1 /*
2 * Copyright (c) 2009, Microsoft Corporation.
3 *
4 * This program is free software; you can redistribute it and/or modify it
5 * under the terms and conditions of the GNU General Public License,
6 * version 2, as published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope it will be useful, but WITHOUT
9 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
10 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
11 * more details.
12 *
13 * You should have received a copy of the GNU General Public License along with
14 * this program; if not, see <http://www.gnu.org/licenses/>.
15 *
16 * Authors:
17 * Haiyang Zhang <haiyangz@microsoft.com>
18 * Hank Janssen <hjanssen@microsoft.com>
19 */
20 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
21
22 #include <linux/kernel.h>
23 #include <linux/sched.h>
24 #include <linux/wait.h>
25 #include <linux/mm.h>
26 #include <linux/delay.h>
27 #include <linux/io.h>
28 #include <linux/slab.h>
29 #include <linux/netdevice.h>
30 #include <linux/if_ether.h>
31 #include <asm/sync_bitops.h>
32
33 #include "hyperv_net.h"
34
35
alloc_net_device(struct hv_device * device)36 static struct netvsc_device *alloc_net_device(struct hv_device *device)
37 {
38 struct netvsc_device *net_device;
39 struct net_device *ndev = hv_get_drvdata(device);
40
41 net_device = kzalloc(sizeof(struct netvsc_device), GFP_KERNEL);
42 if (!net_device)
43 return NULL;
44
45 net_device->cb_buffer = kzalloc(NETVSC_PACKET_SIZE, GFP_KERNEL);
46 if (!net_device->cb_buffer) {
47 kfree(net_device);
48 return NULL;
49 }
50
51 init_waitqueue_head(&net_device->wait_drain);
52 net_device->start_remove = false;
53 net_device->destroy = false;
54 net_device->dev = device;
55 net_device->ndev = ndev;
56
57 hv_set_drvdata(device, net_device);
58 return net_device;
59 }
60
free_netvsc_device(struct netvsc_device * nvdev)61 static void free_netvsc_device(struct netvsc_device *nvdev)
62 {
63 kfree(nvdev->cb_buffer);
64 kfree(nvdev);
65 }
66
get_outbound_net_device(struct hv_device * device)67 static struct netvsc_device *get_outbound_net_device(struct hv_device *device)
68 {
69 struct netvsc_device *net_device;
70
71 net_device = hv_get_drvdata(device);
72 if (net_device && net_device->destroy)
73 net_device = NULL;
74
75 return net_device;
76 }
77
get_inbound_net_device(struct hv_device * device)78 static struct netvsc_device *get_inbound_net_device(struct hv_device *device)
79 {
80 struct netvsc_device *net_device;
81
82 net_device = hv_get_drvdata(device);
83
84 if (!net_device)
85 goto get_in_err;
86
87 if (net_device->destroy &&
88 atomic_read(&net_device->num_outstanding_sends) == 0)
89 net_device = NULL;
90
91 get_in_err:
92 return net_device;
93 }
94
95
netvsc_destroy_buf(struct netvsc_device * net_device)96 static int netvsc_destroy_buf(struct netvsc_device *net_device)
97 {
98 struct nvsp_message *revoke_packet;
99 int ret = 0;
100 struct net_device *ndev = net_device->ndev;
101
102 /*
103 * If we got a section count, it means we received a
104 * SendReceiveBufferComplete msg (ie sent
105 * NvspMessage1TypeSendReceiveBuffer msg) therefore, we need
106 * to send a revoke msg here
107 */
108 if (net_device->recv_section_cnt) {
109 /* Send the revoke receive buffer */
110 revoke_packet = &net_device->revoke_packet;
111 memset(revoke_packet, 0, sizeof(struct nvsp_message));
112
113 revoke_packet->hdr.msg_type =
114 NVSP_MSG1_TYPE_REVOKE_RECV_BUF;
115 revoke_packet->msg.v1_msg.
116 revoke_recv_buf.id = NETVSC_RECEIVE_BUFFER_ID;
117
118 ret = vmbus_sendpacket(net_device->dev->channel,
119 revoke_packet,
120 sizeof(struct nvsp_message),
121 (unsigned long)revoke_packet,
122 VM_PKT_DATA_INBAND, 0);
123 /*
124 * If we failed here, we might as well return and
125 * have a leak rather than continue and a bugchk
126 */
127 if (ret != 0) {
128 netdev_err(ndev, "unable to send "
129 "revoke receive buffer to netvsp\n");
130 return ret;
131 }
132 }
133
134 /* Teardown the gpadl on the vsp end */
135 if (net_device->recv_buf_gpadl_handle) {
136 ret = vmbus_teardown_gpadl(net_device->dev->channel,
137 net_device->recv_buf_gpadl_handle);
138
139 /* If we failed here, we might as well return and have a leak
140 * rather than continue and a bugchk
141 */
142 if (ret != 0) {
143 netdev_err(ndev,
144 "unable to teardown receive buffer's gpadl\n");
145 return ret;
146 }
147 net_device->recv_buf_gpadl_handle = 0;
148 }
149
150 if (net_device->recv_buf) {
151 /* Free up the receive buffer */
152 vfree(net_device->recv_buf);
153 net_device->recv_buf = NULL;
154 }
155
156 if (net_device->recv_section) {
157 net_device->recv_section_cnt = 0;
158 kfree(net_device->recv_section);
159 net_device->recv_section = NULL;
160 }
161
162 /* Deal with the send buffer we may have setup.
163 * If we got a send section size, it means we received a
164 * SendsendBufferComplete msg (ie sent
165 * NvspMessage1TypeSendReceiveBuffer msg) therefore, we need
166 * to send a revoke msg here
167 */
168 if (net_device->send_section_size) {
169 /* Send the revoke receive buffer */
170 revoke_packet = &net_device->revoke_packet;
171 memset(revoke_packet, 0, sizeof(struct nvsp_message));
172
173 revoke_packet->hdr.msg_type =
174 NVSP_MSG1_TYPE_REVOKE_SEND_BUF;
175 revoke_packet->msg.v1_msg.revoke_recv_buf.id = 0;
176
177 ret = vmbus_sendpacket(net_device->dev->channel,
178 revoke_packet,
179 sizeof(struct nvsp_message),
180 (unsigned long)revoke_packet,
181 VM_PKT_DATA_INBAND, 0);
182 /* If we failed here, we might as well return and
183 * have a leak rather than continue and a bugchk
184 */
185 if (ret != 0) {
186 netdev_err(ndev, "unable to send "
187 "revoke send buffer to netvsp\n");
188 return ret;
189 }
190 }
191 /* Teardown the gpadl on the vsp end */
192 if (net_device->send_buf_gpadl_handle) {
193 ret = vmbus_teardown_gpadl(net_device->dev->channel,
194 net_device->send_buf_gpadl_handle);
195
196 /* If we failed here, we might as well return and have a leak
197 * rather than continue and a bugchk
198 */
199 if (ret != 0) {
200 netdev_err(ndev,
201 "unable to teardown send buffer's gpadl\n");
202 return ret;
203 }
204 net_device->send_buf_gpadl_handle = 0;
205 }
206 if (net_device->send_buf) {
207 /* Free up the receive buffer */
208 vfree(net_device->send_buf);
209 net_device->send_buf = NULL;
210 }
211 kfree(net_device->send_section_map);
212
213 return ret;
214 }
215
netvsc_init_buf(struct hv_device * device)216 static int netvsc_init_buf(struct hv_device *device)
217 {
218 int ret = 0;
219 int t;
220 struct netvsc_device *net_device;
221 struct nvsp_message *init_packet;
222 struct net_device *ndev;
223
224 net_device = get_outbound_net_device(device);
225 if (!net_device)
226 return -ENODEV;
227 ndev = net_device->ndev;
228
229 net_device->recv_buf = vzalloc(net_device->recv_buf_size);
230 if (!net_device->recv_buf) {
231 netdev_err(ndev, "unable to allocate receive "
232 "buffer of size %d\n", net_device->recv_buf_size);
233 ret = -ENOMEM;
234 goto cleanup;
235 }
236
237 /*
238 * Establish the gpadl handle for this buffer on this
239 * channel. Note: This call uses the vmbus connection rather
240 * than the channel to establish the gpadl handle.
241 */
242 ret = vmbus_establish_gpadl(device->channel, net_device->recv_buf,
243 net_device->recv_buf_size,
244 &net_device->recv_buf_gpadl_handle);
245 if (ret != 0) {
246 netdev_err(ndev,
247 "unable to establish receive buffer's gpadl\n");
248 goto cleanup;
249 }
250
251
252 /* Notify the NetVsp of the gpadl handle */
253 init_packet = &net_device->channel_init_pkt;
254
255 memset(init_packet, 0, sizeof(struct nvsp_message));
256
257 init_packet->hdr.msg_type = NVSP_MSG1_TYPE_SEND_RECV_BUF;
258 init_packet->msg.v1_msg.send_recv_buf.
259 gpadl_handle = net_device->recv_buf_gpadl_handle;
260 init_packet->msg.v1_msg.
261 send_recv_buf.id = NETVSC_RECEIVE_BUFFER_ID;
262
263 /* Send the gpadl notification request */
264 ret = vmbus_sendpacket(device->channel, init_packet,
265 sizeof(struct nvsp_message),
266 (unsigned long)init_packet,
267 VM_PKT_DATA_INBAND,
268 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
269 if (ret != 0) {
270 netdev_err(ndev,
271 "unable to send receive buffer's gpadl to netvsp\n");
272 goto cleanup;
273 }
274
275 t = wait_for_completion_timeout(&net_device->channel_init_wait, 5*HZ);
276 BUG_ON(t == 0);
277
278
279 /* Check the response */
280 if (init_packet->msg.v1_msg.
281 send_recv_buf_complete.status != NVSP_STAT_SUCCESS) {
282 netdev_err(ndev, "Unable to complete receive buffer "
283 "initialization with NetVsp - status %d\n",
284 init_packet->msg.v1_msg.
285 send_recv_buf_complete.status);
286 ret = -EINVAL;
287 goto cleanup;
288 }
289
290 /* Parse the response */
291
292 net_device->recv_section_cnt = init_packet->msg.
293 v1_msg.send_recv_buf_complete.num_sections;
294
295 net_device->recv_section = kmemdup(
296 init_packet->msg.v1_msg.send_recv_buf_complete.sections,
297 net_device->recv_section_cnt *
298 sizeof(struct nvsp_1_receive_buffer_section),
299 GFP_KERNEL);
300 if (net_device->recv_section == NULL) {
301 ret = -EINVAL;
302 goto cleanup;
303 }
304
305 /*
306 * For 1st release, there should only be 1 section that represents the
307 * entire receive buffer
308 */
309 if (net_device->recv_section_cnt != 1 ||
310 net_device->recv_section->offset != 0) {
311 ret = -EINVAL;
312 goto cleanup;
313 }
314
315 /* Now setup the send buffer.
316 */
317 net_device->send_buf = vzalloc(net_device->send_buf_size);
318 if (!net_device->send_buf) {
319 netdev_err(ndev, "unable to allocate send "
320 "buffer of size %d\n", net_device->send_buf_size);
321 ret = -ENOMEM;
322 goto cleanup;
323 }
324
325 /* Establish the gpadl handle for this buffer on this
326 * channel. Note: This call uses the vmbus connection rather
327 * than the channel to establish the gpadl handle.
328 */
329 ret = vmbus_establish_gpadl(device->channel, net_device->send_buf,
330 net_device->send_buf_size,
331 &net_device->send_buf_gpadl_handle);
332 if (ret != 0) {
333 netdev_err(ndev,
334 "unable to establish send buffer's gpadl\n");
335 goto cleanup;
336 }
337
338 /* Notify the NetVsp of the gpadl handle */
339 init_packet = &net_device->channel_init_pkt;
340 memset(init_packet, 0, sizeof(struct nvsp_message));
341 init_packet->hdr.msg_type = NVSP_MSG1_TYPE_SEND_SEND_BUF;
342 init_packet->msg.v1_msg.send_recv_buf.gpadl_handle =
343 net_device->send_buf_gpadl_handle;
344 init_packet->msg.v1_msg.send_recv_buf.id = 0;
345
346 /* Send the gpadl notification request */
347 ret = vmbus_sendpacket(device->channel, init_packet,
348 sizeof(struct nvsp_message),
349 (unsigned long)init_packet,
350 VM_PKT_DATA_INBAND,
351 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
352 if (ret != 0) {
353 netdev_err(ndev,
354 "unable to send send buffer's gpadl to netvsp\n");
355 goto cleanup;
356 }
357
358 t = wait_for_completion_timeout(&net_device->channel_init_wait, 5*HZ);
359 BUG_ON(t == 0);
360
361 /* Check the response */
362 if (init_packet->msg.v1_msg.
363 send_send_buf_complete.status != NVSP_STAT_SUCCESS) {
364 netdev_err(ndev, "Unable to complete send buffer "
365 "initialization with NetVsp - status %d\n",
366 init_packet->msg.v1_msg.
367 send_recv_buf_complete.status);
368 ret = -EINVAL;
369 goto cleanup;
370 }
371
372 /* Parse the response */
373 net_device->send_section_size = init_packet->msg.
374 v1_msg.send_send_buf_complete.section_size;
375
376 /* Section count is simply the size divided by the section size.
377 */
378 net_device->send_section_cnt =
379 net_device->send_buf_size/net_device->send_section_size;
380
381 dev_info(&device->device, "Send section size: %d, Section count:%d\n",
382 net_device->send_section_size, net_device->send_section_cnt);
383
384 /* Setup state for managing the send buffer. */
385 net_device->map_words = DIV_ROUND_UP(net_device->send_section_cnt,
386 BITS_PER_LONG);
387
388 net_device->send_section_map =
389 kzalloc(net_device->map_words * sizeof(ulong), GFP_KERNEL);
390 if (net_device->send_section_map == NULL) {
391 ret = -ENOMEM;
392 goto cleanup;
393 }
394
395 goto exit;
396
397 cleanup:
398 netvsc_destroy_buf(net_device);
399
400 exit:
401 return ret;
402 }
403
404
405 /* Negotiate NVSP protocol version */
negotiate_nvsp_ver(struct hv_device * device,struct netvsc_device * net_device,struct nvsp_message * init_packet,u32 nvsp_ver)406 static int negotiate_nvsp_ver(struct hv_device *device,
407 struct netvsc_device *net_device,
408 struct nvsp_message *init_packet,
409 u32 nvsp_ver)
410 {
411 int ret, t;
412
413 memset(init_packet, 0, sizeof(struct nvsp_message));
414 init_packet->hdr.msg_type = NVSP_MSG_TYPE_INIT;
415 init_packet->msg.init_msg.init.min_protocol_ver = nvsp_ver;
416 init_packet->msg.init_msg.init.max_protocol_ver = nvsp_ver;
417
418 /* Send the init request */
419 ret = vmbus_sendpacket(device->channel, init_packet,
420 sizeof(struct nvsp_message),
421 (unsigned long)init_packet,
422 VM_PKT_DATA_INBAND,
423 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
424
425 if (ret != 0)
426 return ret;
427
428 t = wait_for_completion_timeout(&net_device->channel_init_wait, 5*HZ);
429
430 if (t == 0)
431 return -ETIMEDOUT;
432
433 if (init_packet->msg.init_msg.init_complete.status !=
434 NVSP_STAT_SUCCESS)
435 return -EINVAL;
436
437 if (nvsp_ver == NVSP_PROTOCOL_VERSION_1)
438 return 0;
439
440 /* NVSPv2 only: Send NDIS config */
441 memset(init_packet, 0, sizeof(struct nvsp_message));
442 init_packet->hdr.msg_type = NVSP_MSG2_TYPE_SEND_NDIS_CONFIG;
443 init_packet->msg.v2_msg.send_ndis_config.mtu = net_device->ndev->mtu;
444 init_packet->msg.v2_msg.send_ndis_config.capability.ieee8021q = 1;
445
446 ret = vmbus_sendpacket(device->channel, init_packet,
447 sizeof(struct nvsp_message),
448 (unsigned long)init_packet,
449 VM_PKT_DATA_INBAND, 0);
450
451 return ret;
452 }
453
netvsc_connect_vsp(struct hv_device * device)454 static int netvsc_connect_vsp(struct hv_device *device)
455 {
456 int ret;
457 struct netvsc_device *net_device;
458 struct nvsp_message *init_packet;
459 int ndis_version;
460 struct net_device *ndev;
461 u32 ver_list[] = { NVSP_PROTOCOL_VERSION_1, NVSP_PROTOCOL_VERSION_2,
462 NVSP_PROTOCOL_VERSION_4, NVSP_PROTOCOL_VERSION_5 };
463 int i, num_ver = 4; /* number of different NVSP versions */
464
465 net_device = get_outbound_net_device(device);
466 if (!net_device)
467 return -ENODEV;
468 ndev = net_device->ndev;
469
470 init_packet = &net_device->channel_init_pkt;
471
472 /* Negotiate the latest NVSP protocol supported */
473 for (i = num_ver - 1; i >= 0; i--)
474 if (negotiate_nvsp_ver(device, net_device, init_packet,
475 ver_list[i]) == 0) {
476 net_device->nvsp_version = ver_list[i];
477 break;
478 }
479
480 if (i < 0) {
481 ret = -EPROTO;
482 goto cleanup;
483 }
484
485 pr_debug("Negotiated NVSP version:%x\n", net_device->nvsp_version);
486
487 /* Send the ndis version */
488 memset(init_packet, 0, sizeof(struct nvsp_message));
489
490 if (net_device->nvsp_version <= NVSP_PROTOCOL_VERSION_4)
491 ndis_version = 0x00060001;
492 else
493 ndis_version = 0x0006001e;
494
495 init_packet->hdr.msg_type = NVSP_MSG1_TYPE_SEND_NDIS_VER;
496 init_packet->msg.v1_msg.
497 send_ndis_ver.ndis_major_ver =
498 (ndis_version & 0xFFFF0000) >> 16;
499 init_packet->msg.v1_msg.
500 send_ndis_ver.ndis_minor_ver =
501 ndis_version & 0xFFFF;
502
503 /* Send the init request */
504 ret = vmbus_sendpacket(device->channel, init_packet,
505 sizeof(struct nvsp_message),
506 (unsigned long)init_packet,
507 VM_PKT_DATA_INBAND, 0);
508 if (ret != 0)
509 goto cleanup;
510
511 /* Post the big receive buffer to NetVSP */
512 if (net_device->nvsp_version <= NVSP_PROTOCOL_VERSION_2)
513 net_device->recv_buf_size = NETVSC_RECEIVE_BUFFER_SIZE_LEGACY;
514 else
515 net_device->recv_buf_size = NETVSC_RECEIVE_BUFFER_SIZE;
516 net_device->send_buf_size = NETVSC_SEND_BUFFER_SIZE;
517
518 ret = netvsc_init_buf(device);
519
520 cleanup:
521 return ret;
522 }
523
netvsc_disconnect_vsp(struct netvsc_device * net_device)524 static void netvsc_disconnect_vsp(struct netvsc_device *net_device)
525 {
526 netvsc_destroy_buf(net_device);
527 }
528
529 /*
530 * netvsc_device_remove - Callback when the root bus device is removed
531 */
netvsc_device_remove(struct hv_device * device)532 int netvsc_device_remove(struct hv_device *device)
533 {
534 struct netvsc_device *net_device;
535 unsigned long flags;
536
537 net_device = hv_get_drvdata(device);
538
539 netvsc_disconnect_vsp(net_device);
540
541 /*
542 * Since we have already drained, we don't need to busy wait
543 * as was done in final_release_stor_device()
544 * Note that we cannot set the ext pointer to NULL until
545 * we have drained - to drain the outgoing packets, we need to
546 * allow incoming packets.
547 */
548
549 spin_lock_irqsave(&device->channel->inbound_lock, flags);
550 hv_set_drvdata(device, NULL);
551 spin_unlock_irqrestore(&device->channel->inbound_lock, flags);
552
553 /*
554 * At this point, no one should be accessing net_device
555 * except in here
556 */
557 dev_notice(&device->device, "net device safe to remove\n");
558
559 /* Now, we can close the channel safely */
560 vmbus_close(device->channel);
561
562 /* Release all resources */
563 if (net_device->sub_cb_buf)
564 vfree(net_device->sub_cb_buf);
565
566 free_netvsc_device(net_device);
567 return 0;
568 }
569
570
571 #define RING_AVAIL_PERCENT_HIWATER 20
572 #define RING_AVAIL_PERCENT_LOWATER 10
573
574 /*
575 * Get the percentage of available bytes to write in the ring.
576 * The return value is in range from 0 to 100.
577 */
hv_ringbuf_avail_percent(struct hv_ring_buffer_info * ring_info)578 static inline u32 hv_ringbuf_avail_percent(
579 struct hv_ring_buffer_info *ring_info)
580 {
581 u32 avail_read, avail_write;
582
583 hv_get_ringbuffer_availbytes(ring_info, &avail_read, &avail_write);
584
585 return avail_write * 100 / ring_info->ring_datasize;
586 }
587
netvsc_free_send_slot(struct netvsc_device * net_device,u32 index)588 static inline void netvsc_free_send_slot(struct netvsc_device *net_device,
589 u32 index)
590 {
591 sync_change_bit(index, net_device->send_section_map);
592 }
593
netvsc_send_completion(struct netvsc_device * net_device,struct hv_device * device,struct vmpacket_descriptor * packet)594 static void netvsc_send_completion(struct netvsc_device *net_device,
595 struct hv_device *device,
596 struct vmpacket_descriptor *packet)
597 {
598 struct nvsp_message *nvsp_packet;
599 struct hv_netvsc_packet *nvsc_packet;
600 struct net_device *ndev;
601 u32 send_index;
602
603 ndev = net_device->ndev;
604
605 nvsp_packet = (struct nvsp_message *)((unsigned long)packet +
606 (packet->offset8 << 3));
607
608 if ((nvsp_packet->hdr.msg_type == NVSP_MSG_TYPE_INIT_COMPLETE) ||
609 (nvsp_packet->hdr.msg_type ==
610 NVSP_MSG1_TYPE_SEND_RECV_BUF_COMPLETE) ||
611 (nvsp_packet->hdr.msg_type ==
612 NVSP_MSG1_TYPE_SEND_SEND_BUF_COMPLETE) ||
613 (nvsp_packet->hdr.msg_type ==
614 NVSP_MSG5_TYPE_SUBCHANNEL)) {
615 /* Copy the response back */
616 memcpy(&net_device->channel_init_pkt, nvsp_packet,
617 sizeof(struct nvsp_message));
618 complete(&net_device->channel_init_wait);
619 } else if (nvsp_packet->hdr.msg_type ==
620 NVSP_MSG1_TYPE_SEND_RNDIS_PKT_COMPLETE) {
621 int num_outstanding_sends;
622 u16 q_idx = 0;
623 struct vmbus_channel *channel = device->channel;
624 int queue_sends;
625
626 /* Get the send context */
627 nvsc_packet = (struct hv_netvsc_packet *)(unsigned long)
628 packet->trans_id;
629
630 /* Notify the layer above us */
631 if (nvsc_packet) {
632 send_index = nvsc_packet->send_buf_index;
633 if (send_index != NETVSC_INVALID_INDEX)
634 netvsc_free_send_slot(net_device, send_index);
635 q_idx = nvsc_packet->q_idx;
636 channel = nvsc_packet->channel;
637 nvsc_packet->send_completion(nvsc_packet->
638 send_completion_ctx);
639 }
640
641 num_outstanding_sends =
642 atomic_dec_return(&net_device->num_outstanding_sends);
643 queue_sends = atomic_dec_return(&net_device->
644 queue_sends[q_idx]);
645
646 if (net_device->destroy && num_outstanding_sends == 0)
647 wake_up(&net_device->wait_drain);
648
649 if (netif_tx_queue_stopped(netdev_get_tx_queue(ndev, q_idx)) &&
650 !net_device->start_remove &&
651 (hv_ringbuf_avail_percent(&channel->outbound) >
652 RING_AVAIL_PERCENT_HIWATER || queue_sends < 1))
653 netif_tx_wake_queue(netdev_get_tx_queue(
654 ndev, q_idx));
655 } else {
656 netdev_err(ndev, "Unknown send completion packet type- "
657 "%d received!!\n", nvsp_packet->hdr.msg_type);
658 }
659
660 }
661
netvsc_get_next_send_section(struct netvsc_device * net_device)662 static u32 netvsc_get_next_send_section(struct netvsc_device *net_device)
663 {
664 unsigned long index;
665 u32 max_words = net_device->map_words;
666 unsigned long *map_addr = (unsigned long *)net_device->send_section_map;
667 u32 section_cnt = net_device->send_section_cnt;
668 int ret_val = NETVSC_INVALID_INDEX;
669 int i;
670 int prev_val;
671
672 for (i = 0; i < max_words; i++) {
673 if (!~(map_addr[i]))
674 continue;
675 index = ffz(map_addr[i]);
676 prev_val = sync_test_and_set_bit(index, &map_addr[i]);
677 if (prev_val)
678 continue;
679 if ((index + (i * BITS_PER_LONG)) >= section_cnt)
680 break;
681 ret_val = (index + (i * BITS_PER_LONG));
682 break;
683 }
684 return ret_val;
685 }
686
netvsc_copy_to_send_buf(struct netvsc_device * net_device,unsigned int section_index,struct hv_netvsc_packet * packet)687 u32 netvsc_copy_to_send_buf(struct netvsc_device *net_device,
688 unsigned int section_index,
689 struct hv_netvsc_packet *packet)
690 {
691 char *start = net_device->send_buf;
692 char *dest = (start + (section_index * net_device->send_section_size));
693 int i;
694 u32 msg_size = 0;
695
696 for (i = 0; i < packet->page_buf_cnt; i++) {
697 char *src = phys_to_virt(packet->page_buf[i].pfn << PAGE_SHIFT);
698 u32 offset = packet->page_buf[i].offset;
699 u32 len = packet->page_buf[i].len;
700
701 memcpy(dest, (src + offset), len);
702 msg_size += len;
703 dest += len;
704 }
705 return msg_size;
706 }
707
netvsc_send(struct hv_device * device,struct hv_netvsc_packet * packet)708 int netvsc_send(struct hv_device *device,
709 struct hv_netvsc_packet *packet)
710 {
711 struct netvsc_device *net_device;
712 int ret = 0;
713 struct nvsp_message sendMessage;
714 struct net_device *ndev;
715 struct vmbus_channel *out_channel = NULL;
716 u64 req_id;
717 unsigned int section_index = NETVSC_INVALID_INDEX;
718 u32 msg_size = 0;
719 struct sk_buff *skb = NULL;
720 u16 q_idx = packet->q_idx;
721
722
723 net_device = get_outbound_net_device(device);
724 if (!net_device)
725 return -ENODEV;
726 ndev = net_device->ndev;
727
728 sendMessage.hdr.msg_type = NVSP_MSG1_TYPE_SEND_RNDIS_PKT;
729 if (packet->is_data_pkt) {
730 /* 0 is RMC_DATA; */
731 sendMessage.msg.v1_msg.send_rndis_pkt.channel_type = 0;
732 } else {
733 /* 1 is RMC_CONTROL; */
734 sendMessage.msg.v1_msg.send_rndis_pkt.channel_type = 1;
735 }
736
737 /* Attempt to send via sendbuf */
738 if (packet->total_data_buflen < net_device->send_section_size) {
739 section_index = netvsc_get_next_send_section(net_device);
740 if (section_index != NETVSC_INVALID_INDEX) {
741 msg_size = netvsc_copy_to_send_buf(net_device,
742 section_index,
743 packet);
744 skb = (struct sk_buff *)
745 (unsigned long)packet->send_completion_tid;
746 packet->page_buf_cnt = 0;
747 }
748 }
749 packet->send_buf_index = section_index;
750
751
752 sendMessage.msg.v1_msg.send_rndis_pkt.send_buf_section_index =
753 section_index;
754 sendMessage.msg.v1_msg.send_rndis_pkt.send_buf_section_size = msg_size;
755
756 if (packet->send_completion)
757 req_id = (ulong)packet;
758 else
759 req_id = 0;
760
761 out_channel = net_device->chn_table[packet->q_idx];
762 if (out_channel == NULL)
763 out_channel = device->channel;
764 packet->channel = out_channel;
765
766 if (packet->page_buf_cnt) {
767 ret = vmbus_sendpacket_pagebuffer(out_channel,
768 packet->page_buf,
769 packet->page_buf_cnt,
770 &sendMessage,
771 sizeof(struct nvsp_message),
772 req_id);
773 } else {
774 ret = vmbus_sendpacket(out_channel, &sendMessage,
775 sizeof(struct nvsp_message),
776 req_id,
777 VM_PKT_DATA_INBAND,
778 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
779 }
780
781 if (ret == 0) {
782 atomic_inc(&net_device->num_outstanding_sends);
783 atomic_inc(&net_device->queue_sends[q_idx]);
784
785 if (hv_ringbuf_avail_percent(&out_channel->outbound) <
786 RING_AVAIL_PERCENT_LOWATER) {
787 netif_tx_stop_queue(netdev_get_tx_queue(
788 ndev, q_idx));
789
790 if (atomic_read(&net_device->
791 queue_sends[q_idx]) < 1)
792 netif_tx_wake_queue(netdev_get_tx_queue(
793 ndev, q_idx));
794 }
795 } else if (ret == -EAGAIN) {
796 netif_tx_stop_queue(netdev_get_tx_queue(
797 ndev, q_idx));
798 if (atomic_read(&net_device->queue_sends[q_idx]) < 1) {
799 netif_tx_wake_queue(netdev_get_tx_queue(
800 ndev, q_idx));
801 ret = -ENOSPC;
802 }
803 } else {
804 netdev_err(ndev, "Unable to send packet %p ret %d\n",
805 packet, ret);
806 }
807
808 if (ret != 0) {
809 if (section_index != NETVSC_INVALID_INDEX)
810 netvsc_free_send_slot(net_device, section_index);
811 } else if (skb) {
812 dev_kfree_skb_any(skb);
813 }
814
815 return ret;
816 }
817
netvsc_send_recv_completion(struct hv_device * device,struct vmbus_channel * channel,struct netvsc_device * net_device,u64 transaction_id,u32 status)818 static void netvsc_send_recv_completion(struct hv_device *device,
819 struct vmbus_channel *channel,
820 struct netvsc_device *net_device,
821 u64 transaction_id, u32 status)
822 {
823 struct nvsp_message recvcompMessage;
824 int retries = 0;
825 int ret;
826 struct net_device *ndev;
827
828 ndev = net_device->ndev;
829
830 recvcompMessage.hdr.msg_type =
831 NVSP_MSG1_TYPE_SEND_RNDIS_PKT_COMPLETE;
832
833 recvcompMessage.msg.v1_msg.send_rndis_pkt_complete.status = status;
834
835 retry_send_cmplt:
836 /* Send the completion */
837 ret = vmbus_sendpacket(channel, &recvcompMessage,
838 sizeof(struct nvsp_message), transaction_id,
839 VM_PKT_COMP, 0);
840 if (ret == 0) {
841 /* success */
842 /* no-op */
843 } else if (ret == -EAGAIN) {
844 /* no more room...wait a bit and attempt to retry 3 times */
845 retries++;
846 netdev_err(ndev, "unable to send receive completion pkt"
847 " (tid %llx)...retrying %d\n", transaction_id, retries);
848
849 if (retries < 4) {
850 udelay(100);
851 goto retry_send_cmplt;
852 } else {
853 netdev_err(ndev, "unable to send receive "
854 "completion pkt (tid %llx)...give up retrying\n",
855 transaction_id);
856 }
857 } else {
858 netdev_err(ndev, "unable to send receive "
859 "completion pkt - %llx\n", transaction_id);
860 }
861 }
862
netvsc_receive(struct netvsc_device * net_device,struct vmbus_channel * channel,struct hv_device * device,struct vmpacket_descriptor * packet)863 static void netvsc_receive(struct netvsc_device *net_device,
864 struct vmbus_channel *channel,
865 struct hv_device *device,
866 struct vmpacket_descriptor *packet)
867 {
868 struct vmtransfer_page_packet_header *vmxferpage_packet;
869 struct nvsp_message *nvsp_packet;
870 struct hv_netvsc_packet nv_pkt;
871 struct hv_netvsc_packet *netvsc_packet = &nv_pkt;
872 u32 status = NVSP_STAT_SUCCESS;
873 int i;
874 int count = 0;
875 struct net_device *ndev;
876
877 ndev = net_device->ndev;
878
879 /*
880 * All inbound packets other than send completion should be xfer page
881 * packet
882 */
883 if (packet->type != VM_PKT_DATA_USING_XFER_PAGES) {
884 netdev_err(ndev, "Unknown packet type received - %d\n",
885 packet->type);
886 return;
887 }
888
889 nvsp_packet = (struct nvsp_message *)((unsigned long)packet +
890 (packet->offset8 << 3));
891
892 /* Make sure this is a valid nvsp packet */
893 if (nvsp_packet->hdr.msg_type !=
894 NVSP_MSG1_TYPE_SEND_RNDIS_PKT) {
895 netdev_err(ndev, "Unknown nvsp packet type received-"
896 " %d\n", nvsp_packet->hdr.msg_type);
897 return;
898 }
899
900 vmxferpage_packet = (struct vmtransfer_page_packet_header *)packet;
901
902 if (vmxferpage_packet->xfer_pageset_id != NETVSC_RECEIVE_BUFFER_ID) {
903 netdev_err(ndev, "Invalid xfer page set id - "
904 "expecting %x got %x\n", NETVSC_RECEIVE_BUFFER_ID,
905 vmxferpage_packet->xfer_pageset_id);
906 return;
907 }
908
909 count = vmxferpage_packet->range_cnt;
910 netvsc_packet->device = device;
911 netvsc_packet->channel = channel;
912
913 /* Each range represents 1 RNDIS pkt that contains 1 ethernet frame */
914 for (i = 0; i < count; i++) {
915 /* Initialize the netvsc packet */
916 netvsc_packet->status = NVSP_STAT_SUCCESS;
917 netvsc_packet->data = (void *)((unsigned long)net_device->
918 recv_buf + vmxferpage_packet->ranges[i].byte_offset);
919 netvsc_packet->total_data_buflen =
920 vmxferpage_packet->ranges[i].byte_count;
921
922 /* Pass it to the upper layer */
923 rndis_filter_receive(device, netvsc_packet);
924
925 if (netvsc_packet->status != NVSP_STAT_SUCCESS)
926 status = NVSP_STAT_FAIL;
927 }
928
929 netvsc_send_recv_completion(device, channel, net_device,
930 vmxferpage_packet->d.trans_id, status);
931 }
932
933
netvsc_send_table(struct hv_device * hdev,struct vmpacket_descriptor * vmpkt)934 static void netvsc_send_table(struct hv_device *hdev,
935 struct vmpacket_descriptor *vmpkt)
936 {
937 struct netvsc_device *nvscdev;
938 struct net_device *ndev;
939 struct nvsp_message *nvmsg;
940 int i;
941 u32 count, *tab;
942
943 nvscdev = get_outbound_net_device(hdev);
944 if (!nvscdev)
945 return;
946 ndev = nvscdev->ndev;
947
948 nvmsg = (struct nvsp_message *)((unsigned long)vmpkt +
949 (vmpkt->offset8 << 3));
950
951 if (nvmsg->hdr.msg_type != NVSP_MSG5_TYPE_SEND_INDIRECTION_TABLE)
952 return;
953
954 count = nvmsg->msg.v5_msg.send_table.count;
955 if (count != VRSS_SEND_TAB_SIZE) {
956 netdev_err(ndev, "Received wrong send-table size:%u\n", count);
957 return;
958 }
959
960 tab = (u32 *)((unsigned long)&nvmsg->msg.v5_msg.send_table +
961 nvmsg->msg.v5_msg.send_table.offset);
962
963 for (i = 0; i < count; i++)
964 nvscdev->send_table[i] = tab[i];
965 }
966
netvsc_channel_cb(void * context)967 void netvsc_channel_cb(void *context)
968 {
969 int ret;
970 struct vmbus_channel *channel = (struct vmbus_channel *)context;
971 struct hv_device *device;
972 struct netvsc_device *net_device;
973 u32 bytes_recvd;
974 u64 request_id;
975 struct vmpacket_descriptor *desc;
976 unsigned char *buffer;
977 int bufferlen = NETVSC_PACKET_SIZE;
978 struct net_device *ndev;
979
980 if (channel->primary_channel != NULL)
981 device = channel->primary_channel->device_obj;
982 else
983 device = channel->device_obj;
984
985 net_device = get_inbound_net_device(device);
986 if (!net_device)
987 return;
988 ndev = net_device->ndev;
989 buffer = get_per_channel_state(channel);
990
991 do {
992 ret = vmbus_recvpacket_raw(channel, buffer, bufferlen,
993 &bytes_recvd, &request_id);
994 if (ret == 0) {
995 if (bytes_recvd > 0) {
996 desc = (struct vmpacket_descriptor *)buffer;
997 switch (desc->type) {
998 case VM_PKT_COMP:
999 netvsc_send_completion(net_device,
1000 device, desc);
1001 break;
1002
1003 case VM_PKT_DATA_USING_XFER_PAGES:
1004 netvsc_receive(net_device, channel,
1005 device, desc);
1006 break;
1007
1008 case VM_PKT_DATA_INBAND:
1009 netvsc_send_table(device, desc);
1010 break;
1011
1012 default:
1013 netdev_err(ndev,
1014 "unhandled packet type %d, "
1015 "tid %llx len %d\n",
1016 desc->type, request_id,
1017 bytes_recvd);
1018 break;
1019 }
1020
1021 } else {
1022 /*
1023 * We are done for this pass.
1024 */
1025 break;
1026 }
1027
1028 } else if (ret == -ENOBUFS) {
1029 if (bufferlen > NETVSC_PACKET_SIZE)
1030 kfree(buffer);
1031 /* Handle large packet */
1032 buffer = kmalloc(bytes_recvd, GFP_ATOMIC);
1033 if (buffer == NULL) {
1034 /* Try again next time around */
1035 netdev_err(ndev,
1036 "unable to allocate buffer of size "
1037 "(%d)!!\n", bytes_recvd);
1038 break;
1039 }
1040
1041 bufferlen = bytes_recvd;
1042 }
1043 } while (1);
1044
1045 if (bufferlen > NETVSC_PACKET_SIZE)
1046 kfree(buffer);
1047 return;
1048 }
1049
1050 /*
1051 * netvsc_device_add - Callback when the device belonging to this
1052 * driver is added
1053 */
netvsc_device_add(struct hv_device * device,void * additional_info)1054 int netvsc_device_add(struct hv_device *device, void *additional_info)
1055 {
1056 int ret = 0;
1057 int ring_size =
1058 ((struct netvsc_device_info *)additional_info)->ring_size;
1059 struct netvsc_device *net_device;
1060 struct net_device *ndev;
1061
1062 net_device = alloc_net_device(device);
1063 if (!net_device)
1064 return -ENOMEM;
1065
1066 net_device->ring_size = ring_size;
1067
1068 /*
1069 * Coming into this function, struct net_device * is
1070 * registered as the driver private data.
1071 * In alloc_net_device(), we register struct netvsc_device *
1072 * as the driver private data and stash away struct net_device *
1073 * in struct netvsc_device *.
1074 */
1075 ndev = net_device->ndev;
1076
1077 /* Initialize the NetVSC channel extension */
1078 init_completion(&net_device->channel_init_wait);
1079
1080 set_per_channel_state(device->channel, net_device->cb_buffer);
1081
1082 /* Open the channel */
1083 ret = vmbus_open(device->channel, ring_size * PAGE_SIZE,
1084 ring_size * PAGE_SIZE, NULL, 0,
1085 netvsc_channel_cb, device->channel);
1086
1087 if (ret != 0) {
1088 netdev_err(ndev, "unable to open channel: %d\n", ret);
1089 goto cleanup;
1090 }
1091
1092 /* Channel is opened */
1093 pr_info("hv_netvsc channel opened successfully\n");
1094
1095 net_device->chn_table[0] = device->channel;
1096
1097 /* Connect with the NetVsp */
1098 ret = netvsc_connect_vsp(device);
1099 if (ret != 0) {
1100 netdev_err(ndev,
1101 "unable to connect to NetVSP - %d\n", ret);
1102 goto close;
1103 }
1104
1105 return ret;
1106
1107 close:
1108 /* Now, we can close the channel safely */
1109 vmbus_close(device->channel);
1110
1111 cleanup:
1112 free_netvsc_device(net_device);
1113
1114 return ret;
1115 }
1116