Loading...
1// SPDX-License-Identifier: GPL-2.0
2/* Copyright(c) 2013 - 2018 Intel Corporation. */
3
4#include "iavf.h"
5#include "iavf_prototype.h"
6
7/**
8 * iavf_send_pf_msg
9 * @adapter: adapter structure
10 * @op: virtual channel opcode
11 * @msg: pointer to message buffer
12 * @len: message length
13 *
14 * Send message to PF and print status if failure.
15 **/
16static int iavf_send_pf_msg(struct iavf_adapter *adapter,
17 enum virtchnl_ops op, u8 *msg, u16 len)
18{
19 struct iavf_hw *hw = &adapter->hw;
20 enum iavf_status status;
21
22 if (adapter->flags & IAVF_FLAG_PF_COMMS_FAILED)
23 return 0; /* nothing to see here, move along */
24
25 status = iavf_aq_send_msg_to_pf(hw, op, 0, msg, len, NULL);
26 if (status)
27 dev_dbg(&adapter->pdev->dev, "Unable to send opcode %d to PF, status %s, aq_err %s\n",
28 op, iavf_stat_str(hw, status),
29 iavf_aq_str(hw, hw->aq.asq_last_status));
30 return iavf_status_to_errno(status);
31}
32
33/**
34 * iavf_send_api_ver
35 * @adapter: adapter structure
36 *
37 * Send API version admin queue message to the PF. The reply is not checked
38 * in this function. Returns 0 if the message was successfully
39 * sent, or one of the IAVF_ADMIN_QUEUE_ERROR_ statuses if not.
40 **/
41int iavf_send_api_ver(struct iavf_adapter *adapter)
42{
43 struct virtchnl_version_info vvi;
44
45 vvi.major = VIRTCHNL_VERSION_MAJOR;
46 vvi.minor = VIRTCHNL_VERSION_MINOR;
47
48 return iavf_send_pf_msg(adapter, VIRTCHNL_OP_VERSION, (u8 *)&vvi,
49 sizeof(vvi));
50}
51
52/**
53 * iavf_poll_virtchnl_msg
54 * @hw: HW configuration structure
55 * @event: event to populate on success
56 * @op_to_poll: requested virtchnl op to poll for
57 *
58 * Initialize poll for virtchnl msg matching the requested_op. Returns 0
59 * if a message of the correct opcode is in the queue or an error code
60 * if no message matching the op code is waiting and other failures.
61 */
62static int
63iavf_poll_virtchnl_msg(struct iavf_hw *hw, struct iavf_arq_event_info *event,
64 enum virtchnl_ops op_to_poll)
65{
66 enum virtchnl_ops received_op;
67 enum iavf_status status;
68 u32 v_retval;
69
70 while (1) {
71 /* When the AQ is empty, iavf_clean_arq_element will return
72 * nonzero and this loop will terminate.
73 */
74 status = iavf_clean_arq_element(hw, event, NULL);
75 if (status != IAVF_SUCCESS)
76 return iavf_status_to_errno(status);
77 received_op =
78 (enum virtchnl_ops)le32_to_cpu(event->desc.cookie_high);
79 if (op_to_poll == received_op)
80 break;
81 }
82
83 v_retval = le32_to_cpu(event->desc.cookie_low);
84 return virtchnl_status_to_errno((enum virtchnl_status_code)v_retval);
85}
86
87/**
88 * iavf_verify_api_ver
89 * @adapter: adapter structure
90 *
91 * Compare API versions with the PF. Must be called after admin queue is
92 * initialized. Returns 0 if API versions match, -EIO if they do not,
93 * IAVF_ERR_ADMIN_QUEUE_NO_WORK if the admin queue is empty, and any errors
94 * from the firmware are propagated.
95 **/
96int iavf_verify_api_ver(struct iavf_adapter *adapter)
97{
98 struct iavf_arq_event_info event;
99 int err;
100
101 event.buf_len = IAVF_MAX_AQ_BUF_SIZE;
102 event.msg_buf = kzalloc(IAVF_MAX_AQ_BUF_SIZE, GFP_KERNEL);
103 if (!event.msg_buf)
104 return -ENOMEM;
105
106 err = iavf_poll_virtchnl_msg(&adapter->hw, &event, VIRTCHNL_OP_VERSION);
107 if (!err) {
108 struct virtchnl_version_info *pf_vvi =
109 (struct virtchnl_version_info *)event.msg_buf;
110 adapter->pf_version = *pf_vvi;
111
112 if (pf_vvi->major > VIRTCHNL_VERSION_MAJOR ||
113 (pf_vvi->major == VIRTCHNL_VERSION_MAJOR &&
114 pf_vvi->minor > VIRTCHNL_VERSION_MINOR))
115 err = -EIO;
116 }
117
118 kfree(event.msg_buf);
119
120 return err;
121}
122
123/**
124 * iavf_send_vf_config_msg
125 * @adapter: adapter structure
126 *
127 * Send VF configuration request admin queue message to the PF. The reply
128 * is not checked in this function. Returns 0 if the message was
129 * successfully sent, or one of the IAVF_ADMIN_QUEUE_ERROR_ statuses if not.
130 **/
131int iavf_send_vf_config_msg(struct iavf_adapter *adapter)
132{
133 u32 caps;
134
135 caps = VIRTCHNL_VF_OFFLOAD_L2 |
136 VIRTCHNL_VF_OFFLOAD_RSS_PF |
137 VIRTCHNL_VF_OFFLOAD_RSS_AQ |
138 VIRTCHNL_VF_OFFLOAD_RSS_REG |
139 VIRTCHNL_VF_OFFLOAD_VLAN |
140 VIRTCHNL_VF_OFFLOAD_WB_ON_ITR |
141 VIRTCHNL_VF_OFFLOAD_RSS_PCTYPE_V2 |
142 VIRTCHNL_VF_OFFLOAD_ENCAP |
143 VIRTCHNL_VF_OFFLOAD_VLAN_V2 |
144 VIRTCHNL_VF_OFFLOAD_CRC |
145 VIRTCHNL_VF_OFFLOAD_ENCAP_CSUM |
146 VIRTCHNL_VF_OFFLOAD_REQ_QUEUES |
147 VIRTCHNL_VF_OFFLOAD_ADQ |
148 VIRTCHNL_VF_OFFLOAD_USO |
149 VIRTCHNL_VF_OFFLOAD_FDIR_PF |
150 VIRTCHNL_VF_OFFLOAD_ADV_RSS_PF |
151 VIRTCHNL_VF_CAP_ADV_LINK_SPEED;
152
153 adapter->current_op = VIRTCHNL_OP_GET_VF_RESOURCES;
154 adapter->aq_required &= ~IAVF_FLAG_AQ_GET_CONFIG;
155 if (PF_IS_V11(adapter))
156 return iavf_send_pf_msg(adapter, VIRTCHNL_OP_GET_VF_RESOURCES,
157 (u8 *)&caps, sizeof(caps));
158 else
159 return iavf_send_pf_msg(adapter, VIRTCHNL_OP_GET_VF_RESOURCES,
160 NULL, 0);
161}
162
163int iavf_send_vf_offload_vlan_v2_msg(struct iavf_adapter *adapter)
164{
165 adapter->aq_required &= ~IAVF_FLAG_AQ_GET_OFFLOAD_VLAN_V2_CAPS;
166
167 if (!VLAN_V2_ALLOWED(adapter))
168 return -EOPNOTSUPP;
169
170 adapter->current_op = VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS;
171
172 return iavf_send_pf_msg(adapter, VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS,
173 NULL, 0);
174}
175
176/**
177 * iavf_validate_num_queues
178 * @adapter: adapter structure
179 *
180 * Validate that the number of queues the PF has sent in
181 * VIRTCHNL_OP_GET_VF_RESOURCES is not larger than the VF can handle.
182 **/
183static void iavf_validate_num_queues(struct iavf_adapter *adapter)
184{
185 if (adapter->vf_res->num_queue_pairs > IAVF_MAX_REQ_QUEUES) {
186 struct virtchnl_vsi_resource *vsi_res;
187 int i;
188
189 dev_info(&adapter->pdev->dev, "Received %d queues, but can only have a max of %d\n",
190 adapter->vf_res->num_queue_pairs,
191 IAVF_MAX_REQ_QUEUES);
192 dev_info(&adapter->pdev->dev, "Fixing by reducing queues to %d\n",
193 IAVF_MAX_REQ_QUEUES);
194 adapter->vf_res->num_queue_pairs = IAVF_MAX_REQ_QUEUES;
195 for (i = 0; i < adapter->vf_res->num_vsis; i++) {
196 vsi_res = &adapter->vf_res->vsi_res[i];
197 vsi_res->num_queue_pairs = IAVF_MAX_REQ_QUEUES;
198 }
199 }
200}
201
202/**
203 * iavf_get_vf_config
204 * @adapter: private adapter structure
205 *
206 * Get VF configuration from PF and populate hw structure. Must be called after
207 * admin queue is initialized. Busy waits until response is received from PF,
208 * with maximum timeout. Response from PF is returned in the buffer for further
209 * processing by the caller.
210 **/
211int iavf_get_vf_config(struct iavf_adapter *adapter)
212{
213 struct iavf_hw *hw = &adapter->hw;
214 struct iavf_arq_event_info event;
215 u16 len;
216 int err;
217
218 len = IAVF_VIRTCHNL_VF_RESOURCE_SIZE;
219 event.buf_len = len;
220 event.msg_buf = kzalloc(len, GFP_KERNEL);
221 if (!event.msg_buf)
222 return -ENOMEM;
223
224 err = iavf_poll_virtchnl_msg(hw, &event, VIRTCHNL_OP_GET_VF_RESOURCES);
225 memcpy(adapter->vf_res, event.msg_buf, min(event.msg_len, len));
226
227 /* some PFs send more queues than we should have so validate that
228 * we aren't getting too many queues
229 */
230 if (!err)
231 iavf_validate_num_queues(adapter);
232 iavf_vf_parse_hw_config(hw, adapter->vf_res);
233
234 kfree(event.msg_buf);
235
236 return err;
237}
238
239int iavf_get_vf_vlan_v2_caps(struct iavf_adapter *adapter)
240{
241 struct iavf_arq_event_info event;
242 int err;
243 u16 len;
244
245 len = sizeof(struct virtchnl_vlan_caps);
246 event.buf_len = len;
247 event.msg_buf = kzalloc(len, GFP_KERNEL);
248 if (!event.msg_buf)
249 return -ENOMEM;
250
251 err = iavf_poll_virtchnl_msg(&adapter->hw, &event,
252 VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS);
253 if (!err)
254 memcpy(&adapter->vlan_v2_caps, event.msg_buf,
255 min(event.msg_len, len));
256
257 kfree(event.msg_buf);
258
259 return err;
260}
261
262/**
263 * iavf_configure_queues
264 * @adapter: adapter structure
265 *
266 * Request that the PF set up our (previously allocated) queues.
267 **/
268void iavf_configure_queues(struct iavf_adapter *adapter)
269{
270 struct virtchnl_vsi_queue_config_info *vqci;
271 int i, max_frame = adapter->vf_res->max_mtu;
272 int pairs = adapter->num_active_queues;
273 struct virtchnl_queue_pair_info *vqpi;
274 size_t len;
275
276 if (max_frame > IAVF_MAX_RXBUFFER || !max_frame)
277 max_frame = IAVF_MAX_RXBUFFER;
278
279 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
280 /* bail because we already have a command pending */
281 dev_err(&adapter->pdev->dev, "Cannot configure queues, command %d pending\n",
282 adapter->current_op);
283 return;
284 }
285 adapter->current_op = VIRTCHNL_OP_CONFIG_VSI_QUEUES;
286 len = virtchnl_struct_size(vqci, qpair, pairs);
287 vqci = kzalloc(len, GFP_KERNEL);
288 if (!vqci)
289 return;
290
291 /* Limit maximum frame size when jumbo frames is not enabled */
292 if (!(adapter->flags & IAVF_FLAG_LEGACY_RX) &&
293 (adapter->netdev->mtu <= ETH_DATA_LEN))
294 max_frame = IAVF_RXBUFFER_1536 - NET_IP_ALIGN;
295
296 vqci->vsi_id = adapter->vsi_res->vsi_id;
297 vqci->num_queue_pairs = pairs;
298 vqpi = vqci->qpair;
299 /* Size check is not needed here - HW max is 16 queue pairs, and we
300 * can fit info for 31 of them into the AQ buffer before it overflows.
301 */
302 for (i = 0; i < pairs; i++) {
303 vqpi->txq.vsi_id = vqci->vsi_id;
304 vqpi->txq.queue_id = i;
305 vqpi->txq.ring_len = adapter->tx_rings[i].count;
306 vqpi->txq.dma_ring_addr = adapter->tx_rings[i].dma;
307 vqpi->rxq.vsi_id = vqci->vsi_id;
308 vqpi->rxq.queue_id = i;
309 vqpi->rxq.ring_len = adapter->rx_rings[i].count;
310 vqpi->rxq.dma_ring_addr = adapter->rx_rings[i].dma;
311 vqpi->rxq.max_pkt_size = max_frame;
312 vqpi->rxq.databuffer_size =
313 ALIGN(adapter->rx_rings[i].rx_buf_len,
314 BIT_ULL(IAVF_RXQ_CTX_DBUFF_SHIFT));
315 if (CRC_OFFLOAD_ALLOWED(adapter))
316 vqpi->rxq.crc_disable = !!(adapter->netdev->features &
317 NETIF_F_RXFCS);
318 vqpi++;
319 }
320
321 adapter->aq_required &= ~IAVF_FLAG_AQ_CONFIGURE_QUEUES;
322 iavf_send_pf_msg(adapter, VIRTCHNL_OP_CONFIG_VSI_QUEUES,
323 (u8 *)vqci, len);
324 kfree(vqci);
325}
326
327/**
328 * iavf_enable_queues
329 * @adapter: adapter structure
330 *
331 * Request that the PF enable all of our queues.
332 **/
333void iavf_enable_queues(struct iavf_adapter *adapter)
334{
335 struct virtchnl_queue_select vqs;
336
337 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
338 /* bail because we already have a command pending */
339 dev_err(&adapter->pdev->dev, "Cannot enable queues, command %d pending\n",
340 adapter->current_op);
341 return;
342 }
343 adapter->current_op = VIRTCHNL_OP_ENABLE_QUEUES;
344 vqs.vsi_id = adapter->vsi_res->vsi_id;
345 vqs.tx_queues = BIT(adapter->num_active_queues) - 1;
346 vqs.rx_queues = vqs.tx_queues;
347 adapter->aq_required &= ~IAVF_FLAG_AQ_ENABLE_QUEUES;
348 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ENABLE_QUEUES,
349 (u8 *)&vqs, sizeof(vqs));
350}
351
352/**
353 * iavf_disable_queues
354 * @adapter: adapter structure
355 *
356 * Request that the PF disable all of our queues.
357 **/
358void iavf_disable_queues(struct iavf_adapter *adapter)
359{
360 struct virtchnl_queue_select vqs;
361
362 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
363 /* bail because we already have a command pending */
364 dev_err(&adapter->pdev->dev, "Cannot disable queues, command %d pending\n",
365 adapter->current_op);
366 return;
367 }
368 adapter->current_op = VIRTCHNL_OP_DISABLE_QUEUES;
369 vqs.vsi_id = adapter->vsi_res->vsi_id;
370 vqs.tx_queues = BIT(adapter->num_active_queues) - 1;
371 vqs.rx_queues = vqs.tx_queues;
372 adapter->aq_required &= ~IAVF_FLAG_AQ_DISABLE_QUEUES;
373 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DISABLE_QUEUES,
374 (u8 *)&vqs, sizeof(vqs));
375}
376
377/**
378 * iavf_map_queues
379 * @adapter: adapter structure
380 *
381 * Request that the PF map queues to interrupt vectors. Misc causes, including
382 * admin queue, are always mapped to vector 0.
383 **/
384void iavf_map_queues(struct iavf_adapter *adapter)
385{
386 struct virtchnl_irq_map_info *vimi;
387 struct virtchnl_vector_map *vecmap;
388 struct iavf_q_vector *q_vector;
389 int v_idx, q_vectors;
390 size_t len;
391
392 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
393 /* bail because we already have a command pending */
394 dev_err(&adapter->pdev->dev, "Cannot map queues to vectors, command %d pending\n",
395 adapter->current_op);
396 return;
397 }
398 adapter->current_op = VIRTCHNL_OP_CONFIG_IRQ_MAP;
399
400 q_vectors = adapter->num_msix_vectors - NONQ_VECS;
401
402 len = virtchnl_struct_size(vimi, vecmap, adapter->num_msix_vectors);
403 vimi = kzalloc(len, GFP_KERNEL);
404 if (!vimi)
405 return;
406
407 vimi->num_vectors = adapter->num_msix_vectors;
408 /* Queue vectors first */
409 for (v_idx = 0; v_idx < q_vectors; v_idx++) {
410 q_vector = &adapter->q_vectors[v_idx];
411 vecmap = &vimi->vecmap[v_idx];
412
413 vecmap->vsi_id = adapter->vsi_res->vsi_id;
414 vecmap->vector_id = v_idx + NONQ_VECS;
415 vecmap->txq_map = q_vector->ring_mask;
416 vecmap->rxq_map = q_vector->ring_mask;
417 vecmap->rxitr_idx = IAVF_RX_ITR;
418 vecmap->txitr_idx = IAVF_TX_ITR;
419 }
420 /* Misc vector last - this is only for AdminQ messages */
421 vecmap = &vimi->vecmap[v_idx];
422 vecmap->vsi_id = adapter->vsi_res->vsi_id;
423 vecmap->vector_id = 0;
424 vecmap->txq_map = 0;
425 vecmap->rxq_map = 0;
426
427 adapter->aq_required &= ~IAVF_FLAG_AQ_MAP_VECTORS;
428 iavf_send_pf_msg(adapter, VIRTCHNL_OP_CONFIG_IRQ_MAP,
429 (u8 *)vimi, len);
430 kfree(vimi);
431}
432
433/**
434 * iavf_set_mac_addr_type - Set the correct request type from the filter type
435 * @virtchnl_ether_addr: pointer to requested list element
436 * @filter: pointer to requested filter
437 **/
438static void
439iavf_set_mac_addr_type(struct virtchnl_ether_addr *virtchnl_ether_addr,
440 const struct iavf_mac_filter *filter)
441{
442 virtchnl_ether_addr->type = filter->is_primary ?
443 VIRTCHNL_ETHER_ADDR_PRIMARY :
444 VIRTCHNL_ETHER_ADDR_EXTRA;
445}
446
447/**
448 * iavf_add_ether_addrs
449 * @adapter: adapter structure
450 *
451 * Request that the PF add one or more addresses to our filters.
452 **/
453void iavf_add_ether_addrs(struct iavf_adapter *adapter)
454{
455 struct virtchnl_ether_addr_list *veal;
456 struct iavf_mac_filter *f;
457 int i = 0, count = 0;
458 bool more = false;
459 size_t len;
460
461 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
462 /* bail because we already have a command pending */
463 dev_err(&adapter->pdev->dev, "Cannot add filters, command %d pending\n",
464 adapter->current_op);
465 return;
466 }
467
468 spin_lock_bh(&adapter->mac_vlan_list_lock);
469
470 list_for_each_entry(f, &adapter->mac_filter_list, list) {
471 if (f->add)
472 count++;
473 }
474 if (!count) {
475 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_MAC_FILTER;
476 spin_unlock_bh(&adapter->mac_vlan_list_lock);
477 return;
478 }
479 adapter->current_op = VIRTCHNL_OP_ADD_ETH_ADDR;
480
481 len = virtchnl_struct_size(veal, list, count);
482 if (len > IAVF_MAX_AQ_BUF_SIZE) {
483 dev_warn(&adapter->pdev->dev, "Too many add MAC changes in one request\n");
484 while (len > IAVF_MAX_AQ_BUF_SIZE)
485 len = virtchnl_struct_size(veal, list, --count);
486 more = true;
487 }
488
489 veal = kzalloc(len, GFP_ATOMIC);
490 if (!veal) {
491 spin_unlock_bh(&adapter->mac_vlan_list_lock);
492 return;
493 }
494
495 veal->vsi_id = adapter->vsi_res->vsi_id;
496 veal->num_elements = count;
497 list_for_each_entry(f, &adapter->mac_filter_list, list) {
498 if (f->add) {
499 ether_addr_copy(veal->list[i].addr, f->macaddr);
500 iavf_set_mac_addr_type(&veal->list[i], f);
501 i++;
502 f->add = false;
503 if (i == count)
504 break;
505 }
506 }
507 if (!more)
508 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_MAC_FILTER;
509
510 spin_unlock_bh(&adapter->mac_vlan_list_lock);
511
512 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ADD_ETH_ADDR, (u8 *)veal, len);
513 kfree(veal);
514}
515
516/**
517 * iavf_del_ether_addrs
518 * @adapter: adapter structure
519 *
520 * Request that the PF remove one or more addresses from our filters.
521 **/
522void iavf_del_ether_addrs(struct iavf_adapter *adapter)
523{
524 struct virtchnl_ether_addr_list *veal;
525 struct iavf_mac_filter *f, *ftmp;
526 int i = 0, count = 0;
527 bool more = false;
528 size_t len;
529
530 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
531 /* bail because we already have a command pending */
532 dev_err(&adapter->pdev->dev, "Cannot remove filters, command %d pending\n",
533 adapter->current_op);
534 return;
535 }
536
537 spin_lock_bh(&adapter->mac_vlan_list_lock);
538
539 list_for_each_entry(f, &adapter->mac_filter_list, list) {
540 if (f->remove)
541 count++;
542 }
543 if (!count) {
544 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_MAC_FILTER;
545 spin_unlock_bh(&adapter->mac_vlan_list_lock);
546 return;
547 }
548 adapter->current_op = VIRTCHNL_OP_DEL_ETH_ADDR;
549
550 len = virtchnl_struct_size(veal, list, count);
551 if (len > IAVF_MAX_AQ_BUF_SIZE) {
552 dev_warn(&adapter->pdev->dev, "Too many delete MAC changes in one request\n");
553 while (len > IAVF_MAX_AQ_BUF_SIZE)
554 len = virtchnl_struct_size(veal, list, --count);
555 more = true;
556 }
557 veal = kzalloc(len, GFP_ATOMIC);
558 if (!veal) {
559 spin_unlock_bh(&adapter->mac_vlan_list_lock);
560 return;
561 }
562
563 veal->vsi_id = adapter->vsi_res->vsi_id;
564 veal->num_elements = count;
565 list_for_each_entry_safe(f, ftmp, &adapter->mac_filter_list, list) {
566 if (f->remove) {
567 ether_addr_copy(veal->list[i].addr, f->macaddr);
568 iavf_set_mac_addr_type(&veal->list[i], f);
569 i++;
570 list_del(&f->list);
571 kfree(f);
572 if (i == count)
573 break;
574 }
575 }
576 if (!more)
577 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_MAC_FILTER;
578
579 spin_unlock_bh(&adapter->mac_vlan_list_lock);
580
581 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DEL_ETH_ADDR, (u8 *)veal, len);
582 kfree(veal);
583}
584
585/**
586 * iavf_mac_add_ok
587 * @adapter: adapter structure
588 *
589 * Submit list of filters based on PF response.
590 **/
591static void iavf_mac_add_ok(struct iavf_adapter *adapter)
592{
593 struct iavf_mac_filter *f, *ftmp;
594
595 spin_lock_bh(&adapter->mac_vlan_list_lock);
596 list_for_each_entry_safe(f, ftmp, &adapter->mac_filter_list, list) {
597 f->is_new_mac = false;
598 if (!f->add && !f->add_handled)
599 f->add_handled = true;
600 }
601 spin_unlock_bh(&adapter->mac_vlan_list_lock);
602}
603
604/**
605 * iavf_mac_add_reject
606 * @adapter: adapter structure
607 *
608 * Remove filters from list based on PF response.
609 **/
610static void iavf_mac_add_reject(struct iavf_adapter *adapter)
611{
612 struct net_device *netdev = adapter->netdev;
613 struct iavf_mac_filter *f, *ftmp;
614
615 spin_lock_bh(&adapter->mac_vlan_list_lock);
616 list_for_each_entry_safe(f, ftmp, &adapter->mac_filter_list, list) {
617 if (f->remove && ether_addr_equal(f->macaddr, netdev->dev_addr))
618 f->remove = false;
619
620 if (!f->add && !f->add_handled)
621 f->add_handled = true;
622
623 if (f->is_new_mac) {
624 list_del(&f->list);
625 kfree(f);
626 }
627 }
628 spin_unlock_bh(&adapter->mac_vlan_list_lock);
629}
630
631/**
632 * iavf_vlan_add_reject
633 * @adapter: adapter structure
634 *
635 * Remove VLAN filters from list based on PF response.
636 **/
637static void iavf_vlan_add_reject(struct iavf_adapter *adapter)
638{
639 struct iavf_vlan_filter *f, *ftmp;
640
641 spin_lock_bh(&adapter->mac_vlan_list_lock);
642 list_for_each_entry_safe(f, ftmp, &adapter->vlan_filter_list, list) {
643 if (f->state == IAVF_VLAN_IS_NEW) {
644 list_del(&f->list);
645 kfree(f);
646 adapter->num_vlan_filters--;
647 }
648 }
649 spin_unlock_bh(&adapter->mac_vlan_list_lock);
650}
651
652/**
653 * iavf_add_vlans
654 * @adapter: adapter structure
655 *
656 * Request that the PF add one or more VLAN filters to our VSI.
657 **/
658void iavf_add_vlans(struct iavf_adapter *adapter)
659{
660 int len, i = 0, count = 0;
661 struct iavf_vlan_filter *f;
662 bool more = false;
663
664 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
665 /* bail because we already have a command pending */
666 dev_err(&adapter->pdev->dev, "Cannot add VLANs, command %d pending\n",
667 adapter->current_op);
668 return;
669 }
670
671 spin_lock_bh(&adapter->mac_vlan_list_lock);
672
673 list_for_each_entry(f, &adapter->vlan_filter_list, list) {
674 if (f->state == IAVF_VLAN_ADD)
675 count++;
676 }
677 if (!count || !VLAN_FILTERING_ALLOWED(adapter)) {
678 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_VLAN_FILTER;
679 spin_unlock_bh(&adapter->mac_vlan_list_lock);
680 return;
681 }
682
683 if (VLAN_ALLOWED(adapter)) {
684 struct virtchnl_vlan_filter_list *vvfl;
685
686 adapter->current_op = VIRTCHNL_OP_ADD_VLAN;
687
688 len = virtchnl_struct_size(vvfl, vlan_id, count);
689 if (len > IAVF_MAX_AQ_BUF_SIZE) {
690 dev_warn(&adapter->pdev->dev, "Too many add VLAN changes in one request\n");
691 while (len > IAVF_MAX_AQ_BUF_SIZE)
692 len = virtchnl_struct_size(vvfl, vlan_id,
693 --count);
694 more = true;
695 }
696 vvfl = kzalloc(len, GFP_ATOMIC);
697 if (!vvfl) {
698 spin_unlock_bh(&adapter->mac_vlan_list_lock);
699 return;
700 }
701
702 vvfl->vsi_id = adapter->vsi_res->vsi_id;
703 vvfl->num_elements = count;
704 list_for_each_entry(f, &adapter->vlan_filter_list, list) {
705 if (f->state == IAVF_VLAN_ADD) {
706 vvfl->vlan_id[i] = f->vlan.vid;
707 i++;
708 f->state = IAVF_VLAN_IS_NEW;
709 if (i == count)
710 break;
711 }
712 }
713 if (!more)
714 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_VLAN_FILTER;
715
716 spin_unlock_bh(&adapter->mac_vlan_list_lock);
717
718 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ADD_VLAN, (u8 *)vvfl, len);
719 kfree(vvfl);
720 } else {
721 u16 max_vlans = adapter->vlan_v2_caps.filtering.max_filters;
722 u16 current_vlans = iavf_get_num_vlans_added(adapter);
723 struct virtchnl_vlan_filter_list_v2 *vvfl_v2;
724
725 adapter->current_op = VIRTCHNL_OP_ADD_VLAN_V2;
726
727 if ((count + current_vlans) > max_vlans &&
728 current_vlans < max_vlans) {
729 count = max_vlans - iavf_get_num_vlans_added(adapter);
730 more = true;
731 }
732
733 len = virtchnl_struct_size(vvfl_v2, filters, count);
734 if (len > IAVF_MAX_AQ_BUF_SIZE) {
735 dev_warn(&adapter->pdev->dev, "Too many add VLAN changes in one request\n");
736 while (len > IAVF_MAX_AQ_BUF_SIZE)
737 len = virtchnl_struct_size(vvfl_v2, filters,
738 --count);
739 more = true;
740 }
741
742 vvfl_v2 = kzalloc(len, GFP_ATOMIC);
743 if (!vvfl_v2) {
744 spin_unlock_bh(&adapter->mac_vlan_list_lock);
745 return;
746 }
747
748 vvfl_v2->vport_id = adapter->vsi_res->vsi_id;
749 vvfl_v2->num_elements = count;
750 list_for_each_entry(f, &adapter->vlan_filter_list, list) {
751 if (f->state == IAVF_VLAN_ADD) {
752 struct virtchnl_vlan_supported_caps *filtering_support =
753 &adapter->vlan_v2_caps.filtering.filtering_support;
754 struct virtchnl_vlan *vlan;
755
756 if (i == count)
757 break;
758
759 /* give priority over outer if it's enabled */
760 if (filtering_support->outer)
761 vlan = &vvfl_v2->filters[i].outer;
762 else
763 vlan = &vvfl_v2->filters[i].inner;
764
765 vlan->tci = f->vlan.vid;
766 vlan->tpid = f->vlan.tpid;
767
768 i++;
769 f->state = IAVF_VLAN_IS_NEW;
770 }
771 }
772
773 if (!more)
774 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_VLAN_FILTER;
775
776 spin_unlock_bh(&adapter->mac_vlan_list_lock);
777
778 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ADD_VLAN_V2,
779 (u8 *)vvfl_v2, len);
780 kfree(vvfl_v2);
781 }
782}
783
784/**
785 * iavf_del_vlans
786 * @adapter: adapter structure
787 *
788 * Request that the PF remove one or more VLAN filters from our VSI.
789 **/
790void iavf_del_vlans(struct iavf_adapter *adapter)
791{
792 struct iavf_vlan_filter *f, *ftmp;
793 int len, i = 0, count = 0;
794 bool more = false;
795
796 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
797 /* bail because we already have a command pending */
798 dev_err(&adapter->pdev->dev, "Cannot remove VLANs, command %d pending\n",
799 adapter->current_op);
800 return;
801 }
802
803 spin_lock_bh(&adapter->mac_vlan_list_lock);
804
805 list_for_each_entry_safe(f, ftmp, &adapter->vlan_filter_list, list) {
806 /* since VLAN capabilities are not allowed, we dont want to send
807 * a VLAN delete request because it will most likely fail and
808 * create unnecessary errors/noise, so just free the VLAN
809 * filters marked for removal to enable bailing out before
810 * sending a virtchnl message
811 */
812 if (f->state == IAVF_VLAN_REMOVE &&
813 !VLAN_FILTERING_ALLOWED(adapter)) {
814 list_del(&f->list);
815 kfree(f);
816 adapter->num_vlan_filters--;
817 } else if (f->state == IAVF_VLAN_DISABLE &&
818 !VLAN_FILTERING_ALLOWED(adapter)) {
819 f->state = IAVF_VLAN_INACTIVE;
820 } else if (f->state == IAVF_VLAN_REMOVE ||
821 f->state == IAVF_VLAN_DISABLE) {
822 count++;
823 }
824 }
825 if (!count || !VLAN_FILTERING_ALLOWED(adapter)) {
826 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_VLAN_FILTER;
827 spin_unlock_bh(&adapter->mac_vlan_list_lock);
828 return;
829 }
830
831 if (VLAN_ALLOWED(adapter)) {
832 struct virtchnl_vlan_filter_list *vvfl;
833
834 adapter->current_op = VIRTCHNL_OP_DEL_VLAN;
835
836 len = virtchnl_struct_size(vvfl, vlan_id, count);
837 if (len > IAVF_MAX_AQ_BUF_SIZE) {
838 dev_warn(&adapter->pdev->dev, "Too many delete VLAN changes in one request\n");
839 while (len > IAVF_MAX_AQ_BUF_SIZE)
840 len = virtchnl_struct_size(vvfl, vlan_id,
841 --count);
842 more = true;
843 }
844 vvfl = kzalloc(len, GFP_ATOMIC);
845 if (!vvfl) {
846 spin_unlock_bh(&adapter->mac_vlan_list_lock);
847 return;
848 }
849
850 vvfl->vsi_id = adapter->vsi_res->vsi_id;
851 vvfl->num_elements = count;
852 list_for_each_entry_safe(f, ftmp, &adapter->vlan_filter_list, list) {
853 if (f->state == IAVF_VLAN_DISABLE) {
854 vvfl->vlan_id[i] = f->vlan.vid;
855 f->state = IAVF_VLAN_INACTIVE;
856 i++;
857 if (i == count)
858 break;
859 } else if (f->state == IAVF_VLAN_REMOVE) {
860 vvfl->vlan_id[i] = f->vlan.vid;
861 list_del(&f->list);
862 kfree(f);
863 adapter->num_vlan_filters--;
864 i++;
865 if (i == count)
866 break;
867 }
868 }
869
870 if (!more)
871 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_VLAN_FILTER;
872
873 spin_unlock_bh(&adapter->mac_vlan_list_lock);
874
875 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DEL_VLAN, (u8 *)vvfl, len);
876 kfree(vvfl);
877 } else {
878 struct virtchnl_vlan_filter_list_v2 *vvfl_v2;
879
880 adapter->current_op = VIRTCHNL_OP_DEL_VLAN_V2;
881
882 len = virtchnl_struct_size(vvfl_v2, filters, count);
883 if (len > IAVF_MAX_AQ_BUF_SIZE) {
884 dev_warn(&adapter->pdev->dev, "Too many add VLAN changes in one request\n");
885 while (len > IAVF_MAX_AQ_BUF_SIZE)
886 len = virtchnl_struct_size(vvfl_v2, filters,
887 --count);
888 more = true;
889 }
890
891 vvfl_v2 = kzalloc(len, GFP_ATOMIC);
892 if (!vvfl_v2) {
893 spin_unlock_bh(&adapter->mac_vlan_list_lock);
894 return;
895 }
896
897 vvfl_v2->vport_id = adapter->vsi_res->vsi_id;
898 vvfl_v2->num_elements = count;
899 list_for_each_entry_safe(f, ftmp, &adapter->vlan_filter_list, list) {
900 if (f->state == IAVF_VLAN_DISABLE ||
901 f->state == IAVF_VLAN_REMOVE) {
902 struct virtchnl_vlan_supported_caps *filtering_support =
903 &adapter->vlan_v2_caps.filtering.filtering_support;
904 struct virtchnl_vlan *vlan;
905
906 /* give priority over outer if it's enabled */
907 if (filtering_support->outer)
908 vlan = &vvfl_v2->filters[i].outer;
909 else
910 vlan = &vvfl_v2->filters[i].inner;
911
912 vlan->tci = f->vlan.vid;
913 vlan->tpid = f->vlan.tpid;
914
915 if (f->state == IAVF_VLAN_DISABLE) {
916 f->state = IAVF_VLAN_INACTIVE;
917 } else {
918 list_del(&f->list);
919 kfree(f);
920 adapter->num_vlan_filters--;
921 }
922 i++;
923 if (i == count)
924 break;
925 }
926 }
927
928 if (!more)
929 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_VLAN_FILTER;
930
931 spin_unlock_bh(&adapter->mac_vlan_list_lock);
932
933 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DEL_VLAN_V2,
934 (u8 *)vvfl_v2, len);
935 kfree(vvfl_v2);
936 }
937}
938
939/**
940 * iavf_set_promiscuous
941 * @adapter: adapter structure
942 *
943 * Request that the PF enable promiscuous mode for our VSI.
944 **/
945void iavf_set_promiscuous(struct iavf_adapter *adapter)
946{
947 struct net_device *netdev = adapter->netdev;
948 struct virtchnl_promisc_info vpi;
949 unsigned int flags;
950
951 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
952 /* bail because we already have a command pending */
953 dev_err(&adapter->pdev->dev, "Cannot set promiscuous mode, command %d pending\n",
954 adapter->current_op);
955 return;
956 }
957
958 /* prevent changes to promiscuous flags */
959 spin_lock_bh(&adapter->current_netdev_promisc_flags_lock);
960
961 /* sanity check to prevent duplicate AQ calls */
962 if (!iavf_promiscuous_mode_changed(adapter)) {
963 adapter->aq_required &= ~IAVF_FLAG_AQ_CONFIGURE_PROMISC_MODE;
964 dev_dbg(&adapter->pdev->dev, "No change in promiscuous mode\n");
965 /* allow changes to promiscuous flags */
966 spin_unlock_bh(&adapter->current_netdev_promisc_flags_lock);
967 return;
968 }
969
970 /* there are 2 bits, but only 3 states */
971 if (!(netdev->flags & IFF_PROMISC) &&
972 netdev->flags & IFF_ALLMULTI) {
973 /* State 1 - only multicast promiscuous mode enabled
974 * - !IFF_PROMISC && IFF_ALLMULTI
975 */
976 flags = FLAG_VF_MULTICAST_PROMISC;
977 adapter->current_netdev_promisc_flags |= IFF_ALLMULTI;
978 adapter->current_netdev_promisc_flags &= ~IFF_PROMISC;
979 dev_info(&adapter->pdev->dev, "Entering multicast promiscuous mode\n");
980 } else if (!(netdev->flags & IFF_PROMISC) &&
981 !(netdev->flags & IFF_ALLMULTI)) {
982 /* State 2 - unicast/multicast promiscuous mode disabled
983 * - !IFF_PROMISC && !IFF_ALLMULTI
984 */
985 flags = 0;
986 adapter->current_netdev_promisc_flags &=
987 ~(IFF_PROMISC | IFF_ALLMULTI);
988 dev_info(&adapter->pdev->dev, "Leaving promiscuous mode\n");
989 } else {
990 /* State 3 - unicast/multicast promiscuous mode enabled
991 * - IFF_PROMISC && IFF_ALLMULTI
992 * - IFF_PROMISC && !IFF_ALLMULTI
993 */
994 flags = FLAG_VF_UNICAST_PROMISC | FLAG_VF_MULTICAST_PROMISC;
995 adapter->current_netdev_promisc_flags |= IFF_PROMISC;
996 if (netdev->flags & IFF_ALLMULTI)
997 adapter->current_netdev_promisc_flags |= IFF_ALLMULTI;
998 else
999 adapter->current_netdev_promisc_flags &= ~IFF_ALLMULTI;
1000
1001 dev_info(&adapter->pdev->dev, "Entering promiscuous mode\n");
1002 }
1003
1004 adapter->aq_required &= ~IAVF_FLAG_AQ_CONFIGURE_PROMISC_MODE;
1005
1006 /* allow changes to promiscuous flags */
1007 spin_unlock_bh(&adapter->current_netdev_promisc_flags_lock);
1008
1009 adapter->current_op = VIRTCHNL_OP_CONFIG_PROMISCUOUS_MODE;
1010 vpi.vsi_id = adapter->vsi_res->vsi_id;
1011 vpi.flags = flags;
1012 iavf_send_pf_msg(adapter, VIRTCHNL_OP_CONFIG_PROMISCUOUS_MODE,
1013 (u8 *)&vpi, sizeof(vpi));
1014}
1015
1016/**
1017 * iavf_request_stats
1018 * @adapter: adapter structure
1019 *
1020 * Request VSI statistics from PF.
1021 **/
1022void iavf_request_stats(struct iavf_adapter *adapter)
1023{
1024 struct virtchnl_queue_select vqs;
1025
1026 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1027 /* no error message, this isn't crucial */
1028 return;
1029 }
1030
1031 adapter->aq_required &= ~IAVF_FLAG_AQ_REQUEST_STATS;
1032 adapter->current_op = VIRTCHNL_OP_GET_STATS;
1033 vqs.vsi_id = adapter->vsi_res->vsi_id;
1034 /* queue maps are ignored for this message - only the vsi is used */
1035 if (iavf_send_pf_msg(adapter, VIRTCHNL_OP_GET_STATS, (u8 *)&vqs,
1036 sizeof(vqs)))
1037 /* if the request failed, don't lock out others */
1038 adapter->current_op = VIRTCHNL_OP_UNKNOWN;
1039}
1040
1041/**
1042 * iavf_get_hena
1043 * @adapter: adapter structure
1044 *
1045 * Request hash enable capabilities from PF
1046 **/
1047void iavf_get_hena(struct iavf_adapter *adapter)
1048{
1049 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1050 /* bail because we already have a command pending */
1051 dev_err(&adapter->pdev->dev, "Cannot get RSS hash capabilities, command %d pending\n",
1052 adapter->current_op);
1053 return;
1054 }
1055 adapter->current_op = VIRTCHNL_OP_GET_RSS_HENA_CAPS;
1056 adapter->aq_required &= ~IAVF_FLAG_AQ_GET_HENA;
1057 iavf_send_pf_msg(adapter, VIRTCHNL_OP_GET_RSS_HENA_CAPS, NULL, 0);
1058}
1059
1060/**
1061 * iavf_set_hena
1062 * @adapter: adapter structure
1063 *
1064 * Request the PF to set our RSS hash capabilities
1065 **/
1066void iavf_set_hena(struct iavf_adapter *adapter)
1067{
1068 struct virtchnl_rss_hena vrh;
1069
1070 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1071 /* bail because we already have a command pending */
1072 dev_err(&adapter->pdev->dev, "Cannot set RSS hash enable, command %d pending\n",
1073 adapter->current_op);
1074 return;
1075 }
1076 vrh.hena = adapter->hena;
1077 adapter->current_op = VIRTCHNL_OP_SET_RSS_HENA;
1078 adapter->aq_required &= ~IAVF_FLAG_AQ_SET_HENA;
1079 iavf_send_pf_msg(adapter, VIRTCHNL_OP_SET_RSS_HENA, (u8 *)&vrh,
1080 sizeof(vrh));
1081}
1082
1083/**
1084 * iavf_set_rss_key
1085 * @adapter: adapter structure
1086 *
1087 * Request the PF to set our RSS hash key
1088 **/
1089void iavf_set_rss_key(struct iavf_adapter *adapter)
1090{
1091 struct virtchnl_rss_key *vrk;
1092 int len;
1093
1094 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1095 /* bail because we already have a command pending */
1096 dev_err(&adapter->pdev->dev, "Cannot set RSS key, command %d pending\n",
1097 adapter->current_op);
1098 return;
1099 }
1100 len = virtchnl_struct_size(vrk, key, adapter->rss_key_size);
1101 vrk = kzalloc(len, GFP_KERNEL);
1102 if (!vrk)
1103 return;
1104 vrk->vsi_id = adapter->vsi.id;
1105 vrk->key_len = adapter->rss_key_size;
1106 memcpy(vrk->key, adapter->rss_key, adapter->rss_key_size);
1107
1108 adapter->current_op = VIRTCHNL_OP_CONFIG_RSS_KEY;
1109 adapter->aq_required &= ~IAVF_FLAG_AQ_SET_RSS_KEY;
1110 iavf_send_pf_msg(adapter, VIRTCHNL_OP_CONFIG_RSS_KEY, (u8 *)vrk, len);
1111 kfree(vrk);
1112}
1113
1114/**
1115 * iavf_set_rss_lut
1116 * @adapter: adapter structure
1117 *
1118 * Request the PF to set our RSS lookup table
1119 **/
1120void iavf_set_rss_lut(struct iavf_adapter *adapter)
1121{
1122 struct virtchnl_rss_lut *vrl;
1123 int len;
1124
1125 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1126 /* bail because we already have a command pending */
1127 dev_err(&adapter->pdev->dev, "Cannot set RSS LUT, command %d pending\n",
1128 adapter->current_op);
1129 return;
1130 }
1131 len = virtchnl_struct_size(vrl, lut, adapter->rss_lut_size);
1132 vrl = kzalloc(len, GFP_KERNEL);
1133 if (!vrl)
1134 return;
1135 vrl->vsi_id = adapter->vsi.id;
1136 vrl->lut_entries = adapter->rss_lut_size;
1137 memcpy(vrl->lut, adapter->rss_lut, adapter->rss_lut_size);
1138 adapter->current_op = VIRTCHNL_OP_CONFIG_RSS_LUT;
1139 adapter->aq_required &= ~IAVF_FLAG_AQ_SET_RSS_LUT;
1140 iavf_send_pf_msg(adapter, VIRTCHNL_OP_CONFIG_RSS_LUT, (u8 *)vrl, len);
1141 kfree(vrl);
1142}
1143
1144/**
1145 * iavf_set_rss_hfunc
1146 * @adapter: adapter structure
1147 *
1148 * Request the PF to set our RSS Hash function
1149 **/
1150void iavf_set_rss_hfunc(struct iavf_adapter *adapter)
1151{
1152 struct virtchnl_rss_hfunc *vrh;
1153 int len = sizeof(*vrh);
1154
1155 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1156 /* bail because we already have a command pending */
1157 dev_err(&adapter->pdev->dev, "Cannot set RSS Hash function, command %d pending\n",
1158 adapter->current_op);
1159 return;
1160 }
1161 vrh = kzalloc(len, GFP_KERNEL);
1162 if (!vrh)
1163 return;
1164 vrh->vsi_id = adapter->vsi.id;
1165 vrh->rss_algorithm = adapter->hfunc;
1166 adapter->current_op = VIRTCHNL_OP_CONFIG_RSS_HFUNC;
1167 adapter->aq_required &= ~IAVF_FLAG_AQ_SET_RSS_HFUNC;
1168 iavf_send_pf_msg(adapter, VIRTCHNL_OP_CONFIG_RSS_HFUNC, (u8 *)vrh, len);
1169 kfree(vrh);
1170}
1171
1172/**
1173 * iavf_enable_vlan_stripping
1174 * @adapter: adapter structure
1175 *
1176 * Request VLAN header stripping to be enabled
1177 **/
1178void iavf_enable_vlan_stripping(struct iavf_adapter *adapter)
1179{
1180 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1181 /* bail because we already have a command pending */
1182 dev_err(&adapter->pdev->dev, "Cannot enable stripping, command %d pending\n",
1183 adapter->current_op);
1184 return;
1185 }
1186 adapter->current_op = VIRTCHNL_OP_ENABLE_VLAN_STRIPPING;
1187 adapter->aq_required &= ~IAVF_FLAG_AQ_ENABLE_VLAN_STRIPPING;
1188 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ENABLE_VLAN_STRIPPING, NULL, 0);
1189}
1190
1191/**
1192 * iavf_disable_vlan_stripping
1193 * @adapter: adapter structure
1194 *
1195 * Request VLAN header stripping to be disabled
1196 **/
1197void iavf_disable_vlan_stripping(struct iavf_adapter *adapter)
1198{
1199 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1200 /* bail because we already have a command pending */
1201 dev_err(&adapter->pdev->dev, "Cannot disable stripping, command %d pending\n",
1202 adapter->current_op);
1203 return;
1204 }
1205 adapter->current_op = VIRTCHNL_OP_DISABLE_VLAN_STRIPPING;
1206 adapter->aq_required &= ~IAVF_FLAG_AQ_DISABLE_VLAN_STRIPPING;
1207 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DISABLE_VLAN_STRIPPING, NULL, 0);
1208}
1209
1210/**
1211 * iavf_tpid_to_vc_ethertype - transform from VLAN TPID to virtchnl ethertype
1212 * @tpid: VLAN TPID (i.e. 0x8100, 0x88a8, etc.)
1213 */
1214static u32 iavf_tpid_to_vc_ethertype(u16 tpid)
1215{
1216 switch (tpid) {
1217 case ETH_P_8021Q:
1218 return VIRTCHNL_VLAN_ETHERTYPE_8100;
1219 case ETH_P_8021AD:
1220 return VIRTCHNL_VLAN_ETHERTYPE_88A8;
1221 }
1222
1223 return 0;
1224}
1225
1226/**
1227 * iavf_set_vc_offload_ethertype - set virtchnl ethertype for offload message
1228 * @adapter: adapter structure
1229 * @msg: message structure used for updating offloads over virtchnl to update
1230 * @tpid: VLAN TPID (i.e. 0x8100, 0x88a8, etc.)
1231 * @offload_op: opcode used to determine which support structure to check
1232 */
1233static int
1234iavf_set_vc_offload_ethertype(struct iavf_adapter *adapter,
1235 struct virtchnl_vlan_setting *msg, u16 tpid,
1236 enum virtchnl_ops offload_op)
1237{
1238 struct virtchnl_vlan_supported_caps *offload_support;
1239 u16 vc_ethertype = iavf_tpid_to_vc_ethertype(tpid);
1240
1241 /* reference the correct offload support structure */
1242 switch (offload_op) {
1243 case VIRTCHNL_OP_ENABLE_VLAN_STRIPPING_V2:
1244 case VIRTCHNL_OP_DISABLE_VLAN_STRIPPING_V2:
1245 offload_support =
1246 &adapter->vlan_v2_caps.offloads.stripping_support;
1247 break;
1248 case VIRTCHNL_OP_ENABLE_VLAN_INSERTION_V2:
1249 case VIRTCHNL_OP_DISABLE_VLAN_INSERTION_V2:
1250 offload_support =
1251 &adapter->vlan_v2_caps.offloads.insertion_support;
1252 break;
1253 default:
1254 dev_err(&adapter->pdev->dev, "Invalid opcode %d for setting virtchnl ethertype to enable/disable VLAN offloads\n",
1255 offload_op);
1256 return -EINVAL;
1257 }
1258
1259 /* make sure ethertype is supported */
1260 if (offload_support->outer & vc_ethertype &&
1261 offload_support->outer & VIRTCHNL_VLAN_TOGGLE) {
1262 msg->outer_ethertype_setting = vc_ethertype;
1263 } else if (offload_support->inner & vc_ethertype &&
1264 offload_support->inner & VIRTCHNL_VLAN_TOGGLE) {
1265 msg->inner_ethertype_setting = vc_ethertype;
1266 } else {
1267 dev_dbg(&adapter->pdev->dev, "opcode %d unsupported for VLAN TPID 0x%04x\n",
1268 offload_op, tpid);
1269 return -EINVAL;
1270 }
1271
1272 return 0;
1273}
1274
1275/**
1276 * iavf_clear_offload_v2_aq_required - clear AQ required bit for offload request
1277 * @adapter: adapter structure
1278 * @tpid: VLAN TPID
1279 * @offload_op: opcode used to determine which AQ required bit to clear
1280 */
1281static void
1282iavf_clear_offload_v2_aq_required(struct iavf_adapter *adapter, u16 tpid,
1283 enum virtchnl_ops offload_op)
1284{
1285 switch (offload_op) {
1286 case VIRTCHNL_OP_ENABLE_VLAN_STRIPPING_V2:
1287 if (tpid == ETH_P_8021Q)
1288 adapter->aq_required &=
1289 ~IAVF_FLAG_AQ_ENABLE_CTAG_VLAN_STRIPPING;
1290 else if (tpid == ETH_P_8021AD)
1291 adapter->aq_required &=
1292 ~IAVF_FLAG_AQ_ENABLE_STAG_VLAN_STRIPPING;
1293 break;
1294 case VIRTCHNL_OP_DISABLE_VLAN_STRIPPING_V2:
1295 if (tpid == ETH_P_8021Q)
1296 adapter->aq_required &=
1297 ~IAVF_FLAG_AQ_DISABLE_CTAG_VLAN_STRIPPING;
1298 else if (tpid == ETH_P_8021AD)
1299 adapter->aq_required &=
1300 ~IAVF_FLAG_AQ_DISABLE_STAG_VLAN_STRIPPING;
1301 break;
1302 case VIRTCHNL_OP_ENABLE_VLAN_INSERTION_V2:
1303 if (tpid == ETH_P_8021Q)
1304 adapter->aq_required &=
1305 ~IAVF_FLAG_AQ_ENABLE_CTAG_VLAN_INSERTION;
1306 else if (tpid == ETH_P_8021AD)
1307 adapter->aq_required &=
1308 ~IAVF_FLAG_AQ_ENABLE_STAG_VLAN_INSERTION;
1309 break;
1310 case VIRTCHNL_OP_DISABLE_VLAN_INSERTION_V2:
1311 if (tpid == ETH_P_8021Q)
1312 adapter->aq_required &=
1313 ~IAVF_FLAG_AQ_DISABLE_CTAG_VLAN_INSERTION;
1314 else if (tpid == ETH_P_8021AD)
1315 adapter->aq_required &=
1316 ~IAVF_FLAG_AQ_DISABLE_STAG_VLAN_INSERTION;
1317 break;
1318 default:
1319 dev_err(&adapter->pdev->dev, "Unsupported opcode %d specified for clearing aq_required bits for VIRTCHNL_VF_OFFLOAD_VLAN_V2 offload request\n",
1320 offload_op);
1321 }
1322}
1323
1324/**
1325 * iavf_send_vlan_offload_v2 - send offload enable/disable over virtchnl
1326 * @adapter: adapter structure
1327 * @tpid: VLAN TPID used for the command (i.e. 0x8100 or 0x88a8)
1328 * @offload_op: offload_op used to make the request over virtchnl
1329 */
1330static void
1331iavf_send_vlan_offload_v2(struct iavf_adapter *adapter, u16 tpid,
1332 enum virtchnl_ops offload_op)
1333{
1334 struct virtchnl_vlan_setting *msg;
1335 int len = sizeof(*msg);
1336
1337 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1338 /* bail because we already have a command pending */
1339 dev_err(&adapter->pdev->dev, "Cannot send %d, command %d pending\n",
1340 offload_op, adapter->current_op);
1341 return;
1342 }
1343
1344 adapter->current_op = offload_op;
1345
1346 msg = kzalloc(len, GFP_KERNEL);
1347 if (!msg)
1348 return;
1349
1350 msg->vport_id = adapter->vsi_res->vsi_id;
1351
1352 /* always clear to prevent unsupported and endless requests */
1353 iavf_clear_offload_v2_aq_required(adapter, tpid, offload_op);
1354
1355 /* only send valid offload requests */
1356 if (!iavf_set_vc_offload_ethertype(adapter, msg, tpid, offload_op))
1357 iavf_send_pf_msg(adapter, offload_op, (u8 *)msg, len);
1358 else
1359 adapter->current_op = VIRTCHNL_OP_UNKNOWN;
1360
1361 kfree(msg);
1362}
1363
1364/**
1365 * iavf_enable_vlan_stripping_v2 - enable VLAN stripping
1366 * @adapter: adapter structure
1367 * @tpid: VLAN TPID used to enable VLAN stripping
1368 */
1369void iavf_enable_vlan_stripping_v2(struct iavf_adapter *adapter, u16 tpid)
1370{
1371 iavf_send_vlan_offload_v2(adapter, tpid,
1372 VIRTCHNL_OP_ENABLE_VLAN_STRIPPING_V2);
1373}
1374
1375/**
1376 * iavf_disable_vlan_stripping_v2 - disable VLAN stripping
1377 * @adapter: adapter structure
1378 * @tpid: VLAN TPID used to disable VLAN stripping
1379 */
1380void iavf_disable_vlan_stripping_v2(struct iavf_adapter *adapter, u16 tpid)
1381{
1382 iavf_send_vlan_offload_v2(adapter, tpid,
1383 VIRTCHNL_OP_DISABLE_VLAN_STRIPPING_V2);
1384}
1385
1386/**
1387 * iavf_enable_vlan_insertion_v2 - enable VLAN insertion
1388 * @adapter: adapter structure
1389 * @tpid: VLAN TPID used to enable VLAN insertion
1390 */
1391void iavf_enable_vlan_insertion_v2(struct iavf_adapter *adapter, u16 tpid)
1392{
1393 iavf_send_vlan_offload_v2(adapter, tpid,
1394 VIRTCHNL_OP_ENABLE_VLAN_INSERTION_V2);
1395}
1396
1397/**
1398 * iavf_disable_vlan_insertion_v2 - disable VLAN insertion
1399 * @adapter: adapter structure
1400 * @tpid: VLAN TPID used to disable VLAN insertion
1401 */
1402void iavf_disable_vlan_insertion_v2(struct iavf_adapter *adapter, u16 tpid)
1403{
1404 iavf_send_vlan_offload_v2(adapter, tpid,
1405 VIRTCHNL_OP_DISABLE_VLAN_INSERTION_V2);
1406}
1407
1408/**
1409 * iavf_print_link_message - print link up or down
1410 * @adapter: adapter structure
1411 *
1412 * Log a message telling the world of our wonderous link status
1413 */
1414static void iavf_print_link_message(struct iavf_adapter *adapter)
1415{
1416 struct net_device *netdev = adapter->netdev;
1417 int link_speed_mbps;
1418 char *speed;
1419
1420 if (!adapter->link_up) {
1421 netdev_info(netdev, "NIC Link is Down\n");
1422 return;
1423 }
1424
1425 if (ADV_LINK_SUPPORT(adapter)) {
1426 link_speed_mbps = adapter->link_speed_mbps;
1427 goto print_link_msg;
1428 }
1429
1430 switch (adapter->link_speed) {
1431 case VIRTCHNL_LINK_SPEED_40GB:
1432 link_speed_mbps = SPEED_40000;
1433 break;
1434 case VIRTCHNL_LINK_SPEED_25GB:
1435 link_speed_mbps = SPEED_25000;
1436 break;
1437 case VIRTCHNL_LINK_SPEED_20GB:
1438 link_speed_mbps = SPEED_20000;
1439 break;
1440 case VIRTCHNL_LINK_SPEED_10GB:
1441 link_speed_mbps = SPEED_10000;
1442 break;
1443 case VIRTCHNL_LINK_SPEED_5GB:
1444 link_speed_mbps = SPEED_5000;
1445 break;
1446 case VIRTCHNL_LINK_SPEED_2_5GB:
1447 link_speed_mbps = SPEED_2500;
1448 break;
1449 case VIRTCHNL_LINK_SPEED_1GB:
1450 link_speed_mbps = SPEED_1000;
1451 break;
1452 case VIRTCHNL_LINK_SPEED_100MB:
1453 link_speed_mbps = SPEED_100;
1454 break;
1455 default:
1456 link_speed_mbps = SPEED_UNKNOWN;
1457 break;
1458 }
1459
1460print_link_msg:
1461 if (link_speed_mbps > SPEED_1000) {
1462 if (link_speed_mbps == SPEED_2500) {
1463 speed = kasprintf(GFP_KERNEL, "%s", "2.5 Gbps");
1464 } else {
1465 /* convert to Gbps inline */
1466 speed = kasprintf(GFP_KERNEL, "%d Gbps",
1467 link_speed_mbps / 1000);
1468 }
1469 } else if (link_speed_mbps == SPEED_UNKNOWN) {
1470 speed = kasprintf(GFP_KERNEL, "%s", "Unknown Mbps");
1471 } else {
1472 speed = kasprintf(GFP_KERNEL, "%d Mbps", link_speed_mbps);
1473 }
1474
1475 netdev_info(netdev, "NIC Link is Up Speed is %s Full Duplex\n", speed);
1476 kfree(speed);
1477}
1478
1479/**
1480 * iavf_get_vpe_link_status
1481 * @adapter: adapter structure
1482 * @vpe: virtchnl_pf_event structure
1483 *
1484 * Helper function for determining the link status
1485 **/
1486static bool
1487iavf_get_vpe_link_status(struct iavf_adapter *adapter,
1488 struct virtchnl_pf_event *vpe)
1489{
1490 if (ADV_LINK_SUPPORT(adapter))
1491 return vpe->event_data.link_event_adv.link_status;
1492 else
1493 return vpe->event_data.link_event.link_status;
1494}
1495
1496/**
1497 * iavf_set_adapter_link_speed_from_vpe
1498 * @adapter: adapter structure for which we are setting the link speed
1499 * @vpe: virtchnl_pf_event structure that contains the link speed we are setting
1500 *
1501 * Helper function for setting iavf_adapter link speed
1502 **/
1503static void
1504iavf_set_adapter_link_speed_from_vpe(struct iavf_adapter *adapter,
1505 struct virtchnl_pf_event *vpe)
1506{
1507 if (ADV_LINK_SUPPORT(adapter))
1508 adapter->link_speed_mbps =
1509 vpe->event_data.link_event_adv.link_speed;
1510 else
1511 adapter->link_speed = vpe->event_data.link_event.link_speed;
1512}
1513
1514/**
1515 * iavf_enable_channels
1516 * @adapter: adapter structure
1517 *
1518 * Request that the PF enable channels as specified by
1519 * the user via tc tool.
1520 **/
1521void iavf_enable_channels(struct iavf_adapter *adapter)
1522{
1523 struct virtchnl_tc_info *vti = NULL;
1524 size_t len;
1525 int i;
1526
1527 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1528 /* bail because we already have a command pending */
1529 dev_err(&adapter->pdev->dev, "Cannot configure mqprio, command %d pending\n",
1530 adapter->current_op);
1531 return;
1532 }
1533
1534 len = virtchnl_struct_size(vti, list, adapter->num_tc);
1535 vti = kzalloc(len, GFP_KERNEL);
1536 if (!vti)
1537 return;
1538 vti->num_tc = adapter->num_tc;
1539 for (i = 0; i < vti->num_tc; i++) {
1540 vti->list[i].count = adapter->ch_config.ch_info[i].count;
1541 vti->list[i].offset = adapter->ch_config.ch_info[i].offset;
1542 vti->list[i].pad = 0;
1543 vti->list[i].max_tx_rate =
1544 adapter->ch_config.ch_info[i].max_tx_rate;
1545 }
1546
1547 adapter->ch_config.state = __IAVF_TC_RUNNING;
1548 adapter->flags |= IAVF_FLAG_REINIT_ITR_NEEDED;
1549 adapter->current_op = VIRTCHNL_OP_ENABLE_CHANNELS;
1550 adapter->aq_required &= ~IAVF_FLAG_AQ_ENABLE_CHANNELS;
1551 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ENABLE_CHANNELS, (u8 *)vti, len);
1552 kfree(vti);
1553}
1554
1555/**
1556 * iavf_disable_channels
1557 * @adapter: adapter structure
1558 *
1559 * Request that the PF disable channels that are configured
1560 **/
1561void iavf_disable_channels(struct iavf_adapter *adapter)
1562{
1563 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1564 /* bail because we already have a command pending */
1565 dev_err(&adapter->pdev->dev, "Cannot configure mqprio, command %d pending\n",
1566 adapter->current_op);
1567 return;
1568 }
1569
1570 adapter->ch_config.state = __IAVF_TC_INVALID;
1571 adapter->flags |= IAVF_FLAG_REINIT_ITR_NEEDED;
1572 adapter->current_op = VIRTCHNL_OP_DISABLE_CHANNELS;
1573 adapter->aq_required &= ~IAVF_FLAG_AQ_DISABLE_CHANNELS;
1574 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DISABLE_CHANNELS, NULL, 0);
1575}
1576
1577/**
1578 * iavf_print_cloud_filter
1579 * @adapter: adapter structure
1580 * @f: cloud filter to print
1581 *
1582 * Print the cloud filter
1583 **/
1584static void iavf_print_cloud_filter(struct iavf_adapter *adapter,
1585 struct virtchnl_filter *f)
1586{
1587 switch (f->flow_type) {
1588 case VIRTCHNL_TCP_V4_FLOW:
1589 dev_info(&adapter->pdev->dev, "dst_mac: %pM src_mac: %pM vlan_id: %hu dst_ip: %pI4 src_ip %pI4 dst_port %hu src_port %hu\n",
1590 &f->data.tcp_spec.dst_mac,
1591 &f->data.tcp_spec.src_mac,
1592 ntohs(f->data.tcp_spec.vlan_id),
1593 &f->data.tcp_spec.dst_ip[0],
1594 &f->data.tcp_spec.src_ip[0],
1595 ntohs(f->data.tcp_spec.dst_port),
1596 ntohs(f->data.tcp_spec.src_port));
1597 break;
1598 case VIRTCHNL_TCP_V6_FLOW:
1599 dev_info(&adapter->pdev->dev, "dst_mac: %pM src_mac: %pM vlan_id: %hu dst_ip: %pI6 src_ip %pI6 dst_port %hu src_port %hu\n",
1600 &f->data.tcp_spec.dst_mac,
1601 &f->data.tcp_spec.src_mac,
1602 ntohs(f->data.tcp_spec.vlan_id),
1603 &f->data.tcp_spec.dst_ip,
1604 &f->data.tcp_spec.src_ip,
1605 ntohs(f->data.tcp_spec.dst_port),
1606 ntohs(f->data.tcp_spec.src_port));
1607 break;
1608 }
1609}
1610
1611/**
1612 * iavf_add_cloud_filter
1613 * @adapter: adapter structure
1614 *
1615 * Request that the PF add cloud filters as specified
1616 * by the user via tc tool.
1617 **/
1618void iavf_add_cloud_filter(struct iavf_adapter *adapter)
1619{
1620 struct iavf_cloud_filter *cf;
1621 struct virtchnl_filter *f;
1622 int len = 0, count = 0;
1623
1624 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1625 /* bail because we already have a command pending */
1626 dev_err(&adapter->pdev->dev, "Cannot add cloud filter, command %d pending\n",
1627 adapter->current_op);
1628 return;
1629 }
1630 list_for_each_entry(cf, &adapter->cloud_filter_list, list) {
1631 if (cf->add) {
1632 count++;
1633 break;
1634 }
1635 }
1636 if (!count) {
1637 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_CLOUD_FILTER;
1638 return;
1639 }
1640 adapter->current_op = VIRTCHNL_OP_ADD_CLOUD_FILTER;
1641
1642 len = sizeof(struct virtchnl_filter);
1643 f = kzalloc(len, GFP_KERNEL);
1644 if (!f)
1645 return;
1646
1647 list_for_each_entry(cf, &adapter->cloud_filter_list, list) {
1648 if (cf->add) {
1649 memcpy(f, &cf->f, sizeof(struct virtchnl_filter));
1650 cf->add = false;
1651 cf->state = __IAVF_CF_ADD_PENDING;
1652 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ADD_CLOUD_FILTER,
1653 (u8 *)f, len);
1654 }
1655 }
1656 kfree(f);
1657}
1658
1659/**
1660 * iavf_del_cloud_filter
1661 * @adapter: adapter structure
1662 *
1663 * Request that the PF delete cloud filters as specified
1664 * by the user via tc tool.
1665 **/
1666void iavf_del_cloud_filter(struct iavf_adapter *adapter)
1667{
1668 struct iavf_cloud_filter *cf, *cftmp;
1669 struct virtchnl_filter *f;
1670 int len = 0, count = 0;
1671
1672 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1673 /* bail because we already have a command pending */
1674 dev_err(&adapter->pdev->dev, "Cannot remove cloud filter, command %d pending\n",
1675 adapter->current_op);
1676 return;
1677 }
1678 list_for_each_entry(cf, &adapter->cloud_filter_list, list) {
1679 if (cf->del) {
1680 count++;
1681 break;
1682 }
1683 }
1684 if (!count) {
1685 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_CLOUD_FILTER;
1686 return;
1687 }
1688 adapter->current_op = VIRTCHNL_OP_DEL_CLOUD_FILTER;
1689
1690 len = sizeof(struct virtchnl_filter);
1691 f = kzalloc(len, GFP_KERNEL);
1692 if (!f)
1693 return;
1694
1695 list_for_each_entry_safe(cf, cftmp, &adapter->cloud_filter_list, list) {
1696 if (cf->del) {
1697 memcpy(f, &cf->f, sizeof(struct virtchnl_filter));
1698 cf->del = false;
1699 cf->state = __IAVF_CF_DEL_PENDING;
1700 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DEL_CLOUD_FILTER,
1701 (u8 *)f, len);
1702 }
1703 }
1704 kfree(f);
1705}
1706
1707/**
1708 * iavf_add_fdir_filter
1709 * @adapter: the VF adapter structure
1710 *
1711 * Request that the PF add Flow Director filters as specified
1712 * by the user via ethtool.
1713 **/
1714void iavf_add_fdir_filter(struct iavf_adapter *adapter)
1715{
1716 struct iavf_fdir_fltr *fdir;
1717 struct virtchnl_fdir_add *f;
1718 bool process_fltr = false;
1719 int len;
1720
1721 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1722 /* bail because we already have a command pending */
1723 dev_err(&adapter->pdev->dev, "Cannot add Flow Director filter, command %d pending\n",
1724 adapter->current_op);
1725 return;
1726 }
1727
1728 len = sizeof(struct virtchnl_fdir_add);
1729 f = kzalloc(len, GFP_KERNEL);
1730 if (!f)
1731 return;
1732
1733 spin_lock_bh(&adapter->fdir_fltr_lock);
1734 list_for_each_entry(fdir, &adapter->fdir_list_head, list) {
1735 if (fdir->state == IAVF_FDIR_FLTR_ADD_REQUEST) {
1736 process_fltr = true;
1737 fdir->state = IAVF_FDIR_FLTR_ADD_PENDING;
1738 memcpy(f, &fdir->vc_add_msg, len);
1739 break;
1740 }
1741 }
1742 spin_unlock_bh(&adapter->fdir_fltr_lock);
1743
1744 if (!process_fltr) {
1745 /* prevent iavf_add_fdir_filter() from being called when there
1746 * are no filters to add
1747 */
1748 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_FDIR_FILTER;
1749 kfree(f);
1750 return;
1751 }
1752 adapter->current_op = VIRTCHNL_OP_ADD_FDIR_FILTER;
1753 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ADD_FDIR_FILTER, (u8 *)f, len);
1754 kfree(f);
1755}
1756
1757/**
1758 * iavf_del_fdir_filter
1759 * @adapter: the VF adapter structure
1760 *
1761 * Request that the PF delete Flow Director filters as specified
1762 * by the user via ethtool.
1763 **/
1764void iavf_del_fdir_filter(struct iavf_adapter *adapter)
1765{
1766 struct virtchnl_fdir_del f = {};
1767 struct iavf_fdir_fltr *fdir;
1768 bool process_fltr = false;
1769 int len;
1770
1771 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1772 /* bail because we already have a command pending */
1773 dev_err(&adapter->pdev->dev, "Cannot remove Flow Director filter, command %d pending\n",
1774 adapter->current_op);
1775 return;
1776 }
1777
1778 len = sizeof(struct virtchnl_fdir_del);
1779
1780 spin_lock_bh(&adapter->fdir_fltr_lock);
1781 list_for_each_entry(fdir, &adapter->fdir_list_head, list) {
1782 if (fdir->state == IAVF_FDIR_FLTR_DEL_REQUEST) {
1783 process_fltr = true;
1784 f.vsi_id = fdir->vc_add_msg.vsi_id;
1785 f.flow_id = fdir->flow_id;
1786 fdir->state = IAVF_FDIR_FLTR_DEL_PENDING;
1787 break;
1788 } else if (fdir->state == IAVF_FDIR_FLTR_DIS_REQUEST) {
1789 process_fltr = true;
1790 f.vsi_id = fdir->vc_add_msg.vsi_id;
1791 f.flow_id = fdir->flow_id;
1792 fdir->state = IAVF_FDIR_FLTR_DIS_PENDING;
1793 break;
1794 }
1795 }
1796 spin_unlock_bh(&adapter->fdir_fltr_lock);
1797
1798 if (!process_fltr) {
1799 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_FDIR_FILTER;
1800 return;
1801 }
1802
1803 adapter->current_op = VIRTCHNL_OP_DEL_FDIR_FILTER;
1804 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DEL_FDIR_FILTER, (u8 *)&f, len);
1805}
1806
1807/**
1808 * iavf_add_adv_rss_cfg
1809 * @adapter: the VF adapter structure
1810 *
1811 * Request that the PF add RSS configuration as specified
1812 * by the user via ethtool.
1813 **/
1814void iavf_add_adv_rss_cfg(struct iavf_adapter *adapter)
1815{
1816 struct virtchnl_rss_cfg *rss_cfg;
1817 struct iavf_adv_rss *rss;
1818 bool process_rss = false;
1819 int len;
1820
1821 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1822 /* bail because we already have a command pending */
1823 dev_err(&adapter->pdev->dev, "Cannot add RSS configuration, command %d pending\n",
1824 adapter->current_op);
1825 return;
1826 }
1827
1828 len = sizeof(struct virtchnl_rss_cfg);
1829 rss_cfg = kzalloc(len, GFP_KERNEL);
1830 if (!rss_cfg)
1831 return;
1832
1833 spin_lock_bh(&adapter->adv_rss_lock);
1834 list_for_each_entry(rss, &adapter->adv_rss_list_head, list) {
1835 if (rss->state == IAVF_ADV_RSS_ADD_REQUEST) {
1836 process_rss = true;
1837 rss->state = IAVF_ADV_RSS_ADD_PENDING;
1838 memcpy(rss_cfg, &rss->cfg_msg, len);
1839 iavf_print_adv_rss_cfg(adapter, rss,
1840 "Input set change for",
1841 "is pending");
1842 break;
1843 }
1844 }
1845 spin_unlock_bh(&adapter->adv_rss_lock);
1846
1847 if (process_rss) {
1848 adapter->current_op = VIRTCHNL_OP_ADD_RSS_CFG;
1849 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ADD_RSS_CFG,
1850 (u8 *)rss_cfg, len);
1851 } else {
1852 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_ADV_RSS_CFG;
1853 }
1854
1855 kfree(rss_cfg);
1856}
1857
1858/**
1859 * iavf_del_adv_rss_cfg
1860 * @adapter: the VF adapter structure
1861 *
1862 * Request that the PF delete RSS configuration as specified
1863 * by the user via ethtool.
1864 **/
1865void iavf_del_adv_rss_cfg(struct iavf_adapter *adapter)
1866{
1867 struct virtchnl_rss_cfg *rss_cfg;
1868 struct iavf_adv_rss *rss;
1869 bool process_rss = false;
1870 int len;
1871
1872 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1873 /* bail because we already have a command pending */
1874 dev_err(&adapter->pdev->dev, "Cannot remove RSS configuration, command %d pending\n",
1875 adapter->current_op);
1876 return;
1877 }
1878
1879 len = sizeof(struct virtchnl_rss_cfg);
1880 rss_cfg = kzalloc(len, GFP_KERNEL);
1881 if (!rss_cfg)
1882 return;
1883
1884 spin_lock_bh(&adapter->adv_rss_lock);
1885 list_for_each_entry(rss, &adapter->adv_rss_list_head, list) {
1886 if (rss->state == IAVF_ADV_RSS_DEL_REQUEST) {
1887 process_rss = true;
1888 rss->state = IAVF_ADV_RSS_DEL_PENDING;
1889 memcpy(rss_cfg, &rss->cfg_msg, len);
1890 break;
1891 }
1892 }
1893 spin_unlock_bh(&adapter->adv_rss_lock);
1894
1895 if (process_rss) {
1896 adapter->current_op = VIRTCHNL_OP_DEL_RSS_CFG;
1897 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DEL_RSS_CFG,
1898 (u8 *)rss_cfg, len);
1899 } else {
1900 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_ADV_RSS_CFG;
1901 }
1902
1903 kfree(rss_cfg);
1904}
1905
1906/**
1907 * iavf_request_reset
1908 * @adapter: adapter structure
1909 *
1910 * Request that the PF reset this VF. No response is expected.
1911 **/
1912int iavf_request_reset(struct iavf_adapter *adapter)
1913{
1914 int err;
1915 /* Don't check CURRENT_OP - this is always higher priority */
1916 err = iavf_send_pf_msg(adapter, VIRTCHNL_OP_RESET_VF, NULL, 0);
1917 adapter->current_op = VIRTCHNL_OP_UNKNOWN;
1918 return err;
1919}
1920
1921/**
1922 * iavf_netdev_features_vlan_strip_set - update vlan strip status
1923 * @netdev: ptr to netdev being adjusted
1924 * @enable: enable or disable vlan strip
1925 *
1926 * Helper function to change vlan strip status in netdev->features.
1927 */
1928static void iavf_netdev_features_vlan_strip_set(struct net_device *netdev,
1929 const bool enable)
1930{
1931 if (enable)
1932 netdev->features |= NETIF_F_HW_VLAN_CTAG_RX;
1933 else
1934 netdev->features &= ~NETIF_F_HW_VLAN_CTAG_RX;
1935}
1936
1937/**
1938 * iavf_activate_fdir_filters - Reactivate all FDIR filters after a reset
1939 * @adapter: private adapter structure
1940 *
1941 * Called after a reset to re-add all FDIR filters and delete some of them
1942 * if they were pending to be deleted.
1943 */
1944static void iavf_activate_fdir_filters(struct iavf_adapter *adapter)
1945{
1946 struct iavf_fdir_fltr *f, *ftmp;
1947 bool add_filters = false;
1948
1949 spin_lock_bh(&adapter->fdir_fltr_lock);
1950 list_for_each_entry_safe(f, ftmp, &adapter->fdir_list_head, list) {
1951 if (f->state == IAVF_FDIR_FLTR_ADD_REQUEST ||
1952 f->state == IAVF_FDIR_FLTR_ADD_PENDING ||
1953 f->state == IAVF_FDIR_FLTR_ACTIVE) {
1954 /* All filters and requests have been removed in PF,
1955 * restore them
1956 */
1957 f->state = IAVF_FDIR_FLTR_ADD_REQUEST;
1958 add_filters = true;
1959 } else if (f->state == IAVF_FDIR_FLTR_DIS_REQUEST ||
1960 f->state == IAVF_FDIR_FLTR_DIS_PENDING) {
1961 /* Link down state, leave filters as inactive */
1962 f->state = IAVF_FDIR_FLTR_INACTIVE;
1963 } else if (f->state == IAVF_FDIR_FLTR_DEL_REQUEST ||
1964 f->state == IAVF_FDIR_FLTR_DEL_PENDING) {
1965 /* Delete filters that were pending to be deleted, the
1966 * list on PF is already cleared after a reset
1967 */
1968 list_del(&f->list);
1969 kfree(f);
1970 adapter->fdir_active_fltr--;
1971 }
1972 }
1973 spin_unlock_bh(&adapter->fdir_fltr_lock);
1974
1975 if (add_filters)
1976 adapter->aq_required |= IAVF_FLAG_AQ_ADD_FDIR_FILTER;
1977}
1978
1979/**
1980 * iavf_virtchnl_completion
1981 * @adapter: adapter structure
1982 * @v_opcode: opcode sent by PF
1983 * @v_retval: retval sent by PF
1984 * @msg: message sent by PF
1985 * @msglen: message length
1986 *
1987 * Asynchronous completion function for admin queue messages. Rather than busy
1988 * wait, we fire off our requests and assume that no errors will be returned.
1989 * This function handles the reply messages.
1990 **/
1991void iavf_virtchnl_completion(struct iavf_adapter *adapter,
1992 enum virtchnl_ops v_opcode,
1993 enum iavf_status v_retval, u8 *msg, u16 msglen)
1994{
1995 struct net_device *netdev = adapter->netdev;
1996
1997 if (v_opcode == VIRTCHNL_OP_EVENT) {
1998 struct virtchnl_pf_event *vpe =
1999 (struct virtchnl_pf_event *)msg;
2000 bool link_up = iavf_get_vpe_link_status(adapter, vpe);
2001
2002 switch (vpe->event) {
2003 case VIRTCHNL_EVENT_LINK_CHANGE:
2004 iavf_set_adapter_link_speed_from_vpe(adapter, vpe);
2005
2006 /* we've already got the right link status, bail */
2007 if (adapter->link_up == link_up)
2008 break;
2009
2010 if (link_up) {
2011 /* If we get link up message and start queues
2012 * before our queues are configured it will
2013 * trigger a TX hang. In that case, just ignore
2014 * the link status message,we'll get another one
2015 * after we enable queues and actually prepared
2016 * to send traffic.
2017 */
2018 if (adapter->state != __IAVF_RUNNING)
2019 break;
2020
2021 /* For ADq enabled VF, we reconfigure VSIs and
2022 * re-allocate queues. Hence wait till all
2023 * queues are enabled.
2024 */
2025 if (adapter->flags &
2026 IAVF_FLAG_QUEUES_DISABLED)
2027 break;
2028 }
2029
2030 adapter->link_up = link_up;
2031 if (link_up) {
2032 netif_tx_start_all_queues(netdev);
2033 netif_carrier_on(netdev);
2034 } else {
2035 netif_tx_stop_all_queues(netdev);
2036 netif_carrier_off(netdev);
2037 }
2038 iavf_print_link_message(adapter);
2039 break;
2040 case VIRTCHNL_EVENT_RESET_IMPENDING:
2041 dev_info(&adapter->pdev->dev, "Reset indication received from the PF\n");
2042 if (!(adapter->flags & IAVF_FLAG_RESET_PENDING)) {
2043 dev_info(&adapter->pdev->dev, "Scheduling reset task\n");
2044 iavf_schedule_reset(adapter, IAVF_FLAG_RESET_PENDING);
2045 }
2046 break;
2047 default:
2048 dev_err(&adapter->pdev->dev, "Unknown event %d from PF\n",
2049 vpe->event);
2050 break;
2051 }
2052 return;
2053 }
2054 if (v_retval) {
2055 switch (v_opcode) {
2056 case VIRTCHNL_OP_ADD_VLAN:
2057 dev_err(&adapter->pdev->dev, "Failed to add VLAN filter, error %s\n",
2058 iavf_stat_str(&adapter->hw, v_retval));
2059 break;
2060 case VIRTCHNL_OP_ADD_ETH_ADDR:
2061 dev_err(&adapter->pdev->dev, "Failed to add MAC filter, error %s\n",
2062 iavf_stat_str(&adapter->hw, v_retval));
2063 iavf_mac_add_reject(adapter);
2064 /* restore administratively set MAC address */
2065 ether_addr_copy(adapter->hw.mac.addr, netdev->dev_addr);
2066 wake_up(&adapter->vc_waitqueue);
2067 break;
2068 case VIRTCHNL_OP_DEL_VLAN:
2069 dev_err(&adapter->pdev->dev, "Failed to delete VLAN filter, error %s\n",
2070 iavf_stat_str(&adapter->hw, v_retval));
2071 break;
2072 case VIRTCHNL_OP_DEL_ETH_ADDR:
2073 dev_err(&adapter->pdev->dev, "Failed to delete MAC filter, error %s\n",
2074 iavf_stat_str(&adapter->hw, v_retval));
2075 break;
2076 case VIRTCHNL_OP_ENABLE_CHANNELS:
2077 dev_err(&adapter->pdev->dev, "Failed to configure queue channels, error %s\n",
2078 iavf_stat_str(&adapter->hw, v_retval));
2079 adapter->flags &= ~IAVF_FLAG_REINIT_ITR_NEEDED;
2080 adapter->ch_config.state = __IAVF_TC_INVALID;
2081 netdev_reset_tc(netdev);
2082 netif_tx_start_all_queues(netdev);
2083 break;
2084 case VIRTCHNL_OP_DISABLE_CHANNELS:
2085 dev_err(&adapter->pdev->dev, "Failed to disable queue channels, error %s\n",
2086 iavf_stat_str(&adapter->hw, v_retval));
2087 adapter->flags &= ~IAVF_FLAG_REINIT_ITR_NEEDED;
2088 adapter->ch_config.state = __IAVF_TC_RUNNING;
2089 netif_tx_start_all_queues(netdev);
2090 break;
2091 case VIRTCHNL_OP_ADD_CLOUD_FILTER: {
2092 struct iavf_cloud_filter *cf, *cftmp;
2093
2094 list_for_each_entry_safe(cf, cftmp,
2095 &adapter->cloud_filter_list,
2096 list) {
2097 if (cf->state == __IAVF_CF_ADD_PENDING) {
2098 cf->state = __IAVF_CF_INVALID;
2099 dev_info(&adapter->pdev->dev, "Failed to add cloud filter, error %s\n",
2100 iavf_stat_str(&adapter->hw,
2101 v_retval));
2102 iavf_print_cloud_filter(adapter,
2103 &cf->f);
2104 list_del(&cf->list);
2105 kfree(cf);
2106 adapter->num_cloud_filters--;
2107 }
2108 }
2109 }
2110 break;
2111 case VIRTCHNL_OP_DEL_CLOUD_FILTER: {
2112 struct iavf_cloud_filter *cf;
2113
2114 list_for_each_entry(cf, &adapter->cloud_filter_list,
2115 list) {
2116 if (cf->state == __IAVF_CF_DEL_PENDING) {
2117 cf->state = __IAVF_CF_ACTIVE;
2118 dev_info(&adapter->pdev->dev, "Failed to del cloud filter, error %s\n",
2119 iavf_stat_str(&adapter->hw,
2120 v_retval));
2121 iavf_print_cloud_filter(adapter,
2122 &cf->f);
2123 }
2124 }
2125 }
2126 break;
2127 case VIRTCHNL_OP_ADD_FDIR_FILTER: {
2128 struct iavf_fdir_fltr *fdir, *fdir_tmp;
2129
2130 spin_lock_bh(&adapter->fdir_fltr_lock);
2131 list_for_each_entry_safe(fdir, fdir_tmp,
2132 &adapter->fdir_list_head,
2133 list) {
2134 if (fdir->state == IAVF_FDIR_FLTR_ADD_PENDING) {
2135 dev_info(&adapter->pdev->dev, "Failed to add Flow Director filter, error %s\n",
2136 iavf_stat_str(&adapter->hw,
2137 v_retval));
2138 iavf_print_fdir_fltr(adapter, fdir);
2139 if (msglen)
2140 dev_err(&adapter->pdev->dev,
2141 "%s\n", msg);
2142 list_del(&fdir->list);
2143 kfree(fdir);
2144 adapter->fdir_active_fltr--;
2145 }
2146 }
2147 spin_unlock_bh(&adapter->fdir_fltr_lock);
2148 }
2149 break;
2150 case VIRTCHNL_OP_DEL_FDIR_FILTER: {
2151 struct iavf_fdir_fltr *fdir;
2152
2153 spin_lock_bh(&adapter->fdir_fltr_lock);
2154 list_for_each_entry(fdir, &adapter->fdir_list_head,
2155 list) {
2156 if (fdir->state == IAVF_FDIR_FLTR_DEL_PENDING ||
2157 fdir->state == IAVF_FDIR_FLTR_DIS_PENDING) {
2158 fdir->state = IAVF_FDIR_FLTR_ACTIVE;
2159 dev_info(&adapter->pdev->dev, "Failed to del Flow Director filter, error %s\n",
2160 iavf_stat_str(&adapter->hw,
2161 v_retval));
2162 iavf_print_fdir_fltr(adapter, fdir);
2163 }
2164 }
2165 spin_unlock_bh(&adapter->fdir_fltr_lock);
2166 }
2167 break;
2168 case VIRTCHNL_OP_ADD_RSS_CFG: {
2169 struct iavf_adv_rss *rss, *rss_tmp;
2170
2171 spin_lock_bh(&adapter->adv_rss_lock);
2172 list_for_each_entry_safe(rss, rss_tmp,
2173 &adapter->adv_rss_list_head,
2174 list) {
2175 if (rss->state == IAVF_ADV_RSS_ADD_PENDING) {
2176 iavf_print_adv_rss_cfg(adapter, rss,
2177 "Failed to change the input set for",
2178 NULL);
2179 list_del(&rss->list);
2180 kfree(rss);
2181 }
2182 }
2183 spin_unlock_bh(&adapter->adv_rss_lock);
2184 }
2185 break;
2186 case VIRTCHNL_OP_DEL_RSS_CFG: {
2187 struct iavf_adv_rss *rss;
2188
2189 spin_lock_bh(&adapter->adv_rss_lock);
2190 list_for_each_entry(rss, &adapter->adv_rss_list_head,
2191 list) {
2192 if (rss->state == IAVF_ADV_RSS_DEL_PENDING) {
2193 rss->state = IAVF_ADV_RSS_ACTIVE;
2194 dev_err(&adapter->pdev->dev, "Failed to delete RSS configuration, error %s\n",
2195 iavf_stat_str(&adapter->hw,
2196 v_retval));
2197 }
2198 }
2199 spin_unlock_bh(&adapter->adv_rss_lock);
2200 }
2201 break;
2202 case VIRTCHNL_OP_ENABLE_VLAN_STRIPPING:
2203 dev_warn(&adapter->pdev->dev, "Changing VLAN Stripping is not allowed when Port VLAN is configured\n");
2204 /* Vlan stripping could not be enabled by ethtool.
2205 * Disable it in netdev->features.
2206 */
2207 iavf_netdev_features_vlan_strip_set(netdev, false);
2208 break;
2209 case VIRTCHNL_OP_DISABLE_VLAN_STRIPPING:
2210 dev_warn(&adapter->pdev->dev, "Changing VLAN Stripping is not allowed when Port VLAN is configured\n");
2211 /* Vlan stripping could not be disabled by ethtool.
2212 * Enable it in netdev->features.
2213 */
2214 iavf_netdev_features_vlan_strip_set(netdev, true);
2215 break;
2216 case VIRTCHNL_OP_ADD_VLAN_V2:
2217 iavf_vlan_add_reject(adapter);
2218 dev_warn(&adapter->pdev->dev, "Failed to add VLAN filter, error %s\n",
2219 iavf_stat_str(&adapter->hw, v_retval));
2220 break;
2221 case VIRTCHNL_OP_CONFIG_RSS_HFUNC:
2222 dev_warn(&adapter->pdev->dev, "Failed to configure hash function, error %s\n",
2223 iavf_stat_str(&adapter->hw, v_retval));
2224
2225 if (adapter->hfunc ==
2226 VIRTCHNL_RSS_ALG_TOEPLITZ_SYMMETRIC)
2227 adapter->hfunc =
2228 VIRTCHNL_RSS_ALG_TOEPLITZ_ASYMMETRIC;
2229 else
2230 adapter->hfunc =
2231 VIRTCHNL_RSS_ALG_TOEPLITZ_SYMMETRIC;
2232
2233 break;
2234 default:
2235 dev_err(&adapter->pdev->dev, "PF returned error %d (%s) to our request %d\n",
2236 v_retval, iavf_stat_str(&adapter->hw, v_retval),
2237 v_opcode);
2238 }
2239 }
2240 switch (v_opcode) {
2241 case VIRTCHNL_OP_ADD_ETH_ADDR:
2242 if (!v_retval)
2243 iavf_mac_add_ok(adapter);
2244 if (!ether_addr_equal(netdev->dev_addr, adapter->hw.mac.addr))
2245 if (!ether_addr_equal(netdev->dev_addr,
2246 adapter->hw.mac.addr)) {
2247 netif_addr_lock_bh(netdev);
2248 eth_hw_addr_set(netdev, adapter->hw.mac.addr);
2249 netif_addr_unlock_bh(netdev);
2250 }
2251 wake_up(&adapter->vc_waitqueue);
2252 break;
2253 case VIRTCHNL_OP_GET_STATS: {
2254 struct iavf_eth_stats *stats =
2255 (struct iavf_eth_stats *)msg;
2256 netdev->stats.rx_packets = stats->rx_unicast +
2257 stats->rx_multicast +
2258 stats->rx_broadcast;
2259 netdev->stats.tx_packets = stats->tx_unicast +
2260 stats->tx_multicast +
2261 stats->tx_broadcast;
2262 netdev->stats.rx_bytes = stats->rx_bytes;
2263 netdev->stats.tx_bytes = stats->tx_bytes;
2264 netdev->stats.tx_errors = stats->tx_errors;
2265 netdev->stats.rx_dropped = stats->rx_discards;
2266 netdev->stats.tx_dropped = stats->tx_discards;
2267 adapter->current_stats = *stats;
2268 }
2269 break;
2270 case VIRTCHNL_OP_GET_VF_RESOURCES: {
2271 u16 len = IAVF_VIRTCHNL_VF_RESOURCE_SIZE;
2272
2273 memcpy(adapter->vf_res, msg, min(msglen, len));
2274 iavf_validate_num_queues(adapter);
2275 iavf_vf_parse_hw_config(&adapter->hw, adapter->vf_res);
2276 if (is_zero_ether_addr(adapter->hw.mac.addr)) {
2277 /* restore current mac address */
2278 ether_addr_copy(adapter->hw.mac.addr, netdev->dev_addr);
2279 } else {
2280 netif_addr_lock_bh(netdev);
2281 /* refresh current mac address if changed */
2282 ether_addr_copy(netdev->perm_addr,
2283 adapter->hw.mac.addr);
2284 netif_addr_unlock_bh(netdev);
2285 }
2286 spin_lock_bh(&adapter->mac_vlan_list_lock);
2287 iavf_add_filter(adapter, adapter->hw.mac.addr);
2288
2289 if (VLAN_ALLOWED(adapter)) {
2290 if (!list_empty(&adapter->vlan_filter_list)) {
2291 struct iavf_vlan_filter *vlf;
2292
2293 /* re-add all VLAN filters over virtchnl */
2294 list_for_each_entry(vlf,
2295 &adapter->vlan_filter_list,
2296 list)
2297 vlf->state = IAVF_VLAN_ADD;
2298
2299 adapter->aq_required |=
2300 IAVF_FLAG_AQ_ADD_VLAN_FILTER;
2301 }
2302 }
2303
2304 spin_unlock_bh(&adapter->mac_vlan_list_lock);
2305
2306 iavf_activate_fdir_filters(adapter);
2307
2308 iavf_parse_vf_resource_msg(adapter);
2309
2310 /* negotiated VIRTCHNL_VF_OFFLOAD_VLAN_V2, so wait for the
2311 * response to VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS to finish
2312 * configuration
2313 */
2314 if (VLAN_V2_ALLOWED(adapter))
2315 break;
2316 /* fallthrough and finish config if VIRTCHNL_VF_OFFLOAD_VLAN_V2
2317 * wasn't successfully negotiated with the PF
2318 */
2319 }
2320 fallthrough;
2321 case VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS: {
2322 struct iavf_mac_filter *f;
2323 bool was_mac_changed;
2324 u64 aq_required = 0;
2325
2326 if (v_opcode == VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS)
2327 memcpy(&adapter->vlan_v2_caps, msg,
2328 min_t(u16, msglen,
2329 sizeof(adapter->vlan_v2_caps)));
2330
2331 iavf_process_config(adapter);
2332 adapter->flags |= IAVF_FLAG_SETUP_NETDEV_FEATURES;
2333 iavf_schedule_finish_config(adapter);
2334
2335 iavf_set_queue_vlan_tag_loc(adapter);
2336
2337 was_mac_changed = !ether_addr_equal(netdev->dev_addr,
2338 adapter->hw.mac.addr);
2339
2340 spin_lock_bh(&adapter->mac_vlan_list_lock);
2341
2342 /* re-add all MAC filters */
2343 list_for_each_entry(f, &adapter->mac_filter_list, list) {
2344 if (was_mac_changed &&
2345 ether_addr_equal(netdev->dev_addr, f->macaddr))
2346 ether_addr_copy(f->macaddr,
2347 adapter->hw.mac.addr);
2348
2349 f->is_new_mac = true;
2350 f->add = true;
2351 f->add_handled = false;
2352 f->remove = false;
2353 }
2354
2355 /* re-add all VLAN filters */
2356 if (VLAN_FILTERING_ALLOWED(adapter)) {
2357 struct iavf_vlan_filter *vlf;
2358
2359 if (!list_empty(&adapter->vlan_filter_list)) {
2360 list_for_each_entry(vlf,
2361 &adapter->vlan_filter_list,
2362 list)
2363 vlf->state = IAVF_VLAN_ADD;
2364
2365 aq_required |= IAVF_FLAG_AQ_ADD_VLAN_FILTER;
2366 }
2367 }
2368
2369 spin_unlock_bh(&adapter->mac_vlan_list_lock);
2370
2371 netif_addr_lock_bh(netdev);
2372 eth_hw_addr_set(netdev, adapter->hw.mac.addr);
2373 netif_addr_unlock_bh(netdev);
2374
2375 adapter->aq_required |= IAVF_FLAG_AQ_ADD_MAC_FILTER |
2376 aq_required;
2377 }
2378 break;
2379 case VIRTCHNL_OP_ENABLE_QUEUES:
2380 /* enable transmits */
2381 iavf_irq_enable(adapter, true);
2382 wake_up(&adapter->reset_waitqueue);
2383 adapter->flags &= ~IAVF_FLAG_QUEUES_DISABLED;
2384 break;
2385 case VIRTCHNL_OP_DISABLE_QUEUES:
2386 iavf_free_all_tx_resources(adapter);
2387 iavf_free_all_rx_resources(adapter);
2388 if (adapter->state == __IAVF_DOWN_PENDING) {
2389 iavf_change_state(adapter, __IAVF_DOWN);
2390 wake_up(&adapter->down_waitqueue);
2391 }
2392 break;
2393 case VIRTCHNL_OP_VERSION:
2394 case VIRTCHNL_OP_CONFIG_IRQ_MAP:
2395 /* Don't display an error if we get these out of sequence.
2396 * If the firmware needed to get kicked, we'll get these and
2397 * it's no problem.
2398 */
2399 if (v_opcode != adapter->current_op)
2400 return;
2401 break;
2402 case VIRTCHNL_OP_GET_RSS_HENA_CAPS: {
2403 struct virtchnl_rss_hena *vrh = (struct virtchnl_rss_hena *)msg;
2404
2405 if (msglen == sizeof(*vrh))
2406 adapter->hena = vrh->hena;
2407 else
2408 dev_warn(&adapter->pdev->dev,
2409 "Invalid message %d from PF\n", v_opcode);
2410 }
2411 break;
2412 case VIRTCHNL_OP_REQUEST_QUEUES: {
2413 struct virtchnl_vf_res_request *vfres =
2414 (struct virtchnl_vf_res_request *)msg;
2415
2416 if (vfres->num_queue_pairs != adapter->num_req_queues) {
2417 dev_info(&adapter->pdev->dev,
2418 "Requested %d queues, PF can support %d\n",
2419 adapter->num_req_queues,
2420 vfres->num_queue_pairs);
2421 adapter->num_req_queues = 0;
2422 adapter->flags &= ~IAVF_FLAG_REINIT_ITR_NEEDED;
2423 }
2424 }
2425 break;
2426 case VIRTCHNL_OP_ADD_CLOUD_FILTER: {
2427 struct iavf_cloud_filter *cf;
2428
2429 list_for_each_entry(cf, &adapter->cloud_filter_list, list) {
2430 if (cf->state == __IAVF_CF_ADD_PENDING)
2431 cf->state = __IAVF_CF_ACTIVE;
2432 }
2433 }
2434 break;
2435 case VIRTCHNL_OP_DEL_CLOUD_FILTER: {
2436 struct iavf_cloud_filter *cf, *cftmp;
2437
2438 list_for_each_entry_safe(cf, cftmp, &adapter->cloud_filter_list,
2439 list) {
2440 if (cf->state == __IAVF_CF_DEL_PENDING) {
2441 cf->state = __IAVF_CF_INVALID;
2442 list_del(&cf->list);
2443 kfree(cf);
2444 adapter->num_cloud_filters--;
2445 }
2446 }
2447 }
2448 break;
2449 case VIRTCHNL_OP_ADD_FDIR_FILTER: {
2450 struct virtchnl_fdir_add *add_fltr = (struct virtchnl_fdir_add *)msg;
2451 struct iavf_fdir_fltr *fdir, *fdir_tmp;
2452
2453 spin_lock_bh(&adapter->fdir_fltr_lock);
2454 list_for_each_entry_safe(fdir, fdir_tmp,
2455 &adapter->fdir_list_head,
2456 list) {
2457 if (fdir->state == IAVF_FDIR_FLTR_ADD_PENDING) {
2458 if (add_fltr->status == VIRTCHNL_FDIR_SUCCESS) {
2459 dev_info(&adapter->pdev->dev, "Flow Director filter with location %u is added\n",
2460 fdir->loc);
2461 fdir->state = IAVF_FDIR_FLTR_ACTIVE;
2462 fdir->flow_id = add_fltr->flow_id;
2463 } else {
2464 dev_info(&adapter->pdev->dev, "Failed to add Flow Director filter with status: %d\n",
2465 add_fltr->status);
2466 iavf_print_fdir_fltr(adapter, fdir);
2467 list_del(&fdir->list);
2468 kfree(fdir);
2469 adapter->fdir_active_fltr--;
2470 }
2471 }
2472 }
2473 spin_unlock_bh(&adapter->fdir_fltr_lock);
2474 }
2475 break;
2476 case VIRTCHNL_OP_DEL_FDIR_FILTER: {
2477 struct virtchnl_fdir_del *del_fltr = (struct virtchnl_fdir_del *)msg;
2478 struct iavf_fdir_fltr *fdir, *fdir_tmp;
2479
2480 spin_lock_bh(&adapter->fdir_fltr_lock);
2481 list_for_each_entry_safe(fdir, fdir_tmp, &adapter->fdir_list_head,
2482 list) {
2483 if (fdir->state == IAVF_FDIR_FLTR_DEL_PENDING) {
2484 if (del_fltr->status == VIRTCHNL_FDIR_SUCCESS ||
2485 del_fltr->status ==
2486 VIRTCHNL_FDIR_FAILURE_RULE_NONEXIST) {
2487 dev_info(&adapter->pdev->dev, "Flow Director filter with location %u is deleted\n",
2488 fdir->loc);
2489 list_del(&fdir->list);
2490 kfree(fdir);
2491 adapter->fdir_active_fltr--;
2492 } else {
2493 fdir->state = IAVF_FDIR_FLTR_ACTIVE;
2494 dev_info(&adapter->pdev->dev, "Failed to delete Flow Director filter with status: %d\n",
2495 del_fltr->status);
2496 iavf_print_fdir_fltr(adapter, fdir);
2497 }
2498 } else if (fdir->state == IAVF_FDIR_FLTR_DIS_PENDING) {
2499 if (del_fltr->status == VIRTCHNL_FDIR_SUCCESS ||
2500 del_fltr->status ==
2501 VIRTCHNL_FDIR_FAILURE_RULE_NONEXIST) {
2502 fdir->state = IAVF_FDIR_FLTR_INACTIVE;
2503 } else {
2504 fdir->state = IAVF_FDIR_FLTR_ACTIVE;
2505 dev_info(&adapter->pdev->dev, "Failed to disable Flow Director filter with status: %d\n",
2506 del_fltr->status);
2507 iavf_print_fdir_fltr(adapter, fdir);
2508 }
2509 }
2510 }
2511 spin_unlock_bh(&adapter->fdir_fltr_lock);
2512 }
2513 break;
2514 case VIRTCHNL_OP_ADD_RSS_CFG: {
2515 struct iavf_adv_rss *rss;
2516
2517 spin_lock_bh(&adapter->adv_rss_lock);
2518 list_for_each_entry(rss, &adapter->adv_rss_list_head, list) {
2519 if (rss->state == IAVF_ADV_RSS_ADD_PENDING) {
2520 iavf_print_adv_rss_cfg(adapter, rss,
2521 "Input set change for",
2522 "successful");
2523 rss->state = IAVF_ADV_RSS_ACTIVE;
2524 }
2525 }
2526 spin_unlock_bh(&adapter->adv_rss_lock);
2527 }
2528 break;
2529 case VIRTCHNL_OP_DEL_RSS_CFG: {
2530 struct iavf_adv_rss *rss, *rss_tmp;
2531
2532 spin_lock_bh(&adapter->adv_rss_lock);
2533 list_for_each_entry_safe(rss, rss_tmp,
2534 &adapter->adv_rss_list_head, list) {
2535 if (rss->state == IAVF_ADV_RSS_DEL_PENDING) {
2536 list_del(&rss->list);
2537 kfree(rss);
2538 }
2539 }
2540 spin_unlock_bh(&adapter->adv_rss_lock);
2541 }
2542 break;
2543 case VIRTCHNL_OP_ADD_VLAN_V2: {
2544 struct iavf_vlan_filter *f;
2545
2546 spin_lock_bh(&adapter->mac_vlan_list_lock);
2547 list_for_each_entry(f, &adapter->vlan_filter_list, list) {
2548 if (f->state == IAVF_VLAN_IS_NEW)
2549 f->state = IAVF_VLAN_ACTIVE;
2550 }
2551 spin_unlock_bh(&adapter->mac_vlan_list_lock);
2552 }
2553 break;
2554 case VIRTCHNL_OP_ENABLE_VLAN_STRIPPING:
2555 /* PF enabled vlan strip on this VF.
2556 * Update netdev->features if needed to be in sync with ethtool.
2557 */
2558 if (!v_retval)
2559 iavf_netdev_features_vlan_strip_set(netdev, true);
2560 break;
2561 case VIRTCHNL_OP_DISABLE_VLAN_STRIPPING:
2562 /* PF disabled vlan strip on this VF.
2563 * Update netdev->features if needed to be in sync with ethtool.
2564 */
2565 if (!v_retval)
2566 iavf_netdev_features_vlan_strip_set(netdev, false);
2567 break;
2568 default:
2569 if (adapter->current_op && (v_opcode != adapter->current_op))
2570 dev_warn(&adapter->pdev->dev, "Expected response %d from PF, received %d\n",
2571 adapter->current_op, v_opcode);
2572 break;
2573 } /* switch v_opcode */
2574 adapter->current_op = VIRTCHNL_OP_UNKNOWN;
2575}
1// SPDX-License-Identifier: GPL-2.0
2/* Copyright(c) 2013 - 2018 Intel Corporation. */
3
4#include <linux/net/intel/libie/rx.h>
5
6#include "iavf.h"
7#include "iavf_prototype.h"
8
9/**
10 * iavf_send_pf_msg
11 * @adapter: adapter structure
12 * @op: virtual channel opcode
13 * @msg: pointer to message buffer
14 * @len: message length
15 *
16 * Send message to PF and print status if failure.
17 **/
18static int iavf_send_pf_msg(struct iavf_adapter *adapter,
19 enum virtchnl_ops op, u8 *msg, u16 len)
20{
21 struct iavf_hw *hw = &adapter->hw;
22 enum iavf_status status;
23
24 if (adapter->flags & IAVF_FLAG_PF_COMMS_FAILED)
25 return 0; /* nothing to see here, move along */
26
27 status = iavf_aq_send_msg_to_pf(hw, op, 0, msg, len, NULL);
28 if (status)
29 dev_dbg(&adapter->pdev->dev, "Unable to send opcode %d to PF, status %s, aq_err %s\n",
30 op, iavf_stat_str(hw, status),
31 iavf_aq_str(hw, hw->aq.asq_last_status));
32 return iavf_status_to_errno(status);
33}
34
35/**
36 * iavf_send_api_ver
37 * @adapter: adapter structure
38 *
39 * Send API version admin queue message to the PF. The reply is not checked
40 * in this function. Returns 0 if the message was successfully
41 * sent, or one of the IAVF_ADMIN_QUEUE_ERROR_ statuses if not.
42 **/
43int iavf_send_api_ver(struct iavf_adapter *adapter)
44{
45 struct virtchnl_version_info vvi;
46
47 vvi.major = VIRTCHNL_VERSION_MAJOR;
48 vvi.minor = VIRTCHNL_VERSION_MINOR;
49
50 return iavf_send_pf_msg(adapter, VIRTCHNL_OP_VERSION, (u8 *)&vvi,
51 sizeof(vvi));
52}
53
54/**
55 * iavf_poll_virtchnl_msg
56 * @hw: HW configuration structure
57 * @event: event to populate on success
58 * @op_to_poll: requested virtchnl op to poll for
59 *
60 * Initialize poll for virtchnl msg matching the requested_op. Returns 0
61 * if a message of the correct opcode is in the queue or an error code
62 * if no message matching the op code is waiting and other failures.
63 */
64static int
65iavf_poll_virtchnl_msg(struct iavf_hw *hw, struct iavf_arq_event_info *event,
66 enum virtchnl_ops op_to_poll)
67{
68 enum virtchnl_ops received_op;
69 enum iavf_status status;
70 u32 v_retval;
71
72 while (1) {
73 /* When the AQ is empty, iavf_clean_arq_element will return
74 * nonzero and this loop will terminate.
75 */
76 status = iavf_clean_arq_element(hw, event, NULL);
77 if (status != IAVF_SUCCESS)
78 return iavf_status_to_errno(status);
79 received_op =
80 (enum virtchnl_ops)le32_to_cpu(event->desc.cookie_high);
81 if (op_to_poll == received_op)
82 break;
83 }
84
85 v_retval = le32_to_cpu(event->desc.cookie_low);
86 return virtchnl_status_to_errno((enum virtchnl_status_code)v_retval);
87}
88
89/**
90 * iavf_verify_api_ver
91 * @adapter: adapter structure
92 *
93 * Compare API versions with the PF. Must be called after admin queue is
94 * initialized. Returns 0 if API versions match, -EIO if they do not,
95 * IAVF_ERR_ADMIN_QUEUE_NO_WORK if the admin queue is empty, and any errors
96 * from the firmware are propagated.
97 **/
98int iavf_verify_api_ver(struct iavf_adapter *adapter)
99{
100 struct iavf_arq_event_info event;
101 int err;
102
103 event.buf_len = IAVF_MAX_AQ_BUF_SIZE;
104 event.msg_buf = kzalloc(IAVF_MAX_AQ_BUF_SIZE, GFP_KERNEL);
105 if (!event.msg_buf)
106 return -ENOMEM;
107
108 err = iavf_poll_virtchnl_msg(&adapter->hw, &event, VIRTCHNL_OP_VERSION);
109 if (!err) {
110 struct virtchnl_version_info *pf_vvi =
111 (struct virtchnl_version_info *)event.msg_buf;
112 adapter->pf_version = *pf_vvi;
113
114 if (pf_vvi->major > VIRTCHNL_VERSION_MAJOR ||
115 (pf_vvi->major == VIRTCHNL_VERSION_MAJOR &&
116 pf_vvi->minor > VIRTCHNL_VERSION_MINOR))
117 err = -EIO;
118 }
119
120 kfree(event.msg_buf);
121
122 return err;
123}
124
125/**
126 * iavf_send_vf_config_msg
127 * @adapter: adapter structure
128 *
129 * Send VF configuration request admin queue message to the PF. The reply
130 * is not checked in this function. Returns 0 if the message was
131 * successfully sent, or one of the IAVF_ADMIN_QUEUE_ERROR_ statuses if not.
132 **/
133int iavf_send_vf_config_msg(struct iavf_adapter *adapter)
134{
135 u32 caps;
136
137 caps = VIRTCHNL_VF_OFFLOAD_L2 |
138 VIRTCHNL_VF_OFFLOAD_RSS_PF |
139 VIRTCHNL_VF_OFFLOAD_RSS_AQ |
140 VIRTCHNL_VF_OFFLOAD_RSS_REG |
141 VIRTCHNL_VF_OFFLOAD_VLAN |
142 VIRTCHNL_VF_OFFLOAD_WB_ON_ITR |
143 VIRTCHNL_VF_OFFLOAD_RSS_PCTYPE_V2 |
144 VIRTCHNL_VF_OFFLOAD_ENCAP |
145 VIRTCHNL_VF_OFFLOAD_TC_U32 |
146 VIRTCHNL_VF_OFFLOAD_VLAN_V2 |
147 VIRTCHNL_VF_OFFLOAD_CRC |
148 VIRTCHNL_VF_OFFLOAD_ENCAP_CSUM |
149 VIRTCHNL_VF_OFFLOAD_REQ_QUEUES |
150 VIRTCHNL_VF_OFFLOAD_ADQ |
151 VIRTCHNL_VF_OFFLOAD_USO |
152 VIRTCHNL_VF_OFFLOAD_FDIR_PF |
153 VIRTCHNL_VF_OFFLOAD_ADV_RSS_PF |
154 VIRTCHNL_VF_CAP_ADV_LINK_SPEED |
155 VIRTCHNL_VF_OFFLOAD_QOS;
156
157 adapter->current_op = VIRTCHNL_OP_GET_VF_RESOURCES;
158 adapter->aq_required &= ~IAVF_FLAG_AQ_GET_CONFIG;
159 if (PF_IS_V11(adapter))
160 return iavf_send_pf_msg(adapter, VIRTCHNL_OP_GET_VF_RESOURCES,
161 (u8 *)&caps, sizeof(caps));
162 else
163 return iavf_send_pf_msg(adapter, VIRTCHNL_OP_GET_VF_RESOURCES,
164 NULL, 0);
165}
166
167int iavf_send_vf_offload_vlan_v2_msg(struct iavf_adapter *adapter)
168{
169 adapter->aq_required &= ~IAVF_FLAG_AQ_GET_OFFLOAD_VLAN_V2_CAPS;
170
171 if (!VLAN_V2_ALLOWED(adapter))
172 return -EOPNOTSUPP;
173
174 adapter->current_op = VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS;
175
176 return iavf_send_pf_msg(adapter, VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS,
177 NULL, 0);
178}
179
180/**
181 * iavf_validate_num_queues
182 * @adapter: adapter structure
183 *
184 * Validate that the number of queues the PF has sent in
185 * VIRTCHNL_OP_GET_VF_RESOURCES is not larger than the VF can handle.
186 **/
187static void iavf_validate_num_queues(struct iavf_adapter *adapter)
188{
189 if (adapter->vf_res->num_queue_pairs > IAVF_MAX_REQ_QUEUES) {
190 struct virtchnl_vsi_resource *vsi_res;
191 int i;
192
193 dev_info(&adapter->pdev->dev, "Received %d queues, but can only have a max of %d\n",
194 adapter->vf_res->num_queue_pairs,
195 IAVF_MAX_REQ_QUEUES);
196 dev_info(&adapter->pdev->dev, "Fixing by reducing queues to %d\n",
197 IAVF_MAX_REQ_QUEUES);
198 adapter->vf_res->num_queue_pairs = IAVF_MAX_REQ_QUEUES;
199 for (i = 0; i < adapter->vf_res->num_vsis; i++) {
200 vsi_res = &adapter->vf_res->vsi_res[i];
201 vsi_res->num_queue_pairs = IAVF_MAX_REQ_QUEUES;
202 }
203 }
204}
205
206/**
207 * iavf_get_vf_config
208 * @adapter: private adapter structure
209 *
210 * Get VF configuration from PF and populate hw structure. Must be called after
211 * admin queue is initialized. Busy waits until response is received from PF,
212 * with maximum timeout. Response from PF is returned in the buffer for further
213 * processing by the caller.
214 **/
215int iavf_get_vf_config(struct iavf_adapter *adapter)
216{
217 struct iavf_hw *hw = &adapter->hw;
218 struct iavf_arq_event_info event;
219 u16 len;
220 int err;
221
222 len = IAVF_VIRTCHNL_VF_RESOURCE_SIZE;
223 event.buf_len = len;
224 event.msg_buf = kzalloc(len, GFP_KERNEL);
225 if (!event.msg_buf)
226 return -ENOMEM;
227
228 err = iavf_poll_virtchnl_msg(hw, &event, VIRTCHNL_OP_GET_VF_RESOURCES);
229 memcpy(adapter->vf_res, event.msg_buf, min(event.msg_len, len));
230
231 /* some PFs send more queues than we should have so validate that
232 * we aren't getting too many queues
233 */
234 if (!err)
235 iavf_validate_num_queues(adapter);
236 iavf_vf_parse_hw_config(hw, adapter->vf_res);
237
238 kfree(event.msg_buf);
239
240 return err;
241}
242
243int iavf_get_vf_vlan_v2_caps(struct iavf_adapter *adapter)
244{
245 struct iavf_arq_event_info event;
246 int err;
247 u16 len;
248
249 len = sizeof(struct virtchnl_vlan_caps);
250 event.buf_len = len;
251 event.msg_buf = kzalloc(len, GFP_KERNEL);
252 if (!event.msg_buf)
253 return -ENOMEM;
254
255 err = iavf_poll_virtchnl_msg(&adapter->hw, &event,
256 VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS);
257 if (!err)
258 memcpy(&adapter->vlan_v2_caps, event.msg_buf,
259 min(event.msg_len, len));
260
261 kfree(event.msg_buf);
262
263 return err;
264}
265
266/**
267 * iavf_configure_queues
268 * @adapter: adapter structure
269 *
270 * Request that the PF set up our (previously allocated) queues.
271 **/
272void iavf_configure_queues(struct iavf_adapter *adapter)
273{
274 struct virtchnl_vsi_queue_config_info *vqci;
275 int pairs = adapter->num_active_queues;
276 struct virtchnl_queue_pair_info *vqpi;
277 u32 i, max_frame;
278 size_t len;
279
280 max_frame = LIBIE_MAX_RX_FRM_LEN(adapter->rx_rings->pp->p.offset);
281 max_frame = min_not_zero(adapter->vf_res->max_mtu, max_frame);
282
283 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
284 /* bail because we already have a command pending */
285 dev_err(&adapter->pdev->dev, "Cannot configure queues, command %d pending\n",
286 adapter->current_op);
287 return;
288 }
289 adapter->current_op = VIRTCHNL_OP_CONFIG_VSI_QUEUES;
290 len = virtchnl_struct_size(vqci, qpair, pairs);
291 vqci = kzalloc(len, GFP_KERNEL);
292 if (!vqci)
293 return;
294
295 vqci->vsi_id = adapter->vsi_res->vsi_id;
296 vqci->num_queue_pairs = pairs;
297 vqpi = vqci->qpair;
298 /* Size check is not needed here - HW max is 16 queue pairs, and we
299 * can fit info for 31 of them into the AQ buffer before it overflows.
300 */
301 for (i = 0; i < pairs; i++) {
302 vqpi->txq.vsi_id = vqci->vsi_id;
303 vqpi->txq.queue_id = i;
304 vqpi->txq.ring_len = adapter->tx_rings[i].count;
305 vqpi->txq.dma_ring_addr = adapter->tx_rings[i].dma;
306 vqpi->rxq.vsi_id = vqci->vsi_id;
307 vqpi->rxq.queue_id = i;
308 vqpi->rxq.ring_len = adapter->rx_rings[i].count;
309 vqpi->rxq.dma_ring_addr = adapter->rx_rings[i].dma;
310 vqpi->rxq.max_pkt_size = max_frame;
311 vqpi->rxq.databuffer_size = adapter->rx_rings[i].rx_buf_len;
312 if (CRC_OFFLOAD_ALLOWED(adapter))
313 vqpi->rxq.crc_disable = !!(adapter->netdev->features &
314 NETIF_F_RXFCS);
315 vqpi++;
316 }
317
318 adapter->aq_required &= ~IAVF_FLAG_AQ_CONFIGURE_QUEUES;
319 iavf_send_pf_msg(adapter, VIRTCHNL_OP_CONFIG_VSI_QUEUES,
320 (u8 *)vqci, len);
321 kfree(vqci);
322}
323
324/**
325 * iavf_enable_queues
326 * @adapter: adapter structure
327 *
328 * Request that the PF enable all of our queues.
329 **/
330void iavf_enable_queues(struct iavf_adapter *adapter)
331{
332 struct virtchnl_queue_select vqs;
333
334 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
335 /* bail because we already have a command pending */
336 dev_err(&adapter->pdev->dev, "Cannot enable queues, command %d pending\n",
337 adapter->current_op);
338 return;
339 }
340 adapter->current_op = VIRTCHNL_OP_ENABLE_QUEUES;
341 vqs.vsi_id = adapter->vsi_res->vsi_id;
342 vqs.tx_queues = BIT(adapter->num_active_queues) - 1;
343 vqs.rx_queues = vqs.tx_queues;
344 adapter->aq_required &= ~IAVF_FLAG_AQ_ENABLE_QUEUES;
345 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ENABLE_QUEUES,
346 (u8 *)&vqs, sizeof(vqs));
347}
348
349/**
350 * iavf_disable_queues
351 * @adapter: adapter structure
352 *
353 * Request that the PF disable all of our queues.
354 **/
355void iavf_disable_queues(struct iavf_adapter *adapter)
356{
357 struct virtchnl_queue_select vqs;
358
359 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
360 /* bail because we already have a command pending */
361 dev_err(&adapter->pdev->dev, "Cannot disable queues, command %d pending\n",
362 adapter->current_op);
363 return;
364 }
365 adapter->current_op = VIRTCHNL_OP_DISABLE_QUEUES;
366 vqs.vsi_id = adapter->vsi_res->vsi_id;
367 vqs.tx_queues = BIT(adapter->num_active_queues) - 1;
368 vqs.rx_queues = vqs.tx_queues;
369 adapter->aq_required &= ~IAVF_FLAG_AQ_DISABLE_QUEUES;
370 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DISABLE_QUEUES,
371 (u8 *)&vqs, sizeof(vqs));
372}
373
374/**
375 * iavf_map_queues
376 * @adapter: adapter structure
377 *
378 * Request that the PF map queues to interrupt vectors. Misc causes, including
379 * admin queue, are always mapped to vector 0.
380 **/
381void iavf_map_queues(struct iavf_adapter *adapter)
382{
383 struct virtchnl_irq_map_info *vimi;
384 struct virtchnl_vector_map *vecmap;
385 struct iavf_q_vector *q_vector;
386 int v_idx, q_vectors;
387 size_t len;
388
389 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
390 /* bail because we already have a command pending */
391 dev_err(&adapter->pdev->dev, "Cannot map queues to vectors, command %d pending\n",
392 adapter->current_op);
393 return;
394 }
395 adapter->current_op = VIRTCHNL_OP_CONFIG_IRQ_MAP;
396
397 q_vectors = adapter->num_msix_vectors - NONQ_VECS;
398
399 len = virtchnl_struct_size(vimi, vecmap, adapter->num_msix_vectors);
400 vimi = kzalloc(len, GFP_KERNEL);
401 if (!vimi)
402 return;
403
404 vimi->num_vectors = adapter->num_msix_vectors;
405 /* Queue vectors first */
406 for (v_idx = 0; v_idx < q_vectors; v_idx++) {
407 q_vector = &adapter->q_vectors[v_idx];
408 vecmap = &vimi->vecmap[v_idx];
409
410 vecmap->vsi_id = adapter->vsi_res->vsi_id;
411 vecmap->vector_id = v_idx + NONQ_VECS;
412 vecmap->txq_map = q_vector->ring_mask;
413 vecmap->rxq_map = q_vector->ring_mask;
414 vecmap->rxitr_idx = IAVF_RX_ITR;
415 vecmap->txitr_idx = IAVF_TX_ITR;
416 }
417 /* Misc vector last - this is only for AdminQ messages */
418 vecmap = &vimi->vecmap[v_idx];
419 vecmap->vsi_id = adapter->vsi_res->vsi_id;
420 vecmap->vector_id = 0;
421 vecmap->txq_map = 0;
422 vecmap->rxq_map = 0;
423
424 adapter->aq_required &= ~IAVF_FLAG_AQ_MAP_VECTORS;
425 iavf_send_pf_msg(adapter, VIRTCHNL_OP_CONFIG_IRQ_MAP,
426 (u8 *)vimi, len);
427 kfree(vimi);
428}
429
430/**
431 * iavf_set_mac_addr_type - Set the correct request type from the filter type
432 * @virtchnl_ether_addr: pointer to requested list element
433 * @filter: pointer to requested filter
434 **/
435static void
436iavf_set_mac_addr_type(struct virtchnl_ether_addr *virtchnl_ether_addr,
437 const struct iavf_mac_filter *filter)
438{
439 virtchnl_ether_addr->type = filter->is_primary ?
440 VIRTCHNL_ETHER_ADDR_PRIMARY :
441 VIRTCHNL_ETHER_ADDR_EXTRA;
442}
443
444/**
445 * iavf_add_ether_addrs
446 * @adapter: adapter structure
447 *
448 * Request that the PF add one or more addresses to our filters.
449 **/
450void iavf_add_ether_addrs(struct iavf_adapter *adapter)
451{
452 struct virtchnl_ether_addr_list *veal;
453 struct iavf_mac_filter *f;
454 int i = 0, count = 0;
455 bool more = false;
456 size_t len;
457
458 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
459 /* bail because we already have a command pending */
460 dev_err(&adapter->pdev->dev, "Cannot add filters, command %d pending\n",
461 adapter->current_op);
462 return;
463 }
464
465 spin_lock_bh(&adapter->mac_vlan_list_lock);
466
467 list_for_each_entry(f, &adapter->mac_filter_list, list) {
468 if (f->add)
469 count++;
470 }
471 if (!count) {
472 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_MAC_FILTER;
473 spin_unlock_bh(&adapter->mac_vlan_list_lock);
474 return;
475 }
476 adapter->current_op = VIRTCHNL_OP_ADD_ETH_ADDR;
477
478 len = virtchnl_struct_size(veal, list, count);
479 if (len > IAVF_MAX_AQ_BUF_SIZE) {
480 dev_warn(&adapter->pdev->dev, "Too many add MAC changes in one request\n");
481 while (len > IAVF_MAX_AQ_BUF_SIZE)
482 len = virtchnl_struct_size(veal, list, --count);
483 more = true;
484 }
485
486 veal = kzalloc(len, GFP_ATOMIC);
487 if (!veal) {
488 spin_unlock_bh(&adapter->mac_vlan_list_lock);
489 return;
490 }
491
492 veal->vsi_id = adapter->vsi_res->vsi_id;
493 veal->num_elements = count;
494 list_for_each_entry(f, &adapter->mac_filter_list, list) {
495 if (f->add) {
496 ether_addr_copy(veal->list[i].addr, f->macaddr);
497 iavf_set_mac_addr_type(&veal->list[i], f);
498 i++;
499 f->add = false;
500 if (i == count)
501 break;
502 }
503 }
504 if (!more)
505 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_MAC_FILTER;
506
507 spin_unlock_bh(&adapter->mac_vlan_list_lock);
508
509 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ADD_ETH_ADDR, (u8 *)veal, len);
510 kfree(veal);
511}
512
513/**
514 * iavf_del_ether_addrs
515 * @adapter: adapter structure
516 *
517 * Request that the PF remove one or more addresses from our filters.
518 **/
519void iavf_del_ether_addrs(struct iavf_adapter *adapter)
520{
521 struct virtchnl_ether_addr_list *veal;
522 struct iavf_mac_filter *f, *ftmp;
523 int i = 0, count = 0;
524 bool more = false;
525 size_t len;
526
527 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
528 /* bail because we already have a command pending */
529 dev_err(&adapter->pdev->dev, "Cannot remove filters, command %d pending\n",
530 adapter->current_op);
531 return;
532 }
533
534 spin_lock_bh(&adapter->mac_vlan_list_lock);
535
536 list_for_each_entry(f, &adapter->mac_filter_list, list) {
537 if (f->remove)
538 count++;
539 }
540 if (!count) {
541 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_MAC_FILTER;
542 spin_unlock_bh(&adapter->mac_vlan_list_lock);
543 return;
544 }
545 adapter->current_op = VIRTCHNL_OP_DEL_ETH_ADDR;
546
547 len = virtchnl_struct_size(veal, list, count);
548 if (len > IAVF_MAX_AQ_BUF_SIZE) {
549 dev_warn(&adapter->pdev->dev, "Too many delete MAC changes in one request\n");
550 while (len > IAVF_MAX_AQ_BUF_SIZE)
551 len = virtchnl_struct_size(veal, list, --count);
552 more = true;
553 }
554 veal = kzalloc(len, GFP_ATOMIC);
555 if (!veal) {
556 spin_unlock_bh(&adapter->mac_vlan_list_lock);
557 return;
558 }
559
560 veal->vsi_id = adapter->vsi_res->vsi_id;
561 veal->num_elements = count;
562 list_for_each_entry_safe(f, ftmp, &adapter->mac_filter_list, list) {
563 if (f->remove) {
564 ether_addr_copy(veal->list[i].addr, f->macaddr);
565 iavf_set_mac_addr_type(&veal->list[i], f);
566 i++;
567 list_del(&f->list);
568 kfree(f);
569 if (i == count)
570 break;
571 }
572 }
573 if (!more)
574 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_MAC_FILTER;
575
576 spin_unlock_bh(&adapter->mac_vlan_list_lock);
577
578 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DEL_ETH_ADDR, (u8 *)veal, len);
579 kfree(veal);
580}
581
582/**
583 * iavf_mac_add_ok
584 * @adapter: adapter structure
585 *
586 * Submit list of filters based on PF response.
587 **/
588static void iavf_mac_add_ok(struct iavf_adapter *adapter)
589{
590 struct iavf_mac_filter *f, *ftmp;
591
592 spin_lock_bh(&adapter->mac_vlan_list_lock);
593 list_for_each_entry_safe(f, ftmp, &adapter->mac_filter_list, list) {
594 f->is_new_mac = false;
595 if (!f->add && !f->add_handled)
596 f->add_handled = true;
597 }
598 spin_unlock_bh(&adapter->mac_vlan_list_lock);
599}
600
601/**
602 * iavf_mac_add_reject
603 * @adapter: adapter structure
604 *
605 * Remove filters from list based on PF response.
606 **/
607static void iavf_mac_add_reject(struct iavf_adapter *adapter)
608{
609 struct net_device *netdev = adapter->netdev;
610 struct iavf_mac_filter *f, *ftmp;
611
612 spin_lock_bh(&adapter->mac_vlan_list_lock);
613 list_for_each_entry_safe(f, ftmp, &adapter->mac_filter_list, list) {
614 if (f->remove && ether_addr_equal(f->macaddr, netdev->dev_addr))
615 f->remove = false;
616
617 if (!f->add && !f->add_handled)
618 f->add_handled = true;
619
620 if (f->is_new_mac) {
621 list_del(&f->list);
622 kfree(f);
623 }
624 }
625 spin_unlock_bh(&adapter->mac_vlan_list_lock);
626}
627
628/**
629 * iavf_vlan_add_reject
630 * @adapter: adapter structure
631 *
632 * Remove VLAN filters from list based on PF response.
633 **/
634static void iavf_vlan_add_reject(struct iavf_adapter *adapter)
635{
636 struct iavf_vlan_filter *f, *ftmp;
637
638 spin_lock_bh(&adapter->mac_vlan_list_lock);
639 list_for_each_entry_safe(f, ftmp, &adapter->vlan_filter_list, list) {
640 if (f->state == IAVF_VLAN_IS_NEW) {
641 list_del(&f->list);
642 kfree(f);
643 adapter->num_vlan_filters--;
644 }
645 }
646 spin_unlock_bh(&adapter->mac_vlan_list_lock);
647}
648
649/**
650 * iavf_add_vlans
651 * @adapter: adapter structure
652 *
653 * Request that the PF add one or more VLAN filters to our VSI.
654 **/
655void iavf_add_vlans(struct iavf_adapter *adapter)
656{
657 int len, i = 0, count = 0;
658 struct iavf_vlan_filter *f;
659 bool more = false;
660
661 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
662 /* bail because we already have a command pending */
663 dev_err(&adapter->pdev->dev, "Cannot add VLANs, command %d pending\n",
664 adapter->current_op);
665 return;
666 }
667
668 spin_lock_bh(&adapter->mac_vlan_list_lock);
669
670 list_for_each_entry(f, &adapter->vlan_filter_list, list) {
671 if (f->state == IAVF_VLAN_ADD)
672 count++;
673 }
674 if (!count || !VLAN_FILTERING_ALLOWED(adapter)) {
675 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_VLAN_FILTER;
676 spin_unlock_bh(&adapter->mac_vlan_list_lock);
677 return;
678 }
679
680 if (VLAN_ALLOWED(adapter)) {
681 struct virtchnl_vlan_filter_list *vvfl;
682
683 adapter->current_op = VIRTCHNL_OP_ADD_VLAN;
684
685 len = virtchnl_struct_size(vvfl, vlan_id, count);
686 if (len > IAVF_MAX_AQ_BUF_SIZE) {
687 dev_warn(&adapter->pdev->dev, "Too many add VLAN changes in one request\n");
688 while (len > IAVF_MAX_AQ_BUF_SIZE)
689 len = virtchnl_struct_size(vvfl, vlan_id,
690 --count);
691 more = true;
692 }
693 vvfl = kzalloc(len, GFP_ATOMIC);
694 if (!vvfl) {
695 spin_unlock_bh(&adapter->mac_vlan_list_lock);
696 return;
697 }
698
699 vvfl->vsi_id = adapter->vsi_res->vsi_id;
700 vvfl->num_elements = count;
701 list_for_each_entry(f, &adapter->vlan_filter_list, list) {
702 if (f->state == IAVF_VLAN_ADD) {
703 vvfl->vlan_id[i] = f->vlan.vid;
704 i++;
705 f->state = IAVF_VLAN_IS_NEW;
706 if (i == count)
707 break;
708 }
709 }
710 if (!more)
711 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_VLAN_FILTER;
712
713 spin_unlock_bh(&adapter->mac_vlan_list_lock);
714
715 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ADD_VLAN, (u8 *)vvfl, len);
716 kfree(vvfl);
717 } else {
718 u16 max_vlans = adapter->vlan_v2_caps.filtering.max_filters;
719 u16 current_vlans = iavf_get_num_vlans_added(adapter);
720 struct virtchnl_vlan_filter_list_v2 *vvfl_v2;
721
722 adapter->current_op = VIRTCHNL_OP_ADD_VLAN_V2;
723
724 if ((count + current_vlans) > max_vlans &&
725 current_vlans < max_vlans) {
726 count = max_vlans - iavf_get_num_vlans_added(adapter);
727 more = true;
728 }
729
730 len = virtchnl_struct_size(vvfl_v2, filters, count);
731 if (len > IAVF_MAX_AQ_BUF_SIZE) {
732 dev_warn(&adapter->pdev->dev, "Too many add VLAN changes in one request\n");
733 while (len > IAVF_MAX_AQ_BUF_SIZE)
734 len = virtchnl_struct_size(vvfl_v2, filters,
735 --count);
736 more = true;
737 }
738
739 vvfl_v2 = kzalloc(len, GFP_ATOMIC);
740 if (!vvfl_v2) {
741 spin_unlock_bh(&adapter->mac_vlan_list_lock);
742 return;
743 }
744
745 vvfl_v2->vport_id = adapter->vsi_res->vsi_id;
746 vvfl_v2->num_elements = count;
747 list_for_each_entry(f, &adapter->vlan_filter_list, list) {
748 if (f->state == IAVF_VLAN_ADD) {
749 struct virtchnl_vlan_supported_caps *filtering_support =
750 &adapter->vlan_v2_caps.filtering.filtering_support;
751 struct virtchnl_vlan *vlan;
752
753 if (i == count)
754 break;
755
756 /* give priority over outer if it's enabled */
757 if (filtering_support->outer)
758 vlan = &vvfl_v2->filters[i].outer;
759 else
760 vlan = &vvfl_v2->filters[i].inner;
761
762 vlan->tci = f->vlan.vid;
763 vlan->tpid = f->vlan.tpid;
764
765 i++;
766 f->state = IAVF_VLAN_IS_NEW;
767 }
768 }
769
770 if (!more)
771 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_VLAN_FILTER;
772
773 spin_unlock_bh(&adapter->mac_vlan_list_lock);
774
775 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ADD_VLAN_V2,
776 (u8 *)vvfl_v2, len);
777 kfree(vvfl_v2);
778 }
779}
780
781/**
782 * iavf_del_vlans
783 * @adapter: adapter structure
784 *
785 * Request that the PF remove one or more VLAN filters from our VSI.
786 **/
787void iavf_del_vlans(struct iavf_adapter *adapter)
788{
789 struct iavf_vlan_filter *f, *ftmp;
790 int len, i = 0, count = 0;
791 bool more = false;
792
793 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
794 /* bail because we already have a command pending */
795 dev_err(&adapter->pdev->dev, "Cannot remove VLANs, command %d pending\n",
796 adapter->current_op);
797 return;
798 }
799
800 spin_lock_bh(&adapter->mac_vlan_list_lock);
801
802 list_for_each_entry_safe(f, ftmp, &adapter->vlan_filter_list, list) {
803 /* since VLAN capabilities are not allowed, we dont want to send
804 * a VLAN delete request because it will most likely fail and
805 * create unnecessary errors/noise, so just free the VLAN
806 * filters marked for removal to enable bailing out before
807 * sending a virtchnl message
808 */
809 if (f->state == IAVF_VLAN_REMOVE &&
810 !VLAN_FILTERING_ALLOWED(adapter)) {
811 list_del(&f->list);
812 kfree(f);
813 adapter->num_vlan_filters--;
814 } else if (f->state == IAVF_VLAN_DISABLE &&
815 !VLAN_FILTERING_ALLOWED(adapter)) {
816 f->state = IAVF_VLAN_INACTIVE;
817 } else if (f->state == IAVF_VLAN_REMOVE ||
818 f->state == IAVF_VLAN_DISABLE) {
819 count++;
820 }
821 }
822 if (!count || !VLAN_FILTERING_ALLOWED(adapter)) {
823 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_VLAN_FILTER;
824 spin_unlock_bh(&adapter->mac_vlan_list_lock);
825 return;
826 }
827
828 if (VLAN_ALLOWED(adapter)) {
829 struct virtchnl_vlan_filter_list *vvfl;
830
831 adapter->current_op = VIRTCHNL_OP_DEL_VLAN;
832
833 len = virtchnl_struct_size(vvfl, vlan_id, count);
834 if (len > IAVF_MAX_AQ_BUF_SIZE) {
835 dev_warn(&adapter->pdev->dev, "Too many delete VLAN changes in one request\n");
836 while (len > IAVF_MAX_AQ_BUF_SIZE)
837 len = virtchnl_struct_size(vvfl, vlan_id,
838 --count);
839 more = true;
840 }
841 vvfl = kzalloc(len, GFP_ATOMIC);
842 if (!vvfl) {
843 spin_unlock_bh(&adapter->mac_vlan_list_lock);
844 return;
845 }
846
847 vvfl->vsi_id = adapter->vsi_res->vsi_id;
848 vvfl->num_elements = count;
849 list_for_each_entry_safe(f, ftmp, &adapter->vlan_filter_list, list) {
850 if (f->state == IAVF_VLAN_DISABLE) {
851 vvfl->vlan_id[i] = f->vlan.vid;
852 f->state = IAVF_VLAN_INACTIVE;
853 i++;
854 if (i == count)
855 break;
856 } else if (f->state == IAVF_VLAN_REMOVE) {
857 vvfl->vlan_id[i] = f->vlan.vid;
858 list_del(&f->list);
859 kfree(f);
860 adapter->num_vlan_filters--;
861 i++;
862 if (i == count)
863 break;
864 }
865 }
866
867 if (!more)
868 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_VLAN_FILTER;
869
870 spin_unlock_bh(&adapter->mac_vlan_list_lock);
871
872 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DEL_VLAN, (u8 *)vvfl, len);
873 kfree(vvfl);
874 } else {
875 struct virtchnl_vlan_filter_list_v2 *vvfl_v2;
876
877 adapter->current_op = VIRTCHNL_OP_DEL_VLAN_V2;
878
879 len = virtchnl_struct_size(vvfl_v2, filters, count);
880 if (len > IAVF_MAX_AQ_BUF_SIZE) {
881 dev_warn(&adapter->pdev->dev, "Too many add VLAN changes in one request\n");
882 while (len > IAVF_MAX_AQ_BUF_SIZE)
883 len = virtchnl_struct_size(vvfl_v2, filters,
884 --count);
885 more = true;
886 }
887
888 vvfl_v2 = kzalloc(len, GFP_ATOMIC);
889 if (!vvfl_v2) {
890 spin_unlock_bh(&adapter->mac_vlan_list_lock);
891 return;
892 }
893
894 vvfl_v2->vport_id = adapter->vsi_res->vsi_id;
895 vvfl_v2->num_elements = count;
896 list_for_each_entry_safe(f, ftmp, &adapter->vlan_filter_list, list) {
897 if (f->state == IAVF_VLAN_DISABLE ||
898 f->state == IAVF_VLAN_REMOVE) {
899 struct virtchnl_vlan_supported_caps *filtering_support =
900 &adapter->vlan_v2_caps.filtering.filtering_support;
901 struct virtchnl_vlan *vlan;
902
903 /* give priority over outer if it's enabled */
904 if (filtering_support->outer)
905 vlan = &vvfl_v2->filters[i].outer;
906 else
907 vlan = &vvfl_v2->filters[i].inner;
908
909 vlan->tci = f->vlan.vid;
910 vlan->tpid = f->vlan.tpid;
911
912 if (f->state == IAVF_VLAN_DISABLE) {
913 f->state = IAVF_VLAN_INACTIVE;
914 } else {
915 list_del(&f->list);
916 kfree(f);
917 adapter->num_vlan_filters--;
918 }
919 i++;
920 if (i == count)
921 break;
922 }
923 }
924
925 if (!more)
926 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_VLAN_FILTER;
927
928 spin_unlock_bh(&adapter->mac_vlan_list_lock);
929
930 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DEL_VLAN_V2,
931 (u8 *)vvfl_v2, len);
932 kfree(vvfl_v2);
933 }
934}
935
936/**
937 * iavf_set_promiscuous
938 * @adapter: adapter structure
939 *
940 * Request that the PF enable promiscuous mode for our VSI.
941 **/
942void iavf_set_promiscuous(struct iavf_adapter *adapter)
943{
944 struct net_device *netdev = adapter->netdev;
945 struct virtchnl_promisc_info vpi;
946 unsigned int flags;
947
948 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
949 /* bail because we already have a command pending */
950 dev_err(&adapter->pdev->dev, "Cannot set promiscuous mode, command %d pending\n",
951 adapter->current_op);
952 return;
953 }
954
955 /* prevent changes to promiscuous flags */
956 spin_lock_bh(&adapter->current_netdev_promisc_flags_lock);
957
958 /* sanity check to prevent duplicate AQ calls */
959 if (!iavf_promiscuous_mode_changed(adapter)) {
960 adapter->aq_required &= ~IAVF_FLAG_AQ_CONFIGURE_PROMISC_MODE;
961 dev_dbg(&adapter->pdev->dev, "No change in promiscuous mode\n");
962 /* allow changes to promiscuous flags */
963 spin_unlock_bh(&adapter->current_netdev_promisc_flags_lock);
964 return;
965 }
966
967 /* there are 2 bits, but only 3 states */
968 if (!(netdev->flags & IFF_PROMISC) &&
969 netdev->flags & IFF_ALLMULTI) {
970 /* State 1 - only multicast promiscuous mode enabled
971 * - !IFF_PROMISC && IFF_ALLMULTI
972 */
973 flags = FLAG_VF_MULTICAST_PROMISC;
974 adapter->current_netdev_promisc_flags |= IFF_ALLMULTI;
975 adapter->current_netdev_promisc_flags &= ~IFF_PROMISC;
976 dev_info(&adapter->pdev->dev, "Entering multicast promiscuous mode\n");
977 } else if (!(netdev->flags & IFF_PROMISC) &&
978 !(netdev->flags & IFF_ALLMULTI)) {
979 /* State 2 - unicast/multicast promiscuous mode disabled
980 * - !IFF_PROMISC && !IFF_ALLMULTI
981 */
982 flags = 0;
983 adapter->current_netdev_promisc_flags &=
984 ~(IFF_PROMISC | IFF_ALLMULTI);
985 dev_info(&adapter->pdev->dev, "Leaving promiscuous mode\n");
986 } else {
987 /* State 3 - unicast/multicast promiscuous mode enabled
988 * - IFF_PROMISC && IFF_ALLMULTI
989 * - IFF_PROMISC && !IFF_ALLMULTI
990 */
991 flags = FLAG_VF_UNICAST_PROMISC | FLAG_VF_MULTICAST_PROMISC;
992 adapter->current_netdev_promisc_flags |= IFF_PROMISC;
993 if (netdev->flags & IFF_ALLMULTI)
994 adapter->current_netdev_promisc_flags |= IFF_ALLMULTI;
995 else
996 adapter->current_netdev_promisc_flags &= ~IFF_ALLMULTI;
997
998 dev_info(&adapter->pdev->dev, "Entering promiscuous mode\n");
999 }
1000
1001 adapter->aq_required &= ~IAVF_FLAG_AQ_CONFIGURE_PROMISC_MODE;
1002
1003 /* allow changes to promiscuous flags */
1004 spin_unlock_bh(&adapter->current_netdev_promisc_flags_lock);
1005
1006 adapter->current_op = VIRTCHNL_OP_CONFIG_PROMISCUOUS_MODE;
1007 vpi.vsi_id = adapter->vsi_res->vsi_id;
1008 vpi.flags = flags;
1009 iavf_send_pf_msg(adapter, VIRTCHNL_OP_CONFIG_PROMISCUOUS_MODE,
1010 (u8 *)&vpi, sizeof(vpi));
1011}
1012
1013/**
1014 * iavf_request_stats
1015 * @adapter: adapter structure
1016 *
1017 * Request VSI statistics from PF.
1018 **/
1019void iavf_request_stats(struct iavf_adapter *adapter)
1020{
1021 struct virtchnl_queue_select vqs;
1022
1023 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1024 /* no error message, this isn't crucial */
1025 return;
1026 }
1027
1028 adapter->aq_required &= ~IAVF_FLAG_AQ_REQUEST_STATS;
1029 adapter->current_op = VIRTCHNL_OP_GET_STATS;
1030 vqs.vsi_id = adapter->vsi_res->vsi_id;
1031 /* queue maps are ignored for this message - only the vsi is used */
1032 if (iavf_send_pf_msg(adapter, VIRTCHNL_OP_GET_STATS, (u8 *)&vqs,
1033 sizeof(vqs)))
1034 /* if the request failed, don't lock out others */
1035 adapter->current_op = VIRTCHNL_OP_UNKNOWN;
1036}
1037
1038/**
1039 * iavf_get_hena
1040 * @adapter: adapter structure
1041 *
1042 * Request hash enable capabilities from PF
1043 **/
1044void iavf_get_hena(struct iavf_adapter *adapter)
1045{
1046 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1047 /* bail because we already have a command pending */
1048 dev_err(&adapter->pdev->dev, "Cannot get RSS hash capabilities, command %d pending\n",
1049 adapter->current_op);
1050 return;
1051 }
1052 adapter->current_op = VIRTCHNL_OP_GET_RSS_HENA_CAPS;
1053 adapter->aq_required &= ~IAVF_FLAG_AQ_GET_HENA;
1054 iavf_send_pf_msg(adapter, VIRTCHNL_OP_GET_RSS_HENA_CAPS, NULL, 0);
1055}
1056
1057/**
1058 * iavf_set_hena
1059 * @adapter: adapter structure
1060 *
1061 * Request the PF to set our RSS hash capabilities
1062 **/
1063void iavf_set_hena(struct iavf_adapter *adapter)
1064{
1065 struct virtchnl_rss_hena vrh;
1066
1067 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1068 /* bail because we already have a command pending */
1069 dev_err(&adapter->pdev->dev, "Cannot set RSS hash enable, command %d pending\n",
1070 adapter->current_op);
1071 return;
1072 }
1073 vrh.hena = adapter->hena;
1074 adapter->current_op = VIRTCHNL_OP_SET_RSS_HENA;
1075 adapter->aq_required &= ~IAVF_FLAG_AQ_SET_HENA;
1076 iavf_send_pf_msg(adapter, VIRTCHNL_OP_SET_RSS_HENA, (u8 *)&vrh,
1077 sizeof(vrh));
1078}
1079
1080/**
1081 * iavf_set_rss_key
1082 * @adapter: adapter structure
1083 *
1084 * Request the PF to set our RSS hash key
1085 **/
1086void iavf_set_rss_key(struct iavf_adapter *adapter)
1087{
1088 struct virtchnl_rss_key *vrk;
1089 int len;
1090
1091 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1092 /* bail because we already have a command pending */
1093 dev_err(&adapter->pdev->dev, "Cannot set RSS key, command %d pending\n",
1094 adapter->current_op);
1095 return;
1096 }
1097 len = virtchnl_struct_size(vrk, key, adapter->rss_key_size);
1098 vrk = kzalloc(len, GFP_KERNEL);
1099 if (!vrk)
1100 return;
1101 vrk->vsi_id = adapter->vsi.id;
1102 vrk->key_len = adapter->rss_key_size;
1103 memcpy(vrk->key, adapter->rss_key, adapter->rss_key_size);
1104
1105 adapter->current_op = VIRTCHNL_OP_CONFIG_RSS_KEY;
1106 adapter->aq_required &= ~IAVF_FLAG_AQ_SET_RSS_KEY;
1107 iavf_send_pf_msg(adapter, VIRTCHNL_OP_CONFIG_RSS_KEY, (u8 *)vrk, len);
1108 kfree(vrk);
1109}
1110
1111/**
1112 * iavf_set_rss_lut
1113 * @adapter: adapter structure
1114 *
1115 * Request the PF to set our RSS lookup table
1116 **/
1117void iavf_set_rss_lut(struct iavf_adapter *adapter)
1118{
1119 struct virtchnl_rss_lut *vrl;
1120 int len;
1121
1122 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1123 /* bail because we already have a command pending */
1124 dev_err(&adapter->pdev->dev, "Cannot set RSS LUT, command %d pending\n",
1125 adapter->current_op);
1126 return;
1127 }
1128 len = virtchnl_struct_size(vrl, lut, adapter->rss_lut_size);
1129 vrl = kzalloc(len, GFP_KERNEL);
1130 if (!vrl)
1131 return;
1132 vrl->vsi_id = adapter->vsi.id;
1133 vrl->lut_entries = adapter->rss_lut_size;
1134 memcpy(vrl->lut, adapter->rss_lut, adapter->rss_lut_size);
1135 adapter->current_op = VIRTCHNL_OP_CONFIG_RSS_LUT;
1136 adapter->aq_required &= ~IAVF_FLAG_AQ_SET_RSS_LUT;
1137 iavf_send_pf_msg(adapter, VIRTCHNL_OP_CONFIG_RSS_LUT, (u8 *)vrl, len);
1138 kfree(vrl);
1139}
1140
1141/**
1142 * iavf_set_rss_hfunc
1143 * @adapter: adapter structure
1144 *
1145 * Request the PF to set our RSS Hash function
1146 **/
1147void iavf_set_rss_hfunc(struct iavf_adapter *adapter)
1148{
1149 struct virtchnl_rss_hfunc *vrh;
1150 int len = sizeof(*vrh);
1151
1152 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1153 /* bail because we already have a command pending */
1154 dev_err(&adapter->pdev->dev, "Cannot set RSS Hash function, command %d pending\n",
1155 adapter->current_op);
1156 return;
1157 }
1158 vrh = kzalloc(len, GFP_KERNEL);
1159 if (!vrh)
1160 return;
1161 vrh->vsi_id = adapter->vsi.id;
1162 vrh->rss_algorithm = adapter->hfunc;
1163 adapter->current_op = VIRTCHNL_OP_CONFIG_RSS_HFUNC;
1164 adapter->aq_required &= ~IAVF_FLAG_AQ_SET_RSS_HFUNC;
1165 iavf_send_pf_msg(adapter, VIRTCHNL_OP_CONFIG_RSS_HFUNC, (u8 *)vrh, len);
1166 kfree(vrh);
1167}
1168
1169/**
1170 * iavf_enable_vlan_stripping
1171 * @adapter: adapter structure
1172 *
1173 * Request VLAN header stripping to be enabled
1174 **/
1175void iavf_enable_vlan_stripping(struct iavf_adapter *adapter)
1176{
1177 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1178 /* bail because we already have a command pending */
1179 dev_err(&adapter->pdev->dev, "Cannot enable stripping, command %d pending\n",
1180 adapter->current_op);
1181 return;
1182 }
1183 adapter->current_op = VIRTCHNL_OP_ENABLE_VLAN_STRIPPING;
1184 adapter->aq_required &= ~IAVF_FLAG_AQ_ENABLE_VLAN_STRIPPING;
1185 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ENABLE_VLAN_STRIPPING, NULL, 0);
1186}
1187
1188/**
1189 * iavf_disable_vlan_stripping
1190 * @adapter: adapter structure
1191 *
1192 * Request VLAN header stripping to be disabled
1193 **/
1194void iavf_disable_vlan_stripping(struct iavf_adapter *adapter)
1195{
1196 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1197 /* bail because we already have a command pending */
1198 dev_err(&adapter->pdev->dev, "Cannot disable stripping, command %d pending\n",
1199 adapter->current_op);
1200 return;
1201 }
1202 adapter->current_op = VIRTCHNL_OP_DISABLE_VLAN_STRIPPING;
1203 adapter->aq_required &= ~IAVF_FLAG_AQ_DISABLE_VLAN_STRIPPING;
1204 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DISABLE_VLAN_STRIPPING, NULL, 0);
1205}
1206
1207/**
1208 * iavf_tpid_to_vc_ethertype - transform from VLAN TPID to virtchnl ethertype
1209 * @tpid: VLAN TPID (i.e. 0x8100, 0x88a8, etc.)
1210 */
1211static u32 iavf_tpid_to_vc_ethertype(u16 tpid)
1212{
1213 switch (tpid) {
1214 case ETH_P_8021Q:
1215 return VIRTCHNL_VLAN_ETHERTYPE_8100;
1216 case ETH_P_8021AD:
1217 return VIRTCHNL_VLAN_ETHERTYPE_88A8;
1218 }
1219
1220 return 0;
1221}
1222
1223/**
1224 * iavf_set_vc_offload_ethertype - set virtchnl ethertype for offload message
1225 * @adapter: adapter structure
1226 * @msg: message structure used for updating offloads over virtchnl to update
1227 * @tpid: VLAN TPID (i.e. 0x8100, 0x88a8, etc.)
1228 * @offload_op: opcode used to determine which support structure to check
1229 */
1230static int
1231iavf_set_vc_offload_ethertype(struct iavf_adapter *adapter,
1232 struct virtchnl_vlan_setting *msg, u16 tpid,
1233 enum virtchnl_ops offload_op)
1234{
1235 struct virtchnl_vlan_supported_caps *offload_support;
1236 u16 vc_ethertype = iavf_tpid_to_vc_ethertype(tpid);
1237
1238 /* reference the correct offload support structure */
1239 switch (offload_op) {
1240 case VIRTCHNL_OP_ENABLE_VLAN_STRIPPING_V2:
1241 case VIRTCHNL_OP_DISABLE_VLAN_STRIPPING_V2:
1242 offload_support =
1243 &adapter->vlan_v2_caps.offloads.stripping_support;
1244 break;
1245 case VIRTCHNL_OP_ENABLE_VLAN_INSERTION_V2:
1246 case VIRTCHNL_OP_DISABLE_VLAN_INSERTION_V2:
1247 offload_support =
1248 &adapter->vlan_v2_caps.offloads.insertion_support;
1249 break;
1250 default:
1251 dev_err(&adapter->pdev->dev, "Invalid opcode %d for setting virtchnl ethertype to enable/disable VLAN offloads\n",
1252 offload_op);
1253 return -EINVAL;
1254 }
1255
1256 /* make sure ethertype is supported */
1257 if (offload_support->outer & vc_ethertype &&
1258 offload_support->outer & VIRTCHNL_VLAN_TOGGLE) {
1259 msg->outer_ethertype_setting = vc_ethertype;
1260 } else if (offload_support->inner & vc_ethertype &&
1261 offload_support->inner & VIRTCHNL_VLAN_TOGGLE) {
1262 msg->inner_ethertype_setting = vc_ethertype;
1263 } else {
1264 dev_dbg(&adapter->pdev->dev, "opcode %d unsupported for VLAN TPID 0x%04x\n",
1265 offload_op, tpid);
1266 return -EINVAL;
1267 }
1268
1269 return 0;
1270}
1271
1272/**
1273 * iavf_clear_offload_v2_aq_required - clear AQ required bit for offload request
1274 * @adapter: adapter structure
1275 * @tpid: VLAN TPID
1276 * @offload_op: opcode used to determine which AQ required bit to clear
1277 */
1278static void
1279iavf_clear_offload_v2_aq_required(struct iavf_adapter *adapter, u16 tpid,
1280 enum virtchnl_ops offload_op)
1281{
1282 switch (offload_op) {
1283 case VIRTCHNL_OP_ENABLE_VLAN_STRIPPING_V2:
1284 if (tpid == ETH_P_8021Q)
1285 adapter->aq_required &=
1286 ~IAVF_FLAG_AQ_ENABLE_CTAG_VLAN_STRIPPING;
1287 else if (tpid == ETH_P_8021AD)
1288 adapter->aq_required &=
1289 ~IAVF_FLAG_AQ_ENABLE_STAG_VLAN_STRIPPING;
1290 break;
1291 case VIRTCHNL_OP_DISABLE_VLAN_STRIPPING_V2:
1292 if (tpid == ETH_P_8021Q)
1293 adapter->aq_required &=
1294 ~IAVF_FLAG_AQ_DISABLE_CTAG_VLAN_STRIPPING;
1295 else if (tpid == ETH_P_8021AD)
1296 adapter->aq_required &=
1297 ~IAVF_FLAG_AQ_DISABLE_STAG_VLAN_STRIPPING;
1298 break;
1299 case VIRTCHNL_OP_ENABLE_VLAN_INSERTION_V2:
1300 if (tpid == ETH_P_8021Q)
1301 adapter->aq_required &=
1302 ~IAVF_FLAG_AQ_ENABLE_CTAG_VLAN_INSERTION;
1303 else if (tpid == ETH_P_8021AD)
1304 adapter->aq_required &=
1305 ~IAVF_FLAG_AQ_ENABLE_STAG_VLAN_INSERTION;
1306 break;
1307 case VIRTCHNL_OP_DISABLE_VLAN_INSERTION_V2:
1308 if (tpid == ETH_P_8021Q)
1309 adapter->aq_required &=
1310 ~IAVF_FLAG_AQ_DISABLE_CTAG_VLAN_INSERTION;
1311 else if (tpid == ETH_P_8021AD)
1312 adapter->aq_required &=
1313 ~IAVF_FLAG_AQ_DISABLE_STAG_VLAN_INSERTION;
1314 break;
1315 default:
1316 dev_err(&adapter->pdev->dev, "Unsupported opcode %d specified for clearing aq_required bits for VIRTCHNL_VF_OFFLOAD_VLAN_V2 offload request\n",
1317 offload_op);
1318 }
1319}
1320
1321/**
1322 * iavf_send_vlan_offload_v2 - send offload enable/disable over virtchnl
1323 * @adapter: adapter structure
1324 * @tpid: VLAN TPID used for the command (i.e. 0x8100 or 0x88a8)
1325 * @offload_op: offload_op used to make the request over virtchnl
1326 */
1327static void
1328iavf_send_vlan_offload_v2(struct iavf_adapter *adapter, u16 tpid,
1329 enum virtchnl_ops offload_op)
1330{
1331 struct virtchnl_vlan_setting *msg;
1332 int len = sizeof(*msg);
1333
1334 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1335 /* bail because we already have a command pending */
1336 dev_err(&adapter->pdev->dev, "Cannot send %d, command %d pending\n",
1337 offload_op, adapter->current_op);
1338 return;
1339 }
1340
1341 adapter->current_op = offload_op;
1342
1343 msg = kzalloc(len, GFP_KERNEL);
1344 if (!msg)
1345 return;
1346
1347 msg->vport_id = adapter->vsi_res->vsi_id;
1348
1349 /* always clear to prevent unsupported and endless requests */
1350 iavf_clear_offload_v2_aq_required(adapter, tpid, offload_op);
1351
1352 /* only send valid offload requests */
1353 if (!iavf_set_vc_offload_ethertype(adapter, msg, tpid, offload_op))
1354 iavf_send_pf_msg(adapter, offload_op, (u8 *)msg, len);
1355 else
1356 adapter->current_op = VIRTCHNL_OP_UNKNOWN;
1357
1358 kfree(msg);
1359}
1360
1361/**
1362 * iavf_enable_vlan_stripping_v2 - enable VLAN stripping
1363 * @adapter: adapter structure
1364 * @tpid: VLAN TPID used to enable VLAN stripping
1365 */
1366void iavf_enable_vlan_stripping_v2(struct iavf_adapter *adapter, u16 tpid)
1367{
1368 iavf_send_vlan_offload_v2(adapter, tpid,
1369 VIRTCHNL_OP_ENABLE_VLAN_STRIPPING_V2);
1370}
1371
1372/**
1373 * iavf_disable_vlan_stripping_v2 - disable VLAN stripping
1374 * @adapter: adapter structure
1375 * @tpid: VLAN TPID used to disable VLAN stripping
1376 */
1377void iavf_disable_vlan_stripping_v2(struct iavf_adapter *adapter, u16 tpid)
1378{
1379 iavf_send_vlan_offload_v2(adapter, tpid,
1380 VIRTCHNL_OP_DISABLE_VLAN_STRIPPING_V2);
1381}
1382
1383/**
1384 * iavf_enable_vlan_insertion_v2 - enable VLAN insertion
1385 * @adapter: adapter structure
1386 * @tpid: VLAN TPID used to enable VLAN insertion
1387 */
1388void iavf_enable_vlan_insertion_v2(struct iavf_adapter *adapter, u16 tpid)
1389{
1390 iavf_send_vlan_offload_v2(adapter, tpid,
1391 VIRTCHNL_OP_ENABLE_VLAN_INSERTION_V2);
1392}
1393
1394/**
1395 * iavf_disable_vlan_insertion_v2 - disable VLAN insertion
1396 * @adapter: adapter structure
1397 * @tpid: VLAN TPID used to disable VLAN insertion
1398 */
1399void iavf_disable_vlan_insertion_v2(struct iavf_adapter *adapter, u16 tpid)
1400{
1401 iavf_send_vlan_offload_v2(adapter, tpid,
1402 VIRTCHNL_OP_DISABLE_VLAN_INSERTION_V2);
1403}
1404
1405/**
1406 * iavf_print_link_message - print link up or down
1407 * @adapter: adapter structure
1408 *
1409 * Log a message telling the world of our wonderous link status
1410 */
1411static void iavf_print_link_message(struct iavf_adapter *adapter)
1412{
1413 struct net_device *netdev = adapter->netdev;
1414 int link_speed_mbps;
1415 char *speed;
1416
1417 if (!adapter->link_up) {
1418 netdev_info(netdev, "NIC Link is Down\n");
1419 return;
1420 }
1421
1422 if (ADV_LINK_SUPPORT(adapter)) {
1423 link_speed_mbps = adapter->link_speed_mbps;
1424 goto print_link_msg;
1425 }
1426
1427 switch (adapter->link_speed) {
1428 case VIRTCHNL_LINK_SPEED_40GB:
1429 link_speed_mbps = SPEED_40000;
1430 break;
1431 case VIRTCHNL_LINK_SPEED_25GB:
1432 link_speed_mbps = SPEED_25000;
1433 break;
1434 case VIRTCHNL_LINK_SPEED_20GB:
1435 link_speed_mbps = SPEED_20000;
1436 break;
1437 case VIRTCHNL_LINK_SPEED_10GB:
1438 link_speed_mbps = SPEED_10000;
1439 break;
1440 case VIRTCHNL_LINK_SPEED_5GB:
1441 link_speed_mbps = SPEED_5000;
1442 break;
1443 case VIRTCHNL_LINK_SPEED_2_5GB:
1444 link_speed_mbps = SPEED_2500;
1445 break;
1446 case VIRTCHNL_LINK_SPEED_1GB:
1447 link_speed_mbps = SPEED_1000;
1448 break;
1449 case VIRTCHNL_LINK_SPEED_100MB:
1450 link_speed_mbps = SPEED_100;
1451 break;
1452 default:
1453 link_speed_mbps = SPEED_UNKNOWN;
1454 break;
1455 }
1456
1457print_link_msg:
1458 if (link_speed_mbps > SPEED_1000) {
1459 if (link_speed_mbps == SPEED_2500) {
1460 speed = kasprintf(GFP_KERNEL, "%s", "2.5 Gbps");
1461 } else {
1462 /* convert to Gbps inline */
1463 speed = kasprintf(GFP_KERNEL, "%d Gbps",
1464 link_speed_mbps / 1000);
1465 }
1466 } else if (link_speed_mbps == SPEED_UNKNOWN) {
1467 speed = kasprintf(GFP_KERNEL, "%s", "Unknown Mbps");
1468 } else {
1469 speed = kasprintf(GFP_KERNEL, "%d Mbps", link_speed_mbps);
1470 }
1471
1472 netdev_info(netdev, "NIC Link is Up Speed is %s Full Duplex\n", speed);
1473 kfree(speed);
1474}
1475
1476/**
1477 * iavf_get_vpe_link_status
1478 * @adapter: adapter structure
1479 * @vpe: virtchnl_pf_event structure
1480 *
1481 * Helper function for determining the link status
1482 **/
1483static bool
1484iavf_get_vpe_link_status(struct iavf_adapter *adapter,
1485 struct virtchnl_pf_event *vpe)
1486{
1487 if (ADV_LINK_SUPPORT(adapter))
1488 return vpe->event_data.link_event_adv.link_status;
1489 else
1490 return vpe->event_data.link_event.link_status;
1491}
1492
1493/**
1494 * iavf_set_adapter_link_speed_from_vpe
1495 * @adapter: adapter structure for which we are setting the link speed
1496 * @vpe: virtchnl_pf_event structure that contains the link speed we are setting
1497 *
1498 * Helper function for setting iavf_adapter link speed
1499 **/
1500static void
1501iavf_set_adapter_link_speed_from_vpe(struct iavf_adapter *adapter,
1502 struct virtchnl_pf_event *vpe)
1503{
1504 if (ADV_LINK_SUPPORT(adapter))
1505 adapter->link_speed_mbps =
1506 vpe->event_data.link_event_adv.link_speed;
1507 else
1508 adapter->link_speed = vpe->event_data.link_event.link_speed;
1509}
1510
1511/**
1512 * iavf_get_qos_caps - get qos caps support
1513 * @adapter: iavf adapter struct instance
1514 *
1515 * This function requests PF for Supported QoS Caps.
1516 */
1517void iavf_get_qos_caps(struct iavf_adapter *adapter)
1518{
1519 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1520 /* bail because we already have a command pending */
1521 dev_err(&adapter->pdev->dev,
1522 "Cannot get qos caps, command %d pending\n",
1523 adapter->current_op);
1524 return;
1525 }
1526
1527 adapter->current_op = VIRTCHNL_OP_GET_QOS_CAPS;
1528 adapter->aq_required &= ~IAVF_FLAG_AQ_GET_QOS_CAPS;
1529 iavf_send_pf_msg(adapter, VIRTCHNL_OP_GET_QOS_CAPS, NULL, 0);
1530}
1531
1532/**
1533 * iavf_set_quanta_size - set quanta size of queue chunk
1534 * @adapter: iavf adapter struct instance
1535 * @quanta_size: quanta size in bytes
1536 * @queue_index: starting index of queue chunk
1537 * @num_queues: number of queues in the queue chunk
1538 *
1539 * This function requests PF to set quanta size of queue chunk
1540 * starting at queue_index.
1541 */
1542static void
1543iavf_set_quanta_size(struct iavf_adapter *adapter, u16 quanta_size,
1544 u16 queue_index, u16 num_queues)
1545{
1546 struct virtchnl_quanta_cfg quanta_cfg;
1547
1548 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1549 /* bail because we already have a command pending */
1550 dev_err(&adapter->pdev->dev,
1551 "Cannot set queue quanta size, command %d pending\n",
1552 adapter->current_op);
1553 return;
1554 }
1555
1556 adapter->current_op = VIRTCHNL_OP_CONFIG_QUANTA;
1557 quanta_cfg.quanta_size = quanta_size;
1558 quanta_cfg.queue_select.type = VIRTCHNL_QUEUE_TYPE_TX;
1559 quanta_cfg.queue_select.start_queue_id = queue_index;
1560 quanta_cfg.queue_select.num_queues = num_queues;
1561 adapter->aq_required &= ~IAVF_FLAG_AQ_CFG_QUEUES_QUANTA_SIZE;
1562 iavf_send_pf_msg(adapter, VIRTCHNL_OP_CONFIG_QUANTA,
1563 (u8 *)&quanta_cfg, sizeof(quanta_cfg));
1564}
1565
1566/**
1567 * iavf_cfg_queues_quanta_size - configure quanta size of queues
1568 * @adapter: adapter structure
1569 *
1570 * Request that the PF configure quanta size of allocated queues.
1571 **/
1572void iavf_cfg_queues_quanta_size(struct iavf_adapter *adapter)
1573{
1574 int quanta_size = IAVF_DEFAULT_QUANTA_SIZE;
1575
1576 /* Set Queue Quanta Size to default */
1577 iavf_set_quanta_size(adapter, quanta_size, 0,
1578 adapter->num_active_queues);
1579}
1580
1581/**
1582 * iavf_cfg_queues_bw - configure bandwidth of allocated queues
1583 * @adapter: iavf adapter structure instance
1584 *
1585 * This function requests PF to configure queue bandwidth of allocated queues
1586 */
1587void iavf_cfg_queues_bw(struct iavf_adapter *adapter)
1588{
1589 struct virtchnl_queues_bw_cfg *qs_bw_cfg;
1590 struct net_shaper *q_shaper;
1591 int qs_to_update = 0;
1592 int i, inx = 0;
1593 size_t len;
1594
1595 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1596 /* bail because we already have a command pending */
1597 dev_err(&adapter->pdev->dev,
1598 "Cannot set tc queue bw, command %d pending\n",
1599 adapter->current_op);
1600 return;
1601 }
1602
1603 for (i = 0; i < adapter->num_active_queues; i++) {
1604 if (adapter->tx_rings[i].q_shaper_update)
1605 qs_to_update++;
1606 }
1607 len = struct_size(qs_bw_cfg, cfg, qs_to_update);
1608 qs_bw_cfg = kzalloc(len, GFP_KERNEL);
1609 if (!qs_bw_cfg)
1610 return;
1611
1612 qs_bw_cfg->vsi_id = adapter->vsi.id;
1613 qs_bw_cfg->num_queues = qs_to_update;
1614
1615 for (i = 0; i < adapter->num_active_queues; i++) {
1616 struct iavf_ring *tx_ring = &adapter->tx_rings[i];
1617
1618 q_shaper = &tx_ring->q_shaper;
1619 if (tx_ring->q_shaper_update) {
1620 qs_bw_cfg->cfg[inx].queue_id = i;
1621 qs_bw_cfg->cfg[inx].shaper.peak = q_shaper->bw_max;
1622 qs_bw_cfg->cfg[inx].shaper.committed = q_shaper->bw_min;
1623 qs_bw_cfg->cfg[inx].tc = 0;
1624 inx++;
1625 }
1626 }
1627
1628 adapter->current_op = VIRTCHNL_OP_CONFIG_QUEUE_BW;
1629 adapter->aq_required &= ~IAVF_FLAG_AQ_CONFIGURE_QUEUES_BW;
1630 iavf_send_pf_msg(adapter, VIRTCHNL_OP_CONFIG_QUEUE_BW,
1631 (u8 *)qs_bw_cfg, len);
1632 kfree(qs_bw_cfg);
1633}
1634
1635/**
1636 * iavf_enable_channels
1637 * @adapter: adapter structure
1638 *
1639 * Request that the PF enable channels as specified by
1640 * the user via tc tool.
1641 **/
1642void iavf_enable_channels(struct iavf_adapter *adapter)
1643{
1644 struct virtchnl_tc_info *vti = NULL;
1645 size_t len;
1646 int i;
1647
1648 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1649 /* bail because we already have a command pending */
1650 dev_err(&adapter->pdev->dev, "Cannot configure mqprio, command %d pending\n",
1651 adapter->current_op);
1652 return;
1653 }
1654
1655 len = virtchnl_struct_size(vti, list, adapter->num_tc);
1656 vti = kzalloc(len, GFP_KERNEL);
1657 if (!vti)
1658 return;
1659 vti->num_tc = adapter->num_tc;
1660 for (i = 0; i < vti->num_tc; i++) {
1661 vti->list[i].count = adapter->ch_config.ch_info[i].count;
1662 vti->list[i].offset = adapter->ch_config.ch_info[i].offset;
1663 vti->list[i].pad = 0;
1664 vti->list[i].max_tx_rate =
1665 adapter->ch_config.ch_info[i].max_tx_rate;
1666 }
1667
1668 adapter->ch_config.state = __IAVF_TC_RUNNING;
1669 adapter->flags |= IAVF_FLAG_REINIT_ITR_NEEDED;
1670 adapter->current_op = VIRTCHNL_OP_ENABLE_CHANNELS;
1671 adapter->aq_required &= ~IAVF_FLAG_AQ_ENABLE_CHANNELS;
1672 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ENABLE_CHANNELS, (u8 *)vti, len);
1673 kfree(vti);
1674}
1675
1676/**
1677 * iavf_disable_channels
1678 * @adapter: adapter structure
1679 *
1680 * Request that the PF disable channels that are configured
1681 **/
1682void iavf_disable_channels(struct iavf_adapter *adapter)
1683{
1684 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1685 /* bail because we already have a command pending */
1686 dev_err(&adapter->pdev->dev, "Cannot configure mqprio, command %d pending\n",
1687 adapter->current_op);
1688 return;
1689 }
1690
1691 adapter->ch_config.state = __IAVF_TC_INVALID;
1692 adapter->flags |= IAVF_FLAG_REINIT_ITR_NEEDED;
1693 adapter->current_op = VIRTCHNL_OP_DISABLE_CHANNELS;
1694 adapter->aq_required &= ~IAVF_FLAG_AQ_DISABLE_CHANNELS;
1695 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DISABLE_CHANNELS, NULL, 0);
1696}
1697
1698/**
1699 * iavf_print_cloud_filter
1700 * @adapter: adapter structure
1701 * @f: cloud filter to print
1702 *
1703 * Print the cloud filter
1704 **/
1705static void iavf_print_cloud_filter(struct iavf_adapter *adapter,
1706 struct virtchnl_filter *f)
1707{
1708 switch (f->flow_type) {
1709 case VIRTCHNL_TCP_V4_FLOW:
1710 dev_info(&adapter->pdev->dev, "dst_mac: %pM src_mac: %pM vlan_id: %hu dst_ip: %pI4 src_ip %pI4 dst_port %hu src_port %hu\n",
1711 &f->data.tcp_spec.dst_mac,
1712 &f->data.tcp_spec.src_mac,
1713 ntohs(f->data.tcp_spec.vlan_id),
1714 &f->data.tcp_spec.dst_ip[0],
1715 &f->data.tcp_spec.src_ip[0],
1716 ntohs(f->data.tcp_spec.dst_port),
1717 ntohs(f->data.tcp_spec.src_port));
1718 break;
1719 case VIRTCHNL_TCP_V6_FLOW:
1720 dev_info(&adapter->pdev->dev, "dst_mac: %pM src_mac: %pM vlan_id: %hu dst_ip: %pI6 src_ip %pI6 dst_port %hu src_port %hu\n",
1721 &f->data.tcp_spec.dst_mac,
1722 &f->data.tcp_spec.src_mac,
1723 ntohs(f->data.tcp_spec.vlan_id),
1724 &f->data.tcp_spec.dst_ip,
1725 &f->data.tcp_spec.src_ip,
1726 ntohs(f->data.tcp_spec.dst_port),
1727 ntohs(f->data.tcp_spec.src_port));
1728 break;
1729 }
1730}
1731
1732/**
1733 * iavf_add_cloud_filter
1734 * @adapter: adapter structure
1735 *
1736 * Request that the PF add cloud filters as specified
1737 * by the user via tc tool.
1738 **/
1739void iavf_add_cloud_filter(struct iavf_adapter *adapter)
1740{
1741 struct iavf_cloud_filter *cf;
1742 struct virtchnl_filter *f;
1743 int len = 0, count = 0;
1744
1745 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1746 /* bail because we already have a command pending */
1747 dev_err(&adapter->pdev->dev, "Cannot add cloud filter, command %d pending\n",
1748 adapter->current_op);
1749 return;
1750 }
1751 list_for_each_entry(cf, &adapter->cloud_filter_list, list) {
1752 if (cf->add) {
1753 count++;
1754 break;
1755 }
1756 }
1757 if (!count) {
1758 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_CLOUD_FILTER;
1759 return;
1760 }
1761 adapter->current_op = VIRTCHNL_OP_ADD_CLOUD_FILTER;
1762
1763 len = sizeof(struct virtchnl_filter);
1764 f = kzalloc(len, GFP_KERNEL);
1765 if (!f)
1766 return;
1767
1768 list_for_each_entry(cf, &adapter->cloud_filter_list, list) {
1769 if (cf->add) {
1770 memcpy(f, &cf->f, sizeof(struct virtchnl_filter));
1771 cf->add = false;
1772 cf->state = __IAVF_CF_ADD_PENDING;
1773 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ADD_CLOUD_FILTER,
1774 (u8 *)f, len);
1775 }
1776 }
1777 kfree(f);
1778}
1779
1780/**
1781 * iavf_del_cloud_filter
1782 * @adapter: adapter structure
1783 *
1784 * Request that the PF delete cloud filters as specified
1785 * by the user via tc tool.
1786 **/
1787void iavf_del_cloud_filter(struct iavf_adapter *adapter)
1788{
1789 struct iavf_cloud_filter *cf, *cftmp;
1790 struct virtchnl_filter *f;
1791 int len = 0, count = 0;
1792
1793 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1794 /* bail because we already have a command pending */
1795 dev_err(&adapter->pdev->dev, "Cannot remove cloud filter, command %d pending\n",
1796 adapter->current_op);
1797 return;
1798 }
1799 list_for_each_entry(cf, &adapter->cloud_filter_list, list) {
1800 if (cf->del) {
1801 count++;
1802 break;
1803 }
1804 }
1805 if (!count) {
1806 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_CLOUD_FILTER;
1807 return;
1808 }
1809 adapter->current_op = VIRTCHNL_OP_DEL_CLOUD_FILTER;
1810
1811 len = sizeof(struct virtchnl_filter);
1812 f = kzalloc(len, GFP_KERNEL);
1813 if (!f)
1814 return;
1815
1816 list_for_each_entry_safe(cf, cftmp, &adapter->cloud_filter_list, list) {
1817 if (cf->del) {
1818 memcpy(f, &cf->f, sizeof(struct virtchnl_filter));
1819 cf->del = false;
1820 cf->state = __IAVF_CF_DEL_PENDING;
1821 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DEL_CLOUD_FILTER,
1822 (u8 *)f, len);
1823 }
1824 }
1825 kfree(f);
1826}
1827
1828/**
1829 * iavf_add_fdir_filter
1830 * @adapter: the VF adapter structure
1831 *
1832 * Request that the PF add Flow Director filters as specified
1833 * by the user via ethtool.
1834 **/
1835void iavf_add_fdir_filter(struct iavf_adapter *adapter)
1836{
1837 struct iavf_fdir_fltr *fdir;
1838 struct virtchnl_fdir_add *f;
1839 bool process_fltr = false;
1840 int len;
1841
1842 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1843 /* bail because we already have a command pending */
1844 dev_err(&adapter->pdev->dev, "Cannot add Flow Director filter, command %d pending\n",
1845 adapter->current_op);
1846 return;
1847 }
1848
1849 len = sizeof(struct virtchnl_fdir_add);
1850 f = kzalloc(len, GFP_KERNEL);
1851 if (!f)
1852 return;
1853
1854 spin_lock_bh(&adapter->fdir_fltr_lock);
1855 list_for_each_entry(fdir, &adapter->fdir_list_head, list) {
1856 if (fdir->state == IAVF_FDIR_FLTR_ADD_REQUEST) {
1857 process_fltr = true;
1858 fdir->state = IAVF_FDIR_FLTR_ADD_PENDING;
1859 memcpy(f, &fdir->vc_add_msg, len);
1860 break;
1861 }
1862 }
1863 spin_unlock_bh(&adapter->fdir_fltr_lock);
1864
1865 if (!process_fltr) {
1866 /* prevent iavf_add_fdir_filter() from being called when there
1867 * are no filters to add
1868 */
1869 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_FDIR_FILTER;
1870 kfree(f);
1871 return;
1872 }
1873 adapter->current_op = VIRTCHNL_OP_ADD_FDIR_FILTER;
1874 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ADD_FDIR_FILTER, (u8 *)f, len);
1875 kfree(f);
1876}
1877
1878/**
1879 * iavf_del_fdir_filter
1880 * @adapter: the VF adapter structure
1881 *
1882 * Request that the PF delete Flow Director filters as specified
1883 * by the user via ethtool.
1884 **/
1885void iavf_del_fdir_filter(struct iavf_adapter *adapter)
1886{
1887 struct virtchnl_fdir_del f = {};
1888 struct iavf_fdir_fltr *fdir;
1889 bool process_fltr = false;
1890 int len;
1891
1892 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1893 /* bail because we already have a command pending */
1894 dev_err(&adapter->pdev->dev, "Cannot remove Flow Director filter, command %d pending\n",
1895 adapter->current_op);
1896 return;
1897 }
1898
1899 len = sizeof(struct virtchnl_fdir_del);
1900
1901 spin_lock_bh(&adapter->fdir_fltr_lock);
1902 list_for_each_entry(fdir, &adapter->fdir_list_head, list) {
1903 if (fdir->state == IAVF_FDIR_FLTR_DEL_REQUEST) {
1904 process_fltr = true;
1905 f.vsi_id = fdir->vc_add_msg.vsi_id;
1906 f.flow_id = fdir->flow_id;
1907 fdir->state = IAVF_FDIR_FLTR_DEL_PENDING;
1908 break;
1909 } else if (fdir->state == IAVF_FDIR_FLTR_DIS_REQUEST) {
1910 process_fltr = true;
1911 f.vsi_id = fdir->vc_add_msg.vsi_id;
1912 f.flow_id = fdir->flow_id;
1913 fdir->state = IAVF_FDIR_FLTR_DIS_PENDING;
1914 break;
1915 }
1916 }
1917 spin_unlock_bh(&adapter->fdir_fltr_lock);
1918
1919 if (!process_fltr) {
1920 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_FDIR_FILTER;
1921 return;
1922 }
1923
1924 adapter->current_op = VIRTCHNL_OP_DEL_FDIR_FILTER;
1925 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DEL_FDIR_FILTER, (u8 *)&f, len);
1926}
1927
1928/**
1929 * iavf_add_adv_rss_cfg
1930 * @adapter: the VF adapter structure
1931 *
1932 * Request that the PF add RSS configuration as specified
1933 * by the user via ethtool.
1934 **/
1935void iavf_add_adv_rss_cfg(struct iavf_adapter *adapter)
1936{
1937 struct virtchnl_rss_cfg *rss_cfg;
1938 struct iavf_adv_rss *rss;
1939 bool process_rss = false;
1940 int len;
1941
1942 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1943 /* bail because we already have a command pending */
1944 dev_err(&adapter->pdev->dev, "Cannot add RSS configuration, command %d pending\n",
1945 adapter->current_op);
1946 return;
1947 }
1948
1949 len = sizeof(struct virtchnl_rss_cfg);
1950 rss_cfg = kzalloc(len, GFP_KERNEL);
1951 if (!rss_cfg)
1952 return;
1953
1954 spin_lock_bh(&adapter->adv_rss_lock);
1955 list_for_each_entry(rss, &adapter->adv_rss_list_head, list) {
1956 if (rss->state == IAVF_ADV_RSS_ADD_REQUEST) {
1957 process_rss = true;
1958 rss->state = IAVF_ADV_RSS_ADD_PENDING;
1959 memcpy(rss_cfg, &rss->cfg_msg, len);
1960 iavf_print_adv_rss_cfg(adapter, rss,
1961 "Input set change for",
1962 "is pending");
1963 break;
1964 }
1965 }
1966 spin_unlock_bh(&adapter->adv_rss_lock);
1967
1968 if (process_rss) {
1969 adapter->current_op = VIRTCHNL_OP_ADD_RSS_CFG;
1970 iavf_send_pf_msg(adapter, VIRTCHNL_OP_ADD_RSS_CFG,
1971 (u8 *)rss_cfg, len);
1972 } else {
1973 adapter->aq_required &= ~IAVF_FLAG_AQ_ADD_ADV_RSS_CFG;
1974 }
1975
1976 kfree(rss_cfg);
1977}
1978
1979/**
1980 * iavf_del_adv_rss_cfg
1981 * @adapter: the VF adapter structure
1982 *
1983 * Request that the PF delete RSS configuration as specified
1984 * by the user via ethtool.
1985 **/
1986void iavf_del_adv_rss_cfg(struct iavf_adapter *adapter)
1987{
1988 struct virtchnl_rss_cfg *rss_cfg;
1989 struct iavf_adv_rss *rss;
1990 bool process_rss = false;
1991 int len;
1992
1993 if (adapter->current_op != VIRTCHNL_OP_UNKNOWN) {
1994 /* bail because we already have a command pending */
1995 dev_err(&adapter->pdev->dev, "Cannot remove RSS configuration, command %d pending\n",
1996 adapter->current_op);
1997 return;
1998 }
1999
2000 len = sizeof(struct virtchnl_rss_cfg);
2001 rss_cfg = kzalloc(len, GFP_KERNEL);
2002 if (!rss_cfg)
2003 return;
2004
2005 spin_lock_bh(&adapter->adv_rss_lock);
2006 list_for_each_entry(rss, &adapter->adv_rss_list_head, list) {
2007 if (rss->state == IAVF_ADV_RSS_DEL_REQUEST) {
2008 process_rss = true;
2009 rss->state = IAVF_ADV_RSS_DEL_PENDING;
2010 memcpy(rss_cfg, &rss->cfg_msg, len);
2011 break;
2012 }
2013 }
2014 spin_unlock_bh(&adapter->adv_rss_lock);
2015
2016 if (process_rss) {
2017 adapter->current_op = VIRTCHNL_OP_DEL_RSS_CFG;
2018 iavf_send_pf_msg(adapter, VIRTCHNL_OP_DEL_RSS_CFG,
2019 (u8 *)rss_cfg, len);
2020 } else {
2021 adapter->aq_required &= ~IAVF_FLAG_AQ_DEL_ADV_RSS_CFG;
2022 }
2023
2024 kfree(rss_cfg);
2025}
2026
2027/**
2028 * iavf_request_reset
2029 * @adapter: adapter structure
2030 *
2031 * Request that the PF reset this VF. No response is expected.
2032 **/
2033int iavf_request_reset(struct iavf_adapter *adapter)
2034{
2035 int err;
2036 /* Don't check CURRENT_OP - this is always higher priority */
2037 err = iavf_send_pf_msg(adapter, VIRTCHNL_OP_RESET_VF, NULL, 0);
2038 adapter->current_op = VIRTCHNL_OP_UNKNOWN;
2039 return err;
2040}
2041
2042/**
2043 * iavf_netdev_features_vlan_strip_set - update vlan strip status
2044 * @netdev: ptr to netdev being adjusted
2045 * @enable: enable or disable vlan strip
2046 *
2047 * Helper function to change vlan strip status in netdev->features.
2048 */
2049static void iavf_netdev_features_vlan_strip_set(struct net_device *netdev,
2050 const bool enable)
2051{
2052 if (enable)
2053 netdev->features |= NETIF_F_HW_VLAN_CTAG_RX;
2054 else
2055 netdev->features &= ~NETIF_F_HW_VLAN_CTAG_RX;
2056}
2057
2058/**
2059 * iavf_activate_fdir_filters - Reactivate all FDIR filters after a reset
2060 * @adapter: private adapter structure
2061 *
2062 * Called after a reset to re-add all FDIR filters and delete some of them
2063 * if they were pending to be deleted.
2064 */
2065static void iavf_activate_fdir_filters(struct iavf_adapter *adapter)
2066{
2067 struct iavf_fdir_fltr *f, *ftmp;
2068 bool add_filters = false;
2069
2070 spin_lock_bh(&adapter->fdir_fltr_lock);
2071 list_for_each_entry_safe(f, ftmp, &adapter->fdir_list_head, list) {
2072 if (f->state == IAVF_FDIR_FLTR_ADD_REQUEST ||
2073 f->state == IAVF_FDIR_FLTR_ADD_PENDING ||
2074 f->state == IAVF_FDIR_FLTR_ACTIVE) {
2075 /* All filters and requests have been removed in PF,
2076 * restore them
2077 */
2078 f->state = IAVF_FDIR_FLTR_ADD_REQUEST;
2079 add_filters = true;
2080 } else if (f->state == IAVF_FDIR_FLTR_DIS_REQUEST ||
2081 f->state == IAVF_FDIR_FLTR_DIS_PENDING) {
2082 /* Link down state, leave filters as inactive */
2083 f->state = IAVF_FDIR_FLTR_INACTIVE;
2084 } else if (f->state == IAVF_FDIR_FLTR_DEL_REQUEST ||
2085 f->state == IAVF_FDIR_FLTR_DEL_PENDING) {
2086 /* Delete filters that were pending to be deleted, the
2087 * list on PF is already cleared after a reset
2088 */
2089 list_del(&f->list);
2090 iavf_dec_fdir_active_fltr(adapter, f);
2091 kfree(f);
2092 }
2093 }
2094 spin_unlock_bh(&adapter->fdir_fltr_lock);
2095
2096 if (add_filters)
2097 adapter->aq_required |= IAVF_FLAG_AQ_ADD_FDIR_FILTER;
2098}
2099
2100/**
2101 * iavf_virtchnl_completion
2102 * @adapter: adapter structure
2103 * @v_opcode: opcode sent by PF
2104 * @v_retval: retval sent by PF
2105 * @msg: message sent by PF
2106 * @msglen: message length
2107 *
2108 * Asynchronous completion function for admin queue messages. Rather than busy
2109 * wait, we fire off our requests and assume that no errors will be returned.
2110 * This function handles the reply messages.
2111 **/
2112void iavf_virtchnl_completion(struct iavf_adapter *adapter,
2113 enum virtchnl_ops v_opcode,
2114 enum iavf_status v_retval, u8 *msg, u16 msglen)
2115{
2116 struct net_device *netdev = adapter->netdev;
2117
2118 if (v_opcode == VIRTCHNL_OP_EVENT) {
2119 struct virtchnl_pf_event *vpe =
2120 (struct virtchnl_pf_event *)msg;
2121 bool link_up = iavf_get_vpe_link_status(adapter, vpe);
2122
2123 switch (vpe->event) {
2124 case VIRTCHNL_EVENT_LINK_CHANGE:
2125 iavf_set_adapter_link_speed_from_vpe(adapter, vpe);
2126
2127 /* we've already got the right link status, bail */
2128 if (adapter->link_up == link_up)
2129 break;
2130
2131 if (link_up) {
2132 /* If we get link up message and start queues
2133 * before our queues are configured it will
2134 * trigger a TX hang. In that case, just ignore
2135 * the link status message,we'll get another one
2136 * after we enable queues and actually prepared
2137 * to send traffic.
2138 */
2139 if (adapter->state != __IAVF_RUNNING)
2140 break;
2141
2142 /* For ADq enabled VF, we reconfigure VSIs and
2143 * re-allocate queues. Hence wait till all
2144 * queues are enabled.
2145 */
2146 if (adapter->flags &
2147 IAVF_FLAG_QUEUES_DISABLED)
2148 break;
2149 }
2150
2151 adapter->link_up = link_up;
2152 if (link_up) {
2153 netif_tx_start_all_queues(netdev);
2154 netif_carrier_on(netdev);
2155 } else {
2156 netif_tx_stop_all_queues(netdev);
2157 netif_carrier_off(netdev);
2158 }
2159 iavf_print_link_message(adapter);
2160 break;
2161 case VIRTCHNL_EVENT_RESET_IMPENDING:
2162 dev_info(&adapter->pdev->dev, "Reset indication received from the PF\n");
2163 if (!(adapter->flags & IAVF_FLAG_RESET_PENDING)) {
2164 dev_info(&adapter->pdev->dev, "Scheduling reset task\n");
2165 iavf_schedule_reset(adapter, IAVF_FLAG_RESET_PENDING);
2166 }
2167 break;
2168 default:
2169 dev_err(&adapter->pdev->dev, "Unknown event %d from PF\n",
2170 vpe->event);
2171 break;
2172 }
2173 return;
2174 }
2175 if (v_retval) {
2176 switch (v_opcode) {
2177 case VIRTCHNL_OP_ADD_VLAN:
2178 dev_err(&adapter->pdev->dev, "Failed to add VLAN filter, error %s\n",
2179 iavf_stat_str(&adapter->hw, v_retval));
2180 break;
2181 case VIRTCHNL_OP_ADD_ETH_ADDR:
2182 dev_err(&adapter->pdev->dev, "Failed to add MAC filter, error %s\n",
2183 iavf_stat_str(&adapter->hw, v_retval));
2184 iavf_mac_add_reject(adapter);
2185 /* restore administratively set MAC address */
2186 ether_addr_copy(adapter->hw.mac.addr, netdev->dev_addr);
2187 wake_up(&adapter->vc_waitqueue);
2188 break;
2189 case VIRTCHNL_OP_DEL_VLAN:
2190 dev_err(&adapter->pdev->dev, "Failed to delete VLAN filter, error %s\n",
2191 iavf_stat_str(&adapter->hw, v_retval));
2192 break;
2193 case VIRTCHNL_OP_DEL_ETH_ADDR:
2194 dev_err(&adapter->pdev->dev, "Failed to delete MAC filter, error %s\n",
2195 iavf_stat_str(&adapter->hw, v_retval));
2196 break;
2197 case VIRTCHNL_OP_ENABLE_CHANNELS:
2198 dev_err(&adapter->pdev->dev, "Failed to configure queue channels, error %s\n",
2199 iavf_stat_str(&adapter->hw, v_retval));
2200 adapter->flags &= ~IAVF_FLAG_REINIT_ITR_NEEDED;
2201 adapter->ch_config.state = __IAVF_TC_INVALID;
2202 netdev_reset_tc(netdev);
2203 netif_tx_start_all_queues(netdev);
2204 break;
2205 case VIRTCHNL_OP_DISABLE_CHANNELS:
2206 dev_err(&adapter->pdev->dev, "Failed to disable queue channels, error %s\n",
2207 iavf_stat_str(&adapter->hw, v_retval));
2208 adapter->flags &= ~IAVF_FLAG_REINIT_ITR_NEEDED;
2209 adapter->ch_config.state = __IAVF_TC_RUNNING;
2210 netif_tx_start_all_queues(netdev);
2211 break;
2212 case VIRTCHNL_OP_ADD_CLOUD_FILTER: {
2213 struct iavf_cloud_filter *cf, *cftmp;
2214
2215 list_for_each_entry_safe(cf, cftmp,
2216 &adapter->cloud_filter_list,
2217 list) {
2218 if (cf->state == __IAVF_CF_ADD_PENDING) {
2219 cf->state = __IAVF_CF_INVALID;
2220 dev_info(&adapter->pdev->dev, "Failed to add cloud filter, error %s\n",
2221 iavf_stat_str(&adapter->hw,
2222 v_retval));
2223 iavf_print_cloud_filter(adapter,
2224 &cf->f);
2225 list_del(&cf->list);
2226 kfree(cf);
2227 adapter->num_cloud_filters--;
2228 }
2229 }
2230 }
2231 break;
2232 case VIRTCHNL_OP_DEL_CLOUD_FILTER: {
2233 struct iavf_cloud_filter *cf;
2234
2235 list_for_each_entry(cf, &adapter->cloud_filter_list,
2236 list) {
2237 if (cf->state == __IAVF_CF_DEL_PENDING) {
2238 cf->state = __IAVF_CF_ACTIVE;
2239 dev_info(&adapter->pdev->dev, "Failed to del cloud filter, error %s\n",
2240 iavf_stat_str(&adapter->hw,
2241 v_retval));
2242 iavf_print_cloud_filter(adapter,
2243 &cf->f);
2244 }
2245 }
2246 }
2247 break;
2248 case VIRTCHNL_OP_ADD_FDIR_FILTER: {
2249 struct iavf_fdir_fltr *fdir, *fdir_tmp;
2250
2251 spin_lock_bh(&adapter->fdir_fltr_lock);
2252 list_for_each_entry_safe(fdir, fdir_tmp,
2253 &adapter->fdir_list_head,
2254 list) {
2255 if (fdir->state == IAVF_FDIR_FLTR_ADD_PENDING) {
2256 dev_info(&adapter->pdev->dev, "Failed to add Flow Director filter, error %s\n",
2257 iavf_stat_str(&adapter->hw,
2258 v_retval));
2259 iavf_print_fdir_fltr(adapter, fdir);
2260 if (msglen)
2261 dev_err(&adapter->pdev->dev,
2262 "%s\n", msg);
2263 list_del(&fdir->list);
2264 iavf_dec_fdir_active_fltr(adapter, fdir);
2265 kfree(fdir);
2266 }
2267 }
2268 spin_unlock_bh(&adapter->fdir_fltr_lock);
2269 }
2270 break;
2271 case VIRTCHNL_OP_DEL_FDIR_FILTER: {
2272 struct iavf_fdir_fltr *fdir;
2273
2274 spin_lock_bh(&adapter->fdir_fltr_lock);
2275 list_for_each_entry(fdir, &adapter->fdir_list_head,
2276 list) {
2277 if (fdir->state == IAVF_FDIR_FLTR_DEL_PENDING ||
2278 fdir->state == IAVF_FDIR_FLTR_DIS_PENDING) {
2279 fdir->state = IAVF_FDIR_FLTR_ACTIVE;
2280 dev_info(&adapter->pdev->dev, "Failed to del Flow Director filter, error %s\n",
2281 iavf_stat_str(&adapter->hw,
2282 v_retval));
2283 iavf_print_fdir_fltr(adapter, fdir);
2284 }
2285 }
2286 spin_unlock_bh(&adapter->fdir_fltr_lock);
2287 }
2288 break;
2289 case VIRTCHNL_OP_ADD_RSS_CFG: {
2290 struct iavf_adv_rss *rss, *rss_tmp;
2291
2292 spin_lock_bh(&adapter->adv_rss_lock);
2293 list_for_each_entry_safe(rss, rss_tmp,
2294 &adapter->adv_rss_list_head,
2295 list) {
2296 if (rss->state == IAVF_ADV_RSS_ADD_PENDING) {
2297 iavf_print_adv_rss_cfg(adapter, rss,
2298 "Failed to change the input set for",
2299 NULL);
2300 list_del(&rss->list);
2301 kfree(rss);
2302 }
2303 }
2304 spin_unlock_bh(&adapter->adv_rss_lock);
2305 }
2306 break;
2307 case VIRTCHNL_OP_DEL_RSS_CFG: {
2308 struct iavf_adv_rss *rss;
2309
2310 spin_lock_bh(&adapter->adv_rss_lock);
2311 list_for_each_entry(rss, &adapter->adv_rss_list_head,
2312 list) {
2313 if (rss->state == IAVF_ADV_RSS_DEL_PENDING) {
2314 rss->state = IAVF_ADV_RSS_ACTIVE;
2315 dev_err(&adapter->pdev->dev, "Failed to delete RSS configuration, error %s\n",
2316 iavf_stat_str(&adapter->hw,
2317 v_retval));
2318 }
2319 }
2320 spin_unlock_bh(&adapter->adv_rss_lock);
2321 }
2322 break;
2323 case VIRTCHNL_OP_ENABLE_VLAN_STRIPPING:
2324 dev_warn(&adapter->pdev->dev, "Changing VLAN Stripping is not allowed when Port VLAN is configured\n");
2325 /* Vlan stripping could not be enabled by ethtool.
2326 * Disable it in netdev->features.
2327 */
2328 iavf_netdev_features_vlan_strip_set(netdev, false);
2329 break;
2330 case VIRTCHNL_OP_DISABLE_VLAN_STRIPPING:
2331 dev_warn(&adapter->pdev->dev, "Changing VLAN Stripping is not allowed when Port VLAN is configured\n");
2332 /* Vlan stripping could not be disabled by ethtool.
2333 * Enable it in netdev->features.
2334 */
2335 iavf_netdev_features_vlan_strip_set(netdev, true);
2336 break;
2337 case VIRTCHNL_OP_ADD_VLAN_V2:
2338 iavf_vlan_add_reject(adapter);
2339 dev_warn(&adapter->pdev->dev, "Failed to add VLAN filter, error %s\n",
2340 iavf_stat_str(&adapter->hw, v_retval));
2341 break;
2342 case VIRTCHNL_OP_CONFIG_RSS_HFUNC:
2343 dev_warn(&adapter->pdev->dev, "Failed to configure hash function, error %s\n",
2344 iavf_stat_str(&adapter->hw, v_retval));
2345
2346 if (adapter->hfunc ==
2347 VIRTCHNL_RSS_ALG_TOEPLITZ_SYMMETRIC)
2348 adapter->hfunc =
2349 VIRTCHNL_RSS_ALG_TOEPLITZ_ASYMMETRIC;
2350 else
2351 adapter->hfunc =
2352 VIRTCHNL_RSS_ALG_TOEPLITZ_SYMMETRIC;
2353
2354 break;
2355 case VIRTCHNL_OP_GET_QOS_CAPS:
2356 dev_warn(&adapter->pdev->dev, "Failed to Get Qos CAPs, error %s\n",
2357 iavf_stat_str(&adapter->hw, v_retval));
2358 break;
2359 case VIRTCHNL_OP_CONFIG_QUANTA:
2360 dev_warn(&adapter->pdev->dev, "Failed to Config Quanta, error %s\n",
2361 iavf_stat_str(&adapter->hw, v_retval));
2362 break;
2363 case VIRTCHNL_OP_CONFIG_QUEUE_BW:
2364 dev_warn(&adapter->pdev->dev, "Failed to Config Queue BW, error %s\n",
2365 iavf_stat_str(&adapter->hw, v_retval));
2366 break;
2367 default:
2368 dev_err(&adapter->pdev->dev, "PF returned error %d (%s) to our request %d\n",
2369 v_retval, iavf_stat_str(&adapter->hw, v_retval),
2370 v_opcode);
2371 }
2372 }
2373 switch (v_opcode) {
2374 case VIRTCHNL_OP_ADD_ETH_ADDR:
2375 if (!v_retval)
2376 iavf_mac_add_ok(adapter);
2377 if (!ether_addr_equal(netdev->dev_addr, adapter->hw.mac.addr))
2378 if (!ether_addr_equal(netdev->dev_addr,
2379 adapter->hw.mac.addr)) {
2380 netif_addr_lock_bh(netdev);
2381 eth_hw_addr_set(netdev, adapter->hw.mac.addr);
2382 netif_addr_unlock_bh(netdev);
2383 }
2384 wake_up(&adapter->vc_waitqueue);
2385 break;
2386 case VIRTCHNL_OP_GET_STATS: {
2387 struct iavf_eth_stats *stats =
2388 (struct iavf_eth_stats *)msg;
2389 netdev->stats.rx_packets = stats->rx_unicast +
2390 stats->rx_multicast +
2391 stats->rx_broadcast;
2392 netdev->stats.tx_packets = stats->tx_unicast +
2393 stats->tx_multicast +
2394 stats->tx_broadcast;
2395 netdev->stats.rx_bytes = stats->rx_bytes;
2396 netdev->stats.tx_bytes = stats->tx_bytes;
2397 netdev->stats.tx_errors = stats->tx_errors;
2398 netdev->stats.rx_dropped = stats->rx_discards;
2399 netdev->stats.tx_dropped = stats->tx_discards;
2400 adapter->current_stats = *stats;
2401 }
2402 break;
2403 case VIRTCHNL_OP_GET_VF_RESOURCES: {
2404 u16 len = IAVF_VIRTCHNL_VF_RESOURCE_SIZE;
2405
2406 memcpy(adapter->vf_res, msg, min(msglen, len));
2407 iavf_validate_num_queues(adapter);
2408 iavf_vf_parse_hw_config(&adapter->hw, adapter->vf_res);
2409 if (is_zero_ether_addr(adapter->hw.mac.addr)) {
2410 /* restore current mac address */
2411 ether_addr_copy(adapter->hw.mac.addr, netdev->dev_addr);
2412 } else {
2413 netif_addr_lock_bh(netdev);
2414 /* refresh current mac address if changed */
2415 ether_addr_copy(netdev->perm_addr,
2416 adapter->hw.mac.addr);
2417 netif_addr_unlock_bh(netdev);
2418 }
2419 spin_lock_bh(&adapter->mac_vlan_list_lock);
2420 iavf_add_filter(adapter, adapter->hw.mac.addr);
2421
2422 if (VLAN_ALLOWED(adapter)) {
2423 if (!list_empty(&adapter->vlan_filter_list)) {
2424 struct iavf_vlan_filter *vlf;
2425
2426 /* re-add all VLAN filters over virtchnl */
2427 list_for_each_entry(vlf,
2428 &adapter->vlan_filter_list,
2429 list)
2430 vlf->state = IAVF_VLAN_ADD;
2431
2432 adapter->aq_required |=
2433 IAVF_FLAG_AQ_ADD_VLAN_FILTER;
2434 }
2435 }
2436
2437 spin_unlock_bh(&adapter->mac_vlan_list_lock);
2438
2439 iavf_activate_fdir_filters(adapter);
2440
2441 iavf_parse_vf_resource_msg(adapter);
2442
2443 /* negotiated VIRTCHNL_VF_OFFLOAD_VLAN_V2, so wait for the
2444 * response to VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS to finish
2445 * configuration
2446 */
2447 if (VLAN_V2_ALLOWED(adapter))
2448 break;
2449 /* fallthrough and finish config if VIRTCHNL_VF_OFFLOAD_VLAN_V2
2450 * wasn't successfully negotiated with the PF
2451 */
2452 }
2453 fallthrough;
2454 case VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS: {
2455 struct iavf_mac_filter *f;
2456 bool was_mac_changed;
2457 u64 aq_required = 0;
2458
2459 if (v_opcode == VIRTCHNL_OP_GET_OFFLOAD_VLAN_V2_CAPS)
2460 memcpy(&adapter->vlan_v2_caps, msg,
2461 min_t(u16, msglen,
2462 sizeof(adapter->vlan_v2_caps)));
2463
2464 iavf_process_config(adapter);
2465 adapter->flags |= IAVF_FLAG_SETUP_NETDEV_FEATURES;
2466 iavf_schedule_finish_config(adapter);
2467
2468 iavf_set_queue_vlan_tag_loc(adapter);
2469
2470 was_mac_changed = !ether_addr_equal(netdev->dev_addr,
2471 adapter->hw.mac.addr);
2472
2473 spin_lock_bh(&adapter->mac_vlan_list_lock);
2474
2475 /* re-add all MAC filters */
2476 list_for_each_entry(f, &adapter->mac_filter_list, list) {
2477 if (was_mac_changed &&
2478 ether_addr_equal(netdev->dev_addr, f->macaddr))
2479 ether_addr_copy(f->macaddr,
2480 adapter->hw.mac.addr);
2481
2482 f->is_new_mac = true;
2483 f->add = true;
2484 f->add_handled = false;
2485 f->remove = false;
2486 }
2487
2488 /* re-add all VLAN filters */
2489 if (VLAN_FILTERING_ALLOWED(adapter)) {
2490 struct iavf_vlan_filter *vlf;
2491
2492 if (!list_empty(&adapter->vlan_filter_list)) {
2493 list_for_each_entry(vlf,
2494 &adapter->vlan_filter_list,
2495 list)
2496 vlf->state = IAVF_VLAN_ADD;
2497
2498 aq_required |= IAVF_FLAG_AQ_ADD_VLAN_FILTER;
2499 }
2500 }
2501
2502 spin_unlock_bh(&adapter->mac_vlan_list_lock);
2503
2504 netif_addr_lock_bh(netdev);
2505 eth_hw_addr_set(netdev, adapter->hw.mac.addr);
2506 netif_addr_unlock_bh(netdev);
2507
2508 adapter->aq_required |= IAVF_FLAG_AQ_ADD_MAC_FILTER |
2509 aq_required;
2510 }
2511 break;
2512 case VIRTCHNL_OP_ENABLE_QUEUES:
2513 /* enable transmits */
2514 iavf_irq_enable(adapter, true);
2515 wake_up(&adapter->reset_waitqueue);
2516 adapter->flags &= ~IAVF_FLAG_QUEUES_DISABLED;
2517 break;
2518 case VIRTCHNL_OP_DISABLE_QUEUES:
2519 iavf_free_all_tx_resources(adapter);
2520 iavf_free_all_rx_resources(adapter);
2521 if (adapter->state == __IAVF_DOWN_PENDING) {
2522 iavf_change_state(adapter, __IAVF_DOWN);
2523 wake_up(&adapter->down_waitqueue);
2524 }
2525 break;
2526 case VIRTCHNL_OP_VERSION:
2527 case VIRTCHNL_OP_CONFIG_IRQ_MAP:
2528 /* Don't display an error if we get these out of sequence.
2529 * If the firmware needed to get kicked, we'll get these and
2530 * it's no problem.
2531 */
2532 if (v_opcode != adapter->current_op)
2533 return;
2534 break;
2535 case VIRTCHNL_OP_GET_RSS_HENA_CAPS: {
2536 struct virtchnl_rss_hena *vrh = (struct virtchnl_rss_hena *)msg;
2537
2538 if (msglen == sizeof(*vrh))
2539 adapter->hena = vrh->hena;
2540 else
2541 dev_warn(&adapter->pdev->dev,
2542 "Invalid message %d from PF\n", v_opcode);
2543 }
2544 break;
2545 case VIRTCHNL_OP_REQUEST_QUEUES: {
2546 struct virtchnl_vf_res_request *vfres =
2547 (struct virtchnl_vf_res_request *)msg;
2548
2549 if (vfres->num_queue_pairs != adapter->num_req_queues) {
2550 dev_info(&adapter->pdev->dev,
2551 "Requested %d queues, PF can support %d\n",
2552 adapter->num_req_queues,
2553 vfres->num_queue_pairs);
2554 adapter->num_req_queues = 0;
2555 adapter->flags &= ~IAVF_FLAG_REINIT_ITR_NEEDED;
2556 }
2557 }
2558 break;
2559 case VIRTCHNL_OP_ADD_CLOUD_FILTER: {
2560 struct iavf_cloud_filter *cf;
2561
2562 list_for_each_entry(cf, &adapter->cloud_filter_list, list) {
2563 if (cf->state == __IAVF_CF_ADD_PENDING)
2564 cf->state = __IAVF_CF_ACTIVE;
2565 }
2566 }
2567 break;
2568 case VIRTCHNL_OP_DEL_CLOUD_FILTER: {
2569 struct iavf_cloud_filter *cf, *cftmp;
2570
2571 list_for_each_entry_safe(cf, cftmp, &adapter->cloud_filter_list,
2572 list) {
2573 if (cf->state == __IAVF_CF_DEL_PENDING) {
2574 cf->state = __IAVF_CF_INVALID;
2575 list_del(&cf->list);
2576 kfree(cf);
2577 adapter->num_cloud_filters--;
2578 }
2579 }
2580 }
2581 break;
2582 case VIRTCHNL_OP_ADD_FDIR_FILTER: {
2583 struct virtchnl_fdir_add *add_fltr = (struct virtchnl_fdir_add *)msg;
2584 struct iavf_fdir_fltr *fdir, *fdir_tmp;
2585
2586 spin_lock_bh(&adapter->fdir_fltr_lock);
2587 list_for_each_entry_safe(fdir, fdir_tmp,
2588 &adapter->fdir_list_head,
2589 list) {
2590 if (fdir->state == IAVF_FDIR_FLTR_ADD_PENDING) {
2591 if (add_fltr->status == VIRTCHNL_FDIR_SUCCESS) {
2592 if (!iavf_is_raw_fdir(fdir))
2593 dev_info(&adapter->pdev->dev, "Flow Director filter with location %u is added\n",
2594 fdir->loc);
2595 else
2596 dev_info(&adapter->pdev->dev, "Flow Director filter (raw) for TC handle %x is added\n",
2597 TC_U32_USERHTID(fdir->cls_u32_handle));
2598 fdir->state = IAVF_FDIR_FLTR_ACTIVE;
2599 fdir->flow_id = add_fltr->flow_id;
2600 } else {
2601 dev_info(&adapter->pdev->dev, "Failed to add Flow Director filter with status: %d\n",
2602 add_fltr->status);
2603 iavf_print_fdir_fltr(adapter, fdir);
2604 list_del(&fdir->list);
2605 iavf_dec_fdir_active_fltr(adapter, fdir);
2606 kfree(fdir);
2607 }
2608 }
2609 }
2610 spin_unlock_bh(&adapter->fdir_fltr_lock);
2611 }
2612 break;
2613 case VIRTCHNL_OP_DEL_FDIR_FILTER: {
2614 struct virtchnl_fdir_del *del_fltr = (struct virtchnl_fdir_del *)msg;
2615 struct iavf_fdir_fltr *fdir, *fdir_tmp;
2616
2617 spin_lock_bh(&adapter->fdir_fltr_lock);
2618 list_for_each_entry_safe(fdir, fdir_tmp, &adapter->fdir_list_head,
2619 list) {
2620 if (fdir->state == IAVF_FDIR_FLTR_DEL_PENDING) {
2621 if (del_fltr->status == VIRTCHNL_FDIR_SUCCESS ||
2622 del_fltr->status ==
2623 VIRTCHNL_FDIR_FAILURE_RULE_NONEXIST) {
2624 if (!iavf_is_raw_fdir(fdir))
2625 dev_info(&adapter->pdev->dev, "Flow Director filter with location %u is deleted\n",
2626 fdir->loc);
2627 else
2628 dev_info(&adapter->pdev->dev, "Flow Director filter (raw) for TC handle %x is deleted\n",
2629 TC_U32_USERHTID(fdir->cls_u32_handle));
2630 list_del(&fdir->list);
2631 iavf_dec_fdir_active_fltr(adapter, fdir);
2632 kfree(fdir);
2633 } else {
2634 fdir->state = IAVF_FDIR_FLTR_ACTIVE;
2635 dev_info(&adapter->pdev->dev, "Failed to delete Flow Director filter with status: %d\n",
2636 del_fltr->status);
2637 iavf_print_fdir_fltr(adapter, fdir);
2638 }
2639 } else if (fdir->state == IAVF_FDIR_FLTR_DIS_PENDING) {
2640 if (del_fltr->status == VIRTCHNL_FDIR_SUCCESS ||
2641 del_fltr->status ==
2642 VIRTCHNL_FDIR_FAILURE_RULE_NONEXIST) {
2643 fdir->state = IAVF_FDIR_FLTR_INACTIVE;
2644 } else {
2645 fdir->state = IAVF_FDIR_FLTR_ACTIVE;
2646 dev_info(&adapter->pdev->dev, "Failed to disable Flow Director filter with status: %d\n",
2647 del_fltr->status);
2648 iavf_print_fdir_fltr(adapter, fdir);
2649 }
2650 }
2651 }
2652 spin_unlock_bh(&adapter->fdir_fltr_lock);
2653 }
2654 break;
2655 case VIRTCHNL_OP_ADD_RSS_CFG: {
2656 struct iavf_adv_rss *rss;
2657
2658 spin_lock_bh(&adapter->adv_rss_lock);
2659 list_for_each_entry(rss, &adapter->adv_rss_list_head, list) {
2660 if (rss->state == IAVF_ADV_RSS_ADD_PENDING) {
2661 iavf_print_adv_rss_cfg(adapter, rss,
2662 "Input set change for",
2663 "successful");
2664 rss->state = IAVF_ADV_RSS_ACTIVE;
2665 }
2666 }
2667 spin_unlock_bh(&adapter->adv_rss_lock);
2668 }
2669 break;
2670 case VIRTCHNL_OP_DEL_RSS_CFG: {
2671 struct iavf_adv_rss *rss, *rss_tmp;
2672
2673 spin_lock_bh(&adapter->adv_rss_lock);
2674 list_for_each_entry_safe(rss, rss_tmp,
2675 &adapter->adv_rss_list_head, list) {
2676 if (rss->state == IAVF_ADV_RSS_DEL_PENDING) {
2677 list_del(&rss->list);
2678 kfree(rss);
2679 }
2680 }
2681 spin_unlock_bh(&adapter->adv_rss_lock);
2682 }
2683 break;
2684 case VIRTCHNL_OP_ADD_VLAN_V2: {
2685 struct iavf_vlan_filter *f;
2686
2687 spin_lock_bh(&adapter->mac_vlan_list_lock);
2688 list_for_each_entry(f, &adapter->vlan_filter_list, list) {
2689 if (f->state == IAVF_VLAN_IS_NEW)
2690 f->state = IAVF_VLAN_ACTIVE;
2691 }
2692 spin_unlock_bh(&adapter->mac_vlan_list_lock);
2693 }
2694 break;
2695 case VIRTCHNL_OP_ENABLE_VLAN_STRIPPING:
2696 /* PF enabled vlan strip on this VF.
2697 * Update netdev->features if needed to be in sync with ethtool.
2698 */
2699 if (!v_retval)
2700 iavf_netdev_features_vlan_strip_set(netdev, true);
2701 break;
2702 case VIRTCHNL_OP_DISABLE_VLAN_STRIPPING:
2703 /* PF disabled vlan strip on this VF.
2704 * Update netdev->features if needed to be in sync with ethtool.
2705 */
2706 if (!v_retval)
2707 iavf_netdev_features_vlan_strip_set(netdev, false);
2708 break;
2709 case VIRTCHNL_OP_GET_QOS_CAPS: {
2710 u16 len = struct_size(adapter->qos_caps, cap,
2711 IAVF_MAX_QOS_TC_NUM);
2712
2713 memcpy(adapter->qos_caps, msg, min(msglen, len));
2714
2715 adapter->aq_required |= IAVF_FLAG_AQ_CFG_QUEUES_QUANTA_SIZE;
2716 }
2717 break;
2718 case VIRTCHNL_OP_CONFIG_QUANTA:
2719 break;
2720 case VIRTCHNL_OP_CONFIG_QUEUE_BW: {
2721 int i;
2722 /* shaper configuration is successful for all queues */
2723 for (i = 0; i < adapter->num_active_queues; i++)
2724 adapter->tx_rings[i].q_shaper_update = false;
2725 }
2726 break;
2727 default:
2728 if (adapter->current_op && (v_opcode != adapter->current_op))
2729 dev_warn(&adapter->pdev->dev, "Expected response %d from PF, received %d\n",
2730 adapter->current_op, v_opcode);
2731 break;
2732 } /* switch v_opcode */
2733 adapter->current_op = VIRTCHNL_OP_UNKNOWN;
2734}