]>
Commit | Line | Data |
---|---|---|
3273c2e8 BH |
1 | /**************************************************************************** |
2 | * Driver for Solarflare Solarstorm network controllers and boards | |
3 | * Copyright 2005-2006 Fen Systems Ltd. | |
906bb26c | 4 | * Copyright 2006-2009 Solarflare Communications Inc. |
3273c2e8 BH |
5 | * |
6 | * This program is free software; you can redistribute it and/or modify it | |
7 | * under the terms of the GNU General Public License version 2 as published | |
8 | * by the Free Software Foundation, incorporated herein by reference. | |
9 | */ | |
10 | ||
11 | #include <linux/netdevice.h> | |
12 | #include <linux/module.h> | |
13 | #include <linux/delay.h> | |
14 | #include <linux/kernel_stat.h> | |
15 | #include <linux/pci.h> | |
16 | #include <linux/ethtool.h> | |
17 | #include <linux/ip.h> | |
18 | #include <linux/in.h> | |
19 | #include <linux/udp.h> | |
20 | #include <linux/rtnetlink.h> | |
5a0e3ad6 | 21 | #include <linux/slab.h> |
3273c2e8 BH |
22 | #include <asm/io.h> |
23 | #include "net_driver.h" | |
3273c2e8 | 24 | #include "efx.h" |
744093c9 | 25 | #include "nic.h" |
3273c2e8 | 26 | #include "selftest.h" |
3273c2e8 | 27 | #include "workarounds.h" |
3273c2e8 BH |
28 | |
29 | /* | |
30 | * Loopback test packet structure | |
31 | * | |
32 | * The self-test should stress every RSS vector, and unfortunately | |
33 | * Falcon only performs RSS on TCP/UDP packets. | |
34 | */ | |
35 | struct efx_loopback_payload { | |
36 | struct ethhdr header; | |
37 | struct iphdr ip; | |
38 | struct udphdr udp; | |
39 | __be16 iteration; | |
40 | const char msg[64]; | |
41 | } __attribute__ ((packed)); | |
42 | ||
43 | /* Loopback test source MAC address */ | |
44 | static const unsigned char payload_source[ETH_ALEN] = { | |
45 | 0x00, 0x0f, 0x53, 0x1b, 0x1b, 0x1b, | |
46 | }; | |
47 | ||
94de803d | 48 | static const char payload_msg[] = |
3273c2e8 BH |
49 | "Hello world! This is an Efx loopback test in progress!"; |
50 | ||
51 | /** | |
8c8661e4 | 52 | * efx_loopback_state - persistent state during a loopback selftest |
3273c2e8 BH |
53 | * @flush: Drop all packets in efx_loopback_rx_packet |
54 | * @packet_count: Number of packets being used in this test | |
55 | * @skbs: An array of skbs transmitted | |
f30eb23e | 56 | * @offload_csum: Checksums are being offloaded |
3273c2e8 BH |
57 | * @rx_good: RX good packet count |
58 | * @rx_bad: RX bad packet count | |
59 | * @payload: Payload used in tests | |
60 | */ | |
8c8661e4 | 61 | struct efx_loopback_state { |
dc8cfa55 | 62 | bool flush; |
3273c2e8 BH |
63 | int packet_count; |
64 | struct sk_buff **skbs; | |
dc8cfa55 | 65 | bool offload_csum; |
3273c2e8 BH |
66 | atomic_t rx_good; |
67 | atomic_t rx_bad; | |
68 | struct efx_loopback_payload payload; | |
69 | }; | |
70 | ||
71 | /************************************************************************** | |
72 | * | |
8c8661e4 | 73 | * MII, NVRAM and register tests |
3273c2e8 BH |
74 | * |
75 | **************************************************************************/ | |
76 | ||
4f16c073 | 77 | static int efx_test_phy_alive(struct efx_nic *efx, struct efx_self_tests *tests) |
8c8661e4 BH |
78 | { |
79 | int rc = 0; | |
8c8661e4 | 80 | |
4f16c073 BH |
81 | if (efx->phy_op->test_alive) { |
82 | rc = efx->phy_op->test_alive(efx); | |
83 | tests->phy_alive = rc ? -1 : 1; | |
8c8661e4 BH |
84 | } |
85 | ||
8c8661e4 BH |
86 | return rc; |
87 | } | |
88 | ||
89 | static int efx_test_nvram(struct efx_nic *efx, struct efx_self_tests *tests) | |
90 | { | |
0aa3fbaa BH |
91 | int rc = 0; |
92 | ||
93 | if (efx->type->test_nvram) { | |
94 | rc = efx->type->test_nvram(efx); | |
95 | tests->nvram = rc ? -1 : 1; | |
96 | } | |
8c8661e4 | 97 | |
8c8661e4 BH |
98 | return rc; |
99 | } | |
100 | ||
101 | static int efx_test_chip(struct efx_nic *efx, struct efx_self_tests *tests) | |
102 | { | |
9bfc4bb1 | 103 | int rc = 0; |
8c8661e4 | 104 | |
9bfc4bb1 BH |
105 | /* Test register access */ |
106 | if (efx->type->test_registers) { | |
107 | rc = efx->type->test_registers(efx); | |
108 | tests->registers = rc ? -1 : 1; | |
109 | } | |
8c8661e4 | 110 | |
8c8661e4 BH |
111 | return rc; |
112 | } | |
3273c2e8 BH |
113 | |
114 | /************************************************************************** | |
115 | * | |
116 | * Interrupt and event queue testing | |
117 | * | |
118 | **************************************************************************/ | |
119 | ||
120 | /* Test generation and receipt of interrupts */ | |
121 | static int efx_test_interrupts(struct efx_nic *efx, | |
122 | struct efx_self_tests *tests) | |
123 | { | |
124 | struct efx_channel *channel; | |
125 | ||
126 | EFX_LOG(efx, "testing interrupts\n"); | |
127 | tests->interrupt = -1; | |
128 | ||
129 | /* Reset interrupt flag */ | |
130 | efx->last_irq_cpu = -1; | |
131 | smp_wmb(); | |
132 | ||
133 | /* ACK each interrupting event queue. Receiving an interrupt due to | |
134 | * traffic before a test event is raised is considered a pass */ | |
64ee3120 | 135 | efx_for_each_channel(channel, efx) { |
3273c2e8 BH |
136 | if (channel->work_pending) |
137 | efx_process_channel_now(channel); | |
138 | if (efx->last_irq_cpu >= 0) | |
139 | goto success; | |
140 | } | |
141 | ||
152b6a62 | 142 | efx_nic_generate_interrupt(efx); |
3273c2e8 BH |
143 | |
144 | /* Wait for arrival of test interrupt. */ | |
145 | EFX_LOG(efx, "waiting for test interrupt\n"); | |
146 | schedule_timeout_uninterruptible(HZ / 10); | |
147 | if (efx->last_irq_cpu >= 0) | |
148 | goto success; | |
149 | ||
150 | EFX_ERR(efx, "timed out waiting for interrupt\n"); | |
151 | return -ETIMEDOUT; | |
152 | ||
153 | success: | |
c459302d BH |
154 | EFX_LOG(efx, "%s test interrupt seen on CPU%d\n", INT_MODE(efx), |
155 | efx->last_irq_cpu); | |
3273c2e8 BH |
156 | tests->interrupt = 1; |
157 | return 0; | |
158 | } | |
159 | ||
3273c2e8 BH |
160 | /* Test generation and receipt of interrupting events */ |
161 | static int efx_test_eventq_irq(struct efx_channel *channel, | |
162 | struct efx_self_tests *tests) | |
163 | { | |
164 | unsigned int magic, count; | |
165 | ||
166 | /* Channel specific code, limited to 20 bits */ | |
167 | magic = (0x00010150 + channel->channel); | |
168 | EFX_LOG(channel->efx, "channel %d testing event queue with code %x\n", | |
169 | channel->channel, magic); | |
170 | ||
171 | tests->eventq_dma[channel->channel] = -1; | |
172 | tests->eventq_int[channel->channel] = -1; | |
173 | tests->eventq_poll[channel->channel] = -1; | |
174 | ||
175 | /* Reset flag and zero magic word */ | |
176 | channel->efx->last_irq_cpu = -1; | |
177 | channel->eventq_magic = 0; | |
178 | smp_wmb(); | |
179 | ||
152b6a62 | 180 | efx_nic_generate_test_event(channel, magic); |
3273c2e8 BH |
181 | |
182 | /* Wait for arrival of interrupt */ | |
183 | count = 0; | |
184 | do { | |
185 | schedule_timeout_uninterruptible(HZ / 100); | |
186 | ||
187 | if (channel->work_pending) | |
188 | efx_process_channel_now(channel); | |
189 | ||
190 | if (channel->eventq_magic == magic) | |
191 | goto eventq_ok; | |
192 | } while (++count < 2); | |
193 | ||
194 | EFX_ERR(channel->efx, "channel %d timed out waiting for event queue\n", | |
195 | channel->channel); | |
196 | ||
197 | /* See if interrupt arrived */ | |
198 | if (channel->efx->last_irq_cpu >= 0) { | |
199 | EFX_ERR(channel->efx, "channel %d saw interrupt on CPU%d " | |
200 | "during event queue test\n", channel->channel, | |
201 | raw_smp_processor_id()); | |
202 | tests->eventq_int[channel->channel] = 1; | |
203 | } | |
204 | ||
205 | /* Check to see if event was received even if interrupt wasn't */ | |
206 | efx_process_channel_now(channel); | |
207 | if (channel->eventq_magic == magic) { | |
208 | EFX_ERR(channel->efx, "channel %d event was generated, but " | |
209 | "failed to trigger an interrupt\n", channel->channel); | |
210 | tests->eventq_dma[channel->channel] = 1; | |
211 | } | |
212 | ||
213 | return -ETIMEDOUT; | |
214 | eventq_ok: | |
215 | EFX_LOG(channel->efx, "channel %d event queue passed\n", | |
216 | channel->channel); | |
217 | tests->eventq_dma[channel->channel] = 1; | |
218 | tests->eventq_int[channel->channel] = 1; | |
219 | tests->eventq_poll[channel->channel] = 1; | |
220 | return 0; | |
221 | } | |
222 | ||
1796721a BH |
223 | static int efx_test_phy(struct efx_nic *efx, struct efx_self_tests *tests, |
224 | unsigned flags) | |
3273c2e8 | 225 | { |
8c8661e4 | 226 | int rc; |
3273c2e8 | 227 | |
1796721a | 228 | if (!efx->phy_op->run_tests) |
3273c2e8 | 229 | return 0; |
3273c2e8 | 230 | |
8c8661e4 | 231 | mutex_lock(&efx->mac_lock); |
4f16c073 | 232 | rc = efx->phy_op->run_tests(efx, tests->phy_ext, flags); |
8c8661e4 | 233 | mutex_unlock(&efx->mac_lock); |
8c8661e4 | 234 | return rc; |
3273c2e8 BH |
235 | } |
236 | ||
237 | /************************************************************************** | |
238 | * | |
239 | * Loopback testing | |
240 | * NB Only one loopback test can be executing concurrently. | |
241 | * | |
242 | **************************************************************************/ | |
243 | ||
244 | /* Loopback test RX callback | |
245 | * This is called for each received packet during loopback testing. | |
246 | */ | |
247 | void efx_loopback_rx_packet(struct efx_nic *efx, | |
248 | const char *buf_ptr, int pkt_len) | |
249 | { | |
8c8661e4 | 250 | struct efx_loopback_state *state = efx->loopback_selftest; |
3273c2e8 BH |
251 | struct efx_loopback_payload *received; |
252 | struct efx_loopback_payload *payload; | |
253 | ||
254 | BUG_ON(!buf_ptr); | |
255 | ||
256 | /* If we are just flushing, then drop the packet */ | |
257 | if ((state == NULL) || state->flush) | |
258 | return; | |
259 | ||
260 | payload = &state->payload; | |
8c8661e4 | 261 | |
d3208b5e | 262 | received = (struct efx_loopback_payload *) buf_ptr; |
3273c2e8 | 263 | received->ip.saddr = payload->ip.saddr; |
60ac1065 BH |
264 | if (state->offload_csum) |
265 | received->ip.check = payload->ip.check; | |
266 | ||
3273c2e8 BH |
267 | /* Check that header exists */ |
268 | if (pkt_len < sizeof(received->header)) { | |
269 | EFX_ERR(efx, "saw runt RX packet (length %d) in %s loopback " | |
270 | "test\n", pkt_len, LOOPBACK_MODE(efx)); | |
271 | goto err; | |
272 | } | |
273 | ||
274 | /* Check that the ethernet header exists */ | |
275 | if (memcmp(&received->header, &payload->header, ETH_HLEN) != 0) { | |
276 | EFX_ERR(efx, "saw non-loopback RX packet in %s loopback test\n", | |
277 | LOOPBACK_MODE(efx)); | |
278 | goto err; | |
279 | } | |
280 | ||
281 | /* Check packet length */ | |
282 | if (pkt_len != sizeof(*payload)) { | |
283 | EFX_ERR(efx, "saw incorrect RX packet length %d (wanted %d) in " | |
284 | "%s loopback test\n", pkt_len, (int)sizeof(*payload), | |
285 | LOOPBACK_MODE(efx)); | |
286 | goto err; | |
287 | } | |
288 | ||
289 | /* Check that IP header matches */ | |
290 | if (memcmp(&received->ip, &payload->ip, sizeof(payload->ip)) != 0) { | |
291 | EFX_ERR(efx, "saw corrupted IP header in %s loopback test\n", | |
292 | LOOPBACK_MODE(efx)); | |
293 | goto err; | |
294 | } | |
295 | ||
296 | /* Check that msg and padding matches */ | |
297 | if (memcmp(&received->msg, &payload->msg, sizeof(received->msg)) != 0) { | |
298 | EFX_ERR(efx, "saw corrupted RX packet in %s loopback test\n", | |
299 | LOOPBACK_MODE(efx)); | |
300 | goto err; | |
301 | } | |
302 | ||
303 | /* Check that iteration matches */ | |
304 | if (received->iteration != payload->iteration) { | |
305 | EFX_ERR(efx, "saw RX packet from iteration %d (wanted %d) in " | |
306 | "%s loopback test\n", ntohs(received->iteration), | |
307 | ntohs(payload->iteration), LOOPBACK_MODE(efx)); | |
308 | goto err; | |
309 | } | |
310 | ||
311 | /* Increase correct RX count */ | |
312 | EFX_TRACE(efx, "got loopback RX in %s loopback test\n", | |
313 | LOOPBACK_MODE(efx)); | |
314 | ||
315 | atomic_inc(&state->rx_good); | |
316 | return; | |
317 | ||
318 | err: | |
319 | #ifdef EFX_ENABLE_DEBUG | |
320 | if (atomic_read(&state->rx_bad) == 0) { | |
321 | EFX_ERR(efx, "received packet:\n"); | |
322 | print_hex_dump(KERN_ERR, "", DUMP_PREFIX_OFFSET, 0x10, 1, | |
323 | buf_ptr, pkt_len, 0); | |
324 | EFX_ERR(efx, "expected packet:\n"); | |
325 | print_hex_dump(KERN_ERR, "", DUMP_PREFIX_OFFSET, 0x10, 1, | |
326 | &state->payload, sizeof(state->payload), 0); | |
327 | } | |
328 | #endif | |
329 | atomic_inc(&state->rx_bad); | |
330 | } | |
331 | ||
332 | /* Initialise an efx_selftest_state for a new iteration */ | |
333 | static void efx_iterate_state(struct efx_nic *efx) | |
334 | { | |
8c8661e4 | 335 | struct efx_loopback_state *state = efx->loopback_selftest; |
3273c2e8 BH |
336 | struct net_device *net_dev = efx->net_dev; |
337 | struct efx_loopback_payload *payload = &state->payload; | |
338 | ||
339 | /* Initialise the layerII header */ | |
340 | memcpy(&payload->header.h_dest, net_dev->dev_addr, ETH_ALEN); | |
341 | memcpy(&payload->header.h_source, &payload_source, ETH_ALEN); | |
342 | payload->header.h_proto = htons(ETH_P_IP); | |
343 | ||
344 | /* saddr set later and used as incrementing count */ | |
345 | payload->ip.daddr = htonl(INADDR_LOOPBACK); | |
346 | payload->ip.ihl = 5; | |
347 | payload->ip.check = htons(0xdead); | |
348 | payload->ip.tot_len = htons(sizeof(*payload) - sizeof(struct ethhdr)); | |
349 | payload->ip.version = IPVERSION; | |
350 | payload->ip.protocol = IPPROTO_UDP; | |
351 | ||
352 | /* Initialise udp header */ | |
353 | payload->udp.source = 0; | |
354 | payload->udp.len = htons(sizeof(*payload) - sizeof(struct ethhdr) - | |
355 | sizeof(struct iphdr)); | |
356 | payload->udp.check = 0; /* checksum ignored */ | |
357 | ||
358 | /* Fill out payload */ | |
359 | payload->iteration = htons(ntohs(payload->iteration) + 1); | |
360 | memcpy(&payload->msg, payload_msg, sizeof(payload_msg)); | |
361 | ||
362 | /* Fill out remaining state members */ | |
363 | atomic_set(&state->rx_good, 0); | |
364 | atomic_set(&state->rx_bad, 0); | |
365 | smp_wmb(); | |
366 | } | |
367 | ||
b9aafb0e | 368 | static int efx_begin_loopback(struct efx_tx_queue *tx_queue) |
3273c2e8 BH |
369 | { |
370 | struct efx_nic *efx = tx_queue->efx; | |
8c8661e4 | 371 | struct efx_loopback_state *state = efx->loopback_selftest; |
3273c2e8 BH |
372 | struct efx_loopback_payload *payload; |
373 | struct sk_buff *skb; | |
61357325 SH |
374 | int i; |
375 | netdev_tx_t rc; | |
3273c2e8 BH |
376 | |
377 | /* Transmit N copies of buffer */ | |
378 | for (i = 0; i < state->packet_count; i++) { | |
8c8661e4 | 379 | /* Allocate an skb, holding an extra reference for |
3273c2e8 BH |
380 | * transmit completion counting */ |
381 | skb = alloc_skb(sizeof(state->payload), GFP_KERNEL); | |
382 | if (!skb) | |
383 | return -ENOMEM; | |
384 | state->skbs[i] = skb; | |
385 | skb_get(skb); | |
386 | ||
387 | /* Copy the payload in, incrementing the source address to | |
388 | * exercise the rss vectors */ | |
389 | payload = ((struct efx_loopback_payload *) | |
390 | skb_put(skb, sizeof(state->payload))); | |
391 | memcpy(payload, &state->payload, sizeof(state->payload)); | |
392 | payload->ip.saddr = htonl(INADDR_LOOPBACK | (i << 2)); | |
393 | ||
394 | /* Ensure everything we've written is visible to the | |
395 | * interrupt handler. */ | |
396 | smp_wmb(); | |
397 | ||
55668611 | 398 | if (efx_dev_registered(efx)) |
3273c2e8 | 399 | netif_tx_lock_bh(efx->net_dev); |
497f5ba3 | 400 | rc = efx_enqueue_skb(tx_queue, skb); |
55668611 | 401 | if (efx_dev_registered(efx)) |
3273c2e8 BH |
402 | netif_tx_unlock_bh(efx->net_dev); |
403 | ||
404 | if (rc != NETDEV_TX_OK) { | |
405 | EFX_ERR(efx, "TX queue %d could not transmit packet %d " | |
406 | "of %d in %s loopback test\n", tx_queue->queue, | |
407 | i + 1, state->packet_count, LOOPBACK_MODE(efx)); | |
408 | ||
409 | /* Defer cleaning up the other skbs for the caller */ | |
410 | kfree_skb(skb); | |
411 | return -EPIPE; | |
412 | } | |
413 | } | |
414 | ||
415 | return 0; | |
416 | } | |
417 | ||
b9aafb0e BH |
418 | static int efx_poll_loopback(struct efx_nic *efx) |
419 | { | |
8c8661e4 | 420 | struct efx_loopback_state *state = efx->loopback_selftest; |
b9aafb0e BH |
421 | struct efx_channel *channel; |
422 | ||
423 | /* NAPI polling is not enabled, so process channels | |
424 | * synchronously */ | |
64ee3120 | 425 | efx_for_each_channel(channel, efx) { |
b9aafb0e BH |
426 | if (channel->work_pending) |
427 | efx_process_channel_now(channel); | |
428 | } | |
429 | return atomic_read(&state->rx_good) == state->packet_count; | |
430 | } | |
431 | ||
432 | static int efx_end_loopback(struct efx_tx_queue *tx_queue, | |
433 | struct efx_loopback_self_tests *lb_tests) | |
3273c2e8 BH |
434 | { |
435 | struct efx_nic *efx = tx_queue->efx; | |
8c8661e4 | 436 | struct efx_loopback_state *state = efx->loopback_selftest; |
3273c2e8 BH |
437 | struct sk_buff *skb; |
438 | int tx_done = 0, rx_good, rx_bad; | |
439 | int i, rc = 0; | |
440 | ||
55668611 | 441 | if (efx_dev_registered(efx)) |
3273c2e8 BH |
442 | netif_tx_lock_bh(efx->net_dev); |
443 | ||
444 | /* Count the number of tx completions, and decrement the refcnt. Any | |
445 | * skbs not already completed will be free'd when the queue is flushed */ | |
446 | for (i=0; i < state->packet_count; i++) { | |
447 | skb = state->skbs[i]; | |
448 | if (skb && !skb_shared(skb)) | |
449 | ++tx_done; | |
450 | dev_kfree_skb_any(skb); | |
451 | } | |
452 | ||
55668611 | 453 | if (efx_dev_registered(efx)) |
3273c2e8 BH |
454 | netif_tx_unlock_bh(efx->net_dev); |
455 | ||
456 | /* Check TX completion and received packet counts */ | |
457 | rx_good = atomic_read(&state->rx_good); | |
458 | rx_bad = atomic_read(&state->rx_bad); | |
459 | if (tx_done != state->packet_count) { | |
460 | /* Don't free the skbs; they will be picked up on TX | |
461 | * overflow or channel teardown. | |
462 | */ | |
463 | EFX_ERR(efx, "TX queue %d saw only %d out of an expected %d " | |
464 | "TX completion events in %s loopback test\n", | |
465 | tx_queue->queue, tx_done, state->packet_count, | |
466 | LOOPBACK_MODE(efx)); | |
467 | rc = -ETIMEDOUT; | |
468 | /* Allow to fall through so we see the RX errors as well */ | |
469 | } | |
470 | ||
471 | /* We may always be up to a flush away from our desired packet total */ | |
472 | if (rx_good != state->packet_count) { | |
473 | EFX_LOG(efx, "TX queue %d saw only %d out of an expected %d " | |
474 | "received packets in %s loopback test\n", | |
475 | tx_queue->queue, rx_good, state->packet_count, | |
476 | LOOPBACK_MODE(efx)); | |
477 | rc = -ETIMEDOUT; | |
478 | /* Fall through */ | |
479 | } | |
480 | ||
481 | /* Update loopback test structure */ | |
482 | lb_tests->tx_sent[tx_queue->queue] += state->packet_count; | |
483 | lb_tests->tx_done[tx_queue->queue] += tx_done; | |
484 | lb_tests->rx_good += rx_good; | |
485 | lb_tests->rx_bad += rx_bad; | |
486 | ||
487 | return rc; | |
488 | } | |
489 | ||
490 | static int | |
491 | efx_test_loopback(struct efx_tx_queue *tx_queue, | |
492 | struct efx_loopback_self_tests *lb_tests) | |
493 | { | |
494 | struct efx_nic *efx = tx_queue->efx; | |
8c8661e4 | 495 | struct efx_loopback_state *state = efx->loopback_selftest; |
b9aafb0e | 496 | int i, begin_rc, end_rc; |
3273c2e8 | 497 | |
8c8661e4 | 498 | for (i = 0; i < 3; i++) { |
3273c2e8 | 499 | /* Determine how many packets to send */ |
3ffeabdd | 500 | state->packet_count = EFX_TXQ_SIZE / 3; |
3273c2e8 BH |
501 | state->packet_count = min(1 << (i << 2), state->packet_count); |
502 | state->skbs = kzalloc(sizeof(state->skbs[0]) * | |
503 | state->packet_count, GFP_KERNEL); | |
9b7bfc4c BH |
504 | if (!state->skbs) |
505 | return -ENOMEM; | |
dc8cfa55 | 506 | state->flush = false; |
3273c2e8 BH |
507 | |
508 | EFX_LOG(efx, "TX queue %d testing %s loopback with %d " | |
509 | "packets\n", tx_queue->queue, LOOPBACK_MODE(efx), | |
510 | state->packet_count); | |
511 | ||
512 | efx_iterate_state(efx); | |
b9aafb0e BH |
513 | begin_rc = efx_begin_loopback(tx_queue); |
514 | ||
515 | /* This will normally complete very quickly, but be | |
516 | * prepared to wait up to 100 ms. */ | |
517 | msleep(1); | |
518 | if (!efx_poll_loopback(efx)) { | |
519 | msleep(100); | |
520 | efx_poll_loopback(efx); | |
3273c2e8 BH |
521 | } |
522 | ||
b9aafb0e | 523 | end_rc = efx_end_loopback(tx_queue, lb_tests); |
3273c2e8 BH |
524 | kfree(state->skbs); |
525 | ||
b9aafb0e | 526 | if (begin_rc || end_rc) { |
3273c2e8 BH |
527 | /* Wait a while to ensure there are no packets |
528 | * floating around after a failure. */ | |
529 | schedule_timeout_uninterruptible(HZ / 10); | |
b9aafb0e | 530 | return begin_rc ? begin_rc : end_rc; |
3273c2e8 BH |
531 | } |
532 | } | |
533 | ||
534 | EFX_LOG(efx, "TX queue %d passed %s loopback test with a burst length " | |
535 | "of %d packets\n", tx_queue->queue, LOOPBACK_MODE(efx), | |
536 | state->packet_count); | |
537 | ||
a0c2c190 | 538 | return 0; |
3273c2e8 BH |
539 | } |
540 | ||
78c1f0a0 SH |
541 | /* Wait for link up. On Falcon, we would prefer to rely on efx_monitor, but |
542 | * any contention on the mac lock (via e.g. efx_mac_mcast_work) causes it | |
543 | * to delay and retry. Therefore, it's safer to just poll directly. Wait | |
544 | * for link up and any faults to dissipate. */ | |
545 | static int efx_wait_for_link(struct efx_nic *efx) | |
546 | { | |
547 | struct efx_link_state *link_state = &efx->link_state; | |
548 | int count; | |
549 | bool link_up; | |
550 | ||
551 | for (count = 0; count < 40; count++) { | |
552 | schedule_timeout_uninterruptible(HZ / 10); | |
553 | ||
554 | if (efx->type->monitor != NULL) { | |
555 | mutex_lock(&efx->mac_lock); | |
556 | efx->type->monitor(efx); | |
557 | mutex_unlock(&efx->mac_lock); | |
558 | } else { | |
559 | struct efx_channel *channel = &efx->channel[0]; | |
560 | if (channel->work_pending) | |
561 | efx_process_channel_now(channel); | |
562 | } | |
563 | ||
564 | mutex_lock(&efx->mac_lock); | |
565 | link_up = link_state->up; | |
566 | if (link_up) | |
567 | link_up = !efx->mac_op->check_fault(efx); | |
568 | mutex_unlock(&efx->mac_lock); | |
569 | ||
570 | if (link_up) | |
571 | return 0; | |
572 | } | |
573 | ||
574 | return -ETIMEDOUT; | |
575 | } | |
576 | ||
a5692e49 | 577 | static int efx_test_loopbacks(struct efx_nic *efx, struct efx_self_tests *tests, |
3273c2e8 BH |
578 | unsigned int loopback_modes) |
579 | { | |
8c8661e4 BH |
580 | enum efx_loopback_mode mode; |
581 | struct efx_loopback_state *state; | |
3273c2e8 | 582 | struct efx_tx_queue *tx_queue; |
78c1f0a0 | 583 | int rc = 0; |
3273c2e8 | 584 | |
8c8661e4 BH |
585 | /* Set the port loopback_selftest member. From this point on |
586 | * all received packets will be dropped. Mark the state as | |
587 | * "flushing" so all inflight packets are dropped */ | |
588 | state = kzalloc(sizeof(*state), GFP_KERNEL); | |
589 | if (state == NULL) | |
590 | return -ENOMEM; | |
591 | BUG_ON(efx->loopback_selftest); | |
592 | state->flush = true; | |
593 | efx->loopback_selftest = state; | |
3273c2e8 BH |
594 | |
595 | /* Test all supported loopback modes */ | |
8c8661e4 | 596 | for (mode = LOOPBACK_NONE; mode <= LOOPBACK_TEST_MAX; mode++) { |
3273c2e8 BH |
597 | if (!(loopback_modes & (1 << mode))) |
598 | continue; | |
599 | ||
600 | /* Move the port into the specified loopback mode. */ | |
dc8cfa55 | 601 | state->flush = true; |
78c1f0a0 | 602 | mutex_lock(&efx->mac_lock); |
3273c2e8 | 603 | efx->loopback_mode = mode; |
78c1f0a0 SH |
604 | rc = __efx_reconfigure_port(efx); |
605 | mutex_unlock(&efx->mac_lock); | |
606 | if (rc) { | |
607 | EFX_ERR(efx, "unable to move into %s loopback\n", | |
608 | LOOPBACK_MODE(efx)); | |
609 | goto out; | |
610 | } | |
3273c2e8 | 611 | |
78c1f0a0 SH |
612 | rc = efx_wait_for_link(efx); |
613 | if (rc) { | |
3273c2e8 BH |
614 | EFX_ERR(efx, "loopback %s never came up\n", |
615 | LOOPBACK_MODE(efx)); | |
3273c2e8 BH |
616 | goto out; |
617 | } | |
618 | ||
3273c2e8 BH |
619 | /* Test every TX queue */ |
620 | efx_for_each_tx_queue(tx_queue, efx) { | |
60ac1065 BH |
621 | state->offload_csum = (tx_queue->queue == |
622 | EFX_TX_QUEUE_OFFLOAD_CSUM); | |
f8ea0b67 BH |
623 | rc = efx_test_loopback(tx_queue, |
624 | &tests->loopback[mode]); | |
3273c2e8 BH |
625 | if (rc) |
626 | goto out; | |
627 | } | |
628 | } | |
629 | ||
630 | out: | |
8c8661e4 | 631 | /* Remove the flush. The caller will remove the loopback setting */ |
dc8cfa55 | 632 | state->flush = true; |
8c8661e4 BH |
633 | efx->loopback_selftest = NULL; |
634 | wmb(); | |
635 | kfree(state); | |
3273c2e8 BH |
636 | |
637 | return rc; | |
638 | } | |
639 | ||
640 | /************************************************************************** | |
641 | * | |
2ef3068e | 642 | * Entry point |
3273c2e8 BH |
643 | * |
644 | *************************************************************************/ | |
645 | ||
2ef3068e BH |
646 | int efx_selftest(struct efx_nic *efx, struct efx_self_tests *tests, |
647 | unsigned flags) | |
3273c2e8 | 648 | { |
2ef3068e BH |
649 | enum efx_loopback_mode loopback_mode = efx->loopback_mode; |
650 | int phy_mode = efx->phy_mode; | |
4b988280 | 651 | enum reset_type reset_method = RESET_TYPE_INVISIBLE; |
3273c2e8 | 652 | struct efx_channel *channel; |
2ef3068e BH |
653 | int rc_test = 0, rc_reset = 0, rc; |
654 | ||
655 | /* Online (i.e. non-disruptive) testing | |
656 | * This checks interrupt generation, event delivery and PHY presence. */ | |
8c8661e4 | 657 | |
4f16c073 | 658 | rc = efx_test_phy_alive(efx, tests); |
2ef3068e BH |
659 | if (rc && !rc_test) |
660 | rc_test = rc; | |
8c8661e4 BH |
661 | |
662 | rc = efx_test_nvram(efx, tests); | |
2ef3068e BH |
663 | if (rc && !rc_test) |
664 | rc_test = rc; | |
3273c2e8 | 665 | |
f8ea0b67 | 666 | rc = efx_test_interrupts(efx, tests); |
2ef3068e BH |
667 | if (rc && !rc_test) |
668 | rc_test = rc; | |
8c8661e4 | 669 | |
3273c2e8 | 670 | efx_for_each_channel(channel, efx) { |
64ee3120 | 671 | rc = efx_test_eventq_irq(channel, tests); |
2ef3068e BH |
672 | if (rc && !rc_test) |
673 | rc_test = rc; | |
3273c2e8 | 674 | } |
8c8661e4 | 675 | |
2ef3068e BH |
676 | if (rc_test) |
677 | return rc_test; | |
3273c2e8 | 678 | |
2ef3068e | 679 | if (!(flags & ETH_TEST_FL_OFFLINE)) |
1796721a | 680 | return efx_test_phy(efx, tests, flags); |
2ef3068e BH |
681 | |
682 | /* Offline (i.e. disruptive) testing | |
683 | * This checks MAC and PHY loopback on the specified port. */ | |
8c8661e4 BH |
684 | |
685 | /* force the carrier state off so the kernel doesn't transmit during | |
686 | * the loopback test, and the watchdog timeout doesn't fire. Also put | |
687 | * falcon into loopback for the register test. | |
688 | */ | |
689 | mutex_lock(&efx->mac_lock); | |
690 | efx->port_inhibited = true; | |
6f158d5f BH |
691 | if (efx->loopback_modes) { |
692 | /* We need the 312 clock from the PHY to test the XMAC | |
693 | * registers, so move into XGMII loopback if available */ | |
694 | if (efx->loopback_modes & (1 << LOOPBACK_XGMII)) | |
695 | efx->loopback_mode = LOOPBACK_XGMII; | |
696 | else | |
697 | efx->loopback_mode = __ffs(efx->loopback_modes); | |
698 | } | |
699 | ||
8c8661e4 BH |
700 | __efx_reconfigure_port(efx); |
701 | mutex_unlock(&efx->mac_lock); | |
702 | ||
703 | /* free up all consumers of SRAM (including all the queues) */ | |
d3245b28 | 704 | efx_reset_down(efx, reset_method); |
8c8661e4 BH |
705 | |
706 | rc = efx_test_chip(efx, tests); | |
2ef3068e BH |
707 | if (rc && !rc_test) |
708 | rc_test = rc; | |
8c8661e4 BH |
709 | |
710 | /* reset the chip to recover from the register test */ | |
ef2b90ee | 711 | rc_reset = efx->type->reset(efx, reset_method); |
8c8661e4 | 712 | |
a5692e49 BH |
713 | /* Ensure that the phy is powered and out of loopback |
714 | * for the bist and loopback tests */ | |
715 | efx->phy_mode &= ~PHY_MODE_LOW_POWER; | |
8c8661e4 | 716 | efx->loopback_mode = LOOPBACK_NONE; |
3273c2e8 | 717 | |
d3245b28 | 718 | rc = efx_reset_up(efx, reset_method, rc_reset == 0); |
2ef3068e BH |
719 | if (rc && !rc_reset) |
720 | rc_reset = rc; | |
721 | ||
722 | if (rc_reset) { | |
8c8661e4 BH |
723 | EFX_ERR(efx, "Unable to recover from chip test\n"); |
724 | efx_schedule_reset(efx, RESET_TYPE_DISABLE); | |
2ef3068e | 725 | return rc_reset; |
8c8661e4 | 726 | } |
3273c2e8 | 727 | |
1796721a | 728 | rc = efx_test_phy(efx, tests, flags); |
2ef3068e BH |
729 | if (rc && !rc_test) |
730 | rc_test = rc; | |
3273c2e8 | 731 | |
2ef3068e BH |
732 | rc = efx_test_loopbacks(efx, tests, efx->loopback_modes); |
733 | if (rc && !rc_test) | |
734 | rc_test = rc; | |
3273c2e8 | 735 | |
8c8661e4 | 736 | /* restore the PHY to the previous state */ |
d3245b28 | 737 | mutex_lock(&efx->mac_lock); |
8c8661e4 BH |
738 | efx->phy_mode = phy_mode; |
739 | efx->port_inhibited = false; | |
d3245b28 BH |
740 | efx->loopback_mode = loopback_mode; |
741 | __efx_reconfigure_port(efx); | |
742 | mutex_unlock(&efx->mac_lock); | |
8c8661e4 | 743 | |
2ef3068e | 744 | return rc_test; |
3273c2e8 BH |
745 | } |
746 |