1 // SPDX-License-Identifier: GPL-2.0-only
2 /* Copyright (C) 2019 Chelsio Communications.  All rights reserved. */
3 
4 #include "cxgb4.h"
5 #include "cxgb4_tc_matchall.h"
6 #include "sched.h"
7 #include "cxgb4_uld.h"
8 #include "cxgb4_filter.h"
9 #include "cxgb4_tc_flower.h"
10 
11 static int cxgb4_matchall_egress_validate(struct net_device *dev,
12 					  struct tc_cls_matchall_offload *cls)
13 {
14 	struct netlink_ext_ack *extack = cls->common.extack;
15 	struct flow_action *actions = &cls->rule->action;
16 	struct port_info *pi = netdev2pinfo(dev);
17 	struct flow_action_entry *entry;
18 	struct ch_sched_queue qe;
19 	struct sched_class *e;
20 	u64 max_link_rate;
21 	u32 i, speed;
22 	int ret;
23 
24 	if (!flow_action_has_entries(actions)) {
25 		NL_SET_ERR_MSG_MOD(extack,
26 				   "Egress MATCHALL offload needs at least 1 policing action");
27 		return -EINVAL;
28 	} else if (!flow_offload_has_one_action(actions)) {
29 		NL_SET_ERR_MSG_MOD(extack,
30 				   "Egress MATCHALL offload only supports 1 policing action");
31 		return -EINVAL;
32 	} else if (pi->tc_block_shared) {
33 		NL_SET_ERR_MSG_MOD(extack,
34 				   "Egress MATCHALL offload not supported with shared blocks");
35 		return -EINVAL;
36 	}
37 
38 	ret = t4_get_link_params(pi, NULL, &speed, NULL);
39 	if (ret) {
40 		NL_SET_ERR_MSG_MOD(extack,
41 				   "Failed to get max speed supported by the link");
42 		return -EINVAL;
43 	}
44 
45 	/* Convert from Mbps to bps */
46 	max_link_rate = (u64)speed * 1000 * 1000;
47 
48 	flow_action_for_each(i, entry, actions) {
49 		switch (entry->id) {
50 		case FLOW_ACTION_POLICE:
51 			/* Convert bytes per second to bits per second */
52 			if (entry->police.rate_bytes_ps * 8 > max_link_rate) {
53 				NL_SET_ERR_MSG_MOD(extack,
54 						   "Specified policing max rate is larger than underlying link speed");
55 				return -ERANGE;
56 			}
57 			break;
58 		default:
59 			NL_SET_ERR_MSG_MOD(extack,
60 					   "Only policing action supported with Egress MATCHALL offload");
61 			return -EOPNOTSUPP;
62 		}
63 	}
64 
65 	for (i = 0; i < pi->nqsets; i++) {
66 		memset(&qe, 0, sizeof(qe));
67 		qe.queue = i;
68 
69 		e = cxgb4_sched_queue_lookup(dev, &qe);
70 		if (e && e->info.u.params.level != SCHED_CLASS_LEVEL_CH_RL) {
71 			NL_SET_ERR_MSG_MOD(extack,
72 					   "Some queues are already bound to different class");
73 			return -EBUSY;
74 		}
75 	}
76 
77 	return 0;
78 }
79 
80 static int cxgb4_matchall_tc_bind_queues(struct net_device *dev, u32 tc)
81 {
82 	struct port_info *pi = netdev2pinfo(dev);
83 	struct ch_sched_queue qe;
84 	int ret;
85 	u32 i;
86 
87 	for (i = 0; i < pi->nqsets; i++) {
88 		qe.queue = i;
89 		qe.class = tc;
90 		ret = cxgb4_sched_class_bind(dev, &qe, SCHED_QUEUE);
91 		if (ret)
92 			goto out_free;
93 	}
94 
95 	return 0;
96 
97 out_free:
98 	while (i--) {
99 		qe.queue = i;
100 		qe.class = SCHED_CLS_NONE;
101 		cxgb4_sched_class_unbind(dev, &qe, SCHED_QUEUE);
102 	}
103 
104 	return ret;
105 }
106 
107 static void cxgb4_matchall_tc_unbind_queues(struct net_device *dev)
108 {
109 	struct port_info *pi = netdev2pinfo(dev);
110 	struct ch_sched_queue qe;
111 	u32 i;
112 
113 	for (i = 0; i < pi->nqsets; i++) {
114 		qe.queue = i;
115 		qe.class = SCHED_CLS_NONE;
116 		cxgb4_sched_class_unbind(dev, &qe, SCHED_QUEUE);
117 	}
118 }
119 
120 static int cxgb4_matchall_alloc_tc(struct net_device *dev,
121 				   struct tc_cls_matchall_offload *cls)
122 {
123 	struct ch_sched_params p = {
124 		.type = SCHED_CLASS_TYPE_PACKET,
125 		.u.params.level = SCHED_CLASS_LEVEL_CH_RL,
126 		.u.params.mode = SCHED_CLASS_MODE_CLASS,
127 		.u.params.rateunit = SCHED_CLASS_RATEUNIT_BITS,
128 		.u.params.ratemode = SCHED_CLASS_RATEMODE_ABS,
129 		.u.params.class = SCHED_CLS_NONE,
130 		.u.params.minrate = 0,
131 		.u.params.weight = 0,
132 		.u.params.pktsize = dev->mtu,
133 	};
134 	struct netlink_ext_ack *extack = cls->common.extack;
135 	struct cxgb4_tc_port_matchall *tc_port_matchall;
136 	struct port_info *pi = netdev2pinfo(dev);
137 	struct adapter *adap = netdev2adap(dev);
138 	struct flow_action_entry *entry;
139 	struct sched_class *e;
140 	int ret;
141 	u32 i;
142 
143 	tc_port_matchall = &adap->tc_matchall->port_matchall[pi->port_id];
144 
145 	flow_action_for_each(i, entry, &cls->rule->action)
146 		if (entry->id == FLOW_ACTION_POLICE)
147 			break;
148 
149 	/* Convert from bytes per second to Kbps */
150 	p.u.params.maxrate = div_u64(entry->police.rate_bytes_ps * 8, 1000);
151 	p.u.params.channel = pi->tx_chan;
152 	e = cxgb4_sched_class_alloc(dev, &p);
153 	if (!e) {
154 		NL_SET_ERR_MSG_MOD(extack,
155 				   "No free traffic class available for policing action");
156 		return -ENOMEM;
157 	}
158 
159 	ret = cxgb4_matchall_tc_bind_queues(dev, e->idx);
160 	if (ret) {
161 		NL_SET_ERR_MSG_MOD(extack,
162 				   "Could not bind queues to traffic class");
163 		goto out_free;
164 	}
165 
166 	tc_port_matchall->egress.hwtc = e->idx;
167 	tc_port_matchall->egress.cookie = cls->cookie;
168 	tc_port_matchall->egress.state = CXGB4_MATCHALL_STATE_ENABLED;
169 	return 0;
170 
171 out_free:
172 	cxgb4_sched_class_free(dev, e->idx);
173 	return ret;
174 }
175 
176 static void cxgb4_matchall_free_tc(struct net_device *dev)
177 {
178 	struct cxgb4_tc_port_matchall *tc_port_matchall;
179 	struct port_info *pi = netdev2pinfo(dev);
180 	struct adapter *adap = netdev2adap(dev);
181 
182 	tc_port_matchall = &adap->tc_matchall->port_matchall[pi->port_id];
183 	cxgb4_matchall_tc_unbind_queues(dev);
184 	cxgb4_sched_class_free(dev, tc_port_matchall->egress.hwtc);
185 
186 	tc_port_matchall->egress.hwtc = SCHED_CLS_NONE;
187 	tc_port_matchall->egress.cookie = 0;
188 	tc_port_matchall->egress.state = CXGB4_MATCHALL_STATE_DISABLED;
189 }
190 
191 static int cxgb4_matchall_mirror_alloc(struct net_device *dev,
192 				       struct tc_cls_matchall_offload *cls)
193 {
194 	struct netlink_ext_ack *extack = cls->common.extack;
195 	struct cxgb4_tc_port_matchall *tc_port_matchall;
196 	struct port_info *pi = netdev2pinfo(dev);
197 	struct adapter *adap = netdev2adap(dev);
198 	struct flow_action_entry *act;
199 	int ret;
200 	u32 i;
201 
202 	tc_port_matchall = &adap->tc_matchall->port_matchall[pi->port_id];
203 	flow_action_for_each(i, act, &cls->rule->action) {
204 		if (act->id == FLOW_ACTION_MIRRED) {
205 			ret = cxgb4_port_mirror_alloc(dev);
206 			if (ret) {
207 				NL_SET_ERR_MSG_MOD(extack,
208 						   "Couldn't allocate mirror");
209 				return ret;
210 			}
211 
212 			tc_port_matchall->ingress.viid_mirror = pi->viid_mirror;
213 			break;
214 		}
215 	}
216 
217 	return 0;
218 }
219 
220 static void cxgb4_matchall_mirror_free(struct net_device *dev)
221 {
222 	struct cxgb4_tc_port_matchall *tc_port_matchall;
223 	struct port_info *pi = netdev2pinfo(dev);
224 	struct adapter *adap = netdev2adap(dev);
225 
226 	tc_port_matchall = &adap->tc_matchall->port_matchall[pi->port_id];
227 	if (!tc_port_matchall->ingress.viid_mirror)
228 		return;
229 
230 	cxgb4_port_mirror_free(dev);
231 	tc_port_matchall->ingress.viid_mirror = 0;
232 }
233 
234 static int cxgb4_matchall_alloc_filter(struct net_device *dev,
235 				       struct tc_cls_matchall_offload *cls)
236 {
237 	struct netlink_ext_ack *extack = cls->common.extack;
238 	struct cxgb4_tc_port_matchall *tc_port_matchall;
239 	struct port_info *pi = netdev2pinfo(dev);
240 	struct adapter *adap = netdev2adap(dev);
241 	struct ch_filter_specification *fs;
242 	int ret, fidx;
243 
244 	/* Get a free filter entry TID, where we can insert this new
245 	 * rule. Only insert rule if its prio doesn't conflict with
246 	 * existing rules.
247 	 *
248 	 * 1 slot is enough to create a wildcard matchall VIID rule.
249 	 */
250 	fidx = cxgb4_get_free_ftid(dev, PF_INET, false, cls->common.prio);
251 	if (fidx < 0) {
252 		NL_SET_ERR_MSG_MOD(extack,
253 				   "No free LETCAM index available");
254 		return -ENOMEM;
255 	}
256 
257 	ret = cxgb4_matchall_mirror_alloc(dev, cls);
258 	if (ret)
259 		return ret;
260 
261 	tc_port_matchall = &adap->tc_matchall->port_matchall[pi->port_id];
262 	fs = &tc_port_matchall->ingress.fs;
263 	memset(fs, 0, sizeof(*fs));
264 
265 	if (fidx < adap->tids.nhpftids)
266 		fs->prio = 1;
267 	fs->tc_prio = cls->common.prio;
268 	fs->tc_cookie = cls->cookie;
269 	fs->hitcnts = 1;
270 
271 	fs->val.pfvf_vld = 1;
272 	fs->val.pf = adap->pf;
273 	fs->val.vf = pi->vin;
274 
275 	cxgb4_process_flow_actions(dev, &cls->rule->action, fs);
276 
277 	ret = cxgb4_set_filter(dev, fidx, fs);
278 	if (ret)
279 		goto out_free;
280 
281 	tc_port_matchall->ingress.tid = fidx;
282 	tc_port_matchall->ingress.state = CXGB4_MATCHALL_STATE_ENABLED;
283 	return 0;
284 
285 out_free:
286 	cxgb4_matchall_mirror_free(dev);
287 	return ret;
288 }
289 
290 static int cxgb4_matchall_free_filter(struct net_device *dev)
291 {
292 	struct cxgb4_tc_port_matchall *tc_port_matchall;
293 	struct port_info *pi = netdev2pinfo(dev);
294 	struct adapter *adap = netdev2adap(dev);
295 	int ret;
296 
297 	tc_port_matchall = &adap->tc_matchall->port_matchall[pi->port_id];
298 
299 	ret = cxgb4_del_filter(dev, tc_port_matchall->ingress.tid,
300 			       &tc_port_matchall->ingress.fs);
301 	if (ret)
302 		return ret;
303 
304 	cxgb4_matchall_mirror_free(dev);
305 
306 	tc_port_matchall->ingress.packets = 0;
307 	tc_port_matchall->ingress.bytes = 0;
308 	tc_port_matchall->ingress.last_used = 0;
309 	tc_port_matchall->ingress.tid = 0;
310 	tc_port_matchall->ingress.state = CXGB4_MATCHALL_STATE_DISABLED;
311 	return 0;
312 }
313 
314 int cxgb4_tc_matchall_replace(struct net_device *dev,
315 			      struct tc_cls_matchall_offload *cls_matchall,
316 			      bool ingress)
317 {
318 	struct netlink_ext_ack *extack = cls_matchall->common.extack;
319 	struct cxgb4_tc_port_matchall *tc_port_matchall;
320 	struct port_info *pi = netdev2pinfo(dev);
321 	struct adapter *adap = netdev2adap(dev);
322 	int ret;
323 
324 	tc_port_matchall = &adap->tc_matchall->port_matchall[pi->port_id];
325 	if (ingress) {
326 		if (tc_port_matchall->ingress.state ==
327 		    CXGB4_MATCHALL_STATE_ENABLED) {
328 			NL_SET_ERR_MSG_MOD(extack,
329 					   "Only 1 Ingress MATCHALL can be offloaded");
330 			return -ENOMEM;
331 		}
332 
333 		ret = cxgb4_validate_flow_actions(dev,
334 						  &cls_matchall->rule->action,
335 						  extack, 1);
336 		if (ret)
337 			return ret;
338 
339 		return cxgb4_matchall_alloc_filter(dev, cls_matchall);
340 	}
341 
342 	if (tc_port_matchall->egress.state == CXGB4_MATCHALL_STATE_ENABLED) {
343 		NL_SET_ERR_MSG_MOD(extack,
344 				   "Only 1 Egress MATCHALL can be offloaded");
345 		return -ENOMEM;
346 	}
347 
348 	ret = cxgb4_matchall_egress_validate(dev, cls_matchall);
349 	if (ret)
350 		return ret;
351 
352 	return cxgb4_matchall_alloc_tc(dev, cls_matchall);
353 }
354 
355 int cxgb4_tc_matchall_destroy(struct net_device *dev,
356 			      struct tc_cls_matchall_offload *cls_matchall,
357 			      bool ingress)
358 {
359 	struct cxgb4_tc_port_matchall *tc_port_matchall;
360 	struct port_info *pi = netdev2pinfo(dev);
361 	struct adapter *adap = netdev2adap(dev);
362 
363 	tc_port_matchall = &adap->tc_matchall->port_matchall[pi->port_id];
364 	if (ingress) {
365 		if (cls_matchall->cookie !=
366 		    tc_port_matchall->ingress.fs.tc_cookie)
367 			return -ENOENT;
368 
369 		return cxgb4_matchall_free_filter(dev);
370 	}
371 
372 	if (cls_matchall->cookie != tc_port_matchall->egress.cookie)
373 		return -ENOENT;
374 
375 	cxgb4_matchall_free_tc(dev);
376 	return 0;
377 }
378 
379 int cxgb4_tc_matchall_stats(struct net_device *dev,
380 			    struct tc_cls_matchall_offload *cls_matchall)
381 {
382 	struct cxgb4_tc_port_matchall *tc_port_matchall;
383 	struct port_info *pi = netdev2pinfo(dev);
384 	struct adapter *adap = netdev2adap(dev);
385 	u64 packets, bytes;
386 	int ret;
387 
388 	tc_port_matchall = &adap->tc_matchall->port_matchall[pi->port_id];
389 	if (tc_port_matchall->ingress.state == CXGB4_MATCHALL_STATE_DISABLED)
390 		return -ENOENT;
391 
392 	ret = cxgb4_get_filter_counters(dev, tc_port_matchall->ingress.tid,
393 					&packets, &bytes,
394 					tc_port_matchall->ingress.fs.hash);
395 	if (ret)
396 		return ret;
397 
398 	if (tc_port_matchall->ingress.packets != packets) {
399 		flow_stats_update(&cls_matchall->stats,
400 				  bytes - tc_port_matchall->ingress.bytes,
401 				  packets - tc_port_matchall->ingress.packets,
402 				  0, tc_port_matchall->ingress.last_used,
403 				  FLOW_ACTION_HW_STATS_IMMEDIATE);
404 
405 		tc_port_matchall->ingress.packets = packets;
406 		tc_port_matchall->ingress.bytes = bytes;
407 		tc_port_matchall->ingress.last_used = jiffies;
408 	}
409 
410 	return 0;
411 }
412 
413 static void cxgb4_matchall_disable_offload(struct net_device *dev)
414 {
415 	struct cxgb4_tc_port_matchall *tc_port_matchall;
416 	struct port_info *pi = netdev2pinfo(dev);
417 	struct adapter *adap = netdev2adap(dev);
418 
419 	tc_port_matchall = &adap->tc_matchall->port_matchall[pi->port_id];
420 	if (tc_port_matchall->egress.state == CXGB4_MATCHALL_STATE_ENABLED)
421 		cxgb4_matchall_free_tc(dev);
422 
423 	if (tc_port_matchall->ingress.state == CXGB4_MATCHALL_STATE_ENABLED)
424 		cxgb4_matchall_free_filter(dev);
425 }
426 
427 int cxgb4_init_tc_matchall(struct adapter *adap)
428 {
429 	struct cxgb4_tc_port_matchall *tc_port_matchall;
430 	struct cxgb4_tc_matchall *tc_matchall;
431 	int ret;
432 
433 	tc_matchall = kzalloc(sizeof(*tc_matchall), GFP_KERNEL);
434 	if (!tc_matchall)
435 		return -ENOMEM;
436 
437 	tc_port_matchall = kcalloc(adap->params.nports,
438 				   sizeof(*tc_port_matchall),
439 				   GFP_KERNEL);
440 	if (!tc_port_matchall) {
441 		ret = -ENOMEM;
442 		goto out_free_matchall;
443 	}
444 
445 	tc_matchall->port_matchall = tc_port_matchall;
446 	adap->tc_matchall = tc_matchall;
447 	return 0;
448 
449 out_free_matchall:
450 	kfree(tc_matchall);
451 	return ret;
452 }
453 
454 void cxgb4_cleanup_tc_matchall(struct adapter *adap)
455 {
456 	u8 i;
457 
458 	if (adap->tc_matchall) {
459 		if (adap->tc_matchall->port_matchall) {
460 			for (i = 0; i < adap->params.nports; i++) {
461 				struct net_device *dev = adap->port[i];
462 
463 				if (dev)
464 					cxgb4_matchall_disable_offload(dev);
465 			}
466 			kfree(adap->tc_matchall->port_matchall);
467 		}
468 		kfree(adap->tc_matchall);
469 	}
470 }
471