1 /* QLogic qed NIC Driver 2 * Copyright (c) 2015-2017 QLogic Corporation 3 * 4 * This software is available to you under a choice of one of two 5 * licenses. You may choose to be licensed under the terms of the GNU 6 * General Public License (GPL) Version 2, available from the file 7 * COPYING in the main directory of this source tree, or the 8 * OpenIB.org BSD license below: 9 * 10 * Redistribution and use in source and binary forms, with or 11 * without modification, are permitted provided that the following 12 * conditions are met: 13 * 14 * - Redistributions of source code must retain the above 15 * copyright notice, this list of conditions and the following 16 * disclaimer. 17 * 18 * - Redistributions in binary form must reproduce the above 19 * copyright notice, this list of conditions and the following 20 * disclaimer in the documentation and /or other materials 21 * provided with the distribution. 22 * 23 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, 24 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF 25 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND 26 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS 27 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN 28 * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN 29 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 30 * SOFTWARE. 31 */ 32 33 #include <linux/etherdevice.h> 34 #include <linux/crc32.h> 35 #include <linux/vmalloc.h> 36 #include <linux/qed/qed_iov_if.h> 37 #include "qed_cxt.h" 38 #include "qed_hsi.h" 39 #include "qed_hw.h" 40 #include "qed_init_ops.h" 41 #include "qed_int.h" 42 #include "qed_mcp.h" 43 #include "qed_reg_addr.h" 44 #include "qed_sp.h" 45 #include "qed_sriov.h" 46 #include "qed_vf.h" 47 static int qed_sriov_eqe_event(struct qed_hwfn *p_hwfn, 48 u8 opcode, 49 __le16 echo, 50 union event_ring_data *data, u8 fw_return_code); 51 static int qed_iov_bulletin_set_mac(struct qed_hwfn *p_hwfn, u8 *mac, int vfid); 52 53 static u8 qed_vf_calculate_legacy(struct qed_vf_info *p_vf) 54 { 55 u8 legacy = 0; 56 57 if (p_vf->acquire.vfdev_info.eth_fp_hsi_minor == 58 ETH_HSI_VER_NO_PKT_LEN_TUNN) 59 legacy |= QED_QCID_LEGACY_VF_RX_PROD; 60 61 if (!(p_vf->acquire.vfdev_info.capabilities & 62 VFPF_ACQUIRE_CAP_QUEUE_QIDS)) 63 legacy |= QED_QCID_LEGACY_VF_CID; 64 65 return legacy; 66 } 67 68 /* IOV ramrods */ 69 static int qed_sp_vf_start(struct qed_hwfn *p_hwfn, struct qed_vf_info *p_vf) 70 { 71 struct vf_start_ramrod_data *p_ramrod = NULL; 72 struct qed_spq_entry *p_ent = NULL; 73 struct qed_sp_init_data init_data; 74 int rc = -EINVAL; 75 u8 fp_minor; 76 77 /* Get SPQ entry */ 78 memset(&init_data, 0, sizeof(init_data)); 79 init_data.cid = qed_spq_get_cid(p_hwfn); 80 init_data.opaque_fid = p_vf->opaque_fid; 81 init_data.comp_mode = QED_SPQ_MODE_EBLOCK; 82 83 rc = qed_sp_init_request(p_hwfn, &p_ent, 84 COMMON_RAMROD_VF_START, 85 PROTOCOLID_COMMON, &init_data); 86 if (rc) 87 return rc; 88 89 p_ramrod = &p_ent->ramrod.vf_start; 90 91 p_ramrod->vf_id = GET_FIELD(p_vf->concrete_fid, PXP_CONCRETE_FID_VFID); 92 p_ramrod->opaque_fid = cpu_to_le16(p_vf->opaque_fid); 93 94 switch (p_hwfn->hw_info.personality) { 95 case QED_PCI_ETH: 96 p_ramrod->personality = PERSONALITY_ETH; 97 break; 98 case QED_PCI_ETH_ROCE: 99 p_ramrod->personality = PERSONALITY_RDMA_AND_ETH; 100 break; 101 default: 102 DP_NOTICE(p_hwfn, "Unknown VF personality %d\n", 103 p_hwfn->hw_info.personality); 104 return -EINVAL; 105 } 106 107 fp_minor = p_vf->acquire.vfdev_info.eth_fp_hsi_minor; 108 if (fp_minor > ETH_HSI_VER_MINOR && 109 fp_minor != ETH_HSI_VER_NO_PKT_LEN_TUNN) { 110 DP_VERBOSE(p_hwfn, 111 QED_MSG_IOV, 112 "VF [%d] - Requested fp hsi %02x.%02x which is slightly newer than PF's %02x.%02x; Configuring PFs version\n", 113 p_vf->abs_vf_id, 114 ETH_HSI_VER_MAJOR, 115 fp_minor, ETH_HSI_VER_MAJOR, ETH_HSI_VER_MINOR); 116 fp_minor = ETH_HSI_VER_MINOR; 117 } 118 119 p_ramrod->hsi_fp_ver.major_ver_arr[ETH_VER_KEY] = ETH_HSI_VER_MAJOR; 120 p_ramrod->hsi_fp_ver.minor_ver_arr[ETH_VER_KEY] = fp_minor; 121 122 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 123 "VF[%d] - Starting using HSI %02x.%02x\n", 124 p_vf->abs_vf_id, ETH_HSI_VER_MAJOR, fp_minor); 125 126 return qed_spq_post(p_hwfn, p_ent, NULL); 127 } 128 129 static int qed_sp_vf_stop(struct qed_hwfn *p_hwfn, 130 u32 concrete_vfid, u16 opaque_vfid) 131 { 132 struct vf_stop_ramrod_data *p_ramrod = NULL; 133 struct qed_spq_entry *p_ent = NULL; 134 struct qed_sp_init_data init_data; 135 int rc = -EINVAL; 136 137 /* Get SPQ entry */ 138 memset(&init_data, 0, sizeof(init_data)); 139 init_data.cid = qed_spq_get_cid(p_hwfn); 140 init_data.opaque_fid = opaque_vfid; 141 init_data.comp_mode = QED_SPQ_MODE_EBLOCK; 142 143 rc = qed_sp_init_request(p_hwfn, &p_ent, 144 COMMON_RAMROD_VF_STOP, 145 PROTOCOLID_COMMON, &init_data); 146 if (rc) 147 return rc; 148 149 p_ramrod = &p_ent->ramrod.vf_stop; 150 151 p_ramrod->vf_id = GET_FIELD(concrete_vfid, PXP_CONCRETE_FID_VFID); 152 153 return qed_spq_post(p_hwfn, p_ent, NULL); 154 } 155 156 bool qed_iov_is_valid_vfid(struct qed_hwfn *p_hwfn, 157 int rel_vf_id, 158 bool b_enabled_only, bool b_non_malicious) 159 { 160 if (!p_hwfn->pf_iov_info) { 161 DP_NOTICE(p_hwfn->cdev, "No iov info\n"); 162 return false; 163 } 164 165 if ((rel_vf_id >= p_hwfn->cdev->p_iov_info->total_vfs) || 166 (rel_vf_id < 0)) 167 return false; 168 169 if ((!p_hwfn->pf_iov_info->vfs_array[rel_vf_id].b_init) && 170 b_enabled_only) 171 return false; 172 173 if ((p_hwfn->pf_iov_info->vfs_array[rel_vf_id].b_malicious) && 174 b_non_malicious) 175 return false; 176 177 return true; 178 } 179 180 static struct qed_vf_info *qed_iov_get_vf_info(struct qed_hwfn *p_hwfn, 181 u16 relative_vf_id, 182 bool b_enabled_only) 183 { 184 struct qed_vf_info *vf = NULL; 185 186 if (!p_hwfn->pf_iov_info) { 187 DP_NOTICE(p_hwfn->cdev, "No iov info\n"); 188 return NULL; 189 } 190 191 if (qed_iov_is_valid_vfid(p_hwfn, relative_vf_id, 192 b_enabled_only, false)) 193 vf = &p_hwfn->pf_iov_info->vfs_array[relative_vf_id]; 194 else 195 DP_ERR(p_hwfn, "qed_iov_get_vf_info: VF[%d] is not enabled\n", 196 relative_vf_id); 197 198 return vf; 199 } 200 201 static struct qed_queue_cid * 202 qed_iov_get_vf_rx_queue_cid(struct qed_vf_queue *p_queue) 203 { 204 int i; 205 206 for (i = 0; i < MAX_QUEUES_PER_QZONE; i++) { 207 if (p_queue->cids[i].p_cid && !p_queue->cids[i].b_is_tx) 208 return p_queue->cids[i].p_cid; 209 } 210 211 return NULL; 212 } 213 214 enum qed_iov_validate_q_mode { 215 QED_IOV_VALIDATE_Q_NA, 216 QED_IOV_VALIDATE_Q_ENABLE, 217 QED_IOV_VALIDATE_Q_DISABLE, 218 }; 219 220 static bool qed_iov_validate_queue_mode(struct qed_hwfn *p_hwfn, 221 struct qed_vf_info *p_vf, 222 u16 qid, 223 enum qed_iov_validate_q_mode mode, 224 bool b_is_tx) 225 { 226 int i; 227 228 if (mode == QED_IOV_VALIDATE_Q_NA) 229 return true; 230 231 for (i = 0; i < MAX_QUEUES_PER_QZONE; i++) { 232 struct qed_vf_queue_cid *p_qcid; 233 234 p_qcid = &p_vf->vf_queues[qid].cids[i]; 235 236 if (!p_qcid->p_cid) 237 continue; 238 239 if (p_qcid->b_is_tx != b_is_tx) 240 continue; 241 242 return mode == QED_IOV_VALIDATE_Q_ENABLE; 243 } 244 245 /* In case we haven't found any valid cid, then its disabled */ 246 return mode == QED_IOV_VALIDATE_Q_DISABLE; 247 } 248 249 static bool qed_iov_validate_rxq(struct qed_hwfn *p_hwfn, 250 struct qed_vf_info *p_vf, 251 u16 rx_qid, 252 enum qed_iov_validate_q_mode mode) 253 { 254 if (rx_qid >= p_vf->num_rxqs) { 255 DP_VERBOSE(p_hwfn, 256 QED_MSG_IOV, 257 "VF[0x%02x] - can't touch Rx queue[%04x]; Only 0x%04x are allocated\n", 258 p_vf->abs_vf_id, rx_qid, p_vf->num_rxqs); 259 return false; 260 } 261 262 return qed_iov_validate_queue_mode(p_hwfn, p_vf, rx_qid, mode, false); 263 } 264 265 static bool qed_iov_validate_txq(struct qed_hwfn *p_hwfn, 266 struct qed_vf_info *p_vf, 267 u16 tx_qid, 268 enum qed_iov_validate_q_mode mode) 269 { 270 if (tx_qid >= p_vf->num_txqs) { 271 DP_VERBOSE(p_hwfn, 272 QED_MSG_IOV, 273 "VF[0x%02x] - can't touch Tx queue[%04x]; Only 0x%04x are allocated\n", 274 p_vf->abs_vf_id, tx_qid, p_vf->num_txqs); 275 return false; 276 } 277 278 return qed_iov_validate_queue_mode(p_hwfn, p_vf, tx_qid, mode, true); 279 } 280 281 static bool qed_iov_validate_sb(struct qed_hwfn *p_hwfn, 282 struct qed_vf_info *p_vf, u16 sb_idx) 283 { 284 int i; 285 286 for (i = 0; i < p_vf->num_sbs; i++) 287 if (p_vf->igu_sbs[i] == sb_idx) 288 return true; 289 290 DP_VERBOSE(p_hwfn, 291 QED_MSG_IOV, 292 "VF[0%02x] - tried using sb_idx %04x which doesn't exist as one of its 0x%02x SBs\n", 293 p_vf->abs_vf_id, sb_idx, p_vf->num_sbs); 294 295 return false; 296 } 297 298 static bool qed_iov_validate_active_rxq(struct qed_hwfn *p_hwfn, 299 struct qed_vf_info *p_vf) 300 { 301 u8 i; 302 303 for (i = 0; i < p_vf->num_rxqs; i++) 304 if (qed_iov_validate_queue_mode(p_hwfn, p_vf, i, 305 QED_IOV_VALIDATE_Q_ENABLE, 306 false)) 307 return true; 308 309 return false; 310 } 311 312 static bool qed_iov_validate_active_txq(struct qed_hwfn *p_hwfn, 313 struct qed_vf_info *p_vf) 314 { 315 u8 i; 316 317 for (i = 0; i < p_vf->num_txqs; i++) 318 if (qed_iov_validate_queue_mode(p_hwfn, p_vf, i, 319 QED_IOV_VALIDATE_Q_ENABLE, 320 true)) 321 return true; 322 323 return false; 324 } 325 326 static int qed_iov_post_vf_bulletin(struct qed_hwfn *p_hwfn, 327 int vfid, struct qed_ptt *p_ptt) 328 { 329 struct qed_bulletin_content *p_bulletin; 330 int crc_size = sizeof(p_bulletin->crc); 331 struct qed_dmae_params params; 332 struct qed_vf_info *p_vf; 333 334 p_vf = qed_iov_get_vf_info(p_hwfn, (u16) vfid, true); 335 if (!p_vf) 336 return -EINVAL; 337 338 if (!p_vf->vf_bulletin) 339 return -EINVAL; 340 341 p_bulletin = p_vf->bulletin.p_virt; 342 343 /* Increment bulletin board version and compute crc */ 344 p_bulletin->version++; 345 p_bulletin->crc = crc32(0, (u8 *)p_bulletin + crc_size, 346 p_vf->bulletin.size - crc_size); 347 348 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 349 "Posting Bulletin 0x%08x to VF[%d] (CRC 0x%08x)\n", 350 p_bulletin->version, p_vf->relative_vf_id, p_bulletin->crc); 351 352 /* propagate bulletin board via dmae to vm memory */ 353 memset(¶ms, 0, sizeof(params)); 354 params.flags = QED_DMAE_FLAG_VF_DST; 355 params.dst_vfid = p_vf->abs_vf_id; 356 return qed_dmae_host2host(p_hwfn, p_ptt, p_vf->bulletin.phys, 357 p_vf->vf_bulletin, p_vf->bulletin.size / 4, 358 ¶ms); 359 } 360 361 static int qed_iov_pci_cfg_info(struct qed_dev *cdev) 362 { 363 struct qed_hw_sriov_info *iov = cdev->p_iov_info; 364 int pos = iov->pos; 365 366 DP_VERBOSE(cdev, QED_MSG_IOV, "sriov ext pos %d\n", pos); 367 pci_read_config_word(cdev->pdev, pos + PCI_SRIOV_CTRL, &iov->ctrl); 368 369 pci_read_config_word(cdev->pdev, 370 pos + PCI_SRIOV_TOTAL_VF, &iov->total_vfs); 371 pci_read_config_word(cdev->pdev, 372 pos + PCI_SRIOV_INITIAL_VF, &iov->initial_vfs); 373 374 pci_read_config_word(cdev->pdev, pos + PCI_SRIOV_NUM_VF, &iov->num_vfs); 375 if (iov->num_vfs) { 376 DP_VERBOSE(cdev, 377 QED_MSG_IOV, 378 "Number of VFs are already set to non-zero value. Ignoring PCI configuration value\n"); 379 iov->num_vfs = 0; 380 } 381 382 pci_read_config_word(cdev->pdev, 383 pos + PCI_SRIOV_VF_OFFSET, &iov->offset); 384 385 pci_read_config_word(cdev->pdev, 386 pos + PCI_SRIOV_VF_STRIDE, &iov->stride); 387 388 pci_read_config_word(cdev->pdev, 389 pos + PCI_SRIOV_VF_DID, &iov->vf_device_id); 390 391 pci_read_config_dword(cdev->pdev, 392 pos + PCI_SRIOV_SUP_PGSIZE, &iov->pgsz); 393 394 pci_read_config_dword(cdev->pdev, pos + PCI_SRIOV_CAP, &iov->cap); 395 396 pci_read_config_byte(cdev->pdev, pos + PCI_SRIOV_FUNC_LINK, &iov->link); 397 398 DP_VERBOSE(cdev, 399 QED_MSG_IOV, 400 "IOV info: nres %d, cap 0x%x, ctrl 0x%x, total %d, initial %d, num vfs %d, offset %d, stride %d, page size 0x%x\n", 401 iov->nres, 402 iov->cap, 403 iov->ctrl, 404 iov->total_vfs, 405 iov->initial_vfs, 406 iov->nr_virtfn, iov->offset, iov->stride, iov->pgsz); 407 408 /* Some sanity checks */ 409 if (iov->num_vfs > NUM_OF_VFS(cdev) || 410 iov->total_vfs > NUM_OF_VFS(cdev)) { 411 /* This can happen only due to a bug. In this case we set 412 * num_vfs to zero to avoid memory corruption in the code that 413 * assumes max number of vfs 414 */ 415 DP_NOTICE(cdev, 416 "IOV: Unexpected number of vfs set: %d setting num_vf to zero\n", 417 iov->num_vfs); 418 419 iov->num_vfs = 0; 420 iov->total_vfs = 0; 421 } 422 423 return 0; 424 } 425 426 static void qed_iov_setup_vfdb(struct qed_hwfn *p_hwfn) 427 { 428 struct qed_hw_sriov_info *p_iov = p_hwfn->cdev->p_iov_info; 429 struct qed_pf_iov *p_iov_info = p_hwfn->pf_iov_info; 430 struct qed_bulletin_content *p_bulletin_virt; 431 dma_addr_t req_p, rply_p, bulletin_p; 432 union pfvf_tlvs *p_reply_virt_addr; 433 union vfpf_tlvs *p_req_virt_addr; 434 u8 idx = 0; 435 436 memset(p_iov_info->vfs_array, 0, sizeof(p_iov_info->vfs_array)); 437 438 p_req_virt_addr = p_iov_info->mbx_msg_virt_addr; 439 req_p = p_iov_info->mbx_msg_phys_addr; 440 p_reply_virt_addr = p_iov_info->mbx_reply_virt_addr; 441 rply_p = p_iov_info->mbx_reply_phys_addr; 442 p_bulletin_virt = p_iov_info->p_bulletins; 443 bulletin_p = p_iov_info->bulletins_phys; 444 if (!p_req_virt_addr || !p_reply_virt_addr || !p_bulletin_virt) { 445 DP_ERR(p_hwfn, 446 "qed_iov_setup_vfdb called without allocating mem first\n"); 447 return; 448 } 449 450 for (idx = 0; idx < p_iov->total_vfs; idx++) { 451 struct qed_vf_info *vf = &p_iov_info->vfs_array[idx]; 452 u32 concrete; 453 454 vf->vf_mbx.req_virt = p_req_virt_addr + idx; 455 vf->vf_mbx.req_phys = req_p + idx * sizeof(union vfpf_tlvs); 456 vf->vf_mbx.reply_virt = p_reply_virt_addr + idx; 457 vf->vf_mbx.reply_phys = rply_p + idx * sizeof(union pfvf_tlvs); 458 459 vf->state = VF_STOPPED; 460 vf->b_init = false; 461 462 vf->bulletin.phys = idx * 463 sizeof(struct qed_bulletin_content) + 464 bulletin_p; 465 vf->bulletin.p_virt = p_bulletin_virt + idx; 466 vf->bulletin.size = sizeof(struct qed_bulletin_content); 467 468 vf->relative_vf_id = idx; 469 vf->abs_vf_id = idx + p_iov->first_vf_in_pf; 470 concrete = qed_vfid_to_concrete(p_hwfn, vf->abs_vf_id); 471 vf->concrete_fid = concrete; 472 vf->opaque_fid = (p_hwfn->hw_info.opaque_fid & 0xff) | 473 (vf->abs_vf_id << 8); 474 vf->vport_id = idx + 1; 475 476 vf->num_mac_filters = QED_ETH_VF_NUM_MAC_FILTERS; 477 vf->num_vlan_filters = QED_ETH_VF_NUM_VLAN_FILTERS; 478 } 479 } 480 481 static int qed_iov_allocate_vfdb(struct qed_hwfn *p_hwfn) 482 { 483 struct qed_pf_iov *p_iov_info = p_hwfn->pf_iov_info; 484 void **p_v_addr; 485 u16 num_vfs = 0; 486 487 num_vfs = p_hwfn->cdev->p_iov_info->total_vfs; 488 489 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 490 "qed_iov_allocate_vfdb for %d VFs\n", num_vfs); 491 492 /* Allocate PF Mailbox buffer (per-VF) */ 493 p_iov_info->mbx_msg_size = sizeof(union vfpf_tlvs) * num_vfs; 494 p_v_addr = &p_iov_info->mbx_msg_virt_addr; 495 *p_v_addr = dma_alloc_coherent(&p_hwfn->cdev->pdev->dev, 496 p_iov_info->mbx_msg_size, 497 &p_iov_info->mbx_msg_phys_addr, 498 GFP_KERNEL); 499 if (!*p_v_addr) 500 return -ENOMEM; 501 502 /* Allocate PF Mailbox Reply buffer (per-VF) */ 503 p_iov_info->mbx_reply_size = sizeof(union pfvf_tlvs) * num_vfs; 504 p_v_addr = &p_iov_info->mbx_reply_virt_addr; 505 *p_v_addr = dma_alloc_coherent(&p_hwfn->cdev->pdev->dev, 506 p_iov_info->mbx_reply_size, 507 &p_iov_info->mbx_reply_phys_addr, 508 GFP_KERNEL); 509 if (!*p_v_addr) 510 return -ENOMEM; 511 512 p_iov_info->bulletins_size = sizeof(struct qed_bulletin_content) * 513 num_vfs; 514 p_v_addr = &p_iov_info->p_bulletins; 515 *p_v_addr = dma_alloc_coherent(&p_hwfn->cdev->pdev->dev, 516 p_iov_info->bulletins_size, 517 &p_iov_info->bulletins_phys, 518 GFP_KERNEL); 519 if (!*p_v_addr) 520 return -ENOMEM; 521 522 DP_VERBOSE(p_hwfn, 523 QED_MSG_IOV, 524 "PF's Requests mailbox [%p virt 0x%llx phys], Response mailbox [%p virt 0x%llx phys] Bulletins [%p virt 0x%llx phys]\n", 525 p_iov_info->mbx_msg_virt_addr, 526 (u64) p_iov_info->mbx_msg_phys_addr, 527 p_iov_info->mbx_reply_virt_addr, 528 (u64) p_iov_info->mbx_reply_phys_addr, 529 p_iov_info->p_bulletins, (u64) p_iov_info->bulletins_phys); 530 531 return 0; 532 } 533 534 static void qed_iov_free_vfdb(struct qed_hwfn *p_hwfn) 535 { 536 struct qed_pf_iov *p_iov_info = p_hwfn->pf_iov_info; 537 538 if (p_hwfn->pf_iov_info->mbx_msg_virt_addr) 539 dma_free_coherent(&p_hwfn->cdev->pdev->dev, 540 p_iov_info->mbx_msg_size, 541 p_iov_info->mbx_msg_virt_addr, 542 p_iov_info->mbx_msg_phys_addr); 543 544 if (p_hwfn->pf_iov_info->mbx_reply_virt_addr) 545 dma_free_coherent(&p_hwfn->cdev->pdev->dev, 546 p_iov_info->mbx_reply_size, 547 p_iov_info->mbx_reply_virt_addr, 548 p_iov_info->mbx_reply_phys_addr); 549 550 if (p_iov_info->p_bulletins) 551 dma_free_coherent(&p_hwfn->cdev->pdev->dev, 552 p_iov_info->bulletins_size, 553 p_iov_info->p_bulletins, 554 p_iov_info->bulletins_phys); 555 } 556 557 int qed_iov_alloc(struct qed_hwfn *p_hwfn) 558 { 559 struct qed_pf_iov *p_sriov; 560 561 if (!IS_PF_SRIOV(p_hwfn)) { 562 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 563 "No SR-IOV - no need for IOV db\n"); 564 return 0; 565 } 566 567 p_sriov = kzalloc(sizeof(*p_sriov), GFP_KERNEL); 568 if (!p_sriov) 569 return -ENOMEM; 570 571 p_hwfn->pf_iov_info = p_sriov; 572 573 qed_spq_register_async_cb(p_hwfn, PROTOCOLID_COMMON, 574 qed_sriov_eqe_event); 575 576 return qed_iov_allocate_vfdb(p_hwfn); 577 } 578 579 void qed_iov_setup(struct qed_hwfn *p_hwfn) 580 { 581 if (!IS_PF_SRIOV(p_hwfn) || !IS_PF_SRIOV_ALLOC(p_hwfn)) 582 return; 583 584 qed_iov_setup_vfdb(p_hwfn); 585 } 586 587 void qed_iov_free(struct qed_hwfn *p_hwfn) 588 { 589 qed_spq_unregister_async_cb(p_hwfn, PROTOCOLID_COMMON); 590 591 if (IS_PF_SRIOV_ALLOC(p_hwfn)) { 592 qed_iov_free_vfdb(p_hwfn); 593 kfree(p_hwfn->pf_iov_info); 594 } 595 } 596 597 void qed_iov_free_hw_info(struct qed_dev *cdev) 598 { 599 kfree(cdev->p_iov_info); 600 cdev->p_iov_info = NULL; 601 } 602 603 int qed_iov_hw_info(struct qed_hwfn *p_hwfn) 604 { 605 struct qed_dev *cdev = p_hwfn->cdev; 606 int pos; 607 int rc; 608 609 if (IS_VF(p_hwfn->cdev)) 610 return 0; 611 612 /* Learn the PCI configuration */ 613 pos = pci_find_ext_capability(p_hwfn->cdev->pdev, 614 PCI_EXT_CAP_ID_SRIOV); 615 if (!pos) { 616 DP_VERBOSE(p_hwfn, QED_MSG_IOV, "No PCIe IOV support\n"); 617 return 0; 618 } 619 620 /* Allocate a new struct for IOV information */ 621 cdev->p_iov_info = kzalloc(sizeof(*cdev->p_iov_info), GFP_KERNEL); 622 if (!cdev->p_iov_info) 623 return -ENOMEM; 624 625 cdev->p_iov_info->pos = pos; 626 627 rc = qed_iov_pci_cfg_info(cdev); 628 if (rc) 629 return rc; 630 631 /* We want PF IOV to be synonemous with the existance of p_iov_info; 632 * In case the capability is published but there are no VFs, simply 633 * de-allocate the struct. 634 */ 635 if (!cdev->p_iov_info->total_vfs) { 636 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 637 "IOV capabilities, but no VFs are published\n"); 638 kfree(cdev->p_iov_info); 639 cdev->p_iov_info = NULL; 640 return 0; 641 } 642 643 /* First VF index based on offset is tricky: 644 * - If ARI is supported [likely], offset - (16 - pf_id) would 645 * provide the number for eng0. 2nd engine Vfs would begin 646 * after the first engine's VFs. 647 * - If !ARI, VFs would start on next device. 648 * so offset - (256 - pf_id) would provide the number. 649 * Utilize the fact that (256 - pf_id) is achieved only by later 650 * to differentiate between the two. 651 */ 652 653 if (p_hwfn->cdev->p_iov_info->offset < (256 - p_hwfn->abs_pf_id)) { 654 u32 first = p_hwfn->cdev->p_iov_info->offset + 655 p_hwfn->abs_pf_id - 16; 656 657 cdev->p_iov_info->first_vf_in_pf = first; 658 659 if (QED_PATH_ID(p_hwfn)) 660 cdev->p_iov_info->first_vf_in_pf -= MAX_NUM_VFS_BB; 661 } else { 662 u32 first = p_hwfn->cdev->p_iov_info->offset + 663 p_hwfn->abs_pf_id - 256; 664 665 cdev->p_iov_info->first_vf_in_pf = first; 666 } 667 668 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 669 "First VF in hwfn 0x%08x\n", 670 cdev->p_iov_info->first_vf_in_pf); 671 672 return 0; 673 } 674 675 bool _qed_iov_pf_sanity_check(struct qed_hwfn *p_hwfn, 676 int vfid, bool b_fail_malicious) 677 { 678 /* Check PF supports sriov */ 679 if (IS_VF(p_hwfn->cdev) || !IS_QED_SRIOV(p_hwfn->cdev) || 680 !IS_PF_SRIOV_ALLOC(p_hwfn)) 681 return false; 682 683 /* Check VF validity */ 684 if (!qed_iov_is_valid_vfid(p_hwfn, vfid, true, b_fail_malicious)) 685 return false; 686 687 return true; 688 } 689 690 bool qed_iov_pf_sanity_check(struct qed_hwfn *p_hwfn, int vfid) 691 { 692 return _qed_iov_pf_sanity_check(p_hwfn, vfid, true); 693 } 694 695 static void qed_iov_set_vf_to_disable(struct qed_dev *cdev, 696 u16 rel_vf_id, u8 to_disable) 697 { 698 struct qed_vf_info *vf; 699 int i; 700 701 for_each_hwfn(cdev, i) { 702 struct qed_hwfn *p_hwfn = &cdev->hwfns[i]; 703 704 vf = qed_iov_get_vf_info(p_hwfn, rel_vf_id, false); 705 if (!vf) 706 continue; 707 708 vf->to_disable = to_disable; 709 } 710 } 711 712 static void qed_iov_set_vfs_to_disable(struct qed_dev *cdev, u8 to_disable) 713 { 714 u16 i; 715 716 if (!IS_QED_SRIOV(cdev)) 717 return; 718 719 for (i = 0; i < cdev->p_iov_info->total_vfs; i++) 720 qed_iov_set_vf_to_disable(cdev, i, to_disable); 721 } 722 723 static void qed_iov_vf_pglue_clear_err(struct qed_hwfn *p_hwfn, 724 struct qed_ptt *p_ptt, u8 abs_vfid) 725 { 726 qed_wr(p_hwfn, p_ptt, 727 PGLUE_B_REG_WAS_ERROR_VF_31_0_CLR + (abs_vfid >> 5) * 4, 728 1 << (abs_vfid & 0x1f)); 729 } 730 731 static void qed_iov_vf_igu_reset(struct qed_hwfn *p_hwfn, 732 struct qed_ptt *p_ptt, struct qed_vf_info *vf) 733 { 734 int i; 735 736 /* Set VF masks and configuration - pretend */ 737 qed_fid_pretend(p_hwfn, p_ptt, (u16) vf->concrete_fid); 738 739 qed_wr(p_hwfn, p_ptt, IGU_REG_STATISTIC_NUM_VF_MSG_SENT, 0); 740 741 /* unpretend */ 742 qed_fid_pretend(p_hwfn, p_ptt, (u16) p_hwfn->hw_info.concrete_fid); 743 744 /* iterate over all queues, clear sb consumer */ 745 for (i = 0; i < vf->num_sbs; i++) 746 qed_int_igu_init_pure_rt_single(p_hwfn, p_ptt, 747 vf->igu_sbs[i], 748 vf->opaque_fid, true); 749 } 750 751 static void qed_iov_vf_igu_set_int(struct qed_hwfn *p_hwfn, 752 struct qed_ptt *p_ptt, 753 struct qed_vf_info *vf, bool enable) 754 { 755 u32 igu_vf_conf; 756 757 qed_fid_pretend(p_hwfn, p_ptt, (u16) vf->concrete_fid); 758 759 igu_vf_conf = qed_rd(p_hwfn, p_ptt, IGU_REG_VF_CONFIGURATION); 760 761 if (enable) 762 igu_vf_conf |= IGU_VF_CONF_MSI_MSIX_EN; 763 else 764 igu_vf_conf &= ~IGU_VF_CONF_MSI_MSIX_EN; 765 766 qed_wr(p_hwfn, p_ptt, IGU_REG_VF_CONFIGURATION, igu_vf_conf); 767 768 /* unpretend */ 769 qed_fid_pretend(p_hwfn, p_ptt, (u16) p_hwfn->hw_info.concrete_fid); 770 } 771 772 static int 773 qed_iov_enable_vf_access_msix(struct qed_hwfn *p_hwfn, 774 struct qed_ptt *p_ptt, u8 abs_vf_id, u8 num_sbs) 775 { 776 u8 current_max = 0; 777 int i; 778 779 /* For AH onward, configuration is per-PF. Find maximum of all 780 * the currently enabled child VFs, and set the number to be that. 781 */ 782 if (!QED_IS_BB(p_hwfn->cdev)) { 783 qed_for_each_vf(p_hwfn, i) { 784 struct qed_vf_info *p_vf; 785 786 p_vf = qed_iov_get_vf_info(p_hwfn, (u16)i, true); 787 if (!p_vf) 788 continue; 789 790 current_max = max_t(u8, current_max, p_vf->num_sbs); 791 } 792 } 793 794 if (num_sbs > current_max) 795 return qed_mcp_config_vf_msix(p_hwfn, p_ptt, 796 abs_vf_id, num_sbs); 797 798 return 0; 799 } 800 801 static int qed_iov_enable_vf_access(struct qed_hwfn *p_hwfn, 802 struct qed_ptt *p_ptt, 803 struct qed_vf_info *vf) 804 { 805 u32 igu_vf_conf = IGU_VF_CONF_FUNC_EN; 806 int rc; 807 808 /* It's possible VF was previously considered malicious - 809 * clear the indication even if we're only going to disable VF. 810 */ 811 vf->b_malicious = false; 812 813 if (vf->to_disable) 814 return 0; 815 816 DP_VERBOSE(p_hwfn, 817 QED_MSG_IOV, 818 "Enable internal access for vf %x [abs %x]\n", 819 vf->abs_vf_id, QED_VF_ABS_ID(p_hwfn, vf)); 820 821 qed_iov_vf_pglue_clear_err(p_hwfn, p_ptt, QED_VF_ABS_ID(p_hwfn, vf)); 822 823 qed_iov_vf_igu_reset(p_hwfn, p_ptt, vf); 824 825 rc = qed_iov_enable_vf_access_msix(p_hwfn, p_ptt, 826 vf->abs_vf_id, vf->num_sbs); 827 if (rc) 828 return rc; 829 830 qed_fid_pretend(p_hwfn, p_ptt, (u16) vf->concrete_fid); 831 832 SET_FIELD(igu_vf_conf, IGU_VF_CONF_PARENT, p_hwfn->rel_pf_id); 833 STORE_RT_REG(p_hwfn, IGU_REG_VF_CONFIGURATION_RT_OFFSET, igu_vf_conf); 834 835 qed_init_run(p_hwfn, p_ptt, PHASE_VF, vf->abs_vf_id, 836 p_hwfn->hw_info.hw_mode); 837 838 /* unpretend */ 839 qed_fid_pretend(p_hwfn, p_ptt, (u16) p_hwfn->hw_info.concrete_fid); 840 841 vf->state = VF_FREE; 842 843 return rc; 844 } 845 846 /** 847 * @brief qed_iov_config_perm_table - configure the permission 848 * zone table. 849 * In E4, queue zone permission table size is 320x9. There 850 * are 320 VF queues for single engine device (256 for dual 851 * engine device), and each entry has the following format: 852 * {Valid, VF[7:0]} 853 * @param p_hwfn 854 * @param p_ptt 855 * @param vf 856 * @param enable 857 */ 858 static void qed_iov_config_perm_table(struct qed_hwfn *p_hwfn, 859 struct qed_ptt *p_ptt, 860 struct qed_vf_info *vf, u8 enable) 861 { 862 u32 reg_addr, val; 863 u16 qzone_id = 0; 864 int qid; 865 866 for (qid = 0; qid < vf->num_rxqs; qid++) { 867 qed_fw_l2_queue(p_hwfn, vf->vf_queues[qid].fw_rx_qid, 868 &qzone_id); 869 870 reg_addr = PSWHST_REG_ZONE_PERMISSION_TABLE + qzone_id * 4; 871 val = enable ? (vf->abs_vf_id | BIT(8)) : 0; 872 qed_wr(p_hwfn, p_ptt, reg_addr, val); 873 } 874 } 875 876 static void qed_iov_enable_vf_traffic(struct qed_hwfn *p_hwfn, 877 struct qed_ptt *p_ptt, 878 struct qed_vf_info *vf) 879 { 880 /* Reset vf in IGU - interrupts are still disabled */ 881 qed_iov_vf_igu_reset(p_hwfn, p_ptt, vf); 882 883 qed_iov_vf_igu_set_int(p_hwfn, p_ptt, vf, 1); 884 885 /* Permission Table */ 886 qed_iov_config_perm_table(p_hwfn, p_ptt, vf, true); 887 } 888 889 static u8 qed_iov_alloc_vf_igu_sbs(struct qed_hwfn *p_hwfn, 890 struct qed_ptt *p_ptt, 891 struct qed_vf_info *vf, u16 num_rx_queues) 892 { 893 struct qed_igu_block *p_block; 894 struct cau_sb_entry sb_entry; 895 int qid = 0; 896 u32 val = 0; 897 898 if (num_rx_queues > p_hwfn->hw_info.p_igu_info->usage.free_cnt_iov) 899 num_rx_queues = p_hwfn->hw_info.p_igu_info->usage.free_cnt_iov; 900 p_hwfn->hw_info.p_igu_info->usage.free_cnt_iov -= num_rx_queues; 901 902 SET_FIELD(val, IGU_MAPPING_LINE_FUNCTION_NUMBER, vf->abs_vf_id); 903 SET_FIELD(val, IGU_MAPPING_LINE_VALID, 1); 904 SET_FIELD(val, IGU_MAPPING_LINE_PF_VALID, 0); 905 906 for (qid = 0; qid < num_rx_queues; qid++) { 907 p_block = qed_get_igu_free_sb(p_hwfn, false); 908 vf->igu_sbs[qid] = p_block->igu_sb_id; 909 p_block->status &= ~QED_IGU_STATUS_FREE; 910 SET_FIELD(val, IGU_MAPPING_LINE_VECTOR_NUMBER, qid); 911 912 qed_wr(p_hwfn, p_ptt, 913 IGU_REG_MAPPING_MEMORY + 914 sizeof(u32) * p_block->igu_sb_id, val); 915 916 /* Configure igu sb in CAU which were marked valid */ 917 qed_init_cau_sb_entry(p_hwfn, &sb_entry, 918 p_hwfn->rel_pf_id, vf->abs_vf_id, 1); 919 qed_dmae_host2grc(p_hwfn, p_ptt, 920 (u64)(uintptr_t)&sb_entry, 921 CAU_REG_SB_VAR_MEMORY + 922 p_block->igu_sb_id * sizeof(u64), 2, 0); 923 } 924 925 vf->num_sbs = (u8) num_rx_queues; 926 927 return vf->num_sbs; 928 } 929 930 static void qed_iov_free_vf_igu_sbs(struct qed_hwfn *p_hwfn, 931 struct qed_ptt *p_ptt, 932 struct qed_vf_info *vf) 933 { 934 struct qed_igu_info *p_info = p_hwfn->hw_info.p_igu_info; 935 int idx, igu_id; 936 u32 addr, val; 937 938 /* Invalidate igu CAM lines and mark them as free */ 939 for (idx = 0; idx < vf->num_sbs; idx++) { 940 igu_id = vf->igu_sbs[idx]; 941 addr = IGU_REG_MAPPING_MEMORY + sizeof(u32) * igu_id; 942 943 val = qed_rd(p_hwfn, p_ptt, addr); 944 SET_FIELD(val, IGU_MAPPING_LINE_VALID, 0); 945 qed_wr(p_hwfn, p_ptt, addr, val); 946 947 p_info->entry[igu_id].status |= QED_IGU_STATUS_FREE; 948 p_hwfn->hw_info.p_igu_info->usage.free_cnt_iov++; 949 } 950 951 vf->num_sbs = 0; 952 } 953 954 static void qed_iov_set_link(struct qed_hwfn *p_hwfn, 955 u16 vfid, 956 struct qed_mcp_link_params *params, 957 struct qed_mcp_link_state *link, 958 struct qed_mcp_link_capabilities *p_caps) 959 { 960 struct qed_vf_info *p_vf = qed_iov_get_vf_info(p_hwfn, 961 vfid, 962 false); 963 struct qed_bulletin_content *p_bulletin; 964 965 if (!p_vf) 966 return; 967 968 p_bulletin = p_vf->bulletin.p_virt; 969 p_bulletin->req_autoneg = params->speed.autoneg; 970 p_bulletin->req_adv_speed = params->speed.advertised_speeds; 971 p_bulletin->req_forced_speed = params->speed.forced_speed; 972 p_bulletin->req_autoneg_pause = params->pause.autoneg; 973 p_bulletin->req_forced_rx = params->pause.forced_rx; 974 p_bulletin->req_forced_tx = params->pause.forced_tx; 975 p_bulletin->req_loopback = params->loopback_mode; 976 977 p_bulletin->link_up = link->link_up; 978 p_bulletin->speed = link->speed; 979 p_bulletin->full_duplex = link->full_duplex; 980 p_bulletin->autoneg = link->an; 981 p_bulletin->autoneg_complete = link->an_complete; 982 p_bulletin->parallel_detection = link->parallel_detection; 983 p_bulletin->pfc_enabled = link->pfc_enabled; 984 p_bulletin->partner_adv_speed = link->partner_adv_speed; 985 p_bulletin->partner_tx_flow_ctrl_en = link->partner_tx_flow_ctrl_en; 986 p_bulletin->partner_rx_flow_ctrl_en = link->partner_rx_flow_ctrl_en; 987 p_bulletin->partner_adv_pause = link->partner_adv_pause; 988 p_bulletin->sfp_tx_fault = link->sfp_tx_fault; 989 990 p_bulletin->capability_speed = p_caps->speed_capabilities; 991 } 992 993 static int qed_iov_init_hw_for_vf(struct qed_hwfn *p_hwfn, 994 struct qed_ptt *p_ptt, 995 struct qed_iov_vf_init_params *p_params) 996 { 997 struct qed_mcp_link_capabilities link_caps; 998 struct qed_mcp_link_params link_params; 999 struct qed_mcp_link_state link_state; 1000 u8 num_of_vf_avaiable_chains = 0; 1001 struct qed_vf_info *vf = NULL; 1002 u16 qid, num_irqs; 1003 int rc = 0; 1004 u32 cids; 1005 u8 i; 1006 1007 vf = qed_iov_get_vf_info(p_hwfn, p_params->rel_vf_id, false); 1008 if (!vf) { 1009 DP_ERR(p_hwfn, "qed_iov_init_hw_for_vf : vf is NULL\n"); 1010 return -EINVAL; 1011 } 1012 1013 if (vf->b_init) { 1014 DP_NOTICE(p_hwfn, "VF[%d] is already active.\n", 1015 p_params->rel_vf_id); 1016 return -EINVAL; 1017 } 1018 1019 /* Perform sanity checking on the requested queue_id */ 1020 for (i = 0; i < p_params->num_queues; i++) { 1021 u16 min_vf_qzone = FEAT_NUM(p_hwfn, QED_PF_L2_QUE); 1022 u16 max_vf_qzone = min_vf_qzone + 1023 FEAT_NUM(p_hwfn, QED_VF_L2_QUE) - 1; 1024 1025 qid = p_params->req_rx_queue[i]; 1026 if (qid < min_vf_qzone || qid > max_vf_qzone) { 1027 DP_NOTICE(p_hwfn, 1028 "Can't enable Rx qid [%04x] for VF[%d]: qids [0x%04x,...,0x%04x] available\n", 1029 qid, 1030 p_params->rel_vf_id, 1031 min_vf_qzone, max_vf_qzone); 1032 return -EINVAL; 1033 } 1034 1035 qid = p_params->req_tx_queue[i]; 1036 if (qid > max_vf_qzone) { 1037 DP_NOTICE(p_hwfn, 1038 "Can't enable Tx qid [%04x] for VF[%d]: max qid 0x%04x\n", 1039 qid, p_params->rel_vf_id, max_vf_qzone); 1040 return -EINVAL; 1041 } 1042 1043 /* If client *really* wants, Tx qid can be shared with PF */ 1044 if (qid < min_vf_qzone) 1045 DP_VERBOSE(p_hwfn, 1046 QED_MSG_IOV, 1047 "VF[%d] is using PF qid [0x%04x] for Txq[0x%02x]\n", 1048 p_params->rel_vf_id, qid, i); 1049 } 1050 1051 /* Limit number of queues according to number of CIDs */ 1052 qed_cxt_get_proto_cid_count(p_hwfn, PROTOCOLID_ETH, &cids); 1053 DP_VERBOSE(p_hwfn, 1054 QED_MSG_IOV, 1055 "VF[%d] - requesting to initialize for 0x%04x queues [0x%04x CIDs available]\n", 1056 vf->relative_vf_id, p_params->num_queues, (u16)cids); 1057 num_irqs = min_t(u16, p_params->num_queues, ((u16)cids)); 1058 1059 num_of_vf_avaiable_chains = qed_iov_alloc_vf_igu_sbs(p_hwfn, 1060 p_ptt, 1061 vf, num_irqs); 1062 if (!num_of_vf_avaiable_chains) { 1063 DP_ERR(p_hwfn, "no available igu sbs\n"); 1064 return -ENOMEM; 1065 } 1066 1067 /* Choose queue number and index ranges */ 1068 vf->num_rxqs = num_of_vf_avaiable_chains; 1069 vf->num_txqs = num_of_vf_avaiable_chains; 1070 1071 for (i = 0; i < vf->num_rxqs; i++) { 1072 struct qed_vf_queue *p_queue = &vf->vf_queues[i]; 1073 1074 p_queue->fw_rx_qid = p_params->req_rx_queue[i]; 1075 p_queue->fw_tx_qid = p_params->req_tx_queue[i]; 1076 1077 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 1078 "VF[%d] - Q[%d] SB %04x, qid [Rx %04x Tx %04x]\n", 1079 vf->relative_vf_id, i, vf->igu_sbs[i], 1080 p_queue->fw_rx_qid, p_queue->fw_tx_qid); 1081 } 1082 1083 /* Update the link configuration in bulletin */ 1084 memcpy(&link_params, qed_mcp_get_link_params(p_hwfn), 1085 sizeof(link_params)); 1086 memcpy(&link_state, qed_mcp_get_link_state(p_hwfn), sizeof(link_state)); 1087 memcpy(&link_caps, qed_mcp_get_link_capabilities(p_hwfn), 1088 sizeof(link_caps)); 1089 qed_iov_set_link(p_hwfn, p_params->rel_vf_id, 1090 &link_params, &link_state, &link_caps); 1091 1092 rc = qed_iov_enable_vf_access(p_hwfn, p_ptt, vf); 1093 if (!rc) { 1094 vf->b_init = true; 1095 1096 if (IS_LEAD_HWFN(p_hwfn)) 1097 p_hwfn->cdev->p_iov_info->num_vfs++; 1098 } 1099 1100 return rc; 1101 } 1102 1103 static int qed_iov_release_hw_for_vf(struct qed_hwfn *p_hwfn, 1104 struct qed_ptt *p_ptt, u16 rel_vf_id) 1105 { 1106 struct qed_mcp_link_capabilities caps; 1107 struct qed_mcp_link_params params; 1108 struct qed_mcp_link_state link; 1109 struct qed_vf_info *vf = NULL; 1110 1111 vf = qed_iov_get_vf_info(p_hwfn, rel_vf_id, true); 1112 if (!vf) { 1113 DP_ERR(p_hwfn, "qed_iov_release_hw_for_vf : vf is NULL\n"); 1114 return -EINVAL; 1115 } 1116 1117 if (vf->bulletin.p_virt) 1118 memset(vf->bulletin.p_virt, 0, sizeof(*vf->bulletin.p_virt)); 1119 1120 memset(&vf->p_vf_info, 0, sizeof(vf->p_vf_info)); 1121 1122 /* Get the link configuration back in bulletin so 1123 * that when VFs are re-enabled they get the actual 1124 * link configuration. 1125 */ 1126 memcpy(¶ms, qed_mcp_get_link_params(p_hwfn), sizeof(params)); 1127 memcpy(&link, qed_mcp_get_link_state(p_hwfn), sizeof(link)); 1128 memcpy(&caps, qed_mcp_get_link_capabilities(p_hwfn), sizeof(caps)); 1129 qed_iov_set_link(p_hwfn, rel_vf_id, ¶ms, &link, &caps); 1130 1131 /* Forget the VF's acquisition message */ 1132 memset(&vf->acquire, 0, sizeof(vf->acquire)); 1133 1134 /* disablng interrupts and resetting permission table was done during 1135 * vf-close, however, we could get here without going through vf_close 1136 */ 1137 /* Disable Interrupts for VF */ 1138 qed_iov_vf_igu_set_int(p_hwfn, p_ptt, vf, 0); 1139 1140 /* Reset Permission table */ 1141 qed_iov_config_perm_table(p_hwfn, p_ptt, vf, 0); 1142 1143 vf->num_rxqs = 0; 1144 vf->num_txqs = 0; 1145 qed_iov_free_vf_igu_sbs(p_hwfn, p_ptt, vf); 1146 1147 if (vf->b_init) { 1148 vf->b_init = false; 1149 1150 if (IS_LEAD_HWFN(p_hwfn)) 1151 p_hwfn->cdev->p_iov_info->num_vfs--; 1152 } 1153 1154 return 0; 1155 } 1156 1157 static bool qed_iov_tlv_supported(u16 tlvtype) 1158 { 1159 return CHANNEL_TLV_NONE < tlvtype && tlvtype < CHANNEL_TLV_MAX; 1160 } 1161 1162 /* place a given tlv on the tlv buffer, continuing current tlv list */ 1163 void *qed_add_tlv(struct qed_hwfn *p_hwfn, u8 **offset, u16 type, u16 length) 1164 { 1165 struct channel_tlv *tl = (struct channel_tlv *)*offset; 1166 1167 tl->type = type; 1168 tl->length = length; 1169 1170 /* Offset should keep pointing to next TLV (the end of the last) */ 1171 *offset += length; 1172 1173 /* Return a pointer to the start of the added tlv */ 1174 return *offset - length; 1175 } 1176 1177 /* list the types and lengths of the tlvs on the buffer */ 1178 void qed_dp_tlv_list(struct qed_hwfn *p_hwfn, void *tlvs_list) 1179 { 1180 u16 i = 1, total_length = 0; 1181 struct channel_tlv *tlv; 1182 1183 do { 1184 tlv = (struct channel_tlv *)((u8 *)tlvs_list + total_length); 1185 1186 /* output tlv */ 1187 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 1188 "TLV number %d: type %d, length %d\n", 1189 i, tlv->type, tlv->length); 1190 1191 if (tlv->type == CHANNEL_TLV_LIST_END) 1192 return; 1193 1194 /* Validate entry - protect against malicious VFs */ 1195 if (!tlv->length) { 1196 DP_NOTICE(p_hwfn, "TLV of length 0 found\n"); 1197 return; 1198 } 1199 1200 total_length += tlv->length; 1201 1202 if (total_length >= sizeof(struct tlv_buffer_size)) { 1203 DP_NOTICE(p_hwfn, "TLV ==> Buffer overflow\n"); 1204 return; 1205 } 1206 1207 i++; 1208 } while (1); 1209 } 1210 1211 static void qed_iov_send_response(struct qed_hwfn *p_hwfn, 1212 struct qed_ptt *p_ptt, 1213 struct qed_vf_info *p_vf, 1214 u16 length, u8 status) 1215 { 1216 struct qed_iov_vf_mbx *mbx = &p_vf->vf_mbx; 1217 struct qed_dmae_params params; 1218 u8 eng_vf_id; 1219 1220 mbx->reply_virt->default_resp.hdr.status = status; 1221 1222 qed_dp_tlv_list(p_hwfn, mbx->reply_virt); 1223 1224 eng_vf_id = p_vf->abs_vf_id; 1225 1226 memset(¶ms, 0, sizeof(struct qed_dmae_params)); 1227 params.flags = QED_DMAE_FLAG_VF_DST; 1228 params.dst_vfid = eng_vf_id; 1229 1230 qed_dmae_host2host(p_hwfn, p_ptt, mbx->reply_phys + sizeof(u64), 1231 mbx->req_virt->first_tlv.reply_address + 1232 sizeof(u64), 1233 (sizeof(union pfvf_tlvs) - sizeof(u64)) / 4, 1234 ¶ms); 1235 1236 /* Once PF copies the rc to the VF, the latter can continue 1237 * and send an additional message. So we have to make sure the 1238 * channel would be re-set to ready prior to that. 1239 */ 1240 REG_WR(p_hwfn, 1241 GTT_BAR0_MAP_REG_USDM_RAM + 1242 USTORM_VF_PF_CHANNEL_READY_OFFSET(eng_vf_id), 1); 1243 1244 qed_dmae_host2host(p_hwfn, p_ptt, mbx->reply_phys, 1245 mbx->req_virt->first_tlv.reply_address, 1246 sizeof(u64) / 4, ¶ms); 1247 } 1248 1249 static u16 qed_iov_vport_to_tlv(struct qed_hwfn *p_hwfn, 1250 enum qed_iov_vport_update_flag flag) 1251 { 1252 switch (flag) { 1253 case QED_IOV_VP_UPDATE_ACTIVATE: 1254 return CHANNEL_TLV_VPORT_UPDATE_ACTIVATE; 1255 case QED_IOV_VP_UPDATE_VLAN_STRIP: 1256 return CHANNEL_TLV_VPORT_UPDATE_VLAN_STRIP; 1257 case QED_IOV_VP_UPDATE_TX_SWITCH: 1258 return CHANNEL_TLV_VPORT_UPDATE_TX_SWITCH; 1259 case QED_IOV_VP_UPDATE_MCAST: 1260 return CHANNEL_TLV_VPORT_UPDATE_MCAST; 1261 case QED_IOV_VP_UPDATE_ACCEPT_PARAM: 1262 return CHANNEL_TLV_VPORT_UPDATE_ACCEPT_PARAM; 1263 case QED_IOV_VP_UPDATE_RSS: 1264 return CHANNEL_TLV_VPORT_UPDATE_RSS; 1265 case QED_IOV_VP_UPDATE_ACCEPT_ANY_VLAN: 1266 return CHANNEL_TLV_VPORT_UPDATE_ACCEPT_ANY_VLAN; 1267 case QED_IOV_VP_UPDATE_SGE_TPA: 1268 return CHANNEL_TLV_VPORT_UPDATE_SGE_TPA; 1269 default: 1270 return 0; 1271 } 1272 } 1273 1274 static u16 qed_iov_prep_vp_update_resp_tlvs(struct qed_hwfn *p_hwfn, 1275 struct qed_vf_info *p_vf, 1276 struct qed_iov_vf_mbx *p_mbx, 1277 u8 status, 1278 u16 tlvs_mask, u16 tlvs_accepted) 1279 { 1280 struct pfvf_def_resp_tlv *resp; 1281 u16 size, total_len, i; 1282 1283 memset(p_mbx->reply_virt, 0, sizeof(union pfvf_tlvs)); 1284 p_mbx->offset = (u8 *)p_mbx->reply_virt; 1285 size = sizeof(struct pfvf_def_resp_tlv); 1286 total_len = size; 1287 1288 qed_add_tlv(p_hwfn, &p_mbx->offset, CHANNEL_TLV_VPORT_UPDATE, size); 1289 1290 /* Prepare response for all extended tlvs if they are found by PF */ 1291 for (i = 0; i < QED_IOV_VP_UPDATE_MAX; i++) { 1292 if (!(tlvs_mask & BIT(i))) 1293 continue; 1294 1295 resp = qed_add_tlv(p_hwfn, &p_mbx->offset, 1296 qed_iov_vport_to_tlv(p_hwfn, i), size); 1297 1298 if (tlvs_accepted & BIT(i)) 1299 resp->hdr.status = status; 1300 else 1301 resp->hdr.status = PFVF_STATUS_NOT_SUPPORTED; 1302 1303 DP_VERBOSE(p_hwfn, 1304 QED_MSG_IOV, 1305 "VF[%d] - vport_update response: TLV %d, status %02x\n", 1306 p_vf->relative_vf_id, 1307 qed_iov_vport_to_tlv(p_hwfn, i), resp->hdr.status); 1308 1309 total_len += size; 1310 } 1311 1312 qed_add_tlv(p_hwfn, &p_mbx->offset, CHANNEL_TLV_LIST_END, 1313 sizeof(struct channel_list_end_tlv)); 1314 1315 return total_len; 1316 } 1317 1318 static void qed_iov_prepare_resp(struct qed_hwfn *p_hwfn, 1319 struct qed_ptt *p_ptt, 1320 struct qed_vf_info *vf_info, 1321 u16 type, u16 length, u8 status) 1322 { 1323 struct qed_iov_vf_mbx *mbx = &vf_info->vf_mbx; 1324 1325 mbx->offset = (u8 *)mbx->reply_virt; 1326 1327 qed_add_tlv(p_hwfn, &mbx->offset, type, length); 1328 qed_add_tlv(p_hwfn, &mbx->offset, CHANNEL_TLV_LIST_END, 1329 sizeof(struct channel_list_end_tlv)); 1330 1331 qed_iov_send_response(p_hwfn, p_ptt, vf_info, length, status); 1332 } 1333 1334 static struct 1335 qed_public_vf_info *qed_iov_get_public_vf_info(struct qed_hwfn *p_hwfn, 1336 u16 relative_vf_id, 1337 bool b_enabled_only) 1338 { 1339 struct qed_vf_info *vf = NULL; 1340 1341 vf = qed_iov_get_vf_info(p_hwfn, relative_vf_id, b_enabled_only); 1342 if (!vf) 1343 return NULL; 1344 1345 return &vf->p_vf_info; 1346 } 1347 1348 static void qed_iov_clean_vf(struct qed_hwfn *p_hwfn, u8 vfid) 1349 { 1350 struct qed_public_vf_info *vf_info; 1351 1352 vf_info = qed_iov_get_public_vf_info(p_hwfn, vfid, false); 1353 1354 if (!vf_info) 1355 return; 1356 1357 /* Clear the VF mac */ 1358 eth_zero_addr(vf_info->mac); 1359 1360 vf_info->rx_accept_mode = 0; 1361 vf_info->tx_accept_mode = 0; 1362 } 1363 1364 static void qed_iov_vf_cleanup(struct qed_hwfn *p_hwfn, 1365 struct qed_vf_info *p_vf) 1366 { 1367 u32 i, j; 1368 1369 p_vf->vf_bulletin = 0; 1370 p_vf->vport_instance = 0; 1371 p_vf->configured_features = 0; 1372 1373 /* If VF previously requested less resources, go back to default */ 1374 p_vf->num_rxqs = p_vf->num_sbs; 1375 p_vf->num_txqs = p_vf->num_sbs; 1376 1377 p_vf->num_active_rxqs = 0; 1378 1379 for (i = 0; i < QED_MAX_VF_CHAINS_PER_PF; i++) { 1380 struct qed_vf_queue *p_queue = &p_vf->vf_queues[i]; 1381 1382 for (j = 0; j < MAX_QUEUES_PER_QZONE; j++) { 1383 if (!p_queue->cids[j].p_cid) 1384 continue; 1385 1386 qed_eth_queue_cid_release(p_hwfn, 1387 p_queue->cids[j].p_cid); 1388 p_queue->cids[j].p_cid = NULL; 1389 } 1390 } 1391 1392 memset(&p_vf->shadow_config, 0, sizeof(p_vf->shadow_config)); 1393 memset(&p_vf->acquire, 0, sizeof(p_vf->acquire)); 1394 qed_iov_clean_vf(p_hwfn, p_vf->relative_vf_id); 1395 } 1396 1397 /* Returns either 0, or log(size) */ 1398 static u32 qed_iov_vf_db_bar_size(struct qed_hwfn *p_hwfn, 1399 struct qed_ptt *p_ptt) 1400 { 1401 u32 val = qed_rd(p_hwfn, p_ptt, PGLUE_B_REG_VF_BAR1_SIZE); 1402 1403 if (val) 1404 return val + 11; 1405 return 0; 1406 } 1407 1408 static void 1409 qed_iov_vf_mbx_acquire_resc_cids(struct qed_hwfn *p_hwfn, 1410 struct qed_ptt *p_ptt, 1411 struct qed_vf_info *p_vf, 1412 struct vf_pf_resc_request *p_req, 1413 struct pf_vf_resc *p_resp) 1414 { 1415 u8 num_vf_cons = p_hwfn->pf_params.eth_pf_params.num_vf_cons; 1416 u8 db_size = qed_db_addr_vf(1, DQ_DEMS_LEGACY) - 1417 qed_db_addr_vf(0, DQ_DEMS_LEGACY); 1418 u32 bar_size; 1419 1420 p_resp->num_cids = min_t(u8, p_req->num_cids, num_vf_cons); 1421 1422 /* If VF didn't bother asking for QIDs than don't bother limiting 1423 * number of CIDs. The VF doesn't care about the number, and this 1424 * has the likely result of causing an additional acquisition. 1425 */ 1426 if (!(p_vf->acquire.vfdev_info.capabilities & 1427 VFPF_ACQUIRE_CAP_QUEUE_QIDS)) 1428 return; 1429 1430 /* If doorbell bar was mapped by VF, limit the VF CIDs to an amount 1431 * that would make sure doorbells for all CIDs fall within the bar. 1432 * If it doesn't, make sure regview window is sufficient. 1433 */ 1434 if (p_vf->acquire.vfdev_info.capabilities & 1435 VFPF_ACQUIRE_CAP_PHYSICAL_BAR) { 1436 bar_size = qed_iov_vf_db_bar_size(p_hwfn, p_ptt); 1437 if (bar_size) 1438 bar_size = 1 << bar_size; 1439 1440 if (p_hwfn->cdev->num_hwfns > 1) 1441 bar_size /= 2; 1442 } else { 1443 bar_size = PXP_VF_BAR0_DQ_LENGTH; 1444 } 1445 1446 if (bar_size / db_size < 256) 1447 p_resp->num_cids = min_t(u8, p_resp->num_cids, 1448 (u8)(bar_size / db_size)); 1449 } 1450 1451 static u8 qed_iov_vf_mbx_acquire_resc(struct qed_hwfn *p_hwfn, 1452 struct qed_ptt *p_ptt, 1453 struct qed_vf_info *p_vf, 1454 struct vf_pf_resc_request *p_req, 1455 struct pf_vf_resc *p_resp) 1456 { 1457 u8 i; 1458 1459 /* Queue related information */ 1460 p_resp->num_rxqs = p_vf->num_rxqs; 1461 p_resp->num_txqs = p_vf->num_txqs; 1462 p_resp->num_sbs = p_vf->num_sbs; 1463 1464 for (i = 0; i < p_resp->num_sbs; i++) { 1465 p_resp->hw_sbs[i].hw_sb_id = p_vf->igu_sbs[i]; 1466 p_resp->hw_sbs[i].sb_qid = 0; 1467 } 1468 1469 /* These fields are filled for backward compatibility. 1470 * Unused by modern vfs. 1471 */ 1472 for (i = 0; i < p_resp->num_rxqs; i++) { 1473 qed_fw_l2_queue(p_hwfn, p_vf->vf_queues[i].fw_rx_qid, 1474 (u16 *)&p_resp->hw_qid[i]); 1475 p_resp->cid[i] = i; 1476 } 1477 1478 /* Filter related information */ 1479 p_resp->num_mac_filters = min_t(u8, p_vf->num_mac_filters, 1480 p_req->num_mac_filters); 1481 p_resp->num_vlan_filters = min_t(u8, p_vf->num_vlan_filters, 1482 p_req->num_vlan_filters); 1483 1484 qed_iov_vf_mbx_acquire_resc_cids(p_hwfn, p_ptt, p_vf, p_req, p_resp); 1485 1486 /* This isn't really needed/enforced, but some legacy VFs might depend 1487 * on the correct filling of this field. 1488 */ 1489 p_resp->num_mc_filters = QED_MAX_MC_ADDRS; 1490 1491 /* Validate sufficient resources for VF */ 1492 if (p_resp->num_rxqs < p_req->num_rxqs || 1493 p_resp->num_txqs < p_req->num_txqs || 1494 p_resp->num_sbs < p_req->num_sbs || 1495 p_resp->num_mac_filters < p_req->num_mac_filters || 1496 p_resp->num_vlan_filters < p_req->num_vlan_filters || 1497 p_resp->num_mc_filters < p_req->num_mc_filters || 1498 p_resp->num_cids < p_req->num_cids) { 1499 DP_VERBOSE(p_hwfn, 1500 QED_MSG_IOV, 1501 "VF[%d] - Insufficient resources: rxq [%02x/%02x] txq [%02x/%02x] sbs [%02x/%02x] mac [%02x/%02x] vlan [%02x/%02x] mc [%02x/%02x] cids [%02x/%02x]\n", 1502 p_vf->abs_vf_id, 1503 p_req->num_rxqs, 1504 p_resp->num_rxqs, 1505 p_req->num_rxqs, 1506 p_resp->num_txqs, 1507 p_req->num_sbs, 1508 p_resp->num_sbs, 1509 p_req->num_mac_filters, 1510 p_resp->num_mac_filters, 1511 p_req->num_vlan_filters, 1512 p_resp->num_vlan_filters, 1513 p_req->num_mc_filters, 1514 p_resp->num_mc_filters, 1515 p_req->num_cids, p_resp->num_cids); 1516 1517 /* Some legacy OSes are incapable of correctly handling this 1518 * failure. 1519 */ 1520 if ((p_vf->acquire.vfdev_info.eth_fp_hsi_minor == 1521 ETH_HSI_VER_NO_PKT_LEN_TUNN) && 1522 (p_vf->acquire.vfdev_info.os_type == 1523 VFPF_ACQUIRE_OS_WINDOWS)) 1524 return PFVF_STATUS_SUCCESS; 1525 1526 return PFVF_STATUS_NO_RESOURCE; 1527 } 1528 1529 return PFVF_STATUS_SUCCESS; 1530 } 1531 1532 static void qed_iov_vf_mbx_acquire_stats(struct qed_hwfn *p_hwfn, 1533 struct pfvf_stats_info *p_stats) 1534 { 1535 p_stats->mstats.address = PXP_VF_BAR0_START_MSDM_ZONE_B + 1536 offsetof(struct mstorm_vf_zone, 1537 non_trigger.eth_queue_stat); 1538 p_stats->mstats.len = sizeof(struct eth_mstorm_per_queue_stat); 1539 p_stats->ustats.address = PXP_VF_BAR0_START_USDM_ZONE_B + 1540 offsetof(struct ustorm_vf_zone, 1541 non_trigger.eth_queue_stat); 1542 p_stats->ustats.len = sizeof(struct eth_ustorm_per_queue_stat); 1543 p_stats->pstats.address = PXP_VF_BAR0_START_PSDM_ZONE_B + 1544 offsetof(struct pstorm_vf_zone, 1545 non_trigger.eth_queue_stat); 1546 p_stats->pstats.len = sizeof(struct eth_pstorm_per_queue_stat); 1547 p_stats->tstats.address = 0; 1548 p_stats->tstats.len = 0; 1549 } 1550 1551 static void qed_iov_vf_mbx_acquire(struct qed_hwfn *p_hwfn, 1552 struct qed_ptt *p_ptt, 1553 struct qed_vf_info *vf) 1554 { 1555 struct qed_iov_vf_mbx *mbx = &vf->vf_mbx; 1556 struct pfvf_acquire_resp_tlv *resp = &mbx->reply_virt->acquire_resp; 1557 struct pf_vf_pfdev_info *pfdev_info = &resp->pfdev_info; 1558 struct vfpf_acquire_tlv *req = &mbx->req_virt->acquire; 1559 u8 vfpf_status = PFVF_STATUS_NOT_SUPPORTED; 1560 struct pf_vf_resc *resc = &resp->resc; 1561 int rc; 1562 1563 memset(resp, 0, sizeof(*resp)); 1564 1565 /* Write the PF version so that VF would know which version 1566 * is supported - might be later overriden. This guarantees that 1567 * VF could recognize legacy PF based on lack of versions in reply. 1568 */ 1569 pfdev_info->major_fp_hsi = ETH_HSI_VER_MAJOR; 1570 pfdev_info->minor_fp_hsi = ETH_HSI_VER_MINOR; 1571 1572 if (vf->state != VF_FREE && vf->state != VF_STOPPED) { 1573 DP_VERBOSE(p_hwfn, 1574 QED_MSG_IOV, 1575 "VF[%d] sent ACQUIRE but is already in state %d - fail request\n", 1576 vf->abs_vf_id, vf->state); 1577 goto out; 1578 } 1579 1580 /* Validate FW compatibility */ 1581 if (req->vfdev_info.eth_fp_hsi_major != ETH_HSI_VER_MAJOR) { 1582 if (req->vfdev_info.capabilities & 1583 VFPF_ACQUIRE_CAP_PRE_FP_HSI) { 1584 struct vf_pf_vfdev_info *p_vfdev = &req->vfdev_info; 1585 1586 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 1587 "VF[%d] is pre-fastpath HSI\n", 1588 vf->abs_vf_id); 1589 p_vfdev->eth_fp_hsi_major = ETH_HSI_VER_MAJOR; 1590 p_vfdev->eth_fp_hsi_minor = ETH_HSI_VER_NO_PKT_LEN_TUNN; 1591 } else { 1592 DP_INFO(p_hwfn, 1593 "VF[%d] needs fastpath HSI %02x.%02x, which is incompatible with loaded FW's faspath HSI %02x.%02x\n", 1594 vf->abs_vf_id, 1595 req->vfdev_info.eth_fp_hsi_major, 1596 req->vfdev_info.eth_fp_hsi_minor, 1597 ETH_HSI_VER_MAJOR, ETH_HSI_VER_MINOR); 1598 1599 goto out; 1600 } 1601 } 1602 1603 /* On 100g PFs, prevent old VFs from loading */ 1604 if ((p_hwfn->cdev->num_hwfns > 1) && 1605 !(req->vfdev_info.capabilities & VFPF_ACQUIRE_CAP_100G)) { 1606 DP_INFO(p_hwfn, 1607 "VF[%d] is running an old driver that doesn't support 100g\n", 1608 vf->abs_vf_id); 1609 goto out; 1610 } 1611 1612 /* Store the acquire message */ 1613 memcpy(&vf->acquire, req, sizeof(vf->acquire)); 1614 1615 vf->opaque_fid = req->vfdev_info.opaque_fid; 1616 1617 vf->vf_bulletin = req->bulletin_addr; 1618 vf->bulletin.size = (vf->bulletin.size < req->bulletin_size) ? 1619 vf->bulletin.size : req->bulletin_size; 1620 1621 /* fill in pfdev info */ 1622 pfdev_info->chip_num = p_hwfn->cdev->chip_num; 1623 pfdev_info->db_size = 0; 1624 pfdev_info->indices_per_sb = PIS_PER_SB_E4; 1625 1626 pfdev_info->capabilities = PFVF_ACQUIRE_CAP_DEFAULT_UNTAGGED | 1627 PFVF_ACQUIRE_CAP_POST_FW_OVERRIDE; 1628 if (p_hwfn->cdev->num_hwfns > 1) 1629 pfdev_info->capabilities |= PFVF_ACQUIRE_CAP_100G; 1630 1631 /* Share our ability to use multiple queue-ids only with VFs 1632 * that request it. 1633 */ 1634 if (req->vfdev_info.capabilities & VFPF_ACQUIRE_CAP_QUEUE_QIDS) 1635 pfdev_info->capabilities |= PFVF_ACQUIRE_CAP_QUEUE_QIDS; 1636 1637 /* Share the sizes of the bars with VF */ 1638 resp->pfdev_info.bar_size = qed_iov_vf_db_bar_size(p_hwfn, p_ptt); 1639 1640 qed_iov_vf_mbx_acquire_stats(p_hwfn, &pfdev_info->stats_info); 1641 1642 memcpy(pfdev_info->port_mac, p_hwfn->hw_info.hw_mac_addr, ETH_ALEN); 1643 1644 pfdev_info->fw_major = FW_MAJOR_VERSION; 1645 pfdev_info->fw_minor = FW_MINOR_VERSION; 1646 pfdev_info->fw_rev = FW_REVISION_VERSION; 1647 pfdev_info->fw_eng = FW_ENGINEERING_VERSION; 1648 1649 /* Incorrect when legacy, but doesn't matter as legacy isn't reading 1650 * this field. 1651 */ 1652 pfdev_info->minor_fp_hsi = min_t(u8, ETH_HSI_VER_MINOR, 1653 req->vfdev_info.eth_fp_hsi_minor); 1654 pfdev_info->os_type = VFPF_ACQUIRE_OS_LINUX; 1655 qed_mcp_get_mfw_ver(p_hwfn, p_ptt, &pfdev_info->mfw_ver, NULL); 1656 1657 pfdev_info->dev_type = p_hwfn->cdev->type; 1658 pfdev_info->chip_rev = p_hwfn->cdev->chip_rev; 1659 1660 /* Fill resources available to VF; Make sure there are enough to 1661 * satisfy the VF's request. 1662 */ 1663 vfpf_status = qed_iov_vf_mbx_acquire_resc(p_hwfn, p_ptt, vf, 1664 &req->resc_request, resc); 1665 if (vfpf_status != PFVF_STATUS_SUCCESS) 1666 goto out; 1667 1668 /* Start the VF in FW */ 1669 rc = qed_sp_vf_start(p_hwfn, vf); 1670 if (rc) { 1671 DP_NOTICE(p_hwfn, "Failed to start VF[%02x]\n", vf->abs_vf_id); 1672 vfpf_status = PFVF_STATUS_FAILURE; 1673 goto out; 1674 } 1675 1676 /* Fill agreed size of bulletin board in response */ 1677 resp->bulletin_size = vf->bulletin.size; 1678 qed_iov_post_vf_bulletin(p_hwfn, vf->relative_vf_id, p_ptt); 1679 1680 DP_VERBOSE(p_hwfn, 1681 QED_MSG_IOV, 1682 "VF[%d] ACQUIRE_RESPONSE: pfdev_info- chip_num=0x%x, db_size=%d, idx_per_sb=%d, pf_cap=0x%llx\n" 1683 "resources- n_rxq-%d, n_txq-%d, n_sbs-%d, n_macs-%d, n_vlans-%d\n", 1684 vf->abs_vf_id, 1685 resp->pfdev_info.chip_num, 1686 resp->pfdev_info.db_size, 1687 resp->pfdev_info.indices_per_sb, 1688 resp->pfdev_info.capabilities, 1689 resc->num_rxqs, 1690 resc->num_txqs, 1691 resc->num_sbs, 1692 resc->num_mac_filters, 1693 resc->num_vlan_filters); 1694 vf->state = VF_ACQUIRED; 1695 1696 /* Prepare Response */ 1697 out: 1698 qed_iov_prepare_resp(p_hwfn, p_ptt, vf, CHANNEL_TLV_ACQUIRE, 1699 sizeof(struct pfvf_acquire_resp_tlv), vfpf_status); 1700 } 1701 1702 static int __qed_iov_spoofchk_set(struct qed_hwfn *p_hwfn, 1703 struct qed_vf_info *p_vf, bool val) 1704 { 1705 struct qed_sp_vport_update_params params; 1706 int rc; 1707 1708 if (val == p_vf->spoof_chk) { 1709 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 1710 "Spoofchk value[%d] is already configured\n", val); 1711 return 0; 1712 } 1713 1714 memset(¶ms, 0, sizeof(struct qed_sp_vport_update_params)); 1715 params.opaque_fid = p_vf->opaque_fid; 1716 params.vport_id = p_vf->vport_id; 1717 params.update_anti_spoofing_en_flg = 1; 1718 params.anti_spoofing_en = val; 1719 1720 rc = qed_sp_vport_update(p_hwfn, ¶ms, QED_SPQ_MODE_EBLOCK, NULL); 1721 if (!rc) { 1722 p_vf->spoof_chk = val; 1723 p_vf->req_spoofchk_val = p_vf->spoof_chk; 1724 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 1725 "Spoofchk val[%d] configured\n", val); 1726 } else { 1727 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 1728 "Spoofchk configuration[val:%d] failed for VF[%d]\n", 1729 val, p_vf->relative_vf_id); 1730 } 1731 1732 return rc; 1733 } 1734 1735 static int qed_iov_reconfigure_unicast_vlan(struct qed_hwfn *p_hwfn, 1736 struct qed_vf_info *p_vf) 1737 { 1738 struct qed_filter_ucast filter; 1739 int rc = 0; 1740 int i; 1741 1742 memset(&filter, 0, sizeof(filter)); 1743 filter.is_rx_filter = 1; 1744 filter.is_tx_filter = 1; 1745 filter.vport_to_add_to = p_vf->vport_id; 1746 filter.opcode = QED_FILTER_ADD; 1747 1748 /* Reconfigure vlans */ 1749 for (i = 0; i < QED_ETH_VF_NUM_VLAN_FILTERS + 1; i++) { 1750 if (!p_vf->shadow_config.vlans[i].used) 1751 continue; 1752 1753 filter.type = QED_FILTER_VLAN; 1754 filter.vlan = p_vf->shadow_config.vlans[i].vid; 1755 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 1756 "Reconfiguring VLAN [0x%04x] for VF [%04x]\n", 1757 filter.vlan, p_vf->relative_vf_id); 1758 rc = qed_sp_eth_filter_ucast(p_hwfn, p_vf->opaque_fid, 1759 &filter, QED_SPQ_MODE_CB, NULL); 1760 if (rc) { 1761 DP_NOTICE(p_hwfn, 1762 "Failed to configure VLAN [%04x] to VF [%04x]\n", 1763 filter.vlan, p_vf->relative_vf_id); 1764 break; 1765 } 1766 } 1767 1768 return rc; 1769 } 1770 1771 static int 1772 qed_iov_reconfigure_unicast_shadow(struct qed_hwfn *p_hwfn, 1773 struct qed_vf_info *p_vf, u64 events) 1774 { 1775 int rc = 0; 1776 1777 if ((events & BIT(VLAN_ADDR_FORCED)) && 1778 !(p_vf->configured_features & (1 << VLAN_ADDR_FORCED))) 1779 rc = qed_iov_reconfigure_unicast_vlan(p_hwfn, p_vf); 1780 1781 return rc; 1782 } 1783 1784 static int qed_iov_configure_vport_forced(struct qed_hwfn *p_hwfn, 1785 struct qed_vf_info *p_vf, u64 events) 1786 { 1787 int rc = 0; 1788 struct qed_filter_ucast filter; 1789 1790 if (!p_vf->vport_instance) 1791 return -EINVAL; 1792 1793 if ((events & BIT(MAC_ADDR_FORCED)) || 1794 p_vf->p_vf_info.is_trusted_configured) { 1795 /* Since there's no way [currently] of removing the MAC, 1796 * we can always assume this means we need to force it. 1797 */ 1798 memset(&filter, 0, sizeof(filter)); 1799 filter.type = QED_FILTER_MAC; 1800 filter.opcode = QED_FILTER_REPLACE; 1801 filter.is_rx_filter = 1; 1802 filter.is_tx_filter = 1; 1803 filter.vport_to_add_to = p_vf->vport_id; 1804 ether_addr_copy(filter.mac, p_vf->bulletin.p_virt->mac); 1805 1806 rc = qed_sp_eth_filter_ucast(p_hwfn, p_vf->opaque_fid, 1807 &filter, QED_SPQ_MODE_CB, NULL); 1808 if (rc) { 1809 DP_NOTICE(p_hwfn, 1810 "PF failed to configure MAC for VF\n"); 1811 return rc; 1812 } 1813 if (p_vf->p_vf_info.is_trusted_configured) 1814 p_vf->configured_features |= 1815 BIT(VFPF_BULLETIN_MAC_ADDR); 1816 else 1817 p_vf->configured_features |= 1818 BIT(MAC_ADDR_FORCED); 1819 } 1820 1821 if (events & BIT(VLAN_ADDR_FORCED)) { 1822 struct qed_sp_vport_update_params vport_update; 1823 u8 removal; 1824 int i; 1825 1826 memset(&filter, 0, sizeof(filter)); 1827 filter.type = QED_FILTER_VLAN; 1828 filter.is_rx_filter = 1; 1829 filter.is_tx_filter = 1; 1830 filter.vport_to_add_to = p_vf->vport_id; 1831 filter.vlan = p_vf->bulletin.p_virt->pvid; 1832 filter.opcode = filter.vlan ? QED_FILTER_REPLACE : 1833 QED_FILTER_FLUSH; 1834 1835 /* Send the ramrod */ 1836 rc = qed_sp_eth_filter_ucast(p_hwfn, p_vf->opaque_fid, 1837 &filter, QED_SPQ_MODE_CB, NULL); 1838 if (rc) { 1839 DP_NOTICE(p_hwfn, 1840 "PF failed to configure VLAN for VF\n"); 1841 return rc; 1842 } 1843 1844 /* Update the default-vlan & silent vlan stripping */ 1845 memset(&vport_update, 0, sizeof(vport_update)); 1846 vport_update.opaque_fid = p_vf->opaque_fid; 1847 vport_update.vport_id = p_vf->vport_id; 1848 vport_update.update_default_vlan_enable_flg = 1; 1849 vport_update.default_vlan_enable_flg = filter.vlan ? 1 : 0; 1850 vport_update.update_default_vlan_flg = 1; 1851 vport_update.default_vlan = filter.vlan; 1852 1853 vport_update.update_inner_vlan_removal_flg = 1; 1854 removal = filter.vlan ? 1 1855 : p_vf->shadow_config.inner_vlan_removal; 1856 vport_update.inner_vlan_removal_flg = removal; 1857 vport_update.silent_vlan_removal_flg = filter.vlan ? 1 : 0; 1858 rc = qed_sp_vport_update(p_hwfn, 1859 &vport_update, 1860 QED_SPQ_MODE_EBLOCK, NULL); 1861 if (rc) { 1862 DP_NOTICE(p_hwfn, 1863 "PF failed to configure VF vport for vlan\n"); 1864 return rc; 1865 } 1866 1867 /* Update all the Rx queues */ 1868 for (i = 0; i < QED_MAX_VF_CHAINS_PER_PF; i++) { 1869 struct qed_vf_queue *p_queue = &p_vf->vf_queues[i]; 1870 struct qed_queue_cid *p_cid = NULL; 1871 1872 /* There can be at most 1 Rx queue on qzone. Find it */ 1873 p_cid = qed_iov_get_vf_rx_queue_cid(p_queue); 1874 if (!p_cid) 1875 continue; 1876 1877 rc = qed_sp_eth_rx_queues_update(p_hwfn, 1878 (void **)&p_cid, 1879 1, 0, 1, 1880 QED_SPQ_MODE_EBLOCK, 1881 NULL); 1882 if (rc) { 1883 DP_NOTICE(p_hwfn, 1884 "Failed to send Rx update fo queue[0x%04x]\n", 1885 p_cid->rel.queue_id); 1886 return rc; 1887 } 1888 } 1889 1890 if (filter.vlan) 1891 p_vf->configured_features |= 1 << VLAN_ADDR_FORCED; 1892 else 1893 p_vf->configured_features &= ~BIT(VLAN_ADDR_FORCED); 1894 } 1895 1896 /* If forced features are terminated, we need to configure the shadow 1897 * configuration back again. 1898 */ 1899 if (events) 1900 qed_iov_reconfigure_unicast_shadow(p_hwfn, p_vf, events); 1901 1902 return rc; 1903 } 1904 1905 static void qed_iov_vf_mbx_start_vport(struct qed_hwfn *p_hwfn, 1906 struct qed_ptt *p_ptt, 1907 struct qed_vf_info *vf) 1908 { 1909 struct qed_sp_vport_start_params params = { 0 }; 1910 struct qed_iov_vf_mbx *mbx = &vf->vf_mbx; 1911 struct vfpf_vport_start_tlv *start; 1912 u8 status = PFVF_STATUS_SUCCESS; 1913 struct qed_vf_info *vf_info; 1914 u64 *p_bitmap; 1915 int sb_id; 1916 int rc; 1917 1918 vf_info = qed_iov_get_vf_info(p_hwfn, (u16) vf->relative_vf_id, true); 1919 if (!vf_info) { 1920 DP_NOTICE(p_hwfn->cdev, 1921 "Failed to get VF info, invalid vfid [%d]\n", 1922 vf->relative_vf_id); 1923 return; 1924 } 1925 1926 vf->state = VF_ENABLED; 1927 start = &mbx->req_virt->start_vport; 1928 1929 qed_iov_enable_vf_traffic(p_hwfn, p_ptt, vf); 1930 1931 /* Initialize Status block in CAU */ 1932 for (sb_id = 0; sb_id < vf->num_sbs; sb_id++) { 1933 if (!start->sb_addr[sb_id]) { 1934 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 1935 "VF[%d] did not fill the address of SB %d\n", 1936 vf->relative_vf_id, sb_id); 1937 break; 1938 } 1939 1940 qed_int_cau_conf_sb(p_hwfn, p_ptt, 1941 start->sb_addr[sb_id], 1942 vf->igu_sbs[sb_id], vf->abs_vf_id, 1); 1943 } 1944 1945 vf->mtu = start->mtu; 1946 vf->shadow_config.inner_vlan_removal = start->inner_vlan_removal; 1947 1948 /* Take into consideration configuration forced by hypervisor; 1949 * If none is configured, use the supplied VF values [for old 1950 * vfs that would still be fine, since they passed '0' as padding]. 1951 */ 1952 p_bitmap = &vf_info->bulletin.p_virt->valid_bitmap; 1953 if (!(*p_bitmap & BIT(VFPF_BULLETIN_UNTAGGED_DEFAULT_FORCED))) { 1954 u8 vf_req = start->only_untagged; 1955 1956 vf_info->bulletin.p_virt->default_only_untagged = vf_req; 1957 *p_bitmap |= 1 << VFPF_BULLETIN_UNTAGGED_DEFAULT; 1958 } 1959 1960 params.tpa_mode = start->tpa_mode; 1961 params.remove_inner_vlan = start->inner_vlan_removal; 1962 params.tx_switching = true; 1963 1964 params.only_untagged = vf_info->bulletin.p_virt->default_only_untagged; 1965 params.drop_ttl0 = false; 1966 params.concrete_fid = vf->concrete_fid; 1967 params.opaque_fid = vf->opaque_fid; 1968 params.vport_id = vf->vport_id; 1969 params.max_buffers_per_cqe = start->max_buffers_per_cqe; 1970 params.mtu = vf->mtu; 1971 params.check_mac = true; 1972 1973 rc = qed_sp_eth_vport_start(p_hwfn, ¶ms); 1974 if (rc) { 1975 DP_ERR(p_hwfn, 1976 "qed_iov_vf_mbx_start_vport returned error %d\n", rc); 1977 status = PFVF_STATUS_FAILURE; 1978 } else { 1979 vf->vport_instance++; 1980 1981 /* Force configuration if needed on the newly opened vport */ 1982 qed_iov_configure_vport_forced(p_hwfn, vf, *p_bitmap); 1983 1984 __qed_iov_spoofchk_set(p_hwfn, vf, vf->req_spoofchk_val); 1985 } 1986 qed_iov_prepare_resp(p_hwfn, p_ptt, vf, CHANNEL_TLV_VPORT_START, 1987 sizeof(struct pfvf_def_resp_tlv), status); 1988 } 1989 1990 static void qed_iov_vf_mbx_stop_vport(struct qed_hwfn *p_hwfn, 1991 struct qed_ptt *p_ptt, 1992 struct qed_vf_info *vf) 1993 { 1994 u8 status = PFVF_STATUS_SUCCESS; 1995 int rc; 1996 1997 vf->vport_instance--; 1998 vf->spoof_chk = false; 1999 2000 if ((qed_iov_validate_active_rxq(p_hwfn, vf)) || 2001 (qed_iov_validate_active_txq(p_hwfn, vf))) { 2002 vf->b_malicious = true; 2003 DP_NOTICE(p_hwfn, 2004 "VF [%02x] - considered malicious; Unable to stop RX/TX queuess\n", 2005 vf->abs_vf_id); 2006 status = PFVF_STATUS_MALICIOUS; 2007 goto out; 2008 } 2009 2010 rc = qed_sp_vport_stop(p_hwfn, vf->opaque_fid, vf->vport_id); 2011 if (rc) { 2012 DP_ERR(p_hwfn, "qed_iov_vf_mbx_stop_vport returned error %d\n", 2013 rc); 2014 status = PFVF_STATUS_FAILURE; 2015 } 2016 2017 /* Forget the configuration on the vport */ 2018 vf->configured_features = 0; 2019 memset(&vf->shadow_config, 0, sizeof(vf->shadow_config)); 2020 2021 out: 2022 qed_iov_prepare_resp(p_hwfn, p_ptt, vf, CHANNEL_TLV_VPORT_TEARDOWN, 2023 sizeof(struct pfvf_def_resp_tlv), status); 2024 } 2025 2026 static void qed_iov_vf_mbx_start_rxq_resp(struct qed_hwfn *p_hwfn, 2027 struct qed_ptt *p_ptt, 2028 struct qed_vf_info *vf, 2029 u8 status, bool b_legacy) 2030 { 2031 struct qed_iov_vf_mbx *mbx = &vf->vf_mbx; 2032 struct pfvf_start_queue_resp_tlv *p_tlv; 2033 struct vfpf_start_rxq_tlv *req; 2034 u16 length; 2035 2036 mbx->offset = (u8 *)mbx->reply_virt; 2037 2038 /* Taking a bigger struct instead of adding a TLV to list was a 2039 * mistake, but one which we're now stuck with, as some older 2040 * clients assume the size of the previous response. 2041 */ 2042 if (!b_legacy) 2043 length = sizeof(*p_tlv); 2044 else 2045 length = sizeof(struct pfvf_def_resp_tlv); 2046 2047 p_tlv = qed_add_tlv(p_hwfn, &mbx->offset, CHANNEL_TLV_START_RXQ, 2048 length); 2049 qed_add_tlv(p_hwfn, &mbx->offset, CHANNEL_TLV_LIST_END, 2050 sizeof(struct channel_list_end_tlv)); 2051 2052 /* Update the TLV with the response */ 2053 if ((status == PFVF_STATUS_SUCCESS) && !b_legacy) { 2054 req = &mbx->req_virt->start_rxq; 2055 p_tlv->offset = PXP_VF_BAR0_START_MSDM_ZONE_B + 2056 offsetof(struct mstorm_vf_zone, 2057 non_trigger.eth_rx_queue_producers) + 2058 sizeof(struct eth_rx_prod_data) * req->rx_qid; 2059 } 2060 2061 qed_iov_send_response(p_hwfn, p_ptt, vf, length, status); 2062 } 2063 2064 static u8 qed_iov_vf_mbx_qid(struct qed_hwfn *p_hwfn, 2065 struct qed_vf_info *p_vf, bool b_is_tx) 2066 { 2067 struct qed_iov_vf_mbx *p_mbx = &p_vf->vf_mbx; 2068 struct vfpf_qid_tlv *p_qid_tlv; 2069 2070 /* Search for the qid if the VF published its going to provide it */ 2071 if (!(p_vf->acquire.vfdev_info.capabilities & 2072 VFPF_ACQUIRE_CAP_QUEUE_QIDS)) { 2073 if (b_is_tx) 2074 return QED_IOV_LEGACY_QID_TX; 2075 else 2076 return QED_IOV_LEGACY_QID_RX; 2077 } 2078 2079 p_qid_tlv = (struct vfpf_qid_tlv *) 2080 qed_iov_search_list_tlvs(p_hwfn, p_mbx->req_virt, 2081 CHANNEL_TLV_QID); 2082 if (!p_qid_tlv) { 2083 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 2084 "VF[%2x]: Failed to provide qid\n", 2085 p_vf->relative_vf_id); 2086 2087 return QED_IOV_QID_INVALID; 2088 } 2089 2090 if (p_qid_tlv->qid >= MAX_QUEUES_PER_QZONE) { 2091 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 2092 "VF[%02x]: Provided qid out-of-bounds %02x\n", 2093 p_vf->relative_vf_id, p_qid_tlv->qid); 2094 return QED_IOV_QID_INVALID; 2095 } 2096 2097 return p_qid_tlv->qid; 2098 } 2099 2100 static void qed_iov_vf_mbx_start_rxq(struct qed_hwfn *p_hwfn, 2101 struct qed_ptt *p_ptt, 2102 struct qed_vf_info *vf) 2103 { 2104 struct qed_queue_start_common_params params; 2105 struct qed_queue_cid_vf_params vf_params; 2106 struct qed_iov_vf_mbx *mbx = &vf->vf_mbx; 2107 u8 status = PFVF_STATUS_NO_RESOURCE; 2108 u8 qid_usage_idx, vf_legacy = 0; 2109 struct vfpf_start_rxq_tlv *req; 2110 struct qed_vf_queue *p_queue; 2111 struct qed_queue_cid *p_cid; 2112 struct qed_sb_info sb_dummy; 2113 int rc; 2114 2115 req = &mbx->req_virt->start_rxq; 2116 2117 if (!qed_iov_validate_rxq(p_hwfn, vf, req->rx_qid, 2118 QED_IOV_VALIDATE_Q_DISABLE) || 2119 !qed_iov_validate_sb(p_hwfn, vf, req->hw_sb)) 2120 goto out; 2121 2122 qid_usage_idx = qed_iov_vf_mbx_qid(p_hwfn, vf, false); 2123 if (qid_usage_idx == QED_IOV_QID_INVALID) 2124 goto out; 2125 2126 p_queue = &vf->vf_queues[req->rx_qid]; 2127 if (p_queue->cids[qid_usage_idx].p_cid) 2128 goto out; 2129 2130 vf_legacy = qed_vf_calculate_legacy(vf); 2131 2132 /* Acquire a new queue-cid */ 2133 memset(¶ms, 0, sizeof(params)); 2134 params.queue_id = p_queue->fw_rx_qid; 2135 params.vport_id = vf->vport_id; 2136 params.stats_id = vf->abs_vf_id + 0x10; 2137 /* Since IGU index is passed via sb_info, construct a dummy one */ 2138 memset(&sb_dummy, 0, sizeof(sb_dummy)); 2139 sb_dummy.igu_sb_id = req->hw_sb; 2140 params.p_sb = &sb_dummy; 2141 params.sb_idx = req->sb_index; 2142 2143 memset(&vf_params, 0, sizeof(vf_params)); 2144 vf_params.vfid = vf->relative_vf_id; 2145 vf_params.vf_qid = (u8)req->rx_qid; 2146 vf_params.vf_legacy = vf_legacy; 2147 vf_params.qid_usage_idx = qid_usage_idx; 2148 p_cid = qed_eth_queue_to_cid(p_hwfn, vf->opaque_fid, 2149 ¶ms, true, &vf_params); 2150 if (!p_cid) 2151 goto out; 2152 2153 /* Legacy VFs have their Producers in a different location, which they 2154 * calculate on their own and clean the producer prior to this. 2155 */ 2156 if (!(vf_legacy & QED_QCID_LEGACY_VF_RX_PROD)) 2157 REG_WR(p_hwfn, 2158 GTT_BAR0_MAP_REG_MSDM_RAM + 2159 MSTORM_ETH_VF_PRODS_OFFSET(vf->abs_vf_id, req->rx_qid), 2160 0); 2161 2162 rc = qed_eth_rxq_start_ramrod(p_hwfn, p_cid, 2163 req->bd_max_bytes, 2164 req->rxq_addr, 2165 req->cqe_pbl_addr, req->cqe_pbl_size); 2166 if (rc) { 2167 status = PFVF_STATUS_FAILURE; 2168 qed_eth_queue_cid_release(p_hwfn, p_cid); 2169 } else { 2170 p_queue->cids[qid_usage_idx].p_cid = p_cid; 2171 p_queue->cids[qid_usage_idx].b_is_tx = false; 2172 status = PFVF_STATUS_SUCCESS; 2173 vf->num_active_rxqs++; 2174 } 2175 2176 out: 2177 qed_iov_vf_mbx_start_rxq_resp(p_hwfn, p_ptt, vf, status, 2178 !!(vf_legacy & 2179 QED_QCID_LEGACY_VF_RX_PROD)); 2180 } 2181 2182 static void 2183 qed_iov_pf_update_tun_response(struct pfvf_update_tunn_param_tlv *p_resp, 2184 struct qed_tunnel_info *p_tun, 2185 u16 tunn_feature_mask) 2186 { 2187 p_resp->tunn_feature_mask = tunn_feature_mask; 2188 p_resp->vxlan_mode = p_tun->vxlan.b_mode_enabled; 2189 p_resp->l2geneve_mode = p_tun->l2_geneve.b_mode_enabled; 2190 p_resp->ipgeneve_mode = p_tun->ip_geneve.b_mode_enabled; 2191 p_resp->l2gre_mode = p_tun->l2_gre.b_mode_enabled; 2192 p_resp->ipgre_mode = p_tun->l2_gre.b_mode_enabled; 2193 p_resp->vxlan_clss = p_tun->vxlan.tun_cls; 2194 p_resp->l2gre_clss = p_tun->l2_gre.tun_cls; 2195 p_resp->ipgre_clss = p_tun->ip_gre.tun_cls; 2196 p_resp->l2geneve_clss = p_tun->l2_geneve.tun_cls; 2197 p_resp->ipgeneve_clss = p_tun->ip_geneve.tun_cls; 2198 p_resp->geneve_udp_port = p_tun->geneve_port.port; 2199 p_resp->vxlan_udp_port = p_tun->vxlan_port.port; 2200 } 2201 2202 static void 2203 __qed_iov_pf_update_tun_param(struct vfpf_update_tunn_param_tlv *p_req, 2204 struct qed_tunn_update_type *p_tun, 2205 enum qed_tunn_mode mask, u8 tun_cls) 2206 { 2207 if (p_req->tun_mode_update_mask & BIT(mask)) { 2208 p_tun->b_update_mode = true; 2209 2210 if (p_req->tunn_mode & BIT(mask)) 2211 p_tun->b_mode_enabled = true; 2212 } 2213 2214 p_tun->tun_cls = tun_cls; 2215 } 2216 2217 static void 2218 qed_iov_pf_update_tun_param(struct vfpf_update_tunn_param_tlv *p_req, 2219 struct qed_tunn_update_type *p_tun, 2220 struct qed_tunn_update_udp_port *p_port, 2221 enum qed_tunn_mode mask, 2222 u8 tun_cls, u8 update_port, u16 port) 2223 { 2224 if (update_port) { 2225 p_port->b_update_port = true; 2226 p_port->port = port; 2227 } 2228 2229 __qed_iov_pf_update_tun_param(p_req, p_tun, mask, tun_cls); 2230 } 2231 2232 static bool 2233 qed_iov_pf_validate_tunn_param(struct vfpf_update_tunn_param_tlv *p_req) 2234 { 2235 bool b_update_requested = false; 2236 2237 if (p_req->tun_mode_update_mask || p_req->update_tun_cls || 2238 p_req->update_geneve_port || p_req->update_vxlan_port) 2239 b_update_requested = true; 2240 2241 return b_update_requested; 2242 } 2243 2244 static void qed_pf_validate_tunn_mode(struct qed_tunn_update_type *tun, int *rc) 2245 { 2246 if (tun->b_update_mode && !tun->b_mode_enabled) { 2247 tun->b_update_mode = false; 2248 *rc = -EINVAL; 2249 } 2250 } 2251 2252 static int 2253 qed_pf_validate_modify_tunn_config(struct qed_hwfn *p_hwfn, 2254 u16 *tun_features, bool *update, 2255 struct qed_tunnel_info *tun_src) 2256 { 2257 struct qed_eth_cb_ops *ops = p_hwfn->cdev->protocol_ops.eth; 2258 struct qed_tunnel_info *tun = &p_hwfn->cdev->tunnel; 2259 u16 bultn_vxlan_port, bultn_geneve_port; 2260 void *cookie = p_hwfn->cdev->ops_cookie; 2261 int i, rc = 0; 2262 2263 *tun_features = p_hwfn->cdev->tunn_feature_mask; 2264 bultn_vxlan_port = tun->vxlan_port.port; 2265 bultn_geneve_port = tun->geneve_port.port; 2266 qed_pf_validate_tunn_mode(&tun_src->vxlan, &rc); 2267 qed_pf_validate_tunn_mode(&tun_src->l2_geneve, &rc); 2268 qed_pf_validate_tunn_mode(&tun_src->ip_geneve, &rc); 2269 qed_pf_validate_tunn_mode(&tun_src->l2_gre, &rc); 2270 qed_pf_validate_tunn_mode(&tun_src->ip_gre, &rc); 2271 2272 if ((tun_src->b_update_rx_cls || tun_src->b_update_tx_cls) && 2273 (tun_src->vxlan.tun_cls != QED_TUNN_CLSS_MAC_VLAN || 2274 tun_src->l2_geneve.tun_cls != QED_TUNN_CLSS_MAC_VLAN || 2275 tun_src->ip_geneve.tun_cls != QED_TUNN_CLSS_MAC_VLAN || 2276 tun_src->l2_gre.tun_cls != QED_TUNN_CLSS_MAC_VLAN || 2277 tun_src->ip_gre.tun_cls != QED_TUNN_CLSS_MAC_VLAN)) { 2278 tun_src->b_update_rx_cls = false; 2279 tun_src->b_update_tx_cls = false; 2280 rc = -EINVAL; 2281 } 2282 2283 if (tun_src->vxlan_port.b_update_port) { 2284 if (tun_src->vxlan_port.port == tun->vxlan_port.port) { 2285 tun_src->vxlan_port.b_update_port = false; 2286 } else { 2287 *update = true; 2288 bultn_vxlan_port = tun_src->vxlan_port.port; 2289 } 2290 } 2291 2292 if (tun_src->geneve_port.b_update_port) { 2293 if (tun_src->geneve_port.port == tun->geneve_port.port) { 2294 tun_src->geneve_port.b_update_port = false; 2295 } else { 2296 *update = true; 2297 bultn_geneve_port = tun_src->geneve_port.port; 2298 } 2299 } 2300 2301 qed_for_each_vf(p_hwfn, i) { 2302 qed_iov_bulletin_set_udp_ports(p_hwfn, i, bultn_vxlan_port, 2303 bultn_geneve_port); 2304 } 2305 2306 qed_schedule_iov(p_hwfn, QED_IOV_WQ_BULLETIN_UPDATE_FLAG); 2307 ops->ports_update(cookie, bultn_vxlan_port, bultn_geneve_port); 2308 2309 return rc; 2310 } 2311 2312 static void qed_iov_vf_mbx_update_tunn_param(struct qed_hwfn *p_hwfn, 2313 struct qed_ptt *p_ptt, 2314 struct qed_vf_info *p_vf) 2315 { 2316 struct qed_tunnel_info *p_tun = &p_hwfn->cdev->tunnel; 2317 struct qed_iov_vf_mbx *mbx = &p_vf->vf_mbx; 2318 struct pfvf_update_tunn_param_tlv *p_resp; 2319 struct vfpf_update_tunn_param_tlv *p_req; 2320 u8 status = PFVF_STATUS_SUCCESS; 2321 bool b_update_required = false; 2322 struct qed_tunnel_info tunn; 2323 u16 tunn_feature_mask = 0; 2324 int i, rc = 0; 2325 2326 mbx->offset = (u8 *)mbx->reply_virt; 2327 2328 memset(&tunn, 0, sizeof(tunn)); 2329 p_req = &mbx->req_virt->tunn_param_update; 2330 2331 if (!qed_iov_pf_validate_tunn_param(p_req)) { 2332 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 2333 "No tunnel update requested by VF\n"); 2334 status = PFVF_STATUS_FAILURE; 2335 goto send_resp; 2336 } 2337 2338 tunn.b_update_rx_cls = p_req->update_tun_cls; 2339 tunn.b_update_tx_cls = p_req->update_tun_cls; 2340 2341 qed_iov_pf_update_tun_param(p_req, &tunn.vxlan, &tunn.vxlan_port, 2342 QED_MODE_VXLAN_TUNN, p_req->vxlan_clss, 2343 p_req->update_vxlan_port, 2344 p_req->vxlan_port); 2345 qed_iov_pf_update_tun_param(p_req, &tunn.l2_geneve, &tunn.geneve_port, 2346 QED_MODE_L2GENEVE_TUNN, 2347 p_req->l2geneve_clss, 2348 p_req->update_geneve_port, 2349 p_req->geneve_port); 2350 __qed_iov_pf_update_tun_param(p_req, &tunn.ip_geneve, 2351 QED_MODE_IPGENEVE_TUNN, 2352 p_req->ipgeneve_clss); 2353 __qed_iov_pf_update_tun_param(p_req, &tunn.l2_gre, 2354 QED_MODE_L2GRE_TUNN, p_req->l2gre_clss); 2355 __qed_iov_pf_update_tun_param(p_req, &tunn.ip_gre, 2356 QED_MODE_IPGRE_TUNN, p_req->ipgre_clss); 2357 2358 /* If PF modifies VF's req then it should 2359 * still return an error in case of partial configuration 2360 * or modified configuration as opposed to requested one. 2361 */ 2362 rc = qed_pf_validate_modify_tunn_config(p_hwfn, &tunn_feature_mask, 2363 &b_update_required, &tunn); 2364 2365 if (rc) 2366 status = PFVF_STATUS_FAILURE; 2367 2368 /* If QED client is willing to update anything ? */ 2369 if (b_update_required) { 2370 u16 geneve_port; 2371 2372 rc = qed_sp_pf_update_tunn_cfg(p_hwfn, p_ptt, &tunn, 2373 QED_SPQ_MODE_EBLOCK, NULL); 2374 if (rc) 2375 status = PFVF_STATUS_FAILURE; 2376 2377 geneve_port = p_tun->geneve_port.port; 2378 qed_for_each_vf(p_hwfn, i) { 2379 qed_iov_bulletin_set_udp_ports(p_hwfn, i, 2380 p_tun->vxlan_port.port, 2381 geneve_port); 2382 } 2383 } 2384 2385 send_resp: 2386 p_resp = qed_add_tlv(p_hwfn, &mbx->offset, 2387 CHANNEL_TLV_UPDATE_TUNN_PARAM, sizeof(*p_resp)); 2388 2389 qed_iov_pf_update_tun_response(p_resp, p_tun, tunn_feature_mask); 2390 qed_add_tlv(p_hwfn, &mbx->offset, CHANNEL_TLV_LIST_END, 2391 sizeof(struct channel_list_end_tlv)); 2392 2393 qed_iov_send_response(p_hwfn, p_ptt, p_vf, sizeof(*p_resp), status); 2394 } 2395 2396 static void qed_iov_vf_mbx_start_txq_resp(struct qed_hwfn *p_hwfn, 2397 struct qed_ptt *p_ptt, 2398 struct qed_vf_info *p_vf, 2399 u32 cid, u8 status) 2400 { 2401 struct qed_iov_vf_mbx *mbx = &p_vf->vf_mbx; 2402 struct pfvf_start_queue_resp_tlv *p_tlv; 2403 bool b_legacy = false; 2404 u16 length; 2405 2406 mbx->offset = (u8 *)mbx->reply_virt; 2407 2408 /* Taking a bigger struct instead of adding a TLV to list was a 2409 * mistake, but one which we're now stuck with, as some older 2410 * clients assume the size of the previous response. 2411 */ 2412 if (p_vf->acquire.vfdev_info.eth_fp_hsi_minor == 2413 ETH_HSI_VER_NO_PKT_LEN_TUNN) 2414 b_legacy = true; 2415 2416 if (!b_legacy) 2417 length = sizeof(*p_tlv); 2418 else 2419 length = sizeof(struct pfvf_def_resp_tlv); 2420 2421 p_tlv = qed_add_tlv(p_hwfn, &mbx->offset, CHANNEL_TLV_START_TXQ, 2422 length); 2423 qed_add_tlv(p_hwfn, &mbx->offset, CHANNEL_TLV_LIST_END, 2424 sizeof(struct channel_list_end_tlv)); 2425 2426 /* Update the TLV with the response */ 2427 if ((status == PFVF_STATUS_SUCCESS) && !b_legacy) 2428 p_tlv->offset = qed_db_addr_vf(cid, DQ_DEMS_LEGACY); 2429 2430 qed_iov_send_response(p_hwfn, p_ptt, p_vf, length, status); 2431 } 2432 2433 static void qed_iov_vf_mbx_start_txq(struct qed_hwfn *p_hwfn, 2434 struct qed_ptt *p_ptt, 2435 struct qed_vf_info *vf) 2436 { 2437 struct qed_queue_start_common_params params; 2438 struct qed_queue_cid_vf_params vf_params; 2439 struct qed_iov_vf_mbx *mbx = &vf->vf_mbx; 2440 u8 status = PFVF_STATUS_NO_RESOURCE; 2441 struct vfpf_start_txq_tlv *req; 2442 struct qed_vf_queue *p_queue; 2443 struct qed_queue_cid *p_cid; 2444 struct qed_sb_info sb_dummy; 2445 u8 qid_usage_idx, vf_legacy; 2446 u32 cid = 0; 2447 int rc; 2448 u16 pq; 2449 2450 memset(¶ms, 0, sizeof(params)); 2451 req = &mbx->req_virt->start_txq; 2452 2453 if (!qed_iov_validate_txq(p_hwfn, vf, req->tx_qid, 2454 QED_IOV_VALIDATE_Q_NA) || 2455 !qed_iov_validate_sb(p_hwfn, vf, req->hw_sb)) 2456 goto out; 2457 2458 qid_usage_idx = qed_iov_vf_mbx_qid(p_hwfn, vf, true); 2459 if (qid_usage_idx == QED_IOV_QID_INVALID) 2460 goto out; 2461 2462 p_queue = &vf->vf_queues[req->tx_qid]; 2463 if (p_queue->cids[qid_usage_idx].p_cid) 2464 goto out; 2465 2466 vf_legacy = qed_vf_calculate_legacy(vf); 2467 2468 /* Acquire a new queue-cid */ 2469 params.queue_id = p_queue->fw_tx_qid; 2470 params.vport_id = vf->vport_id; 2471 params.stats_id = vf->abs_vf_id + 0x10; 2472 2473 /* Since IGU index is passed via sb_info, construct a dummy one */ 2474 memset(&sb_dummy, 0, sizeof(sb_dummy)); 2475 sb_dummy.igu_sb_id = req->hw_sb; 2476 params.p_sb = &sb_dummy; 2477 params.sb_idx = req->sb_index; 2478 2479 memset(&vf_params, 0, sizeof(vf_params)); 2480 vf_params.vfid = vf->relative_vf_id; 2481 vf_params.vf_qid = (u8)req->tx_qid; 2482 vf_params.vf_legacy = vf_legacy; 2483 vf_params.qid_usage_idx = qid_usage_idx; 2484 2485 p_cid = qed_eth_queue_to_cid(p_hwfn, vf->opaque_fid, 2486 ¶ms, false, &vf_params); 2487 if (!p_cid) 2488 goto out; 2489 2490 pq = qed_get_cm_pq_idx_vf(p_hwfn, vf->relative_vf_id); 2491 rc = qed_eth_txq_start_ramrod(p_hwfn, p_cid, 2492 req->pbl_addr, req->pbl_size, pq); 2493 if (rc) { 2494 status = PFVF_STATUS_FAILURE; 2495 qed_eth_queue_cid_release(p_hwfn, p_cid); 2496 } else { 2497 status = PFVF_STATUS_SUCCESS; 2498 p_queue->cids[qid_usage_idx].p_cid = p_cid; 2499 p_queue->cids[qid_usage_idx].b_is_tx = true; 2500 cid = p_cid->cid; 2501 } 2502 2503 out: 2504 qed_iov_vf_mbx_start_txq_resp(p_hwfn, p_ptt, vf, cid, status); 2505 } 2506 2507 static int qed_iov_vf_stop_rxqs(struct qed_hwfn *p_hwfn, 2508 struct qed_vf_info *vf, 2509 u16 rxq_id, 2510 u8 qid_usage_idx, bool cqe_completion) 2511 { 2512 struct qed_vf_queue *p_queue; 2513 int rc = 0; 2514 2515 if (!qed_iov_validate_rxq(p_hwfn, vf, rxq_id, QED_IOV_VALIDATE_Q_NA)) { 2516 DP_VERBOSE(p_hwfn, 2517 QED_MSG_IOV, 2518 "VF[%d] Tried Closing Rx 0x%04x.%02x which is inactive\n", 2519 vf->relative_vf_id, rxq_id, qid_usage_idx); 2520 return -EINVAL; 2521 } 2522 2523 p_queue = &vf->vf_queues[rxq_id]; 2524 2525 /* We've validated the index and the existence of the active RXQ - 2526 * now we need to make sure that it's using the correct qid. 2527 */ 2528 if (!p_queue->cids[qid_usage_idx].p_cid || 2529 p_queue->cids[qid_usage_idx].b_is_tx) { 2530 struct qed_queue_cid *p_cid; 2531 2532 p_cid = qed_iov_get_vf_rx_queue_cid(p_queue); 2533 DP_VERBOSE(p_hwfn, 2534 QED_MSG_IOV, 2535 "VF[%d] - Tried Closing Rx 0x%04x.%02x, but Rx is at %04x.%02x\n", 2536 vf->relative_vf_id, 2537 rxq_id, qid_usage_idx, rxq_id, p_cid->qid_usage_idx); 2538 return -EINVAL; 2539 } 2540 2541 /* Now that we know we have a valid Rx-queue - close it */ 2542 rc = qed_eth_rx_queue_stop(p_hwfn, 2543 p_queue->cids[qid_usage_idx].p_cid, 2544 false, cqe_completion); 2545 if (rc) 2546 return rc; 2547 2548 p_queue->cids[qid_usage_idx].p_cid = NULL; 2549 vf->num_active_rxqs--; 2550 2551 return 0; 2552 } 2553 2554 static int qed_iov_vf_stop_txqs(struct qed_hwfn *p_hwfn, 2555 struct qed_vf_info *vf, 2556 u16 txq_id, u8 qid_usage_idx) 2557 { 2558 struct qed_vf_queue *p_queue; 2559 int rc = 0; 2560 2561 if (!qed_iov_validate_txq(p_hwfn, vf, txq_id, QED_IOV_VALIDATE_Q_NA)) 2562 return -EINVAL; 2563 2564 p_queue = &vf->vf_queues[txq_id]; 2565 if (!p_queue->cids[qid_usage_idx].p_cid || 2566 !p_queue->cids[qid_usage_idx].b_is_tx) 2567 return -EINVAL; 2568 2569 rc = qed_eth_tx_queue_stop(p_hwfn, p_queue->cids[qid_usage_idx].p_cid); 2570 if (rc) 2571 return rc; 2572 2573 p_queue->cids[qid_usage_idx].p_cid = NULL; 2574 return 0; 2575 } 2576 2577 static void qed_iov_vf_mbx_stop_rxqs(struct qed_hwfn *p_hwfn, 2578 struct qed_ptt *p_ptt, 2579 struct qed_vf_info *vf) 2580 { 2581 u16 length = sizeof(struct pfvf_def_resp_tlv); 2582 struct qed_iov_vf_mbx *mbx = &vf->vf_mbx; 2583 u8 status = PFVF_STATUS_FAILURE; 2584 struct vfpf_stop_rxqs_tlv *req; 2585 u8 qid_usage_idx; 2586 int rc; 2587 2588 /* There has never been an official driver that used this interface 2589 * for stopping multiple queues, and it is now considered deprecated. 2590 * Validate this isn't used here. 2591 */ 2592 req = &mbx->req_virt->stop_rxqs; 2593 if (req->num_rxqs != 1) { 2594 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 2595 "Odd; VF[%d] tried stopping multiple Rx queues\n", 2596 vf->relative_vf_id); 2597 status = PFVF_STATUS_NOT_SUPPORTED; 2598 goto out; 2599 } 2600 2601 /* Find which qid-index is associated with the queue */ 2602 qid_usage_idx = qed_iov_vf_mbx_qid(p_hwfn, vf, false); 2603 if (qid_usage_idx == QED_IOV_QID_INVALID) 2604 goto out; 2605 2606 rc = qed_iov_vf_stop_rxqs(p_hwfn, vf, req->rx_qid, 2607 qid_usage_idx, req->cqe_completion); 2608 if (!rc) 2609 status = PFVF_STATUS_SUCCESS; 2610 out: 2611 qed_iov_prepare_resp(p_hwfn, p_ptt, vf, CHANNEL_TLV_STOP_RXQS, 2612 length, status); 2613 } 2614 2615 static void qed_iov_vf_mbx_stop_txqs(struct qed_hwfn *p_hwfn, 2616 struct qed_ptt *p_ptt, 2617 struct qed_vf_info *vf) 2618 { 2619 u16 length = sizeof(struct pfvf_def_resp_tlv); 2620 struct qed_iov_vf_mbx *mbx = &vf->vf_mbx; 2621 u8 status = PFVF_STATUS_FAILURE; 2622 struct vfpf_stop_txqs_tlv *req; 2623 u8 qid_usage_idx; 2624 int rc; 2625 2626 /* There has never been an official driver that used this interface 2627 * for stopping multiple queues, and it is now considered deprecated. 2628 * Validate this isn't used here. 2629 */ 2630 req = &mbx->req_virt->stop_txqs; 2631 if (req->num_txqs != 1) { 2632 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 2633 "Odd; VF[%d] tried stopping multiple Tx queues\n", 2634 vf->relative_vf_id); 2635 status = PFVF_STATUS_NOT_SUPPORTED; 2636 goto out; 2637 } 2638 2639 /* Find which qid-index is associated with the queue */ 2640 qid_usage_idx = qed_iov_vf_mbx_qid(p_hwfn, vf, true); 2641 if (qid_usage_idx == QED_IOV_QID_INVALID) 2642 goto out; 2643 2644 rc = qed_iov_vf_stop_txqs(p_hwfn, vf, req->tx_qid, qid_usage_idx); 2645 if (!rc) 2646 status = PFVF_STATUS_SUCCESS; 2647 2648 out: 2649 qed_iov_prepare_resp(p_hwfn, p_ptt, vf, CHANNEL_TLV_STOP_TXQS, 2650 length, status); 2651 } 2652 2653 static void qed_iov_vf_mbx_update_rxqs(struct qed_hwfn *p_hwfn, 2654 struct qed_ptt *p_ptt, 2655 struct qed_vf_info *vf) 2656 { 2657 struct qed_queue_cid *handlers[QED_MAX_VF_CHAINS_PER_PF]; 2658 u16 length = sizeof(struct pfvf_def_resp_tlv); 2659 struct qed_iov_vf_mbx *mbx = &vf->vf_mbx; 2660 struct vfpf_update_rxq_tlv *req; 2661 u8 status = PFVF_STATUS_FAILURE; 2662 u8 complete_event_flg; 2663 u8 complete_cqe_flg; 2664 u8 qid_usage_idx; 2665 int rc; 2666 u8 i; 2667 2668 req = &mbx->req_virt->update_rxq; 2669 complete_cqe_flg = !!(req->flags & VFPF_RXQ_UPD_COMPLETE_CQE_FLAG); 2670 complete_event_flg = !!(req->flags & VFPF_RXQ_UPD_COMPLETE_EVENT_FLAG); 2671 2672 qid_usage_idx = qed_iov_vf_mbx_qid(p_hwfn, vf, false); 2673 if (qid_usage_idx == QED_IOV_QID_INVALID) 2674 goto out; 2675 2676 /* There shouldn't exist a VF that uses queue-qids yet uses this 2677 * API with multiple Rx queues. Validate this. 2678 */ 2679 if ((vf->acquire.vfdev_info.capabilities & 2680 VFPF_ACQUIRE_CAP_QUEUE_QIDS) && req->num_rxqs != 1) { 2681 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 2682 "VF[%d] supports QIDs but sends multiple queues\n", 2683 vf->relative_vf_id); 2684 goto out; 2685 } 2686 2687 /* Validate inputs - for the legacy case this is still true since 2688 * qid_usage_idx for each Rx queue would be LEGACY_QID_RX. 2689 */ 2690 for (i = req->rx_qid; i < req->rx_qid + req->num_rxqs; i++) { 2691 if (!qed_iov_validate_rxq(p_hwfn, vf, i, 2692 QED_IOV_VALIDATE_Q_NA) || 2693 !vf->vf_queues[i].cids[qid_usage_idx].p_cid || 2694 vf->vf_queues[i].cids[qid_usage_idx].b_is_tx) { 2695 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 2696 "VF[%d]: Incorrect Rxqs [%04x, %02x]\n", 2697 vf->relative_vf_id, req->rx_qid, 2698 req->num_rxqs); 2699 goto out; 2700 } 2701 } 2702 2703 /* Prepare the handlers */ 2704 for (i = 0; i < req->num_rxqs; i++) { 2705 u16 qid = req->rx_qid + i; 2706 2707 handlers[i] = vf->vf_queues[qid].cids[qid_usage_idx].p_cid; 2708 } 2709 2710 rc = qed_sp_eth_rx_queues_update(p_hwfn, (void **)&handlers, 2711 req->num_rxqs, 2712 complete_cqe_flg, 2713 complete_event_flg, 2714 QED_SPQ_MODE_EBLOCK, NULL); 2715 if (rc) 2716 goto out; 2717 2718 status = PFVF_STATUS_SUCCESS; 2719 out: 2720 qed_iov_prepare_resp(p_hwfn, p_ptt, vf, CHANNEL_TLV_UPDATE_RXQ, 2721 length, status); 2722 } 2723 2724 void *qed_iov_search_list_tlvs(struct qed_hwfn *p_hwfn, 2725 void *p_tlvs_list, u16 req_type) 2726 { 2727 struct channel_tlv *p_tlv = (struct channel_tlv *)p_tlvs_list; 2728 int len = 0; 2729 2730 do { 2731 if (!p_tlv->length) { 2732 DP_NOTICE(p_hwfn, "Zero length TLV found\n"); 2733 return NULL; 2734 } 2735 2736 if (p_tlv->type == req_type) { 2737 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 2738 "Extended tlv type %d, length %d found\n", 2739 p_tlv->type, p_tlv->length); 2740 return p_tlv; 2741 } 2742 2743 len += p_tlv->length; 2744 p_tlv = (struct channel_tlv *)((u8 *)p_tlv + p_tlv->length); 2745 2746 if ((len + p_tlv->length) > TLV_BUFFER_SIZE) { 2747 DP_NOTICE(p_hwfn, "TLVs has overrun the buffer size\n"); 2748 return NULL; 2749 } 2750 } while (p_tlv->type != CHANNEL_TLV_LIST_END); 2751 2752 return NULL; 2753 } 2754 2755 static void 2756 qed_iov_vp_update_act_param(struct qed_hwfn *p_hwfn, 2757 struct qed_sp_vport_update_params *p_data, 2758 struct qed_iov_vf_mbx *p_mbx, u16 *tlvs_mask) 2759 { 2760 struct vfpf_vport_update_activate_tlv *p_act_tlv; 2761 u16 tlv = CHANNEL_TLV_VPORT_UPDATE_ACTIVATE; 2762 2763 p_act_tlv = (struct vfpf_vport_update_activate_tlv *) 2764 qed_iov_search_list_tlvs(p_hwfn, p_mbx->req_virt, tlv); 2765 if (!p_act_tlv) 2766 return; 2767 2768 p_data->update_vport_active_rx_flg = p_act_tlv->update_rx; 2769 p_data->vport_active_rx_flg = p_act_tlv->active_rx; 2770 p_data->update_vport_active_tx_flg = p_act_tlv->update_tx; 2771 p_data->vport_active_tx_flg = p_act_tlv->active_tx; 2772 *tlvs_mask |= 1 << QED_IOV_VP_UPDATE_ACTIVATE; 2773 } 2774 2775 static void 2776 qed_iov_vp_update_vlan_param(struct qed_hwfn *p_hwfn, 2777 struct qed_sp_vport_update_params *p_data, 2778 struct qed_vf_info *p_vf, 2779 struct qed_iov_vf_mbx *p_mbx, u16 *tlvs_mask) 2780 { 2781 struct vfpf_vport_update_vlan_strip_tlv *p_vlan_tlv; 2782 u16 tlv = CHANNEL_TLV_VPORT_UPDATE_VLAN_STRIP; 2783 2784 p_vlan_tlv = (struct vfpf_vport_update_vlan_strip_tlv *) 2785 qed_iov_search_list_tlvs(p_hwfn, p_mbx->req_virt, tlv); 2786 if (!p_vlan_tlv) 2787 return; 2788 2789 p_vf->shadow_config.inner_vlan_removal = p_vlan_tlv->remove_vlan; 2790 2791 /* Ignore the VF request if we're forcing a vlan */ 2792 if (!(p_vf->configured_features & BIT(VLAN_ADDR_FORCED))) { 2793 p_data->update_inner_vlan_removal_flg = 1; 2794 p_data->inner_vlan_removal_flg = p_vlan_tlv->remove_vlan; 2795 } 2796 2797 *tlvs_mask |= 1 << QED_IOV_VP_UPDATE_VLAN_STRIP; 2798 } 2799 2800 static void 2801 qed_iov_vp_update_tx_switch(struct qed_hwfn *p_hwfn, 2802 struct qed_sp_vport_update_params *p_data, 2803 struct qed_iov_vf_mbx *p_mbx, u16 *tlvs_mask) 2804 { 2805 struct vfpf_vport_update_tx_switch_tlv *p_tx_switch_tlv; 2806 u16 tlv = CHANNEL_TLV_VPORT_UPDATE_TX_SWITCH; 2807 2808 p_tx_switch_tlv = (struct vfpf_vport_update_tx_switch_tlv *) 2809 qed_iov_search_list_tlvs(p_hwfn, p_mbx->req_virt, 2810 tlv); 2811 if (!p_tx_switch_tlv) 2812 return; 2813 2814 p_data->update_tx_switching_flg = 1; 2815 p_data->tx_switching_flg = p_tx_switch_tlv->tx_switching; 2816 *tlvs_mask |= 1 << QED_IOV_VP_UPDATE_TX_SWITCH; 2817 } 2818 2819 static void 2820 qed_iov_vp_update_mcast_bin_param(struct qed_hwfn *p_hwfn, 2821 struct qed_sp_vport_update_params *p_data, 2822 struct qed_iov_vf_mbx *p_mbx, u16 *tlvs_mask) 2823 { 2824 struct vfpf_vport_update_mcast_bin_tlv *p_mcast_tlv; 2825 u16 tlv = CHANNEL_TLV_VPORT_UPDATE_MCAST; 2826 2827 p_mcast_tlv = (struct vfpf_vport_update_mcast_bin_tlv *) 2828 qed_iov_search_list_tlvs(p_hwfn, p_mbx->req_virt, tlv); 2829 if (!p_mcast_tlv) 2830 return; 2831 2832 p_data->update_approx_mcast_flg = 1; 2833 memcpy(p_data->bins, p_mcast_tlv->bins, 2834 sizeof(unsigned long) * ETH_MULTICAST_MAC_BINS_IN_REGS); 2835 *tlvs_mask |= 1 << QED_IOV_VP_UPDATE_MCAST; 2836 } 2837 2838 static void 2839 qed_iov_vp_update_accept_flag(struct qed_hwfn *p_hwfn, 2840 struct qed_sp_vport_update_params *p_data, 2841 struct qed_iov_vf_mbx *p_mbx, u16 *tlvs_mask) 2842 { 2843 struct qed_filter_accept_flags *p_flags = &p_data->accept_flags; 2844 struct vfpf_vport_update_accept_param_tlv *p_accept_tlv; 2845 u16 tlv = CHANNEL_TLV_VPORT_UPDATE_ACCEPT_PARAM; 2846 2847 p_accept_tlv = (struct vfpf_vport_update_accept_param_tlv *) 2848 qed_iov_search_list_tlvs(p_hwfn, p_mbx->req_virt, tlv); 2849 if (!p_accept_tlv) 2850 return; 2851 2852 p_flags->update_rx_mode_config = p_accept_tlv->update_rx_mode; 2853 p_flags->rx_accept_filter = p_accept_tlv->rx_accept_filter; 2854 p_flags->update_tx_mode_config = p_accept_tlv->update_tx_mode; 2855 p_flags->tx_accept_filter = p_accept_tlv->tx_accept_filter; 2856 *tlvs_mask |= 1 << QED_IOV_VP_UPDATE_ACCEPT_PARAM; 2857 } 2858 2859 static void 2860 qed_iov_vp_update_accept_any_vlan(struct qed_hwfn *p_hwfn, 2861 struct qed_sp_vport_update_params *p_data, 2862 struct qed_iov_vf_mbx *p_mbx, u16 *tlvs_mask) 2863 { 2864 struct vfpf_vport_update_accept_any_vlan_tlv *p_accept_any_vlan; 2865 u16 tlv = CHANNEL_TLV_VPORT_UPDATE_ACCEPT_ANY_VLAN; 2866 2867 p_accept_any_vlan = (struct vfpf_vport_update_accept_any_vlan_tlv *) 2868 qed_iov_search_list_tlvs(p_hwfn, p_mbx->req_virt, 2869 tlv); 2870 if (!p_accept_any_vlan) 2871 return; 2872 2873 p_data->accept_any_vlan = p_accept_any_vlan->accept_any_vlan; 2874 p_data->update_accept_any_vlan_flg = 2875 p_accept_any_vlan->update_accept_any_vlan_flg; 2876 *tlvs_mask |= 1 << QED_IOV_VP_UPDATE_ACCEPT_ANY_VLAN; 2877 } 2878 2879 static void 2880 qed_iov_vp_update_rss_param(struct qed_hwfn *p_hwfn, 2881 struct qed_vf_info *vf, 2882 struct qed_sp_vport_update_params *p_data, 2883 struct qed_rss_params *p_rss, 2884 struct qed_iov_vf_mbx *p_mbx, 2885 u16 *tlvs_mask, u16 *tlvs_accepted) 2886 { 2887 struct vfpf_vport_update_rss_tlv *p_rss_tlv; 2888 u16 tlv = CHANNEL_TLV_VPORT_UPDATE_RSS; 2889 bool b_reject = false; 2890 u16 table_size; 2891 u16 i, q_idx; 2892 2893 p_rss_tlv = (struct vfpf_vport_update_rss_tlv *) 2894 qed_iov_search_list_tlvs(p_hwfn, p_mbx->req_virt, tlv); 2895 if (!p_rss_tlv) { 2896 p_data->rss_params = NULL; 2897 return; 2898 } 2899 2900 memset(p_rss, 0, sizeof(struct qed_rss_params)); 2901 2902 p_rss->update_rss_config = !!(p_rss_tlv->update_rss_flags & 2903 VFPF_UPDATE_RSS_CONFIG_FLAG); 2904 p_rss->update_rss_capabilities = !!(p_rss_tlv->update_rss_flags & 2905 VFPF_UPDATE_RSS_CAPS_FLAG); 2906 p_rss->update_rss_ind_table = !!(p_rss_tlv->update_rss_flags & 2907 VFPF_UPDATE_RSS_IND_TABLE_FLAG); 2908 p_rss->update_rss_key = !!(p_rss_tlv->update_rss_flags & 2909 VFPF_UPDATE_RSS_KEY_FLAG); 2910 2911 p_rss->rss_enable = p_rss_tlv->rss_enable; 2912 p_rss->rss_eng_id = vf->relative_vf_id + 1; 2913 p_rss->rss_caps = p_rss_tlv->rss_caps; 2914 p_rss->rss_table_size_log = p_rss_tlv->rss_table_size_log; 2915 memcpy(p_rss->rss_key, p_rss_tlv->rss_key, sizeof(p_rss->rss_key)); 2916 2917 table_size = min_t(u16, ARRAY_SIZE(p_rss->rss_ind_table), 2918 (1 << p_rss_tlv->rss_table_size_log)); 2919 2920 for (i = 0; i < table_size; i++) { 2921 struct qed_queue_cid *p_cid; 2922 2923 q_idx = p_rss_tlv->rss_ind_table[i]; 2924 if (!qed_iov_validate_rxq(p_hwfn, vf, q_idx, 2925 QED_IOV_VALIDATE_Q_ENABLE)) { 2926 DP_VERBOSE(p_hwfn, 2927 QED_MSG_IOV, 2928 "VF[%d]: Omitting RSS due to wrong queue %04x\n", 2929 vf->relative_vf_id, q_idx); 2930 b_reject = true; 2931 goto out; 2932 } 2933 2934 p_cid = qed_iov_get_vf_rx_queue_cid(&vf->vf_queues[q_idx]); 2935 p_rss->rss_ind_table[i] = p_cid; 2936 } 2937 2938 p_data->rss_params = p_rss; 2939 out: 2940 *tlvs_mask |= 1 << QED_IOV_VP_UPDATE_RSS; 2941 if (!b_reject) 2942 *tlvs_accepted |= 1 << QED_IOV_VP_UPDATE_RSS; 2943 } 2944 2945 static void 2946 qed_iov_vp_update_sge_tpa_param(struct qed_hwfn *p_hwfn, 2947 struct qed_vf_info *vf, 2948 struct qed_sp_vport_update_params *p_data, 2949 struct qed_sge_tpa_params *p_sge_tpa, 2950 struct qed_iov_vf_mbx *p_mbx, u16 *tlvs_mask) 2951 { 2952 struct vfpf_vport_update_sge_tpa_tlv *p_sge_tpa_tlv; 2953 u16 tlv = CHANNEL_TLV_VPORT_UPDATE_SGE_TPA; 2954 2955 p_sge_tpa_tlv = (struct vfpf_vport_update_sge_tpa_tlv *) 2956 qed_iov_search_list_tlvs(p_hwfn, p_mbx->req_virt, tlv); 2957 2958 if (!p_sge_tpa_tlv) { 2959 p_data->sge_tpa_params = NULL; 2960 return; 2961 } 2962 2963 memset(p_sge_tpa, 0, sizeof(struct qed_sge_tpa_params)); 2964 2965 p_sge_tpa->update_tpa_en_flg = 2966 !!(p_sge_tpa_tlv->update_sge_tpa_flags & VFPF_UPDATE_TPA_EN_FLAG); 2967 p_sge_tpa->update_tpa_param_flg = 2968 !!(p_sge_tpa_tlv->update_sge_tpa_flags & 2969 VFPF_UPDATE_TPA_PARAM_FLAG); 2970 2971 p_sge_tpa->tpa_ipv4_en_flg = 2972 !!(p_sge_tpa_tlv->sge_tpa_flags & VFPF_TPA_IPV4_EN_FLAG); 2973 p_sge_tpa->tpa_ipv6_en_flg = 2974 !!(p_sge_tpa_tlv->sge_tpa_flags & VFPF_TPA_IPV6_EN_FLAG); 2975 p_sge_tpa->tpa_pkt_split_flg = 2976 !!(p_sge_tpa_tlv->sge_tpa_flags & VFPF_TPA_PKT_SPLIT_FLAG); 2977 p_sge_tpa->tpa_hdr_data_split_flg = 2978 !!(p_sge_tpa_tlv->sge_tpa_flags & VFPF_TPA_HDR_DATA_SPLIT_FLAG); 2979 p_sge_tpa->tpa_gro_consistent_flg = 2980 !!(p_sge_tpa_tlv->sge_tpa_flags & VFPF_TPA_GRO_CONSIST_FLAG); 2981 2982 p_sge_tpa->tpa_max_aggs_num = p_sge_tpa_tlv->tpa_max_aggs_num; 2983 p_sge_tpa->tpa_max_size = p_sge_tpa_tlv->tpa_max_size; 2984 p_sge_tpa->tpa_min_size_to_start = p_sge_tpa_tlv->tpa_min_size_to_start; 2985 p_sge_tpa->tpa_min_size_to_cont = p_sge_tpa_tlv->tpa_min_size_to_cont; 2986 p_sge_tpa->max_buffers_per_cqe = p_sge_tpa_tlv->max_buffers_per_cqe; 2987 2988 p_data->sge_tpa_params = p_sge_tpa; 2989 2990 *tlvs_mask |= 1 << QED_IOV_VP_UPDATE_SGE_TPA; 2991 } 2992 2993 static int qed_iov_pre_update_vport(struct qed_hwfn *hwfn, 2994 u8 vfid, 2995 struct qed_sp_vport_update_params *params, 2996 u16 *tlvs) 2997 { 2998 u8 mask = QED_ACCEPT_UCAST_UNMATCHED | QED_ACCEPT_MCAST_UNMATCHED; 2999 struct qed_filter_accept_flags *flags = ¶ms->accept_flags; 3000 struct qed_public_vf_info *vf_info; 3001 3002 /* Untrusted VFs can't even be trusted to know that fact. 3003 * Simply indicate everything is configured fine, and trace 3004 * configuration 'behind their back'. 3005 */ 3006 if (!(*tlvs & BIT(QED_IOV_VP_UPDATE_ACCEPT_PARAM))) 3007 return 0; 3008 3009 vf_info = qed_iov_get_public_vf_info(hwfn, vfid, true); 3010 3011 if (flags->update_rx_mode_config) { 3012 vf_info->rx_accept_mode = flags->rx_accept_filter; 3013 if (!vf_info->is_trusted_configured) 3014 flags->rx_accept_filter &= ~mask; 3015 } 3016 3017 if (flags->update_tx_mode_config) { 3018 vf_info->tx_accept_mode = flags->tx_accept_filter; 3019 if (!vf_info->is_trusted_configured) 3020 flags->tx_accept_filter &= ~mask; 3021 } 3022 3023 return 0; 3024 } 3025 3026 static void qed_iov_vf_mbx_vport_update(struct qed_hwfn *p_hwfn, 3027 struct qed_ptt *p_ptt, 3028 struct qed_vf_info *vf) 3029 { 3030 struct qed_rss_params *p_rss_params = NULL; 3031 struct qed_sp_vport_update_params params; 3032 struct qed_iov_vf_mbx *mbx = &vf->vf_mbx; 3033 struct qed_sge_tpa_params sge_tpa_params; 3034 u16 tlvs_mask = 0, tlvs_accepted = 0; 3035 u8 status = PFVF_STATUS_SUCCESS; 3036 u16 length; 3037 int rc; 3038 3039 /* Valiate PF can send such a request */ 3040 if (!vf->vport_instance) { 3041 DP_VERBOSE(p_hwfn, 3042 QED_MSG_IOV, 3043 "No VPORT instance available for VF[%d], failing vport update\n", 3044 vf->abs_vf_id); 3045 status = PFVF_STATUS_FAILURE; 3046 goto out; 3047 } 3048 p_rss_params = vzalloc(sizeof(*p_rss_params)); 3049 if (p_rss_params == NULL) { 3050 status = PFVF_STATUS_FAILURE; 3051 goto out; 3052 } 3053 3054 memset(¶ms, 0, sizeof(params)); 3055 params.opaque_fid = vf->opaque_fid; 3056 params.vport_id = vf->vport_id; 3057 params.rss_params = NULL; 3058 3059 /* Search for extended tlvs list and update values 3060 * from VF in struct qed_sp_vport_update_params. 3061 */ 3062 qed_iov_vp_update_act_param(p_hwfn, ¶ms, mbx, &tlvs_mask); 3063 qed_iov_vp_update_vlan_param(p_hwfn, ¶ms, vf, mbx, &tlvs_mask); 3064 qed_iov_vp_update_tx_switch(p_hwfn, ¶ms, mbx, &tlvs_mask); 3065 qed_iov_vp_update_mcast_bin_param(p_hwfn, ¶ms, mbx, &tlvs_mask); 3066 qed_iov_vp_update_accept_flag(p_hwfn, ¶ms, mbx, &tlvs_mask); 3067 qed_iov_vp_update_accept_any_vlan(p_hwfn, ¶ms, mbx, &tlvs_mask); 3068 qed_iov_vp_update_sge_tpa_param(p_hwfn, vf, ¶ms, 3069 &sge_tpa_params, mbx, &tlvs_mask); 3070 3071 tlvs_accepted = tlvs_mask; 3072 3073 /* Some of the extended TLVs need to be validated first; In that case, 3074 * they can update the mask without updating the accepted [so that 3075 * PF could communicate to VF it has rejected request]. 3076 */ 3077 qed_iov_vp_update_rss_param(p_hwfn, vf, ¶ms, p_rss_params, 3078 mbx, &tlvs_mask, &tlvs_accepted); 3079 3080 if (qed_iov_pre_update_vport(p_hwfn, vf->relative_vf_id, 3081 ¶ms, &tlvs_accepted)) { 3082 tlvs_accepted = 0; 3083 status = PFVF_STATUS_NOT_SUPPORTED; 3084 goto out; 3085 } 3086 3087 if (!tlvs_accepted) { 3088 if (tlvs_mask) 3089 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 3090 "Upper-layer prevents VF vport configuration\n"); 3091 else 3092 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 3093 "No feature tlvs found for vport update\n"); 3094 status = PFVF_STATUS_NOT_SUPPORTED; 3095 goto out; 3096 } 3097 3098 rc = qed_sp_vport_update(p_hwfn, ¶ms, QED_SPQ_MODE_EBLOCK, NULL); 3099 3100 if (rc) 3101 status = PFVF_STATUS_FAILURE; 3102 3103 out: 3104 vfree(p_rss_params); 3105 length = qed_iov_prep_vp_update_resp_tlvs(p_hwfn, vf, mbx, status, 3106 tlvs_mask, tlvs_accepted); 3107 qed_iov_send_response(p_hwfn, p_ptt, vf, length, status); 3108 } 3109 3110 static int qed_iov_vf_update_vlan_shadow(struct qed_hwfn *p_hwfn, 3111 struct qed_vf_info *p_vf, 3112 struct qed_filter_ucast *p_params) 3113 { 3114 int i; 3115 3116 /* First remove entries and then add new ones */ 3117 if (p_params->opcode == QED_FILTER_REMOVE) { 3118 for (i = 0; i < QED_ETH_VF_NUM_VLAN_FILTERS + 1; i++) 3119 if (p_vf->shadow_config.vlans[i].used && 3120 p_vf->shadow_config.vlans[i].vid == 3121 p_params->vlan) { 3122 p_vf->shadow_config.vlans[i].used = false; 3123 break; 3124 } 3125 if (i == QED_ETH_VF_NUM_VLAN_FILTERS + 1) { 3126 DP_VERBOSE(p_hwfn, 3127 QED_MSG_IOV, 3128 "VF [%d] - Tries to remove a non-existing vlan\n", 3129 p_vf->relative_vf_id); 3130 return -EINVAL; 3131 } 3132 } else if (p_params->opcode == QED_FILTER_REPLACE || 3133 p_params->opcode == QED_FILTER_FLUSH) { 3134 for (i = 0; i < QED_ETH_VF_NUM_VLAN_FILTERS + 1; i++) 3135 p_vf->shadow_config.vlans[i].used = false; 3136 } 3137 3138 /* In forced mode, we're willing to remove entries - but we don't add 3139 * new ones. 3140 */ 3141 if (p_vf->bulletin.p_virt->valid_bitmap & BIT(VLAN_ADDR_FORCED)) 3142 return 0; 3143 3144 if (p_params->opcode == QED_FILTER_ADD || 3145 p_params->opcode == QED_FILTER_REPLACE) { 3146 for (i = 0; i < QED_ETH_VF_NUM_VLAN_FILTERS + 1; i++) { 3147 if (p_vf->shadow_config.vlans[i].used) 3148 continue; 3149 3150 p_vf->shadow_config.vlans[i].used = true; 3151 p_vf->shadow_config.vlans[i].vid = p_params->vlan; 3152 break; 3153 } 3154 3155 if (i == QED_ETH_VF_NUM_VLAN_FILTERS + 1) { 3156 DP_VERBOSE(p_hwfn, 3157 QED_MSG_IOV, 3158 "VF [%d] - Tries to configure more than %d vlan filters\n", 3159 p_vf->relative_vf_id, 3160 QED_ETH_VF_NUM_VLAN_FILTERS + 1); 3161 return -EINVAL; 3162 } 3163 } 3164 3165 return 0; 3166 } 3167 3168 static int qed_iov_vf_update_mac_shadow(struct qed_hwfn *p_hwfn, 3169 struct qed_vf_info *p_vf, 3170 struct qed_filter_ucast *p_params) 3171 { 3172 int i; 3173 3174 /* If we're in forced-mode, we don't allow any change */ 3175 if (p_vf->bulletin.p_virt->valid_bitmap & BIT(MAC_ADDR_FORCED)) 3176 return 0; 3177 3178 /* Don't keep track of shadow copy since we don't intend to restore. */ 3179 if (p_vf->p_vf_info.is_trusted_configured) 3180 return 0; 3181 3182 /* First remove entries and then add new ones */ 3183 if (p_params->opcode == QED_FILTER_REMOVE) { 3184 for (i = 0; i < QED_ETH_VF_NUM_MAC_FILTERS; i++) { 3185 if (ether_addr_equal(p_vf->shadow_config.macs[i], 3186 p_params->mac)) { 3187 eth_zero_addr(p_vf->shadow_config.macs[i]); 3188 break; 3189 } 3190 } 3191 3192 if (i == QED_ETH_VF_NUM_MAC_FILTERS) { 3193 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 3194 "MAC isn't configured\n"); 3195 return -EINVAL; 3196 } 3197 } else if (p_params->opcode == QED_FILTER_REPLACE || 3198 p_params->opcode == QED_FILTER_FLUSH) { 3199 for (i = 0; i < QED_ETH_VF_NUM_MAC_FILTERS; i++) 3200 eth_zero_addr(p_vf->shadow_config.macs[i]); 3201 } 3202 3203 /* List the new MAC address */ 3204 if (p_params->opcode != QED_FILTER_ADD && 3205 p_params->opcode != QED_FILTER_REPLACE) 3206 return 0; 3207 3208 for (i = 0; i < QED_ETH_VF_NUM_MAC_FILTERS; i++) { 3209 if (is_zero_ether_addr(p_vf->shadow_config.macs[i])) { 3210 ether_addr_copy(p_vf->shadow_config.macs[i], 3211 p_params->mac); 3212 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 3213 "Added MAC at %d entry in shadow\n", i); 3214 break; 3215 } 3216 } 3217 3218 if (i == QED_ETH_VF_NUM_MAC_FILTERS) { 3219 DP_VERBOSE(p_hwfn, QED_MSG_IOV, "No available place for MAC\n"); 3220 return -EINVAL; 3221 } 3222 3223 return 0; 3224 } 3225 3226 static int 3227 qed_iov_vf_update_unicast_shadow(struct qed_hwfn *p_hwfn, 3228 struct qed_vf_info *p_vf, 3229 struct qed_filter_ucast *p_params) 3230 { 3231 int rc = 0; 3232 3233 if (p_params->type == QED_FILTER_MAC) { 3234 rc = qed_iov_vf_update_mac_shadow(p_hwfn, p_vf, p_params); 3235 if (rc) 3236 return rc; 3237 } 3238 3239 if (p_params->type == QED_FILTER_VLAN) 3240 rc = qed_iov_vf_update_vlan_shadow(p_hwfn, p_vf, p_params); 3241 3242 return rc; 3243 } 3244 3245 static int qed_iov_chk_ucast(struct qed_hwfn *hwfn, 3246 int vfid, struct qed_filter_ucast *params) 3247 { 3248 struct qed_public_vf_info *vf; 3249 3250 vf = qed_iov_get_public_vf_info(hwfn, vfid, true); 3251 if (!vf) 3252 return -EINVAL; 3253 3254 /* No real decision to make; Store the configured MAC */ 3255 if (params->type == QED_FILTER_MAC || 3256 params->type == QED_FILTER_MAC_VLAN) { 3257 ether_addr_copy(vf->mac, params->mac); 3258 3259 if (vf->is_trusted_configured) { 3260 qed_iov_bulletin_set_mac(hwfn, vf->mac, vfid); 3261 3262 /* Update and post bulleitin again */ 3263 qed_schedule_iov(hwfn, QED_IOV_WQ_BULLETIN_UPDATE_FLAG); 3264 } 3265 } 3266 3267 return 0; 3268 } 3269 3270 static void qed_iov_vf_mbx_ucast_filter(struct qed_hwfn *p_hwfn, 3271 struct qed_ptt *p_ptt, 3272 struct qed_vf_info *vf) 3273 { 3274 struct qed_bulletin_content *p_bulletin = vf->bulletin.p_virt; 3275 struct qed_iov_vf_mbx *mbx = &vf->vf_mbx; 3276 struct vfpf_ucast_filter_tlv *req; 3277 u8 status = PFVF_STATUS_SUCCESS; 3278 struct qed_filter_ucast params; 3279 int rc; 3280 3281 /* Prepare the unicast filter params */ 3282 memset(¶ms, 0, sizeof(struct qed_filter_ucast)); 3283 req = &mbx->req_virt->ucast_filter; 3284 params.opcode = (enum qed_filter_opcode)req->opcode; 3285 params.type = (enum qed_filter_ucast_type)req->type; 3286 3287 params.is_rx_filter = 1; 3288 params.is_tx_filter = 1; 3289 params.vport_to_remove_from = vf->vport_id; 3290 params.vport_to_add_to = vf->vport_id; 3291 memcpy(params.mac, req->mac, ETH_ALEN); 3292 params.vlan = req->vlan; 3293 3294 DP_VERBOSE(p_hwfn, 3295 QED_MSG_IOV, 3296 "VF[%d]: opcode 0x%02x type 0x%02x [%s %s] [vport 0x%02x] MAC %02x:%02x:%02x:%02x:%02x:%02x, vlan 0x%04x\n", 3297 vf->abs_vf_id, params.opcode, params.type, 3298 params.is_rx_filter ? "RX" : "", 3299 params.is_tx_filter ? "TX" : "", 3300 params.vport_to_add_to, 3301 params.mac[0], params.mac[1], 3302 params.mac[2], params.mac[3], 3303 params.mac[4], params.mac[5], params.vlan); 3304 3305 if (!vf->vport_instance) { 3306 DP_VERBOSE(p_hwfn, 3307 QED_MSG_IOV, 3308 "No VPORT instance available for VF[%d], failing ucast MAC configuration\n", 3309 vf->abs_vf_id); 3310 status = PFVF_STATUS_FAILURE; 3311 goto out; 3312 } 3313 3314 /* Update shadow copy of the VF configuration */ 3315 if (qed_iov_vf_update_unicast_shadow(p_hwfn, vf, ¶ms)) { 3316 status = PFVF_STATUS_FAILURE; 3317 goto out; 3318 } 3319 3320 /* Determine if the unicast filtering is acceptible by PF */ 3321 if ((p_bulletin->valid_bitmap & BIT(VLAN_ADDR_FORCED)) && 3322 (params.type == QED_FILTER_VLAN || 3323 params.type == QED_FILTER_MAC_VLAN)) { 3324 /* Once VLAN is forced or PVID is set, do not allow 3325 * to add/replace any further VLANs. 3326 */ 3327 if (params.opcode == QED_FILTER_ADD || 3328 params.opcode == QED_FILTER_REPLACE) 3329 status = PFVF_STATUS_FORCED; 3330 goto out; 3331 } 3332 3333 if ((p_bulletin->valid_bitmap & BIT(MAC_ADDR_FORCED)) && 3334 (params.type == QED_FILTER_MAC || 3335 params.type == QED_FILTER_MAC_VLAN)) { 3336 if (!ether_addr_equal(p_bulletin->mac, params.mac) || 3337 (params.opcode != QED_FILTER_ADD && 3338 params.opcode != QED_FILTER_REPLACE)) 3339 status = PFVF_STATUS_FORCED; 3340 goto out; 3341 } 3342 3343 rc = qed_iov_chk_ucast(p_hwfn, vf->relative_vf_id, ¶ms); 3344 if (rc) { 3345 status = PFVF_STATUS_FAILURE; 3346 goto out; 3347 } 3348 3349 rc = qed_sp_eth_filter_ucast(p_hwfn, vf->opaque_fid, ¶ms, 3350 QED_SPQ_MODE_CB, NULL); 3351 if (rc) 3352 status = PFVF_STATUS_FAILURE; 3353 3354 out: 3355 qed_iov_prepare_resp(p_hwfn, p_ptt, vf, CHANNEL_TLV_UCAST_FILTER, 3356 sizeof(struct pfvf_def_resp_tlv), status); 3357 } 3358 3359 static void qed_iov_vf_mbx_int_cleanup(struct qed_hwfn *p_hwfn, 3360 struct qed_ptt *p_ptt, 3361 struct qed_vf_info *vf) 3362 { 3363 int i; 3364 3365 /* Reset the SBs */ 3366 for (i = 0; i < vf->num_sbs; i++) 3367 qed_int_igu_init_pure_rt_single(p_hwfn, p_ptt, 3368 vf->igu_sbs[i], 3369 vf->opaque_fid, false); 3370 3371 qed_iov_prepare_resp(p_hwfn, p_ptt, vf, CHANNEL_TLV_INT_CLEANUP, 3372 sizeof(struct pfvf_def_resp_tlv), 3373 PFVF_STATUS_SUCCESS); 3374 } 3375 3376 static void qed_iov_vf_mbx_close(struct qed_hwfn *p_hwfn, 3377 struct qed_ptt *p_ptt, struct qed_vf_info *vf) 3378 { 3379 u16 length = sizeof(struct pfvf_def_resp_tlv); 3380 u8 status = PFVF_STATUS_SUCCESS; 3381 3382 /* Disable Interrupts for VF */ 3383 qed_iov_vf_igu_set_int(p_hwfn, p_ptt, vf, 0); 3384 3385 /* Reset Permission table */ 3386 qed_iov_config_perm_table(p_hwfn, p_ptt, vf, 0); 3387 3388 qed_iov_prepare_resp(p_hwfn, p_ptt, vf, CHANNEL_TLV_CLOSE, 3389 length, status); 3390 } 3391 3392 static void qed_iov_vf_mbx_release(struct qed_hwfn *p_hwfn, 3393 struct qed_ptt *p_ptt, 3394 struct qed_vf_info *p_vf) 3395 { 3396 u16 length = sizeof(struct pfvf_def_resp_tlv); 3397 u8 status = PFVF_STATUS_SUCCESS; 3398 int rc = 0; 3399 3400 qed_iov_vf_cleanup(p_hwfn, p_vf); 3401 3402 if (p_vf->state != VF_STOPPED && p_vf->state != VF_FREE) { 3403 /* Stopping the VF */ 3404 rc = qed_sp_vf_stop(p_hwfn, p_vf->concrete_fid, 3405 p_vf->opaque_fid); 3406 3407 if (rc) { 3408 DP_ERR(p_hwfn, "qed_sp_vf_stop returned error %d\n", 3409 rc); 3410 status = PFVF_STATUS_FAILURE; 3411 } 3412 3413 p_vf->state = VF_STOPPED; 3414 } 3415 3416 qed_iov_prepare_resp(p_hwfn, p_ptt, p_vf, CHANNEL_TLV_RELEASE, 3417 length, status); 3418 } 3419 3420 static void qed_iov_vf_pf_get_coalesce(struct qed_hwfn *p_hwfn, 3421 struct qed_ptt *p_ptt, 3422 struct qed_vf_info *p_vf) 3423 { 3424 struct qed_iov_vf_mbx *mbx = &p_vf->vf_mbx; 3425 struct pfvf_read_coal_resp_tlv *p_resp; 3426 struct vfpf_read_coal_req_tlv *req; 3427 u8 status = PFVF_STATUS_FAILURE; 3428 struct qed_vf_queue *p_queue; 3429 struct qed_queue_cid *p_cid; 3430 u16 coal = 0, qid, i; 3431 bool b_is_rx; 3432 int rc = 0; 3433 3434 mbx->offset = (u8 *)mbx->reply_virt; 3435 req = &mbx->req_virt->read_coal_req; 3436 3437 qid = req->qid; 3438 b_is_rx = req->is_rx ? true : false; 3439 3440 if (b_is_rx) { 3441 if (!qed_iov_validate_rxq(p_hwfn, p_vf, qid, 3442 QED_IOV_VALIDATE_Q_ENABLE)) { 3443 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 3444 "VF[%d]: Invalid Rx queue_id = %d\n", 3445 p_vf->abs_vf_id, qid); 3446 goto send_resp; 3447 } 3448 3449 p_cid = qed_iov_get_vf_rx_queue_cid(&p_vf->vf_queues[qid]); 3450 rc = qed_get_rxq_coalesce(p_hwfn, p_ptt, p_cid, &coal); 3451 if (rc) 3452 goto send_resp; 3453 } else { 3454 if (!qed_iov_validate_txq(p_hwfn, p_vf, qid, 3455 QED_IOV_VALIDATE_Q_ENABLE)) { 3456 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 3457 "VF[%d]: Invalid Tx queue_id = %d\n", 3458 p_vf->abs_vf_id, qid); 3459 goto send_resp; 3460 } 3461 for (i = 0; i < MAX_QUEUES_PER_QZONE; i++) { 3462 p_queue = &p_vf->vf_queues[qid]; 3463 if ((!p_queue->cids[i].p_cid) || 3464 (!p_queue->cids[i].b_is_tx)) 3465 continue; 3466 3467 p_cid = p_queue->cids[i].p_cid; 3468 3469 rc = qed_get_txq_coalesce(p_hwfn, p_ptt, p_cid, &coal); 3470 if (rc) 3471 goto send_resp; 3472 break; 3473 } 3474 } 3475 3476 status = PFVF_STATUS_SUCCESS; 3477 3478 send_resp: 3479 p_resp = qed_add_tlv(p_hwfn, &mbx->offset, CHANNEL_TLV_COALESCE_READ, 3480 sizeof(*p_resp)); 3481 p_resp->coal = coal; 3482 3483 qed_add_tlv(p_hwfn, &mbx->offset, CHANNEL_TLV_LIST_END, 3484 sizeof(struct channel_list_end_tlv)); 3485 3486 qed_iov_send_response(p_hwfn, p_ptt, p_vf, sizeof(*p_resp), status); 3487 } 3488 3489 static void qed_iov_vf_pf_set_coalesce(struct qed_hwfn *p_hwfn, 3490 struct qed_ptt *p_ptt, 3491 struct qed_vf_info *vf) 3492 { 3493 struct qed_iov_vf_mbx *mbx = &vf->vf_mbx; 3494 struct vfpf_update_coalesce *req; 3495 u8 status = PFVF_STATUS_FAILURE; 3496 struct qed_queue_cid *p_cid; 3497 u16 rx_coal, tx_coal; 3498 int rc = 0, i; 3499 u16 qid; 3500 3501 req = &mbx->req_virt->update_coalesce; 3502 3503 rx_coal = req->rx_coal; 3504 tx_coal = req->tx_coal; 3505 qid = req->qid; 3506 3507 if (!qed_iov_validate_rxq(p_hwfn, vf, qid, 3508 QED_IOV_VALIDATE_Q_ENABLE) && rx_coal) { 3509 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 3510 "VF[%d]: Invalid Rx queue_id = %d\n", 3511 vf->abs_vf_id, qid); 3512 goto out; 3513 } 3514 3515 if (!qed_iov_validate_txq(p_hwfn, vf, qid, 3516 QED_IOV_VALIDATE_Q_ENABLE) && tx_coal) { 3517 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 3518 "VF[%d]: Invalid Tx queue_id = %d\n", 3519 vf->abs_vf_id, qid); 3520 goto out; 3521 } 3522 3523 DP_VERBOSE(p_hwfn, 3524 QED_MSG_IOV, 3525 "VF[%d]: Setting coalesce for VF rx_coal = %d, tx_coal = %d at queue = %d\n", 3526 vf->abs_vf_id, rx_coal, tx_coal, qid); 3527 3528 if (rx_coal) { 3529 p_cid = qed_iov_get_vf_rx_queue_cid(&vf->vf_queues[qid]); 3530 3531 rc = qed_set_rxq_coalesce(p_hwfn, p_ptt, rx_coal, p_cid); 3532 if (rc) { 3533 DP_VERBOSE(p_hwfn, 3534 QED_MSG_IOV, 3535 "VF[%d]: Unable to set rx queue = %d coalesce\n", 3536 vf->abs_vf_id, vf->vf_queues[qid].fw_rx_qid); 3537 goto out; 3538 } 3539 vf->rx_coal = rx_coal; 3540 } 3541 3542 if (tx_coal) { 3543 struct qed_vf_queue *p_queue = &vf->vf_queues[qid]; 3544 3545 for (i = 0; i < MAX_QUEUES_PER_QZONE; i++) { 3546 if (!p_queue->cids[i].p_cid) 3547 continue; 3548 3549 if (!p_queue->cids[i].b_is_tx) 3550 continue; 3551 3552 rc = qed_set_txq_coalesce(p_hwfn, p_ptt, tx_coal, 3553 p_queue->cids[i].p_cid); 3554 3555 if (rc) { 3556 DP_VERBOSE(p_hwfn, 3557 QED_MSG_IOV, 3558 "VF[%d]: Unable to set tx queue coalesce\n", 3559 vf->abs_vf_id); 3560 goto out; 3561 } 3562 } 3563 vf->tx_coal = tx_coal; 3564 } 3565 3566 status = PFVF_STATUS_SUCCESS; 3567 out: 3568 qed_iov_prepare_resp(p_hwfn, p_ptt, vf, CHANNEL_TLV_COALESCE_UPDATE, 3569 sizeof(struct pfvf_def_resp_tlv), status); 3570 } 3571 static int 3572 qed_iov_vf_flr_poll_dorq(struct qed_hwfn *p_hwfn, 3573 struct qed_vf_info *p_vf, struct qed_ptt *p_ptt) 3574 { 3575 int cnt; 3576 u32 val; 3577 3578 qed_fid_pretend(p_hwfn, p_ptt, (u16) p_vf->concrete_fid); 3579 3580 for (cnt = 0; cnt < 50; cnt++) { 3581 val = qed_rd(p_hwfn, p_ptt, DORQ_REG_VF_USAGE_CNT); 3582 if (!val) 3583 break; 3584 msleep(20); 3585 } 3586 qed_fid_pretend(p_hwfn, p_ptt, (u16) p_hwfn->hw_info.concrete_fid); 3587 3588 if (cnt == 50) { 3589 DP_ERR(p_hwfn, 3590 "VF[%d] - dorq failed to cleanup [usage 0x%08x]\n", 3591 p_vf->abs_vf_id, val); 3592 return -EBUSY; 3593 } 3594 3595 return 0; 3596 } 3597 3598 static int 3599 qed_iov_vf_flr_poll_pbf(struct qed_hwfn *p_hwfn, 3600 struct qed_vf_info *p_vf, struct qed_ptt *p_ptt) 3601 { 3602 u32 cons[MAX_NUM_VOQS_E4], distance[MAX_NUM_VOQS_E4]; 3603 int i, cnt; 3604 3605 /* Read initial consumers & producers */ 3606 for (i = 0; i < MAX_NUM_VOQS_E4; i++) { 3607 u32 prod; 3608 3609 cons[i] = qed_rd(p_hwfn, p_ptt, 3610 PBF_REG_NUM_BLOCKS_ALLOCATED_CONS_VOQ0 + 3611 i * 0x40); 3612 prod = qed_rd(p_hwfn, p_ptt, 3613 PBF_REG_NUM_BLOCKS_ALLOCATED_PROD_VOQ0 + 3614 i * 0x40); 3615 distance[i] = prod - cons[i]; 3616 } 3617 3618 /* Wait for consumers to pass the producers */ 3619 i = 0; 3620 for (cnt = 0; cnt < 50; cnt++) { 3621 for (; i < MAX_NUM_VOQS_E4; i++) { 3622 u32 tmp; 3623 3624 tmp = qed_rd(p_hwfn, p_ptt, 3625 PBF_REG_NUM_BLOCKS_ALLOCATED_CONS_VOQ0 + 3626 i * 0x40); 3627 if (distance[i] > tmp - cons[i]) 3628 break; 3629 } 3630 3631 if (i == MAX_NUM_VOQS_E4) 3632 break; 3633 3634 msleep(20); 3635 } 3636 3637 if (cnt == 50) { 3638 DP_ERR(p_hwfn, "VF[%d] - pbf polling failed on VOQ %d\n", 3639 p_vf->abs_vf_id, i); 3640 return -EBUSY; 3641 } 3642 3643 return 0; 3644 } 3645 3646 static int qed_iov_vf_flr_poll(struct qed_hwfn *p_hwfn, 3647 struct qed_vf_info *p_vf, struct qed_ptt *p_ptt) 3648 { 3649 int rc; 3650 3651 rc = qed_iov_vf_flr_poll_dorq(p_hwfn, p_vf, p_ptt); 3652 if (rc) 3653 return rc; 3654 3655 rc = qed_iov_vf_flr_poll_pbf(p_hwfn, p_vf, p_ptt); 3656 if (rc) 3657 return rc; 3658 3659 return 0; 3660 } 3661 3662 static int 3663 qed_iov_execute_vf_flr_cleanup(struct qed_hwfn *p_hwfn, 3664 struct qed_ptt *p_ptt, 3665 u16 rel_vf_id, u32 *ack_vfs) 3666 { 3667 struct qed_vf_info *p_vf; 3668 int rc = 0; 3669 3670 p_vf = qed_iov_get_vf_info(p_hwfn, rel_vf_id, false); 3671 if (!p_vf) 3672 return 0; 3673 3674 if (p_hwfn->pf_iov_info->pending_flr[rel_vf_id / 64] & 3675 (1ULL << (rel_vf_id % 64))) { 3676 u16 vfid = p_vf->abs_vf_id; 3677 3678 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 3679 "VF[%d] - Handling FLR\n", vfid); 3680 3681 qed_iov_vf_cleanup(p_hwfn, p_vf); 3682 3683 /* If VF isn't active, no need for anything but SW */ 3684 if (!p_vf->b_init) 3685 goto cleanup; 3686 3687 rc = qed_iov_vf_flr_poll(p_hwfn, p_vf, p_ptt); 3688 if (rc) 3689 goto cleanup; 3690 3691 rc = qed_final_cleanup(p_hwfn, p_ptt, vfid, true); 3692 if (rc) { 3693 DP_ERR(p_hwfn, "Failed handle FLR of VF[%d]\n", vfid); 3694 return rc; 3695 } 3696 3697 /* Workaround to make VF-PF channel ready, as FW 3698 * doesn't do that as a part of FLR. 3699 */ 3700 REG_WR(p_hwfn, 3701 GTT_BAR0_MAP_REG_USDM_RAM + 3702 USTORM_VF_PF_CHANNEL_READY_OFFSET(vfid), 1); 3703 3704 /* VF_STOPPED has to be set only after final cleanup 3705 * but prior to re-enabling the VF. 3706 */ 3707 p_vf->state = VF_STOPPED; 3708 3709 rc = qed_iov_enable_vf_access(p_hwfn, p_ptt, p_vf); 3710 if (rc) { 3711 DP_ERR(p_hwfn, "Failed to re-enable VF[%d] acces\n", 3712 vfid); 3713 return rc; 3714 } 3715 cleanup: 3716 /* Mark VF for ack and clean pending state */ 3717 if (p_vf->state == VF_RESET) 3718 p_vf->state = VF_STOPPED; 3719 ack_vfs[vfid / 32] |= BIT((vfid % 32)); 3720 p_hwfn->pf_iov_info->pending_flr[rel_vf_id / 64] &= 3721 ~(1ULL << (rel_vf_id % 64)); 3722 p_vf->vf_mbx.b_pending_msg = false; 3723 } 3724 3725 return rc; 3726 } 3727 3728 static int 3729 qed_iov_vf_flr_cleanup(struct qed_hwfn *p_hwfn, struct qed_ptt *p_ptt) 3730 { 3731 u32 ack_vfs[VF_MAX_STATIC / 32]; 3732 int rc = 0; 3733 u16 i; 3734 3735 memset(ack_vfs, 0, sizeof(u32) * (VF_MAX_STATIC / 32)); 3736 3737 /* Since BRB <-> PRS interface can't be tested as part of the flr 3738 * polling due to HW limitations, simply sleep a bit. And since 3739 * there's no need to wait per-vf, do it before looping. 3740 */ 3741 msleep(100); 3742 3743 for (i = 0; i < p_hwfn->cdev->p_iov_info->total_vfs; i++) 3744 qed_iov_execute_vf_flr_cleanup(p_hwfn, p_ptt, i, ack_vfs); 3745 3746 rc = qed_mcp_ack_vf_flr(p_hwfn, p_ptt, ack_vfs); 3747 return rc; 3748 } 3749 3750 bool qed_iov_mark_vf_flr(struct qed_hwfn *p_hwfn, u32 *p_disabled_vfs) 3751 { 3752 bool found = false; 3753 u16 i; 3754 3755 DP_VERBOSE(p_hwfn, QED_MSG_IOV, "Marking FLR-ed VFs\n"); 3756 for (i = 0; i < (VF_MAX_STATIC / 32); i++) 3757 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 3758 "[%08x,...,%08x]: %08x\n", 3759 i * 32, (i + 1) * 32 - 1, p_disabled_vfs[i]); 3760 3761 if (!p_hwfn->cdev->p_iov_info) { 3762 DP_NOTICE(p_hwfn, "VF flr but no IOV\n"); 3763 return false; 3764 } 3765 3766 /* Mark VFs */ 3767 for (i = 0; i < p_hwfn->cdev->p_iov_info->total_vfs; i++) { 3768 struct qed_vf_info *p_vf; 3769 u8 vfid; 3770 3771 p_vf = qed_iov_get_vf_info(p_hwfn, i, false); 3772 if (!p_vf) 3773 continue; 3774 3775 vfid = p_vf->abs_vf_id; 3776 if (BIT((vfid % 32)) & p_disabled_vfs[vfid / 32]) { 3777 u64 *p_flr = p_hwfn->pf_iov_info->pending_flr; 3778 u16 rel_vf_id = p_vf->relative_vf_id; 3779 3780 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 3781 "VF[%d] [rel %d] got FLR-ed\n", 3782 vfid, rel_vf_id); 3783 3784 p_vf->state = VF_RESET; 3785 3786 /* No need to lock here, since pending_flr should 3787 * only change here and before ACKing MFw. Since 3788 * MFW will not trigger an additional attention for 3789 * VF flr until ACKs, we're safe. 3790 */ 3791 p_flr[rel_vf_id / 64] |= 1ULL << (rel_vf_id % 64); 3792 found = true; 3793 } 3794 } 3795 3796 return found; 3797 } 3798 3799 static void qed_iov_get_link(struct qed_hwfn *p_hwfn, 3800 u16 vfid, 3801 struct qed_mcp_link_params *p_params, 3802 struct qed_mcp_link_state *p_link, 3803 struct qed_mcp_link_capabilities *p_caps) 3804 { 3805 struct qed_vf_info *p_vf = qed_iov_get_vf_info(p_hwfn, 3806 vfid, 3807 false); 3808 struct qed_bulletin_content *p_bulletin; 3809 3810 if (!p_vf) 3811 return; 3812 3813 p_bulletin = p_vf->bulletin.p_virt; 3814 3815 if (p_params) 3816 __qed_vf_get_link_params(p_hwfn, p_params, p_bulletin); 3817 if (p_link) 3818 __qed_vf_get_link_state(p_hwfn, p_link, p_bulletin); 3819 if (p_caps) 3820 __qed_vf_get_link_caps(p_hwfn, p_caps, p_bulletin); 3821 } 3822 3823 static int 3824 qed_iov_vf_pf_bulletin_update_mac(struct qed_hwfn *p_hwfn, 3825 struct qed_ptt *p_ptt, 3826 struct qed_vf_info *p_vf) 3827 { 3828 struct qed_bulletin_content *p_bulletin = p_vf->bulletin.p_virt; 3829 struct qed_iov_vf_mbx *mbx = &p_vf->vf_mbx; 3830 struct vfpf_bulletin_update_mac_tlv *p_req; 3831 u8 status = PFVF_STATUS_SUCCESS; 3832 int rc = 0; 3833 3834 if (!p_vf->p_vf_info.is_trusted_configured) { 3835 DP_VERBOSE(p_hwfn, 3836 QED_MSG_IOV, 3837 "Blocking bulletin update request from untrusted VF[%d]\n", 3838 p_vf->abs_vf_id); 3839 status = PFVF_STATUS_NOT_SUPPORTED; 3840 rc = -EINVAL; 3841 goto send_status; 3842 } 3843 3844 p_req = &mbx->req_virt->bulletin_update_mac; 3845 ether_addr_copy(p_bulletin->mac, p_req->mac); 3846 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 3847 "Updated bulletin of VF[%d] with requested MAC[%pM]\n", 3848 p_vf->abs_vf_id, p_req->mac); 3849 3850 send_status: 3851 qed_iov_prepare_resp(p_hwfn, p_ptt, p_vf, 3852 CHANNEL_TLV_BULLETIN_UPDATE_MAC, 3853 sizeof(struct pfvf_def_resp_tlv), status); 3854 return rc; 3855 } 3856 3857 static void qed_iov_process_mbx_req(struct qed_hwfn *p_hwfn, 3858 struct qed_ptt *p_ptt, int vfid) 3859 { 3860 struct qed_iov_vf_mbx *mbx; 3861 struct qed_vf_info *p_vf; 3862 3863 p_vf = qed_iov_get_vf_info(p_hwfn, (u16) vfid, true); 3864 if (!p_vf) 3865 return; 3866 3867 mbx = &p_vf->vf_mbx; 3868 3869 /* qed_iov_process_mbx_request */ 3870 if (!mbx->b_pending_msg) { 3871 DP_NOTICE(p_hwfn, 3872 "VF[%02x]: Trying to process mailbox message when none is pending\n", 3873 p_vf->abs_vf_id); 3874 return; 3875 } 3876 mbx->b_pending_msg = false; 3877 3878 mbx->first_tlv = mbx->req_virt->first_tlv; 3879 3880 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 3881 "VF[%02x]: Processing mailbox message [type %04x]\n", 3882 p_vf->abs_vf_id, mbx->first_tlv.tl.type); 3883 3884 /* check if tlv type is known */ 3885 if (qed_iov_tlv_supported(mbx->first_tlv.tl.type) && 3886 !p_vf->b_malicious) { 3887 switch (mbx->first_tlv.tl.type) { 3888 case CHANNEL_TLV_ACQUIRE: 3889 qed_iov_vf_mbx_acquire(p_hwfn, p_ptt, p_vf); 3890 break; 3891 case CHANNEL_TLV_VPORT_START: 3892 qed_iov_vf_mbx_start_vport(p_hwfn, p_ptt, p_vf); 3893 break; 3894 case CHANNEL_TLV_VPORT_TEARDOWN: 3895 qed_iov_vf_mbx_stop_vport(p_hwfn, p_ptt, p_vf); 3896 break; 3897 case CHANNEL_TLV_START_RXQ: 3898 qed_iov_vf_mbx_start_rxq(p_hwfn, p_ptt, p_vf); 3899 break; 3900 case CHANNEL_TLV_START_TXQ: 3901 qed_iov_vf_mbx_start_txq(p_hwfn, p_ptt, p_vf); 3902 break; 3903 case CHANNEL_TLV_STOP_RXQS: 3904 qed_iov_vf_mbx_stop_rxqs(p_hwfn, p_ptt, p_vf); 3905 break; 3906 case CHANNEL_TLV_STOP_TXQS: 3907 qed_iov_vf_mbx_stop_txqs(p_hwfn, p_ptt, p_vf); 3908 break; 3909 case CHANNEL_TLV_UPDATE_RXQ: 3910 qed_iov_vf_mbx_update_rxqs(p_hwfn, p_ptt, p_vf); 3911 break; 3912 case CHANNEL_TLV_VPORT_UPDATE: 3913 qed_iov_vf_mbx_vport_update(p_hwfn, p_ptt, p_vf); 3914 break; 3915 case CHANNEL_TLV_UCAST_FILTER: 3916 qed_iov_vf_mbx_ucast_filter(p_hwfn, p_ptt, p_vf); 3917 break; 3918 case CHANNEL_TLV_CLOSE: 3919 qed_iov_vf_mbx_close(p_hwfn, p_ptt, p_vf); 3920 break; 3921 case CHANNEL_TLV_INT_CLEANUP: 3922 qed_iov_vf_mbx_int_cleanup(p_hwfn, p_ptt, p_vf); 3923 break; 3924 case CHANNEL_TLV_RELEASE: 3925 qed_iov_vf_mbx_release(p_hwfn, p_ptt, p_vf); 3926 break; 3927 case CHANNEL_TLV_UPDATE_TUNN_PARAM: 3928 qed_iov_vf_mbx_update_tunn_param(p_hwfn, p_ptt, p_vf); 3929 break; 3930 case CHANNEL_TLV_COALESCE_UPDATE: 3931 qed_iov_vf_pf_set_coalesce(p_hwfn, p_ptt, p_vf); 3932 break; 3933 case CHANNEL_TLV_COALESCE_READ: 3934 qed_iov_vf_pf_get_coalesce(p_hwfn, p_ptt, p_vf); 3935 break; 3936 case CHANNEL_TLV_BULLETIN_UPDATE_MAC: 3937 qed_iov_vf_pf_bulletin_update_mac(p_hwfn, p_ptt, p_vf); 3938 break; 3939 } 3940 } else if (qed_iov_tlv_supported(mbx->first_tlv.tl.type)) { 3941 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 3942 "VF [%02x] - considered malicious; Ignoring TLV [%04x]\n", 3943 p_vf->abs_vf_id, mbx->first_tlv.tl.type); 3944 3945 qed_iov_prepare_resp(p_hwfn, p_ptt, p_vf, 3946 mbx->first_tlv.tl.type, 3947 sizeof(struct pfvf_def_resp_tlv), 3948 PFVF_STATUS_MALICIOUS); 3949 } else { 3950 /* unknown TLV - this may belong to a VF driver from the future 3951 * - a version written after this PF driver was written, which 3952 * supports features unknown as of yet. Too bad since we don't 3953 * support them. Or this may be because someone wrote a crappy 3954 * VF driver and is sending garbage over the channel. 3955 */ 3956 DP_NOTICE(p_hwfn, 3957 "VF[%02x]: unknown TLV. type %04x length %04x padding %08x reply address %llu\n", 3958 p_vf->abs_vf_id, 3959 mbx->first_tlv.tl.type, 3960 mbx->first_tlv.tl.length, 3961 mbx->first_tlv.padding, mbx->first_tlv.reply_address); 3962 3963 /* Try replying in case reply address matches the acquisition's 3964 * posted address. 3965 */ 3966 if (p_vf->acquire.first_tlv.reply_address && 3967 (mbx->first_tlv.reply_address == 3968 p_vf->acquire.first_tlv.reply_address)) { 3969 qed_iov_prepare_resp(p_hwfn, p_ptt, p_vf, 3970 mbx->first_tlv.tl.type, 3971 sizeof(struct pfvf_def_resp_tlv), 3972 PFVF_STATUS_NOT_SUPPORTED); 3973 } else { 3974 DP_VERBOSE(p_hwfn, 3975 QED_MSG_IOV, 3976 "VF[%02x]: Can't respond to TLV - no valid reply address\n", 3977 p_vf->abs_vf_id); 3978 } 3979 } 3980 } 3981 3982 void qed_iov_pf_get_pending_events(struct qed_hwfn *p_hwfn, u64 *events) 3983 { 3984 int i; 3985 3986 memset(events, 0, sizeof(u64) * QED_VF_ARRAY_LENGTH); 3987 3988 qed_for_each_vf(p_hwfn, i) { 3989 struct qed_vf_info *p_vf; 3990 3991 p_vf = &p_hwfn->pf_iov_info->vfs_array[i]; 3992 if (p_vf->vf_mbx.b_pending_msg) 3993 events[i / 64] |= 1ULL << (i % 64); 3994 } 3995 } 3996 3997 static struct qed_vf_info *qed_sriov_get_vf_from_absid(struct qed_hwfn *p_hwfn, 3998 u16 abs_vfid) 3999 { 4000 u8 min = (u8) p_hwfn->cdev->p_iov_info->first_vf_in_pf; 4001 4002 if (!_qed_iov_pf_sanity_check(p_hwfn, (int)abs_vfid - min, false)) { 4003 DP_VERBOSE(p_hwfn, 4004 QED_MSG_IOV, 4005 "Got indication for VF [abs 0x%08x] that cannot be handled by PF\n", 4006 abs_vfid); 4007 return NULL; 4008 } 4009 4010 return &p_hwfn->pf_iov_info->vfs_array[(u8) abs_vfid - min]; 4011 } 4012 4013 static int qed_sriov_vfpf_msg(struct qed_hwfn *p_hwfn, 4014 u16 abs_vfid, struct regpair *vf_msg) 4015 { 4016 struct qed_vf_info *p_vf = qed_sriov_get_vf_from_absid(p_hwfn, 4017 abs_vfid); 4018 4019 if (!p_vf) 4020 return 0; 4021 4022 /* List the physical address of the request so that handler 4023 * could later on copy the message from it. 4024 */ 4025 p_vf->vf_mbx.pending_req = (((u64)vf_msg->hi) << 32) | vf_msg->lo; 4026 4027 /* Mark the event and schedule the workqueue */ 4028 p_vf->vf_mbx.b_pending_msg = true; 4029 qed_schedule_iov(p_hwfn, QED_IOV_WQ_MSG_FLAG); 4030 4031 return 0; 4032 } 4033 4034 static void qed_sriov_vfpf_malicious(struct qed_hwfn *p_hwfn, 4035 struct malicious_vf_eqe_data *p_data) 4036 { 4037 struct qed_vf_info *p_vf; 4038 4039 p_vf = qed_sriov_get_vf_from_absid(p_hwfn, p_data->vf_id); 4040 4041 if (!p_vf) 4042 return; 4043 4044 if (!p_vf->b_malicious) { 4045 DP_NOTICE(p_hwfn, 4046 "VF [%d] - Malicious behavior [%02x]\n", 4047 p_vf->abs_vf_id, p_data->err_id); 4048 4049 p_vf->b_malicious = true; 4050 } else { 4051 DP_INFO(p_hwfn, 4052 "VF [%d] - Malicious behavior [%02x]\n", 4053 p_vf->abs_vf_id, p_data->err_id); 4054 } 4055 } 4056 4057 static int qed_sriov_eqe_event(struct qed_hwfn *p_hwfn, 4058 u8 opcode, 4059 __le16 echo, 4060 union event_ring_data *data, u8 fw_return_code) 4061 { 4062 switch (opcode) { 4063 case COMMON_EVENT_VF_PF_CHANNEL: 4064 return qed_sriov_vfpf_msg(p_hwfn, le16_to_cpu(echo), 4065 &data->vf_pf_channel.msg_addr); 4066 case COMMON_EVENT_MALICIOUS_VF: 4067 qed_sriov_vfpf_malicious(p_hwfn, &data->malicious_vf); 4068 return 0; 4069 default: 4070 DP_INFO(p_hwfn->cdev, "Unknown sriov eqe event 0x%02x\n", 4071 opcode); 4072 return -EINVAL; 4073 } 4074 } 4075 4076 u16 qed_iov_get_next_active_vf(struct qed_hwfn *p_hwfn, u16 rel_vf_id) 4077 { 4078 struct qed_hw_sriov_info *p_iov = p_hwfn->cdev->p_iov_info; 4079 u16 i; 4080 4081 if (!p_iov) 4082 goto out; 4083 4084 for (i = rel_vf_id; i < p_iov->total_vfs; i++) 4085 if (qed_iov_is_valid_vfid(p_hwfn, rel_vf_id, true, false)) 4086 return i; 4087 4088 out: 4089 return MAX_NUM_VFS; 4090 } 4091 4092 static int qed_iov_copy_vf_msg(struct qed_hwfn *p_hwfn, struct qed_ptt *ptt, 4093 int vfid) 4094 { 4095 struct qed_dmae_params params; 4096 struct qed_vf_info *vf_info; 4097 4098 vf_info = qed_iov_get_vf_info(p_hwfn, (u16) vfid, true); 4099 if (!vf_info) 4100 return -EINVAL; 4101 4102 memset(¶ms, 0, sizeof(struct qed_dmae_params)); 4103 params.flags = QED_DMAE_FLAG_VF_SRC | QED_DMAE_FLAG_COMPLETION_DST; 4104 params.src_vfid = vf_info->abs_vf_id; 4105 4106 if (qed_dmae_host2host(p_hwfn, ptt, 4107 vf_info->vf_mbx.pending_req, 4108 vf_info->vf_mbx.req_phys, 4109 sizeof(union vfpf_tlvs) / 4, ¶ms)) { 4110 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 4111 "Failed to copy message from VF 0x%02x\n", vfid); 4112 4113 return -EIO; 4114 } 4115 4116 return 0; 4117 } 4118 4119 static void qed_iov_bulletin_set_forced_mac(struct qed_hwfn *p_hwfn, 4120 u8 *mac, int vfid) 4121 { 4122 struct qed_vf_info *vf_info; 4123 u64 feature; 4124 4125 vf_info = qed_iov_get_vf_info(p_hwfn, (u16)vfid, true); 4126 if (!vf_info) { 4127 DP_NOTICE(p_hwfn->cdev, 4128 "Can not set forced MAC, invalid vfid [%d]\n", vfid); 4129 return; 4130 } 4131 4132 if (vf_info->b_malicious) { 4133 DP_NOTICE(p_hwfn->cdev, 4134 "Can't set forced MAC to malicious VF [%d]\n", vfid); 4135 return; 4136 } 4137 4138 if (vf_info->p_vf_info.is_trusted_configured) { 4139 feature = BIT(VFPF_BULLETIN_MAC_ADDR); 4140 /* Trust mode will disable Forced MAC */ 4141 vf_info->bulletin.p_virt->valid_bitmap &= 4142 ~BIT(MAC_ADDR_FORCED); 4143 } else { 4144 feature = BIT(MAC_ADDR_FORCED); 4145 /* Forced MAC will disable MAC_ADDR */ 4146 vf_info->bulletin.p_virt->valid_bitmap &= 4147 ~BIT(VFPF_BULLETIN_MAC_ADDR); 4148 } 4149 4150 memcpy(vf_info->bulletin.p_virt->mac, mac, ETH_ALEN); 4151 4152 vf_info->bulletin.p_virt->valid_bitmap |= feature; 4153 4154 qed_iov_configure_vport_forced(p_hwfn, vf_info, feature); 4155 } 4156 4157 static int qed_iov_bulletin_set_mac(struct qed_hwfn *p_hwfn, u8 *mac, int vfid) 4158 { 4159 struct qed_vf_info *vf_info; 4160 u64 feature; 4161 4162 vf_info = qed_iov_get_vf_info(p_hwfn, (u16)vfid, true); 4163 if (!vf_info) { 4164 DP_NOTICE(p_hwfn->cdev, "Can not set MAC, invalid vfid [%d]\n", 4165 vfid); 4166 return -EINVAL; 4167 } 4168 4169 if (vf_info->b_malicious) { 4170 DP_NOTICE(p_hwfn->cdev, "Can't set MAC to malicious VF [%d]\n", 4171 vfid); 4172 return -EINVAL; 4173 } 4174 4175 if (vf_info->bulletin.p_virt->valid_bitmap & BIT(MAC_ADDR_FORCED)) { 4176 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 4177 "Can not set MAC, Forced MAC is configured\n"); 4178 return -EINVAL; 4179 } 4180 4181 feature = BIT(VFPF_BULLETIN_MAC_ADDR); 4182 ether_addr_copy(vf_info->bulletin.p_virt->mac, mac); 4183 4184 vf_info->bulletin.p_virt->valid_bitmap |= feature; 4185 4186 if (vf_info->p_vf_info.is_trusted_configured) 4187 qed_iov_configure_vport_forced(p_hwfn, vf_info, feature); 4188 4189 return 0; 4190 } 4191 4192 static void qed_iov_bulletin_set_forced_vlan(struct qed_hwfn *p_hwfn, 4193 u16 pvid, int vfid) 4194 { 4195 struct qed_vf_info *vf_info; 4196 u64 feature; 4197 4198 vf_info = qed_iov_get_vf_info(p_hwfn, (u16) vfid, true); 4199 if (!vf_info) { 4200 DP_NOTICE(p_hwfn->cdev, 4201 "Can not set forced MAC, invalid vfid [%d]\n", vfid); 4202 return; 4203 } 4204 4205 if (vf_info->b_malicious) { 4206 DP_NOTICE(p_hwfn->cdev, 4207 "Can't set forced vlan to malicious VF [%d]\n", vfid); 4208 return; 4209 } 4210 4211 feature = 1 << VLAN_ADDR_FORCED; 4212 vf_info->bulletin.p_virt->pvid = pvid; 4213 if (pvid) 4214 vf_info->bulletin.p_virt->valid_bitmap |= feature; 4215 else 4216 vf_info->bulletin.p_virt->valid_bitmap &= ~feature; 4217 4218 qed_iov_configure_vport_forced(p_hwfn, vf_info, feature); 4219 } 4220 4221 void qed_iov_bulletin_set_udp_ports(struct qed_hwfn *p_hwfn, 4222 int vfid, u16 vxlan_port, u16 geneve_port) 4223 { 4224 struct qed_vf_info *vf_info; 4225 4226 vf_info = qed_iov_get_vf_info(p_hwfn, (u16)vfid, true); 4227 if (!vf_info) { 4228 DP_NOTICE(p_hwfn->cdev, 4229 "Can not set udp ports, invalid vfid [%d]\n", vfid); 4230 return; 4231 } 4232 4233 if (vf_info->b_malicious) { 4234 DP_VERBOSE(p_hwfn, QED_MSG_IOV, 4235 "Can not set udp ports to malicious VF [%d]\n", 4236 vfid); 4237 return; 4238 } 4239 4240 vf_info->bulletin.p_virt->vxlan_udp_port = vxlan_port; 4241 vf_info->bulletin.p_virt->geneve_udp_port = geneve_port; 4242 } 4243 4244 static bool qed_iov_vf_has_vport_instance(struct qed_hwfn *p_hwfn, int vfid) 4245 { 4246 struct qed_vf_info *p_vf_info; 4247 4248 p_vf_info = qed_iov_get_vf_info(p_hwfn, (u16) vfid, true); 4249 if (!p_vf_info) 4250 return false; 4251 4252 return !!p_vf_info->vport_instance; 4253 } 4254 4255 static bool qed_iov_is_vf_stopped(struct qed_hwfn *p_hwfn, int vfid) 4256 { 4257 struct qed_vf_info *p_vf_info; 4258 4259 p_vf_info = qed_iov_get_vf_info(p_hwfn, (u16) vfid, true); 4260 if (!p_vf_info) 4261 return true; 4262 4263 return p_vf_info->state == VF_STOPPED; 4264 } 4265 4266 static bool qed_iov_spoofchk_get(struct qed_hwfn *p_hwfn, int vfid) 4267 { 4268 struct qed_vf_info *vf_info; 4269 4270 vf_info = qed_iov_get_vf_info(p_hwfn, (u16) vfid, true); 4271 if (!vf_info) 4272 return false; 4273 4274 return vf_info->spoof_chk; 4275 } 4276 4277 static int qed_iov_spoofchk_set(struct qed_hwfn *p_hwfn, int vfid, bool val) 4278 { 4279 struct qed_vf_info *vf; 4280 int rc = -EINVAL; 4281 4282 if (!qed_iov_pf_sanity_check(p_hwfn, vfid)) { 4283 DP_NOTICE(p_hwfn, 4284 "SR-IOV sanity check failed, can't set spoofchk\n"); 4285 goto out; 4286 } 4287 4288 vf = qed_iov_get_vf_info(p_hwfn, (u16) vfid, true); 4289 if (!vf) 4290 goto out; 4291 4292 if (!qed_iov_vf_has_vport_instance(p_hwfn, vfid)) { 4293 /* After VF VPORT start PF will configure spoof check */ 4294 vf->req_spoofchk_val = val; 4295 rc = 0; 4296 goto out; 4297 } 4298 4299 rc = __qed_iov_spoofchk_set(p_hwfn, vf, val); 4300 4301 out: 4302 return rc; 4303 } 4304 4305 static u8 *qed_iov_bulletin_get_mac(struct qed_hwfn *p_hwfn, u16 rel_vf_id) 4306 { 4307 struct qed_vf_info *p_vf; 4308 4309 p_vf = qed_iov_get_vf_info(p_hwfn, rel_vf_id, true); 4310 if (!p_vf || !p_vf->bulletin.p_virt) 4311 return NULL; 4312 4313 if (!(p_vf->bulletin.p_virt->valid_bitmap & 4314 BIT(VFPF_BULLETIN_MAC_ADDR))) 4315 return NULL; 4316 4317 return p_vf->bulletin.p_virt->mac; 4318 } 4319 4320 static u8 *qed_iov_bulletin_get_forced_mac(struct qed_hwfn *p_hwfn, 4321 u16 rel_vf_id) 4322 { 4323 struct qed_vf_info *p_vf; 4324 4325 p_vf = qed_iov_get_vf_info(p_hwfn, rel_vf_id, true); 4326 if (!p_vf || !p_vf->bulletin.p_virt) 4327 return NULL; 4328 4329 if (!(p_vf->bulletin.p_virt->valid_bitmap & BIT(MAC_ADDR_FORCED))) 4330 return NULL; 4331 4332 return p_vf->bulletin.p_virt->mac; 4333 } 4334 4335 static u16 4336 qed_iov_bulletin_get_forced_vlan(struct qed_hwfn *p_hwfn, u16 rel_vf_id) 4337 { 4338 struct qed_vf_info *p_vf; 4339 4340 p_vf = qed_iov_get_vf_info(p_hwfn, rel_vf_id, true); 4341 if (!p_vf || !p_vf->bulletin.p_virt) 4342 return 0; 4343 4344 if (!(p_vf->bulletin.p_virt->valid_bitmap & BIT(VLAN_ADDR_FORCED))) 4345 return 0; 4346 4347 return p_vf->bulletin.p_virt->pvid; 4348 } 4349 4350 static int qed_iov_configure_tx_rate(struct qed_hwfn *p_hwfn, 4351 struct qed_ptt *p_ptt, int vfid, int val) 4352 { 4353 struct qed_mcp_link_state *p_link; 4354 struct qed_vf_info *vf; 4355 u8 abs_vp_id = 0; 4356 int rc; 4357 4358 vf = qed_iov_get_vf_info(p_hwfn, (u16)vfid, true); 4359 if (!vf) 4360 return -EINVAL; 4361 4362 rc = qed_fw_vport(p_hwfn, vf->vport_id, &abs_vp_id); 4363 if (rc) 4364 return rc; 4365 4366 p_link = &QED_LEADING_HWFN(p_hwfn->cdev)->mcp_info->link_output; 4367 4368 return qed_init_vport_rl(p_hwfn, p_ptt, abs_vp_id, (u32)val, 4369 p_link->speed); 4370 } 4371 4372 static int 4373 qed_iov_configure_min_tx_rate(struct qed_dev *cdev, int vfid, u32 rate) 4374 { 4375 struct qed_vf_info *vf; 4376 u8 vport_id; 4377 int i; 4378 4379 for_each_hwfn(cdev, i) { 4380 struct qed_hwfn *p_hwfn = &cdev->hwfns[i]; 4381 4382 if (!qed_iov_pf_sanity_check(p_hwfn, vfid)) { 4383 DP_NOTICE(p_hwfn, 4384 "SR-IOV sanity check failed, can't set min rate\n"); 4385 return -EINVAL; 4386 } 4387 } 4388 4389 vf = qed_iov_get_vf_info(QED_LEADING_HWFN(cdev), (u16)vfid, true); 4390 vport_id = vf->vport_id; 4391 4392 return qed_configure_vport_wfq(cdev, vport_id, rate); 4393 } 4394 4395 static int qed_iov_get_vf_min_rate(struct qed_hwfn *p_hwfn, int vfid) 4396 { 4397 struct qed_wfq_data *vf_vp_wfq; 4398 struct qed_vf_info *vf_info; 4399 4400 vf_info = qed_iov_get_vf_info(p_hwfn, (u16) vfid, true); 4401 if (!vf_info) 4402 return 0; 4403 4404 vf_vp_wfq = &p_hwfn->qm_info.wfq_data[vf_info->vport_id]; 4405 4406 if (vf_vp_wfq->configured) 4407 return vf_vp_wfq->min_speed; 4408 else 4409 return 0; 4410 } 4411 4412 /** 4413 * qed_schedule_iov - schedules IOV task for VF and PF 4414 * @hwfn: hardware function pointer 4415 * @flag: IOV flag for VF/PF 4416 */ 4417 void qed_schedule_iov(struct qed_hwfn *hwfn, enum qed_iov_wq_flag flag) 4418 { 4419 smp_mb__before_atomic(); 4420 set_bit(flag, &hwfn->iov_task_flags); 4421 smp_mb__after_atomic(); 4422 DP_VERBOSE(hwfn, QED_MSG_IOV, "Scheduling iov task [Flag: %d]\n", flag); 4423 queue_delayed_work(hwfn->iov_wq, &hwfn->iov_task, 0); 4424 } 4425 4426 void qed_vf_start_iov_wq(struct qed_dev *cdev) 4427 { 4428 int i; 4429 4430 for_each_hwfn(cdev, i) 4431 queue_delayed_work(cdev->hwfns[i].iov_wq, 4432 &cdev->hwfns[i].iov_task, 0); 4433 } 4434 4435 int qed_sriov_disable(struct qed_dev *cdev, bool pci_enabled) 4436 { 4437 int i, j; 4438 4439 for_each_hwfn(cdev, i) 4440 if (cdev->hwfns[i].iov_wq) 4441 flush_workqueue(cdev->hwfns[i].iov_wq); 4442 4443 /* Mark VFs for disablement */ 4444 qed_iov_set_vfs_to_disable(cdev, true); 4445 4446 if (cdev->p_iov_info && cdev->p_iov_info->num_vfs && pci_enabled) 4447 pci_disable_sriov(cdev->pdev); 4448 4449 for_each_hwfn(cdev, i) { 4450 struct qed_hwfn *hwfn = &cdev->hwfns[i]; 4451 struct qed_ptt *ptt = qed_ptt_acquire(hwfn); 4452 4453 /* Failure to acquire the ptt in 100g creates an odd error 4454 * where the first engine has already relased IOV. 4455 */ 4456 if (!ptt) { 4457 DP_ERR(hwfn, "Failed to acquire ptt\n"); 4458 return -EBUSY; 4459 } 4460 4461 /* Clean WFQ db and configure equal weight for all vports */ 4462 qed_clean_wfq_db(hwfn, ptt); 4463 4464 qed_for_each_vf(hwfn, j) { 4465 int k; 4466 4467 if (!qed_iov_is_valid_vfid(hwfn, j, true, false)) 4468 continue; 4469 4470 /* Wait until VF is disabled before releasing */ 4471 for (k = 0; k < 100; k++) { 4472 if (!qed_iov_is_vf_stopped(hwfn, j)) 4473 msleep(20); 4474 else 4475 break; 4476 } 4477 4478 if (k < 100) 4479 qed_iov_release_hw_for_vf(&cdev->hwfns[i], 4480 ptt, j); 4481 else 4482 DP_ERR(hwfn, 4483 "Timeout waiting for VF's FLR to end\n"); 4484 } 4485 4486 qed_ptt_release(hwfn, ptt); 4487 } 4488 4489 qed_iov_set_vfs_to_disable(cdev, false); 4490 4491 return 0; 4492 } 4493 4494 static void qed_sriov_enable_qid_config(struct qed_hwfn *hwfn, 4495 u16 vfid, 4496 struct qed_iov_vf_init_params *params) 4497 { 4498 u16 base, i; 4499 4500 /* Since we have an equal resource distribution per-VF, and we assume 4501 * PF has acquired the QED_PF_L2_QUE first queues, we start setting 4502 * sequentially from there. 4503 */ 4504 base = FEAT_NUM(hwfn, QED_PF_L2_QUE) + vfid * params->num_queues; 4505 4506 params->rel_vf_id = vfid; 4507 for (i = 0; i < params->num_queues; i++) { 4508 params->req_rx_queue[i] = base + i; 4509 params->req_tx_queue[i] = base + i; 4510 } 4511 } 4512 4513 static int qed_sriov_enable(struct qed_dev *cdev, int num) 4514 { 4515 struct qed_iov_vf_init_params params; 4516 int i, j, rc; 4517 4518 if (num >= RESC_NUM(&cdev->hwfns[0], QED_VPORT)) { 4519 DP_NOTICE(cdev, "Can start at most %d VFs\n", 4520 RESC_NUM(&cdev->hwfns[0], QED_VPORT) - 1); 4521 return -EINVAL; 4522 } 4523 4524 memset(¶ms, 0, sizeof(params)); 4525 4526 /* Initialize HW for VF access */ 4527 for_each_hwfn(cdev, j) { 4528 struct qed_hwfn *hwfn = &cdev->hwfns[j]; 4529 struct qed_ptt *ptt = qed_ptt_acquire(hwfn); 4530 4531 /* Make sure not to use more than 16 queues per VF */ 4532 params.num_queues = min_t(int, 4533 FEAT_NUM(hwfn, QED_VF_L2_QUE) / num, 4534 16); 4535 4536 if (!ptt) { 4537 DP_ERR(hwfn, "Failed to acquire ptt\n"); 4538 rc = -EBUSY; 4539 goto err; 4540 } 4541 4542 for (i = 0; i < num; i++) { 4543 if (!qed_iov_is_valid_vfid(hwfn, i, false, true)) 4544 continue; 4545 4546 qed_sriov_enable_qid_config(hwfn, i, ¶ms); 4547 rc = qed_iov_init_hw_for_vf(hwfn, ptt, ¶ms); 4548 if (rc) { 4549 DP_ERR(cdev, "Failed to enable VF[%d]\n", i); 4550 qed_ptt_release(hwfn, ptt); 4551 goto err; 4552 } 4553 } 4554 4555 qed_ptt_release(hwfn, ptt); 4556 } 4557 4558 /* Enable SRIOV PCIe functions */ 4559 rc = pci_enable_sriov(cdev->pdev, num); 4560 if (rc) { 4561 DP_ERR(cdev, "Failed to enable sriov [%d]\n", rc); 4562 goto err; 4563 } 4564 4565 return num; 4566 4567 err: 4568 qed_sriov_disable(cdev, false); 4569 return rc; 4570 } 4571 4572 static int qed_sriov_configure(struct qed_dev *cdev, int num_vfs_param) 4573 { 4574 if (!IS_QED_SRIOV(cdev)) { 4575 DP_VERBOSE(cdev, QED_MSG_IOV, "SR-IOV is not supported\n"); 4576 return -EOPNOTSUPP; 4577 } 4578 4579 if (num_vfs_param) 4580 return qed_sriov_enable(cdev, num_vfs_param); 4581 else 4582 return qed_sriov_disable(cdev, true); 4583 } 4584 4585 static int qed_sriov_pf_set_mac(struct qed_dev *cdev, u8 *mac, int vfid) 4586 { 4587 int i; 4588 4589 if (!IS_QED_SRIOV(cdev) || !IS_PF_SRIOV_ALLOC(&cdev->hwfns[0])) { 4590 DP_VERBOSE(cdev, QED_MSG_IOV, 4591 "Cannot set a VF MAC; Sriov is not enabled\n"); 4592 return -EINVAL; 4593 } 4594 4595 if (!qed_iov_is_valid_vfid(&cdev->hwfns[0], vfid, true, true)) { 4596 DP_VERBOSE(cdev, QED_MSG_IOV, 4597 "Cannot set VF[%d] MAC (VF is not active)\n", vfid); 4598 return -EINVAL; 4599 } 4600 4601 for_each_hwfn(cdev, i) { 4602 struct qed_hwfn *hwfn = &cdev->hwfns[i]; 4603 struct qed_public_vf_info *vf_info; 4604 4605 vf_info = qed_iov_get_public_vf_info(hwfn, vfid, true); 4606 if (!vf_info) 4607 continue; 4608 4609 /* Set the MAC, and schedule the IOV task */ 4610 if (vf_info->is_trusted_configured) 4611 ether_addr_copy(vf_info->mac, mac); 4612 else 4613 ether_addr_copy(vf_info->forced_mac, mac); 4614 4615 qed_schedule_iov(hwfn, QED_IOV_WQ_SET_UNICAST_FILTER_FLAG); 4616 } 4617 4618 return 0; 4619 } 4620 4621 static int qed_sriov_pf_set_vlan(struct qed_dev *cdev, u16 vid, int vfid) 4622 { 4623 int i; 4624 4625 if (!IS_QED_SRIOV(cdev) || !IS_PF_SRIOV_ALLOC(&cdev->hwfns[0])) { 4626 DP_VERBOSE(cdev, QED_MSG_IOV, 4627 "Cannot set a VF MAC; Sriov is not enabled\n"); 4628 return -EINVAL; 4629 } 4630 4631 if (!qed_iov_is_valid_vfid(&cdev->hwfns[0], vfid, true, true)) { 4632 DP_VERBOSE(cdev, QED_MSG_IOV, 4633 "Cannot set VF[%d] MAC (VF is not active)\n", vfid); 4634 return -EINVAL; 4635 } 4636 4637 for_each_hwfn(cdev, i) { 4638 struct qed_hwfn *hwfn = &cdev->hwfns[i]; 4639 struct qed_public_vf_info *vf_info; 4640 4641 vf_info = qed_iov_get_public_vf_info(hwfn, vfid, true); 4642 if (!vf_info) 4643 continue; 4644 4645 /* Set the forced vlan, and schedule the IOV task */ 4646 vf_info->forced_vlan = vid; 4647 qed_schedule_iov(hwfn, QED_IOV_WQ_SET_UNICAST_FILTER_FLAG); 4648 } 4649 4650 return 0; 4651 } 4652 4653 static int qed_get_vf_config(struct qed_dev *cdev, 4654 int vf_id, struct ifla_vf_info *ivi) 4655 { 4656 struct qed_hwfn *hwfn = QED_LEADING_HWFN(cdev); 4657 struct qed_public_vf_info *vf_info; 4658 struct qed_mcp_link_state link; 4659 u32 tx_rate; 4660 4661 /* Sanitize request */ 4662 if (IS_VF(cdev)) 4663 return -EINVAL; 4664 4665 if (!qed_iov_is_valid_vfid(&cdev->hwfns[0], vf_id, true, false)) { 4666 DP_VERBOSE(cdev, QED_MSG_IOV, 4667 "VF index [%d] isn't active\n", vf_id); 4668 return -EINVAL; 4669 } 4670 4671 vf_info = qed_iov_get_public_vf_info(hwfn, vf_id, true); 4672 4673 qed_iov_get_link(hwfn, vf_id, NULL, &link, NULL); 4674 4675 /* Fill information about VF */ 4676 ivi->vf = vf_id; 4677 4678 if (is_valid_ether_addr(vf_info->forced_mac)) 4679 ether_addr_copy(ivi->mac, vf_info->forced_mac); 4680 else 4681 ether_addr_copy(ivi->mac, vf_info->mac); 4682 4683 ivi->vlan = vf_info->forced_vlan; 4684 ivi->spoofchk = qed_iov_spoofchk_get(hwfn, vf_id); 4685 ivi->linkstate = vf_info->link_state; 4686 tx_rate = vf_info->tx_rate; 4687 ivi->max_tx_rate = tx_rate ? tx_rate : link.speed; 4688 ivi->min_tx_rate = qed_iov_get_vf_min_rate(hwfn, vf_id); 4689 4690 return 0; 4691 } 4692 4693 void qed_inform_vf_link_state(struct qed_hwfn *hwfn) 4694 { 4695 struct qed_hwfn *lead_hwfn = QED_LEADING_HWFN(hwfn->cdev); 4696 struct qed_mcp_link_capabilities caps; 4697 struct qed_mcp_link_params params; 4698 struct qed_mcp_link_state link; 4699 int i; 4700 4701 if (!hwfn->pf_iov_info) 4702 return; 4703 4704 /* Update bulletin of all future possible VFs with link configuration */ 4705 for (i = 0; i < hwfn->cdev->p_iov_info->total_vfs; i++) { 4706 struct qed_public_vf_info *vf_info; 4707 4708 vf_info = qed_iov_get_public_vf_info(hwfn, i, false); 4709 if (!vf_info) 4710 continue; 4711 4712 /* Only hwfn0 is actually interested in the link speed. 4713 * But since only it would receive an MFW indication of link, 4714 * need to take configuration from it - otherwise things like 4715 * rate limiting for hwfn1 VF would not work. 4716 */ 4717 memcpy(¶ms, qed_mcp_get_link_params(lead_hwfn), 4718 sizeof(params)); 4719 memcpy(&link, qed_mcp_get_link_state(lead_hwfn), sizeof(link)); 4720 memcpy(&caps, qed_mcp_get_link_capabilities(lead_hwfn), 4721 sizeof(caps)); 4722 4723 /* Modify link according to the VF's configured link state */ 4724 switch (vf_info->link_state) { 4725 case IFLA_VF_LINK_STATE_DISABLE: 4726 link.link_up = false; 4727 break; 4728 case IFLA_VF_LINK_STATE_ENABLE: 4729 link.link_up = true; 4730 /* Set speed according to maximum supported by HW. 4731 * that is 40G for regular devices and 100G for CMT 4732 * mode devices. 4733 */ 4734 link.speed = (hwfn->cdev->num_hwfns > 1) ? 4735 100000 : 40000; 4736 default: 4737 /* In auto mode pass PF link image to VF */ 4738 break; 4739 } 4740 4741 if (link.link_up && vf_info->tx_rate) { 4742 struct qed_ptt *ptt; 4743 int rate; 4744 4745 rate = min_t(int, vf_info->tx_rate, link.speed); 4746 4747 ptt = qed_ptt_acquire(hwfn); 4748 if (!ptt) { 4749 DP_NOTICE(hwfn, "Failed to acquire PTT\n"); 4750 return; 4751 } 4752 4753 if (!qed_iov_configure_tx_rate(hwfn, ptt, i, rate)) { 4754 vf_info->tx_rate = rate; 4755 link.speed = rate; 4756 } 4757 4758 qed_ptt_release(hwfn, ptt); 4759 } 4760 4761 qed_iov_set_link(hwfn, i, ¶ms, &link, &caps); 4762 } 4763 4764 qed_schedule_iov(hwfn, QED_IOV_WQ_BULLETIN_UPDATE_FLAG); 4765 } 4766 4767 static int qed_set_vf_link_state(struct qed_dev *cdev, 4768 int vf_id, int link_state) 4769 { 4770 int i; 4771 4772 /* Sanitize request */ 4773 if (IS_VF(cdev)) 4774 return -EINVAL; 4775 4776 if (!qed_iov_is_valid_vfid(&cdev->hwfns[0], vf_id, true, true)) { 4777 DP_VERBOSE(cdev, QED_MSG_IOV, 4778 "VF index [%d] isn't active\n", vf_id); 4779 return -EINVAL; 4780 } 4781 4782 /* Handle configuration of link state */ 4783 for_each_hwfn(cdev, i) { 4784 struct qed_hwfn *hwfn = &cdev->hwfns[i]; 4785 struct qed_public_vf_info *vf; 4786 4787 vf = qed_iov_get_public_vf_info(hwfn, vf_id, true); 4788 if (!vf) 4789 continue; 4790 4791 if (vf->link_state == link_state) 4792 continue; 4793 4794 vf->link_state = link_state; 4795 qed_inform_vf_link_state(&cdev->hwfns[i]); 4796 } 4797 4798 return 0; 4799 } 4800 4801 static int qed_spoof_configure(struct qed_dev *cdev, int vfid, bool val) 4802 { 4803 int i, rc = -EINVAL; 4804 4805 for_each_hwfn(cdev, i) { 4806 struct qed_hwfn *p_hwfn = &cdev->hwfns[i]; 4807 4808 rc = qed_iov_spoofchk_set(p_hwfn, vfid, val); 4809 if (rc) 4810 break; 4811 } 4812 4813 return rc; 4814 } 4815 4816 static int qed_configure_max_vf_rate(struct qed_dev *cdev, int vfid, int rate) 4817 { 4818 int i; 4819 4820 for_each_hwfn(cdev, i) { 4821 struct qed_hwfn *p_hwfn = &cdev->hwfns[i]; 4822 struct qed_public_vf_info *vf; 4823 4824 if (!qed_iov_pf_sanity_check(p_hwfn, vfid)) { 4825 DP_NOTICE(p_hwfn, 4826 "SR-IOV sanity check failed, can't set tx rate\n"); 4827 return -EINVAL; 4828 } 4829 4830 vf = qed_iov_get_public_vf_info(p_hwfn, vfid, true); 4831 4832 vf->tx_rate = rate; 4833 4834 qed_inform_vf_link_state(p_hwfn); 4835 } 4836 4837 return 0; 4838 } 4839 4840 static int qed_set_vf_rate(struct qed_dev *cdev, 4841 int vfid, u32 min_rate, u32 max_rate) 4842 { 4843 int rc_min = 0, rc_max = 0; 4844 4845 if (max_rate) 4846 rc_max = qed_configure_max_vf_rate(cdev, vfid, max_rate); 4847 4848 if (min_rate) 4849 rc_min = qed_iov_configure_min_tx_rate(cdev, vfid, min_rate); 4850 4851 if (rc_max | rc_min) 4852 return -EINVAL; 4853 4854 return 0; 4855 } 4856 4857 static int qed_set_vf_trust(struct qed_dev *cdev, int vfid, bool trust) 4858 { 4859 int i; 4860 4861 for_each_hwfn(cdev, i) { 4862 struct qed_hwfn *hwfn = &cdev->hwfns[i]; 4863 struct qed_public_vf_info *vf; 4864 4865 if (!qed_iov_pf_sanity_check(hwfn, vfid)) { 4866 DP_NOTICE(hwfn, 4867 "SR-IOV sanity check failed, can't set trust\n"); 4868 return -EINVAL; 4869 } 4870 4871 vf = qed_iov_get_public_vf_info(hwfn, vfid, true); 4872 4873 if (vf->is_trusted_request == trust) 4874 return 0; 4875 vf->is_trusted_request = trust; 4876 4877 qed_schedule_iov(hwfn, QED_IOV_WQ_TRUST_FLAG); 4878 } 4879 4880 return 0; 4881 } 4882 4883 static void qed_handle_vf_msg(struct qed_hwfn *hwfn) 4884 { 4885 u64 events[QED_VF_ARRAY_LENGTH]; 4886 struct qed_ptt *ptt; 4887 int i; 4888 4889 ptt = qed_ptt_acquire(hwfn); 4890 if (!ptt) { 4891 DP_VERBOSE(hwfn, QED_MSG_IOV, 4892 "Can't acquire PTT; re-scheduling\n"); 4893 qed_schedule_iov(hwfn, QED_IOV_WQ_MSG_FLAG); 4894 return; 4895 } 4896 4897 qed_iov_pf_get_pending_events(hwfn, events); 4898 4899 DP_VERBOSE(hwfn, QED_MSG_IOV, 4900 "Event mask of VF events: 0x%llx 0x%llx 0x%llx\n", 4901 events[0], events[1], events[2]); 4902 4903 qed_for_each_vf(hwfn, i) { 4904 /* Skip VFs with no pending messages */ 4905 if (!(events[i / 64] & (1ULL << (i % 64)))) 4906 continue; 4907 4908 DP_VERBOSE(hwfn, QED_MSG_IOV, 4909 "Handling VF message from VF 0x%02x [Abs 0x%02x]\n", 4910 i, hwfn->cdev->p_iov_info->first_vf_in_pf + i); 4911 4912 /* Copy VF's message to PF's request buffer for that VF */ 4913 if (qed_iov_copy_vf_msg(hwfn, ptt, i)) 4914 continue; 4915 4916 qed_iov_process_mbx_req(hwfn, ptt, i); 4917 } 4918 4919 qed_ptt_release(hwfn, ptt); 4920 } 4921 4922 static bool qed_pf_validate_req_vf_mac(struct qed_hwfn *hwfn, 4923 u8 *mac, 4924 struct qed_public_vf_info *info) 4925 { 4926 if (info->is_trusted_configured) { 4927 if (is_valid_ether_addr(info->mac) && 4928 (!mac || !ether_addr_equal(mac, info->mac))) 4929 return true; 4930 } else { 4931 if (is_valid_ether_addr(info->forced_mac) && 4932 (!mac || !ether_addr_equal(mac, info->forced_mac))) 4933 return true; 4934 } 4935 4936 return false; 4937 } 4938 4939 static void qed_set_bulletin_mac(struct qed_hwfn *hwfn, 4940 struct qed_public_vf_info *info, 4941 int vfid) 4942 { 4943 if (info->is_trusted_configured) 4944 qed_iov_bulletin_set_mac(hwfn, info->mac, vfid); 4945 else 4946 qed_iov_bulletin_set_forced_mac(hwfn, info->forced_mac, vfid); 4947 } 4948 4949 static void qed_handle_pf_set_vf_unicast(struct qed_hwfn *hwfn) 4950 { 4951 int i; 4952 4953 qed_for_each_vf(hwfn, i) { 4954 struct qed_public_vf_info *info; 4955 bool update = false; 4956 u8 *mac; 4957 4958 info = qed_iov_get_public_vf_info(hwfn, i, true); 4959 if (!info) 4960 continue; 4961 4962 /* Update data on bulletin board */ 4963 if (info->is_trusted_configured) 4964 mac = qed_iov_bulletin_get_mac(hwfn, i); 4965 else 4966 mac = qed_iov_bulletin_get_forced_mac(hwfn, i); 4967 4968 if (qed_pf_validate_req_vf_mac(hwfn, mac, info)) { 4969 DP_VERBOSE(hwfn, 4970 QED_MSG_IOV, 4971 "Handling PF setting of VF MAC to VF 0x%02x [Abs 0x%02x]\n", 4972 i, 4973 hwfn->cdev->p_iov_info->first_vf_in_pf + i); 4974 4975 /* Update bulletin board with MAC */ 4976 qed_set_bulletin_mac(hwfn, info, i); 4977 update = true; 4978 } 4979 4980 if (qed_iov_bulletin_get_forced_vlan(hwfn, i) ^ 4981 info->forced_vlan) { 4982 DP_VERBOSE(hwfn, 4983 QED_MSG_IOV, 4984 "Handling PF setting of pvid [0x%04x] to VF 0x%02x [Abs 0x%02x]\n", 4985 info->forced_vlan, 4986 i, 4987 hwfn->cdev->p_iov_info->first_vf_in_pf + i); 4988 qed_iov_bulletin_set_forced_vlan(hwfn, 4989 info->forced_vlan, i); 4990 update = true; 4991 } 4992 4993 if (update) 4994 qed_schedule_iov(hwfn, QED_IOV_WQ_BULLETIN_UPDATE_FLAG); 4995 } 4996 } 4997 4998 static void qed_handle_bulletin_post(struct qed_hwfn *hwfn) 4999 { 5000 struct qed_ptt *ptt; 5001 int i; 5002 5003 ptt = qed_ptt_acquire(hwfn); 5004 if (!ptt) { 5005 DP_NOTICE(hwfn, "Failed allocating a ptt entry\n"); 5006 qed_schedule_iov(hwfn, QED_IOV_WQ_BULLETIN_UPDATE_FLAG); 5007 return; 5008 } 5009 5010 qed_for_each_vf(hwfn, i) 5011 qed_iov_post_vf_bulletin(hwfn, i, ptt); 5012 5013 qed_ptt_release(hwfn, ptt); 5014 } 5015 5016 static void qed_update_mac_for_vf_trust_change(struct qed_hwfn *hwfn, int vf_id) 5017 { 5018 struct qed_public_vf_info *vf_info; 5019 struct qed_vf_info *vf; 5020 u8 *force_mac; 5021 int i; 5022 5023 vf_info = qed_iov_get_public_vf_info(hwfn, vf_id, true); 5024 vf = qed_iov_get_vf_info(hwfn, vf_id, true); 5025 5026 if (!vf_info || !vf) 5027 return; 5028 5029 /* Force MAC converted to generic MAC in case of VF trust on */ 5030 if (vf_info->is_trusted_configured && 5031 (vf->bulletin.p_virt->valid_bitmap & BIT(MAC_ADDR_FORCED))) { 5032 force_mac = qed_iov_bulletin_get_forced_mac(hwfn, vf_id); 5033 5034 if (force_mac) { 5035 /* Clear existing shadow copy of MAC to have a clean 5036 * slate. 5037 */ 5038 for (i = 0; i < QED_ETH_VF_NUM_MAC_FILTERS; i++) { 5039 if (ether_addr_equal(vf->shadow_config.macs[i], 5040 vf_info->mac)) { 5041 memset(vf->shadow_config.macs[i], 0, 5042 ETH_ALEN); 5043 DP_VERBOSE(hwfn, QED_MSG_IOV, 5044 "Shadow MAC %pM removed for VF 0x%02x, VF trust mode is ON\n", 5045 vf_info->mac, vf_id); 5046 break; 5047 } 5048 } 5049 5050 ether_addr_copy(vf_info->mac, force_mac); 5051 memset(vf_info->forced_mac, 0, ETH_ALEN); 5052 vf->bulletin.p_virt->valid_bitmap &= 5053 ~BIT(MAC_ADDR_FORCED); 5054 qed_schedule_iov(hwfn, QED_IOV_WQ_BULLETIN_UPDATE_FLAG); 5055 } 5056 } 5057 5058 /* Update shadow copy with VF MAC when trust mode is turned off */ 5059 if (!vf_info->is_trusted_configured) { 5060 u8 empty_mac[ETH_ALEN]; 5061 5062 memset(empty_mac, 0, ETH_ALEN); 5063 for (i = 0; i < QED_ETH_VF_NUM_MAC_FILTERS; i++) { 5064 if (ether_addr_equal(vf->shadow_config.macs[i], 5065 empty_mac)) { 5066 ether_addr_copy(vf->shadow_config.macs[i], 5067 vf_info->mac); 5068 DP_VERBOSE(hwfn, QED_MSG_IOV, 5069 "Shadow is updated with %pM for VF 0x%02x, VF trust mode is OFF\n", 5070 vf_info->mac, vf_id); 5071 break; 5072 } 5073 } 5074 /* Clear bulletin when trust mode is turned off, 5075 * to have a clean slate for next (normal) operations. 5076 */ 5077 qed_iov_bulletin_set_mac(hwfn, empty_mac, vf_id); 5078 qed_schedule_iov(hwfn, QED_IOV_WQ_BULLETIN_UPDATE_FLAG); 5079 } 5080 } 5081 5082 static void qed_iov_handle_trust_change(struct qed_hwfn *hwfn) 5083 { 5084 struct qed_sp_vport_update_params params; 5085 struct qed_filter_accept_flags *flags; 5086 struct qed_public_vf_info *vf_info; 5087 struct qed_vf_info *vf; 5088 u8 mask; 5089 int i; 5090 5091 mask = QED_ACCEPT_UCAST_UNMATCHED | QED_ACCEPT_MCAST_UNMATCHED; 5092 flags = ¶ms.accept_flags; 5093 5094 qed_for_each_vf(hwfn, i) { 5095 /* Need to make sure current requested configuration didn't 5096 * flip so that we'll end up configuring something that's not 5097 * needed. 5098 */ 5099 vf_info = qed_iov_get_public_vf_info(hwfn, i, true); 5100 if (vf_info->is_trusted_configured == 5101 vf_info->is_trusted_request) 5102 continue; 5103 vf_info->is_trusted_configured = vf_info->is_trusted_request; 5104 5105 /* Handle forced MAC mode */ 5106 qed_update_mac_for_vf_trust_change(hwfn, i); 5107 5108 /* Validate that the VF has a configured vport */ 5109 vf = qed_iov_get_vf_info(hwfn, i, true); 5110 if (!vf->vport_instance) 5111 continue; 5112 5113 memset(¶ms, 0, sizeof(params)); 5114 params.opaque_fid = vf->opaque_fid; 5115 params.vport_id = vf->vport_id; 5116 5117 if (vf_info->rx_accept_mode & mask) { 5118 flags->update_rx_mode_config = 1; 5119 flags->rx_accept_filter = vf_info->rx_accept_mode; 5120 } 5121 5122 if (vf_info->tx_accept_mode & mask) { 5123 flags->update_tx_mode_config = 1; 5124 flags->tx_accept_filter = vf_info->tx_accept_mode; 5125 } 5126 5127 /* Remove if needed; Otherwise this would set the mask */ 5128 if (!vf_info->is_trusted_configured) { 5129 flags->rx_accept_filter &= ~mask; 5130 flags->tx_accept_filter &= ~mask; 5131 } 5132 5133 if (flags->update_rx_mode_config || 5134 flags->update_tx_mode_config) 5135 qed_sp_vport_update(hwfn, ¶ms, 5136 QED_SPQ_MODE_EBLOCK, NULL); 5137 } 5138 } 5139 5140 static void qed_iov_pf_task(struct work_struct *work) 5141 5142 { 5143 struct qed_hwfn *hwfn = container_of(work, struct qed_hwfn, 5144 iov_task.work); 5145 int rc; 5146 5147 if (test_and_clear_bit(QED_IOV_WQ_STOP_WQ_FLAG, &hwfn->iov_task_flags)) 5148 return; 5149 5150 if (test_and_clear_bit(QED_IOV_WQ_FLR_FLAG, &hwfn->iov_task_flags)) { 5151 struct qed_ptt *ptt = qed_ptt_acquire(hwfn); 5152 5153 if (!ptt) { 5154 qed_schedule_iov(hwfn, QED_IOV_WQ_FLR_FLAG); 5155 return; 5156 } 5157 5158 rc = qed_iov_vf_flr_cleanup(hwfn, ptt); 5159 if (rc) 5160 qed_schedule_iov(hwfn, QED_IOV_WQ_FLR_FLAG); 5161 5162 qed_ptt_release(hwfn, ptt); 5163 } 5164 5165 if (test_and_clear_bit(QED_IOV_WQ_MSG_FLAG, &hwfn->iov_task_flags)) 5166 qed_handle_vf_msg(hwfn); 5167 5168 if (test_and_clear_bit(QED_IOV_WQ_SET_UNICAST_FILTER_FLAG, 5169 &hwfn->iov_task_flags)) 5170 qed_handle_pf_set_vf_unicast(hwfn); 5171 5172 if (test_and_clear_bit(QED_IOV_WQ_BULLETIN_UPDATE_FLAG, 5173 &hwfn->iov_task_flags)) 5174 qed_handle_bulletin_post(hwfn); 5175 5176 if (test_and_clear_bit(QED_IOV_WQ_TRUST_FLAG, &hwfn->iov_task_flags)) 5177 qed_iov_handle_trust_change(hwfn); 5178 } 5179 5180 void qed_iov_wq_stop(struct qed_dev *cdev, bool schedule_first) 5181 { 5182 int i; 5183 5184 for_each_hwfn(cdev, i) { 5185 if (!cdev->hwfns[i].iov_wq) 5186 continue; 5187 5188 if (schedule_first) { 5189 qed_schedule_iov(&cdev->hwfns[i], 5190 QED_IOV_WQ_STOP_WQ_FLAG); 5191 cancel_delayed_work_sync(&cdev->hwfns[i].iov_task); 5192 } 5193 5194 flush_workqueue(cdev->hwfns[i].iov_wq); 5195 destroy_workqueue(cdev->hwfns[i].iov_wq); 5196 } 5197 } 5198 5199 int qed_iov_wq_start(struct qed_dev *cdev) 5200 { 5201 char name[NAME_SIZE]; 5202 int i; 5203 5204 for_each_hwfn(cdev, i) { 5205 struct qed_hwfn *p_hwfn = &cdev->hwfns[i]; 5206 5207 /* PFs needs a dedicated workqueue only if they support IOV. 5208 * VFs always require one. 5209 */ 5210 if (IS_PF(p_hwfn->cdev) && !IS_PF_SRIOV(p_hwfn)) 5211 continue; 5212 5213 snprintf(name, NAME_SIZE, "iov-%02x:%02x.%02x", 5214 cdev->pdev->bus->number, 5215 PCI_SLOT(cdev->pdev->devfn), p_hwfn->abs_pf_id); 5216 5217 p_hwfn->iov_wq = create_singlethread_workqueue(name); 5218 if (!p_hwfn->iov_wq) { 5219 DP_NOTICE(p_hwfn, "Cannot create iov workqueue\n"); 5220 return -ENOMEM; 5221 } 5222 5223 if (IS_PF(cdev)) 5224 INIT_DELAYED_WORK(&p_hwfn->iov_task, qed_iov_pf_task); 5225 else 5226 INIT_DELAYED_WORK(&p_hwfn->iov_task, qed_iov_vf_task); 5227 } 5228 5229 return 0; 5230 } 5231 5232 const struct qed_iov_hv_ops qed_iov_ops_pass = { 5233 .configure = &qed_sriov_configure, 5234 .set_mac = &qed_sriov_pf_set_mac, 5235 .set_vlan = &qed_sriov_pf_set_vlan, 5236 .get_config = &qed_get_vf_config, 5237 .set_link_state = &qed_set_vf_link_state, 5238 .set_spoof = &qed_spoof_configure, 5239 .set_rate = &qed_set_vf_rate, 5240 .set_trust = &qed_set_vf_trust, 5241 }; 5242