]>
Commit | Line | Data |
---|---|---|
77241056 | 1 | /* |
05d6ac1d | 2 | * Copyright(c) 2015, 2016 Intel Corporation. |
77241056 MM |
3 | * |
4 | * This file is provided under a dual BSD/GPLv2 license. When using or | |
5 | * redistributing this file, you may do so under either license. | |
6 | * | |
7 | * GPL LICENSE SUMMARY | |
8 | * | |
77241056 MM |
9 | * This program is free software; you can redistribute it and/or modify |
10 | * it under the terms of version 2 of the GNU General Public License as | |
11 | * published by the Free Software Foundation. | |
12 | * | |
13 | * This program is distributed in the hope that it will be useful, but | |
14 | * WITHOUT ANY WARRANTY; without even the implied warranty of | |
15 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
16 | * General Public License for more details. | |
17 | * | |
18 | * BSD LICENSE | |
19 | * | |
77241056 MM |
20 | * Redistribution and use in source and binary forms, with or without |
21 | * modification, are permitted provided that the following conditions | |
22 | * are met: | |
23 | * | |
24 | * - Redistributions of source code must retain the above copyright | |
25 | * notice, this list of conditions and the following disclaimer. | |
26 | * - Redistributions in binary form must reproduce the above copyright | |
27 | * notice, this list of conditions and the following disclaimer in | |
28 | * the documentation and/or other materials provided with the | |
29 | * distribution. | |
30 | * - Neither the name of Intel Corporation nor the names of its | |
31 | * contributors may be used to endorse or promote products derived | |
32 | * from this software without specific prior written permission. | |
33 | * | |
34 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS | |
35 | * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT | |
36 | * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR | |
37 | * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT | |
38 | * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, | |
39 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT | |
40 | * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, | |
41 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY | |
42 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT | |
43 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE | |
44 | * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | |
45 | * | |
46 | */ | |
47 | ||
48 | #include <linux/net.h> | |
49 | #include <rdma/ib_smi.h> | |
50 | ||
51 | #include "hfi.h" | |
52 | #include "mad.h" | |
bb5df5f9 | 53 | #include "verbs_txreq.h" |
711e104d | 54 | #include "qp.h" |
77241056 MM |
55 | |
56 | /** | |
57 | * ud_loopback - handle send on loopback QPs | |
58 | * @sqp: the sending QP | |
59 | * @swqe: the send work request | |
60 | * | |
61 | * This is called from hfi1_make_ud_req() to forward a WQE addressed | |
62 | * to the same HFI. | |
63 | * Note that the receive interrupt handler may be calling hfi1_ud_rcv() | |
64 | * while this is being called. | |
65 | */ | |
895420dd | 66 | static void ud_loopback(struct rvt_qp *sqp, struct rvt_swqe *swqe) |
77241056 MM |
67 | { |
68 | struct hfi1_ibport *ibp = to_iport(sqp->ibqp.device, sqp->port_num); | |
69 | struct hfi1_pportdata *ppd; | |
895420dd | 70 | struct rvt_qp *qp; |
77241056 MM |
71 | struct ib_ah_attr *ah_attr; |
72 | unsigned long flags; | |
895420dd DD |
73 | struct rvt_sge_state ssge; |
74 | struct rvt_sge *sge; | |
77241056 MM |
75 | struct ib_wc wc; |
76 | u32 length; | |
77 | enum ib_qp_type sqptype, dqptype; | |
78 | ||
79 | rcu_read_lock(); | |
80 | ||
ec4274f1 DD |
81 | qp = rvt_lookup_qpn(ib_to_rvt(sqp->ibqp.device), &ibp->rvp, |
82 | swqe->ud_wr.remote_qpn); | |
77241056 | 83 | if (!qp) { |
4eb06882 | 84 | ibp->rvp.n_pkt_drops++; |
77241056 MM |
85 | rcu_read_unlock(); |
86 | return; | |
87 | } | |
88 | ||
89 | sqptype = sqp->ibqp.qp_type == IB_QPT_GSI ? | |
90 | IB_QPT_UD : sqp->ibqp.qp_type; | |
91 | dqptype = qp->ibqp.qp_type == IB_QPT_GSI ? | |
92 | IB_QPT_UD : qp->ibqp.qp_type; | |
93 | ||
94 | if (dqptype != sqptype || | |
83693bd1 | 95 | !(ib_rvt_state_ops[qp->state] & RVT_PROCESS_RECV_OK)) { |
4eb06882 | 96 | ibp->rvp.n_pkt_drops++; |
77241056 MM |
97 | goto drop; |
98 | } | |
99 | ||
15723f06 | 100 | ah_attr = &ibah_to_rvtah(swqe->ud_wr.ah)->attr; |
77241056 MM |
101 | ppd = ppd_from_ibp(ibp); |
102 | ||
103 | if (qp->ibqp.qp_num > 1) { | |
104 | u16 pkey; | |
105 | u16 slid; | |
106 | u8 sc5 = ibp->sl_to_sc[ah_attr->sl]; | |
107 | ||
108 | pkey = hfi1_get_pkey(ibp, sqp->s_pkey_index); | |
109 | slid = ppd->lid | (ah_attr->src_path_bits & | |
110 | ((1 << ppd->lmc) - 1)); | |
111 | if (unlikely(ingress_pkey_check(ppd, pkey, sc5, | |
112 | qp->s_pkey_index, slid))) { | |
5cd24119 | 113 | hfi1_bad_pqkey(ibp, OPA_TRAP_BAD_P_KEY, pkey, |
77241056 MM |
114 | ah_attr->sl, |
115 | sqp->ibqp.qp_num, qp->ibqp.qp_num, | |
5cd24119 | 116 | slid, ah_attr->dlid); |
77241056 MM |
117 | goto drop; |
118 | } | |
119 | } | |
120 | ||
121 | /* | |
122 | * Check that the qkey matches (except for QP0, see 9.6.1.4.1). | |
123 | * Qkeys with the high order bit set mean use the | |
124 | * qkey from the QP context instead of the WR (see 10.2.5). | |
125 | */ | |
126 | if (qp->ibqp.qp_num) { | |
127 | u32 qkey; | |
128 | ||
e622f2f4 CH |
129 | qkey = (int)swqe->ud_wr.remote_qkey < 0 ? |
130 | sqp->qkey : swqe->ud_wr.remote_qkey; | |
77241056 MM |
131 | if (unlikely(qkey != qp->qkey)) { |
132 | u16 lid; | |
133 | ||
134 | lid = ppd->lid | (ah_attr->src_path_bits & | |
135 | ((1 << ppd->lmc) - 1)); | |
5cd24119 | 136 | hfi1_bad_pqkey(ibp, OPA_TRAP_BAD_Q_KEY, qkey, |
77241056 MM |
137 | ah_attr->sl, |
138 | sqp->ibqp.qp_num, qp->ibqp.qp_num, | |
5cd24119 EK |
139 | lid, |
140 | ah_attr->dlid); | |
77241056 MM |
141 | goto drop; |
142 | } | |
143 | } | |
144 | ||
145 | /* | |
146 | * A GRH is expected to precede the data even if not | |
147 | * present on the wire. | |
148 | */ | |
149 | length = swqe->length; | |
150 | memset(&wc, 0, sizeof(wc)); | |
151 | wc.byte_len = length + sizeof(struct ib_grh); | |
152 | ||
153 | if (swqe->wr.opcode == IB_WR_SEND_WITH_IMM) { | |
154 | wc.wc_flags = IB_WC_WITH_IMM; | |
155 | wc.ex.imm_data = swqe->wr.ex.imm_data; | |
156 | } | |
157 | ||
158 | spin_lock_irqsave(&qp->r_lock, flags); | |
159 | ||
160 | /* | |
161 | * Get the next work request entry to find where to put the data. | |
162 | */ | |
e490974e | 163 | if (qp->r_flags & RVT_R_REUSE_SGE) { |
54d10c1e | 164 | qp->r_flags &= ~RVT_R_REUSE_SGE; |
e490974e | 165 | } else { |
77241056 MM |
166 | int ret; |
167 | ||
ec4274f1 | 168 | ret = hfi1_rvt_get_rwqe(qp, 0); |
77241056 MM |
169 | if (ret < 0) { |
170 | hfi1_rc_error(qp, IB_WC_LOC_QP_OP_ERR); | |
171 | goto bail_unlock; | |
172 | } | |
173 | if (!ret) { | |
174 | if (qp->ibqp.qp_num == 0) | |
4eb06882 | 175 | ibp->rvp.n_vl15_dropped++; |
77241056 MM |
176 | goto bail_unlock; |
177 | } | |
178 | } | |
179 | /* Silently drop packets which are too big. */ | |
180 | if (unlikely(wc.byte_len > qp->r_len)) { | |
54d10c1e | 181 | qp->r_flags |= RVT_R_REUSE_SGE; |
4eb06882 | 182 | ibp->rvp.n_pkt_drops++; |
77241056 MM |
183 | goto bail_unlock; |
184 | } | |
185 | ||
186 | if (ah_attr->ah_flags & IB_AH_GRH) { | |
527dbf12 DC |
187 | struct ib_grh grh; |
188 | struct ib_global_route grd = ah_attr->grh; | |
189 | ||
190 | hfi1_make_grh(ibp, &grh, &grd, 0, 0); | |
191 | hfi1_copy_sge(&qp->r_sge, &grh, | |
192 | sizeof(grh), 1, 0); | |
77241056 | 193 | wc.wc_flags |= IB_WC_GRH; |
e490974e | 194 | } else { |
77241056 | 195 | hfi1_skip_sge(&qp->r_sge, sizeof(struct ib_grh), 1); |
e490974e | 196 | } |
77241056 MM |
197 | ssge.sg_list = swqe->sg_list + 1; |
198 | ssge.sge = *swqe->sg_list; | |
199 | ssge.num_sge = swqe->wr.num_sge; | |
200 | sge = &ssge.sge; | |
201 | while (length) { | |
202 | u32 len = sge->length; | |
203 | ||
204 | if (len > length) | |
205 | len = length; | |
206 | if (len > sge->sge_length) | |
207 | len = sge->sge_length; | |
208 | WARN_ON_ONCE(len == 0); | |
7b0b01aa | 209 | hfi1_copy_sge(&qp->r_sge, sge->vaddr, len, 1, 0); |
77241056 MM |
210 | sge->vaddr += len; |
211 | sge->length -= len; | |
212 | sge->sge_length -= len; | |
213 | if (sge->sge_length == 0) { | |
214 | if (--ssge.num_sge) | |
215 | *sge = *ssge.sg_list++; | |
216 | } else if (sge->length == 0 && sge->mr->lkey) { | |
cd4ceee3 | 217 | if (++sge->n >= RVT_SEGSZ) { |
77241056 MM |
218 | if (++sge->m >= sge->mr->mapsz) |
219 | break; | |
220 | sge->n = 0; | |
221 | } | |
222 | sge->vaddr = | |
223 | sge->mr->map[sge->m]->segs[sge->n].vaddr; | |
224 | sge->length = | |
225 | sge->mr->map[sge->m]->segs[sge->n].length; | |
226 | } | |
227 | length -= len; | |
228 | } | |
ec4274f1 | 229 | rvt_put_ss(&qp->r_sge); |
54d10c1e | 230 | if (!test_and_clear_bit(RVT_R_WRID_VALID, &qp->r_aflags)) |
77241056 MM |
231 | goto bail_unlock; |
232 | wc.wr_id = qp->r_wr_id; | |
233 | wc.status = IB_WC_SUCCESS; | |
234 | wc.opcode = IB_WC_RECV; | |
235 | wc.qp = &qp->ibqp; | |
236 | wc.src_qp = sqp->ibqp.qp_num; | |
237 | if (qp->ibqp.qp_type == IB_QPT_GSI || qp->ibqp.qp_type == IB_QPT_SMI) { | |
238 | if (sqp->ibqp.qp_type == IB_QPT_GSI || | |
239 | sqp->ibqp.qp_type == IB_QPT_SMI) | |
e622f2f4 | 240 | wc.pkey_index = swqe->ud_wr.pkey_index; |
77241056 MM |
241 | else |
242 | wc.pkey_index = sqp->s_pkey_index; | |
243 | } else { | |
244 | wc.pkey_index = 0; | |
245 | } | |
246 | wc.slid = ppd->lid | (ah_attr->src_path_bits & ((1 << ppd->lmc) - 1)); | |
247 | /* Check for loopback when the port lid is not set */ | |
248 | if (wc.slid == 0 && sqp->ibqp.qp_type == IB_QPT_GSI) | |
8859b4a6 | 249 | wc.slid = be16_to_cpu(IB_LID_PERMISSIVE); |
77241056 MM |
250 | wc.sl = ah_attr->sl; |
251 | wc.dlid_path_bits = ah_attr->dlid & ((1 << ppd->lmc) - 1); | |
252 | wc.port_num = qp->port_num; | |
253 | /* Signal completion event if the solicited bit is set. */ | |
abd712da DD |
254 | rvt_cq_enter(ibcq_to_rvtcq(qp->ibqp.recv_cq), &wc, |
255 | swqe->wr.send_flags & IB_SEND_SOLICITED); | |
4eb06882 | 256 | ibp->rvp.n_loop_pkts++; |
77241056 MM |
257 | bail_unlock: |
258 | spin_unlock_irqrestore(&qp->r_lock, flags); | |
259 | drop: | |
260 | rcu_read_unlock(); | |
261 | } | |
262 | ||
263 | /** | |
264 | * hfi1_make_ud_req - construct a UD request packet | |
265 | * @qp: the QP | |
266 | * | |
46a80d62 MM |
267 | * Assume s_lock is held. |
268 | * | |
77241056 MM |
269 | * Return 1 if constructed; otherwise, return 0. |
270 | */ | |
bb5df5f9 | 271 | int hfi1_make_ud_req(struct rvt_qp *qp, struct hfi1_pkt_state *ps) |
77241056 | 272 | { |
4c6829c5 | 273 | struct hfi1_qp_priv *priv = qp->priv; |
77241056 MM |
274 | struct hfi1_other_headers *ohdr; |
275 | struct ib_ah_attr *ah_attr; | |
276 | struct hfi1_pportdata *ppd; | |
277 | struct hfi1_ibport *ibp; | |
895420dd | 278 | struct rvt_swqe *wqe; |
77241056 MM |
279 | u32 nwords; |
280 | u32 extra_bytes; | |
281 | u32 bth0; | |
282 | u16 lrh0; | |
283 | u16 lid; | |
77241056 MM |
284 | int next_cur; |
285 | u8 sc5; | |
286 | ||
bb5df5f9 DD |
287 | ps->s_txreq = get_txreq(ps->dev, qp); |
288 | if (IS_ERR(ps->s_txreq)) | |
289 | goto bail_no_tx; | |
290 | ||
83693bd1 DD |
291 | if (!(ib_rvt_state_ops[qp->state] & RVT_PROCESS_NEXT_SEND_OK)) { |
292 | if (!(ib_rvt_state_ops[qp->state] & RVT_FLUSH_SEND)) | |
77241056 MM |
293 | goto bail; |
294 | /* We are in the error state, flush the work request. */ | |
46a80d62 MM |
295 | smp_read_barrier_depends(); /* see post_one_send */ |
296 | if (qp->s_last == ACCESS_ONCE(qp->s_head)) | |
77241056 MM |
297 | goto bail; |
298 | /* If DMAs are in progress, we can't flush immediately. */ | |
14553ca1 | 299 | if (iowait_sdma_pending(&priv->s_iowait)) { |
54d10c1e | 300 | qp->s_flags |= RVT_S_WAIT_DMA; |
77241056 MM |
301 | goto bail; |
302 | } | |
83693bd1 | 303 | wqe = rvt_get_swqe_ptr(qp, qp->s_last); |
77241056 | 304 | hfi1_send_complete(qp, wqe, IB_WC_WR_FLUSH_ERR); |
bb5df5f9 | 305 | goto done_free_tx; |
77241056 MM |
306 | } |
307 | ||
46a80d62 MM |
308 | /* see post_one_send() */ |
309 | smp_read_barrier_depends(); | |
310 | if (qp->s_cur == ACCESS_ONCE(qp->s_head)) | |
77241056 MM |
311 | goto bail; |
312 | ||
83693bd1 | 313 | wqe = rvt_get_swqe_ptr(qp, qp->s_cur); |
77241056 MM |
314 | next_cur = qp->s_cur + 1; |
315 | if (next_cur >= qp->s_size) | |
316 | next_cur = 0; | |
317 | ||
318 | /* Construct the header. */ | |
319 | ibp = to_iport(qp->ibqp.device, qp->port_num); | |
320 | ppd = ppd_from_ibp(ibp); | |
15723f06 | 321 | ah_attr = &ibah_to_rvtah(wqe->ud_wr.ah)->attr; |
8859b4a6 DD |
322 | if (ah_attr->dlid < be16_to_cpu(IB_MULTICAST_LID_BASE) || |
323 | ah_attr->dlid == be16_to_cpu(IB_LID_PERMISSIVE)) { | |
77241056 | 324 | lid = ah_attr->dlid & ~((1 << ppd->lmc) - 1); |
17fb4f29 JJ |
325 | if (unlikely(!loopback && |
326 | (lid == ppd->lid || | |
327 | (lid == be16_to_cpu(IB_LID_PERMISSIVE) && | |
328 | qp->ibqp.qp_type == IB_QPT_GSI)))) { | |
747f4d7a | 329 | unsigned long tflags = ps->flags; |
77241056 MM |
330 | /* |
331 | * If DMAs are in progress, we can't generate | |
332 | * a completion for the loopback packet since | |
333 | * it would be out of order. | |
334 | * Instead of waiting, we could queue a | |
335 | * zero length descriptor so we get a callback. | |
336 | */ | |
14553ca1 | 337 | if (iowait_sdma_pending(&priv->s_iowait)) { |
54d10c1e | 338 | qp->s_flags |= RVT_S_WAIT_DMA; |
77241056 MM |
339 | goto bail; |
340 | } | |
341 | qp->s_cur = next_cur; | |
747f4d7a | 342 | spin_unlock_irqrestore(&qp->s_lock, tflags); |
77241056 | 343 | ud_loopback(qp, wqe); |
747f4d7a MM |
344 | spin_lock_irqsave(&qp->s_lock, tflags); |
345 | ps->flags = tflags; | |
77241056 | 346 | hfi1_send_complete(qp, wqe, IB_WC_SUCCESS); |
bb5df5f9 | 347 | goto done_free_tx; |
77241056 MM |
348 | } |
349 | } | |
350 | ||
351 | qp->s_cur = next_cur; | |
352 | extra_bytes = -wqe->length & 3; | |
353 | nwords = (wqe->length + extra_bytes) >> 2; | |
354 | ||
355 | /* header size in 32-bit words LRH+BTH+DETH = (8+12+8)/4. */ | |
356 | qp->s_hdrwords = 7; | |
357 | qp->s_cur_size = wqe->length; | |
358 | qp->s_cur_sge = &qp->s_sge; | |
359 | qp->s_srate = ah_attr->static_rate; | |
360 | qp->srate_mbps = ib_rate_to_mbps(qp->s_srate); | |
361 | qp->s_wqe = wqe; | |
362 | qp->s_sge.sge = wqe->sg_list[0]; | |
363 | qp->s_sge.sg_list = wqe->sg_list + 1; | |
364 | qp->s_sge.num_sge = wqe->wr.num_sge; | |
365 | qp->s_sge.total_len = wqe->length; | |
366 | ||
367 | if (ah_attr->ah_flags & IB_AH_GRH) { | |
368 | /* Header size in 32-bit words. */ | |
bb5df5f9 DD |
369 | qp->s_hdrwords += hfi1_make_grh(ibp, |
370 | &ps->s_txreq->phdr.hdr.u.l.grh, | |
371 | &ah_attr->grh, | |
372 | qp->s_hdrwords, nwords); | |
77241056 | 373 | lrh0 = HFI1_LRH_GRH; |
bb5df5f9 | 374 | ohdr = &ps->s_txreq->phdr.hdr.u.l.oth; |
77241056 MM |
375 | /* |
376 | * Don't worry about sending to locally attached multicast | |
377 | * QPs. It is unspecified by the spec. what happens. | |
378 | */ | |
379 | } else { | |
380 | /* Header size in 32-bit words. */ | |
381 | lrh0 = HFI1_LRH_BTH; | |
bb5df5f9 | 382 | ohdr = &ps->s_txreq->phdr.hdr.u.oth; |
77241056 MM |
383 | } |
384 | if (wqe->wr.opcode == IB_WR_SEND_WITH_IMM) { | |
385 | qp->s_hdrwords++; | |
386 | ohdr->u.ud.imm_data = wqe->wr.ex.imm_data; | |
387 | bth0 = IB_OPCODE_UD_SEND_ONLY_WITH_IMMEDIATE << 24; | |
e490974e | 388 | } else { |
77241056 | 389 | bth0 = IB_OPCODE_UD_SEND_ONLY << 24; |
e490974e | 390 | } |
77241056 MM |
391 | sc5 = ibp->sl_to_sc[ah_attr->sl]; |
392 | lrh0 |= (ah_attr->sl & 0xf) << 4; | |
393 | if (qp->ibqp.qp_type == IB_QPT_SMI) { | |
394 | lrh0 |= 0xF000; /* Set VL (see ch. 13.5.3.1) */ | |
4c6829c5 | 395 | priv->s_sc = 0xf; |
77241056 MM |
396 | } else { |
397 | lrh0 |= (sc5 & 0xf) << 12; | |
4c6829c5 | 398 | priv->s_sc = sc5; |
77241056 | 399 | } |
4c6829c5 | 400 | priv->s_sde = qp_to_sdma_engine(qp, priv->s_sc); |
711e104d | 401 | ps->s_txreq->sde = priv->s_sde; |
721d0427 | 402 | priv->s_sendcontext = qp_to_send_context(qp, priv->s_sc); |
711e104d | 403 | ps->s_txreq->psc = priv->s_sendcontext; |
bb5df5f9 DD |
404 | ps->s_txreq->phdr.hdr.lrh[0] = cpu_to_be16(lrh0); |
405 | ps->s_txreq->phdr.hdr.lrh[1] = cpu_to_be16(ah_attr->dlid); | |
406 | ps->s_txreq->phdr.hdr.lrh[2] = | |
77241056 | 407 | cpu_to_be16(qp->s_hdrwords + nwords + SIZE_OF_CRC); |
bb5df5f9 DD |
408 | if (ah_attr->dlid == be16_to_cpu(IB_LID_PERMISSIVE)) { |
409 | ps->s_txreq->phdr.hdr.lrh[3] = IB_LID_PERMISSIVE; | |
410 | } else { | |
77241056 MM |
411 | lid = ppd->lid; |
412 | if (lid) { | |
413 | lid |= ah_attr->src_path_bits & ((1 << ppd->lmc) - 1); | |
bb5df5f9 DD |
414 | ps->s_txreq->phdr.hdr.lrh[3] = cpu_to_be16(lid); |
415 | } else { | |
416 | ps->s_txreq->phdr.hdr.lrh[3] = IB_LID_PERMISSIVE; | |
417 | } | |
77241056 MM |
418 | } |
419 | if (wqe->wr.send_flags & IB_SEND_SOLICITED) | |
420 | bth0 |= IB_BTH_SOLICITED; | |
421 | bth0 |= extra_bytes << 20; | |
422 | if (qp->ibqp.qp_type == IB_QPT_GSI || qp->ibqp.qp_type == IB_QPT_SMI) | |
e622f2f4 | 423 | bth0 |= hfi1_get_pkey(ibp, wqe->ud_wr.pkey_index); |
77241056 MM |
424 | else |
425 | bth0 |= hfi1_get_pkey(ibp, qp->s_pkey_index); | |
426 | ohdr->bth[0] = cpu_to_be32(bth0); | |
e622f2f4 | 427 | ohdr->bth[1] = cpu_to_be32(wqe->ud_wr.remote_qpn); |
46a80d62 | 428 | ohdr->bth[2] = cpu_to_be32(mask_psn(wqe->psn)); |
77241056 MM |
429 | /* |
430 | * Qkeys with the high order bit set mean use the | |
431 | * qkey from the QP context instead of the WR (see 10.2.5). | |
432 | */ | |
e622f2f4 CH |
433 | ohdr->u.ud.deth[0] = cpu_to_be32((int)wqe->ud_wr.remote_qkey < 0 ? |
434 | qp->qkey : wqe->ud_wr.remote_qkey); | |
77241056 MM |
435 | ohdr->u.ud.deth[1] = cpu_to_be32(qp->ibqp.qp_num); |
436 | /* disarm any ahg */ | |
a9b6b3bc DC |
437 | priv->s_ahg->ahgcount = 0; |
438 | priv->s_ahg->ahgidx = 0; | |
439 | priv->s_ahg->tx_flags = 0; | |
711e104d MM |
440 | /* pbc */ |
441 | ps->s_txreq->hdr_dwords = qp->s_hdrwords + 2; | |
77241056 | 442 | |
46a80d62 | 443 | return 1; |
bb5df5f9 DD |
444 | |
445 | done_free_tx: | |
446 | hfi1_put_txreq(ps->s_txreq); | |
447 | ps->s_txreq = NULL; | |
448 | return 1; | |
449 | ||
77241056 | 450 | bail: |
bb5df5f9 DD |
451 | hfi1_put_txreq(ps->s_txreq); |
452 | ||
453 | bail_no_tx: | |
454 | ps->s_txreq = NULL; | |
54d10c1e | 455 | qp->s_flags &= ~RVT_S_BUSY; |
bb5df5f9 DD |
456 | qp->s_hdrwords = 0; |
457 | return 0; | |
77241056 MM |
458 | } |
459 | ||
460 | /* | |
461 | * Hardware can't check this so we do it here. | |
462 | * | |
463 | * This is a slightly different algorithm than the standard pkey check. It | |
464 | * special cases the management keys and allows for 0x7fff and 0xffff to be in | |
465 | * the table at the same time. | |
466 | * | |
467 | * @returns the index found or -1 if not found | |
468 | */ | |
469 | int hfi1_lookup_pkey_idx(struct hfi1_ibport *ibp, u16 pkey) | |
470 | { | |
471 | struct hfi1_pportdata *ppd = ppd_from_ibp(ibp); | |
472 | unsigned i; | |
473 | ||
474 | if (pkey == FULL_MGMT_P_KEY || pkey == LIM_MGMT_P_KEY) { | |
475 | unsigned lim_idx = -1; | |
476 | ||
477 | for (i = 0; i < ARRAY_SIZE(ppd->pkeys); ++i) { | |
478 | /* here we look for an exact match */ | |
479 | if (ppd->pkeys[i] == pkey) | |
480 | return i; | |
481 | if (ppd->pkeys[i] == LIM_MGMT_P_KEY) | |
482 | lim_idx = i; | |
483 | } | |
484 | ||
485 | /* did not find 0xffff return 0x7fff idx if found */ | |
486 | if (pkey == FULL_MGMT_P_KEY) | |
487 | return lim_idx; | |
488 | ||
489 | /* no match... */ | |
490 | return -1; | |
491 | } | |
492 | ||
493 | pkey &= 0x7fff; /* remove limited/full membership bit */ | |
494 | ||
495 | for (i = 0; i < ARRAY_SIZE(ppd->pkeys); ++i) | |
496 | if ((ppd->pkeys[i] & 0x7fff) == pkey) | |
497 | return i; | |
498 | ||
499 | /* | |
500 | * Should not get here, this means hardware failed to validate pkeys. | |
501 | */ | |
502 | return -1; | |
503 | } | |
504 | ||
895420dd | 505 | void return_cnp(struct hfi1_ibport *ibp, struct rvt_qp *qp, u32 remote_qpn, |
77241056 MM |
506 | u32 pkey, u32 slid, u32 dlid, u8 sc5, |
507 | const struct ib_grh *old_grh) | |
508 | { | |
509 | u64 pbc, pbc_flags = 0; | |
510 | u32 bth0, plen, vl, hwords = 5; | |
511 | u16 lrh0; | |
512 | u8 sl = ibp->sc_to_sl[sc5]; | |
513 | struct hfi1_ib_header hdr; | |
514 | struct hfi1_other_headers *ohdr; | |
515 | struct pio_buf *pbuf; | |
516 | struct send_context *ctxt = qp_to_send_context(qp, sc5); | |
517 | struct hfi1_pportdata *ppd = ppd_from_ibp(ibp); | |
518 | ||
519 | if (old_grh) { | |
520 | struct ib_grh *grh = &hdr.u.l.grh; | |
521 | ||
522 | grh->version_tclass_flow = old_grh->version_tclass_flow; | |
523 | grh->paylen = cpu_to_be16((hwords - 2 + SIZE_OF_CRC) << 2); | |
524 | grh->hop_limit = 0xff; | |
525 | grh->sgid = old_grh->dgid; | |
526 | grh->dgid = old_grh->sgid; | |
527 | ohdr = &hdr.u.l.oth; | |
528 | lrh0 = HFI1_LRH_GRH; | |
529 | hwords += sizeof(struct ib_grh) / sizeof(u32); | |
530 | } else { | |
531 | ohdr = &hdr.u.oth; | |
532 | lrh0 = HFI1_LRH_BTH; | |
533 | } | |
534 | ||
535 | lrh0 |= (sc5 & 0xf) << 12 | sl << 4; | |
536 | ||
537 | bth0 = pkey | (IB_OPCODE_CNP << 24); | |
538 | ohdr->bth[0] = cpu_to_be32(bth0); | |
539 | ||
540 | ohdr->bth[1] = cpu_to_be32(remote_qpn | (1 << HFI1_BECN_SHIFT)); | |
541 | ohdr->bth[2] = 0; /* PSN 0 */ | |
542 | ||
543 | hdr.lrh[0] = cpu_to_be16(lrh0); | |
544 | hdr.lrh[1] = cpu_to_be16(dlid); | |
545 | hdr.lrh[2] = cpu_to_be16(hwords + SIZE_OF_CRC); | |
546 | hdr.lrh[3] = cpu_to_be16(slid); | |
547 | ||
548 | plen = 2 /* PBC */ + hwords; | |
549 | pbc_flags |= (!!(sc5 & 0x10)) << PBC_DC_INFO_SHIFT; | |
550 | vl = sc_to_vlt(ppd->dd, sc5); | |
551 | pbc = create_pbc(ppd, pbc_flags, qp->srate_mbps, vl, plen); | |
552 | if (ctxt) { | |
553 | pbuf = sc_buffer_alloc(ctxt, plen, NULL, NULL); | |
554 | if (pbuf) | |
555 | ppd->dd->pio_inline_send(ppd->dd, pbuf, pbc, | |
556 | &hdr, hwords); | |
557 | } | |
558 | } | |
559 | ||
560 | /* | |
561 | * opa_smp_check() - Do the regular pkey checking, and the additional | |
562 | * checks for SMPs specified in OPAv1 rev 0.90, section 9.10.26 | |
563 | * ("SMA Packet Checks"). | |
564 | * | |
565 | * Note that: | |
566 | * - Checks are done using the pkey directly from the packet's BTH, | |
567 | * and specifically _not_ the pkey that we attach to the completion, | |
568 | * which may be different. | |
569 | * - These checks are specifically for "non-local" SMPs (i.e., SMPs | |
570 | * which originated on another node). SMPs which are sent from, and | |
571 | * destined to this node are checked in opa_local_smp_check(). | |
572 | * | |
573 | * At the point where opa_smp_check() is called, we know: | |
574 | * - destination QP is QP0 | |
575 | * | |
576 | * opa_smp_check() returns 0 if all checks succeed, 1 otherwise. | |
577 | */ | |
578 | static int opa_smp_check(struct hfi1_ibport *ibp, u16 pkey, u8 sc5, | |
895420dd | 579 | struct rvt_qp *qp, u16 slid, struct opa_smp *smp) |
77241056 MM |
580 | { |
581 | struct hfi1_pportdata *ppd = ppd_from_ibp(ibp); | |
582 | ||
583 | /* | |
584 | * I don't think it's possible for us to get here with sc != 0xf, | |
585 | * but check it to be certain. | |
586 | */ | |
587 | if (sc5 != 0xf) | |
588 | return 1; | |
589 | ||
590 | if (rcv_pkey_check(ppd, pkey, sc5, slid)) | |
591 | return 1; | |
592 | ||
593 | /* | |
594 | * At this point we know (and so don't need to check again) that | |
595 | * the pkey is either LIM_MGMT_P_KEY, or FULL_MGMT_P_KEY | |
596 | * (see ingress_pkey_check). | |
597 | */ | |
598 | if (smp->mgmt_class != IB_MGMT_CLASS_SUBN_DIRECTED_ROUTE && | |
599 | smp->mgmt_class != IB_MGMT_CLASS_SUBN_LID_ROUTED) { | |
600 | ingress_pkey_table_fail(ppd, pkey, slid); | |
601 | return 1; | |
602 | } | |
603 | ||
604 | /* | |
605 | * SMPs fall into one of four (disjoint) categories: | |
606 | * SMA request, SMA response, trap, or trap repress. | |
607 | * Our response depends, in part, on which type of | |
608 | * SMP we're processing. | |
609 | * | |
610 | * If this is not an SMA request, or trap repress: | |
611 | * - accept MAD if the port is running an SM | |
612 | * - pkey == FULL_MGMT_P_KEY => | |
613 | * reply with unsupported method (i.e., just mark | |
614 | * the smp's status field here, and let it be | |
615 | * processed normally) | |
616 | * - pkey != LIM_MGMT_P_KEY => | |
617 | * increment port recv constraint errors, drop MAD | |
618 | * If this is an SMA request or trap repress: | |
619 | * - pkey != FULL_MGMT_P_KEY => | |
620 | * increment port recv constraint errors, drop MAD | |
621 | */ | |
622 | switch (smp->method) { | |
623 | case IB_MGMT_METHOD_GET: | |
624 | case IB_MGMT_METHOD_SET: | |
625 | case IB_MGMT_METHOD_REPORT: | |
626 | case IB_MGMT_METHOD_TRAP_REPRESS: | |
627 | if (pkey != FULL_MGMT_P_KEY) { | |
628 | ingress_pkey_table_fail(ppd, pkey, slid); | |
629 | return 1; | |
630 | } | |
631 | break; | |
632 | case IB_MGMT_METHOD_SEND: | |
633 | case IB_MGMT_METHOD_TRAP: | |
634 | case IB_MGMT_METHOD_GET_RESP: | |
635 | case IB_MGMT_METHOD_REPORT_RESP: | |
4eb06882 | 636 | if (ibp->rvp.port_cap_flags & IB_PORT_SM) |
77241056 MM |
637 | return 0; |
638 | if (pkey == FULL_MGMT_P_KEY) { | |
639 | smp->status |= IB_SMP_UNSUP_METHOD; | |
640 | return 0; | |
641 | } | |
642 | if (pkey != LIM_MGMT_P_KEY) { | |
643 | ingress_pkey_table_fail(ppd, pkey, slid); | |
644 | return 1; | |
645 | } | |
646 | break; | |
647 | default: | |
648 | break; | |
649 | } | |
650 | return 0; | |
651 | } | |
652 | ||
77241056 MM |
653 | /** |
654 | * hfi1_ud_rcv - receive an incoming UD packet | |
655 | * @ibp: the port the packet came in on | |
656 | * @hdr: the packet header | |
657 | * @rcv_flags: flags relevant to rcv processing | |
658 | * @data: the packet data | |
659 | * @tlen: the packet length | |
660 | * @qp: the QP the packet came on | |
661 | * | |
662 | * This is called from qp_rcv() to process an incoming UD packet | |
663 | * for the given QP. | |
664 | * Called at interrupt level. | |
665 | */ | |
666 | void hfi1_ud_rcv(struct hfi1_packet *packet) | |
667 | { | |
668 | struct hfi1_other_headers *ohdr = packet->ohdr; | |
669 | int opcode; | |
670 | u32 hdrsize = packet->hlen; | |
77241056 MM |
671 | struct ib_wc wc; |
672 | u32 qkey; | |
673 | u32 src_qp; | |
674 | u16 dlid, pkey; | |
675 | int mgmt_pkey_idx = -1; | |
676 | struct hfi1_ibport *ibp = &packet->rcd->ppd->ibport_data; | |
89c057ca | 677 | struct hfi1_pportdata *ppd = ppd_from_ibp(ibp); |
77241056 MM |
678 | struct hfi1_ib_header *hdr = packet->hdr; |
679 | u32 rcv_flags = packet->rcv_flags; | |
680 | void *data = packet->ebuf; | |
681 | u32 tlen = packet->tlen; | |
895420dd | 682 | struct rvt_qp *qp = packet->qp; |
77241056 | 683 | bool has_grh = rcv_flags & HFI1_HAS_GRH; |
896ce45d | 684 | u8 sc5 = hdr2sc((struct hfi1_message_header *)hdr, packet->rhf); |
89c057ca DC |
685 | u32 bth1; |
686 | u8 sl_from_sc, sl; | |
687 | u16 slid; | |
688 | u8 extra_bytes; | |
77241056 MM |
689 | |
690 | qkey = be32_to_cpu(ohdr->u.ud.deth[0]); | |
ec4274f1 | 691 | src_qp = be32_to_cpu(ohdr->u.ud.deth[1]) & RVT_QPN_MASK; |
77241056 | 692 | dlid = be16_to_cpu(hdr->lrh[1]); |
89c057ca DC |
693 | bth1 = be32_to_cpu(ohdr->bth[1]); |
694 | slid = be16_to_cpu(hdr->lrh[3]); | |
695 | pkey = (u16)be32_to_cpu(ohdr->bth[0]); | |
696 | sl = (be16_to_cpu(hdr->lrh[0]) >> 4) & 0xf; | |
697 | extra_bytes = (be32_to_cpu(ohdr->bth[0]) >> 20) & 3; | |
698 | extra_bytes += (SIZE_OF_CRC << 2); | |
699 | sl_from_sc = ibp->sc_to_sl[sc5]; | |
77241056 | 700 | |
77241056 MM |
701 | opcode = be32_to_cpu(ohdr->bth[0]) >> 24; |
702 | opcode &= 0xff; | |
703 | ||
5fd2b562 | 704 | process_ecn(qp, packet, (opcode != IB_OPCODE_CNP)); |
77241056 MM |
705 | /* |
706 | * Get the number of bytes the message was padded by | |
707 | * and drop incomplete packets. | |
708 | */ | |
89c057ca | 709 | if (unlikely(tlen < (hdrsize + extra_bytes))) |
77241056 MM |
710 | goto drop; |
711 | ||
89c057ca | 712 | tlen -= hdrsize + extra_bytes; |
77241056 MM |
713 | |
714 | /* | |
715 | * Check that the permissive LID is only used on QP0 | |
716 | * and the QKEY matches (see 9.6.1.4.1 and 9.6.1.5.1). | |
717 | */ | |
718 | if (qp->ibqp.qp_num) { | |
719 | if (unlikely(hdr->lrh[1] == IB_LID_PERMISSIVE || | |
720 | hdr->lrh[3] == IB_LID_PERMISSIVE)) | |
721 | goto drop; | |
722 | if (qp->ibqp.qp_num > 1) { | |
77241056 MM |
723 | if (unlikely(rcv_pkey_check(ppd, pkey, sc5, slid))) { |
724 | /* | |
725 | * Traps will not be sent for packets dropped | |
726 | * by the HW. This is fine, as sending trap | |
727 | * for invalid pkeys is optional according to | |
728 | * IB spec (release 1.3, section 10.9.4) | |
729 | */ | |
5cd24119 | 730 | hfi1_bad_pqkey(ibp, OPA_TRAP_BAD_P_KEY, |
89c057ca | 731 | pkey, sl, |
77241056 | 732 | src_qp, qp->ibqp.qp_num, |
89c057ca | 733 | slid, dlid); |
77241056 MM |
734 | return; |
735 | } | |
736 | } else { | |
737 | /* GSI packet */ | |
738 | mgmt_pkey_idx = hfi1_lookup_pkey_idx(ibp, pkey); | |
739 | if (mgmt_pkey_idx < 0) | |
740 | goto drop; | |
77241056 MM |
741 | } |
742 | if (unlikely(qkey != qp->qkey)) { | |
89c057ca | 743 | hfi1_bad_pqkey(ibp, OPA_TRAP_BAD_Q_KEY, qkey, sl, |
77241056 | 744 | src_qp, qp->ibqp.qp_num, |
89c057ca | 745 | slid, dlid); |
77241056 MM |
746 | return; |
747 | } | |
748 | /* Drop invalid MAD packets (see 13.5.3.1). */ | |
749 | if (unlikely(qp->ibqp.qp_num == 1 && | |
89c057ca | 750 | (tlen > 2048 || (sc5 == 0xF)))) |
77241056 MM |
751 | goto drop; |
752 | } else { | |
753 | /* Received on QP0, and so by definition, this is an SMP */ | |
754 | struct opa_smp *smp = (struct opa_smp *)data; | |
77241056 MM |
755 | |
756 | if (opa_smp_check(ibp, pkey, sc5, qp, slid, smp)) | |
757 | goto drop; | |
758 | ||
759 | if (tlen > 2048) | |
760 | goto drop; | |
761 | if ((hdr->lrh[1] == IB_LID_PERMISSIVE || | |
762 | hdr->lrh[3] == IB_LID_PERMISSIVE) && | |
763 | smp->mgmt_class != IB_MGMT_CLASS_SUBN_DIRECTED_ROUTE) | |
764 | goto drop; | |
765 | ||
766 | /* look up SMI pkey */ | |
767 | mgmt_pkey_idx = hfi1_lookup_pkey_idx(ibp, pkey); | |
768 | if (mgmt_pkey_idx < 0) | |
769 | goto drop; | |
77241056 MM |
770 | } |
771 | ||
772 | if (qp->ibqp.qp_num > 1 && | |
773 | opcode == IB_OPCODE_UD_SEND_ONLY_WITH_IMMEDIATE) { | |
774 | wc.ex.imm_data = ohdr->u.ud.imm_data; | |
775 | wc.wc_flags = IB_WC_WITH_IMM; | |
776 | tlen -= sizeof(u32); | |
777 | } else if (opcode == IB_OPCODE_UD_SEND_ONLY) { | |
778 | wc.ex.imm_data = 0; | |
779 | wc.wc_flags = 0; | |
e490974e | 780 | } else { |
77241056 | 781 | goto drop; |
e490974e | 782 | } |
77241056 MM |
783 | |
784 | /* | |
785 | * A GRH is expected to precede the data even if not | |
786 | * present on the wire. | |
787 | */ | |
788 | wc.byte_len = tlen + sizeof(struct ib_grh); | |
789 | ||
790 | /* | |
791 | * Get the next work request entry to find where to put the data. | |
792 | */ | |
e490974e | 793 | if (qp->r_flags & RVT_R_REUSE_SGE) { |
54d10c1e | 794 | qp->r_flags &= ~RVT_R_REUSE_SGE; |
e490974e | 795 | } else { |
77241056 MM |
796 | int ret; |
797 | ||
ec4274f1 | 798 | ret = hfi1_rvt_get_rwqe(qp, 0); |
77241056 MM |
799 | if (ret < 0) { |
800 | hfi1_rc_error(qp, IB_WC_LOC_QP_OP_ERR); | |
801 | return; | |
802 | } | |
803 | if (!ret) { | |
804 | if (qp->ibqp.qp_num == 0) | |
4eb06882 | 805 | ibp->rvp.n_vl15_dropped++; |
77241056 MM |
806 | return; |
807 | } | |
808 | } | |
809 | /* Silently drop packets which are too big. */ | |
810 | if (unlikely(wc.byte_len > qp->r_len)) { | |
54d10c1e | 811 | qp->r_flags |= RVT_R_REUSE_SGE; |
77241056 MM |
812 | goto drop; |
813 | } | |
814 | if (has_grh) { | |
815 | hfi1_copy_sge(&qp->r_sge, &hdr->u.l.grh, | |
7b0b01aa | 816 | sizeof(struct ib_grh), 1, 0); |
77241056 | 817 | wc.wc_flags |= IB_WC_GRH; |
e490974e | 818 | } else { |
77241056 | 819 | hfi1_skip_sge(&qp->r_sge, sizeof(struct ib_grh), 1); |
e490974e | 820 | } |
7b0b01aa DL |
821 | hfi1_copy_sge(&qp->r_sge, data, wc.byte_len - sizeof(struct ib_grh), |
822 | 1, 0); | |
ec4274f1 | 823 | rvt_put_ss(&qp->r_sge); |
54d10c1e | 824 | if (!test_and_clear_bit(RVT_R_WRID_VALID, &qp->r_aflags)) |
77241056 MM |
825 | return; |
826 | wc.wr_id = qp->r_wr_id; | |
827 | wc.status = IB_WC_SUCCESS; | |
828 | wc.opcode = IB_WC_RECV; | |
829 | wc.vendor_err = 0; | |
830 | wc.qp = &qp->ibqp; | |
831 | wc.src_qp = src_qp; | |
832 | ||
833 | if (qp->ibqp.qp_type == IB_QPT_GSI || | |
834 | qp->ibqp.qp_type == IB_QPT_SMI) { | |
835 | if (mgmt_pkey_idx < 0) { | |
836 | if (net_ratelimit()) { | |
77241056 MM |
837 | struct hfi1_devdata *dd = ppd->dd; |
838 | ||
839 | dd_dev_err(dd, "QP type %d mgmt_pkey_idx < 0 and packet not dropped???\n", | |
840 | qp->ibqp.qp_type); | |
841 | mgmt_pkey_idx = 0; | |
842 | } | |
843 | } | |
844 | wc.pkey_index = (unsigned)mgmt_pkey_idx; | |
e490974e | 845 | } else { |
77241056 | 846 | wc.pkey_index = 0; |
e490974e | 847 | } |
77241056 | 848 | |
89c057ca DC |
849 | wc.slid = slid; |
850 | wc.sl = sl_from_sc; | |
77241056 MM |
851 | |
852 | /* | |
853 | * Save the LMC lower bits if the destination LID is a unicast LID. | |
854 | */ | |
8859b4a6 | 855 | wc.dlid_path_bits = dlid >= be16_to_cpu(IB_MULTICAST_LID_BASE) ? 0 : |
77241056 MM |
856 | dlid & ((1 << ppd_from_ibp(ibp)->lmc) - 1); |
857 | wc.port_num = qp->port_num; | |
858 | /* Signal completion event if the solicited bit is set. */ | |
abd712da DD |
859 | rvt_cq_enter(ibcq_to_rvtcq(qp->ibqp.recv_cq), &wc, |
860 | (ohdr->bth[0] & | |
861 | cpu_to_be32(IB_BTH_SOLICITED)) != 0); | |
77241056 MM |
862 | return; |
863 | ||
864 | drop: | |
4eb06882 | 865 | ibp->rvp.n_pkt_drops++; |
77241056 | 866 | } |