1 // SPDX-License-Identifier: GPL-2.0 2 /* Copyright(c) 2013 - 2018 Intel Corporation. */ 3 4 #include "iavf.h" 5 #include "iavf_prototype.h" 6 #include "iavf_client.h" 7 /* All iavf tracepoints are defined by the include below, which must 8 * be included exactly once across the whole kernel with 9 * CREATE_TRACE_POINTS defined 10 */ 11 #define CREATE_TRACE_POINTS 12 #include "iavf_trace.h" 13 14 static int iavf_setup_all_tx_resources(struct iavf_adapter *adapter); 15 static int iavf_setup_all_rx_resources(struct iavf_adapter *adapter); 16 static int iavf_close(struct net_device *netdev); 17 static void iavf_init_get_resources(struct iavf_adapter *adapter); 18 static int iavf_check_reset_complete(struct iavf_hw *hw); 19 20 char iavf_driver_name[] = "iavf"; 21 static const char iavf_driver_string[] = 22 "Intel(R) Ethernet Adaptive Virtual Function Network Driver"; 23 24 static const char iavf_copyright[] = 25 "Copyright (c) 2013 - 2018 Intel Corporation."; 26 27 /* iavf_pci_tbl - PCI Device ID Table 28 * 29 * Wildcard entries (PCI_ANY_ID) should come last 30 * Last entry must be all 0s 31 * 32 * { Vendor ID, Device ID, SubVendor ID, SubDevice ID, 33 * Class, Class Mask, private data (not used) } 34 */ 35 static const struct pci_device_id iavf_pci_tbl[] = { 36 {PCI_VDEVICE(INTEL, IAVF_DEV_ID_VF), 0}, 37 {PCI_VDEVICE(INTEL, IAVF_DEV_ID_VF_HV), 0}, 38 {PCI_VDEVICE(INTEL, IAVF_DEV_ID_X722_VF), 0}, 39 {PCI_VDEVICE(INTEL, IAVF_DEV_ID_ADAPTIVE_VF), 0}, 40 /* required last entry */ 41 {0, } 42 }; 43 44 MODULE_DEVICE_TABLE(pci, iavf_pci_tbl); 45 46 MODULE_ALIAS("i40evf"); 47 MODULE_AUTHOR("Intel Corporation, <linux.nics@intel.com>"); 48 MODULE_DESCRIPTION("Intel(R) Ethernet Adaptive Virtual Function Network Driver"); 49 MODULE_LICENSE("GPL v2"); 50 51 static const struct net_device_ops iavf_netdev_ops; 52 struct workqueue_struct *iavf_wq; 53 54 /** 55 * iavf_pdev_to_adapter - go from pci_dev to adapter 56 * @pdev: pci_dev pointer 57 */ 58 static struct iavf_adapter *iavf_pdev_to_adapter(struct pci_dev *pdev) 59 { 60 return netdev_priv(pci_get_drvdata(pdev)); 61 } 62 63 /** 64 * iavf_allocate_dma_mem_d - OS specific memory alloc for shared code 65 * @hw: pointer to the HW structure 66 * @mem: ptr to mem struct to fill out 67 * @size: size of memory requested 68 * @alignment: what to align the allocation to 69 **/ 70 enum iavf_status iavf_allocate_dma_mem_d(struct iavf_hw *hw, 71 struct iavf_dma_mem *mem, 72 u64 size, u32 alignment) 73 { 74 struct iavf_adapter *adapter = (struct iavf_adapter *)hw->back; 75 76 if (!mem) 77 return IAVF_ERR_PARAM; 78 79 mem->size = ALIGN(size, alignment); 80 mem->va = dma_alloc_coherent(&adapter->pdev->dev, mem->size, 81 (dma_addr_t *)&mem->pa, GFP_KERNEL); 82 if (mem->va) 83 return 0; 84 else 85 return IAVF_ERR_NO_MEMORY; 86 } 87 88 /** 89 * iavf_free_dma_mem_d - OS specific memory free for shared code 90 * @hw: pointer to the HW structure 91 * @mem: ptr to mem struct to free 92 **/ 93 enum iavf_status iavf_free_dma_mem_d(struct iavf_hw *hw, 94 struct iavf_dma_mem *mem) 95 { 96 struct iavf_adapter *adapter = (struct iavf_adapter *)hw->back; 97 98 if (!mem || !mem->va) 99 return IAVF_ERR_PARAM; 100 dma_free_coherent(&adapter->pdev->dev, mem->size, 101 mem->va, (dma_addr_t)mem->pa); 102 return 0; 103 } 104 105 /** 106 * iavf_allocate_virt_mem_d - OS specific memory alloc for shared code 107 * @hw: pointer to the HW structure 108 * @mem: ptr to mem struct to fill out 109 * @size: size of memory requested 110 **/ 111 enum iavf_status iavf_allocate_virt_mem_d(struct iavf_hw *hw, 112 struct iavf_virt_mem *mem, u32 size) 113 { 114 if (!mem) 115 return IAVF_ERR_PARAM; 116 117 mem->size = size; 118 mem->va = kzalloc(size, GFP_KERNEL); 119 120 if (mem->va) 121 return 0; 122 else 123 return IAVF_ERR_NO_MEMORY; 124 } 125 126 /** 127 * iavf_free_virt_mem_d - OS specific memory free for shared code 128 * @hw: pointer to the HW structure 129 * @mem: ptr to mem struct to free 130 **/ 131 enum iavf_status iavf_free_virt_mem_d(struct iavf_hw *hw, 132 struct iavf_virt_mem *mem) 133 { 134 if (!mem) 135 return IAVF_ERR_PARAM; 136 137 /* it's ok to kfree a NULL pointer */ 138 kfree(mem->va); 139 140 return 0; 141 } 142 143 /** 144 * iavf_lock_timeout - try to lock mutex but give up after timeout 145 * @lock: mutex that should be locked 146 * @msecs: timeout in msecs 147 * 148 * Returns 0 on success, negative on failure 149 **/ 150 int iavf_lock_timeout(struct mutex *lock, unsigned int msecs) 151 { 152 unsigned int wait, delay = 10; 153 154 for (wait = 0; wait < msecs; wait += delay) { 155 if (mutex_trylock(lock)) 156 return 0; 157 158 msleep(delay); 159 } 160 161 return -1; 162 } 163 164 /** 165 * iavf_schedule_reset - Set the flags and schedule a reset event 166 * @adapter: board private structure 167 **/ 168 void iavf_schedule_reset(struct iavf_adapter *adapter) 169 { 170 if (!(adapter->flags & 171 (IAVF_FLAG_RESET_PENDING | IAVF_FLAG_RESET_NEEDED))) { 172 adapter->flags |= IAVF_FLAG_RESET_NEEDED; 173 queue_work(iavf_wq, &adapter->reset_task); 174 } 175 } 176 177 /** 178 * iavf_schedule_request_stats - Set the flags and schedule statistics request 179 * @adapter: board private structure 180 * 181 * Sets IAVF_FLAG_AQ_REQUEST_STATS flag so iavf_watchdog_task() will explicitly 182 * request and refresh ethtool stats 183 **/ 184 void iavf_schedule_request_stats(struct iavf_adapter *adapter) 185 { 186 adapter->aq_required |= IAVF_FLAG_AQ_REQUEST_STATS; 187 mod_delayed_work(iavf_wq, &adapter->watchdog_task, 0); 188 } 189 190 /** 191 * iavf_tx_timeout - Respond to a Tx Hang 192 * @netdev: network interface device structure 193 * @txqueue: queue number that is timing out 194 **/ 195 static void iavf_tx_timeout(struct net_device *netdev, unsigned int txqueue) 196 { 197 struct iavf_adapter *adapter = netdev_priv(netdev); 198 199 adapter->tx_timeout_count++; 200 iavf_schedule_reset(adapter); 201 } 202 203 /** 204 * iavf_misc_irq_disable - Mask off interrupt generation on the NIC 205 * @adapter: board private structure 206 **/ 207 static void iavf_misc_irq_disable(struct iavf_adapter *adapter) 208 { 209 struct iavf_hw *hw = &adapter->hw; 210 211 if (!adapter->msix_entries) 212 return; 213 214 wr32(hw, IAVF_VFINT_DYN_CTL01, 0); 215 216 iavf_flush(hw); 217 218 synchronize_irq(adapter->msix_entries[0].vector); 219 } 220 221 /** 222 * iavf_misc_irq_enable - Enable default interrupt generation settings 223 * @adapter: board private structure 224 **/ 225 static void iavf_misc_irq_enable(struct iavf_adapter *adapter) 226 { 227 struct iavf_hw *hw = &adapter->hw; 228 229 wr32(hw, IAVF_VFINT_DYN_CTL01, IAVF_VFINT_DYN_CTL01_INTENA_MASK | 230 IAVF_VFINT_DYN_CTL01_ITR_INDX_MASK); 231 wr32(hw, IAVF_VFINT_ICR0_ENA1, IAVF_VFINT_ICR0_ENA1_ADMINQ_MASK); 232 233 iavf_flush(hw); 234 } 235 236 /** 237 * iavf_irq_disable - Mask off interrupt generation on the NIC 238 * @adapter: board private structure 239 **/ 240 static void iavf_irq_disable(struct iavf_adapter *adapter) 241 { 242 int i; 243 struct iavf_hw *hw = &adapter->hw; 244 245 if (!adapter->msix_entries) 246 return; 247 248 for (i = 1; i < adapter->num_msix_vectors; i++) { 249 wr32(hw, IAVF_VFINT_DYN_CTLN1(i - 1), 0); 250 synchronize_irq(adapter->msix_entries[i].vector); 251 } 252 iavf_flush(hw); 253 } 254 255 /** 256 * iavf_irq_enable_queues - Enable interrupt for specified queues 257 * @adapter: board private structure 258 * @mask: bitmap of queues to enable 259 **/ 260 void iavf_irq_enable_queues(struct iavf_adapter *adapter, u32 mask) 261 { 262 struct iavf_hw *hw = &adapter->hw; 263 int i; 264 265 for (i = 1; i < adapter->num_msix_vectors; i++) { 266 if (mask & BIT(i - 1)) { 267 wr32(hw, IAVF_VFINT_DYN_CTLN1(i - 1), 268 IAVF_VFINT_DYN_CTLN1_INTENA_MASK | 269 IAVF_VFINT_DYN_CTLN1_ITR_INDX_MASK); 270 } 271 } 272 } 273 274 /** 275 * iavf_irq_enable - Enable default interrupt generation settings 276 * @adapter: board private structure 277 * @flush: boolean value whether to run rd32() 278 **/ 279 void iavf_irq_enable(struct iavf_adapter *adapter, bool flush) 280 { 281 struct iavf_hw *hw = &adapter->hw; 282 283 iavf_misc_irq_enable(adapter); 284 iavf_irq_enable_queues(adapter, ~0); 285 286 if (flush) 287 iavf_flush(hw); 288 } 289 290 /** 291 * iavf_msix_aq - Interrupt handler for vector 0 292 * @irq: interrupt number 293 * @data: pointer to netdev 294 **/ 295 static irqreturn_t iavf_msix_aq(int irq, void *data) 296 { 297 struct net_device *netdev = data; 298 struct iavf_adapter *adapter = netdev_priv(netdev); 299 struct iavf_hw *hw = &adapter->hw; 300 301 /* handle non-queue interrupts, these reads clear the registers */ 302 rd32(hw, IAVF_VFINT_ICR01); 303 rd32(hw, IAVF_VFINT_ICR0_ENA1); 304 305 if (adapter->state != __IAVF_REMOVE) 306 /* schedule work on the private workqueue */ 307 queue_work(iavf_wq, &adapter->adminq_task); 308 309 return IRQ_HANDLED; 310 } 311 312 /** 313 * iavf_msix_clean_rings - MSIX mode Interrupt Handler 314 * @irq: interrupt number 315 * @data: pointer to a q_vector 316 **/ 317 static irqreturn_t iavf_msix_clean_rings(int irq, void *data) 318 { 319 struct iavf_q_vector *q_vector = data; 320 321 if (!q_vector->tx.ring && !q_vector->rx.ring) 322 return IRQ_HANDLED; 323 324 napi_schedule_irqoff(&q_vector->napi); 325 326 return IRQ_HANDLED; 327 } 328 329 /** 330 * iavf_map_vector_to_rxq - associate irqs with rx queues 331 * @adapter: board private structure 332 * @v_idx: interrupt number 333 * @r_idx: queue number 334 **/ 335 static void 336 iavf_map_vector_to_rxq(struct iavf_adapter *adapter, int v_idx, int r_idx) 337 { 338 struct iavf_q_vector *q_vector = &adapter->q_vectors[v_idx]; 339 struct iavf_ring *rx_ring = &adapter->rx_rings[r_idx]; 340 struct iavf_hw *hw = &adapter->hw; 341 342 rx_ring->q_vector = q_vector; 343 rx_ring->next = q_vector->rx.ring; 344 rx_ring->vsi = &adapter->vsi; 345 q_vector->rx.ring = rx_ring; 346 q_vector->rx.count++; 347 q_vector->rx.next_update = jiffies + 1; 348 q_vector->rx.target_itr = ITR_TO_REG(rx_ring->itr_setting); 349 q_vector->ring_mask |= BIT(r_idx); 350 wr32(hw, IAVF_VFINT_ITRN1(IAVF_RX_ITR, q_vector->reg_idx), 351 q_vector->rx.current_itr >> 1); 352 q_vector->rx.current_itr = q_vector->rx.target_itr; 353 } 354 355 /** 356 * iavf_map_vector_to_txq - associate irqs with tx queues 357 * @adapter: board private structure 358 * @v_idx: interrupt number 359 * @t_idx: queue number 360 **/ 361 static void 362 iavf_map_vector_to_txq(struct iavf_adapter *adapter, int v_idx, int t_idx) 363 { 364 struct iavf_q_vector *q_vector = &adapter->q_vectors[v_idx]; 365 struct iavf_ring *tx_ring = &adapter->tx_rings[t_idx]; 366 struct iavf_hw *hw = &adapter->hw; 367 368 tx_ring->q_vector = q_vector; 369 tx_ring->next = q_vector->tx.ring; 370 tx_ring->vsi = &adapter->vsi; 371 q_vector->tx.ring = tx_ring; 372 q_vector->tx.count++; 373 q_vector->tx.next_update = jiffies + 1; 374 q_vector->tx.target_itr = ITR_TO_REG(tx_ring->itr_setting); 375 q_vector->num_ringpairs++; 376 wr32(hw, IAVF_VFINT_ITRN1(IAVF_TX_ITR, q_vector->reg_idx), 377 q_vector->tx.target_itr >> 1); 378 q_vector->tx.current_itr = q_vector->tx.target_itr; 379 } 380 381 /** 382 * iavf_map_rings_to_vectors - Maps descriptor rings to vectors 383 * @adapter: board private structure to initialize 384 * 385 * This function maps descriptor rings to the queue-specific vectors 386 * we were allotted through the MSI-X enabling code. Ideally, we'd have 387 * one vector per ring/queue, but on a constrained vector budget, we 388 * group the rings as "efficiently" as possible. You would add new 389 * mapping configurations in here. 390 **/ 391 static void iavf_map_rings_to_vectors(struct iavf_adapter *adapter) 392 { 393 int rings_remaining = adapter->num_active_queues; 394 int ridx = 0, vidx = 0; 395 int q_vectors; 396 397 q_vectors = adapter->num_msix_vectors - NONQ_VECS; 398 399 for (; ridx < rings_remaining; ridx++) { 400 iavf_map_vector_to_rxq(adapter, vidx, ridx); 401 iavf_map_vector_to_txq(adapter, vidx, ridx); 402 403 /* In the case where we have more queues than vectors, continue 404 * round-robin on vectors until all queues are mapped. 405 */ 406 if (++vidx >= q_vectors) 407 vidx = 0; 408 } 409 410 adapter->aq_required |= IAVF_FLAG_AQ_MAP_VECTORS; 411 } 412 413 /** 414 * iavf_irq_affinity_notify - Callback for affinity changes 415 * @notify: context as to what irq was changed 416 * @mask: the new affinity mask 417 * 418 * This is a callback function used by the irq_set_affinity_notifier function 419 * so that we may register to receive changes to the irq affinity masks. 420 **/ 421 static void iavf_irq_affinity_notify(struct irq_affinity_notify *notify, 422 const cpumask_t *mask) 423 { 424 struct iavf_q_vector *q_vector = 425 container_of(notify, struct iavf_q_vector, affinity_notify); 426 427 cpumask_copy(&q_vector->affinity_mask, mask); 428 } 429 430 /** 431 * iavf_irq_affinity_release - Callback for affinity notifier release 432 * @ref: internal core kernel usage 433 * 434 * This is a callback function used by the irq_set_affinity_notifier function 435 * to inform the current notification subscriber that they will no longer 436 * receive notifications. 437 **/ 438 static void iavf_irq_affinity_release(struct kref *ref) {} 439 440 /** 441 * iavf_request_traffic_irqs - Initialize MSI-X interrupts 442 * @adapter: board private structure 443 * @basename: device basename 444 * 445 * Allocates MSI-X vectors for tx and rx handling, and requests 446 * interrupts from the kernel. 447 **/ 448 static int 449 iavf_request_traffic_irqs(struct iavf_adapter *adapter, char *basename) 450 { 451 unsigned int vector, q_vectors; 452 unsigned int rx_int_idx = 0, tx_int_idx = 0; 453 int irq_num, err; 454 int cpu; 455 456 iavf_irq_disable(adapter); 457 /* Decrement for Other and TCP Timer vectors */ 458 q_vectors = adapter->num_msix_vectors - NONQ_VECS; 459 460 for (vector = 0; vector < q_vectors; vector++) { 461 struct iavf_q_vector *q_vector = &adapter->q_vectors[vector]; 462 463 irq_num = adapter->msix_entries[vector + NONQ_VECS].vector; 464 465 if (q_vector->tx.ring && q_vector->rx.ring) { 466 snprintf(q_vector->name, sizeof(q_vector->name), 467 "iavf-%s-TxRx-%u", basename, rx_int_idx++); 468 tx_int_idx++; 469 } else if (q_vector->rx.ring) { 470 snprintf(q_vector->name, sizeof(q_vector->name), 471 "iavf-%s-rx-%u", basename, rx_int_idx++); 472 } else if (q_vector->tx.ring) { 473 snprintf(q_vector->name, sizeof(q_vector->name), 474 "iavf-%s-tx-%u", basename, tx_int_idx++); 475 } else { 476 /* skip this unused q_vector */ 477 continue; 478 } 479 err = request_irq(irq_num, 480 iavf_msix_clean_rings, 481 0, 482 q_vector->name, 483 q_vector); 484 if (err) { 485 dev_info(&adapter->pdev->dev, 486 "Request_irq failed, error: %d\n", err); 487 goto free_queue_irqs; 488 } 489 /* register for affinity change notifications */ 490 q_vector->affinity_notify.notify = iavf_irq_affinity_notify; 491 q_vector->affinity_notify.release = 492 iavf_irq_affinity_release; 493 irq_set_affinity_notifier(irq_num, &q_vector->affinity_notify); 494 /* Spread the IRQ affinity hints across online CPUs. Note that 495 * get_cpu_mask returns a mask with a permanent lifetime so 496 * it's safe to use as a hint for irq_update_affinity_hint. 497 */ 498 cpu = cpumask_local_spread(q_vector->v_idx, -1); 499 irq_update_affinity_hint(irq_num, get_cpu_mask(cpu)); 500 } 501 502 return 0; 503 504 free_queue_irqs: 505 while (vector) { 506 vector--; 507 irq_num = adapter->msix_entries[vector + NONQ_VECS].vector; 508 irq_set_affinity_notifier(irq_num, NULL); 509 irq_update_affinity_hint(irq_num, NULL); 510 free_irq(irq_num, &adapter->q_vectors[vector]); 511 } 512 return err; 513 } 514 515 /** 516 * iavf_request_misc_irq - Initialize MSI-X interrupts 517 * @adapter: board private structure 518 * 519 * Allocates MSI-X vector 0 and requests interrupts from the kernel. This 520 * vector is only for the admin queue, and stays active even when the netdev 521 * is closed. 522 **/ 523 static int iavf_request_misc_irq(struct iavf_adapter *adapter) 524 { 525 struct net_device *netdev = adapter->netdev; 526 int err; 527 528 snprintf(adapter->misc_vector_name, 529 sizeof(adapter->misc_vector_name) - 1, "iavf-%s:mbx", 530 dev_name(&adapter->pdev->dev)); 531 err = request_irq(adapter->msix_entries[0].vector, 532 &iavf_msix_aq, 0, 533 adapter->misc_vector_name, netdev); 534 if (err) { 535 dev_err(&adapter->pdev->dev, 536 "request_irq for %s failed: %d\n", 537 adapter->misc_vector_name, err); 538 free_irq(adapter->msix_entries[0].vector, netdev); 539 } 540 return err; 541 } 542 543 /** 544 * iavf_free_traffic_irqs - Free MSI-X interrupts 545 * @adapter: board private structure 546 * 547 * Frees all MSI-X vectors other than 0. 548 **/ 549 static void iavf_free_traffic_irqs(struct iavf_adapter *adapter) 550 { 551 int vector, irq_num, q_vectors; 552 553 if (!adapter->msix_entries) 554 return; 555 556 q_vectors = adapter->num_msix_vectors - NONQ_VECS; 557 558 for (vector = 0; vector < q_vectors; vector++) { 559 irq_num = adapter->msix_entries[vector + NONQ_VECS].vector; 560 irq_set_affinity_notifier(irq_num, NULL); 561 irq_update_affinity_hint(irq_num, NULL); 562 free_irq(irq_num, &adapter->q_vectors[vector]); 563 } 564 } 565 566 /** 567 * iavf_free_misc_irq - Free MSI-X miscellaneous vector 568 * @adapter: board private structure 569 * 570 * Frees MSI-X vector 0. 571 **/ 572 static void iavf_free_misc_irq(struct iavf_adapter *adapter) 573 { 574 struct net_device *netdev = adapter->netdev; 575 576 if (!adapter->msix_entries) 577 return; 578 579 free_irq(adapter->msix_entries[0].vector, netdev); 580 } 581 582 /** 583 * iavf_configure_tx - Configure Transmit Unit after Reset 584 * @adapter: board private structure 585 * 586 * Configure the Tx unit of the MAC after a reset. 587 **/ 588 static void iavf_configure_tx(struct iavf_adapter *adapter) 589 { 590 struct iavf_hw *hw = &adapter->hw; 591 int i; 592 593 for (i = 0; i < adapter->num_active_queues; i++) 594 adapter->tx_rings[i].tail = hw->hw_addr + IAVF_QTX_TAIL1(i); 595 } 596 597 /** 598 * iavf_configure_rx - Configure Receive Unit after Reset 599 * @adapter: board private structure 600 * 601 * Configure the Rx unit of the MAC after a reset. 602 **/ 603 static void iavf_configure_rx(struct iavf_adapter *adapter) 604 { 605 unsigned int rx_buf_len = IAVF_RXBUFFER_2048; 606 struct iavf_hw *hw = &adapter->hw; 607 int i; 608 609 /* Legacy Rx will always default to a 2048 buffer size. */ 610 #if (PAGE_SIZE < 8192) 611 if (!(adapter->flags & IAVF_FLAG_LEGACY_RX)) { 612 struct net_device *netdev = adapter->netdev; 613 614 /* For jumbo frames on systems with 4K pages we have to use 615 * an order 1 page, so we might as well increase the size 616 * of our Rx buffer to make better use of the available space 617 */ 618 rx_buf_len = IAVF_RXBUFFER_3072; 619 620 /* We use a 1536 buffer size for configurations with 621 * standard Ethernet mtu. On x86 this gives us enough room 622 * for shared info and 192 bytes of padding. 623 */ 624 if (!IAVF_2K_TOO_SMALL_WITH_PADDING && 625 (netdev->mtu <= ETH_DATA_LEN)) 626 rx_buf_len = IAVF_RXBUFFER_1536 - NET_IP_ALIGN; 627 } 628 #endif 629 630 for (i = 0; i < adapter->num_active_queues; i++) { 631 adapter->rx_rings[i].tail = hw->hw_addr + IAVF_QRX_TAIL1(i); 632 adapter->rx_rings[i].rx_buf_len = rx_buf_len; 633 634 if (adapter->flags & IAVF_FLAG_LEGACY_RX) 635 clear_ring_build_skb_enabled(&adapter->rx_rings[i]); 636 else 637 set_ring_build_skb_enabled(&adapter->rx_rings[i]); 638 } 639 } 640 641 /** 642 * iavf_find_vlan - Search filter list for specific vlan filter 643 * @adapter: board private structure 644 * @vlan: vlan tag 645 * 646 * Returns ptr to the filter object or NULL. Must be called while holding the 647 * mac_vlan_list_lock. 648 **/ 649 static struct 650 iavf_vlan_filter *iavf_find_vlan(struct iavf_adapter *adapter, 651 struct iavf_vlan vlan) 652 { 653 struct iavf_vlan_filter *f; 654 655 list_for_each_entry(f, &adapter->vlan_filter_list, list) { 656 if (f->vlan.vid == vlan.vid && 657 f->vlan.tpid == vlan.tpid) 658 return f; 659 } 660 661 return NULL; 662 } 663 664 /** 665 * iavf_add_vlan - Add a vlan filter to the list 666 * @adapter: board private structure 667 * @vlan: VLAN tag 668 * 669 * Returns ptr to the filter object or NULL when no memory available. 670 **/ 671 static struct 672 iavf_vlan_filter *iavf_add_vlan(struct iavf_adapter *adapter, 673 struct iavf_vlan vlan) 674 { 675 struct iavf_vlan_filter *f = NULL; 676 677 spin_lock_bh(&adapter->mac_vlan_list_lock); 678 679 f = iavf_find_vlan(adapter, vlan); 680 if (!f) { 681 f = kzalloc(sizeof(*f), GFP_ATOMIC); 682 if (!f) 683 goto clearout; 684 685 f->vlan = vlan; 686 687 list_add_tail(&f->list, &adapter->vlan_filter_list); 688 f->add = true; 689 adapter->aq_required |= IAVF_FLAG_AQ_ADD_VLAN_FILTER; 690 } 691 692 clearout: 693 spin_unlock_bh(&adapter->mac_vlan_list_lock); 694 return f; 695 } 696 697 /** 698 * iavf_del_vlan - Remove a vlan filter from the list 699 * @adapter: board private structure 700 * @vlan: VLAN tag 701 **/ 702 static void iavf_del_vlan(struct iavf_adapter *adapter, struct iavf_vlan vlan) 703 { 704 struct iavf_vlan_filter *f; 705 706 spin_lock_bh(&adapter->mac_vlan_list_lock); 707 708 f = iavf_find_vlan(adapter, vlan); 709 if (f) { 710 f->remove = true; 711 adapter->aq_required |= IAVF_FLAG_AQ_DEL_VLAN_FILTER; 712 } 713 714 spin_unlock_bh(&adapter->mac_vlan_list_lock); 715 } 716 717 /** 718 * iavf_restore_filters 719 * @adapter: board private structure 720 * 721 * Restore existing non MAC filters when VF netdev comes back up 722 **/ 723 static void iavf_restore_filters(struct iavf_adapter *adapter) 724 { 725 u16 vid; 726 727 /* re-add all VLAN filters */ 728 for_each_set_bit(vid, adapter->vsi.active_cvlans, VLAN_N_VID) 729 iavf_add_vlan(adapter, IAVF_VLAN(vid, ETH_P_8021Q)); 730 731 for_each_set_bit(vid, adapter->vsi.active_svlans, VLAN_N_VID) 732 iavf_add_vlan(adapter, IAVF_VLAN(vid, ETH_P_8021AD)); 733 } 734 735 /** 736 * iavf_get_num_vlans_added - get number of VLANs added 737 * @adapter: board private structure 738 */ 739 static u16 iavf_get_num_vlans_added(struct iavf_adapter *adapter) 740 { 741 return bitmap_weight(adapter->vsi.active_cvlans, VLAN_N_VID) + 742 bitmap_weight(adapter->vsi.active_svlans, VLAN_N_VID); 743 } 744 745 /** 746 * iavf_get_max_vlans_allowed - get maximum VLANs allowed for this VF 747 * @adapter: board private structure 748 * 749 * This depends on the negotiated VLAN capability. For VIRTCHNL_VF_OFFLOAD_VLAN, 750 * do not impose a limit as that maintains current behavior and for 751 * VIRTCHNL_VF_OFFLOAD_VLAN_V2, use the maximum allowed sent from the PF. 752 **/ 753 static u16 iavf_get_max_vlans_allowed(struct iavf_adapter *adapter) 754 { 755 /* don't impose any limit for VIRTCHNL_VF_OFFLOAD_VLAN since there has 756 * never been a limit on the VF driver side 757 */ 758 if (VLAN_ALLOWED(adapter)) 759 return VLAN_N_VID; 760 else if (VLAN_V2_ALLOWED(adapter)) 761 return adapter->vlan_v2_caps.filtering.max_filters; 762 763 return 0; 764 } 765 766 /** 767 * iavf_max_vlans_added - check if maximum VLANs allowed already exist 768 * @adapter: board private structure 769 **/ 770 static bool iavf_max_vlans_added(struct iavf_adapter *adapter) 771 { 772 if (iavf_get_num_vlans_added(adapter) < 773 iavf_get_max_vlans_allowed(adapter)) 774 return false; 775 776 return true; 777 } 778 779 /** 780 * iavf_vlan_rx_add_vid - Add a VLAN filter to a device 781 * @netdev: network device struct 782 * @proto: unused protocol data 783 * @vid: VLAN tag 784 **/ 785 static int iavf_vlan_rx_add_vid(struct net_device *netdev, 786 __always_unused __be16 proto, u16 vid) 787 { 788 struct iavf_adapter *adapter = netdev_priv(netdev); 789 790 if (!VLAN_FILTERING_ALLOWED(adapter)) 791 return -EIO; 792 793 if (iavf_max_vlans_added(adapter)) { 794 netdev_err(netdev, "Max allowed VLAN filters %u. Remove existing VLANs or disable filtering via Ethtool if supported.\n", 795 iavf_get_max_vlans_allowed(adapter)); 796 return -EIO; 797 } 798 799 if (!iavf_add_vlan(adapter, IAVF_VLAN(vid, be16_to_cpu(proto)))) 800 return -ENOMEM; 801 802 if (proto == cpu_to_be16(ETH_P_8021Q)) 803 set_bit(vid, adapter->vsi.active_cvlans); 804 else 805 set_bit(vid, adapter->vsi.active_svlans); 806 807 return 0; 808 } 809 810 /** 811 * iavf_vlan_rx_kill_vid - Remove a VLAN filter from a device 812 * @netdev: network device struct 813 * @proto: unused protocol data 814 * @vid: VLAN tag 815 **/ 816 static int iavf_vlan_rx_kill_vid(struct net_device *netdev, 817 __always_unused __be16 proto, u16 vid) 818 { 819 struct iavf_adapter *adapter = netdev_priv(netdev); 820 821 iavf_del_vlan(adapter, IAVF_VLAN(vid, be16_to_cpu(proto))); 822 if (proto == cpu_to_be16(ETH_P_8021Q)) 823 clear_bit(vid, adapter->vsi.active_cvlans); 824 else 825 clear_bit(vid, adapter->vsi.active_svlans); 826 827 return 0; 828 } 829 830 /** 831 * iavf_find_filter - Search filter list for specific mac filter 832 * @adapter: board private structure 833 * @macaddr: the MAC address 834 * 835 * Returns ptr to the filter object or NULL. Must be called while holding the 836 * mac_vlan_list_lock. 837 **/ 838 static struct 839 iavf_mac_filter *iavf_find_filter(struct iavf_adapter *adapter, 840 const u8 *macaddr) 841 { 842 struct iavf_mac_filter *f; 843 844 if (!macaddr) 845 return NULL; 846 847 list_for_each_entry(f, &adapter->mac_filter_list, list) { 848 if (ether_addr_equal(macaddr, f->macaddr)) 849 return f; 850 } 851 return NULL; 852 } 853 854 /** 855 * iavf_add_filter - Add a mac filter to the filter list 856 * @adapter: board private structure 857 * @macaddr: the MAC address 858 * 859 * Returns ptr to the filter object or NULL when no memory available. 860 **/ 861 struct iavf_mac_filter *iavf_add_filter(struct iavf_adapter *adapter, 862 const u8 *macaddr) 863 { 864 struct iavf_mac_filter *f; 865 866 if (!macaddr) 867 return NULL; 868 869 f = iavf_find_filter(adapter, macaddr); 870 if (!f) { 871 f = kzalloc(sizeof(*f), GFP_ATOMIC); 872 if (!f) 873 return f; 874 875 ether_addr_copy(f->macaddr, macaddr); 876 877 list_add_tail(&f->list, &adapter->mac_filter_list); 878 f->add = true; 879 f->is_new_mac = true; 880 adapter->aq_required |= IAVF_FLAG_AQ_ADD_MAC_FILTER; 881 } else { 882 f->remove = false; 883 } 884 885 return f; 886 } 887 888 /** 889 * iavf_set_mac - NDO callback to set port mac address 890 * @netdev: network interface device structure 891 * @p: pointer to an address structure 892 * 893 * Returns 0 on success, negative on failure 894 **/ 895 static int iavf_set_mac(struct net_device *netdev, void *p) 896 { 897 struct iavf_adapter *adapter = netdev_priv(netdev); 898 struct iavf_hw *hw = &adapter->hw; 899 struct iavf_mac_filter *f; 900 struct sockaddr *addr = p; 901 902 if (!is_valid_ether_addr(addr->sa_data)) 903 return -EADDRNOTAVAIL; 904 905 if (ether_addr_equal(netdev->dev_addr, addr->sa_data)) 906 return 0; 907 908 spin_lock_bh(&adapter->mac_vlan_list_lock); 909 910 f = iavf_find_filter(adapter, hw->mac.addr); 911 if (f) { 912 f->remove = true; 913 adapter->aq_required |= IAVF_FLAG_AQ_DEL_MAC_FILTER; 914 } 915 916 f = iavf_add_filter(adapter, addr->sa_data); 917 918 spin_unlock_bh(&adapter->mac_vlan_list_lock); 919 920 if (f) { 921 ether_addr_copy(hw->mac.addr, addr->sa_data); 922 } 923 924 return (f == NULL) ? -ENOMEM : 0; 925 } 926 927 /** 928 * iavf_addr_sync - Callback for dev_(mc|uc)_sync to add address 929 * @netdev: the netdevice 930 * @addr: address to add 931 * 932 * Called by __dev_(mc|uc)_sync when an address needs to be added. We call 933 * __dev_(uc|mc)_sync from .set_rx_mode and guarantee to hold the hash lock. 934 */ 935 static int iavf_addr_sync(struct net_device *netdev, const u8 *addr) 936 { 937 struct iavf_adapter *adapter = netdev_priv(netdev); 938 939 if (iavf_add_filter(adapter, addr)) 940 return 0; 941 else 942 return -ENOMEM; 943 } 944 945 /** 946 * iavf_addr_unsync - Callback for dev_(mc|uc)_sync to remove address 947 * @netdev: the netdevice 948 * @addr: address to add 949 * 950 * Called by __dev_(mc|uc)_sync when an address needs to be removed. We call 951 * __dev_(uc|mc)_sync from .set_rx_mode and guarantee to hold the hash lock. 952 */ 953 static int iavf_addr_unsync(struct net_device *netdev, const u8 *addr) 954 { 955 struct iavf_adapter *adapter = netdev_priv(netdev); 956 struct iavf_mac_filter *f; 957 958 /* Under some circumstances, we might receive a request to delete 959 * our own device address from our uc list. Because we store the 960 * device address in the VSI's MAC/VLAN filter list, we need to ignore 961 * such requests and not delete our device address from this list. 962 */ 963 if (ether_addr_equal(addr, netdev->dev_addr)) 964 return 0; 965 966 f = iavf_find_filter(adapter, addr); 967 if (f) { 968 f->remove = true; 969 adapter->aq_required |= IAVF_FLAG_AQ_DEL_MAC_FILTER; 970 } 971 return 0; 972 } 973 974 /** 975 * iavf_set_rx_mode - NDO callback to set the netdev filters 976 * @netdev: network interface device structure 977 **/ 978 static void iavf_set_rx_mode(struct net_device *netdev) 979 { 980 struct iavf_adapter *adapter = netdev_priv(netdev); 981 982 spin_lock_bh(&adapter->mac_vlan_list_lock); 983 __dev_uc_sync(netdev, iavf_addr_sync, iavf_addr_unsync); 984 __dev_mc_sync(netdev, iavf_addr_sync, iavf_addr_unsync); 985 spin_unlock_bh(&adapter->mac_vlan_list_lock); 986 987 if (netdev->flags & IFF_PROMISC && 988 !(adapter->flags & IAVF_FLAG_PROMISC_ON)) 989 adapter->aq_required |= IAVF_FLAG_AQ_REQUEST_PROMISC; 990 else if (!(netdev->flags & IFF_PROMISC) && 991 adapter->flags & IAVF_FLAG_PROMISC_ON) 992 adapter->aq_required |= IAVF_FLAG_AQ_RELEASE_PROMISC; 993 994 if (netdev->flags & IFF_ALLMULTI && 995 !(adapter->flags & IAVF_FLAG_ALLMULTI_ON)) 996 adapter->aq_required |= IAVF_FLAG_AQ_REQUEST_ALLMULTI; 997 else if (!(netdev->flags & IFF_ALLMULTI) && 998 adapter->flags & IAVF_FLAG_ALLMULTI_ON) 999 adapter->aq_required |= IAVF_FLAG_AQ_RELEASE_ALLMULTI; 1000 } 1001 1002 /** 1003 * iavf_napi_enable_all - enable NAPI on all queue vectors 1004 * @adapter: board private structure 1005 **/ 1006 static void iavf_napi_enable_all(struct iavf_adapter *adapter) 1007 { 1008 int q_idx; 1009 struct iavf_q_vector *q_vector; 1010 int q_vectors = adapter->num_msix_vectors - NONQ_VECS; 1011 1012 for (q_idx = 0; q_idx < q_vectors; q_idx++) { 1013 struct napi_struct *napi; 1014 1015 q_vector = &adapter->q_vectors[q_idx]; 1016 napi = &q_vector->napi; 1017 napi_enable(napi); 1018 } 1019 } 1020 1021 /** 1022 * iavf_napi_disable_all - disable NAPI on all queue vectors 1023 * @adapter: board private structure 1024 **/ 1025 static void iavf_napi_disable_all(struct iavf_adapter *adapter) 1026 { 1027 int q_idx; 1028 struct iavf_q_vector *q_vector; 1029 int q_vectors = adapter->num_msix_vectors - NONQ_VECS; 1030 1031 for (q_idx = 0; q_idx < q_vectors; q_idx++) { 1032 q_vector = &adapter->q_vectors[q_idx]; 1033 napi_disable(&q_vector->napi); 1034 } 1035 } 1036 1037 /** 1038 * iavf_configure - set up transmit and receive data structures 1039 * @adapter: board private structure 1040 **/ 1041 static void iavf_configure(struct iavf_adapter *adapter) 1042 { 1043 struct net_device *netdev = adapter->netdev; 1044 int i; 1045 1046 iavf_set_rx_mode(netdev); 1047 1048 iavf_configure_tx(adapter); 1049 iavf_configure_rx(adapter); 1050 adapter->aq_required |= IAVF_FLAG_AQ_CONFIGURE_QUEUES; 1051 1052 for (i = 0; i < adapter->num_active_queues; i++) { 1053 struct iavf_ring *ring = &adapter->rx_rings[i]; 1054 1055 iavf_alloc_rx_buffers(ring, IAVF_DESC_UNUSED(ring)); 1056 } 1057 } 1058 1059 /** 1060 * iavf_up_complete - Finish the last steps of bringing up a connection 1061 * @adapter: board private structure 1062 * 1063 * Expects to be called while holding the __IAVF_IN_CRITICAL_TASK bit lock. 1064 **/ 1065 static void iavf_up_complete(struct iavf_adapter *adapter) 1066 { 1067 iavf_change_state(adapter, __IAVF_RUNNING); 1068 clear_bit(__IAVF_VSI_DOWN, adapter->vsi.state); 1069 1070 iavf_napi_enable_all(adapter); 1071 1072 adapter->aq_required |= IAVF_FLAG_AQ_ENABLE_QUEUES; 1073 if (CLIENT_ENABLED(adapter)) 1074 adapter->flags |= IAVF_FLAG_CLIENT_NEEDS_OPEN; 1075 mod_delayed_work(iavf_wq, &adapter->watchdog_task, 0); 1076 } 1077 1078 /** 1079 * iavf_down - Shutdown the connection processing 1080 * @adapter: board private structure 1081 * 1082 * Expects to be called while holding the __IAVF_IN_CRITICAL_TASK bit lock. 1083 **/ 1084 void iavf_down(struct iavf_adapter *adapter) 1085 { 1086 struct net_device *netdev = adapter->netdev; 1087 struct iavf_vlan_filter *vlf; 1088 struct iavf_cloud_filter *cf; 1089 struct iavf_fdir_fltr *fdir; 1090 struct iavf_mac_filter *f; 1091 struct iavf_adv_rss *rss; 1092 1093 if (adapter->state <= __IAVF_DOWN_PENDING) 1094 return; 1095 1096 netif_carrier_off(netdev); 1097 netif_tx_disable(netdev); 1098 adapter->link_up = false; 1099 iavf_napi_disable_all(adapter); 1100 iavf_irq_disable(adapter); 1101 1102 spin_lock_bh(&adapter->mac_vlan_list_lock); 1103 1104 /* clear the sync flag on all filters */ 1105 __dev_uc_unsync(adapter->netdev, NULL); 1106 __dev_mc_unsync(adapter->netdev, NULL); 1107 1108 /* remove all MAC filters */ 1109 list_for_each_entry(f, &adapter->mac_filter_list, list) { 1110 f->remove = true; 1111 } 1112 1113 /* remove all VLAN filters */ 1114 list_for_each_entry(vlf, &adapter->vlan_filter_list, list) { 1115 vlf->remove = true; 1116 } 1117 1118 spin_unlock_bh(&adapter->mac_vlan_list_lock); 1119 1120 /* remove all cloud filters */ 1121 spin_lock_bh(&adapter->cloud_filter_list_lock); 1122 list_for_each_entry(cf, &adapter->cloud_filter_list, list) { 1123 cf->del = true; 1124 } 1125 spin_unlock_bh(&adapter->cloud_filter_list_lock); 1126 1127 /* remove all Flow Director filters */ 1128 spin_lock_bh(&adapter->fdir_fltr_lock); 1129 list_for_each_entry(fdir, &adapter->fdir_list_head, list) { 1130 fdir->state = IAVF_FDIR_FLTR_DEL_REQUEST; 1131 } 1132 spin_unlock_bh(&adapter->fdir_fltr_lock); 1133 1134 /* remove all advance RSS configuration */ 1135 spin_lock_bh(&adapter->adv_rss_lock); 1136 list_for_each_entry(rss, &adapter->adv_rss_list_head, list) 1137 rss->state = IAVF_ADV_RSS_DEL_REQUEST; 1138 spin_unlock_bh(&adapter->adv_rss_lock); 1139 1140 if (!(adapter->flags & IAVF_FLAG_PF_COMMS_FAILED)) { 1141 /* cancel any current operation */ 1142 adapter->current_op = VIRTCHNL_OP_UNKNOWN; 1143 /* Schedule operations to close down the HW. Don't wait 1144 * here for this to complete. The watchdog is still running 1145 * and it will take care of this. 1146 */ 1147 adapter->aq_required = IAVF_FLAG_AQ_DEL_MAC_FILTER; 1148 adapter->aq_required |= IAVF_FLAG_AQ_DEL_VLAN_FILTER; 1149 adapter->aq_required |= IAVF_FLAG_AQ_DEL_CLOUD_FILTER; 1150 adapter->aq_required |= IAVF_FLAG_AQ_DEL_FDIR_FILTER; 1151 adapter->aq_required |= IAVF_FLAG_AQ_DEL_ADV_RSS_CFG; 1152 adapter->aq_required |= IAVF_FLAG_AQ_DISABLE_QUEUES; 1153 } 1154 1155 mod_delayed_work(iavf_wq, &adapter->watchdog_task, 0); 1156 } 1157 1158 /** 1159 * iavf_acquire_msix_vectors - Setup the MSIX capability 1160 * @adapter: board private structure 1161 * @vectors: number of vectors to request 1162 * 1163 * Work with the OS to set up the MSIX vectors needed. 1164 * 1165 * Returns 0 on success, negative on failure 1166 **/ 1167 static int 1168 iavf_acquire_msix_vectors(struct iavf_adapter *adapter, int vectors) 1169 { 1170 int err, vector_threshold; 1171 1172 /* We'll want at least 3 (vector_threshold): 1173 * 0) Other (Admin Queue and link, mostly) 1174 * 1) TxQ[0] Cleanup 1175 * 2) RxQ[0] Cleanup 1176 */ 1177 vector_threshold = MIN_MSIX_COUNT; 1178 1179 /* The more we get, the more we will assign to Tx/Rx Cleanup 1180 * for the separate queues...where Rx Cleanup >= Tx Cleanup. 1181 * Right now, we simply care about how many we'll get; we'll 1182 * set them up later while requesting irq's. 1183 */ 1184 err = pci_enable_msix_range(adapter->pdev, adapter->msix_entries, 1185 vector_threshold, vectors); 1186 if (err < 0) { 1187 dev_err(&adapter->pdev->dev, "Unable to allocate MSI-X interrupts\n"); 1188 kfree(adapter->msix_entries); 1189 adapter->msix_entries = NULL; 1190 return err; 1191 } 1192 1193 /* Adjust for only the vectors we'll use, which is minimum 1194 * of max_msix_q_vectors + NONQ_VECS, or the number of 1195 * vectors we were allocated. 1196 */ 1197 adapter->num_msix_vectors = err; 1198 return 0; 1199 } 1200 1201 /** 1202 * iavf_free_queues - Free memory for all rings 1203 * @adapter: board private structure to initialize 1204 * 1205 * Free all of the memory associated with queue pairs. 1206 **/ 1207 static void iavf_free_queues(struct iavf_adapter *adapter) 1208 { 1209 if (!adapter->vsi_res) 1210 return; 1211 adapter->num_active_queues = 0; 1212 kfree(adapter->tx_rings); 1213 adapter->tx_rings = NULL; 1214 kfree(adapter->rx_rings); 1215 adapter->rx_rings = NULL; 1216 } 1217 1218 /** 1219 * iavf_set_queue_vlan_tag_loc - set location for VLAN tag offload 1220 * @adapter: board private structure 1221 * 1222 * Based on negotiated capabilities, the VLAN tag needs to be inserted and/or 1223 * stripped in certain descriptor fields. Instead of checking the offload 1224 * capability bits in the hot path, cache the location the ring specific 1225 * flags. 1226 */ 1227 void iavf_set_queue_vlan_tag_loc(struct iavf_adapter *adapter) 1228 { 1229 int i; 1230 1231 for (i = 0; i < adapter->num_active_queues; i++) { 1232 struct iavf_ring *tx_ring = &adapter->tx_rings[i]; 1233 struct iavf_ring *rx_ring = &adapter->rx_rings[i]; 1234 1235 /* prevent multiple L2TAG bits being set after VFR */ 1236 tx_ring->flags &= 1237 ~(IAVF_TXRX_FLAGS_VLAN_TAG_LOC_L2TAG1 | 1238 IAVF_TXR_FLAGS_VLAN_TAG_LOC_L2TAG2); 1239 rx_ring->flags &= 1240 ~(IAVF_TXRX_FLAGS_VLAN_TAG_LOC_L2TAG1 | 1241 IAVF_RXR_FLAGS_VLAN_TAG_LOC_L2TAG2_2); 1242 1243 if (VLAN_ALLOWED(adapter)) { 1244 tx_ring->flags |= IAVF_TXRX_FLAGS_VLAN_TAG_LOC_L2TAG1; 1245 rx_ring->flags |= IAVF_TXRX_FLAGS_VLAN_TAG_LOC_L2TAG1; 1246 } else if (VLAN_V2_ALLOWED(adapter)) { 1247 struct virtchnl_vlan_supported_caps *stripping_support; 1248 struct virtchnl_vlan_supported_caps *insertion_support; 1249 1250 stripping_support = 1251 &adapter->vlan_v2_caps.offloads.stripping_support; 1252 insertion_support = 1253 &adapter->vlan_v2_caps.offloads.insertion_support; 1254 1255 if (stripping_support->outer) { 1256 if (stripping_support->outer & 1257 VIRTCHNL_VLAN_TAG_LOCATION_L2TAG1) 1258 rx_ring->flags |= 1259 IAVF_TXRX_FLAGS_VLAN_TAG_LOC_L2TAG1; 1260 else if (stripping_support->outer & 1261 VIRTCHNL_VLAN_TAG_LOCATION_L2TAG2_2) 1262 rx_ring->flags |= 1263 IAVF_RXR_FLAGS_VLAN_TAG_LOC_L2TAG2_2; 1264 } else if (stripping_support->inner) { 1265 if (stripping_support->inner & 1266 VIRTCHNL_VLAN_TAG_LOCATION_L2TAG1) 1267 rx_ring->flags |= 1268 IAVF_TXRX_FLAGS_VLAN_TAG_LOC_L2TAG1; 1269 else if (stripping_support->inner & 1270 VIRTCHNL_VLAN_TAG_LOCATION_L2TAG2_2) 1271 rx_ring->flags |= 1272 IAVF_RXR_FLAGS_VLAN_TAG_LOC_L2TAG2_2; 1273 } 1274 1275 if (insertion_support->outer) { 1276 if (insertion_support->outer & 1277 VIRTCHNL_VLAN_TAG_LOCATION_L2TAG1) 1278 tx_ring->flags |= 1279 IAVF_TXRX_FLAGS_VLAN_TAG_LOC_L2TAG1; 1280 else if (insertion_support->outer & 1281 VIRTCHNL_VLAN_TAG_LOCATION_L2TAG2) 1282 tx_ring->flags |= 1283 IAVF_TXR_FLAGS_VLAN_TAG_LOC_L2TAG2; 1284 } else if (insertion_support->inner) { 1285 if (insertion_support->inner & 1286 VIRTCHNL_VLAN_TAG_LOCATION_L2TAG1) 1287 tx_ring->flags |= 1288 IAVF_TXRX_FLAGS_VLAN_TAG_LOC_L2TAG1; 1289 else if (insertion_support->inner & 1290 VIRTCHNL_VLAN_TAG_LOCATION_L2TAG2) 1291 tx_ring->flags |= 1292 IAVF_TXR_FLAGS_VLAN_TAG_LOC_L2TAG2; 1293 } 1294 } 1295 } 1296 } 1297 1298 /** 1299 * iavf_alloc_queues - Allocate memory for all rings 1300 * @adapter: board private structure to initialize 1301 * 1302 * We allocate one ring per queue at run-time since we don't know the 1303 * number of queues at compile-time. The polling_netdev array is 1304 * intended for Multiqueue, but should work fine with a single queue. 1305 **/ 1306 static int iavf_alloc_queues(struct iavf_adapter *adapter) 1307 { 1308 int i, num_active_queues; 1309 1310 /* If we're in reset reallocating queues we don't actually know yet for 1311 * certain the PF gave us the number of queues we asked for but we'll 1312 * assume it did. Once basic reset is finished we'll confirm once we 1313 * start negotiating config with PF. 1314 */ 1315 if (adapter->num_req_queues) 1316 num_active_queues = adapter->num_req_queues; 1317 else if ((adapter->vf_res->vf_cap_flags & VIRTCHNL_VF_OFFLOAD_ADQ) && 1318 adapter->num_tc) 1319 num_active_queues = adapter->ch_config.total_qps; 1320 else 1321 num_active_queues = min_t(int, 1322 adapter->vsi_res->num_queue_pairs, 1323 (int)(num_online_cpus())); 1324 1325 1326 adapter->tx_rings = kcalloc(num_active_queues, 1327 sizeof(struct iavf_ring), GFP_KERNEL); 1328 if (!adapter->tx_rings) 1329 goto err_out; 1330 adapter->rx_rings = kcalloc(num_active_queues, 1331 sizeof(struct iavf_ring), GFP_KERNEL); 1332 if (!adapter->rx_rings) 1333 goto err_out; 1334 1335 for (i = 0; i < num_active_queues; i++) { 1336 struct iavf_ring *tx_ring; 1337 struct iavf_ring *rx_ring; 1338 1339 tx_ring = &adapter->tx_rings[i]; 1340 1341 tx_ring->queue_index = i; 1342 tx_ring->netdev = adapter->netdev; 1343 tx_ring->dev = &adapter->pdev->dev; 1344 tx_ring->count = adapter->tx_desc_count; 1345 tx_ring->itr_setting = IAVF_ITR_TX_DEF; 1346 if (adapter->flags & IAVF_FLAG_WB_ON_ITR_CAPABLE) 1347 tx_ring->flags |= IAVF_TXR_FLAGS_WB_ON_ITR; 1348 1349 rx_ring = &adapter->rx_rings[i]; 1350 rx_ring->queue_index = i; 1351 rx_ring->netdev = adapter->netdev; 1352 rx_ring->dev = &adapter->pdev->dev; 1353 rx_ring->count = adapter->rx_desc_count; 1354 rx_ring->itr_setting = IAVF_ITR_RX_DEF; 1355 } 1356 1357 adapter->num_active_queues = num_active_queues; 1358 1359 iavf_set_queue_vlan_tag_loc(adapter); 1360 1361 return 0; 1362 1363 err_out: 1364 iavf_free_queues(adapter); 1365 return -ENOMEM; 1366 } 1367 1368 /** 1369 * iavf_set_interrupt_capability - set MSI-X or FAIL if not supported 1370 * @adapter: board private structure to initialize 1371 * 1372 * Attempt to configure the interrupts using the best available 1373 * capabilities of the hardware and the kernel. 1374 **/ 1375 static int iavf_set_interrupt_capability(struct iavf_adapter *adapter) 1376 { 1377 int vector, v_budget; 1378 int pairs = 0; 1379 int err = 0; 1380 1381 if (!adapter->vsi_res) { 1382 err = -EIO; 1383 goto out; 1384 } 1385 pairs = adapter->num_active_queues; 1386 1387 /* It's easy to be greedy for MSI-X vectors, but it really doesn't do 1388 * us much good if we have more vectors than CPUs. However, we already 1389 * limit the total number of queues by the number of CPUs so we do not 1390 * need any further limiting here. 1391 */ 1392 v_budget = min_t(int, pairs + NONQ_VECS, 1393 (int)adapter->vf_res->max_vectors); 1394 1395 adapter->msix_entries = kcalloc(v_budget, 1396 sizeof(struct msix_entry), GFP_KERNEL); 1397 if (!adapter->msix_entries) { 1398 err = -ENOMEM; 1399 goto out; 1400 } 1401 1402 for (vector = 0; vector < v_budget; vector++) 1403 adapter->msix_entries[vector].entry = vector; 1404 1405 err = iavf_acquire_msix_vectors(adapter, v_budget); 1406 1407 out: 1408 netif_set_real_num_rx_queues(adapter->netdev, pairs); 1409 netif_set_real_num_tx_queues(adapter->netdev, pairs); 1410 return err; 1411 } 1412 1413 /** 1414 * iavf_config_rss_aq - Configure RSS keys and lut by using AQ commands 1415 * @adapter: board private structure 1416 * 1417 * Return 0 on success, negative on failure 1418 **/ 1419 static int iavf_config_rss_aq(struct iavf_adapter *adapter) 1420 { 1421 struct iavf_aqc_get_set_rss_key_data *rss_key = 1422 (struct iavf_aqc_get_set_rss_key_data *)adapter->rss_key; 1423 struct iavf_hw *hw = &adapter->hw; 1424 int ret = 0; 1425 1426 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) { 1427 /* bail because we already have a command pending */ 1428 dev_err(&adapter->pdev->dev, "Cannot configure RSS, command %d pending\n", 1429 adapter->current_op); 1430 return -EBUSY; 1431 } 1432 1433 ret = iavf_aq_set_rss_key(hw, adapter->vsi.id, rss_key); 1434 if (ret) { 1435 dev_err(&adapter->pdev->dev, "Cannot set RSS key, err %s aq_err %s\n", 1436 iavf_stat_str(hw, ret), 1437 iavf_aq_str(hw, hw->aq.asq_last_status)); 1438 return ret; 1439 1440 } 1441 1442 ret = iavf_aq_set_rss_lut(hw, adapter->vsi.id, false, 1443 adapter->rss_lut, adapter->rss_lut_size); 1444 if (ret) { 1445 dev_err(&adapter->pdev->dev, "Cannot set RSS lut, err %s aq_err %s\n", 1446 iavf_stat_str(hw, ret), 1447 iavf_aq_str(hw, hw->aq.asq_last_status)); 1448 } 1449 1450 return ret; 1451 1452 } 1453 1454 /** 1455 * iavf_config_rss_reg - Configure RSS keys and lut by writing registers 1456 * @adapter: board private structure 1457 * 1458 * Returns 0 on success, negative on failure 1459 **/ 1460 static int iavf_config_rss_reg(struct iavf_adapter *adapter) 1461 { 1462 struct iavf_hw *hw = &adapter->hw; 1463 u32 *dw; 1464 u16 i; 1465 1466 dw = (u32 *)adapter->rss_key; 1467 for (i = 0; i <= adapter->rss_key_size / 4; i++) 1468 wr32(hw, IAVF_VFQF_HKEY(i), dw[i]); 1469 1470 dw = (u32 *)adapter->rss_lut; 1471 for (i = 0; i <= adapter->rss_lut_size / 4; i++) 1472 wr32(hw, IAVF_VFQF_HLUT(i), dw[i]); 1473 1474 iavf_flush(hw); 1475 1476 return 0; 1477 } 1478 1479 /** 1480 * iavf_config_rss - Configure RSS keys and lut 1481 * @adapter: board private structure 1482 * 1483 * Returns 0 on success, negative on failure 1484 **/ 1485 int iavf_config_rss(struct iavf_adapter *adapter) 1486 { 1487 1488 if (RSS_PF(adapter)) { 1489 adapter->aq_required |= IAVF_FLAG_AQ_SET_RSS_LUT | 1490 IAVF_FLAG_AQ_SET_RSS_KEY; 1491 return 0; 1492 } else if (RSS_AQ(adapter)) { 1493 return iavf_config_rss_aq(adapter); 1494 } else { 1495 return iavf_config_rss_reg(adapter); 1496 } 1497 } 1498 1499 /** 1500 * iavf_fill_rss_lut - Fill the lut with default values 1501 * @adapter: board private structure 1502 **/ 1503 static void iavf_fill_rss_lut(struct iavf_adapter *adapter) 1504 { 1505 u16 i; 1506 1507 for (i = 0; i < adapter->rss_lut_size; i++) 1508 adapter->rss_lut[i] = i % adapter->num_active_queues; 1509 } 1510 1511 /** 1512 * iavf_init_rss - Prepare for RSS 1513 * @adapter: board private structure 1514 * 1515 * Return 0 on success, negative on failure 1516 **/ 1517 static int iavf_init_rss(struct iavf_adapter *adapter) 1518 { 1519 struct iavf_hw *hw = &adapter->hw; 1520 int ret; 1521 1522 if (!RSS_PF(adapter)) { 1523 /* Enable PCTYPES for RSS, TCP/UDP with IPv4/IPv6 */ 1524 if (adapter->vf_res->vf_cap_flags & 1525 VIRTCHNL_VF_OFFLOAD_RSS_PCTYPE_V2) 1526 adapter->hena = IAVF_DEFAULT_RSS_HENA_EXPANDED; 1527 else 1528 adapter->hena = IAVF_DEFAULT_RSS_HENA; 1529 1530 wr32(hw, IAVF_VFQF_HENA(0), (u32)adapter->hena); 1531 wr32(hw, IAVF_VFQF_HENA(1), (u32)(adapter->hena >> 32)); 1532 } 1533 1534 iavf_fill_rss_lut(adapter); 1535 netdev_rss_key_fill((void *)adapter->rss_key, adapter->rss_key_size); 1536 ret = iavf_config_rss(adapter); 1537 1538 return ret; 1539 } 1540 1541 /** 1542 * iavf_alloc_q_vectors - Allocate memory for interrupt vectors 1543 * @adapter: board private structure to initialize 1544 * 1545 * We allocate one q_vector per queue interrupt. If allocation fails we 1546 * return -ENOMEM. 1547 **/ 1548 static int iavf_alloc_q_vectors(struct iavf_adapter *adapter) 1549 { 1550 int q_idx = 0, num_q_vectors; 1551 struct iavf_q_vector *q_vector; 1552 1553 num_q_vectors = adapter->num_msix_vectors - NONQ_VECS; 1554 adapter->q_vectors = kcalloc(num_q_vectors, sizeof(*q_vector), 1555 GFP_KERNEL); 1556 if (!adapter->q_vectors) 1557 return -ENOMEM; 1558 1559 for (q_idx = 0; q_idx < num_q_vectors; q_idx++) { 1560 q_vector = &adapter->q_vectors[q_idx]; 1561 q_vector->adapter = adapter; 1562 q_vector->vsi = &adapter->vsi; 1563 q_vector->v_idx = q_idx; 1564 q_vector->reg_idx = q_idx; 1565 cpumask_copy(&q_vector->affinity_mask, cpu_possible_mask); 1566 netif_napi_add(adapter->netdev, &q_vector->napi, 1567 iavf_napi_poll, NAPI_POLL_WEIGHT); 1568 } 1569 1570 return 0; 1571 } 1572 1573 /** 1574 * iavf_free_q_vectors - Free memory allocated for interrupt vectors 1575 * @adapter: board private structure to initialize 1576 * 1577 * This function frees the memory allocated to the q_vectors. In addition if 1578 * NAPI is enabled it will delete any references to the NAPI struct prior 1579 * to freeing the q_vector. 1580 **/ 1581 static void iavf_free_q_vectors(struct iavf_adapter *adapter) 1582 { 1583 int q_idx, num_q_vectors; 1584 int napi_vectors; 1585 1586 if (!adapter->q_vectors) 1587 return; 1588 1589 num_q_vectors = adapter->num_msix_vectors - NONQ_VECS; 1590 napi_vectors = adapter->num_active_queues; 1591 1592 for (q_idx = 0; q_idx < num_q_vectors; q_idx++) { 1593 struct iavf_q_vector *q_vector = &adapter->q_vectors[q_idx]; 1594 1595 if (q_idx < napi_vectors) 1596 netif_napi_del(&q_vector->napi); 1597 } 1598 kfree(adapter->q_vectors); 1599 adapter->q_vectors = NULL; 1600 } 1601 1602 /** 1603 * iavf_reset_interrupt_capability - Reset MSIX setup 1604 * @adapter: board private structure 1605 * 1606 **/ 1607 void iavf_reset_interrupt_capability(struct iavf_adapter *adapter) 1608 { 1609 if (!adapter->msix_entries) 1610 return; 1611 1612 pci_disable_msix(adapter->pdev); 1613 kfree(adapter->msix_entries); 1614 adapter->msix_entries = NULL; 1615 } 1616 1617 /** 1618 * iavf_init_interrupt_scheme - Determine if MSIX is supported and init 1619 * @adapter: board private structure to initialize 1620 * 1621 **/ 1622 int iavf_init_interrupt_scheme(struct iavf_adapter *adapter) 1623 { 1624 int err; 1625 1626 err = iavf_alloc_queues(adapter); 1627 if (err) { 1628 dev_err(&adapter->pdev->dev, 1629 "Unable to allocate memory for queues\n"); 1630 goto err_alloc_queues; 1631 } 1632 1633 rtnl_lock(); 1634 err = iavf_set_interrupt_capability(adapter); 1635 rtnl_unlock(); 1636 if (err) { 1637 dev_err(&adapter->pdev->dev, 1638 "Unable to setup interrupt capabilities\n"); 1639 goto err_set_interrupt; 1640 } 1641 1642 err = iavf_alloc_q_vectors(adapter); 1643 if (err) { 1644 dev_err(&adapter->pdev->dev, 1645 "Unable to allocate memory for queue vectors\n"); 1646 goto err_alloc_q_vectors; 1647 } 1648 1649 /* If we've made it so far while ADq flag being ON, then we haven't 1650 * bailed out anywhere in middle. And ADq isn't just enabled but actual 1651 * resources have been allocated in the reset path. 1652 * Now we can truly claim that ADq is enabled. 1653 */ 1654 if ((adapter->vf_res->vf_cap_flags & VIRTCHNL_VF_OFFLOAD_ADQ) && 1655 adapter->num_tc) 1656 dev_info(&adapter->pdev->dev, "ADq Enabled, %u TCs created", 1657 adapter->num_tc); 1658 1659 dev_info(&adapter->pdev->dev, "Multiqueue %s: Queue pair count = %u", 1660 (adapter->num_active_queues > 1) ? "Enabled" : "Disabled", 1661 adapter->num_active_queues); 1662 1663 return 0; 1664 err_alloc_q_vectors: 1665 iavf_reset_interrupt_capability(adapter); 1666 err_set_interrupt: 1667 iavf_free_queues(adapter); 1668 err_alloc_queues: 1669 return err; 1670 } 1671 1672 /** 1673 * iavf_free_rss - Free memory used by RSS structs 1674 * @adapter: board private structure 1675 **/ 1676 static void iavf_free_rss(struct iavf_adapter *adapter) 1677 { 1678 kfree(adapter->rss_key); 1679 adapter->rss_key = NULL; 1680 1681 kfree(adapter->rss_lut); 1682 adapter->rss_lut = NULL; 1683 } 1684 1685 /** 1686 * iavf_reinit_interrupt_scheme - Reallocate queues and vectors 1687 * @adapter: board private structure 1688 * 1689 * Returns 0 on success, negative on failure 1690 **/ 1691 static int iavf_reinit_interrupt_scheme(struct iavf_adapter *adapter) 1692 { 1693 struct net_device *netdev = adapter->netdev; 1694 int err; 1695 1696 if (netif_running(netdev)) 1697 iavf_free_traffic_irqs(adapter); 1698 iavf_free_misc_irq(adapter); 1699 iavf_reset_interrupt_capability(adapter); 1700 iavf_free_q_vectors(adapter); 1701 iavf_free_queues(adapter); 1702 1703 err = iavf_init_interrupt_scheme(adapter); 1704 if (err) 1705 goto err; 1706 1707 netif_tx_stop_all_queues(netdev); 1708 1709 err = iavf_request_misc_irq(adapter); 1710 if (err) 1711 goto err; 1712 1713 set_bit(__IAVF_VSI_DOWN, adapter->vsi.state); 1714 1715 iavf_map_rings_to_vectors(adapter); 1716 err: 1717 return err; 1718 } 1719 1720 /** 1721 * iavf_process_aq_command - process aq_required flags 1722 * and sends aq command 1723 * @adapter: pointer to iavf adapter structure 1724 * 1725 * Returns 0 on success 1726 * Returns error code if no command was sent 1727 * or error code if the command failed. 1728 **/ 1729 static int iavf_process_aq_command(struct iavf_adapter *adapter) 1730 { 1731 if (adapter->aq_required & IAVF_FLAG_AQ_GET_CONFIG) 1732 return iavf_send_vf_config_msg(adapter); 1733 if (adapter->aq_required & IAVF_FLAG_AQ_GET_OFFLOAD_VLAN_V2_CAPS) 1734 return iavf_send_vf_offload_vlan_v2_msg(adapter); 1735 if (adapter->aq_required & IAVF_FLAG_AQ_DISABLE_QUEUES) { 1736 iavf_disable_queues(adapter); 1737 return 0; 1738 } 1739 1740 if (adapter->aq_required & IAVF_FLAG_AQ_MAP_VECTORS) { 1741 iavf_map_queues(adapter); 1742 return 0; 1743 } 1744 1745 if (adapter->aq_required & IAVF_FLAG_AQ_ADD_MAC_FILTER) { 1746 iavf_add_ether_addrs(adapter); 1747 return 0; 1748 } 1749 1750 if (adapter->aq_required & IAVF_FLAG_AQ_ADD_VLAN_FILTER) { 1751 iavf_add_vlans(adapter); 1752 return 0; 1753 } 1754 1755 if (adapter->aq_required & IAVF_FLAG_AQ_DEL_MAC_FILTER) { 1756 iavf_del_ether_addrs(adapter); 1757 return 0; 1758 } 1759 1760 if (adapter->aq_required & IAVF_FLAG_AQ_DEL_VLAN_FILTER) { 1761 iavf_del_vlans(adapter); 1762 return 0; 1763 } 1764 1765 if (adapter->aq_required & IAVF_FLAG_AQ_ENABLE_VLAN_STRIPPING) { 1766 iavf_enable_vlan_stripping(adapter); 1767 return 0; 1768 } 1769 1770 if (adapter->aq_required & IAVF_FLAG_AQ_DISABLE_VLAN_STRIPPING) { 1771 iavf_disable_vlan_stripping(adapter); 1772 return 0; 1773 } 1774 1775 if (adapter->aq_required & IAVF_FLAG_AQ_CONFIGURE_QUEUES) { 1776 iavf_configure_queues(adapter); 1777 return 0; 1778 } 1779 1780 if (adapter->aq_required & IAVF_FLAG_AQ_ENABLE_QUEUES) { 1781 iavf_enable_queues(adapter); 1782 return 0; 1783 } 1784 1785 if (adapter->aq_required & IAVF_FLAG_AQ_CONFIGURE_RSS) { 1786 /* This message goes straight to the firmware, not the 1787 * PF, so we don't have to set current_op as we will 1788 * not get a response through the ARQ. 1789 */ 1790 adapter->aq_required &= ~IAVF_FLAG_AQ_CONFIGURE_RSS; 1791 return 0; 1792 } 1793 if (adapter->aq_required & IAVF_FLAG_AQ_GET_HENA) { 1794 iavf_get_hena(adapter); 1795 return 0; 1796 } 1797 if (adapter->aq_required & IAVF_FLAG_AQ_SET_HENA) { 1798 iavf_set_hena(adapter); 1799 return 0; 1800 } 1801 if (adapter->aq_required & IAVF_FLAG_AQ_SET_RSS_KEY) { 1802 iavf_set_rss_key(adapter); 1803 return 0; 1804 } 1805 if (adapter->aq_required & IAVF_FLAG_AQ_SET_RSS_LUT) { 1806 iavf_set_rss_lut(adapter); 1807 return 0; 1808 } 1809 1810 if (adapter->aq_required & IAVF_FLAG_AQ_REQUEST_PROMISC) { 1811 iavf_set_promiscuous(adapter, FLAG_VF_UNICAST_PROMISC | 1812 FLAG_VF_MULTICAST_PROMISC); 1813 return 0; 1814 } 1815 1816 if (adapter->aq_required & IAVF_FLAG_AQ_REQUEST_ALLMULTI) { 1817 iavf_set_promiscuous(adapter, FLAG_VF_MULTICAST_PROMISC); 1818 return 0; 1819 } 1820 if ((adapter->aq_required & IAVF_FLAG_AQ_RELEASE_PROMISC) || 1821 (adapter->aq_required & IAVF_FLAG_AQ_RELEASE_ALLMULTI)) { 1822 iavf_set_promiscuous(adapter, 0); 1823 return 0; 1824 } 1825 1826 if (adapter->aq_required & IAVF_FLAG_AQ_ENABLE_CHANNELS) { 1827 iavf_enable_channels(adapter); 1828 return 0; 1829 } 1830 1831 if (adapter->aq_required & IAVF_FLAG_AQ_DISABLE_CHANNELS) { 1832 iavf_disable_channels(adapter); 1833 return 0; 1834 } 1835 if (adapter->aq_required & IAVF_FLAG_AQ_ADD_CLOUD_FILTER) { 1836 iavf_add_cloud_filter(adapter); 1837 return 0; 1838 } 1839 1840 if (adapter->aq_required & IAVF_FLAG_AQ_DEL_CLOUD_FILTER) { 1841 iavf_del_cloud_filter(adapter); 1842 return 0; 1843 } 1844 if (adapter->aq_required & IAVF_FLAG_AQ_DEL_CLOUD_FILTER) { 1845 iavf_del_cloud_filter(adapter); 1846 return 0; 1847 } 1848 if (adapter->aq_required & IAVF_FLAG_AQ_ADD_CLOUD_FILTER) { 1849 iavf_add_cloud_filter(adapter); 1850 return 0; 1851 } 1852 if (adapter->aq_required & IAVF_FLAG_AQ_ADD_FDIR_FILTER) { 1853 iavf_add_fdir_filter(adapter); 1854 return IAVF_SUCCESS; 1855 } 1856 if (adapter->aq_required & IAVF_FLAG_AQ_DEL_FDIR_FILTER) { 1857 iavf_del_fdir_filter(adapter); 1858 return IAVF_SUCCESS; 1859 } 1860 if (adapter->aq_required & IAVF_FLAG_AQ_ADD_ADV_RSS_CFG) { 1861 iavf_add_adv_rss_cfg(adapter); 1862 return 0; 1863 } 1864 if (adapter->aq_required & IAVF_FLAG_AQ_DEL_ADV_RSS_CFG) { 1865 iavf_del_adv_rss_cfg(adapter); 1866 return 0; 1867 } 1868 if (adapter->aq_required & IAVF_FLAG_AQ_DISABLE_CTAG_VLAN_STRIPPING) { 1869 iavf_disable_vlan_stripping_v2(adapter, ETH_P_8021Q); 1870 return 0; 1871 } 1872 if (adapter->aq_required & IAVF_FLAG_AQ_DISABLE_STAG_VLAN_STRIPPING) { 1873 iavf_disable_vlan_stripping_v2(adapter, ETH_P_8021AD); 1874 return 0; 1875 } 1876 if (adapter->aq_required & IAVF_FLAG_AQ_ENABLE_CTAG_VLAN_STRIPPING) { 1877 iavf_enable_vlan_stripping_v2(adapter, ETH_P_8021Q); 1878 return 0; 1879 } 1880 if (adapter->aq_required & IAVF_FLAG_AQ_ENABLE_STAG_VLAN_STRIPPING) { 1881 iavf_enable_vlan_stripping_v2(adapter, ETH_P_8021AD); 1882 return 0; 1883 } 1884 if (adapter->aq_required & IAVF_FLAG_AQ_DISABLE_CTAG_VLAN_INSERTION) { 1885 iavf_disable_vlan_insertion_v2(adapter, ETH_P_8021Q); 1886 return 0; 1887 } 1888 if (adapter->aq_required & IAVF_FLAG_AQ_DISABLE_STAG_VLAN_INSERTION) { 1889 iavf_disable_vlan_insertion_v2(adapter, ETH_P_8021AD); 1890 return 0; 1891 } 1892 if (adapter->aq_required & IAVF_FLAG_AQ_ENABLE_CTAG_VLAN_INSERTION) { 1893 iavf_enable_vlan_insertion_v2(adapter, ETH_P_8021Q); 1894 return 0; 1895 } 1896 if (adapter->aq_required & IAVF_FLAG_AQ_ENABLE_STAG_VLAN_INSERTION) { 1897 iavf_enable_vlan_insertion_v2(adapter, ETH_P_8021AD); 1898 return 0; 1899 } 1900 1901 if (adapter->aq_required & IAVF_FLAG_AQ_REQUEST_STATS) { 1902 iavf_request_stats(adapter); 1903 return 0; 1904 } 1905 1906 return -EAGAIN; 1907 } 1908 1909 /** 1910 * iavf_set_vlan_offload_features - set VLAN offload configuration 1911 * @adapter: board private structure 1912 * @prev_features: previous features used for comparison 1913 * @features: updated features used for configuration 1914 * 1915 * Set the aq_required bit(s) based on the requested features passed in to 1916 * configure VLAN stripping and/or VLAN insertion if supported. Also, schedule 1917 * the watchdog if any changes are requested to expedite the request via 1918 * virtchnl. 1919 **/ 1920 void 1921 iavf_set_vlan_offload_features(struct iavf_adapter *adapter, 1922 netdev_features_t prev_features, 1923 netdev_features_t features) 1924 { 1925 bool enable_stripping = true, enable_insertion = true; 1926 u16 vlan_ethertype = 0; 1927 u64 aq_required = 0; 1928 1929 /* keep cases separate because one ethertype for offloads can be 1930 * disabled at the same time as another is disabled, so check for an 1931 * enabled ethertype first, then check for disabled. Default to 1932 * ETH_P_8021Q so an ethertype is specified if disabling insertion and 1933 * stripping. 1934 */ 1935 if (features & (NETIF_F_HW_VLAN_STAG_RX | NETIF_F_HW_VLAN_STAG_TX)) 1936 vlan_ethertype = ETH_P_8021AD; 1937 else if (features & (NETIF_F_HW_VLAN_CTAG_RX | NETIF_F_HW_VLAN_CTAG_TX)) 1938 vlan_ethertype = ETH_P_8021Q; 1939 else if (prev_features & (NETIF_F_HW_VLAN_STAG_RX | NETIF_F_HW_VLAN_STAG_TX)) 1940 vlan_ethertype = ETH_P_8021AD; 1941 else if (prev_features & (NETIF_F_HW_VLAN_CTAG_RX | NETIF_F_HW_VLAN_CTAG_TX)) 1942 vlan_ethertype = ETH_P_8021Q; 1943 else 1944 vlan_ethertype = ETH_P_8021Q; 1945 1946 if (!(features & (NETIF_F_HW_VLAN_STAG_RX | NETIF_F_HW_VLAN_CTAG_RX))) 1947 enable_stripping = false; 1948 if (!(features & (NETIF_F_HW_VLAN_STAG_TX | NETIF_F_HW_VLAN_CTAG_TX))) 1949 enable_insertion = false; 1950 1951 if (VLAN_ALLOWED(adapter)) { 1952 /* VIRTCHNL_VF_OFFLOAD_VLAN only has support for toggling VLAN 1953 * stripping via virtchnl. VLAN insertion can be toggled on the 1954 * netdev, but it doesn't require a virtchnl message 1955 */ 1956 if (enable_stripping) 1957 aq_required |= IAVF_FLAG_AQ_ENABLE_VLAN_STRIPPING; 1958 else 1959 aq_required |= IAVF_FLAG_AQ_DISABLE_VLAN_STRIPPING; 1960 1961 } else if (VLAN_V2_ALLOWED(adapter)) { 1962 switch (vlan_ethertype) { 1963 case ETH_P_8021Q: 1964 if (enable_stripping) 1965 aq_required |= IAVF_FLAG_AQ_ENABLE_CTAG_VLAN_STRIPPING; 1966 else 1967 aq_required |= IAVF_FLAG_AQ_DISABLE_CTAG_VLAN_STRIPPING; 1968 1969 if (enable_insertion) 1970 aq_required |= IAVF_FLAG_AQ_ENABLE_CTAG_VLAN_INSERTION; 1971 else 1972 aq_required |= IAVF_FLAG_AQ_DISABLE_CTAG_VLAN_INSERTION; 1973 break; 1974 case ETH_P_8021AD: 1975 if (enable_stripping) 1976 aq_required |= IAVF_FLAG_AQ_ENABLE_STAG_VLAN_STRIPPING; 1977 else 1978 aq_required |= IAVF_FLAG_AQ_DISABLE_STAG_VLAN_STRIPPING; 1979 1980 if (enable_insertion) 1981 aq_required |= IAVF_FLAG_AQ_ENABLE_STAG_VLAN_INSERTION; 1982 else 1983 aq_required |= IAVF_FLAG_AQ_DISABLE_STAG_VLAN_INSERTION; 1984 break; 1985 } 1986 } 1987 1988 if (aq_required) { 1989 adapter->aq_required |= aq_required; 1990 mod_delayed_work(iavf_wq, &adapter->watchdog_task, 0); 1991 } 1992 } 1993 1994 /** 1995 * iavf_startup - first step of driver startup 1996 * @adapter: board private structure 1997 * 1998 * Function process __IAVF_STARTUP driver state. 1999 * When success the state is changed to __IAVF_INIT_VERSION_CHECK 2000 * when fails the state is changed to __IAVF_INIT_FAILED 2001 **/ 2002 static void iavf_startup(struct iavf_adapter *adapter) 2003 { 2004 struct pci_dev *pdev = adapter->pdev; 2005 struct iavf_hw *hw = &adapter->hw; 2006 int err; 2007 2008 WARN_ON(adapter->state != __IAVF_STARTUP); 2009 2010 /* driver loaded, probe complete */ 2011 adapter->flags &= ~IAVF_FLAG_PF_COMMS_FAILED; 2012 adapter->flags &= ~IAVF_FLAG_RESET_PENDING; 2013 err = iavf_set_mac_type(hw); 2014 if (err) { 2015 dev_err(&pdev->dev, "Failed to set MAC type (%d)\n", err); 2016 goto err; 2017 } 2018 2019 err = iavf_check_reset_complete(hw); 2020 if (err) { 2021 dev_info(&pdev->dev, "Device is still in reset (%d), retrying\n", 2022 err); 2023 goto err; 2024 } 2025 hw->aq.num_arq_entries = IAVF_AQ_LEN; 2026 hw->aq.num_asq_entries = IAVF_AQ_LEN; 2027 hw->aq.arq_buf_size = IAVF_MAX_AQ_BUF_SIZE; 2028 hw->aq.asq_buf_size = IAVF_MAX_AQ_BUF_SIZE; 2029 2030 err = iavf_init_adminq(hw); 2031 if (err) { 2032 dev_err(&pdev->dev, "Failed to init Admin Queue (%d)\n", err); 2033 goto err; 2034 } 2035 err = iavf_send_api_ver(adapter); 2036 if (err) { 2037 dev_err(&pdev->dev, "Unable to send to PF (%d)\n", err); 2038 iavf_shutdown_adminq(hw); 2039 goto err; 2040 } 2041 iavf_change_state(adapter, __IAVF_INIT_VERSION_CHECK); 2042 return; 2043 err: 2044 iavf_change_state(adapter, __IAVF_INIT_FAILED); 2045 } 2046 2047 /** 2048 * iavf_init_version_check - second step of driver startup 2049 * @adapter: board private structure 2050 * 2051 * Function process __IAVF_INIT_VERSION_CHECK driver state. 2052 * When success the state is changed to __IAVF_INIT_GET_RESOURCES 2053 * when fails the state is changed to __IAVF_INIT_FAILED 2054 **/ 2055 static void iavf_init_version_check(struct iavf_adapter *adapter) 2056 { 2057 struct pci_dev *pdev = adapter->pdev; 2058 struct iavf_hw *hw = &adapter->hw; 2059 int err = -EAGAIN; 2060 2061 WARN_ON(adapter->state != __IAVF_INIT_VERSION_CHECK); 2062 2063 if (!iavf_asq_done(hw)) { 2064 dev_err(&pdev->dev, "Admin queue command never completed\n"); 2065 iavf_shutdown_adminq(hw); 2066 iavf_change_state(adapter, __IAVF_STARTUP); 2067 goto err; 2068 } 2069 2070 /* aq msg sent, awaiting reply */ 2071 err = iavf_verify_api_ver(adapter); 2072 if (err) { 2073 if (err == IAVF_ERR_ADMIN_QUEUE_NO_WORK) 2074 err = iavf_send_api_ver(adapter); 2075 else 2076 dev_err(&pdev->dev, "Unsupported PF API version %d.%d, expected %d.%d\n", 2077 adapter->pf_version.major, 2078 adapter->pf_version.minor, 2079 VIRTCHNL_VERSION_MAJOR, 2080 VIRTCHNL_VERSION_MINOR); 2081 goto err; 2082 } 2083 err = iavf_send_vf_config_msg(adapter); 2084 if (err) { 2085 dev_err(&pdev->dev, "Unable to send config request (%d)\n", 2086 err); 2087 goto err; 2088 } 2089 iavf_change_state(adapter, __IAVF_INIT_GET_RESOURCES); 2090 return; 2091 err: 2092 iavf_change_state(adapter, __IAVF_INIT_FAILED); 2093 } 2094 2095 /** 2096 * iavf_parse_vf_resource_msg - parse response from VIRTCHNL_OP_GET_VF_RESOURCES 2097 * @adapter: board private structure 2098 */ 2099 int iavf_parse_vf_resource_msg(struct iavf_adapter *adapter) 2100 { 2101 int i, num_req_queues = adapter->num_req_queues; 2102 struct iavf_vsi *vsi = &adapter->vsi; 2103 2104 for (i = 0; i < adapter->vf_res->num_vsis; i++) { 2105 if (adapter->vf_res->vsi_res[i].vsi_type == VIRTCHNL_VSI_SRIOV) 2106 adapter->vsi_res = &adapter->vf_res->vsi_res[i]; 2107 } 2108 if (!adapter->vsi_res) { 2109 dev_err(&adapter->pdev->dev, "No LAN VSI found\n"); 2110 return -ENODEV; 2111 } 2112 2113 if (num_req_queues && 2114 num_req_queues > adapter->vsi_res->num_queue_pairs) { 2115 /* Problem. The PF gave us fewer queues than what we had 2116 * negotiated in our request. Need a reset to see if we can't 2117 * get back to a working state. 2118 */ 2119 dev_err(&adapter->pdev->dev, 2120 "Requested %d queues, but PF only gave us %d.\n", 2121 num_req_queues, 2122 adapter->vsi_res->num_queue_pairs); 2123 adapter->flags |= IAVF_FLAG_REINIT_MSIX_NEEDED; 2124 adapter->num_req_queues = adapter->vsi_res->num_queue_pairs; 2125 iavf_schedule_reset(adapter); 2126 2127 return -EAGAIN; 2128 } 2129 adapter->num_req_queues = 0; 2130 adapter->vsi.id = adapter->vsi_res->vsi_id; 2131 2132 adapter->vsi.back = adapter; 2133 adapter->vsi.base_vector = 1; 2134 adapter->vsi.work_limit = IAVF_DEFAULT_IRQ_WORK; 2135 vsi->netdev = adapter->netdev; 2136 vsi->qs_handle = adapter->vsi_res->qset_handle; 2137 if (adapter->vf_res->vf_cap_flags & VIRTCHNL_VF_OFFLOAD_RSS_PF) { 2138 adapter->rss_key_size = adapter->vf_res->rss_key_size; 2139 adapter->rss_lut_size = adapter->vf_res->rss_lut_size; 2140 } else { 2141 adapter->rss_key_size = IAVF_HKEY_ARRAY_SIZE; 2142 adapter->rss_lut_size = IAVF_HLUT_ARRAY_SIZE; 2143 } 2144 2145 return 0; 2146 } 2147 2148 /** 2149 * iavf_init_get_resources - third step of driver startup 2150 * @adapter: board private structure 2151 * 2152 * Function process __IAVF_INIT_GET_RESOURCES driver state and 2153 * finishes driver initialization procedure. 2154 * When success the state is changed to __IAVF_DOWN 2155 * when fails the state is changed to __IAVF_INIT_FAILED 2156 **/ 2157 static void iavf_init_get_resources(struct iavf_adapter *adapter) 2158 { 2159 struct pci_dev *pdev = adapter->pdev; 2160 struct iavf_hw *hw = &adapter->hw; 2161 int err; 2162 2163 WARN_ON(adapter->state != __IAVF_INIT_GET_RESOURCES); 2164 /* aq msg sent, awaiting reply */ 2165 if (!adapter->vf_res) { 2166 adapter->vf_res = kzalloc(IAVF_VIRTCHNL_VF_RESOURCE_SIZE, 2167 GFP_KERNEL); 2168 if (!adapter->vf_res) { 2169 err = -ENOMEM; 2170 goto err; 2171 } 2172 } 2173 err = iavf_get_vf_config(adapter); 2174 if (err == IAVF_ERR_ADMIN_QUEUE_NO_WORK) { 2175 err = iavf_send_vf_config_msg(adapter); 2176 goto err_alloc; 2177 } else if (err == IAVF_ERR_PARAM) { 2178 /* We only get ERR_PARAM if the device is in a very bad 2179 * state or if we've been disabled for previous bad 2180 * behavior. Either way, we're done now. 2181 */ 2182 iavf_shutdown_adminq(hw); 2183 dev_err(&pdev->dev, "Unable to get VF config due to PF error condition, not retrying\n"); 2184 return; 2185 } 2186 if (err) { 2187 dev_err(&pdev->dev, "Unable to get VF config (%d)\n", err); 2188 goto err_alloc; 2189 } 2190 2191 err = iavf_parse_vf_resource_msg(adapter); 2192 if (err) 2193 goto err_alloc; 2194 2195 err = iavf_send_vf_offload_vlan_v2_msg(adapter); 2196 if (err == -EOPNOTSUPP) { 2197 /* underlying PF doesn't support VIRTCHNL_VF_OFFLOAD_VLAN_V2, so 2198 * go directly to finishing initialization 2199 */ 2200 iavf_change_state(adapter, __IAVF_INIT_CONFIG_ADAPTER); 2201 return; 2202 } else if (err) { 2203 dev_err(&pdev->dev, "Unable to send offload vlan v2 request (%d)\n", 2204 err); 2205 goto err_alloc; 2206 } 2207 2208 /* underlying PF supports VIRTCHNL_VF_OFFLOAD_VLAN_V2, so update the 2209 * state accordingly 2210 */ 2211 iavf_change_state(adapter, __IAVF_INIT_GET_OFFLOAD_VLAN_V2_CAPS); 2212 return; 2213 2214 err_alloc: 2215 kfree(adapter->vf_res); 2216 adapter->vf_res = NULL; 2217 err: 2218 iavf_change_state(adapter, __IAVF_INIT_FAILED); 2219 } 2220 2221 /** 2222 * iavf_init_get_offload_vlan_v2_caps - part of driver startup 2223 * @adapter: board private structure 2224 * 2225 * Function processes __IAVF_INIT_GET_OFFLOAD_VLAN_V2_CAPS driver state if the 2226 * VF negotiates VIRTCHNL_VF_OFFLOAD_VLAN_V2. If VIRTCHNL_VF_OFFLOAD_VLAN_V2 is 2227 * not negotiated, then this state will never be entered. 2228 **/ 2229 static void iavf_init_get_offload_vlan_v2_caps(struct iavf_adapter *adapter) 2230 { 2231 int ret; 2232 2233 WARN_ON(adapter->state != __IAVF_INIT_GET_OFFLOAD_VLAN_V2_CAPS); 2234 2235 memset(&adapter->vlan_v2_caps, 0, sizeof(adapter->vlan_v2_caps)); 2236 2237 ret = iavf_get_vf_vlan_v2_caps(adapter); 2238 if (ret) { 2239 if (ret == IAVF_ERR_ADMIN_QUEUE_NO_WORK) 2240 iavf_send_vf_offload_vlan_v2_msg(adapter); 2241 goto err; 2242 } 2243 2244 iavf_change_state(adapter, __IAVF_INIT_CONFIG_ADAPTER); 2245 return; 2246 err: 2247 iavf_change_state(adapter, __IAVF_INIT_FAILED); 2248 } 2249 2250 /** 2251 * iavf_init_config_adapter - last part of driver startup 2252 * @adapter: board private structure 2253 * 2254 * After all the supported capabilities are negotiated, then the 2255 * __IAVF_INIT_CONFIG_ADAPTER state will finish driver initialization. 2256 */ 2257 static void iavf_init_config_adapter(struct iavf_adapter *adapter) 2258 { 2259 struct net_device *netdev = adapter->netdev; 2260 struct pci_dev *pdev = adapter->pdev; 2261 int err; 2262 2263 WARN_ON(adapter->state != __IAVF_INIT_CONFIG_ADAPTER); 2264 2265 if (iavf_process_config(adapter)) 2266 goto err; 2267 2268 adapter->current_op = VIRTCHNL_OP_UNKNOWN; 2269 2270 adapter->flags |= IAVF_FLAG_RX_CSUM_ENABLED; 2271 2272 netdev->netdev_ops = &iavf_netdev_ops; 2273 iavf_set_ethtool_ops(netdev); 2274 netdev->watchdog_timeo = 5 * HZ; 2275 2276 /* MTU range: 68 - 9710 */ 2277 netdev->min_mtu = ETH_MIN_MTU; 2278 netdev->max_mtu = IAVF_MAX_RXBUFFER - IAVF_PACKET_HDR_PAD; 2279 2280 if (!is_valid_ether_addr(adapter->hw.mac.addr)) { 2281 dev_info(&pdev->dev, "Invalid MAC address %pM, using random\n", 2282 adapter->hw.mac.addr); 2283 eth_hw_addr_random(netdev); 2284 ether_addr_copy(adapter->hw.mac.addr, netdev->dev_addr); 2285 } else { 2286 eth_hw_addr_set(netdev, adapter->hw.mac.addr); 2287 ether_addr_copy(netdev->perm_addr, adapter->hw.mac.addr); 2288 } 2289 2290 adapter->tx_desc_count = IAVF_DEFAULT_TXD; 2291 adapter->rx_desc_count = IAVF_DEFAULT_RXD; 2292 err = iavf_init_interrupt_scheme(adapter); 2293 if (err) 2294 goto err_sw_init; 2295 iavf_map_rings_to_vectors(adapter); 2296 if (adapter->vf_res->vf_cap_flags & 2297 VIRTCHNL_VF_OFFLOAD_WB_ON_ITR) 2298 adapter->flags |= IAVF_FLAG_WB_ON_ITR_CAPABLE; 2299 2300 err = iavf_request_misc_irq(adapter); 2301 if (err) 2302 goto err_sw_init; 2303 2304 netif_carrier_off(netdev); 2305 adapter->link_up = false; 2306 2307 /* set the semaphore to prevent any callbacks after device registration 2308 * up to time when state of driver will be set to __IAVF_DOWN 2309 */ 2310 rtnl_lock(); 2311 if (!adapter->netdev_registered) { 2312 err = register_netdevice(netdev); 2313 if (err) { 2314 rtnl_unlock(); 2315 goto err_register; 2316 } 2317 } 2318 2319 adapter->netdev_registered = true; 2320 2321 netif_tx_stop_all_queues(netdev); 2322 if (CLIENT_ALLOWED(adapter)) { 2323 err = iavf_lan_add_device(adapter); 2324 if (err) 2325 dev_info(&pdev->dev, "Failed to add VF to client API service list: %d\n", 2326 err); 2327 } 2328 dev_info(&pdev->dev, "MAC address: %pM\n", adapter->hw.mac.addr); 2329 if (netdev->features & NETIF_F_GRO) 2330 dev_info(&pdev->dev, "GRO is enabled\n"); 2331 2332 iavf_change_state(adapter, __IAVF_DOWN); 2333 set_bit(__IAVF_VSI_DOWN, adapter->vsi.state); 2334 rtnl_unlock(); 2335 2336 iavf_misc_irq_enable(adapter); 2337 wake_up(&adapter->down_waitqueue); 2338 2339 adapter->rss_key = kzalloc(adapter->rss_key_size, GFP_KERNEL); 2340 adapter->rss_lut = kzalloc(adapter->rss_lut_size, GFP_KERNEL); 2341 if (!adapter->rss_key || !adapter->rss_lut) { 2342 err = -ENOMEM; 2343 goto err_mem; 2344 } 2345 if (RSS_AQ(adapter)) 2346 adapter->aq_required |= IAVF_FLAG_AQ_CONFIGURE_RSS; 2347 else 2348 iavf_init_rss(adapter); 2349 2350 if (VLAN_V2_ALLOWED(adapter)) 2351 /* request initial VLAN offload settings */ 2352 iavf_set_vlan_offload_features(adapter, 0, netdev->features); 2353 2354 return; 2355 err_mem: 2356 iavf_free_rss(adapter); 2357 err_register: 2358 iavf_free_misc_irq(adapter); 2359 err_sw_init: 2360 iavf_reset_interrupt_capability(adapter); 2361 err: 2362 iavf_change_state(adapter, __IAVF_INIT_FAILED); 2363 } 2364 2365 /** 2366 * iavf_watchdog_task - Periodic call-back task 2367 * @work: pointer to work_struct 2368 **/ 2369 static void iavf_watchdog_task(struct work_struct *work) 2370 { 2371 struct iavf_adapter *adapter = container_of(work, 2372 struct iavf_adapter, 2373 watchdog_task.work); 2374 struct iavf_hw *hw = &adapter->hw; 2375 u32 reg_val; 2376 2377 if (!mutex_trylock(&adapter->crit_lock)) { 2378 if (adapter->state == __IAVF_REMOVE) 2379 return; 2380 2381 goto restart_watchdog; 2382 } 2383 2384 if (adapter->flags & IAVF_FLAG_PF_COMMS_FAILED) 2385 iavf_change_state(adapter, __IAVF_COMM_FAILED); 2386 2387 if (adapter->flags & IAVF_FLAG_RESET_NEEDED) { 2388 adapter->aq_required = 0; 2389 adapter->current_op = VIRTCHNL_OP_UNKNOWN; 2390 mutex_unlock(&adapter->crit_lock); 2391 queue_work(iavf_wq, &adapter->reset_task); 2392 return; 2393 } 2394 2395 switch (adapter->state) { 2396 case __IAVF_STARTUP: 2397 iavf_startup(adapter); 2398 mutex_unlock(&adapter->crit_lock); 2399 queue_delayed_work(iavf_wq, &adapter->watchdog_task, 2400 msecs_to_jiffies(30)); 2401 return; 2402 case __IAVF_INIT_VERSION_CHECK: 2403 iavf_init_version_check(adapter); 2404 mutex_unlock(&adapter->crit_lock); 2405 queue_delayed_work(iavf_wq, &adapter->watchdog_task, 2406 msecs_to_jiffies(30)); 2407 return; 2408 case __IAVF_INIT_GET_RESOURCES: 2409 iavf_init_get_resources(adapter); 2410 mutex_unlock(&adapter->crit_lock); 2411 queue_delayed_work(iavf_wq, &adapter->watchdog_task, 2412 msecs_to_jiffies(1)); 2413 return; 2414 case __IAVF_INIT_GET_OFFLOAD_VLAN_V2_CAPS: 2415 iavf_init_get_offload_vlan_v2_caps(adapter); 2416 mutex_unlock(&adapter->crit_lock); 2417 queue_delayed_work(iavf_wq, &adapter->watchdog_task, 2418 msecs_to_jiffies(1)); 2419 return; 2420 case __IAVF_INIT_CONFIG_ADAPTER: 2421 iavf_init_config_adapter(adapter); 2422 mutex_unlock(&adapter->crit_lock); 2423 queue_delayed_work(iavf_wq, &adapter->watchdog_task, 2424 msecs_to_jiffies(1)); 2425 return; 2426 case __IAVF_INIT_FAILED: 2427 if (test_bit(__IAVF_IN_REMOVE_TASK, 2428 &adapter->crit_section)) { 2429 /* Do not update the state and do not reschedule 2430 * watchdog task, iavf_remove should handle this state 2431 * as it can loop forever 2432 */ 2433 mutex_unlock(&adapter->crit_lock); 2434 return; 2435 } 2436 if (++adapter->aq_wait_count > IAVF_AQ_MAX_ERR) { 2437 dev_err(&adapter->pdev->dev, 2438 "Failed to communicate with PF; waiting before retry\n"); 2439 adapter->flags |= IAVF_FLAG_PF_COMMS_FAILED; 2440 iavf_shutdown_adminq(hw); 2441 mutex_unlock(&adapter->crit_lock); 2442 queue_delayed_work(iavf_wq, 2443 &adapter->watchdog_task, (5 * HZ)); 2444 return; 2445 } 2446 /* Try again from failed step*/ 2447 iavf_change_state(adapter, adapter->last_state); 2448 mutex_unlock(&adapter->crit_lock); 2449 queue_delayed_work(iavf_wq, &adapter->watchdog_task, HZ); 2450 return; 2451 case __IAVF_COMM_FAILED: 2452 if (test_bit(__IAVF_IN_REMOVE_TASK, 2453 &adapter->crit_section)) { 2454 /* Set state to __IAVF_INIT_FAILED and perform remove 2455 * steps. Remove IAVF_FLAG_PF_COMMS_FAILED so the task 2456 * doesn't bring the state back to __IAVF_COMM_FAILED. 2457 */ 2458 iavf_change_state(adapter, __IAVF_INIT_FAILED); 2459 adapter->flags &= ~IAVF_FLAG_PF_COMMS_FAILED; 2460 mutex_unlock(&adapter->crit_lock); 2461 return; 2462 } 2463 reg_val = rd32(hw, IAVF_VFGEN_RSTAT) & 2464 IAVF_VFGEN_RSTAT_VFR_STATE_MASK; 2465 if (reg_val == VIRTCHNL_VFR_VFACTIVE || 2466 reg_val == VIRTCHNL_VFR_COMPLETED) { 2467 /* A chance for redemption! */ 2468 dev_err(&adapter->pdev->dev, 2469 "Hardware came out of reset. Attempting reinit.\n"); 2470 /* When init task contacts the PF and 2471 * gets everything set up again, it'll restart the 2472 * watchdog for us. Down, boy. Sit. Stay. Woof. 2473 */ 2474 iavf_change_state(adapter, __IAVF_STARTUP); 2475 adapter->flags &= ~IAVF_FLAG_PF_COMMS_FAILED; 2476 } 2477 adapter->aq_required = 0; 2478 adapter->current_op = VIRTCHNL_OP_UNKNOWN; 2479 mutex_unlock(&adapter->crit_lock); 2480 queue_delayed_work(iavf_wq, 2481 &adapter->watchdog_task, 2482 msecs_to_jiffies(10)); 2483 return; 2484 case __IAVF_RESETTING: 2485 mutex_unlock(&adapter->crit_lock); 2486 queue_delayed_work(iavf_wq, &adapter->watchdog_task, HZ * 2); 2487 return; 2488 case __IAVF_DOWN: 2489 case __IAVF_DOWN_PENDING: 2490 case __IAVF_TESTING: 2491 case __IAVF_RUNNING: 2492 if (adapter->current_op) { 2493 if (!iavf_asq_done(hw)) { 2494 dev_dbg(&adapter->pdev->dev, 2495 "Admin queue timeout\n"); 2496 iavf_send_api_ver(adapter); 2497 } 2498 } else { 2499 int ret = iavf_process_aq_command(adapter); 2500 2501 /* An error will be returned if no commands were 2502 * processed; use this opportunity to update stats 2503 * if the error isn't -ENOTSUPP 2504 */ 2505 if (ret && ret != -EOPNOTSUPP && 2506 adapter->state == __IAVF_RUNNING) 2507 iavf_request_stats(adapter); 2508 } 2509 if (adapter->state == __IAVF_RUNNING) 2510 iavf_detect_recover_hung(&adapter->vsi); 2511 break; 2512 case __IAVF_REMOVE: 2513 default: 2514 mutex_unlock(&adapter->crit_lock); 2515 return; 2516 } 2517 2518 /* check for hw reset */ 2519 reg_val = rd32(hw, IAVF_VF_ARQLEN1) & IAVF_VF_ARQLEN1_ARQENABLE_MASK; 2520 if (!reg_val) { 2521 adapter->flags |= IAVF_FLAG_RESET_PENDING; 2522 adapter->aq_required = 0; 2523 adapter->current_op = VIRTCHNL_OP_UNKNOWN; 2524 dev_err(&adapter->pdev->dev, "Hardware reset detected\n"); 2525 queue_work(iavf_wq, &adapter->reset_task); 2526 mutex_unlock(&adapter->crit_lock); 2527 queue_delayed_work(iavf_wq, 2528 &adapter->watchdog_task, HZ * 2); 2529 return; 2530 } 2531 2532 schedule_delayed_work(&adapter->client_task, msecs_to_jiffies(5)); 2533 mutex_unlock(&adapter->crit_lock); 2534 restart_watchdog: 2535 if (adapter->state >= __IAVF_DOWN) 2536 queue_work(iavf_wq, &adapter->adminq_task); 2537 if (adapter->aq_required) 2538 queue_delayed_work(iavf_wq, &adapter->watchdog_task, 2539 msecs_to_jiffies(20)); 2540 else 2541 queue_delayed_work(iavf_wq, &adapter->watchdog_task, HZ * 2); 2542 } 2543 2544 /** 2545 * iavf_disable_vf - disable VF 2546 * @adapter: board private structure 2547 * 2548 * Set communication failed flag and free all resources. 2549 * NOTE: This function is expected to be called with crit_lock being held. 2550 **/ 2551 static void iavf_disable_vf(struct iavf_adapter *adapter) 2552 { 2553 struct iavf_mac_filter *f, *ftmp; 2554 struct iavf_vlan_filter *fv, *fvtmp; 2555 struct iavf_cloud_filter *cf, *cftmp; 2556 2557 adapter->flags |= IAVF_FLAG_PF_COMMS_FAILED; 2558 2559 /* We don't use netif_running() because it may be true prior to 2560 * ndo_open() returning, so we can't assume it means all our open 2561 * tasks have finished, since we're not holding the rtnl_lock here. 2562 */ 2563 if (adapter->state == __IAVF_RUNNING) { 2564 set_bit(__IAVF_VSI_DOWN, adapter->vsi.state); 2565 netif_carrier_off(adapter->netdev); 2566 netif_tx_disable(adapter->netdev); 2567 adapter->link_up = false; 2568 iavf_napi_disable_all(adapter); 2569 iavf_irq_disable(adapter); 2570 iavf_free_traffic_irqs(adapter); 2571 iavf_free_all_tx_resources(adapter); 2572 iavf_free_all_rx_resources(adapter); 2573 } 2574 2575 spin_lock_bh(&adapter->mac_vlan_list_lock); 2576 2577 /* Delete all of the filters */ 2578 list_for_each_entry_safe(f, ftmp, &adapter->mac_filter_list, list) { 2579 list_del(&f->list); 2580 kfree(f); 2581 } 2582 2583 list_for_each_entry_safe(fv, fvtmp, &adapter->vlan_filter_list, list) { 2584 list_del(&fv->list); 2585 kfree(fv); 2586 } 2587 2588 spin_unlock_bh(&adapter->mac_vlan_list_lock); 2589 2590 spin_lock_bh(&adapter->cloud_filter_list_lock); 2591 list_for_each_entry_safe(cf, cftmp, &adapter->cloud_filter_list, list) { 2592 list_del(&cf->list); 2593 kfree(cf); 2594 adapter->num_cloud_filters--; 2595 } 2596 spin_unlock_bh(&adapter->cloud_filter_list_lock); 2597 2598 iavf_free_misc_irq(adapter); 2599 iavf_reset_interrupt_capability(adapter); 2600 iavf_free_q_vectors(adapter); 2601 iavf_free_queues(adapter); 2602 memset(adapter->vf_res, 0, IAVF_VIRTCHNL_VF_RESOURCE_SIZE); 2603 iavf_shutdown_adminq(&adapter->hw); 2604 adapter->netdev->flags &= ~IFF_UP; 2605 adapter->flags &= ~IAVF_FLAG_RESET_PENDING; 2606 iavf_change_state(adapter, __IAVF_DOWN); 2607 wake_up(&adapter->down_waitqueue); 2608 dev_info(&adapter->pdev->dev, "Reset task did not complete, VF disabled\n"); 2609 } 2610 2611 /** 2612 * iavf_reset_task - Call-back task to handle hardware reset 2613 * @work: pointer to work_struct 2614 * 2615 * During reset we need to shut down and reinitialize the admin queue 2616 * before we can use it to communicate with the PF again. We also clear 2617 * and reinit the rings because that context is lost as well. 2618 **/ 2619 static void iavf_reset_task(struct work_struct *work) 2620 { 2621 struct iavf_adapter *adapter = container_of(work, 2622 struct iavf_adapter, 2623 reset_task); 2624 struct virtchnl_vf_resource *vfres = adapter->vf_res; 2625 struct net_device *netdev = adapter->netdev; 2626 struct iavf_hw *hw = &adapter->hw; 2627 struct iavf_mac_filter *f, *ftmp; 2628 struct iavf_cloud_filter *cf; 2629 u32 reg_val; 2630 int i = 0, err; 2631 bool running; 2632 2633 /* When device is being removed it doesn't make sense to run the reset 2634 * task, just return in such a case. 2635 */ 2636 if (!mutex_trylock(&adapter->crit_lock)) { 2637 if (adapter->state != __IAVF_REMOVE) 2638 queue_work(iavf_wq, &adapter->reset_task); 2639 2640 return; 2641 } 2642 2643 while (!mutex_trylock(&adapter->client_lock)) 2644 usleep_range(500, 1000); 2645 if (CLIENT_ENABLED(adapter)) { 2646 adapter->flags &= ~(IAVF_FLAG_CLIENT_NEEDS_OPEN | 2647 IAVF_FLAG_CLIENT_NEEDS_CLOSE | 2648 IAVF_FLAG_CLIENT_NEEDS_L2_PARAMS | 2649 IAVF_FLAG_SERVICE_CLIENT_REQUESTED); 2650 cancel_delayed_work_sync(&adapter->client_task); 2651 iavf_notify_client_close(&adapter->vsi, true); 2652 } 2653 iavf_misc_irq_disable(adapter); 2654 if (adapter->flags & IAVF_FLAG_RESET_NEEDED) { 2655 adapter->flags &= ~IAVF_FLAG_RESET_NEEDED; 2656 /* Restart the AQ here. If we have been reset but didn't 2657 * detect it, or if the PF had to reinit, our AQ will be hosed. 2658 */ 2659 iavf_shutdown_adminq(hw); 2660 iavf_init_adminq(hw); 2661 iavf_request_reset(adapter); 2662 } 2663 adapter->flags |= IAVF_FLAG_RESET_PENDING; 2664 2665 /* poll until we see the reset actually happen */ 2666 for (i = 0; i < IAVF_RESET_WAIT_DETECTED_COUNT; i++) { 2667 reg_val = rd32(hw, IAVF_VF_ARQLEN1) & 2668 IAVF_VF_ARQLEN1_ARQENABLE_MASK; 2669 if (!reg_val) 2670 break; 2671 usleep_range(5000, 10000); 2672 } 2673 if (i == IAVF_RESET_WAIT_DETECTED_COUNT) { 2674 dev_info(&adapter->pdev->dev, "Never saw reset\n"); 2675 goto continue_reset; /* act like the reset happened */ 2676 } 2677 2678 /* wait until the reset is complete and the PF is responding to us */ 2679 for (i = 0; i < IAVF_RESET_WAIT_COMPLETE_COUNT; i++) { 2680 /* sleep first to make sure a minimum wait time is met */ 2681 msleep(IAVF_RESET_WAIT_MS); 2682 2683 reg_val = rd32(hw, IAVF_VFGEN_RSTAT) & 2684 IAVF_VFGEN_RSTAT_VFR_STATE_MASK; 2685 if (reg_val == VIRTCHNL_VFR_VFACTIVE) 2686 break; 2687 } 2688 2689 pci_set_master(adapter->pdev); 2690 pci_restore_msi_state(adapter->pdev); 2691 2692 if (i == IAVF_RESET_WAIT_COMPLETE_COUNT) { 2693 dev_err(&adapter->pdev->dev, "Reset never finished (%x)\n", 2694 reg_val); 2695 iavf_disable_vf(adapter); 2696 mutex_unlock(&adapter->client_lock); 2697 mutex_unlock(&adapter->crit_lock); 2698 return; /* Do not attempt to reinit. It's dead, Jim. */ 2699 } 2700 2701 continue_reset: 2702 /* We don't use netif_running() because it may be true prior to 2703 * ndo_open() returning, so we can't assume it means all our open 2704 * tasks have finished, since we're not holding the rtnl_lock here. 2705 */ 2706 running = adapter->state == __IAVF_RUNNING; 2707 2708 if (running) { 2709 netdev->flags &= ~IFF_UP; 2710 netif_carrier_off(netdev); 2711 netif_tx_stop_all_queues(netdev); 2712 adapter->link_up = false; 2713 iavf_napi_disable_all(adapter); 2714 } 2715 iavf_irq_disable(adapter); 2716 2717 iavf_change_state(adapter, __IAVF_RESETTING); 2718 adapter->flags &= ~IAVF_FLAG_RESET_PENDING; 2719 2720 /* free the Tx/Rx rings and descriptors, might be better to just 2721 * re-use them sometime in the future 2722 */ 2723 iavf_free_all_rx_resources(adapter); 2724 iavf_free_all_tx_resources(adapter); 2725 2726 adapter->flags |= IAVF_FLAG_QUEUES_DISABLED; 2727 /* kill and reinit the admin queue */ 2728 iavf_shutdown_adminq(hw); 2729 adapter->current_op = VIRTCHNL_OP_UNKNOWN; 2730 err = iavf_init_adminq(hw); 2731 if (err) 2732 dev_info(&adapter->pdev->dev, "Failed to init adminq: %d\n", 2733 err); 2734 adapter->aq_required = 0; 2735 2736 if ((adapter->flags & IAVF_FLAG_REINIT_MSIX_NEEDED) || 2737 (adapter->flags & IAVF_FLAG_REINIT_ITR_NEEDED)) { 2738 err = iavf_reinit_interrupt_scheme(adapter); 2739 if (err) 2740 goto reset_err; 2741 } 2742 2743 if (RSS_AQ(adapter)) { 2744 adapter->aq_required |= IAVF_FLAG_AQ_CONFIGURE_RSS; 2745 } else { 2746 err = iavf_init_rss(adapter); 2747 if (err) 2748 goto reset_err; 2749 } 2750 2751 adapter->aq_required |= IAVF_FLAG_AQ_GET_CONFIG; 2752 /* always set since VIRTCHNL_OP_GET_VF_RESOURCES has not been 2753 * sent/received yet, so VLAN_V2_ALLOWED() cannot is not reliable here, 2754 * however the VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS won't be sent until 2755 * VIRTCHNL_OP_GET_VF_RESOURCES and VIRTCHNL_VF_OFFLOAD_VLAN_V2 have 2756 * been successfully sent and negotiated 2757 */ 2758 adapter->aq_required |= IAVF_FLAG_AQ_GET_OFFLOAD_VLAN_V2_CAPS; 2759 adapter->aq_required |= IAVF_FLAG_AQ_MAP_VECTORS; 2760 2761 spin_lock_bh(&adapter->mac_vlan_list_lock); 2762 2763 /* Delete filter for the current MAC address, it could have 2764 * been changed by the PF via administratively set MAC. 2765 * Will be re-added via VIRTCHNL_OP_GET_VF_RESOURCES. 2766 */ 2767 list_for_each_entry_safe(f, ftmp, &adapter->mac_filter_list, list) { 2768 if (ether_addr_equal(f->macaddr, adapter->hw.mac.addr)) { 2769 list_del(&f->list); 2770 kfree(f); 2771 } 2772 } 2773 /* re-add all MAC filters */ 2774 list_for_each_entry(f, &adapter->mac_filter_list, list) { 2775 f->add = true; 2776 } 2777 spin_unlock_bh(&adapter->mac_vlan_list_lock); 2778 2779 /* check if TCs are running and re-add all cloud filters */ 2780 spin_lock_bh(&adapter->cloud_filter_list_lock); 2781 if ((vfres->vf_cap_flags & VIRTCHNL_VF_OFFLOAD_ADQ) && 2782 adapter->num_tc) { 2783 list_for_each_entry(cf, &adapter->cloud_filter_list, list) { 2784 cf->add = true; 2785 } 2786 } 2787 spin_unlock_bh(&adapter->cloud_filter_list_lock); 2788 2789 adapter->aq_required |= IAVF_FLAG_AQ_ADD_MAC_FILTER; 2790 adapter->aq_required |= IAVF_FLAG_AQ_ADD_CLOUD_FILTER; 2791 iavf_misc_irq_enable(adapter); 2792 2793 mod_delayed_work(iavf_wq, &adapter->watchdog_task, 2); 2794 2795 /* We were running when the reset started, so we need to restore some 2796 * state here. 2797 */ 2798 if (running) { 2799 /* allocate transmit descriptors */ 2800 err = iavf_setup_all_tx_resources(adapter); 2801 if (err) 2802 goto reset_err; 2803 2804 /* allocate receive descriptors */ 2805 err = iavf_setup_all_rx_resources(adapter); 2806 if (err) 2807 goto reset_err; 2808 2809 if ((adapter->flags & IAVF_FLAG_REINIT_MSIX_NEEDED) || 2810 (adapter->flags & IAVF_FLAG_REINIT_ITR_NEEDED)) { 2811 err = iavf_request_traffic_irqs(adapter, netdev->name); 2812 if (err) 2813 goto reset_err; 2814 2815 adapter->flags &= ~IAVF_FLAG_REINIT_MSIX_NEEDED; 2816 } 2817 2818 iavf_configure(adapter); 2819 2820 /* iavf_up_complete() will switch device back 2821 * to __IAVF_RUNNING 2822 */ 2823 iavf_up_complete(adapter); 2824 netdev->flags |= IFF_UP; 2825 iavf_irq_enable(adapter, true); 2826 } else { 2827 iavf_change_state(adapter, __IAVF_DOWN); 2828 wake_up(&adapter->down_waitqueue); 2829 } 2830 2831 adapter->flags &= ~IAVF_FLAG_REINIT_ITR_NEEDED; 2832 2833 mutex_unlock(&adapter->client_lock); 2834 mutex_unlock(&adapter->crit_lock); 2835 2836 return; 2837 reset_err: 2838 mutex_unlock(&adapter->client_lock); 2839 mutex_unlock(&adapter->crit_lock); 2840 if (running) { 2841 iavf_change_state(adapter, __IAVF_RUNNING); 2842 netdev->flags |= IFF_UP; 2843 } 2844 dev_err(&adapter->pdev->dev, "failed to allocate resources during reinit\n"); 2845 iavf_close(netdev); 2846 } 2847 2848 /** 2849 * iavf_adminq_task - worker thread to clean the admin queue 2850 * @work: pointer to work_struct containing our data 2851 **/ 2852 static void iavf_adminq_task(struct work_struct *work) 2853 { 2854 struct iavf_adapter *adapter = 2855 container_of(work, struct iavf_adapter, adminq_task); 2856 struct iavf_hw *hw = &adapter->hw; 2857 struct iavf_arq_event_info event; 2858 enum virtchnl_ops v_op; 2859 enum iavf_status ret, v_ret; 2860 u32 val, oldval; 2861 u16 pending; 2862 2863 if (adapter->flags & IAVF_FLAG_PF_COMMS_FAILED) 2864 goto out; 2865 2866 if (!mutex_trylock(&adapter->crit_lock)) { 2867 if (adapter->state == __IAVF_REMOVE) 2868 return; 2869 2870 queue_work(iavf_wq, &adapter->adminq_task); 2871 goto out; 2872 } 2873 2874 event.buf_len = IAVF_MAX_AQ_BUF_SIZE; 2875 event.msg_buf = kzalloc(event.buf_len, GFP_KERNEL); 2876 if (!event.msg_buf) 2877 goto out; 2878 2879 do { 2880 ret = iavf_clean_arq_element(hw, &event, &pending); 2881 v_op = (enum virtchnl_ops)le32_to_cpu(event.desc.cookie_high); 2882 v_ret = (enum iavf_status)le32_to_cpu(event.desc.cookie_low); 2883 2884 if (ret || !v_op) 2885 break; /* No event to process or error cleaning ARQ */ 2886 2887 iavf_virtchnl_completion(adapter, v_op, v_ret, event.msg_buf, 2888 event.msg_len); 2889 if (pending != 0) 2890 memset(event.msg_buf, 0, IAVF_MAX_AQ_BUF_SIZE); 2891 } while (pending); 2892 mutex_unlock(&adapter->crit_lock); 2893 2894 if ((adapter->flags & IAVF_FLAG_SETUP_NETDEV_FEATURES)) { 2895 if (adapter->netdev_registered || 2896 !test_bit(__IAVF_IN_REMOVE_TASK, &adapter->crit_section)) { 2897 struct net_device *netdev = adapter->netdev; 2898 2899 rtnl_lock(); 2900 netdev_update_features(netdev); 2901 rtnl_unlock(); 2902 /* Request VLAN offload settings */ 2903 if (VLAN_V2_ALLOWED(adapter)) 2904 iavf_set_vlan_offload_features 2905 (adapter, 0, netdev->features); 2906 2907 iavf_set_queue_vlan_tag_loc(adapter); 2908 } 2909 2910 adapter->flags &= ~IAVF_FLAG_SETUP_NETDEV_FEATURES; 2911 } 2912 if ((adapter->flags & 2913 (IAVF_FLAG_RESET_PENDING | IAVF_FLAG_RESET_NEEDED)) || 2914 adapter->state == __IAVF_RESETTING) 2915 goto freedom; 2916 2917 /* check for error indications */ 2918 val = rd32(hw, hw->aq.arq.len); 2919 if (val == 0xdeadbeef || val == 0xffffffff) /* device in reset */ 2920 goto freedom; 2921 oldval = val; 2922 if (val & IAVF_VF_ARQLEN1_ARQVFE_MASK) { 2923 dev_info(&adapter->pdev->dev, "ARQ VF Error detected\n"); 2924 val &= ~IAVF_VF_ARQLEN1_ARQVFE_MASK; 2925 } 2926 if (val & IAVF_VF_ARQLEN1_ARQOVFL_MASK) { 2927 dev_info(&adapter->pdev->dev, "ARQ Overflow Error detected\n"); 2928 val &= ~IAVF_VF_ARQLEN1_ARQOVFL_MASK; 2929 } 2930 if (val & IAVF_VF_ARQLEN1_ARQCRIT_MASK) { 2931 dev_info(&adapter->pdev->dev, "ARQ Critical Error detected\n"); 2932 val &= ~IAVF_VF_ARQLEN1_ARQCRIT_MASK; 2933 } 2934 if (oldval != val) 2935 wr32(hw, hw->aq.arq.len, val); 2936 2937 val = rd32(hw, hw->aq.asq.len); 2938 oldval = val; 2939 if (val & IAVF_VF_ATQLEN1_ATQVFE_MASK) { 2940 dev_info(&adapter->pdev->dev, "ASQ VF Error detected\n"); 2941 val &= ~IAVF_VF_ATQLEN1_ATQVFE_MASK; 2942 } 2943 if (val & IAVF_VF_ATQLEN1_ATQOVFL_MASK) { 2944 dev_info(&adapter->pdev->dev, "ASQ Overflow Error detected\n"); 2945 val &= ~IAVF_VF_ATQLEN1_ATQOVFL_MASK; 2946 } 2947 if (val & IAVF_VF_ATQLEN1_ATQCRIT_MASK) { 2948 dev_info(&adapter->pdev->dev, "ASQ Critical Error detected\n"); 2949 val &= ~IAVF_VF_ATQLEN1_ATQCRIT_MASK; 2950 } 2951 if (oldval != val) 2952 wr32(hw, hw->aq.asq.len, val); 2953 2954 freedom: 2955 kfree(event.msg_buf); 2956 out: 2957 /* re-enable Admin queue interrupt cause */ 2958 iavf_misc_irq_enable(adapter); 2959 } 2960 2961 /** 2962 * iavf_client_task - worker thread to perform client work 2963 * @work: pointer to work_struct containing our data 2964 * 2965 * This task handles client interactions. Because client calls can be 2966 * reentrant, we can't handle them in the watchdog. 2967 **/ 2968 static void iavf_client_task(struct work_struct *work) 2969 { 2970 struct iavf_adapter *adapter = 2971 container_of(work, struct iavf_adapter, client_task.work); 2972 2973 /* If we can't get the client bit, just give up. We'll be rescheduled 2974 * later. 2975 */ 2976 2977 if (!mutex_trylock(&adapter->client_lock)) 2978 return; 2979 2980 if (adapter->flags & IAVF_FLAG_SERVICE_CLIENT_REQUESTED) { 2981 iavf_client_subtask(adapter); 2982 adapter->flags &= ~IAVF_FLAG_SERVICE_CLIENT_REQUESTED; 2983 goto out; 2984 } 2985 if (adapter->flags & IAVF_FLAG_CLIENT_NEEDS_L2_PARAMS) { 2986 iavf_notify_client_l2_params(&adapter->vsi); 2987 adapter->flags &= ~IAVF_FLAG_CLIENT_NEEDS_L2_PARAMS; 2988 goto out; 2989 } 2990 if (adapter->flags & IAVF_FLAG_CLIENT_NEEDS_CLOSE) { 2991 iavf_notify_client_close(&adapter->vsi, false); 2992 adapter->flags &= ~IAVF_FLAG_CLIENT_NEEDS_CLOSE; 2993 goto out; 2994 } 2995 if (adapter->flags & IAVF_FLAG_CLIENT_NEEDS_OPEN) { 2996 iavf_notify_client_open(&adapter->vsi); 2997 adapter->flags &= ~IAVF_FLAG_CLIENT_NEEDS_OPEN; 2998 } 2999 out: 3000 mutex_unlock(&adapter->client_lock); 3001 } 3002 3003 /** 3004 * iavf_free_all_tx_resources - Free Tx Resources for All Queues 3005 * @adapter: board private structure 3006 * 3007 * Free all transmit software resources 3008 **/ 3009 void iavf_free_all_tx_resources(struct iavf_adapter *adapter) 3010 { 3011 int i; 3012 3013 if (!adapter->tx_rings) 3014 return; 3015 3016 for (i = 0; i < adapter->num_active_queues; i++) 3017 if (adapter->tx_rings[i].desc) 3018 iavf_free_tx_resources(&adapter->tx_rings[i]); 3019 } 3020 3021 /** 3022 * iavf_setup_all_tx_resources - allocate all queues Tx resources 3023 * @adapter: board private structure 3024 * 3025 * If this function returns with an error, then it's possible one or 3026 * more of the rings is populated (while the rest are not). It is the 3027 * callers duty to clean those orphaned rings. 3028 * 3029 * Return 0 on success, negative on failure 3030 **/ 3031 static int iavf_setup_all_tx_resources(struct iavf_adapter *adapter) 3032 { 3033 int i, err = 0; 3034 3035 for (i = 0; i < adapter->num_active_queues; i++) { 3036 adapter->tx_rings[i].count = adapter->tx_desc_count; 3037 err = iavf_setup_tx_descriptors(&adapter->tx_rings[i]); 3038 if (!err) 3039 continue; 3040 dev_err(&adapter->pdev->dev, 3041 "Allocation for Tx Queue %u failed\n", i); 3042 break; 3043 } 3044 3045 return err; 3046 } 3047 3048 /** 3049 * iavf_setup_all_rx_resources - allocate all queues Rx resources 3050 * @adapter: board private structure 3051 * 3052 * If this function returns with an error, then it's possible one or 3053 * more of the rings is populated (while the rest are not). It is the 3054 * callers duty to clean those orphaned rings. 3055 * 3056 * Return 0 on success, negative on failure 3057 **/ 3058 static int iavf_setup_all_rx_resources(struct iavf_adapter *adapter) 3059 { 3060 int i, err = 0; 3061 3062 for (i = 0; i < adapter->num_active_queues; i++) { 3063 adapter->rx_rings[i].count = adapter->rx_desc_count; 3064 err = iavf_setup_rx_descriptors(&adapter->rx_rings[i]); 3065 if (!err) 3066 continue; 3067 dev_err(&adapter->pdev->dev, 3068 "Allocation for Rx Queue %u failed\n", i); 3069 break; 3070 } 3071 return err; 3072 } 3073 3074 /** 3075 * iavf_free_all_rx_resources - Free Rx Resources for All Queues 3076 * @adapter: board private structure 3077 * 3078 * Free all receive software resources 3079 **/ 3080 void iavf_free_all_rx_resources(struct iavf_adapter *adapter) 3081 { 3082 int i; 3083 3084 if (!adapter->rx_rings) 3085 return; 3086 3087 for (i = 0; i < adapter->num_active_queues; i++) 3088 if (adapter->rx_rings[i].desc) 3089 iavf_free_rx_resources(&adapter->rx_rings[i]); 3090 } 3091 3092 /** 3093 * iavf_validate_tx_bandwidth - validate the max Tx bandwidth 3094 * @adapter: board private structure 3095 * @max_tx_rate: max Tx bw for a tc 3096 **/ 3097 static int iavf_validate_tx_bandwidth(struct iavf_adapter *adapter, 3098 u64 max_tx_rate) 3099 { 3100 int speed = 0, ret = 0; 3101 3102 if (ADV_LINK_SUPPORT(adapter)) { 3103 if (adapter->link_speed_mbps < U32_MAX) { 3104 speed = adapter->link_speed_mbps; 3105 goto validate_bw; 3106 } else { 3107 dev_err(&adapter->pdev->dev, "Unknown link speed\n"); 3108 return -EINVAL; 3109 } 3110 } 3111 3112 switch (adapter->link_speed) { 3113 case VIRTCHNL_LINK_SPEED_40GB: 3114 speed = SPEED_40000; 3115 break; 3116 case VIRTCHNL_LINK_SPEED_25GB: 3117 speed = SPEED_25000; 3118 break; 3119 case VIRTCHNL_LINK_SPEED_20GB: 3120 speed = SPEED_20000; 3121 break; 3122 case VIRTCHNL_LINK_SPEED_10GB: 3123 speed = SPEED_10000; 3124 break; 3125 case VIRTCHNL_LINK_SPEED_5GB: 3126 speed = SPEED_5000; 3127 break; 3128 case VIRTCHNL_LINK_SPEED_2_5GB: 3129 speed = SPEED_2500; 3130 break; 3131 case VIRTCHNL_LINK_SPEED_1GB: 3132 speed = SPEED_1000; 3133 break; 3134 case VIRTCHNL_LINK_SPEED_100MB: 3135 speed = SPEED_100; 3136 break; 3137 default: 3138 break; 3139 } 3140 3141 validate_bw: 3142 if (max_tx_rate > speed) { 3143 dev_err(&adapter->pdev->dev, 3144 "Invalid tx rate specified\n"); 3145 ret = -EINVAL; 3146 } 3147 3148 return ret; 3149 } 3150 3151 /** 3152 * iavf_validate_ch_config - validate queue mapping info 3153 * @adapter: board private structure 3154 * @mqprio_qopt: queue parameters 3155 * 3156 * This function validates if the config provided by the user to 3157 * configure queue channels is valid or not. Returns 0 on a valid 3158 * config. 3159 **/ 3160 static int iavf_validate_ch_config(struct iavf_adapter *adapter, 3161 struct tc_mqprio_qopt_offload *mqprio_qopt) 3162 { 3163 u64 total_max_rate = 0; 3164 int i, num_qps = 0; 3165 u64 tx_rate = 0; 3166 int ret = 0; 3167 3168 if (mqprio_qopt->qopt.num_tc > IAVF_MAX_TRAFFIC_CLASS || 3169 mqprio_qopt->qopt.num_tc < 1) 3170 return -EINVAL; 3171 3172 for (i = 0; i <= mqprio_qopt->qopt.num_tc - 1; i++) { 3173 if (!mqprio_qopt->qopt.count[i] || 3174 mqprio_qopt->qopt.offset[i] != num_qps) 3175 return -EINVAL; 3176 if (mqprio_qopt->min_rate[i]) { 3177 dev_err(&adapter->pdev->dev, 3178 "Invalid min tx rate (greater than 0) specified\n"); 3179 return -EINVAL; 3180 } 3181 /*convert to Mbps */ 3182 tx_rate = div_u64(mqprio_qopt->max_rate[i], 3183 IAVF_MBPS_DIVISOR); 3184 total_max_rate += tx_rate; 3185 num_qps += mqprio_qopt->qopt.count[i]; 3186 } 3187 if (num_qps > adapter->num_active_queues) { 3188 dev_err(&adapter->pdev->dev, 3189 "Cannot support requested number of queues\n"); 3190 return -EINVAL; 3191 } 3192 3193 ret = iavf_validate_tx_bandwidth(adapter, total_max_rate); 3194 return ret; 3195 } 3196 3197 /** 3198 * iavf_del_all_cloud_filters - delete all cloud filters on the traffic classes 3199 * @adapter: board private structure 3200 **/ 3201 static void iavf_del_all_cloud_filters(struct iavf_adapter *adapter) 3202 { 3203 struct iavf_cloud_filter *cf, *cftmp; 3204 3205 spin_lock_bh(&adapter->cloud_filter_list_lock); 3206 list_for_each_entry_safe(cf, cftmp, &adapter->cloud_filter_list, 3207 list) { 3208 list_del(&cf->list); 3209 kfree(cf); 3210 adapter->num_cloud_filters--; 3211 } 3212 spin_unlock_bh(&adapter->cloud_filter_list_lock); 3213 } 3214 3215 /** 3216 * __iavf_setup_tc - configure multiple traffic classes 3217 * @netdev: network interface device structure 3218 * @type_data: tc offload data 3219 * 3220 * This function processes the config information provided by the 3221 * user to configure traffic classes/queue channels and packages the 3222 * information to request the PF to setup traffic classes. 3223 * 3224 * Returns 0 on success. 3225 **/ 3226 static int __iavf_setup_tc(struct net_device *netdev, void *type_data) 3227 { 3228 struct tc_mqprio_qopt_offload *mqprio_qopt = type_data; 3229 struct iavf_adapter *adapter = netdev_priv(netdev); 3230 struct virtchnl_vf_resource *vfres = adapter->vf_res; 3231 u8 num_tc = 0, total_qps = 0; 3232 int ret = 0, netdev_tc = 0; 3233 u64 max_tx_rate; 3234 u16 mode; 3235 int i; 3236 3237 num_tc = mqprio_qopt->qopt.num_tc; 3238 mode = mqprio_qopt->mode; 3239 3240 /* delete queue_channel */ 3241 if (!mqprio_qopt->qopt.hw) { 3242 if (adapter->ch_config.state == __IAVF_TC_RUNNING) { 3243 /* reset the tc configuration */ 3244 netdev_reset_tc(netdev); 3245 adapter->num_tc = 0; 3246 netif_tx_stop_all_queues(netdev); 3247 netif_tx_disable(netdev); 3248 iavf_del_all_cloud_filters(adapter); 3249 adapter->aq_required = IAVF_FLAG_AQ_DISABLE_CHANNELS; 3250 goto exit; 3251 } else { 3252 return -EINVAL; 3253 } 3254 } 3255 3256 /* add queue channel */ 3257 if (mode == TC_MQPRIO_MODE_CHANNEL) { 3258 if (!(vfres->vf_cap_flags & VIRTCHNL_VF_OFFLOAD_ADQ)) { 3259 dev_err(&adapter->pdev->dev, "ADq not supported\n"); 3260 return -EOPNOTSUPP; 3261 } 3262 if (adapter->ch_config.state != __IAVF_TC_INVALID) { 3263 dev_err(&adapter->pdev->dev, "TC configuration already exists\n"); 3264 return -EINVAL; 3265 } 3266 3267 ret = iavf_validate_ch_config(adapter, mqprio_qopt); 3268 if (ret) 3269 return ret; 3270 /* Return if same TC config is requested */ 3271 if (adapter->num_tc == num_tc) 3272 return 0; 3273 adapter->num_tc = num_tc; 3274 3275 for (i = 0; i < IAVF_MAX_TRAFFIC_CLASS; i++) { 3276 if (i < num_tc) { 3277 adapter->ch_config.ch_info[i].count = 3278 mqprio_qopt->qopt.count[i]; 3279 adapter->ch_config.ch_info[i].offset = 3280 mqprio_qopt->qopt.offset[i]; 3281 total_qps += mqprio_qopt->qopt.count[i]; 3282 max_tx_rate = mqprio_qopt->max_rate[i]; 3283 /* convert to Mbps */ 3284 max_tx_rate = div_u64(max_tx_rate, 3285 IAVF_MBPS_DIVISOR); 3286 adapter->ch_config.ch_info[i].max_tx_rate = 3287 max_tx_rate; 3288 } else { 3289 adapter->ch_config.ch_info[i].count = 1; 3290 adapter->ch_config.ch_info[i].offset = 0; 3291 } 3292 } 3293 adapter->ch_config.total_qps = total_qps; 3294 netif_tx_stop_all_queues(netdev); 3295 netif_tx_disable(netdev); 3296 adapter->aq_required |= IAVF_FLAG_AQ_ENABLE_CHANNELS; 3297 netdev_reset_tc(netdev); 3298 /* Report the tc mapping up the stack */ 3299 netdev_set_num_tc(adapter->netdev, num_tc); 3300 for (i = 0; i < IAVF_MAX_TRAFFIC_CLASS; i++) { 3301 u16 qcount = mqprio_qopt->qopt.count[i]; 3302 u16 qoffset = mqprio_qopt->qopt.offset[i]; 3303 3304 if (i < num_tc) 3305 netdev_set_tc_queue(netdev, netdev_tc++, qcount, 3306 qoffset); 3307 } 3308 } 3309 exit: 3310 return ret; 3311 } 3312 3313 /** 3314 * iavf_parse_cls_flower - Parse tc flower filters provided by kernel 3315 * @adapter: board private structure 3316 * @f: pointer to struct flow_cls_offload 3317 * @filter: pointer to cloud filter structure 3318 */ 3319 static int iavf_parse_cls_flower(struct iavf_adapter *adapter, 3320 struct flow_cls_offload *f, 3321 struct iavf_cloud_filter *filter) 3322 { 3323 struct flow_rule *rule = flow_cls_offload_flow_rule(f); 3324 struct flow_dissector *dissector = rule->match.dissector; 3325 u16 n_proto_mask = 0; 3326 u16 n_proto_key = 0; 3327 u8 field_flags = 0; 3328 u16 addr_type = 0; 3329 u16 n_proto = 0; 3330 int i = 0; 3331 struct virtchnl_filter *vf = &filter->f; 3332 3333 if (dissector->used_keys & 3334 ~(BIT(FLOW_DISSECTOR_KEY_CONTROL) | 3335 BIT(FLOW_DISSECTOR_KEY_BASIC) | 3336 BIT(FLOW_DISSECTOR_KEY_ETH_ADDRS) | 3337 BIT(FLOW_DISSECTOR_KEY_VLAN) | 3338 BIT(FLOW_DISSECTOR_KEY_IPV4_ADDRS) | 3339 BIT(FLOW_DISSECTOR_KEY_IPV6_ADDRS) | 3340 BIT(FLOW_DISSECTOR_KEY_PORTS) | 3341 BIT(FLOW_DISSECTOR_KEY_ENC_KEYID))) { 3342 dev_err(&adapter->pdev->dev, "Unsupported key used: 0x%x\n", 3343 dissector->used_keys); 3344 return -EOPNOTSUPP; 3345 } 3346 3347 if (flow_rule_match_key(rule, FLOW_DISSECTOR_KEY_ENC_KEYID)) { 3348 struct flow_match_enc_keyid match; 3349 3350 flow_rule_match_enc_keyid(rule, &match); 3351 if (match.mask->keyid != 0) 3352 field_flags |= IAVF_CLOUD_FIELD_TEN_ID; 3353 } 3354 3355 if (flow_rule_match_key(rule, FLOW_DISSECTOR_KEY_BASIC)) { 3356 struct flow_match_basic match; 3357 3358 flow_rule_match_basic(rule, &match); 3359 n_proto_key = ntohs(match.key->n_proto); 3360 n_proto_mask = ntohs(match.mask->n_proto); 3361 3362 if (n_proto_key == ETH_P_ALL) { 3363 n_proto_key = 0; 3364 n_proto_mask = 0; 3365 } 3366 n_proto = n_proto_key & n_proto_mask; 3367 if (n_proto != ETH_P_IP && n_proto != ETH_P_IPV6) 3368 return -EINVAL; 3369 if (n_proto == ETH_P_IPV6) { 3370 /* specify flow type as TCP IPv6 */ 3371 vf->flow_type = VIRTCHNL_TCP_V6_FLOW; 3372 } 3373 3374 if (match.key->ip_proto != IPPROTO_TCP) { 3375 dev_info(&adapter->pdev->dev, "Only TCP transport is supported\n"); 3376 return -EINVAL; 3377 } 3378 } 3379 3380 if (flow_rule_match_key(rule, FLOW_DISSECTOR_KEY_ETH_ADDRS)) { 3381 struct flow_match_eth_addrs match; 3382 3383 flow_rule_match_eth_addrs(rule, &match); 3384 3385 /* use is_broadcast and is_zero to check for all 0xf or 0 */ 3386 if (!is_zero_ether_addr(match.mask->dst)) { 3387 if (is_broadcast_ether_addr(match.mask->dst)) { 3388 field_flags |= IAVF_CLOUD_FIELD_OMAC; 3389 } else { 3390 dev_err(&adapter->pdev->dev, "Bad ether dest mask %pM\n", 3391 match.mask->dst); 3392 return -EINVAL; 3393 } 3394 } 3395 3396 if (!is_zero_ether_addr(match.mask->src)) { 3397 if (is_broadcast_ether_addr(match.mask->src)) { 3398 field_flags |= IAVF_CLOUD_FIELD_IMAC; 3399 } else { 3400 dev_err(&adapter->pdev->dev, "Bad ether src mask %pM\n", 3401 match.mask->src); 3402 return -EINVAL; 3403 } 3404 } 3405 3406 if (!is_zero_ether_addr(match.key->dst)) 3407 if (is_valid_ether_addr(match.key->dst) || 3408 is_multicast_ether_addr(match.key->dst)) { 3409 /* set the mask if a valid dst_mac address */ 3410 for (i = 0; i < ETH_ALEN; i++) 3411 vf->mask.tcp_spec.dst_mac[i] |= 0xff; 3412 ether_addr_copy(vf->data.tcp_spec.dst_mac, 3413 match.key->dst); 3414 } 3415 3416 if (!is_zero_ether_addr(match.key->src)) 3417 if (is_valid_ether_addr(match.key->src) || 3418 is_multicast_ether_addr(match.key->src)) { 3419 /* set the mask if a valid dst_mac address */ 3420 for (i = 0; i < ETH_ALEN; i++) 3421 vf->mask.tcp_spec.src_mac[i] |= 0xff; 3422 ether_addr_copy(vf->data.tcp_spec.src_mac, 3423 match.key->src); 3424 } 3425 } 3426 3427 if (flow_rule_match_key(rule, FLOW_DISSECTOR_KEY_VLAN)) { 3428 struct flow_match_vlan match; 3429 3430 flow_rule_match_vlan(rule, &match); 3431 if (match.mask->vlan_id) { 3432 if (match.mask->vlan_id == VLAN_VID_MASK) { 3433 field_flags |= IAVF_CLOUD_FIELD_IVLAN; 3434 } else { 3435 dev_err(&adapter->pdev->dev, "Bad vlan mask %u\n", 3436 match.mask->vlan_id); 3437 return -EINVAL; 3438 } 3439 } 3440 vf->mask.tcp_spec.vlan_id |= cpu_to_be16(0xffff); 3441 vf->data.tcp_spec.vlan_id = cpu_to_be16(match.key->vlan_id); 3442 } 3443 3444 if (flow_rule_match_key(rule, FLOW_DISSECTOR_KEY_CONTROL)) { 3445 struct flow_match_control match; 3446 3447 flow_rule_match_control(rule, &match); 3448 addr_type = match.key->addr_type; 3449 } 3450 3451 if (addr_type == FLOW_DISSECTOR_KEY_IPV4_ADDRS) { 3452 struct flow_match_ipv4_addrs match; 3453 3454 flow_rule_match_ipv4_addrs(rule, &match); 3455 if (match.mask->dst) { 3456 if (match.mask->dst == cpu_to_be32(0xffffffff)) { 3457 field_flags |= IAVF_CLOUD_FIELD_IIP; 3458 } else { 3459 dev_err(&adapter->pdev->dev, "Bad ip dst mask 0x%08x\n", 3460 be32_to_cpu(match.mask->dst)); 3461 return -EINVAL; 3462 } 3463 } 3464 3465 if (match.mask->src) { 3466 if (match.mask->src == cpu_to_be32(0xffffffff)) { 3467 field_flags |= IAVF_CLOUD_FIELD_IIP; 3468 } else { 3469 dev_err(&adapter->pdev->dev, "Bad ip src mask 0x%08x\n", 3470 be32_to_cpu(match.mask->dst)); 3471 return -EINVAL; 3472 } 3473 } 3474 3475 if (field_flags & IAVF_CLOUD_FIELD_TEN_ID) { 3476 dev_info(&adapter->pdev->dev, "Tenant id not allowed for ip filter\n"); 3477 return -EINVAL; 3478 } 3479 if (match.key->dst) { 3480 vf->mask.tcp_spec.dst_ip[0] |= cpu_to_be32(0xffffffff); 3481 vf->data.tcp_spec.dst_ip[0] = match.key->dst; 3482 } 3483 if (match.key->src) { 3484 vf->mask.tcp_spec.src_ip[0] |= cpu_to_be32(0xffffffff); 3485 vf->data.tcp_spec.src_ip[0] = match.key->src; 3486 } 3487 } 3488 3489 if (addr_type == FLOW_DISSECTOR_KEY_IPV6_ADDRS) { 3490 struct flow_match_ipv6_addrs match; 3491 3492 flow_rule_match_ipv6_addrs(rule, &match); 3493 3494 /* validate mask, make sure it is not IPV6_ADDR_ANY */ 3495 if (ipv6_addr_any(&match.mask->dst)) { 3496 dev_err(&adapter->pdev->dev, "Bad ipv6 dst mask 0x%02x\n", 3497 IPV6_ADDR_ANY); 3498 return -EINVAL; 3499 } 3500 3501 /* src and dest IPv6 address should not be LOOPBACK 3502 * (0:0:0:0:0:0:0:1) which can be represented as ::1 3503 */ 3504 if (ipv6_addr_loopback(&match.key->dst) || 3505 ipv6_addr_loopback(&match.key->src)) { 3506 dev_err(&adapter->pdev->dev, 3507 "ipv6 addr should not be loopback\n"); 3508 return -EINVAL; 3509 } 3510 if (!ipv6_addr_any(&match.mask->dst) || 3511 !ipv6_addr_any(&match.mask->src)) 3512 field_flags |= IAVF_CLOUD_FIELD_IIP; 3513 3514 for (i = 0; i < 4; i++) 3515 vf->mask.tcp_spec.dst_ip[i] |= cpu_to_be32(0xffffffff); 3516 memcpy(&vf->data.tcp_spec.dst_ip, &match.key->dst.s6_addr32, 3517 sizeof(vf->data.tcp_spec.dst_ip)); 3518 for (i = 0; i < 4; i++) 3519 vf->mask.tcp_spec.src_ip[i] |= cpu_to_be32(0xffffffff); 3520 memcpy(&vf->data.tcp_spec.src_ip, &match.key->src.s6_addr32, 3521 sizeof(vf->data.tcp_spec.src_ip)); 3522 } 3523 if (flow_rule_match_key(rule, FLOW_DISSECTOR_KEY_PORTS)) { 3524 struct flow_match_ports match; 3525 3526 flow_rule_match_ports(rule, &match); 3527 if (match.mask->src) { 3528 if (match.mask->src == cpu_to_be16(0xffff)) { 3529 field_flags |= IAVF_CLOUD_FIELD_IIP; 3530 } else { 3531 dev_err(&adapter->pdev->dev, "Bad src port mask %u\n", 3532 be16_to_cpu(match.mask->src)); 3533 return -EINVAL; 3534 } 3535 } 3536 3537 if (match.mask->dst) { 3538 if (match.mask->dst == cpu_to_be16(0xffff)) { 3539 field_flags |= IAVF_CLOUD_FIELD_IIP; 3540 } else { 3541 dev_err(&adapter->pdev->dev, "Bad dst port mask %u\n", 3542 be16_to_cpu(match.mask->dst)); 3543 return -EINVAL; 3544 } 3545 } 3546 if (match.key->dst) { 3547 vf->mask.tcp_spec.dst_port |= cpu_to_be16(0xffff); 3548 vf->data.tcp_spec.dst_port = match.key->dst; 3549 } 3550 3551 if (match.key->src) { 3552 vf->mask.tcp_spec.src_port |= cpu_to_be16(0xffff); 3553 vf->data.tcp_spec.src_port = match.key->src; 3554 } 3555 } 3556 vf->field_flags = field_flags; 3557 3558 return 0; 3559 } 3560 3561 /** 3562 * iavf_handle_tclass - Forward to a traffic class on the device 3563 * @adapter: board private structure 3564 * @tc: traffic class index on the device 3565 * @filter: pointer to cloud filter structure 3566 */ 3567 static int iavf_handle_tclass(struct iavf_adapter *adapter, u32 tc, 3568 struct iavf_cloud_filter *filter) 3569 { 3570 if (tc == 0) 3571 return 0; 3572 if (tc < adapter->num_tc) { 3573 if (!filter->f.data.tcp_spec.dst_port) { 3574 dev_err(&adapter->pdev->dev, 3575 "Specify destination port to redirect to traffic class other than TC0\n"); 3576 return -EINVAL; 3577 } 3578 } 3579 /* redirect to a traffic class on the same device */ 3580 filter->f.action = VIRTCHNL_ACTION_TC_REDIRECT; 3581 filter->f.action_meta = tc; 3582 return 0; 3583 } 3584 3585 /** 3586 * iavf_configure_clsflower - Add tc flower filters 3587 * @adapter: board private structure 3588 * @cls_flower: Pointer to struct flow_cls_offload 3589 */ 3590 static int iavf_configure_clsflower(struct iavf_adapter *adapter, 3591 struct flow_cls_offload *cls_flower) 3592 { 3593 int tc = tc_classid_to_hwtc(adapter->netdev, cls_flower->classid); 3594 struct iavf_cloud_filter *filter = NULL; 3595 int err = -EINVAL, count = 50; 3596 3597 if (tc < 0) { 3598 dev_err(&adapter->pdev->dev, "Invalid traffic class\n"); 3599 return -EINVAL; 3600 } 3601 3602 filter = kzalloc(sizeof(*filter), GFP_KERNEL); 3603 if (!filter) 3604 return -ENOMEM; 3605 3606 while (!mutex_trylock(&adapter->crit_lock)) { 3607 if (--count == 0) { 3608 kfree(filter); 3609 return err; 3610 } 3611 udelay(1); 3612 } 3613 3614 filter->cookie = cls_flower->cookie; 3615 3616 /* set the mask to all zeroes to begin with */ 3617 memset(&filter->f.mask.tcp_spec, 0, sizeof(struct virtchnl_l4_spec)); 3618 /* start out with flow type and eth type IPv4 to begin with */ 3619 filter->f.flow_type = VIRTCHNL_TCP_V4_FLOW; 3620 err = iavf_parse_cls_flower(adapter, cls_flower, filter); 3621 if (err) 3622 goto err; 3623 3624 err = iavf_handle_tclass(adapter, tc, filter); 3625 if (err) 3626 goto err; 3627 3628 /* add filter to the list */ 3629 spin_lock_bh(&adapter->cloud_filter_list_lock); 3630 list_add_tail(&filter->list, &adapter->cloud_filter_list); 3631 adapter->num_cloud_filters++; 3632 filter->add = true; 3633 adapter->aq_required |= IAVF_FLAG_AQ_ADD_CLOUD_FILTER; 3634 spin_unlock_bh(&adapter->cloud_filter_list_lock); 3635 err: 3636 if (err) 3637 kfree(filter); 3638 3639 mutex_unlock(&adapter->crit_lock); 3640 return err; 3641 } 3642 3643 /* iavf_find_cf - Find the cloud filter in the list 3644 * @adapter: Board private structure 3645 * @cookie: filter specific cookie 3646 * 3647 * Returns ptr to the filter object or NULL. Must be called while holding the 3648 * cloud_filter_list_lock. 3649 */ 3650 static struct iavf_cloud_filter *iavf_find_cf(struct iavf_adapter *adapter, 3651 unsigned long *cookie) 3652 { 3653 struct iavf_cloud_filter *filter = NULL; 3654 3655 if (!cookie) 3656 return NULL; 3657 3658 list_for_each_entry(filter, &adapter->cloud_filter_list, list) { 3659 if (!memcmp(cookie, &filter->cookie, sizeof(filter->cookie))) 3660 return filter; 3661 } 3662 return NULL; 3663 } 3664 3665 /** 3666 * iavf_delete_clsflower - Remove tc flower filters 3667 * @adapter: board private structure 3668 * @cls_flower: Pointer to struct flow_cls_offload 3669 */ 3670 static int iavf_delete_clsflower(struct iavf_adapter *adapter, 3671 struct flow_cls_offload *cls_flower) 3672 { 3673 struct iavf_cloud_filter *filter = NULL; 3674 int err = 0; 3675 3676 spin_lock_bh(&adapter->cloud_filter_list_lock); 3677 filter = iavf_find_cf(adapter, &cls_flower->cookie); 3678 if (filter) { 3679 filter->del = true; 3680 adapter->aq_required |= IAVF_FLAG_AQ_DEL_CLOUD_FILTER; 3681 } else { 3682 err = -EINVAL; 3683 } 3684 spin_unlock_bh(&adapter->cloud_filter_list_lock); 3685 3686 return err; 3687 } 3688 3689 /** 3690 * iavf_setup_tc_cls_flower - flower classifier offloads 3691 * @adapter: board private structure 3692 * @cls_flower: pointer to flow_cls_offload struct with flow info 3693 */ 3694 static int iavf_setup_tc_cls_flower(struct iavf_adapter *adapter, 3695 struct flow_cls_offload *cls_flower) 3696 { 3697 switch (cls_flower->command) { 3698 case FLOW_CLS_REPLACE: 3699 return iavf_configure_clsflower(adapter, cls_flower); 3700 case FLOW_CLS_DESTROY: 3701 return iavf_delete_clsflower(adapter, cls_flower); 3702 case FLOW_CLS_STATS: 3703 return -EOPNOTSUPP; 3704 default: 3705 return -EOPNOTSUPP; 3706 } 3707 } 3708 3709 /** 3710 * iavf_setup_tc_block_cb - block callback for tc 3711 * @type: type of offload 3712 * @type_data: offload data 3713 * @cb_priv: 3714 * 3715 * This function is the block callback for traffic classes 3716 **/ 3717 static int iavf_setup_tc_block_cb(enum tc_setup_type type, void *type_data, 3718 void *cb_priv) 3719 { 3720 struct iavf_adapter *adapter = cb_priv; 3721 3722 if (!tc_cls_can_offload_and_chain0(adapter->netdev, type_data)) 3723 return -EOPNOTSUPP; 3724 3725 switch (type) { 3726 case TC_SETUP_CLSFLOWER: 3727 return iavf_setup_tc_cls_flower(cb_priv, type_data); 3728 default: 3729 return -EOPNOTSUPP; 3730 } 3731 } 3732 3733 static LIST_HEAD(iavf_block_cb_list); 3734 3735 /** 3736 * iavf_setup_tc - configure multiple traffic classes 3737 * @netdev: network interface device structure 3738 * @type: type of offload 3739 * @type_data: tc offload data 3740 * 3741 * This function is the callback to ndo_setup_tc in the 3742 * netdev_ops. 3743 * 3744 * Returns 0 on success 3745 **/ 3746 static int iavf_setup_tc(struct net_device *netdev, enum tc_setup_type type, 3747 void *type_data) 3748 { 3749 struct iavf_adapter *adapter = netdev_priv(netdev); 3750 3751 switch (type) { 3752 case TC_SETUP_QDISC_MQPRIO: 3753 return __iavf_setup_tc(netdev, type_data); 3754 case TC_SETUP_BLOCK: 3755 return flow_block_cb_setup_simple(type_data, 3756 &iavf_block_cb_list, 3757 iavf_setup_tc_block_cb, 3758 adapter, adapter, true); 3759 default: 3760 return -EOPNOTSUPP; 3761 } 3762 } 3763 3764 /** 3765 * iavf_open - Called when a network interface is made active 3766 * @netdev: network interface device structure 3767 * 3768 * Returns 0 on success, negative value on failure 3769 * 3770 * The open entry point is called when a network interface is made 3771 * active by the system (IFF_UP). At this point all resources needed 3772 * for transmit and receive operations are allocated, the interrupt 3773 * handler is registered with the OS, the watchdog is started, 3774 * and the stack is notified that the interface is ready. 3775 **/ 3776 static int iavf_open(struct net_device *netdev) 3777 { 3778 struct iavf_adapter *adapter = netdev_priv(netdev); 3779 int err; 3780 3781 if (adapter->flags & IAVF_FLAG_PF_COMMS_FAILED) { 3782 dev_err(&adapter->pdev->dev, "Unable to open device due to PF driver failure.\n"); 3783 return -EIO; 3784 } 3785 3786 while (!mutex_trylock(&adapter->crit_lock)) 3787 usleep_range(500, 1000); 3788 3789 if (adapter->state != __IAVF_DOWN) { 3790 err = -EBUSY; 3791 goto err_unlock; 3792 } 3793 3794 if (adapter->state == __IAVF_RUNNING && 3795 !test_bit(__IAVF_VSI_DOWN, adapter->vsi.state)) { 3796 dev_dbg(&adapter->pdev->dev, "VF is already open.\n"); 3797 err = 0; 3798 goto err_unlock; 3799 } 3800 3801 /* allocate transmit descriptors */ 3802 err = iavf_setup_all_tx_resources(adapter); 3803 if (err) 3804 goto err_setup_tx; 3805 3806 /* allocate receive descriptors */ 3807 err = iavf_setup_all_rx_resources(adapter); 3808 if (err) 3809 goto err_setup_rx; 3810 3811 /* clear any pending interrupts, may auto mask */ 3812 err = iavf_request_traffic_irqs(adapter, netdev->name); 3813 if (err) 3814 goto err_req_irq; 3815 3816 spin_lock_bh(&adapter->mac_vlan_list_lock); 3817 3818 iavf_add_filter(adapter, adapter->hw.mac.addr); 3819 3820 spin_unlock_bh(&adapter->mac_vlan_list_lock); 3821 3822 /* Restore VLAN filters that were removed with IFF_DOWN */ 3823 iavf_restore_filters(adapter); 3824 3825 iavf_configure(adapter); 3826 3827 iavf_up_complete(adapter); 3828 3829 iavf_irq_enable(adapter, true); 3830 3831 mutex_unlock(&adapter->crit_lock); 3832 3833 return 0; 3834 3835 err_req_irq: 3836 iavf_down(adapter); 3837 iavf_free_traffic_irqs(adapter); 3838 err_setup_rx: 3839 iavf_free_all_rx_resources(adapter); 3840 err_setup_tx: 3841 iavf_free_all_tx_resources(adapter); 3842 err_unlock: 3843 mutex_unlock(&adapter->crit_lock); 3844 3845 return err; 3846 } 3847 3848 /** 3849 * iavf_close - Disables a network interface 3850 * @netdev: network interface device structure 3851 * 3852 * Returns 0, this is not allowed to fail 3853 * 3854 * The close entry point is called when an interface is de-activated 3855 * by the OS. The hardware is still under the drivers control, but 3856 * needs to be disabled. All IRQs except vector 0 (reserved for admin queue) 3857 * are freed, along with all transmit and receive resources. 3858 **/ 3859 static int iavf_close(struct net_device *netdev) 3860 { 3861 struct iavf_adapter *adapter = netdev_priv(netdev); 3862 int status; 3863 3864 mutex_lock(&adapter->crit_lock); 3865 3866 if (adapter->state <= __IAVF_DOWN_PENDING) { 3867 mutex_unlock(&adapter->crit_lock); 3868 return 0; 3869 } 3870 3871 set_bit(__IAVF_VSI_DOWN, adapter->vsi.state); 3872 if (CLIENT_ENABLED(adapter)) 3873 adapter->flags |= IAVF_FLAG_CLIENT_NEEDS_CLOSE; 3874 3875 iavf_down(adapter); 3876 iavf_change_state(adapter, __IAVF_DOWN_PENDING); 3877 iavf_free_traffic_irqs(adapter); 3878 3879 mutex_unlock(&adapter->crit_lock); 3880 3881 /* We explicitly don't free resources here because the hardware is 3882 * still active and can DMA into memory. Resources are cleared in 3883 * iavf_virtchnl_completion() after we get confirmation from the PF 3884 * driver that the rings have been stopped. 3885 * 3886 * Also, we wait for state to transition to __IAVF_DOWN before 3887 * returning. State change occurs in iavf_virtchnl_completion() after 3888 * VF resources are released (which occurs after PF driver processes and 3889 * responds to admin queue commands). 3890 */ 3891 3892 status = wait_event_timeout(adapter->down_waitqueue, 3893 adapter->state == __IAVF_DOWN, 3894 msecs_to_jiffies(500)); 3895 if (!status) 3896 netdev_warn(netdev, "Device resources not yet released\n"); 3897 return 0; 3898 } 3899 3900 /** 3901 * iavf_change_mtu - Change the Maximum Transfer Unit 3902 * @netdev: network interface device structure 3903 * @new_mtu: new value for maximum frame size 3904 * 3905 * Returns 0 on success, negative on failure 3906 **/ 3907 static int iavf_change_mtu(struct net_device *netdev, int new_mtu) 3908 { 3909 struct iavf_adapter *adapter = netdev_priv(netdev); 3910 3911 netdev_dbg(netdev, "changing MTU from %d to %d\n", 3912 netdev->mtu, new_mtu); 3913 netdev->mtu = new_mtu; 3914 if (CLIENT_ENABLED(adapter)) { 3915 iavf_notify_client_l2_params(&adapter->vsi); 3916 adapter->flags |= IAVF_FLAG_SERVICE_CLIENT_REQUESTED; 3917 } 3918 3919 if (netif_running(netdev)) { 3920 adapter->flags |= IAVF_FLAG_RESET_NEEDED; 3921 queue_work(iavf_wq, &adapter->reset_task); 3922 } 3923 3924 return 0; 3925 } 3926 3927 #define NETIF_VLAN_OFFLOAD_FEATURES (NETIF_F_HW_VLAN_CTAG_RX | \ 3928 NETIF_F_HW_VLAN_CTAG_TX | \ 3929 NETIF_F_HW_VLAN_STAG_RX | \ 3930 NETIF_F_HW_VLAN_STAG_TX) 3931 3932 /** 3933 * iavf_set_features - set the netdev feature flags 3934 * @netdev: ptr to the netdev being adjusted 3935 * @features: the feature set that the stack is suggesting 3936 * Note: expects to be called while under rtnl_lock() 3937 **/ 3938 static int iavf_set_features(struct net_device *netdev, 3939 netdev_features_t features) 3940 { 3941 struct iavf_adapter *adapter = netdev_priv(netdev); 3942 3943 /* trigger update on any VLAN feature change */ 3944 if ((netdev->features & NETIF_VLAN_OFFLOAD_FEATURES) ^ 3945 (features & NETIF_VLAN_OFFLOAD_FEATURES)) 3946 iavf_set_vlan_offload_features(adapter, netdev->features, 3947 features); 3948 3949 return 0; 3950 } 3951 3952 /** 3953 * iavf_features_check - Validate encapsulated packet conforms to limits 3954 * @skb: skb buff 3955 * @dev: This physical port's netdev 3956 * @features: Offload features that the stack believes apply 3957 **/ 3958 static netdev_features_t iavf_features_check(struct sk_buff *skb, 3959 struct net_device *dev, 3960 netdev_features_t features) 3961 { 3962 size_t len; 3963 3964 /* No point in doing any of this if neither checksum nor GSO are 3965 * being requested for this frame. We can rule out both by just 3966 * checking for CHECKSUM_PARTIAL 3967 */ 3968 if (skb->ip_summed != CHECKSUM_PARTIAL) 3969 return features; 3970 3971 /* We cannot support GSO if the MSS is going to be less than 3972 * 64 bytes. If it is then we need to drop support for GSO. 3973 */ 3974 if (skb_is_gso(skb) && (skb_shinfo(skb)->gso_size < 64)) 3975 features &= ~NETIF_F_GSO_MASK; 3976 3977 /* MACLEN can support at most 63 words */ 3978 len = skb_network_header(skb) - skb->data; 3979 if (len & ~(63 * 2)) 3980 goto out_err; 3981 3982 /* IPLEN and EIPLEN can support at most 127 dwords */ 3983 len = skb_transport_header(skb) - skb_network_header(skb); 3984 if (len & ~(127 * 4)) 3985 goto out_err; 3986 3987 if (skb->encapsulation) { 3988 /* L4TUNLEN can support 127 words */ 3989 len = skb_inner_network_header(skb) - skb_transport_header(skb); 3990 if (len & ~(127 * 2)) 3991 goto out_err; 3992 3993 /* IPLEN can support at most 127 dwords */ 3994 len = skb_inner_transport_header(skb) - 3995 skb_inner_network_header(skb); 3996 if (len & ~(127 * 4)) 3997 goto out_err; 3998 } 3999 4000 /* No need to validate L4LEN as TCP is the only protocol with a 4001 * a flexible value and we support all possible values supported 4002 * by TCP, which is at most 15 dwords 4003 */ 4004 4005 return features; 4006 out_err: 4007 return features & ~(NETIF_F_CSUM_MASK | NETIF_F_GSO_MASK); 4008 } 4009 4010 /** 4011 * iavf_get_netdev_vlan_hw_features - get NETDEV VLAN features that can toggle on/off 4012 * @adapter: board private structure 4013 * 4014 * Depending on whether VIRTHCNL_VF_OFFLOAD_VLAN or VIRTCHNL_VF_OFFLOAD_VLAN_V2 4015 * were negotiated determine the VLAN features that can be toggled on and off. 4016 **/ 4017 static netdev_features_t 4018 iavf_get_netdev_vlan_hw_features(struct iavf_adapter *adapter) 4019 { 4020 netdev_features_t hw_features = 0; 4021 4022 if (!adapter->vf_res || !adapter->vf_res->vf_cap_flags) 4023 return hw_features; 4024 4025 /* Enable VLAN features if supported */ 4026 if (VLAN_ALLOWED(adapter)) { 4027 hw_features |= (NETIF_F_HW_VLAN_CTAG_TX | 4028 NETIF_F_HW_VLAN_CTAG_RX); 4029 } else if (VLAN_V2_ALLOWED(adapter)) { 4030 struct virtchnl_vlan_caps *vlan_v2_caps = 4031 &adapter->vlan_v2_caps; 4032 struct virtchnl_vlan_supported_caps *stripping_support = 4033 &vlan_v2_caps->offloads.stripping_support; 4034 struct virtchnl_vlan_supported_caps *insertion_support = 4035 &vlan_v2_caps->offloads.insertion_support; 4036 4037 if (stripping_support->outer != VIRTCHNL_VLAN_UNSUPPORTED && 4038 stripping_support->outer & VIRTCHNL_VLAN_TOGGLE) { 4039 if (stripping_support->outer & 4040 VIRTCHNL_VLAN_ETHERTYPE_8100) 4041 hw_features |= NETIF_F_HW_VLAN_CTAG_RX; 4042 if (stripping_support->outer & 4043 VIRTCHNL_VLAN_ETHERTYPE_88A8) 4044 hw_features |= NETIF_F_HW_VLAN_STAG_RX; 4045 } else if (stripping_support->inner != 4046 VIRTCHNL_VLAN_UNSUPPORTED && 4047 stripping_support->inner & VIRTCHNL_VLAN_TOGGLE) { 4048 if (stripping_support->inner & 4049 VIRTCHNL_VLAN_ETHERTYPE_8100) 4050 hw_features |= NETIF_F_HW_VLAN_CTAG_RX; 4051 } 4052 4053 if (insertion_support->outer != VIRTCHNL_VLAN_UNSUPPORTED && 4054 insertion_support->outer & VIRTCHNL_VLAN_TOGGLE) { 4055 if (insertion_support->outer & 4056 VIRTCHNL_VLAN_ETHERTYPE_8100) 4057 hw_features |= NETIF_F_HW_VLAN_CTAG_TX; 4058 if (insertion_support->outer & 4059 VIRTCHNL_VLAN_ETHERTYPE_88A8) 4060 hw_features |= NETIF_F_HW_VLAN_STAG_TX; 4061 } else if (insertion_support->inner && 4062 insertion_support->inner & VIRTCHNL_VLAN_TOGGLE) { 4063 if (insertion_support->inner & 4064 VIRTCHNL_VLAN_ETHERTYPE_8100) 4065 hw_features |= NETIF_F_HW_VLAN_CTAG_TX; 4066 } 4067 } 4068 4069 return hw_features; 4070 } 4071 4072 /** 4073 * iavf_get_netdev_vlan_features - get the enabled NETDEV VLAN fetures 4074 * @adapter: board private structure 4075 * 4076 * Depending on whether VIRTHCNL_VF_OFFLOAD_VLAN or VIRTCHNL_VF_OFFLOAD_VLAN_V2 4077 * were negotiated determine the VLAN features that are enabled by default. 4078 **/ 4079 static netdev_features_t 4080 iavf_get_netdev_vlan_features(struct iavf_adapter *adapter) 4081 { 4082 netdev_features_t features = 0; 4083 4084 if (!adapter->vf_res || !adapter->vf_res->vf_cap_flags) 4085 return features; 4086 4087 if (VLAN_ALLOWED(adapter)) { 4088 features |= NETIF_F_HW_VLAN_CTAG_FILTER | 4089 NETIF_F_HW_VLAN_CTAG_RX | NETIF_F_HW_VLAN_CTAG_TX; 4090 } else if (VLAN_V2_ALLOWED(adapter)) { 4091 struct virtchnl_vlan_caps *vlan_v2_caps = 4092 &adapter->vlan_v2_caps; 4093 struct virtchnl_vlan_supported_caps *filtering_support = 4094 &vlan_v2_caps->filtering.filtering_support; 4095 struct virtchnl_vlan_supported_caps *stripping_support = 4096 &vlan_v2_caps->offloads.stripping_support; 4097 struct virtchnl_vlan_supported_caps *insertion_support = 4098 &vlan_v2_caps->offloads.insertion_support; 4099 u32 ethertype_init; 4100 4101 /* give priority to outer stripping and don't support both outer 4102 * and inner stripping 4103 */ 4104 ethertype_init = vlan_v2_caps->offloads.ethertype_init; 4105 if (stripping_support->outer != VIRTCHNL_VLAN_UNSUPPORTED) { 4106 if (stripping_support->outer & 4107 VIRTCHNL_VLAN_ETHERTYPE_8100 && 4108 ethertype_init & VIRTCHNL_VLAN_ETHERTYPE_8100) 4109 features |= NETIF_F_HW_VLAN_CTAG_RX; 4110 else if (stripping_support->outer & 4111 VIRTCHNL_VLAN_ETHERTYPE_88A8 && 4112 ethertype_init & VIRTCHNL_VLAN_ETHERTYPE_88A8) 4113 features |= NETIF_F_HW_VLAN_STAG_RX; 4114 } else if (stripping_support->inner != 4115 VIRTCHNL_VLAN_UNSUPPORTED) { 4116 if (stripping_support->inner & 4117 VIRTCHNL_VLAN_ETHERTYPE_8100 && 4118 ethertype_init & VIRTCHNL_VLAN_ETHERTYPE_8100) 4119 features |= NETIF_F_HW_VLAN_CTAG_RX; 4120 } 4121 4122 /* give priority to outer insertion and don't support both outer 4123 * and inner insertion 4124 */ 4125 if (insertion_support->outer != VIRTCHNL_VLAN_UNSUPPORTED) { 4126 if (insertion_support->outer & 4127 VIRTCHNL_VLAN_ETHERTYPE_8100 && 4128 ethertype_init & VIRTCHNL_VLAN_ETHERTYPE_8100) 4129 features |= NETIF_F_HW_VLAN_CTAG_TX; 4130 else if (insertion_support->outer & 4131 VIRTCHNL_VLAN_ETHERTYPE_88A8 && 4132 ethertype_init & VIRTCHNL_VLAN_ETHERTYPE_88A8) 4133 features |= NETIF_F_HW_VLAN_STAG_TX; 4134 } else if (insertion_support->inner != 4135 VIRTCHNL_VLAN_UNSUPPORTED) { 4136 if (insertion_support->inner & 4137 VIRTCHNL_VLAN_ETHERTYPE_8100 && 4138 ethertype_init & VIRTCHNL_VLAN_ETHERTYPE_8100) 4139 features |= NETIF_F_HW_VLAN_CTAG_TX; 4140 } 4141 4142 /* give priority to outer filtering and don't bother if both 4143 * outer and inner filtering are enabled 4144 */ 4145 ethertype_init = vlan_v2_caps->filtering.ethertype_init; 4146 if (filtering_support->outer != VIRTCHNL_VLAN_UNSUPPORTED) { 4147 if (filtering_support->outer & 4148 VIRTCHNL_VLAN_ETHERTYPE_8100 && 4149 ethertype_init & VIRTCHNL_VLAN_ETHERTYPE_8100) 4150 features |= NETIF_F_HW_VLAN_CTAG_FILTER; 4151 if (filtering_support->outer & 4152 VIRTCHNL_VLAN_ETHERTYPE_88A8 && 4153 ethertype_init & VIRTCHNL_VLAN_ETHERTYPE_88A8) 4154 features |= NETIF_F_HW_VLAN_STAG_FILTER; 4155 } else if (filtering_support->inner != 4156 VIRTCHNL_VLAN_UNSUPPORTED) { 4157 if (filtering_support->inner & 4158 VIRTCHNL_VLAN_ETHERTYPE_8100 && 4159 ethertype_init & VIRTCHNL_VLAN_ETHERTYPE_8100) 4160 features |= NETIF_F_HW_VLAN_CTAG_FILTER; 4161 if (filtering_support->inner & 4162 VIRTCHNL_VLAN_ETHERTYPE_88A8 && 4163 ethertype_init & VIRTCHNL_VLAN_ETHERTYPE_88A8) 4164 features |= NETIF_F_HW_VLAN_STAG_FILTER; 4165 } 4166 } 4167 4168 return features; 4169 } 4170 4171 #define IAVF_NETDEV_VLAN_FEATURE_ALLOWED(requested, allowed, feature_bit) \ 4172 (!(((requested) & (feature_bit)) && \ 4173 !((allowed) & (feature_bit)))) 4174 4175 /** 4176 * iavf_fix_netdev_vlan_features - fix NETDEV VLAN features based on support 4177 * @adapter: board private structure 4178 * @requested_features: stack requested NETDEV features 4179 **/ 4180 static netdev_features_t 4181 iavf_fix_netdev_vlan_features(struct iavf_adapter *adapter, 4182 netdev_features_t requested_features) 4183 { 4184 netdev_features_t allowed_features; 4185 4186 allowed_features = iavf_get_netdev_vlan_hw_features(adapter) | 4187 iavf_get_netdev_vlan_features(adapter); 4188 4189 if (!IAVF_NETDEV_VLAN_FEATURE_ALLOWED(requested_features, 4190 allowed_features, 4191 NETIF_F_HW_VLAN_CTAG_TX)) 4192 requested_features &= ~NETIF_F_HW_VLAN_CTAG_TX; 4193 4194 if (!IAVF_NETDEV_VLAN_FEATURE_ALLOWED(requested_features, 4195 allowed_features, 4196 NETIF_F_HW_VLAN_CTAG_RX)) 4197 requested_features &= ~NETIF_F_HW_VLAN_CTAG_RX; 4198 4199 if (!IAVF_NETDEV_VLAN_FEATURE_ALLOWED(requested_features, 4200 allowed_features, 4201 NETIF_F_HW_VLAN_STAG_TX)) 4202 requested_features &= ~NETIF_F_HW_VLAN_STAG_TX; 4203 if (!IAVF_NETDEV_VLAN_FEATURE_ALLOWED(requested_features, 4204 allowed_features, 4205 NETIF_F_HW_VLAN_STAG_RX)) 4206 requested_features &= ~NETIF_F_HW_VLAN_STAG_RX; 4207 4208 if (!IAVF_NETDEV_VLAN_FEATURE_ALLOWED(requested_features, 4209 allowed_features, 4210 NETIF_F_HW_VLAN_CTAG_FILTER)) 4211 requested_features &= ~NETIF_F_HW_VLAN_CTAG_FILTER; 4212 4213 if (!IAVF_NETDEV_VLAN_FEATURE_ALLOWED(requested_features, 4214 allowed_features, 4215 NETIF_F_HW_VLAN_STAG_FILTER)) 4216 requested_features &= ~NETIF_F_HW_VLAN_STAG_FILTER; 4217 4218 if ((requested_features & 4219 (NETIF_F_HW_VLAN_CTAG_RX | NETIF_F_HW_VLAN_CTAG_TX)) && 4220 (requested_features & 4221 (NETIF_F_HW_VLAN_STAG_RX | NETIF_F_HW_VLAN_STAG_TX)) && 4222 adapter->vlan_v2_caps.offloads.ethertype_match == 4223 VIRTCHNL_ETHERTYPE_STRIPPING_MATCHES_INSERTION) { 4224 netdev_warn(adapter->netdev, "cannot support CTAG and STAG VLAN stripping and/or insertion simultaneously since CTAG and STAG offloads are mutually exclusive, clearing STAG offload settings\n"); 4225 requested_features &= ~(NETIF_F_HW_VLAN_STAG_RX | 4226 NETIF_F_HW_VLAN_STAG_TX); 4227 } 4228 4229 return requested_features; 4230 } 4231 4232 /** 4233 * iavf_fix_features - fix up the netdev feature bits 4234 * @netdev: our net device 4235 * @features: desired feature bits 4236 * 4237 * Returns fixed-up features bits 4238 **/ 4239 static netdev_features_t iavf_fix_features(struct net_device *netdev, 4240 netdev_features_t features) 4241 { 4242 struct iavf_adapter *adapter = netdev_priv(netdev); 4243 4244 return iavf_fix_netdev_vlan_features(adapter, features); 4245 } 4246 4247 static const struct net_device_ops iavf_netdev_ops = { 4248 .ndo_open = iavf_open, 4249 .ndo_stop = iavf_close, 4250 .ndo_start_xmit = iavf_xmit_frame, 4251 .ndo_set_rx_mode = iavf_set_rx_mode, 4252 .ndo_validate_addr = eth_validate_addr, 4253 .ndo_set_mac_address = iavf_set_mac, 4254 .ndo_change_mtu = iavf_change_mtu, 4255 .ndo_tx_timeout = iavf_tx_timeout, 4256 .ndo_vlan_rx_add_vid = iavf_vlan_rx_add_vid, 4257 .ndo_vlan_rx_kill_vid = iavf_vlan_rx_kill_vid, 4258 .ndo_features_check = iavf_features_check, 4259 .ndo_fix_features = iavf_fix_features, 4260 .ndo_set_features = iavf_set_features, 4261 .ndo_setup_tc = iavf_setup_tc, 4262 }; 4263 4264 /** 4265 * iavf_check_reset_complete - check that VF reset is complete 4266 * @hw: pointer to hw struct 4267 * 4268 * Returns 0 if device is ready to use, or -EBUSY if it's in reset. 4269 **/ 4270 static int iavf_check_reset_complete(struct iavf_hw *hw) 4271 { 4272 u32 rstat; 4273 int i; 4274 4275 for (i = 0; i < IAVF_RESET_WAIT_COMPLETE_COUNT; i++) { 4276 rstat = rd32(hw, IAVF_VFGEN_RSTAT) & 4277 IAVF_VFGEN_RSTAT_VFR_STATE_MASK; 4278 if ((rstat == VIRTCHNL_VFR_VFACTIVE) || 4279 (rstat == VIRTCHNL_VFR_COMPLETED)) 4280 return 0; 4281 usleep_range(10, 20); 4282 } 4283 return -EBUSY; 4284 } 4285 4286 /** 4287 * iavf_process_config - Process the config information we got from the PF 4288 * @adapter: board private structure 4289 * 4290 * Verify that we have a valid config struct, and set up our netdev features 4291 * and our VSI struct. 4292 **/ 4293 int iavf_process_config(struct iavf_adapter *adapter) 4294 { 4295 struct virtchnl_vf_resource *vfres = adapter->vf_res; 4296 netdev_features_t hw_vlan_features, vlan_features; 4297 struct net_device *netdev = adapter->netdev; 4298 netdev_features_t hw_enc_features; 4299 netdev_features_t hw_features; 4300 4301 hw_enc_features = NETIF_F_SG | 4302 NETIF_F_IP_CSUM | 4303 NETIF_F_IPV6_CSUM | 4304 NETIF_F_HIGHDMA | 4305 NETIF_F_SOFT_FEATURES | 4306 NETIF_F_TSO | 4307 NETIF_F_TSO_ECN | 4308 NETIF_F_TSO6 | 4309 NETIF_F_SCTP_CRC | 4310 NETIF_F_RXHASH | 4311 NETIF_F_RXCSUM | 4312 0; 4313 4314 /* advertise to stack only if offloads for encapsulated packets is 4315 * supported 4316 */ 4317 if (vfres->vf_cap_flags & VIRTCHNL_VF_OFFLOAD_ENCAP) { 4318 hw_enc_features |= NETIF_F_GSO_UDP_TUNNEL | 4319 NETIF_F_GSO_GRE | 4320 NETIF_F_GSO_GRE_CSUM | 4321 NETIF_F_GSO_IPXIP4 | 4322 NETIF_F_GSO_IPXIP6 | 4323 NETIF_F_GSO_UDP_TUNNEL_CSUM | 4324 NETIF_F_GSO_PARTIAL | 4325 0; 4326 4327 if (!(vfres->vf_cap_flags & 4328 VIRTCHNL_VF_OFFLOAD_ENCAP_CSUM)) 4329 netdev->gso_partial_features |= 4330 NETIF_F_GSO_UDP_TUNNEL_CSUM; 4331 4332 netdev->gso_partial_features |= NETIF_F_GSO_GRE_CSUM; 4333 netdev->hw_enc_features |= NETIF_F_TSO_MANGLEID; 4334 netdev->hw_enc_features |= hw_enc_features; 4335 } 4336 /* record features VLANs can make use of */ 4337 netdev->vlan_features |= hw_enc_features | NETIF_F_TSO_MANGLEID; 4338 4339 /* Write features and hw_features separately to avoid polluting 4340 * with, or dropping, features that are set when we registered. 4341 */ 4342 hw_features = hw_enc_features; 4343 4344 /* get HW VLAN features that can be toggled */ 4345 hw_vlan_features = iavf_get_netdev_vlan_hw_features(adapter); 4346 4347 /* Enable cloud filter if ADQ is supported */ 4348 if (vfres->vf_cap_flags & VIRTCHNL_VF_OFFLOAD_ADQ) 4349 hw_features |= NETIF_F_HW_TC; 4350 if (vfres->vf_cap_flags & VIRTCHNL_VF_OFFLOAD_USO) 4351 hw_features |= NETIF_F_GSO_UDP_L4; 4352 4353 netdev->hw_features |= hw_features | hw_vlan_features; 4354 vlan_features = iavf_get_netdev_vlan_features(adapter); 4355 4356 netdev->features |= hw_features | vlan_features; 4357 4358 if (vfres->vf_cap_flags & VIRTCHNL_VF_OFFLOAD_VLAN) 4359 netdev->features |= NETIF_F_HW_VLAN_CTAG_FILTER; 4360 4361 netdev->priv_flags |= IFF_UNICAST_FLT; 4362 4363 /* Do not turn on offloads when they are requested to be turned off. 4364 * TSO needs minimum 576 bytes to work correctly. 4365 */ 4366 if (netdev->wanted_features) { 4367 if (!(netdev->wanted_features & NETIF_F_TSO) || 4368 netdev->mtu < 576) 4369 netdev->features &= ~NETIF_F_TSO; 4370 if (!(netdev->wanted_features & NETIF_F_TSO6) || 4371 netdev->mtu < 576) 4372 netdev->features &= ~NETIF_F_TSO6; 4373 if (!(netdev->wanted_features & NETIF_F_TSO_ECN)) 4374 netdev->features &= ~NETIF_F_TSO_ECN; 4375 if (!(netdev->wanted_features & NETIF_F_GRO)) 4376 netdev->features &= ~NETIF_F_GRO; 4377 if (!(netdev->wanted_features & NETIF_F_GSO)) 4378 netdev->features &= ~NETIF_F_GSO; 4379 } 4380 4381 return 0; 4382 } 4383 4384 /** 4385 * iavf_shutdown - Shutdown the device in preparation for a reboot 4386 * @pdev: pci device structure 4387 **/ 4388 static void iavf_shutdown(struct pci_dev *pdev) 4389 { 4390 struct iavf_adapter *adapter = iavf_pdev_to_adapter(pdev); 4391 struct net_device *netdev = adapter->netdev; 4392 4393 netif_device_detach(netdev); 4394 4395 if (netif_running(netdev)) 4396 iavf_close(netdev); 4397 4398 if (iavf_lock_timeout(&adapter->crit_lock, 5000)) 4399 dev_warn(&adapter->pdev->dev, "failed to acquire crit_lock in %s\n", __FUNCTION__); 4400 /* Prevent the watchdog from running. */ 4401 iavf_change_state(adapter, __IAVF_REMOVE); 4402 adapter->aq_required = 0; 4403 mutex_unlock(&adapter->crit_lock); 4404 4405 #ifdef CONFIG_PM 4406 pci_save_state(pdev); 4407 4408 #endif 4409 pci_disable_device(pdev); 4410 } 4411 4412 /** 4413 * iavf_probe - Device Initialization Routine 4414 * @pdev: PCI device information struct 4415 * @ent: entry in iavf_pci_tbl 4416 * 4417 * Returns 0 on success, negative on failure 4418 * 4419 * iavf_probe initializes an adapter identified by a pci_dev structure. 4420 * The OS initialization, configuring of the adapter private structure, 4421 * and a hardware reset occur. 4422 **/ 4423 static int iavf_probe(struct pci_dev *pdev, const struct pci_device_id *ent) 4424 { 4425 struct net_device *netdev; 4426 struct iavf_adapter *adapter = NULL; 4427 struct iavf_hw *hw = NULL; 4428 int err; 4429 4430 err = pci_enable_device(pdev); 4431 if (err) 4432 return err; 4433 4434 err = dma_set_mask_and_coherent(&pdev->dev, DMA_BIT_MASK(64)); 4435 if (err) { 4436 err = dma_set_mask_and_coherent(&pdev->dev, DMA_BIT_MASK(32)); 4437 if (err) { 4438 dev_err(&pdev->dev, 4439 "DMA configuration failed: 0x%x\n", err); 4440 goto err_dma; 4441 } 4442 } 4443 4444 err = pci_request_regions(pdev, iavf_driver_name); 4445 if (err) { 4446 dev_err(&pdev->dev, 4447 "pci_request_regions failed 0x%x\n", err); 4448 goto err_pci_reg; 4449 } 4450 4451 pci_enable_pcie_error_reporting(pdev); 4452 4453 pci_set_master(pdev); 4454 4455 netdev = alloc_etherdev_mq(sizeof(struct iavf_adapter), 4456 IAVF_MAX_REQ_QUEUES); 4457 if (!netdev) { 4458 err = -ENOMEM; 4459 goto err_alloc_etherdev; 4460 } 4461 4462 SET_NETDEV_DEV(netdev, &pdev->dev); 4463 4464 pci_set_drvdata(pdev, netdev); 4465 adapter = netdev_priv(netdev); 4466 4467 adapter->netdev = netdev; 4468 adapter->pdev = pdev; 4469 4470 hw = &adapter->hw; 4471 hw->back = adapter; 4472 4473 adapter->msg_enable = BIT(DEFAULT_DEBUG_LEVEL_SHIFT) - 1; 4474 iavf_change_state(adapter, __IAVF_STARTUP); 4475 4476 /* Call save state here because it relies on the adapter struct. */ 4477 pci_save_state(pdev); 4478 4479 hw->hw_addr = ioremap(pci_resource_start(pdev, 0), 4480 pci_resource_len(pdev, 0)); 4481 if (!hw->hw_addr) { 4482 err = -EIO; 4483 goto err_ioremap; 4484 } 4485 hw->vendor_id = pdev->vendor; 4486 hw->device_id = pdev->device; 4487 pci_read_config_byte(pdev, PCI_REVISION_ID, &hw->revision_id); 4488 hw->subsystem_vendor_id = pdev->subsystem_vendor; 4489 hw->subsystem_device_id = pdev->subsystem_device; 4490 hw->bus.device = PCI_SLOT(pdev->devfn); 4491 hw->bus.func = PCI_FUNC(pdev->devfn); 4492 hw->bus.bus_id = pdev->bus->number; 4493 4494 /* set up the locks for the AQ, do this only once in probe 4495 * and destroy them only once in remove 4496 */ 4497 mutex_init(&adapter->crit_lock); 4498 mutex_init(&adapter->client_lock); 4499 mutex_init(&hw->aq.asq_mutex); 4500 mutex_init(&hw->aq.arq_mutex); 4501 4502 spin_lock_init(&adapter->mac_vlan_list_lock); 4503 spin_lock_init(&adapter->cloud_filter_list_lock); 4504 spin_lock_init(&adapter->fdir_fltr_lock); 4505 spin_lock_init(&adapter->adv_rss_lock); 4506 4507 INIT_LIST_HEAD(&adapter->mac_filter_list); 4508 INIT_LIST_HEAD(&adapter->vlan_filter_list); 4509 INIT_LIST_HEAD(&adapter->cloud_filter_list); 4510 INIT_LIST_HEAD(&adapter->fdir_list_head); 4511 INIT_LIST_HEAD(&adapter->adv_rss_list_head); 4512 4513 INIT_WORK(&adapter->reset_task, iavf_reset_task); 4514 INIT_WORK(&adapter->adminq_task, iavf_adminq_task); 4515 INIT_DELAYED_WORK(&adapter->watchdog_task, iavf_watchdog_task); 4516 INIT_DELAYED_WORK(&adapter->client_task, iavf_client_task); 4517 queue_delayed_work(iavf_wq, &adapter->watchdog_task, 4518 msecs_to_jiffies(5 * (pdev->devfn & 0x07))); 4519 4520 /* Setup the wait queue for indicating transition to down status */ 4521 init_waitqueue_head(&adapter->down_waitqueue); 4522 4523 return 0; 4524 4525 err_ioremap: 4526 free_netdev(netdev); 4527 err_alloc_etherdev: 4528 pci_disable_pcie_error_reporting(pdev); 4529 pci_release_regions(pdev); 4530 err_pci_reg: 4531 err_dma: 4532 pci_disable_device(pdev); 4533 return err; 4534 } 4535 4536 /** 4537 * iavf_suspend - Power management suspend routine 4538 * @dev_d: device info pointer 4539 * 4540 * Called when the system (VM) is entering sleep/suspend. 4541 **/ 4542 static int __maybe_unused iavf_suspend(struct device *dev_d) 4543 { 4544 struct net_device *netdev = dev_get_drvdata(dev_d); 4545 struct iavf_adapter *adapter = netdev_priv(netdev); 4546 4547 netif_device_detach(netdev); 4548 4549 while (!mutex_trylock(&adapter->crit_lock)) 4550 usleep_range(500, 1000); 4551 4552 if (netif_running(netdev)) { 4553 rtnl_lock(); 4554 iavf_down(adapter); 4555 rtnl_unlock(); 4556 } 4557 iavf_free_misc_irq(adapter); 4558 iavf_reset_interrupt_capability(adapter); 4559 4560 mutex_unlock(&adapter->crit_lock); 4561 4562 return 0; 4563 } 4564 4565 /** 4566 * iavf_resume - Power management resume routine 4567 * @dev_d: device info pointer 4568 * 4569 * Called when the system (VM) is resumed from sleep/suspend. 4570 **/ 4571 static int __maybe_unused iavf_resume(struct device *dev_d) 4572 { 4573 struct pci_dev *pdev = to_pci_dev(dev_d); 4574 struct iavf_adapter *adapter; 4575 u32 err; 4576 4577 adapter = iavf_pdev_to_adapter(pdev); 4578 4579 pci_set_master(pdev); 4580 4581 rtnl_lock(); 4582 err = iavf_set_interrupt_capability(adapter); 4583 if (err) { 4584 rtnl_unlock(); 4585 dev_err(&pdev->dev, "Cannot enable MSI-X interrupts.\n"); 4586 return err; 4587 } 4588 err = iavf_request_misc_irq(adapter); 4589 rtnl_unlock(); 4590 if (err) { 4591 dev_err(&pdev->dev, "Cannot get interrupt vector.\n"); 4592 return err; 4593 } 4594 4595 queue_work(iavf_wq, &adapter->reset_task); 4596 4597 netif_device_attach(adapter->netdev); 4598 4599 return err; 4600 } 4601 4602 /** 4603 * iavf_remove - Device Removal Routine 4604 * @pdev: PCI device information struct 4605 * 4606 * iavf_remove is called by the PCI subsystem to alert the driver 4607 * that it should release a PCI device. The could be caused by a 4608 * Hot-Plug event, or because the driver is going to be removed from 4609 * memory. 4610 **/ 4611 static void iavf_remove(struct pci_dev *pdev) 4612 { 4613 struct iavf_adapter *adapter = iavf_pdev_to_adapter(pdev); 4614 struct net_device *netdev = adapter->netdev; 4615 struct iavf_fdir_fltr *fdir, *fdirtmp; 4616 struct iavf_vlan_filter *vlf, *vlftmp; 4617 struct iavf_adv_rss *rss, *rsstmp; 4618 struct iavf_mac_filter *f, *ftmp; 4619 struct iavf_cloud_filter *cf, *cftmp; 4620 struct iavf_hw *hw = &adapter->hw; 4621 int err; 4622 4623 /* When reboot/shutdown is in progress no need to do anything 4624 * as the adapter is already REMOVE state that was set during 4625 * iavf_shutdown() callback. 4626 */ 4627 if (adapter->state == __IAVF_REMOVE) 4628 return; 4629 4630 set_bit(__IAVF_IN_REMOVE_TASK, &adapter->crit_section); 4631 /* Wait until port initialization is complete. 4632 * There are flows where register/unregister netdev may race. 4633 */ 4634 while (1) { 4635 mutex_lock(&adapter->crit_lock); 4636 if (adapter->state == __IAVF_RUNNING || 4637 adapter->state == __IAVF_DOWN || 4638 adapter->state == __IAVF_INIT_FAILED) { 4639 mutex_unlock(&adapter->crit_lock); 4640 break; 4641 } 4642 4643 mutex_unlock(&adapter->crit_lock); 4644 usleep_range(500, 1000); 4645 } 4646 cancel_delayed_work_sync(&adapter->watchdog_task); 4647 4648 if (adapter->netdev_registered) { 4649 rtnl_lock(); 4650 unregister_netdevice(netdev); 4651 adapter->netdev_registered = false; 4652 rtnl_unlock(); 4653 } 4654 if (CLIENT_ALLOWED(adapter)) { 4655 err = iavf_lan_del_device(adapter); 4656 if (err) 4657 dev_warn(&pdev->dev, "Failed to delete client device: %d\n", 4658 err); 4659 } 4660 4661 mutex_lock(&adapter->crit_lock); 4662 dev_info(&adapter->pdev->dev, "Remove device\n"); 4663 iavf_change_state(adapter, __IAVF_REMOVE); 4664 4665 iavf_request_reset(adapter); 4666 msleep(50); 4667 /* If the FW isn't responding, kick it once, but only once. */ 4668 if (!iavf_asq_done(hw)) { 4669 iavf_request_reset(adapter); 4670 msleep(50); 4671 } 4672 4673 iavf_misc_irq_disable(adapter); 4674 /* Shut down all the garbage mashers on the detention level */ 4675 cancel_work_sync(&adapter->reset_task); 4676 cancel_delayed_work_sync(&adapter->watchdog_task); 4677 cancel_work_sync(&adapter->adminq_task); 4678 cancel_delayed_work_sync(&adapter->client_task); 4679 4680 adapter->aq_required = 0; 4681 adapter->flags &= ~IAVF_FLAG_REINIT_ITR_NEEDED; 4682 4683 iavf_free_all_tx_resources(adapter); 4684 iavf_free_all_rx_resources(adapter); 4685 iavf_free_misc_irq(adapter); 4686 4687 iavf_reset_interrupt_capability(adapter); 4688 iavf_free_q_vectors(adapter); 4689 4690 iavf_free_rss(adapter); 4691 4692 if (hw->aq.asq.count) 4693 iavf_shutdown_adminq(hw); 4694 4695 /* destroy the locks only once, here */ 4696 mutex_destroy(&hw->aq.arq_mutex); 4697 mutex_destroy(&hw->aq.asq_mutex); 4698 mutex_destroy(&adapter->client_lock); 4699 mutex_unlock(&adapter->crit_lock); 4700 mutex_destroy(&adapter->crit_lock); 4701 4702 iounmap(hw->hw_addr); 4703 pci_release_regions(pdev); 4704 iavf_free_queues(adapter); 4705 kfree(adapter->vf_res); 4706 spin_lock_bh(&adapter->mac_vlan_list_lock); 4707 /* If we got removed before an up/down sequence, we've got a filter 4708 * hanging out there that we need to get rid of. 4709 */ 4710 list_for_each_entry_safe(f, ftmp, &adapter->mac_filter_list, list) { 4711 list_del(&f->list); 4712 kfree(f); 4713 } 4714 list_for_each_entry_safe(vlf, vlftmp, &adapter->vlan_filter_list, 4715 list) { 4716 list_del(&vlf->list); 4717 kfree(vlf); 4718 } 4719 4720 spin_unlock_bh(&adapter->mac_vlan_list_lock); 4721 4722 spin_lock_bh(&adapter->cloud_filter_list_lock); 4723 list_for_each_entry_safe(cf, cftmp, &adapter->cloud_filter_list, list) { 4724 list_del(&cf->list); 4725 kfree(cf); 4726 } 4727 spin_unlock_bh(&adapter->cloud_filter_list_lock); 4728 4729 spin_lock_bh(&adapter->fdir_fltr_lock); 4730 list_for_each_entry_safe(fdir, fdirtmp, &adapter->fdir_list_head, list) { 4731 list_del(&fdir->list); 4732 kfree(fdir); 4733 } 4734 spin_unlock_bh(&adapter->fdir_fltr_lock); 4735 4736 spin_lock_bh(&adapter->adv_rss_lock); 4737 list_for_each_entry_safe(rss, rsstmp, &adapter->adv_rss_list_head, 4738 list) { 4739 list_del(&rss->list); 4740 kfree(rss); 4741 } 4742 spin_unlock_bh(&adapter->adv_rss_lock); 4743 4744 free_netdev(netdev); 4745 4746 pci_disable_pcie_error_reporting(pdev); 4747 4748 pci_disable_device(pdev); 4749 } 4750 4751 static SIMPLE_DEV_PM_OPS(iavf_pm_ops, iavf_suspend, iavf_resume); 4752 4753 static struct pci_driver iavf_driver = { 4754 .name = iavf_driver_name, 4755 .id_table = iavf_pci_tbl, 4756 .probe = iavf_probe, 4757 .remove = iavf_remove, 4758 .driver.pm = &iavf_pm_ops, 4759 .shutdown = iavf_shutdown, 4760 }; 4761 4762 /** 4763 * iavf_init_module - Driver Registration Routine 4764 * 4765 * iavf_init_module is the first routine called when the driver is 4766 * loaded. All it does is register with the PCI subsystem. 4767 **/ 4768 static int __init iavf_init_module(void) 4769 { 4770 int ret; 4771 4772 pr_info("iavf: %s\n", iavf_driver_string); 4773 4774 pr_info("%s\n", iavf_copyright); 4775 4776 iavf_wq = alloc_workqueue("%s", WQ_UNBOUND | WQ_MEM_RECLAIM, 1, 4777 iavf_driver_name); 4778 if (!iavf_wq) { 4779 pr_err("%s: Failed to create workqueue\n", iavf_driver_name); 4780 return -ENOMEM; 4781 } 4782 ret = pci_register_driver(&iavf_driver); 4783 return ret; 4784 } 4785 4786 module_init(iavf_init_module); 4787 4788 /** 4789 * iavf_exit_module - Driver Exit Cleanup Routine 4790 * 4791 * iavf_exit_module is called just before the driver is removed 4792 * from memory. 4793 **/ 4794 static void __exit iavf_exit_module(void) 4795 { 4796 pci_unregister_driver(&iavf_driver); 4797 destroy_workqueue(iavf_wq); 4798 } 4799 4800 module_exit(iavf_exit_module); 4801 4802 /* iavf_main.c */ 4803