1 // SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) 2 /* Copyright (C) 2017-2019 Netronome Systems, Inc. */ 3 4 #include <linux/bitfield.h> 5 #include <linux/errno.h> 6 #include <linux/etherdevice.h> 7 #include <linux/if_link.h> 8 #include <linux/if_ether.h> 9 10 #include "nfpcore/nfp_cpp.h" 11 #include "nfp_app.h" 12 #include "nfp_main.h" 13 #include "nfp_net_ctrl.h" 14 #include "nfp_net.h" 15 #include "nfp_net_sriov.h" 16 17 static int 18 nfp_net_sriov_check(struct nfp_app *app, int vf, u16 cap, const char *msg) 19 { 20 u16 cap_vf; 21 22 if (!app || !app->pf->vfcfg_tbl2) 23 return -EOPNOTSUPP; 24 25 cap_vf = readw(app->pf->vfcfg_tbl2 + NFP_NET_VF_CFG_MB_CAP); 26 if ((cap_vf & cap) != cap) { 27 nfp_warn(app->pf->cpp, "ndo_set_vf_%s not supported\n", msg); 28 return -EOPNOTSUPP; 29 } 30 31 if (vf < 0 || vf >= app->pf->num_vfs) { 32 nfp_warn(app->pf->cpp, "invalid VF id %d\n", vf); 33 return -EINVAL; 34 } 35 36 return 0; 37 } 38 39 static int 40 nfp_net_sriov_update(struct nfp_app *app, int vf, u16 update, const char *msg) 41 { 42 struct nfp_net *nn; 43 int ret; 44 45 /* Write update info to mailbox in VF config symbol */ 46 writeb(vf, app->pf->vfcfg_tbl2 + NFP_NET_VF_CFG_MB_VF_NUM); 47 writew(update, app->pf->vfcfg_tbl2 + NFP_NET_VF_CFG_MB_UPD); 48 49 nn = list_first_entry(&app->pf->vnics, struct nfp_net, vnic_list); 50 /* Signal VF reconfiguration */ 51 ret = nfp_net_reconfig(nn, NFP_NET_CFG_UPDATE_VF); 52 if (ret) 53 return ret; 54 55 ret = readw(app->pf->vfcfg_tbl2 + NFP_NET_VF_CFG_MB_RET); 56 if (ret) 57 nfp_warn(app->pf->cpp, 58 "FW refused VF %s update with errno: %d\n", msg, ret); 59 return -ret; 60 } 61 62 int nfp_app_set_vf_mac(struct net_device *netdev, int vf, u8 *mac) 63 { 64 struct nfp_app *app = nfp_app_from_netdev(netdev); 65 unsigned int vf_offset; 66 int err; 67 68 err = nfp_net_sriov_check(app, vf, NFP_NET_VF_CFG_MB_CAP_MAC, "mac"); 69 if (err) 70 return err; 71 72 if (is_multicast_ether_addr(mac)) { 73 nfp_warn(app->pf->cpp, 74 "invalid Ethernet address %pM for VF id %d\n", 75 mac, vf); 76 return -EINVAL; 77 } 78 79 /* Write MAC to VF entry in VF config symbol */ 80 vf_offset = NFP_NET_VF_CFG_MB_SZ + vf * NFP_NET_VF_CFG_SZ; 81 writel(get_unaligned_be32(mac), app->pf->vfcfg_tbl2 + vf_offset); 82 writew(get_unaligned_be16(mac + 4), 83 app->pf->vfcfg_tbl2 + vf_offset + NFP_NET_VF_CFG_MAC_LO); 84 85 err = nfp_net_sriov_update(app, vf, NFP_NET_VF_CFG_MB_UPD_MAC, "MAC"); 86 if (!err) 87 nfp_info(app->pf->cpp, 88 "MAC %pM set on VF %d, reload the VF driver to make this change effective.\n", 89 mac, vf); 90 91 return err; 92 } 93 94 int nfp_app_set_vf_vlan(struct net_device *netdev, int vf, u16 vlan, u8 qos, 95 __be16 vlan_proto) 96 { 97 struct nfp_app *app = nfp_app_from_netdev(netdev); 98 u16 update = NFP_NET_VF_CFG_MB_UPD_VLAN; 99 bool is_proto_sup = true; 100 unsigned int vf_offset; 101 u32 vlan_tag; 102 int err; 103 104 err = nfp_net_sriov_check(app, vf, NFP_NET_VF_CFG_MB_CAP_VLAN, "vlan"); 105 if (err) 106 return err; 107 108 if (!eth_type_vlan(vlan_proto)) 109 return -EOPNOTSUPP; 110 111 if (vlan > 4095 || qos > 7) { 112 nfp_warn(app->pf->cpp, 113 "invalid vlan id or qos for VF id %d\n", vf); 114 return -EINVAL; 115 } 116 117 /* Check if fw supports or not */ 118 err = nfp_net_sriov_check(app, vf, NFP_NET_VF_CFG_MB_CAP_VLAN_PROTO, "vlan_proto"); 119 if (err) 120 is_proto_sup = false; 121 122 if (vlan_proto != htons(ETH_P_8021Q)) { 123 if (!is_proto_sup) 124 return -EOPNOTSUPP; 125 update |= NFP_NET_VF_CFG_MB_UPD_VLAN_PROTO; 126 } 127 128 /* Write VLAN tag to VF entry in VF config symbol */ 129 vlan_tag = FIELD_PREP(NFP_NET_VF_CFG_VLAN_VID, vlan) | 130 FIELD_PREP(NFP_NET_VF_CFG_VLAN_QOS, qos); 131 132 /* vlan_tag of 0 means that the configuration should be cleared and in 133 * such circumstances setting the TPID has no meaning when 134 * configuring firmware. 135 */ 136 if (vlan_tag && is_proto_sup) 137 vlan_tag |= FIELD_PREP(NFP_NET_VF_CFG_VLAN_PROT, ntohs(vlan_proto)); 138 139 vf_offset = NFP_NET_VF_CFG_MB_SZ + vf * NFP_NET_VF_CFG_SZ; 140 writel(vlan_tag, app->pf->vfcfg_tbl2 + vf_offset + NFP_NET_VF_CFG_VLAN); 141 142 return nfp_net_sriov_update(app, vf, update, "vlan"); 143 } 144 145 int nfp_app_set_vf_spoofchk(struct net_device *netdev, int vf, bool enable) 146 { 147 struct nfp_app *app = nfp_app_from_netdev(netdev); 148 unsigned int vf_offset; 149 u8 vf_ctrl; 150 int err; 151 152 err = nfp_net_sriov_check(app, vf, NFP_NET_VF_CFG_MB_CAP_SPOOF, 153 "spoofchk"); 154 if (err) 155 return err; 156 157 /* Write spoof check control bit to VF entry in VF config symbol */ 158 vf_offset = NFP_NET_VF_CFG_MB_SZ + vf * NFP_NET_VF_CFG_SZ + 159 NFP_NET_VF_CFG_CTRL; 160 vf_ctrl = readb(app->pf->vfcfg_tbl2 + vf_offset); 161 vf_ctrl &= ~NFP_NET_VF_CFG_CTRL_SPOOF; 162 vf_ctrl |= FIELD_PREP(NFP_NET_VF_CFG_CTRL_SPOOF, enable); 163 writeb(vf_ctrl, app->pf->vfcfg_tbl2 + vf_offset); 164 165 return nfp_net_sriov_update(app, vf, NFP_NET_VF_CFG_MB_UPD_SPOOF, 166 "spoofchk"); 167 } 168 169 int nfp_app_set_vf_trust(struct net_device *netdev, int vf, bool enable) 170 { 171 struct nfp_app *app = nfp_app_from_netdev(netdev); 172 unsigned int vf_offset; 173 u8 vf_ctrl; 174 int err; 175 176 err = nfp_net_sriov_check(app, vf, NFP_NET_VF_CFG_MB_CAP_TRUST, 177 "trust"); 178 if (err) 179 return err; 180 181 /* Write trust control bit to VF entry in VF config symbol */ 182 vf_offset = NFP_NET_VF_CFG_MB_SZ + vf * NFP_NET_VF_CFG_SZ + 183 NFP_NET_VF_CFG_CTRL; 184 vf_ctrl = readb(app->pf->vfcfg_tbl2 + vf_offset); 185 vf_ctrl &= ~NFP_NET_VF_CFG_CTRL_TRUST; 186 vf_ctrl |= FIELD_PREP(NFP_NET_VF_CFG_CTRL_TRUST, enable); 187 writeb(vf_ctrl, app->pf->vfcfg_tbl2 + vf_offset); 188 189 return nfp_net_sriov_update(app, vf, NFP_NET_VF_CFG_MB_UPD_TRUST, 190 "trust"); 191 } 192 193 int nfp_app_set_vf_link_state(struct net_device *netdev, int vf, 194 int link_state) 195 { 196 struct nfp_app *app = nfp_app_from_netdev(netdev); 197 unsigned int vf_offset; 198 u8 vf_ctrl; 199 int err; 200 201 err = nfp_net_sriov_check(app, vf, NFP_NET_VF_CFG_MB_CAP_LINK_STATE, 202 "link_state"); 203 if (err) 204 return err; 205 206 switch (link_state) { 207 case IFLA_VF_LINK_STATE_AUTO: 208 case IFLA_VF_LINK_STATE_ENABLE: 209 case IFLA_VF_LINK_STATE_DISABLE: 210 break; 211 default: 212 return -EINVAL; 213 } 214 215 /* Write link state to VF entry in VF config symbol */ 216 vf_offset = NFP_NET_VF_CFG_MB_SZ + vf * NFP_NET_VF_CFG_SZ + 217 NFP_NET_VF_CFG_CTRL; 218 vf_ctrl = readb(app->pf->vfcfg_tbl2 + vf_offset); 219 vf_ctrl &= ~NFP_NET_VF_CFG_CTRL_LINK_STATE; 220 vf_ctrl |= FIELD_PREP(NFP_NET_VF_CFG_CTRL_LINK_STATE, link_state); 221 writeb(vf_ctrl, app->pf->vfcfg_tbl2 + vf_offset); 222 223 return nfp_net_sriov_update(app, vf, NFP_NET_VF_CFG_MB_UPD_LINK_STATE, 224 "link state"); 225 } 226 227 int nfp_app_get_vf_config(struct net_device *netdev, int vf, 228 struct ifla_vf_info *ivi) 229 { 230 struct nfp_app *app = nfp_app_from_netdev(netdev); 231 unsigned int vf_offset; 232 u32 vlan_tag; 233 u32 mac_hi; 234 u16 mac_lo; 235 u8 flags; 236 int err; 237 238 err = nfp_net_sriov_check(app, vf, 0, ""); 239 if (err) 240 return err; 241 242 vf_offset = NFP_NET_VF_CFG_MB_SZ + vf * NFP_NET_VF_CFG_SZ; 243 244 mac_hi = readl(app->pf->vfcfg_tbl2 + vf_offset); 245 mac_lo = readw(app->pf->vfcfg_tbl2 + vf_offset + NFP_NET_VF_CFG_MAC_LO); 246 247 flags = readb(app->pf->vfcfg_tbl2 + vf_offset + NFP_NET_VF_CFG_CTRL); 248 vlan_tag = readl(app->pf->vfcfg_tbl2 + vf_offset + NFP_NET_VF_CFG_VLAN); 249 250 memset(ivi, 0, sizeof(*ivi)); 251 ivi->vf = vf; 252 253 put_unaligned_be32(mac_hi, &ivi->mac[0]); 254 put_unaligned_be16(mac_lo, &ivi->mac[4]); 255 256 ivi->vlan = FIELD_GET(NFP_NET_VF_CFG_VLAN_VID, vlan_tag); 257 ivi->qos = FIELD_GET(NFP_NET_VF_CFG_VLAN_QOS, vlan_tag); 258 if (!nfp_net_sriov_check(app, vf, NFP_NET_VF_CFG_MB_CAP_VLAN_PROTO, "vlan_proto")) 259 ivi->vlan_proto = htons(FIELD_GET(NFP_NET_VF_CFG_VLAN_PROT, vlan_tag)); 260 ivi->spoofchk = FIELD_GET(NFP_NET_VF_CFG_CTRL_SPOOF, flags); 261 ivi->trusted = FIELD_GET(NFP_NET_VF_CFG_CTRL_TRUST, flags); 262 ivi->linkstate = FIELD_GET(NFP_NET_VF_CFG_CTRL_LINK_STATE, flags); 263 264 return 0; 265 } 266