1 #include <linux/if.h>
2 #include <linux/if_ether.h>
3 #include <linux/if_link.h>
4 #include <linux/netdevice.h>
5 #include <linux/in.h>
6 #include <linux/types.h>
7 #include <linux/skbuff.h>
8 #include <net/flow_keys.h>
9 #include "enic_res.h"
10 #include "enic_clsf.h"
11 
12 /* enic_addfltr_5t - Add ipv4 5tuple filter
13  *	@enic: enic struct of vnic
14  *	@keys: flow_keys of ipv4 5tuple
15  *	@rq: rq number to steer to
16  *
17  * This function returns filter_id(hardware_id) of the filter
18  * added. In case of error it returns an negative number.
19  */
20 int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq)
21 {
22 	int res;
23 	struct filter data;
24 
25 	switch (keys->ip_proto) {
26 	case IPPROTO_TCP:
27 		data.u.ipv4.protocol = PROTO_TCP;
28 		break;
29 	case IPPROTO_UDP:
30 		data.u.ipv4.protocol = PROTO_UDP;
31 		break;
32 	default:
33 		return -EPROTONOSUPPORT;
34 	};
35 	data.type = FILTER_IPV4_5TUPLE;
36 	data.u.ipv4.src_addr = ntohl(keys->src);
37 	data.u.ipv4.dst_addr = ntohl(keys->dst);
38 	data.u.ipv4.src_port = ntohs(keys->port16[0]);
39 	data.u.ipv4.dst_port = ntohs(keys->port16[1]);
40 	data.u.ipv4.flags = FILTER_FIELDS_IPV4_5TUPLE;
41 
42 	spin_lock_bh(&enic->devcmd_lock);
43 	res = vnic_dev_classifier(enic->vdev, CLSF_ADD, &rq, &data);
44 	spin_unlock_bh(&enic->devcmd_lock);
45 	res = (res == 0) ? rq : res;
46 
47 	return res;
48 }
49 
50 /* enic_delfltr - Delete clsf filter
51  *	@enic: enic struct of vnic
52  *	@filter_id: filter_is(hardware_id) of filter to be deleted
53  *
54  * This function returns zero in case of success, negative number incase of
55  * error.
56  */
57 int enic_delfltr(struct enic *enic, u16 filter_id)
58 {
59 	int ret;
60 
61 	spin_lock_bh(&enic->devcmd_lock);
62 	ret = vnic_dev_classifier(enic->vdev, CLSF_DEL, &filter_id, NULL);
63 	spin_unlock_bh(&enic->devcmd_lock);
64 
65 	return ret;
66 }
67 
68 /* enic_rfs_flw_tbl_init - initialize enic->rfs_h members
69  *	@enic: enic data
70  */
71 void enic_rfs_flw_tbl_init(struct enic *enic)
72 {
73 	int i;
74 
75 	spin_lock_init(&enic->rfs_h.lock);
76 	for (i = 0; i <= ENIC_RFS_FLW_MASK; i++)
77 		INIT_HLIST_HEAD(&enic->rfs_h.ht_head[i]);
78 	enic->rfs_h.max = enic->config.num_arfs;
79 	enic->rfs_h.free = enic->rfs_h.max;
80 	enic->rfs_h.toclean = 0;
81 	enic_rfs_timer_start(enic);
82 }
83 
84 void enic_rfs_flw_tbl_free(struct enic *enic)
85 {
86 	int i;
87 
88 	enic_rfs_timer_stop(enic);
89 	spin_lock_bh(&enic->rfs_h.lock);
90 	enic->rfs_h.free = 0;
91 	for (i = 0; i < (1 << ENIC_RFS_FLW_BITSHIFT); i++) {
92 		struct hlist_head *hhead;
93 		struct hlist_node *tmp;
94 		struct enic_rfs_fltr_node *n;
95 
96 		hhead = &enic->rfs_h.ht_head[i];
97 		hlist_for_each_entry_safe(n, tmp, hhead, node) {
98 			enic_delfltr(enic, n->fltr_id);
99 			hlist_del(&n->node);
100 			kfree(n);
101 		}
102 	}
103 	spin_unlock_bh(&enic->rfs_h.lock);
104 }
105 
106 struct enic_rfs_fltr_node *htbl_fltr_search(struct enic *enic, u16 fltr_id)
107 {
108 	int i;
109 
110 	for (i = 0; i < (1 << ENIC_RFS_FLW_BITSHIFT); i++) {
111 		struct hlist_head *hhead;
112 		struct hlist_node *tmp;
113 		struct enic_rfs_fltr_node *n;
114 
115 		hhead = &enic->rfs_h.ht_head[i];
116 		hlist_for_each_entry_safe(n, tmp, hhead, node)
117 			if (n->fltr_id == fltr_id)
118 				return n;
119 	}
120 
121 	return NULL;
122 }
123 
124 #ifdef CONFIG_RFS_ACCEL
125 void enic_flow_may_expire(unsigned long data)
126 {
127 	struct enic *enic = (struct enic *)data;
128 	bool res;
129 	int j;
130 
131 	spin_lock_bh(&enic->rfs_h.lock);
132 	for (j = 0; j < ENIC_CLSF_EXPIRE_COUNT; j++) {
133 		struct hlist_head *hhead;
134 		struct hlist_node *tmp;
135 		struct enic_rfs_fltr_node *n;
136 
137 		hhead = &enic->rfs_h.ht_head[enic->rfs_h.toclean++];
138 		hlist_for_each_entry_safe(n, tmp, hhead, node) {
139 			res = rps_may_expire_flow(enic->netdev, n->rq_id,
140 						  n->flow_id, n->fltr_id);
141 			if (res) {
142 				res = enic_delfltr(enic, n->fltr_id);
143 				if (unlikely(res))
144 					continue;
145 				hlist_del(&n->node);
146 				kfree(n);
147 				enic->rfs_h.free++;
148 			}
149 		}
150 	}
151 	spin_unlock_bh(&enic->rfs_h.lock);
152 	mod_timer(&enic->rfs_h.rfs_may_expire, jiffies + HZ/4);
153 }
154 
155 static struct enic_rfs_fltr_node *htbl_key_search(struct hlist_head *h,
156 						  struct flow_keys *k)
157 {
158 	struct enic_rfs_fltr_node *tpos;
159 
160 	hlist_for_each_entry(tpos, h, node)
161 		if (tpos->keys.src == k->src &&
162 		    tpos->keys.dst == k->dst &&
163 		    tpos->keys.ports == k->ports &&
164 		    tpos->keys.ip_proto == k->ip_proto &&
165 		    tpos->keys.n_proto == k->n_proto)
166 			return tpos;
167 	return NULL;
168 }
169 
170 int enic_rx_flow_steer(struct net_device *dev, const struct sk_buff *skb,
171 		       u16 rxq_index, u32 flow_id)
172 {
173 	struct flow_keys keys;
174 	struct enic_rfs_fltr_node *n;
175 	struct enic *enic;
176 	u16 tbl_idx;
177 	int res, i;
178 
179 	enic = netdev_priv(dev);
180 	res = skb_flow_dissect(skb, &keys);
181 	if (!res || keys.n_proto != htons(ETH_P_IP) ||
182 	    (keys.ip_proto != IPPROTO_TCP && keys.ip_proto != IPPROTO_UDP))
183 		return -EPROTONOSUPPORT;
184 
185 	tbl_idx = skb_get_hash_raw(skb) & ENIC_RFS_FLW_MASK;
186 	spin_lock_bh(&enic->rfs_h.lock);
187 	n = htbl_key_search(&enic->rfs_h.ht_head[tbl_idx], &keys);
188 
189 	if (n) { /* entry already present  */
190 		if (rxq_index == n->rq_id) {
191 			res = -EEXIST;
192 			goto ret_unlock;
193 		}
194 
195 		/* desired rq changed for the flow, we need to delete
196 		 * old fltr and add new one
197 		 *
198 		 * The moment we delete the fltr, the upcoming pkts
199 		 * are put it default rq based on rss. When we add
200 		 * new filter, upcoming pkts are put in desired queue.
201 		 * This could cause ooo pkts.
202 		 *
203 		 * Lets 1st try adding new fltr and then del old one.
204 		 */
205 		i = --enic->rfs_h.free;
206 		/* clsf tbl is full, we have to del old fltr first*/
207 		if (unlikely(i < 0)) {
208 			enic->rfs_h.free++;
209 			res = enic_delfltr(enic, n->fltr_id);
210 			if (unlikely(res < 0))
211 				goto ret_unlock;
212 			res = enic_addfltr_5t(enic, &keys, rxq_index);
213 			if (res < 0) {
214 				hlist_del(&n->node);
215 				enic->rfs_h.free++;
216 				goto ret_unlock;
217 			}
218 		/* add new fltr 1st then del old fltr */
219 		} else {
220 			int ret;
221 
222 			res = enic_addfltr_5t(enic, &keys, rxq_index);
223 			if (res < 0) {
224 				enic->rfs_h.free++;
225 				goto ret_unlock;
226 			}
227 			ret = enic_delfltr(enic, n->fltr_id);
228 			/* deleting old fltr failed. Add old fltr to list.
229 			 * enic_flow_may_expire() will try to delete it later.
230 			 */
231 			if (unlikely(ret < 0)) {
232 				struct enic_rfs_fltr_node *d;
233 				struct hlist_head *head;
234 
235 				head = &enic->rfs_h.ht_head[tbl_idx];
236 				d = kmalloc(sizeof(*d), GFP_ATOMIC);
237 				if (d) {
238 					d->fltr_id = n->fltr_id;
239 					INIT_HLIST_NODE(&d->node);
240 					hlist_add_head(&d->node, head);
241 				}
242 			} else {
243 				enic->rfs_h.free++;
244 			}
245 		}
246 		n->rq_id = rxq_index;
247 		n->fltr_id = res;
248 		n->flow_id = flow_id;
249 	/* entry not present */
250 	} else {
251 		i = --enic->rfs_h.free;
252 		if (i <= 0) {
253 			enic->rfs_h.free++;
254 			res = -EBUSY;
255 			goto ret_unlock;
256 		}
257 
258 		n = kmalloc(sizeof(*n), GFP_ATOMIC);
259 		if (!n) {
260 			res = -ENOMEM;
261 			enic->rfs_h.free++;
262 			goto ret_unlock;
263 		}
264 
265 		res = enic_addfltr_5t(enic, &keys, rxq_index);
266 		if (res < 0) {
267 			kfree(n);
268 			enic->rfs_h.free++;
269 			goto ret_unlock;
270 		}
271 		n->rq_id = rxq_index;
272 		n->fltr_id = res;
273 		n->flow_id = flow_id;
274 		n->keys = keys;
275 		INIT_HLIST_NODE(&n->node);
276 		hlist_add_head(&n->node, &enic->rfs_h.ht_head[tbl_idx]);
277 	}
278 
279 ret_unlock:
280 	spin_unlock_bh(&enic->rfs_h.lock);
281 	return res;
282 }
283 
284 #endif /* CONFIG_RFS_ACCEL */
285