bnx2x_vfpf.c 7.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272
  1. /* bnx2x_vfpf.c: Broadcom Everest network driver.
  2. *
  3. * Copyright 2009-2012 Broadcom Corporation
  4. *
  5. * Unless you and Broadcom execute a separate written software license
  6. * agreement governing use of this software, this software is licensed to you
  7. * under the terms of the GNU General Public License version 2, available
  8. * at http://www.gnu.org/licenses/old-licenses/gpl-2.0.html (the "GPL").
  9. *
  10. * Notwithstanding the above, under no circumstances may you combine this
  11. * software in any way with any other Broadcom software provided under a
  12. * license other than the GPL, without Broadcom's express prior written
  13. * consent.
  14. *
  15. * Maintained by: Eilon Greenstein <eilong@broadcom.com>
  16. * Written by: Shmulik Ravid <shmulikr@broadcom.com>
  17. * Ariel Elior <ariele@broadcom.com>
  18. */
  19. #include "bnx2x.h"
  20. #include "bnx2x_sriov.h"
  21. /* place a given tlv on the tlv buffer at a given offset */
  22. void bnx2x_add_tlv(struct bnx2x *bp, void *tlvs_list, u16 offset, u16 type,
  23. u16 length)
  24. {
  25. struct channel_tlv *tl =
  26. (struct channel_tlv *)(tlvs_list + offset);
  27. tl->type = type;
  28. tl->length = length;
  29. }
  30. /* Clear the mailbox and init the header of the first tlv */
  31. void bnx2x_vfpf_prep(struct bnx2x *bp, struct vfpf_first_tlv *first_tlv,
  32. u16 type, u16 length)
  33. {
  34. DP(BNX2X_MSG_IOV, "preparing to send %d tlv over vf pf channel\n",
  35. type);
  36. /* Clear mailbox */
  37. memset(bp->vf2pf_mbox, 0, sizeof(struct bnx2x_vf_mbx_msg));
  38. /* init type and length */
  39. bnx2x_add_tlv(bp, &first_tlv->tl, 0, type, length);
  40. /* init first tlv header */
  41. first_tlv->resp_msg_offset = sizeof(bp->vf2pf_mbox->req);
  42. }
  43. /* list the types and lengths of the tlvs on the buffer */
  44. void bnx2x_dp_tlv_list(struct bnx2x *bp, void *tlvs_list)
  45. {
  46. int i = 1;
  47. struct channel_tlv *tlv = (struct channel_tlv *)tlvs_list;
  48. while (tlv->type != CHANNEL_TLV_LIST_END) {
  49. /* output tlv */
  50. DP(BNX2X_MSG_IOV, "TLV number %d: type %d, length %d\n", i,
  51. tlv->type, tlv->length);
  52. /* advance to next tlv */
  53. tlvs_list += tlv->length;
  54. /* cast general tlv list pointer to channel tlv header*/
  55. tlv = (struct channel_tlv *)tlvs_list;
  56. i++;
  57. /* break condition for this loop */
  58. if (i > MAX_TLVS_IN_LIST) {
  59. WARN(true, "corrupt tlvs");
  60. return;
  61. }
  62. }
  63. /* output last tlv */
  64. DP(BNX2X_MSG_IOV, "TLV number %d: type %d, length %d\n", i,
  65. tlv->type, tlv->length);
  66. }
  67. /* test whether we support a tlv type */
  68. bool bnx2x_tlv_supported(u16 tlvtype)
  69. {
  70. return CHANNEL_TLV_NONE < tlvtype && tlvtype < CHANNEL_TLV_MAX;
  71. }
  72. static inline int bnx2x_pfvf_status_codes(int rc)
  73. {
  74. switch (rc) {
  75. case 0:
  76. return PFVF_STATUS_SUCCESS;
  77. case -ENOMEM:
  78. return PFVF_STATUS_NO_RESOURCE;
  79. default:
  80. return PFVF_STATUS_FAILURE;
  81. }
  82. }
  83. /* General service functions */
  84. static void storm_memset_vf_mbx_ack(struct bnx2x *bp, u16 abs_fid)
  85. {
  86. u32 addr = BAR_CSTRORM_INTMEM +
  87. CSTORM_VF_PF_CHANNEL_STATE_OFFSET(abs_fid);
  88. REG_WR8(bp, addr, VF_PF_CHANNEL_STATE_READY);
  89. }
  90. static void storm_memset_vf_mbx_valid(struct bnx2x *bp, u16 abs_fid)
  91. {
  92. u32 addr = BAR_CSTRORM_INTMEM +
  93. CSTORM_VF_PF_CHANNEL_VALID_OFFSET(abs_fid);
  94. REG_WR8(bp, addr, 1);
  95. }
  96. static inline void bnx2x_set_vf_mbxs_valid(struct bnx2x *bp)
  97. {
  98. int i;
  99. for_each_vf(bp, i)
  100. storm_memset_vf_mbx_valid(bp, bnx2x_vf(bp, i, abs_vfid));
  101. }
  102. /* enable vf_pf mailbox (aka vf-pf-chanell) */
  103. void bnx2x_vf_enable_mbx(struct bnx2x *bp, u8 abs_vfid)
  104. {
  105. bnx2x_vf_flr_clnup_epilog(bp, abs_vfid);
  106. /* enable the mailbox in the FW */
  107. storm_memset_vf_mbx_ack(bp, abs_vfid);
  108. storm_memset_vf_mbx_valid(bp, abs_vfid);
  109. /* enable the VF access to the mailbox */
  110. bnx2x_vf_enable_access(bp, abs_vfid);
  111. }
  112. /* this works only on !E1h */
  113. static int bnx2x_copy32_vf_dmae(struct bnx2x *bp, u8 from_vf,
  114. dma_addr_t pf_addr, u8 vfid, u32 vf_addr_hi,
  115. u32 vf_addr_lo, u32 len32)
  116. {
  117. struct dmae_command dmae;
  118. if (CHIP_IS_E1x(bp)) {
  119. BNX2X_ERR("Chip revision does not support VFs\n");
  120. return DMAE_NOT_RDY;
  121. }
  122. if (!bp->dmae_ready) {
  123. BNX2X_ERR("DMAE is not ready, can not copy\n");
  124. return DMAE_NOT_RDY;
  125. }
  126. /* set opcode and fixed command fields */
  127. bnx2x_prep_dmae_with_comp(bp, &dmae, DMAE_SRC_PCI, DMAE_DST_PCI);
  128. if (from_vf) {
  129. dmae.opcode_iov = (vfid << DMAE_COMMAND_SRC_VFID_SHIFT) |
  130. (DMAE_SRC_VF << DMAE_COMMAND_SRC_VFPF_SHIFT) |
  131. (DMAE_DST_PF << DMAE_COMMAND_DST_VFPF_SHIFT);
  132. dmae.opcode |= (DMAE_C_DST << DMAE_COMMAND_C_FUNC_SHIFT);
  133. dmae.src_addr_lo = vf_addr_lo;
  134. dmae.src_addr_hi = vf_addr_hi;
  135. dmae.dst_addr_lo = U64_LO(pf_addr);
  136. dmae.dst_addr_hi = U64_HI(pf_addr);
  137. } else {
  138. dmae.opcode_iov = (vfid << DMAE_COMMAND_DST_VFID_SHIFT) |
  139. (DMAE_DST_VF << DMAE_COMMAND_DST_VFPF_SHIFT) |
  140. (DMAE_SRC_PF << DMAE_COMMAND_SRC_VFPF_SHIFT);
  141. dmae.opcode |= (DMAE_C_SRC << DMAE_COMMAND_C_FUNC_SHIFT);
  142. dmae.src_addr_lo = U64_LO(pf_addr);
  143. dmae.src_addr_hi = U64_HI(pf_addr);
  144. dmae.dst_addr_lo = vf_addr_lo;
  145. dmae.dst_addr_hi = vf_addr_hi;
  146. }
  147. dmae.len = len32;
  148. bnx2x_dp_dmae(bp, &dmae, BNX2X_MSG_DMAE);
  149. /* issue the command and wait for completion */
  150. return bnx2x_issue_dmae_with_comp(bp, &dmae);
  151. }
  152. /* dispatch request */
  153. static void bnx2x_vf_mbx_request(struct bnx2x *bp, struct bnx2x_virtf *vf,
  154. struct bnx2x_vf_mbx *mbx)
  155. {
  156. int i;
  157. /* check if tlv type is known */
  158. if (bnx2x_tlv_supported(mbx->first_tlv.tl.type)) {
  159. /* switch on the opcode */
  160. switch (mbx->first_tlv.tl.type) {
  161. }
  162. } else {
  163. /* unknown TLV - this may belong to a VF driver from the future
  164. * - a version written after this PF driver was written, which
  165. * supports features unknown as of yet. Too bad since we don't
  166. * support them. Or this may be because someone wrote a crappy
  167. * VF driver and is sending garbage over the channel.
  168. */
  169. BNX2X_ERR("unknown TLV. type %d length %d. first 20 bytes of mailbox buffer:\n",
  170. mbx->first_tlv.tl.type, mbx->first_tlv.tl.length);
  171. for (i = 0; i < 20; i++)
  172. DP_CONT(BNX2X_MSG_IOV, "%x ",
  173. mbx->msg->req.tlv_buf_size.tlv_buffer[i]);
  174. }
  175. }
  176. /* handle new vf-pf message */
  177. void bnx2x_vf_mbx(struct bnx2x *bp, struct vf_pf_event_data *vfpf_event)
  178. {
  179. struct bnx2x_virtf *vf;
  180. struct bnx2x_vf_mbx *mbx;
  181. u8 vf_idx;
  182. int rc;
  183. DP(BNX2X_MSG_IOV,
  184. "vf pf event received: vfid %d, address_hi %x, address lo %x",
  185. vfpf_event->vf_id, vfpf_event->msg_addr_hi, vfpf_event->msg_addr_lo);
  186. /* Sanity checks consider removing later */
  187. /* check if the vf_id is valid */
  188. if (vfpf_event->vf_id - BP_VFDB(bp)->sriov.first_vf_in_pf >
  189. BNX2X_NR_VIRTFN(bp)) {
  190. BNX2X_ERR("Illegal vf_id %d max allowed: %d\n",
  191. vfpf_event->vf_id, BNX2X_NR_VIRTFN(bp));
  192. goto mbx_done;
  193. }
  194. vf_idx = bnx2x_vf_idx_by_abs_fid(bp, vfpf_event->vf_id);
  195. mbx = BP_VF_MBX(bp, vf_idx);
  196. /* verify an event is not currently being processed -
  197. * debug failsafe only
  198. */
  199. if (mbx->flags & VF_MSG_INPROCESS) {
  200. BNX2X_ERR("Previous message is still being processed, vf_id %d\n",
  201. vfpf_event->vf_id);
  202. goto mbx_done;
  203. }
  204. vf = BP_VF(bp, vf_idx);
  205. /* save the VF message address */
  206. mbx->vf_addr_hi = vfpf_event->msg_addr_hi;
  207. mbx->vf_addr_lo = vfpf_event->msg_addr_lo;
  208. DP(BNX2X_MSG_IOV, "mailbox vf address hi 0x%x, lo 0x%x, offset 0x%x\n",
  209. mbx->vf_addr_hi, mbx->vf_addr_lo, mbx->first_tlv.resp_msg_offset);
  210. /* dmae to get the VF request */
  211. rc = bnx2x_copy32_vf_dmae(bp, true, mbx->msg_mapping, vf->abs_vfid,
  212. mbx->vf_addr_hi, mbx->vf_addr_lo,
  213. sizeof(union vfpf_tlvs)/4);
  214. if (rc) {
  215. BNX2X_ERR("Failed to copy request VF %d\n", vf->abs_vfid);
  216. goto mbx_error;
  217. }
  218. /* process the VF message header */
  219. mbx->first_tlv = mbx->msg->req.first_tlv;
  220. /* dispatch the request (will prepare the response) */
  221. bnx2x_vf_mbx_request(bp, vf, mbx);
  222. goto mbx_done;
  223. mbx_error:
  224. mbx_done:
  225. return;
  226. }