Merge tag 'perf-tools-fixes-for-v6.4-1-2023-05-20' of git://git.kernel.org/pub/scm...
[linux-block.git] / net / ethtool / rings.c
CommitLineData
e4a1717b
MK
1// SPDX-License-Identifier: GPL-2.0-only
2
3#include "netlink.h"
4#include "common.h"
5
6struct rings_req_info {
7 struct ethnl_req_info base;
8};
9
10struct rings_reply_data {
11 struct ethnl_reply_data base;
12 struct ethtool_ringparam ringparam;
0b70c256 13 struct kernel_ethtool_ringparam kernel_ringparam;
233eb4e7 14 u32 supported_ring_params;
e4a1717b
MK
15};
16
17#define RINGS_REPDATA(__reply_base) \
18 container_of(__reply_base, struct rings_reply_data, base)
19
ff419afa 20const struct nla_policy ethnl_rings_get_policy[] = {
329d9c33
JK
21 [ETHTOOL_A_RINGS_HEADER] =
22 NLA_POLICY_NESTED(ethnl_header_policy),
e4a1717b
MK
23};
24
25static int rings_prepare_data(const struct ethnl_req_info *req_base,
26 struct ethnl_reply_data *reply_base,
27 struct genl_info *info)
28{
29 struct rings_reply_data *data = RINGS_REPDATA(reply_base);
74624944 30 struct netlink_ext_ack *extack = info ? info->extack : NULL;
e4a1717b
MK
31 struct net_device *dev = reply_base->dev;
32 int ret;
33
34 if (!dev->ethtool_ops->get_ringparam)
35 return -EOPNOTSUPP;
233eb4e7
SA
36
37 data->supported_ring_params = dev->ethtool_ops->supported_ring_params;
e4a1717b
MK
38 ret = ethnl_ops_begin(dev);
39 if (ret < 0)
40 return ret;
74624944
HC
41 dev->ethtool_ops->get_ringparam(dev, &data->ringparam,
42 &data->kernel_ringparam, extack);
e4a1717b
MK
43 ethnl_ops_complete(dev);
44
45 return 0;
46}
47
48static int rings_reply_size(const struct ethnl_req_info *req_base,
49 const struct ethnl_reply_data *reply_base)
50{
51 return nla_total_size(sizeof(u32)) + /* _RINGS_RX_MAX */
52 nla_total_size(sizeof(u32)) + /* _RINGS_RX_MINI_MAX */
53 nla_total_size(sizeof(u32)) + /* _RINGS_RX_JUMBO_MAX */
54 nla_total_size(sizeof(u32)) + /* _RINGS_TX_MAX */
55 nla_total_size(sizeof(u32)) + /* _RINGS_RX */
56 nla_total_size(sizeof(u32)) + /* _RINGS_RX_MINI */
57 nla_total_size(sizeof(u32)) + /* _RINGS_RX_JUMBO */
0b70c256 58 nla_total_size(sizeof(u32)) + /* _RINGS_TX */
9690ae60 59 nla_total_size(sizeof(u32)) + /* _RINGS_RX_BUF_LEN */
1241e329 60 nla_total_size(sizeof(u8)) + /* _RINGS_TCP_DATA_SPLIT */
4dc84c06 61 nla_total_size(sizeof(u32) + /* _RINGS_CQE_SIZE */
5b4e9a7a 62 nla_total_size(sizeof(u8)) + /* _RINGS_TX_PUSH */
233eb4e7
SA
63 nla_total_size(sizeof(u8))) + /* _RINGS_RX_PUSH */
64 nla_total_size(sizeof(u32)) + /* _RINGS_TX_PUSH_BUF_LEN */
65 nla_total_size(sizeof(u32)); /* _RINGS_TX_PUSH_BUF_LEN_MAX */
e4a1717b
MK
66}
67
68static int rings_fill_reply(struct sk_buff *skb,
69 const struct ethnl_req_info *req_base,
70 const struct ethnl_reply_data *reply_base)
71{
72 const struct rings_reply_data *data = RINGS_REPDATA(reply_base);
9690ae60 73 const struct kernel_ethtool_ringparam *kr = &data->kernel_ringparam;
e4a1717b 74 const struct ethtool_ringparam *ringparam = &data->ringparam;
233eb4e7 75 u32 supported_ring_params = data->supported_ring_params;
e4a1717b 76
9690ae60
JK
77 WARN_ON(kr->tcp_data_split > ETHTOOL_TCP_DATA_SPLIT_ENABLED);
78
e4a1717b
MK
79 if ((ringparam->rx_max_pending &&
80 (nla_put_u32(skb, ETHTOOL_A_RINGS_RX_MAX,
81 ringparam->rx_max_pending) ||
82 nla_put_u32(skb, ETHTOOL_A_RINGS_RX,
83 ringparam->rx_pending))) ||
84 (ringparam->rx_mini_max_pending &&
85 (nla_put_u32(skb, ETHTOOL_A_RINGS_RX_MINI_MAX,
86 ringparam->rx_mini_max_pending) ||
87 nla_put_u32(skb, ETHTOOL_A_RINGS_RX_MINI,
88 ringparam->rx_mini_pending))) ||
89 (ringparam->rx_jumbo_max_pending &&
90 (nla_put_u32(skb, ETHTOOL_A_RINGS_RX_JUMBO_MAX,
91 ringparam->rx_jumbo_max_pending) ||
92 nla_put_u32(skb, ETHTOOL_A_RINGS_RX_JUMBO,
93 ringparam->rx_jumbo_pending))) ||
94 (ringparam->tx_max_pending &&
95 (nla_put_u32(skb, ETHTOOL_A_RINGS_TX_MAX,
96 ringparam->tx_max_pending) ||
97 nla_put_u32(skb, ETHTOOL_A_RINGS_TX,
0b70c256 98 ringparam->tx_pending))) ||
9690ae60
JK
99 (kr->rx_buf_len &&
100 (nla_put_u32(skb, ETHTOOL_A_RINGS_RX_BUF_LEN, kr->rx_buf_len))) ||
101 (kr->tcp_data_split &&
102 (nla_put_u8(skb, ETHTOOL_A_RINGS_TCP_DATA_SPLIT,
1241e329
SS
103 kr->tcp_data_split))) ||
104 (kr->cqe_size &&
4dc84c06 105 (nla_put_u32(skb, ETHTOOL_A_RINGS_CQE_SIZE, kr->cqe_size))) ||
5b4e9a7a 106 nla_put_u8(skb, ETHTOOL_A_RINGS_TX_PUSH, !!kr->tx_push) ||
233eb4e7
SA
107 nla_put_u8(skb, ETHTOOL_A_RINGS_RX_PUSH, !!kr->rx_push) ||
108 ((supported_ring_params & ETHTOOL_RING_USE_TX_PUSH_BUF_LEN) &&
109 (nla_put_u32(skb, ETHTOOL_A_RINGS_TX_PUSH_BUF_LEN_MAX,
110 kr->tx_push_buf_max_len) ||
111 nla_put_u32(skb, ETHTOOL_A_RINGS_TX_PUSH_BUF_LEN,
112 kr->tx_push_buf_len))))
e4a1717b
MK
113 return -EMSGSIZE;
114
115 return 0;
116}
117
2fc2929e
MK
118/* RINGS_SET */
119
ff419afa 120const struct nla_policy ethnl_rings_set_policy[] = {
329d9c33
JK
121 [ETHTOOL_A_RINGS_HEADER] =
122 NLA_POLICY_NESTED(ethnl_header_policy),
2fc2929e
MK
123 [ETHTOOL_A_RINGS_RX] = { .type = NLA_U32 },
124 [ETHTOOL_A_RINGS_RX_MINI] = { .type = NLA_U32 },
125 [ETHTOOL_A_RINGS_RX_JUMBO] = { .type = NLA_U32 },
126 [ETHTOOL_A_RINGS_TX] = { .type = NLA_U32 },
0b70c256 127 [ETHTOOL_A_RINGS_RX_BUF_LEN] = NLA_POLICY_MIN(NLA_U32, 1),
1241e329 128 [ETHTOOL_A_RINGS_CQE_SIZE] = NLA_POLICY_MIN(NLA_U32, 1),
4dc84c06 129 [ETHTOOL_A_RINGS_TX_PUSH] = NLA_POLICY_MAX(NLA_U8, 1),
5b4e9a7a 130 [ETHTOOL_A_RINGS_RX_PUSH] = NLA_POLICY_MAX(NLA_U8, 1),
233eb4e7 131 [ETHTOOL_A_RINGS_TX_PUSH_BUF_LEN] = { .type = NLA_U32 },
2fc2929e
MK
132};
133
04007961
JK
134static int
135ethnl_set_rings_validate(struct ethnl_req_info *req_info,
136 struct genl_info *info)
2fc2929e 137{
04007961 138 const struct ethtool_ops *ops = req_info->dev->ethtool_ops;
5028588b 139 struct nlattr **tb = info->attrs;
2fc2929e 140
bde292c0
JW
141 if (tb[ETHTOOL_A_RINGS_RX_BUF_LEN] &&
142 !(ops->supported_ring_params & ETHTOOL_RING_USE_RX_BUF_LEN)) {
bde292c0
JW
143 NL_SET_ERR_MSG_ATTR(info->extack,
144 tb[ETHTOOL_A_RINGS_RX_BUF_LEN],
145 "setting rx buf len not supported");
04007961 146 return -EOPNOTSUPP;
bde292c0
JW
147 }
148
149 if (tb[ETHTOOL_A_RINGS_CQE_SIZE] &&
150 !(ops->supported_ring_params & ETHTOOL_RING_USE_CQE_SIZE)) {
bde292c0
JW
151 NL_SET_ERR_MSG_ATTR(info->extack,
152 tb[ETHTOOL_A_RINGS_CQE_SIZE],
153 "setting cqe size not supported");
04007961 154 return -EOPNOTSUPP;
bde292c0
JW
155 }
156
4dc84c06
JW
157 if (tb[ETHTOOL_A_RINGS_TX_PUSH] &&
158 !(ops->supported_ring_params & ETHTOOL_RING_USE_TX_PUSH)) {
4dc84c06
JW
159 NL_SET_ERR_MSG_ATTR(info->extack,
160 tb[ETHTOOL_A_RINGS_TX_PUSH],
161 "setting tx push not supported");
04007961 162 return -EOPNOTSUPP;
4dc84c06
JW
163 }
164
5b4e9a7a
SN
165 if (tb[ETHTOOL_A_RINGS_RX_PUSH] &&
166 !(ops->supported_ring_params & ETHTOOL_RING_USE_RX_PUSH)) {
167 NL_SET_ERR_MSG_ATTR(info->extack,
168 tb[ETHTOOL_A_RINGS_RX_PUSH],
169 "setting rx push not supported");
170 return -EOPNOTSUPP;
171 }
172
233eb4e7
SA
173 if (tb[ETHTOOL_A_RINGS_TX_PUSH_BUF_LEN] &&
174 !(ops->supported_ring_params & ETHTOOL_RING_USE_TX_PUSH_BUF_LEN)) {
175 NL_SET_ERR_MSG_ATTR(info->extack,
176 tb[ETHTOOL_A_RINGS_TX_PUSH_BUF_LEN],
177 "setting tx push buf len is not supported");
178 return -EOPNOTSUPP;
179 }
180
04007961
JK
181 return ops->get_ringparam && ops->set_ringparam ? 1 : -EOPNOTSUPP;
182}
183
184static int
185ethnl_set_rings(struct ethnl_req_info *req_info, struct genl_info *info)
186{
187 struct kernel_ethtool_ringparam kernel_ringparam = {};
188 struct ethtool_ringparam ringparam = {};
189 struct net_device *dev = req_info->dev;
190 struct nlattr **tb = info->attrs;
191 const struct nlattr *err_attr;
192 bool mod = false;
193 int ret;
194
195 dev->ethtool_ops->get_ringparam(dev, &ringparam,
196 &kernel_ringparam, info->extack);
2fc2929e
MK
197
198 ethnl_update_u32(&ringparam.rx_pending, tb[ETHTOOL_A_RINGS_RX], &mod);
199 ethnl_update_u32(&ringparam.rx_mini_pending,
200 tb[ETHTOOL_A_RINGS_RX_MINI], &mod);
201 ethnl_update_u32(&ringparam.rx_jumbo_pending,
202 tb[ETHTOOL_A_RINGS_RX_JUMBO], &mod);
203 ethnl_update_u32(&ringparam.tx_pending, tb[ETHTOOL_A_RINGS_TX], &mod);
0b70c256
HC
204 ethnl_update_u32(&kernel_ringparam.rx_buf_len,
205 tb[ETHTOOL_A_RINGS_RX_BUF_LEN], &mod);
1241e329
SS
206 ethnl_update_u32(&kernel_ringparam.cqe_size,
207 tb[ETHTOOL_A_RINGS_CQE_SIZE], &mod);
4dc84c06
JW
208 ethnl_update_u8(&kernel_ringparam.tx_push,
209 tb[ETHTOOL_A_RINGS_TX_PUSH], &mod);
5b4e9a7a
SN
210 ethnl_update_u8(&kernel_ringparam.rx_push,
211 tb[ETHTOOL_A_RINGS_RX_PUSH], &mod);
233eb4e7
SA
212 ethnl_update_u32(&kernel_ringparam.tx_push_buf_len,
213 tb[ETHTOOL_A_RINGS_TX_PUSH_BUF_LEN], &mod);
2fc2929e 214 if (!mod)
04007961 215 return 0;
2fc2929e
MK
216
217 /* ensure new ring parameters are within limits */
218 if (ringparam.rx_pending > ringparam.rx_max_pending)
219 err_attr = tb[ETHTOOL_A_RINGS_RX];
220 else if (ringparam.rx_mini_pending > ringparam.rx_mini_max_pending)
221 err_attr = tb[ETHTOOL_A_RINGS_RX_MINI];
222 else if (ringparam.rx_jumbo_pending > ringparam.rx_jumbo_max_pending)
223 err_attr = tb[ETHTOOL_A_RINGS_RX_JUMBO];
224 else if (ringparam.tx_pending > ringparam.tx_max_pending)
225 err_attr = tb[ETHTOOL_A_RINGS_TX];
226 else
227 err_attr = NULL;
228 if (err_attr) {
2fc2929e 229 NL_SET_ERR_MSG_ATTR(info->extack, err_attr,
5ec82c49 230 "requested ring size exceeds maximum");
04007961 231 return -EINVAL;
2fc2929e
MK
232 }
233
233eb4e7
SA
234 if (kernel_ringparam.tx_push_buf_len > kernel_ringparam.tx_push_buf_max_len) {
235 NL_SET_ERR_MSG_ATTR_FMT(info->extack, tb[ETHTOOL_A_RINGS_TX_PUSH_BUF_LEN],
236 "Requested TX push buffer exceeds the maximum of %u",
237 kernel_ringparam.tx_push_buf_max_len);
238
239 return -EINVAL;
240 }
241
74624944
HC
242 ret = dev->ethtool_ops->set_ringparam(dev, &ringparam,
243 &kernel_ringparam, info->extack);
04007961 244 return ret < 0 ? ret : 1;
2fc2929e 245}
04007961
JK
246
247const struct ethnl_request_ops ethnl_rings_request_ops = {
248 .request_cmd = ETHTOOL_MSG_RINGS_GET,
249 .reply_cmd = ETHTOOL_MSG_RINGS_GET_REPLY,
250 .hdr_attr = ETHTOOL_A_RINGS_HEADER,
251 .req_info_size = sizeof(struct rings_req_info),
252 .reply_data_size = sizeof(struct rings_reply_data),
253
254 .prepare_data = rings_prepare_data,
255 .reply_size = rings_reply_size,
256 .fill_reply = rings_fill_reply,
257
258 .set_validate = ethnl_set_rings_validate,
259 .set = ethnl_set_rings,
260 .set_ntf_cmd = ETHTOOL_MSG_RINGS_NTF,
261};