1 /* QLogic qed NIC Driver
2 * Copyright (c) 2015-2017 QLogic Corporation
4 * This software is available to you under a choice of one of two
5 * licenses. You may choose to be licensed under the terms of the GNU
6 * General Public License (GPL) Version 2, available from the file
7 * COPYING in the main directory of this source tree, or the
8 * OpenIB.org BSD license below:
10 * Redistribution and use in source and binary forms, with or
11 * without modification, are permitted provided that the following
14 * - Redistributions of source code must retain the above
15 * copyright notice, this list of conditions and the following
18 * - Redistributions in binary form must reproduce the above
19 * copyright notice, this list of conditions and the following
20 * disclaimer in the documentation and /or other materials
21 * provided with the distribution.
23 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
24 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
25 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
26 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
27 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
28 * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
29 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
33 #include <linux/etherdevice.h>
34 #include <linux/crc32.h>
35 #include <linux/vmalloc.h>
36 #include <linux/qed/qed_iov_if.h>
40 #include "qed_init_ops.h"
43 #include "qed_reg_addr.h"
45 #include "qed_sriov.h"
47 static int qed_sriov_eqe_event(struct qed_hwfn *p_hwfn,
50 union event_ring_data *data, u8 fw_return_code);
51 static int qed_iov_bulletin_set_mac(struct qed_hwfn *p_hwfn, u8 *mac, int vfid);
53 static u8 qed_vf_calculate_legacy(struct qed_vf_info *p_vf)
57 if (p_vf->acquire.vfdev_info.eth_fp_hsi_minor ==
58 ETH_HSI_VER_NO_PKT_LEN_TUNN)
59 legacy |= QED_QCID_LEGACY_VF_RX_PROD;
61 if (!(p_vf->acquire.vfdev_info.capabilities &
62 VFPF_ACQUIRE_CAP_QUEUE_QIDS))
63 legacy |= QED_QCID_LEGACY_VF_CID;
69 static int qed_sp_vf_start(struct qed_hwfn *p_hwfn, struct qed_vf_info *p_vf)
71 struct vf_start_ramrod_data *p_ramrod = NULL;
72 struct qed_spq_entry *p_ent = NULL;
73 struct qed_sp_init_data init_data;
78 memset(&init_data, 0, sizeof(init_data));
79 init_data.cid = qed_spq_get_cid(p_hwfn);
80 init_data.opaque_fid = p_vf->opaque_fid;
81 init_data.comp_mode = QED_SPQ_MODE_EBLOCK;
83 rc = qed_sp_init_request(p_hwfn, &p_ent,
84 COMMON_RAMROD_VF_START,
85 PROTOCOLID_COMMON, &init_data);
89 p_ramrod = &p_ent->ramrod.vf_start;
91 p_ramrod->vf_id = GET_FIELD(p_vf->concrete_fid, PXP_CONCRETE_FID_VFID);
92 p_ramrod->opaque_fid = cpu_to_le16(p_vf->opaque_fid);
94 switch (p_hwfn->hw_info.personality) {
96 p_ramrod->personality = PERSONALITY_ETH;
98 case QED_PCI_ETH_ROCE:
99 p_ramrod->personality = PERSONALITY_RDMA_AND_ETH;
102 DP_NOTICE(p_hwfn, "Unknown VF personality %d\n",
103 p_hwfn->hw_info.personality);
107 fp_minor = p_vf->acquire.vfdev_info.eth_fp_hsi_minor;
108 if (fp_minor > ETH_HSI_VER_MINOR &&
109 fp_minor != ETH_HSI_VER_NO_PKT_LEN_TUNN) {
112 "VF [%d] - Requested fp hsi %02x.%02x which is slightly newer than PF's %02x.%02x; Configuring PFs version\n",
115 fp_minor, ETH_HSI_VER_MAJOR, ETH_HSI_VER_MINOR);
116 fp_minor = ETH_HSI_VER_MINOR;
119 p_ramrod->hsi_fp_ver.major_ver_arr[ETH_VER_KEY] = ETH_HSI_VER_MAJOR;
120 p_ramrod->hsi_fp_ver.minor_ver_arr[ETH_VER_KEY] = fp_minor;
122 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
123 "VF[%d] - Starting using HSI %02x.%02x\n",
124 p_vf->abs_vf_id, ETH_HSI_VER_MAJOR, fp_minor);
126 return qed_spq_post(p_hwfn, p_ent, NULL);
129 static int qed_sp_vf_stop(struct qed_hwfn *p_hwfn,
130 u32 concrete_vfid, u16 opaque_vfid)
132 struct vf_stop_ramrod_data *p_ramrod = NULL;
133 struct qed_spq_entry *p_ent = NULL;
134 struct qed_sp_init_data init_data;
138 memset(&init_data, 0, sizeof(init_data));
139 init_data.cid = qed_spq_get_cid(p_hwfn);
140 init_data.opaque_fid = opaque_vfid;
141 init_data.comp_mode = QED_SPQ_MODE_EBLOCK;
143 rc = qed_sp_init_request(p_hwfn, &p_ent,
144 COMMON_RAMROD_VF_STOP,
145 PROTOCOLID_COMMON, &init_data);
149 p_ramrod = &p_ent->ramrod.vf_stop;
151 p_ramrod->vf_id = GET_FIELD(concrete_vfid, PXP_CONCRETE_FID_VFID);
153 return qed_spq_post(p_hwfn, p_ent, NULL);
156 bool qed_iov_is_valid_vfid(struct qed_hwfn *p_hwfn,
158 bool b_enabled_only, bool b_non_malicious)
160 if (!p_hwfn->pf_iov_info) {
161 DP_NOTICE(p_hwfn->cdev, "No iov info\n");
165 if ((rel_vf_id >= p_hwfn->cdev->p_iov_info->total_vfs) ||
169 if ((!p_hwfn->pf_iov_info->vfs_array[rel_vf_id].b_init) &&
173 if ((p_hwfn->pf_iov_info->vfs_array[rel_vf_id].b_malicious) &&
180 static struct qed_vf_info *qed_iov_get_vf_info(struct qed_hwfn *p_hwfn,
184 struct qed_vf_info *vf = NULL;
186 if (!p_hwfn->pf_iov_info) {
187 DP_NOTICE(p_hwfn->cdev, "No iov info\n");
191 if (qed_iov_is_valid_vfid(p_hwfn, relative_vf_id,
192 b_enabled_only, false))
193 vf = &p_hwfn->pf_iov_info->vfs_array[relative_vf_id];
195 DP_ERR(p_hwfn, "qed_iov_get_vf_info: VF[%d] is not enabled\n",
201 static struct qed_queue_cid *
202 qed_iov_get_vf_rx_queue_cid(struct qed_vf_queue *p_queue)
206 for (i = 0; i < MAX_QUEUES_PER_QZONE; i++) {
207 if (p_queue->cids[i].p_cid && !p_queue->cids[i].b_is_tx)
208 return p_queue->cids[i].p_cid;
214 enum qed_iov_validate_q_mode {
215 QED_IOV_VALIDATE_Q_NA,
216 QED_IOV_VALIDATE_Q_ENABLE,
217 QED_IOV_VALIDATE_Q_DISABLE,
220 static bool qed_iov_validate_queue_mode(struct qed_hwfn *p_hwfn,
221 struct qed_vf_info *p_vf,
223 enum qed_iov_validate_q_mode mode,
228 if (mode == QED_IOV_VALIDATE_Q_NA)
231 for (i = 0; i < MAX_QUEUES_PER_QZONE; i++) {
232 struct qed_vf_queue_cid *p_qcid;
234 p_qcid = &p_vf->vf_queues[qid].cids[i];
239 if (p_qcid->b_is_tx != b_is_tx)
242 return mode == QED_IOV_VALIDATE_Q_ENABLE;
245 /* In case we haven't found any valid cid, then its disabled */
246 return mode == QED_IOV_VALIDATE_Q_DISABLE;
249 static bool qed_iov_validate_rxq(struct qed_hwfn *p_hwfn,
250 struct qed_vf_info *p_vf,
252 enum qed_iov_validate_q_mode mode)
254 if (rx_qid >= p_vf->num_rxqs) {
257 "VF[0x%02x] - can't touch Rx queue[%04x]; Only 0x%04x are allocated\n",
258 p_vf->abs_vf_id, rx_qid, p_vf->num_rxqs);
262 return qed_iov_validate_queue_mode(p_hwfn, p_vf, rx_qid, mode, false);
265 static bool qed_iov_validate_txq(struct qed_hwfn *p_hwfn,
266 struct qed_vf_info *p_vf,
268 enum qed_iov_validate_q_mode mode)
270 if (tx_qid >= p_vf->num_txqs) {
273 "VF[0x%02x] - can't touch Tx queue[%04x]; Only 0x%04x are allocated\n",
274 p_vf->abs_vf_id, tx_qid, p_vf->num_txqs);
278 return qed_iov_validate_queue_mode(p_hwfn, p_vf, tx_qid, mode, true);
281 static bool qed_iov_validate_sb(struct qed_hwfn *p_hwfn,
282 struct qed_vf_info *p_vf, u16 sb_idx)
286 for (i = 0; i < p_vf->num_sbs; i++)
287 if (p_vf->igu_sbs[i] == sb_idx)
292 "VF[0%02x] - tried using sb_idx %04x which doesn't exist as one of its 0x%02x SBs\n",
293 p_vf->abs_vf_id, sb_idx, p_vf->num_sbs);
298 static bool qed_iov_validate_active_rxq(struct qed_hwfn *p_hwfn,
299 struct qed_vf_info *p_vf)
303 for (i = 0; i < p_vf->num_rxqs; i++)
304 if (qed_iov_validate_queue_mode(p_hwfn, p_vf, i,
305 QED_IOV_VALIDATE_Q_ENABLE,
312 static bool qed_iov_validate_active_txq(struct qed_hwfn *p_hwfn,
313 struct qed_vf_info *p_vf)
317 for (i = 0; i < p_vf->num_txqs; i++)
318 if (qed_iov_validate_queue_mode(p_hwfn, p_vf, i,
319 QED_IOV_VALIDATE_Q_ENABLE,
326 static int qed_iov_post_vf_bulletin(struct qed_hwfn *p_hwfn,
327 int vfid, struct qed_ptt *p_ptt)
329 struct qed_bulletin_content *p_bulletin;
330 int crc_size = sizeof(p_bulletin->crc);
331 struct qed_dmae_params params;
332 struct qed_vf_info *p_vf;
334 p_vf = qed_iov_get_vf_info(p_hwfn, (u16) vfid, true);
338 if (!p_vf->vf_bulletin)
341 p_bulletin = p_vf->bulletin.p_virt;
343 /* Increment bulletin board version and compute crc */
344 p_bulletin->version++;
345 p_bulletin->crc = crc32(0, (u8 *)p_bulletin + crc_size,
346 p_vf->bulletin.size - crc_size);
348 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
349 "Posting Bulletin 0x%08x to VF[%d] (CRC 0x%08x)\n",
350 p_bulletin->version, p_vf->relative_vf_id, p_bulletin->crc);
352 /* propagate bulletin board via dmae to vm memory */
353 memset(¶ms, 0, sizeof(params));
354 params.flags = QED_DMAE_FLAG_VF_DST;
355 params.dst_vfid = p_vf->abs_vf_id;
356 return qed_dmae_host2host(p_hwfn, p_ptt, p_vf->bulletin.phys,
357 p_vf->vf_bulletin, p_vf->bulletin.size / 4,
361 static int qed_iov_pci_cfg_info(struct qed_dev *cdev)
363 struct qed_hw_sriov_info *iov = cdev->p_iov_info;
366 DP_VERBOSE(cdev, QED_MSG_IOV, "sriov ext pos %d\n", pos);
367 pci_read_config_word(cdev->pdev, pos + PCI_SRIOV_CTRL, &iov->ctrl);
369 pci_read_config_word(cdev->pdev,
370 pos + PCI_SRIOV_TOTAL_VF, &iov->total_vfs);
371 pci_read_config_word(cdev->pdev,
372 pos + PCI_SRIOV_INITIAL_VF, &iov->initial_vfs);
374 pci_read_config_word(cdev->pdev, pos + PCI_SRIOV_NUM_VF, &iov->num_vfs);
378 "Number of VFs are already set to non-zero value. Ignoring PCI configuration value\n");
382 pci_read_config_word(cdev->pdev,
383 pos + PCI_SRIOV_VF_OFFSET, &iov->offset);
385 pci_read_config_word(cdev->pdev,
386 pos + PCI_SRIOV_VF_STRIDE, &iov->stride);
388 pci_read_config_word(cdev->pdev,
389 pos + PCI_SRIOV_VF_DID, &iov->vf_device_id);
391 pci_read_config_dword(cdev->pdev,
392 pos + PCI_SRIOV_SUP_PGSIZE, &iov->pgsz);
394 pci_read_config_dword(cdev->pdev, pos + PCI_SRIOV_CAP, &iov->cap);
396 pci_read_config_byte(cdev->pdev, pos + PCI_SRIOV_FUNC_LINK, &iov->link);
400 "IOV info: nres %d, cap 0x%x, ctrl 0x%x, total %d, initial %d, num vfs %d, offset %d, stride %d, page size 0x%x\n",
406 iov->nr_virtfn, iov->offset, iov->stride, iov->pgsz);
408 /* Some sanity checks */
409 if (iov->num_vfs > NUM_OF_VFS(cdev) ||
410 iov->total_vfs > NUM_OF_VFS(cdev)) {
411 /* This can happen only due to a bug. In this case we set
412 * num_vfs to zero to avoid memory corruption in the code that
413 * assumes max number of vfs
416 "IOV: Unexpected number of vfs set: %d setting num_vf to zero\n",
426 static void qed_iov_setup_vfdb(struct qed_hwfn *p_hwfn)
428 struct qed_hw_sriov_info *p_iov = p_hwfn->cdev->p_iov_info;
429 struct qed_pf_iov *p_iov_info = p_hwfn->pf_iov_info;
430 struct qed_bulletin_content *p_bulletin_virt;
431 dma_addr_t req_p, rply_p, bulletin_p;
432 union pfvf_tlvs *p_reply_virt_addr;
433 union vfpf_tlvs *p_req_virt_addr;
436 memset(p_iov_info->vfs_array, 0, sizeof(p_iov_info->vfs_array));
438 p_req_virt_addr = p_iov_info->mbx_msg_virt_addr;
439 req_p = p_iov_info->mbx_msg_phys_addr;
440 p_reply_virt_addr = p_iov_info->mbx_reply_virt_addr;
441 rply_p = p_iov_info->mbx_reply_phys_addr;
442 p_bulletin_virt = p_iov_info->p_bulletins;
443 bulletin_p = p_iov_info->bulletins_phys;
444 if (!p_req_virt_addr || !p_reply_virt_addr || !p_bulletin_virt) {
446 "qed_iov_setup_vfdb called without allocating mem first\n");
450 for (idx = 0; idx < p_iov->total_vfs; idx++) {
451 struct qed_vf_info *vf = &p_iov_info->vfs_array[idx];
454 vf->vf_mbx.req_virt = p_req_virt_addr + idx;
455 vf->vf_mbx.req_phys = req_p + idx * sizeof(union vfpf_tlvs);
456 vf->vf_mbx.reply_virt = p_reply_virt_addr + idx;
457 vf->vf_mbx.reply_phys = rply_p + idx * sizeof(union pfvf_tlvs);
459 vf->state = VF_STOPPED;
462 vf->bulletin.phys = idx *
463 sizeof(struct qed_bulletin_content) +
465 vf->bulletin.p_virt = p_bulletin_virt + idx;
466 vf->bulletin.size = sizeof(struct qed_bulletin_content);
468 vf->relative_vf_id = idx;
469 vf->abs_vf_id = idx + p_iov->first_vf_in_pf;
470 concrete = qed_vfid_to_concrete(p_hwfn, vf->abs_vf_id);
471 vf->concrete_fid = concrete;
472 vf->opaque_fid = (p_hwfn->hw_info.opaque_fid & 0xff) |
473 (vf->abs_vf_id << 8);
474 vf->vport_id = idx + 1;
476 vf->num_mac_filters = QED_ETH_VF_NUM_MAC_FILTERS;
477 vf->num_vlan_filters = QED_ETH_VF_NUM_VLAN_FILTERS;
481 static int qed_iov_allocate_vfdb(struct qed_hwfn *p_hwfn)
483 struct qed_pf_iov *p_iov_info = p_hwfn->pf_iov_info;
487 num_vfs = p_hwfn->cdev->p_iov_info->total_vfs;
489 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
490 "qed_iov_allocate_vfdb for %d VFs\n", num_vfs);
492 /* Allocate PF Mailbox buffer (per-VF) */
493 p_iov_info->mbx_msg_size = sizeof(union vfpf_tlvs) * num_vfs;
494 p_v_addr = &p_iov_info->mbx_msg_virt_addr;
495 *p_v_addr = dma_alloc_coherent(&p_hwfn->cdev->pdev->dev,
496 p_iov_info->mbx_msg_size,
497 &p_iov_info->mbx_msg_phys_addr,
502 /* Allocate PF Mailbox Reply buffer (per-VF) */
503 p_iov_info->mbx_reply_size = sizeof(union pfvf_tlvs) * num_vfs;
504 p_v_addr = &p_iov_info->mbx_reply_virt_addr;
505 *p_v_addr = dma_alloc_coherent(&p_hwfn->cdev->pdev->dev,
506 p_iov_info->mbx_reply_size,
507 &p_iov_info->mbx_reply_phys_addr,
512 p_iov_info->bulletins_size = sizeof(struct qed_bulletin_content) *
514 p_v_addr = &p_iov_info->p_bulletins;
515 *p_v_addr = dma_alloc_coherent(&p_hwfn->cdev->pdev->dev,
516 p_iov_info->bulletins_size,
517 &p_iov_info->bulletins_phys,
524 "PF's Requests mailbox [%p virt 0x%llx phys], Response mailbox [%p virt 0x%llx phys] Bulletins [%p virt 0x%llx phys]\n",
525 p_iov_info->mbx_msg_virt_addr,
526 (u64) p_iov_info->mbx_msg_phys_addr,
527 p_iov_info->mbx_reply_virt_addr,
528 (u64) p_iov_info->mbx_reply_phys_addr,
529 p_iov_info->p_bulletins, (u64) p_iov_info->bulletins_phys);
534 static void qed_iov_free_vfdb(struct qed_hwfn *p_hwfn)
536 struct qed_pf_iov *p_iov_info = p_hwfn->pf_iov_info;
538 if (p_hwfn->pf_iov_info->mbx_msg_virt_addr)
539 dma_free_coherent(&p_hwfn->cdev->pdev->dev,
540 p_iov_info->mbx_msg_size,
541 p_iov_info->mbx_msg_virt_addr,
542 p_iov_info->mbx_msg_phys_addr);
544 if (p_hwfn->pf_iov_info->mbx_reply_virt_addr)
545 dma_free_coherent(&p_hwfn->cdev->pdev->dev,
546 p_iov_info->mbx_reply_size,
547 p_iov_info->mbx_reply_virt_addr,
548 p_iov_info->mbx_reply_phys_addr);
550 if (p_iov_info->p_bulletins)
551 dma_free_coherent(&p_hwfn->cdev->pdev->dev,
552 p_iov_info->bulletins_size,
553 p_iov_info->p_bulletins,
554 p_iov_info->bulletins_phys);
557 int qed_iov_alloc(struct qed_hwfn *p_hwfn)
559 struct qed_pf_iov *p_sriov;
561 if (!IS_PF_SRIOV(p_hwfn)) {
562 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
563 "No SR-IOV - no need for IOV db\n");
567 p_sriov = kzalloc(sizeof(*p_sriov), GFP_KERNEL);
571 p_hwfn->pf_iov_info = p_sriov;
573 qed_spq_register_async_cb(p_hwfn, PROTOCOLID_COMMON,
574 qed_sriov_eqe_event);
576 return qed_iov_allocate_vfdb(p_hwfn);
579 void qed_iov_setup(struct qed_hwfn *p_hwfn)
581 if (!IS_PF_SRIOV(p_hwfn) || !IS_PF_SRIOV_ALLOC(p_hwfn))
584 qed_iov_setup_vfdb(p_hwfn);
587 void qed_iov_free(struct qed_hwfn *p_hwfn)
589 qed_spq_unregister_async_cb(p_hwfn, PROTOCOLID_COMMON);
591 if (IS_PF_SRIOV_ALLOC(p_hwfn)) {
592 qed_iov_free_vfdb(p_hwfn);
593 kfree(p_hwfn->pf_iov_info);
597 void qed_iov_free_hw_info(struct qed_dev *cdev)
599 kfree(cdev->p_iov_info);
600 cdev->p_iov_info = NULL;
603 int qed_iov_hw_info(struct qed_hwfn *p_hwfn)
605 struct qed_dev *cdev = p_hwfn->cdev;
609 if (IS_VF(p_hwfn->cdev))
612 /* Learn the PCI configuration */
613 pos = pci_find_ext_capability(p_hwfn->cdev->pdev,
614 PCI_EXT_CAP_ID_SRIOV);
616 DP_VERBOSE(p_hwfn, QED_MSG_IOV, "No PCIe IOV support\n");
620 /* Allocate a new struct for IOV information */
621 cdev->p_iov_info = kzalloc(sizeof(*cdev->p_iov_info), GFP_KERNEL);
622 if (!cdev->p_iov_info)
625 cdev->p_iov_info->pos = pos;
627 rc = qed_iov_pci_cfg_info(cdev);
631 /* We want PF IOV to be synonemous with the existance of p_iov_info;
632 * In case the capability is published but there are no VFs, simply
633 * de-allocate the struct.
635 if (!cdev->p_iov_info->total_vfs) {
636 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
637 "IOV capabilities, but no VFs are published\n");
638 kfree(cdev->p_iov_info);
639 cdev->p_iov_info = NULL;
643 /* First VF index based on offset is tricky:
644 * - If ARI is supported [likely], offset - (16 - pf_id) would
645 * provide the number for eng0. 2nd engine Vfs would begin
646 * after the first engine's VFs.
647 * - If !ARI, VFs would start on next device.
648 * so offset - (256 - pf_id) would provide the number.
649 * Utilize the fact that (256 - pf_id) is achieved only by later
650 * to differentiate between the two.
653 if (p_hwfn->cdev->p_iov_info->offset < (256 - p_hwfn->abs_pf_id)) {
654 u32 first = p_hwfn->cdev->p_iov_info->offset +
655 p_hwfn->abs_pf_id - 16;
657 cdev->p_iov_info->first_vf_in_pf = first;
659 if (QED_PATH_ID(p_hwfn))
660 cdev->p_iov_info->first_vf_in_pf -= MAX_NUM_VFS_BB;
662 u32 first = p_hwfn->cdev->p_iov_info->offset +
663 p_hwfn->abs_pf_id - 256;
665 cdev->p_iov_info->first_vf_in_pf = first;
668 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
669 "First VF in hwfn 0x%08x\n",
670 cdev->p_iov_info->first_vf_in_pf);
675 bool _qed_iov_pf_sanity_check(struct qed_hwfn *p_hwfn,
676 int vfid, bool b_fail_malicious)
678 /* Check PF supports sriov */
679 if (IS_VF(p_hwfn->cdev) || !IS_QED_SRIOV(p_hwfn->cdev) ||
680 !IS_PF_SRIOV_ALLOC(p_hwfn))
683 /* Check VF validity */
684 if (!qed_iov_is_valid_vfid(p_hwfn, vfid, true, b_fail_malicious))
690 bool qed_iov_pf_sanity_check(struct qed_hwfn *p_hwfn, int vfid)
692 return _qed_iov_pf_sanity_check(p_hwfn, vfid, true);
695 static void qed_iov_set_vf_to_disable(struct qed_dev *cdev,
696 u16 rel_vf_id, u8 to_disable)
698 struct qed_vf_info *vf;
701 for_each_hwfn(cdev, i) {
702 struct qed_hwfn *p_hwfn = &cdev->hwfns[i];
704 vf = qed_iov_get_vf_info(p_hwfn, rel_vf_id, false);
708 vf->to_disable = to_disable;
712 static void qed_iov_set_vfs_to_disable(struct qed_dev *cdev, u8 to_disable)
716 if (!IS_QED_SRIOV(cdev))
719 for (i = 0; i < cdev->p_iov_info->total_vfs; i++)
720 qed_iov_set_vf_to_disable(cdev, i, to_disable);
723 static void qed_iov_vf_pglue_clear_err(struct qed_hwfn *p_hwfn,
724 struct qed_ptt *p_ptt, u8 abs_vfid)
726 qed_wr(p_hwfn, p_ptt,
727 PGLUE_B_REG_WAS_ERROR_VF_31_0_CLR + (abs_vfid >> 5) * 4,
728 1 << (abs_vfid & 0x1f));
731 static void qed_iov_vf_igu_reset(struct qed_hwfn *p_hwfn,
732 struct qed_ptt *p_ptt, struct qed_vf_info *vf)
736 /* Set VF masks and configuration - pretend */
737 qed_fid_pretend(p_hwfn, p_ptt, (u16) vf->concrete_fid);
739 qed_wr(p_hwfn, p_ptt, IGU_REG_STATISTIC_NUM_VF_MSG_SENT, 0);
742 qed_fid_pretend(p_hwfn, p_ptt, (u16) p_hwfn->hw_info.concrete_fid);
744 /* iterate over all queues, clear sb consumer */
745 for (i = 0; i < vf->num_sbs; i++)
746 qed_int_igu_init_pure_rt_single(p_hwfn, p_ptt,
748 vf->opaque_fid, true);
751 static void qed_iov_vf_igu_set_int(struct qed_hwfn *p_hwfn,
752 struct qed_ptt *p_ptt,
753 struct qed_vf_info *vf, bool enable)
757 qed_fid_pretend(p_hwfn, p_ptt, (u16) vf->concrete_fid);
759 igu_vf_conf = qed_rd(p_hwfn, p_ptt, IGU_REG_VF_CONFIGURATION);
762 igu_vf_conf |= IGU_VF_CONF_MSI_MSIX_EN;
764 igu_vf_conf &= ~IGU_VF_CONF_MSI_MSIX_EN;
766 qed_wr(p_hwfn, p_ptt, IGU_REG_VF_CONFIGURATION, igu_vf_conf);
769 qed_fid_pretend(p_hwfn, p_ptt, (u16) p_hwfn->hw_info.concrete_fid);
773 qed_iov_enable_vf_access_msix(struct qed_hwfn *p_hwfn,
774 struct qed_ptt *p_ptt, u8 abs_vf_id, u8 num_sbs)
779 /* For AH onward, configuration is per-PF. Find maximum of all
780 * the currently enabled child VFs, and set the number to be that.
782 if (!QED_IS_BB(p_hwfn->cdev)) {
783 qed_for_each_vf(p_hwfn, i) {
784 struct qed_vf_info *p_vf;
786 p_vf = qed_iov_get_vf_info(p_hwfn, (u16)i, true);
790 current_max = max_t(u8, current_max, p_vf->num_sbs);
794 if (num_sbs > current_max)
795 return qed_mcp_config_vf_msix(p_hwfn, p_ptt,
801 static int qed_iov_enable_vf_access(struct qed_hwfn *p_hwfn,
802 struct qed_ptt *p_ptt,
803 struct qed_vf_info *vf)
805 u32 igu_vf_conf = IGU_VF_CONF_FUNC_EN;
808 /* It's possible VF was previously considered malicious -
809 * clear the indication even if we're only going to disable VF.
811 vf->b_malicious = false;
818 "Enable internal access for vf %x [abs %x]\n",
819 vf->abs_vf_id, QED_VF_ABS_ID(p_hwfn, vf));
821 qed_iov_vf_pglue_clear_err(p_hwfn, p_ptt, QED_VF_ABS_ID(p_hwfn, vf));
823 qed_iov_vf_igu_reset(p_hwfn, p_ptt, vf);
825 rc = qed_iov_enable_vf_access_msix(p_hwfn, p_ptt,
826 vf->abs_vf_id, vf->num_sbs);
830 qed_fid_pretend(p_hwfn, p_ptt, (u16) vf->concrete_fid);
832 SET_FIELD(igu_vf_conf, IGU_VF_CONF_PARENT, p_hwfn->rel_pf_id);
833 STORE_RT_REG(p_hwfn, IGU_REG_VF_CONFIGURATION_RT_OFFSET, igu_vf_conf);
835 qed_init_run(p_hwfn, p_ptt, PHASE_VF, vf->abs_vf_id,
836 p_hwfn->hw_info.hw_mode);
839 qed_fid_pretend(p_hwfn, p_ptt, (u16) p_hwfn->hw_info.concrete_fid);
847 * @brief qed_iov_config_perm_table - configure the permission
849 * In E4, queue zone permission table size is 320x9. There
850 * are 320 VF queues for single engine device (256 for dual
851 * engine device), and each entry has the following format:
858 static void qed_iov_config_perm_table(struct qed_hwfn *p_hwfn,
859 struct qed_ptt *p_ptt,
860 struct qed_vf_info *vf, u8 enable)
866 for (qid = 0; qid < vf->num_rxqs; qid++) {
867 qed_fw_l2_queue(p_hwfn, vf->vf_queues[qid].fw_rx_qid,
870 reg_addr = PSWHST_REG_ZONE_PERMISSION_TABLE + qzone_id * 4;
871 val = enable ? (vf->abs_vf_id | BIT(8)) : 0;
872 qed_wr(p_hwfn, p_ptt, reg_addr, val);
876 static void qed_iov_enable_vf_traffic(struct qed_hwfn *p_hwfn,
877 struct qed_ptt *p_ptt,
878 struct qed_vf_info *vf)
880 /* Reset vf in IGU - interrupts are still disabled */
881 qed_iov_vf_igu_reset(p_hwfn, p_ptt, vf);
883 qed_iov_vf_igu_set_int(p_hwfn, p_ptt, vf, 1);
885 /* Permission Table */
886 qed_iov_config_perm_table(p_hwfn, p_ptt, vf, true);
889 static u8 qed_iov_alloc_vf_igu_sbs(struct qed_hwfn *p_hwfn,
890 struct qed_ptt *p_ptt,
891 struct qed_vf_info *vf, u16 num_rx_queues)
893 struct qed_igu_block *p_block;
894 struct cau_sb_entry sb_entry;
898 if (num_rx_queues > p_hwfn->hw_info.p_igu_info->usage.free_cnt_iov)
899 num_rx_queues = p_hwfn->hw_info.p_igu_info->usage.free_cnt_iov;
900 p_hwfn->hw_info.p_igu_info->usage.free_cnt_iov -= num_rx_queues;
902 SET_FIELD(val, IGU_MAPPING_LINE_FUNCTION_NUMBER, vf->abs_vf_id);
903 SET_FIELD(val, IGU_MAPPING_LINE_VALID, 1);
904 SET_FIELD(val, IGU_MAPPING_LINE_PF_VALID, 0);
906 for (qid = 0; qid < num_rx_queues; qid++) {
907 p_block = qed_get_igu_free_sb(p_hwfn, false);
908 vf->igu_sbs[qid] = p_block->igu_sb_id;
909 p_block->status &= ~QED_IGU_STATUS_FREE;
910 SET_FIELD(val, IGU_MAPPING_LINE_VECTOR_NUMBER, qid);
912 qed_wr(p_hwfn, p_ptt,
913 IGU_REG_MAPPING_MEMORY +
914 sizeof(u32) * p_block->igu_sb_id, val);
916 /* Configure igu sb in CAU which were marked valid */
917 qed_init_cau_sb_entry(p_hwfn, &sb_entry,
918 p_hwfn->rel_pf_id, vf->abs_vf_id, 1);
919 qed_dmae_host2grc(p_hwfn, p_ptt,
920 (u64)(uintptr_t)&sb_entry,
921 CAU_REG_SB_VAR_MEMORY +
922 p_block->igu_sb_id * sizeof(u64), 2, 0);
925 vf->num_sbs = (u8) num_rx_queues;
930 static void qed_iov_free_vf_igu_sbs(struct qed_hwfn *p_hwfn,
931 struct qed_ptt *p_ptt,
932 struct qed_vf_info *vf)
934 struct qed_igu_info *p_info = p_hwfn->hw_info.p_igu_info;
938 /* Invalidate igu CAM lines and mark them as free */
939 for (idx = 0; idx < vf->num_sbs; idx++) {
940 igu_id = vf->igu_sbs[idx];
941 addr = IGU_REG_MAPPING_MEMORY + sizeof(u32) * igu_id;
943 val = qed_rd(p_hwfn, p_ptt, addr);
944 SET_FIELD(val, IGU_MAPPING_LINE_VALID, 0);
945 qed_wr(p_hwfn, p_ptt, addr, val);
947 p_info->entry[igu_id].status |= QED_IGU_STATUS_FREE;
948 p_hwfn->hw_info.p_igu_info->usage.free_cnt_iov++;
954 static void qed_iov_set_link(struct qed_hwfn *p_hwfn,
956 struct qed_mcp_link_params *params,
957 struct qed_mcp_link_state *link,
958 struct qed_mcp_link_capabilities *p_caps)
960 struct qed_vf_info *p_vf = qed_iov_get_vf_info(p_hwfn,
963 struct qed_bulletin_content *p_bulletin;
968 p_bulletin = p_vf->bulletin.p_virt;
969 p_bulletin->req_autoneg = params->speed.autoneg;
970 p_bulletin->req_adv_speed = params->speed.advertised_speeds;
971 p_bulletin->req_forced_speed = params->speed.forced_speed;
972 p_bulletin->req_autoneg_pause = params->pause.autoneg;
973 p_bulletin->req_forced_rx = params->pause.forced_rx;
974 p_bulletin->req_forced_tx = params->pause.forced_tx;
975 p_bulletin->req_loopback = params->loopback_mode;
977 p_bulletin->link_up = link->link_up;
978 p_bulletin->speed = link->speed;
979 p_bulletin->full_duplex = link->full_duplex;
980 p_bulletin->autoneg = link->an;
981 p_bulletin->autoneg_complete = link->an_complete;
982 p_bulletin->parallel_detection = link->parallel_detection;
983 p_bulletin->pfc_enabled = link->pfc_enabled;
984 p_bulletin->partner_adv_speed = link->partner_adv_speed;
985 p_bulletin->partner_tx_flow_ctrl_en = link->partner_tx_flow_ctrl_en;
986 p_bulletin->partner_rx_flow_ctrl_en = link->partner_rx_flow_ctrl_en;
987 p_bulletin->partner_adv_pause = link->partner_adv_pause;
988 p_bulletin->sfp_tx_fault = link->sfp_tx_fault;
990 p_bulletin->capability_speed = p_caps->speed_capabilities;
993 static int qed_iov_init_hw_for_vf(struct qed_hwfn *p_hwfn,
994 struct qed_ptt *p_ptt,
995 struct qed_iov_vf_init_params *p_params)
997 struct qed_mcp_link_capabilities link_caps;
998 struct qed_mcp_link_params link_params;
999 struct qed_mcp_link_state link_state;
1000 u8 num_of_vf_avaiable_chains = 0;
1001 struct qed_vf_info *vf = NULL;
1007 vf = qed_iov_get_vf_info(p_hwfn, p_params->rel_vf_id, false);
1009 DP_ERR(p_hwfn, "qed_iov_init_hw_for_vf : vf is NULL\n");
1014 DP_NOTICE(p_hwfn, "VF[%d] is already active.\n",
1015 p_params->rel_vf_id);
1019 /* Perform sanity checking on the requested queue_id */
1020 for (i = 0; i < p_params->num_queues; i++) {
1021 u16 min_vf_qzone = FEAT_NUM(p_hwfn, QED_PF_L2_QUE);
1022 u16 max_vf_qzone = min_vf_qzone +
1023 FEAT_NUM(p_hwfn, QED_VF_L2_QUE) - 1;
1025 qid = p_params->req_rx_queue[i];
1026 if (qid < min_vf_qzone || qid > max_vf_qzone) {
1028 "Can't enable Rx qid [%04x] for VF[%d]: qids [0x%04x,...,0x%04x] available\n",
1030 p_params->rel_vf_id,
1031 min_vf_qzone, max_vf_qzone);
1035 qid = p_params->req_tx_queue[i];
1036 if (qid > max_vf_qzone) {
1038 "Can't enable Tx qid [%04x] for VF[%d]: max qid 0x%04x\n",
1039 qid, p_params->rel_vf_id, max_vf_qzone);
1043 /* If client *really* wants, Tx qid can be shared with PF */
1044 if (qid < min_vf_qzone)
1047 "VF[%d] is using PF qid [0x%04x] for Txq[0x%02x]\n",
1048 p_params->rel_vf_id, qid, i);
1051 /* Limit number of queues according to number of CIDs */
1052 qed_cxt_get_proto_cid_count(p_hwfn, PROTOCOLID_ETH, &cids);
1055 "VF[%d] - requesting to initialize for 0x%04x queues [0x%04x CIDs available]\n",
1056 vf->relative_vf_id, p_params->num_queues, (u16)cids);
1057 num_irqs = min_t(u16, p_params->num_queues, ((u16)cids));
1059 num_of_vf_avaiable_chains = qed_iov_alloc_vf_igu_sbs(p_hwfn,
1062 if (!num_of_vf_avaiable_chains) {
1063 DP_ERR(p_hwfn, "no available igu sbs\n");
1067 /* Choose queue number and index ranges */
1068 vf->num_rxqs = num_of_vf_avaiable_chains;
1069 vf->num_txqs = num_of_vf_avaiable_chains;
1071 for (i = 0; i < vf->num_rxqs; i++) {
1072 struct qed_vf_queue *p_queue = &vf->vf_queues[i];
1074 p_queue->fw_rx_qid = p_params->req_rx_queue[i];
1075 p_queue->fw_tx_qid = p_params->req_tx_queue[i];
1077 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
1078 "VF[%d] - Q[%d] SB %04x, qid [Rx %04x Tx %04x]\n",
1079 vf->relative_vf_id, i, vf->igu_sbs[i],
1080 p_queue->fw_rx_qid, p_queue->fw_tx_qid);
1083 /* Update the link configuration in bulletin */
1084 memcpy(&link_params, qed_mcp_get_link_params(p_hwfn),
1085 sizeof(link_params));
1086 memcpy(&link_state, qed_mcp_get_link_state(p_hwfn), sizeof(link_state));
1087 memcpy(&link_caps, qed_mcp_get_link_capabilities(p_hwfn),
1089 qed_iov_set_link(p_hwfn, p_params->rel_vf_id,
1090 &link_params, &link_state, &link_caps);
1092 rc = qed_iov_enable_vf_access(p_hwfn, p_ptt, vf);
1096 if (IS_LEAD_HWFN(p_hwfn))
1097 p_hwfn->cdev->p_iov_info->num_vfs++;
1103 static int qed_iov_release_hw_for_vf(struct qed_hwfn *p_hwfn,
1104 struct qed_ptt *p_ptt, u16 rel_vf_id)
1106 struct qed_mcp_link_capabilities caps;
1107 struct qed_mcp_link_params params;
1108 struct qed_mcp_link_state link;
1109 struct qed_vf_info *vf = NULL;
1111 vf = qed_iov_get_vf_info(p_hwfn, rel_vf_id, true);
1113 DP_ERR(p_hwfn, "qed_iov_release_hw_for_vf : vf is NULL\n");
1117 if (vf->bulletin.p_virt)
1118 memset(vf->bulletin.p_virt, 0, sizeof(*vf->bulletin.p_virt));
1120 memset(&vf->p_vf_info, 0, sizeof(vf->p_vf_info));
1122 /* Get the link configuration back in bulletin so
1123 * that when VFs are re-enabled they get the actual
1124 * link configuration.
1126 memcpy(¶ms, qed_mcp_get_link_params(p_hwfn), sizeof(params));
1127 memcpy(&link, qed_mcp_get_link_state(p_hwfn), sizeof(link));
1128 memcpy(&caps, qed_mcp_get_link_capabilities(p_hwfn), sizeof(caps));
1129 qed_iov_set_link(p_hwfn, rel_vf_id, ¶ms, &link, &caps);
1131 /* Forget the VF's acquisition message */
1132 memset(&vf->acquire, 0, sizeof(vf->acquire));
1134 /* disablng interrupts and resetting permission table was done during
1135 * vf-close, however, we could get here without going through vf_close
1137 /* Disable Interrupts for VF */
1138 qed_iov_vf_igu_set_int(p_hwfn, p_ptt, vf, 0);
1140 /* Reset Permission table */
1141 qed_iov_config_perm_table(p_hwfn, p_ptt, vf, 0);
1145 qed_iov_free_vf_igu_sbs(p_hwfn, p_ptt, vf);
1150 if (IS_LEAD_HWFN(p_hwfn))
1151 p_hwfn->cdev->p_iov_info->num_vfs--;
1157 static bool qed_iov_tlv_supported(u16 tlvtype)
1159 return CHANNEL_TLV_NONE < tlvtype && tlvtype < CHANNEL_TLV_MAX;
1162 /* place a given tlv on the tlv buffer, continuing current tlv list */
1163 void *qed_add_tlv(struct qed_hwfn *p_hwfn, u8 **offset, u16 type, u16 length)
1165 struct channel_tlv *tl = (struct channel_tlv *)*offset;
1168 tl->length = length;
1170 /* Offset should keep pointing to next TLV (the end of the last) */
1173 /* Return a pointer to the start of the added tlv */
1174 return *offset - length;
1177 /* list the types and lengths of the tlvs on the buffer */
1178 void qed_dp_tlv_list(struct qed_hwfn *p_hwfn, void *tlvs_list)
1180 u16 i = 1, total_length = 0;
1181 struct channel_tlv *tlv;
1184 tlv = (struct channel_tlv *)((u8 *)tlvs_list + total_length);
1187 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
1188 "TLV number %d: type %d, length %d\n",
1189 i, tlv->type, tlv->length);
1191 if (tlv->type == CHANNEL_TLV_LIST_END)
1194 /* Validate entry - protect against malicious VFs */
1196 DP_NOTICE(p_hwfn, "TLV of length 0 found\n");
1200 total_length += tlv->length;
1202 if (total_length >= sizeof(struct tlv_buffer_size)) {
1203 DP_NOTICE(p_hwfn, "TLV ==> Buffer overflow\n");
1211 static void qed_iov_send_response(struct qed_hwfn *p_hwfn,
1212 struct qed_ptt *p_ptt,
1213 struct qed_vf_info *p_vf,
1214 u16 length, u8 status)
1216 struct qed_iov_vf_mbx *mbx = &p_vf->vf_mbx;
1217 struct qed_dmae_params params;
1220 mbx->reply_virt->default_resp.hdr.status = status;
1222 qed_dp_tlv_list(p_hwfn, mbx->reply_virt);
1224 eng_vf_id = p_vf->abs_vf_id;
1226 memset(¶ms, 0, sizeof(struct qed_dmae_params));
1227 params.flags = QED_DMAE_FLAG_VF_DST;
1228 params.dst_vfid = eng_vf_id;
1230 qed_dmae_host2host(p_hwfn, p_ptt, mbx->reply_phys + sizeof(u64),
1231 mbx->req_virt->first_tlv.reply_address +
1233 (sizeof(union pfvf_tlvs) - sizeof(u64)) / 4,
1236 /* Once PF copies the rc to the VF, the latter can continue
1237 * and send an additional message. So we have to make sure the
1238 * channel would be re-set to ready prior to that.
1241 GTT_BAR0_MAP_REG_USDM_RAM +
1242 USTORM_VF_PF_CHANNEL_READY_OFFSET(eng_vf_id), 1);
1244 qed_dmae_host2host(p_hwfn, p_ptt, mbx->reply_phys,
1245 mbx->req_virt->first_tlv.reply_address,
1246 sizeof(u64) / 4, ¶ms);
1249 static u16 qed_iov_vport_to_tlv(struct qed_hwfn *p_hwfn,
1250 enum qed_iov_vport_update_flag flag)
1253 case QED_IOV_VP_UPDATE_ACTIVATE:
1254 return CHANNEL_TLV_VPORT_UPDATE_ACTIVATE;
1255 case QED_IOV_VP_UPDATE_VLAN_STRIP:
1256 return CHANNEL_TLV_VPORT_UPDATE_VLAN_STRIP;
1257 case QED_IOV_VP_UPDATE_TX_SWITCH:
1258 return CHANNEL_TLV_VPORT_UPDATE_TX_SWITCH;
1259 case QED_IOV_VP_UPDATE_MCAST:
1260 return CHANNEL_TLV_VPORT_UPDATE_MCAST;
1261 case QED_IOV_VP_UPDATE_ACCEPT_PARAM:
1262 return CHANNEL_TLV_VPORT_UPDATE_ACCEPT_PARAM;
1263 case QED_IOV_VP_UPDATE_RSS:
1264 return CHANNEL_TLV_VPORT_UPDATE_RSS;
1265 case QED_IOV_VP_UPDATE_ACCEPT_ANY_VLAN:
1266 return CHANNEL_TLV_VPORT_UPDATE_ACCEPT_ANY_VLAN;
1267 case QED_IOV_VP_UPDATE_SGE_TPA:
1268 return CHANNEL_TLV_VPORT_UPDATE_SGE_TPA;
1274 static u16 qed_iov_prep_vp_update_resp_tlvs(struct qed_hwfn *p_hwfn,
1275 struct qed_vf_info *p_vf,
1276 struct qed_iov_vf_mbx *p_mbx,
1278 u16 tlvs_mask, u16 tlvs_accepted)
1280 struct pfvf_def_resp_tlv *resp;
1281 u16 size, total_len, i;
1283 memset(p_mbx->reply_virt, 0, sizeof(union pfvf_tlvs));
1284 p_mbx->offset = (u8 *)p_mbx->reply_virt;
1285 size = sizeof(struct pfvf_def_resp_tlv);
1288 qed_add_tlv(p_hwfn, &p_mbx->offset, CHANNEL_TLV_VPORT_UPDATE, size);
1290 /* Prepare response for all extended tlvs if they are found by PF */
1291 for (i = 0; i < QED_IOV_VP_UPDATE_MAX; i++) {
1292 if (!(tlvs_mask & BIT(i)))
1295 resp = qed_add_tlv(p_hwfn, &p_mbx->offset,
1296 qed_iov_vport_to_tlv(p_hwfn, i), size);
1298 if (tlvs_accepted & BIT(i))
1299 resp->hdr.status = status;
1301 resp->hdr.status = PFVF_STATUS_NOT_SUPPORTED;
1305 "VF[%d] - vport_update response: TLV %d, status %02x\n",
1306 p_vf->relative_vf_id,
1307 qed_iov_vport_to_tlv(p_hwfn, i), resp->hdr.status);
1312 qed_add_tlv(p_hwfn, &p_mbx->offset, CHANNEL_TLV_LIST_END,
1313 sizeof(struct channel_list_end_tlv));
1318 static void qed_iov_prepare_resp(struct qed_hwfn *p_hwfn,
1319 struct qed_ptt *p_ptt,
1320 struct qed_vf_info *vf_info,
1321 u16 type, u16 length, u8 status)
1323 struct qed_iov_vf_mbx *mbx = &vf_info->vf_mbx;
1325 mbx->offset = (u8 *)mbx->reply_virt;
1327 qed_add_tlv(p_hwfn, &mbx->offset, type, length);
1328 qed_add_tlv(p_hwfn, &mbx->offset, CHANNEL_TLV_LIST_END,
1329 sizeof(struct channel_list_end_tlv));
1331 qed_iov_send_response(p_hwfn, p_ptt, vf_info, length, status);
1335 qed_public_vf_info *qed_iov_get_public_vf_info(struct qed_hwfn *p_hwfn,
1337 bool b_enabled_only)
1339 struct qed_vf_info *vf = NULL;
1341 vf = qed_iov_get_vf_info(p_hwfn, relative_vf_id, b_enabled_only);
1345 return &vf->p_vf_info;
1348 static void qed_iov_clean_vf(struct qed_hwfn *p_hwfn, u8 vfid)
1350 struct qed_public_vf_info *vf_info;
1352 vf_info = qed_iov_get_public_vf_info(p_hwfn, vfid, false);
1357 /* Clear the VF mac */
1358 eth_zero_addr(vf_info->mac);
1360 vf_info->rx_accept_mode = 0;
1361 vf_info->tx_accept_mode = 0;
1364 static void qed_iov_vf_cleanup(struct qed_hwfn *p_hwfn,
1365 struct qed_vf_info *p_vf)
1369 p_vf->vf_bulletin = 0;
1370 p_vf->vport_instance = 0;
1371 p_vf->configured_features = 0;
1373 /* If VF previously requested less resources, go back to default */
1374 p_vf->num_rxqs = p_vf->num_sbs;
1375 p_vf->num_txqs = p_vf->num_sbs;
1377 p_vf->num_active_rxqs = 0;
1379 for (i = 0; i < QED_MAX_VF_CHAINS_PER_PF; i++) {
1380 struct qed_vf_queue *p_queue = &p_vf->vf_queues[i];
1382 for (j = 0; j < MAX_QUEUES_PER_QZONE; j++) {
1383 if (!p_queue->cids[j].p_cid)
1386 qed_eth_queue_cid_release(p_hwfn,
1387 p_queue->cids[j].p_cid);
1388 p_queue->cids[j].p_cid = NULL;
1392 memset(&p_vf->shadow_config, 0, sizeof(p_vf->shadow_config));
1393 memset(&p_vf->acquire, 0, sizeof(p_vf->acquire));
1394 qed_iov_clean_vf(p_hwfn, p_vf->relative_vf_id);
1397 /* Returns either 0, or log(size) */
1398 static u32 qed_iov_vf_db_bar_size(struct qed_hwfn *p_hwfn,
1399 struct qed_ptt *p_ptt)
1401 u32 val = qed_rd(p_hwfn, p_ptt, PGLUE_B_REG_VF_BAR1_SIZE);
1409 qed_iov_vf_mbx_acquire_resc_cids(struct qed_hwfn *p_hwfn,
1410 struct qed_ptt *p_ptt,
1411 struct qed_vf_info *p_vf,
1412 struct vf_pf_resc_request *p_req,
1413 struct pf_vf_resc *p_resp)
1415 u8 num_vf_cons = p_hwfn->pf_params.eth_pf_params.num_vf_cons;
1416 u8 db_size = qed_db_addr_vf(1, DQ_DEMS_LEGACY) -
1417 qed_db_addr_vf(0, DQ_DEMS_LEGACY);
1420 p_resp->num_cids = min_t(u8, p_req->num_cids, num_vf_cons);
1422 /* If VF didn't bother asking for QIDs than don't bother limiting
1423 * number of CIDs. The VF doesn't care about the number, and this
1424 * has the likely result of causing an additional acquisition.
1426 if (!(p_vf->acquire.vfdev_info.capabilities &
1427 VFPF_ACQUIRE_CAP_QUEUE_QIDS))
1430 /* If doorbell bar was mapped by VF, limit the VF CIDs to an amount
1431 * that would make sure doorbells for all CIDs fall within the bar.
1432 * If it doesn't, make sure regview window is sufficient.
1434 if (p_vf->acquire.vfdev_info.capabilities &
1435 VFPF_ACQUIRE_CAP_PHYSICAL_BAR) {
1436 bar_size = qed_iov_vf_db_bar_size(p_hwfn, p_ptt);
1438 bar_size = 1 << bar_size;
1440 if (p_hwfn->cdev->num_hwfns > 1)
1443 bar_size = PXP_VF_BAR0_DQ_LENGTH;
1446 if (bar_size / db_size < 256)
1447 p_resp->num_cids = min_t(u8, p_resp->num_cids,
1448 (u8)(bar_size / db_size));
1451 static u8 qed_iov_vf_mbx_acquire_resc(struct qed_hwfn *p_hwfn,
1452 struct qed_ptt *p_ptt,
1453 struct qed_vf_info *p_vf,
1454 struct vf_pf_resc_request *p_req,
1455 struct pf_vf_resc *p_resp)
1459 /* Queue related information */
1460 p_resp->num_rxqs = p_vf->num_rxqs;
1461 p_resp->num_txqs = p_vf->num_txqs;
1462 p_resp->num_sbs = p_vf->num_sbs;
1464 for (i = 0; i < p_resp->num_sbs; i++) {
1465 p_resp->hw_sbs[i].hw_sb_id = p_vf->igu_sbs[i];
1466 p_resp->hw_sbs[i].sb_qid = 0;
1469 /* These fields are filled for backward compatibility.
1470 * Unused by modern vfs.
1472 for (i = 0; i < p_resp->num_rxqs; i++) {
1473 qed_fw_l2_queue(p_hwfn, p_vf->vf_queues[i].fw_rx_qid,
1474 (u16 *)&p_resp->hw_qid[i]);
1478 /* Filter related information */
1479 p_resp->num_mac_filters = min_t(u8, p_vf->num_mac_filters,
1480 p_req->num_mac_filters);
1481 p_resp->num_vlan_filters = min_t(u8, p_vf->num_vlan_filters,
1482 p_req->num_vlan_filters);
1484 qed_iov_vf_mbx_acquire_resc_cids(p_hwfn, p_ptt, p_vf, p_req, p_resp);
1486 /* This isn't really needed/enforced, but some legacy VFs might depend
1487 * on the correct filling of this field.
1489 p_resp->num_mc_filters = QED_MAX_MC_ADDRS;
1491 /* Validate sufficient resources for VF */
1492 if (p_resp->num_rxqs < p_req->num_rxqs ||
1493 p_resp->num_txqs < p_req->num_txqs ||
1494 p_resp->num_sbs < p_req->num_sbs ||
1495 p_resp->num_mac_filters < p_req->num_mac_filters ||
1496 p_resp->num_vlan_filters < p_req->num_vlan_filters ||
1497 p_resp->num_mc_filters < p_req->num_mc_filters ||
1498 p_resp->num_cids < p_req->num_cids) {
1501 "VF[%d] - Insufficient resources: rxq [%02x/%02x] txq [%02x/%02x] sbs [%02x/%02x] mac [%02x/%02x] vlan [%02x/%02x] mc [%02x/%02x] cids [%02x/%02x]\n",
1509 p_req->num_mac_filters,
1510 p_resp->num_mac_filters,
1511 p_req->num_vlan_filters,
1512 p_resp->num_vlan_filters,
1513 p_req->num_mc_filters,
1514 p_resp->num_mc_filters,
1515 p_req->num_cids, p_resp->num_cids);
1517 /* Some legacy OSes are incapable of correctly handling this
1520 if ((p_vf->acquire.vfdev_info.eth_fp_hsi_minor ==
1521 ETH_HSI_VER_NO_PKT_LEN_TUNN) &&
1522 (p_vf->acquire.vfdev_info.os_type ==
1523 VFPF_ACQUIRE_OS_WINDOWS))
1524 return PFVF_STATUS_SUCCESS;
1526 return PFVF_STATUS_NO_RESOURCE;
1529 return PFVF_STATUS_SUCCESS;
1532 static void qed_iov_vf_mbx_acquire_stats(struct qed_hwfn *p_hwfn,
1533 struct pfvf_stats_info *p_stats)
1535 p_stats->mstats.address = PXP_VF_BAR0_START_MSDM_ZONE_B +
1536 offsetof(struct mstorm_vf_zone,
1537 non_trigger.eth_queue_stat);
1538 p_stats->mstats.len = sizeof(struct eth_mstorm_per_queue_stat);
1539 p_stats->ustats.address = PXP_VF_BAR0_START_USDM_ZONE_B +
1540 offsetof(struct ustorm_vf_zone,
1541 non_trigger.eth_queue_stat);
1542 p_stats->ustats.len = sizeof(struct eth_ustorm_per_queue_stat);
1543 p_stats->pstats.address = PXP_VF_BAR0_START_PSDM_ZONE_B +
1544 offsetof(struct pstorm_vf_zone,
1545 non_trigger.eth_queue_stat);
1546 p_stats->pstats.len = sizeof(struct eth_pstorm_per_queue_stat);
1547 p_stats->tstats.address = 0;
1548 p_stats->tstats.len = 0;
1551 static void qed_iov_vf_mbx_acquire(struct qed_hwfn *p_hwfn,
1552 struct qed_ptt *p_ptt,
1553 struct qed_vf_info *vf)
1555 struct qed_iov_vf_mbx *mbx = &vf->vf_mbx;
1556 struct pfvf_acquire_resp_tlv *resp = &mbx->reply_virt->acquire_resp;
1557 struct pf_vf_pfdev_info *pfdev_info = &resp->pfdev_info;
1558 struct vfpf_acquire_tlv *req = &mbx->req_virt->acquire;
1559 u8 vfpf_status = PFVF_STATUS_NOT_SUPPORTED;
1560 struct pf_vf_resc *resc = &resp->resc;
1563 memset(resp, 0, sizeof(*resp));
1565 /* Write the PF version so that VF would know which version
1566 * is supported - might be later overriden. This guarantees that
1567 * VF could recognize legacy PF based on lack of versions in reply.
1569 pfdev_info->major_fp_hsi = ETH_HSI_VER_MAJOR;
1570 pfdev_info->minor_fp_hsi = ETH_HSI_VER_MINOR;
1572 if (vf->state != VF_FREE && vf->state != VF_STOPPED) {
1575 "VF[%d] sent ACQUIRE but is already in state %d - fail request\n",
1576 vf->abs_vf_id, vf->state);
1580 /* Validate FW compatibility */
1581 if (req->vfdev_info.eth_fp_hsi_major != ETH_HSI_VER_MAJOR) {
1582 if (req->vfdev_info.capabilities &
1583 VFPF_ACQUIRE_CAP_PRE_FP_HSI) {
1584 struct vf_pf_vfdev_info *p_vfdev = &req->vfdev_info;
1586 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
1587 "VF[%d] is pre-fastpath HSI\n",
1589 p_vfdev->eth_fp_hsi_major = ETH_HSI_VER_MAJOR;
1590 p_vfdev->eth_fp_hsi_minor = ETH_HSI_VER_NO_PKT_LEN_TUNN;
1593 "VF[%d] needs fastpath HSI %02x.%02x, which is incompatible with loaded FW's faspath HSI %02x.%02x\n",
1595 req->vfdev_info.eth_fp_hsi_major,
1596 req->vfdev_info.eth_fp_hsi_minor,
1597 ETH_HSI_VER_MAJOR, ETH_HSI_VER_MINOR);
1603 /* On 100g PFs, prevent old VFs from loading */
1604 if ((p_hwfn->cdev->num_hwfns > 1) &&
1605 !(req->vfdev_info.capabilities & VFPF_ACQUIRE_CAP_100G)) {
1607 "VF[%d] is running an old driver that doesn't support 100g\n",
1612 /* Store the acquire message */
1613 memcpy(&vf->acquire, req, sizeof(vf->acquire));
1615 vf->opaque_fid = req->vfdev_info.opaque_fid;
1617 vf->vf_bulletin = req->bulletin_addr;
1618 vf->bulletin.size = (vf->bulletin.size < req->bulletin_size) ?
1619 vf->bulletin.size : req->bulletin_size;
1621 /* fill in pfdev info */
1622 pfdev_info->chip_num = p_hwfn->cdev->chip_num;
1623 pfdev_info->db_size = 0;
1624 pfdev_info->indices_per_sb = PIS_PER_SB_E4;
1626 pfdev_info->capabilities = PFVF_ACQUIRE_CAP_DEFAULT_UNTAGGED |
1627 PFVF_ACQUIRE_CAP_POST_FW_OVERRIDE;
1628 if (p_hwfn->cdev->num_hwfns > 1)
1629 pfdev_info->capabilities |= PFVF_ACQUIRE_CAP_100G;
1631 /* Share our ability to use multiple queue-ids only with VFs
1634 if (req->vfdev_info.capabilities & VFPF_ACQUIRE_CAP_QUEUE_QIDS)
1635 pfdev_info->capabilities |= PFVF_ACQUIRE_CAP_QUEUE_QIDS;
1637 /* Share the sizes of the bars with VF */
1638 resp->pfdev_info.bar_size = qed_iov_vf_db_bar_size(p_hwfn, p_ptt);
1640 qed_iov_vf_mbx_acquire_stats(p_hwfn, &pfdev_info->stats_info);
1642 memcpy(pfdev_info->port_mac, p_hwfn->hw_info.hw_mac_addr, ETH_ALEN);
1644 pfdev_info->fw_major = FW_MAJOR_VERSION;
1645 pfdev_info->fw_minor = FW_MINOR_VERSION;
1646 pfdev_info->fw_rev = FW_REVISION_VERSION;
1647 pfdev_info->fw_eng = FW_ENGINEERING_VERSION;
1649 /* Incorrect when legacy, but doesn't matter as legacy isn't reading
1652 pfdev_info->minor_fp_hsi = min_t(u8, ETH_HSI_VER_MINOR,
1653 req->vfdev_info.eth_fp_hsi_minor);
1654 pfdev_info->os_type = VFPF_ACQUIRE_OS_LINUX;
1655 qed_mcp_get_mfw_ver(p_hwfn, p_ptt, &pfdev_info->mfw_ver, NULL);
1657 pfdev_info->dev_type = p_hwfn->cdev->type;
1658 pfdev_info->chip_rev = p_hwfn->cdev->chip_rev;
1660 /* Fill resources available to VF; Make sure there are enough to
1661 * satisfy the VF's request.
1663 vfpf_status = qed_iov_vf_mbx_acquire_resc(p_hwfn, p_ptt, vf,
1664 &req->resc_request, resc);
1665 if (vfpf_status != PFVF_STATUS_SUCCESS)
1668 /* Start the VF in FW */
1669 rc = qed_sp_vf_start(p_hwfn, vf);
1671 DP_NOTICE(p_hwfn, "Failed to start VF[%02x]\n", vf->abs_vf_id);
1672 vfpf_status = PFVF_STATUS_FAILURE;
1676 /* Fill agreed size of bulletin board in response */
1677 resp->bulletin_size = vf->bulletin.size;
1678 qed_iov_post_vf_bulletin(p_hwfn, vf->relative_vf_id, p_ptt);
1682 "VF[%d] ACQUIRE_RESPONSE: pfdev_info- chip_num=0x%x, db_size=%d, idx_per_sb=%d, pf_cap=0x%llx\n"
1683 "resources- n_rxq-%d, n_txq-%d, n_sbs-%d, n_macs-%d, n_vlans-%d\n",
1685 resp->pfdev_info.chip_num,
1686 resp->pfdev_info.db_size,
1687 resp->pfdev_info.indices_per_sb,
1688 resp->pfdev_info.capabilities,
1692 resc->num_mac_filters,
1693 resc->num_vlan_filters);
1694 vf->state = VF_ACQUIRED;
1696 /* Prepare Response */
1698 qed_iov_prepare_resp(p_hwfn, p_ptt, vf, CHANNEL_TLV_ACQUIRE,
1699 sizeof(struct pfvf_acquire_resp_tlv), vfpf_status);
1702 static int __qed_iov_spoofchk_set(struct qed_hwfn *p_hwfn,
1703 struct qed_vf_info *p_vf, bool val)
1705 struct qed_sp_vport_update_params params;
1708 if (val == p_vf->spoof_chk) {
1709 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
1710 "Spoofchk value[%d] is already configured\n", val);
1714 memset(¶ms, 0, sizeof(struct qed_sp_vport_update_params));
1715 params.opaque_fid = p_vf->opaque_fid;
1716 params.vport_id = p_vf->vport_id;
1717 params.update_anti_spoofing_en_flg = 1;
1718 params.anti_spoofing_en = val;
1720 rc = qed_sp_vport_update(p_hwfn, ¶ms, QED_SPQ_MODE_EBLOCK, NULL);
1722 p_vf->spoof_chk = val;
1723 p_vf->req_spoofchk_val = p_vf->spoof_chk;
1724 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
1725 "Spoofchk val[%d] configured\n", val);
1727 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
1728 "Spoofchk configuration[val:%d] failed for VF[%d]\n",
1729 val, p_vf->relative_vf_id);
1735 static int qed_iov_reconfigure_unicast_vlan(struct qed_hwfn *p_hwfn,
1736 struct qed_vf_info *p_vf)
1738 struct qed_filter_ucast filter;
1742 memset(&filter, 0, sizeof(filter));
1743 filter.is_rx_filter = 1;
1744 filter.is_tx_filter = 1;
1745 filter.vport_to_add_to = p_vf->vport_id;
1746 filter.opcode = QED_FILTER_ADD;
1748 /* Reconfigure vlans */
1749 for (i = 0; i < QED_ETH_VF_NUM_VLAN_FILTERS + 1; i++) {
1750 if (!p_vf->shadow_config.vlans[i].used)
1753 filter.type = QED_FILTER_VLAN;
1754 filter.vlan = p_vf->shadow_config.vlans[i].vid;
1755 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
1756 "Reconfiguring VLAN [0x%04x] for VF [%04x]\n",
1757 filter.vlan, p_vf->relative_vf_id);
1758 rc = qed_sp_eth_filter_ucast(p_hwfn, p_vf->opaque_fid,
1759 &filter, QED_SPQ_MODE_CB, NULL);
1762 "Failed to configure VLAN [%04x] to VF [%04x]\n",
1763 filter.vlan, p_vf->relative_vf_id);
1772 qed_iov_reconfigure_unicast_shadow(struct qed_hwfn *p_hwfn,
1773 struct qed_vf_info *p_vf, u64 events)
1777 if ((events & BIT(VLAN_ADDR_FORCED)) &&
1778 !(p_vf->configured_features & (1 << VLAN_ADDR_FORCED)))
1779 rc = qed_iov_reconfigure_unicast_vlan(p_hwfn, p_vf);
1784 static int qed_iov_configure_vport_forced(struct qed_hwfn *p_hwfn,
1785 struct qed_vf_info *p_vf, u64 events)
1788 struct qed_filter_ucast filter;
1790 if (!p_vf->vport_instance)
1793 if ((events & BIT(MAC_ADDR_FORCED)) ||
1794 p_vf->p_vf_info.is_trusted_configured) {
1795 /* Since there's no way [currently] of removing the MAC,
1796 * we can always assume this means we need to force it.
1798 memset(&filter, 0, sizeof(filter));
1799 filter.type = QED_FILTER_MAC;
1800 filter.opcode = QED_FILTER_REPLACE;
1801 filter.is_rx_filter = 1;
1802 filter.is_tx_filter = 1;
1803 filter.vport_to_add_to = p_vf->vport_id;
1804 ether_addr_copy(filter.mac, p_vf->bulletin.p_virt->mac);
1806 rc = qed_sp_eth_filter_ucast(p_hwfn, p_vf->opaque_fid,
1807 &filter, QED_SPQ_MODE_CB, NULL);
1810 "PF failed to configure MAC for VF\n");
1813 if (p_vf->p_vf_info.is_trusted_configured)
1814 p_vf->configured_features |=
1815 BIT(VFPF_BULLETIN_MAC_ADDR);
1817 p_vf->configured_features |=
1818 BIT(MAC_ADDR_FORCED);
1821 if (events & BIT(VLAN_ADDR_FORCED)) {
1822 struct qed_sp_vport_update_params vport_update;
1826 memset(&filter, 0, sizeof(filter));
1827 filter.type = QED_FILTER_VLAN;
1828 filter.is_rx_filter = 1;
1829 filter.is_tx_filter = 1;
1830 filter.vport_to_add_to = p_vf->vport_id;
1831 filter.vlan = p_vf->bulletin.p_virt->pvid;
1832 filter.opcode = filter.vlan ? QED_FILTER_REPLACE :
1835 /* Send the ramrod */
1836 rc = qed_sp_eth_filter_ucast(p_hwfn, p_vf->opaque_fid,
1837 &filter, QED_SPQ_MODE_CB, NULL);
1840 "PF failed to configure VLAN for VF\n");
1844 /* Update the default-vlan & silent vlan stripping */
1845 memset(&vport_update, 0, sizeof(vport_update));
1846 vport_update.opaque_fid = p_vf->opaque_fid;
1847 vport_update.vport_id = p_vf->vport_id;
1848 vport_update.update_default_vlan_enable_flg = 1;
1849 vport_update.default_vlan_enable_flg = filter.vlan ? 1 : 0;
1850 vport_update.update_default_vlan_flg = 1;
1851 vport_update.default_vlan = filter.vlan;
1853 vport_update.update_inner_vlan_removal_flg = 1;
1854 removal = filter.vlan ? 1
1855 : p_vf->shadow_config.inner_vlan_removal;
1856 vport_update.inner_vlan_removal_flg = removal;
1857 vport_update.silent_vlan_removal_flg = filter.vlan ? 1 : 0;
1858 rc = qed_sp_vport_update(p_hwfn,
1860 QED_SPQ_MODE_EBLOCK, NULL);
1863 "PF failed to configure VF vport for vlan\n");
1867 /* Update all the Rx queues */
1868 for (i = 0; i < QED_MAX_VF_CHAINS_PER_PF; i++) {
1869 struct qed_vf_queue *p_queue = &p_vf->vf_queues[i];
1870 struct qed_queue_cid *p_cid = NULL;
1872 /* There can be at most 1 Rx queue on qzone. Find it */
1873 p_cid = qed_iov_get_vf_rx_queue_cid(p_queue);
1877 rc = qed_sp_eth_rx_queues_update(p_hwfn,
1880 QED_SPQ_MODE_EBLOCK,
1884 "Failed to send Rx update fo queue[0x%04x]\n",
1885 p_cid->rel.queue_id);
1891 p_vf->configured_features |= 1 << VLAN_ADDR_FORCED;
1893 p_vf->configured_features &= ~BIT(VLAN_ADDR_FORCED);
1896 /* If forced features are terminated, we need to configure the shadow
1897 * configuration back again.
1900 qed_iov_reconfigure_unicast_shadow(p_hwfn, p_vf, events);
1905 static void qed_iov_vf_mbx_start_vport(struct qed_hwfn *p_hwfn,
1906 struct qed_ptt *p_ptt,
1907 struct qed_vf_info *vf)
1909 struct qed_sp_vport_start_params params = { 0 };
1910 struct qed_iov_vf_mbx *mbx = &vf->vf_mbx;
1911 struct vfpf_vport_start_tlv *start;
1912 u8 status = PFVF_STATUS_SUCCESS;
1913 struct qed_vf_info *vf_info;
1918 vf_info = qed_iov_get_vf_info(p_hwfn, (u16) vf->relative_vf_id, true);
1920 DP_NOTICE(p_hwfn->cdev,
1921 "Failed to get VF info, invalid vfid [%d]\n",
1922 vf->relative_vf_id);
1926 vf->state = VF_ENABLED;
1927 start = &mbx->req_virt->start_vport;
1929 qed_iov_enable_vf_traffic(p_hwfn, p_ptt, vf);
1931 /* Initialize Status block in CAU */
1932 for (sb_id = 0; sb_id < vf->num_sbs; sb_id++) {
1933 if (!start->sb_addr[sb_id]) {
1934 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
1935 "VF[%d] did not fill the address of SB %d\n",
1936 vf->relative_vf_id, sb_id);
1940 qed_int_cau_conf_sb(p_hwfn, p_ptt,
1941 start->sb_addr[sb_id],
1942 vf->igu_sbs[sb_id], vf->abs_vf_id, 1);
1945 vf->mtu = start->mtu;
1946 vf->shadow_config.inner_vlan_removal = start->inner_vlan_removal;
1948 /* Take into consideration configuration forced by hypervisor;
1949 * If none is configured, use the supplied VF values [for old
1950 * vfs that would still be fine, since they passed '0' as padding].
1952 p_bitmap = &vf_info->bulletin.p_virt->valid_bitmap;
1953 if (!(*p_bitmap & BIT(VFPF_BULLETIN_UNTAGGED_DEFAULT_FORCED))) {
1954 u8 vf_req = start->only_untagged;
1956 vf_info->bulletin.p_virt->default_only_untagged = vf_req;
1957 *p_bitmap |= 1 << VFPF_BULLETIN_UNTAGGED_DEFAULT;
1960 params.tpa_mode = start->tpa_mode;
1961 params.remove_inner_vlan = start->inner_vlan_removal;
1962 params.tx_switching = true;
1964 params.only_untagged = vf_info->bulletin.p_virt->default_only_untagged;
1965 params.drop_ttl0 = false;
1966 params.concrete_fid = vf->concrete_fid;
1967 params.opaque_fid = vf->opaque_fid;
1968 params.vport_id = vf->vport_id;
1969 params.max_buffers_per_cqe = start->max_buffers_per_cqe;
1970 params.mtu = vf->mtu;
1971 params.check_mac = true;
1973 rc = qed_sp_eth_vport_start(p_hwfn, ¶ms);
1976 "qed_iov_vf_mbx_start_vport returned error %d\n", rc);
1977 status = PFVF_STATUS_FAILURE;
1979 vf->vport_instance++;
1981 /* Force configuration if needed on the newly opened vport */
1982 qed_iov_configure_vport_forced(p_hwfn, vf, *p_bitmap);
1984 __qed_iov_spoofchk_set(p_hwfn, vf, vf->req_spoofchk_val);
1986 qed_iov_prepare_resp(p_hwfn, p_ptt, vf, CHANNEL_TLV_VPORT_START,
1987 sizeof(struct pfvf_def_resp_tlv), status);
1990 static void qed_iov_vf_mbx_stop_vport(struct qed_hwfn *p_hwfn,
1991 struct qed_ptt *p_ptt,
1992 struct qed_vf_info *vf)
1994 u8 status = PFVF_STATUS_SUCCESS;
1997 vf->vport_instance--;
1998 vf->spoof_chk = false;
2000 if ((qed_iov_validate_active_rxq(p_hwfn, vf)) ||
2001 (qed_iov_validate_active_txq(p_hwfn, vf))) {
2002 vf->b_malicious = true;
2004 "VF [%02x] - considered malicious; Unable to stop RX/TX queuess\n",
2006 status = PFVF_STATUS_MALICIOUS;
2010 rc = qed_sp_vport_stop(p_hwfn, vf->opaque_fid, vf->vport_id);
2012 DP_ERR(p_hwfn, "qed_iov_vf_mbx_stop_vport returned error %d\n",
2014 status = PFVF_STATUS_FAILURE;
2017 /* Forget the configuration on the vport */
2018 vf->configured_features = 0;
2019 memset(&vf->shadow_config, 0, sizeof(vf->shadow_config));
2022 qed_iov_prepare_resp(p_hwfn, p_ptt, vf, CHANNEL_TLV_VPORT_TEARDOWN,
2023 sizeof(struct pfvf_def_resp_tlv), status);
2026 static void qed_iov_vf_mbx_start_rxq_resp(struct qed_hwfn *p_hwfn,
2027 struct qed_ptt *p_ptt,
2028 struct qed_vf_info *vf,
2029 u8 status, bool b_legacy)
2031 struct qed_iov_vf_mbx *mbx = &vf->vf_mbx;
2032 struct pfvf_start_queue_resp_tlv *p_tlv;
2033 struct vfpf_start_rxq_tlv *req;
2036 mbx->offset = (u8 *)mbx->reply_virt;
2038 /* Taking a bigger struct instead of adding a TLV to list was a
2039 * mistake, but one which we're now stuck with, as some older
2040 * clients assume the size of the previous response.
2043 length = sizeof(*p_tlv);
2045 length = sizeof(struct pfvf_def_resp_tlv);
2047 p_tlv = qed_add_tlv(p_hwfn, &mbx->offset, CHANNEL_TLV_START_RXQ,
2049 qed_add_tlv(p_hwfn, &mbx->offset, CHANNEL_TLV_LIST_END,
2050 sizeof(struct channel_list_end_tlv));
2052 /* Update the TLV with the response */
2053 if ((status == PFVF_STATUS_SUCCESS) && !b_legacy) {
2054 req = &mbx->req_virt->start_rxq;
2055 p_tlv->offset = PXP_VF_BAR0_START_MSDM_ZONE_B +
2056 offsetof(struct mstorm_vf_zone,
2057 non_trigger.eth_rx_queue_producers) +
2058 sizeof(struct eth_rx_prod_data) * req->rx_qid;
2061 qed_iov_send_response(p_hwfn, p_ptt, vf, length, status);
2064 static u8 qed_iov_vf_mbx_qid(struct qed_hwfn *p_hwfn,
2065 struct qed_vf_info *p_vf, bool b_is_tx)
2067 struct qed_iov_vf_mbx *p_mbx = &p_vf->vf_mbx;
2068 struct vfpf_qid_tlv *p_qid_tlv;
2070 /* Search for the qid if the VF published its going to provide it */
2071 if (!(p_vf->acquire.vfdev_info.capabilities &
2072 VFPF_ACQUIRE_CAP_QUEUE_QIDS)) {
2074 return QED_IOV_LEGACY_QID_TX;
2076 return QED_IOV_LEGACY_QID_RX;
2079 p_qid_tlv = (struct vfpf_qid_tlv *)
2080 qed_iov_search_list_tlvs(p_hwfn, p_mbx->req_virt,
2083 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
2084 "VF[%2x]: Failed to provide qid\n",
2085 p_vf->relative_vf_id);
2087 return QED_IOV_QID_INVALID;
2090 if (p_qid_tlv->qid >= MAX_QUEUES_PER_QZONE) {
2091 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
2092 "VF[%02x]: Provided qid out-of-bounds %02x\n",
2093 p_vf->relative_vf_id, p_qid_tlv->qid);
2094 return QED_IOV_QID_INVALID;
2097 return p_qid_tlv->qid;
2100 static void qed_iov_vf_mbx_start_rxq(struct qed_hwfn *p_hwfn,
2101 struct qed_ptt *p_ptt,
2102 struct qed_vf_info *vf)
2104 struct qed_queue_start_common_params params;
2105 struct qed_queue_cid_vf_params vf_params;
2106 struct qed_iov_vf_mbx *mbx = &vf->vf_mbx;
2107 u8 status = PFVF_STATUS_NO_RESOURCE;
2108 u8 qid_usage_idx, vf_legacy = 0;
2109 struct vfpf_start_rxq_tlv *req;
2110 struct qed_vf_queue *p_queue;
2111 struct qed_queue_cid *p_cid;
2112 struct qed_sb_info sb_dummy;
2115 req = &mbx->req_virt->start_rxq;
2117 if (!qed_iov_validate_rxq(p_hwfn, vf, req->rx_qid,
2118 QED_IOV_VALIDATE_Q_DISABLE) ||
2119 !qed_iov_validate_sb(p_hwfn, vf, req->hw_sb))
2122 qid_usage_idx = qed_iov_vf_mbx_qid(p_hwfn, vf, false);
2123 if (qid_usage_idx == QED_IOV_QID_INVALID)
2126 p_queue = &vf->vf_queues[req->rx_qid];
2127 if (p_queue->cids[qid_usage_idx].p_cid)
2130 vf_legacy = qed_vf_calculate_legacy(vf);
2132 /* Acquire a new queue-cid */
2133 memset(¶ms, 0, sizeof(params));
2134 params.queue_id = p_queue->fw_rx_qid;
2135 params.vport_id = vf->vport_id;
2136 params.stats_id = vf->abs_vf_id + 0x10;
2137 /* Since IGU index is passed via sb_info, construct a dummy one */
2138 memset(&sb_dummy, 0, sizeof(sb_dummy));
2139 sb_dummy.igu_sb_id = req->hw_sb;
2140 params.p_sb = &sb_dummy;
2141 params.sb_idx = req->sb_index;
2143 memset(&vf_params, 0, sizeof(vf_params));
2144 vf_params.vfid = vf->relative_vf_id;
2145 vf_params.vf_qid = (u8)req->rx_qid;
2146 vf_params.vf_legacy = vf_legacy;
2147 vf_params.qid_usage_idx = qid_usage_idx;
2148 p_cid = qed_eth_queue_to_cid(p_hwfn, vf->opaque_fid,
2149 ¶ms, true, &vf_params);
2153 /* Legacy VFs have their Producers in a different location, which they
2154 * calculate on their own and clean the producer prior to this.
2156 if (!(vf_legacy & QED_QCID_LEGACY_VF_RX_PROD))
2158 GTT_BAR0_MAP_REG_MSDM_RAM +
2159 MSTORM_ETH_VF_PRODS_OFFSET(vf->abs_vf_id, req->rx_qid),
2162 rc = qed_eth_rxq_start_ramrod(p_hwfn, p_cid,
2165 req->cqe_pbl_addr, req->cqe_pbl_size);
2167 status = PFVF_STATUS_FAILURE;
2168 qed_eth_queue_cid_release(p_hwfn, p_cid);
2170 p_queue->cids[qid_usage_idx].p_cid = p_cid;
2171 p_queue->cids[qid_usage_idx].b_is_tx = false;
2172 status = PFVF_STATUS_SUCCESS;
2173 vf->num_active_rxqs++;
2177 qed_iov_vf_mbx_start_rxq_resp(p_hwfn, p_ptt, vf, status,
2179 QED_QCID_LEGACY_VF_RX_PROD));
2183 qed_iov_pf_update_tun_response(struct pfvf_update_tunn_param_tlv *p_resp,
2184 struct qed_tunnel_info *p_tun,
2185 u16 tunn_feature_mask)
2187 p_resp->tunn_feature_mask = tunn_feature_mask;
2188 p_resp->vxlan_mode = p_tun->vxlan.b_mode_enabled;
2189 p_resp->l2geneve_mode = p_tun->l2_geneve.b_mode_enabled;
2190 p_resp->ipgeneve_mode = p_tun->ip_geneve.b_mode_enabled;
2191 p_resp->l2gre_mode = p_tun->l2_gre.b_mode_enabled;
2192 p_resp->ipgre_mode = p_tun->l2_gre.b_mode_enabled;
2193 p_resp->vxlan_clss = p_tun->vxlan.tun_cls;
2194 p_resp->l2gre_clss = p_tun->l2_gre.tun_cls;
2195 p_resp->ipgre_clss = p_tun->ip_gre.tun_cls;
2196 p_resp->l2geneve_clss = p_tun->l2_geneve.tun_cls;
2197 p_resp->ipgeneve_clss = p_tun->ip_geneve.tun_cls;
2198 p_resp->geneve_udp_port = p_tun->geneve_port.port;
2199 p_resp->vxlan_udp_port = p_tun->vxlan_port.port;
2203 __qed_iov_pf_update_tun_param(struct vfpf_update_tunn_param_tlv *p_req,
2204 struct qed_tunn_update_type *p_tun,
2205 enum qed_tunn_mode mask, u8 tun_cls)
2207 if (p_req->tun_mode_update_mask & BIT(mask)) {
2208 p_tun->b_update_mode = true;
2210 if (p_req->tunn_mode & BIT(mask))
2211 p_tun->b_mode_enabled = true;
2214 p_tun->tun_cls = tun_cls;
2218 qed_iov_pf_update_tun_param(struct vfpf_update_tunn_param_tlv *p_req,
2219 struct qed_tunn_update_type *p_tun,
2220 struct qed_tunn_update_udp_port *p_port,
2221 enum qed_tunn_mode mask,
2222 u8 tun_cls, u8 update_port, u16 port)
2225 p_port->b_update_port = true;
2226 p_port->port = port;
2229 __qed_iov_pf_update_tun_param(p_req, p_tun, mask, tun_cls);
2233 qed_iov_pf_validate_tunn_param(struct vfpf_update_tunn_param_tlv *p_req)
2235 bool b_update_requested = false;
2237 if (p_req->tun_mode_update_mask || p_req->update_tun_cls ||
2238 p_req->update_geneve_port || p_req->update_vxlan_port)
2239 b_update_requested = true;
2241 return b_update_requested;
2244 static void qed_pf_validate_tunn_mode(struct qed_tunn_update_type *tun, int *rc)
2246 if (tun->b_update_mode && !tun->b_mode_enabled) {
2247 tun->b_update_mode = false;
2253 qed_pf_validate_modify_tunn_config(struct qed_hwfn *p_hwfn,
2254 u16 *tun_features, bool *update,
2255 struct qed_tunnel_info *tun_src)
2257 struct qed_eth_cb_ops *ops = p_hwfn->cdev->protocol_ops.eth;
2258 struct qed_tunnel_info *tun = &p_hwfn->cdev->tunnel;
2259 u16 bultn_vxlan_port, bultn_geneve_port;
2260 void *cookie = p_hwfn->cdev->ops_cookie;
2263 *tun_features = p_hwfn->cdev->tunn_feature_mask;
2264 bultn_vxlan_port = tun->vxlan_port.port;
2265 bultn_geneve_port = tun->geneve_port.port;
2266 qed_pf_validate_tunn_mode(&tun_src->vxlan, &rc);
2267 qed_pf_validate_tunn_mode(&tun_src->l2_geneve, &rc);
2268 qed_pf_validate_tunn_mode(&tun_src->ip_geneve, &rc);
2269 qed_pf_validate_tunn_mode(&tun_src->l2_gre, &rc);
2270 qed_pf_validate_tunn_mode(&tun_src->ip_gre, &rc);
2272 if ((tun_src->b_update_rx_cls || tun_src->b_update_tx_cls) &&
2273 (tun_src->vxlan.tun_cls != QED_TUNN_CLSS_MAC_VLAN ||
2274 tun_src->l2_geneve.tun_cls != QED_TUNN_CLSS_MAC_VLAN ||
2275 tun_src->ip_geneve.tun_cls != QED_TUNN_CLSS_MAC_VLAN ||
2276 tun_src->l2_gre.tun_cls != QED_TUNN_CLSS_MAC_VLAN ||
2277 tun_src->ip_gre.tun_cls != QED_TUNN_CLSS_MAC_VLAN)) {
2278 tun_src->b_update_rx_cls = false;
2279 tun_src->b_update_tx_cls = false;
2283 if (tun_src->vxlan_port.b_update_port) {
2284 if (tun_src->vxlan_port.port == tun->vxlan_port.port) {
2285 tun_src->vxlan_port.b_update_port = false;
2288 bultn_vxlan_port = tun_src->vxlan_port.port;
2292 if (tun_src->geneve_port.b_update_port) {
2293 if (tun_src->geneve_port.port == tun->geneve_port.port) {
2294 tun_src->geneve_port.b_update_port = false;
2297 bultn_geneve_port = tun_src->geneve_port.port;
2301 qed_for_each_vf(p_hwfn, i) {
2302 qed_iov_bulletin_set_udp_ports(p_hwfn, i, bultn_vxlan_port,
2306 qed_schedule_iov(p_hwfn, QED_IOV_WQ_BULLETIN_UPDATE_FLAG);
2307 ops->ports_update(cookie, bultn_vxlan_port, bultn_geneve_port);
2312 static void qed_iov_vf_mbx_update_tunn_param(struct qed_hwfn *p_hwfn,
2313 struct qed_ptt *p_ptt,
2314 struct qed_vf_info *p_vf)
2316 struct qed_tunnel_info *p_tun = &p_hwfn->cdev->tunnel;
2317 struct qed_iov_vf_mbx *mbx = &p_vf->vf_mbx;
2318 struct pfvf_update_tunn_param_tlv *p_resp;
2319 struct vfpf_update_tunn_param_tlv *p_req;
2320 u8 status = PFVF_STATUS_SUCCESS;
2321 bool b_update_required = false;
2322 struct qed_tunnel_info tunn;
2323 u16 tunn_feature_mask = 0;
2326 mbx->offset = (u8 *)mbx->reply_virt;
2328 memset(&tunn, 0, sizeof(tunn));
2329 p_req = &mbx->req_virt->tunn_param_update;
2331 if (!qed_iov_pf_validate_tunn_param(p_req)) {
2332 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
2333 "No tunnel update requested by VF\n");
2334 status = PFVF_STATUS_FAILURE;
2338 tunn.b_update_rx_cls = p_req->update_tun_cls;
2339 tunn.b_update_tx_cls = p_req->update_tun_cls;
2341 qed_iov_pf_update_tun_param(p_req, &tunn.vxlan, &tunn.vxlan_port,
2342 QED_MODE_VXLAN_TUNN, p_req->vxlan_clss,
2343 p_req->update_vxlan_port,
2345 qed_iov_pf_update_tun_param(p_req, &tunn.l2_geneve, &tunn.geneve_port,
2346 QED_MODE_L2GENEVE_TUNN,
2347 p_req->l2geneve_clss,
2348 p_req->update_geneve_port,
2349 p_req->geneve_port);
2350 __qed_iov_pf_update_tun_param(p_req, &tunn.ip_geneve,
2351 QED_MODE_IPGENEVE_TUNN,
2352 p_req->ipgeneve_clss);
2353 __qed_iov_pf_update_tun_param(p_req, &tunn.l2_gre,
2354 QED_MODE_L2GRE_TUNN, p_req->l2gre_clss);
2355 __qed_iov_pf_update_tun_param(p_req, &tunn.ip_gre,
2356 QED_MODE_IPGRE_TUNN, p_req->ipgre_clss);
2358 /* If PF modifies VF's req then it should
2359 * still return an error in case of partial configuration
2360 * or modified configuration as opposed to requested one.
2362 rc = qed_pf_validate_modify_tunn_config(p_hwfn, &tunn_feature_mask,
2363 &b_update_required, &tunn);
2366 status = PFVF_STATUS_FAILURE;
2368 /* If QED client is willing to update anything ? */
2369 if (b_update_required) {
2372 rc = qed_sp_pf_update_tunn_cfg(p_hwfn, p_ptt, &tunn,
2373 QED_SPQ_MODE_EBLOCK, NULL);
2375 status = PFVF_STATUS_FAILURE;
2377 geneve_port = p_tun->geneve_port.port;
2378 qed_for_each_vf(p_hwfn, i) {
2379 qed_iov_bulletin_set_udp_ports(p_hwfn, i,
2380 p_tun->vxlan_port.port,
2386 p_resp = qed_add_tlv(p_hwfn, &mbx->offset,
2387 CHANNEL_TLV_UPDATE_TUNN_PARAM, sizeof(*p_resp));
2389 qed_iov_pf_update_tun_response(p_resp, p_tun, tunn_feature_mask);
2390 qed_add_tlv(p_hwfn, &mbx->offset, CHANNEL_TLV_LIST_END,
2391 sizeof(struct channel_list_end_tlv));
2393 qed_iov_send_response(p_hwfn, p_ptt, p_vf, sizeof(*p_resp), status);
2396 static void qed_iov_vf_mbx_start_txq_resp(struct qed_hwfn *p_hwfn,
2397 struct qed_ptt *p_ptt,
2398 struct qed_vf_info *p_vf,
2401 struct qed_iov_vf_mbx *mbx = &p_vf->vf_mbx;
2402 struct pfvf_start_queue_resp_tlv *p_tlv;
2403 bool b_legacy = false;
2406 mbx->offset = (u8 *)mbx->reply_virt;
2408 /* Taking a bigger struct instead of adding a TLV to list was a
2409 * mistake, but one which we're now stuck with, as some older
2410 * clients assume the size of the previous response.
2412 if (p_vf->acquire.vfdev_info.eth_fp_hsi_minor ==
2413 ETH_HSI_VER_NO_PKT_LEN_TUNN)
2417 length = sizeof(*p_tlv);
2419 length = sizeof(struct pfvf_def_resp_tlv);
2421 p_tlv = qed_add_tlv(p_hwfn, &mbx->offset, CHANNEL_TLV_START_TXQ,
2423 qed_add_tlv(p_hwfn, &mbx->offset, CHANNEL_TLV_LIST_END,
2424 sizeof(struct channel_list_end_tlv));
2426 /* Update the TLV with the response */
2427 if ((status == PFVF_STATUS_SUCCESS) && !b_legacy)
2428 p_tlv->offset = qed_db_addr_vf(cid, DQ_DEMS_LEGACY);
2430 qed_iov_send_response(p_hwfn, p_ptt, p_vf, length, status);
2433 static void qed_iov_vf_mbx_start_txq(struct qed_hwfn *p_hwfn,
2434 struct qed_ptt *p_ptt,
2435 struct qed_vf_info *vf)
2437 struct qed_queue_start_common_params params;
2438 struct qed_queue_cid_vf_params vf_params;
2439 struct qed_iov_vf_mbx *mbx = &vf->vf_mbx;
2440 u8 status = PFVF_STATUS_NO_RESOURCE;
2441 struct vfpf_start_txq_tlv *req;
2442 struct qed_vf_queue *p_queue;
2443 struct qed_queue_cid *p_cid;
2444 struct qed_sb_info sb_dummy;
2445 u8 qid_usage_idx, vf_legacy;
2450 memset(¶ms, 0, sizeof(params));
2451 req = &mbx->req_virt->start_txq;
2453 if (!qed_iov_validate_txq(p_hwfn, vf, req->tx_qid,
2454 QED_IOV_VALIDATE_Q_NA) ||
2455 !qed_iov_validate_sb(p_hwfn, vf, req->hw_sb))
2458 qid_usage_idx = qed_iov_vf_mbx_qid(p_hwfn, vf, true);
2459 if (qid_usage_idx == QED_IOV_QID_INVALID)
2462 p_queue = &vf->vf_queues[req->tx_qid];
2463 if (p_queue->cids[qid_usage_idx].p_cid)
2466 vf_legacy = qed_vf_calculate_legacy(vf);
2468 /* Acquire a new queue-cid */
2469 params.queue_id = p_queue->fw_tx_qid;
2470 params.vport_id = vf->vport_id;
2471 params.stats_id = vf->abs_vf_id + 0x10;
2473 /* Since IGU index is passed via sb_info, construct a dummy one */
2474 memset(&sb_dummy, 0, sizeof(sb_dummy));
2475 sb_dummy.igu_sb_id = req->hw_sb;
2476 params.p_sb = &sb_dummy;
2477 params.sb_idx = req->sb_index;
2479 memset(&vf_params, 0, sizeof(vf_params));
2480 vf_params.vfid = vf->relative_vf_id;
2481 vf_params.vf_qid = (u8)req->tx_qid;
2482 vf_params.vf_legacy = vf_legacy;
2483 vf_params.qid_usage_idx = qid_usage_idx;
2485 p_cid = qed_eth_queue_to_cid(p_hwfn, vf->opaque_fid,
2486 ¶ms, false, &vf_params);
2490 pq = qed_get_cm_pq_idx_vf(p_hwfn, vf->relative_vf_id);
2491 rc = qed_eth_txq_start_ramrod(p_hwfn, p_cid,
2492 req->pbl_addr, req->pbl_size, pq);
2494 status = PFVF_STATUS_FAILURE;
2495 qed_eth_queue_cid_release(p_hwfn, p_cid);
2497 status = PFVF_STATUS_SUCCESS;
2498 p_queue->cids[qid_usage_idx].p_cid = p_cid;
2499 p_queue->cids[qid_usage_idx].b_is_tx = true;
2504 qed_iov_vf_mbx_start_txq_resp(p_hwfn, p_ptt, vf, cid, status);
2507 static int qed_iov_vf_stop_rxqs(struct qed_hwfn *p_hwfn,
2508 struct qed_vf_info *vf,
2510 u8 qid_usage_idx, bool cqe_completion)
2512 struct qed_vf_queue *p_queue;
2515 if (!qed_iov_validate_rxq(p_hwfn, vf, rxq_id, QED_IOV_VALIDATE_Q_NA)) {
2518 "VF[%d] Tried Closing Rx 0x%04x.%02x which is inactive\n",
2519 vf->relative_vf_id, rxq_id, qid_usage_idx);
2523 p_queue = &vf->vf_queues[rxq_id];
2525 /* We've validated the index and the existence of the active RXQ -
2526 * now we need to make sure that it's using the correct qid.
2528 if (!p_queue->cids[qid_usage_idx].p_cid ||
2529 p_queue->cids[qid_usage_idx].b_is_tx) {
2530 struct qed_queue_cid *p_cid;
2532 p_cid = qed_iov_get_vf_rx_queue_cid(p_queue);
2535 "VF[%d] - Tried Closing Rx 0x%04x.%02x, but Rx is at %04x.%02x\n",
2537 rxq_id, qid_usage_idx, rxq_id, p_cid->qid_usage_idx);
2541 /* Now that we know we have a valid Rx-queue - close it */
2542 rc = qed_eth_rx_queue_stop(p_hwfn,
2543 p_queue->cids[qid_usage_idx].p_cid,
2544 false, cqe_completion);
2548 p_queue->cids[qid_usage_idx].p_cid = NULL;
2549 vf->num_active_rxqs--;
2554 static int qed_iov_vf_stop_txqs(struct qed_hwfn *p_hwfn,
2555 struct qed_vf_info *vf,
2556 u16 txq_id, u8 qid_usage_idx)
2558 struct qed_vf_queue *p_queue;
2561 if (!qed_iov_validate_txq(p_hwfn, vf, txq_id, QED_IOV_VALIDATE_Q_NA))
2564 p_queue = &vf->vf_queues[txq_id];
2565 if (!p_queue->cids[qid_usage_idx].p_cid ||
2566 !p_queue->cids[qid_usage_idx].b_is_tx)
2569 rc = qed_eth_tx_queue_stop(p_hwfn, p_queue->cids[qid_usage_idx].p_cid);
2573 p_queue->cids[qid_usage_idx].p_cid = NULL;
2577 static void qed_iov_vf_mbx_stop_rxqs(struct qed_hwfn *p_hwfn,
2578 struct qed_ptt *p_ptt,
2579 struct qed_vf_info *vf)
2581 u16 length = sizeof(struct pfvf_def_resp_tlv);
2582 struct qed_iov_vf_mbx *mbx = &vf->vf_mbx;
2583 u8 status = PFVF_STATUS_FAILURE;
2584 struct vfpf_stop_rxqs_tlv *req;
2588 /* There has never been an official driver that used this interface
2589 * for stopping multiple queues, and it is now considered deprecated.
2590 * Validate this isn't used here.
2592 req = &mbx->req_virt->stop_rxqs;
2593 if (req->num_rxqs != 1) {
2594 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
2595 "Odd; VF[%d] tried stopping multiple Rx queues\n",
2596 vf->relative_vf_id);
2597 status = PFVF_STATUS_NOT_SUPPORTED;
2601 /* Find which qid-index is associated with the queue */
2602 qid_usage_idx = qed_iov_vf_mbx_qid(p_hwfn, vf, false);
2603 if (qid_usage_idx == QED_IOV_QID_INVALID)
2606 rc = qed_iov_vf_stop_rxqs(p_hwfn, vf, req->rx_qid,
2607 qid_usage_idx, req->cqe_completion);
2609 status = PFVF_STATUS_SUCCESS;
2611 qed_iov_prepare_resp(p_hwfn, p_ptt, vf, CHANNEL_TLV_STOP_RXQS,
2615 static void qed_iov_vf_mbx_stop_txqs(struct qed_hwfn *p_hwfn,
2616 struct qed_ptt *p_ptt,
2617 struct qed_vf_info *vf)
2619 u16 length = sizeof(struct pfvf_def_resp_tlv);
2620 struct qed_iov_vf_mbx *mbx = &vf->vf_mbx;
2621 u8 status = PFVF_STATUS_FAILURE;
2622 struct vfpf_stop_txqs_tlv *req;
2626 /* There has never been an official driver that used this interface
2627 * for stopping multiple queues, and it is now considered deprecated.
2628 * Validate this isn't used here.
2630 req = &mbx->req_virt->stop_txqs;
2631 if (req->num_txqs != 1) {
2632 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
2633 "Odd; VF[%d] tried stopping multiple Tx queues\n",
2634 vf->relative_vf_id);
2635 status = PFVF_STATUS_NOT_SUPPORTED;
2639 /* Find which qid-index is associated with the queue */
2640 qid_usage_idx = qed_iov_vf_mbx_qid(p_hwfn, vf, true);
2641 if (qid_usage_idx == QED_IOV_QID_INVALID)
2644 rc = qed_iov_vf_stop_txqs(p_hwfn, vf, req->tx_qid, qid_usage_idx);
2646 status = PFVF_STATUS_SUCCESS;
2649 qed_iov_prepare_resp(p_hwfn, p_ptt, vf, CHANNEL_TLV_STOP_TXQS,
2653 static void qed_iov_vf_mbx_update_rxqs(struct qed_hwfn *p_hwfn,
2654 struct qed_ptt *p_ptt,
2655 struct qed_vf_info *vf)
2657 struct qed_queue_cid *handlers[QED_MAX_VF_CHAINS_PER_PF];
2658 u16 length = sizeof(struct pfvf_def_resp_tlv);
2659 struct qed_iov_vf_mbx *mbx = &vf->vf_mbx;
2660 struct vfpf_update_rxq_tlv *req;
2661 u8 status = PFVF_STATUS_FAILURE;
2662 u8 complete_event_flg;
2663 u8 complete_cqe_flg;
2668 req = &mbx->req_virt->update_rxq;
2669 complete_cqe_flg = !!(req->flags & VFPF_RXQ_UPD_COMPLETE_CQE_FLAG);
2670 complete_event_flg = !!(req->flags & VFPF_RXQ_UPD_COMPLETE_EVENT_FLAG);
2672 qid_usage_idx = qed_iov_vf_mbx_qid(p_hwfn, vf, false);
2673 if (qid_usage_idx == QED_IOV_QID_INVALID)
2676 /* There shouldn't exist a VF that uses queue-qids yet uses this
2677 * API with multiple Rx queues. Validate this.
2679 if ((vf->acquire.vfdev_info.capabilities &
2680 VFPF_ACQUIRE_CAP_QUEUE_QIDS) && req->num_rxqs != 1) {
2681 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
2682 "VF[%d] supports QIDs but sends multiple queues\n",
2683 vf->relative_vf_id);
2687 /* Validate inputs - for the legacy case this is still true since
2688 * qid_usage_idx for each Rx queue would be LEGACY_QID_RX.
2690 for (i = req->rx_qid; i < req->rx_qid + req->num_rxqs; i++) {
2691 if (!qed_iov_validate_rxq(p_hwfn, vf, i,
2692 QED_IOV_VALIDATE_Q_NA) ||
2693 !vf->vf_queues[i].cids[qid_usage_idx].p_cid ||
2694 vf->vf_queues[i].cids[qid_usage_idx].b_is_tx) {
2695 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
2696 "VF[%d]: Incorrect Rxqs [%04x, %02x]\n",
2697 vf->relative_vf_id, req->rx_qid,
2703 /* Prepare the handlers */
2704 for (i = 0; i < req->num_rxqs; i++) {
2705 u16 qid = req->rx_qid + i;
2707 handlers[i] = vf->vf_queues[qid].cids[qid_usage_idx].p_cid;
2710 rc = qed_sp_eth_rx_queues_update(p_hwfn, (void **)&handlers,
2714 QED_SPQ_MODE_EBLOCK, NULL);
2718 status = PFVF_STATUS_SUCCESS;
2720 qed_iov_prepare_resp(p_hwfn, p_ptt, vf, CHANNEL_TLV_UPDATE_RXQ,
2724 void *qed_iov_search_list_tlvs(struct qed_hwfn *p_hwfn,
2725 void *p_tlvs_list, u16 req_type)
2727 struct channel_tlv *p_tlv = (struct channel_tlv *)p_tlvs_list;
2731 if (!p_tlv->length) {
2732 DP_NOTICE(p_hwfn, "Zero length TLV found\n");
2736 if (p_tlv->type == req_type) {
2737 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
2738 "Extended tlv type %d, length %d found\n",
2739 p_tlv->type, p_tlv->length);
2743 len += p_tlv->length;
2744 p_tlv = (struct channel_tlv *)((u8 *)p_tlv + p_tlv->length);
2746 if ((len + p_tlv->length) > TLV_BUFFER_SIZE) {
2747 DP_NOTICE(p_hwfn, "TLVs has overrun the buffer size\n");
2750 } while (p_tlv->type != CHANNEL_TLV_LIST_END);
2756 qed_iov_vp_update_act_param(struct qed_hwfn *p_hwfn,
2757 struct qed_sp_vport_update_params *p_data,
2758 struct qed_iov_vf_mbx *p_mbx, u16 *tlvs_mask)
2760 struct vfpf_vport_update_activate_tlv *p_act_tlv;
2761 u16 tlv = CHANNEL_TLV_VPORT_UPDATE_ACTIVATE;
2763 p_act_tlv = (struct vfpf_vport_update_activate_tlv *)
2764 qed_iov_search_list_tlvs(p_hwfn, p_mbx->req_virt, tlv);
2768 p_data->update_vport_active_rx_flg = p_act_tlv->update_rx;
2769 p_data->vport_active_rx_flg = p_act_tlv->active_rx;
2770 p_data->update_vport_active_tx_flg = p_act_tlv->update_tx;
2771 p_data->vport_active_tx_flg = p_act_tlv->active_tx;
2772 *tlvs_mask |= 1 << QED_IOV_VP_UPDATE_ACTIVATE;
2776 qed_iov_vp_update_vlan_param(struct qed_hwfn *p_hwfn,
2777 struct qed_sp_vport_update_params *p_data,
2778 struct qed_vf_info *p_vf,
2779 struct qed_iov_vf_mbx *p_mbx, u16 *tlvs_mask)
2781 struct vfpf_vport_update_vlan_strip_tlv *p_vlan_tlv;
2782 u16 tlv = CHANNEL_TLV_VPORT_UPDATE_VLAN_STRIP;
2784 p_vlan_tlv = (struct vfpf_vport_update_vlan_strip_tlv *)
2785 qed_iov_search_list_tlvs(p_hwfn, p_mbx->req_virt, tlv);
2789 p_vf->shadow_config.inner_vlan_removal = p_vlan_tlv->remove_vlan;
2791 /* Ignore the VF request if we're forcing a vlan */
2792 if (!(p_vf->configured_features & BIT(VLAN_ADDR_FORCED))) {
2793 p_data->update_inner_vlan_removal_flg = 1;
2794 p_data->inner_vlan_removal_flg = p_vlan_tlv->remove_vlan;
2797 *tlvs_mask |= 1 << QED_IOV_VP_UPDATE_VLAN_STRIP;
2801 qed_iov_vp_update_tx_switch(struct qed_hwfn *p_hwfn,
2802 struct qed_sp_vport_update_params *p_data,
2803 struct qed_iov_vf_mbx *p_mbx, u16 *tlvs_mask)
2805 struct vfpf_vport_update_tx_switch_tlv *p_tx_switch_tlv;
2806 u16 tlv = CHANNEL_TLV_VPORT_UPDATE_TX_SWITCH;
2808 p_tx_switch_tlv = (struct vfpf_vport_update_tx_switch_tlv *)
2809 qed_iov_search_list_tlvs(p_hwfn, p_mbx->req_virt,
2811 if (!p_tx_switch_tlv)
2814 p_data->update_tx_switching_flg = 1;
2815 p_data->tx_switching_flg = p_tx_switch_tlv->tx_switching;
2816 *tlvs_mask |= 1 << QED_IOV_VP_UPDATE_TX_SWITCH;
2820 qed_iov_vp_update_mcast_bin_param(struct qed_hwfn *p_hwfn,
2821 struct qed_sp_vport_update_params *p_data,
2822 struct qed_iov_vf_mbx *p_mbx, u16 *tlvs_mask)
2824 struct vfpf_vport_update_mcast_bin_tlv *p_mcast_tlv;
2825 u16 tlv = CHANNEL_TLV_VPORT_UPDATE_MCAST;
2827 p_mcast_tlv = (struct vfpf_vport_update_mcast_bin_tlv *)
2828 qed_iov_search_list_tlvs(p_hwfn, p_mbx->req_virt, tlv);
2832 p_data->update_approx_mcast_flg = 1;
2833 memcpy(p_data->bins, p_mcast_tlv->bins,
2834 sizeof(unsigned long) * ETH_MULTICAST_MAC_BINS_IN_REGS);
2835 *tlvs_mask |= 1 << QED_IOV_VP_UPDATE_MCAST;
2839 qed_iov_vp_update_accept_flag(struct qed_hwfn *p_hwfn,
2840 struct qed_sp_vport_update_params *p_data,
2841 struct qed_iov_vf_mbx *p_mbx, u16 *tlvs_mask)
2843 struct qed_filter_accept_flags *p_flags = &p_data->accept_flags;
2844 struct vfpf_vport_update_accept_param_tlv *p_accept_tlv;
2845 u16 tlv = CHANNEL_TLV_VPORT_UPDATE_ACCEPT_PARAM;
2847 p_accept_tlv = (struct vfpf_vport_update_accept_param_tlv *)
2848 qed_iov_search_list_tlvs(p_hwfn, p_mbx->req_virt, tlv);
2852 p_flags->update_rx_mode_config = p_accept_tlv->update_rx_mode;
2853 p_flags->rx_accept_filter = p_accept_tlv->rx_accept_filter;
2854 p_flags->update_tx_mode_config = p_accept_tlv->update_tx_mode;
2855 p_flags->tx_accept_filter = p_accept_tlv->tx_accept_filter;
2856 *tlvs_mask |= 1 << QED_IOV_VP_UPDATE_ACCEPT_PARAM;
2860 qed_iov_vp_update_accept_any_vlan(struct qed_hwfn *p_hwfn,
2861 struct qed_sp_vport_update_params *p_data,
2862 struct qed_iov_vf_mbx *p_mbx, u16 *tlvs_mask)
2864 struct vfpf_vport_update_accept_any_vlan_tlv *p_accept_any_vlan;
2865 u16 tlv = CHANNEL_TLV_VPORT_UPDATE_ACCEPT_ANY_VLAN;
2867 p_accept_any_vlan = (struct vfpf_vport_update_accept_any_vlan_tlv *)
2868 qed_iov_search_list_tlvs(p_hwfn, p_mbx->req_virt,
2870 if (!p_accept_any_vlan)
2873 p_data->accept_any_vlan = p_accept_any_vlan->accept_any_vlan;
2874 p_data->update_accept_any_vlan_flg =
2875 p_accept_any_vlan->update_accept_any_vlan_flg;
2876 *tlvs_mask |= 1 << QED_IOV_VP_UPDATE_ACCEPT_ANY_VLAN;
2880 qed_iov_vp_update_rss_param(struct qed_hwfn *p_hwfn,
2881 struct qed_vf_info *vf,
2882 struct qed_sp_vport_update_params *p_data,
2883 struct qed_rss_params *p_rss,
2884 struct qed_iov_vf_mbx *p_mbx,
2885 u16 *tlvs_mask, u16 *tlvs_accepted)
2887 struct vfpf_vport_update_rss_tlv *p_rss_tlv;
2888 u16 tlv = CHANNEL_TLV_VPORT_UPDATE_RSS;
2889 bool b_reject = false;
2893 p_rss_tlv = (struct vfpf_vport_update_rss_tlv *)
2894 qed_iov_search_list_tlvs(p_hwfn, p_mbx->req_virt, tlv);
2896 p_data->rss_params = NULL;
2900 memset(p_rss, 0, sizeof(struct qed_rss_params));
2902 p_rss->update_rss_config = !!(p_rss_tlv->update_rss_flags &
2903 VFPF_UPDATE_RSS_CONFIG_FLAG);
2904 p_rss->update_rss_capabilities = !!(p_rss_tlv->update_rss_flags &
2905 VFPF_UPDATE_RSS_CAPS_FLAG);
2906 p_rss->update_rss_ind_table = !!(p_rss_tlv->update_rss_flags &
2907 VFPF_UPDATE_RSS_IND_TABLE_FLAG);
2908 p_rss->update_rss_key = !!(p_rss_tlv->update_rss_flags &
2909 VFPF_UPDATE_RSS_KEY_FLAG);
2911 p_rss->rss_enable = p_rss_tlv->rss_enable;
2912 p_rss->rss_eng_id = vf->relative_vf_id + 1;
2913 p_rss->rss_caps = p_rss_tlv->rss_caps;
2914 p_rss->rss_table_size_log = p_rss_tlv->rss_table_size_log;
2915 memcpy(p_rss->rss_key, p_rss_tlv->rss_key, sizeof(p_rss->rss_key));
2917 table_size = min_t(u16, ARRAY_SIZE(p_rss->rss_ind_table),
2918 (1 << p_rss_tlv->rss_table_size_log));
2920 for (i = 0; i < table_size; i++) {
2921 struct qed_queue_cid *p_cid;
2923 q_idx = p_rss_tlv->rss_ind_table[i];
2924 if (!qed_iov_validate_rxq(p_hwfn, vf, q_idx,
2925 QED_IOV_VALIDATE_Q_ENABLE)) {
2928 "VF[%d]: Omitting RSS due to wrong queue %04x\n",
2929 vf->relative_vf_id, q_idx);
2934 p_cid = qed_iov_get_vf_rx_queue_cid(&vf->vf_queues[q_idx]);
2935 p_rss->rss_ind_table[i] = p_cid;
2938 p_data->rss_params = p_rss;
2940 *tlvs_mask |= 1 << QED_IOV_VP_UPDATE_RSS;
2942 *tlvs_accepted |= 1 << QED_IOV_VP_UPDATE_RSS;
2946 qed_iov_vp_update_sge_tpa_param(struct qed_hwfn *p_hwfn,
2947 struct qed_vf_info *vf,
2948 struct qed_sp_vport_update_params *p_data,
2949 struct qed_sge_tpa_params *p_sge_tpa,
2950 struct qed_iov_vf_mbx *p_mbx, u16 *tlvs_mask)
2952 struct vfpf_vport_update_sge_tpa_tlv *p_sge_tpa_tlv;
2953 u16 tlv = CHANNEL_TLV_VPORT_UPDATE_SGE_TPA;
2955 p_sge_tpa_tlv = (struct vfpf_vport_update_sge_tpa_tlv *)
2956 qed_iov_search_list_tlvs(p_hwfn, p_mbx->req_virt, tlv);
2958 if (!p_sge_tpa_tlv) {
2959 p_data->sge_tpa_params = NULL;
2963 memset(p_sge_tpa, 0, sizeof(struct qed_sge_tpa_params));
2965 p_sge_tpa->update_tpa_en_flg =
2966 !!(p_sge_tpa_tlv->update_sge_tpa_flags & VFPF_UPDATE_TPA_EN_FLAG);
2967 p_sge_tpa->update_tpa_param_flg =
2968 !!(p_sge_tpa_tlv->update_sge_tpa_flags &
2969 VFPF_UPDATE_TPA_PARAM_FLAG);
2971 p_sge_tpa->tpa_ipv4_en_flg =
2972 !!(p_sge_tpa_tlv->sge_tpa_flags & VFPF_TPA_IPV4_EN_FLAG);
2973 p_sge_tpa->tpa_ipv6_en_flg =
2974 !!(p_sge_tpa_tlv->sge_tpa_flags & VFPF_TPA_IPV6_EN_FLAG);
2975 p_sge_tpa->tpa_pkt_split_flg =
2976 !!(p_sge_tpa_tlv->sge_tpa_flags & VFPF_TPA_PKT_SPLIT_FLAG);
2977 p_sge_tpa->tpa_hdr_data_split_flg =
2978 !!(p_sge_tpa_tlv->sge_tpa_flags & VFPF_TPA_HDR_DATA_SPLIT_FLAG);
2979 p_sge_tpa->tpa_gro_consistent_flg =
2980 !!(p_sge_tpa_tlv->sge_tpa_flags & VFPF_TPA_GRO_CONSIST_FLAG);
2982 p_sge_tpa->tpa_max_aggs_num = p_sge_tpa_tlv->tpa_max_aggs_num;
2983 p_sge_tpa->tpa_max_size = p_sge_tpa_tlv->tpa_max_size;
2984 p_sge_tpa->tpa_min_size_to_start = p_sge_tpa_tlv->tpa_min_size_to_start;
2985 p_sge_tpa->tpa_min_size_to_cont = p_sge_tpa_tlv->tpa_min_size_to_cont;
2986 p_sge_tpa->max_buffers_per_cqe = p_sge_tpa_tlv->max_buffers_per_cqe;
2988 p_data->sge_tpa_params = p_sge_tpa;
2990 *tlvs_mask |= 1 << QED_IOV_VP_UPDATE_SGE_TPA;
2993 static int qed_iov_pre_update_vport(struct qed_hwfn *hwfn,
2995 struct qed_sp_vport_update_params *params,
2998 u8 mask = QED_ACCEPT_UCAST_UNMATCHED | QED_ACCEPT_MCAST_UNMATCHED;
2999 struct qed_filter_accept_flags *flags = ¶ms->accept_flags;
3000 struct qed_public_vf_info *vf_info;
3002 /* Untrusted VFs can't even be trusted to know that fact.
3003 * Simply indicate everything is configured fine, and trace
3004 * configuration 'behind their back'.
3006 if (!(*tlvs & BIT(QED_IOV_VP_UPDATE_ACCEPT_PARAM)))
3009 vf_info = qed_iov_get_public_vf_info(hwfn, vfid, true);
3011 if (flags->update_rx_mode_config) {
3012 vf_info->rx_accept_mode = flags->rx_accept_filter;
3013 if (!vf_info->is_trusted_configured)
3014 flags->rx_accept_filter &= ~mask;
3017 if (flags->update_tx_mode_config) {
3018 vf_info->tx_accept_mode = flags->tx_accept_filter;
3019 if (!vf_info->is_trusted_configured)
3020 flags->tx_accept_filter &= ~mask;
3026 static void qed_iov_vf_mbx_vport_update(struct qed_hwfn *p_hwfn,
3027 struct qed_ptt *p_ptt,
3028 struct qed_vf_info *vf)
3030 struct qed_rss_params *p_rss_params = NULL;
3031 struct qed_sp_vport_update_params params;
3032 struct qed_iov_vf_mbx *mbx = &vf->vf_mbx;
3033 struct qed_sge_tpa_params sge_tpa_params;
3034 u16 tlvs_mask = 0, tlvs_accepted = 0;
3035 u8 status = PFVF_STATUS_SUCCESS;
3039 /* Valiate PF can send such a request */
3040 if (!vf->vport_instance) {
3043 "No VPORT instance available for VF[%d], failing vport update\n",
3045 status = PFVF_STATUS_FAILURE;
3048 p_rss_params = vzalloc(sizeof(*p_rss_params));
3049 if (p_rss_params == NULL) {
3050 status = PFVF_STATUS_FAILURE;
3054 memset(¶ms, 0, sizeof(params));
3055 params.opaque_fid = vf->opaque_fid;
3056 params.vport_id = vf->vport_id;
3057 params.rss_params = NULL;
3059 /* Search for extended tlvs list and update values
3060 * from VF in struct qed_sp_vport_update_params.
3062 qed_iov_vp_update_act_param(p_hwfn, ¶ms, mbx, &tlvs_mask);
3063 qed_iov_vp_update_vlan_param(p_hwfn, ¶ms, vf, mbx, &tlvs_mask);
3064 qed_iov_vp_update_tx_switch(p_hwfn, ¶ms, mbx, &tlvs_mask);
3065 qed_iov_vp_update_mcast_bin_param(p_hwfn, ¶ms, mbx, &tlvs_mask);
3066 qed_iov_vp_update_accept_flag(p_hwfn, ¶ms, mbx, &tlvs_mask);
3067 qed_iov_vp_update_accept_any_vlan(p_hwfn, ¶ms, mbx, &tlvs_mask);
3068 qed_iov_vp_update_sge_tpa_param(p_hwfn, vf, ¶ms,
3069 &sge_tpa_params, mbx, &tlvs_mask);
3071 tlvs_accepted = tlvs_mask;
3073 /* Some of the extended TLVs need to be validated first; In that case,
3074 * they can update the mask without updating the accepted [so that
3075 * PF could communicate to VF it has rejected request].
3077 qed_iov_vp_update_rss_param(p_hwfn, vf, ¶ms, p_rss_params,
3078 mbx, &tlvs_mask, &tlvs_accepted);
3080 if (qed_iov_pre_update_vport(p_hwfn, vf->relative_vf_id,
3081 ¶ms, &tlvs_accepted)) {
3083 status = PFVF_STATUS_NOT_SUPPORTED;
3087 if (!tlvs_accepted) {
3089 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
3090 "Upper-layer prevents VF vport configuration\n");
3092 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
3093 "No feature tlvs found for vport update\n");
3094 status = PFVF_STATUS_NOT_SUPPORTED;
3098 rc = qed_sp_vport_update(p_hwfn, ¶ms, QED_SPQ_MODE_EBLOCK, NULL);
3101 status = PFVF_STATUS_FAILURE;
3104 vfree(p_rss_params);
3105 length = qed_iov_prep_vp_update_resp_tlvs(p_hwfn, vf, mbx, status,
3106 tlvs_mask, tlvs_accepted);
3107 qed_iov_send_response(p_hwfn, p_ptt, vf, length, status);
3110 static int qed_iov_vf_update_vlan_shadow(struct qed_hwfn *p_hwfn,
3111 struct qed_vf_info *p_vf,
3112 struct qed_filter_ucast *p_params)
3116 /* First remove entries and then add new ones */
3117 if (p_params->opcode == QED_FILTER_REMOVE) {
3118 for (i = 0; i < QED_ETH_VF_NUM_VLAN_FILTERS + 1; i++)
3119 if (p_vf->shadow_config.vlans[i].used &&
3120 p_vf->shadow_config.vlans[i].vid ==
3122 p_vf->shadow_config.vlans[i].used = false;
3125 if (i == QED_ETH_VF_NUM_VLAN_FILTERS + 1) {
3128 "VF [%d] - Tries to remove a non-existing vlan\n",
3129 p_vf->relative_vf_id);
3132 } else if (p_params->opcode == QED_FILTER_REPLACE ||
3133 p_params->opcode == QED_FILTER_FLUSH) {
3134 for (i = 0; i < QED_ETH_VF_NUM_VLAN_FILTERS + 1; i++)
3135 p_vf->shadow_config.vlans[i].used = false;
3138 /* In forced mode, we're willing to remove entries - but we don't add
3141 if (p_vf->bulletin.p_virt->valid_bitmap & BIT(VLAN_ADDR_FORCED))
3144 if (p_params->opcode == QED_FILTER_ADD ||
3145 p_params->opcode == QED_FILTER_REPLACE) {
3146 for (i = 0; i < QED_ETH_VF_NUM_VLAN_FILTERS + 1; i++) {
3147 if (p_vf->shadow_config.vlans[i].used)
3150 p_vf->shadow_config.vlans[i].used = true;
3151 p_vf->shadow_config.vlans[i].vid = p_params->vlan;
3155 if (i == QED_ETH_VF_NUM_VLAN_FILTERS + 1) {
3158 "VF [%d] - Tries to configure more than %d vlan filters\n",
3159 p_vf->relative_vf_id,
3160 QED_ETH_VF_NUM_VLAN_FILTERS + 1);
3168 static int qed_iov_vf_update_mac_shadow(struct qed_hwfn *p_hwfn,
3169 struct qed_vf_info *p_vf,
3170 struct qed_filter_ucast *p_params)
3174 /* If we're in forced-mode, we don't allow any change */
3175 if (p_vf->bulletin.p_virt->valid_bitmap & BIT(MAC_ADDR_FORCED))
3178 /* Don't keep track of shadow copy since we don't intend to restore. */
3179 if (p_vf->p_vf_info.is_trusted_configured)
3182 /* First remove entries and then add new ones */
3183 if (p_params->opcode == QED_FILTER_REMOVE) {
3184 for (i = 0; i < QED_ETH_VF_NUM_MAC_FILTERS; i++) {
3185 if (ether_addr_equal(p_vf->shadow_config.macs[i],
3187 eth_zero_addr(p_vf->shadow_config.macs[i]);
3192 if (i == QED_ETH_VF_NUM_MAC_FILTERS) {
3193 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
3194 "MAC isn't configured\n");
3197 } else if (p_params->opcode == QED_FILTER_REPLACE ||
3198 p_params->opcode == QED_FILTER_FLUSH) {
3199 for (i = 0; i < QED_ETH_VF_NUM_MAC_FILTERS; i++)
3200 eth_zero_addr(p_vf->shadow_config.macs[i]);
3203 /* List the new MAC address */
3204 if (p_params->opcode != QED_FILTER_ADD &&
3205 p_params->opcode != QED_FILTER_REPLACE)
3208 for (i = 0; i < QED_ETH_VF_NUM_MAC_FILTERS; i++) {
3209 if (is_zero_ether_addr(p_vf->shadow_config.macs[i])) {
3210 ether_addr_copy(p_vf->shadow_config.macs[i],
3212 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
3213 "Added MAC at %d entry in shadow\n", i);
3218 if (i == QED_ETH_VF_NUM_MAC_FILTERS) {
3219 DP_VERBOSE(p_hwfn, QED_MSG_IOV, "No available place for MAC\n");
3227 qed_iov_vf_update_unicast_shadow(struct qed_hwfn *p_hwfn,
3228 struct qed_vf_info *p_vf,
3229 struct qed_filter_ucast *p_params)
3233 if (p_params->type == QED_FILTER_MAC) {
3234 rc = qed_iov_vf_update_mac_shadow(p_hwfn, p_vf, p_params);
3239 if (p_params->type == QED_FILTER_VLAN)
3240 rc = qed_iov_vf_update_vlan_shadow(p_hwfn, p_vf, p_params);
3245 static int qed_iov_chk_ucast(struct qed_hwfn *hwfn,
3246 int vfid, struct qed_filter_ucast *params)
3248 struct qed_public_vf_info *vf;
3250 vf = qed_iov_get_public_vf_info(hwfn, vfid, true);
3254 /* No real decision to make; Store the configured MAC */
3255 if (params->type == QED_FILTER_MAC ||
3256 params->type == QED_FILTER_MAC_VLAN) {
3257 ether_addr_copy(vf->mac, params->mac);
3259 if (vf->is_trusted_configured) {
3260 qed_iov_bulletin_set_mac(hwfn, vf->mac, vfid);
3262 /* Update and post bulleitin again */
3263 qed_schedule_iov(hwfn, QED_IOV_WQ_BULLETIN_UPDATE_FLAG);
3270 static void qed_iov_vf_mbx_ucast_filter(struct qed_hwfn *p_hwfn,
3271 struct qed_ptt *p_ptt,
3272 struct qed_vf_info *vf)
3274 struct qed_bulletin_content *p_bulletin = vf->bulletin.p_virt;
3275 struct qed_iov_vf_mbx *mbx = &vf->vf_mbx;
3276 struct vfpf_ucast_filter_tlv *req;
3277 u8 status = PFVF_STATUS_SUCCESS;
3278 struct qed_filter_ucast params;
3281 /* Prepare the unicast filter params */
3282 memset(¶ms, 0, sizeof(struct qed_filter_ucast));
3283 req = &mbx->req_virt->ucast_filter;
3284 params.opcode = (enum qed_filter_opcode)req->opcode;
3285 params.type = (enum qed_filter_ucast_type)req->type;
3287 params.is_rx_filter = 1;
3288 params.is_tx_filter = 1;
3289 params.vport_to_remove_from = vf->vport_id;
3290 params.vport_to_add_to = vf->vport_id;
3291 memcpy(params.mac, req->mac, ETH_ALEN);
3292 params.vlan = req->vlan;
3296 "VF[%d]: opcode 0x%02x type 0x%02x [%s %s] [vport 0x%02x] MAC %02x:%02x:%02x:%02x:%02x:%02x, vlan 0x%04x\n",
3297 vf->abs_vf_id, params.opcode, params.type,
3298 params.is_rx_filter ? "RX" : "",
3299 params.is_tx_filter ? "TX" : "",
3300 params.vport_to_add_to,
3301 params.mac[0], params.mac[1],
3302 params.mac[2], params.mac[3],
3303 params.mac[4], params.mac[5], params.vlan);
3305 if (!vf->vport_instance) {
3308 "No VPORT instance available for VF[%d], failing ucast MAC configuration\n",
3310 status = PFVF_STATUS_FAILURE;
3314 /* Update shadow copy of the VF configuration */
3315 if (qed_iov_vf_update_unicast_shadow(p_hwfn, vf, ¶ms)) {
3316 status = PFVF_STATUS_FAILURE;
3320 /* Determine if the unicast filtering is acceptible by PF */
3321 if ((p_bulletin->valid_bitmap & BIT(VLAN_ADDR_FORCED)) &&
3322 (params.type == QED_FILTER_VLAN ||
3323 params.type == QED_FILTER_MAC_VLAN)) {
3324 /* Once VLAN is forced or PVID is set, do not allow
3325 * to add/replace any further VLANs.
3327 if (params.opcode == QED_FILTER_ADD ||
3328 params.opcode == QED_FILTER_REPLACE)
3329 status = PFVF_STATUS_FORCED;
3333 if ((p_bulletin->valid_bitmap & BIT(MAC_ADDR_FORCED)) &&
3334 (params.type == QED_FILTER_MAC ||
3335 params.type == QED_FILTER_MAC_VLAN)) {
3336 if (!ether_addr_equal(p_bulletin->mac, params.mac) ||
3337 (params.opcode != QED_FILTER_ADD &&
3338 params.opcode != QED_FILTER_REPLACE))
3339 status = PFVF_STATUS_FORCED;
3343 rc = qed_iov_chk_ucast(p_hwfn, vf->relative_vf_id, ¶ms);
3345 status = PFVF_STATUS_FAILURE;
3349 rc = qed_sp_eth_filter_ucast(p_hwfn, vf->opaque_fid, ¶ms,
3350 QED_SPQ_MODE_CB, NULL);
3352 status = PFVF_STATUS_FAILURE;
3355 qed_iov_prepare_resp(p_hwfn, p_ptt, vf, CHANNEL_TLV_UCAST_FILTER,
3356 sizeof(struct pfvf_def_resp_tlv), status);
3359 static void qed_iov_vf_mbx_int_cleanup(struct qed_hwfn *p_hwfn,
3360 struct qed_ptt *p_ptt,
3361 struct qed_vf_info *vf)
3366 for (i = 0; i < vf->num_sbs; i++)
3367 qed_int_igu_init_pure_rt_single(p_hwfn, p_ptt,
3369 vf->opaque_fid, false);
3371 qed_iov_prepare_resp(p_hwfn, p_ptt, vf, CHANNEL_TLV_INT_CLEANUP,
3372 sizeof(struct pfvf_def_resp_tlv),
3373 PFVF_STATUS_SUCCESS);
3376 static void qed_iov_vf_mbx_close(struct qed_hwfn *p_hwfn,
3377 struct qed_ptt *p_ptt, struct qed_vf_info *vf)
3379 u16 length = sizeof(struct pfvf_def_resp_tlv);
3380 u8 status = PFVF_STATUS_SUCCESS;
3382 /* Disable Interrupts for VF */
3383 qed_iov_vf_igu_set_int(p_hwfn, p_ptt, vf, 0);
3385 /* Reset Permission table */
3386 qed_iov_config_perm_table(p_hwfn, p_ptt, vf, 0);
3388 qed_iov_prepare_resp(p_hwfn, p_ptt, vf, CHANNEL_TLV_CLOSE,
3392 static void qed_iov_vf_mbx_release(struct qed_hwfn *p_hwfn,
3393 struct qed_ptt *p_ptt,
3394 struct qed_vf_info *p_vf)
3396 u16 length = sizeof(struct pfvf_def_resp_tlv);
3397 u8 status = PFVF_STATUS_SUCCESS;
3400 qed_iov_vf_cleanup(p_hwfn, p_vf);
3402 if (p_vf->state != VF_STOPPED && p_vf->state != VF_FREE) {
3403 /* Stopping the VF */
3404 rc = qed_sp_vf_stop(p_hwfn, p_vf->concrete_fid,
3408 DP_ERR(p_hwfn, "qed_sp_vf_stop returned error %d\n",
3410 status = PFVF_STATUS_FAILURE;
3413 p_vf->state = VF_STOPPED;
3416 qed_iov_prepare_resp(p_hwfn, p_ptt, p_vf, CHANNEL_TLV_RELEASE,
3420 static void qed_iov_vf_pf_get_coalesce(struct qed_hwfn *p_hwfn,
3421 struct qed_ptt *p_ptt,
3422 struct qed_vf_info *p_vf)
3424 struct qed_iov_vf_mbx *mbx = &p_vf->vf_mbx;
3425 struct pfvf_read_coal_resp_tlv *p_resp;
3426 struct vfpf_read_coal_req_tlv *req;
3427 u8 status = PFVF_STATUS_FAILURE;
3428 struct qed_vf_queue *p_queue;
3429 struct qed_queue_cid *p_cid;
3430 u16 coal = 0, qid, i;
3434 mbx->offset = (u8 *)mbx->reply_virt;
3435 req = &mbx->req_virt->read_coal_req;
3438 b_is_rx = req->is_rx ? true : false;
3441 if (!qed_iov_validate_rxq(p_hwfn, p_vf, qid,
3442 QED_IOV_VALIDATE_Q_ENABLE)) {
3443 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
3444 "VF[%d]: Invalid Rx queue_id = %d\n",
3445 p_vf->abs_vf_id, qid);
3449 p_cid = qed_iov_get_vf_rx_queue_cid(&p_vf->vf_queues[qid]);
3450 rc = qed_get_rxq_coalesce(p_hwfn, p_ptt, p_cid, &coal);
3454 if (!qed_iov_validate_txq(p_hwfn, p_vf, qid,
3455 QED_IOV_VALIDATE_Q_ENABLE)) {
3456 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
3457 "VF[%d]: Invalid Tx queue_id = %d\n",
3458 p_vf->abs_vf_id, qid);
3461 for (i = 0; i < MAX_QUEUES_PER_QZONE; i++) {
3462 p_queue = &p_vf->vf_queues[qid];
3463 if ((!p_queue->cids[i].p_cid) ||
3464 (!p_queue->cids[i].b_is_tx))
3467 p_cid = p_queue->cids[i].p_cid;
3469 rc = qed_get_txq_coalesce(p_hwfn, p_ptt, p_cid, &coal);
3476 status = PFVF_STATUS_SUCCESS;
3479 p_resp = qed_add_tlv(p_hwfn, &mbx->offset, CHANNEL_TLV_COALESCE_READ,
3481 p_resp->coal = coal;
3483 qed_add_tlv(p_hwfn, &mbx->offset, CHANNEL_TLV_LIST_END,
3484 sizeof(struct channel_list_end_tlv));
3486 qed_iov_send_response(p_hwfn, p_ptt, p_vf, sizeof(*p_resp), status);
3489 static void qed_iov_vf_pf_set_coalesce(struct qed_hwfn *p_hwfn,
3490 struct qed_ptt *p_ptt,
3491 struct qed_vf_info *vf)
3493 struct qed_iov_vf_mbx *mbx = &vf->vf_mbx;
3494 struct vfpf_update_coalesce *req;
3495 u8 status = PFVF_STATUS_FAILURE;
3496 struct qed_queue_cid *p_cid;
3497 u16 rx_coal, tx_coal;
3501 req = &mbx->req_virt->update_coalesce;
3503 rx_coal = req->rx_coal;
3504 tx_coal = req->tx_coal;
3507 if (!qed_iov_validate_rxq(p_hwfn, vf, qid,
3508 QED_IOV_VALIDATE_Q_ENABLE) && rx_coal) {
3509 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
3510 "VF[%d]: Invalid Rx queue_id = %d\n",
3511 vf->abs_vf_id, qid);
3515 if (!qed_iov_validate_txq(p_hwfn, vf, qid,
3516 QED_IOV_VALIDATE_Q_ENABLE) && tx_coal) {
3517 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
3518 "VF[%d]: Invalid Tx queue_id = %d\n",
3519 vf->abs_vf_id, qid);
3525 "VF[%d]: Setting coalesce for VF rx_coal = %d, tx_coal = %d at queue = %d\n",
3526 vf->abs_vf_id, rx_coal, tx_coal, qid);
3529 p_cid = qed_iov_get_vf_rx_queue_cid(&vf->vf_queues[qid]);
3531 rc = qed_set_rxq_coalesce(p_hwfn, p_ptt, rx_coal, p_cid);
3535 "VF[%d]: Unable to set rx queue = %d coalesce\n",
3536 vf->abs_vf_id, vf->vf_queues[qid].fw_rx_qid);
3539 vf->rx_coal = rx_coal;
3543 struct qed_vf_queue *p_queue = &vf->vf_queues[qid];
3545 for (i = 0; i < MAX_QUEUES_PER_QZONE; i++) {
3546 if (!p_queue->cids[i].p_cid)
3549 if (!p_queue->cids[i].b_is_tx)
3552 rc = qed_set_txq_coalesce(p_hwfn, p_ptt, tx_coal,
3553 p_queue->cids[i].p_cid);
3558 "VF[%d]: Unable to set tx queue coalesce\n",
3563 vf->tx_coal = tx_coal;
3566 status = PFVF_STATUS_SUCCESS;
3568 qed_iov_prepare_resp(p_hwfn, p_ptt, vf, CHANNEL_TLV_COALESCE_UPDATE,
3569 sizeof(struct pfvf_def_resp_tlv), status);
3572 qed_iov_vf_flr_poll_dorq(struct qed_hwfn *p_hwfn,
3573 struct qed_vf_info *p_vf, struct qed_ptt *p_ptt)
3578 qed_fid_pretend(p_hwfn, p_ptt, (u16) p_vf->concrete_fid);
3580 for (cnt = 0; cnt < 50; cnt++) {
3581 val = qed_rd(p_hwfn, p_ptt, DORQ_REG_VF_USAGE_CNT);
3586 qed_fid_pretend(p_hwfn, p_ptt, (u16) p_hwfn->hw_info.concrete_fid);
3590 "VF[%d] - dorq failed to cleanup [usage 0x%08x]\n",
3591 p_vf->abs_vf_id, val);
3599 qed_iov_vf_flr_poll_pbf(struct qed_hwfn *p_hwfn,
3600 struct qed_vf_info *p_vf, struct qed_ptt *p_ptt)
3602 u32 cons[MAX_NUM_VOQS_E4], distance[MAX_NUM_VOQS_E4];
3605 /* Read initial consumers & producers */
3606 for (i = 0; i < MAX_NUM_VOQS_E4; i++) {
3609 cons[i] = qed_rd(p_hwfn, p_ptt,
3610 PBF_REG_NUM_BLOCKS_ALLOCATED_CONS_VOQ0 +
3612 prod = qed_rd(p_hwfn, p_ptt,
3613 PBF_REG_NUM_BLOCKS_ALLOCATED_PROD_VOQ0 +
3615 distance[i] = prod - cons[i];
3618 /* Wait for consumers to pass the producers */
3620 for (cnt = 0; cnt < 50; cnt++) {
3621 for (; i < MAX_NUM_VOQS_E4; i++) {
3624 tmp = qed_rd(p_hwfn, p_ptt,
3625 PBF_REG_NUM_BLOCKS_ALLOCATED_CONS_VOQ0 +
3627 if (distance[i] > tmp - cons[i])
3631 if (i == MAX_NUM_VOQS_E4)
3638 DP_ERR(p_hwfn, "VF[%d] - pbf polling failed on VOQ %d\n",
3639 p_vf->abs_vf_id, i);
3646 static int qed_iov_vf_flr_poll(struct qed_hwfn *p_hwfn,
3647 struct qed_vf_info *p_vf, struct qed_ptt *p_ptt)
3651 rc = qed_iov_vf_flr_poll_dorq(p_hwfn, p_vf, p_ptt);
3655 rc = qed_iov_vf_flr_poll_pbf(p_hwfn, p_vf, p_ptt);
3663 qed_iov_execute_vf_flr_cleanup(struct qed_hwfn *p_hwfn,
3664 struct qed_ptt *p_ptt,
3665 u16 rel_vf_id, u32 *ack_vfs)
3667 struct qed_vf_info *p_vf;
3670 p_vf = qed_iov_get_vf_info(p_hwfn, rel_vf_id, false);
3674 if (p_hwfn->pf_iov_info->pending_flr[rel_vf_id / 64] &
3675 (1ULL << (rel_vf_id % 64))) {
3676 u16 vfid = p_vf->abs_vf_id;
3678 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
3679 "VF[%d] - Handling FLR\n", vfid);
3681 qed_iov_vf_cleanup(p_hwfn, p_vf);
3683 /* If VF isn't active, no need for anything but SW */
3687 rc = qed_iov_vf_flr_poll(p_hwfn, p_vf, p_ptt);
3691 rc = qed_final_cleanup(p_hwfn, p_ptt, vfid, true);
3693 DP_ERR(p_hwfn, "Failed handle FLR of VF[%d]\n", vfid);
3697 /* Workaround to make VF-PF channel ready, as FW
3698 * doesn't do that as a part of FLR.
3701 GTT_BAR0_MAP_REG_USDM_RAM +
3702 USTORM_VF_PF_CHANNEL_READY_OFFSET(vfid), 1);
3704 /* VF_STOPPED has to be set only after final cleanup
3705 * but prior to re-enabling the VF.
3707 p_vf->state = VF_STOPPED;
3709 rc = qed_iov_enable_vf_access(p_hwfn, p_ptt, p_vf);
3711 DP_ERR(p_hwfn, "Failed to re-enable VF[%d] acces\n",
3716 /* Mark VF for ack and clean pending state */
3717 if (p_vf->state == VF_RESET)
3718 p_vf->state = VF_STOPPED;
3719 ack_vfs[vfid / 32] |= BIT((vfid % 32));
3720 p_hwfn->pf_iov_info->pending_flr[rel_vf_id / 64] &=
3721 ~(1ULL << (rel_vf_id % 64));
3722 p_vf->vf_mbx.b_pending_msg = false;
3729 qed_iov_vf_flr_cleanup(struct qed_hwfn *p_hwfn, struct qed_ptt *p_ptt)
3731 u32 ack_vfs[VF_MAX_STATIC / 32];
3735 memset(ack_vfs, 0, sizeof(u32) * (VF_MAX_STATIC / 32));
3737 /* Since BRB <-> PRS interface can't be tested as part of the flr
3738 * polling due to HW limitations, simply sleep a bit. And since
3739 * there's no need to wait per-vf, do it before looping.
3743 for (i = 0; i < p_hwfn->cdev->p_iov_info->total_vfs; i++)
3744 qed_iov_execute_vf_flr_cleanup(p_hwfn, p_ptt, i, ack_vfs);
3746 rc = qed_mcp_ack_vf_flr(p_hwfn, p_ptt, ack_vfs);
3750 bool qed_iov_mark_vf_flr(struct qed_hwfn *p_hwfn, u32 *p_disabled_vfs)
3755 DP_VERBOSE(p_hwfn, QED_MSG_IOV, "Marking FLR-ed VFs\n");
3756 for (i = 0; i < (VF_MAX_STATIC / 32); i++)
3757 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
3758 "[%08x,...,%08x]: %08x\n",
3759 i * 32, (i + 1) * 32 - 1, p_disabled_vfs[i]);
3761 if (!p_hwfn->cdev->p_iov_info) {
3762 DP_NOTICE(p_hwfn, "VF flr but no IOV\n");
3767 for (i = 0; i < p_hwfn->cdev->p_iov_info->total_vfs; i++) {
3768 struct qed_vf_info *p_vf;
3771 p_vf = qed_iov_get_vf_info(p_hwfn, i, false);
3775 vfid = p_vf->abs_vf_id;
3776 if (BIT((vfid % 32)) & p_disabled_vfs[vfid / 32]) {
3777 u64 *p_flr = p_hwfn->pf_iov_info->pending_flr;
3778 u16 rel_vf_id = p_vf->relative_vf_id;
3780 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
3781 "VF[%d] [rel %d] got FLR-ed\n",
3784 p_vf->state = VF_RESET;
3786 /* No need to lock here, since pending_flr should
3787 * only change here and before ACKing MFw. Since
3788 * MFW will not trigger an additional attention for
3789 * VF flr until ACKs, we're safe.
3791 p_flr[rel_vf_id / 64] |= 1ULL << (rel_vf_id % 64);
3799 static void qed_iov_get_link(struct qed_hwfn *p_hwfn,
3801 struct qed_mcp_link_params *p_params,
3802 struct qed_mcp_link_state *p_link,
3803 struct qed_mcp_link_capabilities *p_caps)
3805 struct qed_vf_info *p_vf = qed_iov_get_vf_info(p_hwfn,
3808 struct qed_bulletin_content *p_bulletin;
3813 p_bulletin = p_vf->bulletin.p_virt;
3816 __qed_vf_get_link_params(p_hwfn, p_params, p_bulletin);
3818 __qed_vf_get_link_state(p_hwfn, p_link, p_bulletin);
3820 __qed_vf_get_link_caps(p_hwfn, p_caps, p_bulletin);
3824 qed_iov_vf_pf_bulletin_update_mac(struct qed_hwfn *p_hwfn,
3825 struct qed_ptt *p_ptt,
3826 struct qed_vf_info *p_vf)
3828 struct qed_bulletin_content *p_bulletin = p_vf->bulletin.p_virt;
3829 struct qed_iov_vf_mbx *mbx = &p_vf->vf_mbx;
3830 struct vfpf_bulletin_update_mac_tlv *p_req;
3831 u8 status = PFVF_STATUS_SUCCESS;
3834 if (!p_vf->p_vf_info.is_trusted_configured) {
3837 "Blocking bulletin update request from untrusted VF[%d]\n",
3839 status = PFVF_STATUS_NOT_SUPPORTED;
3844 p_req = &mbx->req_virt->bulletin_update_mac;
3845 ether_addr_copy(p_bulletin->mac, p_req->mac);
3846 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
3847 "Updated bulletin of VF[%d] with requested MAC[%pM]\n",
3848 p_vf->abs_vf_id, p_req->mac);
3851 qed_iov_prepare_resp(p_hwfn, p_ptt, p_vf,
3852 CHANNEL_TLV_BULLETIN_UPDATE_MAC,
3853 sizeof(struct pfvf_def_resp_tlv), status);
3857 static void qed_iov_process_mbx_req(struct qed_hwfn *p_hwfn,
3858 struct qed_ptt *p_ptt, int vfid)
3860 struct qed_iov_vf_mbx *mbx;
3861 struct qed_vf_info *p_vf;
3863 p_vf = qed_iov_get_vf_info(p_hwfn, (u16) vfid, true);
3867 mbx = &p_vf->vf_mbx;
3869 /* qed_iov_process_mbx_request */
3870 if (!mbx->b_pending_msg) {
3872 "VF[%02x]: Trying to process mailbox message when none is pending\n",
3876 mbx->b_pending_msg = false;
3878 mbx->first_tlv = mbx->req_virt->first_tlv;
3880 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
3881 "VF[%02x]: Processing mailbox message [type %04x]\n",
3882 p_vf->abs_vf_id, mbx->first_tlv.tl.type);
3884 /* check if tlv type is known */
3885 if (qed_iov_tlv_supported(mbx->first_tlv.tl.type) &&
3886 !p_vf->b_malicious) {
3887 switch (mbx->first_tlv.tl.type) {
3888 case CHANNEL_TLV_ACQUIRE:
3889 qed_iov_vf_mbx_acquire(p_hwfn, p_ptt, p_vf);
3891 case CHANNEL_TLV_VPORT_START:
3892 qed_iov_vf_mbx_start_vport(p_hwfn, p_ptt, p_vf);
3894 case CHANNEL_TLV_VPORT_TEARDOWN:
3895 qed_iov_vf_mbx_stop_vport(p_hwfn, p_ptt, p_vf);
3897 case CHANNEL_TLV_START_RXQ:
3898 qed_iov_vf_mbx_start_rxq(p_hwfn, p_ptt, p_vf);
3900 case CHANNEL_TLV_START_TXQ:
3901 qed_iov_vf_mbx_start_txq(p_hwfn, p_ptt, p_vf);
3903 case CHANNEL_TLV_STOP_RXQS:
3904 qed_iov_vf_mbx_stop_rxqs(p_hwfn, p_ptt, p_vf);
3906 case CHANNEL_TLV_STOP_TXQS:
3907 qed_iov_vf_mbx_stop_txqs(p_hwfn, p_ptt, p_vf);
3909 case CHANNEL_TLV_UPDATE_RXQ:
3910 qed_iov_vf_mbx_update_rxqs(p_hwfn, p_ptt, p_vf);
3912 case CHANNEL_TLV_VPORT_UPDATE:
3913 qed_iov_vf_mbx_vport_update(p_hwfn, p_ptt, p_vf);
3915 case CHANNEL_TLV_UCAST_FILTER:
3916 qed_iov_vf_mbx_ucast_filter(p_hwfn, p_ptt, p_vf);
3918 case CHANNEL_TLV_CLOSE:
3919 qed_iov_vf_mbx_close(p_hwfn, p_ptt, p_vf);
3921 case CHANNEL_TLV_INT_CLEANUP:
3922 qed_iov_vf_mbx_int_cleanup(p_hwfn, p_ptt, p_vf);
3924 case CHANNEL_TLV_RELEASE:
3925 qed_iov_vf_mbx_release(p_hwfn, p_ptt, p_vf);
3927 case CHANNEL_TLV_UPDATE_TUNN_PARAM:
3928 qed_iov_vf_mbx_update_tunn_param(p_hwfn, p_ptt, p_vf);
3930 case CHANNEL_TLV_COALESCE_UPDATE:
3931 qed_iov_vf_pf_set_coalesce(p_hwfn, p_ptt, p_vf);
3933 case CHANNEL_TLV_COALESCE_READ:
3934 qed_iov_vf_pf_get_coalesce(p_hwfn, p_ptt, p_vf);
3936 case CHANNEL_TLV_BULLETIN_UPDATE_MAC:
3937 qed_iov_vf_pf_bulletin_update_mac(p_hwfn, p_ptt, p_vf);
3940 } else if (qed_iov_tlv_supported(mbx->first_tlv.tl.type)) {
3941 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
3942 "VF [%02x] - considered malicious; Ignoring TLV [%04x]\n",
3943 p_vf->abs_vf_id, mbx->first_tlv.tl.type);
3945 qed_iov_prepare_resp(p_hwfn, p_ptt, p_vf,
3946 mbx->first_tlv.tl.type,
3947 sizeof(struct pfvf_def_resp_tlv),
3948 PFVF_STATUS_MALICIOUS);
3950 /* unknown TLV - this may belong to a VF driver from the future
3951 * - a version written after this PF driver was written, which
3952 * supports features unknown as of yet. Too bad since we don't
3953 * support them. Or this may be because someone wrote a crappy
3954 * VF driver and is sending garbage over the channel.
3957 "VF[%02x]: unknown TLV. type %04x length %04x padding %08x reply address %llu\n",
3959 mbx->first_tlv.tl.type,
3960 mbx->first_tlv.tl.length,
3961 mbx->first_tlv.padding, mbx->first_tlv.reply_address);
3963 /* Try replying in case reply address matches the acquisition's
3966 if (p_vf->acquire.first_tlv.reply_address &&
3967 (mbx->first_tlv.reply_address ==
3968 p_vf->acquire.first_tlv.reply_address)) {
3969 qed_iov_prepare_resp(p_hwfn, p_ptt, p_vf,
3970 mbx->first_tlv.tl.type,
3971 sizeof(struct pfvf_def_resp_tlv),
3972 PFVF_STATUS_NOT_SUPPORTED);
3976 "VF[%02x]: Can't respond to TLV - no valid reply address\n",
3982 void qed_iov_pf_get_pending_events(struct qed_hwfn *p_hwfn, u64 *events)
3986 memset(events, 0, sizeof(u64) * QED_VF_ARRAY_LENGTH);
3988 qed_for_each_vf(p_hwfn, i) {
3989 struct qed_vf_info *p_vf;
3991 p_vf = &p_hwfn->pf_iov_info->vfs_array[i];
3992 if (p_vf->vf_mbx.b_pending_msg)
3993 events[i / 64] |= 1ULL << (i % 64);
3997 static struct qed_vf_info *qed_sriov_get_vf_from_absid(struct qed_hwfn *p_hwfn,
4000 u8 min = (u8) p_hwfn->cdev->p_iov_info->first_vf_in_pf;
4002 if (!_qed_iov_pf_sanity_check(p_hwfn, (int)abs_vfid - min, false)) {
4005 "Got indication for VF [abs 0x%08x] that cannot be handled by PF\n",
4010 return &p_hwfn->pf_iov_info->vfs_array[(u8) abs_vfid - min];
4013 static int qed_sriov_vfpf_msg(struct qed_hwfn *p_hwfn,
4014 u16 abs_vfid, struct regpair *vf_msg)
4016 struct qed_vf_info *p_vf = qed_sriov_get_vf_from_absid(p_hwfn,
4022 /* List the physical address of the request so that handler
4023 * could later on copy the message from it.
4025 p_vf->vf_mbx.pending_req = (((u64)vf_msg->hi) << 32) | vf_msg->lo;
4027 /* Mark the event and schedule the workqueue */
4028 p_vf->vf_mbx.b_pending_msg = true;
4029 qed_schedule_iov(p_hwfn, QED_IOV_WQ_MSG_FLAG);
4034 static void qed_sriov_vfpf_malicious(struct qed_hwfn *p_hwfn,
4035 struct malicious_vf_eqe_data *p_data)
4037 struct qed_vf_info *p_vf;
4039 p_vf = qed_sriov_get_vf_from_absid(p_hwfn, p_data->vf_id);
4044 if (!p_vf->b_malicious) {
4046 "VF [%d] - Malicious behavior [%02x]\n",
4047 p_vf->abs_vf_id, p_data->err_id);
4049 p_vf->b_malicious = true;
4052 "VF [%d] - Malicious behavior [%02x]\n",
4053 p_vf->abs_vf_id, p_data->err_id);
4057 static int qed_sriov_eqe_event(struct qed_hwfn *p_hwfn,
4060 union event_ring_data *data, u8 fw_return_code)
4063 case COMMON_EVENT_VF_PF_CHANNEL:
4064 return qed_sriov_vfpf_msg(p_hwfn, le16_to_cpu(echo),
4065 &data->vf_pf_channel.msg_addr);
4066 case COMMON_EVENT_MALICIOUS_VF:
4067 qed_sriov_vfpf_malicious(p_hwfn, &data->malicious_vf);
4070 DP_INFO(p_hwfn->cdev, "Unknown sriov eqe event 0x%02x\n",
4076 u16 qed_iov_get_next_active_vf(struct qed_hwfn *p_hwfn, u16 rel_vf_id)
4078 struct qed_hw_sriov_info *p_iov = p_hwfn->cdev->p_iov_info;
4084 for (i = rel_vf_id; i < p_iov->total_vfs; i++)
4085 if (qed_iov_is_valid_vfid(p_hwfn, rel_vf_id, true, false))
4092 static int qed_iov_copy_vf_msg(struct qed_hwfn *p_hwfn, struct qed_ptt *ptt,
4095 struct qed_dmae_params params;
4096 struct qed_vf_info *vf_info;
4098 vf_info = qed_iov_get_vf_info(p_hwfn, (u16) vfid, true);
4102 memset(¶ms, 0, sizeof(struct qed_dmae_params));
4103 params.flags = QED_DMAE_FLAG_VF_SRC | QED_DMAE_FLAG_COMPLETION_DST;
4104 params.src_vfid = vf_info->abs_vf_id;
4106 if (qed_dmae_host2host(p_hwfn, ptt,
4107 vf_info->vf_mbx.pending_req,
4108 vf_info->vf_mbx.req_phys,
4109 sizeof(union vfpf_tlvs) / 4, ¶ms)) {
4110 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
4111 "Failed to copy message from VF 0x%02x\n", vfid);
4119 static void qed_iov_bulletin_set_forced_mac(struct qed_hwfn *p_hwfn,
4122 struct qed_vf_info *vf_info;
4125 vf_info = qed_iov_get_vf_info(p_hwfn, (u16)vfid, true);
4127 DP_NOTICE(p_hwfn->cdev,
4128 "Can not set forced MAC, invalid vfid [%d]\n", vfid);
4132 if (vf_info->b_malicious) {
4133 DP_NOTICE(p_hwfn->cdev,
4134 "Can't set forced MAC to malicious VF [%d]\n", vfid);
4138 if (vf_info->p_vf_info.is_trusted_configured) {
4139 feature = BIT(VFPF_BULLETIN_MAC_ADDR);
4140 /* Trust mode will disable Forced MAC */
4141 vf_info->bulletin.p_virt->valid_bitmap &=
4142 ~BIT(MAC_ADDR_FORCED);
4144 feature = BIT(MAC_ADDR_FORCED);
4145 /* Forced MAC will disable MAC_ADDR */
4146 vf_info->bulletin.p_virt->valid_bitmap &=
4147 ~BIT(VFPF_BULLETIN_MAC_ADDR);
4150 memcpy(vf_info->bulletin.p_virt->mac, mac, ETH_ALEN);
4152 vf_info->bulletin.p_virt->valid_bitmap |= feature;
4154 qed_iov_configure_vport_forced(p_hwfn, vf_info, feature);
4157 static int qed_iov_bulletin_set_mac(struct qed_hwfn *p_hwfn, u8 *mac, int vfid)
4159 struct qed_vf_info *vf_info;
4162 vf_info = qed_iov_get_vf_info(p_hwfn, (u16)vfid, true);
4164 DP_NOTICE(p_hwfn->cdev, "Can not set MAC, invalid vfid [%d]\n",
4169 if (vf_info->b_malicious) {
4170 DP_NOTICE(p_hwfn->cdev, "Can't set MAC to malicious VF [%d]\n",
4175 if (vf_info->bulletin.p_virt->valid_bitmap & BIT(MAC_ADDR_FORCED)) {
4176 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
4177 "Can not set MAC, Forced MAC is configured\n");
4181 feature = BIT(VFPF_BULLETIN_MAC_ADDR);
4182 ether_addr_copy(vf_info->bulletin.p_virt->mac, mac);
4184 vf_info->bulletin.p_virt->valid_bitmap |= feature;
4186 if (vf_info->p_vf_info.is_trusted_configured)
4187 qed_iov_configure_vport_forced(p_hwfn, vf_info, feature);
4192 static void qed_iov_bulletin_set_forced_vlan(struct qed_hwfn *p_hwfn,
4195 struct qed_vf_info *vf_info;
4198 vf_info = qed_iov_get_vf_info(p_hwfn, (u16) vfid, true);
4200 DP_NOTICE(p_hwfn->cdev,
4201 "Can not set forced MAC, invalid vfid [%d]\n", vfid);
4205 if (vf_info->b_malicious) {
4206 DP_NOTICE(p_hwfn->cdev,
4207 "Can't set forced vlan to malicious VF [%d]\n", vfid);
4211 feature = 1 << VLAN_ADDR_FORCED;
4212 vf_info->bulletin.p_virt->pvid = pvid;
4214 vf_info->bulletin.p_virt->valid_bitmap |= feature;
4216 vf_info->bulletin.p_virt->valid_bitmap &= ~feature;
4218 qed_iov_configure_vport_forced(p_hwfn, vf_info, feature);
4221 void qed_iov_bulletin_set_udp_ports(struct qed_hwfn *p_hwfn,
4222 int vfid, u16 vxlan_port, u16 geneve_port)
4224 struct qed_vf_info *vf_info;
4226 vf_info = qed_iov_get_vf_info(p_hwfn, (u16)vfid, true);
4228 DP_NOTICE(p_hwfn->cdev,
4229 "Can not set udp ports, invalid vfid [%d]\n", vfid);
4233 if (vf_info->b_malicious) {
4234 DP_VERBOSE(p_hwfn, QED_MSG_IOV,
4235 "Can not set udp ports to malicious VF [%d]\n",
4240 vf_info->bulletin.p_virt->vxlan_udp_port = vxlan_port;
4241 vf_info->bulletin.p_virt->geneve_udp_port = geneve_port;
4244 static bool qed_iov_vf_has_vport_instance(struct qed_hwfn *p_hwfn, int vfid)
4246 struct qed_vf_info *p_vf_info;
4248 p_vf_info = qed_iov_get_vf_info(p_hwfn, (u16) vfid, true);
4252 return !!p_vf_info->vport_instance;
4255 static bool qed_iov_is_vf_stopped(struct qed_hwfn *p_hwfn, int vfid)
4257 struct qed_vf_info *p_vf_info;
4259 p_vf_info = qed_iov_get_vf_info(p_hwfn, (u16) vfid, true);
4263 return p_vf_info->state == VF_STOPPED;
4266 static bool qed_iov_spoofchk_get(struct qed_hwfn *p_hwfn, int vfid)
4268 struct qed_vf_info *vf_info;
4270 vf_info = qed_iov_get_vf_info(p_hwfn, (u16) vfid, true);
4274 return vf_info->spoof_chk;
4277 static int qed_iov_spoofchk_set(struct qed_hwfn *p_hwfn, int vfid, bool val)
4279 struct qed_vf_info *vf;
4282 if (!qed_iov_pf_sanity_check(p_hwfn, vfid)) {
4284 "SR-IOV sanity check failed, can't set spoofchk\n");
4288 vf = qed_iov_get_vf_info(p_hwfn, (u16) vfid, true);
4292 if (!qed_iov_vf_has_vport_instance(p_hwfn, vfid)) {
4293 /* After VF VPORT start PF will configure spoof check */
4294 vf->req_spoofchk_val = val;
4299 rc = __qed_iov_spoofchk_set(p_hwfn, vf, val);
4305 static u8 *qed_iov_bulletin_get_mac(struct qed_hwfn *p_hwfn, u16 rel_vf_id)
4307 struct qed_vf_info *p_vf;
4309 p_vf = qed_iov_get_vf_info(p_hwfn, rel_vf_id, true);
4310 if (!p_vf || !p_vf->bulletin.p_virt)
4313 if (!(p_vf->bulletin.p_virt->valid_bitmap &
4314 BIT(VFPF_BULLETIN_MAC_ADDR)))
4317 return p_vf->bulletin.p_virt->mac;
4320 static u8 *qed_iov_bulletin_get_forced_mac(struct qed_hwfn *p_hwfn,
4323 struct qed_vf_info *p_vf;
4325 p_vf = qed_iov_get_vf_info(p_hwfn, rel_vf_id, true);
4326 if (!p_vf || !p_vf->bulletin.p_virt)
4329 if (!(p_vf->bulletin.p_virt->valid_bitmap & BIT(MAC_ADDR_FORCED)))
4332 return p_vf->bulletin.p_virt->mac;
4336 qed_iov_bulletin_get_forced_vlan(struct qed_hwfn *p_hwfn, u16 rel_vf_id)
4338 struct qed_vf_info *p_vf;
4340 p_vf = qed_iov_get_vf_info(p_hwfn, rel_vf_id, true);
4341 if (!p_vf || !p_vf->bulletin.p_virt)
4344 if (!(p_vf->bulletin.p_virt->valid_bitmap & BIT(VLAN_ADDR_FORCED)))
4347 return p_vf->bulletin.p_virt->pvid;
4350 static int qed_iov_configure_tx_rate(struct qed_hwfn *p_hwfn,
4351 struct qed_ptt *p_ptt, int vfid, int val)
4353 struct qed_mcp_link_state *p_link;
4354 struct qed_vf_info *vf;
4358 vf = qed_iov_get_vf_info(p_hwfn, (u16)vfid, true);
4362 rc = qed_fw_vport(p_hwfn, vf->vport_id, &abs_vp_id);
4366 p_link = &QED_LEADING_HWFN(p_hwfn->cdev)->mcp_info->link_output;
4368 return qed_init_vport_rl(p_hwfn, p_ptt, abs_vp_id, (u32)val,
4373 qed_iov_configure_min_tx_rate(struct qed_dev *cdev, int vfid, u32 rate)
4375 struct qed_vf_info *vf;
4379 for_each_hwfn(cdev, i) {
4380 struct qed_hwfn *p_hwfn = &cdev->hwfns[i];
4382 if (!qed_iov_pf_sanity_check(p_hwfn, vfid)) {
4384 "SR-IOV sanity check failed, can't set min rate\n");
4389 vf = qed_iov_get_vf_info(QED_LEADING_HWFN(cdev), (u16)vfid, true);
4390 vport_id = vf->vport_id;
4392 return qed_configure_vport_wfq(cdev, vport_id, rate);
4395 static int qed_iov_get_vf_min_rate(struct qed_hwfn *p_hwfn, int vfid)
4397 struct qed_wfq_data *vf_vp_wfq;
4398 struct qed_vf_info *vf_info;
4400 vf_info = qed_iov_get_vf_info(p_hwfn, (u16) vfid, true);
4404 vf_vp_wfq = &p_hwfn->qm_info.wfq_data[vf_info->vport_id];
4406 if (vf_vp_wfq->configured)
4407 return vf_vp_wfq->min_speed;
4413 * qed_schedule_iov - schedules IOV task for VF and PF
4414 * @hwfn: hardware function pointer
4415 * @flag: IOV flag for VF/PF
4417 void qed_schedule_iov(struct qed_hwfn *hwfn, enum qed_iov_wq_flag flag)
4419 smp_mb__before_atomic();
4420 set_bit(flag, &hwfn->iov_task_flags);
4421 smp_mb__after_atomic();
4422 DP_VERBOSE(hwfn, QED_MSG_IOV, "Scheduling iov task [Flag: %d]\n", flag);
4423 queue_delayed_work(hwfn->iov_wq, &hwfn->iov_task, 0);
4426 void qed_vf_start_iov_wq(struct qed_dev *cdev)
4430 for_each_hwfn(cdev, i)
4431 queue_delayed_work(cdev->hwfns[i].iov_wq,
4432 &cdev->hwfns[i].iov_task, 0);
4435 int qed_sriov_disable(struct qed_dev *cdev, bool pci_enabled)
4439 for_each_hwfn(cdev, i)
4440 if (cdev->hwfns[i].iov_wq)
4441 flush_workqueue(cdev->hwfns[i].iov_wq);
4443 /* Mark VFs for disablement */
4444 qed_iov_set_vfs_to_disable(cdev, true);
4446 if (cdev->p_iov_info && cdev->p_iov_info->num_vfs && pci_enabled)
4447 pci_disable_sriov(cdev->pdev);
4449 for_each_hwfn(cdev, i) {
4450 struct qed_hwfn *hwfn = &cdev->hwfns[i];
4451 struct qed_ptt *ptt = qed_ptt_acquire(hwfn);
4453 /* Failure to acquire the ptt in 100g creates an odd error
4454 * where the first engine has already relased IOV.
4457 DP_ERR(hwfn, "Failed to acquire ptt\n");
4461 /* Clean WFQ db and configure equal weight for all vports */
4462 qed_clean_wfq_db(hwfn, ptt);
4464 qed_for_each_vf(hwfn, j) {
4467 if (!qed_iov_is_valid_vfid(hwfn, j, true, false))
4470 /* Wait until VF is disabled before releasing */
4471 for (k = 0; k < 100; k++) {
4472 if (!qed_iov_is_vf_stopped(hwfn, j))
4479 qed_iov_release_hw_for_vf(&cdev->hwfns[i],
4483 "Timeout waiting for VF's FLR to end\n");
4486 qed_ptt_release(hwfn, ptt);
4489 qed_iov_set_vfs_to_disable(cdev, false);
4494 static void qed_sriov_enable_qid_config(struct qed_hwfn *hwfn,
4496 struct qed_iov_vf_init_params *params)
4500 /* Since we have an equal resource distribution per-VF, and we assume
4501 * PF has acquired the QED_PF_L2_QUE first queues, we start setting
4502 * sequentially from there.
4504 base = FEAT_NUM(hwfn, QED_PF_L2_QUE) + vfid * params->num_queues;
4506 params->rel_vf_id = vfid;
4507 for (i = 0; i < params->num_queues; i++) {
4508 params->req_rx_queue[i] = base + i;
4509 params->req_tx_queue[i] = base + i;
4513 static int qed_sriov_enable(struct qed_dev *cdev, int num)
4515 struct qed_iov_vf_init_params params;
4516 struct qed_hwfn *hwfn;
4517 struct qed_ptt *ptt;
4520 if (num >= RESC_NUM(&cdev->hwfns[0], QED_VPORT)) {
4521 DP_NOTICE(cdev, "Can start at most %d VFs\n",
4522 RESC_NUM(&cdev->hwfns[0], QED_VPORT) - 1);
4526 memset(¶ms, 0, sizeof(params));
4528 /* Initialize HW for VF access */
4529 for_each_hwfn(cdev, j) {
4530 hwfn = &cdev->hwfns[j];
4531 ptt = qed_ptt_acquire(hwfn);
4533 /* Make sure not to use more than 16 queues per VF */
4534 params.num_queues = min_t(int,
4535 FEAT_NUM(hwfn, QED_VF_L2_QUE) / num,
4539 DP_ERR(hwfn, "Failed to acquire ptt\n");
4544 for (i = 0; i < num; i++) {
4545 if (!qed_iov_is_valid_vfid(hwfn, i, false, true))
4548 qed_sriov_enable_qid_config(hwfn, i, ¶ms);
4549 rc = qed_iov_init_hw_for_vf(hwfn, ptt, ¶ms);
4551 DP_ERR(cdev, "Failed to enable VF[%d]\n", i);
4552 qed_ptt_release(hwfn, ptt);
4557 qed_ptt_release(hwfn, ptt);
4560 /* Enable SRIOV PCIe functions */
4561 rc = pci_enable_sriov(cdev->pdev, num);
4563 DP_ERR(cdev, "Failed to enable sriov [%d]\n", rc);
4567 hwfn = QED_LEADING_HWFN(cdev);
4568 ptt = qed_ptt_acquire(hwfn);
4570 DP_ERR(hwfn, "Failed to acquire ptt\n");
4575 rc = qed_mcp_ov_update_eswitch(hwfn, ptt, QED_OV_ESWITCH_VEB);
4577 DP_INFO(cdev, "Failed to update eswitch mode\n");
4578 qed_ptt_release(hwfn, ptt);
4583 qed_sriov_disable(cdev, false);
4587 static int qed_sriov_configure(struct qed_dev *cdev, int num_vfs_param)
4589 if (!IS_QED_SRIOV(cdev)) {
4590 DP_VERBOSE(cdev, QED_MSG_IOV, "SR-IOV is not supported\n");
4595 return qed_sriov_enable(cdev, num_vfs_param);
4597 return qed_sriov_disable(cdev, true);
4600 static int qed_sriov_pf_set_mac(struct qed_dev *cdev, u8 *mac, int vfid)
4604 if (!IS_QED_SRIOV(cdev) || !IS_PF_SRIOV_ALLOC(&cdev->hwfns[0])) {
4605 DP_VERBOSE(cdev, QED_MSG_IOV,
4606 "Cannot set a VF MAC; Sriov is not enabled\n");
4610 if (!qed_iov_is_valid_vfid(&cdev->hwfns[0], vfid, true, true)) {
4611 DP_VERBOSE(cdev, QED_MSG_IOV,
4612 "Cannot set VF[%d] MAC (VF is not active)\n", vfid);
4616 for_each_hwfn(cdev, i) {
4617 struct qed_hwfn *hwfn = &cdev->hwfns[i];
4618 struct qed_public_vf_info *vf_info;
4620 vf_info = qed_iov_get_public_vf_info(hwfn, vfid, true);
4624 /* Set the MAC, and schedule the IOV task */
4625 if (vf_info->is_trusted_configured)
4626 ether_addr_copy(vf_info->mac, mac);
4628 ether_addr_copy(vf_info->forced_mac, mac);
4630 qed_schedule_iov(hwfn, QED_IOV_WQ_SET_UNICAST_FILTER_FLAG);
4636 static int qed_sriov_pf_set_vlan(struct qed_dev *cdev, u16 vid, int vfid)
4640 if (!IS_QED_SRIOV(cdev) || !IS_PF_SRIOV_ALLOC(&cdev->hwfns[0])) {
4641 DP_VERBOSE(cdev, QED_MSG_IOV,
4642 "Cannot set a VF MAC; Sriov is not enabled\n");
4646 if (!qed_iov_is_valid_vfid(&cdev->hwfns[0], vfid, true, true)) {
4647 DP_VERBOSE(cdev, QED_MSG_IOV,
4648 "Cannot set VF[%d] MAC (VF is not active)\n", vfid);
4652 for_each_hwfn(cdev, i) {
4653 struct qed_hwfn *hwfn = &cdev->hwfns[i];
4654 struct qed_public_vf_info *vf_info;
4656 vf_info = qed_iov_get_public_vf_info(hwfn, vfid, true);
4660 /* Set the forced vlan, and schedule the IOV task */
4661 vf_info->forced_vlan = vid;
4662 qed_schedule_iov(hwfn, QED_IOV_WQ_SET_UNICAST_FILTER_FLAG);
4668 static int qed_get_vf_config(struct qed_dev *cdev,
4669 int vf_id, struct ifla_vf_info *ivi)
4671 struct qed_hwfn *hwfn = QED_LEADING_HWFN(cdev);
4672 struct qed_public_vf_info *vf_info;
4673 struct qed_mcp_link_state link;
4676 /* Sanitize request */
4680 if (!qed_iov_is_valid_vfid(&cdev->hwfns[0], vf_id, true, false)) {
4681 DP_VERBOSE(cdev, QED_MSG_IOV,
4682 "VF index [%d] isn't active\n", vf_id);
4686 vf_info = qed_iov_get_public_vf_info(hwfn, vf_id, true);
4688 qed_iov_get_link(hwfn, vf_id, NULL, &link, NULL);
4690 /* Fill information about VF */
4693 if (is_valid_ether_addr(vf_info->forced_mac))
4694 ether_addr_copy(ivi->mac, vf_info->forced_mac);
4696 ether_addr_copy(ivi->mac, vf_info->mac);
4698 ivi->vlan = vf_info->forced_vlan;
4699 ivi->spoofchk = qed_iov_spoofchk_get(hwfn, vf_id);
4700 ivi->linkstate = vf_info->link_state;
4701 tx_rate = vf_info->tx_rate;
4702 ivi->max_tx_rate = tx_rate ? tx_rate : link.speed;
4703 ivi->min_tx_rate = qed_iov_get_vf_min_rate(hwfn, vf_id);
4708 void qed_inform_vf_link_state(struct qed_hwfn *hwfn)
4710 struct qed_hwfn *lead_hwfn = QED_LEADING_HWFN(hwfn->cdev);
4711 struct qed_mcp_link_capabilities caps;
4712 struct qed_mcp_link_params params;
4713 struct qed_mcp_link_state link;
4716 if (!hwfn->pf_iov_info)
4719 /* Update bulletin of all future possible VFs with link configuration */
4720 for (i = 0; i < hwfn->cdev->p_iov_info->total_vfs; i++) {
4721 struct qed_public_vf_info *vf_info;
4723 vf_info = qed_iov_get_public_vf_info(hwfn, i, false);
4727 /* Only hwfn0 is actually interested in the link speed.
4728 * But since only it would receive an MFW indication of link,
4729 * need to take configuration from it - otherwise things like
4730 * rate limiting for hwfn1 VF would not work.
4732 memcpy(¶ms, qed_mcp_get_link_params(lead_hwfn),
4734 memcpy(&link, qed_mcp_get_link_state(lead_hwfn), sizeof(link));
4735 memcpy(&caps, qed_mcp_get_link_capabilities(lead_hwfn),
4738 /* Modify link according to the VF's configured link state */
4739 switch (vf_info->link_state) {
4740 case IFLA_VF_LINK_STATE_DISABLE:
4741 link.link_up = false;
4743 case IFLA_VF_LINK_STATE_ENABLE:
4744 link.link_up = true;
4745 /* Set speed according to maximum supported by HW.
4746 * that is 40G for regular devices and 100G for CMT
4749 link.speed = (hwfn->cdev->num_hwfns > 1) ?
4752 /* In auto mode pass PF link image to VF */
4756 if (link.link_up && vf_info->tx_rate) {
4757 struct qed_ptt *ptt;
4760 rate = min_t(int, vf_info->tx_rate, link.speed);
4762 ptt = qed_ptt_acquire(hwfn);
4764 DP_NOTICE(hwfn, "Failed to acquire PTT\n");
4768 if (!qed_iov_configure_tx_rate(hwfn, ptt, i, rate)) {
4769 vf_info->tx_rate = rate;
4773 qed_ptt_release(hwfn, ptt);
4776 qed_iov_set_link(hwfn, i, ¶ms, &link, &caps);
4779 qed_schedule_iov(hwfn, QED_IOV_WQ_BULLETIN_UPDATE_FLAG);
4782 static int qed_set_vf_link_state(struct qed_dev *cdev,
4783 int vf_id, int link_state)
4787 /* Sanitize request */
4791 if (!qed_iov_is_valid_vfid(&cdev->hwfns[0], vf_id, true, true)) {
4792 DP_VERBOSE(cdev, QED_MSG_IOV,
4793 "VF index [%d] isn't active\n", vf_id);
4797 /* Handle configuration of link state */
4798 for_each_hwfn(cdev, i) {
4799 struct qed_hwfn *hwfn = &cdev->hwfns[i];
4800 struct qed_public_vf_info *vf;
4802 vf = qed_iov_get_public_vf_info(hwfn, vf_id, true);
4806 if (vf->link_state == link_state)
4809 vf->link_state = link_state;
4810 qed_inform_vf_link_state(&cdev->hwfns[i]);
4816 static int qed_spoof_configure(struct qed_dev *cdev, int vfid, bool val)
4818 int i, rc = -EINVAL;
4820 for_each_hwfn(cdev, i) {
4821 struct qed_hwfn *p_hwfn = &cdev->hwfns[i];
4823 rc = qed_iov_spoofchk_set(p_hwfn, vfid, val);
4831 static int qed_configure_max_vf_rate(struct qed_dev *cdev, int vfid, int rate)
4835 for_each_hwfn(cdev, i) {
4836 struct qed_hwfn *p_hwfn = &cdev->hwfns[i];
4837 struct qed_public_vf_info *vf;
4839 if (!qed_iov_pf_sanity_check(p_hwfn, vfid)) {
4841 "SR-IOV sanity check failed, can't set tx rate\n");
4845 vf = qed_iov_get_public_vf_info(p_hwfn, vfid, true);
4849 qed_inform_vf_link_state(p_hwfn);
4855 static int qed_set_vf_rate(struct qed_dev *cdev,
4856 int vfid, u32 min_rate, u32 max_rate)
4858 int rc_min = 0, rc_max = 0;
4861 rc_max = qed_configure_max_vf_rate(cdev, vfid, max_rate);
4864 rc_min = qed_iov_configure_min_tx_rate(cdev, vfid, min_rate);
4866 if (rc_max | rc_min)
4872 static int qed_set_vf_trust(struct qed_dev *cdev, int vfid, bool trust)
4876 for_each_hwfn(cdev, i) {
4877 struct qed_hwfn *hwfn = &cdev->hwfns[i];
4878 struct qed_public_vf_info *vf;
4880 if (!qed_iov_pf_sanity_check(hwfn, vfid)) {
4882 "SR-IOV sanity check failed, can't set trust\n");
4886 vf = qed_iov_get_public_vf_info(hwfn, vfid, true);
4888 if (vf->is_trusted_request == trust)
4890 vf->is_trusted_request = trust;
4892 qed_schedule_iov(hwfn, QED_IOV_WQ_TRUST_FLAG);
4898 static void qed_handle_vf_msg(struct qed_hwfn *hwfn)
4900 u64 events[QED_VF_ARRAY_LENGTH];
4901 struct qed_ptt *ptt;
4904 ptt = qed_ptt_acquire(hwfn);
4906 DP_VERBOSE(hwfn, QED_MSG_IOV,
4907 "Can't acquire PTT; re-scheduling\n");
4908 qed_schedule_iov(hwfn, QED_IOV_WQ_MSG_FLAG);
4912 qed_iov_pf_get_pending_events(hwfn, events);
4914 DP_VERBOSE(hwfn, QED_MSG_IOV,
4915 "Event mask of VF events: 0x%llx 0x%llx 0x%llx\n",
4916 events[0], events[1], events[2]);
4918 qed_for_each_vf(hwfn, i) {
4919 /* Skip VFs with no pending messages */
4920 if (!(events[i / 64] & (1ULL << (i % 64))))
4923 DP_VERBOSE(hwfn, QED_MSG_IOV,
4924 "Handling VF message from VF 0x%02x [Abs 0x%02x]\n",
4925 i, hwfn->cdev->p_iov_info->first_vf_in_pf + i);
4927 /* Copy VF's message to PF's request buffer for that VF */
4928 if (qed_iov_copy_vf_msg(hwfn, ptt, i))
4931 qed_iov_process_mbx_req(hwfn, ptt, i);
4934 qed_ptt_release(hwfn, ptt);
4937 static bool qed_pf_validate_req_vf_mac(struct qed_hwfn *hwfn,
4939 struct qed_public_vf_info *info)
4941 if (info->is_trusted_configured) {
4942 if (is_valid_ether_addr(info->mac) &&
4943 (!mac || !ether_addr_equal(mac, info->mac)))
4946 if (is_valid_ether_addr(info->forced_mac) &&
4947 (!mac || !ether_addr_equal(mac, info->forced_mac)))
4954 static void qed_set_bulletin_mac(struct qed_hwfn *hwfn,
4955 struct qed_public_vf_info *info,
4958 if (info->is_trusted_configured)
4959 qed_iov_bulletin_set_mac(hwfn, info->mac, vfid);
4961 qed_iov_bulletin_set_forced_mac(hwfn, info->forced_mac, vfid);
4964 static void qed_handle_pf_set_vf_unicast(struct qed_hwfn *hwfn)
4968 qed_for_each_vf(hwfn, i) {
4969 struct qed_public_vf_info *info;
4970 bool update = false;
4973 info = qed_iov_get_public_vf_info(hwfn, i, true);
4977 /* Update data on bulletin board */
4978 if (info->is_trusted_configured)
4979 mac = qed_iov_bulletin_get_mac(hwfn, i);
4981 mac = qed_iov_bulletin_get_forced_mac(hwfn, i);
4983 if (qed_pf_validate_req_vf_mac(hwfn, mac, info)) {
4986 "Handling PF setting of VF MAC to VF 0x%02x [Abs 0x%02x]\n",
4988 hwfn->cdev->p_iov_info->first_vf_in_pf + i);
4990 /* Update bulletin board with MAC */
4991 qed_set_bulletin_mac(hwfn, info, i);
4995 if (qed_iov_bulletin_get_forced_vlan(hwfn, i) ^
4996 info->forced_vlan) {
4999 "Handling PF setting of pvid [0x%04x] to VF 0x%02x [Abs 0x%02x]\n",
5002 hwfn->cdev->p_iov_info->first_vf_in_pf + i);
5003 qed_iov_bulletin_set_forced_vlan(hwfn,
5004 info->forced_vlan, i);
5009 qed_schedule_iov(hwfn, QED_IOV_WQ_BULLETIN_UPDATE_FLAG);
5013 static void qed_handle_bulletin_post(struct qed_hwfn *hwfn)
5015 struct qed_ptt *ptt;
5018 ptt = qed_ptt_acquire(hwfn);
5020 DP_NOTICE(hwfn, "Failed allocating a ptt entry\n");
5021 qed_schedule_iov(hwfn, QED_IOV_WQ_BULLETIN_UPDATE_FLAG);
5025 qed_for_each_vf(hwfn, i)
5026 qed_iov_post_vf_bulletin(hwfn, i, ptt);
5028 qed_ptt_release(hwfn, ptt);
5031 static void qed_update_mac_for_vf_trust_change(struct qed_hwfn *hwfn, int vf_id)
5033 struct qed_public_vf_info *vf_info;
5034 struct qed_vf_info *vf;
5038 vf_info = qed_iov_get_public_vf_info(hwfn, vf_id, true);
5039 vf = qed_iov_get_vf_info(hwfn, vf_id, true);
5041 if (!vf_info || !vf)
5044 /* Force MAC converted to generic MAC in case of VF trust on */
5045 if (vf_info->is_trusted_configured &&
5046 (vf->bulletin.p_virt->valid_bitmap & BIT(MAC_ADDR_FORCED))) {
5047 force_mac = qed_iov_bulletin_get_forced_mac(hwfn, vf_id);
5050 /* Clear existing shadow copy of MAC to have a clean
5053 for (i = 0; i < QED_ETH_VF_NUM_MAC_FILTERS; i++) {
5054 if (ether_addr_equal(vf->shadow_config.macs[i],
5056 memset(vf->shadow_config.macs[i], 0,
5058 DP_VERBOSE(hwfn, QED_MSG_IOV,
5059 "Shadow MAC %pM removed for VF 0x%02x, VF trust mode is ON\n",
5060 vf_info->mac, vf_id);
5065 ether_addr_copy(vf_info->mac, force_mac);
5066 memset(vf_info->forced_mac, 0, ETH_ALEN);
5067 vf->bulletin.p_virt->valid_bitmap &=
5068 ~BIT(MAC_ADDR_FORCED);
5069 qed_schedule_iov(hwfn, QED_IOV_WQ_BULLETIN_UPDATE_FLAG);
5073 /* Update shadow copy with VF MAC when trust mode is turned off */
5074 if (!vf_info->is_trusted_configured) {
5075 u8 empty_mac[ETH_ALEN];
5077 memset(empty_mac, 0, ETH_ALEN);
5078 for (i = 0; i < QED_ETH_VF_NUM_MAC_FILTERS; i++) {
5079 if (ether_addr_equal(vf->shadow_config.macs[i],
5081 ether_addr_copy(vf->shadow_config.macs[i],
5083 DP_VERBOSE(hwfn, QED_MSG_IOV,
5084 "Shadow is updated with %pM for VF 0x%02x, VF trust mode is OFF\n",
5085 vf_info->mac, vf_id);
5089 /* Clear bulletin when trust mode is turned off,
5090 * to have a clean slate for next (normal) operations.
5092 qed_iov_bulletin_set_mac(hwfn, empty_mac, vf_id);
5093 qed_schedule_iov(hwfn, QED_IOV_WQ_BULLETIN_UPDATE_FLAG);
5097 static void qed_iov_handle_trust_change(struct qed_hwfn *hwfn)
5099 struct qed_sp_vport_update_params params;
5100 struct qed_filter_accept_flags *flags;
5101 struct qed_public_vf_info *vf_info;
5102 struct qed_vf_info *vf;
5106 mask = QED_ACCEPT_UCAST_UNMATCHED | QED_ACCEPT_MCAST_UNMATCHED;
5107 flags = ¶ms.accept_flags;
5109 qed_for_each_vf(hwfn, i) {
5110 /* Need to make sure current requested configuration didn't
5111 * flip so that we'll end up configuring something that's not
5114 vf_info = qed_iov_get_public_vf_info(hwfn, i, true);
5115 if (vf_info->is_trusted_configured ==
5116 vf_info->is_trusted_request)
5118 vf_info->is_trusted_configured = vf_info->is_trusted_request;
5120 /* Handle forced MAC mode */
5121 qed_update_mac_for_vf_trust_change(hwfn, i);
5123 /* Validate that the VF has a configured vport */
5124 vf = qed_iov_get_vf_info(hwfn, i, true);
5125 if (!vf->vport_instance)
5128 memset(¶ms, 0, sizeof(params));
5129 params.opaque_fid = vf->opaque_fid;
5130 params.vport_id = vf->vport_id;
5132 if (vf_info->rx_accept_mode & mask) {
5133 flags->update_rx_mode_config = 1;
5134 flags->rx_accept_filter = vf_info->rx_accept_mode;
5137 if (vf_info->tx_accept_mode & mask) {
5138 flags->update_tx_mode_config = 1;
5139 flags->tx_accept_filter = vf_info->tx_accept_mode;
5142 /* Remove if needed; Otherwise this would set the mask */
5143 if (!vf_info->is_trusted_configured) {
5144 flags->rx_accept_filter &= ~mask;
5145 flags->tx_accept_filter &= ~mask;
5148 if (flags->update_rx_mode_config ||
5149 flags->update_tx_mode_config)
5150 qed_sp_vport_update(hwfn, ¶ms,
5151 QED_SPQ_MODE_EBLOCK, NULL);
5155 static void qed_iov_pf_task(struct work_struct *work)
5158 struct qed_hwfn *hwfn = container_of(work, struct qed_hwfn,
5162 if (test_and_clear_bit(QED_IOV_WQ_STOP_WQ_FLAG, &hwfn->iov_task_flags))
5165 if (test_and_clear_bit(QED_IOV_WQ_FLR_FLAG, &hwfn->iov_task_flags)) {
5166 struct qed_ptt *ptt = qed_ptt_acquire(hwfn);
5169 qed_schedule_iov(hwfn, QED_IOV_WQ_FLR_FLAG);
5173 rc = qed_iov_vf_flr_cleanup(hwfn, ptt);
5175 qed_schedule_iov(hwfn, QED_IOV_WQ_FLR_FLAG);
5177 qed_ptt_release(hwfn, ptt);
5180 if (test_and_clear_bit(QED_IOV_WQ_MSG_FLAG, &hwfn->iov_task_flags))
5181 qed_handle_vf_msg(hwfn);
5183 if (test_and_clear_bit(QED_IOV_WQ_SET_UNICAST_FILTER_FLAG,
5184 &hwfn->iov_task_flags))
5185 qed_handle_pf_set_vf_unicast(hwfn);
5187 if (test_and_clear_bit(QED_IOV_WQ_BULLETIN_UPDATE_FLAG,
5188 &hwfn->iov_task_flags))
5189 qed_handle_bulletin_post(hwfn);
5191 if (test_and_clear_bit(QED_IOV_WQ_TRUST_FLAG, &hwfn->iov_task_flags))
5192 qed_iov_handle_trust_change(hwfn);
5195 void qed_iov_wq_stop(struct qed_dev *cdev, bool schedule_first)
5199 for_each_hwfn(cdev, i) {
5200 if (!cdev->hwfns[i].iov_wq)
5203 if (schedule_first) {
5204 qed_schedule_iov(&cdev->hwfns[i],
5205 QED_IOV_WQ_STOP_WQ_FLAG);
5206 cancel_delayed_work_sync(&cdev->hwfns[i].iov_task);
5209 flush_workqueue(cdev->hwfns[i].iov_wq);
5210 destroy_workqueue(cdev->hwfns[i].iov_wq);
5214 int qed_iov_wq_start(struct qed_dev *cdev)
5216 char name[NAME_SIZE];
5219 for_each_hwfn(cdev, i) {
5220 struct qed_hwfn *p_hwfn = &cdev->hwfns[i];
5222 /* PFs needs a dedicated workqueue only if they support IOV.
5223 * VFs always require one.
5225 if (IS_PF(p_hwfn->cdev) && !IS_PF_SRIOV(p_hwfn))
5228 snprintf(name, NAME_SIZE, "iov-%02x:%02x.%02x",
5229 cdev->pdev->bus->number,
5230 PCI_SLOT(cdev->pdev->devfn), p_hwfn->abs_pf_id);
5232 p_hwfn->iov_wq = create_singlethread_workqueue(name);
5233 if (!p_hwfn->iov_wq) {
5234 DP_NOTICE(p_hwfn, "Cannot create iov workqueue\n");
5239 INIT_DELAYED_WORK(&p_hwfn->iov_task, qed_iov_pf_task);
5241 INIT_DELAYED_WORK(&p_hwfn->iov_task, qed_iov_vf_task);
5247 const struct qed_iov_hv_ops qed_iov_ops_pass = {
5248 .configure = &qed_sriov_configure,
5249 .set_mac = &qed_sriov_pf_set_mac,
5250 .set_vlan = &qed_sriov_pf_set_vlan,
5251 .get_config = &qed_get_vf_config,
5252 .set_link_state = &qed_set_vf_link_state,
5253 .set_spoof = &qed_spoof_configure,
5254 .set_rate = &qed_set_vf_rate,
5255 .set_trust = &qed_set_vf_trust,