1 // SPDX-License-Identifier: GPL-2.0-only 2 /* 3 * Copyright (c) 2009, Microsoft Corporation. 4 * 5 * Authors: 6 * Haiyang Zhang <haiyangz@microsoft.com> 7 * Hank Janssen <hjanssen@microsoft.com> 8 */ 9 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt 10 11 #include <linux/kernel.h> 12 #include <linux/sched.h> 13 #include <linux/wait.h> 14 #include <linux/mm.h> 15 #include <linux/delay.h> 16 #include <linux/io.h> 17 #include <linux/slab.h> 18 #include <linux/netdevice.h> 19 #include <linux/if_ether.h> 20 #include <linux/vmalloc.h> 21 #include <linux/rtnetlink.h> 22 #include <linux/prefetch.h> 23 24 #include <asm/sync_bitops.h> 25 26 #include "hyperv_net.h" 27 #include "netvsc_trace.h" 28 29 /* 30 * Switch the data path from the synthetic interface to the VF 31 * interface. 32 */ 33 void netvsc_switch_datapath(struct net_device *ndev, bool vf) 34 { 35 struct net_device_context *net_device_ctx = netdev_priv(ndev); 36 struct hv_device *dev = net_device_ctx->device_ctx; 37 struct netvsc_device *nv_dev = rtnl_dereference(net_device_ctx->nvdev); 38 struct nvsp_message *init_pkt = &nv_dev->channel_init_pkt; 39 40 memset(init_pkt, 0, sizeof(struct nvsp_message)); 41 init_pkt->hdr.msg_type = NVSP_MSG4_TYPE_SWITCH_DATA_PATH; 42 if (vf) 43 init_pkt->msg.v4_msg.active_dp.active_datapath = 44 NVSP_DATAPATH_VF; 45 else 46 init_pkt->msg.v4_msg.active_dp.active_datapath = 47 NVSP_DATAPATH_SYNTHETIC; 48 49 trace_nvsp_send(ndev, init_pkt); 50 51 vmbus_sendpacket(dev->channel, init_pkt, 52 sizeof(struct nvsp_message), 53 VMBUS_RQST_ID_NO_RESPONSE, 54 VM_PKT_DATA_INBAND, 0); 55 } 56 57 /* Worker to setup sub channels on initial setup 58 * Initial hotplug event occurs in softirq context 59 * and can't wait for channels. 60 */ 61 static void netvsc_subchan_work(struct work_struct *w) 62 { 63 struct netvsc_device *nvdev = 64 container_of(w, struct netvsc_device, subchan_work); 65 struct rndis_device *rdev; 66 int i, ret; 67 68 /* Avoid deadlock with device removal already under RTNL */ 69 if (!rtnl_trylock()) { 70 schedule_work(w); 71 return; 72 } 73 74 rdev = nvdev->extension; 75 if (rdev) { 76 ret = rndis_set_subchannel(rdev->ndev, nvdev, NULL); 77 if (ret == 0) { 78 netif_device_attach(rdev->ndev); 79 } else { 80 /* fallback to only primary channel */ 81 for (i = 1; i < nvdev->num_chn; i++) 82 netif_napi_del(&nvdev->chan_table[i].napi); 83 84 nvdev->max_chn = 1; 85 nvdev->num_chn = 1; 86 } 87 } 88 89 rtnl_unlock(); 90 } 91 92 static struct netvsc_device *alloc_net_device(void) 93 { 94 struct netvsc_device *net_device; 95 96 net_device = kzalloc(sizeof(struct netvsc_device), GFP_KERNEL); 97 if (!net_device) 98 return NULL; 99 100 init_waitqueue_head(&net_device->wait_drain); 101 net_device->destroy = false; 102 net_device->tx_disable = true; 103 104 net_device->max_pkt = RNDIS_MAX_PKT_DEFAULT; 105 net_device->pkt_align = RNDIS_PKT_ALIGN_DEFAULT; 106 107 init_completion(&net_device->channel_init_wait); 108 init_waitqueue_head(&net_device->subchan_open); 109 INIT_WORK(&net_device->subchan_work, netvsc_subchan_work); 110 111 return net_device; 112 } 113 114 static void free_netvsc_device(struct rcu_head *head) 115 { 116 struct netvsc_device *nvdev 117 = container_of(head, struct netvsc_device, rcu); 118 int i; 119 120 kfree(nvdev->extension); 121 vfree(nvdev->recv_buf); 122 vfree(nvdev->send_buf); 123 kfree(nvdev->send_section_map); 124 125 for (i = 0; i < VRSS_CHANNEL_MAX; i++) { 126 xdp_rxq_info_unreg(&nvdev->chan_table[i].xdp_rxq); 127 vfree(nvdev->chan_table[i].mrc.slots); 128 } 129 130 kfree(nvdev); 131 } 132 133 static void free_netvsc_device_rcu(struct netvsc_device *nvdev) 134 { 135 call_rcu(&nvdev->rcu, free_netvsc_device); 136 } 137 138 static void netvsc_revoke_recv_buf(struct hv_device *device, 139 struct netvsc_device *net_device, 140 struct net_device *ndev) 141 { 142 struct nvsp_message *revoke_packet; 143 int ret; 144 145 /* 146 * If we got a section count, it means we received a 147 * SendReceiveBufferComplete msg (ie sent 148 * NvspMessage1TypeSendReceiveBuffer msg) therefore, we need 149 * to send a revoke msg here 150 */ 151 if (net_device->recv_section_cnt) { 152 /* Send the revoke receive buffer */ 153 revoke_packet = &net_device->revoke_packet; 154 memset(revoke_packet, 0, sizeof(struct nvsp_message)); 155 156 revoke_packet->hdr.msg_type = 157 NVSP_MSG1_TYPE_REVOKE_RECV_BUF; 158 revoke_packet->msg.v1_msg. 159 revoke_recv_buf.id = NETVSC_RECEIVE_BUFFER_ID; 160 161 trace_nvsp_send(ndev, revoke_packet); 162 163 ret = vmbus_sendpacket(device->channel, 164 revoke_packet, 165 sizeof(struct nvsp_message), 166 VMBUS_RQST_ID_NO_RESPONSE, 167 VM_PKT_DATA_INBAND, 0); 168 /* If the failure is because the channel is rescinded; 169 * ignore the failure since we cannot send on a rescinded 170 * channel. This would allow us to properly cleanup 171 * even when the channel is rescinded. 172 */ 173 if (device->channel->rescind) 174 ret = 0; 175 /* 176 * If we failed here, we might as well return and 177 * have a leak rather than continue and a bugchk 178 */ 179 if (ret != 0) { 180 netdev_err(ndev, "unable to send " 181 "revoke receive buffer to netvsp\n"); 182 return; 183 } 184 net_device->recv_section_cnt = 0; 185 } 186 } 187 188 static void netvsc_revoke_send_buf(struct hv_device *device, 189 struct netvsc_device *net_device, 190 struct net_device *ndev) 191 { 192 struct nvsp_message *revoke_packet; 193 int ret; 194 195 /* Deal with the send buffer we may have setup. 196 * If we got a send section size, it means we received a 197 * NVSP_MSG1_TYPE_SEND_SEND_BUF_COMPLETE msg (ie sent 198 * NVSP_MSG1_TYPE_SEND_SEND_BUF msg) therefore, we need 199 * to send a revoke msg here 200 */ 201 if (net_device->send_section_cnt) { 202 /* Send the revoke receive buffer */ 203 revoke_packet = &net_device->revoke_packet; 204 memset(revoke_packet, 0, sizeof(struct nvsp_message)); 205 206 revoke_packet->hdr.msg_type = 207 NVSP_MSG1_TYPE_REVOKE_SEND_BUF; 208 revoke_packet->msg.v1_msg.revoke_send_buf.id = 209 NETVSC_SEND_BUFFER_ID; 210 211 trace_nvsp_send(ndev, revoke_packet); 212 213 ret = vmbus_sendpacket(device->channel, 214 revoke_packet, 215 sizeof(struct nvsp_message), 216 VMBUS_RQST_ID_NO_RESPONSE, 217 VM_PKT_DATA_INBAND, 0); 218 219 /* If the failure is because the channel is rescinded; 220 * ignore the failure since we cannot send on a rescinded 221 * channel. This would allow us to properly cleanup 222 * even when the channel is rescinded. 223 */ 224 if (device->channel->rescind) 225 ret = 0; 226 227 /* If we failed here, we might as well return and 228 * have a leak rather than continue and a bugchk 229 */ 230 if (ret != 0) { 231 netdev_err(ndev, "unable to send " 232 "revoke send buffer to netvsp\n"); 233 return; 234 } 235 net_device->send_section_cnt = 0; 236 } 237 } 238 239 static void netvsc_teardown_recv_gpadl(struct hv_device *device, 240 struct netvsc_device *net_device, 241 struct net_device *ndev) 242 { 243 int ret; 244 245 if (net_device->recv_buf_gpadl_handle) { 246 ret = vmbus_teardown_gpadl(device->channel, 247 net_device->recv_buf_gpadl_handle); 248 249 /* If we failed here, we might as well return and have a leak 250 * rather than continue and a bugchk 251 */ 252 if (ret != 0) { 253 netdev_err(ndev, 254 "unable to teardown receive buffer's gpadl\n"); 255 return; 256 } 257 net_device->recv_buf_gpadl_handle = 0; 258 } 259 } 260 261 static void netvsc_teardown_send_gpadl(struct hv_device *device, 262 struct netvsc_device *net_device, 263 struct net_device *ndev) 264 { 265 int ret; 266 267 if (net_device->send_buf_gpadl_handle) { 268 ret = vmbus_teardown_gpadl(device->channel, 269 net_device->send_buf_gpadl_handle); 270 271 /* If we failed here, we might as well return and have a leak 272 * rather than continue and a bugchk 273 */ 274 if (ret != 0) { 275 netdev_err(ndev, 276 "unable to teardown send buffer's gpadl\n"); 277 return; 278 } 279 net_device->send_buf_gpadl_handle = 0; 280 } 281 } 282 283 int netvsc_alloc_recv_comp_ring(struct netvsc_device *net_device, u32 q_idx) 284 { 285 struct netvsc_channel *nvchan = &net_device->chan_table[q_idx]; 286 int node = cpu_to_node(nvchan->channel->target_cpu); 287 size_t size; 288 289 size = net_device->recv_completion_cnt * sizeof(struct recv_comp_data); 290 nvchan->mrc.slots = vzalloc_node(size, node); 291 if (!nvchan->mrc.slots) 292 nvchan->mrc.slots = vzalloc(size); 293 294 return nvchan->mrc.slots ? 0 : -ENOMEM; 295 } 296 297 static int netvsc_init_buf(struct hv_device *device, 298 struct netvsc_device *net_device, 299 const struct netvsc_device_info *device_info) 300 { 301 struct nvsp_1_message_send_receive_buffer_complete *resp; 302 struct net_device *ndev = hv_get_drvdata(device); 303 struct nvsp_message *init_packet; 304 unsigned int buf_size; 305 size_t map_words; 306 int ret = 0; 307 308 /* Get receive buffer area. */ 309 buf_size = device_info->recv_sections * device_info->recv_section_size; 310 buf_size = roundup(buf_size, PAGE_SIZE); 311 312 /* Legacy hosts only allow smaller receive buffer */ 313 if (net_device->nvsp_version <= NVSP_PROTOCOL_VERSION_2) 314 buf_size = min_t(unsigned int, buf_size, 315 NETVSC_RECEIVE_BUFFER_SIZE_LEGACY); 316 317 net_device->recv_buf = vzalloc(buf_size); 318 if (!net_device->recv_buf) { 319 netdev_err(ndev, 320 "unable to allocate receive buffer of size %u\n", 321 buf_size); 322 ret = -ENOMEM; 323 goto cleanup; 324 } 325 326 net_device->recv_buf_size = buf_size; 327 328 /* 329 * Establish the gpadl handle for this buffer on this 330 * channel. Note: This call uses the vmbus connection rather 331 * than the channel to establish the gpadl handle. 332 */ 333 ret = vmbus_establish_gpadl(device->channel, net_device->recv_buf, 334 buf_size, 335 &net_device->recv_buf_gpadl_handle); 336 if (ret != 0) { 337 netdev_err(ndev, 338 "unable to establish receive buffer's gpadl\n"); 339 goto cleanup; 340 } 341 342 /* Notify the NetVsp of the gpadl handle */ 343 init_packet = &net_device->channel_init_pkt; 344 memset(init_packet, 0, sizeof(struct nvsp_message)); 345 init_packet->hdr.msg_type = NVSP_MSG1_TYPE_SEND_RECV_BUF; 346 init_packet->msg.v1_msg.send_recv_buf. 347 gpadl_handle = net_device->recv_buf_gpadl_handle; 348 init_packet->msg.v1_msg. 349 send_recv_buf.id = NETVSC_RECEIVE_BUFFER_ID; 350 351 trace_nvsp_send(ndev, init_packet); 352 353 /* Send the gpadl notification request */ 354 ret = vmbus_sendpacket(device->channel, init_packet, 355 sizeof(struct nvsp_message), 356 (unsigned long)init_packet, 357 VM_PKT_DATA_INBAND, 358 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED); 359 if (ret != 0) { 360 netdev_err(ndev, 361 "unable to send receive buffer's gpadl to netvsp\n"); 362 goto cleanup; 363 } 364 365 wait_for_completion(&net_device->channel_init_wait); 366 367 /* Check the response */ 368 resp = &init_packet->msg.v1_msg.send_recv_buf_complete; 369 if (resp->status != NVSP_STAT_SUCCESS) { 370 netdev_err(ndev, 371 "Unable to complete receive buffer initialization with NetVsp - status %d\n", 372 resp->status); 373 ret = -EINVAL; 374 goto cleanup; 375 } 376 377 /* Parse the response */ 378 netdev_dbg(ndev, "Receive sections: %u sub_allocs: size %u count: %u\n", 379 resp->num_sections, resp->sections[0].sub_alloc_size, 380 resp->sections[0].num_sub_allocs); 381 382 /* There should only be one section for the entire receive buffer */ 383 if (resp->num_sections != 1 || resp->sections[0].offset != 0) { 384 ret = -EINVAL; 385 goto cleanup; 386 } 387 388 net_device->recv_section_size = resp->sections[0].sub_alloc_size; 389 net_device->recv_section_cnt = resp->sections[0].num_sub_allocs; 390 391 /* Ensure buffer will not overflow */ 392 if (net_device->recv_section_size < NETVSC_MTU_MIN || (u64)net_device->recv_section_size * 393 (u64)net_device->recv_section_cnt > (u64)buf_size) { 394 netdev_err(ndev, "invalid recv_section_size %u\n", 395 net_device->recv_section_size); 396 ret = -EINVAL; 397 goto cleanup; 398 } 399 400 /* Setup receive completion ring. 401 * Add 1 to the recv_section_cnt because at least one entry in a 402 * ring buffer has to be empty. 403 */ 404 net_device->recv_completion_cnt = net_device->recv_section_cnt + 1; 405 ret = netvsc_alloc_recv_comp_ring(net_device, 0); 406 if (ret) 407 goto cleanup; 408 409 /* Now setup the send buffer. */ 410 buf_size = device_info->send_sections * device_info->send_section_size; 411 buf_size = round_up(buf_size, PAGE_SIZE); 412 413 net_device->send_buf = vzalloc(buf_size); 414 if (!net_device->send_buf) { 415 netdev_err(ndev, "unable to allocate send buffer of size %u\n", 416 buf_size); 417 ret = -ENOMEM; 418 goto cleanup; 419 } 420 421 /* Establish the gpadl handle for this buffer on this 422 * channel. Note: This call uses the vmbus connection rather 423 * than the channel to establish the gpadl handle. 424 */ 425 ret = vmbus_establish_gpadl(device->channel, net_device->send_buf, 426 buf_size, 427 &net_device->send_buf_gpadl_handle); 428 if (ret != 0) { 429 netdev_err(ndev, 430 "unable to establish send buffer's gpadl\n"); 431 goto cleanup; 432 } 433 434 /* Notify the NetVsp of the gpadl handle */ 435 init_packet = &net_device->channel_init_pkt; 436 memset(init_packet, 0, sizeof(struct nvsp_message)); 437 init_packet->hdr.msg_type = NVSP_MSG1_TYPE_SEND_SEND_BUF; 438 init_packet->msg.v1_msg.send_send_buf.gpadl_handle = 439 net_device->send_buf_gpadl_handle; 440 init_packet->msg.v1_msg.send_send_buf.id = NETVSC_SEND_BUFFER_ID; 441 442 trace_nvsp_send(ndev, init_packet); 443 444 /* Send the gpadl notification request */ 445 ret = vmbus_sendpacket(device->channel, init_packet, 446 sizeof(struct nvsp_message), 447 (unsigned long)init_packet, 448 VM_PKT_DATA_INBAND, 449 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED); 450 if (ret != 0) { 451 netdev_err(ndev, 452 "unable to send send buffer's gpadl to netvsp\n"); 453 goto cleanup; 454 } 455 456 wait_for_completion(&net_device->channel_init_wait); 457 458 /* Check the response */ 459 if (init_packet->msg.v1_msg. 460 send_send_buf_complete.status != NVSP_STAT_SUCCESS) { 461 netdev_err(ndev, "Unable to complete send buffer " 462 "initialization with NetVsp - status %d\n", 463 init_packet->msg.v1_msg. 464 send_send_buf_complete.status); 465 ret = -EINVAL; 466 goto cleanup; 467 } 468 469 /* Parse the response */ 470 net_device->send_section_size = init_packet->msg. 471 v1_msg.send_send_buf_complete.section_size; 472 if (net_device->send_section_size < NETVSC_MTU_MIN) { 473 netdev_err(ndev, "invalid send_section_size %u\n", 474 net_device->send_section_size); 475 ret = -EINVAL; 476 goto cleanup; 477 } 478 479 /* Section count is simply the size divided by the section size. */ 480 net_device->send_section_cnt = buf_size / net_device->send_section_size; 481 482 netdev_dbg(ndev, "Send section size: %d, Section count:%d\n", 483 net_device->send_section_size, net_device->send_section_cnt); 484 485 /* Setup state for managing the send buffer. */ 486 map_words = DIV_ROUND_UP(net_device->send_section_cnt, BITS_PER_LONG); 487 488 net_device->send_section_map = kcalloc(map_words, sizeof(ulong), GFP_KERNEL); 489 if (net_device->send_section_map == NULL) { 490 ret = -ENOMEM; 491 goto cleanup; 492 } 493 494 goto exit; 495 496 cleanup: 497 netvsc_revoke_recv_buf(device, net_device, ndev); 498 netvsc_revoke_send_buf(device, net_device, ndev); 499 netvsc_teardown_recv_gpadl(device, net_device, ndev); 500 netvsc_teardown_send_gpadl(device, net_device, ndev); 501 502 exit: 503 return ret; 504 } 505 506 /* Negotiate NVSP protocol version */ 507 static int negotiate_nvsp_ver(struct hv_device *device, 508 struct netvsc_device *net_device, 509 struct nvsp_message *init_packet, 510 u32 nvsp_ver) 511 { 512 struct net_device *ndev = hv_get_drvdata(device); 513 int ret; 514 515 memset(init_packet, 0, sizeof(struct nvsp_message)); 516 init_packet->hdr.msg_type = NVSP_MSG_TYPE_INIT; 517 init_packet->msg.init_msg.init.min_protocol_ver = nvsp_ver; 518 init_packet->msg.init_msg.init.max_protocol_ver = nvsp_ver; 519 trace_nvsp_send(ndev, init_packet); 520 521 /* Send the init request */ 522 ret = vmbus_sendpacket(device->channel, init_packet, 523 sizeof(struct nvsp_message), 524 (unsigned long)init_packet, 525 VM_PKT_DATA_INBAND, 526 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED); 527 528 if (ret != 0) 529 return ret; 530 531 wait_for_completion(&net_device->channel_init_wait); 532 533 if (init_packet->msg.init_msg.init_complete.status != 534 NVSP_STAT_SUCCESS) 535 return -EINVAL; 536 537 if (nvsp_ver == NVSP_PROTOCOL_VERSION_1) 538 return 0; 539 540 /* NVSPv2 or later: Send NDIS config */ 541 memset(init_packet, 0, sizeof(struct nvsp_message)); 542 init_packet->hdr.msg_type = NVSP_MSG2_TYPE_SEND_NDIS_CONFIG; 543 init_packet->msg.v2_msg.send_ndis_config.mtu = ndev->mtu + ETH_HLEN; 544 init_packet->msg.v2_msg.send_ndis_config.capability.ieee8021q = 1; 545 546 if (nvsp_ver >= NVSP_PROTOCOL_VERSION_5) { 547 init_packet->msg.v2_msg.send_ndis_config.capability.sriov = 1; 548 549 /* Teaming bit is needed to receive link speed updates */ 550 init_packet->msg.v2_msg.send_ndis_config.capability.teaming = 1; 551 } 552 553 if (nvsp_ver >= NVSP_PROTOCOL_VERSION_61) 554 init_packet->msg.v2_msg.send_ndis_config.capability.rsc = 1; 555 556 trace_nvsp_send(ndev, init_packet); 557 558 ret = vmbus_sendpacket(device->channel, init_packet, 559 sizeof(struct nvsp_message), 560 VMBUS_RQST_ID_NO_RESPONSE, 561 VM_PKT_DATA_INBAND, 0); 562 563 return ret; 564 } 565 566 static int netvsc_connect_vsp(struct hv_device *device, 567 struct netvsc_device *net_device, 568 const struct netvsc_device_info *device_info) 569 { 570 struct net_device *ndev = hv_get_drvdata(device); 571 static const u32 ver_list[] = { 572 NVSP_PROTOCOL_VERSION_1, NVSP_PROTOCOL_VERSION_2, 573 NVSP_PROTOCOL_VERSION_4, NVSP_PROTOCOL_VERSION_5, 574 NVSP_PROTOCOL_VERSION_6, NVSP_PROTOCOL_VERSION_61 575 }; 576 struct nvsp_message *init_packet; 577 int ndis_version, i, ret; 578 579 init_packet = &net_device->channel_init_pkt; 580 581 /* Negotiate the latest NVSP protocol supported */ 582 for (i = ARRAY_SIZE(ver_list) - 1; i >= 0; i--) 583 if (negotiate_nvsp_ver(device, net_device, init_packet, 584 ver_list[i]) == 0) { 585 net_device->nvsp_version = ver_list[i]; 586 break; 587 } 588 589 if (i < 0) { 590 ret = -EPROTO; 591 goto cleanup; 592 } 593 594 pr_debug("Negotiated NVSP version:%x\n", net_device->nvsp_version); 595 596 /* Send the ndis version */ 597 memset(init_packet, 0, sizeof(struct nvsp_message)); 598 599 if (net_device->nvsp_version <= NVSP_PROTOCOL_VERSION_4) 600 ndis_version = 0x00060001; 601 else 602 ndis_version = 0x0006001e; 603 604 init_packet->hdr.msg_type = NVSP_MSG1_TYPE_SEND_NDIS_VER; 605 init_packet->msg.v1_msg. 606 send_ndis_ver.ndis_major_ver = 607 (ndis_version & 0xFFFF0000) >> 16; 608 init_packet->msg.v1_msg. 609 send_ndis_ver.ndis_minor_ver = 610 ndis_version & 0xFFFF; 611 612 trace_nvsp_send(ndev, init_packet); 613 614 /* Send the init request */ 615 ret = vmbus_sendpacket(device->channel, init_packet, 616 sizeof(struct nvsp_message), 617 VMBUS_RQST_ID_NO_RESPONSE, 618 VM_PKT_DATA_INBAND, 0); 619 if (ret != 0) 620 goto cleanup; 621 622 623 ret = netvsc_init_buf(device, net_device, device_info); 624 625 cleanup: 626 return ret; 627 } 628 629 /* 630 * netvsc_device_remove - Callback when the root bus device is removed 631 */ 632 void netvsc_device_remove(struct hv_device *device) 633 { 634 struct net_device *ndev = hv_get_drvdata(device); 635 struct net_device_context *net_device_ctx = netdev_priv(ndev); 636 struct netvsc_device *net_device 637 = rtnl_dereference(net_device_ctx->nvdev); 638 int i; 639 640 /* 641 * Revoke receive buffer. If host is pre-Win2016 then tear down 642 * receive buffer GPADL. Do the same for send buffer. 643 */ 644 netvsc_revoke_recv_buf(device, net_device, ndev); 645 if (vmbus_proto_version < VERSION_WIN10) 646 netvsc_teardown_recv_gpadl(device, net_device, ndev); 647 648 netvsc_revoke_send_buf(device, net_device, ndev); 649 if (vmbus_proto_version < VERSION_WIN10) 650 netvsc_teardown_send_gpadl(device, net_device, ndev); 651 652 RCU_INIT_POINTER(net_device_ctx->nvdev, NULL); 653 654 /* Disable NAPI and disassociate its context from the device. */ 655 for (i = 0; i < net_device->num_chn; i++) { 656 /* See also vmbus_reset_channel_cb(). */ 657 napi_disable(&net_device->chan_table[i].napi); 658 netif_napi_del(&net_device->chan_table[i].napi); 659 } 660 661 /* 662 * At this point, no one should be accessing net_device 663 * except in here 664 */ 665 netdev_dbg(ndev, "net device safe to remove\n"); 666 667 /* Now, we can close the channel safely */ 668 vmbus_close(device->channel); 669 670 /* 671 * If host is Win2016 or higher then we do the GPADL tear down 672 * here after VMBus is closed. 673 */ 674 if (vmbus_proto_version >= VERSION_WIN10) { 675 netvsc_teardown_recv_gpadl(device, net_device, ndev); 676 netvsc_teardown_send_gpadl(device, net_device, ndev); 677 } 678 679 /* Release all resources */ 680 free_netvsc_device_rcu(net_device); 681 } 682 683 #define RING_AVAIL_PERCENT_HIWATER 20 684 #define RING_AVAIL_PERCENT_LOWATER 10 685 686 static inline void netvsc_free_send_slot(struct netvsc_device *net_device, 687 u32 index) 688 { 689 sync_change_bit(index, net_device->send_section_map); 690 } 691 692 static void netvsc_send_tx_complete(struct net_device *ndev, 693 struct netvsc_device *net_device, 694 struct vmbus_channel *channel, 695 const struct vmpacket_descriptor *desc, 696 int budget) 697 { 698 struct net_device_context *ndev_ctx = netdev_priv(ndev); 699 struct sk_buff *skb; 700 u16 q_idx = 0; 701 int queue_sends; 702 u64 cmd_rqst; 703 704 cmd_rqst = vmbus_request_addr(&channel->requestor, (u64)desc->trans_id); 705 if (cmd_rqst == VMBUS_RQST_ERROR) { 706 netdev_err(ndev, "Incorrect transaction id\n"); 707 return; 708 } 709 710 skb = (struct sk_buff *)(unsigned long)cmd_rqst; 711 712 /* Notify the layer above us */ 713 if (likely(skb)) { 714 const struct hv_netvsc_packet *packet 715 = (struct hv_netvsc_packet *)skb->cb; 716 u32 send_index = packet->send_buf_index; 717 struct netvsc_stats *tx_stats; 718 719 if (send_index != NETVSC_INVALID_INDEX) 720 netvsc_free_send_slot(net_device, send_index); 721 q_idx = packet->q_idx; 722 723 tx_stats = &net_device->chan_table[q_idx].tx_stats; 724 725 u64_stats_update_begin(&tx_stats->syncp); 726 tx_stats->packets += packet->total_packets; 727 tx_stats->bytes += packet->total_bytes; 728 u64_stats_update_end(&tx_stats->syncp); 729 730 napi_consume_skb(skb, budget); 731 } 732 733 queue_sends = 734 atomic_dec_return(&net_device->chan_table[q_idx].queue_sends); 735 736 if (unlikely(net_device->destroy)) { 737 if (queue_sends == 0) 738 wake_up(&net_device->wait_drain); 739 } else { 740 struct netdev_queue *txq = netdev_get_tx_queue(ndev, q_idx); 741 742 if (netif_tx_queue_stopped(txq) && !net_device->tx_disable && 743 (hv_get_avail_to_write_percent(&channel->outbound) > 744 RING_AVAIL_PERCENT_HIWATER || queue_sends < 1)) { 745 netif_tx_wake_queue(txq); 746 ndev_ctx->eth_stats.wake_queue++; 747 } 748 } 749 } 750 751 static void netvsc_send_completion(struct net_device *ndev, 752 struct netvsc_device *net_device, 753 struct vmbus_channel *incoming_channel, 754 const struct vmpacket_descriptor *desc, 755 int budget) 756 { 757 const struct nvsp_message *nvsp_packet = hv_pkt_data(desc); 758 u32 msglen = hv_pkt_datalen(desc); 759 760 /* Ensure packet is big enough to read header fields */ 761 if (msglen < sizeof(struct nvsp_message_header)) { 762 netdev_err(ndev, "nvsp_message length too small: %u\n", msglen); 763 return; 764 } 765 766 switch (nvsp_packet->hdr.msg_type) { 767 case NVSP_MSG_TYPE_INIT_COMPLETE: 768 if (msglen < sizeof(struct nvsp_message_header) + 769 sizeof(struct nvsp_message_init_complete)) { 770 netdev_err(ndev, "nvsp_msg length too small: %u\n", 771 msglen); 772 return; 773 } 774 fallthrough; 775 776 case NVSP_MSG1_TYPE_SEND_RECV_BUF_COMPLETE: 777 if (msglen < sizeof(struct nvsp_message_header) + 778 sizeof(struct nvsp_1_message_send_receive_buffer_complete)) { 779 netdev_err(ndev, "nvsp_msg1 length too small: %u\n", 780 msglen); 781 return; 782 } 783 fallthrough; 784 785 case NVSP_MSG1_TYPE_SEND_SEND_BUF_COMPLETE: 786 if (msglen < sizeof(struct nvsp_message_header) + 787 sizeof(struct nvsp_1_message_send_send_buffer_complete)) { 788 netdev_err(ndev, "nvsp_msg1 length too small: %u\n", 789 msglen); 790 return; 791 } 792 fallthrough; 793 794 case NVSP_MSG5_TYPE_SUBCHANNEL: 795 if (msglen < sizeof(struct nvsp_message_header) + 796 sizeof(struct nvsp_5_subchannel_complete)) { 797 netdev_err(ndev, "nvsp_msg5 length too small: %u\n", 798 msglen); 799 return; 800 } 801 /* Copy the response back */ 802 memcpy(&net_device->channel_init_pkt, nvsp_packet, 803 sizeof(struct nvsp_message)); 804 complete(&net_device->channel_init_wait); 805 break; 806 807 case NVSP_MSG1_TYPE_SEND_RNDIS_PKT_COMPLETE: 808 netvsc_send_tx_complete(ndev, net_device, incoming_channel, 809 desc, budget); 810 break; 811 812 default: 813 netdev_err(ndev, 814 "Unknown send completion type %d received!!\n", 815 nvsp_packet->hdr.msg_type); 816 } 817 } 818 819 static u32 netvsc_get_next_send_section(struct netvsc_device *net_device) 820 { 821 unsigned long *map_addr = net_device->send_section_map; 822 unsigned int i; 823 824 for_each_clear_bit(i, map_addr, net_device->send_section_cnt) { 825 if (sync_test_and_set_bit(i, map_addr) == 0) 826 return i; 827 } 828 829 return NETVSC_INVALID_INDEX; 830 } 831 832 static void netvsc_copy_to_send_buf(struct netvsc_device *net_device, 833 unsigned int section_index, 834 u32 pend_size, 835 struct hv_netvsc_packet *packet, 836 struct rndis_message *rndis_msg, 837 struct hv_page_buffer *pb, 838 bool xmit_more) 839 { 840 char *start = net_device->send_buf; 841 char *dest = start + (section_index * net_device->send_section_size) 842 + pend_size; 843 int i; 844 u32 padding = 0; 845 u32 page_count = packet->cp_partial ? packet->rmsg_pgcnt : 846 packet->page_buf_cnt; 847 u32 remain; 848 849 /* Add padding */ 850 remain = packet->total_data_buflen & (net_device->pkt_align - 1); 851 if (xmit_more && remain) { 852 padding = net_device->pkt_align - remain; 853 rndis_msg->msg_len += padding; 854 packet->total_data_buflen += padding; 855 } 856 857 for (i = 0; i < page_count; i++) { 858 char *src = phys_to_virt(pb[i].pfn << HV_HYP_PAGE_SHIFT); 859 u32 offset = pb[i].offset; 860 u32 len = pb[i].len; 861 862 memcpy(dest, (src + offset), len); 863 dest += len; 864 } 865 866 if (padding) 867 memset(dest, 0, padding); 868 } 869 870 static inline int netvsc_send_pkt( 871 struct hv_device *device, 872 struct hv_netvsc_packet *packet, 873 struct netvsc_device *net_device, 874 struct hv_page_buffer *pb, 875 struct sk_buff *skb) 876 { 877 struct nvsp_message nvmsg; 878 struct nvsp_1_message_send_rndis_packet *rpkt = 879 &nvmsg.msg.v1_msg.send_rndis_pkt; 880 struct netvsc_channel * const nvchan = 881 &net_device->chan_table[packet->q_idx]; 882 struct vmbus_channel *out_channel = nvchan->channel; 883 struct net_device *ndev = hv_get_drvdata(device); 884 struct net_device_context *ndev_ctx = netdev_priv(ndev); 885 struct netdev_queue *txq = netdev_get_tx_queue(ndev, packet->q_idx); 886 u64 req_id; 887 int ret; 888 u32 ring_avail = hv_get_avail_to_write_percent(&out_channel->outbound); 889 890 nvmsg.hdr.msg_type = NVSP_MSG1_TYPE_SEND_RNDIS_PKT; 891 if (skb) 892 rpkt->channel_type = 0; /* 0 is RMC_DATA */ 893 else 894 rpkt->channel_type = 1; /* 1 is RMC_CONTROL */ 895 896 rpkt->send_buf_section_index = packet->send_buf_index; 897 if (packet->send_buf_index == NETVSC_INVALID_INDEX) 898 rpkt->send_buf_section_size = 0; 899 else 900 rpkt->send_buf_section_size = packet->total_data_buflen; 901 902 req_id = (ulong)skb; 903 904 if (out_channel->rescind) 905 return -ENODEV; 906 907 trace_nvsp_send_pkt(ndev, out_channel, rpkt); 908 909 if (packet->page_buf_cnt) { 910 if (packet->cp_partial) 911 pb += packet->rmsg_pgcnt; 912 913 ret = vmbus_sendpacket_pagebuffer(out_channel, 914 pb, packet->page_buf_cnt, 915 &nvmsg, sizeof(nvmsg), 916 req_id); 917 } else { 918 ret = vmbus_sendpacket(out_channel, 919 &nvmsg, sizeof(nvmsg), 920 req_id, VM_PKT_DATA_INBAND, 921 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED); 922 } 923 924 if (ret == 0) { 925 atomic_inc_return(&nvchan->queue_sends); 926 927 if (ring_avail < RING_AVAIL_PERCENT_LOWATER) { 928 netif_tx_stop_queue(txq); 929 ndev_ctx->eth_stats.stop_queue++; 930 } 931 } else if (ret == -EAGAIN) { 932 netif_tx_stop_queue(txq); 933 ndev_ctx->eth_stats.stop_queue++; 934 } else { 935 netdev_err(ndev, 936 "Unable to send packet pages %u len %u, ret %d\n", 937 packet->page_buf_cnt, packet->total_data_buflen, 938 ret); 939 } 940 941 if (netif_tx_queue_stopped(txq) && 942 atomic_read(&nvchan->queue_sends) < 1 && 943 !net_device->tx_disable) { 944 netif_tx_wake_queue(txq); 945 ndev_ctx->eth_stats.wake_queue++; 946 if (ret == -EAGAIN) 947 ret = -ENOSPC; 948 } 949 950 return ret; 951 } 952 953 /* Move packet out of multi send data (msd), and clear msd */ 954 static inline void move_pkt_msd(struct hv_netvsc_packet **msd_send, 955 struct sk_buff **msd_skb, 956 struct multi_send_data *msdp) 957 { 958 *msd_skb = msdp->skb; 959 *msd_send = msdp->pkt; 960 msdp->skb = NULL; 961 msdp->pkt = NULL; 962 msdp->count = 0; 963 } 964 965 /* RCU already held by caller */ 966 int netvsc_send(struct net_device *ndev, 967 struct hv_netvsc_packet *packet, 968 struct rndis_message *rndis_msg, 969 struct hv_page_buffer *pb, 970 struct sk_buff *skb, 971 bool xdp_tx) 972 { 973 struct net_device_context *ndev_ctx = netdev_priv(ndev); 974 struct netvsc_device *net_device 975 = rcu_dereference_bh(ndev_ctx->nvdev); 976 struct hv_device *device = ndev_ctx->device_ctx; 977 int ret = 0; 978 struct netvsc_channel *nvchan; 979 u32 pktlen = packet->total_data_buflen, msd_len = 0; 980 unsigned int section_index = NETVSC_INVALID_INDEX; 981 struct multi_send_data *msdp; 982 struct hv_netvsc_packet *msd_send = NULL, *cur_send = NULL; 983 struct sk_buff *msd_skb = NULL; 984 bool try_batch, xmit_more; 985 986 /* If device is rescinded, return error and packet will get dropped. */ 987 if (unlikely(!net_device || net_device->destroy)) 988 return -ENODEV; 989 990 nvchan = &net_device->chan_table[packet->q_idx]; 991 packet->send_buf_index = NETVSC_INVALID_INDEX; 992 packet->cp_partial = false; 993 994 /* Send a control message or XDP packet directly without accessing 995 * msd (Multi-Send Data) field which may be changed during data packet 996 * processing. 997 */ 998 if (!skb || xdp_tx) 999 return netvsc_send_pkt(device, packet, net_device, pb, skb); 1000 1001 /* batch packets in send buffer if possible */ 1002 msdp = &nvchan->msd; 1003 if (msdp->pkt) 1004 msd_len = msdp->pkt->total_data_buflen; 1005 1006 try_batch = msd_len > 0 && msdp->count < net_device->max_pkt; 1007 if (try_batch && msd_len + pktlen + net_device->pkt_align < 1008 net_device->send_section_size) { 1009 section_index = msdp->pkt->send_buf_index; 1010 1011 } else if (try_batch && msd_len + packet->rmsg_size < 1012 net_device->send_section_size) { 1013 section_index = msdp->pkt->send_buf_index; 1014 packet->cp_partial = true; 1015 1016 } else if (pktlen + net_device->pkt_align < 1017 net_device->send_section_size) { 1018 section_index = netvsc_get_next_send_section(net_device); 1019 if (unlikely(section_index == NETVSC_INVALID_INDEX)) { 1020 ++ndev_ctx->eth_stats.tx_send_full; 1021 } else { 1022 move_pkt_msd(&msd_send, &msd_skb, msdp); 1023 msd_len = 0; 1024 } 1025 } 1026 1027 /* Keep aggregating only if stack says more data is coming 1028 * and not doing mixed modes send and not flow blocked 1029 */ 1030 xmit_more = netdev_xmit_more() && 1031 !packet->cp_partial && 1032 !netif_xmit_stopped(netdev_get_tx_queue(ndev, packet->q_idx)); 1033 1034 if (section_index != NETVSC_INVALID_INDEX) { 1035 netvsc_copy_to_send_buf(net_device, 1036 section_index, msd_len, 1037 packet, rndis_msg, pb, xmit_more); 1038 1039 packet->send_buf_index = section_index; 1040 1041 if (packet->cp_partial) { 1042 packet->page_buf_cnt -= packet->rmsg_pgcnt; 1043 packet->total_data_buflen = msd_len + packet->rmsg_size; 1044 } else { 1045 packet->page_buf_cnt = 0; 1046 packet->total_data_buflen += msd_len; 1047 } 1048 1049 if (msdp->pkt) { 1050 packet->total_packets += msdp->pkt->total_packets; 1051 packet->total_bytes += msdp->pkt->total_bytes; 1052 } 1053 1054 if (msdp->skb) 1055 dev_consume_skb_any(msdp->skb); 1056 1057 if (xmit_more) { 1058 msdp->skb = skb; 1059 msdp->pkt = packet; 1060 msdp->count++; 1061 } else { 1062 cur_send = packet; 1063 msdp->skb = NULL; 1064 msdp->pkt = NULL; 1065 msdp->count = 0; 1066 } 1067 } else { 1068 move_pkt_msd(&msd_send, &msd_skb, msdp); 1069 cur_send = packet; 1070 } 1071 1072 if (msd_send) { 1073 int m_ret = netvsc_send_pkt(device, msd_send, net_device, 1074 NULL, msd_skb); 1075 1076 if (m_ret != 0) { 1077 netvsc_free_send_slot(net_device, 1078 msd_send->send_buf_index); 1079 dev_kfree_skb_any(msd_skb); 1080 } 1081 } 1082 1083 if (cur_send) 1084 ret = netvsc_send_pkt(device, cur_send, net_device, pb, skb); 1085 1086 if (ret != 0 && section_index != NETVSC_INVALID_INDEX) 1087 netvsc_free_send_slot(net_device, section_index); 1088 1089 return ret; 1090 } 1091 1092 /* Send pending recv completions */ 1093 static int send_recv_completions(struct net_device *ndev, 1094 struct netvsc_device *nvdev, 1095 struct netvsc_channel *nvchan) 1096 { 1097 struct multi_recv_comp *mrc = &nvchan->mrc; 1098 struct recv_comp_msg { 1099 struct nvsp_message_header hdr; 1100 u32 status; 1101 } __packed; 1102 struct recv_comp_msg msg = { 1103 .hdr.msg_type = NVSP_MSG1_TYPE_SEND_RNDIS_PKT_COMPLETE, 1104 }; 1105 int ret; 1106 1107 while (mrc->first != mrc->next) { 1108 const struct recv_comp_data *rcd 1109 = mrc->slots + mrc->first; 1110 1111 msg.status = rcd->status; 1112 ret = vmbus_sendpacket(nvchan->channel, &msg, sizeof(msg), 1113 rcd->tid, VM_PKT_COMP, 0); 1114 if (unlikely(ret)) { 1115 struct net_device_context *ndev_ctx = netdev_priv(ndev); 1116 1117 ++ndev_ctx->eth_stats.rx_comp_busy; 1118 return ret; 1119 } 1120 1121 if (++mrc->first == nvdev->recv_completion_cnt) 1122 mrc->first = 0; 1123 } 1124 1125 /* receive completion ring has been emptied */ 1126 if (unlikely(nvdev->destroy)) 1127 wake_up(&nvdev->wait_drain); 1128 1129 return 0; 1130 } 1131 1132 /* Count how many receive completions are outstanding */ 1133 static void recv_comp_slot_avail(const struct netvsc_device *nvdev, 1134 const struct multi_recv_comp *mrc, 1135 u32 *filled, u32 *avail) 1136 { 1137 u32 count = nvdev->recv_completion_cnt; 1138 1139 if (mrc->next >= mrc->first) 1140 *filled = mrc->next - mrc->first; 1141 else 1142 *filled = (count - mrc->first) + mrc->next; 1143 1144 *avail = count - *filled - 1; 1145 } 1146 1147 /* Add receive complete to ring to send to host. */ 1148 static void enq_receive_complete(struct net_device *ndev, 1149 struct netvsc_device *nvdev, u16 q_idx, 1150 u64 tid, u32 status) 1151 { 1152 struct netvsc_channel *nvchan = &nvdev->chan_table[q_idx]; 1153 struct multi_recv_comp *mrc = &nvchan->mrc; 1154 struct recv_comp_data *rcd; 1155 u32 filled, avail; 1156 1157 recv_comp_slot_avail(nvdev, mrc, &filled, &avail); 1158 1159 if (unlikely(filled > NAPI_POLL_WEIGHT)) { 1160 send_recv_completions(ndev, nvdev, nvchan); 1161 recv_comp_slot_avail(nvdev, mrc, &filled, &avail); 1162 } 1163 1164 if (unlikely(!avail)) { 1165 netdev_err(ndev, "Recv_comp full buf q:%hd, tid:%llx\n", 1166 q_idx, tid); 1167 return; 1168 } 1169 1170 rcd = mrc->slots + mrc->next; 1171 rcd->tid = tid; 1172 rcd->status = status; 1173 1174 if (++mrc->next == nvdev->recv_completion_cnt) 1175 mrc->next = 0; 1176 } 1177 1178 static int netvsc_receive(struct net_device *ndev, 1179 struct netvsc_device *net_device, 1180 struct netvsc_channel *nvchan, 1181 const struct vmpacket_descriptor *desc) 1182 { 1183 struct net_device_context *net_device_ctx = netdev_priv(ndev); 1184 struct vmbus_channel *channel = nvchan->channel; 1185 const struct vmtransfer_page_packet_header *vmxferpage_packet 1186 = container_of(desc, const struct vmtransfer_page_packet_header, d); 1187 const struct nvsp_message *nvsp = hv_pkt_data(desc); 1188 u32 msglen = hv_pkt_datalen(desc); 1189 u16 q_idx = channel->offermsg.offer.sub_channel_index; 1190 char *recv_buf = net_device->recv_buf; 1191 u32 status = NVSP_STAT_SUCCESS; 1192 int i; 1193 int count = 0; 1194 1195 /* Ensure packet is big enough to read header fields */ 1196 if (msglen < sizeof(struct nvsp_message_header)) { 1197 netif_err(net_device_ctx, rx_err, ndev, 1198 "invalid nvsp header, length too small: %u\n", 1199 msglen); 1200 return 0; 1201 } 1202 1203 /* Make sure this is a valid nvsp packet */ 1204 if (unlikely(nvsp->hdr.msg_type != NVSP_MSG1_TYPE_SEND_RNDIS_PKT)) { 1205 netif_err(net_device_ctx, rx_err, ndev, 1206 "Unknown nvsp packet type received %u\n", 1207 nvsp->hdr.msg_type); 1208 return 0; 1209 } 1210 1211 /* Validate xfer page pkt header */ 1212 if ((desc->offset8 << 3) < sizeof(struct vmtransfer_page_packet_header)) { 1213 netif_err(net_device_ctx, rx_err, ndev, 1214 "Invalid xfer page pkt, offset too small: %u\n", 1215 desc->offset8 << 3); 1216 return 0; 1217 } 1218 1219 if (unlikely(vmxferpage_packet->xfer_pageset_id != NETVSC_RECEIVE_BUFFER_ID)) { 1220 netif_err(net_device_ctx, rx_err, ndev, 1221 "Invalid xfer page set id - expecting %x got %x\n", 1222 NETVSC_RECEIVE_BUFFER_ID, 1223 vmxferpage_packet->xfer_pageset_id); 1224 return 0; 1225 } 1226 1227 count = vmxferpage_packet->range_cnt; 1228 1229 /* Check count for a valid value */ 1230 if (NETVSC_XFER_HEADER_SIZE(count) > desc->offset8 << 3) { 1231 netif_err(net_device_ctx, rx_err, ndev, 1232 "Range count is not valid: %d\n", 1233 count); 1234 return 0; 1235 } 1236 1237 /* Each range represents 1 RNDIS pkt that contains 1 ethernet frame */ 1238 for (i = 0; i < count; i++) { 1239 u32 offset = vmxferpage_packet->ranges[i].byte_offset; 1240 u32 buflen = vmxferpage_packet->ranges[i].byte_count; 1241 void *data; 1242 int ret; 1243 1244 if (unlikely(offset > net_device->recv_buf_size || 1245 buflen > net_device->recv_buf_size - offset)) { 1246 nvchan->rsc.cnt = 0; 1247 status = NVSP_STAT_FAIL; 1248 netif_err(net_device_ctx, rx_err, ndev, 1249 "Packet offset:%u + len:%u too big\n", 1250 offset, buflen); 1251 1252 continue; 1253 } 1254 1255 data = recv_buf + offset; 1256 1257 nvchan->rsc.is_last = (i == count - 1); 1258 1259 trace_rndis_recv(ndev, q_idx, data); 1260 1261 /* Pass it to the upper layer */ 1262 ret = rndis_filter_receive(ndev, net_device, 1263 nvchan, data, buflen); 1264 1265 if (unlikely(ret != NVSP_STAT_SUCCESS)) 1266 status = NVSP_STAT_FAIL; 1267 } 1268 1269 enq_receive_complete(ndev, net_device, q_idx, 1270 vmxferpage_packet->d.trans_id, status); 1271 1272 return count; 1273 } 1274 1275 static void netvsc_send_table(struct net_device *ndev, 1276 struct netvsc_device *nvscdev, 1277 const struct nvsp_message *nvmsg, 1278 u32 msglen) 1279 { 1280 struct net_device_context *net_device_ctx = netdev_priv(ndev); 1281 u32 count, offset, *tab; 1282 int i; 1283 1284 /* Ensure packet is big enough to read send_table fields */ 1285 if (msglen < sizeof(struct nvsp_message_header) + 1286 sizeof(struct nvsp_5_send_indirect_table)) { 1287 netdev_err(ndev, "nvsp_v5_msg length too small: %u\n", msglen); 1288 return; 1289 } 1290 1291 count = nvmsg->msg.v5_msg.send_table.count; 1292 offset = nvmsg->msg.v5_msg.send_table.offset; 1293 1294 if (count != VRSS_SEND_TAB_SIZE) { 1295 netdev_err(ndev, "Received wrong send-table size:%u\n", count); 1296 return; 1297 } 1298 1299 /* If negotiated version <= NVSP_PROTOCOL_VERSION_6, the offset may be 1300 * wrong due to a host bug. So fix the offset here. 1301 */ 1302 if (nvscdev->nvsp_version <= NVSP_PROTOCOL_VERSION_6 && 1303 msglen >= sizeof(struct nvsp_message_header) + 1304 sizeof(union nvsp_6_message_uber) + count * sizeof(u32)) 1305 offset = sizeof(struct nvsp_message_header) + 1306 sizeof(union nvsp_6_message_uber); 1307 1308 /* Boundary check for all versions */ 1309 if (offset > msglen - count * sizeof(u32)) { 1310 netdev_err(ndev, "Received send-table offset too big:%u\n", 1311 offset); 1312 return; 1313 } 1314 1315 tab = (void *)nvmsg + offset; 1316 1317 for (i = 0; i < count; i++) 1318 net_device_ctx->tx_table[i] = tab[i]; 1319 } 1320 1321 static void netvsc_send_vf(struct net_device *ndev, 1322 const struct nvsp_message *nvmsg, 1323 u32 msglen) 1324 { 1325 struct net_device_context *net_device_ctx = netdev_priv(ndev); 1326 1327 /* Ensure packet is big enough to read its fields */ 1328 if (msglen < sizeof(struct nvsp_message_header) + 1329 sizeof(struct nvsp_4_send_vf_association)) { 1330 netdev_err(ndev, "nvsp_v4_msg length too small: %u\n", msglen); 1331 return; 1332 } 1333 1334 net_device_ctx->vf_alloc = nvmsg->msg.v4_msg.vf_assoc.allocated; 1335 net_device_ctx->vf_serial = nvmsg->msg.v4_msg.vf_assoc.serial; 1336 netdev_info(ndev, "VF slot %u %s\n", 1337 net_device_ctx->vf_serial, 1338 net_device_ctx->vf_alloc ? "added" : "removed"); 1339 } 1340 1341 static void netvsc_receive_inband(struct net_device *ndev, 1342 struct netvsc_device *nvscdev, 1343 const struct vmpacket_descriptor *desc) 1344 { 1345 const struct nvsp_message *nvmsg = hv_pkt_data(desc); 1346 u32 msglen = hv_pkt_datalen(desc); 1347 1348 /* Ensure packet is big enough to read header fields */ 1349 if (msglen < sizeof(struct nvsp_message_header)) { 1350 netdev_err(ndev, "inband nvsp_message length too small: %u\n", msglen); 1351 return; 1352 } 1353 1354 switch (nvmsg->hdr.msg_type) { 1355 case NVSP_MSG5_TYPE_SEND_INDIRECTION_TABLE: 1356 netvsc_send_table(ndev, nvscdev, nvmsg, msglen); 1357 break; 1358 1359 case NVSP_MSG4_TYPE_SEND_VF_ASSOCIATION: 1360 netvsc_send_vf(ndev, nvmsg, msglen); 1361 break; 1362 } 1363 } 1364 1365 static int netvsc_process_raw_pkt(struct hv_device *device, 1366 struct netvsc_channel *nvchan, 1367 struct netvsc_device *net_device, 1368 struct net_device *ndev, 1369 const struct vmpacket_descriptor *desc, 1370 int budget) 1371 { 1372 struct vmbus_channel *channel = nvchan->channel; 1373 const struct nvsp_message *nvmsg = hv_pkt_data(desc); 1374 1375 trace_nvsp_recv(ndev, channel, nvmsg); 1376 1377 switch (desc->type) { 1378 case VM_PKT_COMP: 1379 netvsc_send_completion(ndev, net_device, channel, desc, budget); 1380 break; 1381 1382 case VM_PKT_DATA_USING_XFER_PAGES: 1383 return netvsc_receive(ndev, net_device, nvchan, desc); 1384 break; 1385 1386 case VM_PKT_DATA_INBAND: 1387 netvsc_receive_inband(ndev, net_device, desc); 1388 break; 1389 1390 default: 1391 netdev_err(ndev, "unhandled packet type %d, tid %llx\n", 1392 desc->type, desc->trans_id); 1393 break; 1394 } 1395 1396 return 0; 1397 } 1398 1399 static struct hv_device *netvsc_channel_to_device(struct vmbus_channel *channel) 1400 { 1401 struct vmbus_channel *primary = channel->primary_channel; 1402 1403 return primary ? primary->device_obj : channel->device_obj; 1404 } 1405 1406 /* Network processing softirq 1407 * Process data in incoming ring buffer from host 1408 * Stops when ring is empty or budget is met or exceeded. 1409 */ 1410 int netvsc_poll(struct napi_struct *napi, int budget) 1411 { 1412 struct netvsc_channel *nvchan 1413 = container_of(napi, struct netvsc_channel, napi); 1414 struct netvsc_device *net_device = nvchan->net_device; 1415 struct vmbus_channel *channel = nvchan->channel; 1416 struct hv_device *device = netvsc_channel_to_device(channel); 1417 struct net_device *ndev = hv_get_drvdata(device); 1418 int work_done = 0; 1419 int ret; 1420 1421 /* If starting a new interval */ 1422 if (!nvchan->desc) 1423 nvchan->desc = hv_pkt_iter_first(channel); 1424 1425 while (nvchan->desc && work_done < budget) { 1426 work_done += netvsc_process_raw_pkt(device, nvchan, net_device, 1427 ndev, nvchan->desc, budget); 1428 nvchan->desc = hv_pkt_iter_next(channel, nvchan->desc); 1429 } 1430 1431 /* Send any pending receive completions */ 1432 ret = send_recv_completions(ndev, net_device, nvchan); 1433 1434 /* If it did not exhaust NAPI budget this time 1435 * and not doing busy poll 1436 * then re-enable host interrupts 1437 * and reschedule if ring is not empty 1438 * or sending receive completion failed. 1439 */ 1440 if (work_done < budget && 1441 napi_complete_done(napi, work_done) && 1442 (ret || hv_end_read(&channel->inbound)) && 1443 napi_schedule_prep(napi)) { 1444 hv_begin_read(&channel->inbound); 1445 __napi_schedule(napi); 1446 } 1447 1448 /* Driver may overshoot since multiple packets per descriptor */ 1449 return min(work_done, budget); 1450 } 1451 1452 /* Call back when data is available in host ring buffer. 1453 * Processing is deferred until network softirq (NAPI) 1454 */ 1455 void netvsc_channel_cb(void *context) 1456 { 1457 struct netvsc_channel *nvchan = context; 1458 struct vmbus_channel *channel = nvchan->channel; 1459 struct hv_ring_buffer_info *rbi = &channel->inbound; 1460 1461 /* preload first vmpacket descriptor */ 1462 prefetch(hv_get_ring_buffer(rbi) + rbi->priv_read_index); 1463 1464 if (napi_schedule_prep(&nvchan->napi)) { 1465 /* disable interrupts from host */ 1466 hv_begin_read(rbi); 1467 1468 __napi_schedule_irqoff(&nvchan->napi); 1469 } 1470 } 1471 1472 /* 1473 * netvsc_device_add - Callback when the device belonging to this 1474 * driver is added 1475 */ 1476 struct netvsc_device *netvsc_device_add(struct hv_device *device, 1477 const struct netvsc_device_info *device_info) 1478 { 1479 int i, ret = 0; 1480 struct netvsc_device *net_device; 1481 struct net_device *ndev = hv_get_drvdata(device); 1482 struct net_device_context *net_device_ctx = netdev_priv(ndev); 1483 1484 net_device = alloc_net_device(); 1485 if (!net_device) 1486 return ERR_PTR(-ENOMEM); 1487 1488 for (i = 0; i < VRSS_SEND_TAB_SIZE; i++) 1489 net_device_ctx->tx_table[i] = 0; 1490 1491 /* Because the device uses NAPI, all the interrupt batching and 1492 * control is done via Net softirq, not the channel handling 1493 */ 1494 set_channel_read_mode(device->channel, HV_CALL_ISR); 1495 1496 /* If we're reopening the device we may have multiple queues, fill the 1497 * chn_table with the default channel to use it before subchannels are 1498 * opened. 1499 * Initialize the channel state before we open; 1500 * we can be interrupted as soon as we open the channel. 1501 */ 1502 1503 for (i = 0; i < VRSS_CHANNEL_MAX; i++) { 1504 struct netvsc_channel *nvchan = &net_device->chan_table[i]; 1505 1506 nvchan->channel = device->channel; 1507 nvchan->net_device = net_device; 1508 u64_stats_init(&nvchan->tx_stats.syncp); 1509 u64_stats_init(&nvchan->rx_stats.syncp); 1510 1511 ret = xdp_rxq_info_reg(&nvchan->xdp_rxq, ndev, i, 0); 1512 1513 if (ret) { 1514 netdev_err(ndev, "xdp_rxq_info_reg fail: %d\n", ret); 1515 goto cleanup2; 1516 } 1517 1518 ret = xdp_rxq_info_reg_mem_model(&nvchan->xdp_rxq, 1519 MEM_TYPE_PAGE_SHARED, NULL); 1520 1521 if (ret) { 1522 netdev_err(ndev, "xdp reg_mem_model fail: %d\n", ret); 1523 goto cleanup2; 1524 } 1525 } 1526 1527 /* Enable NAPI handler before init callbacks */ 1528 netif_napi_add(ndev, &net_device->chan_table[0].napi, 1529 netvsc_poll, NAPI_POLL_WEIGHT); 1530 1531 /* Open the channel */ 1532 device->channel->rqstor_size = netvsc_rqstor_size(netvsc_ring_bytes); 1533 ret = vmbus_open(device->channel, netvsc_ring_bytes, 1534 netvsc_ring_bytes, NULL, 0, 1535 netvsc_channel_cb, net_device->chan_table); 1536 1537 if (ret != 0) { 1538 netdev_err(ndev, "unable to open channel: %d\n", ret); 1539 goto cleanup; 1540 } 1541 1542 /* Channel is opened */ 1543 netdev_dbg(ndev, "hv_netvsc channel opened successfully\n"); 1544 1545 napi_enable(&net_device->chan_table[0].napi); 1546 1547 /* Connect with the NetVsp */ 1548 ret = netvsc_connect_vsp(device, net_device, device_info); 1549 if (ret != 0) { 1550 netdev_err(ndev, 1551 "unable to connect to NetVSP - %d\n", ret); 1552 goto close; 1553 } 1554 1555 /* Writing nvdev pointer unlocks netvsc_send(), make sure chn_table is 1556 * populated. 1557 */ 1558 rcu_assign_pointer(net_device_ctx->nvdev, net_device); 1559 1560 return net_device; 1561 1562 close: 1563 RCU_INIT_POINTER(net_device_ctx->nvdev, NULL); 1564 napi_disable(&net_device->chan_table[0].napi); 1565 1566 /* Now, we can close the channel safely */ 1567 vmbus_close(device->channel); 1568 1569 cleanup: 1570 netif_napi_del(&net_device->chan_table[0].napi); 1571 1572 cleanup2: 1573 free_netvsc_device(&net_device->rcu); 1574 1575 return ERR_PTR(ret); 1576 } 1577