xref: /freebsd/sys/dev/cxgbe/tom/t4_tom.c (revision c4e127e24dc9f1322ebe7ade0991de7022010bf1)
1 /*-
2  * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
3  *
4  * Copyright (c) 2012 Chelsio Communications, Inc.
5  * All rights reserved.
6  * Written by: Navdeep Parhar <np@FreeBSD.org>
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  * 1. Redistributions of source code must retain the above copyright
12  *    notice, this list of conditions and the following disclaimer.
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  *
17  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
21  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27  * SUCH DAMAGE.
28  */
29 
30 #include <sys/cdefs.h>
31 __FBSDID("$FreeBSD$");
32 
33 #include "opt_inet.h"
34 #include "opt_inet6.h"
35 #include "opt_ratelimit.h"
36 
37 #include <sys/param.h>
38 #include <sys/types.h>
39 #include <sys/systm.h>
40 #include <sys/kernel.h>
41 #include <sys/ktr.h>
42 #include <sys/lock.h>
43 #include <sys/limits.h>
44 #include <sys/module.h>
45 #include <sys/protosw.h>
46 #include <sys/domain.h>
47 #include <sys/refcount.h>
48 #include <sys/rmlock.h>
49 #include <sys/socket.h>
50 #include <sys/socketvar.h>
51 #include <sys/taskqueue.h>
52 #include <net/if.h>
53 #include <net/if_var.h>
54 #include <net/if_types.h>
55 #include <net/if_vlan_var.h>
56 #include <netinet/in.h>
57 #include <netinet/in_pcb.h>
58 #include <netinet/in_var.h>
59 #include <netinet/ip.h>
60 #include <netinet/ip6.h>
61 #include <netinet6/scope6_var.h>
62 #define TCPSTATES
63 #include <netinet/tcp_fsm.h>
64 #include <netinet/tcp_timer.h>
65 #include <netinet/tcp_var.h>
66 #include <netinet/toecore.h>
67 
68 #ifdef TCP_OFFLOAD
69 #include "common/common.h"
70 #include "common/t4_msg.h"
71 #include "common/t4_regs.h"
72 #include "common/t4_regs_values.h"
73 #include "common/t4_tcb.h"
74 #include "t4_clip.h"
75 #include "tom/t4_tom_l2t.h"
76 #include "tom/t4_tom.h"
77 #include "tom/t4_tls.h"
78 
79 static struct protosw toe_protosw;
80 static struct pr_usrreqs toe_usrreqs;
81 
82 static struct protosw toe6_protosw;
83 static struct pr_usrreqs toe6_usrreqs;
84 
85 /* Module ops */
86 static int t4_tom_mod_load(void);
87 static int t4_tom_mod_unload(void);
88 static int t4_tom_modevent(module_t, int, void *);
89 
90 /* ULD ops and helpers */
91 static int t4_tom_activate(struct adapter *);
92 static int t4_tom_deactivate(struct adapter *);
93 
94 static struct uld_info tom_uld_info = {
95 	.uld_id = ULD_TOM,
96 	.activate = t4_tom_activate,
97 	.deactivate = t4_tom_deactivate,
98 };
99 
100 static void release_offload_resources(struct toepcb *);
101 static int alloc_tid_tabs(struct tid_info *);
102 static void free_tid_tabs(struct tid_info *);
103 static void free_tom_data(struct adapter *, struct tom_data *);
104 static void reclaim_wr_resources(void *, int);
105 
106 struct toepcb *
107 alloc_toepcb(struct vi_info *vi, int txqid, int rxqid, int flags)
108 {
109 	struct port_info *pi = vi->pi;
110 	struct adapter *sc = pi->adapter;
111 	struct toepcb *toep;
112 	int tx_credits, txsd_total, len;
113 
114 	/*
115 	 * The firmware counts tx work request credits in units of 16 bytes
116 	 * each.  Reserve room for an ABORT_REQ so the driver never has to worry
117 	 * about tx credits if it wants to abort a connection.
118 	 */
119 	tx_credits = sc->params.ofldq_wr_cred;
120 	tx_credits -= howmany(sizeof(struct cpl_abort_req), 16);
121 
122 	/*
123 	 * Shortest possible tx work request is a fw_ofld_tx_data_wr + 1 byte
124 	 * immediate payload, and firmware counts tx work request credits in
125 	 * units of 16 byte.  Calculate the maximum work requests possible.
126 	 */
127 	txsd_total = tx_credits /
128 	    howmany(sizeof(struct fw_ofld_tx_data_wr) + 1, 16);
129 
130 	KASSERT(txqid >= vi->first_ofld_txq &&
131 	    txqid < vi->first_ofld_txq + vi->nofldtxq,
132 	    ("%s: txqid %d for vi %p (first %d, n %d)", __func__, txqid, vi,
133 		vi->first_ofld_txq, vi->nofldtxq));
134 
135 	KASSERT(rxqid >= vi->first_ofld_rxq &&
136 	    rxqid < vi->first_ofld_rxq + vi->nofldrxq,
137 	    ("%s: rxqid %d for vi %p (first %d, n %d)", __func__, rxqid, vi,
138 		vi->first_ofld_rxq, vi->nofldrxq));
139 
140 	len = offsetof(struct toepcb, txsd) +
141 	    txsd_total * sizeof(struct ofld_tx_sdesc);
142 
143 	toep = malloc(len, M_CXGBE, M_ZERO | flags);
144 	if (toep == NULL)
145 		return (NULL);
146 
147 	refcount_init(&toep->refcount, 1);
148 	toep->td = sc->tom_softc;
149 	toep->vi = vi;
150 	toep->tc_idx = -1;
151 	toep->tx_total = tx_credits;
152 	toep->tx_credits = tx_credits;
153 	toep->ofld_txq = &sc->sge.ofld_txq[txqid];
154 	toep->ofld_rxq = &sc->sge.ofld_rxq[rxqid];
155 	toep->ctrlq = &sc->sge.ctrlq[pi->port_id];
156 	mbufq_init(&toep->ulp_pduq, INT_MAX);
157 	mbufq_init(&toep->ulp_pdu_reclaimq, INT_MAX);
158 	toep->txsd_total = txsd_total;
159 	toep->txsd_avail = txsd_total;
160 	toep->txsd_pidx = 0;
161 	toep->txsd_cidx = 0;
162 	aiotx_init_toep(toep);
163 
164 	return (toep);
165 }
166 
167 struct toepcb *
168 hold_toepcb(struct toepcb *toep)
169 {
170 
171 	refcount_acquire(&toep->refcount);
172 	return (toep);
173 }
174 
175 void
176 free_toepcb(struct toepcb *toep)
177 {
178 
179 	if (refcount_release(&toep->refcount) == 0)
180 		return;
181 
182 	KASSERT(!(toep->flags & TPF_ATTACHED),
183 	    ("%s: attached to an inpcb", __func__));
184 	KASSERT(!(toep->flags & TPF_CPL_PENDING),
185 	    ("%s: CPL pending", __func__));
186 
187 	if (toep->ulp_mode == ULP_MODE_TCPDDP)
188 		ddp_uninit_toep(toep);
189 	tls_uninit_toep(toep);
190 	free(toep, M_CXGBE);
191 }
192 
193 /*
194  * Set up the socket for TCP offload.
195  */
196 void
197 offload_socket(struct socket *so, struct toepcb *toep)
198 {
199 	struct tom_data *td = toep->td;
200 	struct inpcb *inp = sotoinpcb(so);
201 	struct tcpcb *tp = intotcpcb(inp);
202 	struct sockbuf *sb;
203 
204 	INP_WLOCK_ASSERT(inp);
205 
206 	/* Update socket */
207 	sb = &so->so_snd;
208 	SOCKBUF_LOCK(sb);
209 	sb->sb_flags |= SB_NOCOALESCE;
210 	SOCKBUF_UNLOCK(sb);
211 	sb = &so->so_rcv;
212 	SOCKBUF_LOCK(sb);
213 	sb->sb_flags |= SB_NOCOALESCE;
214 	if (inp->inp_vflag & INP_IPV6)
215 		so->so_proto = &toe6_protosw;
216 	else
217 		so->so_proto = &toe_protosw;
218 	SOCKBUF_UNLOCK(sb);
219 
220 	/* Update TCP PCB */
221 	tp->tod = &td->tod;
222 	tp->t_toe = toep;
223 	tp->t_flags |= TF_TOE;
224 
225 	/* Install an extra hold on inp */
226 	toep->inp = inp;
227 	toep->flags |= TPF_ATTACHED;
228 	in_pcbref(inp);
229 
230 	/* Add the TOE PCB to the active list */
231 	mtx_lock(&td->toep_list_lock);
232 	TAILQ_INSERT_HEAD(&td->toep_list, toep, link);
233 	mtx_unlock(&td->toep_list_lock);
234 }
235 
236 /* This is _not_ the normal way to "unoffload" a socket. */
237 void
238 undo_offload_socket(struct socket *so)
239 {
240 	struct inpcb *inp = sotoinpcb(so);
241 	struct tcpcb *tp = intotcpcb(inp);
242 	struct toepcb *toep = tp->t_toe;
243 	struct tom_data *td = toep->td;
244 	struct sockbuf *sb;
245 
246 	INP_WLOCK_ASSERT(inp);
247 
248 	sb = &so->so_snd;
249 	SOCKBUF_LOCK(sb);
250 	sb->sb_flags &= ~SB_NOCOALESCE;
251 	SOCKBUF_UNLOCK(sb);
252 	sb = &so->so_rcv;
253 	SOCKBUF_LOCK(sb);
254 	sb->sb_flags &= ~SB_NOCOALESCE;
255 	SOCKBUF_UNLOCK(sb);
256 
257 	tp->tod = NULL;
258 	tp->t_toe = NULL;
259 	tp->t_flags &= ~TF_TOE;
260 
261 	toep->inp = NULL;
262 	toep->flags &= ~TPF_ATTACHED;
263 	if (in_pcbrele_wlocked(inp))
264 		panic("%s: inp freed.", __func__);
265 
266 	mtx_lock(&td->toep_list_lock);
267 	TAILQ_REMOVE(&td->toep_list, toep, link);
268 	mtx_unlock(&td->toep_list_lock);
269 }
270 
271 static void
272 release_offload_resources(struct toepcb *toep)
273 {
274 	struct tom_data *td = toep->td;
275 	struct adapter *sc = td_adapter(td);
276 	int tid = toep->tid;
277 
278 	KASSERT(!(toep->flags & TPF_CPL_PENDING),
279 	    ("%s: %p has CPL pending.", __func__, toep));
280 	KASSERT(!(toep->flags & TPF_ATTACHED),
281 	    ("%s: %p is still attached.", __func__, toep));
282 
283 	CTR5(KTR_CXGBE, "%s: toep %p (tid %d, l2te %p, ce %p)",
284 	    __func__, toep, tid, toep->l2te, toep->ce);
285 
286 	/*
287 	 * These queues should have been emptied at approximately the same time
288 	 * that a normal connection's socket's so_snd would have been purged or
289 	 * drained.  Do _not_ clean up here.
290 	 */
291 	MPASS(mbufq_len(&toep->ulp_pduq) == 0);
292 	MPASS(mbufq_len(&toep->ulp_pdu_reclaimq) == 0);
293 #ifdef INVARIANTS
294 	if (toep->ulp_mode == ULP_MODE_TCPDDP)
295 		ddp_assert_empty(toep);
296 #endif
297 
298 	if (toep->l2te)
299 		t4_l2t_release(toep->l2te);
300 
301 	if (tid >= 0) {
302 		remove_tid(sc, tid, toep->ce ? 2 : 1);
303 		release_tid(sc, tid, toep->ctrlq);
304 	}
305 
306 	if (toep->ce)
307 		t4_release_lip(sc, toep->ce);
308 
309 	if (toep->tc_idx != -1)
310 		t4_release_cl_rl(sc, toep->vi->pi->port_id, toep->tc_idx);
311 
312 	mtx_lock(&td->toep_list_lock);
313 	TAILQ_REMOVE(&td->toep_list, toep, link);
314 	mtx_unlock(&td->toep_list_lock);
315 
316 	free_toepcb(toep);
317 }
318 
319 /*
320  * The kernel is done with the TCP PCB and this is our opportunity to unhook the
321  * toepcb hanging off of it.  If the TOE driver is also done with the toepcb (no
322  * pending CPL) then it is time to release all resources tied to the toepcb.
323  *
324  * Also gets called when an offloaded active open fails and the TOM wants the
325  * kernel to take the TCP PCB back.
326  */
327 static void
328 t4_pcb_detach(struct toedev *tod __unused, struct tcpcb *tp)
329 {
330 #if defined(KTR) || defined(INVARIANTS)
331 	struct inpcb *inp = tp->t_inpcb;
332 #endif
333 	struct toepcb *toep = tp->t_toe;
334 
335 	INP_WLOCK_ASSERT(inp);
336 
337 	KASSERT(toep != NULL, ("%s: toep is NULL", __func__));
338 	KASSERT(toep->flags & TPF_ATTACHED,
339 	    ("%s: not attached", __func__));
340 
341 #ifdef KTR
342 	if (tp->t_state == TCPS_SYN_SENT) {
343 		CTR6(KTR_CXGBE, "%s: atid %d, toep %p (0x%x), inp %p (0x%x)",
344 		    __func__, toep->tid, toep, toep->flags, inp,
345 		    inp->inp_flags);
346 	} else {
347 		CTR6(KTR_CXGBE,
348 		    "t4_pcb_detach: tid %d (%s), toep %p (0x%x), inp %p (0x%x)",
349 		    toep->tid, tcpstates[tp->t_state], toep, toep->flags, inp,
350 		    inp->inp_flags);
351 	}
352 #endif
353 
354 	tp->t_toe = NULL;
355 	tp->t_flags &= ~TF_TOE;
356 	toep->flags &= ~TPF_ATTACHED;
357 
358 	if (!(toep->flags & TPF_CPL_PENDING))
359 		release_offload_resources(toep);
360 }
361 
362 /*
363  * setsockopt handler.
364  */
365 static void
366 t4_ctloutput(struct toedev *tod, struct tcpcb *tp, int dir, int name)
367 {
368 	struct adapter *sc = tod->tod_softc;
369 	struct toepcb *toep = tp->t_toe;
370 
371 	if (dir == SOPT_GET)
372 		return;
373 
374 	CTR4(KTR_CXGBE, "%s: tp %p, dir %u, name %u", __func__, tp, dir, name);
375 
376 	switch (name) {
377 	case TCP_NODELAY:
378 		if (tp->t_state != TCPS_ESTABLISHED)
379 			break;
380 		t4_set_tcb_field(sc, toep->ctrlq, toep, W_TCB_T_FLAGS,
381 		    V_TF_NAGLE(1), V_TF_NAGLE(tp->t_flags & TF_NODELAY ? 0 : 1),
382 		    0, 0);
383 		break;
384 	default:
385 		break;
386 	}
387 }
388 
389 static inline uint64_t
390 get_tcb_tflags(const uint64_t *tcb)
391 {
392 
393 	return ((be64toh(tcb[14]) << 32) | (be64toh(tcb[15]) >> 32));
394 }
395 
396 static inline uint32_t
397 get_tcb_field(const uint64_t *tcb, u_int word, uint32_t mask, u_int shift)
398 {
399 #define LAST_WORD ((TCB_SIZE / 4) - 1)
400 	uint64_t t1, t2;
401 	int flit_idx;
402 
403 	MPASS(mask != 0);
404 	MPASS(word <= LAST_WORD);
405 	MPASS(shift < 32);
406 
407 	flit_idx = (LAST_WORD - word) / 2;
408 	if (word & 0x1)
409 		shift += 32;
410 	t1 = be64toh(tcb[flit_idx]) >> shift;
411 	t2 = 0;
412 	if (fls(mask) > 64 - shift) {
413 		/*
414 		 * Will spill over into the next logical flit, which is the flit
415 		 * before this one.  The flit_idx before this one must be valid.
416 		 */
417 		MPASS(flit_idx > 0);
418 		t2 = be64toh(tcb[flit_idx - 1]) << (64 - shift);
419 	}
420 	return ((t2 | t1) & mask);
421 #undef LAST_WORD
422 }
423 #define GET_TCB_FIELD(tcb, F) \
424     get_tcb_field(tcb, W_TCB_##F, M_TCB_##F, S_TCB_##F)
425 
426 /*
427  * Issues a CPL_GET_TCB to read the entire TCB for the tid.
428  */
429 static int
430 send_get_tcb(struct adapter *sc, u_int tid)
431 {
432 	struct cpl_get_tcb *cpl;
433 	struct wrq_cookie cookie;
434 
435 	MPASS(tid < sc->tids.ntids);
436 
437 	cpl = start_wrq_wr(&sc->sge.ctrlq[0], howmany(sizeof(*cpl), 16),
438 	    &cookie);
439 	if (__predict_false(cpl == NULL))
440 		return (ENOMEM);
441 	bzero(cpl, sizeof(*cpl));
442 	INIT_TP_WR(cpl, tid);
443 	OPCODE_TID(cpl) = htobe32(MK_OPCODE_TID(CPL_GET_TCB, tid));
444 	cpl->reply_ctrl = htobe16(V_REPLY_CHAN(0) |
445 	    V_QUEUENO(sc->sge.ofld_rxq[0].iq.cntxt_id));
446 	cpl->cookie = 0xff;
447 	commit_wrq_wr(&sc->sge.ctrlq[0], cpl, &cookie);
448 
449 	return (0);
450 }
451 
452 static struct tcb_histent *
453 alloc_tcb_histent(struct adapter *sc, u_int tid, int flags)
454 {
455 	struct tcb_histent *te;
456 
457 	MPASS(flags == M_NOWAIT || flags == M_WAITOK);
458 
459 	te = malloc(sizeof(*te), M_CXGBE, M_ZERO | flags);
460 	if (te == NULL)
461 		return (NULL);
462 	mtx_init(&te->te_lock, "TCB entry", NULL, MTX_DEF);
463 	callout_init_mtx(&te->te_callout, &te->te_lock, 0);
464 	te->te_adapter = sc;
465 	te->te_tid = tid;
466 
467 	return (te);
468 }
469 
470 static void
471 free_tcb_histent(struct tcb_histent *te)
472 {
473 
474 	mtx_destroy(&te->te_lock);
475 	free(te, M_CXGBE);
476 }
477 
478 /*
479  * Start tracking the tid in the TCB history.
480  */
481 int
482 add_tid_to_history(struct adapter *sc, u_int tid)
483 {
484 	struct tcb_histent *te = NULL;
485 	struct tom_data *td = sc->tom_softc;
486 	int rc;
487 
488 	MPASS(tid < sc->tids.ntids);
489 
490 	if (td->tcb_history == NULL)
491 		return (ENXIO);
492 
493 	rw_wlock(&td->tcb_history_lock);
494 	if (td->tcb_history[tid] != NULL) {
495 		rc = EEXIST;
496 		goto done;
497 	}
498 	te = alloc_tcb_histent(sc, tid, M_NOWAIT);
499 	if (te == NULL) {
500 		rc = ENOMEM;
501 		goto done;
502 	}
503 	mtx_lock(&te->te_lock);
504 	rc = send_get_tcb(sc, tid);
505 	if (rc == 0) {
506 		te->te_flags |= TE_RPL_PENDING;
507 		td->tcb_history[tid] = te;
508 	} else {
509 		free(te, M_CXGBE);
510 	}
511 	mtx_unlock(&te->te_lock);
512 done:
513 	rw_wunlock(&td->tcb_history_lock);
514 	return (rc);
515 }
516 
517 static void
518 remove_tcb_histent(struct tcb_histent *te)
519 {
520 	struct adapter *sc = te->te_adapter;
521 	struct tom_data *td = sc->tom_softc;
522 
523 	rw_assert(&td->tcb_history_lock, RA_WLOCKED);
524 	mtx_assert(&te->te_lock, MA_OWNED);
525 	MPASS(td->tcb_history[te->te_tid] == te);
526 
527 	td->tcb_history[te->te_tid] = NULL;
528 	free_tcb_histent(te);
529 	rw_wunlock(&td->tcb_history_lock);
530 }
531 
532 static inline struct tcb_histent *
533 lookup_tcb_histent(struct adapter *sc, u_int tid, bool addrem)
534 {
535 	struct tcb_histent *te;
536 	struct tom_data *td = sc->tom_softc;
537 
538 	MPASS(tid < sc->tids.ntids);
539 
540 	if (td->tcb_history == NULL)
541 		return (NULL);
542 
543 	if (addrem)
544 		rw_wlock(&td->tcb_history_lock);
545 	else
546 		rw_rlock(&td->tcb_history_lock);
547 	te = td->tcb_history[tid];
548 	if (te != NULL) {
549 		mtx_lock(&te->te_lock);
550 		return (te);	/* with both locks held */
551 	}
552 	if (addrem)
553 		rw_wunlock(&td->tcb_history_lock);
554 	else
555 		rw_runlock(&td->tcb_history_lock);
556 
557 	return (te);
558 }
559 
560 static inline void
561 release_tcb_histent(struct tcb_histent *te)
562 {
563 	struct adapter *sc = te->te_adapter;
564 	struct tom_data *td = sc->tom_softc;
565 
566 	mtx_assert(&te->te_lock, MA_OWNED);
567 	mtx_unlock(&te->te_lock);
568 	rw_assert(&td->tcb_history_lock, RA_RLOCKED);
569 	rw_runlock(&td->tcb_history_lock);
570 }
571 
572 static void
573 request_tcb(void *arg)
574 {
575 	struct tcb_histent *te = arg;
576 
577 	mtx_assert(&te->te_lock, MA_OWNED);
578 
579 	/* Noone else is supposed to update the histent. */
580 	MPASS(!(te->te_flags & TE_RPL_PENDING));
581 	if (send_get_tcb(te->te_adapter, te->te_tid) == 0)
582 		te->te_flags |= TE_RPL_PENDING;
583 	else
584 		callout_schedule(&te->te_callout, hz / 100);
585 }
586 
587 static void
588 update_tcb_histent(struct tcb_histent *te, const uint64_t *tcb)
589 {
590 	struct tom_data *td = te->te_adapter->tom_softc;
591 	uint64_t tflags = get_tcb_tflags(tcb);
592 	uint8_t sample = 0;
593 
594 	if (GET_TCB_FIELD(tcb, SND_MAX_RAW) != GET_TCB_FIELD(tcb, SND_UNA_RAW)) {
595 		if (GET_TCB_FIELD(tcb, T_RXTSHIFT) != 0)
596 			sample |= TS_RTO;
597 		if (GET_TCB_FIELD(tcb, T_DUPACKS) != 0)
598 			sample |= TS_DUPACKS;
599 		if (GET_TCB_FIELD(tcb, T_DUPACKS) >= td->dupack_threshold)
600 			sample |= TS_FASTREXMT;
601 	}
602 
603 	if (GET_TCB_FIELD(tcb, SND_MAX_RAW) != 0) {
604 		uint32_t snd_wnd;
605 
606 		sample |= TS_SND_BACKLOGGED;	/* for whatever reason. */
607 
608 		snd_wnd = GET_TCB_FIELD(tcb, RCV_ADV);
609 		if (tflags & V_TF_RECV_SCALE(1))
610 			snd_wnd <<= GET_TCB_FIELD(tcb, RCV_SCALE);
611 		if (GET_TCB_FIELD(tcb, SND_CWND) < snd_wnd)
612 			sample |= TS_CWND_LIMITED;	/* maybe due to CWND */
613 	}
614 
615 	if (tflags & V_TF_CCTRL_ECN(1)) {
616 
617 		/*
618 		 * CE marker on incoming IP hdr, echoing ECE back in the TCP
619 		 * hdr.  Indicates congestion somewhere on the way from the peer
620 		 * to this node.
621 		 */
622 		if (tflags & V_TF_CCTRL_ECE(1))
623 			sample |= TS_ECN_ECE;
624 
625 		/*
626 		 * ECE seen and CWR sent (or about to be sent).  Might indicate
627 		 * congestion on the way to the peer.  This node is reducing its
628 		 * congestion window in response.
629 		 */
630 		if (tflags & (V_TF_CCTRL_CWR(1) | V_TF_CCTRL_RFR(1)))
631 			sample |= TS_ECN_CWR;
632 	}
633 
634 	te->te_sample[te->te_pidx] = sample;
635 	if (++te->te_pidx == nitems(te->te_sample))
636 		te->te_pidx = 0;
637 	memcpy(te->te_tcb, tcb, TCB_SIZE);
638 	te->te_flags |= TE_ACTIVE;
639 }
640 
641 static int
642 do_get_tcb_rpl(struct sge_iq *iq, const struct rss_header *rss, struct mbuf *m)
643 {
644 	struct adapter *sc = iq->adapter;
645 	const struct cpl_get_tcb_rpl *cpl = mtod(m, const void *);
646 	const uint64_t *tcb = (const uint64_t *)(const void *)(cpl + 1);
647 	struct tcb_histent *te;
648 	const u_int tid = GET_TID(cpl);
649 	bool remove;
650 
651 	remove = GET_TCB_FIELD(tcb, T_STATE) == TCPS_CLOSED;
652 	te = lookup_tcb_histent(sc, tid, remove);
653 	if (te == NULL) {
654 		/* Not in the history.  Who issued the GET_TCB for this? */
655 		device_printf(sc->dev, "tcb %u: flags 0x%016jx, state %u, "
656 		    "srtt %u, sscale %u, rscale %u, cookie 0x%x\n", tid,
657 		    (uintmax_t)get_tcb_tflags(tcb), GET_TCB_FIELD(tcb, T_STATE),
658 		    GET_TCB_FIELD(tcb, T_SRTT), GET_TCB_FIELD(tcb, SND_SCALE),
659 		    GET_TCB_FIELD(tcb, RCV_SCALE), cpl->cookie);
660 		goto done;
661 	}
662 
663 	MPASS(te->te_flags & TE_RPL_PENDING);
664 	te->te_flags &= ~TE_RPL_PENDING;
665 	if (remove) {
666 		remove_tcb_histent(te);
667 	} else {
668 		update_tcb_histent(te, tcb);
669 		callout_reset(&te->te_callout, hz / 10, request_tcb, te);
670 		release_tcb_histent(te);
671 	}
672 done:
673 	m_freem(m);
674 	return (0);
675 }
676 
677 static void
678 fill_tcp_info_from_tcb(struct adapter *sc, uint64_t *tcb, struct tcp_info *ti)
679 {
680 	uint32_t v;
681 
682 	ti->tcpi_state = GET_TCB_FIELD(tcb, T_STATE);
683 
684 	v = GET_TCB_FIELD(tcb, T_SRTT);
685 	ti->tcpi_rtt = tcp_ticks_to_us(sc, v);
686 
687 	v = GET_TCB_FIELD(tcb, T_RTTVAR);
688 	ti->tcpi_rttvar = tcp_ticks_to_us(sc, v);
689 
690 	ti->tcpi_snd_ssthresh = GET_TCB_FIELD(tcb, SND_SSTHRESH);
691 	ti->tcpi_snd_cwnd = GET_TCB_FIELD(tcb, SND_CWND);
692 	ti->tcpi_rcv_nxt = GET_TCB_FIELD(tcb, RCV_NXT);
693 
694 	v = GET_TCB_FIELD(tcb, TX_MAX);
695 	ti->tcpi_snd_nxt = v - GET_TCB_FIELD(tcb, SND_NXT_RAW);
696 
697 	/* Receive window being advertised by us. */
698 	ti->tcpi_rcv_wscale = GET_TCB_FIELD(tcb, SND_SCALE);	/* Yes, SND. */
699 	ti->tcpi_rcv_space = GET_TCB_FIELD(tcb, RCV_WND);
700 
701 	/* Send window */
702 	ti->tcpi_snd_wscale = GET_TCB_FIELD(tcb, RCV_SCALE);	/* Yes, RCV. */
703 	ti->tcpi_snd_wnd = GET_TCB_FIELD(tcb, RCV_ADV);
704 	if (get_tcb_tflags(tcb) & V_TF_RECV_SCALE(1))
705 		ti->tcpi_snd_wnd <<= ti->tcpi_snd_wscale;
706 	else
707 		ti->tcpi_snd_wscale = 0;
708 
709 }
710 
711 static void
712 fill_tcp_info_from_history(struct adapter *sc, struct tcb_histent *te,
713     struct tcp_info *ti)
714 {
715 
716 	fill_tcp_info_from_tcb(sc, te->te_tcb, ti);
717 }
718 
719 /*
720  * Reads the TCB for the given tid using a memory window and copies it to 'buf'
721  * in the same format as CPL_GET_TCB_RPL.
722  */
723 static void
724 read_tcb_using_memwin(struct adapter *sc, u_int tid, uint64_t *buf)
725 {
726 	int i, j, k, rc;
727 	uint32_t addr;
728 	u_char *tcb, tmp;
729 
730 	MPASS(tid < sc->tids.ntids);
731 
732 	addr = t4_read_reg(sc, A_TP_CMM_TCB_BASE) + tid * TCB_SIZE;
733 	rc = read_via_memwin(sc, 2, addr, (uint32_t *)buf, TCB_SIZE);
734 	if (rc != 0)
735 		return;
736 
737 	tcb = (u_char *)buf;
738 	for (i = 0, j = TCB_SIZE - 16; i < j; i += 16, j -= 16) {
739 		for (k = 0; k < 16; k++) {
740 			tmp = tcb[i + k];
741 			tcb[i + k] = tcb[j + k];
742 			tcb[j + k] = tmp;
743 		}
744 	}
745 }
746 
747 static void
748 fill_tcp_info(struct adapter *sc, u_int tid, struct tcp_info *ti)
749 {
750 	uint64_t tcb[TCB_SIZE / sizeof(uint64_t)];
751 	struct tcb_histent *te;
752 
753 	ti->tcpi_toe_tid = tid;
754 	te = lookup_tcb_histent(sc, tid, false);
755 	if (te != NULL) {
756 		fill_tcp_info_from_history(sc, te, ti);
757 		release_tcb_histent(te);
758 	} else {
759 		if (!(sc->debug_flags & DF_DISABLE_TCB_CACHE)) {
760 			/* XXX: tell firmware to flush TCB cache. */
761 		}
762 		read_tcb_using_memwin(sc, tid, tcb);
763 		fill_tcp_info_from_tcb(sc, tcb, ti);
764 	}
765 }
766 
767 /*
768  * Called by the kernel to allow the TOE driver to "refine" values filled up in
769  * the tcp_info for an offloaded connection.
770  */
771 static void
772 t4_tcp_info(struct toedev *tod, struct tcpcb *tp, struct tcp_info *ti)
773 {
774 	struct adapter *sc = tod->tod_softc;
775 	struct toepcb *toep = tp->t_toe;
776 
777 	INP_WLOCK_ASSERT(tp->t_inpcb);
778 	MPASS(ti != NULL);
779 
780 	fill_tcp_info(sc, toep->tid, ti);
781 }
782 
783 /*
784  * The TOE driver will not receive any more CPLs for the tid associated with the
785  * toepcb; release the hold on the inpcb.
786  */
787 void
788 final_cpl_received(struct toepcb *toep)
789 {
790 	struct inpcb *inp = toep->inp;
791 
792 	KASSERT(inp != NULL, ("%s: inp is NULL", __func__));
793 	INP_WLOCK_ASSERT(inp);
794 	KASSERT(toep->flags & TPF_CPL_PENDING,
795 	    ("%s: CPL not pending already?", __func__));
796 
797 	CTR6(KTR_CXGBE, "%s: tid %d, toep %p (0x%x), inp %p (0x%x)",
798 	    __func__, toep->tid, toep, toep->flags, inp, inp->inp_flags);
799 
800 	if (toep->ulp_mode == ULP_MODE_TCPDDP)
801 		release_ddp_resources(toep);
802 	toep->inp = NULL;
803 	toep->flags &= ~TPF_CPL_PENDING;
804 	mbufq_drain(&toep->ulp_pdu_reclaimq);
805 
806 	if (!(toep->flags & TPF_ATTACHED))
807 		release_offload_resources(toep);
808 
809 	if (!in_pcbrele_wlocked(inp))
810 		INP_WUNLOCK(inp);
811 }
812 
813 void
814 insert_tid(struct adapter *sc, int tid, void *ctx, int ntids)
815 {
816 	struct tid_info *t = &sc->tids;
817 
818 	MPASS(tid >= t->tid_base);
819 	MPASS(tid - t->tid_base < t->ntids);
820 
821 	t->tid_tab[tid - t->tid_base] = ctx;
822 	atomic_add_int(&t->tids_in_use, ntids);
823 }
824 
825 void *
826 lookup_tid(struct adapter *sc, int tid)
827 {
828 	struct tid_info *t = &sc->tids;
829 
830 	return (t->tid_tab[tid - t->tid_base]);
831 }
832 
833 void
834 update_tid(struct adapter *sc, int tid, void *ctx)
835 {
836 	struct tid_info *t = &sc->tids;
837 
838 	t->tid_tab[tid - t->tid_base] = ctx;
839 }
840 
841 void
842 remove_tid(struct adapter *sc, int tid, int ntids)
843 {
844 	struct tid_info *t = &sc->tids;
845 
846 	t->tid_tab[tid - t->tid_base] = NULL;
847 	atomic_subtract_int(&t->tids_in_use, ntids);
848 }
849 
850 /*
851  * What mtu_idx to use, given a 4-tuple.  Note that both s->mss and tcp_mssopt
852  * have the MSS that we should advertise in our SYN.  Advertised MSS doesn't
853  * account for any TCP options so the effective MSS (only payload, no headers or
854  * options) could be different.
855  */
856 int
857 find_best_mtu_idx(struct adapter *sc, struct in_conninfo *inc,
858     struct offload_settings *s)
859 {
860 	unsigned short *mtus = &sc->params.mtus[0];
861 	int i, mss, mtu;
862 
863 	MPASS(inc != NULL);
864 
865 	mss = s->mss > 0 ? s->mss : tcp_mssopt(inc);
866 	if (inc->inc_flags & INC_ISIPV6)
867 		mtu = mss + sizeof(struct ip6_hdr) + sizeof(struct tcphdr);
868 	else
869 		mtu = mss + sizeof(struct ip) + sizeof(struct tcphdr);
870 
871 	for (i = 0; i < NMTUS - 1 && mtus[i + 1] <= mtu; i++)
872 		continue;
873 
874 	return (i);
875 }
876 
877 /*
878  * Determine the receive window size for a socket.
879  */
880 u_long
881 select_rcv_wnd(struct socket *so)
882 {
883 	unsigned long wnd;
884 
885 	SOCKBUF_LOCK_ASSERT(&so->so_rcv);
886 
887 	wnd = sbspace(&so->so_rcv);
888 	if (wnd < MIN_RCV_WND)
889 		wnd = MIN_RCV_WND;
890 
891 	return min(wnd, MAX_RCV_WND);
892 }
893 
894 int
895 select_rcv_wscale(void)
896 {
897 	int wscale = 0;
898 	unsigned long space = sb_max;
899 
900 	if (space > MAX_RCV_WND)
901 		space = MAX_RCV_WND;
902 
903 	while (wscale < TCP_MAX_WINSHIFT && (TCP_MAXWIN << wscale) < space)
904 		wscale++;
905 
906 	return (wscale);
907 }
908 
909 /*
910  * socket so could be a listening socket too.
911  */
912 uint64_t
913 calc_opt0(struct socket *so, struct vi_info *vi, struct l2t_entry *e,
914     int mtu_idx, int rscale, int rx_credits, int ulp_mode,
915     struct offload_settings *s)
916 {
917 	int keepalive;
918 	uint64_t opt0;
919 
920 	MPASS(so != NULL);
921 	MPASS(vi != NULL);
922 	KASSERT(rx_credits <= M_RCV_BUFSIZ,
923 	    ("%s: rcv_bufsiz too high", __func__));
924 
925 	opt0 = F_TCAM_BYPASS | V_WND_SCALE(rscale) | V_MSS_IDX(mtu_idx) |
926 	    V_ULP_MODE(ulp_mode) | V_RCV_BUFSIZ(rx_credits) |
927 	    V_L2T_IDX(e->idx) | V_SMAC_SEL(vi->smt_idx) |
928 	    V_TX_CHAN(vi->pi->tx_chan);
929 
930 	keepalive = tcp_always_keepalive || so_options_get(so) & SO_KEEPALIVE;
931 	opt0 |= V_KEEP_ALIVE(keepalive != 0);
932 
933 	if (s->nagle < 0) {
934 		struct inpcb *inp = sotoinpcb(so);
935 		struct tcpcb *tp = intotcpcb(inp);
936 
937 		opt0 |= V_NAGLE((tp->t_flags & TF_NODELAY) == 0);
938 	} else
939 		opt0 |= V_NAGLE(s->nagle != 0);
940 
941 	return htobe64(opt0);
942 }
943 
944 uint64_t
945 select_ntuple(struct vi_info *vi, struct l2t_entry *e)
946 {
947 	struct adapter *sc = vi->pi->adapter;
948 	struct tp_params *tp = &sc->params.tp;
949 	uint64_t ntuple = 0;
950 
951 	/*
952 	 * Initialize each of the fields which we care about which are present
953 	 * in the Compressed Filter Tuple.
954 	 */
955 	if (tp->vlan_shift >= 0 && EVL_VLANOFTAG(e->vlan) != CPL_L2T_VLAN_NONE)
956 		ntuple |= (uint64_t)(F_FT_VLAN_VLD | e->vlan) << tp->vlan_shift;
957 
958 	if (tp->port_shift >= 0)
959 		ntuple |= (uint64_t)e->lport << tp->port_shift;
960 
961 	if (tp->protocol_shift >= 0)
962 		ntuple |= (uint64_t)IPPROTO_TCP << tp->protocol_shift;
963 
964 	if (tp->vnic_shift >= 0 && tp->ingress_config & F_VNIC) {
965 		ntuple |= (uint64_t)(V_FT_VNID_ID_VF(vi->vin) |
966 		    V_FT_VNID_ID_PF(sc->pf) | V_FT_VNID_ID_VLD(vi->vfvld)) <<
967 		    tp->vnic_shift;
968 	}
969 
970 	if (is_t4(sc))
971 		return (htobe32((uint32_t)ntuple));
972 	else
973 		return (htobe64(V_FILTER_TUPLE(ntuple)));
974 }
975 
976 static int
977 is_tls_sock(struct socket *so, struct adapter *sc)
978 {
979 	struct inpcb *inp = sotoinpcb(so);
980 	int i, rc;
981 
982 	/* XXX: Eventually add a SO_WANT_TLS socket option perhaps? */
983 	rc = 0;
984 	ADAPTER_LOCK(sc);
985 	for (i = 0; i < sc->tt.num_tls_rx_ports; i++) {
986 		if (inp->inp_lport == htons(sc->tt.tls_rx_ports[i]) ||
987 		    inp->inp_fport == htons(sc->tt.tls_rx_ports[i])) {
988 			rc = 1;
989 			break;
990 		}
991 	}
992 	ADAPTER_UNLOCK(sc);
993 	return (rc);
994 }
995 
996 int
997 select_ulp_mode(struct socket *so, struct adapter *sc,
998     struct offload_settings *s)
999 {
1000 
1001 	if (can_tls_offload(sc) &&
1002 	    (s->tls > 0 || (s->tls < 0 && is_tls_sock(so, sc))))
1003 		return (ULP_MODE_TLS);
1004 	else if (s->ddp > 0 ||
1005 	    (s->ddp < 0 && sc->tt.ddp && (so->so_options & SO_NO_DDP) == 0))
1006 		return (ULP_MODE_TCPDDP);
1007 	else
1008 		return (ULP_MODE_NONE);
1009 }
1010 
1011 void
1012 set_ulp_mode(struct toepcb *toep, int ulp_mode)
1013 {
1014 
1015 	CTR4(KTR_CXGBE, "%s: toep %p (tid %d) ulp_mode %d",
1016 	    __func__, toep, toep->tid, ulp_mode);
1017 	toep->ulp_mode = ulp_mode;
1018 	tls_init_toep(toep);
1019 	if (toep->ulp_mode == ULP_MODE_TCPDDP)
1020 		ddp_init_toep(toep);
1021 }
1022 
1023 int
1024 negative_advice(int status)
1025 {
1026 
1027 	return (status == CPL_ERR_RTX_NEG_ADVICE ||
1028 	    status == CPL_ERR_PERSIST_NEG_ADVICE ||
1029 	    status == CPL_ERR_KEEPALV_NEG_ADVICE);
1030 }
1031 
1032 static int
1033 alloc_tid_tab(struct tid_info *t, int flags)
1034 {
1035 
1036 	MPASS(t->ntids > 0);
1037 	MPASS(t->tid_tab == NULL);
1038 
1039 	t->tid_tab = malloc(t->ntids * sizeof(*t->tid_tab), M_CXGBE,
1040 	    M_ZERO | flags);
1041 	if (t->tid_tab == NULL)
1042 		return (ENOMEM);
1043 	atomic_store_rel_int(&t->tids_in_use, 0);
1044 
1045 	return (0);
1046 }
1047 
1048 static void
1049 free_tid_tab(struct tid_info *t)
1050 {
1051 
1052 	KASSERT(t->tids_in_use == 0,
1053 	    ("%s: %d tids still in use.", __func__, t->tids_in_use));
1054 
1055 	free(t->tid_tab, M_CXGBE);
1056 	t->tid_tab = NULL;
1057 }
1058 
1059 static int
1060 alloc_stid_tab(struct tid_info *t, int flags)
1061 {
1062 
1063 	MPASS(t->nstids > 0);
1064 	MPASS(t->stid_tab == NULL);
1065 
1066 	t->stid_tab = malloc(t->nstids * sizeof(*t->stid_tab), M_CXGBE,
1067 	    M_ZERO | flags);
1068 	if (t->stid_tab == NULL)
1069 		return (ENOMEM);
1070 	mtx_init(&t->stid_lock, "stid lock", NULL, MTX_DEF);
1071 	t->stids_in_use = 0;
1072 	TAILQ_INIT(&t->stids);
1073 	t->nstids_free_head = t->nstids;
1074 
1075 	return (0);
1076 }
1077 
1078 static void
1079 free_stid_tab(struct tid_info *t)
1080 {
1081 
1082 	KASSERT(t->stids_in_use == 0,
1083 	    ("%s: %d tids still in use.", __func__, t->stids_in_use));
1084 
1085 	if (mtx_initialized(&t->stid_lock))
1086 		mtx_destroy(&t->stid_lock);
1087 	free(t->stid_tab, M_CXGBE);
1088 	t->stid_tab = NULL;
1089 }
1090 
1091 static void
1092 free_tid_tabs(struct tid_info *t)
1093 {
1094 
1095 	free_tid_tab(t);
1096 	free_atid_tab(t);
1097 	free_stid_tab(t);
1098 }
1099 
1100 static int
1101 alloc_tid_tabs(struct tid_info *t)
1102 {
1103 	int rc;
1104 
1105 	rc = alloc_tid_tab(t, M_NOWAIT);
1106 	if (rc != 0)
1107 		goto failed;
1108 
1109 	rc = alloc_atid_tab(t, M_NOWAIT);
1110 	if (rc != 0)
1111 		goto failed;
1112 
1113 	rc = alloc_stid_tab(t, M_NOWAIT);
1114 	if (rc != 0)
1115 		goto failed;
1116 
1117 	return (0);
1118 failed:
1119 	free_tid_tabs(t);
1120 	return (rc);
1121 }
1122 
1123 static inline void
1124 alloc_tcb_history(struct adapter *sc, struct tom_data *td)
1125 {
1126 
1127 	if (sc->tids.ntids == 0 || sc->tids.ntids > 1024)
1128 		return;
1129 	rw_init(&td->tcb_history_lock, "TCB history");
1130 	td->tcb_history = malloc(sc->tids.ntids * sizeof(*td->tcb_history),
1131 	    M_CXGBE, M_ZERO | M_NOWAIT);
1132 	td->dupack_threshold = G_DUPACKTHRESH(t4_read_reg(sc, A_TP_PARA_REG0));
1133 }
1134 
1135 static inline void
1136 free_tcb_history(struct adapter *sc, struct tom_data *td)
1137 {
1138 #ifdef INVARIANTS
1139 	int i;
1140 
1141 	if (td->tcb_history != NULL) {
1142 		for (i = 0; i < sc->tids.ntids; i++) {
1143 			MPASS(td->tcb_history[i] == NULL);
1144 		}
1145 	}
1146 #endif
1147 	free(td->tcb_history, M_CXGBE);
1148 	if (rw_initialized(&td->tcb_history_lock))
1149 		rw_destroy(&td->tcb_history_lock);
1150 }
1151 
1152 static void
1153 free_tom_data(struct adapter *sc, struct tom_data *td)
1154 {
1155 
1156 	ASSERT_SYNCHRONIZED_OP(sc);
1157 
1158 	KASSERT(TAILQ_EMPTY(&td->toep_list),
1159 	    ("%s: TOE PCB list is not empty.", __func__));
1160 	KASSERT(td->lctx_count == 0,
1161 	    ("%s: lctx hash table is not empty.", __func__));
1162 
1163 	t4_free_ppod_region(&td->pr);
1164 
1165 	if (td->listen_mask != 0)
1166 		hashdestroy(td->listen_hash, M_CXGBE, td->listen_mask);
1167 
1168 	if (mtx_initialized(&td->unsent_wr_lock))
1169 		mtx_destroy(&td->unsent_wr_lock);
1170 	if (mtx_initialized(&td->lctx_hash_lock))
1171 		mtx_destroy(&td->lctx_hash_lock);
1172 	if (mtx_initialized(&td->toep_list_lock))
1173 		mtx_destroy(&td->toep_list_lock);
1174 
1175 	free_tcb_history(sc, td);
1176 	free_tid_tabs(&sc->tids);
1177 	free(td, M_CXGBE);
1178 }
1179 
1180 static char *
1181 prepare_pkt(int open_type, uint16_t vtag, struct inpcb *inp, int *pktlen,
1182     int *buflen)
1183 {
1184 	char *pkt;
1185 	struct tcphdr *th;
1186 	int ipv6, len;
1187 	const int maxlen =
1188 	    max(sizeof(struct ether_header), sizeof(struct ether_vlan_header)) +
1189 	    max(sizeof(struct ip), sizeof(struct ip6_hdr)) +
1190 	    sizeof(struct tcphdr);
1191 
1192 	MPASS(open_type == OPEN_TYPE_ACTIVE || open_type == OPEN_TYPE_LISTEN);
1193 
1194 	pkt = malloc(maxlen, M_CXGBE, M_ZERO | M_NOWAIT);
1195 	if (pkt == NULL)
1196 		return (NULL);
1197 
1198 	ipv6 = inp->inp_vflag & INP_IPV6;
1199 	len = 0;
1200 
1201 	if (EVL_VLANOFTAG(vtag) == 0xfff) {
1202 		struct ether_header *eh = (void *)pkt;
1203 
1204 		if (ipv6)
1205 			eh->ether_type = htons(ETHERTYPE_IPV6);
1206 		else
1207 			eh->ether_type = htons(ETHERTYPE_IP);
1208 
1209 		len += sizeof(*eh);
1210 	} else {
1211 		struct ether_vlan_header *evh = (void *)pkt;
1212 
1213 		evh->evl_encap_proto = htons(ETHERTYPE_VLAN);
1214 		evh->evl_tag = htons(vtag);
1215 		if (ipv6)
1216 			evh->evl_proto = htons(ETHERTYPE_IPV6);
1217 		else
1218 			evh->evl_proto = htons(ETHERTYPE_IP);
1219 
1220 		len += sizeof(*evh);
1221 	}
1222 
1223 	if (ipv6) {
1224 		struct ip6_hdr *ip6 = (void *)&pkt[len];
1225 
1226 		ip6->ip6_vfc = IPV6_VERSION;
1227 		ip6->ip6_plen = htons(sizeof(struct tcphdr));
1228 		ip6->ip6_nxt = IPPROTO_TCP;
1229 		if (open_type == OPEN_TYPE_ACTIVE) {
1230 			ip6->ip6_src = inp->in6p_laddr;
1231 			ip6->ip6_dst = inp->in6p_faddr;
1232 		} else if (open_type == OPEN_TYPE_LISTEN) {
1233 			ip6->ip6_src = inp->in6p_laddr;
1234 			ip6->ip6_dst = ip6->ip6_src;
1235 		}
1236 
1237 		len += sizeof(*ip6);
1238 	} else {
1239 		struct ip *ip = (void *)&pkt[len];
1240 
1241 		ip->ip_v = IPVERSION;
1242 		ip->ip_hl = sizeof(*ip) >> 2;
1243 		ip->ip_tos = inp->inp_ip_tos;
1244 		ip->ip_len = htons(sizeof(struct ip) + sizeof(struct tcphdr));
1245 		ip->ip_ttl = inp->inp_ip_ttl;
1246 		ip->ip_p = IPPROTO_TCP;
1247 		if (open_type == OPEN_TYPE_ACTIVE) {
1248 			ip->ip_src = inp->inp_laddr;
1249 			ip->ip_dst = inp->inp_faddr;
1250 		} else if (open_type == OPEN_TYPE_LISTEN) {
1251 			ip->ip_src = inp->inp_laddr;
1252 			ip->ip_dst = ip->ip_src;
1253 		}
1254 
1255 		len += sizeof(*ip);
1256 	}
1257 
1258 	th = (void *)&pkt[len];
1259 	if (open_type == OPEN_TYPE_ACTIVE) {
1260 		th->th_sport = inp->inp_lport;	/* network byte order already */
1261 		th->th_dport = inp->inp_fport;	/* ditto */
1262 	} else if (open_type == OPEN_TYPE_LISTEN) {
1263 		th->th_sport = inp->inp_lport;	/* network byte order already */
1264 		th->th_dport = th->th_sport;
1265 	}
1266 	len += sizeof(th);
1267 
1268 	*pktlen = *buflen = len;
1269 	return (pkt);
1270 }
1271 
1272 const struct offload_settings *
1273 lookup_offload_policy(struct adapter *sc, int open_type, struct mbuf *m,
1274     uint16_t vtag, struct inpcb *inp)
1275 {
1276 	const struct t4_offload_policy *op;
1277 	char *pkt;
1278 	struct offload_rule *r;
1279 	int i, matched, pktlen, buflen;
1280 	static const struct offload_settings allow_offloading_settings = {
1281 		.offload = 1,
1282 		.rx_coalesce = -1,
1283 		.cong_algo = -1,
1284 		.sched_class = -1,
1285 		.tstamp = -1,
1286 		.sack = -1,
1287 		.nagle = -1,
1288 		.ecn = -1,
1289 		.ddp = -1,
1290 		.tls = -1,
1291 		.txq = -1,
1292 		.rxq = -1,
1293 		.mss = -1,
1294 	};
1295 	static const struct offload_settings disallow_offloading_settings = {
1296 		.offload = 0,
1297 		/* rest is irrelevant when offload is off. */
1298 	};
1299 
1300 	rw_assert(&sc->policy_lock, RA_LOCKED);
1301 
1302 	/*
1303 	 * If there's no Connection Offloading Policy attached to the device
1304 	 * then we need to return a default static policy.  If
1305 	 * "cop_managed_offloading" is true, then we need to disallow
1306 	 * offloading until a COP is attached to the device.  Otherwise we
1307 	 * allow offloading ...
1308 	 */
1309 	op = sc->policy;
1310 	if (op == NULL) {
1311 		if (sc->tt.cop_managed_offloading)
1312 			return (&disallow_offloading_settings);
1313 		else
1314 			return (&allow_offloading_settings);
1315 	}
1316 
1317 	switch (open_type) {
1318 	case OPEN_TYPE_ACTIVE:
1319 	case OPEN_TYPE_LISTEN:
1320 		pkt = prepare_pkt(open_type, vtag, inp, &pktlen, &buflen);
1321 		break;
1322 	case OPEN_TYPE_PASSIVE:
1323 		MPASS(m != NULL);
1324 		pkt = mtod(m, char *);
1325 		MPASS(*pkt == CPL_PASS_ACCEPT_REQ);
1326 		pkt += sizeof(struct cpl_pass_accept_req);
1327 		pktlen = m->m_pkthdr.len - sizeof(struct cpl_pass_accept_req);
1328 		buflen = m->m_len - sizeof(struct cpl_pass_accept_req);
1329 		break;
1330 	default:
1331 		MPASS(0);
1332 		return (&disallow_offloading_settings);
1333 	}
1334 
1335 	if (pkt == NULL || pktlen == 0 || buflen == 0)
1336 		return (&disallow_offloading_settings);
1337 
1338 	matched = 0;
1339 	r = &op->rule[0];
1340 	for (i = 0; i < op->nrules; i++, r++) {
1341 		if (r->open_type != open_type &&
1342 		    r->open_type != OPEN_TYPE_DONTCARE) {
1343 			continue;
1344 		}
1345 		matched = bpf_filter(r->bpf_prog.bf_insns, pkt, pktlen, buflen);
1346 		if (matched)
1347 			break;
1348 	}
1349 
1350 	if (open_type == OPEN_TYPE_ACTIVE || open_type == OPEN_TYPE_LISTEN)
1351 		free(pkt, M_CXGBE);
1352 
1353 	return (matched ? &r->settings : &disallow_offloading_settings);
1354 }
1355 
1356 static void
1357 reclaim_wr_resources(void *arg, int count)
1358 {
1359 	struct tom_data *td = arg;
1360 	STAILQ_HEAD(, wrqe) twr_list = STAILQ_HEAD_INITIALIZER(twr_list);
1361 	struct cpl_act_open_req *cpl;
1362 	u_int opcode, atid, tid;
1363 	struct wrqe *wr;
1364 	struct adapter *sc = td_adapter(td);
1365 
1366 	mtx_lock(&td->unsent_wr_lock);
1367 	STAILQ_SWAP(&td->unsent_wr_list, &twr_list, wrqe);
1368 	mtx_unlock(&td->unsent_wr_lock);
1369 
1370 	while ((wr = STAILQ_FIRST(&twr_list)) != NULL) {
1371 		STAILQ_REMOVE_HEAD(&twr_list, link);
1372 
1373 		cpl = wrtod(wr);
1374 		opcode = GET_OPCODE(cpl);
1375 
1376 		switch (opcode) {
1377 		case CPL_ACT_OPEN_REQ:
1378 		case CPL_ACT_OPEN_REQ6:
1379 			atid = G_TID_TID(be32toh(OPCODE_TID(cpl)));
1380 			CTR2(KTR_CXGBE, "%s: atid %u ", __func__, atid);
1381 			act_open_failure_cleanup(sc, atid, EHOSTUNREACH);
1382 			free(wr, M_CXGBE);
1383 			break;
1384 		case CPL_PASS_ACCEPT_RPL:
1385 			tid = GET_TID(cpl);
1386 			CTR2(KTR_CXGBE, "%s: tid %u ", __func__, tid);
1387 			synack_failure_cleanup(sc, tid);
1388 			free(wr, M_CXGBE);
1389 			break;
1390 		default:
1391 			log(LOG_ERR, "%s: leaked work request %p, wr_len %d, "
1392 			    "opcode %x\n", __func__, wr, wr->wr_len, opcode);
1393 			/* WR not freed here; go look at it with a debugger.  */
1394 		}
1395 	}
1396 }
1397 
1398 /*
1399  * Ground control to Major TOM
1400  * Commencing countdown, engines on
1401  */
1402 static int
1403 t4_tom_activate(struct adapter *sc)
1404 {
1405 	struct tom_data *td;
1406 	struct toedev *tod;
1407 	struct vi_info *vi;
1408 	int i, rc, v;
1409 
1410 	ASSERT_SYNCHRONIZED_OP(sc);
1411 
1412 	/* per-adapter softc for TOM */
1413 	td = malloc(sizeof(*td), M_CXGBE, M_ZERO | M_NOWAIT);
1414 	if (td == NULL)
1415 		return (ENOMEM);
1416 
1417 	/* List of TOE PCBs and associated lock */
1418 	mtx_init(&td->toep_list_lock, "PCB list lock", NULL, MTX_DEF);
1419 	TAILQ_INIT(&td->toep_list);
1420 
1421 	/* Listen context */
1422 	mtx_init(&td->lctx_hash_lock, "lctx hash lock", NULL, MTX_DEF);
1423 	td->listen_hash = hashinit_flags(LISTEN_HASH_SIZE, M_CXGBE,
1424 	    &td->listen_mask, HASH_NOWAIT);
1425 
1426 	/* List of WRs for which L2 resolution failed */
1427 	mtx_init(&td->unsent_wr_lock, "Unsent WR list lock", NULL, MTX_DEF);
1428 	STAILQ_INIT(&td->unsent_wr_list);
1429 	TASK_INIT(&td->reclaim_wr_resources, 0, reclaim_wr_resources, td);
1430 
1431 	/* TID tables */
1432 	rc = alloc_tid_tabs(&sc->tids);
1433 	if (rc != 0)
1434 		goto done;
1435 
1436 	rc = t4_init_ppod_region(&td->pr, &sc->vres.ddp,
1437 	    t4_read_reg(sc, A_ULP_RX_TDDP_PSZ), "TDDP page pods");
1438 	if (rc != 0)
1439 		goto done;
1440 	t4_set_reg_field(sc, A_ULP_RX_TDDP_TAGMASK,
1441 	    V_TDDPTAGMASK(M_TDDPTAGMASK), td->pr.pr_tag_mask);
1442 
1443 	alloc_tcb_history(sc, td);
1444 
1445 	/* toedev ops */
1446 	tod = &td->tod;
1447 	init_toedev(tod);
1448 	tod->tod_softc = sc;
1449 	tod->tod_connect = t4_connect;
1450 	tod->tod_listen_start = t4_listen_start;
1451 	tod->tod_listen_stop = t4_listen_stop;
1452 	tod->tod_rcvd = t4_rcvd;
1453 	tod->tod_output = t4_tod_output;
1454 	tod->tod_send_rst = t4_send_rst;
1455 	tod->tod_send_fin = t4_send_fin;
1456 	tod->tod_pcb_detach = t4_pcb_detach;
1457 	tod->tod_l2_update = t4_l2_update;
1458 	tod->tod_syncache_added = t4_syncache_added;
1459 	tod->tod_syncache_removed = t4_syncache_removed;
1460 	tod->tod_syncache_respond = t4_syncache_respond;
1461 	tod->tod_offload_socket = t4_offload_socket;
1462 	tod->tod_ctloutput = t4_ctloutput;
1463 	tod->tod_tcp_info = t4_tcp_info;
1464 
1465 	for_each_port(sc, i) {
1466 		for_each_vi(sc->port[i], v, vi) {
1467 			TOEDEV(vi->ifp) = &td->tod;
1468 		}
1469 	}
1470 
1471 	sc->tom_softc = td;
1472 	register_toedev(sc->tom_softc);
1473 
1474 done:
1475 	if (rc != 0)
1476 		free_tom_data(sc, td);
1477 	return (rc);
1478 }
1479 
1480 static int
1481 t4_tom_deactivate(struct adapter *sc)
1482 {
1483 	int rc = 0;
1484 	struct tom_data *td = sc->tom_softc;
1485 
1486 	ASSERT_SYNCHRONIZED_OP(sc);
1487 
1488 	if (td == NULL)
1489 		return (0);	/* XXX. KASSERT? */
1490 
1491 	if (sc->offload_map != 0)
1492 		return (EBUSY);	/* at least one port has IFCAP_TOE enabled */
1493 
1494 	if (uld_active(sc, ULD_IWARP) || uld_active(sc, ULD_ISCSI))
1495 		return (EBUSY);	/* both iWARP and iSCSI rely on the TOE. */
1496 
1497 	mtx_lock(&td->toep_list_lock);
1498 	if (!TAILQ_EMPTY(&td->toep_list))
1499 		rc = EBUSY;
1500 	mtx_unlock(&td->toep_list_lock);
1501 
1502 	mtx_lock(&td->lctx_hash_lock);
1503 	if (td->lctx_count > 0)
1504 		rc = EBUSY;
1505 	mtx_unlock(&td->lctx_hash_lock);
1506 
1507 	taskqueue_drain(taskqueue_thread, &td->reclaim_wr_resources);
1508 	mtx_lock(&td->unsent_wr_lock);
1509 	if (!STAILQ_EMPTY(&td->unsent_wr_list))
1510 		rc = EBUSY;
1511 	mtx_unlock(&td->unsent_wr_lock);
1512 
1513 	if (rc == 0) {
1514 		unregister_toedev(sc->tom_softc);
1515 		free_tom_data(sc, td);
1516 		sc->tom_softc = NULL;
1517 	}
1518 
1519 	return (rc);
1520 }
1521 
1522 static int
1523 t4_aio_queue_tom(struct socket *so, struct kaiocb *job)
1524 {
1525 	struct tcpcb *tp = so_sototcpcb(so);
1526 	struct toepcb *toep = tp->t_toe;
1527 	int error;
1528 
1529 	if (toep->ulp_mode == ULP_MODE_TCPDDP) {
1530 		error = t4_aio_queue_ddp(so, job);
1531 		if (error != EOPNOTSUPP)
1532 			return (error);
1533 	}
1534 
1535 	return (t4_aio_queue_aiotx(so, job));
1536 }
1537 
1538 static int
1539 t4_ctloutput_tom(struct socket *so, struct sockopt *sopt)
1540 {
1541 
1542 	if (sopt->sopt_level != IPPROTO_TCP)
1543 		return (tcp_ctloutput(so, sopt));
1544 
1545 	switch (sopt->sopt_name) {
1546 	case TCP_TLSOM_SET_TLS_CONTEXT:
1547 	case TCP_TLSOM_GET_TLS_TOM:
1548 	case TCP_TLSOM_CLR_TLS_TOM:
1549 	case TCP_TLSOM_CLR_QUIES:
1550 		return (t4_ctloutput_tls(so, sopt));
1551 	default:
1552 		return (tcp_ctloutput(so, sopt));
1553 	}
1554 }
1555 
1556 static int
1557 t4_tom_mod_load(void)
1558 {
1559 	struct protosw *tcp_protosw, *tcp6_protosw;
1560 
1561 	/* CPL handlers */
1562 	t4_register_cpl_handler(CPL_GET_TCB_RPL, do_get_tcb_rpl);
1563 	t4_register_shared_cpl_handler(CPL_L2T_WRITE_RPL, do_l2t_write_rpl2,
1564 	    CPL_COOKIE_TOM);
1565 	t4_init_connect_cpl_handlers();
1566 	t4_init_listen_cpl_handlers();
1567 	t4_init_cpl_io_handlers();
1568 
1569 	t4_ddp_mod_load();
1570 	t4_tls_mod_load();
1571 
1572 	tcp_protosw = pffindproto(PF_INET, IPPROTO_TCP, SOCK_STREAM);
1573 	if (tcp_protosw == NULL)
1574 		return (ENOPROTOOPT);
1575 	bcopy(tcp_protosw, &toe_protosw, sizeof(toe_protosw));
1576 	bcopy(tcp_protosw->pr_usrreqs, &toe_usrreqs, sizeof(toe_usrreqs));
1577 	toe_usrreqs.pru_aio_queue = t4_aio_queue_tom;
1578 	toe_protosw.pr_ctloutput = t4_ctloutput_tom;
1579 	toe_protosw.pr_usrreqs = &toe_usrreqs;
1580 
1581 	tcp6_protosw = pffindproto(PF_INET6, IPPROTO_TCP, SOCK_STREAM);
1582 	if (tcp6_protosw == NULL)
1583 		return (ENOPROTOOPT);
1584 	bcopy(tcp6_protosw, &toe6_protosw, sizeof(toe6_protosw));
1585 	bcopy(tcp6_protosw->pr_usrreqs, &toe6_usrreqs, sizeof(toe6_usrreqs));
1586 	toe6_usrreqs.pru_aio_queue = t4_aio_queue_tom;
1587 	toe6_protosw.pr_ctloutput = t4_ctloutput_tom;
1588 	toe6_protosw.pr_usrreqs = &toe6_usrreqs;
1589 
1590 	return (t4_register_uld(&tom_uld_info));
1591 }
1592 
1593 static void
1594 tom_uninit(struct adapter *sc, void *arg __unused)
1595 {
1596 	if (begin_synchronized_op(sc, NULL, SLEEP_OK | INTR_OK, "t4tomun"))
1597 		return;
1598 
1599 	/* Try to free resources (works only if no port has IFCAP_TOE) */
1600 	if (uld_active(sc, ULD_TOM))
1601 		t4_deactivate_uld(sc, ULD_TOM);
1602 
1603 	end_synchronized_op(sc, 0);
1604 }
1605 
1606 static int
1607 t4_tom_mod_unload(void)
1608 {
1609 	t4_iterate(tom_uninit, NULL);
1610 
1611 	if (t4_unregister_uld(&tom_uld_info) == EBUSY)
1612 		return (EBUSY);
1613 
1614 	t4_tls_mod_unload();
1615 	t4_ddp_mod_unload();
1616 
1617 	t4_uninit_connect_cpl_handlers();
1618 	t4_uninit_listen_cpl_handlers();
1619 	t4_uninit_cpl_io_handlers();
1620 	t4_register_shared_cpl_handler(CPL_L2T_WRITE_RPL, NULL, CPL_COOKIE_TOM);
1621 
1622 	return (0);
1623 }
1624 #endif	/* TCP_OFFLOAD */
1625 
1626 static int
1627 t4_tom_modevent(module_t mod, int cmd, void *arg)
1628 {
1629 	int rc = 0;
1630 
1631 #ifdef TCP_OFFLOAD
1632 	switch (cmd) {
1633 	case MOD_LOAD:
1634 		rc = t4_tom_mod_load();
1635 		break;
1636 
1637 	case MOD_UNLOAD:
1638 		rc = t4_tom_mod_unload();
1639 		break;
1640 
1641 	default:
1642 		rc = EINVAL;
1643 	}
1644 #else
1645 	printf("t4_tom: compiled without TCP_OFFLOAD support.\n");
1646 	rc = EOPNOTSUPP;
1647 #endif
1648 	return (rc);
1649 }
1650 
1651 static moduledata_t t4_tom_moddata= {
1652 	"t4_tom",
1653 	t4_tom_modevent,
1654 	0
1655 };
1656 
1657 MODULE_VERSION(t4_tom, 1);
1658 MODULE_DEPEND(t4_tom, toecore, 1, 1, 1);
1659 MODULE_DEPEND(t4_tom, t4nex, 1, 1, 1);
1660 DECLARE_MODULE(t4_tom, t4_tom_moddata, SI_SUB_EXEC, SI_ORDER_ANY);
1661