1 // SPDX-License-Identifier: GPL-2.0-only 2 /* Copyright (C) 2023 Intel Corporation */ 3 4 #include "idpf.h" 5 #include "idpf_virtchnl.h" 6 7 static const struct net_device_ops idpf_netdev_ops; 8 9 /** 10 * idpf_init_vector_stack - Fill the MSIX vector stack with vector index 11 * @adapter: private data struct 12 * 13 * Return 0 on success, error on failure 14 */ 15 static int idpf_init_vector_stack(struct idpf_adapter *adapter) 16 { 17 struct idpf_vector_lifo *stack; 18 u16 min_vec; 19 u32 i; 20 21 mutex_lock(&adapter->vector_lock); 22 min_vec = adapter->num_msix_entries - adapter->num_avail_msix; 23 stack = &adapter->vector_stack; 24 stack->size = adapter->num_msix_entries; 25 /* set the base and top to point at start of the 'free pool' to 26 * distribute the unused vectors on-demand basis 27 */ 28 stack->base = min_vec; 29 stack->top = min_vec; 30 31 stack->vec_idx = kcalloc(stack->size, sizeof(u16), GFP_KERNEL); 32 if (!stack->vec_idx) { 33 mutex_unlock(&adapter->vector_lock); 34 35 return -ENOMEM; 36 } 37 38 for (i = 0; i < stack->size; i++) 39 stack->vec_idx[i] = i; 40 41 mutex_unlock(&adapter->vector_lock); 42 43 return 0; 44 } 45 46 /** 47 * idpf_deinit_vector_stack - zero out the MSIX vector stack 48 * @adapter: private data struct 49 */ 50 static void idpf_deinit_vector_stack(struct idpf_adapter *adapter) 51 { 52 struct idpf_vector_lifo *stack; 53 54 mutex_lock(&adapter->vector_lock); 55 stack = &adapter->vector_stack; 56 kfree(stack->vec_idx); 57 stack->vec_idx = NULL; 58 mutex_unlock(&adapter->vector_lock); 59 } 60 61 /** 62 * idpf_mb_intr_rel_irq - Free the IRQ association with the OS 63 * @adapter: adapter structure 64 * 65 * This will also disable interrupt mode and queue up mailbox task. Mailbox 66 * task will reschedule itself if not in interrupt mode. 67 */ 68 static void idpf_mb_intr_rel_irq(struct idpf_adapter *adapter) 69 { 70 clear_bit(IDPF_MB_INTR_MODE, adapter->flags); 71 kfree(free_irq(adapter->msix_entries[0].vector, adapter)); 72 queue_delayed_work(adapter->mbx_wq, &adapter->mbx_task, 0); 73 } 74 75 /** 76 * idpf_intr_rel - Release interrupt capabilities and free memory 77 * @adapter: adapter to disable interrupts on 78 */ 79 void idpf_intr_rel(struct idpf_adapter *adapter) 80 { 81 if (!adapter->msix_entries) 82 return; 83 84 idpf_mb_intr_rel_irq(adapter); 85 pci_free_irq_vectors(adapter->pdev); 86 idpf_send_dealloc_vectors_msg(adapter); 87 idpf_deinit_vector_stack(adapter); 88 kfree(adapter->msix_entries); 89 adapter->msix_entries = NULL; 90 } 91 92 /** 93 * idpf_mb_intr_clean - Interrupt handler for the mailbox 94 * @irq: interrupt number 95 * @data: pointer to the adapter structure 96 */ 97 static irqreturn_t idpf_mb_intr_clean(int __always_unused irq, void *data) 98 { 99 struct idpf_adapter *adapter = (struct idpf_adapter *)data; 100 101 queue_delayed_work(adapter->mbx_wq, &adapter->mbx_task, 0); 102 103 return IRQ_HANDLED; 104 } 105 106 /** 107 * idpf_mb_irq_enable - Enable MSIX interrupt for the mailbox 108 * @adapter: adapter to get the hardware address for register write 109 */ 110 static void idpf_mb_irq_enable(struct idpf_adapter *adapter) 111 { 112 struct idpf_intr_reg *intr = &adapter->mb_vector.intr_reg; 113 u32 val; 114 115 val = intr->dyn_ctl_intena_m | intr->dyn_ctl_itridx_m; 116 writel(val, intr->dyn_ctl); 117 writel(intr->icr_ena_ctlq_m, intr->icr_ena); 118 } 119 120 /** 121 * idpf_mb_intr_req_irq - Request irq for the mailbox interrupt 122 * @adapter: adapter structure to pass to the mailbox irq handler 123 */ 124 static int idpf_mb_intr_req_irq(struct idpf_adapter *adapter) 125 { 126 int irq_num, mb_vidx = 0, err; 127 char *name; 128 129 irq_num = adapter->msix_entries[mb_vidx].vector; 130 name = kasprintf(GFP_KERNEL, "%s-%s-%d", 131 dev_driver_string(&adapter->pdev->dev), 132 "Mailbox", mb_vidx); 133 err = request_irq(irq_num, adapter->irq_mb_handler, 0, name, adapter); 134 if (err) { 135 dev_err(&adapter->pdev->dev, 136 "IRQ request for mailbox failed, error: %d\n", err); 137 138 return err; 139 } 140 141 set_bit(IDPF_MB_INTR_MODE, adapter->flags); 142 143 return 0; 144 } 145 146 /** 147 * idpf_set_mb_vec_id - Set vector index for mailbox 148 * @adapter: adapter structure to access the vector chunks 149 * 150 * The first vector id in the requested vector chunks from the CP is for 151 * the mailbox 152 */ 153 static void idpf_set_mb_vec_id(struct idpf_adapter *adapter) 154 { 155 if (adapter->req_vec_chunks) 156 adapter->mb_vector.v_idx = 157 le16_to_cpu(adapter->caps.mailbox_vector_id); 158 else 159 adapter->mb_vector.v_idx = 0; 160 } 161 162 /** 163 * idpf_mb_intr_init - Initialize the mailbox interrupt 164 * @adapter: adapter structure to store the mailbox vector 165 */ 166 static int idpf_mb_intr_init(struct idpf_adapter *adapter) 167 { 168 adapter->dev_ops.reg_ops.mb_intr_reg_init(adapter); 169 adapter->irq_mb_handler = idpf_mb_intr_clean; 170 171 return idpf_mb_intr_req_irq(adapter); 172 } 173 174 /** 175 * idpf_vector_lifo_push - push MSIX vector index onto stack 176 * @adapter: private data struct 177 * @vec_idx: vector index to store 178 */ 179 static int idpf_vector_lifo_push(struct idpf_adapter *adapter, u16 vec_idx) 180 { 181 struct idpf_vector_lifo *stack = &adapter->vector_stack; 182 183 lockdep_assert_held(&adapter->vector_lock); 184 185 if (stack->top == stack->base) { 186 dev_err(&adapter->pdev->dev, "Exceeded the vector stack limit: %d\n", 187 stack->top); 188 return -EINVAL; 189 } 190 191 stack->vec_idx[--stack->top] = vec_idx; 192 193 return 0; 194 } 195 196 /** 197 * idpf_vector_lifo_pop - pop MSIX vector index from stack 198 * @adapter: private data struct 199 */ 200 static int idpf_vector_lifo_pop(struct idpf_adapter *adapter) 201 { 202 struct idpf_vector_lifo *stack = &adapter->vector_stack; 203 204 lockdep_assert_held(&adapter->vector_lock); 205 206 if (stack->top == stack->size) { 207 dev_err(&adapter->pdev->dev, "No interrupt vectors are available to distribute!\n"); 208 209 return -EINVAL; 210 } 211 212 return stack->vec_idx[stack->top++]; 213 } 214 215 /** 216 * idpf_vector_stash - Store the vector indexes onto the stack 217 * @adapter: private data struct 218 * @q_vector_idxs: vector index array 219 * @vec_info: info related to the number of vectors 220 * 221 * This function is a no-op if there are no vectors indexes to be stashed 222 */ 223 static void idpf_vector_stash(struct idpf_adapter *adapter, u16 *q_vector_idxs, 224 struct idpf_vector_info *vec_info) 225 { 226 int i, base = 0; 227 u16 vec_idx; 228 229 lockdep_assert_held(&adapter->vector_lock); 230 231 if (!vec_info->num_curr_vecs) 232 return; 233 234 /* For default vports, no need to stash vector allocated from the 235 * default pool onto the stack 236 */ 237 if (vec_info->default_vport) 238 base = IDPF_MIN_Q_VEC; 239 240 for (i = vec_info->num_curr_vecs - 1; i >= base ; i--) { 241 vec_idx = q_vector_idxs[i]; 242 idpf_vector_lifo_push(adapter, vec_idx); 243 adapter->num_avail_msix++; 244 } 245 } 246 247 /** 248 * idpf_req_rel_vector_indexes - Request or release MSIX vector indexes 249 * @adapter: driver specific private structure 250 * @q_vector_idxs: vector index array 251 * @vec_info: info related to the number of vectors 252 * 253 * This is the core function to distribute the MSIX vectors acquired from the 254 * OS. It expects the caller to pass the number of vectors required and 255 * also previously allocated. First, it stashes previously allocated vector 256 * indexes on to the stack and then figures out if it can allocate requested 257 * vectors. It can wait on acquiring the mutex lock. If the caller passes 0 as 258 * requested vectors, then this function just stashes the already allocated 259 * vectors and returns 0. 260 * 261 * Returns actual number of vectors allocated on success, error value on failure 262 * If 0 is returned, implies the stack has no vectors to allocate which is also 263 * a failure case for the caller 264 */ 265 int idpf_req_rel_vector_indexes(struct idpf_adapter *adapter, 266 u16 *q_vector_idxs, 267 struct idpf_vector_info *vec_info) 268 { 269 u16 num_req_vecs, num_alloc_vecs = 0, max_vecs; 270 struct idpf_vector_lifo *stack; 271 int i, j, vecid; 272 273 mutex_lock(&adapter->vector_lock); 274 stack = &adapter->vector_stack; 275 num_req_vecs = vec_info->num_req_vecs; 276 277 /* Stash interrupt vector indexes onto the stack if required */ 278 idpf_vector_stash(adapter, q_vector_idxs, vec_info); 279 280 if (!num_req_vecs) 281 goto rel_lock; 282 283 if (vec_info->default_vport) { 284 /* As IDPF_MIN_Q_VEC per default vport is put aside in the 285 * default pool of the stack, use them for default vports 286 */ 287 j = vec_info->index * IDPF_MIN_Q_VEC + IDPF_MBX_Q_VEC; 288 for (i = 0; i < IDPF_MIN_Q_VEC; i++) { 289 q_vector_idxs[num_alloc_vecs++] = stack->vec_idx[j++]; 290 num_req_vecs--; 291 } 292 } 293 294 /* Find if stack has enough vector to allocate */ 295 max_vecs = min(adapter->num_avail_msix, num_req_vecs); 296 297 for (j = 0; j < max_vecs; j++) { 298 vecid = idpf_vector_lifo_pop(adapter); 299 q_vector_idxs[num_alloc_vecs++] = vecid; 300 } 301 adapter->num_avail_msix -= max_vecs; 302 303 rel_lock: 304 mutex_unlock(&adapter->vector_lock); 305 306 return num_alloc_vecs; 307 } 308 309 /** 310 * idpf_intr_req - Request interrupt capabilities 311 * @adapter: adapter to enable interrupts on 312 * 313 * Returns 0 on success, negative on failure 314 */ 315 int idpf_intr_req(struct idpf_adapter *adapter) 316 { 317 u16 default_vports = idpf_get_default_vports(adapter); 318 int num_q_vecs, total_vecs, num_vec_ids; 319 int min_vectors, v_actual, err; 320 unsigned int vector; 321 u16 *vecids; 322 323 total_vecs = idpf_get_reserved_vecs(adapter); 324 num_q_vecs = total_vecs - IDPF_MBX_Q_VEC; 325 326 err = idpf_send_alloc_vectors_msg(adapter, num_q_vecs); 327 if (err) { 328 dev_err(&adapter->pdev->dev, 329 "Failed to allocate %d vectors: %d\n", num_q_vecs, err); 330 331 return -EAGAIN; 332 } 333 334 min_vectors = IDPF_MBX_Q_VEC + IDPF_MIN_Q_VEC * default_vports; 335 v_actual = pci_alloc_irq_vectors(adapter->pdev, min_vectors, 336 total_vecs, PCI_IRQ_MSIX); 337 if (v_actual < min_vectors) { 338 dev_err(&adapter->pdev->dev, "Failed to allocate MSIX vectors: %d\n", 339 v_actual); 340 err = -EAGAIN; 341 goto send_dealloc_vecs; 342 } 343 344 adapter->msix_entries = kcalloc(v_actual, sizeof(struct msix_entry), 345 GFP_KERNEL); 346 347 if (!adapter->msix_entries) { 348 err = -ENOMEM; 349 goto free_irq; 350 } 351 352 idpf_set_mb_vec_id(adapter); 353 354 vecids = kcalloc(total_vecs, sizeof(u16), GFP_KERNEL); 355 if (!vecids) { 356 err = -ENOMEM; 357 goto free_msix; 358 } 359 360 num_vec_ids = idpf_get_vec_ids(adapter, vecids, total_vecs, 361 &adapter->req_vec_chunks->vchunks); 362 if (num_vec_ids < v_actual) { 363 err = -EINVAL; 364 goto free_vecids; 365 } 366 367 for (vector = 0; vector < v_actual; vector++) { 368 adapter->msix_entries[vector].entry = vecids[vector]; 369 adapter->msix_entries[vector].vector = 370 pci_irq_vector(adapter->pdev, vector); 371 } 372 373 adapter->num_req_msix = total_vecs; 374 adapter->num_msix_entries = v_actual; 375 /* 'num_avail_msix' is used to distribute excess vectors to the vports 376 * after considering the minimum vectors required per each default 377 * vport 378 */ 379 adapter->num_avail_msix = v_actual - min_vectors; 380 381 /* Fill MSIX vector lifo stack with vector indexes */ 382 err = idpf_init_vector_stack(adapter); 383 if (err) 384 goto free_vecids; 385 386 err = idpf_mb_intr_init(adapter); 387 if (err) 388 goto deinit_vec_stack; 389 idpf_mb_irq_enable(adapter); 390 kfree(vecids); 391 392 return 0; 393 394 deinit_vec_stack: 395 idpf_deinit_vector_stack(adapter); 396 free_vecids: 397 kfree(vecids); 398 free_msix: 399 kfree(adapter->msix_entries); 400 adapter->msix_entries = NULL; 401 free_irq: 402 pci_free_irq_vectors(adapter->pdev); 403 send_dealloc_vecs: 404 idpf_send_dealloc_vectors_msg(adapter); 405 406 return err; 407 } 408 409 /** 410 * idpf_find_mac_filter - Search filter list for specific mac filter 411 * @vconfig: Vport config structure 412 * @macaddr: The MAC address 413 * 414 * Returns ptr to the filter object or NULL. Must be called while holding the 415 * mac_filter_list_lock. 416 **/ 417 static struct idpf_mac_filter *idpf_find_mac_filter(struct idpf_vport_config *vconfig, 418 const u8 *macaddr) 419 { 420 struct idpf_mac_filter *f; 421 422 if (!macaddr) 423 return NULL; 424 425 list_for_each_entry(f, &vconfig->user_config.mac_filter_list, list) { 426 if (ether_addr_equal(macaddr, f->macaddr)) 427 return f; 428 } 429 430 return NULL; 431 } 432 433 /** 434 * __idpf_del_mac_filter - Delete a MAC filter from the filter list 435 * @vport_config: Vport config structure 436 * @macaddr: The MAC address 437 * 438 * Returns 0 on success, error value on failure 439 **/ 440 static int __idpf_del_mac_filter(struct idpf_vport_config *vport_config, 441 const u8 *macaddr) 442 { 443 struct idpf_mac_filter *f; 444 445 spin_lock_bh(&vport_config->mac_filter_list_lock); 446 f = idpf_find_mac_filter(vport_config, macaddr); 447 if (f) { 448 list_del(&f->list); 449 kfree(f); 450 } 451 spin_unlock_bh(&vport_config->mac_filter_list_lock); 452 453 return 0; 454 } 455 456 /** 457 * idpf_del_mac_filter - Delete a MAC filter from the filter list 458 * @vport: Main vport structure 459 * @np: Netdev private structure 460 * @macaddr: The MAC address 461 * @async: Don't wait for return message 462 * 463 * Removes filter from list and if interface is up, tells hardware about the 464 * removed filter. 465 **/ 466 static int idpf_del_mac_filter(struct idpf_vport *vport, 467 struct idpf_netdev_priv *np, 468 const u8 *macaddr, bool async) 469 { 470 struct idpf_vport_config *vport_config; 471 struct idpf_mac_filter *f; 472 473 vport_config = np->adapter->vport_config[np->vport_idx]; 474 475 spin_lock_bh(&vport_config->mac_filter_list_lock); 476 f = idpf_find_mac_filter(vport_config, macaddr); 477 if (f) { 478 f->remove = true; 479 } else { 480 spin_unlock_bh(&vport_config->mac_filter_list_lock); 481 482 return -EINVAL; 483 } 484 spin_unlock_bh(&vport_config->mac_filter_list_lock); 485 486 if (np->state == __IDPF_VPORT_UP) { 487 int err; 488 489 err = idpf_add_del_mac_filters(vport, np, false, async); 490 if (err) 491 return err; 492 } 493 494 return __idpf_del_mac_filter(vport_config, macaddr); 495 } 496 497 /** 498 * __idpf_add_mac_filter - Add mac filter helper function 499 * @vport_config: Vport config structure 500 * @macaddr: Address to add 501 * 502 * Takes mac_filter_list_lock spinlock to add new filter to list. 503 */ 504 static int __idpf_add_mac_filter(struct idpf_vport_config *vport_config, 505 const u8 *macaddr) 506 { 507 struct idpf_mac_filter *f; 508 509 spin_lock_bh(&vport_config->mac_filter_list_lock); 510 511 f = idpf_find_mac_filter(vport_config, macaddr); 512 if (f) { 513 f->remove = false; 514 spin_unlock_bh(&vport_config->mac_filter_list_lock); 515 516 return 0; 517 } 518 519 f = kzalloc(sizeof(*f), GFP_ATOMIC); 520 if (!f) { 521 spin_unlock_bh(&vport_config->mac_filter_list_lock); 522 523 return -ENOMEM; 524 } 525 526 ether_addr_copy(f->macaddr, macaddr); 527 list_add_tail(&f->list, &vport_config->user_config.mac_filter_list); 528 f->add = true; 529 530 spin_unlock_bh(&vport_config->mac_filter_list_lock); 531 532 return 0; 533 } 534 535 /** 536 * idpf_add_mac_filter - Add a mac filter to the filter list 537 * @vport: Main vport structure 538 * @np: Netdev private structure 539 * @macaddr: The MAC address 540 * @async: Don't wait for return message 541 * 542 * Returns 0 on success or error on failure. If interface is up, we'll also 543 * send the virtchnl message to tell hardware about the filter. 544 **/ 545 static int idpf_add_mac_filter(struct idpf_vport *vport, 546 struct idpf_netdev_priv *np, 547 const u8 *macaddr, bool async) 548 { 549 struct idpf_vport_config *vport_config; 550 int err; 551 552 vport_config = np->adapter->vport_config[np->vport_idx]; 553 err = __idpf_add_mac_filter(vport_config, macaddr); 554 if (err) 555 return err; 556 557 if (np->state == __IDPF_VPORT_UP) 558 err = idpf_add_del_mac_filters(vport, np, true, async); 559 560 return err; 561 } 562 563 /** 564 * idpf_del_all_mac_filters - Delete all MAC filters in list 565 * @vport: main vport struct 566 * 567 * Takes mac_filter_list_lock spinlock. Deletes all filters 568 */ 569 static void idpf_del_all_mac_filters(struct idpf_vport *vport) 570 { 571 struct idpf_vport_config *vport_config; 572 struct idpf_mac_filter *f, *ftmp; 573 574 vport_config = vport->adapter->vport_config[vport->idx]; 575 spin_lock_bh(&vport_config->mac_filter_list_lock); 576 577 list_for_each_entry_safe(f, ftmp, &vport_config->user_config.mac_filter_list, 578 list) { 579 list_del(&f->list); 580 kfree(f); 581 } 582 583 spin_unlock_bh(&vport_config->mac_filter_list_lock); 584 } 585 586 /** 587 * idpf_restore_mac_filters - Re-add all MAC filters in list 588 * @vport: main vport struct 589 * 590 * Takes mac_filter_list_lock spinlock. Sets add field to true for filters to 591 * resync filters back to HW. 592 */ 593 static void idpf_restore_mac_filters(struct idpf_vport *vport) 594 { 595 struct idpf_vport_config *vport_config; 596 struct idpf_mac_filter *f; 597 598 vport_config = vport->adapter->vport_config[vport->idx]; 599 spin_lock_bh(&vport_config->mac_filter_list_lock); 600 601 list_for_each_entry(f, &vport_config->user_config.mac_filter_list, list) 602 f->add = true; 603 604 spin_unlock_bh(&vport_config->mac_filter_list_lock); 605 606 idpf_add_del_mac_filters(vport, netdev_priv(vport->netdev), 607 true, false); 608 } 609 610 /** 611 * idpf_remove_mac_filters - Remove all MAC filters in list 612 * @vport: main vport struct 613 * 614 * Takes mac_filter_list_lock spinlock. Sets remove field to true for filters 615 * to remove filters in HW. 616 */ 617 static void idpf_remove_mac_filters(struct idpf_vport *vport) 618 { 619 struct idpf_vport_config *vport_config; 620 struct idpf_mac_filter *f; 621 622 vport_config = vport->adapter->vport_config[vport->idx]; 623 spin_lock_bh(&vport_config->mac_filter_list_lock); 624 625 list_for_each_entry(f, &vport_config->user_config.mac_filter_list, list) 626 f->remove = true; 627 628 spin_unlock_bh(&vport_config->mac_filter_list_lock); 629 630 idpf_add_del_mac_filters(vport, netdev_priv(vport->netdev), 631 false, false); 632 } 633 634 /** 635 * idpf_deinit_mac_addr - deinitialize mac address for vport 636 * @vport: main vport structure 637 */ 638 static void idpf_deinit_mac_addr(struct idpf_vport *vport) 639 { 640 struct idpf_vport_config *vport_config; 641 struct idpf_mac_filter *f; 642 643 vport_config = vport->adapter->vport_config[vport->idx]; 644 645 spin_lock_bh(&vport_config->mac_filter_list_lock); 646 647 f = idpf_find_mac_filter(vport_config, vport->default_mac_addr); 648 if (f) { 649 list_del(&f->list); 650 kfree(f); 651 } 652 653 spin_unlock_bh(&vport_config->mac_filter_list_lock); 654 } 655 656 /** 657 * idpf_init_mac_addr - initialize mac address for vport 658 * @vport: main vport structure 659 * @netdev: pointer to netdev struct associated with this vport 660 */ 661 static int idpf_init_mac_addr(struct idpf_vport *vport, 662 struct net_device *netdev) 663 { 664 struct idpf_netdev_priv *np = netdev_priv(netdev); 665 struct idpf_adapter *adapter = vport->adapter; 666 int err; 667 668 if (is_valid_ether_addr(vport->default_mac_addr)) { 669 eth_hw_addr_set(netdev, vport->default_mac_addr); 670 ether_addr_copy(netdev->perm_addr, vport->default_mac_addr); 671 672 return idpf_add_mac_filter(vport, np, vport->default_mac_addr, 673 false); 674 } 675 676 if (!idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, 677 VIRTCHNL2_CAP_MACFILTER)) { 678 dev_err(&adapter->pdev->dev, 679 "MAC address is not provided and capability is not set\n"); 680 681 return -EINVAL; 682 } 683 684 eth_hw_addr_random(netdev); 685 err = idpf_add_mac_filter(vport, np, netdev->dev_addr, false); 686 if (err) 687 return err; 688 689 dev_info(&adapter->pdev->dev, "Invalid MAC address %pM, using random %pM\n", 690 vport->default_mac_addr, netdev->dev_addr); 691 ether_addr_copy(vport->default_mac_addr, netdev->dev_addr); 692 693 return 0; 694 } 695 696 /** 697 * idpf_cfg_netdev - Allocate, configure and register a netdev 698 * @vport: main vport structure 699 * 700 * Returns 0 on success, negative value on failure. 701 */ 702 static int idpf_cfg_netdev(struct idpf_vport *vport) 703 { 704 struct idpf_adapter *adapter = vport->adapter; 705 struct idpf_vport_config *vport_config; 706 netdev_features_t dflt_features; 707 netdev_features_t offloads = 0; 708 struct idpf_netdev_priv *np; 709 struct net_device *netdev; 710 u16 idx = vport->idx; 711 int err; 712 713 vport_config = adapter->vport_config[idx]; 714 715 /* It's possible we already have a netdev allocated and registered for 716 * this vport 717 */ 718 if (test_bit(IDPF_VPORT_REG_NETDEV, vport_config->flags)) { 719 netdev = adapter->netdevs[idx]; 720 np = netdev_priv(netdev); 721 np->vport = vport; 722 np->vport_idx = vport->idx; 723 np->vport_id = vport->vport_id; 724 vport->netdev = netdev; 725 726 return idpf_init_mac_addr(vport, netdev); 727 } 728 729 netdev = alloc_etherdev_mqs(sizeof(struct idpf_netdev_priv), 730 vport_config->max_q.max_txq, 731 vport_config->max_q.max_rxq); 732 if (!netdev) 733 return -ENOMEM; 734 735 vport->netdev = netdev; 736 np = netdev_priv(netdev); 737 np->vport = vport; 738 np->adapter = adapter; 739 np->vport_idx = vport->idx; 740 np->vport_id = vport->vport_id; 741 742 spin_lock_init(&np->stats_lock); 743 744 err = idpf_init_mac_addr(vport, netdev); 745 if (err) { 746 free_netdev(vport->netdev); 747 vport->netdev = NULL; 748 749 return err; 750 } 751 752 /* assign netdev_ops */ 753 netdev->netdev_ops = &idpf_netdev_ops; 754 755 /* setup watchdog timeout value to be 5 second */ 756 netdev->watchdog_timeo = 5 * HZ; 757 758 netdev->dev_port = idx; 759 760 /* configure default MTU size */ 761 netdev->min_mtu = ETH_MIN_MTU; 762 netdev->max_mtu = vport->max_mtu; 763 764 dflt_features = NETIF_F_SG | 765 NETIF_F_HIGHDMA; 766 767 if (idpf_is_cap_ena_all(adapter, IDPF_RSS_CAPS, IDPF_CAP_RSS)) 768 dflt_features |= NETIF_F_RXHASH; 769 if (idpf_is_cap_ena_all(adapter, IDPF_CSUM_CAPS, IDPF_CAP_RX_CSUM_L4V4)) 770 dflt_features |= NETIF_F_IP_CSUM; 771 if (idpf_is_cap_ena_all(adapter, IDPF_CSUM_CAPS, IDPF_CAP_RX_CSUM_L4V6)) 772 dflt_features |= NETIF_F_IPV6_CSUM; 773 if (idpf_is_cap_ena(adapter, IDPF_CSUM_CAPS, IDPF_CAP_RX_CSUM)) 774 dflt_features |= NETIF_F_RXCSUM; 775 if (idpf_is_cap_ena_all(adapter, IDPF_CSUM_CAPS, IDPF_CAP_SCTP_CSUM)) 776 dflt_features |= NETIF_F_SCTP_CRC; 777 778 if (idpf_is_cap_ena(adapter, IDPF_SEG_CAPS, VIRTCHNL2_CAP_SEG_IPV4_TCP)) 779 dflt_features |= NETIF_F_TSO; 780 if (idpf_is_cap_ena(adapter, IDPF_SEG_CAPS, VIRTCHNL2_CAP_SEG_IPV6_TCP)) 781 dflt_features |= NETIF_F_TSO6; 782 if (idpf_is_cap_ena_all(adapter, IDPF_SEG_CAPS, 783 VIRTCHNL2_CAP_SEG_IPV4_UDP | 784 VIRTCHNL2_CAP_SEG_IPV6_UDP)) 785 dflt_features |= NETIF_F_GSO_UDP_L4; 786 if (idpf_is_cap_ena_all(adapter, IDPF_RSC_CAPS, IDPF_CAP_RSC)) 787 offloads |= NETIF_F_GRO_HW; 788 /* advertise to stack only if offloads for encapsulated packets is 789 * supported 790 */ 791 if (idpf_is_cap_ena(vport->adapter, IDPF_SEG_CAPS, 792 VIRTCHNL2_CAP_SEG_TX_SINGLE_TUNNEL)) { 793 offloads |= NETIF_F_GSO_UDP_TUNNEL | 794 NETIF_F_GSO_GRE | 795 NETIF_F_GSO_GRE_CSUM | 796 NETIF_F_GSO_PARTIAL | 797 NETIF_F_GSO_UDP_TUNNEL_CSUM | 798 NETIF_F_GSO_IPXIP4 | 799 NETIF_F_GSO_IPXIP6 | 800 0; 801 802 if (!idpf_is_cap_ena_all(vport->adapter, IDPF_CSUM_CAPS, 803 IDPF_CAP_TUNNEL_TX_CSUM)) 804 netdev->gso_partial_features |= 805 NETIF_F_GSO_UDP_TUNNEL_CSUM; 806 807 netdev->gso_partial_features |= NETIF_F_GSO_GRE_CSUM; 808 offloads |= NETIF_F_TSO_MANGLEID; 809 } 810 if (idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_LOOPBACK)) 811 offloads |= NETIF_F_LOOPBACK; 812 813 netdev->features |= dflt_features; 814 netdev->hw_features |= dflt_features | offloads; 815 netdev->hw_enc_features |= dflt_features | offloads; 816 idpf_set_ethtool_ops(netdev); 817 netif_set_affinity_auto(netdev); 818 SET_NETDEV_DEV(netdev, &adapter->pdev->dev); 819 820 /* carrier off on init to avoid Tx hangs */ 821 netif_carrier_off(netdev); 822 823 /* make sure transmit queues start off as stopped */ 824 netif_tx_stop_all_queues(netdev); 825 826 /* The vport can be arbitrarily released so we need to also track 827 * netdevs in the adapter struct 828 */ 829 adapter->netdevs[idx] = netdev; 830 831 return 0; 832 } 833 834 /** 835 * idpf_get_free_slot - get the next non-NULL location index in array 836 * @adapter: adapter in which to look for a free vport slot 837 */ 838 static int idpf_get_free_slot(struct idpf_adapter *adapter) 839 { 840 unsigned int i; 841 842 for (i = 0; i < adapter->max_vports; i++) { 843 if (!adapter->vports[i]) 844 return i; 845 } 846 847 return IDPF_NO_FREE_SLOT; 848 } 849 850 /** 851 * idpf_remove_features - Turn off feature configs 852 * @vport: virtual port structure 853 */ 854 static void idpf_remove_features(struct idpf_vport *vport) 855 { 856 struct idpf_adapter *adapter = vport->adapter; 857 858 if (idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_MACFILTER)) 859 idpf_remove_mac_filters(vport); 860 } 861 862 /** 863 * idpf_vport_stop - Disable a vport 864 * @vport: vport to disable 865 */ 866 static void idpf_vport_stop(struct idpf_vport *vport) 867 { 868 struct idpf_netdev_priv *np = netdev_priv(vport->netdev); 869 870 if (np->state <= __IDPF_VPORT_DOWN) 871 return; 872 873 netif_carrier_off(vport->netdev); 874 netif_tx_disable(vport->netdev); 875 876 idpf_send_disable_vport_msg(vport); 877 idpf_send_disable_queues_msg(vport); 878 idpf_send_map_unmap_queue_vector_msg(vport, false); 879 /* Normally we ask for queues in create_vport, but if the number of 880 * initially requested queues have changed, for example via ethtool 881 * set channels, we do delete queues and then add the queues back 882 * instead of deleting and reallocating the vport. 883 */ 884 if (test_and_clear_bit(IDPF_VPORT_DEL_QUEUES, vport->flags)) 885 idpf_send_delete_queues_msg(vport); 886 887 idpf_remove_features(vport); 888 889 vport->link_up = false; 890 idpf_vport_intr_deinit(vport); 891 idpf_vport_queues_rel(vport); 892 idpf_vport_intr_rel(vport); 893 np->state = __IDPF_VPORT_DOWN; 894 } 895 896 /** 897 * idpf_stop - Disables a network interface 898 * @netdev: network interface device structure 899 * 900 * The stop entry point is called when an interface is de-activated by the OS, 901 * and the netdevice enters the DOWN state. The hardware is still under the 902 * driver's control, but the netdev interface is disabled. 903 * 904 * Returns success only - not allowed to fail 905 */ 906 static int idpf_stop(struct net_device *netdev) 907 { 908 struct idpf_netdev_priv *np = netdev_priv(netdev); 909 struct idpf_vport *vport; 910 911 if (test_bit(IDPF_REMOVE_IN_PROG, np->adapter->flags)) 912 return 0; 913 914 idpf_vport_ctrl_lock(netdev); 915 vport = idpf_netdev_to_vport(netdev); 916 917 idpf_vport_stop(vport); 918 919 idpf_vport_ctrl_unlock(netdev); 920 921 return 0; 922 } 923 924 /** 925 * idpf_decfg_netdev - Unregister the netdev 926 * @vport: vport for which netdev to be unregistered 927 */ 928 static void idpf_decfg_netdev(struct idpf_vport *vport) 929 { 930 struct idpf_adapter *adapter = vport->adapter; 931 932 kfree(vport->rx_ptype_lkup); 933 vport->rx_ptype_lkup = NULL; 934 935 unregister_netdev(vport->netdev); 936 free_netdev(vport->netdev); 937 vport->netdev = NULL; 938 939 adapter->netdevs[vport->idx] = NULL; 940 } 941 942 /** 943 * idpf_vport_rel - Delete a vport and free its resources 944 * @vport: the vport being removed 945 */ 946 static void idpf_vport_rel(struct idpf_vport *vport) 947 { 948 struct idpf_adapter *adapter = vport->adapter; 949 struct idpf_vport_config *vport_config; 950 struct idpf_vector_info vec_info; 951 struct idpf_rss_data *rss_data; 952 struct idpf_vport_max_q max_q; 953 u16 idx = vport->idx; 954 955 vport_config = adapter->vport_config[vport->idx]; 956 idpf_deinit_rss(vport); 957 rss_data = &vport_config->user_config.rss_data; 958 kfree(rss_data->rss_key); 959 rss_data->rss_key = NULL; 960 961 idpf_send_destroy_vport_msg(vport); 962 963 /* Release all max queues allocated to the adapter's pool */ 964 max_q.max_rxq = vport_config->max_q.max_rxq; 965 max_q.max_txq = vport_config->max_q.max_txq; 966 max_q.max_bufq = vport_config->max_q.max_bufq; 967 max_q.max_complq = vport_config->max_q.max_complq; 968 idpf_vport_dealloc_max_qs(adapter, &max_q); 969 970 /* Release all the allocated vectors on the stack */ 971 vec_info.num_req_vecs = 0; 972 vec_info.num_curr_vecs = vport->num_q_vectors; 973 vec_info.default_vport = vport->default_vport; 974 975 idpf_req_rel_vector_indexes(adapter, vport->q_vector_idxs, &vec_info); 976 977 kfree(vport->q_vector_idxs); 978 vport->q_vector_idxs = NULL; 979 980 kfree(adapter->vport_params_recvd[idx]); 981 adapter->vport_params_recvd[idx] = NULL; 982 kfree(adapter->vport_params_reqd[idx]); 983 adapter->vport_params_reqd[idx] = NULL; 984 if (adapter->vport_config[idx]) { 985 kfree(adapter->vport_config[idx]->req_qs_chunks); 986 adapter->vport_config[idx]->req_qs_chunks = NULL; 987 } 988 kfree(vport); 989 adapter->num_alloc_vports--; 990 } 991 992 /** 993 * idpf_vport_dealloc - cleanup and release a given vport 994 * @vport: pointer to idpf vport structure 995 * 996 * returns nothing 997 */ 998 static void idpf_vport_dealloc(struct idpf_vport *vport) 999 { 1000 struct idpf_adapter *adapter = vport->adapter; 1001 unsigned int i = vport->idx; 1002 1003 idpf_deinit_mac_addr(vport); 1004 idpf_vport_stop(vport); 1005 1006 if (!test_bit(IDPF_HR_RESET_IN_PROG, adapter->flags)) 1007 idpf_decfg_netdev(vport); 1008 if (test_bit(IDPF_REMOVE_IN_PROG, adapter->flags)) 1009 idpf_del_all_mac_filters(vport); 1010 1011 if (adapter->netdevs[i]) { 1012 struct idpf_netdev_priv *np = netdev_priv(adapter->netdevs[i]); 1013 1014 np->vport = NULL; 1015 } 1016 1017 idpf_vport_rel(vport); 1018 1019 adapter->vports[i] = NULL; 1020 adapter->next_vport = idpf_get_free_slot(adapter); 1021 } 1022 1023 /** 1024 * idpf_is_hsplit_supported - check whether the header split is supported 1025 * @vport: virtual port to check the capability for 1026 * 1027 * Return: true if it's supported by the HW/FW, false if not. 1028 */ 1029 static bool idpf_is_hsplit_supported(const struct idpf_vport *vport) 1030 { 1031 return idpf_is_queue_model_split(vport->rxq_model) && 1032 idpf_is_cap_ena_all(vport->adapter, IDPF_HSPLIT_CAPS, 1033 IDPF_CAP_HSPLIT); 1034 } 1035 1036 /** 1037 * idpf_vport_get_hsplit - get the current header split feature state 1038 * @vport: virtual port to query the state for 1039 * 1040 * Return: ``ETHTOOL_TCP_DATA_SPLIT_UNKNOWN`` if not supported, 1041 * ``ETHTOOL_TCP_DATA_SPLIT_DISABLED`` if disabled, 1042 * ``ETHTOOL_TCP_DATA_SPLIT_ENABLED`` if active. 1043 */ 1044 u8 idpf_vport_get_hsplit(const struct idpf_vport *vport) 1045 { 1046 const struct idpf_vport_user_config_data *config; 1047 1048 if (!idpf_is_hsplit_supported(vport)) 1049 return ETHTOOL_TCP_DATA_SPLIT_UNKNOWN; 1050 1051 config = &vport->adapter->vport_config[vport->idx]->user_config; 1052 1053 return test_bit(__IDPF_USER_FLAG_HSPLIT, config->user_flags) ? 1054 ETHTOOL_TCP_DATA_SPLIT_ENABLED : 1055 ETHTOOL_TCP_DATA_SPLIT_DISABLED; 1056 } 1057 1058 /** 1059 * idpf_vport_set_hsplit - enable or disable header split on a given vport 1060 * @vport: virtual port to configure 1061 * @val: Ethtool flag controlling the header split state 1062 * 1063 * Return: true on success, false if not supported by the HW. 1064 */ 1065 bool idpf_vport_set_hsplit(const struct idpf_vport *vport, u8 val) 1066 { 1067 struct idpf_vport_user_config_data *config; 1068 1069 if (!idpf_is_hsplit_supported(vport)) 1070 return val == ETHTOOL_TCP_DATA_SPLIT_UNKNOWN; 1071 1072 config = &vport->adapter->vport_config[vport->idx]->user_config; 1073 1074 switch (val) { 1075 case ETHTOOL_TCP_DATA_SPLIT_UNKNOWN: 1076 /* Default is to enable */ 1077 case ETHTOOL_TCP_DATA_SPLIT_ENABLED: 1078 __set_bit(__IDPF_USER_FLAG_HSPLIT, config->user_flags); 1079 return true; 1080 case ETHTOOL_TCP_DATA_SPLIT_DISABLED: 1081 __clear_bit(__IDPF_USER_FLAG_HSPLIT, config->user_flags); 1082 return true; 1083 default: 1084 return false; 1085 } 1086 } 1087 1088 /** 1089 * idpf_vport_alloc - Allocates the next available struct vport in the adapter 1090 * @adapter: board private structure 1091 * @max_q: vport max queue info 1092 * 1093 * returns a pointer to a vport on success, NULL on failure. 1094 */ 1095 static struct idpf_vport *idpf_vport_alloc(struct idpf_adapter *adapter, 1096 struct idpf_vport_max_q *max_q) 1097 { 1098 struct idpf_rss_data *rss_data; 1099 u16 idx = adapter->next_vport; 1100 struct idpf_vport *vport; 1101 u16 num_max_q; 1102 1103 if (idx == IDPF_NO_FREE_SLOT) 1104 return NULL; 1105 1106 vport = kzalloc(sizeof(*vport), GFP_KERNEL); 1107 if (!vport) 1108 return vport; 1109 1110 if (!adapter->vport_config[idx]) { 1111 struct idpf_vport_config *vport_config; 1112 1113 vport_config = kzalloc(sizeof(*vport_config), GFP_KERNEL); 1114 if (!vport_config) { 1115 kfree(vport); 1116 1117 return NULL; 1118 } 1119 1120 adapter->vport_config[idx] = vport_config; 1121 } 1122 1123 vport->idx = idx; 1124 vport->adapter = adapter; 1125 vport->compln_clean_budget = IDPF_TX_COMPLQ_CLEAN_BUDGET; 1126 vport->default_vport = adapter->num_alloc_vports < 1127 idpf_get_default_vports(adapter); 1128 1129 num_max_q = max(max_q->max_txq, max_q->max_rxq); 1130 vport->q_vector_idxs = kcalloc(num_max_q, sizeof(u16), GFP_KERNEL); 1131 if (!vport->q_vector_idxs) { 1132 kfree(vport); 1133 1134 return NULL; 1135 } 1136 idpf_vport_init(vport, max_q); 1137 1138 /* This alloc is done separate from the LUT because it's not strictly 1139 * dependent on how many queues we have. If we change number of queues 1140 * and soft reset we'll need a new LUT but the key can remain the same 1141 * for as long as the vport exists. 1142 */ 1143 rss_data = &adapter->vport_config[idx]->user_config.rss_data; 1144 rss_data->rss_key = kzalloc(rss_data->rss_key_size, GFP_KERNEL); 1145 if (!rss_data->rss_key) { 1146 kfree(vport); 1147 1148 return NULL; 1149 } 1150 /* Initialize default rss key */ 1151 netdev_rss_key_fill((void *)rss_data->rss_key, rss_data->rss_key_size); 1152 1153 /* fill vport slot in the adapter struct */ 1154 adapter->vports[idx] = vport; 1155 adapter->vport_ids[idx] = idpf_get_vport_id(vport); 1156 1157 adapter->num_alloc_vports++; 1158 /* prepare adapter->next_vport for next use */ 1159 adapter->next_vport = idpf_get_free_slot(adapter); 1160 1161 return vport; 1162 } 1163 1164 /** 1165 * idpf_get_stats64 - get statistics for network device structure 1166 * @netdev: network interface device structure 1167 * @stats: main device statistics structure 1168 */ 1169 static void idpf_get_stats64(struct net_device *netdev, 1170 struct rtnl_link_stats64 *stats) 1171 { 1172 struct idpf_netdev_priv *np = netdev_priv(netdev); 1173 1174 spin_lock_bh(&np->stats_lock); 1175 *stats = np->netstats; 1176 spin_unlock_bh(&np->stats_lock); 1177 } 1178 1179 /** 1180 * idpf_statistics_task - Delayed task to get statistics over mailbox 1181 * @work: work_struct handle to our data 1182 */ 1183 void idpf_statistics_task(struct work_struct *work) 1184 { 1185 struct idpf_adapter *adapter; 1186 int i; 1187 1188 adapter = container_of(work, struct idpf_adapter, stats_task.work); 1189 1190 for (i = 0; i < adapter->max_vports; i++) { 1191 struct idpf_vport *vport = adapter->vports[i]; 1192 1193 if (vport && !test_bit(IDPF_HR_RESET_IN_PROG, adapter->flags)) 1194 idpf_send_get_stats_msg(vport); 1195 } 1196 1197 queue_delayed_work(adapter->stats_wq, &adapter->stats_task, 1198 msecs_to_jiffies(10000)); 1199 } 1200 1201 /** 1202 * idpf_mbx_task - Delayed task to handle mailbox responses 1203 * @work: work_struct handle 1204 */ 1205 void idpf_mbx_task(struct work_struct *work) 1206 { 1207 struct idpf_adapter *adapter; 1208 1209 adapter = container_of(work, struct idpf_adapter, mbx_task.work); 1210 1211 if (test_bit(IDPF_MB_INTR_MODE, adapter->flags)) 1212 idpf_mb_irq_enable(adapter); 1213 else 1214 queue_delayed_work(adapter->mbx_wq, &adapter->mbx_task, 1215 msecs_to_jiffies(300)); 1216 1217 idpf_recv_mb_msg(adapter); 1218 } 1219 1220 /** 1221 * idpf_service_task - Delayed task for handling mailbox responses 1222 * @work: work_struct handle to our data 1223 * 1224 */ 1225 void idpf_service_task(struct work_struct *work) 1226 { 1227 struct idpf_adapter *adapter; 1228 1229 adapter = container_of(work, struct idpf_adapter, serv_task.work); 1230 1231 if (idpf_is_reset_detected(adapter) && 1232 !idpf_is_reset_in_prog(adapter) && 1233 !test_bit(IDPF_REMOVE_IN_PROG, adapter->flags)) { 1234 dev_info(&adapter->pdev->dev, "HW reset detected\n"); 1235 set_bit(IDPF_HR_FUNC_RESET, adapter->flags); 1236 queue_delayed_work(adapter->vc_event_wq, 1237 &adapter->vc_event_task, 1238 msecs_to_jiffies(10)); 1239 } 1240 1241 queue_delayed_work(adapter->serv_wq, &adapter->serv_task, 1242 msecs_to_jiffies(300)); 1243 } 1244 1245 /** 1246 * idpf_restore_features - Restore feature configs 1247 * @vport: virtual port structure 1248 */ 1249 static void idpf_restore_features(struct idpf_vport *vport) 1250 { 1251 struct idpf_adapter *adapter = vport->adapter; 1252 1253 if (idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_MACFILTER)) 1254 idpf_restore_mac_filters(vport); 1255 } 1256 1257 /** 1258 * idpf_set_real_num_queues - set number of queues for netdev 1259 * @vport: virtual port structure 1260 * 1261 * Returns 0 on success, negative on failure. 1262 */ 1263 static int idpf_set_real_num_queues(struct idpf_vport *vport) 1264 { 1265 int err; 1266 1267 err = netif_set_real_num_rx_queues(vport->netdev, vport->num_rxq); 1268 if (err) 1269 return err; 1270 1271 return netif_set_real_num_tx_queues(vport->netdev, vport->num_txq); 1272 } 1273 1274 /** 1275 * idpf_up_complete - Complete interface up sequence 1276 * @vport: virtual port structure 1277 * 1278 * Returns 0 on success, negative on failure. 1279 */ 1280 static int idpf_up_complete(struct idpf_vport *vport) 1281 { 1282 struct idpf_netdev_priv *np = netdev_priv(vport->netdev); 1283 1284 if (vport->link_up && !netif_carrier_ok(vport->netdev)) { 1285 netif_carrier_on(vport->netdev); 1286 netif_tx_start_all_queues(vport->netdev); 1287 } 1288 1289 np->state = __IDPF_VPORT_UP; 1290 1291 return 0; 1292 } 1293 1294 /** 1295 * idpf_rx_init_buf_tail - Write initial buffer ring tail value 1296 * @vport: virtual port struct 1297 */ 1298 static void idpf_rx_init_buf_tail(struct idpf_vport *vport) 1299 { 1300 int i, j; 1301 1302 for (i = 0; i < vport->num_rxq_grp; i++) { 1303 struct idpf_rxq_group *grp = &vport->rxq_grps[i]; 1304 1305 if (idpf_is_queue_model_split(vport->rxq_model)) { 1306 for (j = 0; j < vport->num_bufqs_per_qgrp; j++) { 1307 const struct idpf_buf_queue *q = 1308 &grp->splitq.bufq_sets[j].bufq; 1309 1310 writel(q->next_to_alloc, q->tail); 1311 } 1312 } else { 1313 for (j = 0; j < grp->singleq.num_rxq; j++) { 1314 const struct idpf_rx_queue *q = 1315 grp->singleq.rxqs[j]; 1316 1317 writel(q->next_to_alloc, q->tail); 1318 } 1319 } 1320 } 1321 } 1322 1323 /** 1324 * idpf_vport_open - Bring up a vport 1325 * @vport: vport to bring up 1326 */ 1327 static int idpf_vport_open(struct idpf_vport *vport) 1328 { 1329 struct idpf_netdev_priv *np = netdev_priv(vport->netdev); 1330 struct idpf_adapter *adapter = vport->adapter; 1331 struct idpf_vport_config *vport_config; 1332 int err; 1333 1334 if (np->state != __IDPF_VPORT_DOWN) 1335 return -EBUSY; 1336 1337 /* we do not allow interface up just yet */ 1338 netif_carrier_off(vport->netdev); 1339 1340 err = idpf_vport_intr_alloc(vport); 1341 if (err) { 1342 dev_err(&adapter->pdev->dev, "Failed to allocate interrupts for vport %u: %d\n", 1343 vport->vport_id, err); 1344 return err; 1345 } 1346 1347 err = idpf_vport_queues_alloc(vport); 1348 if (err) 1349 goto intr_rel; 1350 1351 err = idpf_vport_queue_ids_init(vport); 1352 if (err) { 1353 dev_err(&adapter->pdev->dev, "Failed to initialize queue ids for vport %u: %d\n", 1354 vport->vport_id, err); 1355 goto queues_rel; 1356 } 1357 1358 err = idpf_vport_intr_init(vport); 1359 if (err) { 1360 dev_err(&adapter->pdev->dev, "Failed to initialize interrupts for vport %u: %d\n", 1361 vport->vport_id, err); 1362 goto queues_rel; 1363 } 1364 1365 err = idpf_rx_bufs_init_all(vport); 1366 if (err) { 1367 dev_err(&adapter->pdev->dev, "Failed to initialize RX buffers for vport %u: %d\n", 1368 vport->vport_id, err); 1369 goto queues_rel; 1370 } 1371 1372 err = idpf_queue_reg_init(vport); 1373 if (err) { 1374 dev_err(&adapter->pdev->dev, "Failed to initialize queue registers for vport %u: %d\n", 1375 vport->vport_id, err); 1376 goto queues_rel; 1377 } 1378 1379 idpf_rx_init_buf_tail(vport); 1380 idpf_vport_intr_ena(vport); 1381 1382 err = idpf_send_config_queues_msg(vport); 1383 if (err) { 1384 dev_err(&adapter->pdev->dev, "Failed to configure queues for vport %u, %d\n", 1385 vport->vport_id, err); 1386 goto intr_deinit; 1387 } 1388 1389 err = idpf_send_map_unmap_queue_vector_msg(vport, true); 1390 if (err) { 1391 dev_err(&adapter->pdev->dev, "Failed to map queue vectors for vport %u: %d\n", 1392 vport->vport_id, err); 1393 goto intr_deinit; 1394 } 1395 1396 err = idpf_send_enable_queues_msg(vport); 1397 if (err) { 1398 dev_err(&adapter->pdev->dev, "Failed to enable queues for vport %u: %d\n", 1399 vport->vport_id, err); 1400 goto unmap_queue_vectors; 1401 } 1402 1403 err = idpf_send_enable_vport_msg(vport); 1404 if (err) { 1405 dev_err(&adapter->pdev->dev, "Failed to enable vport %u: %d\n", 1406 vport->vport_id, err); 1407 err = -EAGAIN; 1408 goto disable_queues; 1409 } 1410 1411 idpf_restore_features(vport); 1412 1413 vport_config = adapter->vport_config[vport->idx]; 1414 if (vport_config->user_config.rss_data.rss_lut) 1415 err = idpf_config_rss(vport); 1416 else 1417 err = idpf_init_rss(vport); 1418 if (err) { 1419 dev_err(&adapter->pdev->dev, "Failed to initialize RSS for vport %u: %d\n", 1420 vport->vport_id, err); 1421 goto disable_vport; 1422 } 1423 1424 err = idpf_up_complete(vport); 1425 if (err) { 1426 dev_err(&adapter->pdev->dev, "Failed to complete interface up for vport %u: %d\n", 1427 vport->vport_id, err); 1428 goto deinit_rss; 1429 } 1430 1431 return 0; 1432 1433 deinit_rss: 1434 idpf_deinit_rss(vport); 1435 disable_vport: 1436 idpf_send_disable_vport_msg(vport); 1437 disable_queues: 1438 idpf_send_disable_queues_msg(vport); 1439 unmap_queue_vectors: 1440 idpf_send_map_unmap_queue_vector_msg(vport, false); 1441 intr_deinit: 1442 idpf_vport_intr_deinit(vport); 1443 queues_rel: 1444 idpf_vport_queues_rel(vport); 1445 intr_rel: 1446 idpf_vport_intr_rel(vport); 1447 1448 return err; 1449 } 1450 1451 /** 1452 * idpf_init_task - Delayed initialization task 1453 * @work: work_struct handle to our data 1454 * 1455 * Init task finishes up pending work started in probe. Due to the asynchronous 1456 * nature in which the device communicates with hardware, we may have to wait 1457 * several milliseconds to get a response. Instead of busy polling in probe, 1458 * pulling it out into a delayed work task prevents us from bogging down the 1459 * whole system waiting for a response from hardware. 1460 */ 1461 void idpf_init_task(struct work_struct *work) 1462 { 1463 struct idpf_vport_config *vport_config; 1464 struct idpf_vport_max_q max_q; 1465 struct idpf_adapter *adapter; 1466 struct idpf_netdev_priv *np; 1467 struct idpf_vport *vport; 1468 u16 num_default_vports; 1469 struct pci_dev *pdev; 1470 bool default_vport; 1471 int index, err; 1472 1473 adapter = container_of(work, struct idpf_adapter, init_task.work); 1474 1475 num_default_vports = idpf_get_default_vports(adapter); 1476 if (adapter->num_alloc_vports < num_default_vports) 1477 default_vport = true; 1478 else 1479 default_vport = false; 1480 1481 err = idpf_vport_alloc_max_qs(adapter, &max_q); 1482 if (err) 1483 goto unwind_vports; 1484 1485 err = idpf_send_create_vport_msg(adapter, &max_q); 1486 if (err) { 1487 idpf_vport_dealloc_max_qs(adapter, &max_q); 1488 goto unwind_vports; 1489 } 1490 1491 pdev = adapter->pdev; 1492 vport = idpf_vport_alloc(adapter, &max_q); 1493 if (!vport) { 1494 err = -EFAULT; 1495 dev_err(&pdev->dev, "failed to allocate vport: %d\n", 1496 err); 1497 idpf_vport_dealloc_max_qs(adapter, &max_q); 1498 goto unwind_vports; 1499 } 1500 1501 index = vport->idx; 1502 vport_config = adapter->vport_config[index]; 1503 1504 init_waitqueue_head(&vport->sw_marker_wq); 1505 1506 spin_lock_init(&vport_config->mac_filter_list_lock); 1507 1508 INIT_LIST_HEAD(&vport_config->user_config.mac_filter_list); 1509 1510 err = idpf_check_supported_desc_ids(vport); 1511 if (err) { 1512 dev_err(&pdev->dev, "failed to get required descriptor ids\n"); 1513 goto cfg_netdev_err; 1514 } 1515 1516 if (idpf_cfg_netdev(vport)) 1517 goto cfg_netdev_err; 1518 1519 err = idpf_send_get_rx_ptype_msg(vport); 1520 if (err) 1521 goto handle_err; 1522 1523 /* Once state is put into DOWN, driver is ready for dev_open */ 1524 np = netdev_priv(vport->netdev); 1525 np->state = __IDPF_VPORT_DOWN; 1526 if (test_and_clear_bit(IDPF_VPORT_UP_REQUESTED, vport_config->flags)) 1527 idpf_vport_open(vport); 1528 1529 /* Spawn and return 'idpf_init_task' work queue until all the 1530 * default vports are created 1531 */ 1532 if (adapter->num_alloc_vports < num_default_vports) { 1533 queue_delayed_work(adapter->init_wq, &adapter->init_task, 1534 msecs_to_jiffies(5 * (adapter->pdev->devfn & 0x07))); 1535 1536 return; 1537 } 1538 1539 for (index = 0; index < adapter->max_vports; index++) { 1540 if (adapter->netdevs[index] && 1541 !test_bit(IDPF_VPORT_REG_NETDEV, 1542 adapter->vport_config[index]->flags)) { 1543 register_netdev(adapter->netdevs[index]); 1544 set_bit(IDPF_VPORT_REG_NETDEV, 1545 adapter->vport_config[index]->flags); 1546 } 1547 } 1548 1549 /* As all the required vports are created, clear the reset flag 1550 * unconditionally here in case we were in reset and the link was down. 1551 */ 1552 clear_bit(IDPF_HR_RESET_IN_PROG, adapter->flags); 1553 /* Start the statistics task now */ 1554 queue_delayed_work(adapter->stats_wq, &adapter->stats_task, 1555 msecs_to_jiffies(10 * (pdev->devfn & 0x07))); 1556 1557 return; 1558 1559 handle_err: 1560 idpf_decfg_netdev(vport); 1561 cfg_netdev_err: 1562 idpf_vport_rel(vport); 1563 adapter->vports[index] = NULL; 1564 unwind_vports: 1565 if (default_vport) { 1566 for (index = 0; index < adapter->max_vports; index++) { 1567 if (adapter->vports[index]) 1568 idpf_vport_dealloc(adapter->vports[index]); 1569 } 1570 } 1571 clear_bit(IDPF_HR_RESET_IN_PROG, adapter->flags); 1572 } 1573 1574 /** 1575 * idpf_sriov_ena - Enable or change number of VFs 1576 * @adapter: private data struct 1577 * @num_vfs: number of VFs to allocate 1578 */ 1579 static int idpf_sriov_ena(struct idpf_adapter *adapter, int num_vfs) 1580 { 1581 struct device *dev = &adapter->pdev->dev; 1582 int err; 1583 1584 err = idpf_send_set_sriov_vfs_msg(adapter, num_vfs); 1585 if (err) { 1586 dev_err(dev, "Failed to allocate VFs: %d\n", err); 1587 1588 return err; 1589 } 1590 1591 err = pci_enable_sriov(adapter->pdev, num_vfs); 1592 if (err) { 1593 idpf_send_set_sriov_vfs_msg(adapter, 0); 1594 dev_err(dev, "Failed to enable SR-IOV: %d\n", err); 1595 1596 return err; 1597 } 1598 1599 adapter->num_vfs = num_vfs; 1600 1601 return num_vfs; 1602 } 1603 1604 /** 1605 * idpf_sriov_configure - Configure the requested VFs 1606 * @pdev: pointer to a pci_dev structure 1607 * @num_vfs: number of vfs to allocate 1608 * 1609 * Enable or change the number of VFs. Called when the user updates the number 1610 * of VFs in sysfs. 1611 **/ 1612 int idpf_sriov_configure(struct pci_dev *pdev, int num_vfs) 1613 { 1614 struct idpf_adapter *adapter = pci_get_drvdata(pdev); 1615 1616 if (!idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_SRIOV)) { 1617 dev_info(&pdev->dev, "SR-IOV is not supported on this device\n"); 1618 1619 return -EOPNOTSUPP; 1620 } 1621 1622 if (num_vfs) 1623 return idpf_sriov_ena(adapter, num_vfs); 1624 1625 if (pci_vfs_assigned(pdev)) { 1626 dev_warn(&pdev->dev, "Unable to free VFs because some are assigned to VMs\n"); 1627 1628 return -EBUSY; 1629 } 1630 1631 pci_disable_sriov(adapter->pdev); 1632 idpf_send_set_sriov_vfs_msg(adapter, 0); 1633 adapter->num_vfs = 0; 1634 1635 return 0; 1636 } 1637 1638 /** 1639 * idpf_deinit_task - Device deinit routine 1640 * @adapter: Driver specific private structure 1641 * 1642 * Extended remove logic which will be used for 1643 * hard reset as well 1644 */ 1645 void idpf_deinit_task(struct idpf_adapter *adapter) 1646 { 1647 unsigned int i; 1648 1649 /* Wait until the init_task is done else this thread might release 1650 * the resources first and the other thread might end up in a bad state 1651 */ 1652 cancel_delayed_work_sync(&adapter->init_task); 1653 1654 if (!adapter->vports) 1655 return; 1656 1657 cancel_delayed_work_sync(&adapter->stats_task); 1658 1659 for (i = 0; i < adapter->max_vports; i++) { 1660 if (adapter->vports[i]) 1661 idpf_vport_dealloc(adapter->vports[i]); 1662 } 1663 } 1664 1665 /** 1666 * idpf_check_reset_complete - check that reset is complete 1667 * @hw: pointer to hw struct 1668 * @reset_reg: struct with reset registers 1669 * 1670 * Returns 0 if device is ready to use, or -EBUSY if it's in reset. 1671 **/ 1672 static int idpf_check_reset_complete(struct idpf_hw *hw, 1673 struct idpf_reset_reg *reset_reg) 1674 { 1675 struct idpf_adapter *adapter = hw->back; 1676 int i; 1677 1678 for (i = 0; i < 2000; i++) { 1679 u32 reg_val = readl(reset_reg->rstat); 1680 1681 /* 0xFFFFFFFF might be read if other side hasn't cleared the 1682 * register for us yet and 0xFFFFFFFF is not a valid value for 1683 * the register, so treat that as invalid. 1684 */ 1685 if (reg_val != 0xFFFFFFFF && (reg_val & reset_reg->rstat_m)) 1686 return 0; 1687 1688 usleep_range(5000, 10000); 1689 } 1690 1691 dev_warn(&adapter->pdev->dev, "Device reset timeout!\n"); 1692 /* Clear the reset flag unconditionally here since the reset 1693 * technically isn't in progress anymore from the driver's perspective 1694 */ 1695 clear_bit(IDPF_HR_RESET_IN_PROG, adapter->flags); 1696 1697 return -EBUSY; 1698 } 1699 1700 /** 1701 * idpf_set_vport_state - Set the vport state to be after the reset 1702 * @adapter: Driver specific private structure 1703 */ 1704 static void idpf_set_vport_state(struct idpf_adapter *adapter) 1705 { 1706 u16 i; 1707 1708 for (i = 0; i < adapter->max_vports; i++) { 1709 struct idpf_netdev_priv *np; 1710 1711 if (!adapter->netdevs[i]) 1712 continue; 1713 1714 np = netdev_priv(adapter->netdevs[i]); 1715 if (np->state == __IDPF_VPORT_UP) 1716 set_bit(IDPF_VPORT_UP_REQUESTED, 1717 adapter->vport_config[i]->flags); 1718 } 1719 } 1720 1721 /** 1722 * idpf_init_hard_reset - Initiate a hardware reset 1723 * @adapter: Driver specific private structure 1724 * 1725 * Deallocate the vports and all the resources associated with them and 1726 * reallocate. Also reinitialize the mailbox. Return 0 on success, 1727 * negative on failure. 1728 */ 1729 static int idpf_init_hard_reset(struct idpf_adapter *adapter) 1730 { 1731 struct idpf_reg_ops *reg_ops = &adapter->dev_ops.reg_ops; 1732 struct device *dev = &adapter->pdev->dev; 1733 struct net_device *netdev; 1734 int err; 1735 u16 i; 1736 1737 mutex_lock(&adapter->vport_ctrl_lock); 1738 1739 dev_info(dev, "Device HW Reset initiated\n"); 1740 1741 /* Avoid TX hangs on reset */ 1742 for (i = 0; i < adapter->max_vports; i++) { 1743 netdev = adapter->netdevs[i]; 1744 if (!netdev) 1745 continue; 1746 1747 netif_carrier_off(netdev); 1748 netif_tx_disable(netdev); 1749 } 1750 1751 /* Prepare for reset */ 1752 if (test_and_clear_bit(IDPF_HR_DRV_LOAD, adapter->flags)) { 1753 reg_ops->trigger_reset(adapter, IDPF_HR_DRV_LOAD); 1754 } else if (test_and_clear_bit(IDPF_HR_FUNC_RESET, adapter->flags)) { 1755 bool is_reset = idpf_is_reset_detected(adapter); 1756 1757 idpf_set_vport_state(adapter); 1758 idpf_vc_core_deinit(adapter); 1759 if (!is_reset) 1760 reg_ops->trigger_reset(adapter, IDPF_HR_FUNC_RESET); 1761 idpf_deinit_dflt_mbx(adapter); 1762 } else { 1763 dev_err(dev, "Unhandled hard reset cause\n"); 1764 err = -EBADRQC; 1765 goto unlock_mutex; 1766 } 1767 1768 /* Wait for reset to complete */ 1769 err = idpf_check_reset_complete(&adapter->hw, &adapter->reset_reg); 1770 if (err) { 1771 dev_err(dev, "The driver was unable to contact the device's firmware. Check that the FW is running. Driver state= 0x%x\n", 1772 adapter->state); 1773 goto unlock_mutex; 1774 } 1775 1776 /* Reset is complete and so start building the driver resources again */ 1777 err = idpf_init_dflt_mbx(adapter); 1778 if (err) { 1779 dev_err(dev, "Failed to initialize default mailbox: %d\n", err); 1780 goto unlock_mutex; 1781 } 1782 1783 queue_delayed_work(adapter->mbx_wq, &adapter->mbx_task, 0); 1784 1785 /* Initialize the state machine, also allocate memory and request 1786 * resources 1787 */ 1788 err = idpf_vc_core_init(adapter); 1789 if (err) { 1790 cancel_delayed_work_sync(&adapter->mbx_task); 1791 idpf_deinit_dflt_mbx(adapter); 1792 goto unlock_mutex; 1793 } 1794 1795 /* Wait till all the vports are initialized to release the reset lock, 1796 * else user space callbacks may access uninitialized vports 1797 */ 1798 while (test_bit(IDPF_HR_RESET_IN_PROG, adapter->flags)) 1799 msleep(100); 1800 1801 unlock_mutex: 1802 mutex_unlock(&adapter->vport_ctrl_lock); 1803 1804 return err; 1805 } 1806 1807 /** 1808 * idpf_vc_event_task - Handle virtchannel event logic 1809 * @work: work queue struct 1810 */ 1811 void idpf_vc_event_task(struct work_struct *work) 1812 { 1813 struct idpf_adapter *adapter; 1814 1815 adapter = container_of(work, struct idpf_adapter, vc_event_task.work); 1816 1817 if (test_bit(IDPF_REMOVE_IN_PROG, adapter->flags)) 1818 return; 1819 1820 if (test_bit(IDPF_HR_FUNC_RESET, adapter->flags) || 1821 test_bit(IDPF_HR_DRV_LOAD, adapter->flags)) { 1822 set_bit(IDPF_HR_RESET_IN_PROG, adapter->flags); 1823 idpf_init_hard_reset(adapter); 1824 } 1825 } 1826 1827 /** 1828 * idpf_initiate_soft_reset - Initiate a software reset 1829 * @vport: virtual port data struct 1830 * @reset_cause: reason for the soft reset 1831 * 1832 * Soft reset only reallocs vport queue resources. Returns 0 on success, 1833 * negative on failure. 1834 */ 1835 int idpf_initiate_soft_reset(struct idpf_vport *vport, 1836 enum idpf_vport_reset_cause reset_cause) 1837 { 1838 struct idpf_netdev_priv *np = netdev_priv(vport->netdev); 1839 enum idpf_vport_state current_state = np->state; 1840 struct idpf_adapter *adapter = vport->adapter; 1841 struct idpf_vport *new_vport; 1842 int err; 1843 1844 /* If the system is low on memory, we can end up in bad state if we 1845 * free all the memory for queue resources and try to allocate them 1846 * again. Instead, we can pre-allocate the new resources before doing 1847 * anything and bailing if the alloc fails. 1848 * 1849 * Make a clone of the existing vport to mimic its current 1850 * configuration, then modify the new structure with any requested 1851 * changes. Once the allocation of the new resources is done, stop the 1852 * existing vport and copy the configuration to the main vport. If an 1853 * error occurred, the existing vport will be untouched. 1854 * 1855 */ 1856 new_vport = kzalloc(sizeof(*vport), GFP_KERNEL); 1857 if (!new_vport) 1858 return -ENOMEM; 1859 1860 /* This purposely avoids copying the end of the struct because it 1861 * contains wait_queues and mutexes and other stuff we don't want to 1862 * mess with. Nothing below should use those variables from new_vport 1863 * and should instead always refer to them in vport if they need to. 1864 */ 1865 memcpy(new_vport, vport, offsetof(struct idpf_vport, link_up)); 1866 1867 /* Adjust resource parameters prior to reallocating resources */ 1868 switch (reset_cause) { 1869 case IDPF_SR_Q_CHANGE: 1870 err = idpf_vport_adjust_qs(new_vport); 1871 if (err) 1872 goto free_vport; 1873 break; 1874 case IDPF_SR_Q_DESC_CHANGE: 1875 /* Update queue parameters before allocating resources */ 1876 idpf_vport_calc_num_q_desc(new_vport); 1877 break; 1878 case IDPF_SR_MTU_CHANGE: 1879 case IDPF_SR_RSC_CHANGE: 1880 break; 1881 default: 1882 dev_err(&adapter->pdev->dev, "Unhandled soft reset cause\n"); 1883 err = -EINVAL; 1884 goto free_vport; 1885 } 1886 1887 if (current_state <= __IDPF_VPORT_DOWN) { 1888 idpf_send_delete_queues_msg(vport); 1889 } else { 1890 set_bit(IDPF_VPORT_DEL_QUEUES, vport->flags); 1891 idpf_vport_stop(vport); 1892 } 1893 1894 idpf_deinit_rss(vport); 1895 /* We're passing in vport here because we need its wait_queue 1896 * to send a message and it should be getting all the vport 1897 * config data out of the adapter but we need to be careful not 1898 * to add code to add_queues to change the vport config within 1899 * vport itself as it will be wiped with a memcpy later. 1900 */ 1901 err = idpf_send_add_queues_msg(vport, new_vport->num_txq, 1902 new_vport->num_complq, 1903 new_vport->num_rxq, 1904 new_vport->num_bufq); 1905 if (err) 1906 goto err_reset; 1907 1908 /* Same comment as above regarding avoiding copying the wait_queues and 1909 * mutexes applies here. We do not want to mess with those if possible. 1910 */ 1911 memcpy(vport, new_vport, offsetof(struct idpf_vport, link_up)); 1912 1913 if (reset_cause == IDPF_SR_Q_CHANGE) 1914 idpf_vport_alloc_vec_indexes(vport); 1915 1916 err = idpf_set_real_num_queues(vport); 1917 if (err) 1918 goto err_open; 1919 1920 if (current_state == __IDPF_VPORT_UP) 1921 err = idpf_vport_open(vport); 1922 1923 kfree(new_vport); 1924 1925 return err; 1926 1927 err_reset: 1928 idpf_send_add_queues_msg(vport, vport->num_txq, vport->num_complq, 1929 vport->num_rxq, vport->num_bufq); 1930 1931 err_open: 1932 if (current_state == __IDPF_VPORT_UP) 1933 idpf_vport_open(vport); 1934 1935 free_vport: 1936 kfree(new_vport); 1937 1938 return err; 1939 } 1940 1941 /** 1942 * idpf_addr_sync - Callback for dev_(mc|uc)_sync to add address 1943 * @netdev: the netdevice 1944 * @addr: address to add 1945 * 1946 * Called by __dev_(mc|uc)_sync when an address needs to be added. We call 1947 * __dev_(uc|mc)_sync from .set_rx_mode. Kernel takes addr_list_lock spinlock 1948 * meaning we cannot sleep in this context. Due to this, we have to add the 1949 * filter and send the virtchnl message asynchronously without waiting for the 1950 * response from the other side. We won't know whether or not the operation 1951 * actually succeeded until we get the message back. Returns 0 on success, 1952 * negative on failure. 1953 */ 1954 static int idpf_addr_sync(struct net_device *netdev, const u8 *addr) 1955 { 1956 struct idpf_netdev_priv *np = netdev_priv(netdev); 1957 1958 return idpf_add_mac_filter(np->vport, np, addr, true); 1959 } 1960 1961 /** 1962 * idpf_addr_unsync - Callback for dev_(mc|uc)_sync to remove address 1963 * @netdev: the netdevice 1964 * @addr: address to add 1965 * 1966 * Called by __dev_(mc|uc)_sync when an address needs to be added. We call 1967 * __dev_(uc|mc)_sync from .set_rx_mode. Kernel takes addr_list_lock spinlock 1968 * meaning we cannot sleep in this context. Due to this we have to delete the 1969 * filter and send the virtchnl message asynchronously without waiting for the 1970 * return from the other side. We won't know whether or not the operation 1971 * actually succeeded until we get the message back. Returns 0 on success, 1972 * negative on failure. 1973 */ 1974 static int idpf_addr_unsync(struct net_device *netdev, const u8 *addr) 1975 { 1976 struct idpf_netdev_priv *np = netdev_priv(netdev); 1977 1978 /* Under some circumstances, we might receive a request to delete 1979 * our own device address from our uc list. Because we store the 1980 * device address in the VSI's MAC filter list, we need to ignore 1981 * such requests and not delete our device address from this list. 1982 */ 1983 if (ether_addr_equal(addr, netdev->dev_addr)) 1984 return 0; 1985 1986 idpf_del_mac_filter(np->vport, np, addr, true); 1987 1988 return 0; 1989 } 1990 1991 /** 1992 * idpf_set_rx_mode - NDO callback to set the netdev filters 1993 * @netdev: network interface device structure 1994 * 1995 * Stack takes addr_list_lock spinlock before calling our .set_rx_mode. We 1996 * cannot sleep in this context. 1997 */ 1998 static void idpf_set_rx_mode(struct net_device *netdev) 1999 { 2000 struct idpf_netdev_priv *np = netdev_priv(netdev); 2001 struct idpf_vport_user_config_data *config_data; 2002 struct idpf_adapter *adapter; 2003 bool changed = false; 2004 struct device *dev; 2005 int err; 2006 2007 adapter = np->adapter; 2008 dev = &adapter->pdev->dev; 2009 2010 if (idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_MACFILTER)) { 2011 __dev_uc_sync(netdev, idpf_addr_sync, idpf_addr_unsync); 2012 __dev_mc_sync(netdev, idpf_addr_sync, idpf_addr_unsync); 2013 } 2014 2015 if (!idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_PROMISC)) 2016 return; 2017 2018 config_data = &adapter->vport_config[np->vport_idx]->user_config; 2019 /* IFF_PROMISC enables both unicast and multicast promiscuous, 2020 * while IFF_ALLMULTI only enables multicast such that: 2021 * 2022 * promisc + allmulti = unicast | multicast 2023 * promisc + !allmulti = unicast | multicast 2024 * !promisc + allmulti = multicast 2025 */ 2026 if ((netdev->flags & IFF_PROMISC) && 2027 !test_and_set_bit(__IDPF_PROMISC_UC, config_data->user_flags)) { 2028 changed = true; 2029 dev_info(&adapter->pdev->dev, "Entering promiscuous mode\n"); 2030 if (!test_and_set_bit(__IDPF_PROMISC_MC, adapter->flags)) 2031 dev_info(dev, "Entering multicast promiscuous mode\n"); 2032 } 2033 2034 if (!(netdev->flags & IFF_PROMISC) && 2035 test_and_clear_bit(__IDPF_PROMISC_UC, config_data->user_flags)) { 2036 changed = true; 2037 dev_info(dev, "Leaving promiscuous mode\n"); 2038 } 2039 2040 if (netdev->flags & IFF_ALLMULTI && 2041 !test_and_set_bit(__IDPF_PROMISC_MC, config_data->user_flags)) { 2042 changed = true; 2043 dev_info(dev, "Entering multicast promiscuous mode\n"); 2044 } 2045 2046 if (!(netdev->flags & (IFF_ALLMULTI | IFF_PROMISC)) && 2047 test_and_clear_bit(__IDPF_PROMISC_MC, config_data->user_flags)) { 2048 changed = true; 2049 dev_info(dev, "Leaving multicast promiscuous mode\n"); 2050 } 2051 2052 if (!changed) 2053 return; 2054 2055 err = idpf_set_promiscuous(adapter, config_data, np->vport_id); 2056 if (err) 2057 dev_err(dev, "Failed to set promiscuous mode: %d\n", err); 2058 } 2059 2060 /** 2061 * idpf_vport_manage_rss_lut - disable/enable RSS 2062 * @vport: the vport being changed 2063 * 2064 * In the event of disable request for RSS, this function will zero out RSS 2065 * LUT, while in the event of enable request for RSS, it will reconfigure RSS 2066 * LUT with the default LUT configuration. 2067 */ 2068 static int idpf_vport_manage_rss_lut(struct idpf_vport *vport) 2069 { 2070 bool ena = idpf_is_feature_ena(vport, NETIF_F_RXHASH); 2071 struct idpf_rss_data *rss_data; 2072 u16 idx = vport->idx; 2073 int lut_size; 2074 2075 rss_data = &vport->adapter->vport_config[idx]->user_config.rss_data; 2076 lut_size = rss_data->rss_lut_size * sizeof(u32); 2077 2078 if (ena) { 2079 /* This will contain the default or user configured LUT */ 2080 memcpy(rss_data->rss_lut, rss_data->cached_lut, lut_size); 2081 } else { 2082 /* Save a copy of the current LUT to be restored later if 2083 * requested. 2084 */ 2085 memcpy(rss_data->cached_lut, rss_data->rss_lut, lut_size); 2086 2087 /* Zero out the current LUT to disable */ 2088 memset(rss_data->rss_lut, 0, lut_size); 2089 } 2090 2091 return idpf_config_rss(vport); 2092 } 2093 2094 /** 2095 * idpf_set_features - set the netdev feature flags 2096 * @netdev: ptr to the netdev being adjusted 2097 * @features: the feature set that the stack is suggesting 2098 */ 2099 static int idpf_set_features(struct net_device *netdev, 2100 netdev_features_t features) 2101 { 2102 netdev_features_t changed = netdev->features ^ features; 2103 struct idpf_adapter *adapter; 2104 struct idpf_vport *vport; 2105 int err = 0; 2106 2107 idpf_vport_ctrl_lock(netdev); 2108 vport = idpf_netdev_to_vport(netdev); 2109 2110 adapter = vport->adapter; 2111 2112 if (idpf_is_reset_in_prog(adapter)) { 2113 dev_err(&adapter->pdev->dev, "Device is resetting, changing netdev features temporarily unavailable.\n"); 2114 err = -EBUSY; 2115 goto unlock_mutex; 2116 } 2117 2118 if (changed & NETIF_F_RXHASH) { 2119 netdev->features ^= NETIF_F_RXHASH; 2120 err = idpf_vport_manage_rss_lut(vport); 2121 if (err) 2122 goto unlock_mutex; 2123 } 2124 2125 if (changed & NETIF_F_GRO_HW) { 2126 netdev->features ^= NETIF_F_GRO_HW; 2127 err = idpf_initiate_soft_reset(vport, IDPF_SR_RSC_CHANGE); 2128 if (err) 2129 goto unlock_mutex; 2130 } 2131 2132 if (changed & NETIF_F_LOOPBACK) { 2133 netdev->features ^= NETIF_F_LOOPBACK; 2134 err = idpf_send_ena_dis_loopback_msg(vport); 2135 } 2136 2137 unlock_mutex: 2138 idpf_vport_ctrl_unlock(netdev); 2139 2140 return err; 2141 } 2142 2143 /** 2144 * idpf_open - Called when a network interface becomes active 2145 * @netdev: network interface device structure 2146 * 2147 * The open entry point is called when a network interface is made 2148 * active by the system (IFF_UP). At this point all resources needed 2149 * for transmit and receive operations are allocated, the interrupt 2150 * handler is registered with the OS, the netdev watchdog is enabled, 2151 * and the stack is notified that the interface is ready. 2152 * 2153 * Returns 0 on success, negative value on failure 2154 */ 2155 static int idpf_open(struct net_device *netdev) 2156 { 2157 struct idpf_vport *vport; 2158 int err; 2159 2160 idpf_vport_ctrl_lock(netdev); 2161 vport = idpf_netdev_to_vport(netdev); 2162 2163 err = idpf_set_real_num_queues(vport); 2164 if (err) 2165 goto unlock; 2166 2167 err = idpf_vport_open(vport); 2168 2169 unlock: 2170 idpf_vport_ctrl_unlock(netdev); 2171 2172 return err; 2173 } 2174 2175 /** 2176 * idpf_change_mtu - NDO callback to change the MTU 2177 * @netdev: network interface device structure 2178 * @new_mtu: new value for maximum frame size 2179 * 2180 * Returns 0 on success, negative on failure 2181 */ 2182 static int idpf_change_mtu(struct net_device *netdev, int new_mtu) 2183 { 2184 struct idpf_vport *vport; 2185 int err; 2186 2187 idpf_vport_ctrl_lock(netdev); 2188 vport = idpf_netdev_to_vport(netdev); 2189 2190 WRITE_ONCE(netdev->mtu, new_mtu); 2191 2192 err = idpf_initiate_soft_reset(vport, IDPF_SR_MTU_CHANGE); 2193 2194 idpf_vport_ctrl_unlock(netdev); 2195 2196 return err; 2197 } 2198 2199 /** 2200 * idpf_features_check - Validate packet conforms to limits 2201 * @skb: skb buffer 2202 * @netdev: This port's netdev 2203 * @features: Offload features that the stack believes apply 2204 */ 2205 static netdev_features_t idpf_features_check(struct sk_buff *skb, 2206 struct net_device *netdev, 2207 netdev_features_t features) 2208 { 2209 struct idpf_vport *vport = idpf_netdev_to_vport(netdev); 2210 struct idpf_adapter *adapter = vport->adapter; 2211 size_t len; 2212 2213 /* No point in doing any of this if neither checksum nor GSO are 2214 * being requested for this frame. We can rule out both by just 2215 * checking for CHECKSUM_PARTIAL 2216 */ 2217 if (skb->ip_summed != CHECKSUM_PARTIAL) 2218 return features; 2219 2220 /* We cannot support GSO if the MSS is going to be less than 2221 * 88 bytes. If it is then we need to drop support for GSO. 2222 */ 2223 if (skb_is_gso(skb) && 2224 (skb_shinfo(skb)->gso_size < IDPF_TX_TSO_MIN_MSS)) 2225 features &= ~NETIF_F_GSO_MASK; 2226 2227 /* Ensure MACLEN is <= 126 bytes (63 words) and not an odd size */ 2228 len = skb_network_offset(skb); 2229 if (unlikely(len & ~(126))) 2230 goto unsupported; 2231 2232 len = skb_network_header_len(skb); 2233 if (unlikely(len > idpf_get_max_tx_hdr_size(adapter))) 2234 goto unsupported; 2235 2236 if (!skb->encapsulation) 2237 return features; 2238 2239 /* L4TUNLEN can support 127 words */ 2240 len = skb_inner_network_header(skb) - skb_transport_header(skb); 2241 if (unlikely(len & ~(127 * 2))) 2242 goto unsupported; 2243 2244 /* IPLEN can support at most 127 dwords */ 2245 len = skb_inner_network_header_len(skb); 2246 if (unlikely(len > idpf_get_max_tx_hdr_size(adapter))) 2247 goto unsupported; 2248 2249 /* No need to validate L4LEN as TCP is the only protocol with a 2250 * a flexible value and we support all possible values supported 2251 * by TCP, which is at most 15 dwords 2252 */ 2253 2254 return features; 2255 2256 unsupported: 2257 return features & ~(NETIF_F_CSUM_MASK | NETIF_F_GSO_MASK); 2258 } 2259 2260 /** 2261 * idpf_set_mac - NDO callback to set port mac address 2262 * @netdev: network interface device structure 2263 * @p: pointer to an address structure 2264 * 2265 * Returns 0 on success, negative on failure 2266 **/ 2267 static int idpf_set_mac(struct net_device *netdev, void *p) 2268 { 2269 struct idpf_netdev_priv *np = netdev_priv(netdev); 2270 struct idpf_vport_config *vport_config; 2271 struct sockaddr *addr = p; 2272 struct idpf_vport *vport; 2273 int err = 0; 2274 2275 idpf_vport_ctrl_lock(netdev); 2276 vport = idpf_netdev_to_vport(netdev); 2277 2278 if (!idpf_is_cap_ena(vport->adapter, IDPF_OTHER_CAPS, 2279 VIRTCHNL2_CAP_MACFILTER)) { 2280 dev_info(&vport->adapter->pdev->dev, "Setting MAC address is not supported\n"); 2281 err = -EOPNOTSUPP; 2282 goto unlock_mutex; 2283 } 2284 2285 if (!is_valid_ether_addr(addr->sa_data)) { 2286 dev_info(&vport->adapter->pdev->dev, "Invalid MAC address: %pM\n", 2287 addr->sa_data); 2288 err = -EADDRNOTAVAIL; 2289 goto unlock_mutex; 2290 } 2291 2292 if (ether_addr_equal(netdev->dev_addr, addr->sa_data)) 2293 goto unlock_mutex; 2294 2295 vport_config = vport->adapter->vport_config[vport->idx]; 2296 err = idpf_add_mac_filter(vport, np, addr->sa_data, false); 2297 if (err) { 2298 __idpf_del_mac_filter(vport_config, addr->sa_data); 2299 goto unlock_mutex; 2300 } 2301 2302 if (is_valid_ether_addr(vport->default_mac_addr)) 2303 idpf_del_mac_filter(vport, np, vport->default_mac_addr, false); 2304 2305 ether_addr_copy(vport->default_mac_addr, addr->sa_data); 2306 eth_hw_addr_set(netdev, addr->sa_data); 2307 2308 unlock_mutex: 2309 idpf_vport_ctrl_unlock(netdev); 2310 2311 return err; 2312 } 2313 2314 /** 2315 * idpf_alloc_dma_mem - Allocate dma memory 2316 * @hw: pointer to hw struct 2317 * @mem: pointer to dma_mem struct 2318 * @size: size of the memory to allocate 2319 */ 2320 void *idpf_alloc_dma_mem(struct idpf_hw *hw, struct idpf_dma_mem *mem, u64 size) 2321 { 2322 struct idpf_adapter *adapter = hw->back; 2323 size_t sz = ALIGN(size, 4096); 2324 2325 mem->va = dma_alloc_coherent(&adapter->pdev->dev, sz, 2326 &mem->pa, GFP_KERNEL); 2327 mem->size = sz; 2328 2329 return mem->va; 2330 } 2331 2332 /** 2333 * idpf_free_dma_mem - Free the allocated dma memory 2334 * @hw: pointer to hw struct 2335 * @mem: pointer to dma_mem struct 2336 */ 2337 void idpf_free_dma_mem(struct idpf_hw *hw, struct idpf_dma_mem *mem) 2338 { 2339 struct idpf_adapter *adapter = hw->back; 2340 2341 dma_free_coherent(&adapter->pdev->dev, mem->size, 2342 mem->va, mem->pa); 2343 mem->size = 0; 2344 mem->va = NULL; 2345 mem->pa = 0; 2346 } 2347 2348 static const struct net_device_ops idpf_netdev_ops = { 2349 .ndo_open = idpf_open, 2350 .ndo_stop = idpf_stop, 2351 .ndo_start_xmit = idpf_tx_start, 2352 .ndo_features_check = idpf_features_check, 2353 .ndo_set_rx_mode = idpf_set_rx_mode, 2354 .ndo_validate_addr = eth_validate_addr, 2355 .ndo_set_mac_address = idpf_set_mac, 2356 .ndo_change_mtu = idpf_change_mtu, 2357 .ndo_get_stats64 = idpf_get_stats64, 2358 .ndo_set_features = idpf_set_features, 2359 .ndo_tx_timeout = idpf_tx_timeout, 2360 }; 2361