Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next
[deliverable/linux.git] / drivers / net / hyperv / netvsc.c
1 /*
2 * Copyright (c) 2009, Microsoft Corporation.
3 *
4 * This program is free software; you can redistribute it and/or modify it
5 * under the terms and conditions of the GNU General Public License,
6 * version 2, as published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope it will be useful, but WITHOUT
9 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
10 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
11 * more details.
12 *
13 * You should have received a copy of the GNU General Public License along with
14 * this program; if not, see <http://www.gnu.org/licenses/>.
15 *
16 * Authors:
17 * Haiyang Zhang <haiyangz@microsoft.com>
18 * Hank Janssen <hjanssen@microsoft.com>
19 */
20 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
21
22 #include <linux/kernel.h>
23 #include <linux/sched.h>
24 #include <linux/wait.h>
25 #include <linux/mm.h>
26 #include <linux/delay.h>
27 #include <linux/io.h>
28 #include <linux/slab.h>
29 #include <linux/netdevice.h>
30 #include <linux/if_ether.h>
31 #include <linux/vmalloc.h>
32 #include <asm/sync_bitops.h>
33
34 #include "hyperv_net.h"
35
36
37 static struct netvsc_device *alloc_net_device(struct hv_device *device)
38 {
39 struct netvsc_device *net_device;
40 struct net_device *ndev = hv_get_drvdata(device);
41 int i;
42
43 net_device = kzalloc(sizeof(struct netvsc_device), GFP_KERNEL);
44 if (!net_device)
45 return NULL;
46
47 net_device->cb_buffer = kzalloc(NETVSC_PACKET_SIZE, GFP_KERNEL);
48 if (!net_device->cb_buffer) {
49 kfree(net_device);
50 return NULL;
51 }
52
53 init_waitqueue_head(&net_device->wait_drain);
54 net_device->start_remove = false;
55 net_device->destroy = false;
56 net_device->dev = device;
57 net_device->ndev = ndev;
58 net_device->max_pkt = RNDIS_MAX_PKT_DEFAULT;
59 net_device->pkt_align = RNDIS_PKT_ALIGN_DEFAULT;
60
61 for (i = 0; i < num_online_cpus(); i++)
62 spin_lock_init(&net_device->msd[i].lock);
63
64 hv_set_drvdata(device, net_device);
65 return net_device;
66 }
67
68 static void free_netvsc_device(struct netvsc_device *nvdev)
69 {
70 kfree(nvdev->cb_buffer);
71 kfree(nvdev);
72 }
73
74 static struct netvsc_device *get_outbound_net_device(struct hv_device *device)
75 {
76 struct netvsc_device *net_device;
77
78 net_device = hv_get_drvdata(device);
79 if (net_device && net_device->destroy)
80 net_device = NULL;
81
82 return net_device;
83 }
84
85 static struct netvsc_device *get_inbound_net_device(struct hv_device *device)
86 {
87 struct netvsc_device *net_device;
88
89 net_device = hv_get_drvdata(device);
90
91 if (!net_device)
92 goto get_in_err;
93
94 if (net_device->destroy &&
95 atomic_read(&net_device->num_outstanding_sends) == 0)
96 net_device = NULL;
97
98 get_in_err:
99 return net_device;
100 }
101
102
103 static int netvsc_destroy_buf(struct netvsc_device *net_device)
104 {
105 struct nvsp_message *revoke_packet;
106 int ret = 0;
107 struct net_device *ndev = net_device->ndev;
108
109 /*
110 * If we got a section count, it means we received a
111 * SendReceiveBufferComplete msg (ie sent
112 * NvspMessage1TypeSendReceiveBuffer msg) therefore, we need
113 * to send a revoke msg here
114 */
115 if (net_device->recv_section_cnt) {
116 /* Send the revoke receive buffer */
117 revoke_packet = &net_device->revoke_packet;
118 memset(revoke_packet, 0, sizeof(struct nvsp_message));
119
120 revoke_packet->hdr.msg_type =
121 NVSP_MSG1_TYPE_REVOKE_RECV_BUF;
122 revoke_packet->msg.v1_msg.
123 revoke_recv_buf.id = NETVSC_RECEIVE_BUFFER_ID;
124
125 ret = vmbus_sendpacket(net_device->dev->channel,
126 revoke_packet,
127 sizeof(struct nvsp_message),
128 (unsigned long)revoke_packet,
129 VM_PKT_DATA_INBAND, 0);
130 /*
131 * If we failed here, we might as well return and
132 * have a leak rather than continue and a bugchk
133 */
134 if (ret != 0) {
135 netdev_err(ndev, "unable to send "
136 "revoke receive buffer to netvsp\n");
137 return ret;
138 }
139 }
140
141 /* Teardown the gpadl on the vsp end */
142 if (net_device->recv_buf_gpadl_handle) {
143 ret = vmbus_teardown_gpadl(net_device->dev->channel,
144 net_device->recv_buf_gpadl_handle);
145
146 /* If we failed here, we might as well return and have a leak
147 * rather than continue and a bugchk
148 */
149 if (ret != 0) {
150 netdev_err(ndev,
151 "unable to teardown receive buffer's gpadl\n");
152 return ret;
153 }
154 net_device->recv_buf_gpadl_handle = 0;
155 }
156
157 if (net_device->recv_buf) {
158 /* Free up the receive buffer */
159 vfree(net_device->recv_buf);
160 net_device->recv_buf = NULL;
161 }
162
163 if (net_device->recv_section) {
164 net_device->recv_section_cnt = 0;
165 kfree(net_device->recv_section);
166 net_device->recv_section = NULL;
167 }
168
169 /* Deal with the send buffer we may have setup.
170 * If we got a send section size, it means we received a
171 * NVSP_MSG1_TYPE_SEND_SEND_BUF_COMPLETE msg (ie sent
172 * NVSP_MSG1_TYPE_SEND_SEND_BUF msg) therefore, we need
173 * to send a revoke msg here
174 */
175 if (net_device->send_section_size) {
176 /* Send the revoke receive buffer */
177 revoke_packet = &net_device->revoke_packet;
178 memset(revoke_packet, 0, sizeof(struct nvsp_message));
179
180 revoke_packet->hdr.msg_type =
181 NVSP_MSG1_TYPE_REVOKE_SEND_BUF;
182 revoke_packet->msg.v1_msg.revoke_send_buf.id =
183 NETVSC_SEND_BUFFER_ID;
184
185 ret = vmbus_sendpacket(net_device->dev->channel,
186 revoke_packet,
187 sizeof(struct nvsp_message),
188 (unsigned long)revoke_packet,
189 VM_PKT_DATA_INBAND, 0);
190 /* If we failed here, we might as well return and
191 * have a leak rather than continue and a bugchk
192 */
193 if (ret != 0) {
194 netdev_err(ndev, "unable to send "
195 "revoke send buffer to netvsp\n");
196 return ret;
197 }
198 }
199 /* Teardown the gpadl on the vsp end */
200 if (net_device->send_buf_gpadl_handle) {
201 ret = vmbus_teardown_gpadl(net_device->dev->channel,
202 net_device->send_buf_gpadl_handle);
203
204 /* If we failed here, we might as well return and have a leak
205 * rather than continue and a bugchk
206 */
207 if (ret != 0) {
208 netdev_err(ndev,
209 "unable to teardown send buffer's gpadl\n");
210 return ret;
211 }
212 net_device->send_buf_gpadl_handle = 0;
213 }
214 if (net_device->send_buf) {
215 /* Free up the send buffer */
216 vfree(net_device->send_buf);
217 net_device->send_buf = NULL;
218 }
219 kfree(net_device->send_section_map);
220
221 return ret;
222 }
223
224 static int netvsc_init_buf(struct hv_device *device)
225 {
226 int ret = 0;
227 unsigned long t;
228 struct netvsc_device *net_device;
229 struct nvsp_message *init_packet;
230 struct net_device *ndev;
231 int node;
232
233 net_device = get_outbound_net_device(device);
234 if (!net_device)
235 return -ENODEV;
236 ndev = net_device->ndev;
237
238 node = cpu_to_node(device->channel->target_cpu);
239 net_device->recv_buf = vzalloc_node(net_device->recv_buf_size, node);
240 if (!net_device->recv_buf)
241 net_device->recv_buf = vzalloc(net_device->recv_buf_size);
242
243 if (!net_device->recv_buf) {
244 netdev_err(ndev, "unable to allocate receive "
245 "buffer of size %d\n", net_device->recv_buf_size);
246 ret = -ENOMEM;
247 goto cleanup;
248 }
249
250 /*
251 * Establish the gpadl handle for this buffer on this
252 * channel. Note: This call uses the vmbus connection rather
253 * than the channel to establish the gpadl handle.
254 */
255 ret = vmbus_establish_gpadl(device->channel, net_device->recv_buf,
256 net_device->recv_buf_size,
257 &net_device->recv_buf_gpadl_handle);
258 if (ret != 0) {
259 netdev_err(ndev,
260 "unable to establish receive buffer's gpadl\n");
261 goto cleanup;
262 }
263
264
265 /* Notify the NetVsp of the gpadl handle */
266 init_packet = &net_device->channel_init_pkt;
267
268 memset(init_packet, 0, sizeof(struct nvsp_message));
269
270 init_packet->hdr.msg_type = NVSP_MSG1_TYPE_SEND_RECV_BUF;
271 init_packet->msg.v1_msg.send_recv_buf.
272 gpadl_handle = net_device->recv_buf_gpadl_handle;
273 init_packet->msg.v1_msg.
274 send_recv_buf.id = NETVSC_RECEIVE_BUFFER_ID;
275
276 /* Send the gpadl notification request */
277 ret = vmbus_sendpacket(device->channel, init_packet,
278 sizeof(struct nvsp_message),
279 (unsigned long)init_packet,
280 VM_PKT_DATA_INBAND,
281 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
282 if (ret != 0) {
283 netdev_err(ndev,
284 "unable to send receive buffer's gpadl to netvsp\n");
285 goto cleanup;
286 }
287
288 t = wait_for_completion_timeout(&net_device->channel_init_wait, 5*HZ);
289 BUG_ON(t == 0);
290
291
292 /* Check the response */
293 if (init_packet->msg.v1_msg.
294 send_recv_buf_complete.status != NVSP_STAT_SUCCESS) {
295 netdev_err(ndev, "Unable to complete receive buffer "
296 "initialization with NetVsp - status %d\n",
297 init_packet->msg.v1_msg.
298 send_recv_buf_complete.status);
299 ret = -EINVAL;
300 goto cleanup;
301 }
302
303 /* Parse the response */
304
305 net_device->recv_section_cnt = init_packet->msg.
306 v1_msg.send_recv_buf_complete.num_sections;
307
308 net_device->recv_section = kmemdup(
309 init_packet->msg.v1_msg.send_recv_buf_complete.sections,
310 net_device->recv_section_cnt *
311 sizeof(struct nvsp_1_receive_buffer_section),
312 GFP_KERNEL);
313 if (net_device->recv_section == NULL) {
314 ret = -EINVAL;
315 goto cleanup;
316 }
317
318 /*
319 * For 1st release, there should only be 1 section that represents the
320 * entire receive buffer
321 */
322 if (net_device->recv_section_cnt != 1 ||
323 net_device->recv_section->offset != 0) {
324 ret = -EINVAL;
325 goto cleanup;
326 }
327
328 /* Now setup the send buffer.
329 */
330 net_device->send_buf = vzalloc_node(net_device->send_buf_size, node);
331 if (!net_device->send_buf)
332 net_device->send_buf = vzalloc(net_device->send_buf_size);
333 if (!net_device->send_buf) {
334 netdev_err(ndev, "unable to allocate send "
335 "buffer of size %d\n", net_device->send_buf_size);
336 ret = -ENOMEM;
337 goto cleanup;
338 }
339
340 /* Establish the gpadl handle for this buffer on this
341 * channel. Note: This call uses the vmbus connection rather
342 * than the channel to establish the gpadl handle.
343 */
344 ret = vmbus_establish_gpadl(device->channel, net_device->send_buf,
345 net_device->send_buf_size,
346 &net_device->send_buf_gpadl_handle);
347 if (ret != 0) {
348 netdev_err(ndev,
349 "unable to establish send buffer's gpadl\n");
350 goto cleanup;
351 }
352
353 /* Notify the NetVsp of the gpadl handle */
354 init_packet = &net_device->channel_init_pkt;
355 memset(init_packet, 0, sizeof(struct nvsp_message));
356 init_packet->hdr.msg_type = NVSP_MSG1_TYPE_SEND_SEND_BUF;
357 init_packet->msg.v1_msg.send_send_buf.gpadl_handle =
358 net_device->send_buf_gpadl_handle;
359 init_packet->msg.v1_msg.send_send_buf.id = NETVSC_SEND_BUFFER_ID;
360
361 /* Send the gpadl notification request */
362 ret = vmbus_sendpacket(device->channel, init_packet,
363 sizeof(struct nvsp_message),
364 (unsigned long)init_packet,
365 VM_PKT_DATA_INBAND,
366 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
367 if (ret != 0) {
368 netdev_err(ndev,
369 "unable to send send buffer's gpadl to netvsp\n");
370 goto cleanup;
371 }
372
373 t = wait_for_completion_timeout(&net_device->channel_init_wait, 5*HZ);
374 BUG_ON(t == 0);
375
376 /* Check the response */
377 if (init_packet->msg.v1_msg.
378 send_send_buf_complete.status != NVSP_STAT_SUCCESS) {
379 netdev_err(ndev, "Unable to complete send buffer "
380 "initialization with NetVsp - status %d\n",
381 init_packet->msg.v1_msg.
382 send_send_buf_complete.status);
383 ret = -EINVAL;
384 goto cleanup;
385 }
386
387 /* Parse the response */
388 net_device->send_section_size = init_packet->msg.
389 v1_msg.send_send_buf_complete.section_size;
390
391 /* Section count is simply the size divided by the section size.
392 */
393 net_device->send_section_cnt =
394 net_device->send_buf_size/net_device->send_section_size;
395
396 dev_info(&device->device, "Send section size: %d, Section count:%d\n",
397 net_device->send_section_size, net_device->send_section_cnt);
398
399 /* Setup state for managing the send buffer. */
400 net_device->map_words = DIV_ROUND_UP(net_device->send_section_cnt,
401 BITS_PER_LONG);
402
403 net_device->send_section_map =
404 kzalloc(net_device->map_words * sizeof(ulong), GFP_KERNEL);
405 if (net_device->send_section_map == NULL) {
406 ret = -ENOMEM;
407 goto cleanup;
408 }
409
410 goto exit;
411
412 cleanup:
413 netvsc_destroy_buf(net_device);
414
415 exit:
416 return ret;
417 }
418
419
420 /* Negotiate NVSP protocol version */
421 static int negotiate_nvsp_ver(struct hv_device *device,
422 struct netvsc_device *net_device,
423 struct nvsp_message *init_packet,
424 u32 nvsp_ver)
425 {
426 int ret;
427 unsigned long t;
428
429 memset(init_packet, 0, sizeof(struct nvsp_message));
430 init_packet->hdr.msg_type = NVSP_MSG_TYPE_INIT;
431 init_packet->msg.init_msg.init.min_protocol_ver = nvsp_ver;
432 init_packet->msg.init_msg.init.max_protocol_ver = nvsp_ver;
433
434 /* Send the init request */
435 ret = vmbus_sendpacket(device->channel, init_packet,
436 sizeof(struct nvsp_message),
437 (unsigned long)init_packet,
438 VM_PKT_DATA_INBAND,
439 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
440
441 if (ret != 0)
442 return ret;
443
444 t = wait_for_completion_timeout(&net_device->channel_init_wait, 5*HZ);
445
446 if (t == 0)
447 return -ETIMEDOUT;
448
449 if (init_packet->msg.init_msg.init_complete.status !=
450 NVSP_STAT_SUCCESS)
451 return -EINVAL;
452
453 if (nvsp_ver == NVSP_PROTOCOL_VERSION_1)
454 return 0;
455
456 /* NVSPv2 only: Send NDIS config */
457 memset(init_packet, 0, sizeof(struct nvsp_message));
458 init_packet->hdr.msg_type = NVSP_MSG2_TYPE_SEND_NDIS_CONFIG;
459 init_packet->msg.v2_msg.send_ndis_config.mtu = net_device->ndev->mtu +
460 ETH_HLEN;
461 init_packet->msg.v2_msg.send_ndis_config.capability.ieee8021q = 1;
462
463 ret = vmbus_sendpacket(device->channel, init_packet,
464 sizeof(struct nvsp_message),
465 (unsigned long)init_packet,
466 VM_PKT_DATA_INBAND, 0);
467
468 return ret;
469 }
470
471 static int netvsc_connect_vsp(struct hv_device *device)
472 {
473 int ret;
474 struct netvsc_device *net_device;
475 struct nvsp_message *init_packet;
476 int ndis_version;
477 struct net_device *ndev;
478 u32 ver_list[] = { NVSP_PROTOCOL_VERSION_1, NVSP_PROTOCOL_VERSION_2,
479 NVSP_PROTOCOL_VERSION_4, NVSP_PROTOCOL_VERSION_5 };
480 int i, num_ver = 4; /* number of different NVSP versions */
481
482 net_device = get_outbound_net_device(device);
483 if (!net_device)
484 return -ENODEV;
485 ndev = net_device->ndev;
486
487 init_packet = &net_device->channel_init_pkt;
488
489 /* Negotiate the latest NVSP protocol supported */
490 for (i = num_ver - 1; i >= 0; i--)
491 if (negotiate_nvsp_ver(device, net_device, init_packet,
492 ver_list[i]) == 0) {
493 net_device->nvsp_version = ver_list[i];
494 break;
495 }
496
497 if (i < 0) {
498 ret = -EPROTO;
499 goto cleanup;
500 }
501
502 pr_debug("Negotiated NVSP version:%x\n", net_device->nvsp_version);
503
504 /* Send the ndis version */
505 memset(init_packet, 0, sizeof(struct nvsp_message));
506
507 if (net_device->nvsp_version <= NVSP_PROTOCOL_VERSION_4)
508 ndis_version = 0x00060001;
509 else
510 ndis_version = 0x0006001e;
511
512 init_packet->hdr.msg_type = NVSP_MSG1_TYPE_SEND_NDIS_VER;
513 init_packet->msg.v1_msg.
514 send_ndis_ver.ndis_major_ver =
515 (ndis_version & 0xFFFF0000) >> 16;
516 init_packet->msg.v1_msg.
517 send_ndis_ver.ndis_minor_ver =
518 ndis_version & 0xFFFF;
519
520 /* Send the init request */
521 ret = vmbus_sendpacket(device->channel, init_packet,
522 sizeof(struct nvsp_message),
523 (unsigned long)init_packet,
524 VM_PKT_DATA_INBAND, 0);
525 if (ret != 0)
526 goto cleanup;
527
528 /* Post the big receive buffer to NetVSP */
529 if (net_device->nvsp_version <= NVSP_PROTOCOL_VERSION_2)
530 net_device->recv_buf_size = NETVSC_RECEIVE_BUFFER_SIZE_LEGACY;
531 else
532 net_device->recv_buf_size = NETVSC_RECEIVE_BUFFER_SIZE;
533 net_device->send_buf_size = NETVSC_SEND_BUFFER_SIZE;
534
535 ret = netvsc_init_buf(device);
536
537 cleanup:
538 return ret;
539 }
540
541 static void netvsc_disconnect_vsp(struct netvsc_device *net_device)
542 {
543 netvsc_destroy_buf(net_device);
544 }
545
546 /*
547 * netvsc_device_remove - Callback when the root bus device is removed
548 */
549 int netvsc_device_remove(struct hv_device *device)
550 {
551 struct netvsc_device *net_device;
552 unsigned long flags;
553
554 net_device = hv_get_drvdata(device);
555
556 netvsc_disconnect_vsp(net_device);
557
558 /*
559 * Since we have already drained, we don't need to busy wait
560 * as was done in final_release_stor_device()
561 * Note that we cannot set the ext pointer to NULL until
562 * we have drained - to drain the outgoing packets, we need to
563 * allow incoming packets.
564 */
565
566 spin_lock_irqsave(&device->channel->inbound_lock, flags);
567 hv_set_drvdata(device, NULL);
568 spin_unlock_irqrestore(&device->channel->inbound_lock, flags);
569
570 /*
571 * At this point, no one should be accessing net_device
572 * except in here
573 */
574 dev_notice(&device->device, "net device safe to remove\n");
575
576 /* Now, we can close the channel safely */
577 vmbus_close(device->channel);
578
579 /* Release all resources */
580 vfree(net_device->sub_cb_buf);
581 free_netvsc_device(net_device);
582 return 0;
583 }
584
585
586 #define RING_AVAIL_PERCENT_HIWATER 20
587 #define RING_AVAIL_PERCENT_LOWATER 10
588
589 /*
590 * Get the percentage of available bytes to write in the ring.
591 * The return value is in range from 0 to 100.
592 */
593 static inline u32 hv_ringbuf_avail_percent(
594 struct hv_ring_buffer_info *ring_info)
595 {
596 u32 avail_read, avail_write;
597
598 hv_get_ringbuffer_availbytes(ring_info, &avail_read, &avail_write);
599
600 return avail_write * 100 / ring_info->ring_datasize;
601 }
602
603 static inline void netvsc_free_send_slot(struct netvsc_device *net_device,
604 u32 index)
605 {
606 sync_change_bit(index, net_device->send_section_map);
607 }
608
609 static void netvsc_send_completion(struct netvsc_device *net_device,
610 struct hv_device *device,
611 struct vmpacket_descriptor *packet)
612 {
613 struct nvsp_message *nvsp_packet;
614 struct hv_netvsc_packet *nvsc_packet;
615 struct net_device *ndev;
616 u32 send_index;
617
618 ndev = net_device->ndev;
619
620 nvsp_packet = (struct nvsp_message *)((unsigned long)packet +
621 (packet->offset8 << 3));
622
623 if ((nvsp_packet->hdr.msg_type == NVSP_MSG_TYPE_INIT_COMPLETE) ||
624 (nvsp_packet->hdr.msg_type ==
625 NVSP_MSG1_TYPE_SEND_RECV_BUF_COMPLETE) ||
626 (nvsp_packet->hdr.msg_type ==
627 NVSP_MSG1_TYPE_SEND_SEND_BUF_COMPLETE) ||
628 (nvsp_packet->hdr.msg_type ==
629 NVSP_MSG5_TYPE_SUBCHANNEL)) {
630 /* Copy the response back */
631 memcpy(&net_device->channel_init_pkt, nvsp_packet,
632 sizeof(struct nvsp_message));
633 complete(&net_device->channel_init_wait);
634 } else if (nvsp_packet->hdr.msg_type ==
635 NVSP_MSG1_TYPE_SEND_RNDIS_PKT_COMPLETE) {
636 int num_outstanding_sends;
637 u16 q_idx = 0;
638 struct vmbus_channel *channel = device->channel;
639 int queue_sends;
640
641 /* Get the send context */
642 nvsc_packet = (struct hv_netvsc_packet *)(unsigned long)
643 packet->trans_id;
644
645 /* Notify the layer above us */
646 if (nvsc_packet) {
647 send_index = nvsc_packet->send_buf_index;
648 if (send_index != NETVSC_INVALID_INDEX)
649 netvsc_free_send_slot(net_device, send_index);
650 q_idx = nvsc_packet->q_idx;
651 channel = nvsc_packet->channel;
652 nvsc_packet->send_completion(nvsc_packet->
653 send_completion_ctx);
654 }
655
656 num_outstanding_sends =
657 atomic_dec_return(&net_device->num_outstanding_sends);
658 queue_sends = atomic_dec_return(&net_device->
659 queue_sends[q_idx]);
660
661 if (net_device->destroy && num_outstanding_sends == 0)
662 wake_up(&net_device->wait_drain);
663
664 if (netif_tx_queue_stopped(netdev_get_tx_queue(ndev, q_idx)) &&
665 !net_device->start_remove &&
666 (hv_ringbuf_avail_percent(&channel->outbound) >
667 RING_AVAIL_PERCENT_HIWATER || queue_sends < 1))
668 netif_tx_wake_queue(netdev_get_tx_queue(
669 ndev, q_idx));
670 } else {
671 netdev_err(ndev, "Unknown send completion packet type- "
672 "%d received!!\n", nvsp_packet->hdr.msg_type);
673 }
674
675 }
676
677 static u32 netvsc_get_next_send_section(struct netvsc_device *net_device)
678 {
679 unsigned long index;
680 u32 max_words = net_device->map_words;
681 unsigned long *map_addr = (unsigned long *)net_device->send_section_map;
682 u32 section_cnt = net_device->send_section_cnt;
683 int ret_val = NETVSC_INVALID_INDEX;
684 int i;
685 int prev_val;
686
687 for (i = 0; i < max_words; i++) {
688 if (!~(map_addr[i]))
689 continue;
690 index = ffz(map_addr[i]);
691 prev_val = sync_test_and_set_bit(index, &map_addr[i]);
692 if (prev_val)
693 continue;
694 if ((index + (i * BITS_PER_LONG)) >= section_cnt)
695 break;
696 ret_val = (index + (i * BITS_PER_LONG));
697 break;
698 }
699 return ret_val;
700 }
701
702 static u32 netvsc_copy_to_send_buf(struct netvsc_device *net_device,
703 unsigned int section_index,
704 u32 pend_size,
705 struct hv_netvsc_packet *packet)
706 {
707 char *start = net_device->send_buf;
708 char *dest = start + (section_index * net_device->send_section_size)
709 + pend_size;
710 int i;
711 u32 msg_size = 0;
712 u32 padding = 0;
713 u32 remain = packet->total_data_buflen % net_device->pkt_align;
714 u32 page_count = packet->cp_partial ? packet->rmsg_pgcnt :
715 packet->page_buf_cnt;
716
717 /* Add padding */
718 if (packet->is_data_pkt && packet->xmit_more && remain &&
719 !packet->cp_partial) {
720 padding = net_device->pkt_align - remain;
721 packet->rndis_msg->msg_len += padding;
722 packet->total_data_buflen += padding;
723 }
724
725 for (i = 0; i < page_count; i++) {
726 char *src = phys_to_virt(packet->page_buf[i].pfn << PAGE_SHIFT);
727 u32 offset = packet->page_buf[i].offset;
728 u32 len = packet->page_buf[i].len;
729
730 memcpy(dest, (src + offset), len);
731 msg_size += len;
732 dest += len;
733 }
734
735 if (padding) {
736 memset(dest, 0, padding);
737 msg_size += padding;
738 }
739
740 return msg_size;
741 }
742
743 static inline int netvsc_send_pkt(
744 struct hv_netvsc_packet *packet,
745 struct netvsc_device *net_device)
746 {
747 struct nvsp_message nvmsg;
748 struct vmbus_channel *out_channel = packet->channel;
749 u16 q_idx = packet->q_idx;
750 struct net_device *ndev = net_device->ndev;
751 u64 req_id;
752 int ret;
753 struct hv_page_buffer *pgbuf;
754 u32 ring_avail = hv_ringbuf_avail_percent(&out_channel->outbound);
755
756 nvmsg.hdr.msg_type = NVSP_MSG1_TYPE_SEND_RNDIS_PKT;
757 if (packet->is_data_pkt) {
758 /* 0 is RMC_DATA; */
759 nvmsg.msg.v1_msg.send_rndis_pkt.channel_type = 0;
760 } else {
761 /* 1 is RMC_CONTROL; */
762 nvmsg.msg.v1_msg.send_rndis_pkt.channel_type = 1;
763 }
764
765 nvmsg.msg.v1_msg.send_rndis_pkt.send_buf_section_index =
766 packet->send_buf_index;
767 if (packet->send_buf_index == NETVSC_INVALID_INDEX)
768 nvmsg.msg.v1_msg.send_rndis_pkt.send_buf_section_size = 0;
769 else
770 nvmsg.msg.v1_msg.send_rndis_pkt.send_buf_section_size =
771 packet->total_data_buflen;
772
773 if (packet->send_completion)
774 req_id = (ulong)packet;
775 else
776 req_id = 0;
777
778 if (out_channel->rescind)
779 return -ENODEV;
780
781 /*
782 * It is possible that once we successfully place this packet
783 * on the ringbuffer, we may stop the queue. In that case, we want
784 * to notify the host independent of the xmit_more flag. We don't
785 * need to be precise here; in the worst case we may signal the host
786 * unnecessarily.
787 */
788 if (ring_avail < (RING_AVAIL_PERCENT_LOWATER + 1))
789 packet->xmit_more = false;
790
791 if (packet->page_buf_cnt) {
792 pgbuf = packet->cp_partial ? packet->page_buf +
793 packet->rmsg_pgcnt : packet->page_buf;
794 ret = vmbus_sendpacket_pagebuffer_ctl(out_channel,
795 pgbuf,
796 packet->page_buf_cnt,
797 &nvmsg,
798 sizeof(struct nvsp_message),
799 req_id,
800 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED,
801 !packet->xmit_more);
802 } else {
803 ret = vmbus_sendpacket_ctl(out_channel, &nvmsg,
804 sizeof(struct nvsp_message),
805 req_id,
806 VM_PKT_DATA_INBAND,
807 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED,
808 !packet->xmit_more);
809 }
810
811 if (ret == 0) {
812 atomic_inc(&net_device->num_outstanding_sends);
813 atomic_inc(&net_device->queue_sends[q_idx]);
814
815 if (ring_avail < RING_AVAIL_PERCENT_LOWATER) {
816 netif_tx_stop_queue(netdev_get_tx_queue(ndev, q_idx));
817
818 if (atomic_read(&net_device->
819 queue_sends[q_idx]) < 1)
820 netif_tx_wake_queue(netdev_get_tx_queue(
821 ndev, q_idx));
822 }
823 } else if (ret == -EAGAIN) {
824 netif_tx_stop_queue(netdev_get_tx_queue(
825 ndev, q_idx));
826 if (atomic_read(&net_device->queue_sends[q_idx]) < 1) {
827 netif_tx_wake_queue(netdev_get_tx_queue(
828 ndev, q_idx));
829 ret = -ENOSPC;
830 }
831 } else {
832 netdev_err(ndev, "Unable to send packet %p ret %d\n",
833 packet, ret);
834 }
835
836 return ret;
837 }
838
839 int netvsc_send(struct hv_device *device,
840 struct hv_netvsc_packet *packet)
841 {
842 struct netvsc_device *net_device;
843 int ret = 0, m_ret = 0;
844 struct vmbus_channel *out_channel;
845 u16 q_idx = packet->q_idx;
846 u32 pktlen = packet->total_data_buflen, msd_len = 0;
847 unsigned int section_index = NETVSC_INVALID_INDEX;
848 unsigned long flag;
849 struct multi_send_data *msdp;
850 struct hv_netvsc_packet *msd_send = NULL, *cur_send = NULL;
851 bool try_batch;
852
853 net_device = get_outbound_net_device(device);
854 if (!net_device)
855 return -ENODEV;
856
857 out_channel = net_device->chn_table[q_idx];
858 if (!out_channel) {
859 out_channel = device->channel;
860 q_idx = 0;
861 packet->q_idx = 0;
862 }
863 packet->channel = out_channel;
864 packet->send_buf_index = NETVSC_INVALID_INDEX;
865 packet->cp_partial = false;
866
867 msdp = &net_device->msd[q_idx];
868
869 /* batch packets in send buffer if possible */
870 spin_lock_irqsave(&msdp->lock, flag);
871 if (msdp->pkt)
872 msd_len = msdp->pkt->total_data_buflen;
873
874 try_batch = packet->is_data_pkt && msd_len > 0 && msdp->count <
875 net_device->max_pkt;
876
877 if (try_batch && msd_len + pktlen + net_device->pkt_align <
878 net_device->send_section_size) {
879 section_index = msdp->pkt->send_buf_index;
880
881 } else if (try_batch && msd_len + packet->rmsg_size <
882 net_device->send_section_size) {
883 section_index = msdp->pkt->send_buf_index;
884 packet->cp_partial = true;
885
886 } else if (packet->is_data_pkt && pktlen + net_device->pkt_align <
887 net_device->send_section_size) {
888 section_index = netvsc_get_next_send_section(net_device);
889 if (section_index != NETVSC_INVALID_INDEX) {
890 msd_send = msdp->pkt;
891 msdp->pkt = NULL;
892 msdp->count = 0;
893 msd_len = 0;
894 }
895 }
896
897 if (section_index != NETVSC_INVALID_INDEX) {
898 netvsc_copy_to_send_buf(net_device,
899 section_index, msd_len,
900 packet);
901
902 packet->send_buf_index = section_index;
903
904 if (packet->cp_partial) {
905 packet->page_buf_cnt -= packet->rmsg_pgcnt;
906 packet->total_data_buflen = msd_len + packet->rmsg_size;
907 } else {
908 packet->page_buf_cnt = 0;
909 packet->total_data_buflen += msd_len;
910 }
911
912 if (msdp->pkt)
913 netvsc_xmit_completion(msdp->pkt);
914
915 if (packet->xmit_more && !packet->cp_partial) {
916 msdp->pkt = packet;
917 msdp->count++;
918 } else {
919 cur_send = packet;
920 msdp->pkt = NULL;
921 msdp->count = 0;
922 }
923 } else {
924 msd_send = msdp->pkt;
925 msdp->pkt = NULL;
926 msdp->count = 0;
927 cur_send = packet;
928 }
929
930 spin_unlock_irqrestore(&msdp->lock, flag);
931
932 if (msd_send) {
933 m_ret = netvsc_send_pkt(msd_send, net_device);
934
935 if (m_ret != 0) {
936 netvsc_free_send_slot(net_device,
937 msd_send->send_buf_index);
938 netvsc_xmit_completion(msd_send);
939 }
940 }
941
942 if (cur_send)
943 ret = netvsc_send_pkt(cur_send, net_device);
944
945 if (ret != 0 && section_index != NETVSC_INVALID_INDEX)
946 netvsc_free_send_slot(net_device, section_index);
947
948 return ret;
949 }
950
951 static void netvsc_send_recv_completion(struct hv_device *device,
952 struct vmbus_channel *channel,
953 struct netvsc_device *net_device,
954 u64 transaction_id, u32 status)
955 {
956 struct nvsp_message recvcompMessage;
957 int retries = 0;
958 int ret;
959 struct net_device *ndev;
960
961 ndev = net_device->ndev;
962
963 recvcompMessage.hdr.msg_type =
964 NVSP_MSG1_TYPE_SEND_RNDIS_PKT_COMPLETE;
965
966 recvcompMessage.msg.v1_msg.send_rndis_pkt_complete.status = status;
967
968 retry_send_cmplt:
969 /* Send the completion */
970 ret = vmbus_sendpacket(channel, &recvcompMessage,
971 sizeof(struct nvsp_message), transaction_id,
972 VM_PKT_COMP, 0);
973 if (ret == 0) {
974 /* success */
975 /* no-op */
976 } else if (ret == -EAGAIN) {
977 /* no more room...wait a bit and attempt to retry 3 times */
978 retries++;
979 netdev_err(ndev, "unable to send receive completion pkt"
980 " (tid %llx)...retrying %d\n", transaction_id, retries);
981
982 if (retries < 4) {
983 udelay(100);
984 goto retry_send_cmplt;
985 } else {
986 netdev_err(ndev, "unable to send receive "
987 "completion pkt (tid %llx)...give up retrying\n",
988 transaction_id);
989 }
990 } else {
991 netdev_err(ndev, "unable to send receive "
992 "completion pkt - %llx\n", transaction_id);
993 }
994 }
995
996 static void netvsc_receive(struct netvsc_device *net_device,
997 struct vmbus_channel *channel,
998 struct hv_device *device,
999 struct vmpacket_descriptor *packet)
1000 {
1001 struct vmtransfer_page_packet_header *vmxferpage_packet;
1002 struct nvsp_message *nvsp_packet;
1003 struct hv_netvsc_packet nv_pkt;
1004 struct hv_netvsc_packet *netvsc_packet = &nv_pkt;
1005 u32 status = NVSP_STAT_SUCCESS;
1006 int i;
1007 int count = 0;
1008 struct net_device *ndev;
1009
1010 ndev = net_device->ndev;
1011
1012 /*
1013 * All inbound packets other than send completion should be xfer page
1014 * packet
1015 */
1016 if (packet->type != VM_PKT_DATA_USING_XFER_PAGES) {
1017 netdev_err(ndev, "Unknown packet type received - %d\n",
1018 packet->type);
1019 return;
1020 }
1021
1022 nvsp_packet = (struct nvsp_message *)((unsigned long)packet +
1023 (packet->offset8 << 3));
1024
1025 /* Make sure this is a valid nvsp packet */
1026 if (nvsp_packet->hdr.msg_type !=
1027 NVSP_MSG1_TYPE_SEND_RNDIS_PKT) {
1028 netdev_err(ndev, "Unknown nvsp packet type received-"
1029 " %d\n", nvsp_packet->hdr.msg_type);
1030 return;
1031 }
1032
1033 vmxferpage_packet = (struct vmtransfer_page_packet_header *)packet;
1034
1035 if (vmxferpage_packet->xfer_pageset_id != NETVSC_RECEIVE_BUFFER_ID) {
1036 netdev_err(ndev, "Invalid xfer page set id - "
1037 "expecting %x got %x\n", NETVSC_RECEIVE_BUFFER_ID,
1038 vmxferpage_packet->xfer_pageset_id);
1039 return;
1040 }
1041
1042 count = vmxferpage_packet->range_cnt;
1043 netvsc_packet->channel = channel;
1044
1045 /* Each range represents 1 RNDIS pkt that contains 1 ethernet frame */
1046 for (i = 0; i < count; i++) {
1047 /* Initialize the netvsc packet */
1048 netvsc_packet->status = NVSP_STAT_SUCCESS;
1049 netvsc_packet->data = (void *)((unsigned long)net_device->
1050 recv_buf + vmxferpage_packet->ranges[i].byte_offset);
1051 netvsc_packet->total_data_buflen =
1052 vmxferpage_packet->ranges[i].byte_count;
1053
1054 /* Pass it to the upper layer */
1055 rndis_filter_receive(device, netvsc_packet);
1056
1057 if (netvsc_packet->status != NVSP_STAT_SUCCESS)
1058 status = NVSP_STAT_FAIL;
1059 }
1060
1061 netvsc_send_recv_completion(device, channel, net_device,
1062 vmxferpage_packet->d.trans_id, status);
1063 }
1064
1065
1066 static void netvsc_send_table(struct hv_device *hdev,
1067 struct vmpacket_descriptor *vmpkt)
1068 {
1069 struct netvsc_device *nvscdev;
1070 struct net_device *ndev;
1071 struct nvsp_message *nvmsg;
1072 int i;
1073 u32 count, *tab;
1074
1075 nvscdev = get_outbound_net_device(hdev);
1076 if (!nvscdev)
1077 return;
1078 ndev = nvscdev->ndev;
1079
1080 nvmsg = (struct nvsp_message *)((unsigned long)vmpkt +
1081 (vmpkt->offset8 << 3));
1082
1083 if (nvmsg->hdr.msg_type != NVSP_MSG5_TYPE_SEND_INDIRECTION_TABLE)
1084 return;
1085
1086 count = nvmsg->msg.v5_msg.send_table.count;
1087 if (count != VRSS_SEND_TAB_SIZE) {
1088 netdev_err(ndev, "Received wrong send-table size:%u\n", count);
1089 return;
1090 }
1091
1092 tab = (u32 *)((unsigned long)&nvmsg->msg.v5_msg.send_table +
1093 nvmsg->msg.v5_msg.send_table.offset);
1094
1095 for (i = 0; i < count; i++)
1096 nvscdev->send_table[i] = tab[i];
1097 }
1098
1099 void netvsc_channel_cb(void *context)
1100 {
1101 int ret;
1102 struct vmbus_channel *channel = (struct vmbus_channel *)context;
1103 struct hv_device *device;
1104 struct netvsc_device *net_device;
1105 u32 bytes_recvd;
1106 u64 request_id;
1107 struct vmpacket_descriptor *desc;
1108 unsigned char *buffer;
1109 int bufferlen = NETVSC_PACKET_SIZE;
1110 struct net_device *ndev;
1111
1112 if (channel->primary_channel != NULL)
1113 device = channel->primary_channel->device_obj;
1114 else
1115 device = channel->device_obj;
1116
1117 net_device = get_inbound_net_device(device);
1118 if (!net_device)
1119 return;
1120 ndev = net_device->ndev;
1121 buffer = get_per_channel_state(channel);
1122
1123 do {
1124 ret = vmbus_recvpacket_raw(channel, buffer, bufferlen,
1125 &bytes_recvd, &request_id);
1126 if (ret == 0) {
1127 if (bytes_recvd > 0) {
1128 desc = (struct vmpacket_descriptor *)buffer;
1129 switch (desc->type) {
1130 case VM_PKT_COMP:
1131 netvsc_send_completion(net_device,
1132 device, desc);
1133 break;
1134
1135 case VM_PKT_DATA_USING_XFER_PAGES:
1136 netvsc_receive(net_device, channel,
1137 device, desc);
1138 break;
1139
1140 case VM_PKT_DATA_INBAND:
1141 netvsc_send_table(device, desc);
1142 break;
1143
1144 default:
1145 netdev_err(ndev,
1146 "unhandled packet type %d, "
1147 "tid %llx len %d\n",
1148 desc->type, request_id,
1149 bytes_recvd);
1150 break;
1151 }
1152
1153 } else {
1154 /*
1155 * We are done for this pass.
1156 */
1157 break;
1158 }
1159
1160 } else if (ret == -ENOBUFS) {
1161 if (bufferlen > NETVSC_PACKET_SIZE)
1162 kfree(buffer);
1163 /* Handle large packet */
1164 buffer = kmalloc(bytes_recvd, GFP_ATOMIC);
1165 if (buffer == NULL) {
1166 /* Try again next time around */
1167 netdev_err(ndev,
1168 "unable to allocate buffer of size "
1169 "(%d)!!\n", bytes_recvd);
1170 break;
1171 }
1172
1173 bufferlen = bytes_recvd;
1174 }
1175 } while (1);
1176
1177 if (bufferlen > NETVSC_PACKET_SIZE)
1178 kfree(buffer);
1179 return;
1180 }
1181
1182 /*
1183 * netvsc_device_add - Callback when the device belonging to this
1184 * driver is added
1185 */
1186 int netvsc_device_add(struct hv_device *device, void *additional_info)
1187 {
1188 int ret = 0;
1189 int ring_size =
1190 ((struct netvsc_device_info *)additional_info)->ring_size;
1191 struct netvsc_device *net_device;
1192 struct net_device *ndev;
1193
1194 net_device = alloc_net_device(device);
1195 if (!net_device)
1196 return -ENOMEM;
1197
1198 net_device->ring_size = ring_size;
1199
1200 /*
1201 * Coming into this function, struct net_device * is
1202 * registered as the driver private data.
1203 * In alloc_net_device(), we register struct netvsc_device *
1204 * as the driver private data and stash away struct net_device *
1205 * in struct netvsc_device *.
1206 */
1207 ndev = net_device->ndev;
1208
1209 /* Add netvsc_device context to netvsc_device */
1210 net_device->nd_ctx = netdev_priv(ndev);
1211
1212 /* Initialize the NetVSC channel extension */
1213 init_completion(&net_device->channel_init_wait);
1214
1215 set_per_channel_state(device->channel, net_device->cb_buffer);
1216
1217 /* Open the channel */
1218 ret = vmbus_open(device->channel, ring_size * PAGE_SIZE,
1219 ring_size * PAGE_SIZE, NULL, 0,
1220 netvsc_channel_cb, device->channel);
1221
1222 if (ret != 0) {
1223 netdev_err(ndev, "unable to open channel: %d\n", ret);
1224 goto cleanup;
1225 }
1226
1227 /* Channel is opened */
1228 pr_info("hv_netvsc channel opened successfully\n");
1229
1230 net_device->chn_table[0] = device->channel;
1231
1232 /* Connect with the NetVsp */
1233 ret = netvsc_connect_vsp(device);
1234 if (ret != 0) {
1235 netdev_err(ndev,
1236 "unable to connect to NetVSP - %d\n", ret);
1237 goto close;
1238 }
1239
1240 return ret;
1241
1242 close:
1243 /* Now, we can close the channel safely */
1244 vmbus_close(device->channel);
1245
1246 cleanup:
1247 free_netvsc_device(net_device);
1248
1249 return ret;
1250 }
This page took 0.077575 seconds and 5 git commands to generate.