From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mx0b-0016f401.pphosted.com (mx0b-0016f401.pphosted.com [67.231.156.173]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 028133B389D; Sun, 17 May 2026 13:43:16 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=67.231.156.173 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1779025399; cv=none; b=VGjKF7mABM0S4BxHo/0Yk4On/L5xO75VbbAB8A6Mc6K5d8wi3O+wZd6GjVZg7BzwsPk9wzhtu+8cuka+/pqw/eDFMOSOM60riU9OJLqI5hp29QOGx4zjRzssWx0zeQZ65pW2Q51yI72Jgkms9F3bRTtu3qhc5wwXyQSIY2TkyZw= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1779025399; c=relaxed/simple; bh=7Z31bbULbHBtboCIStBE//YAd4RznQes9lDiwP9sjok=; h=Date:From:To:CC:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=MFf1niF7lZUiwILkLzbCiQZnq5h4N/LiWlL1aidokrugNKDuN+9Jb+xTMyrKYQiPWl6a/dkGXvCLGjsABdTZVAk3RjtSW3PjVtmfUcfbLTVS/TxjuRh2nLXmYcyPisNYF8R+SKfN1Bxfq7l6z4b6Od0Xss9OU6WJok3baOWXV7A= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=marvell.com; spf=pass smtp.mailfrom=marvell.com; dkim=pass (2048-bit key) header.d=marvell.com header.i=@marvell.com header.b=SsUjAGgZ; arc=none smtp.client-ip=67.231.156.173 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=marvell.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=marvell.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=marvell.com header.i=@marvell.com header.b="SsUjAGgZ" Received: from pps.filterd (m0431383.ppops.net [127.0.0.1]) by mx0b-0016f401.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id 64H7TocS2058277; Sun, 17 May 2026 06:42:52 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.com; h= cc:content-type:date:from:in-reply-to:message-id:mime-version :references:subject:to; s=pfpt0220; bh=0XCvN/LPpITts+Astm5pnN3y7 4EweGfEXHedQkviIi4=; b=SsUjAGgZwcQAQccBztRNJRZxtn3qD2jBrKlLVYYom JlxGOb9BuTA6cOv6qgFk9M8xCkOQqtldxCsl4Pmg1FrYQOqHLJtuwDxsxeG3n+T0 gqybHFemmpaNgPA3Hl4gdmJNi45jmpeRUYp4i1LbWNfAexypAlzny8/7f1chdYfj rbwnWZ0YPv5lOv82kQVbVRYvoxYv2DnuXqGTmPHGT3D1oETzTuyBuBqtIOQvt6gI Z/EPPldiylwUpxRqe2DpbhqpTI9j0iva1X4EV5tzNx5aDEsbRJU5TEnJajTXwnqL 0B7KMLeiKxXuFwofj2a2LDLNmi//O8oG1y+GRIfz3As0g== Received: from dc5-exch05.marvell.com ([199.233.59.128]) by mx0b-0016f401.pphosted.com (PPS) with ESMTPS id 4e79b88ddw-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sun, 17 May 2026 06:42:51 -0700 (PDT) Received: from DC5-EXCH05.marvell.com (10.69.176.209) by DC5-EXCH05.marvell.com (10.69.176.209) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.25; Sun, 17 May 2026 06:42:50 -0700 Received: from maili.marvell.com (10.69.176.80) by DC5-EXCH05.marvell.com (10.69.176.209) with Microsoft SMTP Server id 15.2.1544.25 via Frontend Transport; Sun, 17 May 2026 06:42:50 -0700 Received: from kernel-ep2 (unknown [10.29.36.53]) by maili.marvell.com (Postfix) with SMTP id 948345E6868; Sun, 17 May 2026 06:42:46 -0700 (PDT) Date: Sun, 17 May 2026 19:12:45 +0530 From: Subbaraya Sundeep To: , , , , , , , CC: , , Linu Cherian Subject: Re: [net-next PATCH v5 1/4] octeontx2-af: npa: cn20k: Add NPA Halo support Message-ID: <20260517134245.GA1632721@kernel-ep2> References: <1777879921-15542-1-git-send-email-sbhatta@marvell.com> <1777879921-15542-2-git-send-email-sbhatta@marvell.com> Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: <1777879921-15542-2-git-send-email-sbhatta@marvell.com> X-Proofpoint-GUID: E3FYnqdj8ZZB0YN-cYapg0tBtV3yLshE X-Proofpoint-ORIG-GUID: E3FYnqdj8ZZB0YN-cYapg0tBtV3yLshE X-Proofpoint-Spam-Details-Enc: AW1haW4tMjYwNTE3MDE0NyBTYWx0ZWRfX26+7h3y5uzWb PlJeBecXgjWr7B7GfQL/1a6DAjRZMND674Bw7HYPmIvbcoffwM/42HQZxgmBLcLEjXt1nvD3Z/P VesFGXoR9shJcdKwdnsQuSgF2cTYIN+1rt9rUhK5IqDQrDkyIQT0+RZhoTSsa3VrpF1GvBSEtqz Oa2SY+2eTLwuSkBd3QOufdK0utskT8viHbe7Iqgrz1dJ/p7o+I+MyWasxAMb0xoHJ/m7M6iOnlU 3Ybagr5o362pgV2szIURpfHcIxL8b/DUQLgQiPSVH1iUszDu7tzAo9BreXKKtOFU2zVgm4gVxlo c1YqTV4lwKmvlWdpZPmnDqlUWlzHUlGFRCH2mlookjbt/i8gZ4MibVrEeZnEJ3nBMTBodUnHCWi Uy88Fmfc9m3c0YQcinxECaY7C6zyrvKjWHvam0AmvMmUhL1JZ6K463ZHqkR4p1/YmuyPukyNZxv JiDtuwnEZIILS3LG3xQ== X-Authority-Analysis: v=2.4 cv=MOhQXsZl c=1 sm=1 tr=0 ts=6a09c5db cx=c_pps a=rEv8fa4AjpPjGxpoe8rlIQ==:117 a=rEv8fa4AjpPjGxpoe8rlIQ==:17 a=kj9zAlcOel0A:10 a=NGcC8JguVDcA:10 a=VkNPw1HP01LnGYTKEx00:22 a=l0iWHRpgs5sLHlkKQ1IR:22 a=qit2iCtTFQkLgVSMPQTB:22 a=M5GUcnROAAAA:8 a=-_NA_JWYIG8UINmhmf4A:9 a=CjuIK1q_8ugA:10 a=OBjm3rFKGHvpk9ecZwUJ:22 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49 definitions=2026-05-17_03,2026-05-15_01,2025-10-01_01 On 2026-05-04 at 13:01:58, Subbaraya Sundeep (sbhatta@marvell.com) wrote: > From: Linu Cherian > > CN20K silicon implements unified aura and pool context > type called Halo for better resource usage. Add support to > handle Halo context type operations. > > Signed-off-by: Linu Cherian > Signed-off-by: Subbaraya Sundeep > --- > .../ethernet/marvell/octeontx2/af/cn20k/npa.c | 27 +++++++ > .../marvell/octeontx2/af/cn20k/struct.h | 81 +++++++++++++++++++ > .../net/ethernet/marvell/octeontx2/af/mbox.h | 6 ++ > .../net/ethernet/marvell/octeontx2/af/rvu.h | 2 + > .../ethernet/marvell/octeontx2/af/rvu_npa.c | 63 +++++++++++++-- > .../marvell/octeontx2/af/rvu_struct.h | 1 + > 6 files changed, 173 insertions(+), 7 deletions(-) > > diff --git a/drivers/net/ethernet/marvell/octeontx2/af/cn20k/npa.c b/drivers/net/ethernet/marvell/octeontx2/af/cn20k/npa.c > index fe8f926c8b75..c963f43dc7b0 100644 > --- a/drivers/net/ethernet/marvell/octeontx2/af/cn20k/npa.c > +++ b/drivers/net/ethernet/marvell/octeontx2/af/cn20k/npa.c > @@ -19,3 +19,30 @@ int rvu_mbox_handler_npa_cn20k_aq_enq(struct rvu *rvu, > (struct npa_aq_enq_rsp *)rsp); > } > EXPORT_SYMBOL(rvu_mbox_handler_npa_cn20k_aq_enq); > + > +int rvu_npa_halo_hwctx_disable(struct npa_aq_enq_req *req) > +{ > + struct npa_cn20k_aq_enq_req *hreq; > + > + hreq = (struct npa_cn20k_aq_enq_req *)req; > + > + hreq->halo.bp_ena_0 = 0; > + hreq->halo.bp_ena_1 = 0; > + hreq->halo.bp_ena_2 = 0; > + hreq->halo.bp_ena_3 = 0; > + hreq->halo.bp_ena_4 = 0; > + hreq->halo.bp_ena_5 = 0; > + hreq->halo.bp_ena_6 = 0; > + hreq->halo.bp_ena_7 = 0; > + > + hreq->halo_mask.bp_ena_0 = 1; > + hreq->halo_mask.bp_ena_1 = 1; > + hreq->halo_mask.bp_ena_2 = 1; > + hreq->halo_mask.bp_ena_3 = 1; > + hreq->halo_mask.bp_ena_4 = 1; > + hreq->halo_mask.bp_ena_5 = 1; > + hreq->halo_mask.bp_ena_6 = 1; > + hreq->halo_mask.bp_ena_7 = 1; > + > + return 0; > +} Can this cast lead to context truncation and type confusion? When a CN20K client sends a struct npa_cn20k_aq_enq_req (280 bytes), rvu_mbox_handler_npa_cn20k_aq_enq() casts it to the smaller struct npa_aq_enq_req (152 bytes). Inside rvu_npa_aq_enq_inst(), the code uses the layout of npa_aq_enq_req, where the mask is at offset 88. However, in the provided npa_cn20k_aq_enq_req, the context payload spans 128 bytes and the mask starts at offset 152. Reading from offset 88 would fetch garbage from the middle of the context instead of the correct mask. Also, the memcpy operations use sizeof(struct npa_pool_s) (64 bytes), which truncates the 128-byte CN20K context: drivers/net/ethernet/marvell/octeontx2/af/rvu_npa.c:rvu_npa_aq_enq_inst() { ... } else { /* Applies to pool and halo since size is same */ memcpy(mask, &req->pool_mask, sizeof(struct npa_pool_s)); memcpy(ctx, &req->pool, sizeof(struct npa_pool_s)); } ... } Will this break hardware initialization by losing the upper 64 bytes of hardware configuration? [Sundeep] rvu_npa_halo_hwctx_disable is not needed since HW just sees the first enable bit in context is set or not if disabled then rest of the fields are not accessed. Also will pad cn10k NPA contexts to max context size i.e, 128 bytes > diff --git a/drivers/net/ethernet/marvell/octeontx2/af/cn20k/struct.h b/drivers/net/ethernet/marvell/octeontx2/af/cn20k/struct.h > index 763f6cabd7c2..2364bafd329d 100644 > --- a/drivers/net/ethernet/marvell/octeontx2/af/cn20k/struct.h > +++ b/drivers/net/ethernet/marvell/octeontx2/af/cn20k/struct.h > @@ -377,4 +377,85 @@ struct npa_cn20k_pool_s { > > static_assert(sizeof(struct npa_cn20k_pool_s) == NIX_MAX_CTX_SIZE); > > +struct npa_cn20k_halo_s { > + u64 stack_base : 64; > + u64 ena : 1; > + u64 nat_align : 1; > + u64 reserved_66_67 : 2; > + u64 stack_caching : 1; > + u64 reserved_69_71 : 3; > + u64 aura_drop_ena : 1; > + u64 reserved_73_79 : 7; > + u64 aura_drop : 8; > + u64 buf_offset : 12; > + u64 reserved_100_103 : 4; > + u64 buf_size : 12; > + u64 reserved_116_119 : 4; > + u64 ref_cnt_prof : 3; > + u64 reserved_123_127 : 5; > + u64 stack_max_pages : 32; > + u64 stack_pages : 32; > + u64 bp_0 : 7; > + u64 bp_1 : 7; > + u64 bp_2 : 7; > + u64 bp_3 : 7; > + u64 bp_4 : 7; > + u64 bp_5 : 7; > + u64 bp_6 : 7; > + u64 bp_7 : 7; > + u64 bp_ena_0 : 1; > + u64 bp_ena_1 : 1; > + u64 bp_ena_2 : 1; > + u64 bp_ena_3 : 1; > + u64 bp_ena_4 : 1; > + u64 bp_ena_5 : 1; > + u64 bp_ena_6 : 1; > + u64 bp_ena_7 : 1; > + u64 stack_offset : 4; > + u64 reserved_260_263 : 4; > + u64 shift : 6; > + u64 reserved_270_271 : 2; > + u64 avg_level : 8; > + u64 avg_con : 9; > + u64 fc_ena : 1; > + u64 fc_stype : 2; > + u64 fc_hyst_bits : 4; > + u64 fc_up_crossing : 1; > + u64 reserved_297_299 : 3; > + u64 update_time : 16; > + u64 reserved_316_319 : 4; > + u64 fc_addr : 64; > + u64 ptr_start : 64; > + u64 ptr_end : 64; > + u64 bpid_0 : 12; > + u64 reserved_524_535 : 12; > + u64 err_int : 8; > + u64 err_int_ena : 8; > + u64 thresh_int : 1; > + u64 thresh_int_ena : 1; > + u64 thresh_up : 1; > + u64 reserved_555 : 1; > + u64 thresh_qint_idx : 7; > + u64 reserved_563 : 1; > + u64 err_qint_idx : 7; > + u64 reserved_571_575 : 5; > + u64 thresh : 36; > + u64 reserved_612_615 : 4; > + u64 fc_msh_dst : 11; > + u64 reserved_627_630 : 4; > + u64 op_dpc_ena : 1; > + u64 op_dpc_set : 5; > + u64 reserved_637_637 : 1; > + u64 stream_ctx : 1; > + u64 unified_ctx : 1; > + u64 reserved_640_703 : 64; > + u64 reserved_704_767 : 64; > + u64 reserved_768_831 : 64; > + u64 reserved_832_895 : 64; > + u64 reserved_896_959 : 64; > + u64 reserved_960_1023 : 64; > +}; > + > +static_assert(sizeof(struct npa_cn20k_halo_s) == NIX_MAX_CTX_SIZE); > + > #endif > diff --git a/drivers/net/ethernet/marvell/octeontx2/af/mbox.h b/drivers/net/ethernet/marvell/octeontx2/af/mbox.h > index dc42c81c0942..4a97bd93d882 100644 > --- a/drivers/net/ethernet/marvell/octeontx2/af/mbox.h > +++ b/drivers/net/ethernet/marvell/octeontx2/af/mbox.h > @@ -884,6 +884,8 @@ struct npa_cn20k_aq_enq_req { > struct npa_cn20k_aura_s aura; > /* Valid when op == WRITE/INIT and ctype == POOL */ > struct npa_cn20k_pool_s pool; > + /* Valid when op == WRITE/INIT and ctype == HALO */ > + struct npa_cn20k_halo_s halo; > }; > /* Mask data when op == WRITE (1=write, 0=don't write) */ > union { > @@ -891,6 +893,8 @@ struct npa_cn20k_aq_enq_req { > struct npa_cn20k_aura_s aura_mask; > /* Valid when op == WRITE and ctype == POOL */ > struct npa_cn20k_pool_s pool_mask; > + /* Valid when op == WRITE/INIT and ctype == HALO */ > + struct npa_cn20k_halo_s halo_mask; > }; > }; > > @@ -901,6 +905,8 @@ struct npa_cn20k_aq_enq_rsp { > struct npa_cn20k_aura_s aura; > /* Valid when op == READ and ctype == POOL */ > struct npa_cn20k_pool_s pool; > + /* Valid when op == READ and ctype == HALO */ > + struct npa_cn20k_halo_s halo; > }; > }; > > diff --git a/drivers/net/ethernet/marvell/octeontx2/af/rvu.h b/drivers/net/ethernet/marvell/octeontx2/af/rvu.h > index a466181cf908..36a71d32b894 100644 > --- a/drivers/net/ethernet/marvell/octeontx2/af/rvu.h > +++ b/drivers/net/ethernet/marvell/octeontx2/af/rvu.h > @@ -261,6 +261,7 @@ struct rvu_pfvf { > struct qmem *pool_ctx; > struct qmem *npa_qints_ctx; > unsigned long *aura_bmap; > + unsigned long *halo_bmap; /* Aura and Halo are mutually exclusive */ > unsigned long *pool_bmap; > > /* NIX contexts */ > @@ -1008,6 +1009,7 @@ void rvu_npa_freemem(struct rvu *rvu); > void rvu_npa_lf_teardown(struct rvu *rvu, u16 pcifunc, int npalf); > int rvu_npa_aq_enq_inst(struct rvu *rvu, struct npa_aq_enq_req *req, > struct npa_aq_enq_rsp *rsp); > +int rvu_npa_halo_hwctx_disable(struct npa_aq_enq_req *req); > > /* NIX APIs */ > bool is_nixlf_attached(struct rvu *rvu, u16 pcifunc); > diff --git a/drivers/net/ethernet/marvell/octeontx2/af/rvu_npa.c b/drivers/net/ethernet/marvell/octeontx2/af/rvu_npa.c > index e2a33e46b48a..809386c6bcba 100644 > --- a/drivers/net/ethernet/marvell/octeontx2/af/rvu_npa.c > +++ b/drivers/net/ethernet/marvell/octeontx2/af/rvu_npa.c > @@ -12,6 +12,11 @@ > #include "rvu_reg.h" > #include "rvu.h" > > +static bool npa_ctype_invalid(struct rvu *rvu, int ctype) > +{ > + return !is_cn20k(rvu->pdev) && ctype == NPA_AQ_CTYPE_HALO; > +} > + > static int npa_aq_enqueue_wait(struct rvu *rvu, struct rvu_block *block, > struct npa_aq_inst_s *inst) > { > @@ -72,13 +77,19 @@ int rvu_npa_aq_enq_inst(struct rvu *rvu, struct npa_aq_enq_req *req, > bool ena; > > pfvf = rvu_get_pfvf(rvu, pcifunc); > - if (!pfvf->aura_ctx || req->aura_id >= pfvf->aura_ctx->qsize) > + if (!pfvf->aura_ctx || req->aura_id >= pfvf->aura_ctx->qsize || > + npa_ctype_invalid(rvu, req->ctype)) > return NPA_AF_ERR_AQ_ENQUEUE; > > blkaddr = rvu_get_blkaddr(rvu, BLKTYPE_NPA, pcifunc); > if (!pfvf->npalf || blkaddr < 0) > return NPA_AF_ERR_AF_LF_INVALID; > > + /* Ensure halo bitmap is exclusive to halo ctype */ > + if (is_cn20k(rvu->pdev) && req->ctype != NPA_AQ_CTYPE_HALO && > + test_bit(req->aura_id, pfvf->halo_bmap)) > + return NPA_AF_ERR_AQ_ENQUEUE; > + Does the exclusivity check need to also prevent HALO from overwriting AURA/POOL contexts? This prevents an AURA or POOL context from overwriting a HALO context. But if a HALO INIT command is sent for an aura_id already in use by an AURA or POOL context, it bypasses this check. It will then overwrite the hardware context and set the bit in pfvf->halo_bmap while the bit in pfvf->aura_bmap remains set. During rvu_npa_lf_teardown(), the driver attempts to disable AURA contexts first. For the corrupted ID, the protection check will falsely trigger and cause the AURA disable command to fail, leaving the hardware in an inconsistent state. Also, is there a race condition in the mutual exclusivity check? The exclusivity check above is performed outside of the spin_lock(&aq->lock) critical section. Later, the state tracking bitmaps are updated inside the critical section: drivers/net/ethernet/marvell/octeontx2/af/rvu_npa.c:rvu_npa_aq_enq_inst() { ... spin_lock(&aq->lock); ... if (req->ctype == NPA_AQ_CTYPE_HALO) { if (req->op == NPA_AQ_INSTOP_INIT && req->aura.ena) __set_bit(req->aura_id, pfvf->halo_bmap); ... } If two concurrent execution paths attempt to initialize contexts on the same aura_id, both could evaluate the unlocked check as false before either acquires the lock. They would then serialize on the lock and both proceed to overwrite the shared hardware context and state bitmaps. [Sundeep] Being over defensive here, exclusivity check is not needed a PF/VF drivers use either AURA and POOL or HALO but not mixed. Will remove the check. Thanks, Sundeep > block = &hw->block[blkaddr]; > aq = block->aq; > if (!aq) { > @@ -119,7 +130,7 @@ int rvu_npa_aq_enq_inst(struct rvu *rvu, struct npa_aq_enq_req *req, > memcpy(mask, &req->aura_mask, > sizeof(struct npa_aura_s)); > memcpy(ctx, &req->aura, sizeof(struct npa_aura_s)); > - } else { > + } else { /* Applies to pool and halo since size is same */ > memcpy(mask, &req->pool_mask, > sizeof(struct npa_pool_s)); > memcpy(ctx, &req->pool, sizeof(struct npa_pool_s)); > @@ -135,7 +146,7 @@ int rvu_npa_aq_enq_inst(struct rvu *rvu, struct npa_aq_enq_req *req, > req->aura.pool_addr = pfvf->pool_ctx->iova + > (req->aura.pool_addr * pfvf->pool_ctx->entry_sz); > memcpy(ctx, &req->aura, sizeof(struct npa_aura_s)); > - } else { /* POOL's context */ > + } else { /* Applies to pool and halo since size is same */ > memcpy(ctx, &req->pool, sizeof(struct npa_pool_s)); > } > break; > @@ -176,6 +187,20 @@ int rvu_npa_aq_enq_inst(struct rvu *rvu, struct npa_aq_enq_req *req, > } > } > > + if (req->ctype == NPA_AQ_CTYPE_HALO) { > + if (req->op == NPA_AQ_INSTOP_INIT && req->aura.ena) > + __set_bit(req->aura_id, pfvf->halo_bmap); > + if (req->op == NPA_AQ_INSTOP_WRITE) { > + ena = (req->aura.ena & req->aura_mask.ena) | > + (test_bit(req->aura_id, pfvf->halo_bmap) & > + ~req->aura_mask.ena); > + if (ena) > + __set_bit(req->aura_id, pfvf->halo_bmap); > + else > + __clear_bit(req->aura_id, pfvf->halo_bmap); > + } > + } > + > /* Set pool bitmap if pool hw context is enabled */ > if (req->ctype == NPA_AQ_CTYPE_POOL) { > if (req->op == NPA_AQ_INSTOP_INIT && req->pool.ena) > @@ -198,7 +223,7 @@ int rvu_npa_aq_enq_inst(struct rvu *rvu, struct npa_aq_enq_req *req, > if (req->ctype == NPA_AQ_CTYPE_AURA) > memcpy(&rsp->aura, ctx, > sizeof(struct npa_aura_s)); > - else > + else /* Applies to pool and halo since size is same */ > memcpy(&rsp->pool, ctx, > sizeof(struct npa_pool_s)); > } > @@ -210,12 +235,14 @@ int rvu_npa_aq_enq_inst(struct rvu *rvu, struct npa_aq_enq_req *req, > static int npa_lf_hwctx_disable(struct rvu *rvu, struct hwctx_disable_req *req) > { > struct rvu_pfvf *pfvf = rvu_get_pfvf(rvu, req->hdr.pcifunc); > + const char *context = "Unknown"; > struct npa_aq_enq_req aq_req; > unsigned long *bmap; > int id, cnt = 0; > int err = 0, rc; > > - if (!pfvf->pool_ctx || !pfvf->aura_ctx) > + if (!pfvf->pool_ctx || !pfvf->aura_ctx || > + npa_ctype_invalid(rvu, req->ctype)) > return NPA_AF_ERR_AQ_ENQUEUE; > > memset(&aq_req, 0, sizeof(struct npa_aq_enq_req)); > @@ -226,6 +253,7 @@ static int npa_lf_hwctx_disable(struct rvu *rvu, struct hwctx_disable_req *req) > aq_req.pool_mask.ena = 1; > cnt = pfvf->pool_ctx->qsize; > bmap = pfvf->pool_bmap; > + context = "Pool"; > } else if (req->ctype == NPA_AQ_CTYPE_AURA) { > aq_req.aura.ena = 0; > aq_req.aura_mask.ena = 1; > @@ -233,6 +261,14 @@ static int npa_lf_hwctx_disable(struct rvu *rvu, struct hwctx_disable_req *req) > aq_req.aura_mask.bp_ena = 1; > cnt = pfvf->aura_ctx->qsize; > bmap = pfvf->aura_bmap; > + context = "Aura"; > + } else if (req->ctype == NPA_AQ_CTYPE_HALO) { > + aq_req.aura.ena = 0; > + aq_req.aura_mask.ena = 1; > + rvu_npa_halo_hwctx_disable(&aq_req); > + cnt = pfvf->aura_ctx->qsize; > + bmap = pfvf->halo_bmap; > + context = "Halo"; > } > > aq_req.ctype = req->ctype; > @@ -246,8 +282,7 @@ static int npa_lf_hwctx_disable(struct rvu *rvu, struct hwctx_disable_req *req) > if (rc) { > err = rc; > dev_err(rvu->dev, "Failed to disable %s:%d context\n", > - (req->ctype == NPA_AQ_CTYPE_AURA) ? > - "Aura" : "Pool", id); > + context, id); > } > } > > @@ -311,6 +346,9 @@ static void npa_ctx_free(struct rvu *rvu, struct rvu_pfvf *pfvf) > kfree(pfvf->aura_bmap); > pfvf->aura_bmap = NULL; > > + kfree(pfvf->halo_bmap); > + pfvf->halo_bmap = NULL; > + > qmem_free(rvu->dev, pfvf->aura_ctx); > pfvf->aura_ctx = NULL; > > @@ -374,6 +412,13 @@ int rvu_mbox_handler_npa_lf_alloc(struct rvu *rvu, > if (!pfvf->aura_bmap) > goto free_mem; > > + if (is_cn20k(rvu->pdev)) { > + pfvf->halo_bmap = kcalloc(NPA_AURA_COUNT(req->aura_sz), > + sizeof(long), GFP_KERNEL); > + if (!pfvf->halo_bmap) > + goto free_mem; > + } > + > /* Alloc memory for pool HW contexts */ > hwctx_size = 1UL << ((ctx_cfg >> 4) & 0xF); > err = qmem_alloc(rvu->dev, &pfvf->pool_ctx, req->nr_pools, hwctx_size); > @@ -562,6 +607,10 @@ void rvu_npa_lf_teardown(struct rvu *rvu, u16 pcifunc, int npalf) > ctx_req.ctype = NPA_AQ_CTYPE_AURA; > npa_lf_hwctx_disable(rvu, &ctx_req); > > + /* Disable all Halos */ > + ctx_req.ctype = NPA_AQ_CTYPE_HALO; > + npa_lf_hwctx_disable(rvu, &ctx_req); > + > npa_ctx_free(rvu, pfvf); > } > > diff --git a/drivers/net/ethernet/marvell/octeontx2/af/rvu_struct.h b/drivers/net/ethernet/marvell/octeontx2/af/rvu_struct.h > index 8e868f815de1..d37cf2cf0fee 100644 > --- a/drivers/net/ethernet/marvell/octeontx2/af/rvu_struct.h > +++ b/drivers/net/ethernet/marvell/octeontx2/af/rvu_struct.h > @@ -130,6 +130,7 @@ enum npa_aq_comp { > enum npa_aq_ctype { > NPA_AQ_CTYPE_AURA = 0x0, > NPA_AQ_CTYPE_POOL = 0x1, > + NPA_AQ_CTYPE_HALO = 0x2, > }; > > /* NPA admin queue instruction opcodes */ > -- > 2.48.1 >