1 /* SPDX-License-Identifier: BSD-3-Clause
2  *
3  * Copyright(c) 2019-2020 Xilinx, Inc.
4  * Copyright(c) 2007-2019 Solarflare Communications Inc.
5  */
6 
7 #include "efx.h"
8 #include "efx_impl.h"
9 
10 #if EFSYS_OPT_RIVERHEAD || EFX_OPTS_EF10()
11 
12 #if EFSYS_OPT_FILTER
13 
14 #define	EFE_SPEC(eftp, index)	((eftp)->eft_entry[(index)].efe_spec)
15 
16 static			efx_filter_spec_t *
ef10_filter_entry_spec(__in const ef10_filter_table_t * eftp,__in unsigned int index)17 ef10_filter_entry_spec(
18 	__in		const ef10_filter_table_t *eftp,
19 	__in		unsigned int index)
20 {
21 	return ((efx_filter_spec_t *)(EFE_SPEC(eftp, index) &
22 		~(uintptr_t)EFX_EF10_FILTER_FLAGS));
23 }
24 
25 static			boolean_t
ef10_filter_entry_is_busy(__in const ef10_filter_table_t * eftp,__in unsigned int index)26 ef10_filter_entry_is_busy(
27 	__in		const ef10_filter_table_t *eftp,
28 	__in		unsigned int index)
29 {
30 	if (EFE_SPEC(eftp, index) & EFX_EF10_FILTER_FLAG_BUSY)
31 		return (B_TRUE);
32 	else
33 		return (B_FALSE);
34 }
35 
36 static			boolean_t
ef10_filter_entry_is_auto_old(__in const ef10_filter_table_t * eftp,__in unsigned int index)37 ef10_filter_entry_is_auto_old(
38 	__in		const ef10_filter_table_t *eftp,
39 	__in		unsigned int index)
40 {
41 	if (EFE_SPEC(eftp, index) & EFX_EF10_FILTER_FLAG_AUTO_OLD)
42 		return (B_TRUE);
43 	else
44 		return (B_FALSE);
45 }
46 
47 static			void
ef10_filter_set_entry(__inout ef10_filter_table_t * eftp,__in unsigned int index,__in_opt const efx_filter_spec_t * efsp)48 ef10_filter_set_entry(
49 	__inout		ef10_filter_table_t *eftp,
50 	__in		unsigned int index,
51 	__in_opt	const efx_filter_spec_t *efsp)
52 {
53 	EFE_SPEC(eftp, index) = (uintptr_t)efsp;
54 }
55 
56 static			void
ef10_filter_set_entry_busy(__inout ef10_filter_table_t * eftp,__in unsigned int index)57 ef10_filter_set_entry_busy(
58 	__inout		ef10_filter_table_t *eftp,
59 	__in		unsigned int index)
60 {
61 	EFE_SPEC(eftp, index) |= (uintptr_t)EFX_EF10_FILTER_FLAG_BUSY;
62 }
63 
64 static			void
ef10_filter_set_entry_not_busy(__inout ef10_filter_table_t * eftp,__in unsigned int index)65 ef10_filter_set_entry_not_busy(
66 	__inout		ef10_filter_table_t *eftp,
67 	__in		unsigned int index)
68 {
69 	EFE_SPEC(eftp, index) &= ~(uintptr_t)EFX_EF10_FILTER_FLAG_BUSY;
70 }
71 
72 static			void
ef10_filter_set_entry_auto_old(__inout ef10_filter_table_t * eftp,__in unsigned int index)73 ef10_filter_set_entry_auto_old(
74 	__inout		ef10_filter_table_t *eftp,
75 	__in		unsigned int index)
76 {
77 	EFSYS_ASSERT(ef10_filter_entry_spec(eftp, index) != NULL);
78 	EFE_SPEC(eftp, index) |= (uintptr_t)EFX_EF10_FILTER_FLAG_AUTO_OLD;
79 }
80 
81 static			void
ef10_filter_set_entry_not_auto_old(__inout ef10_filter_table_t * eftp,__in unsigned int index)82 ef10_filter_set_entry_not_auto_old(
83 	__inout		ef10_filter_table_t *eftp,
84 	__in		unsigned int index)
85 {
86 	EFE_SPEC(eftp, index) &= ~(uintptr_t)EFX_EF10_FILTER_FLAG_AUTO_OLD;
87 	EFSYS_ASSERT(ef10_filter_entry_spec(eftp, index) != NULL);
88 }
89 
90 	__checkReturn	efx_rc_t
ef10_filter_init(__in efx_nic_t * enp)91 ef10_filter_init(
92 	__in		efx_nic_t *enp)
93 {
94 	efx_rc_t rc;
95 	ef10_filter_table_t *eftp;
96 
97 	EFSYS_ASSERT(EFX_FAMILY_IS_EF100(enp) || EFX_FAMILY_IS_EF10(enp));
98 
99 #define	MATCH_MASK(match) (EFX_MASK32(match) << EFX_LOW_BIT(match))
100 	EFX_STATIC_ASSERT(EFX_FILTER_MATCH_REM_HOST ==
101 	    MATCH_MASK(MC_CMD_FILTER_OP_EXT_IN_MATCH_SRC_IP));
102 	EFX_STATIC_ASSERT(EFX_FILTER_MATCH_LOC_HOST ==
103 	    MATCH_MASK(MC_CMD_FILTER_OP_EXT_IN_MATCH_DST_IP));
104 	EFX_STATIC_ASSERT(EFX_FILTER_MATCH_REM_MAC ==
105 	    MATCH_MASK(MC_CMD_FILTER_OP_EXT_IN_MATCH_SRC_MAC));
106 	EFX_STATIC_ASSERT(EFX_FILTER_MATCH_REM_PORT ==
107 	    MATCH_MASK(MC_CMD_FILTER_OP_EXT_IN_MATCH_SRC_PORT));
108 	EFX_STATIC_ASSERT(EFX_FILTER_MATCH_LOC_MAC ==
109 	    MATCH_MASK(MC_CMD_FILTER_OP_EXT_IN_MATCH_DST_MAC));
110 	EFX_STATIC_ASSERT(EFX_FILTER_MATCH_LOC_PORT ==
111 	    MATCH_MASK(MC_CMD_FILTER_OP_EXT_IN_MATCH_DST_PORT));
112 	EFX_STATIC_ASSERT(EFX_FILTER_MATCH_ETHER_TYPE ==
113 	    MATCH_MASK(MC_CMD_FILTER_OP_EXT_IN_MATCH_ETHER_TYPE));
114 	EFX_STATIC_ASSERT(EFX_FILTER_MATCH_INNER_VID ==
115 	    MATCH_MASK(MC_CMD_FILTER_OP_EXT_IN_MATCH_INNER_VLAN));
116 	EFX_STATIC_ASSERT(EFX_FILTER_MATCH_OUTER_VID ==
117 	    MATCH_MASK(MC_CMD_FILTER_OP_EXT_IN_MATCH_OUTER_VLAN));
118 	EFX_STATIC_ASSERT(EFX_FILTER_MATCH_IP_PROTO ==
119 	    MATCH_MASK(MC_CMD_FILTER_OP_EXT_IN_MATCH_IP_PROTO));
120 	EFX_STATIC_ASSERT(EFX_FILTER_MATCH_VNI_OR_VSID ==
121 	    MATCH_MASK(MC_CMD_FILTER_OP_EXT_IN_MATCH_VNI_OR_VSID));
122 	EFX_STATIC_ASSERT(EFX_FILTER_MATCH_IFRM_LOC_MAC ==
123 	    MATCH_MASK(MC_CMD_FILTER_OP_EXT_IN_MATCH_IFRM_DST_MAC));
124 	EFX_STATIC_ASSERT(EFX_FILTER_MATCH_IFRM_UNKNOWN_MCAST_DST ==
125 	    MATCH_MASK(MC_CMD_FILTER_OP_EXT_IN_MATCH_IFRM_UNKNOWN_MCAST_DST));
126 	EFX_STATIC_ASSERT(EFX_FILTER_MATCH_IFRM_UNKNOWN_UCAST_DST ==
127 	    MATCH_MASK(MC_CMD_FILTER_OP_EXT_IN_MATCH_IFRM_UNKNOWN_UCAST_DST));
128 	EFX_STATIC_ASSERT(EFX_FILTER_MATCH_UNKNOWN_MCAST_DST ==
129 	    MATCH_MASK(MC_CMD_FILTER_OP_EXT_IN_MATCH_UNKNOWN_MCAST_DST));
130 	EFX_STATIC_ASSERT((uint32_t)EFX_FILTER_MATCH_UNKNOWN_UCAST_DST ==
131 	    MATCH_MASK(MC_CMD_FILTER_OP_EXT_IN_MATCH_UNKNOWN_UCAST_DST));
132 #undef MATCH_MASK
133 
134 	EFSYS_KMEM_ALLOC(enp->en_esip, sizeof (ef10_filter_table_t), eftp);
135 
136 	if (!eftp) {
137 		rc = ENOMEM;
138 		goto fail1;
139 	}
140 
141 	enp->en_filter.ef_ef10_filter_table = eftp;
142 
143 	return (0);
144 
145 fail1:
146 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
147 
148 	return (rc);
149 }
150 
151 			void
ef10_filter_fini(__in efx_nic_t * enp)152 ef10_filter_fini(
153 	__in		efx_nic_t *enp)
154 {
155 	EFSYS_ASSERT(EFX_FAMILY_IS_EF100(enp) || EFX_FAMILY_IS_EF10(enp));
156 
157 	if (enp->en_filter.ef_ef10_filter_table != NULL) {
158 		EFSYS_KMEM_FREE(enp->en_esip, sizeof (ef10_filter_table_t),
159 		    enp->en_filter.ef_ef10_filter_table);
160 	}
161 }
162 
163 static	__checkReturn	efx_rc_t
efx_mcdi_filter_op_add(__in efx_nic_t * enp,__in efx_filter_spec_t * spec,__in unsigned int filter_op,__inout ef10_filter_handle_t * handle)164 efx_mcdi_filter_op_add(
165 	__in		efx_nic_t *enp,
166 	__in		efx_filter_spec_t *spec,
167 	__in		unsigned int filter_op,
168 	__inout		ef10_filter_handle_t *handle)
169 {
170 	efx_mcdi_req_t req;
171 	EFX_MCDI_DECLARE_BUF(payload, MC_CMD_FILTER_OP_V3_IN_LEN,
172 		MC_CMD_FILTER_OP_EXT_OUT_LEN);
173 	efx_filter_match_flags_t match_flags;
174 	efx_rc_t rc;
175 
176 	req.emr_cmd = MC_CMD_FILTER_OP;
177 	req.emr_in_buf = payload;
178 	req.emr_in_length = MC_CMD_FILTER_OP_V3_IN_LEN;
179 	req.emr_out_buf = payload;
180 	req.emr_out_length = MC_CMD_FILTER_OP_EXT_OUT_LEN;
181 
182 	/*
183 	 * Remove match flag for encapsulated filters that does not correspond
184 	 * to the MCDI match flags
185 	 */
186 	match_flags = spec->efs_match_flags & ~EFX_FILTER_MATCH_ENCAP_TYPE;
187 
188 	switch (filter_op) {
189 	case MC_CMD_FILTER_OP_IN_OP_REPLACE:
190 		MCDI_IN_SET_DWORD(req, FILTER_OP_EXT_IN_HANDLE_LO,
191 		    handle->efh_lo);
192 		MCDI_IN_SET_DWORD(req, FILTER_OP_EXT_IN_HANDLE_HI,
193 		    handle->efh_hi);
194 		/* Fall through */
195 	case MC_CMD_FILTER_OP_IN_OP_INSERT:
196 	case MC_CMD_FILTER_OP_IN_OP_SUBSCRIBE:
197 		MCDI_IN_SET_DWORD(req, FILTER_OP_EXT_IN_OP, filter_op);
198 		break;
199 	default:
200 		EFSYS_ASSERT(0);
201 		rc = EINVAL;
202 		goto fail1;
203 	}
204 
205 	MCDI_IN_SET_DWORD(req, FILTER_OP_EXT_IN_PORT_ID, enp->en_vport_id);
206 	MCDI_IN_SET_DWORD(req, FILTER_OP_EXT_IN_MATCH_FIELDS,
207 	    match_flags);
208 	if (spec->efs_dmaq_id == EFX_FILTER_SPEC_RX_DMAQ_ID_DROP) {
209 		MCDI_IN_SET_DWORD(req, FILTER_OP_EXT_IN_RX_DEST,
210 		    MC_CMD_FILTER_OP_EXT_IN_RX_DEST_DROP);
211 	} else {
212 		MCDI_IN_SET_DWORD(req, FILTER_OP_EXT_IN_RX_DEST,
213 		    MC_CMD_FILTER_OP_EXT_IN_RX_DEST_HOST);
214 		MCDI_IN_SET_DWORD(req, FILTER_OP_EXT_IN_RX_QUEUE,
215 		    spec->efs_dmaq_id);
216 	}
217 
218 #if EFSYS_OPT_RX_SCALE
219 	if (spec->efs_flags & EFX_FILTER_FLAG_RX_RSS) {
220 		uint32_t rss_context;
221 
222 		if (spec->efs_rss_context == EFX_RSS_CONTEXT_DEFAULT)
223 			rss_context = enp->en_rss_context;
224 		else
225 			rss_context = spec->efs_rss_context;
226 		MCDI_IN_SET_DWORD(req, FILTER_OP_EXT_IN_RX_CONTEXT,
227 		    rss_context);
228 	}
229 #endif
230 
231 	MCDI_IN_SET_DWORD(req, FILTER_OP_EXT_IN_RX_MODE,
232 	    spec->efs_flags & EFX_FILTER_FLAG_RX_RSS ?
233 	    MC_CMD_FILTER_OP_EXT_IN_RX_MODE_RSS :
234 	    MC_CMD_FILTER_OP_EXT_IN_RX_MODE_SIMPLE);
235 	MCDI_IN_SET_DWORD(req, FILTER_OP_EXT_IN_TX_DEST,
236 	    MC_CMD_FILTER_OP_EXT_IN_TX_DEST_DEFAULT);
237 
238 	if (filter_op != MC_CMD_FILTER_OP_IN_OP_REPLACE) {
239 		/*
240 		 * NOTE: Unlike most MCDI requests, the filter fields
241 		 * are presented in network (big endian) byte order.
242 		 */
243 		memcpy(MCDI_IN2(req, uint8_t, FILTER_OP_EXT_IN_SRC_MAC),
244 		    spec->efs_rem_mac, EFX_MAC_ADDR_LEN);
245 		memcpy(MCDI_IN2(req, uint8_t, FILTER_OP_EXT_IN_DST_MAC),
246 		    spec->efs_loc_mac, EFX_MAC_ADDR_LEN);
247 
248 		MCDI_IN_SET_WORD(req, FILTER_OP_EXT_IN_SRC_PORT,
249 		    __CPU_TO_BE_16(spec->efs_rem_port));
250 		MCDI_IN_SET_WORD(req, FILTER_OP_EXT_IN_DST_PORT,
251 		    __CPU_TO_BE_16(spec->efs_loc_port));
252 
253 		MCDI_IN_SET_WORD(req, FILTER_OP_EXT_IN_ETHER_TYPE,
254 		    __CPU_TO_BE_16(spec->efs_ether_type));
255 
256 		MCDI_IN_SET_WORD(req, FILTER_OP_EXT_IN_INNER_VLAN,
257 		    __CPU_TO_BE_16(spec->efs_inner_vid));
258 		MCDI_IN_SET_WORD(req, FILTER_OP_EXT_IN_OUTER_VLAN,
259 		    __CPU_TO_BE_16(spec->efs_outer_vid));
260 
261 		/* IP protocol (in low byte, high byte is zero) */
262 		MCDI_IN_SET_BYTE(req, FILTER_OP_EXT_IN_IP_PROTO,
263 		    spec->efs_ip_proto);
264 
265 		EFX_STATIC_ASSERT(sizeof (spec->efs_rem_host) ==
266 		    MC_CMD_FILTER_OP_EXT_IN_SRC_IP_LEN);
267 		EFX_STATIC_ASSERT(sizeof (spec->efs_loc_host) ==
268 		    MC_CMD_FILTER_OP_EXT_IN_DST_IP_LEN);
269 
270 		memcpy(MCDI_IN2(req, uint8_t, FILTER_OP_EXT_IN_SRC_IP),
271 		    &spec->efs_rem_host.eo_byte[0],
272 		    MC_CMD_FILTER_OP_EXT_IN_SRC_IP_LEN);
273 		memcpy(MCDI_IN2(req, uint8_t, FILTER_OP_EXT_IN_DST_IP),
274 		    &spec->efs_loc_host.eo_byte[0],
275 		    MC_CMD_FILTER_OP_EXT_IN_DST_IP_LEN);
276 
277 		/*
278 		 * On Medford, filters for encapsulated packets match based on
279 		 * the ether type and IP protocol in the outer frame.  In
280 		 * addition we need to fill in the VNI or VSID type field.
281 		 */
282 		switch (spec->efs_encap_type) {
283 		case EFX_TUNNEL_PROTOCOL_NONE:
284 			break;
285 		case EFX_TUNNEL_PROTOCOL_VXLAN:
286 		case EFX_TUNNEL_PROTOCOL_GENEVE:
287 			MCDI_IN_POPULATE_DWORD_1(req,
288 			    FILTER_OP_EXT_IN_VNI_OR_VSID,
289 			    FILTER_OP_EXT_IN_VNI_TYPE,
290 			    spec->efs_encap_type == EFX_TUNNEL_PROTOCOL_VXLAN ?
291 				    MC_CMD_FILTER_OP_EXT_IN_VNI_TYPE_VXLAN :
292 				    MC_CMD_FILTER_OP_EXT_IN_VNI_TYPE_GENEVE);
293 			break;
294 		case EFX_TUNNEL_PROTOCOL_NVGRE:
295 			MCDI_IN_POPULATE_DWORD_1(req,
296 			    FILTER_OP_EXT_IN_VNI_OR_VSID,
297 			    FILTER_OP_EXT_IN_VSID_TYPE,
298 			    MC_CMD_FILTER_OP_EXT_IN_VSID_TYPE_NVGRE);
299 			break;
300 		default:
301 			EFSYS_ASSERT(0);
302 			rc = EINVAL;
303 			goto fail2;
304 		}
305 
306 		memcpy(MCDI_IN2(req, uint8_t, FILTER_OP_EXT_IN_VNI_OR_VSID),
307 		    spec->efs_vni_or_vsid, EFX_VNI_OR_VSID_LEN);
308 
309 		memcpy(MCDI_IN2(req, uint8_t, FILTER_OP_EXT_IN_IFRM_DST_MAC),
310 		    spec->efs_ifrm_loc_mac, EFX_MAC_ADDR_LEN);
311 	}
312 
313 	/*
314 	 * Set the "MARK" or "FLAG" action for all packets matching this filter
315 	 * if necessary (only useful with equal stride packed stream Rx mode
316 	 * which provide the information in pseudo-header).
317 	 * These actions require MC_CMD_FILTER_OP_V3_IN msgrequest.
318 	 */
319 	if ((spec->efs_flags & EFX_FILTER_FLAG_ACTION_MARK) &&
320 	    (spec->efs_flags & EFX_FILTER_FLAG_ACTION_FLAG)) {
321 		rc = EINVAL;
322 		goto fail3;
323 	}
324 	if (spec->efs_flags & EFX_FILTER_FLAG_ACTION_MARK) {
325 		MCDI_IN_SET_DWORD(req, FILTER_OP_V3_IN_MATCH_ACTION,
326 		    MC_CMD_FILTER_OP_V3_IN_MATCH_ACTION_MARK);
327 		MCDI_IN_SET_DWORD(req, FILTER_OP_V3_IN_MATCH_MARK_VALUE,
328 		    spec->efs_mark);
329 	} else if (spec->efs_flags & EFX_FILTER_FLAG_ACTION_FLAG) {
330 		MCDI_IN_SET_DWORD(req, FILTER_OP_V3_IN_MATCH_ACTION,
331 		    MC_CMD_FILTER_OP_V3_IN_MATCH_ACTION_FLAG);
332 	}
333 
334 	efx_mcdi_execute(enp, &req);
335 
336 	if (req.emr_rc != 0) {
337 		rc = req.emr_rc;
338 		goto fail4;
339 	}
340 
341 	if (req.emr_out_length_used < MC_CMD_FILTER_OP_EXT_OUT_LEN) {
342 		rc = EMSGSIZE;
343 		goto fail5;
344 	}
345 
346 	handle->efh_lo = MCDI_OUT_DWORD(req, FILTER_OP_EXT_OUT_HANDLE_LO);
347 	handle->efh_hi = MCDI_OUT_DWORD(req, FILTER_OP_EXT_OUT_HANDLE_HI);
348 
349 	return (0);
350 
351 fail5:
352 	EFSYS_PROBE(fail5);
353 fail4:
354 	EFSYS_PROBE(fail4);
355 fail3:
356 	EFSYS_PROBE(fail3);
357 fail2:
358 	EFSYS_PROBE(fail2);
359 fail1:
360 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
361 
362 	return (rc);
363 
364 }
365 
366 static	__checkReturn	efx_rc_t
efx_mcdi_filter_op_delete(__in efx_nic_t * enp,__in unsigned int filter_op,__inout ef10_filter_handle_t * handle)367 efx_mcdi_filter_op_delete(
368 	__in		efx_nic_t *enp,
369 	__in		unsigned int filter_op,
370 	__inout		ef10_filter_handle_t *handle)
371 {
372 	efx_mcdi_req_t req;
373 	EFX_MCDI_DECLARE_BUF(payload, MC_CMD_FILTER_OP_EXT_IN_LEN,
374 		MC_CMD_FILTER_OP_EXT_OUT_LEN);
375 	efx_rc_t rc;
376 
377 	req.emr_cmd = MC_CMD_FILTER_OP;
378 	req.emr_in_buf = payload;
379 	req.emr_in_length = MC_CMD_FILTER_OP_EXT_IN_LEN;
380 	req.emr_out_buf = payload;
381 	req.emr_out_length = MC_CMD_FILTER_OP_EXT_OUT_LEN;
382 
383 	switch (filter_op) {
384 	case MC_CMD_FILTER_OP_IN_OP_REMOVE:
385 		MCDI_IN_SET_DWORD(req, FILTER_OP_EXT_IN_OP,
386 		    MC_CMD_FILTER_OP_IN_OP_REMOVE);
387 		break;
388 	case MC_CMD_FILTER_OP_IN_OP_UNSUBSCRIBE:
389 		MCDI_IN_SET_DWORD(req, FILTER_OP_EXT_IN_OP,
390 		    MC_CMD_FILTER_OP_IN_OP_UNSUBSCRIBE);
391 		break;
392 	default:
393 		EFSYS_ASSERT(0);
394 		rc = EINVAL;
395 		goto fail1;
396 	}
397 
398 	MCDI_IN_SET_DWORD(req, FILTER_OP_EXT_IN_HANDLE_LO, handle->efh_lo);
399 	MCDI_IN_SET_DWORD(req, FILTER_OP_EXT_IN_HANDLE_HI, handle->efh_hi);
400 
401 	efx_mcdi_execute_quiet(enp, &req);
402 
403 	if (req.emr_rc != 0) {
404 		rc = req.emr_rc;
405 		goto fail2;
406 	}
407 
408 	if (req.emr_out_length_used < MC_CMD_FILTER_OP_EXT_OUT_LEN) {
409 		rc = EMSGSIZE;
410 		goto fail3;
411 	}
412 
413 	return (0);
414 
415 fail3:
416 	EFSYS_PROBE(fail3);
417 
418 fail2:
419 	EFSYS_PROBE(fail2);
420 fail1:
421 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
422 
423 	return (rc);
424 }
425 
426 static	__checkReturn	boolean_t
ef10_filter_equal(__in const efx_filter_spec_t * left,__in const efx_filter_spec_t * right)427 ef10_filter_equal(
428 	__in		const efx_filter_spec_t *left,
429 	__in		const efx_filter_spec_t *right)
430 {
431 	/* FIXME: Consider rx vs tx filters (look at efs_flags) */
432 	if (left->efs_match_flags != right->efs_match_flags)
433 		return (B_FALSE);
434 	if (!EFX_OWORD_IS_EQUAL(left->efs_rem_host, right->efs_rem_host))
435 		return (B_FALSE);
436 	if (!EFX_OWORD_IS_EQUAL(left->efs_loc_host, right->efs_loc_host))
437 		return (B_FALSE);
438 	if (memcmp(left->efs_rem_mac, right->efs_rem_mac, EFX_MAC_ADDR_LEN))
439 		return (B_FALSE);
440 	if (memcmp(left->efs_loc_mac, right->efs_loc_mac, EFX_MAC_ADDR_LEN))
441 		return (B_FALSE);
442 	if (left->efs_rem_port != right->efs_rem_port)
443 		return (B_FALSE);
444 	if (left->efs_loc_port != right->efs_loc_port)
445 		return (B_FALSE);
446 	if (left->efs_inner_vid != right->efs_inner_vid)
447 		return (B_FALSE);
448 	if (left->efs_outer_vid != right->efs_outer_vid)
449 		return (B_FALSE);
450 	if (left->efs_ether_type != right->efs_ether_type)
451 		return (B_FALSE);
452 	if (left->efs_ip_proto != right->efs_ip_proto)
453 		return (B_FALSE);
454 	if (left->efs_encap_type != right->efs_encap_type)
455 		return (B_FALSE);
456 	if (memcmp(left->efs_vni_or_vsid, right->efs_vni_or_vsid,
457 	    EFX_VNI_OR_VSID_LEN))
458 		return (B_FALSE);
459 	if (memcmp(left->efs_ifrm_loc_mac, right->efs_ifrm_loc_mac,
460 	    EFX_MAC_ADDR_LEN))
461 		return (B_FALSE);
462 
463 	return (B_TRUE);
464 
465 }
466 
467 static	__checkReturn	boolean_t
ef10_filter_same_dest(__in const efx_filter_spec_t * left,__in const efx_filter_spec_t * right)468 ef10_filter_same_dest(
469 	__in		const efx_filter_spec_t *left,
470 	__in		const efx_filter_spec_t *right)
471 {
472 	if ((left->efs_flags & EFX_FILTER_FLAG_RX_RSS) &&
473 	    (right->efs_flags & EFX_FILTER_FLAG_RX_RSS)) {
474 		if (left->efs_rss_context == right->efs_rss_context)
475 			return (B_TRUE);
476 	} else if ((~(left->efs_flags) & EFX_FILTER_FLAG_RX_RSS) &&
477 	    (~(right->efs_flags) & EFX_FILTER_FLAG_RX_RSS)) {
478 		if (left->efs_dmaq_id == right->efs_dmaq_id)
479 			return (B_TRUE);
480 	}
481 	return (B_FALSE);
482 }
483 
484 static	__checkReturn	uint32_t
ef10_filter_hash(__in efx_filter_spec_t * spec)485 ef10_filter_hash(
486 	__in		efx_filter_spec_t *spec)
487 {
488 	EFX_STATIC_ASSERT((sizeof (efx_filter_spec_t) % sizeof (uint32_t))
489 			    == 0);
490 	EFX_STATIC_ASSERT((EFX_FIELD_OFFSET(efx_filter_spec_t, efs_outer_vid) %
491 			    sizeof (uint32_t)) == 0);
492 
493 	/*
494 	 * As the area of the efx_filter_spec_t we need to hash is DWORD
495 	 * aligned and an exact number of DWORDs in size we can use the
496 	 * optimised efx_hash_dwords() rather than efx_hash_bytes()
497 	 */
498 	return (efx_hash_dwords((const uint32_t *)&spec->efs_outer_vid,
499 			(sizeof (efx_filter_spec_t) -
500 			EFX_FIELD_OFFSET(efx_filter_spec_t, efs_outer_vid)) /
501 			sizeof (uint32_t), 0));
502 }
503 
504 /*
505  * Decide whether a filter should be exclusive or else should allow
506  * delivery to additional recipients.  Currently we decide that
507  * filters for specific local unicast MAC and IP addresses are
508  * exclusive.
509  */
510 static	__checkReturn	boolean_t
ef10_filter_is_exclusive(__in efx_filter_spec_t * spec)511 ef10_filter_is_exclusive(
512 	__in		efx_filter_spec_t *spec)
513 {
514 	if ((spec->efs_match_flags & EFX_FILTER_MATCH_LOC_MAC) &&
515 	    !EFX_MAC_ADDR_IS_MULTICAST(spec->efs_loc_mac))
516 		return (B_TRUE);
517 
518 	if ((spec->efs_match_flags &
519 		(EFX_FILTER_MATCH_ETHER_TYPE | EFX_FILTER_MATCH_LOC_HOST)) ==
520 	    (EFX_FILTER_MATCH_ETHER_TYPE | EFX_FILTER_MATCH_LOC_HOST)) {
521 		if ((spec->efs_ether_type == EFX_ETHER_TYPE_IPV4) &&
522 		    ((spec->efs_loc_host.eo_u8[0] & 0xf) != 0xe))
523 			return (B_TRUE);
524 		if ((spec->efs_ether_type == EFX_ETHER_TYPE_IPV6) &&
525 		    (spec->efs_loc_host.eo_u8[0] != 0xff))
526 			return (B_TRUE);
527 	}
528 
529 	return (B_FALSE);
530 }
531 
532 	__checkReturn	efx_rc_t
ef10_filter_restore(__in efx_nic_t * enp)533 ef10_filter_restore(
534 	__in		efx_nic_t *enp)
535 {
536 	int tbl_id;
537 	efx_filter_spec_t *spec;
538 	ef10_filter_table_t *eftp = enp->en_filter.ef_ef10_filter_table;
539 	boolean_t restoring;
540 	efsys_lock_state_t state;
541 	efx_rc_t rc;
542 
543 	EFSYS_ASSERT(EFX_FAMILY_IS_EF100(enp) || EFX_FAMILY_IS_EF10(enp));
544 
545 	for (tbl_id = 0; tbl_id < EFX_EF10_FILTER_TBL_ROWS; tbl_id++) {
546 
547 		EFSYS_LOCK(enp->en_eslp, state);
548 
549 		spec = ef10_filter_entry_spec(eftp, tbl_id);
550 		if (spec == NULL) {
551 			restoring = B_FALSE;
552 		} else if (ef10_filter_entry_is_busy(eftp, tbl_id)) {
553 			/* Ignore busy entries. */
554 			restoring = B_FALSE;
555 		} else {
556 			ef10_filter_set_entry_busy(eftp, tbl_id);
557 			restoring = B_TRUE;
558 		}
559 
560 		EFSYS_UNLOCK(enp->en_eslp, state);
561 
562 		if (restoring == B_FALSE)
563 			continue;
564 
565 		if (ef10_filter_is_exclusive(spec)) {
566 			rc = efx_mcdi_filter_op_add(enp, spec,
567 			    MC_CMD_FILTER_OP_IN_OP_INSERT,
568 			    &eftp->eft_entry[tbl_id].efe_handle);
569 		} else {
570 			rc = efx_mcdi_filter_op_add(enp, spec,
571 			    MC_CMD_FILTER_OP_IN_OP_SUBSCRIBE,
572 			    &eftp->eft_entry[tbl_id].efe_handle);
573 		}
574 
575 		if (rc != 0)
576 			goto fail1;
577 
578 		EFSYS_LOCK(enp->en_eslp, state);
579 
580 		ef10_filter_set_entry_not_busy(eftp, tbl_id);
581 
582 		EFSYS_UNLOCK(enp->en_eslp, state);
583 	}
584 
585 	return (0);
586 
587 fail1:
588 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
589 
590 	return (rc);
591 }
592 
593 enum ef10_filter_add_action_e {
594 	/* Insert a new filter */
595 	EF10_FILTER_ADD_NEW,
596 	/*
597 	 * Replace old filter with a new, overriding the old one
598 	 * if it has lower priority.
599 	 */
600 	EF10_FILTER_ADD_REPLACE,
601 	/* Store new, lower priority filter as overridden by old filter */
602 	EF10_FILTER_ADD_STORE,
603 	/* Special case for AUTO filters, remove AUTO_OLD flag */
604 	EF10_FILTER_ADD_REFRESH,
605 };
606 
607 static	__checkReturn	efx_rc_t
ef10_filter_add_lookup_equal_spec(__in efx_filter_spec_t * spec,__in efx_filter_spec_t * probe_spec,__in efx_filter_replacement_policy_t policy,__out boolean_t * found)608 ef10_filter_add_lookup_equal_spec(
609 	__in		efx_filter_spec_t *spec,
610 	__in		efx_filter_spec_t *probe_spec,
611 	__in		efx_filter_replacement_policy_t policy,
612 	__out		boolean_t *found)
613 {
614 	efx_rc_t rc;
615 
616 	/* Refreshing AUTO filter */
617 	if (spec->efs_priority == EFX_FILTER_PRI_AUTO &&
618 	    probe_spec->efs_priority == EFX_FILTER_PRI_AUTO) {
619 		*found = B_TRUE;
620 		return (0);
621 	}
622 
623 	/*
624 	 * With exclusive filters, higher priority ones
625 	 * override lower priority ones, and lower priority
626 	 * ones are stored in case the higher priority one
627 	 * is removed.
628 	 */
629 	if (ef10_filter_is_exclusive(spec)) {
630 		switch (policy) {
631 		case EFX_FILTER_REPLACEMENT_HIGHER_OR_EQUAL_PRIORITY:
632 			if (spec->efs_priority == probe_spec->efs_priority) {
633 				*found = B_TRUE;
634 				break;
635 			}
636 			/* Fall-through */
637 		case EFX_FILTER_REPLACEMENT_HIGHER_PRIORITY:
638 			if (spec->efs_priority > probe_spec->efs_priority) {
639 				*found = B_TRUE;
640 				break;
641 			}
642 			/* Fall-through */
643 		case EFX_FILTER_REPLACEMENT_NEVER:
644 			/*
645 			 * Lower priority filter needs to be
646 			 * stored. It does *not* replace the
647 			 * old one. That is why EEXIST is not
648 			 * returned in that case.
649 			 */
650 			if (spec->efs_priority < probe_spec->efs_priority) {
651 				*found = B_TRUE;
652 				break;
653 			} else {
654 				rc = EEXIST;
655 				goto fail1;
656 			}
657 		default:
658 			EFSYS_ASSERT(0);
659 			rc = EEXIST;
660 			goto fail2;
661 		}
662 	} else {
663 		*found = B_FALSE;
664 	}
665 
666 	return (0);
667 
668 fail2:
669 	EFSYS_PROBE(fail2);
670 
671 fail1:
672 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
673 
674 	return (rc);
675 }
676 
677 
678 static			void
ef10_filter_add_select_action(__in efx_filter_spec_t * saved_spec,__in efx_filter_spec_t * spec,__out enum ef10_filter_add_action_e * action,__out efx_filter_spec_t ** overridden_spec)679 ef10_filter_add_select_action(
680 	__in		efx_filter_spec_t *saved_spec,
681 	__in		efx_filter_spec_t *spec,
682 	__out		enum ef10_filter_add_action_e *action,
683 	__out		efx_filter_spec_t **overridden_spec)
684 {
685 	efx_filter_spec_t *overridden = NULL;
686 
687 	if (saved_spec == NULL) {
688 		*action = EF10_FILTER_ADD_NEW;
689 	} else if (ef10_filter_is_exclusive(spec) == B_FALSE) {
690 		/*
691 		 * Non-exclusive filters are always stored in separate entries
692 		 * in the table. The only case involving a saved spec is
693 		 * refreshing an AUTO filter.
694 		 */
695 		EFSYS_ASSERT(saved_spec->efs_overridden_spec == NULL);
696 		EFSYS_ASSERT(spec->efs_priority == EFX_FILTER_PRI_AUTO);
697 		EFSYS_ASSERT(saved_spec->efs_priority == EFX_FILTER_PRI_AUTO);
698 		*action = EF10_FILTER_ADD_REFRESH;
699 	} else {
700 		/* Exclusive filters stored in the same entry */
701 		if (spec->efs_priority > saved_spec->efs_priority) {
702 			/*
703 			 * Insert a high priority filter over a lower priority
704 			 * one. Only two priority levels are implemented, so
705 			 * there must not already be an overridden filter.
706 			 */
707 			EFX_STATIC_ASSERT(EFX_FILTER_NPRI == 2);
708 			EFSYS_ASSERT(saved_spec->efs_overridden_spec == NULL);
709 			overridden = saved_spec;
710 			*action = EF10_FILTER_ADD_REPLACE;
711 		} else if (spec->efs_priority == saved_spec->efs_priority) {
712 			/* Replace in-place or refresh an existing filter */
713 			if (spec->efs_priority == EFX_FILTER_PRI_AUTO)
714 				*action = EF10_FILTER_ADD_REFRESH;
715 			else
716 				*action = EF10_FILTER_ADD_REPLACE;
717 		} else {
718 			/*
719 			 * Insert a lower priority filter, storing it in case
720 			 * the higher priority filter is removed.
721 			 *
722 			 * Currently there are only two priority levels, so this
723 			 * must be an AUTO filter.
724 			 */
725 			EFX_STATIC_ASSERT(EFX_FILTER_NPRI == 2);
726 			EFSYS_ASSERT(spec->efs_priority == EFX_FILTER_PRI_AUTO);
727 			if (saved_spec->efs_overridden_spec != NULL) {
728 				*action = EF10_FILTER_ADD_REFRESH;
729 			} else {
730 				overridden = spec;
731 				*action = EF10_FILTER_ADD_STORE;
732 			}
733 		}
734 	}
735 
736 	*overridden_spec = overridden;
737 }
738 
739 static	__checkReturn	efx_rc_t
ef10_filter_add_execute_action(__in efx_nic_t * enp,__in efx_filter_spec_t * saved_spec,__in efx_filter_spec_t * spec,__in efx_filter_spec_t * overridden_spec,__in enum ef10_filter_add_action_e action,__in int ins_index)740 ef10_filter_add_execute_action(
741 	__in		efx_nic_t *enp,
742 	__in		efx_filter_spec_t *saved_spec,
743 	__in		efx_filter_spec_t *spec,
744 	__in		efx_filter_spec_t *overridden_spec,
745 	__in		enum ef10_filter_add_action_e action,
746 	__in		int ins_index)
747 {
748 	ef10_filter_table_t *eftp = enp->en_filter.ef_ef10_filter_table;
749 	efsys_lock_state_t state;
750 	efx_rc_t rc;
751 
752 	EFSYS_LOCK(enp->en_eslp, state);
753 
754 	if (action == EF10_FILTER_ADD_REFRESH) {
755 		ef10_filter_set_entry_not_auto_old(eftp, ins_index);
756 		goto out_unlock;
757 	} else if (action == EF10_FILTER_ADD_STORE) {
758 		EFSYS_ASSERT(overridden_spec != NULL);
759 		saved_spec->efs_overridden_spec = overridden_spec;
760 		goto out_unlock;
761 	}
762 
763 	EFSYS_UNLOCK(enp->en_eslp, state);
764 
765 	switch (action) {
766 	case EF10_FILTER_ADD_REPLACE:
767 		/*
768 		 * On replacing the filter handle may change after a
769 		 * successful replace operation.
770 		 */
771 		rc = efx_mcdi_filter_op_add(enp, spec,
772 		    MC_CMD_FILTER_OP_IN_OP_REPLACE,
773 		    &eftp->eft_entry[ins_index].efe_handle);
774 		break;
775 	case EF10_FILTER_ADD_NEW:
776 		if (ef10_filter_is_exclusive(spec)) {
777 			rc = efx_mcdi_filter_op_add(enp, spec,
778 			    MC_CMD_FILTER_OP_IN_OP_INSERT,
779 			    &eftp->eft_entry[ins_index].efe_handle);
780 		} else {
781 			rc = efx_mcdi_filter_op_add(enp, spec,
782 			    MC_CMD_FILTER_OP_IN_OP_SUBSCRIBE,
783 			    &eftp->eft_entry[ins_index].efe_handle);
784 		}
785 		break;
786 	default:
787 		rc = EINVAL;
788 		EFSYS_ASSERT(0);
789 		break;
790 	}
791 	if (rc != 0)
792 		goto fail1;
793 
794 	EFSYS_LOCK(enp->en_eslp, state);
795 
796 	if (action == EF10_FILTER_ADD_REPLACE) {
797 		/* Update the fields that may differ */
798 		saved_spec->efs_priority = spec->efs_priority;
799 		saved_spec->efs_flags = spec->efs_flags;
800 		saved_spec->efs_rss_context = spec->efs_rss_context;
801 		saved_spec->efs_dmaq_id = spec->efs_dmaq_id;
802 
803 		if (overridden_spec != NULL)
804 			saved_spec->efs_overridden_spec = overridden_spec;
805 	}
806 
807 out_unlock:
808 	EFSYS_UNLOCK(enp->en_eslp, state);
809 
810 	return (0);
811 
812 fail1:
813 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
814 
815 	return (rc);
816 }
817 
818 /*
819  * An arbitrary search limit for the software hash table. As per the linux net
820  * driver.
821  */
822 #define	EF10_FILTER_SEARCH_LIMIT 200
823 
824 static	__checkReturn	efx_rc_t
ef10_filter_add_internal(__in efx_nic_t * enp,__inout efx_filter_spec_t * spec,__in efx_filter_replacement_policy_t policy,__out_opt uint32_t * filter_id)825 ef10_filter_add_internal(
826 	__in		efx_nic_t *enp,
827 	__inout		efx_filter_spec_t *spec,
828 	__in		efx_filter_replacement_policy_t policy,
829 	__out_opt	uint32_t *filter_id)
830 {
831 	efx_rc_t rc;
832 	ef10_filter_table_t *eftp = enp->en_filter.ef_ef10_filter_table;
833 	enum ef10_filter_add_action_e action;
834 	efx_filter_spec_t *overridden_spec = NULL;
835 	efx_filter_spec_t *saved_spec;
836 	uint32_t hash;
837 	unsigned int depth;
838 	int ins_index;
839 	efsys_lock_state_t state;
840 	boolean_t locked = B_FALSE;
841 
842 	EFSYS_ASSERT(EFX_FAMILY_IS_EF100(enp) || EFX_FAMILY_IS_EF10(enp));
843 
844 	EFSYS_ASSERT(spec->efs_overridden_spec == NULL);
845 
846 	hash = ef10_filter_hash(spec);
847 
848 	/*
849 	 * FIXME: Add support for inserting filters of different priorities
850 	 * and removing lower priority multicast filters (bug 42378)
851 	 */
852 
853 	/*
854 	 * Find any existing filters with the same match tuple or
855 	 * else a free slot to insert at.  If any of them are busy,
856 	 * we have to wait and retry.
857 	 */
858 retry:
859 	EFSYS_LOCK(enp->en_eslp, state);
860 	locked = B_TRUE;
861 
862 	ins_index = -1;
863 
864 	for (depth = 1; depth <= EF10_FILTER_SEARCH_LIMIT; depth++) {
865 		unsigned int probe_index;
866 		efx_filter_spec_t *probe_spec;
867 
868 		probe_index = (hash + depth) & (EFX_EF10_FILTER_TBL_ROWS - 1);
869 		probe_spec = ef10_filter_entry_spec(eftp, probe_index);
870 
871 		if (probe_spec == NULL) {
872 			if (ins_index < 0)
873 				ins_index = probe_index;
874 		} else if (ef10_filter_equal(spec, probe_spec)) {
875 			boolean_t found;
876 
877 			if (ef10_filter_entry_is_busy(eftp, probe_index)) {
878 				EFSYS_UNLOCK(enp->en_eslp, state);
879 				locked = B_FALSE;
880 				goto retry;
881 			}
882 
883 			rc = ef10_filter_add_lookup_equal_spec(spec,
884 			    probe_spec, policy, &found);
885 			if (rc != 0)
886 				goto fail1;
887 
888 			if (found != B_FALSE) {
889 				ins_index = probe_index;
890 				break;
891 			}
892 		}
893 	}
894 
895 	/*
896 	 * Once we reach the maximum search depth, use the first suitable slot
897 	 * or return EBUSY if there was none.
898 	 */
899 	if (ins_index < 0) {
900 		rc = EBUSY;
901 		goto fail2;
902 	}
903 
904 	/*
905 	 * Mark software table entry busy. We might yet fail to insert,
906 	 * but any attempt to insert a conflicting filter while we're
907 	 * waiting for the firmware must find the busy entry.
908 	 */
909 	ef10_filter_set_entry_busy(eftp, ins_index);
910 
911 	saved_spec = ef10_filter_entry_spec(eftp, ins_index);
912 	ef10_filter_add_select_action(saved_spec, spec, &action,
913 	    &overridden_spec);
914 
915 	/*
916 	 * Allocate a new filter if found entry is empty or
917 	 * a filter should be overridden.
918 	 */
919 	if (overridden_spec != NULL || saved_spec == NULL) {
920 		efx_filter_spec_t *new_spec;
921 
922 		EFSYS_UNLOCK(enp->en_eslp, state);
923 		locked = B_FALSE;
924 
925 		EFSYS_KMEM_ALLOC(enp->en_esip, sizeof (*new_spec), new_spec);
926 		if (new_spec == NULL) {
927 			rc = ENOMEM;
928 			overridden_spec = NULL;
929 			goto fail3;
930 		}
931 
932 		EFSYS_LOCK(enp->en_eslp, state);
933 		locked = B_TRUE;
934 
935 		if (saved_spec == NULL) {
936 			*new_spec = *spec;
937 			ef10_filter_set_entry(eftp, ins_index, new_spec);
938 		} else {
939 			*new_spec = *overridden_spec;
940 			overridden_spec = new_spec;
941 		}
942 	}
943 
944 	EFSYS_UNLOCK(enp->en_eslp, state);
945 	locked = B_FALSE;
946 
947 	rc = ef10_filter_add_execute_action(enp, saved_spec, spec,
948 	    overridden_spec, action, ins_index);
949 	if (rc != 0)
950 		goto fail4;
951 
952 	if (filter_id)
953 		*filter_id = ins_index;
954 
955 	EFSYS_LOCK(enp->en_eslp, state);
956 	ef10_filter_set_entry_not_busy(eftp, ins_index);
957 	EFSYS_UNLOCK(enp->en_eslp, state);
958 
959 	return (0);
960 
961 fail4:
962 	EFSYS_PROBE(fail4);
963 
964 	EFSYS_ASSERT(locked == B_FALSE);
965 	EFSYS_LOCK(enp->en_eslp, state);
966 
967 	if (action == EF10_FILTER_ADD_NEW) {
968 		EFSYS_KMEM_FREE(enp->en_esip, sizeof (*spec),
969 		    ef10_filter_entry_spec(eftp, ins_index));
970 		ef10_filter_set_entry(eftp, ins_index, NULL);
971 	}
972 
973 	EFSYS_UNLOCK(enp->en_eslp, state);
974 
975 	if (overridden_spec != NULL)
976 		EFSYS_KMEM_FREE(enp->en_esip, sizeof (*spec), overridden_spec);
977 
978 fail3:
979 	EFSYS_PROBE(fail3);
980 
981 	EFSYS_ASSERT(locked == B_FALSE);
982 	EFSYS_LOCK(enp->en_eslp, state);
983 
984 	ef10_filter_set_entry_not_busy(eftp, ins_index);
985 
986 	EFSYS_UNLOCK(enp->en_eslp, state);
987 
988 fail2:
989 	EFSYS_PROBE(fail2);
990 
991 fail1:
992 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
993 
994 	if (locked)
995 		EFSYS_UNLOCK(enp->en_eslp, state);
996 
997 	return (rc);
998 }
999 
1000 	__checkReturn	efx_rc_t
ef10_filter_add(__in efx_nic_t * enp,__inout efx_filter_spec_t * spec,__in enum efx_filter_replacement_policy_e policy)1001 ef10_filter_add(
1002 	__in		efx_nic_t *enp,
1003 	__inout		efx_filter_spec_t *spec,
1004 	__in		enum efx_filter_replacement_policy_e policy)
1005 {
1006 	efx_rc_t rc;
1007 
1008 	rc = ef10_filter_add_internal(enp, spec, policy, NULL);
1009 	if (rc != 0)
1010 		goto fail1;
1011 
1012 	return (0);
1013 
1014 fail1:
1015 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
1016 
1017 	return (rc);
1018 }
1019 
1020 /*
1021  * Delete a filter by index from the filter table with priority
1022  * that is not higher than specified.
1023  */
1024 static	__checkReturn	efx_rc_t
ef10_filter_delete_internal(__in efx_nic_t * enp,__in uint32_t filter_id,__in efx_filter_priority_t priority)1025 ef10_filter_delete_internal(
1026 	__in		efx_nic_t *enp,
1027 	__in		uint32_t filter_id,
1028 	__in		efx_filter_priority_t priority)
1029 {
1030 	efx_rc_t rc;
1031 	ef10_filter_table_t *table = enp->en_filter.ef_ef10_filter_table;
1032 	efx_filter_spec_t *spec;
1033 	efsys_lock_state_t state;
1034 	uint32_t filter_idx = filter_id % EFX_EF10_FILTER_TBL_ROWS;
1035 
1036 	/*
1037 	 * Find the software table entry and mark it busy.  Don't
1038 	 * remove it yet; any attempt to update while we're waiting
1039 	 * for the firmware must find the busy entry.
1040 	 *
1041 	 * FIXME: What if the busy flag is never cleared?
1042 	 */
1043 	EFSYS_LOCK(enp->en_eslp, state);
1044 	while (ef10_filter_entry_is_busy(table, filter_idx)) {
1045 		EFSYS_UNLOCK(enp->en_eslp, state);
1046 		EFSYS_SPIN(1);
1047 		EFSYS_LOCK(enp->en_eslp, state);
1048 	}
1049 	if ((spec = ef10_filter_entry_spec(table, filter_idx)) != NULL) {
1050 		if (spec->efs_priority <= priority)
1051 			ef10_filter_set_entry_busy(table, filter_idx);
1052 	}
1053 	EFSYS_UNLOCK(enp->en_eslp, state);
1054 
1055 	if (spec == NULL) {
1056 		rc = ENOENT;
1057 		goto fail1;
1058 	}
1059 
1060 	if (spec->efs_priority > priority) {
1061 		/*
1062 		 * Applied filter stays, but overridden filter is removed since
1063 		 * next user request to delete the applied filter should not
1064 		 * restore outdated filter.
1065 		 */
1066 		if (spec->efs_overridden_spec != NULL) {
1067 			EFSYS_ASSERT(spec->efs_overridden_spec->efs_overridden_spec ==
1068 			    NULL);
1069 			EFSYS_KMEM_FREE(enp->en_esip, sizeof (*spec),
1070 			    spec->efs_overridden_spec);
1071 			spec->efs_overridden_spec = NULL;
1072 		}
1073 	} else {
1074 		/*
1075 		 * Try to remove the hardware filter or replace it with the
1076 		 * saved automatic filter. This may fail if the MC has
1077 		 * rebooted (which frees all hardware filter resources).
1078 		 */
1079 		if (spec->efs_overridden_spec != NULL) {
1080 			rc = efx_mcdi_filter_op_add(enp,
1081 			    spec->efs_overridden_spec,
1082 			    MC_CMD_FILTER_OP_IN_OP_REPLACE,
1083 			    &table->eft_entry[filter_idx].efe_handle);
1084 		} else if (ef10_filter_is_exclusive(spec)) {
1085 			rc = efx_mcdi_filter_op_delete(enp,
1086 			    MC_CMD_FILTER_OP_IN_OP_REMOVE,
1087 			    &table->eft_entry[filter_idx].efe_handle);
1088 		} else {
1089 			rc = efx_mcdi_filter_op_delete(enp,
1090 			    MC_CMD_FILTER_OP_IN_OP_UNSUBSCRIBE,
1091 			    &table->eft_entry[filter_idx].efe_handle);
1092 		}
1093 
1094 		/* Free the software table entry */
1095 		EFSYS_LOCK(enp->en_eslp, state);
1096 		ef10_filter_set_entry_not_busy(table, filter_idx);
1097 		ef10_filter_set_entry(table, filter_idx,
1098 		    spec->efs_overridden_spec);
1099 		EFSYS_UNLOCK(enp->en_eslp, state);
1100 
1101 		EFSYS_KMEM_FREE(enp->en_esip, sizeof (*spec), spec);
1102 
1103 		/* Check result of hardware filter removal */
1104 		if (rc != 0)
1105 			goto fail2;
1106 	}
1107 
1108 	return (0);
1109 
1110 fail2:
1111 	EFSYS_PROBE(fail2);
1112 
1113 fail1:
1114 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
1115 
1116 	return (rc);
1117 }
1118 
1119 static			void
ef10_filter_delete_auto(__in efx_nic_t * enp,__in uint32_t filter_id)1120 ef10_filter_delete_auto(
1121 	__in		efx_nic_t *enp,
1122 	__in		uint32_t filter_id)
1123 {
1124 	ef10_filter_table_t *table = enp->en_filter.ef_ef10_filter_table;
1125 	uint32_t filter_idx = filter_id % EFX_EF10_FILTER_TBL_ROWS;
1126 
1127 	/*
1128 	 * AUTO_OLD flag is cleared since the auto filter that is to be removed
1129 	 * may not be the filter at the specified index itself, but the filter
1130 	 * that is overridden by it.
1131 	 */
1132 	ef10_filter_set_entry_not_auto_old(table, filter_idx);
1133 
1134 	(void) ef10_filter_delete_internal(enp, filter_idx,
1135 	    EFX_FILTER_PRI_AUTO);
1136 }
1137 
1138 	__checkReturn	efx_rc_t
ef10_filter_delete(__in efx_nic_t * enp,__inout efx_filter_spec_t * spec)1139 ef10_filter_delete(
1140 	__in		efx_nic_t *enp,
1141 	__inout		efx_filter_spec_t *spec)
1142 {
1143 	efx_rc_t rc;
1144 	ef10_filter_table_t *table = enp->en_filter.ef_ef10_filter_table;
1145 	efx_filter_spec_t *saved_spec;
1146 	unsigned int hash;
1147 	unsigned int depth;
1148 	unsigned int i;
1149 	efsys_lock_state_t state;
1150 	boolean_t locked = B_FALSE;
1151 
1152 	EFSYS_ASSERT(EFX_FAMILY_IS_EF100(enp) || EFX_FAMILY_IS_EF10(enp));
1153 
1154 	hash = ef10_filter_hash(spec);
1155 
1156 	EFSYS_LOCK(enp->en_eslp, state);
1157 	locked = B_TRUE;
1158 
1159 	depth = 1;
1160 	for (;;) {
1161 		i = (hash + depth) & (EFX_EF10_FILTER_TBL_ROWS - 1);
1162 		saved_spec = ef10_filter_entry_spec(table, i);
1163 		if (saved_spec && ef10_filter_equal(spec, saved_spec) &&
1164 		    ef10_filter_same_dest(spec, saved_spec) &&
1165 		    saved_spec->efs_priority == EFX_FILTER_PRI_MANUAL) {
1166 			break;
1167 		}
1168 		if (depth == EF10_FILTER_SEARCH_LIMIT) {
1169 			rc = ENOENT;
1170 			goto fail1;
1171 		}
1172 		depth++;
1173 	}
1174 
1175 	EFSYS_UNLOCK(enp->en_eslp, state);
1176 	locked = B_FALSE;
1177 
1178 	rc = ef10_filter_delete_internal(enp, i, EFX_FILTER_PRI_MANUAL);
1179 	if (rc != 0)
1180 		goto fail2;
1181 
1182 	return (0);
1183 
1184 fail2:
1185 	EFSYS_PROBE(fail2);
1186 
1187 fail1:
1188 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
1189 
1190 	if (locked)
1191 		EFSYS_UNLOCK(enp->en_eslp, state);
1192 
1193 	return (rc);
1194 }
1195 
1196 static	__checkReturn	efx_rc_t
efx_mcdi_get_parser_disp_info(__in efx_nic_t * enp,__out_ecount (buffer_length)uint32_t * buffer,__in size_t buffer_length,__in boolean_t encap,__out size_t * list_lengthp)1197 efx_mcdi_get_parser_disp_info(
1198 	__in				efx_nic_t *enp,
1199 	__out_ecount(buffer_length)	uint32_t *buffer,
1200 	__in				size_t buffer_length,
1201 	__in				boolean_t encap,
1202 	__out				size_t *list_lengthp)
1203 {
1204 	efx_mcdi_req_t req;
1205 	EFX_MCDI_DECLARE_BUF(payload, MC_CMD_GET_PARSER_DISP_INFO_IN_LEN,
1206 		MC_CMD_GET_PARSER_DISP_INFO_OUT_LENMAX);
1207 	size_t matches_count;
1208 	size_t list_size;
1209 	efx_rc_t rc;
1210 
1211 	req.emr_cmd = MC_CMD_GET_PARSER_DISP_INFO;
1212 	req.emr_in_buf = payload;
1213 	req.emr_in_length = MC_CMD_GET_PARSER_DISP_INFO_IN_LEN;
1214 	req.emr_out_buf = payload;
1215 	req.emr_out_length = MC_CMD_GET_PARSER_DISP_INFO_OUT_LENMAX;
1216 
1217 	MCDI_IN_SET_DWORD(req, GET_PARSER_DISP_INFO_OUT_OP, encap ?
1218 	    MC_CMD_GET_PARSER_DISP_INFO_IN_OP_GET_SUPPORTED_ENCAP_RX_MATCHES :
1219 	    MC_CMD_GET_PARSER_DISP_INFO_IN_OP_GET_SUPPORTED_RX_MATCHES);
1220 
1221 	efx_mcdi_execute(enp, &req);
1222 
1223 	if (req.emr_rc != 0) {
1224 		rc = req.emr_rc;
1225 		goto fail1;
1226 	}
1227 
1228 	matches_count = MCDI_OUT_DWORD(req,
1229 	    GET_PARSER_DISP_INFO_OUT_NUM_SUPPORTED_MATCHES);
1230 
1231 	if (req.emr_out_length_used <
1232 	    MC_CMD_GET_PARSER_DISP_INFO_OUT_LEN(matches_count)) {
1233 		rc = EMSGSIZE;
1234 		goto fail2;
1235 	}
1236 
1237 	*list_lengthp = matches_count;
1238 
1239 	if (buffer_length < matches_count) {
1240 		rc = ENOSPC;
1241 		goto fail3;
1242 	}
1243 
1244 	/*
1245 	 * Check that the elements in the list in the MCDI response are the size
1246 	 * we expect, so we can just copy them directly. Any conversion of the
1247 	 * flags is handled by the caller.
1248 	 */
1249 	EFX_STATIC_ASSERT(sizeof (uint32_t) ==
1250 	    MC_CMD_GET_PARSER_DISP_INFO_OUT_SUPPORTED_MATCHES_LEN);
1251 
1252 	list_size = matches_count *
1253 		MC_CMD_GET_PARSER_DISP_INFO_OUT_SUPPORTED_MATCHES_LEN;
1254 	memcpy(buffer,
1255 	    MCDI_OUT2(req, uint32_t,
1256 		    GET_PARSER_DISP_INFO_OUT_SUPPORTED_MATCHES),
1257 	    list_size);
1258 
1259 	return (0);
1260 
1261 fail3:
1262 	EFSYS_PROBE(fail3);
1263 fail2:
1264 	EFSYS_PROBE(fail2);
1265 fail1:
1266 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
1267 
1268 	return (rc);
1269 }
1270 
1271 	__checkReturn	efx_rc_t
ef10_filter_supported_filters(__in efx_nic_t * enp,__out_ecount (buffer_length)uint32_t * buffer,__in size_t buffer_length,__out size_t * list_lengthp)1272 ef10_filter_supported_filters(
1273 	__in				efx_nic_t *enp,
1274 	__out_ecount(buffer_length)	uint32_t *buffer,
1275 	__in				size_t buffer_length,
1276 	__out				size_t *list_lengthp)
1277 {
1278 	efx_nic_cfg_t *encp = &(enp->en_nic_cfg);
1279 	size_t mcdi_list_length;
1280 	size_t mcdi_encap_list_length;
1281 	size_t list_length;
1282 	uint32_t i;
1283 	uint32_t next_buf_idx;
1284 	size_t next_buf_length;
1285 	efx_rc_t rc;
1286 	boolean_t no_space = B_FALSE;
1287 	efx_filter_match_flags_t all_filter_flags =
1288 	    (EFX_FILTER_MATCH_REM_HOST | EFX_FILTER_MATCH_LOC_HOST |
1289 	    EFX_FILTER_MATCH_REM_MAC | EFX_FILTER_MATCH_REM_PORT |
1290 	    EFX_FILTER_MATCH_LOC_MAC | EFX_FILTER_MATCH_LOC_PORT |
1291 	    EFX_FILTER_MATCH_ETHER_TYPE | EFX_FILTER_MATCH_INNER_VID |
1292 	    EFX_FILTER_MATCH_OUTER_VID | EFX_FILTER_MATCH_IP_PROTO |
1293 	    EFX_FILTER_MATCH_VNI_OR_VSID |
1294 	    EFX_FILTER_MATCH_IFRM_LOC_MAC |
1295 	    EFX_FILTER_MATCH_IFRM_UNKNOWN_MCAST_DST |
1296 	    EFX_FILTER_MATCH_IFRM_UNKNOWN_UCAST_DST |
1297 	    EFX_FILTER_MATCH_ENCAP_TYPE |
1298 	    EFX_FILTER_MATCH_UNKNOWN_MCAST_DST |
1299 	    EFX_FILTER_MATCH_UNKNOWN_UCAST_DST);
1300 
1301 	/*
1302 	 * Two calls to MC_CMD_GET_PARSER_DISP_INFO are needed: one to get the
1303 	 * list of supported filters for ordinary packets, and then another to
1304 	 * get the list of supported filters for encapsulated packets. To
1305 	 * distinguish the second list from the first, the
1306 	 * EFX_FILTER_MATCH_ENCAP_TYPE flag is added to each filter for
1307 	 * encapsulated packets.
1308 	 */
1309 	rc = efx_mcdi_get_parser_disp_info(enp, buffer, buffer_length, B_FALSE,
1310 	    &mcdi_list_length);
1311 	if (rc != 0) {
1312 		if (rc == ENOSPC)
1313 			no_space = B_TRUE;
1314 		else
1315 			goto fail1;
1316 	}
1317 
1318 	if (no_space) {
1319 		next_buf_idx = 0;
1320 		next_buf_length = 0;
1321 	} else {
1322 		EFSYS_ASSERT(mcdi_list_length <= buffer_length);
1323 		next_buf_idx = mcdi_list_length;
1324 		next_buf_length = buffer_length - mcdi_list_length;
1325 	}
1326 
1327 	if (encp->enc_tunnel_encapsulations_supported != 0) {
1328 		rc = efx_mcdi_get_parser_disp_info(enp, &buffer[next_buf_idx],
1329 		    next_buf_length, B_TRUE, &mcdi_encap_list_length);
1330 		if (rc != 0) {
1331 			if (rc == ENOSPC) {
1332 				no_space = B_TRUE;
1333 			} else if (rc == EINVAL) {
1334 				/*
1335 				 * Do not fail if the MCDI do not recognize the
1336 				 * query for encapsulated packet filters.
1337 				 */
1338 				mcdi_encap_list_length = 0;
1339 			} else
1340 				goto fail2;
1341 		} else {
1342 			for (i = next_buf_idx;
1343 			    i < next_buf_idx + mcdi_encap_list_length; i++)
1344 				buffer[i] |= EFX_FILTER_MATCH_ENCAP_TYPE;
1345 		}
1346 	} else {
1347 		mcdi_encap_list_length = 0;
1348 	}
1349 
1350 	if (no_space) {
1351 		*list_lengthp = mcdi_list_length + mcdi_encap_list_length;
1352 		rc = ENOSPC;
1353 		goto fail3;
1354 	}
1355 
1356 	/*
1357 	 * The static assertions in ef10_filter_init() ensure that the values of
1358 	 * the EFX_FILTER_MATCH flags match those used by MCDI, so they don't
1359 	 * need to be converted.
1360 	 *
1361 	 * In case support is added to MCDI for additional flags, remove any
1362 	 * matches from the list which include flags we don't support. The order
1363 	 * of the matches is preserved as they are ordered from highest to
1364 	 * lowest priority.
1365 	 */
1366 	EFSYS_ASSERT(mcdi_list_length + mcdi_encap_list_length <=
1367 	    buffer_length);
1368 	list_length = 0;
1369 	for (i = 0; i < mcdi_list_length + mcdi_encap_list_length; i++) {
1370 		if ((buffer[i] & ~all_filter_flags) == 0) {
1371 			buffer[list_length] = buffer[i];
1372 			list_length++;
1373 		}
1374 	}
1375 
1376 	*list_lengthp = list_length;
1377 
1378 	return (0);
1379 
1380 fail3:
1381 	EFSYS_PROBE(fail3);
1382 fail2:
1383 	EFSYS_PROBE(fail2);
1384 fail1:
1385 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
1386 
1387 	return (rc);
1388 }
1389 
1390 static	__checkReturn	efx_rc_t
1391 ef10_filter_insert_unicast(
1392 	__in				efx_nic_t *enp,
1393 	__in_ecount(6)			uint8_t const *addr,
1394 	__in				efx_filter_flags_t filter_flags)
1395 {
1396 	ef10_filter_table_t *eftp = enp->en_filter.ef_ef10_filter_table;
1397 	efx_filter_spec_t spec;
1398 	efx_rc_t rc;
1399 
1400 	/* Insert the filter for the local station address */
1401 	efx_filter_spec_init_rx(&spec, EFX_FILTER_PRI_AUTO,
1402 	    filter_flags,
1403 	    eftp->eft_default_rxq);
1404 	rc = efx_filter_spec_set_eth_local(&spec, EFX_FILTER_SPEC_VID_UNSPEC,
1405 	    addr);
1406 	if (rc != 0)
1407 		goto fail1;
1408 
1409 	rc = ef10_filter_add_internal(enp, &spec, EFX_FILTER_REPLACEMENT_NEVER,
1410 	    &eftp->eft_unicst_filter_indexes[eftp->eft_unicst_filter_count]);
1411 	if (rc != 0)
1412 		goto fail2;
1413 
1414 	eftp->eft_unicst_filter_count++;
1415 	EFSYS_ASSERT(eftp->eft_unicst_filter_count <=
1416 		    EFX_EF10_FILTER_UNICAST_FILTERS_MAX);
1417 
1418 	return (0);
1419 
1420 fail2:
1421 	EFSYS_PROBE(fail2);
1422 fail1:
1423 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
1424 	return (rc);
1425 }
1426 
1427 static	__checkReturn	efx_rc_t
ef10_filter_insert_all_unicast(__in efx_nic_t * enp,__in efx_filter_flags_t filter_flags)1428 ef10_filter_insert_all_unicast(
1429 	__in				efx_nic_t *enp,
1430 	__in				efx_filter_flags_t filter_flags)
1431 {
1432 	ef10_filter_table_t *eftp = enp->en_filter.ef_ef10_filter_table;
1433 	efx_filter_spec_t spec;
1434 	efx_rc_t rc;
1435 
1436 	/* Insert the unknown unicast filter */
1437 	efx_filter_spec_init_rx(&spec, EFX_FILTER_PRI_AUTO,
1438 	    filter_flags,
1439 	    eftp->eft_default_rxq);
1440 	rc = efx_filter_spec_set_uc_def(&spec);
1441 	if (rc != 0)
1442 		goto fail1;
1443 	rc = ef10_filter_add_internal(enp, &spec, EFX_FILTER_REPLACEMENT_NEVER,
1444 	    &eftp->eft_unicst_filter_indexes[eftp->eft_unicst_filter_count]);
1445 	if (rc != 0)
1446 		goto fail2;
1447 
1448 	eftp->eft_unicst_filter_count++;
1449 	EFSYS_ASSERT(eftp->eft_unicst_filter_count <=
1450 		    EFX_EF10_FILTER_UNICAST_FILTERS_MAX);
1451 
1452 	return (0);
1453 
1454 fail2:
1455 	EFSYS_PROBE(fail2);
1456 fail1:
1457 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
1458 	return (rc);
1459 }
1460 
1461 static	__checkReturn	efx_rc_t
1462 ef10_filter_insert_multicast_list(
1463 	__in				efx_nic_t *enp,
1464 	__in				boolean_t mulcst,
1465 	__in				boolean_t brdcst,
1466 	__in_ecount(6*count)		uint8_t const *addrs,
1467 	__in				uint32_t count,
1468 	__in				efx_filter_flags_t filter_flags,
1469 	__in				boolean_t rollback)
1470 {
1471 	ef10_filter_table_t *eftp = enp->en_filter.ef_ef10_filter_table;
1472 	efx_filter_spec_t spec;
1473 	uint8_t addr[6];
1474 	uint32_t i;
1475 	uint32_t filter_index;
1476 	uint32_t filter_count;
1477 	efx_rc_t rc;
1478 
1479 	if (mulcst == B_FALSE)
1480 		count = 0;
1481 
1482 	if (count + (brdcst ? 1 : 0) >
1483 	    EFX_ARRAY_SIZE(eftp->eft_mulcst_filter_indexes)) {
1484 		/* Too many MAC addresses */
1485 		rc = EINVAL;
1486 		goto fail1;
1487 	}
1488 
1489 	/* Insert/renew multicast address list filters */
1490 	filter_count = 0;
1491 	for (i = 0; i < count; i++) {
1492 		efx_filter_spec_init_rx(&spec,
1493 		    EFX_FILTER_PRI_AUTO,
1494 		    filter_flags,
1495 		    eftp->eft_default_rxq);
1496 
1497 		rc = efx_filter_spec_set_eth_local(&spec,
1498 		    EFX_FILTER_SPEC_VID_UNSPEC,
1499 		    &addrs[i * EFX_MAC_ADDR_LEN]);
1500 		if (rc != 0) {
1501 			if (rollback == B_TRUE) {
1502 				/* Only stop upon failure if told to rollback */
1503 				goto rollback;
1504 			} else {
1505 				/*
1506 				 * Don't try to add a filter with a corrupt
1507 				 * specification.
1508 				 */
1509 				continue;
1510 			}
1511 		}
1512 
1513 		rc = ef10_filter_add_internal(enp, &spec,
1514 		    EFX_FILTER_REPLACEMENT_NEVER, &filter_index);
1515 
1516 		if (rc == 0) {
1517 			eftp->eft_mulcst_filter_indexes[filter_count] =
1518 				filter_index;
1519 			filter_count++;
1520 		} else if (rollback == B_TRUE) {
1521 			/* Only stop upon failure if told to rollback */
1522 			goto rollback;
1523 		}
1524 
1525 	}
1526 
1527 	if (brdcst == B_TRUE) {
1528 		/* Insert/renew broadcast address filter */
1529 		efx_filter_spec_init_rx(&spec, EFX_FILTER_PRI_AUTO,
1530 		    filter_flags,
1531 		    eftp->eft_default_rxq);
1532 
1533 		EFX_MAC_BROADCAST_ADDR_SET(addr);
1534 		rc = efx_filter_spec_set_eth_local(&spec,
1535 		    EFX_FILTER_SPEC_VID_UNSPEC, addr);
1536 		if ((rc != 0) && (rollback == B_TRUE)) {
1537 			/* Only stop upon failure if told to rollback */
1538 			goto rollback;
1539 		}
1540 
1541 		rc = ef10_filter_add_internal(enp, &spec,
1542 		    EFX_FILTER_REPLACEMENT_NEVER, &filter_index);
1543 
1544 		if (rc == 0) {
1545 			eftp->eft_mulcst_filter_indexes[filter_count] =
1546 				filter_index;
1547 			filter_count++;
1548 		} else if (rollback == B_TRUE) {
1549 			/* Only stop upon failure if told to rollback */
1550 			goto rollback;
1551 		}
1552 	}
1553 
1554 	eftp->eft_mulcst_filter_count = filter_count;
1555 	eftp->eft_using_all_mulcst = B_FALSE;
1556 
1557 	return (0);
1558 
1559 rollback:
1560 	/* Remove any filters we have inserted */
1561 	i = filter_count;
1562 	while (i--) {
1563 		ef10_filter_delete_auto(enp,
1564 		    eftp->eft_mulcst_filter_indexes[i]);
1565 	}
1566 	eftp->eft_mulcst_filter_count = 0;
1567 
1568 fail1:
1569 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
1570 
1571 	return (rc);
1572 }
1573 
1574 static	__checkReturn	efx_rc_t
ef10_filter_insert_all_multicast(__in efx_nic_t * enp,__in efx_filter_flags_t filter_flags)1575 ef10_filter_insert_all_multicast(
1576 	__in				efx_nic_t *enp,
1577 	__in				efx_filter_flags_t filter_flags)
1578 {
1579 	ef10_filter_table_t *eftp = enp->en_filter.ef_ef10_filter_table;
1580 	efx_filter_spec_t spec;
1581 	efx_rc_t rc;
1582 
1583 	/* Insert the unknown multicast filter */
1584 	efx_filter_spec_init_rx(&spec, EFX_FILTER_PRI_AUTO,
1585 	    filter_flags,
1586 	    eftp->eft_default_rxq);
1587 	rc = efx_filter_spec_set_mc_def(&spec);
1588 	if (rc != 0)
1589 		goto fail1;
1590 
1591 	rc = ef10_filter_add_internal(enp, &spec, EFX_FILTER_REPLACEMENT_NEVER,
1592 	    &eftp->eft_mulcst_filter_indexes[0]);
1593 	if (rc != 0)
1594 		goto fail2;
1595 
1596 	eftp->eft_mulcst_filter_count = 1;
1597 	eftp->eft_using_all_mulcst = B_TRUE;
1598 
1599 	/*
1600 	 * FIXME: If brdcst == B_FALSE, add a filter to drop broadcast traffic.
1601 	 */
1602 
1603 	return (0);
1604 
1605 fail2:
1606 	EFSYS_PROBE(fail2);
1607 fail1:
1608 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
1609 
1610 	return (rc);
1611 }
1612 
1613 typedef struct ef10_filter_encap_entry_s {
1614 	uint16_t		ether_type;
1615 	efx_tunnel_protocol_t	encap_type;
1616 	uint32_t		inner_frame_match;
1617 } ef10_filter_encap_entry_t;
1618 
1619 #define	EF10_ENCAP_FILTER_ENTRY(ipv, encap_type, inner_frame_match)	\
1620 	{ EFX_ETHER_TYPE_##ipv, EFX_TUNNEL_PROTOCOL_##encap_type,	\
1621 	    EFX_FILTER_INNER_FRAME_MATCH_UNKNOWN_##inner_frame_match }
1622 
1623 static ef10_filter_encap_entry_t ef10_filter_encap_list[] = {
1624 	EF10_ENCAP_FILTER_ENTRY(IPV4, VXLAN, UCAST_DST),
1625 	EF10_ENCAP_FILTER_ENTRY(IPV4, VXLAN, MCAST_DST),
1626 	EF10_ENCAP_FILTER_ENTRY(IPV6, VXLAN, UCAST_DST),
1627 	EF10_ENCAP_FILTER_ENTRY(IPV6, VXLAN, MCAST_DST),
1628 
1629 	EF10_ENCAP_FILTER_ENTRY(IPV4, GENEVE, UCAST_DST),
1630 	EF10_ENCAP_FILTER_ENTRY(IPV4, GENEVE, MCAST_DST),
1631 	EF10_ENCAP_FILTER_ENTRY(IPV6, GENEVE, UCAST_DST),
1632 	EF10_ENCAP_FILTER_ENTRY(IPV6, GENEVE, MCAST_DST),
1633 
1634 	EF10_ENCAP_FILTER_ENTRY(IPV4, NVGRE, UCAST_DST),
1635 	EF10_ENCAP_FILTER_ENTRY(IPV4, NVGRE, MCAST_DST),
1636 	EF10_ENCAP_FILTER_ENTRY(IPV6, NVGRE, UCAST_DST),
1637 	EF10_ENCAP_FILTER_ENTRY(IPV6, NVGRE, MCAST_DST),
1638 };
1639 
1640 #undef EF10_ENCAP_FILTER_ENTRY
1641 
1642 static	__checkReturn	efx_rc_t
ef10_filter_insert_encap_filters(__in efx_nic_t * enp,__in boolean_t mulcst,__in efx_filter_flags_t filter_flags)1643 ef10_filter_insert_encap_filters(
1644 	__in		efx_nic_t *enp,
1645 	__in		boolean_t mulcst,
1646 	__in		efx_filter_flags_t filter_flags)
1647 {
1648 	ef10_filter_table_t *table = enp->en_filter.ef_ef10_filter_table;
1649 	uint32_t i;
1650 	efx_rc_t rc;
1651 
1652 	EFX_STATIC_ASSERT(EFX_ARRAY_SIZE(ef10_filter_encap_list) <=
1653 			    EFX_ARRAY_SIZE(table->eft_encap_filter_indexes));
1654 
1655 	/*
1656 	 * On Medford, full-featured firmware can identify packets as being
1657 	 * tunnel encapsulated, even if no encapsulated packet offloads are in
1658 	 * use. When packets are identified as such, ordinary filters are not
1659 	 * applied, only ones specific to encapsulated packets. Hence we need to
1660 	 * insert filters for encapsulated packets in order to receive them.
1661 	 *
1662 	 * Separate filters need to be inserted for each ether type,
1663 	 * encapsulation type, and inner frame type (unicast or multicast). To
1664 	 * keep things simple and reduce the number of filters needed, catch-all
1665 	 * filters for all combinations of types are inserted, even if
1666 	 * all_unicst or all_mulcst have not been set. (These catch-all filters
1667 	 * may well, however, fail to insert on unprivileged functions.)
1668 	 */
1669 	table->eft_encap_filter_count = 0;
1670 	for (i = 0; i < EFX_ARRAY_SIZE(ef10_filter_encap_list); i++) {
1671 		efx_filter_spec_t spec;
1672 		ef10_filter_encap_entry_t *encap_filter =
1673 			&ef10_filter_encap_list[i];
1674 
1675 		/*
1676 		 * Skip multicast filters if we've not been asked for
1677 		 * any multicast traffic.
1678 		 */
1679 		if ((mulcst == B_FALSE) &&
1680 		    (encap_filter->inner_frame_match ==
1681 		    EFX_FILTER_INNER_FRAME_MATCH_UNKNOWN_MCAST_DST))
1682 			continue;
1683 
1684 		efx_filter_spec_init_rx(&spec, EFX_FILTER_PRI_AUTO,
1685 					filter_flags,
1686 					table->eft_default_rxq);
1687 		efx_filter_spec_set_ether_type(&spec, encap_filter->ether_type);
1688 		rc = efx_filter_spec_set_encap_type(&spec,
1689 					    encap_filter->encap_type,
1690 					    encap_filter->inner_frame_match);
1691 		if (rc != 0)
1692 			goto fail1;
1693 
1694 		rc = ef10_filter_add_internal(enp, &spec,
1695 		    EFX_FILTER_REPLACEMENT_NEVER,
1696 		    &table->eft_encap_filter_indexes[
1697 				    table->eft_encap_filter_count]);
1698 		if (rc != 0) {
1699 			if (rc != EACCES)
1700 				goto fail2;
1701 		} else {
1702 			table->eft_encap_filter_count++;
1703 		}
1704 	}
1705 
1706 	return (0);
1707 
1708 fail2:
1709 	EFSYS_PROBE(fail2);
1710 fail1:
1711 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
1712 
1713 	return (rc);
1714 }
1715 
1716 static			void
ef10_filter_remove_old(__in efx_nic_t * enp)1717 ef10_filter_remove_old(
1718 	__in		efx_nic_t *enp)
1719 {
1720 	ef10_filter_table_t *table = enp->en_filter.ef_ef10_filter_table;
1721 	uint32_t i;
1722 
1723 	for (i = 0; i < EFX_ARRAY_SIZE(table->eft_entry); i++) {
1724 		if (ef10_filter_entry_is_auto_old(table, i)) {
1725 			ef10_filter_delete_auto(enp, i);
1726 		}
1727 	}
1728 }
1729 
1730 
1731 static	__checkReturn	efx_rc_t
ef10_filter_get_workarounds(__in efx_nic_t * enp)1732 ef10_filter_get_workarounds(
1733 	__in				efx_nic_t *enp)
1734 {
1735 	efx_nic_cfg_t *encp = &enp->en_nic_cfg;
1736 	uint32_t implemented = 0;
1737 	uint32_t enabled = 0;
1738 	efx_rc_t rc;
1739 
1740 	rc = efx_mcdi_get_workarounds(enp, &implemented, &enabled);
1741 	if (rc == 0) {
1742 		/* Check if chained multicast filter support is enabled */
1743 		if (implemented & enabled & MC_CMD_GET_WORKAROUNDS_OUT_BUG26807)
1744 			encp->enc_bug26807_workaround = B_TRUE;
1745 		else
1746 			encp->enc_bug26807_workaround = B_FALSE;
1747 	} else if (rc == ENOTSUP) {
1748 		/*
1749 		 * Firmware is too old to support GET_WORKAROUNDS, and support
1750 		 * for this workaround was implemented later.
1751 		 */
1752 		encp->enc_bug26807_workaround = B_FALSE;
1753 	} else {
1754 		goto fail1;
1755 	}
1756 
1757 	return (0);
1758 
1759 fail1:
1760 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
1761 
1762 	return (rc);
1763 
1764 }
1765 
1766 static			void
ef10_filter_remove_all_existing_filters(__in efx_nic_t * enp)1767 ef10_filter_remove_all_existing_filters(
1768 	__in				efx_nic_t *enp)
1769 {
1770 	ef10_filter_table_t *table = enp->en_filter.ef_ef10_filter_table;
1771 	efx_port_t *epp = &(enp->en_port);
1772 	unsigned int i;
1773 
1774 	for (i = 0; i < table->eft_unicst_filter_count; i++) {
1775 		ef10_filter_delete_auto(enp,
1776 				table->eft_unicst_filter_indexes[i]);
1777 	}
1778 	table->eft_unicst_filter_count = 0;
1779 
1780 	for (i = 0; i < table->eft_mulcst_filter_count; i++) {
1781 		ef10_filter_delete_auto(enp,
1782 				table->eft_mulcst_filter_indexes[i]);
1783 	}
1784 	table->eft_mulcst_filter_count = 0;
1785 
1786 	for (i = 0; i < table->eft_encap_filter_count; i++) {
1787 		ef10_filter_delete_auto(enp,
1788 				table->eft_encap_filter_indexes[i]);
1789 	}
1790 	table->eft_encap_filter_count = 0;
1791 
1792 	epp->ep_all_unicst_inserted = B_FALSE;
1793 	epp->ep_all_mulcst_inserted = B_FALSE;
1794 }
1795 
1796 static			void
ef10_filter_mark_old_filters(__in efx_nic_t * enp)1797 ef10_filter_mark_old_filters(
1798 	__in				efx_nic_t *enp)
1799 {
1800 	ef10_filter_table_t *table = enp->en_filter.ef_ef10_filter_table;
1801 	unsigned int i;
1802 
1803 	for (i = 0; i < table->eft_unicst_filter_count; i++) {
1804 		ef10_filter_set_entry_auto_old(table,
1805 					table->eft_unicst_filter_indexes[i]);
1806 	}
1807 	for (i = 0; i < table->eft_mulcst_filter_count; i++) {
1808 		ef10_filter_set_entry_auto_old(table,
1809 					table->eft_mulcst_filter_indexes[i]);
1810 	}
1811 	for (i = 0; i < table->eft_encap_filter_count; i++) {
1812 		ef10_filter_set_entry_auto_old(table,
1813 					table->eft_encap_filter_indexes[i]);
1814 	}
1815 }
1816 
1817 static	__checkReturn	efx_rc_t
1818 ef10_filter_insert_renew_unicst_filters(
1819 	__in				efx_nic_t *enp,
1820 	__in_ecount(6)			uint8_t const *mac_addr,
1821 	__in				boolean_t all_unicst,
1822 	__in				efx_filter_flags_t filter_flags,
1823 	__out				boolean_t *all_unicst_inserted)
1824 {
1825 	ef10_filter_table_t *table = enp->en_filter.ef_ef10_filter_table;
1826 	efx_port_t *epp = &(enp->en_port);
1827 	efx_rc_t rc;
1828 
1829 	/*
1830 	 * Firmware does not perform chaining on unicast filters. As traffic is
1831 	 * therefore only delivered to the first matching filter, we should
1832 	 * always insert the specific filter for our MAC address, to try and
1833 	 * ensure we get that traffic.
1834 	 *
1835 	 * (If the filter for our MAC address has already been inserted by
1836 	 * another function, we won't receive traffic sent to us, even if we
1837 	 * insert a unicast mismatch filter. To prevent traffic stealing, this
1838 	 * therefore relies on the privilege model only allowing functions to
1839 	 * insert filters for their own MAC address unless explicitly given
1840 	 * additional privileges by the user. This also means that, even on a
1841 	 * privileged function, inserting a unicast mismatch filter may not
1842 	 * catch all traffic in multi PCI function scenarios.)
1843 	 */
1844 	table->eft_unicst_filter_count = 0;
1845 	rc = ef10_filter_insert_unicast(enp, mac_addr, filter_flags);
1846 	*all_unicst_inserted = B_FALSE;
1847 	if (all_unicst || (rc != 0)) {
1848 		efx_rc_t all_unicst_rc;
1849 
1850 		all_unicst_rc = ef10_filter_insert_all_unicast(enp,
1851 						    filter_flags);
1852 		if (all_unicst_rc == 0) {
1853 			*all_unicst_inserted = B_TRUE;
1854 			epp->ep_all_unicst_inserted = B_TRUE;
1855 		} else if (rc != 0)
1856 			goto fail1;
1857 	}
1858 
1859 	return (0);
1860 
1861 fail1:
1862 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
1863 
1864 	return (rc);
1865 }
1866 
1867 static	__checkReturn	efx_rc_t
1868 ef10_filter_insert_renew_mulcst_filters(
1869 	__in				efx_nic_t *enp,
1870 	__in				boolean_t mulcst,
1871 	__in				boolean_t all_mulcst,
1872 	__in				boolean_t brdcst,
1873 	__in_ecount(6*count)		uint8_t const *addrs,
1874 	__in				uint32_t count,
1875 	__in				efx_filter_flags_t filter_flags,
1876 	__in				boolean_t all_unicst_inserted,
1877 	__out				boolean_t *all_mulcst_inserted)
1878 {
1879 	ef10_filter_table_t *table = enp->en_filter.ef_ef10_filter_table;
1880 	efx_nic_cfg_t *encp = &enp->en_nic_cfg;
1881 	efx_port_t *epp = &(enp->en_port);
1882 	efx_rc_t rc;
1883 
1884 	*all_mulcst_inserted = B_FALSE;
1885 
1886 	if (all_mulcst == B_TRUE) {
1887 		efx_rc_t all_mulcst_rc;
1888 
1889 		/*
1890 		 * Insert the all multicast filter. If that fails, try to insert
1891 		 * all of our multicast filters (but without rollback on
1892 		 * failure).
1893 		 */
1894 		all_mulcst_rc = ef10_filter_insert_all_multicast(enp,
1895 							    filter_flags);
1896 		if (all_mulcst_rc == 0) {
1897 			epp->ep_all_mulcst_inserted = B_TRUE;
1898 			*all_mulcst_inserted = B_TRUE;
1899 		} else {
1900 			rc = ef10_filter_insert_multicast_list(enp, B_TRUE,
1901 			    brdcst, addrs, count, filter_flags, B_FALSE);
1902 			if (rc != 0)
1903 				goto fail1;
1904 		}
1905 	} else {
1906 		/*
1907 		 * Insert filters for multicast addresses.
1908 		 * If any insertion fails, then rollback and try to insert the
1909 		 * all multicast filter instead.
1910 		 * If that also fails, try to insert all of the multicast
1911 		 * filters (but without rollback on failure).
1912 		 */
1913 		rc = ef10_filter_insert_multicast_list(enp, mulcst, brdcst,
1914 			    addrs, count, filter_flags, B_TRUE);
1915 		if (rc != 0) {
1916 			if ((table->eft_using_all_mulcst == B_FALSE) &&
1917 			    (encp->enc_bug26807_workaround == B_TRUE)) {
1918 				/*
1919 				 * Multicast filter chaining is on, so remove
1920 				 * old filters before inserting the multicast
1921 				 * all filter to avoid duplicate delivery caused
1922 				 * by packets matching multiple filters.
1923 				 */
1924 				ef10_filter_remove_old(enp);
1925 				if (all_unicst_inserted == B_FALSE)
1926 					epp->ep_all_unicst_inserted = B_FALSE;
1927 				if (*all_mulcst_inserted == B_FALSE)
1928 					epp->ep_all_mulcst_inserted = B_FALSE;
1929 			}
1930 
1931 			rc = ef10_filter_insert_all_multicast(enp,
1932 							    filter_flags);
1933 			if (rc == 0) {
1934 				epp->ep_all_mulcst_inserted = B_TRUE;
1935 				*all_mulcst_inserted = B_TRUE;
1936 			} else {
1937 				rc = ef10_filter_insert_multicast_list(enp,
1938 				    mulcst, brdcst,
1939 				    addrs, count, filter_flags, B_FALSE);
1940 				if (rc != 0)
1941 					goto fail2;
1942 			}
1943 		}
1944 	}
1945 
1946 	return (0);
1947 
1948 fail2:
1949 	EFSYS_PROBE1(fail2, efx_rc_t, rc);
1950 
1951 fail1:
1952 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
1953 
1954 	return (rc);
1955 }
1956 
1957 /*
1958  * Reconfigure all filters.
1959  * If all_unicst and/or all mulcst filters cannot be applied then
1960  * return ENOTSUP (Note the filters for the specified addresses are
1961  * still applied in this case).
1962  */
1963 	__checkReturn	efx_rc_t
1964 ef10_filter_reconfigure(
1965 	__in				efx_nic_t *enp,
1966 	__in_ecount(6)			uint8_t const *mac_addr,
1967 	__in				boolean_t all_unicst,
1968 	__in				boolean_t mulcst,
1969 	__in				boolean_t all_mulcst,
1970 	__in				boolean_t brdcst,
1971 	__in_ecount(6*count)		uint8_t const *addrs,
1972 	__in				uint32_t count)
1973 {
1974 	efx_nic_cfg_t *encp = &enp->en_nic_cfg;
1975 	efx_port_t *epp = &(enp->en_port);
1976 	ef10_filter_table_t *table = enp->en_filter.ef_ef10_filter_table;
1977 	efx_filter_flags_t filter_flags;
1978 	unsigned int i;
1979 	boolean_t all_unicst_inserted = B_FALSE;
1980 	boolean_t all_mulcst_inserted = B_FALSE;
1981 	efx_rc_t rc;
1982 
1983 	if (table->eft_default_rxq == NULL) {
1984 		/*
1985 		 * Filters direct traffic to the default RXQ, and so cannot be
1986 		 * inserted until it is available. Any currently configured
1987 		 * filters must be removed (ignore errors in case the MC
1988 		 * has rebooted, which removes hardware filters).
1989 		 */
1990 		ef10_filter_remove_all_existing_filters(enp);
1991 		return (0);
1992 	}
1993 
1994 	if (table->eft_using_rss)
1995 		filter_flags = EFX_FILTER_FLAG_RX_RSS;
1996 	else
1997 		filter_flags = 0;
1998 
1999 	/* Mark old filters which may need to be removed */
2000 	ef10_filter_mark_old_filters(enp);
2001 
2002 	/* Insert or renew unicast filters */
2003 	rc = ef10_filter_insert_renew_unicst_filters(enp, mac_addr, all_unicst,
2004 						     filter_flags,
2005 						     &all_unicst_inserted);
2006 	if (rc != 0)
2007 		goto fail1;
2008 
2009 	/*
2010 	 * WORKAROUND_BUG26807 controls firmware support for chained multicast
2011 	 * filters, and can only be enabled or disabled when the hardware filter
2012 	 * table is empty.
2013 	 *
2014 	 * Chained multicast filters require support from the datapath firmware,
2015 	 * and may not be available (e.g. low-latency variants or old Huntington
2016 	 * firmware).
2017 	 *
2018 	 * Firmware will reset (FLR) functions which have inserted filters in
2019 	 * the hardware filter table when the workaround is enabled/disabled.
2020 	 * Functions without any hardware filters are not reset.
2021 	 *
2022 	 * Re-check if the workaround is enabled after adding unicast hardware
2023 	 * filters. This ensures that encp->enc_bug26807_workaround matches the
2024 	 * firmware state, and that later changes to enable/disable the
2025 	 * workaround will result in this function seeing a reset (FLR).
2026 	 *
2027 	 * In common-code drivers, we only support multiple PCI function
2028 	 * scenarios with firmware that supports multicast chaining, so we can
2029 	 * assume it is enabled for such cases and hence simplify the filter
2030 	 * insertion logic. Firmware that does not support multicast chaining
2031 	 * does not support multiple PCI function configurations either, so
2032 	 * filter insertion is much simpler and the same strategies can still be
2033 	 * used.
2034 	 */
2035 	if ((rc = ef10_filter_get_workarounds(enp)) != 0)
2036 		goto fail2;
2037 
2038 	if ((table->eft_using_all_mulcst != all_mulcst) &&
2039 	    (encp->enc_bug26807_workaround == B_TRUE)) {
2040 		/*
2041 		 * Multicast filter chaining is enabled, so traffic that matches
2042 		 * more than one multicast filter will be replicated and
2043 		 * delivered to multiple recipients.  To avoid this duplicate
2044 		 * delivery, remove old multicast filters before inserting new
2045 		 * multicast filters.
2046 		 */
2047 		ef10_filter_remove_old(enp);
2048 		if (all_unicst_inserted == B_FALSE)
2049 			epp->ep_all_unicst_inserted = B_FALSE;
2050 
2051 		epp->ep_all_mulcst_inserted = B_FALSE;
2052 	}
2053 
2054 	/* Insert or renew multicast filters */
2055 	rc = ef10_filter_insert_renew_mulcst_filters(enp, mulcst, all_mulcst,
2056 						     brdcst, addrs, count,
2057 						     filter_flags,
2058 						     all_unicst_inserted,
2059 						     &all_mulcst_inserted);
2060 	if (rc != 0)
2061 		goto fail3;
2062 
2063 	if (encp->enc_tunnel_encapsulations_supported != 0) {
2064 		/* Try to insert filters for encapsulated packets. */
2065 		(void) ef10_filter_insert_encap_filters(enp,
2066 					    mulcst || all_mulcst || brdcst,
2067 					    filter_flags);
2068 	}
2069 
2070 	/* Remove old filters which were not renewed */
2071 	ef10_filter_remove_old(enp);
2072 	if (all_unicst_inserted == B_FALSE)
2073 		epp->ep_all_unicst_inserted = B_FALSE;
2074 	if (all_mulcst_inserted == B_FALSE)
2075 		epp->ep_all_mulcst_inserted = B_FALSE;
2076 
2077 	/* report if any optional flags were rejected */
2078 	if (((all_unicst != B_FALSE) && (all_unicst_inserted == B_FALSE)) ||
2079 	    ((all_mulcst != B_FALSE) && (all_mulcst_inserted == B_FALSE))) {
2080 		rc = ENOTSUP;
2081 	}
2082 
2083 	return (rc);
2084 
2085 fail3:
2086 	EFSYS_PROBE(fail3);
2087 fail2:
2088 	EFSYS_PROBE(fail2);
2089 fail1:
2090 	EFSYS_PROBE1(fail1, efx_rc_t, rc);
2091 
2092 	/* Clear auto old flags */
2093 	for (i = 0; i < EFX_ARRAY_SIZE(table->eft_entry); i++) {
2094 		if (ef10_filter_entry_is_auto_old(table, i)) {
2095 			ef10_filter_set_entry_not_auto_old(table, i);
2096 		}
2097 	}
2098 
2099 	return (rc);
2100 }
2101 
2102 		void
ef10_filter_get_default_rxq(__in efx_nic_t * enp,__out efx_rxq_t ** erpp,__out boolean_t * using_rss)2103 ef10_filter_get_default_rxq(
2104 	__in		efx_nic_t *enp,
2105 	__out		efx_rxq_t **erpp,
2106 	__out		boolean_t *using_rss)
2107 {
2108 	ef10_filter_table_t *table = enp->en_filter.ef_ef10_filter_table;
2109 
2110 	*erpp = table->eft_default_rxq;
2111 	*using_rss = table->eft_using_rss;
2112 }
2113 
2114 
2115 		void
ef10_filter_default_rxq_set(__in efx_nic_t * enp,__in efx_rxq_t * erp,__in boolean_t using_rss)2116 ef10_filter_default_rxq_set(
2117 	__in		efx_nic_t *enp,
2118 	__in		efx_rxq_t *erp,
2119 	__in		boolean_t using_rss)
2120 {
2121 	ef10_filter_table_t *table = enp->en_filter.ef_ef10_filter_table;
2122 
2123 #if EFSYS_OPT_RX_SCALE
2124 	EFSYS_ASSERT((using_rss == B_FALSE) ||
2125 	    (enp->en_rss_context != EF10_RSS_CONTEXT_INVALID));
2126 	table->eft_using_rss = using_rss;
2127 #else
2128 	EFSYS_ASSERT(using_rss == B_FALSE);
2129 	table->eft_using_rss = B_FALSE;
2130 #endif
2131 	table->eft_default_rxq = erp;
2132 }
2133 
2134 		void
ef10_filter_default_rxq_clear(__in efx_nic_t * enp)2135 ef10_filter_default_rxq_clear(
2136 	__in		efx_nic_t *enp)
2137 {
2138 	ef10_filter_table_t *table = enp->en_filter.ef_ef10_filter_table;
2139 
2140 	table->eft_default_rxq = NULL;
2141 	table->eft_using_rss = B_FALSE;
2142 }
2143 
2144 
2145 #endif /* EFSYS_OPT_FILTER */
2146 
2147 #endif /* EFSYS_OPT_RIVERHEAD || EFX_OPTS_EF10() */
2148