xref: /linux/drivers/net/ethernet/intel/idpf/idpf_lib.c (revision 2c7e4a2663a1ab5a740c59c31991579b6b865a26)
1 // SPDX-License-Identifier: GPL-2.0-only
2 /* Copyright (C) 2023 Intel Corporation */
3 
4 #include "idpf.h"
5 #include "idpf_virtchnl.h"
6 #include "idpf_ptp.h"
7 
8 static const struct net_device_ops idpf_netdev_ops;
9 
10 /**
11  * idpf_init_vector_stack - Fill the MSIX vector stack with vector index
12  * @adapter: private data struct
13  *
14  * Return 0 on success, error on failure
15  */
idpf_init_vector_stack(struct idpf_adapter * adapter)16 static int idpf_init_vector_stack(struct idpf_adapter *adapter)
17 {
18 	struct idpf_vector_lifo *stack;
19 	u16 min_vec;
20 	u32 i;
21 
22 	mutex_lock(&adapter->vector_lock);
23 	min_vec = adapter->num_msix_entries - adapter->num_avail_msix;
24 	stack = &adapter->vector_stack;
25 	stack->size = adapter->num_msix_entries;
26 	/* set the base and top to point at start of the 'free pool' to
27 	 * distribute the unused vectors on-demand basis
28 	 */
29 	stack->base = min_vec;
30 	stack->top = min_vec;
31 
32 	stack->vec_idx = kcalloc(stack->size, sizeof(u16), GFP_KERNEL);
33 	if (!stack->vec_idx) {
34 		mutex_unlock(&adapter->vector_lock);
35 
36 		return -ENOMEM;
37 	}
38 
39 	for (i = 0; i < stack->size; i++)
40 		stack->vec_idx[i] = i;
41 
42 	mutex_unlock(&adapter->vector_lock);
43 
44 	return 0;
45 }
46 
47 /**
48  * idpf_deinit_vector_stack - zero out the MSIX vector stack
49  * @adapter: private data struct
50  */
idpf_deinit_vector_stack(struct idpf_adapter * adapter)51 static void idpf_deinit_vector_stack(struct idpf_adapter *adapter)
52 {
53 	struct idpf_vector_lifo *stack;
54 
55 	mutex_lock(&adapter->vector_lock);
56 	stack = &adapter->vector_stack;
57 	kfree(stack->vec_idx);
58 	stack->vec_idx = NULL;
59 	mutex_unlock(&adapter->vector_lock);
60 }
61 
62 /**
63  * idpf_mb_intr_rel_irq - Free the IRQ association with the OS
64  * @adapter: adapter structure
65  *
66  * This will also disable interrupt mode and queue up mailbox task. Mailbox
67  * task will reschedule itself if not in interrupt mode.
68  */
idpf_mb_intr_rel_irq(struct idpf_adapter * adapter)69 static void idpf_mb_intr_rel_irq(struct idpf_adapter *adapter)
70 {
71 	clear_bit(IDPF_MB_INTR_MODE, adapter->flags);
72 	kfree(free_irq(adapter->msix_entries[0].vector, adapter));
73 	queue_delayed_work(adapter->mbx_wq, &adapter->mbx_task, 0);
74 }
75 
76 /**
77  * idpf_intr_rel - Release interrupt capabilities and free memory
78  * @adapter: adapter to disable interrupts on
79  */
idpf_intr_rel(struct idpf_adapter * adapter)80 void idpf_intr_rel(struct idpf_adapter *adapter)
81 {
82 	if (!adapter->msix_entries)
83 		return;
84 
85 	idpf_mb_intr_rel_irq(adapter);
86 	pci_free_irq_vectors(adapter->pdev);
87 	idpf_send_dealloc_vectors_msg(adapter);
88 	idpf_deinit_vector_stack(adapter);
89 	kfree(adapter->msix_entries);
90 	adapter->msix_entries = NULL;
91 }
92 
93 /**
94  * idpf_mb_intr_clean - Interrupt handler for the mailbox
95  * @irq: interrupt number
96  * @data: pointer to the adapter structure
97  */
idpf_mb_intr_clean(int __always_unused irq,void * data)98 static irqreturn_t idpf_mb_intr_clean(int __always_unused irq, void *data)
99 {
100 	struct idpf_adapter *adapter = (struct idpf_adapter *)data;
101 
102 	queue_delayed_work(adapter->mbx_wq, &adapter->mbx_task, 0);
103 
104 	return IRQ_HANDLED;
105 }
106 
107 /**
108  * idpf_mb_irq_enable - Enable MSIX interrupt for the mailbox
109  * @adapter: adapter to get the hardware address for register write
110  */
idpf_mb_irq_enable(struct idpf_adapter * adapter)111 static void idpf_mb_irq_enable(struct idpf_adapter *adapter)
112 {
113 	struct idpf_intr_reg *intr = &adapter->mb_vector.intr_reg;
114 	u32 val;
115 
116 	val = intr->dyn_ctl_intena_m | intr->dyn_ctl_itridx_m;
117 	writel(val, intr->dyn_ctl);
118 	writel(intr->icr_ena_ctlq_m, intr->icr_ena);
119 }
120 
121 /**
122  * idpf_mb_intr_req_irq - Request irq for the mailbox interrupt
123  * @adapter: adapter structure to pass to the mailbox irq handler
124  */
idpf_mb_intr_req_irq(struct idpf_adapter * adapter)125 static int idpf_mb_intr_req_irq(struct idpf_adapter *adapter)
126 {
127 	int irq_num, mb_vidx = 0, err;
128 	char *name;
129 
130 	irq_num = adapter->msix_entries[mb_vidx].vector;
131 	name = kasprintf(GFP_KERNEL, "%s-%s-%d",
132 			 dev_driver_string(&adapter->pdev->dev),
133 			 "Mailbox", mb_vidx);
134 	err = request_irq(irq_num, adapter->irq_mb_handler, 0, name, adapter);
135 	if (err) {
136 		dev_err(&adapter->pdev->dev,
137 			"IRQ request for mailbox failed, error: %d\n", err);
138 
139 		return err;
140 	}
141 
142 	set_bit(IDPF_MB_INTR_MODE, adapter->flags);
143 
144 	return 0;
145 }
146 
147 /**
148  * idpf_mb_intr_init - Initialize the mailbox interrupt
149  * @adapter: adapter structure to store the mailbox vector
150  */
idpf_mb_intr_init(struct idpf_adapter * adapter)151 static int idpf_mb_intr_init(struct idpf_adapter *adapter)
152 {
153 	adapter->dev_ops.reg_ops.mb_intr_reg_init(adapter);
154 	adapter->irq_mb_handler = idpf_mb_intr_clean;
155 
156 	return idpf_mb_intr_req_irq(adapter);
157 }
158 
159 /**
160  * idpf_vector_lifo_push - push MSIX vector index onto stack
161  * @adapter: private data struct
162  * @vec_idx: vector index to store
163  */
idpf_vector_lifo_push(struct idpf_adapter * adapter,u16 vec_idx)164 static int idpf_vector_lifo_push(struct idpf_adapter *adapter, u16 vec_idx)
165 {
166 	struct idpf_vector_lifo *stack = &adapter->vector_stack;
167 
168 	lockdep_assert_held(&adapter->vector_lock);
169 
170 	if (stack->top == stack->base) {
171 		dev_err(&adapter->pdev->dev, "Exceeded the vector stack limit: %d\n",
172 			stack->top);
173 		return -EINVAL;
174 	}
175 
176 	stack->vec_idx[--stack->top] = vec_idx;
177 
178 	return 0;
179 }
180 
181 /**
182  * idpf_vector_lifo_pop - pop MSIX vector index from stack
183  * @adapter: private data struct
184  */
idpf_vector_lifo_pop(struct idpf_adapter * adapter)185 static int idpf_vector_lifo_pop(struct idpf_adapter *adapter)
186 {
187 	struct idpf_vector_lifo *stack = &adapter->vector_stack;
188 
189 	lockdep_assert_held(&adapter->vector_lock);
190 
191 	if (stack->top == stack->size) {
192 		dev_err(&adapter->pdev->dev, "No interrupt vectors are available to distribute!\n");
193 
194 		return -EINVAL;
195 	}
196 
197 	return stack->vec_idx[stack->top++];
198 }
199 
200 /**
201  * idpf_vector_stash - Store the vector indexes onto the stack
202  * @adapter: private data struct
203  * @q_vector_idxs: vector index array
204  * @vec_info: info related to the number of vectors
205  *
206  * This function is a no-op if there are no vectors indexes to be stashed
207  */
idpf_vector_stash(struct idpf_adapter * adapter,u16 * q_vector_idxs,struct idpf_vector_info * vec_info)208 static void idpf_vector_stash(struct idpf_adapter *adapter, u16 *q_vector_idxs,
209 			      struct idpf_vector_info *vec_info)
210 {
211 	int i, base = 0;
212 	u16 vec_idx;
213 
214 	lockdep_assert_held(&adapter->vector_lock);
215 
216 	if (!vec_info->num_curr_vecs)
217 		return;
218 
219 	/* For default vports, no need to stash vector allocated from the
220 	 * default pool onto the stack
221 	 */
222 	if (vec_info->default_vport)
223 		base = IDPF_MIN_Q_VEC;
224 
225 	for (i = vec_info->num_curr_vecs - 1; i >= base ; i--) {
226 		vec_idx = q_vector_idxs[i];
227 		idpf_vector_lifo_push(adapter, vec_idx);
228 		adapter->num_avail_msix++;
229 	}
230 }
231 
232 /**
233  * idpf_req_rel_vector_indexes - Request or release MSIX vector indexes
234  * @adapter: driver specific private structure
235  * @q_vector_idxs: vector index array
236  * @vec_info: info related to the number of vectors
237  *
238  * This is the core function to distribute the MSIX vectors acquired from the
239  * OS. It expects the caller to pass the number of vectors required and
240  * also previously allocated. First, it stashes previously allocated vector
241  * indexes on to the stack and then figures out if it can allocate requested
242  * vectors. It can wait on acquiring the mutex lock. If the caller passes 0 as
243  * requested vectors, then this function just stashes the already allocated
244  * vectors and returns 0.
245  *
246  * Returns actual number of vectors allocated on success, error value on failure
247  * If 0 is returned, implies the stack has no vectors to allocate which is also
248  * a failure case for the caller
249  */
idpf_req_rel_vector_indexes(struct idpf_adapter * adapter,u16 * q_vector_idxs,struct idpf_vector_info * vec_info)250 int idpf_req_rel_vector_indexes(struct idpf_adapter *adapter,
251 				u16 *q_vector_idxs,
252 				struct idpf_vector_info *vec_info)
253 {
254 	u16 num_req_vecs, num_alloc_vecs = 0, max_vecs;
255 	struct idpf_vector_lifo *stack;
256 	int i, j, vecid;
257 
258 	mutex_lock(&adapter->vector_lock);
259 	stack = &adapter->vector_stack;
260 	num_req_vecs = vec_info->num_req_vecs;
261 
262 	/* Stash interrupt vector indexes onto the stack if required */
263 	idpf_vector_stash(adapter, q_vector_idxs, vec_info);
264 
265 	if (!num_req_vecs)
266 		goto rel_lock;
267 
268 	if (vec_info->default_vport) {
269 		/* As IDPF_MIN_Q_VEC per default vport is put aside in the
270 		 * default pool of the stack, use them for default vports
271 		 */
272 		j = vec_info->index * IDPF_MIN_Q_VEC + IDPF_MBX_Q_VEC;
273 		for (i = 0; i < IDPF_MIN_Q_VEC; i++) {
274 			q_vector_idxs[num_alloc_vecs++] = stack->vec_idx[j++];
275 			num_req_vecs--;
276 		}
277 	}
278 
279 	/* Find if stack has enough vector to allocate */
280 	max_vecs = min(adapter->num_avail_msix, num_req_vecs);
281 
282 	for (j = 0; j < max_vecs; j++) {
283 		vecid = idpf_vector_lifo_pop(adapter);
284 		q_vector_idxs[num_alloc_vecs++] = vecid;
285 	}
286 	adapter->num_avail_msix -= max_vecs;
287 
288 rel_lock:
289 	mutex_unlock(&adapter->vector_lock);
290 
291 	return num_alloc_vecs;
292 }
293 
294 /**
295  * idpf_intr_req - Request interrupt capabilities
296  * @adapter: adapter to enable interrupts on
297  *
298  * Returns 0 on success, negative on failure
299  */
idpf_intr_req(struct idpf_adapter * adapter)300 int idpf_intr_req(struct idpf_adapter *adapter)
301 {
302 	u16 default_vports = idpf_get_default_vports(adapter);
303 	int num_q_vecs, total_vecs, num_vec_ids;
304 	int min_vectors, v_actual, err;
305 	unsigned int vector;
306 	u16 *vecids;
307 
308 	total_vecs = idpf_get_reserved_vecs(adapter);
309 	num_q_vecs = total_vecs - IDPF_MBX_Q_VEC;
310 
311 	err = idpf_send_alloc_vectors_msg(adapter, num_q_vecs);
312 	if (err) {
313 		dev_err(&adapter->pdev->dev,
314 			"Failed to allocate %d vectors: %d\n", num_q_vecs, err);
315 
316 		return -EAGAIN;
317 	}
318 
319 	min_vectors = IDPF_MBX_Q_VEC + IDPF_MIN_Q_VEC * default_vports;
320 	v_actual = pci_alloc_irq_vectors(adapter->pdev, min_vectors,
321 					 total_vecs, PCI_IRQ_MSIX);
322 	if (v_actual < min_vectors) {
323 		dev_err(&adapter->pdev->dev, "Failed to allocate MSIX vectors: %d\n",
324 			v_actual);
325 		err = -EAGAIN;
326 		goto send_dealloc_vecs;
327 	}
328 
329 	adapter->msix_entries = kcalloc(v_actual, sizeof(struct msix_entry),
330 					GFP_KERNEL);
331 
332 	if (!adapter->msix_entries) {
333 		err = -ENOMEM;
334 		goto free_irq;
335 	}
336 
337 	adapter->mb_vector.v_idx = le16_to_cpu(adapter->caps.mailbox_vector_id);
338 
339 	vecids = kcalloc(total_vecs, sizeof(u16), GFP_KERNEL);
340 	if (!vecids) {
341 		err = -ENOMEM;
342 		goto free_msix;
343 	}
344 
345 	num_vec_ids = idpf_get_vec_ids(adapter, vecids, total_vecs,
346 				       &adapter->req_vec_chunks->vchunks);
347 	if (num_vec_ids < v_actual) {
348 		err = -EINVAL;
349 		goto free_vecids;
350 	}
351 
352 	for (vector = 0; vector < v_actual; vector++) {
353 		adapter->msix_entries[vector].entry = vecids[vector];
354 		adapter->msix_entries[vector].vector =
355 			pci_irq_vector(adapter->pdev, vector);
356 	}
357 
358 	adapter->num_req_msix = total_vecs;
359 	adapter->num_msix_entries = v_actual;
360 	/* 'num_avail_msix' is used to distribute excess vectors to the vports
361 	 * after considering the minimum vectors required per each default
362 	 * vport
363 	 */
364 	adapter->num_avail_msix = v_actual - min_vectors;
365 
366 	/* Fill MSIX vector lifo stack with vector indexes */
367 	err = idpf_init_vector_stack(adapter);
368 	if (err)
369 		goto free_vecids;
370 
371 	err = idpf_mb_intr_init(adapter);
372 	if (err)
373 		goto deinit_vec_stack;
374 	idpf_mb_irq_enable(adapter);
375 	kfree(vecids);
376 
377 	return 0;
378 
379 deinit_vec_stack:
380 	idpf_deinit_vector_stack(adapter);
381 free_vecids:
382 	kfree(vecids);
383 free_msix:
384 	kfree(adapter->msix_entries);
385 	adapter->msix_entries = NULL;
386 free_irq:
387 	pci_free_irq_vectors(adapter->pdev);
388 send_dealloc_vecs:
389 	idpf_send_dealloc_vectors_msg(adapter);
390 
391 	return err;
392 }
393 
394 /**
395  * idpf_find_mac_filter - Search filter list for specific mac filter
396  * @vconfig: Vport config structure
397  * @macaddr: The MAC address
398  *
399  * Returns ptr to the filter object or NULL. Must be called while holding the
400  * mac_filter_list_lock.
401  **/
idpf_find_mac_filter(struct idpf_vport_config * vconfig,const u8 * macaddr)402 static struct idpf_mac_filter *idpf_find_mac_filter(struct idpf_vport_config *vconfig,
403 						    const u8 *macaddr)
404 {
405 	struct idpf_mac_filter *f;
406 
407 	if (!macaddr)
408 		return NULL;
409 
410 	list_for_each_entry(f, &vconfig->user_config.mac_filter_list, list) {
411 		if (ether_addr_equal(macaddr, f->macaddr))
412 			return f;
413 	}
414 
415 	return NULL;
416 }
417 
418 /**
419  * __idpf_del_mac_filter - Delete a MAC filter from the filter list
420  * @vport_config: Vport config structure
421  * @macaddr: The MAC address
422  *
423  * Returns 0 on success, error value on failure
424  **/
__idpf_del_mac_filter(struct idpf_vport_config * vport_config,const u8 * macaddr)425 static int __idpf_del_mac_filter(struct idpf_vport_config *vport_config,
426 				 const u8 *macaddr)
427 {
428 	struct idpf_mac_filter *f;
429 
430 	spin_lock_bh(&vport_config->mac_filter_list_lock);
431 	f = idpf_find_mac_filter(vport_config, macaddr);
432 	if (f) {
433 		list_del(&f->list);
434 		kfree(f);
435 	}
436 	spin_unlock_bh(&vport_config->mac_filter_list_lock);
437 
438 	return 0;
439 }
440 
441 /**
442  * idpf_del_mac_filter - Delete a MAC filter from the filter list
443  * @vport: Main vport structure
444  * @np: Netdev private structure
445  * @macaddr: The MAC address
446  * @async: Don't wait for return message
447  *
448  * Removes filter from list and if interface is up, tells hardware about the
449  * removed filter.
450  **/
idpf_del_mac_filter(struct idpf_vport * vport,struct idpf_netdev_priv * np,const u8 * macaddr,bool async)451 static int idpf_del_mac_filter(struct idpf_vport *vport,
452 			       struct idpf_netdev_priv *np,
453 			       const u8 *macaddr, bool async)
454 {
455 	struct idpf_vport_config *vport_config;
456 	struct idpf_mac_filter *f;
457 
458 	vport_config = np->adapter->vport_config[np->vport_idx];
459 
460 	spin_lock_bh(&vport_config->mac_filter_list_lock);
461 	f = idpf_find_mac_filter(vport_config, macaddr);
462 	if (f) {
463 		f->remove = true;
464 	} else {
465 		spin_unlock_bh(&vport_config->mac_filter_list_lock);
466 
467 		return -EINVAL;
468 	}
469 	spin_unlock_bh(&vport_config->mac_filter_list_lock);
470 
471 	if (np->state == __IDPF_VPORT_UP) {
472 		int err;
473 
474 		err = idpf_add_del_mac_filters(vport, np, false, async);
475 		if (err)
476 			return err;
477 	}
478 
479 	return  __idpf_del_mac_filter(vport_config, macaddr);
480 }
481 
482 /**
483  * __idpf_add_mac_filter - Add mac filter helper function
484  * @vport_config: Vport config structure
485  * @macaddr: Address to add
486  *
487  * Takes mac_filter_list_lock spinlock to add new filter to list.
488  */
__idpf_add_mac_filter(struct idpf_vport_config * vport_config,const u8 * macaddr)489 static int __idpf_add_mac_filter(struct idpf_vport_config *vport_config,
490 				 const u8 *macaddr)
491 {
492 	struct idpf_mac_filter *f;
493 
494 	spin_lock_bh(&vport_config->mac_filter_list_lock);
495 
496 	f = idpf_find_mac_filter(vport_config, macaddr);
497 	if (f) {
498 		f->remove = false;
499 		spin_unlock_bh(&vport_config->mac_filter_list_lock);
500 
501 		return 0;
502 	}
503 
504 	f = kzalloc(sizeof(*f), GFP_ATOMIC);
505 	if (!f) {
506 		spin_unlock_bh(&vport_config->mac_filter_list_lock);
507 
508 		return -ENOMEM;
509 	}
510 
511 	ether_addr_copy(f->macaddr, macaddr);
512 	list_add_tail(&f->list, &vport_config->user_config.mac_filter_list);
513 	f->add = true;
514 
515 	spin_unlock_bh(&vport_config->mac_filter_list_lock);
516 
517 	return 0;
518 }
519 
520 /**
521  * idpf_add_mac_filter - Add a mac filter to the filter list
522  * @vport: Main vport structure
523  * @np: Netdev private structure
524  * @macaddr: The MAC address
525  * @async: Don't wait for return message
526  *
527  * Returns 0 on success or error on failure. If interface is up, we'll also
528  * send the virtchnl message to tell hardware about the filter.
529  **/
idpf_add_mac_filter(struct idpf_vport * vport,struct idpf_netdev_priv * np,const u8 * macaddr,bool async)530 static int idpf_add_mac_filter(struct idpf_vport *vport,
531 			       struct idpf_netdev_priv *np,
532 			       const u8 *macaddr, bool async)
533 {
534 	struct idpf_vport_config *vport_config;
535 	int err;
536 
537 	vport_config = np->adapter->vport_config[np->vport_idx];
538 	err = __idpf_add_mac_filter(vport_config, macaddr);
539 	if (err)
540 		return err;
541 
542 	if (np->state == __IDPF_VPORT_UP)
543 		err = idpf_add_del_mac_filters(vport, np, true, async);
544 
545 	return err;
546 }
547 
548 /**
549  * idpf_del_all_mac_filters - Delete all MAC filters in list
550  * @vport: main vport struct
551  *
552  * Takes mac_filter_list_lock spinlock.  Deletes all filters
553  */
idpf_del_all_mac_filters(struct idpf_vport * vport)554 static void idpf_del_all_mac_filters(struct idpf_vport *vport)
555 {
556 	struct idpf_vport_config *vport_config;
557 	struct idpf_mac_filter *f, *ftmp;
558 
559 	vport_config = vport->adapter->vport_config[vport->idx];
560 	spin_lock_bh(&vport_config->mac_filter_list_lock);
561 
562 	list_for_each_entry_safe(f, ftmp, &vport_config->user_config.mac_filter_list,
563 				 list) {
564 		list_del(&f->list);
565 		kfree(f);
566 	}
567 
568 	spin_unlock_bh(&vport_config->mac_filter_list_lock);
569 }
570 
571 /**
572  * idpf_restore_mac_filters - Re-add all MAC filters in list
573  * @vport: main vport struct
574  *
575  * Takes mac_filter_list_lock spinlock.  Sets add field to true for filters to
576  * resync filters back to HW.
577  */
idpf_restore_mac_filters(struct idpf_vport * vport)578 static void idpf_restore_mac_filters(struct idpf_vport *vport)
579 {
580 	struct idpf_vport_config *vport_config;
581 	struct idpf_mac_filter *f;
582 
583 	vport_config = vport->adapter->vport_config[vport->idx];
584 	spin_lock_bh(&vport_config->mac_filter_list_lock);
585 
586 	list_for_each_entry(f, &vport_config->user_config.mac_filter_list, list)
587 		f->add = true;
588 
589 	spin_unlock_bh(&vport_config->mac_filter_list_lock);
590 
591 	idpf_add_del_mac_filters(vport, netdev_priv(vport->netdev),
592 				 true, false);
593 }
594 
595 /**
596  * idpf_remove_mac_filters - Remove all MAC filters in list
597  * @vport: main vport struct
598  *
599  * Takes mac_filter_list_lock spinlock. Sets remove field to true for filters
600  * to remove filters in HW.
601  */
idpf_remove_mac_filters(struct idpf_vport * vport)602 static void idpf_remove_mac_filters(struct idpf_vport *vport)
603 {
604 	struct idpf_vport_config *vport_config;
605 	struct idpf_mac_filter *f;
606 
607 	vport_config = vport->adapter->vport_config[vport->idx];
608 	spin_lock_bh(&vport_config->mac_filter_list_lock);
609 
610 	list_for_each_entry(f, &vport_config->user_config.mac_filter_list, list)
611 		f->remove = true;
612 
613 	spin_unlock_bh(&vport_config->mac_filter_list_lock);
614 
615 	idpf_add_del_mac_filters(vport, netdev_priv(vport->netdev),
616 				 false, false);
617 }
618 
619 /**
620  * idpf_deinit_mac_addr - deinitialize mac address for vport
621  * @vport: main vport structure
622  */
idpf_deinit_mac_addr(struct idpf_vport * vport)623 static void idpf_deinit_mac_addr(struct idpf_vport *vport)
624 {
625 	struct idpf_vport_config *vport_config;
626 	struct idpf_mac_filter *f;
627 
628 	vport_config = vport->adapter->vport_config[vport->idx];
629 
630 	spin_lock_bh(&vport_config->mac_filter_list_lock);
631 
632 	f = idpf_find_mac_filter(vport_config, vport->default_mac_addr);
633 	if (f) {
634 		list_del(&f->list);
635 		kfree(f);
636 	}
637 
638 	spin_unlock_bh(&vport_config->mac_filter_list_lock);
639 }
640 
641 /**
642  * idpf_init_mac_addr - initialize mac address for vport
643  * @vport: main vport structure
644  * @netdev: pointer to netdev struct associated with this vport
645  */
idpf_init_mac_addr(struct idpf_vport * vport,struct net_device * netdev)646 static int idpf_init_mac_addr(struct idpf_vport *vport,
647 			      struct net_device *netdev)
648 {
649 	struct idpf_netdev_priv *np = netdev_priv(netdev);
650 	struct idpf_adapter *adapter = vport->adapter;
651 	int err;
652 
653 	if (is_valid_ether_addr(vport->default_mac_addr)) {
654 		eth_hw_addr_set(netdev, vport->default_mac_addr);
655 		ether_addr_copy(netdev->perm_addr, vport->default_mac_addr);
656 
657 		return idpf_add_mac_filter(vport, np, vport->default_mac_addr,
658 					   false);
659 	}
660 
661 	if (!idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS,
662 			     VIRTCHNL2_CAP_MACFILTER)) {
663 		dev_err(&adapter->pdev->dev,
664 			"MAC address is not provided and capability is not set\n");
665 
666 		return -EINVAL;
667 	}
668 
669 	eth_hw_addr_random(netdev);
670 	err = idpf_add_mac_filter(vport, np, netdev->dev_addr, false);
671 	if (err)
672 		return err;
673 
674 	dev_info(&adapter->pdev->dev, "Invalid MAC address %pM, using random %pM\n",
675 		 vport->default_mac_addr, netdev->dev_addr);
676 	ether_addr_copy(vport->default_mac_addr, netdev->dev_addr);
677 
678 	return 0;
679 }
680 
681 /**
682  * idpf_cfg_netdev - Allocate, configure and register a netdev
683  * @vport: main vport structure
684  *
685  * Returns 0 on success, negative value on failure.
686  */
idpf_cfg_netdev(struct idpf_vport * vport)687 static int idpf_cfg_netdev(struct idpf_vport *vport)
688 {
689 	struct idpf_adapter *adapter = vport->adapter;
690 	struct idpf_vport_config *vport_config;
691 	netdev_features_t other_offloads = 0;
692 	netdev_features_t csum_offloads = 0;
693 	netdev_features_t tso_offloads = 0;
694 	netdev_features_t dflt_features;
695 	struct idpf_netdev_priv *np;
696 	struct net_device *netdev;
697 	u16 idx = vport->idx;
698 	int err;
699 
700 	vport_config = adapter->vport_config[idx];
701 
702 	/* It's possible we already have a netdev allocated and registered for
703 	 * this vport
704 	 */
705 	if (test_bit(IDPF_VPORT_REG_NETDEV, vport_config->flags)) {
706 		netdev = adapter->netdevs[idx];
707 		np = netdev_priv(netdev);
708 		np->vport = vport;
709 		np->vport_idx = vport->idx;
710 		np->vport_id = vport->vport_id;
711 		np->max_tx_hdr_size = idpf_get_max_tx_hdr_size(adapter);
712 		vport->netdev = netdev;
713 
714 		return idpf_init_mac_addr(vport, netdev);
715 	}
716 
717 	netdev = alloc_etherdev_mqs(sizeof(struct idpf_netdev_priv),
718 				    vport_config->max_q.max_txq,
719 				    vport_config->max_q.max_rxq);
720 	if (!netdev)
721 		return -ENOMEM;
722 
723 	vport->netdev = netdev;
724 	np = netdev_priv(netdev);
725 	np->vport = vport;
726 	np->adapter = adapter;
727 	np->vport_idx = vport->idx;
728 	np->vport_id = vport->vport_id;
729 	np->max_tx_hdr_size = idpf_get_max_tx_hdr_size(adapter);
730 
731 	spin_lock_init(&np->stats_lock);
732 
733 	err = idpf_init_mac_addr(vport, netdev);
734 	if (err) {
735 		free_netdev(vport->netdev);
736 		vport->netdev = NULL;
737 
738 		return err;
739 	}
740 
741 	/* assign netdev_ops */
742 	netdev->netdev_ops = &idpf_netdev_ops;
743 
744 	/* setup watchdog timeout value to be 5 second */
745 	netdev->watchdog_timeo = 5 * HZ;
746 
747 	netdev->dev_port = idx;
748 
749 	/* configure default MTU size */
750 	netdev->min_mtu = ETH_MIN_MTU;
751 	netdev->max_mtu = vport->max_mtu;
752 
753 	dflt_features = NETIF_F_SG	|
754 			NETIF_F_HIGHDMA;
755 
756 	if (idpf_is_cap_ena_all(adapter, IDPF_RSS_CAPS, IDPF_CAP_RSS))
757 		dflt_features |= NETIF_F_RXHASH;
758 	if (idpf_is_cap_ena_all(adapter, IDPF_CSUM_CAPS, IDPF_CAP_TX_CSUM_L4V4))
759 		csum_offloads |= NETIF_F_IP_CSUM;
760 	if (idpf_is_cap_ena_all(adapter, IDPF_CSUM_CAPS, IDPF_CAP_TX_CSUM_L4V6))
761 		csum_offloads |= NETIF_F_IPV6_CSUM;
762 	if (idpf_is_cap_ena(adapter, IDPF_CSUM_CAPS, IDPF_CAP_RX_CSUM))
763 		csum_offloads |= NETIF_F_RXCSUM;
764 	if (idpf_is_cap_ena_all(adapter, IDPF_CSUM_CAPS, IDPF_CAP_TX_SCTP_CSUM))
765 		csum_offloads |= NETIF_F_SCTP_CRC;
766 
767 	if (idpf_is_cap_ena(adapter, IDPF_SEG_CAPS, VIRTCHNL2_CAP_SEG_IPV4_TCP))
768 		tso_offloads |= NETIF_F_TSO;
769 	if (idpf_is_cap_ena(adapter, IDPF_SEG_CAPS, VIRTCHNL2_CAP_SEG_IPV6_TCP))
770 		tso_offloads |= NETIF_F_TSO6;
771 	if (idpf_is_cap_ena_all(adapter, IDPF_SEG_CAPS,
772 				VIRTCHNL2_CAP_SEG_IPV4_UDP |
773 				VIRTCHNL2_CAP_SEG_IPV6_UDP))
774 		tso_offloads |= NETIF_F_GSO_UDP_L4;
775 	if (idpf_is_cap_ena_all(adapter, IDPF_RSC_CAPS, IDPF_CAP_RSC))
776 		other_offloads |= NETIF_F_GRO_HW;
777 	if (idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_LOOPBACK))
778 		other_offloads |= NETIF_F_LOOPBACK;
779 
780 	netdev->features |= dflt_features | csum_offloads | tso_offloads;
781 	netdev->hw_features |=  netdev->features | other_offloads;
782 	netdev->vlan_features |= netdev->features | other_offloads;
783 	netdev->hw_enc_features |= dflt_features | other_offloads;
784 	idpf_set_ethtool_ops(netdev);
785 	netif_set_affinity_auto(netdev);
786 	SET_NETDEV_DEV(netdev, &adapter->pdev->dev);
787 
788 	/* carrier off on init to avoid Tx hangs */
789 	netif_carrier_off(netdev);
790 
791 	/* make sure transmit queues start off as stopped */
792 	netif_tx_stop_all_queues(netdev);
793 
794 	/* The vport can be arbitrarily released so we need to also track
795 	 * netdevs in the adapter struct
796 	 */
797 	adapter->netdevs[idx] = netdev;
798 
799 	return 0;
800 }
801 
802 /**
803  * idpf_get_free_slot - get the next non-NULL location index in array
804  * @adapter: adapter in which to look for a free vport slot
805  */
idpf_get_free_slot(struct idpf_adapter * adapter)806 static int idpf_get_free_slot(struct idpf_adapter *adapter)
807 {
808 	unsigned int i;
809 
810 	for (i = 0; i < adapter->max_vports; i++) {
811 		if (!adapter->vports[i])
812 			return i;
813 	}
814 
815 	return IDPF_NO_FREE_SLOT;
816 }
817 
818 /**
819  * idpf_remove_features - Turn off feature configs
820  * @vport: virtual port structure
821  */
idpf_remove_features(struct idpf_vport * vport)822 static void idpf_remove_features(struct idpf_vport *vport)
823 {
824 	struct idpf_adapter *adapter = vport->adapter;
825 
826 	if (idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_MACFILTER))
827 		idpf_remove_mac_filters(vport);
828 }
829 
830 /**
831  * idpf_vport_stop - Disable a vport
832  * @vport: vport to disable
833  */
idpf_vport_stop(struct idpf_vport * vport)834 static void idpf_vport_stop(struct idpf_vport *vport)
835 {
836 	struct idpf_netdev_priv *np = netdev_priv(vport->netdev);
837 
838 	if (np->state <= __IDPF_VPORT_DOWN)
839 		return;
840 
841 	netif_carrier_off(vport->netdev);
842 	netif_tx_disable(vport->netdev);
843 
844 	idpf_send_disable_vport_msg(vport);
845 	idpf_send_disable_queues_msg(vport);
846 	idpf_send_map_unmap_queue_vector_msg(vport, false);
847 	/* Normally we ask for queues in create_vport, but if the number of
848 	 * initially requested queues have changed, for example via ethtool
849 	 * set channels, we do delete queues and then add the queues back
850 	 * instead of deleting and reallocating the vport.
851 	 */
852 	if (test_and_clear_bit(IDPF_VPORT_DEL_QUEUES, vport->flags))
853 		idpf_send_delete_queues_msg(vport);
854 
855 	idpf_remove_features(vport);
856 
857 	vport->link_up = false;
858 	idpf_vport_intr_deinit(vport);
859 	idpf_vport_queues_rel(vport);
860 	idpf_vport_intr_rel(vport);
861 	np->state = __IDPF_VPORT_DOWN;
862 }
863 
864 /**
865  * idpf_stop - Disables a network interface
866  * @netdev: network interface device structure
867  *
868  * The stop entry point is called when an interface is de-activated by the OS,
869  * and the netdevice enters the DOWN state.  The hardware is still under the
870  * driver's control, but the netdev interface is disabled.
871  *
872  * Returns success only - not allowed to fail
873  */
idpf_stop(struct net_device * netdev)874 static int idpf_stop(struct net_device *netdev)
875 {
876 	struct idpf_netdev_priv *np = netdev_priv(netdev);
877 	struct idpf_vport *vport;
878 
879 	if (test_bit(IDPF_REMOVE_IN_PROG, np->adapter->flags))
880 		return 0;
881 
882 	idpf_vport_ctrl_lock(netdev);
883 	vport = idpf_netdev_to_vport(netdev);
884 
885 	idpf_vport_stop(vport);
886 
887 	idpf_vport_ctrl_unlock(netdev);
888 
889 	return 0;
890 }
891 
892 /**
893  * idpf_decfg_netdev - Unregister the netdev
894  * @vport: vport for which netdev to be unregistered
895  */
idpf_decfg_netdev(struct idpf_vport * vport)896 static void idpf_decfg_netdev(struct idpf_vport *vport)
897 {
898 	struct idpf_adapter *adapter = vport->adapter;
899 	u16 idx = vport->idx;
900 
901 	kfree(vport->rx_ptype_lkup);
902 	vport->rx_ptype_lkup = NULL;
903 
904 	if (test_and_clear_bit(IDPF_VPORT_REG_NETDEV,
905 			       adapter->vport_config[idx]->flags)) {
906 		unregister_netdev(vport->netdev);
907 		free_netdev(vport->netdev);
908 	}
909 	vport->netdev = NULL;
910 
911 	adapter->netdevs[idx] = NULL;
912 }
913 
914 /**
915  * idpf_vport_rel - Delete a vport and free its resources
916  * @vport: the vport being removed
917  */
idpf_vport_rel(struct idpf_vport * vport)918 static void idpf_vport_rel(struct idpf_vport *vport)
919 {
920 	struct idpf_adapter *adapter = vport->adapter;
921 	struct idpf_vport_config *vport_config;
922 	struct idpf_vector_info vec_info;
923 	struct idpf_rss_data *rss_data;
924 	struct idpf_vport_max_q max_q;
925 	u16 idx = vport->idx;
926 
927 	vport_config = adapter->vport_config[vport->idx];
928 	idpf_deinit_rss(vport);
929 	rss_data = &vport_config->user_config.rss_data;
930 	kfree(rss_data->rss_key);
931 	rss_data->rss_key = NULL;
932 
933 	idpf_send_destroy_vport_msg(vport);
934 
935 	/* Release all max queues allocated to the adapter's pool */
936 	max_q.max_rxq = vport_config->max_q.max_rxq;
937 	max_q.max_txq = vport_config->max_q.max_txq;
938 	max_q.max_bufq = vport_config->max_q.max_bufq;
939 	max_q.max_complq = vport_config->max_q.max_complq;
940 	idpf_vport_dealloc_max_qs(adapter, &max_q);
941 
942 	/* Release all the allocated vectors on the stack */
943 	vec_info.num_req_vecs = 0;
944 	vec_info.num_curr_vecs = vport->num_q_vectors;
945 	vec_info.default_vport = vport->default_vport;
946 
947 	idpf_req_rel_vector_indexes(adapter, vport->q_vector_idxs, &vec_info);
948 
949 	kfree(vport->q_vector_idxs);
950 	vport->q_vector_idxs = NULL;
951 
952 	kfree(adapter->vport_params_recvd[idx]);
953 	adapter->vport_params_recvd[idx] = NULL;
954 	kfree(adapter->vport_params_reqd[idx]);
955 	adapter->vport_params_reqd[idx] = NULL;
956 	if (adapter->vport_config[idx]) {
957 		kfree(adapter->vport_config[idx]->req_qs_chunks);
958 		adapter->vport_config[idx]->req_qs_chunks = NULL;
959 	}
960 	kfree(vport);
961 	adapter->num_alloc_vports--;
962 }
963 
964 /**
965  * idpf_vport_dealloc - cleanup and release a given vport
966  * @vport: pointer to idpf vport structure
967  *
968  * returns nothing
969  */
idpf_vport_dealloc(struct idpf_vport * vport)970 static void idpf_vport_dealloc(struct idpf_vport *vport)
971 {
972 	struct idpf_adapter *adapter = vport->adapter;
973 	unsigned int i = vport->idx;
974 
975 	idpf_deinit_mac_addr(vport);
976 	idpf_vport_stop(vport);
977 
978 	if (!test_bit(IDPF_HR_RESET_IN_PROG, adapter->flags))
979 		idpf_decfg_netdev(vport);
980 	if (test_bit(IDPF_REMOVE_IN_PROG, adapter->flags))
981 		idpf_del_all_mac_filters(vport);
982 
983 	if (adapter->netdevs[i]) {
984 		struct idpf_netdev_priv *np = netdev_priv(adapter->netdevs[i]);
985 
986 		np->vport = NULL;
987 	}
988 
989 	idpf_vport_rel(vport);
990 
991 	adapter->vports[i] = NULL;
992 	adapter->next_vport = idpf_get_free_slot(adapter);
993 }
994 
995 /**
996  * idpf_is_hsplit_supported - check whether the header split is supported
997  * @vport: virtual port to check the capability for
998  *
999  * Return: true if it's supported by the HW/FW, false if not.
1000  */
idpf_is_hsplit_supported(const struct idpf_vport * vport)1001 static bool idpf_is_hsplit_supported(const struct idpf_vport *vport)
1002 {
1003 	return idpf_is_queue_model_split(vport->rxq_model) &&
1004 	       idpf_is_cap_ena_all(vport->adapter, IDPF_HSPLIT_CAPS,
1005 				   IDPF_CAP_HSPLIT);
1006 }
1007 
1008 /**
1009  * idpf_vport_get_hsplit - get the current header split feature state
1010  * @vport: virtual port to query the state for
1011  *
1012  * Return: ``ETHTOOL_TCP_DATA_SPLIT_UNKNOWN`` if not supported,
1013  *         ``ETHTOOL_TCP_DATA_SPLIT_DISABLED`` if disabled,
1014  *         ``ETHTOOL_TCP_DATA_SPLIT_ENABLED`` if active.
1015  */
idpf_vport_get_hsplit(const struct idpf_vport * vport)1016 u8 idpf_vport_get_hsplit(const struct idpf_vport *vport)
1017 {
1018 	const struct idpf_vport_user_config_data *config;
1019 
1020 	if (!idpf_is_hsplit_supported(vport))
1021 		return ETHTOOL_TCP_DATA_SPLIT_UNKNOWN;
1022 
1023 	config = &vport->adapter->vport_config[vport->idx]->user_config;
1024 
1025 	return test_bit(__IDPF_USER_FLAG_HSPLIT, config->user_flags) ?
1026 	       ETHTOOL_TCP_DATA_SPLIT_ENABLED :
1027 	       ETHTOOL_TCP_DATA_SPLIT_DISABLED;
1028 }
1029 
1030 /**
1031  * idpf_vport_set_hsplit - enable or disable header split on a given vport
1032  * @vport: virtual port to configure
1033  * @val: Ethtool flag controlling the header split state
1034  *
1035  * Return: true on success, false if not supported by the HW.
1036  */
idpf_vport_set_hsplit(const struct idpf_vport * vport,u8 val)1037 bool idpf_vport_set_hsplit(const struct idpf_vport *vport, u8 val)
1038 {
1039 	struct idpf_vport_user_config_data *config;
1040 
1041 	if (!idpf_is_hsplit_supported(vport))
1042 		return val == ETHTOOL_TCP_DATA_SPLIT_UNKNOWN;
1043 
1044 	config = &vport->adapter->vport_config[vport->idx]->user_config;
1045 
1046 	switch (val) {
1047 	case ETHTOOL_TCP_DATA_SPLIT_UNKNOWN:
1048 		/* Default is to enable */
1049 	case ETHTOOL_TCP_DATA_SPLIT_ENABLED:
1050 		__set_bit(__IDPF_USER_FLAG_HSPLIT, config->user_flags);
1051 		return true;
1052 	case ETHTOOL_TCP_DATA_SPLIT_DISABLED:
1053 		__clear_bit(__IDPF_USER_FLAG_HSPLIT, config->user_flags);
1054 		return true;
1055 	default:
1056 		return false;
1057 	}
1058 }
1059 
1060 /**
1061  * idpf_vport_alloc - Allocates the next available struct vport in the adapter
1062  * @adapter: board private structure
1063  * @max_q: vport max queue info
1064  *
1065  * returns a pointer to a vport on success, NULL on failure.
1066  */
idpf_vport_alloc(struct idpf_adapter * adapter,struct idpf_vport_max_q * max_q)1067 static struct idpf_vport *idpf_vport_alloc(struct idpf_adapter *adapter,
1068 					   struct idpf_vport_max_q *max_q)
1069 {
1070 	struct idpf_rss_data *rss_data;
1071 	u16 idx = adapter->next_vport;
1072 	struct idpf_vport *vport;
1073 	u16 num_max_q;
1074 
1075 	if (idx == IDPF_NO_FREE_SLOT)
1076 		return NULL;
1077 
1078 	vport = kzalloc(sizeof(*vport), GFP_KERNEL);
1079 	if (!vport)
1080 		return vport;
1081 
1082 	if (!adapter->vport_config[idx]) {
1083 		struct idpf_vport_config *vport_config;
1084 
1085 		vport_config = kzalloc(sizeof(*vport_config), GFP_KERNEL);
1086 		if (!vport_config) {
1087 			kfree(vport);
1088 
1089 			return NULL;
1090 		}
1091 
1092 		adapter->vport_config[idx] = vport_config;
1093 	}
1094 
1095 	vport->idx = idx;
1096 	vport->adapter = adapter;
1097 	vport->compln_clean_budget = IDPF_TX_COMPLQ_CLEAN_BUDGET;
1098 	vport->default_vport = adapter->num_alloc_vports <
1099 			       idpf_get_default_vports(adapter);
1100 
1101 	num_max_q = max(max_q->max_txq, max_q->max_rxq);
1102 	vport->q_vector_idxs = kcalloc(num_max_q, sizeof(u16), GFP_KERNEL);
1103 	if (!vport->q_vector_idxs)
1104 		goto free_vport;
1105 
1106 	idpf_vport_init(vport, max_q);
1107 
1108 	/* This alloc is done separate from the LUT because it's not strictly
1109 	 * dependent on how many queues we have. If we change number of queues
1110 	 * and soft reset we'll need a new LUT but the key can remain the same
1111 	 * for as long as the vport exists.
1112 	 */
1113 	rss_data = &adapter->vport_config[idx]->user_config.rss_data;
1114 	rss_data->rss_key = kzalloc(rss_data->rss_key_size, GFP_KERNEL);
1115 	if (!rss_data->rss_key)
1116 		goto free_vector_idxs;
1117 
1118 	/* Initialize default rss key */
1119 	netdev_rss_key_fill((void *)rss_data->rss_key, rss_data->rss_key_size);
1120 
1121 	/* fill vport slot in the adapter struct */
1122 	adapter->vports[idx] = vport;
1123 	adapter->vport_ids[idx] = idpf_get_vport_id(vport);
1124 
1125 	adapter->num_alloc_vports++;
1126 	/* prepare adapter->next_vport for next use */
1127 	adapter->next_vport = idpf_get_free_slot(adapter);
1128 
1129 	return vport;
1130 
1131 free_vector_idxs:
1132 	kfree(vport->q_vector_idxs);
1133 free_vport:
1134 	kfree(vport);
1135 
1136 	return NULL;
1137 }
1138 
1139 /**
1140  * idpf_get_stats64 - get statistics for network device structure
1141  * @netdev: network interface device structure
1142  * @stats: main device statistics structure
1143  */
idpf_get_stats64(struct net_device * netdev,struct rtnl_link_stats64 * stats)1144 static void idpf_get_stats64(struct net_device *netdev,
1145 			     struct rtnl_link_stats64 *stats)
1146 {
1147 	struct idpf_netdev_priv *np = netdev_priv(netdev);
1148 
1149 	spin_lock_bh(&np->stats_lock);
1150 	*stats = np->netstats;
1151 	spin_unlock_bh(&np->stats_lock);
1152 }
1153 
1154 /**
1155  * idpf_statistics_task - Delayed task to get statistics over mailbox
1156  * @work: work_struct handle to our data
1157  */
idpf_statistics_task(struct work_struct * work)1158 void idpf_statistics_task(struct work_struct *work)
1159 {
1160 	struct idpf_adapter *adapter;
1161 	int i;
1162 
1163 	adapter = container_of(work, struct idpf_adapter, stats_task.work);
1164 
1165 	for (i = 0; i < adapter->max_vports; i++) {
1166 		struct idpf_vport *vport = adapter->vports[i];
1167 
1168 		if (vport && !test_bit(IDPF_HR_RESET_IN_PROG, adapter->flags))
1169 			idpf_send_get_stats_msg(vport);
1170 	}
1171 
1172 	queue_delayed_work(adapter->stats_wq, &adapter->stats_task,
1173 			   msecs_to_jiffies(10000));
1174 }
1175 
1176 /**
1177  * idpf_mbx_task - Delayed task to handle mailbox responses
1178  * @work: work_struct handle
1179  */
idpf_mbx_task(struct work_struct * work)1180 void idpf_mbx_task(struct work_struct *work)
1181 {
1182 	struct idpf_adapter *adapter;
1183 
1184 	adapter = container_of(work, struct idpf_adapter, mbx_task.work);
1185 
1186 	if (test_bit(IDPF_MB_INTR_MODE, adapter->flags))
1187 		idpf_mb_irq_enable(adapter);
1188 	else
1189 		queue_delayed_work(adapter->mbx_wq, &adapter->mbx_task,
1190 				   msecs_to_jiffies(300));
1191 
1192 	idpf_recv_mb_msg(adapter);
1193 }
1194 
1195 /**
1196  * idpf_service_task - Delayed task for handling mailbox responses
1197  * @work: work_struct handle to our data
1198  *
1199  */
idpf_service_task(struct work_struct * work)1200 void idpf_service_task(struct work_struct *work)
1201 {
1202 	struct idpf_adapter *adapter;
1203 
1204 	adapter = container_of(work, struct idpf_adapter, serv_task.work);
1205 
1206 	if (idpf_is_reset_detected(adapter) &&
1207 	    !idpf_is_reset_in_prog(adapter) &&
1208 	    !test_bit(IDPF_REMOVE_IN_PROG, adapter->flags)) {
1209 		dev_info(&adapter->pdev->dev, "HW reset detected\n");
1210 		set_bit(IDPF_HR_FUNC_RESET, adapter->flags);
1211 		queue_delayed_work(adapter->vc_event_wq,
1212 				   &adapter->vc_event_task,
1213 				   msecs_to_jiffies(10));
1214 	}
1215 
1216 	queue_delayed_work(adapter->serv_wq, &adapter->serv_task,
1217 			   msecs_to_jiffies(300));
1218 }
1219 
1220 /**
1221  * idpf_restore_features - Restore feature configs
1222  * @vport: virtual port structure
1223  */
idpf_restore_features(struct idpf_vport * vport)1224 static void idpf_restore_features(struct idpf_vport *vport)
1225 {
1226 	struct idpf_adapter *adapter = vport->adapter;
1227 
1228 	if (idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_MACFILTER))
1229 		idpf_restore_mac_filters(vport);
1230 }
1231 
1232 /**
1233  * idpf_set_real_num_queues - set number of queues for netdev
1234  * @vport: virtual port structure
1235  *
1236  * Returns 0 on success, negative on failure.
1237  */
idpf_set_real_num_queues(struct idpf_vport * vport)1238 static int idpf_set_real_num_queues(struct idpf_vport *vport)
1239 {
1240 	int err;
1241 
1242 	err = netif_set_real_num_rx_queues(vport->netdev, vport->num_rxq);
1243 	if (err)
1244 		return err;
1245 
1246 	return netif_set_real_num_tx_queues(vport->netdev, vport->num_txq);
1247 }
1248 
1249 /**
1250  * idpf_up_complete - Complete interface up sequence
1251  * @vport: virtual port structure
1252  *
1253  * Returns 0 on success, negative on failure.
1254  */
idpf_up_complete(struct idpf_vport * vport)1255 static int idpf_up_complete(struct idpf_vport *vport)
1256 {
1257 	struct idpf_netdev_priv *np = netdev_priv(vport->netdev);
1258 
1259 	if (vport->link_up && !netif_carrier_ok(vport->netdev)) {
1260 		netif_carrier_on(vport->netdev);
1261 		netif_tx_start_all_queues(vport->netdev);
1262 	}
1263 
1264 	np->state = __IDPF_VPORT_UP;
1265 
1266 	return 0;
1267 }
1268 
1269 /**
1270  * idpf_rx_init_buf_tail - Write initial buffer ring tail value
1271  * @vport: virtual port struct
1272  */
idpf_rx_init_buf_tail(struct idpf_vport * vport)1273 static void idpf_rx_init_buf_tail(struct idpf_vport *vport)
1274 {
1275 	int i, j;
1276 
1277 	for (i = 0; i < vport->num_rxq_grp; i++) {
1278 		struct idpf_rxq_group *grp = &vport->rxq_grps[i];
1279 
1280 		if (idpf_is_queue_model_split(vport->rxq_model)) {
1281 			for (j = 0; j < vport->num_bufqs_per_qgrp; j++) {
1282 				const struct idpf_buf_queue *q =
1283 					&grp->splitq.bufq_sets[j].bufq;
1284 
1285 				writel(q->next_to_alloc, q->tail);
1286 			}
1287 		} else {
1288 			for (j = 0; j < grp->singleq.num_rxq; j++) {
1289 				const struct idpf_rx_queue *q =
1290 					grp->singleq.rxqs[j];
1291 
1292 				writel(q->next_to_alloc, q->tail);
1293 			}
1294 		}
1295 	}
1296 }
1297 
1298 /**
1299  * idpf_vport_open - Bring up a vport
1300  * @vport: vport to bring up
1301  */
idpf_vport_open(struct idpf_vport * vport)1302 static int idpf_vport_open(struct idpf_vport *vport)
1303 {
1304 	struct idpf_netdev_priv *np = netdev_priv(vport->netdev);
1305 	struct idpf_adapter *adapter = vport->adapter;
1306 	struct idpf_vport_config *vport_config;
1307 	int err;
1308 
1309 	if (np->state != __IDPF_VPORT_DOWN)
1310 		return -EBUSY;
1311 
1312 	/* we do not allow interface up just yet */
1313 	netif_carrier_off(vport->netdev);
1314 
1315 	err = idpf_vport_intr_alloc(vport);
1316 	if (err) {
1317 		dev_err(&adapter->pdev->dev, "Failed to allocate interrupts for vport %u: %d\n",
1318 			vport->vport_id, err);
1319 		return err;
1320 	}
1321 
1322 	err = idpf_vport_queues_alloc(vport);
1323 	if (err)
1324 		goto intr_rel;
1325 
1326 	err = idpf_vport_queue_ids_init(vport);
1327 	if (err) {
1328 		dev_err(&adapter->pdev->dev, "Failed to initialize queue ids for vport %u: %d\n",
1329 			vport->vport_id, err);
1330 		goto queues_rel;
1331 	}
1332 
1333 	err = idpf_vport_intr_init(vport);
1334 	if (err) {
1335 		dev_err(&adapter->pdev->dev, "Failed to initialize interrupts for vport %u: %d\n",
1336 			vport->vport_id, err);
1337 		goto queues_rel;
1338 	}
1339 
1340 	err = idpf_rx_bufs_init_all(vport);
1341 	if (err) {
1342 		dev_err(&adapter->pdev->dev, "Failed to initialize RX buffers for vport %u: %d\n",
1343 			vport->vport_id, err);
1344 		goto queues_rel;
1345 	}
1346 
1347 	err = idpf_queue_reg_init(vport);
1348 	if (err) {
1349 		dev_err(&adapter->pdev->dev, "Failed to initialize queue registers for vport %u: %d\n",
1350 			vport->vport_id, err);
1351 		goto queues_rel;
1352 	}
1353 
1354 	idpf_rx_init_buf_tail(vport);
1355 	idpf_vport_intr_ena(vport);
1356 
1357 	err = idpf_send_config_queues_msg(vport);
1358 	if (err) {
1359 		dev_err(&adapter->pdev->dev, "Failed to configure queues for vport %u, %d\n",
1360 			vport->vport_id, err);
1361 		goto intr_deinit;
1362 	}
1363 
1364 	err = idpf_send_map_unmap_queue_vector_msg(vport, true);
1365 	if (err) {
1366 		dev_err(&adapter->pdev->dev, "Failed to map queue vectors for vport %u: %d\n",
1367 			vport->vport_id, err);
1368 		goto intr_deinit;
1369 	}
1370 
1371 	err = idpf_send_enable_queues_msg(vport);
1372 	if (err) {
1373 		dev_err(&adapter->pdev->dev, "Failed to enable queues for vport %u: %d\n",
1374 			vport->vport_id, err);
1375 		goto unmap_queue_vectors;
1376 	}
1377 
1378 	err = idpf_send_enable_vport_msg(vport);
1379 	if (err) {
1380 		dev_err(&adapter->pdev->dev, "Failed to enable vport %u: %d\n",
1381 			vport->vport_id, err);
1382 		err = -EAGAIN;
1383 		goto disable_queues;
1384 	}
1385 
1386 	idpf_restore_features(vport);
1387 
1388 	vport_config = adapter->vport_config[vport->idx];
1389 	if (vport_config->user_config.rss_data.rss_lut)
1390 		err = idpf_config_rss(vport);
1391 	else
1392 		err = idpf_init_rss(vport);
1393 	if (err) {
1394 		dev_err(&adapter->pdev->dev, "Failed to initialize RSS for vport %u: %d\n",
1395 			vport->vport_id, err);
1396 		goto disable_vport;
1397 	}
1398 
1399 	err = idpf_up_complete(vport);
1400 	if (err) {
1401 		dev_err(&adapter->pdev->dev, "Failed to complete interface up for vport %u: %d\n",
1402 			vport->vport_id, err);
1403 		goto deinit_rss;
1404 	}
1405 
1406 	return 0;
1407 
1408 deinit_rss:
1409 	idpf_deinit_rss(vport);
1410 disable_vport:
1411 	idpf_send_disable_vport_msg(vport);
1412 disable_queues:
1413 	idpf_send_disable_queues_msg(vport);
1414 unmap_queue_vectors:
1415 	idpf_send_map_unmap_queue_vector_msg(vport, false);
1416 intr_deinit:
1417 	idpf_vport_intr_deinit(vport);
1418 queues_rel:
1419 	idpf_vport_queues_rel(vport);
1420 intr_rel:
1421 	idpf_vport_intr_rel(vport);
1422 
1423 	return err;
1424 }
1425 
1426 /**
1427  * idpf_init_task - Delayed initialization task
1428  * @work: work_struct handle to our data
1429  *
1430  * Init task finishes up pending work started in probe. Due to the asynchronous
1431  * nature in which the device communicates with hardware, we may have to wait
1432  * several milliseconds to get a response.  Instead of busy polling in probe,
1433  * pulling it out into a delayed work task prevents us from bogging down the
1434  * whole system waiting for a response from hardware.
1435  */
idpf_init_task(struct work_struct * work)1436 void idpf_init_task(struct work_struct *work)
1437 {
1438 	struct idpf_vport_config *vport_config;
1439 	struct idpf_vport_max_q max_q;
1440 	struct idpf_adapter *adapter;
1441 	struct idpf_netdev_priv *np;
1442 	struct idpf_vport *vport;
1443 	u16 num_default_vports;
1444 	struct pci_dev *pdev;
1445 	bool default_vport;
1446 	int index, err;
1447 
1448 	adapter = container_of(work, struct idpf_adapter, init_task.work);
1449 
1450 	num_default_vports = idpf_get_default_vports(adapter);
1451 	if (adapter->num_alloc_vports < num_default_vports)
1452 		default_vport = true;
1453 	else
1454 		default_vport = false;
1455 
1456 	err = idpf_vport_alloc_max_qs(adapter, &max_q);
1457 	if (err)
1458 		goto unwind_vports;
1459 
1460 	err = idpf_send_create_vport_msg(adapter, &max_q);
1461 	if (err) {
1462 		idpf_vport_dealloc_max_qs(adapter, &max_q);
1463 		goto unwind_vports;
1464 	}
1465 
1466 	pdev = adapter->pdev;
1467 	vport = idpf_vport_alloc(adapter, &max_q);
1468 	if (!vport) {
1469 		err = -EFAULT;
1470 		dev_err(&pdev->dev, "failed to allocate vport: %d\n",
1471 			err);
1472 		idpf_vport_dealloc_max_qs(adapter, &max_q);
1473 		goto unwind_vports;
1474 	}
1475 
1476 	index = vport->idx;
1477 	vport_config = adapter->vport_config[index];
1478 
1479 	init_waitqueue_head(&vport->sw_marker_wq);
1480 
1481 	spin_lock_init(&vport_config->mac_filter_list_lock);
1482 
1483 	INIT_LIST_HEAD(&vport_config->user_config.mac_filter_list);
1484 
1485 	err = idpf_check_supported_desc_ids(vport);
1486 	if (err) {
1487 		dev_err(&pdev->dev, "failed to get required descriptor ids\n");
1488 		goto cfg_netdev_err;
1489 	}
1490 
1491 	if (idpf_cfg_netdev(vport))
1492 		goto cfg_netdev_err;
1493 
1494 	err = idpf_send_get_rx_ptype_msg(vport);
1495 	if (err)
1496 		goto handle_err;
1497 
1498 	/* Once state is put into DOWN, driver is ready for dev_open */
1499 	np = netdev_priv(vport->netdev);
1500 	np->state = __IDPF_VPORT_DOWN;
1501 	if (test_and_clear_bit(IDPF_VPORT_UP_REQUESTED, vport_config->flags))
1502 		idpf_vport_open(vport);
1503 
1504 	/* Spawn and return 'idpf_init_task' work queue until all the
1505 	 * default vports are created
1506 	 */
1507 	if (adapter->num_alloc_vports < num_default_vports) {
1508 		queue_delayed_work(adapter->init_wq, &adapter->init_task,
1509 				   msecs_to_jiffies(5 * (adapter->pdev->devfn & 0x07)));
1510 
1511 		return;
1512 	}
1513 
1514 	for (index = 0; index < adapter->max_vports; index++) {
1515 		struct net_device *netdev = adapter->netdevs[index];
1516 		struct idpf_vport_config *vport_config;
1517 
1518 		vport_config = adapter->vport_config[index];
1519 
1520 		if (!netdev ||
1521 		    test_bit(IDPF_VPORT_REG_NETDEV, vport_config->flags))
1522 			continue;
1523 
1524 		err = register_netdev(netdev);
1525 		if (err) {
1526 			dev_err(&pdev->dev, "failed to register netdev for vport %d: %pe\n",
1527 				index, ERR_PTR(err));
1528 			continue;
1529 		}
1530 		set_bit(IDPF_VPORT_REG_NETDEV, vport_config->flags);
1531 	}
1532 
1533 	/* As all the required vports are created, clear the reset flag
1534 	 * unconditionally here in case we were in reset and the link was down.
1535 	 */
1536 	clear_bit(IDPF_HR_RESET_IN_PROG, adapter->flags);
1537 	/* Start the statistics task now */
1538 	queue_delayed_work(adapter->stats_wq, &adapter->stats_task,
1539 			   msecs_to_jiffies(10 * (pdev->devfn & 0x07)));
1540 
1541 	return;
1542 
1543 handle_err:
1544 	idpf_decfg_netdev(vport);
1545 cfg_netdev_err:
1546 	idpf_vport_rel(vport);
1547 	adapter->vports[index] = NULL;
1548 unwind_vports:
1549 	if (default_vport) {
1550 		for (index = 0; index < adapter->max_vports; index++) {
1551 			if (adapter->vports[index])
1552 				idpf_vport_dealloc(adapter->vports[index]);
1553 		}
1554 	}
1555 	clear_bit(IDPF_HR_RESET_IN_PROG, adapter->flags);
1556 }
1557 
1558 /**
1559  * idpf_sriov_ena - Enable or change number of VFs
1560  * @adapter: private data struct
1561  * @num_vfs: number of VFs to allocate
1562  */
idpf_sriov_ena(struct idpf_adapter * adapter,int num_vfs)1563 static int idpf_sriov_ena(struct idpf_adapter *adapter, int num_vfs)
1564 {
1565 	struct device *dev = &adapter->pdev->dev;
1566 	int err;
1567 
1568 	err = idpf_send_set_sriov_vfs_msg(adapter, num_vfs);
1569 	if (err) {
1570 		dev_err(dev, "Failed to allocate VFs: %d\n", err);
1571 
1572 		return err;
1573 	}
1574 
1575 	err = pci_enable_sriov(adapter->pdev, num_vfs);
1576 	if (err) {
1577 		idpf_send_set_sriov_vfs_msg(adapter, 0);
1578 		dev_err(dev, "Failed to enable SR-IOV: %d\n", err);
1579 
1580 		return err;
1581 	}
1582 
1583 	adapter->num_vfs = num_vfs;
1584 
1585 	return num_vfs;
1586 }
1587 
1588 /**
1589  * idpf_sriov_configure - Configure the requested VFs
1590  * @pdev: pointer to a pci_dev structure
1591  * @num_vfs: number of vfs to allocate
1592  *
1593  * Enable or change the number of VFs. Called when the user updates the number
1594  * of VFs in sysfs.
1595  **/
idpf_sriov_configure(struct pci_dev * pdev,int num_vfs)1596 int idpf_sriov_configure(struct pci_dev *pdev, int num_vfs)
1597 {
1598 	struct idpf_adapter *adapter = pci_get_drvdata(pdev);
1599 
1600 	if (!idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_SRIOV)) {
1601 		dev_info(&pdev->dev, "SR-IOV is not supported on this device\n");
1602 
1603 		return -EOPNOTSUPP;
1604 	}
1605 
1606 	if (num_vfs)
1607 		return idpf_sriov_ena(adapter, num_vfs);
1608 
1609 	if (pci_vfs_assigned(pdev)) {
1610 		dev_warn(&pdev->dev, "Unable to free VFs because some are assigned to VMs\n");
1611 
1612 		return -EBUSY;
1613 	}
1614 
1615 	pci_disable_sriov(adapter->pdev);
1616 	idpf_send_set_sriov_vfs_msg(adapter, 0);
1617 	adapter->num_vfs = 0;
1618 
1619 	return 0;
1620 }
1621 
1622 /**
1623  * idpf_deinit_task - Device deinit routine
1624  * @adapter: Driver specific private structure
1625  *
1626  * Extended remove logic which will be used for
1627  * hard reset as well
1628  */
idpf_deinit_task(struct idpf_adapter * adapter)1629 void idpf_deinit_task(struct idpf_adapter *adapter)
1630 {
1631 	unsigned int i;
1632 
1633 	/* Wait until the init_task is done else this thread might release
1634 	 * the resources first and the other thread might end up in a bad state
1635 	 */
1636 	cancel_delayed_work_sync(&adapter->init_task);
1637 
1638 	if (!adapter->vports)
1639 		return;
1640 
1641 	cancel_delayed_work_sync(&adapter->stats_task);
1642 
1643 	for (i = 0; i < adapter->max_vports; i++) {
1644 		if (adapter->vports[i])
1645 			idpf_vport_dealloc(adapter->vports[i]);
1646 	}
1647 }
1648 
1649 /**
1650  * idpf_check_reset_complete - check that reset is complete
1651  * @hw: pointer to hw struct
1652  * @reset_reg: struct with reset registers
1653  *
1654  * Returns 0 if device is ready to use, or -EBUSY if it's in reset.
1655  **/
idpf_check_reset_complete(struct idpf_hw * hw,struct idpf_reset_reg * reset_reg)1656 static int idpf_check_reset_complete(struct idpf_hw *hw,
1657 				     struct idpf_reset_reg *reset_reg)
1658 {
1659 	struct idpf_adapter *adapter = hw->back;
1660 	int i;
1661 
1662 	for (i = 0; i < 2000; i++) {
1663 		u32 reg_val = readl(reset_reg->rstat);
1664 
1665 		/* 0xFFFFFFFF might be read if other side hasn't cleared the
1666 		 * register for us yet and 0xFFFFFFFF is not a valid value for
1667 		 * the register, so treat that as invalid.
1668 		 */
1669 		if (reg_val != 0xFFFFFFFF && (reg_val & reset_reg->rstat_m))
1670 			return 0;
1671 
1672 		usleep_range(5000, 10000);
1673 	}
1674 
1675 	dev_warn(&adapter->pdev->dev, "Device reset timeout!\n");
1676 	/* Clear the reset flag unconditionally here since the reset
1677 	 * technically isn't in progress anymore from the driver's perspective
1678 	 */
1679 	clear_bit(IDPF_HR_RESET_IN_PROG, adapter->flags);
1680 
1681 	return -EBUSY;
1682 }
1683 
1684 /**
1685  * idpf_set_vport_state - Set the vport state to be after the reset
1686  * @adapter: Driver specific private structure
1687  */
idpf_set_vport_state(struct idpf_adapter * adapter)1688 static void idpf_set_vport_state(struct idpf_adapter *adapter)
1689 {
1690 	u16 i;
1691 
1692 	for (i = 0; i < adapter->max_vports; i++) {
1693 		struct idpf_netdev_priv *np;
1694 
1695 		if (!adapter->netdevs[i])
1696 			continue;
1697 
1698 		np = netdev_priv(adapter->netdevs[i]);
1699 		if (np->state == __IDPF_VPORT_UP)
1700 			set_bit(IDPF_VPORT_UP_REQUESTED,
1701 				adapter->vport_config[i]->flags);
1702 	}
1703 }
1704 
1705 /**
1706  * idpf_init_hard_reset - Initiate a hardware reset
1707  * @adapter: Driver specific private structure
1708  *
1709  * Deallocate the vports and all the resources associated with them and
1710  * reallocate. Also reinitialize the mailbox. Return 0 on success,
1711  * negative on failure.
1712  */
idpf_init_hard_reset(struct idpf_adapter * adapter)1713 static int idpf_init_hard_reset(struct idpf_adapter *adapter)
1714 {
1715 	struct idpf_reg_ops *reg_ops = &adapter->dev_ops.reg_ops;
1716 	struct device *dev = &adapter->pdev->dev;
1717 	struct net_device *netdev;
1718 	int err;
1719 	u16 i;
1720 
1721 	mutex_lock(&adapter->vport_ctrl_lock);
1722 
1723 	dev_info(dev, "Device HW Reset initiated\n");
1724 
1725 	/* Avoid TX hangs on reset */
1726 	for (i = 0; i < adapter->max_vports; i++) {
1727 		netdev = adapter->netdevs[i];
1728 		if (!netdev)
1729 			continue;
1730 
1731 		netif_carrier_off(netdev);
1732 		netif_tx_disable(netdev);
1733 	}
1734 
1735 	/* Prepare for reset */
1736 	if (test_and_clear_bit(IDPF_HR_DRV_LOAD, adapter->flags)) {
1737 		reg_ops->trigger_reset(adapter, IDPF_HR_DRV_LOAD);
1738 	} else if (test_and_clear_bit(IDPF_HR_FUNC_RESET, adapter->flags)) {
1739 		bool is_reset = idpf_is_reset_detected(adapter);
1740 
1741 		idpf_set_vport_state(adapter);
1742 		idpf_vc_core_deinit(adapter);
1743 		if (!is_reset)
1744 			reg_ops->trigger_reset(adapter, IDPF_HR_FUNC_RESET);
1745 		idpf_deinit_dflt_mbx(adapter);
1746 	} else {
1747 		dev_err(dev, "Unhandled hard reset cause\n");
1748 		err = -EBADRQC;
1749 		goto unlock_mutex;
1750 	}
1751 
1752 	/* Wait for reset to complete */
1753 	err = idpf_check_reset_complete(&adapter->hw, &adapter->reset_reg);
1754 	if (err) {
1755 		dev_err(dev, "The driver was unable to contact the device's firmware. Check that the FW is running. Driver state= 0x%x\n",
1756 			adapter->state);
1757 		goto unlock_mutex;
1758 	}
1759 
1760 	/* Reset is complete and so start building the driver resources again */
1761 	err = idpf_init_dflt_mbx(adapter);
1762 	if (err) {
1763 		dev_err(dev, "Failed to initialize default mailbox: %d\n", err);
1764 		goto unlock_mutex;
1765 	}
1766 
1767 	queue_delayed_work(adapter->mbx_wq, &adapter->mbx_task, 0);
1768 
1769 	/* Initialize the state machine, also allocate memory and request
1770 	 * resources
1771 	 */
1772 	err = idpf_vc_core_init(adapter);
1773 	if (err) {
1774 		cancel_delayed_work_sync(&adapter->mbx_task);
1775 		idpf_deinit_dflt_mbx(adapter);
1776 		goto unlock_mutex;
1777 	}
1778 
1779 	/* Wait till all the vports are initialized to release the reset lock,
1780 	 * else user space callbacks may access uninitialized vports
1781 	 */
1782 	while (test_bit(IDPF_HR_RESET_IN_PROG, adapter->flags))
1783 		msleep(100);
1784 
1785 unlock_mutex:
1786 	mutex_unlock(&adapter->vport_ctrl_lock);
1787 
1788 	return err;
1789 }
1790 
1791 /**
1792  * idpf_vc_event_task - Handle virtchannel event logic
1793  * @work: work queue struct
1794  */
idpf_vc_event_task(struct work_struct * work)1795 void idpf_vc_event_task(struct work_struct *work)
1796 {
1797 	struct idpf_adapter *adapter;
1798 
1799 	adapter = container_of(work, struct idpf_adapter, vc_event_task.work);
1800 
1801 	if (test_bit(IDPF_REMOVE_IN_PROG, adapter->flags))
1802 		return;
1803 
1804 	if (test_bit(IDPF_HR_FUNC_RESET, adapter->flags))
1805 		goto func_reset;
1806 
1807 	if (test_bit(IDPF_HR_DRV_LOAD, adapter->flags))
1808 		goto drv_load;
1809 
1810 	return;
1811 
1812 func_reset:
1813 	idpf_vc_xn_shutdown(adapter->vcxn_mngr);
1814 drv_load:
1815 	set_bit(IDPF_HR_RESET_IN_PROG, adapter->flags);
1816 	idpf_init_hard_reset(adapter);
1817 }
1818 
1819 /**
1820  * idpf_initiate_soft_reset - Initiate a software reset
1821  * @vport: virtual port data struct
1822  * @reset_cause: reason for the soft reset
1823  *
1824  * Soft reset only reallocs vport queue resources. Returns 0 on success,
1825  * negative on failure.
1826  */
idpf_initiate_soft_reset(struct idpf_vport * vport,enum idpf_vport_reset_cause reset_cause)1827 int idpf_initiate_soft_reset(struct idpf_vport *vport,
1828 			     enum idpf_vport_reset_cause reset_cause)
1829 {
1830 	struct idpf_netdev_priv *np = netdev_priv(vport->netdev);
1831 	enum idpf_vport_state current_state = np->state;
1832 	struct idpf_adapter *adapter = vport->adapter;
1833 	struct idpf_vport *new_vport;
1834 	int err;
1835 
1836 	/* If the system is low on memory, we can end up in bad state if we
1837 	 * free all the memory for queue resources and try to allocate them
1838 	 * again. Instead, we can pre-allocate the new resources before doing
1839 	 * anything and bailing if the alloc fails.
1840 	 *
1841 	 * Make a clone of the existing vport to mimic its current
1842 	 * configuration, then modify the new structure with any requested
1843 	 * changes. Once the allocation of the new resources is done, stop the
1844 	 * existing vport and copy the configuration to the main vport. If an
1845 	 * error occurred, the existing vport will be untouched.
1846 	 *
1847 	 */
1848 	new_vport = kzalloc(sizeof(*vport), GFP_KERNEL);
1849 	if (!new_vport)
1850 		return -ENOMEM;
1851 
1852 	/* This purposely avoids copying the end of the struct because it
1853 	 * contains wait_queues and mutexes and other stuff we don't want to
1854 	 * mess with. Nothing below should use those variables from new_vport
1855 	 * and should instead always refer to them in vport if they need to.
1856 	 */
1857 	memcpy(new_vport, vport, offsetof(struct idpf_vport, link_up));
1858 
1859 	/* Adjust resource parameters prior to reallocating resources */
1860 	switch (reset_cause) {
1861 	case IDPF_SR_Q_CHANGE:
1862 		err = idpf_vport_adjust_qs(new_vport);
1863 		if (err)
1864 			goto free_vport;
1865 		break;
1866 	case IDPF_SR_Q_DESC_CHANGE:
1867 		/* Update queue parameters before allocating resources */
1868 		idpf_vport_calc_num_q_desc(new_vport);
1869 		break;
1870 	case IDPF_SR_MTU_CHANGE:
1871 	case IDPF_SR_RSC_CHANGE:
1872 		break;
1873 	default:
1874 		dev_err(&adapter->pdev->dev, "Unhandled soft reset cause\n");
1875 		err = -EINVAL;
1876 		goto free_vport;
1877 	}
1878 
1879 	if (current_state <= __IDPF_VPORT_DOWN) {
1880 		idpf_send_delete_queues_msg(vport);
1881 	} else {
1882 		set_bit(IDPF_VPORT_DEL_QUEUES, vport->flags);
1883 		idpf_vport_stop(vport);
1884 	}
1885 
1886 	idpf_deinit_rss(vport);
1887 	/* We're passing in vport here because we need its wait_queue
1888 	 * to send a message and it should be getting all the vport
1889 	 * config data out of the adapter but we need to be careful not
1890 	 * to add code to add_queues to change the vport config within
1891 	 * vport itself as it will be wiped with a memcpy later.
1892 	 */
1893 	err = idpf_send_add_queues_msg(vport, new_vport->num_txq,
1894 				       new_vport->num_complq,
1895 				       new_vport->num_rxq,
1896 				       new_vport->num_bufq);
1897 	if (err)
1898 		goto err_reset;
1899 
1900 	/* Same comment as above regarding avoiding copying the wait_queues and
1901 	 * mutexes applies here. We do not want to mess with those if possible.
1902 	 */
1903 	memcpy(vport, new_vport, offsetof(struct idpf_vport, link_up));
1904 
1905 	if (reset_cause == IDPF_SR_Q_CHANGE)
1906 		idpf_vport_alloc_vec_indexes(vport);
1907 
1908 	err = idpf_set_real_num_queues(vport);
1909 	if (err)
1910 		goto err_open;
1911 
1912 	if (current_state == __IDPF_VPORT_UP)
1913 		err = idpf_vport_open(vport);
1914 
1915 	kfree(new_vport);
1916 
1917 	return err;
1918 
1919 err_reset:
1920 	idpf_send_add_queues_msg(vport, vport->num_txq, vport->num_complq,
1921 				 vport->num_rxq, vport->num_bufq);
1922 
1923 err_open:
1924 	if (current_state == __IDPF_VPORT_UP)
1925 		idpf_vport_open(vport);
1926 
1927 free_vport:
1928 	kfree(new_vport);
1929 
1930 	return err;
1931 }
1932 
1933 /**
1934  * idpf_addr_sync - Callback for dev_(mc|uc)_sync to add address
1935  * @netdev: the netdevice
1936  * @addr: address to add
1937  *
1938  * Called by __dev_(mc|uc)_sync when an address needs to be added. We call
1939  * __dev_(uc|mc)_sync from .set_rx_mode. Kernel takes addr_list_lock spinlock
1940  * meaning we cannot sleep in this context. Due to this, we have to add the
1941  * filter and send the virtchnl message asynchronously without waiting for the
1942  * response from the other side. We won't know whether or not the operation
1943  * actually succeeded until we get the message back.  Returns 0 on success,
1944  * negative on failure.
1945  */
idpf_addr_sync(struct net_device * netdev,const u8 * addr)1946 static int idpf_addr_sync(struct net_device *netdev, const u8 *addr)
1947 {
1948 	struct idpf_netdev_priv *np = netdev_priv(netdev);
1949 
1950 	return idpf_add_mac_filter(np->vport, np, addr, true);
1951 }
1952 
1953 /**
1954  * idpf_addr_unsync - Callback for dev_(mc|uc)_sync to remove address
1955  * @netdev: the netdevice
1956  * @addr: address to add
1957  *
1958  * Called by __dev_(mc|uc)_sync when an address needs to be added. We call
1959  * __dev_(uc|mc)_sync from .set_rx_mode. Kernel takes addr_list_lock spinlock
1960  * meaning we cannot sleep in this context. Due to this we have to delete the
1961  * filter and send the virtchnl message asynchronously without waiting for the
1962  * return from the other side.  We won't know whether or not the operation
1963  * actually succeeded until we get the message back. Returns 0 on success,
1964  * negative on failure.
1965  */
idpf_addr_unsync(struct net_device * netdev,const u8 * addr)1966 static int idpf_addr_unsync(struct net_device *netdev, const u8 *addr)
1967 {
1968 	struct idpf_netdev_priv *np = netdev_priv(netdev);
1969 
1970 	/* Under some circumstances, we might receive a request to delete
1971 	 * our own device address from our uc list. Because we store the
1972 	 * device address in the VSI's MAC filter list, we need to ignore
1973 	 * such requests and not delete our device address from this list.
1974 	 */
1975 	if (ether_addr_equal(addr, netdev->dev_addr))
1976 		return 0;
1977 
1978 	idpf_del_mac_filter(np->vport, np, addr, true);
1979 
1980 	return 0;
1981 }
1982 
1983 /**
1984  * idpf_set_rx_mode - NDO callback to set the netdev filters
1985  * @netdev: network interface device structure
1986  *
1987  * Stack takes addr_list_lock spinlock before calling our .set_rx_mode.  We
1988  * cannot sleep in this context.
1989  */
idpf_set_rx_mode(struct net_device * netdev)1990 static void idpf_set_rx_mode(struct net_device *netdev)
1991 {
1992 	struct idpf_netdev_priv *np = netdev_priv(netdev);
1993 	struct idpf_vport_user_config_data *config_data;
1994 	struct idpf_adapter *adapter;
1995 	bool changed = false;
1996 	struct device *dev;
1997 	int err;
1998 
1999 	adapter = np->adapter;
2000 	dev = &adapter->pdev->dev;
2001 
2002 	if (idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_MACFILTER)) {
2003 		__dev_uc_sync(netdev, idpf_addr_sync, idpf_addr_unsync);
2004 		__dev_mc_sync(netdev, idpf_addr_sync, idpf_addr_unsync);
2005 	}
2006 
2007 	if (!idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_PROMISC))
2008 		return;
2009 
2010 	config_data = &adapter->vport_config[np->vport_idx]->user_config;
2011 	/* IFF_PROMISC enables both unicast and multicast promiscuous,
2012 	 * while IFF_ALLMULTI only enables multicast such that:
2013 	 *
2014 	 * promisc  + allmulti		= unicast | multicast
2015 	 * promisc  + !allmulti		= unicast | multicast
2016 	 * !promisc + allmulti		= multicast
2017 	 */
2018 	if ((netdev->flags & IFF_PROMISC) &&
2019 	    !test_and_set_bit(__IDPF_PROMISC_UC, config_data->user_flags)) {
2020 		changed = true;
2021 		dev_info(&adapter->pdev->dev, "Entering promiscuous mode\n");
2022 		if (!test_and_set_bit(__IDPF_PROMISC_MC, adapter->flags))
2023 			dev_info(dev, "Entering multicast promiscuous mode\n");
2024 	}
2025 
2026 	if (!(netdev->flags & IFF_PROMISC) &&
2027 	    test_and_clear_bit(__IDPF_PROMISC_UC, config_data->user_flags)) {
2028 		changed = true;
2029 		dev_info(dev, "Leaving promiscuous mode\n");
2030 	}
2031 
2032 	if (netdev->flags & IFF_ALLMULTI &&
2033 	    !test_and_set_bit(__IDPF_PROMISC_MC, config_data->user_flags)) {
2034 		changed = true;
2035 		dev_info(dev, "Entering multicast promiscuous mode\n");
2036 	}
2037 
2038 	if (!(netdev->flags & (IFF_ALLMULTI | IFF_PROMISC)) &&
2039 	    test_and_clear_bit(__IDPF_PROMISC_MC, config_data->user_flags)) {
2040 		changed = true;
2041 		dev_info(dev, "Leaving multicast promiscuous mode\n");
2042 	}
2043 
2044 	if (!changed)
2045 		return;
2046 
2047 	err = idpf_set_promiscuous(adapter, config_data, np->vport_id);
2048 	if (err)
2049 		dev_err(dev, "Failed to set promiscuous mode: %d\n", err);
2050 }
2051 
2052 /**
2053  * idpf_vport_manage_rss_lut - disable/enable RSS
2054  * @vport: the vport being changed
2055  *
2056  * In the event of disable request for RSS, this function will zero out RSS
2057  * LUT, while in the event of enable request for RSS, it will reconfigure RSS
2058  * LUT with the default LUT configuration.
2059  */
idpf_vport_manage_rss_lut(struct idpf_vport * vport)2060 static int idpf_vport_manage_rss_lut(struct idpf_vport *vport)
2061 {
2062 	bool ena = idpf_is_feature_ena(vport, NETIF_F_RXHASH);
2063 	struct idpf_rss_data *rss_data;
2064 	u16 idx = vport->idx;
2065 	int lut_size;
2066 
2067 	rss_data = &vport->adapter->vport_config[idx]->user_config.rss_data;
2068 	lut_size = rss_data->rss_lut_size * sizeof(u32);
2069 
2070 	if (ena) {
2071 		/* This will contain the default or user configured LUT */
2072 		memcpy(rss_data->rss_lut, rss_data->cached_lut, lut_size);
2073 	} else {
2074 		/* Save a copy of the current LUT to be restored later if
2075 		 * requested.
2076 		 */
2077 		memcpy(rss_data->cached_lut, rss_data->rss_lut, lut_size);
2078 
2079 		/* Zero out the current LUT to disable */
2080 		memset(rss_data->rss_lut, 0, lut_size);
2081 	}
2082 
2083 	return idpf_config_rss(vport);
2084 }
2085 
2086 /**
2087  * idpf_set_features - set the netdev feature flags
2088  * @netdev: ptr to the netdev being adjusted
2089  * @features: the feature set that the stack is suggesting
2090  */
idpf_set_features(struct net_device * netdev,netdev_features_t features)2091 static int idpf_set_features(struct net_device *netdev,
2092 			     netdev_features_t features)
2093 {
2094 	netdev_features_t changed = netdev->features ^ features;
2095 	struct idpf_adapter *adapter;
2096 	struct idpf_vport *vport;
2097 	int err = 0;
2098 
2099 	idpf_vport_ctrl_lock(netdev);
2100 	vport = idpf_netdev_to_vport(netdev);
2101 
2102 	adapter = vport->adapter;
2103 
2104 	if (idpf_is_reset_in_prog(adapter)) {
2105 		dev_err(&adapter->pdev->dev, "Device is resetting, changing netdev features temporarily unavailable.\n");
2106 		err = -EBUSY;
2107 		goto unlock_mutex;
2108 	}
2109 
2110 	if (changed & NETIF_F_RXHASH) {
2111 		netdev->features ^= NETIF_F_RXHASH;
2112 		err = idpf_vport_manage_rss_lut(vport);
2113 		if (err)
2114 			goto unlock_mutex;
2115 	}
2116 
2117 	if (changed & NETIF_F_GRO_HW) {
2118 		netdev->features ^= NETIF_F_GRO_HW;
2119 		err = idpf_initiate_soft_reset(vport, IDPF_SR_RSC_CHANGE);
2120 		if (err)
2121 			goto unlock_mutex;
2122 	}
2123 
2124 	if (changed & NETIF_F_LOOPBACK) {
2125 		netdev->features ^= NETIF_F_LOOPBACK;
2126 		err = idpf_send_ena_dis_loopback_msg(vport);
2127 	}
2128 
2129 unlock_mutex:
2130 	idpf_vport_ctrl_unlock(netdev);
2131 
2132 	return err;
2133 }
2134 
2135 /**
2136  * idpf_open - Called when a network interface becomes active
2137  * @netdev: network interface device structure
2138  *
2139  * The open entry point is called when a network interface is made
2140  * active by the system (IFF_UP).  At this point all resources needed
2141  * for transmit and receive operations are allocated, the interrupt
2142  * handler is registered with the OS, the netdev watchdog is enabled,
2143  * and the stack is notified that the interface is ready.
2144  *
2145  * Returns 0 on success, negative value on failure
2146  */
idpf_open(struct net_device * netdev)2147 static int idpf_open(struct net_device *netdev)
2148 {
2149 	struct idpf_vport *vport;
2150 	int err;
2151 
2152 	idpf_vport_ctrl_lock(netdev);
2153 	vport = idpf_netdev_to_vport(netdev);
2154 
2155 	err = idpf_set_real_num_queues(vport);
2156 	if (err)
2157 		goto unlock;
2158 
2159 	err = idpf_vport_open(vport);
2160 
2161 unlock:
2162 	idpf_vport_ctrl_unlock(netdev);
2163 
2164 	return err;
2165 }
2166 
2167 /**
2168  * idpf_change_mtu - NDO callback to change the MTU
2169  * @netdev: network interface device structure
2170  * @new_mtu: new value for maximum frame size
2171  *
2172  * Returns 0 on success, negative on failure
2173  */
idpf_change_mtu(struct net_device * netdev,int new_mtu)2174 static int idpf_change_mtu(struct net_device *netdev, int new_mtu)
2175 {
2176 	struct idpf_vport *vport;
2177 	int err;
2178 
2179 	idpf_vport_ctrl_lock(netdev);
2180 	vport = idpf_netdev_to_vport(netdev);
2181 
2182 	WRITE_ONCE(netdev->mtu, new_mtu);
2183 
2184 	err = idpf_initiate_soft_reset(vport, IDPF_SR_MTU_CHANGE);
2185 
2186 	idpf_vport_ctrl_unlock(netdev);
2187 
2188 	return err;
2189 }
2190 
2191 /**
2192  * idpf_features_check - Validate packet conforms to limits
2193  * @skb: skb buffer
2194  * @netdev: This port's netdev
2195  * @features: Offload features that the stack believes apply
2196  */
idpf_features_check(struct sk_buff * skb,struct net_device * netdev,netdev_features_t features)2197 static netdev_features_t idpf_features_check(struct sk_buff *skb,
2198 					     struct net_device *netdev,
2199 					     netdev_features_t features)
2200 {
2201 	struct idpf_netdev_priv *np = netdev_priv(netdev);
2202 	u16 max_tx_hdr_size = np->max_tx_hdr_size;
2203 	size_t len;
2204 
2205 	/* No point in doing any of this if neither checksum nor GSO are
2206 	 * being requested for this frame.  We can rule out both by just
2207 	 * checking for CHECKSUM_PARTIAL
2208 	 */
2209 	if (skb->ip_summed != CHECKSUM_PARTIAL)
2210 		return features;
2211 
2212 	/* We cannot support GSO if the MSS is going to be less than
2213 	 * 88 bytes. If it is then we need to drop support for GSO.
2214 	 */
2215 	if (skb_is_gso(skb) &&
2216 	    (skb_shinfo(skb)->gso_size < IDPF_TX_TSO_MIN_MSS))
2217 		features &= ~NETIF_F_GSO_MASK;
2218 
2219 	/* Ensure MACLEN is <= 126 bytes (63 words) and not an odd size */
2220 	len = skb_network_offset(skb);
2221 	if (unlikely(len & ~(126)))
2222 		goto unsupported;
2223 
2224 	len = skb_network_header_len(skb);
2225 	if (unlikely(len > max_tx_hdr_size))
2226 		goto unsupported;
2227 
2228 	if (!skb->encapsulation)
2229 		return features;
2230 
2231 	/* L4TUNLEN can support 127 words */
2232 	len = skb_inner_network_header(skb) - skb_transport_header(skb);
2233 	if (unlikely(len & ~(127 * 2)))
2234 		goto unsupported;
2235 
2236 	/* IPLEN can support at most 127 dwords */
2237 	len = skb_inner_network_header_len(skb);
2238 	if (unlikely(len > max_tx_hdr_size))
2239 		goto unsupported;
2240 
2241 	/* No need to validate L4LEN as TCP is the only protocol with a
2242 	 * a flexible value and we support all possible values supported
2243 	 * by TCP, which is at most 15 dwords
2244 	 */
2245 
2246 	return features;
2247 
2248 unsupported:
2249 	return features & ~(NETIF_F_CSUM_MASK | NETIF_F_GSO_MASK);
2250 }
2251 
2252 /**
2253  * idpf_set_mac - NDO callback to set port mac address
2254  * @netdev: network interface device structure
2255  * @p: pointer to an address structure
2256  *
2257  * Returns 0 on success, negative on failure
2258  **/
idpf_set_mac(struct net_device * netdev,void * p)2259 static int idpf_set_mac(struct net_device *netdev, void *p)
2260 {
2261 	struct idpf_netdev_priv *np = netdev_priv(netdev);
2262 	struct idpf_vport_config *vport_config;
2263 	struct sockaddr *addr = p;
2264 	struct idpf_vport *vport;
2265 	int err = 0;
2266 
2267 	idpf_vport_ctrl_lock(netdev);
2268 	vport = idpf_netdev_to_vport(netdev);
2269 
2270 	if (!idpf_is_cap_ena(vport->adapter, IDPF_OTHER_CAPS,
2271 			     VIRTCHNL2_CAP_MACFILTER)) {
2272 		dev_info(&vport->adapter->pdev->dev, "Setting MAC address is not supported\n");
2273 		err = -EOPNOTSUPP;
2274 		goto unlock_mutex;
2275 	}
2276 
2277 	if (!is_valid_ether_addr(addr->sa_data)) {
2278 		dev_info(&vport->adapter->pdev->dev, "Invalid MAC address: %pM\n",
2279 			 addr->sa_data);
2280 		err = -EADDRNOTAVAIL;
2281 		goto unlock_mutex;
2282 	}
2283 
2284 	if (ether_addr_equal(netdev->dev_addr, addr->sa_data))
2285 		goto unlock_mutex;
2286 
2287 	vport_config = vport->adapter->vport_config[vport->idx];
2288 	err = idpf_add_mac_filter(vport, np, addr->sa_data, false);
2289 	if (err) {
2290 		__idpf_del_mac_filter(vport_config, addr->sa_data);
2291 		goto unlock_mutex;
2292 	}
2293 
2294 	if (is_valid_ether_addr(vport->default_mac_addr))
2295 		idpf_del_mac_filter(vport, np, vport->default_mac_addr, false);
2296 
2297 	ether_addr_copy(vport->default_mac_addr, addr->sa_data);
2298 	eth_hw_addr_set(netdev, addr->sa_data);
2299 
2300 unlock_mutex:
2301 	idpf_vport_ctrl_unlock(netdev);
2302 
2303 	return err;
2304 }
2305 
2306 /**
2307  * idpf_alloc_dma_mem - Allocate dma memory
2308  * @hw: pointer to hw struct
2309  * @mem: pointer to dma_mem struct
2310  * @size: size of the memory to allocate
2311  */
idpf_alloc_dma_mem(struct idpf_hw * hw,struct idpf_dma_mem * mem,u64 size)2312 void *idpf_alloc_dma_mem(struct idpf_hw *hw, struct idpf_dma_mem *mem, u64 size)
2313 {
2314 	struct idpf_adapter *adapter = hw->back;
2315 	size_t sz = ALIGN(size, 4096);
2316 
2317 	mem->va = dma_alloc_coherent(&adapter->pdev->dev, sz,
2318 				     &mem->pa, GFP_KERNEL);
2319 	mem->size = sz;
2320 
2321 	return mem->va;
2322 }
2323 
2324 /**
2325  * idpf_free_dma_mem - Free the allocated dma memory
2326  * @hw: pointer to hw struct
2327  * @mem: pointer to dma_mem struct
2328  */
idpf_free_dma_mem(struct idpf_hw * hw,struct idpf_dma_mem * mem)2329 void idpf_free_dma_mem(struct idpf_hw *hw, struct idpf_dma_mem *mem)
2330 {
2331 	struct idpf_adapter *adapter = hw->back;
2332 
2333 	dma_free_coherent(&adapter->pdev->dev, mem->size,
2334 			  mem->va, mem->pa);
2335 	mem->size = 0;
2336 	mem->va = NULL;
2337 	mem->pa = 0;
2338 }
2339 
idpf_hwtstamp_set(struct net_device * netdev,struct kernel_hwtstamp_config * config,struct netlink_ext_ack * extack)2340 static int idpf_hwtstamp_set(struct net_device *netdev,
2341 			     struct kernel_hwtstamp_config *config,
2342 			     struct netlink_ext_ack *extack)
2343 {
2344 	struct idpf_vport *vport;
2345 	int err;
2346 
2347 	idpf_vport_ctrl_lock(netdev);
2348 	vport = idpf_netdev_to_vport(netdev);
2349 
2350 	if (!vport->link_up) {
2351 		idpf_vport_ctrl_unlock(netdev);
2352 		return -EPERM;
2353 	}
2354 
2355 	if (!idpf_ptp_is_vport_tx_tstamp_ena(vport) &&
2356 	    !idpf_ptp_is_vport_rx_tstamp_ena(vport)) {
2357 		idpf_vport_ctrl_unlock(netdev);
2358 		return -EOPNOTSUPP;
2359 	}
2360 
2361 	err = idpf_ptp_set_timestamp_mode(vport, config);
2362 
2363 	idpf_vport_ctrl_unlock(netdev);
2364 
2365 	return err;
2366 }
2367 
idpf_hwtstamp_get(struct net_device * netdev,struct kernel_hwtstamp_config * config)2368 static int idpf_hwtstamp_get(struct net_device *netdev,
2369 			     struct kernel_hwtstamp_config *config)
2370 {
2371 	struct idpf_vport *vport;
2372 
2373 	idpf_vport_ctrl_lock(netdev);
2374 	vport = idpf_netdev_to_vport(netdev);
2375 
2376 	if (!vport->link_up) {
2377 		idpf_vport_ctrl_unlock(netdev);
2378 		return -EPERM;
2379 	}
2380 
2381 	if (!idpf_ptp_is_vport_tx_tstamp_ena(vport) &&
2382 	    !idpf_ptp_is_vport_rx_tstamp_ena(vport)) {
2383 		idpf_vport_ctrl_unlock(netdev);
2384 		return 0;
2385 	}
2386 
2387 	*config = vport->tstamp_config;
2388 
2389 	idpf_vport_ctrl_unlock(netdev);
2390 
2391 	return 0;
2392 }
2393 
2394 static const struct net_device_ops idpf_netdev_ops = {
2395 	.ndo_open = idpf_open,
2396 	.ndo_stop = idpf_stop,
2397 	.ndo_start_xmit = idpf_tx_start,
2398 	.ndo_features_check = idpf_features_check,
2399 	.ndo_set_rx_mode = idpf_set_rx_mode,
2400 	.ndo_validate_addr = eth_validate_addr,
2401 	.ndo_set_mac_address = idpf_set_mac,
2402 	.ndo_change_mtu = idpf_change_mtu,
2403 	.ndo_get_stats64 = idpf_get_stats64,
2404 	.ndo_set_features = idpf_set_features,
2405 	.ndo_tx_timeout = idpf_tx_timeout,
2406 	.ndo_hwtstamp_get = idpf_hwtstamp_get,
2407 	.ndo_hwtstamp_set = idpf_hwtstamp_set,
2408 };
2409