xref: /openbmc/linux/drivers/net/ethernet/broadcom/bnxt/bnxt_tc.c (revision 4b0aaacee51eb6592a03fdefd5ce97558518e291)
1 /* Broadcom NetXtreme-C/E network driver.
2  *
3  * Copyright (c) 2017 Broadcom Limited
4  *
5  * This program is free software; you can redistribute it and/or modify
6  * it under the terms of the GNU General Public License as published by
7  * the Free Software Foundation.
8  */
9 
10 #include <linux/netdevice.h>
11 #include <linux/inetdevice.h>
12 #include <linux/if_vlan.h>
13 #include <net/flow_dissector.h>
14 #include <net/pkt_cls.h>
15 #include <net/tc_act/tc_gact.h>
16 #include <net/tc_act/tc_skbedit.h>
17 #include <net/tc_act/tc_mirred.h>
18 #include <net/tc_act/tc_vlan.h>
19 #include <net/tc_act/tc_tunnel_key.h>
20 
21 #include "bnxt_hsi.h"
22 #include "bnxt.h"
23 #include "bnxt_sriov.h"
24 #include "bnxt_tc.h"
25 #include "bnxt_vfr.h"
26 
27 #define BNXT_FID_INVALID			0xffff
28 #define VLAN_TCI(vid, prio)	((vid) | ((prio) << VLAN_PRIO_SHIFT))
29 
30 #define is_vlan_pcp_wildcarded(vlan_tci_mask)	\
31 	((ntohs(vlan_tci_mask) & VLAN_PRIO_MASK) == 0x0000)
32 #define is_vlan_pcp_exactmatch(vlan_tci_mask)	\
33 	((ntohs(vlan_tci_mask) & VLAN_PRIO_MASK) == VLAN_PRIO_MASK)
34 #define is_vlan_pcp_zero(vlan_tci)	\
35 	((ntohs(vlan_tci) & VLAN_PRIO_MASK) == 0x0000)
36 #define is_vid_exactmatch(vlan_tci_mask)	\
37 	((ntohs(vlan_tci_mask) & VLAN_VID_MASK) == VLAN_VID_MASK)
38 
39 /* Return the dst fid of the func for flow forwarding
40  * For PFs: src_fid is the fid of the PF
41  * For VF-reps: src_fid the fid of the VF
42  */
43 static u16 bnxt_flow_get_dst_fid(struct bnxt *pf_bp, struct net_device *dev)
44 {
45 	struct bnxt *bp;
46 
47 	/* check if dev belongs to the same switch */
48 	if (!switchdev_port_same_parent_id(pf_bp->dev, dev)) {
49 		netdev_info(pf_bp->dev, "dev(ifindex=%d) not on same switch",
50 			    dev->ifindex);
51 		return BNXT_FID_INVALID;
52 	}
53 
54 	/* Is dev a VF-rep? */
55 	if (bnxt_dev_is_vf_rep(dev))
56 		return bnxt_vf_rep_get_fid(dev);
57 
58 	bp = netdev_priv(dev);
59 	return bp->pf.fw_fid;
60 }
61 
62 static int bnxt_tc_parse_redir(struct bnxt *bp,
63 			       struct bnxt_tc_actions *actions,
64 			       const struct tc_action *tc_act)
65 {
66 	struct net_device *dev = tcf_mirred_dev(tc_act);
67 
68 	if (!dev) {
69 		netdev_info(bp->dev, "no dev in mirred action");
70 		return -EINVAL;
71 	}
72 
73 	actions->flags |= BNXT_TC_ACTION_FLAG_FWD;
74 	actions->dst_dev = dev;
75 	return 0;
76 }
77 
78 static int bnxt_tc_parse_vlan(struct bnxt *bp,
79 			      struct bnxt_tc_actions *actions,
80 			      const struct tc_action *tc_act)
81 {
82 	switch (tcf_vlan_action(tc_act)) {
83 	case TCA_VLAN_ACT_POP:
84 		actions->flags |= BNXT_TC_ACTION_FLAG_POP_VLAN;
85 		break;
86 	case TCA_VLAN_ACT_PUSH:
87 		actions->flags |= BNXT_TC_ACTION_FLAG_PUSH_VLAN;
88 		actions->push_vlan_tci = htons(tcf_vlan_push_vid(tc_act));
89 		actions->push_vlan_tpid = tcf_vlan_push_proto(tc_act);
90 		break;
91 	default:
92 		return -EOPNOTSUPP;
93 	}
94 	return 0;
95 }
96 
97 static int bnxt_tc_parse_tunnel_set(struct bnxt *bp,
98 				    struct bnxt_tc_actions *actions,
99 				    const struct tc_action *tc_act)
100 {
101 	struct ip_tunnel_info *tun_info = tcf_tunnel_info(tc_act);
102 	struct ip_tunnel_key *tun_key = &tun_info->key;
103 
104 	if (ip_tunnel_info_af(tun_info) != AF_INET) {
105 		netdev_info(bp->dev, "only IPv4 tunnel-encap is supported");
106 		return -EOPNOTSUPP;
107 	}
108 
109 	actions->tun_encap_key = *tun_key;
110 	actions->flags |= BNXT_TC_ACTION_FLAG_TUNNEL_ENCAP;
111 	return 0;
112 }
113 
114 static int bnxt_tc_parse_actions(struct bnxt *bp,
115 				 struct bnxt_tc_actions *actions,
116 				 struct tcf_exts *tc_exts)
117 {
118 	const struct tc_action *tc_act;
119 	int i, rc;
120 
121 	if (!tcf_exts_has_actions(tc_exts)) {
122 		netdev_info(bp->dev, "no actions");
123 		return -EINVAL;
124 	}
125 
126 	tcf_exts_for_each_action(i, tc_act, tc_exts) {
127 		/* Drop action */
128 		if (is_tcf_gact_shot(tc_act)) {
129 			actions->flags |= BNXT_TC_ACTION_FLAG_DROP;
130 			return 0; /* don't bother with other actions */
131 		}
132 
133 		/* Redirect action */
134 		if (is_tcf_mirred_egress_redirect(tc_act)) {
135 			rc = bnxt_tc_parse_redir(bp, actions, tc_act);
136 			if (rc)
137 				return rc;
138 			continue;
139 		}
140 
141 		/* Push/pop VLAN */
142 		if (is_tcf_vlan(tc_act)) {
143 			rc = bnxt_tc_parse_vlan(bp, actions, tc_act);
144 			if (rc)
145 				return rc;
146 			continue;
147 		}
148 
149 		/* Tunnel encap */
150 		if (is_tcf_tunnel_set(tc_act)) {
151 			rc = bnxt_tc_parse_tunnel_set(bp, actions, tc_act);
152 			if (rc)
153 				return rc;
154 			continue;
155 		}
156 
157 		/* Tunnel decap */
158 		if (is_tcf_tunnel_release(tc_act)) {
159 			actions->flags |= BNXT_TC_ACTION_FLAG_TUNNEL_DECAP;
160 			continue;
161 		}
162 	}
163 
164 	if (actions->flags & BNXT_TC_ACTION_FLAG_FWD) {
165 		if (actions->flags & BNXT_TC_ACTION_FLAG_TUNNEL_ENCAP) {
166 			/* dst_fid is PF's fid */
167 			actions->dst_fid = bp->pf.fw_fid;
168 		} else {
169 			/* find the FID from dst_dev */
170 			actions->dst_fid =
171 				bnxt_flow_get_dst_fid(bp, actions->dst_dev);
172 			if (actions->dst_fid == BNXT_FID_INVALID)
173 				return -EINVAL;
174 		}
175 	}
176 
177 	return 0;
178 }
179 
180 #define GET_KEY(flow_cmd, key_type)					\
181 		skb_flow_dissector_target((flow_cmd)->dissector, key_type,\
182 					  (flow_cmd)->key)
183 #define GET_MASK(flow_cmd, key_type)					\
184 		skb_flow_dissector_target((flow_cmd)->dissector, key_type,\
185 					  (flow_cmd)->mask)
186 
187 static int bnxt_tc_parse_flow(struct bnxt *bp,
188 			      struct tc_cls_flower_offload *tc_flow_cmd,
189 			      struct bnxt_tc_flow *flow)
190 {
191 	struct flow_dissector *dissector = tc_flow_cmd->dissector;
192 	u16 addr_type = 0;
193 
194 	/* KEY_CONTROL and KEY_BASIC are needed for forming a meaningful key */
195 	if ((dissector->used_keys & BIT(FLOW_DISSECTOR_KEY_CONTROL)) == 0 ||
196 	    (dissector->used_keys & BIT(FLOW_DISSECTOR_KEY_BASIC)) == 0) {
197 		netdev_info(bp->dev, "cannot form TC key: used_keys = 0x%x",
198 			    dissector->used_keys);
199 		return -EOPNOTSUPP;
200 	}
201 
202 	if (dissector_uses_key(dissector, FLOW_DISSECTOR_KEY_CONTROL)) {
203 		struct flow_dissector_key_control *key =
204 			GET_KEY(tc_flow_cmd, FLOW_DISSECTOR_KEY_CONTROL);
205 
206 		addr_type = key->addr_type;
207 	}
208 
209 	if (dissector_uses_key(dissector, FLOW_DISSECTOR_KEY_BASIC)) {
210 		struct flow_dissector_key_basic *key =
211 			GET_KEY(tc_flow_cmd, FLOW_DISSECTOR_KEY_BASIC);
212 		struct flow_dissector_key_basic *mask =
213 			GET_MASK(tc_flow_cmd, FLOW_DISSECTOR_KEY_BASIC);
214 
215 		flow->l2_key.ether_type = key->n_proto;
216 		flow->l2_mask.ether_type = mask->n_proto;
217 
218 		if (key->n_proto == htons(ETH_P_IP) ||
219 		    key->n_proto == htons(ETH_P_IPV6)) {
220 			flow->l4_key.ip_proto = key->ip_proto;
221 			flow->l4_mask.ip_proto = mask->ip_proto;
222 		}
223 	}
224 
225 	if (dissector_uses_key(dissector, FLOW_DISSECTOR_KEY_ETH_ADDRS)) {
226 		struct flow_dissector_key_eth_addrs *key =
227 			GET_KEY(tc_flow_cmd, FLOW_DISSECTOR_KEY_ETH_ADDRS);
228 		struct flow_dissector_key_eth_addrs *mask =
229 			GET_MASK(tc_flow_cmd, FLOW_DISSECTOR_KEY_ETH_ADDRS);
230 
231 		flow->flags |= BNXT_TC_FLOW_FLAGS_ETH_ADDRS;
232 		ether_addr_copy(flow->l2_key.dmac, key->dst);
233 		ether_addr_copy(flow->l2_mask.dmac, mask->dst);
234 		ether_addr_copy(flow->l2_key.smac, key->src);
235 		ether_addr_copy(flow->l2_mask.smac, mask->src);
236 	}
237 
238 	if (dissector_uses_key(dissector, FLOW_DISSECTOR_KEY_VLAN)) {
239 		struct flow_dissector_key_vlan *key =
240 			GET_KEY(tc_flow_cmd, FLOW_DISSECTOR_KEY_VLAN);
241 		struct flow_dissector_key_vlan *mask =
242 			GET_MASK(tc_flow_cmd, FLOW_DISSECTOR_KEY_VLAN);
243 
244 		flow->l2_key.inner_vlan_tci =
245 		   cpu_to_be16(VLAN_TCI(key->vlan_id, key->vlan_priority));
246 		flow->l2_mask.inner_vlan_tci =
247 		   cpu_to_be16((VLAN_TCI(mask->vlan_id, mask->vlan_priority)));
248 		flow->l2_key.inner_vlan_tpid = htons(ETH_P_8021Q);
249 		flow->l2_mask.inner_vlan_tpid = htons(0xffff);
250 		flow->l2_key.num_vlans = 1;
251 	}
252 
253 	if (dissector_uses_key(dissector, FLOW_DISSECTOR_KEY_IPV4_ADDRS)) {
254 		struct flow_dissector_key_ipv4_addrs *key =
255 			GET_KEY(tc_flow_cmd, FLOW_DISSECTOR_KEY_IPV4_ADDRS);
256 		struct flow_dissector_key_ipv4_addrs *mask =
257 			GET_MASK(tc_flow_cmd, FLOW_DISSECTOR_KEY_IPV4_ADDRS);
258 
259 		flow->flags |= BNXT_TC_FLOW_FLAGS_IPV4_ADDRS;
260 		flow->l3_key.ipv4.daddr.s_addr = key->dst;
261 		flow->l3_mask.ipv4.daddr.s_addr = mask->dst;
262 		flow->l3_key.ipv4.saddr.s_addr = key->src;
263 		flow->l3_mask.ipv4.saddr.s_addr = mask->src;
264 	} else if (dissector_uses_key(dissector,
265 				      FLOW_DISSECTOR_KEY_IPV6_ADDRS)) {
266 		struct flow_dissector_key_ipv6_addrs *key =
267 			GET_KEY(tc_flow_cmd, FLOW_DISSECTOR_KEY_IPV6_ADDRS);
268 		struct flow_dissector_key_ipv6_addrs *mask =
269 			GET_MASK(tc_flow_cmd, FLOW_DISSECTOR_KEY_IPV6_ADDRS);
270 
271 		flow->flags |= BNXT_TC_FLOW_FLAGS_IPV6_ADDRS;
272 		flow->l3_key.ipv6.daddr = key->dst;
273 		flow->l3_mask.ipv6.daddr = mask->dst;
274 		flow->l3_key.ipv6.saddr = key->src;
275 		flow->l3_mask.ipv6.saddr = mask->src;
276 	}
277 
278 	if (dissector_uses_key(dissector, FLOW_DISSECTOR_KEY_PORTS)) {
279 		struct flow_dissector_key_ports *key =
280 			GET_KEY(tc_flow_cmd, FLOW_DISSECTOR_KEY_PORTS);
281 		struct flow_dissector_key_ports *mask =
282 			GET_MASK(tc_flow_cmd, FLOW_DISSECTOR_KEY_PORTS);
283 
284 		flow->flags |= BNXT_TC_FLOW_FLAGS_PORTS;
285 		flow->l4_key.ports.dport = key->dst;
286 		flow->l4_mask.ports.dport = mask->dst;
287 		flow->l4_key.ports.sport = key->src;
288 		flow->l4_mask.ports.sport = mask->src;
289 	}
290 
291 	if (dissector_uses_key(dissector, FLOW_DISSECTOR_KEY_ICMP)) {
292 		struct flow_dissector_key_icmp *key =
293 			GET_KEY(tc_flow_cmd, FLOW_DISSECTOR_KEY_ICMP);
294 		struct flow_dissector_key_icmp *mask =
295 			GET_MASK(tc_flow_cmd, FLOW_DISSECTOR_KEY_ICMP);
296 
297 		flow->flags |= BNXT_TC_FLOW_FLAGS_ICMP;
298 		flow->l4_key.icmp.type = key->type;
299 		flow->l4_key.icmp.code = key->code;
300 		flow->l4_mask.icmp.type = mask->type;
301 		flow->l4_mask.icmp.code = mask->code;
302 	}
303 
304 	if (dissector_uses_key(dissector, FLOW_DISSECTOR_KEY_ENC_CONTROL)) {
305 		struct flow_dissector_key_control *key =
306 			GET_KEY(tc_flow_cmd, FLOW_DISSECTOR_KEY_ENC_CONTROL);
307 
308 		addr_type = key->addr_type;
309 	}
310 
311 	if (dissector_uses_key(dissector, FLOW_DISSECTOR_KEY_ENC_IPV4_ADDRS)) {
312 		struct flow_dissector_key_ipv4_addrs *key =
313 			GET_KEY(tc_flow_cmd, FLOW_DISSECTOR_KEY_ENC_IPV4_ADDRS);
314 		struct flow_dissector_key_ipv4_addrs *mask =
315 				GET_MASK(tc_flow_cmd,
316 					 FLOW_DISSECTOR_KEY_ENC_IPV4_ADDRS);
317 
318 		flow->flags |= BNXT_TC_FLOW_FLAGS_TUNL_IPV4_ADDRS;
319 		flow->tun_key.u.ipv4.dst = key->dst;
320 		flow->tun_mask.u.ipv4.dst = mask->dst;
321 		flow->tun_key.u.ipv4.src = key->src;
322 		flow->tun_mask.u.ipv4.src = mask->src;
323 	} else if (dissector_uses_key(dissector,
324 				      FLOW_DISSECTOR_KEY_ENC_IPV6_ADDRS)) {
325 		return -EOPNOTSUPP;
326 	}
327 
328 	if (dissector_uses_key(dissector, FLOW_DISSECTOR_KEY_ENC_KEYID)) {
329 		struct flow_dissector_key_keyid *key =
330 			GET_KEY(tc_flow_cmd, FLOW_DISSECTOR_KEY_ENC_KEYID);
331 		struct flow_dissector_key_keyid *mask =
332 			GET_MASK(tc_flow_cmd, FLOW_DISSECTOR_KEY_ENC_KEYID);
333 
334 		flow->flags |= BNXT_TC_FLOW_FLAGS_TUNL_ID;
335 		flow->tun_key.tun_id = key32_to_tunnel_id(key->keyid);
336 		flow->tun_mask.tun_id = key32_to_tunnel_id(mask->keyid);
337 	}
338 
339 	if (dissector_uses_key(dissector, FLOW_DISSECTOR_KEY_ENC_PORTS)) {
340 		struct flow_dissector_key_ports *key =
341 			GET_KEY(tc_flow_cmd, FLOW_DISSECTOR_KEY_ENC_PORTS);
342 		struct flow_dissector_key_ports *mask =
343 			GET_MASK(tc_flow_cmd, FLOW_DISSECTOR_KEY_ENC_PORTS);
344 
345 		flow->flags |= BNXT_TC_FLOW_FLAGS_TUNL_PORTS;
346 		flow->tun_key.tp_dst = key->dst;
347 		flow->tun_mask.tp_dst = mask->dst;
348 		flow->tun_key.tp_src = key->src;
349 		flow->tun_mask.tp_src = mask->src;
350 	}
351 
352 	return bnxt_tc_parse_actions(bp, &flow->actions, tc_flow_cmd->exts);
353 }
354 
355 static int bnxt_hwrm_cfa_flow_free(struct bnxt *bp, __le16 flow_handle)
356 {
357 	struct hwrm_cfa_flow_free_input req = { 0 };
358 	int rc;
359 
360 	bnxt_hwrm_cmd_hdr_init(bp, &req, HWRM_CFA_FLOW_FREE, -1, -1);
361 	req.flow_handle = flow_handle;
362 
363 	rc = hwrm_send_message(bp, &req, sizeof(req), HWRM_CMD_TIMEOUT);
364 	if (rc)
365 		netdev_info(bp->dev, "Error: %s: flow_handle=0x%x rc=%d",
366 			    __func__, flow_handle, rc);
367 
368 	if (rc)
369 		rc = -EIO;
370 	return rc;
371 }
372 
373 static int ipv6_mask_len(struct in6_addr *mask)
374 {
375 	int mask_len = 0, i;
376 
377 	for (i = 0; i < 4; i++)
378 		mask_len += inet_mask_len(mask->s6_addr32[i]);
379 
380 	return mask_len;
381 }
382 
383 static bool is_wildcard(void *mask, int len)
384 {
385 	const u8 *p = mask;
386 	int i;
387 
388 	for (i = 0; i < len; i++) {
389 		if (p[i] != 0)
390 			return false;
391 	}
392 	return true;
393 }
394 
395 static bool is_exactmatch(void *mask, int len)
396 {
397 	const u8 *p = mask;
398 	int i;
399 
400 	for (i = 0; i < len; i++)
401 		if (p[i] != 0xff)
402 			return false;
403 
404 	return true;
405 }
406 
407 static bool is_vlan_tci_allowed(__be16  vlan_tci_mask,
408 				__be16  vlan_tci)
409 {
410 	/* VLAN priority must be either exactly zero or fully wildcarded and
411 	 * VLAN id must be exact match.
412 	 */
413 	if (is_vid_exactmatch(vlan_tci_mask) &&
414 	    ((is_vlan_pcp_exactmatch(vlan_tci_mask) &&
415 	      is_vlan_pcp_zero(vlan_tci)) ||
416 	     is_vlan_pcp_wildcarded(vlan_tci_mask)))
417 		return true;
418 
419 	return false;
420 }
421 
422 static bool bits_set(void *key, int len)
423 {
424 	const u8 *p = key;
425 	int i;
426 
427 	for (i = 0; i < len; i++)
428 		if (p[i] != 0)
429 			return true;
430 
431 	return false;
432 }
433 
434 static int bnxt_hwrm_cfa_flow_alloc(struct bnxt *bp, struct bnxt_tc_flow *flow,
435 				    __le16 ref_flow_handle,
436 				    __le32 tunnel_handle, __le16 *flow_handle)
437 {
438 	struct hwrm_cfa_flow_alloc_output *resp = bp->hwrm_cmd_resp_addr;
439 	struct bnxt_tc_actions *actions = &flow->actions;
440 	struct bnxt_tc_l3_key *l3_mask = &flow->l3_mask;
441 	struct bnxt_tc_l3_key *l3_key = &flow->l3_key;
442 	struct hwrm_cfa_flow_alloc_input req = { 0 };
443 	u16 flow_flags = 0, action_flags = 0;
444 	int rc;
445 
446 	bnxt_hwrm_cmd_hdr_init(bp, &req, HWRM_CFA_FLOW_ALLOC, -1, -1);
447 
448 	req.src_fid = cpu_to_le16(flow->src_fid);
449 	req.ref_flow_handle = ref_flow_handle;
450 
451 	if (actions->flags & BNXT_TC_ACTION_FLAG_TUNNEL_DECAP ||
452 	    actions->flags & BNXT_TC_ACTION_FLAG_TUNNEL_ENCAP) {
453 		req.tunnel_handle = tunnel_handle;
454 		flow_flags |= CFA_FLOW_ALLOC_REQ_FLAGS_TUNNEL;
455 		action_flags |= CFA_FLOW_ALLOC_REQ_ACTION_FLAGS_TUNNEL;
456 	}
457 
458 	req.ethertype = flow->l2_key.ether_type;
459 	req.ip_proto = flow->l4_key.ip_proto;
460 
461 	if (flow->flags & BNXT_TC_FLOW_FLAGS_ETH_ADDRS) {
462 		memcpy(req.dmac, flow->l2_key.dmac, ETH_ALEN);
463 		memcpy(req.smac, flow->l2_key.smac, ETH_ALEN);
464 	}
465 
466 	if (flow->l2_key.num_vlans > 0) {
467 		flow_flags |= CFA_FLOW_ALLOC_REQ_FLAGS_NUM_VLAN_ONE;
468 		/* FW expects the inner_vlan_tci value to be set
469 		 * in outer_vlan_tci when num_vlans is 1 (which is
470 		 * always the case in TC.)
471 		 */
472 		req.outer_vlan_tci = flow->l2_key.inner_vlan_tci;
473 	}
474 
475 	/* If all IP and L4 fields are wildcarded then this is an L2 flow */
476 	if (is_wildcard(l3_mask, sizeof(*l3_mask)) &&
477 	    is_wildcard(&flow->l4_mask, sizeof(flow->l4_mask))) {
478 		flow_flags |= CFA_FLOW_ALLOC_REQ_FLAGS_FLOWTYPE_L2;
479 	} else {
480 		flow_flags |= flow->l2_key.ether_type == htons(ETH_P_IP) ?
481 				CFA_FLOW_ALLOC_REQ_FLAGS_FLOWTYPE_IPV4 :
482 				CFA_FLOW_ALLOC_REQ_FLAGS_FLOWTYPE_IPV6;
483 
484 		if (flow->flags & BNXT_TC_FLOW_FLAGS_IPV4_ADDRS) {
485 			req.ip_dst[0] = l3_key->ipv4.daddr.s_addr;
486 			req.ip_dst_mask_len =
487 				inet_mask_len(l3_mask->ipv4.daddr.s_addr);
488 			req.ip_src[0] = l3_key->ipv4.saddr.s_addr;
489 			req.ip_src_mask_len =
490 				inet_mask_len(l3_mask->ipv4.saddr.s_addr);
491 		} else if (flow->flags & BNXT_TC_FLOW_FLAGS_IPV6_ADDRS) {
492 			memcpy(req.ip_dst, l3_key->ipv6.daddr.s6_addr32,
493 			       sizeof(req.ip_dst));
494 			req.ip_dst_mask_len =
495 					ipv6_mask_len(&l3_mask->ipv6.daddr);
496 			memcpy(req.ip_src, l3_key->ipv6.saddr.s6_addr32,
497 			       sizeof(req.ip_src));
498 			req.ip_src_mask_len =
499 					ipv6_mask_len(&l3_mask->ipv6.saddr);
500 		}
501 	}
502 
503 	if (flow->flags & BNXT_TC_FLOW_FLAGS_PORTS) {
504 		req.l4_src_port = flow->l4_key.ports.sport;
505 		req.l4_src_port_mask = flow->l4_mask.ports.sport;
506 		req.l4_dst_port = flow->l4_key.ports.dport;
507 		req.l4_dst_port_mask = flow->l4_mask.ports.dport;
508 	} else if (flow->flags & BNXT_TC_FLOW_FLAGS_ICMP) {
509 		/* l4 ports serve as type/code when ip_proto is ICMP */
510 		req.l4_src_port = htons(flow->l4_key.icmp.type);
511 		req.l4_src_port_mask = htons(flow->l4_mask.icmp.type);
512 		req.l4_dst_port = htons(flow->l4_key.icmp.code);
513 		req.l4_dst_port_mask = htons(flow->l4_mask.icmp.code);
514 	}
515 	req.flags = cpu_to_le16(flow_flags);
516 
517 	if (actions->flags & BNXT_TC_ACTION_FLAG_DROP) {
518 		action_flags |= CFA_FLOW_ALLOC_REQ_ACTION_FLAGS_DROP;
519 	} else {
520 		if (actions->flags & BNXT_TC_ACTION_FLAG_FWD) {
521 			action_flags |= CFA_FLOW_ALLOC_REQ_ACTION_FLAGS_FWD;
522 			req.dst_fid = cpu_to_le16(actions->dst_fid);
523 		}
524 		if (actions->flags & BNXT_TC_ACTION_FLAG_PUSH_VLAN) {
525 			action_flags |=
526 			    CFA_FLOW_ALLOC_REQ_ACTION_FLAGS_L2_HEADER_REWRITE;
527 			req.l2_rewrite_vlan_tpid = actions->push_vlan_tpid;
528 			req.l2_rewrite_vlan_tci = actions->push_vlan_tci;
529 			memcpy(&req.l2_rewrite_dmac, &req.dmac, ETH_ALEN);
530 			memcpy(&req.l2_rewrite_smac, &req.smac, ETH_ALEN);
531 		}
532 		if (actions->flags & BNXT_TC_ACTION_FLAG_POP_VLAN) {
533 			action_flags |=
534 			    CFA_FLOW_ALLOC_REQ_ACTION_FLAGS_L2_HEADER_REWRITE;
535 			/* Rewrite config with tpid = 0 implies vlan pop */
536 			req.l2_rewrite_vlan_tpid = 0;
537 			memcpy(&req.l2_rewrite_dmac, &req.dmac, ETH_ALEN);
538 			memcpy(&req.l2_rewrite_smac, &req.smac, ETH_ALEN);
539 		}
540 	}
541 	req.action_flags = cpu_to_le16(action_flags);
542 
543 	mutex_lock(&bp->hwrm_cmd_lock);
544 	rc = _hwrm_send_message(bp, &req, sizeof(req), HWRM_CMD_TIMEOUT);
545 	if (!rc)
546 		*flow_handle = resp->flow_handle;
547 	mutex_unlock(&bp->hwrm_cmd_lock);
548 
549 	if (rc == HWRM_ERR_CODE_RESOURCE_ALLOC_ERROR)
550 		rc = -ENOSPC;
551 	else if (rc)
552 		rc = -EIO;
553 	return rc;
554 }
555 
556 static int hwrm_cfa_decap_filter_alloc(struct bnxt *bp,
557 				       struct bnxt_tc_flow *flow,
558 				       struct bnxt_tc_l2_key *l2_info,
559 				       __le32 ref_decap_handle,
560 				       __le32 *decap_filter_handle)
561 {
562 	struct hwrm_cfa_decap_filter_alloc_output *resp =
563 						bp->hwrm_cmd_resp_addr;
564 	struct hwrm_cfa_decap_filter_alloc_input req = { 0 };
565 	struct ip_tunnel_key *tun_key = &flow->tun_key;
566 	u32 enables = 0;
567 	int rc;
568 
569 	bnxt_hwrm_cmd_hdr_init(bp, &req, HWRM_CFA_DECAP_FILTER_ALLOC, -1, -1);
570 
571 	req.flags = cpu_to_le32(CFA_DECAP_FILTER_ALLOC_REQ_FLAGS_OVS_TUNNEL);
572 	enables |= CFA_DECAP_FILTER_ALLOC_REQ_ENABLES_TUNNEL_TYPE |
573 		   CFA_DECAP_FILTER_ALLOC_REQ_ENABLES_IP_PROTOCOL;
574 	req.tunnel_type = CFA_DECAP_FILTER_ALLOC_REQ_TUNNEL_TYPE_VXLAN;
575 	req.ip_protocol = CFA_DECAP_FILTER_ALLOC_REQ_IP_PROTOCOL_UDP;
576 
577 	if (flow->flags & BNXT_TC_FLOW_FLAGS_TUNL_ID) {
578 		enables |= CFA_DECAP_FILTER_ALLOC_REQ_ENABLES_TUNNEL_ID;
579 		/* tunnel_id is wrongly defined in hsi defn. as __le32 */
580 		req.tunnel_id = tunnel_id_to_key32(tun_key->tun_id);
581 	}
582 
583 	if (flow->flags & BNXT_TC_FLOW_FLAGS_TUNL_ETH_ADDRS) {
584 		enables |= CFA_DECAP_FILTER_ALLOC_REQ_ENABLES_DST_MACADDR;
585 		ether_addr_copy(req.dst_macaddr, l2_info->dmac);
586 	}
587 	if (l2_info->num_vlans) {
588 		enables |= CFA_DECAP_FILTER_ALLOC_REQ_ENABLES_T_IVLAN_VID;
589 		req.t_ivlan_vid = l2_info->inner_vlan_tci;
590 	}
591 
592 	enables |= CFA_DECAP_FILTER_ALLOC_REQ_ENABLES_ETHERTYPE;
593 	req.ethertype = htons(ETH_P_IP);
594 
595 	if (flow->flags & BNXT_TC_FLOW_FLAGS_TUNL_IPV4_ADDRS) {
596 		enables |= CFA_DECAP_FILTER_ALLOC_REQ_ENABLES_SRC_IPADDR |
597 			   CFA_DECAP_FILTER_ALLOC_REQ_ENABLES_DST_IPADDR |
598 			   CFA_DECAP_FILTER_ALLOC_REQ_ENABLES_IPADDR_TYPE;
599 		req.ip_addr_type = CFA_DECAP_FILTER_ALLOC_REQ_IP_ADDR_TYPE_IPV4;
600 		req.dst_ipaddr[0] = tun_key->u.ipv4.dst;
601 		req.src_ipaddr[0] = tun_key->u.ipv4.src;
602 	}
603 
604 	if (flow->flags & BNXT_TC_FLOW_FLAGS_TUNL_PORTS) {
605 		enables |= CFA_DECAP_FILTER_ALLOC_REQ_ENABLES_DST_PORT;
606 		req.dst_port = tun_key->tp_dst;
607 	}
608 
609 	/* Eventhough the decap_handle returned by hwrm_cfa_decap_filter_alloc
610 	 * is defined as __le32, l2_ctxt_ref_id is defined in HSI as __le16.
611 	 */
612 	req.l2_ctxt_ref_id = (__force __le16)ref_decap_handle;
613 	req.enables = cpu_to_le32(enables);
614 
615 	mutex_lock(&bp->hwrm_cmd_lock);
616 	rc = _hwrm_send_message(bp, &req, sizeof(req), HWRM_CMD_TIMEOUT);
617 	if (!rc)
618 		*decap_filter_handle = resp->decap_filter_id;
619 	else
620 		netdev_info(bp->dev, "%s: Error rc=%d", __func__, rc);
621 	mutex_unlock(&bp->hwrm_cmd_lock);
622 
623 	if (rc)
624 		rc = -EIO;
625 	return rc;
626 }
627 
628 static int hwrm_cfa_decap_filter_free(struct bnxt *bp,
629 				      __le32 decap_filter_handle)
630 {
631 	struct hwrm_cfa_decap_filter_free_input req = { 0 };
632 	int rc;
633 
634 	bnxt_hwrm_cmd_hdr_init(bp, &req, HWRM_CFA_DECAP_FILTER_FREE, -1, -1);
635 	req.decap_filter_id = decap_filter_handle;
636 
637 	rc = hwrm_send_message(bp, &req, sizeof(req), HWRM_CMD_TIMEOUT);
638 	if (rc)
639 		netdev_info(bp->dev, "%s: Error rc=%d", __func__, rc);
640 
641 	if (rc)
642 		rc = -EIO;
643 	return rc;
644 }
645 
646 static int hwrm_cfa_encap_record_alloc(struct bnxt *bp,
647 				       struct ip_tunnel_key *encap_key,
648 				       struct bnxt_tc_l2_key *l2_info,
649 				       __le32 *encap_record_handle)
650 {
651 	struct hwrm_cfa_encap_record_alloc_output *resp =
652 						bp->hwrm_cmd_resp_addr;
653 	struct hwrm_cfa_encap_record_alloc_input req = { 0 };
654 	struct hwrm_cfa_encap_data_vxlan *encap =
655 			(struct hwrm_cfa_encap_data_vxlan *)&req.encap_data;
656 	struct hwrm_vxlan_ipv4_hdr *encap_ipv4 =
657 				(struct hwrm_vxlan_ipv4_hdr *)encap->l3;
658 	int rc;
659 
660 	bnxt_hwrm_cmd_hdr_init(bp, &req, HWRM_CFA_ENCAP_RECORD_ALLOC, -1, -1);
661 
662 	req.encap_type = CFA_ENCAP_RECORD_ALLOC_REQ_ENCAP_TYPE_VXLAN;
663 
664 	ether_addr_copy(encap->dst_mac_addr, l2_info->dmac);
665 	ether_addr_copy(encap->src_mac_addr, l2_info->smac);
666 	if (l2_info->num_vlans) {
667 		encap->num_vlan_tags = l2_info->num_vlans;
668 		encap->ovlan_tci = l2_info->inner_vlan_tci;
669 		encap->ovlan_tpid = l2_info->inner_vlan_tpid;
670 	}
671 
672 	encap_ipv4->ver_hlen = 4 << VXLAN_IPV4_HDR_VER_HLEN_VERSION_SFT;
673 	encap_ipv4->ver_hlen |= 5 << VXLAN_IPV4_HDR_VER_HLEN_HEADER_LENGTH_SFT;
674 	encap_ipv4->ttl = encap_key->ttl;
675 
676 	encap_ipv4->dest_ip_addr = encap_key->u.ipv4.dst;
677 	encap_ipv4->src_ip_addr = encap_key->u.ipv4.src;
678 	encap_ipv4->protocol = IPPROTO_UDP;
679 
680 	encap->dst_port = encap_key->tp_dst;
681 	encap->vni = tunnel_id_to_key32(encap_key->tun_id);
682 
683 	mutex_lock(&bp->hwrm_cmd_lock);
684 	rc = _hwrm_send_message(bp, &req, sizeof(req), HWRM_CMD_TIMEOUT);
685 	if (!rc)
686 		*encap_record_handle = resp->encap_record_id;
687 	else
688 		netdev_info(bp->dev, "%s: Error rc=%d", __func__, rc);
689 	mutex_unlock(&bp->hwrm_cmd_lock);
690 
691 	if (rc)
692 		rc = -EIO;
693 	return rc;
694 }
695 
696 static int hwrm_cfa_encap_record_free(struct bnxt *bp,
697 				      __le32 encap_record_handle)
698 {
699 	struct hwrm_cfa_encap_record_free_input req = { 0 };
700 	int rc;
701 
702 	bnxt_hwrm_cmd_hdr_init(bp, &req, HWRM_CFA_ENCAP_RECORD_FREE, -1, -1);
703 	req.encap_record_id = encap_record_handle;
704 
705 	rc = hwrm_send_message(bp, &req, sizeof(req), HWRM_CMD_TIMEOUT);
706 	if (rc)
707 		netdev_info(bp->dev, "%s: Error rc=%d", __func__, rc);
708 
709 	if (rc)
710 		rc = -EIO;
711 	return rc;
712 }
713 
714 static int bnxt_tc_put_l2_node(struct bnxt *bp,
715 			       struct bnxt_tc_flow_node *flow_node)
716 {
717 	struct bnxt_tc_l2_node *l2_node = flow_node->l2_node;
718 	struct bnxt_tc_info *tc_info = bp->tc_info;
719 	int rc;
720 
721 	/* remove flow_node from the L2 shared flow list */
722 	list_del(&flow_node->l2_list_node);
723 	if (--l2_node->refcount == 0) {
724 		rc =  rhashtable_remove_fast(&tc_info->l2_table, &l2_node->node,
725 					     tc_info->l2_ht_params);
726 		if (rc)
727 			netdev_err(bp->dev,
728 				   "Error: %s: rhashtable_remove_fast: %d",
729 				   __func__, rc);
730 		kfree_rcu(l2_node, rcu);
731 	}
732 	return 0;
733 }
734 
735 static struct bnxt_tc_l2_node *
736 bnxt_tc_get_l2_node(struct bnxt *bp, struct rhashtable *l2_table,
737 		    struct rhashtable_params ht_params,
738 		    struct bnxt_tc_l2_key *l2_key)
739 {
740 	struct bnxt_tc_l2_node *l2_node;
741 	int rc;
742 
743 	l2_node = rhashtable_lookup_fast(l2_table, l2_key, ht_params);
744 	if (!l2_node) {
745 		l2_node = kzalloc(sizeof(*l2_node), GFP_KERNEL);
746 		if (!l2_node) {
747 			rc = -ENOMEM;
748 			return NULL;
749 		}
750 
751 		l2_node->key = *l2_key;
752 		rc = rhashtable_insert_fast(l2_table, &l2_node->node,
753 					    ht_params);
754 		if (rc) {
755 			kfree_rcu(l2_node, rcu);
756 			netdev_err(bp->dev,
757 				   "Error: %s: rhashtable_insert_fast: %d",
758 				   __func__, rc);
759 			return NULL;
760 		}
761 		INIT_LIST_HEAD(&l2_node->common_l2_flows);
762 	}
763 	return l2_node;
764 }
765 
766 /* Get the ref_flow_handle for a flow by checking if there are any other
767  * flows that share the same L2 key as this flow.
768  */
769 static int
770 bnxt_tc_get_ref_flow_handle(struct bnxt *bp, struct bnxt_tc_flow *flow,
771 			    struct bnxt_tc_flow_node *flow_node,
772 			    __le16 *ref_flow_handle)
773 {
774 	struct bnxt_tc_info *tc_info = bp->tc_info;
775 	struct bnxt_tc_flow_node *ref_flow_node;
776 	struct bnxt_tc_l2_node *l2_node;
777 
778 	l2_node = bnxt_tc_get_l2_node(bp, &tc_info->l2_table,
779 				      tc_info->l2_ht_params,
780 				      &flow->l2_key);
781 	if (!l2_node)
782 		return -1;
783 
784 	/* If any other flow is using this l2_node, use it's flow_handle
785 	 * as the ref_flow_handle
786 	 */
787 	if (l2_node->refcount > 0) {
788 		ref_flow_node = list_first_entry(&l2_node->common_l2_flows,
789 						 struct bnxt_tc_flow_node,
790 						 l2_list_node);
791 		*ref_flow_handle = ref_flow_node->flow_handle;
792 	} else {
793 		*ref_flow_handle = cpu_to_le16(0xffff);
794 	}
795 
796 	/* Insert the l2_node into the flow_node so that subsequent flows
797 	 * with a matching l2 key can use the flow_handle of this flow
798 	 * as their ref_flow_handle
799 	 */
800 	flow_node->l2_node = l2_node;
801 	list_add(&flow_node->l2_list_node, &l2_node->common_l2_flows);
802 	l2_node->refcount++;
803 	return 0;
804 }
805 
806 /* After the flow parsing is done, this routine is used for checking
807  * if there are any aspects of the flow that prevent it from being
808  * offloaded.
809  */
810 static bool bnxt_tc_can_offload(struct bnxt *bp, struct bnxt_tc_flow *flow)
811 {
812 	/* If L4 ports are specified then ip_proto must be TCP or UDP */
813 	if ((flow->flags & BNXT_TC_FLOW_FLAGS_PORTS) &&
814 	    (flow->l4_key.ip_proto != IPPROTO_TCP &&
815 	     flow->l4_key.ip_proto != IPPROTO_UDP)) {
816 		netdev_info(bp->dev, "Cannot offload non-TCP/UDP (%d) ports",
817 			    flow->l4_key.ip_proto);
818 		return false;
819 	}
820 
821 	/* Currently source/dest MAC cannot be partial wildcard  */
822 	if (bits_set(&flow->l2_key.smac, sizeof(flow->l2_key.smac)) &&
823 	    !is_exactmatch(flow->l2_mask.smac, sizeof(flow->l2_mask.smac))) {
824 		netdev_info(bp->dev, "Wildcard match unsupported for Source MAC\n");
825 		return false;
826 	}
827 	if (bits_set(&flow->l2_key.dmac, sizeof(flow->l2_key.dmac)) &&
828 	    !is_exactmatch(&flow->l2_mask.dmac, sizeof(flow->l2_mask.dmac))) {
829 		netdev_info(bp->dev, "Wildcard match unsupported for Dest MAC\n");
830 		return false;
831 	}
832 
833 	/* Currently VLAN fields cannot be partial wildcard */
834 	if (bits_set(&flow->l2_key.inner_vlan_tci,
835 		     sizeof(flow->l2_key.inner_vlan_tci)) &&
836 	    !is_vlan_tci_allowed(flow->l2_mask.inner_vlan_tci,
837 				 flow->l2_key.inner_vlan_tci)) {
838 		netdev_info(bp->dev, "Unsupported VLAN TCI\n");
839 		return false;
840 	}
841 	if (bits_set(&flow->l2_key.inner_vlan_tpid,
842 		     sizeof(flow->l2_key.inner_vlan_tpid)) &&
843 	    !is_exactmatch(&flow->l2_mask.inner_vlan_tpid,
844 			   sizeof(flow->l2_mask.inner_vlan_tpid))) {
845 		netdev_info(bp->dev, "Wildcard match unsupported for VLAN TPID\n");
846 		return false;
847 	}
848 
849 	/* Currently Ethertype must be set */
850 	if (!is_exactmatch(&flow->l2_mask.ether_type,
851 			   sizeof(flow->l2_mask.ether_type))) {
852 		netdev_info(bp->dev, "Wildcard match unsupported for Ethertype\n");
853 		return false;
854 	}
855 
856 	return true;
857 }
858 
859 /* Returns the final refcount of the node on success
860  * or a -ve error code on failure
861  */
862 static int bnxt_tc_put_tunnel_node(struct bnxt *bp,
863 				   struct rhashtable *tunnel_table,
864 				   struct rhashtable_params *ht_params,
865 				   struct bnxt_tc_tunnel_node *tunnel_node)
866 {
867 	int rc;
868 
869 	if (--tunnel_node->refcount == 0) {
870 		rc =  rhashtable_remove_fast(tunnel_table, &tunnel_node->node,
871 					     *ht_params);
872 		if (rc) {
873 			netdev_err(bp->dev, "rhashtable_remove_fast rc=%d", rc);
874 			rc = -1;
875 		}
876 		kfree_rcu(tunnel_node, rcu);
877 		return rc;
878 	} else {
879 		return tunnel_node->refcount;
880 	}
881 }
882 
883 /* Get (or add) either encap or decap tunnel node from/to the supplied
884  * hash table.
885  */
886 static struct bnxt_tc_tunnel_node *
887 bnxt_tc_get_tunnel_node(struct bnxt *bp, struct rhashtable *tunnel_table,
888 			struct rhashtable_params *ht_params,
889 			struct ip_tunnel_key *tun_key)
890 {
891 	struct bnxt_tc_tunnel_node *tunnel_node;
892 	int rc;
893 
894 	tunnel_node = rhashtable_lookup_fast(tunnel_table, tun_key, *ht_params);
895 	if (!tunnel_node) {
896 		tunnel_node = kzalloc(sizeof(*tunnel_node), GFP_KERNEL);
897 		if (!tunnel_node) {
898 			rc = -ENOMEM;
899 			goto err;
900 		}
901 
902 		tunnel_node->key = *tun_key;
903 		tunnel_node->tunnel_handle = INVALID_TUNNEL_HANDLE;
904 		rc = rhashtable_insert_fast(tunnel_table, &tunnel_node->node,
905 					    *ht_params);
906 		if (rc) {
907 			kfree_rcu(tunnel_node, rcu);
908 			goto err;
909 		}
910 	}
911 	tunnel_node->refcount++;
912 	return tunnel_node;
913 err:
914 	netdev_info(bp->dev, "error rc=%d", rc);
915 	return NULL;
916 }
917 
918 static int bnxt_tc_get_ref_decap_handle(struct bnxt *bp,
919 					struct bnxt_tc_flow *flow,
920 					struct bnxt_tc_l2_key *l2_key,
921 					struct bnxt_tc_flow_node *flow_node,
922 					__le32 *ref_decap_handle)
923 {
924 	struct bnxt_tc_info *tc_info = bp->tc_info;
925 	struct bnxt_tc_flow_node *ref_flow_node;
926 	struct bnxt_tc_l2_node *decap_l2_node;
927 
928 	decap_l2_node = bnxt_tc_get_l2_node(bp, &tc_info->decap_l2_table,
929 					    tc_info->decap_l2_ht_params,
930 					    l2_key);
931 	if (!decap_l2_node)
932 		return -1;
933 
934 	/* If any other flow is using this decap_l2_node, use it's decap_handle
935 	 * as the ref_decap_handle
936 	 */
937 	if (decap_l2_node->refcount > 0) {
938 		ref_flow_node =
939 			list_first_entry(&decap_l2_node->common_l2_flows,
940 					 struct bnxt_tc_flow_node,
941 					 decap_l2_list_node);
942 		*ref_decap_handle = ref_flow_node->decap_node->tunnel_handle;
943 	} else {
944 		*ref_decap_handle = INVALID_TUNNEL_HANDLE;
945 	}
946 
947 	/* Insert the l2_node into the flow_node so that subsequent flows
948 	 * with a matching decap l2 key can use the decap_filter_handle of
949 	 * this flow as their ref_decap_handle
950 	 */
951 	flow_node->decap_l2_node = decap_l2_node;
952 	list_add(&flow_node->decap_l2_list_node,
953 		 &decap_l2_node->common_l2_flows);
954 	decap_l2_node->refcount++;
955 	return 0;
956 }
957 
958 static void bnxt_tc_put_decap_l2_node(struct bnxt *bp,
959 				      struct bnxt_tc_flow_node *flow_node)
960 {
961 	struct bnxt_tc_l2_node *decap_l2_node = flow_node->decap_l2_node;
962 	struct bnxt_tc_info *tc_info = bp->tc_info;
963 	int rc;
964 
965 	/* remove flow_node from the decap L2 sharing flow list */
966 	list_del(&flow_node->decap_l2_list_node);
967 	if (--decap_l2_node->refcount == 0) {
968 		rc =  rhashtable_remove_fast(&tc_info->decap_l2_table,
969 					     &decap_l2_node->node,
970 					     tc_info->decap_l2_ht_params);
971 		if (rc)
972 			netdev_err(bp->dev, "rhashtable_remove_fast rc=%d", rc);
973 		kfree_rcu(decap_l2_node, rcu);
974 	}
975 }
976 
977 static void bnxt_tc_put_decap_handle(struct bnxt *bp,
978 				     struct bnxt_tc_flow_node *flow_node)
979 {
980 	__le32 decap_handle = flow_node->decap_node->tunnel_handle;
981 	struct bnxt_tc_info *tc_info = bp->tc_info;
982 	int rc;
983 
984 	if (flow_node->decap_l2_node)
985 		bnxt_tc_put_decap_l2_node(bp, flow_node);
986 
987 	rc = bnxt_tc_put_tunnel_node(bp, &tc_info->decap_table,
988 				     &tc_info->decap_ht_params,
989 				     flow_node->decap_node);
990 	if (!rc && decap_handle != INVALID_TUNNEL_HANDLE)
991 		hwrm_cfa_decap_filter_free(bp, decap_handle);
992 }
993 
994 static int bnxt_tc_resolve_tunnel_hdrs(struct bnxt *bp,
995 				       struct ip_tunnel_key *tun_key,
996 				       struct bnxt_tc_l2_key *l2_info)
997 {
998 #ifdef CONFIG_INET
999 	struct net_device *real_dst_dev = bp->dev;
1000 	struct flowi4 flow = { {0} };
1001 	struct net_device *dst_dev;
1002 	struct neighbour *nbr;
1003 	struct rtable *rt;
1004 	int rc;
1005 
1006 	flow.flowi4_proto = IPPROTO_UDP;
1007 	flow.fl4_dport = tun_key->tp_dst;
1008 	flow.daddr = tun_key->u.ipv4.dst;
1009 
1010 	rt = ip_route_output_key(dev_net(real_dst_dev), &flow);
1011 	if (IS_ERR(rt)) {
1012 		netdev_info(bp->dev, "no route to %pI4b", &flow.daddr);
1013 		return -EOPNOTSUPP;
1014 	}
1015 
1016 	/* The route must either point to the real_dst_dev or a dst_dev that
1017 	 * uses the real_dst_dev.
1018 	 */
1019 	dst_dev = rt->dst.dev;
1020 	if (is_vlan_dev(dst_dev)) {
1021 #if IS_ENABLED(CONFIG_VLAN_8021Q)
1022 		struct vlan_dev_priv *vlan = vlan_dev_priv(dst_dev);
1023 
1024 		if (vlan->real_dev != real_dst_dev) {
1025 			netdev_info(bp->dev,
1026 				    "dst_dev(%s) doesn't use PF-if(%s)",
1027 				    netdev_name(dst_dev),
1028 				    netdev_name(real_dst_dev));
1029 			rc = -EOPNOTSUPP;
1030 			goto put_rt;
1031 		}
1032 		l2_info->inner_vlan_tci = htons(vlan->vlan_id);
1033 		l2_info->inner_vlan_tpid = vlan->vlan_proto;
1034 		l2_info->num_vlans = 1;
1035 #endif
1036 	} else if (dst_dev != real_dst_dev) {
1037 		netdev_info(bp->dev,
1038 			    "dst_dev(%s) for %pI4b is not PF-if(%s)",
1039 			    netdev_name(dst_dev), &flow.daddr,
1040 			    netdev_name(real_dst_dev));
1041 		rc = -EOPNOTSUPP;
1042 		goto put_rt;
1043 	}
1044 
1045 	nbr = dst_neigh_lookup(&rt->dst, &flow.daddr);
1046 	if (!nbr) {
1047 		netdev_info(bp->dev, "can't lookup neighbor for %pI4b",
1048 			    &flow.daddr);
1049 		rc = -EOPNOTSUPP;
1050 		goto put_rt;
1051 	}
1052 
1053 	tun_key->u.ipv4.src = flow.saddr;
1054 	tun_key->ttl = ip4_dst_hoplimit(&rt->dst);
1055 	neigh_ha_snapshot(l2_info->dmac, nbr, dst_dev);
1056 	ether_addr_copy(l2_info->smac, dst_dev->dev_addr);
1057 	neigh_release(nbr);
1058 	ip_rt_put(rt);
1059 
1060 	return 0;
1061 put_rt:
1062 	ip_rt_put(rt);
1063 	return rc;
1064 #else
1065 	return -EOPNOTSUPP;
1066 #endif
1067 }
1068 
1069 static int bnxt_tc_get_decap_handle(struct bnxt *bp, struct bnxt_tc_flow *flow,
1070 				    struct bnxt_tc_flow_node *flow_node,
1071 				    __le32 *decap_filter_handle)
1072 {
1073 	struct ip_tunnel_key *decap_key = &flow->tun_key;
1074 	struct bnxt_tc_info *tc_info = bp->tc_info;
1075 	struct bnxt_tc_l2_key l2_info = { {0} };
1076 	struct bnxt_tc_tunnel_node *decap_node;
1077 	struct ip_tunnel_key tun_key = { 0 };
1078 	struct bnxt_tc_l2_key *decap_l2_info;
1079 	__le32 ref_decap_handle;
1080 	int rc;
1081 
1082 	/* Check if there's another flow using the same tunnel decap.
1083 	 * If not, add this tunnel to the table and resolve the other
1084 	 * tunnel header fileds. Ignore src_port in the tunnel_key,
1085 	 * since it is not required for decap filters.
1086 	 */
1087 	decap_key->tp_src = 0;
1088 	decap_node = bnxt_tc_get_tunnel_node(bp, &tc_info->decap_table,
1089 					     &tc_info->decap_ht_params,
1090 					     decap_key);
1091 	if (!decap_node)
1092 		return -ENOMEM;
1093 
1094 	flow_node->decap_node = decap_node;
1095 
1096 	if (decap_node->tunnel_handle != INVALID_TUNNEL_HANDLE)
1097 		goto done;
1098 
1099 	/* Resolve the L2 fields for tunnel decap
1100 	 * Resolve the route for remote vtep (saddr) of the decap key
1101 	 * Find it's next-hop mac addrs
1102 	 */
1103 	tun_key.u.ipv4.dst = flow->tun_key.u.ipv4.src;
1104 	tun_key.tp_dst = flow->tun_key.tp_dst;
1105 	rc = bnxt_tc_resolve_tunnel_hdrs(bp, &tun_key, &l2_info);
1106 	if (rc)
1107 		goto put_decap;
1108 
1109 	decap_l2_info = &decap_node->l2_info;
1110 	/* decap smac is wildcarded */
1111 	ether_addr_copy(decap_l2_info->dmac, l2_info.smac);
1112 	if (l2_info.num_vlans) {
1113 		decap_l2_info->num_vlans = l2_info.num_vlans;
1114 		decap_l2_info->inner_vlan_tpid = l2_info.inner_vlan_tpid;
1115 		decap_l2_info->inner_vlan_tci = l2_info.inner_vlan_tci;
1116 	}
1117 	flow->flags |= BNXT_TC_FLOW_FLAGS_TUNL_ETH_ADDRS;
1118 
1119 	/* For getting a decap_filter_handle we first need to check if
1120 	 * there are any other decap flows that share the same tunnel L2
1121 	 * key and if so, pass that flow's decap_filter_handle as the
1122 	 * ref_decap_handle for this flow.
1123 	 */
1124 	rc = bnxt_tc_get_ref_decap_handle(bp, flow, decap_l2_info, flow_node,
1125 					  &ref_decap_handle);
1126 	if (rc)
1127 		goto put_decap;
1128 
1129 	/* Issue the hwrm cmd to allocate a decap filter handle */
1130 	rc = hwrm_cfa_decap_filter_alloc(bp, flow, decap_l2_info,
1131 					 ref_decap_handle,
1132 					 &decap_node->tunnel_handle);
1133 	if (rc)
1134 		goto put_decap_l2;
1135 
1136 done:
1137 	*decap_filter_handle = decap_node->tunnel_handle;
1138 	return 0;
1139 
1140 put_decap_l2:
1141 	bnxt_tc_put_decap_l2_node(bp, flow_node);
1142 put_decap:
1143 	bnxt_tc_put_tunnel_node(bp, &tc_info->decap_table,
1144 				&tc_info->decap_ht_params,
1145 				flow_node->decap_node);
1146 	return rc;
1147 }
1148 
1149 static void bnxt_tc_put_encap_handle(struct bnxt *bp,
1150 				     struct bnxt_tc_tunnel_node *encap_node)
1151 {
1152 	__le32 encap_handle = encap_node->tunnel_handle;
1153 	struct bnxt_tc_info *tc_info = bp->tc_info;
1154 	int rc;
1155 
1156 	rc = bnxt_tc_put_tunnel_node(bp, &tc_info->encap_table,
1157 				     &tc_info->encap_ht_params, encap_node);
1158 	if (!rc && encap_handle != INVALID_TUNNEL_HANDLE)
1159 		hwrm_cfa_encap_record_free(bp, encap_handle);
1160 }
1161 
1162 /* Lookup the tunnel encap table and check if there's an encap_handle
1163  * alloc'd already.
1164  * If not, query L2 info via a route lookup and issue an encap_record_alloc
1165  * cmd to FW.
1166  */
1167 static int bnxt_tc_get_encap_handle(struct bnxt *bp, struct bnxt_tc_flow *flow,
1168 				    struct bnxt_tc_flow_node *flow_node,
1169 				    __le32 *encap_handle)
1170 {
1171 	struct ip_tunnel_key *encap_key = &flow->actions.tun_encap_key;
1172 	struct bnxt_tc_info *tc_info = bp->tc_info;
1173 	struct bnxt_tc_tunnel_node *encap_node;
1174 	int rc;
1175 
1176 	/* Check if there's another flow using the same tunnel encap.
1177 	 * If not, add this tunnel to the table and resolve the other
1178 	 * tunnel header fileds
1179 	 */
1180 	encap_node = bnxt_tc_get_tunnel_node(bp, &tc_info->encap_table,
1181 					     &tc_info->encap_ht_params,
1182 					     encap_key);
1183 	if (!encap_node)
1184 		return -ENOMEM;
1185 
1186 	flow_node->encap_node = encap_node;
1187 
1188 	if (encap_node->tunnel_handle != INVALID_TUNNEL_HANDLE)
1189 		goto done;
1190 
1191 	rc = bnxt_tc_resolve_tunnel_hdrs(bp, encap_key, &encap_node->l2_info);
1192 	if (rc)
1193 		goto put_encap;
1194 
1195 	/* Allocate a new tunnel encap record */
1196 	rc = hwrm_cfa_encap_record_alloc(bp, encap_key, &encap_node->l2_info,
1197 					 &encap_node->tunnel_handle);
1198 	if (rc)
1199 		goto put_encap;
1200 
1201 done:
1202 	*encap_handle = encap_node->tunnel_handle;
1203 	return 0;
1204 
1205 put_encap:
1206 	bnxt_tc_put_tunnel_node(bp, &tc_info->encap_table,
1207 				&tc_info->encap_ht_params, encap_node);
1208 	return rc;
1209 }
1210 
1211 static void bnxt_tc_put_tunnel_handle(struct bnxt *bp,
1212 				      struct bnxt_tc_flow *flow,
1213 				      struct bnxt_tc_flow_node *flow_node)
1214 {
1215 	if (flow->actions.flags & BNXT_TC_ACTION_FLAG_TUNNEL_DECAP)
1216 		bnxt_tc_put_decap_handle(bp, flow_node);
1217 	else if (flow->actions.flags & BNXT_TC_ACTION_FLAG_TUNNEL_ENCAP)
1218 		bnxt_tc_put_encap_handle(bp, flow_node->encap_node);
1219 }
1220 
1221 static int bnxt_tc_get_tunnel_handle(struct bnxt *bp,
1222 				     struct bnxt_tc_flow *flow,
1223 				     struct bnxt_tc_flow_node *flow_node,
1224 				     __le32 *tunnel_handle)
1225 {
1226 	if (flow->actions.flags & BNXT_TC_ACTION_FLAG_TUNNEL_DECAP)
1227 		return bnxt_tc_get_decap_handle(bp, flow, flow_node,
1228 						tunnel_handle);
1229 	else if (flow->actions.flags & BNXT_TC_ACTION_FLAG_TUNNEL_ENCAP)
1230 		return bnxt_tc_get_encap_handle(bp, flow, flow_node,
1231 						tunnel_handle);
1232 	else
1233 		return 0;
1234 }
1235 static int __bnxt_tc_del_flow(struct bnxt *bp,
1236 			      struct bnxt_tc_flow_node *flow_node)
1237 {
1238 	struct bnxt_tc_info *tc_info = bp->tc_info;
1239 	int rc;
1240 
1241 	/* send HWRM cmd to free the flow-id */
1242 	bnxt_hwrm_cfa_flow_free(bp, flow_node->flow_handle);
1243 
1244 	mutex_lock(&tc_info->lock);
1245 
1246 	/* release references to any tunnel encap/decap nodes */
1247 	bnxt_tc_put_tunnel_handle(bp, &flow_node->flow, flow_node);
1248 
1249 	/* release reference to l2 node */
1250 	bnxt_tc_put_l2_node(bp, flow_node);
1251 
1252 	mutex_unlock(&tc_info->lock);
1253 
1254 	rc = rhashtable_remove_fast(&tc_info->flow_table, &flow_node->node,
1255 				    tc_info->flow_ht_params);
1256 	if (rc)
1257 		netdev_err(bp->dev, "Error: %s: rhashtable_remove_fast rc=%d",
1258 			   __func__, rc);
1259 
1260 	kfree_rcu(flow_node, rcu);
1261 	return 0;
1262 }
1263 
1264 static void bnxt_tc_set_src_fid(struct bnxt *bp, struct bnxt_tc_flow *flow,
1265 				u16 src_fid)
1266 {
1267 	if (flow->actions.flags & BNXT_TC_ACTION_FLAG_TUNNEL_DECAP)
1268 		flow->src_fid = bp->pf.fw_fid;
1269 	else
1270 		flow->src_fid = src_fid;
1271 }
1272 
1273 /* Add a new flow or replace an existing flow.
1274  * Notes on locking:
1275  * There are essentially two critical sections here.
1276  * 1. while adding a new flow
1277  *    a) lookup l2-key
1278  *    b) issue HWRM cmd and get flow_handle
1279  *    c) link l2-key with flow
1280  * 2. while deleting a flow
1281  *    a) unlinking l2-key from flow
1282  * A lock is needed to protect these two critical sections.
1283  *
1284  * The hash-tables are already protected by the rhashtable API.
1285  */
1286 static int bnxt_tc_add_flow(struct bnxt *bp, u16 src_fid,
1287 			    struct tc_cls_flower_offload *tc_flow_cmd)
1288 {
1289 	struct bnxt_tc_flow_node *new_node, *old_node;
1290 	struct bnxt_tc_info *tc_info = bp->tc_info;
1291 	struct bnxt_tc_flow *flow;
1292 	__le32 tunnel_handle = 0;
1293 	__le16 ref_flow_handle;
1294 	int rc;
1295 
1296 	/* allocate memory for the new flow and it's node */
1297 	new_node = kzalloc(sizeof(*new_node), GFP_KERNEL);
1298 	if (!new_node) {
1299 		rc = -ENOMEM;
1300 		goto done;
1301 	}
1302 	new_node->cookie = tc_flow_cmd->cookie;
1303 	flow = &new_node->flow;
1304 
1305 	rc = bnxt_tc_parse_flow(bp, tc_flow_cmd, flow);
1306 	if (rc)
1307 		goto free_node;
1308 
1309 	bnxt_tc_set_src_fid(bp, flow, src_fid);
1310 
1311 	if (!bnxt_tc_can_offload(bp, flow)) {
1312 		rc = -ENOSPC;
1313 		goto free_node;
1314 	}
1315 
1316 	/* If a flow exists with the same cookie, delete it */
1317 	old_node = rhashtable_lookup_fast(&tc_info->flow_table,
1318 					  &tc_flow_cmd->cookie,
1319 					  tc_info->flow_ht_params);
1320 	if (old_node)
1321 		__bnxt_tc_del_flow(bp, old_node);
1322 
1323 	/* Check if the L2 part of the flow has been offloaded already.
1324 	 * If so, bump up it's refcnt and get it's reference handle.
1325 	 */
1326 	mutex_lock(&tc_info->lock);
1327 	rc = bnxt_tc_get_ref_flow_handle(bp, flow, new_node, &ref_flow_handle);
1328 	if (rc)
1329 		goto unlock;
1330 
1331 	/* If the flow involves tunnel encap/decap, get tunnel_handle */
1332 	rc = bnxt_tc_get_tunnel_handle(bp, flow, new_node, &tunnel_handle);
1333 	if (rc)
1334 		goto put_l2;
1335 
1336 	/* send HWRM cmd to alloc the flow */
1337 	rc = bnxt_hwrm_cfa_flow_alloc(bp, flow, ref_flow_handle,
1338 				      tunnel_handle, &new_node->flow_handle);
1339 	if (rc)
1340 		goto put_tunnel;
1341 
1342 	flow->lastused = jiffies;
1343 	spin_lock_init(&flow->stats_lock);
1344 	/* add new flow to flow-table */
1345 	rc = rhashtable_insert_fast(&tc_info->flow_table, &new_node->node,
1346 				    tc_info->flow_ht_params);
1347 	if (rc)
1348 		goto hwrm_flow_free;
1349 
1350 	mutex_unlock(&tc_info->lock);
1351 	return 0;
1352 
1353 hwrm_flow_free:
1354 	bnxt_hwrm_cfa_flow_free(bp, new_node->flow_handle);
1355 put_tunnel:
1356 	bnxt_tc_put_tunnel_handle(bp, flow, new_node);
1357 put_l2:
1358 	bnxt_tc_put_l2_node(bp, new_node);
1359 unlock:
1360 	mutex_unlock(&tc_info->lock);
1361 free_node:
1362 	kfree_rcu(new_node, rcu);
1363 done:
1364 	netdev_err(bp->dev, "Error: %s: cookie=0x%lx error=%d",
1365 		   __func__, tc_flow_cmd->cookie, rc);
1366 	return rc;
1367 }
1368 
1369 static int bnxt_tc_del_flow(struct bnxt *bp,
1370 			    struct tc_cls_flower_offload *tc_flow_cmd)
1371 {
1372 	struct bnxt_tc_info *tc_info = bp->tc_info;
1373 	struct bnxt_tc_flow_node *flow_node;
1374 
1375 	flow_node = rhashtable_lookup_fast(&tc_info->flow_table,
1376 					   &tc_flow_cmd->cookie,
1377 					   tc_info->flow_ht_params);
1378 	if (!flow_node)
1379 		return -EINVAL;
1380 
1381 	return __bnxt_tc_del_flow(bp, flow_node);
1382 }
1383 
1384 static int bnxt_tc_get_flow_stats(struct bnxt *bp,
1385 				  struct tc_cls_flower_offload *tc_flow_cmd)
1386 {
1387 	struct bnxt_tc_flow_stats stats, *curr_stats, *prev_stats;
1388 	struct bnxt_tc_info *tc_info = bp->tc_info;
1389 	struct bnxt_tc_flow_node *flow_node;
1390 	struct bnxt_tc_flow *flow;
1391 	unsigned long lastused;
1392 
1393 	flow_node = rhashtable_lookup_fast(&tc_info->flow_table,
1394 					   &tc_flow_cmd->cookie,
1395 					   tc_info->flow_ht_params);
1396 	if (!flow_node)
1397 		return -1;
1398 
1399 	flow = &flow_node->flow;
1400 	curr_stats = &flow->stats;
1401 	prev_stats = &flow->prev_stats;
1402 
1403 	spin_lock(&flow->stats_lock);
1404 	stats.packets = curr_stats->packets - prev_stats->packets;
1405 	stats.bytes = curr_stats->bytes - prev_stats->bytes;
1406 	*prev_stats = *curr_stats;
1407 	lastused = flow->lastused;
1408 	spin_unlock(&flow->stats_lock);
1409 
1410 	tcf_exts_stats_update(tc_flow_cmd->exts, stats.bytes, stats.packets,
1411 			      lastused);
1412 	return 0;
1413 }
1414 
1415 static int
1416 bnxt_hwrm_cfa_flow_stats_get(struct bnxt *bp, int num_flows,
1417 			     struct bnxt_tc_stats_batch stats_batch[])
1418 {
1419 	struct hwrm_cfa_flow_stats_output *resp = bp->hwrm_cmd_resp_addr;
1420 	struct hwrm_cfa_flow_stats_input req = { 0 };
1421 	__le16 *req_flow_handles = &req.flow_handle_0;
1422 	int rc, i;
1423 
1424 	bnxt_hwrm_cmd_hdr_init(bp, &req, HWRM_CFA_FLOW_STATS, -1, -1);
1425 	req.num_flows = cpu_to_le16(num_flows);
1426 	for (i = 0; i < num_flows; i++) {
1427 		struct bnxt_tc_flow_node *flow_node = stats_batch[i].flow_node;
1428 
1429 		req_flow_handles[i] = flow_node->flow_handle;
1430 	}
1431 
1432 	mutex_lock(&bp->hwrm_cmd_lock);
1433 	rc = _hwrm_send_message(bp, &req, sizeof(req), HWRM_CMD_TIMEOUT);
1434 	if (!rc) {
1435 		__le64 *resp_packets = &resp->packet_0;
1436 		__le64 *resp_bytes = &resp->byte_0;
1437 
1438 		for (i = 0; i < num_flows; i++) {
1439 			stats_batch[i].hw_stats.packets =
1440 						le64_to_cpu(resp_packets[i]);
1441 			stats_batch[i].hw_stats.bytes =
1442 						le64_to_cpu(resp_bytes[i]);
1443 		}
1444 	} else {
1445 		netdev_info(bp->dev, "error rc=%d", rc);
1446 	}
1447 	mutex_unlock(&bp->hwrm_cmd_lock);
1448 
1449 	if (rc)
1450 		rc = -EIO;
1451 	return rc;
1452 }
1453 
1454 /* Add val to accum while handling a possible wraparound
1455  * of val. Eventhough val is of type u64, its actual width
1456  * is denoted by mask and will wrap-around beyond that width.
1457  */
1458 static void accumulate_val(u64 *accum, u64 val, u64 mask)
1459 {
1460 #define low_bits(x, mask)		((x) & (mask))
1461 #define high_bits(x, mask)		((x) & ~(mask))
1462 	bool wrapped = val < low_bits(*accum, mask);
1463 
1464 	*accum = high_bits(*accum, mask) + val;
1465 	if (wrapped)
1466 		*accum += (mask + 1);
1467 }
1468 
1469 /* The HW counters' width is much less than 64bits.
1470  * Handle possible wrap-around while updating the stat counters
1471  */
1472 static void bnxt_flow_stats_accum(struct bnxt_tc_info *tc_info,
1473 				  struct bnxt_tc_flow_stats *acc_stats,
1474 				  struct bnxt_tc_flow_stats *hw_stats)
1475 {
1476 	accumulate_val(&acc_stats->bytes, hw_stats->bytes, tc_info->bytes_mask);
1477 	accumulate_val(&acc_stats->packets, hw_stats->packets,
1478 		       tc_info->packets_mask);
1479 }
1480 
1481 static int
1482 bnxt_tc_flow_stats_batch_update(struct bnxt *bp, int num_flows,
1483 				struct bnxt_tc_stats_batch stats_batch[])
1484 {
1485 	struct bnxt_tc_info *tc_info = bp->tc_info;
1486 	int rc, i;
1487 
1488 	rc = bnxt_hwrm_cfa_flow_stats_get(bp, num_flows, stats_batch);
1489 	if (rc)
1490 		return rc;
1491 
1492 	for (i = 0; i < num_flows; i++) {
1493 		struct bnxt_tc_flow_node *flow_node = stats_batch[i].flow_node;
1494 		struct bnxt_tc_flow *flow = &flow_node->flow;
1495 
1496 		spin_lock(&flow->stats_lock);
1497 		bnxt_flow_stats_accum(tc_info, &flow->stats,
1498 				      &stats_batch[i].hw_stats);
1499 		if (flow->stats.packets != flow->prev_stats.packets)
1500 			flow->lastused = jiffies;
1501 		spin_unlock(&flow->stats_lock);
1502 	}
1503 
1504 	return 0;
1505 }
1506 
1507 static int
1508 bnxt_tc_flow_stats_batch_prep(struct bnxt *bp,
1509 			      struct bnxt_tc_stats_batch stats_batch[],
1510 			      int *num_flows)
1511 {
1512 	struct bnxt_tc_info *tc_info = bp->tc_info;
1513 	struct rhashtable_iter *iter = &tc_info->iter;
1514 	void *flow_node;
1515 	int rc, i;
1516 
1517 	rhashtable_walk_start(iter);
1518 
1519 	rc = 0;
1520 	for (i = 0; i < BNXT_FLOW_STATS_BATCH_MAX; i++) {
1521 		flow_node = rhashtable_walk_next(iter);
1522 		if (IS_ERR(flow_node)) {
1523 			i = 0;
1524 			if (PTR_ERR(flow_node) == -EAGAIN) {
1525 				continue;
1526 			} else {
1527 				rc = PTR_ERR(flow_node);
1528 				goto done;
1529 			}
1530 		}
1531 
1532 		/* No more flows */
1533 		if (!flow_node)
1534 			goto done;
1535 
1536 		stats_batch[i].flow_node = flow_node;
1537 	}
1538 done:
1539 	rhashtable_walk_stop(iter);
1540 	*num_flows = i;
1541 	return rc;
1542 }
1543 
1544 void bnxt_tc_flow_stats_work(struct bnxt *bp)
1545 {
1546 	struct bnxt_tc_info *tc_info = bp->tc_info;
1547 	int num_flows, rc;
1548 
1549 	num_flows = atomic_read(&tc_info->flow_table.nelems);
1550 	if (!num_flows)
1551 		return;
1552 
1553 	rhashtable_walk_enter(&tc_info->flow_table, &tc_info->iter);
1554 
1555 	for (;;) {
1556 		rc = bnxt_tc_flow_stats_batch_prep(bp, tc_info->stats_batch,
1557 						   &num_flows);
1558 		if (rc) {
1559 			if (rc == -EAGAIN)
1560 				continue;
1561 			break;
1562 		}
1563 
1564 		if (!num_flows)
1565 			break;
1566 
1567 		bnxt_tc_flow_stats_batch_update(bp, num_flows,
1568 						tc_info->stats_batch);
1569 	}
1570 
1571 	rhashtable_walk_exit(&tc_info->iter);
1572 }
1573 
1574 int bnxt_tc_setup_flower(struct bnxt *bp, u16 src_fid,
1575 			 struct tc_cls_flower_offload *cls_flower)
1576 {
1577 	switch (cls_flower->command) {
1578 	case TC_CLSFLOWER_REPLACE:
1579 		return bnxt_tc_add_flow(bp, src_fid, cls_flower);
1580 	case TC_CLSFLOWER_DESTROY:
1581 		return bnxt_tc_del_flow(bp, cls_flower);
1582 	case TC_CLSFLOWER_STATS:
1583 		return bnxt_tc_get_flow_stats(bp, cls_flower);
1584 	default:
1585 		return -EOPNOTSUPP;
1586 	}
1587 }
1588 
1589 static const struct rhashtable_params bnxt_tc_flow_ht_params = {
1590 	.head_offset = offsetof(struct bnxt_tc_flow_node, node),
1591 	.key_offset = offsetof(struct bnxt_tc_flow_node, cookie),
1592 	.key_len = sizeof(((struct bnxt_tc_flow_node *)0)->cookie),
1593 	.automatic_shrinking = true
1594 };
1595 
1596 static const struct rhashtable_params bnxt_tc_l2_ht_params = {
1597 	.head_offset = offsetof(struct bnxt_tc_l2_node, node),
1598 	.key_offset = offsetof(struct bnxt_tc_l2_node, key),
1599 	.key_len = BNXT_TC_L2_KEY_LEN,
1600 	.automatic_shrinking = true
1601 };
1602 
1603 static const struct rhashtable_params bnxt_tc_decap_l2_ht_params = {
1604 	.head_offset = offsetof(struct bnxt_tc_l2_node, node),
1605 	.key_offset = offsetof(struct bnxt_tc_l2_node, key),
1606 	.key_len = BNXT_TC_L2_KEY_LEN,
1607 	.automatic_shrinking = true
1608 };
1609 
1610 static const struct rhashtable_params bnxt_tc_tunnel_ht_params = {
1611 	.head_offset = offsetof(struct bnxt_tc_tunnel_node, node),
1612 	.key_offset = offsetof(struct bnxt_tc_tunnel_node, key),
1613 	.key_len = sizeof(struct ip_tunnel_key),
1614 	.automatic_shrinking = true
1615 };
1616 
1617 /* convert counter width in bits to a mask */
1618 #define mask(width)		((u64)~0 >> (64 - (width)))
1619 
1620 int bnxt_init_tc(struct bnxt *bp)
1621 {
1622 	struct bnxt_tc_info *tc_info;
1623 	int rc;
1624 
1625 	if (bp->hwrm_spec_code < 0x10803) {
1626 		netdev_warn(bp->dev,
1627 			    "Firmware does not support TC flower offload.\n");
1628 		return -ENOTSUPP;
1629 	}
1630 
1631 	tc_info = kzalloc(sizeof(*tc_info), GFP_KERNEL);
1632 	if (!tc_info)
1633 		return -ENOMEM;
1634 	mutex_init(&tc_info->lock);
1635 
1636 	/* Counter widths are programmed by FW */
1637 	tc_info->bytes_mask = mask(36);
1638 	tc_info->packets_mask = mask(28);
1639 
1640 	tc_info->flow_ht_params = bnxt_tc_flow_ht_params;
1641 	rc = rhashtable_init(&tc_info->flow_table, &tc_info->flow_ht_params);
1642 	if (rc)
1643 		goto free_tc_info;
1644 
1645 	tc_info->l2_ht_params = bnxt_tc_l2_ht_params;
1646 	rc = rhashtable_init(&tc_info->l2_table, &tc_info->l2_ht_params);
1647 	if (rc)
1648 		goto destroy_flow_table;
1649 
1650 	tc_info->decap_l2_ht_params = bnxt_tc_decap_l2_ht_params;
1651 	rc = rhashtable_init(&tc_info->decap_l2_table,
1652 			     &tc_info->decap_l2_ht_params);
1653 	if (rc)
1654 		goto destroy_l2_table;
1655 
1656 	tc_info->decap_ht_params = bnxt_tc_tunnel_ht_params;
1657 	rc = rhashtable_init(&tc_info->decap_table,
1658 			     &tc_info->decap_ht_params);
1659 	if (rc)
1660 		goto destroy_decap_l2_table;
1661 
1662 	tc_info->encap_ht_params = bnxt_tc_tunnel_ht_params;
1663 	rc = rhashtable_init(&tc_info->encap_table,
1664 			     &tc_info->encap_ht_params);
1665 	if (rc)
1666 		goto destroy_decap_table;
1667 
1668 	tc_info->enabled = true;
1669 	bp->dev->hw_features |= NETIF_F_HW_TC;
1670 	bp->dev->features |= NETIF_F_HW_TC;
1671 	bp->tc_info = tc_info;
1672 	return 0;
1673 
1674 destroy_decap_table:
1675 	rhashtable_destroy(&tc_info->decap_table);
1676 destroy_decap_l2_table:
1677 	rhashtable_destroy(&tc_info->decap_l2_table);
1678 destroy_l2_table:
1679 	rhashtable_destroy(&tc_info->l2_table);
1680 destroy_flow_table:
1681 	rhashtable_destroy(&tc_info->flow_table);
1682 free_tc_info:
1683 	kfree(tc_info);
1684 	return rc;
1685 }
1686 
1687 void bnxt_shutdown_tc(struct bnxt *bp)
1688 {
1689 	struct bnxt_tc_info *tc_info = bp->tc_info;
1690 
1691 	if (!bnxt_tc_flower_enabled(bp))
1692 		return;
1693 
1694 	rhashtable_destroy(&tc_info->flow_table);
1695 	rhashtable_destroy(&tc_info->l2_table);
1696 	rhashtable_destroy(&tc_info->decap_l2_table);
1697 	rhashtable_destroy(&tc_info->decap_table);
1698 	rhashtable_destroy(&tc_info->encap_table);
1699 	kfree(tc_info);
1700 	bp->tc_info = NULL;
1701 }
1702