1 /* 2 * Copyright (C) 2016 Netronome Systems, Inc. 3 * 4 * This software is dual licensed under the GNU General License Version 2, 5 * June 1991 as shown in the file COPYING in the top-level directory of this 6 * source tree or the BSD 2-Clause License provided below. You have the 7 * option to license this software under the complete terms of either license. 8 * 9 * The BSD 2-Clause License: 10 * 11 * Redistribution and use in source and binary forms, with or 12 * without modification, are permitted provided that the following 13 * conditions are met: 14 * 15 * 1. Redistributions of source code must retain the above 16 * copyright notice, this list of conditions and the following 17 * disclaimer. 18 * 19 * 2. Redistributions in binary form must reproduce the above 20 * copyright notice, this list of conditions and the following 21 * disclaimer in the documentation and/or other materials 22 * provided with the distribution. 23 * 24 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, 25 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF 26 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND 27 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS 28 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN 29 * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN 30 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 31 * SOFTWARE. 32 */ 33 34 #define pr_fmt(fmt) "NFP net bpf: " fmt 35 36 #include <linux/kernel.h> 37 #include <linux/bpf.h> 38 #include <linux/filter.h> 39 #include <linux/pkt_cls.h> 40 #include <linux/unistd.h> 41 42 #include "main.h" 43 #include "../nfp_asm.h" 44 45 /* --- NFP prog --- */ 46 /* Foreach "multiple" entries macros provide pos and next<n> pointers. 47 * It's safe to modify the next pointers (but not pos). 48 */ 49 #define nfp_for_each_insn_walk2(nfp_prog, pos, next) \ 50 for (pos = list_first_entry(&(nfp_prog)->insns, typeof(*pos), l), \ 51 next = list_next_entry(pos, l); \ 52 &(nfp_prog)->insns != &pos->l && \ 53 &(nfp_prog)->insns != &next->l; \ 54 pos = nfp_meta_next(pos), \ 55 next = nfp_meta_next(pos)) 56 57 #define nfp_for_each_insn_walk3(nfp_prog, pos, next, next2) \ 58 for (pos = list_first_entry(&(nfp_prog)->insns, typeof(*pos), l), \ 59 next = list_next_entry(pos, l), \ 60 next2 = list_next_entry(next, l); \ 61 &(nfp_prog)->insns != &pos->l && \ 62 &(nfp_prog)->insns != &next->l && \ 63 &(nfp_prog)->insns != &next2->l; \ 64 pos = nfp_meta_next(pos), \ 65 next = nfp_meta_next(pos), \ 66 next2 = nfp_meta_next(next)) 67 68 static bool 69 nfp_meta_has_next(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 70 { 71 return meta->l.next != &nfp_prog->insns; 72 } 73 74 static bool 75 nfp_meta_has_prev(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 76 { 77 return meta->l.prev != &nfp_prog->insns; 78 } 79 80 static void nfp_prog_free(struct nfp_prog *nfp_prog) 81 { 82 struct nfp_insn_meta *meta, *tmp; 83 84 list_for_each_entry_safe(meta, tmp, &nfp_prog->insns, l) { 85 list_del(&meta->l); 86 kfree(meta); 87 } 88 kfree(nfp_prog); 89 } 90 91 static void nfp_prog_push(struct nfp_prog *nfp_prog, u64 insn) 92 { 93 if (nfp_prog->__prog_alloc_len == nfp_prog->prog_len) { 94 nfp_prog->error = -ENOSPC; 95 return; 96 } 97 98 nfp_prog->prog[nfp_prog->prog_len] = insn; 99 nfp_prog->prog_len++; 100 } 101 102 static unsigned int nfp_prog_current_offset(struct nfp_prog *nfp_prog) 103 { 104 return nfp_prog->start_off + nfp_prog->prog_len; 105 } 106 107 static unsigned int 108 nfp_prog_offset_to_index(struct nfp_prog *nfp_prog, unsigned int offset) 109 { 110 return offset - nfp_prog->start_off; 111 } 112 113 /* --- Emitters --- */ 114 static void 115 __emit_cmd(struct nfp_prog *nfp_prog, enum cmd_tgt_map op, 116 u8 mode, u8 xfer, u8 areg, u8 breg, u8 size, bool sync) 117 { 118 enum cmd_ctx_swap ctx; 119 u64 insn; 120 121 if (sync) 122 ctx = CMD_CTX_SWAP; 123 else 124 ctx = CMD_CTX_NO_SWAP; 125 126 insn = FIELD_PREP(OP_CMD_A_SRC, areg) | 127 FIELD_PREP(OP_CMD_CTX, ctx) | 128 FIELD_PREP(OP_CMD_B_SRC, breg) | 129 FIELD_PREP(OP_CMD_TOKEN, cmd_tgt_act[op].token) | 130 FIELD_PREP(OP_CMD_XFER, xfer) | 131 FIELD_PREP(OP_CMD_CNT, size) | 132 FIELD_PREP(OP_CMD_SIG, sync) | 133 FIELD_PREP(OP_CMD_TGT_CMD, cmd_tgt_act[op].tgt_cmd) | 134 FIELD_PREP(OP_CMD_MODE, mode); 135 136 nfp_prog_push(nfp_prog, insn); 137 } 138 139 static void 140 emit_cmd(struct nfp_prog *nfp_prog, enum cmd_tgt_map op, 141 u8 mode, u8 xfer, swreg lreg, swreg rreg, u8 size, bool sync) 142 { 143 struct nfp_insn_re_regs reg; 144 int err; 145 146 err = swreg_to_restricted(reg_none(), lreg, rreg, ®, false); 147 if (err) { 148 nfp_prog->error = err; 149 return; 150 } 151 if (reg.swap) { 152 pr_err("cmd can't swap arguments\n"); 153 nfp_prog->error = -EFAULT; 154 return; 155 } 156 if (reg.dst_lmextn || reg.src_lmextn) { 157 pr_err("cmd can't use LMextn\n"); 158 nfp_prog->error = -EFAULT; 159 return; 160 } 161 162 __emit_cmd(nfp_prog, op, mode, xfer, reg.areg, reg.breg, size, sync); 163 } 164 165 static void 166 __emit_br(struct nfp_prog *nfp_prog, enum br_mask mask, enum br_ev_pip ev_pip, 167 enum br_ctx_signal_state css, u16 addr, u8 defer) 168 { 169 u16 addr_lo, addr_hi; 170 u64 insn; 171 172 addr_lo = addr & (OP_BR_ADDR_LO >> __bf_shf(OP_BR_ADDR_LO)); 173 addr_hi = addr != addr_lo; 174 175 insn = OP_BR_BASE | 176 FIELD_PREP(OP_BR_MASK, mask) | 177 FIELD_PREP(OP_BR_EV_PIP, ev_pip) | 178 FIELD_PREP(OP_BR_CSS, css) | 179 FIELD_PREP(OP_BR_DEFBR, defer) | 180 FIELD_PREP(OP_BR_ADDR_LO, addr_lo) | 181 FIELD_PREP(OP_BR_ADDR_HI, addr_hi); 182 183 nfp_prog_push(nfp_prog, insn); 184 } 185 186 static void emit_br_def(struct nfp_prog *nfp_prog, u16 addr, u8 defer) 187 { 188 if (defer > 2) { 189 pr_err("BUG: branch defer out of bounds %d\n", defer); 190 nfp_prog->error = -EFAULT; 191 return; 192 } 193 __emit_br(nfp_prog, BR_UNC, BR_EV_PIP_UNCOND, BR_CSS_NONE, addr, defer); 194 } 195 196 static void 197 emit_br(struct nfp_prog *nfp_prog, enum br_mask mask, u16 addr, u8 defer) 198 { 199 __emit_br(nfp_prog, mask, 200 mask != BR_UNC ? BR_EV_PIP_COND : BR_EV_PIP_UNCOND, 201 BR_CSS_NONE, addr, defer); 202 } 203 204 static void 205 __emit_br_byte(struct nfp_prog *nfp_prog, u8 areg, u8 breg, bool imm8, 206 u8 byte, bool equal, u16 addr, u8 defer, bool src_lmextn) 207 { 208 u16 addr_lo, addr_hi; 209 u64 insn; 210 211 addr_lo = addr & (OP_BB_ADDR_LO >> __bf_shf(OP_BB_ADDR_LO)); 212 addr_hi = addr != addr_lo; 213 214 insn = OP_BBYTE_BASE | 215 FIELD_PREP(OP_BB_A_SRC, areg) | 216 FIELD_PREP(OP_BB_BYTE, byte) | 217 FIELD_PREP(OP_BB_B_SRC, breg) | 218 FIELD_PREP(OP_BB_I8, imm8) | 219 FIELD_PREP(OP_BB_EQ, equal) | 220 FIELD_PREP(OP_BB_DEFBR, defer) | 221 FIELD_PREP(OP_BB_ADDR_LO, addr_lo) | 222 FIELD_PREP(OP_BB_ADDR_HI, addr_hi) | 223 FIELD_PREP(OP_BB_SRC_LMEXTN, src_lmextn); 224 225 nfp_prog_push(nfp_prog, insn); 226 } 227 228 static void 229 emit_br_byte_neq(struct nfp_prog *nfp_prog, 230 swreg src, u8 imm, u8 byte, u16 addr, u8 defer) 231 { 232 struct nfp_insn_re_regs reg; 233 int err; 234 235 err = swreg_to_restricted(reg_none(), src, reg_imm(imm), ®, true); 236 if (err) { 237 nfp_prog->error = err; 238 return; 239 } 240 241 __emit_br_byte(nfp_prog, reg.areg, reg.breg, reg.i8, byte, false, addr, 242 defer, reg.src_lmextn); 243 } 244 245 static void 246 __emit_immed(struct nfp_prog *nfp_prog, u16 areg, u16 breg, u16 imm_hi, 247 enum immed_width width, bool invert, 248 enum immed_shift shift, bool wr_both, 249 bool dst_lmextn, bool src_lmextn) 250 { 251 u64 insn; 252 253 insn = OP_IMMED_BASE | 254 FIELD_PREP(OP_IMMED_A_SRC, areg) | 255 FIELD_PREP(OP_IMMED_B_SRC, breg) | 256 FIELD_PREP(OP_IMMED_IMM, imm_hi) | 257 FIELD_PREP(OP_IMMED_WIDTH, width) | 258 FIELD_PREP(OP_IMMED_INV, invert) | 259 FIELD_PREP(OP_IMMED_SHIFT, shift) | 260 FIELD_PREP(OP_IMMED_WR_AB, wr_both) | 261 FIELD_PREP(OP_IMMED_SRC_LMEXTN, src_lmextn) | 262 FIELD_PREP(OP_IMMED_DST_LMEXTN, dst_lmextn); 263 264 nfp_prog_push(nfp_prog, insn); 265 } 266 267 static void 268 emit_immed(struct nfp_prog *nfp_prog, swreg dst, u16 imm, 269 enum immed_width width, bool invert, enum immed_shift shift) 270 { 271 struct nfp_insn_ur_regs reg; 272 int err; 273 274 if (swreg_type(dst) == NN_REG_IMM) { 275 nfp_prog->error = -EFAULT; 276 return; 277 } 278 279 err = swreg_to_unrestricted(dst, dst, reg_imm(imm & 0xff), ®); 280 if (err) { 281 nfp_prog->error = err; 282 return; 283 } 284 285 __emit_immed(nfp_prog, reg.areg, reg.breg, imm >> 8, width, 286 invert, shift, reg.wr_both, 287 reg.dst_lmextn, reg.src_lmextn); 288 } 289 290 static void 291 __emit_shf(struct nfp_prog *nfp_prog, u16 dst, enum alu_dst_ab dst_ab, 292 enum shf_sc sc, u8 shift, 293 u16 areg, enum shf_op op, u16 breg, bool i8, bool sw, bool wr_both, 294 bool dst_lmextn, bool src_lmextn) 295 { 296 u64 insn; 297 298 if (!FIELD_FIT(OP_SHF_SHIFT, shift)) { 299 nfp_prog->error = -EFAULT; 300 return; 301 } 302 303 if (sc == SHF_SC_L_SHF) 304 shift = 32 - shift; 305 306 insn = OP_SHF_BASE | 307 FIELD_PREP(OP_SHF_A_SRC, areg) | 308 FIELD_PREP(OP_SHF_SC, sc) | 309 FIELD_PREP(OP_SHF_B_SRC, breg) | 310 FIELD_PREP(OP_SHF_I8, i8) | 311 FIELD_PREP(OP_SHF_SW, sw) | 312 FIELD_PREP(OP_SHF_DST, dst) | 313 FIELD_PREP(OP_SHF_SHIFT, shift) | 314 FIELD_PREP(OP_SHF_OP, op) | 315 FIELD_PREP(OP_SHF_DST_AB, dst_ab) | 316 FIELD_PREP(OP_SHF_WR_AB, wr_both) | 317 FIELD_PREP(OP_SHF_SRC_LMEXTN, src_lmextn) | 318 FIELD_PREP(OP_SHF_DST_LMEXTN, dst_lmextn); 319 320 nfp_prog_push(nfp_prog, insn); 321 } 322 323 static void 324 emit_shf(struct nfp_prog *nfp_prog, swreg dst, 325 swreg lreg, enum shf_op op, swreg rreg, enum shf_sc sc, u8 shift) 326 { 327 struct nfp_insn_re_regs reg; 328 int err; 329 330 err = swreg_to_restricted(dst, lreg, rreg, ®, true); 331 if (err) { 332 nfp_prog->error = err; 333 return; 334 } 335 336 __emit_shf(nfp_prog, reg.dst, reg.dst_ab, sc, shift, 337 reg.areg, op, reg.breg, reg.i8, reg.swap, reg.wr_both, 338 reg.dst_lmextn, reg.src_lmextn); 339 } 340 341 static void 342 __emit_alu(struct nfp_prog *nfp_prog, u16 dst, enum alu_dst_ab dst_ab, 343 u16 areg, enum alu_op op, u16 breg, bool swap, bool wr_both, 344 bool dst_lmextn, bool src_lmextn) 345 { 346 u64 insn; 347 348 insn = OP_ALU_BASE | 349 FIELD_PREP(OP_ALU_A_SRC, areg) | 350 FIELD_PREP(OP_ALU_B_SRC, breg) | 351 FIELD_PREP(OP_ALU_DST, dst) | 352 FIELD_PREP(OP_ALU_SW, swap) | 353 FIELD_PREP(OP_ALU_OP, op) | 354 FIELD_PREP(OP_ALU_DST_AB, dst_ab) | 355 FIELD_PREP(OP_ALU_WR_AB, wr_both) | 356 FIELD_PREP(OP_ALU_SRC_LMEXTN, src_lmextn) | 357 FIELD_PREP(OP_ALU_DST_LMEXTN, dst_lmextn); 358 359 nfp_prog_push(nfp_prog, insn); 360 } 361 362 static void 363 emit_alu(struct nfp_prog *nfp_prog, swreg dst, 364 swreg lreg, enum alu_op op, swreg rreg) 365 { 366 struct nfp_insn_ur_regs reg; 367 int err; 368 369 err = swreg_to_unrestricted(dst, lreg, rreg, ®); 370 if (err) { 371 nfp_prog->error = err; 372 return; 373 } 374 375 __emit_alu(nfp_prog, reg.dst, reg.dst_ab, 376 reg.areg, op, reg.breg, reg.swap, reg.wr_both, 377 reg.dst_lmextn, reg.src_lmextn); 378 } 379 380 static void 381 __emit_ld_field(struct nfp_prog *nfp_prog, enum shf_sc sc, 382 u8 areg, u8 bmask, u8 breg, u8 shift, bool imm8, 383 bool zero, bool swap, bool wr_both, 384 bool dst_lmextn, bool src_lmextn) 385 { 386 u64 insn; 387 388 insn = OP_LDF_BASE | 389 FIELD_PREP(OP_LDF_A_SRC, areg) | 390 FIELD_PREP(OP_LDF_SC, sc) | 391 FIELD_PREP(OP_LDF_B_SRC, breg) | 392 FIELD_PREP(OP_LDF_I8, imm8) | 393 FIELD_PREP(OP_LDF_SW, swap) | 394 FIELD_PREP(OP_LDF_ZF, zero) | 395 FIELD_PREP(OP_LDF_BMASK, bmask) | 396 FIELD_PREP(OP_LDF_SHF, shift) | 397 FIELD_PREP(OP_LDF_WR_AB, wr_both) | 398 FIELD_PREP(OP_LDF_SRC_LMEXTN, src_lmextn) | 399 FIELD_PREP(OP_LDF_DST_LMEXTN, dst_lmextn); 400 401 nfp_prog_push(nfp_prog, insn); 402 } 403 404 static void 405 emit_ld_field_any(struct nfp_prog *nfp_prog, enum shf_sc sc, u8 shift, 406 swreg dst, u8 bmask, swreg src, bool zero) 407 { 408 struct nfp_insn_re_regs reg; 409 int err; 410 411 err = swreg_to_restricted(reg_none(), dst, src, ®, true); 412 if (err) { 413 nfp_prog->error = err; 414 return; 415 } 416 417 __emit_ld_field(nfp_prog, sc, reg.areg, bmask, reg.breg, shift, 418 reg.i8, zero, reg.swap, reg.wr_both, 419 reg.dst_lmextn, reg.src_lmextn); 420 } 421 422 static void 423 emit_ld_field(struct nfp_prog *nfp_prog, swreg dst, u8 bmask, swreg src, 424 enum shf_sc sc, u8 shift) 425 { 426 emit_ld_field_any(nfp_prog, sc, shift, dst, bmask, src, false); 427 } 428 429 static void emit_nop(struct nfp_prog *nfp_prog) 430 { 431 __emit_immed(nfp_prog, UR_REG_IMM, UR_REG_IMM, 0, 0, 0, 0, 0, 0, 0); 432 } 433 434 /* --- Wrappers --- */ 435 static bool pack_immed(u32 imm, u16 *val, enum immed_shift *shift) 436 { 437 if (!(imm & 0xffff0000)) { 438 *val = imm; 439 *shift = IMMED_SHIFT_0B; 440 } else if (!(imm & 0xff0000ff)) { 441 *val = imm >> 8; 442 *shift = IMMED_SHIFT_1B; 443 } else if (!(imm & 0x0000ffff)) { 444 *val = imm >> 16; 445 *shift = IMMED_SHIFT_2B; 446 } else { 447 return false; 448 } 449 450 return true; 451 } 452 453 static void wrp_immed(struct nfp_prog *nfp_prog, swreg dst, u32 imm) 454 { 455 enum immed_shift shift; 456 u16 val; 457 458 if (pack_immed(imm, &val, &shift)) { 459 emit_immed(nfp_prog, dst, val, IMMED_WIDTH_ALL, false, shift); 460 } else if (pack_immed(~imm, &val, &shift)) { 461 emit_immed(nfp_prog, dst, val, IMMED_WIDTH_ALL, true, shift); 462 } else { 463 emit_immed(nfp_prog, dst, imm & 0xffff, IMMED_WIDTH_ALL, 464 false, IMMED_SHIFT_0B); 465 emit_immed(nfp_prog, dst, imm >> 16, IMMED_WIDTH_WORD, 466 false, IMMED_SHIFT_2B); 467 } 468 } 469 470 /* ur_load_imm_any() - encode immediate or use tmp register (unrestricted) 471 * If the @imm is small enough encode it directly in operand and return 472 * otherwise load @imm to a spare register and return its encoding. 473 */ 474 static swreg ur_load_imm_any(struct nfp_prog *nfp_prog, u32 imm, swreg tmp_reg) 475 { 476 if (FIELD_FIT(UR_REG_IMM_MAX, imm)) 477 return reg_imm(imm); 478 479 wrp_immed(nfp_prog, tmp_reg, imm); 480 return tmp_reg; 481 } 482 483 /* re_load_imm_any() - encode immediate or use tmp register (restricted) 484 * If the @imm is small enough encode it directly in operand and return 485 * otherwise load @imm to a spare register and return its encoding. 486 */ 487 static swreg re_load_imm_any(struct nfp_prog *nfp_prog, u32 imm, swreg tmp_reg) 488 { 489 if (FIELD_FIT(RE_REG_IMM_MAX, imm)) 490 return reg_imm(imm); 491 492 wrp_immed(nfp_prog, tmp_reg, imm); 493 return tmp_reg; 494 } 495 496 static void 497 wrp_br_special(struct nfp_prog *nfp_prog, enum br_mask mask, 498 enum br_special special) 499 { 500 emit_br(nfp_prog, mask, 0, 0); 501 502 nfp_prog->prog[nfp_prog->prog_len - 1] |= 503 FIELD_PREP(OP_BR_SPECIAL, special); 504 } 505 506 static void wrp_reg_mov(struct nfp_prog *nfp_prog, u16 dst, u16 src) 507 { 508 emit_alu(nfp_prog, reg_both(dst), reg_none(), ALU_OP_NONE, reg_b(src)); 509 } 510 511 static int 512 construct_data_ind_ld(struct nfp_prog *nfp_prog, u16 offset, 513 u16 src, bool src_valid, u8 size) 514 { 515 unsigned int i; 516 u16 shift, sz; 517 swreg tmp_reg; 518 519 /* We load the value from the address indicated in @offset and then 520 * shift out the data we don't need. Note: this is big endian! 521 */ 522 sz = size < 4 ? 4 : size; 523 shift = size < 4 ? 4 - size : 0; 524 525 if (src_valid) { 526 /* Calculate the true offset (src_reg + imm) */ 527 tmp_reg = ur_load_imm_any(nfp_prog, offset, imm_b(nfp_prog)); 528 emit_alu(nfp_prog, imm_both(nfp_prog), 529 reg_a(src), ALU_OP_ADD, tmp_reg); 530 /* Check packet length (size guaranteed to fit b/c it's u8) */ 531 emit_alu(nfp_prog, imm_a(nfp_prog), 532 imm_a(nfp_prog), ALU_OP_ADD, reg_imm(size)); 533 emit_alu(nfp_prog, reg_none(), 534 plen_reg(nfp_prog), ALU_OP_SUB, imm_a(nfp_prog)); 535 wrp_br_special(nfp_prog, BR_BLO, OP_BR_GO_ABORT); 536 /* Load data */ 537 emit_cmd(nfp_prog, CMD_TGT_READ8, CMD_MODE_32b, 0, 538 pptr_reg(nfp_prog), imm_b(nfp_prog), sz - 1, true); 539 } else { 540 /* Check packet length */ 541 tmp_reg = ur_load_imm_any(nfp_prog, offset + size, 542 imm_a(nfp_prog)); 543 emit_alu(nfp_prog, reg_none(), 544 plen_reg(nfp_prog), ALU_OP_SUB, tmp_reg); 545 wrp_br_special(nfp_prog, BR_BLO, OP_BR_GO_ABORT); 546 /* Load data */ 547 tmp_reg = re_load_imm_any(nfp_prog, offset, imm_b(nfp_prog)); 548 emit_cmd(nfp_prog, CMD_TGT_READ8, CMD_MODE_32b, 0, 549 pptr_reg(nfp_prog), tmp_reg, sz - 1, true); 550 } 551 552 i = 0; 553 if (shift) 554 emit_shf(nfp_prog, reg_both(0), reg_none(), SHF_OP_NONE, 555 reg_xfer(0), SHF_SC_R_SHF, shift * 8); 556 else 557 for (; i * 4 < size; i++) 558 emit_alu(nfp_prog, reg_both(i), 559 reg_none(), ALU_OP_NONE, reg_xfer(i)); 560 561 if (i < 2) 562 wrp_immed(nfp_prog, reg_both(1), 0); 563 564 return 0; 565 } 566 567 static int construct_data_ld(struct nfp_prog *nfp_prog, u16 offset, u8 size) 568 { 569 return construct_data_ind_ld(nfp_prog, offset, 0, false, size); 570 } 571 572 static void 573 wrp_alu_imm(struct nfp_prog *nfp_prog, u8 dst, enum alu_op alu_op, u32 imm) 574 { 575 swreg tmp_reg; 576 577 if (alu_op == ALU_OP_AND) { 578 if (!imm) 579 wrp_immed(nfp_prog, reg_both(dst), 0); 580 if (!imm || !~imm) 581 return; 582 } 583 if (alu_op == ALU_OP_OR) { 584 if (!~imm) 585 wrp_immed(nfp_prog, reg_both(dst), ~0U); 586 if (!imm || !~imm) 587 return; 588 } 589 if (alu_op == ALU_OP_XOR) { 590 if (!~imm) 591 emit_alu(nfp_prog, reg_both(dst), reg_none(), 592 ALU_OP_NEG, reg_b(dst)); 593 if (!imm || !~imm) 594 return; 595 } 596 597 tmp_reg = ur_load_imm_any(nfp_prog, imm, imm_b(nfp_prog)); 598 emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, tmp_reg); 599 } 600 601 static int 602 wrp_alu64_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 603 enum alu_op alu_op, bool skip) 604 { 605 const struct bpf_insn *insn = &meta->insn; 606 u64 imm = insn->imm; /* sign extend */ 607 608 if (skip) { 609 meta->skip = true; 610 return 0; 611 } 612 613 wrp_alu_imm(nfp_prog, insn->dst_reg * 2, alu_op, imm & ~0U); 614 wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, alu_op, imm >> 32); 615 616 return 0; 617 } 618 619 static int 620 wrp_alu64_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 621 enum alu_op alu_op) 622 { 623 u8 dst = meta->insn.dst_reg * 2, src = meta->insn.src_reg * 2; 624 625 emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, reg_b(src)); 626 emit_alu(nfp_prog, reg_both(dst + 1), 627 reg_a(dst + 1), alu_op, reg_b(src + 1)); 628 629 return 0; 630 } 631 632 static int 633 wrp_alu32_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 634 enum alu_op alu_op, bool skip) 635 { 636 const struct bpf_insn *insn = &meta->insn; 637 638 if (skip) { 639 meta->skip = true; 640 return 0; 641 } 642 643 wrp_alu_imm(nfp_prog, insn->dst_reg * 2, alu_op, insn->imm); 644 wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0); 645 646 return 0; 647 } 648 649 static int 650 wrp_alu32_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 651 enum alu_op alu_op) 652 { 653 u8 dst = meta->insn.dst_reg * 2, src = meta->insn.src_reg * 2; 654 655 emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, reg_b(src)); 656 wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0); 657 658 return 0; 659 } 660 661 static void 662 wrp_test_reg_one(struct nfp_prog *nfp_prog, u8 dst, enum alu_op alu_op, u8 src, 663 enum br_mask br_mask, u16 off) 664 { 665 emit_alu(nfp_prog, reg_none(), reg_a(dst), alu_op, reg_b(src)); 666 emit_br(nfp_prog, br_mask, off, 0); 667 } 668 669 static int 670 wrp_test_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 671 enum alu_op alu_op, enum br_mask br_mask) 672 { 673 const struct bpf_insn *insn = &meta->insn; 674 675 if (insn->off < 0) /* TODO */ 676 return -EOPNOTSUPP; 677 678 wrp_test_reg_one(nfp_prog, insn->dst_reg * 2, alu_op, 679 insn->src_reg * 2, br_mask, insn->off); 680 wrp_test_reg_one(nfp_prog, insn->dst_reg * 2 + 1, alu_op, 681 insn->src_reg * 2 + 1, br_mask, insn->off); 682 683 return 0; 684 } 685 686 static int 687 wrp_cmp_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 688 enum br_mask br_mask, bool swap) 689 { 690 const struct bpf_insn *insn = &meta->insn; 691 u64 imm = insn->imm; /* sign extend */ 692 u8 reg = insn->dst_reg * 2; 693 swreg tmp_reg; 694 695 if (insn->off < 0) /* TODO */ 696 return -EOPNOTSUPP; 697 698 tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog)); 699 if (!swap) 700 emit_alu(nfp_prog, reg_none(), reg_a(reg), ALU_OP_SUB, tmp_reg); 701 else 702 emit_alu(nfp_prog, reg_none(), tmp_reg, ALU_OP_SUB, reg_a(reg)); 703 704 tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog)); 705 if (!swap) 706 emit_alu(nfp_prog, reg_none(), 707 reg_a(reg + 1), ALU_OP_SUB_C, tmp_reg); 708 else 709 emit_alu(nfp_prog, reg_none(), 710 tmp_reg, ALU_OP_SUB_C, reg_a(reg + 1)); 711 712 emit_br(nfp_prog, br_mask, insn->off, 0); 713 714 return 0; 715 } 716 717 static int 718 wrp_cmp_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 719 enum br_mask br_mask, bool swap) 720 { 721 const struct bpf_insn *insn = &meta->insn; 722 u8 areg = insn->src_reg * 2, breg = insn->dst_reg * 2; 723 724 if (insn->off < 0) /* TODO */ 725 return -EOPNOTSUPP; 726 727 if (swap) { 728 areg ^= breg; 729 breg ^= areg; 730 areg ^= breg; 731 } 732 733 emit_alu(nfp_prog, reg_none(), reg_a(areg), ALU_OP_SUB, reg_b(breg)); 734 emit_alu(nfp_prog, reg_none(), 735 reg_a(areg + 1), ALU_OP_SUB_C, reg_b(breg + 1)); 736 emit_br(nfp_prog, br_mask, insn->off, 0); 737 738 return 0; 739 } 740 741 /* --- Callbacks --- */ 742 static int mov_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 743 { 744 const struct bpf_insn *insn = &meta->insn; 745 746 wrp_reg_mov(nfp_prog, insn->dst_reg * 2, insn->src_reg * 2); 747 wrp_reg_mov(nfp_prog, insn->dst_reg * 2 + 1, insn->src_reg * 2 + 1); 748 749 return 0; 750 } 751 752 static int mov_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 753 { 754 u64 imm = meta->insn.imm; /* sign extend */ 755 756 wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2), imm & ~0U); 757 wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), imm >> 32); 758 759 return 0; 760 } 761 762 static int xor_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 763 { 764 return wrp_alu64_reg(nfp_prog, meta, ALU_OP_XOR); 765 } 766 767 static int xor_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 768 { 769 return wrp_alu64_imm(nfp_prog, meta, ALU_OP_XOR, !meta->insn.imm); 770 } 771 772 static int and_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 773 { 774 return wrp_alu64_reg(nfp_prog, meta, ALU_OP_AND); 775 } 776 777 static int and_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 778 { 779 return wrp_alu64_imm(nfp_prog, meta, ALU_OP_AND, !~meta->insn.imm); 780 } 781 782 static int or_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 783 { 784 return wrp_alu64_reg(nfp_prog, meta, ALU_OP_OR); 785 } 786 787 static int or_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 788 { 789 return wrp_alu64_imm(nfp_prog, meta, ALU_OP_OR, !meta->insn.imm); 790 } 791 792 static int add_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 793 { 794 const struct bpf_insn *insn = &meta->insn; 795 796 emit_alu(nfp_prog, reg_both(insn->dst_reg * 2), 797 reg_a(insn->dst_reg * 2), ALU_OP_ADD, 798 reg_b(insn->src_reg * 2)); 799 emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 800 reg_a(insn->dst_reg * 2 + 1), ALU_OP_ADD_C, 801 reg_b(insn->src_reg * 2 + 1)); 802 803 return 0; 804 } 805 806 static int add_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 807 { 808 const struct bpf_insn *insn = &meta->insn; 809 u64 imm = insn->imm; /* sign extend */ 810 811 wrp_alu_imm(nfp_prog, insn->dst_reg * 2, ALU_OP_ADD, imm & ~0U); 812 wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, ALU_OP_ADD_C, imm >> 32); 813 814 return 0; 815 } 816 817 static int sub_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 818 { 819 const struct bpf_insn *insn = &meta->insn; 820 821 emit_alu(nfp_prog, reg_both(insn->dst_reg * 2), 822 reg_a(insn->dst_reg * 2), ALU_OP_SUB, 823 reg_b(insn->src_reg * 2)); 824 emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 825 reg_a(insn->dst_reg * 2 + 1), ALU_OP_SUB_C, 826 reg_b(insn->src_reg * 2 + 1)); 827 828 return 0; 829 } 830 831 static int sub_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 832 { 833 const struct bpf_insn *insn = &meta->insn; 834 u64 imm = insn->imm; /* sign extend */ 835 836 wrp_alu_imm(nfp_prog, insn->dst_reg * 2, ALU_OP_SUB, imm & ~0U); 837 wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, ALU_OP_SUB_C, imm >> 32); 838 839 return 0; 840 } 841 842 static int shl_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 843 { 844 const struct bpf_insn *insn = &meta->insn; 845 u8 dst = insn->dst_reg * 2; 846 847 if (insn->imm < 32) { 848 emit_shf(nfp_prog, reg_both(dst + 1), 849 reg_a(dst + 1), SHF_OP_NONE, reg_b(dst), 850 SHF_SC_R_DSHF, 32 - insn->imm); 851 emit_shf(nfp_prog, reg_both(dst), 852 reg_none(), SHF_OP_NONE, reg_b(dst), 853 SHF_SC_L_SHF, insn->imm); 854 } else if (insn->imm == 32) { 855 wrp_reg_mov(nfp_prog, dst + 1, dst); 856 wrp_immed(nfp_prog, reg_both(dst), 0); 857 } else if (insn->imm > 32) { 858 emit_shf(nfp_prog, reg_both(dst + 1), 859 reg_none(), SHF_OP_NONE, reg_b(dst), 860 SHF_SC_L_SHF, insn->imm - 32); 861 wrp_immed(nfp_prog, reg_both(dst), 0); 862 } 863 864 return 0; 865 } 866 867 static int shr_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 868 { 869 const struct bpf_insn *insn = &meta->insn; 870 u8 dst = insn->dst_reg * 2; 871 872 if (insn->imm < 32) { 873 emit_shf(nfp_prog, reg_both(dst), 874 reg_a(dst + 1), SHF_OP_NONE, reg_b(dst), 875 SHF_SC_R_DSHF, insn->imm); 876 emit_shf(nfp_prog, reg_both(dst + 1), 877 reg_none(), SHF_OP_NONE, reg_b(dst + 1), 878 SHF_SC_R_SHF, insn->imm); 879 } else if (insn->imm == 32) { 880 wrp_reg_mov(nfp_prog, dst, dst + 1); 881 wrp_immed(nfp_prog, reg_both(dst + 1), 0); 882 } else if (insn->imm > 32) { 883 emit_shf(nfp_prog, reg_both(dst), 884 reg_none(), SHF_OP_NONE, reg_b(dst + 1), 885 SHF_SC_R_SHF, insn->imm - 32); 886 wrp_immed(nfp_prog, reg_both(dst + 1), 0); 887 } 888 889 return 0; 890 } 891 892 static int mov_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 893 { 894 const struct bpf_insn *insn = &meta->insn; 895 896 wrp_reg_mov(nfp_prog, insn->dst_reg * 2, insn->src_reg * 2); 897 wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0); 898 899 return 0; 900 } 901 902 static int mov_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 903 { 904 const struct bpf_insn *insn = &meta->insn; 905 906 wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2), insn->imm); 907 wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0); 908 909 return 0; 910 } 911 912 static int xor_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 913 { 914 return wrp_alu32_reg(nfp_prog, meta, ALU_OP_XOR); 915 } 916 917 static int xor_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 918 { 919 return wrp_alu32_imm(nfp_prog, meta, ALU_OP_XOR, !~meta->insn.imm); 920 } 921 922 static int and_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 923 { 924 return wrp_alu32_reg(nfp_prog, meta, ALU_OP_AND); 925 } 926 927 static int and_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 928 { 929 return wrp_alu32_imm(nfp_prog, meta, ALU_OP_AND, !~meta->insn.imm); 930 } 931 932 static int or_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 933 { 934 return wrp_alu32_reg(nfp_prog, meta, ALU_OP_OR); 935 } 936 937 static int or_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 938 { 939 return wrp_alu32_imm(nfp_prog, meta, ALU_OP_OR, !meta->insn.imm); 940 } 941 942 static int add_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 943 { 944 return wrp_alu32_reg(nfp_prog, meta, ALU_OP_ADD); 945 } 946 947 static int add_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 948 { 949 return wrp_alu32_imm(nfp_prog, meta, ALU_OP_ADD, !meta->insn.imm); 950 } 951 952 static int sub_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 953 { 954 return wrp_alu32_reg(nfp_prog, meta, ALU_OP_SUB); 955 } 956 957 static int sub_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 958 { 959 return wrp_alu32_imm(nfp_prog, meta, ALU_OP_SUB, !meta->insn.imm); 960 } 961 962 static int shl_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 963 { 964 const struct bpf_insn *insn = &meta->insn; 965 966 if (!insn->imm) 967 return 1; /* TODO: zero shift means indirect */ 968 969 emit_shf(nfp_prog, reg_both(insn->dst_reg * 2), 970 reg_none(), SHF_OP_NONE, reg_b(insn->dst_reg * 2), 971 SHF_SC_L_SHF, insn->imm); 972 wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0); 973 974 return 0; 975 } 976 977 static int imm_ld8_part2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 978 { 979 wrp_immed(nfp_prog, reg_both(nfp_meta_prev(meta)->insn.dst_reg * 2 + 1), 980 meta->insn.imm); 981 982 return 0; 983 } 984 985 static int imm_ld8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 986 { 987 const struct bpf_insn *insn = &meta->insn; 988 989 meta->double_cb = imm_ld8_part2; 990 wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2), insn->imm); 991 992 return 0; 993 } 994 995 static int data_ld1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 996 { 997 return construct_data_ld(nfp_prog, meta->insn.imm, 1); 998 } 999 1000 static int data_ld2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1001 { 1002 return construct_data_ld(nfp_prog, meta->insn.imm, 2); 1003 } 1004 1005 static int data_ld4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1006 { 1007 return construct_data_ld(nfp_prog, meta->insn.imm, 4); 1008 } 1009 1010 static int data_ind_ld1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1011 { 1012 return construct_data_ind_ld(nfp_prog, meta->insn.imm, 1013 meta->insn.src_reg * 2, true, 1); 1014 } 1015 1016 static int data_ind_ld2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1017 { 1018 return construct_data_ind_ld(nfp_prog, meta->insn.imm, 1019 meta->insn.src_reg * 2, true, 2); 1020 } 1021 1022 static int data_ind_ld4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1023 { 1024 return construct_data_ind_ld(nfp_prog, meta->insn.imm, 1025 meta->insn.src_reg * 2, true, 4); 1026 } 1027 1028 static int mem_ldx4_skb(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1029 { 1030 if (meta->insn.off == offsetof(struct sk_buff, len)) 1031 emit_alu(nfp_prog, reg_both(meta->insn.dst_reg * 2), 1032 reg_none(), ALU_OP_NONE, plen_reg(nfp_prog)); 1033 else 1034 return -EOPNOTSUPP; 1035 1036 return 0; 1037 } 1038 1039 static int mem_ldx4_xdp(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1040 { 1041 swreg dst = reg_both(meta->insn.dst_reg * 2); 1042 1043 if (meta->insn.off != offsetof(struct xdp_md, data) && 1044 meta->insn.off != offsetof(struct xdp_md, data_end)) 1045 return -EOPNOTSUPP; 1046 1047 emit_alu(nfp_prog, dst, reg_none(), ALU_OP_NONE, pptr_reg(nfp_prog)); 1048 1049 if (meta->insn.off == offsetof(struct xdp_md, data)) 1050 return 0; 1051 1052 emit_alu(nfp_prog, dst, dst, ALU_OP_ADD, plen_reg(nfp_prog)); 1053 1054 return 0; 1055 } 1056 1057 static int mem_ldx4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1058 { 1059 int ret; 1060 1061 if (nfp_prog->act == NN_ACT_XDP) 1062 ret = mem_ldx4_xdp(nfp_prog, meta); 1063 else 1064 ret = mem_ldx4_skb(nfp_prog, meta); 1065 1066 wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0); 1067 1068 return ret; 1069 } 1070 1071 static int mem_stx4_skb(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1072 { 1073 return -EOPNOTSUPP; 1074 } 1075 1076 static int mem_stx4_xdp(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1077 { 1078 return -EOPNOTSUPP; 1079 } 1080 1081 static int mem_stx4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1082 { 1083 if (nfp_prog->act == NN_ACT_XDP) 1084 return mem_stx4_xdp(nfp_prog, meta); 1085 return mem_stx4_skb(nfp_prog, meta); 1086 } 1087 1088 static int jump(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1089 { 1090 if (meta->insn.off < 0) /* TODO */ 1091 return -EOPNOTSUPP; 1092 emit_br(nfp_prog, BR_UNC, meta->insn.off, 0); 1093 1094 return 0; 1095 } 1096 1097 static int jeq_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1098 { 1099 const struct bpf_insn *insn = &meta->insn; 1100 u64 imm = insn->imm; /* sign extend */ 1101 swreg or1, or2, tmp_reg; 1102 1103 or1 = reg_a(insn->dst_reg * 2); 1104 or2 = reg_b(insn->dst_reg * 2 + 1); 1105 1106 if (insn->off < 0) /* TODO */ 1107 return -EOPNOTSUPP; 1108 1109 if (imm & ~0U) { 1110 tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog)); 1111 emit_alu(nfp_prog, imm_a(nfp_prog), 1112 reg_a(insn->dst_reg * 2), ALU_OP_XOR, tmp_reg); 1113 or1 = imm_a(nfp_prog); 1114 } 1115 1116 if (imm >> 32) { 1117 tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog)); 1118 emit_alu(nfp_prog, imm_b(nfp_prog), 1119 reg_a(insn->dst_reg * 2 + 1), ALU_OP_XOR, tmp_reg); 1120 or2 = imm_b(nfp_prog); 1121 } 1122 1123 emit_alu(nfp_prog, reg_none(), or1, ALU_OP_OR, or2); 1124 emit_br(nfp_prog, BR_BEQ, insn->off, 0); 1125 1126 return 0; 1127 } 1128 1129 static int jgt_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1130 { 1131 return wrp_cmp_imm(nfp_prog, meta, BR_BLO, false); 1132 } 1133 1134 static int jge_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1135 { 1136 return wrp_cmp_imm(nfp_prog, meta, BR_BHS, true); 1137 } 1138 1139 static int jlt_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1140 { 1141 return wrp_cmp_imm(nfp_prog, meta, BR_BHS, false); 1142 } 1143 1144 static int jle_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1145 { 1146 return wrp_cmp_imm(nfp_prog, meta, BR_BLO, true); 1147 } 1148 1149 static int jset_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1150 { 1151 const struct bpf_insn *insn = &meta->insn; 1152 u64 imm = insn->imm; /* sign extend */ 1153 swreg tmp_reg; 1154 1155 if (insn->off < 0) /* TODO */ 1156 return -EOPNOTSUPP; 1157 1158 if (!imm) { 1159 meta->skip = true; 1160 return 0; 1161 } 1162 1163 if (imm & ~0U) { 1164 tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog)); 1165 emit_alu(nfp_prog, reg_none(), 1166 reg_a(insn->dst_reg * 2), ALU_OP_AND, tmp_reg); 1167 emit_br(nfp_prog, BR_BNE, insn->off, 0); 1168 } 1169 1170 if (imm >> 32) { 1171 tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog)); 1172 emit_alu(nfp_prog, reg_none(), 1173 reg_a(insn->dst_reg * 2 + 1), ALU_OP_AND, tmp_reg); 1174 emit_br(nfp_prog, BR_BNE, insn->off, 0); 1175 } 1176 1177 return 0; 1178 } 1179 1180 static int jne_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1181 { 1182 const struct bpf_insn *insn = &meta->insn; 1183 u64 imm = insn->imm; /* sign extend */ 1184 swreg tmp_reg; 1185 1186 if (insn->off < 0) /* TODO */ 1187 return -EOPNOTSUPP; 1188 1189 if (!imm) { 1190 emit_alu(nfp_prog, reg_none(), reg_a(insn->dst_reg * 2), 1191 ALU_OP_OR, reg_b(insn->dst_reg * 2 + 1)); 1192 emit_br(nfp_prog, BR_BNE, insn->off, 0); 1193 } 1194 1195 tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog)); 1196 emit_alu(nfp_prog, reg_none(), 1197 reg_a(insn->dst_reg * 2), ALU_OP_XOR, tmp_reg); 1198 emit_br(nfp_prog, BR_BNE, insn->off, 0); 1199 1200 tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog)); 1201 emit_alu(nfp_prog, reg_none(), 1202 reg_a(insn->dst_reg * 2 + 1), ALU_OP_XOR, tmp_reg); 1203 emit_br(nfp_prog, BR_BNE, insn->off, 0); 1204 1205 return 0; 1206 } 1207 1208 static int jeq_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1209 { 1210 const struct bpf_insn *insn = &meta->insn; 1211 1212 if (insn->off < 0) /* TODO */ 1213 return -EOPNOTSUPP; 1214 1215 emit_alu(nfp_prog, imm_a(nfp_prog), reg_a(insn->dst_reg * 2), 1216 ALU_OP_XOR, reg_b(insn->src_reg * 2)); 1217 emit_alu(nfp_prog, imm_b(nfp_prog), reg_a(insn->dst_reg * 2 + 1), 1218 ALU_OP_XOR, reg_b(insn->src_reg * 2 + 1)); 1219 emit_alu(nfp_prog, reg_none(), 1220 imm_a(nfp_prog), ALU_OP_OR, imm_b(nfp_prog)); 1221 emit_br(nfp_prog, BR_BEQ, insn->off, 0); 1222 1223 return 0; 1224 } 1225 1226 static int jgt_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1227 { 1228 return wrp_cmp_reg(nfp_prog, meta, BR_BLO, false); 1229 } 1230 1231 static int jge_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1232 { 1233 return wrp_cmp_reg(nfp_prog, meta, BR_BHS, true); 1234 } 1235 1236 static int jlt_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1237 { 1238 return wrp_cmp_reg(nfp_prog, meta, BR_BHS, false); 1239 } 1240 1241 static int jle_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1242 { 1243 return wrp_cmp_reg(nfp_prog, meta, BR_BLO, true); 1244 } 1245 1246 static int jset_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1247 { 1248 return wrp_test_reg(nfp_prog, meta, ALU_OP_AND, BR_BNE); 1249 } 1250 1251 static int jne_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1252 { 1253 return wrp_test_reg(nfp_prog, meta, ALU_OP_XOR, BR_BNE); 1254 } 1255 1256 static int goto_out(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1257 { 1258 wrp_br_special(nfp_prog, BR_UNC, OP_BR_GO_OUT); 1259 1260 return 0; 1261 } 1262 1263 static const instr_cb_t instr_cb[256] = { 1264 [BPF_ALU64 | BPF_MOV | BPF_X] = mov_reg64, 1265 [BPF_ALU64 | BPF_MOV | BPF_K] = mov_imm64, 1266 [BPF_ALU64 | BPF_XOR | BPF_X] = xor_reg64, 1267 [BPF_ALU64 | BPF_XOR | BPF_K] = xor_imm64, 1268 [BPF_ALU64 | BPF_AND | BPF_X] = and_reg64, 1269 [BPF_ALU64 | BPF_AND | BPF_K] = and_imm64, 1270 [BPF_ALU64 | BPF_OR | BPF_X] = or_reg64, 1271 [BPF_ALU64 | BPF_OR | BPF_K] = or_imm64, 1272 [BPF_ALU64 | BPF_ADD | BPF_X] = add_reg64, 1273 [BPF_ALU64 | BPF_ADD | BPF_K] = add_imm64, 1274 [BPF_ALU64 | BPF_SUB | BPF_X] = sub_reg64, 1275 [BPF_ALU64 | BPF_SUB | BPF_K] = sub_imm64, 1276 [BPF_ALU64 | BPF_LSH | BPF_K] = shl_imm64, 1277 [BPF_ALU64 | BPF_RSH | BPF_K] = shr_imm64, 1278 [BPF_ALU | BPF_MOV | BPF_X] = mov_reg, 1279 [BPF_ALU | BPF_MOV | BPF_K] = mov_imm, 1280 [BPF_ALU | BPF_XOR | BPF_X] = xor_reg, 1281 [BPF_ALU | BPF_XOR | BPF_K] = xor_imm, 1282 [BPF_ALU | BPF_AND | BPF_X] = and_reg, 1283 [BPF_ALU | BPF_AND | BPF_K] = and_imm, 1284 [BPF_ALU | BPF_OR | BPF_X] = or_reg, 1285 [BPF_ALU | BPF_OR | BPF_K] = or_imm, 1286 [BPF_ALU | BPF_ADD | BPF_X] = add_reg, 1287 [BPF_ALU | BPF_ADD | BPF_K] = add_imm, 1288 [BPF_ALU | BPF_SUB | BPF_X] = sub_reg, 1289 [BPF_ALU | BPF_SUB | BPF_K] = sub_imm, 1290 [BPF_ALU | BPF_LSH | BPF_K] = shl_imm, 1291 [BPF_LD | BPF_IMM | BPF_DW] = imm_ld8, 1292 [BPF_LD | BPF_ABS | BPF_B] = data_ld1, 1293 [BPF_LD | BPF_ABS | BPF_H] = data_ld2, 1294 [BPF_LD | BPF_ABS | BPF_W] = data_ld4, 1295 [BPF_LD | BPF_IND | BPF_B] = data_ind_ld1, 1296 [BPF_LD | BPF_IND | BPF_H] = data_ind_ld2, 1297 [BPF_LD | BPF_IND | BPF_W] = data_ind_ld4, 1298 [BPF_LDX | BPF_MEM | BPF_W] = mem_ldx4, 1299 [BPF_STX | BPF_MEM | BPF_W] = mem_stx4, 1300 [BPF_JMP | BPF_JA | BPF_K] = jump, 1301 [BPF_JMP | BPF_JEQ | BPF_K] = jeq_imm, 1302 [BPF_JMP | BPF_JGT | BPF_K] = jgt_imm, 1303 [BPF_JMP | BPF_JGE | BPF_K] = jge_imm, 1304 [BPF_JMP | BPF_JLT | BPF_K] = jlt_imm, 1305 [BPF_JMP | BPF_JLE | BPF_K] = jle_imm, 1306 [BPF_JMP | BPF_JSET | BPF_K] = jset_imm, 1307 [BPF_JMP | BPF_JNE | BPF_K] = jne_imm, 1308 [BPF_JMP | BPF_JEQ | BPF_X] = jeq_reg, 1309 [BPF_JMP | BPF_JGT | BPF_X] = jgt_reg, 1310 [BPF_JMP | BPF_JGE | BPF_X] = jge_reg, 1311 [BPF_JMP | BPF_JLT | BPF_X] = jlt_reg, 1312 [BPF_JMP | BPF_JLE | BPF_X] = jle_reg, 1313 [BPF_JMP | BPF_JSET | BPF_X] = jset_reg, 1314 [BPF_JMP | BPF_JNE | BPF_X] = jne_reg, 1315 [BPF_JMP | BPF_EXIT] = goto_out, 1316 }; 1317 1318 /* --- Misc code --- */ 1319 static void br_set_offset(u64 *instr, u16 offset) 1320 { 1321 u16 addr_lo, addr_hi; 1322 1323 addr_lo = offset & (OP_BR_ADDR_LO >> __bf_shf(OP_BR_ADDR_LO)); 1324 addr_hi = offset != addr_lo; 1325 *instr &= ~(OP_BR_ADDR_HI | OP_BR_ADDR_LO); 1326 *instr |= FIELD_PREP(OP_BR_ADDR_HI, addr_hi); 1327 *instr |= FIELD_PREP(OP_BR_ADDR_LO, addr_lo); 1328 } 1329 1330 /* --- Assembler logic --- */ 1331 static int nfp_fixup_branches(struct nfp_prog *nfp_prog) 1332 { 1333 struct nfp_insn_meta *meta, *next; 1334 u32 off, br_idx; 1335 u32 idx; 1336 1337 nfp_for_each_insn_walk2(nfp_prog, meta, next) { 1338 if (meta->skip) 1339 continue; 1340 if (BPF_CLASS(meta->insn.code) != BPF_JMP) 1341 continue; 1342 1343 br_idx = nfp_prog_offset_to_index(nfp_prog, next->off) - 1; 1344 if (!nfp_is_br(nfp_prog->prog[br_idx])) { 1345 pr_err("Fixup found block not ending in branch %d %02x %016llx!!\n", 1346 br_idx, meta->insn.code, nfp_prog->prog[br_idx]); 1347 return -ELOOP; 1348 } 1349 /* Leave special branches for later */ 1350 if (FIELD_GET(OP_BR_SPECIAL, nfp_prog->prog[br_idx])) 1351 continue; 1352 1353 /* Find the target offset in assembler realm */ 1354 off = meta->insn.off; 1355 if (!off) { 1356 pr_err("Fixup found zero offset!!\n"); 1357 return -ELOOP; 1358 } 1359 1360 while (off && nfp_meta_has_next(nfp_prog, next)) { 1361 next = nfp_meta_next(next); 1362 off--; 1363 } 1364 if (off) { 1365 pr_err("Fixup found too large jump!! %d\n", off); 1366 return -ELOOP; 1367 } 1368 1369 if (next->skip) { 1370 pr_err("Branch landing on removed instruction!!\n"); 1371 return -ELOOP; 1372 } 1373 1374 for (idx = nfp_prog_offset_to_index(nfp_prog, meta->off); 1375 idx <= br_idx; idx++) { 1376 if (!nfp_is_br(nfp_prog->prog[idx])) 1377 continue; 1378 br_set_offset(&nfp_prog->prog[idx], next->off); 1379 } 1380 } 1381 1382 /* Fixup 'goto out's separately, they can be scattered around */ 1383 for (br_idx = 0; br_idx < nfp_prog->prog_len; br_idx++) { 1384 enum br_special special; 1385 1386 if ((nfp_prog->prog[br_idx] & OP_BR_BASE_MASK) != OP_BR_BASE) 1387 continue; 1388 1389 special = FIELD_GET(OP_BR_SPECIAL, nfp_prog->prog[br_idx]); 1390 switch (special) { 1391 case OP_BR_NORMAL: 1392 break; 1393 case OP_BR_GO_OUT: 1394 br_set_offset(&nfp_prog->prog[br_idx], 1395 nfp_prog->tgt_out); 1396 break; 1397 case OP_BR_GO_ABORT: 1398 br_set_offset(&nfp_prog->prog[br_idx], 1399 nfp_prog->tgt_abort); 1400 break; 1401 } 1402 1403 nfp_prog->prog[br_idx] &= ~OP_BR_SPECIAL; 1404 } 1405 1406 return 0; 1407 } 1408 1409 static void nfp_intro(struct nfp_prog *nfp_prog) 1410 { 1411 wrp_immed(nfp_prog, plen_reg(nfp_prog), GENMASK(13, 0)); 1412 emit_alu(nfp_prog, plen_reg(nfp_prog), 1413 plen_reg(nfp_prog), ALU_OP_AND, pv_len(nfp_prog)); 1414 } 1415 1416 static void nfp_outro_tc_legacy(struct nfp_prog *nfp_prog) 1417 { 1418 const u8 act2code[] = { 1419 [NN_ACT_TC_DROP] = 0x22, 1420 [NN_ACT_TC_REDIR] = 0x24 1421 }; 1422 /* Target for aborts */ 1423 nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog); 1424 wrp_immed(nfp_prog, reg_both(0), 0); 1425 1426 /* Target for normal exits */ 1427 nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog); 1428 /* Legacy TC mode: 1429 * 0 0x11 -> pass, count as stat0 1430 * -1 drop 0x22 -> drop, count as stat1 1431 * redir 0x24 -> redir, count as stat1 1432 * ife mark 0x21 -> pass, count as stat1 1433 * ife + tx 0x24 -> redir, count as stat1 1434 */ 1435 emit_br_byte_neq(nfp_prog, reg_b(0), 0xff, 0, nfp_prog->tgt_done, 2); 1436 emit_alu(nfp_prog, reg_a(0), 1437 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_FLAGS); 1438 emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x11), SHF_SC_L_SHF, 16); 1439 1440 emit_br(nfp_prog, BR_UNC, nfp_prog->tgt_done, 1); 1441 emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(act2code[nfp_prog->act]), 1442 SHF_SC_L_SHF, 16); 1443 } 1444 1445 static void nfp_outro_tc_da(struct nfp_prog *nfp_prog) 1446 { 1447 /* TC direct-action mode: 1448 * 0,1 ok NOT SUPPORTED[1] 1449 * 2 drop 0x22 -> drop, count as stat1 1450 * 4,5 nuke 0x02 -> drop 1451 * 7 redir 0x44 -> redir, count as stat2 1452 * * unspec 0x11 -> pass, count as stat0 1453 * 1454 * [1] We can't support OK and RECLASSIFY because we can't tell TC 1455 * the exact decision made. We are forced to support UNSPEC 1456 * to handle aborts so that's the only one we handle for passing 1457 * packets up the stack. 1458 */ 1459 /* Target for aborts */ 1460 nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog); 1461 1462 emit_br_def(nfp_prog, nfp_prog->tgt_done, 2); 1463 1464 emit_alu(nfp_prog, reg_a(0), 1465 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_FLAGS); 1466 emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x11), SHF_SC_L_SHF, 16); 1467 1468 /* Target for normal exits */ 1469 nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog); 1470 1471 /* if R0 > 7 jump to abort */ 1472 emit_alu(nfp_prog, reg_none(), reg_imm(7), ALU_OP_SUB, reg_b(0)); 1473 emit_br(nfp_prog, BR_BLO, nfp_prog->tgt_abort, 0); 1474 emit_alu(nfp_prog, reg_a(0), 1475 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_FLAGS); 1476 1477 wrp_immed(nfp_prog, reg_b(2), 0x41221211); 1478 wrp_immed(nfp_prog, reg_b(3), 0x41001211); 1479 1480 emit_shf(nfp_prog, reg_a(1), 1481 reg_none(), SHF_OP_NONE, reg_b(0), SHF_SC_L_SHF, 2); 1482 1483 emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0)); 1484 emit_shf(nfp_prog, reg_a(2), 1485 reg_imm(0xf), SHF_OP_AND, reg_b(2), SHF_SC_R_SHF, 0); 1486 1487 emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0)); 1488 emit_shf(nfp_prog, reg_b(2), 1489 reg_imm(0xf), SHF_OP_AND, reg_b(3), SHF_SC_R_SHF, 0); 1490 1491 emit_br_def(nfp_prog, nfp_prog->tgt_done, 2); 1492 1493 emit_shf(nfp_prog, reg_b(2), 1494 reg_a(2), SHF_OP_OR, reg_b(2), SHF_SC_L_SHF, 4); 1495 emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_b(2), SHF_SC_L_SHF, 16); 1496 } 1497 1498 static void nfp_outro_xdp(struct nfp_prog *nfp_prog) 1499 { 1500 /* XDP return codes: 1501 * 0 aborted 0x82 -> drop, count as stat3 1502 * 1 drop 0x22 -> drop, count as stat1 1503 * 2 pass 0x11 -> pass, count as stat0 1504 * 3 tx 0x44 -> redir, count as stat2 1505 * * unknown 0x82 -> drop, count as stat3 1506 */ 1507 /* Target for aborts */ 1508 nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog); 1509 1510 emit_br_def(nfp_prog, nfp_prog->tgt_done, 2); 1511 1512 emit_alu(nfp_prog, reg_a(0), 1513 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_FLAGS); 1514 emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x82), SHF_SC_L_SHF, 16); 1515 1516 /* Target for normal exits */ 1517 nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog); 1518 1519 /* if R0 > 3 jump to abort */ 1520 emit_alu(nfp_prog, reg_none(), reg_imm(3), ALU_OP_SUB, reg_b(0)); 1521 emit_br(nfp_prog, BR_BLO, nfp_prog->tgt_abort, 0); 1522 1523 wrp_immed(nfp_prog, reg_b(2), 0x44112282); 1524 1525 emit_shf(nfp_prog, reg_a(1), 1526 reg_none(), SHF_OP_NONE, reg_b(0), SHF_SC_L_SHF, 3); 1527 1528 emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0)); 1529 emit_shf(nfp_prog, reg_b(2), 1530 reg_imm(0xff), SHF_OP_AND, reg_b(2), SHF_SC_R_SHF, 0); 1531 1532 emit_br_def(nfp_prog, nfp_prog->tgt_done, 2); 1533 1534 emit_alu(nfp_prog, reg_a(0), 1535 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_FLAGS); 1536 emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_b(2), SHF_SC_L_SHF, 16); 1537 } 1538 1539 static void nfp_outro(struct nfp_prog *nfp_prog) 1540 { 1541 switch (nfp_prog->act) { 1542 case NN_ACT_DIRECT: 1543 nfp_outro_tc_da(nfp_prog); 1544 break; 1545 case NN_ACT_TC_DROP: 1546 case NN_ACT_TC_REDIR: 1547 nfp_outro_tc_legacy(nfp_prog); 1548 break; 1549 case NN_ACT_XDP: 1550 nfp_outro_xdp(nfp_prog); 1551 break; 1552 } 1553 } 1554 1555 static int nfp_translate(struct nfp_prog *nfp_prog) 1556 { 1557 struct nfp_insn_meta *meta; 1558 int i, err; 1559 1560 nfp_intro(nfp_prog); 1561 if (nfp_prog->error) 1562 return nfp_prog->error; 1563 1564 list_for_each_entry(meta, &nfp_prog->insns, l) { 1565 instr_cb_t cb = instr_cb[meta->insn.code]; 1566 1567 meta->off = nfp_prog_current_offset(nfp_prog); 1568 1569 if (meta->skip) { 1570 nfp_prog->n_translated++; 1571 continue; 1572 } 1573 1574 if (nfp_meta_has_prev(nfp_prog, meta) && 1575 nfp_meta_prev(meta)->double_cb) 1576 cb = nfp_meta_prev(meta)->double_cb; 1577 if (!cb) 1578 return -ENOENT; 1579 err = cb(nfp_prog, meta); 1580 if (err) 1581 return err; 1582 1583 nfp_prog->n_translated++; 1584 } 1585 1586 nfp_outro(nfp_prog); 1587 if (nfp_prog->error) 1588 return nfp_prog->error; 1589 1590 for (i = 0; i < NFP_USTORE_PREFETCH_WINDOW; i++) 1591 emit_nop(nfp_prog); 1592 if (nfp_prog->error) 1593 return nfp_prog->error; 1594 1595 return nfp_fixup_branches(nfp_prog); 1596 } 1597 1598 static int 1599 nfp_prog_prepare(struct nfp_prog *nfp_prog, const struct bpf_insn *prog, 1600 unsigned int cnt) 1601 { 1602 unsigned int i; 1603 1604 for (i = 0; i < cnt; i++) { 1605 struct nfp_insn_meta *meta; 1606 1607 meta = kzalloc(sizeof(*meta), GFP_KERNEL); 1608 if (!meta) 1609 return -ENOMEM; 1610 1611 meta->insn = prog[i]; 1612 meta->n = i; 1613 1614 list_add_tail(&meta->l, &nfp_prog->insns); 1615 } 1616 1617 return 0; 1618 } 1619 1620 /* --- Optimizations --- */ 1621 static void nfp_bpf_opt_reg_init(struct nfp_prog *nfp_prog) 1622 { 1623 struct nfp_insn_meta *meta; 1624 1625 list_for_each_entry(meta, &nfp_prog->insns, l) { 1626 struct bpf_insn insn = meta->insn; 1627 1628 /* Programs converted from cBPF start with register xoring */ 1629 if (insn.code == (BPF_ALU64 | BPF_XOR | BPF_X) && 1630 insn.src_reg == insn.dst_reg) 1631 continue; 1632 1633 /* Programs start with R6 = R1 but we ignore the skb pointer */ 1634 if (insn.code == (BPF_ALU64 | BPF_MOV | BPF_X) && 1635 insn.src_reg == 1 && insn.dst_reg == 6) 1636 meta->skip = true; 1637 1638 /* Return as soon as something doesn't match */ 1639 if (!meta->skip) 1640 return; 1641 } 1642 } 1643 1644 /* Remove masking after load since our load guarantees this is not needed */ 1645 static void nfp_bpf_opt_ld_mask(struct nfp_prog *nfp_prog) 1646 { 1647 struct nfp_insn_meta *meta1, *meta2; 1648 const s32 exp_mask[] = { 1649 [BPF_B] = 0x000000ffU, 1650 [BPF_H] = 0x0000ffffU, 1651 [BPF_W] = 0xffffffffU, 1652 }; 1653 1654 nfp_for_each_insn_walk2(nfp_prog, meta1, meta2) { 1655 struct bpf_insn insn, next; 1656 1657 insn = meta1->insn; 1658 next = meta2->insn; 1659 1660 if (BPF_CLASS(insn.code) != BPF_LD) 1661 continue; 1662 if (BPF_MODE(insn.code) != BPF_ABS && 1663 BPF_MODE(insn.code) != BPF_IND) 1664 continue; 1665 1666 if (next.code != (BPF_ALU64 | BPF_AND | BPF_K)) 1667 continue; 1668 1669 if (!exp_mask[BPF_SIZE(insn.code)]) 1670 continue; 1671 if (exp_mask[BPF_SIZE(insn.code)] != next.imm) 1672 continue; 1673 1674 if (next.src_reg || next.dst_reg) 1675 continue; 1676 1677 meta2->skip = true; 1678 } 1679 } 1680 1681 static void nfp_bpf_opt_ld_shift(struct nfp_prog *nfp_prog) 1682 { 1683 struct nfp_insn_meta *meta1, *meta2, *meta3; 1684 1685 nfp_for_each_insn_walk3(nfp_prog, meta1, meta2, meta3) { 1686 struct bpf_insn insn, next1, next2; 1687 1688 insn = meta1->insn; 1689 next1 = meta2->insn; 1690 next2 = meta3->insn; 1691 1692 if (BPF_CLASS(insn.code) != BPF_LD) 1693 continue; 1694 if (BPF_MODE(insn.code) != BPF_ABS && 1695 BPF_MODE(insn.code) != BPF_IND) 1696 continue; 1697 if (BPF_SIZE(insn.code) != BPF_W) 1698 continue; 1699 1700 if (!(next1.code == (BPF_LSH | BPF_K | BPF_ALU64) && 1701 next2.code == (BPF_RSH | BPF_K | BPF_ALU64)) && 1702 !(next1.code == (BPF_RSH | BPF_K | BPF_ALU64) && 1703 next2.code == (BPF_LSH | BPF_K | BPF_ALU64))) 1704 continue; 1705 1706 if (next1.src_reg || next1.dst_reg || 1707 next2.src_reg || next2.dst_reg) 1708 continue; 1709 1710 if (next1.imm != 0x20 || next2.imm != 0x20) 1711 continue; 1712 1713 meta2->skip = true; 1714 meta3->skip = true; 1715 } 1716 } 1717 1718 static int nfp_bpf_optimize(struct nfp_prog *nfp_prog) 1719 { 1720 nfp_bpf_opt_reg_init(nfp_prog); 1721 1722 nfp_bpf_opt_ld_mask(nfp_prog); 1723 nfp_bpf_opt_ld_shift(nfp_prog); 1724 1725 return 0; 1726 } 1727 1728 static int nfp_bpf_ustore_calc(struct nfp_prog *nfp_prog) 1729 { 1730 int i; 1731 1732 for (i = 0; i < nfp_prog->prog_len; i++) { 1733 int err; 1734 1735 err = nfp_ustore_check_valid_no_ecc(nfp_prog->prog[i]); 1736 if (err) 1737 return err; 1738 1739 nfp_prog->prog[i] = nfp_ustore_calc_ecc_insn(nfp_prog->prog[i]); 1740 } 1741 1742 return 0; 1743 } 1744 1745 /** 1746 * nfp_bpf_jit() - translate BPF code into NFP assembly 1747 * @filter: kernel BPF filter struct 1748 * @prog_mem: memory to store assembler instructions 1749 * @act: action attached to this eBPF program 1750 * @prog_start: offset of the first instruction when loaded 1751 * @prog_done: where to jump on exit 1752 * @prog_sz: size of @prog_mem in instructions 1753 * @res: achieved parameters of translation results 1754 */ 1755 int 1756 nfp_bpf_jit(struct bpf_prog *filter, void *prog_mem, 1757 enum nfp_bpf_action_type act, 1758 unsigned int prog_start, unsigned int prog_done, 1759 unsigned int prog_sz, struct nfp_bpf_result *res) 1760 { 1761 struct nfp_prog *nfp_prog; 1762 int ret; 1763 1764 nfp_prog = kzalloc(sizeof(*nfp_prog), GFP_KERNEL); 1765 if (!nfp_prog) 1766 return -ENOMEM; 1767 1768 INIT_LIST_HEAD(&nfp_prog->insns); 1769 nfp_prog->act = act; 1770 nfp_prog->start_off = prog_start; 1771 nfp_prog->tgt_done = prog_done; 1772 1773 ret = nfp_prog_prepare(nfp_prog, filter->insnsi, filter->len); 1774 if (ret) 1775 goto out; 1776 1777 ret = nfp_prog_verify(nfp_prog, filter); 1778 if (ret) 1779 goto out; 1780 1781 ret = nfp_bpf_optimize(nfp_prog); 1782 if (ret) 1783 goto out; 1784 1785 nfp_prog->num_regs = MAX_BPF_REG; 1786 nfp_prog->regs_per_thread = 32; 1787 1788 nfp_prog->prog = prog_mem; 1789 nfp_prog->__prog_alloc_len = prog_sz; 1790 1791 ret = nfp_translate(nfp_prog); 1792 if (ret) { 1793 pr_err("Translation failed with error %d (translated: %u)\n", 1794 ret, nfp_prog->n_translated); 1795 ret = -EINVAL; 1796 goto out; 1797 } 1798 1799 ret = nfp_bpf_ustore_calc(nfp_prog); 1800 1801 res->n_instr = nfp_prog->prog_len; 1802 res->dense_mode = false; 1803 out: 1804 nfp_prog_free(nfp_prog); 1805 1806 return ret; 1807 } 1808