1 /*
2  * Copyright (C) 2016 Netronome Systems, Inc.
3  *
4  * This software is dual licensed under the GNU General License Version 2,
5  * June 1991 as shown in the file COPYING in the top-level directory of this
6  * source tree or the BSD 2-Clause License provided below.  You have the
7  * option to license this software under the complete terms of either license.
8  *
9  * The BSD 2-Clause License:
10  *
11  *     Redistribution and use in source and binary forms, with or
12  *     without modification, are permitted provided that the following
13  *     conditions are met:
14  *
15  *      1. Redistributions of source code must retain the above
16  *         copyright notice, this list of conditions and the following
17  *         disclaimer.
18  *
19  *      2. Redistributions in binary form must reproduce the above
20  *         copyright notice, this list of conditions and the following
21  *         disclaimer in the documentation and/or other materials
22  *         provided with the distribution.
23  *
24  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
25  * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
26  * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
27  * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
28  * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
29  * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
30  * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
31  * SOFTWARE.
32  */
33 
34 #define pr_fmt(fmt)	"NFP net bpf: " fmt
35 
36 #include <linux/kernel.h>
37 #include <linux/bpf.h>
38 #include <linux/filter.h>
39 #include <linux/pkt_cls.h>
40 #include <linux/unistd.h>
41 
42 #include "main.h"
43 #include "../nfp_asm.h"
44 
45 /* --- NFP prog --- */
46 /* Foreach "multiple" entries macros provide pos and next<n> pointers.
47  * It's safe to modify the next pointers (but not pos).
48  */
49 #define nfp_for_each_insn_walk2(nfp_prog, pos, next)			\
50 	for (pos = list_first_entry(&(nfp_prog)->insns, typeof(*pos), l), \
51 	     next = list_next_entry(pos, l);			\
52 	     &(nfp_prog)->insns != &pos->l &&			\
53 	     &(nfp_prog)->insns != &next->l;			\
54 	     pos = nfp_meta_next(pos),				\
55 	     next = nfp_meta_next(pos))
56 
57 #define nfp_for_each_insn_walk3(nfp_prog, pos, next, next2)		\
58 	for (pos = list_first_entry(&(nfp_prog)->insns, typeof(*pos), l), \
59 	     next = list_next_entry(pos, l),			\
60 	     next2 = list_next_entry(next, l);			\
61 	     &(nfp_prog)->insns != &pos->l &&			\
62 	     &(nfp_prog)->insns != &next->l &&			\
63 	     &(nfp_prog)->insns != &next2->l;			\
64 	     pos = nfp_meta_next(pos),				\
65 	     next = nfp_meta_next(pos),				\
66 	     next2 = nfp_meta_next(next))
67 
68 static bool
69 nfp_meta_has_next(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
70 {
71 	return meta->l.next != &nfp_prog->insns;
72 }
73 
74 static bool
75 nfp_meta_has_prev(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
76 {
77 	return meta->l.prev != &nfp_prog->insns;
78 }
79 
80 static void nfp_prog_free(struct nfp_prog *nfp_prog)
81 {
82 	struct nfp_insn_meta *meta, *tmp;
83 
84 	list_for_each_entry_safe(meta, tmp, &nfp_prog->insns, l) {
85 		list_del(&meta->l);
86 		kfree(meta);
87 	}
88 	kfree(nfp_prog);
89 }
90 
91 static void nfp_prog_push(struct nfp_prog *nfp_prog, u64 insn)
92 {
93 	if (nfp_prog->__prog_alloc_len == nfp_prog->prog_len) {
94 		nfp_prog->error = -ENOSPC;
95 		return;
96 	}
97 
98 	nfp_prog->prog[nfp_prog->prog_len] = insn;
99 	nfp_prog->prog_len++;
100 }
101 
102 static unsigned int nfp_prog_current_offset(struct nfp_prog *nfp_prog)
103 {
104 	return nfp_prog->start_off + nfp_prog->prog_len;
105 }
106 
107 static unsigned int
108 nfp_prog_offset_to_index(struct nfp_prog *nfp_prog, unsigned int offset)
109 {
110 	return offset - nfp_prog->start_off;
111 }
112 
113 /* --- Emitters --- */
114 static void
115 __emit_cmd(struct nfp_prog *nfp_prog, enum cmd_tgt_map op,
116 	   u8 mode, u8 xfer, u8 areg, u8 breg, u8 size, bool sync)
117 {
118 	enum cmd_ctx_swap ctx;
119 	u64 insn;
120 
121 	if (sync)
122 		ctx = CMD_CTX_SWAP;
123 	else
124 		ctx = CMD_CTX_NO_SWAP;
125 
126 	insn =	FIELD_PREP(OP_CMD_A_SRC, areg) |
127 		FIELD_PREP(OP_CMD_CTX, ctx) |
128 		FIELD_PREP(OP_CMD_B_SRC, breg) |
129 		FIELD_PREP(OP_CMD_TOKEN, cmd_tgt_act[op].token) |
130 		FIELD_PREP(OP_CMD_XFER, xfer) |
131 		FIELD_PREP(OP_CMD_CNT, size) |
132 		FIELD_PREP(OP_CMD_SIG, sync) |
133 		FIELD_PREP(OP_CMD_TGT_CMD, cmd_tgt_act[op].tgt_cmd) |
134 		FIELD_PREP(OP_CMD_MODE, mode);
135 
136 	nfp_prog_push(nfp_prog, insn);
137 }
138 
139 static void
140 emit_cmd(struct nfp_prog *nfp_prog, enum cmd_tgt_map op,
141 	 u8 mode, u8 xfer, swreg lreg, swreg rreg, u8 size, bool sync)
142 {
143 	struct nfp_insn_re_regs reg;
144 	int err;
145 
146 	err = swreg_to_restricted(reg_none(), lreg, rreg, &reg, false);
147 	if (err) {
148 		nfp_prog->error = err;
149 		return;
150 	}
151 	if (reg.swap) {
152 		pr_err("cmd can't swap arguments\n");
153 		nfp_prog->error = -EFAULT;
154 		return;
155 	}
156 	if (reg.dst_lmextn || reg.src_lmextn) {
157 		pr_err("cmd can't use LMextn\n");
158 		nfp_prog->error = -EFAULT;
159 		return;
160 	}
161 
162 	__emit_cmd(nfp_prog, op, mode, xfer, reg.areg, reg.breg, size, sync);
163 }
164 
165 static void
166 __emit_br(struct nfp_prog *nfp_prog, enum br_mask mask, enum br_ev_pip ev_pip,
167 	  enum br_ctx_signal_state css, u16 addr, u8 defer)
168 {
169 	u16 addr_lo, addr_hi;
170 	u64 insn;
171 
172 	addr_lo = addr & (OP_BR_ADDR_LO >> __bf_shf(OP_BR_ADDR_LO));
173 	addr_hi = addr != addr_lo;
174 
175 	insn = OP_BR_BASE |
176 		FIELD_PREP(OP_BR_MASK, mask) |
177 		FIELD_PREP(OP_BR_EV_PIP, ev_pip) |
178 		FIELD_PREP(OP_BR_CSS, css) |
179 		FIELD_PREP(OP_BR_DEFBR, defer) |
180 		FIELD_PREP(OP_BR_ADDR_LO, addr_lo) |
181 		FIELD_PREP(OP_BR_ADDR_HI, addr_hi);
182 
183 	nfp_prog_push(nfp_prog, insn);
184 }
185 
186 static void emit_br_def(struct nfp_prog *nfp_prog, u16 addr, u8 defer)
187 {
188 	if (defer > 2) {
189 		pr_err("BUG: branch defer out of bounds %d\n", defer);
190 		nfp_prog->error = -EFAULT;
191 		return;
192 	}
193 	__emit_br(nfp_prog, BR_UNC, BR_EV_PIP_UNCOND, BR_CSS_NONE, addr, defer);
194 }
195 
196 static void
197 emit_br(struct nfp_prog *nfp_prog, enum br_mask mask, u16 addr, u8 defer)
198 {
199 	__emit_br(nfp_prog, mask,
200 		  mask != BR_UNC ? BR_EV_PIP_COND : BR_EV_PIP_UNCOND,
201 		  BR_CSS_NONE, addr, defer);
202 }
203 
204 static void
205 __emit_br_byte(struct nfp_prog *nfp_prog, u8 areg, u8 breg, bool imm8,
206 	       u8 byte, bool equal, u16 addr, u8 defer, bool src_lmextn)
207 {
208 	u16 addr_lo, addr_hi;
209 	u64 insn;
210 
211 	addr_lo = addr & (OP_BB_ADDR_LO >> __bf_shf(OP_BB_ADDR_LO));
212 	addr_hi = addr != addr_lo;
213 
214 	insn = OP_BBYTE_BASE |
215 		FIELD_PREP(OP_BB_A_SRC, areg) |
216 		FIELD_PREP(OP_BB_BYTE, byte) |
217 		FIELD_PREP(OP_BB_B_SRC, breg) |
218 		FIELD_PREP(OP_BB_I8, imm8) |
219 		FIELD_PREP(OP_BB_EQ, equal) |
220 		FIELD_PREP(OP_BB_DEFBR, defer) |
221 		FIELD_PREP(OP_BB_ADDR_LO, addr_lo) |
222 		FIELD_PREP(OP_BB_ADDR_HI, addr_hi) |
223 		FIELD_PREP(OP_BB_SRC_LMEXTN, src_lmextn);
224 
225 	nfp_prog_push(nfp_prog, insn);
226 }
227 
228 static void
229 emit_br_byte_neq(struct nfp_prog *nfp_prog,
230 		 swreg src, u8 imm, u8 byte, u16 addr, u8 defer)
231 {
232 	struct nfp_insn_re_regs reg;
233 	int err;
234 
235 	err = swreg_to_restricted(reg_none(), src, reg_imm(imm), &reg, true);
236 	if (err) {
237 		nfp_prog->error = err;
238 		return;
239 	}
240 
241 	__emit_br_byte(nfp_prog, reg.areg, reg.breg, reg.i8, byte, false, addr,
242 		       defer, reg.src_lmextn);
243 }
244 
245 static void
246 __emit_immed(struct nfp_prog *nfp_prog, u16 areg, u16 breg, u16 imm_hi,
247 	     enum immed_width width, bool invert,
248 	     enum immed_shift shift, bool wr_both,
249 	     bool dst_lmextn, bool src_lmextn)
250 {
251 	u64 insn;
252 
253 	insn = OP_IMMED_BASE |
254 		FIELD_PREP(OP_IMMED_A_SRC, areg) |
255 		FIELD_PREP(OP_IMMED_B_SRC, breg) |
256 		FIELD_PREP(OP_IMMED_IMM, imm_hi) |
257 		FIELD_PREP(OP_IMMED_WIDTH, width) |
258 		FIELD_PREP(OP_IMMED_INV, invert) |
259 		FIELD_PREP(OP_IMMED_SHIFT, shift) |
260 		FIELD_PREP(OP_IMMED_WR_AB, wr_both) |
261 		FIELD_PREP(OP_IMMED_SRC_LMEXTN, src_lmextn) |
262 		FIELD_PREP(OP_IMMED_DST_LMEXTN, dst_lmextn);
263 
264 	nfp_prog_push(nfp_prog, insn);
265 }
266 
267 static void
268 emit_immed(struct nfp_prog *nfp_prog, swreg dst, u16 imm,
269 	   enum immed_width width, bool invert, enum immed_shift shift)
270 {
271 	struct nfp_insn_ur_regs reg;
272 	int err;
273 
274 	if (swreg_type(dst) == NN_REG_IMM) {
275 		nfp_prog->error = -EFAULT;
276 		return;
277 	}
278 
279 	err = swreg_to_unrestricted(dst, dst, reg_imm(imm & 0xff), &reg);
280 	if (err) {
281 		nfp_prog->error = err;
282 		return;
283 	}
284 
285 	__emit_immed(nfp_prog, reg.areg, reg.breg, imm >> 8, width,
286 		     invert, shift, reg.wr_both,
287 		     reg.dst_lmextn, reg.src_lmextn);
288 }
289 
290 static void
291 __emit_shf(struct nfp_prog *nfp_prog, u16 dst, enum alu_dst_ab dst_ab,
292 	   enum shf_sc sc, u8 shift,
293 	   u16 areg, enum shf_op op, u16 breg, bool i8, bool sw, bool wr_both,
294 	   bool dst_lmextn, bool src_lmextn)
295 {
296 	u64 insn;
297 
298 	if (!FIELD_FIT(OP_SHF_SHIFT, shift)) {
299 		nfp_prog->error = -EFAULT;
300 		return;
301 	}
302 
303 	if (sc == SHF_SC_L_SHF)
304 		shift = 32 - shift;
305 
306 	insn = OP_SHF_BASE |
307 		FIELD_PREP(OP_SHF_A_SRC, areg) |
308 		FIELD_PREP(OP_SHF_SC, sc) |
309 		FIELD_PREP(OP_SHF_B_SRC, breg) |
310 		FIELD_PREP(OP_SHF_I8, i8) |
311 		FIELD_PREP(OP_SHF_SW, sw) |
312 		FIELD_PREP(OP_SHF_DST, dst) |
313 		FIELD_PREP(OP_SHF_SHIFT, shift) |
314 		FIELD_PREP(OP_SHF_OP, op) |
315 		FIELD_PREP(OP_SHF_DST_AB, dst_ab) |
316 		FIELD_PREP(OP_SHF_WR_AB, wr_both) |
317 		FIELD_PREP(OP_SHF_SRC_LMEXTN, src_lmextn) |
318 		FIELD_PREP(OP_SHF_DST_LMEXTN, dst_lmextn);
319 
320 	nfp_prog_push(nfp_prog, insn);
321 }
322 
323 static void
324 emit_shf(struct nfp_prog *nfp_prog, swreg dst,
325 	 swreg lreg, enum shf_op op, swreg rreg, enum shf_sc sc, u8 shift)
326 {
327 	struct nfp_insn_re_regs reg;
328 	int err;
329 
330 	err = swreg_to_restricted(dst, lreg, rreg, &reg, true);
331 	if (err) {
332 		nfp_prog->error = err;
333 		return;
334 	}
335 
336 	__emit_shf(nfp_prog, reg.dst, reg.dst_ab, sc, shift,
337 		   reg.areg, op, reg.breg, reg.i8, reg.swap, reg.wr_both,
338 		   reg.dst_lmextn, reg.src_lmextn);
339 }
340 
341 static void
342 __emit_alu(struct nfp_prog *nfp_prog, u16 dst, enum alu_dst_ab dst_ab,
343 	   u16 areg, enum alu_op op, u16 breg, bool swap, bool wr_both,
344 	   bool dst_lmextn, bool src_lmextn)
345 {
346 	u64 insn;
347 
348 	insn = OP_ALU_BASE |
349 		FIELD_PREP(OP_ALU_A_SRC, areg) |
350 		FIELD_PREP(OP_ALU_B_SRC, breg) |
351 		FIELD_PREP(OP_ALU_DST, dst) |
352 		FIELD_PREP(OP_ALU_SW, swap) |
353 		FIELD_PREP(OP_ALU_OP, op) |
354 		FIELD_PREP(OP_ALU_DST_AB, dst_ab) |
355 		FIELD_PREP(OP_ALU_WR_AB, wr_both) |
356 		FIELD_PREP(OP_ALU_SRC_LMEXTN, src_lmextn) |
357 		FIELD_PREP(OP_ALU_DST_LMEXTN, dst_lmextn);
358 
359 	nfp_prog_push(nfp_prog, insn);
360 }
361 
362 static void
363 emit_alu(struct nfp_prog *nfp_prog, swreg dst,
364 	 swreg lreg, enum alu_op op, swreg rreg)
365 {
366 	struct nfp_insn_ur_regs reg;
367 	int err;
368 
369 	err = swreg_to_unrestricted(dst, lreg, rreg, &reg);
370 	if (err) {
371 		nfp_prog->error = err;
372 		return;
373 	}
374 
375 	__emit_alu(nfp_prog, reg.dst, reg.dst_ab,
376 		   reg.areg, op, reg.breg, reg.swap, reg.wr_both,
377 		   reg.dst_lmextn, reg.src_lmextn);
378 }
379 
380 static void
381 __emit_ld_field(struct nfp_prog *nfp_prog, enum shf_sc sc,
382 		u8 areg, u8 bmask, u8 breg, u8 shift, bool imm8,
383 		bool zero, bool swap, bool wr_both,
384 		bool dst_lmextn, bool src_lmextn)
385 {
386 	u64 insn;
387 
388 	insn = OP_LDF_BASE |
389 		FIELD_PREP(OP_LDF_A_SRC, areg) |
390 		FIELD_PREP(OP_LDF_SC, sc) |
391 		FIELD_PREP(OP_LDF_B_SRC, breg) |
392 		FIELD_PREP(OP_LDF_I8, imm8) |
393 		FIELD_PREP(OP_LDF_SW, swap) |
394 		FIELD_PREP(OP_LDF_ZF, zero) |
395 		FIELD_PREP(OP_LDF_BMASK, bmask) |
396 		FIELD_PREP(OP_LDF_SHF, shift) |
397 		FIELD_PREP(OP_LDF_WR_AB, wr_both) |
398 		FIELD_PREP(OP_LDF_SRC_LMEXTN, src_lmextn) |
399 		FIELD_PREP(OP_LDF_DST_LMEXTN, dst_lmextn);
400 
401 	nfp_prog_push(nfp_prog, insn);
402 }
403 
404 static void
405 emit_ld_field_any(struct nfp_prog *nfp_prog, enum shf_sc sc, u8 shift,
406 		  swreg dst, u8 bmask, swreg src, bool zero)
407 {
408 	struct nfp_insn_re_regs reg;
409 	int err;
410 
411 	err = swreg_to_restricted(reg_none(), dst, src, &reg, true);
412 	if (err) {
413 		nfp_prog->error = err;
414 		return;
415 	}
416 
417 	__emit_ld_field(nfp_prog, sc, reg.areg, bmask, reg.breg, shift,
418 			reg.i8, zero, reg.swap, reg.wr_both,
419 			reg.dst_lmextn, reg.src_lmextn);
420 }
421 
422 static void
423 emit_ld_field(struct nfp_prog *nfp_prog, swreg dst, u8 bmask, swreg src,
424 	      enum shf_sc sc, u8 shift)
425 {
426 	emit_ld_field_any(nfp_prog, sc, shift, dst, bmask, src, false);
427 }
428 
429 /* --- Wrappers --- */
430 static bool pack_immed(u32 imm, u16 *val, enum immed_shift *shift)
431 {
432 	if (!(imm & 0xffff0000)) {
433 		*val = imm;
434 		*shift = IMMED_SHIFT_0B;
435 	} else if (!(imm & 0xff0000ff)) {
436 		*val = imm >> 8;
437 		*shift = IMMED_SHIFT_1B;
438 	} else if (!(imm & 0x0000ffff)) {
439 		*val = imm >> 16;
440 		*shift = IMMED_SHIFT_2B;
441 	} else {
442 		return false;
443 	}
444 
445 	return true;
446 }
447 
448 static void wrp_immed(struct nfp_prog *nfp_prog, swreg dst, u32 imm)
449 {
450 	enum immed_shift shift;
451 	u16 val;
452 
453 	if (pack_immed(imm, &val, &shift)) {
454 		emit_immed(nfp_prog, dst, val, IMMED_WIDTH_ALL, false, shift);
455 	} else if (pack_immed(~imm, &val, &shift)) {
456 		emit_immed(nfp_prog, dst, val, IMMED_WIDTH_ALL, true, shift);
457 	} else {
458 		emit_immed(nfp_prog, dst, imm & 0xffff, IMMED_WIDTH_ALL,
459 			   false, IMMED_SHIFT_0B);
460 		emit_immed(nfp_prog, dst, imm >> 16, IMMED_WIDTH_WORD,
461 			   false, IMMED_SHIFT_2B);
462 	}
463 }
464 
465 /* ur_load_imm_any() - encode immediate or use tmp register (unrestricted)
466  * If the @imm is small enough encode it directly in operand and return
467  * otherwise load @imm to a spare register and return its encoding.
468  */
469 static swreg ur_load_imm_any(struct nfp_prog *nfp_prog, u32 imm, swreg tmp_reg)
470 {
471 	if (FIELD_FIT(UR_REG_IMM_MAX, imm))
472 		return reg_imm(imm);
473 
474 	wrp_immed(nfp_prog, tmp_reg, imm);
475 	return tmp_reg;
476 }
477 
478 /* re_load_imm_any() - encode immediate or use tmp register (restricted)
479  * If the @imm is small enough encode it directly in operand and return
480  * otherwise load @imm to a spare register and return its encoding.
481  */
482 static swreg re_load_imm_any(struct nfp_prog *nfp_prog, u32 imm, swreg tmp_reg)
483 {
484 	if (FIELD_FIT(RE_REG_IMM_MAX, imm))
485 		return reg_imm(imm);
486 
487 	wrp_immed(nfp_prog, tmp_reg, imm);
488 	return tmp_reg;
489 }
490 
491 static void
492 wrp_br_special(struct nfp_prog *nfp_prog, enum br_mask mask,
493 	       enum br_special special)
494 {
495 	emit_br(nfp_prog, mask, 0, 0);
496 
497 	nfp_prog->prog[nfp_prog->prog_len - 1] |=
498 		FIELD_PREP(OP_BR_SPECIAL, special);
499 }
500 
501 static void wrp_reg_mov(struct nfp_prog *nfp_prog, u16 dst, u16 src)
502 {
503 	emit_alu(nfp_prog, reg_both(dst), reg_none(), ALU_OP_NONE, reg_b(src));
504 }
505 
506 static int
507 construct_data_ind_ld(struct nfp_prog *nfp_prog, u16 offset,
508 		      u16 src, bool src_valid, u8 size)
509 {
510 	unsigned int i;
511 	u16 shift, sz;
512 	swreg tmp_reg;
513 
514 	/* We load the value from the address indicated in @offset and then
515 	 * shift out the data we don't need.  Note: this is big endian!
516 	 */
517 	sz = size < 4 ? 4 : size;
518 	shift = size < 4 ? 4 - size : 0;
519 
520 	if (src_valid) {
521 		/* Calculate the true offset (src_reg + imm) */
522 		tmp_reg = ur_load_imm_any(nfp_prog, offset, imm_b(nfp_prog));
523 		emit_alu(nfp_prog, imm_both(nfp_prog),
524 			 reg_a(src), ALU_OP_ADD, tmp_reg);
525 		/* Check packet length (size guaranteed to fit b/c it's u8) */
526 		emit_alu(nfp_prog, imm_a(nfp_prog),
527 			 imm_a(nfp_prog), ALU_OP_ADD, reg_imm(size));
528 		emit_alu(nfp_prog, reg_none(),
529 			 NFP_BPF_ABI_LEN, ALU_OP_SUB, imm_a(nfp_prog));
530 		wrp_br_special(nfp_prog, BR_BLO, OP_BR_GO_ABORT);
531 		/* Load data */
532 		emit_cmd(nfp_prog, CMD_TGT_READ8, CMD_MODE_32b, 0,
533 			 pkt_reg(nfp_prog), imm_b(nfp_prog), sz - 1, true);
534 	} else {
535 		/* Check packet length */
536 		tmp_reg = ur_load_imm_any(nfp_prog, offset + size,
537 					  imm_a(nfp_prog));
538 		emit_alu(nfp_prog, reg_none(),
539 			 NFP_BPF_ABI_LEN, ALU_OP_SUB, tmp_reg);
540 		wrp_br_special(nfp_prog, BR_BLO, OP_BR_GO_ABORT);
541 		/* Load data */
542 		tmp_reg = re_load_imm_any(nfp_prog, offset, imm_b(nfp_prog));
543 		emit_cmd(nfp_prog, CMD_TGT_READ8, CMD_MODE_32b, 0,
544 			 pkt_reg(nfp_prog), tmp_reg, sz - 1, true);
545 	}
546 
547 	i = 0;
548 	if (shift)
549 		emit_shf(nfp_prog, reg_both(0), reg_none(), SHF_OP_NONE,
550 			 reg_xfer(0), SHF_SC_R_SHF, shift * 8);
551 	else
552 		for (; i * 4 < size; i++)
553 			emit_alu(nfp_prog, reg_both(i),
554 				 reg_none(), ALU_OP_NONE, reg_xfer(i));
555 
556 	if (i < 2)
557 		wrp_immed(nfp_prog, reg_both(1), 0);
558 
559 	return 0;
560 }
561 
562 static int construct_data_ld(struct nfp_prog *nfp_prog, u16 offset, u8 size)
563 {
564 	return construct_data_ind_ld(nfp_prog, offset, 0, false, size);
565 }
566 
567 static void
568 wrp_alu_imm(struct nfp_prog *nfp_prog, u8 dst, enum alu_op alu_op, u32 imm)
569 {
570 	swreg tmp_reg;
571 
572 	if (alu_op == ALU_OP_AND) {
573 		if (!imm)
574 			wrp_immed(nfp_prog, reg_both(dst), 0);
575 		if (!imm || !~imm)
576 			return;
577 	}
578 	if (alu_op == ALU_OP_OR) {
579 		if (!~imm)
580 			wrp_immed(nfp_prog, reg_both(dst), ~0U);
581 		if (!imm || !~imm)
582 			return;
583 	}
584 	if (alu_op == ALU_OP_XOR) {
585 		if (!~imm)
586 			emit_alu(nfp_prog, reg_both(dst), reg_none(),
587 				 ALU_OP_NEG, reg_b(dst));
588 		if (!imm || !~imm)
589 			return;
590 	}
591 
592 	tmp_reg = ur_load_imm_any(nfp_prog, imm, imm_b(nfp_prog));
593 	emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, tmp_reg);
594 }
595 
596 static int
597 wrp_alu64_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
598 	      enum alu_op alu_op, bool skip)
599 {
600 	const struct bpf_insn *insn = &meta->insn;
601 	u64 imm = insn->imm; /* sign extend */
602 
603 	if (skip) {
604 		meta->skip = true;
605 		return 0;
606 	}
607 
608 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, alu_op, imm & ~0U);
609 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, alu_op, imm >> 32);
610 
611 	return 0;
612 }
613 
614 static int
615 wrp_alu64_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
616 	      enum alu_op alu_op)
617 {
618 	u8 dst = meta->insn.dst_reg * 2, src = meta->insn.src_reg * 2;
619 
620 	emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, reg_b(src));
621 	emit_alu(nfp_prog, reg_both(dst + 1),
622 		 reg_a(dst + 1), alu_op, reg_b(src + 1));
623 
624 	return 0;
625 }
626 
627 static int
628 wrp_alu32_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
629 	      enum alu_op alu_op, bool skip)
630 {
631 	const struct bpf_insn *insn = &meta->insn;
632 
633 	if (skip) {
634 		meta->skip = true;
635 		return 0;
636 	}
637 
638 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, alu_op, insn->imm);
639 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
640 
641 	return 0;
642 }
643 
644 static int
645 wrp_alu32_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
646 	      enum alu_op alu_op)
647 {
648 	u8 dst = meta->insn.dst_reg * 2, src = meta->insn.src_reg * 2;
649 
650 	emit_alu(nfp_prog, reg_both(dst), reg_a(dst), alu_op, reg_b(src));
651 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
652 
653 	return 0;
654 }
655 
656 static void
657 wrp_test_reg_one(struct nfp_prog *nfp_prog, u8 dst, enum alu_op alu_op, u8 src,
658 		 enum br_mask br_mask, u16 off)
659 {
660 	emit_alu(nfp_prog, reg_none(), reg_a(dst), alu_op, reg_b(src));
661 	emit_br(nfp_prog, br_mask, off, 0);
662 }
663 
664 static int
665 wrp_test_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
666 	     enum alu_op alu_op, enum br_mask br_mask)
667 {
668 	const struct bpf_insn *insn = &meta->insn;
669 
670 	if (insn->off < 0) /* TODO */
671 		return -EOPNOTSUPP;
672 
673 	wrp_test_reg_one(nfp_prog, insn->dst_reg * 2, alu_op,
674 			 insn->src_reg * 2, br_mask, insn->off);
675 	wrp_test_reg_one(nfp_prog, insn->dst_reg * 2 + 1, alu_op,
676 			 insn->src_reg * 2 + 1, br_mask, insn->off);
677 
678 	return 0;
679 }
680 
681 static int
682 wrp_cmp_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
683 	    enum br_mask br_mask, bool swap)
684 {
685 	const struct bpf_insn *insn = &meta->insn;
686 	u64 imm = insn->imm; /* sign extend */
687 	u8 reg = insn->dst_reg * 2;
688 	swreg tmp_reg;
689 
690 	if (insn->off < 0) /* TODO */
691 		return -EOPNOTSUPP;
692 
693 	tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
694 	if (!swap)
695 		emit_alu(nfp_prog, reg_none(), reg_a(reg), ALU_OP_SUB, tmp_reg);
696 	else
697 		emit_alu(nfp_prog, reg_none(), tmp_reg, ALU_OP_SUB, reg_a(reg));
698 
699 	tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
700 	if (!swap)
701 		emit_alu(nfp_prog, reg_none(),
702 			 reg_a(reg + 1), ALU_OP_SUB_C, tmp_reg);
703 	else
704 		emit_alu(nfp_prog, reg_none(),
705 			 tmp_reg, ALU_OP_SUB_C, reg_a(reg + 1));
706 
707 	emit_br(nfp_prog, br_mask, insn->off, 0);
708 
709 	return 0;
710 }
711 
712 static int
713 wrp_cmp_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta,
714 	    enum br_mask br_mask, bool swap)
715 {
716 	const struct bpf_insn *insn = &meta->insn;
717 	u8 areg = insn->src_reg * 2, breg = insn->dst_reg * 2;
718 
719 	if (insn->off < 0) /* TODO */
720 		return -EOPNOTSUPP;
721 
722 	if (swap) {
723 		areg ^= breg;
724 		breg ^= areg;
725 		areg ^= breg;
726 	}
727 
728 	emit_alu(nfp_prog, reg_none(), reg_a(areg), ALU_OP_SUB, reg_b(breg));
729 	emit_alu(nfp_prog, reg_none(),
730 		 reg_a(areg + 1), ALU_OP_SUB_C, reg_b(breg + 1));
731 	emit_br(nfp_prog, br_mask, insn->off, 0);
732 
733 	return 0;
734 }
735 
736 /* --- Callbacks --- */
737 static int mov_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
738 {
739 	const struct bpf_insn *insn = &meta->insn;
740 
741 	wrp_reg_mov(nfp_prog, insn->dst_reg * 2, insn->src_reg * 2);
742 	wrp_reg_mov(nfp_prog, insn->dst_reg * 2 + 1, insn->src_reg * 2 + 1);
743 
744 	return 0;
745 }
746 
747 static int mov_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
748 {
749 	u64 imm = meta->insn.imm; /* sign extend */
750 
751 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2), imm & ~0U);
752 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), imm >> 32);
753 
754 	return 0;
755 }
756 
757 static int xor_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
758 {
759 	return wrp_alu64_reg(nfp_prog, meta, ALU_OP_XOR);
760 }
761 
762 static int xor_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
763 {
764 	return wrp_alu64_imm(nfp_prog, meta, ALU_OP_XOR, !meta->insn.imm);
765 }
766 
767 static int and_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
768 {
769 	return wrp_alu64_reg(nfp_prog, meta, ALU_OP_AND);
770 }
771 
772 static int and_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
773 {
774 	return wrp_alu64_imm(nfp_prog, meta, ALU_OP_AND, !~meta->insn.imm);
775 }
776 
777 static int or_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
778 {
779 	return wrp_alu64_reg(nfp_prog, meta, ALU_OP_OR);
780 }
781 
782 static int or_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
783 {
784 	return wrp_alu64_imm(nfp_prog, meta, ALU_OP_OR, !meta->insn.imm);
785 }
786 
787 static int add_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
788 {
789 	const struct bpf_insn *insn = &meta->insn;
790 
791 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2),
792 		 reg_a(insn->dst_reg * 2), ALU_OP_ADD,
793 		 reg_b(insn->src_reg * 2));
794 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1),
795 		 reg_a(insn->dst_reg * 2 + 1), ALU_OP_ADD_C,
796 		 reg_b(insn->src_reg * 2 + 1));
797 
798 	return 0;
799 }
800 
801 static int add_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
802 {
803 	const struct bpf_insn *insn = &meta->insn;
804 	u64 imm = insn->imm; /* sign extend */
805 
806 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, ALU_OP_ADD, imm & ~0U);
807 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, ALU_OP_ADD_C, imm >> 32);
808 
809 	return 0;
810 }
811 
812 static int sub_reg64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
813 {
814 	const struct bpf_insn *insn = &meta->insn;
815 
816 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2),
817 		 reg_a(insn->dst_reg * 2), ALU_OP_SUB,
818 		 reg_b(insn->src_reg * 2));
819 	emit_alu(nfp_prog, reg_both(insn->dst_reg * 2 + 1),
820 		 reg_a(insn->dst_reg * 2 + 1), ALU_OP_SUB_C,
821 		 reg_b(insn->src_reg * 2 + 1));
822 
823 	return 0;
824 }
825 
826 static int sub_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
827 {
828 	const struct bpf_insn *insn = &meta->insn;
829 	u64 imm = insn->imm; /* sign extend */
830 
831 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2, ALU_OP_SUB, imm & ~0U);
832 	wrp_alu_imm(nfp_prog, insn->dst_reg * 2 + 1, ALU_OP_SUB_C, imm >> 32);
833 
834 	return 0;
835 }
836 
837 static int shl_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
838 {
839 	const struct bpf_insn *insn = &meta->insn;
840 	u8 dst = insn->dst_reg * 2;
841 
842 	if (insn->imm < 32) {
843 		emit_shf(nfp_prog, reg_both(dst + 1),
844 			 reg_a(dst + 1), SHF_OP_NONE, reg_b(dst),
845 			 SHF_SC_R_DSHF, 32 - insn->imm);
846 		emit_shf(nfp_prog, reg_both(dst),
847 			 reg_none(), SHF_OP_NONE, reg_b(dst),
848 			 SHF_SC_L_SHF, insn->imm);
849 	} else if (insn->imm == 32) {
850 		wrp_reg_mov(nfp_prog, dst + 1, dst);
851 		wrp_immed(nfp_prog, reg_both(dst), 0);
852 	} else if (insn->imm > 32) {
853 		emit_shf(nfp_prog, reg_both(dst + 1),
854 			 reg_none(), SHF_OP_NONE, reg_b(dst),
855 			 SHF_SC_L_SHF, insn->imm - 32);
856 		wrp_immed(nfp_prog, reg_both(dst), 0);
857 	}
858 
859 	return 0;
860 }
861 
862 static int shr_imm64(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
863 {
864 	const struct bpf_insn *insn = &meta->insn;
865 	u8 dst = insn->dst_reg * 2;
866 
867 	if (insn->imm < 32) {
868 		emit_shf(nfp_prog, reg_both(dst),
869 			 reg_a(dst + 1), SHF_OP_NONE, reg_b(dst),
870 			 SHF_SC_R_DSHF, insn->imm);
871 		emit_shf(nfp_prog, reg_both(dst + 1),
872 			 reg_none(), SHF_OP_NONE, reg_b(dst + 1),
873 			 SHF_SC_R_SHF, insn->imm);
874 	} else if (insn->imm == 32) {
875 		wrp_reg_mov(nfp_prog, dst, dst + 1);
876 		wrp_immed(nfp_prog, reg_both(dst + 1), 0);
877 	} else if (insn->imm > 32) {
878 		emit_shf(nfp_prog, reg_both(dst),
879 			 reg_none(), SHF_OP_NONE, reg_b(dst + 1),
880 			 SHF_SC_R_SHF, insn->imm - 32);
881 		wrp_immed(nfp_prog, reg_both(dst + 1), 0);
882 	}
883 
884 	return 0;
885 }
886 
887 static int mov_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
888 {
889 	const struct bpf_insn *insn = &meta->insn;
890 
891 	wrp_reg_mov(nfp_prog, insn->dst_reg * 2,  insn->src_reg * 2);
892 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
893 
894 	return 0;
895 }
896 
897 static int mov_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
898 {
899 	const struct bpf_insn *insn = &meta->insn;
900 
901 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2), insn->imm);
902 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
903 
904 	return 0;
905 }
906 
907 static int xor_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
908 {
909 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_XOR);
910 }
911 
912 static int xor_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
913 {
914 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_XOR, !~meta->insn.imm);
915 }
916 
917 static int and_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
918 {
919 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_AND);
920 }
921 
922 static int and_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
923 {
924 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_AND, !~meta->insn.imm);
925 }
926 
927 static int or_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
928 {
929 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_OR);
930 }
931 
932 static int or_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
933 {
934 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_OR, !meta->insn.imm);
935 }
936 
937 static int add_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
938 {
939 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_ADD);
940 }
941 
942 static int add_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
943 {
944 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_ADD, !meta->insn.imm);
945 }
946 
947 static int sub_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
948 {
949 	return wrp_alu32_reg(nfp_prog, meta, ALU_OP_SUB);
950 }
951 
952 static int sub_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
953 {
954 	return wrp_alu32_imm(nfp_prog, meta, ALU_OP_SUB, !meta->insn.imm);
955 }
956 
957 static int shl_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
958 {
959 	const struct bpf_insn *insn = &meta->insn;
960 
961 	if (!insn->imm)
962 		return 1; /* TODO: zero shift means indirect */
963 
964 	emit_shf(nfp_prog, reg_both(insn->dst_reg * 2),
965 		 reg_none(), SHF_OP_NONE, reg_b(insn->dst_reg * 2),
966 		 SHF_SC_L_SHF, insn->imm);
967 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2 + 1), 0);
968 
969 	return 0;
970 }
971 
972 static int imm_ld8_part2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
973 {
974 	wrp_immed(nfp_prog, reg_both(nfp_meta_prev(meta)->insn.dst_reg * 2 + 1),
975 		  meta->insn.imm);
976 
977 	return 0;
978 }
979 
980 static int imm_ld8(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
981 {
982 	const struct bpf_insn *insn = &meta->insn;
983 
984 	meta->double_cb = imm_ld8_part2;
985 	wrp_immed(nfp_prog, reg_both(insn->dst_reg * 2), insn->imm);
986 
987 	return 0;
988 }
989 
990 static int data_ld1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
991 {
992 	return construct_data_ld(nfp_prog, meta->insn.imm, 1);
993 }
994 
995 static int data_ld2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
996 {
997 	return construct_data_ld(nfp_prog, meta->insn.imm, 2);
998 }
999 
1000 static int data_ld4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1001 {
1002 	return construct_data_ld(nfp_prog, meta->insn.imm, 4);
1003 }
1004 
1005 static int data_ind_ld1(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1006 {
1007 	return construct_data_ind_ld(nfp_prog, meta->insn.imm,
1008 				     meta->insn.src_reg * 2, true, 1);
1009 }
1010 
1011 static int data_ind_ld2(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1012 {
1013 	return construct_data_ind_ld(nfp_prog, meta->insn.imm,
1014 				     meta->insn.src_reg * 2, true, 2);
1015 }
1016 
1017 static int data_ind_ld4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1018 {
1019 	return construct_data_ind_ld(nfp_prog, meta->insn.imm,
1020 				     meta->insn.src_reg * 2, true, 4);
1021 }
1022 
1023 static int mem_ldx4_skb(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1024 {
1025 	if (meta->insn.off == offsetof(struct sk_buff, len))
1026 		emit_alu(nfp_prog, reg_both(meta->insn.dst_reg * 2),
1027 			 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_LEN);
1028 	else
1029 		return -EOPNOTSUPP;
1030 
1031 	return 0;
1032 }
1033 
1034 static int mem_ldx4_xdp(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1035 {
1036 	swreg dst = reg_both(meta->insn.dst_reg * 2);
1037 
1038 	if (meta->insn.off != offsetof(struct xdp_md, data) &&
1039 	    meta->insn.off != offsetof(struct xdp_md, data_end))
1040 		return -EOPNOTSUPP;
1041 
1042 	emit_alu(nfp_prog, dst, reg_none(), ALU_OP_NONE, NFP_BPF_ABI_PKT);
1043 
1044 	if (meta->insn.off == offsetof(struct xdp_md, data))
1045 		return 0;
1046 
1047 	emit_alu(nfp_prog, dst,	dst, ALU_OP_ADD, NFP_BPF_ABI_LEN);
1048 
1049 	return 0;
1050 }
1051 
1052 static int mem_ldx4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1053 {
1054 	int ret;
1055 
1056 	if (nfp_prog->act == NN_ACT_XDP)
1057 		ret = mem_ldx4_xdp(nfp_prog, meta);
1058 	else
1059 		ret = mem_ldx4_skb(nfp_prog, meta);
1060 
1061 	wrp_immed(nfp_prog, reg_both(meta->insn.dst_reg * 2 + 1), 0);
1062 
1063 	return ret;
1064 }
1065 
1066 static int mem_stx4_skb(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1067 {
1068 	return -EOPNOTSUPP;
1069 }
1070 
1071 static int mem_stx4_xdp(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1072 {
1073 	return -EOPNOTSUPP;
1074 }
1075 
1076 static int mem_stx4(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1077 {
1078 	if (nfp_prog->act == NN_ACT_XDP)
1079 		return mem_stx4_xdp(nfp_prog, meta);
1080 	return mem_stx4_skb(nfp_prog, meta);
1081 }
1082 
1083 static int jump(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1084 {
1085 	if (meta->insn.off < 0) /* TODO */
1086 		return -EOPNOTSUPP;
1087 	emit_br(nfp_prog, BR_UNC, meta->insn.off, 0);
1088 
1089 	return 0;
1090 }
1091 
1092 static int jeq_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1093 {
1094 	const struct bpf_insn *insn = &meta->insn;
1095 	u64 imm = insn->imm; /* sign extend */
1096 	swreg or1, or2, tmp_reg;
1097 
1098 	or1 = reg_a(insn->dst_reg * 2);
1099 	or2 = reg_b(insn->dst_reg * 2 + 1);
1100 
1101 	if (insn->off < 0) /* TODO */
1102 		return -EOPNOTSUPP;
1103 
1104 	if (imm & ~0U) {
1105 		tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
1106 		emit_alu(nfp_prog, imm_a(nfp_prog),
1107 			 reg_a(insn->dst_reg * 2), ALU_OP_XOR, tmp_reg);
1108 		or1 = imm_a(nfp_prog);
1109 	}
1110 
1111 	if (imm >> 32) {
1112 		tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
1113 		emit_alu(nfp_prog, imm_b(nfp_prog),
1114 			 reg_a(insn->dst_reg * 2 + 1), ALU_OP_XOR, tmp_reg);
1115 		or2 = imm_b(nfp_prog);
1116 	}
1117 
1118 	emit_alu(nfp_prog, reg_none(), or1, ALU_OP_OR, or2);
1119 	emit_br(nfp_prog, BR_BEQ, insn->off, 0);
1120 
1121 	return 0;
1122 }
1123 
1124 static int jgt_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1125 {
1126 	return wrp_cmp_imm(nfp_prog, meta, BR_BLO, false);
1127 }
1128 
1129 static int jge_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1130 {
1131 	return wrp_cmp_imm(nfp_prog, meta, BR_BHS, true);
1132 }
1133 
1134 static int jlt_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1135 {
1136 	return wrp_cmp_imm(nfp_prog, meta, BR_BHS, false);
1137 }
1138 
1139 static int jle_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1140 {
1141 	return wrp_cmp_imm(nfp_prog, meta, BR_BLO, true);
1142 }
1143 
1144 static int jset_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1145 {
1146 	const struct bpf_insn *insn = &meta->insn;
1147 	u64 imm = insn->imm; /* sign extend */
1148 	swreg tmp_reg;
1149 
1150 	if (insn->off < 0) /* TODO */
1151 		return -EOPNOTSUPP;
1152 
1153 	if (!imm) {
1154 		meta->skip = true;
1155 		return 0;
1156 	}
1157 
1158 	if (imm & ~0U) {
1159 		tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
1160 		emit_alu(nfp_prog, reg_none(),
1161 			 reg_a(insn->dst_reg * 2), ALU_OP_AND, tmp_reg);
1162 		emit_br(nfp_prog, BR_BNE, insn->off, 0);
1163 	}
1164 
1165 	if (imm >> 32) {
1166 		tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
1167 		emit_alu(nfp_prog, reg_none(),
1168 			 reg_a(insn->dst_reg * 2 + 1), ALU_OP_AND, tmp_reg);
1169 		emit_br(nfp_prog, BR_BNE, insn->off, 0);
1170 	}
1171 
1172 	return 0;
1173 }
1174 
1175 static int jne_imm(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1176 {
1177 	const struct bpf_insn *insn = &meta->insn;
1178 	u64 imm = insn->imm; /* sign extend */
1179 	swreg tmp_reg;
1180 
1181 	if (insn->off < 0) /* TODO */
1182 		return -EOPNOTSUPP;
1183 
1184 	if (!imm) {
1185 		emit_alu(nfp_prog, reg_none(), reg_a(insn->dst_reg * 2),
1186 			 ALU_OP_OR, reg_b(insn->dst_reg * 2 + 1));
1187 		emit_br(nfp_prog, BR_BNE, insn->off, 0);
1188 	}
1189 
1190 	tmp_reg = ur_load_imm_any(nfp_prog, imm & ~0U, imm_b(nfp_prog));
1191 	emit_alu(nfp_prog, reg_none(),
1192 		 reg_a(insn->dst_reg * 2), ALU_OP_XOR, tmp_reg);
1193 	emit_br(nfp_prog, BR_BNE, insn->off, 0);
1194 
1195 	tmp_reg = ur_load_imm_any(nfp_prog, imm >> 32, imm_b(nfp_prog));
1196 	emit_alu(nfp_prog, reg_none(),
1197 		 reg_a(insn->dst_reg * 2 + 1), ALU_OP_XOR, tmp_reg);
1198 	emit_br(nfp_prog, BR_BNE, insn->off, 0);
1199 
1200 	return 0;
1201 }
1202 
1203 static int jeq_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1204 {
1205 	const struct bpf_insn *insn = &meta->insn;
1206 
1207 	if (insn->off < 0) /* TODO */
1208 		return -EOPNOTSUPP;
1209 
1210 	emit_alu(nfp_prog, imm_a(nfp_prog), reg_a(insn->dst_reg * 2),
1211 		 ALU_OP_XOR, reg_b(insn->src_reg * 2));
1212 	emit_alu(nfp_prog, imm_b(nfp_prog), reg_a(insn->dst_reg * 2 + 1),
1213 		 ALU_OP_XOR, reg_b(insn->src_reg * 2 + 1));
1214 	emit_alu(nfp_prog, reg_none(),
1215 		 imm_a(nfp_prog), ALU_OP_OR, imm_b(nfp_prog));
1216 	emit_br(nfp_prog, BR_BEQ, insn->off, 0);
1217 
1218 	return 0;
1219 }
1220 
1221 static int jgt_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1222 {
1223 	return wrp_cmp_reg(nfp_prog, meta, BR_BLO, false);
1224 }
1225 
1226 static int jge_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1227 {
1228 	return wrp_cmp_reg(nfp_prog, meta, BR_BHS, true);
1229 }
1230 
1231 static int jlt_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1232 {
1233 	return wrp_cmp_reg(nfp_prog, meta, BR_BHS, false);
1234 }
1235 
1236 static int jle_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1237 {
1238 	return wrp_cmp_reg(nfp_prog, meta, BR_BLO, true);
1239 }
1240 
1241 static int jset_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1242 {
1243 	return wrp_test_reg(nfp_prog, meta, ALU_OP_AND, BR_BNE);
1244 }
1245 
1246 static int jne_reg(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1247 {
1248 	return wrp_test_reg(nfp_prog, meta, ALU_OP_XOR, BR_BNE);
1249 }
1250 
1251 static int goto_out(struct nfp_prog *nfp_prog, struct nfp_insn_meta *meta)
1252 {
1253 	wrp_br_special(nfp_prog, BR_UNC, OP_BR_GO_OUT);
1254 
1255 	return 0;
1256 }
1257 
1258 static const instr_cb_t instr_cb[256] = {
1259 	[BPF_ALU64 | BPF_MOV | BPF_X] =	mov_reg64,
1260 	[BPF_ALU64 | BPF_MOV | BPF_K] =	mov_imm64,
1261 	[BPF_ALU64 | BPF_XOR | BPF_X] =	xor_reg64,
1262 	[BPF_ALU64 | BPF_XOR | BPF_K] =	xor_imm64,
1263 	[BPF_ALU64 | BPF_AND | BPF_X] =	and_reg64,
1264 	[BPF_ALU64 | BPF_AND | BPF_K] =	and_imm64,
1265 	[BPF_ALU64 | BPF_OR | BPF_X] =	or_reg64,
1266 	[BPF_ALU64 | BPF_OR | BPF_K] =	or_imm64,
1267 	[BPF_ALU64 | BPF_ADD | BPF_X] =	add_reg64,
1268 	[BPF_ALU64 | BPF_ADD | BPF_K] =	add_imm64,
1269 	[BPF_ALU64 | BPF_SUB | BPF_X] =	sub_reg64,
1270 	[BPF_ALU64 | BPF_SUB | BPF_K] =	sub_imm64,
1271 	[BPF_ALU64 | BPF_LSH | BPF_K] =	shl_imm64,
1272 	[BPF_ALU64 | BPF_RSH | BPF_K] =	shr_imm64,
1273 	[BPF_ALU | BPF_MOV | BPF_X] =	mov_reg,
1274 	[BPF_ALU | BPF_MOV | BPF_K] =	mov_imm,
1275 	[BPF_ALU | BPF_XOR | BPF_X] =	xor_reg,
1276 	[BPF_ALU | BPF_XOR | BPF_K] =	xor_imm,
1277 	[BPF_ALU | BPF_AND | BPF_X] =	and_reg,
1278 	[BPF_ALU | BPF_AND | BPF_K] =	and_imm,
1279 	[BPF_ALU | BPF_OR | BPF_X] =	or_reg,
1280 	[BPF_ALU | BPF_OR | BPF_K] =	or_imm,
1281 	[BPF_ALU | BPF_ADD | BPF_X] =	add_reg,
1282 	[BPF_ALU | BPF_ADD | BPF_K] =	add_imm,
1283 	[BPF_ALU | BPF_SUB | BPF_X] =	sub_reg,
1284 	[BPF_ALU | BPF_SUB | BPF_K] =	sub_imm,
1285 	[BPF_ALU | BPF_LSH | BPF_K] =	shl_imm,
1286 	[BPF_LD | BPF_IMM | BPF_DW] =	imm_ld8,
1287 	[BPF_LD | BPF_ABS | BPF_B] =	data_ld1,
1288 	[BPF_LD | BPF_ABS | BPF_H] =	data_ld2,
1289 	[BPF_LD | BPF_ABS | BPF_W] =	data_ld4,
1290 	[BPF_LD | BPF_IND | BPF_B] =	data_ind_ld1,
1291 	[BPF_LD | BPF_IND | BPF_H] =	data_ind_ld2,
1292 	[BPF_LD | BPF_IND | BPF_W] =	data_ind_ld4,
1293 	[BPF_LDX | BPF_MEM | BPF_W] =	mem_ldx4,
1294 	[BPF_STX | BPF_MEM | BPF_W] =	mem_stx4,
1295 	[BPF_JMP | BPF_JA | BPF_K] =	jump,
1296 	[BPF_JMP | BPF_JEQ | BPF_K] =	jeq_imm,
1297 	[BPF_JMP | BPF_JGT | BPF_K] =	jgt_imm,
1298 	[BPF_JMP | BPF_JGE | BPF_K] =	jge_imm,
1299 	[BPF_JMP | BPF_JLT | BPF_K] =	jlt_imm,
1300 	[BPF_JMP | BPF_JLE | BPF_K] =	jle_imm,
1301 	[BPF_JMP | BPF_JSET | BPF_K] =	jset_imm,
1302 	[BPF_JMP | BPF_JNE | BPF_K] =	jne_imm,
1303 	[BPF_JMP | BPF_JEQ | BPF_X] =	jeq_reg,
1304 	[BPF_JMP | BPF_JGT | BPF_X] =	jgt_reg,
1305 	[BPF_JMP | BPF_JGE | BPF_X] =	jge_reg,
1306 	[BPF_JMP | BPF_JLT | BPF_X] =	jlt_reg,
1307 	[BPF_JMP | BPF_JLE | BPF_X] =	jle_reg,
1308 	[BPF_JMP | BPF_JSET | BPF_X] =	jset_reg,
1309 	[BPF_JMP | BPF_JNE | BPF_X] =	jne_reg,
1310 	[BPF_JMP | BPF_EXIT] =		goto_out,
1311 };
1312 
1313 /* --- Misc code --- */
1314 static void br_set_offset(u64 *instr, u16 offset)
1315 {
1316 	u16 addr_lo, addr_hi;
1317 
1318 	addr_lo = offset & (OP_BR_ADDR_LO >> __bf_shf(OP_BR_ADDR_LO));
1319 	addr_hi = offset != addr_lo;
1320 	*instr &= ~(OP_BR_ADDR_HI | OP_BR_ADDR_LO);
1321 	*instr |= FIELD_PREP(OP_BR_ADDR_HI, addr_hi);
1322 	*instr |= FIELD_PREP(OP_BR_ADDR_LO, addr_lo);
1323 }
1324 
1325 /* --- Assembler logic --- */
1326 static int nfp_fixup_branches(struct nfp_prog *nfp_prog)
1327 {
1328 	struct nfp_insn_meta *meta, *next;
1329 	u32 off, br_idx;
1330 	u32 idx;
1331 
1332 	nfp_for_each_insn_walk2(nfp_prog, meta, next) {
1333 		if (meta->skip)
1334 			continue;
1335 		if (BPF_CLASS(meta->insn.code) != BPF_JMP)
1336 			continue;
1337 
1338 		br_idx = nfp_prog_offset_to_index(nfp_prog, next->off) - 1;
1339 		if (!nfp_is_br(nfp_prog->prog[br_idx])) {
1340 			pr_err("Fixup found block not ending in branch %d %02x %016llx!!\n",
1341 			       br_idx, meta->insn.code, nfp_prog->prog[br_idx]);
1342 			return -ELOOP;
1343 		}
1344 		/* Leave special branches for later */
1345 		if (FIELD_GET(OP_BR_SPECIAL, nfp_prog->prog[br_idx]))
1346 			continue;
1347 
1348 		/* Find the target offset in assembler realm */
1349 		off = meta->insn.off;
1350 		if (!off) {
1351 			pr_err("Fixup found zero offset!!\n");
1352 			return -ELOOP;
1353 		}
1354 
1355 		while (off && nfp_meta_has_next(nfp_prog, next)) {
1356 			next = nfp_meta_next(next);
1357 			off--;
1358 		}
1359 		if (off) {
1360 			pr_err("Fixup found too large jump!! %d\n", off);
1361 			return -ELOOP;
1362 		}
1363 
1364 		if (next->skip) {
1365 			pr_err("Branch landing on removed instruction!!\n");
1366 			return -ELOOP;
1367 		}
1368 
1369 		for (idx = nfp_prog_offset_to_index(nfp_prog, meta->off);
1370 		     idx <= br_idx; idx++) {
1371 			if (!nfp_is_br(nfp_prog->prog[idx]))
1372 				continue;
1373 			br_set_offset(&nfp_prog->prog[idx], next->off);
1374 		}
1375 	}
1376 
1377 	/* Fixup 'goto out's separately, they can be scattered around */
1378 	for (br_idx = 0; br_idx < nfp_prog->prog_len; br_idx++) {
1379 		enum br_special special;
1380 
1381 		if ((nfp_prog->prog[br_idx] & OP_BR_BASE_MASK) != OP_BR_BASE)
1382 			continue;
1383 
1384 		special = FIELD_GET(OP_BR_SPECIAL, nfp_prog->prog[br_idx]);
1385 		switch (special) {
1386 		case OP_BR_NORMAL:
1387 			break;
1388 		case OP_BR_GO_OUT:
1389 			br_set_offset(&nfp_prog->prog[br_idx],
1390 				      nfp_prog->tgt_out);
1391 			break;
1392 		case OP_BR_GO_ABORT:
1393 			br_set_offset(&nfp_prog->prog[br_idx],
1394 				      nfp_prog->tgt_abort);
1395 			break;
1396 		}
1397 
1398 		nfp_prog->prog[br_idx] &= ~OP_BR_SPECIAL;
1399 	}
1400 
1401 	return 0;
1402 }
1403 
1404 static void nfp_intro(struct nfp_prog *nfp_prog)
1405 {
1406 	emit_alu(nfp_prog, pkt_reg(nfp_prog),
1407 		 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_PKT);
1408 }
1409 
1410 static void nfp_outro_tc_legacy(struct nfp_prog *nfp_prog)
1411 {
1412 	const u8 act2code[] = {
1413 		[NN_ACT_TC_DROP]  = 0x22,
1414 		[NN_ACT_TC_REDIR] = 0x24
1415 	};
1416 	/* Target for aborts */
1417 	nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog);
1418 	wrp_immed(nfp_prog, reg_both(0), 0);
1419 
1420 	/* Target for normal exits */
1421 	nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog);
1422 	/* Legacy TC mode:
1423 	 *   0        0x11 -> pass,  count as stat0
1424 	 *  -1  drop  0x22 -> drop,  count as stat1
1425 	 *     redir  0x24 -> redir, count as stat1
1426 	 *  ife mark  0x21 -> pass,  count as stat1
1427 	 *  ife + tx  0x24 -> redir, count as stat1
1428 	 */
1429 	emit_br_byte_neq(nfp_prog, reg_b(0), 0xff, 0, nfp_prog->tgt_done, 2);
1430 	emit_alu(nfp_prog, reg_a(0),
1431 		 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_FLAGS);
1432 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x11), SHF_SC_L_SHF, 16);
1433 
1434 	emit_br(nfp_prog, BR_UNC, nfp_prog->tgt_done, 1);
1435 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(act2code[nfp_prog->act]),
1436 		      SHF_SC_L_SHF, 16);
1437 }
1438 
1439 static void nfp_outro_tc_da(struct nfp_prog *nfp_prog)
1440 {
1441 	/* TC direct-action mode:
1442 	 *   0,1   ok        NOT SUPPORTED[1]
1443 	 *   2   drop  0x22 -> drop,  count as stat1
1444 	 *   4,5 nuke  0x02 -> drop
1445 	 *   7  redir  0x44 -> redir, count as stat2
1446 	 *   * unspec  0x11 -> pass,  count as stat0
1447 	 *
1448 	 * [1] We can't support OK and RECLASSIFY because we can't tell TC
1449 	 *     the exact decision made.  We are forced to support UNSPEC
1450 	 *     to handle aborts so that's the only one we handle for passing
1451 	 *     packets up the stack.
1452 	 */
1453 	/* Target for aborts */
1454 	nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog);
1455 
1456 	emit_br_def(nfp_prog, nfp_prog->tgt_done, 2);
1457 
1458 	emit_alu(nfp_prog, reg_a(0),
1459 		 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_FLAGS);
1460 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x11), SHF_SC_L_SHF, 16);
1461 
1462 	/* Target for normal exits */
1463 	nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog);
1464 
1465 	/* if R0 > 7 jump to abort */
1466 	emit_alu(nfp_prog, reg_none(), reg_imm(7), ALU_OP_SUB, reg_b(0));
1467 	emit_br(nfp_prog, BR_BLO, nfp_prog->tgt_abort, 0);
1468 	emit_alu(nfp_prog, reg_a(0),
1469 		 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_FLAGS);
1470 
1471 	wrp_immed(nfp_prog, reg_b(2), 0x41221211);
1472 	wrp_immed(nfp_prog, reg_b(3), 0x41001211);
1473 
1474 	emit_shf(nfp_prog, reg_a(1),
1475 		 reg_none(), SHF_OP_NONE, reg_b(0), SHF_SC_L_SHF, 2);
1476 
1477 	emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0));
1478 	emit_shf(nfp_prog, reg_a(2),
1479 		 reg_imm(0xf), SHF_OP_AND, reg_b(2), SHF_SC_R_SHF, 0);
1480 
1481 	emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0));
1482 	emit_shf(nfp_prog, reg_b(2),
1483 		 reg_imm(0xf), SHF_OP_AND, reg_b(3), SHF_SC_R_SHF, 0);
1484 
1485 	emit_br_def(nfp_prog, nfp_prog->tgt_done, 2);
1486 
1487 	emit_shf(nfp_prog, reg_b(2),
1488 		 reg_a(2), SHF_OP_OR, reg_b(2), SHF_SC_L_SHF, 4);
1489 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_b(2), SHF_SC_L_SHF, 16);
1490 }
1491 
1492 static void nfp_outro_xdp(struct nfp_prog *nfp_prog)
1493 {
1494 	/* XDP return codes:
1495 	 *   0 aborted  0x82 -> drop,  count as stat3
1496 	 *   1    drop  0x22 -> drop,  count as stat1
1497 	 *   2    pass  0x11 -> pass,  count as stat0
1498 	 *   3      tx  0x44 -> redir, count as stat2
1499 	 *   * unknown  0x82 -> drop,  count as stat3
1500 	 */
1501 	/* Target for aborts */
1502 	nfp_prog->tgt_abort = nfp_prog_current_offset(nfp_prog);
1503 
1504 	emit_br_def(nfp_prog, nfp_prog->tgt_done, 2);
1505 
1506 	emit_alu(nfp_prog, reg_a(0),
1507 		 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_FLAGS);
1508 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_imm(0x82), SHF_SC_L_SHF, 16);
1509 
1510 	/* Target for normal exits */
1511 	nfp_prog->tgt_out = nfp_prog_current_offset(nfp_prog);
1512 
1513 	/* if R0 > 3 jump to abort */
1514 	emit_alu(nfp_prog, reg_none(), reg_imm(3), ALU_OP_SUB, reg_b(0));
1515 	emit_br(nfp_prog, BR_BLO, nfp_prog->tgt_abort, 0);
1516 
1517 	wrp_immed(nfp_prog, reg_b(2), 0x44112282);
1518 
1519 	emit_shf(nfp_prog, reg_a(1),
1520 		 reg_none(), SHF_OP_NONE, reg_b(0), SHF_SC_L_SHF, 3);
1521 
1522 	emit_alu(nfp_prog, reg_none(), reg_a(1), ALU_OP_OR, reg_imm(0));
1523 	emit_shf(nfp_prog, reg_b(2),
1524 		 reg_imm(0xff), SHF_OP_AND, reg_b(2), SHF_SC_R_SHF, 0);
1525 
1526 	emit_br_def(nfp_prog, nfp_prog->tgt_done, 2);
1527 
1528 	emit_alu(nfp_prog, reg_a(0),
1529 		 reg_none(), ALU_OP_NONE, NFP_BPF_ABI_FLAGS);
1530 	emit_ld_field(nfp_prog, reg_a(0), 0xc, reg_b(2), SHF_SC_L_SHF, 16);
1531 }
1532 
1533 static void nfp_outro(struct nfp_prog *nfp_prog)
1534 {
1535 	switch (nfp_prog->act) {
1536 	case NN_ACT_DIRECT:
1537 		nfp_outro_tc_da(nfp_prog);
1538 		break;
1539 	case NN_ACT_TC_DROP:
1540 	case NN_ACT_TC_REDIR:
1541 		nfp_outro_tc_legacy(nfp_prog);
1542 		break;
1543 	case NN_ACT_XDP:
1544 		nfp_outro_xdp(nfp_prog);
1545 		break;
1546 	}
1547 }
1548 
1549 static int nfp_translate(struct nfp_prog *nfp_prog)
1550 {
1551 	struct nfp_insn_meta *meta;
1552 	int err;
1553 
1554 	nfp_intro(nfp_prog);
1555 	if (nfp_prog->error)
1556 		return nfp_prog->error;
1557 
1558 	list_for_each_entry(meta, &nfp_prog->insns, l) {
1559 		instr_cb_t cb = instr_cb[meta->insn.code];
1560 
1561 		meta->off = nfp_prog_current_offset(nfp_prog);
1562 
1563 		if (meta->skip) {
1564 			nfp_prog->n_translated++;
1565 			continue;
1566 		}
1567 
1568 		if (nfp_meta_has_prev(nfp_prog, meta) &&
1569 		    nfp_meta_prev(meta)->double_cb)
1570 			cb = nfp_meta_prev(meta)->double_cb;
1571 		if (!cb)
1572 			return -ENOENT;
1573 		err = cb(nfp_prog, meta);
1574 		if (err)
1575 			return err;
1576 
1577 		nfp_prog->n_translated++;
1578 	}
1579 
1580 	nfp_outro(nfp_prog);
1581 	if (nfp_prog->error)
1582 		return nfp_prog->error;
1583 
1584 	return nfp_fixup_branches(nfp_prog);
1585 }
1586 
1587 static int
1588 nfp_prog_prepare(struct nfp_prog *nfp_prog, const struct bpf_insn *prog,
1589 		 unsigned int cnt)
1590 {
1591 	unsigned int i;
1592 
1593 	for (i = 0; i < cnt; i++) {
1594 		struct nfp_insn_meta *meta;
1595 
1596 		meta = kzalloc(sizeof(*meta), GFP_KERNEL);
1597 		if (!meta)
1598 			return -ENOMEM;
1599 
1600 		meta->insn = prog[i];
1601 		meta->n = i;
1602 
1603 		list_add_tail(&meta->l, &nfp_prog->insns);
1604 	}
1605 
1606 	return 0;
1607 }
1608 
1609 /* --- Optimizations --- */
1610 static void nfp_bpf_opt_reg_init(struct nfp_prog *nfp_prog)
1611 {
1612 	struct nfp_insn_meta *meta;
1613 
1614 	list_for_each_entry(meta, &nfp_prog->insns, l) {
1615 		struct bpf_insn insn = meta->insn;
1616 
1617 		/* Programs converted from cBPF start with register xoring */
1618 		if (insn.code == (BPF_ALU64 | BPF_XOR | BPF_X) &&
1619 		    insn.src_reg == insn.dst_reg)
1620 			continue;
1621 
1622 		/* Programs start with R6 = R1 but we ignore the skb pointer */
1623 		if (insn.code == (BPF_ALU64 | BPF_MOV | BPF_X) &&
1624 		    insn.src_reg == 1 && insn.dst_reg == 6)
1625 			meta->skip = true;
1626 
1627 		/* Return as soon as something doesn't match */
1628 		if (!meta->skip)
1629 			return;
1630 	}
1631 }
1632 
1633 /* Remove masking after load since our load guarantees this is not needed */
1634 static void nfp_bpf_opt_ld_mask(struct nfp_prog *nfp_prog)
1635 {
1636 	struct nfp_insn_meta *meta1, *meta2;
1637 	const s32 exp_mask[] = {
1638 		[BPF_B] = 0x000000ffU,
1639 		[BPF_H] = 0x0000ffffU,
1640 		[BPF_W] = 0xffffffffU,
1641 	};
1642 
1643 	nfp_for_each_insn_walk2(nfp_prog, meta1, meta2) {
1644 		struct bpf_insn insn, next;
1645 
1646 		insn = meta1->insn;
1647 		next = meta2->insn;
1648 
1649 		if (BPF_CLASS(insn.code) != BPF_LD)
1650 			continue;
1651 		if (BPF_MODE(insn.code) != BPF_ABS &&
1652 		    BPF_MODE(insn.code) != BPF_IND)
1653 			continue;
1654 
1655 		if (next.code != (BPF_ALU64 | BPF_AND | BPF_K))
1656 			continue;
1657 
1658 		if (!exp_mask[BPF_SIZE(insn.code)])
1659 			continue;
1660 		if (exp_mask[BPF_SIZE(insn.code)] != next.imm)
1661 			continue;
1662 
1663 		if (next.src_reg || next.dst_reg)
1664 			continue;
1665 
1666 		meta2->skip = true;
1667 	}
1668 }
1669 
1670 static void nfp_bpf_opt_ld_shift(struct nfp_prog *nfp_prog)
1671 {
1672 	struct nfp_insn_meta *meta1, *meta2, *meta3;
1673 
1674 	nfp_for_each_insn_walk3(nfp_prog, meta1, meta2, meta3) {
1675 		struct bpf_insn insn, next1, next2;
1676 
1677 		insn = meta1->insn;
1678 		next1 = meta2->insn;
1679 		next2 = meta3->insn;
1680 
1681 		if (BPF_CLASS(insn.code) != BPF_LD)
1682 			continue;
1683 		if (BPF_MODE(insn.code) != BPF_ABS &&
1684 		    BPF_MODE(insn.code) != BPF_IND)
1685 			continue;
1686 		if (BPF_SIZE(insn.code) != BPF_W)
1687 			continue;
1688 
1689 		if (!(next1.code == (BPF_LSH | BPF_K | BPF_ALU64) &&
1690 		      next2.code == (BPF_RSH | BPF_K | BPF_ALU64)) &&
1691 		    !(next1.code == (BPF_RSH | BPF_K | BPF_ALU64) &&
1692 		      next2.code == (BPF_LSH | BPF_K | BPF_ALU64)))
1693 			continue;
1694 
1695 		if (next1.src_reg || next1.dst_reg ||
1696 		    next2.src_reg || next2.dst_reg)
1697 			continue;
1698 
1699 		if (next1.imm != 0x20 || next2.imm != 0x20)
1700 			continue;
1701 
1702 		meta2->skip = true;
1703 		meta3->skip = true;
1704 	}
1705 }
1706 
1707 static int nfp_bpf_optimize(struct nfp_prog *nfp_prog)
1708 {
1709 	nfp_bpf_opt_reg_init(nfp_prog);
1710 
1711 	nfp_bpf_opt_ld_mask(nfp_prog);
1712 	nfp_bpf_opt_ld_shift(nfp_prog);
1713 
1714 	return 0;
1715 }
1716 
1717 /**
1718  * nfp_bpf_jit() - translate BPF code into NFP assembly
1719  * @filter:	kernel BPF filter struct
1720  * @prog_mem:	memory to store assembler instructions
1721  * @act:	action attached to this eBPF program
1722  * @prog_start:	offset of the first instruction when loaded
1723  * @prog_done:	where to jump on exit
1724  * @prog_sz:	size of @prog_mem in instructions
1725  * @res:	achieved parameters of translation results
1726  */
1727 int
1728 nfp_bpf_jit(struct bpf_prog *filter, void *prog_mem,
1729 	    enum nfp_bpf_action_type act,
1730 	    unsigned int prog_start, unsigned int prog_done,
1731 	    unsigned int prog_sz, struct nfp_bpf_result *res)
1732 {
1733 	struct nfp_prog *nfp_prog;
1734 	int ret;
1735 
1736 	nfp_prog = kzalloc(sizeof(*nfp_prog), GFP_KERNEL);
1737 	if (!nfp_prog)
1738 		return -ENOMEM;
1739 
1740 	INIT_LIST_HEAD(&nfp_prog->insns);
1741 	nfp_prog->act = act;
1742 	nfp_prog->start_off = prog_start;
1743 	nfp_prog->tgt_done = prog_done;
1744 
1745 	ret = nfp_prog_prepare(nfp_prog, filter->insnsi, filter->len);
1746 	if (ret)
1747 		goto out;
1748 
1749 	ret = nfp_prog_verify(nfp_prog, filter);
1750 	if (ret)
1751 		goto out;
1752 
1753 	ret = nfp_bpf_optimize(nfp_prog);
1754 	if (ret)
1755 		goto out;
1756 
1757 	nfp_prog->num_regs = MAX_BPF_REG;
1758 	nfp_prog->regs_per_thread = 32;
1759 
1760 	nfp_prog->prog = prog_mem;
1761 	nfp_prog->__prog_alloc_len = prog_sz;
1762 
1763 	ret = nfp_translate(nfp_prog);
1764 	if (ret) {
1765 		pr_err("Translation failed with error %d (translated: %u)\n",
1766 		       ret, nfp_prog->n_translated);
1767 		ret = -EINVAL;
1768 	}
1769 
1770 	res->n_instr = nfp_prog->prog_len;
1771 	res->dense_mode = false;
1772 out:
1773 	nfp_prog_free(nfp_prog);
1774 
1775 	return ret;
1776 }
1777