monnet */ 316844549623SQuentin Monnet if (!meta->jmp_dst) { 316944549623SQuentin Monnet pr_err("BUG: BPF-to-BPF call has no destination recorded\n"); 317044549623SQuentin Monnet return -ELOOP; 317144549623SQuentin Monnet } 317244549623SQuentin Monnet if (nfp_prog->subprog[meta->jmp_dst->subprog_idx].needs_reg_push) { 3173389f263bSQuentin Monnet ret_tgt = nfp_prog_current_offset(nfp_prog) + 3; 3174389f263bSQuentin Monnet emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2, 3175389f263bSQuentin Monnet RELO_BR_GO_CALL_PUSH_REGS); 3176bdf4c66fSQuentin Monnet offset_br = nfp_prog_current_offset(nfp_prog); 3177389f263bSQuentin Monnet wrp_immed_relo(nfp_prog, imm_b(nfp_prog), 0, RELO_IMMED_REL); 317844549623SQuentin Monnet } else { 317944549623SQuentin Monnet ret_tgt = nfp_prog_current_offset(nfp_prog) + 2; 318044549623SQuentin Monnet emit_br(nfp_prog, BR_UNC, meta->n + 1 + meta->insn.imm, 1); 318144549623SQuentin Monnet offset_br = nfp_prog_current_offset(nfp_prog); 318244549623SQuentin Monnet } 3183389f263bSQuentin Monnet wrp_immed_relo(nfp_prog, ret_reg(nfp_prog), ret_tgt, RELO_IMMED_REL); 3184389f263bSQuentin Monnet 3185389f263bSQuentin Monnet if (!nfp_prog_confirm_current_offset(nfp_prog, ret_tgt)) 3186389f263bSQuentin Monnet return -EINVAL; 3187389f263bSQuentin Monnet 3188389f263bSQuentin Monnet if (stack_depth) { 3189389f263bSQuentin Monnet tmp_reg = ur_load_imm_any(nfp_prog, stack_depth, 3190389f263bSQuentin Monnet stack_imm(nfp_prog)); 3191389f263bSQuentin Monnet emit_alu(nfp_prog, stack_reg(nfp_prog), 3192389f263bSQuentin Monnet stack_reg(nfp_prog), ALU_OP_SUB, tmp_reg); 3193389f263bSQuentin Monnet emit_csr_wr(nfp_prog, stack_reg(nfp_prog), 3194389f263bSQuentin Monnet NFP_CSR_ACT_LM_ADDR0); 3195389f263bSQuentin Monnet wrp_nops(nfp_prog, 3); 3196389f263bSQuentin Monnet } 3197389f263bSQuentin Monnet 3198bdf4c66fSQuentin Monnet meta->num_insns_after_br = nfp_prog_current_offset(nfp_prog); 3199bdf4c66fSQuentin Monnet meta->num_insns_after_br -= offset_br; 3200bdf4c66fSQuentin Monnet 3201389f263bSQuentin Monnet return 0; 3202389f263bSQuentin Monnet } 3203389f263bSQuentin Monnet 3204389f263bSQuentin Monnet static int helper_call(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 32052cb230bdSJakub Kicinski { 32062cb230bdSJakub Kicinski switch (meta->insn.imm) { 32070d49eaf4SJakub Kicinski case BPF_FUNC_xdp_adjust_head: 32080d49eaf4SJakub Kicinski return adjust_head(nfp_prog, meta); 32090c261593SJakub Kicinski case BPF_FUNC_xdp_adjust_tail: 32100c261593SJakub Kicinski return adjust_tail(nfp_prog, meta); 321177a3d311SJakub Kicinski case BPF_FUNC_map_lookup_elem: 321244d65a47SJakub Kicinski case BPF_FUNC_map_update_elem: 3213bfee64deSJakub Kicinski case BPF_FUNC_map_delete_elem: 3214fc448497SJakub Kicinski return map_call_stack_common(nfp_prog, meta); 3215df4a37d8SJakub Kicinski case BPF_FUNC_get_prandom_u32: 3216df4a37d8SJakub Kicinski return nfp_get_prandom_u32(nfp_prog, meta); 32179816dd35SJakub Kicinski case BPF_FUNC_perf_event_output: 32189816dd35SJakub Kicinski return nfp_perf_event_output(nfp_prog, meta); 32192cb230bdSJakub Kicinski default: 32202cb230bdSJakub Kicinski WARN_ONCE(1, "verifier allowed unsupported function\n"); 32212cb230bdSJakub Kicinski return -EOPNOTSUPP; 32222cb230bdSJakub Kicinski } 32232cb230bdSJakub Kicinski } 32242cb230bdSJakub Kicinski 3225389f263bSQuentin Monnet static int call(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 3226389f263bSQuentin Monnet { 3227389f263bSQuentin Monnet if (is_mbpf_pseudo_call(meta)) 3228389f263bSQuentin Monnet return bpf_to_bpf_call(nfp_prog, meta); 3229389f263bSQuentin Monnet else 3230389f263bSQuentin Monnet return helper_call(nfp_prog, meta); 3231389f263bSQuentin Monnet } 3232389f263bSQuentin Monnet 3233389f263bSQuentin Monnet static bool nfp_is_main_function(struct nfp_insn_meta *meta) 3234389f263bSQuentin Monnet { 3235389f263bSQuentin Monnet return meta->subprog_idx == 0; 3236389f263bSQuentin Monnet } 3237389f263bSQuentin Monnet 3238d9ae7f2bSJakub Kicinski static int goto_out(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 3239d9ae7f2bSJakub Kicinski { 3240e84797feSJakub Kicinski emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 0, RELO_BR_GO_OUT); 3241d9ae7f2bSJakub Kicinski 3242d9ae7f2bSJakub Kicinski return 0; 3243d9ae7f2bSJakub Kicinski } 3244d9ae7f2bSJakub Kicinski 3245389f263bSQuentin Monnet static int 3246389f263bSQuentin Monnet nfp_subprog_epilogue(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 3247389f263bSQuentin Monnet { 324844549623SQuentin Monnet if (nfp_prog->subprog[meta->subprog_idx].needs_reg_push) { 3249389f263bSQuentin Monnet /* Pop R6~R9 to the stack via related subroutine. 325044549623SQuentin Monnet * We loaded the return address to the caller into ret_reg(). 325144549623SQuentin Monnet * This means that the subroutine does not come back here, we 325244549623SQuentin Monnet * make it jump back to the subprogram caller directly! 3253389f263bSQuentin Monnet */ 3254389f263bSQuentin Monnet emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 1, 3255389f263bSQuentin Monnet RELO_BR_GO_CALL_POP_REGS); 325644549623SQuentin Monnet /* Pop return address from the stack. */ 3257389f263bSQuentin Monnet wrp_mov(nfp_prog, ret_reg(nfp_prog), reg_lm(0, 0)); 325844549623SQuentin Monnet } else { 325944549623SQuentin Monnet /* Pop return address from the stack. */ 326044549623SQuentin Monnet wrp_mov(nfp_prog, ret_reg(nfp_prog), reg_lm(0, 0)); 326144549623SQuentin Monnet /* Jump back to caller if no callee-saved registers were used 326244549623SQuentin Monnet * by the subprogram. 326344549623SQuentin Monnet */ 326444549623SQuentin Monnet emit_rtn(nfp_prog, ret_reg(nfp_prog), 0); 326544549623SQuentin Monnet } 3266389f263bSQuentin Monnet 3267389f263bSQuentin Monnet return 0; 3268389f263bSQuentin Monnet } 3269389f263bSQuentin Monnet 3270389f263bSQuentin Monnet static int jmp_exit(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 3271389f263bSQuentin Monnet { 3272389f263bSQuentin Monnet if (nfp_is_main_function(meta)) 3273389f263bSQuentin Monnet return goto_out(nfp_prog, meta); 3274389f263bSQuentin Monnet else 3275389f263bSQuentin Monnet return nfp_subprog_epilogue(nfp_prog, meta); 3276389f263bSQuentin Monnet } 3277389f263bSQuentin Monnet 3278d9ae7f2bSJakub Kicinski static const instr_cb_t instr_cb[256] = { 3279d9ae7f2bSJakub Kicinski [BPF_ALU64 | BPF_MOV | BPF_X] = mov_reg64, 3280d9ae7f2bSJakub Kicinski [BPF_ALU64 | BPF_MOV | BPF_K] = mov_imm64, 3281d9ae7f2bSJakub Kicinski [BPF_ALU64 | BPF_XOR | BPF_X] = xor_reg64, 3282d9ae7f2bSJakub Kicinski [BPF_ALU64 | BPF_XOR | BPF_K] = xor_imm64, 3283d9ae7f2bSJakub Kicinski [BPF_ALU64 | BPF_AND | BPF_X] = and_reg64, 3284d9ae7f2bSJakub Kicinski [BPF_ALU64 | BPF_AND | BPF_K] = and_imm64, 3285d9ae7f2bSJakub Kicinski [BPF_ALU64 | BPF_OR | BPF_X] = or_reg64, 3286d9ae7f2bSJakub Kicinski [BPF_ALU64 | BPF_OR | BPF_K] = or_imm64, 3287d9ae7f2bSJakub Kicinski [BPF_ALU64 | BPF_ADD | BPF_X] = add_reg64, 3288d9ae7f2bSJakub Kicinski [BPF_ALU64 | BPF_ADD | BPF_K] = add_imm64, 3289d9ae7f2bSJakub Kicinski [BPF_ALU64 | BPF_SUB | BPF_X] = sub_reg64, 3290d9ae7f2bSJakub Kicinski [BPF_ALU64 | BPF_SUB | BPF_K] = sub_imm64, 3291d3d23fdbSJiong Wang [BPF_ALU64 | BPF_MUL | BPF_X] = mul_reg64, 3292d3d23fdbSJiong Wang [BPF_ALU64 | BPF_MUL | BPF_K] = mul_imm64, 32932a952b03SJiong Wang [BPF_ALU64 | BPF_DIV | BPF_X] = div_reg64, 32942a952b03SJiong Wang [BPF_ALU64 | BPF_DIV | BPF_K] = div_imm64, 3295254ef4d7SJiong Wang [BPF_ALU64 | BPF_NEG] = neg_reg64, 3296991f5b36SJiong Wang [BPF_ALU64 | BPF_LSH | BPF_X] = shl_reg64, 3297d9ae7f2bSJakub Kicinski [BPF_ALU64 | BPF_LSH | BPF_K] = shl_imm64, 3298991f5b36SJiong Wang [BPF_ALU64 | BPF_RSH | BPF_X] = shr_reg64, 3299d9ae7f2bSJakub Kicinski [BPF_ALU64 | BPF_RSH | BPF_K] = shr_imm64, 3300c217abccSJiong Wang [BPF_ALU64 | BPF_ARSH | BPF_X] = ashr_reg64, 3301f43d0f17SJiong Wang [BPF_ALU64 | BPF_ARSH | BPF_K] = ashr_imm64, 3302d9ae7f2bSJakub Kicinski [BPF_ALU | BPF_MOV | BPF_X] = mov_reg, 3303d9ae7f2bSJakub Kicinski [BPF_ALU | BPF_MOV | BPF_K] = mov_imm, 3304d9ae7f2bSJakub Kicinski [BPF_ALU | BPF_XOR | BPF_X] = xor_reg, 3305d9ae7f2bSJakub Kicinski [BPF_ALU | BPF_XOR | BPF_K] = xor_imm, 3306d9ae7f2bSJakub Kicinski [BPF_ALU | BPF_AND | BPF_X] = and_reg, 3307d9ae7f2bSJakub Kicinski [BPF_ALU | BPF_AND | BPF_K] = and_imm, 3308d9ae7f2bSJakub Kicinski [BPF_ALU | BPF_OR | BPF_X] = or_reg, 3309d9ae7f2bSJakub Kicinski [BPF_ALU | BPF_OR | BPF_K] = or_imm, 3310d9ae7f2bSJakub Kicinski [BPF_ALU | BPF_ADD | BPF_X] = add_reg, 3311d9ae7f2bSJakub Kicinski [BPF_ALU | BPF_ADD | BPF_K] = add_imm, 3312d9ae7f2bSJakub Kicinski [BPF_ALU | BPF_SUB | BPF_X] = sub_reg, 3313d9ae7f2bSJakub Kicinski [BPF_ALU | BPF_SUB | BPF_K] = sub_imm, 3314d3d23fdbSJiong Wang [BPF_ALU | BPF_MUL | BPF_X] = mul_reg, 3315d3d23fdbSJiong Wang [BPF_ALU | BPF_MUL | BPF_K] = mul_imm, 33162a952b03SJiong Wang [BPF_ALU | BPF_DIV | BPF_X] = div_reg, 33172a952b03SJiong Wang [BPF_ALU | BPF_DIV | BPF_K] = div_imm, 3318254ef4d7SJiong Wang [BPF_ALU | BPF_NEG] = neg_reg, 3319d9ae7f2bSJakub Kicinski [BPF_ALU | BPF_LSH | BPF_K] = shl_imm, 332084708c13SJiong Wang [BPF_ALU | BPF_ARSH | BPF_X] = ashr_reg, 332184708c13SJiong Wang [BPF_ALU | BPF_ARSH | BPF_K] = ashr_imm, 33223119d1fdSJakub Kicinski [BPF_ALU | BPF_END | BPF_X] = end_reg32, 3323d9ae7f2bSJakub Kicinski [BPF_LD | BPF_IMM | BPF_DW] = imm_ld8, 3324d9ae7f2bSJakub Kicinski [BPF_LD | BPF_ABS | BPF_B] = data_ld1, 3325d9ae7f2bSJakub Kicinski [BPF_LD | BPF_ABS | BPF_H] = data_ld2, 3326d9ae7f2bSJakub Kicinski [BPF_LD | BPF_ABS | BPF_W] = data_ld4, 3327d9ae7f2bSJakub Kicinski [BPF_LD | BPF_IND | BPF_B] = data_ind_ld1, 3328d9ae7f2bSJakub Kicinski [BPF_LD | BPF_IND | BPF_H] = data_ind_ld2, 3329d9ae7f2bSJakub Kicinski [BPF_LD | BPF_IND | BPF_W] = data_ind_ld4, 33302ca71441SJakub Kicinski [BPF_LDX | BPF_MEM | BPF_B] = mem_ldx1, 33312ca71441SJakub Kicinski [BPF_LDX | BPF_MEM | BPF_H] = mem_ldx2, 3332d9ae7f2bSJakub Kicinski [BPF_LDX | BPF_MEM | BPF_W] = mem_ldx4, 33332ca71441SJakub Kicinski [BPF_LDX | BPF_MEM | BPF_DW] = mem_ldx8, 3334e663fe38SJakub Kicinski [BPF_STX | BPF_MEM | BPF_B] = mem_stx1, 3335e663fe38SJakub Kicinski [BPF_STX | BPF_MEM | BPF_H] = mem_stx2, 3336d9ae7f2bSJakub Kicinski [BPF_STX | BPF_MEM | BPF_W] = mem_stx4, 3337e663fe38SJakub Kicinski [BPF_STX | BPF_MEM | BPF_DW] = mem_stx8, 3338dcb0c27fSJakub Kicinski [BPF_STX | BPF_XADD | BPF_W] = mem_xadd4, 3339dcb0c27fSJakub Kicinski [BPF_STX | BPF_XADD | BPF_DW] = mem_xadd8, 3340e663fe38SJakub Kicinski [BPF_ST | BPF_MEM | BPF_B] = mem_st1, 3341e663fe38SJakub Kicinski [BPF_ST | BPF_MEM | BPF_H] = mem_st2, 3342e663fe38SJakub Kicinski [BPF_ST | BPF_MEM | BPF_W] = mem_st4, 3343e663fe38SJakub Kicinski [BPF_ST | BPF_MEM | BPF_DW] = mem_st8, 3344d9ae7f2bSJakub Kicinski [BPF_JMP | BPF_JA | BPF_K] = jump, 3345d9ae7f2bSJakub Kicinski [BPF_JMP | BPF_JEQ | BPF_K] = jeq_imm, 334661dd8f00SJakub Kicinski [BPF_JMP | BPF_JGT | BPF_K] = cmp_imm, 334761dd8f00SJakub Kicinski [BPF_JMP | BPF_JGE | BPF_K] = cmp_imm, 334861dd8f00SJakub Kicinski [BPF_JMP | BPF_JLT | BPF_K] = cmp_imm, 334961dd8f00SJakub Kicinski [BPF_JMP | BPF_JLE | BPF_K] = cmp_imm, 335061dd8f00SJakub Kicinski [BPF_JMP | BPF_JSGT | BPF_K] = cmp_imm, 335161dd8f00SJakub Kicinski [BPF_JMP | BPF_JSGE | BPF_K] = cmp_imm, 335261dd8f00SJakub Kicinski [BPF_JMP | BPF_JSLT | BPF_K] = cmp_imm, 335361dd8f00SJakub Kicinski [BPF_JMP | BPF_JSLE | BPF_K] = cmp_imm, 3354d9ae7f2bSJakub Kicinski [BPF_JMP | BPF_JSET | BPF_K] = jset_imm, 3355d9ae7f2bSJakub Kicinski [BPF_JMP | BPF_JNE | BPF_K] = jne_imm, 3356d9ae7f2bSJakub Kicinski [BPF_JMP | BPF_JEQ | BPF_X] = jeq_reg, 335761dd8f00SJakub Kicinski [BPF_JMP | BPF_JGT | BPF_X] = cmp_reg, 335861dd8f00SJakub Kicinski [BPF_JMP | BPF_JGE | BPF_X] = cmp_reg, 335961dd8f00SJakub Kicinski [BPF_JMP | BPF_JLT | BPF_X] = cmp_reg, 336061dd8f00SJakub Kicinski [BPF_JMP | BPF_JLE | BPF_X] = cmp_reg, 336161dd8f00SJakub Kicinski [BPF_JMP | BPF_JSGT | BPF_X] = cmp_reg, 336261dd8f00SJakub Kicinski [BPF_JMP | BPF_JSGE | BPF_X] = cmp_reg, 336361dd8f00SJakub Kicinski [BPF_JMP | BPF_JSLT | BPF_X] = cmp_reg, 336461dd8f00SJakub Kicinski [BPF_JMP | BPF_JSLE | BPF_X] = cmp_reg, 3365d9ae7f2bSJakub Kicinski [BPF_JMP | BPF_JSET | BPF_X] = jset_reg, 3366d9ae7f2bSJakub Kicinski [BPF_JMP | BPF_JNE | BPF_X] = jne_reg, 33672cb230bdSJakub Kicinski [BPF_JMP | BPF_CALL] = call, 3368389f263bSQuentin Monnet [BPF_JMP | BPF_EXIT] = jmp_exit, 3369d9ae7f2bSJakub Kicinski }; 3370d9ae7f2bSJakub Kicinski 3371d9ae7f2bSJakub Kicinski /* --- Assembler logic --- */ 33722178f3f0SQuentin Monnet static int 33732178f3f0SQuentin Monnet nfp_fixup_immed_relo(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 33742178f3f0SQuentin Monnet struct nfp_insn_meta *jmp_dst, u32 br_idx) 33752178f3f0SQuentin Monnet { 33762178f3f0SQuentin Monnet if (immed_get_value(nfp_prog->prog[br_idx + 1])) { 33772178f3f0SQuentin Monnet pr_err("BUG: failed to fix up callee register saving\n"); 33782178f3f0SQuentin Monnet return -EINVAL; 33792178f3f0SQuentin Monnet } 33802178f3f0SQuentin Monnet 33812178f3f0SQuentin Monnet immed_set_value(&nfp_prog->prog[br_idx + 1], jmp_dst->off); 33822178f3f0SQuentin Monnet 33832178f3f0SQuentin Monnet return 0; 33842178f3f0SQuentin Monnet } 33852178f3f0SQuentin Monnet 3386d9ae7f2bSJakub Kicinski static int nfp_fixup_branches(struct nfp_prog *nfp_prog) 3387d9ae7f2bSJakub Kicinski { 33885b674140SJiong Wang struct nfp_insn_meta *meta, *jmp_dst; 3389854dc87dSJiong Wang u32 idx, br_idx; 33902178f3f0SQuentin Monnet int err; 3391d9ae7f2bSJakub Kicinski 3392854dc87dSJiong Wang list_for_each_entry(meta, &nfp_prog->insns, l) { 3393d9ae7f2bSJakub Kicinski if (meta->skip) 3394d9ae7f2bSJakub Kicinski continue; 3395d9ae7f2bSJakub Kicinski if (BPF_CLASS(meta->insn.code) != BPF_JMP) 3396d9ae7f2bSJakub Kicinski continue; 3397bdf4c66fSQuentin Monnet if (meta->insn.code == (BPF_JMP | BPF_EXIT) && 3398bdf4c66fSQuentin Monnet !nfp_is_main_function(meta)) 3399bdf4c66fSQuentin Monnet continue; 3400bdf4c66fSQuentin Monnet if (is_mbpf_helper_call(meta)) 3401bdf4c66fSQuentin Monnet continue; 3402d9ae7f2bSJakub Kicinski 34035b674140SJiong Wang if (list_is_last(&meta->l, &nfp_prog->insns)) 34042314fe9eSJakub Kicinski br_idx = nfp_prog->last_bpf_off; 34055b674140SJiong Wang else 34062314fe9eSJakub Kicinski br_idx = list_next_entry(meta, l)->off - 1; 3407854dc87dSJiong Wang 3408bdf4c66fSQuentin Monnet /* For BPF-to-BPF function call, a stack adjustment sequence is 3409bdf4c66fSQuentin Monnet * generated after the return instruction. Therefore, we must 3410bdf4c66fSQuentin Monnet * withdraw the length of this sequence to have br_idx pointing 3411bdf4c66fSQuentin Monnet * to where the "branch" NFP instruction is expected to be. 3412bdf4c66fSQuentin Monnet */ 3413bdf4c66fSQuentin Monnet if (is_mbpf_pseudo_call(meta)) 3414bdf4c66fSQuentin Monnet br_idx -= meta->num_insns_after_br; 3415bdf4c66fSQuentin Monnet 3416d9ae7f2bSJakub Kicinski if (!nfp_is_br(nfp_prog->prog[br_idx])) { 3417d9ae7f2bSJakub Kicinski pr_err("Fixup found block not ending in branch %d %02x %016llx!!\n", 3418d9ae7f2bSJakub Kicinski br_idx, meta->insn.code, nfp_prog->prog[br_idx]); 3419d9ae7f2bSJakub Kicinski return -ELOOP; 3420d9ae7f2bSJakub Kicinski } 3421bdf4c66fSQuentin Monnet 3422bdf4c66fSQuentin Monnet if (meta->insn.code == (BPF_JMP | BPF_EXIT)) 3423bdf4c66fSQuentin Monnet continue; 3424bdf4c66fSQuentin Monnet 3425d9ae7f2bSJakub Kicinski /* Leave special branches for later */ 34262314fe9eSJakub Kicinski if (FIELD_GET(OP_RELO_TYPE, nfp_prog->prog[br_idx]) != 34272178f3f0SQuentin Monnet RELO_BR_REL && !is_mbpf_pseudo_call(meta)) 3428d9ae7f2bSJakub Kicinski continue; 3429d9ae7f2bSJakub Kicinski 34305b674140SJiong Wang if (!meta->jmp_dst) { 34315b674140SJiong Wang pr_err("Non-exit jump doesn't have destination info recorded!!\n"); 3432d9ae7f2bSJakub Kicinski return -ELOOP; 3433d9ae7f2bSJakub Kicinski } 3434d9ae7f2bSJakub Kicinski 34355b674140SJiong Wang jmp_dst = meta->jmp_dst; 3436854dc87dSJiong Wang 34375b674140SJiong Wang if (jmp_dst->skip) { 3438d9ae7f2bSJakub Kicinski pr_err("Branch landing on removed instruction!!\n"); 3439d9ae7f2bSJakub Kicinski return -ELOOP; 3440d9ae7f2bSJakub Kicinski } 3441d9ae7f2bSJakub Kicinski 344244549623SQuentin Monnet if (is_mbpf_pseudo_call(meta) && 344344549623SQuentin Monnet nfp_prog->subprog[jmp_dst->subprog_idx].needs_reg_push) { 34442178f3f0SQuentin Monnet err = nfp_fixup_immed_relo(nfp_prog, meta, 34452178f3f0SQuentin Monnet jmp_dst, br_idx); 34462178f3f0SQuentin Monnet if (err) 34472178f3f0SQuentin Monnet return err; 34482178f3f0SQuentin Monnet } 34492178f3f0SQuentin Monnet 34502178f3f0SQuentin Monnet if (FIELD_GET(OP_RELO_TYPE, nfp_prog->prog[br_idx]) != 34512178f3f0SQuentin Monnet RELO_BR_REL) 34522178f3f0SQuentin Monnet continue; 34532178f3f0SQuentin Monnet 34542314fe9eSJakub Kicinski for (idx = meta->off; idx <= br_idx; idx++) { 3455d9ae7f2bSJakub Kicinski if (!nfp_is_br(nfp_prog->prog[idx])) 3456d9ae7f2bSJakub Kicinski continue; 34575b674140SJiong Wang br_set_offset(&nfp_prog->prog[idx], jmp_dst->off); 3458d9ae7f2bSJakub Kicinski } 3459d9ae7f2bSJakub Kicinski } 3460d9ae7f2bSJakub Kicinski 3461d9ae7f2bSJakub Kicinski return 0; 3462d9ae7f2bSJakub Kicinski } 3463d9ae7f2bSJakub Kicinski 3464d9ae7f2bSJakub Kicinski static void nfp_intro(struct nfp_prog *nfp_prog) 3465d9ae7f2bSJakub Kicinski { 346618e53b6cSJakub Kicinski wrp_immed(nfp_prog, plen_reg(nfp_prog), GENMASK(13, 0)); 346718e53b6cSJakub Kicinski emit_alu(nfp_prog, plen_reg(nfp_prog), 346818e53b6cSJakub Kicinski plen_reg(nfp_prog), ALU_OP_AND, pv_len(nfp_prog)); 3469d9ae7f2bSJakub Kicinski } 3470d9ae7f2bSJakub Kicinski 3471389f263bSQuentin Monnet static void 3472389f263bSQuentin Monnet nfp_subprog_prologue(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 3473389f263bSQuentin Monnet { 3474389f263bSQuentin Monnet /* Save return address into the stack. */ 3475389f263bSQuentin Monnet wrp_mov(nfp_prog, reg_lm(0, 0), ret_reg(nfp_prog)); 3476389f263bSQuentin Monnet } 3477389f263bSQuentin Monnet 3478389f263bSQuentin Monnet static void 3479389f263bSQuentin Monnet nfp_start_subprog(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 3480389f263bSQuentin Monnet { 3481389f263bSQuentin Monnet unsigned int depth = nfp_prog->subprog[meta->subprog_idx].stack_depth; 3482389f263bSQuentin Monnet 3483389f263bSQuentin Monnet nfp_prog->stack_frame_depth = round_up(depth, 4); 3484389f263bSQuentin Monnet nfp_subprog_prologue(nfp_prog, meta); 3485389f263bSQuentin Monnet } 3486389f263bSQuentin Monnet 3487389f263bSQuentin Monnet bool nfp_is_subprog_start(struct nfp_insn_meta *meta) 3488389f263bSQuentin Monnet { 3489389f263bSQuentin Monnet return meta->flags & FLAG_INSN_IS_SUBPROG_START; 3490389f263bSQuentin Monnet } 3491389f263bSQuentin Monnet 3492d9ae7f2bSJakub Kicinski static void nfp_outro_tc_da(struct nfp_prog *nfp_prog) 3493d9ae7f2bSJakub Kicinski { 3494d9ae7f2bSJakub Kicinski /* TC direct-action mode: 3495d9ae7f2bSJakub Kicinski * 0,1 ok NOT SUPPORTED[1] 3496d9ae7f2bSJakub Kicinski * 2 drop 0x22 -> drop, count as stat1 3497d9ae7f2bSJakub Kicinski * 4,5 nuke 0x02 -> drop 3498d9ae7f2bSJakub Kicinski * 7 redir 0x44 -> redir, count as stat2 3499d9ae7f2bSJakub Kicinski * * unspec 0x11 -> pass, count as stat0 3500d9ae7f2bSJakub Kicinski * 3501d9ae7f2bSJakub Kicinski * [1] We can't support OK and RECLASSIFY because we can't tell TC 3502d9ae7f2bSJakub Kicinski * the exact decision made. We are forced to support UNSPEC 3503d9ae7f2bSJakub Kicinski * to handle aborts so that's the only one we handle for passing 3504d9ae7f2bSJakub Kicinski * packets up the stack. 3505d9ae7f2bSJakub Kicinski */ 3506d9ae7f2bSJakub Kicinski /* Target for aborts */ 3507d9ae7f2bSJakub Kicinski nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog); 3508d9ae7f2bSJakub Kicinski 3509e84797feSJakub Kicinski emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2, RELO_BR_NEXT_PKT); 3510d9ae7f2bSJakub Kicinski 3511c000dfb5SJakub Kicinski wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS); 3512d9ae7f2bSJakub Kicinski emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x11), SHF_SC_L_SHF, 16); 3513d9ae7f2bSJakub Kicinski 3514d9ae7f2bSJakub Kicinski /* Target for normal exits */ 3515d9ae7f2bSJakub Kicinski nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog); 3516d9ae7f2bSJakub Kicinski 3517d9ae7f2bSJakub Kicinski /* if R0 > 7 jump to abort */ 3518d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_none(), reg_imm(7), ALU_OP_SUB, reg_b(0)); 3519d9ae7f2bSJakub Kicinski emit_br(nfp_prog, BR_BLO, nfp_prog->tgt_abort, 0); 3520c000dfb5SJakub Kicinski wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS); 3521d9ae7f2bSJakub Kicinski 3522d9ae7f2bSJakub Kicinski wrp_immed(nfp_prog, reg_b(2), 0x41221211); 3523d9ae7f2bSJakub Kicinski wrp_immed(nfp_prog, reg_b(3), 0x41001211); 3524d9ae7f2bSJakub Kicinski 3525d9ae7f2bSJakub Kicinski emit_shf(nfp_prog, reg_a(1), 3526d9ae7f2bSJakub Kicinski reg_none(), SHF_OP_NONE, reg_b(0), SHF_SC_L_SHF, 2); 3527d9ae7f2bSJakub Kicinski 3528d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0)); 3529d9ae7f2bSJakub Kicinski emit_shf(nfp_prog, reg_a(2), 3530d9ae7f2bSJakub Kicinski reg_imm(0xf), SHF_OP_AND, reg_b(2), SHF_SC_R_SHF, 0); 3531d9ae7f2bSJakub Kicinski 3532d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0)); 3533d9ae7f2bSJakub Kicinski emit_shf(nfp_prog, reg_b(2), 3534d9ae7f2bSJakub Kicinski reg_imm(0xf), SHF_OP_AND, reg_b(3), SHF_SC_R_SHF, 0); 3535d9ae7f2bSJakub Kicinski 3536e84797feSJakub Kicinski emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2, RELO_BR_NEXT_PKT); 3537d9ae7f2bSJakub Kicinski 3538d9ae7f2bSJakub Kicinski emit_shf(nfp_prog, reg_b(2), 3539d9ae7f2bSJakub Kicinski reg_a(2), SHF_OP_OR, reg_b(2), SHF_SC_L_SHF, 4); 3540d9ae7f2bSJakub Kicinski emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_b(2), SHF_SC_L_SHF, 16); 3541d9ae7f2bSJakub Kicinski } 3542d9ae7f2bSJakub Kicinski 3543d9ae7f2bSJakub Kicinski static void nfp_outro_xdp(struct nfp_prog *nfp_prog) 3544d9ae7f2bSJakub Kicinski { 3545d9ae7f2bSJakub Kicinski /* XDP return codes: 3546d9ae7f2bSJakub Kicinski * 0 aborted 0x82 -> drop, count as stat3 3547d9ae7f2bSJakub Kicinski * 1 drop 0x22 -> drop, count as stat1 3548d9ae7f2bSJakub Kicinski * 2 pass 0x11 -> pass, count as stat0 3549d9ae7f2bSJakub Kicinski * 3 tx 0x44 -> redir, count as stat2 3550d9ae7f2bSJakub Kicinski * * unknown 0x82 -> drop, count as stat3 3551d9ae7f2bSJakub Kicinski */ 3552d9ae7f2bSJakub Kicinski /* Target for aborts */ 3553d9ae7f2bSJakub Kicinski nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog); 3554d9ae7f2bSJakub Kicinski 3555e84797feSJakub Kicinski emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2, RELO_BR_NEXT_PKT); 3556d9ae7f2bSJakub Kicinski 3557c000dfb5SJakub Kicinski wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS); 3558d9ae7f2bSJakub Kicinski emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x82), SHF_SC_L_SHF, 16); 3559d9ae7f2bSJakub Kicinski 3560d9ae7f2bSJakub Kicinski /* Target for normal exits */ 3561d9ae7f2bSJakub Kicinski nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog); 3562d9ae7f2bSJakub Kicinski 3563d9ae7f2bSJakub Kicinski /* if R0 > 3 jump to abort */ 3564d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_none(), reg_imm(3), ALU_OP_SUB, reg_b(0)); 3565d9ae7f2bSJakub Kicinski emit_br(nfp_prog, BR_BLO, nfp_prog->tgt_abort, 0); 3566d9ae7f2bSJakub Kicinski 3567d9ae7f2bSJakub Kicinski wrp_immed(nfp_prog, reg_b(2), 0x44112282); 3568d9ae7f2bSJakub Kicinski 3569d9ae7f2bSJakub Kicinski emit_shf(nfp_prog, reg_a(1), 3570d9ae7f2bSJakub Kicinski reg_none(), SHF_OP_NONE, reg_b(0), SHF_SC_L_SHF, 3); 3571d9ae7f2bSJakub Kicinski 3572d9ae7f2bSJakub Kicinski emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0)); 3573d9ae7f2bSJakub Kicinski emit_shf(nfp_prog, reg_b(2), 3574d9ae7f2bSJakub Kicinski reg_imm(0xff), SHF_OP_AND, reg_b(2), SHF_SC_R_SHF, 0); 3575d9ae7f2bSJakub Kicinski 3576e84797feSJakub Kicinski emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2, RELO_BR_NEXT_PKT); 3577d9ae7f2bSJakub Kicinski 3578c000dfb5SJakub Kicinski wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS); 3579d9ae7f2bSJakub Kicinski emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_b(2), SHF_SC_L_SHF, 16); 3580d9ae7f2bSJakub Kicinski } 3581d9ae7f2bSJakub Kicinski 358244549623SQuentin Monnet static bool nfp_prog_needs_callee_reg_save(struct nfp_prog *nfp_prog) 358344549623SQuentin Monnet { 358444549623SQuentin Monnet unsigned int idx; 358544549623SQuentin Monnet 358644549623SQuentin Monnet for (idx = 1; idx < nfp_prog->subprog_cnt; idx++) 358744549623SQuentin Monnet if (nfp_prog->subprog[idx].needs_reg_push) 358844549623SQuentin Monnet return true; 358944549623SQuentin Monnet 359044549623SQuentin Monnet return false; 359144549623SQuentin Monnet } 359244549623SQuentin Monnet 3593389f263bSQuentin Monnet static void nfp_push_callee_registers(struct nfp_prog *nfp_prog) 3594389f263bSQuentin Monnet { 3595389f263bSQuentin Monnet u8 reg; 3596389f263bSQuentin Monnet 3597389f263bSQuentin Monnet /* Subroutine: Save all callee saved registers (R6 ~ R9). 3598389f263bSQuentin Monnet * imm_b() holds the return address. 3599389f263bSQuentin Monnet */ 3600389f263bSQuentin Monnet nfp_prog->tgt_call_push_regs = nfp_prog_current_offset(nfp_prog); 3601389f263bSQuentin Monnet for (reg = BPF_REG_6; reg <= BPF_REG_9; reg++) { 3602389f263bSQuentin Monnet u8 adj = (reg - BPF_REG_0) * 2; 3603389f263bSQuentin Monnet u8 idx = (reg - BPF_REG_6) * 2; 3604389f263bSQuentin Monnet 3605389f263bSQuentin Monnet /* The first slot in the stack frame is used to push the return 3606389f263bSQuentin Monnet * address in bpf_to_bpf_call(), start just after. 3607389f263bSQuentin Monnet */ 3608389f263bSQuentin Monnet wrp_mov(nfp_prog, reg_lm(0, 1 + idx), reg_b(adj)); 3609389f263bSQuentin Monnet 3610389f263bSQuentin Monnet if (reg == BPF_REG_8) 3611389f263bSQuentin Monnet /* Prepare to jump back, last 3 insns use defer slots */ 3612389f263bSQuentin Monnet emit_rtn(nfp_prog, imm_b(nfp_prog), 3); 3613389f263bSQuentin Monnet 3614389f263bSQuentin Monnet wrp_mov(nfp_prog, reg_lm(0, 1 + idx + 1), reg_b(adj + 1)); 3615389f263bSQuentin Monnet } 3616389f263bSQuentin Monnet } 3617389f263bSQuentin Monnet 3618389f263bSQuentin Monnet static void nfp_pop_callee_registers(struct nfp_prog *nfp_prog) 3619389f263bSQuentin Monnet { 3620389f263bSQuentin Monnet u8 reg; 3621389f263bSQuentin Monnet 3622389f263bSQuentin Monnet /* Subroutine: Restore all callee saved registers (R6 ~ R9). 3623389f263bSQuentin Monnet * ret_reg() holds the return address. 3624389f263bSQuentin Monnet */ 3625389f263bSQuentin Monnet nfp_prog->tgt_call_pop_regs = nfp_prog_current_offset(nfp_prog); 3626389f263bSQuentin Monnet for (reg = BPF_REG_6; reg <= BPF_REG_9; reg++) { 3627389f263bSQuentin Monnet u8 adj = (reg - BPF_REG_0) * 2; 3628389f263bSQuentin Monnet u8 idx = (reg - BPF_REG_6) * 2; 3629389f263bSQuentin Monnet 3630389f263bSQuentin Monnet /* The first slot in the stack frame holds the return address, 3631389f263bSQuentin Monnet * start popping just after that. 3632389f263bSQuentin Monnet */ 3633389f263bSQuentin Monnet wrp_mov(nfp_prog, reg_both(adj), reg_lm(0, 1 + idx)); 3634389f263bSQuentin Monnet 3635389f263bSQuentin Monnet if (reg == BPF_REG_8) 3636389f263bSQuentin Monnet /* Prepare to jump back, last 3 insns use defer slots */ 3637389f263bSQuentin Monnet emit_rtn(nfp_prog, ret_reg(nfp_prog), 3); 3638389f263bSQuentin Monnet 3639389f263bSQuentin Monnet wrp_mov(nfp_prog, reg_both(adj + 1), reg_lm(0, 1 + idx + 1)); 3640389f263bSQuentin Monnet } 3641389f263bSQuentin Monnet } 3642389f263bSQuentin Monnet 3643d9ae7f2bSJakub Kicinski static void nfp_outro(struct nfp_prog *nfp_prog) 3644d9ae7f2bSJakub Kicinski { 3645012bb8a8SJakub Kicinski switch (nfp_prog->type) { 3646012bb8a8SJakub Kicinski case BPF_PROG_TYPE_SCHED_CLS: 3647d9ae7f2bSJakub Kicinski nfp_outro_tc_da(nfp_prog); 3648d9ae7f2bSJakub Kicinski break; 3649012bb8a8SJakub Kicinski case BPF_PROG_TYPE_XDP: 3650d9ae7f2bSJakub Kicinski nfp_outro_xdp(nfp_prog); 3651d9ae7f2bSJakub Kicinski break; 3652012bb8a8SJakub Kicinski default: 3653012bb8a8SJakub Kicinski WARN_ON(1); 3654d9ae7f2bSJakub Kicinski } 3655389f263bSQuentin Monnet 365644549623SQuentin Monnet if (!nfp_prog_needs_callee_reg_save(nfp_prog)) 3657389f263bSQuentin Monnet return; 3658389f263bSQuentin Monnet 3659389f263bSQuentin Monnet nfp_push_callee_registers(nfp_prog); 3660389f263bSQuentin Monnet nfp_pop_callee_registers(nfp_prog); 3661d9ae7f2bSJakub Kicinski } 3662d9ae7f2bSJakub Kicinski 3663d9ae7f2bSJakub Kicinski static int nfp_translate(struct nfp_prog *nfp_prog) 3664d9ae7f2bSJakub Kicinski { 3665d9ae7f2bSJakub Kicinski struct nfp_insn_meta *meta; 3666389f263bSQuentin Monnet unsigned int depth; 3667ff42bb9fSJakub Kicinski int err; 3668d9ae7f2bSJakub Kicinski 3669389f263bSQuentin Monnet depth = nfp_prog->subprog[0].stack_depth; 3670389f263bSQuentin Monnet nfp_prog->stack_frame_depth = round_up(depth, 4); 3671389f263bSQuentin Monnet 3672d9ae7f2bSJakub Kicinski nfp_intro(nfp_prog); 3673d9ae7f2bSJakub Kicinski if (nfp_prog->error) 3674d9ae7f2bSJakub Kicinski return nfp_prog->error; 3675d9ae7f2bSJakub Kicinski 3676d9ae7f2bSJakub Kicinski list_for_each_entry(meta, &nfp_prog->insns, l) { 3677d9ae7f2bSJakub Kicinski instr_cb_t cb = instr_cb[meta->insn.code]; 3678d9ae7f2bSJakub Kicinski 3679d9ae7f2bSJakub Kicinski meta->off = nfp_prog_current_offset(nfp_prog); 3680d9ae7f2bSJakub Kicinski 3681389f263bSQuentin Monnet if (nfp_is_subprog_start(meta)) { 3682389f263bSQuentin Monnet nfp_start_subprog(nfp_prog, meta); 3683389f263bSQuentin Monnet if (nfp_prog->error) 3684389f263bSQuentin Monnet return nfp_prog->error; 3685389f263bSQuentin Monnet } 3686389f263bSQuentin Monnet 3687d9ae7f2bSJakub Kicinski if (meta->skip) { 3688d9ae7f2bSJakub Kicinski nfp_prog->n_translated++; 3689d9ae7f2bSJakub Kicinski continue; 3690d9ae7f2bSJakub Kicinski } 3691d9ae7f2bSJakub Kicinski 3692d9ae7f2bSJakub Kicinski if (nfp_meta_has_prev(nfp_prog, meta) && 3693d9ae7f2bSJakub Kicinski nfp_meta_prev(meta)->double_cb) 3694d9ae7f2bSJakub Kicinski cb = nfp_meta_prev(meta)->double_cb; 3695d9ae7f2bSJakub Kicinski if (!cb) 3696d9ae7f2bSJakub Kicinski return -ENOENT; 3697d9ae7f2bSJakub Kicinski err = cb(nfp_prog, meta); 3698d9ae7f2bSJakub Kicinski if (err) 3699d9ae7f2bSJakub Kicinski return err; 3700e8a4796eSJakub Kicinski if (nfp_prog->error) 3701e8a4796eSJakub Kicinski return nfp_prog->error; 3702d9ae7f2bSJakub Kicinski 3703d9ae7f2bSJakub Kicinski nfp_prog->n_translated++; 3704d9ae7f2bSJakub Kicinski } 3705d9ae7f2bSJakub Kicinski 3706854dc87dSJiong Wang nfp_prog->last_bpf_off = nfp_prog_current_offset(nfp_prog) - 1; 3707854dc87dSJiong Wang 3708d9ae7f2bSJakub Kicinski nfp_outro(nfp_prog); 3709d9ae7f2bSJakub Kicinski if (nfp_prog->error) 3710d9ae7f2bSJakub Kicinski return nfp_prog->error; 3711d9ae7f2bSJakub Kicinski 3712ff42bb9fSJakub Kicinski wrp_nops(nfp_prog, NFP_USTORE_PREFETCH_WINDOW); 37131c03e03fSJakub Kicinski if (nfp_prog->error) 37141c03e03fSJakub Kicinski return nfp_prog->error; 37151c03e03fSJakub Kicinski 3716d9ae7f2bSJakub Kicinski return nfp_fixup_branches(nfp_prog); 3717d9ae7f2bSJakub Kicinski } 3718d9ae7f2bSJakub Kicinski 3719d9ae7f2bSJakub Kicinski /* --- Optimizations --- */ 3720d9ae7f2bSJakub Kicinski static void nfp_bpf_opt_reg_init(struct nfp_prog *nfp_prog) 3721d9ae7f2bSJakub Kicinski { 3722d9ae7f2bSJakub Kicinski struct nfp_insn_meta *meta; 3723d9ae7f2bSJakub Kicinski 3724d9ae7f2bSJakub Kicinski list_for_each_entry(meta, &nfp_prog->insns, l) { 3725d9ae7f2bSJakub Kicinski struct bpf_insn insn = meta->insn; 3726d9ae7f2bSJakub Kicinski 3727d9ae7f2bSJakub Kicinski /* Programs converted from cBPF start with register xoring */ 3728d9ae7f2bSJakub Kicinski if (insn.code == (BPF_ALU64 | BPF_XOR | BPF_X) && 3729d9ae7f2bSJakub Kicinski insn.src_reg == insn.dst_reg) 3730d9ae7f2bSJakub Kicinski continue; 3731d9ae7f2bSJakub Kicinski 3732d9ae7f2bSJakub Kicinski /* Programs start with R6 = R1 but we ignore the skb pointer */ 3733d9ae7f2bSJakub Kicinski if (insn.code == (BPF_ALU64 | BPF_MOV | BPF_X) && 3734d9ae7f2bSJakub Kicinski insn.src_reg == 1 && insn.dst_reg == 6) 3735d9ae7f2bSJakub Kicinski meta->skip = true; 3736d9ae7f2bSJakub Kicinski 3737d9ae7f2bSJakub Kicinski /* Return as soon as something doesn't match */ 3738d9ae7f2bSJakub Kicinski if (!meta->skip) 3739d9ae7f2bSJakub Kicinski return; 3740d9ae7f2bSJakub Kicinski } 3741d9ae7f2bSJakub Kicinski } 3742d9ae7f2bSJakub Kicinski 37436c59500cSJakub Kicinski /* abs(insn.imm) will fit better into unrestricted reg immediate - 37446c59500cSJakub Kicinski * convert add/sub of a negative number into a sub/add of a positive one. 37456c59500cSJakub Kicinski */ 37466c59500cSJakub Kicinski static void nfp_bpf_opt_neg_add_sub(struct nfp_prog *nfp_prog) 37476c59500cSJakub Kicinski { 37486c59500cSJakub Kicinski struct nfp_insn_meta *meta; 37496c59500cSJakub Kicinski 37506c59500cSJakub Kicinski list_for_each_entry(meta, &nfp_prog->insns, l) { 37516c59500cSJakub Kicinski struct bpf_insn insn = meta->insn; 37526c59500cSJakub Kicinski 37536c59500cSJakub Kicinski if (meta->skip) 37546c59500cSJakub Kicinski continue; 37556c59500cSJakub Kicinski 37566c59500cSJakub Kicinski if (BPF_CLASS(insn.code) != BPF_ALU && 37577bdc97beSJakub Kicinski BPF_CLASS(insn.code) != BPF_ALU64 && 37587bdc97beSJakub Kicinski BPF_CLASS(insn.code) != BPF_JMP) 37596c59500cSJakub Kicinski continue; 37606c59500cSJakub Kicinski if (BPF_SRC(insn.code) != BPF_K) 37616c59500cSJakub Kicinski continue; 37626c59500cSJakub Kicinski if (insn.imm >= 0) 37636c59500cSJakub Kicinski continue; 37646c59500cSJakub Kicinski 37657bdc97beSJakub Kicinski if (BPF_CLASS(insn.code) == BPF_JMP) { 37667bdc97beSJakub Kicinski switch (BPF_OP(insn.code)) { 37677bdc97beSJakub Kicinski case BPF_JGE: 37687bdc97beSJakub Kicinski case BPF_JSGE: 37697bdc97beSJakub Kicinski case BPF_JLT: 37707bdc97beSJakub Kicinski case BPF_JSLT: 37717bdc97beSJakub Kicinski meta->jump_neg_op = true; 37727bdc97beSJakub Kicinski break; 37737bdc97beSJakub Kicinski default: 37747bdc97beSJakub Kicinski continue; 37757bdc97beSJakub Kicinski } 37767bdc97beSJakub Kicinski } else { 37776c59500cSJakub Kicinski if (BPF_OP(insn.code) == BPF_ADD) 37786c59500cSJakub Kicinski insn.code = BPF_CLASS(insn.code) | BPF_SUB; 37796c59500cSJakub Kicinski else if (BPF_OP(insn.code) == BPF_SUB) 37806c59500cSJakub Kicinski insn.code = BPF_CLASS(insn.code) | BPF_ADD; 37816c59500cSJakub Kicinski else 37826c59500cSJakub Kicinski continue; 37836c59500cSJakub Kicinski 37846c59500cSJakub Kicinski meta->insn.code = insn.code | BPF_K; 37857bdc97beSJakub Kicinski } 37866c59500cSJakub Kicinski 37876c59500cSJakub Kicinski meta->insn.imm = -insn.imm; 37886c59500cSJakub Kicinski } 37896c59500cSJakub Kicinski } 37906c59500cSJakub Kicinski 3791d9ae7f2bSJakub Kicinski /* Remove masking after load since our load guarantees this is not needed */ 3792d9ae7f2bSJakub Kicinski static void nfp_bpf_opt_ld_mask(struct nfp_prog *nfp_prog) 3793d9ae7f2bSJakub Kicinski { 3794d9ae7f2bSJakub Kicinski struct nfp_insn_meta *meta1, *meta2; 3795d9ae7f2bSJakub Kicinski const s32 exp_mask[] = { 3796d9ae7f2bSJakub Kicinski [BPF_B] = 0x000000ffU, 3797d9ae7f2bSJakub Kicinski [BPF_H] = 0x0000ffffU, 3798d9ae7f2bSJakub Kicinski [BPF_W] = 0xffffffffU, 3799d9ae7f2bSJakub Kicinski }; 3800d9ae7f2bSJakub Kicinski 3801d9ae7f2bSJakub Kicinski nfp_for_each_insn_walk2(nfp_prog, meta1, meta2) { 3802d9ae7f2bSJakub Kicinski struct bpf_insn insn, next; 3803d9ae7f2bSJakub Kicinski 3804d9ae7f2bSJakub Kicinski insn = meta1->insn; 3805d9ae7f2bSJakub Kicinski next = meta2->insn; 3806d9ae7f2bSJakub Kicinski 3807d9ae7f2bSJakub Kicinski if (BPF_CLASS(insn.code) != BPF_LD) 3808d9ae7f2bSJakub Kicinski continue; 3809d9ae7f2bSJakub Kicinski if (BPF_MODE(insn.code) != BPF_ABS && 3810d9ae7f2bSJakub Kicinski BPF_MODE(insn.code) != BPF_IND) 3811d9ae7f2bSJakub Kicinski continue; 3812d9ae7f2bSJakub Kicinski 3813d9ae7f2bSJakub Kicinski if (next.code != (BPF_ALU64 | BPF_AND | BPF_K)) 3814d9ae7f2bSJakub Kicinski continue; 3815d9ae7f2bSJakub Kicinski 3816d9ae7f2bSJakub Kicinski if (!exp_mask[BPF_SIZE(insn.code)]) 3817d9ae7f2bSJakub Kicinski continue; 3818d9ae7f2bSJakub Kicinski if (exp_mask[BPF_SIZE(insn.code)] != next.imm) 3819d9ae7f2bSJakub Kicinski continue; 3820d9ae7f2bSJakub Kicinski 3821d9ae7f2bSJakub Kicinski if (next.src_reg || next.dst_reg) 3822d9ae7f2bSJakub Kicinski continue; 3823d9ae7f2bSJakub Kicinski 38241266f5d6SJiong Wang if (meta2->flags & FLAG_INSN_IS_JUMP_DST) 38251266f5d6SJiong Wang continue; 38261266f5d6SJiong Wang 3827d9ae7f2bSJakub Kicinski meta2->skip = true; 3828d9ae7f2bSJakub Kicinski } 3829d9ae7f2bSJakub Kicinski } 3830d9ae7f2bSJakub Kicinski 3831d9ae7f2bSJakub Kicinski static void nfp_bpf_opt_ld_shift(struct nfp_prog *nfp_prog) 3832d9ae7f2bSJakub Kicinski { 3833d9ae7f2bSJakub Kicinski struct nfp_insn_meta *meta1, *meta2, *meta3; 3834d9ae7f2bSJakub Kicinski 3835d9ae7f2bSJakub Kicinski nfp_for_each_insn_walk3(nfp_prog, meta1, meta2, meta3) { 3836d9ae7f2bSJakub Kicinski struct bpf_insn insn, next1, next2; 3837d9ae7f2bSJakub Kicinski 3838d9ae7f2bSJakub Kicinski insn = meta1->insn; 3839d9ae7f2bSJakub Kicinski next1 = meta2->insn; 3840d9ae7f2bSJakub Kicinski next2 = meta3->insn; 3841d9ae7f2bSJakub Kicinski 3842d9ae7f2bSJakub Kicinski if (BPF_CLASS(insn.code) != BPF_LD) 3843d9ae7f2bSJakub Kicinski continue; 3844d9ae7f2bSJakub Kicinski if (BPF_MODE(insn.code) != BPF_ABS && 3845d9ae7f2bSJakub Kicinski BPF_MODE(insn.code) != BPF_IND) 3846d9ae7f2bSJakub Kicinski continue; 3847d9ae7f2bSJakub Kicinski if (BPF_SIZE(insn.code) != BPF_W) 3848d9ae7f2bSJakub Kicinski continue; 3849d9ae7f2bSJakub Kicinski 3850d9ae7f2bSJakub Kicinski if (!(next1.code == (BPF_LSH | BPF_K | BPF_ALU64) && 3851d9ae7f2bSJakub Kicinski next2.code == (BPF_RSH | BPF_K | BPF_ALU64)) && 3852d9ae7f2bSJakub Kicinski !(next1.code == (BPF_RSH | BPF_K | BPF_ALU64) && 3853d9ae7f2bSJakub Kicinski next2.code == (BPF_LSH | BPF_K | BPF_ALU64))) 3854d9ae7f2bSJakub Kicinski continue; 3855d9ae7f2bSJakub Kicinski 3856d9ae7f2bSJakub Kicinski if (next1.src_reg || next1.dst_reg || 3857d9ae7f2bSJakub Kicinski next2.src_reg || next2.dst_reg) 3858d9ae7f2bSJakub Kicinski continue; 3859d9ae7f2bSJakub Kicinski 3860d9ae7f2bSJakub Kicinski if (next1.imm != 0x20 || next2.imm != 0x20) 3861d9ae7f2bSJakub Kicinski continue; 3862d9ae7f2bSJakub Kicinski 386329fe46efSJiong Wang if (meta2->flags & FLAG_INSN_IS_JUMP_DST || 386429fe46efSJiong Wang meta3->flags & FLAG_INSN_IS_JUMP_DST) 386529fe46efSJiong Wang continue; 386629fe46efSJiong Wang 3867d9ae7f2bSJakub Kicinski meta2->skip = true; 3868d9ae7f2bSJakub Kicinski meta3->skip = true; 3869d9ae7f2bSJakub Kicinski } 3870d9ae7f2bSJakub Kicinski } 3871d9ae7f2bSJakub Kicinski 38726bc7103cSJiong Wang /* load/store pair that forms memory copy sould look like the following: 38736bc7103cSJiong Wang * 38746bc7103cSJiong Wang * ld_width R, [addr_src + offset_src] 38756bc7103cSJiong Wang * st_width [addr_dest + offset_dest], R 38766bc7103cSJiong Wang * 38776bc7103cSJiong Wang * The destination register of load and source register of store should 38786bc7103cSJiong Wang * be the same, load and store should also perform at the same width. 38796bc7103cSJiong Wang * If either of addr_src or addr_dest is stack pointer, we don't do the 38806bc7103cSJiong Wang * CPP optimization as stack is modelled by registers on NFP. 38816bc7103cSJiong Wang */ 38826bc7103cSJiong Wang static bool 38836bc7103cSJiong Wang curr_pair_is_memcpy(struct nfp_insn_meta *ld_meta, 38846bc7103cSJiong Wang struct nfp_insn_meta *st_meta) 38856bc7103cSJiong Wang { 38866bc7103cSJiong Wang struct bpf_insn *ld = &ld_meta->insn; 38876bc7103cSJiong Wang struct bpf_insn *st = &st_meta->insn; 38886bc7103cSJiong Wang 38896bc7103cSJiong Wang if (!is_mbpf_load(ld_meta) || !is_mbpf_store(st_meta)) 38906bc7103cSJiong Wang return false; 38916bc7103cSJiong Wang 3892cc0dff6dSJiong Wang if (ld_meta->ptr.type != PTR_TO_PACKET && 3893cc0dff6dSJiong Wang ld_meta->ptr.type != PTR_TO_MAP_VALUE) 38946bc7103cSJiong Wang return false; 38956bc7103cSJiong Wang 38966bc7103cSJiong Wang if (st_meta->ptr.type != PTR_TO_PACKET) 38976bc7103cSJiong Wang return false; 38986bc7103cSJiong Wang 38996bc7103cSJiong Wang if (BPF_SIZE(ld->code) != BPF_SIZE(st->code)) 39006bc7103cSJiong Wang return false; 39016bc7103cSJiong Wang 39026bc7103cSJiong Wang if (ld->dst_reg != st->src_reg) 39036bc7103cSJiong Wang return false; 39046bc7103cSJiong Wang 39056bc7103cSJiong Wang /* There is jump to the store insn in this pair. */ 39066bc7103cSJiong Wang if (st_meta->flags & FLAG_INSN_IS_JUMP_DST) 39076bc7103cSJiong Wang return false; 39086bc7103cSJiong Wang 39096bc7103cSJiong Wang return true; 39106bc7103cSJiong Wang } 39116bc7103cSJiong Wang 39126bc7103cSJiong Wang /* Currently, we only support chaining load/store pairs if: 39136bc7103cSJiong Wang * 39146bc7103cSJiong Wang * - Their address base registers are the same. 39156bc7103cSJiong Wang * - Their address offsets are in the same order. 39166bc7103cSJiong Wang * - They operate at the same memory width. 39176bc7103cSJiong Wang * - There is no jump into the middle of them. 39186bc7103cSJiong Wang */ 39196bc7103cSJiong Wang static bool 39206bc7103cSJiong Wang curr_pair_chain_with_previous(struct nfp_insn_meta *ld_meta, 39216bc7103cSJiong Wang struct nfp_insn_meta *st_meta, 39226bc7103cSJiong Wang struct bpf_insn *prev_ld, 39236bc7103cSJiong Wang struct bpf_insn *prev_st) 39246bc7103cSJiong Wang { 39256bc7103cSJiong Wang u8 prev_size, curr_size, prev_ld_base, prev_st_base, prev_ld_dst; 39266bc7103cSJiong Wang struct bpf_insn *ld = &ld_meta->insn; 39276bc7103cSJiong Wang struct bpf_insn *st = &st_meta->insn; 39286bc7103cSJiong Wang s16 prev_ld_off, prev_st_off; 39296bc7103cSJiong Wang 39306bc7103cSJiong Wang /* This pair is the start pair. */ 39316bc7103cSJiong Wang if (!prev_ld) 39326bc7103cSJiong Wang return true; 39336bc7103cSJiong Wang 39346bc7103cSJiong Wang prev_size = BPF_LDST_BYTES(prev_ld); 39356bc7103cSJiong Wang curr_size = BPF_LDST_BYTES(ld); 39366bc7103cSJiong Wang prev_ld_base = prev_ld->src_reg; 39376bc7103cSJiong Wang prev_st_base = prev_st->dst_reg; 39386bc7103cSJiong Wang prev_ld_dst = prev_ld->dst_reg; 39396bc7103cSJiong Wang prev_ld_off = prev_ld->off; 39406bc7103cSJiong Wang prev_st_off = prev_st->off; 39416bc7103cSJiong Wang 39426bc7103cSJiong Wang if (ld->dst_reg != prev_ld_dst) 39436bc7103cSJiong Wang return false; 39446bc7103cSJiong Wang 39456bc7103cSJiong Wang if (ld->src_reg != prev_ld_base || st->dst_reg != prev_st_base) 39466bc7103cSJiong Wang return false; 39476bc7103cSJiong Wang 39486bc7103cSJiong Wang if (curr_size != prev_size) 39496bc7103cSJiong Wang return false; 39506bc7103cSJiong Wang 39516bc7103cSJiong Wang /* There is jump to the head of this pair. */ 39526bc7103cSJiong Wang if (ld_meta->flags & FLAG_INSN_IS_JUMP_DST) 39536bc7103cSJiong Wang return false; 39546bc7103cSJiong Wang 39556bc7103cSJiong Wang /* Both in ascending order. */ 39566bc7103cSJiong Wang if (prev_ld_off + prev_size == ld->off && 39576bc7103cSJiong Wang prev_st_off + prev_size == st->off) 39586bc7103cSJiong Wang return true; 39596bc7103cSJiong Wang 39606bc7103cSJiong Wang /* Both in descending order. */ 39616bc7103cSJiong Wang if (ld->off + curr_size == prev_ld_off && 39626bc7103cSJiong Wang st->off + curr_size == prev_st_off) 39636bc7103cSJiong Wang return true; 39646bc7103cSJiong Wang 39656bc7103cSJiong Wang return false; 39666bc7103cSJiong Wang } 39676bc7103cSJiong Wang 39686bc7103cSJiong Wang /* Return TRUE if cross memory access happens. Cross memory access means 39696bc7103cSJiong Wang * store area is overlapping with load area that a later load might load 39706bc7103cSJiong Wang * the value from previous store, for this case we can't treat the sequence 39716bc7103cSJiong Wang * as an memory copy. 39726bc7103cSJiong Wang */ 39736bc7103cSJiong Wang static bool 39746bc7103cSJiong Wang cross_mem_access(struct bpf_insn *ld, struct nfp_insn_meta *head_ld_meta, 39756bc7103cSJiong Wang struct nfp_insn_meta *head_st_meta) 39766bc7103cSJiong Wang { 39776bc7103cSJiong Wang s16 head_ld_off, head_st_off, ld_off; 39786bc7103cSJiong Wang 39796bc7103cSJiong Wang /* Different pointer types does not overlap. */ 39806bc7103cSJiong Wang if (head_ld_meta->ptr.type != head_st_meta->ptr.type) 39816bc7103cSJiong Wang return false; 39826bc7103cSJiong Wang 39836bc7103cSJiong Wang /* load and store are both PTR_TO_PACKET, check ID info. */ 39846bc7103cSJiong Wang if (head_ld_meta->ptr.id != head_st_meta->ptr.id) 39856bc7103cSJiong Wang return true; 39866bc7103cSJiong Wang 39876bc7103cSJiong Wang /* Canonicalize the offsets. Turn all of them against the original 39886bc7103cSJiong Wang * base register. 39896bc7103cSJiong Wang */ 39906bc7103cSJiong Wang head_ld_off = head_ld_meta->insn.off + head_ld_meta->ptr.off; 39916bc7103cSJiong Wang head_st_off = head_st_meta->insn.off + head_st_meta->ptr.off; 39926bc7103cSJiong Wang ld_off = ld->off + head_ld_meta->ptr.off; 39936bc7103cSJiong Wang 39946bc7103cSJiong Wang /* Ascending order cross. */ 39956bc7103cSJiong Wang if (ld_off > head_ld_off && 39966bc7103cSJiong Wang head_ld_off < head_st_off && ld_off >= head_st_off) 39976bc7103cSJiong Wang return true; 39986bc7103cSJiong Wang 39996bc7103cSJiong Wang /* Descending order cross. */ 40006bc7103cSJiong Wang if (ld_off < head_ld_off && 40016bc7103cSJiong Wang head_ld_off > head_st_off && ld_off <= head_st_off) 40026bc7103cSJiong Wang return true; 40036bc7103cSJiong Wang 40046bc7103cSJiong Wang return false; 40056bc7103cSJiong Wang } 40066bc7103cSJiong Wang 40076bc7103cSJiong Wang /* This pass try to identify the following instructoin sequences. 40086bc7103cSJiong Wang * 40096bc7103cSJiong Wang * load R, [regA + offA] 40106bc7103cSJiong Wang * store [regB + offB], R 40116bc7103cSJiong Wang * load R, [regA + offA + const_imm_A] 40126bc7103cSJiong Wang * store [regB + offB + const_imm_A], R 40136bc7103cSJiong Wang * load R, [regA + offA + 2 * const_imm_A] 40146bc7103cSJiong Wang * store [regB + offB + 2 * const_imm_A], R 40156bc7103cSJiong Wang * ... 40166bc7103cSJiong Wang * 40176bc7103cSJiong Wang * Above sequence is typically generated by compiler when lowering 40186bc7103cSJiong Wang * memcpy. NFP prefer using CPP instructions to accelerate it. 40196bc7103cSJiong Wang */ 40206bc7103cSJiong Wang static void nfp_bpf_opt_ldst_gather(struct nfp_prog *nfp_prog) 40216bc7103cSJiong Wang { 40226bc7103cSJiong Wang struct nfp_insn_meta *head_ld_meta = NULL; 40236bc7103cSJiong Wang struct nfp_insn_meta *head_st_meta = NULL; 40246bc7103cSJiong Wang struct nfp_insn_meta *meta1, *meta2; 40256bc7103cSJiong Wang struct bpf_insn *prev_ld = NULL; 40266bc7103cSJiong Wang struct bpf_insn *prev_st = NULL; 40276bc7103cSJiong Wang u8 count = 0; 40286bc7103cSJiong Wang 40296bc7103cSJiong Wang nfp_for_each_insn_walk2(nfp_prog, meta1, meta2) { 40306bc7103cSJiong Wang struct bpf_insn *ld = &meta1->insn; 40316bc7103cSJiong Wang struct bpf_insn *st = &meta2->insn; 40326bc7103cSJiong Wang 40336bc7103cSJiong Wang /* Reset record status if any of the following if true: 40346bc7103cSJiong Wang * - The current insn pair is not load/store. 40356bc7103cSJiong Wang * - The load/store pair doesn't chain with previous one. 40366bc7103cSJiong Wang * - The chained load/store pair crossed with previous pair. 40376bc7103cSJiong Wang * - The chained load/store pair has a total size of memory 40386bc7103cSJiong Wang * copy beyond 128 bytes which is the maximum length a 40396bc7103cSJiong Wang * single NFP CPP command can transfer. 40406bc7103cSJiong Wang */ 40416bc7103cSJiong Wang if (!curr_pair_is_memcpy(meta1, meta2) || 40426bc7103cSJiong Wang !curr_pair_chain_with_previous(meta1, meta2, prev_ld, 40436bc7103cSJiong Wang prev_st) || 40446bc7103cSJiong Wang (head_ld_meta && (cross_mem_access(ld, head_ld_meta, 40456bc7103cSJiong Wang head_st_meta) || 40466bc7103cSJiong Wang head_ld_meta->ldst_gather_len >= 128))) { 40476bc7103cSJiong Wang if (!count) 40486bc7103cSJiong Wang continue; 40496bc7103cSJiong Wang 40506bc7103cSJiong Wang if (count > 1) { 40516bc7103cSJiong Wang s16 prev_ld_off = prev_ld->off; 40526bc7103cSJiong Wang s16 prev_st_off = prev_st->off; 40536bc7103cSJiong Wang s16 head_ld_off = head_ld_meta->insn.off; 40546bc7103cSJiong Wang 40556bc7103cSJiong Wang if (prev_ld_off < head_ld_off) { 40566bc7103cSJiong Wang head_ld_meta->insn.off = prev_ld_off; 40576bc7103cSJiong Wang head_st_meta->insn.off = prev_st_off; 40586bc7103cSJiong Wang head_ld_meta->ldst_gather_len = 40596bc7103cSJiong Wang -head_ld_meta->ldst_gather_len; 40606bc7103cSJiong Wang } 40616bc7103cSJiong Wang 40626bc7103cSJiong Wang head_ld_meta->paired_st = &head_st_meta->insn; 40636bc7103cSJiong Wang head_st_meta->skip = true; 40646bc7103cSJiong Wang } else { 40656bc7103cSJiong Wang head_ld_meta->ldst_gather_len = 0; 40666bc7103cSJiong Wang } 40676bc7103cSJiong Wang 40686bc7103cSJiong Wang /* If the chain is ended by an load/store pair then this 40696bc7103cSJiong Wang * could serve as the new head of the the next chain. 40706bc7103cSJiong Wang */ 40716bc7103cSJiong Wang if (curr_pair_is_memcpy(meta1, meta2)) { 40726bc7103cSJiong Wang head_ld_meta = meta1; 40736bc7103cSJiong Wang head_st_meta = meta2; 40746bc7103cSJiong Wang head_ld_meta->ldst_gather_len = 40756bc7103cSJiong Wang BPF_LDST_BYTES(ld); 40766bc7103cSJiong Wang meta1 = nfp_meta_next(meta1); 40776bc7103cSJiong Wang meta2 = nfp_meta_next(meta2); 40786bc7103cSJiong Wang prev_ld = ld; 40796bc7103cSJiong Wang prev_st = st; 40806bc7103cSJiong Wang count = 1; 40816bc7103cSJiong Wang } else { 40826bc7103cSJiong Wang head_ld_meta = NULL; 40836bc7103cSJiong Wang head_st_meta = NULL; 40846bc7103cSJiong Wang prev_ld = NULL; 40856bc7103cSJiong Wang prev_st = NULL; 40866bc7103cSJiong Wang count = 0; 40876bc7103cSJiong Wang } 40886bc7103cSJiong Wang 40896bc7103cSJiong Wang continue; 40906bc7103cSJiong Wang } 40916bc7103cSJiong Wang 40926bc7103cSJiong Wang if (!head_ld_meta) { 40936bc7103cSJiong Wang head_ld_meta = meta1; 40946bc7103cSJiong Wang head_st_meta = meta2; 40956bc7103cSJiong Wang } else { 40966bc7103cSJiong Wang meta1->skip = true; 40976bc7103cSJiong Wang meta2->skip = true; 40986bc7103cSJiong Wang } 40996bc7103cSJiong Wang 41006bc7103cSJiong Wang head_ld_meta->ldst_gather_len += BPF_LDST_BYTES(ld); 41016bc7103cSJiong Wang meta1 = nfp_meta_next(meta1); 41026bc7103cSJiong Wang meta2 = nfp_meta_next(meta2); 41036bc7103cSJiong Wang prev_ld = ld; 41046bc7103cSJiong Wang prev_st = st; 41056bc7103cSJiong Wang count++; 41066bc7103cSJiong Wang } 41076bc7103cSJiong Wang } 41086bc7103cSJiong Wang 410987b10ecdSJiong Wang static void nfp_bpf_opt_pkt_cache(struct nfp_prog *nfp_prog) 411087b10ecdSJiong Wang { 411187b10ecdSJiong Wang struct nfp_insn_meta *meta, *range_node = NULL; 411287b10ecdSJiong Wang s16 range_start = 0, range_end = 0; 411387b10ecdSJiong Wang bool cache_avail = false; 411487b10ecdSJiong Wang struct bpf_insn *insn; 411587b10ecdSJiong Wang s32 range_ptr_off = 0; 411687b10ecdSJiong Wang u32 range_ptr_id = 0; 411787b10ecdSJiong Wang 411887b10ecdSJiong Wang list_for_each_entry(meta, &nfp_prog->insns, l) { 411987b10ecdSJiong Wang if (meta->flags & FLAG_INSN_IS_JUMP_DST) 412087b10ecdSJiong Wang cache_avail = false; 412187b10ecdSJiong Wang 412287b10ecdSJiong Wang if (meta->skip) 412387b10ecdSJiong Wang continue; 412487b10ecdSJiong Wang 412587b10ecdSJiong Wang insn = &meta->insn; 412687b10ecdSJiong Wang 412787b10ecdSJiong Wang if (is_mbpf_store_pkt(meta) || 412887b10ecdSJiong Wang insn->code == (BPF_JMP | BPF_CALL) || 412987b10ecdSJiong Wang is_mbpf_classic_store_pkt(meta) || 413087b10ecdSJiong Wang is_mbpf_classic_load(meta)) { 413187b10ecdSJiong Wang cache_avail = false; 413287b10ecdSJiong Wang continue; 413387b10ecdSJiong Wang } 413487b10ecdSJiong Wang 413587b10ecdSJiong Wang if (!is_mbpf_load(meta)) 413687b10ecdSJiong Wang continue; 413787b10ecdSJiong Wang 413887b10ecdSJiong Wang if (meta->ptr.type != PTR_TO_PACKET || meta->ldst_gather_len) { 413987b10ecdSJiong Wang cache_avail = false; 414087b10ecdSJiong Wang continue; 414187b10ecdSJiong Wang } 414287b10ecdSJiong Wang 414387b10ecdSJiong Wang if (!cache_avail) { 414487b10ecdSJiong Wang cache_avail = true; 414587b10ecdSJiong Wang if (range_node) 414687b10ecdSJiong Wang goto end_current_then_start_new; 414787b10ecdSJiong Wang goto start_new; 414887b10ecdSJiong Wang } 414987b10ecdSJiong Wang 415087b10ecdSJiong Wang /* Check ID to make sure two reads share the same 415187b10ecdSJiong Wang * variable offset against PTR_TO_PACKET, and check OFF 415287b10ecdSJiong Wang * to make sure they also share the same constant 415387b10ecdSJiong Wang * offset. 415487b10ecdSJiong Wang * 415587b10ecdSJiong Wang * OFFs don't really need to be the same, because they 415687b10ecdSJiong Wang * are the constant offsets against PTR_TO_PACKET, so 415787b10ecdSJiong Wang * for different OFFs, we could canonicalize them to 415887b10ecdSJiong Wang * offsets against original packet pointer. We don't 415987b10ecdSJiong Wang * support this. 416087b10ecdSJiong Wang */ 416187b10ecdSJiong Wang if (meta->ptr.id == range_ptr_id && 416287b10ecdSJiong Wang meta->ptr.off == range_ptr_off) { 416387b10ecdSJiong Wang s16 new_start = range_start; 416487b10ecdSJiong Wang s16 end, off = insn->off; 416587b10ecdSJiong Wang s16 new_end = range_end; 416687b10ecdSJiong Wang bool changed = false; 416787b10ecdSJiong Wang 416887b10ecdSJiong Wang if (off < range_start) { 416987b10ecdSJiong Wang new_start = off; 417087b10ecdSJiong Wang changed = true; 417187b10ecdSJiong Wang } 417287b10ecdSJiong Wang 417387b10ecdSJiong Wang end = off + BPF_LDST_BYTES(insn); 417487b10ecdSJiong Wang if (end > range_end) { 417587b10ecdSJiong Wang new_end = end; 417687b10ecdSJiong Wang changed = true; 417787b10ecdSJiong Wang } 417887b10ecdSJiong Wang 417987b10ecdSJiong Wang if (!changed) 418087b10ecdSJiong Wang continue; 418187b10ecdSJiong Wang 418287b10ecdSJiong Wang if (new_end - new_start <= 64) { 418387b10ecdSJiong Wang /* Install new range. */ 418487b10ecdSJiong Wang range_start = new_start; 418587b10ecdSJiong Wang range_end = new_end; 418687b10ecdSJiong Wang continue; 418787b10ecdSJiong Wang } 418887b10ecdSJiong Wang } 418987b10ecdSJiong Wang 419087b10ecdSJiong Wang end_current_then_start_new: 419187b10ecdSJiong Wang range_node->pkt_cache.range_start = range_start; 419287b10ecdSJiong Wang range_node->pkt_cache.range_end = range_end; 419387b10ecdSJiong Wang start_new: 419487b10ecdSJiong Wang range_node = meta; 419587b10ecdSJiong Wang range_node->pkt_cache.do_init = true; 419687b10ecdSJiong Wang range_ptr_id = range_node->ptr.id; 419787b10ecdSJiong Wang range_ptr_off = range_node->ptr.off; 419887b10ecdSJiong Wang range_start = insn->off; 419987b10ecdSJiong Wang range_end = insn->off + BPF_LDST_BYTES(insn); 420087b10ecdSJiong Wang } 420187b10ecdSJiong Wang 420287b10ecdSJiong Wang if (range_node) { 420387b10ecdSJiong Wang range_node->pkt_cache.range_start = range_start; 420487b10ecdSJiong Wang range_node->pkt_cache.range_end = range_end; 420587b10ecdSJiong Wang } 420687b10ecdSJiong Wang 420787b10ecdSJiong Wang list_for_each_entry(meta, &nfp_prog->insns, l) { 420887b10ecdSJiong Wang if (meta->skip) 420987b10ecdSJiong Wang continue; 421087b10ecdSJiong Wang 421187b10ecdSJiong Wang if (is_mbpf_load_pkt(meta) && !meta->ldst_gather_len) { 421287b10ecdSJiong Wang if (meta->pkt_cache.do_init) { 421387b10ecdSJiong Wang range_start = meta->pkt_cache.range_start; 421487b10ecdSJiong Wang range_end = meta->pkt_cache.range_end; 421587b10ecdSJiong Wang } else { 421687b10ecdSJiong Wang meta->pkt_cache.range_start = range_start; 421787b10ecdSJiong Wang meta->pkt_cache.range_end = range_end; 421887b10ecdSJiong Wang } 421987b10ecdSJiong Wang } 422087b10ecdSJiong Wang } 422187b10ecdSJiong Wang } 422287b10ecdSJiong Wang 4223d9ae7f2bSJakub Kicinski static int nfp_bpf_optimize(struct nfp_prog *nfp_prog) 4224d9ae7f2bSJakub Kicinski { 4225d9ae7f2bSJakub Kicinski nfp_bpf_opt_reg_init(nfp_prog); 4226d9ae7f2bSJakub Kicinski 42276c59500cSJakub Kicinski nfp_bpf_opt_neg_add_sub(nfp_prog); 4228d9ae7f2bSJakub Kicinski nfp_bpf_opt_ld_mask(nfp_prog); 4229d9ae7f2bSJakub Kicinski nfp_bpf_opt_ld_shift(nfp_prog); 42306bc7103cSJiong Wang nfp_bpf_opt_ldst_gather(nfp_prog); 423187b10ecdSJiong Wang nfp_bpf_opt_pkt_cache(nfp_prog); 4232d9ae7f2bSJakub Kicinski 4233d9ae7f2bSJakub Kicinski return 0; 4234d9ae7f2bSJakub Kicinski } 4235d9ae7f2bSJakub Kicinski 4236b4264c96SJakub Kicinski static int nfp_bpf_replace_map_ptrs(struct nfp_prog *nfp_prog) 4237b4264c96SJakub Kicinski { 4238b4264c96SJakub Kicinski struct nfp_insn_meta *meta1, *meta2; 4239b4264c96SJakub Kicinski struct nfp_bpf_map *nfp_map; 4240b4264c96SJakub Kicinski struct bpf_map *map; 4241ab01f4acSJakub Kicinski u32 id; 4242b4264c96SJakub Kicinski 4243b4264c96SJakub Kicinski nfp_for_each_insn_walk2(nfp_prog, meta1, meta2) { 4244b4264c96SJakub Kicinski if (meta1->skip || meta2->skip) 4245b4264c96SJakub Kicinski continue; 4246b4264c96SJakub Kicinski 4247b4264c96SJakub Kicinski if (meta1->insn.code != (BPF_LD | BPF_IMM | BPF_DW) || 4248b4264c96SJakub Kicinski meta1->insn.src_reg != BPF_PSEUDO_MAP_FD) 4249b4264c96SJakub Kicinski continue; 4250b4264c96SJakub Kicinski 4251b4264c96SJakub Kicinski map = (void *)(unsigned long)((u32)meta1->insn.imm | 4252b4264c96SJakub Kicinski (u64)meta2->insn.imm << 32); 4253ab01f4acSJakub Kicinski if (bpf_map_offload_neutral(map)) { 4254ab01f4acSJakub Kicinski id = map->id; 4255ab01f4acSJakub Kicinski } else { 4256b4264c96SJakub Kicinski nfp_map = map_to_offmap(map)->dev_priv; 4257ab01f4acSJakub Kicinski id = nfp_map->tid; 4258ab01f4acSJakub Kicinski } 4259b4264c96SJakub Kicinski 4260ab01f4acSJakub Kicinski meta1->insn.imm = id; 4261b4264c96SJakub Kicinski meta2->insn.imm = 0; 4262b4264c96SJakub Kicinski } 4263b4264c96SJakub Kicinski 4264b4264c96SJakub Kicinski return 0; 4265b4264c96SJakub Kicinski } 4266b4264c96SJakub Kicinski 42672314fe9eSJakub Kicinski static int nfp_bpf_ustore_calc(u64 *prog, unsigned int len) 4268fd068ddcSJakub Kicinski { 42692314fe9eSJakub Kicinski __le64 *ustore = (__force __le64 *)prog; 4270fd068ddcSJakub Kicinski int i; 4271fd068ddcSJakub Kicinski 42722314fe9eSJakub Kicinski for (i = 0; i < len; i++) { 4273fd068ddcSJakub Kicinski int err; 4274fd068ddcSJakub Kicinski 42752314fe9eSJakub Kicinski err = nfp_ustore_check_valid_no_ecc(prog[i]); 4276fd068ddcSJakub Kicinski if (err) 4277fd068ddcSJakub Kicinski return err; 4278fd068ddcSJakub Kicinski 42792314fe9eSJakub Kicinski ustore[i] = cpu_to_le64(nfp_ustore_calc_ecc_insn(prog[i])); 4280fd068ddcSJakub Kicinski } 4281fd068ddcSJakub Kicinski 4282fd068ddcSJakub Kicinski return 0; 4283fd068ddcSJakub Kicinski } 4284fd068ddcSJakub Kicinski 428544a12eccSJakub Kicinski static void nfp_bpf_prog_trim(struct nfp_prog *nfp_prog) 428644a12eccSJakub Kicinski { 428744a12eccSJakub Kicinski void *prog; 428844a12eccSJakub Kicinski 428944a12eccSJakub Kicinski prog = kvmalloc_array(nfp_prog->prog_len, sizeof(u64), GFP_KERNEL); 429044a12eccSJakub Kicinski if (!prog) 429144a12eccSJakub Kicinski return; 429244a12eccSJakub Kicinski 429344a12eccSJakub Kicinski nfp_prog->__prog_alloc_len = nfp_prog->prog_len * sizeof(u64); 429444a12eccSJakub Kicinski memcpy(prog, nfp_prog->prog, nfp_prog->__prog_alloc_len); 429544a12eccSJakub Kicinski kvfree(nfp_prog->prog); 429644a12eccSJakub Kicinski nfp_prog->prog = prog; 429744a12eccSJakub Kicinski } 429844a12eccSJakub Kicinski 4299c6c580d7SJakub Kicinski int nfp_bpf_jit(struct nfp_prog *nfp_prog) 4300d9ae7f2bSJakub Kicinski { 4301d9ae7f2bSJakub Kicinski int ret; 4302d9ae7f2bSJakub Kicinski 4303b4264c96SJakub Kicinski ret = nfp_bpf_replace_map_ptrs(nfp_prog); 4304b4264c96SJakub Kicinski if (ret) 4305b4264c96SJakub Kicinski return ret; 4306b4264c96SJakub Kicinski 4307d9ae7f2bSJakub Kicinski ret = nfp_bpf_optimize(nfp_prog); 4308d9ae7f2bSJakub Kicinski if (ret) 43099314c442SJakub Kicinski return ret; 4310d9ae7f2bSJakub Kicinski 4311d9ae7f2bSJakub Kicinski ret = nfp_translate(nfp_prog); 4312d9ae7f2bSJakub Kicinski if (ret) { 4313d9ae7f2bSJakub Kicinski pr_err("Translation failed with error %d (translated: %u)\n", 4314d9ae7f2bSJakub Kicinski ret, nfp_prog->n_translated); 43159314c442SJakub Kicinski return -EINVAL; 4316d9ae7f2bSJakub Kicinski } 4317d9ae7f2bSJakub Kicinski 431844a12eccSJakub Kicinski nfp_bpf_prog_trim(nfp_prog); 431944a12eccSJakub Kicinski 43202314fe9eSJakub Kicinski return ret; 4321d9ae7f2bSJakub Kicinski } 43221549921dSJakub Kicinski 43231549921dSJakub Kicinski void nfp_bpf_jit_prepare(struct nfp_prog *nfp_prog, unsigned int cnt) 43241549921dSJakub Kicinski { 43251549921dSJakub Kicinski struct nfp_insn_meta *meta; 43261549921dSJakub Kicinski 43271549921dSJakub Kicinski /* Another pass to record jump information. */ 43281549921dSJakub Kicinski list_for_each_entry(meta, &nfp_prog->insns, l) { 43291549921dSJakub Kicinski struct nfp_insn_meta *dst_meta; 4330e3b49dc6SQuentin Monnet u64 code = meta->insn.code; 4331e3b49dc6SQuentin Monnet unsigned int dst_idx; 4332e3b49dc6SQuentin Monnet bool pseudo_call; 43331549921dSJakub Kicinski 4334e3b49dc6SQuentin Monnet if (BPF_CLASS(code) != BPF_JMP) 4335e3b49dc6SQuentin Monnet continue; 4336e3b49dc6SQuentin Monnet if (BPF_OP(code) == BPF_EXIT) 4337e3b49dc6SQuentin Monnet continue; 4338e3b49dc6SQuentin Monnet if (is_mbpf_helper_call(meta)) 4339e3b49dc6SQuentin Monnet continue; 43401549921dSJakub Kicinski 4341e3b49dc6SQuentin Monnet /* If opcode is BPF_CALL at this point, this can only be a 4342e3b49dc6SQuentin Monnet * BPF-to-BPF call (a.k.a pseudo call). 4343e3b49dc6SQuentin Monnet */ 4344e3b49dc6SQuentin Monnet pseudo_call = BPF_OP(code) == BPF_CALL; 4345e3b49dc6SQuentin Monnet 4346e3b49dc6SQuentin Monnet if (pseudo_call) 4347e3b49dc6SQuentin Monnet dst_idx = meta->n + 1 + meta->insn.imm; 4348e3b49dc6SQuentin Monnet else 4349e3b49dc6SQuentin Monnet dst_idx = meta->n + 1 + meta->insn.off; 4350e3b49dc6SQuentin Monnet 4351e3b49dc6SQuentin Monnet dst_meta = nfp_bpf_goto_meta(nfp_prog, meta, dst_idx, cnt); 4352e3b49dc6SQuentin Monnet 4353e3b49dc6SQuentin Monnet if (pseudo_call) 4354e3b49dc6SQuentin Monnet dst_meta->flags |= FLAG_INSN_IS_SUBPROG_START; 4355e3b49dc6SQuentin Monnet 43561549921dSJakub Kicinski dst_meta->flags |= FLAG_INSN_IS_JUMP_DST; 4357e3b49dc6SQuentin Monnet meta->jmp_dst = dst_meta; 43581549921dSJakub Kicinski } 43591549921dSJakub Kicinski } 43602314fe9eSJakub Kicinski 436174801e50SQuentin Monnet bool nfp_bpf_supported_opcode(u8 code) 436274801e50SQuentin Monnet { 436374801e50SQuentin Monnet return !!instr_cb[code]; 436474801e50SQuentin Monnet } 436574801e50SQuentin Monnet 43662314fe9eSJakub Kicinski void *nfp_bpf_relo_for_vnic(struct nfp_prog *nfp_prog, struct nfp_bpf_vnic *bv) 43672314fe9eSJakub Kicinski { 43682314fe9eSJakub Kicinski unsigned int i; 43692314fe9eSJakub Kicinski u64 *prog; 43702314fe9eSJakub Kicinski int err; 43712314fe9eSJakub Kicinski 43722314fe9eSJakub Kicinski prog = kmemdup(nfp_prog->prog, nfp_prog->prog_len * sizeof(u64), 43732314fe9eSJakub Kicinski GFP_KERNEL); 43742314fe9eSJakub Kicinski if (!prog) 43752314fe9eSJakub Kicinski return ERR_PTR(-ENOMEM); 43762314fe9eSJakub Kicinski 43772314fe9eSJakub Kicinski for (i = 0; i < nfp_prog->prog_len; i++) { 43782314fe9eSJakub Kicinski enum nfp_relo_type special; 437977a3d311SJakub Kicinski u32 val; 4380389f263bSQuentin Monnet u16 off; 43812314fe9eSJakub Kicinski 43822314fe9eSJakub Kicinski special = FIELD_GET(OP_RELO_TYPE, prog[i]); 43832314fe9eSJakub Kicinski switch (special) { 43842314fe9eSJakub Kicinski case RELO_NONE: 43852314fe9eSJakub Kicinski continue; 43862314fe9eSJakub Kicinski case RELO_BR_REL: 43872314fe9eSJakub Kicinski br_add_offset(&prog[i], bv->start_off); 43882314fe9eSJakub Kicinski break; 43892314fe9eSJakub Kicinski case RELO_BR_GO_OUT: 43902314fe9eSJakub Kicinski br_set_offset(&prog[i], 43912314fe9eSJakub Kicinski nfp_prog->tgt_out + bv->start_off); 43922314fe9eSJakub Kicinski break; 43932314fe9eSJakub Kicinski case RELO_BR_GO_ABORT: 43942314fe9eSJakub Kicinski br_set_offset(&prog[i], 43952314fe9eSJakub Kicinski nfp_prog->tgt_abort + bv->start_off); 43962314fe9eSJakub Kicinski break; 4397389f263bSQuentin Monnet case RELO_BR_GO_CALL_PUSH_REGS: 439844549623SQuentin Monnet if (!nfp_prog->tgt_call_push_regs) { 439944549623SQuentin Monnet pr_err("BUG: failed to detect subprogram registers needs\n"); 440044549623SQuentin Monnet err = -EINVAL; 440144549623SQuentin Monnet goto err_free_prog; 440244549623SQuentin Monnet } 4403389f263bSQuentin Monnet off = nfp_prog->tgt_call_push_regs + bv->start_off; 4404389f263bSQuentin Monnet br_set_offset(&prog[i], off); 4405389f263bSQuentin Monnet break; 4406389f263bSQuentin Monnet case RELO_BR_GO_CALL_POP_REGS: 440744549623SQuentin Monnet if (!nfp_prog->tgt_call_pop_regs) { 440844549623SQuentin Monnet pr_err("BUG: failed to detect subprogram registers needs\n"); 440944549623SQuentin Monnet err = -EINVAL; 441044549623SQuentin Monnet goto err_free_prog; 441144549623SQuentin Monnet } 4412389f263bSQuentin Monnet off = nfp_prog->tgt_call_pop_regs + bv->start_off; 4413389f263bSQuentin Monnet br_set_offset(&prog[i], off); 4414389f263bSQuentin Monnet break; 44152314fe9eSJakub Kicinski case RELO_BR_NEXT_PKT: 44162314fe9eSJakub Kicinski br_set_offset(&prog[i], bv->tgt_done); 44172314fe9eSJakub Kicinski break; 441877a3d311SJakub Kicinski case RELO_BR_HELPER: 441977a3d311SJakub Kicinski val = br_get_offset(prog[i]); 442077a3d311SJakub Kicinski val -= BR_OFF_RELO; 442177a3d311SJakub Kicinski switch (val) { 442277a3d311SJakub Kicinski case BPF_FUNC_map_lookup_elem: 442377a3d311SJakub Kicinski val = nfp_prog->bpf->helpers.map_lookup; 442477a3d311SJakub Kicinski break; 442544d65a47SJakub Kicinski case BPF_FUNC_map_update_elem: 442644d65a47SJakub Kicinski val = nfp_prog->bpf->helpers.map_update; 442744d65a47SJakub Kicinski break; 4428bfee64deSJakub Kicinski case BPF_FUNC_map_delete_elem: 4429bfee64deSJakub Kicinski val = nfp_prog->bpf->helpers.map_delete; 4430bfee64deSJakub Kicinski break; 44319816dd35SJakub Kicinski case BPF_FUNC_perf_event_output: 44329816dd35SJakub Kicinski val = nfp_prog->bpf->helpers.perf_event_output; 44339816dd35SJakub Kicinski break; 443477a3d311SJakub Kicinski default: 443577a3d311SJakub Kicinski pr_err("relocation of unknown helper %d\n", 443677a3d311SJakub Kicinski val); 443777a3d311SJakub Kicinski err = -EINVAL; 443877a3d311SJakub Kicinski goto err_free_prog; 443977a3d311SJakub Kicinski } 444077a3d311SJakub Kicinski br_set_offset(&prog[i], val); 444177a3d311SJakub Kicinski break; 444277a3d311SJakub Kicinski case RELO_IMMED_REL: 444377a3d311SJakub Kicinski immed_add_value(&prog[i], bv->start_off); 444477a3d311SJakub Kicinski break; 44452314fe9eSJakub Kicinski } 44462314fe9eSJakub Kicinski 44472314fe9eSJakub Kicinski prog[i] &= ~OP_RELO_TYPE; 44482314fe9eSJakub Kicinski } 44492314fe9eSJakub Kicinski 44502314fe9eSJakub Kicinski err = nfp_bpf_ustore_calc(prog, nfp_prog->prog_len); 44512314fe9eSJakub Kicinski if (err) 44522314fe9eSJakub Kicinski goto err_free_prog; 44532314fe9eSJakub Kicinski 44542314fe9eSJakub Kicinski return prog; 44552314fe9eSJakub Kicinski 44562314fe9eSJakub Kicinski err_free_prog: 44572314fe9eSJakub Kicinski kfree(prog); 44582314fe9eSJakub Kicinski return ERR_PTR(err); 44592314fe9eSJakub Kicinski } 4460