Linux Audio

Check our new training course

Loading...
v5.9
  1// SPDX-License-Identifier: GPL-2.0
  2/* Copyright (c) 2020, Intel Corporation. */
  3
  4#include "ice.h"
  5#include "ice_lib.h"
  6#include "ice_devlink.h"
  7#include "ice_fw_update.h"
  8
  9static int ice_info_get_dsn(struct ice_pf *pf, char *buf, size_t len)
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 10{
 11	u8 dsn[8];
 12
 13	/* Copy the DSN into an array in Big Endian format */
 14	put_unaligned_be64(pci_get_dsn(pf->pdev), dsn);
 15
 16	snprintf(buf, len, "%02x-%02x-%02x-%02x-%02x-%02x-%02x-%02x",
 17		 dsn[0], dsn[1], dsn[2], dsn[3],
 18		 dsn[4], dsn[5], dsn[6], dsn[7]);
 19
 20	return 0;
 21}
 22
 23static int ice_info_pba(struct ice_pf *pf, char *buf, size_t len)
 24{
 25	struct ice_hw *hw = &pf->hw;
 26	enum ice_status status;
 27
 28	status = ice_read_pba_string(hw, (u8 *)buf, len);
 29	if (status)
 30		return -EIO;
 
 
 31
 32	return 0;
 33}
 34
 35static int ice_info_fw_mgmt(struct ice_pf *pf, char *buf, size_t len)
 36{
 37	struct ice_hw *hw = &pf->hw;
 38
 39	snprintf(buf, len, "%u.%u.%u", hw->fw_maj_ver, hw->fw_min_ver,
 40		 hw->fw_patch);
 41
 42	return 0;
 43}
 44
 45static int ice_info_fw_api(struct ice_pf *pf, char *buf, size_t len)
 46{
 47	struct ice_hw *hw = &pf->hw;
 48
 49	snprintf(buf, len, "%u.%u", hw->api_maj_ver, hw->api_min_ver);
 
 50
 51	return 0;
 52}
 53
 54static int ice_info_fw_build(struct ice_pf *pf, char *buf, size_t len)
 55{
 56	struct ice_hw *hw = &pf->hw;
 57
 58	snprintf(buf, len, "0x%08x", hw->fw_build);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 59
 60	return 0;
 61}
 62
 63static int ice_info_orom_ver(struct ice_pf *pf, char *buf, size_t len)
 
 64{
 65	struct ice_orom_info *orom = &pf->hw.nvm.orom;
 66
 67	snprintf(buf, len, "%u.%u.%u", orom->major, orom->build, orom->patch);
 
 68
 69	return 0;
 70}
 71
 72static int ice_info_nvm_ver(struct ice_pf *pf, char *buf, size_t len)
 73{
 74	struct ice_nvm_info *nvm = &pf->hw.nvm;
 75
 76	snprintf(buf, len, "%x.%02x", nvm->major_ver, nvm->minor_ver);
 77
 78	return 0;
 79}
 80
 81static int ice_info_eetrack(struct ice_pf *pf, char *buf, size_t len)
 
 82{
 83	struct ice_nvm_info *nvm = &pf->hw.nvm;
 84
 85	snprintf(buf, len, "0x%08x", nvm->eetrack);
 
 86
 87	return 0;
 88}
 89
 90static int ice_info_ddp_pkg_name(struct ice_pf *pf, char *buf, size_t len)
 91{
 92	struct ice_hw *hw = &pf->hw;
 93
 94	snprintf(buf, len, "%s", hw->active_pkg_name);
 95
 96	return 0;
 97}
 98
 99static int ice_info_ddp_pkg_version(struct ice_pf *pf, char *buf, size_t len)
100{
101	struct ice_pkg_ver *pkg = &pf->hw.active_pkg_ver;
102
103	snprintf(buf, len, "%u.%u.%u.%u", pkg->major, pkg->minor, pkg->update,
104		 pkg->draft);
105
106	return 0;
107}
108
109static int ice_info_netlist_ver(struct ice_pf *pf, char *buf, size_t len)
110{
111	struct ice_netlist_ver_info *netlist = &pf->hw.netlist_ver;
 
 
 
 
 
 
 
112
113	/* The netlist version fields are BCD formatted */
114	snprintf(buf, len, "%x.%x.%x-%x.%x.%x", netlist->major, netlist->minor,
115		 netlist->type >> 16, netlist->type & 0xFFFF, netlist->rev,
116		 netlist->cust_ver);
117
118	return 0;
119}
120
121static int ice_info_netlist_build(struct ice_pf *pf, char *buf, size_t len)
122{
123	struct ice_netlist_ver_info *netlist = &pf->hw.netlist_ver;
124
125	snprintf(buf, len, "0x%08x", netlist->hash);
126
127	return 0;
128}
129
130#define fixed(key, getter) { ICE_VERSION_FIXED, key, getter }
131#define running(key, getter) { ICE_VERSION_RUNNING, key, getter }
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
132
133enum ice_version_type {
134	ICE_VERSION_FIXED,
135	ICE_VERSION_RUNNING,
136	ICE_VERSION_STORED,
137};
138
139static const struct ice_devlink_version {
140	enum ice_version_type type;
141	const char *key;
142	int (*getter)(struct ice_pf *pf, char *buf, size_t len);
 
143} ice_devlink_versions[] = {
144	fixed(DEVLINK_INFO_VERSION_GENERIC_BOARD_ID, ice_info_pba),
145	running(DEVLINK_INFO_VERSION_GENERIC_FW_MGMT, ice_info_fw_mgmt),
146	running("fw.mgmt.api", ice_info_fw_api),
147	running("fw.mgmt.build", ice_info_fw_build),
148	running(DEVLINK_INFO_VERSION_GENERIC_FW_UNDI, ice_info_orom_ver),
149	running("fw.psid.api", ice_info_nvm_ver),
150	running(DEVLINK_INFO_VERSION_GENERIC_FW_BUNDLE_ID, ice_info_eetrack),
151	running("fw.app.name", ice_info_ddp_pkg_name),
152	running(DEVLINK_INFO_VERSION_GENERIC_FW_APP, ice_info_ddp_pkg_version),
153	running("fw.netlist", ice_info_netlist_ver),
154	running("fw.netlist.build", ice_info_netlist_build),
 
155};
156
157/**
158 * ice_devlink_info_get - .info_get devlink handler
159 * @devlink: devlink instance structure
160 * @req: the devlink info request
161 * @extack: extended netdev ack structure
162 *
163 * Callback for the devlink .info_get operation. Reports information about the
164 * device.
165 *
166 * Return: zero on success or an error code on failure.
167 */
168static int ice_devlink_info_get(struct devlink *devlink,
169				struct devlink_info_req *req,
170				struct netlink_ext_ack *extack)
171{
172	struct ice_pf *pf = devlink_priv(devlink);
173	char buf[100];
 
 
 
174	size_t i;
175	int err;
176
177	err = devlink_info_driver_name_put(req, KBUILD_MODNAME);
178	if (err) {
179		NL_SET_ERR_MSG_MOD(extack, "Unable to set driver name");
180		return err;
181	}
182
183	err = ice_info_get_dsn(pf, buf, sizeof(buf));
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
184	if (err) {
185		NL_SET_ERR_MSG_MOD(extack, "Unable to obtain serial number");
186		return err;
187	}
188
189	err = devlink_info_serial_number_put(req, buf);
 
 
190	if (err) {
191		NL_SET_ERR_MSG_MOD(extack, "Unable to set serial number");
192		return err;
193	}
194
195	for (i = 0; i < ARRAY_SIZE(ice_devlink_versions); i++) {
196		enum ice_version_type type = ice_devlink_versions[i].type;
197		const char *key = ice_devlink_versions[i].key;
198
199		err = ice_devlink_versions[i].getter(pf, buf, sizeof(buf));
 
 
200		if (err) {
201			NL_SET_ERR_MSG_MOD(extack, "Unable to obtain version info");
202			return err;
 
 
 
 
 
 
 
 
 
 
 
 
 
203		}
204
 
 
 
 
205		switch (type) {
206		case ICE_VERSION_FIXED:
207			err = devlink_info_version_fixed_put(req, key, buf);
208			if (err) {
209				NL_SET_ERR_MSG_MOD(extack, "Unable to set fixed version");
210				return err;
211			}
212			break;
213		case ICE_VERSION_RUNNING:
214			err = devlink_info_version_running_put(req, key, buf);
215			if (err) {
216				NL_SET_ERR_MSG_MOD(extack, "Unable to set running version");
217				return err;
218			}
219			break;
220		case ICE_VERSION_STORED:
221			err = devlink_info_version_stored_put(req, key, buf);
222			if (err) {
223				NL_SET_ERR_MSG_MOD(extack, "Unable to set stored version");
224				return err;
225			}
226			break;
227		}
228	}
229
230	return 0;
 
 
231}
232
233/**
234 * ice_devlink_flash_update - Update firmware stored in flash on the device
235 * @devlink: pointer to devlink associated with device to update
236 * @path: the path of the firmware file to use via request_firmware
237 * @component: name of the component to update, or NULL
238 * @extack: netlink extended ACK structure
239 *
240 * Perform a device flash update. The bulk of the update logic is contained
241 * within the ice_flash_pldm_image function.
242 *
243 * Returns: zero on success, or an error code on failure.
244 */
245static int
246ice_devlink_flash_update(struct devlink *devlink, const char *path,
247			 const char *component, struct netlink_ext_ack *extack)
 
248{
249	struct ice_pf *pf = devlink_priv(devlink);
250	struct device *dev = &pf->pdev->dev;
251	struct ice_hw *hw = &pf->hw;
252	const struct firmware *fw;
253	int err;
254
255	/* individual component update is not yet supported */
256	if (component)
 
 
 
 
 
 
 
 
 
 
257		return -EOPNOTSUPP;
 
258
259	if (!hw->dev_caps.common_cap.nvm_unified_update) {
260		NL_SET_ERR_MSG_MOD(extack, "Current firmware does not support unified update");
261		return -EOPNOTSUPP;
262	}
263
264	err = ice_check_for_pending_update(pf, component, extack);
265	if (err)
266		return err;
267
268	err = request_firmware(&fw, path, dev);
269	if (err) {
270		NL_SET_ERR_MSG_MOD(extack, "Unable to read file from disk");
271		return err;
272	}
273
274	devlink_flash_update_begin_notify(devlink);
275	devlink_flash_update_status_notify(devlink, "Preparing to flash",
276					   component, 0, 0);
277	err = ice_flash_pldm_image(pf, fw, extack);
278	devlink_flash_update_end_notify(devlink);
279
280	release_firmware(fw);
281
282	return err;
283}
284
285static const struct devlink_ops ice_devlink_ops = {
 
286	.info_get = ice_devlink_info_get,
287	.flash_update = ice_devlink_flash_update,
288};
289
290static void ice_devlink_free(void *devlink_ptr)
291{
292	devlink_free((struct devlink *)devlink_ptr);
293}
294
295/**
296 * ice_allocate_pf - Allocate devlink and return PF structure pointer
297 * @dev: the device to allocate for
298 *
299 * Allocate a devlink instance for this device and return the private area as
300 * the PF structure. The devlink memory is kept track of through devres by
301 * adding an action to remove it when unwinding.
302 */
303struct ice_pf *ice_allocate_pf(struct device *dev)
304{
305	struct devlink *devlink;
306
307	devlink = devlink_alloc(&ice_devlink_ops, sizeof(struct ice_pf));
308	if (!devlink)
309		return NULL;
310
311	/* Add an action to teardown the devlink when unwinding the driver */
312	if (devm_add_action(dev, ice_devlink_free, devlink)) {
313		devlink_free(devlink);
314		return NULL;
315	}
316
317	return devlink_priv(devlink);
318}
319
320/**
321 * ice_devlink_register - Register devlink interface for this PF
322 * @pf: the PF to register the devlink for.
323 *
324 * Register the devlink instance associated with this physical function.
325 *
326 * Return: zero on success or an error code on failure.
327 */
328int ice_devlink_register(struct ice_pf *pf)
329{
330	struct devlink *devlink = priv_to_devlink(pf);
331	struct device *dev = ice_pf_to_dev(pf);
332	int err;
333
334	err = devlink_register(devlink, dev);
335	if (err) {
336		dev_err(dev, "devlink registration failed: %d\n", err);
337		return err;
338	}
339
340	return 0;
341}
342
343/**
344 * ice_devlink_unregister - Unregister devlink resources for this PF.
345 * @pf: the PF structure to cleanup
346 *
347 * Releases resources used by devlink and cleans up associated memory.
348 */
349void ice_devlink_unregister(struct ice_pf *pf)
350{
351	devlink_unregister(priv_to_devlink(pf));
352}
353
354/**
355 * ice_devlink_create_port - Create a devlink port for this PF
356 * @pf: the PF to create a port for
357 *
358 * Create and register a devlink_port for this PF. Note that although each
359 * physical function is connected to a separate devlink instance, the port
360 * will still be numbered according to the physical function ID.
361 *
362 * Return: zero on success or an error code on failure.
363 */
364int ice_devlink_create_port(struct ice_pf *pf)
365{
366	struct devlink *devlink = priv_to_devlink(pf);
367	struct ice_vsi *vsi = ice_get_main_vsi(pf);
368	struct device *dev = ice_pf_to_dev(pf);
369	struct devlink_port_attrs attrs = {};
 
 
 
 
370	int err;
371
372	if (!vsi) {
373		dev_err(dev, "%s: unable to find main VSI\n", __func__);
374		return -EIO;
375	}
 
 
 
 
376
377	attrs.flavour = DEVLINK_PORT_FLAVOUR_PHYSICAL;
378	attrs.phys.port_number = pf->hw.pf_id;
379	devlink_port_attrs_set(&pf->devlink_port, &attrs);
380	err = devlink_port_register(devlink, &pf->devlink_port, pf->hw.pf_id);
381	if (err) {
382		dev_err(dev, "devlink_port_register failed: %d\n", err);
383		return err;
384	}
385
 
 
386	return 0;
387}
388
389/**
390 * ice_devlink_destroy_port - Destroy the devlink_port for this PF
391 * @pf: the PF to cleanup
392 *
393 * Unregisters the devlink_port structure associated with this PF.
394 */
395void ice_devlink_destroy_port(struct ice_pf *pf)
396{
397	devlink_port_type_clear(&pf->devlink_port);
398	devlink_port_unregister(&pf->devlink_port);
 
 
 
 
 
399}
400
401/**
402 * ice_devlink_nvm_snapshot - Capture a snapshot of the Shadow RAM contents
403 * @devlink: the devlink instance
 
404 * @extack: extended ACK response structure
405 * @data: on exit points to snapshot data buffer
406 *
407 * This function is called in response to the DEVLINK_CMD_REGION_TRIGGER for
408 * the shadow-ram devlink region. It captures a snapshot of the shadow ram
409 * contents. This snapshot can later be viewed via the devlink-region
410 * interface.
411 *
412 * @returns zero on success, and updates the data pointer. Returns a non-zero
413 * error code on failure.
414 */
415static int ice_devlink_nvm_snapshot(struct devlink *devlink,
 
416				    struct netlink_ext_ack *extack, u8 **data)
417{
418	struct ice_pf *pf = devlink_priv(devlink);
419	struct device *dev = ice_pf_to_dev(pf);
420	struct ice_hw *hw = &pf->hw;
421	enum ice_status status;
422	void *nvm_data;
423	u32 nvm_size;
424
425	nvm_size = hw->nvm.flash_size;
426	nvm_data = vzalloc(nvm_size);
427	if (!nvm_data)
428		return -ENOMEM;
429
430	status = ice_acquire_nvm(hw, ICE_RES_READ);
431	if (status) {
432		dev_dbg(dev, "ice_acquire_nvm failed, err %d aq_err %d\n",
433			status, hw->adminq.sq_last_status);
434		NL_SET_ERR_MSG_MOD(extack, "Failed to acquire NVM semaphore");
435		vfree(nvm_data);
436		return -EIO;
437	}
438
439	status = ice_read_flat_nvm(hw, 0, &nvm_size, nvm_data, false);
440	if (status) {
441		dev_dbg(dev, "ice_read_flat_nvm failed after reading %u bytes, err %d aq_err %d\n",
442			nvm_size, status, hw->adminq.sq_last_status);
443		NL_SET_ERR_MSG_MOD(extack, "Failed to read NVM contents");
444		ice_release_nvm(hw);
445		vfree(nvm_data);
446		return -EIO;
447	}
448
449	ice_release_nvm(hw);
450
451	*data = nvm_data;
452
453	return 0;
454}
455
456/**
457 * ice_devlink_devcaps_snapshot - Capture snapshot of device capabilities
458 * @devlink: the devlink instance
 
459 * @extack: extended ACK response structure
460 * @data: on exit points to snapshot data buffer
461 *
462 * This function is called in response to the DEVLINK_CMD_REGION_TRIGGER for
463 * the device-caps devlink region. It captures a snapshot of the device
464 * capabilities reported by firmware.
465 *
466 * @returns zero on success, and updates the data pointer. Returns a non-zero
467 * error code on failure.
468 */
469static int
470ice_devlink_devcaps_snapshot(struct devlink *devlink,
 
471			     struct netlink_ext_ack *extack, u8 **data)
472{
473	struct ice_pf *pf = devlink_priv(devlink);
474	struct device *dev = ice_pf_to_dev(pf);
475	struct ice_hw *hw = &pf->hw;
476	enum ice_status status;
477	void *devcaps;
478
479	devcaps = vzalloc(ICE_AQ_MAX_BUF_LEN);
480	if (!devcaps)
481		return -ENOMEM;
482
483	status = ice_aq_list_caps(hw, devcaps, ICE_AQ_MAX_BUF_LEN, NULL,
484				  ice_aqc_opc_list_dev_caps, NULL);
485	if (status) {
486		dev_dbg(dev, "ice_aq_list_caps: failed to read device capabilities, err %d aq_err %d\n",
487			status, hw->adminq.sq_last_status);
488		NL_SET_ERR_MSG_MOD(extack, "Failed to read device capabilities");
489		vfree(devcaps);
490		return -EIO;
491	}
492
493	*data = (u8 *)devcaps;
494
495	return 0;
496}
497
498static const struct devlink_region_ops ice_nvm_region_ops = {
499	.name = "nvm-flash",
500	.destructor = vfree,
501	.snapshot = ice_devlink_nvm_snapshot,
502};
503
504static const struct devlink_region_ops ice_devcaps_region_ops = {
505	.name = "device-caps",
506	.destructor = vfree,
507	.snapshot = ice_devlink_devcaps_snapshot,
508};
509
510/**
511 * ice_devlink_init_regions - Initialize devlink regions
512 * @pf: the PF device structure
513 *
514 * Create devlink regions used to enable access to dump the contents of the
515 * flash memory on the device.
516 */
517void ice_devlink_init_regions(struct ice_pf *pf)
518{
519	struct devlink *devlink = priv_to_devlink(pf);
520	struct device *dev = ice_pf_to_dev(pf);
521	u64 nvm_size;
522
523	nvm_size = pf->hw.nvm.flash_size;
524	pf->nvm_region = devlink_region_create(devlink, &ice_nvm_region_ops, 1,
525					       nvm_size);
526	if (IS_ERR(pf->nvm_region)) {
527		dev_err(dev, "failed to create NVM devlink region, err %ld\n",
528			PTR_ERR(pf->nvm_region));
529		pf->nvm_region = NULL;
530	}
531
532	pf->devcaps_region = devlink_region_create(devlink,
533						   &ice_devcaps_region_ops, 10,
534						   ICE_AQ_MAX_BUF_LEN);
535	if (IS_ERR(pf->devcaps_region)) {
536		dev_err(dev, "failed to create device-caps devlink region, err %ld\n",
537			PTR_ERR(pf->devcaps_region));
538		pf->devcaps_region = NULL;
539	}
540}
541
542/**
543 * ice_devlink_destroy_regions - Destroy devlink regions
544 * @pf: the PF device structure
545 *
546 * Remove previously created regions for this PF.
547 */
548void ice_devlink_destroy_regions(struct ice_pf *pf)
549{
550	if (pf->nvm_region)
551		devlink_region_destroy(pf->nvm_region);
552	if (pf->devcaps_region)
553		devlink_region_destroy(pf->devcaps_region);
554}
v5.14.15
  1// SPDX-License-Identifier: GPL-2.0
  2/* Copyright (c) 2020, Intel Corporation. */
  3
  4#include "ice.h"
  5#include "ice_lib.h"
  6#include "ice_devlink.h"
  7#include "ice_fw_update.h"
  8
  9/* context for devlink info version reporting */
 10struct ice_info_ctx {
 11	char buf[128];
 12	struct ice_orom_info pending_orom;
 13	struct ice_nvm_info pending_nvm;
 14	struct ice_netlist_info pending_netlist;
 15	struct ice_hw_dev_caps dev_caps;
 16};
 17
 18/* The following functions are used to format specific strings for various
 19 * devlink info versions. The ctx parameter is used to provide the storage
 20 * buffer, as well as any ancillary information calculated when the info
 21 * request was made.
 22 *
 23 * If a version does not exist, for example when attempting to get the
 24 * inactive version of flash when there is no pending update, the function
 25 * should leave the buffer in the ctx structure empty and return 0.
 26 */
 27
 28static void ice_info_get_dsn(struct ice_pf *pf, struct ice_info_ctx *ctx)
 29{
 30	u8 dsn[8];
 31
 32	/* Copy the DSN into an array in Big Endian format */
 33	put_unaligned_be64(pci_get_dsn(pf->pdev), dsn);
 34
 35	snprintf(ctx->buf, sizeof(ctx->buf), "%8phD", dsn);
 
 
 
 
 36}
 37
 38static int ice_info_pba(struct ice_pf *pf, struct ice_info_ctx *ctx)
 39{
 40	struct ice_hw *hw = &pf->hw;
 41	enum ice_status status;
 42
 43	status = ice_read_pba_string(hw, (u8 *)ctx->buf, sizeof(ctx->buf));
 44	if (status)
 45		/* We failed to locate the PBA, so just skip this entry */
 46		dev_dbg(ice_pf_to_dev(pf), "Failed to read Product Board Assembly string, status %s\n",
 47			ice_stat_str(status));
 48
 49	return 0;
 50}
 51
 52static int ice_info_fw_mgmt(struct ice_pf *pf, struct ice_info_ctx *ctx)
 53{
 54	struct ice_hw *hw = &pf->hw;
 55
 56	snprintf(ctx->buf, sizeof(ctx->buf), "%u.%u.%u", hw->fw_maj_ver, hw->fw_min_ver,
 57		 hw->fw_patch);
 58
 59	return 0;
 60}
 61
 62static int ice_info_fw_api(struct ice_pf *pf, struct ice_info_ctx *ctx)
 63{
 64	struct ice_hw *hw = &pf->hw;
 65
 66	snprintf(ctx->buf, sizeof(ctx->buf), "%u.%u.%u", hw->api_maj_ver,
 67		 hw->api_min_ver, hw->api_patch);
 68
 69	return 0;
 70}
 71
 72static int ice_info_fw_build(struct ice_pf *pf, struct ice_info_ctx *ctx)
 73{
 74	struct ice_hw *hw = &pf->hw;
 75
 76	snprintf(ctx->buf, sizeof(ctx->buf), "0x%08x", hw->fw_build);
 77
 78	return 0;
 79}
 80
 81static int ice_info_orom_ver(struct ice_pf *pf, struct ice_info_ctx *ctx)
 82{
 83	struct ice_orom_info *orom = &pf->hw.flash.orom;
 84
 85	snprintf(ctx->buf, sizeof(ctx->buf), "%u.%u.%u", orom->major, orom->build, orom->patch);
 86
 87	return 0;
 88}
 89
 90static int
 91ice_info_pending_orom_ver(struct ice_pf __always_unused *pf, struct ice_info_ctx *ctx)
 92{
 93	struct ice_orom_info *orom = &ctx->pending_orom;
 94
 95	if (ctx->dev_caps.common_cap.nvm_update_pending_orom)
 96		snprintf(ctx->buf, sizeof(ctx->buf), "%u.%u.%u",
 97			 orom->major, orom->build, orom->patch);
 98
 99	return 0;
100}
101
102static int ice_info_nvm_ver(struct ice_pf *pf, struct ice_info_ctx *ctx)
103{
104	struct ice_nvm_info *nvm = &pf->hw.flash.nvm;
105
106	snprintf(ctx->buf, sizeof(ctx->buf), "%x.%02x", nvm->major, nvm->minor);
107
108	return 0;
109}
110
111static int
112ice_info_pending_nvm_ver(struct ice_pf __always_unused *pf, struct ice_info_ctx *ctx)
113{
114	struct ice_nvm_info *nvm = &ctx->pending_nvm;
115
116	if (ctx->dev_caps.common_cap.nvm_update_pending_nvm)
117		snprintf(ctx->buf, sizeof(ctx->buf), "%x.%02x", nvm->major, nvm->minor);
118
119	return 0;
120}
121
122static int ice_info_eetrack(struct ice_pf *pf, struct ice_info_ctx *ctx)
123{
124	struct ice_nvm_info *nvm = &pf->hw.flash.nvm;
125
126	snprintf(ctx->buf, sizeof(ctx->buf), "0x%08x", nvm->eetrack);
127
128	return 0;
129}
130
131static int
132ice_info_pending_eetrack(struct ice_pf __always_unused *pf, struct ice_info_ctx *ctx)
133{
134	struct ice_nvm_info *nvm = &ctx->pending_nvm;
135
136	if (ctx->dev_caps.common_cap.nvm_update_pending_nvm)
137		snprintf(ctx->buf, sizeof(ctx->buf), "0x%08x", nvm->eetrack);
138
139	return 0;
140}
141
142static int ice_info_ddp_pkg_name(struct ice_pf *pf, struct ice_info_ctx *ctx)
143{
144	struct ice_hw *hw = &pf->hw;
145
146	snprintf(ctx->buf, sizeof(ctx->buf), "%s", hw->active_pkg_name);
147
148	return 0;
149}
150
151static int ice_info_ddp_pkg_version(struct ice_pf *pf, struct ice_info_ctx *ctx)
152{
153	struct ice_pkg_ver *pkg = &pf->hw.active_pkg_ver;
154
155	snprintf(ctx->buf, sizeof(ctx->buf), "%u.%u.%u.%u", pkg->major, pkg->minor, pkg->update,
156		 pkg->draft);
157
158	return 0;
159}
160
161static int ice_info_ddp_pkg_bundle_id(struct ice_pf *pf, struct ice_info_ctx *ctx)
162{
163	snprintf(ctx->buf, sizeof(ctx->buf), "0x%08x", pf->hw.active_track_id);
164
165	return 0;
166}
167
168static int ice_info_netlist_ver(struct ice_pf *pf, struct ice_info_ctx *ctx)
169{
170	struct ice_netlist_info *netlist = &pf->hw.flash.netlist;
171
172	/* The netlist version fields are BCD formatted */
173	snprintf(ctx->buf, sizeof(ctx->buf), "%x.%x.%x-%x.%x.%x", netlist->major, netlist->minor,
174		 netlist->type >> 16, netlist->type & 0xFFFF, netlist->rev,
175		 netlist->cust_ver);
176
177	return 0;
178}
179
180static int ice_info_netlist_build(struct ice_pf *pf, struct ice_info_ctx *ctx)
181{
182	struct ice_netlist_info *netlist = &pf->hw.flash.netlist;
183
184	snprintf(ctx->buf, sizeof(ctx->buf), "0x%08x", netlist->hash);
185
186	return 0;
187}
188
189static int
190ice_info_pending_netlist_ver(struct ice_pf __always_unused *pf, struct ice_info_ctx *ctx)
191{
192	struct ice_netlist_info *netlist = &ctx->pending_netlist;
193
194	/* The netlist version fields are BCD formatted */
195	if (ctx->dev_caps.common_cap.nvm_update_pending_netlist)
196		snprintf(ctx->buf, sizeof(ctx->buf), "%x.%x.%x-%x.%x.%x",
197			 netlist->major, netlist->minor,
198			 netlist->type >> 16, netlist->type & 0xFFFF, netlist->rev,
199			 netlist->cust_ver);
200
201	return 0;
202}
203
204static int
205ice_info_pending_netlist_build(struct ice_pf __always_unused *pf, struct ice_info_ctx *ctx)
206{
207	struct ice_netlist_info *netlist = &ctx->pending_netlist;
208
209	if (ctx->dev_caps.common_cap.nvm_update_pending_netlist)
210		snprintf(ctx->buf, sizeof(ctx->buf), "0x%08x", netlist->hash);
211
212	return 0;
213}
214
215#define fixed(key, getter) { ICE_VERSION_FIXED, key, getter, NULL }
216#define running(key, getter) { ICE_VERSION_RUNNING, key, getter, NULL }
217#define stored(key, getter, fallback) { ICE_VERSION_STORED, key, getter, fallback }
218
219/* The combined() macro inserts both the running entry as well as a stored
220 * entry. The running entry will always report the version from the active
221 * handler. The stored entry will first try the pending handler, and fallback
222 * to the active handler if the pending function does not report a version.
223 * The pending handler should check the status of a pending update for the
224 * relevant flash component. It should only fill in the buffer in the case
225 * where a valid pending version is available. This ensures that the related
226 * stored and running versions remain in sync, and that stored versions are
227 * correctly reported as expected.
228 */
229#define combined(key, active, pending) \
230	running(key, active), \
231	stored(key, pending, active)
232
233enum ice_version_type {
234	ICE_VERSION_FIXED,
235	ICE_VERSION_RUNNING,
236	ICE_VERSION_STORED,
237};
238
239static const struct ice_devlink_version {
240	enum ice_version_type type;
241	const char *key;
242	int (*getter)(struct ice_pf *pf, struct ice_info_ctx *ctx);
243	int (*fallback)(struct ice_pf *pf, struct ice_info_ctx *ctx);
244} ice_devlink_versions[] = {
245	fixed(DEVLINK_INFO_VERSION_GENERIC_BOARD_ID, ice_info_pba),
246	running(DEVLINK_INFO_VERSION_GENERIC_FW_MGMT, ice_info_fw_mgmt),
247	running("fw.mgmt.api", ice_info_fw_api),
248	running("fw.mgmt.build", ice_info_fw_build),
249	combined(DEVLINK_INFO_VERSION_GENERIC_FW_UNDI, ice_info_orom_ver, ice_info_pending_orom_ver),
250	combined("fw.psid.api", ice_info_nvm_ver, ice_info_pending_nvm_ver),
251	combined(DEVLINK_INFO_VERSION_GENERIC_FW_BUNDLE_ID, ice_info_eetrack, ice_info_pending_eetrack),
252	running("fw.app.name", ice_info_ddp_pkg_name),
253	running(DEVLINK_INFO_VERSION_GENERIC_FW_APP, ice_info_ddp_pkg_version),
254	running("fw.app.bundle_id", ice_info_ddp_pkg_bundle_id),
255	combined("fw.netlist", ice_info_netlist_ver, ice_info_pending_netlist_ver),
256	combined("fw.netlist.build", ice_info_netlist_build, ice_info_pending_netlist_build),
257};
258
259/**
260 * ice_devlink_info_get - .info_get devlink handler
261 * @devlink: devlink instance structure
262 * @req: the devlink info request
263 * @extack: extended netdev ack structure
264 *
265 * Callback for the devlink .info_get operation. Reports information about the
266 * device.
267 *
268 * Return: zero on success or an error code on failure.
269 */
270static int ice_devlink_info_get(struct devlink *devlink,
271				struct devlink_info_req *req,
272				struct netlink_ext_ack *extack)
273{
274	struct ice_pf *pf = devlink_priv(devlink);
275	struct device *dev = ice_pf_to_dev(pf);
276	struct ice_hw *hw = &pf->hw;
277	struct ice_info_ctx *ctx;
278	enum ice_status status;
279	size_t i;
280	int err;
281
282	err = ice_wait_for_reset(pf, 10 * HZ);
283	if (err) {
284		NL_SET_ERR_MSG_MOD(extack, "Device is busy resetting");
285		return err;
286	}
287
288	ctx = kzalloc(sizeof(*ctx), GFP_KERNEL);
289	if (!ctx)
290		return -ENOMEM;
291
292	/* discover capabilities first */
293	status = ice_discover_dev_caps(hw, &ctx->dev_caps);
294	if (status) {
295		dev_dbg(dev, "Failed to discover device capabilities, status %s aq_err %s\n",
296			ice_stat_str(status), ice_aq_str(hw->adminq.sq_last_status));
297		NL_SET_ERR_MSG_MOD(extack, "Unable to discover device capabilities");
298		err = -EIO;
299		goto out_free_ctx;
300	}
301
302	if (ctx->dev_caps.common_cap.nvm_update_pending_orom) {
303		status = ice_get_inactive_orom_ver(hw, &ctx->pending_orom);
304		if (status) {
305			dev_dbg(dev, "Unable to read inactive Option ROM version data, status %s aq_err %s\n",
306				ice_stat_str(status), ice_aq_str(hw->adminq.sq_last_status));
307
308			/* disable display of pending Option ROM */
309			ctx->dev_caps.common_cap.nvm_update_pending_orom = false;
310		}
311	}
312
313	if (ctx->dev_caps.common_cap.nvm_update_pending_nvm) {
314		status = ice_get_inactive_nvm_ver(hw, &ctx->pending_nvm);
315		if (status) {
316			dev_dbg(dev, "Unable to read inactive NVM version data, status %s aq_err %s\n",
317				ice_stat_str(status), ice_aq_str(hw->adminq.sq_last_status));
318
319			/* disable display of pending Option ROM */
320			ctx->dev_caps.common_cap.nvm_update_pending_nvm = false;
321		}
322	}
323
324	if (ctx->dev_caps.common_cap.nvm_update_pending_netlist) {
325		status = ice_get_inactive_netlist_ver(hw, &ctx->pending_netlist);
326		if (status) {
327			dev_dbg(dev, "Unable to read inactive Netlist version data, status %s aq_err %s\n",
328				ice_stat_str(status), ice_aq_str(hw->adminq.sq_last_status));
329
330			/* disable display of pending Option ROM */
331			ctx->dev_caps.common_cap.nvm_update_pending_netlist = false;
332		}
333	}
334
335	err = devlink_info_driver_name_put(req, KBUILD_MODNAME);
336	if (err) {
337		NL_SET_ERR_MSG_MOD(extack, "Unable to set driver name");
338		goto out_free_ctx;
339	}
340
341	ice_info_get_dsn(pf, ctx);
342
343	err = devlink_info_serial_number_put(req, ctx->buf);
344	if (err) {
345		NL_SET_ERR_MSG_MOD(extack, "Unable to set serial number");
346		goto out_free_ctx;
347	}
348
349	for (i = 0; i < ARRAY_SIZE(ice_devlink_versions); i++) {
350		enum ice_version_type type = ice_devlink_versions[i].type;
351		const char *key = ice_devlink_versions[i].key;
352
353		memset(ctx->buf, 0, sizeof(ctx->buf));
354
355		err = ice_devlink_versions[i].getter(pf, ctx);
356		if (err) {
357			NL_SET_ERR_MSG_MOD(extack, "Unable to obtain version info");
358			goto out_free_ctx;
359		}
360
361		/* If the default getter doesn't report a version, use the
362		 * fallback function. This is primarily useful in the case of
363		 * "stored" versions that want to report the same value as the
364		 * running version in the normal case of no pending update.
365		 */
366		if (ctx->buf[0] == '\0' && ice_devlink_versions[i].fallback) {
367			err = ice_devlink_versions[i].fallback(pf, ctx);
368			if (err) {
369				NL_SET_ERR_MSG_MOD(extack, "Unable to obtain version info");
370				goto out_free_ctx;
371			}
372		}
373
374		/* Do not report missing versions */
375		if (ctx->buf[0] == '\0')
376			continue;
377
378		switch (type) {
379		case ICE_VERSION_FIXED:
380			err = devlink_info_version_fixed_put(req, key, ctx->buf);
381			if (err) {
382				NL_SET_ERR_MSG_MOD(extack, "Unable to set fixed version");
383				goto out_free_ctx;
384			}
385			break;
386		case ICE_VERSION_RUNNING:
387			err = devlink_info_version_running_put(req, key, ctx->buf);
388			if (err) {
389				NL_SET_ERR_MSG_MOD(extack, "Unable to set running version");
390				goto out_free_ctx;
391			}
392			break;
393		case ICE_VERSION_STORED:
394			err = devlink_info_version_stored_put(req, key, ctx->buf);
395			if (err) {
396				NL_SET_ERR_MSG_MOD(extack, "Unable to set stored version");
397				goto out_free_ctx;
398			}
399			break;
400		}
401	}
402
403out_free_ctx:
404	kfree(ctx);
405	return err;
406}
407
408/**
409 * ice_devlink_flash_update - Update firmware stored in flash on the device
410 * @devlink: pointer to devlink associated with device to update
411 * @params: flash update parameters
 
412 * @extack: netlink extended ACK structure
413 *
414 * Perform a device flash update. The bulk of the update logic is contained
415 * within the ice_flash_pldm_image function.
416 *
417 * Returns: zero on success, or an error code on failure.
418 */
419static int
420ice_devlink_flash_update(struct devlink *devlink,
421			 struct devlink_flash_update_params *params,
422			 struct netlink_ext_ack *extack)
423{
424	struct ice_pf *pf = devlink_priv(devlink);
 
425	struct ice_hw *hw = &pf->hw;
426	u8 preservation;
427	int err;
428
429	if (!params->overwrite_mask) {
430		/* preserve all settings and identifiers */
431		preservation = ICE_AQC_NVM_PRESERVE_ALL;
432	} else if (params->overwrite_mask == DEVLINK_FLASH_OVERWRITE_SETTINGS) {
433		/* overwrite settings, but preserve the vital device identifiers */
434		preservation = ICE_AQC_NVM_PRESERVE_SELECTED;
435	} else if (params->overwrite_mask == (DEVLINK_FLASH_OVERWRITE_SETTINGS |
436					      DEVLINK_FLASH_OVERWRITE_IDENTIFIERS)) {
437		/* overwrite both settings and identifiers, preserve nothing */
438		preservation = ICE_AQC_NVM_NO_PRESERVATION;
439	} else {
440		NL_SET_ERR_MSG_MOD(extack, "Requested overwrite mask is not supported");
441		return -EOPNOTSUPP;
442	}
443
444	if (!hw->dev_caps.common_cap.nvm_unified_update) {
445		NL_SET_ERR_MSG_MOD(extack, "Current firmware does not support unified update");
446		return -EOPNOTSUPP;
447	}
448
449	err = ice_check_for_pending_update(pf, NULL, extack);
450	if (err)
451		return err;
452
453	devlink_flash_update_status_notify(devlink, "Preparing to flash", NULL, 0, 0);
 
 
 
 
 
 
 
 
 
 
 
 
454
455	return ice_flash_pldm_image(pf, params->fw, preservation, extack);
456}
457
458static const struct devlink_ops ice_devlink_ops = {
459	.supported_flash_update_params = DEVLINK_SUPPORT_FLASH_UPDATE_OVERWRITE_MASK,
460	.info_get = ice_devlink_info_get,
461	.flash_update = ice_devlink_flash_update,
462};
463
464static void ice_devlink_free(void *devlink_ptr)
465{
466	devlink_free((struct devlink *)devlink_ptr);
467}
468
469/**
470 * ice_allocate_pf - Allocate devlink and return PF structure pointer
471 * @dev: the device to allocate for
472 *
473 * Allocate a devlink instance for this device and return the private area as
474 * the PF structure. The devlink memory is kept track of through devres by
475 * adding an action to remove it when unwinding.
476 */
477struct ice_pf *ice_allocate_pf(struct device *dev)
478{
479	struct devlink *devlink;
480
481	devlink = devlink_alloc(&ice_devlink_ops, sizeof(struct ice_pf));
482	if (!devlink)
483		return NULL;
484
485	/* Add an action to teardown the devlink when unwinding the driver */
486	if (devm_add_action(dev, ice_devlink_free, devlink)) {
487		devlink_free(devlink);
488		return NULL;
489	}
490
491	return devlink_priv(devlink);
492}
493
494/**
495 * ice_devlink_register - Register devlink interface for this PF
496 * @pf: the PF to register the devlink for.
497 *
498 * Register the devlink instance associated with this physical function.
499 *
500 * Return: zero on success or an error code on failure.
501 */
502int ice_devlink_register(struct ice_pf *pf)
503{
504	struct devlink *devlink = priv_to_devlink(pf);
505	struct device *dev = ice_pf_to_dev(pf);
506	int err;
507
508	err = devlink_register(devlink, dev);
509	if (err) {
510		dev_err(dev, "devlink registration failed: %d\n", err);
511		return err;
512	}
513
514	return 0;
515}
516
517/**
518 * ice_devlink_unregister - Unregister devlink resources for this PF.
519 * @pf: the PF structure to cleanup
520 *
521 * Releases resources used by devlink and cleans up associated memory.
522 */
523void ice_devlink_unregister(struct ice_pf *pf)
524{
525	devlink_unregister(priv_to_devlink(pf));
526}
527
528/**
529 * ice_devlink_create_port - Create a devlink port for this VSI
530 * @vsi: the VSI to create a port for
531 *
532 * Create and register a devlink_port for this VSI.
 
 
533 *
534 * Return: zero on success or an error code on failure.
535 */
536int ice_devlink_create_port(struct ice_vsi *vsi)
537{
 
 
 
538	struct devlink_port_attrs attrs = {};
539	struct ice_port_info *pi;
540	struct devlink *devlink;
541	struct device *dev;
542	struct ice_pf *pf;
543	int err;
544
545	/* Currently we only create devlink_port instances for PF VSIs */
546	if (vsi->type != ICE_VSI_PF)
547		return -EINVAL;
548
549	pf = vsi->back;
550	devlink = priv_to_devlink(pf);
551	dev = ice_pf_to_dev(pf);
552	pi = pf->hw.port_info;
553
554	attrs.flavour = DEVLINK_PORT_FLAVOUR_PHYSICAL;
555	attrs.phys.port_number = pi->lport;
556	devlink_port_attrs_set(&vsi->devlink_port, &attrs);
557	err = devlink_port_register(devlink, &vsi->devlink_port, vsi->idx);
558	if (err) {
559		dev_err(dev, "devlink_port_register failed: %d\n", err);
560		return err;
561	}
562
563	vsi->devlink_port_registered = true;
564
565	return 0;
566}
567
568/**
569 * ice_devlink_destroy_port - Destroy the devlink_port for this VSI
570 * @vsi: the VSI to cleanup
571 *
572 * Unregisters the devlink_port structure associated with this VSI.
573 */
574void ice_devlink_destroy_port(struct ice_vsi *vsi)
575{
576	if (!vsi->devlink_port_registered)
577		return;
578
579	devlink_port_type_clear(&vsi->devlink_port);
580	devlink_port_unregister(&vsi->devlink_port);
581
582	vsi->devlink_port_registered = false;
583}
584
585/**
586 * ice_devlink_nvm_snapshot - Capture a snapshot of the Shadow RAM contents
587 * @devlink: the devlink instance
588 * @ops: the devlink region being snapshotted
589 * @extack: extended ACK response structure
590 * @data: on exit points to snapshot data buffer
591 *
592 * This function is called in response to the DEVLINK_CMD_REGION_TRIGGER for
593 * the shadow-ram devlink region. It captures a snapshot of the shadow ram
594 * contents. This snapshot can later be viewed via the devlink-region
595 * interface.
596 *
597 * @returns zero on success, and updates the data pointer. Returns a non-zero
598 * error code on failure.
599 */
600static int ice_devlink_nvm_snapshot(struct devlink *devlink,
601				    const struct devlink_region_ops *ops,
602				    struct netlink_ext_ack *extack, u8 **data)
603{
604	struct ice_pf *pf = devlink_priv(devlink);
605	struct device *dev = ice_pf_to_dev(pf);
606	struct ice_hw *hw = &pf->hw;
607	enum ice_status status;
608	void *nvm_data;
609	u32 nvm_size;
610
611	nvm_size = hw->flash.flash_size;
612	nvm_data = vzalloc(nvm_size);
613	if (!nvm_data)
614		return -ENOMEM;
615
616	status = ice_acquire_nvm(hw, ICE_RES_READ);
617	if (status) {
618		dev_dbg(dev, "ice_acquire_nvm failed, err %d aq_err %d\n",
619			status, hw->adminq.sq_last_status);
620		NL_SET_ERR_MSG_MOD(extack, "Failed to acquire NVM semaphore");
621		vfree(nvm_data);
622		return -EIO;
623	}
624
625	status = ice_read_flat_nvm(hw, 0, &nvm_size, nvm_data, false);
626	if (status) {
627		dev_dbg(dev, "ice_read_flat_nvm failed after reading %u bytes, err %d aq_err %d\n",
628			nvm_size, status, hw->adminq.sq_last_status);
629		NL_SET_ERR_MSG_MOD(extack, "Failed to read NVM contents");
630		ice_release_nvm(hw);
631		vfree(nvm_data);
632		return -EIO;
633	}
634
635	ice_release_nvm(hw);
636
637	*data = nvm_data;
638
639	return 0;
640}
641
642/**
643 * ice_devlink_devcaps_snapshot - Capture snapshot of device capabilities
644 * @devlink: the devlink instance
645 * @ops: the devlink region being snapshotted
646 * @extack: extended ACK response structure
647 * @data: on exit points to snapshot data buffer
648 *
649 * This function is called in response to the DEVLINK_CMD_REGION_TRIGGER for
650 * the device-caps devlink region. It captures a snapshot of the device
651 * capabilities reported by firmware.
652 *
653 * @returns zero on success, and updates the data pointer. Returns a non-zero
654 * error code on failure.
655 */
656static int
657ice_devlink_devcaps_snapshot(struct devlink *devlink,
658			     const struct devlink_region_ops *ops,
659			     struct netlink_ext_ack *extack, u8 **data)
660{
661	struct ice_pf *pf = devlink_priv(devlink);
662	struct device *dev = ice_pf_to_dev(pf);
663	struct ice_hw *hw = &pf->hw;
664	enum ice_status status;
665	void *devcaps;
666
667	devcaps = vzalloc(ICE_AQ_MAX_BUF_LEN);
668	if (!devcaps)
669		return -ENOMEM;
670
671	status = ice_aq_list_caps(hw, devcaps, ICE_AQ_MAX_BUF_LEN, NULL,
672				  ice_aqc_opc_list_dev_caps, NULL);
673	if (status) {
674		dev_dbg(dev, "ice_aq_list_caps: failed to read device capabilities, err %d aq_err %d\n",
675			status, hw->adminq.sq_last_status);
676		NL_SET_ERR_MSG_MOD(extack, "Failed to read device capabilities");
677		vfree(devcaps);
678		return -EIO;
679	}
680
681	*data = (u8 *)devcaps;
682
683	return 0;
684}
685
686static const struct devlink_region_ops ice_nvm_region_ops = {
687	.name = "nvm-flash",
688	.destructor = vfree,
689	.snapshot = ice_devlink_nvm_snapshot,
690};
691
692static const struct devlink_region_ops ice_devcaps_region_ops = {
693	.name = "device-caps",
694	.destructor = vfree,
695	.snapshot = ice_devlink_devcaps_snapshot,
696};
697
698/**
699 * ice_devlink_init_regions - Initialize devlink regions
700 * @pf: the PF device structure
701 *
702 * Create devlink regions used to enable access to dump the contents of the
703 * flash memory on the device.
704 */
705void ice_devlink_init_regions(struct ice_pf *pf)
706{
707	struct devlink *devlink = priv_to_devlink(pf);
708	struct device *dev = ice_pf_to_dev(pf);
709	u64 nvm_size;
710
711	nvm_size = pf->hw.flash.flash_size;
712	pf->nvm_region = devlink_region_create(devlink, &ice_nvm_region_ops, 1,
713					       nvm_size);
714	if (IS_ERR(pf->nvm_region)) {
715		dev_err(dev, "failed to create NVM devlink region, err %ld\n",
716			PTR_ERR(pf->nvm_region));
717		pf->nvm_region = NULL;
718	}
719
720	pf->devcaps_region = devlink_region_create(devlink,
721						   &ice_devcaps_region_ops, 10,
722						   ICE_AQ_MAX_BUF_LEN);
723	if (IS_ERR(pf->devcaps_region)) {
724		dev_err(dev, "failed to create device-caps devlink region, err %ld\n",
725			PTR_ERR(pf->devcaps_region));
726		pf->devcaps_region = NULL;
727	}
728}
729
730/**
731 * ice_devlink_destroy_regions - Destroy devlink regions
732 * @pf: the PF device structure
733 *
734 * Remove previously created regions for this PF.
735 */
736void ice_devlink_destroy_regions(struct ice_pf *pf)
737{
738	if (pf->nvm_region)
739		devlink_region_destroy(pf->nvm_region);
740	if (pf->devcaps_region)
741		devlink_region_destroy(pf->devcaps_region);
742}