1 // SPDX-License-Identifier: GPL-2.0-only 2 /* Copyright (C) 2023 Intel Corporation */ 3 4 #include "idpf.h" 5 #include "idpf_virtchnl.h" 6 7 static const struct net_device_ops idpf_netdev_ops; 8 9 /** 10 * idpf_init_vector_stack - Fill the MSIX vector stack with vector index 11 * @adapter: private data struct 12 * 13 * Return 0 on success, error on failure 14 */ 15 static int idpf_init_vector_stack(struct idpf_adapter *adapter) 16 { 17 struct idpf_vector_lifo *stack; 18 u16 min_vec; 19 u32 i; 20 21 mutex_lock(&adapter->vector_lock); 22 min_vec = adapter->num_msix_entries - adapter->num_avail_msix; 23 stack = &adapter->vector_stack; 24 stack->size = adapter->num_msix_entries; 25 /* set the base and top to point at start of the 'free pool' to 26 * distribute the unused vectors on-demand basis 27 */ 28 stack->base = min_vec; 29 stack->top = min_vec; 30 31 stack->vec_idx = kcalloc(stack->size, sizeof(u16), GFP_KERNEL); 32 if (!stack->vec_idx) { 33 mutex_unlock(&adapter->vector_lock); 34 35 return -ENOMEM; 36 } 37 38 for (i = 0; i < stack->size; i++) 39 stack->vec_idx[i] = i; 40 41 mutex_unlock(&adapter->vector_lock); 42 43 return 0; 44 } 45 46 /** 47 * idpf_deinit_vector_stack - zero out the MSIX vector stack 48 * @adapter: private data struct 49 */ 50 static void idpf_deinit_vector_stack(struct idpf_adapter *adapter) 51 { 52 struct idpf_vector_lifo *stack; 53 54 mutex_lock(&adapter->vector_lock); 55 stack = &adapter->vector_stack; 56 kfree(stack->vec_idx); 57 stack->vec_idx = NULL; 58 mutex_unlock(&adapter->vector_lock); 59 } 60 61 /** 62 * idpf_mb_intr_rel_irq - Free the IRQ association with the OS 63 * @adapter: adapter structure 64 * 65 * This will also disable interrupt mode and queue up mailbox task. Mailbox 66 * task will reschedule itself if not in interrupt mode. 67 */ 68 static void idpf_mb_intr_rel_irq(struct idpf_adapter *adapter) 69 { 70 clear_bit(IDPF_MB_INTR_MODE, adapter->flags); 71 kfree(free_irq(adapter->msix_entries[0].vector, adapter)); 72 queue_delayed_work(adapter->mbx_wq, &adapter->mbx_task, 0); 73 } 74 75 /** 76 * idpf_intr_rel - Release interrupt capabilities and free memory 77 * @adapter: adapter to disable interrupts on 78 */ 79 void idpf_intr_rel(struct idpf_adapter *adapter) 80 { 81 if (!adapter->msix_entries) 82 return; 83 84 idpf_mb_intr_rel_irq(adapter); 85 pci_free_irq_vectors(adapter->pdev); 86 idpf_send_dealloc_vectors_msg(adapter); 87 idpf_deinit_vector_stack(adapter); 88 kfree(adapter->msix_entries); 89 adapter->msix_entries = NULL; 90 } 91 92 /** 93 * idpf_mb_intr_clean - Interrupt handler for the mailbox 94 * @irq: interrupt number 95 * @data: pointer to the adapter structure 96 */ 97 static irqreturn_t idpf_mb_intr_clean(int __always_unused irq, void *data) 98 { 99 struct idpf_adapter *adapter = (struct idpf_adapter *)data; 100 101 queue_delayed_work(adapter->mbx_wq, &adapter->mbx_task, 0); 102 103 return IRQ_HANDLED; 104 } 105 106 /** 107 * idpf_mb_irq_enable - Enable MSIX interrupt for the mailbox 108 * @adapter: adapter to get the hardware address for register write 109 */ 110 static void idpf_mb_irq_enable(struct idpf_adapter *adapter) 111 { 112 struct idpf_intr_reg *intr = &adapter->mb_vector.intr_reg; 113 u32 val; 114 115 val = intr->dyn_ctl_intena_m | intr->dyn_ctl_itridx_m; 116 writel(val, intr->dyn_ctl); 117 writel(intr->icr_ena_ctlq_m, intr->icr_ena); 118 } 119 120 /** 121 * idpf_mb_intr_req_irq - Request irq for the mailbox interrupt 122 * @adapter: adapter structure to pass to the mailbox irq handler 123 */ 124 static int idpf_mb_intr_req_irq(struct idpf_adapter *adapter) 125 { 126 int irq_num, mb_vidx = 0, err; 127 char *name; 128 129 irq_num = adapter->msix_entries[mb_vidx].vector; 130 name = kasprintf(GFP_KERNEL, "%s-%s-%d", 131 dev_driver_string(&adapter->pdev->dev), 132 "Mailbox", mb_vidx); 133 err = request_irq(irq_num, adapter->irq_mb_handler, 0, name, adapter); 134 if (err) { 135 dev_err(&adapter->pdev->dev, 136 "IRQ request for mailbox failed, error: %d\n", err); 137 138 return err; 139 } 140 141 set_bit(IDPF_MB_INTR_MODE, adapter->flags); 142 143 return 0; 144 } 145 146 /** 147 * idpf_set_mb_vec_id - Set vector index for mailbox 148 * @adapter: adapter structure to access the vector chunks 149 * 150 * The first vector id in the requested vector chunks from the CP is for 151 * the mailbox 152 */ 153 static void idpf_set_mb_vec_id(struct idpf_adapter *adapter) 154 { 155 if (adapter->req_vec_chunks) 156 adapter->mb_vector.v_idx = 157 le16_to_cpu(adapter->caps.mailbox_vector_id); 158 else 159 adapter->mb_vector.v_idx = 0; 160 } 161 162 /** 163 * idpf_mb_intr_init - Initialize the mailbox interrupt 164 * @adapter: adapter structure to store the mailbox vector 165 */ 166 static int idpf_mb_intr_init(struct idpf_adapter *adapter) 167 { 168 adapter->dev_ops.reg_ops.mb_intr_reg_init(adapter); 169 adapter->irq_mb_handler = idpf_mb_intr_clean; 170 171 return idpf_mb_intr_req_irq(adapter); 172 } 173 174 /** 175 * idpf_vector_lifo_push - push MSIX vector index onto stack 176 * @adapter: private data struct 177 * @vec_idx: vector index to store 178 */ 179 static int idpf_vector_lifo_push(struct idpf_adapter *adapter, u16 vec_idx) 180 { 181 struct idpf_vector_lifo *stack = &adapter->vector_stack; 182 183 lockdep_assert_held(&adapter->vector_lock); 184 185 if (stack->top == stack->base) { 186 dev_err(&adapter->pdev->dev, "Exceeded the vector stack limit: %d\n", 187 stack->top); 188 return -EINVAL; 189 } 190 191 stack->vec_idx[--stack->top] = vec_idx; 192 193 return 0; 194 } 195 196 /** 197 * idpf_vector_lifo_pop - pop MSIX vector index from stack 198 * @adapter: private data struct 199 */ 200 static int idpf_vector_lifo_pop(struct idpf_adapter *adapter) 201 { 202 struct idpf_vector_lifo *stack = &adapter->vector_stack; 203 204 lockdep_assert_held(&adapter->vector_lock); 205 206 if (stack->top == stack->size) { 207 dev_err(&adapter->pdev->dev, "No interrupt vectors are available to distribute!\n"); 208 209 return -EINVAL; 210 } 211 212 return stack->vec_idx[stack->top++]; 213 } 214 215 /** 216 * idpf_vector_stash - Store the vector indexes onto the stack 217 * @adapter: private data struct 218 * @q_vector_idxs: vector index array 219 * @vec_info: info related to the number of vectors 220 * 221 * This function is a no-op if there are no vectors indexes to be stashed 222 */ 223 static void idpf_vector_stash(struct idpf_adapter *adapter, u16 *q_vector_idxs, 224 struct idpf_vector_info *vec_info) 225 { 226 int i, base = 0; 227 u16 vec_idx; 228 229 lockdep_assert_held(&adapter->vector_lock); 230 231 if (!vec_info->num_curr_vecs) 232 return; 233 234 /* For default vports, no need to stash vector allocated from the 235 * default pool onto the stack 236 */ 237 if (vec_info->default_vport) 238 base = IDPF_MIN_Q_VEC; 239 240 for (i = vec_info->num_curr_vecs - 1; i >= base ; i--) { 241 vec_idx = q_vector_idxs[i]; 242 idpf_vector_lifo_push(adapter, vec_idx); 243 adapter->num_avail_msix++; 244 } 245 } 246 247 /** 248 * idpf_req_rel_vector_indexes - Request or release MSIX vector indexes 249 * @adapter: driver specific private structure 250 * @q_vector_idxs: vector index array 251 * @vec_info: info related to the number of vectors 252 * 253 * This is the core function to distribute the MSIX vectors acquired from the 254 * OS. It expects the caller to pass the number of vectors required and 255 * also previously allocated. First, it stashes previously allocated vector 256 * indexes on to the stack and then figures out if it can allocate requested 257 * vectors. It can wait on acquiring the mutex lock. If the caller passes 0 as 258 * requested vectors, then this function just stashes the already allocated 259 * vectors and returns 0. 260 * 261 * Returns actual number of vectors allocated on success, error value on failure 262 * If 0 is returned, implies the stack has no vectors to allocate which is also 263 * a failure case for the caller 264 */ 265 int idpf_req_rel_vector_indexes(struct idpf_adapter *adapter, 266 u16 *q_vector_idxs, 267 struct idpf_vector_info *vec_info) 268 { 269 u16 num_req_vecs, num_alloc_vecs = 0, max_vecs; 270 struct idpf_vector_lifo *stack; 271 int i, j, vecid; 272 273 mutex_lock(&adapter->vector_lock); 274 stack = &adapter->vector_stack; 275 num_req_vecs = vec_info->num_req_vecs; 276 277 /* Stash interrupt vector indexes onto the stack if required */ 278 idpf_vector_stash(adapter, q_vector_idxs, vec_info); 279 280 if (!num_req_vecs) 281 goto rel_lock; 282 283 if (vec_info->default_vport) { 284 /* As IDPF_MIN_Q_VEC per default vport is put aside in the 285 * default pool of the stack, use them for default vports 286 */ 287 j = vec_info->index * IDPF_MIN_Q_VEC + IDPF_MBX_Q_VEC; 288 for (i = 0; i < IDPF_MIN_Q_VEC; i++) { 289 q_vector_idxs[num_alloc_vecs++] = stack->vec_idx[j++]; 290 num_req_vecs--; 291 } 292 } 293 294 /* Find if stack has enough vector to allocate */ 295 max_vecs = min(adapter->num_avail_msix, num_req_vecs); 296 297 for (j = 0; j < max_vecs; j++) { 298 vecid = idpf_vector_lifo_pop(adapter); 299 q_vector_idxs[num_alloc_vecs++] = vecid; 300 } 301 adapter->num_avail_msix -= max_vecs; 302 303 rel_lock: 304 mutex_unlock(&adapter->vector_lock); 305 306 return num_alloc_vecs; 307 } 308 309 /** 310 * idpf_intr_req - Request interrupt capabilities 311 * @adapter: adapter to enable interrupts on 312 * 313 * Returns 0 on success, negative on failure 314 */ 315 int idpf_intr_req(struct idpf_adapter *adapter) 316 { 317 u16 default_vports = idpf_get_default_vports(adapter); 318 int num_q_vecs, total_vecs, num_vec_ids; 319 int min_vectors, v_actual, err; 320 unsigned int vector; 321 u16 *vecids; 322 323 total_vecs = idpf_get_reserved_vecs(adapter); 324 num_q_vecs = total_vecs - IDPF_MBX_Q_VEC; 325 326 err = idpf_send_alloc_vectors_msg(adapter, num_q_vecs); 327 if (err) { 328 dev_err(&adapter->pdev->dev, 329 "Failed to allocate %d vectors: %d\n", num_q_vecs, err); 330 331 return -EAGAIN; 332 } 333 334 min_vectors = IDPF_MBX_Q_VEC + IDPF_MIN_Q_VEC * default_vports; 335 v_actual = pci_alloc_irq_vectors(adapter->pdev, min_vectors, 336 total_vecs, PCI_IRQ_MSIX); 337 if (v_actual < min_vectors) { 338 dev_err(&adapter->pdev->dev, "Failed to allocate MSIX vectors: %d\n", 339 v_actual); 340 err = -EAGAIN; 341 goto send_dealloc_vecs; 342 } 343 344 adapter->msix_entries = kcalloc(v_actual, sizeof(struct msix_entry), 345 GFP_KERNEL); 346 347 if (!adapter->msix_entries) { 348 err = -ENOMEM; 349 goto free_irq; 350 } 351 352 idpf_set_mb_vec_id(adapter); 353 354 vecids = kcalloc(total_vecs, sizeof(u16), GFP_KERNEL); 355 if (!vecids) { 356 err = -ENOMEM; 357 goto free_msix; 358 } 359 360 num_vec_ids = idpf_get_vec_ids(adapter, vecids, total_vecs, 361 &adapter->req_vec_chunks->vchunks); 362 if (num_vec_ids < v_actual) { 363 err = -EINVAL; 364 goto free_vecids; 365 } 366 367 for (vector = 0; vector < v_actual; vector++) { 368 adapter->msix_entries[vector].entry = vecids[vector]; 369 adapter->msix_entries[vector].vector = 370 pci_irq_vector(adapter->pdev, vector); 371 } 372 373 adapter->num_req_msix = total_vecs; 374 adapter->num_msix_entries = v_actual; 375 /* 'num_avail_msix' is used to distribute excess vectors to the vports 376 * after considering the minimum vectors required per each default 377 * vport 378 */ 379 adapter->num_avail_msix = v_actual - min_vectors; 380 381 /* Fill MSIX vector lifo stack with vector indexes */ 382 err = idpf_init_vector_stack(adapter); 383 if (err) 384 goto free_vecids; 385 386 err = idpf_mb_intr_init(adapter); 387 if (err) 388 goto deinit_vec_stack; 389 idpf_mb_irq_enable(adapter); 390 kfree(vecids); 391 392 return 0; 393 394 deinit_vec_stack: 395 idpf_deinit_vector_stack(adapter); 396 free_vecids: 397 kfree(vecids); 398 free_msix: 399 kfree(adapter->msix_entries); 400 adapter->msix_entries = NULL; 401 free_irq: 402 pci_free_irq_vectors(adapter->pdev); 403 send_dealloc_vecs: 404 idpf_send_dealloc_vectors_msg(adapter); 405 406 return err; 407 } 408 409 /** 410 * idpf_find_mac_filter - Search filter list for specific mac filter 411 * @vconfig: Vport config structure 412 * @macaddr: The MAC address 413 * 414 * Returns ptr to the filter object or NULL. Must be called while holding the 415 * mac_filter_list_lock. 416 **/ 417 static struct idpf_mac_filter *idpf_find_mac_filter(struct idpf_vport_config *vconfig, 418 const u8 *macaddr) 419 { 420 struct idpf_mac_filter *f; 421 422 if (!macaddr) 423 return NULL; 424 425 list_for_each_entry(f, &vconfig->user_config.mac_filter_list, list) { 426 if (ether_addr_equal(macaddr, f->macaddr)) 427 return f; 428 } 429 430 return NULL; 431 } 432 433 /** 434 * __idpf_del_mac_filter - Delete a MAC filter from the filter list 435 * @vport_config: Vport config structure 436 * @macaddr: The MAC address 437 * 438 * Returns 0 on success, error value on failure 439 **/ 440 static int __idpf_del_mac_filter(struct idpf_vport_config *vport_config, 441 const u8 *macaddr) 442 { 443 struct idpf_mac_filter *f; 444 445 spin_lock_bh(&vport_config->mac_filter_list_lock); 446 f = idpf_find_mac_filter(vport_config, macaddr); 447 if (f) { 448 list_del(&f->list); 449 kfree(f); 450 } 451 spin_unlock_bh(&vport_config->mac_filter_list_lock); 452 453 return 0; 454 } 455 456 /** 457 * idpf_del_mac_filter - Delete a MAC filter from the filter list 458 * @vport: Main vport structure 459 * @np: Netdev private structure 460 * @macaddr: The MAC address 461 * @async: Don't wait for return message 462 * 463 * Removes filter from list and if interface is up, tells hardware about the 464 * removed filter. 465 **/ 466 static int idpf_del_mac_filter(struct idpf_vport *vport, 467 struct idpf_netdev_priv *np, 468 const u8 *macaddr, bool async) 469 { 470 struct idpf_vport_config *vport_config; 471 struct idpf_mac_filter *f; 472 473 vport_config = np->adapter->vport_config[np->vport_idx]; 474 475 spin_lock_bh(&vport_config->mac_filter_list_lock); 476 f = idpf_find_mac_filter(vport_config, macaddr); 477 if (f) { 478 f->remove = true; 479 } else { 480 spin_unlock_bh(&vport_config->mac_filter_list_lock); 481 482 return -EINVAL; 483 } 484 spin_unlock_bh(&vport_config->mac_filter_list_lock); 485 486 if (np->state == __IDPF_VPORT_UP) { 487 int err; 488 489 err = idpf_add_del_mac_filters(vport, np, false, async); 490 if (err) 491 return err; 492 } 493 494 return __idpf_del_mac_filter(vport_config, macaddr); 495 } 496 497 /** 498 * __idpf_add_mac_filter - Add mac filter helper function 499 * @vport_config: Vport config structure 500 * @macaddr: Address to add 501 * 502 * Takes mac_filter_list_lock spinlock to add new filter to list. 503 */ 504 static int __idpf_add_mac_filter(struct idpf_vport_config *vport_config, 505 const u8 *macaddr) 506 { 507 struct idpf_mac_filter *f; 508 509 spin_lock_bh(&vport_config->mac_filter_list_lock); 510 511 f = idpf_find_mac_filter(vport_config, macaddr); 512 if (f) { 513 f->remove = false; 514 spin_unlock_bh(&vport_config->mac_filter_list_lock); 515 516 return 0; 517 } 518 519 f = kzalloc(sizeof(*f), GFP_ATOMIC); 520 if (!f) { 521 spin_unlock_bh(&vport_config->mac_filter_list_lock); 522 523 return -ENOMEM; 524 } 525 526 ether_addr_copy(f->macaddr, macaddr); 527 list_add_tail(&f->list, &vport_config->user_config.mac_filter_list); 528 f->add = true; 529 530 spin_unlock_bh(&vport_config->mac_filter_list_lock); 531 532 return 0; 533 } 534 535 /** 536 * idpf_add_mac_filter - Add a mac filter to the filter list 537 * @vport: Main vport structure 538 * @np: Netdev private structure 539 * @macaddr: The MAC address 540 * @async: Don't wait for return message 541 * 542 * Returns 0 on success or error on failure. If interface is up, we'll also 543 * send the virtchnl message to tell hardware about the filter. 544 **/ 545 static int idpf_add_mac_filter(struct idpf_vport *vport, 546 struct idpf_netdev_priv *np, 547 const u8 *macaddr, bool async) 548 { 549 struct idpf_vport_config *vport_config; 550 int err; 551 552 vport_config = np->adapter->vport_config[np->vport_idx]; 553 err = __idpf_add_mac_filter(vport_config, macaddr); 554 if (err) 555 return err; 556 557 if (np->state == __IDPF_VPORT_UP) 558 err = idpf_add_del_mac_filters(vport, np, true, async); 559 560 return err; 561 } 562 563 /** 564 * idpf_del_all_mac_filters - Delete all MAC filters in list 565 * @vport: main vport struct 566 * 567 * Takes mac_filter_list_lock spinlock. Deletes all filters 568 */ 569 static void idpf_del_all_mac_filters(struct idpf_vport *vport) 570 { 571 struct idpf_vport_config *vport_config; 572 struct idpf_mac_filter *f, *ftmp; 573 574 vport_config = vport->adapter->vport_config[vport->idx]; 575 spin_lock_bh(&vport_config->mac_filter_list_lock); 576 577 list_for_each_entry_safe(f, ftmp, &vport_config->user_config.mac_filter_list, 578 list) { 579 list_del(&f->list); 580 kfree(f); 581 } 582 583 spin_unlock_bh(&vport_config->mac_filter_list_lock); 584 } 585 586 /** 587 * idpf_restore_mac_filters - Re-add all MAC filters in list 588 * @vport: main vport struct 589 * 590 * Takes mac_filter_list_lock spinlock. Sets add field to true for filters to 591 * resync filters back to HW. 592 */ 593 static void idpf_restore_mac_filters(struct idpf_vport *vport) 594 { 595 struct idpf_vport_config *vport_config; 596 struct idpf_mac_filter *f; 597 598 vport_config = vport->adapter->vport_config[vport->idx]; 599 spin_lock_bh(&vport_config->mac_filter_list_lock); 600 601 list_for_each_entry(f, &vport_config->user_config.mac_filter_list, list) 602 f->add = true; 603 604 spin_unlock_bh(&vport_config->mac_filter_list_lock); 605 606 idpf_add_del_mac_filters(vport, netdev_priv(vport->netdev), 607 true, false); 608 } 609 610 /** 611 * idpf_remove_mac_filters - Remove all MAC filters in list 612 * @vport: main vport struct 613 * 614 * Takes mac_filter_list_lock spinlock. Sets remove field to true for filters 615 * to remove filters in HW. 616 */ 617 static void idpf_remove_mac_filters(struct idpf_vport *vport) 618 { 619 struct idpf_vport_config *vport_config; 620 struct idpf_mac_filter *f; 621 622 vport_config = vport->adapter->vport_config[vport->idx]; 623 spin_lock_bh(&vport_config->mac_filter_list_lock); 624 625 list_for_each_entry(f, &vport_config->user_config.mac_filter_list, list) 626 f->remove = true; 627 628 spin_unlock_bh(&vport_config->mac_filter_list_lock); 629 630 idpf_add_del_mac_filters(vport, netdev_priv(vport->netdev), 631 false, false); 632 } 633 634 /** 635 * idpf_deinit_mac_addr - deinitialize mac address for vport 636 * @vport: main vport structure 637 */ 638 static void idpf_deinit_mac_addr(struct idpf_vport *vport) 639 { 640 struct idpf_vport_config *vport_config; 641 struct idpf_mac_filter *f; 642 643 vport_config = vport->adapter->vport_config[vport->idx]; 644 645 spin_lock_bh(&vport_config->mac_filter_list_lock); 646 647 f = idpf_find_mac_filter(vport_config, vport->default_mac_addr); 648 if (f) { 649 list_del(&f->list); 650 kfree(f); 651 } 652 653 spin_unlock_bh(&vport_config->mac_filter_list_lock); 654 } 655 656 /** 657 * idpf_init_mac_addr - initialize mac address for vport 658 * @vport: main vport structure 659 * @netdev: pointer to netdev struct associated with this vport 660 */ 661 static int idpf_init_mac_addr(struct idpf_vport *vport, 662 struct net_device *netdev) 663 { 664 struct idpf_netdev_priv *np = netdev_priv(netdev); 665 struct idpf_adapter *adapter = vport->adapter; 666 int err; 667 668 if (is_valid_ether_addr(vport->default_mac_addr)) { 669 eth_hw_addr_set(netdev, vport->default_mac_addr); 670 ether_addr_copy(netdev->perm_addr, vport->default_mac_addr); 671 672 return idpf_add_mac_filter(vport, np, vport->default_mac_addr, 673 false); 674 } 675 676 if (!idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, 677 VIRTCHNL2_CAP_MACFILTER)) { 678 dev_err(&adapter->pdev->dev, 679 "MAC address is not provided and capability is not set\n"); 680 681 return -EINVAL; 682 } 683 684 eth_hw_addr_random(netdev); 685 err = idpf_add_mac_filter(vport, np, netdev->dev_addr, false); 686 if (err) 687 return err; 688 689 dev_info(&adapter->pdev->dev, "Invalid MAC address %pM, using random %pM\n", 690 vport->default_mac_addr, netdev->dev_addr); 691 ether_addr_copy(vport->default_mac_addr, netdev->dev_addr); 692 693 return 0; 694 } 695 696 /** 697 * idpf_cfg_netdev - Allocate, configure and register a netdev 698 * @vport: main vport structure 699 * 700 * Returns 0 on success, negative value on failure. 701 */ 702 static int idpf_cfg_netdev(struct idpf_vport *vport) 703 { 704 struct idpf_adapter *adapter = vport->adapter; 705 struct idpf_vport_config *vport_config; 706 netdev_features_t other_offloads = 0; 707 netdev_features_t csum_offloads = 0; 708 netdev_features_t tso_offloads = 0; 709 netdev_features_t dflt_features; 710 struct idpf_netdev_priv *np; 711 struct net_device *netdev; 712 u16 idx = vport->idx; 713 int err; 714 715 vport_config = adapter->vport_config[idx]; 716 717 /* It's possible we already have a netdev allocated and registered for 718 * this vport 719 */ 720 if (test_bit(IDPF_VPORT_REG_NETDEV, vport_config->flags)) { 721 netdev = adapter->netdevs[idx]; 722 np = netdev_priv(netdev); 723 np->vport = vport; 724 np->vport_idx = vport->idx; 725 np->vport_id = vport->vport_id; 726 vport->netdev = netdev; 727 728 return idpf_init_mac_addr(vport, netdev); 729 } 730 731 netdev = alloc_etherdev_mqs(sizeof(struct idpf_netdev_priv), 732 vport_config->max_q.max_txq, 733 vport_config->max_q.max_rxq); 734 if (!netdev) 735 return -ENOMEM; 736 737 vport->netdev = netdev; 738 np = netdev_priv(netdev); 739 np->vport = vport; 740 np->adapter = adapter; 741 np->vport_idx = vport->idx; 742 np->vport_id = vport->vport_id; 743 744 spin_lock_init(&np->stats_lock); 745 746 err = idpf_init_mac_addr(vport, netdev); 747 if (err) { 748 free_netdev(vport->netdev); 749 vport->netdev = NULL; 750 751 return err; 752 } 753 754 /* assign netdev_ops */ 755 netdev->netdev_ops = &idpf_netdev_ops; 756 757 /* setup watchdog timeout value to be 5 second */ 758 netdev->watchdog_timeo = 5 * HZ; 759 760 netdev->dev_port = idx; 761 762 /* configure default MTU size */ 763 netdev->min_mtu = ETH_MIN_MTU; 764 netdev->max_mtu = vport->max_mtu; 765 766 dflt_features = NETIF_F_SG | 767 NETIF_F_HIGHDMA; 768 769 if (idpf_is_cap_ena_all(adapter, IDPF_RSS_CAPS, IDPF_CAP_RSS)) 770 dflt_features |= NETIF_F_RXHASH; 771 if (idpf_is_cap_ena_all(adapter, IDPF_CSUM_CAPS, IDPF_CAP_TX_CSUM_L4V4)) 772 csum_offloads |= NETIF_F_IP_CSUM; 773 if (idpf_is_cap_ena_all(adapter, IDPF_CSUM_CAPS, IDPF_CAP_TX_CSUM_L4V6)) 774 csum_offloads |= NETIF_F_IPV6_CSUM; 775 if (idpf_is_cap_ena(adapter, IDPF_CSUM_CAPS, IDPF_CAP_RX_CSUM)) 776 csum_offloads |= NETIF_F_RXCSUM; 777 if (idpf_is_cap_ena_all(adapter, IDPF_CSUM_CAPS, IDPF_CAP_TX_SCTP_CSUM)) 778 csum_offloads |= NETIF_F_SCTP_CRC; 779 780 if (idpf_is_cap_ena(adapter, IDPF_SEG_CAPS, VIRTCHNL2_CAP_SEG_IPV4_TCP)) 781 tso_offloads |= NETIF_F_TSO; 782 if (idpf_is_cap_ena(adapter, IDPF_SEG_CAPS, VIRTCHNL2_CAP_SEG_IPV6_TCP)) 783 tso_offloads |= NETIF_F_TSO6; 784 if (idpf_is_cap_ena_all(adapter, IDPF_SEG_CAPS, 785 VIRTCHNL2_CAP_SEG_IPV4_UDP | 786 VIRTCHNL2_CAP_SEG_IPV6_UDP)) 787 tso_offloads |= NETIF_F_GSO_UDP_L4; 788 if (idpf_is_cap_ena_all(adapter, IDPF_RSC_CAPS, IDPF_CAP_RSC)) 789 other_offloads |= NETIF_F_GRO_HW; 790 if (idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_LOOPBACK)) 791 other_offloads |= NETIF_F_LOOPBACK; 792 793 netdev->features |= dflt_features | csum_offloads | tso_offloads; 794 netdev->hw_features |= netdev->features | other_offloads; 795 netdev->vlan_features |= netdev->features | other_offloads; 796 netdev->hw_enc_features |= dflt_features | other_offloads; 797 idpf_set_ethtool_ops(netdev); 798 netif_set_affinity_auto(netdev); 799 SET_NETDEV_DEV(netdev, &adapter->pdev->dev); 800 801 /* carrier off on init to avoid Tx hangs */ 802 netif_carrier_off(netdev); 803 804 /* make sure transmit queues start off as stopped */ 805 netif_tx_stop_all_queues(netdev); 806 807 /* The vport can be arbitrarily released so we need to also track 808 * netdevs in the adapter struct 809 */ 810 adapter->netdevs[idx] = netdev; 811 812 return 0; 813 } 814 815 /** 816 * idpf_get_free_slot - get the next non-NULL location index in array 817 * @adapter: adapter in which to look for a free vport slot 818 */ 819 static int idpf_get_free_slot(struct idpf_adapter *adapter) 820 { 821 unsigned int i; 822 823 for (i = 0; i < adapter->max_vports; i++) { 824 if (!adapter->vports[i]) 825 return i; 826 } 827 828 return IDPF_NO_FREE_SLOT; 829 } 830 831 /** 832 * idpf_remove_features - Turn off feature configs 833 * @vport: virtual port structure 834 */ 835 static void idpf_remove_features(struct idpf_vport *vport) 836 { 837 struct idpf_adapter *adapter = vport->adapter; 838 839 if (idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_MACFILTER)) 840 idpf_remove_mac_filters(vport); 841 } 842 843 /** 844 * idpf_vport_stop - Disable a vport 845 * @vport: vport to disable 846 */ 847 static void idpf_vport_stop(struct idpf_vport *vport) 848 { 849 struct idpf_netdev_priv *np = netdev_priv(vport->netdev); 850 851 if (np->state <= __IDPF_VPORT_DOWN) 852 return; 853 854 netif_carrier_off(vport->netdev); 855 netif_tx_disable(vport->netdev); 856 857 idpf_send_disable_vport_msg(vport); 858 idpf_send_disable_queues_msg(vport); 859 idpf_send_map_unmap_queue_vector_msg(vport, false); 860 /* Normally we ask for queues in create_vport, but if the number of 861 * initially requested queues have changed, for example via ethtool 862 * set channels, we do delete queues and then add the queues back 863 * instead of deleting and reallocating the vport. 864 */ 865 if (test_and_clear_bit(IDPF_VPORT_DEL_QUEUES, vport->flags)) 866 idpf_send_delete_queues_msg(vport); 867 868 idpf_remove_features(vport); 869 870 vport->link_up = false; 871 idpf_vport_intr_deinit(vport); 872 idpf_vport_queues_rel(vport); 873 idpf_vport_intr_rel(vport); 874 np->state = __IDPF_VPORT_DOWN; 875 } 876 877 /** 878 * idpf_stop - Disables a network interface 879 * @netdev: network interface device structure 880 * 881 * The stop entry point is called when an interface is de-activated by the OS, 882 * and the netdevice enters the DOWN state. The hardware is still under the 883 * driver's control, but the netdev interface is disabled. 884 * 885 * Returns success only - not allowed to fail 886 */ 887 static int idpf_stop(struct net_device *netdev) 888 { 889 struct idpf_netdev_priv *np = netdev_priv(netdev); 890 struct idpf_vport *vport; 891 892 if (test_bit(IDPF_REMOVE_IN_PROG, np->adapter->flags)) 893 return 0; 894 895 idpf_vport_ctrl_lock(netdev); 896 vport = idpf_netdev_to_vport(netdev); 897 898 idpf_vport_stop(vport); 899 900 idpf_vport_ctrl_unlock(netdev); 901 902 return 0; 903 } 904 905 /** 906 * idpf_decfg_netdev - Unregister the netdev 907 * @vport: vport for which netdev to be unregistered 908 */ 909 static void idpf_decfg_netdev(struct idpf_vport *vport) 910 { 911 struct idpf_adapter *adapter = vport->adapter; 912 u16 idx = vport->idx; 913 914 kfree(vport->rx_ptype_lkup); 915 vport->rx_ptype_lkup = NULL; 916 917 if (test_and_clear_bit(IDPF_VPORT_REG_NETDEV, 918 adapter->vport_config[idx]->flags)) { 919 unregister_netdev(vport->netdev); 920 free_netdev(vport->netdev); 921 } 922 vport->netdev = NULL; 923 924 adapter->netdevs[idx] = NULL; 925 } 926 927 /** 928 * idpf_vport_rel - Delete a vport and free its resources 929 * @vport: the vport being removed 930 */ 931 static void idpf_vport_rel(struct idpf_vport *vport) 932 { 933 struct idpf_adapter *adapter = vport->adapter; 934 struct idpf_vport_config *vport_config; 935 struct idpf_vector_info vec_info; 936 struct idpf_rss_data *rss_data; 937 struct idpf_vport_max_q max_q; 938 u16 idx = vport->idx; 939 940 vport_config = adapter->vport_config[vport->idx]; 941 idpf_deinit_rss(vport); 942 rss_data = &vport_config->user_config.rss_data; 943 kfree(rss_data->rss_key); 944 rss_data->rss_key = NULL; 945 946 idpf_send_destroy_vport_msg(vport); 947 948 /* Release all max queues allocated to the adapter's pool */ 949 max_q.max_rxq = vport_config->max_q.max_rxq; 950 max_q.max_txq = vport_config->max_q.max_txq; 951 max_q.max_bufq = vport_config->max_q.max_bufq; 952 max_q.max_complq = vport_config->max_q.max_complq; 953 idpf_vport_dealloc_max_qs(adapter, &max_q); 954 955 /* Release all the allocated vectors on the stack */ 956 vec_info.num_req_vecs = 0; 957 vec_info.num_curr_vecs = vport->num_q_vectors; 958 vec_info.default_vport = vport->default_vport; 959 960 idpf_req_rel_vector_indexes(adapter, vport->q_vector_idxs, &vec_info); 961 962 kfree(vport->q_vector_idxs); 963 vport->q_vector_idxs = NULL; 964 965 kfree(adapter->vport_params_recvd[idx]); 966 adapter->vport_params_recvd[idx] = NULL; 967 kfree(adapter->vport_params_reqd[idx]); 968 adapter->vport_params_reqd[idx] = NULL; 969 if (adapter->vport_config[idx]) { 970 kfree(adapter->vport_config[idx]->req_qs_chunks); 971 adapter->vport_config[idx]->req_qs_chunks = NULL; 972 } 973 kfree(vport); 974 adapter->num_alloc_vports--; 975 } 976 977 /** 978 * idpf_vport_dealloc - cleanup and release a given vport 979 * @vport: pointer to idpf vport structure 980 * 981 * returns nothing 982 */ 983 static void idpf_vport_dealloc(struct idpf_vport *vport) 984 { 985 struct idpf_adapter *adapter = vport->adapter; 986 unsigned int i = vport->idx; 987 988 idpf_deinit_mac_addr(vport); 989 idpf_vport_stop(vport); 990 991 if (!test_bit(IDPF_HR_RESET_IN_PROG, adapter->flags)) 992 idpf_decfg_netdev(vport); 993 if (test_bit(IDPF_REMOVE_IN_PROG, adapter->flags)) 994 idpf_del_all_mac_filters(vport); 995 996 if (adapter->netdevs[i]) { 997 struct idpf_netdev_priv *np = netdev_priv(adapter->netdevs[i]); 998 999 np->vport = NULL; 1000 } 1001 1002 idpf_vport_rel(vport); 1003 1004 adapter->vports[i] = NULL; 1005 adapter->next_vport = idpf_get_free_slot(adapter); 1006 } 1007 1008 /** 1009 * idpf_is_hsplit_supported - check whether the header split is supported 1010 * @vport: virtual port to check the capability for 1011 * 1012 * Return: true if it's supported by the HW/FW, false if not. 1013 */ 1014 static bool idpf_is_hsplit_supported(const struct idpf_vport *vport) 1015 { 1016 return idpf_is_queue_model_split(vport->rxq_model) && 1017 idpf_is_cap_ena_all(vport->adapter, IDPF_HSPLIT_CAPS, 1018 IDPF_CAP_HSPLIT); 1019 } 1020 1021 /** 1022 * idpf_vport_get_hsplit - get the current header split feature state 1023 * @vport: virtual port to query the state for 1024 * 1025 * Return: ``ETHTOOL_TCP_DATA_SPLIT_UNKNOWN`` if not supported, 1026 * ``ETHTOOL_TCP_DATA_SPLIT_DISABLED`` if disabled, 1027 * ``ETHTOOL_TCP_DATA_SPLIT_ENABLED`` if active. 1028 */ 1029 u8 idpf_vport_get_hsplit(const struct idpf_vport *vport) 1030 { 1031 const struct idpf_vport_user_config_data *config; 1032 1033 if (!idpf_is_hsplit_supported(vport)) 1034 return ETHTOOL_TCP_DATA_SPLIT_UNKNOWN; 1035 1036 config = &vport->adapter->vport_config[vport->idx]->user_config; 1037 1038 return test_bit(__IDPF_USER_FLAG_HSPLIT, config->user_flags) ? 1039 ETHTOOL_TCP_DATA_SPLIT_ENABLED : 1040 ETHTOOL_TCP_DATA_SPLIT_DISABLED; 1041 } 1042 1043 /** 1044 * idpf_vport_set_hsplit - enable or disable header split on a given vport 1045 * @vport: virtual port to configure 1046 * @val: Ethtool flag controlling the header split state 1047 * 1048 * Return: true on success, false if not supported by the HW. 1049 */ 1050 bool idpf_vport_set_hsplit(const struct idpf_vport *vport, u8 val) 1051 { 1052 struct idpf_vport_user_config_data *config; 1053 1054 if (!idpf_is_hsplit_supported(vport)) 1055 return val == ETHTOOL_TCP_DATA_SPLIT_UNKNOWN; 1056 1057 config = &vport->adapter->vport_config[vport->idx]->user_config; 1058 1059 switch (val) { 1060 case ETHTOOL_TCP_DATA_SPLIT_UNKNOWN: 1061 /* Default is to enable */ 1062 case ETHTOOL_TCP_DATA_SPLIT_ENABLED: 1063 __set_bit(__IDPF_USER_FLAG_HSPLIT, config->user_flags); 1064 return true; 1065 case ETHTOOL_TCP_DATA_SPLIT_DISABLED: 1066 __clear_bit(__IDPF_USER_FLAG_HSPLIT, config->user_flags); 1067 return true; 1068 default: 1069 return false; 1070 } 1071 } 1072 1073 /** 1074 * idpf_vport_alloc - Allocates the next available struct vport in the adapter 1075 * @adapter: board private structure 1076 * @max_q: vport max queue info 1077 * 1078 * returns a pointer to a vport on success, NULL on failure. 1079 */ 1080 static struct idpf_vport *idpf_vport_alloc(struct idpf_adapter *adapter, 1081 struct idpf_vport_max_q *max_q) 1082 { 1083 struct idpf_rss_data *rss_data; 1084 u16 idx = adapter->next_vport; 1085 struct idpf_vport *vport; 1086 u16 num_max_q; 1087 1088 if (idx == IDPF_NO_FREE_SLOT) 1089 return NULL; 1090 1091 vport = kzalloc(sizeof(*vport), GFP_KERNEL); 1092 if (!vport) 1093 return vport; 1094 1095 if (!adapter->vport_config[idx]) { 1096 struct idpf_vport_config *vport_config; 1097 1098 vport_config = kzalloc(sizeof(*vport_config), GFP_KERNEL); 1099 if (!vport_config) { 1100 kfree(vport); 1101 1102 return NULL; 1103 } 1104 1105 adapter->vport_config[idx] = vport_config; 1106 } 1107 1108 vport->idx = idx; 1109 vport->adapter = adapter; 1110 vport->compln_clean_budget = IDPF_TX_COMPLQ_CLEAN_BUDGET; 1111 vport->default_vport = adapter->num_alloc_vports < 1112 idpf_get_default_vports(adapter); 1113 1114 num_max_q = max(max_q->max_txq, max_q->max_rxq); 1115 vport->q_vector_idxs = kcalloc(num_max_q, sizeof(u16), GFP_KERNEL); 1116 if (!vport->q_vector_idxs) 1117 goto free_vport; 1118 1119 idpf_vport_init(vport, max_q); 1120 1121 /* This alloc is done separate from the LUT because it's not strictly 1122 * dependent on how many queues we have. If we change number of queues 1123 * and soft reset we'll need a new LUT but the key can remain the same 1124 * for as long as the vport exists. 1125 */ 1126 rss_data = &adapter->vport_config[idx]->user_config.rss_data; 1127 rss_data->rss_key = kzalloc(rss_data->rss_key_size, GFP_KERNEL); 1128 if (!rss_data->rss_key) 1129 goto free_vector_idxs; 1130 1131 /* Initialize default rss key */ 1132 netdev_rss_key_fill((void *)rss_data->rss_key, rss_data->rss_key_size); 1133 1134 /* fill vport slot in the adapter struct */ 1135 adapter->vports[idx] = vport; 1136 adapter->vport_ids[idx] = idpf_get_vport_id(vport); 1137 1138 adapter->num_alloc_vports++; 1139 /* prepare adapter->next_vport for next use */ 1140 adapter->next_vport = idpf_get_free_slot(adapter); 1141 1142 return vport; 1143 1144 free_vector_idxs: 1145 kfree(vport->q_vector_idxs); 1146 free_vport: 1147 kfree(vport); 1148 1149 return NULL; 1150 } 1151 1152 /** 1153 * idpf_get_stats64 - get statistics for network device structure 1154 * @netdev: network interface device structure 1155 * @stats: main device statistics structure 1156 */ 1157 static void idpf_get_stats64(struct net_device *netdev, 1158 struct rtnl_link_stats64 *stats) 1159 { 1160 struct idpf_netdev_priv *np = netdev_priv(netdev); 1161 1162 spin_lock_bh(&np->stats_lock); 1163 *stats = np->netstats; 1164 spin_unlock_bh(&np->stats_lock); 1165 } 1166 1167 /** 1168 * idpf_statistics_task - Delayed task to get statistics over mailbox 1169 * @work: work_struct handle to our data 1170 */ 1171 void idpf_statistics_task(struct work_struct *work) 1172 { 1173 struct idpf_adapter *adapter; 1174 int i; 1175 1176 adapter = container_of(work, struct idpf_adapter, stats_task.work); 1177 1178 for (i = 0; i < adapter->max_vports; i++) { 1179 struct idpf_vport *vport = adapter->vports[i]; 1180 1181 if (vport && !test_bit(IDPF_HR_RESET_IN_PROG, adapter->flags)) 1182 idpf_send_get_stats_msg(vport); 1183 } 1184 1185 queue_delayed_work(adapter->stats_wq, &adapter->stats_task, 1186 msecs_to_jiffies(10000)); 1187 } 1188 1189 /** 1190 * idpf_mbx_task - Delayed task to handle mailbox responses 1191 * @work: work_struct handle 1192 */ 1193 void idpf_mbx_task(struct work_struct *work) 1194 { 1195 struct idpf_adapter *adapter; 1196 1197 adapter = container_of(work, struct idpf_adapter, mbx_task.work); 1198 1199 if (test_bit(IDPF_MB_INTR_MODE, adapter->flags)) 1200 idpf_mb_irq_enable(adapter); 1201 else 1202 queue_delayed_work(adapter->mbx_wq, &adapter->mbx_task, 1203 msecs_to_jiffies(300)); 1204 1205 idpf_recv_mb_msg(adapter); 1206 } 1207 1208 /** 1209 * idpf_service_task - Delayed task for handling mailbox responses 1210 * @work: work_struct handle to our data 1211 * 1212 */ 1213 void idpf_service_task(struct work_struct *work) 1214 { 1215 struct idpf_adapter *adapter; 1216 1217 adapter = container_of(work, struct idpf_adapter, serv_task.work); 1218 1219 if (idpf_is_reset_detected(adapter) && 1220 !idpf_is_reset_in_prog(adapter) && 1221 !test_bit(IDPF_REMOVE_IN_PROG, adapter->flags)) { 1222 dev_info(&adapter->pdev->dev, "HW reset detected\n"); 1223 set_bit(IDPF_HR_FUNC_RESET, adapter->flags); 1224 queue_delayed_work(adapter->vc_event_wq, 1225 &adapter->vc_event_task, 1226 msecs_to_jiffies(10)); 1227 } 1228 1229 queue_delayed_work(adapter->serv_wq, &adapter->serv_task, 1230 msecs_to_jiffies(300)); 1231 } 1232 1233 /** 1234 * idpf_restore_features - Restore feature configs 1235 * @vport: virtual port structure 1236 */ 1237 static void idpf_restore_features(struct idpf_vport *vport) 1238 { 1239 struct idpf_adapter *adapter = vport->adapter; 1240 1241 if (idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_MACFILTER)) 1242 idpf_restore_mac_filters(vport); 1243 } 1244 1245 /** 1246 * idpf_set_real_num_queues - set number of queues for netdev 1247 * @vport: virtual port structure 1248 * 1249 * Returns 0 on success, negative on failure. 1250 */ 1251 static int idpf_set_real_num_queues(struct idpf_vport *vport) 1252 { 1253 int err; 1254 1255 err = netif_set_real_num_rx_queues(vport->netdev, vport->num_rxq); 1256 if (err) 1257 return err; 1258 1259 return netif_set_real_num_tx_queues(vport->netdev, vport->num_txq); 1260 } 1261 1262 /** 1263 * idpf_up_complete - Complete interface up sequence 1264 * @vport: virtual port structure 1265 * 1266 * Returns 0 on success, negative on failure. 1267 */ 1268 static int idpf_up_complete(struct idpf_vport *vport) 1269 { 1270 struct idpf_netdev_priv *np = netdev_priv(vport->netdev); 1271 1272 if (vport->link_up && !netif_carrier_ok(vport->netdev)) { 1273 netif_carrier_on(vport->netdev); 1274 netif_tx_start_all_queues(vport->netdev); 1275 } 1276 1277 np->state = __IDPF_VPORT_UP; 1278 1279 return 0; 1280 } 1281 1282 /** 1283 * idpf_rx_init_buf_tail - Write initial buffer ring tail value 1284 * @vport: virtual port struct 1285 */ 1286 static void idpf_rx_init_buf_tail(struct idpf_vport *vport) 1287 { 1288 int i, j; 1289 1290 for (i = 0; i < vport->num_rxq_grp; i++) { 1291 struct idpf_rxq_group *grp = &vport->rxq_grps[i]; 1292 1293 if (idpf_is_queue_model_split(vport->rxq_model)) { 1294 for (j = 0; j < vport->num_bufqs_per_qgrp; j++) { 1295 const struct idpf_buf_queue *q = 1296 &grp->splitq.bufq_sets[j].bufq; 1297 1298 writel(q->next_to_alloc, q->tail); 1299 } 1300 } else { 1301 for (j = 0; j < grp->singleq.num_rxq; j++) { 1302 const struct idpf_rx_queue *q = 1303 grp->singleq.rxqs[j]; 1304 1305 writel(q->next_to_alloc, q->tail); 1306 } 1307 } 1308 } 1309 } 1310 1311 /** 1312 * idpf_vport_open - Bring up a vport 1313 * @vport: vport to bring up 1314 */ 1315 static int idpf_vport_open(struct idpf_vport *vport) 1316 { 1317 struct idpf_netdev_priv *np = netdev_priv(vport->netdev); 1318 struct idpf_adapter *adapter = vport->adapter; 1319 struct idpf_vport_config *vport_config; 1320 int err; 1321 1322 if (np->state != __IDPF_VPORT_DOWN) 1323 return -EBUSY; 1324 1325 /* we do not allow interface up just yet */ 1326 netif_carrier_off(vport->netdev); 1327 1328 err = idpf_vport_intr_alloc(vport); 1329 if (err) { 1330 dev_err(&adapter->pdev->dev, "Failed to allocate interrupts for vport %u: %d\n", 1331 vport->vport_id, err); 1332 return err; 1333 } 1334 1335 err = idpf_vport_queues_alloc(vport); 1336 if (err) 1337 goto intr_rel; 1338 1339 err = idpf_vport_queue_ids_init(vport); 1340 if (err) { 1341 dev_err(&adapter->pdev->dev, "Failed to initialize queue ids for vport %u: %d\n", 1342 vport->vport_id, err); 1343 goto queues_rel; 1344 } 1345 1346 err = idpf_vport_intr_init(vport); 1347 if (err) { 1348 dev_err(&adapter->pdev->dev, "Failed to initialize interrupts for vport %u: %d\n", 1349 vport->vport_id, err); 1350 goto queues_rel; 1351 } 1352 1353 err = idpf_rx_bufs_init_all(vport); 1354 if (err) { 1355 dev_err(&adapter->pdev->dev, "Failed to initialize RX buffers for vport %u: %d\n", 1356 vport->vport_id, err); 1357 goto queues_rel; 1358 } 1359 1360 err = idpf_queue_reg_init(vport); 1361 if (err) { 1362 dev_err(&adapter->pdev->dev, "Failed to initialize queue registers for vport %u: %d\n", 1363 vport->vport_id, err); 1364 goto queues_rel; 1365 } 1366 1367 idpf_rx_init_buf_tail(vport); 1368 idpf_vport_intr_ena(vport); 1369 1370 err = idpf_send_config_queues_msg(vport); 1371 if (err) { 1372 dev_err(&adapter->pdev->dev, "Failed to configure queues for vport %u, %d\n", 1373 vport->vport_id, err); 1374 goto intr_deinit; 1375 } 1376 1377 err = idpf_send_map_unmap_queue_vector_msg(vport, true); 1378 if (err) { 1379 dev_err(&adapter->pdev->dev, "Failed to map queue vectors for vport %u: %d\n", 1380 vport->vport_id, err); 1381 goto intr_deinit; 1382 } 1383 1384 err = idpf_send_enable_queues_msg(vport); 1385 if (err) { 1386 dev_err(&adapter->pdev->dev, "Failed to enable queues for vport %u: %d\n", 1387 vport->vport_id, err); 1388 goto unmap_queue_vectors; 1389 } 1390 1391 err = idpf_send_enable_vport_msg(vport); 1392 if (err) { 1393 dev_err(&adapter->pdev->dev, "Failed to enable vport %u: %d\n", 1394 vport->vport_id, err); 1395 err = -EAGAIN; 1396 goto disable_queues; 1397 } 1398 1399 idpf_restore_features(vport); 1400 1401 vport_config = adapter->vport_config[vport->idx]; 1402 if (vport_config->user_config.rss_data.rss_lut) 1403 err = idpf_config_rss(vport); 1404 else 1405 err = idpf_init_rss(vport); 1406 if (err) { 1407 dev_err(&adapter->pdev->dev, "Failed to initialize RSS for vport %u: %d\n", 1408 vport->vport_id, err); 1409 goto disable_vport; 1410 } 1411 1412 err = idpf_up_complete(vport); 1413 if (err) { 1414 dev_err(&adapter->pdev->dev, "Failed to complete interface up for vport %u: %d\n", 1415 vport->vport_id, err); 1416 goto deinit_rss; 1417 } 1418 1419 return 0; 1420 1421 deinit_rss: 1422 idpf_deinit_rss(vport); 1423 disable_vport: 1424 idpf_send_disable_vport_msg(vport); 1425 disable_queues: 1426 idpf_send_disable_queues_msg(vport); 1427 unmap_queue_vectors: 1428 idpf_send_map_unmap_queue_vector_msg(vport, false); 1429 intr_deinit: 1430 idpf_vport_intr_deinit(vport); 1431 queues_rel: 1432 idpf_vport_queues_rel(vport); 1433 intr_rel: 1434 idpf_vport_intr_rel(vport); 1435 1436 return err; 1437 } 1438 1439 /** 1440 * idpf_init_task - Delayed initialization task 1441 * @work: work_struct handle to our data 1442 * 1443 * Init task finishes up pending work started in probe. Due to the asynchronous 1444 * nature in which the device communicates with hardware, we may have to wait 1445 * several milliseconds to get a response. Instead of busy polling in probe, 1446 * pulling it out into a delayed work task prevents us from bogging down the 1447 * whole system waiting for a response from hardware. 1448 */ 1449 void idpf_init_task(struct work_struct *work) 1450 { 1451 struct idpf_vport_config *vport_config; 1452 struct idpf_vport_max_q max_q; 1453 struct idpf_adapter *adapter; 1454 struct idpf_netdev_priv *np; 1455 struct idpf_vport *vport; 1456 u16 num_default_vports; 1457 struct pci_dev *pdev; 1458 bool default_vport; 1459 int index, err; 1460 1461 adapter = container_of(work, struct idpf_adapter, init_task.work); 1462 1463 num_default_vports = idpf_get_default_vports(adapter); 1464 if (adapter->num_alloc_vports < num_default_vports) 1465 default_vport = true; 1466 else 1467 default_vport = false; 1468 1469 err = idpf_vport_alloc_max_qs(adapter, &max_q); 1470 if (err) 1471 goto unwind_vports; 1472 1473 err = idpf_send_create_vport_msg(adapter, &max_q); 1474 if (err) { 1475 idpf_vport_dealloc_max_qs(adapter, &max_q); 1476 goto unwind_vports; 1477 } 1478 1479 pdev = adapter->pdev; 1480 vport = idpf_vport_alloc(adapter, &max_q); 1481 if (!vport) { 1482 err = -EFAULT; 1483 dev_err(&pdev->dev, "failed to allocate vport: %d\n", 1484 err); 1485 idpf_vport_dealloc_max_qs(adapter, &max_q); 1486 goto unwind_vports; 1487 } 1488 1489 index = vport->idx; 1490 vport_config = adapter->vport_config[index]; 1491 1492 init_waitqueue_head(&vport->sw_marker_wq); 1493 1494 spin_lock_init(&vport_config->mac_filter_list_lock); 1495 1496 INIT_LIST_HEAD(&vport_config->user_config.mac_filter_list); 1497 1498 err = idpf_check_supported_desc_ids(vport); 1499 if (err) { 1500 dev_err(&pdev->dev, "failed to get required descriptor ids\n"); 1501 goto cfg_netdev_err; 1502 } 1503 1504 if (idpf_cfg_netdev(vport)) 1505 goto cfg_netdev_err; 1506 1507 err = idpf_send_get_rx_ptype_msg(vport); 1508 if (err) 1509 goto handle_err; 1510 1511 /* Once state is put into DOWN, driver is ready for dev_open */ 1512 np = netdev_priv(vport->netdev); 1513 np->state = __IDPF_VPORT_DOWN; 1514 if (test_and_clear_bit(IDPF_VPORT_UP_REQUESTED, vport_config->flags)) 1515 idpf_vport_open(vport); 1516 1517 /* Spawn and return 'idpf_init_task' work queue until all the 1518 * default vports are created 1519 */ 1520 if (adapter->num_alloc_vports < num_default_vports) { 1521 queue_delayed_work(adapter->init_wq, &adapter->init_task, 1522 msecs_to_jiffies(5 * (adapter->pdev->devfn & 0x07))); 1523 1524 return; 1525 } 1526 1527 for (index = 0; index < adapter->max_vports; index++) { 1528 struct net_device *netdev = adapter->netdevs[index]; 1529 struct idpf_vport_config *vport_config; 1530 1531 vport_config = adapter->vport_config[index]; 1532 1533 if (!netdev || 1534 test_bit(IDPF_VPORT_REG_NETDEV, vport_config->flags)) 1535 continue; 1536 1537 err = register_netdev(netdev); 1538 if (err) { 1539 dev_err(&pdev->dev, "failed to register netdev for vport %d: %pe\n", 1540 index, ERR_PTR(err)); 1541 continue; 1542 } 1543 set_bit(IDPF_VPORT_REG_NETDEV, vport_config->flags); 1544 } 1545 1546 /* As all the required vports are created, clear the reset flag 1547 * unconditionally here in case we were in reset and the link was down. 1548 */ 1549 clear_bit(IDPF_HR_RESET_IN_PROG, adapter->flags); 1550 /* Start the statistics task now */ 1551 queue_delayed_work(adapter->stats_wq, &adapter->stats_task, 1552 msecs_to_jiffies(10 * (pdev->devfn & 0x07))); 1553 1554 return; 1555 1556 handle_err: 1557 idpf_decfg_netdev(vport); 1558 cfg_netdev_err: 1559 idpf_vport_rel(vport); 1560 adapter->vports[index] = NULL; 1561 unwind_vports: 1562 if (default_vport) { 1563 for (index = 0; index < adapter->max_vports; index++) { 1564 if (adapter->vports[index]) 1565 idpf_vport_dealloc(adapter->vports[index]); 1566 } 1567 } 1568 clear_bit(IDPF_HR_RESET_IN_PROG, adapter->flags); 1569 } 1570 1571 /** 1572 * idpf_sriov_ena - Enable or change number of VFs 1573 * @adapter: private data struct 1574 * @num_vfs: number of VFs to allocate 1575 */ 1576 static int idpf_sriov_ena(struct idpf_adapter *adapter, int num_vfs) 1577 { 1578 struct device *dev = &adapter->pdev->dev; 1579 int err; 1580 1581 err = idpf_send_set_sriov_vfs_msg(adapter, num_vfs); 1582 if (err) { 1583 dev_err(dev, "Failed to allocate VFs: %d\n", err); 1584 1585 return err; 1586 } 1587 1588 err = pci_enable_sriov(adapter->pdev, num_vfs); 1589 if (err) { 1590 idpf_send_set_sriov_vfs_msg(adapter, 0); 1591 dev_err(dev, "Failed to enable SR-IOV: %d\n", err); 1592 1593 return err; 1594 } 1595 1596 adapter->num_vfs = num_vfs; 1597 1598 return num_vfs; 1599 } 1600 1601 /** 1602 * idpf_sriov_configure - Configure the requested VFs 1603 * @pdev: pointer to a pci_dev structure 1604 * @num_vfs: number of vfs to allocate 1605 * 1606 * Enable or change the number of VFs. Called when the user updates the number 1607 * of VFs in sysfs. 1608 **/ 1609 int idpf_sriov_configure(struct pci_dev *pdev, int num_vfs) 1610 { 1611 struct idpf_adapter *adapter = pci_get_drvdata(pdev); 1612 1613 if (!idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_SRIOV)) { 1614 dev_info(&pdev->dev, "SR-IOV is not supported on this device\n"); 1615 1616 return -EOPNOTSUPP; 1617 } 1618 1619 if (num_vfs) 1620 return idpf_sriov_ena(adapter, num_vfs); 1621 1622 if (pci_vfs_assigned(pdev)) { 1623 dev_warn(&pdev->dev, "Unable to free VFs because some are assigned to VMs\n"); 1624 1625 return -EBUSY; 1626 } 1627 1628 pci_disable_sriov(adapter->pdev); 1629 idpf_send_set_sriov_vfs_msg(adapter, 0); 1630 adapter->num_vfs = 0; 1631 1632 return 0; 1633 } 1634 1635 /** 1636 * idpf_deinit_task - Device deinit routine 1637 * @adapter: Driver specific private structure 1638 * 1639 * Extended remove logic which will be used for 1640 * hard reset as well 1641 */ 1642 void idpf_deinit_task(struct idpf_adapter *adapter) 1643 { 1644 unsigned int i; 1645 1646 /* Wait until the init_task is done else this thread might release 1647 * the resources first and the other thread might end up in a bad state 1648 */ 1649 cancel_delayed_work_sync(&adapter->init_task); 1650 1651 if (!adapter->vports) 1652 return; 1653 1654 cancel_delayed_work_sync(&adapter->stats_task); 1655 1656 for (i = 0; i < adapter->max_vports; i++) { 1657 if (adapter->vports[i]) 1658 idpf_vport_dealloc(adapter->vports[i]); 1659 } 1660 } 1661 1662 /** 1663 * idpf_check_reset_complete - check that reset is complete 1664 * @hw: pointer to hw struct 1665 * @reset_reg: struct with reset registers 1666 * 1667 * Returns 0 if device is ready to use, or -EBUSY if it's in reset. 1668 **/ 1669 static int idpf_check_reset_complete(struct idpf_hw *hw, 1670 struct idpf_reset_reg *reset_reg) 1671 { 1672 struct idpf_adapter *adapter = hw->back; 1673 int i; 1674 1675 for (i = 0; i < 2000; i++) { 1676 u32 reg_val = readl(reset_reg->rstat); 1677 1678 /* 0xFFFFFFFF might be read if other side hasn't cleared the 1679 * register for us yet and 0xFFFFFFFF is not a valid value for 1680 * the register, so treat that as invalid. 1681 */ 1682 if (reg_val != 0xFFFFFFFF && (reg_val & reset_reg->rstat_m)) 1683 return 0; 1684 1685 usleep_range(5000, 10000); 1686 } 1687 1688 dev_warn(&adapter->pdev->dev, "Device reset timeout!\n"); 1689 /* Clear the reset flag unconditionally here since the reset 1690 * technically isn't in progress anymore from the driver's perspective 1691 */ 1692 clear_bit(IDPF_HR_RESET_IN_PROG, adapter->flags); 1693 1694 return -EBUSY; 1695 } 1696 1697 /** 1698 * idpf_set_vport_state - Set the vport state to be after the reset 1699 * @adapter: Driver specific private structure 1700 */ 1701 static void idpf_set_vport_state(struct idpf_adapter *adapter) 1702 { 1703 u16 i; 1704 1705 for (i = 0; i < adapter->max_vports; i++) { 1706 struct idpf_netdev_priv *np; 1707 1708 if (!adapter->netdevs[i]) 1709 continue; 1710 1711 np = netdev_priv(adapter->netdevs[i]); 1712 if (np->state == __IDPF_VPORT_UP) 1713 set_bit(IDPF_VPORT_UP_REQUESTED, 1714 adapter->vport_config[i]->flags); 1715 } 1716 } 1717 1718 /** 1719 * idpf_init_hard_reset - Initiate a hardware reset 1720 * @adapter: Driver specific private structure 1721 * 1722 * Deallocate the vports and all the resources associated with them and 1723 * reallocate. Also reinitialize the mailbox. Return 0 on success, 1724 * negative on failure. 1725 */ 1726 static int idpf_init_hard_reset(struct idpf_adapter *adapter) 1727 { 1728 struct idpf_reg_ops *reg_ops = &adapter->dev_ops.reg_ops; 1729 struct device *dev = &adapter->pdev->dev; 1730 struct net_device *netdev; 1731 int err; 1732 u16 i; 1733 1734 mutex_lock(&adapter->vport_ctrl_lock); 1735 1736 dev_info(dev, "Device HW Reset initiated\n"); 1737 1738 /* Avoid TX hangs on reset */ 1739 for (i = 0; i < adapter->max_vports; i++) { 1740 netdev = adapter->netdevs[i]; 1741 if (!netdev) 1742 continue; 1743 1744 netif_carrier_off(netdev); 1745 netif_tx_disable(netdev); 1746 } 1747 1748 /* Prepare for reset */ 1749 if (test_and_clear_bit(IDPF_HR_DRV_LOAD, adapter->flags)) { 1750 reg_ops->trigger_reset(adapter, IDPF_HR_DRV_LOAD); 1751 } else if (test_and_clear_bit(IDPF_HR_FUNC_RESET, adapter->flags)) { 1752 bool is_reset = idpf_is_reset_detected(adapter); 1753 1754 idpf_set_vport_state(adapter); 1755 idpf_vc_core_deinit(adapter); 1756 if (!is_reset) 1757 reg_ops->trigger_reset(adapter, IDPF_HR_FUNC_RESET); 1758 idpf_deinit_dflt_mbx(adapter); 1759 } else { 1760 dev_err(dev, "Unhandled hard reset cause\n"); 1761 err = -EBADRQC; 1762 goto unlock_mutex; 1763 } 1764 1765 /* Wait for reset to complete */ 1766 err = idpf_check_reset_complete(&adapter->hw, &adapter->reset_reg); 1767 if (err) { 1768 dev_err(dev, "The driver was unable to contact the device's firmware. Check that the FW is running. Driver state= 0x%x\n", 1769 adapter->state); 1770 goto unlock_mutex; 1771 } 1772 1773 /* Reset is complete and so start building the driver resources again */ 1774 err = idpf_init_dflt_mbx(adapter); 1775 if (err) { 1776 dev_err(dev, "Failed to initialize default mailbox: %d\n", err); 1777 goto unlock_mutex; 1778 } 1779 1780 queue_delayed_work(adapter->mbx_wq, &adapter->mbx_task, 0); 1781 1782 /* Initialize the state machine, also allocate memory and request 1783 * resources 1784 */ 1785 err = idpf_vc_core_init(adapter); 1786 if (err) { 1787 cancel_delayed_work_sync(&adapter->mbx_task); 1788 idpf_deinit_dflt_mbx(adapter); 1789 goto unlock_mutex; 1790 } 1791 1792 /* Wait till all the vports are initialized to release the reset lock, 1793 * else user space callbacks may access uninitialized vports 1794 */ 1795 while (test_bit(IDPF_HR_RESET_IN_PROG, adapter->flags)) 1796 msleep(100); 1797 1798 unlock_mutex: 1799 mutex_unlock(&adapter->vport_ctrl_lock); 1800 1801 return err; 1802 } 1803 1804 /** 1805 * idpf_vc_event_task - Handle virtchannel event logic 1806 * @work: work queue struct 1807 */ 1808 void idpf_vc_event_task(struct work_struct *work) 1809 { 1810 struct idpf_adapter *adapter; 1811 1812 adapter = container_of(work, struct idpf_adapter, vc_event_task.work); 1813 1814 if (test_bit(IDPF_REMOVE_IN_PROG, adapter->flags)) 1815 return; 1816 1817 if (test_bit(IDPF_HR_FUNC_RESET, adapter->flags) || 1818 test_bit(IDPF_HR_DRV_LOAD, adapter->flags)) { 1819 set_bit(IDPF_HR_RESET_IN_PROG, adapter->flags); 1820 idpf_init_hard_reset(adapter); 1821 } 1822 } 1823 1824 /** 1825 * idpf_initiate_soft_reset - Initiate a software reset 1826 * @vport: virtual port data struct 1827 * @reset_cause: reason for the soft reset 1828 * 1829 * Soft reset only reallocs vport queue resources. Returns 0 on success, 1830 * negative on failure. 1831 */ 1832 int idpf_initiate_soft_reset(struct idpf_vport *vport, 1833 enum idpf_vport_reset_cause reset_cause) 1834 { 1835 struct idpf_netdev_priv *np = netdev_priv(vport->netdev); 1836 enum idpf_vport_state current_state = np->state; 1837 struct idpf_adapter *adapter = vport->adapter; 1838 struct idpf_vport *new_vport; 1839 int err; 1840 1841 /* If the system is low on memory, we can end up in bad state if we 1842 * free all the memory for queue resources and try to allocate them 1843 * again. Instead, we can pre-allocate the new resources before doing 1844 * anything and bailing if the alloc fails. 1845 * 1846 * Make a clone of the existing vport to mimic its current 1847 * configuration, then modify the new structure with any requested 1848 * changes. Once the allocation of the new resources is done, stop the 1849 * existing vport and copy the configuration to the main vport. If an 1850 * error occurred, the existing vport will be untouched. 1851 * 1852 */ 1853 new_vport = kzalloc(sizeof(*vport), GFP_KERNEL); 1854 if (!new_vport) 1855 return -ENOMEM; 1856 1857 /* This purposely avoids copying the end of the struct because it 1858 * contains wait_queues and mutexes and other stuff we don't want to 1859 * mess with. Nothing below should use those variables from new_vport 1860 * and should instead always refer to them in vport if they need to. 1861 */ 1862 memcpy(new_vport, vport, offsetof(struct idpf_vport, link_up)); 1863 1864 /* Adjust resource parameters prior to reallocating resources */ 1865 switch (reset_cause) { 1866 case IDPF_SR_Q_CHANGE: 1867 err = idpf_vport_adjust_qs(new_vport); 1868 if (err) 1869 goto free_vport; 1870 break; 1871 case IDPF_SR_Q_DESC_CHANGE: 1872 /* Update queue parameters before allocating resources */ 1873 idpf_vport_calc_num_q_desc(new_vport); 1874 break; 1875 case IDPF_SR_MTU_CHANGE: 1876 case IDPF_SR_RSC_CHANGE: 1877 break; 1878 default: 1879 dev_err(&adapter->pdev->dev, "Unhandled soft reset cause\n"); 1880 err = -EINVAL; 1881 goto free_vport; 1882 } 1883 1884 if (current_state <= __IDPF_VPORT_DOWN) { 1885 idpf_send_delete_queues_msg(vport); 1886 } else { 1887 set_bit(IDPF_VPORT_DEL_QUEUES, vport->flags); 1888 idpf_vport_stop(vport); 1889 } 1890 1891 idpf_deinit_rss(vport); 1892 /* We're passing in vport here because we need its wait_queue 1893 * to send a message and it should be getting all the vport 1894 * config data out of the adapter but we need to be careful not 1895 * to add code to add_queues to change the vport config within 1896 * vport itself as it will be wiped with a memcpy later. 1897 */ 1898 err = idpf_send_add_queues_msg(vport, new_vport->num_txq, 1899 new_vport->num_complq, 1900 new_vport->num_rxq, 1901 new_vport->num_bufq); 1902 if (err) 1903 goto err_reset; 1904 1905 /* Same comment as above regarding avoiding copying the wait_queues and 1906 * mutexes applies here. We do not want to mess with those if possible. 1907 */ 1908 memcpy(vport, new_vport, offsetof(struct idpf_vport, link_up)); 1909 1910 if (reset_cause == IDPF_SR_Q_CHANGE) 1911 idpf_vport_alloc_vec_indexes(vport); 1912 1913 err = idpf_set_real_num_queues(vport); 1914 if (err) 1915 goto err_open; 1916 1917 if (current_state == __IDPF_VPORT_UP) 1918 err = idpf_vport_open(vport); 1919 1920 kfree(new_vport); 1921 1922 return err; 1923 1924 err_reset: 1925 idpf_send_add_queues_msg(vport, vport->num_txq, vport->num_complq, 1926 vport->num_rxq, vport->num_bufq); 1927 1928 err_open: 1929 if (current_state == __IDPF_VPORT_UP) 1930 idpf_vport_open(vport); 1931 1932 free_vport: 1933 kfree(new_vport); 1934 1935 return err; 1936 } 1937 1938 /** 1939 * idpf_addr_sync - Callback for dev_(mc|uc)_sync to add address 1940 * @netdev: the netdevice 1941 * @addr: address to add 1942 * 1943 * Called by __dev_(mc|uc)_sync when an address needs to be added. We call 1944 * __dev_(uc|mc)_sync from .set_rx_mode. Kernel takes addr_list_lock spinlock 1945 * meaning we cannot sleep in this context. Due to this, we have to add the 1946 * filter and send the virtchnl message asynchronously without waiting for the 1947 * response from the other side. We won't know whether or not the operation 1948 * actually succeeded until we get the message back. Returns 0 on success, 1949 * negative on failure. 1950 */ 1951 static int idpf_addr_sync(struct net_device *netdev, const u8 *addr) 1952 { 1953 struct idpf_netdev_priv *np = netdev_priv(netdev); 1954 1955 return idpf_add_mac_filter(np->vport, np, addr, true); 1956 } 1957 1958 /** 1959 * idpf_addr_unsync - Callback for dev_(mc|uc)_sync to remove address 1960 * @netdev: the netdevice 1961 * @addr: address to add 1962 * 1963 * Called by __dev_(mc|uc)_sync when an address needs to be added. We call 1964 * __dev_(uc|mc)_sync from .set_rx_mode. Kernel takes addr_list_lock spinlock 1965 * meaning we cannot sleep in this context. Due to this we have to delete the 1966 * filter and send the virtchnl message asynchronously without waiting for the 1967 * return from the other side. We won't know whether or not the operation 1968 * actually succeeded until we get the message back. Returns 0 on success, 1969 * negative on failure. 1970 */ 1971 static int idpf_addr_unsync(struct net_device *netdev, const u8 *addr) 1972 { 1973 struct idpf_netdev_priv *np = netdev_priv(netdev); 1974 1975 /* Under some circumstances, we might receive a request to delete 1976 * our own device address from our uc list. Because we store the 1977 * device address in the VSI's MAC filter list, we need to ignore 1978 * such requests and not delete our device address from this list. 1979 */ 1980 if (ether_addr_equal(addr, netdev->dev_addr)) 1981 return 0; 1982 1983 idpf_del_mac_filter(np->vport, np, addr, true); 1984 1985 return 0; 1986 } 1987 1988 /** 1989 * idpf_set_rx_mode - NDO callback to set the netdev filters 1990 * @netdev: network interface device structure 1991 * 1992 * Stack takes addr_list_lock spinlock before calling our .set_rx_mode. We 1993 * cannot sleep in this context. 1994 */ 1995 static void idpf_set_rx_mode(struct net_device *netdev) 1996 { 1997 struct idpf_netdev_priv *np = netdev_priv(netdev); 1998 struct idpf_vport_user_config_data *config_data; 1999 struct idpf_adapter *adapter; 2000 bool changed = false; 2001 struct device *dev; 2002 int err; 2003 2004 adapter = np->adapter; 2005 dev = &adapter->pdev->dev; 2006 2007 if (idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_MACFILTER)) { 2008 __dev_uc_sync(netdev, idpf_addr_sync, idpf_addr_unsync); 2009 __dev_mc_sync(netdev, idpf_addr_sync, idpf_addr_unsync); 2010 } 2011 2012 if (!idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_PROMISC)) 2013 return; 2014 2015 config_data = &adapter->vport_config[np->vport_idx]->user_config; 2016 /* IFF_PROMISC enables both unicast and multicast promiscuous, 2017 * while IFF_ALLMULTI only enables multicast such that: 2018 * 2019 * promisc + allmulti = unicast | multicast 2020 * promisc + !allmulti = unicast | multicast 2021 * !promisc + allmulti = multicast 2022 */ 2023 if ((netdev->flags & IFF_PROMISC) && 2024 !test_and_set_bit(__IDPF_PROMISC_UC, config_data->user_flags)) { 2025 changed = true; 2026 dev_info(&adapter->pdev->dev, "Entering promiscuous mode\n"); 2027 if (!test_and_set_bit(__IDPF_PROMISC_MC, adapter->flags)) 2028 dev_info(dev, "Entering multicast promiscuous mode\n"); 2029 } 2030 2031 if (!(netdev->flags & IFF_PROMISC) && 2032 test_and_clear_bit(__IDPF_PROMISC_UC, config_data->user_flags)) { 2033 changed = true; 2034 dev_info(dev, "Leaving promiscuous mode\n"); 2035 } 2036 2037 if (netdev->flags & IFF_ALLMULTI && 2038 !test_and_set_bit(__IDPF_PROMISC_MC, config_data->user_flags)) { 2039 changed = true; 2040 dev_info(dev, "Entering multicast promiscuous mode\n"); 2041 } 2042 2043 if (!(netdev->flags & (IFF_ALLMULTI | IFF_PROMISC)) && 2044 test_and_clear_bit(__IDPF_PROMISC_MC, config_data->user_flags)) { 2045 changed = true; 2046 dev_info(dev, "Leaving multicast promiscuous mode\n"); 2047 } 2048 2049 if (!changed) 2050 return; 2051 2052 err = idpf_set_promiscuous(adapter, config_data, np->vport_id); 2053 if (err) 2054 dev_err(dev, "Failed to set promiscuous mode: %d\n", err); 2055 } 2056 2057 /** 2058 * idpf_vport_manage_rss_lut - disable/enable RSS 2059 * @vport: the vport being changed 2060 * 2061 * In the event of disable request for RSS, this function will zero out RSS 2062 * LUT, while in the event of enable request for RSS, it will reconfigure RSS 2063 * LUT with the default LUT configuration. 2064 */ 2065 static int idpf_vport_manage_rss_lut(struct idpf_vport *vport) 2066 { 2067 bool ena = idpf_is_feature_ena(vport, NETIF_F_RXHASH); 2068 struct idpf_rss_data *rss_data; 2069 u16 idx = vport->idx; 2070 int lut_size; 2071 2072 rss_data = &vport->adapter->vport_config[idx]->user_config.rss_data; 2073 lut_size = rss_data->rss_lut_size * sizeof(u32); 2074 2075 if (ena) { 2076 /* This will contain the default or user configured LUT */ 2077 memcpy(rss_data->rss_lut, rss_data->cached_lut, lut_size); 2078 } else { 2079 /* Save a copy of the current LUT to be restored later if 2080 * requested. 2081 */ 2082 memcpy(rss_data->cached_lut, rss_data->rss_lut, lut_size); 2083 2084 /* Zero out the current LUT to disable */ 2085 memset(rss_data->rss_lut, 0, lut_size); 2086 } 2087 2088 return idpf_config_rss(vport); 2089 } 2090 2091 /** 2092 * idpf_set_features - set the netdev feature flags 2093 * @netdev: ptr to the netdev being adjusted 2094 * @features: the feature set that the stack is suggesting 2095 */ 2096 static int idpf_set_features(struct net_device *netdev, 2097 netdev_features_t features) 2098 { 2099 netdev_features_t changed = netdev->features ^ features; 2100 struct idpf_adapter *adapter; 2101 struct idpf_vport *vport; 2102 int err = 0; 2103 2104 idpf_vport_ctrl_lock(netdev); 2105 vport = idpf_netdev_to_vport(netdev); 2106 2107 adapter = vport->adapter; 2108 2109 if (idpf_is_reset_in_prog(adapter)) { 2110 dev_err(&adapter->pdev->dev, "Device is resetting, changing netdev features temporarily unavailable.\n"); 2111 err = -EBUSY; 2112 goto unlock_mutex; 2113 } 2114 2115 if (changed & NETIF_F_RXHASH) { 2116 netdev->features ^= NETIF_F_RXHASH; 2117 err = idpf_vport_manage_rss_lut(vport); 2118 if (err) 2119 goto unlock_mutex; 2120 } 2121 2122 if (changed & NETIF_F_GRO_HW) { 2123 netdev->features ^= NETIF_F_GRO_HW; 2124 err = idpf_initiate_soft_reset(vport, IDPF_SR_RSC_CHANGE); 2125 if (err) 2126 goto unlock_mutex; 2127 } 2128 2129 if (changed & NETIF_F_LOOPBACK) { 2130 netdev->features ^= NETIF_F_LOOPBACK; 2131 err = idpf_send_ena_dis_loopback_msg(vport); 2132 } 2133 2134 unlock_mutex: 2135 idpf_vport_ctrl_unlock(netdev); 2136 2137 return err; 2138 } 2139 2140 /** 2141 * idpf_open - Called when a network interface becomes active 2142 * @netdev: network interface device structure 2143 * 2144 * The open entry point is called when a network interface is made 2145 * active by the system (IFF_UP). At this point all resources needed 2146 * for transmit and receive operations are allocated, the interrupt 2147 * handler is registered with the OS, the netdev watchdog is enabled, 2148 * and the stack is notified that the interface is ready. 2149 * 2150 * Returns 0 on success, negative value on failure 2151 */ 2152 static int idpf_open(struct net_device *netdev) 2153 { 2154 struct idpf_vport *vport; 2155 int err; 2156 2157 idpf_vport_ctrl_lock(netdev); 2158 vport = idpf_netdev_to_vport(netdev); 2159 2160 err = idpf_set_real_num_queues(vport); 2161 if (err) 2162 goto unlock; 2163 2164 err = idpf_vport_open(vport); 2165 2166 unlock: 2167 idpf_vport_ctrl_unlock(netdev); 2168 2169 return err; 2170 } 2171 2172 /** 2173 * idpf_change_mtu - NDO callback to change the MTU 2174 * @netdev: network interface device structure 2175 * @new_mtu: new value for maximum frame size 2176 * 2177 * Returns 0 on success, negative on failure 2178 */ 2179 static int idpf_change_mtu(struct net_device *netdev, int new_mtu) 2180 { 2181 struct idpf_vport *vport; 2182 int err; 2183 2184 idpf_vport_ctrl_lock(netdev); 2185 vport = idpf_netdev_to_vport(netdev); 2186 2187 WRITE_ONCE(netdev->mtu, new_mtu); 2188 2189 err = idpf_initiate_soft_reset(vport, IDPF_SR_MTU_CHANGE); 2190 2191 idpf_vport_ctrl_unlock(netdev); 2192 2193 return err; 2194 } 2195 2196 /** 2197 * idpf_features_check - Validate packet conforms to limits 2198 * @skb: skb buffer 2199 * @netdev: This port's netdev 2200 * @features: Offload features that the stack believes apply 2201 */ 2202 static netdev_features_t idpf_features_check(struct sk_buff *skb, 2203 struct net_device *netdev, 2204 netdev_features_t features) 2205 { 2206 struct idpf_vport *vport = idpf_netdev_to_vport(netdev); 2207 struct idpf_adapter *adapter = vport->adapter; 2208 size_t len; 2209 2210 /* No point in doing any of this if neither checksum nor GSO are 2211 * being requested for this frame. We can rule out both by just 2212 * checking for CHECKSUM_PARTIAL 2213 */ 2214 if (skb->ip_summed != CHECKSUM_PARTIAL) 2215 return features; 2216 2217 /* We cannot support GSO if the MSS is going to be less than 2218 * 88 bytes. If it is then we need to drop support for GSO. 2219 */ 2220 if (skb_is_gso(skb) && 2221 (skb_shinfo(skb)->gso_size < IDPF_TX_TSO_MIN_MSS)) 2222 features &= ~NETIF_F_GSO_MASK; 2223 2224 /* Ensure MACLEN is <= 126 bytes (63 words) and not an odd size */ 2225 len = skb_network_offset(skb); 2226 if (unlikely(len & ~(126))) 2227 goto unsupported; 2228 2229 len = skb_network_header_len(skb); 2230 if (unlikely(len > idpf_get_max_tx_hdr_size(adapter))) 2231 goto unsupported; 2232 2233 if (!skb->encapsulation) 2234 return features; 2235 2236 /* L4TUNLEN can support 127 words */ 2237 len = skb_inner_network_header(skb) - skb_transport_header(skb); 2238 if (unlikely(len & ~(127 * 2))) 2239 goto unsupported; 2240 2241 /* IPLEN can support at most 127 dwords */ 2242 len = skb_inner_network_header_len(skb); 2243 if (unlikely(len > idpf_get_max_tx_hdr_size(adapter))) 2244 goto unsupported; 2245 2246 /* No need to validate L4LEN as TCP is the only protocol with a 2247 * a flexible value and we support all possible values supported 2248 * by TCP, which is at most 15 dwords 2249 */ 2250 2251 return features; 2252 2253 unsupported: 2254 return features & ~(NETIF_F_CSUM_MASK | NETIF_F_GSO_MASK); 2255 } 2256 2257 /** 2258 * idpf_set_mac - NDO callback to set port mac address 2259 * @netdev: network interface device structure 2260 * @p: pointer to an address structure 2261 * 2262 * Returns 0 on success, negative on failure 2263 **/ 2264 static int idpf_set_mac(struct net_device *netdev, void *p) 2265 { 2266 struct idpf_netdev_priv *np = netdev_priv(netdev); 2267 struct idpf_vport_config *vport_config; 2268 struct sockaddr *addr = p; 2269 struct idpf_vport *vport; 2270 int err = 0; 2271 2272 idpf_vport_ctrl_lock(netdev); 2273 vport = idpf_netdev_to_vport(netdev); 2274 2275 if (!idpf_is_cap_ena(vport->adapter, IDPF_OTHER_CAPS, 2276 VIRTCHNL2_CAP_MACFILTER)) { 2277 dev_info(&vport->adapter->pdev->dev, "Setting MAC address is not supported\n"); 2278 err = -EOPNOTSUPP; 2279 goto unlock_mutex; 2280 } 2281 2282 if (!is_valid_ether_addr(addr->sa_data)) { 2283 dev_info(&vport->adapter->pdev->dev, "Invalid MAC address: %pM\n", 2284 addr->sa_data); 2285 err = -EADDRNOTAVAIL; 2286 goto unlock_mutex; 2287 } 2288 2289 if (ether_addr_equal(netdev->dev_addr, addr->sa_data)) 2290 goto unlock_mutex; 2291 2292 vport_config = vport->adapter->vport_config[vport->idx]; 2293 err = idpf_add_mac_filter(vport, np, addr->sa_data, false); 2294 if (err) { 2295 __idpf_del_mac_filter(vport_config, addr->sa_data); 2296 goto unlock_mutex; 2297 } 2298 2299 if (is_valid_ether_addr(vport->default_mac_addr)) 2300 idpf_del_mac_filter(vport, np, vport->default_mac_addr, false); 2301 2302 ether_addr_copy(vport->default_mac_addr, addr->sa_data); 2303 eth_hw_addr_set(netdev, addr->sa_data); 2304 2305 unlock_mutex: 2306 idpf_vport_ctrl_unlock(netdev); 2307 2308 return err; 2309 } 2310 2311 /** 2312 * idpf_alloc_dma_mem - Allocate dma memory 2313 * @hw: pointer to hw struct 2314 * @mem: pointer to dma_mem struct 2315 * @size: size of the memory to allocate 2316 */ 2317 void *idpf_alloc_dma_mem(struct idpf_hw *hw, struct idpf_dma_mem *mem, u64 size) 2318 { 2319 struct idpf_adapter *adapter = hw->back; 2320 size_t sz = ALIGN(size, 4096); 2321 2322 mem->va = dma_alloc_coherent(&adapter->pdev->dev, sz, 2323 &mem->pa, GFP_KERNEL); 2324 mem->size = sz; 2325 2326 return mem->va; 2327 } 2328 2329 /** 2330 * idpf_free_dma_mem - Free the allocated dma memory 2331 * @hw: pointer to hw struct 2332 * @mem: pointer to dma_mem struct 2333 */ 2334 void idpf_free_dma_mem(struct idpf_hw *hw, struct idpf_dma_mem *mem) 2335 { 2336 struct idpf_adapter *adapter = hw->back; 2337 2338 dma_free_coherent(&adapter->pdev->dev, mem->size, 2339 mem->va, mem->pa); 2340 mem->size = 0; 2341 mem->va = NULL; 2342 mem->pa = 0; 2343 } 2344 2345 static const struct net_device_ops idpf_netdev_ops = { 2346 .ndo_open = idpf_open, 2347 .ndo_stop = idpf_stop, 2348 .ndo_start_xmit = idpf_tx_start, 2349 .ndo_features_check = idpf_features_check, 2350 .ndo_set_rx_mode = idpf_set_rx_mode, 2351 .ndo_validate_addr = eth_validate_addr, 2352 .ndo_set_mac_address = idpf_set_mac, 2353 .ndo_change_mtu = idpf_change_mtu, 2354 .ndo_get_stats64 = idpf_get_stats64, 2355 .ndo_set_features = idpf_set_features, 2356 .ndo_tx_timeout = idpf_tx_timeout, 2357 }; 2358