diff options
Diffstat (limited to 'drivers')
-rw-r--r-- | drivers/net/dsa/Makefile | 1 | ||||
-rw-r--r-- | drivers/net/dsa/bcm_sf2.c | 14 | ||||
-rw-r--r-- | drivers/net/dsa/bcm_sf2.h | 17 | ||||
-rw-r--r-- | drivers/net/dsa/bcm_sf2_cfp.c | 613 |
4 files changed, 645 insertions, 0 deletions
diff --git a/drivers/net/dsa/Makefile b/drivers/net/dsa/Makefile index 8346e4f9737a..da9893478e21 100644 --- a/drivers/net/dsa/Makefile +++ b/drivers/net/dsa/Makefile | |||
@@ -1,5 +1,6 @@ | |||
1 | obj-$(CONFIG_NET_DSA_MV88E6060) += mv88e6060.o | 1 | obj-$(CONFIG_NET_DSA_MV88E6060) += mv88e6060.o |
2 | obj-$(CONFIG_NET_DSA_BCM_SF2) += bcm_sf2.o | 2 | obj-$(CONFIG_NET_DSA_BCM_SF2) += bcm_sf2.o |
3 | bcm_sf2-objs += bcm_sf2_cfp.o | ||
3 | obj-$(CONFIG_NET_DSA_QCA8K) += qca8k.o | 4 | obj-$(CONFIG_NET_DSA_QCA8K) += qca8k.o |
4 | 5 | ||
5 | obj-y += b53/ | 6 | obj-y += b53/ |
diff --git a/drivers/net/dsa/bcm_sf2.c b/drivers/net/dsa/bcm_sf2.c index 637072da3acf..be282b430c50 100644 --- a/drivers/net/dsa/bcm_sf2.c +++ b/drivers/net/dsa/bcm_sf2.c | |||
@@ -1045,6 +1045,8 @@ static const struct dsa_switch_ops bcm_sf2_ops = { | |||
1045 | .port_fdb_dump = b53_fdb_dump, | 1045 | .port_fdb_dump = b53_fdb_dump, |
1046 | .port_fdb_add = b53_fdb_add, | 1046 | .port_fdb_add = b53_fdb_add, |
1047 | .port_fdb_del = b53_fdb_del, | 1047 | .port_fdb_del = b53_fdb_del, |
1048 | .get_rxnfc = bcm_sf2_get_rxnfc, | ||
1049 | .set_rxnfc = bcm_sf2_set_rxnfc, | ||
1048 | }; | 1050 | }; |
1049 | 1051 | ||
1050 | struct bcm_sf2_of_data { | 1052 | struct bcm_sf2_of_data { |
@@ -1168,6 +1170,12 @@ static int bcm_sf2_sw_probe(struct platform_device *pdev) | |||
1168 | 1170 | ||
1169 | spin_lock_init(&priv->indir_lock); | 1171 | spin_lock_init(&priv->indir_lock); |
1170 | mutex_init(&priv->stats_mutex); | 1172 | mutex_init(&priv->stats_mutex); |
1173 | mutex_init(&priv->cfp.lock); | ||
1174 | |||
1175 | /* CFP rule #0 cannot be used for specific classifications, flag it as | ||
1176 | * permanently used | ||
1177 | */ | ||
1178 | set_bit(0, priv->cfp.used); | ||
1171 | 1179 | ||
1172 | bcm_sf2_identify_ports(priv, dn->child); | 1180 | bcm_sf2_identify_ports(priv, dn->child); |
1173 | 1181 | ||
@@ -1197,6 +1205,12 @@ static int bcm_sf2_sw_probe(struct platform_device *pdev) | |||
1197 | return ret; | 1205 | return ret; |
1198 | } | 1206 | } |
1199 | 1207 | ||
1208 | ret = bcm_sf2_cfp_rst(priv); | ||
1209 | if (ret) { | ||
1210 | pr_err("failed to reset CFP\n"); | ||
1211 | goto out_mdio; | ||
1212 | } | ||
1213 | |||
1200 | /* Disable all interrupts and request them */ | 1214 | /* Disable all interrupts and request them */ |
1201 | bcm_sf2_intr_disable(priv); | 1215 | bcm_sf2_intr_disable(priv); |
1202 | 1216 | ||
diff --git a/drivers/net/dsa/bcm_sf2.h b/drivers/net/dsa/bcm_sf2.h index 6e1f74e4d471..7d3030e04f11 100644 --- a/drivers/net/dsa/bcm_sf2.h +++ b/drivers/net/dsa/bcm_sf2.h | |||
@@ -52,6 +52,13 @@ struct bcm_sf2_port_status { | |||
52 | struct ethtool_eee eee; | 52 | struct ethtool_eee eee; |
53 | }; | 53 | }; |
54 | 54 | ||
55 | struct bcm_sf2_cfp_priv { | ||
56 | /* Mutex protecting concurrent accesses to the CFP registers */ | ||
57 | struct mutex lock; | ||
58 | DECLARE_BITMAP(used, CFP_NUM_RULES); | ||
59 | unsigned int rules_cnt; | ||
60 | }; | ||
61 | |||
55 | struct bcm_sf2_priv { | 62 | struct bcm_sf2_priv { |
56 | /* Base registers, keep those in order with BCM_SF2_REGS_NAME */ | 63 | /* Base registers, keep those in order with BCM_SF2_REGS_NAME */ |
57 | void __iomem *core; | 64 | void __iomem *core; |
@@ -103,6 +110,9 @@ struct bcm_sf2_priv { | |||
103 | 110 | ||
104 | /* Bitmask of ports needing BRCM tags */ | 111 | /* Bitmask of ports needing BRCM tags */ |
105 | unsigned int brcm_tag_mask; | 112 | unsigned int brcm_tag_mask; |
113 | |||
114 | /* CFP rules context */ | ||
115 | struct bcm_sf2_cfp_priv cfp; | ||
106 | }; | 116 | }; |
107 | 117 | ||
108 | static inline struct bcm_sf2_priv *bcm_sf2_to_priv(struct dsa_switch *ds) | 118 | static inline struct bcm_sf2_priv *bcm_sf2_to_priv(struct dsa_switch *ds) |
@@ -197,4 +207,11 @@ SF2_IO_MACRO(acb); | |||
197 | SWITCH_INTR_L2(0); | 207 | SWITCH_INTR_L2(0); |
198 | SWITCH_INTR_L2(1); | 208 | SWITCH_INTR_L2(1); |
199 | 209 | ||
210 | /* RXNFC */ | ||
211 | int bcm_sf2_get_rxnfc(struct dsa_switch *ds, int port, | ||
212 | struct ethtool_rxnfc *nfc, u32 *rule_locs); | ||
213 | int bcm_sf2_set_rxnfc(struct dsa_switch *ds, int port, | ||
214 | struct ethtool_rxnfc *nfc); | ||
215 | int bcm_sf2_cfp_rst(struct bcm_sf2_priv *priv); | ||
216 | |||
200 | #endif /* __BCM_SF2_H */ | 217 | #endif /* __BCM_SF2_H */ |
diff --git a/drivers/net/dsa/bcm_sf2_cfp.c b/drivers/net/dsa/bcm_sf2_cfp.c new file mode 100644 index 000000000000..c71be3e0dc2d --- /dev/null +++ b/drivers/net/dsa/bcm_sf2_cfp.c | |||
@@ -0,0 +1,613 @@ | |||
1 | /* | ||
2 | * Broadcom Starfighter 2 DSA switch CFP support | ||
3 | * | ||
4 | * Copyright (C) 2016, Broadcom | ||
5 | * | ||
6 | * This program is free software; you can redistribute it and/or modify | ||
7 | * it under the terms of the GNU General Public License as published by | ||
8 | * the Free Software Foundation; either version 2 of the License, or | ||
9 | * (at your option) any later version. | ||
10 | */ | ||
11 | |||
12 | #include <linux/list.h> | ||
13 | #include <net/dsa.h> | ||
14 | #include <linux/ethtool.h> | ||
15 | #include <linux/if_ether.h> | ||
16 | #include <linux/in.h> | ||
17 | #include <linux/bitmap.h> | ||
18 | |||
19 | #include "bcm_sf2.h" | ||
20 | #include "bcm_sf2_regs.h" | ||
21 | |||
22 | struct cfp_udf_layout { | ||
23 | u8 slices[UDF_NUM_SLICES]; | ||
24 | u32 mask_value; | ||
25 | |||
26 | }; | ||
27 | |||
28 | /* UDF slices layout for a TCPv4/UDPv4 specification */ | ||
29 | static const struct cfp_udf_layout udf_tcpip4_layout = { | ||
30 | .slices = { | ||
31 | /* End of L2, byte offset 12, src IP[0:15] */ | ||
32 | CFG_UDF_EOL2 | 6, | ||
33 | /* End of L2, byte offset 14, src IP[16:31] */ | ||
34 | CFG_UDF_EOL2 | 7, | ||
35 | /* End of L2, byte offset 16, dst IP[0:15] */ | ||
36 | CFG_UDF_EOL2 | 8, | ||
37 | /* End of L2, byte offset 18, dst IP[16:31] */ | ||
38 | CFG_UDF_EOL2 | 9, | ||
39 | /* End of L3, byte offset 0, src port */ | ||
40 | CFG_UDF_EOL3 | 0, | ||
41 | /* End of L3, byte offset 2, dst port */ | ||
42 | CFG_UDF_EOL3 | 1, | ||
43 | 0, 0, 0 | ||
44 | }, | ||
45 | .mask_value = L3_FRAMING_MASK | IPPROTO_MASK | IP_FRAG, | ||
46 | }; | ||
47 | |||
48 | static inline unsigned int bcm_sf2_get_num_udf_slices(const u8 *layout) | ||
49 | { | ||
50 | unsigned int i, count = 0; | ||
51 | |||
52 | for (i = 0; i < UDF_NUM_SLICES; i++) { | ||
53 | if (layout[i] != 0) | ||
54 | count++; | ||
55 | } | ||
56 | |||
57 | return count; | ||
58 | } | ||
59 | |||
60 | static void bcm_sf2_cfp_udf_set(struct bcm_sf2_priv *priv, | ||
61 | unsigned int slice_num, | ||
62 | const u8 *layout) | ||
63 | { | ||
64 | u32 offset = CORE_UDF_0_A_0_8_PORT_0 + slice_num * UDF_SLICE_OFFSET; | ||
65 | unsigned int i; | ||
66 | |||
67 | for (i = 0; i < UDF_NUM_SLICES; i++) | ||
68 | core_writel(priv, layout[i], offset + i * 4); | ||
69 | } | ||
70 | |||
71 | static int bcm_sf2_cfp_op(struct bcm_sf2_priv *priv, unsigned int op) | ||
72 | { | ||
73 | unsigned int timeout = 1000; | ||
74 | u32 reg; | ||
75 | |||
76 | reg = core_readl(priv, CORE_CFP_ACC); | ||
77 | reg &= ~(OP_SEL_MASK | RAM_SEL_MASK); | ||
78 | reg |= OP_STR_DONE | op; | ||
79 | core_writel(priv, reg, CORE_CFP_ACC); | ||
80 | |||
81 | do { | ||
82 | reg = core_readl(priv, CORE_CFP_ACC); | ||
83 | if (!(reg & OP_STR_DONE)) | ||
84 | break; | ||
85 | |||
86 | cpu_relax(); | ||
87 | } while (timeout--); | ||
88 | |||
89 | if (!timeout) | ||
90 | return -ETIMEDOUT; | ||
91 | |||
92 | return 0; | ||
93 | } | ||
94 | |||
95 | static inline void bcm_sf2_cfp_rule_addr_set(struct bcm_sf2_priv *priv, | ||
96 | unsigned int addr) | ||
97 | { | ||
98 | u32 reg; | ||
99 | |||
100 | WARN_ON(addr >= CFP_NUM_RULES); | ||
101 | |||
102 | reg = core_readl(priv, CORE_CFP_ACC); | ||
103 | reg &= ~(XCESS_ADDR_MASK << XCESS_ADDR_SHIFT); | ||
104 | reg |= addr << XCESS_ADDR_SHIFT; | ||
105 | core_writel(priv, reg, CORE_CFP_ACC); | ||
106 | } | ||
107 | |||
108 | static inline unsigned int bcm_sf2_cfp_rule_size(struct bcm_sf2_priv *priv) | ||
109 | { | ||
110 | /* Entry #0 is reserved */ | ||
111 | return CFP_NUM_RULES - 1; | ||
112 | } | ||
113 | |||
114 | static int bcm_sf2_cfp_rule_set(struct dsa_switch *ds, int port, | ||
115 | struct ethtool_rx_flow_spec *fs) | ||
116 | { | ||
117 | struct bcm_sf2_priv *priv = bcm_sf2_to_priv(ds); | ||
118 | struct ethtool_tcpip4_spec *v4_spec; | ||
119 | const struct cfp_udf_layout *layout; | ||
120 | unsigned int slice_num, rule_index; | ||
121 | unsigned int queue_num, port_num; | ||
122 | u8 ip_proto, ip_frag; | ||
123 | u8 num_udf; | ||
124 | u32 reg; | ||
125 | int ret; | ||
126 | |||
127 | /* Check for unsupported extensions */ | ||
128 | if ((fs->flow_type & FLOW_EXT) && | ||
129 | (fs->m_ext.vlan_etype || fs->m_ext.data[1])) | ||
130 | return -EINVAL; | ||
131 | |||
132 | if (fs->location != RX_CLS_LOC_ANY && | ||
133 | test_bit(fs->location, priv->cfp.used)) | ||
134 | return -EBUSY; | ||
135 | |||
136 | if (fs->location != RX_CLS_LOC_ANY && | ||
137 | fs->location > bcm_sf2_cfp_rule_size(priv)) | ||
138 | return -EINVAL; | ||
139 | |||
140 | ip_frag = be32_to_cpu(fs->m_ext.data[0]); | ||
141 | |||
142 | /* We do not support discarding packets, check that the | ||
143 | * destination port is enabled and that we are within the | ||
144 | * number of ports supported by the switch | ||
145 | */ | ||
146 | port_num = fs->ring_cookie / 8; | ||
147 | |||
148 | if (fs->ring_cookie == RX_CLS_FLOW_DISC || | ||
149 | !(BIT(port_num) & ds->enabled_port_mask) || | ||
150 | port_num >= priv->hw_params.num_ports) | ||
151 | return -EINVAL; | ||
152 | |||
153 | switch (fs->flow_type & ~FLOW_EXT) { | ||
154 | case TCP_V4_FLOW: | ||
155 | ip_proto = IPPROTO_TCP; | ||
156 | v4_spec = &fs->h_u.tcp_ip4_spec; | ||
157 | break; | ||
158 | case UDP_V4_FLOW: | ||
159 | ip_proto = IPPROTO_UDP; | ||
160 | v4_spec = &fs->h_u.udp_ip4_spec; | ||
161 | break; | ||
162 | default: | ||
163 | return -EINVAL; | ||
164 | } | ||
165 | |||
166 | /* We only use one UDF slice for now */ | ||
167 | slice_num = 1; | ||
168 | layout = &udf_tcpip4_layout; | ||
169 | num_udf = bcm_sf2_get_num_udf_slices(layout->slices); | ||
170 | |||
171 | /* Apply the UDF layout for this filter */ | ||
172 | bcm_sf2_cfp_udf_set(priv, slice_num, layout->slices); | ||
173 | |||
174 | /* Apply to all packets received through this port */ | ||
175 | core_writel(priv, BIT(port), CORE_CFP_DATA_PORT(7)); | ||
176 | |||
177 | /* S-Tag status [31:30] | ||
178 | * C-Tag status [29:28] | ||
179 | * L2 framing [27:26] | ||
180 | * L3 framing [25:24] | ||
181 | * IP ToS [23:16] | ||
182 | * IP proto [15:08] | ||
183 | * IP Fragm [7] | ||
184 | * Non 1st frag [6] | ||
185 | * IP Authen [5] | ||
186 | * TTL range [4:3] | ||
187 | * PPPoE session [2] | ||
188 | * Reserved [1] | ||
189 | * UDF_Valid[8] [0] | ||
190 | */ | ||
191 | core_writel(priv, v4_spec->tos << 16 | ip_proto << 8 | ip_frag << 7, | ||
192 | CORE_CFP_DATA_PORT(6)); | ||
193 | |||
194 | /* UDF_Valid[7:0] [31:24] | ||
195 | * S-Tag [23:8] | ||
196 | * C-Tag [7:0] | ||
197 | */ | ||
198 | core_writel(priv, GENMASK(num_udf - 1, 0) << 24, CORE_CFP_DATA_PORT(5)); | ||
199 | |||
200 | /* C-Tag [31:24] | ||
201 | * UDF_n_A8 [23:8] | ||
202 | * UDF_n_A7 [7:0] | ||
203 | */ | ||
204 | core_writel(priv, 0, CORE_CFP_DATA_PORT(4)); | ||
205 | |||
206 | /* UDF_n_A7 [31:24] | ||
207 | * UDF_n_A6 [23:8] | ||
208 | * UDF_n_A5 [7:0] | ||
209 | */ | ||
210 | core_writel(priv, be16_to_cpu(v4_spec->pdst) >> 8, | ||
211 | CORE_CFP_DATA_PORT(3)); | ||
212 | |||
213 | /* UDF_n_A5 [31:24] | ||
214 | * UDF_n_A4 [23:8] | ||
215 | * UDF_n_A3 [7:0] | ||
216 | */ | ||
217 | reg = (be16_to_cpu(v4_spec->pdst) & 0xff) << 24 | | ||
218 | (u32)be16_to_cpu(v4_spec->psrc) << 8 | | ||
219 | (be32_to_cpu(v4_spec->ip4dst) & 0x0000ff00) >> 8; | ||
220 | core_writel(priv, reg, CORE_CFP_DATA_PORT(2)); | ||
221 | |||
222 | /* UDF_n_A3 [31:24] | ||
223 | * UDF_n_A2 [23:8] | ||
224 | * UDF_n_A1 [7:0] | ||
225 | */ | ||
226 | reg = (u32)(be32_to_cpu(v4_spec->ip4dst) & 0xff) << 24 | | ||
227 | (u32)(be32_to_cpu(v4_spec->ip4dst) >> 16) << 8 | | ||
228 | (be32_to_cpu(v4_spec->ip4src) & 0x0000ff00) >> 8; | ||
229 | core_writel(priv, reg, CORE_CFP_DATA_PORT(1)); | ||
230 | |||
231 | /* UDF_n_A1 [31:24] | ||
232 | * UDF_n_A0 [23:8] | ||
233 | * Reserved [7:4] | ||
234 | * Slice ID [3:2] | ||
235 | * Slice valid [1:0] | ||
236 | */ | ||
237 | reg = (u32)(be32_to_cpu(v4_spec->ip4src) & 0xff) << 24 | | ||
238 | (u32)(be32_to_cpu(v4_spec->ip4src) >> 16) << 8 | | ||
239 | SLICE_NUM(slice_num) | SLICE_VALID; | ||
240 | core_writel(priv, reg, CORE_CFP_DATA_PORT(0)); | ||
241 | |||
242 | /* Source port map match */ | ||
243 | core_writel(priv, 0xff, CORE_CFP_MASK_PORT(7)); | ||
244 | |||
245 | /* Mask with the specific layout for IPv4 packets */ | ||
246 | core_writel(priv, layout->mask_value, CORE_CFP_MASK_PORT(6)); | ||
247 | |||
248 | /* Mask all but valid UDFs */ | ||
249 | core_writel(priv, GENMASK(num_udf - 1, 0) << 24, CORE_CFP_MASK_PORT(5)); | ||
250 | |||
251 | /* Mask all */ | ||
252 | core_writel(priv, 0, CORE_CFP_MASK_PORT(4)); | ||
253 | |||
254 | /* All other UDFs should be matched with the filter */ | ||
255 | core_writel(priv, 0xff, CORE_CFP_MASK_PORT(3)); | ||
256 | core_writel(priv, 0xffffffff, CORE_CFP_MASK_PORT(2)); | ||
257 | core_writel(priv, 0xffffffff, CORE_CFP_MASK_PORT(1)); | ||
258 | core_writel(priv, 0xffffff0f, CORE_CFP_MASK_PORT(0)); | ||
259 | |||
260 | /* Locate the first rule available */ | ||
261 | if (fs->location == RX_CLS_LOC_ANY) | ||
262 | rule_index = find_first_zero_bit(priv->cfp.used, | ||
263 | bcm_sf2_cfp_rule_size(priv)); | ||
264 | else | ||
265 | rule_index = fs->location; | ||
266 | |||
267 | /* Insert into TCAM now */ | ||
268 | bcm_sf2_cfp_rule_addr_set(priv, rule_index); | ||
269 | |||
270 | ret = bcm_sf2_cfp_op(priv, OP_SEL_WRITE | TCAM_SEL); | ||
271 | if (ret) { | ||
272 | pr_err("TCAM entry at addr %d failed\n", rule_index); | ||
273 | return ret; | ||
274 | } | ||
275 | |||
276 | /* Replace ARL derived destination with DST_MAP derived, define | ||
277 | * which port and queue this should be forwarded to. | ||
278 | * | ||
279 | * We have a small oddity where Port 6 just does not have a | ||
280 | * valid bit here (so we subtract by one). | ||
281 | */ | ||
282 | queue_num = fs->ring_cookie % 8; | ||
283 | if (port_num >= 7) | ||
284 | port_num -= 1; | ||
285 | |||
286 | reg = CHANGE_FWRD_MAP_IB_REP_ARL | BIT(port_num + DST_MAP_IB_SHIFT) | | ||
287 | CHANGE_TC | queue_num << NEW_TC_SHIFT; | ||
288 | |||
289 | core_writel(priv, reg, CORE_ACT_POL_DATA0); | ||
290 | |||
291 | /* Set classification ID that needs to be put in Broadcom tag */ | ||
292 | core_writel(priv, rule_index << CHAIN_ID_SHIFT, | ||
293 | CORE_ACT_POL_DATA1); | ||
294 | |||
295 | core_writel(priv, 0, CORE_ACT_POL_DATA2); | ||
296 | |||
297 | /* Configure policer RAM now */ | ||
298 | ret = bcm_sf2_cfp_op(priv, OP_SEL_WRITE | ACT_POL_RAM); | ||
299 | if (ret) { | ||
300 | pr_err("Policer entry at %d failed\n", rule_index); | ||
301 | return ret; | ||
302 | } | ||
303 | |||
304 | /* Disable the policer */ | ||
305 | core_writel(priv, POLICER_MODE_DISABLE, CORE_RATE_METER0); | ||
306 | |||
307 | /* Now the rate meter */ | ||
308 | ret = bcm_sf2_cfp_op(priv, OP_SEL_WRITE | RATE_METER_RAM); | ||
309 | if (ret) { | ||
310 | pr_err("Meter entry at %d failed\n", rule_index); | ||
311 | return ret; | ||
312 | } | ||
313 | |||
314 | /* Turn on CFP for this rule now */ | ||
315 | reg = core_readl(priv, CORE_CFP_CTL_REG); | ||
316 | reg |= BIT(port); | ||
317 | core_writel(priv, reg, CORE_CFP_CTL_REG); | ||
318 | |||
319 | /* Flag the rule as being used and return it */ | ||
320 | set_bit(rule_index, priv->cfp.used); | ||
321 | fs->location = rule_index; | ||
322 | |||
323 | return 0; | ||
324 | } | ||
325 | |||
326 | static int bcm_sf2_cfp_rule_del(struct bcm_sf2_priv *priv, int port, | ||
327 | u32 loc) | ||
328 | { | ||
329 | int ret; | ||
330 | u32 reg; | ||
331 | |||
332 | /* Refuse deletion of unused rules, and the default reserved rule */ | ||
333 | if (!test_bit(loc, priv->cfp.used) || loc == 0) | ||
334 | return -EINVAL; | ||
335 | |||
336 | /* Indicate which rule we want to read */ | ||
337 | bcm_sf2_cfp_rule_addr_set(priv, loc); | ||
338 | |||
339 | ret = bcm_sf2_cfp_op(priv, OP_SEL_READ | TCAM_SEL); | ||
340 | if (ret) | ||
341 | return ret; | ||
342 | |||
343 | /* Clear its valid bits */ | ||
344 | reg = core_readl(priv, CORE_CFP_DATA_PORT(0)); | ||
345 | reg &= ~SLICE_VALID; | ||
346 | core_writel(priv, reg, CORE_CFP_DATA_PORT(0)); | ||
347 | |||
348 | /* Write back this entry into the TCAM now */ | ||
349 | ret = bcm_sf2_cfp_op(priv, OP_SEL_WRITE | TCAM_SEL); | ||
350 | if (ret) | ||
351 | return ret; | ||
352 | |||
353 | clear_bit(loc, priv->cfp.used); | ||
354 | |||
355 | return 0; | ||
356 | } | ||
357 | |||
358 | static void bcm_sf2_invert_masks(struct ethtool_rx_flow_spec *flow) | ||
359 | { | ||
360 | unsigned int i; | ||
361 | |||
362 | for (i = 0; i < sizeof(flow->m_u); i++) | ||
363 | flow->m_u.hdata[i] ^= 0xff; | ||
364 | |||
365 | flow->m_ext.vlan_etype ^= cpu_to_be16(~0); | ||
366 | flow->m_ext.vlan_tci ^= cpu_to_be16(~0); | ||
367 | flow->m_ext.data[0] ^= cpu_to_be32(~0); | ||
368 | flow->m_ext.data[1] ^= cpu_to_be32(~0); | ||
369 | } | ||
370 | |||
371 | static int bcm_sf2_cfp_rule_get(struct bcm_sf2_priv *priv, int port, | ||
372 | struct ethtool_rxnfc *nfc, bool search) | ||
373 | { | ||
374 | struct ethtool_tcpip4_spec *v4_spec; | ||
375 | unsigned int queue_num; | ||
376 | u16 src_dst_port; | ||
377 | u32 reg, ipv4; | ||
378 | int ret; | ||
379 | |||
380 | if (!search) { | ||
381 | bcm_sf2_cfp_rule_addr_set(priv, nfc->fs.location); | ||
382 | |||
383 | ret = bcm_sf2_cfp_op(priv, OP_SEL_READ | ACT_POL_RAM); | ||
384 | if (ret) | ||
385 | return ret; | ||
386 | |||
387 | reg = core_readl(priv, CORE_ACT_POL_DATA0); | ||
388 | |||
389 | ret = bcm_sf2_cfp_op(priv, OP_SEL_READ | TCAM_SEL); | ||
390 | if (ret) | ||
391 | return ret; | ||
392 | } else { | ||
393 | reg = core_readl(priv, CORE_ACT_POL_DATA0); | ||
394 | } | ||
395 | |||
396 | /* Extract the destination port */ | ||
397 | nfc->fs.ring_cookie = fls((reg >> DST_MAP_IB_SHIFT) & | ||
398 | DST_MAP_IB_MASK) - 1; | ||
399 | |||
400 | /* There is no Port 6, so we compensate for that here */ | ||
401 | if (nfc->fs.ring_cookie >= 6) | ||
402 | nfc->fs.ring_cookie++; | ||
403 | nfc->fs.ring_cookie *= 8; | ||
404 | |||
405 | /* Extract the destination queue */ | ||
406 | queue_num = (reg >> NEW_TC_SHIFT) & NEW_TC_MASK; | ||
407 | nfc->fs.ring_cookie += queue_num; | ||
408 | |||
409 | /* Extract the IP protocol */ | ||
410 | reg = core_readl(priv, CORE_CFP_DATA_PORT(6)); | ||
411 | switch ((reg & IPPROTO_MASK) >> IPPROTO_SHIFT) { | ||
412 | case IPPROTO_TCP: | ||
413 | nfc->fs.flow_type = TCP_V4_FLOW; | ||
414 | v4_spec = &nfc->fs.h_u.tcp_ip4_spec; | ||
415 | break; | ||
416 | case IPPROTO_UDP: | ||
417 | nfc->fs.flow_type = UDP_V4_FLOW; | ||
418 | v4_spec = &nfc->fs.h_u.udp_ip4_spec; | ||
419 | break; | ||
420 | default: | ||
421 | /* Clear to exit the search process */ | ||
422 | if (search) | ||
423 | core_readl(priv, CORE_CFP_DATA_PORT(7)); | ||
424 | return -EINVAL; | ||
425 | } | ||
426 | |||
427 | v4_spec->tos = (reg >> 16) & IPPROTO_MASK; | ||
428 | nfc->fs.m_ext.data[0] = cpu_to_be32((reg >> 7) & 1); | ||
429 | |||
430 | reg = core_readl(priv, CORE_CFP_DATA_PORT(3)); | ||
431 | /* src port [15:8] */ | ||
432 | src_dst_port = reg << 8; | ||
433 | |||
434 | reg = core_readl(priv, CORE_CFP_DATA_PORT(2)); | ||
435 | /* src port [7:0] */ | ||
436 | src_dst_port |= (reg >> 24); | ||
437 | |||
438 | v4_spec->pdst = cpu_to_be16(src_dst_port); | ||
439 | nfc->fs.m_u.tcp_ip4_spec.pdst = cpu_to_be16(~0); | ||
440 | v4_spec->psrc = cpu_to_be16((u16)(reg >> 8)); | ||
441 | nfc->fs.m_u.tcp_ip4_spec.psrc = cpu_to_be16(~0); | ||
442 | |||
443 | /* IPv4 dst [15:8] */ | ||
444 | ipv4 = (u16)(reg & 0xff) << 8; | ||
445 | reg = core_readl(priv, CORE_CFP_DATA_PORT(1)); | ||
446 | /* IPv4 dst [31:16] */ | ||
447 | ipv4 |= (u32)((reg >> 8) & 0xffffff) << 16; | ||
448 | /* IPv4 dst [7:0] */ | ||
449 | ipv4 |= (reg >> 24) & 0xff; | ||
450 | v4_spec->ip4dst = cpu_to_be32(ipv4); | ||
451 | nfc->fs.m_u.tcp_ip4_spec.ip4dst = cpu_to_be32(~0); | ||
452 | |||
453 | /* IPv4 src [15:8] */ | ||
454 | ipv4 = (u16)(reg & 0xff) << 8; | ||
455 | reg = core_readl(priv, CORE_CFP_DATA_PORT(0)); | ||
456 | |||
457 | if (!(reg & SLICE_VALID)) | ||
458 | return -EINVAL; | ||
459 | |||
460 | /* IPv4 src [7:0] */ | ||
461 | ipv4 |= (reg >> 24) & 0xff; | ||
462 | /* IPv4 src [31:16] */ | ||
463 | ipv4 |= ((reg >> 8) & 0xffffff) << 16; | ||
464 | v4_spec->ip4src = cpu_to_be32(ipv4); | ||
465 | nfc->fs.m_u.tcp_ip4_spec.ip4src = cpu_to_be32(~0); | ||
466 | |||
467 | /* Read last to avoid next entry clobbering the results during search | ||
468 | * operations | ||
469 | */ | ||
470 | reg = core_readl(priv, CORE_CFP_DATA_PORT(7)); | ||
471 | if (!(reg & 1 << port)) | ||
472 | return -EINVAL; | ||
473 | |||
474 | bcm_sf2_invert_masks(&nfc->fs); | ||
475 | |||
476 | /* Put the TCAM size here */ | ||
477 | nfc->data = bcm_sf2_cfp_rule_size(priv); | ||
478 | |||
479 | return 0; | ||
480 | } | ||
481 | |||
482 | /* We implement the search doing a TCAM search operation */ | ||
483 | static int bcm_sf2_cfp_rule_get_all(struct bcm_sf2_priv *priv, | ||
484 | int port, struct ethtool_rxnfc *nfc, | ||
485 | u32 *rule_locs) | ||
486 | { | ||
487 | unsigned int index = 1, rules_cnt = 0; | ||
488 | int ret; | ||
489 | u32 reg; | ||
490 | |||
491 | /* Do not poll on OP_STR_DONE to be self-clearing for search | ||
492 | * operations, we cannot use bcm_sf2_cfp_op here because it completes | ||
493 | * on clearing OP_STR_DONE which won't clear until the entire search | ||
494 | * operation is over. | ||
495 | */ | ||
496 | reg = core_readl(priv, CORE_CFP_ACC); | ||
497 | reg &= ~(XCESS_ADDR_MASK << XCESS_ADDR_SHIFT); | ||
498 | reg |= index << XCESS_ADDR_SHIFT; | ||
499 | reg &= ~(OP_SEL_MASK | RAM_SEL_MASK); | ||
500 | reg |= OP_SEL_SEARCH | TCAM_SEL | OP_STR_DONE; | ||
501 | core_writel(priv, reg, CORE_CFP_ACC); | ||
502 | |||
503 | do { | ||
504 | /* Wait for results to be ready */ | ||
505 | reg = core_readl(priv, CORE_CFP_ACC); | ||
506 | |||
507 | /* Extract the address we are searching */ | ||
508 | index = reg >> XCESS_ADDR_SHIFT; | ||
509 | index &= XCESS_ADDR_MASK; | ||
510 | |||
511 | /* We have a valid search result, so flag it accordingly */ | ||
512 | if (reg & SEARCH_STS) { | ||
513 | ret = bcm_sf2_cfp_rule_get(priv, port, nfc, true); | ||
514 | if (ret) | ||
515 | continue; | ||
516 | |||
517 | rule_locs[rules_cnt] = index; | ||
518 | rules_cnt++; | ||
519 | } | ||
520 | |||
521 | /* Search is over break out */ | ||
522 | if (!(reg & OP_STR_DONE)) | ||
523 | break; | ||
524 | |||
525 | } while (index < CFP_NUM_RULES); | ||
526 | |||
527 | /* Put the TCAM size here */ | ||
528 | nfc->data = bcm_sf2_cfp_rule_size(priv); | ||
529 | nfc->rule_cnt = rules_cnt; | ||
530 | |||
531 | return 0; | ||
532 | } | ||
533 | |||
534 | int bcm_sf2_get_rxnfc(struct dsa_switch *ds, int port, | ||
535 | struct ethtool_rxnfc *nfc, u32 *rule_locs) | ||
536 | { | ||
537 | struct bcm_sf2_priv *priv = bcm_sf2_to_priv(ds); | ||
538 | int ret = 0; | ||
539 | |||
540 | mutex_lock(&priv->cfp.lock); | ||
541 | |||
542 | switch (nfc->cmd) { | ||
543 | case ETHTOOL_GRXCLSRLCNT: | ||
544 | /* Subtract the default, unusable rule */ | ||
545 | nfc->rule_cnt = bitmap_weight(priv->cfp.used, | ||
546 | CFP_NUM_RULES) - 1; | ||
547 | /* We support specifying rule locations */ | ||
548 | nfc->data |= RX_CLS_LOC_SPECIAL; | ||
549 | break; | ||
550 | case ETHTOOL_GRXCLSRULE: | ||
551 | ret = bcm_sf2_cfp_rule_get(priv, port, nfc, false); | ||
552 | break; | ||
553 | case ETHTOOL_GRXCLSRLALL: | ||
554 | ret = bcm_sf2_cfp_rule_get_all(priv, port, nfc, rule_locs); | ||
555 | break; | ||
556 | default: | ||
557 | ret = -EOPNOTSUPP; | ||
558 | break; | ||
559 | } | ||
560 | |||
561 | mutex_unlock(&priv->cfp.lock); | ||
562 | |||
563 | return ret; | ||
564 | } | ||
565 | |||
566 | int bcm_sf2_set_rxnfc(struct dsa_switch *ds, int port, | ||
567 | struct ethtool_rxnfc *nfc) | ||
568 | { | ||
569 | struct bcm_sf2_priv *priv = bcm_sf2_to_priv(ds); | ||
570 | int ret = 0; | ||
571 | |||
572 | mutex_lock(&priv->cfp.lock); | ||
573 | |||
574 | switch (nfc->cmd) { | ||
575 | case ETHTOOL_SRXCLSRLINS: | ||
576 | ret = bcm_sf2_cfp_rule_set(ds, port, &nfc->fs); | ||
577 | break; | ||
578 | |||
579 | case ETHTOOL_SRXCLSRLDEL: | ||
580 | ret = bcm_sf2_cfp_rule_del(priv, port, nfc->fs.location); | ||
581 | break; | ||
582 | default: | ||
583 | ret = -EOPNOTSUPP; | ||
584 | break; | ||
585 | } | ||
586 | |||
587 | mutex_unlock(&priv->cfp.lock); | ||
588 | |||
589 | return ret; | ||
590 | } | ||
591 | |||
592 | int bcm_sf2_cfp_rst(struct bcm_sf2_priv *priv) | ||
593 | { | ||
594 | unsigned int timeout = 1000; | ||
595 | u32 reg; | ||
596 | |||
597 | reg = core_readl(priv, CORE_CFP_ACC); | ||
598 | reg |= TCAM_RESET; | ||
599 | core_writel(priv, reg, CORE_CFP_ACC); | ||
600 | |||
601 | do { | ||
602 | reg = core_readl(priv, CORE_CFP_ACC); | ||
603 | if (!(reg & TCAM_RESET)) | ||
604 | break; | ||
605 | |||
606 | cpu_relax(); | ||
607 | } while (timeout--); | ||
608 | |||
609 | if (!timeout) | ||
610 | return -ETIMEDOUT; | ||
611 | |||
612 | return 0; | ||
613 | } | ||