Loading...
1// SPDX-License-Identifier: GPL-2.0+
2/* Microchip Sparx5 Switch driver VCAP implementation
3 *
4 * Copyright (c) 2022 Microchip Technology Inc. and its subsidiaries.
5 *
6 * The Sparx5 Chip Register Model can be browsed at this location:
7 * https://github.com/microchip-ung/sparx-5_reginfo
8 */
9
10#include "vcap_api_debugfs.h"
11#include "sparx5_main_regs.h"
12#include "sparx5_main.h"
13#include "sparx5_vcap_impl.h"
14#include "sparx5_vcap_ag_api.h"
15#include "sparx5_vcap_debugfs.h"
16
17#define SUPER_VCAP_BLK_SIZE 3072 /* addresses per Super VCAP block */
18#define STREAMSIZE (64 * 4) /* bytes in the VCAP cache area */
19
20#define VCAP_IS2_KEYSEL(_ena, _noneth, _v4_mc, _v4_uc, _v6_mc, _v6_uc, _arp) \
21 (ANA_ACL_VCAP_S2_KEY_SEL_KEY_SEL_ENA_SET(_ena) | \
22 ANA_ACL_VCAP_S2_KEY_SEL_NON_ETH_KEY_SEL_SET(_noneth) | \
23 ANA_ACL_VCAP_S2_KEY_SEL_IP4_MC_KEY_SEL_SET(_v4_mc) | \
24 ANA_ACL_VCAP_S2_KEY_SEL_IP4_UC_KEY_SEL_SET(_v4_uc) | \
25 ANA_ACL_VCAP_S2_KEY_SEL_IP6_MC_KEY_SEL_SET(_v6_mc) | \
26 ANA_ACL_VCAP_S2_KEY_SEL_IP6_UC_KEY_SEL_SET(_v6_uc) | \
27 ANA_ACL_VCAP_S2_KEY_SEL_ARP_KEY_SEL_SET(_arp))
28
29#define VCAP_IS0_KEYSEL(_ena, _etype, _ipv4, _ipv6, _mpls_uc, _mpls_mc, _mlbs) \
30 (ANA_CL_ADV_CL_CFG_LOOKUP_ENA_SET(_ena) | \
31 ANA_CL_ADV_CL_CFG_ETYPE_CLM_KEY_SEL_SET(_etype) | \
32 ANA_CL_ADV_CL_CFG_IP4_CLM_KEY_SEL_SET(_ipv4) | \
33 ANA_CL_ADV_CL_CFG_IP6_CLM_KEY_SEL_SET(_ipv6) | \
34 ANA_CL_ADV_CL_CFG_MPLS_UC_CLM_KEY_SEL_SET(_mpls_uc) | \
35 ANA_CL_ADV_CL_CFG_MPLS_MC_CLM_KEY_SEL_SET(_mpls_mc) | \
36 ANA_CL_ADV_CL_CFG_MLBS_CLM_KEY_SEL_SET(_mlbs))
37
38#define VCAP_ES0_KEYSEL(_key) (REW_RTAG_ETAG_CTRL_ES0_ISDX_KEY_ENA_SET(_key))
39#define SPARX5_STAT_ESDX_GRN_PKTS 0x300
40#define SPARX5_STAT_ESDX_YEL_PKTS 0x301
41
42#define VCAP_ES2_KEYSEL(_ena, _arp, _ipv4, _ipv6) \
43 (EACL_VCAP_ES2_KEY_SEL_KEY_ENA_SET(_ena) | \
44 EACL_VCAP_ES2_KEY_SEL_ARP_KEY_SEL_SET(_arp) | \
45 EACL_VCAP_ES2_KEY_SEL_IP4_KEY_SEL_SET(_ipv4) | \
46 EACL_VCAP_ES2_KEY_SEL_IP6_KEY_SEL_SET(_ipv6))
47
48const struct sparx5_vcap_inst sparx5_vcap_inst_cfg[] = {
49 {
50 .vtype = VCAP_TYPE_IS0, /* CLM-0 */
51 .vinst = 0,
52 .map_id = 1,
53 .lookups = SPARX5_IS0_LOOKUPS,
54 .lookups_per_instance = SPARX5_IS0_LOOKUPS / 3,
55 .first_cid = SPARX5_VCAP_CID_IS0_L0,
56 .last_cid = SPARX5_VCAP_CID_IS0_L2 - 1,
57 .blockno = 8, /* Maps block 8-9 */
58 .blocks = 2,
59 .ingress = true,
60 },
61 {
62 .vtype = VCAP_TYPE_IS0, /* CLM-1 */
63 .vinst = 1,
64 .map_id = 2,
65 .lookups = SPARX5_IS0_LOOKUPS,
66 .lookups_per_instance = SPARX5_IS0_LOOKUPS / 3,
67 .first_cid = SPARX5_VCAP_CID_IS0_L2,
68 .last_cid = SPARX5_VCAP_CID_IS0_L4 - 1,
69 .blockno = 6, /* Maps block 6-7 */
70 .blocks = 2,
71 .ingress = true,
72 },
73 {
74 .vtype = VCAP_TYPE_IS0, /* CLM-2 */
75 .vinst = 2,
76 .map_id = 3,
77 .lookups = SPARX5_IS0_LOOKUPS,
78 .lookups_per_instance = SPARX5_IS0_LOOKUPS / 3,
79 .first_cid = SPARX5_VCAP_CID_IS0_L4,
80 .last_cid = SPARX5_VCAP_CID_IS0_MAX,
81 .blockno = 4, /* Maps block 4-5 */
82 .blocks = 2,
83 .ingress = true,
84 },
85 {
86 .vtype = VCAP_TYPE_IS2, /* IS2-0 */
87 .vinst = 0,
88 .map_id = 4,
89 .lookups = SPARX5_IS2_LOOKUPS,
90 .lookups_per_instance = SPARX5_IS2_LOOKUPS / 2,
91 .first_cid = SPARX5_VCAP_CID_IS2_L0,
92 .last_cid = SPARX5_VCAP_CID_IS2_L2 - 1,
93 .blockno = 0, /* Maps block 0-1 */
94 .blocks = 2,
95 .ingress = true,
96 },
97 {
98 .vtype = VCAP_TYPE_IS2, /* IS2-1 */
99 .vinst = 1,
100 .map_id = 5,
101 .lookups = SPARX5_IS2_LOOKUPS,
102 .lookups_per_instance = SPARX5_IS2_LOOKUPS / 2,
103 .first_cid = SPARX5_VCAP_CID_IS2_L2,
104 .last_cid = SPARX5_VCAP_CID_IS2_MAX,
105 .blockno = 2, /* Maps block 2-3 */
106 .blocks = 2,
107 .ingress = true,
108 },
109 {
110 .vtype = VCAP_TYPE_ES0,
111 .lookups = SPARX5_ES0_LOOKUPS,
112 .lookups_per_instance = SPARX5_ES0_LOOKUPS,
113 .first_cid = SPARX5_VCAP_CID_ES0_L0,
114 .last_cid = SPARX5_VCAP_CID_ES0_MAX,
115 .count = 4096, /* Addresses according to datasheet */
116 .ingress = false,
117 },
118 {
119 .vtype = VCAP_TYPE_ES2,
120 .lookups = SPARX5_ES2_LOOKUPS,
121 .lookups_per_instance = SPARX5_ES2_LOOKUPS,
122 .first_cid = SPARX5_VCAP_CID_ES2_L0,
123 .last_cid = SPARX5_VCAP_CID_ES2_MAX,
124 .count = 12288, /* Addresses according to datasheet */
125 .ingress = false,
126 },
127};
128
129/* These protocols have dedicated keysets in IS0 and a TC dissector */
130static u16 sparx5_vcap_is0_known_etypes[] = {
131 ETH_P_ALL,
132 ETH_P_IP,
133 ETH_P_IPV6,
134};
135
136/* These protocols have dedicated keysets in IS2 and a TC dissector */
137static u16 sparx5_vcap_is2_known_etypes[] = {
138 ETH_P_ALL,
139 ETH_P_ARP,
140 ETH_P_IP,
141 ETH_P_IPV6,
142};
143
144/* These protocols have dedicated keysets in ES2 and a TC dissector */
145static u16 sparx5_vcap_es2_known_etypes[] = {
146 ETH_P_ALL,
147 ETH_P_ARP,
148 ETH_P_IP,
149 ETH_P_IPV6,
150};
151
152static void sparx5_vcap_type_err(struct sparx5 *sparx5,
153 struct vcap_admin *admin,
154 const char *fname)
155{
156 pr_err("%s: vcap type: %s not supported\n",
157 fname, sparx5_vcaps[admin->vtype].name);
158}
159
160/* Await the super VCAP completion of the current operation */
161static void sparx5_vcap_wait_super_update(struct sparx5 *sparx5)
162{
163 u32 value;
164
165 read_poll_timeout(spx5_rd, value,
166 !VCAP_SUPER_CTRL_UPDATE_SHOT_GET(value), 500, 10000,
167 false, sparx5, VCAP_SUPER_CTRL);
168}
169
170/* Await the ES0 VCAP completion of the current operation */
171static void sparx5_vcap_wait_es0_update(struct sparx5 *sparx5)
172{
173 u32 value;
174
175 read_poll_timeout(spx5_rd, value,
176 !VCAP_ES0_CTRL_UPDATE_SHOT_GET(value), 500, 10000,
177 false, sparx5, VCAP_ES0_CTRL);
178}
179
180/* Await the ES2 VCAP completion of the current operation */
181static void sparx5_vcap_wait_es2_update(struct sparx5 *sparx5)
182{
183 u32 value;
184
185 read_poll_timeout(spx5_rd, value,
186 !VCAP_ES2_CTRL_UPDATE_SHOT_GET(value), 500, 10000,
187 false, sparx5, VCAP_ES2_CTRL);
188}
189
190/* Initializing a VCAP address range */
191static void _sparx5_vcap_range_init(struct sparx5 *sparx5,
192 struct vcap_admin *admin,
193 u32 addr, u32 count)
194{
195 u32 size = count - 1;
196
197 switch (admin->vtype) {
198 case VCAP_TYPE_IS0:
199 case VCAP_TYPE_IS2:
200 spx5_wr(VCAP_SUPER_CFG_MV_NUM_POS_SET(0) |
201 VCAP_SUPER_CFG_MV_SIZE_SET(size),
202 sparx5, VCAP_SUPER_CFG);
203 spx5_wr(VCAP_SUPER_CTRL_UPDATE_CMD_SET(VCAP_CMD_INITIALIZE) |
204 VCAP_SUPER_CTRL_UPDATE_ENTRY_DIS_SET(0) |
205 VCAP_SUPER_CTRL_UPDATE_ACTION_DIS_SET(0) |
206 VCAP_SUPER_CTRL_UPDATE_CNT_DIS_SET(0) |
207 VCAP_SUPER_CTRL_UPDATE_ADDR_SET(addr) |
208 VCAP_SUPER_CTRL_CLEAR_CACHE_SET(true) |
209 VCAP_SUPER_CTRL_UPDATE_SHOT_SET(true),
210 sparx5, VCAP_SUPER_CTRL);
211 sparx5_vcap_wait_super_update(sparx5);
212 break;
213 case VCAP_TYPE_ES0:
214 spx5_wr(VCAP_ES0_CFG_MV_NUM_POS_SET(0) |
215 VCAP_ES0_CFG_MV_SIZE_SET(size),
216 sparx5, VCAP_ES0_CFG);
217 spx5_wr(VCAP_ES0_CTRL_UPDATE_CMD_SET(VCAP_CMD_INITIALIZE) |
218 VCAP_ES0_CTRL_UPDATE_ENTRY_DIS_SET(0) |
219 VCAP_ES0_CTRL_UPDATE_ACTION_DIS_SET(0) |
220 VCAP_ES0_CTRL_UPDATE_CNT_DIS_SET(0) |
221 VCAP_ES0_CTRL_UPDATE_ADDR_SET(addr) |
222 VCAP_ES0_CTRL_CLEAR_CACHE_SET(true) |
223 VCAP_ES0_CTRL_UPDATE_SHOT_SET(true),
224 sparx5, VCAP_ES0_CTRL);
225 sparx5_vcap_wait_es0_update(sparx5);
226 break;
227 case VCAP_TYPE_ES2:
228 spx5_wr(VCAP_ES2_CFG_MV_NUM_POS_SET(0) |
229 VCAP_ES2_CFG_MV_SIZE_SET(size),
230 sparx5, VCAP_ES2_CFG);
231 spx5_wr(VCAP_ES2_CTRL_UPDATE_CMD_SET(VCAP_CMD_INITIALIZE) |
232 VCAP_ES2_CTRL_UPDATE_ENTRY_DIS_SET(0) |
233 VCAP_ES2_CTRL_UPDATE_ACTION_DIS_SET(0) |
234 VCAP_ES2_CTRL_UPDATE_CNT_DIS_SET(0) |
235 VCAP_ES2_CTRL_UPDATE_ADDR_SET(addr) |
236 VCAP_ES2_CTRL_CLEAR_CACHE_SET(true) |
237 VCAP_ES2_CTRL_UPDATE_SHOT_SET(true),
238 sparx5, VCAP_ES2_CTRL);
239 sparx5_vcap_wait_es2_update(sparx5);
240 break;
241 default:
242 sparx5_vcap_type_err(sparx5, admin, __func__);
243 break;
244 }
245}
246
247/* Initializing VCAP rule data area */
248static void sparx5_vcap_block_init(struct sparx5 *sparx5,
249 struct vcap_admin *admin)
250{
251 _sparx5_vcap_range_init(sparx5, admin, admin->first_valid_addr,
252 admin->last_valid_addr -
253 admin->first_valid_addr);
254}
255
256/* Get the keyset name from the sparx5 VCAP model */
257static const char *sparx5_vcap_keyset_name(struct net_device *ndev,
258 enum vcap_keyfield_set keyset)
259{
260 struct sparx5_port *port = netdev_priv(ndev);
261
262 return vcap_keyset_name(port->sparx5->vcap_ctrl, keyset);
263}
264
265/* Check if this is the first lookup of IS0 */
266static bool sparx5_vcap_is0_is_first_chain(struct vcap_rule *rule)
267{
268 return (rule->vcap_chain_id >= SPARX5_VCAP_CID_IS0_L0 &&
269 rule->vcap_chain_id < SPARX5_VCAP_CID_IS0_L1) ||
270 ((rule->vcap_chain_id >= SPARX5_VCAP_CID_IS0_L2 &&
271 rule->vcap_chain_id < SPARX5_VCAP_CID_IS0_L3)) ||
272 ((rule->vcap_chain_id >= SPARX5_VCAP_CID_IS0_L4 &&
273 rule->vcap_chain_id < SPARX5_VCAP_CID_IS0_L5));
274}
275
276/* Check if this is the first lookup of IS2 */
277static bool sparx5_vcap_is2_is_first_chain(struct vcap_rule *rule)
278{
279 return (rule->vcap_chain_id >= SPARX5_VCAP_CID_IS2_L0 &&
280 rule->vcap_chain_id < SPARX5_VCAP_CID_IS2_L1) ||
281 ((rule->vcap_chain_id >= SPARX5_VCAP_CID_IS2_L2 &&
282 rule->vcap_chain_id < SPARX5_VCAP_CID_IS2_L3));
283}
284
285static bool sparx5_vcap_es2_is_first_chain(struct vcap_rule *rule)
286{
287 return (rule->vcap_chain_id >= SPARX5_VCAP_CID_ES2_L0 &&
288 rule->vcap_chain_id < SPARX5_VCAP_CID_ES2_L1);
289}
290
291/* Set the narrow range ingress port mask on a rule */
292static void sparx5_vcap_add_ingress_range_port_mask(struct vcap_rule *rule,
293 struct net_device *ndev)
294{
295 struct sparx5_port *port = netdev_priv(ndev);
296 u32 port_mask;
297 u32 range;
298
299 range = port->portno / BITS_PER_TYPE(u32);
300 /* Port bit set to match-any */
301 port_mask = ~BIT(port->portno % BITS_PER_TYPE(u32));
302 vcap_rule_add_key_u32(rule, VCAP_KF_IF_IGR_PORT_MASK_SEL, 0, 0xf);
303 vcap_rule_add_key_u32(rule, VCAP_KF_IF_IGR_PORT_MASK_RNG, range, 0xf);
304 vcap_rule_add_key_u32(rule, VCAP_KF_IF_IGR_PORT_MASK, 0, port_mask);
305}
306
307/* Set the wide range ingress port mask on a rule */
308static void sparx5_vcap_add_wide_port_mask(struct vcap_rule *rule,
309 struct net_device *ndev)
310{
311 struct sparx5_port *port = netdev_priv(ndev);
312 struct vcap_u72_key port_mask;
313 u32 range;
314
315 /* Port bit set to match-any */
316 memset(port_mask.value, 0, sizeof(port_mask.value));
317 memset(port_mask.mask, 0xff, sizeof(port_mask.mask));
318 range = port->portno / BITS_PER_BYTE;
319 port_mask.mask[range] = ~BIT(port->portno % BITS_PER_BYTE);
320 vcap_rule_add_key_u72(rule, VCAP_KF_IF_IGR_PORT_MASK, &port_mask);
321}
322
323static void sparx5_vcap_add_egress_range_port_mask(struct vcap_rule *rule,
324 struct net_device *ndev)
325{
326 struct sparx5_port *port = netdev_priv(ndev);
327 u32 port_mask;
328 u32 range;
329
330 /* Mask range selects:
331 * 0-2: Physical/Logical egress port number 0-31, 32–63, 64.
332 * 3-5: Virtual Interface Number 0-31, 32-63, 64.
333 * 6: CPU queue Number 0-7.
334 *
335 * Use physical/logical port ranges (0-2)
336 */
337 range = port->portno / BITS_PER_TYPE(u32);
338 /* Port bit set to match-any */
339 port_mask = ~BIT(port->portno % BITS_PER_TYPE(u32));
340 vcap_rule_add_key_u32(rule, VCAP_KF_IF_EGR_PORT_MASK_RNG, range, 0xf);
341 vcap_rule_add_key_u32(rule, VCAP_KF_IF_EGR_PORT_MASK, 0, port_mask);
342}
343
344/* Convert IS0 chain id to vcap lookup id */
345static int sparx5_vcap_is0_cid_to_lookup(int cid)
346{
347 int lookup = 0;
348
349 if (cid >= SPARX5_VCAP_CID_IS0_L1 && cid < SPARX5_VCAP_CID_IS0_L2)
350 lookup = 1;
351 else if (cid >= SPARX5_VCAP_CID_IS0_L2 && cid < SPARX5_VCAP_CID_IS0_L3)
352 lookup = 2;
353 else if (cid >= SPARX5_VCAP_CID_IS0_L3 && cid < SPARX5_VCAP_CID_IS0_L4)
354 lookup = 3;
355 else if (cid >= SPARX5_VCAP_CID_IS0_L4 && cid < SPARX5_VCAP_CID_IS0_L5)
356 lookup = 4;
357 else if (cid >= SPARX5_VCAP_CID_IS0_L5 && cid < SPARX5_VCAP_CID_IS0_MAX)
358 lookup = 5;
359
360 return lookup;
361}
362
363/* Convert IS2 chain id to vcap lookup id */
364static int sparx5_vcap_is2_cid_to_lookup(int cid)
365{
366 int lookup = 0;
367
368 if (cid >= SPARX5_VCAP_CID_IS2_L1 && cid < SPARX5_VCAP_CID_IS2_L2)
369 lookup = 1;
370 else if (cid >= SPARX5_VCAP_CID_IS2_L2 && cid < SPARX5_VCAP_CID_IS2_L3)
371 lookup = 2;
372 else if (cid >= SPARX5_VCAP_CID_IS2_L3 && cid < SPARX5_VCAP_CID_IS2_MAX)
373 lookup = 3;
374
375 return lookup;
376}
377
378/* Convert ES2 chain id to vcap lookup id */
379static int sparx5_vcap_es2_cid_to_lookup(int cid)
380{
381 int lookup = 0;
382
383 if (cid >= SPARX5_VCAP_CID_ES2_L1)
384 lookup = 1;
385
386 return lookup;
387}
388
389/* Add ethernet type IS0 keyset to a list */
390static void
391sparx5_vcap_is0_get_port_etype_keysets(struct vcap_keyset_list *keysetlist,
392 u32 value)
393{
394 switch (ANA_CL_ADV_CL_CFG_ETYPE_CLM_KEY_SEL_GET(value)) {
395 case VCAP_IS0_PS_ETYPE_NORMAL_7TUPLE:
396 vcap_keyset_list_add(keysetlist, VCAP_KFS_NORMAL_7TUPLE);
397 break;
398 case VCAP_IS0_PS_ETYPE_NORMAL_5TUPLE_IP4:
399 vcap_keyset_list_add(keysetlist, VCAP_KFS_NORMAL_5TUPLE_IP4);
400 break;
401 }
402}
403
404/* Return the list of keysets for the vcap port configuration */
405static int sparx5_vcap_is0_get_port_keysets(struct net_device *ndev,
406 int lookup,
407 struct vcap_keyset_list *keysetlist,
408 u16 l3_proto)
409{
410 struct sparx5_port *port = netdev_priv(ndev);
411 struct sparx5 *sparx5 = port->sparx5;
412 int portno = port->portno;
413 u32 value;
414
415 value = spx5_rd(sparx5, ANA_CL_ADV_CL_CFG(portno, lookup));
416
417 /* Collect all keysets for the port in a list */
418 if (l3_proto == ETH_P_ALL)
419 sparx5_vcap_is0_get_port_etype_keysets(keysetlist, value);
420
421 if (l3_proto == ETH_P_ALL || l3_proto == ETH_P_IP)
422 switch (ANA_CL_ADV_CL_CFG_IP4_CLM_KEY_SEL_GET(value)) {
423 case VCAP_IS0_PS_ETYPE_DEFAULT:
424 sparx5_vcap_is0_get_port_etype_keysets(keysetlist,
425 value);
426 break;
427 case VCAP_IS0_PS_ETYPE_NORMAL_7TUPLE:
428 vcap_keyset_list_add(keysetlist,
429 VCAP_KFS_NORMAL_7TUPLE);
430 break;
431 case VCAP_IS0_PS_ETYPE_NORMAL_5TUPLE_IP4:
432 vcap_keyset_list_add(keysetlist,
433 VCAP_KFS_NORMAL_5TUPLE_IP4);
434 break;
435 }
436
437 if (l3_proto == ETH_P_ALL || l3_proto == ETH_P_IPV6)
438 switch (ANA_CL_ADV_CL_CFG_IP6_CLM_KEY_SEL_GET(value)) {
439 case VCAP_IS0_PS_ETYPE_DEFAULT:
440 sparx5_vcap_is0_get_port_etype_keysets(keysetlist,
441 value);
442 break;
443 case VCAP_IS0_PS_ETYPE_NORMAL_7TUPLE:
444 vcap_keyset_list_add(keysetlist,
445 VCAP_KFS_NORMAL_7TUPLE);
446 break;
447 case VCAP_IS0_PS_ETYPE_NORMAL_5TUPLE_IP4:
448 vcap_keyset_list_add(keysetlist,
449 VCAP_KFS_NORMAL_5TUPLE_IP4);
450 break;
451 }
452
453 if (l3_proto != ETH_P_IP && l3_proto != ETH_P_IPV6)
454 sparx5_vcap_is0_get_port_etype_keysets(keysetlist, value);
455 return 0;
456}
457
458/* Return the list of keysets for the vcap port configuration */
459static int sparx5_vcap_is2_get_port_keysets(struct net_device *ndev,
460 int lookup,
461 struct vcap_keyset_list *keysetlist,
462 u16 l3_proto)
463{
464 struct sparx5_port *port = netdev_priv(ndev);
465 struct sparx5 *sparx5 = port->sparx5;
466 int portno = port->portno;
467 u32 value;
468
469 value = spx5_rd(sparx5, ANA_ACL_VCAP_S2_KEY_SEL(portno, lookup));
470
471 /* Collect all keysets for the port in a list */
472 if (l3_proto == ETH_P_ALL || l3_proto == ETH_P_ARP) {
473 switch (ANA_ACL_VCAP_S2_KEY_SEL_ARP_KEY_SEL_GET(value)) {
474 case VCAP_IS2_PS_ARP_MAC_ETYPE:
475 vcap_keyset_list_add(keysetlist, VCAP_KFS_MAC_ETYPE);
476 break;
477 case VCAP_IS2_PS_ARP_ARP:
478 vcap_keyset_list_add(keysetlist, VCAP_KFS_ARP);
479 break;
480 }
481 }
482
483 if (l3_proto == ETH_P_ALL || l3_proto == ETH_P_IP) {
484 switch (ANA_ACL_VCAP_S2_KEY_SEL_IP4_UC_KEY_SEL_GET(value)) {
485 case VCAP_IS2_PS_IPV4_UC_MAC_ETYPE:
486 vcap_keyset_list_add(keysetlist, VCAP_KFS_MAC_ETYPE);
487 break;
488 case VCAP_IS2_PS_IPV4_UC_IP4_TCP_UDP_OTHER:
489 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_TCP_UDP);
490 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_OTHER);
491 break;
492 case VCAP_IS2_PS_IPV4_UC_IP_7TUPLE:
493 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP_7TUPLE);
494 break;
495 }
496
497 switch (ANA_ACL_VCAP_S2_KEY_SEL_IP4_MC_KEY_SEL_GET(value)) {
498 case VCAP_IS2_PS_IPV4_MC_MAC_ETYPE:
499 vcap_keyset_list_add(keysetlist, VCAP_KFS_MAC_ETYPE);
500 break;
501 case VCAP_IS2_PS_IPV4_MC_IP4_TCP_UDP_OTHER:
502 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_TCP_UDP);
503 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_OTHER);
504 break;
505 case VCAP_IS2_PS_IPV4_MC_IP_7TUPLE:
506 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP_7TUPLE);
507 break;
508 }
509 }
510
511 if (l3_proto == ETH_P_ALL || l3_proto == ETH_P_IPV6) {
512 switch (ANA_ACL_VCAP_S2_KEY_SEL_IP6_UC_KEY_SEL_GET(value)) {
513 case VCAP_IS2_PS_IPV6_UC_MAC_ETYPE:
514 vcap_keyset_list_add(keysetlist, VCAP_KFS_MAC_ETYPE);
515 break;
516 case VCAP_IS2_PS_IPV6_UC_IP_7TUPLE:
517 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP_7TUPLE);
518 break;
519 case VCAP_IS2_PS_IPV6_UC_IP6_STD:
520 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP6_STD);
521 break;
522 case VCAP_IS2_PS_IPV6_UC_IP4_TCP_UDP_OTHER:
523 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_TCP_UDP);
524 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_OTHER);
525 break;
526 }
527
528 switch (ANA_ACL_VCAP_S2_KEY_SEL_IP6_MC_KEY_SEL_GET(value)) {
529 case VCAP_IS2_PS_IPV6_MC_MAC_ETYPE:
530 vcap_keyset_list_add(keysetlist, VCAP_KFS_MAC_ETYPE);
531 break;
532 case VCAP_IS2_PS_IPV6_MC_IP_7TUPLE:
533 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP_7TUPLE);
534 break;
535 case VCAP_IS2_PS_IPV6_MC_IP6_STD:
536 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP6_STD);
537 break;
538 case VCAP_IS2_PS_IPV6_MC_IP4_TCP_UDP_OTHER:
539 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_TCP_UDP);
540 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_OTHER);
541 break;
542 case VCAP_IS2_PS_IPV6_MC_IP6_VID:
543 /* Not used */
544 break;
545 }
546 }
547
548 if (l3_proto != ETH_P_ARP && l3_proto != ETH_P_IP &&
549 l3_proto != ETH_P_IPV6) {
550 switch (ANA_ACL_VCAP_S2_KEY_SEL_NON_ETH_KEY_SEL_GET(value)) {
551 case VCAP_IS2_PS_NONETH_MAC_ETYPE:
552 /* IS2 non-classified frames generate MAC_ETYPE */
553 vcap_keyset_list_add(keysetlist, VCAP_KFS_MAC_ETYPE);
554 break;
555 }
556 }
557 return 0;
558}
559
560/* Return the keysets for the vcap port IP4 traffic class configuration */
561static void
562sparx5_vcap_es2_get_port_ipv4_keysets(struct vcap_keyset_list *keysetlist,
563 u32 value)
564{
565 switch (EACL_VCAP_ES2_KEY_SEL_IP4_KEY_SEL_GET(value)) {
566 case VCAP_ES2_PS_IPV4_MAC_ETYPE:
567 vcap_keyset_list_add(keysetlist, VCAP_KFS_MAC_ETYPE);
568 break;
569 case VCAP_ES2_PS_IPV4_IP_7TUPLE:
570 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP_7TUPLE);
571 break;
572 case VCAP_ES2_PS_IPV4_IP4_TCP_UDP_VID:
573 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_TCP_UDP);
574 break;
575 case VCAP_ES2_PS_IPV4_IP4_TCP_UDP_OTHER:
576 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_TCP_UDP);
577 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_OTHER);
578 break;
579 case VCAP_ES2_PS_IPV4_IP4_VID:
580 /* Not used */
581 break;
582 case VCAP_ES2_PS_IPV4_IP4_OTHER:
583 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_OTHER);
584 break;
585 }
586}
587
588/* Return the list of keysets for the vcap port configuration */
589static int sparx5_vcap_es0_get_port_keysets(struct net_device *ndev,
590 struct vcap_keyset_list *keysetlist,
591 u16 l3_proto)
592{
593 struct sparx5_port *port = netdev_priv(ndev);
594 struct sparx5 *sparx5 = port->sparx5;
595 int portno = port->portno;
596 u32 value;
597
598 value = spx5_rd(sparx5, REW_RTAG_ETAG_CTRL(portno));
599
600 /* Collect all keysets for the port in a list */
601 switch (REW_RTAG_ETAG_CTRL_ES0_ISDX_KEY_ENA_GET(value)) {
602 case VCAP_ES0_PS_NORMAL_SELECTION:
603 case VCAP_ES0_PS_FORCE_ISDX_LOOKUPS:
604 vcap_keyset_list_add(keysetlist, VCAP_KFS_ISDX);
605 break;
606 default:
607 break;
608 }
609 return 0;
610}
611
612/* Return the list of keysets for the vcap port configuration */
613static int sparx5_vcap_es2_get_port_keysets(struct net_device *ndev,
614 int lookup,
615 struct vcap_keyset_list *keysetlist,
616 u16 l3_proto)
617{
618 struct sparx5_port *port = netdev_priv(ndev);
619 struct sparx5 *sparx5 = port->sparx5;
620 int portno = port->portno;
621 u32 value;
622
623 value = spx5_rd(sparx5, EACL_VCAP_ES2_KEY_SEL(portno, lookup));
624
625 /* Collect all keysets for the port in a list */
626 if (l3_proto == ETH_P_ALL || l3_proto == ETH_P_ARP) {
627 switch (EACL_VCAP_ES2_KEY_SEL_ARP_KEY_SEL_GET(value)) {
628 case VCAP_ES2_PS_ARP_MAC_ETYPE:
629 vcap_keyset_list_add(keysetlist, VCAP_KFS_MAC_ETYPE);
630 break;
631 case VCAP_ES2_PS_ARP_ARP:
632 vcap_keyset_list_add(keysetlist, VCAP_KFS_ARP);
633 break;
634 }
635 }
636
637 if (l3_proto == ETH_P_ALL || l3_proto == ETH_P_IP)
638 sparx5_vcap_es2_get_port_ipv4_keysets(keysetlist, value);
639
640 if (l3_proto == ETH_P_ALL || l3_proto == ETH_P_IPV6) {
641 switch (EACL_VCAP_ES2_KEY_SEL_IP6_KEY_SEL_GET(value)) {
642 case VCAP_ES2_PS_IPV6_MAC_ETYPE:
643 vcap_keyset_list_add(keysetlist, VCAP_KFS_MAC_ETYPE);
644 break;
645 case VCAP_ES2_PS_IPV6_IP_7TUPLE:
646 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP_7TUPLE);
647 break;
648 case VCAP_ES2_PS_IPV6_IP_7TUPLE_VID:
649 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP_7TUPLE);
650 break;
651 case VCAP_ES2_PS_IPV6_IP_7TUPLE_STD:
652 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP_7TUPLE);
653 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP6_STD);
654 break;
655 case VCAP_ES2_PS_IPV6_IP6_VID:
656 /* Not used */
657 break;
658 case VCAP_ES2_PS_IPV6_IP6_STD:
659 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP6_STD);
660 break;
661 case VCAP_ES2_PS_IPV6_IP4_DOWNGRADE:
662 sparx5_vcap_es2_get_port_ipv4_keysets(keysetlist,
663 value);
664 break;
665 }
666 }
667
668 if (l3_proto != ETH_P_ARP && l3_proto != ETH_P_IP &&
669 l3_proto != ETH_P_IPV6) {
670 vcap_keyset_list_add(keysetlist, VCAP_KFS_MAC_ETYPE);
671 }
672 return 0;
673}
674
675/* Get the port keyset for the vcap lookup */
676int sparx5_vcap_get_port_keyset(struct net_device *ndev,
677 struct vcap_admin *admin,
678 int cid,
679 u16 l3_proto,
680 struct vcap_keyset_list *kslist)
681{
682 int lookup, err = -EINVAL;
683 struct sparx5_port *port;
684
685 switch (admin->vtype) {
686 case VCAP_TYPE_IS0:
687 lookup = sparx5_vcap_is0_cid_to_lookup(cid);
688 err = sparx5_vcap_is0_get_port_keysets(ndev, lookup, kslist,
689 l3_proto);
690 break;
691 case VCAP_TYPE_IS2:
692 lookup = sparx5_vcap_is2_cid_to_lookup(cid);
693 err = sparx5_vcap_is2_get_port_keysets(ndev, lookup, kslist,
694 l3_proto);
695 break;
696 case VCAP_TYPE_ES0:
697 err = sparx5_vcap_es0_get_port_keysets(ndev, kslist, l3_proto);
698 break;
699 case VCAP_TYPE_ES2:
700 lookup = sparx5_vcap_es2_cid_to_lookup(cid);
701 err = sparx5_vcap_es2_get_port_keysets(ndev, lookup, kslist,
702 l3_proto);
703 break;
704 default:
705 port = netdev_priv(ndev);
706 sparx5_vcap_type_err(port->sparx5, admin, __func__);
707 break;
708 }
709 return err;
710}
711
712/* Check if the ethertype is supported by the vcap port classification */
713bool sparx5_vcap_is_known_etype(struct vcap_admin *admin, u16 etype)
714{
715 const u16 *known_etypes;
716 int size, idx;
717
718 switch (admin->vtype) {
719 case VCAP_TYPE_IS0:
720 known_etypes = sparx5_vcap_is0_known_etypes;
721 size = ARRAY_SIZE(sparx5_vcap_is0_known_etypes);
722 break;
723 case VCAP_TYPE_IS2:
724 known_etypes = sparx5_vcap_is2_known_etypes;
725 size = ARRAY_SIZE(sparx5_vcap_is2_known_etypes);
726 break;
727 case VCAP_TYPE_ES0:
728 return true;
729 case VCAP_TYPE_ES2:
730 known_etypes = sparx5_vcap_es2_known_etypes;
731 size = ARRAY_SIZE(sparx5_vcap_es2_known_etypes);
732 break;
733 default:
734 return false;
735 }
736 for (idx = 0; idx < size; ++idx)
737 if (known_etypes[idx] == etype)
738 return true;
739 return false;
740}
741
742/* API callback used for validating a field keyset (check the port keysets) */
743static enum vcap_keyfield_set
744sparx5_vcap_validate_keyset(struct net_device *ndev,
745 struct vcap_admin *admin,
746 struct vcap_rule *rule,
747 struct vcap_keyset_list *kslist,
748 u16 l3_proto)
749{
750 struct vcap_keyset_list keysetlist = {};
751 enum vcap_keyfield_set keysets[10] = {};
752 struct sparx5_port *port;
753 int idx, jdx, lookup;
754
755 if (!kslist || kslist->cnt == 0)
756 return VCAP_KFS_NO_VALUE;
757
758 keysetlist.max = ARRAY_SIZE(keysets);
759 keysetlist.keysets = keysets;
760
761 /* Get a list of currently configured keysets in the lookups */
762 switch (admin->vtype) {
763 case VCAP_TYPE_IS0:
764 lookup = sparx5_vcap_is0_cid_to_lookup(rule->vcap_chain_id);
765 sparx5_vcap_is0_get_port_keysets(ndev, lookup, &keysetlist,
766 l3_proto);
767 break;
768 case VCAP_TYPE_IS2:
769 lookup = sparx5_vcap_is2_cid_to_lookup(rule->vcap_chain_id);
770 sparx5_vcap_is2_get_port_keysets(ndev, lookup, &keysetlist,
771 l3_proto);
772 break;
773 case VCAP_TYPE_ES0:
774 sparx5_vcap_es0_get_port_keysets(ndev, &keysetlist, l3_proto);
775 break;
776 case VCAP_TYPE_ES2:
777 lookup = sparx5_vcap_es2_cid_to_lookup(rule->vcap_chain_id);
778 sparx5_vcap_es2_get_port_keysets(ndev, lookup, &keysetlist,
779 l3_proto);
780 break;
781 default:
782 port = netdev_priv(ndev);
783 sparx5_vcap_type_err(port->sparx5, admin, __func__);
784 break;
785 }
786
787 /* Check if there is a match and return the match */
788 for (idx = 0; idx < kslist->cnt; ++idx)
789 for (jdx = 0; jdx < keysetlist.cnt; ++jdx)
790 if (kslist->keysets[idx] == keysets[jdx])
791 return kslist->keysets[idx];
792
793 pr_err("%s:%d: %s not supported in port key selection\n",
794 __func__, __LINE__,
795 sparx5_vcap_keyset_name(ndev, kslist->keysets[0]));
796
797 return -ENOENT;
798}
799
800static void sparx5_vcap_ingress_add_default_fields(struct net_device *ndev,
801 struct vcap_admin *admin,
802 struct vcap_rule *rule)
803{
804 const struct vcap_field *field;
805 bool is_first;
806
807 /* Add ingress port mask matching the net device */
808 field = vcap_lookup_keyfield(rule, VCAP_KF_IF_IGR_PORT_MASK);
809 if (field && field->width == SPX5_PORTS)
810 sparx5_vcap_add_wide_port_mask(rule, ndev);
811 else if (field && field->width == BITS_PER_TYPE(u32))
812 sparx5_vcap_add_ingress_range_port_mask(rule, ndev);
813 else
814 pr_err("%s:%d: %s: could not add an ingress port mask for: %s\n",
815 __func__, __LINE__, netdev_name(ndev),
816 sparx5_vcap_keyset_name(ndev, rule->keyset));
817
818 if (admin->vtype == VCAP_TYPE_IS0)
819 is_first = sparx5_vcap_is0_is_first_chain(rule);
820 else
821 is_first = sparx5_vcap_is2_is_first_chain(rule);
822
823 /* Add key that selects the first/second lookup */
824 if (is_first)
825 vcap_rule_add_key_bit(rule, VCAP_KF_LOOKUP_FIRST_IS,
826 VCAP_BIT_1);
827 else
828 vcap_rule_add_key_bit(rule, VCAP_KF_LOOKUP_FIRST_IS,
829 VCAP_BIT_0);
830}
831
832static void sparx5_vcap_es0_add_default_fields(struct net_device *ndev,
833 struct vcap_admin *admin,
834 struct vcap_rule *rule)
835{
836 struct sparx5_port *port = netdev_priv(ndev);
837
838 vcap_rule_add_key_u32(rule, VCAP_KF_IF_EGR_PORT_NO, port->portno, ~0);
839 /* Match untagged frames if there was no VLAN key */
840 vcap_rule_add_key_u32(rule, VCAP_KF_8021Q_TPID, SPX5_TPID_SEL_UNTAGGED,
841 ~0);
842}
843
844static void sparx5_vcap_es2_add_default_fields(struct net_device *ndev,
845 struct vcap_admin *admin,
846 struct vcap_rule *rule)
847{
848 const struct vcap_field *field;
849 bool is_first;
850
851 /* Add egress port mask matching the net device */
852 field = vcap_lookup_keyfield(rule, VCAP_KF_IF_EGR_PORT_MASK);
853 if (field)
854 sparx5_vcap_add_egress_range_port_mask(rule, ndev);
855
856 /* Add key that selects the first/second lookup */
857 is_first = sparx5_vcap_es2_is_first_chain(rule);
858
859 if (is_first)
860 vcap_rule_add_key_bit(rule, VCAP_KF_LOOKUP_FIRST_IS,
861 VCAP_BIT_1);
862 else
863 vcap_rule_add_key_bit(rule, VCAP_KF_LOOKUP_FIRST_IS,
864 VCAP_BIT_0);
865}
866
867/* API callback used for adding default fields to a rule */
868static void sparx5_vcap_add_default_fields(struct net_device *ndev,
869 struct vcap_admin *admin,
870 struct vcap_rule *rule)
871{
872 struct sparx5_port *port;
873
874 /* add the lookup bit */
875 switch (admin->vtype) {
876 case VCAP_TYPE_IS0:
877 case VCAP_TYPE_IS2:
878 sparx5_vcap_ingress_add_default_fields(ndev, admin, rule);
879 break;
880 case VCAP_TYPE_ES0:
881 sparx5_vcap_es0_add_default_fields(ndev, admin, rule);
882 break;
883 case VCAP_TYPE_ES2:
884 sparx5_vcap_es2_add_default_fields(ndev, admin, rule);
885 break;
886 default:
887 port = netdev_priv(ndev);
888 sparx5_vcap_type_err(port->sparx5, admin, __func__);
889 break;
890 }
891}
892
893/* API callback used for erasing the vcap cache area (not the register area) */
894static void sparx5_vcap_cache_erase(struct vcap_admin *admin)
895{
896 memset(admin->cache.keystream, 0, STREAMSIZE);
897 memset(admin->cache.maskstream, 0, STREAMSIZE);
898 memset(admin->cache.actionstream, 0, STREAMSIZE);
899 memset(&admin->cache.counter, 0, sizeof(admin->cache.counter));
900}
901
902static void sparx5_vcap_is0_cache_write(struct sparx5 *sparx5,
903 struct vcap_admin *admin,
904 enum vcap_selection sel,
905 u32 start,
906 u32 count)
907{
908 u32 *keystr, *mskstr, *actstr;
909 int idx;
910
911 keystr = &admin->cache.keystream[start];
912 mskstr = &admin->cache.maskstream[start];
913 actstr = &admin->cache.actionstream[start];
914
915 switch (sel) {
916 case VCAP_SEL_ENTRY:
917 for (idx = 0; idx < count; ++idx) {
918 /* Avoid 'match-off' by setting value & mask */
919 spx5_wr(keystr[idx] & mskstr[idx], sparx5,
920 VCAP_SUPER_VCAP_ENTRY_DAT(idx));
921 spx5_wr(~mskstr[idx], sparx5,
922 VCAP_SUPER_VCAP_MASK_DAT(idx));
923 }
924 break;
925 case VCAP_SEL_ACTION:
926 for (idx = 0; idx < count; ++idx)
927 spx5_wr(actstr[idx], sparx5,
928 VCAP_SUPER_VCAP_ACTION_DAT(idx));
929 break;
930 case VCAP_SEL_ALL:
931 pr_err("%s:%d: cannot write all streams at once\n",
932 __func__, __LINE__);
933 break;
934 default:
935 break;
936 }
937
938 if (sel & VCAP_SEL_COUNTER)
939 spx5_wr(admin->cache.counter, sparx5,
940 VCAP_SUPER_VCAP_CNT_DAT(0));
941}
942
943static void sparx5_vcap_is2_cache_write(struct sparx5 *sparx5,
944 struct vcap_admin *admin,
945 enum vcap_selection sel,
946 u32 start,
947 u32 count)
948{
949 u32 *keystr, *mskstr, *actstr;
950 int idx;
951
952 keystr = &admin->cache.keystream[start];
953 mskstr = &admin->cache.maskstream[start];
954 actstr = &admin->cache.actionstream[start];
955
956 switch (sel) {
957 case VCAP_SEL_ENTRY:
958 for (idx = 0; idx < count; ++idx) {
959 /* Avoid 'match-off' by setting value & mask */
960 spx5_wr(keystr[idx] & mskstr[idx], sparx5,
961 VCAP_SUPER_VCAP_ENTRY_DAT(idx));
962 spx5_wr(~mskstr[idx], sparx5,
963 VCAP_SUPER_VCAP_MASK_DAT(idx));
964 }
965 break;
966 case VCAP_SEL_ACTION:
967 for (idx = 0; idx < count; ++idx)
968 spx5_wr(actstr[idx], sparx5,
969 VCAP_SUPER_VCAP_ACTION_DAT(idx));
970 break;
971 case VCAP_SEL_ALL:
972 pr_err("%s:%d: cannot write all streams at once\n",
973 __func__, __LINE__);
974 break;
975 default:
976 break;
977 }
978 if (sel & VCAP_SEL_COUNTER) {
979 start = start & 0xfff; /* counter limit */
980 if (admin->vinst == 0)
981 spx5_wr(admin->cache.counter, sparx5,
982 ANA_ACL_CNT_A(start));
983 else
984 spx5_wr(admin->cache.counter, sparx5,
985 ANA_ACL_CNT_B(start));
986 spx5_wr(admin->cache.sticky, sparx5,
987 VCAP_SUPER_VCAP_CNT_DAT(0));
988 }
989}
990
991/* Use ESDX counters located in the XQS */
992static void sparx5_es0_write_esdx_counter(struct sparx5 *sparx5,
993 struct vcap_admin *admin, u32 id)
994{
995 mutex_lock(&sparx5->queue_stats_lock);
996 spx5_wr(XQS_STAT_CFG_STAT_VIEW_SET(id), sparx5, XQS_STAT_CFG);
997 spx5_wr(admin->cache.counter, sparx5,
998 XQS_CNT(SPARX5_STAT_ESDX_GRN_PKTS));
999 spx5_wr(0, sparx5, XQS_CNT(SPARX5_STAT_ESDX_YEL_PKTS));
1000 mutex_unlock(&sparx5->queue_stats_lock);
1001}
1002
1003static void sparx5_vcap_es0_cache_write(struct sparx5 *sparx5,
1004 struct vcap_admin *admin,
1005 enum vcap_selection sel,
1006 u32 start,
1007 u32 count)
1008{
1009 u32 *keystr, *mskstr, *actstr;
1010 int idx;
1011
1012 keystr = &admin->cache.keystream[start];
1013 mskstr = &admin->cache.maskstream[start];
1014 actstr = &admin->cache.actionstream[start];
1015
1016 switch (sel) {
1017 case VCAP_SEL_ENTRY:
1018 for (idx = 0; idx < count; ++idx) {
1019 /* Avoid 'match-off' by setting value & mask */
1020 spx5_wr(keystr[idx] & mskstr[idx], sparx5,
1021 VCAP_ES0_VCAP_ENTRY_DAT(idx));
1022 spx5_wr(~mskstr[idx], sparx5,
1023 VCAP_ES0_VCAP_MASK_DAT(idx));
1024 }
1025 break;
1026 case VCAP_SEL_ACTION:
1027 for (idx = 0; idx < count; ++idx)
1028 spx5_wr(actstr[idx], sparx5,
1029 VCAP_ES0_VCAP_ACTION_DAT(idx));
1030 break;
1031 case VCAP_SEL_ALL:
1032 pr_err("%s:%d: cannot write all streams at once\n",
1033 __func__, __LINE__);
1034 break;
1035 default:
1036 break;
1037 }
1038 if (sel & VCAP_SEL_COUNTER) {
1039 spx5_wr(admin->cache.counter, sparx5, VCAP_ES0_VCAP_CNT_DAT(0));
1040 sparx5_es0_write_esdx_counter(sparx5, admin, start);
1041 }
1042}
1043
1044static void sparx5_vcap_es2_cache_write(struct sparx5 *sparx5,
1045 struct vcap_admin *admin,
1046 enum vcap_selection sel,
1047 u32 start,
1048 u32 count)
1049{
1050 u32 *keystr, *mskstr, *actstr;
1051 int idx;
1052
1053 keystr = &admin->cache.keystream[start];
1054 mskstr = &admin->cache.maskstream[start];
1055 actstr = &admin->cache.actionstream[start];
1056
1057 switch (sel) {
1058 case VCAP_SEL_ENTRY:
1059 for (idx = 0; idx < count; ++idx) {
1060 /* Avoid 'match-off' by setting value & mask */
1061 spx5_wr(keystr[idx] & mskstr[idx], sparx5,
1062 VCAP_ES2_VCAP_ENTRY_DAT(idx));
1063 spx5_wr(~mskstr[idx], sparx5,
1064 VCAP_ES2_VCAP_MASK_DAT(idx));
1065 }
1066 break;
1067 case VCAP_SEL_ACTION:
1068 for (idx = 0; idx < count; ++idx)
1069 spx5_wr(actstr[idx], sparx5,
1070 VCAP_ES2_VCAP_ACTION_DAT(idx));
1071 break;
1072 case VCAP_SEL_ALL:
1073 pr_err("%s:%d: cannot write all streams at once\n",
1074 __func__, __LINE__);
1075 break;
1076 default:
1077 break;
1078 }
1079 if (sel & VCAP_SEL_COUNTER) {
1080 start = start & 0x7ff; /* counter limit */
1081 spx5_wr(admin->cache.counter, sparx5, EACL_ES2_CNT(start));
1082 spx5_wr(admin->cache.sticky, sparx5, VCAP_ES2_VCAP_CNT_DAT(0));
1083 }
1084}
1085
1086/* API callback used for writing to the VCAP cache */
1087static void sparx5_vcap_cache_write(struct net_device *ndev,
1088 struct vcap_admin *admin,
1089 enum vcap_selection sel,
1090 u32 start,
1091 u32 count)
1092{
1093 struct sparx5_port *port = netdev_priv(ndev);
1094 struct sparx5 *sparx5 = port->sparx5;
1095
1096 switch (admin->vtype) {
1097 case VCAP_TYPE_IS0:
1098 sparx5_vcap_is0_cache_write(sparx5, admin, sel, start, count);
1099 break;
1100 case VCAP_TYPE_IS2:
1101 sparx5_vcap_is2_cache_write(sparx5, admin, sel, start, count);
1102 break;
1103 case VCAP_TYPE_ES0:
1104 sparx5_vcap_es0_cache_write(sparx5, admin, sel, start, count);
1105 break;
1106 case VCAP_TYPE_ES2:
1107 sparx5_vcap_es2_cache_write(sparx5, admin, sel, start, count);
1108 break;
1109 default:
1110 sparx5_vcap_type_err(sparx5, admin, __func__);
1111 break;
1112 }
1113}
1114
1115static void sparx5_vcap_is0_cache_read(struct sparx5 *sparx5,
1116 struct vcap_admin *admin,
1117 enum vcap_selection sel,
1118 u32 start,
1119 u32 count)
1120{
1121 u32 *keystr, *mskstr, *actstr;
1122 int idx;
1123
1124 keystr = &admin->cache.keystream[start];
1125 mskstr = &admin->cache.maskstream[start];
1126 actstr = &admin->cache.actionstream[start];
1127
1128 if (sel & VCAP_SEL_ENTRY) {
1129 for (idx = 0; idx < count; ++idx) {
1130 keystr[idx] = spx5_rd(sparx5,
1131 VCAP_SUPER_VCAP_ENTRY_DAT(idx));
1132 mskstr[idx] = ~spx5_rd(sparx5,
1133 VCAP_SUPER_VCAP_MASK_DAT(idx));
1134 }
1135 }
1136
1137 if (sel & VCAP_SEL_ACTION)
1138 for (idx = 0; idx < count; ++idx)
1139 actstr[idx] = spx5_rd(sparx5,
1140 VCAP_SUPER_VCAP_ACTION_DAT(idx));
1141
1142 if (sel & VCAP_SEL_COUNTER) {
1143 admin->cache.counter =
1144 spx5_rd(sparx5, VCAP_SUPER_VCAP_CNT_DAT(0));
1145 admin->cache.sticky =
1146 spx5_rd(sparx5, VCAP_SUPER_VCAP_CNT_DAT(0));
1147 }
1148}
1149
1150static void sparx5_vcap_is2_cache_read(struct sparx5 *sparx5,
1151 struct vcap_admin *admin,
1152 enum vcap_selection sel,
1153 u32 start,
1154 u32 count)
1155{
1156 u32 *keystr, *mskstr, *actstr;
1157 int idx;
1158
1159 keystr = &admin->cache.keystream[start];
1160 mskstr = &admin->cache.maskstream[start];
1161 actstr = &admin->cache.actionstream[start];
1162
1163 if (sel & VCAP_SEL_ENTRY) {
1164 for (idx = 0; idx < count; ++idx) {
1165 keystr[idx] = spx5_rd(sparx5,
1166 VCAP_SUPER_VCAP_ENTRY_DAT(idx));
1167 mskstr[idx] = ~spx5_rd(sparx5,
1168 VCAP_SUPER_VCAP_MASK_DAT(idx));
1169 }
1170 }
1171
1172 if (sel & VCAP_SEL_ACTION)
1173 for (idx = 0; idx < count; ++idx)
1174 actstr[idx] = spx5_rd(sparx5,
1175 VCAP_SUPER_VCAP_ACTION_DAT(idx));
1176
1177 if (sel & VCAP_SEL_COUNTER) {
1178 start = start & 0xfff; /* counter limit */
1179 if (admin->vinst == 0)
1180 admin->cache.counter =
1181 spx5_rd(sparx5, ANA_ACL_CNT_A(start));
1182 else
1183 admin->cache.counter =
1184 spx5_rd(sparx5, ANA_ACL_CNT_B(start));
1185 admin->cache.sticky =
1186 spx5_rd(sparx5, VCAP_SUPER_VCAP_CNT_DAT(0));
1187 }
1188}
1189
1190/* Use ESDX counters located in the XQS */
1191static void sparx5_es0_read_esdx_counter(struct sparx5 *sparx5,
1192 struct vcap_admin *admin, u32 id)
1193{
1194 u32 counter;
1195
1196 mutex_lock(&sparx5->queue_stats_lock);
1197 spx5_wr(XQS_STAT_CFG_STAT_VIEW_SET(id), sparx5, XQS_STAT_CFG);
1198 counter = spx5_rd(sparx5, XQS_CNT(SPARX5_STAT_ESDX_GRN_PKTS)) +
1199 spx5_rd(sparx5, XQS_CNT(SPARX5_STAT_ESDX_YEL_PKTS));
1200 mutex_unlock(&sparx5->queue_stats_lock);
1201 if (counter)
1202 admin->cache.counter = counter;
1203}
1204
1205static void sparx5_vcap_es0_cache_read(struct sparx5 *sparx5,
1206 struct vcap_admin *admin,
1207 enum vcap_selection sel,
1208 u32 start,
1209 u32 count)
1210{
1211 u32 *keystr, *mskstr, *actstr;
1212 int idx;
1213
1214 keystr = &admin->cache.keystream[start];
1215 mskstr = &admin->cache.maskstream[start];
1216 actstr = &admin->cache.actionstream[start];
1217
1218 if (sel & VCAP_SEL_ENTRY) {
1219 for (idx = 0; idx < count; ++idx) {
1220 keystr[idx] =
1221 spx5_rd(sparx5, VCAP_ES0_VCAP_ENTRY_DAT(idx));
1222 mskstr[idx] =
1223 ~spx5_rd(sparx5, VCAP_ES0_VCAP_MASK_DAT(idx));
1224 }
1225 }
1226
1227 if (sel & VCAP_SEL_ACTION)
1228 for (idx = 0; idx < count; ++idx)
1229 actstr[idx] =
1230 spx5_rd(sparx5, VCAP_ES0_VCAP_ACTION_DAT(idx));
1231
1232 if (sel & VCAP_SEL_COUNTER) {
1233 admin->cache.counter =
1234 spx5_rd(sparx5, VCAP_ES0_VCAP_CNT_DAT(0));
1235 admin->cache.sticky = admin->cache.counter;
1236 sparx5_es0_read_esdx_counter(sparx5, admin, start);
1237 }
1238}
1239
1240static void sparx5_vcap_es2_cache_read(struct sparx5 *sparx5,
1241 struct vcap_admin *admin,
1242 enum vcap_selection sel,
1243 u32 start,
1244 u32 count)
1245{
1246 u32 *keystr, *mskstr, *actstr;
1247 int idx;
1248
1249 keystr = &admin->cache.keystream[start];
1250 mskstr = &admin->cache.maskstream[start];
1251 actstr = &admin->cache.actionstream[start];
1252
1253 if (sel & VCAP_SEL_ENTRY) {
1254 for (idx = 0; idx < count; ++idx) {
1255 keystr[idx] =
1256 spx5_rd(sparx5, VCAP_ES2_VCAP_ENTRY_DAT(idx));
1257 mskstr[idx] =
1258 ~spx5_rd(sparx5, VCAP_ES2_VCAP_MASK_DAT(idx));
1259 }
1260 }
1261
1262 if (sel & VCAP_SEL_ACTION)
1263 for (idx = 0; idx < count; ++idx)
1264 actstr[idx] =
1265 spx5_rd(sparx5, VCAP_ES2_VCAP_ACTION_DAT(idx));
1266
1267 if (sel & VCAP_SEL_COUNTER) {
1268 start = start & 0x7ff; /* counter limit */
1269 admin->cache.counter =
1270 spx5_rd(sparx5, EACL_ES2_CNT(start));
1271 admin->cache.sticky =
1272 spx5_rd(sparx5, VCAP_ES2_VCAP_CNT_DAT(0));
1273 }
1274}
1275
1276/* API callback used for reading from the VCAP into the VCAP cache */
1277static void sparx5_vcap_cache_read(struct net_device *ndev,
1278 struct vcap_admin *admin,
1279 enum vcap_selection sel,
1280 u32 start,
1281 u32 count)
1282{
1283 struct sparx5_port *port = netdev_priv(ndev);
1284 struct sparx5 *sparx5 = port->sparx5;
1285
1286 switch (admin->vtype) {
1287 case VCAP_TYPE_IS0:
1288 sparx5_vcap_is0_cache_read(sparx5, admin, sel, start, count);
1289 break;
1290 case VCAP_TYPE_IS2:
1291 sparx5_vcap_is2_cache_read(sparx5, admin, sel, start, count);
1292 break;
1293 case VCAP_TYPE_ES0:
1294 sparx5_vcap_es0_cache_read(sparx5, admin, sel, start, count);
1295 break;
1296 case VCAP_TYPE_ES2:
1297 sparx5_vcap_es2_cache_read(sparx5, admin, sel, start, count);
1298 break;
1299 default:
1300 sparx5_vcap_type_err(sparx5, admin, __func__);
1301 break;
1302 }
1303}
1304
1305/* API callback used for initializing a VCAP address range */
1306static void sparx5_vcap_range_init(struct net_device *ndev,
1307 struct vcap_admin *admin, u32 addr,
1308 u32 count)
1309{
1310 struct sparx5_port *port = netdev_priv(ndev);
1311 struct sparx5 *sparx5 = port->sparx5;
1312
1313 _sparx5_vcap_range_init(sparx5, admin, addr, count);
1314}
1315
1316static void sparx5_vcap_super_update(struct sparx5 *sparx5,
1317 enum vcap_command cmd,
1318 enum vcap_selection sel, u32 addr)
1319{
1320 bool clear = (cmd == VCAP_CMD_INITIALIZE);
1321
1322 spx5_wr(VCAP_SUPER_CFG_MV_NUM_POS_SET(0) |
1323 VCAP_SUPER_CFG_MV_SIZE_SET(0), sparx5, VCAP_SUPER_CFG);
1324 spx5_wr(VCAP_SUPER_CTRL_UPDATE_CMD_SET(cmd) |
1325 VCAP_SUPER_CTRL_UPDATE_ENTRY_DIS_SET((VCAP_SEL_ENTRY & sel) == 0) |
1326 VCAP_SUPER_CTRL_UPDATE_ACTION_DIS_SET((VCAP_SEL_ACTION & sel) == 0) |
1327 VCAP_SUPER_CTRL_UPDATE_CNT_DIS_SET((VCAP_SEL_COUNTER & sel) == 0) |
1328 VCAP_SUPER_CTRL_UPDATE_ADDR_SET(addr) |
1329 VCAP_SUPER_CTRL_CLEAR_CACHE_SET(clear) |
1330 VCAP_SUPER_CTRL_UPDATE_SHOT_SET(true),
1331 sparx5, VCAP_SUPER_CTRL);
1332 sparx5_vcap_wait_super_update(sparx5);
1333}
1334
1335static void sparx5_vcap_es0_update(struct sparx5 *sparx5,
1336 enum vcap_command cmd,
1337 enum vcap_selection sel, u32 addr)
1338{
1339 bool clear = (cmd == VCAP_CMD_INITIALIZE);
1340
1341 spx5_wr(VCAP_ES0_CFG_MV_NUM_POS_SET(0) |
1342 VCAP_ES0_CFG_MV_SIZE_SET(0), sparx5, VCAP_ES0_CFG);
1343 spx5_wr(VCAP_ES0_CTRL_UPDATE_CMD_SET(cmd) |
1344 VCAP_ES0_CTRL_UPDATE_ENTRY_DIS_SET((VCAP_SEL_ENTRY & sel) == 0) |
1345 VCAP_ES0_CTRL_UPDATE_ACTION_DIS_SET((VCAP_SEL_ACTION & sel) == 0) |
1346 VCAP_ES0_CTRL_UPDATE_CNT_DIS_SET((VCAP_SEL_COUNTER & sel) == 0) |
1347 VCAP_ES0_CTRL_UPDATE_ADDR_SET(addr) |
1348 VCAP_ES0_CTRL_CLEAR_CACHE_SET(clear) |
1349 VCAP_ES0_CTRL_UPDATE_SHOT_SET(true),
1350 sparx5, VCAP_ES0_CTRL);
1351 sparx5_vcap_wait_es0_update(sparx5);
1352}
1353
1354static void sparx5_vcap_es2_update(struct sparx5 *sparx5,
1355 enum vcap_command cmd,
1356 enum vcap_selection sel, u32 addr)
1357{
1358 bool clear = (cmd == VCAP_CMD_INITIALIZE);
1359
1360 spx5_wr(VCAP_ES2_CFG_MV_NUM_POS_SET(0) |
1361 VCAP_ES2_CFG_MV_SIZE_SET(0), sparx5, VCAP_ES2_CFG);
1362 spx5_wr(VCAP_ES2_CTRL_UPDATE_CMD_SET(cmd) |
1363 VCAP_ES2_CTRL_UPDATE_ENTRY_DIS_SET((VCAP_SEL_ENTRY & sel) == 0) |
1364 VCAP_ES2_CTRL_UPDATE_ACTION_DIS_SET((VCAP_SEL_ACTION & sel) == 0) |
1365 VCAP_ES2_CTRL_UPDATE_CNT_DIS_SET((VCAP_SEL_COUNTER & sel) == 0) |
1366 VCAP_ES2_CTRL_UPDATE_ADDR_SET(addr) |
1367 VCAP_ES2_CTRL_CLEAR_CACHE_SET(clear) |
1368 VCAP_ES2_CTRL_UPDATE_SHOT_SET(true),
1369 sparx5, VCAP_ES2_CTRL);
1370 sparx5_vcap_wait_es2_update(sparx5);
1371}
1372
1373/* API callback used for updating the VCAP cache */
1374static void sparx5_vcap_update(struct net_device *ndev,
1375 struct vcap_admin *admin, enum vcap_command cmd,
1376 enum vcap_selection sel, u32 addr)
1377{
1378 struct sparx5_port *port = netdev_priv(ndev);
1379 struct sparx5 *sparx5 = port->sparx5;
1380
1381 switch (admin->vtype) {
1382 case VCAP_TYPE_IS0:
1383 case VCAP_TYPE_IS2:
1384 sparx5_vcap_super_update(sparx5, cmd, sel, addr);
1385 break;
1386 case VCAP_TYPE_ES0:
1387 sparx5_vcap_es0_update(sparx5, cmd, sel, addr);
1388 break;
1389 case VCAP_TYPE_ES2:
1390 sparx5_vcap_es2_update(sparx5, cmd, sel, addr);
1391 break;
1392 default:
1393 sparx5_vcap_type_err(sparx5, admin, __func__);
1394 break;
1395 }
1396}
1397
1398static void sparx5_vcap_super_move(struct sparx5 *sparx5,
1399 u32 addr,
1400 enum vcap_command cmd,
1401 u16 mv_num_pos,
1402 u16 mv_size)
1403{
1404 spx5_wr(VCAP_SUPER_CFG_MV_NUM_POS_SET(mv_num_pos) |
1405 VCAP_SUPER_CFG_MV_SIZE_SET(mv_size),
1406 sparx5, VCAP_SUPER_CFG);
1407 spx5_wr(VCAP_SUPER_CTRL_UPDATE_CMD_SET(cmd) |
1408 VCAP_SUPER_CTRL_UPDATE_ENTRY_DIS_SET(0) |
1409 VCAP_SUPER_CTRL_UPDATE_ACTION_DIS_SET(0) |
1410 VCAP_SUPER_CTRL_UPDATE_CNT_DIS_SET(0) |
1411 VCAP_SUPER_CTRL_UPDATE_ADDR_SET(addr) |
1412 VCAP_SUPER_CTRL_CLEAR_CACHE_SET(false) |
1413 VCAP_SUPER_CTRL_UPDATE_SHOT_SET(true),
1414 sparx5, VCAP_SUPER_CTRL);
1415 sparx5_vcap_wait_super_update(sparx5);
1416}
1417
1418static void sparx5_vcap_es0_move(struct sparx5 *sparx5,
1419 u32 addr,
1420 enum vcap_command cmd,
1421 u16 mv_num_pos,
1422 u16 mv_size)
1423{
1424 spx5_wr(VCAP_ES0_CFG_MV_NUM_POS_SET(mv_num_pos) |
1425 VCAP_ES0_CFG_MV_SIZE_SET(mv_size),
1426 sparx5, VCAP_ES0_CFG);
1427 spx5_wr(VCAP_ES0_CTRL_UPDATE_CMD_SET(cmd) |
1428 VCAP_ES0_CTRL_UPDATE_ENTRY_DIS_SET(0) |
1429 VCAP_ES0_CTRL_UPDATE_ACTION_DIS_SET(0) |
1430 VCAP_ES0_CTRL_UPDATE_CNT_DIS_SET(0) |
1431 VCAP_ES0_CTRL_UPDATE_ADDR_SET(addr) |
1432 VCAP_ES0_CTRL_CLEAR_CACHE_SET(false) |
1433 VCAP_ES0_CTRL_UPDATE_SHOT_SET(true),
1434 sparx5, VCAP_ES0_CTRL);
1435 sparx5_vcap_wait_es0_update(sparx5);
1436}
1437
1438static void sparx5_vcap_es2_move(struct sparx5 *sparx5,
1439 u32 addr,
1440 enum vcap_command cmd,
1441 u16 mv_num_pos,
1442 u16 mv_size)
1443{
1444 spx5_wr(VCAP_ES2_CFG_MV_NUM_POS_SET(mv_num_pos) |
1445 VCAP_ES2_CFG_MV_SIZE_SET(mv_size),
1446 sparx5, VCAP_ES2_CFG);
1447 spx5_wr(VCAP_ES2_CTRL_UPDATE_CMD_SET(cmd) |
1448 VCAP_ES2_CTRL_UPDATE_ENTRY_DIS_SET(0) |
1449 VCAP_ES2_CTRL_UPDATE_ACTION_DIS_SET(0) |
1450 VCAP_ES2_CTRL_UPDATE_CNT_DIS_SET(0) |
1451 VCAP_ES2_CTRL_UPDATE_ADDR_SET(addr) |
1452 VCAP_ES2_CTRL_CLEAR_CACHE_SET(false) |
1453 VCAP_ES2_CTRL_UPDATE_SHOT_SET(true),
1454 sparx5, VCAP_ES2_CTRL);
1455 sparx5_vcap_wait_es2_update(sparx5);
1456}
1457
1458/* API callback used for moving a block of rules in the VCAP */
1459static void sparx5_vcap_move(struct net_device *ndev, struct vcap_admin *admin,
1460 u32 addr, int offset, int count)
1461{
1462 struct sparx5_port *port = netdev_priv(ndev);
1463 struct sparx5 *sparx5 = port->sparx5;
1464 enum vcap_command cmd;
1465 u16 mv_num_pos;
1466 u16 mv_size;
1467
1468 mv_size = count - 1;
1469 if (offset > 0) {
1470 mv_num_pos = offset - 1;
1471 cmd = VCAP_CMD_MOVE_DOWN;
1472 } else {
1473 mv_num_pos = -offset - 1;
1474 cmd = VCAP_CMD_MOVE_UP;
1475 }
1476
1477 switch (admin->vtype) {
1478 case VCAP_TYPE_IS0:
1479 case VCAP_TYPE_IS2:
1480 sparx5_vcap_super_move(sparx5, addr, cmd, mv_num_pos, mv_size);
1481 break;
1482 case VCAP_TYPE_ES0:
1483 sparx5_vcap_es0_move(sparx5, addr, cmd, mv_num_pos, mv_size);
1484 break;
1485 case VCAP_TYPE_ES2:
1486 sparx5_vcap_es2_move(sparx5, addr, cmd, mv_num_pos, mv_size);
1487 break;
1488 default:
1489 sparx5_vcap_type_err(sparx5, admin, __func__);
1490 break;
1491 }
1492}
1493
1494static const struct vcap_operations sparx5_vcap_ops = {
1495 .validate_keyset = sparx5_vcap_validate_keyset,
1496 .add_default_fields = sparx5_vcap_add_default_fields,
1497 .cache_erase = sparx5_vcap_cache_erase,
1498 .cache_write = sparx5_vcap_cache_write,
1499 .cache_read = sparx5_vcap_cache_read,
1500 .init = sparx5_vcap_range_init,
1501 .update = sparx5_vcap_update,
1502 .move = sparx5_vcap_move,
1503 .port_info = sparx5_port_info,
1504};
1505
1506static u32 sparx5_vcap_is0_keyset_to_etype_ps(enum vcap_keyfield_set keyset)
1507{
1508 switch (keyset) {
1509 case VCAP_KFS_NORMAL_7TUPLE:
1510 return VCAP_IS0_PS_ETYPE_NORMAL_7TUPLE;
1511 case VCAP_KFS_NORMAL_5TUPLE_IP4:
1512 return VCAP_IS0_PS_ETYPE_NORMAL_5TUPLE_IP4;
1513 default:
1514 return VCAP_IS0_PS_ETYPE_NORMAL_7TUPLE;
1515 }
1516}
1517
1518static void sparx5_vcap_is0_set_port_keyset(struct net_device *ndev, int lookup,
1519 enum vcap_keyfield_set keyset,
1520 int l3_proto)
1521{
1522 struct sparx5_port *port = netdev_priv(ndev);
1523 struct sparx5 *sparx5 = port->sparx5;
1524 int portno = port->portno;
1525 u32 value;
1526
1527 switch (l3_proto) {
1528 case ETH_P_IP:
1529 value = sparx5_vcap_is0_keyset_to_etype_ps(keyset);
1530 spx5_rmw(ANA_CL_ADV_CL_CFG_IP4_CLM_KEY_SEL_SET(value),
1531 ANA_CL_ADV_CL_CFG_IP4_CLM_KEY_SEL,
1532 sparx5,
1533 ANA_CL_ADV_CL_CFG(portno, lookup));
1534 break;
1535 case ETH_P_IPV6:
1536 value = sparx5_vcap_is0_keyset_to_etype_ps(keyset);
1537 spx5_rmw(ANA_CL_ADV_CL_CFG_IP6_CLM_KEY_SEL_SET(value),
1538 ANA_CL_ADV_CL_CFG_IP6_CLM_KEY_SEL,
1539 sparx5,
1540 ANA_CL_ADV_CL_CFG(portno, lookup));
1541 break;
1542 default:
1543 value = sparx5_vcap_is0_keyset_to_etype_ps(keyset);
1544 spx5_rmw(ANA_CL_ADV_CL_CFG_ETYPE_CLM_KEY_SEL_SET(value),
1545 ANA_CL_ADV_CL_CFG_ETYPE_CLM_KEY_SEL,
1546 sparx5,
1547 ANA_CL_ADV_CL_CFG(portno, lookup));
1548 break;
1549 }
1550}
1551
1552static u32 sparx5_vcap_is2_keyset_to_arp_ps(enum vcap_keyfield_set keyset)
1553{
1554 switch (keyset) {
1555 case VCAP_KFS_ARP:
1556 return VCAP_IS2_PS_ARP_ARP;
1557 default:
1558 return VCAP_IS2_PS_ARP_MAC_ETYPE;
1559 }
1560}
1561
1562static u32 sparx5_vcap_is2_keyset_to_ipv4_ps(enum vcap_keyfield_set keyset)
1563{
1564 switch (keyset) {
1565 case VCAP_KFS_MAC_ETYPE:
1566 return VCAP_IS2_PS_IPV4_UC_MAC_ETYPE;
1567 case VCAP_KFS_IP4_OTHER:
1568 case VCAP_KFS_IP4_TCP_UDP:
1569 return VCAP_IS2_PS_IPV4_UC_IP4_TCP_UDP_OTHER;
1570 case VCAP_KFS_IP_7TUPLE:
1571 return VCAP_IS2_PS_IPV4_UC_IP_7TUPLE;
1572 default:
1573 return VCAP_KFS_NO_VALUE;
1574 }
1575}
1576
1577static u32 sparx5_vcap_is2_keyset_to_ipv6_uc_ps(enum vcap_keyfield_set keyset)
1578{
1579 switch (keyset) {
1580 case VCAP_KFS_MAC_ETYPE:
1581 return VCAP_IS2_PS_IPV6_UC_MAC_ETYPE;
1582 case VCAP_KFS_IP4_OTHER:
1583 case VCAP_KFS_IP4_TCP_UDP:
1584 return VCAP_IS2_PS_IPV6_UC_IP4_TCP_UDP_OTHER;
1585 case VCAP_KFS_IP_7TUPLE:
1586 return VCAP_IS2_PS_IPV6_UC_IP_7TUPLE;
1587 default:
1588 return VCAP_KFS_NO_VALUE;
1589 }
1590}
1591
1592static u32 sparx5_vcap_is2_keyset_to_ipv6_mc_ps(enum vcap_keyfield_set keyset)
1593{
1594 switch (keyset) {
1595 case VCAP_KFS_MAC_ETYPE:
1596 return VCAP_IS2_PS_IPV6_MC_MAC_ETYPE;
1597 case VCAP_KFS_IP4_OTHER:
1598 case VCAP_KFS_IP4_TCP_UDP:
1599 return VCAP_IS2_PS_IPV6_MC_IP4_TCP_UDP_OTHER;
1600 case VCAP_KFS_IP_7TUPLE:
1601 return VCAP_IS2_PS_IPV6_MC_IP_7TUPLE;
1602 default:
1603 return VCAP_KFS_NO_VALUE;
1604 }
1605}
1606
1607static void sparx5_vcap_is2_set_port_keyset(struct net_device *ndev, int lookup,
1608 enum vcap_keyfield_set keyset,
1609 int l3_proto)
1610{
1611 struct sparx5_port *port = netdev_priv(ndev);
1612 struct sparx5 *sparx5 = port->sparx5;
1613 int portno = port->portno;
1614 u32 value;
1615
1616 switch (l3_proto) {
1617 case ETH_P_ARP:
1618 value = sparx5_vcap_is2_keyset_to_arp_ps(keyset);
1619 spx5_rmw(ANA_ACL_VCAP_S2_KEY_SEL_ARP_KEY_SEL_SET(value),
1620 ANA_ACL_VCAP_S2_KEY_SEL_ARP_KEY_SEL,
1621 sparx5,
1622 ANA_ACL_VCAP_S2_KEY_SEL(portno, lookup));
1623 break;
1624 case ETH_P_IP:
1625 value = sparx5_vcap_is2_keyset_to_ipv4_ps(keyset);
1626 spx5_rmw(ANA_ACL_VCAP_S2_KEY_SEL_IP4_UC_KEY_SEL_SET(value),
1627 ANA_ACL_VCAP_S2_KEY_SEL_IP4_UC_KEY_SEL,
1628 sparx5,
1629 ANA_ACL_VCAP_S2_KEY_SEL(portno, lookup));
1630 spx5_rmw(ANA_ACL_VCAP_S2_KEY_SEL_IP4_MC_KEY_SEL_SET(value),
1631 ANA_ACL_VCAP_S2_KEY_SEL_IP4_MC_KEY_SEL,
1632 sparx5,
1633 ANA_ACL_VCAP_S2_KEY_SEL(portno, lookup));
1634 break;
1635 case ETH_P_IPV6:
1636 value = sparx5_vcap_is2_keyset_to_ipv6_uc_ps(keyset);
1637 spx5_rmw(ANA_ACL_VCAP_S2_KEY_SEL_IP6_UC_KEY_SEL_SET(value),
1638 ANA_ACL_VCAP_S2_KEY_SEL_IP6_UC_KEY_SEL,
1639 sparx5,
1640 ANA_ACL_VCAP_S2_KEY_SEL(portno, lookup));
1641 value = sparx5_vcap_is2_keyset_to_ipv6_mc_ps(keyset);
1642 spx5_rmw(ANA_ACL_VCAP_S2_KEY_SEL_IP6_MC_KEY_SEL_SET(value),
1643 ANA_ACL_VCAP_S2_KEY_SEL_IP6_MC_KEY_SEL,
1644 sparx5,
1645 ANA_ACL_VCAP_S2_KEY_SEL(portno, lookup));
1646 break;
1647 default:
1648 value = VCAP_IS2_PS_NONETH_MAC_ETYPE;
1649 spx5_rmw(ANA_ACL_VCAP_S2_KEY_SEL_NON_ETH_KEY_SEL_SET(value),
1650 ANA_ACL_VCAP_S2_KEY_SEL_NON_ETH_KEY_SEL,
1651 sparx5,
1652 ANA_ACL_VCAP_S2_KEY_SEL(portno, lookup));
1653 break;
1654 }
1655}
1656
1657static u32 sparx5_vcap_es2_keyset_to_arp_ps(enum vcap_keyfield_set keyset)
1658{
1659 switch (keyset) {
1660 case VCAP_KFS_ARP:
1661 return VCAP_ES2_PS_ARP_ARP;
1662 default:
1663 return VCAP_ES2_PS_ARP_MAC_ETYPE;
1664 }
1665}
1666
1667static u32 sparx5_vcap_es2_keyset_to_ipv4_ps(enum vcap_keyfield_set keyset)
1668{
1669 switch (keyset) {
1670 case VCAP_KFS_MAC_ETYPE:
1671 return VCAP_ES2_PS_IPV4_MAC_ETYPE;
1672 case VCAP_KFS_IP_7TUPLE:
1673 return VCAP_ES2_PS_IPV4_IP_7TUPLE;
1674 case VCAP_KFS_IP4_TCP_UDP:
1675 return VCAP_ES2_PS_IPV4_IP4_TCP_UDP_OTHER;
1676 case VCAP_KFS_IP4_OTHER:
1677 return VCAP_ES2_PS_IPV4_IP4_OTHER;
1678 default:
1679 return VCAP_ES2_PS_IPV4_MAC_ETYPE;
1680 }
1681}
1682
1683static u32 sparx5_vcap_es2_keyset_to_ipv6_ps(enum vcap_keyfield_set keyset)
1684{
1685 switch (keyset) {
1686 case VCAP_KFS_MAC_ETYPE:
1687 return VCAP_ES2_PS_IPV6_MAC_ETYPE;
1688 case VCAP_KFS_IP4_TCP_UDP:
1689 case VCAP_KFS_IP4_OTHER:
1690 return VCAP_ES2_PS_IPV6_IP4_DOWNGRADE;
1691 case VCAP_KFS_IP_7TUPLE:
1692 return VCAP_ES2_PS_IPV6_IP_7TUPLE;
1693 case VCAP_KFS_IP6_STD:
1694 return VCAP_ES2_PS_IPV6_IP6_STD;
1695 default:
1696 return VCAP_ES2_PS_IPV6_MAC_ETYPE;
1697 }
1698}
1699
1700static void sparx5_vcap_es2_set_port_keyset(struct net_device *ndev, int lookup,
1701 enum vcap_keyfield_set keyset,
1702 int l3_proto)
1703{
1704 struct sparx5_port *port = netdev_priv(ndev);
1705 struct sparx5 *sparx5 = port->sparx5;
1706 int portno = port->portno;
1707 u32 value;
1708
1709 switch (l3_proto) {
1710 case ETH_P_IP:
1711 value = sparx5_vcap_es2_keyset_to_ipv4_ps(keyset);
1712 spx5_rmw(EACL_VCAP_ES2_KEY_SEL_IP4_KEY_SEL_SET(value),
1713 EACL_VCAP_ES2_KEY_SEL_IP4_KEY_SEL,
1714 sparx5,
1715 EACL_VCAP_ES2_KEY_SEL(portno, lookup));
1716 break;
1717 case ETH_P_IPV6:
1718 value = sparx5_vcap_es2_keyset_to_ipv6_ps(keyset);
1719 spx5_rmw(EACL_VCAP_ES2_KEY_SEL_IP6_KEY_SEL_SET(value),
1720 EACL_VCAP_ES2_KEY_SEL_IP6_KEY_SEL,
1721 sparx5,
1722 EACL_VCAP_ES2_KEY_SEL(portno, lookup));
1723 break;
1724 case ETH_P_ARP:
1725 value = sparx5_vcap_es2_keyset_to_arp_ps(keyset);
1726 spx5_rmw(EACL_VCAP_ES2_KEY_SEL_ARP_KEY_SEL_SET(value),
1727 EACL_VCAP_ES2_KEY_SEL_ARP_KEY_SEL,
1728 sparx5,
1729 EACL_VCAP_ES2_KEY_SEL(portno, lookup));
1730 break;
1731 }
1732}
1733
1734/* Change the port keyset for the lookup and protocol */
1735void sparx5_vcap_set_port_keyset(struct net_device *ndev,
1736 struct vcap_admin *admin,
1737 int cid,
1738 u16 l3_proto,
1739 enum vcap_keyfield_set keyset,
1740 struct vcap_keyset_list *orig)
1741{
1742 struct sparx5_port *port;
1743 int lookup;
1744
1745 switch (admin->vtype) {
1746 case VCAP_TYPE_IS0:
1747 lookup = sparx5_vcap_is0_cid_to_lookup(cid);
1748 if (orig)
1749 sparx5_vcap_is0_get_port_keysets(ndev, lookup, orig,
1750 l3_proto);
1751 sparx5_vcap_is0_set_port_keyset(ndev, lookup, keyset, l3_proto);
1752 break;
1753 case VCAP_TYPE_IS2:
1754 lookup = sparx5_vcap_is2_cid_to_lookup(cid);
1755 if (orig)
1756 sparx5_vcap_is2_get_port_keysets(ndev, lookup, orig,
1757 l3_proto);
1758 sparx5_vcap_is2_set_port_keyset(ndev, lookup, keyset, l3_proto);
1759 break;
1760 case VCAP_TYPE_ES0:
1761 break;
1762 case VCAP_TYPE_ES2:
1763 lookup = sparx5_vcap_es2_cid_to_lookup(cid);
1764 if (orig)
1765 sparx5_vcap_es2_get_port_keysets(ndev, lookup, orig,
1766 l3_proto);
1767 sparx5_vcap_es2_set_port_keyset(ndev, lookup, keyset, l3_proto);
1768 break;
1769 default:
1770 port = netdev_priv(ndev);
1771 sparx5_vcap_type_err(port->sparx5, admin, __func__);
1772 break;
1773 }
1774}
1775
1776/* Enable IS0 lookups per port and set the keyset generation */
1777static void sparx5_vcap_is0_port_key_selection(struct sparx5 *sparx5,
1778 struct vcap_admin *admin)
1779{
1780 const struct sparx5_consts *consts = sparx5->data->consts;
1781 int portno, lookup;
1782 u32 keysel;
1783
1784 keysel = VCAP_IS0_KEYSEL(false,
1785 VCAP_IS0_PS_ETYPE_NORMAL_7TUPLE,
1786 VCAP_IS0_PS_ETYPE_NORMAL_5TUPLE_IP4,
1787 VCAP_IS0_PS_ETYPE_NORMAL_7TUPLE,
1788 VCAP_IS0_PS_MPLS_FOLLOW_ETYPE,
1789 VCAP_IS0_PS_MPLS_FOLLOW_ETYPE,
1790 VCAP_IS0_PS_MLBS_FOLLOW_ETYPE);
1791 for (lookup = 0; lookup < admin->lookups; ++lookup) {
1792 for (portno = 0; portno < consts->n_ports; ++portno) {
1793 spx5_wr(keysel, sparx5,
1794 ANA_CL_ADV_CL_CFG(portno, lookup));
1795 spx5_rmw(ANA_CL_ADV_CL_CFG_LOOKUP_ENA,
1796 ANA_CL_ADV_CL_CFG_LOOKUP_ENA,
1797 sparx5,
1798 ANA_CL_ADV_CL_CFG(portno, lookup));
1799 }
1800 }
1801}
1802
1803/* Enable IS2 lookups per port and set the keyset generation */
1804static void sparx5_vcap_is2_port_key_selection(struct sparx5 *sparx5,
1805 struct vcap_admin *admin)
1806{
1807 const struct sparx5_consts *consts = sparx5->data->consts;
1808 int portno, lookup;
1809 u32 keysel;
1810
1811 keysel = VCAP_IS2_KEYSEL(true, VCAP_IS2_PS_NONETH_MAC_ETYPE,
1812 VCAP_IS2_PS_IPV4_MC_IP4_TCP_UDP_OTHER,
1813 VCAP_IS2_PS_IPV4_UC_IP4_TCP_UDP_OTHER,
1814 VCAP_IS2_PS_IPV6_MC_IP_7TUPLE,
1815 VCAP_IS2_PS_IPV6_UC_IP_7TUPLE,
1816 VCAP_IS2_PS_ARP_ARP);
1817 for (lookup = 0; lookup < admin->lookups; ++lookup) {
1818 for (portno = 0; portno < consts->n_ports; ++portno) {
1819 spx5_wr(keysel, sparx5,
1820 ANA_ACL_VCAP_S2_KEY_SEL(portno, lookup));
1821 }
1822 }
1823 /* IS2 lookups are in bit 0:3 */
1824 for (portno = 0; portno < consts->n_ports; ++portno)
1825 spx5_rmw(ANA_ACL_VCAP_S2_CFG_SEC_ENA_SET(0xf),
1826 ANA_ACL_VCAP_S2_CFG_SEC_ENA,
1827 sparx5,
1828 ANA_ACL_VCAP_S2_CFG(portno));
1829}
1830
1831/* Enable ES0 lookups per port and set the keyset generation */
1832static void sparx5_vcap_es0_port_key_selection(struct sparx5 *sparx5,
1833 struct vcap_admin *admin)
1834{
1835 const struct sparx5_consts *consts = sparx5->data->consts;
1836 int portno;
1837 u32 keysel;
1838
1839 keysel = VCAP_ES0_KEYSEL(VCAP_ES0_PS_FORCE_ISDX_LOOKUPS);
1840 for (portno = 0; portno < consts->n_ports; ++portno)
1841 spx5_rmw(keysel, REW_RTAG_ETAG_CTRL_ES0_ISDX_KEY_ENA,
1842 sparx5, REW_RTAG_ETAG_CTRL(portno));
1843
1844 spx5_rmw(REW_ES0_CTRL_ES0_LU_ENA_SET(1), REW_ES0_CTRL_ES0_LU_ENA,
1845 sparx5, REW_ES0_CTRL);
1846}
1847
1848/* Enable ES2 lookups per port and set the keyset generation */
1849static void sparx5_vcap_es2_port_key_selection(struct sparx5 *sparx5,
1850 struct vcap_admin *admin)
1851{
1852 const struct sparx5_consts *consts = sparx5->data->consts;
1853 int portno, lookup;
1854 u32 keysel;
1855
1856 keysel = VCAP_ES2_KEYSEL(true, VCAP_ES2_PS_ARP_MAC_ETYPE,
1857 VCAP_ES2_PS_IPV4_IP4_TCP_UDP_OTHER,
1858 VCAP_ES2_PS_IPV6_IP_7TUPLE);
1859 for (lookup = 0; lookup < admin->lookups; ++lookup)
1860 for (portno = 0; portno < consts->n_ports; ++portno)
1861 spx5_wr(keysel, sparx5,
1862 EACL_VCAP_ES2_KEY_SEL(portno, lookup));
1863}
1864
1865/* Enable lookups per port and set the keyset generation */
1866static void sparx5_vcap_port_key_selection(struct sparx5 *sparx5,
1867 struct vcap_admin *admin)
1868{
1869 switch (admin->vtype) {
1870 case VCAP_TYPE_IS0:
1871 sparx5_vcap_is0_port_key_selection(sparx5, admin);
1872 break;
1873 case VCAP_TYPE_IS2:
1874 sparx5_vcap_is2_port_key_selection(sparx5, admin);
1875 break;
1876 case VCAP_TYPE_ES0:
1877 sparx5_vcap_es0_port_key_selection(sparx5, admin);
1878 break;
1879 case VCAP_TYPE_ES2:
1880 sparx5_vcap_es2_port_key_selection(sparx5, admin);
1881 break;
1882 default:
1883 sparx5_vcap_type_err(sparx5, admin, __func__);
1884 break;
1885 }
1886}
1887
1888/* Disable lookups per port */
1889static void sparx5_vcap_port_key_deselection(struct sparx5 *sparx5,
1890 struct vcap_admin *admin)
1891{
1892 const struct sparx5_consts *consts = sparx5->data->consts;
1893 int portno, lookup;
1894
1895 switch (admin->vtype) {
1896 case VCAP_TYPE_IS0:
1897 for (lookup = 0; lookup < admin->lookups; ++lookup)
1898 for (portno = 0; portno < consts->n_ports; ++portno)
1899 spx5_rmw(ANA_CL_ADV_CL_CFG_LOOKUP_ENA_SET(0),
1900 ANA_CL_ADV_CL_CFG_LOOKUP_ENA,
1901 sparx5,
1902 ANA_CL_ADV_CL_CFG(portno, lookup));
1903 break;
1904 case VCAP_TYPE_IS2:
1905 for (portno = 0; portno < consts->n_ports; ++portno)
1906 spx5_rmw(ANA_ACL_VCAP_S2_CFG_SEC_ENA_SET(0),
1907 ANA_ACL_VCAP_S2_CFG_SEC_ENA,
1908 sparx5,
1909 ANA_ACL_VCAP_S2_CFG(portno));
1910 break;
1911 case VCAP_TYPE_ES0:
1912 spx5_rmw(REW_ES0_CTRL_ES0_LU_ENA_SET(0),
1913 REW_ES0_CTRL_ES0_LU_ENA, sparx5, REW_ES0_CTRL);
1914 break;
1915 case VCAP_TYPE_ES2:
1916 for (lookup = 0; lookup < admin->lookups; ++lookup)
1917 for (portno = 0; portno < consts->n_ports; ++portno)
1918 spx5_rmw(EACL_VCAP_ES2_KEY_SEL_KEY_ENA_SET(0),
1919 EACL_VCAP_ES2_KEY_SEL_KEY_ENA,
1920 sparx5,
1921 EACL_VCAP_ES2_KEY_SEL(portno, lookup));
1922 break;
1923 default:
1924 sparx5_vcap_type_err(sparx5, admin, __func__);
1925 break;
1926 }
1927}
1928
1929static void sparx5_vcap_admin_free(struct vcap_admin *admin)
1930{
1931 if (!admin)
1932 return;
1933 mutex_destroy(&admin->lock);
1934 kfree(admin->cache.keystream);
1935 kfree(admin->cache.maskstream);
1936 kfree(admin->cache.actionstream);
1937 kfree(admin);
1938}
1939
1940/* Allocate a vcap instance with a rule list and a cache area */
1941static struct vcap_admin *
1942sparx5_vcap_admin_alloc(struct sparx5 *sparx5, struct vcap_control *ctrl,
1943 const struct sparx5_vcap_inst *cfg)
1944{
1945 struct vcap_admin *admin;
1946
1947 admin = kzalloc(sizeof(*admin), GFP_KERNEL);
1948 if (!admin)
1949 return ERR_PTR(-ENOMEM);
1950 INIT_LIST_HEAD(&admin->list);
1951 INIT_LIST_HEAD(&admin->rules);
1952 INIT_LIST_HEAD(&admin->enabled);
1953 mutex_init(&admin->lock);
1954 admin->vtype = cfg->vtype;
1955 admin->vinst = cfg->vinst;
1956 admin->ingress = cfg->ingress;
1957 admin->lookups = cfg->lookups;
1958 admin->lookups_per_instance = cfg->lookups_per_instance;
1959 admin->first_cid = cfg->first_cid;
1960 admin->last_cid = cfg->last_cid;
1961 admin->cache.keystream =
1962 kzalloc(STREAMSIZE, GFP_KERNEL);
1963 admin->cache.maskstream =
1964 kzalloc(STREAMSIZE, GFP_KERNEL);
1965 admin->cache.actionstream =
1966 kzalloc(STREAMSIZE, GFP_KERNEL);
1967 if (!admin->cache.keystream || !admin->cache.maskstream ||
1968 !admin->cache.actionstream) {
1969 sparx5_vcap_admin_free(admin);
1970 return ERR_PTR(-ENOMEM);
1971 }
1972 return admin;
1973}
1974
1975/* Do block allocations and provide addresses for VCAP instances */
1976static void sparx5_vcap_block_alloc(struct sparx5 *sparx5,
1977 struct vcap_admin *admin,
1978 const struct sparx5_vcap_inst *cfg)
1979{
1980 int idx, cores;
1981
1982 switch (admin->vtype) {
1983 case VCAP_TYPE_IS0:
1984 case VCAP_TYPE_IS2:
1985 /* Super VCAP block mapping and address configuration. Block 0
1986 * is assigned addresses 0 through 3071, block 1 is assigned
1987 * addresses 3072 though 6143, and so on.
1988 */
1989 for (idx = cfg->blockno; idx < cfg->blockno + cfg->blocks;
1990 ++idx) {
1991 spx5_wr(VCAP_SUPER_IDX_CORE_IDX_SET(idx), sparx5,
1992 VCAP_SUPER_IDX);
1993 spx5_wr(VCAP_SUPER_MAP_CORE_MAP_SET(cfg->map_id),
1994 sparx5, VCAP_SUPER_MAP);
1995 }
1996 admin->first_valid_addr = cfg->blockno * SUPER_VCAP_BLK_SIZE;
1997 admin->last_used_addr = admin->first_valid_addr +
1998 cfg->blocks * SUPER_VCAP_BLK_SIZE;
1999 admin->last_valid_addr = admin->last_used_addr - 1;
2000 break;
2001 case VCAP_TYPE_ES0:
2002 admin->first_valid_addr = 0;
2003 admin->last_used_addr = cfg->count;
2004 admin->last_valid_addr = cfg->count - 1;
2005 cores = spx5_rd(sparx5, VCAP_ES0_CORE_CNT);
2006 for (idx = 0; idx < cores; ++idx) {
2007 spx5_wr(VCAP_ES0_IDX_CORE_IDX_SET(idx), sparx5,
2008 VCAP_ES0_IDX);
2009 spx5_wr(VCAP_ES0_MAP_CORE_MAP_SET(1), sparx5,
2010 VCAP_ES0_MAP);
2011 }
2012 break;
2013 case VCAP_TYPE_ES2:
2014 admin->first_valid_addr = 0;
2015 admin->last_used_addr = cfg->count;
2016 admin->last_valid_addr = cfg->count - 1;
2017 cores = spx5_rd(sparx5, VCAP_ES2_CORE_CNT);
2018 for (idx = 0; idx < cores; ++idx) {
2019 spx5_wr(VCAP_ES2_IDX_CORE_IDX_SET(idx), sparx5,
2020 VCAP_ES2_IDX);
2021 spx5_wr(VCAP_ES2_MAP_CORE_MAP_SET(1), sparx5,
2022 VCAP_ES2_MAP);
2023 }
2024 break;
2025 default:
2026 sparx5_vcap_type_err(sparx5, admin, __func__);
2027 break;
2028 }
2029}
2030
2031/* Allocate a vcap control and vcap instances and configure the system */
2032int sparx5_vcap_init(struct sparx5 *sparx5)
2033{
2034 const struct sparx5_consts *consts = sparx5->data->consts;
2035 const struct sparx5_vcap_inst *cfg;
2036 struct vcap_control *ctrl;
2037 struct vcap_admin *admin;
2038 struct dentry *dir;
2039 int err = 0, idx;
2040
2041 /* Create a VCAP control instance that owns the platform specific VCAP
2042 * model with VCAP instances and information about keysets, keys,
2043 * actionsets and actions
2044 * - Create administrative state for each available VCAP
2045 * - Lists of rules
2046 * - Address information
2047 * - Initialize VCAP blocks
2048 * - Configure port keysets
2049 */
2050 ctrl = kzalloc(sizeof(*ctrl), GFP_KERNEL);
2051 if (!ctrl)
2052 return -ENOMEM;
2053
2054 sparx5->vcap_ctrl = ctrl;
2055 /* select the sparx5 VCAP model */
2056 ctrl->vcaps = consts->vcaps;
2057 ctrl->stats = consts->vcap_stats;
2058 /* Setup callbacks to allow the API to use the VCAP HW */
2059 ctrl->ops = &sparx5_vcap_ops;
2060
2061 INIT_LIST_HEAD(&ctrl->list);
2062 for (idx = 0; idx < ARRAY_SIZE(sparx5_vcap_inst_cfg); ++idx) {
2063 cfg = &consts->vcaps_cfg[idx];
2064 admin = sparx5_vcap_admin_alloc(sparx5, ctrl, cfg);
2065 if (IS_ERR(admin)) {
2066 err = PTR_ERR(admin);
2067 pr_err("%s:%d: vcap allocation failed: %d\n",
2068 __func__, __LINE__, err);
2069 return err;
2070 }
2071 sparx5_vcap_block_alloc(sparx5, admin, cfg);
2072 sparx5_vcap_block_init(sparx5, admin);
2073 if (cfg->vinst == 0)
2074 sparx5_vcap_port_key_selection(sparx5, admin);
2075 list_add_tail(&admin->list, &ctrl->list);
2076 }
2077 dir = vcap_debugfs(sparx5->dev, sparx5->debugfs_root, ctrl);
2078 for (idx = 0; idx < consts->n_ports; ++idx)
2079 if (sparx5->ports[idx])
2080 vcap_port_debugfs(sparx5->dev, dir, ctrl,
2081 sparx5->ports[idx]->ndev);
2082
2083 return err;
2084}
2085
2086void sparx5_vcap_destroy(struct sparx5 *sparx5)
2087{
2088 struct vcap_control *ctrl = sparx5->vcap_ctrl;
2089 struct vcap_admin *admin, *admin_next;
2090
2091 if (!ctrl)
2092 return;
2093
2094 list_for_each_entry_safe(admin, admin_next, &ctrl->list, list) {
2095 sparx5_vcap_port_key_deselection(sparx5, admin);
2096 vcap_del_rules(ctrl, admin);
2097 list_del(&admin->list);
2098 sparx5_vcap_admin_free(admin);
2099 }
2100 kfree(ctrl);
2101}
1// SPDX-License-Identifier: GPL-2.0+
2/* Microchip Sparx5 Switch driver VCAP implementation
3 *
4 * Copyright (c) 2022 Microchip Technology Inc. and its subsidiaries.
5 *
6 * The Sparx5 Chip Register Model can be browsed at this location:
7 * https://github.com/microchip-ung/sparx-5_reginfo
8 */
9
10#include "vcap_api_debugfs.h"
11#include "sparx5_main_regs.h"
12#include "sparx5_main.h"
13#include "sparx5_vcap_impl.h"
14#include "sparx5_vcap_ag_api.h"
15#include "sparx5_vcap_debugfs.h"
16
17#define SUPER_VCAP_BLK_SIZE 3072 /* addresses per Super VCAP block */
18#define STREAMSIZE (64 * 4) /* bytes in the VCAP cache area */
19
20#define SPARX5_IS2_LOOKUPS 4
21#define VCAP_IS2_KEYSEL(_ena, _noneth, _v4_mc, _v4_uc, _v6_mc, _v6_uc, _arp) \
22 (ANA_ACL_VCAP_S2_KEY_SEL_KEY_SEL_ENA_SET(_ena) | \
23 ANA_ACL_VCAP_S2_KEY_SEL_NON_ETH_KEY_SEL_SET(_noneth) | \
24 ANA_ACL_VCAP_S2_KEY_SEL_IP4_MC_KEY_SEL_SET(_v4_mc) | \
25 ANA_ACL_VCAP_S2_KEY_SEL_IP4_UC_KEY_SEL_SET(_v4_uc) | \
26 ANA_ACL_VCAP_S2_KEY_SEL_IP6_MC_KEY_SEL_SET(_v6_mc) | \
27 ANA_ACL_VCAP_S2_KEY_SEL_IP6_UC_KEY_SEL_SET(_v6_uc) | \
28 ANA_ACL_VCAP_S2_KEY_SEL_ARP_KEY_SEL_SET(_arp))
29
30#define SPARX5_IS0_LOOKUPS 6
31#define VCAP_IS0_KEYSEL(_ena, _etype, _ipv4, _ipv6, _mpls_uc, _mpls_mc, _mlbs) \
32 (ANA_CL_ADV_CL_CFG_LOOKUP_ENA_SET(_ena) | \
33 ANA_CL_ADV_CL_CFG_ETYPE_CLM_KEY_SEL_SET(_etype) | \
34 ANA_CL_ADV_CL_CFG_IP4_CLM_KEY_SEL_SET(_ipv4) | \
35 ANA_CL_ADV_CL_CFG_IP6_CLM_KEY_SEL_SET(_ipv6) | \
36 ANA_CL_ADV_CL_CFG_MPLS_UC_CLM_KEY_SEL_SET(_mpls_uc) | \
37 ANA_CL_ADV_CL_CFG_MPLS_MC_CLM_KEY_SEL_SET(_mpls_mc) | \
38 ANA_CL_ADV_CL_CFG_MLBS_CLM_KEY_SEL_SET(_mlbs))
39
40#define SPARX5_ES0_LOOKUPS 1
41#define VCAP_ES0_KEYSEL(_key) (REW_RTAG_ETAG_CTRL_ES0_ISDX_KEY_ENA_SET(_key))
42#define SPARX5_STAT_ESDX_GRN_PKTS 0x300
43#define SPARX5_STAT_ESDX_YEL_PKTS 0x301
44
45#define SPARX5_ES2_LOOKUPS 2
46#define VCAP_ES2_KEYSEL(_ena, _arp, _ipv4, _ipv6) \
47 (EACL_VCAP_ES2_KEY_SEL_KEY_ENA_SET(_ena) | \
48 EACL_VCAP_ES2_KEY_SEL_ARP_KEY_SEL_SET(_arp) | \
49 EACL_VCAP_ES2_KEY_SEL_IP4_KEY_SEL_SET(_ipv4) | \
50 EACL_VCAP_ES2_KEY_SEL_IP6_KEY_SEL_SET(_ipv6))
51
52static struct sparx5_vcap_inst {
53 enum vcap_type vtype; /* type of vcap */
54 int vinst; /* instance number within the same type */
55 int lookups; /* number of lookups in this vcap type */
56 int lookups_per_instance; /* number of lookups in this instance */
57 int first_cid; /* first chain id in this vcap */
58 int last_cid; /* last chain id in this vcap */
59 int count; /* number of available addresses, not in super vcap */
60 int map_id; /* id in the super vcap block mapping (if applicable) */
61 int blockno; /* starting block in super vcap (if applicable) */
62 int blocks; /* number of blocks in super vcap (if applicable) */
63 bool ingress; /* is vcap in the ingress path */
64} sparx5_vcap_inst_cfg[] = {
65 {
66 .vtype = VCAP_TYPE_IS0, /* CLM-0 */
67 .vinst = 0,
68 .map_id = 1,
69 .lookups = SPARX5_IS0_LOOKUPS,
70 .lookups_per_instance = SPARX5_IS0_LOOKUPS / 3,
71 .first_cid = SPARX5_VCAP_CID_IS0_L0,
72 .last_cid = SPARX5_VCAP_CID_IS0_L2 - 1,
73 .blockno = 8, /* Maps block 8-9 */
74 .blocks = 2,
75 .ingress = true,
76 },
77 {
78 .vtype = VCAP_TYPE_IS0, /* CLM-1 */
79 .vinst = 1,
80 .map_id = 2,
81 .lookups = SPARX5_IS0_LOOKUPS,
82 .lookups_per_instance = SPARX5_IS0_LOOKUPS / 3,
83 .first_cid = SPARX5_VCAP_CID_IS0_L2,
84 .last_cid = SPARX5_VCAP_CID_IS0_L4 - 1,
85 .blockno = 6, /* Maps block 6-7 */
86 .blocks = 2,
87 .ingress = true,
88 },
89 {
90 .vtype = VCAP_TYPE_IS0, /* CLM-2 */
91 .vinst = 2,
92 .map_id = 3,
93 .lookups = SPARX5_IS0_LOOKUPS,
94 .lookups_per_instance = SPARX5_IS0_LOOKUPS / 3,
95 .first_cid = SPARX5_VCAP_CID_IS0_L4,
96 .last_cid = SPARX5_VCAP_CID_IS0_MAX,
97 .blockno = 4, /* Maps block 4-5 */
98 .blocks = 2,
99 .ingress = true,
100 },
101 {
102 .vtype = VCAP_TYPE_IS2, /* IS2-0 */
103 .vinst = 0,
104 .map_id = 4,
105 .lookups = SPARX5_IS2_LOOKUPS,
106 .lookups_per_instance = SPARX5_IS2_LOOKUPS / 2,
107 .first_cid = SPARX5_VCAP_CID_IS2_L0,
108 .last_cid = SPARX5_VCAP_CID_IS2_L2 - 1,
109 .blockno = 0, /* Maps block 0-1 */
110 .blocks = 2,
111 .ingress = true,
112 },
113 {
114 .vtype = VCAP_TYPE_IS2, /* IS2-1 */
115 .vinst = 1,
116 .map_id = 5,
117 .lookups = SPARX5_IS2_LOOKUPS,
118 .lookups_per_instance = SPARX5_IS2_LOOKUPS / 2,
119 .first_cid = SPARX5_VCAP_CID_IS2_L2,
120 .last_cid = SPARX5_VCAP_CID_IS2_MAX,
121 .blockno = 2, /* Maps block 2-3 */
122 .blocks = 2,
123 .ingress = true,
124 },
125 {
126 .vtype = VCAP_TYPE_ES0,
127 .lookups = SPARX5_ES0_LOOKUPS,
128 .lookups_per_instance = SPARX5_ES0_LOOKUPS,
129 .first_cid = SPARX5_VCAP_CID_ES0_L0,
130 .last_cid = SPARX5_VCAP_CID_ES0_MAX,
131 .count = 4096, /* Addresses according to datasheet */
132 .ingress = false,
133 },
134 {
135 .vtype = VCAP_TYPE_ES2,
136 .lookups = SPARX5_ES2_LOOKUPS,
137 .lookups_per_instance = SPARX5_ES2_LOOKUPS,
138 .first_cid = SPARX5_VCAP_CID_ES2_L0,
139 .last_cid = SPARX5_VCAP_CID_ES2_MAX,
140 .count = 12288, /* Addresses according to datasheet */
141 .ingress = false,
142 },
143};
144
145/* These protocols have dedicated keysets in IS0 and a TC dissector */
146static u16 sparx5_vcap_is0_known_etypes[] = {
147 ETH_P_ALL,
148 ETH_P_IP,
149 ETH_P_IPV6,
150};
151
152/* These protocols have dedicated keysets in IS2 and a TC dissector */
153static u16 sparx5_vcap_is2_known_etypes[] = {
154 ETH_P_ALL,
155 ETH_P_ARP,
156 ETH_P_IP,
157 ETH_P_IPV6,
158};
159
160/* These protocols have dedicated keysets in ES2 and a TC dissector */
161static u16 sparx5_vcap_es2_known_etypes[] = {
162 ETH_P_ALL,
163 ETH_P_ARP,
164 ETH_P_IP,
165 ETH_P_IPV6,
166};
167
168static void sparx5_vcap_type_err(struct sparx5 *sparx5,
169 struct vcap_admin *admin,
170 const char *fname)
171{
172 pr_err("%s: vcap type: %s not supported\n",
173 fname, sparx5_vcaps[admin->vtype].name);
174}
175
176/* Await the super VCAP completion of the current operation */
177static void sparx5_vcap_wait_super_update(struct sparx5 *sparx5)
178{
179 u32 value;
180
181 read_poll_timeout(spx5_rd, value,
182 !VCAP_SUPER_CTRL_UPDATE_SHOT_GET(value), 500, 10000,
183 false, sparx5, VCAP_SUPER_CTRL);
184}
185
186/* Await the ES0 VCAP completion of the current operation */
187static void sparx5_vcap_wait_es0_update(struct sparx5 *sparx5)
188{
189 u32 value;
190
191 read_poll_timeout(spx5_rd, value,
192 !VCAP_ES0_CTRL_UPDATE_SHOT_GET(value), 500, 10000,
193 false, sparx5, VCAP_ES0_CTRL);
194}
195
196/* Await the ES2 VCAP completion of the current operation */
197static void sparx5_vcap_wait_es2_update(struct sparx5 *sparx5)
198{
199 u32 value;
200
201 read_poll_timeout(spx5_rd, value,
202 !VCAP_ES2_CTRL_UPDATE_SHOT_GET(value), 500, 10000,
203 false, sparx5, VCAP_ES2_CTRL);
204}
205
206/* Initializing a VCAP address range */
207static void _sparx5_vcap_range_init(struct sparx5 *sparx5,
208 struct vcap_admin *admin,
209 u32 addr, u32 count)
210{
211 u32 size = count - 1;
212
213 switch (admin->vtype) {
214 case VCAP_TYPE_IS0:
215 case VCAP_TYPE_IS2:
216 spx5_wr(VCAP_SUPER_CFG_MV_NUM_POS_SET(0) |
217 VCAP_SUPER_CFG_MV_SIZE_SET(size),
218 sparx5, VCAP_SUPER_CFG);
219 spx5_wr(VCAP_SUPER_CTRL_UPDATE_CMD_SET(VCAP_CMD_INITIALIZE) |
220 VCAP_SUPER_CTRL_UPDATE_ENTRY_DIS_SET(0) |
221 VCAP_SUPER_CTRL_UPDATE_ACTION_DIS_SET(0) |
222 VCAP_SUPER_CTRL_UPDATE_CNT_DIS_SET(0) |
223 VCAP_SUPER_CTRL_UPDATE_ADDR_SET(addr) |
224 VCAP_SUPER_CTRL_CLEAR_CACHE_SET(true) |
225 VCAP_SUPER_CTRL_UPDATE_SHOT_SET(true),
226 sparx5, VCAP_SUPER_CTRL);
227 sparx5_vcap_wait_super_update(sparx5);
228 break;
229 case VCAP_TYPE_ES0:
230 spx5_wr(VCAP_ES0_CFG_MV_NUM_POS_SET(0) |
231 VCAP_ES0_CFG_MV_SIZE_SET(size),
232 sparx5, VCAP_ES0_CFG);
233 spx5_wr(VCAP_ES0_CTRL_UPDATE_CMD_SET(VCAP_CMD_INITIALIZE) |
234 VCAP_ES0_CTRL_UPDATE_ENTRY_DIS_SET(0) |
235 VCAP_ES0_CTRL_UPDATE_ACTION_DIS_SET(0) |
236 VCAP_ES0_CTRL_UPDATE_CNT_DIS_SET(0) |
237 VCAP_ES0_CTRL_UPDATE_ADDR_SET(addr) |
238 VCAP_ES0_CTRL_CLEAR_CACHE_SET(true) |
239 VCAP_ES0_CTRL_UPDATE_SHOT_SET(true),
240 sparx5, VCAP_ES0_CTRL);
241 sparx5_vcap_wait_es0_update(sparx5);
242 break;
243 case VCAP_TYPE_ES2:
244 spx5_wr(VCAP_ES2_CFG_MV_NUM_POS_SET(0) |
245 VCAP_ES2_CFG_MV_SIZE_SET(size),
246 sparx5, VCAP_ES2_CFG);
247 spx5_wr(VCAP_ES2_CTRL_UPDATE_CMD_SET(VCAP_CMD_INITIALIZE) |
248 VCAP_ES2_CTRL_UPDATE_ENTRY_DIS_SET(0) |
249 VCAP_ES2_CTRL_UPDATE_ACTION_DIS_SET(0) |
250 VCAP_ES2_CTRL_UPDATE_CNT_DIS_SET(0) |
251 VCAP_ES2_CTRL_UPDATE_ADDR_SET(addr) |
252 VCAP_ES2_CTRL_CLEAR_CACHE_SET(true) |
253 VCAP_ES2_CTRL_UPDATE_SHOT_SET(true),
254 sparx5, VCAP_ES2_CTRL);
255 sparx5_vcap_wait_es2_update(sparx5);
256 break;
257 default:
258 sparx5_vcap_type_err(sparx5, admin, __func__);
259 break;
260 }
261}
262
263/* Initializing VCAP rule data area */
264static void sparx5_vcap_block_init(struct sparx5 *sparx5,
265 struct vcap_admin *admin)
266{
267 _sparx5_vcap_range_init(sparx5, admin, admin->first_valid_addr,
268 admin->last_valid_addr -
269 admin->first_valid_addr);
270}
271
272/* Get the keyset name from the sparx5 VCAP model */
273static const char *sparx5_vcap_keyset_name(struct net_device *ndev,
274 enum vcap_keyfield_set keyset)
275{
276 struct sparx5_port *port = netdev_priv(ndev);
277
278 return vcap_keyset_name(port->sparx5->vcap_ctrl, keyset);
279}
280
281/* Check if this is the first lookup of IS0 */
282static bool sparx5_vcap_is0_is_first_chain(struct vcap_rule *rule)
283{
284 return (rule->vcap_chain_id >= SPARX5_VCAP_CID_IS0_L0 &&
285 rule->vcap_chain_id < SPARX5_VCAP_CID_IS0_L1) ||
286 ((rule->vcap_chain_id >= SPARX5_VCAP_CID_IS0_L2 &&
287 rule->vcap_chain_id < SPARX5_VCAP_CID_IS0_L3)) ||
288 ((rule->vcap_chain_id >= SPARX5_VCAP_CID_IS0_L4 &&
289 rule->vcap_chain_id < SPARX5_VCAP_CID_IS0_L5));
290}
291
292/* Check if this is the first lookup of IS2 */
293static bool sparx5_vcap_is2_is_first_chain(struct vcap_rule *rule)
294{
295 return (rule->vcap_chain_id >= SPARX5_VCAP_CID_IS2_L0 &&
296 rule->vcap_chain_id < SPARX5_VCAP_CID_IS2_L1) ||
297 ((rule->vcap_chain_id >= SPARX5_VCAP_CID_IS2_L2 &&
298 rule->vcap_chain_id < SPARX5_VCAP_CID_IS2_L3));
299}
300
301static bool sparx5_vcap_es2_is_first_chain(struct vcap_rule *rule)
302{
303 return (rule->vcap_chain_id >= SPARX5_VCAP_CID_ES2_L0 &&
304 rule->vcap_chain_id < SPARX5_VCAP_CID_ES2_L1);
305}
306
307/* Set the narrow range ingress port mask on a rule */
308static void sparx5_vcap_add_ingress_range_port_mask(struct vcap_rule *rule,
309 struct net_device *ndev)
310{
311 struct sparx5_port *port = netdev_priv(ndev);
312 u32 port_mask;
313 u32 range;
314
315 range = port->portno / BITS_PER_TYPE(u32);
316 /* Port bit set to match-any */
317 port_mask = ~BIT(port->portno % BITS_PER_TYPE(u32));
318 vcap_rule_add_key_u32(rule, VCAP_KF_IF_IGR_PORT_MASK_SEL, 0, 0xf);
319 vcap_rule_add_key_u32(rule, VCAP_KF_IF_IGR_PORT_MASK_RNG, range, 0xf);
320 vcap_rule_add_key_u32(rule, VCAP_KF_IF_IGR_PORT_MASK, 0, port_mask);
321}
322
323/* Set the wide range ingress port mask on a rule */
324static void sparx5_vcap_add_wide_port_mask(struct vcap_rule *rule,
325 struct net_device *ndev)
326{
327 struct sparx5_port *port = netdev_priv(ndev);
328 struct vcap_u72_key port_mask;
329 u32 range;
330
331 /* Port bit set to match-any */
332 memset(port_mask.value, 0, sizeof(port_mask.value));
333 memset(port_mask.mask, 0xff, sizeof(port_mask.mask));
334 range = port->portno / BITS_PER_BYTE;
335 port_mask.mask[range] = ~BIT(port->portno % BITS_PER_BYTE);
336 vcap_rule_add_key_u72(rule, VCAP_KF_IF_IGR_PORT_MASK, &port_mask);
337}
338
339static void sparx5_vcap_add_egress_range_port_mask(struct vcap_rule *rule,
340 struct net_device *ndev)
341{
342 struct sparx5_port *port = netdev_priv(ndev);
343 u32 port_mask;
344 u32 range;
345
346 /* Mask range selects:
347 * 0-2: Physical/Logical egress port number 0-31, 32–63, 64.
348 * 3-5: Virtual Interface Number 0-31, 32-63, 64.
349 * 6: CPU queue Number 0-7.
350 *
351 * Use physical/logical port ranges (0-2)
352 */
353 range = port->portno / BITS_PER_TYPE(u32);
354 /* Port bit set to match-any */
355 port_mask = ~BIT(port->portno % BITS_PER_TYPE(u32));
356 vcap_rule_add_key_u32(rule, VCAP_KF_IF_EGR_PORT_MASK_RNG, range, 0xf);
357 vcap_rule_add_key_u32(rule, VCAP_KF_IF_EGR_PORT_MASK, 0, port_mask);
358}
359
360/* Convert IS0 chain id to vcap lookup id */
361static int sparx5_vcap_is0_cid_to_lookup(int cid)
362{
363 int lookup = 0;
364
365 if (cid >= SPARX5_VCAP_CID_IS0_L1 && cid < SPARX5_VCAP_CID_IS0_L2)
366 lookup = 1;
367 else if (cid >= SPARX5_VCAP_CID_IS0_L2 && cid < SPARX5_VCAP_CID_IS0_L3)
368 lookup = 2;
369 else if (cid >= SPARX5_VCAP_CID_IS0_L3 && cid < SPARX5_VCAP_CID_IS0_L4)
370 lookup = 3;
371 else if (cid >= SPARX5_VCAP_CID_IS0_L4 && cid < SPARX5_VCAP_CID_IS0_L5)
372 lookup = 4;
373 else if (cid >= SPARX5_VCAP_CID_IS0_L5 && cid < SPARX5_VCAP_CID_IS0_MAX)
374 lookup = 5;
375
376 return lookup;
377}
378
379/* Convert IS2 chain id to vcap lookup id */
380static int sparx5_vcap_is2_cid_to_lookup(int cid)
381{
382 int lookup = 0;
383
384 if (cid >= SPARX5_VCAP_CID_IS2_L1 && cid < SPARX5_VCAP_CID_IS2_L2)
385 lookup = 1;
386 else if (cid >= SPARX5_VCAP_CID_IS2_L2 && cid < SPARX5_VCAP_CID_IS2_L3)
387 lookup = 2;
388 else if (cid >= SPARX5_VCAP_CID_IS2_L3 && cid < SPARX5_VCAP_CID_IS2_MAX)
389 lookup = 3;
390
391 return lookup;
392}
393
394/* Convert ES2 chain id to vcap lookup id */
395static int sparx5_vcap_es2_cid_to_lookup(int cid)
396{
397 int lookup = 0;
398
399 if (cid >= SPARX5_VCAP_CID_ES2_L1)
400 lookup = 1;
401
402 return lookup;
403}
404
405/* Add ethernet type IS0 keyset to a list */
406static void
407sparx5_vcap_is0_get_port_etype_keysets(struct vcap_keyset_list *keysetlist,
408 u32 value)
409{
410 switch (ANA_CL_ADV_CL_CFG_ETYPE_CLM_KEY_SEL_GET(value)) {
411 case VCAP_IS0_PS_ETYPE_NORMAL_7TUPLE:
412 vcap_keyset_list_add(keysetlist, VCAP_KFS_NORMAL_7TUPLE);
413 break;
414 case VCAP_IS0_PS_ETYPE_NORMAL_5TUPLE_IP4:
415 vcap_keyset_list_add(keysetlist, VCAP_KFS_NORMAL_5TUPLE_IP4);
416 break;
417 }
418}
419
420/* Return the list of keysets for the vcap port configuration */
421static int sparx5_vcap_is0_get_port_keysets(struct net_device *ndev,
422 int lookup,
423 struct vcap_keyset_list *keysetlist,
424 u16 l3_proto)
425{
426 struct sparx5_port *port = netdev_priv(ndev);
427 struct sparx5 *sparx5 = port->sparx5;
428 int portno = port->portno;
429 u32 value;
430
431 value = spx5_rd(sparx5, ANA_CL_ADV_CL_CFG(portno, lookup));
432
433 /* Collect all keysets for the port in a list */
434 if (l3_proto == ETH_P_ALL)
435 sparx5_vcap_is0_get_port_etype_keysets(keysetlist, value);
436
437 if (l3_proto == ETH_P_ALL || l3_proto == ETH_P_IP)
438 switch (ANA_CL_ADV_CL_CFG_IP4_CLM_KEY_SEL_GET(value)) {
439 case VCAP_IS0_PS_ETYPE_DEFAULT:
440 sparx5_vcap_is0_get_port_etype_keysets(keysetlist,
441 value);
442 break;
443 case VCAP_IS0_PS_ETYPE_NORMAL_7TUPLE:
444 vcap_keyset_list_add(keysetlist,
445 VCAP_KFS_NORMAL_7TUPLE);
446 break;
447 case VCAP_IS0_PS_ETYPE_NORMAL_5TUPLE_IP4:
448 vcap_keyset_list_add(keysetlist,
449 VCAP_KFS_NORMAL_5TUPLE_IP4);
450 break;
451 }
452
453 if (l3_proto == ETH_P_ALL || l3_proto == ETH_P_IPV6)
454 switch (ANA_CL_ADV_CL_CFG_IP6_CLM_KEY_SEL_GET(value)) {
455 case VCAP_IS0_PS_ETYPE_DEFAULT:
456 sparx5_vcap_is0_get_port_etype_keysets(keysetlist,
457 value);
458 break;
459 case VCAP_IS0_PS_ETYPE_NORMAL_7TUPLE:
460 vcap_keyset_list_add(keysetlist,
461 VCAP_KFS_NORMAL_7TUPLE);
462 break;
463 case VCAP_IS0_PS_ETYPE_NORMAL_5TUPLE_IP4:
464 vcap_keyset_list_add(keysetlist,
465 VCAP_KFS_NORMAL_5TUPLE_IP4);
466 break;
467 }
468
469 if (l3_proto != ETH_P_IP && l3_proto != ETH_P_IPV6)
470 sparx5_vcap_is0_get_port_etype_keysets(keysetlist, value);
471 return 0;
472}
473
474/* Return the list of keysets for the vcap port configuration */
475static int sparx5_vcap_is2_get_port_keysets(struct net_device *ndev,
476 int lookup,
477 struct vcap_keyset_list *keysetlist,
478 u16 l3_proto)
479{
480 struct sparx5_port *port = netdev_priv(ndev);
481 struct sparx5 *sparx5 = port->sparx5;
482 int portno = port->portno;
483 u32 value;
484
485 value = spx5_rd(sparx5, ANA_ACL_VCAP_S2_KEY_SEL(portno, lookup));
486
487 /* Collect all keysets for the port in a list */
488 if (l3_proto == ETH_P_ALL || l3_proto == ETH_P_ARP) {
489 switch (ANA_ACL_VCAP_S2_KEY_SEL_ARP_KEY_SEL_GET(value)) {
490 case VCAP_IS2_PS_ARP_MAC_ETYPE:
491 vcap_keyset_list_add(keysetlist, VCAP_KFS_MAC_ETYPE);
492 break;
493 case VCAP_IS2_PS_ARP_ARP:
494 vcap_keyset_list_add(keysetlist, VCAP_KFS_ARP);
495 break;
496 }
497 }
498
499 if (l3_proto == ETH_P_ALL || l3_proto == ETH_P_IP) {
500 switch (ANA_ACL_VCAP_S2_KEY_SEL_IP4_UC_KEY_SEL_GET(value)) {
501 case VCAP_IS2_PS_IPV4_UC_MAC_ETYPE:
502 vcap_keyset_list_add(keysetlist, VCAP_KFS_MAC_ETYPE);
503 break;
504 case VCAP_IS2_PS_IPV4_UC_IP4_TCP_UDP_OTHER:
505 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_TCP_UDP);
506 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_OTHER);
507 break;
508 case VCAP_IS2_PS_IPV4_UC_IP_7TUPLE:
509 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP_7TUPLE);
510 break;
511 }
512
513 switch (ANA_ACL_VCAP_S2_KEY_SEL_IP4_MC_KEY_SEL_GET(value)) {
514 case VCAP_IS2_PS_IPV4_MC_MAC_ETYPE:
515 vcap_keyset_list_add(keysetlist, VCAP_KFS_MAC_ETYPE);
516 break;
517 case VCAP_IS2_PS_IPV4_MC_IP4_TCP_UDP_OTHER:
518 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_TCP_UDP);
519 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_OTHER);
520 break;
521 case VCAP_IS2_PS_IPV4_MC_IP_7TUPLE:
522 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP_7TUPLE);
523 break;
524 }
525 }
526
527 if (l3_proto == ETH_P_ALL || l3_proto == ETH_P_IPV6) {
528 switch (ANA_ACL_VCAP_S2_KEY_SEL_IP6_UC_KEY_SEL_GET(value)) {
529 case VCAP_IS2_PS_IPV6_UC_MAC_ETYPE:
530 vcap_keyset_list_add(keysetlist, VCAP_KFS_MAC_ETYPE);
531 break;
532 case VCAP_IS2_PS_IPV6_UC_IP_7TUPLE:
533 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP_7TUPLE);
534 break;
535 case VCAP_IS2_PS_IPV6_UC_IP6_STD:
536 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP6_STD);
537 break;
538 case VCAP_IS2_PS_IPV6_UC_IP4_TCP_UDP_OTHER:
539 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_TCP_UDP);
540 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_OTHER);
541 break;
542 }
543
544 switch (ANA_ACL_VCAP_S2_KEY_SEL_IP6_MC_KEY_SEL_GET(value)) {
545 case VCAP_IS2_PS_IPV6_MC_MAC_ETYPE:
546 vcap_keyset_list_add(keysetlist, VCAP_KFS_MAC_ETYPE);
547 break;
548 case VCAP_IS2_PS_IPV6_MC_IP_7TUPLE:
549 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP_7TUPLE);
550 break;
551 case VCAP_IS2_PS_IPV6_MC_IP6_STD:
552 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP6_STD);
553 break;
554 case VCAP_IS2_PS_IPV6_MC_IP4_TCP_UDP_OTHER:
555 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_TCP_UDP);
556 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_OTHER);
557 break;
558 case VCAP_IS2_PS_IPV6_MC_IP6_VID:
559 /* Not used */
560 break;
561 }
562 }
563
564 if (l3_proto != ETH_P_ARP && l3_proto != ETH_P_IP &&
565 l3_proto != ETH_P_IPV6) {
566 switch (ANA_ACL_VCAP_S2_KEY_SEL_NON_ETH_KEY_SEL_GET(value)) {
567 case VCAP_IS2_PS_NONETH_MAC_ETYPE:
568 /* IS2 non-classified frames generate MAC_ETYPE */
569 vcap_keyset_list_add(keysetlist, VCAP_KFS_MAC_ETYPE);
570 break;
571 }
572 }
573 return 0;
574}
575
576/* Return the keysets for the vcap port IP4 traffic class configuration */
577static void
578sparx5_vcap_es2_get_port_ipv4_keysets(struct vcap_keyset_list *keysetlist,
579 u32 value)
580{
581 switch (EACL_VCAP_ES2_KEY_SEL_IP4_KEY_SEL_GET(value)) {
582 case VCAP_ES2_PS_IPV4_MAC_ETYPE:
583 vcap_keyset_list_add(keysetlist, VCAP_KFS_MAC_ETYPE);
584 break;
585 case VCAP_ES2_PS_IPV4_IP_7TUPLE:
586 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP_7TUPLE);
587 break;
588 case VCAP_ES2_PS_IPV4_IP4_TCP_UDP_VID:
589 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_TCP_UDP);
590 break;
591 case VCAP_ES2_PS_IPV4_IP4_TCP_UDP_OTHER:
592 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_TCP_UDP);
593 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_OTHER);
594 break;
595 case VCAP_ES2_PS_IPV4_IP4_VID:
596 /* Not used */
597 break;
598 case VCAP_ES2_PS_IPV4_IP4_OTHER:
599 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP4_OTHER);
600 break;
601 }
602}
603
604/* Return the list of keysets for the vcap port configuration */
605static int sparx5_vcap_es0_get_port_keysets(struct net_device *ndev,
606 struct vcap_keyset_list *keysetlist,
607 u16 l3_proto)
608{
609 struct sparx5_port *port = netdev_priv(ndev);
610 struct sparx5 *sparx5 = port->sparx5;
611 int portno = port->portno;
612 u32 value;
613
614 value = spx5_rd(sparx5, REW_RTAG_ETAG_CTRL(portno));
615
616 /* Collect all keysets for the port in a list */
617 switch (REW_RTAG_ETAG_CTRL_ES0_ISDX_KEY_ENA_GET(value)) {
618 case VCAP_ES0_PS_NORMAL_SELECTION:
619 case VCAP_ES0_PS_FORCE_ISDX_LOOKUPS:
620 vcap_keyset_list_add(keysetlist, VCAP_KFS_ISDX);
621 break;
622 default:
623 break;
624 }
625 return 0;
626}
627
628/* Return the list of keysets for the vcap port configuration */
629static int sparx5_vcap_es2_get_port_keysets(struct net_device *ndev,
630 int lookup,
631 struct vcap_keyset_list *keysetlist,
632 u16 l3_proto)
633{
634 struct sparx5_port *port = netdev_priv(ndev);
635 struct sparx5 *sparx5 = port->sparx5;
636 int portno = port->portno;
637 u32 value;
638
639 value = spx5_rd(sparx5, EACL_VCAP_ES2_KEY_SEL(portno, lookup));
640
641 /* Collect all keysets for the port in a list */
642 if (l3_proto == ETH_P_ALL || l3_proto == ETH_P_ARP) {
643 switch (EACL_VCAP_ES2_KEY_SEL_ARP_KEY_SEL_GET(value)) {
644 case VCAP_ES2_PS_ARP_MAC_ETYPE:
645 vcap_keyset_list_add(keysetlist, VCAP_KFS_MAC_ETYPE);
646 break;
647 case VCAP_ES2_PS_ARP_ARP:
648 vcap_keyset_list_add(keysetlist, VCAP_KFS_ARP);
649 break;
650 }
651 }
652
653 if (l3_proto == ETH_P_ALL || l3_proto == ETH_P_IP)
654 sparx5_vcap_es2_get_port_ipv4_keysets(keysetlist, value);
655
656 if (l3_proto == ETH_P_ALL || l3_proto == ETH_P_IPV6) {
657 switch (EACL_VCAP_ES2_KEY_SEL_IP6_KEY_SEL_GET(value)) {
658 case VCAP_ES2_PS_IPV6_MAC_ETYPE:
659 vcap_keyset_list_add(keysetlist, VCAP_KFS_MAC_ETYPE);
660 break;
661 case VCAP_ES2_PS_IPV6_IP_7TUPLE:
662 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP_7TUPLE);
663 break;
664 case VCAP_ES2_PS_IPV6_IP_7TUPLE_VID:
665 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP_7TUPLE);
666 break;
667 case VCAP_ES2_PS_IPV6_IP_7TUPLE_STD:
668 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP_7TUPLE);
669 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP6_STD);
670 break;
671 case VCAP_ES2_PS_IPV6_IP6_VID:
672 /* Not used */
673 break;
674 case VCAP_ES2_PS_IPV6_IP6_STD:
675 vcap_keyset_list_add(keysetlist, VCAP_KFS_IP6_STD);
676 break;
677 case VCAP_ES2_PS_IPV6_IP4_DOWNGRADE:
678 sparx5_vcap_es2_get_port_ipv4_keysets(keysetlist,
679 value);
680 break;
681 }
682 }
683
684 if (l3_proto != ETH_P_ARP && l3_proto != ETH_P_IP &&
685 l3_proto != ETH_P_IPV6) {
686 vcap_keyset_list_add(keysetlist, VCAP_KFS_MAC_ETYPE);
687 }
688 return 0;
689}
690
691/* Get the port keyset for the vcap lookup */
692int sparx5_vcap_get_port_keyset(struct net_device *ndev,
693 struct vcap_admin *admin,
694 int cid,
695 u16 l3_proto,
696 struct vcap_keyset_list *kslist)
697{
698 int lookup, err = -EINVAL;
699 struct sparx5_port *port;
700
701 switch (admin->vtype) {
702 case VCAP_TYPE_IS0:
703 lookup = sparx5_vcap_is0_cid_to_lookup(cid);
704 err = sparx5_vcap_is0_get_port_keysets(ndev, lookup, kslist,
705 l3_proto);
706 break;
707 case VCAP_TYPE_IS2:
708 lookup = sparx5_vcap_is2_cid_to_lookup(cid);
709 err = sparx5_vcap_is2_get_port_keysets(ndev, lookup, kslist,
710 l3_proto);
711 break;
712 case VCAP_TYPE_ES0:
713 err = sparx5_vcap_es0_get_port_keysets(ndev, kslist, l3_proto);
714 break;
715 case VCAP_TYPE_ES2:
716 lookup = sparx5_vcap_es2_cid_to_lookup(cid);
717 err = sparx5_vcap_es2_get_port_keysets(ndev, lookup, kslist,
718 l3_proto);
719 break;
720 default:
721 port = netdev_priv(ndev);
722 sparx5_vcap_type_err(port->sparx5, admin, __func__);
723 break;
724 }
725 return err;
726}
727
728/* Check if the ethertype is supported by the vcap port classification */
729bool sparx5_vcap_is_known_etype(struct vcap_admin *admin, u16 etype)
730{
731 const u16 *known_etypes;
732 int size, idx;
733
734 switch (admin->vtype) {
735 case VCAP_TYPE_IS0:
736 known_etypes = sparx5_vcap_is0_known_etypes;
737 size = ARRAY_SIZE(sparx5_vcap_is0_known_etypes);
738 break;
739 case VCAP_TYPE_IS2:
740 known_etypes = sparx5_vcap_is2_known_etypes;
741 size = ARRAY_SIZE(sparx5_vcap_is2_known_etypes);
742 break;
743 case VCAP_TYPE_ES0:
744 return true;
745 case VCAP_TYPE_ES2:
746 known_etypes = sparx5_vcap_es2_known_etypes;
747 size = ARRAY_SIZE(sparx5_vcap_es2_known_etypes);
748 break;
749 default:
750 return false;
751 }
752 for (idx = 0; idx < size; ++idx)
753 if (known_etypes[idx] == etype)
754 return true;
755 return false;
756}
757
758/* API callback used for validating a field keyset (check the port keysets) */
759static enum vcap_keyfield_set
760sparx5_vcap_validate_keyset(struct net_device *ndev,
761 struct vcap_admin *admin,
762 struct vcap_rule *rule,
763 struct vcap_keyset_list *kslist,
764 u16 l3_proto)
765{
766 struct vcap_keyset_list keysetlist = {};
767 enum vcap_keyfield_set keysets[10] = {};
768 struct sparx5_port *port;
769 int idx, jdx, lookup;
770
771 if (!kslist || kslist->cnt == 0)
772 return VCAP_KFS_NO_VALUE;
773
774 keysetlist.max = ARRAY_SIZE(keysets);
775 keysetlist.keysets = keysets;
776
777 /* Get a list of currently configured keysets in the lookups */
778 switch (admin->vtype) {
779 case VCAP_TYPE_IS0:
780 lookup = sparx5_vcap_is0_cid_to_lookup(rule->vcap_chain_id);
781 sparx5_vcap_is0_get_port_keysets(ndev, lookup, &keysetlist,
782 l3_proto);
783 break;
784 case VCAP_TYPE_IS2:
785 lookup = sparx5_vcap_is2_cid_to_lookup(rule->vcap_chain_id);
786 sparx5_vcap_is2_get_port_keysets(ndev, lookup, &keysetlist,
787 l3_proto);
788 break;
789 case VCAP_TYPE_ES0:
790 sparx5_vcap_es0_get_port_keysets(ndev, &keysetlist, l3_proto);
791 break;
792 case VCAP_TYPE_ES2:
793 lookup = sparx5_vcap_es2_cid_to_lookup(rule->vcap_chain_id);
794 sparx5_vcap_es2_get_port_keysets(ndev, lookup, &keysetlist,
795 l3_proto);
796 break;
797 default:
798 port = netdev_priv(ndev);
799 sparx5_vcap_type_err(port->sparx5, admin, __func__);
800 break;
801 }
802
803 /* Check if there is a match and return the match */
804 for (idx = 0; idx < kslist->cnt; ++idx)
805 for (jdx = 0; jdx < keysetlist.cnt; ++jdx)
806 if (kslist->keysets[idx] == keysets[jdx])
807 return kslist->keysets[idx];
808
809 pr_err("%s:%d: %s not supported in port key selection\n",
810 __func__, __LINE__,
811 sparx5_vcap_keyset_name(ndev, kslist->keysets[0]));
812
813 return -ENOENT;
814}
815
816static void sparx5_vcap_ingress_add_default_fields(struct net_device *ndev,
817 struct vcap_admin *admin,
818 struct vcap_rule *rule)
819{
820 const struct vcap_field *field;
821 bool is_first;
822
823 /* Add ingress port mask matching the net device */
824 field = vcap_lookup_keyfield(rule, VCAP_KF_IF_IGR_PORT_MASK);
825 if (field && field->width == SPX5_PORTS)
826 sparx5_vcap_add_wide_port_mask(rule, ndev);
827 else if (field && field->width == BITS_PER_TYPE(u32))
828 sparx5_vcap_add_ingress_range_port_mask(rule, ndev);
829 else
830 pr_err("%s:%d: %s: could not add an ingress port mask for: %s\n",
831 __func__, __LINE__, netdev_name(ndev),
832 sparx5_vcap_keyset_name(ndev, rule->keyset));
833
834 if (admin->vtype == VCAP_TYPE_IS0)
835 is_first = sparx5_vcap_is0_is_first_chain(rule);
836 else
837 is_first = sparx5_vcap_is2_is_first_chain(rule);
838
839 /* Add key that selects the first/second lookup */
840 if (is_first)
841 vcap_rule_add_key_bit(rule, VCAP_KF_LOOKUP_FIRST_IS,
842 VCAP_BIT_1);
843 else
844 vcap_rule_add_key_bit(rule, VCAP_KF_LOOKUP_FIRST_IS,
845 VCAP_BIT_0);
846}
847
848static void sparx5_vcap_es0_add_default_fields(struct net_device *ndev,
849 struct vcap_admin *admin,
850 struct vcap_rule *rule)
851{
852 struct sparx5_port *port = netdev_priv(ndev);
853
854 vcap_rule_add_key_u32(rule, VCAP_KF_IF_EGR_PORT_NO, port->portno, ~0);
855 /* Match untagged frames if there was no VLAN key */
856 vcap_rule_add_key_u32(rule, VCAP_KF_8021Q_TPID, SPX5_TPID_SEL_UNTAGGED,
857 ~0);
858}
859
860static void sparx5_vcap_es2_add_default_fields(struct net_device *ndev,
861 struct vcap_admin *admin,
862 struct vcap_rule *rule)
863{
864 const struct vcap_field *field;
865 bool is_first;
866
867 /* Add egress port mask matching the net device */
868 field = vcap_lookup_keyfield(rule, VCAP_KF_IF_EGR_PORT_MASK);
869 if (field)
870 sparx5_vcap_add_egress_range_port_mask(rule, ndev);
871
872 /* Add key that selects the first/second lookup */
873 is_first = sparx5_vcap_es2_is_first_chain(rule);
874
875 if (is_first)
876 vcap_rule_add_key_bit(rule, VCAP_KF_LOOKUP_FIRST_IS,
877 VCAP_BIT_1);
878 else
879 vcap_rule_add_key_bit(rule, VCAP_KF_LOOKUP_FIRST_IS,
880 VCAP_BIT_0);
881}
882
883/* API callback used for adding default fields to a rule */
884static void sparx5_vcap_add_default_fields(struct net_device *ndev,
885 struct vcap_admin *admin,
886 struct vcap_rule *rule)
887{
888 struct sparx5_port *port;
889
890 /* add the lookup bit */
891 switch (admin->vtype) {
892 case VCAP_TYPE_IS0:
893 case VCAP_TYPE_IS2:
894 sparx5_vcap_ingress_add_default_fields(ndev, admin, rule);
895 break;
896 case VCAP_TYPE_ES0:
897 sparx5_vcap_es0_add_default_fields(ndev, admin, rule);
898 break;
899 case VCAP_TYPE_ES2:
900 sparx5_vcap_es2_add_default_fields(ndev, admin, rule);
901 break;
902 default:
903 port = netdev_priv(ndev);
904 sparx5_vcap_type_err(port->sparx5, admin, __func__);
905 break;
906 }
907}
908
909/* API callback used for erasing the vcap cache area (not the register area) */
910static void sparx5_vcap_cache_erase(struct vcap_admin *admin)
911{
912 memset(admin->cache.keystream, 0, STREAMSIZE);
913 memset(admin->cache.maskstream, 0, STREAMSIZE);
914 memset(admin->cache.actionstream, 0, STREAMSIZE);
915 memset(&admin->cache.counter, 0, sizeof(admin->cache.counter));
916}
917
918static void sparx5_vcap_is0_cache_write(struct sparx5 *sparx5,
919 struct vcap_admin *admin,
920 enum vcap_selection sel,
921 u32 start,
922 u32 count)
923{
924 u32 *keystr, *mskstr, *actstr;
925 int idx;
926
927 keystr = &admin->cache.keystream[start];
928 mskstr = &admin->cache.maskstream[start];
929 actstr = &admin->cache.actionstream[start];
930
931 switch (sel) {
932 case VCAP_SEL_ENTRY:
933 for (idx = 0; idx < count; ++idx) {
934 /* Avoid 'match-off' by setting value & mask */
935 spx5_wr(keystr[idx] & mskstr[idx], sparx5,
936 VCAP_SUPER_VCAP_ENTRY_DAT(idx));
937 spx5_wr(~mskstr[idx], sparx5,
938 VCAP_SUPER_VCAP_MASK_DAT(idx));
939 }
940 break;
941 case VCAP_SEL_ACTION:
942 for (idx = 0; idx < count; ++idx)
943 spx5_wr(actstr[idx], sparx5,
944 VCAP_SUPER_VCAP_ACTION_DAT(idx));
945 break;
946 case VCAP_SEL_ALL:
947 pr_err("%s:%d: cannot write all streams at once\n",
948 __func__, __LINE__);
949 break;
950 default:
951 break;
952 }
953
954 if (sel & VCAP_SEL_COUNTER)
955 spx5_wr(admin->cache.counter, sparx5,
956 VCAP_SUPER_VCAP_CNT_DAT(0));
957}
958
959static void sparx5_vcap_is2_cache_write(struct sparx5 *sparx5,
960 struct vcap_admin *admin,
961 enum vcap_selection sel,
962 u32 start,
963 u32 count)
964{
965 u32 *keystr, *mskstr, *actstr;
966 int idx;
967
968 keystr = &admin->cache.keystream[start];
969 mskstr = &admin->cache.maskstream[start];
970 actstr = &admin->cache.actionstream[start];
971
972 switch (sel) {
973 case VCAP_SEL_ENTRY:
974 for (idx = 0; idx < count; ++idx) {
975 /* Avoid 'match-off' by setting value & mask */
976 spx5_wr(keystr[idx] & mskstr[idx], sparx5,
977 VCAP_SUPER_VCAP_ENTRY_DAT(idx));
978 spx5_wr(~mskstr[idx], sparx5,
979 VCAP_SUPER_VCAP_MASK_DAT(idx));
980 }
981 break;
982 case VCAP_SEL_ACTION:
983 for (idx = 0; idx < count; ++idx)
984 spx5_wr(actstr[idx], sparx5,
985 VCAP_SUPER_VCAP_ACTION_DAT(idx));
986 break;
987 case VCAP_SEL_ALL:
988 pr_err("%s:%d: cannot write all streams at once\n",
989 __func__, __LINE__);
990 break;
991 default:
992 break;
993 }
994 if (sel & VCAP_SEL_COUNTER) {
995 start = start & 0xfff; /* counter limit */
996 if (admin->vinst == 0)
997 spx5_wr(admin->cache.counter, sparx5,
998 ANA_ACL_CNT_A(start));
999 else
1000 spx5_wr(admin->cache.counter, sparx5,
1001 ANA_ACL_CNT_B(start));
1002 spx5_wr(admin->cache.sticky, sparx5,
1003 VCAP_SUPER_VCAP_CNT_DAT(0));
1004 }
1005}
1006
1007/* Use ESDX counters located in the XQS */
1008static void sparx5_es0_write_esdx_counter(struct sparx5 *sparx5,
1009 struct vcap_admin *admin, u32 id)
1010{
1011 mutex_lock(&sparx5->queue_stats_lock);
1012 spx5_wr(XQS_STAT_CFG_STAT_VIEW_SET(id), sparx5, XQS_STAT_CFG);
1013 spx5_wr(admin->cache.counter, sparx5,
1014 XQS_CNT(SPARX5_STAT_ESDX_GRN_PKTS));
1015 spx5_wr(0, sparx5, XQS_CNT(SPARX5_STAT_ESDX_YEL_PKTS));
1016 mutex_unlock(&sparx5->queue_stats_lock);
1017}
1018
1019static void sparx5_vcap_es0_cache_write(struct sparx5 *sparx5,
1020 struct vcap_admin *admin,
1021 enum vcap_selection sel,
1022 u32 start,
1023 u32 count)
1024{
1025 u32 *keystr, *mskstr, *actstr;
1026 int idx;
1027
1028 keystr = &admin->cache.keystream[start];
1029 mskstr = &admin->cache.maskstream[start];
1030 actstr = &admin->cache.actionstream[start];
1031
1032 switch (sel) {
1033 case VCAP_SEL_ENTRY:
1034 for (idx = 0; idx < count; ++idx) {
1035 /* Avoid 'match-off' by setting value & mask */
1036 spx5_wr(keystr[idx] & mskstr[idx], sparx5,
1037 VCAP_ES0_VCAP_ENTRY_DAT(idx));
1038 spx5_wr(~mskstr[idx], sparx5,
1039 VCAP_ES0_VCAP_MASK_DAT(idx));
1040 }
1041 break;
1042 case VCAP_SEL_ACTION:
1043 for (idx = 0; idx < count; ++idx)
1044 spx5_wr(actstr[idx], sparx5,
1045 VCAP_ES0_VCAP_ACTION_DAT(idx));
1046 break;
1047 case VCAP_SEL_ALL:
1048 pr_err("%s:%d: cannot write all streams at once\n",
1049 __func__, __LINE__);
1050 break;
1051 default:
1052 break;
1053 }
1054 if (sel & VCAP_SEL_COUNTER) {
1055 spx5_wr(admin->cache.counter, sparx5, VCAP_ES0_VCAP_CNT_DAT(0));
1056 sparx5_es0_write_esdx_counter(sparx5, admin, start);
1057 }
1058}
1059
1060static void sparx5_vcap_es2_cache_write(struct sparx5 *sparx5,
1061 struct vcap_admin *admin,
1062 enum vcap_selection sel,
1063 u32 start,
1064 u32 count)
1065{
1066 u32 *keystr, *mskstr, *actstr;
1067 int idx;
1068
1069 keystr = &admin->cache.keystream[start];
1070 mskstr = &admin->cache.maskstream[start];
1071 actstr = &admin->cache.actionstream[start];
1072
1073 switch (sel) {
1074 case VCAP_SEL_ENTRY:
1075 for (idx = 0; idx < count; ++idx) {
1076 /* Avoid 'match-off' by setting value & mask */
1077 spx5_wr(keystr[idx] & mskstr[idx], sparx5,
1078 VCAP_ES2_VCAP_ENTRY_DAT(idx));
1079 spx5_wr(~mskstr[idx], sparx5,
1080 VCAP_ES2_VCAP_MASK_DAT(idx));
1081 }
1082 break;
1083 case VCAP_SEL_ACTION:
1084 for (idx = 0; idx < count; ++idx)
1085 spx5_wr(actstr[idx], sparx5,
1086 VCAP_ES2_VCAP_ACTION_DAT(idx));
1087 break;
1088 case VCAP_SEL_ALL:
1089 pr_err("%s:%d: cannot write all streams at once\n",
1090 __func__, __LINE__);
1091 break;
1092 default:
1093 break;
1094 }
1095 if (sel & VCAP_SEL_COUNTER) {
1096 start = start & 0x7ff; /* counter limit */
1097 spx5_wr(admin->cache.counter, sparx5, EACL_ES2_CNT(start));
1098 spx5_wr(admin->cache.sticky, sparx5, VCAP_ES2_VCAP_CNT_DAT(0));
1099 }
1100}
1101
1102/* API callback used for writing to the VCAP cache */
1103static void sparx5_vcap_cache_write(struct net_device *ndev,
1104 struct vcap_admin *admin,
1105 enum vcap_selection sel,
1106 u32 start,
1107 u32 count)
1108{
1109 struct sparx5_port *port = netdev_priv(ndev);
1110 struct sparx5 *sparx5 = port->sparx5;
1111
1112 switch (admin->vtype) {
1113 case VCAP_TYPE_IS0:
1114 sparx5_vcap_is0_cache_write(sparx5, admin, sel, start, count);
1115 break;
1116 case VCAP_TYPE_IS2:
1117 sparx5_vcap_is2_cache_write(sparx5, admin, sel, start, count);
1118 break;
1119 case VCAP_TYPE_ES0:
1120 sparx5_vcap_es0_cache_write(sparx5, admin, sel, start, count);
1121 break;
1122 case VCAP_TYPE_ES2:
1123 sparx5_vcap_es2_cache_write(sparx5, admin, sel, start, count);
1124 break;
1125 default:
1126 sparx5_vcap_type_err(sparx5, admin, __func__);
1127 break;
1128 }
1129}
1130
1131static void sparx5_vcap_is0_cache_read(struct sparx5 *sparx5,
1132 struct vcap_admin *admin,
1133 enum vcap_selection sel,
1134 u32 start,
1135 u32 count)
1136{
1137 u32 *keystr, *mskstr, *actstr;
1138 int idx;
1139
1140 keystr = &admin->cache.keystream[start];
1141 mskstr = &admin->cache.maskstream[start];
1142 actstr = &admin->cache.actionstream[start];
1143
1144 if (sel & VCAP_SEL_ENTRY) {
1145 for (idx = 0; idx < count; ++idx) {
1146 keystr[idx] = spx5_rd(sparx5,
1147 VCAP_SUPER_VCAP_ENTRY_DAT(idx));
1148 mskstr[idx] = ~spx5_rd(sparx5,
1149 VCAP_SUPER_VCAP_MASK_DAT(idx));
1150 }
1151 }
1152
1153 if (sel & VCAP_SEL_ACTION)
1154 for (idx = 0; idx < count; ++idx)
1155 actstr[idx] = spx5_rd(sparx5,
1156 VCAP_SUPER_VCAP_ACTION_DAT(idx));
1157
1158 if (sel & VCAP_SEL_COUNTER) {
1159 admin->cache.counter =
1160 spx5_rd(sparx5, VCAP_SUPER_VCAP_CNT_DAT(0));
1161 admin->cache.sticky =
1162 spx5_rd(sparx5, VCAP_SUPER_VCAP_CNT_DAT(0));
1163 }
1164}
1165
1166static void sparx5_vcap_is2_cache_read(struct sparx5 *sparx5,
1167 struct vcap_admin *admin,
1168 enum vcap_selection sel,
1169 u32 start,
1170 u32 count)
1171{
1172 u32 *keystr, *mskstr, *actstr;
1173 int idx;
1174
1175 keystr = &admin->cache.keystream[start];
1176 mskstr = &admin->cache.maskstream[start];
1177 actstr = &admin->cache.actionstream[start];
1178
1179 if (sel & VCAP_SEL_ENTRY) {
1180 for (idx = 0; idx < count; ++idx) {
1181 keystr[idx] = spx5_rd(sparx5,
1182 VCAP_SUPER_VCAP_ENTRY_DAT(idx));
1183 mskstr[idx] = ~spx5_rd(sparx5,
1184 VCAP_SUPER_VCAP_MASK_DAT(idx));
1185 }
1186 }
1187
1188 if (sel & VCAP_SEL_ACTION)
1189 for (idx = 0; idx < count; ++idx)
1190 actstr[idx] = spx5_rd(sparx5,
1191 VCAP_SUPER_VCAP_ACTION_DAT(idx));
1192
1193 if (sel & VCAP_SEL_COUNTER) {
1194 start = start & 0xfff; /* counter limit */
1195 if (admin->vinst == 0)
1196 admin->cache.counter =
1197 spx5_rd(sparx5, ANA_ACL_CNT_A(start));
1198 else
1199 admin->cache.counter =
1200 spx5_rd(sparx5, ANA_ACL_CNT_B(start));
1201 admin->cache.sticky =
1202 spx5_rd(sparx5, VCAP_SUPER_VCAP_CNT_DAT(0));
1203 }
1204}
1205
1206/* Use ESDX counters located in the XQS */
1207static void sparx5_es0_read_esdx_counter(struct sparx5 *sparx5,
1208 struct vcap_admin *admin, u32 id)
1209{
1210 u32 counter;
1211
1212 mutex_lock(&sparx5->queue_stats_lock);
1213 spx5_wr(XQS_STAT_CFG_STAT_VIEW_SET(id), sparx5, XQS_STAT_CFG);
1214 counter = spx5_rd(sparx5, XQS_CNT(SPARX5_STAT_ESDX_GRN_PKTS)) +
1215 spx5_rd(sparx5, XQS_CNT(SPARX5_STAT_ESDX_YEL_PKTS));
1216 mutex_unlock(&sparx5->queue_stats_lock);
1217 if (counter)
1218 admin->cache.counter = counter;
1219}
1220
1221static void sparx5_vcap_es0_cache_read(struct sparx5 *sparx5,
1222 struct vcap_admin *admin,
1223 enum vcap_selection sel,
1224 u32 start,
1225 u32 count)
1226{
1227 u32 *keystr, *mskstr, *actstr;
1228 int idx;
1229
1230 keystr = &admin->cache.keystream[start];
1231 mskstr = &admin->cache.maskstream[start];
1232 actstr = &admin->cache.actionstream[start];
1233
1234 if (sel & VCAP_SEL_ENTRY) {
1235 for (idx = 0; idx < count; ++idx) {
1236 keystr[idx] =
1237 spx5_rd(sparx5, VCAP_ES0_VCAP_ENTRY_DAT(idx));
1238 mskstr[idx] =
1239 ~spx5_rd(sparx5, VCAP_ES0_VCAP_MASK_DAT(idx));
1240 }
1241 }
1242
1243 if (sel & VCAP_SEL_ACTION)
1244 for (idx = 0; idx < count; ++idx)
1245 actstr[idx] =
1246 spx5_rd(sparx5, VCAP_ES0_VCAP_ACTION_DAT(idx));
1247
1248 if (sel & VCAP_SEL_COUNTER) {
1249 admin->cache.counter =
1250 spx5_rd(sparx5, VCAP_ES0_VCAP_CNT_DAT(0));
1251 admin->cache.sticky = admin->cache.counter;
1252 sparx5_es0_read_esdx_counter(sparx5, admin, start);
1253 }
1254}
1255
1256static void sparx5_vcap_es2_cache_read(struct sparx5 *sparx5,
1257 struct vcap_admin *admin,
1258 enum vcap_selection sel,
1259 u32 start,
1260 u32 count)
1261{
1262 u32 *keystr, *mskstr, *actstr;
1263 int idx;
1264
1265 keystr = &admin->cache.keystream[start];
1266 mskstr = &admin->cache.maskstream[start];
1267 actstr = &admin->cache.actionstream[start];
1268
1269 if (sel & VCAP_SEL_ENTRY) {
1270 for (idx = 0; idx < count; ++idx) {
1271 keystr[idx] =
1272 spx5_rd(sparx5, VCAP_ES2_VCAP_ENTRY_DAT(idx));
1273 mskstr[idx] =
1274 ~spx5_rd(sparx5, VCAP_ES2_VCAP_MASK_DAT(idx));
1275 }
1276 }
1277
1278 if (sel & VCAP_SEL_ACTION)
1279 for (idx = 0; idx < count; ++idx)
1280 actstr[idx] =
1281 spx5_rd(sparx5, VCAP_ES2_VCAP_ACTION_DAT(idx));
1282
1283 if (sel & VCAP_SEL_COUNTER) {
1284 start = start & 0x7ff; /* counter limit */
1285 admin->cache.counter =
1286 spx5_rd(sparx5, EACL_ES2_CNT(start));
1287 admin->cache.sticky =
1288 spx5_rd(sparx5, VCAP_ES2_VCAP_CNT_DAT(0));
1289 }
1290}
1291
1292/* API callback used for reading from the VCAP into the VCAP cache */
1293static void sparx5_vcap_cache_read(struct net_device *ndev,
1294 struct vcap_admin *admin,
1295 enum vcap_selection sel,
1296 u32 start,
1297 u32 count)
1298{
1299 struct sparx5_port *port = netdev_priv(ndev);
1300 struct sparx5 *sparx5 = port->sparx5;
1301
1302 switch (admin->vtype) {
1303 case VCAP_TYPE_IS0:
1304 sparx5_vcap_is0_cache_read(sparx5, admin, sel, start, count);
1305 break;
1306 case VCAP_TYPE_IS2:
1307 sparx5_vcap_is2_cache_read(sparx5, admin, sel, start, count);
1308 break;
1309 case VCAP_TYPE_ES0:
1310 sparx5_vcap_es0_cache_read(sparx5, admin, sel, start, count);
1311 break;
1312 case VCAP_TYPE_ES2:
1313 sparx5_vcap_es2_cache_read(sparx5, admin, sel, start, count);
1314 break;
1315 default:
1316 sparx5_vcap_type_err(sparx5, admin, __func__);
1317 break;
1318 }
1319}
1320
1321/* API callback used for initializing a VCAP address range */
1322static void sparx5_vcap_range_init(struct net_device *ndev,
1323 struct vcap_admin *admin, u32 addr,
1324 u32 count)
1325{
1326 struct sparx5_port *port = netdev_priv(ndev);
1327 struct sparx5 *sparx5 = port->sparx5;
1328
1329 _sparx5_vcap_range_init(sparx5, admin, addr, count);
1330}
1331
1332static void sparx5_vcap_super_update(struct sparx5 *sparx5,
1333 enum vcap_command cmd,
1334 enum vcap_selection sel, u32 addr)
1335{
1336 bool clear = (cmd == VCAP_CMD_INITIALIZE);
1337
1338 spx5_wr(VCAP_SUPER_CFG_MV_NUM_POS_SET(0) |
1339 VCAP_SUPER_CFG_MV_SIZE_SET(0), sparx5, VCAP_SUPER_CFG);
1340 spx5_wr(VCAP_SUPER_CTRL_UPDATE_CMD_SET(cmd) |
1341 VCAP_SUPER_CTRL_UPDATE_ENTRY_DIS_SET((VCAP_SEL_ENTRY & sel) == 0) |
1342 VCAP_SUPER_CTRL_UPDATE_ACTION_DIS_SET((VCAP_SEL_ACTION & sel) == 0) |
1343 VCAP_SUPER_CTRL_UPDATE_CNT_DIS_SET((VCAP_SEL_COUNTER & sel) == 0) |
1344 VCAP_SUPER_CTRL_UPDATE_ADDR_SET(addr) |
1345 VCAP_SUPER_CTRL_CLEAR_CACHE_SET(clear) |
1346 VCAP_SUPER_CTRL_UPDATE_SHOT_SET(true),
1347 sparx5, VCAP_SUPER_CTRL);
1348 sparx5_vcap_wait_super_update(sparx5);
1349}
1350
1351static void sparx5_vcap_es0_update(struct sparx5 *sparx5,
1352 enum vcap_command cmd,
1353 enum vcap_selection sel, u32 addr)
1354{
1355 bool clear = (cmd == VCAP_CMD_INITIALIZE);
1356
1357 spx5_wr(VCAP_ES0_CFG_MV_NUM_POS_SET(0) |
1358 VCAP_ES0_CFG_MV_SIZE_SET(0), sparx5, VCAP_ES0_CFG);
1359 spx5_wr(VCAP_ES0_CTRL_UPDATE_CMD_SET(cmd) |
1360 VCAP_ES0_CTRL_UPDATE_ENTRY_DIS_SET((VCAP_SEL_ENTRY & sel) == 0) |
1361 VCAP_ES0_CTRL_UPDATE_ACTION_DIS_SET((VCAP_SEL_ACTION & sel) == 0) |
1362 VCAP_ES0_CTRL_UPDATE_CNT_DIS_SET((VCAP_SEL_COUNTER & sel) == 0) |
1363 VCAP_ES0_CTRL_UPDATE_ADDR_SET(addr) |
1364 VCAP_ES0_CTRL_CLEAR_CACHE_SET(clear) |
1365 VCAP_ES0_CTRL_UPDATE_SHOT_SET(true),
1366 sparx5, VCAP_ES0_CTRL);
1367 sparx5_vcap_wait_es0_update(sparx5);
1368}
1369
1370static void sparx5_vcap_es2_update(struct sparx5 *sparx5,
1371 enum vcap_command cmd,
1372 enum vcap_selection sel, u32 addr)
1373{
1374 bool clear = (cmd == VCAP_CMD_INITIALIZE);
1375
1376 spx5_wr(VCAP_ES2_CFG_MV_NUM_POS_SET(0) |
1377 VCAP_ES2_CFG_MV_SIZE_SET(0), sparx5, VCAP_ES2_CFG);
1378 spx5_wr(VCAP_ES2_CTRL_UPDATE_CMD_SET(cmd) |
1379 VCAP_ES2_CTRL_UPDATE_ENTRY_DIS_SET((VCAP_SEL_ENTRY & sel) == 0) |
1380 VCAP_ES2_CTRL_UPDATE_ACTION_DIS_SET((VCAP_SEL_ACTION & sel) == 0) |
1381 VCAP_ES2_CTRL_UPDATE_CNT_DIS_SET((VCAP_SEL_COUNTER & sel) == 0) |
1382 VCAP_ES2_CTRL_UPDATE_ADDR_SET(addr) |
1383 VCAP_ES2_CTRL_CLEAR_CACHE_SET(clear) |
1384 VCAP_ES2_CTRL_UPDATE_SHOT_SET(true),
1385 sparx5, VCAP_ES2_CTRL);
1386 sparx5_vcap_wait_es2_update(sparx5);
1387}
1388
1389/* API callback used for updating the VCAP cache */
1390static void sparx5_vcap_update(struct net_device *ndev,
1391 struct vcap_admin *admin, enum vcap_command cmd,
1392 enum vcap_selection sel, u32 addr)
1393{
1394 struct sparx5_port *port = netdev_priv(ndev);
1395 struct sparx5 *sparx5 = port->sparx5;
1396
1397 switch (admin->vtype) {
1398 case VCAP_TYPE_IS0:
1399 case VCAP_TYPE_IS2:
1400 sparx5_vcap_super_update(sparx5, cmd, sel, addr);
1401 break;
1402 case VCAP_TYPE_ES0:
1403 sparx5_vcap_es0_update(sparx5, cmd, sel, addr);
1404 break;
1405 case VCAP_TYPE_ES2:
1406 sparx5_vcap_es2_update(sparx5, cmd, sel, addr);
1407 break;
1408 default:
1409 sparx5_vcap_type_err(sparx5, admin, __func__);
1410 break;
1411 }
1412}
1413
1414static void sparx5_vcap_super_move(struct sparx5 *sparx5,
1415 u32 addr,
1416 enum vcap_command cmd,
1417 u16 mv_num_pos,
1418 u16 mv_size)
1419{
1420 spx5_wr(VCAP_SUPER_CFG_MV_NUM_POS_SET(mv_num_pos) |
1421 VCAP_SUPER_CFG_MV_SIZE_SET(mv_size),
1422 sparx5, VCAP_SUPER_CFG);
1423 spx5_wr(VCAP_SUPER_CTRL_UPDATE_CMD_SET(cmd) |
1424 VCAP_SUPER_CTRL_UPDATE_ENTRY_DIS_SET(0) |
1425 VCAP_SUPER_CTRL_UPDATE_ACTION_DIS_SET(0) |
1426 VCAP_SUPER_CTRL_UPDATE_CNT_DIS_SET(0) |
1427 VCAP_SUPER_CTRL_UPDATE_ADDR_SET(addr) |
1428 VCAP_SUPER_CTRL_CLEAR_CACHE_SET(false) |
1429 VCAP_SUPER_CTRL_UPDATE_SHOT_SET(true),
1430 sparx5, VCAP_SUPER_CTRL);
1431 sparx5_vcap_wait_super_update(sparx5);
1432}
1433
1434static void sparx5_vcap_es0_move(struct sparx5 *sparx5,
1435 u32 addr,
1436 enum vcap_command cmd,
1437 u16 mv_num_pos,
1438 u16 mv_size)
1439{
1440 spx5_wr(VCAP_ES0_CFG_MV_NUM_POS_SET(mv_num_pos) |
1441 VCAP_ES0_CFG_MV_SIZE_SET(mv_size),
1442 sparx5, VCAP_ES0_CFG);
1443 spx5_wr(VCAP_ES0_CTRL_UPDATE_CMD_SET(cmd) |
1444 VCAP_ES0_CTRL_UPDATE_ENTRY_DIS_SET(0) |
1445 VCAP_ES0_CTRL_UPDATE_ACTION_DIS_SET(0) |
1446 VCAP_ES0_CTRL_UPDATE_CNT_DIS_SET(0) |
1447 VCAP_ES0_CTRL_UPDATE_ADDR_SET(addr) |
1448 VCAP_ES0_CTRL_CLEAR_CACHE_SET(false) |
1449 VCAP_ES0_CTRL_UPDATE_SHOT_SET(true),
1450 sparx5, VCAP_ES0_CTRL);
1451 sparx5_vcap_wait_es0_update(sparx5);
1452}
1453
1454static void sparx5_vcap_es2_move(struct sparx5 *sparx5,
1455 u32 addr,
1456 enum vcap_command cmd,
1457 u16 mv_num_pos,
1458 u16 mv_size)
1459{
1460 spx5_wr(VCAP_ES2_CFG_MV_NUM_POS_SET(mv_num_pos) |
1461 VCAP_ES2_CFG_MV_SIZE_SET(mv_size),
1462 sparx5, VCAP_ES2_CFG);
1463 spx5_wr(VCAP_ES2_CTRL_UPDATE_CMD_SET(cmd) |
1464 VCAP_ES2_CTRL_UPDATE_ENTRY_DIS_SET(0) |
1465 VCAP_ES2_CTRL_UPDATE_ACTION_DIS_SET(0) |
1466 VCAP_ES2_CTRL_UPDATE_CNT_DIS_SET(0) |
1467 VCAP_ES2_CTRL_UPDATE_ADDR_SET(addr) |
1468 VCAP_ES2_CTRL_CLEAR_CACHE_SET(false) |
1469 VCAP_ES2_CTRL_UPDATE_SHOT_SET(true),
1470 sparx5, VCAP_ES2_CTRL);
1471 sparx5_vcap_wait_es2_update(sparx5);
1472}
1473
1474/* API callback used for moving a block of rules in the VCAP */
1475static void sparx5_vcap_move(struct net_device *ndev, struct vcap_admin *admin,
1476 u32 addr, int offset, int count)
1477{
1478 struct sparx5_port *port = netdev_priv(ndev);
1479 struct sparx5 *sparx5 = port->sparx5;
1480 enum vcap_command cmd;
1481 u16 mv_num_pos;
1482 u16 mv_size;
1483
1484 mv_size = count - 1;
1485 if (offset > 0) {
1486 mv_num_pos = offset - 1;
1487 cmd = VCAP_CMD_MOVE_DOWN;
1488 } else {
1489 mv_num_pos = -offset - 1;
1490 cmd = VCAP_CMD_MOVE_UP;
1491 }
1492
1493 switch (admin->vtype) {
1494 case VCAP_TYPE_IS0:
1495 case VCAP_TYPE_IS2:
1496 sparx5_vcap_super_move(sparx5, addr, cmd, mv_num_pos, mv_size);
1497 break;
1498 case VCAP_TYPE_ES0:
1499 sparx5_vcap_es0_move(sparx5, addr, cmd, mv_num_pos, mv_size);
1500 break;
1501 case VCAP_TYPE_ES2:
1502 sparx5_vcap_es2_move(sparx5, addr, cmd, mv_num_pos, mv_size);
1503 break;
1504 default:
1505 sparx5_vcap_type_err(sparx5, admin, __func__);
1506 break;
1507 }
1508}
1509
1510static struct vcap_operations sparx5_vcap_ops = {
1511 .validate_keyset = sparx5_vcap_validate_keyset,
1512 .add_default_fields = sparx5_vcap_add_default_fields,
1513 .cache_erase = sparx5_vcap_cache_erase,
1514 .cache_write = sparx5_vcap_cache_write,
1515 .cache_read = sparx5_vcap_cache_read,
1516 .init = sparx5_vcap_range_init,
1517 .update = sparx5_vcap_update,
1518 .move = sparx5_vcap_move,
1519 .port_info = sparx5_port_info,
1520};
1521
1522static u32 sparx5_vcap_is0_keyset_to_etype_ps(enum vcap_keyfield_set keyset)
1523{
1524 switch (keyset) {
1525 case VCAP_KFS_NORMAL_7TUPLE:
1526 return VCAP_IS0_PS_ETYPE_NORMAL_7TUPLE;
1527 case VCAP_KFS_NORMAL_5TUPLE_IP4:
1528 return VCAP_IS0_PS_ETYPE_NORMAL_5TUPLE_IP4;
1529 default:
1530 return VCAP_IS0_PS_ETYPE_NORMAL_7TUPLE;
1531 }
1532}
1533
1534static void sparx5_vcap_is0_set_port_keyset(struct net_device *ndev, int lookup,
1535 enum vcap_keyfield_set keyset,
1536 int l3_proto)
1537{
1538 struct sparx5_port *port = netdev_priv(ndev);
1539 struct sparx5 *sparx5 = port->sparx5;
1540 int portno = port->portno;
1541 u32 value;
1542
1543 switch (l3_proto) {
1544 case ETH_P_IP:
1545 value = sparx5_vcap_is0_keyset_to_etype_ps(keyset);
1546 spx5_rmw(ANA_CL_ADV_CL_CFG_IP4_CLM_KEY_SEL_SET(value),
1547 ANA_CL_ADV_CL_CFG_IP4_CLM_KEY_SEL,
1548 sparx5,
1549 ANA_CL_ADV_CL_CFG(portno, lookup));
1550 break;
1551 case ETH_P_IPV6:
1552 value = sparx5_vcap_is0_keyset_to_etype_ps(keyset);
1553 spx5_rmw(ANA_CL_ADV_CL_CFG_IP6_CLM_KEY_SEL_SET(value),
1554 ANA_CL_ADV_CL_CFG_IP6_CLM_KEY_SEL,
1555 sparx5,
1556 ANA_CL_ADV_CL_CFG(portno, lookup));
1557 break;
1558 default:
1559 value = sparx5_vcap_is0_keyset_to_etype_ps(keyset);
1560 spx5_rmw(ANA_CL_ADV_CL_CFG_ETYPE_CLM_KEY_SEL_SET(value),
1561 ANA_CL_ADV_CL_CFG_ETYPE_CLM_KEY_SEL,
1562 sparx5,
1563 ANA_CL_ADV_CL_CFG(portno, lookup));
1564 break;
1565 }
1566}
1567
1568static u32 sparx5_vcap_is2_keyset_to_arp_ps(enum vcap_keyfield_set keyset)
1569{
1570 switch (keyset) {
1571 case VCAP_KFS_ARP:
1572 return VCAP_IS2_PS_ARP_ARP;
1573 default:
1574 return VCAP_IS2_PS_ARP_MAC_ETYPE;
1575 }
1576}
1577
1578static u32 sparx5_vcap_is2_keyset_to_ipv4_ps(enum vcap_keyfield_set keyset)
1579{
1580 switch (keyset) {
1581 case VCAP_KFS_MAC_ETYPE:
1582 return VCAP_IS2_PS_IPV4_UC_MAC_ETYPE;
1583 case VCAP_KFS_IP4_OTHER:
1584 case VCAP_KFS_IP4_TCP_UDP:
1585 return VCAP_IS2_PS_IPV4_UC_IP4_TCP_UDP_OTHER;
1586 case VCAP_KFS_IP_7TUPLE:
1587 return VCAP_IS2_PS_IPV4_UC_IP_7TUPLE;
1588 default:
1589 return VCAP_KFS_NO_VALUE;
1590 }
1591}
1592
1593static u32 sparx5_vcap_is2_keyset_to_ipv6_uc_ps(enum vcap_keyfield_set keyset)
1594{
1595 switch (keyset) {
1596 case VCAP_KFS_MAC_ETYPE:
1597 return VCAP_IS2_PS_IPV6_UC_MAC_ETYPE;
1598 case VCAP_KFS_IP4_OTHER:
1599 case VCAP_KFS_IP4_TCP_UDP:
1600 return VCAP_IS2_PS_IPV6_UC_IP4_TCP_UDP_OTHER;
1601 case VCAP_KFS_IP_7TUPLE:
1602 return VCAP_IS2_PS_IPV6_UC_IP_7TUPLE;
1603 default:
1604 return VCAP_KFS_NO_VALUE;
1605 }
1606}
1607
1608static u32 sparx5_vcap_is2_keyset_to_ipv6_mc_ps(enum vcap_keyfield_set keyset)
1609{
1610 switch (keyset) {
1611 case VCAP_KFS_MAC_ETYPE:
1612 return VCAP_IS2_PS_IPV6_MC_MAC_ETYPE;
1613 case VCAP_KFS_IP4_OTHER:
1614 case VCAP_KFS_IP4_TCP_UDP:
1615 return VCAP_IS2_PS_IPV6_MC_IP4_TCP_UDP_OTHER;
1616 case VCAP_KFS_IP_7TUPLE:
1617 return VCAP_IS2_PS_IPV6_MC_IP_7TUPLE;
1618 default:
1619 return VCAP_KFS_NO_VALUE;
1620 }
1621}
1622
1623static void sparx5_vcap_is2_set_port_keyset(struct net_device *ndev, int lookup,
1624 enum vcap_keyfield_set keyset,
1625 int l3_proto)
1626{
1627 struct sparx5_port *port = netdev_priv(ndev);
1628 struct sparx5 *sparx5 = port->sparx5;
1629 int portno = port->portno;
1630 u32 value;
1631
1632 switch (l3_proto) {
1633 case ETH_P_ARP:
1634 value = sparx5_vcap_is2_keyset_to_arp_ps(keyset);
1635 spx5_rmw(ANA_ACL_VCAP_S2_KEY_SEL_ARP_KEY_SEL_SET(value),
1636 ANA_ACL_VCAP_S2_KEY_SEL_ARP_KEY_SEL,
1637 sparx5,
1638 ANA_ACL_VCAP_S2_KEY_SEL(portno, lookup));
1639 break;
1640 case ETH_P_IP:
1641 value = sparx5_vcap_is2_keyset_to_ipv4_ps(keyset);
1642 spx5_rmw(ANA_ACL_VCAP_S2_KEY_SEL_IP4_UC_KEY_SEL_SET(value),
1643 ANA_ACL_VCAP_S2_KEY_SEL_IP4_UC_KEY_SEL,
1644 sparx5,
1645 ANA_ACL_VCAP_S2_KEY_SEL(portno, lookup));
1646 spx5_rmw(ANA_ACL_VCAP_S2_KEY_SEL_IP4_MC_KEY_SEL_SET(value),
1647 ANA_ACL_VCAP_S2_KEY_SEL_IP4_MC_KEY_SEL,
1648 sparx5,
1649 ANA_ACL_VCAP_S2_KEY_SEL(portno, lookup));
1650 break;
1651 case ETH_P_IPV6:
1652 value = sparx5_vcap_is2_keyset_to_ipv6_uc_ps(keyset);
1653 spx5_rmw(ANA_ACL_VCAP_S2_KEY_SEL_IP6_UC_KEY_SEL_SET(value),
1654 ANA_ACL_VCAP_S2_KEY_SEL_IP6_UC_KEY_SEL,
1655 sparx5,
1656 ANA_ACL_VCAP_S2_KEY_SEL(portno, lookup));
1657 value = sparx5_vcap_is2_keyset_to_ipv6_mc_ps(keyset);
1658 spx5_rmw(ANA_ACL_VCAP_S2_KEY_SEL_IP6_MC_KEY_SEL_SET(value),
1659 ANA_ACL_VCAP_S2_KEY_SEL_IP6_MC_KEY_SEL,
1660 sparx5,
1661 ANA_ACL_VCAP_S2_KEY_SEL(portno, lookup));
1662 break;
1663 default:
1664 value = VCAP_IS2_PS_NONETH_MAC_ETYPE;
1665 spx5_rmw(ANA_ACL_VCAP_S2_KEY_SEL_NON_ETH_KEY_SEL_SET(value),
1666 ANA_ACL_VCAP_S2_KEY_SEL_NON_ETH_KEY_SEL,
1667 sparx5,
1668 ANA_ACL_VCAP_S2_KEY_SEL(portno, lookup));
1669 break;
1670 }
1671}
1672
1673static u32 sparx5_vcap_es2_keyset_to_arp_ps(enum vcap_keyfield_set keyset)
1674{
1675 switch (keyset) {
1676 case VCAP_KFS_ARP:
1677 return VCAP_ES2_PS_ARP_ARP;
1678 default:
1679 return VCAP_ES2_PS_ARP_MAC_ETYPE;
1680 }
1681}
1682
1683static u32 sparx5_vcap_es2_keyset_to_ipv4_ps(enum vcap_keyfield_set keyset)
1684{
1685 switch (keyset) {
1686 case VCAP_KFS_MAC_ETYPE:
1687 return VCAP_ES2_PS_IPV4_MAC_ETYPE;
1688 case VCAP_KFS_IP_7TUPLE:
1689 return VCAP_ES2_PS_IPV4_IP_7TUPLE;
1690 case VCAP_KFS_IP4_TCP_UDP:
1691 return VCAP_ES2_PS_IPV4_IP4_TCP_UDP_OTHER;
1692 case VCAP_KFS_IP4_OTHER:
1693 return VCAP_ES2_PS_IPV4_IP4_OTHER;
1694 default:
1695 return VCAP_ES2_PS_IPV4_MAC_ETYPE;
1696 }
1697}
1698
1699static u32 sparx5_vcap_es2_keyset_to_ipv6_ps(enum vcap_keyfield_set keyset)
1700{
1701 switch (keyset) {
1702 case VCAP_KFS_MAC_ETYPE:
1703 return VCAP_ES2_PS_IPV6_MAC_ETYPE;
1704 case VCAP_KFS_IP4_TCP_UDP:
1705 case VCAP_KFS_IP4_OTHER:
1706 return VCAP_ES2_PS_IPV6_IP4_DOWNGRADE;
1707 case VCAP_KFS_IP_7TUPLE:
1708 return VCAP_ES2_PS_IPV6_IP_7TUPLE;
1709 case VCAP_KFS_IP6_STD:
1710 return VCAP_ES2_PS_IPV6_IP6_STD;
1711 default:
1712 return VCAP_ES2_PS_IPV6_MAC_ETYPE;
1713 }
1714}
1715
1716static void sparx5_vcap_es2_set_port_keyset(struct net_device *ndev, int lookup,
1717 enum vcap_keyfield_set keyset,
1718 int l3_proto)
1719{
1720 struct sparx5_port *port = netdev_priv(ndev);
1721 struct sparx5 *sparx5 = port->sparx5;
1722 int portno = port->portno;
1723 u32 value;
1724
1725 switch (l3_proto) {
1726 case ETH_P_IP:
1727 value = sparx5_vcap_es2_keyset_to_ipv4_ps(keyset);
1728 spx5_rmw(EACL_VCAP_ES2_KEY_SEL_IP4_KEY_SEL_SET(value),
1729 EACL_VCAP_ES2_KEY_SEL_IP4_KEY_SEL,
1730 sparx5,
1731 EACL_VCAP_ES2_KEY_SEL(portno, lookup));
1732 break;
1733 case ETH_P_IPV6:
1734 value = sparx5_vcap_es2_keyset_to_ipv6_ps(keyset);
1735 spx5_rmw(EACL_VCAP_ES2_KEY_SEL_IP6_KEY_SEL_SET(value),
1736 EACL_VCAP_ES2_KEY_SEL_IP6_KEY_SEL,
1737 sparx5,
1738 EACL_VCAP_ES2_KEY_SEL(portno, lookup));
1739 break;
1740 case ETH_P_ARP:
1741 value = sparx5_vcap_es2_keyset_to_arp_ps(keyset);
1742 spx5_rmw(EACL_VCAP_ES2_KEY_SEL_ARP_KEY_SEL_SET(value),
1743 EACL_VCAP_ES2_KEY_SEL_ARP_KEY_SEL,
1744 sparx5,
1745 EACL_VCAP_ES2_KEY_SEL(portno, lookup));
1746 break;
1747 }
1748}
1749
1750/* Change the port keyset for the lookup and protocol */
1751void sparx5_vcap_set_port_keyset(struct net_device *ndev,
1752 struct vcap_admin *admin,
1753 int cid,
1754 u16 l3_proto,
1755 enum vcap_keyfield_set keyset,
1756 struct vcap_keyset_list *orig)
1757{
1758 struct sparx5_port *port;
1759 int lookup;
1760
1761 switch (admin->vtype) {
1762 case VCAP_TYPE_IS0:
1763 lookup = sparx5_vcap_is0_cid_to_lookup(cid);
1764 if (orig)
1765 sparx5_vcap_is0_get_port_keysets(ndev, lookup, orig,
1766 l3_proto);
1767 sparx5_vcap_is0_set_port_keyset(ndev, lookup, keyset, l3_proto);
1768 break;
1769 case VCAP_TYPE_IS2:
1770 lookup = sparx5_vcap_is2_cid_to_lookup(cid);
1771 if (orig)
1772 sparx5_vcap_is2_get_port_keysets(ndev, lookup, orig,
1773 l3_proto);
1774 sparx5_vcap_is2_set_port_keyset(ndev, lookup, keyset, l3_proto);
1775 break;
1776 case VCAP_TYPE_ES0:
1777 break;
1778 case VCAP_TYPE_ES2:
1779 lookup = sparx5_vcap_es2_cid_to_lookup(cid);
1780 if (orig)
1781 sparx5_vcap_es2_get_port_keysets(ndev, lookup, orig,
1782 l3_proto);
1783 sparx5_vcap_es2_set_port_keyset(ndev, lookup, keyset, l3_proto);
1784 break;
1785 default:
1786 port = netdev_priv(ndev);
1787 sparx5_vcap_type_err(port->sparx5, admin, __func__);
1788 break;
1789 }
1790}
1791
1792/* Enable IS0 lookups per port and set the keyset generation */
1793static void sparx5_vcap_is0_port_key_selection(struct sparx5 *sparx5,
1794 struct vcap_admin *admin)
1795{
1796 int portno, lookup;
1797 u32 keysel;
1798
1799 keysel = VCAP_IS0_KEYSEL(false,
1800 VCAP_IS0_PS_ETYPE_NORMAL_7TUPLE,
1801 VCAP_IS0_PS_ETYPE_NORMAL_5TUPLE_IP4,
1802 VCAP_IS0_PS_ETYPE_NORMAL_7TUPLE,
1803 VCAP_IS0_PS_MPLS_FOLLOW_ETYPE,
1804 VCAP_IS0_PS_MPLS_FOLLOW_ETYPE,
1805 VCAP_IS0_PS_MLBS_FOLLOW_ETYPE);
1806 for (lookup = 0; lookup < admin->lookups; ++lookup) {
1807 for (portno = 0; portno < SPX5_PORTS; ++portno) {
1808 spx5_wr(keysel, sparx5,
1809 ANA_CL_ADV_CL_CFG(portno, lookup));
1810 spx5_rmw(ANA_CL_ADV_CL_CFG_LOOKUP_ENA,
1811 ANA_CL_ADV_CL_CFG_LOOKUP_ENA,
1812 sparx5,
1813 ANA_CL_ADV_CL_CFG(portno, lookup));
1814 }
1815 }
1816}
1817
1818/* Enable IS2 lookups per port and set the keyset generation */
1819static void sparx5_vcap_is2_port_key_selection(struct sparx5 *sparx5,
1820 struct vcap_admin *admin)
1821{
1822 int portno, lookup;
1823 u32 keysel;
1824
1825 keysel = VCAP_IS2_KEYSEL(true, VCAP_IS2_PS_NONETH_MAC_ETYPE,
1826 VCAP_IS2_PS_IPV4_MC_IP4_TCP_UDP_OTHER,
1827 VCAP_IS2_PS_IPV4_UC_IP4_TCP_UDP_OTHER,
1828 VCAP_IS2_PS_IPV6_MC_IP_7TUPLE,
1829 VCAP_IS2_PS_IPV6_UC_IP_7TUPLE,
1830 VCAP_IS2_PS_ARP_ARP);
1831 for (lookup = 0; lookup < admin->lookups; ++lookup) {
1832 for (portno = 0; portno < SPX5_PORTS; ++portno) {
1833 spx5_wr(keysel, sparx5,
1834 ANA_ACL_VCAP_S2_KEY_SEL(portno, lookup));
1835 }
1836 }
1837 /* IS2 lookups are in bit 0:3 */
1838 for (portno = 0; portno < SPX5_PORTS; ++portno)
1839 spx5_rmw(ANA_ACL_VCAP_S2_CFG_SEC_ENA_SET(0xf),
1840 ANA_ACL_VCAP_S2_CFG_SEC_ENA,
1841 sparx5,
1842 ANA_ACL_VCAP_S2_CFG(portno));
1843}
1844
1845/* Enable ES0 lookups per port and set the keyset generation */
1846static void sparx5_vcap_es0_port_key_selection(struct sparx5 *sparx5,
1847 struct vcap_admin *admin)
1848{
1849 int portno;
1850 u32 keysel;
1851
1852 keysel = VCAP_ES0_KEYSEL(VCAP_ES0_PS_FORCE_ISDX_LOOKUPS);
1853 for (portno = 0; portno < SPX5_PORTS; ++portno)
1854 spx5_rmw(keysel, REW_RTAG_ETAG_CTRL_ES0_ISDX_KEY_ENA,
1855 sparx5, REW_RTAG_ETAG_CTRL(portno));
1856
1857 spx5_rmw(REW_ES0_CTRL_ES0_LU_ENA_SET(1), REW_ES0_CTRL_ES0_LU_ENA,
1858 sparx5, REW_ES0_CTRL);
1859}
1860
1861/* Enable ES2 lookups per port and set the keyset generation */
1862static void sparx5_vcap_es2_port_key_selection(struct sparx5 *sparx5,
1863 struct vcap_admin *admin)
1864{
1865 int portno, lookup;
1866 u32 keysel;
1867
1868 keysel = VCAP_ES2_KEYSEL(true, VCAP_ES2_PS_ARP_MAC_ETYPE,
1869 VCAP_ES2_PS_IPV4_IP4_TCP_UDP_OTHER,
1870 VCAP_ES2_PS_IPV6_IP_7TUPLE);
1871 for (lookup = 0; lookup < admin->lookups; ++lookup)
1872 for (portno = 0; portno < SPX5_PORTS; ++portno)
1873 spx5_wr(keysel, sparx5,
1874 EACL_VCAP_ES2_KEY_SEL(portno, lookup));
1875}
1876
1877/* Enable lookups per port and set the keyset generation */
1878static void sparx5_vcap_port_key_selection(struct sparx5 *sparx5,
1879 struct vcap_admin *admin)
1880{
1881 switch (admin->vtype) {
1882 case VCAP_TYPE_IS0:
1883 sparx5_vcap_is0_port_key_selection(sparx5, admin);
1884 break;
1885 case VCAP_TYPE_IS2:
1886 sparx5_vcap_is2_port_key_selection(sparx5, admin);
1887 break;
1888 case VCAP_TYPE_ES0:
1889 sparx5_vcap_es0_port_key_selection(sparx5, admin);
1890 break;
1891 case VCAP_TYPE_ES2:
1892 sparx5_vcap_es2_port_key_selection(sparx5, admin);
1893 break;
1894 default:
1895 sparx5_vcap_type_err(sparx5, admin, __func__);
1896 break;
1897 }
1898}
1899
1900/* Disable lookups per port */
1901static void sparx5_vcap_port_key_deselection(struct sparx5 *sparx5,
1902 struct vcap_admin *admin)
1903{
1904 int portno, lookup;
1905
1906 switch (admin->vtype) {
1907 case VCAP_TYPE_IS0:
1908 for (lookup = 0; lookup < admin->lookups; ++lookup)
1909 for (portno = 0; portno < SPX5_PORTS; ++portno)
1910 spx5_rmw(ANA_CL_ADV_CL_CFG_LOOKUP_ENA_SET(0),
1911 ANA_CL_ADV_CL_CFG_LOOKUP_ENA,
1912 sparx5,
1913 ANA_CL_ADV_CL_CFG(portno, lookup));
1914 break;
1915 case VCAP_TYPE_IS2:
1916 for (portno = 0; portno < SPX5_PORTS; ++portno)
1917 spx5_rmw(ANA_ACL_VCAP_S2_CFG_SEC_ENA_SET(0),
1918 ANA_ACL_VCAP_S2_CFG_SEC_ENA,
1919 sparx5,
1920 ANA_ACL_VCAP_S2_CFG(portno));
1921 break;
1922 case VCAP_TYPE_ES0:
1923 spx5_rmw(REW_ES0_CTRL_ES0_LU_ENA_SET(0),
1924 REW_ES0_CTRL_ES0_LU_ENA, sparx5, REW_ES0_CTRL);
1925 break;
1926 case VCAP_TYPE_ES2:
1927 for (lookup = 0; lookup < admin->lookups; ++lookup)
1928 for (portno = 0; portno < SPX5_PORTS; ++portno)
1929 spx5_rmw(EACL_VCAP_ES2_KEY_SEL_KEY_ENA_SET(0),
1930 EACL_VCAP_ES2_KEY_SEL_KEY_ENA,
1931 sparx5,
1932 EACL_VCAP_ES2_KEY_SEL(portno, lookup));
1933 break;
1934 default:
1935 sparx5_vcap_type_err(sparx5, admin, __func__);
1936 break;
1937 }
1938}
1939
1940static void sparx5_vcap_admin_free(struct vcap_admin *admin)
1941{
1942 if (!admin)
1943 return;
1944 mutex_destroy(&admin->lock);
1945 kfree(admin->cache.keystream);
1946 kfree(admin->cache.maskstream);
1947 kfree(admin->cache.actionstream);
1948 kfree(admin);
1949}
1950
1951/* Allocate a vcap instance with a rule list and a cache area */
1952static struct vcap_admin *
1953sparx5_vcap_admin_alloc(struct sparx5 *sparx5, struct vcap_control *ctrl,
1954 const struct sparx5_vcap_inst *cfg)
1955{
1956 struct vcap_admin *admin;
1957
1958 admin = kzalloc(sizeof(*admin), GFP_KERNEL);
1959 if (!admin)
1960 return ERR_PTR(-ENOMEM);
1961 INIT_LIST_HEAD(&admin->list);
1962 INIT_LIST_HEAD(&admin->rules);
1963 INIT_LIST_HEAD(&admin->enabled);
1964 mutex_init(&admin->lock);
1965 admin->vtype = cfg->vtype;
1966 admin->vinst = cfg->vinst;
1967 admin->ingress = cfg->ingress;
1968 admin->lookups = cfg->lookups;
1969 admin->lookups_per_instance = cfg->lookups_per_instance;
1970 admin->first_cid = cfg->first_cid;
1971 admin->last_cid = cfg->last_cid;
1972 admin->cache.keystream =
1973 kzalloc(STREAMSIZE, GFP_KERNEL);
1974 admin->cache.maskstream =
1975 kzalloc(STREAMSIZE, GFP_KERNEL);
1976 admin->cache.actionstream =
1977 kzalloc(STREAMSIZE, GFP_KERNEL);
1978 if (!admin->cache.keystream || !admin->cache.maskstream ||
1979 !admin->cache.actionstream) {
1980 sparx5_vcap_admin_free(admin);
1981 return ERR_PTR(-ENOMEM);
1982 }
1983 return admin;
1984}
1985
1986/* Do block allocations and provide addresses for VCAP instances */
1987static void sparx5_vcap_block_alloc(struct sparx5 *sparx5,
1988 struct vcap_admin *admin,
1989 const struct sparx5_vcap_inst *cfg)
1990{
1991 int idx, cores;
1992
1993 switch (admin->vtype) {
1994 case VCAP_TYPE_IS0:
1995 case VCAP_TYPE_IS2:
1996 /* Super VCAP block mapping and address configuration. Block 0
1997 * is assigned addresses 0 through 3071, block 1 is assigned
1998 * addresses 3072 though 6143, and so on.
1999 */
2000 for (idx = cfg->blockno; idx < cfg->blockno + cfg->blocks;
2001 ++idx) {
2002 spx5_wr(VCAP_SUPER_IDX_CORE_IDX_SET(idx), sparx5,
2003 VCAP_SUPER_IDX);
2004 spx5_wr(VCAP_SUPER_MAP_CORE_MAP_SET(cfg->map_id),
2005 sparx5, VCAP_SUPER_MAP);
2006 }
2007 admin->first_valid_addr = cfg->blockno * SUPER_VCAP_BLK_SIZE;
2008 admin->last_used_addr = admin->first_valid_addr +
2009 cfg->blocks * SUPER_VCAP_BLK_SIZE;
2010 admin->last_valid_addr = admin->last_used_addr - 1;
2011 break;
2012 case VCAP_TYPE_ES0:
2013 admin->first_valid_addr = 0;
2014 admin->last_used_addr = cfg->count;
2015 admin->last_valid_addr = cfg->count - 1;
2016 cores = spx5_rd(sparx5, VCAP_ES0_CORE_CNT);
2017 for (idx = 0; idx < cores; ++idx) {
2018 spx5_wr(VCAP_ES0_IDX_CORE_IDX_SET(idx), sparx5,
2019 VCAP_ES0_IDX);
2020 spx5_wr(VCAP_ES0_MAP_CORE_MAP_SET(1), sparx5,
2021 VCAP_ES0_MAP);
2022 }
2023 break;
2024 case VCAP_TYPE_ES2:
2025 admin->first_valid_addr = 0;
2026 admin->last_used_addr = cfg->count;
2027 admin->last_valid_addr = cfg->count - 1;
2028 cores = spx5_rd(sparx5, VCAP_ES2_CORE_CNT);
2029 for (idx = 0; idx < cores; ++idx) {
2030 spx5_wr(VCAP_ES2_IDX_CORE_IDX_SET(idx), sparx5,
2031 VCAP_ES2_IDX);
2032 spx5_wr(VCAP_ES2_MAP_CORE_MAP_SET(1), sparx5,
2033 VCAP_ES2_MAP);
2034 }
2035 break;
2036 default:
2037 sparx5_vcap_type_err(sparx5, admin, __func__);
2038 break;
2039 }
2040}
2041
2042/* Allocate a vcap control and vcap instances and configure the system */
2043int sparx5_vcap_init(struct sparx5 *sparx5)
2044{
2045 const struct sparx5_vcap_inst *cfg;
2046 struct vcap_control *ctrl;
2047 struct vcap_admin *admin;
2048 struct dentry *dir;
2049 int err = 0, idx;
2050
2051 /* Create a VCAP control instance that owns the platform specific VCAP
2052 * model with VCAP instances and information about keysets, keys,
2053 * actionsets and actions
2054 * - Create administrative state for each available VCAP
2055 * - Lists of rules
2056 * - Address information
2057 * - Initialize VCAP blocks
2058 * - Configure port keysets
2059 */
2060 ctrl = kzalloc(sizeof(*ctrl), GFP_KERNEL);
2061 if (!ctrl)
2062 return -ENOMEM;
2063
2064 sparx5->vcap_ctrl = ctrl;
2065 /* select the sparx5 VCAP model */
2066 ctrl->vcaps = sparx5_vcaps;
2067 ctrl->stats = &sparx5_vcap_stats;
2068 /* Setup callbacks to allow the API to use the VCAP HW */
2069 ctrl->ops = &sparx5_vcap_ops;
2070
2071 INIT_LIST_HEAD(&ctrl->list);
2072 for (idx = 0; idx < ARRAY_SIZE(sparx5_vcap_inst_cfg); ++idx) {
2073 cfg = &sparx5_vcap_inst_cfg[idx];
2074 admin = sparx5_vcap_admin_alloc(sparx5, ctrl, cfg);
2075 if (IS_ERR(admin)) {
2076 err = PTR_ERR(admin);
2077 pr_err("%s:%d: vcap allocation failed: %d\n",
2078 __func__, __LINE__, err);
2079 return err;
2080 }
2081 sparx5_vcap_block_alloc(sparx5, admin, cfg);
2082 sparx5_vcap_block_init(sparx5, admin);
2083 if (cfg->vinst == 0)
2084 sparx5_vcap_port_key_selection(sparx5, admin);
2085 list_add_tail(&admin->list, &ctrl->list);
2086 }
2087 dir = vcap_debugfs(sparx5->dev, sparx5->debugfs_root, ctrl);
2088 for (idx = 0; idx < SPX5_PORTS; ++idx)
2089 if (sparx5->ports[idx])
2090 vcap_port_debugfs(sparx5->dev, dir, ctrl,
2091 sparx5->ports[idx]->ndev);
2092
2093 return err;
2094}
2095
2096void sparx5_vcap_destroy(struct sparx5 *sparx5)
2097{
2098 struct vcap_control *ctrl = sparx5->vcap_ctrl;
2099 struct vcap_admin *admin, *admin_next;
2100
2101 if (!ctrl)
2102 return;
2103
2104 list_for_each_entry_safe(admin, admin_next, &ctrl->list, list) {
2105 sparx5_vcap_port_key_deselection(sparx5, admin);
2106 vcap_del_rules(ctrl, admin);
2107 list_del(&admin->list);
2108 sparx5_vcap_admin_free(admin);
2109 }
2110 kfree(ctrl);
2111}