Loading...
1// SPDX-License-Identifier: GPL-2.0
2/* Copyright (c) 2020, Intel Corporation. */
3
4#include "ice.h"
5#include "ice_lib.h"
6#include "ice_devlink.h"
7#include "ice_fw_update.h"
8
9static int ice_info_get_dsn(struct ice_pf *pf, char *buf, size_t len)
10{
11 u8 dsn[8];
12
13 /* Copy the DSN into an array in Big Endian format */
14 put_unaligned_be64(pci_get_dsn(pf->pdev), dsn);
15
16 snprintf(buf, len, "%02x-%02x-%02x-%02x-%02x-%02x-%02x-%02x",
17 dsn[0], dsn[1], dsn[2], dsn[3],
18 dsn[4], dsn[5], dsn[6], dsn[7]);
19
20 return 0;
21}
22
23static int ice_info_pba(struct ice_pf *pf, char *buf, size_t len)
24{
25 struct ice_hw *hw = &pf->hw;
26 enum ice_status status;
27
28 status = ice_read_pba_string(hw, (u8 *)buf, len);
29 if (status)
30 return -EIO;
31
32 return 0;
33}
34
35static int ice_info_fw_mgmt(struct ice_pf *pf, char *buf, size_t len)
36{
37 struct ice_hw *hw = &pf->hw;
38
39 snprintf(buf, len, "%u.%u.%u", hw->fw_maj_ver, hw->fw_min_ver,
40 hw->fw_patch);
41
42 return 0;
43}
44
45static int ice_info_fw_api(struct ice_pf *pf, char *buf, size_t len)
46{
47 struct ice_hw *hw = &pf->hw;
48
49 snprintf(buf, len, "%u.%u", hw->api_maj_ver, hw->api_min_ver);
50
51 return 0;
52}
53
54static int ice_info_fw_build(struct ice_pf *pf, char *buf, size_t len)
55{
56 struct ice_hw *hw = &pf->hw;
57
58 snprintf(buf, len, "0x%08x", hw->fw_build);
59
60 return 0;
61}
62
63static int ice_info_orom_ver(struct ice_pf *pf, char *buf, size_t len)
64{
65 struct ice_orom_info *orom = &pf->hw.nvm.orom;
66
67 snprintf(buf, len, "%u.%u.%u", orom->major, orom->build, orom->patch);
68
69 return 0;
70}
71
72static int ice_info_nvm_ver(struct ice_pf *pf, char *buf, size_t len)
73{
74 struct ice_nvm_info *nvm = &pf->hw.nvm;
75
76 snprintf(buf, len, "%x.%02x", nvm->major_ver, nvm->minor_ver);
77
78 return 0;
79}
80
81static int ice_info_eetrack(struct ice_pf *pf, char *buf, size_t len)
82{
83 struct ice_nvm_info *nvm = &pf->hw.nvm;
84
85 snprintf(buf, len, "0x%08x", nvm->eetrack);
86
87 return 0;
88}
89
90static int ice_info_ddp_pkg_name(struct ice_pf *pf, char *buf, size_t len)
91{
92 struct ice_hw *hw = &pf->hw;
93
94 snprintf(buf, len, "%s", hw->active_pkg_name);
95
96 return 0;
97}
98
99static int ice_info_ddp_pkg_version(struct ice_pf *pf, char *buf, size_t len)
100{
101 struct ice_pkg_ver *pkg = &pf->hw.active_pkg_ver;
102
103 snprintf(buf, len, "%u.%u.%u.%u", pkg->major, pkg->minor, pkg->update,
104 pkg->draft);
105
106 return 0;
107}
108
109static int ice_info_netlist_ver(struct ice_pf *pf, char *buf, size_t len)
110{
111 struct ice_netlist_ver_info *netlist = &pf->hw.netlist_ver;
112
113 /* The netlist version fields are BCD formatted */
114 snprintf(buf, len, "%x.%x.%x-%x.%x.%x", netlist->major, netlist->minor,
115 netlist->type >> 16, netlist->type & 0xFFFF, netlist->rev,
116 netlist->cust_ver);
117
118 return 0;
119}
120
121static int ice_info_netlist_build(struct ice_pf *pf, char *buf, size_t len)
122{
123 struct ice_netlist_ver_info *netlist = &pf->hw.netlist_ver;
124
125 snprintf(buf, len, "0x%08x", netlist->hash);
126
127 return 0;
128}
129
130#define fixed(key, getter) { ICE_VERSION_FIXED, key, getter }
131#define running(key, getter) { ICE_VERSION_RUNNING, key, getter }
132
133enum ice_version_type {
134 ICE_VERSION_FIXED,
135 ICE_VERSION_RUNNING,
136 ICE_VERSION_STORED,
137};
138
139static const struct ice_devlink_version {
140 enum ice_version_type type;
141 const char *key;
142 int (*getter)(struct ice_pf *pf, char *buf, size_t len);
143} ice_devlink_versions[] = {
144 fixed(DEVLINK_INFO_VERSION_GENERIC_BOARD_ID, ice_info_pba),
145 running(DEVLINK_INFO_VERSION_GENERIC_FW_MGMT, ice_info_fw_mgmt),
146 running("fw.mgmt.api", ice_info_fw_api),
147 running("fw.mgmt.build", ice_info_fw_build),
148 running(DEVLINK_INFO_VERSION_GENERIC_FW_UNDI, ice_info_orom_ver),
149 running("fw.psid.api", ice_info_nvm_ver),
150 running(DEVLINK_INFO_VERSION_GENERIC_FW_BUNDLE_ID, ice_info_eetrack),
151 running("fw.app.name", ice_info_ddp_pkg_name),
152 running(DEVLINK_INFO_VERSION_GENERIC_FW_APP, ice_info_ddp_pkg_version),
153 running("fw.netlist", ice_info_netlist_ver),
154 running("fw.netlist.build", ice_info_netlist_build),
155};
156
157/**
158 * ice_devlink_info_get - .info_get devlink handler
159 * @devlink: devlink instance structure
160 * @req: the devlink info request
161 * @extack: extended netdev ack structure
162 *
163 * Callback for the devlink .info_get operation. Reports information about the
164 * device.
165 *
166 * Return: zero on success or an error code on failure.
167 */
168static int ice_devlink_info_get(struct devlink *devlink,
169 struct devlink_info_req *req,
170 struct netlink_ext_ack *extack)
171{
172 struct ice_pf *pf = devlink_priv(devlink);
173 char buf[100];
174 size_t i;
175 int err;
176
177 err = devlink_info_driver_name_put(req, KBUILD_MODNAME);
178 if (err) {
179 NL_SET_ERR_MSG_MOD(extack, "Unable to set driver name");
180 return err;
181 }
182
183 err = ice_info_get_dsn(pf, buf, sizeof(buf));
184 if (err) {
185 NL_SET_ERR_MSG_MOD(extack, "Unable to obtain serial number");
186 return err;
187 }
188
189 err = devlink_info_serial_number_put(req, buf);
190 if (err) {
191 NL_SET_ERR_MSG_MOD(extack, "Unable to set serial number");
192 return err;
193 }
194
195 for (i = 0; i < ARRAY_SIZE(ice_devlink_versions); i++) {
196 enum ice_version_type type = ice_devlink_versions[i].type;
197 const char *key = ice_devlink_versions[i].key;
198
199 err = ice_devlink_versions[i].getter(pf, buf, sizeof(buf));
200 if (err) {
201 NL_SET_ERR_MSG_MOD(extack, "Unable to obtain version info");
202 return err;
203 }
204
205 switch (type) {
206 case ICE_VERSION_FIXED:
207 err = devlink_info_version_fixed_put(req, key, buf);
208 if (err) {
209 NL_SET_ERR_MSG_MOD(extack, "Unable to set fixed version");
210 return err;
211 }
212 break;
213 case ICE_VERSION_RUNNING:
214 err = devlink_info_version_running_put(req, key, buf);
215 if (err) {
216 NL_SET_ERR_MSG_MOD(extack, "Unable to set running version");
217 return err;
218 }
219 break;
220 case ICE_VERSION_STORED:
221 err = devlink_info_version_stored_put(req, key, buf);
222 if (err) {
223 NL_SET_ERR_MSG_MOD(extack, "Unable to set stored version");
224 return err;
225 }
226 break;
227 }
228 }
229
230 return 0;
231}
232
233/**
234 * ice_devlink_flash_update - Update firmware stored in flash on the device
235 * @devlink: pointer to devlink associated with device to update
236 * @path: the path of the firmware file to use via request_firmware
237 * @component: name of the component to update, or NULL
238 * @extack: netlink extended ACK structure
239 *
240 * Perform a device flash update. The bulk of the update logic is contained
241 * within the ice_flash_pldm_image function.
242 *
243 * Returns: zero on success, or an error code on failure.
244 */
245static int
246ice_devlink_flash_update(struct devlink *devlink, const char *path,
247 const char *component, struct netlink_ext_ack *extack)
248{
249 struct ice_pf *pf = devlink_priv(devlink);
250 struct device *dev = &pf->pdev->dev;
251 struct ice_hw *hw = &pf->hw;
252 const struct firmware *fw;
253 int err;
254
255 /* individual component update is not yet supported */
256 if (component)
257 return -EOPNOTSUPP;
258
259 if (!hw->dev_caps.common_cap.nvm_unified_update) {
260 NL_SET_ERR_MSG_MOD(extack, "Current firmware does not support unified update");
261 return -EOPNOTSUPP;
262 }
263
264 err = ice_check_for_pending_update(pf, component, extack);
265 if (err)
266 return err;
267
268 err = request_firmware(&fw, path, dev);
269 if (err) {
270 NL_SET_ERR_MSG_MOD(extack, "Unable to read file from disk");
271 return err;
272 }
273
274 devlink_flash_update_begin_notify(devlink);
275 devlink_flash_update_status_notify(devlink, "Preparing to flash",
276 component, 0, 0);
277 err = ice_flash_pldm_image(pf, fw, extack);
278 devlink_flash_update_end_notify(devlink);
279
280 release_firmware(fw);
281
282 return err;
283}
284
285static const struct devlink_ops ice_devlink_ops = {
286 .info_get = ice_devlink_info_get,
287 .flash_update = ice_devlink_flash_update,
288};
289
290static void ice_devlink_free(void *devlink_ptr)
291{
292 devlink_free((struct devlink *)devlink_ptr);
293}
294
295/**
296 * ice_allocate_pf - Allocate devlink and return PF structure pointer
297 * @dev: the device to allocate for
298 *
299 * Allocate a devlink instance for this device and return the private area as
300 * the PF structure. The devlink memory is kept track of through devres by
301 * adding an action to remove it when unwinding.
302 */
303struct ice_pf *ice_allocate_pf(struct device *dev)
304{
305 struct devlink *devlink;
306
307 devlink = devlink_alloc(&ice_devlink_ops, sizeof(struct ice_pf));
308 if (!devlink)
309 return NULL;
310
311 /* Add an action to teardown the devlink when unwinding the driver */
312 if (devm_add_action(dev, ice_devlink_free, devlink)) {
313 devlink_free(devlink);
314 return NULL;
315 }
316
317 return devlink_priv(devlink);
318}
319
320/**
321 * ice_devlink_register - Register devlink interface for this PF
322 * @pf: the PF to register the devlink for.
323 *
324 * Register the devlink instance associated with this physical function.
325 *
326 * Return: zero on success or an error code on failure.
327 */
328int ice_devlink_register(struct ice_pf *pf)
329{
330 struct devlink *devlink = priv_to_devlink(pf);
331 struct device *dev = ice_pf_to_dev(pf);
332 int err;
333
334 err = devlink_register(devlink, dev);
335 if (err) {
336 dev_err(dev, "devlink registration failed: %d\n", err);
337 return err;
338 }
339
340 return 0;
341}
342
343/**
344 * ice_devlink_unregister - Unregister devlink resources for this PF.
345 * @pf: the PF structure to cleanup
346 *
347 * Releases resources used by devlink and cleans up associated memory.
348 */
349void ice_devlink_unregister(struct ice_pf *pf)
350{
351 devlink_unregister(priv_to_devlink(pf));
352}
353
354/**
355 * ice_devlink_create_port - Create a devlink port for this PF
356 * @pf: the PF to create a port for
357 *
358 * Create and register a devlink_port for this PF. Note that although each
359 * physical function is connected to a separate devlink instance, the port
360 * will still be numbered according to the physical function ID.
361 *
362 * Return: zero on success or an error code on failure.
363 */
364int ice_devlink_create_port(struct ice_pf *pf)
365{
366 struct devlink *devlink = priv_to_devlink(pf);
367 struct ice_vsi *vsi = ice_get_main_vsi(pf);
368 struct device *dev = ice_pf_to_dev(pf);
369 struct devlink_port_attrs attrs = {};
370 int err;
371
372 if (!vsi) {
373 dev_err(dev, "%s: unable to find main VSI\n", __func__);
374 return -EIO;
375 }
376
377 attrs.flavour = DEVLINK_PORT_FLAVOUR_PHYSICAL;
378 attrs.phys.port_number = pf->hw.pf_id;
379 devlink_port_attrs_set(&pf->devlink_port, &attrs);
380 err = devlink_port_register(devlink, &pf->devlink_port, pf->hw.pf_id);
381 if (err) {
382 dev_err(dev, "devlink_port_register failed: %d\n", err);
383 return err;
384 }
385
386 return 0;
387}
388
389/**
390 * ice_devlink_destroy_port - Destroy the devlink_port for this PF
391 * @pf: the PF to cleanup
392 *
393 * Unregisters the devlink_port structure associated with this PF.
394 */
395void ice_devlink_destroy_port(struct ice_pf *pf)
396{
397 devlink_port_type_clear(&pf->devlink_port);
398 devlink_port_unregister(&pf->devlink_port);
399}
400
401/**
402 * ice_devlink_nvm_snapshot - Capture a snapshot of the Shadow RAM contents
403 * @devlink: the devlink instance
404 * @extack: extended ACK response structure
405 * @data: on exit points to snapshot data buffer
406 *
407 * This function is called in response to the DEVLINK_CMD_REGION_TRIGGER for
408 * the shadow-ram devlink region. It captures a snapshot of the shadow ram
409 * contents. This snapshot can later be viewed via the devlink-region
410 * interface.
411 *
412 * @returns zero on success, and updates the data pointer. Returns a non-zero
413 * error code on failure.
414 */
415static int ice_devlink_nvm_snapshot(struct devlink *devlink,
416 struct netlink_ext_ack *extack, u8 **data)
417{
418 struct ice_pf *pf = devlink_priv(devlink);
419 struct device *dev = ice_pf_to_dev(pf);
420 struct ice_hw *hw = &pf->hw;
421 enum ice_status status;
422 void *nvm_data;
423 u32 nvm_size;
424
425 nvm_size = hw->nvm.flash_size;
426 nvm_data = vzalloc(nvm_size);
427 if (!nvm_data)
428 return -ENOMEM;
429
430 status = ice_acquire_nvm(hw, ICE_RES_READ);
431 if (status) {
432 dev_dbg(dev, "ice_acquire_nvm failed, err %d aq_err %d\n",
433 status, hw->adminq.sq_last_status);
434 NL_SET_ERR_MSG_MOD(extack, "Failed to acquire NVM semaphore");
435 vfree(nvm_data);
436 return -EIO;
437 }
438
439 status = ice_read_flat_nvm(hw, 0, &nvm_size, nvm_data, false);
440 if (status) {
441 dev_dbg(dev, "ice_read_flat_nvm failed after reading %u bytes, err %d aq_err %d\n",
442 nvm_size, status, hw->adminq.sq_last_status);
443 NL_SET_ERR_MSG_MOD(extack, "Failed to read NVM contents");
444 ice_release_nvm(hw);
445 vfree(nvm_data);
446 return -EIO;
447 }
448
449 ice_release_nvm(hw);
450
451 *data = nvm_data;
452
453 return 0;
454}
455
456/**
457 * ice_devlink_devcaps_snapshot - Capture snapshot of device capabilities
458 * @devlink: the devlink instance
459 * @extack: extended ACK response structure
460 * @data: on exit points to snapshot data buffer
461 *
462 * This function is called in response to the DEVLINK_CMD_REGION_TRIGGER for
463 * the device-caps devlink region. It captures a snapshot of the device
464 * capabilities reported by firmware.
465 *
466 * @returns zero on success, and updates the data pointer. Returns a non-zero
467 * error code on failure.
468 */
469static int
470ice_devlink_devcaps_snapshot(struct devlink *devlink,
471 struct netlink_ext_ack *extack, u8 **data)
472{
473 struct ice_pf *pf = devlink_priv(devlink);
474 struct device *dev = ice_pf_to_dev(pf);
475 struct ice_hw *hw = &pf->hw;
476 enum ice_status status;
477 void *devcaps;
478
479 devcaps = vzalloc(ICE_AQ_MAX_BUF_LEN);
480 if (!devcaps)
481 return -ENOMEM;
482
483 status = ice_aq_list_caps(hw, devcaps, ICE_AQ_MAX_BUF_LEN, NULL,
484 ice_aqc_opc_list_dev_caps, NULL);
485 if (status) {
486 dev_dbg(dev, "ice_aq_list_caps: failed to read device capabilities, err %d aq_err %d\n",
487 status, hw->adminq.sq_last_status);
488 NL_SET_ERR_MSG_MOD(extack, "Failed to read device capabilities");
489 vfree(devcaps);
490 return -EIO;
491 }
492
493 *data = (u8 *)devcaps;
494
495 return 0;
496}
497
498static const struct devlink_region_ops ice_nvm_region_ops = {
499 .name = "nvm-flash",
500 .destructor = vfree,
501 .snapshot = ice_devlink_nvm_snapshot,
502};
503
504static const struct devlink_region_ops ice_devcaps_region_ops = {
505 .name = "device-caps",
506 .destructor = vfree,
507 .snapshot = ice_devlink_devcaps_snapshot,
508};
509
510/**
511 * ice_devlink_init_regions - Initialize devlink regions
512 * @pf: the PF device structure
513 *
514 * Create devlink regions used to enable access to dump the contents of the
515 * flash memory on the device.
516 */
517void ice_devlink_init_regions(struct ice_pf *pf)
518{
519 struct devlink *devlink = priv_to_devlink(pf);
520 struct device *dev = ice_pf_to_dev(pf);
521 u64 nvm_size;
522
523 nvm_size = pf->hw.nvm.flash_size;
524 pf->nvm_region = devlink_region_create(devlink, &ice_nvm_region_ops, 1,
525 nvm_size);
526 if (IS_ERR(pf->nvm_region)) {
527 dev_err(dev, "failed to create NVM devlink region, err %ld\n",
528 PTR_ERR(pf->nvm_region));
529 pf->nvm_region = NULL;
530 }
531
532 pf->devcaps_region = devlink_region_create(devlink,
533 &ice_devcaps_region_ops, 10,
534 ICE_AQ_MAX_BUF_LEN);
535 if (IS_ERR(pf->devcaps_region)) {
536 dev_err(dev, "failed to create device-caps devlink region, err %ld\n",
537 PTR_ERR(pf->devcaps_region));
538 pf->devcaps_region = NULL;
539 }
540}
541
542/**
543 * ice_devlink_destroy_regions - Destroy devlink regions
544 * @pf: the PF device structure
545 *
546 * Remove previously created regions for this PF.
547 */
548void ice_devlink_destroy_regions(struct ice_pf *pf)
549{
550 if (pf->nvm_region)
551 devlink_region_destroy(pf->nvm_region);
552 if (pf->devcaps_region)
553 devlink_region_destroy(pf->devcaps_region);
554}
1// SPDX-License-Identifier: GPL-2.0
2/* Copyright (c) 2020, Intel Corporation. */
3
4#include "ice.h"
5#include "ice_lib.h"
6#include "ice_devlink.h"
7#include "ice_fw_update.h"
8
9/* context for devlink info version reporting */
10struct ice_info_ctx {
11 char buf[128];
12 struct ice_orom_info pending_orom;
13 struct ice_nvm_info pending_nvm;
14 struct ice_netlist_info pending_netlist;
15 struct ice_hw_dev_caps dev_caps;
16};
17
18/* The following functions are used to format specific strings for various
19 * devlink info versions. The ctx parameter is used to provide the storage
20 * buffer, as well as any ancillary information calculated when the info
21 * request was made.
22 *
23 * If a version does not exist, for example when attempting to get the
24 * inactive version of flash when there is no pending update, the function
25 * should leave the buffer in the ctx structure empty and return 0.
26 */
27
28static void ice_info_get_dsn(struct ice_pf *pf, struct ice_info_ctx *ctx)
29{
30 u8 dsn[8];
31
32 /* Copy the DSN into an array in Big Endian format */
33 put_unaligned_be64(pci_get_dsn(pf->pdev), dsn);
34
35 snprintf(ctx->buf, sizeof(ctx->buf), "%8phD", dsn);
36}
37
38static int ice_info_pba(struct ice_pf *pf, struct ice_info_ctx *ctx)
39{
40 struct ice_hw *hw = &pf->hw;
41 enum ice_status status;
42
43 status = ice_read_pba_string(hw, (u8 *)ctx->buf, sizeof(ctx->buf));
44 if (status)
45 /* We failed to locate the PBA, so just skip this entry */
46 dev_dbg(ice_pf_to_dev(pf), "Failed to read Product Board Assembly string, status %s\n",
47 ice_stat_str(status));
48
49 return 0;
50}
51
52static int ice_info_fw_mgmt(struct ice_pf *pf, struct ice_info_ctx *ctx)
53{
54 struct ice_hw *hw = &pf->hw;
55
56 snprintf(ctx->buf, sizeof(ctx->buf), "%u.%u.%u", hw->fw_maj_ver, hw->fw_min_ver,
57 hw->fw_patch);
58
59 return 0;
60}
61
62static int ice_info_fw_api(struct ice_pf *pf, struct ice_info_ctx *ctx)
63{
64 struct ice_hw *hw = &pf->hw;
65
66 snprintf(ctx->buf, sizeof(ctx->buf), "%u.%u.%u", hw->api_maj_ver,
67 hw->api_min_ver, hw->api_patch);
68
69 return 0;
70}
71
72static int ice_info_fw_build(struct ice_pf *pf, struct ice_info_ctx *ctx)
73{
74 struct ice_hw *hw = &pf->hw;
75
76 snprintf(ctx->buf, sizeof(ctx->buf), "0x%08x", hw->fw_build);
77
78 return 0;
79}
80
81static int ice_info_orom_ver(struct ice_pf *pf, struct ice_info_ctx *ctx)
82{
83 struct ice_orom_info *orom = &pf->hw.flash.orom;
84
85 snprintf(ctx->buf, sizeof(ctx->buf), "%u.%u.%u", orom->major, orom->build, orom->patch);
86
87 return 0;
88}
89
90static int
91ice_info_pending_orom_ver(struct ice_pf __always_unused *pf, struct ice_info_ctx *ctx)
92{
93 struct ice_orom_info *orom = &ctx->pending_orom;
94
95 if (ctx->dev_caps.common_cap.nvm_update_pending_orom)
96 snprintf(ctx->buf, sizeof(ctx->buf), "%u.%u.%u",
97 orom->major, orom->build, orom->patch);
98
99 return 0;
100}
101
102static int ice_info_nvm_ver(struct ice_pf *pf, struct ice_info_ctx *ctx)
103{
104 struct ice_nvm_info *nvm = &pf->hw.flash.nvm;
105
106 snprintf(ctx->buf, sizeof(ctx->buf), "%x.%02x", nvm->major, nvm->minor);
107
108 return 0;
109}
110
111static int
112ice_info_pending_nvm_ver(struct ice_pf __always_unused *pf, struct ice_info_ctx *ctx)
113{
114 struct ice_nvm_info *nvm = &ctx->pending_nvm;
115
116 if (ctx->dev_caps.common_cap.nvm_update_pending_nvm)
117 snprintf(ctx->buf, sizeof(ctx->buf), "%x.%02x", nvm->major, nvm->minor);
118
119 return 0;
120}
121
122static int ice_info_eetrack(struct ice_pf *pf, struct ice_info_ctx *ctx)
123{
124 struct ice_nvm_info *nvm = &pf->hw.flash.nvm;
125
126 snprintf(ctx->buf, sizeof(ctx->buf), "0x%08x", nvm->eetrack);
127
128 return 0;
129}
130
131static int
132ice_info_pending_eetrack(struct ice_pf __always_unused *pf, struct ice_info_ctx *ctx)
133{
134 struct ice_nvm_info *nvm = &ctx->pending_nvm;
135
136 if (ctx->dev_caps.common_cap.nvm_update_pending_nvm)
137 snprintf(ctx->buf, sizeof(ctx->buf), "0x%08x", nvm->eetrack);
138
139 return 0;
140}
141
142static int ice_info_ddp_pkg_name(struct ice_pf *pf, struct ice_info_ctx *ctx)
143{
144 struct ice_hw *hw = &pf->hw;
145
146 snprintf(ctx->buf, sizeof(ctx->buf), "%s", hw->active_pkg_name);
147
148 return 0;
149}
150
151static int ice_info_ddp_pkg_version(struct ice_pf *pf, struct ice_info_ctx *ctx)
152{
153 struct ice_pkg_ver *pkg = &pf->hw.active_pkg_ver;
154
155 snprintf(ctx->buf, sizeof(ctx->buf), "%u.%u.%u.%u", pkg->major, pkg->minor, pkg->update,
156 pkg->draft);
157
158 return 0;
159}
160
161static int ice_info_ddp_pkg_bundle_id(struct ice_pf *pf, struct ice_info_ctx *ctx)
162{
163 snprintf(ctx->buf, sizeof(ctx->buf), "0x%08x", pf->hw.active_track_id);
164
165 return 0;
166}
167
168static int ice_info_netlist_ver(struct ice_pf *pf, struct ice_info_ctx *ctx)
169{
170 struct ice_netlist_info *netlist = &pf->hw.flash.netlist;
171
172 /* The netlist version fields are BCD formatted */
173 snprintf(ctx->buf, sizeof(ctx->buf), "%x.%x.%x-%x.%x.%x", netlist->major, netlist->minor,
174 netlist->type >> 16, netlist->type & 0xFFFF, netlist->rev,
175 netlist->cust_ver);
176
177 return 0;
178}
179
180static int ice_info_netlist_build(struct ice_pf *pf, struct ice_info_ctx *ctx)
181{
182 struct ice_netlist_info *netlist = &pf->hw.flash.netlist;
183
184 snprintf(ctx->buf, sizeof(ctx->buf), "0x%08x", netlist->hash);
185
186 return 0;
187}
188
189static int
190ice_info_pending_netlist_ver(struct ice_pf __always_unused *pf, struct ice_info_ctx *ctx)
191{
192 struct ice_netlist_info *netlist = &ctx->pending_netlist;
193
194 /* The netlist version fields are BCD formatted */
195 if (ctx->dev_caps.common_cap.nvm_update_pending_netlist)
196 snprintf(ctx->buf, sizeof(ctx->buf), "%x.%x.%x-%x.%x.%x",
197 netlist->major, netlist->minor,
198 netlist->type >> 16, netlist->type & 0xFFFF, netlist->rev,
199 netlist->cust_ver);
200
201 return 0;
202}
203
204static int
205ice_info_pending_netlist_build(struct ice_pf __always_unused *pf, struct ice_info_ctx *ctx)
206{
207 struct ice_netlist_info *netlist = &ctx->pending_netlist;
208
209 if (ctx->dev_caps.common_cap.nvm_update_pending_netlist)
210 snprintf(ctx->buf, sizeof(ctx->buf), "0x%08x", netlist->hash);
211
212 return 0;
213}
214
215#define fixed(key, getter) { ICE_VERSION_FIXED, key, getter, NULL }
216#define running(key, getter) { ICE_VERSION_RUNNING, key, getter, NULL }
217#define stored(key, getter, fallback) { ICE_VERSION_STORED, key, getter, fallback }
218
219/* The combined() macro inserts both the running entry as well as a stored
220 * entry. The running entry will always report the version from the active
221 * handler. The stored entry will first try the pending handler, and fallback
222 * to the active handler if the pending function does not report a version.
223 * The pending handler should check the status of a pending update for the
224 * relevant flash component. It should only fill in the buffer in the case
225 * where a valid pending version is available. This ensures that the related
226 * stored and running versions remain in sync, and that stored versions are
227 * correctly reported as expected.
228 */
229#define combined(key, active, pending) \
230 running(key, active), \
231 stored(key, pending, active)
232
233enum ice_version_type {
234 ICE_VERSION_FIXED,
235 ICE_VERSION_RUNNING,
236 ICE_VERSION_STORED,
237};
238
239static const struct ice_devlink_version {
240 enum ice_version_type type;
241 const char *key;
242 int (*getter)(struct ice_pf *pf, struct ice_info_ctx *ctx);
243 int (*fallback)(struct ice_pf *pf, struct ice_info_ctx *ctx);
244} ice_devlink_versions[] = {
245 fixed(DEVLINK_INFO_VERSION_GENERIC_BOARD_ID, ice_info_pba),
246 running(DEVLINK_INFO_VERSION_GENERIC_FW_MGMT, ice_info_fw_mgmt),
247 running("fw.mgmt.api", ice_info_fw_api),
248 running("fw.mgmt.build", ice_info_fw_build),
249 combined(DEVLINK_INFO_VERSION_GENERIC_FW_UNDI, ice_info_orom_ver, ice_info_pending_orom_ver),
250 combined("fw.psid.api", ice_info_nvm_ver, ice_info_pending_nvm_ver),
251 combined(DEVLINK_INFO_VERSION_GENERIC_FW_BUNDLE_ID, ice_info_eetrack, ice_info_pending_eetrack),
252 running("fw.app.name", ice_info_ddp_pkg_name),
253 running(DEVLINK_INFO_VERSION_GENERIC_FW_APP, ice_info_ddp_pkg_version),
254 running("fw.app.bundle_id", ice_info_ddp_pkg_bundle_id),
255 combined("fw.netlist", ice_info_netlist_ver, ice_info_pending_netlist_ver),
256 combined("fw.netlist.build", ice_info_netlist_build, ice_info_pending_netlist_build),
257};
258
259/**
260 * ice_devlink_info_get - .info_get devlink handler
261 * @devlink: devlink instance structure
262 * @req: the devlink info request
263 * @extack: extended netdev ack structure
264 *
265 * Callback for the devlink .info_get operation. Reports information about the
266 * device.
267 *
268 * Return: zero on success or an error code on failure.
269 */
270static int ice_devlink_info_get(struct devlink *devlink,
271 struct devlink_info_req *req,
272 struct netlink_ext_ack *extack)
273{
274 struct ice_pf *pf = devlink_priv(devlink);
275 struct device *dev = ice_pf_to_dev(pf);
276 struct ice_hw *hw = &pf->hw;
277 struct ice_info_ctx *ctx;
278 enum ice_status status;
279 size_t i;
280 int err;
281
282 err = ice_wait_for_reset(pf, 10 * HZ);
283 if (err) {
284 NL_SET_ERR_MSG_MOD(extack, "Device is busy resetting");
285 return err;
286 }
287
288 ctx = kzalloc(sizeof(*ctx), GFP_KERNEL);
289 if (!ctx)
290 return -ENOMEM;
291
292 /* discover capabilities first */
293 status = ice_discover_dev_caps(hw, &ctx->dev_caps);
294 if (status) {
295 dev_dbg(dev, "Failed to discover device capabilities, status %s aq_err %s\n",
296 ice_stat_str(status), ice_aq_str(hw->adminq.sq_last_status));
297 NL_SET_ERR_MSG_MOD(extack, "Unable to discover device capabilities");
298 err = -EIO;
299 goto out_free_ctx;
300 }
301
302 if (ctx->dev_caps.common_cap.nvm_update_pending_orom) {
303 status = ice_get_inactive_orom_ver(hw, &ctx->pending_orom);
304 if (status) {
305 dev_dbg(dev, "Unable to read inactive Option ROM version data, status %s aq_err %s\n",
306 ice_stat_str(status), ice_aq_str(hw->adminq.sq_last_status));
307
308 /* disable display of pending Option ROM */
309 ctx->dev_caps.common_cap.nvm_update_pending_orom = false;
310 }
311 }
312
313 if (ctx->dev_caps.common_cap.nvm_update_pending_nvm) {
314 status = ice_get_inactive_nvm_ver(hw, &ctx->pending_nvm);
315 if (status) {
316 dev_dbg(dev, "Unable to read inactive NVM version data, status %s aq_err %s\n",
317 ice_stat_str(status), ice_aq_str(hw->adminq.sq_last_status));
318
319 /* disable display of pending Option ROM */
320 ctx->dev_caps.common_cap.nvm_update_pending_nvm = false;
321 }
322 }
323
324 if (ctx->dev_caps.common_cap.nvm_update_pending_netlist) {
325 status = ice_get_inactive_netlist_ver(hw, &ctx->pending_netlist);
326 if (status) {
327 dev_dbg(dev, "Unable to read inactive Netlist version data, status %s aq_err %s\n",
328 ice_stat_str(status), ice_aq_str(hw->adminq.sq_last_status));
329
330 /* disable display of pending Option ROM */
331 ctx->dev_caps.common_cap.nvm_update_pending_netlist = false;
332 }
333 }
334
335 err = devlink_info_driver_name_put(req, KBUILD_MODNAME);
336 if (err) {
337 NL_SET_ERR_MSG_MOD(extack, "Unable to set driver name");
338 goto out_free_ctx;
339 }
340
341 ice_info_get_dsn(pf, ctx);
342
343 err = devlink_info_serial_number_put(req, ctx->buf);
344 if (err) {
345 NL_SET_ERR_MSG_MOD(extack, "Unable to set serial number");
346 goto out_free_ctx;
347 }
348
349 for (i = 0; i < ARRAY_SIZE(ice_devlink_versions); i++) {
350 enum ice_version_type type = ice_devlink_versions[i].type;
351 const char *key = ice_devlink_versions[i].key;
352
353 memset(ctx->buf, 0, sizeof(ctx->buf));
354
355 err = ice_devlink_versions[i].getter(pf, ctx);
356 if (err) {
357 NL_SET_ERR_MSG_MOD(extack, "Unable to obtain version info");
358 goto out_free_ctx;
359 }
360
361 /* If the default getter doesn't report a version, use the
362 * fallback function. This is primarily useful in the case of
363 * "stored" versions that want to report the same value as the
364 * running version in the normal case of no pending update.
365 */
366 if (ctx->buf[0] == '\0' && ice_devlink_versions[i].fallback) {
367 err = ice_devlink_versions[i].fallback(pf, ctx);
368 if (err) {
369 NL_SET_ERR_MSG_MOD(extack, "Unable to obtain version info");
370 goto out_free_ctx;
371 }
372 }
373
374 /* Do not report missing versions */
375 if (ctx->buf[0] == '\0')
376 continue;
377
378 switch (type) {
379 case ICE_VERSION_FIXED:
380 err = devlink_info_version_fixed_put(req, key, ctx->buf);
381 if (err) {
382 NL_SET_ERR_MSG_MOD(extack, "Unable to set fixed version");
383 goto out_free_ctx;
384 }
385 break;
386 case ICE_VERSION_RUNNING:
387 err = devlink_info_version_running_put(req, key, ctx->buf);
388 if (err) {
389 NL_SET_ERR_MSG_MOD(extack, "Unable to set running version");
390 goto out_free_ctx;
391 }
392 break;
393 case ICE_VERSION_STORED:
394 err = devlink_info_version_stored_put(req, key, ctx->buf);
395 if (err) {
396 NL_SET_ERR_MSG_MOD(extack, "Unable to set stored version");
397 goto out_free_ctx;
398 }
399 break;
400 }
401 }
402
403out_free_ctx:
404 kfree(ctx);
405 return err;
406}
407
408/**
409 * ice_devlink_flash_update - Update firmware stored in flash on the device
410 * @devlink: pointer to devlink associated with device to update
411 * @params: flash update parameters
412 * @extack: netlink extended ACK structure
413 *
414 * Perform a device flash update. The bulk of the update logic is contained
415 * within the ice_flash_pldm_image function.
416 *
417 * Returns: zero on success, or an error code on failure.
418 */
419static int
420ice_devlink_flash_update(struct devlink *devlink,
421 struct devlink_flash_update_params *params,
422 struct netlink_ext_ack *extack)
423{
424 struct ice_pf *pf = devlink_priv(devlink);
425 struct ice_hw *hw = &pf->hw;
426 u8 preservation;
427 int err;
428
429 if (!params->overwrite_mask) {
430 /* preserve all settings and identifiers */
431 preservation = ICE_AQC_NVM_PRESERVE_ALL;
432 } else if (params->overwrite_mask == DEVLINK_FLASH_OVERWRITE_SETTINGS) {
433 /* overwrite settings, but preserve the vital device identifiers */
434 preservation = ICE_AQC_NVM_PRESERVE_SELECTED;
435 } else if (params->overwrite_mask == (DEVLINK_FLASH_OVERWRITE_SETTINGS |
436 DEVLINK_FLASH_OVERWRITE_IDENTIFIERS)) {
437 /* overwrite both settings and identifiers, preserve nothing */
438 preservation = ICE_AQC_NVM_NO_PRESERVATION;
439 } else {
440 NL_SET_ERR_MSG_MOD(extack, "Requested overwrite mask is not supported");
441 return -EOPNOTSUPP;
442 }
443
444 if (!hw->dev_caps.common_cap.nvm_unified_update) {
445 NL_SET_ERR_MSG_MOD(extack, "Current firmware does not support unified update");
446 return -EOPNOTSUPP;
447 }
448
449 err = ice_check_for_pending_update(pf, NULL, extack);
450 if (err)
451 return err;
452
453 devlink_flash_update_status_notify(devlink, "Preparing to flash", NULL, 0, 0);
454
455 return ice_flash_pldm_image(pf, params->fw, preservation, extack);
456}
457
458static const struct devlink_ops ice_devlink_ops = {
459 .supported_flash_update_params = DEVLINK_SUPPORT_FLASH_UPDATE_OVERWRITE_MASK,
460 .info_get = ice_devlink_info_get,
461 .flash_update = ice_devlink_flash_update,
462};
463
464static void ice_devlink_free(void *devlink_ptr)
465{
466 devlink_free((struct devlink *)devlink_ptr);
467}
468
469/**
470 * ice_allocate_pf - Allocate devlink and return PF structure pointer
471 * @dev: the device to allocate for
472 *
473 * Allocate a devlink instance for this device and return the private area as
474 * the PF structure. The devlink memory is kept track of through devres by
475 * adding an action to remove it when unwinding.
476 */
477struct ice_pf *ice_allocate_pf(struct device *dev)
478{
479 struct devlink *devlink;
480
481 devlink = devlink_alloc(&ice_devlink_ops, sizeof(struct ice_pf));
482 if (!devlink)
483 return NULL;
484
485 /* Add an action to teardown the devlink when unwinding the driver */
486 if (devm_add_action(dev, ice_devlink_free, devlink)) {
487 devlink_free(devlink);
488 return NULL;
489 }
490
491 return devlink_priv(devlink);
492}
493
494/**
495 * ice_devlink_register - Register devlink interface for this PF
496 * @pf: the PF to register the devlink for.
497 *
498 * Register the devlink instance associated with this physical function.
499 *
500 * Return: zero on success or an error code on failure.
501 */
502int ice_devlink_register(struct ice_pf *pf)
503{
504 struct devlink *devlink = priv_to_devlink(pf);
505 struct device *dev = ice_pf_to_dev(pf);
506 int err;
507
508 err = devlink_register(devlink, dev);
509 if (err) {
510 dev_err(dev, "devlink registration failed: %d\n", err);
511 return err;
512 }
513
514 return 0;
515}
516
517/**
518 * ice_devlink_unregister - Unregister devlink resources for this PF.
519 * @pf: the PF structure to cleanup
520 *
521 * Releases resources used by devlink and cleans up associated memory.
522 */
523void ice_devlink_unregister(struct ice_pf *pf)
524{
525 devlink_unregister(priv_to_devlink(pf));
526}
527
528/**
529 * ice_devlink_create_port - Create a devlink port for this VSI
530 * @vsi: the VSI to create a port for
531 *
532 * Create and register a devlink_port for this VSI.
533 *
534 * Return: zero on success or an error code on failure.
535 */
536int ice_devlink_create_port(struct ice_vsi *vsi)
537{
538 struct devlink_port_attrs attrs = {};
539 struct ice_port_info *pi;
540 struct devlink *devlink;
541 struct device *dev;
542 struct ice_pf *pf;
543 int err;
544
545 /* Currently we only create devlink_port instances for PF VSIs */
546 if (vsi->type != ICE_VSI_PF)
547 return -EINVAL;
548
549 pf = vsi->back;
550 devlink = priv_to_devlink(pf);
551 dev = ice_pf_to_dev(pf);
552 pi = pf->hw.port_info;
553
554 attrs.flavour = DEVLINK_PORT_FLAVOUR_PHYSICAL;
555 attrs.phys.port_number = pi->lport;
556 devlink_port_attrs_set(&vsi->devlink_port, &attrs);
557 err = devlink_port_register(devlink, &vsi->devlink_port, vsi->idx);
558 if (err) {
559 dev_err(dev, "devlink_port_register failed: %d\n", err);
560 return err;
561 }
562
563 vsi->devlink_port_registered = true;
564
565 return 0;
566}
567
568/**
569 * ice_devlink_destroy_port - Destroy the devlink_port for this VSI
570 * @vsi: the VSI to cleanup
571 *
572 * Unregisters the devlink_port structure associated with this VSI.
573 */
574void ice_devlink_destroy_port(struct ice_vsi *vsi)
575{
576 if (!vsi->devlink_port_registered)
577 return;
578
579 devlink_port_type_clear(&vsi->devlink_port);
580 devlink_port_unregister(&vsi->devlink_port);
581
582 vsi->devlink_port_registered = false;
583}
584
585/**
586 * ice_devlink_nvm_snapshot - Capture a snapshot of the Shadow RAM contents
587 * @devlink: the devlink instance
588 * @ops: the devlink region being snapshotted
589 * @extack: extended ACK response structure
590 * @data: on exit points to snapshot data buffer
591 *
592 * This function is called in response to the DEVLINK_CMD_REGION_TRIGGER for
593 * the shadow-ram devlink region. It captures a snapshot of the shadow ram
594 * contents. This snapshot can later be viewed via the devlink-region
595 * interface.
596 *
597 * @returns zero on success, and updates the data pointer. Returns a non-zero
598 * error code on failure.
599 */
600static int ice_devlink_nvm_snapshot(struct devlink *devlink,
601 const struct devlink_region_ops *ops,
602 struct netlink_ext_ack *extack, u8 **data)
603{
604 struct ice_pf *pf = devlink_priv(devlink);
605 struct device *dev = ice_pf_to_dev(pf);
606 struct ice_hw *hw = &pf->hw;
607 enum ice_status status;
608 void *nvm_data;
609 u32 nvm_size;
610
611 nvm_size = hw->flash.flash_size;
612 nvm_data = vzalloc(nvm_size);
613 if (!nvm_data)
614 return -ENOMEM;
615
616 status = ice_acquire_nvm(hw, ICE_RES_READ);
617 if (status) {
618 dev_dbg(dev, "ice_acquire_nvm failed, err %d aq_err %d\n",
619 status, hw->adminq.sq_last_status);
620 NL_SET_ERR_MSG_MOD(extack, "Failed to acquire NVM semaphore");
621 vfree(nvm_data);
622 return -EIO;
623 }
624
625 status = ice_read_flat_nvm(hw, 0, &nvm_size, nvm_data, false);
626 if (status) {
627 dev_dbg(dev, "ice_read_flat_nvm failed after reading %u bytes, err %d aq_err %d\n",
628 nvm_size, status, hw->adminq.sq_last_status);
629 NL_SET_ERR_MSG_MOD(extack, "Failed to read NVM contents");
630 ice_release_nvm(hw);
631 vfree(nvm_data);
632 return -EIO;
633 }
634
635 ice_release_nvm(hw);
636
637 *data = nvm_data;
638
639 return 0;
640}
641
642/**
643 * ice_devlink_devcaps_snapshot - Capture snapshot of device capabilities
644 * @devlink: the devlink instance
645 * @ops: the devlink region being snapshotted
646 * @extack: extended ACK response structure
647 * @data: on exit points to snapshot data buffer
648 *
649 * This function is called in response to the DEVLINK_CMD_REGION_TRIGGER for
650 * the device-caps devlink region. It captures a snapshot of the device
651 * capabilities reported by firmware.
652 *
653 * @returns zero on success, and updates the data pointer. Returns a non-zero
654 * error code on failure.
655 */
656static int
657ice_devlink_devcaps_snapshot(struct devlink *devlink,
658 const struct devlink_region_ops *ops,
659 struct netlink_ext_ack *extack, u8 **data)
660{
661 struct ice_pf *pf = devlink_priv(devlink);
662 struct device *dev = ice_pf_to_dev(pf);
663 struct ice_hw *hw = &pf->hw;
664 enum ice_status status;
665 void *devcaps;
666
667 devcaps = vzalloc(ICE_AQ_MAX_BUF_LEN);
668 if (!devcaps)
669 return -ENOMEM;
670
671 status = ice_aq_list_caps(hw, devcaps, ICE_AQ_MAX_BUF_LEN, NULL,
672 ice_aqc_opc_list_dev_caps, NULL);
673 if (status) {
674 dev_dbg(dev, "ice_aq_list_caps: failed to read device capabilities, err %d aq_err %d\n",
675 status, hw->adminq.sq_last_status);
676 NL_SET_ERR_MSG_MOD(extack, "Failed to read device capabilities");
677 vfree(devcaps);
678 return -EIO;
679 }
680
681 *data = (u8 *)devcaps;
682
683 return 0;
684}
685
686static const struct devlink_region_ops ice_nvm_region_ops = {
687 .name = "nvm-flash",
688 .destructor = vfree,
689 .snapshot = ice_devlink_nvm_snapshot,
690};
691
692static const struct devlink_region_ops ice_devcaps_region_ops = {
693 .name = "device-caps",
694 .destructor = vfree,
695 .snapshot = ice_devlink_devcaps_snapshot,
696};
697
698/**
699 * ice_devlink_init_regions - Initialize devlink regions
700 * @pf: the PF device structure
701 *
702 * Create devlink regions used to enable access to dump the contents of the
703 * flash memory on the device.
704 */
705void ice_devlink_init_regions(struct ice_pf *pf)
706{
707 struct devlink *devlink = priv_to_devlink(pf);
708 struct device *dev = ice_pf_to_dev(pf);
709 u64 nvm_size;
710
711 nvm_size = pf->hw.flash.flash_size;
712 pf->nvm_region = devlink_region_create(devlink, &ice_nvm_region_ops, 1,
713 nvm_size);
714 if (IS_ERR(pf->nvm_region)) {
715 dev_err(dev, "failed to create NVM devlink region, err %ld\n",
716 PTR_ERR(pf->nvm_region));
717 pf->nvm_region = NULL;
718 }
719
720 pf->devcaps_region = devlink_region_create(devlink,
721 &ice_devcaps_region_ops, 10,
722 ICE_AQ_MAX_BUF_LEN);
723 if (IS_ERR(pf->devcaps_region)) {
724 dev_err(dev, "failed to create device-caps devlink region, err %ld\n",
725 PTR_ERR(pf->devcaps_region));
726 pf->devcaps_region = NULL;
727 }
728}
729
730/**
731 * ice_devlink_destroy_regions - Destroy devlink regions
732 * @pf: the PF device structure
733 *
734 * Remove previously created regions for this PF.
735 */
736void ice_devlink_destroy_regions(struct ice_pf *pf)
737{
738 if (pf->nvm_region)
739 devlink_region_destroy(pf->nvm_region);
740 if (pf->devcaps_region)
741 devlink_region_destroy(pf->devcaps_region);
742}