]> git.baikalelectronics.ru Git - kernel.git/commitdiff
ice: Handle LAN overflow event for VF queues
authorBrett Creeley <brett.creeley@intel.com>
Wed, 22 Jan 2020 15:21:31 +0000 (07:21 -0800)
committerJeff Kirsher <jeffrey.t.kirsher@intel.com>
Sun, 16 Feb 2020 00:47:20 +0000 (16:47 -0800)
Currently we are not handling LAN overflow events. There can be cases
where LAN overflow events occur on VF queues, especially with Link Flow
Control (LFC) enabled on the controlling PF. In order to recover from
the LAN overflow event caused by a VF we need to determine if the queue
belongs to a VF and reset that VF accordingly.

The struct ice_aqc_event_lan_overflow returns a copy of the GLDCB_RTCTQ
register, which tells us what the queue index is in the global/device
space. The global queue index needs to first be converted to a PF space
queue index and then it can be used to find if a VF owns it.

Signed-off-by: Brett Creeley <brett.creeley@intel.com>
Signed-off-by: Tony Nguyen <anthony.l.nguyen@intel.com>
Tested-by: Andrew Bowers <andrewx.bowers@intel.com>
Signed-off-by: Jeff Kirsher <jeffrey.t.kirsher@intel.com>
drivers/net/ethernet/intel/ice/ice_adminq_cmd.h
drivers/net/ethernet/intel/ice/ice_hw_autogen.h
drivers/net/ethernet/intel/ice/ice_main.c
drivers/net/ethernet/intel/ice/ice_virtchnl_pf.c
drivers/net/ethernet/intel/ice/ice_virtchnl_pf.h

index 6873998cf14547b44ef54aa926227d8f2ba7002c..38b6ffb6ad2e07d424c87d2ca634600b83ae6c1e 100644 (file)
@@ -1661,6 +1661,13 @@ struct ice_aqc_get_pkg_info_resp {
        struct ice_aqc_get_pkg_info pkg_info[1];
 };
 
+/* Lan Queue Overflow Event (direct, 0x1001) */
+struct ice_aqc_event_lan_overflow {
+       __le32 prtdcb_ruptq;
+       __le32 qtx_ctl;
+       u8 reserved[8];
+};
+
 /**
  * struct ice_aq_desc - Admin Queue (AQ) descriptor
  * @flags: ICE_AQ_FLAG_* flags
@@ -1730,6 +1737,7 @@ struct ice_aq_desc {
                struct ice_aqc_alloc_free_res_cmd sw_res_ctrl;
                struct ice_aqc_set_event_mask set_event_mask;
                struct ice_aqc_get_link_status get_link_status;
+               struct ice_aqc_event_lan_overflow lan_overflow;
        } params;
 };
 
@@ -1860,6 +1868,9 @@ enum ice_adminq_opc {
        ice_aqc_opc_update_pkg                          = 0x0C42,
        ice_aqc_opc_get_pkg_info_list                   = 0x0C43,
 
+       /* Standalone Commands/Events */
+       ice_aqc_opc_event_lan_overflow                  = 0x1001,
+
        /* debug commands */
        ice_aqc_opc_fw_logging                          = 0xFF09,
        ice_aqc_opc_fw_logging_info                     = 0xFF10,
index 6db3d0494127638098a7a4a2c02b8f15939d31a8..b99ebfefe06beaf528a04fb8b11335b49421976f 100644 (file)
 #define GL_PWR_MODE_CTL                                0x000B820C
 #define GL_PWR_MODE_CTL_CAR_MAX_BW_S           30
 #define GL_PWR_MODE_CTL_CAR_MAX_BW_M           ICE_M(0x3, 30)
+#define GLDCB_RTCTQ_RXQNUM_S                   0
+#define GLDCB_RTCTQ_RXQNUM_M                   ICE_M(0x7FF, 0)
 #define GLPRT_BPRCL(_i)                                (0x00381380 + ((_i) * 8))
 #define GLPRT_BPTCL(_i)                                (0x00381240 + ((_i) * 8))
 #define GLPRT_CRCERRS(_i)                      (0x00380100 + ((_i) * 8))
index ced070427fd780c064fe758dc20bc2a82ac3d17a..9bbe9d1fc9a807f4b1458b5589020c3c25ff290c 100644 (file)
@@ -1029,6 +1029,9 @@ static int __ice_clean_ctrlq(struct ice_pf *pf, enum ice_ctl_q q_type)
                        if (ice_handle_link_event(pf, &event))
                                dev_err(dev, "Could not handle link event\n");
                        break;
+               case ice_aqc_opc_event_lan_overflow:
+                       ice_vf_lan_overflow_event(pf, &event);
+                       break;
                case ice_mbx_opc_send_msg_to_pf:
                        ice_vc_process_vf_msg(pf, &event);
                        break;
index 3666647da0964ba8ed9bd0d3df2572b6e30ff312..53a9e09c8f219feec8d331dbc0a4afd93e9f713c 100644 (file)
@@ -1513,6 +1513,72 @@ static void ice_vc_reset_vf(struct ice_vf *vf)
        ice_reset_vf(vf, false);
 }
 
+/**
+ * ice_get_vf_from_pfq - get the VF who owns the PF space queue passed in
+ * @pf: PF used to index all VFs
+ * @pfq: queue index relative to the PF's function space
+ *
+ * If no VF is found who owns the pfq then return NULL, otherwise return a
+ * pointer to the VF who owns the pfq
+ */
+static struct ice_vf *ice_get_vf_from_pfq(struct ice_pf *pf, u16 pfq)
+{
+       int vf_id;
+
+       ice_for_each_vf(pf, vf_id) {
+               struct ice_vf *vf = &pf->vf[vf_id];
+               struct ice_vsi *vsi;
+               u16 rxq_idx;
+
+               vsi = pf->vsi[vf->lan_vsi_idx];
+
+               ice_for_each_rxq(vsi, rxq_idx)
+                       if (vsi->rxq_map[rxq_idx] == pfq)
+                               return vf;
+       }
+
+       return NULL;
+}
+
+/**
+ * ice_globalq_to_pfq - convert from global queue index to PF space queue index
+ * @pf: PF used for conversion
+ * @globalq: global queue index used to convert to PF space queue index
+ */
+static u32 ice_globalq_to_pfq(struct ice_pf *pf, u32 globalq)
+{
+       return globalq - pf->hw.func_caps.common_cap.rxq_first_id;
+}
+
+/**
+ * ice_vf_lan_overflow_event - handle LAN overflow event for a VF
+ * @pf: PF that the LAN overflow event happened on
+ * @event: structure holding the event information for the LAN overflow event
+ *
+ * Determine if the LAN overflow event was caused by a VF queue. If it was not
+ * caused by a VF, do nothing. If a VF caused this LAN overflow event trigger a
+ * reset on the offending VF.
+ */
+void
+ice_vf_lan_overflow_event(struct ice_pf *pf, struct ice_rq_event_info *event)
+{
+       u32 gldcb_rtctq, queue;
+       struct ice_vf *vf;
+
+       gldcb_rtctq = le32_to_cpu(event->desc.params.lan_overflow.prtdcb_ruptq);
+       dev_dbg(ice_pf_to_dev(pf), "GLDCB_RTCTQ: 0x%08x\n", gldcb_rtctq);
+
+       /* event returns device global Rx queue number */
+       queue = (gldcb_rtctq & GLDCB_RTCTQ_RXQNUM_M) >>
+               GLDCB_RTCTQ_RXQNUM_S;
+
+       vf = ice_get_vf_from_pfq(pf, ice_globalq_to_pfq(pf, queue));
+       if (!vf)
+               return;
+
+       ice_vc_reset_vf(vf);
+}
+
 /**
  * ice_vc_send_msg_to_vf - Send message to VF
  * @vf: pointer to the VF info
index a1bb196d417acad7b86e5dbacd47e54d8fb4351e..c65269c15dfc2fbcf40f1f34de44a97a2642de58 100644 (file)
@@ -122,6 +122,9 @@ void ice_set_vf_state_qs_dis(struct ice_vf *vf);
 int
 ice_get_vf_stats(struct net_device *netdev, int vf_id,
                 struct ifla_vf_stats *vf_stats);
+void
+ice_vf_lan_overflow_event(struct ice_pf *pf, struct ice_rq_event_info *event);
+
 #else /* CONFIG_PCI_IOV */
 #define ice_process_vflr_event(pf) do {} while (0)
 #define ice_free_vfs(pf) do {} while (0)
@@ -129,6 +132,7 @@ ice_get_vf_stats(struct net_device *netdev, int vf_id,
 #define ice_vc_notify_link_state(pf) do {} while (0)
 #define ice_vc_notify_reset(pf) do {} while (0)
 #define ice_set_vf_state_qs_dis(vf) do {} while (0)
+#define ice_vf_lan_overflow_event(pf, event) do {} while (0)
 
 static inline bool
 ice_reset_all_vfs(struct ice_pf __always_unused *pf,