1 // SPDX-License-Identifier: GPL-2.0-only
2 /* Copyright (C) 2023 Intel Corporation */
3 
4 #include "idpf.h"
5 #include "idpf_virtchnl.h"
6 
7 static const struct net_device_ops idpf_netdev_ops;
8 
9 /**
10  * idpf_init_vector_stack - Fill the MSIX vector stack with vector index
11  * @adapter: private data struct
12  *
13  * Return 0 on success, error on failure
14  */
idpf_init_vector_stack(struct idpf_adapter * adapter)15 static int idpf_init_vector_stack(struct idpf_adapter *adapter)
16 {
17 	struct idpf_vector_lifo *stack;
18 	u16 min_vec;
19 	u32 i;
20 
21 	mutex_lock(&adapter->vector_lock);
22 	min_vec = adapter->num_msix_entries - adapter->num_avail_msix;
23 	stack = &adapter->vector_stack;
24 	stack->size = adapter->num_msix_entries;
25 	/* set the base and top to point at start of the 'free pool' to
26 	 * distribute the unused vectors on-demand basis
27 	 */
28 	stack->base = min_vec;
29 	stack->top = min_vec;
30 
31 	stack->vec_idx = kcalloc(stack->size, sizeof(u16), GFP_KERNEL);
32 	if (!stack->vec_idx) {
33 		mutex_unlock(&adapter->vector_lock);
34 
35 		return -ENOMEM;
36 	}
37 
38 	for (i = 0; i < stack->size; i++)
39 		stack->vec_idx[i] = i;
40 
41 	mutex_unlock(&adapter->vector_lock);
42 
43 	return 0;
44 }
45 
46 /**
47  * idpf_deinit_vector_stack - zero out the MSIX vector stack
48  * @adapter: private data struct
49  */
idpf_deinit_vector_stack(struct idpf_adapter * adapter)50 static void idpf_deinit_vector_stack(struct idpf_adapter *adapter)
51 {
52 	struct idpf_vector_lifo *stack;
53 
54 	mutex_lock(&adapter->vector_lock);
55 	stack = &adapter->vector_stack;
56 	kfree(stack->vec_idx);
57 	stack->vec_idx = NULL;
58 	mutex_unlock(&adapter->vector_lock);
59 }
60 
61 /**
62  * idpf_mb_intr_rel_irq - Free the IRQ association with the OS
63  * @adapter: adapter structure
64  *
65  * This will also disable interrupt mode and queue up mailbox task. Mailbox
66  * task will reschedule itself if not in interrupt mode.
67  */
idpf_mb_intr_rel_irq(struct idpf_adapter * adapter)68 static void idpf_mb_intr_rel_irq(struct idpf_adapter *adapter)
69 {
70 	clear_bit(IDPF_MB_INTR_MODE, adapter->flags);
71 	kfree(free_irq(adapter->msix_entries[0].vector, adapter));
72 	queue_delayed_work(adapter->mbx_wq, &adapter->mbx_task, 0);
73 }
74 
75 /**
76  * idpf_intr_rel - Release interrupt capabilities and free memory
77  * @adapter: adapter to disable interrupts on
78  */
idpf_intr_rel(struct idpf_adapter * adapter)79 void idpf_intr_rel(struct idpf_adapter *adapter)
80 {
81 	if (!adapter->msix_entries)
82 		return;
83 
84 	idpf_mb_intr_rel_irq(adapter);
85 	pci_free_irq_vectors(adapter->pdev);
86 	idpf_send_dealloc_vectors_msg(adapter);
87 	idpf_deinit_vector_stack(adapter);
88 	kfree(adapter->msix_entries);
89 	adapter->msix_entries = NULL;
90 }
91 
92 /**
93  * idpf_mb_intr_clean - Interrupt handler for the mailbox
94  * @irq: interrupt number
95  * @data: pointer to the adapter structure
96  */
idpf_mb_intr_clean(int __always_unused irq,void * data)97 static irqreturn_t idpf_mb_intr_clean(int __always_unused irq, void *data)
98 {
99 	struct idpf_adapter *adapter = (struct idpf_adapter *)data;
100 
101 	queue_delayed_work(adapter->mbx_wq, &adapter->mbx_task, 0);
102 
103 	return IRQ_HANDLED;
104 }
105 
106 /**
107  * idpf_mb_irq_enable - Enable MSIX interrupt for the mailbox
108  * @adapter: adapter to get the hardware address for register write
109  */
idpf_mb_irq_enable(struct idpf_adapter * adapter)110 static void idpf_mb_irq_enable(struct idpf_adapter *adapter)
111 {
112 	struct idpf_intr_reg *intr = &adapter->mb_vector.intr_reg;
113 	u32 val;
114 
115 	val = intr->dyn_ctl_intena_m | intr->dyn_ctl_itridx_m;
116 	writel(val, intr->dyn_ctl);
117 	writel(intr->icr_ena_ctlq_m, intr->icr_ena);
118 }
119 
120 /**
121  * idpf_mb_intr_req_irq - Request irq for the mailbox interrupt
122  * @adapter: adapter structure to pass to the mailbox irq handler
123  */
idpf_mb_intr_req_irq(struct idpf_adapter * adapter)124 static int idpf_mb_intr_req_irq(struct idpf_adapter *adapter)
125 {
126 	int irq_num, mb_vidx = 0, err;
127 	char *name;
128 
129 	irq_num = adapter->msix_entries[mb_vidx].vector;
130 	name = kasprintf(GFP_KERNEL, "%s-%s-%d",
131 			 dev_driver_string(&adapter->pdev->dev),
132 			 "Mailbox", mb_vidx);
133 	err = request_irq(irq_num, adapter->irq_mb_handler, 0, name, adapter);
134 	if (err) {
135 		dev_err(&adapter->pdev->dev,
136 			"IRQ request for mailbox failed, error: %d\n", err);
137 
138 		return err;
139 	}
140 
141 	set_bit(IDPF_MB_INTR_MODE, adapter->flags);
142 
143 	return 0;
144 }
145 
146 /**
147  * idpf_set_mb_vec_id - Set vector index for mailbox
148  * @adapter: adapter structure to access the vector chunks
149  *
150  * The first vector id in the requested vector chunks from the CP is for
151  * the mailbox
152  */
idpf_set_mb_vec_id(struct idpf_adapter * adapter)153 static void idpf_set_mb_vec_id(struct idpf_adapter *adapter)
154 {
155 	if (adapter->req_vec_chunks)
156 		adapter->mb_vector.v_idx =
157 			le16_to_cpu(adapter->caps.mailbox_vector_id);
158 	else
159 		adapter->mb_vector.v_idx = 0;
160 }
161 
162 /**
163  * idpf_mb_intr_init - Initialize the mailbox interrupt
164  * @adapter: adapter structure to store the mailbox vector
165  */
idpf_mb_intr_init(struct idpf_adapter * adapter)166 static int idpf_mb_intr_init(struct idpf_adapter *adapter)
167 {
168 	adapter->dev_ops.reg_ops.mb_intr_reg_init(adapter);
169 	adapter->irq_mb_handler = idpf_mb_intr_clean;
170 
171 	return idpf_mb_intr_req_irq(adapter);
172 }
173 
174 /**
175  * idpf_vector_lifo_push - push MSIX vector index onto stack
176  * @adapter: private data struct
177  * @vec_idx: vector index to store
178  */
idpf_vector_lifo_push(struct idpf_adapter * adapter,u16 vec_idx)179 static int idpf_vector_lifo_push(struct idpf_adapter *adapter, u16 vec_idx)
180 {
181 	struct idpf_vector_lifo *stack = &adapter->vector_stack;
182 
183 	lockdep_assert_held(&adapter->vector_lock);
184 
185 	if (stack->top == stack->base) {
186 		dev_err(&adapter->pdev->dev, "Exceeded the vector stack limit: %d\n",
187 			stack->top);
188 		return -EINVAL;
189 	}
190 
191 	stack->vec_idx[--stack->top] = vec_idx;
192 
193 	return 0;
194 }
195 
196 /**
197  * idpf_vector_lifo_pop - pop MSIX vector index from stack
198  * @adapter: private data struct
199  */
idpf_vector_lifo_pop(struct idpf_adapter * adapter)200 static int idpf_vector_lifo_pop(struct idpf_adapter *adapter)
201 {
202 	struct idpf_vector_lifo *stack = &adapter->vector_stack;
203 
204 	lockdep_assert_held(&adapter->vector_lock);
205 
206 	if (stack->top == stack->size) {
207 		dev_err(&adapter->pdev->dev, "No interrupt vectors are available to distribute!\n");
208 
209 		return -EINVAL;
210 	}
211 
212 	return stack->vec_idx[stack->top++];
213 }
214 
215 /**
216  * idpf_vector_stash - Store the vector indexes onto the stack
217  * @adapter: private data struct
218  * @q_vector_idxs: vector index array
219  * @vec_info: info related to the number of vectors
220  *
221  * This function is a no-op if there are no vectors indexes to be stashed
222  */
idpf_vector_stash(struct idpf_adapter * adapter,u16 * q_vector_idxs,struct idpf_vector_info * vec_info)223 static void idpf_vector_stash(struct idpf_adapter *adapter, u16 *q_vector_idxs,
224 			      struct idpf_vector_info *vec_info)
225 {
226 	int i, base = 0;
227 	u16 vec_idx;
228 
229 	lockdep_assert_held(&adapter->vector_lock);
230 
231 	if (!vec_info->num_curr_vecs)
232 		return;
233 
234 	/* For default vports, no need to stash vector allocated from the
235 	 * default pool onto the stack
236 	 */
237 	if (vec_info->default_vport)
238 		base = IDPF_MIN_Q_VEC;
239 
240 	for (i = vec_info->num_curr_vecs - 1; i >= base ; i--) {
241 		vec_idx = q_vector_idxs[i];
242 		idpf_vector_lifo_push(adapter, vec_idx);
243 		adapter->num_avail_msix++;
244 	}
245 }
246 
247 /**
248  * idpf_req_rel_vector_indexes - Request or release MSIX vector indexes
249  * @adapter: driver specific private structure
250  * @q_vector_idxs: vector index array
251  * @vec_info: info related to the number of vectors
252  *
253  * This is the core function to distribute the MSIX vectors acquired from the
254  * OS. It expects the caller to pass the number of vectors required and
255  * also previously allocated. First, it stashes previously allocated vector
256  * indexes on to the stack and then figures out if it can allocate requested
257  * vectors. It can wait on acquiring the mutex lock. If the caller passes 0 as
258  * requested vectors, then this function just stashes the already allocated
259  * vectors and returns 0.
260  *
261  * Returns actual number of vectors allocated on success, error value on failure
262  * If 0 is returned, implies the stack has no vectors to allocate which is also
263  * a failure case for the caller
264  */
idpf_req_rel_vector_indexes(struct idpf_adapter * adapter,u16 * q_vector_idxs,struct idpf_vector_info * vec_info)265 int idpf_req_rel_vector_indexes(struct idpf_adapter *adapter,
266 				u16 *q_vector_idxs,
267 				struct idpf_vector_info *vec_info)
268 {
269 	u16 num_req_vecs, num_alloc_vecs = 0, max_vecs;
270 	struct idpf_vector_lifo *stack;
271 	int i, j, vecid;
272 
273 	mutex_lock(&adapter->vector_lock);
274 	stack = &adapter->vector_stack;
275 	num_req_vecs = vec_info->num_req_vecs;
276 
277 	/* Stash interrupt vector indexes onto the stack if required */
278 	idpf_vector_stash(adapter, q_vector_idxs, vec_info);
279 
280 	if (!num_req_vecs)
281 		goto rel_lock;
282 
283 	if (vec_info->default_vport) {
284 		/* As IDPF_MIN_Q_VEC per default vport is put aside in the
285 		 * default pool of the stack, use them for default vports
286 		 */
287 		j = vec_info->index * IDPF_MIN_Q_VEC + IDPF_MBX_Q_VEC;
288 		for (i = 0; i < IDPF_MIN_Q_VEC; i++) {
289 			q_vector_idxs[num_alloc_vecs++] = stack->vec_idx[j++];
290 			num_req_vecs--;
291 		}
292 	}
293 
294 	/* Find if stack has enough vector to allocate */
295 	max_vecs = min(adapter->num_avail_msix, num_req_vecs);
296 
297 	for (j = 0; j < max_vecs; j++) {
298 		vecid = idpf_vector_lifo_pop(adapter);
299 		q_vector_idxs[num_alloc_vecs++] = vecid;
300 	}
301 	adapter->num_avail_msix -= max_vecs;
302 
303 rel_lock:
304 	mutex_unlock(&adapter->vector_lock);
305 
306 	return num_alloc_vecs;
307 }
308 
309 /**
310  * idpf_intr_req - Request interrupt capabilities
311  * @adapter: adapter to enable interrupts on
312  *
313  * Returns 0 on success, negative on failure
314  */
idpf_intr_req(struct idpf_adapter * adapter)315 int idpf_intr_req(struct idpf_adapter *adapter)
316 {
317 	u16 default_vports = idpf_get_default_vports(adapter);
318 	int num_q_vecs, total_vecs, num_vec_ids;
319 	int min_vectors, v_actual, err;
320 	unsigned int vector;
321 	u16 *vecids;
322 
323 	total_vecs = idpf_get_reserved_vecs(adapter);
324 	num_q_vecs = total_vecs - IDPF_MBX_Q_VEC;
325 
326 	err = idpf_send_alloc_vectors_msg(adapter, num_q_vecs);
327 	if (err) {
328 		dev_err(&adapter->pdev->dev,
329 			"Failed to allocate %d vectors: %d\n", num_q_vecs, err);
330 
331 		return -EAGAIN;
332 	}
333 
334 	min_vectors = IDPF_MBX_Q_VEC + IDPF_MIN_Q_VEC * default_vports;
335 	v_actual = pci_alloc_irq_vectors(adapter->pdev, min_vectors,
336 					 total_vecs, PCI_IRQ_MSIX);
337 	if (v_actual < min_vectors) {
338 		dev_err(&adapter->pdev->dev, "Failed to allocate MSIX vectors: %d\n",
339 			v_actual);
340 		err = -EAGAIN;
341 		goto send_dealloc_vecs;
342 	}
343 
344 	adapter->msix_entries = kcalloc(v_actual, sizeof(struct msix_entry),
345 					GFP_KERNEL);
346 
347 	if (!adapter->msix_entries) {
348 		err = -ENOMEM;
349 		goto free_irq;
350 	}
351 
352 	idpf_set_mb_vec_id(adapter);
353 
354 	vecids = kcalloc(total_vecs, sizeof(u16), GFP_KERNEL);
355 	if (!vecids) {
356 		err = -ENOMEM;
357 		goto free_msix;
358 	}
359 
360 	num_vec_ids = idpf_get_vec_ids(adapter, vecids, total_vecs,
361 				       &adapter->req_vec_chunks->vchunks);
362 	if (num_vec_ids < v_actual) {
363 		err = -EINVAL;
364 		goto free_vecids;
365 	}
366 
367 	for (vector = 0; vector < v_actual; vector++) {
368 		adapter->msix_entries[vector].entry = vecids[vector];
369 		adapter->msix_entries[vector].vector =
370 			pci_irq_vector(adapter->pdev, vector);
371 	}
372 
373 	adapter->num_req_msix = total_vecs;
374 	adapter->num_msix_entries = v_actual;
375 	/* 'num_avail_msix' is used to distribute excess vectors to the vports
376 	 * after considering the minimum vectors required per each default
377 	 * vport
378 	 */
379 	adapter->num_avail_msix = v_actual - min_vectors;
380 
381 	/* Fill MSIX vector lifo stack with vector indexes */
382 	err = idpf_init_vector_stack(adapter);
383 	if (err)
384 		goto free_vecids;
385 
386 	err = idpf_mb_intr_init(adapter);
387 	if (err)
388 		goto deinit_vec_stack;
389 	idpf_mb_irq_enable(adapter);
390 	kfree(vecids);
391 
392 	return 0;
393 
394 deinit_vec_stack:
395 	idpf_deinit_vector_stack(adapter);
396 free_vecids:
397 	kfree(vecids);
398 free_msix:
399 	kfree(adapter->msix_entries);
400 	adapter->msix_entries = NULL;
401 free_irq:
402 	pci_free_irq_vectors(adapter->pdev);
403 send_dealloc_vecs:
404 	idpf_send_dealloc_vectors_msg(adapter);
405 
406 	return err;
407 }
408 
409 /**
410  * idpf_find_mac_filter - Search filter list for specific mac filter
411  * @vconfig: Vport config structure
412  * @macaddr: The MAC address
413  *
414  * Returns ptr to the filter object or NULL. Must be called while holding the
415  * mac_filter_list_lock.
416  **/
idpf_find_mac_filter(struct idpf_vport_config * vconfig,const u8 * macaddr)417 static struct idpf_mac_filter *idpf_find_mac_filter(struct idpf_vport_config *vconfig,
418 						    const u8 *macaddr)
419 {
420 	struct idpf_mac_filter *f;
421 
422 	if (!macaddr)
423 		return NULL;
424 
425 	list_for_each_entry(f, &vconfig->user_config.mac_filter_list, list) {
426 		if (ether_addr_equal(macaddr, f->macaddr))
427 			return f;
428 	}
429 
430 	return NULL;
431 }
432 
433 /**
434  * __idpf_del_mac_filter - Delete a MAC filter from the filter list
435  * @vport_config: Vport config structure
436  * @macaddr: The MAC address
437  *
438  * Returns 0 on success, error value on failure
439  **/
__idpf_del_mac_filter(struct idpf_vport_config * vport_config,const u8 * macaddr)440 static int __idpf_del_mac_filter(struct idpf_vport_config *vport_config,
441 				 const u8 *macaddr)
442 {
443 	struct idpf_mac_filter *f;
444 
445 	spin_lock_bh(&vport_config->mac_filter_list_lock);
446 	f = idpf_find_mac_filter(vport_config, macaddr);
447 	if (f) {
448 		list_del(&f->list);
449 		kfree(f);
450 	}
451 	spin_unlock_bh(&vport_config->mac_filter_list_lock);
452 
453 	return 0;
454 }
455 
456 /**
457  * idpf_del_mac_filter - Delete a MAC filter from the filter list
458  * @vport: Main vport structure
459  * @np: Netdev private structure
460  * @macaddr: The MAC address
461  * @async: Don't wait for return message
462  *
463  * Removes filter from list and if interface is up, tells hardware about the
464  * removed filter.
465  **/
idpf_del_mac_filter(struct idpf_vport * vport,struct idpf_netdev_priv * np,const u8 * macaddr,bool async)466 static int idpf_del_mac_filter(struct idpf_vport *vport,
467 			       struct idpf_netdev_priv *np,
468 			       const u8 *macaddr, bool async)
469 {
470 	struct idpf_vport_config *vport_config;
471 	struct idpf_mac_filter *f;
472 
473 	vport_config = np->adapter->vport_config[np->vport_idx];
474 
475 	spin_lock_bh(&vport_config->mac_filter_list_lock);
476 	f = idpf_find_mac_filter(vport_config, macaddr);
477 	if (f) {
478 		f->remove = true;
479 	} else {
480 		spin_unlock_bh(&vport_config->mac_filter_list_lock);
481 
482 		return -EINVAL;
483 	}
484 	spin_unlock_bh(&vport_config->mac_filter_list_lock);
485 
486 	if (np->state == __IDPF_VPORT_UP) {
487 		int err;
488 
489 		err = idpf_add_del_mac_filters(vport, np, false, async);
490 		if (err)
491 			return err;
492 	}
493 
494 	return  __idpf_del_mac_filter(vport_config, macaddr);
495 }
496 
497 /**
498  * __idpf_add_mac_filter - Add mac filter helper function
499  * @vport_config: Vport config structure
500  * @macaddr: Address to add
501  *
502  * Takes mac_filter_list_lock spinlock to add new filter to list.
503  */
__idpf_add_mac_filter(struct idpf_vport_config * vport_config,const u8 * macaddr)504 static int __idpf_add_mac_filter(struct idpf_vport_config *vport_config,
505 				 const u8 *macaddr)
506 {
507 	struct idpf_mac_filter *f;
508 
509 	spin_lock_bh(&vport_config->mac_filter_list_lock);
510 
511 	f = idpf_find_mac_filter(vport_config, macaddr);
512 	if (f) {
513 		f->remove = false;
514 		spin_unlock_bh(&vport_config->mac_filter_list_lock);
515 
516 		return 0;
517 	}
518 
519 	f = kzalloc(sizeof(*f), GFP_ATOMIC);
520 	if (!f) {
521 		spin_unlock_bh(&vport_config->mac_filter_list_lock);
522 
523 		return -ENOMEM;
524 	}
525 
526 	ether_addr_copy(f->macaddr, macaddr);
527 	list_add_tail(&f->list, &vport_config->user_config.mac_filter_list);
528 	f->add = true;
529 
530 	spin_unlock_bh(&vport_config->mac_filter_list_lock);
531 
532 	return 0;
533 }
534 
535 /**
536  * idpf_add_mac_filter - Add a mac filter to the filter list
537  * @vport: Main vport structure
538  * @np: Netdev private structure
539  * @macaddr: The MAC address
540  * @async: Don't wait for return message
541  *
542  * Returns 0 on success or error on failure. If interface is up, we'll also
543  * send the virtchnl message to tell hardware about the filter.
544  **/
idpf_add_mac_filter(struct idpf_vport * vport,struct idpf_netdev_priv * np,const u8 * macaddr,bool async)545 static int idpf_add_mac_filter(struct idpf_vport *vport,
546 			       struct idpf_netdev_priv *np,
547 			       const u8 *macaddr, bool async)
548 {
549 	struct idpf_vport_config *vport_config;
550 	int err;
551 
552 	vport_config = np->adapter->vport_config[np->vport_idx];
553 	err = __idpf_add_mac_filter(vport_config, macaddr);
554 	if (err)
555 		return err;
556 
557 	if (np->state == __IDPF_VPORT_UP)
558 		err = idpf_add_del_mac_filters(vport, np, true, async);
559 
560 	return err;
561 }
562 
563 /**
564  * idpf_del_all_mac_filters - Delete all MAC filters in list
565  * @vport: main vport struct
566  *
567  * Takes mac_filter_list_lock spinlock.  Deletes all filters
568  */
idpf_del_all_mac_filters(struct idpf_vport * vport)569 static void idpf_del_all_mac_filters(struct idpf_vport *vport)
570 {
571 	struct idpf_vport_config *vport_config;
572 	struct idpf_mac_filter *f, *ftmp;
573 
574 	vport_config = vport->adapter->vport_config[vport->idx];
575 	spin_lock_bh(&vport_config->mac_filter_list_lock);
576 
577 	list_for_each_entry_safe(f, ftmp, &vport_config->user_config.mac_filter_list,
578 				 list) {
579 		list_del(&f->list);
580 		kfree(f);
581 	}
582 
583 	spin_unlock_bh(&vport_config->mac_filter_list_lock);
584 }
585 
586 /**
587  * idpf_restore_mac_filters - Re-add all MAC filters in list
588  * @vport: main vport struct
589  *
590  * Takes mac_filter_list_lock spinlock.  Sets add field to true for filters to
591  * resync filters back to HW.
592  */
idpf_restore_mac_filters(struct idpf_vport * vport)593 static void idpf_restore_mac_filters(struct idpf_vport *vport)
594 {
595 	struct idpf_vport_config *vport_config;
596 	struct idpf_mac_filter *f;
597 
598 	vport_config = vport->adapter->vport_config[vport->idx];
599 	spin_lock_bh(&vport_config->mac_filter_list_lock);
600 
601 	list_for_each_entry(f, &vport_config->user_config.mac_filter_list, list)
602 		f->add = true;
603 
604 	spin_unlock_bh(&vport_config->mac_filter_list_lock);
605 
606 	idpf_add_del_mac_filters(vport, netdev_priv(vport->netdev),
607 				 true, false);
608 }
609 
610 /**
611  * idpf_remove_mac_filters - Remove all MAC filters in list
612  * @vport: main vport struct
613  *
614  * Takes mac_filter_list_lock spinlock. Sets remove field to true for filters
615  * to remove filters in HW.
616  */
idpf_remove_mac_filters(struct idpf_vport * vport)617 static void idpf_remove_mac_filters(struct idpf_vport *vport)
618 {
619 	struct idpf_vport_config *vport_config;
620 	struct idpf_mac_filter *f;
621 
622 	vport_config = vport->adapter->vport_config[vport->idx];
623 	spin_lock_bh(&vport_config->mac_filter_list_lock);
624 
625 	list_for_each_entry(f, &vport_config->user_config.mac_filter_list, list)
626 		f->remove = true;
627 
628 	spin_unlock_bh(&vport_config->mac_filter_list_lock);
629 
630 	idpf_add_del_mac_filters(vport, netdev_priv(vport->netdev),
631 				 false, false);
632 }
633 
634 /**
635  * idpf_deinit_mac_addr - deinitialize mac address for vport
636  * @vport: main vport structure
637  */
idpf_deinit_mac_addr(struct idpf_vport * vport)638 static void idpf_deinit_mac_addr(struct idpf_vport *vport)
639 {
640 	struct idpf_vport_config *vport_config;
641 	struct idpf_mac_filter *f;
642 
643 	vport_config = vport->adapter->vport_config[vport->idx];
644 
645 	spin_lock_bh(&vport_config->mac_filter_list_lock);
646 
647 	f = idpf_find_mac_filter(vport_config, vport->default_mac_addr);
648 	if (f) {
649 		list_del(&f->list);
650 		kfree(f);
651 	}
652 
653 	spin_unlock_bh(&vport_config->mac_filter_list_lock);
654 }
655 
656 /**
657  * idpf_init_mac_addr - initialize mac address for vport
658  * @vport: main vport structure
659  * @netdev: pointer to netdev struct associated with this vport
660  */
idpf_init_mac_addr(struct idpf_vport * vport,struct net_device * netdev)661 static int idpf_init_mac_addr(struct idpf_vport *vport,
662 			      struct net_device *netdev)
663 {
664 	struct idpf_netdev_priv *np = netdev_priv(netdev);
665 	struct idpf_adapter *adapter = vport->adapter;
666 	int err;
667 
668 	if (is_valid_ether_addr(vport->default_mac_addr)) {
669 		eth_hw_addr_set(netdev, vport->default_mac_addr);
670 		ether_addr_copy(netdev->perm_addr, vport->default_mac_addr);
671 
672 		return idpf_add_mac_filter(vport, np, vport->default_mac_addr,
673 					   false);
674 	}
675 
676 	if (!idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS,
677 			     VIRTCHNL2_CAP_MACFILTER)) {
678 		dev_err(&adapter->pdev->dev,
679 			"MAC address is not provided and capability is not set\n");
680 
681 		return -EINVAL;
682 	}
683 
684 	eth_hw_addr_random(netdev);
685 	err = idpf_add_mac_filter(vport, np, netdev->dev_addr, false);
686 	if (err)
687 		return err;
688 
689 	dev_info(&adapter->pdev->dev, "Invalid MAC address %pM, using random %pM\n",
690 		 vport->default_mac_addr, netdev->dev_addr);
691 	ether_addr_copy(vport->default_mac_addr, netdev->dev_addr);
692 
693 	return 0;
694 }
695 
696 /**
697  * idpf_cfg_netdev - Allocate, configure and register a netdev
698  * @vport: main vport structure
699  *
700  * Returns 0 on success, negative value on failure.
701  */
idpf_cfg_netdev(struct idpf_vport * vport)702 static int idpf_cfg_netdev(struct idpf_vport *vport)
703 {
704 	struct idpf_adapter *adapter = vport->adapter;
705 	struct idpf_vport_config *vport_config;
706 	netdev_features_t dflt_features;
707 	netdev_features_t offloads = 0;
708 	struct idpf_netdev_priv *np;
709 	struct net_device *netdev;
710 	u16 idx = vport->idx;
711 	int err;
712 
713 	vport_config = adapter->vport_config[idx];
714 
715 	/* It's possible we already have a netdev allocated and registered for
716 	 * this vport
717 	 */
718 	if (test_bit(IDPF_VPORT_REG_NETDEV, vport_config->flags)) {
719 		netdev = adapter->netdevs[idx];
720 		np = netdev_priv(netdev);
721 		np->vport = vport;
722 		np->vport_idx = vport->idx;
723 		np->vport_id = vport->vport_id;
724 		vport->netdev = netdev;
725 
726 		return idpf_init_mac_addr(vport, netdev);
727 	}
728 
729 	netdev = alloc_etherdev_mqs(sizeof(struct idpf_netdev_priv),
730 				    vport_config->max_q.max_txq,
731 				    vport_config->max_q.max_rxq);
732 	if (!netdev)
733 		return -ENOMEM;
734 
735 	vport->netdev = netdev;
736 	np = netdev_priv(netdev);
737 	np->vport = vport;
738 	np->adapter = adapter;
739 	np->vport_idx = vport->idx;
740 	np->vport_id = vport->vport_id;
741 
742 	spin_lock_init(&np->stats_lock);
743 
744 	err = idpf_init_mac_addr(vport, netdev);
745 	if (err) {
746 		free_netdev(vport->netdev);
747 		vport->netdev = NULL;
748 
749 		return err;
750 	}
751 
752 	/* assign netdev_ops */
753 	netdev->netdev_ops = &idpf_netdev_ops;
754 
755 	/* setup watchdog timeout value to be 5 second */
756 	netdev->watchdog_timeo = 5 * HZ;
757 
758 	netdev->dev_port = idx;
759 
760 	/* configure default MTU size */
761 	netdev->min_mtu = ETH_MIN_MTU;
762 	netdev->max_mtu = vport->max_mtu;
763 
764 	dflt_features = NETIF_F_SG	|
765 			NETIF_F_HIGHDMA;
766 
767 	if (idpf_is_cap_ena_all(adapter, IDPF_RSS_CAPS, IDPF_CAP_RSS))
768 		dflt_features |= NETIF_F_RXHASH;
769 	if (idpf_is_cap_ena_all(adapter, IDPF_CSUM_CAPS, IDPF_CAP_RX_CSUM_L4V4))
770 		dflt_features |= NETIF_F_IP_CSUM;
771 	if (idpf_is_cap_ena_all(adapter, IDPF_CSUM_CAPS, IDPF_CAP_RX_CSUM_L4V6))
772 		dflt_features |= NETIF_F_IPV6_CSUM;
773 	if (idpf_is_cap_ena(adapter, IDPF_CSUM_CAPS, IDPF_CAP_RX_CSUM))
774 		dflt_features |= NETIF_F_RXCSUM;
775 	if (idpf_is_cap_ena_all(adapter, IDPF_CSUM_CAPS, IDPF_CAP_SCTP_CSUM))
776 		dflt_features |= NETIF_F_SCTP_CRC;
777 
778 	if (idpf_is_cap_ena(adapter, IDPF_SEG_CAPS, VIRTCHNL2_CAP_SEG_IPV4_TCP))
779 		dflt_features |= NETIF_F_TSO;
780 	if (idpf_is_cap_ena(adapter, IDPF_SEG_CAPS, VIRTCHNL2_CAP_SEG_IPV6_TCP))
781 		dflt_features |= NETIF_F_TSO6;
782 	if (idpf_is_cap_ena_all(adapter, IDPF_SEG_CAPS,
783 				VIRTCHNL2_CAP_SEG_IPV4_UDP |
784 				VIRTCHNL2_CAP_SEG_IPV6_UDP))
785 		dflt_features |= NETIF_F_GSO_UDP_L4;
786 	if (idpf_is_cap_ena_all(adapter, IDPF_RSC_CAPS, IDPF_CAP_RSC))
787 		offloads |= NETIF_F_GRO_HW;
788 	/* advertise to stack only if offloads for encapsulated packets is
789 	 * supported
790 	 */
791 	if (idpf_is_cap_ena(vport->adapter, IDPF_SEG_CAPS,
792 			    VIRTCHNL2_CAP_SEG_TX_SINGLE_TUNNEL)) {
793 		offloads |= NETIF_F_GSO_UDP_TUNNEL	|
794 			    NETIF_F_GSO_GRE		|
795 			    NETIF_F_GSO_GRE_CSUM	|
796 			    NETIF_F_GSO_PARTIAL		|
797 			    NETIF_F_GSO_UDP_TUNNEL_CSUM	|
798 			    NETIF_F_GSO_IPXIP4		|
799 			    NETIF_F_GSO_IPXIP6		|
800 			    0;
801 
802 		if (!idpf_is_cap_ena_all(vport->adapter, IDPF_CSUM_CAPS,
803 					 IDPF_CAP_TUNNEL_TX_CSUM))
804 			netdev->gso_partial_features |=
805 				NETIF_F_GSO_UDP_TUNNEL_CSUM;
806 
807 		netdev->gso_partial_features |= NETIF_F_GSO_GRE_CSUM;
808 		offloads |= NETIF_F_TSO_MANGLEID;
809 	}
810 	if (idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_LOOPBACK))
811 		offloads |= NETIF_F_LOOPBACK;
812 
813 	netdev->features |= dflt_features;
814 	netdev->hw_features |= dflt_features | offloads;
815 	netdev->hw_enc_features |= dflt_features | offloads;
816 	idpf_set_ethtool_ops(netdev);
817 	SET_NETDEV_DEV(netdev, &adapter->pdev->dev);
818 
819 	/* carrier off on init to avoid Tx hangs */
820 	netif_carrier_off(netdev);
821 
822 	/* make sure transmit queues start off as stopped */
823 	netif_tx_stop_all_queues(netdev);
824 
825 	/* The vport can be arbitrarily released so we need to also track
826 	 * netdevs in the adapter struct
827 	 */
828 	adapter->netdevs[idx] = netdev;
829 
830 	return 0;
831 }
832 
833 /**
834  * idpf_get_free_slot - get the next non-NULL location index in array
835  * @adapter: adapter in which to look for a free vport slot
836  */
idpf_get_free_slot(struct idpf_adapter * adapter)837 static int idpf_get_free_slot(struct idpf_adapter *adapter)
838 {
839 	unsigned int i;
840 
841 	for (i = 0; i < adapter->max_vports; i++) {
842 		if (!adapter->vports[i])
843 			return i;
844 	}
845 
846 	return IDPF_NO_FREE_SLOT;
847 }
848 
849 /**
850  * idpf_remove_features - Turn off feature configs
851  * @vport: virtual port structure
852  */
idpf_remove_features(struct idpf_vport * vport)853 static void idpf_remove_features(struct idpf_vport *vport)
854 {
855 	struct idpf_adapter *adapter = vport->adapter;
856 
857 	if (idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_MACFILTER))
858 		idpf_remove_mac_filters(vport);
859 }
860 
861 /**
862  * idpf_vport_stop - Disable a vport
863  * @vport: vport to disable
864  */
idpf_vport_stop(struct idpf_vport * vport)865 static void idpf_vport_stop(struct idpf_vport *vport)
866 {
867 	struct idpf_netdev_priv *np = netdev_priv(vport->netdev);
868 
869 	if (np->state <= __IDPF_VPORT_DOWN)
870 		return;
871 
872 	netif_carrier_off(vport->netdev);
873 	netif_tx_disable(vport->netdev);
874 
875 	idpf_send_disable_vport_msg(vport);
876 	idpf_send_disable_queues_msg(vport);
877 	idpf_send_map_unmap_queue_vector_msg(vport, false);
878 	/* Normally we ask for queues in create_vport, but if the number of
879 	 * initially requested queues have changed, for example via ethtool
880 	 * set channels, we do delete queues and then add the queues back
881 	 * instead of deleting and reallocating the vport.
882 	 */
883 	if (test_and_clear_bit(IDPF_VPORT_DEL_QUEUES, vport->flags))
884 		idpf_send_delete_queues_msg(vport);
885 
886 	idpf_remove_features(vport);
887 
888 	vport->link_up = false;
889 	idpf_vport_intr_deinit(vport);
890 	idpf_vport_queues_rel(vport);
891 	idpf_vport_intr_rel(vport);
892 	np->state = __IDPF_VPORT_DOWN;
893 }
894 
895 /**
896  * idpf_stop - Disables a network interface
897  * @netdev: network interface device structure
898  *
899  * The stop entry point is called when an interface is de-activated by the OS,
900  * and the netdevice enters the DOWN state.  The hardware is still under the
901  * driver's control, but the netdev interface is disabled.
902  *
903  * Returns success only - not allowed to fail
904  */
idpf_stop(struct net_device * netdev)905 static int idpf_stop(struct net_device *netdev)
906 {
907 	struct idpf_netdev_priv *np = netdev_priv(netdev);
908 	struct idpf_vport *vport;
909 
910 	if (test_bit(IDPF_REMOVE_IN_PROG, np->adapter->flags))
911 		return 0;
912 
913 	idpf_vport_ctrl_lock(netdev);
914 	vport = idpf_netdev_to_vport(netdev);
915 
916 	idpf_vport_stop(vport);
917 
918 	idpf_vport_ctrl_unlock(netdev);
919 
920 	return 0;
921 }
922 
923 /**
924  * idpf_decfg_netdev - Unregister the netdev
925  * @vport: vport for which netdev to be unregistered
926  */
idpf_decfg_netdev(struct idpf_vport * vport)927 static void idpf_decfg_netdev(struct idpf_vport *vport)
928 {
929 	struct idpf_adapter *adapter = vport->adapter;
930 
931 	kfree(vport->rx_ptype_lkup);
932 	vport->rx_ptype_lkup = NULL;
933 
934 	unregister_netdev(vport->netdev);
935 	free_netdev(vport->netdev);
936 	vport->netdev = NULL;
937 
938 	adapter->netdevs[vport->idx] = NULL;
939 }
940 
941 /**
942  * idpf_vport_rel - Delete a vport and free its resources
943  * @vport: the vport being removed
944  */
idpf_vport_rel(struct idpf_vport * vport)945 static void idpf_vport_rel(struct idpf_vport *vport)
946 {
947 	struct idpf_adapter *adapter = vport->adapter;
948 	struct idpf_vport_config *vport_config;
949 	struct idpf_vector_info vec_info;
950 	struct idpf_rss_data *rss_data;
951 	struct idpf_vport_max_q max_q;
952 	u16 idx = vport->idx;
953 
954 	vport_config = adapter->vport_config[vport->idx];
955 	idpf_deinit_rss(vport);
956 	rss_data = &vport_config->user_config.rss_data;
957 	kfree(rss_data->rss_key);
958 	rss_data->rss_key = NULL;
959 
960 	idpf_send_destroy_vport_msg(vport);
961 
962 	/* Release all max queues allocated to the adapter's pool */
963 	max_q.max_rxq = vport_config->max_q.max_rxq;
964 	max_q.max_txq = vport_config->max_q.max_txq;
965 	max_q.max_bufq = vport_config->max_q.max_bufq;
966 	max_q.max_complq = vport_config->max_q.max_complq;
967 	idpf_vport_dealloc_max_qs(adapter, &max_q);
968 
969 	/* Release all the allocated vectors on the stack */
970 	vec_info.num_req_vecs = 0;
971 	vec_info.num_curr_vecs = vport->num_q_vectors;
972 	vec_info.default_vport = vport->default_vport;
973 
974 	idpf_req_rel_vector_indexes(adapter, vport->q_vector_idxs, &vec_info);
975 
976 	kfree(vport->q_vector_idxs);
977 	vport->q_vector_idxs = NULL;
978 
979 	kfree(adapter->vport_params_recvd[idx]);
980 	adapter->vport_params_recvd[idx] = NULL;
981 	kfree(adapter->vport_params_reqd[idx]);
982 	adapter->vport_params_reqd[idx] = NULL;
983 	if (adapter->vport_config[idx]) {
984 		kfree(adapter->vport_config[idx]->req_qs_chunks);
985 		adapter->vport_config[idx]->req_qs_chunks = NULL;
986 	}
987 	kfree(vport);
988 	adapter->num_alloc_vports--;
989 }
990 
991 /**
992  * idpf_vport_dealloc - cleanup and release a given vport
993  * @vport: pointer to idpf vport structure
994  *
995  * returns nothing
996  */
idpf_vport_dealloc(struct idpf_vport * vport)997 static void idpf_vport_dealloc(struct idpf_vport *vport)
998 {
999 	struct idpf_adapter *adapter = vport->adapter;
1000 	unsigned int i = vport->idx;
1001 
1002 	idpf_deinit_mac_addr(vport);
1003 	idpf_vport_stop(vport);
1004 
1005 	if (!test_bit(IDPF_HR_RESET_IN_PROG, adapter->flags))
1006 		idpf_decfg_netdev(vport);
1007 	if (test_bit(IDPF_REMOVE_IN_PROG, adapter->flags))
1008 		idpf_del_all_mac_filters(vport);
1009 
1010 	if (adapter->netdevs[i]) {
1011 		struct idpf_netdev_priv *np = netdev_priv(adapter->netdevs[i]);
1012 
1013 		np->vport = NULL;
1014 	}
1015 
1016 	idpf_vport_rel(vport);
1017 
1018 	adapter->vports[i] = NULL;
1019 	adapter->next_vport = idpf_get_free_slot(adapter);
1020 }
1021 
1022 /**
1023  * idpf_is_hsplit_supported - check whether the header split is supported
1024  * @vport: virtual port to check the capability for
1025  *
1026  * Return: true if it's supported by the HW/FW, false if not.
1027  */
idpf_is_hsplit_supported(const struct idpf_vport * vport)1028 static bool idpf_is_hsplit_supported(const struct idpf_vport *vport)
1029 {
1030 	return idpf_is_queue_model_split(vport->rxq_model) &&
1031 	       idpf_is_cap_ena_all(vport->adapter, IDPF_HSPLIT_CAPS,
1032 				   IDPF_CAP_HSPLIT);
1033 }
1034 
1035 /**
1036  * idpf_vport_get_hsplit - get the current header split feature state
1037  * @vport: virtual port to query the state for
1038  *
1039  * Return: ``ETHTOOL_TCP_DATA_SPLIT_UNKNOWN`` if not supported,
1040  *         ``ETHTOOL_TCP_DATA_SPLIT_DISABLED`` if disabled,
1041  *         ``ETHTOOL_TCP_DATA_SPLIT_ENABLED`` if active.
1042  */
idpf_vport_get_hsplit(const struct idpf_vport * vport)1043 u8 idpf_vport_get_hsplit(const struct idpf_vport *vport)
1044 {
1045 	const struct idpf_vport_user_config_data *config;
1046 
1047 	if (!idpf_is_hsplit_supported(vport))
1048 		return ETHTOOL_TCP_DATA_SPLIT_UNKNOWN;
1049 
1050 	config = &vport->adapter->vport_config[vport->idx]->user_config;
1051 
1052 	return test_bit(__IDPF_USER_FLAG_HSPLIT, config->user_flags) ?
1053 	       ETHTOOL_TCP_DATA_SPLIT_ENABLED :
1054 	       ETHTOOL_TCP_DATA_SPLIT_DISABLED;
1055 }
1056 
1057 /**
1058  * idpf_vport_set_hsplit - enable or disable header split on a given vport
1059  * @vport: virtual port to configure
1060  * @val: Ethtool flag controlling the header split state
1061  *
1062  * Return: true on success, false if not supported by the HW.
1063  */
idpf_vport_set_hsplit(const struct idpf_vport * vport,u8 val)1064 bool idpf_vport_set_hsplit(const struct idpf_vport *vport, u8 val)
1065 {
1066 	struct idpf_vport_user_config_data *config;
1067 
1068 	if (!idpf_is_hsplit_supported(vport))
1069 		return val == ETHTOOL_TCP_DATA_SPLIT_UNKNOWN;
1070 
1071 	config = &vport->adapter->vport_config[vport->idx]->user_config;
1072 
1073 	switch (val) {
1074 	case ETHTOOL_TCP_DATA_SPLIT_UNKNOWN:
1075 		/* Default is to enable */
1076 	case ETHTOOL_TCP_DATA_SPLIT_ENABLED:
1077 		__set_bit(__IDPF_USER_FLAG_HSPLIT, config->user_flags);
1078 		return true;
1079 	case ETHTOOL_TCP_DATA_SPLIT_DISABLED:
1080 		__clear_bit(__IDPF_USER_FLAG_HSPLIT, config->user_flags);
1081 		return true;
1082 	default:
1083 		return false;
1084 	}
1085 }
1086 
1087 /**
1088  * idpf_vport_alloc - Allocates the next available struct vport in the adapter
1089  * @adapter: board private structure
1090  * @max_q: vport max queue info
1091  *
1092  * returns a pointer to a vport on success, NULL on failure.
1093  */
idpf_vport_alloc(struct idpf_adapter * adapter,struct idpf_vport_max_q * max_q)1094 static struct idpf_vport *idpf_vport_alloc(struct idpf_adapter *adapter,
1095 					   struct idpf_vport_max_q *max_q)
1096 {
1097 	struct idpf_rss_data *rss_data;
1098 	u16 idx = adapter->next_vport;
1099 	struct idpf_vport *vport;
1100 	u16 num_max_q;
1101 
1102 	if (idx == IDPF_NO_FREE_SLOT)
1103 		return NULL;
1104 
1105 	vport = kzalloc(sizeof(*vport), GFP_KERNEL);
1106 	if (!vport)
1107 		return vport;
1108 
1109 	if (!adapter->vport_config[idx]) {
1110 		struct idpf_vport_config *vport_config;
1111 
1112 		vport_config = kzalloc(sizeof(*vport_config), GFP_KERNEL);
1113 		if (!vport_config) {
1114 			kfree(vport);
1115 
1116 			return NULL;
1117 		}
1118 
1119 		adapter->vport_config[idx] = vport_config;
1120 	}
1121 
1122 	vport->idx = idx;
1123 	vport->adapter = adapter;
1124 	vport->compln_clean_budget = IDPF_TX_COMPLQ_CLEAN_BUDGET;
1125 	vport->default_vport = adapter->num_alloc_vports <
1126 			       idpf_get_default_vports(adapter);
1127 
1128 	num_max_q = max(max_q->max_txq, max_q->max_rxq);
1129 	vport->q_vector_idxs = kcalloc(num_max_q, sizeof(u16), GFP_KERNEL);
1130 	if (!vport->q_vector_idxs) {
1131 		kfree(vport);
1132 
1133 		return NULL;
1134 	}
1135 	idpf_vport_init(vport, max_q);
1136 
1137 	/* This alloc is done separate from the LUT because it's not strictly
1138 	 * dependent on how many queues we have. If we change number of queues
1139 	 * and soft reset we'll need a new LUT but the key can remain the same
1140 	 * for as long as the vport exists.
1141 	 */
1142 	rss_data = &adapter->vport_config[idx]->user_config.rss_data;
1143 	rss_data->rss_key = kzalloc(rss_data->rss_key_size, GFP_KERNEL);
1144 	if (!rss_data->rss_key) {
1145 		kfree(vport);
1146 
1147 		return NULL;
1148 	}
1149 	/* Initialize default rss key */
1150 	netdev_rss_key_fill((void *)rss_data->rss_key, rss_data->rss_key_size);
1151 
1152 	/* fill vport slot in the adapter struct */
1153 	adapter->vports[idx] = vport;
1154 	adapter->vport_ids[idx] = idpf_get_vport_id(vport);
1155 
1156 	adapter->num_alloc_vports++;
1157 	/* prepare adapter->next_vport for next use */
1158 	adapter->next_vport = idpf_get_free_slot(adapter);
1159 
1160 	return vport;
1161 }
1162 
1163 /**
1164  * idpf_get_stats64 - get statistics for network device structure
1165  * @netdev: network interface device structure
1166  * @stats: main device statistics structure
1167  */
idpf_get_stats64(struct net_device * netdev,struct rtnl_link_stats64 * stats)1168 static void idpf_get_stats64(struct net_device *netdev,
1169 			     struct rtnl_link_stats64 *stats)
1170 {
1171 	struct idpf_netdev_priv *np = netdev_priv(netdev);
1172 
1173 	spin_lock_bh(&np->stats_lock);
1174 	*stats = np->netstats;
1175 	spin_unlock_bh(&np->stats_lock);
1176 }
1177 
1178 /**
1179  * idpf_statistics_task - Delayed task to get statistics over mailbox
1180  * @work: work_struct handle to our data
1181  */
idpf_statistics_task(struct work_struct * work)1182 void idpf_statistics_task(struct work_struct *work)
1183 {
1184 	struct idpf_adapter *adapter;
1185 	int i;
1186 
1187 	adapter = container_of(work, struct idpf_adapter, stats_task.work);
1188 
1189 	for (i = 0; i < adapter->max_vports; i++) {
1190 		struct idpf_vport *vport = adapter->vports[i];
1191 
1192 		if (vport && !test_bit(IDPF_HR_RESET_IN_PROG, adapter->flags))
1193 			idpf_send_get_stats_msg(vport);
1194 	}
1195 
1196 	queue_delayed_work(adapter->stats_wq, &adapter->stats_task,
1197 			   msecs_to_jiffies(10000));
1198 }
1199 
1200 /**
1201  * idpf_mbx_task - Delayed task to handle mailbox responses
1202  * @work: work_struct handle
1203  */
idpf_mbx_task(struct work_struct * work)1204 void idpf_mbx_task(struct work_struct *work)
1205 {
1206 	struct idpf_adapter *adapter;
1207 
1208 	adapter = container_of(work, struct idpf_adapter, mbx_task.work);
1209 
1210 	if (test_bit(IDPF_MB_INTR_MODE, adapter->flags))
1211 		idpf_mb_irq_enable(adapter);
1212 	else
1213 		queue_delayed_work(adapter->mbx_wq, &adapter->mbx_task,
1214 				   msecs_to_jiffies(300));
1215 
1216 	idpf_recv_mb_msg(adapter);
1217 }
1218 
1219 /**
1220  * idpf_service_task - Delayed task for handling mailbox responses
1221  * @work: work_struct handle to our data
1222  *
1223  */
idpf_service_task(struct work_struct * work)1224 void idpf_service_task(struct work_struct *work)
1225 {
1226 	struct idpf_adapter *adapter;
1227 
1228 	adapter = container_of(work, struct idpf_adapter, serv_task.work);
1229 
1230 	if (idpf_is_reset_detected(adapter) &&
1231 	    !idpf_is_reset_in_prog(adapter) &&
1232 	    !test_bit(IDPF_REMOVE_IN_PROG, adapter->flags)) {
1233 		dev_info(&adapter->pdev->dev, "HW reset detected\n");
1234 		set_bit(IDPF_HR_FUNC_RESET, adapter->flags);
1235 		queue_delayed_work(adapter->vc_event_wq,
1236 				   &adapter->vc_event_task,
1237 				   msecs_to_jiffies(10));
1238 	}
1239 
1240 	queue_delayed_work(adapter->serv_wq, &adapter->serv_task,
1241 			   msecs_to_jiffies(300));
1242 }
1243 
1244 /**
1245  * idpf_restore_features - Restore feature configs
1246  * @vport: virtual port structure
1247  */
idpf_restore_features(struct idpf_vport * vport)1248 static void idpf_restore_features(struct idpf_vport *vport)
1249 {
1250 	struct idpf_adapter *adapter = vport->adapter;
1251 
1252 	if (idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_MACFILTER))
1253 		idpf_restore_mac_filters(vport);
1254 }
1255 
1256 /**
1257  * idpf_set_real_num_queues - set number of queues for netdev
1258  * @vport: virtual port structure
1259  *
1260  * Returns 0 on success, negative on failure.
1261  */
idpf_set_real_num_queues(struct idpf_vport * vport)1262 static int idpf_set_real_num_queues(struct idpf_vport *vport)
1263 {
1264 	int err;
1265 
1266 	err = netif_set_real_num_rx_queues(vport->netdev, vport->num_rxq);
1267 	if (err)
1268 		return err;
1269 
1270 	return netif_set_real_num_tx_queues(vport->netdev, vport->num_txq);
1271 }
1272 
1273 /**
1274  * idpf_up_complete - Complete interface up sequence
1275  * @vport: virtual port structure
1276  *
1277  * Returns 0 on success, negative on failure.
1278  */
idpf_up_complete(struct idpf_vport * vport)1279 static int idpf_up_complete(struct idpf_vport *vport)
1280 {
1281 	struct idpf_netdev_priv *np = netdev_priv(vport->netdev);
1282 
1283 	if (vport->link_up && !netif_carrier_ok(vport->netdev)) {
1284 		netif_carrier_on(vport->netdev);
1285 		netif_tx_start_all_queues(vport->netdev);
1286 	}
1287 
1288 	np->state = __IDPF_VPORT_UP;
1289 
1290 	return 0;
1291 }
1292 
1293 /**
1294  * idpf_rx_init_buf_tail - Write initial buffer ring tail value
1295  * @vport: virtual port struct
1296  */
idpf_rx_init_buf_tail(struct idpf_vport * vport)1297 static void idpf_rx_init_buf_tail(struct idpf_vport *vport)
1298 {
1299 	int i, j;
1300 
1301 	for (i = 0; i < vport->num_rxq_grp; i++) {
1302 		struct idpf_rxq_group *grp = &vport->rxq_grps[i];
1303 
1304 		if (idpf_is_queue_model_split(vport->rxq_model)) {
1305 			for (j = 0; j < vport->num_bufqs_per_qgrp; j++) {
1306 				const struct idpf_buf_queue *q =
1307 					&grp->splitq.bufq_sets[j].bufq;
1308 
1309 				writel(q->next_to_alloc, q->tail);
1310 			}
1311 		} else {
1312 			for (j = 0; j < grp->singleq.num_rxq; j++) {
1313 				const struct idpf_rx_queue *q =
1314 					grp->singleq.rxqs[j];
1315 
1316 				writel(q->next_to_alloc, q->tail);
1317 			}
1318 		}
1319 	}
1320 }
1321 
1322 /**
1323  * idpf_vport_open - Bring up a vport
1324  * @vport: vport to bring up
1325  */
idpf_vport_open(struct idpf_vport * vport)1326 static int idpf_vport_open(struct idpf_vport *vport)
1327 {
1328 	struct idpf_netdev_priv *np = netdev_priv(vport->netdev);
1329 	struct idpf_adapter *adapter = vport->adapter;
1330 	struct idpf_vport_config *vport_config;
1331 	int err;
1332 
1333 	if (np->state != __IDPF_VPORT_DOWN)
1334 		return -EBUSY;
1335 
1336 	/* we do not allow interface up just yet */
1337 	netif_carrier_off(vport->netdev);
1338 
1339 	err = idpf_vport_intr_alloc(vport);
1340 	if (err) {
1341 		dev_err(&adapter->pdev->dev, "Failed to allocate interrupts for vport %u: %d\n",
1342 			vport->vport_id, err);
1343 		return err;
1344 	}
1345 
1346 	err = idpf_vport_queues_alloc(vport);
1347 	if (err)
1348 		goto intr_rel;
1349 
1350 	err = idpf_vport_queue_ids_init(vport);
1351 	if (err) {
1352 		dev_err(&adapter->pdev->dev, "Failed to initialize queue ids for vport %u: %d\n",
1353 			vport->vport_id, err);
1354 		goto queues_rel;
1355 	}
1356 
1357 	err = idpf_vport_intr_init(vport);
1358 	if (err) {
1359 		dev_err(&adapter->pdev->dev, "Failed to initialize interrupts for vport %u: %d\n",
1360 			vport->vport_id, err);
1361 		goto queues_rel;
1362 	}
1363 
1364 	err = idpf_rx_bufs_init_all(vport);
1365 	if (err) {
1366 		dev_err(&adapter->pdev->dev, "Failed to initialize RX buffers for vport %u: %d\n",
1367 			vport->vport_id, err);
1368 		goto queues_rel;
1369 	}
1370 
1371 	err = idpf_queue_reg_init(vport);
1372 	if (err) {
1373 		dev_err(&adapter->pdev->dev, "Failed to initialize queue registers for vport %u: %d\n",
1374 			vport->vport_id, err);
1375 		goto queues_rel;
1376 	}
1377 
1378 	idpf_rx_init_buf_tail(vport);
1379 	idpf_vport_intr_ena(vport);
1380 
1381 	err = idpf_send_config_queues_msg(vport);
1382 	if (err) {
1383 		dev_err(&adapter->pdev->dev, "Failed to configure queues for vport %u, %d\n",
1384 			vport->vport_id, err);
1385 		goto intr_deinit;
1386 	}
1387 
1388 	err = idpf_send_map_unmap_queue_vector_msg(vport, true);
1389 	if (err) {
1390 		dev_err(&adapter->pdev->dev, "Failed to map queue vectors for vport %u: %d\n",
1391 			vport->vport_id, err);
1392 		goto intr_deinit;
1393 	}
1394 
1395 	err = idpf_send_enable_queues_msg(vport);
1396 	if (err) {
1397 		dev_err(&adapter->pdev->dev, "Failed to enable queues for vport %u: %d\n",
1398 			vport->vport_id, err);
1399 		goto unmap_queue_vectors;
1400 	}
1401 
1402 	err = idpf_send_enable_vport_msg(vport);
1403 	if (err) {
1404 		dev_err(&adapter->pdev->dev, "Failed to enable vport %u: %d\n",
1405 			vport->vport_id, err);
1406 		err = -EAGAIN;
1407 		goto disable_queues;
1408 	}
1409 
1410 	idpf_restore_features(vport);
1411 
1412 	vport_config = adapter->vport_config[vport->idx];
1413 	if (vport_config->user_config.rss_data.rss_lut)
1414 		err = idpf_config_rss(vport);
1415 	else
1416 		err = idpf_init_rss(vport);
1417 	if (err) {
1418 		dev_err(&adapter->pdev->dev, "Failed to initialize RSS for vport %u: %d\n",
1419 			vport->vport_id, err);
1420 		goto disable_vport;
1421 	}
1422 
1423 	err = idpf_up_complete(vport);
1424 	if (err) {
1425 		dev_err(&adapter->pdev->dev, "Failed to complete interface up for vport %u: %d\n",
1426 			vport->vport_id, err);
1427 		goto deinit_rss;
1428 	}
1429 
1430 	return 0;
1431 
1432 deinit_rss:
1433 	idpf_deinit_rss(vport);
1434 disable_vport:
1435 	idpf_send_disable_vport_msg(vport);
1436 disable_queues:
1437 	idpf_send_disable_queues_msg(vport);
1438 unmap_queue_vectors:
1439 	idpf_send_map_unmap_queue_vector_msg(vport, false);
1440 intr_deinit:
1441 	idpf_vport_intr_deinit(vport);
1442 queues_rel:
1443 	idpf_vport_queues_rel(vport);
1444 intr_rel:
1445 	idpf_vport_intr_rel(vport);
1446 
1447 	return err;
1448 }
1449 
1450 /**
1451  * idpf_init_task - Delayed initialization task
1452  * @work: work_struct handle to our data
1453  *
1454  * Init task finishes up pending work started in probe. Due to the asynchronous
1455  * nature in which the device communicates with hardware, we may have to wait
1456  * several milliseconds to get a response.  Instead of busy polling in probe,
1457  * pulling it out into a delayed work task prevents us from bogging down the
1458  * whole system waiting for a response from hardware.
1459  */
idpf_init_task(struct work_struct * work)1460 void idpf_init_task(struct work_struct *work)
1461 {
1462 	struct idpf_vport_config *vport_config;
1463 	struct idpf_vport_max_q max_q;
1464 	struct idpf_adapter *adapter;
1465 	struct idpf_netdev_priv *np;
1466 	struct idpf_vport *vport;
1467 	u16 num_default_vports;
1468 	struct pci_dev *pdev;
1469 	bool default_vport;
1470 	int index, err;
1471 
1472 	adapter = container_of(work, struct idpf_adapter, init_task.work);
1473 
1474 	num_default_vports = idpf_get_default_vports(adapter);
1475 	if (adapter->num_alloc_vports < num_default_vports)
1476 		default_vport = true;
1477 	else
1478 		default_vport = false;
1479 
1480 	err = idpf_vport_alloc_max_qs(adapter, &max_q);
1481 	if (err)
1482 		goto unwind_vports;
1483 
1484 	err = idpf_send_create_vport_msg(adapter, &max_q);
1485 	if (err) {
1486 		idpf_vport_dealloc_max_qs(adapter, &max_q);
1487 		goto unwind_vports;
1488 	}
1489 
1490 	pdev = adapter->pdev;
1491 	vport = idpf_vport_alloc(adapter, &max_q);
1492 	if (!vport) {
1493 		err = -EFAULT;
1494 		dev_err(&pdev->dev, "failed to allocate vport: %d\n",
1495 			err);
1496 		idpf_vport_dealloc_max_qs(adapter, &max_q);
1497 		goto unwind_vports;
1498 	}
1499 
1500 	index = vport->idx;
1501 	vport_config = adapter->vport_config[index];
1502 
1503 	init_waitqueue_head(&vport->sw_marker_wq);
1504 
1505 	spin_lock_init(&vport_config->mac_filter_list_lock);
1506 
1507 	INIT_LIST_HEAD(&vport_config->user_config.mac_filter_list);
1508 
1509 	err = idpf_check_supported_desc_ids(vport);
1510 	if (err) {
1511 		dev_err(&pdev->dev, "failed to get required descriptor ids\n");
1512 		goto cfg_netdev_err;
1513 	}
1514 
1515 	if (idpf_cfg_netdev(vport))
1516 		goto cfg_netdev_err;
1517 
1518 	err = idpf_send_get_rx_ptype_msg(vport);
1519 	if (err)
1520 		goto handle_err;
1521 
1522 	/* Once state is put into DOWN, driver is ready for dev_open */
1523 	np = netdev_priv(vport->netdev);
1524 	np->state = __IDPF_VPORT_DOWN;
1525 	if (test_and_clear_bit(IDPF_VPORT_UP_REQUESTED, vport_config->flags))
1526 		idpf_vport_open(vport);
1527 
1528 	/* Spawn and return 'idpf_init_task' work queue until all the
1529 	 * default vports are created
1530 	 */
1531 	if (adapter->num_alloc_vports < num_default_vports) {
1532 		queue_delayed_work(adapter->init_wq, &adapter->init_task,
1533 				   msecs_to_jiffies(5 * (adapter->pdev->devfn & 0x07)));
1534 
1535 		return;
1536 	}
1537 
1538 	for (index = 0; index < adapter->max_vports; index++) {
1539 		if (adapter->netdevs[index] &&
1540 		    !test_bit(IDPF_VPORT_REG_NETDEV,
1541 			      adapter->vport_config[index]->flags)) {
1542 			register_netdev(adapter->netdevs[index]);
1543 			set_bit(IDPF_VPORT_REG_NETDEV,
1544 				adapter->vport_config[index]->flags);
1545 		}
1546 	}
1547 
1548 	/* As all the required vports are created, clear the reset flag
1549 	 * unconditionally here in case we were in reset and the link was down.
1550 	 */
1551 	clear_bit(IDPF_HR_RESET_IN_PROG, adapter->flags);
1552 	/* Start the statistics task now */
1553 	queue_delayed_work(adapter->stats_wq, &adapter->stats_task,
1554 			   msecs_to_jiffies(10 * (pdev->devfn & 0x07)));
1555 
1556 	return;
1557 
1558 handle_err:
1559 	idpf_decfg_netdev(vport);
1560 cfg_netdev_err:
1561 	idpf_vport_rel(vport);
1562 	adapter->vports[index] = NULL;
1563 unwind_vports:
1564 	if (default_vport) {
1565 		for (index = 0; index < adapter->max_vports; index++) {
1566 			if (adapter->vports[index])
1567 				idpf_vport_dealloc(adapter->vports[index]);
1568 		}
1569 	}
1570 	clear_bit(IDPF_HR_RESET_IN_PROG, adapter->flags);
1571 }
1572 
1573 /**
1574  * idpf_sriov_ena - Enable or change number of VFs
1575  * @adapter: private data struct
1576  * @num_vfs: number of VFs to allocate
1577  */
idpf_sriov_ena(struct idpf_adapter * adapter,int num_vfs)1578 static int idpf_sriov_ena(struct idpf_adapter *adapter, int num_vfs)
1579 {
1580 	struct device *dev = &adapter->pdev->dev;
1581 	int err;
1582 
1583 	err = idpf_send_set_sriov_vfs_msg(adapter, num_vfs);
1584 	if (err) {
1585 		dev_err(dev, "Failed to allocate VFs: %d\n", err);
1586 
1587 		return err;
1588 	}
1589 
1590 	err = pci_enable_sriov(adapter->pdev, num_vfs);
1591 	if (err) {
1592 		idpf_send_set_sriov_vfs_msg(adapter, 0);
1593 		dev_err(dev, "Failed to enable SR-IOV: %d\n", err);
1594 
1595 		return err;
1596 	}
1597 
1598 	adapter->num_vfs = num_vfs;
1599 
1600 	return num_vfs;
1601 }
1602 
1603 /**
1604  * idpf_sriov_configure - Configure the requested VFs
1605  * @pdev: pointer to a pci_dev structure
1606  * @num_vfs: number of vfs to allocate
1607  *
1608  * Enable or change the number of VFs. Called when the user updates the number
1609  * of VFs in sysfs.
1610  **/
idpf_sriov_configure(struct pci_dev * pdev,int num_vfs)1611 int idpf_sriov_configure(struct pci_dev *pdev, int num_vfs)
1612 {
1613 	struct idpf_adapter *adapter = pci_get_drvdata(pdev);
1614 
1615 	if (!idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_SRIOV)) {
1616 		dev_info(&pdev->dev, "SR-IOV is not supported on this device\n");
1617 
1618 		return -EOPNOTSUPP;
1619 	}
1620 
1621 	if (num_vfs)
1622 		return idpf_sriov_ena(adapter, num_vfs);
1623 
1624 	if (pci_vfs_assigned(pdev)) {
1625 		dev_warn(&pdev->dev, "Unable to free VFs because some are assigned to VMs\n");
1626 
1627 		return -EBUSY;
1628 	}
1629 
1630 	pci_disable_sriov(adapter->pdev);
1631 	idpf_send_set_sriov_vfs_msg(adapter, 0);
1632 	adapter->num_vfs = 0;
1633 
1634 	return 0;
1635 }
1636 
1637 /**
1638  * idpf_deinit_task - Device deinit routine
1639  * @adapter: Driver specific private structure
1640  *
1641  * Extended remove logic which will be used for
1642  * hard reset as well
1643  */
idpf_deinit_task(struct idpf_adapter * adapter)1644 void idpf_deinit_task(struct idpf_adapter *adapter)
1645 {
1646 	unsigned int i;
1647 
1648 	/* Wait until the init_task is done else this thread might release
1649 	 * the resources first and the other thread might end up in a bad state
1650 	 */
1651 	cancel_delayed_work_sync(&adapter->init_task);
1652 
1653 	if (!adapter->vports)
1654 		return;
1655 
1656 	cancel_delayed_work_sync(&adapter->stats_task);
1657 
1658 	for (i = 0; i < adapter->max_vports; i++) {
1659 		if (adapter->vports[i])
1660 			idpf_vport_dealloc(adapter->vports[i]);
1661 	}
1662 }
1663 
1664 /**
1665  * idpf_check_reset_complete - check that reset is complete
1666  * @hw: pointer to hw struct
1667  * @reset_reg: struct with reset registers
1668  *
1669  * Returns 0 if device is ready to use, or -EBUSY if it's in reset.
1670  **/
idpf_check_reset_complete(struct idpf_hw * hw,struct idpf_reset_reg * reset_reg)1671 static int idpf_check_reset_complete(struct idpf_hw *hw,
1672 				     struct idpf_reset_reg *reset_reg)
1673 {
1674 	struct idpf_adapter *adapter = hw->back;
1675 	int i;
1676 
1677 	for (i = 0; i < 2000; i++) {
1678 		u32 reg_val = readl(reset_reg->rstat);
1679 
1680 		/* 0xFFFFFFFF might be read if other side hasn't cleared the
1681 		 * register for us yet and 0xFFFFFFFF is not a valid value for
1682 		 * the register, so treat that as invalid.
1683 		 */
1684 		if (reg_val != 0xFFFFFFFF && (reg_val & reset_reg->rstat_m))
1685 			return 0;
1686 
1687 		usleep_range(5000, 10000);
1688 	}
1689 
1690 	dev_warn(&adapter->pdev->dev, "Device reset timeout!\n");
1691 	/* Clear the reset flag unconditionally here since the reset
1692 	 * technically isn't in progress anymore from the driver's perspective
1693 	 */
1694 	clear_bit(IDPF_HR_RESET_IN_PROG, adapter->flags);
1695 
1696 	return -EBUSY;
1697 }
1698 
1699 /**
1700  * idpf_set_vport_state - Set the vport state to be after the reset
1701  * @adapter: Driver specific private structure
1702  */
idpf_set_vport_state(struct idpf_adapter * adapter)1703 static void idpf_set_vport_state(struct idpf_adapter *adapter)
1704 {
1705 	u16 i;
1706 
1707 	for (i = 0; i < adapter->max_vports; i++) {
1708 		struct idpf_netdev_priv *np;
1709 
1710 		if (!adapter->netdevs[i])
1711 			continue;
1712 
1713 		np = netdev_priv(adapter->netdevs[i]);
1714 		if (np->state == __IDPF_VPORT_UP)
1715 			set_bit(IDPF_VPORT_UP_REQUESTED,
1716 				adapter->vport_config[i]->flags);
1717 	}
1718 }
1719 
1720 /**
1721  * idpf_init_hard_reset - Initiate a hardware reset
1722  * @adapter: Driver specific private structure
1723  *
1724  * Deallocate the vports and all the resources associated with them and
1725  * reallocate. Also reinitialize the mailbox. Return 0 on success,
1726  * negative on failure.
1727  */
idpf_init_hard_reset(struct idpf_adapter * adapter)1728 static int idpf_init_hard_reset(struct idpf_adapter *adapter)
1729 {
1730 	struct idpf_reg_ops *reg_ops = &adapter->dev_ops.reg_ops;
1731 	struct device *dev = &adapter->pdev->dev;
1732 	struct net_device *netdev;
1733 	int err;
1734 	u16 i;
1735 
1736 	mutex_lock(&adapter->vport_ctrl_lock);
1737 
1738 	dev_info(dev, "Device HW Reset initiated\n");
1739 
1740 	/* Avoid TX hangs on reset */
1741 	for (i = 0; i < adapter->max_vports; i++) {
1742 		netdev = adapter->netdevs[i];
1743 		if (!netdev)
1744 			continue;
1745 
1746 		netif_carrier_off(netdev);
1747 		netif_tx_disable(netdev);
1748 	}
1749 
1750 	/* Prepare for reset */
1751 	if (test_and_clear_bit(IDPF_HR_DRV_LOAD, adapter->flags)) {
1752 		reg_ops->trigger_reset(adapter, IDPF_HR_DRV_LOAD);
1753 	} else if (test_and_clear_bit(IDPF_HR_FUNC_RESET, adapter->flags)) {
1754 		bool is_reset = idpf_is_reset_detected(adapter);
1755 
1756 		idpf_set_vport_state(adapter);
1757 		idpf_vc_core_deinit(adapter);
1758 		if (!is_reset)
1759 			reg_ops->trigger_reset(adapter, IDPF_HR_FUNC_RESET);
1760 		idpf_deinit_dflt_mbx(adapter);
1761 	} else {
1762 		dev_err(dev, "Unhandled hard reset cause\n");
1763 		err = -EBADRQC;
1764 		goto unlock_mutex;
1765 	}
1766 
1767 	/* Wait for reset to complete */
1768 	err = idpf_check_reset_complete(&adapter->hw, &adapter->reset_reg);
1769 	if (err) {
1770 		dev_err(dev, "The driver was unable to contact the device's firmware. Check that the FW is running. Driver state= 0x%x\n",
1771 			adapter->state);
1772 		goto unlock_mutex;
1773 	}
1774 
1775 	/* Reset is complete and so start building the driver resources again */
1776 	err = idpf_init_dflt_mbx(adapter);
1777 	if (err) {
1778 		dev_err(dev, "Failed to initialize default mailbox: %d\n", err);
1779 		goto unlock_mutex;
1780 	}
1781 
1782 	queue_delayed_work(adapter->mbx_wq, &adapter->mbx_task, 0);
1783 
1784 	/* Initialize the state machine, also allocate memory and request
1785 	 * resources
1786 	 */
1787 	err = idpf_vc_core_init(adapter);
1788 	if (err) {
1789 		cancel_delayed_work_sync(&adapter->mbx_task);
1790 		idpf_deinit_dflt_mbx(adapter);
1791 		goto unlock_mutex;
1792 	}
1793 
1794 	/* Wait till all the vports are initialized to release the reset lock,
1795 	 * else user space callbacks may access uninitialized vports
1796 	 */
1797 	while (test_bit(IDPF_HR_RESET_IN_PROG, adapter->flags))
1798 		msleep(100);
1799 
1800 unlock_mutex:
1801 	mutex_unlock(&adapter->vport_ctrl_lock);
1802 
1803 	return err;
1804 }
1805 
1806 /**
1807  * idpf_vc_event_task - Handle virtchannel event logic
1808  * @work: work queue struct
1809  */
idpf_vc_event_task(struct work_struct * work)1810 void idpf_vc_event_task(struct work_struct *work)
1811 {
1812 	struct idpf_adapter *adapter;
1813 
1814 	adapter = container_of(work, struct idpf_adapter, vc_event_task.work);
1815 
1816 	if (test_bit(IDPF_REMOVE_IN_PROG, adapter->flags))
1817 		return;
1818 
1819 	if (test_bit(IDPF_HR_FUNC_RESET, adapter->flags) ||
1820 	    test_bit(IDPF_HR_DRV_LOAD, adapter->flags)) {
1821 		set_bit(IDPF_HR_RESET_IN_PROG, adapter->flags);
1822 		idpf_init_hard_reset(adapter);
1823 	}
1824 }
1825 
1826 /**
1827  * idpf_initiate_soft_reset - Initiate a software reset
1828  * @vport: virtual port data struct
1829  * @reset_cause: reason for the soft reset
1830  *
1831  * Soft reset only reallocs vport queue resources. Returns 0 on success,
1832  * negative on failure.
1833  */
idpf_initiate_soft_reset(struct idpf_vport * vport,enum idpf_vport_reset_cause reset_cause)1834 int idpf_initiate_soft_reset(struct idpf_vport *vport,
1835 			     enum idpf_vport_reset_cause reset_cause)
1836 {
1837 	struct idpf_netdev_priv *np = netdev_priv(vport->netdev);
1838 	enum idpf_vport_state current_state = np->state;
1839 	struct idpf_adapter *adapter = vport->adapter;
1840 	struct idpf_vport *new_vport;
1841 	int err;
1842 
1843 	/* If the system is low on memory, we can end up in bad state if we
1844 	 * free all the memory for queue resources and try to allocate them
1845 	 * again. Instead, we can pre-allocate the new resources before doing
1846 	 * anything and bailing if the alloc fails.
1847 	 *
1848 	 * Make a clone of the existing vport to mimic its current
1849 	 * configuration, then modify the new structure with any requested
1850 	 * changes. Once the allocation of the new resources is done, stop the
1851 	 * existing vport and copy the configuration to the main vport. If an
1852 	 * error occurred, the existing vport will be untouched.
1853 	 *
1854 	 */
1855 	new_vport = kzalloc(sizeof(*vport), GFP_KERNEL);
1856 	if (!new_vport)
1857 		return -ENOMEM;
1858 
1859 	/* This purposely avoids copying the end of the struct because it
1860 	 * contains wait_queues and mutexes and other stuff we don't want to
1861 	 * mess with. Nothing below should use those variables from new_vport
1862 	 * and should instead always refer to them in vport if they need to.
1863 	 */
1864 	memcpy(new_vport, vport, offsetof(struct idpf_vport, link_up));
1865 
1866 	/* Adjust resource parameters prior to reallocating resources */
1867 	switch (reset_cause) {
1868 	case IDPF_SR_Q_CHANGE:
1869 		err = idpf_vport_adjust_qs(new_vport);
1870 		if (err)
1871 			goto free_vport;
1872 		break;
1873 	case IDPF_SR_Q_DESC_CHANGE:
1874 		/* Update queue parameters before allocating resources */
1875 		idpf_vport_calc_num_q_desc(new_vport);
1876 		break;
1877 	case IDPF_SR_MTU_CHANGE:
1878 	case IDPF_SR_RSC_CHANGE:
1879 		break;
1880 	default:
1881 		dev_err(&adapter->pdev->dev, "Unhandled soft reset cause\n");
1882 		err = -EINVAL;
1883 		goto free_vport;
1884 	}
1885 
1886 	if (current_state <= __IDPF_VPORT_DOWN) {
1887 		idpf_send_delete_queues_msg(vport);
1888 	} else {
1889 		set_bit(IDPF_VPORT_DEL_QUEUES, vport->flags);
1890 		idpf_vport_stop(vport);
1891 	}
1892 
1893 	idpf_deinit_rss(vport);
1894 	/* We're passing in vport here because we need its wait_queue
1895 	 * to send a message and it should be getting all the vport
1896 	 * config data out of the adapter but we need to be careful not
1897 	 * to add code to add_queues to change the vport config within
1898 	 * vport itself as it will be wiped with a memcpy later.
1899 	 */
1900 	err = idpf_send_add_queues_msg(vport, new_vport->num_txq,
1901 				       new_vport->num_complq,
1902 				       new_vport->num_rxq,
1903 				       new_vport->num_bufq);
1904 	if (err)
1905 		goto err_reset;
1906 
1907 	/* Same comment as above regarding avoiding copying the wait_queues and
1908 	 * mutexes applies here. We do not want to mess with those if possible.
1909 	 */
1910 	memcpy(vport, new_vport, offsetof(struct idpf_vport, link_up));
1911 
1912 	if (reset_cause == IDPF_SR_Q_CHANGE)
1913 		idpf_vport_alloc_vec_indexes(vport);
1914 
1915 	err = idpf_set_real_num_queues(vport);
1916 	if (err)
1917 		goto err_open;
1918 
1919 	if (current_state == __IDPF_VPORT_UP)
1920 		err = idpf_vport_open(vport);
1921 
1922 	kfree(new_vport);
1923 
1924 	return err;
1925 
1926 err_reset:
1927 	idpf_send_add_queues_msg(vport, vport->num_txq, vport->num_complq,
1928 				 vport->num_rxq, vport->num_bufq);
1929 
1930 err_open:
1931 	if (current_state == __IDPF_VPORT_UP)
1932 		idpf_vport_open(vport);
1933 
1934 free_vport:
1935 	kfree(new_vport);
1936 
1937 	return err;
1938 }
1939 
1940 /**
1941  * idpf_addr_sync - Callback for dev_(mc|uc)_sync to add address
1942  * @netdev: the netdevice
1943  * @addr: address to add
1944  *
1945  * Called by __dev_(mc|uc)_sync when an address needs to be added. We call
1946  * __dev_(uc|mc)_sync from .set_rx_mode. Kernel takes addr_list_lock spinlock
1947  * meaning we cannot sleep in this context. Due to this, we have to add the
1948  * filter and send the virtchnl message asynchronously without waiting for the
1949  * response from the other side. We won't know whether or not the operation
1950  * actually succeeded until we get the message back.  Returns 0 on success,
1951  * negative on failure.
1952  */
idpf_addr_sync(struct net_device * netdev,const u8 * addr)1953 static int idpf_addr_sync(struct net_device *netdev, const u8 *addr)
1954 {
1955 	struct idpf_netdev_priv *np = netdev_priv(netdev);
1956 
1957 	return idpf_add_mac_filter(np->vport, np, addr, true);
1958 }
1959 
1960 /**
1961  * idpf_addr_unsync - Callback for dev_(mc|uc)_sync to remove address
1962  * @netdev: the netdevice
1963  * @addr: address to add
1964  *
1965  * Called by __dev_(mc|uc)_sync when an address needs to be added. We call
1966  * __dev_(uc|mc)_sync from .set_rx_mode. Kernel takes addr_list_lock spinlock
1967  * meaning we cannot sleep in this context. Due to this we have to delete the
1968  * filter and send the virtchnl message asynchronously without waiting for the
1969  * return from the other side.  We won't know whether or not the operation
1970  * actually succeeded until we get the message back. Returns 0 on success,
1971  * negative on failure.
1972  */
idpf_addr_unsync(struct net_device * netdev,const u8 * addr)1973 static int idpf_addr_unsync(struct net_device *netdev, const u8 *addr)
1974 {
1975 	struct idpf_netdev_priv *np = netdev_priv(netdev);
1976 
1977 	/* Under some circumstances, we might receive a request to delete
1978 	 * our own device address from our uc list. Because we store the
1979 	 * device address in the VSI's MAC filter list, we need to ignore
1980 	 * such requests and not delete our device address from this list.
1981 	 */
1982 	if (ether_addr_equal(addr, netdev->dev_addr))
1983 		return 0;
1984 
1985 	idpf_del_mac_filter(np->vport, np, addr, true);
1986 
1987 	return 0;
1988 }
1989 
1990 /**
1991  * idpf_set_rx_mode - NDO callback to set the netdev filters
1992  * @netdev: network interface device structure
1993  *
1994  * Stack takes addr_list_lock spinlock before calling our .set_rx_mode.  We
1995  * cannot sleep in this context.
1996  */
idpf_set_rx_mode(struct net_device * netdev)1997 static void idpf_set_rx_mode(struct net_device *netdev)
1998 {
1999 	struct idpf_netdev_priv *np = netdev_priv(netdev);
2000 	struct idpf_vport_user_config_data *config_data;
2001 	struct idpf_adapter *adapter;
2002 	bool changed = false;
2003 	struct device *dev;
2004 	int err;
2005 
2006 	adapter = np->adapter;
2007 	dev = &adapter->pdev->dev;
2008 
2009 	if (idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_MACFILTER)) {
2010 		__dev_uc_sync(netdev, idpf_addr_sync, idpf_addr_unsync);
2011 		__dev_mc_sync(netdev, idpf_addr_sync, idpf_addr_unsync);
2012 	}
2013 
2014 	if (!idpf_is_cap_ena(adapter, IDPF_OTHER_CAPS, VIRTCHNL2_CAP_PROMISC))
2015 		return;
2016 
2017 	config_data = &adapter->vport_config[np->vport_idx]->user_config;
2018 	/* IFF_PROMISC enables both unicast and multicast promiscuous,
2019 	 * while IFF_ALLMULTI only enables multicast such that:
2020 	 *
2021 	 * promisc  + allmulti		= unicast | multicast
2022 	 * promisc  + !allmulti		= unicast | multicast
2023 	 * !promisc + allmulti		= multicast
2024 	 */
2025 	if ((netdev->flags & IFF_PROMISC) &&
2026 	    !test_and_set_bit(__IDPF_PROMISC_UC, config_data->user_flags)) {
2027 		changed = true;
2028 		dev_info(&adapter->pdev->dev, "Entering promiscuous mode\n");
2029 		if (!test_and_set_bit(__IDPF_PROMISC_MC, adapter->flags))
2030 			dev_info(dev, "Entering multicast promiscuous mode\n");
2031 	}
2032 
2033 	if (!(netdev->flags & IFF_PROMISC) &&
2034 	    test_and_clear_bit(__IDPF_PROMISC_UC, config_data->user_flags)) {
2035 		changed = true;
2036 		dev_info(dev, "Leaving promiscuous mode\n");
2037 	}
2038 
2039 	if (netdev->flags & IFF_ALLMULTI &&
2040 	    !test_and_set_bit(__IDPF_PROMISC_MC, config_data->user_flags)) {
2041 		changed = true;
2042 		dev_info(dev, "Entering multicast promiscuous mode\n");
2043 	}
2044 
2045 	if (!(netdev->flags & (IFF_ALLMULTI | IFF_PROMISC)) &&
2046 	    test_and_clear_bit(__IDPF_PROMISC_MC, config_data->user_flags)) {
2047 		changed = true;
2048 		dev_info(dev, "Leaving multicast promiscuous mode\n");
2049 	}
2050 
2051 	if (!changed)
2052 		return;
2053 
2054 	err = idpf_set_promiscuous(adapter, config_data, np->vport_id);
2055 	if (err)
2056 		dev_err(dev, "Failed to set promiscuous mode: %d\n", err);
2057 }
2058 
2059 /**
2060  * idpf_vport_manage_rss_lut - disable/enable RSS
2061  * @vport: the vport being changed
2062  *
2063  * In the event of disable request for RSS, this function will zero out RSS
2064  * LUT, while in the event of enable request for RSS, it will reconfigure RSS
2065  * LUT with the default LUT configuration.
2066  */
idpf_vport_manage_rss_lut(struct idpf_vport * vport)2067 static int idpf_vport_manage_rss_lut(struct idpf_vport *vport)
2068 {
2069 	bool ena = idpf_is_feature_ena(vport, NETIF_F_RXHASH);
2070 	struct idpf_rss_data *rss_data;
2071 	u16 idx = vport->idx;
2072 	int lut_size;
2073 
2074 	rss_data = &vport->adapter->vport_config[idx]->user_config.rss_data;
2075 	lut_size = rss_data->rss_lut_size * sizeof(u32);
2076 
2077 	if (ena) {
2078 		/* This will contain the default or user configured LUT */
2079 		memcpy(rss_data->rss_lut, rss_data->cached_lut, lut_size);
2080 	} else {
2081 		/* Save a copy of the current LUT to be restored later if
2082 		 * requested.
2083 		 */
2084 		memcpy(rss_data->cached_lut, rss_data->rss_lut, lut_size);
2085 
2086 		/* Zero out the current LUT to disable */
2087 		memset(rss_data->rss_lut, 0, lut_size);
2088 	}
2089 
2090 	return idpf_config_rss(vport);
2091 }
2092 
2093 /**
2094  * idpf_set_features - set the netdev feature flags
2095  * @netdev: ptr to the netdev being adjusted
2096  * @features: the feature set that the stack is suggesting
2097  */
idpf_set_features(struct net_device * netdev,netdev_features_t features)2098 static int idpf_set_features(struct net_device *netdev,
2099 			     netdev_features_t features)
2100 {
2101 	netdev_features_t changed = netdev->features ^ features;
2102 	struct idpf_adapter *adapter;
2103 	struct idpf_vport *vport;
2104 	int err = 0;
2105 
2106 	idpf_vport_ctrl_lock(netdev);
2107 	vport = idpf_netdev_to_vport(netdev);
2108 
2109 	adapter = vport->adapter;
2110 
2111 	if (idpf_is_reset_in_prog(adapter)) {
2112 		dev_err(&adapter->pdev->dev, "Device is resetting, changing netdev features temporarily unavailable.\n");
2113 		err = -EBUSY;
2114 		goto unlock_mutex;
2115 	}
2116 
2117 	if (changed & NETIF_F_RXHASH) {
2118 		netdev->features ^= NETIF_F_RXHASH;
2119 		err = idpf_vport_manage_rss_lut(vport);
2120 		if (err)
2121 			goto unlock_mutex;
2122 	}
2123 
2124 	if (changed & NETIF_F_GRO_HW) {
2125 		netdev->features ^= NETIF_F_GRO_HW;
2126 		err = idpf_initiate_soft_reset(vport, IDPF_SR_RSC_CHANGE);
2127 		if (err)
2128 			goto unlock_mutex;
2129 	}
2130 
2131 	if (changed & NETIF_F_LOOPBACK) {
2132 		netdev->features ^= NETIF_F_LOOPBACK;
2133 		err = idpf_send_ena_dis_loopback_msg(vport);
2134 	}
2135 
2136 unlock_mutex:
2137 	idpf_vport_ctrl_unlock(netdev);
2138 
2139 	return err;
2140 }
2141 
2142 /**
2143  * idpf_open - Called when a network interface becomes active
2144  * @netdev: network interface device structure
2145  *
2146  * The open entry point is called when a network interface is made
2147  * active by the system (IFF_UP).  At this point all resources needed
2148  * for transmit and receive operations are allocated, the interrupt
2149  * handler is registered with the OS, the netdev watchdog is enabled,
2150  * and the stack is notified that the interface is ready.
2151  *
2152  * Returns 0 on success, negative value on failure
2153  */
idpf_open(struct net_device * netdev)2154 static int idpf_open(struct net_device *netdev)
2155 {
2156 	struct idpf_vport *vport;
2157 	int err;
2158 
2159 	idpf_vport_ctrl_lock(netdev);
2160 	vport = idpf_netdev_to_vport(netdev);
2161 
2162 	err = idpf_vport_open(vport);
2163 
2164 	idpf_vport_ctrl_unlock(netdev);
2165 
2166 	return err;
2167 }
2168 
2169 /**
2170  * idpf_change_mtu - NDO callback to change the MTU
2171  * @netdev: network interface device structure
2172  * @new_mtu: new value for maximum frame size
2173  *
2174  * Returns 0 on success, negative on failure
2175  */
idpf_change_mtu(struct net_device * netdev,int new_mtu)2176 static int idpf_change_mtu(struct net_device *netdev, int new_mtu)
2177 {
2178 	struct idpf_vport *vport;
2179 	int err;
2180 
2181 	idpf_vport_ctrl_lock(netdev);
2182 	vport = idpf_netdev_to_vport(netdev);
2183 
2184 	WRITE_ONCE(netdev->mtu, new_mtu);
2185 
2186 	err = idpf_initiate_soft_reset(vport, IDPF_SR_MTU_CHANGE);
2187 
2188 	idpf_vport_ctrl_unlock(netdev);
2189 
2190 	return err;
2191 }
2192 
2193 /**
2194  * idpf_features_check - Validate packet conforms to limits
2195  * @skb: skb buffer
2196  * @netdev: This port's netdev
2197  * @features: Offload features that the stack believes apply
2198  */
idpf_features_check(struct sk_buff * skb,struct net_device * netdev,netdev_features_t features)2199 static netdev_features_t idpf_features_check(struct sk_buff *skb,
2200 					     struct net_device *netdev,
2201 					     netdev_features_t features)
2202 {
2203 	struct idpf_vport *vport = idpf_netdev_to_vport(netdev);
2204 	struct idpf_adapter *adapter = vport->adapter;
2205 	size_t len;
2206 
2207 	/* No point in doing any of this if neither checksum nor GSO are
2208 	 * being requested for this frame.  We can rule out both by just
2209 	 * checking for CHECKSUM_PARTIAL
2210 	 */
2211 	if (skb->ip_summed != CHECKSUM_PARTIAL)
2212 		return features;
2213 
2214 	/* We cannot support GSO if the MSS is going to be less than
2215 	 * 88 bytes. If it is then we need to drop support for GSO.
2216 	 */
2217 	if (skb_is_gso(skb) &&
2218 	    (skb_shinfo(skb)->gso_size < IDPF_TX_TSO_MIN_MSS))
2219 		features &= ~NETIF_F_GSO_MASK;
2220 
2221 	/* Ensure MACLEN is <= 126 bytes (63 words) and not an odd size */
2222 	len = skb_network_offset(skb);
2223 	if (unlikely(len & ~(126)))
2224 		goto unsupported;
2225 
2226 	len = skb_network_header_len(skb);
2227 	if (unlikely(len > idpf_get_max_tx_hdr_size(adapter)))
2228 		goto unsupported;
2229 
2230 	if (!skb->encapsulation)
2231 		return features;
2232 
2233 	/* L4TUNLEN can support 127 words */
2234 	len = skb_inner_network_header(skb) - skb_transport_header(skb);
2235 	if (unlikely(len & ~(127 * 2)))
2236 		goto unsupported;
2237 
2238 	/* IPLEN can support at most 127 dwords */
2239 	len = skb_inner_network_header_len(skb);
2240 	if (unlikely(len > idpf_get_max_tx_hdr_size(adapter)))
2241 		goto unsupported;
2242 
2243 	/* No need to validate L4LEN as TCP is the only protocol with a
2244 	 * a flexible value and we support all possible values supported
2245 	 * by TCP, which is at most 15 dwords
2246 	 */
2247 
2248 	return features;
2249 
2250 unsupported:
2251 	return features & ~(NETIF_F_CSUM_MASK | NETIF_F_GSO_MASK);
2252 }
2253 
2254 /**
2255  * idpf_set_mac - NDO callback to set port mac address
2256  * @netdev: network interface device structure
2257  * @p: pointer to an address structure
2258  *
2259  * Returns 0 on success, negative on failure
2260  **/
idpf_set_mac(struct net_device * netdev,void * p)2261 static int idpf_set_mac(struct net_device *netdev, void *p)
2262 {
2263 	struct idpf_netdev_priv *np = netdev_priv(netdev);
2264 	struct idpf_vport_config *vport_config;
2265 	struct sockaddr *addr = p;
2266 	struct idpf_vport *vport;
2267 	int err = 0;
2268 
2269 	idpf_vport_ctrl_lock(netdev);
2270 	vport = idpf_netdev_to_vport(netdev);
2271 
2272 	if (!idpf_is_cap_ena(vport->adapter, IDPF_OTHER_CAPS,
2273 			     VIRTCHNL2_CAP_MACFILTER)) {
2274 		dev_info(&vport->adapter->pdev->dev, "Setting MAC address is not supported\n");
2275 		err = -EOPNOTSUPP;
2276 		goto unlock_mutex;
2277 	}
2278 
2279 	if (!is_valid_ether_addr(addr->sa_data)) {
2280 		dev_info(&vport->adapter->pdev->dev, "Invalid MAC address: %pM\n",
2281 			 addr->sa_data);
2282 		err = -EADDRNOTAVAIL;
2283 		goto unlock_mutex;
2284 	}
2285 
2286 	if (ether_addr_equal(netdev->dev_addr, addr->sa_data))
2287 		goto unlock_mutex;
2288 
2289 	vport_config = vport->adapter->vport_config[vport->idx];
2290 	err = idpf_add_mac_filter(vport, np, addr->sa_data, false);
2291 	if (err) {
2292 		__idpf_del_mac_filter(vport_config, addr->sa_data);
2293 		goto unlock_mutex;
2294 	}
2295 
2296 	if (is_valid_ether_addr(vport->default_mac_addr))
2297 		idpf_del_mac_filter(vport, np, vport->default_mac_addr, false);
2298 
2299 	ether_addr_copy(vport->default_mac_addr, addr->sa_data);
2300 	eth_hw_addr_set(netdev, addr->sa_data);
2301 
2302 unlock_mutex:
2303 	idpf_vport_ctrl_unlock(netdev);
2304 
2305 	return err;
2306 }
2307 
2308 /**
2309  * idpf_alloc_dma_mem - Allocate dma memory
2310  * @hw: pointer to hw struct
2311  * @mem: pointer to dma_mem struct
2312  * @size: size of the memory to allocate
2313  */
idpf_alloc_dma_mem(struct idpf_hw * hw,struct idpf_dma_mem * mem,u64 size)2314 void *idpf_alloc_dma_mem(struct idpf_hw *hw, struct idpf_dma_mem *mem, u64 size)
2315 {
2316 	struct idpf_adapter *adapter = hw->back;
2317 	size_t sz = ALIGN(size, 4096);
2318 
2319 	mem->va = dma_alloc_coherent(&adapter->pdev->dev, sz,
2320 				     &mem->pa, GFP_KERNEL);
2321 	mem->size = sz;
2322 
2323 	return mem->va;
2324 }
2325 
2326 /**
2327  * idpf_free_dma_mem - Free the allocated dma memory
2328  * @hw: pointer to hw struct
2329  * @mem: pointer to dma_mem struct
2330  */
idpf_free_dma_mem(struct idpf_hw * hw,struct idpf_dma_mem * mem)2331 void idpf_free_dma_mem(struct idpf_hw *hw, struct idpf_dma_mem *mem)
2332 {
2333 	struct idpf_adapter *adapter = hw->back;
2334 
2335 	dma_free_coherent(&adapter->pdev->dev, mem->size,
2336 			  mem->va, mem->pa);
2337 	mem->size = 0;
2338 	mem->va = NULL;
2339 	mem->pa = 0;
2340 }
2341 
2342 static const struct net_device_ops idpf_netdev_ops = {
2343 	.ndo_open = idpf_open,
2344 	.ndo_stop = idpf_stop,
2345 	.ndo_start_xmit = idpf_tx_start,
2346 	.ndo_features_check = idpf_features_check,
2347 	.ndo_set_rx_mode = idpf_set_rx_mode,
2348 	.ndo_validate_addr = eth_validate_addr,
2349 	.ndo_set_mac_address = idpf_set_mac,
2350 	.ndo_change_mtu = idpf_change_mtu,
2351 	.ndo_get_stats64 = idpf_get_stats64,
2352 	.ndo_set_features = idpf_set_features,
2353 	.ndo_tx_timeout = idpf_tx_timeout,
2354 };
2355