1 /*
2  * Copyright (C) 2016 Netronome Systems, Inc.
3  *
4  * This software is dual licensed under the GNU General License Version 2,
5  * June 1991 as shown in the file COPYING in the top-level directory of this
6  * source tree or the BSD 2-Clause License provided below.  You have the
7  * option to license this software under the complete terms of either license.
8  *
9  * The BSD 2-Clause License:
10  *
11  *     Redistribution and use in source and binary forms, with or
12  *     without modification, are permitted provided that the following
13  *     conditions are met:
14  *
15  *      1. Redistributions of source code must retain the above
16  *         copyright notice, this list of conditions and the following
17  *         disclaimer.
18  *
19  *      2. Redistributions in binary form must reproduce the above
20  *         copyright notice, this list of conditions and the following
21  *         disclaimer in the documentation and/or other materials
22  *         provided with the distribution.
23  *
24  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
25  * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
26  * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
27  * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
28  * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
29  * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
30  * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
31  * SOFTWARE.
32  */
33 
34 #define pr_fmt(fmt)	"NFP net bpf: " fmt
35 
36 #include <linux/kernel.h>
37 #include <linux/bpf.h>
38 #include <linux/filter.h>
39 #include <linux/pkt_cls.h>
40 #include <linux/unistd.h>
41 
42 #include "main.h"
43 #include "../nfp_asm.h"
44 
45 /* --- NFP prog --- */
46 /* Foreach "multiple" entries macros provide pos and next<n> pointers.
47  * It's safe to modify the next pointers (but not pos).
48  */
49 #define nfp_for_each_insn_walk2(nfp_prog, pos, next)			\
50 	for (pos = list_first_entry(&(nfp_prog)->insns, typeof(*pos), l), \
51 	     next = list_next_entry(pos, l);			\
52 	     &(nfp_prog)->insns != &pos->l &&			\
53 	     &(nfp_prog)->insns != &next->l;			\
54 	     pos = nfp_meta_next(pos),				\
55 	     next = nfp_meta_next(pos))
56 
57 #define nfp_for_each_insn_walk3(nfp_prog, pos, next, next2)		\
58 	for (pos = list_first_entry(&(nfp_prog)->insns, typeof(*pos), l), \
59 	     next = list_next_entry(pos, l),			\
60 	     next2 = list_next_entry(next, l);			\
61 	     &(nfp_prog)->insns != &pos->l &&			\
62 	     &(nfp_prog)->insns != &next->l &&			\
63 	     &(nfp_prog)->insns != &next2->l;			\
64 	     pos = nfp_meta_next(pos),				\
65 	     next = nfp_meta_next(pos),				\
66 	     next2 = nfp_meta_next(next))
67 
68 static bool
69 nfp_meta_has_next(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
70 {
71 	return meta->l.next != &nfp_prog->insns;
72 }
73 
74 static bool
75 nfp_meta_has_prev(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
76 {
77 	return meta->l.prev != &nfp_prog->insns;
78 }
79 
80 static void nfp_prog_free(struct nfp_prog *nfp_prog)
81 {
82 	struct nfp_insn_meta *meta, *tmp;
83 
84 	list_for_each_entry_safe(meta, tmp, &nfp_prog->insns, l) {
85 		list_del(&meta->l);
86 		kfree(meta);
87 	}
88 	kfree(nfp_prog);
89 }
90 
91 static void nfp_prog_push(struct nfp_prog *nfp_prog, u64 insn)
92 {
93 	if (nfp_prog->__prog_alloc_len == nfp_prog->prog_len) {
94 		nfp_prog->error = -ENOSPC;
95 		return;
96 	}
97 
98 	nfp_prog->prog[nfp_prog->prog_len] = insn;
99 	nfp_prog->prog_len++;
100 }
101 
102 static unsigned int nfp_prog_current_offset(struct nfp_prog *nfp_prog)
103 {
104 	return nfp_prog->start_off + nfp_prog->prog_len;
105 }
106 
107 static unsigned int
108 nfp_prog_offset_to_index(struct nfp_prog *nfp_prog, unsigned int offset)
109 {
110 	return offset - nfp_prog->start_off;
111 }
112 
113 /* --- Emitters --- */
114 static void
115 __emit_cmd(struct nfp_prog *nfp_prog, enum cmd_tgt_map op,
116 	   u8 mode, u8 xfer, u8 areg, u8 breg, u8 size, bool sync)
117 {
118 	enum cmd_ctx_swap ctx;
119 	u64 insn;
120 
121 	if (sync)
122 		ctx = CMD_CTX_SWAP;
123 	else
124 		ctx = CMD_CTX_NO_SWAP;
125 
126 	insn =	FIELD_PREP(OP_CMD_A_SRC, areg) |
127 		FIELD_PREP(OP_CMD_CTX, ctx) |
128 		FIELD_PREP(OP_CMD_B_SRC, breg) |
129 		FIELD_PREP(OP_CMD_TOKEN, cmd_tgt_act[op].token) |
130 		FIELD_PREP(OP_CMD_XFER, xfer) |
131 		FIELD_PREP(OP_CMD_CNT, size) |
132 		FIELD_PREP(OP_CMD_SIG, sync) |
133 		FIELD_PREP(OP_CMD_TGT_CMD, cmd_tgt_act[op].tgt_cmd) |
134 		FIELD_PREP(OP_CMD_MODE, mode);
135 
136 	nfp_prog_push(nfp_prog, insn);
137 }
138 
139 static void
140 emit_cmd(struct nfp_prog *nfp_prog, enum cmd_tgt_map op,
141 	 u8 mode, u8 xfer, swreg lreg, swreg rreg, u8 size, bool sync)
142 {
143 	struct nfp_insn_re_regs reg;
144 	int err;
145 
146 	err = swreg_to_restricted(reg_none(), lreg, rreg, &reg, false);
147 	if (err) {
148 		nfp_prog->error = err;
149 		return;
150 	}
151 	if (reg.swap) {
152 		pr_err("cmd can't swap arguments\n");
153 		nfp_prog->error = -EFAULT;
154 		return;
155 	}
156 
157 	__emit_cmd(nfp_prog, op, mode, xfer, reg.areg, reg.breg, size, sync);
158 }
159 
160 static void
161 __emit_br(struct nfp_prog *nfp_prog, enum br_mask mask, enum br_ev_pip ev_pip,
162 	  enum br_ctx_signal_state css, u16 addr, u8 defer)
163 {
164 	u16 addr_lo, addr_hi;
165 	u64 insn;
166 
167 	addr_lo = addr & (OP_BR_ADDR_LO >> __bf_shf(OP_BR_ADDR_LO));
168 	addr_hi = addr != addr_lo;
169 
170 	insn = OP_BR_BASE |
171 		FIELD_PREP(OP_BR_MASK, mask) |
172 		FIELD_PREP(OP_BR_EV_PIP, ev_pip) |
173 		FIELD_PREP(OP_BR_CSS, css) |
174 		FIELD_PREP(OP_BR_DEFBR, defer) |
175 		FIELD_PREP(OP_BR_ADDR_LO, addr_lo) |
176 		FIELD_PREP(OP_BR_ADDR_HI, addr_hi);
177 
178 	nfp_prog_push(nfp_prog, insn);
179 }
180 
181 static void emit_br_def(struct nfp_prog *nfp_prog, u16 addr, u8 defer)
182 {
183 	if (defer > 2) {
184 		pr_err("BUG: branch defer out of bounds %d\n", defer);
185 		nfp_prog->error = -EFAULT;
186 		return;
187 	}
188 	__emit_br(nfp_prog, BR_UNC, BR_EV_PIP_UNCOND, BR_CSS_NONE, addr, defer);
189 }
190 
191 static void
192 emit_br(struct nfp_prog *nfp_prog, enum br_mask mask, u16 addr, u8 defer)
193 {
194 	__emit_br(nfp_prog, mask,
195 		  mask != BR_UNC ? BR_EV_PIP_COND : BR_EV_PIP_UNCOND,
196 		  BR_CSS_NONE, addr, defer);
197 }
198 
199 static void
200 __emit_br_byte(struct nfp_prog *nfp_prog, u8 areg, u8 breg, bool imm8,
201 	       u8 byte, bool equal, u16 addr, u8 defer)
202 {
203 	u16 addr_lo, addr_hi;
204 	u64 insn;
205 
206 	addr_lo = addr & (OP_BB_ADDR_LO >> __bf_shf(OP_BB_ADDR_LO));
207 	addr_hi = addr != addr_lo;
208 
209 	insn = OP_BBYTE_BASE |
210 		FIELD_PREP(OP_BB_A_SRC, areg) |
211 		FIELD_PREP(OP_BB_BYTE, byte) |
212 		FIELD_PREP(OP_BB_B_SRC, breg) |
213 		FIELD_PREP(OP_BB_I8, imm8) |
214 		FIELD_PREP(OP_BB_EQ, equal) |
215 		FIELD_PREP(OP_BB_DEFBR, defer) |
216 		FIELD_PREP(OP_BB_ADDR_LO, addr_lo) |
217 		FIELD_PREP(OP_BB_ADDR_HI, addr_hi);
218 
219 	nfp_prog_push(nfp_prog, insn);
220 }
221 
222 static void
223 emit_br_byte_neq(struct nfp_prog *nfp_prog,
224 		 swreg dst, u8 imm, u8 byte, u16 addr, u8 defer)
225 {
226 	struct nfp_insn_re_regs reg;
227 	int err;
228 
229 	err = swreg_to_restricted(reg_none(), dst, reg_imm(imm), &reg, true);
230 	if (err) {
231 		nfp_prog->error = err;
232 		return;
233 	}
234 
235 	__emit_br_byte(nfp_prog, reg.areg, reg.breg, reg.i8, byte, false, addr,
236 		       defer);
237 }
238 
239 static void
240 __emit_immed(struct nfp_prog *nfp_prog, u16 areg, u16 breg, u16 imm_hi,
241 	     enum immed_width width, bool invert,
242 	     enum immed_shift shift, bool wr_both)
243 {
244 	u64 insn;
245 
246 	insn = OP_IMMED_BASE |
247 		FIELD_PREP(OP_IMMED_A_SRC, areg) |
248 		FIELD_PREP(OP_IMMED_B_SRC, breg) |
249 		FIELD_PREP(OP_IMMED_IMM, imm_hi) |
250 		FIELD_PREP(OP_IMMED_WIDTH, width) |
251 		FIELD_PREP(OP_IMMED_INV, invert) |
252 		FIELD_PREP(OP_IMMED_SHIFT, shift) |
253 		FIELD_PREP(OP_IMMED_WR_AB, wr_both);
254 
255 	nfp_prog_push(nfp_prog, insn);
256 }
257 
258 static void
259 emit_immed(struct nfp_prog *nfp_prog, swreg dst, u16 imm,
260 	   enum immed_width width, bool invert, enum immed_shift shift)
261 {
262 	struct nfp_insn_ur_regs reg;
263 	int err;
264 
265 	if (swreg_type(dst) == NN_REG_IMM) {
266 		nfp_prog->error = -EFAULT;
267 		return;
268 	}
269 
270 	err = swreg_to_unrestricted(dst, dst, reg_imm(imm & 0xff), &reg);
271 	if (err) {
272 		nfp_prog->error = err;
273 		return;
274 	}
275 
276 	__emit_immed(nfp_prog, reg.areg, reg.breg, imm >> 8, width,
277 		     invert, shift, reg.wr_both);
278 }
279 
280 static void
281 __emit_shf(struct nfp_prog *nfp_prog, u16 dst, enum alu_dst_ab dst_ab,
282 	   enum shf_sc sc, u8 shift,
283 	   u16 areg, enum shf_op op, u16 breg, bool i8, bool sw, bool wr_both)
284 {
285 	u64 insn;
286 
287 	if (!FIELD_FIT(OP_SHF_SHIFT, shift)) {
288 		nfp_prog->error = -EFAULT;
289 		return;
290 	}
291 
292 	if (sc == SHF_SC_L_SHF)
293 		shift = 32 - shift;
294 
295 	insn = OP_SHF_BASE |
296 		FIELD_PREP(OP_SHF_A_SRC, areg) |
297 		FIELD_PREP(OP_SHF_SC, sc) |
298 		FIELD_PREP(OP_SHF_B_SRC, breg) |
299 		FIELD_PREP(OP_SHF_I8, i8) |
300 		FIELD_PREP(OP_SHF_SW, sw) |
301 		FIELD_PREP(OP_SHF_DST, dst) |
302 		FIELD_PREP(OP_SHF_SHIFT, shift) |
303 		FIELD_PREP(OP_SHF_OP, op) |
304 		FIELD_PREP(OP_SHF_DST_AB, dst_ab) |
305 		FIELD_PREP(OP_SHF_WR_AB, wr_both);
306 
307 	nfp_prog_push(nfp_prog, insn);
308 }
309 
310 static void
311 emit_shf(struct nfp_prog *nfp_prog, swreg dst,
312 	 swreg lreg, enum shf_op op, swreg rreg, enum shf_sc sc, u8 shift)
313 {
314 	struct nfp_insn_re_regs reg;
315 	int err;
316 
317 	err = swreg_to_restricted(dst, lreg, rreg, &reg, true);
318 	if (err) {
319 		nfp_prog->error = err;
320 		return;
321 	}
322 
323 	__emit_shf(nfp_prog, reg.dst, reg.dst_ab, sc, shift,
324 		   reg.areg, op, reg.breg, reg.i8, reg.swap, reg.wr_both);
325 }
326 
327 static void
328 __emit_alu(struct nfp_prog *nfp_prog, u16 dst, enum alu_dst_ab dst_ab,
329 	   u16 areg, enum alu_op op, u16 breg, bool swap, bool wr_both)
330 {
331 	u64 insn;
332 
333 	insn = OP_ALU_BASE |
334 		FIELD_PREP(OP_ALU_A_SRC, areg) |
335 		FIELD_PREP(OP_ALU_B_SRC, breg) |
336 		FIELD_PREP(OP_ALU_DST, dst) |
337 		FIELD_PREP(OP_ALU_SW, swap) |
338 		FIELD_PREP(OP_ALU_OP, op) |
339 		FIELD_PREP(OP_ALU_DST_AB, dst_ab) |
340 		FIELD_PREP(OP_ALU_WR_AB, wr_both);
341 
342 	nfp_prog_push(nfp_prog, insn);
343 }
344 
345 static void
346 emit_alu(struct nfp_prog *nfp_prog, swreg dst,
347 	 swreg lreg, enum alu_op op, swreg rreg)
348 {
349 	struct nfp_insn_ur_regs reg;
350 	int err;
351 
352 	err = swreg_to_unrestricted(dst, lreg, rreg, &reg);
353 	if (err) {
354 		nfp_prog->error = err;
355 		return;
356 	}
357 
358 	__emit_alu(nfp_prog, reg.dst, reg.dst_ab,
359 		   reg.areg, op, reg.breg, reg.swap, reg.wr_both);
360 }
361 
362 static void
363 __emit_ld_field(struct nfp_prog *nfp_prog, enum shf_sc sc,
364 		u8 areg, u8 bmask, u8 breg, u8 shift, bool imm8,
365 		bool zero, bool swap, bool wr_both)
366 {
367 	u64 insn;
368 
369 	insn = OP_LDF_BASE |
370 		FIELD_PREP(OP_LDF_A_SRC, areg) |
371 		FIELD_PREP(OP_LDF_SC, sc) |
372 		FIELD_PREP(OP_LDF_B_SRC, breg) |
373 		FIELD_PREP(OP_LDF_I8, imm8) |
374 		FIELD_PREP(OP_LDF_SW, swap) |
375 		FIELD_PREP(OP_LDF_ZF, zero) |
376 		FIELD_PREP(OP_LDF_BMASK, bmask) |
377 		FIELD_PREP(OP_LDF_SHF, shift) |
378 		FIELD_PREP(OP_LDF_WR_AB, wr_both);
379 
380 	nfp_prog_push(nfp_prog, insn);
381 }
382 
383 static void
384 emit_ld_field_any(struct nfp_prog *nfp_prog, enum shf_sc sc, u8 shift,
385 		  swreg dst, u8 bmask, swreg src, bool zero)
386 {
387 	struct nfp_insn_re_regs reg;
388 	int err;
389 
390 	err = swreg_to_restricted(reg_none(), dst, src, &reg, true);
391 	if (err) {
392 		nfp_prog->error = err;
393 		return;
394 	}
395 
396 	__emit_ld_field(nfp_prog, sc, reg.areg, bmask, reg.breg, shift,
397 			reg.i8, zero, reg.swap, reg.wr_both);
398 }
399 
400 static void
401 emit_ld_field(struct nfp_prog *nfp_prog, swreg dst, u8 bmask, swreg src,
402 	      enum shf_sc sc, u8 shift)
403 {
404 	emit_ld_field_any(nfp_prog, sc, shift, dst, bmask, src, false);
405 }
406 
407 /* --- Wrappers --- */
408 static bool pack_immed(u32 imm, u16 *val, enum immed_shift *shift)
409 {
410 	if (!(imm & 0xffff0000)) {
411 		*val = imm;
412 		*shift = IMMED_SHIFT_0B;
413 	} else if (!(imm & 0xff0000ff)) {
414 		*val = imm >> 8;
415 		*shift = IMMED_SHIFT_1B;
416 	} else if (!(imm & 0x0000ffff)) {
417 		*val = imm >> 16;
418 		*shift = IMMED_SHIFT_2B;
419 	} else {
420 		return false;
421 	}
422 
423 	return true;
424 }
425 
426 static void wrp_immed(struct nfp_prog *nfp_prog, swreg dst, u32 imm)
427 {
428 	enum immed_shift shift;
429 	u16 val;
430 
431 	if (pack_immed(imm, &val, &shift)) {
432 		emit_immed(nfp_prog, dst, val, IMMED_WIDTH_ALL, false, shift);
433 	} else if (pack_immed(~imm, &val, &shift)) {
434 		emit_immed(nfp_prog, dst, val, IMMED_WIDTH_ALL, true, shift);
435 	} else {
436 		emit_immed(nfp_prog, dst, imm & 0xffff, IMMED_WIDTH_ALL,
437 			   false, IMMED_SHIFT_0B);
438 		emit_immed(nfp_prog, dst, imm >> 16, IMMED_WIDTH_WORD,
439 			   false, IMMED_SHIFT_2B);
440 	}
441 }
442 
443 /* ur_load_imm_any() - encode immediate or use tmp register (unrestricted)
444  * If the @imm is small enough encode it directly in operand and return
445  * otherwise load @imm to a spare register and return its encoding.
446  */
447 static swreg ur_load_imm_any(struct nfp_prog *nfp_prog, u32 imm, swreg tmp_reg)
448 {
449 	if (FIELD_FIT(UR_REG_IMM_MAX, imm))
450 		return reg_imm(imm);
451 
452 	wrp_immed(nfp_prog, tmp_reg, imm);
453 	return tmp_reg;
454 }
455 
456 /* re_load_imm_any() - encode immediate or use tmp register (restricted)
457  * If the @imm is small enough encode it directly in operand and return
458  * otherwise load @imm to a spare register and return its encoding.
459  */
460 static swreg re_load_imm_any(struct nfp_prog *nfp_prog, u32 imm, swreg tmp_reg)
461 {
462 	if (FIELD_FIT(RE_REG_IMM_MAX, imm))
463 		return reg_imm(imm);
464 
465 	wrp_immed(nfp_prog, tmp_reg, imm);
466 	return tmp_reg;
467 }
468 
469 static void
470 wrp_br_special(struct nfp_prog *nfp_prog, enum br_mask mask,
471 	       enum br_special special)
472 {
473 	emit_br(nfp_prog, mask, 0, 0);
474 
475 	nfp_prog->prog[nfp_prog->prog_len - 1] |=
476 		FIELD_PREP(OP_BR_SPECIAL, special);
477 }
478 
479 static void wrp_reg_mov(struct nfp_prog *nfp_prog, u16 dst, u16 src)
480 {
481 	emit_alu(nfp_prog, reg_both(dst), reg_none(), ALU_OP_NONE, reg_b(src));
482 }
483 
484 static int
485 construct_data_ind_ld(struct nfp_prog *nfp_prog, u16 offset,
486 		      u16 src, bool src_valid, u8 size)
487 {
488 	unsigned int i;
489 	u16 shift, sz;
490 	swreg tmp_reg;
491 
492 	/* We load the value from the address indicated in @offset and then
493 	 * shift out the data we don't need.  Note: this is big endian!
494 	 */
495 	sz = size < 4 ? 4 : size;
496 	shift = size < 4 ? 4 - size : 0;
497 
498 	if (src_valid) {
499 		/* Calculate the true offset (src_reg + imm) */
500 		tmp_reg = ur_load_imm_any(nfp_prog, offset, imm_b(nfp_prog));
501 		emit_alu(nfp_prog, imm_both(nfp_prog),
502 			 reg_a(src), ALU_OP_ADD, tmp_reg);
503 		/* Check packet length (size guaranteed to fit b/c it's u8) */
504 		emit_alu(nfp_prog, imm_a(nfp_prog),
505 			 imm_a(nfp_prog), ALU_OP_ADD, reg_imm(size));
506 		emit_alu(nfp_prog, reg_none(),
507 			 NFP_BPF_ABI_LEN, ALU_OP_SUB, imm_a(nfp_prog));
508 		wrp_br_special(nfp_prog, BR_BLO, OP_BR_GO_ABORT);
509 		/* Load data */
510 		emit_cmd(nfp_prog, CMD_TGT_READ8, CMD_MODE_32b, 0,
511 			 pkt_reg(nfp_prog), imm_b(nfp_prog), sz - 1, true);
512 	} else {
513 		/* Check packet length */
514 		tmp_reg = ur_load_imm_any(nfp_prog, offset + size,
515 					  imm_a(nfp_prog));
516 		emit_alu(nfp_prog, reg_none(),
517 			 NFP_BPF_ABI_LEN, ALU_OP_SUB, tmp_reg);
518 		wrp_br_special(nfp_prog, BR_BLO, OP_BR_GO_ABORT);
519 		/* Load data */
520 		tmp_reg = re_load_imm_any(nfp_prog, offset, imm_b(nfp_prog));
521 		emit_cmd(nfp_prog, CMD_TGT_READ8, CMD_MODE_32b, 0,
522 			 pkt_reg(nfp_prog), tmp_reg, sz - 1, true);
523 	}
524 
525 	i = 0;
526 	if (shift)
527 		emit_shf(nfp_prog, reg_both(0), reg_none(), SHF_OP_NONE,
528 			 reg_xfer(0), SHF_SC_R_SHF, shift * 8);
529 	else
530 		for (; i * 4 < size; i++)
531 			emit_alu(nfp_prog, reg_both(i),
532 				 reg_none(), ALU_OP_NONE, reg_xfer(i));
533 
534 	if (i < 2)
535 		wrp_immed(nfp_prog, reg_both(1), 0);
536 
537 	return 0;
538 }
539 
540 static int construct_data_ld(struct nfp_prog *nfp_prog, u16 offset, u8 size)
541 {
542 	return construct_data_ind_ld(nfp_prog, offset, 0, false, size);
543 }
544 
545 static int wrp_set_mark(struct nfp_prog *nfp_prog, u8 src)
546 {
547 	emit_alu(nfp_prog, NFP_BPF_ABI_MARK,
548 		 reg_none(), ALU_OP_NONE, reg_b(src));
549 	emit_alu(nfp_prog, NFP_BPF_ABI_FLAGS,
550 		 NFP_BPF_ABI_FLAGS, ALU_OP_OR, reg_imm(NFP_BPF_ABI_FLAG_MARK));
551 
552 	return 0;
553 }
554 
555 static void
556 wrp_alu_imm(struct nfp_prog *nfp_prog, u8 dst, enum alu_op alu_op, u32 imm)
557 {
558 	swreg tmp_reg;
559 
560 	if (alu_op == ALU_OP_AND) {
561 		if (!imm)
562 			wrp_immed(nfp_prog, reg_both(dst), 0);
563 		if (!imm || !~imm)
564 			return;
565 	}
566 	if (alu_op == ALU_OP_OR) {
567 		if (!~imm)
568 			wrp_immed(nfp_prog, reg_both(dst), ~0U);
569 		if (!imm || !~imm)
570 			return;
571 	}
572 	if (alu_op == ALU_OP_XOR) {
573 		if (!~imm)
574 			emit_alu(nfp_prog, reg_both(dst), reg_none(),
575 				 ALU_OP_NEG, reg_b(dst));
576 		if (!imm || !~imm)
577 			return;
578 	}
579 
580 	tmp_reg = ur_load_imm_any(nfp_prog, imm, imm_b(nfp_prog));
581 	emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, tmp_reg);
582 }
583 
584 static int
585 wrp_alu64_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
586 	      enum alu_op alu_op, bool skip)
587 {
588 	const struct bpf_insn *insn = &meta->insn;
589 	u64 imm = insn->imm; /* sign extend */
590 
591 	if (skip) {
592 		meta->skip = true;
593 		return 0;
594 	}
595 
596 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, alu_op, imm & ~0U);
597 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, alu_op, imm >> 32);
598 
599 	return 0;
600 }
601 
602 static int
603 wrp_alu64_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
604 	      enum alu_op alu_op)
605 {
606 	u8 dst = meta->insn.dst_reg * 2, src = meta->insn.src_reg * 2;
607 
608 	emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, reg_b(src));
609 	emit_alu(nfp_prog, reg_both(dst + 1),
610 		 reg_a(dst + 1), alu_op, reg_b(src + 1));
611 
612 	return 0;
613 }
614 
615 static int
616 wrp_alu32_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
617 	      enum alu_op alu_op, bool skip)
618 {
619 	const struct bpf_insn *insn = &meta->insn;
620 
621 	if (skip) {
622 		meta->skip = true;
623 		return 0;
624 	}
625 
626 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, alu_op, insn->imm);
627 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
628 
629 	return 0;
630 }
631 
632 static int
633 wrp_alu32_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
634 	      enum alu_op alu_op)
635 {
636 	u8 dst = meta->insn.dst_reg * 2, src = meta->insn.src_reg * 2;
637 
638 	emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, reg_b(src));
639 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
640 
641 	return 0;
642 }
643 
644 static void
645 wrp_test_reg_one(struct nfp_prog *nfp_prog, u8 dst, enum alu_op alu_op, u8 src,
646 		 enum br_mask br_mask, u16 off)
647 {
648 	emit_alu(nfp_prog, reg_none(), reg_a(dst), alu_op, reg_b(src));
649 	emit_br(nfp_prog, br_mask, off, 0);
650 }
651 
652 static int
653 wrp_test_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
654 	     enum alu_op alu_op, enum br_mask br_mask)
655 {
656 	const struct bpf_insn *insn = &meta->insn;
657 
658 	if (insn->off < 0) /* TODO */
659 		return -EOPNOTSUPP;
660 
661 	wrp_test_reg_one(nfp_prog, insn->dst_reg * 2, alu_op,
662 			 insn->src_reg * 2, br_mask, insn->off);
663 	wrp_test_reg_one(nfp_prog, insn->dst_reg * 2 + 1, alu_op,
664 			 insn->src_reg * 2 + 1, br_mask, insn->off);
665 
666 	return 0;
667 }
668 
669 static int
670 wrp_cmp_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
671 	    enum br_mask br_mask, bool swap)
672 {
673 	const struct bpf_insn *insn = &meta->insn;
674 	u64 imm = insn->imm; /* sign extend */
675 	u8 reg = insn->dst_reg * 2;
676 	swreg tmp_reg;
677 
678 	if (insn->off < 0) /* TODO */
679 		return -EOPNOTSUPP;
680 
681 	tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
682 	if (!swap)
683 		emit_alu(nfp_prog, reg_none(), reg_a(reg), ALU_OP_SUB, tmp_reg);
684 	else
685 		emit_alu(nfp_prog, reg_none(), tmp_reg, ALU_OP_SUB, reg_a(reg));
686 
687 	tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
688 	if (!swap)
689 		emit_alu(nfp_prog, reg_none(),
690 			 reg_a(reg + 1), ALU_OP_SUB_C, tmp_reg);
691 	else
692 		emit_alu(nfp_prog, reg_none(),
693 			 tmp_reg, ALU_OP_SUB_C, reg_a(reg + 1));
694 
695 	emit_br(nfp_prog, br_mask, insn->off, 0);
696 
697 	return 0;
698 }
699 
700 static int
701 wrp_cmp_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
702 	    enum br_mask br_mask, bool swap)
703 {
704 	const struct bpf_insn *insn = &meta->insn;
705 	u8 areg = insn->src_reg * 2, breg = insn->dst_reg * 2;
706 
707 	if (insn->off < 0) /* TODO */
708 		return -EOPNOTSUPP;
709 
710 	if (swap) {
711 		areg ^= breg;
712 		breg ^= areg;
713 		areg ^= breg;
714 	}
715 
716 	emit_alu(nfp_prog, reg_none(), reg_a(areg), ALU_OP_SUB, reg_b(breg));
717 	emit_alu(nfp_prog, reg_none(),
718 		 reg_a(areg + 1), ALU_OP_SUB_C, reg_b(breg + 1));
719 	emit_br(nfp_prog, br_mask, insn->off, 0);
720 
721 	return 0;
722 }
723 
724 /* --- Callbacks --- */
725 static int mov_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
726 {
727 	const struct bpf_insn *insn = &meta->insn;
728 
729 	wrp_reg_mov(nfp_prog, insn->dst_reg * 2, insn->src_reg * 2);
730 	wrp_reg_mov(nfp_prog, insn->dst_reg * 2 + 1, insn->src_reg * 2 + 1);
731 
732 	return 0;
733 }
734 
735 static int mov_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
736 {
737 	u64 imm = meta->insn.imm; /* sign extend */
738 
739 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2), imm & ~0U);
740 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), imm >> 32);
741 
742 	return 0;
743 }
744 
745 static int xor_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
746 {
747 	return wrp_alu64_reg(nfp_prog, meta, ALU_OP_XOR);
748 }
749 
750 static int xor_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
751 {
752 	return wrp_alu64_imm(nfp_prog, meta, ALU_OP_XOR, !meta->insn.imm);
753 }
754 
755 static int and_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
756 {
757 	return wrp_alu64_reg(nfp_prog, meta, ALU_OP_AND);
758 }
759 
760 static int and_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
761 {
762 	return wrp_alu64_imm(nfp_prog, meta, ALU_OP_AND, !~meta->insn.imm);
763 }
764 
765 static int or_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
766 {
767 	return wrp_alu64_reg(nfp_prog, meta, ALU_OP_OR);
768 }
769 
770 static int or_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
771 {
772 	return wrp_alu64_imm(nfp_prog, meta, ALU_OP_OR, !meta->insn.imm);
773 }
774 
775 static int add_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
776 {
777 	const struct bpf_insn *insn = &meta->insn;
778 
779 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2),
780 		 reg_a(insn->dst_reg * 2), ALU_OP_ADD,
781 		 reg_b(insn->src_reg * 2));
782 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1),
783 		 reg_a(insn->dst_reg * 2 + 1), ALU_OP_ADD_C,
784 		 reg_b(insn->src_reg * 2 + 1));
785 
786 	return 0;
787 }
788 
789 static int add_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
790 {
791 	const struct bpf_insn *insn = &meta->insn;
792 	u64 imm = insn->imm; /* sign extend */
793 
794 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, ALU_OP_ADD, imm & ~0U);
795 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, ALU_OP_ADD_C, imm >> 32);
796 
797 	return 0;
798 }
799 
800 static int sub_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
801 {
802 	const struct bpf_insn *insn = &meta->insn;
803 
804 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2),
805 		 reg_a(insn->dst_reg * 2), ALU_OP_SUB,
806 		 reg_b(insn->src_reg * 2));
807 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1),
808 		 reg_a(insn->dst_reg * 2 + 1), ALU_OP_SUB_C,
809 		 reg_b(insn->src_reg * 2 + 1));
810 
811 	return 0;
812 }
813 
814 static int sub_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
815 {
816 	const struct bpf_insn *insn = &meta->insn;
817 	u64 imm = insn->imm; /* sign extend */
818 
819 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, ALU_OP_SUB, imm & ~0U);
820 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, ALU_OP_SUB_C, imm >> 32);
821 
822 	return 0;
823 }
824 
825 static int shl_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
826 {
827 	const struct bpf_insn *insn = &meta->insn;
828 	u8 dst = insn->dst_reg * 2;
829 
830 	if (insn->imm < 32) {
831 		emit_shf(nfp_prog, reg_both(dst + 1),
832 			 reg_a(dst + 1), SHF_OP_NONE, reg_b(dst),
833 			 SHF_SC_R_DSHF, 32 - insn->imm);
834 		emit_shf(nfp_prog, reg_both(dst),
835 			 reg_none(), SHF_OP_NONE, reg_b(dst),
836 			 SHF_SC_L_SHF, insn->imm);
837 	} else if (insn->imm == 32) {
838 		wrp_reg_mov(nfp_prog, dst + 1, dst);
839 		wrp_immed(nfp_prog, reg_both(dst), 0);
840 	} else if (insn->imm > 32) {
841 		emit_shf(nfp_prog, reg_both(dst + 1),
842 			 reg_none(), SHF_OP_NONE, reg_b(dst),
843 			 SHF_SC_L_SHF, insn->imm - 32);
844 		wrp_immed(nfp_prog, reg_both(dst), 0);
845 	}
846 
847 	return 0;
848 }
849 
850 static int shr_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
851 {
852 	const struct bpf_insn *insn = &meta->insn;
853 	u8 dst = insn->dst_reg * 2;
854 
855 	if (insn->imm < 32) {
856 		emit_shf(nfp_prog, reg_both(dst),
857 			 reg_a(dst + 1), SHF_OP_NONE, reg_b(dst),
858 			 SHF_SC_R_DSHF, insn->imm);
859 		emit_shf(nfp_prog, reg_both(dst + 1),
860 			 reg_none(), SHF_OP_NONE, reg_b(dst + 1),
861 			 SHF_SC_R_SHF, insn->imm);
862 	} else if (insn->imm == 32) {
863 		wrp_reg_mov(nfp_prog, dst, dst + 1);
864 		wrp_immed(nfp_prog, reg_both(dst + 1), 0);
865 	} else if (insn->imm > 32) {
866 		emit_shf(nfp_prog, reg_both(dst),
867 			 reg_none(), SHF_OP_NONE, reg_b(dst + 1),
868 			 SHF_SC_R_SHF, insn->imm - 32);
869 		wrp_immed(nfp_prog, reg_both(dst + 1), 0);
870 	}
871 
872 	return 0;
873 }
874 
875 static int mov_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
876 {
877 	const struct bpf_insn *insn = &meta->insn;
878 
879 	wrp_reg_mov(nfp_prog, insn->dst_reg * 2,  insn->src_reg * 2);
880 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
881 
882 	return 0;
883 }
884 
885 static int mov_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
886 {
887 	const struct bpf_insn *insn = &meta->insn;
888 
889 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2), insn->imm);
890 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
891 
892 	return 0;
893 }
894 
895 static int xor_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
896 {
897 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_XOR);
898 }
899 
900 static int xor_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
901 {
902 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_XOR, !~meta->insn.imm);
903 }
904 
905 static int and_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
906 {
907 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_AND);
908 }
909 
910 static int and_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
911 {
912 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_AND, !~meta->insn.imm);
913 }
914 
915 static int or_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
916 {
917 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_OR);
918 }
919 
920 static int or_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
921 {
922 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_OR, !meta->insn.imm);
923 }
924 
925 static int add_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
926 {
927 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_ADD);
928 }
929 
930 static int add_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
931 {
932 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_ADD, !meta->insn.imm);
933 }
934 
935 static int sub_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
936 {
937 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_SUB);
938 }
939 
940 static int sub_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
941 {
942 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_SUB, !meta->insn.imm);
943 }
944 
945 static int shl_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
946 {
947 	const struct bpf_insn *insn = &meta->insn;
948 
949 	if (!insn->imm)
950 		return 1; /* TODO: zero shift means indirect */
951 
952 	emit_shf(nfp_prog, reg_both(insn->dst_reg * 2),
953 		 reg_none(), SHF_OP_NONE, reg_b(insn->dst_reg * 2),
954 		 SHF_SC_L_SHF, insn->imm);
955 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
956 
957 	return 0;
958 }
959 
960 static int imm_ld8_part2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
961 {
962 	wrp_immed(nfp_prog, reg_both(nfp_meta_prev(meta)->insn.dst_reg * 2 + 1),
963 		  meta->insn.imm);
964 
965 	return 0;
966 }
967 
968 static int imm_ld8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
969 {
970 	const struct bpf_insn *insn = &meta->insn;
971 
972 	meta->double_cb = imm_ld8_part2;
973 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2), insn->imm);
974 
975 	return 0;
976 }
977 
978 static int data_ld1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
979 {
980 	return construct_data_ld(nfp_prog, meta->insn.imm, 1);
981 }
982 
983 static int data_ld2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
984 {
985 	return construct_data_ld(nfp_prog, meta->insn.imm, 2);
986 }
987 
988 static int data_ld4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
989 {
990 	return construct_data_ld(nfp_prog, meta->insn.imm, 4);
991 }
992 
993 static int data_ind_ld1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
994 {
995 	return construct_data_ind_ld(nfp_prog, meta->insn.imm,
996 				     meta->insn.src_reg * 2, true, 1);
997 }
998 
999 static int data_ind_ld2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1000 {
1001 	return construct_data_ind_ld(nfp_prog, meta->insn.imm,
1002 				     meta->insn.src_reg * 2, true, 2);
1003 }
1004 
1005 static int data_ind_ld4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1006 {
1007 	return construct_data_ind_ld(nfp_prog, meta->insn.imm,
1008 				     meta->insn.src_reg * 2, true, 4);
1009 }
1010 
1011 static int mem_ldx4_skb(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1012 {
1013 	if (meta->insn.off == offsetof(struct sk_buff, len))
1014 		emit_alu(nfp_prog, reg_both(meta->insn.dst_reg * 2),
1015 			 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_LEN);
1016 	else
1017 		return -EOPNOTSUPP;
1018 
1019 	return 0;
1020 }
1021 
1022 static int mem_ldx4_xdp(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1023 {
1024 	swreg dst = reg_both(meta->insn.dst_reg * 2);
1025 
1026 	if (meta->insn.off != offsetof(struct xdp_md, data) &&
1027 	    meta->insn.off != offsetof(struct xdp_md, data_end))
1028 		return -EOPNOTSUPP;
1029 
1030 	emit_alu(nfp_prog, dst, reg_none(), ALU_OP_NONE, NFP_BPF_ABI_PKT);
1031 
1032 	if (meta->insn.off == offsetof(struct xdp_md, data))
1033 		return 0;
1034 
1035 	emit_alu(nfp_prog, dst,	dst, ALU_OP_ADD, NFP_BPF_ABI_LEN);
1036 
1037 	return 0;
1038 }
1039 
1040 static int mem_ldx4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1041 {
1042 	int ret;
1043 
1044 	if (nfp_prog->act == NN_ACT_XDP)
1045 		ret = mem_ldx4_xdp(nfp_prog, meta);
1046 	else
1047 		ret = mem_ldx4_skb(nfp_prog, meta);
1048 
1049 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
1050 
1051 	return ret;
1052 }
1053 
1054 static int mem_stx4_skb(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1055 {
1056 	if (meta->insn.off == offsetof(struct sk_buff, mark))
1057 		return wrp_set_mark(nfp_prog, meta->insn.src_reg * 2);
1058 
1059 	return -EOPNOTSUPP;
1060 }
1061 
1062 static int mem_stx4_xdp(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1063 {
1064 	return -EOPNOTSUPP;
1065 }
1066 
1067 static int mem_stx4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1068 {
1069 	if (nfp_prog->act == NN_ACT_XDP)
1070 		return mem_stx4_xdp(nfp_prog, meta);
1071 	return mem_stx4_skb(nfp_prog, meta);
1072 }
1073 
1074 static int jump(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1075 {
1076 	if (meta->insn.off < 0) /* TODO */
1077 		return -EOPNOTSUPP;
1078 	emit_br(nfp_prog, BR_UNC, meta->insn.off, 0);
1079 
1080 	return 0;
1081 }
1082 
1083 static int jeq_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1084 {
1085 	const struct bpf_insn *insn = &meta->insn;
1086 	u64 imm = insn->imm; /* sign extend */
1087 	swreg or1, or2, tmp_reg;
1088 
1089 	or1 = reg_a(insn->dst_reg * 2);
1090 	or2 = reg_b(insn->dst_reg * 2 + 1);
1091 
1092 	if (insn->off < 0) /* TODO */
1093 		return -EOPNOTSUPP;
1094 
1095 	if (imm & ~0U) {
1096 		tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
1097 		emit_alu(nfp_prog, imm_a(nfp_prog),
1098 			 reg_a(insn->dst_reg * 2), ALU_OP_XOR, tmp_reg);
1099 		or1 = imm_a(nfp_prog);
1100 	}
1101 
1102 	if (imm >> 32) {
1103 		tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
1104 		emit_alu(nfp_prog, imm_b(nfp_prog),
1105 			 reg_a(insn->dst_reg * 2 + 1), ALU_OP_XOR, tmp_reg);
1106 		or2 = imm_b(nfp_prog);
1107 	}
1108 
1109 	emit_alu(nfp_prog, reg_none(), or1, ALU_OP_OR, or2);
1110 	emit_br(nfp_prog, BR_BEQ, insn->off, 0);
1111 
1112 	return 0;
1113 }
1114 
1115 static int jgt_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1116 {
1117 	return wrp_cmp_imm(nfp_prog, meta, BR_BLO, false);
1118 }
1119 
1120 static int jge_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1121 {
1122 	return wrp_cmp_imm(nfp_prog, meta, BR_BHS, true);
1123 }
1124 
1125 static int jlt_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1126 {
1127 	return wrp_cmp_imm(nfp_prog, meta, BR_BHS, false);
1128 }
1129 
1130 static int jle_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1131 {
1132 	return wrp_cmp_imm(nfp_prog, meta, BR_BLO, true);
1133 }
1134 
1135 static int jset_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1136 {
1137 	const struct bpf_insn *insn = &meta->insn;
1138 	u64 imm = insn->imm; /* sign extend */
1139 	swreg tmp_reg;
1140 
1141 	if (insn->off < 0) /* TODO */
1142 		return -EOPNOTSUPP;
1143 
1144 	if (!imm) {
1145 		meta->skip = true;
1146 		return 0;
1147 	}
1148 
1149 	if (imm & ~0U) {
1150 		tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
1151 		emit_alu(nfp_prog, reg_none(),
1152 			 reg_a(insn->dst_reg * 2), ALU_OP_AND, tmp_reg);
1153 		emit_br(nfp_prog, BR_BNE, insn->off, 0);
1154 	}
1155 
1156 	if (imm >> 32) {
1157 		tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
1158 		emit_alu(nfp_prog, reg_none(),
1159 			 reg_a(insn->dst_reg * 2 + 1), ALU_OP_AND, tmp_reg);
1160 		emit_br(nfp_prog, BR_BNE, insn->off, 0);
1161 	}
1162 
1163 	return 0;
1164 }
1165 
1166 static int jne_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1167 {
1168 	const struct bpf_insn *insn = &meta->insn;
1169 	u64 imm = insn->imm; /* sign extend */
1170 	swreg tmp_reg;
1171 
1172 	if (insn->off < 0) /* TODO */
1173 		return -EOPNOTSUPP;
1174 
1175 	if (!imm) {
1176 		emit_alu(nfp_prog, reg_none(), reg_a(insn->dst_reg * 2),
1177 			 ALU_OP_OR, reg_b(insn->dst_reg * 2 + 1));
1178 		emit_br(nfp_prog, BR_BNE, insn->off, 0);
1179 	}
1180 
1181 	tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
1182 	emit_alu(nfp_prog, reg_none(),
1183 		 reg_a(insn->dst_reg * 2), ALU_OP_XOR, tmp_reg);
1184 	emit_br(nfp_prog, BR_BNE, insn->off, 0);
1185 
1186 	tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
1187 	emit_alu(nfp_prog, reg_none(),
1188 		 reg_a(insn->dst_reg * 2 + 1), ALU_OP_XOR, tmp_reg);
1189 	emit_br(nfp_prog, BR_BNE, insn->off, 0);
1190 
1191 	return 0;
1192 }
1193 
1194 static int jeq_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1195 {
1196 	const struct bpf_insn *insn = &meta->insn;
1197 
1198 	if (insn->off < 0) /* TODO */
1199 		return -EOPNOTSUPP;
1200 
1201 	emit_alu(nfp_prog, imm_a(nfp_prog), reg_a(insn->dst_reg * 2),
1202 		 ALU_OP_XOR, reg_b(insn->src_reg * 2));
1203 	emit_alu(nfp_prog, imm_b(nfp_prog), reg_a(insn->dst_reg * 2 + 1),
1204 		 ALU_OP_XOR, reg_b(insn->src_reg * 2 + 1));
1205 	emit_alu(nfp_prog, reg_none(),
1206 		 imm_a(nfp_prog), ALU_OP_OR, imm_b(nfp_prog));
1207 	emit_br(nfp_prog, BR_BEQ, insn->off, 0);
1208 
1209 	return 0;
1210 }
1211 
1212 static int jgt_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1213 {
1214 	return wrp_cmp_reg(nfp_prog, meta, BR_BLO, false);
1215 }
1216 
1217 static int jge_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1218 {
1219 	return wrp_cmp_reg(nfp_prog, meta, BR_BHS, true);
1220 }
1221 
1222 static int jlt_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1223 {
1224 	return wrp_cmp_reg(nfp_prog, meta, BR_BHS, false);
1225 }
1226 
1227 static int jle_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1228 {
1229 	return wrp_cmp_reg(nfp_prog, meta, BR_BLO, true);
1230 }
1231 
1232 static int jset_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1233 {
1234 	return wrp_test_reg(nfp_prog, meta, ALU_OP_AND, BR_BNE);
1235 }
1236 
1237 static int jne_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1238 {
1239 	return wrp_test_reg(nfp_prog, meta, ALU_OP_XOR, BR_BNE);
1240 }
1241 
1242 static int goto_out(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1243 {
1244 	wrp_br_special(nfp_prog, BR_UNC, OP_BR_GO_OUT);
1245 
1246 	return 0;
1247 }
1248 
1249 static const instr_cb_t instr_cb[256] = {
1250 	[BPF_ALU64 | BPF_MOV | BPF_X] =	mov_reg64,
1251 	[BPF_ALU64 | BPF_MOV | BPF_K] =	mov_imm64,
1252 	[BPF_ALU64 | BPF_XOR | BPF_X] =	xor_reg64,
1253 	[BPF_ALU64 | BPF_XOR | BPF_K] =	xor_imm64,
1254 	[BPF_ALU64 | BPF_AND | BPF_X] =	and_reg64,
1255 	[BPF_ALU64 | BPF_AND | BPF_K] =	and_imm64,
1256 	[BPF_ALU64 | BPF_OR | BPF_X] =	or_reg64,
1257 	[BPF_ALU64 | BPF_OR | BPF_K] =	or_imm64,
1258 	[BPF_ALU64 | BPF_ADD | BPF_X] =	add_reg64,
1259 	[BPF_ALU64 | BPF_ADD | BPF_K] =	add_imm64,
1260 	[BPF_ALU64 | BPF_SUB | BPF_X] =	sub_reg64,
1261 	[BPF_ALU64 | BPF_SUB | BPF_K] =	sub_imm64,
1262 	[BPF_ALU64 | BPF_LSH | BPF_K] =	shl_imm64,
1263 	[BPF_ALU64 | BPF_RSH | BPF_K] =	shr_imm64,
1264 	[BPF_ALU | BPF_MOV | BPF_X] =	mov_reg,
1265 	[BPF_ALU | BPF_MOV | BPF_K] =	mov_imm,
1266 	[BPF_ALU | BPF_XOR | BPF_X] =	xor_reg,
1267 	[BPF_ALU | BPF_XOR | BPF_K] =	xor_imm,
1268 	[BPF_ALU | BPF_AND | BPF_X] =	and_reg,
1269 	[BPF_ALU | BPF_AND | BPF_K] =	and_imm,
1270 	[BPF_ALU | BPF_OR | BPF_X] =	or_reg,
1271 	[BPF_ALU | BPF_OR | BPF_K] =	or_imm,
1272 	[BPF_ALU | BPF_ADD | BPF_X] =	add_reg,
1273 	[BPF_ALU | BPF_ADD | BPF_K] =	add_imm,
1274 	[BPF_ALU | BPF_SUB | BPF_X] =	sub_reg,
1275 	[BPF_ALU | BPF_SUB | BPF_K] =	sub_imm,
1276 	[BPF_ALU | BPF_LSH | BPF_K] =	shl_imm,
1277 	[BPF_LD | BPF_IMM | BPF_DW] =	imm_ld8,
1278 	[BPF_LD | BPF_ABS | BPF_B] =	data_ld1,
1279 	[BPF_LD | BPF_ABS | BPF_H] =	data_ld2,
1280 	[BPF_LD | BPF_ABS | BPF_W] =	data_ld4,
1281 	[BPF_LD | BPF_IND | BPF_B] =	data_ind_ld1,
1282 	[BPF_LD | BPF_IND | BPF_H] =	data_ind_ld2,
1283 	[BPF_LD | BPF_IND | BPF_W] =	data_ind_ld4,
1284 	[BPF_LDX | BPF_MEM | BPF_W] =	mem_ldx4,
1285 	[BPF_STX | BPF_MEM | BPF_W] =	mem_stx4,
1286 	[BPF_JMP | BPF_JA | BPF_K] =	jump,
1287 	[BPF_JMP | BPF_JEQ | BPF_K] =	jeq_imm,
1288 	[BPF_JMP | BPF_JGT | BPF_K] =	jgt_imm,
1289 	[BPF_JMP | BPF_JGE | BPF_K] =	jge_imm,
1290 	[BPF_JMP | BPF_JLT | BPF_K] =	jlt_imm,
1291 	[BPF_JMP | BPF_JLE | BPF_K] =	jle_imm,
1292 	[BPF_JMP | BPF_JSET | BPF_K] =	jset_imm,
1293 	[BPF_JMP | BPF_JNE | BPF_K] =	jne_imm,
1294 	[BPF_JMP | BPF_JEQ | BPF_X] =	jeq_reg,
1295 	[BPF_JMP | BPF_JGT | BPF_X] =	jgt_reg,
1296 	[BPF_JMP | BPF_JGE | BPF_X] =	jge_reg,
1297 	[BPF_JMP | BPF_JLT | BPF_X] =	jlt_reg,
1298 	[BPF_JMP | BPF_JLE | BPF_X] =	jle_reg,
1299 	[BPF_JMP | BPF_JSET | BPF_X] =	jset_reg,
1300 	[BPF_JMP | BPF_JNE | BPF_X] =	jne_reg,
1301 	[BPF_JMP | BPF_EXIT] =		goto_out,
1302 };
1303 
1304 /* --- Misc code --- */
1305 static void br_set_offset(u64 *instr, u16 offset)
1306 {
1307 	u16 addr_lo, addr_hi;
1308 
1309 	addr_lo = offset & (OP_BR_ADDR_LO >> __bf_shf(OP_BR_ADDR_LO));
1310 	addr_hi = offset != addr_lo;
1311 	*instr &= ~(OP_BR_ADDR_HI | OP_BR_ADDR_LO);
1312 	*instr |= FIELD_PREP(OP_BR_ADDR_HI, addr_hi);
1313 	*instr |= FIELD_PREP(OP_BR_ADDR_LO, addr_lo);
1314 }
1315 
1316 /* --- Assembler logic --- */
1317 static int nfp_fixup_branches(struct nfp_prog *nfp_prog)
1318 {
1319 	struct nfp_insn_meta *meta, *next;
1320 	u32 off, br_idx;
1321 	u32 idx;
1322 
1323 	nfp_for_each_insn_walk2(nfp_prog, meta, next) {
1324 		if (meta->skip)
1325 			continue;
1326 		if (BPF_CLASS(meta->insn.code) != BPF_JMP)
1327 			continue;
1328 
1329 		br_idx = nfp_prog_offset_to_index(nfp_prog, next->off) - 1;
1330 		if (!nfp_is_br(nfp_prog->prog[br_idx])) {
1331 			pr_err("Fixup found block not ending in branch %d %02x %016llx!!\n",
1332 			       br_idx, meta->insn.code, nfp_prog->prog[br_idx]);
1333 			return -ELOOP;
1334 		}
1335 		/* Leave special branches for later */
1336 		if (FIELD_GET(OP_BR_SPECIAL, nfp_prog->prog[br_idx]))
1337 			continue;
1338 
1339 		/* Find the target offset in assembler realm */
1340 		off = meta->insn.off;
1341 		if (!off) {
1342 			pr_err("Fixup found zero offset!!\n");
1343 			return -ELOOP;
1344 		}
1345 
1346 		while (off && nfp_meta_has_next(nfp_prog, next)) {
1347 			next = nfp_meta_next(next);
1348 			off--;
1349 		}
1350 		if (off) {
1351 			pr_err("Fixup found too large jump!! %d\n", off);
1352 			return -ELOOP;
1353 		}
1354 
1355 		if (next->skip) {
1356 			pr_err("Branch landing on removed instruction!!\n");
1357 			return -ELOOP;
1358 		}
1359 
1360 		for (idx = nfp_prog_offset_to_index(nfp_prog, meta->off);
1361 		     idx <= br_idx; idx++) {
1362 			if (!nfp_is_br(nfp_prog->prog[idx]))
1363 				continue;
1364 			br_set_offset(&nfp_prog->prog[idx], next->off);
1365 		}
1366 	}
1367 
1368 	/* Fixup 'goto out's separately, they can be scattered around */
1369 	for (br_idx = 0; br_idx < nfp_prog->prog_len; br_idx++) {
1370 		enum br_special special;
1371 
1372 		if ((nfp_prog->prog[br_idx] & OP_BR_BASE_MASK) != OP_BR_BASE)
1373 			continue;
1374 
1375 		special = FIELD_GET(OP_BR_SPECIAL, nfp_prog->prog[br_idx]);
1376 		switch (special) {
1377 		case OP_BR_NORMAL:
1378 			break;
1379 		case OP_BR_GO_OUT:
1380 			br_set_offset(&nfp_prog->prog[br_idx],
1381 				      nfp_prog->tgt_out);
1382 			break;
1383 		case OP_BR_GO_ABORT:
1384 			br_set_offset(&nfp_prog->prog[br_idx],
1385 				      nfp_prog->tgt_abort);
1386 			break;
1387 		}
1388 
1389 		nfp_prog->prog[br_idx] &= ~OP_BR_SPECIAL;
1390 	}
1391 
1392 	return 0;
1393 }
1394 
1395 static void nfp_intro(struct nfp_prog *nfp_prog)
1396 {
1397 	emit_alu(nfp_prog, pkt_reg(nfp_prog),
1398 		 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_PKT);
1399 }
1400 
1401 static void nfp_outro_tc_legacy(struct nfp_prog *nfp_prog)
1402 {
1403 	const u8 act2code[] = {
1404 		[NN_ACT_TC_DROP]  = 0x22,
1405 		[NN_ACT_TC_REDIR] = 0x24
1406 	};
1407 	/* Target for aborts */
1408 	nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog);
1409 	wrp_immed(nfp_prog, reg_both(0), 0);
1410 
1411 	/* Target for normal exits */
1412 	nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog);
1413 	/* Legacy TC mode:
1414 	 *   0        0x11 -> pass,  count as stat0
1415 	 *  -1  drop  0x22 -> drop,  count as stat1
1416 	 *     redir  0x24 -> redir, count as stat1
1417 	 *  ife mark  0x21 -> pass,  count as stat1
1418 	 *  ife + tx  0x24 -> redir, count as stat1
1419 	 */
1420 	emit_br_byte_neq(nfp_prog, reg_b(0), 0xff, 0, nfp_prog->tgt_done, 2);
1421 	emit_alu(nfp_prog, reg_a(0),
1422 		 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_FLAGS);
1423 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x11), SHF_SC_L_SHF, 16);
1424 
1425 	emit_br(nfp_prog, BR_UNC, nfp_prog->tgt_done, 1);
1426 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(act2code[nfp_prog->act]),
1427 		      SHF_SC_L_SHF, 16);
1428 }
1429 
1430 static void nfp_outro_tc_da(struct nfp_prog *nfp_prog)
1431 {
1432 	/* TC direct-action mode:
1433 	 *   0,1   ok        NOT SUPPORTED[1]
1434 	 *   2   drop  0x22 -> drop,  count as stat1
1435 	 *   4,5 nuke  0x02 -> drop
1436 	 *   7  redir  0x44 -> redir, count as stat2
1437 	 *   * unspec  0x11 -> pass,  count as stat0
1438 	 *
1439 	 * [1] We can't support OK and RECLASSIFY because we can't tell TC
1440 	 *     the exact decision made.  We are forced to support UNSPEC
1441 	 *     to handle aborts so that's the only one we handle for passing
1442 	 *     packets up the stack.
1443 	 */
1444 	/* Target for aborts */
1445 	nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog);
1446 
1447 	emit_br_def(nfp_prog, nfp_prog->tgt_done, 2);
1448 
1449 	emit_alu(nfp_prog, reg_a(0),
1450 		 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_FLAGS);
1451 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x11), SHF_SC_L_SHF, 16);
1452 
1453 	/* Target for normal exits */
1454 	nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog);
1455 
1456 	/* if R0 > 7 jump to abort */
1457 	emit_alu(nfp_prog, reg_none(), reg_imm(7), ALU_OP_SUB, reg_b(0));
1458 	emit_br(nfp_prog, BR_BLO, nfp_prog->tgt_abort, 0);
1459 	emit_alu(nfp_prog, reg_a(0),
1460 		 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_FLAGS);
1461 
1462 	wrp_immed(nfp_prog, reg_b(2), 0x41221211);
1463 	wrp_immed(nfp_prog, reg_b(3), 0x41001211);
1464 
1465 	emit_shf(nfp_prog, reg_a(1),
1466 		 reg_none(), SHF_OP_NONE, reg_b(0), SHF_SC_L_SHF, 2);
1467 
1468 	emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0));
1469 	emit_shf(nfp_prog, reg_a(2),
1470 		 reg_imm(0xf), SHF_OP_AND, reg_b(2), SHF_SC_R_SHF, 0);
1471 
1472 	emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0));
1473 	emit_shf(nfp_prog, reg_b(2),
1474 		 reg_imm(0xf), SHF_OP_AND, reg_b(3), SHF_SC_R_SHF, 0);
1475 
1476 	emit_br_def(nfp_prog, nfp_prog->tgt_done, 2);
1477 
1478 	emit_shf(nfp_prog, reg_b(2),
1479 		 reg_a(2), SHF_OP_OR, reg_b(2), SHF_SC_L_SHF, 4);
1480 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_b(2), SHF_SC_L_SHF, 16);
1481 }
1482 
1483 static void nfp_outro_xdp(struct nfp_prog *nfp_prog)
1484 {
1485 	/* XDP return codes:
1486 	 *   0 aborted  0x82 -> drop,  count as stat3
1487 	 *   1    drop  0x22 -> drop,  count as stat1
1488 	 *   2    pass  0x11 -> pass,  count as stat0
1489 	 *   3      tx  0x44 -> redir, count as stat2
1490 	 *   * unknown  0x82 -> drop,  count as stat3
1491 	 */
1492 	/* Target for aborts */
1493 	nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog);
1494 
1495 	emit_br_def(nfp_prog, nfp_prog->tgt_done, 2);
1496 
1497 	emit_alu(nfp_prog, reg_a(0),
1498 		 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_FLAGS);
1499 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x82), SHF_SC_L_SHF, 16);
1500 
1501 	/* Target for normal exits */
1502 	nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog);
1503 
1504 	/* if R0 > 3 jump to abort */
1505 	emit_alu(nfp_prog, reg_none(), reg_imm(3), ALU_OP_SUB, reg_b(0));
1506 	emit_br(nfp_prog, BR_BLO, nfp_prog->tgt_abort, 0);
1507 
1508 	wrp_immed(nfp_prog, reg_b(2), 0x44112282);
1509 
1510 	emit_shf(nfp_prog, reg_a(1),
1511 		 reg_none(), SHF_OP_NONE, reg_b(0), SHF_SC_L_SHF, 3);
1512 
1513 	emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0));
1514 	emit_shf(nfp_prog, reg_b(2),
1515 		 reg_imm(0xff), SHF_OP_AND, reg_b(2), SHF_SC_R_SHF, 0);
1516 
1517 	emit_br_def(nfp_prog, nfp_prog->tgt_done, 2);
1518 
1519 	emit_alu(nfp_prog, reg_a(0),
1520 		 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_FLAGS);
1521 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_b(2), SHF_SC_L_SHF, 16);
1522 }
1523 
1524 static void nfp_outro(struct nfp_prog *nfp_prog)
1525 {
1526 	switch (nfp_prog->act) {
1527 	case NN_ACT_DIRECT:
1528 		nfp_outro_tc_da(nfp_prog);
1529 		break;
1530 	case NN_ACT_TC_DROP:
1531 	case NN_ACT_TC_REDIR:
1532 		nfp_outro_tc_legacy(nfp_prog);
1533 		break;
1534 	case NN_ACT_XDP:
1535 		nfp_outro_xdp(nfp_prog);
1536 		break;
1537 	}
1538 }
1539 
1540 static int nfp_translate(struct nfp_prog *nfp_prog)
1541 {
1542 	struct nfp_insn_meta *meta;
1543 	int err;
1544 
1545 	nfp_intro(nfp_prog);
1546 	if (nfp_prog->error)
1547 		return nfp_prog->error;
1548 
1549 	list_for_each_entry(meta, &nfp_prog->insns, l) {
1550 		instr_cb_t cb = instr_cb[meta->insn.code];
1551 
1552 		meta->off = nfp_prog_current_offset(nfp_prog);
1553 
1554 		if (meta->skip) {
1555 			nfp_prog->n_translated++;
1556 			continue;
1557 		}
1558 
1559 		if (nfp_meta_has_prev(nfp_prog, meta) &&
1560 		    nfp_meta_prev(meta)->double_cb)
1561 			cb = nfp_meta_prev(meta)->double_cb;
1562 		if (!cb)
1563 			return -ENOENT;
1564 		err = cb(nfp_prog, meta);
1565 		if (err)
1566 			return err;
1567 
1568 		nfp_prog->n_translated++;
1569 	}
1570 
1571 	nfp_outro(nfp_prog);
1572 	if (nfp_prog->error)
1573 		return nfp_prog->error;
1574 
1575 	return nfp_fixup_branches(nfp_prog);
1576 }
1577 
1578 static int
1579 nfp_prog_prepare(struct nfp_prog *nfp_prog, const struct bpf_insn *prog,
1580 		 unsigned int cnt)
1581 {
1582 	unsigned int i;
1583 
1584 	for (i = 0; i < cnt; i++) {
1585 		struct nfp_insn_meta *meta;
1586 
1587 		meta = kzalloc(sizeof(*meta), GFP_KERNEL);
1588 		if (!meta)
1589 			return -ENOMEM;
1590 
1591 		meta->insn = prog[i];
1592 		meta->n = i;
1593 
1594 		list_add_tail(&meta->l, &nfp_prog->insns);
1595 	}
1596 
1597 	return 0;
1598 }
1599 
1600 /* --- Optimizations --- */
1601 static void nfp_bpf_opt_reg_init(struct nfp_prog *nfp_prog)
1602 {
1603 	struct nfp_insn_meta *meta;
1604 
1605 	list_for_each_entry(meta, &nfp_prog->insns, l) {
1606 		struct bpf_insn insn = meta->insn;
1607 
1608 		/* Programs converted from cBPF start with register xoring */
1609 		if (insn.code == (BPF_ALU64 | BPF_XOR | BPF_X) &&
1610 		    insn.src_reg == insn.dst_reg)
1611 			continue;
1612 
1613 		/* Programs start with R6 = R1 but we ignore the skb pointer */
1614 		if (insn.code == (BPF_ALU64 | BPF_MOV | BPF_X) &&
1615 		    insn.src_reg == 1 && insn.dst_reg == 6)
1616 			meta->skip = true;
1617 
1618 		/* Return as soon as something doesn't match */
1619 		if (!meta->skip)
1620 			return;
1621 	}
1622 }
1623 
1624 /* Try to rename registers so that program uses only low ones */
1625 static int nfp_bpf_opt_reg_rename(struct nfp_prog *nfp_prog)
1626 {
1627 	bool reg_used[MAX_BPF_REG] = {};
1628 	u8 tgt_reg[MAX_BPF_REG] = {};
1629 	struct nfp_insn_meta *meta;
1630 	unsigned int i, j;
1631 
1632 	list_for_each_entry(meta, &nfp_prog->insns, l) {
1633 		if (meta->skip)
1634 			continue;
1635 
1636 		reg_used[meta->insn.src_reg] = true;
1637 		reg_used[meta->insn.dst_reg] = true;
1638 	}
1639 
1640 	for (i = 0, j = 0; i < ARRAY_SIZE(tgt_reg); i++) {
1641 		if (!reg_used[i])
1642 			continue;
1643 
1644 		tgt_reg[i] = j++;
1645 	}
1646 	nfp_prog->num_regs = j;
1647 
1648 	list_for_each_entry(meta, &nfp_prog->insns, l) {
1649 		meta->insn.src_reg = tgt_reg[meta->insn.src_reg];
1650 		meta->insn.dst_reg = tgt_reg[meta->insn.dst_reg];
1651 	}
1652 
1653 	return 0;
1654 }
1655 
1656 /* Remove masking after load since our load guarantees this is not needed */
1657 static void nfp_bpf_opt_ld_mask(struct nfp_prog *nfp_prog)
1658 {
1659 	struct nfp_insn_meta *meta1, *meta2;
1660 	const s32 exp_mask[] = {
1661 		[BPF_B] = 0x000000ffU,
1662 		[BPF_H] = 0x0000ffffU,
1663 		[BPF_W] = 0xffffffffU,
1664 	};
1665 
1666 	nfp_for_each_insn_walk2(nfp_prog, meta1, meta2) {
1667 		struct bpf_insn insn, next;
1668 
1669 		insn = meta1->insn;
1670 		next = meta2->insn;
1671 
1672 		if (BPF_CLASS(insn.code) != BPF_LD)
1673 			continue;
1674 		if (BPF_MODE(insn.code) != BPF_ABS &&
1675 		    BPF_MODE(insn.code) != BPF_IND)
1676 			continue;
1677 
1678 		if (next.code != (BPF_ALU64 | BPF_AND | BPF_K))
1679 			continue;
1680 
1681 		if (!exp_mask[BPF_SIZE(insn.code)])
1682 			continue;
1683 		if (exp_mask[BPF_SIZE(insn.code)] != next.imm)
1684 			continue;
1685 
1686 		if (next.src_reg || next.dst_reg)
1687 			continue;
1688 
1689 		meta2->skip = true;
1690 	}
1691 }
1692 
1693 static void nfp_bpf_opt_ld_shift(struct nfp_prog *nfp_prog)
1694 {
1695 	struct nfp_insn_meta *meta1, *meta2, *meta3;
1696 
1697 	nfp_for_each_insn_walk3(nfp_prog, meta1, meta2, meta3) {
1698 		struct bpf_insn insn, next1, next2;
1699 
1700 		insn = meta1->insn;
1701 		next1 = meta2->insn;
1702 		next2 = meta3->insn;
1703 
1704 		if (BPF_CLASS(insn.code) != BPF_LD)
1705 			continue;
1706 		if (BPF_MODE(insn.code) != BPF_ABS &&
1707 		    BPF_MODE(insn.code) != BPF_IND)
1708 			continue;
1709 		if (BPF_SIZE(insn.code) != BPF_W)
1710 			continue;
1711 
1712 		if (!(next1.code == (BPF_LSH | BPF_K | BPF_ALU64) &&
1713 		      next2.code == (BPF_RSH | BPF_K | BPF_ALU64)) &&
1714 		    !(next1.code == (BPF_RSH | BPF_K | BPF_ALU64) &&
1715 		      next2.code == (BPF_LSH | BPF_K | BPF_ALU64)))
1716 			continue;
1717 
1718 		if (next1.src_reg || next1.dst_reg ||
1719 		    next2.src_reg || next2.dst_reg)
1720 			continue;
1721 
1722 		if (next1.imm != 0x20 || next2.imm != 0x20)
1723 			continue;
1724 
1725 		meta2->skip = true;
1726 		meta3->skip = true;
1727 	}
1728 }
1729 
1730 static int nfp_bpf_optimize(struct nfp_prog *nfp_prog)
1731 {
1732 	int ret;
1733 
1734 	nfp_bpf_opt_reg_init(nfp_prog);
1735 
1736 	ret = nfp_bpf_opt_reg_rename(nfp_prog);
1737 	if (ret)
1738 		return ret;
1739 
1740 	nfp_bpf_opt_ld_mask(nfp_prog);
1741 	nfp_bpf_opt_ld_shift(nfp_prog);
1742 
1743 	return 0;
1744 }
1745 
1746 /**
1747  * nfp_bpf_jit() - translate BPF code into NFP assembly
1748  * @filter:	kernel BPF filter struct
1749  * @prog_mem:	memory to store assembler instructions
1750  * @act:	action attached to this eBPF program
1751  * @prog_start:	offset of the first instruction when loaded
1752  * @prog_done:	where to jump on exit
1753  * @prog_sz:	size of @prog_mem in instructions
1754  * @res:	achieved parameters of translation results
1755  */
1756 int
1757 nfp_bpf_jit(struct bpf_prog *filter, void *prog_mem,
1758 	    enum nfp_bpf_action_type act,
1759 	    unsigned int prog_start, unsigned int prog_done,
1760 	    unsigned int prog_sz, struct nfp_bpf_result *res)
1761 {
1762 	struct nfp_prog *nfp_prog;
1763 	int ret;
1764 
1765 	nfp_prog = kzalloc(sizeof(*nfp_prog), GFP_KERNEL);
1766 	if (!nfp_prog)
1767 		return -ENOMEM;
1768 
1769 	INIT_LIST_HEAD(&nfp_prog->insns);
1770 	nfp_prog->act = act;
1771 	nfp_prog->start_off = prog_start;
1772 	nfp_prog->tgt_done = prog_done;
1773 
1774 	ret = nfp_prog_prepare(nfp_prog, filter->insnsi, filter->len);
1775 	if (ret)
1776 		goto out;
1777 
1778 	ret = nfp_prog_verify(nfp_prog, filter);
1779 	if (ret)
1780 		goto out;
1781 
1782 	ret = nfp_bpf_optimize(nfp_prog);
1783 	if (ret)
1784 		goto out;
1785 
1786 	if (nfp_prog->num_regs <= 7)
1787 		nfp_prog->regs_per_thread = 16;
1788 	else
1789 		nfp_prog->regs_per_thread = 32;
1790 
1791 	nfp_prog->prog = prog_mem;
1792 	nfp_prog->__prog_alloc_len = prog_sz;
1793 
1794 	ret = nfp_translate(nfp_prog);
1795 	if (ret) {
1796 		pr_err("Translation failed with error %d (translated: %u)\n",
1797 		       ret, nfp_prog->n_translated);
1798 		ret = -EINVAL;
1799 	}
1800 
1801 	res->n_instr = nfp_prog->prog_len;
1802 	res->dense_mode = nfp_prog->num_regs <= 7;
1803 out:
1804 	nfp_prog_free(nfp_prog);
1805 
1806 	return ret;
1807 }
1808