5a0e3ad6af
percpu.h is included by sched.h and module.h and thus ends up being included when building most .c files. percpu.h includes slab.h which in turn includes gfp.h making everything defined by the two files universally available and complicating inclusion dependencies. percpu.h -> slab.h dependency is about to be removed. Prepare for this change by updating users of gfp and slab facilities include those headers directly instead of assuming availability. As this conversion needs to touch large number of source files, the following script is used as the basis of conversion. http://userweb.kernel.org/~tj/misc/slabh-sweep.py The script does the followings. * Scan files for gfp and slab usages and update includes such that only the necessary includes are there. ie. if only gfp is used, gfp.h, if slab is used, slab.h. * When the script inserts a new include, it looks at the include blocks and try to put the new include such that its order conforms to its surrounding. It's put in the include block which contains core kernel includes, in the same order that the rest are ordered - alphabetical, Christmas tree, rev-Xmas-tree or at the end if there doesn't seem to be any matching order. * If the script can't find a place to put a new include (mostly because the file doesn't have fitting include block), it prints out an error message indicating which .h file needs to be added to the file. The conversion was done in the following steps. 1. The initial automatic conversion of all .c files updated slightly over 4000 files, deleting around 700 includes and adding ~480 gfp.h and ~3000 slab.h inclusions. The script emitted errors for ~400 files. 2. Each error was manually checked. Some didn't need the inclusion, some needed manual addition while adding it to implementation .h or embedding .c file was more appropriate for others. This step added inclusions to around 150 files. 3. The script was run again and the output was compared to the edits from #2 to make sure no file was left behind. 4. Several build tests were done and a couple of problems were fixed. e.g. lib/decompress_*.c used malloc/free() wrappers around slab APIs requiring slab.h to be added manually. 5. The script was run on all .h files but without automatically editing them as sprinkling gfp.h and slab.h inclusions around .h files could easily lead to inclusion dependency hell. Most gfp.h inclusion directives were ignored as stuff from gfp.h was usually wildly available and often used in preprocessor macros. Each slab.h inclusion directive was examined and added manually as necessary. 6. percpu.h was updated not to include slab.h. 7. Build test were done on the following configurations and failures were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my distributed build env didn't work with gcov compiles) and a few more options had to be turned off depending on archs to make things build (like ipr on powerpc/64 which failed due to missing writeq). * x86 and x86_64 UP and SMP allmodconfig and a custom test config. * powerpc and powerpc64 SMP allmodconfig * sparc and sparc64 SMP allmodconfig * ia64 SMP allmodconfig * s390 SMP allmodconfig * alpha SMP allmodconfig * um on x86_64 SMP allmodconfig 8. percpu.h modifications were reverted so that it could be applied as a separate patch and serve as bisection point. Given the fact that I had only a couple of failures from tests on step 6, I'm fairly confident about the coverage of this conversion patch. If there is a breakage, it's likely to be something in one of the arch headers which should be easily discoverable easily on most builds of the specific arch. Signed-off-by: Tejun Heo <tj@kernel.org> Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org> Cc: Ingo Molnar <mingo@redhat.com> Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
746 lines
20 KiB
C
746 lines
20 KiB
C
/****************************************************************************
|
|
* Driver for Solarflare Solarstorm network controllers and boards
|
|
* Copyright 2005-2006 Fen Systems Ltd.
|
|
* Copyright 2006-2009 Solarflare Communications Inc.
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify it
|
|
* under the terms of the GNU General Public License version 2 as published
|
|
* by the Free Software Foundation, incorporated herein by reference.
|
|
*/
|
|
|
|
#include <linux/netdevice.h>
|
|
#include <linux/module.h>
|
|
#include <linux/delay.h>
|
|
#include <linux/kernel_stat.h>
|
|
#include <linux/pci.h>
|
|
#include <linux/ethtool.h>
|
|
#include <linux/ip.h>
|
|
#include <linux/in.h>
|
|
#include <linux/udp.h>
|
|
#include <linux/rtnetlink.h>
|
|
#include <linux/slab.h>
|
|
#include <asm/io.h>
|
|
#include "net_driver.h"
|
|
#include "efx.h"
|
|
#include "nic.h"
|
|
#include "selftest.h"
|
|
#include "workarounds.h"
|
|
|
|
/*
|
|
* Loopback test packet structure
|
|
*
|
|
* The self-test should stress every RSS vector, and unfortunately
|
|
* Falcon only performs RSS on TCP/UDP packets.
|
|
*/
|
|
struct efx_loopback_payload {
|
|
struct ethhdr header;
|
|
struct iphdr ip;
|
|
struct udphdr udp;
|
|
__be16 iteration;
|
|
const char msg[64];
|
|
} __attribute__ ((packed));
|
|
|
|
/* Loopback test source MAC address */
|
|
static const unsigned char payload_source[ETH_ALEN] = {
|
|
0x00, 0x0f, 0x53, 0x1b, 0x1b, 0x1b,
|
|
};
|
|
|
|
static const char payload_msg[] =
|
|
"Hello world! This is an Efx loopback test in progress!";
|
|
|
|
/**
|
|
* efx_loopback_state - persistent state during a loopback selftest
|
|
* @flush: Drop all packets in efx_loopback_rx_packet
|
|
* @packet_count: Number of packets being used in this test
|
|
* @skbs: An array of skbs transmitted
|
|
* @offload_csum: Checksums are being offloaded
|
|
* @rx_good: RX good packet count
|
|
* @rx_bad: RX bad packet count
|
|
* @payload: Payload used in tests
|
|
*/
|
|
struct efx_loopback_state {
|
|
bool flush;
|
|
int packet_count;
|
|
struct sk_buff **skbs;
|
|
bool offload_csum;
|
|
atomic_t rx_good;
|
|
atomic_t rx_bad;
|
|
struct efx_loopback_payload payload;
|
|
};
|
|
|
|
/**************************************************************************
|
|
*
|
|
* MII, NVRAM and register tests
|
|
*
|
|
**************************************************************************/
|
|
|
|
static int efx_test_phy_alive(struct efx_nic *efx, struct efx_self_tests *tests)
|
|
{
|
|
int rc = 0;
|
|
|
|
if (efx->phy_op->test_alive) {
|
|
rc = efx->phy_op->test_alive(efx);
|
|
tests->phy_alive = rc ? -1 : 1;
|
|
}
|
|
|
|
return rc;
|
|
}
|
|
|
|
static int efx_test_nvram(struct efx_nic *efx, struct efx_self_tests *tests)
|
|
{
|
|
int rc = 0;
|
|
|
|
if (efx->type->test_nvram) {
|
|
rc = efx->type->test_nvram(efx);
|
|
tests->nvram = rc ? -1 : 1;
|
|
}
|
|
|
|
return rc;
|
|
}
|
|
|
|
static int efx_test_chip(struct efx_nic *efx, struct efx_self_tests *tests)
|
|
{
|
|
int rc = 0;
|
|
|
|
/* Test register access */
|
|
if (efx->type->test_registers) {
|
|
rc = efx->type->test_registers(efx);
|
|
tests->registers = rc ? -1 : 1;
|
|
}
|
|
|
|
return rc;
|
|
}
|
|
|
|
/**************************************************************************
|
|
*
|
|
* Interrupt and event queue testing
|
|
*
|
|
**************************************************************************/
|
|
|
|
/* Test generation and receipt of interrupts */
|
|
static int efx_test_interrupts(struct efx_nic *efx,
|
|
struct efx_self_tests *tests)
|
|
{
|
|
struct efx_channel *channel;
|
|
|
|
EFX_LOG(efx, "testing interrupts\n");
|
|
tests->interrupt = -1;
|
|
|
|
/* Reset interrupt flag */
|
|
efx->last_irq_cpu = -1;
|
|
smp_wmb();
|
|
|
|
/* ACK each interrupting event queue. Receiving an interrupt due to
|
|
* traffic before a test event is raised is considered a pass */
|
|
efx_for_each_channel(channel, efx) {
|
|
if (channel->work_pending)
|
|
efx_process_channel_now(channel);
|
|
if (efx->last_irq_cpu >= 0)
|
|
goto success;
|
|
}
|
|
|
|
efx_nic_generate_interrupt(efx);
|
|
|
|
/* Wait for arrival of test interrupt. */
|
|
EFX_LOG(efx, "waiting for test interrupt\n");
|
|
schedule_timeout_uninterruptible(HZ / 10);
|
|
if (efx->last_irq_cpu >= 0)
|
|
goto success;
|
|
|
|
EFX_ERR(efx, "timed out waiting for interrupt\n");
|
|
return -ETIMEDOUT;
|
|
|
|
success:
|
|
EFX_LOG(efx, "%s test interrupt seen on CPU%d\n", INT_MODE(efx),
|
|
efx->last_irq_cpu);
|
|
tests->interrupt = 1;
|
|
return 0;
|
|
}
|
|
|
|
/* Test generation and receipt of interrupting events */
|
|
static int efx_test_eventq_irq(struct efx_channel *channel,
|
|
struct efx_self_tests *tests)
|
|
{
|
|
unsigned int magic, count;
|
|
|
|
/* Channel specific code, limited to 20 bits */
|
|
magic = (0x00010150 + channel->channel);
|
|
EFX_LOG(channel->efx, "channel %d testing event queue with code %x\n",
|
|
channel->channel, magic);
|
|
|
|
tests->eventq_dma[channel->channel] = -1;
|
|
tests->eventq_int[channel->channel] = -1;
|
|
tests->eventq_poll[channel->channel] = -1;
|
|
|
|
/* Reset flag and zero magic word */
|
|
channel->efx->last_irq_cpu = -1;
|
|
channel->eventq_magic = 0;
|
|
smp_wmb();
|
|
|
|
efx_nic_generate_test_event(channel, magic);
|
|
|
|
/* Wait for arrival of interrupt */
|
|
count = 0;
|
|
do {
|
|
schedule_timeout_uninterruptible(HZ / 100);
|
|
|
|
if (channel->work_pending)
|
|
efx_process_channel_now(channel);
|
|
|
|
if (channel->eventq_magic == magic)
|
|
goto eventq_ok;
|
|
} while (++count < 2);
|
|
|
|
EFX_ERR(channel->efx, "channel %d timed out waiting for event queue\n",
|
|
channel->channel);
|
|
|
|
/* See if interrupt arrived */
|
|
if (channel->efx->last_irq_cpu >= 0) {
|
|
EFX_ERR(channel->efx, "channel %d saw interrupt on CPU%d "
|
|
"during event queue test\n", channel->channel,
|
|
raw_smp_processor_id());
|
|
tests->eventq_int[channel->channel] = 1;
|
|
}
|
|
|
|
/* Check to see if event was received even if interrupt wasn't */
|
|
efx_process_channel_now(channel);
|
|
if (channel->eventq_magic == magic) {
|
|
EFX_ERR(channel->efx, "channel %d event was generated, but "
|
|
"failed to trigger an interrupt\n", channel->channel);
|
|
tests->eventq_dma[channel->channel] = 1;
|
|
}
|
|
|
|
return -ETIMEDOUT;
|
|
eventq_ok:
|
|
EFX_LOG(channel->efx, "channel %d event queue passed\n",
|
|
channel->channel);
|
|
tests->eventq_dma[channel->channel] = 1;
|
|
tests->eventq_int[channel->channel] = 1;
|
|
tests->eventq_poll[channel->channel] = 1;
|
|
return 0;
|
|
}
|
|
|
|
static int efx_test_phy(struct efx_nic *efx, struct efx_self_tests *tests,
|
|
unsigned flags)
|
|
{
|
|
int rc;
|
|
|
|
if (!efx->phy_op->run_tests)
|
|
return 0;
|
|
|
|
mutex_lock(&efx->mac_lock);
|
|
rc = efx->phy_op->run_tests(efx, tests->phy_ext, flags);
|
|
mutex_unlock(&efx->mac_lock);
|
|
return rc;
|
|
}
|
|
|
|
/**************************************************************************
|
|
*
|
|
* Loopback testing
|
|
* NB Only one loopback test can be executing concurrently.
|
|
*
|
|
**************************************************************************/
|
|
|
|
/* Loopback test RX callback
|
|
* This is called for each received packet during loopback testing.
|
|
*/
|
|
void efx_loopback_rx_packet(struct efx_nic *efx,
|
|
const char *buf_ptr, int pkt_len)
|
|
{
|
|
struct efx_loopback_state *state = efx->loopback_selftest;
|
|
struct efx_loopback_payload *received;
|
|
struct efx_loopback_payload *payload;
|
|
|
|
BUG_ON(!buf_ptr);
|
|
|
|
/* If we are just flushing, then drop the packet */
|
|
if ((state == NULL) || state->flush)
|
|
return;
|
|
|
|
payload = &state->payload;
|
|
|
|
received = (struct efx_loopback_payload *) buf_ptr;
|
|
received->ip.saddr = payload->ip.saddr;
|
|
if (state->offload_csum)
|
|
received->ip.check = payload->ip.check;
|
|
|
|
/* Check that header exists */
|
|
if (pkt_len < sizeof(received->header)) {
|
|
EFX_ERR(efx, "saw runt RX packet (length %d) in %s loopback "
|
|
"test\n", pkt_len, LOOPBACK_MODE(efx));
|
|
goto err;
|
|
}
|
|
|
|
/* Check that the ethernet header exists */
|
|
if (memcmp(&received->header, &payload->header, ETH_HLEN) != 0) {
|
|
EFX_ERR(efx, "saw non-loopback RX packet in %s loopback test\n",
|
|
LOOPBACK_MODE(efx));
|
|
goto err;
|
|
}
|
|
|
|
/* Check packet length */
|
|
if (pkt_len != sizeof(*payload)) {
|
|
EFX_ERR(efx, "saw incorrect RX packet length %d (wanted %d) in "
|
|
"%s loopback test\n", pkt_len, (int)sizeof(*payload),
|
|
LOOPBACK_MODE(efx));
|
|
goto err;
|
|
}
|
|
|
|
/* Check that IP header matches */
|
|
if (memcmp(&received->ip, &payload->ip, sizeof(payload->ip)) != 0) {
|
|
EFX_ERR(efx, "saw corrupted IP header in %s loopback test\n",
|
|
LOOPBACK_MODE(efx));
|
|
goto err;
|
|
}
|
|
|
|
/* Check that msg and padding matches */
|
|
if (memcmp(&received->msg, &payload->msg, sizeof(received->msg)) != 0) {
|
|
EFX_ERR(efx, "saw corrupted RX packet in %s loopback test\n",
|
|
LOOPBACK_MODE(efx));
|
|
goto err;
|
|
}
|
|
|
|
/* Check that iteration matches */
|
|
if (received->iteration != payload->iteration) {
|
|
EFX_ERR(efx, "saw RX packet from iteration %d (wanted %d) in "
|
|
"%s loopback test\n", ntohs(received->iteration),
|
|
ntohs(payload->iteration), LOOPBACK_MODE(efx));
|
|
goto err;
|
|
}
|
|
|
|
/* Increase correct RX count */
|
|
EFX_TRACE(efx, "got loopback RX in %s loopback test\n",
|
|
LOOPBACK_MODE(efx));
|
|
|
|
atomic_inc(&state->rx_good);
|
|
return;
|
|
|
|
err:
|
|
#ifdef EFX_ENABLE_DEBUG
|
|
if (atomic_read(&state->rx_bad) == 0) {
|
|
EFX_ERR(efx, "received packet:\n");
|
|
print_hex_dump(KERN_ERR, "", DUMP_PREFIX_OFFSET, 0x10, 1,
|
|
buf_ptr, pkt_len, 0);
|
|
EFX_ERR(efx, "expected packet:\n");
|
|
print_hex_dump(KERN_ERR, "", DUMP_PREFIX_OFFSET, 0x10, 1,
|
|
&state->payload, sizeof(state->payload), 0);
|
|
}
|
|
#endif
|
|
atomic_inc(&state->rx_bad);
|
|
}
|
|
|
|
/* Initialise an efx_selftest_state for a new iteration */
|
|
static void efx_iterate_state(struct efx_nic *efx)
|
|
{
|
|
struct efx_loopback_state *state = efx->loopback_selftest;
|
|
struct net_device *net_dev = efx->net_dev;
|
|
struct efx_loopback_payload *payload = &state->payload;
|
|
|
|
/* Initialise the layerII header */
|
|
memcpy(&payload->header.h_dest, net_dev->dev_addr, ETH_ALEN);
|
|
memcpy(&payload->header.h_source, &payload_source, ETH_ALEN);
|
|
payload->header.h_proto = htons(ETH_P_IP);
|
|
|
|
/* saddr set later and used as incrementing count */
|
|
payload->ip.daddr = htonl(INADDR_LOOPBACK);
|
|
payload->ip.ihl = 5;
|
|
payload->ip.check = htons(0xdead);
|
|
payload->ip.tot_len = htons(sizeof(*payload) - sizeof(struct ethhdr));
|
|
payload->ip.version = IPVERSION;
|
|
payload->ip.protocol = IPPROTO_UDP;
|
|
|
|
/* Initialise udp header */
|
|
payload->udp.source = 0;
|
|
payload->udp.len = htons(sizeof(*payload) - sizeof(struct ethhdr) -
|
|
sizeof(struct iphdr));
|
|
payload->udp.check = 0; /* checksum ignored */
|
|
|
|
/* Fill out payload */
|
|
payload->iteration = htons(ntohs(payload->iteration) + 1);
|
|
memcpy(&payload->msg, payload_msg, sizeof(payload_msg));
|
|
|
|
/* Fill out remaining state members */
|
|
atomic_set(&state->rx_good, 0);
|
|
atomic_set(&state->rx_bad, 0);
|
|
smp_wmb();
|
|
}
|
|
|
|
static int efx_begin_loopback(struct efx_tx_queue *tx_queue)
|
|
{
|
|
struct efx_nic *efx = tx_queue->efx;
|
|
struct efx_loopback_state *state = efx->loopback_selftest;
|
|
struct efx_loopback_payload *payload;
|
|
struct sk_buff *skb;
|
|
int i;
|
|
netdev_tx_t rc;
|
|
|
|
/* Transmit N copies of buffer */
|
|
for (i = 0; i < state->packet_count; i++) {
|
|
/* Allocate an skb, holding an extra reference for
|
|
* transmit completion counting */
|
|
skb = alloc_skb(sizeof(state->payload), GFP_KERNEL);
|
|
if (!skb)
|
|
return -ENOMEM;
|
|
state->skbs[i] = skb;
|
|
skb_get(skb);
|
|
|
|
/* Copy the payload in, incrementing the source address to
|
|
* exercise the rss vectors */
|
|
payload = ((struct efx_loopback_payload *)
|
|
skb_put(skb, sizeof(state->payload)));
|
|
memcpy(payload, &state->payload, sizeof(state->payload));
|
|
payload->ip.saddr = htonl(INADDR_LOOPBACK | (i << 2));
|
|
|
|
/* Ensure everything we've written is visible to the
|
|
* interrupt handler. */
|
|
smp_wmb();
|
|
|
|
if (efx_dev_registered(efx))
|
|
netif_tx_lock_bh(efx->net_dev);
|
|
rc = efx_enqueue_skb(tx_queue, skb);
|
|
if (efx_dev_registered(efx))
|
|
netif_tx_unlock_bh(efx->net_dev);
|
|
|
|
if (rc != NETDEV_TX_OK) {
|
|
EFX_ERR(efx, "TX queue %d could not transmit packet %d "
|
|
"of %d in %s loopback test\n", tx_queue->queue,
|
|
i + 1, state->packet_count, LOOPBACK_MODE(efx));
|
|
|
|
/* Defer cleaning up the other skbs for the caller */
|
|
kfree_skb(skb);
|
|
return -EPIPE;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int efx_poll_loopback(struct efx_nic *efx)
|
|
{
|
|
struct efx_loopback_state *state = efx->loopback_selftest;
|
|
struct efx_channel *channel;
|
|
|
|
/* NAPI polling is not enabled, so process channels
|
|
* synchronously */
|
|
efx_for_each_channel(channel, efx) {
|
|
if (channel->work_pending)
|
|
efx_process_channel_now(channel);
|
|
}
|
|
return atomic_read(&state->rx_good) == state->packet_count;
|
|
}
|
|
|
|
static int efx_end_loopback(struct efx_tx_queue *tx_queue,
|
|
struct efx_loopback_self_tests *lb_tests)
|
|
{
|
|
struct efx_nic *efx = tx_queue->efx;
|
|
struct efx_loopback_state *state = efx->loopback_selftest;
|
|
struct sk_buff *skb;
|
|
int tx_done = 0, rx_good, rx_bad;
|
|
int i, rc = 0;
|
|
|
|
if (efx_dev_registered(efx))
|
|
netif_tx_lock_bh(efx->net_dev);
|
|
|
|
/* Count the number of tx completions, and decrement the refcnt. Any
|
|
* skbs not already completed will be free'd when the queue is flushed */
|
|
for (i=0; i < state->packet_count; i++) {
|
|
skb = state->skbs[i];
|
|
if (skb && !skb_shared(skb))
|
|
++tx_done;
|
|
dev_kfree_skb_any(skb);
|
|
}
|
|
|
|
if (efx_dev_registered(efx))
|
|
netif_tx_unlock_bh(efx->net_dev);
|
|
|
|
/* Check TX completion and received packet counts */
|
|
rx_good = atomic_read(&state->rx_good);
|
|
rx_bad = atomic_read(&state->rx_bad);
|
|
if (tx_done != state->packet_count) {
|
|
/* Don't free the skbs; they will be picked up on TX
|
|
* overflow or channel teardown.
|
|
*/
|
|
EFX_ERR(efx, "TX queue %d saw only %d out of an expected %d "
|
|
"TX completion events in %s loopback test\n",
|
|
tx_queue->queue, tx_done, state->packet_count,
|
|
LOOPBACK_MODE(efx));
|
|
rc = -ETIMEDOUT;
|
|
/* Allow to fall through so we see the RX errors as well */
|
|
}
|
|
|
|
/* We may always be up to a flush away from our desired packet total */
|
|
if (rx_good != state->packet_count) {
|
|
EFX_LOG(efx, "TX queue %d saw only %d out of an expected %d "
|
|
"received packets in %s loopback test\n",
|
|
tx_queue->queue, rx_good, state->packet_count,
|
|
LOOPBACK_MODE(efx));
|
|
rc = -ETIMEDOUT;
|
|
/* Fall through */
|
|
}
|
|
|
|
/* Update loopback test structure */
|
|
lb_tests->tx_sent[tx_queue->queue] += state->packet_count;
|
|
lb_tests->tx_done[tx_queue->queue] += tx_done;
|
|
lb_tests->rx_good += rx_good;
|
|
lb_tests->rx_bad += rx_bad;
|
|
|
|
return rc;
|
|
}
|
|
|
|
static int
|
|
efx_test_loopback(struct efx_tx_queue *tx_queue,
|
|
struct efx_loopback_self_tests *lb_tests)
|
|
{
|
|
struct efx_nic *efx = tx_queue->efx;
|
|
struct efx_loopback_state *state = efx->loopback_selftest;
|
|
int i, begin_rc, end_rc;
|
|
|
|
for (i = 0; i < 3; i++) {
|
|
/* Determine how many packets to send */
|
|
state->packet_count = EFX_TXQ_SIZE / 3;
|
|
state->packet_count = min(1 << (i << 2), state->packet_count);
|
|
state->skbs = kzalloc(sizeof(state->skbs[0]) *
|
|
state->packet_count, GFP_KERNEL);
|
|
if (!state->skbs)
|
|
return -ENOMEM;
|
|
state->flush = false;
|
|
|
|
EFX_LOG(efx, "TX queue %d testing %s loopback with %d "
|
|
"packets\n", tx_queue->queue, LOOPBACK_MODE(efx),
|
|
state->packet_count);
|
|
|
|
efx_iterate_state(efx);
|
|
begin_rc = efx_begin_loopback(tx_queue);
|
|
|
|
/* This will normally complete very quickly, but be
|
|
* prepared to wait up to 100 ms. */
|
|
msleep(1);
|
|
if (!efx_poll_loopback(efx)) {
|
|
msleep(100);
|
|
efx_poll_loopback(efx);
|
|
}
|
|
|
|
end_rc = efx_end_loopback(tx_queue, lb_tests);
|
|
kfree(state->skbs);
|
|
|
|
if (begin_rc || end_rc) {
|
|
/* Wait a while to ensure there are no packets
|
|
* floating around after a failure. */
|
|
schedule_timeout_uninterruptible(HZ / 10);
|
|
return begin_rc ? begin_rc : end_rc;
|
|
}
|
|
}
|
|
|
|
EFX_LOG(efx, "TX queue %d passed %s loopback test with a burst length "
|
|
"of %d packets\n", tx_queue->queue, LOOPBACK_MODE(efx),
|
|
state->packet_count);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/* Wait for link up. On Falcon, we would prefer to rely on efx_monitor, but
|
|
* any contention on the mac lock (via e.g. efx_mac_mcast_work) causes it
|
|
* to delay and retry. Therefore, it's safer to just poll directly. Wait
|
|
* for link up and any faults to dissipate. */
|
|
static int efx_wait_for_link(struct efx_nic *efx)
|
|
{
|
|
struct efx_link_state *link_state = &efx->link_state;
|
|
int count;
|
|
bool link_up;
|
|
|
|
for (count = 0; count < 40; count++) {
|
|
schedule_timeout_uninterruptible(HZ / 10);
|
|
|
|
if (efx->type->monitor != NULL) {
|
|
mutex_lock(&efx->mac_lock);
|
|
efx->type->monitor(efx);
|
|
mutex_unlock(&efx->mac_lock);
|
|
} else {
|
|
struct efx_channel *channel = &efx->channel[0];
|
|
if (channel->work_pending)
|
|
efx_process_channel_now(channel);
|
|
}
|
|
|
|
mutex_lock(&efx->mac_lock);
|
|
link_up = link_state->up;
|
|
if (link_up)
|
|
link_up = !efx->mac_op->check_fault(efx);
|
|
mutex_unlock(&efx->mac_lock);
|
|
|
|
if (link_up)
|
|
return 0;
|
|
}
|
|
|
|
return -ETIMEDOUT;
|
|
}
|
|
|
|
static int efx_test_loopbacks(struct efx_nic *efx, struct efx_self_tests *tests,
|
|
unsigned int loopback_modes)
|
|
{
|
|
enum efx_loopback_mode mode;
|
|
struct efx_loopback_state *state;
|
|
struct efx_tx_queue *tx_queue;
|
|
int rc = 0;
|
|
|
|
/* Set the port loopback_selftest member. From this point on
|
|
* all received packets will be dropped. Mark the state as
|
|
* "flushing" so all inflight packets are dropped */
|
|
state = kzalloc(sizeof(*state), GFP_KERNEL);
|
|
if (state == NULL)
|
|
return -ENOMEM;
|
|
BUG_ON(efx->loopback_selftest);
|
|
state->flush = true;
|
|
efx->loopback_selftest = state;
|
|
|
|
/* Test all supported loopback modes */
|
|
for (mode = LOOPBACK_NONE; mode <= LOOPBACK_TEST_MAX; mode++) {
|
|
if (!(loopback_modes & (1 << mode)))
|
|
continue;
|
|
|
|
/* Move the port into the specified loopback mode. */
|
|
state->flush = true;
|
|
mutex_lock(&efx->mac_lock);
|
|
efx->loopback_mode = mode;
|
|
rc = __efx_reconfigure_port(efx);
|
|
mutex_unlock(&efx->mac_lock);
|
|
if (rc) {
|
|
EFX_ERR(efx, "unable to move into %s loopback\n",
|
|
LOOPBACK_MODE(efx));
|
|
goto out;
|
|
}
|
|
|
|
rc = efx_wait_for_link(efx);
|
|
if (rc) {
|
|
EFX_ERR(efx, "loopback %s never came up\n",
|
|
LOOPBACK_MODE(efx));
|
|
goto out;
|
|
}
|
|
|
|
/* Test every TX queue */
|
|
efx_for_each_tx_queue(tx_queue, efx) {
|
|
state->offload_csum = (tx_queue->queue ==
|
|
EFX_TX_QUEUE_OFFLOAD_CSUM);
|
|
rc = efx_test_loopback(tx_queue,
|
|
&tests->loopback[mode]);
|
|
if (rc)
|
|
goto out;
|
|
}
|
|
}
|
|
|
|
out:
|
|
/* Remove the flush. The caller will remove the loopback setting */
|
|
state->flush = true;
|
|
efx->loopback_selftest = NULL;
|
|
wmb();
|
|
kfree(state);
|
|
|
|
return rc;
|
|
}
|
|
|
|
/**************************************************************************
|
|
*
|
|
* Entry point
|
|
*
|
|
*************************************************************************/
|
|
|
|
int efx_selftest(struct efx_nic *efx, struct efx_self_tests *tests,
|
|
unsigned flags)
|
|
{
|
|
enum efx_loopback_mode loopback_mode = efx->loopback_mode;
|
|
int phy_mode = efx->phy_mode;
|
|
enum reset_type reset_method = RESET_TYPE_INVISIBLE;
|
|
struct efx_channel *channel;
|
|
int rc_test = 0, rc_reset = 0, rc;
|
|
|
|
/* Online (i.e. non-disruptive) testing
|
|
* This checks interrupt generation, event delivery and PHY presence. */
|
|
|
|
rc = efx_test_phy_alive(efx, tests);
|
|
if (rc && !rc_test)
|
|
rc_test = rc;
|
|
|
|
rc = efx_test_nvram(efx, tests);
|
|
if (rc && !rc_test)
|
|
rc_test = rc;
|
|
|
|
rc = efx_test_interrupts(efx, tests);
|
|
if (rc && !rc_test)
|
|
rc_test = rc;
|
|
|
|
efx_for_each_channel(channel, efx) {
|
|
rc = efx_test_eventq_irq(channel, tests);
|
|
if (rc && !rc_test)
|
|
rc_test = rc;
|
|
}
|
|
|
|
if (rc_test)
|
|
return rc_test;
|
|
|
|
if (!(flags & ETH_TEST_FL_OFFLINE))
|
|
return efx_test_phy(efx, tests, flags);
|
|
|
|
/* Offline (i.e. disruptive) testing
|
|
* This checks MAC and PHY loopback on the specified port. */
|
|
|
|
/* force the carrier state off so the kernel doesn't transmit during
|
|
* the loopback test, and the watchdog timeout doesn't fire. Also put
|
|
* falcon into loopback for the register test.
|
|
*/
|
|
mutex_lock(&efx->mac_lock);
|
|
efx->port_inhibited = true;
|
|
if (efx->loopback_modes) {
|
|
/* We need the 312 clock from the PHY to test the XMAC
|
|
* registers, so move into XGMII loopback if available */
|
|
if (efx->loopback_modes & (1 << LOOPBACK_XGMII))
|
|
efx->loopback_mode = LOOPBACK_XGMII;
|
|
else
|
|
efx->loopback_mode = __ffs(efx->loopback_modes);
|
|
}
|
|
|
|
__efx_reconfigure_port(efx);
|
|
mutex_unlock(&efx->mac_lock);
|
|
|
|
/* free up all consumers of SRAM (including all the queues) */
|
|
efx_reset_down(efx, reset_method);
|
|
|
|
rc = efx_test_chip(efx, tests);
|
|
if (rc && !rc_test)
|
|
rc_test = rc;
|
|
|
|
/* reset the chip to recover from the register test */
|
|
rc_reset = efx->type->reset(efx, reset_method);
|
|
|
|
/* Ensure that the phy is powered and out of loopback
|
|
* for the bist and loopback tests */
|
|
efx->phy_mode &= ~PHY_MODE_LOW_POWER;
|
|
efx->loopback_mode = LOOPBACK_NONE;
|
|
|
|
rc = efx_reset_up(efx, reset_method, rc_reset == 0);
|
|
if (rc && !rc_reset)
|
|
rc_reset = rc;
|
|
|
|
if (rc_reset) {
|
|
EFX_ERR(efx, "Unable to recover from chip test\n");
|
|
efx_schedule_reset(efx, RESET_TYPE_DISABLE);
|
|
return rc_reset;
|
|
}
|
|
|
|
rc = efx_test_phy(efx, tests, flags);
|
|
if (rc && !rc_test)
|
|
rc_test = rc;
|
|
|
|
rc = efx_test_loopbacks(efx, tests, efx->loopback_modes);
|
|
if (rc && !rc_test)
|
|
rc_test = rc;
|
|
|
|
/* restore the PHY to the previous state */
|
|
mutex_lock(&efx->mac_lock);
|
|
efx->phy_mode = phy_mode;
|
|
efx->port_inhibited = false;
|
|
efx->loopback_mode = loopback_mode;
|
|
__efx_reconfigure_port(efx);
|
|
mutex_unlock(&efx->mac_lock);
|
|
|
|
return rc_test;
|
|
}
|
|
|