1 // SPDX-License-Identifier: GPL-2.0 2 /* Copyright(c) 2013 - 2018 Intel Corporation. */ 3 4 #include "iavf.h" 5 #include "iavf_prototype.h" 6 7 /** 8 * iavf_send_pf_msg 9 * @adapter: adapter structure 10 * @op: virtual channel opcode 11 * @msg: pointer to message buffer 12 * @len: message length 13 * 14 * Send message to PF and print status if failure. 15 **/ 16 static int iavf_send_pf_msg(struct iavf_adapter *adapter, 17 enum virtchnl_ops op, u8 *msg, u16 len) 18 { 19 struct iavf_hw *hw = &adapter->hw; 20 enum iavf_status status; 21 22 if (adapter->flags & IAVF_FLAG_PF_COMMS_FAILED) 23 return 0; /* nothing to see here, move along */ 24 25 status = iavf_aq_send_msg_to_pf(hw, op, 0, msg, len, NULL); 26 if (status) 27 dev_dbg(&adapter->pdev->dev, "Unable to send opcode %d to PF, status %s, aq_err %s\n", 28 op, iavf_stat_str(hw, status), 29 iavf_aq_str(hw, hw->aq.asq_last_status)); 30 return iavf_status_to_errno(status); 31 } 32 33 /** 34 * iavf_send_api_ver 35 * @adapter: adapter structure 36 * 37 * Send API version admin queue message to the PF. The reply is not checked 38 * in this function. Returns 0 if the message was successfully 39 * sent, or one of the IAVF_ADMIN_QUEUE_ERROR_ statuses if not. 40 **/ 41 int iavf_send_api_ver(struct iavf_adapter *adapter) 42 { 43 struct virtchnl_version_info vvi; 44 45 vvi.major = VIRTCHNL_VERSION_MAJOR; 46 vvi.minor = VIRTCHNL_VERSION_MINOR; 47 48 return iavf_send_pf_msg(adapter, VIRTCHNL_OP_VERSION, (u8 *)&vvi, 49 sizeof(vvi)); 50 } 51 52 /** 53 * iavf_poll_virtchnl_msg 54 * @hw: HW configuration structure 55 * @event: event to populate on success 56 * @op_to_poll: requested virtchnl op to poll for 57 * 58 * Initialize poll for virtchnl msg matching the requested_op. Returns 0 59 * if a message of the correct opcode is in the queue or an error code 60 * if no message matching the op code is waiting and other failures. 61 */ 62 static int 63 iavf_poll_virtchnl_msg(struct iavf_hw *hw, struct iavf_arq_event_info *event, 64 enum virtchnl_ops op_to_poll) 65 { 66 enum virtchnl_ops received_op; 67 enum iavf_status status; 68 u32 v_retval; 69 70 while (1) { 71 /* When the AQ is empty, iavf_clean_arq_element will return 72 * nonzero and this loop will terminate. 73 */ 74 status = iavf_clean_arq_element(hw, event, NULL); 75 if (status != IAVF_SUCCESS) 76 return iavf_status_to_errno(status); 77 received_op = 78 (enum virtchnl_ops)le32_to_cpu(event->desc.cookie_high); 79 if (op_to_poll == received_op) 80 break; 81 } 82 83 v_retval = le32_to_cpu(event->desc.cookie_low); 84 return virtchnl_status_to_errno((enum virtchnl_status_code)v_retval); 85 } 86 87 /** 88 * iavf_verify_api_ver 89 * @adapter: adapter structure 90 * 91 * Compare API versions with the PF. Must be called after admin queue is 92 * initialized. Returns 0 if API versions match, -EIO if they do not, 93 * IAVF_ERR_ADMIN_QUEUE_NO_WORK if the admin queue is empty, and any errors 94 * from the firmware are propagated. 95 **/ 96 int iavf_verify_api_ver(struct iavf_adapter *adapter) 97 { 98 struct iavf_arq_event_info event; 99 int err; 100 101 event.buf_len = IAVF_MAX_AQ_BUF_SIZE; 102 event.msg_buf = kzalloc(IAVF_MAX_AQ_BUF_SIZE, GFP_KERNEL); 103 if (!event.msg_buf) 104 return -ENOMEM; 105 106 err = iavf_poll_virtchnl_msg(&adapter->hw, &event, VIRTCHNL_OP_VERSION); 107 if (!err) { 108 struct virtchnl_version_info *pf_vvi = 109 (struct virtchnl_version_info *)event.msg_buf; 110 adapter->pf_version = *pf_vvi; 111 112 if (pf_vvi->major > VIRTCHNL_VERSION_MAJOR || 113 (pf_vvi->major == VIRTCHNL_VERSION_MAJOR && 114 pf_vvi->minor > VIRTCHNL_VERSION_MINOR)) 115 err = -EIO; 116 } 117 118 kfree(event.msg_buf); 119 120 return err; 121 } 122 123 /** 124 * iavf_send_vf_config_msg 125 * @adapter: adapter structure 126 * 127 * Send VF configuration request admin queue message to the PF. The reply 128 * is not checked in this function. Returns 0 if the message was 129 * successfully sent, or one of the IAVF_ADMIN_QUEUE_ERROR_ statuses if not. 130 **/ 131 int iavf_send_vf_config_msg(struct iavf_adapter *adapter) 132 { 133 u32 caps; 134 135 caps = VIRTCHNL_VF_OFFLOAD_L2 | 136 VIRTCHNL_VF_OFFLOAD_RSS_PF | 137 VIRTCHNL_VF_OFFLOAD_RSS_AQ | 138 VIRTCHNL_VF_OFFLOAD_RSS_REG | 139 VIRTCHNL_VF_OFFLOAD_VLAN | 140 VIRTCHNL_VF_OFFLOAD_WB_ON_ITR | 141 VIRTCHNL_VF_OFFLOAD_RSS_PCTYPE_V2 | 142 VIRTCHNL_VF_OFFLOAD_ENCAP | 143 VIRTCHNL_VF_OFFLOAD_VLAN_V2 | 144 VIRTCHNL_VF_OFFLOAD_CRC | 145 VIRTCHNL_VF_OFFLOAD_ENCAP_CSUM | 146 VIRTCHNL_VF_OFFLOAD_REQ_QUEUES | 147 VIRTCHNL_VF_OFFLOAD_ADQ | 148 VIRTCHNL_VF_OFFLOAD_USO | 149 VIRTCHNL_VF_OFFLOAD_FDIR_PF | 150 VIRTCHNL_VF_OFFLOAD_ADV_RSS_PF | 151 VIRTCHNL_VF_CAP_ADV_LINK_SPEED; 152 153 adapter->current_op = VIRTCHNL_OP_GET_VF_RESOURCES; 154 adapter->aq_required &= ~IAVF_FLAG_AQ_GET_CONFIG; 155 if (PF_IS_V11(adapter)) 156 return iavf_send_pf_msg(adapter, VIRTCHNL_OP_GET_VF_RESOURCES, 157 (u8 *)&caps, sizeof(caps)); 158 else 159 return iavf_send_pf_msg(adapter, VIRTCHNL_OP_GET_VF_RESOURCES, 160 NULL, 0); 161 } 162 163 int iavf_send_vf_offload_vlan_v2_msg(struct iavf_adapter *adapter) 164 { 165 adapter->aq_required &= ~IAVF_FLAG_AQ_GET_OFFLOAD_VLAN_V2_CAPS; 166 167 if (!VLAN_V2_ALLOWED(adapter)) 168 return -EOPNOTSUPP; 169 170 adapter->current_op = VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS; 171 172 return iavf_send_pf_msg(adapter, VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS, 173 NULL, 0); 174 } 175 176 /** 177 * iavf_validate_num_queues 178 * @adapter: adapter structure 179 * 180 * Validate that the number of queues the PF has sent in 181 * VIRTCHNL_OP_GET_VF_RESOURCES is not larger than the VF can handle. 182 **/ 183 static void iavf_validate_num_queues(struct iavf_adapter *adapter) 184 { 185 if (adapter->vf_res->num_queue_pairs > IAVF_MAX_REQ_QUEUES) { 186 struct virtchnl_vsi_resource *vsi_res; 187 int i; 188 189 dev_info(&adapter->pdev->dev, "Received %d queues, but can only have a max of %d\n", 190 adapter->vf_res->num_queue_pairs, 191 IAVF_MAX_REQ_QUEUES); 192 dev_info(&adapter->pdev->dev, "Fixing by reducing queues to %d\n", 193 IAVF_MAX_REQ_QUEUES); 194 adapter->vf_res->num_queue_pairs = IAVF_MAX_REQ_QUEUES; 195 for (i = 0; i < adapter->vf_res->num_vsis; i++) { 196 vsi_res = &adapter->vf_res->vsi_res[i]; 197 vsi_res->num_queue_pairs = IAVF_MAX_REQ_QUEUES; 198 } 199 } 200 } 201 202 /** 203 * iavf_get_vf_config 204 * @adapter: private adapter structure 205 * 206 * Get VF configuration from PF and populate hw structure. Must be called after 207 * admin queue is initialized. Busy waits until response is received from PF, 208 * with maximum timeout. Response from PF is returned in the buffer for further 209 * processing by the caller. 210 **/ 211 int iavf_get_vf_config(struct iavf_adapter *adapter) 212 { 213 struct iavf_hw *hw = &adapter->hw; 214 struct iavf_arq_event_info event; 215 u16 len; 216 int err; 217 218 len = IAVF_VIRTCHNL_VF_RESOURCE_SIZE; 219 event.buf_len = len; 220 event.msg_buf = kzalloc(len, GFP_KERNEL); 221 if (!event.msg_buf) 222 return -ENOMEM; 223 224 err = iavf_poll_virtchnl_msg(hw, &event, VIRTCHNL_OP_GET_VF_RESOURCES); 225 memcpy(adapter->vf_res, event.msg_buf, min(event.msg_len, len)); 226 227 /* some PFs send more queues than we should have so validate that 228 * we aren't getting too many queues 229 */ 230 if (!err) 231 iavf_validate_num_queues(adapter); 232 iavf_vf_parse_hw_config(hw, adapter->vf_res); 233 234 kfree(event.msg_buf); 235 236 return err; 237 } 238 239 int iavf_get_vf_vlan_v2_caps(struct iavf_adapter *adapter) 240 { 241 struct iavf_arq_event_info event; 242 int err; 243 u16 len; 244 245 len = sizeof(struct virtchnl_vlan_caps); 246 event.buf_len = len; 247 event.msg_buf = kzalloc(len, GFP_KERNEL); 248 if (!event.msg_buf) 249 return -ENOMEM; 250 251 err = iavf_poll_virtchnl_msg(&adapter->hw, &event, 252 VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS); 253 if (!err) 254 memcpy(&adapter->vlan_v2_caps, event.msg_buf, 255 min(event.msg_len, len)); 256 257 kfree(event.msg_buf); 258 259 return err; 260 } 261 262 /** 263 * iavf_configure_queues 264 * @adapter: adapter structure 265 * 266 * Request that the PF set up our (previously allocated) queues. 267 **/ 268 void iavf_configure_queues(struct iavf_adapter *adapter) 269 { 270 struct virtchnl_vsi_queue_config_info *vqci; 271 int i, max_frame = adapter->vf_res->max_mtu; 272 int pairs = adapter->num_active_queues; 273 struct virtchnl_queue_pair_info *vqpi; 274 size_t len; 275 276 if (max_frame > IAVF_MAX_RXBUFFER || !max_frame) 277 max_frame = IAVF_MAX_RXBUFFER; 278 279 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 280 /* bail because we already have a command pending */ 281 dev_err(&adapter->pdev->dev, "Cannot configure queues, command %d pending\n", 282 adapter->current_op); 283 return; 284 } 285 adapter->current_op = VIRTCHNL_OP_CONFIG_VSI_QUEUES; 286 len = virtchnl_struct_size(vqci, qpair, pairs); 287 vqci = kzalloc(len, GFP_KERNEL); 288 if (!vqci) 289 return; 290 291 /* Limit maximum frame size when jumbo frames is not enabled */ 292 if (!(adapter->flags & IAVF_FLAG_LEGACY_RX) && 293 (adapter->netdev->mtu <= ETH_DATA_LEN)) 294 max_frame = IAVF_RXBUFFER_1536 - NET_IP_ALIGN; 295 296 vqci->vsi_id = adapter->vsi_res->vsi_id; 297 vqci->num_queue_pairs = pairs; 298 vqpi = vqci->qpair; 299 /* Size check is not needed here - HW max is 16 queue pairs, and we 300 * can fit info for 31 of them into the AQ buffer before it overflows. 301 */ 302 for (i = 0; i < pairs; i++) { 303 vqpi->txq.vsi_id = vqci->vsi_id; 304 vqpi->txq.queue_id = i; 305 vqpi->txq.ring_len = adapter->tx_rings[i].count; 306 vqpi->txq.dma_ring_addr = adapter->tx_rings[i].dma; 307 vqpi->rxq.vsi_id = vqci->vsi_id; 308 vqpi->rxq.queue_id = i; 309 vqpi->rxq.ring_len = adapter->rx_rings[i].count; 310 vqpi->rxq.dma_ring_addr = adapter->rx_rings[i].dma; 311 vqpi->rxq.max_pkt_size = max_frame; 312 vqpi->rxq.databuffer_size = 313 ALIGN(adapter->rx_rings[i].rx_buf_len, 314 BIT_ULL(IAVF_RXQ_CTX_DBUFF_SHIFT)); 315 if (CRC_OFFLOAD_ALLOWED(adapter)) 316 vqpi->rxq.crc_disable = !!(adapter->netdev->features & 317 NETIF_F_RXFCS); 318 vqpi++; 319 } 320 321 adapter->aq_required &= ~IAVF_FLAG_AQ_CONFIGURE_QUEUES; 322 iavf_send_pf_msg(adapter, VIRTCHNL_OP_CONFIG_VSI_QUEUES, 323 (u8 *)vqci, len); 324 kfree(vqci); 325 } 326 327 /** 328 * iavf_enable_queues 329 * @adapter: adapter structure 330 * 331 * Request that the PF enable all of our queues. 332 **/ 333 void iavf_enable_queues(struct iavf_adapter *adapter) 334 { 335 struct virtchnl_queue_select vqs; 336 337 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 338 /* bail because we already have a command pending */ 339 dev_err(&adapter->pdev->dev, "Cannot enable queues, command %d pending\n", 340 adapter->current_op); 341 return; 342 } 343 adapter->current_op = VIRTCHNL_OP_ENABLE_QUEUES; 344 vqs.vsi_id = adapter->vsi_res->vsi_id; 345 vqs.tx_queues = BIT(adapter->num_active_queues) - 1; 346 vqs.rx_queues = vqs.tx_queues; 347 adapter->aq_required &= ~IAVF_FLAG_AQ_ENABLE_QUEUES; 348 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ENABLE_QUEUES, 349 (u8 *)&vqs, sizeof(vqs)); 350 } 351 352 /** 353 * iavf_disable_queues 354 * @adapter: adapter structure 355 * 356 * Request that the PF disable all of our queues. 357 **/ 358 void iavf_disable_queues(struct iavf_adapter *adapter) 359 { 360 struct virtchnl_queue_select vqs; 361 362 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 363 /* bail because we already have a command pending */ 364 dev_err(&adapter->pdev->dev, "Cannot disable queues, command %d pending\n", 365 adapter->current_op); 366 return; 367 } 368 adapter->current_op = VIRTCHNL_OP_DISABLE_QUEUES; 369 vqs.vsi_id = adapter->vsi_res->vsi_id; 370 vqs.tx_queues = BIT(adapter->num_active_queues) - 1; 371 vqs.rx_queues = vqs.tx_queues; 372 adapter->aq_required &= ~IAVF_FLAG_AQ_DISABLE_QUEUES; 373 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DISABLE_QUEUES, 374 (u8 *)&vqs, sizeof(vqs)); 375 } 376 377 /** 378 * iavf_map_queues 379 * @adapter: adapter structure 380 * 381 * Request that the PF map queues to interrupt vectors. Misc causes, including 382 * admin queue, are always mapped to vector 0. 383 **/ 384 void iavf_map_queues(struct iavf_adapter *adapter) 385 { 386 struct virtchnl_irq_map_info *vimi; 387 struct virtchnl_vector_map *vecmap; 388 struct iavf_q_vector *q_vector; 389 int v_idx, q_vectors; 390 size_t len; 391 392 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 393 /* bail because we already have a command pending */ 394 dev_err(&adapter->pdev->dev, "Cannot map queues to vectors, command %d pending\n", 395 adapter->current_op); 396 return; 397 } 398 adapter->current_op = VIRTCHNL_OP_CONFIG_IRQ_MAP; 399 400 q_vectors = adapter->num_msix_vectors - NONQ_VECS; 401 402 len = virtchnl_struct_size(vimi, vecmap, adapter->num_msix_vectors); 403 vimi = kzalloc(len, GFP_KERNEL); 404 if (!vimi) 405 return; 406 407 vimi->num_vectors = adapter->num_msix_vectors; 408 /* Queue vectors first */ 409 for (v_idx = 0; v_idx < q_vectors; v_idx++) { 410 q_vector = &adapter->q_vectors[v_idx]; 411 vecmap = &vimi->vecmap[v_idx]; 412 413 vecmap->vsi_id = adapter->vsi_res->vsi_id; 414 vecmap->vector_id = v_idx + NONQ_VECS; 415 vecmap->txq_map = q_vector->ring_mask; 416 vecmap->rxq_map = q_vector->ring_mask; 417 vecmap->rxitr_idx = IAVF_RX_ITR; 418 vecmap->txitr_idx = IAVF_TX_ITR; 419 } 420 /* Misc vector last - this is only for AdminQ messages */ 421 vecmap = &vimi->vecmap[v_idx]; 422 vecmap->vsi_id = adapter->vsi_res->vsi_id; 423 vecmap->vector_id = 0; 424 vecmap->txq_map = 0; 425 vecmap->rxq_map = 0; 426 427 adapter->aq_required &= ~IAVF_FLAG_AQ_MAP_VECTORS; 428 iavf_send_pf_msg(adapter, VIRTCHNL_OP_CONFIG_IRQ_MAP, 429 (u8 *)vimi, len); 430 kfree(vimi); 431 } 432 433 /** 434 * iavf_set_mac_addr_type - Set the correct request type from the filter type 435 * @virtchnl_ether_addr: pointer to requested list element 436 * @filter: pointer to requested filter 437 **/ 438 static void 439 iavf_set_mac_addr_type(struct virtchnl_ether_addr *virtchnl_ether_addr, 440 const struct iavf_mac_filter *filter) 441 { 442 virtchnl_ether_addr->type = filter->is_primary ? 443 VIRTCHNL_ETHER_ADDR_PRIMARY : 444 VIRTCHNL_ETHER_ADDR_EXTRA; 445 } 446 447 /** 448 * iavf_add_ether_addrs 449 * @adapter: adapter structure 450 * 451 * Request that the PF add one or more addresses to our filters. 452 **/ 453 void iavf_add_ether_addrs(struct iavf_adapter *adapter) 454 { 455 struct virtchnl_ether_addr_list *veal; 456 struct iavf_mac_filter *f; 457 int i = 0, count = 0; 458 bool more = false; 459 size_t len; 460 461 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 462 /* bail because we already have a command pending */ 463 dev_err(&adapter->pdev->dev, "Cannot add filters, command %d pending\n", 464 adapter->current_op); 465 return; 466 } 467 468 spin_lock_bh(&adapter->mac_vlan_list_lock); 469 470 list_for_each_entry(f, &adapter->mac_filter_list, list) { 471 if (f->add) 472 count++; 473 } 474 if (!count) { 475 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_MAC_FILTER; 476 spin_unlock_bh(&adapter->mac_vlan_list_lock); 477 return; 478 } 479 adapter->current_op = VIRTCHNL_OP_ADD_ETH_ADDR; 480 481 len = virtchnl_struct_size(veal, list, count); 482 if (len > IAVF_MAX_AQ_BUF_SIZE) { 483 dev_warn(&adapter->pdev->dev, "Too many add MAC changes in one request\n"); 484 while (len > IAVF_MAX_AQ_BUF_SIZE) 485 len = virtchnl_struct_size(veal, list, --count); 486 more = true; 487 } 488 489 veal = kzalloc(len, GFP_ATOMIC); 490 if (!veal) { 491 spin_unlock_bh(&adapter->mac_vlan_list_lock); 492 return; 493 } 494 495 veal->vsi_id = adapter->vsi_res->vsi_id; 496 veal->num_elements = count; 497 list_for_each_entry(f, &adapter->mac_filter_list, list) { 498 if (f->add) { 499 ether_addr_copy(veal->list[i].addr, f->macaddr); 500 iavf_set_mac_addr_type(&veal->list[i], f); 501 i++; 502 f->add = false; 503 if (i == count) 504 break; 505 } 506 } 507 if (!more) 508 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_MAC_FILTER; 509 510 spin_unlock_bh(&adapter->mac_vlan_list_lock); 511 512 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ADD_ETH_ADDR, (u8 *)veal, len); 513 kfree(veal); 514 } 515 516 /** 517 * iavf_del_ether_addrs 518 * @adapter: adapter structure 519 * 520 * Request that the PF remove one or more addresses from our filters. 521 **/ 522 void iavf_del_ether_addrs(struct iavf_adapter *adapter) 523 { 524 struct virtchnl_ether_addr_list *veal; 525 struct iavf_mac_filter *f, *ftmp; 526 int i = 0, count = 0; 527 bool more = false; 528 size_t len; 529 530 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 531 /* bail because we already have a command pending */ 532 dev_err(&adapter->pdev->dev, "Cannot remove filters, command %d pending\n", 533 adapter->current_op); 534 return; 535 } 536 537 spin_lock_bh(&adapter->mac_vlan_list_lock); 538 539 list_for_each_entry(f, &adapter->mac_filter_list, list) { 540 if (f->remove) 541 count++; 542 } 543 if (!count) { 544 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_MAC_FILTER; 545 spin_unlock_bh(&adapter->mac_vlan_list_lock); 546 return; 547 } 548 adapter->current_op = VIRTCHNL_OP_DEL_ETH_ADDR; 549 550 len = virtchnl_struct_size(veal, list, count); 551 if (len > IAVF_MAX_AQ_BUF_SIZE) { 552 dev_warn(&adapter->pdev->dev, "Too many delete MAC changes in one request\n"); 553 while (len > IAVF_MAX_AQ_BUF_SIZE) 554 len = virtchnl_struct_size(veal, list, --count); 555 more = true; 556 } 557 veal = kzalloc(len, GFP_ATOMIC); 558 if (!veal) { 559 spin_unlock_bh(&adapter->mac_vlan_list_lock); 560 return; 561 } 562 563 veal->vsi_id = adapter->vsi_res->vsi_id; 564 veal->num_elements = count; 565 list_for_each_entry_safe(f, ftmp, &adapter->mac_filter_list, list) { 566 if (f->remove) { 567 ether_addr_copy(veal->list[i].addr, f->macaddr); 568 iavf_set_mac_addr_type(&veal->list[i], f); 569 i++; 570 list_del(&f->list); 571 kfree(f); 572 if (i == count) 573 break; 574 } 575 } 576 if (!more) 577 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_MAC_FILTER; 578 579 spin_unlock_bh(&adapter->mac_vlan_list_lock); 580 581 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DEL_ETH_ADDR, (u8 *)veal, len); 582 kfree(veal); 583 } 584 585 /** 586 * iavf_mac_add_ok 587 * @adapter: adapter structure 588 * 589 * Submit list of filters based on PF response. 590 **/ 591 static void iavf_mac_add_ok(struct iavf_adapter *adapter) 592 { 593 struct iavf_mac_filter *f, *ftmp; 594 595 spin_lock_bh(&adapter->mac_vlan_list_lock); 596 list_for_each_entry_safe(f, ftmp, &adapter->mac_filter_list, list) { 597 f->is_new_mac = false; 598 if (!f->add && !f->add_handled) 599 f->add_handled = true; 600 } 601 spin_unlock_bh(&adapter->mac_vlan_list_lock); 602 } 603 604 /** 605 * iavf_mac_add_reject 606 * @adapter: adapter structure 607 * 608 * Remove filters from list based on PF response. 609 **/ 610 static void iavf_mac_add_reject(struct iavf_adapter *adapter) 611 { 612 struct net_device *netdev = adapter->netdev; 613 struct iavf_mac_filter *f, *ftmp; 614 615 spin_lock_bh(&adapter->mac_vlan_list_lock); 616 list_for_each_entry_safe(f, ftmp, &adapter->mac_filter_list, list) { 617 if (f->remove && ether_addr_equal(f->macaddr, netdev->dev_addr)) 618 f->remove = false; 619 620 if (!f->add && !f->add_handled) 621 f->add_handled = true; 622 623 if (f->is_new_mac) { 624 list_del(&f->list); 625 kfree(f); 626 } 627 } 628 spin_unlock_bh(&adapter->mac_vlan_list_lock); 629 } 630 631 /** 632 * iavf_vlan_add_reject 633 * @adapter: adapter structure 634 * 635 * Remove VLAN filters from list based on PF response. 636 **/ 637 static void iavf_vlan_add_reject(struct iavf_adapter *adapter) 638 { 639 struct iavf_vlan_filter *f, *ftmp; 640 641 spin_lock_bh(&adapter->mac_vlan_list_lock); 642 list_for_each_entry_safe(f, ftmp, &adapter->vlan_filter_list, list) { 643 if (f->state == IAVF_VLAN_IS_NEW) { 644 list_del(&f->list); 645 kfree(f); 646 adapter->num_vlan_filters--; 647 } 648 } 649 spin_unlock_bh(&adapter->mac_vlan_list_lock); 650 } 651 652 /** 653 * iavf_add_vlans 654 * @adapter: adapter structure 655 * 656 * Request that the PF add one or more VLAN filters to our VSI. 657 **/ 658 void iavf_add_vlans(struct iavf_adapter *adapter) 659 { 660 int len, i = 0, count = 0; 661 struct iavf_vlan_filter *f; 662 bool more = false; 663 664 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 665 /* bail because we already have a command pending */ 666 dev_err(&adapter->pdev->dev, "Cannot add VLANs, command %d pending\n", 667 adapter->current_op); 668 return; 669 } 670 671 spin_lock_bh(&adapter->mac_vlan_list_lock); 672 673 list_for_each_entry(f, &adapter->vlan_filter_list, list) { 674 if (f->state == IAVF_VLAN_ADD) 675 count++; 676 } 677 if (!count || !VLAN_FILTERING_ALLOWED(adapter)) { 678 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_VLAN_FILTER; 679 spin_unlock_bh(&adapter->mac_vlan_list_lock); 680 return; 681 } 682 683 if (VLAN_ALLOWED(adapter)) { 684 struct virtchnl_vlan_filter_list *vvfl; 685 686 adapter->current_op = VIRTCHNL_OP_ADD_VLAN; 687 688 len = virtchnl_struct_size(vvfl, vlan_id, count); 689 if (len > IAVF_MAX_AQ_BUF_SIZE) { 690 dev_warn(&adapter->pdev->dev, "Too many add VLAN changes in one request\n"); 691 while (len > IAVF_MAX_AQ_BUF_SIZE) 692 len = virtchnl_struct_size(vvfl, vlan_id, 693 --count); 694 more = true; 695 } 696 vvfl = kzalloc(len, GFP_ATOMIC); 697 if (!vvfl) { 698 spin_unlock_bh(&adapter->mac_vlan_list_lock); 699 return; 700 } 701 702 vvfl->vsi_id = adapter->vsi_res->vsi_id; 703 vvfl->num_elements = count; 704 list_for_each_entry(f, &adapter->vlan_filter_list, list) { 705 if (f->state == IAVF_VLAN_ADD) { 706 vvfl->vlan_id[i] = f->vlan.vid; 707 i++; 708 f->state = IAVF_VLAN_IS_NEW; 709 if (i == count) 710 break; 711 } 712 } 713 if (!more) 714 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_VLAN_FILTER; 715 716 spin_unlock_bh(&adapter->mac_vlan_list_lock); 717 718 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ADD_VLAN, (u8 *)vvfl, len); 719 kfree(vvfl); 720 } else { 721 u16 max_vlans = adapter->vlan_v2_caps.filtering.max_filters; 722 u16 current_vlans = iavf_get_num_vlans_added(adapter); 723 struct virtchnl_vlan_filter_list_v2 *vvfl_v2; 724 725 adapter->current_op = VIRTCHNL_OP_ADD_VLAN_V2; 726 727 if ((count + current_vlans) > max_vlans && 728 current_vlans < max_vlans) { 729 count = max_vlans - iavf_get_num_vlans_added(adapter); 730 more = true; 731 } 732 733 len = virtchnl_struct_size(vvfl_v2, filters, count); 734 if (len > IAVF_MAX_AQ_BUF_SIZE) { 735 dev_warn(&adapter->pdev->dev, "Too many add VLAN changes in one request\n"); 736 while (len > IAVF_MAX_AQ_BUF_SIZE) 737 len = virtchnl_struct_size(vvfl_v2, filters, 738 --count); 739 more = true; 740 } 741 742 vvfl_v2 = kzalloc(len, GFP_ATOMIC); 743 if (!vvfl_v2) { 744 spin_unlock_bh(&adapter->mac_vlan_list_lock); 745 return; 746 } 747 748 vvfl_v2->vport_id = adapter->vsi_res->vsi_id; 749 vvfl_v2->num_elements = count; 750 list_for_each_entry(f, &adapter->vlan_filter_list, list) { 751 if (f->state == IAVF_VLAN_ADD) { 752 struct virtchnl_vlan_supported_caps *filtering_support = 753 &adapter->vlan_v2_caps.filtering.filtering_support; 754 struct virtchnl_vlan *vlan; 755 756 if (i == count) 757 break; 758 759 /* give priority over outer if it's enabled */ 760 if (filtering_support->outer) 761 vlan = &vvfl_v2->filters[i].outer; 762 else 763 vlan = &vvfl_v2->filters[i].inner; 764 765 vlan->tci = f->vlan.vid; 766 vlan->tpid = f->vlan.tpid; 767 768 i++; 769 f->state = IAVF_VLAN_IS_NEW; 770 } 771 } 772 773 if (!more) 774 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_VLAN_FILTER; 775 776 spin_unlock_bh(&adapter->mac_vlan_list_lock); 777 778 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ADD_VLAN_V2, 779 (u8 *)vvfl_v2, len); 780 kfree(vvfl_v2); 781 } 782 } 783 784 /** 785 * iavf_del_vlans 786 * @adapter: adapter structure 787 * 788 * Request that the PF remove one or more VLAN filters from our VSI. 789 **/ 790 void iavf_del_vlans(struct iavf_adapter *adapter) 791 { 792 struct iavf_vlan_filter *f, *ftmp; 793 int len, i = 0, count = 0; 794 bool more = false; 795 796 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 797 /* bail because we already have a command pending */ 798 dev_err(&adapter->pdev->dev, "Cannot remove VLANs, command %d pending\n", 799 adapter->current_op); 800 return; 801 } 802 803 spin_lock_bh(&adapter->mac_vlan_list_lock); 804 805 list_for_each_entry_safe(f, ftmp, &adapter->vlan_filter_list, list) { 806 /* since VLAN capabilities are not allowed, we dont want to send 807 * a VLAN delete request because it will most likely fail and 808 * create unnecessary errors/noise, so just free the VLAN 809 * filters marked for removal to enable bailing out before 810 * sending a virtchnl message 811 */ 812 if (f->state == IAVF_VLAN_REMOVE && 813 !VLAN_FILTERING_ALLOWED(adapter)) { 814 list_del(&f->list); 815 kfree(f); 816 adapter->num_vlan_filters--; 817 } else if (f->state == IAVF_VLAN_DISABLE && 818 !VLAN_FILTERING_ALLOWED(adapter)) { 819 f->state = IAVF_VLAN_INACTIVE; 820 } else if (f->state == IAVF_VLAN_REMOVE || 821 f->state == IAVF_VLAN_DISABLE) { 822 count++; 823 } 824 } 825 if (!count || !VLAN_FILTERING_ALLOWED(adapter)) { 826 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_VLAN_FILTER; 827 spin_unlock_bh(&adapter->mac_vlan_list_lock); 828 return; 829 } 830 831 if (VLAN_ALLOWED(adapter)) { 832 struct virtchnl_vlan_filter_list *vvfl; 833 834 adapter->current_op = VIRTCHNL_OP_DEL_VLAN; 835 836 len = virtchnl_struct_size(vvfl, vlan_id, count); 837 if (len > IAVF_MAX_AQ_BUF_SIZE) { 838 dev_warn(&adapter->pdev->dev, "Too many delete VLAN changes in one request\n"); 839 while (len > IAVF_MAX_AQ_BUF_SIZE) 840 len = virtchnl_struct_size(vvfl, vlan_id, 841 --count); 842 more = true; 843 } 844 vvfl = kzalloc(len, GFP_ATOMIC); 845 if (!vvfl) { 846 spin_unlock_bh(&adapter->mac_vlan_list_lock); 847 return; 848 } 849 850 vvfl->vsi_id = adapter->vsi_res->vsi_id; 851 vvfl->num_elements = count; 852 list_for_each_entry_safe(f, ftmp, &adapter->vlan_filter_list, list) { 853 if (f->state == IAVF_VLAN_DISABLE) { 854 vvfl->vlan_id[i] = f->vlan.vid; 855 f->state = IAVF_VLAN_INACTIVE; 856 i++; 857 if (i == count) 858 break; 859 } else if (f->state == IAVF_VLAN_REMOVE) { 860 vvfl->vlan_id[i] = f->vlan.vid; 861 list_del(&f->list); 862 kfree(f); 863 adapter->num_vlan_filters--; 864 i++; 865 if (i == count) 866 break; 867 } 868 } 869 870 if (!more) 871 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_VLAN_FILTER; 872 873 spin_unlock_bh(&adapter->mac_vlan_list_lock); 874 875 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DEL_VLAN, (u8 *)vvfl, len); 876 kfree(vvfl); 877 } else { 878 struct virtchnl_vlan_filter_list_v2 *vvfl_v2; 879 880 adapter->current_op = VIRTCHNL_OP_DEL_VLAN_V2; 881 882 len = virtchnl_struct_size(vvfl_v2, filters, count); 883 if (len > IAVF_MAX_AQ_BUF_SIZE) { 884 dev_warn(&adapter->pdev->dev, "Too many add VLAN changes in one request\n"); 885 while (len > IAVF_MAX_AQ_BUF_SIZE) 886 len = virtchnl_struct_size(vvfl_v2, filters, 887 --count); 888 more = true; 889 } 890 891 vvfl_v2 = kzalloc(len, GFP_ATOMIC); 892 if (!vvfl_v2) { 893 spin_unlock_bh(&adapter->mac_vlan_list_lock); 894 return; 895 } 896 897 vvfl_v2->vport_id = adapter->vsi_res->vsi_id; 898 vvfl_v2->num_elements = count; 899 list_for_each_entry_safe(f, ftmp, &adapter->vlan_filter_list, list) { 900 if (f->state == IAVF_VLAN_DISABLE || 901 f->state == IAVF_VLAN_REMOVE) { 902 struct virtchnl_vlan_supported_caps *filtering_support = 903 &adapter->vlan_v2_caps.filtering.filtering_support; 904 struct virtchnl_vlan *vlan; 905 906 /* give priority over outer if it's enabled */ 907 if (filtering_support->outer) 908 vlan = &vvfl_v2->filters[i].outer; 909 else 910 vlan = &vvfl_v2->filters[i].inner; 911 912 vlan->tci = f->vlan.vid; 913 vlan->tpid = f->vlan.tpid; 914 915 if (f->state == IAVF_VLAN_DISABLE) { 916 f->state = IAVF_VLAN_INACTIVE; 917 } else { 918 list_del(&f->list); 919 kfree(f); 920 adapter->num_vlan_filters--; 921 } 922 i++; 923 if (i == count) 924 break; 925 } 926 } 927 928 if (!more) 929 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_VLAN_FILTER; 930 931 spin_unlock_bh(&adapter->mac_vlan_list_lock); 932 933 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DEL_VLAN_V2, 934 (u8 *)vvfl_v2, len); 935 kfree(vvfl_v2); 936 } 937 } 938 939 /** 940 * iavf_set_promiscuous 941 * @adapter: adapter structure 942 * 943 * Request that the PF enable promiscuous mode for our VSI. 944 **/ 945 void iavf_set_promiscuous(struct iavf_adapter *adapter) 946 { 947 struct net_device *netdev = adapter->netdev; 948 struct virtchnl_promisc_info vpi; 949 unsigned int flags; 950 951 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 952 /* bail because we already have a command pending */ 953 dev_err(&adapter->pdev->dev, "Cannot set promiscuous mode, command %d pending\n", 954 adapter->current_op); 955 return; 956 } 957 958 /* prevent changes to promiscuous flags */ 959 spin_lock_bh(&adapter->current_netdev_promisc_flags_lock); 960 961 /* sanity check to prevent duplicate AQ calls */ 962 if (!iavf_promiscuous_mode_changed(adapter)) { 963 adapter->aq_required &= ~IAVF_FLAG_AQ_CONFIGURE_PROMISC_MODE; 964 dev_dbg(&adapter->pdev->dev, "No change in promiscuous mode\n"); 965 /* allow changes to promiscuous flags */ 966 spin_unlock_bh(&adapter->current_netdev_promisc_flags_lock); 967 return; 968 } 969 970 /* there are 2 bits, but only 3 states */ 971 if (!(netdev->flags & IFF_PROMISC) && 972 netdev->flags & IFF_ALLMULTI) { 973 /* State 1 - only multicast promiscuous mode enabled 974 * - !IFF_PROMISC && IFF_ALLMULTI 975 */ 976 flags = FLAG_VF_MULTICAST_PROMISC; 977 adapter->current_netdev_promisc_flags |= IFF_ALLMULTI; 978 adapter->current_netdev_promisc_flags &= ~IFF_PROMISC; 979 dev_info(&adapter->pdev->dev, "Entering multicast promiscuous mode\n"); 980 } else if (!(netdev->flags & IFF_PROMISC) && 981 !(netdev->flags & IFF_ALLMULTI)) { 982 /* State 2 - unicast/multicast promiscuous mode disabled 983 * - !IFF_PROMISC && !IFF_ALLMULTI 984 */ 985 flags = 0; 986 adapter->current_netdev_promisc_flags &= 987 ~(IFF_PROMISC | IFF_ALLMULTI); 988 dev_info(&adapter->pdev->dev, "Leaving promiscuous mode\n"); 989 } else { 990 /* State 3 - unicast/multicast promiscuous mode enabled 991 * - IFF_PROMISC && IFF_ALLMULTI 992 * - IFF_PROMISC && !IFF_ALLMULTI 993 */ 994 flags = FLAG_VF_UNICAST_PROMISC | FLAG_VF_MULTICAST_PROMISC; 995 adapter->current_netdev_promisc_flags |= IFF_PROMISC; 996 if (netdev->flags & IFF_ALLMULTI) 997 adapter->current_netdev_promisc_flags |= IFF_ALLMULTI; 998 else 999 adapter->current_netdev_promisc_flags &= ~IFF_ALLMULTI; 1000 1001 dev_info(&adapter->pdev->dev, "Entering promiscuous mode\n"); 1002 } 1003 1004 adapter->aq_required &= ~IAVF_FLAG_AQ_CONFIGURE_PROMISC_MODE; 1005 1006 /* allow changes to promiscuous flags */ 1007 spin_unlock_bh(&adapter->current_netdev_promisc_flags_lock); 1008 1009 adapter->current_op = VIRTCHNL_OP_CONFIG_PROMISCUOUS_MODE; 1010 vpi.vsi_id = adapter->vsi_res->vsi_id; 1011 vpi.flags = flags; 1012 iavf_send_pf_msg(adapter, VIRTCHNL_OP_CONFIG_PROMISCUOUS_MODE, 1013 (u8 *)&vpi, sizeof(vpi)); 1014 } 1015 1016 /** 1017 * iavf_request_stats 1018 * @adapter: adapter structure 1019 * 1020 * Request VSI statistics from PF. 1021 **/ 1022 void iavf_request_stats(struct iavf_adapter *adapter) 1023 { 1024 struct virtchnl_queue_select vqs; 1025 1026 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 1027 /* no error message, this isn't crucial */ 1028 return; 1029 } 1030 1031 adapter->aq_required &= ~IAVF_FLAG_AQ_REQUEST_STATS; 1032 adapter->current_op = VIRTCHNL_OP_GET_STATS; 1033 vqs.vsi_id = adapter->vsi_res->vsi_id; 1034 /* queue maps are ignored for this message - only the vsi is used */ 1035 if (iavf_send_pf_msg(adapter, VIRTCHNL_OP_GET_STATS, (u8 *)&vqs, 1036 sizeof(vqs))) 1037 /* if the request failed, don't lock out others */ 1038 adapter->current_op = VIRTCHNL_OP_UNKNOWN; 1039 } 1040 1041 /** 1042 * iavf_get_hena 1043 * @adapter: adapter structure 1044 * 1045 * Request hash enable capabilities from PF 1046 **/ 1047 void iavf_get_hena(struct iavf_adapter *adapter) 1048 { 1049 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 1050 /* bail because we already have a command pending */ 1051 dev_err(&adapter->pdev->dev, "Cannot get RSS hash capabilities, command %d pending\n", 1052 adapter->current_op); 1053 return; 1054 } 1055 adapter->current_op = VIRTCHNL_OP_GET_RSS_HENA_CAPS; 1056 adapter->aq_required &= ~IAVF_FLAG_AQ_GET_HENA; 1057 iavf_send_pf_msg(adapter, VIRTCHNL_OP_GET_RSS_HENA_CAPS, NULL, 0); 1058 } 1059 1060 /** 1061 * iavf_set_hena 1062 * @adapter: adapter structure 1063 * 1064 * Request the PF to set our RSS hash capabilities 1065 **/ 1066 void iavf_set_hena(struct iavf_adapter *adapter) 1067 { 1068 struct virtchnl_rss_hena vrh; 1069 1070 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 1071 /* bail because we already have a command pending */ 1072 dev_err(&adapter->pdev->dev, "Cannot set RSS hash enable, command %d pending\n", 1073 adapter->current_op); 1074 return; 1075 } 1076 vrh.hena = adapter->hena; 1077 adapter->current_op = VIRTCHNL_OP_SET_RSS_HENA; 1078 adapter->aq_required &= ~IAVF_FLAG_AQ_SET_HENA; 1079 iavf_send_pf_msg(adapter, VIRTCHNL_OP_SET_RSS_HENA, (u8 *)&vrh, 1080 sizeof(vrh)); 1081 } 1082 1083 /** 1084 * iavf_set_rss_key 1085 * @adapter: adapter structure 1086 * 1087 * Request the PF to set our RSS hash key 1088 **/ 1089 void iavf_set_rss_key(struct iavf_adapter *adapter) 1090 { 1091 struct virtchnl_rss_key *vrk; 1092 int len; 1093 1094 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 1095 /* bail because we already have a command pending */ 1096 dev_err(&adapter->pdev->dev, "Cannot set RSS key, command %d pending\n", 1097 adapter->current_op); 1098 return; 1099 } 1100 len = virtchnl_struct_size(vrk, key, adapter->rss_key_size); 1101 vrk = kzalloc(len, GFP_KERNEL); 1102 if (!vrk) 1103 return; 1104 vrk->vsi_id = adapter->vsi.id; 1105 vrk->key_len = adapter->rss_key_size; 1106 memcpy(vrk->key, adapter->rss_key, adapter->rss_key_size); 1107 1108 adapter->current_op = VIRTCHNL_OP_CONFIG_RSS_KEY; 1109 adapter->aq_required &= ~IAVF_FLAG_AQ_SET_RSS_KEY; 1110 iavf_send_pf_msg(adapter, VIRTCHNL_OP_CONFIG_RSS_KEY, (u8 *)vrk, len); 1111 kfree(vrk); 1112 } 1113 1114 /** 1115 * iavf_set_rss_lut 1116 * @adapter: adapter structure 1117 * 1118 * Request the PF to set our RSS lookup table 1119 **/ 1120 void iavf_set_rss_lut(struct iavf_adapter *adapter) 1121 { 1122 struct virtchnl_rss_lut *vrl; 1123 int len; 1124 1125 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 1126 /* bail because we already have a command pending */ 1127 dev_err(&adapter->pdev->dev, "Cannot set RSS LUT, command %d pending\n", 1128 adapter->current_op); 1129 return; 1130 } 1131 len = virtchnl_struct_size(vrl, lut, adapter->rss_lut_size); 1132 vrl = kzalloc(len, GFP_KERNEL); 1133 if (!vrl) 1134 return; 1135 vrl->vsi_id = adapter->vsi.id; 1136 vrl->lut_entries = adapter->rss_lut_size; 1137 memcpy(vrl->lut, adapter->rss_lut, adapter->rss_lut_size); 1138 adapter->current_op = VIRTCHNL_OP_CONFIG_RSS_LUT; 1139 adapter->aq_required &= ~IAVF_FLAG_AQ_SET_RSS_LUT; 1140 iavf_send_pf_msg(adapter, VIRTCHNL_OP_CONFIG_RSS_LUT, (u8 *)vrl, len); 1141 kfree(vrl); 1142 } 1143 1144 /** 1145 * iavf_set_rss_hfunc 1146 * @adapter: adapter structure 1147 * 1148 * Request the PF to set our RSS Hash function 1149 **/ 1150 void iavf_set_rss_hfunc(struct iavf_adapter *adapter) 1151 { 1152 struct virtchnl_rss_hfunc *vrh; 1153 int len = sizeof(*vrh); 1154 1155 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 1156 /* bail because we already have a command pending */ 1157 dev_err(&adapter->pdev->dev, "Cannot set RSS Hash function, command %d pending\n", 1158 adapter->current_op); 1159 return; 1160 } 1161 vrh = kzalloc(len, GFP_KERNEL); 1162 if (!vrh) 1163 return; 1164 vrh->vsi_id = adapter->vsi.id; 1165 vrh->rss_algorithm = adapter->hfunc; 1166 adapter->current_op = VIRTCHNL_OP_CONFIG_RSS_HFUNC; 1167 adapter->aq_required &= ~IAVF_FLAG_AQ_SET_RSS_HFUNC; 1168 iavf_send_pf_msg(adapter, VIRTCHNL_OP_CONFIG_RSS_HFUNC, (u8 *)vrh, len); 1169 kfree(vrh); 1170 } 1171 1172 /** 1173 * iavf_enable_vlan_stripping 1174 * @adapter: adapter structure 1175 * 1176 * Request VLAN header stripping to be enabled 1177 **/ 1178 void iavf_enable_vlan_stripping(struct iavf_adapter *adapter) 1179 { 1180 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 1181 /* bail because we already have a command pending */ 1182 dev_err(&adapter->pdev->dev, "Cannot enable stripping, command %d pending\n", 1183 adapter->current_op); 1184 return; 1185 } 1186 adapter->current_op = VIRTCHNL_OP_ENABLE_VLAN_STRIPPING; 1187 adapter->aq_required &= ~IAVF_FLAG_AQ_ENABLE_VLAN_STRIPPING; 1188 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ENABLE_VLAN_STRIPPING, NULL, 0); 1189 } 1190 1191 /** 1192 * iavf_disable_vlan_stripping 1193 * @adapter: adapter structure 1194 * 1195 * Request VLAN header stripping to be disabled 1196 **/ 1197 void iavf_disable_vlan_stripping(struct iavf_adapter *adapter) 1198 { 1199 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 1200 /* bail because we already have a command pending */ 1201 dev_err(&adapter->pdev->dev, "Cannot disable stripping, command %d pending\n", 1202 adapter->current_op); 1203 return; 1204 } 1205 adapter->current_op = VIRTCHNL_OP_DISABLE_VLAN_STRIPPING; 1206 adapter->aq_required &= ~IAVF_FLAG_AQ_DISABLE_VLAN_STRIPPING; 1207 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DISABLE_VLAN_STRIPPING, NULL, 0); 1208 } 1209 1210 /** 1211 * iavf_tpid_to_vc_ethertype - transform from VLAN TPID to virtchnl ethertype 1212 * @tpid: VLAN TPID (i.e. 0x8100, 0x88a8, etc.) 1213 */ 1214 static u32 iavf_tpid_to_vc_ethertype(u16 tpid) 1215 { 1216 switch (tpid) { 1217 case ETH_P_8021Q: 1218 return VIRTCHNL_VLAN_ETHERTYPE_8100; 1219 case ETH_P_8021AD: 1220 return VIRTCHNL_VLAN_ETHERTYPE_88A8; 1221 } 1222 1223 return 0; 1224 } 1225 1226 /** 1227 * iavf_set_vc_offload_ethertype - set virtchnl ethertype for offload message 1228 * @adapter: adapter structure 1229 * @msg: message structure used for updating offloads over virtchnl to update 1230 * @tpid: VLAN TPID (i.e. 0x8100, 0x88a8, etc.) 1231 * @offload_op: opcode used to determine which support structure to check 1232 */ 1233 static int 1234 iavf_set_vc_offload_ethertype(struct iavf_adapter *adapter, 1235 struct virtchnl_vlan_setting *msg, u16 tpid, 1236 enum virtchnl_ops offload_op) 1237 { 1238 struct virtchnl_vlan_supported_caps *offload_support; 1239 u16 vc_ethertype = iavf_tpid_to_vc_ethertype(tpid); 1240 1241 /* reference the correct offload support structure */ 1242 switch (offload_op) { 1243 case VIRTCHNL_OP_ENABLE_VLAN_STRIPPING_V2: 1244 case VIRTCHNL_OP_DISABLE_VLAN_STRIPPING_V2: 1245 offload_support = 1246 &adapter->vlan_v2_caps.offloads.stripping_support; 1247 break; 1248 case VIRTCHNL_OP_ENABLE_VLAN_INSERTION_V2: 1249 case VIRTCHNL_OP_DISABLE_VLAN_INSERTION_V2: 1250 offload_support = 1251 &adapter->vlan_v2_caps.offloads.insertion_support; 1252 break; 1253 default: 1254 dev_err(&adapter->pdev->dev, "Invalid opcode %d for setting virtchnl ethertype to enable/disable VLAN offloads\n", 1255 offload_op); 1256 return -EINVAL; 1257 } 1258 1259 /* make sure ethertype is supported */ 1260 if (offload_support->outer & vc_ethertype && 1261 offload_support->outer & VIRTCHNL_VLAN_TOGGLE) { 1262 msg->outer_ethertype_setting = vc_ethertype; 1263 } else if (offload_support->inner & vc_ethertype && 1264 offload_support->inner & VIRTCHNL_VLAN_TOGGLE) { 1265 msg->inner_ethertype_setting = vc_ethertype; 1266 } else { 1267 dev_dbg(&adapter->pdev->dev, "opcode %d unsupported for VLAN TPID 0x%04x\n", 1268 offload_op, tpid); 1269 return -EINVAL; 1270 } 1271 1272 return 0; 1273 } 1274 1275 /** 1276 * iavf_clear_offload_v2_aq_required - clear AQ required bit for offload request 1277 * @adapter: adapter structure 1278 * @tpid: VLAN TPID 1279 * @offload_op: opcode used to determine which AQ required bit to clear 1280 */ 1281 static void 1282 iavf_clear_offload_v2_aq_required(struct iavf_adapter *adapter, u16 tpid, 1283 enum virtchnl_ops offload_op) 1284 { 1285 switch (offload_op) { 1286 case VIRTCHNL_OP_ENABLE_VLAN_STRIPPING_V2: 1287 if (tpid == ETH_P_8021Q) 1288 adapter->aq_required &= 1289 ~IAVF_FLAG_AQ_ENABLE_CTAG_VLAN_STRIPPING; 1290 else if (tpid == ETH_P_8021AD) 1291 adapter->aq_required &= 1292 ~IAVF_FLAG_AQ_ENABLE_STAG_VLAN_STRIPPING; 1293 break; 1294 case VIRTCHNL_OP_DISABLE_VLAN_STRIPPING_V2: 1295 if (tpid == ETH_P_8021Q) 1296 adapter->aq_required &= 1297 ~IAVF_FLAG_AQ_DISABLE_CTAG_VLAN_STRIPPING; 1298 else if (tpid == ETH_P_8021AD) 1299 adapter->aq_required &= 1300 ~IAVF_FLAG_AQ_DISABLE_STAG_VLAN_STRIPPING; 1301 break; 1302 case VIRTCHNL_OP_ENABLE_VLAN_INSERTION_V2: 1303 if (tpid == ETH_P_8021Q) 1304 adapter->aq_required &= 1305 ~IAVF_FLAG_AQ_ENABLE_CTAG_VLAN_INSERTION; 1306 else if (tpid == ETH_P_8021AD) 1307 adapter->aq_required &= 1308 ~IAVF_FLAG_AQ_ENABLE_STAG_VLAN_INSERTION; 1309 break; 1310 case VIRTCHNL_OP_DISABLE_VLAN_INSERTION_V2: 1311 if (tpid == ETH_P_8021Q) 1312 adapter->aq_required &= 1313 ~IAVF_FLAG_AQ_DISABLE_CTAG_VLAN_INSERTION; 1314 else if (tpid == ETH_P_8021AD) 1315 adapter->aq_required &= 1316 ~IAVF_FLAG_AQ_DISABLE_STAG_VLAN_INSERTION; 1317 break; 1318 default: 1319 dev_err(&adapter->pdev->dev, "Unsupported opcode %d specified for clearing aq_required bits for VIRTCHNL_VF_OFFLOAD_VLAN_V2 offload request\n", 1320 offload_op); 1321 } 1322 } 1323 1324 /** 1325 * iavf_send_vlan_offload_v2 - send offload enable/disable over virtchnl 1326 * @adapter: adapter structure 1327 * @tpid: VLAN TPID used for the command (i.e. 0x8100 or 0x88a8) 1328 * @offload_op: offload_op used to make the request over virtchnl 1329 */ 1330 static void 1331 iavf_send_vlan_offload_v2(struct iavf_adapter *adapter, u16 tpid, 1332 enum virtchnl_ops offload_op) 1333 { 1334 struct virtchnl_vlan_setting *msg; 1335 int len = sizeof(*msg); 1336 1337 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 1338 /* bail because we already have a command pending */ 1339 dev_err(&adapter->pdev->dev, "Cannot send %d, command %d pending\n", 1340 offload_op, adapter->current_op); 1341 return; 1342 } 1343 1344 adapter->current_op = offload_op; 1345 1346 msg = kzalloc(len, GFP_KERNEL); 1347 if (!msg) 1348 return; 1349 1350 msg->vport_id = adapter->vsi_res->vsi_id; 1351 1352 /* always clear to prevent unsupported and endless requests */ 1353 iavf_clear_offload_v2_aq_required(adapter, tpid, offload_op); 1354 1355 /* only send valid offload requests */ 1356 if (!iavf_set_vc_offload_ethertype(adapter, msg, tpid, offload_op)) 1357 iavf_send_pf_msg(adapter, offload_op, (u8 *)msg, len); 1358 else 1359 adapter->current_op = VIRTCHNL_OP_UNKNOWN; 1360 1361 kfree(msg); 1362 } 1363 1364 /** 1365 * iavf_enable_vlan_stripping_v2 - enable VLAN stripping 1366 * @adapter: adapter structure 1367 * @tpid: VLAN TPID used to enable VLAN stripping 1368 */ 1369 void iavf_enable_vlan_stripping_v2(struct iavf_adapter *adapter, u16 tpid) 1370 { 1371 iavf_send_vlan_offload_v2(adapter, tpid, 1372 VIRTCHNL_OP_ENABLE_VLAN_STRIPPING_V2); 1373 } 1374 1375 /** 1376 * iavf_disable_vlan_stripping_v2 - disable VLAN stripping 1377 * @adapter: adapter structure 1378 * @tpid: VLAN TPID used to disable VLAN stripping 1379 */ 1380 void iavf_disable_vlan_stripping_v2(struct iavf_adapter *adapter, u16 tpid) 1381 { 1382 iavf_send_vlan_offload_v2(adapter, tpid, 1383 VIRTCHNL_OP_DISABLE_VLAN_STRIPPING_V2); 1384 } 1385 1386 /** 1387 * iavf_enable_vlan_insertion_v2 - enable VLAN insertion 1388 * @adapter: adapter structure 1389 * @tpid: VLAN TPID used to enable VLAN insertion 1390 */ 1391 void iavf_enable_vlan_insertion_v2(struct iavf_adapter *adapter, u16 tpid) 1392 { 1393 iavf_send_vlan_offload_v2(adapter, tpid, 1394 VIRTCHNL_OP_ENABLE_VLAN_INSERTION_V2); 1395 } 1396 1397 /** 1398 * iavf_disable_vlan_insertion_v2 - disable VLAN insertion 1399 * @adapter: adapter structure 1400 * @tpid: VLAN TPID used to disable VLAN insertion 1401 */ 1402 void iavf_disable_vlan_insertion_v2(struct iavf_adapter *adapter, u16 tpid) 1403 { 1404 iavf_send_vlan_offload_v2(adapter, tpid, 1405 VIRTCHNL_OP_DISABLE_VLAN_INSERTION_V2); 1406 } 1407 1408 /** 1409 * iavf_print_link_message - print link up or down 1410 * @adapter: adapter structure 1411 * 1412 * Log a message telling the world of our wonderous link status 1413 */ 1414 static void iavf_print_link_message(struct iavf_adapter *adapter) 1415 { 1416 struct net_device *netdev = adapter->netdev; 1417 int link_speed_mbps; 1418 char *speed; 1419 1420 if (!adapter->link_up) { 1421 netdev_info(netdev, "NIC Link is Down\n"); 1422 return; 1423 } 1424 1425 if (ADV_LINK_SUPPORT(adapter)) { 1426 link_speed_mbps = adapter->link_speed_mbps; 1427 goto print_link_msg; 1428 } 1429 1430 switch (adapter->link_speed) { 1431 case VIRTCHNL_LINK_SPEED_40GB: 1432 link_speed_mbps = SPEED_40000; 1433 break; 1434 case VIRTCHNL_LINK_SPEED_25GB: 1435 link_speed_mbps = SPEED_25000; 1436 break; 1437 case VIRTCHNL_LINK_SPEED_20GB: 1438 link_speed_mbps = SPEED_20000; 1439 break; 1440 case VIRTCHNL_LINK_SPEED_10GB: 1441 link_speed_mbps = SPEED_10000; 1442 break; 1443 case VIRTCHNL_LINK_SPEED_5GB: 1444 link_speed_mbps = SPEED_5000; 1445 break; 1446 case VIRTCHNL_LINK_SPEED_2_5GB: 1447 link_speed_mbps = SPEED_2500; 1448 break; 1449 case VIRTCHNL_LINK_SPEED_1GB: 1450 link_speed_mbps = SPEED_1000; 1451 break; 1452 case VIRTCHNL_LINK_SPEED_100MB: 1453 link_speed_mbps = SPEED_100; 1454 break; 1455 default: 1456 link_speed_mbps = SPEED_UNKNOWN; 1457 break; 1458 } 1459 1460 print_link_msg: 1461 if (link_speed_mbps > SPEED_1000) { 1462 if (link_speed_mbps == SPEED_2500) { 1463 speed = kasprintf(GFP_KERNEL, "%s", "2.5 Gbps"); 1464 } else { 1465 /* convert to Gbps inline */ 1466 speed = kasprintf(GFP_KERNEL, "%d Gbps", 1467 link_speed_mbps / 1000); 1468 } 1469 } else if (link_speed_mbps == SPEED_UNKNOWN) { 1470 speed = kasprintf(GFP_KERNEL, "%s", "Unknown Mbps"); 1471 } else { 1472 speed = kasprintf(GFP_KERNEL, "%d Mbps", link_speed_mbps); 1473 } 1474 1475 netdev_info(netdev, "NIC Link is Up Speed is %s Full Duplex\n", speed); 1476 kfree(speed); 1477 } 1478 1479 /** 1480 * iavf_get_vpe_link_status 1481 * @adapter: adapter structure 1482 * @vpe: virtchnl_pf_event structure 1483 * 1484 * Helper function for determining the link status 1485 **/ 1486 static bool 1487 iavf_get_vpe_link_status(struct iavf_adapter *adapter, 1488 struct virtchnl_pf_event *vpe) 1489 { 1490 if (ADV_LINK_SUPPORT(adapter)) 1491 return vpe->event_data.link_event_adv.link_status; 1492 else 1493 return vpe->event_data.link_event.link_status; 1494 } 1495 1496 /** 1497 * iavf_set_adapter_link_speed_from_vpe 1498 * @adapter: adapter structure for which we are setting the link speed 1499 * @vpe: virtchnl_pf_event structure that contains the link speed we are setting 1500 * 1501 * Helper function for setting iavf_adapter link speed 1502 **/ 1503 static void 1504 iavf_set_adapter_link_speed_from_vpe(struct iavf_adapter *adapter, 1505 struct virtchnl_pf_event *vpe) 1506 { 1507 if (ADV_LINK_SUPPORT(adapter)) 1508 adapter->link_speed_mbps = 1509 vpe->event_data.link_event_adv.link_speed; 1510 else 1511 adapter->link_speed = vpe->event_data.link_event.link_speed; 1512 } 1513 1514 /** 1515 * iavf_enable_channels 1516 * @adapter: adapter structure 1517 * 1518 * Request that the PF enable channels as specified by 1519 * the user via tc tool. 1520 **/ 1521 void iavf_enable_channels(struct iavf_adapter *adapter) 1522 { 1523 struct virtchnl_tc_info *vti = NULL; 1524 size_t len; 1525 int i; 1526 1527 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 1528 /* bail because we already have a command pending */ 1529 dev_err(&adapter->pdev->dev, "Cannot configure mqprio, command %d pending\n", 1530 adapter->current_op); 1531 return; 1532 } 1533 1534 len = virtchnl_struct_size(vti, list, adapter->num_tc); 1535 vti = kzalloc(len, GFP_KERNEL); 1536 if (!vti) 1537 return; 1538 vti->num_tc = adapter->num_tc; 1539 for (i = 0; i < vti->num_tc; i++) { 1540 vti->list[i].count = adapter->ch_config.ch_info[i].count; 1541 vti->list[i].offset = adapter->ch_config.ch_info[i].offset; 1542 vti->list[i].pad = 0; 1543 vti->list[i].max_tx_rate = 1544 adapter->ch_config.ch_info[i].max_tx_rate; 1545 } 1546 1547 adapter->ch_config.state = __IAVF_TC_RUNNING; 1548 adapter->flags |= IAVF_FLAG_REINIT_ITR_NEEDED; 1549 adapter->current_op = VIRTCHNL_OP_ENABLE_CHANNELS; 1550 adapter->aq_required &= ~IAVF_FLAG_AQ_ENABLE_CHANNELS; 1551 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ENABLE_CHANNELS, (u8 *)vti, len); 1552 kfree(vti); 1553 } 1554 1555 /** 1556 * iavf_disable_channels 1557 * @adapter: adapter structure 1558 * 1559 * Request that the PF disable channels that are configured 1560 **/ 1561 void iavf_disable_channels(struct iavf_adapter *adapter) 1562 { 1563 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 1564 /* bail because we already have a command pending */ 1565 dev_err(&adapter->pdev->dev, "Cannot configure mqprio, command %d pending\n", 1566 adapter->current_op); 1567 return; 1568 } 1569 1570 adapter->ch_config.state = __IAVF_TC_INVALID; 1571 adapter->flags |= IAVF_FLAG_REINIT_ITR_NEEDED; 1572 adapter->current_op = VIRTCHNL_OP_DISABLE_CHANNELS; 1573 adapter->aq_required &= ~IAVF_FLAG_AQ_DISABLE_CHANNELS; 1574 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DISABLE_CHANNELS, NULL, 0); 1575 } 1576 1577 /** 1578 * iavf_print_cloud_filter 1579 * @adapter: adapter structure 1580 * @f: cloud filter to print 1581 * 1582 * Print the cloud filter 1583 **/ 1584 static void iavf_print_cloud_filter(struct iavf_adapter *adapter, 1585 struct virtchnl_filter *f) 1586 { 1587 switch (f->flow_type) { 1588 case VIRTCHNL_TCP_V4_FLOW: 1589 dev_info(&adapter->pdev->dev, "dst_mac: %pM src_mac: %pM vlan_id: %hu dst_ip: %pI4 src_ip %pI4 dst_port %hu src_port %hu\n", 1590 &f->data.tcp_spec.dst_mac, 1591 &f->data.tcp_spec.src_mac, 1592 ntohs(f->data.tcp_spec.vlan_id), 1593 &f->data.tcp_spec.dst_ip[0], 1594 &f->data.tcp_spec.src_ip[0], 1595 ntohs(f->data.tcp_spec.dst_port), 1596 ntohs(f->data.tcp_spec.src_port)); 1597 break; 1598 case VIRTCHNL_TCP_V6_FLOW: 1599 dev_info(&adapter->pdev->dev, "dst_mac: %pM src_mac: %pM vlan_id: %hu dst_ip: %pI6 src_ip %pI6 dst_port %hu src_port %hu\n", 1600 &f->data.tcp_spec.dst_mac, 1601 &f->data.tcp_spec.src_mac, 1602 ntohs(f->data.tcp_spec.vlan_id), 1603 &f->data.tcp_spec.dst_ip, 1604 &f->data.tcp_spec.src_ip, 1605 ntohs(f->data.tcp_spec.dst_port), 1606 ntohs(f->data.tcp_spec.src_port)); 1607 break; 1608 } 1609 } 1610 1611 /** 1612 * iavf_add_cloud_filter 1613 * @adapter: adapter structure 1614 * 1615 * Request that the PF add cloud filters as specified 1616 * by the user via tc tool. 1617 **/ 1618 void iavf_add_cloud_filter(struct iavf_adapter *adapter) 1619 { 1620 struct iavf_cloud_filter *cf; 1621 struct virtchnl_filter *f; 1622 int len = 0, count = 0; 1623 1624 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 1625 /* bail because we already have a command pending */ 1626 dev_err(&adapter->pdev->dev, "Cannot add cloud filter, command %d pending\n", 1627 adapter->current_op); 1628 return; 1629 } 1630 list_for_each_entry(cf, &adapter->cloud_filter_list, list) { 1631 if (cf->add) { 1632 count++; 1633 break; 1634 } 1635 } 1636 if (!count) { 1637 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_CLOUD_FILTER; 1638 return; 1639 } 1640 adapter->current_op = VIRTCHNL_OP_ADD_CLOUD_FILTER; 1641 1642 len = sizeof(struct virtchnl_filter); 1643 f = kzalloc(len, GFP_KERNEL); 1644 if (!f) 1645 return; 1646 1647 list_for_each_entry(cf, &adapter->cloud_filter_list, list) { 1648 if (cf->add) { 1649 memcpy(f, &cf->f, sizeof(struct virtchnl_filter)); 1650 cf->add = false; 1651 cf->state = __IAVF_CF_ADD_PENDING; 1652 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ADD_CLOUD_FILTER, 1653 (u8 *)f, len); 1654 } 1655 } 1656 kfree(f); 1657 } 1658 1659 /** 1660 * iavf_del_cloud_filter 1661 * @adapter: adapter structure 1662 * 1663 * Request that the PF delete cloud filters as specified 1664 * by the user via tc tool. 1665 **/ 1666 void iavf_del_cloud_filter(struct iavf_adapter *adapter) 1667 { 1668 struct iavf_cloud_filter *cf, *cftmp; 1669 struct virtchnl_filter *f; 1670 int len = 0, count = 0; 1671 1672 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 1673 /* bail because we already have a command pending */ 1674 dev_err(&adapter->pdev->dev, "Cannot remove cloud filter, command %d pending\n", 1675 adapter->current_op); 1676 return; 1677 } 1678 list_for_each_entry(cf, &adapter->cloud_filter_list, list) { 1679 if (cf->del) { 1680 count++; 1681 break; 1682 } 1683 } 1684 if (!count) { 1685 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_CLOUD_FILTER; 1686 return; 1687 } 1688 adapter->current_op = VIRTCHNL_OP_DEL_CLOUD_FILTER; 1689 1690 len = sizeof(struct virtchnl_filter); 1691 f = kzalloc(len, GFP_KERNEL); 1692 if (!f) 1693 return; 1694 1695 list_for_each_entry_safe(cf, cftmp, &adapter->cloud_filter_list, list) { 1696 if (cf->del) { 1697 memcpy(f, &cf->f, sizeof(struct virtchnl_filter)); 1698 cf->del = false; 1699 cf->state = __IAVF_CF_DEL_PENDING; 1700 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DEL_CLOUD_FILTER, 1701 (u8 *)f, len); 1702 } 1703 } 1704 kfree(f); 1705 } 1706 1707 /** 1708 * iavf_add_fdir_filter 1709 * @adapter: the VF adapter structure 1710 * 1711 * Request that the PF add Flow Director filters as specified 1712 * by the user via ethtool. 1713 **/ 1714 void iavf_add_fdir_filter(struct iavf_adapter *adapter) 1715 { 1716 struct iavf_fdir_fltr *fdir; 1717 struct virtchnl_fdir_add *f; 1718 bool process_fltr = false; 1719 int len; 1720 1721 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 1722 /* bail because we already have a command pending */ 1723 dev_err(&adapter->pdev->dev, "Cannot add Flow Director filter, command %d pending\n", 1724 adapter->current_op); 1725 return; 1726 } 1727 1728 len = sizeof(struct virtchnl_fdir_add); 1729 f = kzalloc(len, GFP_KERNEL); 1730 if (!f) 1731 return; 1732 1733 spin_lock_bh(&adapter->fdir_fltr_lock); 1734 list_for_each_entry(fdir, &adapter->fdir_list_head, list) { 1735 if (fdir->state == IAVF_FDIR_FLTR_ADD_REQUEST) { 1736 process_fltr = true; 1737 fdir->state = IAVF_FDIR_FLTR_ADD_PENDING; 1738 memcpy(f, &fdir->vc_add_msg, len); 1739 break; 1740 } 1741 } 1742 spin_unlock_bh(&adapter->fdir_fltr_lock); 1743 1744 if (!process_fltr) { 1745 /* prevent iavf_add_fdir_filter() from being called when there 1746 * are no filters to add 1747 */ 1748 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_FDIR_FILTER; 1749 kfree(f); 1750 return; 1751 } 1752 adapter->current_op = VIRTCHNL_OP_ADD_FDIR_FILTER; 1753 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ADD_FDIR_FILTER, (u8 *)f, len); 1754 kfree(f); 1755 } 1756 1757 /** 1758 * iavf_del_fdir_filter 1759 * @adapter: the VF adapter structure 1760 * 1761 * Request that the PF delete Flow Director filters as specified 1762 * by the user via ethtool. 1763 **/ 1764 void iavf_del_fdir_filter(struct iavf_adapter *adapter) 1765 { 1766 struct virtchnl_fdir_del f = {}; 1767 struct iavf_fdir_fltr *fdir; 1768 bool process_fltr = false; 1769 int len; 1770 1771 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 1772 /* bail because we already have a command pending */ 1773 dev_err(&adapter->pdev->dev, "Cannot remove Flow Director filter, command %d pending\n", 1774 adapter->current_op); 1775 return; 1776 } 1777 1778 len = sizeof(struct virtchnl_fdir_del); 1779 1780 spin_lock_bh(&adapter->fdir_fltr_lock); 1781 list_for_each_entry(fdir, &adapter->fdir_list_head, list) { 1782 if (fdir->state == IAVF_FDIR_FLTR_DEL_REQUEST) { 1783 process_fltr = true; 1784 f.vsi_id = fdir->vc_add_msg.vsi_id; 1785 f.flow_id = fdir->flow_id; 1786 fdir->state = IAVF_FDIR_FLTR_DEL_PENDING; 1787 break; 1788 } else if (fdir->state == IAVF_FDIR_FLTR_DIS_REQUEST) { 1789 process_fltr = true; 1790 f.vsi_id = fdir->vc_add_msg.vsi_id; 1791 f.flow_id = fdir->flow_id; 1792 fdir->state = IAVF_FDIR_FLTR_DIS_PENDING; 1793 break; 1794 } 1795 } 1796 spin_unlock_bh(&adapter->fdir_fltr_lock); 1797 1798 if (!process_fltr) { 1799 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_FDIR_FILTER; 1800 return; 1801 } 1802 1803 adapter->current_op = VIRTCHNL_OP_DEL_FDIR_FILTER; 1804 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DEL_FDIR_FILTER, (u8 *)&f, len); 1805 } 1806 1807 /** 1808 * iavf_add_adv_rss_cfg 1809 * @adapter: the VF adapter structure 1810 * 1811 * Request that the PF add RSS configuration as specified 1812 * by the user via ethtool. 1813 **/ 1814 void iavf_add_adv_rss_cfg(struct iavf_adapter *adapter) 1815 { 1816 struct virtchnl_rss_cfg *rss_cfg; 1817 struct iavf_adv_rss *rss; 1818 bool process_rss = false; 1819 int len; 1820 1821 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 1822 /* bail because we already have a command pending */ 1823 dev_err(&adapter->pdev->dev, "Cannot add RSS configuration, command %d pending\n", 1824 adapter->current_op); 1825 return; 1826 } 1827 1828 len = sizeof(struct virtchnl_rss_cfg); 1829 rss_cfg = kzalloc(len, GFP_KERNEL); 1830 if (!rss_cfg) 1831 return; 1832 1833 spin_lock_bh(&adapter->adv_rss_lock); 1834 list_for_each_entry(rss, &adapter->adv_rss_list_head, list) { 1835 if (rss->state == IAVF_ADV_RSS_ADD_REQUEST) { 1836 process_rss = true; 1837 rss->state = IAVF_ADV_RSS_ADD_PENDING; 1838 memcpy(rss_cfg, &rss->cfg_msg, len); 1839 iavf_print_adv_rss_cfg(adapter, rss, 1840 "Input set change for", 1841 "is pending"); 1842 break; 1843 } 1844 } 1845 spin_unlock_bh(&adapter->adv_rss_lock); 1846 1847 if (process_rss) { 1848 adapter->current_op = VIRTCHNL_OP_ADD_RSS_CFG; 1849 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ADD_RSS_CFG, 1850 (u8 *)rss_cfg, len); 1851 } else { 1852 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_ADV_RSS_CFG; 1853 } 1854 1855 kfree(rss_cfg); 1856 } 1857 1858 /** 1859 * iavf_del_adv_rss_cfg 1860 * @adapter: the VF adapter structure 1861 * 1862 * Request that the PF delete RSS configuration as specified 1863 * by the user via ethtool. 1864 **/ 1865 void iavf_del_adv_rss_cfg(struct iavf_adapter *adapter) 1866 { 1867 struct virtchnl_rss_cfg *rss_cfg; 1868 struct iavf_adv_rss *rss; 1869 bool process_rss = false; 1870 int len; 1871 1872 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 1873 /* bail because we already have a command pending */ 1874 dev_err(&adapter->pdev->dev, "Cannot remove RSS configuration, command %d pending\n", 1875 adapter->current_op); 1876 return; 1877 } 1878 1879 len = sizeof(struct virtchnl_rss_cfg); 1880 rss_cfg = kzalloc(len, GFP_KERNEL); 1881 if (!rss_cfg) 1882 return; 1883 1884 spin_lock_bh(&adapter->adv_rss_lock); 1885 list_for_each_entry(rss, &adapter->adv_rss_list_head, list) { 1886 if (rss->state == IAVF_ADV_RSS_DEL_REQUEST) { 1887 process_rss = true; 1888 rss->state = IAVF_ADV_RSS_DEL_PENDING; 1889 memcpy(rss_cfg, &rss->cfg_msg, len); 1890 break; 1891 } 1892 } 1893 spin_unlock_bh(&adapter->adv_rss_lock); 1894 1895 if (process_rss) { 1896 adapter->current_op = VIRTCHNL_OP_DEL_RSS_CFG; 1897 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DEL_RSS_CFG, 1898 (u8 *)rss_cfg, len); 1899 } else { 1900 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_ADV_RSS_CFG; 1901 } 1902 1903 kfree(rss_cfg); 1904 } 1905 1906 /** 1907 * iavf_request_reset 1908 * @adapter: adapter structure 1909 * 1910 * Request that the PF reset this VF. No response is expected. 1911 **/ 1912 int iavf_request_reset(struct iavf_adapter *adapter) 1913 { 1914 int err; 1915 /* Don't check CURRENT_OP - this is always higher priority */ 1916 err = iavf_send_pf_msg(adapter, VIRTCHNL_OP_RESET_VF, NULL, 0); 1917 adapter->current_op = VIRTCHNL_OP_UNKNOWN; 1918 return err; 1919 } 1920 1921 /** 1922 * iavf_netdev_features_vlan_strip_set - update vlan strip status 1923 * @netdev: ptr to netdev being adjusted 1924 * @enable: enable or disable vlan strip 1925 * 1926 * Helper function to change vlan strip status in netdev->features. 1927 */ 1928 static void iavf_netdev_features_vlan_strip_set(struct net_device *netdev, 1929 const bool enable) 1930 { 1931 if (enable) 1932 netdev->features |= NETIF_F_HW_VLAN_CTAG_RX; 1933 else 1934 netdev->features &= ~NETIF_F_HW_VLAN_CTAG_RX; 1935 } 1936 1937 /** 1938 * iavf_activate_fdir_filters - Reactivate all FDIR filters after a reset 1939 * @adapter: private adapter structure 1940 * 1941 * Called after a reset to re-add all FDIR filters and delete some of them 1942 * if they were pending to be deleted. 1943 */ 1944 static void iavf_activate_fdir_filters(struct iavf_adapter *adapter) 1945 { 1946 struct iavf_fdir_fltr *f, *ftmp; 1947 bool add_filters = false; 1948 1949 spin_lock_bh(&adapter->fdir_fltr_lock); 1950 list_for_each_entry_safe(f, ftmp, &adapter->fdir_list_head, list) { 1951 if (f->state == IAVF_FDIR_FLTR_ADD_REQUEST || 1952 f->state == IAVF_FDIR_FLTR_ADD_PENDING || 1953 f->state == IAVF_FDIR_FLTR_ACTIVE) { 1954 /* All filters and requests have been removed in PF, 1955 * restore them 1956 */ 1957 f->state = IAVF_FDIR_FLTR_ADD_REQUEST; 1958 add_filters = true; 1959 } else if (f->state == IAVF_FDIR_FLTR_DIS_REQUEST || 1960 f->state == IAVF_FDIR_FLTR_DIS_PENDING) { 1961 /* Link down state, leave filters as inactive */ 1962 f->state = IAVF_FDIR_FLTR_INACTIVE; 1963 } else if (f->state == IAVF_FDIR_FLTR_DEL_REQUEST || 1964 f->state == IAVF_FDIR_FLTR_DEL_PENDING) { 1965 /* Delete filters that were pending to be deleted, the 1966 * list on PF is already cleared after a reset 1967 */ 1968 list_del(&f->list); 1969 kfree(f); 1970 adapter->fdir_active_fltr--; 1971 } 1972 } 1973 spin_unlock_bh(&adapter->fdir_fltr_lock); 1974 1975 if (add_filters) 1976 adapter->aq_required |= IAVF_FLAG_AQ_ADD_FDIR_FILTER; 1977 } 1978 1979 /** 1980 * iavf_virtchnl_completion 1981 * @adapter: adapter structure 1982 * @v_opcode: opcode sent by PF 1983 * @v_retval: retval sent by PF 1984 * @msg: message sent by PF 1985 * @msglen: message length 1986 * 1987 * Asynchronous completion function for admin queue messages. Rather than busy 1988 * wait, we fire off our requests and assume that no errors will be returned. 1989 * This function handles the reply messages. 1990 **/ 1991 void iavf_virtchnl_completion(struct iavf_adapter *adapter, 1992 enum virtchnl_ops v_opcode, 1993 enum iavf_status v_retval, u8 *msg, u16 msglen) 1994 { 1995 struct net_device *netdev = adapter->netdev; 1996 1997 if (v_opcode == VIRTCHNL_OP_EVENT) { 1998 struct virtchnl_pf_event *vpe = 1999 (struct virtchnl_pf_event *)msg; 2000 bool link_up = iavf_get_vpe_link_status(adapter, vpe); 2001 2002 switch (vpe->event) { 2003 case VIRTCHNL_EVENT_LINK_CHANGE: 2004 iavf_set_adapter_link_speed_from_vpe(adapter, vpe); 2005 2006 /* we've already got the right link status, bail */ 2007 if (adapter->link_up == link_up) 2008 break; 2009 2010 if (link_up) { 2011 /* If we get link up message and start queues 2012 * before our queues are configured it will 2013 * trigger a TX hang. In that case, just ignore 2014 * the link status message,we'll get another one 2015 * after we enable queues and actually prepared 2016 * to send traffic. 2017 */ 2018 if (adapter->state != __IAVF_RUNNING) 2019 break; 2020 2021 /* For ADq enabled VF, we reconfigure VSIs and 2022 * re-allocate queues. Hence wait till all 2023 * queues are enabled. 2024 */ 2025 if (adapter->flags & 2026 IAVF_FLAG_QUEUES_DISABLED) 2027 break; 2028 } 2029 2030 adapter->link_up = link_up; 2031 if (link_up) { 2032 netif_tx_start_all_queues(netdev); 2033 netif_carrier_on(netdev); 2034 } else { 2035 netif_tx_stop_all_queues(netdev); 2036 netif_carrier_off(netdev); 2037 } 2038 iavf_print_link_message(adapter); 2039 break; 2040 case VIRTCHNL_EVENT_RESET_IMPENDING: 2041 dev_info(&adapter->pdev->dev, "Reset indication received from the PF\n"); 2042 if (!(adapter->flags & IAVF_FLAG_RESET_PENDING)) { 2043 dev_info(&adapter->pdev->dev, "Scheduling reset task\n"); 2044 iavf_schedule_reset(adapter, IAVF_FLAG_RESET_PENDING); 2045 } 2046 break; 2047 default: 2048 dev_err(&adapter->pdev->dev, "Unknown event %d from PF\n", 2049 vpe->event); 2050 break; 2051 } 2052 return; 2053 } 2054 if (v_retval) { 2055 switch (v_opcode) { 2056 case VIRTCHNL_OP_ADD_VLAN: 2057 dev_err(&adapter->pdev->dev, "Failed to add VLAN filter, error %s\n", 2058 iavf_stat_str(&adapter->hw, v_retval)); 2059 break; 2060 case VIRTCHNL_OP_ADD_ETH_ADDR: 2061 dev_err(&adapter->pdev->dev, "Failed to add MAC filter, error %s\n", 2062 iavf_stat_str(&adapter->hw, v_retval)); 2063 iavf_mac_add_reject(adapter); 2064 /* restore administratively set MAC address */ 2065 ether_addr_copy(adapter->hw.mac.addr, netdev->dev_addr); 2066 wake_up(&adapter->vc_waitqueue); 2067 break; 2068 case VIRTCHNL_OP_DEL_VLAN: 2069 dev_err(&adapter->pdev->dev, "Failed to delete VLAN filter, error %s\n", 2070 iavf_stat_str(&adapter->hw, v_retval)); 2071 break; 2072 case VIRTCHNL_OP_DEL_ETH_ADDR: 2073 dev_err(&adapter->pdev->dev, "Failed to delete MAC filter, error %s\n", 2074 iavf_stat_str(&adapter->hw, v_retval)); 2075 break; 2076 case VIRTCHNL_OP_ENABLE_CHANNELS: 2077 dev_err(&adapter->pdev->dev, "Failed to configure queue channels, error %s\n", 2078 iavf_stat_str(&adapter->hw, v_retval)); 2079 adapter->flags &= ~IAVF_FLAG_REINIT_ITR_NEEDED; 2080 adapter->ch_config.state = __IAVF_TC_INVALID; 2081 netdev_reset_tc(netdev); 2082 netif_tx_start_all_queues(netdev); 2083 break; 2084 case VIRTCHNL_OP_DISABLE_CHANNELS: 2085 dev_err(&adapter->pdev->dev, "Failed to disable queue channels, error %s\n", 2086 iavf_stat_str(&adapter->hw, v_retval)); 2087 adapter->flags &= ~IAVF_FLAG_REINIT_ITR_NEEDED; 2088 adapter->ch_config.state = __IAVF_TC_RUNNING; 2089 netif_tx_start_all_queues(netdev); 2090 break; 2091 case VIRTCHNL_OP_ADD_CLOUD_FILTER: { 2092 struct iavf_cloud_filter *cf, *cftmp; 2093 2094 list_for_each_entry_safe(cf, cftmp, 2095 &adapter->cloud_filter_list, 2096 list) { 2097 if (cf->state == __IAVF_CF_ADD_PENDING) { 2098 cf->state = __IAVF_CF_INVALID; 2099 dev_info(&adapter->pdev->dev, "Failed to add cloud filter, error %s\n", 2100 iavf_stat_str(&adapter->hw, 2101 v_retval)); 2102 iavf_print_cloud_filter(adapter, 2103 &cf->f); 2104 list_del(&cf->list); 2105 kfree(cf); 2106 adapter->num_cloud_filters--; 2107 } 2108 } 2109 } 2110 break; 2111 case VIRTCHNL_OP_DEL_CLOUD_FILTER: { 2112 struct iavf_cloud_filter *cf; 2113 2114 list_for_each_entry(cf, &adapter->cloud_filter_list, 2115 list) { 2116 if (cf->state == __IAVF_CF_DEL_PENDING) { 2117 cf->state = __IAVF_CF_ACTIVE; 2118 dev_info(&adapter->pdev->dev, "Failed to del cloud filter, error %s\n", 2119 iavf_stat_str(&adapter->hw, 2120 v_retval)); 2121 iavf_print_cloud_filter(adapter, 2122 &cf->f); 2123 } 2124 } 2125 } 2126 break; 2127 case VIRTCHNL_OP_ADD_FDIR_FILTER: { 2128 struct iavf_fdir_fltr *fdir, *fdir_tmp; 2129 2130 spin_lock_bh(&adapter->fdir_fltr_lock); 2131 list_for_each_entry_safe(fdir, fdir_tmp, 2132 &adapter->fdir_list_head, 2133 list) { 2134 if (fdir->state == IAVF_FDIR_FLTR_ADD_PENDING) { 2135 dev_info(&adapter->pdev->dev, "Failed to add Flow Director filter, error %s\n", 2136 iavf_stat_str(&adapter->hw, 2137 v_retval)); 2138 iavf_print_fdir_fltr(adapter, fdir); 2139 if (msglen) 2140 dev_err(&adapter->pdev->dev, 2141 "%s\n", msg); 2142 list_del(&fdir->list); 2143 kfree(fdir); 2144 adapter->fdir_active_fltr--; 2145 } 2146 } 2147 spin_unlock_bh(&adapter->fdir_fltr_lock); 2148 } 2149 break; 2150 case VIRTCHNL_OP_DEL_FDIR_FILTER: { 2151 struct iavf_fdir_fltr *fdir; 2152 2153 spin_lock_bh(&adapter->fdir_fltr_lock); 2154 list_for_each_entry(fdir, &adapter->fdir_list_head, 2155 list) { 2156 if (fdir->state == IAVF_FDIR_FLTR_DEL_PENDING || 2157 fdir->state == IAVF_FDIR_FLTR_DIS_PENDING) { 2158 fdir->state = IAVF_FDIR_FLTR_ACTIVE; 2159 dev_info(&adapter->pdev->dev, "Failed to del Flow Director filter, error %s\n", 2160 iavf_stat_str(&adapter->hw, 2161 v_retval)); 2162 iavf_print_fdir_fltr(adapter, fdir); 2163 } 2164 } 2165 spin_unlock_bh(&adapter->fdir_fltr_lock); 2166 } 2167 break; 2168 case VIRTCHNL_OP_ADD_RSS_CFG: { 2169 struct iavf_adv_rss *rss, *rss_tmp; 2170 2171 spin_lock_bh(&adapter->adv_rss_lock); 2172 list_for_each_entry_safe(rss, rss_tmp, 2173 &adapter->adv_rss_list_head, 2174 list) { 2175 if (rss->state == IAVF_ADV_RSS_ADD_PENDING) { 2176 iavf_print_adv_rss_cfg(adapter, rss, 2177 "Failed to change the input set for", 2178 NULL); 2179 list_del(&rss->list); 2180 kfree(rss); 2181 } 2182 } 2183 spin_unlock_bh(&adapter->adv_rss_lock); 2184 } 2185 break; 2186 case VIRTCHNL_OP_DEL_RSS_CFG: { 2187 struct iavf_adv_rss *rss; 2188 2189 spin_lock_bh(&adapter->adv_rss_lock); 2190 list_for_each_entry(rss, &adapter->adv_rss_list_head, 2191 list) { 2192 if (rss->state == IAVF_ADV_RSS_DEL_PENDING) { 2193 rss->state = IAVF_ADV_RSS_ACTIVE; 2194 dev_err(&adapter->pdev->dev, "Failed to delete RSS configuration, error %s\n", 2195 iavf_stat_str(&adapter->hw, 2196 v_retval)); 2197 } 2198 } 2199 spin_unlock_bh(&adapter->adv_rss_lock); 2200 } 2201 break; 2202 case VIRTCHNL_OP_ENABLE_VLAN_STRIPPING: 2203 dev_warn(&adapter->pdev->dev, "Changing VLAN Stripping is not allowed when Port VLAN is configured\n"); 2204 /* Vlan stripping could not be enabled by ethtool. 2205 * Disable it in netdev->features. 2206 */ 2207 iavf_netdev_features_vlan_strip_set(netdev, false); 2208 break; 2209 case VIRTCHNL_OP_DISABLE_VLAN_STRIPPING: 2210 dev_warn(&adapter->pdev->dev, "Changing VLAN Stripping is not allowed when Port VLAN is configured\n"); 2211 /* Vlan stripping could not be disabled by ethtool. 2212 * Enable it in netdev->features. 2213 */ 2214 iavf_netdev_features_vlan_strip_set(netdev, true); 2215 break; 2216 case VIRTCHNL_OP_ADD_VLAN_V2: 2217 iavf_vlan_add_reject(adapter); 2218 dev_warn(&adapter->pdev->dev, "Failed to add VLAN filter, error %s\n", 2219 iavf_stat_str(&adapter->hw, v_retval)); 2220 break; 2221 case VIRTCHNL_OP_CONFIG_RSS_HFUNC: 2222 dev_warn(&adapter->pdev->dev, "Failed to configure hash function, error %s\n", 2223 iavf_stat_str(&adapter->hw, v_retval)); 2224 2225 if (adapter->hfunc == 2226 VIRTCHNL_RSS_ALG_TOEPLITZ_SYMMETRIC) 2227 adapter->hfunc = 2228 VIRTCHNL_RSS_ALG_TOEPLITZ_ASYMMETRIC; 2229 else 2230 adapter->hfunc = 2231 VIRTCHNL_RSS_ALG_TOEPLITZ_SYMMETRIC; 2232 2233 break; 2234 default: 2235 dev_err(&adapter->pdev->dev, "PF returned error %d (%s) to our request %d\n", 2236 v_retval, iavf_stat_str(&adapter->hw, v_retval), 2237 v_opcode); 2238 } 2239 } 2240 switch (v_opcode) { 2241 case VIRTCHNL_OP_ADD_ETH_ADDR: 2242 if (!v_retval) 2243 iavf_mac_add_ok(adapter); 2244 if (!ether_addr_equal(netdev->dev_addr, adapter->hw.mac.addr)) 2245 if (!ether_addr_equal(netdev->dev_addr, 2246 adapter->hw.mac.addr)) { 2247 netif_addr_lock_bh(netdev); 2248 eth_hw_addr_set(netdev, adapter->hw.mac.addr); 2249 netif_addr_unlock_bh(netdev); 2250 } 2251 wake_up(&adapter->vc_waitqueue); 2252 break; 2253 case VIRTCHNL_OP_GET_STATS: { 2254 struct iavf_eth_stats *stats = 2255 (struct iavf_eth_stats *)msg; 2256 netdev->stats.rx_packets = stats->rx_unicast + 2257 stats->rx_multicast + 2258 stats->rx_broadcast; 2259 netdev->stats.tx_packets = stats->tx_unicast + 2260 stats->tx_multicast + 2261 stats->tx_broadcast; 2262 netdev->stats.rx_bytes = stats->rx_bytes; 2263 netdev->stats.tx_bytes = stats->tx_bytes; 2264 netdev->stats.tx_errors = stats->tx_errors; 2265 netdev->stats.rx_dropped = stats->rx_discards; 2266 netdev->stats.tx_dropped = stats->tx_discards; 2267 adapter->current_stats = *stats; 2268 } 2269 break; 2270 case VIRTCHNL_OP_GET_VF_RESOURCES: { 2271 u16 len = IAVF_VIRTCHNL_VF_RESOURCE_SIZE; 2272 2273 memcpy(adapter->vf_res, msg, min(msglen, len)); 2274 iavf_validate_num_queues(adapter); 2275 iavf_vf_parse_hw_config(&adapter->hw, adapter->vf_res); 2276 if (is_zero_ether_addr(adapter->hw.mac.addr)) { 2277 /* restore current mac address */ 2278 ether_addr_copy(adapter->hw.mac.addr, netdev->dev_addr); 2279 } else { 2280 netif_addr_lock_bh(netdev); 2281 /* refresh current mac address if changed */ 2282 ether_addr_copy(netdev->perm_addr, 2283 adapter->hw.mac.addr); 2284 netif_addr_unlock_bh(netdev); 2285 } 2286 spin_lock_bh(&adapter->mac_vlan_list_lock); 2287 iavf_add_filter(adapter, adapter->hw.mac.addr); 2288 2289 if (VLAN_ALLOWED(adapter)) { 2290 if (!list_empty(&adapter->vlan_filter_list)) { 2291 struct iavf_vlan_filter *vlf; 2292 2293 /* re-add all VLAN filters over virtchnl */ 2294 list_for_each_entry(vlf, 2295 &adapter->vlan_filter_list, 2296 list) 2297 vlf->state = IAVF_VLAN_ADD; 2298 2299 adapter->aq_required |= 2300 IAVF_FLAG_AQ_ADD_VLAN_FILTER; 2301 } 2302 } 2303 2304 spin_unlock_bh(&adapter->mac_vlan_list_lock); 2305 2306 iavf_activate_fdir_filters(adapter); 2307 2308 iavf_parse_vf_resource_msg(adapter); 2309 2310 /* negotiated VIRTCHNL_VF_OFFLOAD_VLAN_V2, so wait for the 2311 * response to VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS to finish 2312 * configuration 2313 */ 2314 if (VLAN_V2_ALLOWED(adapter)) 2315 break; 2316 /* fallthrough and finish config if VIRTCHNL_VF_OFFLOAD_VLAN_V2 2317 * wasn't successfully negotiated with the PF 2318 */ 2319 } 2320 fallthrough; 2321 case VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS: { 2322 struct iavf_mac_filter *f; 2323 bool was_mac_changed; 2324 u64 aq_required = 0; 2325 2326 if (v_opcode == VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS) 2327 memcpy(&adapter->vlan_v2_caps, msg, 2328 min_t(u16, msglen, 2329 sizeof(adapter->vlan_v2_caps))); 2330 2331 iavf_process_config(adapter); 2332 adapter->flags |= IAVF_FLAG_SETUP_NETDEV_FEATURES; 2333 iavf_schedule_finish_config(adapter); 2334 2335 iavf_set_queue_vlan_tag_loc(adapter); 2336 2337 was_mac_changed = !ether_addr_equal(netdev->dev_addr, 2338 adapter->hw.mac.addr); 2339 2340 spin_lock_bh(&adapter->mac_vlan_list_lock); 2341 2342 /* re-add all MAC filters */ 2343 list_for_each_entry(f, &adapter->mac_filter_list, list) { 2344 if (was_mac_changed && 2345 ether_addr_equal(netdev->dev_addr, f->macaddr)) 2346 ether_addr_copy(f->macaddr, 2347 adapter->hw.mac.addr); 2348 2349 f->is_new_mac = true; 2350 f->add = true; 2351 f->add_handled = false; 2352 f->remove = false; 2353 } 2354 2355 /* re-add all VLAN filters */ 2356 if (VLAN_FILTERING_ALLOWED(adapter)) { 2357 struct iavf_vlan_filter *vlf; 2358 2359 if (!list_empty(&adapter->vlan_filter_list)) { 2360 list_for_each_entry(vlf, 2361 &adapter->vlan_filter_list, 2362 list) 2363 vlf->state = IAVF_VLAN_ADD; 2364 2365 aq_required |= IAVF_FLAG_AQ_ADD_VLAN_FILTER; 2366 } 2367 } 2368 2369 spin_unlock_bh(&adapter->mac_vlan_list_lock); 2370 2371 netif_addr_lock_bh(netdev); 2372 eth_hw_addr_set(netdev, adapter->hw.mac.addr); 2373 netif_addr_unlock_bh(netdev); 2374 2375 adapter->aq_required |= IAVF_FLAG_AQ_ADD_MAC_FILTER | 2376 aq_required; 2377 } 2378 break; 2379 case VIRTCHNL_OP_ENABLE_QUEUES: 2380 /* enable transmits */ 2381 iavf_irq_enable(adapter, true); 2382 wake_up(&adapter->reset_waitqueue); 2383 adapter->flags &= ~IAVF_FLAG_QUEUES_DISABLED; 2384 break; 2385 case VIRTCHNL_OP_DISABLE_QUEUES: 2386 iavf_free_all_tx_resources(adapter); 2387 iavf_free_all_rx_resources(adapter); 2388 if (adapter->state == __IAVF_DOWN_PENDING) { 2389 iavf_change_state(adapter, __IAVF_DOWN); 2390 wake_up(&adapter->down_waitqueue); 2391 } 2392 break; 2393 case VIRTCHNL_OP_VERSION: 2394 case VIRTCHNL_OP_CONFIG_IRQ_MAP: 2395 /* Don't display an error if we get these out of sequence. 2396 * If the firmware needed to get kicked, we'll get these and 2397 * it's no problem. 2398 */ 2399 if (v_opcode != adapter->current_op) 2400 return; 2401 break; 2402 case VIRTCHNL_OP_GET_RSS_HENA_CAPS: { 2403 struct virtchnl_rss_hena *vrh = (struct virtchnl_rss_hena *)msg; 2404 2405 if (msglen == sizeof(*vrh)) 2406 adapter->hena = vrh->hena; 2407 else 2408 dev_warn(&adapter->pdev->dev, 2409 "Invalid message %d from PF\n", v_opcode); 2410 } 2411 break; 2412 case VIRTCHNL_OP_REQUEST_QUEUES: { 2413 struct virtchnl_vf_res_request *vfres = 2414 (struct virtchnl_vf_res_request *)msg; 2415 2416 if (vfres->num_queue_pairs != adapter->num_req_queues) { 2417 dev_info(&adapter->pdev->dev, 2418 "Requested %d queues, PF can support %d\n", 2419 adapter->num_req_queues, 2420 vfres->num_queue_pairs); 2421 adapter->num_req_queues = 0; 2422 adapter->flags &= ~IAVF_FLAG_REINIT_ITR_NEEDED; 2423 } 2424 } 2425 break; 2426 case VIRTCHNL_OP_ADD_CLOUD_FILTER: { 2427 struct iavf_cloud_filter *cf; 2428 2429 list_for_each_entry(cf, &adapter->cloud_filter_list, list) { 2430 if (cf->state == __IAVF_CF_ADD_PENDING) 2431 cf->state = __IAVF_CF_ACTIVE; 2432 } 2433 } 2434 break; 2435 case VIRTCHNL_OP_DEL_CLOUD_FILTER: { 2436 struct iavf_cloud_filter *cf, *cftmp; 2437 2438 list_for_each_entry_safe(cf, cftmp, &adapter->cloud_filter_list, 2439 list) { 2440 if (cf->state == __IAVF_CF_DEL_PENDING) { 2441 cf->state = __IAVF_CF_INVALID; 2442 list_del(&cf->list); 2443 kfree(cf); 2444 adapter->num_cloud_filters--; 2445 } 2446 } 2447 } 2448 break; 2449 case VIRTCHNL_OP_ADD_FDIR_FILTER: { 2450 struct virtchnl_fdir_add *add_fltr = (struct virtchnl_fdir_add *)msg; 2451 struct iavf_fdir_fltr *fdir, *fdir_tmp; 2452 2453 spin_lock_bh(&adapter->fdir_fltr_lock); 2454 list_for_each_entry_safe(fdir, fdir_tmp, 2455 &adapter->fdir_list_head, 2456 list) { 2457 if (fdir->state == IAVF_FDIR_FLTR_ADD_PENDING) { 2458 if (add_fltr->status == VIRTCHNL_FDIR_SUCCESS) { 2459 dev_info(&adapter->pdev->dev, "Flow Director filter with location %u is added\n", 2460 fdir->loc); 2461 fdir->state = IAVF_FDIR_FLTR_ACTIVE; 2462 fdir->flow_id = add_fltr->flow_id; 2463 } else { 2464 dev_info(&adapter->pdev->dev, "Failed to add Flow Director filter with status: %d\n", 2465 add_fltr->status); 2466 iavf_print_fdir_fltr(adapter, fdir); 2467 list_del(&fdir->list); 2468 kfree(fdir); 2469 adapter->fdir_active_fltr--; 2470 } 2471 } 2472 } 2473 spin_unlock_bh(&adapter->fdir_fltr_lock); 2474 } 2475 break; 2476 case VIRTCHNL_OP_DEL_FDIR_FILTER: { 2477 struct virtchnl_fdir_del *del_fltr = (struct virtchnl_fdir_del *)msg; 2478 struct iavf_fdir_fltr *fdir, *fdir_tmp; 2479 2480 spin_lock_bh(&adapter->fdir_fltr_lock); 2481 list_for_each_entry_safe(fdir, fdir_tmp, &adapter->fdir_list_head, 2482 list) { 2483 if (fdir->state == IAVF_FDIR_FLTR_DEL_PENDING) { 2484 if (del_fltr->status == VIRTCHNL_FDIR_SUCCESS || 2485 del_fltr->status == 2486 VIRTCHNL_FDIR_FAILURE_RULE_NONEXIST) { 2487 dev_info(&adapter->pdev->dev, "Flow Director filter with location %u is deleted\n", 2488 fdir->loc); 2489 list_del(&fdir->list); 2490 kfree(fdir); 2491 adapter->fdir_active_fltr--; 2492 } else { 2493 fdir->state = IAVF_FDIR_FLTR_ACTIVE; 2494 dev_info(&adapter->pdev->dev, "Failed to delete Flow Director filter with status: %d\n", 2495 del_fltr->status); 2496 iavf_print_fdir_fltr(adapter, fdir); 2497 } 2498 } else if (fdir->state == IAVF_FDIR_FLTR_DIS_PENDING) { 2499 if (del_fltr->status == VIRTCHNL_FDIR_SUCCESS || 2500 del_fltr->status == 2501 VIRTCHNL_FDIR_FAILURE_RULE_NONEXIST) { 2502 fdir->state = IAVF_FDIR_FLTR_INACTIVE; 2503 } else { 2504 fdir->state = IAVF_FDIR_FLTR_ACTIVE; 2505 dev_info(&adapter->pdev->dev, "Failed to disable Flow Director filter with status: %d\n", 2506 del_fltr->status); 2507 iavf_print_fdir_fltr(adapter, fdir); 2508 } 2509 } 2510 } 2511 spin_unlock_bh(&adapter->fdir_fltr_lock); 2512 } 2513 break; 2514 case VIRTCHNL_OP_ADD_RSS_CFG: { 2515 struct iavf_adv_rss *rss; 2516 2517 spin_lock_bh(&adapter->adv_rss_lock); 2518 list_for_each_entry(rss, &adapter->adv_rss_list_head, list) { 2519 if (rss->state == IAVF_ADV_RSS_ADD_PENDING) { 2520 iavf_print_adv_rss_cfg(adapter, rss, 2521 "Input set change for", 2522 "successful"); 2523 rss->state = IAVF_ADV_RSS_ACTIVE; 2524 } 2525 } 2526 spin_unlock_bh(&adapter->adv_rss_lock); 2527 } 2528 break; 2529 case VIRTCHNL_OP_DEL_RSS_CFG: { 2530 struct iavf_adv_rss *rss, *rss_tmp; 2531 2532 spin_lock_bh(&adapter->adv_rss_lock); 2533 list_for_each_entry_safe(rss, rss_tmp, 2534 &adapter->adv_rss_list_head, list) { 2535 if (rss->state == IAVF_ADV_RSS_DEL_PENDING) { 2536 list_del(&rss->list); 2537 kfree(rss); 2538 } 2539 } 2540 spin_unlock_bh(&adapter->adv_rss_lock); 2541 } 2542 break; 2543 case VIRTCHNL_OP_ADD_VLAN_V2: { 2544 struct iavf_vlan_filter *f; 2545 2546 spin_lock_bh(&adapter->mac_vlan_list_lock); 2547 list_for_each_entry(f, &adapter->vlan_filter_list, list) { 2548 if (f->state == IAVF_VLAN_IS_NEW) 2549 f->state = IAVF_VLAN_ACTIVE; 2550 } 2551 spin_unlock_bh(&adapter->mac_vlan_list_lock); 2552 } 2553 break; 2554 case VIRTCHNL_OP_ENABLE_VLAN_STRIPPING: 2555 /* PF enabled vlan strip on this VF. 2556 * Update netdev->features if needed to be in sync with ethtool. 2557 */ 2558 if (!v_retval) 2559 iavf_netdev_features_vlan_strip_set(netdev, true); 2560 break; 2561 case VIRTCHNL_OP_DISABLE_VLAN_STRIPPING: 2562 /* PF disabled vlan strip on this VF. 2563 * Update netdev->features if needed to be in sync with ethtool. 2564 */ 2565 if (!v_retval) 2566 iavf_netdev_features_vlan_strip_set(netdev, false); 2567 break; 2568 default: 2569 if (adapter->current_op && (v_opcode != adapter->current_op)) 2570 dev_warn(&adapter->pdev->dev, "Expected response %d from PF, received %d\n", 2571 adapter->current_op, v_opcode); 2572 break; 2573 } /* switch v_opcode */ 2574 adapter->current_op = VIRTCHNL_OP_UNKNOWN; 2575 } 2576