]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - drivers/infiniband/hw/hfi1/ud.c
Merge tag 'gpio-v4.8-3' of git://git.kernel.org/pub/scm/linux/kernel/git/linusw/linux...
[mirror_ubuntu-bionic-kernel.git] / drivers / infiniband / hw / hfi1 / ud.c
CommitLineData
77241056 1/*
05d6ac1d 2 * Copyright(c) 2015, 2016 Intel Corporation.
77241056
MM
3 *
4 * This file is provided under a dual BSD/GPLv2 license. When using or
5 * redistributing this file, you may do so under either license.
6 *
7 * GPL LICENSE SUMMARY
8 *
77241056
MM
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of version 2 of the GNU General Public License as
11 * published by the Free Software Foundation.
12 *
13 * This program is distributed in the hope that it will be useful, but
14 * WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 * General Public License for more details.
17 *
18 * BSD LICENSE
19 *
77241056
MM
20 * Redistribution and use in source and binary forms, with or without
21 * modification, are permitted provided that the following conditions
22 * are met:
23 *
24 * - Redistributions of source code must retain the above copyright
25 * notice, this list of conditions and the following disclaimer.
26 * - Redistributions in binary form must reproduce the above copyright
27 * notice, this list of conditions and the following disclaimer in
28 * the documentation and/or other materials provided with the
29 * distribution.
30 * - Neither the name of Intel Corporation nor the names of its
31 * contributors may be used to endorse or promote products derived
32 * from this software without specific prior written permission.
33 *
34 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
35 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
36 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
37 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
38 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
39 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
40 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
41 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
42 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
43 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
44 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
45 *
46 */
47
48#include <linux/net.h>
49#include <rdma/ib_smi.h>
50
51#include "hfi.h"
52#include "mad.h"
bb5df5f9 53#include "verbs_txreq.h"
711e104d 54#include "qp.h"
77241056
MM
55
56/**
57 * ud_loopback - handle send on loopback QPs
58 * @sqp: the sending QP
59 * @swqe: the send work request
60 *
61 * This is called from hfi1_make_ud_req() to forward a WQE addressed
62 * to the same HFI.
63 * Note that the receive interrupt handler may be calling hfi1_ud_rcv()
64 * while this is being called.
65 */
895420dd 66static void ud_loopback(struct rvt_qp *sqp, struct rvt_swqe *swqe)
77241056
MM
67{
68 struct hfi1_ibport *ibp = to_iport(sqp->ibqp.device, sqp->port_num);
69 struct hfi1_pportdata *ppd;
895420dd 70 struct rvt_qp *qp;
77241056
MM
71 struct ib_ah_attr *ah_attr;
72 unsigned long flags;
895420dd
DD
73 struct rvt_sge_state ssge;
74 struct rvt_sge *sge;
77241056
MM
75 struct ib_wc wc;
76 u32 length;
77 enum ib_qp_type sqptype, dqptype;
78
79 rcu_read_lock();
80
ec4274f1
DD
81 qp = rvt_lookup_qpn(ib_to_rvt(sqp->ibqp.device), &ibp->rvp,
82 swqe->ud_wr.remote_qpn);
77241056 83 if (!qp) {
4eb06882 84 ibp->rvp.n_pkt_drops++;
77241056
MM
85 rcu_read_unlock();
86 return;
87 }
88
89 sqptype = sqp->ibqp.qp_type == IB_QPT_GSI ?
90 IB_QPT_UD : sqp->ibqp.qp_type;
91 dqptype = qp->ibqp.qp_type == IB_QPT_GSI ?
92 IB_QPT_UD : qp->ibqp.qp_type;
93
94 if (dqptype != sqptype ||
83693bd1 95 !(ib_rvt_state_ops[qp->state] & RVT_PROCESS_RECV_OK)) {
4eb06882 96 ibp->rvp.n_pkt_drops++;
77241056
MM
97 goto drop;
98 }
99
15723f06 100 ah_attr = &ibah_to_rvtah(swqe->ud_wr.ah)->attr;
77241056
MM
101 ppd = ppd_from_ibp(ibp);
102
103 if (qp->ibqp.qp_num > 1) {
104 u16 pkey;
105 u16 slid;
106 u8 sc5 = ibp->sl_to_sc[ah_attr->sl];
107
108 pkey = hfi1_get_pkey(ibp, sqp->s_pkey_index);
109 slid = ppd->lid | (ah_attr->src_path_bits &
110 ((1 << ppd->lmc) - 1));
111 if (unlikely(ingress_pkey_check(ppd, pkey, sc5,
112 qp->s_pkey_index, slid))) {
5cd24119 113 hfi1_bad_pqkey(ibp, OPA_TRAP_BAD_P_KEY, pkey,
77241056
MM
114 ah_attr->sl,
115 sqp->ibqp.qp_num, qp->ibqp.qp_num,
5cd24119 116 slid, ah_attr->dlid);
77241056
MM
117 goto drop;
118 }
119 }
120
121 /*
122 * Check that the qkey matches (except for QP0, see 9.6.1.4.1).
123 * Qkeys with the high order bit set mean use the
124 * qkey from the QP context instead of the WR (see 10.2.5).
125 */
126 if (qp->ibqp.qp_num) {
127 u32 qkey;
128
e622f2f4
CH
129 qkey = (int)swqe->ud_wr.remote_qkey < 0 ?
130 sqp->qkey : swqe->ud_wr.remote_qkey;
77241056
MM
131 if (unlikely(qkey != qp->qkey)) {
132 u16 lid;
133
134 lid = ppd->lid | (ah_attr->src_path_bits &
135 ((1 << ppd->lmc) - 1));
5cd24119 136 hfi1_bad_pqkey(ibp, OPA_TRAP_BAD_Q_KEY, qkey,
77241056
MM
137 ah_attr->sl,
138 sqp->ibqp.qp_num, qp->ibqp.qp_num,
5cd24119
EK
139 lid,
140 ah_attr->dlid);
77241056
MM
141 goto drop;
142 }
143 }
144
145 /*
146 * A GRH is expected to precede the data even if not
147 * present on the wire.
148 */
149 length = swqe->length;
150 memset(&wc, 0, sizeof(wc));
151 wc.byte_len = length + sizeof(struct ib_grh);
152
153 if (swqe->wr.opcode == IB_WR_SEND_WITH_IMM) {
154 wc.wc_flags = IB_WC_WITH_IMM;
155 wc.ex.imm_data = swqe->wr.ex.imm_data;
156 }
157
158 spin_lock_irqsave(&qp->r_lock, flags);
159
160 /*
161 * Get the next work request entry to find where to put the data.
162 */
e490974e 163 if (qp->r_flags & RVT_R_REUSE_SGE) {
54d10c1e 164 qp->r_flags &= ~RVT_R_REUSE_SGE;
e490974e 165 } else {
77241056
MM
166 int ret;
167
ec4274f1 168 ret = hfi1_rvt_get_rwqe(qp, 0);
77241056
MM
169 if (ret < 0) {
170 hfi1_rc_error(qp, IB_WC_LOC_QP_OP_ERR);
171 goto bail_unlock;
172 }
173 if (!ret) {
174 if (qp->ibqp.qp_num == 0)
4eb06882 175 ibp->rvp.n_vl15_dropped++;
77241056
MM
176 goto bail_unlock;
177 }
178 }
179 /* Silently drop packets which are too big. */
180 if (unlikely(wc.byte_len > qp->r_len)) {
54d10c1e 181 qp->r_flags |= RVT_R_REUSE_SGE;
4eb06882 182 ibp->rvp.n_pkt_drops++;
77241056
MM
183 goto bail_unlock;
184 }
185
186 if (ah_attr->ah_flags & IB_AH_GRH) {
527dbf12
DC
187 struct ib_grh grh;
188 struct ib_global_route grd = ah_attr->grh;
189
190 hfi1_make_grh(ibp, &grh, &grd, 0, 0);
191 hfi1_copy_sge(&qp->r_sge, &grh,
192 sizeof(grh), 1, 0);
77241056 193 wc.wc_flags |= IB_WC_GRH;
e490974e 194 } else {
77241056 195 hfi1_skip_sge(&qp->r_sge, sizeof(struct ib_grh), 1);
e490974e 196 }
77241056
MM
197 ssge.sg_list = swqe->sg_list + 1;
198 ssge.sge = *swqe->sg_list;
199 ssge.num_sge = swqe->wr.num_sge;
200 sge = &ssge.sge;
201 while (length) {
202 u32 len = sge->length;
203
204 if (len > length)
205 len = length;
206 if (len > sge->sge_length)
207 len = sge->sge_length;
208 WARN_ON_ONCE(len == 0);
7b0b01aa 209 hfi1_copy_sge(&qp->r_sge, sge->vaddr, len, 1, 0);
77241056
MM
210 sge->vaddr += len;
211 sge->length -= len;
212 sge->sge_length -= len;
213 if (sge->sge_length == 0) {
214 if (--ssge.num_sge)
215 *sge = *ssge.sg_list++;
216 } else if (sge->length == 0 && sge->mr->lkey) {
cd4ceee3 217 if (++sge->n >= RVT_SEGSZ) {
77241056
MM
218 if (++sge->m >= sge->mr->mapsz)
219 break;
220 sge->n = 0;
221 }
222 sge->vaddr =
223 sge->mr->map[sge->m]->segs[sge->n].vaddr;
224 sge->length =
225 sge->mr->map[sge->m]->segs[sge->n].length;
226 }
227 length -= len;
228 }
ec4274f1 229 rvt_put_ss(&qp->r_sge);
54d10c1e 230 if (!test_and_clear_bit(RVT_R_WRID_VALID, &qp->r_aflags))
77241056
MM
231 goto bail_unlock;
232 wc.wr_id = qp->r_wr_id;
233 wc.status = IB_WC_SUCCESS;
234 wc.opcode = IB_WC_RECV;
235 wc.qp = &qp->ibqp;
236 wc.src_qp = sqp->ibqp.qp_num;
237 if (qp->ibqp.qp_type == IB_QPT_GSI || qp->ibqp.qp_type == IB_QPT_SMI) {
238 if (sqp->ibqp.qp_type == IB_QPT_GSI ||
239 sqp->ibqp.qp_type == IB_QPT_SMI)
e622f2f4 240 wc.pkey_index = swqe->ud_wr.pkey_index;
77241056
MM
241 else
242 wc.pkey_index = sqp->s_pkey_index;
243 } else {
244 wc.pkey_index = 0;
245 }
246 wc.slid = ppd->lid | (ah_attr->src_path_bits & ((1 << ppd->lmc) - 1));
247 /* Check for loopback when the port lid is not set */
248 if (wc.slid == 0 && sqp->ibqp.qp_type == IB_QPT_GSI)
8859b4a6 249 wc.slid = be16_to_cpu(IB_LID_PERMISSIVE);
77241056
MM
250 wc.sl = ah_attr->sl;
251 wc.dlid_path_bits = ah_attr->dlid & ((1 << ppd->lmc) - 1);
252 wc.port_num = qp->port_num;
253 /* Signal completion event if the solicited bit is set. */
abd712da
DD
254 rvt_cq_enter(ibcq_to_rvtcq(qp->ibqp.recv_cq), &wc,
255 swqe->wr.send_flags & IB_SEND_SOLICITED);
4eb06882 256 ibp->rvp.n_loop_pkts++;
77241056
MM
257bail_unlock:
258 spin_unlock_irqrestore(&qp->r_lock, flags);
259drop:
260 rcu_read_unlock();
261}
262
263/**
264 * hfi1_make_ud_req - construct a UD request packet
265 * @qp: the QP
266 *
46a80d62
MM
267 * Assume s_lock is held.
268 *
77241056
MM
269 * Return 1 if constructed; otherwise, return 0.
270 */
bb5df5f9 271int hfi1_make_ud_req(struct rvt_qp *qp, struct hfi1_pkt_state *ps)
77241056 272{
4c6829c5 273 struct hfi1_qp_priv *priv = qp->priv;
77241056
MM
274 struct hfi1_other_headers *ohdr;
275 struct ib_ah_attr *ah_attr;
276 struct hfi1_pportdata *ppd;
277 struct hfi1_ibport *ibp;
895420dd 278 struct rvt_swqe *wqe;
77241056
MM
279 u32 nwords;
280 u32 extra_bytes;
281 u32 bth0;
282 u16 lrh0;
283 u16 lid;
77241056
MM
284 int next_cur;
285 u8 sc5;
286
bb5df5f9
DD
287 ps->s_txreq = get_txreq(ps->dev, qp);
288 if (IS_ERR(ps->s_txreq))
289 goto bail_no_tx;
290
83693bd1
DD
291 if (!(ib_rvt_state_ops[qp->state] & RVT_PROCESS_NEXT_SEND_OK)) {
292 if (!(ib_rvt_state_ops[qp->state] & RVT_FLUSH_SEND))
77241056
MM
293 goto bail;
294 /* We are in the error state, flush the work request. */
46a80d62
MM
295 smp_read_barrier_depends(); /* see post_one_send */
296 if (qp->s_last == ACCESS_ONCE(qp->s_head))
77241056
MM
297 goto bail;
298 /* If DMAs are in progress, we can't flush immediately. */
14553ca1 299 if (iowait_sdma_pending(&priv->s_iowait)) {
54d10c1e 300 qp->s_flags |= RVT_S_WAIT_DMA;
77241056
MM
301 goto bail;
302 }
83693bd1 303 wqe = rvt_get_swqe_ptr(qp, qp->s_last);
77241056 304 hfi1_send_complete(qp, wqe, IB_WC_WR_FLUSH_ERR);
bb5df5f9 305 goto done_free_tx;
77241056
MM
306 }
307
46a80d62
MM
308 /* see post_one_send() */
309 smp_read_barrier_depends();
310 if (qp->s_cur == ACCESS_ONCE(qp->s_head))
77241056
MM
311 goto bail;
312
83693bd1 313 wqe = rvt_get_swqe_ptr(qp, qp->s_cur);
77241056
MM
314 next_cur = qp->s_cur + 1;
315 if (next_cur >= qp->s_size)
316 next_cur = 0;
317
318 /* Construct the header. */
319 ibp = to_iport(qp->ibqp.device, qp->port_num);
320 ppd = ppd_from_ibp(ibp);
15723f06 321 ah_attr = &ibah_to_rvtah(wqe->ud_wr.ah)->attr;
8859b4a6
DD
322 if (ah_attr->dlid < be16_to_cpu(IB_MULTICAST_LID_BASE) ||
323 ah_attr->dlid == be16_to_cpu(IB_LID_PERMISSIVE)) {
77241056 324 lid = ah_attr->dlid & ~((1 << ppd->lmc) - 1);
17fb4f29
JJ
325 if (unlikely(!loopback &&
326 (lid == ppd->lid ||
327 (lid == be16_to_cpu(IB_LID_PERMISSIVE) &&
328 qp->ibqp.qp_type == IB_QPT_GSI)))) {
747f4d7a 329 unsigned long tflags = ps->flags;
77241056
MM
330 /*
331 * If DMAs are in progress, we can't generate
332 * a completion for the loopback packet since
333 * it would be out of order.
334 * Instead of waiting, we could queue a
335 * zero length descriptor so we get a callback.
336 */
14553ca1 337 if (iowait_sdma_pending(&priv->s_iowait)) {
54d10c1e 338 qp->s_flags |= RVT_S_WAIT_DMA;
77241056
MM
339 goto bail;
340 }
341 qp->s_cur = next_cur;
747f4d7a 342 spin_unlock_irqrestore(&qp->s_lock, tflags);
77241056 343 ud_loopback(qp, wqe);
747f4d7a
MM
344 spin_lock_irqsave(&qp->s_lock, tflags);
345 ps->flags = tflags;
77241056 346 hfi1_send_complete(qp, wqe, IB_WC_SUCCESS);
bb5df5f9 347 goto done_free_tx;
77241056
MM
348 }
349 }
350
351 qp->s_cur = next_cur;
352 extra_bytes = -wqe->length & 3;
353 nwords = (wqe->length + extra_bytes) >> 2;
354
355 /* header size in 32-bit words LRH+BTH+DETH = (8+12+8)/4. */
356 qp->s_hdrwords = 7;
357 qp->s_cur_size = wqe->length;
358 qp->s_cur_sge = &qp->s_sge;
359 qp->s_srate = ah_attr->static_rate;
360 qp->srate_mbps = ib_rate_to_mbps(qp->s_srate);
361 qp->s_wqe = wqe;
362 qp->s_sge.sge = wqe->sg_list[0];
363 qp->s_sge.sg_list = wqe->sg_list + 1;
364 qp->s_sge.num_sge = wqe->wr.num_sge;
365 qp->s_sge.total_len = wqe->length;
366
367 if (ah_attr->ah_flags & IB_AH_GRH) {
368 /* Header size in 32-bit words. */
bb5df5f9
DD
369 qp->s_hdrwords += hfi1_make_grh(ibp,
370 &ps->s_txreq->phdr.hdr.u.l.grh,
371 &ah_attr->grh,
372 qp->s_hdrwords, nwords);
77241056 373 lrh0 = HFI1_LRH_GRH;
bb5df5f9 374 ohdr = &ps->s_txreq->phdr.hdr.u.l.oth;
77241056
MM
375 /*
376 * Don't worry about sending to locally attached multicast
377 * QPs. It is unspecified by the spec. what happens.
378 */
379 } else {
380 /* Header size in 32-bit words. */
381 lrh0 = HFI1_LRH_BTH;
bb5df5f9 382 ohdr = &ps->s_txreq->phdr.hdr.u.oth;
77241056
MM
383 }
384 if (wqe->wr.opcode == IB_WR_SEND_WITH_IMM) {
385 qp->s_hdrwords++;
386 ohdr->u.ud.imm_data = wqe->wr.ex.imm_data;
387 bth0 = IB_OPCODE_UD_SEND_ONLY_WITH_IMMEDIATE << 24;
e490974e 388 } else {
77241056 389 bth0 = IB_OPCODE_UD_SEND_ONLY << 24;
e490974e 390 }
77241056
MM
391 sc5 = ibp->sl_to_sc[ah_attr->sl];
392 lrh0 |= (ah_attr->sl & 0xf) << 4;
393 if (qp->ibqp.qp_type == IB_QPT_SMI) {
394 lrh0 |= 0xF000; /* Set VL (see ch. 13.5.3.1) */
4c6829c5 395 priv->s_sc = 0xf;
77241056
MM
396 } else {
397 lrh0 |= (sc5 & 0xf) << 12;
4c6829c5 398 priv->s_sc = sc5;
77241056 399 }
4c6829c5 400 priv->s_sde = qp_to_sdma_engine(qp, priv->s_sc);
711e104d 401 ps->s_txreq->sde = priv->s_sde;
721d0427 402 priv->s_sendcontext = qp_to_send_context(qp, priv->s_sc);
711e104d 403 ps->s_txreq->psc = priv->s_sendcontext;
bb5df5f9
DD
404 ps->s_txreq->phdr.hdr.lrh[0] = cpu_to_be16(lrh0);
405 ps->s_txreq->phdr.hdr.lrh[1] = cpu_to_be16(ah_attr->dlid);
406 ps->s_txreq->phdr.hdr.lrh[2] =
77241056 407 cpu_to_be16(qp->s_hdrwords + nwords + SIZE_OF_CRC);
bb5df5f9
DD
408 if (ah_attr->dlid == be16_to_cpu(IB_LID_PERMISSIVE)) {
409 ps->s_txreq->phdr.hdr.lrh[3] = IB_LID_PERMISSIVE;
410 } else {
77241056
MM
411 lid = ppd->lid;
412 if (lid) {
413 lid |= ah_attr->src_path_bits & ((1 << ppd->lmc) - 1);
bb5df5f9
DD
414 ps->s_txreq->phdr.hdr.lrh[3] = cpu_to_be16(lid);
415 } else {
416 ps->s_txreq->phdr.hdr.lrh[3] = IB_LID_PERMISSIVE;
417 }
77241056
MM
418 }
419 if (wqe->wr.send_flags & IB_SEND_SOLICITED)
420 bth0 |= IB_BTH_SOLICITED;
421 bth0 |= extra_bytes << 20;
422 if (qp->ibqp.qp_type == IB_QPT_GSI || qp->ibqp.qp_type == IB_QPT_SMI)
e622f2f4 423 bth0 |= hfi1_get_pkey(ibp, wqe->ud_wr.pkey_index);
77241056
MM
424 else
425 bth0 |= hfi1_get_pkey(ibp, qp->s_pkey_index);
426 ohdr->bth[0] = cpu_to_be32(bth0);
e622f2f4 427 ohdr->bth[1] = cpu_to_be32(wqe->ud_wr.remote_qpn);
46a80d62 428 ohdr->bth[2] = cpu_to_be32(mask_psn(wqe->psn));
77241056
MM
429 /*
430 * Qkeys with the high order bit set mean use the
431 * qkey from the QP context instead of the WR (see 10.2.5).
432 */
e622f2f4
CH
433 ohdr->u.ud.deth[0] = cpu_to_be32((int)wqe->ud_wr.remote_qkey < 0 ?
434 qp->qkey : wqe->ud_wr.remote_qkey);
77241056
MM
435 ohdr->u.ud.deth[1] = cpu_to_be32(qp->ibqp.qp_num);
436 /* disarm any ahg */
a9b6b3bc
DC
437 priv->s_ahg->ahgcount = 0;
438 priv->s_ahg->ahgidx = 0;
439 priv->s_ahg->tx_flags = 0;
711e104d
MM
440 /* pbc */
441 ps->s_txreq->hdr_dwords = qp->s_hdrwords + 2;
77241056 442
46a80d62 443 return 1;
bb5df5f9
DD
444
445done_free_tx:
446 hfi1_put_txreq(ps->s_txreq);
447 ps->s_txreq = NULL;
448 return 1;
449
77241056 450bail:
bb5df5f9
DD
451 hfi1_put_txreq(ps->s_txreq);
452
453bail_no_tx:
454 ps->s_txreq = NULL;
54d10c1e 455 qp->s_flags &= ~RVT_S_BUSY;
bb5df5f9
DD
456 qp->s_hdrwords = 0;
457 return 0;
77241056
MM
458}
459
460/*
461 * Hardware can't check this so we do it here.
462 *
463 * This is a slightly different algorithm than the standard pkey check. It
464 * special cases the management keys and allows for 0x7fff and 0xffff to be in
465 * the table at the same time.
466 *
467 * @returns the index found or -1 if not found
468 */
469int hfi1_lookup_pkey_idx(struct hfi1_ibport *ibp, u16 pkey)
470{
471 struct hfi1_pportdata *ppd = ppd_from_ibp(ibp);
472 unsigned i;
473
474 if (pkey == FULL_MGMT_P_KEY || pkey == LIM_MGMT_P_KEY) {
475 unsigned lim_idx = -1;
476
477 for (i = 0; i < ARRAY_SIZE(ppd->pkeys); ++i) {
478 /* here we look for an exact match */
479 if (ppd->pkeys[i] == pkey)
480 return i;
481 if (ppd->pkeys[i] == LIM_MGMT_P_KEY)
482 lim_idx = i;
483 }
484
485 /* did not find 0xffff return 0x7fff idx if found */
486 if (pkey == FULL_MGMT_P_KEY)
487 return lim_idx;
488
489 /* no match... */
490 return -1;
491 }
492
493 pkey &= 0x7fff; /* remove limited/full membership bit */
494
495 for (i = 0; i < ARRAY_SIZE(ppd->pkeys); ++i)
496 if ((ppd->pkeys[i] & 0x7fff) == pkey)
497 return i;
498
499 /*
500 * Should not get here, this means hardware failed to validate pkeys.
501 */
502 return -1;
503}
504
895420dd 505void return_cnp(struct hfi1_ibport *ibp, struct rvt_qp *qp, u32 remote_qpn,
77241056
MM
506 u32 pkey, u32 slid, u32 dlid, u8 sc5,
507 const struct ib_grh *old_grh)
508{
509 u64 pbc, pbc_flags = 0;
510 u32 bth0, plen, vl, hwords = 5;
511 u16 lrh0;
512 u8 sl = ibp->sc_to_sl[sc5];
513 struct hfi1_ib_header hdr;
514 struct hfi1_other_headers *ohdr;
515 struct pio_buf *pbuf;
516 struct send_context *ctxt = qp_to_send_context(qp, sc5);
517 struct hfi1_pportdata *ppd = ppd_from_ibp(ibp);
518
519 if (old_grh) {
520 struct ib_grh *grh = &hdr.u.l.grh;
521
522 grh->version_tclass_flow = old_grh->version_tclass_flow;
523 grh->paylen = cpu_to_be16((hwords - 2 + SIZE_OF_CRC) << 2);
524 grh->hop_limit = 0xff;
525 grh->sgid = old_grh->dgid;
526 grh->dgid = old_grh->sgid;
527 ohdr = &hdr.u.l.oth;
528 lrh0 = HFI1_LRH_GRH;
529 hwords += sizeof(struct ib_grh) / sizeof(u32);
530 } else {
531 ohdr = &hdr.u.oth;
532 lrh0 = HFI1_LRH_BTH;
533 }
534
535 lrh0 |= (sc5 & 0xf) << 12 | sl << 4;
536
537 bth0 = pkey | (IB_OPCODE_CNP << 24);
538 ohdr->bth[0] = cpu_to_be32(bth0);
539
540 ohdr->bth[1] = cpu_to_be32(remote_qpn | (1 << HFI1_BECN_SHIFT));
541 ohdr->bth[2] = 0; /* PSN 0 */
542
543 hdr.lrh[0] = cpu_to_be16(lrh0);
544 hdr.lrh[1] = cpu_to_be16(dlid);
545 hdr.lrh[2] = cpu_to_be16(hwords + SIZE_OF_CRC);
546 hdr.lrh[3] = cpu_to_be16(slid);
547
548 plen = 2 /* PBC */ + hwords;
549 pbc_flags |= (!!(sc5 & 0x10)) << PBC_DC_INFO_SHIFT;
550 vl = sc_to_vlt(ppd->dd, sc5);
551 pbc = create_pbc(ppd, pbc_flags, qp->srate_mbps, vl, plen);
552 if (ctxt) {
553 pbuf = sc_buffer_alloc(ctxt, plen, NULL, NULL);
554 if (pbuf)
555 ppd->dd->pio_inline_send(ppd->dd, pbuf, pbc,
556 &hdr, hwords);
557 }
558}
559
560/*
561 * opa_smp_check() - Do the regular pkey checking, and the additional
562 * checks for SMPs specified in OPAv1 rev 0.90, section 9.10.26
563 * ("SMA Packet Checks").
564 *
565 * Note that:
566 * - Checks are done using the pkey directly from the packet's BTH,
567 * and specifically _not_ the pkey that we attach to the completion,
568 * which may be different.
569 * - These checks are specifically for "non-local" SMPs (i.e., SMPs
570 * which originated on another node). SMPs which are sent from, and
571 * destined to this node are checked in opa_local_smp_check().
572 *
573 * At the point where opa_smp_check() is called, we know:
574 * - destination QP is QP0
575 *
576 * opa_smp_check() returns 0 if all checks succeed, 1 otherwise.
577 */
578static int opa_smp_check(struct hfi1_ibport *ibp, u16 pkey, u8 sc5,
895420dd 579 struct rvt_qp *qp, u16 slid, struct opa_smp *smp)
77241056
MM
580{
581 struct hfi1_pportdata *ppd = ppd_from_ibp(ibp);
582
583 /*
584 * I don't think it's possible for us to get here with sc != 0xf,
585 * but check it to be certain.
586 */
587 if (sc5 != 0xf)
588 return 1;
589
590 if (rcv_pkey_check(ppd, pkey, sc5, slid))
591 return 1;
592
593 /*
594 * At this point we know (and so don't need to check again) that
595 * the pkey is either LIM_MGMT_P_KEY, or FULL_MGMT_P_KEY
596 * (see ingress_pkey_check).
597 */
598 if (smp->mgmt_class != IB_MGMT_CLASS_SUBN_DIRECTED_ROUTE &&
599 smp->mgmt_class != IB_MGMT_CLASS_SUBN_LID_ROUTED) {
600 ingress_pkey_table_fail(ppd, pkey, slid);
601 return 1;
602 }
603
604 /*
605 * SMPs fall into one of four (disjoint) categories:
606 * SMA request, SMA response, trap, or trap repress.
607 * Our response depends, in part, on which type of
608 * SMP we're processing.
609 *
610 * If this is not an SMA request, or trap repress:
611 * - accept MAD if the port is running an SM
612 * - pkey == FULL_MGMT_P_KEY =>
613 * reply with unsupported method (i.e., just mark
614 * the smp's status field here, and let it be
615 * processed normally)
616 * - pkey != LIM_MGMT_P_KEY =>
617 * increment port recv constraint errors, drop MAD
618 * If this is an SMA request or trap repress:
619 * - pkey != FULL_MGMT_P_KEY =>
620 * increment port recv constraint errors, drop MAD
621 */
622 switch (smp->method) {
623 case IB_MGMT_METHOD_GET:
624 case IB_MGMT_METHOD_SET:
625 case IB_MGMT_METHOD_REPORT:
626 case IB_MGMT_METHOD_TRAP_REPRESS:
627 if (pkey != FULL_MGMT_P_KEY) {
628 ingress_pkey_table_fail(ppd, pkey, slid);
629 return 1;
630 }
631 break;
632 case IB_MGMT_METHOD_SEND:
633 case IB_MGMT_METHOD_TRAP:
634 case IB_MGMT_METHOD_GET_RESP:
635 case IB_MGMT_METHOD_REPORT_RESP:
4eb06882 636 if (ibp->rvp.port_cap_flags & IB_PORT_SM)
77241056
MM
637 return 0;
638 if (pkey == FULL_MGMT_P_KEY) {
639 smp->status |= IB_SMP_UNSUP_METHOD;
640 return 0;
641 }
642 if (pkey != LIM_MGMT_P_KEY) {
643 ingress_pkey_table_fail(ppd, pkey, slid);
644 return 1;
645 }
646 break;
647 default:
648 break;
649 }
650 return 0;
651}
652
77241056
MM
653/**
654 * hfi1_ud_rcv - receive an incoming UD packet
655 * @ibp: the port the packet came in on
656 * @hdr: the packet header
657 * @rcv_flags: flags relevant to rcv processing
658 * @data: the packet data
659 * @tlen: the packet length
660 * @qp: the QP the packet came on
661 *
662 * This is called from qp_rcv() to process an incoming UD packet
663 * for the given QP.
664 * Called at interrupt level.
665 */
666void hfi1_ud_rcv(struct hfi1_packet *packet)
667{
668 struct hfi1_other_headers *ohdr = packet->ohdr;
669 int opcode;
670 u32 hdrsize = packet->hlen;
77241056
MM
671 struct ib_wc wc;
672 u32 qkey;
673 u32 src_qp;
674 u16 dlid, pkey;
675 int mgmt_pkey_idx = -1;
676 struct hfi1_ibport *ibp = &packet->rcd->ppd->ibport_data;
89c057ca 677 struct hfi1_pportdata *ppd = ppd_from_ibp(ibp);
77241056
MM
678 struct hfi1_ib_header *hdr = packet->hdr;
679 u32 rcv_flags = packet->rcv_flags;
680 void *data = packet->ebuf;
681 u32 tlen = packet->tlen;
895420dd 682 struct rvt_qp *qp = packet->qp;
77241056 683 bool has_grh = rcv_flags & HFI1_HAS_GRH;
896ce45d 684 u8 sc5 = hdr2sc((struct hfi1_message_header *)hdr, packet->rhf);
89c057ca
DC
685 u32 bth1;
686 u8 sl_from_sc, sl;
687 u16 slid;
688 u8 extra_bytes;
77241056
MM
689
690 qkey = be32_to_cpu(ohdr->u.ud.deth[0]);
ec4274f1 691 src_qp = be32_to_cpu(ohdr->u.ud.deth[1]) & RVT_QPN_MASK;
77241056 692 dlid = be16_to_cpu(hdr->lrh[1]);
89c057ca
DC
693 bth1 = be32_to_cpu(ohdr->bth[1]);
694 slid = be16_to_cpu(hdr->lrh[3]);
695 pkey = (u16)be32_to_cpu(ohdr->bth[0]);
696 sl = (be16_to_cpu(hdr->lrh[0]) >> 4) & 0xf;
697 extra_bytes = (be32_to_cpu(ohdr->bth[0]) >> 20) & 3;
698 extra_bytes += (SIZE_OF_CRC << 2);
699 sl_from_sc = ibp->sc_to_sl[sc5];
77241056 700
77241056
MM
701 opcode = be32_to_cpu(ohdr->bth[0]) >> 24;
702 opcode &= 0xff;
703
5fd2b562 704 process_ecn(qp, packet, (opcode != IB_OPCODE_CNP));
77241056
MM
705 /*
706 * Get the number of bytes the message was padded by
707 * and drop incomplete packets.
708 */
89c057ca 709 if (unlikely(tlen < (hdrsize + extra_bytes)))
77241056
MM
710 goto drop;
711
89c057ca 712 tlen -= hdrsize + extra_bytes;
77241056
MM
713
714 /*
715 * Check that the permissive LID is only used on QP0
716 * and the QKEY matches (see 9.6.1.4.1 and 9.6.1.5.1).
717 */
718 if (qp->ibqp.qp_num) {
719 if (unlikely(hdr->lrh[1] == IB_LID_PERMISSIVE ||
720 hdr->lrh[3] == IB_LID_PERMISSIVE))
721 goto drop;
722 if (qp->ibqp.qp_num > 1) {
77241056
MM
723 if (unlikely(rcv_pkey_check(ppd, pkey, sc5, slid))) {
724 /*
725 * Traps will not be sent for packets dropped
726 * by the HW. This is fine, as sending trap
727 * for invalid pkeys is optional according to
728 * IB spec (release 1.3, section 10.9.4)
729 */
5cd24119 730 hfi1_bad_pqkey(ibp, OPA_TRAP_BAD_P_KEY,
89c057ca 731 pkey, sl,
77241056 732 src_qp, qp->ibqp.qp_num,
89c057ca 733 slid, dlid);
77241056
MM
734 return;
735 }
736 } else {
737 /* GSI packet */
738 mgmt_pkey_idx = hfi1_lookup_pkey_idx(ibp, pkey);
739 if (mgmt_pkey_idx < 0)
740 goto drop;
77241056
MM
741 }
742 if (unlikely(qkey != qp->qkey)) {
89c057ca 743 hfi1_bad_pqkey(ibp, OPA_TRAP_BAD_Q_KEY, qkey, sl,
77241056 744 src_qp, qp->ibqp.qp_num,
89c057ca 745 slid, dlid);
77241056
MM
746 return;
747 }
748 /* Drop invalid MAD packets (see 13.5.3.1). */
749 if (unlikely(qp->ibqp.qp_num == 1 &&
89c057ca 750 (tlen > 2048 || (sc5 == 0xF))))
77241056
MM
751 goto drop;
752 } else {
753 /* Received on QP0, and so by definition, this is an SMP */
754 struct opa_smp *smp = (struct opa_smp *)data;
77241056
MM
755
756 if (opa_smp_check(ibp, pkey, sc5, qp, slid, smp))
757 goto drop;
758
759 if (tlen > 2048)
760 goto drop;
761 if ((hdr->lrh[1] == IB_LID_PERMISSIVE ||
762 hdr->lrh[3] == IB_LID_PERMISSIVE) &&
763 smp->mgmt_class != IB_MGMT_CLASS_SUBN_DIRECTED_ROUTE)
764 goto drop;
765
766 /* look up SMI pkey */
767 mgmt_pkey_idx = hfi1_lookup_pkey_idx(ibp, pkey);
768 if (mgmt_pkey_idx < 0)
769 goto drop;
77241056
MM
770 }
771
772 if (qp->ibqp.qp_num > 1 &&
773 opcode == IB_OPCODE_UD_SEND_ONLY_WITH_IMMEDIATE) {
774 wc.ex.imm_data = ohdr->u.ud.imm_data;
775 wc.wc_flags = IB_WC_WITH_IMM;
776 tlen -= sizeof(u32);
777 } else if (opcode == IB_OPCODE_UD_SEND_ONLY) {
778 wc.ex.imm_data = 0;
779 wc.wc_flags = 0;
e490974e 780 } else {
77241056 781 goto drop;
e490974e 782 }
77241056
MM
783
784 /*
785 * A GRH is expected to precede the data even if not
786 * present on the wire.
787 */
788 wc.byte_len = tlen + sizeof(struct ib_grh);
789
790 /*
791 * Get the next work request entry to find where to put the data.
792 */
e490974e 793 if (qp->r_flags & RVT_R_REUSE_SGE) {
54d10c1e 794 qp->r_flags &= ~RVT_R_REUSE_SGE;
e490974e 795 } else {
77241056
MM
796 int ret;
797
ec4274f1 798 ret = hfi1_rvt_get_rwqe(qp, 0);
77241056
MM
799 if (ret < 0) {
800 hfi1_rc_error(qp, IB_WC_LOC_QP_OP_ERR);
801 return;
802 }
803 if (!ret) {
804 if (qp->ibqp.qp_num == 0)
4eb06882 805 ibp->rvp.n_vl15_dropped++;
77241056
MM
806 return;
807 }
808 }
809 /* Silently drop packets which are too big. */
810 if (unlikely(wc.byte_len > qp->r_len)) {
54d10c1e 811 qp->r_flags |= RVT_R_REUSE_SGE;
77241056
MM
812 goto drop;
813 }
814 if (has_grh) {
815 hfi1_copy_sge(&qp->r_sge, &hdr->u.l.grh,
7b0b01aa 816 sizeof(struct ib_grh), 1, 0);
77241056 817 wc.wc_flags |= IB_WC_GRH;
e490974e 818 } else {
77241056 819 hfi1_skip_sge(&qp->r_sge, sizeof(struct ib_grh), 1);
e490974e 820 }
7b0b01aa
DL
821 hfi1_copy_sge(&qp->r_sge, data, wc.byte_len - sizeof(struct ib_grh),
822 1, 0);
ec4274f1 823 rvt_put_ss(&qp->r_sge);
54d10c1e 824 if (!test_and_clear_bit(RVT_R_WRID_VALID, &qp->r_aflags))
77241056
MM
825 return;
826 wc.wr_id = qp->r_wr_id;
827 wc.status = IB_WC_SUCCESS;
828 wc.opcode = IB_WC_RECV;
829 wc.vendor_err = 0;
830 wc.qp = &qp->ibqp;
831 wc.src_qp = src_qp;
832
833 if (qp->ibqp.qp_type == IB_QPT_GSI ||
834 qp->ibqp.qp_type == IB_QPT_SMI) {
835 if (mgmt_pkey_idx < 0) {
836 if (net_ratelimit()) {
77241056
MM
837 struct hfi1_devdata *dd = ppd->dd;
838
839 dd_dev_err(dd, "QP type %d mgmt_pkey_idx < 0 and packet not dropped???\n",
840 qp->ibqp.qp_type);
841 mgmt_pkey_idx = 0;
842 }
843 }
844 wc.pkey_index = (unsigned)mgmt_pkey_idx;
e490974e 845 } else {
77241056 846 wc.pkey_index = 0;
e490974e 847 }
77241056 848
89c057ca
DC
849 wc.slid = slid;
850 wc.sl = sl_from_sc;
77241056
MM
851
852 /*
853 * Save the LMC lower bits if the destination LID is a unicast LID.
854 */
8859b4a6 855 wc.dlid_path_bits = dlid >= be16_to_cpu(IB_MULTICAST_LID_BASE) ? 0 :
77241056
MM
856 dlid & ((1 << ppd_from_ibp(ibp)->lmc) - 1);
857 wc.port_num = qp->port_num;
858 /* Signal completion event if the solicited bit is set. */
abd712da
DD
859 rvt_cq_enter(ibcq_to_rvtcq(qp->ibqp.recv_cq), &wc,
860 (ohdr->bth[0] &
861 cpu_to_be32(IB_BTH_SOLICITED)) != 0);
77241056
MM
862 return;
863
864drop:
4eb06882 865 ibp->rvp.n_pkt_drops++;
77241056 866}