|  | // SPDX-License-Identifier: GPL-2.0-only | 
|  | /**************************************************************************** | 
|  | * Driver for Solarflare network controllers and boards | 
|  | * Copyright 2019 Solarflare Communications Inc. | 
|  | * Copyright 2020-2022 Xilinx Inc. | 
|  | * | 
|  | * This program is free software; you can redistribute it and/or modify it | 
|  | * under the terms of the GNU General Public License version 2 as published | 
|  | * by the Free Software Foundation, incorporated herein by reference. | 
|  | */ | 
|  |  | 
|  | #include <linux/rhashtable.h> | 
|  | #include "ef100_nic.h" | 
|  | #include "mae.h" | 
|  | #include "mcdi.h" | 
|  | #include "mcdi_pcol.h" | 
|  | #include "mcdi_pcol_mae.h" | 
|  | #include "tc_encap_actions.h" | 
|  | #include "tc_conntrack.h" | 
|  |  | 
|  | int efx_mae_allocate_mport(struct efx_nic *efx, u32 *id, u32 *label) | 
|  | { | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_MPORT_ALLOC_ALIAS_OUT_LEN); | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_MPORT_ALLOC_ALIAS_IN_LEN); | 
|  | size_t outlen; | 
|  | int rc; | 
|  |  | 
|  | if (WARN_ON_ONCE(!id)) | 
|  | return -EINVAL; | 
|  | if (WARN_ON_ONCE(!label)) | 
|  | return -EINVAL; | 
|  |  | 
|  | MCDI_SET_DWORD(inbuf, MAE_MPORT_ALLOC_ALIAS_IN_TYPE, | 
|  | MC_CMD_MAE_MPORT_ALLOC_ALIAS_IN_MPORT_TYPE_ALIAS); | 
|  | MCDI_SET_DWORD(inbuf, MAE_MPORT_ALLOC_ALIAS_IN_DELIVER_MPORT, | 
|  | MAE_MPORT_SELECTOR_ASSIGNED); | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_MAE_MPORT_ALLOC, inbuf, sizeof(inbuf), | 
|  | outbuf, sizeof(outbuf), &outlen); | 
|  | if (rc) | 
|  | return rc; | 
|  | if (outlen < sizeof(outbuf)) | 
|  | return -EIO; | 
|  | *id = MCDI_DWORD(outbuf, MAE_MPORT_ALLOC_ALIAS_OUT_MPORT_ID); | 
|  | *label = MCDI_DWORD(outbuf, MAE_MPORT_ALLOC_ALIAS_OUT_LABEL); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int efx_mae_free_mport(struct efx_nic *efx, u32 id) | 
|  | { | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_MPORT_FREE_IN_LEN); | 
|  |  | 
|  | BUILD_BUG_ON(MC_CMD_MAE_MPORT_FREE_OUT_LEN); | 
|  | MCDI_SET_DWORD(inbuf, MAE_MPORT_FREE_IN_MPORT_ID, id); | 
|  | return efx_mcdi_rpc(efx, MC_CMD_MAE_MPORT_FREE, inbuf, sizeof(inbuf), | 
|  | NULL, 0, NULL); | 
|  | } | 
|  |  | 
|  | void efx_mae_mport_wire(struct efx_nic *efx, u32 *out) | 
|  | { | 
|  | efx_dword_t mport; | 
|  |  | 
|  | EFX_POPULATE_DWORD_2(mport, | 
|  | MAE_MPORT_SELECTOR_TYPE, MAE_MPORT_SELECTOR_TYPE_PPORT, | 
|  | MAE_MPORT_SELECTOR_PPORT_ID, efx->port_num); | 
|  | *out = EFX_DWORD_VAL(mport); | 
|  | } | 
|  |  | 
|  | void efx_mae_mport_uplink(struct efx_nic *efx __always_unused, u32 *out) | 
|  | { | 
|  | efx_dword_t mport; | 
|  |  | 
|  | EFX_POPULATE_DWORD_3(mport, | 
|  | MAE_MPORT_SELECTOR_TYPE, MAE_MPORT_SELECTOR_TYPE_FUNC, | 
|  | MAE_MPORT_SELECTOR_FUNC_PF_ID, MAE_MPORT_SELECTOR_FUNC_PF_ID_CALLER, | 
|  | MAE_MPORT_SELECTOR_FUNC_VF_ID, MAE_MPORT_SELECTOR_FUNC_VF_ID_NULL); | 
|  | *out = EFX_DWORD_VAL(mport); | 
|  | } | 
|  |  | 
|  | void efx_mae_mport_vf(struct efx_nic *efx __always_unused, u32 vf_id, u32 *out) | 
|  | { | 
|  | efx_dword_t mport; | 
|  |  | 
|  | EFX_POPULATE_DWORD_3(mport, | 
|  | MAE_MPORT_SELECTOR_TYPE, MAE_MPORT_SELECTOR_TYPE_FUNC, | 
|  | MAE_MPORT_SELECTOR_FUNC_PF_ID, MAE_MPORT_SELECTOR_FUNC_PF_ID_CALLER, | 
|  | MAE_MPORT_SELECTOR_FUNC_VF_ID, vf_id); | 
|  | *out = EFX_DWORD_VAL(mport); | 
|  | } | 
|  |  | 
|  | /* Constructs an mport selector from an mport ID, because they're not the same */ | 
|  | void efx_mae_mport_mport(struct efx_nic *efx __always_unused, u32 mport_id, u32 *out) | 
|  | { | 
|  | efx_dword_t mport; | 
|  |  | 
|  | EFX_POPULATE_DWORD_2(mport, | 
|  | MAE_MPORT_SELECTOR_TYPE, MAE_MPORT_SELECTOR_TYPE_MPORT_ID, | 
|  | MAE_MPORT_SELECTOR_MPORT_ID, mport_id); | 
|  | *out = EFX_DWORD_VAL(mport); | 
|  | } | 
|  |  | 
|  | /* id is really only 24 bits wide */ | 
|  | int efx_mae_fw_lookup_mport(struct efx_nic *efx, u32 selector, u32 *id) | 
|  | { | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_MPORT_LOOKUP_OUT_LEN); | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_MPORT_LOOKUP_IN_LEN); | 
|  | size_t outlen; | 
|  | int rc; | 
|  |  | 
|  | MCDI_SET_DWORD(inbuf, MAE_MPORT_LOOKUP_IN_MPORT_SELECTOR, selector); | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_MAE_MPORT_LOOKUP, inbuf, sizeof(inbuf), | 
|  | outbuf, sizeof(outbuf), &outlen); | 
|  | if (rc) | 
|  | return rc; | 
|  | if (outlen < sizeof(outbuf)) | 
|  | return -EIO; | 
|  | *id = MCDI_DWORD(outbuf, MAE_MPORT_LOOKUP_OUT_MPORT_ID); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int efx_mae_start_counters(struct efx_nic *efx, struct efx_rx_queue *rx_queue) | 
|  | { | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_COUNTERS_STREAM_START_V2_IN_LEN); | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_COUNTERS_STREAM_START_OUT_LEN); | 
|  | u32 out_flags; | 
|  | size_t outlen; | 
|  | int rc; | 
|  |  | 
|  | MCDI_SET_WORD(inbuf, MAE_COUNTERS_STREAM_START_V2_IN_QID, | 
|  | efx_rx_queue_index(rx_queue)); | 
|  | MCDI_SET_WORD(inbuf, MAE_COUNTERS_STREAM_START_V2_IN_PACKET_SIZE, | 
|  | efx->net_dev->mtu); | 
|  | MCDI_SET_DWORD(inbuf, MAE_COUNTERS_STREAM_START_V2_IN_COUNTER_TYPES_MASK, | 
|  | BIT(MAE_COUNTER_TYPE_AR) | BIT(MAE_COUNTER_TYPE_CT) | | 
|  | BIT(MAE_COUNTER_TYPE_OR)); | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_MAE_COUNTERS_STREAM_START, | 
|  | inbuf, sizeof(inbuf), outbuf, sizeof(outbuf), &outlen); | 
|  | if (rc) | 
|  | return rc; | 
|  | if (outlen < sizeof(outbuf)) | 
|  | return -EIO; | 
|  | out_flags = MCDI_DWORD(outbuf, MAE_COUNTERS_STREAM_START_OUT_FLAGS); | 
|  | if (out_flags & BIT(MC_CMD_MAE_COUNTERS_STREAM_START_OUT_USES_CREDITS_OFST)) { | 
|  | netif_dbg(efx, drv, efx->net_dev, | 
|  | "MAE counter stream uses credits\n"); | 
|  | rx_queue->grant_credits = true; | 
|  | out_flags &= ~BIT(MC_CMD_MAE_COUNTERS_STREAM_START_OUT_USES_CREDITS_OFST); | 
|  | } | 
|  | if (out_flags) { | 
|  | netif_err(efx, drv, efx->net_dev, | 
|  | "MAE counter stream start: unrecognised flags %x\n", | 
|  | out_flags); | 
|  | goto out_stop; | 
|  | } | 
|  | return 0; | 
|  | out_stop: | 
|  | efx_mae_stop_counters(efx, rx_queue); | 
|  | return -EOPNOTSUPP; | 
|  | } | 
|  |  | 
|  | static bool efx_mae_counters_flushed(u32 *flush_gen, u32 *seen_gen) | 
|  | { | 
|  | int i; | 
|  |  | 
|  | for (i = 0; i < EFX_TC_COUNTER_TYPE_MAX; i++) | 
|  | if ((s32)(flush_gen[i] - seen_gen[i]) > 0) | 
|  | return false; | 
|  | return true; | 
|  | } | 
|  |  | 
|  | int efx_mae_stop_counters(struct efx_nic *efx, struct efx_rx_queue *rx_queue) | 
|  | { | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_COUNTERS_STREAM_STOP_V2_OUT_LENMAX); | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_COUNTERS_STREAM_STOP_IN_LEN); | 
|  | size_t outlen; | 
|  | int rc, i; | 
|  |  | 
|  | MCDI_SET_WORD(inbuf, MAE_COUNTERS_STREAM_STOP_IN_QID, | 
|  | efx_rx_queue_index(rx_queue)); | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_MAE_COUNTERS_STREAM_STOP, | 
|  | inbuf, sizeof(inbuf), outbuf, sizeof(outbuf), &outlen); | 
|  |  | 
|  | if (rc) | 
|  | return rc; | 
|  |  | 
|  | netif_dbg(efx, drv, efx->net_dev, "Draining counters:\n"); | 
|  | /* Only process received generation counts */ | 
|  | for (i = 0; (i < (outlen / 4)) && (i < EFX_TC_COUNTER_TYPE_MAX); i++) { | 
|  | efx->tc->flush_gen[i] = MCDI_ARRAY_DWORD(outbuf, | 
|  | MAE_COUNTERS_STREAM_STOP_V2_OUT_GENERATION_COUNT, | 
|  | i); | 
|  | netif_dbg(efx, drv, efx->net_dev, | 
|  | "\ttype %u, awaiting gen %u\n", i, | 
|  | efx->tc->flush_gen[i]); | 
|  | } | 
|  |  | 
|  | efx->tc->flush_counters = true; | 
|  |  | 
|  | /* Drain can take up to 2 seconds owing to FWRIVERHD-2884; whatever | 
|  | * timeout we use, that delay is added to unload on nonresponsive | 
|  | * hardware, so 2500ms seems like a reasonable compromise. | 
|  | */ | 
|  | if (!wait_event_timeout(efx->tc->flush_wq, | 
|  | efx_mae_counters_flushed(efx->tc->flush_gen, | 
|  | efx->tc->seen_gen), | 
|  | msecs_to_jiffies(2500))) | 
|  | netif_warn(efx, drv, efx->net_dev, | 
|  | "Failed to drain counters RXQ, FW may be unhappy\n"); | 
|  |  | 
|  | efx->tc->flush_counters = false; | 
|  |  | 
|  | return rc; | 
|  | } | 
|  |  | 
|  | void efx_mae_counters_grant_credits(struct work_struct *work) | 
|  | { | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_COUNTERS_STREAM_GIVE_CREDITS_IN_LEN); | 
|  | struct efx_rx_queue *rx_queue = container_of(work, struct efx_rx_queue, | 
|  | grant_work); | 
|  | struct efx_nic *efx = rx_queue->efx; | 
|  | unsigned int credits; | 
|  |  | 
|  | BUILD_BUG_ON(MC_CMD_MAE_COUNTERS_STREAM_GIVE_CREDITS_OUT_LEN); | 
|  | credits = READ_ONCE(rx_queue->notified_count) - rx_queue->granted_count; | 
|  | MCDI_SET_DWORD(inbuf, MAE_COUNTERS_STREAM_GIVE_CREDITS_IN_NUM_CREDITS, | 
|  | credits); | 
|  | if (!efx_mcdi_rpc(efx, MC_CMD_MAE_COUNTERS_STREAM_GIVE_CREDITS, | 
|  | inbuf, sizeof(inbuf), NULL, 0, NULL)) | 
|  | rx_queue->granted_count += credits; | 
|  | } | 
|  |  | 
|  | static int efx_mae_table_get_desc(struct efx_nic *efx, | 
|  | struct efx_tc_table_desc *desc, | 
|  | u32 table_id) | 
|  | { | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_TABLE_DESCRIPTOR_OUT_LEN(16)); | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_TABLE_DESCRIPTOR_IN_LEN); | 
|  | unsigned int offset = 0, i; | 
|  | size_t outlen; | 
|  | int rc; | 
|  |  | 
|  | memset(desc, 0, sizeof(*desc)); | 
|  |  | 
|  | MCDI_SET_DWORD(inbuf, TABLE_DESCRIPTOR_IN_TABLE_ID, table_id); | 
|  | more: | 
|  | MCDI_SET_DWORD(inbuf, TABLE_DESCRIPTOR_IN_FIRST_FIELDS_INDEX, offset); | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_TABLE_DESCRIPTOR, inbuf, sizeof(inbuf), | 
|  | outbuf, sizeof(outbuf), &outlen); | 
|  | if (rc) | 
|  | goto fail; | 
|  | if (outlen < MC_CMD_TABLE_DESCRIPTOR_OUT_LEN(1)) { | 
|  | rc = -EIO; | 
|  | goto fail; | 
|  | } | 
|  | if (!offset) { /* first iteration: get metadata */ | 
|  | desc->type = MCDI_WORD(outbuf, TABLE_DESCRIPTOR_OUT_TYPE); | 
|  | desc->key_width = MCDI_WORD(outbuf, TABLE_DESCRIPTOR_OUT_KEY_WIDTH); | 
|  | desc->resp_width = MCDI_WORD(outbuf, TABLE_DESCRIPTOR_OUT_RESP_WIDTH); | 
|  | desc->n_keys = MCDI_WORD(outbuf, TABLE_DESCRIPTOR_OUT_N_KEY_FIELDS); | 
|  | desc->n_resps = MCDI_WORD(outbuf, TABLE_DESCRIPTOR_OUT_N_RESP_FIELDS); | 
|  | desc->n_prios = MCDI_WORD(outbuf, TABLE_DESCRIPTOR_OUT_N_PRIORITIES); | 
|  | desc->flags = MCDI_BYTE(outbuf, TABLE_DESCRIPTOR_OUT_FLAGS); | 
|  | rc = -EOPNOTSUPP; | 
|  | if (desc->flags) | 
|  | goto fail; | 
|  | desc->scheme = MCDI_BYTE(outbuf, TABLE_DESCRIPTOR_OUT_SCHEME); | 
|  | if (desc->scheme) | 
|  | goto fail; | 
|  | rc = -ENOMEM; | 
|  | desc->keys = kcalloc(desc->n_keys, | 
|  | sizeof(struct efx_tc_table_field_fmt), | 
|  | GFP_KERNEL); | 
|  | if (!desc->keys) | 
|  | goto fail; | 
|  | desc->resps = kcalloc(desc->n_resps, | 
|  | sizeof(struct efx_tc_table_field_fmt), | 
|  | GFP_KERNEL); | 
|  | if (!desc->resps) | 
|  | goto fail; | 
|  | } | 
|  | /* FW could have returned more than the 16 field_descrs we | 
|  | * made room for in our outbuf | 
|  | */ | 
|  | outlen = min(outlen, sizeof(outbuf)); | 
|  | for (i = 0; i + offset < desc->n_keys + desc->n_resps; i++) { | 
|  | struct efx_tc_table_field_fmt *field; | 
|  | MCDI_DECLARE_STRUCT_PTR(fdesc); | 
|  |  | 
|  | if (outlen < MC_CMD_TABLE_DESCRIPTOR_OUT_LEN(i + 1)) { | 
|  | offset += i; | 
|  | goto more; | 
|  | } | 
|  | if (i + offset < desc->n_keys) | 
|  | field = desc->keys + i + offset; | 
|  | else | 
|  | field = desc->resps + (i + offset - desc->n_keys); | 
|  | fdesc = MCDI_ARRAY_STRUCT_PTR(outbuf, | 
|  | TABLE_DESCRIPTOR_OUT_FIELDS, i); | 
|  | field->field_id = MCDI_STRUCT_WORD(fdesc, | 
|  | TABLE_FIELD_DESCR_FIELD_ID); | 
|  | field->lbn = MCDI_STRUCT_WORD(fdesc, TABLE_FIELD_DESCR_LBN); | 
|  | field->width = MCDI_STRUCT_WORD(fdesc, TABLE_FIELD_DESCR_WIDTH); | 
|  | field->masking = MCDI_STRUCT_BYTE(fdesc, TABLE_FIELD_DESCR_MASK_TYPE); | 
|  | field->scheme = MCDI_STRUCT_BYTE(fdesc, TABLE_FIELD_DESCR_SCHEME); | 
|  | } | 
|  | return 0; | 
|  |  | 
|  | fail: | 
|  | kfree(desc->keys); | 
|  | kfree(desc->resps); | 
|  | return rc; | 
|  | } | 
|  |  | 
|  | static int efx_mae_table_hook_find(u16 n_fields, | 
|  | struct efx_tc_table_field_fmt *fields, | 
|  | u16 field_id) | 
|  | { | 
|  | unsigned int i; | 
|  |  | 
|  | for (i = 0; i < n_fields; i++) { | 
|  | if (fields[i].field_id == field_id) | 
|  | return i; | 
|  | } | 
|  | return -EPROTO; | 
|  | } | 
|  |  | 
|  | #define TABLE_FIND_KEY(_desc, _id)	\ | 
|  | efx_mae_table_hook_find((_desc)->n_keys, (_desc)->keys, _id) | 
|  | #define TABLE_FIND_RESP(_desc, _id)	\ | 
|  | efx_mae_table_hook_find((_desc)->n_resps, (_desc)->resps, _id) | 
|  |  | 
|  | #define TABLE_HOOK_KEY(_meta, _name, _mcdi_name)	({			\ | 
|  | int _rc = TABLE_FIND_KEY(&_meta->desc, TABLE_FIELD_ID_##_mcdi_name);	\ | 
|  | \ | 
|  | if (_rc > U8_MAX)							\ | 
|  | _rc = -EOPNOTSUPP;						\ | 
|  | if (_rc >= 0) {								\ | 
|  | _meta->keys._name##_idx = _rc;					\ | 
|  | _rc = 0;							\ | 
|  | }									\ | 
|  | _rc;									\ | 
|  | }) | 
|  | #define TABLE_HOOK_RESP(_meta, _name, _mcdi_name)	({			\ | 
|  | int _rc = TABLE_FIND_RESP(&_meta->desc, TABLE_FIELD_ID_##_mcdi_name);	\ | 
|  | \ | 
|  | if (_rc > U8_MAX)							\ | 
|  | _rc = -EOPNOTSUPP;						\ | 
|  | if (_rc >= 0) {								\ | 
|  | _meta->resps._name##_idx = _rc;					\ | 
|  | _rc = 0;							\ | 
|  | }									\ | 
|  | _rc;									\ | 
|  | }) | 
|  |  | 
|  | static int efx_mae_table_hook_ct(struct efx_nic *efx, | 
|  | struct efx_tc_table_ct *meta_ct) | 
|  | { | 
|  | int rc; | 
|  |  | 
|  | rc = TABLE_HOOK_KEY(meta_ct, eth_proto, ETHER_TYPE); | 
|  | if (rc) | 
|  | return rc; | 
|  | rc = TABLE_HOOK_KEY(meta_ct, ip_proto, IP_PROTO); | 
|  | if (rc) | 
|  | return rc; | 
|  | rc = TABLE_HOOK_KEY(meta_ct, src_ip, SRC_IP); | 
|  | if (rc) | 
|  | return rc; | 
|  | rc = TABLE_HOOK_KEY(meta_ct, dst_ip, DST_IP); | 
|  | if (rc) | 
|  | return rc; | 
|  | rc = TABLE_HOOK_KEY(meta_ct, l4_sport, SRC_PORT); | 
|  | if (rc) | 
|  | return rc; | 
|  | rc = TABLE_HOOK_KEY(meta_ct, l4_dport, DST_PORT); | 
|  | if (rc) | 
|  | return rc; | 
|  | rc = TABLE_HOOK_KEY(meta_ct, zone, DOMAIN); | 
|  | if (rc) | 
|  | return rc; | 
|  | rc = TABLE_HOOK_RESP(meta_ct, dnat, NAT_DIR); | 
|  | if (rc) | 
|  | return rc; | 
|  | rc = TABLE_HOOK_RESP(meta_ct, nat_ip, NAT_IP); | 
|  | if (rc) | 
|  | return rc; | 
|  | rc = TABLE_HOOK_RESP(meta_ct, l4_natport, NAT_PORT); | 
|  | if (rc) | 
|  | return rc; | 
|  | rc = TABLE_HOOK_RESP(meta_ct, mark, CT_MARK); | 
|  | if (rc) | 
|  | return rc; | 
|  | rc = TABLE_HOOK_RESP(meta_ct, counter_id, COUNTER_ID); | 
|  | if (rc) | 
|  | return rc; | 
|  | meta_ct->hooked = true; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static void efx_mae_table_free_desc(struct efx_tc_table_desc *desc) | 
|  | { | 
|  | kfree(desc->keys); | 
|  | kfree(desc->resps); | 
|  | memset(desc, 0, sizeof(*desc)); | 
|  | } | 
|  |  | 
|  | static bool efx_mae_check_table_exists(struct efx_nic *efx, u32 tbl_req) | 
|  | { | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_TABLE_LIST_OUT_LEN(16)); | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_TABLE_LIST_IN_LEN); | 
|  | u32 tbl_id, tbl_total, tbl_cnt, pos = 0; | 
|  | size_t outlen, msg_max; | 
|  | bool ct_tbl = false; | 
|  | int rc, idx; | 
|  |  | 
|  | msg_max = sizeof(outbuf); | 
|  | efx->tc->meta_ct.hooked = false; | 
|  | more: | 
|  | memset(outbuf, 0, sizeof(*outbuf)); | 
|  | MCDI_SET_DWORD(inbuf, TABLE_LIST_IN_FIRST_TABLE_ID_INDEX, pos); | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_TABLE_LIST, inbuf, sizeof(inbuf), outbuf, | 
|  | msg_max, &outlen); | 
|  | if (rc) | 
|  | return false; | 
|  |  | 
|  | if (outlen < MC_CMD_TABLE_LIST_OUT_LEN(1)) | 
|  | return false; | 
|  |  | 
|  | tbl_total = MCDI_DWORD(outbuf, TABLE_LIST_OUT_N_TABLES); | 
|  | tbl_cnt = MC_CMD_TABLE_LIST_OUT_TABLE_ID_NUM(min(outlen, msg_max)); | 
|  |  | 
|  | for (idx = 0; idx < tbl_cnt; idx++) { | 
|  | tbl_id = MCDI_ARRAY_DWORD(outbuf, TABLE_LIST_OUT_TABLE_ID, idx); | 
|  | if (tbl_id == tbl_req) { | 
|  | ct_tbl = true; | 
|  | break; | 
|  | } | 
|  | } | 
|  |  | 
|  | pos += tbl_cnt; | 
|  | if (!ct_tbl && pos < tbl_total) | 
|  | goto more; | 
|  |  | 
|  | return ct_tbl; | 
|  | } | 
|  |  | 
|  | int efx_mae_get_tables(struct efx_nic *efx) | 
|  | { | 
|  | int rc; | 
|  |  | 
|  | efx->tc->meta_ct.hooked = false; | 
|  | if (efx_mae_check_table_exists(efx, TABLE_ID_CONNTRACK_TABLE)) { | 
|  | rc = efx_mae_table_get_desc(efx, &efx->tc->meta_ct.desc, | 
|  | TABLE_ID_CONNTRACK_TABLE); | 
|  | if (rc) { | 
|  | pci_info(efx->pci_dev, | 
|  | "FW does not support conntrack desc rc %d\n", | 
|  | rc); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | rc = efx_mae_table_hook_ct(efx, &efx->tc->meta_ct); | 
|  | if (rc) { | 
|  | pci_info(efx->pci_dev, | 
|  | "FW does not support conntrack hook rc %d\n", | 
|  | rc); | 
|  | return 0; | 
|  | } | 
|  | } else { | 
|  | pci_info(efx->pci_dev, | 
|  | "FW does not support conntrack table\n"); | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | void efx_mae_free_tables(struct efx_nic *efx) | 
|  | { | 
|  | efx_mae_table_free_desc(&efx->tc->meta_ct.desc); | 
|  | efx->tc->meta_ct.hooked = false; | 
|  | } | 
|  |  | 
|  | static int efx_mae_get_basic_caps(struct efx_nic *efx, struct mae_caps *caps) | 
|  | { | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_GET_CAPS_OUT_LEN); | 
|  | size_t outlen; | 
|  | int rc; | 
|  |  | 
|  | BUILD_BUG_ON(MC_CMD_MAE_GET_CAPS_IN_LEN); | 
|  |  | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_MAE_GET_CAPS, NULL, 0, outbuf, | 
|  | sizeof(outbuf), &outlen); | 
|  | if (rc) | 
|  | return rc; | 
|  | if (outlen < sizeof(outbuf)) | 
|  | return -EIO; | 
|  | caps->match_field_count = MCDI_DWORD(outbuf, MAE_GET_CAPS_OUT_MATCH_FIELD_COUNT); | 
|  | caps->encap_types = MCDI_DWORD(outbuf, MAE_GET_CAPS_OUT_ENCAP_TYPES_SUPPORTED); | 
|  | caps->action_prios = MCDI_DWORD(outbuf, MAE_GET_CAPS_OUT_ACTION_PRIOS); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int efx_mae_get_rule_fields(struct efx_nic *efx, u32 cmd, | 
|  | u8 *field_support) | 
|  | { | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_GET_AR_CAPS_OUT_LEN(MAE_NUM_FIELDS)); | 
|  | MCDI_DECLARE_STRUCT_PTR(caps); | 
|  | unsigned int count; | 
|  | size_t outlen; | 
|  | int rc, i; | 
|  |  | 
|  | /* AR and OR caps MCDIs have identical layout, so we are using the | 
|  | * same code for both. | 
|  | */ | 
|  | BUILD_BUG_ON(MC_CMD_MAE_GET_AR_CAPS_OUT_LEN(MAE_NUM_FIELDS) < | 
|  | MC_CMD_MAE_GET_OR_CAPS_OUT_LEN(MAE_NUM_FIELDS)); | 
|  | BUILD_BUG_ON(MC_CMD_MAE_GET_AR_CAPS_IN_LEN); | 
|  | BUILD_BUG_ON(MC_CMD_MAE_GET_OR_CAPS_IN_LEN); | 
|  |  | 
|  | rc = efx_mcdi_rpc(efx, cmd, NULL, 0, outbuf, sizeof(outbuf), &outlen); | 
|  | if (rc) | 
|  | return rc; | 
|  | BUILD_BUG_ON(MC_CMD_MAE_GET_AR_CAPS_OUT_COUNT_OFST != | 
|  | MC_CMD_MAE_GET_OR_CAPS_OUT_COUNT_OFST); | 
|  | count = MCDI_DWORD(outbuf, MAE_GET_AR_CAPS_OUT_COUNT); | 
|  | memset(field_support, MAE_FIELD_UNSUPPORTED, MAE_NUM_FIELDS); | 
|  | BUILD_BUG_ON(MC_CMD_MAE_GET_AR_CAPS_OUT_FIELD_FLAGS_OFST != | 
|  | MC_CMD_MAE_GET_OR_CAPS_OUT_FIELD_FLAGS_OFST); | 
|  | caps = _MCDI_DWORD(outbuf, MAE_GET_AR_CAPS_OUT_FIELD_FLAGS); | 
|  | /* We're only interested in the support status enum, not any other | 
|  | * flags, so just extract that from each entry. | 
|  | */ | 
|  | for (i = 0; i < count; i++) | 
|  | if (i * sizeof(*outbuf) + MC_CMD_MAE_GET_AR_CAPS_OUT_FIELD_FLAGS_OFST < outlen) | 
|  | field_support[i] = EFX_DWORD_FIELD(caps[i], MAE_FIELD_FLAGS_SUPPORT_STATUS); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int efx_mae_get_caps(struct efx_nic *efx, struct mae_caps *caps) | 
|  | { | 
|  | int rc; | 
|  |  | 
|  | rc = efx_mae_get_basic_caps(efx, caps); | 
|  | if (rc) | 
|  | return rc; | 
|  | rc = efx_mae_get_rule_fields(efx, MC_CMD_MAE_GET_AR_CAPS, | 
|  | caps->action_rule_fields); | 
|  | if (rc) | 
|  | return rc; | 
|  | return efx_mae_get_rule_fields(efx, MC_CMD_MAE_GET_OR_CAPS, | 
|  | caps->outer_rule_fields); | 
|  | } | 
|  |  | 
|  | /* Bit twiddling: | 
|  | * Prefix: 1...110...0 | 
|  | *      ~: 0...001...1 | 
|  | *    + 1: 0...010...0 is power of two | 
|  | * so (~x) & ((~x) + 1) == 0.  Converse holds also. | 
|  | */ | 
|  | #define is_prefix_byte(_x)	!(((_x) ^ 0xff) & (((_x) ^ 0xff) + 1)) | 
|  |  | 
|  | enum mask_type { MASK_ONES, MASK_ZEROES, MASK_PREFIX, MASK_OTHER }; | 
|  |  | 
|  | static const char *mask_type_name(enum mask_type typ) | 
|  | { | 
|  | switch (typ) { | 
|  | case MASK_ONES: | 
|  | return "all-1s"; | 
|  | case MASK_ZEROES: | 
|  | return "all-0s"; | 
|  | case MASK_PREFIX: | 
|  | return "prefix"; | 
|  | case MASK_OTHER: | 
|  | return "arbitrary"; | 
|  | default: /* can't happen */ | 
|  | return "unknown"; | 
|  | } | 
|  | } | 
|  |  | 
|  | /* Checks a (big-endian) bytestring is a bit prefix */ | 
|  | static enum mask_type classify_mask(const u8 *mask, size_t len) | 
|  | { | 
|  | bool zeroes = true; /* All bits seen so far are zeroes */ | 
|  | bool ones = true; /* All bits seen so far are ones */ | 
|  | bool prefix = true; /* Valid prefix so far */ | 
|  | size_t i; | 
|  |  | 
|  | for (i = 0; i < len; i++) { | 
|  | if (ones) { | 
|  | if (!is_prefix_byte(mask[i])) | 
|  | prefix = false; | 
|  | } else if (mask[i]) { | 
|  | prefix = false; | 
|  | } | 
|  | if (mask[i] != 0xff) | 
|  | ones = false; | 
|  | if (mask[i]) | 
|  | zeroes = false; | 
|  | } | 
|  | if (ones) | 
|  | return MASK_ONES; | 
|  | if (zeroes) | 
|  | return MASK_ZEROES; | 
|  | if (prefix) | 
|  | return MASK_PREFIX; | 
|  | return MASK_OTHER; | 
|  | } | 
|  |  | 
|  | static int efx_mae_match_check_cap_typ(u8 support, enum mask_type typ) | 
|  | { | 
|  | switch (support) { | 
|  | case MAE_FIELD_UNSUPPORTED: | 
|  | case MAE_FIELD_SUPPORTED_MATCH_NEVER: | 
|  | if (typ == MASK_ZEROES) | 
|  | return 0; | 
|  | return -EOPNOTSUPP; | 
|  | case MAE_FIELD_SUPPORTED_MATCH_OPTIONAL: | 
|  | if (typ == MASK_ZEROES) | 
|  | return 0; | 
|  | fallthrough; | 
|  | case MAE_FIELD_SUPPORTED_MATCH_ALWAYS: | 
|  | if (typ == MASK_ONES) | 
|  | return 0; | 
|  | return -EINVAL; | 
|  | case MAE_FIELD_SUPPORTED_MATCH_PREFIX: | 
|  | if (typ == MASK_OTHER) | 
|  | return -EOPNOTSUPP; | 
|  | return 0; | 
|  | case MAE_FIELD_SUPPORTED_MATCH_MASK: | 
|  | return 0; | 
|  | default: | 
|  | return -EIO; | 
|  | } | 
|  | } | 
|  |  | 
|  | /* Validate field mask against hardware capabilities.  Captures caller's 'rc' */ | 
|  | #define CHECK(_mcdi, _field)	({					       \ | 
|  | enum mask_type typ = classify_mask((const u8 *)&mask->_field,	       \ | 
|  | sizeof(mask->_field));	       \ | 
|  | \ | 
|  | rc = efx_mae_match_check_cap_typ(supported_fields[MAE_FIELD_ ## _mcdi],\ | 
|  | typ);				       \ | 
|  | if (rc)								       \ | 
|  | NL_SET_ERR_MSG_FMT_MOD(extack,				       \ | 
|  | "No support for %s mask in field %s",   \ | 
|  | mask_type_name(typ), #_field);	       \ | 
|  | rc;								       \ | 
|  | }) | 
|  | /* Booleans need special handling */ | 
|  | #define CHECK_BIT(_mcdi, _field)	({				       \ | 
|  | enum mask_type typ = mask->_field ? MASK_ONES : MASK_ZEROES;	       \ | 
|  | \ | 
|  | rc = efx_mae_match_check_cap_typ(supported_fields[MAE_FIELD_ ## _mcdi],\ | 
|  | typ);				       \ | 
|  | if (rc)								       \ | 
|  | NL_SET_ERR_MSG_FMT_MOD(extack,				       \ | 
|  | "No support for %s mask in field %s",   \ | 
|  | mask_type_name(typ), #_field);	       \ | 
|  | rc;								       \ | 
|  | }) | 
|  |  | 
|  | int efx_mae_match_check_caps(struct efx_nic *efx, | 
|  | const struct efx_tc_match_fields *mask, | 
|  | struct netlink_ext_ack *extack) | 
|  | { | 
|  | const u8 *supported_fields = efx->tc->caps->action_rule_fields; | 
|  | __be32 ingress_port = cpu_to_be32(mask->ingress_port); | 
|  | enum mask_type ingress_port_mask_type; | 
|  | int rc; | 
|  |  | 
|  | /* Check for _PREFIX assumes big-endian, so we need to convert */ | 
|  | ingress_port_mask_type = classify_mask((const u8 *)&ingress_port, | 
|  | sizeof(ingress_port)); | 
|  | rc = efx_mae_match_check_cap_typ(supported_fields[MAE_FIELD_INGRESS_PORT], | 
|  | ingress_port_mask_type); | 
|  | if (rc) { | 
|  | NL_SET_ERR_MSG_FMT_MOD(extack, "No support for %s mask in field ingress_port", | 
|  | mask_type_name(ingress_port_mask_type)); | 
|  | return rc; | 
|  | } | 
|  | if (CHECK(ETHER_TYPE, eth_proto) || | 
|  | CHECK(VLAN0_TCI, vlan_tci[0]) || | 
|  | CHECK(VLAN0_PROTO, vlan_proto[0]) || | 
|  | CHECK(VLAN1_TCI, vlan_tci[1]) || | 
|  | CHECK(VLAN1_PROTO, vlan_proto[1]) || | 
|  | CHECK(ETH_SADDR, eth_saddr) || | 
|  | CHECK(ETH_DADDR, eth_daddr) || | 
|  | CHECK(IP_PROTO, ip_proto) || | 
|  | CHECK(IP_TOS, ip_tos) || | 
|  | CHECK(IP_TTL, ip_ttl) || | 
|  | CHECK(SRC_IP4, src_ip) || | 
|  | CHECK(DST_IP4, dst_ip) || | 
|  | #ifdef CONFIG_IPV6 | 
|  | CHECK(SRC_IP6, src_ip6) || | 
|  | CHECK(DST_IP6, dst_ip6) || | 
|  | #endif | 
|  | CHECK(L4_SPORT, l4_sport) || | 
|  | CHECK(L4_DPORT, l4_dport) || | 
|  | CHECK(TCP_FLAGS, tcp_flags) || | 
|  | CHECK_BIT(TCP_SYN_FIN_RST, tcp_syn_fin_rst) || | 
|  | CHECK_BIT(IS_IP_FRAG, ip_frag) || | 
|  | CHECK_BIT(IP_FIRST_FRAG, ip_firstfrag) || | 
|  | CHECK_BIT(DO_CT, ct_state_trk) || | 
|  | CHECK_BIT(CT_HIT, ct_state_est) || | 
|  | CHECK(CT_MARK, ct_mark) || | 
|  | CHECK(CT_DOMAIN, ct_zone) || | 
|  | CHECK(RECIRC_ID, recirc_id)) | 
|  | return rc; | 
|  | /* Matches on outer fields are done in a separate hardware table, | 
|  | * the Outer Rule table.  Thus the Action Rule merely does an | 
|  | * exact match on Outer Rule ID if any outer field matches are | 
|  | * present.  The exception is the VNI/VSID (enc_keyid), which is | 
|  | * available to the Action Rule match iff the Outer Rule matched | 
|  | * (and thus identified the encap protocol to use to extract it). | 
|  | */ | 
|  | if (efx_tc_match_is_encap(mask)) { | 
|  | rc = efx_mae_match_check_cap_typ( | 
|  | supported_fields[MAE_FIELD_OUTER_RULE_ID], | 
|  | MASK_ONES); | 
|  | if (rc) { | 
|  | NL_SET_ERR_MSG_MOD(extack, "No support for encap rule ID matches"); | 
|  | return rc; | 
|  | } | 
|  | if (CHECK(ENC_VNET_ID, enc_keyid)) | 
|  | return rc; | 
|  | } else if (mask->enc_keyid) { | 
|  | NL_SET_ERR_MSG_MOD(extack, "Match on enc_keyid requires other encap fields"); | 
|  | return -EINVAL; | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* Checks for match fields not supported in LHS Outer Rules */ | 
|  | #define UNSUPPORTED(_field)	({					       \ | 
|  | enum mask_type typ = classify_mask((const u8 *)&mask->_field,	       \ | 
|  | sizeof(mask->_field));	       \ | 
|  | \ | 
|  | if (typ != MASK_ZEROES) {					       \ | 
|  | NL_SET_ERR_MSG_MOD(extack, "Unsupported match field " #_field);\ | 
|  | rc = -EOPNOTSUPP;					       \ | 
|  | }								       \ | 
|  | rc;								       \ | 
|  | }) | 
|  | #define UNSUPPORTED_BIT(_field)	({					       \ | 
|  | if (mask->_field) {						       \ | 
|  | NL_SET_ERR_MSG_MOD(extack, "Unsupported match field " #_field);\ | 
|  | rc = -EOPNOTSUPP;					       \ | 
|  | }								       \ | 
|  | rc;								       \ | 
|  | }) | 
|  |  | 
|  | /* LHS rules are (normally) inserted in the Outer Rule table, which means | 
|  | * they use ENC_ fields in hardware to match regular (not enc_) fields from | 
|  | * &struct efx_tc_match_fields. | 
|  | */ | 
|  | int efx_mae_match_check_caps_lhs(struct efx_nic *efx, | 
|  | const struct efx_tc_match_fields *mask, | 
|  | struct netlink_ext_ack *extack) | 
|  | { | 
|  | const u8 *supported_fields = efx->tc->caps->outer_rule_fields; | 
|  | __be32 ingress_port = cpu_to_be32(mask->ingress_port); | 
|  | enum mask_type ingress_port_mask_type; | 
|  | int rc; | 
|  |  | 
|  | /* Check for _PREFIX assumes big-endian, so we need to convert */ | 
|  | ingress_port_mask_type = classify_mask((const u8 *)&ingress_port, | 
|  | sizeof(ingress_port)); | 
|  | rc = efx_mae_match_check_cap_typ(supported_fields[MAE_FIELD_INGRESS_PORT], | 
|  | ingress_port_mask_type); | 
|  | if (rc) { | 
|  | NL_SET_ERR_MSG_FMT_MOD(extack, "No support for %s mask in field %s\n", | 
|  | mask_type_name(ingress_port_mask_type), | 
|  | "ingress_port"); | 
|  | return rc; | 
|  | } | 
|  | if (CHECK(ENC_ETHER_TYPE, eth_proto) || | 
|  | CHECK(ENC_VLAN0_TCI, vlan_tci[0]) || | 
|  | CHECK(ENC_VLAN0_PROTO, vlan_proto[0]) || | 
|  | CHECK(ENC_VLAN1_TCI, vlan_tci[1]) || | 
|  | CHECK(ENC_VLAN1_PROTO, vlan_proto[1]) || | 
|  | CHECK(ENC_ETH_SADDR, eth_saddr) || | 
|  | CHECK(ENC_ETH_DADDR, eth_daddr) || | 
|  | CHECK(ENC_IP_PROTO, ip_proto) || | 
|  | CHECK(ENC_IP_TOS, ip_tos) || | 
|  | CHECK(ENC_IP_TTL, ip_ttl) || | 
|  | CHECK_BIT(ENC_IP_FRAG, ip_frag) || | 
|  | UNSUPPORTED_BIT(ip_firstfrag) || | 
|  | CHECK(ENC_SRC_IP4, src_ip) || | 
|  | CHECK(ENC_DST_IP4, dst_ip) || | 
|  | #ifdef CONFIG_IPV6 | 
|  | CHECK(ENC_SRC_IP6, src_ip6) || | 
|  | CHECK(ENC_DST_IP6, dst_ip6) || | 
|  | #endif | 
|  | CHECK(ENC_L4_SPORT, l4_sport) || | 
|  | CHECK(ENC_L4_DPORT, l4_dport) || | 
|  | UNSUPPORTED(tcp_flags) || | 
|  | CHECK_BIT(TCP_SYN_FIN_RST, tcp_syn_fin_rst)) | 
|  | return rc; | 
|  | if (efx_tc_match_is_encap(mask)) { | 
|  | /* can't happen; disallowed for local rules, translated | 
|  | * for foreign rules. | 
|  | */ | 
|  | NL_SET_ERR_MSG_MOD(extack, "Unexpected encap match in LHS rule"); | 
|  | return -EOPNOTSUPP; | 
|  | } | 
|  | if (UNSUPPORTED(enc_keyid) || | 
|  | /* Can't filter on conntrack in LHS rules */ | 
|  | UNSUPPORTED_BIT(ct_state_trk) || | 
|  | UNSUPPORTED_BIT(ct_state_est) || | 
|  | UNSUPPORTED(ct_mark) || | 
|  | UNSUPPORTED(recirc_id)) | 
|  | return rc; | 
|  | return 0; | 
|  | } | 
|  | #undef UNSUPPORTED | 
|  | #undef CHECK_BIT | 
|  | #undef CHECK | 
|  |  | 
|  | #define CHECK(_mcdi)	({						       \ | 
|  | rc = efx_mae_match_check_cap_typ(supported_fields[MAE_FIELD_ ## _mcdi],\ | 
|  | MASK_ONES);			       \ | 
|  | if (rc)								       \ | 
|  | NL_SET_ERR_MSG_FMT_MOD(extack,				       \ | 
|  | "No support for field %s", #_mcdi);     \ | 
|  | rc;								       \ | 
|  | }) | 
|  | /* Checks that the fields needed for encap-rule matches are supported by the | 
|  | * MAE.  All the fields are exact-match, except possibly ENC_IP_TOS. | 
|  | */ | 
|  | int efx_mae_check_encap_match_caps(struct efx_nic *efx, bool ipv6, | 
|  | u8 ip_tos_mask, __be16 udp_sport_mask, | 
|  | struct netlink_ext_ack *extack) | 
|  | { | 
|  | u8 *supported_fields = efx->tc->caps->outer_rule_fields; | 
|  | enum mask_type typ; | 
|  | int rc; | 
|  |  | 
|  | if (CHECK(ENC_ETHER_TYPE)) | 
|  | return rc; | 
|  | if (ipv6) { | 
|  | if (CHECK(ENC_SRC_IP6) || | 
|  | CHECK(ENC_DST_IP6)) | 
|  | return rc; | 
|  | } else { | 
|  | if (CHECK(ENC_SRC_IP4) || | 
|  | CHECK(ENC_DST_IP4)) | 
|  | return rc; | 
|  | } | 
|  | if (CHECK(ENC_L4_DPORT) || | 
|  | CHECK(ENC_IP_PROTO)) | 
|  | return rc; | 
|  | typ = classify_mask((const u8 *)&udp_sport_mask, sizeof(udp_sport_mask)); | 
|  | rc = efx_mae_match_check_cap_typ(supported_fields[MAE_FIELD_ENC_L4_SPORT], | 
|  | typ); | 
|  | if (rc) { | 
|  | NL_SET_ERR_MSG_FMT_MOD(extack, "No support for %s mask in field %s", | 
|  | mask_type_name(typ), "enc_src_port"); | 
|  | return rc; | 
|  | } | 
|  | typ = classify_mask(&ip_tos_mask, sizeof(ip_tos_mask)); | 
|  | rc = efx_mae_match_check_cap_typ(supported_fields[MAE_FIELD_ENC_IP_TOS], | 
|  | typ); | 
|  | if (rc) { | 
|  | NL_SET_ERR_MSG_FMT_MOD(extack, "No support for %s mask in field %s", | 
|  | mask_type_name(typ), "enc_ip_tos"); | 
|  | return rc; | 
|  | } | 
|  | return 0; | 
|  | } | 
|  | #undef CHECK | 
|  |  | 
|  | int efx_mae_check_encap_type_supported(struct efx_nic *efx, enum efx_encap_type typ) | 
|  | { | 
|  | unsigned int bit; | 
|  |  | 
|  | switch (typ & EFX_ENCAP_TYPES_MASK) { | 
|  | case EFX_ENCAP_TYPE_VXLAN: | 
|  | bit = MC_CMD_MAE_GET_CAPS_OUT_ENCAP_TYPE_VXLAN_LBN; | 
|  | break; | 
|  | case EFX_ENCAP_TYPE_GENEVE: | 
|  | bit = MC_CMD_MAE_GET_CAPS_OUT_ENCAP_TYPE_GENEVE_LBN; | 
|  | break; | 
|  | default: | 
|  | return -EOPNOTSUPP; | 
|  | } | 
|  | if (efx->tc->caps->encap_types & BIT(bit)) | 
|  | return 0; | 
|  | return -EOPNOTSUPP; | 
|  | } | 
|  |  | 
|  | int efx_mae_allocate_counter(struct efx_nic *efx, struct efx_tc_counter *cnt) | 
|  | { | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_COUNTER_ALLOC_OUT_LEN(1)); | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_COUNTER_ALLOC_V2_IN_LEN); | 
|  | size_t outlen; | 
|  | int rc; | 
|  |  | 
|  | if (!cnt) | 
|  | return -EINVAL; | 
|  |  | 
|  | MCDI_SET_DWORD(inbuf, MAE_COUNTER_ALLOC_V2_IN_REQUESTED_COUNT, 1); | 
|  | MCDI_SET_DWORD(inbuf, MAE_COUNTER_ALLOC_V2_IN_COUNTER_TYPE, cnt->type); | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_MAE_COUNTER_ALLOC, inbuf, sizeof(inbuf), | 
|  | outbuf, sizeof(outbuf), &outlen); | 
|  | if (rc) | 
|  | return rc; | 
|  | /* pcol says this can't happen, since count is 1 */ | 
|  | if (outlen < sizeof(outbuf)) | 
|  | return -EIO; | 
|  | cnt->fw_id = MCDI_DWORD(outbuf, MAE_COUNTER_ALLOC_OUT_COUNTER_ID); | 
|  | cnt->gen = MCDI_DWORD(outbuf, MAE_COUNTER_ALLOC_OUT_GENERATION_COUNT); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int efx_mae_free_counter(struct efx_nic *efx, struct efx_tc_counter *cnt) | 
|  | { | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_COUNTER_FREE_OUT_LEN(1)); | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_COUNTER_FREE_V2_IN_LEN); | 
|  | size_t outlen; | 
|  | int rc; | 
|  |  | 
|  | MCDI_SET_DWORD(inbuf, MAE_COUNTER_FREE_V2_IN_COUNTER_ID_COUNT, 1); | 
|  | MCDI_SET_DWORD(inbuf, MAE_COUNTER_FREE_V2_IN_FREE_COUNTER_ID, cnt->fw_id); | 
|  | MCDI_SET_DWORD(inbuf, MAE_COUNTER_FREE_V2_IN_COUNTER_TYPE, cnt->type); | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_MAE_COUNTER_FREE, inbuf, sizeof(inbuf), | 
|  | outbuf, sizeof(outbuf), &outlen); | 
|  | if (rc) | 
|  | return rc; | 
|  | /* pcol says this can't happen, since count is 1 */ | 
|  | if (outlen < sizeof(outbuf)) | 
|  | return -EIO; | 
|  | /* FW freed a different ID than we asked for, should also never happen. | 
|  | * Warn because it means we've now got a different idea to the FW of | 
|  | * what counters exist, which could cause mayhem later. | 
|  | */ | 
|  | if (WARN_ON(MCDI_DWORD(outbuf, MAE_COUNTER_FREE_OUT_FREED_COUNTER_ID) != | 
|  | cnt->fw_id)) | 
|  | return -EIO; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int efx_mae_encap_type_to_mae_type(enum efx_encap_type type) | 
|  | { | 
|  | switch (type & EFX_ENCAP_TYPES_MASK) { | 
|  | case EFX_ENCAP_TYPE_NONE: | 
|  | return MAE_MCDI_ENCAP_TYPE_NONE; | 
|  | case EFX_ENCAP_TYPE_VXLAN: | 
|  | return MAE_MCDI_ENCAP_TYPE_VXLAN; | 
|  | case EFX_ENCAP_TYPE_GENEVE: | 
|  | return MAE_MCDI_ENCAP_TYPE_GENEVE; | 
|  | default: | 
|  | return -EOPNOTSUPP; | 
|  | } | 
|  | } | 
|  |  | 
|  | int efx_mae_allocate_encap_md(struct efx_nic *efx, | 
|  | struct efx_tc_encap_action *encap) | 
|  | { | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_ENCAP_HEADER_ALLOC_IN_LEN(EFX_TC_MAX_ENCAP_HDR)); | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_ENCAP_HEADER_ALLOC_OUT_LEN); | 
|  | size_t inlen, outlen; | 
|  | int rc; | 
|  |  | 
|  | rc = efx_mae_encap_type_to_mae_type(encap->type); | 
|  | if (rc < 0) | 
|  | return rc; | 
|  | MCDI_SET_DWORD(inbuf, MAE_ENCAP_HEADER_ALLOC_IN_ENCAP_TYPE, rc); | 
|  | inlen = MC_CMD_MAE_ENCAP_HEADER_ALLOC_IN_LEN(encap->encap_hdr_len); | 
|  | if (WARN_ON(inlen > sizeof(inbuf))) /* can't happen */ | 
|  | return -EINVAL; | 
|  | memcpy(MCDI_PTR(inbuf, MAE_ENCAP_HEADER_ALLOC_IN_HDR_DATA), | 
|  | encap->encap_hdr, | 
|  | encap->encap_hdr_len); | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_MAE_ENCAP_HEADER_ALLOC, inbuf, | 
|  | inlen, outbuf, sizeof(outbuf), &outlen); | 
|  | if (rc) | 
|  | return rc; | 
|  | if (outlen < sizeof(outbuf)) | 
|  | return -EIO; | 
|  | encap->fw_id = MCDI_DWORD(outbuf, MAE_ENCAP_HEADER_ALLOC_OUT_ENCAP_HEADER_ID); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int efx_mae_update_encap_md(struct efx_nic *efx, | 
|  | struct efx_tc_encap_action *encap) | 
|  | { | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_ENCAP_HEADER_UPDATE_IN_LEN(EFX_TC_MAX_ENCAP_HDR)); | 
|  | size_t inlen; | 
|  | int rc; | 
|  |  | 
|  | rc = efx_mae_encap_type_to_mae_type(encap->type); | 
|  | if (rc < 0) | 
|  | return rc; | 
|  | MCDI_SET_DWORD(inbuf, MAE_ENCAP_HEADER_UPDATE_IN_ENCAP_TYPE, rc); | 
|  | MCDI_SET_DWORD(inbuf, MAE_ENCAP_HEADER_UPDATE_IN_EH_ID, | 
|  | encap->fw_id); | 
|  | inlen = MC_CMD_MAE_ENCAP_HEADER_UPDATE_IN_LEN(encap->encap_hdr_len); | 
|  | if (WARN_ON(inlen > sizeof(inbuf))) /* can't happen */ | 
|  | return -EINVAL; | 
|  | memcpy(MCDI_PTR(inbuf, MAE_ENCAP_HEADER_UPDATE_IN_HDR_DATA), | 
|  | encap->encap_hdr, | 
|  | encap->encap_hdr_len); | 
|  |  | 
|  | BUILD_BUG_ON(MC_CMD_MAE_ENCAP_HEADER_UPDATE_OUT_LEN != 0); | 
|  | return efx_mcdi_rpc(efx, MC_CMD_MAE_ENCAP_HEADER_UPDATE, inbuf, | 
|  | inlen, NULL, 0, NULL); | 
|  | } | 
|  |  | 
|  | int efx_mae_free_encap_md(struct efx_nic *efx, | 
|  | struct efx_tc_encap_action *encap) | 
|  | { | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_ENCAP_HEADER_FREE_OUT_LEN(1)); | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_ENCAP_HEADER_FREE_IN_LEN(1)); | 
|  | size_t outlen; | 
|  | int rc; | 
|  |  | 
|  | MCDI_SET_DWORD(inbuf, MAE_ENCAP_HEADER_FREE_IN_EH_ID, encap->fw_id); | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_MAE_ENCAP_HEADER_FREE, inbuf, | 
|  | sizeof(inbuf), outbuf, sizeof(outbuf), &outlen); | 
|  | if (rc) | 
|  | return rc; | 
|  | if (outlen < sizeof(outbuf)) | 
|  | return -EIO; | 
|  | /* FW freed a different ID than we asked for, should also never happen. | 
|  | * Warn because it means we've now got a different idea to the FW of | 
|  | * what encap_mds exist, which could cause mayhem later. | 
|  | */ | 
|  | if (WARN_ON(MCDI_DWORD(outbuf, MAE_ENCAP_HEADER_FREE_OUT_FREED_EH_ID) != encap->fw_id)) | 
|  | return -EIO; | 
|  | /* We're probably about to free @encap, but let's just make sure its | 
|  | * fw_id is blatted so that it won't look valid if it leaks out. | 
|  | */ | 
|  | encap->fw_id = MC_CMD_MAE_ENCAP_HEADER_ALLOC_OUT_ENCAP_HEADER_ID_NULL; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int efx_mae_lookup_mport(struct efx_nic *efx, u32 vf_idx, u32 *id) | 
|  | { | 
|  | struct ef100_nic_data *nic_data = efx->nic_data; | 
|  | struct efx_mae *mae = efx->mae; | 
|  | struct rhashtable_iter walk; | 
|  | struct mae_mport_desc *m; | 
|  | int rc = -ENOENT; | 
|  |  | 
|  | rhashtable_walk_enter(&mae->mports_ht, &walk); | 
|  | rhashtable_walk_start(&walk); | 
|  | while ((m = rhashtable_walk_next(&walk)) != NULL) { | 
|  | if (m->mport_type == MAE_MPORT_DESC_MPORT_TYPE_VNIC && | 
|  | m->interface_idx == nic_data->local_mae_intf && | 
|  | m->pf_idx == 0 && | 
|  | m->vf_idx == vf_idx) { | 
|  | *id = m->mport_id; | 
|  | rc = 0; | 
|  | break; | 
|  | } | 
|  | } | 
|  | rhashtable_walk_stop(&walk); | 
|  | rhashtable_walk_exit(&walk); | 
|  | return rc; | 
|  | } | 
|  |  | 
|  | static bool efx_mae_asl_id(u32 id) | 
|  | { | 
|  | return !!(id & BIT(31)); | 
|  | } | 
|  |  | 
|  | /* mport handling */ | 
|  | static const struct rhashtable_params efx_mae_mports_ht_params = { | 
|  | .key_len	= sizeof(u32), | 
|  | .key_offset	= offsetof(struct mae_mport_desc, mport_id), | 
|  | .head_offset	= offsetof(struct mae_mport_desc, linkage), | 
|  | }; | 
|  |  | 
|  | struct mae_mport_desc *efx_mae_get_mport(struct efx_nic *efx, u32 mport_id) | 
|  | { | 
|  | return rhashtable_lookup_fast(&efx->mae->mports_ht, &mport_id, | 
|  | efx_mae_mports_ht_params); | 
|  | } | 
|  |  | 
|  | static int efx_mae_add_mport(struct efx_nic *efx, struct mae_mport_desc *desc) | 
|  | { | 
|  | struct efx_mae *mae = efx->mae; | 
|  | int rc; | 
|  |  | 
|  | rc = rhashtable_insert_fast(&mae->mports_ht, &desc->linkage, | 
|  | efx_mae_mports_ht_params); | 
|  |  | 
|  | if (rc) { | 
|  | pci_err(efx->pci_dev, "Failed to insert MPORT %08x, rc %d\n", | 
|  | desc->mport_id, rc); | 
|  | kfree(desc); | 
|  | return rc; | 
|  | } | 
|  |  | 
|  | return rc; | 
|  | } | 
|  |  | 
|  | void efx_mae_remove_mport(void *desc, void *arg) | 
|  | { | 
|  | struct mae_mport_desc *mport = desc; | 
|  |  | 
|  | synchronize_rcu(); | 
|  | kfree(mport); | 
|  | } | 
|  |  | 
|  | static int efx_mae_process_mport(struct efx_nic *efx, | 
|  | struct mae_mport_desc *desc) | 
|  | { | 
|  | struct ef100_nic_data *nic_data = efx->nic_data; | 
|  | struct mae_mport_desc *mport; | 
|  |  | 
|  | mport = efx_mae_get_mport(efx, desc->mport_id); | 
|  | if (!IS_ERR_OR_NULL(mport)) { | 
|  | netif_err(efx, drv, efx->net_dev, | 
|  | "mport with id %u does exist!!!\n", desc->mport_id); | 
|  | return -EEXIST; | 
|  | } | 
|  |  | 
|  | if (nic_data->have_own_mport && | 
|  | desc->mport_id == nic_data->own_mport) { | 
|  | WARN_ON(desc->mport_type != MAE_MPORT_DESC_MPORT_TYPE_VNIC); | 
|  | WARN_ON(desc->vnic_client_type != | 
|  | MAE_MPORT_DESC_VNIC_CLIENT_TYPE_FUNCTION); | 
|  | nic_data->local_mae_intf = desc->interface_idx; | 
|  | nic_data->have_local_intf = true; | 
|  | pci_dbg(efx->pci_dev, "MAE interface_idx is %u\n", | 
|  | nic_data->local_mae_intf); | 
|  | } | 
|  |  | 
|  | return efx_mae_add_mport(efx, desc); | 
|  | } | 
|  |  | 
|  | #define MCDI_MPORT_JOURNAL_LEN \ | 
|  | ALIGN(MC_CMD_MAE_MPORT_READ_JOURNAL_OUT_LENMAX_MCDI2, 4) | 
|  |  | 
|  | int efx_mae_enumerate_mports(struct efx_nic *efx) | 
|  | { | 
|  | efx_dword_t *outbuf = kzalloc(MCDI_MPORT_JOURNAL_LEN, GFP_KERNEL); | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_MPORT_READ_JOURNAL_IN_LEN); | 
|  | MCDI_DECLARE_STRUCT_PTR(desc); | 
|  | size_t outlen, stride, count; | 
|  | int rc = 0, i; | 
|  |  | 
|  | if (!outbuf) | 
|  | return -ENOMEM; | 
|  | do { | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_MAE_MPORT_READ_JOURNAL, inbuf, | 
|  | sizeof(inbuf), outbuf, | 
|  | MCDI_MPORT_JOURNAL_LEN, &outlen); | 
|  | if (rc) | 
|  | goto fail; | 
|  | if (outlen < MC_CMD_MAE_MPORT_READ_JOURNAL_OUT_MPORT_DESC_DATA_OFST) { | 
|  | rc = -EIO; | 
|  | goto fail; | 
|  | } | 
|  | count = MCDI_DWORD(outbuf, MAE_MPORT_READ_JOURNAL_OUT_MPORT_DESC_COUNT); | 
|  | if (!count) | 
|  | continue; /* not break; we want to look at MORE flag */ | 
|  | stride = MCDI_DWORD(outbuf, MAE_MPORT_READ_JOURNAL_OUT_SIZEOF_MPORT_DESC); | 
|  | if (stride < MAE_MPORT_DESC_LEN) { | 
|  | rc = -EIO; | 
|  | goto fail; | 
|  | } | 
|  | if (outlen < MC_CMD_MAE_MPORT_READ_JOURNAL_OUT_LEN(count * stride)) { | 
|  | rc = -EIO; | 
|  | goto fail; | 
|  | } | 
|  |  | 
|  | for (i = 0; i < count; i++) { | 
|  | struct mae_mport_desc *d; | 
|  |  | 
|  | d = kzalloc(sizeof(*d), GFP_KERNEL); | 
|  | if (!d) { | 
|  | rc = -ENOMEM; | 
|  | goto fail; | 
|  | } | 
|  |  | 
|  | desc = (efx_dword_t *) | 
|  | _MCDI_PTR(outbuf, MC_CMD_MAE_MPORT_READ_JOURNAL_OUT_MPORT_DESC_DATA_OFST + | 
|  | i * stride); | 
|  | d->mport_id = MCDI_STRUCT_DWORD(desc, MAE_MPORT_DESC_MPORT_ID); | 
|  | d->flags = MCDI_STRUCT_DWORD(desc, MAE_MPORT_DESC_FLAGS); | 
|  | d->caller_flags = MCDI_STRUCT_DWORD(desc, | 
|  | MAE_MPORT_DESC_CALLER_FLAGS); | 
|  | d->mport_type = MCDI_STRUCT_DWORD(desc, | 
|  | MAE_MPORT_DESC_MPORT_TYPE); | 
|  | switch (d->mport_type) { | 
|  | case MAE_MPORT_DESC_MPORT_TYPE_NET_PORT: | 
|  | d->port_idx = MCDI_STRUCT_DWORD(desc, | 
|  | MAE_MPORT_DESC_NET_PORT_IDX); | 
|  | break; | 
|  | case MAE_MPORT_DESC_MPORT_TYPE_ALIAS: | 
|  | d->alias_mport_id = MCDI_STRUCT_DWORD(desc, | 
|  | MAE_MPORT_DESC_ALIAS_DELIVER_MPORT_ID); | 
|  | break; | 
|  | case MAE_MPORT_DESC_MPORT_TYPE_VNIC: | 
|  | d->vnic_client_type = MCDI_STRUCT_DWORD(desc, | 
|  | MAE_MPORT_DESC_VNIC_CLIENT_TYPE); | 
|  | d->interface_idx = MCDI_STRUCT_DWORD(desc, | 
|  | MAE_MPORT_DESC_VNIC_FUNCTION_INTERFACE); | 
|  | d->pf_idx = MCDI_STRUCT_WORD(desc, | 
|  | MAE_MPORT_DESC_VNIC_FUNCTION_PF_IDX); | 
|  | d->vf_idx = MCDI_STRUCT_WORD(desc, | 
|  | MAE_MPORT_DESC_VNIC_FUNCTION_VF_IDX); | 
|  | break; | 
|  | default: | 
|  | /* Unknown mport_type, just accept it */ | 
|  | break; | 
|  | } | 
|  | rc = efx_mae_process_mport(efx, d); | 
|  | /* Any failure will be due to memory allocation faiure, | 
|  | * so there is no point to try subsequent entries. | 
|  | */ | 
|  | if (rc) | 
|  | goto fail; | 
|  | } | 
|  | } while (MCDI_FIELD(outbuf, MAE_MPORT_READ_JOURNAL_OUT, MORE) && | 
|  | !WARN_ON(!count)); | 
|  | fail: | 
|  | kfree(outbuf); | 
|  | return rc; | 
|  | } | 
|  |  | 
|  | /** | 
|  | * efx_mae_allocate_pedit_mac() - allocate pedit MAC address in HW. | 
|  | * @efx:	NIC we're installing a pedit MAC address on | 
|  | * @ped:	pedit MAC action to be installed | 
|  | * | 
|  | * Attempts to install @ped in HW and populates its id with an index of this | 
|  | * entry in the firmware MAC address table on success. | 
|  | * | 
|  | * Return: negative value on error, 0 in success. | 
|  | */ | 
|  | int efx_mae_allocate_pedit_mac(struct efx_nic *efx, | 
|  | struct efx_tc_mac_pedit_action *ped) | 
|  | { | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_MAC_ADDR_ALLOC_OUT_LEN); | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_MAC_ADDR_ALLOC_IN_LEN); | 
|  | size_t outlen; | 
|  | int rc; | 
|  |  | 
|  | BUILD_BUG_ON(MC_CMD_MAE_MAC_ADDR_ALLOC_IN_MAC_ADDR_LEN != | 
|  | sizeof(ped->h_addr)); | 
|  | memcpy(MCDI_PTR(inbuf, MAE_MAC_ADDR_ALLOC_IN_MAC_ADDR), ped->h_addr, | 
|  | sizeof(ped->h_addr)); | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_MAE_MAC_ADDR_ALLOC, inbuf, sizeof(inbuf), | 
|  | outbuf, sizeof(outbuf), &outlen); | 
|  | if (rc) | 
|  | return rc; | 
|  | if (outlen < sizeof(outbuf)) | 
|  | return -EIO; | 
|  | ped->fw_id = MCDI_DWORD(outbuf, MAE_MAC_ADDR_ALLOC_OUT_MAC_ID); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /** | 
|  | * efx_mae_free_pedit_mac() - free pedit MAC address in HW. | 
|  | * @efx:	NIC we're installing a pedit MAC address on | 
|  | * @ped:	pedit MAC action that needs to be freed | 
|  | * | 
|  | * Frees @ped in HW, check that firmware did not free a different one and clears | 
|  | * the id (which denotes the index of the entry in the MAC address table). | 
|  | */ | 
|  | void efx_mae_free_pedit_mac(struct efx_nic *efx, | 
|  | struct efx_tc_mac_pedit_action *ped) | 
|  | { | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_MAC_ADDR_FREE_OUT_LEN(1)); | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_MAC_ADDR_FREE_IN_LEN(1)); | 
|  | size_t outlen; | 
|  | int rc; | 
|  |  | 
|  | MCDI_SET_DWORD(inbuf, MAE_MAC_ADDR_FREE_IN_MAC_ID, ped->fw_id); | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_MAE_MAC_ADDR_FREE, inbuf, | 
|  | sizeof(inbuf), outbuf, sizeof(outbuf), &outlen); | 
|  | if (rc || outlen < sizeof(outbuf)) | 
|  | return; | 
|  | /* FW freed a different ID than we asked for, should also never happen. | 
|  | * Warn because it means we've now got a different idea to the FW of | 
|  | * what MAC addresses exist, which could cause mayhem later. | 
|  | */ | 
|  | if (WARN_ON(MCDI_DWORD(outbuf, MAE_MAC_ADDR_FREE_OUT_FREED_MAC_ID) != ped->fw_id)) | 
|  | return; | 
|  | /* We're probably about to free @ped, but let's just make sure its | 
|  | * fw_id is blatted so that it won't look valid if it leaks out. | 
|  | */ | 
|  | ped->fw_id = MC_CMD_MAE_MAC_ADDR_ALLOC_OUT_MAC_ID_NULL; | 
|  | } | 
|  |  | 
|  | int efx_mae_alloc_action_set(struct efx_nic *efx, struct efx_tc_action_set *act) | 
|  | { | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_ACTION_SET_ALLOC_OUT_LEN); | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_ACTION_SET_ALLOC_IN_LEN); | 
|  | size_t outlen; | 
|  | int rc; | 
|  |  | 
|  | MCDI_POPULATE_DWORD_5(inbuf, MAE_ACTION_SET_ALLOC_IN_FLAGS, | 
|  | MAE_ACTION_SET_ALLOC_IN_VLAN_PUSH, act->vlan_push, | 
|  | MAE_ACTION_SET_ALLOC_IN_VLAN_POP, act->vlan_pop, | 
|  | MAE_ACTION_SET_ALLOC_IN_DECAP, act->decap, | 
|  | MAE_ACTION_SET_ALLOC_IN_DO_NAT, act->do_nat, | 
|  | MAE_ACTION_SET_ALLOC_IN_DO_DECR_IP_TTL, | 
|  | act->do_ttl_dec); | 
|  |  | 
|  | if (act->src_mac) | 
|  | MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_ALLOC_IN_SRC_MAC_ID, | 
|  | act->src_mac->fw_id); | 
|  | else | 
|  | MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_ALLOC_IN_SRC_MAC_ID, | 
|  | MC_CMD_MAE_MAC_ADDR_ALLOC_OUT_MAC_ID_NULL); | 
|  |  | 
|  | if (act->dst_mac) | 
|  | MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_ALLOC_IN_DST_MAC_ID, | 
|  | act->dst_mac->fw_id); | 
|  | else | 
|  | MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_ALLOC_IN_DST_MAC_ID, | 
|  | MC_CMD_MAE_MAC_ADDR_ALLOC_OUT_MAC_ID_NULL); | 
|  |  | 
|  | if (act->count && !WARN_ON(!act->count->cnt)) | 
|  | MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_ALLOC_IN_COUNTER_ID, | 
|  | act->count->cnt->fw_id); | 
|  | else | 
|  | MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_ALLOC_IN_COUNTER_ID, | 
|  | MC_CMD_MAE_COUNTER_ALLOC_OUT_COUNTER_ID_NULL); | 
|  | MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_ALLOC_IN_COUNTER_LIST_ID, | 
|  | MC_CMD_MAE_COUNTER_LIST_ALLOC_OUT_COUNTER_LIST_ID_NULL); | 
|  | if (act->vlan_push) { | 
|  | MCDI_SET_WORD_BE(inbuf, MAE_ACTION_SET_ALLOC_IN_VLAN0_TCI_BE, | 
|  | act->vlan_tci[0]); | 
|  | MCDI_SET_WORD_BE(inbuf, MAE_ACTION_SET_ALLOC_IN_VLAN0_PROTO_BE, | 
|  | act->vlan_proto[0]); | 
|  | } | 
|  | if (act->vlan_push >= 2) { | 
|  | MCDI_SET_WORD_BE(inbuf, MAE_ACTION_SET_ALLOC_IN_VLAN1_TCI_BE, | 
|  | act->vlan_tci[1]); | 
|  | MCDI_SET_WORD_BE(inbuf, MAE_ACTION_SET_ALLOC_IN_VLAN1_PROTO_BE, | 
|  | act->vlan_proto[1]); | 
|  | } | 
|  | if (act->encap_md) | 
|  | MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_ALLOC_IN_ENCAP_HEADER_ID, | 
|  | act->encap_md->fw_id); | 
|  | else | 
|  | MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_ALLOC_IN_ENCAP_HEADER_ID, | 
|  | MC_CMD_MAE_ENCAP_HEADER_ALLOC_OUT_ENCAP_HEADER_ID_NULL); | 
|  | if (act->deliver) | 
|  | MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_ALLOC_IN_DELIVER, | 
|  | act->dest_mport); | 
|  | BUILD_BUG_ON(MAE_MPORT_SELECTOR_NULL); | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_MAE_ACTION_SET_ALLOC, inbuf, sizeof(inbuf), | 
|  | outbuf, sizeof(outbuf), &outlen); | 
|  | if (rc) | 
|  | return rc; | 
|  | if (outlen < sizeof(outbuf)) | 
|  | return -EIO; | 
|  | act->fw_id = MCDI_DWORD(outbuf, MAE_ACTION_SET_ALLOC_OUT_AS_ID); | 
|  | /* We rely on the high bit of AS IDs always being clear. | 
|  | * The firmware API guarantees this, but let's check it ourselves. | 
|  | */ | 
|  | if (WARN_ON_ONCE(efx_mae_asl_id(act->fw_id))) { | 
|  | efx_mae_free_action_set(efx, act->fw_id); | 
|  | return -EIO; | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int efx_mae_free_action_set(struct efx_nic *efx, u32 fw_id) | 
|  | { | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_ACTION_SET_FREE_OUT_LEN(1)); | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_ACTION_SET_FREE_IN_LEN(1)); | 
|  | size_t outlen; | 
|  | int rc; | 
|  |  | 
|  | MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_FREE_IN_AS_ID, fw_id); | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_MAE_ACTION_SET_FREE, inbuf, sizeof(inbuf), | 
|  | outbuf, sizeof(outbuf), &outlen); | 
|  | if (rc) | 
|  | return rc; | 
|  | if (outlen < sizeof(outbuf)) | 
|  | return -EIO; | 
|  | /* FW freed a different ID than we asked for, should never happen. | 
|  | * Warn because it means we've now got a different idea to the FW of | 
|  | * what action-sets exist, which could cause mayhem later. | 
|  | */ | 
|  | if (WARN_ON(MCDI_DWORD(outbuf, MAE_ACTION_SET_FREE_OUT_FREED_AS_ID) != fw_id)) | 
|  | return -EIO; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int efx_mae_alloc_action_set_list(struct efx_nic *efx, | 
|  | struct efx_tc_action_set_list *acts) | 
|  | { | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_ACTION_SET_LIST_ALLOC_OUT_LEN); | 
|  | struct efx_tc_action_set *act; | 
|  | size_t inlen, outlen, i = 0; | 
|  | efx_dword_t *inbuf; | 
|  | int rc; | 
|  |  | 
|  | list_for_each_entry(act, &acts->list, list) | 
|  | i++; | 
|  | if (i == 0) | 
|  | return -EINVAL; | 
|  | if (i == 1) { | 
|  | /* Don't wrap an ASL around a single AS, just use the AS_ID | 
|  | * directly.  ASLs are a more limited resource. | 
|  | */ | 
|  | act = list_first_entry(&acts->list, struct efx_tc_action_set, list); | 
|  | acts->fw_id = act->fw_id; | 
|  | return 0; | 
|  | } | 
|  | if (i > MC_CMD_MAE_ACTION_SET_LIST_ALLOC_IN_AS_IDS_MAXNUM_MCDI2) | 
|  | return -EOPNOTSUPP; /* Too many actions */ | 
|  | inlen = MC_CMD_MAE_ACTION_SET_LIST_ALLOC_IN_LEN(i); | 
|  | inbuf = kzalloc(inlen, GFP_KERNEL); | 
|  | if (!inbuf) | 
|  | return -ENOMEM; | 
|  | i = 0; | 
|  | list_for_each_entry(act, &acts->list, list) { | 
|  | MCDI_SET_ARRAY_DWORD(inbuf, MAE_ACTION_SET_LIST_ALLOC_IN_AS_IDS, | 
|  | i, act->fw_id); | 
|  | i++; | 
|  | } | 
|  | MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_LIST_ALLOC_IN_COUNT, i); | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_MAE_ACTION_SET_LIST_ALLOC, inbuf, inlen, | 
|  | outbuf, sizeof(outbuf), &outlen); | 
|  | if (rc) | 
|  | goto out_free; | 
|  | if (outlen < sizeof(outbuf)) { | 
|  | rc = -EIO; | 
|  | goto out_free; | 
|  | } | 
|  | acts->fw_id = MCDI_DWORD(outbuf, MAE_ACTION_SET_LIST_ALLOC_OUT_ASL_ID); | 
|  | /* We rely on the high bit of ASL IDs always being set. | 
|  | * The firmware API guarantees this, but let's check it ourselves. | 
|  | */ | 
|  | if (WARN_ON_ONCE(!efx_mae_asl_id(acts->fw_id))) { | 
|  | efx_mae_free_action_set_list(efx, acts); | 
|  | rc = -EIO; | 
|  | } | 
|  | out_free: | 
|  | kfree(inbuf); | 
|  | return rc; | 
|  | } | 
|  |  | 
|  | int efx_mae_free_action_set_list(struct efx_nic *efx, | 
|  | struct efx_tc_action_set_list *acts) | 
|  | { | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_ACTION_SET_LIST_FREE_OUT_LEN(1)); | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_ACTION_SET_LIST_FREE_IN_LEN(1)); | 
|  | size_t outlen; | 
|  | int rc; | 
|  |  | 
|  | /* If this is just an AS_ID with no ASL wrapper, then there is | 
|  | * nothing for us to free.  (The AS will be freed later.) | 
|  | */ | 
|  | if (efx_mae_asl_id(acts->fw_id)) { | 
|  | MCDI_SET_DWORD(inbuf, MAE_ACTION_SET_LIST_FREE_IN_ASL_ID, | 
|  | acts->fw_id); | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_MAE_ACTION_SET_LIST_FREE, inbuf, | 
|  | sizeof(inbuf), outbuf, sizeof(outbuf), &outlen); | 
|  | if (rc) | 
|  | return rc; | 
|  | if (outlen < sizeof(outbuf)) | 
|  | return -EIO; | 
|  | /* FW freed a different ID than we asked for, should never happen. | 
|  | * Warn because it means we've now got a different idea to the FW of | 
|  | * what action-set-lists exist, which could cause mayhem later. | 
|  | */ | 
|  | if (WARN_ON(MCDI_DWORD(outbuf, MAE_ACTION_SET_LIST_FREE_OUT_FREED_ASL_ID) != acts->fw_id)) | 
|  | return -EIO; | 
|  | } | 
|  | /* We're probably about to free @acts, but let's just make sure its | 
|  | * fw_id is blatted so that it won't look valid if it leaks out. | 
|  | */ | 
|  | acts->fw_id = MC_CMD_MAE_ACTION_SET_LIST_ALLOC_OUT_ACTION_SET_LIST_ID_NULL; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int efx_mae_register_encap_match(struct efx_nic *efx, | 
|  | struct efx_tc_encap_match *encap) | 
|  | { | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_OUTER_RULE_INSERT_IN_LEN(MAE_ENC_FIELD_PAIRS_LEN)); | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_OUTER_RULE_INSERT_OUT_LEN); | 
|  | MCDI_DECLARE_STRUCT_PTR(match_crit); | 
|  | size_t outlen; | 
|  | int rc; | 
|  |  | 
|  | rc = efx_mae_encap_type_to_mae_type(encap->tun_type); | 
|  | if (rc < 0) | 
|  | return rc; | 
|  | match_crit = _MCDI_DWORD(inbuf, MAE_OUTER_RULE_INSERT_IN_FIELD_MATCH_CRITERIA); | 
|  | /* The struct contains IP src and dst, and udp dport. | 
|  | * So we actually need to filter on IP src and dst, L4 dport, and | 
|  | * ipproto == udp. | 
|  | */ | 
|  | MCDI_SET_DWORD(inbuf, MAE_OUTER_RULE_INSERT_IN_ENCAP_TYPE, rc); | 
|  | #ifdef CONFIG_IPV6 | 
|  | if (encap->src_ip | encap->dst_ip) { | 
|  | #endif | 
|  | MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_SRC_IP4_BE, | 
|  | encap->src_ip); | 
|  | MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_SRC_IP4_BE_MASK, | 
|  | ~(__be32)0); | 
|  | MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_DST_IP4_BE, | 
|  | encap->dst_ip); | 
|  | MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_DST_IP4_BE_MASK, | 
|  | ~(__be32)0); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_ETHER_TYPE_BE, | 
|  | htons(ETH_P_IP)); | 
|  | #ifdef CONFIG_IPV6 | 
|  | } else { | 
|  | memcpy(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_SRC_IP6_BE), | 
|  | &encap->src_ip6, sizeof(encap->src_ip6)); | 
|  | memset(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_SRC_IP6_BE_MASK), | 
|  | 0xff, sizeof(encap->src_ip6)); | 
|  | memcpy(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_DST_IP6_BE), | 
|  | &encap->dst_ip6, sizeof(encap->dst_ip6)); | 
|  | memset(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_DST_IP6_BE_MASK), | 
|  | 0xff, sizeof(encap->dst_ip6)); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_ETHER_TYPE_BE, | 
|  | htons(ETH_P_IPV6)); | 
|  | } | 
|  | #endif | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_ETHER_TYPE_BE_MASK, | 
|  | ~(__be16)0); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_L4_DPORT_BE, | 
|  | encap->udp_dport); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_L4_DPORT_BE_MASK, | 
|  | ~(__be16)0); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_L4_DPORT_BE, | 
|  | encap->udp_sport); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_L4_DPORT_BE_MASK, | 
|  | encap->udp_sport_mask); | 
|  | MCDI_STRUCT_SET_BYTE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_IP_PROTO, IPPROTO_UDP); | 
|  | MCDI_STRUCT_SET_BYTE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_IP_PROTO_MASK, ~0); | 
|  | MCDI_STRUCT_SET_BYTE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_IP_TOS, | 
|  | encap->ip_tos); | 
|  | MCDI_STRUCT_SET_BYTE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_IP_TOS_MASK, | 
|  | encap->ip_tos_mask); | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_MAE_OUTER_RULE_INSERT, inbuf, | 
|  | sizeof(inbuf), outbuf, sizeof(outbuf), &outlen); | 
|  | if (rc) | 
|  | return rc; | 
|  | if (outlen < sizeof(outbuf)) | 
|  | return -EIO; | 
|  | encap->fw_id = MCDI_DWORD(outbuf, MAE_OUTER_RULE_INSERT_OUT_OR_ID); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int efx_mae_unregister_encap_match(struct efx_nic *efx, | 
|  | struct efx_tc_encap_match *encap) | 
|  | { | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_OUTER_RULE_REMOVE_OUT_LEN(1)); | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_OUTER_RULE_REMOVE_IN_LEN(1)); | 
|  | size_t outlen; | 
|  | int rc; | 
|  |  | 
|  | MCDI_SET_DWORD(inbuf, MAE_OUTER_RULE_REMOVE_IN_OR_ID, encap->fw_id); | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_MAE_OUTER_RULE_REMOVE, inbuf, | 
|  | sizeof(inbuf), outbuf, sizeof(outbuf), &outlen); | 
|  | if (rc) | 
|  | return rc; | 
|  | if (outlen < sizeof(outbuf)) | 
|  | return -EIO; | 
|  | /* FW freed a different ID than we asked for, should also never happen. | 
|  | * Warn because it means we've now got a different idea to the FW of | 
|  | * what encap_mds exist, which could cause mayhem later. | 
|  | */ | 
|  | if (WARN_ON(MCDI_DWORD(outbuf, MAE_OUTER_RULE_REMOVE_OUT_REMOVED_OR_ID) != encap->fw_id)) | 
|  | return -EIO; | 
|  | /* We're probably about to free @encap, but let's just make sure its | 
|  | * fw_id is blatted so that it won't look valid if it leaks out. | 
|  | */ | 
|  | encap->fw_id = MC_CMD_MAE_OUTER_RULE_INSERT_OUT_OUTER_RULE_ID_NULL; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int efx_mae_populate_lhs_match_criteria(MCDI_DECLARE_STRUCT_PTR(match_crit), | 
|  | const struct efx_tc_match *match) | 
|  | { | 
|  | if (match->mask.ingress_port) { | 
|  | if (~match->mask.ingress_port) | 
|  | return -EOPNOTSUPP; | 
|  | MCDI_STRUCT_SET_DWORD(match_crit, | 
|  | MAE_ENC_FIELD_PAIRS_INGRESS_MPORT_SELECTOR, | 
|  | match->value.ingress_port); | 
|  | } | 
|  | MCDI_STRUCT_SET_DWORD(match_crit, MAE_ENC_FIELD_PAIRS_INGRESS_MPORT_SELECTOR_MASK, | 
|  | match->mask.ingress_port); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_ETHER_TYPE_BE, | 
|  | match->value.eth_proto); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_ETHER_TYPE_BE_MASK, | 
|  | match->mask.eth_proto); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_VLAN0_TCI_BE, | 
|  | match->value.vlan_tci[0]); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_VLAN0_TCI_BE_MASK, | 
|  | match->mask.vlan_tci[0]); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_VLAN0_PROTO_BE, | 
|  | match->value.vlan_proto[0]); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_VLAN0_PROTO_BE_MASK, | 
|  | match->mask.vlan_proto[0]); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_VLAN1_TCI_BE, | 
|  | match->value.vlan_tci[1]); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_VLAN1_TCI_BE_MASK, | 
|  | match->mask.vlan_tci[1]); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_VLAN1_PROTO_BE, | 
|  | match->value.vlan_proto[1]); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_VLAN1_PROTO_BE_MASK, | 
|  | match->mask.vlan_proto[1]); | 
|  | memcpy(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_ETH_SADDR_BE), | 
|  | match->value.eth_saddr, ETH_ALEN); | 
|  | memcpy(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_ETH_SADDR_BE_MASK), | 
|  | match->mask.eth_saddr, ETH_ALEN); | 
|  | memcpy(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_ETH_DADDR_BE), | 
|  | match->value.eth_daddr, ETH_ALEN); | 
|  | memcpy(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_ETH_DADDR_BE_MASK), | 
|  | match->mask.eth_daddr, ETH_ALEN); | 
|  | MCDI_STRUCT_SET_BYTE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_IP_PROTO, | 
|  | match->value.ip_proto); | 
|  | MCDI_STRUCT_SET_BYTE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_IP_PROTO_MASK, | 
|  | match->mask.ip_proto); | 
|  | MCDI_STRUCT_SET_BYTE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_IP_TOS, | 
|  | match->value.ip_tos); | 
|  | MCDI_STRUCT_SET_BYTE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_IP_TOS_MASK, | 
|  | match->mask.ip_tos); | 
|  | MCDI_STRUCT_SET_BYTE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_IP_TTL, | 
|  | match->value.ip_ttl); | 
|  | MCDI_STRUCT_SET_BYTE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_IP_TTL_MASK, | 
|  | match->mask.ip_ttl); | 
|  | MCDI_STRUCT_POPULATE_BYTE_1(match_crit, | 
|  | MAE_ENC_FIELD_PAIRS_ENC_VLAN_FLAGS, | 
|  | MAE_ENC_FIELD_PAIRS_ENC_IP_FRAG, | 
|  | match->value.ip_frag); | 
|  | MCDI_STRUCT_POPULATE_BYTE_1(match_crit, | 
|  | MAE_ENC_FIELD_PAIRS_ENC_VLAN_FLAGS_MASK, | 
|  | MAE_ENC_FIELD_PAIRS_ENC_IP_FRAG_MASK, | 
|  | match->mask.ip_frag); | 
|  | MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_SRC_IP4_BE, | 
|  | match->value.src_ip); | 
|  | MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_SRC_IP4_BE_MASK, | 
|  | match->mask.src_ip); | 
|  | MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_DST_IP4_BE, | 
|  | match->value.dst_ip); | 
|  | MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_DST_IP4_BE_MASK, | 
|  | match->mask.dst_ip); | 
|  | #ifdef CONFIG_IPV6 | 
|  | memcpy(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_SRC_IP6_BE), | 
|  | &match->value.src_ip6, sizeof(struct in6_addr)); | 
|  | memcpy(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_SRC_IP6_BE_MASK), | 
|  | &match->mask.src_ip6, sizeof(struct in6_addr)); | 
|  | memcpy(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_DST_IP6_BE), | 
|  | &match->value.dst_ip6, sizeof(struct in6_addr)); | 
|  | memcpy(MCDI_STRUCT_PTR(match_crit, MAE_ENC_FIELD_PAIRS_ENC_DST_IP6_BE_MASK), | 
|  | &match->mask.dst_ip6, sizeof(struct in6_addr)); | 
|  | #endif | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_L4_SPORT_BE, | 
|  | match->value.l4_sport); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_L4_SPORT_BE_MASK, | 
|  | match->mask.l4_sport); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_L4_DPORT_BE, | 
|  | match->value.l4_dport); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_ENC_FIELD_PAIRS_ENC_L4_DPORT_BE_MASK, | 
|  | match->mask.l4_dport); | 
|  | /* No enc-keys in LHS rules.  Caps check should have caught this; any | 
|  | * enc-keys from an fLHS should have been translated to regular keys | 
|  | * and any EM should be a pseudo (we're an OR so can't have a direct | 
|  | * EM with another OR). | 
|  | */ | 
|  | if (WARN_ON_ONCE(match->encap && !match->encap->type)) | 
|  | return -EOPNOTSUPP; | 
|  | if (WARN_ON_ONCE(match->mask.enc_src_ip)) | 
|  | return -EOPNOTSUPP; | 
|  | if (WARN_ON_ONCE(match->mask.enc_dst_ip)) | 
|  | return -EOPNOTSUPP; | 
|  | #ifdef CONFIG_IPV6 | 
|  | if (WARN_ON_ONCE(!ipv6_addr_any(&match->mask.enc_src_ip6))) | 
|  | return -EOPNOTSUPP; | 
|  | if (WARN_ON_ONCE(!ipv6_addr_any(&match->mask.enc_dst_ip6))) | 
|  | return -EOPNOTSUPP; | 
|  | #endif | 
|  | if (WARN_ON_ONCE(match->mask.enc_ip_tos)) | 
|  | return -EOPNOTSUPP; | 
|  | if (WARN_ON_ONCE(match->mask.enc_ip_ttl)) | 
|  | return -EOPNOTSUPP; | 
|  | if (WARN_ON_ONCE(match->mask.enc_sport)) | 
|  | return -EOPNOTSUPP; | 
|  | if (WARN_ON_ONCE(match->mask.enc_dport)) | 
|  | return -EOPNOTSUPP; | 
|  | if (WARN_ON_ONCE(match->mask.enc_keyid)) | 
|  | return -EOPNOTSUPP; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int efx_mae_insert_lhs_outer_rule(struct efx_nic *efx, | 
|  | struct efx_tc_lhs_rule *rule, u32 prio) | 
|  | { | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_OUTER_RULE_INSERT_IN_LEN(MAE_ENC_FIELD_PAIRS_LEN)); | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_OUTER_RULE_INSERT_OUT_LEN); | 
|  | MCDI_DECLARE_STRUCT_PTR(match_crit); | 
|  | const struct efx_tc_lhs_action *act; | 
|  | size_t outlen; | 
|  | int rc; | 
|  |  | 
|  | MCDI_SET_DWORD(inbuf, MAE_OUTER_RULE_INSERT_IN_PRIO, prio); | 
|  | /* match */ | 
|  | match_crit = _MCDI_DWORD(inbuf, MAE_OUTER_RULE_INSERT_IN_FIELD_MATCH_CRITERIA); | 
|  | rc = efx_mae_populate_lhs_match_criteria(match_crit, &rule->match); | 
|  | if (rc) | 
|  | return rc; | 
|  |  | 
|  | /* action */ | 
|  | act = &rule->lhs_act; | 
|  | rc = efx_mae_encap_type_to_mae_type(act->tun_type); | 
|  | if (rc < 0) | 
|  | return rc; | 
|  | MCDI_SET_DWORD(inbuf, MAE_OUTER_RULE_INSERT_IN_ENCAP_TYPE, rc); | 
|  | /* We always inhibit CT lookup on TCP_INTERESTING_FLAGS, since the | 
|  | * SW path needs to process the packet to update the conntrack tables | 
|  | * on connection establishment (SYN) or termination (FIN, RST). | 
|  | */ | 
|  | MCDI_POPULATE_DWORD_6(inbuf, MAE_OUTER_RULE_INSERT_IN_LOOKUP_CONTROL, | 
|  | MAE_OUTER_RULE_INSERT_IN_DO_CT, !!act->zone, | 
|  | MAE_OUTER_RULE_INSERT_IN_CT_TCP_FLAGS_INHIBIT, 1, | 
|  | MAE_OUTER_RULE_INSERT_IN_CT_DOMAIN, | 
|  | act->zone ? act->zone->zone : 0, | 
|  | MAE_OUTER_RULE_INSERT_IN_CT_VNI_MODE, | 
|  | MAE_CT_VNI_MODE_ZERO, | 
|  | MAE_OUTER_RULE_INSERT_IN_DO_COUNT, !!act->count, | 
|  | MAE_OUTER_RULE_INSERT_IN_RECIRC_ID, | 
|  | act->rid ? act->rid->fw_id : 0); | 
|  | if (act->count) | 
|  | MCDI_SET_DWORD(inbuf, MAE_OUTER_RULE_INSERT_IN_COUNTER_ID, | 
|  | act->count->cnt->fw_id); | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_MAE_OUTER_RULE_INSERT, inbuf, | 
|  | sizeof(inbuf), outbuf, sizeof(outbuf), &outlen); | 
|  | if (rc) | 
|  | return rc; | 
|  | if (outlen < sizeof(outbuf)) | 
|  | return -EIO; | 
|  | rule->fw_id = MCDI_DWORD(outbuf, MAE_OUTER_RULE_INSERT_OUT_OR_ID); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int efx_mae_populate_match_criteria(MCDI_DECLARE_STRUCT_PTR(match_crit), | 
|  | const struct efx_tc_match *match); | 
|  |  | 
|  | static int efx_mae_insert_lhs_action_rule(struct efx_nic *efx, | 
|  | struct efx_tc_lhs_rule *rule, | 
|  | u32 prio) | 
|  | { | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_ACTION_RULE_INSERT_IN_LEN(MAE_FIELD_MASK_VALUE_PAIRS_V2_LEN)); | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_ACTION_RULE_INSERT_OUT_LEN); | 
|  | struct efx_tc_lhs_action *act = &rule->lhs_act; | 
|  | MCDI_DECLARE_STRUCT_PTR(match_crit); | 
|  | MCDI_DECLARE_STRUCT_PTR(response); | 
|  | size_t outlen; | 
|  | int rc; | 
|  |  | 
|  | match_crit = _MCDI_DWORD(inbuf, MAE_ACTION_RULE_INSERT_IN_MATCH_CRITERIA); | 
|  | response = _MCDI_DWORD(inbuf, MAE_ACTION_RULE_INSERT_IN_RESPONSE); | 
|  | MCDI_STRUCT_SET_DWORD(response, MAE_ACTION_RULE_RESPONSE_ASL_ID, | 
|  | MC_CMD_MAE_ACTION_SET_LIST_ALLOC_OUT_ACTION_SET_LIST_ID_NULL); | 
|  | MCDI_STRUCT_SET_DWORD(response, MAE_ACTION_RULE_RESPONSE_AS_ID, | 
|  | MC_CMD_MAE_ACTION_SET_ALLOC_OUT_ACTION_SET_ID_NULL); | 
|  | EFX_POPULATE_DWORD_5(*_MCDI_STRUCT_DWORD(response, MAE_ACTION_RULE_RESPONSE_LOOKUP_CONTROL), | 
|  | MAE_ACTION_RULE_RESPONSE_DO_CT, !!act->zone, | 
|  | MAE_ACTION_RULE_RESPONSE_DO_RECIRC, | 
|  | act->rid && !act->zone, | 
|  | MAE_ACTION_RULE_RESPONSE_CT_VNI_MODE, | 
|  | MAE_CT_VNI_MODE_ZERO, | 
|  | MAE_ACTION_RULE_RESPONSE_RECIRC_ID, | 
|  | act->rid ? act->rid->fw_id : 0, | 
|  | MAE_ACTION_RULE_RESPONSE_CT_DOMAIN, | 
|  | act->zone ? act->zone->zone : 0); | 
|  | MCDI_STRUCT_SET_DWORD(response, MAE_ACTION_RULE_RESPONSE_COUNTER_ID, | 
|  | act->count ? act->count->cnt->fw_id : | 
|  | MC_CMD_MAE_COUNTER_ALLOC_OUT_COUNTER_ID_NULL); | 
|  | MCDI_SET_DWORD(inbuf, MAE_ACTION_RULE_INSERT_IN_PRIO, prio); | 
|  | rc = efx_mae_populate_match_criteria(match_crit, &rule->match); | 
|  | if (rc) | 
|  | return rc; | 
|  |  | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_MAE_ACTION_RULE_INSERT, inbuf, sizeof(inbuf), | 
|  | outbuf, sizeof(outbuf), &outlen); | 
|  | if (rc) | 
|  | return rc; | 
|  | if (outlen < sizeof(outbuf)) | 
|  | return -EIO; | 
|  | rule->fw_id = MCDI_DWORD(outbuf, MAE_ACTION_RULE_INSERT_OUT_AR_ID); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int efx_mae_insert_lhs_rule(struct efx_nic *efx, struct efx_tc_lhs_rule *rule, | 
|  | u32 prio) | 
|  | { | 
|  | if (rule->is_ar) | 
|  | return efx_mae_insert_lhs_action_rule(efx, rule, prio); | 
|  | return efx_mae_insert_lhs_outer_rule(efx, rule, prio); | 
|  | } | 
|  |  | 
|  | static int efx_mae_remove_lhs_outer_rule(struct efx_nic *efx, | 
|  | struct efx_tc_lhs_rule *rule) | 
|  | { | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_OUTER_RULE_REMOVE_OUT_LEN(1)); | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_OUTER_RULE_REMOVE_IN_LEN(1)); | 
|  | size_t outlen; | 
|  | int rc; | 
|  |  | 
|  | MCDI_SET_DWORD(inbuf, MAE_OUTER_RULE_REMOVE_IN_OR_ID, rule->fw_id); | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_MAE_OUTER_RULE_REMOVE, inbuf, | 
|  | sizeof(inbuf), outbuf, sizeof(outbuf), &outlen); | 
|  | if (rc) | 
|  | return rc; | 
|  | if (outlen < sizeof(outbuf)) | 
|  | return -EIO; | 
|  | /* FW freed a different ID than we asked for, should also never happen. | 
|  | * Warn because it means we've now got a different idea to the FW of | 
|  | * what encap_mds exist, which could cause mayhem later. | 
|  | */ | 
|  | if (WARN_ON(MCDI_DWORD(outbuf, MAE_OUTER_RULE_REMOVE_OUT_REMOVED_OR_ID) != rule->fw_id)) | 
|  | return -EIO; | 
|  | /* We're probably about to free @rule, but let's just make sure its | 
|  | * fw_id is blatted so that it won't look valid if it leaks out. | 
|  | */ | 
|  | rule->fw_id = MC_CMD_MAE_OUTER_RULE_INSERT_OUT_OUTER_RULE_ID_NULL; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int efx_mae_remove_lhs_rule(struct efx_nic *efx, struct efx_tc_lhs_rule *rule) | 
|  | { | 
|  | if (rule->is_ar) | 
|  | return efx_mae_delete_rule(efx, rule->fw_id); | 
|  | return efx_mae_remove_lhs_outer_rule(efx, rule); | 
|  | } | 
|  |  | 
|  | /* Populating is done by taking each byte of @value in turn and storing | 
|  | * it in the appropriate bits of @row.  @value must be big-endian; we | 
|  | * convert it to little-endianness as we go. | 
|  | */ | 
|  | static int efx_mae_table_populate(struct efx_tc_table_field_fmt field, | 
|  | __le32 *row, size_t row_bits, | 
|  | void *value, size_t value_size) | 
|  | { | 
|  | unsigned int i; | 
|  |  | 
|  | /* For now only scheme 0 is supported for any field, so we check here | 
|  | * (rather than, say, in calling code, which knows the semantics and | 
|  | * could in principle encode for other schemes). | 
|  | */ | 
|  | if (field.scheme) | 
|  | return -EOPNOTSUPP; | 
|  | if (DIV_ROUND_UP(field.width, 8) != value_size) | 
|  | return -EINVAL; | 
|  | if (field.lbn + field.width > row_bits) | 
|  | return -EINVAL; | 
|  | for (i = 0; i < value_size; i++) { | 
|  | unsigned int bn = field.lbn + i * 8; | 
|  | unsigned int wn = bn / 32; | 
|  | u64 v; | 
|  |  | 
|  | v = ((u8 *)value)[value_size - i - 1]; | 
|  | v <<= (bn % 32); | 
|  | row[wn] |= cpu_to_le32(v & 0xffffffff); | 
|  | if (wn * 32 < row_bits) | 
|  | row[wn + 1] |= cpu_to_le32(v >> 32); | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int efx_mae_table_populate_bool(struct efx_tc_table_field_fmt field, | 
|  | __le32 *row, size_t row_bits, bool value) | 
|  | { | 
|  | u8 v = value ? 1 : 0; | 
|  |  | 
|  | if (field.width != 1) | 
|  | return -EINVAL; | 
|  | return efx_mae_table_populate(field, row, row_bits, &v, 1); | 
|  | } | 
|  |  | 
|  | static int efx_mae_table_populate_ipv4(struct efx_tc_table_field_fmt field, | 
|  | __le32 *row, size_t row_bits, __be32 value) | 
|  | { | 
|  | /* IPv4 is placed in the first 4 bytes of an IPv6-sized field */ | 
|  | struct in6_addr v = {}; | 
|  |  | 
|  | if (field.width != 128) | 
|  | return -EINVAL; | 
|  | v.s6_addr32[0] = value; | 
|  | return efx_mae_table_populate(field, row, row_bits, &v, sizeof(v)); | 
|  | } | 
|  |  | 
|  | static int efx_mae_table_populate_u24(struct efx_tc_table_field_fmt field, | 
|  | __le32 *row, size_t row_bits, u32 value) | 
|  | { | 
|  | __be32 v = cpu_to_be32(value); | 
|  |  | 
|  | /* We adjust value_size here since just 3 bytes will be copied, and | 
|  | * the pointer to the value is set discarding the first byte which is | 
|  | * the most significant byte for a big-endian 4-bytes value. | 
|  | */ | 
|  | return efx_mae_table_populate(field, row, row_bits, ((void *)&v) + 1, | 
|  | sizeof(v) - 1); | 
|  | } | 
|  |  | 
|  | #define _TABLE_POPULATE(dst, dw, _field, _value) ({	\ | 
|  | typeof(_value) _v = _value;			\ | 
|  | \ | 
|  | (_field.width == sizeof(_value) * 8) ?		\ | 
|  | efx_mae_table_populate(_field, dst, dw, &_v,	\ | 
|  | sizeof(_v)) : -EINVAL;	\ | 
|  | }) | 
|  | #define TABLE_POPULATE_KEY_IPV4(dst, _table, _field, _value)		       \ | 
|  | efx_mae_table_populate_ipv4(efx->tc->meta_##_table.desc.keys	       \ | 
|  | [efx->tc->meta_##_table.keys._field##_idx],\ | 
|  | dst, efx->tc->meta_##_table.desc.key_width,\ | 
|  | _value) | 
|  | #define TABLE_POPULATE_KEY(dst, _table, _field, _value)			\ | 
|  | _TABLE_POPULATE(dst, efx->tc->meta_##_table.desc.key_width,	\ | 
|  | efx->tc->meta_##_table.desc.keys		\ | 
|  | [efx->tc->meta_##_table.keys._field##_idx],	\ | 
|  | _value) | 
|  |  | 
|  | #define TABLE_POPULATE_RESP_BOOL(dst, _table, _field, _value)			\ | 
|  | efx_mae_table_populate_bool(efx->tc->meta_##_table.desc.resps		\ | 
|  | [efx->tc->meta_##_table.resps._field##_idx],\ | 
|  | dst, efx->tc->meta_##_table.desc.resp_width,\ | 
|  | _value) | 
|  | #define TABLE_POPULATE_RESP(dst, _table, _field, _value)		\ | 
|  | _TABLE_POPULATE(dst, efx->tc->meta_##_table.desc.resp_width,	\ | 
|  | efx->tc->meta_##_table.desc.resps		\ | 
|  | [efx->tc->meta_##_table.resps._field##_idx],	\ | 
|  | _value) | 
|  |  | 
|  | #define TABLE_POPULATE_RESP_U24(dst, _table, _field, _value)		       \ | 
|  | efx_mae_table_populate_u24(efx->tc->meta_##_table.desc.resps	       \ | 
|  | [efx->tc->meta_##_table.resps._field##_idx],\ | 
|  | dst, efx->tc->meta_##_table.desc.resp_width,\ | 
|  | _value) | 
|  |  | 
|  | static int efx_mae_populate_ct_key(struct efx_nic *efx, __le32 *key, size_t kw, | 
|  | struct efx_tc_ct_entry *conn) | 
|  | { | 
|  | bool ipv6 = conn->eth_proto == htons(ETH_P_IPV6); | 
|  | int rc; | 
|  |  | 
|  | rc = TABLE_POPULATE_KEY(key, ct, eth_proto, conn->eth_proto); | 
|  | if (rc) | 
|  | return rc; | 
|  | rc = TABLE_POPULATE_KEY(key, ct, ip_proto, conn->ip_proto); | 
|  | if (rc) | 
|  | return rc; | 
|  | if (ipv6) | 
|  | rc = TABLE_POPULATE_KEY(key, ct, src_ip, conn->src_ip6); | 
|  | else | 
|  | rc = TABLE_POPULATE_KEY_IPV4(key, ct, src_ip, conn->src_ip); | 
|  | if (rc) | 
|  | return rc; | 
|  | if (ipv6) | 
|  | rc = TABLE_POPULATE_KEY(key, ct, dst_ip, conn->dst_ip6); | 
|  | else | 
|  | rc = TABLE_POPULATE_KEY_IPV4(key, ct, dst_ip, conn->dst_ip); | 
|  | if (rc) | 
|  | return rc; | 
|  | rc = TABLE_POPULATE_KEY(key, ct, l4_sport, conn->l4_sport); | 
|  | if (rc) | 
|  | return rc; | 
|  | rc = TABLE_POPULATE_KEY(key, ct, l4_dport, conn->l4_dport); | 
|  | if (rc) | 
|  | return rc; | 
|  | return TABLE_POPULATE_KEY(key, ct, zone, cpu_to_be16(conn->zone->zone)); | 
|  | } | 
|  |  | 
|  | int efx_mae_insert_ct(struct efx_nic *efx, struct efx_tc_ct_entry *conn) | 
|  | { | 
|  | bool ipv6 = conn->eth_proto == htons(ETH_P_IPV6); | 
|  | __le32 *key = NULL, *resp = NULL; | 
|  | size_t inlen, kw, rw; | 
|  | efx_dword_t *inbuf; | 
|  | int rc = -ENOMEM; | 
|  |  | 
|  | /* Check table access is supported */ | 
|  | if (!efx->tc->meta_ct.hooked) | 
|  | return -EOPNOTSUPP; | 
|  |  | 
|  | /* key/resp widths are in bits; convert to dwords for IN_LEN */ | 
|  | kw = DIV_ROUND_UP(efx->tc->meta_ct.desc.key_width, 32); | 
|  | rw = DIV_ROUND_UP(efx->tc->meta_ct.desc.resp_width, 32); | 
|  | BUILD_BUG_ON(sizeof(__le32) != MC_CMD_TABLE_INSERT_IN_DATA_LEN); | 
|  | inlen = MC_CMD_TABLE_INSERT_IN_LEN(kw + rw); | 
|  | if (inlen > MC_CMD_TABLE_INSERT_IN_LENMAX_MCDI2) | 
|  | return -E2BIG; | 
|  | inbuf = kzalloc(inlen, GFP_KERNEL); | 
|  | if (!inbuf) | 
|  | return -ENOMEM; | 
|  |  | 
|  | key = kcalloc(kw, sizeof(__le32), GFP_KERNEL); | 
|  | if (!key) | 
|  | goto out_free; | 
|  | resp = kcalloc(rw, sizeof(__le32), GFP_KERNEL); | 
|  | if (!resp) | 
|  | goto out_free; | 
|  |  | 
|  | rc = efx_mae_populate_ct_key(efx, key, kw, conn); | 
|  | if (rc) | 
|  | goto out_free; | 
|  |  | 
|  | rc = TABLE_POPULATE_RESP_BOOL(resp, ct, dnat, conn->dnat); | 
|  | if (rc) | 
|  | goto out_free; | 
|  | /* No support in hw for IPv6 NAT; field is only 32 bits */ | 
|  | if (!ipv6) | 
|  | rc = TABLE_POPULATE_RESP(resp, ct, nat_ip, conn->nat_ip); | 
|  | if (rc) | 
|  | goto out_free; | 
|  | rc = TABLE_POPULATE_RESP(resp, ct, l4_natport, conn->l4_natport); | 
|  | if (rc) | 
|  | goto out_free; | 
|  | rc = TABLE_POPULATE_RESP(resp, ct, mark, cpu_to_be32(conn->mark)); | 
|  | if (rc) | 
|  | goto out_free; | 
|  | rc = TABLE_POPULATE_RESP_U24(resp, ct, counter_id, conn->cnt->fw_id); | 
|  | if (rc) | 
|  | goto out_free; | 
|  |  | 
|  | MCDI_SET_DWORD(inbuf, TABLE_INSERT_IN_TABLE_ID, TABLE_ID_CONNTRACK_TABLE); | 
|  | MCDI_SET_WORD(inbuf, TABLE_INSERT_IN_KEY_WIDTH, | 
|  | efx->tc->meta_ct.desc.key_width); | 
|  | /* MASK_WIDTH is zero as CT is a BCAM */ | 
|  | MCDI_SET_WORD(inbuf, TABLE_INSERT_IN_RESP_WIDTH, | 
|  | efx->tc->meta_ct.desc.resp_width); | 
|  | memcpy(MCDI_PTR(inbuf, TABLE_INSERT_IN_DATA), key, kw * sizeof(__le32)); | 
|  | memcpy(MCDI_PTR(inbuf, TABLE_INSERT_IN_DATA) + kw * sizeof(__le32), | 
|  | resp, rw * sizeof(__le32)); | 
|  |  | 
|  | BUILD_BUG_ON(MC_CMD_TABLE_INSERT_OUT_LEN); | 
|  |  | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_TABLE_INSERT, inbuf, inlen, NULL, 0, NULL); | 
|  |  | 
|  | out_free: | 
|  | kfree(resp); | 
|  | kfree(key); | 
|  | kfree(inbuf); | 
|  | return rc; | 
|  | } | 
|  |  | 
|  | int efx_mae_remove_ct(struct efx_nic *efx, struct efx_tc_ct_entry *conn) | 
|  | { | 
|  | __le32 *key = NULL; | 
|  | efx_dword_t *inbuf; | 
|  | size_t inlen, kw; | 
|  | int rc = -ENOMEM; | 
|  |  | 
|  | /* Check table access is supported */ | 
|  | if (!efx->tc->meta_ct.hooked) | 
|  | return -EOPNOTSUPP; | 
|  |  | 
|  | /* key width is in bits; convert to dwords for IN_LEN */ | 
|  | kw = DIV_ROUND_UP(efx->tc->meta_ct.desc.key_width, 32); | 
|  | BUILD_BUG_ON(sizeof(__le32) != MC_CMD_TABLE_DELETE_IN_DATA_LEN); | 
|  | inlen = MC_CMD_TABLE_DELETE_IN_LEN(kw); | 
|  | if (inlen > MC_CMD_TABLE_DELETE_IN_LENMAX_MCDI2) | 
|  | return -E2BIG; | 
|  | inbuf = kzalloc(inlen, GFP_KERNEL); | 
|  | if (!inbuf) | 
|  | return -ENOMEM; | 
|  |  | 
|  | key = kcalloc(kw, sizeof(__le32), GFP_KERNEL); | 
|  | if (!key) | 
|  | goto out_free; | 
|  |  | 
|  | rc = efx_mae_populate_ct_key(efx, key, kw, conn); | 
|  | if (rc) | 
|  | goto out_free; | 
|  |  | 
|  | MCDI_SET_DWORD(inbuf, TABLE_DELETE_IN_TABLE_ID, TABLE_ID_CONNTRACK_TABLE); | 
|  | MCDI_SET_WORD(inbuf, TABLE_DELETE_IN_KEY_WIDTH, | 
|  | efx->tc->meta_ct.desc.key_width); | 
|  | /* MASK_WIDTH is zero as CT is a BCAM */ | 
|  | /* RESP_WIDTH is zero for DELETE */ | 
|  | memcpy(MCDI_PTR(inbuf, TABLE_DELETE_IN_DATA), key, kw * sizeof(__le32)); | 
|  |  | 
|  | BUILD_BUG_ON(MC_CMD_TABLE_DELETE_OUT_LEN); | 
|  |  | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_TABLE_DELETE, inbuf, inlen, NULL, 0, NULL); | 
|  |  | 
|  | out_free: | 
|  | kfree(key); | 
|  | kfree(inbuf); | 
|  | return rc; | 
|  | } | 
|  |  | 
|  | static int efx_mae_populate_match_criteria(MCDI_DECLARE_STRUCT_PTR(match_crit), | 
|  | const struct efx_tc_match *match) | 
|  | { | 
|  | if (match->mask.ingress_port) { | 
|  | if (~match->mask.ingress_port) | 
|  | return -EOPNOTSUPP; | 
|  | MCDI_STRUCT_SET_DWORD(match_crit, | 
|  | MAE_FIELD_MASK_VALUE_PAIRS_V2_INGRESS_MPORT_SELECTOR, | 
|  | match->value.ingress_port); | 
|  | } | 
|  | MCDI_STRUCT_SET_DWORD(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_INGRESS_MPORT_SELECTOR_MASK, | 
|  | match->mask.ingress_port); | 
|  | EFX_POPULATE_DWORD_5(*_MCDI_STRUCT_DWORD(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_FLAGS), | 
|  | MAE_FIELD_MASK_VALUE_PAIRS_V2_DO_CT, | 
|  | match->value.ct_state_trk, | 
|  | MAE_FIELD_MASK_VALUE_PAIRS_V2_CT_HIT, | 
|  | match->value.ct_state_est, | 
|  | MAE_FIELD_MASK_VALUE_PAIRS_V2_IS_IP_FRAG, | 
|  | match->value.ip_frag, | 
|  | MAE_FIELD_MASK_VALUE_PAIRS_V2_IP_FIRST_FRAG, | 
|  | match->value.ip_firstfrag, | 
|  | MAE_FIELD_MASK_VALUE_PAIRS_V2_TCP_SYN_FIN_RST, | 
|  | match->value.tcp_syn_fin_rst); | 
|  | EFX_POPULATE_DWORD_5(*_MCDI_STRUCT_DWORD(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_FLAGS_MASK), | 
|  | MAE_FIELD_MASK_VALUE_PAIRS_V2_DO_CT, | 
|  | match->mask.ct_state_trk, | 
|  | MAE_FIELD_MASK_VALUE_PAIRS_V2_CT_HIT, | 
|  | match->mask.ct_state_est, | 
|  | MAE_FIELD_MASK_VALUE_PAIRS_V2_IS_IP_FRAG, | 
|  | match->mask.ip_frag, | 
|  | MAE_FIELD_MASK_VALUE_PAIRS_V2_IP_FIRST_FRAG, | 
|  | match->mask.ip_firstfrag, | 
|  | MAE_FIELD_MASK_VALUE_PAIRS_V2_TCP_SYN_FIN_RST, | 
|  | match->mask.tcp_syn_fin_rst); | 
|  | MCDI_STRUCT_SET_BYTE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_RECIRC_ID, | 
|  | match->value.recirc_id); | 
|  | MCDI_STRUCT_SET_BYTE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_RECIRC_ID_MASK, | 
|  | match->mask.recirc_id); | 
|  | MCDI_STRUCT_SET_DWORD(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_CT_MARK, | 
|  | match->value.ct_mark); | 
|  | MCDI_STRUCT_SET_DWORD(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_CT_MARK_MASK, | 
|  | match->mask.ct_mark); | 
|  | MCDI_STRUCT_SET_WORD(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_CT_DOMAIN, | 
|  | match->value.ct_zone); | 
|  | MCDI_STRUCT_SET_WORD(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_CT_DOMAIN_MASK, | 
|  | match->mask.ct_zone); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_ETHER_TYPE_BE, | 
|  | match->value.eth_proto); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_ETHER_TYPE_BE_MASK, | 
|  | match->mask.eth_proto); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_VLAN0_TCI_BE, | 
|  | match->value.vlan_tci[0]); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_VLAN0_TCI_BE_MASK, | 
|  | match->mask.vlan_tci[0]); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_VLAN0_PROTO_BE, | 
|  | match->value.vlan_proto[0]); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_VLAN0_PROTO_BE_MASK, | 
|  | match->mask.vlan_proto[0]); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_VLAN1_TCI_BE, | 
|  | match->value.vlan_tci[1]); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_VLAN1_TCI_BE_MASK, | 
|  | match->mask.vlan_tci[1]); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_VLAN1_PROTO_BE, | 
|  | match->value.vlan_proto[1]); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_VLAN1_PROTO_BE_MASK, | 
|  | match->mask.vlan_proto[1]); | 
|  | memcpy(MCDI_STRUCT_PTR(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_ETH_SADDR_BE), | 
|  | match->value.eth_saddr, ETH_ALEN); | 
|  | memcpy(MCDI_STRUCT_PTR(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_ETH_SADDR_BE_MASK), | 
|  | match->mask.eth_saddr, ETH_ALEN); | 
|  | memcpy(MCDI_STRUCT_PTR(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_ETH_DADDR_BE), | 
|  | match->value.eth_daddr, ETH_ALEN); | 
|  | memcpy(MCDI_STRUCT_PTR(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_ETH_DADDR_BE_MASK), | 
|  | match->mask.eth_daddr, ETH_ALEN); | 
|  | MCDI_STRUCT_SET_BYTE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_IP_PROTO, | 
|  | match->value.ip_proto); | 
|  | MCDI_STRUCT_SET_BYTE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_IP_PROTO_MASK, | 
|  | match->mask.ip_proto); | 
|  | MCDI_STRUCT_SET_BYTE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_IP_TOS, | 
|  | match->value.ip_tos); | 
|  | MCDI_STRUCT_SET_BYTE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_IP_TOS_MASK, | 
|  | match->mask.ip_tos); | 
|  | MCDI_STRUCT_SET_BYTE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_IP_TTL, | 
|  | match->value.ip_ttl); | 
|  | MCDI_STRUCT_SET_BYTE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_IP_TTL_MASK, | 
|  | match->mask.ip_ttl); | 
|  | MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_SRC_IP4_BE, | 
|  | match->value.src_ip); | 
|  | MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_SRC_IP4_BE_MASK, | 
|  | match->mask.src_ip); | 
|  | MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_DST_IP4_BE, | 
|  | match->value.dst_ip); | 
|  | MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_DST_IP4_BE_MASK, | 
|  | match->mask.dst_ip); | 
|  | #ifdef CONFIG_IPV6 | 
|  | memcpy(MCDI_STRUCT_PTR(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_SRC_IP6_BE), | 
|  | &match->value.src_ip6, sizeof(struct in6_addr)); | 
|  | memcpy(MCDI_STRUCT_PTR(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_SRC_IP6_BE_MASK), | 
|  | &match->mask.src_ip6, sizeof(struct in6_addr)); | 
|  | memcpy(MCDI_STRUCT_PTR(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_DST_IP6_BE), | 
|  | &match->value.dst_ip6, sizeof(struct in6_addr)); | 
|  | memcpy(MCDI_STRUCT_PTR(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_DST_IP6_BE_MASK), | 
|  | &match->mask.dst_ip6, sizeof(struct in6_addr)); | 
|  | #endif | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_L4_SPORT_BE, | 
|  | match->value.l4_sport); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_L4_SPORT_BE_MASK, | 
|  | match->mask.l4_sport); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_L4_DPORT_BE, | 
|  | match->value.l4_dport); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_L4_DPORT_BE_MASK, | 
|  | match->mask.l4_dport); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_TCP_FLAGS_BE, | 
|  | match->value.tcp_flags); | 
|  | MCDI_STRUCT_SET_WORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_TCP_FLAGS_BE_MASK, | 
|  | match->mask.tcp_flags); | 
|  | /* enc-keys are handled indirectly, through encap_match ID */ | 
|  | if (match->encap) { | 
|  | MCDI_STRUCT_SET_DWORD(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_OUTER_RULE_ID, | 
|  | match->encap->fw_id); | 
|  | MCDI_STRUCT_SET_DWORD(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_OUTER_RULE_ID_MASK, | 
|  | U32_MAX); | 
|  | /* enc_keyid (VNI/VSID) is not part of the encap_match */ | 
|  | MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_ENC_VNET_ID_BE, | 
|  | match->value.enc_keyid); | 
|  | MCDI_STRUCT_SET_DWORD_BE(match_crit, MAE_FIELD_MASK_VALUE_PAIRS_V2_ENC_VNET_ID_BE_MASK, | 
|  | match->mask.enc_keyid); | 
|  | } else if (WARN_ON_ONCE(match->mask.enc_src_ip) || | 
|  | WARN_ON_ONCE(match->mask.enc_dst_ip) || | 
|  | WARN_ON_ONCE(!ipv6_addr_any(&match->mask.enc_src_ip6)) || | 
|  | WARN_ON_ONCE(!ipv6_addr_any(&match->mask.enc_dst_ip6)) || | 
|  | WARN_ON_ONCE(match->mask.enc_ip_tos) || | 
|  | WARN_ON_ONCE(match->mask.enc_ip_ttl) || | 
|  | WARN_ON_ONCE(match->mask.enc_sport) || | 
|  | WARN_ON_ONCE(match->mask.enc_dport) || | 
|  | WARN_ON_ONCE(match->mask.enc_keyid)) { | 
|  | /* No enc-keys should appear in a rule without an encap_match */ | 
|  | return -EOPNOTSUPP; | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int efx_mae_insert_rule(struct efx_nic *efx, const struct efx_tc_match *match, | 
|  | u32 prio, u32 acts_id, u32 *id) | 
|  | { | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_ACTION_RULE_INSERT_IN_LEN(MAE_FIELD_MASK_VALUE_PAIRS_V2_LEN)); | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_ACTION_RULE_INSERT_OUT_LEN); | 
|  | MCDI_DECLARE_STRUCT_PTR(match_crit); | 
|  | MCDI_DECLARE_STRUCT_PTR(response); | 
|  | size_t outlen; | 
|  | int rc; | 
|  |  | 
|  | if (!id) | 
|  | return -EINVAL; | 
|  |  | 
|  | match_crit = _MCDI_DWORD(inbuf, MAE_ACTION_RULE_INSERT_IN_MATCH_CRITERIA); | 
|  | response = _MCDI_DWORD(inbuf, MAE_ACTION_RULE_INSERT_IN_RESPONSE); | 
|  | if (efx_mae_asl_id(acts_id)) { | 
|  | MCDI_STRUCT_SET_DWORD(response, MAE_ACTION_RULE_RESPONSE_ASL_ID, acts_id); | 
|  | MCDI_STRUCT_SET_DWORD(response, MAE_ACTION_RULE_RESPONSE_AS_ID, | 
|  | MC_CMD_MAE_ACTION_SET_ALLOC_OUT_ACTION_SET_ID_NULL); | 
|  | } else { | 
|  | /* We only had one AS, so we didn't wrap it in an ASL */ | 
|  | MCDI_STRUCT_SET_DWORD(response, MAE_ACTION_RULE_RESPONSE_ASL_ID, | 
|  | MC_CMD_MAE_ACTION_SET_LIST_ALLOC_OUT_ACTION_SET_LIST_ID_NULL); | 
|  | MCDI_STRUCT_SET_DWORD(response, MAE_ACTION_RULE_RESPONSE_AS_ID, acts_id); | 
|  | } | 
|  | MCDI_SET_DWORD(inbuf, MAE_ACTION_RULE_INSERT_IN_PRIO, prio); | 
|  | rc = efx_mae_populate_match_criteria(match_crit, match); | 
|  | if (rc) | 
|  | return rc; | 
|  |  | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_MAE_ACTION_RULE_INSERT, inbuf, sizeof(inbuf), | 
|  | outbuf, sizeof(outbuf), &outlen); | 
|  | if (rc) | 
|  | return rc; | 
|  | if (outlen < sizeof(outbuf)) | 
|  | return -EIO; | 
|  | *id = MCDI_DWORD(outbuf, MAE_ACTION_RULE_INSERT_OUT_AR_ID); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int efx_mae_update_rule(struct efx_nic *efx, u32 acts_id, u32 id) | 
|  | { | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_ACTION_RULE_UPDATE_IN_LEN); | 
|  | MCDI_DECLARE_STRUCT_PTR(response); | 
|  |  | 
|  | BUILD_BUG_ON(MC_CMD_MAE_ACTION_RULE_UPDATE_OUT_LEN); | 
|  | response = _MCDI_DWORD(inbuf, MAE_ACTION_RULE_UPDATE_IN_RESPONSE); | 
|  |  | 
|  | MCDI_SET_DWORD(inbuf, MAE_ACTION_RULE_UPDATE_IN_AR_ID, id); | 
|  | if (efx_mae_asl_id(acts_id)) { | 
|  | MCDI_STRUCT_SET_DWORD(response, MAE_ACTION_RULE_RESPONSE_ASL_ID, acts_id); | 
|  | MCDI_STRUCT_SET_DWORD(response, MAE_ACTION_RULE_RESPONSE_AS_ID, | 
|  | MC_CMD_MAE_ACTION_SET_ALLOC_OUT_ACTION_SET_ID_NULL); | 
|  | } else { | 
|  | /* We only had one AS, so we didn't wrap it in an ASL */ | 
|  | MCDI_STRUCT_SET_DWORD(response, MAE_ACTION_RULE_RESPONSE_ASL_ID, | 
|  | MC_CMD_MAE_ACTION_SET_LIST_ALLOC_OUT_ACTION_SET_LIST_ID_NULL); | 
|  | MCDI_STRUCT_SET_DWORD(response, MAE_ACTION_RULE_RESPONSE_AS_ID, acts_id); | 
|  | } | 
|  | return efx_mcdi_rpc(efx, MC_CMD_MAE_ACTION_RULE_UPDATE, inbuf, sizeof(inbuf), | 
|  | NULL, 0, NULL); | 
|  | } | 
|  |  | 
|  | int efx_mae_delete_rule(struct efx_nic *efx, u32 id) | 
|  | { | 
|  | MCDI_DECLARE_BUF(outbuf, MC_CMD_MAE_ACTION_RULE_DELETE_OUT_LEN(1)); | 
|  | MCDI_DECLARE_BUF(inbuf, MC_CMD_MAE_ACTION_RULE_DELETE_IN_LEN(1)); | 
|  | size_t outlen; | 
|  | int rc; | 
|  |  | 
|  | MCDI_SET_DWORD(inbuf, MAE_ACTION_RULE_DELETE_IN_AR_ID, id); | 
|  | rc = efx_mcdi_rpc(efx, MC_CMD_MAE_ACTION_RULE_DELETE, inbuf, sizeof(inbuf), | 
|  | outbuf, sizeof(outbuf), &outlen); | 
|  | if (rc) | 
|  | return rc; | 
|  | if (outlen < sizeof(outbuf)) | 
|  | return -EIO; | 
|  | /* FW freed a different ID than we asked for, should also never happen. | 
|  | * Warn because it means we've now got a different idea to the FW of | 
|  | * what rules exist, which could cause mayhem later. | 
|  | */ | 
|  | if (WARN_ON(MCDI_DWORD(outbuf, MAE_ACTION_RULE_DELETE_OUT_DELETED_AR_ID) != id)) | 
|  | return -EIO; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | int efx_init_mae(struct efx_nic *efx) | 
|  | { | 
|  | struct ef100_nic_data *nic_data = efx->nic_data; | 
|  | struct efx_mae *mae; | 
|  | int rc; | 
|  |  | 
|  | if (!nic_data->have_mport) | 
|  | return -EINVAL; | 
|  |  | 
|  | mae = kmalloc(sizeof(*mae), GFP_KERNEL); | 
|  | if (!mae) | 
|  | return -ENOMEM; | 
|  |  | 
|  | rc = rhashtable_init(&mae->mports_ht, &efx_mae_mports_ht_params); | 
|  | if (rc < 0) { | 
|  | kfree(mae); | 
|  | return rc; | 
|  | } | 
|  | efx->mae = mae; | 
|  | mae->efx = efx; | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | void efx_fini_mae(struct efx_nic *efx) | 
|  | { | 
|  | struct efx_mae *mae = efx->mae; | 
|  |  | 
|  | kfree(mae); | 
|  | efx->mae = NULL; | 
|  | } |