1 /* 2 * Copyright (C) 2016 Netronome Systems, Inc. 3 * 4 * This software is dual licensed under the GNU General License Version 2, 5 * June 1991 as shown in the file COPYING in the top-level directory of this 6 * source tree or the BSD 2-Clause License provided below. You have the 7 * option to license this software under the complete terms of either license. 8 * 9 * The BSD 2-Clause License: 10 * 11 * Redistribution and use in source and binary forms, with or 12 * without modification, are permitted provided that the following 13 * conditions are met: 14 * 15 * 1. Redistributions of source code must retain the above 16 * copyright notice, this list of conditions and the following 17 * disclaimer. 18 * 19 * 2. Redistributions in binary form must reproduce the above 20 * copyright notice, this list of conditions and the following 21 * disclaimer in the documentation and/or other materials 22 * provided with the distribution. 23 * 24 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, 25 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF 26 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND 27 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS 28 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN 29 * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN 30 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 31 * SOFTWARE. 32 */ 33 34 #define pr_fmt(fmt) "NFP net bpf: " fmt 35 36 #include <linux/kernel.h> 37 #include <linux/bpf.h> 38 #include <linux/filter.h> 39 #include <linux/pkt_cls.h> 40 #include <linux/unistd.h> 41 42 #include "main.h" 43 #include "../nfp_asm.h" 44 45 /* --- NFP prog --- */ 46 /* Foreach "multiple" entries macros provide pos and next<n> pointers. 47 * It's safe to modify the next pointers (but not pos). 48 */ 49 #define nfp_for_each_insn_walk2(nfp_prog, pos, next) \ 50 for (pos = list_first_entry(&(nfp_prog)->insns, typeof(*pos), l), \ 51 next = list_next_entry(pos, l); \ 52 &(nfp_prog)->insns != &pos->l && \ 53 &(nfp_prog)->insns != &next->l; \ 54 pos = nfp_meta_next(pos), \ 55 next = nfp_meta_next(pos)) 56 57 #define nfp_for_each_insn_walk3(nfp_prog, pos, next, next2) \ 58 for (pos = list_first_entry(&(nfp_prog)->insns, typeof(*pos), l), \ 59 next = list_next_entry(pos, l), \ 60 next2 = list_next_entry(next, l); \ 61 &(nfp_prog)->insns != &pos->l && \ 62 &(nfp_prog)->insns != &next->l && \ 63 &(nfp_prog)->insns != &next2->l; \ 64 pos = nfp_meta_next(pos), \ 65 next = nfp_meta_next(pos), \ 66 next2 = nfp_meta_next(next)) 67 68 static bool 69 nfp_meta_has_next(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 70 { 71 return meta->l.next != &nfp_prog->insns; 72 } 73 74 static bool 75 nfp_meta_has_prev(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 76 { 77 return meta->l.prev != &nfp_prog->insns; 78 } 79 80 static void nfp_prog_free(struct nfp_prog *nfp_prog) 81 { 82 struct nfp_insn_meta *meta, *tmp; 83 84 list_for_each_entry_safe(meta, tmp, &nfp_prog->insns, l) { 85 list_del(&meta->l); 86 kfree(meta); 87 } 88 kfree(nfp_prog); 89 } 90 91 static void nfp_prog_push(struct nfp_prog *nfp_prog, u64 insn) 92 { 93 if (nfp_prog->__prog_alloc_len == nfp_prog->prog_len) { 94 nfp_prog->error = -ENOSPC; 95 return; 96 } 97 98 nfp_prog->prog[nfp_prog->prog_len] = insn; 99 nfp_prog->prog_len++; 100 } 101 102 static unsigned int nfp_prog_current_offset(struct nfp_prog *nfp_prog) 103 { 104 return nfp_prog->start_off + nfp_prog->prog_len; 105 } 106 107 static unsigned int 108 nfp_prog_offset_to_index(struct nfp_prog *nfp_prog, unsigned int offset) 109 { 110 return offset - nfp_prog->start_off; 111 } 112 113 /* --- Emitters --- */ 114 static void 115 __emit_cmd(struct nfp_prog *nfp_prog, enum cmd_tgt_map op, 116 u8 mode, u8 xfer, u8 areg, u8 breg, u8 size, bool sync) 117 { 118 enum cmd_ctx_swap ctx; 119 u64 insn; 120 121 if (sync) 122 ctx = CMD_CTX_SWAP; 123 else 124 ctx = CMD_CTX_NO_SWAP; 125 126 insn = FIELD_PREP(OP_CMD_A_SRC, areg) | 127 FIELD_PREP(OP_CMD_CTX, ctx) | 128 FIELD_PREP(OP_CMD_B_SRC, breg) | 129 FIELD_PREP(OP_CMD_TOKEN, cmd_tgt_act[op].token) | 130 FIELD_PREP(OP_CMD_XFER, xfer) | 131 FIELD_PREP(OP_CMD_CNT, size) | 132 FIELD_PREP(OP_CMD_SIG, sync) | 133 FIELD_PREP(OP_CMD_TGT_CMD, cmd_tgt_act[op].tgt_cmd) | 134 FIELD_PREP(OP_CMD_MODE, mode); 135 136 nfp_prog_push(nfp_prog, insn); 137 } 138 139 static void 140 emit_cmd(struct nfp_prog *nfp_prog, enum cmd_tgt_map op, 141 u8 mode, u8 xfer, swreg lreg, swreg rreg, u8 size, bool sync) 142 { 143 struct nfp_insn_re_regs reg; 144 int err; 145 146 err = swreg_to_restricted(reg_none(), lreg, rreg, ®, false); 147 if (err) { 148 nfp_prog->error = err; 149 return; 150 } 151 if (reg.swap) { 152 pr_err("cmd can't swap arguments\n"); 153 nfp_prog->error = -EFAULT; 154 return; 155 } 156 157 __emit_cmd(nfp_prog, op, mode, xfer, reg.areg, reg.breg, size, sync); 158 } 159 160 static void 161 __emit_br(struct nfp_prog *nfp_prog, enum br_mask mask, enum br_ev_pip ev_pip, 162 enum br_ctx_signal_state css, u16 addr, u8 defer) 163 { 164 u16 addr_lo, addr_hi; 165 u64 insn; 166 167 addr_lo = addr & (OP_BR_ADDR_LO >> __bf_shf(OP_BR_ADDR_LO)); 168 addr_hi = addr != addr_lo; 169 170 insn = OP_BR_BASE | 171 FIELD_PREP(OP_BR_MASK, mask) | 172 FIELD_PREP(OP_BR_EV_PIP, ev_pip) | 173 FIELD_PREP(OP_BR_CSS, css) | 174 FIELD_PREP(OP_BR_DEFBR, defer) | 175 FIELD_PREP(OP_BR_ADDR_LO, addr_lo) | 176 FIELD_PREP(OP_BR_ADDR_HI, addr_hi); 177 178 nfp_prog_push(nfp_prog, insn); 179 } 180 181 static void emit_br_def(struct nfp_prog *nfp_prog, u16 addr, u8 defer) 182 { 183 if (defer > 2) { 184 pr_err("BUG: branch defer out of bounds %d\n", defer); 185 nfp_prog->error = -EFAULT; 186 return; 187 } 188 __emit_br(nfp_prog, BR_UNC, BR_EV_PIP_UNCOND, BR_CSS_NONE, addr, defer); 189 } 190 191 static void 192 emit_br(struct nfp_prog *nfp_prog, enum br_mask mask, u16 addr, u8 defer) 193 { 194 __emit_br(nfp_prog, mask, 195 mask != BR_UNC ? BR_EV_PIP_COND : BR_EV_PIP_UNCOND, 196 BR_CSS_NONE, addr, defer); 197 } 198 199 static void 200 __emit_br_byte(struct nfp_prog *nfp_prog, u8 areg, u8 breg, bool imm8, 201 u8 byte, bool equal, u16 addr, u8 defer) 202 { 203 u16 addr_lo, addr_hi; 204 u64 insn; 205 206 addr_lo = addr & (OP_BB_ADDR_LO >> __bf_shf(OP_BB_ADDR_LO)); 207 addr_hi = addr != addr_lo; 208 209 insn = OP_BBYTE_BASE | 210 FIELD_PREP(OP_BB_A_SRC, areg) | 211 FIELD_PREP(OP_BB_BYTE, byte) | 212 FIELD_PREP(OP_BB_B_SRC, breg) | 213 FIELD_PREP(OP_BB_I8, imm8) | 214 FIELD_PREP(OP_BB_EQ, equal) | 215 FIELD_PREP(OP_BB_DEFBR, defer) | 216 FIELD_PREP(OP_BB_ADDR_LO, addr_lo) | 217 FIELD_PREP(OP_BB_ADDR_HI, addr_hi); 218 219 nfp_prog_push(nfp_prog, insn); 220 } 221 222 static void 223 emit_br_byte_neq(struct nfp_prog *nfp_prog, 224 swreg dst, u8 imm, u8 byte, u16 addr, u8 defer) 225 { 226 struct nfp_insn_re_regs reg; 227 int err; 228 229 err = swreg_to_restricted(reg_none(), dst, reg_imm(imm), ®, true); 230 if (err) { 231 nfp_prog->error = err; 232 return; 233 } 234 235 __emit_br_byte(nfp_prog, reg.areg, reg.breg, reg.i8, byte, false, addr, 236 defer); 237 } 238 239 static void 240 __emit_immed(struct nfp_prog *nfp_prog, u16 areg, u16 breg, u16 imm_hi, 241 enum immed_width width, bool invert, 242 enum immed_shift shift, bool wr_both) 243 { 244 u64 insn; 245 246 insn = OP_IMMED_BASE | 247 FIELD_PREP(OP_IMMED_A_SRC, areg) | 248 FIELD_PREP(OP_IMMED_B_SRC, breg) | 249 FIELD_PREP(OP_IMMED_IMM, imm_hi) | 250 FIELD_PREP(OP_IMMED_WIDTH, width) | 251 FIELD_PREP(OP_IMMED_INV, invert) | 252 FIELD_PREP(OP_IMMED_SHIFT, shift) | 253 FIELD_PREP(OP_IMMED_WR_AB, wr_both); 254 255 nfp_prog_push(nfp_prog, insn); 256 } 257 258 static void 259 emit_immed(struct nfp_prog *nfp_prog, swreg dst, u16 imm, 260 enum immed_width width, bool invert, enum immed_shift shift) 261 { 262 struct nfp_insn_ur_regs reg; 263 int err; 264 265 if (swreg_type(dst) == NN_REG_IMM) { 266 nfp_prog->error = -EFAULT; 267 return; 268 } 269 270 err = swreg_to_unrestricted(dst, dst, reg_imm(imm & 0xff), ®); 271 if (err) { 272 nfp_prog->error = err; 273 return; 274 } 275 276 __emit_immed(nfp_prog, reg.areg, reg.breg, imm >> 8, width, 277 invert, shift, reg.wr_both); 278 } 279 280 static void 281 __emit_shf(struct nfp_prog *nfp_prog, u16 dst, enum alu_dst_ab dst_ab, 282 enum shf_sc sc, u8 shift, 283 u16 areg, enum shf_op op, u16 breg, bool i8, bool sw, bool wr_both) 284 { 285 u64 insn; 286 287 if (!FIELD_FIT(OP_SHF_SHIFT, shift)) { 288 nfp_prog->error = -EFAULT; 289 return; 290 } 291 292 if (sc == SHF_SC_L_SHF) 293 shift = 32 - shift; 294 295 insn = OP_SHF_BASE | 296 FIELD_PREP(OP_SHF_A_SRC, areg) | 297 FIELD_PREP(OP_SHF_SC, sc) | 298 FIELD_PREP(OP_SHF_B_SRC, breg) | 299 FIELD_PREP(OP_SHF_I8, i8) | 300 FIELD_PREP(OP_SHF_SW, sw) | 301 FIELD_PREP(OP_SHF_DST, dst) | 302 FIELD_PREP(OP_SHF_SHIFT, shift) | 303 FIELD_PREP(OP_SHF_OP, op) | 304 FIELD_PREP(OP_SHF_DST_AB, dst_ab) | 305 FIELD_PREP(OP_SHF_WR_AB, wr_both); 306 307 nfp_prog_push(nfp_prog, insn); 308 } 309 310 static void 311 emit_shf(struct nfp_prog *nfp_prog, swreg dst, 312 swreg lreg, enum shf_op op, swreg rreg, enum shf_sc sc, u8 shift) 313 { 314 struct nfp_insn_re_regs reg; 315 int err; 316 317 err = swreg_to_restricted(dst, lreg, rreg, ®, true); 318 if (err) { 319 nfp_prog->error = err; 320 return; 321 } 322 323 __emit_shf(nfp_prog, reg.dst, reg.dst_ab, sc, shift, 324 reg.areg, op, reg.breg, reg.i8, reg.swap, reg.wr_both); 325 } 326 327 static void 328 __emit_alu(struct nfp_prog *nfp_prog, u16 dst, enum alu_dst_ab dst_ab, 329 u16 areg, enum alu_op op, u16 breg, bool swap, bool wr_both) 330 { 331 u64 insn; 332 333 insn = OP_ALU_BASE | 334 FIELD_PREP(OP_ALU_A_SRC, areg) | 335 FIELD_PREP(OP_ALU_B_SRC, breg) | 336 FIELD_PREP(OP_ALU_DST, dst) | 337 FIELD_PREP(OP_ALU_SW, swap) | 338 FIELD_PREP(OP_ALU_OP, op) | 339 FIELD_PREP(OP_ALU_DST_AB, dst_ab) | 340 FIELD_PREP(OP_ALU_WR_AB, wr_both); 341 342 nfp_prog_push(nfp_prog, insn); 343 } 344 345 static void 346 emit_alu(struct nfp_prog *nfp_prog, swreg dst, 347 swreg lreg, enum alu_op op, swreg rreg) 348 { 349 struct nfp_insn_ur_regs reg; 350 int err; 351 352 err = swreg_to_unrestricted(dst, lreg, rreg, ®); 353 if (err) { 354 nfp_prog->error = err; 355 return; 356 } 357 358 __emit_alu(nfp_prog, reg.dst, reg.dst_ab, 359 reg.areg, op, reg.breg, reg.swap, reg.wr_both); 360 } 361 362 static void 363 __emit_ld_field(struct nfp_prog *nfp_prog, enum shf_sc sc, 364 u8 areg, u8 bmask, u8 breg, u8 shift, bool imm8, 365 bool zero, bool swap, bool wr_both) 366 { 367 u64 insn; 368 369 insn = OP_LDF_BASE | 370 FIELD_PREP(OP_LDF_A_SRC, areg) | 371 FIELD_PREP(OP_LDF_SC, sc) | 372 FIELD_PREP(OP_LDF_B_SRC, breg) | 373 FIELD_PREP(OP_LDF_I8, imm8) | 374 FIELD_PREP(OP_LDF_SW, swap) | 375 FIELD_PREP(OP_LDF_ZF, zero) | 376 FIELD_PREP(OP_LDF_BMASK, bmask) | 377 FIELD_PREP(OP_LDF_SHF, shift) | 378 FIELD_PREP(OP_LDF_WR_AB, wr_both); 379 380 nfp_prog_push(nfp_prog, insn); 381 } 382 383 static void 384 emit_ld_field_any(struct nfp_prog *nfp_prog, enum shf_sc sc, u8 shift, 385 swreg dst, u8 bmask, swreg src, bool zero) 386 { 387 struct nfp_insn_re_regs reg; 388 int err; 389 390 err = swreg_to_restricted(reg_none(), dst, src, ®, true); 391 if (err) { 392 nfp_prog->error = err; 393 return; 394 } 395 396 __emit_ld_field(nfp_prog, sc, reg.areg, bmask, reg.breg, shift, 397 reg.i8, zero, reg.swap, reg.wr_both); 398 } 399 400 static void 401 emit_ld_field(struct nfp_prog *nfp_prog, swreg dst, u8 bmask, swreg src, 402 enum shf_sc sc, u8 shift) 403 { 404 emit_ld_field_any(nfp_prog, sc, shift, dst, bmask, src, false); 405 } 406 407 /* --- Wrappers --- */ 408 static bool pack_immed(u32 imm, u16 *val, enum immed_shift *shift) 409 { 410 if (!(imm & 0xffff0000)) { 411 *val = imm; 412 *shift = IMMED_SHIFT_0B; 413 } else if (!(imm & 0xff0000ff)) { 414 *val = imm >> 8; 415 *shift = IMMED_SHIFT_1B; 416 } else if (!(imm & 0x0000ffff)) { 417 *val = imm >> 16; 418 *shift = IMMED_SHIFT_2B; 419 } else { 420 return false; 421 } 422 423 return true; 424 } 425 426 static void wrp_immed(struct nfp_prog *nfp_prog, swreg dst, u32 imm) 427 { 428 enum immed_shift shift; 429 u16 val; 430 431 if (pack_immed(imm, &val, &shift)) { 432 emit_immed(nfp_prog, dst, val, IMMED_WIDTH_ALL, false, shift); 433 } else if (pack_immed(~imm, &val, &shift)) { 434 emit_immed(nfp_prog, dst, val, IMMED_WIDTH_ALL, true, shift); 435 } else { 436 emit_immed(nfp_prog, dst, imm & 0xffff, IMMED_WIDTH_ALL, 437 false, IMMED_SHIFT_0B); 438 emit_immed(nfp_prog, dst, imm >> 16, IMMED_WIDTH_WORD, 439 false, IMMED_SHIFT_2B); 440 } 441 } 442 443 /* ur_load_imm_any() - encode immediate or use tmp register (unrestricted) 444 * If the @imm is small enough encode it directly in operand and return 445 * otherwise load @imm to a spare register and return its encoding. 446 */ 447 static swreg ur_load_imm_any(struct nfp_prog *nfp_prog, u32 imm, swreg tmp_reg) 448 { 449 if (FIELD_FIT(UR_REG_IMM_MAX, imm)) 450 return reg_imm(imm); 451 452 wrp_immed(nfp_prog, tmp_reg, imm); 453 return tmp_reg; 454 } 455 456 /* re_load_imm_any() - encode immediate or use tmp register (restricted) 457 * If the @imm is small enough encode it directly in operand and return 458 * otherwise load @imm to a spare register and return its encoding. 459 */ 460 static swreg re_load_imm_any(struct nfp_prog *nfp_prog, u32 imm, swreg tmp_reg) 461 { 462 if (FIELD_FIT(RE_REG_IMM_MAX, imm)) 463 return reg_imm(imm); 464 465 wrp_immed(nfp_prog, tmp_reg, imm); 466 return tmp_reg; 467 } 468 469 static void 470 wrp_br_special(struct nfp_prog *nfp_prog, enum br_mask mask, 471 enum br_special special) 472 { 473 emit_br(nfp_prog, mask, 0, 0); 474 475 nfp_prog->prog[nfp_prog->prog_len - 1] |= 476 FIELD_PREP(OP_BR_SPECIAL, special); 477 } 478 479 static void wrp_reg_mov(struct nfp_prog *nfp_prog, u16 dst, u16 src) 480 { 481 emit_alu(nfp_prog, reg_both(dst), reg_none(), ALU_OP_NONE, reg_b(src)); 482 } 483 484 static int 485 construct_data_ind_ld(struct nfp_prog *nfp_prog, u16 offset, 486 u16 src, bool src_valid, u8 size) 487 { 488 unsigned int i; 489 u16 shift, sz; 490 swreg tmp_reg; 491 492 /* We load the value from the address indicated in @offset and then 493 * shift out the data we don't need. Note: this is big endian! 494 */ 495 sz = size < 4 ? 4 : size; 496 shift = size < 4 ? 4 - size : 0; 497 498 if (src_valid) { 499 /* Calculate the true offset (src_reg + imm) */ 500 tmp_reg = ur_load_imm_any(nfp_prog, offset, imm_b(nfp_prog)); 501 emit_alu(nfp_prog, imm_both(nfp_prog), 502 reg_a(src), ALU_OP_ADD, tmp_reg); 503 /* Check packet length (size guaranteed to fit b/c it's u8) */ 504 emit_alu(nfp_prog, imm_a(nfp_prog), 505 imm_a(nfp_prog), ALU_OP_ADD, reg_imm(size)); 506 emit_alu(nfp_prog, reg_none(), 507 NFP_BPF_ABI_LEN, ALU_OP_SUB, imm_a(nfp_prog)); 508 wrp_br_special(nfp_prog, BR_BLO, OP_BR_GO_ABORT); 509 /* Load data */ 510 emit_cmd(nfp_prog, CMD_TGT_READ8, CMD_MODE_32b, 0, 511 pkt_reg(nfp_prog), imm_b(nfp_prog), sz - 1, true); 512 } else { 513 /* Check packet length */ 514 tmp_reg = ur_load_imm_any(nfp_prog, offset + size, 515 imm_a(nfp_prog)); 516 emit_alu(nfp_prog, reg_none(), 517 NFP_BPF_ABI_LEN, ALU_OP_SUB, tmp_reg); 518 wrp_br_special(nfp_prog, BR_BLO, OP_BR_GO_ABORT); 519 /* Load data */ 520 tmp_reg = re_load_imm_any(nfp_prog, offset, imm_b(nfp_prog)); 521 emit_cmd(nfp_prog, CMD_TGT_READ8, CMD_MODE_32b, 0, 522 pkt_reg(nfp_prog), tmp_reg, sz - 1, true); 523 } 524 525 i = 0; 526 if (shift) 527 emit_shf(nfp_prog, reg_both(0), reg_none(), SHF_OP_NONE, 528 reg_xfer(0), SHF_SC_R_SHF, shift * 8); 529 else 530 for (; i * 4 < size; i++) 531 emit_alu(nfp_prog, reg_both(i), 532 reg_none(), ALU_OP_NONE, reg_xfer(i)); 533 534 if (i < 2) 535 wrp_immed(nfp_prog, reg_both(1), 0); 536 537 return 0; 538 } 539 540 static int construct_data_ld(struct nfp_prog *nfp_prog, u16 offset, u8 size) 541 { 542 return construct_data_ind_ld(nfp_prog, offset, 0, false, size); 543 } 544 545 static int wrp_set_mark(struct nfp_prog *nfp_prog, u8 src) 546 { 547 emit_alu(nfp_prog, NFP_BPF_ABI_MARK, 548 reg_none(), ALU_OP_NONE, reg_b(src)); 549 emit_alu(nfp_prog, NFP_BPF_ABI_FLAGS, 550 NFP_BPF_ABI_FLAGS, ALU_OP_OR, reg_imm(NFP_BPF_ABI_FLAG_MARK)); 551 552 return 0; 553 } 554 555 static void 556 wrp_alu_imm(struct nfp_prog *nfp_prog, u8 dst, enum alu_op alu_op, u32 imm) 557 { 558 swreg tmp_reg; 559 560 if (alu_op == ALU_OP_AND) { 561 if (!imm) 562 wrp_immed(nfp_prog, reg_both(dst), 0); 563 if (!imm || !~imm) 564 return; 565 } 566 if (alu_op == ALU_OP_OR) { 567 if (!~imm) 568 wrp_immed(nfp_prog, reg_both(dst), ~0U); 569 if (!imm || !~imm) 570 return; 571 } 572 if (alu_op == ALU_OP_XOR) { 573 if (!~imm) 574 emit_alu(nfp_prog, reg_both(dst), reg_none(), 575 ALU_OP_NEG, reg_b(dst)); 576 if (!imm || !~imm) 577 return; 578 } 579 580 tmp_reg = ur_load_imm_any(nfp_prog, imm, imm_b(nfp_prog)); 581 emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, tmp_reg); 582 } 583 584 static int 585 wrp_alu64_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 586 enum alu_op alu_op, bool skip) 587 { 588 const struct bpf_insn *insn = &meta->insn; 589 u64 imm = insn->imm; /* sign extend */ 590 591 if (skip) { 592 meta->skip = true; 593 return 0; 594 } 595 596 wrp_alu_imm(nfp_prog, insn->dst_reg * 2, alu_op, imm & ~0U); 597 wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, alu_op, imm >> 32); 598 599 return 0; 600 } 601 602 static int 603 wrp_alu64_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 604 enum alu_op alu_op) 605 { 606 u8 dst = meta->insn.dst_reg * 2, src = meta->insn.src_reg * 2; 607 608 emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, reg_b(src)); 609 emit_alu(nfp_prog, reg_both(dst + 1), 610 reg_a(dst + 1), alu_op, reg_b(src + 1)); 611 612 return 0; 613 } 614 615 static int 616 wrp_alu32_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 617 enum alu_op alu_op, bool skip) 618 { 619 const struct bpf_insn *insn = &meta->insn; 620 621 if (skip) { 622 meta->skip = true; 623 return 0; 624 } 625 626 wrp_alu_imm(nfp_prog, insn->dst_reg * 2, alu_op, insn->imm); 627 wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0); 628 629 return 0; 630 } 631 632 static int 633 wrp_alu32_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 634 enum alu_op alu_op) 635 { 636 u8 dst = meta->insn.dst_reg * 2, src = meta->insn.src_reg * 2; 637 638 emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, reg_b(src)); 639 wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0); 640 641 return 0; 642 } 643 644 static void 645 wrp_test_reg_one(struct nfp_prog *nfp_prog, u8 dst, enum alu_op alu_op, u8 src, 646 enum br_mask br_mask, u16 off) 647 { 648 emit_alu(nfp_prog, reg_none(), reg_a(dst), alu_op, reg_b(src)); 649 emit_br(nfp_prog, br_mask, off, 0); 650 } 651 652 static int 653 wrp_test_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 654 enum alu_op alu_op, enum br_mask br_mask) 655 { 656 const struct bpf_insn *insn = &meta->insn; 657 658 if (insn->off < 0) /* TODO */ 659 return -EOPNOTSUPP; 660 661 wrp_test_reg_one(nfp_prog, insn->dst_reg * 2, alu_op, 662 insn->src_reg * 2, br_mask, insn->off); 663 wrp_test_reg_one(nfp_prog, insn->dst_reg * 2 + 1, alu_op, 664 insn->src_reg * 2 + 1, br_mask, insn->off); 665 666 return 0; 667 } 668 669 static int 670 wrp_cmp_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 671 enum br_mask br_mask, bool swap) 672 { 673 const struct bpf_insn *insn = &meta->insn; 674 u64 imm = insn->imm; /* sign extend */ 675 u8 reg = insn->dst_reg * 2; 676 swreg tmp_reg; 677 678 if (insn->off < 0) /* TODO */ 679 return -EOPNOTSUPP; 680 681 tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog)); 682 if (!swap) 683 emit_alu(nfp_prog, reg_none(), reg_a(reg), ALU_OP_SUB, tmp_reg); 684 else 685 emit_alu(nfp_prog, reg_none(), tmp_reg, ALU_OP_SUB, reg_a(reg)); 686 687 tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog)); 688 if (!swap) 689 emit_alu(nfp_prog, reg_none(), 690 reg_a(reg + 1), ALU_OP_SUB_C, tmp_reg); 691 else 692 emit_alu(nfp_prog, reg_none(), 693 tmp_reg, ALU_OP_SUB_C, reg_a(reg + 1)); 694 695 emit_br(nfp_prog, br_mask, insn->off, 0); 696 697 return 0; 698 } 699 700 static int 701 wrp_cmp_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, 702 enum br_mask br_mask, bool swap) 703 { 704 const struct bpf_insn *insn = &meta->insn; 705 u8 areg = insn->src_reg * 2, breg = insn->dst_reg * 2; 706 707 if (insn->off < 0) /* TODO */ 708 return -EOPNOTSUPP; 709 710 if (swap) { 711 areg ^= breg; 712 breg ^= areg; 713 areg ^= breg; 714 } 715 716 emit_alu(nfp_prog, reg_none(), reg_a(areg), ALU_OP_SUB, reg_b(breg)); 717 emit_alu(nfp_prog, reg_none(), 718 reg_a(areg + 1), ALU_OP_SUB_C, reg_b(breg + 1)); 719 emit_br(nfp_prog, br_mask, insn->off, 0); 720 721 return 0; 722 } 723 724 /* --- Callbacks --- */ 725 static int mov_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 726 { 727 const struct bpf_insn *insn = &meta->insn; 728 729 wrp_reg_mov(nfp_prog, insn->dst_reg * 2, insn->src_reg * 2); 730 wrp_reg_mov(nfp_prog, insn->dst_reg * 2 + 1, insn->src_reg * 2 + 1); 731 732 return 0; 733 } 734 735 static int mov_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 736 { 737 u64 imm = meta->insn.imm; /* sign extend */ 738 739 wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2), imm & ~0U); 740 wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), imm >> 32); 741 742 return 0; 743 } 744 745 static int xor_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 746 { 747 return wrp_alu64_reg(nfp_prog, meta, ALU_OP_XOR); 748 } 749 750 static int xor_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 751 { 752 return wrp_alu64_imm(nfp_prog, meta, ALU_OP_XOR, !meta->insn.imm); 753 } 754 755 static int and_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 756 { 757 return wrp_alu64_reg(nfp_prog, meta, ALU_OP_AND); 758 } 759 760 static int and_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 761 { 762 return wrp_alu64_imm(nfp_prog, meta, ALU_OP_AND, !~meta->insn.imm); 763 } 764 765 static int or_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 766 { 767 return wrp_alu64_reg(nfp_prog, meta, ALU_OP_OR); 768 } 769 770 static int or_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 771 { 772 return wrp_alu64_imm(nfp_prog, meta, ALU_OP_OR, !meta->insn.imm); 773 } 774 775 static int add_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 776 { 777 const struct bpf_insn *insn = &meta->insn; 778 779 emit_alu(nfp_prog, reg_both(insn->dst_reg * 2), 780 reg_a(insn->dst_reg * 2), ALU_OP_ADD, 781 reg_b(insn->src_reg * 2)); 782 emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 783 reg_a(insn->dst_reg * 2 + 1), ALU_OP_ADD_C, 784 reg_b(insn->src_reg * 2 + 1)); 785 786 return 0; 787 } 788 789 static int add_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 790 { 791 const struct bpf_insn *insn = &meta->insn; 792 u64 imm = insn->imm; /* sign extend */ 793 794 wrp_alu_imm(nfp_prog, insn->dst_reg * 2, ALU_OP_ADD, imm & ~0U); 795 wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, ALU_OP_ADD_C, imm >> 32); 796 797 return 0; 798 } 799 800 static int sub_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 801 { 802 const struct bpf_insn *insn = &meta->insn; 803 804 emit_alu(nfp_prog, reg_both(insn->dst_reg * 2), 805 reg_a(insn->dst_reg * 2), ALU_OP_SUB, 806 reg_b(insn->src_reg * 2)); 807 emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 808 reg_a(insn->dst_reg * 2 + 1), ALU_OP_SUB_C, 809 reg_b(insn->src_reg * 2 + 1)); 810 811 return 0; 812 } 813 814 static int sub_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 815 { 816 const struct bpf_insn *insn = &meta->insn; 817 u64 imm = insn->imm; /* sign extend */ 818 819 wrp_alu_imm(nfp_prog, insn->dst_reg * 2, ALU_OP_SUB, imm & ~0U); 820 wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, ALU_OP_SUB_C, imm >> 32); 821 822 return 0; 823 } 824 825 static int shl_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 826 { 827 const struct bpf_insn *insn = &meta->insn; 828 u8 dst = insn->dst_reg * 2; 829 830 if (insn->imm < 32) { 831 emit_shf(nfp_prog, reg_both(dst + 1), 832 reg_a(dst + 1), SHF_OP_NONE, reg_b(dst), 833 SHF_SC_R_DSHF, 32 - insn->imm); 834 emit_shf(nfp_prog, reg_both(dst), 835 reg_none(), SHF_OP_NONE, reg_b(dst), 836 SHF_SC_L_SHF, insn->imm); 837 } else if (insn->imm == 32) { 838 wrp_reg_mov(nfp_prog, dst + 1, dst); 839 wrp_immed(nfp_prog, reg_both(dst), 0); 840 } else if (insn->imm > 32) { 841 emit_shf(nfp_prog, reg_both(dst + 1), 842 reg_none(), SHF_OP_NONE, reg_b(dst), 843 SHF_SC_L_SHF, insn->imm - 32); 844 wrp_immed(nfp_prog, reg_both(dst), 0); 845 } 846 847 return 0; 848 } 849 850 static int shr_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 851 { 852 const struct bpf_insn *insn = &meta->insn; 853 u8 dst = insn->dst_reg * 2; 854 855 if (insn->imm < 32) { 856 emit_shf(nfp_prog, reg_both(dst), 857 reg_a(dst + 1), SHF_OP_NONE, reg_b(dst), 858 SHF_SC_R_DSHF, insn->imm); 859 emit_shf(nfp_prog, reg_both(dst + 1), 860 reg_none(), SHF_OP_NONE, reg_b(dst + 1), 861 SHF_SC_R_SHF, insn->imm); 862 } else if (insn->imm == 32) { 863 wrp_reg_mov(nfp_prog, dst, dst + 1); 864 wrp_immed(nfp_prog, reg_both(dst + 1), 0); 865 } else if (insn->imm > 32) { 866 emit_shf(nfp_prog, reg_both(dst), 867 reg_none(), SHF_OP_NONE, reg_b(dst + 1), 868 SHF_SC_R_SHF, insn->imm - 32); 869 wrp_immed(nfp_prog, reg_both(dst + 1), 0); 870 } 871 872 return 0; 873 } 874 875 static int mov_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 876 { 877 const struct bpf_insn *insn = &meta->insn; 878 879 wrp_reg_mov(nfp_prog, insn->dst_reg * 2, insn->src_reg * 2); 880 wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0); 881 882 return 0; 883 } 884 885 static int mov_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 886 { 887 const struct bpf_insn *insn = &meta->insn; 888 889 wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2), insn->imm); 890 wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0); 891 892 return 0; 893 } 894 895 static int xor_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 896 { 897 return wrp_alu32_reg(nfp_prog, meta, ALU_OP_XOR); 898 } 899 900 static int xor_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 901 { 902 return wrp_alu32_imm(nfp_prog, meta, ALU_OP_XOR, !~meta->insn.imm); 903 } 904 905 static int and_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 906 { 907 return wrp_alu32_reg(nfp_prog, meta, ALU_OP_AND); 908 } 909 910 static int and_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 911 { 912 return wrp_alu32_imm(nfp_prog, meta, ALU_OP_AND, !~meta->insn.imm); 913 } 914 915 static int or_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 916 { 917 return wrp_alu32_reg(nfp_prog, meta, ALU_OP_OR); 918 } 919 920 static int or_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 921 { 922 return wrp_alu32_imm(nfp_prog, meta, ALU_OP_OR, !meta->insn.imm); 923 } 924 925 static int add_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 926 { 927 return wrp_alu32_reg(nfp_prog, meta, ALU_OP_ADD); 928 } 929 930 static int add_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 931 { 932 return wrp_alu32_imm(nfp_prog, meta, ALU_OP_ADD, !meta->insn.imm); 933 } 934 935 static int sub_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 936 { 937 return wrp_alu32_reg(nfp_prog, meta, ALU_OP_SUB); 938 } 939 940 static int sub_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 941 { 942 return wrp_alu32_imm(nfp_prog, meta, ALU_OP_SUB, !meta->insn.imm); 943 } 944 945 static int shl_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 946 { 947 const struct bpf_insn *insn = &meta->insn; 948 949 if (!insn->imm) 950 return 1; /* TODO: zero shift means indirect */ 951 952 emit_shf(nfp_prog, reg_both(insn->dst_reg * 2), 953 reg_none(), SHF_OP_NONE, reg_b(insn->dst_reg * 2), 954 SHF_SC_L_SHF, insn->imm); 955 wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0); 956 957 return 0; 958 } 959 960 static int imm_ld8_part2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 961 { 962 wrp_immed(nfp_prog, reg_both(nfp_meta_prev(meta)->insn.dst_reg * 2 + 1), 963 meta->insn.imm); 964 965 return 0; 966 } 967 968 static int imm_ld8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 969 { 970 const struct bpf_insn *insn = &meta->insn; 971 972 meta->double_cb = imm_ld8_part2; 973 wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2), insn->imm); 974 975 return 0; 976 } 977 978 static int data_ld1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 979 { 980 return construct_data_ld(nfp_prog, meta->insn.imm, 1); 981 } 982 983 static int data_ld2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 984 { 985 return construct_data_ld(nfp_prog, meta->insn.imm, 2); 986 } 987 988 static int data_ld4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 989 { 990 return construct_data_ld(nfp_prog, meta->insn.imm, 4); 991 } 992 993 static int data_ind_ld1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 994 { 995 return construct_data_ind_ld(nfp_prog, meta->insn.imm, 996 meta->insn.src_reg * 2, true, 1); 997 } 998 999 static int data_ind_ld2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1000 { 1001 return construct_data_ind_ld(nfp_prog, meta->insn.imm, 1002 meta->insn.src_reg * 2, true, 2); 1003 } 1004 1005 static int data_ind_ld4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1006 { 1007 return construct_data_ind_ld(nfp_prog, meta->insn.imm, 1008 meta->insn.src_reg * 2, true, 4); 1009 } 1010 1011 static int mem_ldx4_skb(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1012 { 1013 if (meta->insn.off == offsetof(struct sk_buff, len)) 1014 emit_alu(nfp_prog, reg_both(meta->insn.dst_reg * 2), 1015 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_LEN); 1016 else 1017 return -EOPNOTSUPP; 1018 1019 return 0; 1020 } 1021 1022 static int mem_ldx4_xdp(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1023 { 1024 swreg dst = reg_both(meta->insn.dst_reg * 2); 1025 1026 if (meta->insn.off != offsetof(struct xdp_md, data) && 1027 meta->insn.off != offsetof(struct xdp_md, data_end)) 1028 return -EOPNOTSUPP; 1029 1030 emit_alu(nfp_prog, dst, reg_none(), ALU_OP_NONE, NFP_BPF_ABI_PKT); 1031 1032 if (meta->insn.off == offsetof(struct xdp_md, data)) 1033 return 0; 1034 1035 emit_alu(nfp_prog, dst, dst, ALU_OP_ADD, NFP_BPF_ABI_LEN); 1036 1037 return 0; 1038 } 1039 1040 static int mem_ldx4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1041 { 1042 int ret; 1043 1044 if (nfp_prog->act == NN_ACT_XDP) 1045 ret = mem_ldx4_xdp(nfp_prog, meta); 1046 else 1047 ret = mem_ldx4_skb(nfp_prog, meta); 1048 1049 wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0); 1050 1051 return ret; 1052 } 1053 1054 static int mem_stx4_skb(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1055 { 1056 if (meta->insn.off == offsetof(struct sk_buff, mark)) 1057 return wrp_set_mark(nfp_prog, meta->insn.src_reg * 2); 1058 1059 return -EOPNOTSUPP; 1060 } 1061 1062 static int mem_stx4_xdp(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1063 { 1064 return -EOPNOTSUPP; 1065 } 1066 1067 static int mem_stx4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1068 { 1069 if (nfp_prog->act == NN_ACT_XDP) 1070 return mem_stx4_xdp(nfp_prog, meta); 1071 return mem_stx4_skb(nfp_prog, meta); 1072 } 1073 1074 static int jump(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1075 { 1076 if (meta->insn.off < 0) /* TODO */ 1077 return -EOPNOTSUPP; 1078 emit_br(nfp_prog, BR_UNC, meta->insn.off, 0); 1079 1080 return 0; 1081 } 1082 1083 static int jeq_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1084 { 1085 const struct bpf_insn *insn = &meta->insn; 1086 u64 imm = insn->imm; /* sign extend */ 1087 swreg or1, or2, tmp_reg; 1088 1089 or1 = reg_a(insn->dst_reg * 2); 1090 or2 = reg_b(insn->dst_reg * 2 + 1); 1091 1092 if (insn->off < 0) /* TODO */ 1093 return -EOPNOTSUPP; 1094 1095 if (imm & ~0U) { 1096 tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog)); 1097 emit_alu(nfp_prog, imm_a(nfp_prog), 1098 reg_a(insn->dst_reg * 2), ALU_OP_XOR, tmp_reg); 1099 or1 = imm_a(nfp_prog); 1100 } 1101 1102 if (imm >> 32) { 1103 tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog)); 1104 emit_alu(nfp_prog, imm_b(nfp_prog), 1105 reg_a(insn->dst_reg * 2 + 1), ALU_OP_XOR, tmp_reg); 1106 or2 = imm_b(nfp_prog); 1107 } 1108 1109 emit_alu(nfp_prog, reg_none(), or1, ALU_OP_OR, or2); 1110 emit_br(nfp_prog, BR_BEQ, insn->off, 0); 1111 1112 return 0; 1113 } 1114 1115 static int jgt_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1116 { 1117 return wrp_cmp_imm(nfp_prog, meta, BR_BLO, false); 1118 } 1119 1120 static int jge_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1121 { 1122 return wrp_cmp_imm(nfp_prog, meta, BR_BHS, true); 1123 } 1124 1125 static int jlt_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1126 { 1127 return wrp_cmp_imm(nfp_prog, meta, BR_BHS, false); 1128 } 1129 1130 static int jle_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1131 { 1132 return wrp_cmp_imm(nfp_prog, meta, BR_BLO, true); 1133 } 1134 1135 static int jset_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1136 { 1137 const struct bpf_insn *insn = &meta->insn; 1138 u64 imm = insn->imm; /* sign extend */ 1139 swreg tmp_reg; 1140 1141 if (insn->off < 0) /* TODO */ 1142 return -EOPNOTSUPP; 1143 1144 if (!imm) { 1145 meta->skip = true; 1146 return 0; 1147 } 1148 1149 if (imm & ~0U) { 1150 tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog)); 1151 emit_alu(nfp_prog, reg_none(), 1152 reg_a(insn->dst_reg * 2), ALU_OP_AND, tmp_reg); 1153 emit_br(nfp_prog, BR_BNE, insn->off, 0); 1154 } 1155 1156 if (imm >> 32) { 1157 tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog)); 1158 emit_alu(nfp_prog, reg_none(), 1159 reg_a(insn->dst_reg * 2 + 1), ALU_OP_AND, tmp_reg); 1160 emit_br(nfp_prog, BR_BNE, insn->off, 0); 1161 } 1162 1163 return 0; 1164 } 1165 1166 static int jne_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1167 { 1168 const struct bpf_insn *insn = &meta->insn; 1169 u64 imm = insn->imm; /* sign extend */ 1170 swreg tmp_reg; 1171 1172 if (insn->off < 0) /* TODO */ 1173 return -EOPNOTSUPP; 1174 1175 if (!imm) { 1176 emit_alu(nfp_prog, reg_none(), reg_a(insn->dst_reg * 2), 1177 ALU_OP_OR, reg_b(insn->dst_reg * 2 + 1)); 1178 emit_br(nfp_prog, BR_BNE, insn->off, 0); 1179 } 1180 1181 tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog)); 1182 emit_alu(nfp_prog, reg_none(), 1183 reg_a(insn->dst_reg * 2), ALU_OP_XOR, tmp_reg); 1184 emit_br(nfp_prog, BR_BNE, insn->off, 0); 1185 1186 tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog)); 1187 emit_alu(nfp_prog, reg_none(), 1188 reg_a(insn->dst_reg * 2 + 1), ALU_OP_XOR, tmp_reg); 1189 emit_br(nfp_prog, BR_BNE, insn->off, 0); 1190 1191 return 0; 1192 } 1193 1194 static int jeq_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1195 { 1196 const struct bpf_insn *insn = &meta->insn; 1197 1198 if (insn->off < 0) /* TODO */ 1199 return -EOPNOTSUPP; 1200 1201 emit_alu(nfp_prog, imm_a(nfp_prog), reg_a(insn->dst_reg * 2), 1202 ALU_OP_XOR, reg_b(insn->src_reg * 2)); 1203 emit_alu(nfp_prog, imm_b(nfp_prog), reg_a(insn->dst_reg * 2 + 1), 1204 ALU_OP_XOR, reg_b(insn->src_reg * 2 + 1)); 1205 emit_alu(nfp_prog, reg_none(), 1206 imm_a(nfp_prog), ALU_OP_OR, imm_b(nfp_prog)); 1207 emit_br(nfp_prog, BR_BEQ, insn->off, 0); 1208 1209 return 0; 1210 } 1211 1212 static int jgt_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1213 { 1214 return wrp_cmp_reg(nfp_prog, meta, BR_BLO, false); 1215 } 1216 1217 static int jge_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1218 { 1219 return wrp_cmp_reg(nfp_prog, meta, BR_BHS, true); 1220 } 1221 1222 static int jlt_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1223 { 1224 return wrp_cmp_reg(nfp_prog, meta, BR_BHS, false); 1225 } 1226 1227 static int jle_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1228 { 1229 return wrp_cmp_reg(nfp_prog, meta, BR_BLO, true); 1230 } 1231 1232 static int jset_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1233 { 1234 return wrp_test_reg(nfp_prog, meta, ALU_OP_AND, BR_BNE); 1235 } 1236 1237 static int jne_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1238 { 1239 return wrp_test_reg(nfp_prog, meta, ALU_OP_XOR, BR_BNE); 1240 } 1241 1242 static int goto_out(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta) 1243 { 1244 wrp_br_special(nfp_prog, BR_UNC, OP_BR_GO_OUT); 1245 1246 return 0; 1247 } 1248 1249 static const instr_cb_t instr_cb[256] = { 1250 [BPF_ALU64 | BPF_MOV | BPF_X] = mov_reg64, 1251 [BPF_ALU64 | BPF_MOV | BPF_K] = mov_imm64, 1252 [BPF_ALU64 | BPF_XOR | BPF_X] = xor_reg64, 1253 [BPF_ALU64 | BPF_XOR | BPF_K] = xor_imm64, 1254 [BPF_ALU64 | BPF_AND | BPF_X] = and_reg64, 1255 [BPF_ALU64 | BPF_AND | BPF_K] = and_imm64, 1256 [BPF_ALU64 | BPF_OR | BPF_X] = or_reg64, 1257 [BPF_ALU64 | BPF_OR | BPF_K] = or_imm64, 1258 [BPF_ALU64 | BPF_ADD | BPF_X] = add_reg64, 1259 [BPF_ALU64 | BPF_ADD | BPF_K] = add_imm64, 1260 [BPF_ALU64 | BPF_SUB | BPF_X] = sub_reg64, 1261 [BPF_ALU64 | BPF_SUB | BPF_K] = sub_imm64, 1262 [BPF_ALU64 | BPF_LSH | BPF_K] = shl_imm64, 1263 [BPF_ALU64 | BPF_RSH | BPF_K] = shr_imm64, 1264 [BPF_ALU | BPF_MOV | BPF_X] = mov_reg, 1265 [BPF_ALU | BPF_MOV | BPF_K] = mov_imm, 1266 [BPF_ALU | BPF_XOR | BPF_X] = xor_reg, 1267 [BPF_ALU | BPF_XOR | BPF_K] = xor_imm, 1268 [BPF_ALU | BPF_AND | BPF_X] = and_reg, 1269 [BPF_ALU | BPF_AND | BPF_K] = and_imm, 1270 [BPF_ALU | BPF_OR | BPF_X] = or_reg, 1271 [BPF_ALU | BPF_OR | BPF_K] = or_imm, 1272 [BPF_ALU | BPF_ADD | BPF_X] = add_reg, 1273 [BPF_ALU | BPF_ADD | BPF_K] = add_imm, 1274 [BPF_ALU | BPF_SUB | BPF_X] = sub_reg, 1275 [BPF_ALU | BPF_SUB | BPF_K] = sub_imm, 1276 [BPF_ALU | BPF_LSH | BPF_K] = shl_imm, 1277 [BPF_LD | BPF_IMM | BPF_DW] = imm_ld8, 1278 [BPF_LD | BPF_ABS | BPF_B] = data_ld1, 1279 [BPF_LD | BPF_ABS | BPF_H] = data_ld2, 1280 [BPF_LD | BPF_ABS | BPF_W] = data_ld4, 1281 [BPF_LD | BPF_IND | BPF_B] = data_ind_ld1, 1282 [BPF_LD | BPF_IND | BPF_H] = data_ind_ld2, 1283 [BPF_LD | BPF_IND | BPF_W] = data_ind_ld4, 1284 [BPF_LDX | BPF_MEM | BPF_W] = mem_ldx4, 1285 [BPF_STX | BPF_MEM | BPF_W] = mem_stx4, 1286 [BPF_JMP | BPF_JA | BPF_K] = jump, 1287 [BPF_JMP | BPF_JEQ | BPF_K] = jeq_imm, 1288 [BPF_JMP | BPF_JGT | BPF_K] = jgt_imm, 1289 [BPF_JMP | BPF_JGE | BPF_K] = jge_imm, 1290 [BPF_JMP | BPF_JLT | BPF_K] = jlt_imm, 1291 [BPF_JMP | BPF_JLE | BPF_K] = jle_imm, 1292 [BPF_JMP | BPF_JSET | BPF_K] = jset_imm, 1293 [BPF_JMP | BPF_JNE | BPF_K] = jne_imm, 1294 [BPF_JMP | BPF_JEQ | BPF_X] = jeq_reg, 1295 [BPF_JMP | BPF_JGT | BPF_X] = jgt_reg, 1296 [BPF_JMP | BPF_JGE | BPF_X] = jge_reg, 1297 [BPF_JMP | BPF_JLT | BPF_X] = jlt_reg, 1298 [BPF_JMP | BPF_JLE | BPF_X] = jle_reg, 1299 [BPF_JMP | BPF_JSET | BPF_X] = jset_reg, 1300 [BPF_JMP | BPF_JNE | BPF_X] = jne_reg, 1301 [BPF_JMP | BPF_EXIT] = goto_out, 1302 }; 1303 1304 /* --- Misc code --- */ 1305 static void br_set_offset(u64 *instr, u16 offset) 1306 { 1307 u16 addr_lo, addr_hi; 1308 1309 addr_lo = offset & (OP_BR_ADDR_LO >> __bf_shf(OP_BR_ADDR_LO)); 1310 addr_hi = offset != addr_lo; 1311 *instr &= ~(OP_BR_ADDR_HI | OP_BR_ADDR_LO); 1312 *instr |= FIELD_PREP(OP_BR_ADDR_HI, addr_hi); 1313 *instr |= FIELD_PREP(OP_BR_ADDR_LO, addr_lo); 1314 } 1315 1316 /* --- Assembler logic --- */ 1317 static int nfp_fixup_branches(struct nfp_prog *nfp_prog) 1318 { 1319 struct nfp_insn_meta *meta, *next; 1320 u32 off, br_idx; 1321 u32 idx; 1322 1323 nfp_for_each_insn_walk2(nfp_prog, meta, next) { 1324 if (meta->skip) 1325 continue; 1326 if (BPF_CLASS(meta->insn.code) != BPF_JMP) 1327 continue; 1328 1329 br_idx = nfp_prog_offset_to_index(nfp_prog, next->off) - 1; 1330 if (!nfp_is_br(nfp_prog->prog[br_idx])) { 1331 pr_err("Fixup found block not ending in branch %d %02x %016llx!!\n", 1332 br_idx, meta->insn.code, nfp_prog->prog[br_idx]); 1333 return -ELOOP; 1334 } 1335 /* Leave special branches for later */ 1336 if (FIELD_GET(OP_BR_SPECIAL, nfp_prog->prog[br_idx])) 1337 continue; 1338 1339 /* Find the target offset in assembler realm */ 1340 off = meta->insn.off; 1341 if (!off) { 1342 pr_err("Fixup found zero offset!!\n"); 1343 return -ELOOP; 1344 } 1345 1346 while (off && nfp_meta_has_next(nfp_prog, next)) { 1347 next = nfp_meta_next(next); 1348 off--; 1349 } 1350 if (off) { 1351 pr_err("Fixup found too large jump!! %d\n", off); 1352 return -ELOOP; 1353 } 1354 1355 if (next->skip) { 1356 pr_err("Branch landing on removed instruction!!\n"); 1357 return -ELOOP; 1358 } 1359 1360 for (idx = nfp_prog_offset_to_index(nfp_prog, meta->off); 1361 idx <= br_idx; idx++) { 1362 if (!nfp_is_br(nfp_prog->prog[idx])) 1363 continue; 1364 br_set_offset(&nfp_prog->prog[idx], next->off); 1365 } 1366 } 1367 1368 /* Fixup 'goto out's separately, they can be scattered around */ 1369 for (br_idx = 0; br_idx < nfp_prog->prog_len; br_idx++) { 1370 enum br_special special; 1371 1372 if ((nfp_prog->prog[br_idx] & OP_BR_BASE_MASK) != OP_BR_BASE) 1373 continue; 1374 1375 special = FIELD_GET(OP_BR_SPECIAL, nfp_prog->prog[br_idx]); 1376 switch (special) { 1377 case OP_BR_NORMAL: 1378 break; 1379 case OP_BR_GO_OUT: 1380 br_set_offset(&nfp_prog->prog[br_idx], 1381 nfp_prog->tgt_out); 1382 break; 1383 case OP_BR_GO_ABORT: 1384 br_set_offset(&nfp_prog->prog[br_idx], 1385 nfp_prog->tgt_abort); 1386 break; 1387 } 1388 1389 nfp_prog->prog[br_idx] &= ~OP_BR_SPECIAL; 1390 } 1391 1392 return 0; 1393 } 1394 1395 static void nfp_intro(struct nfp_prog *nfp_prog) 1396 { 1397 emit_alu(nfp_prog, pkt_reg(nfp_prog), 1398 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_PKT); 1399 } 1400 1401 static void nfp_outro_tc_legacy(struct nfp_prog *nfp_prog) 1402 { 1403 const u8 act2code[] = { 1404 [NN_ACT_TC_DROP] = 0x22, 1405 [NN_ACT_TC_REDIR] = 0x24 1406 }; 1407 /* Target for aborts */ 1408 nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog); 1409 wrp_immed(nfp_prog, reg_both(0), 0); 1410 1411 /* Target for normal exits */ 1412 nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog); 1413 /* Legacy TC mode: 1414 * 0 0x11 -> pass, count as stat0 1415 * -1 drop 0x22 -> drop, count as stat1 1416 * redir 0x24 -> redir, count as stat1 1417 * ife mark 0x21 -> pass, count as stat1 1418 * ife + tx 0x24 -> redir, count as stat1 1419 */ 1420 emit_br_byte_neq(nfp_prog, reg_b(0), 0xff, 0, nfp_prog->tgt_done, 2); 1421 emit_alu(nfp_prog, reg_a(0), 1422 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_FLAGS); 1423 emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x11), SHF_SC_L_SHF, 16); 1424 1425 emit_br(nfp_prog, BR_UNC, nfp_prog->tgt_done, 1); 1426 emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(act2code[nfp_prog->act]), 1427 SHF_SC_L_SHF, 16); 1428 } 1429 1430 static void nfp_outro_tc_da(struct nfp_prog *nfp_prog) 1431 { 1432 /* TC direct-action mode: 1433 * 0,1 ok NOT SUPPORTED[1] 1434 * 2 drop 0x22 -> drop, count as stat1 1435 * 4,5 nuke 0x02 -> drop 1436 * 7 redir 0x44 -> redir, count as stat2 1437 * * unspec 0x11 -> pass, count as stat0 1438 * 1439 * [1] We can't support OK and RECLASSIFY because we can't tell TC 1440 * the exact decision made. We are forced to support UNSPEC 1441 * to handle aborts so that's the only one we handle for passing 1442 * packets up the stack. 1443 */ 1444 /* Target for aborts */ 1445 nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog); 1446 1447 emit_br_def(nfp_prog, nfp_prog->tgt_done, 2); 1448 1449 emit_alu(nfp_prog, reg_a(0), 1450 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_FLAGS); 1451 emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x11), SHF_SC_L_SHF, 16); 1452 1453 /* Target for normal exits */ 1454 nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog); 1455 1456 /* if R0 > 7 jump to abort */ 1457 emit_alu(nfp_prog, reg_none(), reg_imm(7), ALU_OP_SUB, reg_b(0)); 1458 emit_br(nfp_prog, BR_BLO, nfp_prog->tgt_abort, 0); 1459 emit_alu(nfp_prog, reg_a(0), 1460 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_FLAGS); 1461 1462 wrp_immed(nfp_prog, reg_b(2), 0x41221211); 1463 wrp_immed(nfp_prog, reg_b(3), 0x41001211); 1464 1465 emit_shf(nfp_prog, reg_a(1), 1466 reg_none(), SHF_OP_NONE, reg_b(0), SHF_SC_L_SHF, 2); 1467 1468 emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0)); 1469 emit_shf(nfp_prog, reg_a(2), 1470 reg_imm(0xf), SHF_OP_AND, reg_b(2), SHF_SC_R_SHF, 0); 1471 1472 emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0)); 1473 emit_shf(nfp_prog, reg_b(2), 1474 reg_imm(0xf), SHF_OP_AND, reg_b(3), SHF_SC_R_SHF, 0); 1475 1476 emit_br_def(nfp_prog, nfp_prog->tgt_done, 2); 1477 1478 emit_shf(nfp_prog, reg_b(2), 1479 reg_a(2), SHF_OP_OR, reg_b(2), SHF_SC_L_SHF, 4); 1480 emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_b(2), SHF_SC_L_SHF, 16); 1481 } 1482 1483 static void nfp_outro_xdp(struct nfp_prog *nfp_prog) 1484 { 1485 /* XDP return codes: 1486 * 0 aborted 0x82 -> drop, count as stat3 1487 * 1 drop 0x22 -> drop, count as stat1 1488 * 2 pass 0x11 -> pass, count as stat0 1489 * 3 tx 0x44 -> redir, count as stat2 1490 * * unknown 0x82 -> drop, count as stat3 1491 */ 1492 /* Target for aborts */ 1493 nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog); 1494 1495 emit_br_def(nfp_prog, nfp_prog->tgt_done, 2); 1496 1497 emit_alu(nfp_prog, reg_a(0), 1498 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_FLAGS); 1499 emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x82), SHF_SC_L_SHF, 16); 1500 1501 /* Target for normal exits */ 1502 nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog); 1503 1504 /* if R0 > 3 jump to abort */ 1505 emit_alu(nfp_prog, reg_none(), reg_imm(3), ALU_OP_SUB, reg_b(0)); 1506 emit_br(nfp_prog, BR_BLO, nfp_prog->tgt_abort, 0); 1507 1508 wrp_immed(nfp_prog, reg_b(2), 0x44112282); 1509 1510 emit_shf(nfp_prog, reg_a(1), 1511 reg_none(), SHF_OP_NONE, reg_b(0), SHF_SC_L_SHF, 3); 1512 1513 emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0)); 1514 emit_shf(nfp_prog, reg_b(2), 1515 reg_imm(0xff), SHF_OP_AND, reg_b(2), SHF_SC_R_SHF, 0); 1516 1517 emit_br_def(nfp_prog, nfp_prog->tgt_done, 2); 1518 1519 emit_alu(nfp_prog, reg_a(0), 1520 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_FLAGS); 1521 emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_b(2), SHF_SC_L_SHF, 16); 1522 } 1523 1524 static void nfp_outro(struct nfp_prog *nfp_prog) 1525 { 1526 switch (nfp_prog->act) { 1527 case NN_ACT_DIRECT: 1528 nfp_outro_tc_da(nfp_prog); 1529 break; 1530 case NN_ACT_TC_DROP: 1531 case NN_ACT_TC_REDIR: 1532 nfp_outro_tc_legacy(nfp_prog); 1533 break; 1534 case NN_ACT_XDP: 1535 nfp_outro_xdp(nfp_prog); 1536 break; 1537 } 1538 } 1539 1540 static int nfp_translate(struct nfp_prog *nfp_prog) 1541 { 1542 struct nfp_insn_meta *meta; 1543 int err; 1544 1545 nfp_intro(nfp_prog); 1546 if (nfp_prog->error) 1547 return nfp_prog->error; 1548 1549 list_for_each_entry(meta, &nfp_prog->insns, l) { 1550 instr_cb_t cb = instr_cb[meta->insn.code]; 1551 1552 meta->off = nfp_prog_current_offset(nfp_prog); 1553 1554 if (meta->skip) { 1555 nfp_prog->n_translated++; 1556 continue; 1557 } 1558 1559 if (nfp_meta_has_prev(nfp_prog, meta) && 1560 nfp_meta_prev(meta)->double_cb) 1561 cb = nfp_meta_prev(meta)->double_cb; 1562 if (!cb) 1563 return -ENOENT; 1564 err = cb(nfp_prog, meta); 1565 if (err) 1566 return err; 1567 1568 nfp_prog->n_translated++; 1569 } 1570 1571 nfp_outro(nfp_prog); 1572 if (nfp_prog->error) 1573 return nfp_prog->error; 1574 1575 return nfp_fixup_branches(nfp_prog); 1576 } 1577 1578 static int 1579 nfp_prog_prepare(struct nfp_prog *nfp_prog, const struct bpf_insn *prog, 1580 unsigned int cnt) 1581 { 1582 unsigned int i; 1583 1584 for (i = 0; i < cnt; i++) { 1585 struct nfp_insn_meta *meta; 1586 1587 meta = kzalloc(sizeof(*meta), GFP_KERNEL); 1588 if (!meta) 1589 return -ENOMEM; 1590 1591 meta->insn = prog[i]; 1592 meta->n = i; 1593 1594 list_add_tail(&meta->l, &nfp_prog->insns); 1595 } 1596 1597 return 0; 1598 } 1599 1600 /* --- Optimizations --- */ 1601 static void nfp_bpf_opt_reg_init(struct nfp_prog *nfp_prog) 1602 { 1603 struct nfp_insn_meta *meta; 1604 1605 list_for_each_entry(meta, &nfp_prog->insns, l) { 1606 struct bpf_insn insn = meta->insn; 1607 1608 /* Programs converted from cBPF start with register xoring */ 1609 if (insn.code == (BPF_ALU64 | BPF_XOR | BPF_X) && 1610 insn.src_reg == insn.dst_reg) 1611 continue; 1612 1613 /* Programs start with R6 = R1 but we ignore the skb pointer */ 1614 if (insn.code == (BPF_ALU64 | BPF_MOV | BPF_X) && 1615 insn.src_reg == 1 && insn.dst_reg == 6) 1616 meta->skip = true; 1617 1618 /* Return as soon as something doesn't match */ 1619 if (!meta->skip) 1620 return; 1621 } 1622 } 1623 1624 /* Try to rename registers so that program uses only low ones */ 1625 static int nfp_bpf_opt_reg_rename(struct nfp_prog *nfp_prog) 1626 { 1627 bool reg_used[MAX_BPF_REG] = {}; 1628 u8 tgt_reg[MAX_BPF_REG] = {}; 1629 struct nfp_insn_meta *meta; 1630 unsigned int i, j; 1631 1632 list_for_each_entry(meta, &nfp_prog->insns, l) { 1633 if (meta->skip) 1634 continue; 1635 1636 reg_used[meta->insn.src_reg] = true; 1637 reg_used[meta->insn.dst_reg] = true; 1638 } 1639 1640 for (i = 0, j = 0; i < ARRAY_SIZE(tgt_reg); i++) { 1641 if (!reg_used[i]) 1642 continue; 1643 1644 tgt_reg[i] = j++; 1645 } 1646 nfp_prog->num_regs = j; 1647 1648 list_for_each_entry(meta, &nfp_prog->insns, l) { 1649 meta->insn.src_reg = tgt_reg[meta->insn.src_reg]; 1650 meta->insn.dst_reg = tgt_reg[meta->insn.dst_reg]; 1651 } 1652 1653 return 0; 1654 } 1655 1656 /* Remove masking after load since our load guarantees this is not needed */ 1657 static void nfp_bpf_opt_ld_mask(struct nfp_prog *nfp_prog) 1658 { 1659 struct nfp_insn_meta *meta1, *meta2; 1660 const s32 exp_mask[] = { 1661 [BPF_B] = 0x000000ffU, 1662 [BPF_H] = 0x0000ffffU, 1663 [BPF_W] = 0xffffffffU, 1664 }; 1665 1666 nfp_for_each_insn_walk2(nfp_prog, meta1, meta2) { 1667 struct bpf_insn insn, next; 1668 1669 insn = meta1->insn; 1670 next = meta2->insn; 1671 1672 if (BPF_CLASS(insn.code) != BPF_LD) 1673 continue; 1674 if (BPF_MODE(insn.code) != BPF_ABS && 1675 BPF_MODE(insn.code) != BPF_IND) 1676 continue; 1677 1678 if (next.code != (BPF_ALU64 | BPF_AND | BPF_K)) 1679 continue; 1680 1681 if (!exp_mask[BPF_SIZE(insn.code)]) 1682 continue; 1683 if (exp_mask[BPF_SIZE(insn.code)] != next.imm) 1684 continue; 1685 1686 if (next.src_reg || next.dst_reg) 1687 continue; 1688 1689 meta2->skip = true; 1690 } 1691 } 1692 1693 static void nfp_bpf_opt_ld_shift(struct nfp_prog *nfp_prog) 1694 { 1695 struct nfp_insn_meta *meta1, *meta2, *meta3; 1696 1697 nfp_for_each_insn_walk3(nfp_prog, meta1, meta2, meta3) { 1698 struct bpf_insn insn, next1, next2; 1699 1700 insn = meta1->insn; 1701 next1 = meta2->insn; 1702 next2 = meta3->insn; 1703 1704 if (BPF_CLASS(insn.code) != BPF_LD) 1705 continue; 1706 if (BPF_MODE(insn.code) != BPF_ABS && 1707 BPF_MODE(insn.code) != BPF_IND) 1708 continue; 1709 if (BPF_SIZE(insn.code) != BPF_W) 1710 continue; 1711 1712 if (!(next1.code == (BPF_LSH | BPF_K | BPF_ALU64) && 1713 next2.code == (BPF_RSH | BPF_K | BPF_ALU64)) && 1714 !(next1.code == (BPF_RSH | BPF_K | BPF_ALU64) && 1715 next2.code == (BPF_LSH | BPF_K | BPF_ALU64))) 1716 continue; 1717 1718 if (next1.src_reg || next1.dst_reg || 1719 next2.src_reg || next2.dst_reg) 1720 continue; 1721 1722 if (next1.imm != 0x20 || next2.imm != 0x20) 1723 continue; 1724 1725 meta2->skip = true; 1726 meta3->skip = true; 1727 } 1728 } 1729 1730 static int nfp_bpf_optimize(struct nfp_prog *nfp_prog) 1731 { 1732 int ret; 1733 1734 nfp_bpf_opt_reg_init(nfp_prog); 1735 1736 ret = nfp_bpf_opt_reg_rename(nfp_prog); 1737 if (ret) 1738 return ret; 1739 1740 nfp_bpf_opt_ld_mask(nfp_prog); 1741 nfp_bpf_opt_ld_shift(nfp_prog); 1742 1743 return 0; 1744 } 1745 1746 /** 1747 * nfp_bpf_jit() - translate BPF code into NFP assembly 1748 * @filter: kernel BPF filter struct 1749 * @prog_mem: memory to store assembler instructions 1750 * @act: action attached to this eBPF program 1751 * @prog_start: offset of the first instruction when loaded 1752 * @prog_done: where to jump on exit 1753 * @prog_sz: size of @prog_mem in instructions 1754 * @res: achieved parameters of translation results 1755 */ 1756 int 1757 nfp_bpf_jit(struct bpf_prog *filter, void *prog_mem, 1758 enum nfp_bpf_action_type act, 1759 unsigned int prog_start, unsigned int prog_done, 1760 unsigned int prog_sz, struct nfp_bpf_result *res) 1761 { 1762 struct nfp_prog *nfp_prog; 1763 int ret; 1764 1765 nfp_prog = kzalloc(sizeof(*nfp_prog), GFP_KERNEL); 1766 if (!nfp_prog) 1767 return -ENOMEM; 1768 1769 INIT_LIST_HEAD(&nfp_prog->insns); 1770 nfp_prog->act = act; 1771 nfp_prog->start_off = prog_start; 1772 nfp_prog->tgt_done = prog_done; 1773 1774 ret = nfp_prog_prepare(nfp_prog, filter->insnsi, filter->len); 1775 if (ret) 1776 goto out; 1777 1778 ret = nfp_prog_verify(nfp_prog, filter); 1779 if (ret) 1780 goto out; 1781 1782 ret = nfp_bpf_optimize(nfp_prog); 1783 if (ret) 1784 goto out; 1785 1786 if (nfp_prog->num_regs <= 7) 1787 nfp_prog->regs_per_thread = 16; 1788 else 1789 nfp_prog->regs_per_thread = 32; 1790 1791 nfp_prog->prog = prog_mem; 1792 nfp_prog->__prog_alloc_len = prog_sz; 1793 1794 ret = nfp_translate(nfp_prog); 1795 if (ret) { 1796 pr_err("Translation failed with error %d (translated: %u)\n", 1797 ret, nfp_prog->n_translated); 1798 ret = -EINVAL; 1799 } 1800 1801 res->n_instr = nfp_prog->prog_len; 1802 res->dense_mode = nfp_prog->num_regs <= 7; 1803 out: 1804 nfp_prog_free(nfp_prog); 1805 1806 return ret; 1807 } 1808