1 /* Broadcom NetXtreme-C/E network driver.
2  *
3  * Copyright (c) 2020 Broadcom Limited
4  *
5  * This program is free software; you can redistribute it and/or modify
6  * it under the terms of the GNU General Public License as published by
7  * the Free Software Foundation.
8  */
9 
10 #include <asm/byteorder.h>
11 #include <linux/dma-mapping.h>
12 #include <linux/dmapool.h>
13 #include <linux/errno.h>
14 #include <linux/ethtool.h>
15 #include <linux/if_ether.h>
16 #include <linux/io.h>
17 #include <linux/irq.h>
18 #include <linux/kernel.h>
19 #include <linux/list.h>
20 #include <linux/netdevice.h>
21 #include <linux/pci.h>
22 #include <linux/skbuff.h>
23 
24 #include "bnxt_hsi.h"
25 #include "bnxt.h"
26 #include "bnxt_hwrm.h"
27 
28 static u64 hwrm_calc_sentinel(struct bnxt_hwrm_ctx *ctx, u16 req_type)
29 {
30 	return (((uintptr_t)ctx) + req_type) ^ BNXT_HWRM_SENTINEL;
31 }
32 
33 /**
34  * __hwrm_req_init() - Initialize an HWRM request.
35  * @bp: The driver context.
36  * @req: A pointer to the request pointer to initialize.
37  * @req_type: The request type. This will be converted to the little endian
38  *	before being written to the req_type field of the returned request.
39  * @req_len: The length of the request to be allocated.
40  *
41  * Allocate DMA resources and initialize a new HWRM request object of the
42  * given type. The response address field in the request is configured with
43  * the DMA bus address that has been mapped for the response and the passed
44  * request is pointed to kernel virtual memory mapped for the request (such
45  * that short_input indirection can be accomplished without copying). The
46  * request’s target and completion ring are initialized to default values and
47  * can be overridden by writing to the returned request object directly.
48  *
49  * The initialized request can be further customized by writing to its fields
50  * directly, taking care to covert such fields to little endian. The request
51  * object will be consumed (and all its associated resources release) upon
52  * passing it to hwrm_req_send() unless ownership of the request has been
53  * claimed by the caller via a call to hwrm_req_hold(). If the request is not
54  * consumed, either because it is never sent or because ownership has been
55  * claimed, then it must be released by a call to hwrm_req_drop().
56  *
57  * Return: zero on success, negative error code otherwise:
58  *	E2BIG: the type of request pointer is too large to fit.
59  *	ENOMEM: an allocation failure occurred.
60  */
61 int __hwrm_req_init(struct bnxt *bp, void **req, u16 req_type, u32 req_len)
62 {
63 	struct bnxt_hwrm_ctx *ctx;
64 	dma_addr_t dma_handle;
65 	u8 *req_addr;
66 
67 	if (req_len > BNXT_HWRM_CTX_OFFSET)
68 		return -E2BIG;
69 
70 	req_addr = dma_pool_alloc(bp->hwrm_dma_pool, GFP_KERNEL | __GFP_ZERO,
71 				  &dma_handle);
72 	if (!req_addr)
73 		return -ENOMEM;
74 
75 	ctx = (struct bnxt_hwrm_ctx *)(req_addr + BNXT_HWRM_CTX_OFFSET);
76 	/* safety first, sentinel used to check for invalid requests */
77 	ctx->sentinel = hwrm_calc_sentinel(ctx, req_type);
78 	ctx->req_len = req_len;
79 	ctx->req = (struct input *)req_addr;
80 	ctx->resp = (struct output *)(req_addr + BNXT_HWRM_RESP_OFFSET);
81 	ctx->dma_handle = dma_handle;
82 	ctx->flags = 0; /* __GFP_ZERO, but be explicit regarding ownership */
83 	ctx->timeout = bp->hwrm_cmd_timeout ?: DFLT_HWRM_CMD_TIMEOUT;
84 	ctx->allocated = BNXT_HWRM_DMA_SIZE - BNXT_HWRM_CTX_OFFSET;
85 	ctx->gfp = GFP_KERNEL;
86 	ctx->slice_addr = NULL;
87 
88 	/* initialize common request fields */
89 	ctx->req->req_type = cpu_to_le16(req_type);
90 	ctx->req->resp_addr = cpu_to_le64(dma_handle + BNXT_HWRM_RESP_OFFSET);
91 	ctx->req->cmpl_ring = cpu_to_le16(BNXT_HWRM_NO_CMPL_RING);
92 	ctx->req->target_id = cpu_to_le16(BNXT_HWRM_TARGET);
93 	*req = ctx->req;
94 
95 	return 0;
96 }
97 
98 static struct bnxt_hwrm_ctx *__hwrm_ctx(struct bnxt *bp, u8 *req_addr)
99 {
100 	void *ctx_addr = req_addr + BNXT_HWRM_CTX_OFFSET;
101 	struct input *req = (struct input *)req_addr;
102 	struct bnxt_hwrm_ctx *ctx = ctx_addr;
103 	u64 sentinel;
104 
105 	if (!req) {
106 		/* can only be due to software bug, be loud */
107 		netdev_err(bp->dev, "null HWRM request");
108 		dump_stack();
109 		return NULL;
110 	}
111 
112 	/* HWRM API has no type safety, verify sentinel to validate address */
113 	sentinel = hwrm_calc_sentinel(ctx, le16_to_cpu(req->req_type));
114 	if (ctx->sentinel != sentinel) {
115 		/* can only be due to software bug, be loud */
116 		netdev_err(bp->dev, "HWRM sentinel mismatch, req_type = %u\n",
117 			   (u32)le16_to_cpu(req->req_type));
118 		dump_stack();
119 		return NULL;
120 	}
121 
122 	return ctx;
123 }
124 
125 /**
126  * hwrm_req_timeout() - Set the completion timeout for the request.
127  * @bp: The driver context.
128  * @req: The request to set the timeout.
129  * @timeout: The timeout in milliseconds.
130  *
131  * Set the timeout associated with the request for subsequent calls to
132  * hwrm_req_send(). Some requests are long running and require a different
133  * timeout than the default.
134  */
135 void hwrm_req_timeout(struct bnxt *bp, void *req, unsigned int timeout)
136 {
137 	struct bnxt_hwrm_ctx *ctx = __hwrm_ctx(bp, req);
138 
139 	if (ctx)
140 		ctx->timeout = timeout;
141 }
142 
143 /**
144  * hwrm_req_alloc_flags() - Sets GFP allocation flags for slices.
145  * @bp: The driver context.
146  * @req: The request for which calls to hwrm_req_dma_slice() will have altered
147  *	allocation flags.
148  * @gfp: A bitmask of GFP flags. These flags are passed to dma_alloc_coherent()
149  *	whenever it is used to allocate backing memory for slices. Note that
150  *	calls to hwrm_req_dma_slice() will not always result in new allocations,
151  *	however, memory suballocated from the request buffer is already
152  *	__GFP_ZERO.
153  *
154  * Sets the GFP allocation flags associated with the request for subsequent
155  * calls to hwrm_req_dma_slice(). This can be useful for specifying __GFP_ZERO
156  * for slice allocations.
157  */
158 void hwrm_req_alloc_flags(struct bnxt *bp, void *req, gfp_t gfp)
159 {
160 	struct bnxt_hwrm_ctx *ctx = __hwrm_ctx(bp, req);
161 
162 	if (ctx)
163 		ctx->gfp = gfp;
164 }
165 
166 /**
167  * hwrm_req_replace() - Replace request data.
168  * @bp: The driver context.
169  * @req: The request to modify. A call to hwrm_req_replace() is conceptually
170  *	an assignment of new_req to req. Subsequent calls to HWRM API functions,
171  *	such as hwrm_req_send(), should thus use req and not new_req (in fact,
172  *	calls to HWRM API functions will fail if non-managed request objects
173  *	are passed).
174  * @len: The length of new_req.
175  * @new_req: The pre-built request to copy or reference.
176  *
177  * Replaces the request data in req with that of new_req. This is useful in
178  * scenarios where a request object has already been constructed by a third
179  * party prior to creating a resource managed request using hwrm_req_init().
180  * Depending on the length, hwrm_req_replace() will either copy the new
181  * request data into the DMA memory allocated for req, or it will simply
182  * reference the new request and use it in lieu of req during subsequent
183  * calls to hwrm_req_send(). The resource management is associated with
184  * req and is independent of and does not apply to new_req. The caller must
185  * ensure that the lifetime of new_req is least as long as req. Any slices
186  * that may have been associated with the original request are released.
187  *
188  * Return: zero on success, negative error code otherwise:
189  *     E2BIG: Request is too large.
190  *     EINVAL: Invalid request to modify.
191  */
192 int hwrm_req_replace(struct bnxt *bp, void *req, void *new_req, u32 len)
193 {
194 	struct bnxt_hwrm_ctx *ctx = __hwrm_ctx(bp, req);
195 	struct input *internal_req = req;
196 	u16 req_type;
197 
198 	if (!ctx)
199 		return -EINVAL;
200 
201 	if (len > BNXT_HWRM_CTX_OFFSET)
202 		return -E2BIG;
203 
204 	/* free any existing slices */
205 	ctx->allocated = BNXT_HWRM_DMA_SIZE - BNXT_HWRM_CTX_OFFSET;
206 	if (ctx->slice_addr) {
207 		dma_free_coherent(&bp->pdev->dev, ctx->slice_size,
208 				  ctx->slice_addr, ctx->slice_handle);
209 		ctx->slice_addr = NULL;
210 	}
211 	ctx->gfp = GFP_KERNEL;
212 
213 	if ((bp->fw_cap & BNXT_FW_CAP_SHORT_CMD) || len > BNXT_HWRM_MAX_REQ_LEN) {
214 		memcpy(internal_req, new_req, len);
215 	} else {
216 		internal_req->req_type = ((struct input *)new_req)->req_type;
217 		ctx->req = new_req;
218 	}
219 
220 	ctx->req_len = len;
221 	ctx->req->resp_addr = cpu_to_le64(ctx->dma_handle +
222 					  BNXT_HWRM_RESP_OFFSET);
223 
224 	/* update sentinel for potentially new request type */
225 	req_type = le16_to_cpu(internal_req->req_type);
226 	ctx->sentinel = hwrm_calc_sentinel(ctx, req_type);
227 
228 	return 0;
229 }
230 
231 /**
232  * hwrm_req_flags() - Set non internal flags of the ctx
233  * @bp: The driver context.
234  * @req: The request containing the HWRM command
235  * @flags: ctx flags that don't have BNXT_HWRM_INTERNAL_FLAG set
236  *
237  * ctx flags can be used by the callers to instruct how the subsequent
238  * hwrm_req_send() should behave. Example: callers can use hwrm_req_flags
239  * with BNXT_HWRM_CTX_SILENT to omit kernel prints of errors of hwrm_req_send()
240  * or with BNXT_HWRM_FULL_WAIT enforce hwrm_req_send() to wait for full timeout
241  * even if FW is not responding.
242  * This generic function can be used to set any flag that is not an internal flag
243  * of the HWRM module.
244  */
245 void hwrm_req_flags(struct bnxt *bp, void *req, enum bnxt_hwrm_ctx_flags flags)
246 {
247 	struct bnxt_hwrm_ctx *ctx = __hwrm_ctx(bp, req);
248 
249 	if (ctx)
250 		ctx->flags |= (flags & HWRM_API_FLAGS);
251 }
252 
253 /**
254  * hwrm_req_hold() - Claim ownership of the request's resources.
255  * @bp: The driver context.
256  * @req: A pointer to the request to own. The request will no longer be
257  *	consumed by calls to hwrm_req_send().
258  *
259  * Take ownership of the request. Ownership places responsibility on the
260  * caller to free the resources associated with the request via a call to
261  * hwrm_req_drop(). The caller taking ownership implies that a subsequent
262  * call to hwrm_req_send() will not consume the request (ie. sending will
263  * not free the associated resources if the request is owned by the caller).
264  * Taking ownership returns a reference to the response. Retaining and
265  * accessing the response data is the most common reason to take ownership
266  * of the request. Ownership can also be acquired in order to reuse the same
267  * request object across multiple invocations of hwrm_req_send().
268  *
269  * Return: A pointer to the response object.
270  *
271  * The resources associated with the response will remain available to the
272  * caller until ownership of the request is relinquished via a call to
273  * hwrm_req_drop(). It is not possible for hwrm_req_hold() to return NULL if
274  * a valid request is provided. A returned NULL value would imply a driver
275  * bug and the implementation will complain loudly in the logs to aid in
276  * detection. It should not be necessary to check the result for NULL.
277  */
278 void *hwrm_req_hold(struct bnxt *bp, void *req)
279 {
280 	struct bnxt_hwrm_ctx *ctx = __hwrm_ctx(bp, req);
281 	struct input *input = (struct input *)req;
282 
283 	if (!ctx)
284 		return NULL;
285 
286 	if (ctx->flags & BNXT_HWRM_INTERNAL_CTX_OWNED) {
287 		/* can only be due to software bug, be loud */
288 		netdev_err(bp->dev, "HWRM context already owned, req_type = %u\n",
289 			   (u32)le16_to_cpu(input->req_type));
290 		dump_stack();
291 		return NULL;
292 	}
293 
294 	ctx->flags |= BNXT_HWRM_INTERNAL_CTX_OWNED;
295 	return ((u8 *)req) + BNXT_HWRM_RESP_OFFSET;
296 }
297 
298 static void __hwrm_ctx_drop(struct bnxt *bp, struct bnxt_hwrm_ctx *ctx)
299 {
300 	void *addr = ((u8 *)ctx) - BNXT_HWRM_CTX_OFFSET;
301 	dma_addr_t dma_handle = ctx->dma_handle; /* save before invalidate */
302 
303 	/* unmap any auxiliary DMA slice */
304 	if (ctx->slice_addr)
305 		dma_free_coherent(&bp->pdev->dev, ctx->slice_size,
306 				  ctx->slice_addr, ctx->slice_handle);
307 
308 	/* invalidate, ensure ownership, sentinel and dma_handle are cleared */
309 	memset(ctx, 0, sizeof(struct bnxt_hwrm_ctx));
310 
311 	/* return the buffer to the DMA pool */
312 	if (dma_handle)
313 		dma_pool_free(bp->hwrm_dma_pool, addr, dma_handle);
314 }
315 
316 /**
317  * hwrm_req_drop() - Release all resources associated with the request.
318  * @bp: The driver context.
319  * @req: The request to consume, releasing the associated resources. The
320  *	request object, any slices, and its associated response are no
321  *	longer valid.
322  *
323  * It is legal to call hwrm_req_drop() on an unowned request, provided it
324  * has not already been consumed by hwrm_req_send() (for example, to release
325  * an aborted request). A given request should not be dropped more than once,
326  * nor should it be dropped after having been consumed by hwrm_req_send(). To
327  * do so is an error (the context will not be found and a stack trace will be
328  * rendered in the kernel log).
329  */
330 void hwrm_req_drop(struct bnxt *bp, void *req)
331 {
332 	struct bnxt_hwrm_ctx *ctx = __hwrm_ctx(bp, req);
333 
334 	if (ctx)
335 		__hwrm_ctx_drop(bp, ctx);
336 }
337 
338 static int __hwrm_to_stderr(u32 hwrm_err)
339 {
340 	switch (hwrm_err) {
341 	case HWRM_ERR_CODE_SUCCESS:
342 		return 0;
343 	case HWRM_ERR_CODE_RESOURCE_LOCKED:
344 		return -EROFS;
345 	case HWRM_ERR_CODE_RESOURCE_ACCESS_DENIED:
346 		return -EACCES;
347 	case HWRM_ERR_CODE_RESOURCE_ALLOC_ERROR:
348 		return -ENOSPC;
349 	case HWRM_ERR_CODE_INVALID_PARAMS:
350 	case HWRM_ERR_CODE_INVALID_FLAGS:
351 	case HWRM_ERR_CODE_INVALID_ENABLES:
352 	case HWRM_ERR_CODE_UNSUPPORTED_TLV:
353 	case HWRM_ERR_CODE_UNSUPPORTED_OPTION_ERR:
354 		return -EINVAL;
355 	case HWRM_ERR_CODE_NO_BUFFER:
356 		return -ENOMEM;
357 	case HWRM_ERR_CODE_HOT_RESET_PROGRESS:
358 	case HWRM_ERR_CODE_BUSY:
359 		return -EAGAIN;
360 	case HWRM_ERR_CODE_CMD_NOT_SUPPORTED:
361 		return -EOPNOTSUPP;
362 	case HWRM_ERR_CODE_PF_UNAVAILABLE:
363 		return -ENODEV;
364 	default:
365 		return -EIO;
366 	}
367 }
368 
369 static struct bnxt_hwrm_wait_token *
370 __hwrm_acquire_token(struct bnxt *bp, enum bnxt_hwrm_chnl dst)
371 {
372 	struct bnxt_hwrm_wait_token *token;
373 
374 	token = kzalloc(sizeof(*token), GFP_KERNEL);
375 	if (!token)
376 		return NULL;
377 
378 	mutex_lock(&bp->hwrm_cmd_lock);
379 
380 	token->dst = dst;
381 	token->state = BNXT_HWRM_PENDING;
382 	if (dst == BNXT_HWRM_CHNL_CHIMP) {
383 		token->seq_id = bp->hwrm_cmd_seq++;
384 		hlist_add_head_rcu(&token->node, &bp->hwrm_pending_list);
385 	} else {
386 		token->seq_id = bp->hwrm_cmd_kong_seq++;
387 	}
388 
389 	return token;
390 }
391 
392 static void
393 __hwrm_release_token(struct bnxt *bp, struct bnxt_hwrm_wait_token *token)
394 {
395 	if (token->dst == BNXT_HWRM_CHNL_CHIMP) {
396 		hlist_del_rcu(&token->node);
397 		kfree_rcu(token, rcu);
398 	} else {
399 		kfree(token);
400 	}
401 	mutex_unlock(&bp->hwrm_cmd_lock);
402 }
403 
404 void
405 hwrm_update_token(struct bnxt *bp, u16 seq_id, enum bnxt_hwrm_wait_state state)
406 {
407 	struct bnxt_hwrm_wait_token *token;
408 
409 	rcu_read_lock();
410 	hlist_for_each_entry_rcu(token, &bp->hwrm_pending_list, node) {
411 		if (token->seq_id == seq_id) {
412 			WRITE_ONCE(token->state, state);
413 			rcu_read_unlock();
414 			return;
415 		}
416 	}
417 	rcu_read_unlock();
418 	netdev_err(bp->dev, "Invalid hwrm seq id %d\n", seq_id);
419 }
420 
421 static void hwrm_req_dbg(struct bnxt *bp, struct input *req)
422 {
423 	u32 ring = le16_to_cpu(req->cmpl_ring);
424 	u32 type = le16_to_cpu(req->req_type);
425 	u32 tgt = le16_to_cpu(req->target_id);
426 	u32 seq = le16_to_cpu(req->seq_id);
427 	char opt[32] = "\n";
428 
429 	if (unlikely(ring != (u16)BNXT_HWRM_NO_CMPL_RING))
430 		snprintf(opt, 16, " ring %d\n", ring);
431 
432 	if (unlikely(tgt != BNXT_HWRM_TARGET))
433 		snprintf(opt + strlen(opt) - 1, 16, " tgt 0x%x\n", tgt);
434 
435 	netdev_dbg(bp->dev, "sent hwrm req_type 0x%x seq id 0x%x%s",
436 		   type, seq, opt);
437 }
438 
439 #define hwrm_err(bp, ctx, fmt, ...)				       \
440 	do {							       \
441 		if ((ctx)->flags & BNXT_HWRM_CTX_SILENT)	       \
442 			netdev_dbg((bp)->dev, fmt, __VA_ARGS__);       \
443 		else						       \
444 			netdev_err((bp)->dev, fmt, __VA_ARGS__);       \
445 	} while (0)
446 
447 static bool hwrm_wait_must_abort(struct bnxt *bp, u32 req_type, u32 *fw_status)
448 {
449 	if (req_type == HWRM_VER_GET)
450 		return false;
451 
452 	if (!bp->fw_health || !bp->fw_health->status_reliable)
453 		return false;
454 
455 	*fw_status = bnxt_fw_health_readl(bp, BNXT_FW_HEALTH_REG);
456 	return *fw_status && !BNXT_FW_IS_HEALTHY(*fw_status);
457 }
458 
459 static int __hwrm_send(struct bnxt *bp, struct bnxt_hwrm_ctx *ctx)
460 {
461 	u32 doorbell_offset = BNXT_GRCPF_REG_CHIMP_COMM_TRIGGER;
462 	enum bnxt_hwrm_chnl dst = BNXT_HWRM_CHNL_CHIMP;
463 	u32 bar_offset = BNXT_GRCPF_REG_CHIMP_COMM;
464 	struct bnxt_hwrm_wait_token *token = NULL;
465 	struct hwrm_short_input short_input = {0};
466 	u16 max_req_len = BNXT_HWRM_MAX_REQ_LEN;
467 	unsigned int i, timeout, tmo_count;
468 	u32 *data = (u32 *)ctx->req;
469 	u32 msg_len = ctx->req_len;
470 	u32 req_type, sts;
471 	int rc = -EBUSY;
472 	u16 len = 0;
473 	u8 *valid;
474 
475 	if (ctx->flags & BNXT_HWRM_INTERNAL_RESP_DIRTY)
476 		memset(ctx->resp, 0, PAGE_SIZE);
477 
478 	req_type = le16_to_cpu(ctx->req->req_type);
479 	if (BNXT_NO_FW_ACCESS(bp) &&
480 	    (req_type != HWRM_FUNC_RESET && req_type != HWRM_VER_GET)) {
481 		netdev_dbg(bp->dev, "hwrm req_type 0x%x skipped, FW channel down\n",
482 			   req_type);
483 		goto exit;
484 	}
485 
486 	if (msg_len > BNXT_HWRM_MAX_REQ_LEN &&
487 	    msg_len > bp->hwrm_max_ext_req_len) {
488 		netdev_warn(bp->dev, "oversized hwrm request, req_type 0x%x",
489 			    req_type);
490 		rc = -E2BIG;
491 		goto exit;
492 	}
493 
494 	if (bnxt_kong_hwrm_message(bp, ctx->req)) {
495 		dst = BNXT_HWRM_CHNL_KONG;
496 		bar_offset = BNXT_GRCPF_REG_KONG_COMM;
497 		doorbell_offset = BNXT_GRCPF_REG_KONG_COMM_TRIGGER;
498 		if (le16_to_cpu(ctx->req->cmpl_ring) != INVALID_HW_RING_ID) {
499 			netdev_err(bp->dev, "Ring completions not supported for KONG commands, req_type = %d\n",
500 				   req_type);
501 			rc = -EINVAL;
502 			goto exit;
503 		}
504 	}
505 
506 	token = __hwrm_acquire_token(bp, dst);
507 	if (!token) {
508 		rc = -ENOMEM;
509 		goto exit;
510 	}
511 	ctx->req->seq_id = cpu_to_le16(token->seq_id);
512 
513 	if ((bp->fw_cap & BNXT_FW_CAP_SHORT_CMD) ||
514 	    msg_len > BNXT_HWRM_MAX_REQ_LEN) {
515 		short_input.req_type = ctx->req->req_type;
516 		short_input.signature =
517 				cpu_to_le16(SHORT_REQ_SIGNATURE_SHORT_CMD);
518 		short_input.size = cpu_to_le16(msg_len);
519 		short_input.req_addr = cpu_to_le64(ctx->dma_handle);
520 
521 		data = (u32 *)&short_input;
522 		msg_len = sizeof(short_input);
523 
524 		max_req_len = BNXT_HWRM_SHORT_REQ_LEN;
525 	}
526 
527 	/* Ensure any associated DMA buffers are written before doorbell */
528 	wmb();
529 
530 	/* Write request msg to hwrm channel */
531 	__iowrite32_copy(bp->bar0 + bar_offset, data, msg_len / 4);
532 
533 	for (i = msg_len; i < max_req_len; i += 4)
534 		writel(0, bp->bar0 + bar_offset + i);
535 
536 	/* Ring channel doorbell */
537 	writel(1, bp->bar0 + doorbell_offset);
538 
539 	hwrm_req_dbg(bp, ctx->req);
540 
541 	if (!pci_is_enabled(bp->pdev)) {
542 		rc = -ENODEV;
543 		goto exit;
544 	}
545 
546 	/* Limit timeout to an upper limit */
547 	timeout = min(ctx->timeout, bp->hwrm_cmd_max_timeout ?: HWRM_CMD_MAX_TIMEOUT);
548 	/* convert timeout to usec */
549 	timeout *= 1000;
550 
551 	i = 0;
552 	/* Short timeout for the first few iterations:
553 	 * number of loops = number of loops for short timeout +
554 	 * number of loops for standard timeout.
555 	 */
556 	tmo_count = HWRM_SHORT_TIMEOUT_COUNTER;
557 	timeout = timeout - HWRM_SHORT_MIN_TIMEOUT * HWRM_SHORT_TIMEOUT_COUNTER;
558 	tmo_count += DIV_ROUND_UP(timeout, HWRM_MIN_TIMEOUT);
559 
560 	if (le16_to_cpu(ctx->req->cmpl_ring) != INVALID_HW_RING_ID) {
561 		/* Wait until hwrm response cmpl interrupt is processed */
562 		while (READ_ONCE(token->state) < BNXT_HWRM_COMPLETE &&
563 		       i++ < tmo_count) {
564 			/* Abort the wait for completion if the FW health
565 			 * check has failed.
566 			 */
567 			if (test_bit(BNXT_STATE_FW_FATAL_COND, &bp->state))
568 				goto exit;
569 			/* on first few passes, just barely sleep */
570 			if (i < HWRM_SHORT_TIMEOUT_COUNTER) {
571 				usleep_range(HWRM_SHORT_MIN_TIMEOUT,
572 					     HWRM_SHORT_MAX_TIMEOUT);
573 			} else {
574 				if (hwrm_wait_must_abort(bp, req_type, &sts)) {
575 					hwrm_err(bp, ctx, "Resp cmpl intr abandoning msg: 0x%x due to firmware status: 0x%x\n",
576 						 req_type, sts);
577 					goto exit;
578 				}
579 				usleep_range(HWRM_MIN_TIMEOUT,
580 					     HWRM_MAX_TIMEOUT);
581 			}
582 		}
583 
584 		if (READ_ONCE(token->state) != BNXT_HWRM_COMPLETE) {
585 			hwrm_err(bp, ctx, "Resp cmpl intr err msg: 0x%x\n",
586 				 req_type);
587 			goto exit;
588 		}
589 		len = le16_to_cpu(READ_ONCE(ctx->resp->resp_len));
590 		valid = ((u8 *)ctx->resp) + len - 1;
591 	} else {
592 		__le16 seen_out_of_seq = ctx->req->seq_id; /* will never see */
593 		int j;
594 
595 		/* Check if response len is updated */
596 		for (i = 0; i < tmo_count; i++) {
597 			/* Abort the wait for completion if the FW health
598 			 * check has failed.
599 			 */
600 			if (test_bit(BNXT_STATE_FW_FATAL_COND, &bp->state))
601 				goto exit;
602 
603 			if (token &&
604 			    READ_ONCE(token->state) == BNXT_HWRM_DEFERRED) {
605 				__hwrm_release_token(bp, token);
606 				token = NULL;
607 			}
608 
609 			len = le16_to_cpu(READ_ONCE(ctx->resp->resp_len));
610 			if (len) {
611 				__le16 resp_seq = READ_ONCE(ctx->resp->seq_id);
612 
613 				if (resp_seq == ctx->req->seq_id)
614 					break;
615 				if (resp_seq != seen_out_of_seq) {
616 					netdev_warn(bp->dev, "Discarding out of seq response: 0x%x for msg {0x%x 0x%x}\n",
617 						    le16_to_cpu(resp_seq),
618 						    req_type,
619 						    le16_to_cpu(ctx->req->seq_id));
620 					seen_out_of_seq = resp_seq;
621 				}
622 			}
623 
624 			/* on first few passes, just barely sleep */
625 			if (i < HWRM_SHORT_TIMEOUT_COUNTER) {
626 				usleep_range(HWRM_SHORT_MIN_TIMEOUT,
627 					     HWRM_SHORT_MAX_TIMEOUT);
628 			} else {
629 				if (hwrm_wait_must_abort(bp, req_type, &sts)) {
630 					hwrm_err(bp, ctx, "Abandoning msg {0x%x 0x%x} len: %d due to firmware status: 0x%x\n",
631 						 req_type,
632 						 le16_to_cpu(ctx->req->seq_id),
633 						 len, sts);
634 					goto exit;
635 				}
636 				usleep_range(HWRM_MIN_TIMEOUT,
637 					     HWRM_MAX_TIMEOUT);
638 			}
639 		}
640 
641 		if (i >= tmo_count) {
642 			hwrm_err(bp, ctx, "Error (timeout: %u) msg {0x%x 0x%x} len:%d\n",
643 				 hwrm_total_timeout(i), req_type,
644 				 le16_to_cpu(ctx->req->seq_id), len);
645 			goto exit;
646 		}
647 
648 		/* Last byte of resp contains valid bit */
649 		valid = ((u8 *)ctx->resp) + len - 1;
650 		for (j = 0; j < HWRM_VALID_BIT_DELAY_USEC; ) {
651 			/* make sure we read from updated DMA memory */
652 			dma_rmb();
653 			if (*valid)
654 				break;
655 			if (j < 10) {
656 				udelay(1);
657 				j++;
658 			} else {
659 				usleep_range(20, 30);
660 				j += 20;
661 			}
662 		}
663 
664 		if (j >= HWRM_VALID_BIT_DELAY_USEC) {
665 			hwrm_err(bp, ctx, "Error (timeout: %u) msg {0x%x 0x%x} len:%d v:%d\n",
666 				 hwrm_total_timeout(i) + j, req_type,
667 				 le16_to_cpu(ctx->req->seq_id), len, *valid);
668 			goto exit;
669 		}
670 	}
671 
672 	/* Zero valid bit for compatibility.  Valid bit in an older spec
673 	 * may become a new field in a newer spec.  We must make sure that
674 	 * a new field not implemented by old spec will read zero.
675 	 */
676 	*valid = 0;
677 	rc = le16_to_cpu(ctx->resp->error_code);
678 	if (rc == HWRM_ERR_CODE_BUSY && !(ctx->flags & BNXT_HWRM_CTX_SILENT))
679 		netdev_warn(bp->dev, "FW returned busy, hwrm req_type 0x%x\n",
680 			    req_type);
681 	else if (rc && rc != HWRM_ERR_CODE_PF_UNAVAILABLE)
682 		hwrm_err(bp, ctx, "hwrm req_type 0x%x seq id 0x%x error 0x%x\n",
683 			 req_type, token->seq_id, rc);
684 	rc = __hwrm_to_stderr(rc);
685 exit:
686 	if (token)
687 		__hwrm_release_token(bp, token);
688 	if (ctx->flags & BNXT_HWRM_INTERNAL_CTX_OWNED)
689 		ctx->flags |= BNXT_HWRM_INTERNAL_RESP_DIRTY;
690 	else
691 		__hwrm_ctx_drop(bp, ctx);
692 	return rc;
693 }
694 
695 /**
696  * hwrm_req_send() - Execute an HWRM command.
697  * @bp: The driver context.
698  * @req: A pointer to the request to send. The DMA resources associated with
699  *	the request will be released (ie. the request will be consumed) unless
700  *	ownership of the request has been assumed by the caller via a call to
701  *	hwrm_req_hold().
702  *
703  * Send an HWRM request to the device and wait for a response. The request is
704  * consumed if it is not owned by the caller. This function will block until
705  * the request has either completed or times out due to an error.
706  *
707  * Return: A result code.
708  *
709  * The result is zero on success, otherwise the negative error code indicates
710  * one of the following errors:
711  *	E2BIG: The request was too large.
712  *	EBUSY: The firmware is in a fatal state or the request timed out
713  *	EACCESS: HWRM access denied.
714  *	ENOSPC: HWRM resource allocation error.
715  *	EINVAL: Request parameters are invalid.
716  *	ENOMEM: HWRM has no buffers.
717  *	EAGAIN: HWRM busy or reset in progress.
718  *	EOPNOTSUPP: Invalid request type.
719  *	EIO: Any other error.
720  * Error handling is orthogonal to request ownership. An unowned request will
721  * still be consumed on error. If the caller owns the request, then the caller
722  * is responsible for releasing the resources. Otherwise, hwrm_req_send() will
723  * always consume the request.
724  */
725 int hwrm_req_send(struct bnxt *bp, void *req)
726 {
727 	struct bnxt_hwrm_ctx *ctx = __hwrm_ctx(bp, req);
728 
729 	if (!ctx)
730 		return -EINVAL;
731 
732 	return __hwrm_send(bp, ctx);
733 }
734 
735 /**
736  * hwrm_req_send_silent() - A silent version of hwrm_req_send().
737  * @bp: The driver context.
738  * @req: The request to send without logging.
739  *
740  * The same as hwrm_req_send(), except that the request is silenced using
741  * hwrm_req_silence() prior the call. This version of the function is
742  * provided solely to preserve the legacy API’s flavor for this functionality.
743  *
744  * Return: A result code, see hwrm_req_send().
745  */
746 int hwrm_req_send_silent(struct bnxt *bp, void *req)
747 {
748 	hwrm_req_flags(bp, req, BNXT_HWRM_CTX_SILENT);
749 	return hwrm_req_send(bp, req);
750 }
751 
752 /**
753  * hwrm_req_dma_slice() - Allocate a slice of DMA mapped memory.
754  * @bp: The driver context.
755  * @req: The request for which indirect data will be associated.
756  * @size: The size of the allocation.
757  * @dma_handle: The bus address associated with the allocation. The HWRM API has
758  *	no knowledge about the type of the request and so cannot infer how the
759  *	caller intends to use the indirect data. Thus, the caller is
760  *	responsible for configuring the request object appropriately to
761  *	point to the associated indirect memory. Note, DMA handle has the
762  *	same definition as it does in dma_alloc_coherent(), the caller is
763  *	responsible for endian conversions via cpu_to_le64() before assigning
764  *	this address.
765  *
766  * Allocates DMA mapped memory for indirect data related to a request. The
767  * lifetime of the DMA resources will be bound to that of the request (ie.
768  * they will be automatically released when the request is either consumed by
769  * hwrm_req_send() or dropped by hwrm_req_drop()). Small allocations are
770  * efficiently suballocated out of the request buffer space, hence the name
771  * slice, while larger requests are satisfied via an underlying call to
772  * dma_alloc_coherent(). Multiple suballocations are supported, however, only
773  * one externally mapped region is.
774  *
775  * Return: The kernel virtual address of the DMA mapping.
776  */
777 void *
778 hwrm_req_dma_slice(struct bnxt *bp, void *req, u32 size, dma_addr_t *dma_handle)
779 {
780 	struct bnxt_hwrm_ctx *ctx = __hwrm_ctx(bp, req);
781 	u8 *end = ((u8 *)req) + BNXT_HWRM_DMA_SIZE;
782 	struct input *input = req;
783 	u8 *addr, *req_addr = req;
784 	u32 max_offset, offset;
785 
786 	if (!ctx)
787 		return NULL;
788 
789 	max_offset = BNXT_HWRM_DMA_SIZE - ctx->allocated;
790 	offset = max_offset - size;
791 	offset = ALIGN_DOWN(offset, BNXT_HWRM_DMA_ALIGN);
792 	addr = req_addr + offset;
793 
794 	if (addr < req_addr + max_offset && req_addr + ctx->req_len <= addr) {
795 		ctx->allocated = end - addr;
796 		*dma_handle = ctx->dma_handle + offset;
797 		return addr;
798 	}
799 
800 	/* could not suballocate from ctx buffer, try create a new mapping */
801 	if (ctx->slice_addr) {
802 		/* if one exists, can only be due to software bug, be loud */
803 		netdev_err(bp->dev, "HWRM refusing to reallocate DMA slice, req_type = %u\n",
804 			   (u32)le16_to_cpu(input->req_type));
805 		dump_stack();
806 		return NULL;
807 	}
808 
809 	addr = dma_alloc_coherent(&bp->pdev->dev, size, dma_handle, ctx->gfp);
810 
811 	if (!addr)
812 		return NULL;
813 
814 	ctx->slice_addr = addr;
815 	ctx->slice_size = size;
816 	ctx->slice_handle = *dma_handle;
817 
818 	return addr;
819 }
820