Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp6315976imu; Sun, 2 Dec 2018 15:14:38 -0800 (PST) X-Google-Smtp-Source: AFSGD/WB2BeP9wLZfh1RHaHBT1osJEU3ka7gtUQZthx7slU5klyGZ3s37qdc3YFJWXIjKU6IKxOl X-Received: by 2002:a63:64c:: with SMTP id 73mr11349960pgg.373.1543792478828; Sun, 02 Dec 2018 15:14:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543792478; cv=none; d=google.com; s=arc-20160816; b=cDKEl0QkHayVdkKK82yqqR+HYPCb3nOgrjqLjo83/eQyTaKeQTrbNI9XgczX5Gub07 Zx9S1KJk6hFO6uHEoGcrQzQR6S2YwV8YJwDw+VYxw4mQldJEDt4Yxzr/5QJNegGWwERj JXWC2lcohSXagIuyIzbO12qwfU2lOJpOs6EwiAqtHE+ZMY5RfBUV0CGGd09HaSBqqVK1 stPBdBvqKQ5XXj0co7+Yyb1/4fq4eQ/xgKK1l2sYxMv2WrGMSc36l0QqCmFvaHZpY85H Wfe0OYqz8jGUshkNG7BhKK/FcqVIbT2wZ8Po53TLA0dytwDNQY9upJZIU9sJAgtFLDmP xu9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from; bh=EKCQcZZtRXg2EHt1eH8Mq9qz7aqK8wWi8v77MQSJIAE=; b=bu/Ap3SrRogRgTbDm2eaidPDF4NjEZZavmz2Lo9sf/zu7G83PtGpPpy3dUXkf0cBXv o/+biWp1gFTWknm+FRZ1WHiXt/wZOkvSWx4pwq05GiZ6/p6DVOUvo5QD83UF3Xn62Xcl QsZ72B3RGP8tqY6CVYl+/oGs7mr885iGM9B/1arpEt7ZHhOHLgVLmqEX2LcpGcSZ6JZz OIki/XByGbm+/NLRqCrn4A717a6bFFcBQDml/KE57y6QTYxO8dMmxhilSKTEwcuwPnSy Nf0BXGs1wBTzFZDMLg9NSeGItm5nCB1c9k4rjccwCPLfNi0/GBCW/rjHNdWkW1tbLITx rZlg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k11si10349615pgh.132.2018.12.02.15.14.23; Sun, 02 Dec 2018 15:14:38 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725922AbeLBXL3 (ORCPT + 99 others); Sun, 2 Dec 2018 18:11:29 -0500 Received: from szxga05-in.huawei.com ([45.249.212.191]:15187 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725913AbeLBXL1 (ORCPT ); Sun, 2 Dec 2018 18:11:27 -0500 Received: from DGGEMS403-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id 45B1FF51A21DE; Mon, 3 Dec 2018 07:11:23 +0800 (CST) Received: from S00293818-DELL1.china.huawei.com (10.47.90.156) by DGGEMS403-HUB.china.huawei.com (10.3.19.203) with Microsoft SMTP Server id 14.3.408.0; Mon, 3 Dec 2018 07:11:14 +0800 From: Salil Mehta To: CC: , , , , , , , liuzhongzhu Subject: [RFC net-next 4/9] net: hns3: Add "vf vlan table" information query function Date: Sun, 2 Dec 2018 23:09:28 +0000 Message-ID: <20181202230933.15560-5-salil.mehta@huawei.com> X-Mailer: git-send-email 2.8.3 In-Reply-To: <20181202230933.15560-1-salil.mehta@huawei.com> References: <20181202230933.15560-1-salil.mehta@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.47.90.156] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: liuzhongzhu This patch prints vf vlan table information. debugfs command: echo dump port vlan tbl 0 > cmd Sample Command: root@(none)# echo dump vf vlan tbl 0 > cmd vlan | vf filter bitMap: 0000 | 00000000:00000000:00000000:00000000:00000000:00000000:00000000:00000001 root@(none)# Signed-off-by: liuzhongzhu Signed-off-by: Salil Mehta --- drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c | 1 + .../ethernet/hisilicon/hns3/hns3pf/hclge_debugfs.c | 93 ++++++++++++++++++++++ 2 files changed, 94 insertions(+) diff --git a/drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c b/drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c index 51af55f34e55..80a081e87b96 100644 --- a/drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c +++ b/drivers/net/ethernet/hisilicon/hns3/hns3_debugfs.c @@ -212,6 +212,7 @@ static void hns3_dbg_help(struct hnae3_handle *h) dev_info(&h->pdev->dev, "dump qos buf cfg\n"); dev_info(&h->pdev->dev, "dump mac tbl\n"); dev_info(&h->pdev->dev, "dump port vlan tbl\n"); + dev_info(&h->pdev->dev, "dump vf vlan tbl [vf id]\n"); } static ssize_t hns3_dbg_cmd_read(struct file *filp, char __user *buffer, diff --git a/drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_debugfs.c b/drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_debugfs.c index 4a034a59fcb2..20e64abe7c5a 100644 --- a/drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_debugfs.c +++ b/drivers/net/ethernet/hisilicon/hns3/hns3pf/hclge_debugfs.c @@ -608,6 +608,97 @@ static void hclge_dbg_dump_port_vlan_table(struct hclge_dev *hdev) kfree(vlan_bitmap); } +static void hclge_dbg_dump_vf_vlan_table(struct hclge_dev *hdev, char *cmd_buf) +{ + struct hclge_vlan_filter_vf_cfg_cmd *req0; + struct hclge_vlan_filter_vf_cfg_cmd *req1; + char printf_buf[HCLGE_DBG_BUF_LEN]; + struct hclge_desc desc[2]; + u32 *vlan_bitmap; + u8 vf_byte_val; + u8 vf_bitmap; + int vlan_len; + u32 vlan_id; + int ret, i; + bool flag; + u16 vf_id; + + ret = kstrtou16(&cmd_buf[17], 10, &vf_id); + if (ret) { + dev_err(&hdev->pdev->dev, + "vf id failed. vf id max: %d\n", hdev->num_alloc_vfs); + return; + } + + vlan_len = HCLGE_DBG_VLAN_ID_MAX / 8; + vlan_bitmap = kzalloc(vlan_len, GFP_KERNEL); + if (!vlan_bitmap) { + dev_err(&hdev->pdev->dev, + "port vlan table alloc memory failed\n"); + return; + } + + for (vlan_id = 0; vlan_id < HCLGE_DBG_VLAN_ID_MAX; vlan_id++) { + /* Prevent long-term occupation of the command channel. */ + if ((vlan_id % 100) == 0) + msleep(100); + + hclge_cmd_setup_basic_desc(&desc[0], + HCLGE_OPC_VLAN_FILTER_VF_CFG, true); + desc[0].flag |= cpu_to_le16(HCLGE_CMD_FLAG_NEXT); + hclge_cmd_setup_basic_desc(&desc[1], + HCLGE_OPC_VLAN_FILTER_VF_CFG, true); + + req0 = (struct hclge_vlan_filter_vf_cfg_cmd *)desc[0].data; + req1 = (struct hclge_vlan_filter_vf_cfg_cmd *)desc[1].data; + req0->vlan_id = cpu_to_le16(vlan_id); + + ret = hclge_cmd_send(&hdev->hw, desc, 2); + if (ret) { + dev_err(&hdev->pdev->dev, + "call hclge_cmd_send fail, ret = %d\n", ret); + kfree(vlan_bitmap); + return; + } + + if (vf_id < 128) + vf_bitmap = req0->vf_bitmap[vf_id / 8]; + else + vf_bitmap = req1->vf_bitmap[(vf_id - 128) / 8]; + + vf_byte_val = 1 << (vf_id % 8); + + if (vf_bitmap & vf_byte_val) + vlan_bitmap[(u32)(vlan_id / 32)] |= 1 << (vlan_id % 32); + } + + dev_info(&hdev->pdev->dev, "vlan | vf filter bitMap:\n"); + + for (vlan_id = 0; vlan_id < HCLGE_DBG_VLAN_ID_MAX / 32; vlan_id += 8) { + memset(printf_buf, 0, HCLGE_DBG_BUF_LEN); + snprintf(printf_buf, HCLGE_DBG_BUF_LEN, + "%04d | ", vlan_id * 32); + + flag = false; + + for (i = 7; i >= 0; i--) { + snprintf(printf_buf + strlen(printf_buf), + HCLGE_DBG_BUF_LEN - strlen(printf_buf), + "%08x:", vlan_bitmap[(u32)(vlan_id + i)]); + + if (vlan_bitmap[(u32)(vlan_id + i)] > 0) + flag = true; + } + + printf_buf[strlen(printf_buf) - 1] = '\n'; + + if (flag) + dev_info(&hdev->pdev->dev, "%s", printf_buf); + } + + kfree(vlan_bitmap); +} + static void hclge_dbg_fd_tcam_read(struct hclge_dev *hdev, u8 stage, bool sel_x, u32 loc) { @@ -683,6 +774,8 @@ int hclge_dbg_run_cmd(struct hnae3_handle *handle, char *cmd_buf) hclge_dbg_dump_mac_table(hdev); } else if (strncmp(cmd_buf, "dump port vlan tbl", 18) == 0) { hclge_dbg_dump_port_vlan_table(hdev); + } else if (strncmp(cmd_buf, "dump vf vlan tbl", 16) == 0) { + hclge_dbg_dump_vf_vlan_table(hdev, cmd_buf); } else { dev_info(&hdev->pdev->dev, "unknown command\n"); return -EINVAL; -- 2.11.0