4628 lines
125 KiB
C
4628 lines
125 KiB
C
// SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
|
|
/* Copyright (C) 2016-2018 Netronome Systems, Inc. */
|
|
|
|
#define pr_fmt(fmt) "NFP net bpf: " fmt
|
|
|
|
#include <linux/bug.h>
|
|
#include <linux/bpf.h>
|
|
#include <linux/filter.h>
|
|
#include <linux/kernel.h>
|
|
#include <linux/pkt_cls.h>
|
|
#include <linux/reciprocal_div.h>
|
|
#include <linux/unistd.h>
|
|
|
|
#include "main.h"
|
|
#include "../nfp_asm.h"
|
|
#include "../nfp_net_ctrl.h"
|
|
|
|
/* --- NFP prog --- */
|
|
/* Foreach "multiple" entries macros provide pos and next<n> pointers.
|
|
* It's safe to modify the next pointers (but not pos).
|
|
*/
|
|
#define nfp_for_each_insn_walk2(nfp_prog, pos, next) \
|
|
for (pos = list_first_entry(&(nfp_prog)->insns, typeof(*pos), l), \
|
|
next = list_next_entry(pos, l); \
|
|
&(nfp_prog)->insns != &pos->l && \
|
|
&(nfp_prog)->insns != &next->l; \
|
|
pos = nfp_meta_next(pos), \
|
|
next = nfp_meta_next(pos))
|
|
|
|
#define nfp_for_each_insn_walk3(nfp_prog, pos, next, next2) \
|
|
for (pos = list_first_entry(&(nfp_prog)->insns, typeof(*pos), l), \
|
|
next = list_next_entry(pos, l), \
|
|
next2 = list_next_entry(next, l); \
|
|
&(nfp_prog)->insns != &pos->l && \
|
|
&(nfp_prog)->insns != &next->l && \
|
|
&(nfp_prog)->insns != &next2->l; \
|
|
pos = nfp_meta_next(pos), \
|
|
next = nfp_meta_next(pos), \
|
|
next2 = nfp_meta_next(next))
|
|
|
|
static bool
|
|
nfp_meta_has_prev(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return meta->l.prev != &nfp_prog->insns;
|
|
}
|
|
|
|
static void nfp_prog_push(struct nfp_prog *nfp_prog, u64 insn)
|
|
{
|
|
if (nfp_prog->__prog_alloc_len / sizeof(u64) == nfp_prog->prog_len) {
|
|
pr_warn("instruction limit reached (%u NFP instructions)\n",
|
|
nfp_prog->prog_len);
|
|
nfp_prog->error = -ENOSPC;
|
|
return;
|
|
}
|
|
|
|
nfp_prog->prog[nfp_prog->prog_len] = insn;
|
|
nfp_prog->prog_len++;
|
|
}
|
|
|
|
static unsigned int nfp_prog_current_offset(struct nfp_prog *nfp_prog)
|
|
{
|
|
return nfp_prog->prog_len;
|
|
}
|
|
|
|
static bool
|
|
nfp_prog_confirm_current_offset(struct nfp_prog *nfp_prog, unsigned int off)
|
|
{
|
|
/* If there is a recorded error we may have dropped instructions;
|
|
* that doesn't have to be due to translator bug, and the translation
|
|
* will fail anyway, so just return OK.
|
|
*/
|
|
if (nfp_prog->error)
|
|
return true;
|
|
return !WARN_ON_ONCE(nfp_prog_current_offset(nfp_prog) != off);
|
|
}
|
|
|
|
/* --- Emitters --- */
|
|
static void
|
|
__emit_cmd(struct nfp_prog *nfp_prog, enum cmd_tgt_map op,
|
|
u8 mode, u8 xfer, u8 areg, u8 breg, u8 size, enum cmd_ctx_swap ctx,
|
|
bool indir)
|
|
{
|
|
u64 insn;
|
|
|
|
insn = FIELD_PREP(OP_CMD_A_SRC, areg) |
|
|
FIELD_PREP(OP_CMD_CTX, ctx) |
|
|
FIELD_PREP(OP_CMD_B_SRC, breg) |
|
|
FIELD_PREP(OP_CMD_TOKEN, cmd_tgt_act[op].token) |
|
|
FIELD_PREP(OP_CMD_XFER, xfer) |
|
|
FIELD_PREP(OP_CMD_CNT, size) |
|
|
FIELD_PREP(OP_CMD_SIG, ctx != CMD_CTX_NO_SWAP) |
|
|
FIELD_PREP(OP_CMD_TGT_CMD, cmd_tgt_act[op].tgt_cmd) |
|
|
FIELD_PREP(OP_CMD_INDIR, indir) |
|
|
FIELD_PREP(OP_CMD_MODE, mode);
|
|
|
|
nfp_prog_push(nfp_prog, insn);
|
|
}
|
|
|
|
static void
|
|
emit_cmd_any(struct nfp_prog *nfp_prog, enum cmd_tgt_map op, u8 mode, u8 xfer,
|
|
swreg lreg, swreg rreg, u8 size, enum cmd_ctx_swap ctx, bool indir)
|
|
{
|
|
struct nfp_insn_re_regs reg;
|
|
int err;
|
|
|
|
err = swreg_to_restricted(reg_none(), lreg, rreg, ®, false);
|
|
if (err) {
|
|
nfp_prog->error = err;
|
|
return;
|
|
}
|
|
if (reg.swap) {
|
|
pr_err("cmd can't swap arguments\n");
|
|
nfp_prog->error = -EFAULT;
|
|
return;
|
|
}
|
|
if (reg.dst_lmextn || reg.src_lmextn) {
|
|
pr_err("cmd can't use LMextn\n");
|
|
nfp_prog->error = -EFAULT;
|
|
return;
|
|
}
|
|
|
|
__emit_cmd(nfp_prog, op, mode, xfer, reg.areg, reg.breg, size, ctx,
|
|
indir);
|
|
}
|
|
|
|
static void
|
|
emit_cmd(struct nfp_prog *nfp_prog, enum cmd_tgt_map op, u8 mode, u8 xfer,
|
|
swreg lreg, swreg rreg, u8 size, enum cmd_ctx_swap ctx)
|
|
{
|
|
emit_cmd_any(nfp_prog, op, mode, xfer, lreg, rreg, size, ctx, false);
|
|
}
|
|
|
|
static void
|
|
emit_cmd_indir(struct nfp_prog *nfp_prog, enum cmd_tgt_map op, u8 mode, u8 xfer,
|
|
swreg lreg, swreg rreg, u8 size, enum cmd_ctx_swap ctx)
|
|
{
|
|
emit_cmd_any(nfp_prog, op, mode, xfer, lreg, rreg, size, ctx, true);
|
|
}
|
|
|
|
static void
|
|
__emit_br(struct nfp_prog *nfp_prog, enum br_mask mask, enum br_ev_pip ev_pip,
|
|
enum br_ctx_signal_state css, u16 addr, u8 defer)
|
|
{
|
|
u16 addr_lo, addr_hi;
|
|
u64 insn;
|
|
|
|
addr_lo = addr & (OP_BR_ADDR_LO >> __bf_shf(OP_BR_ADDR_LO));
|
|
addr_hi = addr != addr_lo;
|
|
|
|
insn = OP_BR_BASE |
|
|
FIELD_PREP(OP_BR_MASK, mask) |
|
|
FIELD_PREP(OP_BR_EV_PIP, ev_pip) |
|
|
FIELD_PREP(OP_BR_CSS, css) |
|
|
FIELD_PREP(OP_BR_DEFBR, defer) |
|
|
FIELD_PREP(OP_BR_ADDR_LO, addr_lo) |
|
|
FIELD_PREP(OP_BR_ADDR_HI, addr_hi);
|
|
|
|
nfp_prog_push(nfp_prog, insn);
|
|
}
|
|
|
|
static void
|
|
emit_br_relo(struct nfp_prog *nfp_prog, enum br_mask mask, u16 addr, u8 defer,
|
|
enum nfp_relo_type relo)
|
|
{
|
|
if (mask == BR_UNC && defer > 2) {
|
|
pr_err("BUG: branch defer out of bounds %d\n", defer);
|
|
nfp_prog->error = -EFAULT;
|
|
return;
|
|
}
|
|
|
|
__emit_br(nfp_prog, mask,
|
|
mask != BR_UNC ? BR_EV_PIP_COND : BR_EV_PIP_UNCOND,
|
|
BR_CSS_NONE, addr, defer);
|
|
|
|
nfp_prog->prog[nfp_prog->prog_len - 1] |=
|
|
FIELD_PREP(OP_RELO_TYPE, relo);
|
|
}
|
|
|
|
static void
|
|
emit_br(struct nfp_prog *nfp_prog, enum br_mask mask, u16 addr, u8 defer)
|
|
{
|
|
emit_br_relo(nfp_prog, mask, addr, defer, RELO_BR_REL);
|
|
}
|
|
|
|
static void
|
|
__emit_br_bit(struct nfp_prog *nfp_prog, u16 areg, u16 breg, u16 addr, u8 defer,
|
|
bool set, bool src_lmextn)
|
|
{
|
|
u16 addr_lo, addr_hi;
|
|
u64 insn;
|
|
|
|
addr_lo = addr & (OP_BR_BIT_ADDR_LO >> __bf_shf(OP_BR_BIT_ADDR_LO));
|
|
addr_hi = addr != addr_lo;
|
|
|
|
insn = OP_BR_BIT_BASE |
|
|
FIELD_PREP(OP_BR_BIT_A_SRC, areg) |
|
|
FIELD_PREP(OP_BR_BIT_B_SRC, breg) |
|
|
FIELD_PREP(OP_BR_BIT_BV, set) |
|
|
FIELD_PREP(OP_BR_BIT_DEFBR, defer) |
|
|
FIELD_PREP(OP_BR_BIT_ADDR_LO, addr_lo) |
|
|
FIELD_PREP(OP_BR_BIT_ADDR_HI, addr_hi) |
|
|
FIELD_PREP(OP_BR_BIT_SRC_LMEXTN, src_lmextn);
|
|
|
|
nfp_prog_push(nfp_prog, insn);
|
|
}
|
|
|
|
static void
|
|
emit_br_bit_relo(struct nfp_prog *nfp_prog, swreg src, u8 bit, u16 addr,
|
|
u8 defer, bool set, enum nfp_relo_type relo)
|
|
{
|
|
struct nfp_insn_re_regs reg;
|
|
int err;
|
|
|
|
/* NOTE: The bit to test is specified as an rotation amount, such that
|
|
* the bit to test will be placed on the MSB of the result when
|
|
* doing a rotate right. For bit X, we need right rotate X + 1.
|
|
*/
|
|
bit += 1;
|
|
|
|
err = swreg_to_restricted(reg_none(), src, reg_imm(bit), ®, false);
|
|
if (err) {
|
|
nfp_prog->error = err;
|
|
return;
|
|
}
|
|
|
|
__emit_br_bit(nfp_prog, reg.areg, reg.breg, addr, defer, set,
|
|
reg.src_lmextn);
|
|
|
|
nfp_prog->prog[nfp_prog->prog_len - 1] |=
|
|
FIELD_PREP(OP_RELO_TYPE, relo);
|
|
}
|
|
|
|
static void
|
|
emit_br_bset(struct nfp_prog *nfp_prog, swreg src, u8 bit, u16 addr, u8 defer)
|
|
{
|
|
emit_br_bit_relo(nfp_prog, src, bit, addr, defer, true, RELO_BR_REL);
|
|
}
|
|
|
|
static void
|
|
__emit_br_alu(struct nfp_prog *nfp_prog, u16 areg, u16 breg, u16 imm_hi,
|
|
u8 defer, bool dst_lmextn, bool src_lmextn)
|
|
{
|
|
u64 insn;
|
|
|
|
insn = OP_BR_ALU_BASE |
|
|
FIELD_PREP(OP_BR_ALU_A_SRC, areg) |
|
|
FIELD_PREP(OP_BR_ALU_B_SRC, breg) |
|
|
FIELD_PREP(OP_BR_ALU_DEFBR, defer) |
|
|
FIELD_PREP(OP_BR_ALU_IMM_HI, imm_hi) |
|
|
FIELD_PREP(OP_BR_ALU_SRC_LMEXTN, src_lmextn) |
|
|
FIELD_PREP(OP_BR_ALU_DST_LMEXTN, dst_lmextn);
|
|
|
|
nfp_prog_push(nfp_prog, insn);
|
|
}
|
|
|
|
static void emit_rtn(struct nfp_prog *nfp_prog, swreg base, u8 defer)
|
|
{
|
|
struct nfp_insn_ur_regs reg;
|
|
int err;
|
|
|
|
err = swreg_to_unrestricted(reg_none(), base, reg_imm(0), ®);
|
|
if (err) {
|
|
nfp_prog->error = err;
|
|
return;
|
|
}
|
|
|
|
__emit_br_alu(nfp_prog, reg.areg, reg.breg, 0, defer, reg.dst_lmextn,
|
|
reg.src_lmextn);
|
|
}
|
|
|
|
static void
|
|
__emit_immed(struct nfp_prog *nfp_prog, u16 areg, u16 breg, u16 imm_hi,
|
|
enum immed_width width, bool invert,
|
|
enum immed_shift shift, bool wr_both,
|
|
bool dst_lmextn, bool src_lmextn)
|
|
{
|
|
u64 insn;
|
|
|
|
insn = OP_IMMED_BASE |
|
|
FIELD_PREP(OP_IMMED_A_SRC, areg) |
|
|
FIELD_PREP(OP_IMMED_B_SRC, breg) |
|
|
FIELD_PREP(OP_IMMED_IMM, imm_hi) |
|
|
FIELD_PREP(OP_IMMED_WIDTH, width) |
|
|
FIELD_PREP(OP_IMMED_INV, invert) |
|
|
FIELD_PREP(OP_IMMED_SHIFT, shift) |
|
|
FIELD_PREP(OP_IMMED_WR_AB, wr_both) |
|
|
FIELD_PREP(OP_IMMED_SRC_LMEXTN, src_lmextn) |
|
|
FIELD_PREP(OP_IMMED_DST_LMEXTN, dst_lmextn);
|
|
|
|
nfp_prog_push(nfp_prog, insn);
|
|
}
|
|
|
|
static void
|
|
emit_immed(struct nfp_prog *nfp_prog, swreg dst, u16 imm,
|
|
enum immed_width width, bool invert, enum immed_shift shift)
|
|
{
|
|
struct nfp_insn_ur_regs reg;
|
|
int err;
|
|
|
|
if (swreg_type(dst) == NN_REG_IMM) {
|
|
nfp_prog->error = -EFAULT;
|
|
return;
|
|
}
|
|
|
|
err = swreg_to_unrestricted(dst, dst, reg_imm(imm & 0xff), ®);
|
|
if (err) {
|
|
nfp_prog->error = err;
|
|
return;
|
|
}
|
|
|
|
/* Use reg.dst when destination is No-Dest. */
|
|
__emit_immed(nfp_prog,
|
|
swreg_type(dst) == NN_REG_NONE ? reg.dst : reg.areg,
|
|
reg.breg, imm >> 8, width, invert, shift,
|
|
reg.wr_both, reg.dst_lmextn, reg.src_lmextn);
|
|
}
|
|
|
|
static void
|
|
__emit_shf(struct nfp_prog *nfp_prog, u16 dst, enum alu_dst_ab dst_ab,
|
|
enum shf_sc sc, u8 shift,
|
|
u16 areg, enum shf_op op, u16 breg, bool i8, bool sw, bool wr_both,
|
|
bool dst_lmextn, bool src_lmextn)
|
|
{
|
|
u64 insn;
|
|
|
|
if (!FIELD_FIT(OP_SHF_SHIFT, shift)) {
|
|
nfp_prog->error = -EFAULT;
|
|
return;
|
|
}
|
|
|
|
/* NFP shift instruction has something special. If shift direction is
|
|
* left then shift amount of 1 to 31 is specified as 32 minus the amount
|
|
* to shift.
|
|
*
|
|
* But no need to do this for indirect shift which has shift amount be
|
|
* 0. Even after we do this subtraction, shift amount 0 will be turned
|
|
* into 32 which will eventually be encoded the same as 0 because only
|
|
* low 5 bits are encoded, but shift amount be 32 will fail the
|
|
* FIELD_PREP check done later on shift mask (0x1f), due to 32 is out of
|
|
* mask range.
|
|
*/
|
|
if (sc == SHF_SC_L_SHF && shift)
|
|
shift = 32 - shift;
|
|
|
|
insn = OP_SHF_BASE |
|
|
FIELD_PREP(OP_SHF_A_SRC, areg) |
|
|
FIELD_PREP(OP_SHF_SC, sc) |
|
|
FIELD_PREP(OP_SHF_B_SRC, breg) |
|
|
FIELD_PREP(OP_SHF_I8, i8) |
|
|
FIELD_PREP(OP_SHF_SW, sw) |
|
|
FIELD_PREP(OP_SHF_DST, dst) |
|
|
FIELD_PREP(OP_SHF_SHIFT, shift) |
|
|
FIELD_PREP(OP_SHF_OP, op) |
|
|
FIELD_PREP(OP_SHF_DST_AB, dst_ab) |
|
|
FIELD_PREP(OP_SHF_WR_AB, wr_both) |
|
|
FIELD_PREP(OP_SHF_SRC_LMEXTN, src_lmextn) |
|
|
FIELD_PREP(OP_SHF_DST_LMEXTN, dst_lmextn);
|
|
|
|
nfp_prog_push(nfp_prog, insn);
|
|
}
|
|
|
|
static void
|
|
emit_shf(struct nfp_prog *nfp_prog, swreg dst,
|
|
swreg lreg, enum shf_op op, swreg rreg, enum shf_sc sc, u8 shift)
|
|
{
|
|
struct nfp_insn_re_regs reg;
|
|
int err;
|
|
|
|
err = swreg_to_restricted(dst, lreg, rreg, ®, true);
|
|
if (err) {
|
|
nfp_prog->error = err;
|
|
return;
|
|
}
|
|
|
|
__emit_shf(nfp_prog, reg.dst, reg.dst_ab, sc, shift,
|
|
reg.areg, op, reg.breg, reg.i8, reg.swap, reg.wr_both,
|
|
reg.dst_lmextn, reg.src_lmextn);
|
|
}
|
|
|
|
static void
|
|
emit_shf_indir(struct nfp_prog *nfp_prog, swreg dst,
|
|
swreg lreg, enum shf_op op, swreg rreg, enum shf_sc sc)
|
|
{
|
|
if (sc == SHF_SC_R_ROT) {
|
|
pr_err("indirect shift is not allowed on rotation\n");
|
|
nfp_prog->error = -EFAULT;
|
|
return;
|
|
}
|
|
|
|
emit_shf(nfp_prog, dst, lreg, op, rreg, sc, 0);
|
|
}
|
|
|
|
static void
|
|
__emit_alu(struct nfp_prog *nfp_prog, u16 dst, enum alu_dst_ab dst_ab,
|
|
u16 areg, enum alu_op op, u16 breg, bool swap, bool wr_both,
|
|
bool dst_lmextn, bool src_lmextn)
|
|
{
|
|
u64 insn;
|
|
|
|
insn = OP_ALU_BASE |
|
|
FIELD_PREP(OP_ALU_A_SRC, areg) |
|
|
FIELD_PREP(OP_ALU_B_SRC, breg) |
|
|
FIELD_PREP(OP_ALU_DST, dst) |
|
|
FIELD_PREP(OP_ALU_SW, swap) |
|
|
FIELD_PREP(OP_ALU_OP, op) |
|
|
FIELD_PREP(OP_ALU_DST_AB, dst_ab) |
|
|
FIELD_PREP(OP_ALU_WR_AB, wr_both) |
|
|
FIELD_PREP(OP_ALU_SRC_LMEXTN, src_lmextn) |
|
|
FIELD_PREP(OP_ALU_DST_LMEXTN, dst_lmextn);
|
|
|
|
nfp_prog_push(nfp_prog, insn);
|
|
}
|
|
|
|
static void
|
|
emit_alu(struct nfp_prog *nfp_prog, swreg dst,
|
|
swreg lreg, enum alu_op op, swreg rreg)
|
|
{
|
|
struct nfp_insn_ur_regs reg;
|
|
int err;
|
|
|
|
err = swreg_to_unrestricted(dst, lreg, rreg, ®);
|
|
if (err) {
|
|
nfp_prog->error = err;
|
|
return;
|
|
}
|
|
|
|
__emit_alu(nfp_prog, reg.dst, reg.dst_ab,
|
|
reg.areg, op, reg.breg, reg.swap, reg.wr_both,
|
|
reg.dst_lmextn, reg.src_lmextn);
|
|
}
|
|
|
|
static void
|
|
__emit_mul(struct nfp_prog *nfp_prog, enum alu_dst_ab dst_ab, u16 areg,
|
|
enum mul_type type, enum mul_step step, u16 breg, bool swap,
|
|
bool wr_both, bool dst_lmextn, bool src_lmextn)
|
|
{
|
|
u64 insn;
|
|
|
|
insn = OP_MUL_BASE |
|
|
FIELD_PREP(OP_MUL_A_SRC, areg) |
|
|
FIELD_PREP(OP_MUL_B_SRC, breg) |
|
|
FIELD_PREP(OP_MUL_STEP, step) |
|
|
FIELD_PREP(OP_MUL_DST_AB, dst_ab) |
|
|
FIELD_PREP(OP_MUL_SW, swap) |
|
|
FIELD_PREP(OP_MUL_TYPE, type) |
|
|
FIELD_PREP(OP_MUL_WR_AB, wr_both) |
|
|
FIELD_PREP(OP_MUL_SRC_LMEXTN, src_lmextn) |
|
|
FIELD_PREP(OP_MUL_DST_LMEXTN, dst_lmextn);
|
|
|
|
nfp_prog_push(nfp_prog, insn);
|
|
}
|
|
|
|
static void
|
|
emit_mul(struct nfp_prog *nfp_prog, swreg lreg, enum mul_type type,
|
|
enum mul_step step, swreg rreg)
|
|
{
|
|
struct nfp_insn_ur_regs reg;
|
|
u16 areg;
|
|
int err;
|
|
|
|
if (type == MUL_TYPE_START && step != MUL_STEP_NONE) {
|
|
nfp_prog->error = -EINVAL;
|
|
return;
|
|
}
|
|
|
|
if (step == MUL_LAST || step == MUL_LAST_2) {
|
|
/* When type is step and step Number is LAST or LAST2, left
|
|
* source is used as destination.
|
|
*/
|
|
err = swreg_to_unrestricted(lreg, reg_none(), rreg, ®);
|
|
areg = reg.dst;
|
|
} else {
|
|
err = swreg_to_unrestricted(reg_none(), lreg, rreg, ®);
|
|
areg = reg.areg;
|
|
}
|
|
|
|
if (err) {
|
|
nfp_prog->error = err;
|
|
return;
|
|
}
|
|
|
|
__emit_mul(nfp_prog, reg.dst_ab, areg, type, step, reg.breg, reg.swap,
|
|
reg.wr_both, reg.dst_lmextn, reg.src_lmextn);
|
|
}
|
|
|
|
static void
|
|
__emit_ld_field(struct nfp_prog *nfp_prog, enum shf_sc sc,
|
|
u8 areg, u8 bmask, u8 breg, u8 shift, bool imm8,
|
|
bool zero, bool swap, bool wr_both,
|
|
bool dst_lmextn, bool src_lmextn)
|
|
{
|
|
u64 insn;
|
|
|
|
insn = OP_LDF_BASE |
|
|
FIELD_PREP(OP_LDF_A_SRC, areg) |
|
|
FIELD_PREP(OP_LDF_SC, sc) |
|
|
FIELD_PREP(OP_LDF_B_SRC, breg) |
|
|
FIELD_PREP(OP_LDF_I8, imm8) |
|
|
FIELD_PREP(OP_LDF_SW, swap) |
|
|
FIELD_PREP(OP_LDF_ZF, zero) |
|
|
FIELD_PREP(OP_LDF_BMASK, bmask) |
|
|
FIELD_PREP(OP_LDF_SHF, shift) |
|
|
FIELD_PREP(OP_LDF_WR_AB, wr_both) |
|
|
FIELD_PREP(OP_LDF_SRC_LMEXTN, src_lmextn) |
|
|
FIELD_PREP(OP_LDF_DST_LMEXTN, dst_lmextn);
|
|
|
|
nfp_prog_push(nfp_prog, insn);
|
|
}
|
|
|
|
static void
|
|
emit_ld_field_any(struct nfp_prog *nfp_prog, swreg dst, u8 bmask, swreg src,
|
|
enum shf_sc sc, u8 shift, bool zero)
|
|
{
|
|
struct nfp_insn_re_regs reg;
|
|
int err;
|
|
|
|
/* Note: ld_field is special as it uses one of the src regs as dst */
|
|
err = swreg_to_restricted(dst, dst, src, ®, true);
|
|
if (err) {
|
|
nfp_prog->error = err;
|
|
return;
|
|
}
|
|
|
|
__emit_ld_field(nfp_prog, sc, reg.areg, bmask, reg.breg, shift,
|
|
reg.i8, zero, reg.swap, reg.wr_both,
|
|
reg.dst_lmextn, reg.src_lmextn);
|
|
}
|
|
|
|
static void
|
|
emit_ld_field(struct nfp_prog *nfp_prog, swreg dst, u8 bmask, swreg src,
|
|
enum shf_sc sc, u8 shift)
|
|
{
|
|
emit_ld_field_any(nfp_prog, dst, bmask, src, sc, shift, false);
|
|
}
|
|
|
|
static void
|
|
__emit_lcsr(struct nfp_prog *nfp_prog, u16 areg, u16 breg, bool wr, u16 addr,
|
|
bool dst_lmextn, bool src_lmextn)
|
|
{
|
|
u64 insn;
|
|
|
|
insn = OP_LCSR_BASE |
|
|
FIELD_PREP(OP_LCSR_A_SRC, areg) |
|
|
FIELD_PREP(OP_LCSR_B_SRC, breg) |
|
|
FIELD_PREP(OP_LCSR_WRITE, wr) |
|
|
FIELD_PREP(OP_LCSR_ADDR, addr / 4) |
|
|
FIELD_PREP(OP_LCSR_SRC_LMEXTN, src_lmextn) |
|
|
FIELD_PREP(OP_LCSR_DST_LMEXTN, dst_lmextn);
|
|
|
|
nfp_prog_push(nfp_prog, insn);
|
|
}
|
|
|
|
static void emit_csr_wr(struct nfp_prog *nfp_prog, swreg src, u16 addr)
|
|
{
|
|
struct nfp_insn_ur_regs reg;
|
|
int err;
|
|
|
|
/* This instruction takes immeds instead of reg_none() for the ignored
|
|
* operand, but we can't encode 2 immeds in one instr with our normal
|
|
* swreg infra so if param is an immed, we encode as reg_none() and
|
|
* copy the immed to both operands.
|
|
*/
|
|
if (swreg_type(src) == NN_REG_IMM) {
|
|
err = swreg_to_unrestricted(reg_none(), src, reg_none(), ®);
|
|
reg.breg = reg.areg;
|
|
} else {
|
|
err = swreg_to_unrestricted(reg_none(), src, reg_imm(0), ®);
|
|
}
|
|
if (err) {
|
|
nfp_prog->error = err;
|
|
return;
|
|
}
|
|
|
|
__emit_lcsr(nfp_prog, reg.areg, reg.breg, true, addr,
|
|
false, reg.src_lmextn);
|
|
}
|
|
|
|
/* CSR value is read in following immed[gpr, 0] */
|
|
static void __emit_csr_rd(struct nfp_prog *nfp_prog, u16 addr)
|
|
{
|
|
__emit_lcsr(nfp_prog, 0, 0, false, addr, false, false);
|
|
}
|
|
|
|
static void emit_nop(struct nfp_prog *nfp_prog)
|
|
{
|
|
__emit_immed(nfp_prog, UR_REG_IMM, UR_REG_IMM, 0, 0, 0, 0, 0, 0, 0);
|
|
}
|
|
|
|
/* --- Wrappers --- */
|
|
static bool pack_immed(u32 imm, u16 *val, enum immed_shift *shift)
|
|
{
|
|
if (!(imm & 0xffff0000)) {
|
|
*val = imm;
|
|
*shift = IMMED_SHIFT_0B;
|
|
} else if (!(imm & 0xff0000ff)) {
|
|
*val = imm >> 8;
|
|
*shift = IMMED_SHIFT_1B;
|
|
} else if (!(imm & 0x0000ffff)) {
|
|
*val = imm >> 16;
|
|
*shift = IMMED_SHIFT_2B;
|
|
} else {
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
static void wrp_immed(struct nfp_prog *nfp_prog, swreg dst, u32 imm)
|
|
{
|
|
enum immed_shift shift;
|
|
u16 val;
|
|
|
|
if (pack_immed(imm, &val, &shift)) {
|
|
emit_immed(nfp_prog, dst, val, IMMED_WIDTH_ALL, false, shift);
|
|
} else if (pack_immed(~imm, &val, &shift)) {
|
|
emit_immed(nfp_prog, dst, val, IMMED_WIDTH_ALL, true, shift);
|
|
} else {
|
|
emit_immed(nfp_prog, dst, imm & 0xffff, IMMED_WIDTH_ALL,
|
|
false, IMMED_SHIFT_0B);
|
|
emit_immed(nfp_prog, dst, imm >> 16, IMMED_WIDTH_WORD,
|
|
false, IMMED_SHIFT_2B);
|
|
}
|
|
}
|
|
|
|
static void
|
|
wrp_zext(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, u8 dst)
|
|
{
|
|
if (meta->flags & FLAG_INSN_DO_ZEXT)
|
|
wrp_immed(nfp_prog, reg_both(dst + 1), 0);
|
|
}
|
|
|
|
static void
|
|
wrp_immed_relo(struct nfp_prog *nfp_prog, swreg dst, u32 imm,
|
|
enum nfp_relo_type relo)
|
|
{
|
|
if (imm > 0xffff) {
|
|
pr_err("relocation of a large immediate!\n");
|
|
nfp_prog->error = -EFAULT;
|
|
return;
|
|
}
|
|
emit_immed(nfp_prog, dst, imm, IMMED_WIDTH_ALL, false, IMMED_SHIFT_0B);
|
|
|
|
nfp_prog->prog[nfp_prog->prog_len - 1] |=
|
|
FIELD_PREP(OP_RELO_TYPE, relo);
|
|
}
|
|
|
|
/* ur_load_imm_any() - encode immediate or use tmp register (unrestricted)
|
|
* If the @imm is small enough encode it directly in operand and return
|
|
* otherwise load @imm to a spare register and return its encoding.
|
|
*/
|
|
static swreg ur_load_imm_any(struct nfp_prog *nfp_prog, u32 imm, swreg tmp_reg)
|
|
{
|
|
if (FIELD_FIT(UR_REG_IMM_MAX, imm))
|
|
return reg_imm(imm);
|
|
|
|
wrp_immed(nfp_prog, tmp_reg, imm);
|
|
return tmp_reg;
|
|
}
|
|
|
|
/* re_load_imm_any() - encode immediate or use tmp register (restricted)
|
|
* If the @imm is small enough encode it directly in operand and return
|
|
* otherwise load @imm to a spare register and return its encoding.
|
|
*/
|
|
static swreg re_load_imm_any(struct nfp_prog *nfp_prog, u32 imm, swreg tmp_reg)
|
|
{
|
|
if (FIELD_FIT(RE_REG_IMM_MAX, imm))
|
|
return reg_imm(imm);
|
|
|
|
wrp_immed(nfp_prog, tmp_reg, imm);
|
|
return tmp_reg;
|
|
}
|
|
|
|
static void wrp_nops(struct nfp_prog *nfp_prog, unsigned int count)
|
|
{
|
|
while (count--)
|
|
emit_nop(nfp_prog);
|
|
}
|
|
|
|
static void wrp_mov(struct nfp_prog *nfp_prog, swreg dst, swreg src)
|
|
{
|
|
emit_alu(nfp_prog, dst, reg_none(), ALU_OP_NONE, src);
|
|
}
|
|
|
|
static void wrp_reg_mov(struct nfp_prog *nfp_prog, u16 dst, u16 src)
|
|
{
|
|
wrp_mov(nfp_prog, reg_both(dst), reg_b(src));
|
|
}
|
|
|
|
/* wrp_reg_subpart() - load @field_len bytes from @offset of @src, write the
|
|
* result to @dst from low end.
|
|
*/
|
|
static void
|
|
wrp_reg_subpart(struct nfp_prog *nfp_prog, swreg dst, swreg src, u8 field_len,
|
|
u8 offset)
|
|
{
|
|
enum shf_sc sc = offset ? SHF_SC_R_SHF : SHF_SC_NONE;
|
|
u8 mask = (1 << field_len) - 1;
|
|
|
|
emit_ld_field_any(nfp_prog, dst, mask, src, sc, offset * 8, true);
|
|
}
|
|
|
|
/* wrp_reg_or_subpart() - load @field_len bytes from low end of @src, or the
|
|
* result to @dst from offset, there is no change on the other bits of @dst.
|
|
*/
|
|
static void
|
|
wrp_reg_or_subpart(struct nfp_prog *nfp_prog, swreg dst, swreg src,
|
|
u8 field_len, u8 offset)
|
|
{
|
|
enum shf_sc sc = offset ? SHF_SC_L_SHF : SHF_SC_NONE;
|
|
u8 mask = ((1 << field_len) - 1) << offset;
|
|
|
|
emit_ld_field(nfp_prog, dst, mask, src, sc, 32 - offset * 8);
|
|
}
|
|
|
|
static void
|
|
addr40_offset(struct nfp_prog *nfp_prog, u8 src_gpr, swreg offset,
|
|
swreg *rega, swreg *regb)
|
|
{
|
|
if (offset == reg_imm(0)) {
|
|
*rega = reg_a(src_gpr);
|
|
*regb = reg_b(src_gpr + 1);
|
|
return;
|
|
}
|
|
|
|
emit_alu(nfp_prog, imm_a(nfp_prog), reg_a(src_gpr), ALU_OP_ADD, offset);
|
|
emit_alu(nfp_prog, imm_b(nfp_prog), reg_b(src_gpr + 1), ALU_OP_ADD_C,
|
|
reg_imm(0));
|
|
*rega = imm_a(nfp_prog);
|
|
*regb = imm_b(nfp_prog);
|
|
}
|
|
|
|
/* NFP has Command Push Pull bus which supports bluk memory operations. */
|
|
static int nfp_cpp_memcpy(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
bool descending_seq = meta->ldst_gather_len < 0;
|
|
s16 len = abs(meta->ldst_gather_len);
|
|
swreg src_base, off;
|
|
bool src_40bit_addr;
|
|
unsigned int i;
|
|
u8 xfer_num;
|
|
|
|
off = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
|
|
src_40bit_addr = meta->ptr.type == PTR_TO_MAP_VALUE;
|
|
src_base = reg_a(meta->insn.src_reg * 2);
|
|
xfer_num = round_up(len, 4) / 4;
|
|
|
|
if (src_40bit_addr)
|
|
addr40_offset(nfp_prog, meta->insn.src_reg * 2, off, &src_base,
|
|
&off);
|
|
|
|
/* Setup PREV_ALU fields to override memory read length. */
|
|
if (len > 32)
|
|
wrp_immed(nfp_prog, reg_none(),
|
|
CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, xfer_num - 1));
|
|
|
|
/* Memory read from source addr into transfer-in registers. */
|
|
emit_cmd_any(nfp_prog, CMD_TGT_READ32_SWAP,
|
|
src_40bit_addr ? CMD_MODE_40b_BA : CMD_MODE_32b, 0,
|
|
src_base, off, xfer_num - 1, CMD_CTX_SWAP, len > 32);
|
|
|
|
/* Move from transfer-in to transfer-out. */
|
|
for (i = 0; i < xfer_num; i++)
|
|
wrp_mov(nfp_prog, reg_xfer(i), reg_xfer(i));
|
|
|
|
off = re_load_imm_any(nfp_prog, meta->paired_st->off, imm_b(nfp_prog));
|
|
|
|
if (len <= 8) {
|
|
/* Use single direct_ref write8. */
|
|
emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0,
|
|
reg_a(meta->paired_st->dst_reg * 2), off, len - 1,
|
|
CMD_CTX_SWAP);
|
|
} else if (len <= 32 && IS_ALIGNED(len, 4)) {
|
|
/* Use single direct_ref write32. */
|
|
emit_cmd(nfp_prog, CMD_TGT_WRITE32_SWAP, CMD_MODE_32b, 0,
|
|
reg_a(meta->paired_st->dst_reg * 2), off, xfer_num - 1,
|
|
CMD_CTX_SWAP);
|
|
} else if (len <= 32) {
|
|
/* Use single indirect_ref write8. */
|
|
wrp_immed(nfp_prog, reg_none(),
|
|
CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, len - 1));
|
|
emit_cmd_indir(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0,
|
|
reg_a(meta->paired_st->dst_reg * 2), off,
|
|
len - 1, CMD_CTX_SWAP);
|
|
} else if (IS_ALIGNED(len, 4)) {
|
|
/* Use single indirect_ref write32. */
|
|
wrp_immed(nfp_prog, reg_none(),
|
|
CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, xfer_num - 1));
|
|
emit_cmd_indir(nfp_prog, CMD_TGT_WRITE32_SWAP, CMD_MODE_32b, 0,
|
|
reg_a(meta->paired_st->dst_reg * 2), off,
|
|
xfer_num - 1, CMD_CTX_SWAP);
|
|
} else if (len <= 40) {
|
|
/* Use one direct_ref write32 to write the first 32-bytes, then
|
|
* another direct_ref write8 to write the remaining bytes.
|
|
*/
|
|
emit_cmd(nfp_prog, CMD_TGT_WRITE32_SWAP, CMD_MODE_32b, 0,
|
|
reg_a(meta->paired_st->dst_reg * 2), off, 7,
|
|
CMD_CTX_SWAP);
|
|
|
|
off = re_load_imm_any(nfp_prog, meta->paired_st->off + 32,
|
|
imm_b(nfp_prog));
|
|
emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 8,
|
|
reg_a(meta->paired_st->dst_reg * 2), off, len - 33,
|
|
CMD_CTX_SWAP);
|
|
} else {
|
|
/* Use one indirect_ref write32 to write 4-bytes aligned length,
|
|
* then another direct_ref write8 to write the remaining bytes.
|
|
*/
|
|
u8 new_off;
|
|
|
|
wrp_immed(nfp_prog, reg_none(),
|
|
CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, xfer_num - 2));
|
|
emit_cmd_indir(nfp_prog, CMD_TGT_WRITE32_SWAP, CMD_MODE_32b, 0,
|
|
reg_a(meta->paired_st->dst_reg * 2), off,
|
|
xfer_num - 2, CMD_CTX_SWAP);
|
|
new_off = meta->paired_st->off + (xfer_num - 1) * 4;
|
|
off = re_load_imm_any(nfp_prog, new_off, imm_b(nfp_prog));
|
|
emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b,
|
|
xfer_num - 1, reg_a(meta->paired_st->dst_reg * 2), off,
|
|
(len & 0x3) - 1, CMD_CTX_SWAP);
|
|
}
|
|
|
|
/* TODO: The following extra load is to make sure data flow be identical
|
|
* before and after we do memory copy optimization.
|
|
*
|
|
* The load destination register is not guaranteed to be dead, so we
|
|
* need to make sure it is loaded with the value the same as before
|
|
* this transformation.
|
|
*
|
|
* These extra loads could be removed once we have accurate register
|
|
* usage information.
|
|
*/
|
|
if (descending_seq)
|
|
xfer_num = 0;
|
|
else if (BPF_SIZE(meta->insn.code) != BPF_DW)
|
|
xfer_num = xfer_num - 1;
|
|
else
|
|
xfer_num = xfer_num - 2;
|
|
|
|
switch (BPF_SIZE(meta->insn.code)) {
|
|
case BPF_B:
|
|
wrp_reg_subpart(nfp_prog, reg_both(meta->insn.dst_reg * 2),
|
|
reg_xfer(xfer_num), 1,
|
|
IS_ALIGNED(len, 4) ? 3 : (len & 3) - 1);
|
|
break;
|
|
case BPF_H:
|
|
wrp_reg_subpart(nfp_prog, reg_both(meta->insn.dst_reg * 2),
|
|
reg_xfer(xfer_num), 2, (len & 3) ^ 2);
|
|
break;
|
|
case BPF_W:
|
|
wrp_mov(nfp_prog, reg_both(meta->insn.dst_reg * 2),
|
|
reg_xfer(0));
|
|
break;
|
|
case BPF_DW:
|
|
wrp_mov(nfp_prog, reg_both(meta->insn.dst_reg * 2),
|
|
reg_xfer(xfer_num));
|
|
wrp_mov(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1),
|
|
reg_xfer(xfer_num + 1));
|
|
break;
|
|
}
|
|
|
|
if (BPF_SIZE(meta->insn.code) != BPF_DW)
|
|
wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
data_ld(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, swreg offset,
|
|
u8 dst_gpr, int size)
|
|
{
|
|
unsigned int i;
|
|
u16 shift, sz;
|
|
|
|
/* We load the value from the address indicated in @offset and then
|
|
* shift out the data we don't need. Note: this is big endian!
|
|
*/
|
|
sz = max(size, 4);
|
|
shift = size < 4 ? 4 - size : 0;
|
|
|
|
emit_cmd(nfp_prog, CMD_TGT_READ8, CMD_MODE_32b, 0,
|
|
pptr_reg(nfp_prog), offset, sz - 1, CMD_CTX_SWAP);
|
|
|
|
i = 0;
|
|
if (shift)
|
|
emit_shf(nfp_prog, reg_both(dst_gpr), reg_none(), SHF_OP_NONE,
|
|
reg_xfer(0), SHF_SC_R_SHF, shift * 8);
|
|
else
|
|
for (; i * 4 < size; i++)
|
|
wrp_mov(nfp_prog, reg_both(dst_gpr + i), reg_xfer(i));
|
|
|
|
if (i < 2)
|
|
wrp_zext(nfp_prog, meta, dst_gpr);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
data_ld_host_order(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
u8 dst_gpr, swreg lreg, swreg rreg, int size,
|
|
enum cmd_mode mode)
|
|
{
|
|
unsigned int i;
|
|
u8 mask, sz;
|
|
|
|
/* We load the value from the address indicated in rreg + lreg and then
|
|
* mask out the data we don't need. Note: this is little endian!
|
|
*/
|
|
sz = max(size, 4);
|
|
mask = size < 4 ? GENMASK(size - 1, 0) : 0;
|
|
|
|
emit_cmd(nfp_prog, CMD_TGT_READ32_SWAP, mode, 0,
|
|
lreg, rreg, sz / 4 - 1, CMD_CTX_SWAP);
|
|
|
|
i = 0;
|
|
if (mask)
|
|
emit_ld_field_any(nfp_prog, reg_both(dst_gpr), mask,
|
|
reg_xfer(0), SHF_SC_NONE, 0, true);
|
|
else
|
|
for (; i * 4 < size; i++)
|
|
wrp_mov(nfp_prog, reg_both(dst_gpr + i), reg_xfer(i));
|
|
|
|
if (i < 2)
|
|
wrp_zext(nfp_prog, meta, dst_gpr);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
data_ld_host_order_addr32(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
u8 src_gpr, swreg offset, u8 dst_gpr, u8 size)
|
|
{
|
|
return data_ld_host_order(nfp_prog, meta, dst_gpr, reg_a(src_gpr),
|
|
offset, size, CMD_MODE_32b);
|
|
}
|
|
|
|
static int
|
|
data_ld_host_order_addr40(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
u8 src_gpr, swreg offset, u8 dst_gpr, u8 size)
|
|
{
|
|
swreg rega, regb;
|
|
|
|
addr40_offset(nfp_prog, src_gpr, offset, ®a, ®b);
|
|
|
|
return data_ld_host_order(nfp_prog, meta, dst_gpr, rega, regb,
|
|
size, CMD_MODE_40b_BA);
|
|
}
|
|
|
|
static int
|
|
construct_data_ind_ld(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
u16 offset, u16 src, u8 size)
|
|
{
|
|
swreg tmp_reg;
|
|
|
|
/* Calculate the true offset (src_reg + imm) */
|
|
tmp_reg = ur_load_imm_any(nfp_prog, offset, imm_b(nfp_prog));
|
|
emit_alu(nfp_prog, imm_both(nfp_prog), reg_a(src), ALU_OP_ADD, tmp_reg);
|
|
|
|
/* Check packet length (size guaranteed to fit b/c it's u8) */
|
|
emit_alu(nfp_prog, imm_a(nfp_prog),
|
|
imm_a(nfp_prog), ALU_OP_ADD, reg_imm(size));
|
|
emit_alu(nfp_prog, reg_none(),
|
|
plen_reg(nfp_prog), ALU_OP_SUB, imm_a(nfp_prog));
|
|
emit_br_relo(nfp_prog, BR_BLO, BR_OFF_RELO, 0, RELO_BR_GO_ABORT);
|
|
|
|
/* Load data */
|
|
return data_ld(nfp_prog, meta, imm_b(nfp_prog), 0, size);
|
|
}
|
|
|
|
static int
|
|
construct_data_ld(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
u16 offset, u8 size)
|
|
{
|
|
swreg tmp_reg;
|
|
|
|
/* Check packet length */
|
|
tmp_reg = ur_load_imm_any(nfp_prog, offset + size, imm_a(nfp_prog));
|
|
emit_alu(nfp_prog, reg_none(), plen_reg(nfp_prog), ALU_OP_SUB, tmp_reg);
|
|
emit_br_relo(nfp_prog, BR_BLO, BR_OFF_RELO, 0, RELO_BR_GO_ABORT);
|
|
|
|
/* Load data */
|
|
tmp_reg = re_load_imm_any(nfp_prog, offset, imm_b(nfp_prog));
|
|
return data_ld(nfp_prog, meta, tmp_reg, 0, size);
|
|
}
|
|
|
|
static int
|
|
data_stx_host_order(struct nfp_prog *nfp_prog, u8 dst_gpr, swreg offset,
|
|
u8 src_gpr, u8 size)
|
|
{
|
|
unsigned int i;
|
|
|
|
for (i = 0; i * 4 < size; i++)
|
|
wrp_mov(nfp_prog, reg_xfer(i), reg_a(src_gpr + i));
|
|
|
|
emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0,
|
|
reg_a(dst_gpr), offset, size - 1, CMD_CTX_SWAP);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
data_st_host_order(struct nfp_prog *nfp_prog, u8 dst_gpr, swreg offset,
|
|
u64 imm, u8 size)
|
|
{
|
|
wrp_immed(nfp_prog, reg_xfer(0), imm);
|
|
if (size == 8)
|
|
wrp_immed(nfp_prog, reg_xfer(1), imm >> 32);
|
|
|
|
emit_cmd(nfp_prog, CMD_TGT_WRITE8_SWAP, CMD_MODE_32b, 0,
|
|
reg_a(dst_gpr), offset, size - 1, CMD_CTX_SWAP);
|
|
|
|
return 0;
|
|
}
|
|
|
|
typedef int
|
|
(*lmem_step)(struct nfp_prog *nfp_prog, u8 gpr, u8 gpr_byte, s32 off,
|
|
unsigned int size, bool first, bool new_gpr, bool last, bool lm3,
|
|
bool needs_inc);
|
|
|
|
static int
|
|
wrp_lmem_load(struct nfp_prog *nfp_prog, u8 dst, u8 dst_byte, s32 off,
|
|
unsigned int size, bool first, bool new_gpr, bool last, bool lm3,
|
|
bool needs_inc)
|
|
{
|
|
bool should_inc = needs_inc && new_gpr && !last;
|
|
u32 idx, src_byte;
|
|
enum shf_sc sc;
|
|
swreg reg;
|
|
int shf;
|
|
u8 mask;
|
|
|
|
if (WARN_ON_ONCE(dst_byte + size > 4 || off % 4 + size > 4))
|
|
return -EOPNOTSUPP;
|
|
|
|
idx = off / 4;
|
|
|
|
/* Move the entire word */
|
|
if (size == 4) {
|
|
wrp_mov(nfp_prog, reg_both(dst),
|
|
should_inc ? reg_lm_inc(3) : reg_lm(lm3 ? 3 : 0, idx));
|
|
return 0;
|
|
}
|
|
|
|
if (WARN_ON_ONCE(lm3 && idx > RE_REG_LM_IDX_MAX))
|
|
return -EOPNOTSUPP;
|
|
|
|
src_byte = off % 4;
|
|
|
|
mask = (1 << size) - 1;
|
|
mask <<= dst_byte;
|
|
|
|
if (WARN_ON_ONCE(mask > 0xf))
|
|
return -EOPNOTSUPP;
|
|
|
|
shf = abs(src_byte - dst_byte) * 8;
|
|
if (src_byte == dst_byte) {
|
|
sc = SHF_SC_NONE;
|
|
} else if (src_byte < dst_byte) {
|
|
shf = 32 - shf;
|
|
sc = SHF_SC_L_SHF;
|
|
} else {
|
|
sc = SHF_SC_R_SHF;
|
|
}
|
|
|
|
/* ld_field can address fewer indexes, if offset too large do RMW.
|
|
* Because we RMV twice we waste 2 cycles on unaligned 8 byte writes.
|
|
*/
|
|
if (idx <= RE_REG_LM_IDX_MAX) {
|
|
reg = reg_lm(lm3 ? 3 : 0, idx);
|
|
} else {
|
|
reg = imm_a(nfp_prog);
|
|
/* If it's not the first part of the load and we start a new GPR
|
|
* that means we are loading a second part of the LMEM word into
|
|
* a new GPR. IOW we've already looked that LMEM word and
|
|
* therefore it has been loaded into imm_a().
|
|
*/
|
|
if (first || !new_gpr)
|
|
wrp_mov(nfp_prog, reg, reg_lm(0, idx));
|
|
}
|
|
|
|
emit_ld_field_any(nfp_prog, reg_both(dst), mask, reg, sc, shf, new_gpr);
|
|
|
|
if (should_inc)
|
|
wrp_mov(nfp_prog, reg_none(), reg_lm_inc(3));
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
wrp_lmem_store(struct nfp_prog *nfp_prog, u8 src, u8 src_byte, s32 off,
|
|
unsigned int size, bool first, bool new_gpr, bool last, bool lm3,
|
|
bool needs_inc)
|
|
{
|
|
bool should_inc = needs_inc && new_gpr && !last;
|
|
u32 idx, dst_byte;
|
|
enum shf_sc sc;
|
|
swreg reg;
|
|
int shf;
|
|
u8 mask;
|
|
|
|
if (WARN_ON_ONCE(src_byte + size > 4 || off % 4 + size > 4))
|
|
return -EOPNOTSUPP;
|
|
|
|
idx = off / 4;
|
|
|
|
/* Move the entire word */
|
|
if (size == 4) {
|
|
wrp_mov(nfp_prog,
|
|
should_inc ? reg_lm_inc(3) : reg_lm(lm3 ? 3 : 0, idx),
|
|
reg_b(src));
|
|
return 0;
|
|
}
|
|
|
|
if (WARN_ON_ONCE(lm3 && idx > RE_REG_LM_IDX_MAX))
|
|
return -EOPNOTSUPP;
|
|
|
|
dst_byte = off % 4;
|
|
|
|
mask = (1 << size) - 1;
|
|
mask <<= dst_byte;
|
|
|
|
if (WARN_ON_ONCE(mask > 0xf))
|
|
return -EOPNOTSUPP;
|
|
|
|
shf = abs(src_byte - dst_byte) * 8;
|
|
if (src_byte == dst_byte) {
|
|
sc = SHF_SC_NONE;
|
|
} else if (src_byte < dst_byte) {
|
|
shf = 32 - shf;
|
|
sc = SHF_SC_L_SHF;
|
|
} else {
|
|
sc = SHF_SC_R_SHF;
|
|
}
|
|
|
|
/* ld_field can address fewer indexes, if offset too large do RMW.
|
|
* Because we RMV twice we waste 2 cycles on unaligned 8 byte writes.
|
|
*/
|
|
if (idx <= RE_REG_LM_IDX_MAX) {
|
|
reg = reg_lm(lm3 ? 3 : 0, idx);
|
|
} else {
|
|
reg = imm_a(nfp_prog);
|
|
/* Only first and last LMEM locations are going to need RMW,
|
|
* the middle location will be overwritten fully.
|
|
*/
|
|
if (first || last)
|
|
wrp_mov(nfp_prog, reg, reg_lm(0, idx));
|
|
}
|
|
|
|
emit_ld_field(nfp_prog, reg, mask, reg_b(src), sc, shf);
|
|
|
|
if (new_gpr || last) {
|
|
if (idx > RE_REG_LM_IDX_MAX)
|
|
wrp_mov(nfp_prog, reg_lm(0, idx), reg);
|
|
if (should_inc)
|
|
wrp_mov(nfp_prog, reg_none(), reg_lm_inc(3));
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
mem_op_stack(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
unsigned int size, unsigned int ptr_off, u8 gpr, u8 ptr_gpr,
|
|
bool clr_gpr, lmem_step step)
|
|
{
|
|
s32 off = nfp_prog->stack_frame_depth + meta->insn.off + ptr_off;
|
|
bool first = true, narrow_ld, last;
|
|
bool needs_inc = false;
|
|
swreg stack_off_reg;
|
|
u8 prev_gpr = 255;
|
|
u32 gpr_byte = 0;
|
|
bool lm3 = true;
|
|
int ret;
|
|
|
|
if (meta->ptr_not_const ||
|
|
meta->flags & FLAG_INSN_PTR_CALLER_STACK_FRAME) {
|
|
/* Use of the last encountered ptr_off is OK, they all have
|
|
* the same alignment. Depend on low bits of value being
|
|
* discarded when written to LMaddr register.
|
|
*/
|
|
stack_off_reg = ur_load_imm_any(nfp_prog, meta->insn.off,
|
|
stack_imm(nfp_prog));
|
|
|
|
emit_alu(nfp_prog, imm_b(nfp_prog),
|
|
reg_a(ptr_gpr), ALU_OP_ADD, stack_off_reg);
|
|
|
|
needs_inc = true;
|
|
} else if (off + size <= 64) {
|
|
/* We can reach bottom 64B with LMaddr0 */
|
|
lm3 = false;
|
|
} else if (round_down(off, 32) == round_down(off + size - 1, 32)) {
|
|
/* We have to set up a new pointer. If we know the offset
|
|
* and the entire access falls into a single 32 byte aligned
|
|
* window we won't have to increment the LM pointer.
|
|
* The 32 byte alignment is imporant because offset is ORed in
|
|
* not added when doing *l$indexN[off].
|
|
*/
|
|
stack_off_reg = ur_load_imm_any(nfp_prog, round_down(off, 32),
|
|
stack_imm(nfp_prog));
|
|
emit_alu(nfp_prog, imm_b(nfp_prog),
|
|
stack_reg(nfp_prog), ALU_OP_ADD, stack_off_reg);
|
|
|
|
off %= 32;
|
|
} else {
|
|
stack_off_reg = ur_load_imm_any(nfp_prog, round_down(off, 4),
|
|
stack_imm(nfp_prog));
|
|
|
|
emit_alu(nfp_prog, imm_b(nfp_prog),
|
|
stack_reg(nfp_prog), ALU_OP_ADD, stack_off_reg);
|
|
|
|
needs_inc = true;
|
|
}
|
|
|
|
narrow_ld = clr_gpr && size < 8;
|
|
|
|
if (lm3) {
|
|
unsigned int nop_cnt;
|
|
|
|
emit_csr_wr(nfp_prog, imm_b(nfp_prog), NFP_CSR_ACT_LM_ADDR3);
|
|
/* For size < 4 one slot will be filled by zeroing of upper,
|
|
* but be careful, that zeroing could be eliminated by zext
|
|
* optimization.
|
|
*/
|
|
nop_cnt = narrow_ld && meta->flags & FLAG_INSN_DO_ZEXT ? 2 : 3;
|
|
wrp_nops(nfp_prog, nop_cnt);
|
|
}
|
|
|
|
if (narrow_ld)
|
|
wrp_zext(nfp_prog, meta, gpr);
|
|
|
|
while (size) {
|
|
u32 slice_end;
|
|
u8 slice_size;
|
|
|
|
slice_size = min(size, 4 - gpr_byte);
|
|
slice_end = min(off + slice_size, round_up(off + 1, 4));
|
|
slice_size = slice_end - off;
|
|
|
|
last = slice_size == size;
|
|
|
|
if (needs_inc)
|
|
off %= 4;
|
|
|
|
ret = step(nfp_prog, gpr, gpr_byte, off, slice_size,
|
|
first, gpr != prev_gpr, last, lm3, needs_inc);
|
|
if (ret)
|
|
return ret;
|
|
|
|
prev_gpr = gpr;
|
|
first = false;
|
|
|
|
gpr_byte += slice_size;
|
|
if (gpr_byte >= 4) {
|
|
gpr_byte -= 4;
|
|
gpr++;
|
|
}
|
|
|
|
size -= slice_size;
|
|
off += slice_size;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void
|
|
wrp_alu_imm(struct nfp_prog *nfp_prog, u8 dst, enum alu_op alu_op, u32 imm)
|
|
{
|
|
swreg tmp_reg;
|
|
|
|
if (alu_op == ALU_OP_AND) {
|
|
if (!imm)
|
|
wrp_immed(nfp_prog, reg_both(dst), 0);
|
|
if (!imm || !~imm)
|
|
return;
|
|
}
|
|
if (alu_op == ALU_OP_OR) {
|
|
if (!~imm)
|
|
wrp_immed(nfp_prog, reg_both(dst), ~0U);
|
|
if (!imm || !~imm)
|
|
return;
|
|
}
|
|
if (alu_op == ALU_OP_XOR) {
|
|
if (!~imm)
|
|
emit_alu(nfp_prog, reg_both(dst), reg_none(),
|
|
ALU_OP_NOT, reg_b(dst));
|
|
if (!imm || !~imm)
|
|
return;
|
|
}
|
|
|
|
tmp_reg = ur_load_imm_any(nfp_prog, imm, imm_b(nfp_prog));
|
|
emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, tmp_reg);
|
|
}
|
|
|
|
static int
|
|
wrp_alu64_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
enum alu_op alu_op, bool skip)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
u64 imm = insn->imm; /* sign extend */
|
|
|
|
if (skip) {
|
|
meta->flags |= FLAG_INSN_SKIP_NOOP;
|
|
return 0;
|
|
}
|
|
|
|
wrp_alu_imm(nfp_prog, insn->dst_reg * 2, alu_op, imm & ~0U);
|
|
wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, alu_op, imm >> 32);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
wrp_alu64_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
enum alu_op alu_op)
|
|
{
|
|
u8 dst = meta->insn.dst_reg * 2, src = meta->insn.src_reg * 2;
|
|
|
|
emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, reg_b(src));
|
|
emit_alu(nfp_prog, reg_both(dst + 1),
|
|
reg_a(dst + 1), alu_op, reg_b(src + 1));
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
wrp_alu32_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
enum alu_op alu_op)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
u8 dst = insn->dst_reg * 2;
|
|
|
|
wrp_alu_imm(nfp_prog, dst, alu_op, insn->imm);
|
|
wrp_zext(nfp_prog, meta, dst);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
wrp_alu32_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
enum alu_op alu_op)
|
|
{
|
|
u8 dst = meta->insn.dst_reg * 2, src = meta->insn.src_reg * 2;
|
|
|
|
emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, reg_b(src));
|
|
wrp_zext(nfp_prog, meta, dst);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void
|
|
wrp_test_reg_one(struct nfp_prog *nfp_prog, u8 dst, enum alu_op alu_op, u8 src,
|
|
enum br_mask br_mask, u16 off)
|
|
{
|
|
emit_alu(nfp_prog, reg_none(), reg_a(dst), alu_op, reg_b(src));
|
|
emit_br(nfp_prog, br_mask, off, 0);
|
|
}
|
|
|
|
static int
|
|
wrp_test_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
enum alu_op alu_op, enum br_mask br_mask)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
|
|
wrp_test_reg_one(nfp_prog, insn->dst_reg * 2, alu_op,
|
|
insn->src_reg * 2, br_mask, insn->off);
|
|
if (is_mbpf_jmp64(meta))
|
|
wrp_test_reg_one(nfp_prog, insn->dst_reg * 2 + 1, alu_op,
|
|
insn->src_reg * 2 + 1, br_mask, insn->off);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static const struct jmp_code_map {
|
|
enum br_mask br_mask;
|
|
bool swap;
|
|
} jmp_code_map[] = {
|
|
[BPF_JGT >> 4] = { BR_BLO, true },
|
|
[BPF_JGE >> 4] = { BR_BHS, false },
|
|
[BPF_JLT >> 4] = { BR_BLO, false },
|
|
[BPF_JLE >> 4] = { BR_BHS, true },
|
|
[BPF_JSGT >> 4] = { BR_BLT, true },
|
|
[BPF_JSGE >> 4] = { BR_BGE, false },
|
|
[BPF_JSLT >> 4] = { BR_BLT, false },
|
|
[BPF_JSLE >> 4] = { BR_BGE, true },
|
|
};
|
|
|
|
static const struct jmp_code_map *nfp_jmp_code_get(struct nfp_insn_meta *meta)
|
|
{
|
|
unsigned int op;
|
|
|
|
op = BPF_OP(meta->insn.code) >> 4;
|
|
/* br_mask of 0 is BR_BEQ which we don't use in jump code table */
|
|
if (WARN_ONCE(op >= ARRAY_SIZE(jmp_code_map) ||
|
|
!jmp_code_map[op].br_mask,
|
|
"no code found for jump instruction"))
|
|
return NULL;
|
|
|
|
return &jmp_code_map[op];
|
|
}
|
|
|
|
static int cmp_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
u64 imm = insn->imm; /* sign extend */
|
|
const struct jmp_code_map *code;
|
|
enum alu_op alu_op, carry_op;
|
|
u8 reg = insn->dst_reg * 2;
|
|
swreg tmp_reg;
|
|
|
|
code = nfp_jmp_code_get(meta);
|
|
if (!code)
|
|
return -EINVAL;
|
|
|
|
alu_op = meta->jump_neg_op ? ALU_OP_ADD : ALU_OP_SUB;
|
|
carry_op = meta->jump_neg_op ? ALU_OP_ADD_C : ALU_OP_SUB_C;
|
|
|
|
tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
|
|
if (!code->swap)
|
|
emit_alu(nfp_prog, reg_none(), reg_a(reg), alu_op, tmp_reg);
|
|
else
|
|
emit_alu(nfp_prog, reg_none(), tmp_reg, alu_op, reg_a(reg));
|
|
|
|
if (is_mbpf_jmp64(meta)) {
|
|
tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
|
|
if (!code->swap)
|
|
emit_alu(nfp_prog, reg_none(),
|
|
reg_a(reg + 1), carry_op, tmp_reg);
|
|
else
|
|
emit_alu(nfp_prog, reg_none(),
|
|
tmp_reg, carry_op, reg_a(reg + 1));
|
|
}
|
|
|
|
emit_br(nfp_prog, code->br_mask, insn->off, 0);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int cmp_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
const struct jmp_code_map *code;
|
|
u8 areg, breg;
|
|
|
|
code = nfp_jmp_code_get(meta);
|
|
if (!code)
|
|
return -EINVAL;
|
|
|
|
areg = insn->dst_reg * 2;
|
|
breg = insn->src_reg * 2;
|
|
|
|
if (code->swap) {
|
|
areg ^= breg;
|
|
breg ^= areg;
|
|
areg ^= breg;
|
|
}
|
|
|
|
emit_alu(nfp_prog, reg_none(), reg_a(areg), ALU_OP_SUB, reg_b(breg));
|
|
if (is_mbpf_jmp64(meta))
|
|
emit_alu(nfp_prog, reg_none(),
|
|
reg_a(areg + 1), ALU_OP_SUB_C, reg_b(breg + 1));
|
|
emit_br(nfp_prog, code->br_mask, insn->off, 0);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void wrp_end32(struct nfp_prog *nfp_prog, swreg reg_in, u8 gpr_out)
|
|
{
|
|
emit_ld_field(nfp_prog, reg_both(gpr_out), 0xf, reg_in,
|
|
SHF_SC_R_ROT, 8);
|
|
emit_ld_field(nfp_prog, reg_both(gpr_out), 0x5, reg_a(gpr_out),
|
|
SHF_SC_R_ROT, 16);
|
|
}
|
|
|
|
static void
|
|
wrp_mul_u32(struct nfp_prog *nfp_prog, swreg dst_hi, swreg dst_lo, swreg lreg,
|
|
swreg rreg, bool gen_high_half)
|
|
{
|
|
emit_mul(nfp_prog, lreg, MUL_TYPE_START, MUL_STEP_NONE, rreg);
|
|
emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_32x32, MUL_STEP_1, rreg);
|
|
emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_32x32, MUL_STEP_2, rreg);
|
|
emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_32x32, MUL_STEP_3, rreg);
|
|
emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_32x32, MUL_STEP_4, rreg);
|
|
emit_mul(nfp_prog, dst_lo, MUL_TYPE_STEP_32x32, MUL_LAST, reg_none());
|
|
if (gen_high_half)
|
|
emit_mul(nfp_prog, dst_hi, MUL_TYPE_STEP_32x32, MUL_LAST_2,
|
|
reg_none());
|
|
else
|
|
wrp_immed(nfp_prog, dst_hi, 0);
|
|
}
|
|
|
|
static void
|
|
wrp_mul_u16(struct nfp_prog *nfp_prog, swreg dst_hi, swreg dst_lo, swreg lreg,
|
|
swreg rreg)
|
|
{
|
|
emit_mul(nfp_prog, lreg, MUL_TYPE_START, MUL_STEP_NONE, rreg);
|
|
emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_16x16, MUL_STEP_1, rreg);
|
|
emit_mul(nfp_prog, lreg, MUL_TYPE_STEP_16x16, MUL_STEP_2, rreg);
|
|
emit_mul(nfp_prog, dst_lo, MUL_TYPE_STEP_16x16, MUL_LAST, reg_none());
|
|
}
|
|
|
|
static int
|
|
wrp_mul(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
bool gen_high_half, bool ropnd_from_reg)
|
|
{
|
|
swreg multiplier, multiplicand, dst_hi, dst_lo;
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
u32 lopnd_max, ropnd_max;
|
|
u8 dst_reg;
|
|
|
|
dst_reg = insn->dst_reg;
|
|
multiplicand = reg_a(dst_reg * 2);
|
|
dst_hi = reg_both(dst_reg * 2 + 1);
|
|
dst_lo = reg_both(dst_reg * 2);
|
|
lopnd_max = meta->umax_dst;
|
|
if (ropnd_from_reg) {
|
|
multiplier = reg_b(insn->src_reg * 2);
|
|
ropnd_max = meta->umax_src;
|
|
} else {
|
|
u32 imm = insn->imm;
|
|
|
|
multiplier = ur_load_imm_any(nfp_prog, imm, imm_b(nfp_prog));
|
|
ropnd_max = imm;
|
|
}
|
|
if (lopnd_max > U16_MAX || ropnd_max > U16_MAX)
|
|
wrp_mul_u32(nfp_prog, dst_hi, dst_lo, multiplicand, multiplier,
|
|
gen_high_half);
|
|
else
|
|
wrp_mul_u16(nfp_prog, dst_hi, dst_lo, multiplicand, multiplier);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int wrp_div_imm(struct nfp_prog *nfp_prog, u8 dst, u64 imm)
|
|
{
|
|
swreg dst_both = reg_both(dst), dst_a = reg_a(dst), dst_b = reg_a(dst);
|
|
struct reciprocal_value_adv rvalue;
|
|
u8 pre_shift, exp;
|
|
swreg magic;
|
|
|
|
if (imm > U32_MAX) {
|
|
wrp_immed(nfp_prog, dst_both, 0);
|
|
return 0;
|
|
}
|
|
|
|
/* NOTE: because we are using "reciprocal_value_adv" which doesn't
|
|
* support "divisor > (1u << 31)", we need to JIT separate NFP sequence
|
|
* to handle such case which actually equals to the result of unsigned
|
|
* comparison "dst >= imm" which could be calculated using the following
|
|
* NFP sequence:
|
|
*
|
|
* alu[--, dst, -, imm]
|
|
* immed[imm, 0]
|
|
* alu[dst, imm, +carry, 0]
|
|
*
|
|
*/
|
|
if (imm > 1U << 31) {
|
|
swreg tmp_b = ur_load_imm_any(nfp_prog, imm, imm_b(nfp_prog));
|
|
|
|
emit_alu(nfp_prog, reg_none(), dst_a, ALU_OP_SUB, tmp_b);
|
|
wrp_immed(nfp_prog, imm_a(nfp_prog), 0);
|
|
emit_alu(nfp_prog, dst_both, imm_a(nfp_prog), ALU_OP_ADD_C,
|
|
reg_imm(0));
|
|
return 0;
|
|
}
|
|
|
|
rvalue = reciprocal_value_adv(imm, 32);
|
|
exp = rvalue.exp;
|
|
if (rvalue.is_wide_m && !(imm & 1)) {
|
|
pre_shift = fls(imm & -imm) - 1;
|
|
rvalue = reciprocal_value_adv(imm >> pre_shift, 32 - pre_shift);
|
|
} else {
|
|
pre_shift = 0;
|
|
}
|
|
magic = ur_load_imm_any(nfp_prog, rvalue.m, imm_b(nfp_prog));
|
|
if (imm == 1U << exp) {
|
|
emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE, dst_b,
|
|
SHF_SC_R_SHF, exp);
|
|
} else if (rvalue.is_wide_m) {
|
|
wrp_mul_u32(nfp_prog, imm_both(nfp_prog), reg_none(), dst_a,
|
|
magic, true);
|
|
emit_alu(nfp_prog, dst_both, dst_a, ALU_OP_SUB,
|
|
imm_b(nfp_prog));
|
|
emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE, dst_b,
|
|
SHF_SC_R_SHF, 1);
|
|
emit_alu(nfp_prog, dst_both, dst_a, ALU_OP_ADD,
|
|
imm_b(nfp_prog));
|
|
emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE, dst_b,
|
|
SHF_SC_R_SHF, rvalue.sh - 1);
|
|
} else {
|
|
if (pre_shift)
|
|
emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE,
|
|
dst_b, SHF_SC_R_SHF, pre_shift);
|
|
wrp_mul_u32(nfp_prog, dst_both, reg_none(), dst_a, magic, true);
|
|
emit_shf(nfp_prog, dst_both, reg_none(), SHF_OP_NONE,
|
|
dst_b, SHF_SC_R_SHF, rvalue.sh);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int adjust_head(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
swreg tmp = imm_a(nfp_prog), tmp_len = imm_b(nfp_prog);
|
|
struct nfp_bpf_cap_adjust_head *adjust_head;
|
|
u32 ret_einval, end;
|
|
|
|
adjust_head = &nfp_prog->bpf->adjust_head;
|
|
|
|
/* Optimized version - 5 vs 14 cycles */
|
|
if (nfp_prog->adjust_head_location != UINT_MAX) {
|
|
if (WARN_ON_ONCE(nfp_prog->adjust_head_location != meta->n))
|
|
return -EINVAL;
|
|
|
|
emit_alu(nfp_prog, pptr_reg(nfp_prog),
|
|
reg_a(2 * 2), ALU_OP_ADD, pptr_reg(nfp_prog));
|
|
emit_alu(nfp_prog, plen_reg(nfp_prog),
|
|
plen_reg(nfp_prog), ALU_OP_SUB, reg_a(2 * 2));
|
|
emit_alu(nfp_prog, pv_len(nfp_prog),
|
|
pv_len(nfp_prog), ALU_OP_SUB, reg_a(2 * 2));
|
|
|
|
wrp_immed(nfp_prog, reg_both(0), 0);
|
|
wrp_immed(nfp_prog, reg_both(1), 0);
|
|
|
|
/* TODO: when adjust head is guaranteed to succeed we can
|
|
* also eliminate the following if (r0 == 0) branch.
|
|
*/
|
|
|
|
return 0;
|
|
}
|
|
|
|
ret_einval = nfp_prog_current_offset(nfp_prog) + 14;
|
|
end = ret_einval + 2;
|
|
|
|
/* We need to use a temp because offset is just a part of the pkt ptr */
|
|
emit_alu(nfp_prog, tmp,
|
|
reg_a(2 * 2), ALU_OP_ADD_2B, pptr_reg(nfp_prog));
|
|
|
|
/* Validate result will fit within FW datapath constraints */
|
|
emit_alu(nfp_prog, reg_none(),
|
|
tmp, ALU_OP_SUB, reg_imm(adjust_head->off_min));
|
|
emit_br(nfp_prog, BR_BLO, ret_einval, 0);
|
|
emit_alu(nfp_prog, reg_none(),
|
|
reg_imm(adjust_head->off_max), ALU_OP_SUB, tmp);
|
|
emit_br(nfp_prog, BR_BLO, ret_einval, 0);
|
|
|
|
/* Validate the length is at least ETH_HLEN */
|
|
emit_alu(nfp_prog, tmp_len,
|
|
plen_reg(nfp_prog), ALU_OP_SUB, reg_a(2 * 2));
|
|
emit_alu(nfp_prog, reg_none(),
|
|
tmp_len, ALU_OP_SUB, reg_imm(ETH_HLEN));
|
|
emit_br(nfp_prog, BR_BMI, ret_einval, 0);
|
|
|
|
/* Load the ret code */
|
|
wrp_immed(nfp_prog, reg_both(0), 0);
|
|
wrp_immed(nfp_prog, reg_both(1), 0);
|
|
|
|
/* Modify the packet metadata */
|
|
emit_ld_field(nfp_prog, pptr_reg(nfp_prog), 0x3, tmp, SHF_SC_NONE, 0);
|
|
|
|
/* Skip over the -EINVAL ret code (defer 2) */
|
|
emit_br(nfp_prog, BR_UNC, end, 2);
|
|
|
|
emit_alu(nfp_prog, plen_reg(nfp_prog),
|
|
plen_reg(nfp_prog), ALU_OP_SUB, reg_a(2 * 2));
|
|
emit_alu(nfp_prog, pv_len(nfp_prog),
|
|
pv_len(nfp_prog), ALU_OP_SUB, reg_a(2 * 2));
|
|
|
|
/* return -EINVAL target */
|
|
if (!nfp_prog_confirm_current_offset(nfp_prog, ret_einval))
|
|
return -EINVAL;
|
|
|
|
wrp_immed(nfp_prog, reg_both(0), -22);
|
|
wrp_immed(nfp_prog, reg_both(1), ~0);
|
|
|
|
if (!nfp_prog_confirm_current_offset(nfp_prog, end))
|
|
return -EINVAL;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int adjust_tail(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
u32 ret_einval, end;
|
|
swreg plen, delta;
|
|
|
|
BUILD_BUG_ON(plen_reg(nfp_prog) != reg_b(STATIC_REG_PKT_LEN));
|
|
|
|
plen = imm_a(nfp_prog);
|
|
delta = reg_a(2 * 2);
|
|
|
|
ret_einval = nfp_prog_current_offset(nfp_prog) + 9;
|
|
end = nfp_prog_current_offset(nfp_prog) + 11;
|
|
|
|
/* Calculate resulting length */
|
|
emit_alu(nfp_prog, plen, plen_reg(nfp_prog), ALU_OP_ADD, delta);
|
|
/* delta == 0 is not allowed by the kernel, add must overflow to make
|
|
* length smaller.
|
|
*/
|
|
emit_br(nfp_prog, BR_BCC, ret_einval, 0);
|
|
|
|
/* if (new_len < 14) then -EINVAL */
|
|
emit_alu(nfp_prog, reg_none(), plen, ALU_OP_SUB, reg_imm(ETH_HLEN));
|
|
emit_br(nfp_prog, BR_BMI, ret_einval, 0);
|
|
|
|
emit_alu(nfp_prog, plen_reg(nfp_prog),
|
|
plen_reg(nfp_prog), ALU_OP_ADD, delta);
|
|
emit_alu(nfp_prog, pv_len(nfp_prog),
|
|
pv_len(nfp_prog), ALU_OP_ADD, delta);
|
|
|
|
emit_br(nfp_prog, BR_UNC, end, 2);
|
|
wrp_immed(nfp_prog, reg_both(0), 0);
|
|
wrp_immed(nfp_prog, reg_both(1), 0);
|
|
|
|
if (!nfp_prog_confirm_current_offset(nfp_prog, ret_einval))
|
|
return -EINVAL;
|
|
|
|
wrp_immed(nfp_prog, reg_both(0), -22);
|
|
wrp_immed(nfp_prog, reg_both(1), ~0);
|
|
|
|
if (!nfp_prog_confirm_current_offset(nfp_prog, end))
|
|
return -EINVAL;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
map_call_stack_common(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
bool load_lm_ptr;
|
|
u32 ret_tgt;
|
|
s64 lm_off;
|
|
|
|
/* We only have to reload LM0 if the key is not at start of stack */
|
|
lm_off = nfp_prog->stack_frame_depth;
|
|
lm_off += meta->arg2.reg.var_off.value + meta->arg2.reg.off;
|
|
load_lm_ptr = meta->arg2.var_off || lm_off;
|
|
|
|
/* Set LM0 to start of key */
|
|
if (load_lm_ptr)
|
|
emit_csr_wr(nfp_prog, reg_b(2 * 2), NFP_CSR_ACT_LM_ADDR0);
|
|
if (meta->func_id == BPF_FUNC_map_update_elem)
|
|
emit_csr_wr(nfp_prog, reg_b(3 * 2), NFP_CSR_ACT_LM_ADDR2);
|
|
|
|
emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO + meta->func_id,
|
|
2, RELO_BR_HELPER);
|
|
ret_tgt = nfp_prog_current_offset(nfp_prog) + 2;
|
|
|
|
/* Load map ID into A0 */
|
|
wrp_mov(nfp_prog, reg_a(0), reg_a(2));
|
|
|
|
/* Load the return address into B0 */
|
|
wrp_immed_relo(nfp_prog, reg_b(0), ret_tgt, RELO_IMMED_REL);
|
|
|
|
if (!nfp_prog_confirm_current_offset(nfp_prog, ret_tgt))
|
|
return -EINVAL;
|
|
|
|
/* Reset the LM0 pointer */
|
|
if (!load_lm_ptr)
|
|
return 0;
|
|
|
|
emit_csr_wr(nfp_prog, stack_reg(nfp_prog), NFP_CSR_ACT_LM_ADDR0);
|
|
wrp_nops(nfp_prog, 3);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
nfp_get_prandom_u32(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
__emit_csr_rd(nfp_prog, NFP_CSR_PSEUDO_RND_NUM);
|
|
/* CSR value is read in following immed[gpr, 0] */
|
|
emit_immed(nfp_prog, reg_both(0), 0,
|
|
IMMED_WIDTH_ALL, false, IMMED_SHIFT_0B);
|
|
emit_immed(nfp_prog, reg_both(1), 0,
|
|
IMMED_WIDTH_ALL, false, IMMED_SHIFT_0B);
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
nfp_perf_event_output(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
swreg ptr_type;
|
|
u32 ret_tgt;
|
|
|
|
ptr_type = ur_load_imm_any(nfp_prog, meta->arg1.type, imm_a(nfp_prog));
|
|
|
|
ret_tgt = nfp_prog_current_offset(nfp_prog) + 3;
|
|
|
|
emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO + meta->func_id,
|
|
2, RELO_BR_HELPER);
|
|
|
|
/* Load ptr type into A1 */
|
|
wrp_mov(nfp_prog, reg_a(1), ptr_type);
|
|
|
|
/* Load the return address into B0 */
|
|
wrp_immed_relo(nfp_prog, reg_b(0), ret_tgt, RELO_IMMED_REL);
|
|
|
|
if (!nfp_prog_confirm_current_offset(nfp_prog, ret_tgt))
|
|
return -EINVAL;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
nfp_queue_select(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
u32 jmp_tgt;
|
|
|
|
jmp_tgt = nfp_prog_current_offset(nfp_prog) + 5;
|
|
|
|
/* Make sure the queue id fits into FW field */
|
|
emit_alu(nfp_prog, reg_none(), reg_a(meta->insn.src_reg * 2),
|
|
ALU_OP_AND_NOT_B, reg_imm(0xff));
|
|
emit_br(nfp_prog, BR_BEQ, jmp_tgt, 2);
|
|
|
|
/* Set the 'queue selected' bit and the queue value */
|
|
emit_shf(nfp_prog, pv_qsel_set(nfp_prog),
|
|
pv_qsel_set(nfp_prog), SHF_OP_OR, reg_imm(1),
|
|
SHF_SC_L_SHF, PKT_VEL_QSEL_SET_BIT);
|
|
emit_ld_field(nfp_prog,
|
|
pv_qsel_val(nfp_prog), 0x1, reg_b(meta->insn.src_reg * 2),
|
|
SHF_SC_NONE, 0);
|
|
/* Delay slots end here, we will jump over next instruction if queue
|
|
* value fits into the field.
|
|
*/
|
|
emit_ld_field(nfp_prog,
|
|
pv_qsel_val(nfp_prog), 0x1, reg_imm(NFP_NET_RXR_MAX),
|
|
SHF_SC_NONE, 0);
|
|
|
|
if (!nfp_prog_confirm_current_offset(nfp_prog, jmp_tgt))
|
|
return -EINVAL;
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* --- Callbacks --- */
|
|
static int mov_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
u8 dst = insn->dst_reg * 2;
|
|
u8 src = insn->src_reg * 2;
|
|
|
|
if (insn->src_reg == BPF_REG_10) {
|
|
swreg stack_depth_reg;
|
|
|
|
stack_depth_reg = ur_load_imm_any(nfp_prog,
|
|
nfp_prog->stack_frame_depth,
|
|
stack_imm(nfp_prog));
|
|
emit_alu(nfp_prog, reg_both(dst), stack_reg(nfp_prog),
|
|
ALU_OP_ADD, stack_depth_reg);
|
|
wrp_immed(nfp_prog, reg_both(dst + 1), 0);
|
|
} else {
|
|
wrp_reg_mov(nfp_prog, dst, src);
|
|
wrp_reg_mov(nfp_prog, dst + 1, src + 1);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int mov_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
u64 imm = meta->insn.imm; /* sign extend */
|
|
|
|
wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2), imm & ~0U);
|
|
wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), imm >> 32);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int xor_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return wrp_alu64_reg(nfp_prog, meta, ALU_OP_XOR);
|
|
}
|
|
|
|
static int xor_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return wrp_alu64_imm(nfp_prog, meta, ALU_OP_XOR, !meta->insn.imm);
|
|
}
|
|
|
|
static int and_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return wrp_alu64_reg(nfp_prog, meta, ALU_OP_AND);
|
|
}
|
|
|
|
static int and_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return wrp_alu64_imm(nfp_prog, meta, ALU_OP_AND, !~meta->insn.imm);
|
|
}
|
|
|
|
static int or_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return wrp_alu64_reg(nfp_prog, meta, ALU_OP_OR);
|
|
}
|
|
|
|
static int or_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return wrp_alu64_imm(nfp_prog, meta, ALU_OP_OR, !meta->insn.imm);
|
|
}
|
|
|
|
static int add_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
|
|
emit_alu(nfp_prog, reg_both(insn->dst_reg * 2),
|
|
reg_a(insn->dst_reg * 2), ALU_OP_ADD,
|
|
reg_b(insn->src_reg * 2));
|
|
emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1),
|
|
reg_a(insn->dst_reg * 2 + 1), ALU_OP_ADD_C,
|
|
reg_b(insn->src_reg * 2 + 1));
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int add_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
u64 imm = insn->imm; /* sign extend */
|
|
|
|
wrp_alu_imm(nfp_prog, insn->dst_reg * 2, ALU_OP_ADD, imm & ~0U);
|
|
wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, ALU_OP_ADD_C, imm >> 32);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int sub_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
|
|
emit_alu(nfp_prog, reg_both(insn->dst_reg * 2),
|
|
reg_a(insn->dst_reg * 2), ALU_OP_SUB,
|
|
reg_b(insn->src_reg * 2));
|
|
emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1),
|
|
reg_a(insn->dst_reg * 2 + 1), ALU_OP_SUB_C,
|
|
reg_b(insn->src_reg * 2 + 1));
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int sub_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
u64 imm = insn->imm; /* sign extend */
|
|
|
|
wrp_alu_imm(nfp_prog, insn->dst_reg * 2, ALU_OP_SUB, imm & ~0U);
|
|
wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, ALU_OP_SUB_C, imm >> 32);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int mul_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return wrp_mul(nfp_prog, meta, true, true);
|
|
}
|
|
|
|
static int mul_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return wrp_mul(nfp_prog, meta, true, false);
|
|
}
|
|
|
|
static int div_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
|
|
return wrp_div_imm(nfp_prog, insn->dst_reg * 2, insn->imm);
|
|
}
|
|
|
|
static int div_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
/* NOTE: verifier hook has rejected cases for which verifier doesn't
|
|
* know whether the source operand is constant or not.
|
|
*/
|
|
return wrp_div_imm(nfp_prog, meta->insn.dst_reg * 2, meta->umin_src);
|
|
}
|
|
|
|
static int neg_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
|
|
emit_alu(nfp_prog, reg_both(insn->dst_reg * 2), reg_imm(0),
|
|
ALU_OP_SUB, reg_b(insn->dst_reg * 2));
|
|
emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1), reg_imm(0),
|
|
ALU_OP_SUB_C, reg_b(insn->dst_reg * 2 + 1));
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* Pseudo code:
|
|
* if shift_amt >= 32
|
|
* dst_high = dst_low << shift_amt[4:0]
|
|
* dst_low = 0;
|
|
* else
|
|
* dst_high = (dst_high, dst_low) >> (32 - shift_amt)
|
|
* dst_low = dst_low << shift_amt
|
|
*
|
|
* The indirect shift will use the same logic at runtime.
|
|
*/
|
|
static int __shl_imm64(struct nfp_prog *nfp_prog, u8 dst, u8 shift_amt)
|
|
{
|
|
if (!shift_amt)
|
|
return 0;
|
|
|
|
if (shift_amt < 32) {
|
|
emit_shf(nfp_prog, reg_both(dst + 1), reg_a(dst + 1),
|
|
SHF_OP_NONE, reg_b(dst), SHF_SC_R_DSHF,
|
|
32 - shift_amt);
|
|
emit_shf(nfp_prog, reg_both(dst), reg_none(), SHF_OP_NONE,
|
|
reg_b(dst), SHF_SC_L_SHF, shift_amt);
|
|
} else if (shift_amt == 32) {
|
|
wrp_reg_mov(nfp_prog, dst + 1, dst);
|
|
wrp_immed(nfp_prog, reg_both(dst), 0);
|
|
} else if (shift_amt > 32) {
|
|
emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_NONE,
|
|
reg_b(dst), SHF_SC_L_SHF, shift_amt - 32);
|
|
wrp_immed(nfp_prog, reg_both(dst), 0);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int shl_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
u8 dst = insn->dst_reg * 2;
|
|
|
|
return __shl_imm64(nfp_prog, dst, insn->imm);
|
|
}
|
|
|
|
static void shl_reg64_lt32_high(struct nfp_prog *nfp_prog, u8 dst, u8 src)
|
|
{
|
|
emit_alu(nfp_prog, imm_both(nfp_prog), reg_imm(32), ALU_OP_SUB,
|
|
reg_b(src));
|
|
emit_alu(nfp_prog, reg_none(), imm_a(nfp_prog), ALU_OP_OR, reg_imm(0));
|
|
emit_shf_indir(nfp_prog, reg_both(dst + 1), reg_a(dst + 1), SHF_OP_NONE,
|
|
reg_b(dst), SHF_SC_R_DSHF);
|
|
}
|
|
|
|
/* NOTE: for indirect left shift, HIGH part should be calculated first. */
|
|
static void shl_reg64_lt32_low(struct nfp_prog *nfp_prog, u8 dst, u8 src)
|
|
{
|
|
emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0));
|
|
emit_shf_indir(nfp_prog, reg_both(dst), reg_none(), SHF_OP_NONE,
|
|
reg_b(dst), SHF_SC_L_SHF);
|
|
}
|
|
|
|
static void shl_reg64_lt32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
|
|
{
|
|
shl_reg64_lt32_high(nfp_prog, dst, src);
|
|
shl_reg64_lt32_low(nfp_prog, dst, src);
|
|
}
|
|
|
|
static void shl_reg64_ge32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
|
|
{
|
|
emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0));
|
|
emit_shf_indir(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_NONE,
|
|
reg_b(dst), SHF_SC_L_SHF);
|
|
wrp_immed(nfp_prog, reg_both(dst), 0);
|
|
}
|
|
|
|
static int shl_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
u64 umin, umax;
|
|
u8 dst, src;
|
|
|
|
dst = insn->dst_reg * 2;
|
|
umin = meta->umin_src;
|
|
umax = meta->umax_src;
|
|
if (umin == umax)
|
|
return __shl_imm64(nfp_prog, dst, umin);
|
|
|
|
src = insn->src_reg * 2;
|
|
if (umax < 32) {
|
|
shl_reg64_lt32(nfp_prog, dst, src);
|
|
} else if (umin >= 32) {
|
|
shl_reg64_ge32(nfp_prog, dst, src);
|
|
} else {
|
|
/* Generate different instruction sequences depending on runtime
|
|
* value of shift amount.
|
|
*/
|
|
u16 label_ge32, label_end;
|
|
|
|
label_ge32 = nfp_prog_current_offset(nfp_prog) + 7;
|
|
emit_br_bset(nfp_prog, reg_a(src), 5, label_ge32, 0);
|
|
|
|
shl_reg64_lt32_high(nfp_prog, dst, src);
|
|
label_end = nfp_prog_current_offset(nfp_prog) + 6;
|
|
emit_br(nfp_prog, BR_UNC, label_end, 2);
|
|
/* shl_reg64_lt32_low packed in delay slot. */
|
|
shl_reg64_lt32_low(nfp_prog, dst, src);
|
|
|
|
if (!nfp_prog_confirm_current_offset(nfp_prog, label_ge32))
|
|
return -EINVAL;
|
|
shl_reg64_ge32(nfp_prog, dst, src);
|
|
|
|
if (!nfp_prog_confirm_current_offset(nfp_prog, label_end))
|
|
return -EINVAL;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* Pseudo code:
|
|
* if shift_amt >= 32
|
|
* dst_high = 0;
|
|
* dst_low = dst_high >> shift_amt[4:0]
|
|
* else
|
|
* dst_high = dst_high >> shift_amt
|
|
* dst_low = (dst_high, dst_low) >> shift_amt
|
|
*
|
|
* The indirect shift will use the same logic at runtime.
|
|
*/
|
|
static int __shr_imm64(struct nfp_prog *nfp_prog, u8 dst, u8 shift_amt)
|
|
{
|
|
if (!shift_amt)
|
|
return 0;
|
|
|
|
if (shift_amt < 32) {
|
|
emit_shf(nfp_prog, reg_both(dst), reg_a(dst + 1), SHF_OP_NONE,
|
|
reg_b(dst), SHF_SC_R_DSHF, shift_amt);
|
|
emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_NONE,
|
|
reg_b(dst + 1), SHF_SC_R_SHF, shift_amt);
|
|
} else if (shift_amt == 32) {
|
|
wrp_reg_mov(nfp_prog, dst, dst + 1);
|
|
wrp_immed(nfp_prog, reg_both(dst + 1), 0);
|
|
} else if (shift_amt > 32) {
|
|
emit_shf(nfp_prog, reg_both(dst), reg_none(), SHF_OP_NONE,
|
|
reg_b(dst + 1), SHF_SC_R_SHF, shift_amt - 32);
|
|
wrp_immed(nfp_prog, reg_both(dst + 1), 0);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int shr_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
u8 dst = insn->dst_reg * 2;
|
|
|
|
return __shr_imm64(nfp_prog, dst, insn->imm);
|
|
}
|
|
|
|
/* NOTE: for indirect right shift, LOW part should be calculated first. */
|
|
static void shr_reg64_lt32_high(struct nfp_prog *nfp_prog, u8 dst, u8 src)
|
|
{
|
|
emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0));
|
|
emit_shf_indir(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_NONE,
|
|
reg_b(dst + 1), SHF_SC_R_SHF);
|
|
}
|
|
|
|
static void shr_reg64_lt32_low(struct nfp_prog *nfp_prog, u8 dst, u8 src)
|
|
{
|
|
emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0));
|
|
emit_shf_indir(nfp_prog, reg_both(dst), reg_a(dst + 1), SHF_OP_NONE,
|
|
reg_b(dst), SHF_SC_R_DSHF);
|
|
}
|
|
|
|
static void shr_reg64_lt32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
|
|
{
|
|
shr_reg64_lt32_low(nfp_prog, dst, src);
|
|
shr_reg64_lt32_high(nfp_prog, dst, src);
|
|
}
|
|
|
|
static void shr_reg64_ge32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
|
|
{
|
|
emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0));
|
|
emit_shf_indir(nfp_prog, reg_both(dst), reg_none(), SHF_OP_NONE,
|
|
reg_b(dst + 1), SHF_SC_R_SHF);
|
|
wrp_immed(nfp_prog, reg_both(dst + 1), 0);
|
|
}
|
|
|
|
static int shr_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
u64 umin, umax;
|
|
u8 dst, src;
|
|
|
|
dst = insn->dst_reg * 2;
|
|
umin = meta->umin_src;
|
|
umax = meta->umax_src;
|
|
if (umin == umax)
|
|
return __shr_imm64(nfp_prog, dst, umin);
|
|
|
|
src = insn->src_reg * 2;
|
|
if (umax < 32) {
|
|
shr_reg64_lt32(nfp_prog, dst, src);
|
|
} else if (umin >= 32) {
|
|
shr_reg64_ge32(nfp_prog, dst, src);
|
|
} else {
|
|
/* Generate different instruction sequences depending on runtime
|
|
* value of shift amount.
|
|
*/
|
|
u16 label_ge32, label_end;
|
|
|
|
label_ge32 = nfp_prog_current_offset(nfp_prog) + 6;
|
|
emit_br_bset(nfp_prog, reg_a(src), 5, label_ge32, 0);
|
|
shr_reg64_lt32_low(nfp_prog, dst, src);
|
|
label_end = nfp_prog_current_offset(nfp_prog) + 6;
|
|
emit_br(nfp_prog, BR_UNC, label_end, 2);
|
|
/* shr_reg64_lt32_high packed in delay slot. */
|
|
shr_reg64_lt32_high(nfp_prog, dst, src);
|
|
|
|
if (!nfp_prog_confirm_current_offset(nfp_prog, label_ge32))
|
|
return -EINVAL;
|
|
shr_reg64_ge32(nfp_prog, dst, src);
|
|
|
|
if (!nfp_prog_confirm_current_offset(nfp_prog, label_end))
|
|
return -EINVAL;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* Code logic is the same as __shr_imm64 except ashr requires signedness bit
|
|
* told through PREV_ALU result.
|
|
*/
|
|
static int __ashr_imm64(struct nfp_prog *nfp_prog, u8 dst, u8 shift_amt)
|
|
{
|
|
if (!shift_amt)
|
|
return 0;
|
|
|
|
if (shift_amt < 32) {
|
|
emit_shf(nfp_prog, reg_both(dst), reg_a(dst + 1), SHF_OP_NONE,
|
|
reg_b(dst), SHF_SC_R_DSHF, shift_amt);
|
|
/* Set signedness bit. */
|
|
emit_alu(nfp_prog, reg_none(), reg_a(dst + 1), ALU_OP_OR,
|
|
reg_imm(0));
|
|
emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR,
|
|
reg_b(dst + 1), SHF_SC_R_SHF, shift_amt);
|
|
} else if (shift_amt == 32) {
|
|
/* NOTE: this also helps setting signedness bit. */
|
|
wrp_reg_mov(nfp_prog, dst, dst + 1);
|
|
emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR,
|
|
reg_b(dst + 1), SHF_SC_R_SHF, 31);
|
|
} else if (shift_amt > 32) {
|
|
emit_alu(nfp_prog, reg_none(), reg_a(dst + 1), ALU_OP_OR,
|
|
reg_imm(0));
|
|
emit_shf(nfp_prog, reg_both(dst), reg_none(), SHF_OP_ASHR,
|
|
reg_b(dst + 1), SHF_SC_R_SHF, shift_amt - 32);
|
|
emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR,
|
|
reg_b(dst + 1), SHF_SC_R_SHF, 31);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int ashr_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
u8 dst = insn->dst_reg * 2;
|
|
|
|
return __ashr_imm64(nfp_prog, dst, insn->imm);
|
|
}
|
|
|
|
static void ashr_reg64_lt32_high(struct nfp_prog *nfp_prog, u8 dst, u8 src)
|
|
{
|
|
/* NOTE: the first insn will set both indirect shift amount (source A)
|
|
* and signedness bit (MSB of result).
|
|
*/
|
|
emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_b(dst + 1));
|
|
emit_shf_indir(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR,
|
|
reg_b(dst + 1), SHF_SC_R_SHF);
|
|
}
|
|
|
|
static void ashr_reg64_lt32_low(struct nfp_prog *nfp_prog, u8 dst, u8 src)
|
|
{
|
|
/* NOTE: it is the same as logic shift because we don't need to shift in
|
|
* signedness bit when the shift amount is less than 32.
|
|
*/
|
|
return shr_reg64_lt32_low(nfp_prog, dst, src);
|
|
}
|
|
|
|
static void ashr_reg64_lt32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
|
|
{
|
|
ashr_reg64_lt32_low(nfp_prog, dst, src);
|
|
ashr_reg64_lt32_high(nfp_prog, dst, src);
|
|
}
|
|
|
|
static void ashr_reg64_ge32(struct nfp_prog *nfp_prog, u8 dst, u8 src)
|
|
{
|
|
emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_b(dst + 1));
|
|
emit_shf_indir(nfp_prog, reg_both(dst), reg_none(), SHF_OP_ASHR,
|
|
reg_b(dst + 1), SHF_SC_R_SHF);
|
|
emit_shf(nfp_prog, reg_both(dst + 1), reg_none(), SHF_OP_ASHR,
|
|
reg_b(dst + 1), SHF_SC_R_SHF, 31);
|
|
}
|
|
|
|
/* Like ashr_imm64, but need to use indirect shift. */
|
|
static int ashr_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
u64 umin, umax;
|
|
u8 dst, src;
|
|
|
|
dst = insn->dst_reg * 2;
|
|
umin = meta->umin_src;
|
|
umax = meta->umax_src;
|
|
if (umin == umax)
|
|
return __ashr_imm64(nfp_prog, dst, umin);
|
|
|
|
src = insn->src_reg * 2;
|
|
if (umax < 32) {
|
|
ashr_reg64_lt32(nfp_prog, dst, src);
|
|
} else if (umin >= 32) {
|
|
ashr_reg64_ge32(nfp_prog, dst, src);
|
|
} else {
|
|
u16 label_ge32, label_end;
|
|
|
|
label_ge32 = nfp_prog_current_offset(nfp_prog) + 6;
|
|
emit_br_bset(nfp_prog, reg_a(src), 5, label_ge32, 0);
|
|
ashr_reg64_lt32_low(nfp_prog, dst, src);
|
|
label_end = nfp_prog_current_offset(nfp_prog) + 6;
|
|
emit_br(nfp_prog, BR_UNC, label_end, 2);
|
|
/* ashr_reg64_lt32_high packed in delay slot. */
|
|
ashr_reg64_lt32_high(nfp_prog, dst, src);
|
|
|
|
if (!nfp_prog_confirm_current_offset(nfp_prog, label_ge32))
|
|
return -EINVAL;
|
|
ashr_reg64_ge32(nfp_prog, dst, src);
|
|
|
|
if (!nfp_prog_confirm_current_offset(nfp_prog, label_end))
|
|
return -EINVAL;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int mov_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
|
|
wrp_reg_mov(nfp_prog, insn->dst_reg * 2, insn->src_reg * 2);
|
|
wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int mov_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
|
|
wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2), insn->imm);
|
|
wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int xor_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return wrp_alu32_reg(nfp_prog, meta, ALU_OP_XOR);
|
|
}
|
|
|
|
static int xor_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return wrp_alu32_imm(nfp_prog, meta, ALU_OP_XOR);
|
|
}
|
|
|
|
static int and_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return wrp_alu32_reg(nfp_prog, meta, ALU_OP_AND);
|
|
}
|
|
|
|
static int and_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return wrp_alu32_imm(nfp_prog, meta, ALU_OP_AND);
|
|
}
|
|
|
|
static int or_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return wrp_alu32_reg(nfp_prog, meta, ALU_OP_OR);
|
|
}
|
|
|
|
static int or_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return wrp_alu32_imm(nfp_prog, meta, ALU_OP_OR);
|
|
}
|
|
|
|
static int add_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return wrp_alu32_reg(nfp_prog, meta, ALU_OP_ADD);
|
|
}
|
|
|
|
static int add_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return wrp_alu32_imm(nfp_prog, meta, ALU_OP_ADD);
|
|
}
|
|
|
|
static int sub_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return wrp_alu32_reg(nfp_prog, meta, ALU_OP_SUB);
|
|
}
|
|
|
|
static int sub_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return wrp_alu32_imm(nfp_prog, meta, ALU_OP_SUB);
|
|
}
|
|
|
|
static int mul_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return wrp_mul(nfp_prog, meta, false, true);
|
|
}
|
|
|
|
static int mul_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return wrp_mul(nfp_prog, meta, false, false);
|
|
}
|
|
|
|
static int div_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return div_reg64(nfp_prog, meta);
|
|
}
|
|
|
|
static int div_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return div_imm64(nfp_prog, meta);
|
|
}
|
|
|
|
static int neg_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
u8 dst = meta->insn.dst_reg * 2;
|
|
|
|
emit_alu(nfp_prog, reg_both(dst), reg_imm(0), ALU_OP_SUB, reg_b(dst));
|
|
wrp_zext(nfp_prog, meta, dst);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
__ashr_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, u8 dst,
|
|
u8 shift_amt)
|
|
{
|
|
if (shift_amt) {
|
|
/* Set signedness bit (MSB of result). */
|
|
emit_alu(nfp_prog, reg_none(), reg_a(dst), ALU_OP_OR,
|
|
reg_imm(0));
|
|
emit_shf(nfp_prog, reg_both(dst), reg_none(), SHF_OP_ASHR,
|
|
reg_b(dst), SHF_SC_R_SHF, shift_amt);
|
|
}
|
|
wrp_zext(nfp_prog, meta, dst);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int ashr_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
u64 umin, umax;
|
|
u8 dst, src;
|
|
|
|
dst = insn->dst_reg * 2;
|
|
umin = meta->umin_src;
|
|
umax = meta->umax_src;
|
|
if (umin == umax)
|
|
return __ashr_imm(nfp_prog, meta, dst, umin);
|
|
|
|
src = insn->src_reg * 2;
|
|
/* NOTE: the first insn will set both indirect shift amount (source A)
|
|
* and signedness bit (MSB of result).
|
|
*/
|
|
emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_b(dst));
|
|
emit_shf_indir(nfp_prog, reg_both(dst), reg_none(), SHF_OP_ASHR,
|
|
reg_b(dst), SHF_SC_R_SHF);
|
|
wrp_zext(nfp_prog, meta, dst);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int ashr_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
u8 dst = insn->dst_reg * 2;
|
|
|
|
return __ashr_imm(nfp_prog, meta, dst, insn->imm);
|
|
}
|
|
|
|
static int
|
|
__shr_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, u8 dst,
|
|
u8 shift_amt)
|
|
{
|
|
if (shift_amt)
|
|
emit_shf(nfp_prog, reg_both(dst), reg_none(), SHF_OP_NONE,
|
|
reg_b(dst), SHF_SC_R_SHF, shift_amt);
|
|
wrp_zext(nfp_prog, meta, dst);
|
|
return 0;
|
|
}
|
|
|
|
static int shr_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
u8 dst = insn->dst_reg * 2;
|
|
|
|
return __shr_imm(nfp_prog, meta, dst, insn->imm);
|
|
}
|
|
|
|
static int shr_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
u64 umin, umax;
|
|
u8 dst, src;
|
|
|
|
dst = insn->dst_reg * 2;
|
|
umin = meta->umin_src;
|
|
umax = meta->umax_src;
|
|
if (umin == umax)
|
|
return __shr_imm(nfp_prog, meta, dst, umin);
|
|
|
|
src = insn->src_reg * 2;
|
|
emit_alu(nfp_prog, reg_none(), reg_a(src), ALU_OP_OR, reg_imm(0));
|
|
emit_shf_indir(nfp_prog, reg_both(dst), reg_none(), SHF_OP_NONE,
|
|
reg_b(dst), SHF_SC_R_SHF);
|
|
wrp_zext(nfp_prog, meta, dst);
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
__shl_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, u8 dst,
|
|
u8 shift_amt)
|
|
{
|
|
if (shift_amt)
|
|
emit_shf(nfp_prog, reg_both(dst), reg_none(), SHF_OP_NONE,
|
|
reg_b(dst), SHF_SC_L_SHF, shift_amt);
|
|
wrp_zext(nfp_prog, meta, dst);
|
|
return 0;
|
|
}
|
|
|
|
static int shl_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
u8 dst = insn->dst_reg * 2;
|
|
|
|
return __shl_imm(nfp_prog, meta, dst, insn->imm);
|
|
}
|
|
|
|
static int shl_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
u64 umin, umax;
|
|
u8 dst, src;
|
|
|
|
dst = insn->dst_reg * 2;
|
|
umin = meta->umin_src;
|
|
umax = meta->umax_src;
|
|
if (umin == umax)
|
|
return __shl_imm(nfp_prog, meta, dst, umin);
|
|
|
|
src = insn->src_reg * 2;
|
|
shl_reg64_lt32_low(nfp_prog, dst, src);
|
|
wrp_zext(nfp_prog, meta, dst);
|
|
return 0;
|
|
}
|
|
|
|
static int end_reg32(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
u8 gpr = insn->dst_reg * 2;
|
|
|
|
switch (insn->imm) {
|
|
case 16:
|
|
emit_ld_field(nfp_prog, reg_both(gpr), 0x9, reg_b(gpr),
|
|
SHF_SC_R_ROT, 8);
|
|
emit_ld_field(nfp_prog, reg_both(gpr), 0xe, reg_a(gpr),
|
|
SHF_SC_R_SHF, 16);
|
|
|
|
wrp_immed(nfp_prog, reg_both(gpr + 1), 0);
|
|
break;
|
|
case 32:
|
|
wrp_end32(nfp_prog, reg_a(gpr), gpr);
|
|
wrp_immed(nfp_prog, reg_both(gpr + 1), 0);
|
|
break;
|
|
case 64:
|
|
wrp_mov(nfp_prog, imm_a(nfp_prog), reg_b(gpr + 1));
|
|
|
|
wrp_end32(nfp_prog, reg_a(gpr), gpr + 1);
|
|
wrp_end32(nfp_prog, imm_a(nfp_prog), gpr);
|
|
break;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int imm_ld8_part2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
struct nfp_insn_meta *prev = nfp_meta_prev(meta);
|
|
u32 imm_lo, imm_hi;
|
|
u8 dst;
|
|
|
|
dst = prev->insn.dst_reg * 2;
|
|
imm_lo = prev->insn.imm;
|
|
imm_hi = meta->insn.imm;
|
|
|
|
wrp_immed(nfp_prog, reg_both(dst), imm_lo);
|
|
|
|
/* mov is always 1 insn, load imm may be two, so try to use mov */
|
|
if (imm_hi == imm_lo)
|
|
wrp_mov(nfp_prog, reg_both(dst + 1), reg_a(dst));
|
|
else
|
|
wrp_immed(nfp_prog, reg_both(dst + 1), imm_hi);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int imm_ld8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
meta->double_cb = imm_ld8_part2;
|
|
return 0;
|
|
}
|
|
|
|
static int data_ld1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return construct_data_ld(nfp_prog, meta, meta->insn.imm, 1);
|
|
}
|
|
|
|
static int data_ld2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return construct_data_ld(nfp_prog, meta, meta->insn.imm, 2);
|
|
}
|
|
|
|
static int data_ld4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return construct_data_ld(nfp_prog, meta, meta->insn.imm, 4);
|
|
}
|
|
|
|
static int data_ind_ld1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return construct_data_ind_ld(nfp_prog, meta, meta->insn.imm,
|
|
meta->insn.src_reg * 2, 1);
|
|
}
|
|
|
|
static int data_ind_ld2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return construct_data_ind_ld(nfp_prog, meta, meta->insn.imm,
|
|
meta->insn.src_reg * 2, 2);
|
|
}
|
|
|
|
static int data_ind_ld4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return construct_data_ind_ld(nfp_prog, meta, meta->insn.imm,
|
|
meta->insn.src_reg * 2, 4);
|
|
}
|
|
|
|
static int
|
|
mem_ldx_stack(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
unsigned int size, unsigned int ptr_off)
|
|
{
|
|
return mem_op_stack(nfp_prog, meta, size, ptr_off,
|
|
meta->insn.dst_reg * 2, meta->insn.src_reg * 2,
|
|
true, wrp_lmem_load);
|
|
}
|
|
|
|
static int mem_ldx_skb(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
u8 size)
|
|
{
|
|
swreg dst = reg_both(meta->insn.dst_reg * 2);
|
|
|
|
switch (meta->insn.off) {
|
|
case offsetof(struct __sk_buff, len):
|
|
if (size != sizeof_field(struct __sk_buff, len))
|
|
return -EOPNOTSUPP;
|
|
wrp_mov(nfp_prog, dst, plen_reg(nfp_prog));
|
|
break;
|
|
case offsetof(struct __sk_buff, data):
|
|
if (size != sizeof_field(struct __sk_buff, data))
|
|
return -EOPNOTSUPP;
|
|
wrp_mov(nfp_prog, dst, pptr_reg(nfp_prog));
|
|
break;
|
|
case offsetof(struct __sk_buff, data_end):
|
|
if (size != sizeof_field(struct __sk_buff, data_end))
|
|
return -EOPNOTSUPP;
|
|
emit_alu(nfp_prog, dst,
|
|
plen_reg(nfp_prog), ALU_OP_ADD, pptr_reg(nfp_prog));
|
|
break;
|
|
default:
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int mem_ldx_xdp(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
u8 size)
|
|
{
|
|
swreg dst = reg_both(meta->insn.dst_reg * 2);
|
|
|
|
switch (meta->insn.off) {
|
|
case offsetof(struct xdp_md, data):
|
|
if (size != sizeof_field(struct xdp_md, data))
|
|
return -EOPNOTSUPP;
|
|
wrp_mov(nfp_prog, dst, pptr_reg(nfp_prog));
|
|
break;
|
|
case offsetof(struct xdp_md, data_end):
|
|
if (size != sizeof_field(struct xdp_md, data_end))
|
|
return -EOPNOTSUPP;
|
|
emit_alu(nfp_prog, dst,
|
|
plen_reg(nfp_prog), ALU_OP_ADD, pptr_reg(nfp_prog));
|
|
break;
|
|
default:
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
mem_ldx_data(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
unsigned int size)
|
|
{
|
|
swreg tmp_reg;
|
|
|
|
tmp_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
|
|
|
|
return data_ld_host_order_addr32(nfp_prog, meta, meta->insn.src_reg * 2,
|
|
tmp_reg, meta->insn.dst_reg * 2, size);
|
|
}
|
|
|
|
static int
|
|
mem_ldx_emem(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
unsigned int size)
|
|
{
|
|
swreg tmp_reg;
|
|
|
|
tmp_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
|
|
|
|
return data_ld_host_order_addr40(nfp_prog, meta, meta->insn.src_reg * 2,
|
|
tmp_reg, meta->insn.dst_reg * 2, size);
|
|
}
|
|
|
|
static void
|
|
mem_ldx_data_init_pktcache(struct nfp_prog *nfp_prog,
|
|
struct nfp_insn_meta *meta)
|
|
{
|
|
s16 range_start = meta->pkt_cache.range_start;
|
|
s16 range_end = meta->pkt_cache.range_end;
|
|
swreg src_base, off;
|
|
u8 xfer_num, len;
|
|
bool indir;
|
|
|
|
off = re_load_imm_any(nfp_prog, range_start, imm_b(nfp_prog));
|
|
src_base = reg_a(meta->insn.src_reg * 2);
|
|
len = range_end - range_start;
|
|
xfer_num = round_up(len, REG_WIDTH) / REG_WIDTH;
|
|
|
|
indir = len > 8 * REG_WIDTH;
|
|
/* Setup PREV_ALU for indirect mode. */
|
|
if (indir)
|
|
wrp_immed(nfp_prog, reg_none(),
|
|
CMD_OVE_LEN | FIELD_PREP(CMD_OV_LEN, xfer_num - 1));
|
|
|
|
/* Cache memory into transfer-in registers. */
|
|
emit_cmd_any(nfp_prog, CMD_TGT_READ32_SWAP, CMD_MODE_32b, 0, src_base,
|
|
off, xfer_num - 1, CMD_CTX_SWAP, indir);
|
|
}
|
|
|
|
static int
|
|
mem_ldx_data_from_pktcache_unaligned(struct nfp_prog *nfp_prog,
|
|
struct nfp_insn_meta *meta,
|
|
unsigned int size)
|
|
{
|
|
s16 range_start = meta->pkt_cache.range_start;
|
|
s16 insn_off = meta->insn.off - range_start;
|
|
swreg dst_lo, dst_hi, src_lo, src_mid;
|
|
u8 dst_gpr = meta->insn.dst_reg * 2;
|
|
u8 len_lo = size, len_mid = 0;
|
|
u8 idx = insn_off / REG_WIDTH;
|
|
u8 off = insn_off % REG_WIDTH;
|
|
|
|
dst_hi = reg_both(dst_gpr + 1);
|
|
dst_lo = reg_both(dst_gpr);
|
|
src_lo = reg_xfer(idx);
|
|
|
|
/* The read length could involve as many as three registers. */
|
|
if (size > REG_WIDTH - off) {
|
|
/* Calculate the part in the second register. */
|
|
len_lo = REG_WIDTH - off;
|
|
len_mid = size - len_lo;
|
|
|
|
/* Calculate the part in the third register. */
|
|
if (size > 2 * REG_WIDTH - off)
|
|
len_mid = REG_WIDTH;
|
|
}
|
|
|
|
wrp_reg_subpart(nfp_prog, dst_lo, src_lo, len_lo, off);
|
|
|
|
if (!len_mid) {
|
|
wrp_zext(nfp_prog, meta, dst_gpr);
|
|
return 0;
|
|
}
|
|
|
|
src_mid = reg_xfer(idx + 1);
|
|
|
|
if (size <= REG_WIDTH) {
|
|
wrp_reg_or_subpart(nfp_prog, dst_lo, src_mid, len_mid, len_lo);
|
|
wrp_zext(nfp_prog, meta, dst_gpr);
|
|
} else {
|
|
swreg src_hi = reg_xfer(idx + 2);
|
|
|
|
wrp_reg_or_subpart(nfp_prog, dst_lo, src_mid,
|
|
REG_WIDTH - len_lo, len_lo);
|
|
wrp_reg_subpart(nfp_prog, dst_hi, src_mid, len_lo,
|
|
REG_WIDTH - len_lo);
|
|
wrp_reg_or_subpart(nfp_prog, dst_hi, src_hi, REG_WIDTH - len_lo,
|
|
len_lo);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
mem_ldx_data_from_pktcache_aligned(struct nfp_prog *nfp_prog,
|
|
struct nfp_insn_meta *meta,
|
|
unsigned int size)
|
|
{
|
|
swreg dst_lo, dst_hi, src_lo;
|
|
u8 dst_gpr, idx;
|
|
|
|
idx = (meta->insn.off - meta->pkt_cache.range_start) / REG_WIDTH;
|
|
dst_gpr = meta->insn.dst_reg * 2;
|
|
dst_hi = reg_both(dst_gpr + 1);
|
|
dst_lo = reg_both(dst_gpr);
|
|
src_lo = reg_xfer(idx);
|
|
|
|
if (size < REG_WIDTH) {
|
|
wrp_reg_subpart(nfp_prog, dst_lo, src_lo, size, 0);
|
|
wrp_zext(nfp_prog, meta, dst_gpr);
|
|
} else if (size == REG_WIDTH) {
|
|
wrp_mov(nfp_prog, dst_lo, src_lo);
|
|
wrp_zext(nfp_prog, meta, dst_gpr);
|
|
} else {
|
|
swreg src_hi = reg_xfer(idx + 1);
|
|
|
|
wrp_mov(nfp_prog, dst_lo, src_lo);
|
|
wrp_mov(nfp_prog, dst_hi, src_hi);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
mem_ldx_data_from_pktcache(struct nfp_prog *nfp_prog,
|
|
struct nfp_insn_meta *meta, unsigned int size)
|
|
{
|
|
u8 off = meta->insn.off - meta->pkt_cache.range_start;
|
|
|
|
if (IS_ALIGNED(off, REG_WIDTH))
|
|
return mem_ldx_data_from_pktcache_aligned(nfp_prog, meta, size);
|
|
|
|
return mem_ldx_data_from_pktcache_unaligned(nfp_prog, meta, size);
|
|
}
|
|
|
|
static int
|
|
mem_ldx(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
unsigned int size)
|
|
{
|
|
if (meta->ldst_gather_len)
|
|
return nfp_cpp_memcpy(nfp_prog, meta);
|
|
|
|
if (meta->ptr.type == PTR_TO_CTX) {
|
|
if (nfp_prog->type == BPF_PROG_TYPE_XDP)
|
|
return mem_ldx_xdp(nfp_prog, meta, size);
|
|
else
|
|
return mem_ldx_skb(nfp_prog, meta, size);
|
|
}
|
|
|
|
if (meta->ptr.type == PTR_TO_PACKET) {
|
|
if (meta->pkt_cache.range_end) {
|
|
if (meta->pkt_cache.do_init)
|
|
mem_ldx_data_init_pktcache(nfp_prog, meta);
|
|
|
|
return mem_ldx_data_from_pktcache(nfp_prog, meta, size);
|
|
} else {
|
|
return mem_ldx_data(nfp_prog, meta, size);
|
|
}
|
|
}
|
|
|
|
if (meta->ptr.type == PTR_TO_STACK)
|
|
return mem_ldx_stack(nfp_prog, meta, size,
|
|
meta->ptr.off + meta->ptr.var_off.value);
|
|
|
|
if (meta->ptr.type == PTR_TO_MAP_VALUE)
|
|
return mem_ldx_emem(nfp_prog, meta, size);
|
|
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static int mem_ldx1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return mem_ldx(nfp_prog, meta, 1);
|
|
}
|
|
|
|
static int mem_ldx2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return mem_ldx(nfp_prog, meta, 2);
|
|
}
|
|
|
|
static int mem_ldx4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return mem_ldx(nfp_prog, meta, 4);
|
|
}
|
|
|
|
static int mem_ldx8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return mem_ldx(nfp_prog, meta, 8);
|
|
}
|
|
|
|
static int
|
|
mem_st_data(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
unsigned int size)
|
|
{
|
|
u64 imm = meta->insn.imm; /* sign extend */
|
|
swreg off_reg;
|
|
|
|
off_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
|
|
|
|
return data_st_host_order(nfp_prog, meta->insn.dst_reg * 2, off_reg,
|
|
imm, size);
|
|
}
|
|
|
|
static int mem_st(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
unsigned int size)
|
|
{
|
|
if (meta->ptr.type == PTR_TO_PACKET)
|
|
return mem_st_data(nfp_prog, meta, size);
|
|
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static int mem_st1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return mem_st(nfp_prog, meta, 1);
|
|
}
|
|
|
|
static int mem_st2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return mem_st(nfp_prog, meta, 2);
|
|
}
|
|
|
|
static int mem_st4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return mem_st(nfp_prog, meta, 4);
|
|
}
|
|
|
|
static int mem_st8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return mem_st(nfp_prog, meta, 8);
|
|
}
|
|
|
|
static int
|
|
mem_stx_data(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
unsigned int size)
|
|
{
|
|
swreg off_reg;
|
|
|
|
off_reg = re_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
|
|
|
|
return data_stx_host_order(nfp_prog, meta->insn.dst_reg * 2, off_reg,
|
|
meta->insn.src_reg * 2, size);
|
|
}
|
|
|
|
static int
|
|
mem_stx_stack(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
unsigned int size, unsigned int ptr_off)
|
|
{
|
|
return mem_op_stack(nfp_prog, meta, size, ptr_off,
|
|
meta->insn.src_reg * 2, meta->insn.dst_reg * 2,
|
|
false, wrp_lmem_store);
|
|
}
|
|
|
|
static int mem_stx_xdp(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
switch (meta->insn.off) {
|
|
case offsetof(struct xdp_md, rx_queue_index):
|
|
return nfp_queue_select(nfp_prog, meta);
|
|
}
|
|
|
|
WARN_ON_ONCE(1); /* verifier should have rejected bad accesses */
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static int
|
|
mem_stx(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
unsigned int size)
|
|
{
|
|
if (meta->ptr.type == PTR_TO_PACKET)
|
|
return mem_stx_data(nfp_prog, meta, size);
|
|
|
|
if (meta->ptr.type == PTR_TO_STACK)
|
|
return mem_stx_stack(nfp_prog, meta, size,
|
|
meta->ptr.off + meta->ptr.var_off.value);
|
|
|
|
return -EOPNOTSUPP;
|
|
}
|
|
|
|
static int mem_stx1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return mem_stx(nfp_prog, meta, 1);
|
|
}
|
|
|
|
static int mem_stx2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return mem_stx(nfp_prog, meta, 2);
|
|
}
|
|
|
|
static int mem_stx4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
if (meta->ptr.type == PTR_TO_CTX)
|
|
if (nfp_prog->type == BPF_PROG_TYPE_XDP)
|
|
return mem_stx_xdp(nfp_prog, meta);
|
|
return mem_stx(nfp_prog, meta, 4);
|
|
}
|
|
|
|
static int mem_stx8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return mem_stx(nfp_prog, meta, 8);
|
|
}
|
|
|
|
static int
|
|
mem_xadd(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta, bool is64)
|
|
{
|
|
u8 dst_gpr = meta->insn.dst_reg * 2;
|
|
u8 src_gpr = meta->insn.src_reg * 2;
|
|
unsigned int full_add, out;
|
|
swreg addra, addrb, off;
|
|
|
|
off = ur_load_imm_any(nfp_prog, meta->insn.off, imm_b(nfp_prog));
|
|
|
|
/* We can fit 16 bits into command immediate, if we know the immediate
|
|
* is guaranteed to either always or never fit into 16 bit we only
|
|
* generate code to handle that particular case, otherwise generate
|
|
* code for both.
|
|
*/
|
|
out = nfp_prog_current_offset(nfp_prog);
|
|
full_add = nfp_prog_current_offset(nfp_prog);
|
|
|
|
if (meta->insn.off) {
|
|
out += 2;
|
|
full_add += 2;
|
|
}
|
|
if (meta->xadd_maybe_16bit) {
|
|
out += 3;
|
|
full_add += 3;
|
|
}
|
|
if (meta->xadd_over_16bit)
|
|
out += 2 + is64;
|
|
if (meta->xadd_maybe_16bit && meta->xadd_over_16bit) {
|
|
out += 5;
|
|
full_add += 5;
|
|
}
|
|
|
|
/* Generate the branch for choosing add_imm vs add */
|
|
if (meta->xadd_maybe_16bit && meta->xadd_over_16bit) {
|
|
swreg max_imm = imm_a(nfp_prog);
|
|
|
|
wrp_immed(nfp_prog, max_imm, 0xffff);
|
|
emit_alu(nfp_prog, reg_none(),
|
|
max_imm, ALU_OP_SUB, reg_b(src_gpr));
|
|
emit_alu(nfp_prog, reg_none(),
|
|
reg_imm(0), ALU_OP_SUB_C, reg_b(src_gpr + 1));
|
|
emit_br(nfp_prog, BR_BLO, full_add, meta->insn.off ? 2 : 0);
|
|
/* defer for add */
|
|
}
|
|
|
|
/* If insn has an offset add to the address */
|
|
if (!meta->insn.off) {
|
|
addra = reg_a(dst_gpr);
|
|
addrb = reg_b(dst_gpr + 1);
|
|
} else {
|
|
emit_alu(nfp_prog, imma_a(nfp_prog),
|
|
reg_a(dst_gpr), ALU_OP_ADD, off);
|
|
emit_alu(nfp_prog, imma_b(nfp_prog),
|
|
reg_a(dst_gpr + 1), ALU_OP_ADD_C, reg_imm(0));
|
|
addra = imma_a(nfp_prog);
|
|
addrb = imma_b(nfp_prog);
|
|
}
|
|
|
|
/* Generate the add_imm if 16 bits are possible */
|
|
if (meta->xadd_maybe_16bit) {
|
|
swreg prev_alu = imm_a(nfp_prog);
|
|
|
|
wrp_immed(nfp_prog, prev_alu,
|
|
FIELD_PREP(CMD_OVE_DATA, 2) |
|
|
CMD_OVE_LEN |
|
|
FIELD_PREP(CMD_OV_LEN, 0x8 | is64 << 2));
|
|
wrp_reg_or_subpart(nfp_prog, prev_alu, reg_b(src_gpr), 2, 2);
|
|
emit_cmd_indir(nfp_prog, CMD_TGT_ADD_IMM, CMD_MODE_40b_BA, 0,
|
|
addra, addrb, 0, CMD_CTX_NO_SWAP);
|
|
|
|
if (meta->xadd_over_16bit)
|
|
emit_br(nfp_prog, BR_UNC, out, 0);
|
|
}
|
|
|
|
if (!nfp_prog_confirm_current_offset(nfp_prog, full_add))
|
|
return -EINVAL;
|
|
|
|
/* Generate the add if 16 bits are not guaranteed */
|
|
if (meta->xadd_over_16bit) {
|
|
emit_cmd(nfp_prog, CMD_TGT_ADD, CMD_MODE_40b_BA, 0,
|
|
addra, addrb, is64 << 2,
|
|
is64 ? CMD_CTX_SWAP_DEFER2 : CMD_CTX_SWAP_DEFER1);
|
|
|
|
wrp_mov(nfp_prog, reg_xfer(0), reg_a(src_gpr));
|
|
if (is64)
|
|
wrp_mov(nfp_prog, reg_xfer(1), reg_a(src_gpr + 1));
|
|
}
|
|
|
|
if (!nfp_prog_confirm_current_offset(nfp_prog, out))
|
|
return -EINVAL;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int mem_atomic4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
if (meta->insn.imm != BPF_ADD)
|
|
return -EOPNOTSUPP;
|
|
|
|
return mem_xadd(nfp_prog, meta, false);
|
|
}
|
|
|
|
static int mem_atomic8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
if (meta->insn.imm != BPF_ADD)
|
|
return -EOPNOTSUPP;
|
|
|
|
return mem_xadd(nfp_prog, meta, true);
|
|
}
|
|
|
|
static int jump(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
emit_br(nfp_prog, BR_UNC, meta->insn.off, 0);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int jeq_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
u64 imm = insn->imm; /* sign extend */
|
|
swreg or1, or2, tmp_reg;
|
|
|
|
or1 = reg_a(insn->dst_reg * 2);
|
|
or2 = reg_b(insn->dst_reg * 2 + 1);
|
|
|
|
if (imm & ~0U) {
|
|
tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
|
|
emit_alu(nfp_prog, imm_a(nfp_prog),
|
|
reg_a(insn->dst_reg * 2), ALU_OP_XOR, tmp_reg);
|
|
or1 = imm_a(nfp_prog);
|
|
}
|
|
|
|
if (imm >> 32) {
|
|
tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
|
|
emit_alu(nfp_prog, imm_b(nfp_prog),
|
|
reg_a(insn->dst_reg * 2 + 1), ALU_OP_XOR, tmp_reg);
|
|
or2 = imm_b(nfp_prog);
|
|
}
|
|
|
|
emit_alu(nfp_prog, reg_none(), or1, ALU_OP_OR, or2);
|
|
emit_br(nfp_prog, BR_BEQ, insn->off, 0);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int jeq32_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
swreg tmp_reg;
|
|
|
|
tmp_reg = ur_load_imm_any(nfp_prog, insn->imm, imm_b(nfp_prog));
|
|
emit_alu(nfp_prog, reg_none(),
|
|
reg_a(insn->dst_reg * 2), ALU_OP_XOR, tmp_reg);
|
|
emit_br(nfp_prog, BR_BEQ, insn->off, 0);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int jset_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
u64 imm = insn->imm; /* sign extend */
|
|
u8 dst_gpr = insn->dst_reg * 2;
|
|
swreg tmp_reg;
|
|
|
|
tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
|
|
emit_alu(nfp_prog, imm_b(nfp_prog),
|
|
reg_a(dst_gpr), ALU_OP_AND, tmp_reg);
|
|
/* Upper word of the mask can only be 0 or ~0 from sign extension,
|
|
* so either ignore it or OR the whole thing in.
|
|
*/
|
|
if (is_mbpf_jmp64(meta) && imm >> 32) {
|
|
emit_alu(nfp_prog, reg_none(),
|
|
reg_a(dst_gpr + 1), ALU_OP_OR, imm_b(nfp_prog));
|
|
}
|
|
emit_br(nfp_prog, BR_BNE, insn->off, 0);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int jne_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
u64 imm = insn->imm; /* sign extend */
|
|
bool is_jmp32 = is_mbpf_jmp32(meta);
|
|
swreg tmp_reg;
|
|
|
|
if (!imm) {
|
|
if (is_jmp32)
|
|
emit_alu(nfp_prog, reg_none(), reg_none(), ALU_OP_NONE,
|
|
reg_b(insn->dst_reg * 2));
|
|
else
|
|
emit_alu(nfp_prog, reg_none(), reg_a(insn->dst_reg * 2),
|
|
ALU_OP_OR, reg_b(insn->dst_reg * 2 + 1));
|
|
emit_br(nfp_prog, BR_BNE, insn->off, 0);
|
|
return 0;
|
|
}
|
|
|
|
tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
|
|
emit_alu(nfp_prog, reg_none(),
|
|
reg_a(insn->dst_reg * 2), ALU_OP_XOR, tmp_reg);
|
|
emit_br(nfp_prog, BR_BNE, insn->off, 0);
|
|
|
|
if (is_jmp32)
|
|
return 0;
|
|
|
|
tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
|
|
emit_alu(nfp_prog, reg_none(),
|
|
reg_a(insn->dst_reg * 2 + 1), ALU_OP_XOR, tmp_reg);
|
|
emit_br(nfp_prog, BR_BNE, insn->off, 0);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int jeq_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
const struct bpf_insn *insn = &meta->insn;
|
|
|
|
emit_alu(nfp_prog, imm_a(nfp_prog), reg_a(insn->dst_reg * 2),
|
|
ALU_OP_XOR, reg_b(insn->src_reg * 2));
|
|
if (is_mbpf_jmp64(meta)) {
|
|
emit_alu(nfp_prog, imm_b(nfp_prog),
|
|
reg_a(insn->dst_reg * 2 + 1), ALU_OP_XOR,
|
|
reg_b(insn->src_reg * 2 + 1));
|
|
emit_alu(nfp_prog, reg_none(), imm_a(nfp_prog), ALU_OP_OR,
|
|
imm_b(nfp_prog));
|
|
}
|
|
emit_br(nfp_prog, BR_BEQ, insn->off, 0);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int jset_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return wrp_test_reg(nfp_prog, meta, ALU_OP_AND, BR_BNE);
|
|
}
|
|
|
|
static int jne_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
return wrp_test_reg(nfp_prog, meta, ALU_OP_XOR, BR_BNE);
|
|
}
|
|
|
|
static int
|
|
bpf_to_bpf_call(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
u32 ret_tgt, stack_depth, offset_br;
|
|
swreg tmp_reg;
|
|
|
|
stack_depth = round_up(nfp_prog->stack_frame_depth, STACK_FRAME_ALIGN);
|
|
/* Space for saving the return address is accounted for by the callee,
|
|
* so stack_depth can be zero for the main function.
|
|
*/
|
|
if (stack_depth) {
|
|
tmp_reg = ur_load_imm_any(nfp_prog, stack_depth,
|
|
stack_imm(nfp_prog));
|
|
emit_alu(nfp_prog, stack_reg(nfp_prog),
|
|
stack_reg(nfp_prog), ALU_OP_ADD, tmp_reg);
|
|
emit_csr_wr(nfp_prog, stack_reg(nfp_prog),
|
|
NFP_CSR_ACT_LM_ADDR0);
|
|
}
|
|
|
|
/* Two cases for jumping to the callee:
|
|
*
|
|
* - If callee uses and needs to save R6~R9 then:
|
|
* 1. Put the start offset of the callee into imm_b(). This will
|
|
* require a fixup step, as we do not necessarily know this
|
|
* address yet.
|
|
* 2. Put the return address from the callee to the caller into
|
|
* register ret_reg().
|
|
* 3. (After defer slots are consumed) Jump to the subroutine that
|
|
* pushes the registers to the stack.
|
|
* The subroutine acts as a trampoline, and returns to the address in
|
|
* imm_b(), i.e. jumps to the callee.
|
|
*
|
|
* - If callee does not need to save R6~R9 then just load return
|
|
* address to the caller in ret_reg(), and jump to the callee
|
|
* directly.
|
|
*
|
|
* Using ret_reg() to pass the return address to the callee is set here
|
|
* as a convention. The callee can then push this address onto its
|
|
* stack frame in its prologue. The advantages of passing the return
|
|
* address through ret_reg(), instead of pushing it to the stack right
|
|
* here, are the following:
|
|
* - It looks cleaner.
|
|
* - If the called function is called multiple time, we get a lower
|
|
* program size.
|
|
* - We save two no-op instructions that should be added just before
|
|
* the emit_br() when stack depth is not null otherwise.
|
|
* - If we ever find a register to hold the return address during whole
|
|
* execution of the callee, we will not have to push the return
|
|
* address to the stack for leaf functions.
|
|
*/
|
|
if (!meta->jmp_dst) {
|
|
pr_err("BUG: BPF-to-BPF call has no destination recorded\n");
|
|
return -ELOOP;
|
|
}
|
|
if (nfp_prog->subprog[meta->jmp_dst->subprog_idx].needs_reg_push) {
|
|
ret_tgt = nfp_prog_current_offset(nfp_prog) + 3;
|
|
emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2,
|
|
RELO_BR_GO_CALL_PUSH_REGS);
|
|
offset_br = nfp_prog_current_offset(nfp_prog);
|
|
wrp_immed_relo(nfp_prog, imm_b(nfp_prog), 0, RELO_IMMED_REL);
|
|
} else {
|
|
ret_tgt = nfp_prog_current_offset(nfp_prog) + 2;
|
|
emit_br(nfp_prog, BR_UNC, meta->insn.imm, 1);
|
|
offset_br = nfp_prog_current_offset(nfp_prog);
|
|
}
|
|
wrp_immed_relo(nfp_prog, ret_reg(nfp_prog), ret_tgt, RELO_IMMED_REL);
|
|
|
|
if (!nfp_prog_confirm_current_offset(nfp_prog, ret_tgt))
|
|
return -EINVAL;
|
|
|
|
if (stack_depth) {
|
|
tmp_reg = ur_load_imm_any(nfp_prog, stack_depth,
|
|
stack_imm(nfp_prog));
|
|
emit_alu(nfp_prog, stack_reg(nfp_prog),
|
|
stack_reg(nfp_prog), ALU_OP_SUB, tmp_reg);
|
|
emit_csr_wr(nfp_prog, stack_reg(nfp_prog),
|
|
NFP_CSR_ACT_LM_ADDR0);
|
|
wrp_nops(nfp_prog, 3);
|
|
}
|
|
|
|
meta->num_insns_after_br = nfp_prog_current_offset(nfp_prog);
|
|
meta->num_insns_after_br -= offset_br;
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int helper_call(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
switch (meta->insn.imm) {
|
|
case BPF_FUNC_xdp_adjust_head:
|
|
return adjust_head(nfp_prog, meta);
|
|
case BPF_FUNC_xdp_adjust_tail:
|
|
return adjust_tail(nfp_prog, meta);
|
|
case BPF_FUNC_map_lookup_elem:
|
|
case BPF_FUNC_map_update_elem:
|
|
case BPF_FUNC_map_delete_elem:
|
|
return map_call_stack_common(nfp_prog, meta);
|
|
case BPF_FUNC_get_prandom_u32:
|
|
return nfp_get_prandom_u32(nfp_prog, meta);
|
|
case BPF_FUNC_perf_event_output:
|
|
return nfp_perf_event_output(nfp_prog, meta);
|
|
default:
|
|
WARN_ONCE(1, "verifier allowed unsupported function\n");
|
|
return -EOPNOTSUPP;
|
|
}
|
|
}
|
|
|
|
static int call(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
if (is_mbpf_pseudo_call(meta))
|
|
return bpf_to_bpf_call(nfp_prog, meta);
|
|
else
|
|
return helper_call(nfp_prog, meta);
|
|
}
|
|
|
|
static bool nfp_is_main_function(struct nfp_insn_meta *meta)
|
|
{
|
|
return meta->subprog_idx == 0;
|
|
}
|
|
|
|
static int goto_out(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 0, RELO_BR_GO_OUT);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int
|
|
nfp_subprog_epilogue(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
if (nfp_prog->subprog[meta->subprog_idx].needs_reg_push) {
|
|
/* Pop R6~R9 to the stack via related subroutine.
|
|
* We loaded the return address to the caller into ret_reg().
|
|
* This means that the subroutine does not come back here, we
|
|
* make it jump back to the subprogram caller directly!
|
|
*/
|
|
emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 1,
|
|
RELO_BR_GO_CALL_POP_REGS);
|
|
/* Pop return address from the stack. */
|
|
wrp_mov(nfp_prog, ret_reg(nfp_prog), reg_lm(0, 0));
|
|
} else {
|
|
/* Pop return address from the stack. */
|
|
wrp_mov(nfp_prog, ret_reg(nfp_prog), reg_lm(0, 0));
|
|
/* Jump back to caller if no callee-saved registers were used
|
|
* by the subprogram.
|
|
*/
|
|
emit_rtn(nfp_prog, ret_reg(nfp_prog), 0);
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int jmp_exit(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
if (nfp_is_main_function(meta))
|
|
return goto_out(nfp_prog, meta);
|
|
else
|
|
return nfp_subprog_epilogue(nfp_prog, meta);
|
|
}
|
|
|
|
static const instr_cb_t instr_cb[256] = {
|
|
[BPF_ALU64 | BPF_MOV | BPF_X] = mov_reg64,
|
|
[BPF_ALU64 | BPF_MOV | BPF_K] = mov_imm64,
|
|
[BPF_ALU64 | BPF_XOR | BPF_X] = xor_reg64,
|
|
[BPF_ALU64 | BPF_XOR | BPF_K] = xor_imm64,
|
|
[BPF_ALU64 | BPF_AND | BPF_X] = and_reg64,
|
|
[BPF_ALU64 | BPF_AND | BPF_K] = and_imm64,
|
|
[BPF_ALU64 | BPF_OR | BPF_X] = or_reg64,
|
|
[BPF_ALU64 | BPF_OR | BPF_K] = or_imm64,
|
|
[BPF_ALU64 | BPF_ADD | BPF_X] = add_reg64,
|
|
[BPF_ALU64 | BPF_ADD | BPF_K] = add_imm64,
|
|
[BPF_ALU64 | BPF_SUB | BPF_X] = sub_reg64,
|
|
[BPF_ALU64 | BPF_SUB | BPF_K] = sub_imm64,
|
|
[BPF_ALU64 | BPF_MUL | BPF_X] = mul_reg64,
|
|
[BPF_ALU64 | BPF_MUL | BPF_K] = mul_imm64,
|
|
[BPF_ALU64 | BPF_DIV | BPF_X] = div_reg64,
|
|
[BPF_ALU64 | BPF_DIV | BPF_K] = div_imm64,
|
|
[BPF_ALU64 | BPF_NEG] = neg_reg64,
|
|
[BPF_ALU64 | BPF_LSH | BPF_X] = shl_reg64,
|
|
[BPF_ALU64 | BPF_LSH | BPF_K] = shl_imm64,
|
|
[BPF_ALU64 | BPF_RSH | BPF_X] = shr_reg64,
|
|
[BPF_ALU64 | BPF_RSH | BPF_K] = shr_imm64,
|
|
[BPF_ALU64 | BPF_ARSH | BPF_X] = ashr_reg64,
|
|
[BPF_ALU64 | BPF_ARSH | BPF_K] = ashr_imm64,
|
|
[BPF_ALU | BPF_MOV | BPF_X] = mov_reg,
|
|
[BPF_ALU | BPF_MOV | BPF_K] = mov_imm,
|
|
[BPF_ALU | BPF_XOR | BPF_X] = xor_reg,
|
|
[BPF_ALU | BPF_XOR | BPF_K] = xor_imm,
|
|
[BPF_ALU | BPF_AND | BPF_X] = and_reg,
|
|
[BPF_ALU | BPF_AND | BPF_K] = and_imm,
|
|
[BPF_ALU | BPF_OR | BPF_X] = or_reg,
|
|
[BPF_ALU | BPF_OR | BPF_K] = or_imm,
|
|
[BPF_ALU | BPF_ADD | BPF_X] = add_reg,
|
|
[BPF_ALU | BPF_ADD | BPF_K] = add_imm,
|
|
[BPF_ALU | BPF_SUB | BPF_X] = sub_reg,
|
|
[BPF_ALU | BPF_SUB | BPF_K] = sub_imm,
|
|
[BPF_ALU | BPF_MUL | BPF_X] = mul_reg,
|
|
[BPF_ALU | BPF_MUL | BPF_K] = mul_imm,
|
|
[BPF_ALU | BPF_DIV | BPF_X] = div_reg,
|
|
[BPF_ALU | BPF_DIV | BPF_K] = div_imm,
|
|
[BPF_ALU | BPF_NEG] = neg_reg,
|
|
[BPF_ALU | BPF_LSH | BPF_X] = shl_reg,
|
|
[BPF_ALU | BPF_LSH | BPF_K] = shl_imm,
|
|
[BPF_ALU | BPF_RSH | BPF_X] = shr_reg,
|
|
[BPF_ALU | BPF_RSH | BPF_K] = shr_imm,
|
|
[BPF_ALU | BPF_ARSH | BPF_X] = ashr_reg,
|
|
[BPF_ALU | BPF_ARSH | BPF_K] = ashr_imm,
|
|
[BPF_ALU | BPF_END | BPF_X] = end_reg32,
|
|
[BPF_LD | BPF_IMM | BPF_DW] = imm_ld8,
|
|
[BPF_LD | BPF_ABS | BPF_B] = data_ld1,
|
|
[BPF_LD | BPF_ABS | BPF_H] = data_ld2,
|
|
[BPF_LD | BPF_ABS | BPF_W] = data_ld4,
|
|
[BPF_LD | BPF_IND | BPF_B] = data_ind_ld1,
|
|
[BPF_LD | BPF_IND | BPF_H] = data_ind_ld2,
|
|
[BPF_LD | BPF_IND | BPF_W] = data_ind_ld4,
|
|
[BPF_LDX | BPF_MEM | BPF_B] = mem_ldx1,
|
|
[BPF_LDX | BPF_MEM | BPF_H] = mem_ldx2,
|
|
[BPF_LDX | BPF_MEM | BPF_W] = mem_ldx4,
|
|
[BPF_LDX | BPF_MEM | BPF_DW] = mem_ldx8,
|
|
[BPF_STX | BPF_MEM | BPF_B] = mem_stx1,
|
|
[BPF_STX | BPF_MEM | BPF_H] = mem_stx2,
|
|
[BPF_STX | BPF_MEM | BPF_W] = mem_stx4,
|
|
[BPF_STX | BPF_MEM | BPF_DW] = mem_stx8,
|
|
[BPF_STX | BPF_ATOMIC | BPF_W] = mem_atomic4,
|
|
[BPF_STX | BPF_ATOMIC | BPF_DW] = mem_atomic8,
|
|
[BPF_ST | BPF_MEM | BPF_B] = mem_st1,
|
|
[BPF_ST | BPF_MEM | BPF_H] = mem_st2,
|
|
[BPF_ST | BPF_MEM | BPF_W] = mem_st4,
|
|
[BPF_ST | BPF_MEM | BPF_DW] = mem_st8,
|
|
[BPF_JMP | BPF_JA | BPF_K] = jump,
|
|
[BPF_JMP | BPF_JEQ | BPF_K] = jeq_imm,
|
|
[BPF_JMP | BPF_JGT | BPF_K] = cmp_imm,
|
|
[BPF_JMP | BPF_JGE | BPF_K] = cmp_imm,
|
|
[BPF_JMP | BPF_JLT | BPF_K] = cmp_imm,
|
|
[BPF_JMP | BPF_JLE | BPF_K] = cmp_imm,
|
|
[BPF_JMP | BPF_JSGT | BPF_K] = cmp_imm,
|
|
[BPF_JMP | BPF_JSGE | BPF_K] = cmp_imm,
|
|
[BPF_JMP | BPF_JSLT | BPF_K] = cmp_imm,
|
|
[BPF_JMP | BPF_JSLE | BPF_K] = cmp_imm,
|
|
[BPF_JMP | BPF_JSET | BPF_K] = jset_imm,
|
|
[BPF_JMP | BPF_JNE | BPF_K] = jne_imm,
|
|
[BPF_JMP | BPF_JEQ | BPF_X] = jeq_reg,
|
|
[BPF_JMP | BPF_JGT | BPF_X] = cmp_reg,
|
|
[BPF_JMP | BPF_JGE | BPF_X] = cmp_reg,
|
|
[BPF_JMP | BPF_JLT | BPF_X] = cmp_reg,
|
|
[BPF_JMP | BPF_JLE | BPF_X] = cmp_reg,
|
|
[BPF_JMP | BPF_JSGT | BPF_X] = cmp_reg,
|
|
[BPF_JMP | BPF_JSGE | BPF_X] = cmp_reg,
|
|
[BPF_JMP | BPF_JSLT | BPF_X] = cmp_reg,
|
|
[BPF_JMP | BPF_JSLE | BPF_X] = cmp_reg,
|
|
[BPF_JMP | BPF_JSET | BPF_X] = jset_reg,
|
|
[BPF_JMP | BPF_JNE | BPF_X] = jne_reg,
|
|
[BPF_JMP32 | BPF_JEQ | BPF_K] = jeq32_imm,
|
|
[BPF_JMP32 | BPF_JGT | BPF_K] = cmp_imm,
|
|
[BPF_JMP32 | BPF_JGE | BPF_K] = cmp_imm,
|
|
[BPF_JMP32 | BPF_JLT | BPF_K] = cmp_imm,
|
|
[BPF_JMP32 | BPF_JLE | BPF_K] = cmp_imm,
|
|
[BPF_JMP32 | BPF_JSGT | BPF_K] =cmp_imm,
|
|
[BPF_JMP32 | BPF_JSGE | BPF_K] =cmp_imm,
|
|
[BPF_JMP32 | BPF_JSLT | BPF_K] =cmp_imm,
|
|
[BPF_JMP32 | BPF_JSLE | BPF_K] =cmp_imm,
|
|
[BPF_JMP32 | BPF_JSET | BPF_K] =jset_imm,
|
|
[BPF_JMP32 | BPF_JNE | BPF_K] = jne_imm,
|
|
[BPF_JMP32 | BPF_JEQ | BPF_X] = jeq_reg,
|
|
[BPF_JMP32 | BPF_JGT | BPF_X] = cmp_reg,
|
|
[BPF_JMP32 | BPF_JGE | BPF_X] = cmp_reg,
|
|
[BPF_JMP32 | BPF_JLT | BPF_X] = cmp_reg,
|
|
[BPF_JMP32 | BPF_JLE | BPF_X] = cmp_reg,
|
|
[BPF_JMP32 | BPF_JSGT | BPF_X] =cmp_reg,
|
|
[BPF_JMP32 | BPF_JSGE | BPF_X] =cmp_reg,
|
|
[BPF_JMP32 | BPF_JSLT | BPF_X] =cmp_reg,
|
|
[BPF_JMP32 | BPF_JSLE | BPF_X] =cmp_reg,
|
|
[BPF_JMP32 | BPF_JSET | BPF_X] =jset_reg,
|
|
[BPF_JMP32 | BPF_JNE | BPF_X] = jne_reg,
|
|
[BPF_JMP | BPF_CALL] = call,
|
|
[BPF_JMP | BPF_EXIT] = jmp_exit,
|
|
};
|
|
|
|
/* --- Assembler logic --- */
|
|
static int
|
|
nfp_fixup_immed_relo(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
|
|
struct nfp_insn_meta *jmp_dst, u32 br_idx)
|
|
{
|
|
if (immed_get_value(nfp_prog->prog[br_idx + 1])) {
|
|
pr_err("BUG: failed to fix up callee register saving\n");
|
|
return -EINVAL;
|
|
}
|
|
|
|
immed_set_value(&nfp_prog->prog[br_idx + 1], jmp_dst->off);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int nfp_fixup_branches(struct nfp_prog *nfp_prog)
|
|
{
|
|
struct nfp_insn_meta *meta, *jmp_dst;
|
|
u32 idx, br_idx;
|
|
int err;
|
|
|
|
list_for_each_entry(meta, &nfp_prog->insns, l) {
|
|
if (meta->flags & FLAG_INSN_SKIP_MASK)
|
|
continue;
|
|
if (!is_mbpf_jmp(meta))
|
|
continue;
|
|
if (meta->insn.code == (BPF_JMP | BPF_EXIT) &&
|
|
!nfp_is_main_function(meta))
|
|
continue;
|
|
if (is_mbpf_helper_call(meta))
|
|
continue;
|
|
|
|
if (list_is_last(&meta->l, &nfp_prog->insns))
|
|
br_idx = nfp_prog->last_bpf_off;
|
|
else
|
|
br_idx = list_next_entry(meta, l)->off - 1;
|
|
|
|
/* For BPF-to-BPF function call, a stack adjustment sequence is
|
|
* generated after the return instruction. Therefore, we must
|
|
* withdraw the length of this sequence to have br_idx pointing
|
|
* to where the "branch" NFP instruction is expected to be.
|
|
*/
|
|
if (is_mbpf_pseudo_call(meta))
|
|
br_idx -= meta->num_insns_after_br;
|
|
|
|
if (!nfp_is_br(nfp_prog->prog[br_idx])) {
|
|
pr_err("Fixup found block not ending in branch %d %02x %016llx!!\n",
|
|
br_idx, meta->insn.code, nfp_prog->prog[br_idx]);
|
|
return -ELOOP;
|
|
}
|
|
|
|
if (meta->insn.code == (BPF_JMP | BPF_EXIT))
|
|
continue;
|
|
|
|
/* Leave special branches for later */
|
|
if (FIELD_GET(OP_RELO_TYPE, nfp_prog->prog[br_idx]) !=
|
|
RELO_BR_REL && !is_mbpf_pseudo_call(meta))
|
|
continue;
|
|
|
|
if (!meta->jmp_dst) {
|
|
pr_err("Non-exit jump doesn't have destination info recorded!!\n");
|
|
return -ELOOP;
|
|
}
|
|
|
|
jmp_dst = meta->jmp_dst;
|
|
|
|
if (jmp_dst->flags & FLAG_INSN_SKIP_PREC_DEPENDENT) {
|
|
pr_err("Branch landing on removed instruction!!\n");
|
|
return -ELOOP;
|
|
}
|
|
|
|
if (is_mbpf_pseudo_call(meta) &&
|
|
nfp_prog->subprog[jmp_dst->subprog_idx].needs_reg_push) {
|
|
err = nfp_fixup_immed_relo(nfp_prog, meta,
|
|
jmp_dst, br_idx);
|
|
if (err)
|
|
return err;
|
|
}
|
|
|
|
if (FIELD_GET(OP_RELO_TYPE, nfp_prog->prog[br_idx]) !=
|
|
RELO_BR_REL)
|
|
continue;
|
|
|
|
for (idx = meta->off; idx <= br_idx; idx++) {
|
|
if (!nfp_is_br(nfp_prog->prog[idx]))
|
|
continue;
|
|
br_set_offset(&nfp_prog->prog[idx], jmp_dst->off);
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void nfp_intro(struct nfp_prog *nfp_prog)
|
|
{
|
|
wrp_immed(nfp_prog, plen_reg(nfp_prog), GENMASK(13, 0));
|
|
emit_alu(nfp_prog, plen_reg(nfp_prog),
|
|
plen_reg(nfp_prog), ALU_OP_AND, pv_len(nfp_prog));
|
|
}
|
|
|
|
static void
|
|
nfp_subprog_prologue(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
/* Save return address into the stack. */
|
|
wrp_mov(nfp_prog, reg_lm(0, 0), ret_reg(nfp_prog));
|
|
}
|
|
|
|
static void
|
|
nfp_start_subprog(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
|
|
{
|
|
unsigned int depth = nfp_prog->subprog[meta->subprog_idx].stack_depth;
|
|
|
|
nfp_prog->stack_frame_depth = round_up(depth, 4);
|
|
nfp_subprog_prologue(nfp_prog, meta);
|
|
}
|
|
|
|
bool nfp_is_subprog_start(struct nfp_insn_meta *meta)
|
|
{
|
|
return meta->flags & FLAG_INSN_IS_SUBPROG_START;
|
|
}
|
|
|
|
static void nfp_outro_tc_da(struct nfp_prog *nfp_prog)
|
|
{
|
|
/* TC direct-action mode:
|
|
* 0,1 ok NOT SUPPORTED[1]
|
|
* 2 drop 0x22 -> drop, count as stat1
|
|
* 4,5 nuke 0x02 -> drop
|
|
* 7 redir 0x44 -> redir, count as stat2
|
|
* * unspec 0x11 -> pass, count as stat0
|
|
*
|
|
* [1] We can't support OK and RECLASSIFY because we can't tell TC
|
|
* the exact decision made. We are forced to support UNSPEC
|
|
* to handle aborts so that's the only one we handle for passing
|
|
* packets up the stack.
|
|
*/
|
|
/* Target for aborts */
|
|
nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog);
|
|
|
|
emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2, RELO_BR_NEXT_PKT);
|
|
|
|
wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS);
|
|
emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x11), SHF_SC_L_SHF, 16);
|
|
|
|
/* Target for normal exits */
|
|
nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog);
|
|
|
|
/* if R0 > 7 jump to abort */
|
|
emit_alu(nfp_prog, reg_none(), reg_imm(7), ALU_OP_SUB, reg_b(0));
|
|
emit_br(nfp_prog, BR_BLO, nfp_prog->tgt_abort, 0);
|
|
wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS);
|
|
|
|
wrp_immed(nfp_prog, reg_b(2), 0x41221211);
|
|
wrp_immed(nfp_prog, reg_b(3), 0x41001211);
|
|
|
|
emit_shf(nfp_prog, reg_a(1),
|
|
reg_none(), SHF_OP_NONE, reg_b(0), SHF_SC_L_SHF, 2);
|
|
|
|
emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0));
|
|
emit_shf(nfp_prog, reg_a(2),
|
|
reg_imm(0xf), SHF_OP_AND, reg_b(2), SHF_SC_R_SHF, 0);
|
|
|
|
emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0));
|
|
emit_shf(nfp_prog, reg_b(2),
|
|
reg_imm(0xf), SHF_OP_AND, reg_b(3), SHF_SC_R_SHF, 0);
|
|
|
|
emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2, RELO_BR_NEXT_PKT);
|
|
|
|
emit_shf(nfp_prog, reg_b(2),
|
|
reg_a(2), SHF_OP_OR, reg_b(2), SHF_SC_L_SHF, 4);
|
|
emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_b(2), SHF_SC_L_SHF, 16);
|
|
}
|
|
|
|
static void nfp_outro_xdp(struct nfp_prog *nfp_prog)
|
|
{
|
|
/* XDP return codes:
|
|
* 0 aborted 0x82 -> drop, count as stat3
|
|
* 1 drop 0x22 -> drop, count as stat1
|
|
* 2 pass 0x11 -> pass, count as stat0
|
|
* 3 tx 0x44 -> redir, count as stat2
|
|
* * unknown 0x82 -> drop, count as stat3
|
|
*/
|
|
/* Target for aborts */
|
|
nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog);
|
|
|
|
emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2, RELO_BR_NEXT_PKT);
|
|
|
|
wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS);
|
|
emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x82), SHF_SC_L_SHF, 16);
|
|
|
|
/* Target for normal exits */
|
|
nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog);
|
|
|
|
/* if R0 > 3 jump to abort */
|
|
emit_alu(nfp_prog, reg_none(), reg_imm(3), ALU_OP_SUB, reg_b(0));
|
|
emit_br(nfp_prog, BR_BLO, nfp_prog->tgt_abort, 0);
|
|
|
|
wrp_immed(nfp_prog, reg_b(2), 0x44112282);
|
|
|
|
emit_shf(nfp_prog, reg_a(1),
|
|
reg_none(), SHF_OP_NONE, reg_b(0), SHF_SC_L_SHF, 3);
|
|
|
|
emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0));
|
|
emit_shf(nfp_prog, reg_b(2),
|
|
reg_imm(0xff), SHF_OP_AND, reg_b(2), SHF_SC_R_SHF, 0);
|
|
|
|
emit_br_relo(nfp_prog, BR_UNC, BR_OFF_RELO, 2, RELO_BR_NEXT_PKT);
|
|
|
|
wrp_mov(nfp_prog, reg_a(0), NFP_BPF_ABI_FLAGS);
|
|
emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_b(2), SHF_SC_L_SHF, 16);
|
|
}
|
|
|
|
static bool nfp_prog_needs_callee_reg_save(struct nfp_prog *nfp_prog)
|
|
{
|
|
unsigned int idx;
|
|
|
|
for (idx = 1; idx < nfp_prog->subprog_cnt; idx++)
|
|
if (nfp_prog->subprog[idx].needs_reg_push)
|
|
return true;
|
|
|
|
return false;
|
|
}
|
|
|
|
static void nfp_push_callee_registers(struct nfp_prog *nfp_prog)
|
|
{
|
|
u8 reg;
|
|
|
|
/* Subroutine: Save all callee saved registers (R6 ~ R9).
|
|
* imm_b() holds the return address.
|
|
*/
|
|
nfp_prog->tgt_call_push_regs = nfp_prog_current_offset(nfp_prog);
|
|
for (reg = BPF_REG_6; reg <= BPF_REG_9; reg++) {
|
|
u8 adj = (reg - BPF_REG_0) * 2;
|
|
u8 idx = (reg - BPF_REG_6) * 2;
|
|
|
|
/* The first slot in the stack frame is used to push the return
|
|
* address in bpf_to_bpf_call(), start just after.
|
|
*/
|
|
wrp_mov(nfp_prog, reg_lm(0, 1 + idx), reg_b(adj));
|
|
|
|
if (reg == BPF_REG_8)
|
|
/* Prepare to jump back, last 3 insns use defer slots */
|
|
emit_rtn(nfp_prog, imm_b(nfp_prog), 3);
|
|
|
|
wrp_mov(nfp_prog, reg_lm(0, 1 + idx + 1), reg_b(adj + 1));
|
|
}
|
|
}
|
|
|
|
static void nfp_pop_callee_registers(struct nfp_prog *nfp_prog)
|
|
{
|
|
u8 reg;
|
|
|
|
/* Subroutine: Restore all callee saved registers (R6 ~ R9).
|
|
* ret_reg() holds the return address.
|
|
*/
|
|
nfp_prog->tgt_call_pop_regs = nfp_prog_current_offset(nfp_prog);
|
|
for (reg = BPF_REG_6; reg <= BPF_REG_9; reg++) {
|
|
u8 adj = (reg - BPF_REG_0) * 2;
|
|
u8 idx = (reg - BPF_REG_6) * 2;
|
|
|
|
/* The first slot in the stack frame holds the return address,
|
|
* start popping just after that.
|
|
*/
|
|
wrp_mov(nfp_prog, reg_both(adj), reg_lm(0, 1 + idx));
|
|
|
|
if (reg == BPF_REG_8)
|
|
/* Prepare to jump back, last 3 insns use defer slots */
|
|
emit_rtn(nfp_prog, ret_reg(nfp_prog), 3);
|
|
|
|
wrp_mov(nfp_prog, reg_both(adj + 1), reg_lm(0, 1 + idx + 1));
|
|
}
|
|
}
|
|
|
|
static void nfp_outro(struct nfp_prog *nfp_prog)
|
|
{
|
|
switch (nfp_prog->type) {
|
|
case BPF_PROG_TYPE_SCHED_CLS:
|
|
nfp_outro_tc_da(nfp_prog);
|
|
break;
|
|
case BPF_PROG_TYPE_XDP:
|
|
nfp_outro_xdp(nfp_prog);
|
|
break;
|
|
default:
|
|
WARN_ON(1);
|
|
}
|
|
|
|
if (!nfp_prog_needs_callee_reg_save(nfp_prog))
|
|
return;
|
|
|
|
nfp_push_callee_registers(nfp_prog);
|
|
nfp_pop_callee_registers(nfp_prog);
|
|
}
|
|
|
|
static int nfp_translate(struct nfp_prog *nfp_prog)
|
|
{
|
|
struct nfp_insn_meta *meta;
|
|
unsigned int depth;
|
|
int err;
|
|
|
|
depth = nfp_prog->subprog[0].stack_depth;
|
|
nfp_prog->stack_frame_depth = round_up(depth, 4);
|
|
|
|
nfp_intro(nfp_prog);
|
|
if (nfp_prog->error)
|
|
return nfp_prog->error;
|
|
|
|
list_for_each_entry(meta, &nfp_prog->insns, l) {
|
|
instr_cb_t cb = instr_cb[meta->insn.code];
|
|
|
|
meta->off = nfp_prog_current_offset(nfp_prog);
|
|
|
|
if (nfp_is_subprog_start(meta)) {
|
|
nfp_start_subprog(nfp_prog, meta);
|
|
if (nfp_prog->error)
|
|
return nfp_prog->error;
|
|
}
|
|
|
|
if (meta->flags & FLAG_INSN_SKIP_MASK) {
|
|
nfp_prog->n_translated++;
|
|
continue;
|
|
}
|
|
|
|
if (nfp_meta_has_prev(nfp_prog, meta) &&
|
|
nfp_meta_prev(meta)->double_cb)
|
|
cb = nfp_meta_prev(meta)->double_cb;
|
|
if (!cb)
|
|
return -ENOENT;
|
|
err = cb(nfp_prog, meta);
|
|
if (err)
|
|
return err;
|
|
if (nfp_prog->error)
|
|
return nfp_prog->error;
|
|
|
|
nfp_prog->n_translated++;
|
|
}
|
|
|
|
nfp_prog->last_bpf_off = nfp_prog_current_offset(nfp_prog) - 1;
|
|
|
|
nfp_outro(nfp_prog);
|
|
if (nfp_prog->error)
|
|
return nfp_prog->error;
|
|
|
|
wrp_nops(nfp_prog, NFP_USTORE_PREFETCH_WINDOW);
|
|
if (nfp_prog->error)
|
|
return nfp_prog->error;
|
|
|
|
return nfp_fixup_branches(nfp_prog);
|
|
}
|
|
|
|
/* --- Optimizations --- */
|
|
static void nfp_bpf_opt_reg_init(struct nfp_prog *nfp_prog)
|
|
{
|
|
struct nfp_insn_meta *meta;
|
|
|
|
list_for_each_entry(meta, &nfp_prog->insns, l) {
|
|
struct bpf_insn insn = meta->insn;
|
|
|
|
/* Programs converted from cBPF start with register xoring */
|
|
if (insn.code == (BPF_ALU64 | BPF_XOR | BPF_X) &&
|
|
insn.src_reg == insn.dst_reg)
|
|
continue;
|
|
|
|
/* Programs start with R6 = R1 but we ignore the skb pointer */
|
|
if (insn.code == (BPF_ALU64 | BPF_MOV | BPF_X) &&
|
|
insn.src_reg == 1 && insn.dst_reg == 6)
|
|
meta->flags |= FLAG_INSN_SKIP_PREC_DEPENDENT;
|
|
|
|
/* Return as soon as something doesn't match */
|
|
if (!(meta->flags & FLAG_INSN_SKIP_MASK))
|
|
return;
|
|
}
|
|
}
|
|
|
|
/* abs(insn.imm) will fit better into unrestricted reg immediate -
|
|
* convert add/sub of a negative number into a sub/add of a positive one.
|
|
*/
|
|
static void nfp_bpf_opt_neg_add_sub(struct nfp_prog *nfp_prog)
|
|
{
|
|
struct nfp_insn_meta *meta;
|
|
|
|
list_for_each_entry(meta, &nfp_prog->insns, l) {
|
|
struct bpf_insn insn = meta->insn;
|
|
|
|
if (meta->flags & FLAG_INSN_SKIP_MASK)
|
|
continue;
|
|
|
|
if (!is_mbpf_alu(meta) && !is_mbpf_jmp(meta))
|
|
continue;
|
|
if (BPF_SRC(insn.code) != BPF_K)
|
|
continue;
|
|
if (insn.imm >= 0)
|
|
continue;
|
|
|
|
if (is_mbpf_jmp(meta)) {
|
|
switch (BPF_OP(insn.code)) {
|
|
case BPF_JGE:
|
|
case BPF_JSGE:
|
|
case BPF_JLT:
|
|
case BPF_JSLT:
|
|
meta->jump_neg_op = true;
|
|
break;
|
|
default:
|
|
continue;
|
|
}
|
|
} else {
|
|
if (BPF_OP(insn.code) == BPF_ADD)
|
|
insn.code = BPF_CLASS(insn.code) | BPF_SUB;
|
|
else if (BPF_OP(insn.code) == BPF_SUB)
|
|
insn.code = BPF_CLASS(insn.code) | BPF_ADD;
|
|
else
|
|
continue;
|
|
|
|
meta->insn.code = insn.code | BPF_K;
|
|
}
|
|
|
|
meta->insn.imm = -insn.imm;
|
|
}
|
|
}
|
|
|
|
/* Remove masking after load since our load guarantees this is not needed */
|
|
static void nfp_bpf_opt_ld_mask(struct nfp_prog *nfp_prog)
|
|
{
|
|
struct nfp_insn_meta *meta1, *meta2;
|
|
static const s32 exp_mask[] = {
|
|
[BPF_B] = 0x000000ffU,
|
|
[BPF_H] = 0x0000ffffU,
|
|
[BPF_W] = 0xffffffffU,
|
|
};
|
|
|
|
nfp_for_each_insn_walk2(nfp_prog, meta1, meta2) {
|
|
struct bpf_insn insn, next;
|
|
|
|
insn = meta1->insn;
|
|
next = meta2->insn;
|
|
|
|
if (BPF_CLASS(insn.code) != BPF_LD)
|
|
continue;
|
|
if (BPF_MODE(insn.code) != BPF_ABS &&
|
|
BPF_MODE(insn.code) != BPF_IND)
|
|
continue;
|
|
|
|
if (next.code != (BPF_ALU64 | BPF_AND | BPF_K))
|
|
continue;
|
|
|
|
if (!exp_mask[BPF_SIZE(insn.code)])
|
|
continue;
|
|
if (exp_mask[BPF_SIZE(insn.code)] != next.imm)
|
|
continue;
|
|
|
|
if (next.src_reg || next.dst_reg)
|
|
continue;
|
|
|
|
if (meta2->flags & FLAG_INSN_IS_JUMP_DST)
|
|
continue;
|
|
|
|
meta2->flags |= FLAG_INSN_SKIP_PREC_DEPENDENT;
|
|
}
|
|
}
|
|
|
|
static void nfp_bpf_opt_ld_shift(struct nfp_prog *nfp_prog)
|
|
{
|
|
struct nfp_insn_meta *meta1, *meta2, *meta3;
|
|
|
|
nfp_for_each_insn_walk3(nfp_prog, meta1, meta2, meta3) {
|
|
struct bpf_insn insn, next1, next2;
|
|
|
|
insn = meta1->insn;
|
|
next1 = meta2->insn;
|
|
next2 = meta3->insn;
|
|
|
|
if (BPF_CLASS(insn.code) != BPF_LD)
|
|
continue;
|
|
if (BPF_MODE(insn.code) != BPF_ABS &&
|
|
BPF_MODE(insn.code) != BPF_IND)
|
|
continue;
|
|
if (BPF_SIZE(insn.code) != BPF_W)
|
|
continue;
|
|
|
|
if (!(next1.code == (BPF_LSH | BPF_K | BPF_ALU64) &&
|
|
next2.code == (BPF_RSH | BPF_K | BPF_ALU64)) &&
|
|
!(next1.code == (BPF_RSH | BPF_K | BPF_ALU64) &&
|
|
next2.code == (BPF_LSH | BPF_K | BPF_ALU64)))
|
|
continue;
|
|
|
|
if (next1.src_reg || next1.dst_reg ||
|
|
next2.src_reg || next2.dst_reg)
|
|
continue;
|
|
|
|
if (next1.imm != 0x20 || next2.imm != 0x20)
|
|
continue;
|
|
|
|
if (meta2->flags & FLAG_INSN_IS_JUMP_DST ||
|
|
meta3->flags & FLAG_INSN_IS_JUMP_DST)
|
|
continue;
|
|
|
|
meta2->flags |= FLAG_INSN_SKIP_PREC_DEPENDENT;
|
|
meta3->flags |= FLAG_INSN_SKIP_PREC_DEPENDENT;
|
|
}
|
|
}
|
|
|
|
/* load/store pair that forms memory copy sould look like the following:
|
|
*
|
|
* ld_width R, [addr_src + offset_src]
|
|
* st_width [addr_dest + offset_dest], R
|
|
*
|
|
* The destination register of load and source register of store should
|
|
* be the same, load and store should also perform at the same width.
|
|
* If either of addr_src or addr_dest is stack pointer, we don't do the
|
|
* CPP optimization as stack is modelled by registers on NFP.
|
|
*/
|
|
static bool
|
|
curr_pair_is_memcpy(struct nfp_insn_meta *ld_meta,
|
|
struct nfp_insn_meta *st_meta)
|
|
{
|
|
struct bpf_insn *ld = &ld_meta->insn;
|
|
struct bpf_insn *st = &st_meta->insn;
|
|
|
|
if (!is_mbpf_load(ld_meta) || !is_mbpf_store(st_meta))
|
|
return false;
|
|
|
|
if (ld_meta->ptr.type != PTR_TO_PACKET &&
|
|
ld_meta->ptr.type != PTR_TO_MAP_VALUE)
|
|
return false;
|
|
|
|
if (st_meta->ptr.type != PTR_TO_PACKET)
|
|
return false;
|
|
|
|
if (BPF_SIZE(ld->code) != BPF_SIZE(st->code))
|
|
return false;
|
|
|
|
if (ld->dst_reg != st->src_reg)
|
|
return false;
|
|
|
|
/* There is jump to the store insn in this pair. */
|
|
if (st_meta->flags & FLAG_INSN_IS_JUMP_DST)
|
|
return false;
|
|
|
|
return true;
|
|
}
|
|
|
|
/* Currently, we only support chaining load/store pairs if:
|
|
*
|
|
* - Their address base registers are the same.
|
|
* - Their address offsets are in the same order.
|
|
* - They operate at the same memory width.
|
|
* - There is no jump into the middle of them.
|
|
*/
|
|
static bool
|
|
curr_pair_chain_with_previous(struct nfp_insn_meta *ld_meta,
|
|
struct nfp_insn_meta *st_meta,
|
|
struct bpf_insn *prev_ld,
|
|
struct bpf_insn *prev_st)
|
|
{
|
|
u8 prev_size, curr_size, prev_ld_base, prev_st_base, prev_ld_dst;
|
|
struct bpf_insn *ld = &ld_meta->insn;
|
|
struct bpf_insn *st = &st_meta->insn;
|
|
s16 prev_ld_off, prev_st_off;
|
|
|
|
/* This pair is the start pair. */
|
|
if (!prev_ld)
|
|
return true;
|
|
|
|
prev_size = BPF_LDST_BYTES(prev_ld);
|
|
curr_size = BPF_LDST_BYTES(ld);
|
|
prev_ld_base = prev_ld->src_reg;
|
|
prev_st_base = prev_st->dst_reg;
|
|
prev_ld_dst = prev_ld->dst_reg;
|
|
prev_ld_off = prev_ld->off;
|
|
prev_st_off = prev_st->off;
|
|
|
|
if (ld->dst_reg != prev_ld_dst)
|
|
return false;
|
|
|
|
if (ld->src_reg != prev_ld_base || st->dst_reg != prev_st_base)
|
|
return false;
|
|
|
|
if (curr_size != prev_size)
|
|
return false;
|
|
|
|
/* There is jump to the head of this pair. */
|
|
if (ld_meta->flags & FLAG_INSN_IS_JUMP_DST)
|
|
return false;
|
|
|
|
/* Both in ascending order. */
|
|
if (prev_ld_off + prev_size == ld->off &&
|
|
prev_st_off + prev_size == st->off)
|
|
return true;
|
|
|
|
/* Both in descending order. */
|
|
if (ld->off + curr_size == prev_ld_off &&
|
|
st->off + curr_size == prev_st_off)
|
|
return true;
|
|
|
|
return false;
|
|
}
|
|
|
|
/* Return TRUE if cross memory access happens. Cross memory access means
|
|
* store area is overlapping with load area that a later load might load
|
|
* the value from previous store, for this case we can't treat the sequence
|
|
* as an memory copy.
|
|
*/
|
|
static bool
|
|
cross_mem_access(struct bpf_insn *ld, struct nfp_insn_meta *head_ld_meta,
|
|
struct nfp_insn_meta *head_st_meta)
|
|
{
|
|
s16 head_ld_off, head_st_off, ld_off;
|
|
|
|
/* Different pointer types does not overlap. */
|
|
if (head_ld_meta->ptr.type != head_st_meta->ptr.type)
|
|
return false;
|
|
|
|
/* load and store are both PTR_TO_PACKET, check ID info. */
|
|
if (head_ld_meta->ptr.id != head_st_meta->ptr.id)
|
|
return true;
|
|
|
|
/* Canonicalize the offsets. Turn all of them against the original
|
|
* base register.
|
|
*/
|
|
head_ld_off = head_ld_meta->insn.off + head_ld_meta->ptr.off;
|
|
head_st_off = head_st_meta->insn.off + head_st_meta->ptr.off;
|
|
ld_off = ld->off + head_ld_meta->ptr.off;
|
|
|
|
/* Ascending order cross. */
|
|
if (ld_off > head_ld_off &&
|
|
head_ld_off < head_st_off && ld_off >= head_st_off)
|
|
return true;
|
|
|
|
/* Descending order cross. */
|
|
if (ld_off < head_ld_off &&
|
|
head_ld_off > head_st_off && ld_off <= head_st_off)
|
|
return true;
|
|
|
|
return false;
|
|
}
|
|
|
|
/* This pass try to identify the following instructoin sequences.
|
|
*
|
|
* load R, [regA + offA]
|
|
* store [regB + offB], R
|
|
* load R, [regA + offA + const_imm_A]
|
|
* store [regB + offB + const_imm_A], R
|
|
* load R, [regA + offA + 2 * const_imm_A]
|
|
* store [regB + offB + 2 * const_imm_A], R
|
|
* ...
|
|
*
|
|
* Above sequence is typically generated by compiler when lowering
|
|
* memcpy. NFP prefer using CPP instructions to accelerate it.
|
|
*/
|
|
static void nfp_bpf_opt_ldst_gather(struct nfp_prog *nfp_prog)
|
|
{
|
|
struct nfp_insn_meta *head_ld_meta = NULL;
|
|
struct nfp_insn_meta *head_st_meta = NULL;
|
|
struct nfp_insn_meta *meta1, *meta2;
|
|
struct bpf_insn *prev_ld = NULL;
|
|
struct bpf_insn *prev_st = NULL;
|
|
u8 count = 0;
|
|
|
|
nfp_for_each_insn_walk2(nfp_prog, meta1, meta2) {
|
|
struct bpf_insn *ld = &meta1->insn;
|
|
struct bpf_insn *st = &meta2->insn;
|
|
|
|
/* Reset record status if any of the following if true:
|
|
* - The current insn pair is not load/store.
|
|
* - The load/store pair doesn't chain with previous one.
|
|
* - The chained load/store pair crossed with previous pair.
|
|
* - The chained load/store pair has a total size of memory
|
|
* copy beyond 128 bytes which is the maximum length a
|
|
* single NFP CPP command can transfer.
|
|
*/
|
|
if (!curr_pair_is_memcpy(meta1, meta2) ||
|
|
!curr_pair_chain_with_previous(meta1, meta2, prev_ld,
|
|
prev_st) ||
|
|
(head_ld_meta && (cross_mem_access(ld, head_ld_meta,
|
|
head_st_meta) ||
|
|
head_ld_meta->ldst_gather_len >= 128))) {
|
|
if (!count)
|
|
continue;
|
|
|
|
if (count > 1) {
|
|
s16 prev_ld_off = prev_ld->off;
|
|
s16 prev_st_off = prev_st->off;
|
|
s16 head_ld_off = head_ld_meta->insn.off;
|
|
|
|
if (prev_ld_off < head_ld_off) {
|
|
head_ld_meta->insn.off = prev_ld_off;
|
|
head_st_meta->insn.off = prev_st_off;
|
|
head_ld_meta->ldst_gather_len =
|
|
-head_ld_meta->ldst_gather_len;
|
|
}
|
|
|
|
head_ld_meta->paired_st = &head_st_meta->insn;
|
|
head_st_meta->flags |=
|
|
FLAG_INSN_SKIP_PREC_DEPENDENT;
|
|
} else {
|
|
head_ld_meta->ldst_gather_len = 0;
|
|
}
|
|
|
|
/* If the chain is ended by an load/store pair then this
|
|
* could serve as the new head of the next chain.
|
|
*/
|
|
if (curr_pair_is_memcpy(meta1, meta2)) {
|
|
head_ld_meta = meta1;
|
|
head_st_meta = meta2;
|
|
head_ld_meta->ldst_gather_len =
|
|
BPF_LDST_BYTES(ld);
|
|
meta1 = nfp_meta_next(meta1);
|
|
meta2 = nfp_meta_next(meta2);
|
|
prev_ld = ld;
|
|
prev_st = st;
|
|
count = 1;
|
|
} else {
|
|
head_ld_meta = NULL;
|
|
head_st_meta = NULL;
|
|
prev_ld = NULL;
|
|
prev_st = NULL;
|
|
count = 0;
|
|
}
|
|
|
|
continue;
|
|
}
|
|
|
|
if (!head_ld_meta) {
|
|
head_ld_meta = meta1;
|
|
head_st_meta = meta2;
|
|
} else {
|
|
meta1->flags |= FLAG_INSN_SKIP_PREC_DEPENDENT;
|
|
meta2->flags |= FLAG_INSN_SKIP_PREC_DEPENDENT;
|
|
}
|
|
|
|
head_ld_meta->ldst_gather_len += BPF_LDST_BYTES(ld);
|
|
meta1 = nfp_meta_next(meta1);
|
|
meta2 = nfp_meta_next(meta2);
|
|
prev_ld = ld;
|
|
prev_st = st;
|
|
count++;
|
|
}
|
|
}
|
|
|
|
static void nfp_bpf_opt_pkt_cache(struct nfp_prog *nfp_prog)
|
|
{
|
|
struct nfp_insn_meta *meta, *range_node = NULL;
|
|
s16 range_start = 0, range_end = 0;
|
|
bool cache_avail = false;
|
|
struct bpf_insn *insn;
|
|
s32 range_ptr_off = 0;
|
|
u32 range_ptr_id = 0;
|
|
|
|
list_for_each_entry(meta, &nfp_prog->insns, l) {
|
|
if (meta->flags & FLAG_INSN_IS_JUMP_DST)
|
|
cache_avail = false;
|
|
|
|
if (meta->flags & FLAG_INSN_SKIP_MASK)
|
|
continue;
|
|
|
|
insn = &meta->insn;
|
|
|
|
if (is_mbpf_store_pkt(meta) ||
|
|
insn->code == (BPF_JMP | BPF_CALL) ||
|
|
is_mbpf_classic_store_pkt(meta) ||
|
|
is_mbpf_classic_load(meta)) {
|
|
cache_avail = false;
|
|
continue;
|
|
}
|
|
|
|
if (!is_mbpf_load(meta))
|
|
continue;
|
|
|
|
if (meta->ptr.type != PTR_TO_PACKET || meta->ldst_gather_len) {
|
|
cache_avail = false;
|
|
continue;
|
|
}
|
|
|
|
if (!cache_avail) {
|
|
cache_avail = true;
|
|
if (range_node)
|
|
goto end_current_then_start_new;
|
|
goto start_new;
|
|
}
|
|
|
|
/* Check ID to make sure two reads share the same
|
|
* variable offset against PTR_TO_PACKET, and check OFF
|
|
* to make sure they also share the same constant
|
|
* offset.
|
|
*
|
|
* OFFs don't really need to be the same, because they
|
|
* are the constant offsets against PTR_TO_PACKET, so
|
|
* for different OFFs, we could canonicalize them to
|
|
* offsets against original packet pointer. We don't
|
|
* support this.
|
|
*/
|
|
if (meta->ptr.id == range_ptr_id &&
|
|
meta->ptr.off == range_ptr_off) {
|
|
s16 new_start = range_start;
|
|
s16 end, off = insn->off;
|
|
s16 new_end = range_end;
|
|
bool changed = false;
|
|
|
|
if (off < range_start) {
|
|
new_start = off;
|
|
changed = true;
|
|
}
|
|
|
|
end = off + BPF_LDST_BYTES(insn);
|
|
if (end > range_end) {
|
|
new_end = end;
|
|
changed = true;
|
|
}
|
|
|
|
if (!changed)
|
|
continue;
|
|
|
|
if (new_end - new_start <= 64) {
|
|
/* Install new range. */
|
|
range_start = new_start;
|
|
range_end = new_end;
|
|
continue;
|
|
}
|
|
}
|
|
|
|
end_current_then_start_new:
|
|
range_node->pkt_cache.range_start = range_start;
|
|
range_node->pkt_cache.range_end = range_end;
|
|
start_new:
|
|
range_node = meta;
|
|
range_node->pkt_cache.do_init = true;
|
|
range_ptr_id = range_node->ptr.id;
|
|
range_ptr_off = range_node->ptr.off;
|
|
range_start = insn->off;
|
|
range_end = insn->off + BPF_LDST_BYTES(insn);
|
|
}
|
|
|
|
if (range_node) {
|
|
range_node->pkt_cache.range_start = range_start;
|
|
range_node->pkt_cache.range_end = range_end;
|
|
}
|
|
|
|
list_for_each_entry(meta, &nfp_prog->insns, l) {
|
|
if (meta->flags & FLAG_INSN_SKIP_MASK)
|
|
continue;
|
|
|
|
if (is_mbpf_load_pkt(meta) && !meta->ldst_gather_len) {
|
|
if (meta->pkt_cache.do_init) {
|
|
range_start = meta->pkt_cache.range_start;
|
|
range_end = meta->pkt_cache.range_end;
|
|
} else {
|
|
meta->pkt_cache.range_start = range_start;
|
|
meta->pkt_cache.range_end = range_end;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
static int nfp_bpf_optimize(struct nfp_prog *nfp_prog)
|
|
{
|
|
nfp_bpf_opt_reg_init(nfp_prog);
|
|
|
|
nfp_bpf_opt_neg_add_sub(nfp_prog);
|
|
nfp_bpf_opt_ld_mask(nfp_prog);
|
|
nfp_bpf_opt_ld_shift(nfp_prog);
|
|
nfp_bpf_opt_ldst_gather(nfp_prog);
|
|
nfp_bpf_opt_pkt_cache(nfp_prog);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int nfp_bpf_replace_map_ptrs(struct nfp_prog *nfp_prog)
|
|
{
|
|
struct nfp_insn_meta *meta1, *meta2;
|
|
struct nfp_bpf_map *nfp_map;
|
|
struct bpf_map *map;
|
|
u32 id;
|
|
|
|
nfp_for_each_insn_walk2(nfp_prog, meta1, meta2) {
|
|
if (meta1->flags & FLAG_INSN_SKIP_MASK ||
|
|
meta2->flags & FLAG_INSN_SKIP_MASK)
|
|
continue;
|
|
|
|
if (meta1->insn.code != (BPF_LD | BPF_IMM | BPF_DW) ||
|
|
meta1->insn.src_reg != BPF_PSEUDO_MAP_FD)
|
|
continue;
|
|
|
|
map = (void *)(unsigned long)((u32)meta1->insn.imm |
|
|
(u64)meta2->insn.imm << 32);
|
|
if (bpf_map_offload_neutral(map)) {
|
|
id = map->id;
|
|
} else {
|
|
nfp_map = map_to_offmap(map)->dev_priv;
|
|
id = nfp_map->tid;
|
|
}
|
|
|
|
meta1->insn.imm = id;
|
|
meta2->insn.imm = 0;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int nfp_bpf_ustore_calc(u64 *prog, unsigned int len)
|
|
{
|
|
__le64 *ustore = (__force __le64 *)prog;
|
|
int i;
|
|
|
|
for (i = 0; i < len; i++) {
|
|
int err;
|
|
|
|
err = nfp_ustore_check_valid_no_ecc(prog[i]);
|
|
if (err)
|
|
return err;
|
|
|
|
ustore[i] = cpu_to_le64(nfp_ustore_calc_ecc_insn(prog[i]));
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void nfp_bpf_prog_trim(struct nfp_prog *nfp_prog)
|
|
{
|
|
void *prog;
|
|
|
|
prog = kvmalloc_array(nfp_prog->prog_len, sizeof(u64), GFP_KERNEL);
|
|
if (!prog)
|
|
return;
|
|
|
|
nfp_prog->__prog_alloc_len = nfp_prog->prog_len * sizeof(u64);
|
|
memcpy(prog, nfp_prog->prog, nfp_prog->__prog_alloc_len);
|
|
kvfree(nfp_prog->prog);
|
|
nfp_prog->prog = prog;
|
|
}
|
|
|
|
int nfp_bpf_jit(struct nfp_prog *nfp_prog)
|
|
{
|
|
int ret;
|
|
|
|
ret = nfp_bpf_replace_map_ptrs(nfp_prog);
|
|
if (ret)
|
|
return ret;
|
|
|
|
ret = nfp_bpf_optimize(nfp_prog);
|
|
if (ret)
|
|
return ret;
|
|
|
|
ret = nfp_translate(nfp_prog);
|
|
if (ret) {
|
|
pr_err("Translation failed with error %d (translated: %u)\n",
|
|
ret, nfp_prog->n_translated);
|
|
return -EINVAL;
|
|
}
|
|
|
|
nfp_bpf_prog_trim(nfp_prog);
|
|
|
|
return ret;
|
|
}
|
|
|
|
void nfp_bpf_jit_prepare(struct nfp_prog *nfp_prog)
|
|
{
|
|
struct nfp_insn_meta *meta;
|
|
|
|
/* Another pass to record jump information. */
|
|
list_for_each_entry(meta, &nfp_prog->insns, l) {
|
|
struct nfp_insn_meta *dst_meta;
|
|
u64 code = meta->insn.code;
|
|
unsigned int dst_idx;
|
|
bool pseudo_call;
|
|
|
|
if (!is_mbpf_jmp(meta))
|
|
continue;
|
|
if (BPF_OP(code) == BPF_EXIT)
|
|
continue;
|
|
if (is_mbpf_helper_call(meta))
|
|
continue;
|
|
|
|
/* If opcode is BPF_CALL at this point, this can only be a
|
|
* BPF-to-BPF call (a.k.a pseudo call).
|
|
*/
|
|
pseudo_call = BPF_OP(code) == BPF_CALL;
|
|
|
|
if (pseudo_call)
|
|
dst_idx = meta->n + 1 + meta->insn.imm;
|
|
else
|
|
dst_idx = meta->n + 1 + meta->insn.off;
|
|
|
|
dst_meta = nfp_bpf_goto_meta(nfp_prog, meta, dst_idx);
|
|
|
|
if (pseudo_call)
|
|
dst_meta->flags |= FLAG_INSN_IS_SUBPROG_START;
|
|
|
|
dst_meta->flags |= FLAG_INSN_IS_JUMP_DST;
|
|
meta->jmp_dst = dst_meta;
|
|
}
|
|
}
|
|
|
|
bool nfp_bpf_supported_opcode(u8 code)
|
|
{
|
|
return !!instr_cb[code];
|
|
}
|
|
|
|
void *nfp_bpf_relo_for_vnic(struct nfp_prog *nfp_prog, struct nfp_bpf_vnic *bv)
|
|
{
|
|
unsigned int i;
|
|
u64 *prog;
|
|
int err;
|
|
|
|
prog = kmemdup(nfp_prog->prog, nfp_prog->prog_len * sizeof(u64),
|
|
GFP_KERNEL);
|
|
if (!prog)
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
for (i = 0; i < nfp_prog->prog_len; i++) {
|
|
enum nfp_relo_type special;
|
|
u32 val;
|
|
u16 off;
|
|
|
|
special = FIELD_GET(OP_RELO_TYPE, prog[i]);
|
|
switch (special) {
|
|
case RELO_NONE:
|
|
continue;
|
|
case RELO_BR_REL:
|
|
br_add_offset(&prog[i], bv->start_off);
|
|
break;
|
|
case RELO_BR_GO_OUT:
|
|
br_set_offset(&prog[i],
|
|
nfp_prog->tgt_out + bv->start_off);
|
|
break;
|
|
case RELO_BR_GO_ABORT:
|
|
br_set_offset(&prog[i],
|
|
nfp_prog->tgt_abort + bv->start_off);
|
|
break;
|
|
case RELO_BR_GO_CALL_PUSH_REGS:
|
|
if (!nfp_prog->tgt_call_push_regs) {
|
|
pr_err("BUG: failed to detect subprogram registers needs\n");
|
|
err = -EINVAL;
|
|
goto err_free_prog;
|
|
}
|
|
off = nfp_prog->tgt_call_push_regs + bv->start_off;
|
|
br_set_offset(&prog[i], off);
|
|
break;
|
|
case RELO_BR_GO_CALL_POP_REGS:
|
|
if (!nfp_prog->tgt_call_pop_regs) {
|
|
pr_err("BUG: failed to detect subprogram registers needs\n");
|
|
err = -EINVAL;
|
|
goto err_free_prog;
|
|
}
|
|
off = nfp_prog->tgt_call_pop_regs + bv->start_off;
|
|
br_set_offset(&prog[i], off);
|
|
break;
|
|
case RELO_BR_NEXT_PKT:
|
|
br_set_offset(&prog[i], bv->tgt_done);
|
|
break;
|
|
case RELO_BR_HELPER:
|
|
val = br_get_offset(prog[i]);
|
|
val -= BR_OFF_RELO;
|
|
switch (val) {
|
|
case BPF_FUNC_map_lookup_elem:
|
|
val = nfp_prog->bpf->helpers.map_lookup;
|
|
break;
|
|
case BPF_FUNC_map_update_elem:
|
|
val = nfp_prog->bpf->helpers.map_update;
|
|
break;
|
|
case BPF_FUNC_map_delete_elem:
|
|
val = nfp_prog->bpf->helpers.map_delete;
|
|
break;
|
|
case BPF_FUNC_perf_event_output:
|
|
val = nfp_prog->bpf->helpers.perf_event_output;
|
|
break;
|
|
default:
|
|
pr_err("relocation of unknown helper %d\n",
|
|
val);
|
|
err = -EINVAL;
|
|
goto err_free_prog;
|
|
}
|
|
br_set_offset(&prog[i], val);
|
|
break;
|
|
case RELO_IMMED_REL:
|
|
immed_add_value(&prog[i], bv->start_off);
|
|
break;
|
|
}
|
|
|
|
prog[i] &= ~OP_RELO_TYPE;
|
|
}
|
|
|
|
err = nfp_bpf_ustore_calc(prog, nfp_prog->prog_len);
|
|
if (err)
|
|
goto err_free_prog;
|
|
|
|
return prog;
|
|
|
|
err_free_prog:
|
|
kfree(prog);
|
|
return ERR_PTR(err);
|
|
}
|