Linux kernel mirror (for testing)
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel
os
linux
1/*
2 * Copyright (c) 2009, Microsoft Corporation.
3 *
4 * This program is free software; you can redistribute it and/or modify it
5 * under the terms and conditions of the GNU General Public License,
6 * version 2, as published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope it will be useful, but WITHOUT
9 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
10 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
11 * more details.
12 *
13 * You should have received a copy of the GNU General Public License along with
14 * this program; if not, see <http://www.gnu.org/licenses/>.
15 *
16 * Authors:
17 * Haiyang Zhang <haiyangz@microsoft.com>
18 * Hank Janssen <hjanssen@microsoft.com>
19 */
20#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
21
22#include <linux/kernel.h>
23#include <linux/sched.h>
24#include <linux/wait.h>
25#include <linux/mm.h>
26#include <linux/delay.h>
27#include <linux/io.h>
28#include <linux/slab.h>
29#include <linux/netdevice.h>
30#include <linux/if_ether.h>
31#include <asm/sync_bitops.h>
32
33#include "hyperv_net.h"
34
35
36static struct netvsc_device *alloc_net_device(struct hv_device *device)
37{
38 struct netvsc_device *net_device;
39 struct net_device *ndev = hv_get_drvdata(device);
40
41 net_device = kzalloc(sizeof(struct netvsc_device), GFP_KERNEL);
42 if (!net_device)
43 return NULL;
44
45 net_device->cb_buffer = kzalloc(NETVSC_PACKET_SIZE, GFP_KERNEL);
46 if (!net_device->cb_buffer) {
47 kfree(net_device);
48 return NULL;
49 }
50
51 init_waitqueue_head(&net_device->wait_drain);
52 net_device->start_remove = false;
53 net_device->destroy = false;
54 net_device->dev = device;
55 net_device->ndev = ndev;
56
57 hv_set_drvdata(device, net_device);
58 return net_device;
59}
60
61static void free_netvsc_device(struct netvsc_device *nvdev)
62{
63 kfree(nvdev->cb_buffer);
64 kfree(nvdev);
65}
66
67static struct netvsc_device *get_outbound_net_device(struct hv_device *device)
68{
69 struct netvsc_device *net_device;
70
71 net_device = hv_get_drvdata(device);
72 if (net_device && net_device->destroy)
73 net_device = NULL;
74
75 return net_device;
76}
77
78static struct netvsc_device *get_inbound_net_device(struct hv_device *device)
79{
80 struct netvsc_device *net_device;
81
82 net_device = hv_get_drvdata(device);
83
84 if (!net_device)
85 goto get_in_err;
86
87 if (net_device->destroy &&
88 atomic_read(&net_device->num_outstanding_sends) == 0)
89 net_device = NULL;
90
91get_in_err:
92 return net_device;
93}
94
95
96static int netvsc_destroy_buf(struct netvsc_device *net_device)
97{
98 struct nvsp_message *revoke_packet;
99 int ret = 0;
100 struct net_device *ndev = net_device->ndev;
101
102 /*
103 * If we got a section count, it means we received a
104 * SendReceiveBufferComplete msg (ie sent
105 * NvspMessage1TypeSendReceiveBuffer msg) therefore, we need
106 * to send a revoke msg here
107 */
108 if (net_device->recv_section_cnt) {
109 /* Send the revoke receive buffer */
110 revoke_packet = &net_device->revoke_packet;
111 memset(revoke_packet, 0, sizeof(struct nvsp_message));
112
113 revoke_packet->hdr.msg_type =
114 NVSP_MSG1_TYPE_REVOKE_RECV_BUF;
115 revoke_packet->msg.v1_msg.
116 revoke_recv_buf.id = NETVSC_RECEIVE_BUFFER_ID;
117
118 ret = vmbus_sendpacket(net_device->dev->channel,
119 revoke_packet,
120 sizeof(struct nvsp_message),
121 (unsigned long)revoke_packet,
122 VM_PKT_DATA_INBAND, 0);
123 /*
124 * If we failed here, we might as well return and
125 * have a leak rather than continue and a bugchk
126 */
127 if (ret != 0) {
128 netdev_err(ndev, "unable to send "
129 "revoke receive buffer to netvsp\n");
130 return ret;
131 }
132 }
133
134 /* Teardown the gpadl on the vsp end */
135 if (net_device->recv_buf_gpadl_handle) {
136 ret = vmbus_teardown_gpadl(net_device->dev->channel,
137 net_device->recv_buf_gpadl_handle);
138
139 /* If we failed here, we might as well return and have a leak
140 * rather than continue and a bugchk
141 */
142 if (ret != 0) {
143 netdev_err(ndev,
144 "unable to teardown receive buffer's gpadl\n");
145 return ret;
146 }
147 net_device->recv_buf_gpadl_handle = 0;
148 }
149
150 if (net_device->recv_buf) {
151 /* Free up the receive buffer */
152 vfree(net_device->recv_buf);
153 net_device->recv_buf = NULL;
154 }
155
156 if (net_device->recv_section) {
157 net_device->recv_section_cnt = 0;
158 kfree(net_device->recv_section);
159 net_device->recv_section = NULL;
160 }
161
162 /* Deal with the send buffer we may have setup.
163 * If we got a send section size, it means we received a
164 * NVSP_MSG1_TYPE_SEND_SEND_BUF_COMPLETE msg (ie sent
165 * NVSP_MSG1_TYPE_SEND_SEND_BUF msg) therefore, we need
166 * to send a revoke msg here
167 */
168 if (net_device->send_section_size) {
169 /* Send the revoke receive buffer */
170 revoke_packet = &net_device->revoke_packet;
171 memset(revoke_packet, 0, sizeof(struct nvsp_message));
172
173 revoke_packet->hdr.msg_type =
174 NVSP_MSG1_TYPE_REVOKE_SEND_BUF;
175 revoke_packet->msg.v1_msg.revoke_send_buf.id =
176 NETVSC_SEND_BUFFER_ID;
177
178 ret = vmbus_sendpacket(net_device->dev->channel,
179 revoke_packet,
180 sizeof(struct nvsp_message),
181 (unsigned long)revoke_packet,
182 VM_PKT_DATA_INBAND, 0);
183 /* If we failed here, we might as well return and
184 * have a leak rather than continue and a bugchk
185 */
186 if (ret != 0) {
187 netdev_err(ndev, "unable to send "
188 "revoke send buffer to netvsp\n");
189 return ret;
190 }
191 }
192 /* Teardown the gpadl on the vsp end */
193 if (net_device->send_buf_gpadl_handle) {
194 ret = vmbus_teardown_gpadl(net_device->dev->channel,
195 net_device->send_buf_gpadl_handle);
196
197 /* If we failed here, we might as well return and have a leak
198 * rather than continue and a bugchk
199 */
200 if (ret != 0) {
201 netdev_err(ndev,
202 "unable to teardown send buffer's gpadl\n");
203 return ret;
204 }
205 net_device->send_buf_gpadl_handle = 0;
206 }
207 if (net_device->send_buf) {
208 /* Free up the send buffer */
209 vfree(net_device->send_buf);
210 net_device->send_buf = NULL;
211 }
212 kfree(net_device->send_section_map);
213
214 return ret;
215}
216
217static int netvsc_init_buf(struct hv_device *device)
218{
219 int ret = 0;
220 unsigned long t;
221 struct netvsc_device *net_device;
222 struct nvsp_message *init_packet;
223 struct net_device *ndev;
224
225 net_device = get_outbound_net_device(device);
226 if (!net_device)
227 return -ENODEV;
228 ndev = net_device->ndev;
229
230 net_device->recv_buf = vzalloc(net_device->recv_buf_size);
231 if (!net_device->recv_buf) {
232 netdev_err(ndev, "unable to allocate receive "
233 "buffer of size %d\n", net_device->recv_buf_size);
234 ret = -ENOMEM;
235 goto cleanup;
236 }
237
238 /*
239 * Establish the gpadl handle for this buffer on this
240 * channel. Note: This call uses the vmbus connection rather
241 * than the channel to establish the gpadl handle.
242 */
243 ret = vmbus_establish_gpadl(device->channel, net_device->recv_buf,
244 net_device->recv_buf_size,
245 &net_device->recv_buf_gpadl_handle);
246 if (ret != 0) {
247 netdev_err(ndev,
248 "unable to establish receive buffer's gpadl\n");
249 goto cleanup;
250 }
251
252
253 /* Notify the NetVsp of the gpadl handle */
254 init_packet = &net_device->channel_init_pkt;
255
256 memset(init_packet, 0, sizeof(struct nvsp_message));
257
258 init_packet->hdr.msg_type = NVSP_MSG1_TYPE_SEND_RECV_BUF;
259 init_packet->msg.v1_msg.send_recv_buf.
260 gpadl_handle = net_device->recv_buf_gpadl_handle;
261 init_packet->msg.v1_msg.
262 send_recv_buf.id = NETVSC_RECEIVE_BUFFER_ID;
263
264 /* Send the gpadl notification request */
265 ret = vmbus_sendpacket(device->channel, init_packet,
266 sizeof(struct nvsp_message),
267 (unsigned long)init_packet,
268 VM_PKT_DATA_INBAND,
269 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
270 if (ret != 0) {
271 netdev_err(ndev,
272 "unable to send receive buffer's gpadl to netvsp\n");
273 goto cleanup;
274 }
275
276 t = wait_for_completion_timeout(&net_device->channel_init_wait, 5*HZ);
277 BUG_ON(t == 0);
278
279
280 /* Check the response */
281 if (init_packet->msg.v1_msg.
282 send_recv_buf_complete.status != NVSP_STAT_SUCCESS) {
283 netdev_err(ndev, "Unable to complete receive buffer "
284 "initialization with NetVsp - status %d\n",
285 init_packet->msg.v1_msg.
286 send_recv_buf_complete.status);
287 ret = -EINVAL;
288 goto cleanup;
289 }
290
291 /* Parse the response */
292
293 net_device->recv_section_cnt = init_packet->msg.
294 v1_msg.send_recv_buf_complete.num_sections;
295
296 net_device->recv_section = kmemdup(
297 init_packet->msg.v1_msg.send_recv_buf_complete.sections,
298 net_device->recv_section_cnt *
299 sizeof(struct nvsp_1_receive_buffer_section),
300 GFP_KERNEL);
301 if (net_device->recv_section == NULL) {
302 ret = -EINVAL;
303 goto cleanup;
304 }
305
306 /*
307 * For 1st release, there should only be 1 section that represents the
308 * entire receive buffer
309 */
310 if (net_device->recv_section_cnt != 1 ||
311 net_device->recv_section->offset != 0) {
312 ret = -EINVAL;
313 goto cleanup;
314 }
315
316 /* Now setup the send buffer.
317 */
318 net_device->send_buf = vzalloc(net_device->send_buf_size);
319 if (!net_device->send_buf) {
320 netdev_err(ndev, "unable to allocate send "
321 "buffer of size %d\n", net_device->send_buf_size);
322 ret = -ENOMEM;
323 goto cleanup;
324 }
325
326 /* Establish the gpadl handle for this buffer on this
327 * channel. Note: This call uses the vmbus connection rather
328 * than the channel to establish the gpadl handle.
329 */
330 ret = vmbus_establish_gpadl(device->channel, net_device->send_buf,
331 net_device->send_buf_size,
332 &net_device->send_buf_gpadl_handle);
333 if (ret != 0) {
334 netdev_err(ndev,
335 "unable to establish send buffer's gpadl\n");
336 goto cleanup;
337 }
338
339 /* Notify the NetVsp of the gpadl handle */
340 init_packet = &net_device->channel_init_pkt;
341 memset(init_packet, 0, sizeof(struct nvsp_message));
342 init_packet->hdr.msg_type = NVSP_MSG1_TYPE_SEND_SEND_BUF;
343 init_packet->msg.v1_msg.send_send_buf.gpadl_handle =
344 net_device->send_buf_gpadl_handle;
345 init_packet->msg.v1_msg.send_send_buf.id = NETVSC_SEND_BUFFER_ID;
346
347 /* Send the gpadl notification request */
348 ret = vmbus_sendpacket(device->channel, init_packet,
349 sizeof(struct nvsp_message),
350 (unsigned long)init_packet,
351 VM_PKT_DATA_INBAND,
352 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
353 if (ret != 0) {
354 netdev_err(ndev,
355 "unable to send send buffer's gpadl to netvsp\n");
356 goto cleanup;
357 }
358
359 t = wait_for_completion_timeout(&net_device->channel_init_wait, 5*HZ);
360 BUG_ON(t == 0);
361
362 /* Check the response */
363 if (init_packet->msg.v1_msg.
364 send_send_buf_complete.status != NVSP_STAT_SUCCESS) {
365 netdev_err(ndev, "Unable to complete send buffer "
366 "initialization with NetVsp - status %d\n",
367 init_packet->msg.v1_msg.
368 send_send_buf_complete.status);
369 ret = -EINVAL;
370 goto cleanup;
371 }
372
373 /* Parse the response */
374 net_device->send_section_size = init_packet->msg.
375 v1_msg.send_send_buf_complete.section_size;
376
377 /* Section count is simply the size divided by the section size.
378 */
379 net_device->send_section_cnt =
380 net_device->send_buf_size/net_device->send_section_size;
381
382 dev_info(&device->device, "Send section size: %d, Section count:%d\n",
383 net_device->send_section_size, net_device->send_section_cnt);
384
385 /* Setup state for managing the send buffer. */
386 net_device->map_words = DIV_ROUND_UP(net_device->send_section_cnt,
387 BITS_PER_LONG);
388
389 net_device->send_section_map =
390 kzalloc(net_device->map_words * sizeof(ulong), GFP_KERNEL);
391 if (net_device->send_section_map == NULL) {
392 ret = -ENOMEM;
393 goto cleanup;
394 }
395
396 goto exit;
397
398cleanup:
399 netvsc_destroy_buf(net_device);
400
401exit:
402 return ret;
403}
404
405
406/* Negotiate NVSP protocol version */
407static int negotiate_nvsp_ver(struct hv_device *device,
408 struct netvsc_device *net_device,
409 struct nvsp_message *init_packet,
410 u32 nvsp_ver)
411{
412 int ret;
413 unsigned long t;
414
415 memset(init_packet, 0, sizeof(struct nvsp_message));
416 init_packet->hdr.msg_type = NVSP_MSG_TYPE_INIT;
417 init_packet->msg.init_msg.init.min_protocol_ver = nvsp_ver;
418 init_packet->msg.init_msg.init.max_protocol_ver = nvsp_ver;
419
420 /* Send the init request */
421 ret = vmbus_sendpacket(device->channel, init_packet,
422 sizeof(struct nvsp_message),
423 (unsigned long)init_packet,
424 VM_PKT_DATA_INBAND,
425 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
426
427 if (ret != 0)
428 return ret;
429
430 t = wait_for_completion_timeout(&net_device->channel_init_wait, 5*HZ);
431
432 if (t == 0)
433 return -ETIMEDOUT;
434
435 if (init_packet->msg.init_msg.init_complete.status !=
436 NVSP_STAT_SUCCESS)
437 return -EINVAL;
438
439 if (nvsp_ver == NVSP_PROTOCOL_VERSION_1)
440 return 0;
441
442 /* NVSPv2 only: Send NDIS config */
443 memset(init_packet, 0, sizeof(struct nvsp_message));
444 init_packet->hdr.msg_type = NVSP_MSG2_TYPE_SEND_NDIS_CONFIG;
445 init_packet->msg.v2_msg.send_ndis_config.mtu = net_device->ndev->mtu +
446 ETH_HLEN;
447 init_packet->msg.v2_msg.send_ndis_config.capability.ieee8021q = 1;
448
449 ret = vmbus_sendpacket(device->channel, init_packet,
450 sizeof(struct nvsp_message),
451 (unsigned long)init_packet,
452 VM_PKT_DATA_INBAND, 0);
453
454 return ret;
455}
456
457static int netvsc_connect_vsp(struct hv_device *device)
458{
459 int ret;
460 struct netvsc_device *net_device;
461 struct nvsp_message *init_packet;
462 int ndis_version;
463 struct net_device *ndev;
464 u32 ver_list[] = { NVSP_PROTOCOL_VERSION_1, NVSP_PROTOCOL_VERSION_2,
465 NVSP_PROTOCOL_VERSION_4, NVSP_PROTOCOL_VERSION_5 };
466 int i, num_ver = 4; /* number of different NVSP versions */
467
468 net_device = get_outbound_net_device(device);
469 if (!net_device)
470 return -ENODEV;
471 ndev = net_device->ndev;
472
473 init_packet = &net_device->channel_init_pkt;
474
475 /* Negotiate the latest NVSP protocol supported */
476 for (i = num_ver - 1; i >= 0; i--)
477 if (negotiate_nvsp_ver(device, net_device, init_packet,
478 ver_list[i]) == 0) {
479 net_device->nvsp_version = ver_list[i];
480 break;
481 }
482
483 if (i < 0) {
484 ret = -EPROTO;
485 goto cleanup;
486 }
487
488 pr_debug("Negotiated NVSP version:%x\n", net_device->nvsp_version);
489
490 /* Send the ndis version */
491 memset(init_packet, 0, sizeof(struct nvsp_message));
492
493 if (net_device->nvsp_version <= NVSP_PROTOCOL_VERSION_4)
494 ndis_version = 0x00060001;
495 else
496 ndis_version = 0x0006001e;
497
498 init_packet->hdr.msg_type = NVSP_MSG1_TYPE_SEND_NDIS_VER;
499 init_packet->msg.v1_msg.
500 send_ndis_ver.ndis_major_ver =
501 (ndis_version & 0xFFFF0000) >> 16;
502 init_packet->msg.v1_msg.
503 send_ndis_ver.ndis_minor_ver =
504 ndis_version & 0xFFFF;
505
506 /* Send the init request */
507 ret = vmbus_sendpacket(device->channel, init_packet,
508 sizeof(struct nvsp_message),
509 (unsigned long)init_packet,
510 VM_PKT_DATA_INBAND, 0);
511 if (ret != 0)
512 goto cleanup;
513
514 /* Post the big receive buffer to NetVSP */
515 if (net_device->nvsp_version <= NVSP_PROTOCOL_VERSION_2)
516 net_device->recv_buf_size = NETVSC_RECEIVE_BUFFER_SIZE_LEGACY;
517 else
518 net_device->recv_buf_size = NETVSC_RECEIVE_BUFFER_SIZE;
519 net_device->send_buf_size = NETVSC_SEND_BUFFER_SIZE;
520
521 ret = netvsc_init_buf(device);
522
523cleanup:
524 return ret;
525}
526
527static void netvsc_disconnect_vsp(struct netvsc_device *net_device)
528{
529 netvsc_destroy_buf(net_device);
530}
531
532/*
533 * netvsc_device_remove - Callback when the root bus device is removed
534 */
535int netvsc_device_remove(struct hv_device *device)
536{
537 struct netvsc_device *net_device;
538 unsigned long flags;
539
540 net_device = hv_get_drvdata(device);
541
542 netvsc_disconnect_vsp(net_device);
543
544 /*
545 * Since we have already drained, we don't need to busy wait
546 * as was done in final_release_stor_device()
547 * Note that we cannot set the ext pointer to NULL until
548 * we have drained - to drain the outgoing packets, we need to
549 * allow incoming packets.
550 */
551
552 spin_lock_irqsave(&device->channel->inbound_lock, flags);
553 hv_set_drvdata(device, NULL);
554 spin_unlock_irqrestore(&device->channel->inbound_lock, flags);
555
556 /*
557 * At this point, no one should be accessing net_device
558 * except in here
559 */
560 dev_notice(&device->device, "net device safe to remove\n");
561
562 /* Now, we can close the channel safely */
563 vmbus_close(device->channel);
564
565 /* Release all resources */
566 vfree(net_device->sub_cb_buf);
567 free_netvsc_device(net_device);
568 return 0;
569}
570
571
572#define RING_AVAIL_PERCENT_HIWATER 20
573#define RING_AVAIL_PERCENT_LOWATER 10
574
575/*
576 * Get the percentage of available bytes to write in the ring.
577 * The return value is in range from 0 to 100.
578 */
579static inline u32 hv_ringbuf_avail_percent(
580 struct hv_ring_buffer_info *ring_info)
581{
582 u32 avail_read, avail_write;
583
584 hv_get_ringbuffer_availbytes(ring_info, &avail_read, &avail_write);
585
586 return avail_write * 100 / ring_info->ring_datasize;
587}
588
589static inline void netvsc_free_send_slot(struct netvsc_device *net_device,
590 u32 index)
591{
592 sync_change_bit(index, net_device->send_section_map);
593}
594
595static void netvsc_send_completion(struct netvsc_device *net_device,
596 struct hv_device *device,
597 struct vmpacket_descriptor *packet)
598{
599 struct nvsp_message *nvsp_packet;
600 struct hv_netvsc_packet *nvsc_packet;
601 struct net_device *ndev;
602 u32 send_index;
603
604 ndev = net_device->ndev;
605
606 nvsp_packet = (struct nvsp_message *)((unsigned long)packet +
607 (packet->offset8 << 3));
608
609 if ((nvsp_packet->hdr.msg_type == NVSP_MSG_TYPE_INIT_COMPLETE) ||
610 (nvsp_packet->hdr.msg_type ==
611 NVSP_MSG1_TYPE_SEND_RECV_BUF_COMPLETE) ||
612 (nvsp_packet->hdr.msg_type ==
613 NVSP_MSG1_TYPE_SEND_SEND_BUF_COMPLETE) ||
614 (nvsp_packet->hdr.msg_type ==
615 NVSP_MSG5_TYPE_SUBCHANNEL)) {
616 /* Copy the response back */
617 memcpy(&net_device->channel_init_pkt, nvsp_packet,
618 sizeof(struct nvsp_message));
619 complete(&net_device->channel_init_wait);
620 } else if (nvsp_packet->hdr.msg_type ==
621 NVSP_MSG1_TYPE_SEND_RNDIS_PKT_COMPLETE) {
622 int num_outstanding_sends;
623 u16 q_idx = 0;
624 struct vmbus_channel *channel = device->channel;
625 int queue_sends;
626
627 /* Get the send context */
628 nvsc_packet = (struct hv_netvsc_packet *)(unsigned long)
629 packet->trans_id;
630
631 /* Notify the layer above us */
632 if (nvsc_packet) {
633 send_index = nvsc_packet->send_buf_index;
634 if (send_index != NETVSC_INVALID_INDEX)
635 netvsc_free_send_slot(net_device, send_index);
636 q_idx = nvsc_packet->q_idx;
637 channel = nvsc_packet->channel;
638 nvsc_packet->send_completion(nvsc_packet->
639 send_completion_ctx);
640 }
641
642 num_outstanding_sends =
643 atomic_dec_return(&net_device->num_outstanding_sends);
644 queue_sends = atomic_dec_return(&net_device->
645 queue_sends[q_idx]);
646
647 if (net_device->destroy && num_outstanding_sends == 0)
648 wake_up(&net_device->wait_drain);
649
650 if (netif_tx_queue_stopped(netdev_get_tx_queue(ndev, q_idx)) &&
651 !net_device->start_remove &&
652 (hv_ringbuf_avail_percent(&channel->outbound) >
653 RING_AVAIL_PERCENT_HIWATER || queue_sends < 1))
654 netif_tx_wake_queue(netdev_get_tx_queue(
655 ndev, q_idx));
656 } else {
657 netdev_err(ndev, "Unknown send completion packet type- "
658 "%d received!!\n", nvsp_packet->hdr.msg_type);
659 }
660
661}
662
663static u32 netvsc_get_next_send_section(struct netvsc_device *net_device)
664{
665 unsigned long index;
666 u32 max_words = net_device->map_words;
667 unsigned long *map_addr = (unsigned long *)net_device->send_section_map;
668 u32 section_cnt = net_device->send_section_cnt;
669 int ret_val = NETVSC_INVALID_INDEX;
670 int i;
671 int prev_val;
672
673 for (i = 0; i < max_words; i++) {
674 if (!~(map_addr[i]))
675 continue;
676 index = ffz(map_addr[i]);
677 prev_val = sync_test_and_set_bit(index, &map_addr[i]);
678 if (prev_val)
679 continue;
680 if ((index + (i * BITS_PER_LONG)) >= section_cnt)
681 break;
682 ret_val = (index + (i * BITS_PER_LONG));
683 break;
684 }
685 return ret_val;
686}
687
688static u32 netvsc_copy_to_send_buf(struct netvsc_device *net_device,
689 unsigned int section_index,
690 struct hv_netvsc_packet *packet)
691{
692 char *start = net_device->send_buf;
693 char *dest = (start + (section_index * net_device->send_section_size));
694 int i;
695 u32 msg_size = 0;
696
697 for (i = 0; i < packet->page_buf_cnt; i++) {
698 char *src = phys_to_virt(packet->page_buf[i].pfn << PAGE_SHIFT);
699 u32 offset = packet->page_buf[i].offset;
700 u32 len = packet->page_buf[i].len;
701
702 memcpy(dest, (src + offset), len);
703 msg_size += len;
704 dest += len;
705 }
706 return msg_size;
707}
708
709int netvsc_send(struct hv_device *device,
710 struct hv_netvsc_packet *packet)
711{
712 struct netvsc_device *net_device;
713 int ret = 0;
714 struct nvsp_message sendMessage;
715 struct net_device *ndev;
716 struct vmbus_channel *out_channel = NULL;
717 u64 req_id;
718 unsigned int section_index = NETVSC_INVALID_INDEX;
719 u32 msg_size = 0;
720 struct sk_buff *skb = NULL;
721 u16 q_idx = packet->q_idx;
722
723
724 net_device = get_outbound_net_device(device);
725 if (!net_device)
726 return -ENODEV;
727 ndev = net_device->ndev;
728
729 sendMessage.hdr.msg_type = NVSP_MSG1_TYPE_SEND_RNDIS_PKT;
730 if (packet->is_data_pkt) {
731 /* 0 is RMC_DATA; */
732 sendMessage.msg.v1_msg.send_rndis_pkt.channel_type = 0;
733 } else {
734 /* 1 is RMC_CONTROL; */
735 sendMessage.msg.v1_msg.send_rndis_pkt.channel_type = 1;
736 }
737
738 /* Attempt to send via sendbuf */
739 if (packet->total_data_buflen < net_device->send_section_size) {
740 section_index = netvsc_get_next_send_section(net_device);
741 if (section_index != NETVSC_INVALID_INDEX) {
742 msg_size = netvsc_copy_to_send_buf(net_device,
743 section_index,
744 packet);
745 skb = (struct sk_buff *)
746 (unsigned long)packet->send_completion_tid;
747 packet->page_buf_cnt = 0;
748 }
749 }
750 packet->send_buf_index = section_index;
751
752
753 sendMessage.msg.v1_msg.send_rndis_pkt.send_buf_section_index =
754 section_index;
755 sendMessage.msg.v1_msg.send_rndis_pkt.send_buf_section_size = msg_size;
756
757 if (packet->send_completion)
758 req_id = (ulong)packet;
759 else
760 req_id = 0;
761
762 out_channel = net_device->chn_table[packet->q_idx];
763 if (out_channel == NULL)
764 out_channel = device->channel;
765 packet->channel = out_channel;
766
767 if (out_channel->rescind)
768 return -ENODEV;
769
770 if (packet->page_buf_cnt) {
771 ret = vmbus_sendpacket_pagebuffer(out_channel,
772 packet->page_buf,
773 packet->page_buf_cnt,
774 &sendMessage,
775 sizeof(struct nvsp_message),
776 req_id);
777 } else {
778 ret = vmbus_sendpacket(out_channel, &sendMessage,
779 sizeof(struct nvsp_message),
780 req_id,
781 VM_PKT_DATA_INBAND,
782 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
783 }
784
785 if (ret == 0) {
786 atomic_inc(&net_device->num_outstanding_sends);
787 atomic_inc(&net_device->queue_sends[q_idx]);
788
789 if (hv_ringbuf_avail_percent(&out_channel->outbound) <
790 RING_AVAIL_PERCENT_LOWATER) {
791 netif_tx_stop_queue(netdev_get_tx_queue(
792 ndev, q_idx));
793
794 if (atomic_read(&net_device->
795 queue_sends[q_idx]) < 1)
796 netif_tx_wake_queue(netdev_get_tx_queue(
797 ndev, q_idx));
798 }
799 } else if (ret == -EAGAIN) {
800 netif_tx_stop_queue(netdev_get_tx_queue(
801 ndev, q_idx));
802 if (atomic_read(&net_device->queue_sends[q_idx]) < 1) {
803 netif_tx_wake_queue(netdev_get_tx_queue(
804 ndev, q_idx));
805 ret = -ENOSPC;
806 }
807 } else {
808 netdev_err(ndev, "Unable to send packet %p ret %d\n",
809 packet, ret);
810 }
811
812 if (ret != 0) {
813 if (section_index != NETVSC_INVALID_INDEX)
814 netvsc_free_send_slot(net_device, section_index);
815 } else if (skb) {
816 dev_kfree_skb_any(skb);
817 }
818
819 return ret;
820}
821
822static void netvsc_send_recv_completion(struct hv_device *device,
823 struct vmbus_channel *channel,
824 struct netvsc_device *net_device,
825 u64 transaction_id, u32 status)
826{
827 struct nvsp_message recvcompMessage;
828 int retries = 0;
829 int ret;
830 struct net_device *ndev;
831
832 ndev = net_device->ndev;
833
834 recvcompMessage.hdr.msg_type =
835 NVSP_MSG1_TYPE_SEND_RNDIS_PKT_COMPLETE;
836
837 recvcompMessage.msg.v1_msg.send_rndis_pkt_complete.status = status;
838
839retry_send_cmplt:
840 /* Send the completion */
841 ret = vmbus_sendpacket(channel, &recvcompMessage,
842 sizeof(struct nvsp_message), transaction_id,
843 VM_PKT_COMP, 0);
844 if (ret == 0) {
845 /* success */
846 /* no-op */
847 } else if (ret == -EAGAIN) {
848 /* no more room...wait a bit and attempt to retry 3 times */
849 retries++;
850 netdev_err(ndev, "unable to send receive completion pkt"
851 " (tid %llx)...retrying %d\n", transaction_id, retries);
852
853 if (retries < 4) {
854 udelay(100);
855 goto retry_send_cmplt;
856 } else {
857 netdev_err(ndev, "unable to send receive "
858 "completion pkt (tid %llx)...give up retrying\n",
859 transaction_id);
860 }
861 } else {
862 netdev_err(ndev, "unable to send receive "
863 "completion pkt - %llx\n", transaction_id);
864 }
865}
866
867static void netvsc_receive(struct netvsc_device *net_device,
868 struct vmbus_channel *channel,
869 struct hv_device *device,
870 struct vmpacket_descriptor *packet)
871{
872 struct vmtransfer_page_packet_header *vmxferpage_packet;
873 struct nvsp_message *nvsp_packet;
874 struct hv_netvsc_packet nv_pkt;
875 struct hv_netvsc_packet *netvsc_packet = &nv_pkt;
876 u32 status = NVSP_STAT_SUCCESS;
877 int i;
878 int count = 0;
879 struct net_device *ndev;
880
881 ndev = net_device->ndev;
882
883 /*
884 * All inbound packets other than send completion should be xfer page
885 * packet
886 */
887 if (packet->type != VM_PKT_DATA_USING_XFER_PAGES) {
888 netdev_err(ndev, "Unknown packet type received - %d\n",
889 packet->type);
890 return;
891 }
892
893 nvsp_packet = (struct nvsp_message *)((unsigned long)packet +
894 (packet->offset8 << 3));
895
896 /* Make sure this is a valid nvsp packet */
897 if (nvsp_packet->hdr.msg_type !=
898 NVSP_MSG1_TYPE_SEND_RNDIS_PKT) {
899 netdev_err(ndev, "Unknown nvsp packet type received-"
900 " %d\n", nvsp_packet->hdr.msg_type);
901 return;
902 }
903
904 vmxferpage_packet = (struct vmtransfer_page_packet_header *)packet;
905
906 if (vmxferpage_packet->xfer_pageset_id != NETVSC_RECEIVE_BUFFER_ID) {
907 netdev_err(ndev, "Invalid xfer page set id - "
908 "expecting %x got %x\n", NETVSC_RECEIVE_BUFFER_ID,
909 vmxferpage_packet->xfer_pageset_id);
910 return;
911 }
912
913 count = vmxferpage_packet->range_cnt;
914 netvsc_packet->device = device;
915 netvsc_packet->channel = channel;
916
917 /* Each range represents 1 RNDIS pkt that contains 1 ethernet frame */
918 for (i = 0; i < count; i++) {
919 /* Initialize the netvsc packet */
920 netvsc_packet->status = NVSP_STAT_SUCCESS;
921 netvsc_packet->data = (void *)((unsigned long)net_device->
922 recv_buf + vmxferpage_packet->ranges[i].byte_offset);
923 netvsc_packet->total_data_buflen =
924 vmxferpage_packet->ranges[i].byte_count;
925
926 /* Pass it to the upper layer */
927 rndis_filter_receive(device, netvsc_packet);
928
929 if (netvsc_packet->status != NVSP_STAT_SUCCESS)
930 status = NVSP_STAT_FAIL;
931 }
932
933 netvsc_send_recv_completion(device, channel, net_device,
934 vmxferpage_packet->d.trans_id, status);
935}
936
937
938static void netvsc_send_table(struct hv_device *hdev,
939 struct vmpacket_descriptor *vmpkt)
940{
941 struct netvsc_device *nvscdev;
942 struct net_device *ndev;
943 struct nvsp_message *nvmsg;
944 int i;
945 u32 count, *tab;
946
947 nvscdev = get_outbound_net_device(hdev);
948 if (!nvscdev)
949 return;
950 ndev = nvscdev->ndev;
951
952 nvmsg = (struct nvsp_message *)((unsigned long)vmpkt +
953 (vmpkt->offset8 << 3));
954
955 if (nvmsg->hdr.msg_type != NVSP_MSG5_TYPE_SEND_INDIRECTION_TABLE)
956 return;
957
958 count = nvmsg->msg.v5_msg.send_table.count;
959 if (count != VRSS_SEND_TAB_SIZE) {
960 netdev_err(ndev, "Received wrong send-table size:%u\n", count);
961 return;
962 }
963
964 tab = (u32 *)((unsigned long)&nvmsg->msg.v5_msg.send_table +
965 nvmsg->msg.v5_msg.send_table.offset);
966
967 for (i = 0; i < count; i++)
968 nvscdev->send_table[i] = tab[i];
969}
970
971void netvsc_channel_cb(void *context)
972{
973 int ret;
974 struct vmbus_channel *channel = (struct vmbus_channel *)context;
975 struct hv_device *device;
976 struct netvsc_device *net_device;
977 u32 bytes_recvd;
978 u64 request_id;
979 struct vmpacket_descriptor *desc;
980 unsigned char *buffer;
981 int bufferlen = NETVSC_PACKET_SIZE;
982 struct net_device *ndev;
983
984 if (channel->primary_channel != NULL)
985 device = channel->primary_channel->device_obj;
986 else
987 device = channel->device_obj;
988
989 net_device = get_inbound_net_device(device);
990 if (!net_device)
991 return;
992 ndev = net_device->ndev;
993 buffer = get_per_channel_state(channel);
994
995 do {
996 ret = vmbus_recvpacket_raw(channel, buffer, bufferlen,
997 &bytes_recvd, &request_id);
998 if (ret == 0) {
999 if (bytes_recvd > 0) {
1000 desc = (struct vmpacket_descriptor *)buffer;
1001 switch (desc->type) {
1002 case VM_PKT_COMP:
1003 netvsc_send_completion(net_device,
1004 device, desc);
1005 break;
1006
1007 case VM_PKT_DATA_USING_XFER_PAGES:
1008 netvsc_receive(net_device, channel,
1009 device, desc);
1010 break;
1011
1012 case VM_PKT_DATA_INBAND:
1013 netvsc_send_table(device, desc);
1014 break;
1015
1016 default:
1017 netdev_err(ndev,
1018 "unhandled packet type %d, "
1019 "tid %llx len %d\n",
1020 desc->type, request_id,
1021 bytes_recvd);
1022 break;
1023 }
1024
1025 } else {
1026 /*
1027 * We are done for this pass.
1028 */
1029 break;
1030 }
1031
1032 } else if (ret == -ENOBUFS) {
1033 if (bufferlen > NETVSC_PACKET_SIZE)
1034 kfree(buffer);
1035 /* Handle large packet */
1036 buffer = kmalloc(bytes_recvd, GFP_ATOMIC);
1037 if (buffer == NULL) {
1038 /* Try again next time around */
1039 netdev_err(ndev,
1040 "unable to allocate buffer of size "
1041 "(%d)!!\n", bytes_recvd);
1042 break;
1043 }
1044
1045 bufferlen = bytes_recvd;
1046 }
1047 } while (1);
1048
1049 if (bufferlen > NETVSC_PACKET_SIZE)
1050 kfree(buffer);
1051 return;
1052}
1053
1054/*
1055 * netvsc_device_add - Callback when the device belonging to this
1056 * driver is added
1057 */
1058int netvsc_device_add(struct hv_device *device, void *additional_info)
1059{
1060 int ret = 0;
1061 int ring_size =
1062 ((struct netvsc_device_info *)additional_info)->ring_size;
1063 struct netvsc_device *net_device;
1064 struct net_device *ndev;
1065
1066 net_device = alloc_net_device(device);
1067 if (!net_device)
1068 return -ENOMEM;
1069
1070 net_device->ring_size = ring_size;
1071
1072 /*
1073 * Coming into this function, struct net_device * is
1074 * registered as the driver private data.
1075 * In alloc_net_device(), we register struct netvsc_device *
1076 * as the driver private data and stash away struct net_device *
1077 * in struct netvsc_device *.
1078 */
1079 ndev = net_device->ndev;
1080
1081 /* Initialize the NetVSC channel extension */
1082 init_completion(&net_device->channel_init_wait);
1083
1084 set_per_channel_state(device->channel, net_device->cb_buffer);
1085
1086 /* Open the channel */
1087 ret = vmbus_open(device->channel, ring_size * PAGE_SIZE,
1088 ring_size * PAGE_SIZE, NULL, 0,
1089 netvsc_channel_cb, device->channel);
1090
1091 if (ret != 0) {
1092 netdev_err(ndev, "unable to open channel: %d\n", ret);
1093 goto cleanup;
1094 }
1095
1096 /* Channel is opened */
1097 pr_info("hv_netvsc channel opened successfully\n");
1098
1099 net_device->chn_table[0] = device->channel;
1100
1101 /* Connect with the NetVsp */
1102 ret = netvsc_connect_vsp(device);
1103 if (ret != 0) {
1104 netdev_err(ndev,
1105 "unable to connect to NetVSP - %d\n", ret);
1106 goto close;
1107 }
1108
1109 return ret;
1110
1111close:
1112 /* Now, we can close the channel safely */
1113 vmbus_close(device->channel);
1114
1115cleanup:
1116 free_netvsc_device(net_device);
1117
1118 return ret;
1119}