1 /* 2 * Copyright (c) 2009, Microsoft Corporation. 3 * 4 * This program is free software; you can redistribute it and/or modify it 5 * under the terms and conditions of the GNU General Public License, 6 * version 2, as published by the Free Software Foundation. 7 * 8 * This program is distributed in the hope it will be useful, but WITHOUT 9 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 10 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for 11 * more details. 12 * 13 * You should have received a copy of the GNU General Public License along with 14 * this program; if not, see <http://www.gnu.org/licenses/>. 15 * 16 * Authors: 17 * Haiyang Zhang <haiyangz@microsoft.com> 18 * Hank Janssen <hjanssen@microsoft.com> 19 */ 20 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt 21 22 #include <linux/kernel.h> 23 #include <linux/sched.h> 24 #include <linux/wait.h> 25 #include <linux/mm.h> 26 #include <linux/delay.h> 27 #include <linux/io.h> 28 #include <linux/slab.h> 29 #include <linux/netdevice.h> 30 #include <linux/if_ether.h> 31 #include <asm/sync_bitops.h> 32 33 #include "hyperv_net.h" 34 35 36 static struct netvsc_device *alloc_net_device(struct hv_device *device) 37 { 38 struct netvsc_device *net_device; 39 struct net_device *ndev = hv_get_drvdata(device); 40 41 net_device = kzalloc(sizeof(struct netvsc_device), GFP_KERNEL); 42 if (!net_device) 43 return NULL; 44 45 net_device->cb_buffer = kzalloc(NETVSC_PACKET_SIZE, GFP_KERNEL); 46 if (!net_device->cb_buffer) { 47 kfree(net_device); 48 return NULL; 49 } 50 51 init_waitqueue_head(&net_device->wait_drain); 52 net_device->start_remove = false; 53 net_device->destroy = false; 54 net_device->dev = device; 55 net_device->ndev = ndev; 56 57 hv_set_drvdata(device, net_device); 58 return net_device; 59 } 60 61 static void free_netvsc_device(struct netvsc_device *nvdev) 62 { 63 kfree(nvdev->cb_buffer); 64 kfree(nvdev); 65 } 66 67 static struct netvsc_device *get_outbound_net_device(struct hv_device *device) 68 { 69 struct netvsc_device *net_device; 70 71 net_device = hv_get_drvdata(device); 72 if (net_device && net_device->destroy) 73 net_device = NULL; 74 75 return net_device; 76 } 77 78 static struct netvsc_device *get_inbound_net_device(struct hv_device *device) 79 { 80 struct netvsc_device *net_device; 81 82 net_device = hv_get_drvdata(device); 83 84 if (!net_device) 85 goto get_in_err; 86 87 if (net_device->destroy && 88 atomic_read(&net_device->num_outstanding_sends) == 0) 89 net_device = NULL; 90 91 get_in_err: 92 return net_device; 93 } 94 95 96 static int netvsc_destroy_buf(struct netvsc_device *net_device) 97 { 98 struct nvsp_message *revoke_packet; 99 int ret = 0; 100 struct net_device *ndev = net_device->ndev; 101 102 /* 103 * If we got a section count, it means we received a 104 * SendReceiveBufferComplete msg (ie sent 105 * NvspMessage1TypeSendReceiveBuffer msg) therefore, we need 106 * to send a revoke msg here 107 */ 108 if (net_device->recv_section_cnt) { 109 /* Send the revoke receive buffer */ 110 revoke_packet = &net_device->revoke_packet; 111 memset(revoke_packet, 0, sizeof(struct nvsp_message)); 112 113 revoke_packet->hdr.msg_type = 114 NVSP_MSG1_TYPE_REVOKE_RECV_BUF; 115 revoke_packet->msg.v1_msg. 116 revoke_recv_buf.id = NETVSC_RECEIVE_BUFFER_ID; 117 118 ret = vmbus_sendpacket(net_device->dev->channel, 119 revoke_packet, 120 sizeof(struct nvsp_message), 121 (unsigned long)revoke_packet, 122 VM_PKT_DATA_INBAND, 0); 123 /* 124 * If we failed here, we might as well return and 125 * have a leak rather than continue and a bugchk 126 */ 127 if (ret != 0) { 128 netdev_err(ndev, "unable to send " 129 "revoke receive buffer to netvsp\n"); 130 return ret; 131 } 132 } 133 134 /* Teardown the gpadl on the vsp end */ 135 if (net_device->recv_buf_gpadl_handle) { 136 ret = vmbus_teardown_gpadl(net_device->dev->channel, 137 net_device->recv_buf_gpadl_handle); 138 139 /* If we failed here, we might as well return and have a leak 140 * rather than continue and a bugchk 141 */ 142 if (ret != 0) { 143 netdev_err(ndev, 144 "unable to teardown receive buffer's gpadl\n"); 145 return ret; 146 } 147 net_device->recv_buf_gpadl_handle = 0; 148 } 149 150 if (net_device->recv_buf) { 151 /* Free up the receive buffer */ 152 vfree(net_device->recv_buf); 153 net_device->recv_buf = NULL; 154 } 155 156 if (net_device->recv_section) { 157 net_device->recv_section_cnt = 0; 158 kfree(net_device->recv_section); 159 net_device->recv_section = NULL; 160 } 161 162 /* Deal with the send buffer we may have setup. 163 * If we got a send section size, it means we received a 164 * NVSP_MSG1_TYPE_SEND_SEND_BUF_COMPLETE msg (ie sent 165 * NVSP_MSG1_TYPE_SEND_SEND_BUF msg) therefore, we need 166 * to send a revoke msg here 167 */ 168 if (net_device->send_section_size) { 169 /* Send the revoke receive buffer */ 170 revoke_packet = &net_device->revoke_packet; 171 memset(revoke_packet, 0, sizeof(struct nvsp_message)); 172 173 revoke_packet->hdr.msg_type = 174 NVSP_MSG1_TYPE_REVOKE_SEND_BUF; 175 revoke_packet->msg.v1_msg.revoke_send_buf.id = 176 NETVSC_SEND_BUFFER_ID; 177 178 ret = vmbus_sendpacket(net_device->dev->channel, 179 revoke_packet, 180 sizeof(struct nvsp_message), 181 (unsigned long)revoke_packet, 182 VM_PKT_DATA_INBAND, 0); 183 /* If we failed here, we might as well return and 184 * have a leak rather than continue and a bugchk 185 */ 186 if (ret != 0) { 187 netdev_err(ndev, "unable to send " 188 "revoke send buffer to netvsp\n"); 189 return ret; 190 } 191 } 192 /* Teardown the gpadl on the vsp end */ 193 if (net_device->send_buf_gpadl_handle) { 194 ret = vmbus_teardown_gpadl(net_device->dev->channel, 195 net_device->send_buf_gpadl_handle); 196 197 /* If we failed here, we might as well return and have a leak 198 * rather than continue and a bugchk 199 */ 200 if (ret != 0) { 201 netdev_err(ndev, 202 "unable to teardown send buffer's gpadl\n"); 203 return ret; 204 } 205 net_device->send_buf_gpadl_handle = 0; 206 } 207 if (net_device->send_buf) { 208 /* Free up the send buffer */ 209 vfree(net_device->send_buf); 210 net_device->send_buf = NULL; 211 } 212 kfree(net_device->send_section_map); 213 214 return ret; 215 } 216 217 static int netvsc_init_buf(struct hv_device *device) 218 { 219 int ret = 0; 220 int t; 221 struct netvsc_device *net_device; 222 struct nvsp_message *init_packet; 223 struct net_device *ndev; 224 225 net_device = get_outbound_net_device(device); 226 if (!net_device) 227 return -ENODEV; 228 ndev = net_device->ndev; 229 230 net_device->recv_buf = vzalloc(net_device->recv_buf_size); 231 if (!net_device->recv_buf) { 232 netdev_err(ndev, "unable to allocate receive " 233 "buffer of size %d\n", net_device->recv_buf_size); 234 ret = -ENOMEM; 235 goto cleanup; 236 } 237 238 /* 239 * Establish the gpadl handle for this buffer on this 240 * channel. Note: This call uses the vmbus connection rather 241 * than the channel to establish the gpadl handle. 242 */ 243 ret = vmbus_establish_gpadl(device->channel, net_device->recv_buf, 244 net_device->recv_buf_size, 245 &net_device->recv_buf_gpadl_handle); 246 if (ret != 0) { 247 netdev_err(ndev, 248 "unable to establish receive buffer's gpadl\n"); 249 goto cleanup; 250 } 251 252 253 /* Notify the NetVsp of the gpadl handle */ 254 init_packet = &net_device->channel_init_pkt; 255 256 memset(init_packet, 0, sizeof(struct nvsp_message)); 257 258 init_packet->hdr.msg_type = NVSP_MSG1_TYPE_SEND_RECV_BUF; 259 init_packet->msg.v1_msg.send_recv_buf. 260 gpadl_handle = net_device->recv_buf_gpadl_handle; 261 init_packet->msg.v1_msg. 262 send_recv_buf.id = NETVSC_RECEIVE_BUFFER_ID; 263 264 /* Send the gpadl notification request */ 265 ret = vmbus_sendpacket(device->channel, init_packet, 266 sizeof(struct nvsp_message), 267 (unsigned long)init_packet, 268 VM_PKT_DATA_INBAND, 269 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED); 270 if (ret != 0) { 271 netdev_err(ndev, 272 "unable to send receive buffer's gpadl to netvsp\n"); 273 goto cleanup; 274 } 275 276 t = wait_for_completion_timeout(&net_device->channel_init_wait, 5*HZ); 277 BUG_ON(t == 0); 278 279 280 /* Check the response */ 281 if (init_packet->msg.v1_msg. 282 send_recv_buf_complete.status != NVSP_STAT_SUCCESS) { 283 netdev_err(ndev, "Unable to complete receive buffer " 284 "initialization with NetVsp - status %d\n", 285 init_packet->msg.v1_msg. 286 send_recv_buf_complete.status); 287 ret = -EINVAL; 288 goto cleanup; 289 } 290 291 /* Parse the response */ 292 293 net_device->recv_section_cnt = init_packet->msg. 294 v1_msg.send_recv_buf_complete.num_sections; 295 296 net_device->recv_section = kmemdup( 297 init_packet->msg.v1_msg.send_recv_buf_complete.sections, 298 net_device->recv_section_cnt * 299 sizeof(struct nvsp_1_receive_buffer_section), 300 GFP_KERNEL); 301 if (net_device->recv_section == NULL) { 302 ret = -EINVAL; 303 goto cleanup; 304 } 305 306 /* 307 * For 1st release, there should only be 1 section that represents the 308 * entire receive buffer 309 */ 310 if (net_device->recv_section_cnt != 1 || 311 net_device->recv_section->offset != 0) { 312 ret = -EINVAL; 313 goto cleanup; 314 } 315 316 /* Now setup the send buffer. 317 */ 318 net_device->send_buf = vzalloc(net_device->send_buf_size); 319 if (!net_device->send_buf) { 320 netdev_err(ndev, "unable to allocate send " 321 "buffer of size %d\n", net_device->send_buf_size); 322 ret = -ENOMEM; 323 goto cleanup; 324 } 325 326 /* Establish the gpadl handle for this buffer on this 327 * channel. Note: This call uses the vmbus connection rather 328 * than the channel to establish the gpadl handle. 329 */ 330 ret = vmbus_establish_gpadl(device->channel, net_device->send_buf, 331 net_device->send_buf_size, 332 &net_device->send_buf_gpadl_handle); 333 if (ret != 0) { 334 netdev_err(ndev, 335 "unable to establish send buffer's gpadl\n"); 336 goto cleanup; 337 } 338 339 /* Notify the NetVsp of the gpadl handle */ 340 init_packet = &net_device->channel_init_pkt; 341 memset(init_packet, 0, sizeof(struct nvsp_message)); 342 init_packet->hdr.msg_type = NVSP_MSG1_TYPE_SEND_SEND_BUF; 343 init_packet->msg.v1_msg.send_send_buf.gpadl_handle = 344 net_device->send_buf_gpadl_handle; 345 init_packet->msg.v1_msg.send_send_buf.id = NETVSC_SEND_BUFFER_ID; 346 347 /* Send the gpadl notification request */ 348 ret = vmbus_sendpacket(device->channel, init_packet, 349 sizeof(struct nvsp_message), 350 (unsigned long)init_packet, 351 VM_PKT_DATA_INBAND, 352 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED); 353 if (ret != 0) { 354 netdev_err(ndev, 355 "unable to send send buffer's gpadl to netvsp\n"); 356 goto cleanup; 357 } 358 359 t = wait_for_completion_timeout(&net_device->channel_init_wait, 5*HZ); 360 BUG_ON(t == 0); 361 362 /* Check the response */ 363 if (init_packet->msg.v1_msg. 364 send_send_buf_complete.status != NVSP_STAT_SUCCESS) { 365 netdev_err(ndev, "Unable to complete send buffer " 366 "initialization with NetVsp - status %d\n", 367 init_packet->msg.v1_msg. 368 send_send_buf_complete.status); 369 ret = -EINVAL; 370 goto cleanup; 371 } 372 373 /* Parse the response */ 374 net_device->send_section_size = init_packet->msg. 375 v1_msg.send_send_buf_complete.section_size; 376 377 /* Section count is simply the size divided by the section size. 378 */ 379 net_device->send_section_cnt = 380 net_device->send_buf_size/net_device->send_section_size; 381 382 dev_info(&device->device, "Send section size: %d, Section count:%d\n", 383 net_device->send_section_size, net_device->send_section_cnt); 384 385 /* Setup state for managing the send buffer. */ 386 net_device->map_words = DIV_ROUND_UP(net_device->send_section_cnt, 387 BITS_PER_LONG); 388 389 net_device->send_section_map = 390 kzalloc(net_device->map_words * sizeof(ulong), GFP_KERNEL); 391 if (net_device->send_section_map == NULL) { 392 ret = -ENOMEM; 393 goto cleanup; 394 } 395 396 goto exit; 397 398 cleanup: 399 netvsc_destroy_buf(net_device); 400 401 exit: 402 return ret; 403 } 404 405 406 /* Negotiate NVSP protocol version */ 407 static int negotiate_nvsp_ver(struct hv_device *device, 408 struct netvsc_device *net_device, 409 struct nvsp_message *init_packet, 410 u32 nvsp_ver) 411 { 412 int ret, t; 413 414 memset(init_packet, 0, sizeof(struct nvsp_message)); 415 init_packet->hdr.msg_type = NVSP_MSG_TYPE_INIT; 416 init_packet->msg.init_msg.init.min_protocol_ver = nvsp_ver; 417 init_packet->msg.init_msg.init.max_protocol_ver = nvsp_ver; 418 419 /* Send the init request */ 420 ret = vmbus_sendpacket(device->channel, init_packet, 421 sizeof(struct nvsp_message), 422 (unsigned long)init_packet, 423 VM_PKT_DATA_INBAND, 424 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED); 425 426 if (ret != 0) 427 return ret; 428 429 t = wait_for_completion_timeout(&net_device->channel_init_wait, 5*HZ); 430 431 if (t == 0) 432 return -ETIMEDOUT; 433 434 if (init_packet->msg.init_msg.init_complete.status != 435 NVSP_STAT_SUCCESS) 436 return -EINVAL; 437 438 if (nvsp_ver == NVSP_PROTOCOL_VERSION_1) 439 return 0; 440 441 /* NVSPv2 only: Send NDIS config */ 442 memset(init_packet, 0, sizeof(struct nvsp_message)); 443 init_packet->hdr.msg_type = NVSP_MSG2_TYPE_SEND_NDIS_CONFIG; 444 init_packet->msg.v2_msg.send_ndis_config.mtu = net_device->ndev->mtu + 445 ETH_HLEN; 446 init_packet->msg.v2_msg.send_ndis_config.capability.ieee8021q = 1; 447 448 ret = vmbus_sendpacket(device->channel, init_packet, 449 sizeof(struct nvsp_message), 450 (unsigned long)init_packet, 451 VM_PKT_DATA_INBAND, 0); 452 453 return ret; 454 } 455 456 static int netvsc_connect_vsp(struct hv_device *device) 457 { 458 int ret; 459 struct netvsc_device *net_device; 460 struct nvsp_message *init_packet; 461 int ndis_version; 462 struct net_device *ndev; 463 u32 ver_list[] = { NVSP_PROTOCOL_VERSION_1, NVSP_PROTOCOL_VERSION_2, 464 NVSP_PROTOCOL_VERSION_4, NVSP_PROTOCOL_VERSION_5 }; 465 int i, num_ver = 4; /* number of different NVSP versions */ 466 467 net_device = get_outbound_net_device(device); 468 if (!net_device) 469 return -ENODEV; 470 ndev = net_device->ndev; 471 472 init_packet = &net_device->channel_init_pkt; 473 474 /* Negotiate the latest NVSP protocol supported */ 475 for (i = num_ver - 1; i >= 0; i--) 476 if (negotiate_nvsp_ver(device, net_device, init_packet, 477 ver_list[i]) == 0) { 478 net_device->nvsp_version = ver_list[i]; 479 break; 480 } 481 482 if (i < 0) { 483 ret = -EPROTO; 484 goto cleanup; 485 } 486 487 pr_debug("Negotiated NVSP version:%x\n", net_device->nvsp_version); 488 489 /* Send the ndis version */ 490 memset(init_packet, 0, sizeof(struct nvsp_message)); 491 492 if (net_device->nvsp_version <= NVSP_PROTOCOL_VERSION_4) 493 ndis_version = 0x00060001; 494 else 495 ndis_version = 0x0006001e; 496 497 init_packet->hdr.msg_type = NVSP_MSG1_TYPE_SEND_NDIS_VER; 498 init_packet->msg.v1_msg. 499 send_ndis_ver.ndis_major_ver = 500 (ndis_version & 0xFFFF0000) >> 16; 501 init_packet->msg.v1_msg. 502 send_ndis_ver.ndis_minor_ver = 503 ndis_version & 0xFFFF; 504 505 /* Send the init request */ 506 ret = vmbus_sendpacket(device->channel, init_packet, 507 sizeof(struct nvsp_message), 508 (unsigned long)init_packet, 509 VM_PKT_DATA_INBAND, 0); 510 if (ret != 0) 511 goto cleanup; 512 513 /* Post the big receive buffer to NetVSP */ 514 if (net_device->nvsp_version <= NVSP_PROTOCOL_VERSION_2) 515 net_device->recv_buf_size = NETVSC_RECEIVE_BUFFER_SIZE_LEGACY; 516 else 517 net_device->recv_buf_size = NETVSC_RECEIVE_BUFFER_SIZE; 518 net_device->send_buf_size = NETVSC_SEND_BUFFER_SIZE; 519 520 ret = netvsc_init_buf(device); 521 522 cleanup: 523 return ret; 524 } 525 526 static void netvsc_disconnect_vsp(struct netvsc_device *net_device) 527 { 528 netvsc_destroy_buf(net_device); 529 } 530 531 /* 532 * netvsc_device_remove - Callback when the root bus device is removed 533 */ 534 int netvsc_device_remove(struct hv_device *device) 535 { 536 struct netvsc_device *net_device; 537 unsigned long flags; 538 539 net_device = hv_get_drvdata(device); 540 541 netvsc_disconnect_vsp(net_device); 542 543 /* 544 * Since we have already drained, we don't need to busy wait 545 * as was done in final_release_stor_device() 546 * Note that we cannot set the ext pointer to NULL until 547 * we have drained - to drain the outgoing packets, we need to 548 * allow incoming packets. 549 */ 550 551 spin_lock_irqsave(&device->channel->inbound_lock, flags); 552 hv_set_drvdata(device, NULL); 553 spin_unlock_irqrestore(&device->channel->inbound_lock, flags); 554 555 /* 556 * At this point, no one should be accessing net_device 557 * except in here 558 */ 559 dev_notice(&device->device, "net device safe to remove\n"); 560 561 /* Now, we can close the channel safely */ 562 vmbus_close(device->channel); 563 564 /* Release all resources */ 565 vfree(net_device->sub_cb_buf); 566 free_netvsc_device(net_device); 567 return 0; 568 } 569 570 571 #define RING_AVAIL_PERCENT_HIWATER 20 572 #define RING_AVAIL_PERCENT_LOWATER 10 573 574 /* 575 * Get the percentage of available bytes to write in the ring. 576 * The return value is in range from 0 to 100. 577 */ 578 static inline u32 hv_ringbuf_avail_percent( 579 struct hv_ring_buffer_info *ring_info) 580 { 581 u32 avail_read, avail_write; 582 583 hv_get_ringbuffer_availbytes(ring_info, &avail_read, &avail_write); 584 585 return avail_write * 100 / ring_info->ring_datasize; 586 } 587 588 static inline void netvsc_free_send_slot(struct netvsc_device *net_device, 589 u32 index) 590 { 591 sync_change_bit(index, net_device->send_section_map); 592 } 593 594 static void netvsc_send_completion(struct netvsc_device *net_device, 595 struct hv_device *device, 596 struct vmpacket_descriptor *packet) 597 { 598 struct nvsp_message *nvsp_packet; 599 struct hv_netvsc_packet *nvsc_packet; 600 struct net_device *ndev; 601 u32 send_index; 602 603 ndev = net_device->ndev; 604 605 nvsp_packet = (struct nvsp_message *)((unsigned long)packet + 606 (packet->offset8 << 3)); 607 608 if ((nvsp_packet->hdr.msg_type == NVSP_MSG_TYPE_INIT_COMPLETE) || 609 (nvsp_packet->hdr.msg_type == 610 NVSP_MSG1_TYPE_SEND_RECV_BUF_COMPLETE) || 611 (nvsp_packet->hdr.msg_type == 612 NVSP_MSG1_TYPE_SEND_SEND_BUF_COMPLETE) || 613 (nvsp_packet->hdr.msg_type == 614 NVSP_MSG5_TYPE_SUBCHANNEL)) { 615 /* Copy the response back */ 616 memcpy(&net_device->channel_init_pkt, nvsp_packet, 617 sizeof(struct nvsp_message)); 618 complete(&net_device->channel_init_wait); 619 } else if (nvsp_packet->hdr.msg_type == 620 NVSP_MSG1_TYPE_SEND_RNDIS_PKT_COMPLETE) { 621 int num_outstanding_sends; 622 u16 q_idx = 0; 623 struct vmbus_channel *channel = device->channel; 624 int queue_sends; 625 626 /* Get the send context */ 627 nvsc_packet = (struct hv_netvsc_packet *)(unsigned long) 628 packet->trans_id; 629 630 /* Notify the layer above us */ 631 if (nvsc_packet) { 632 send_index = nvsc_packet->send_buf_index; 633 if (send_index != NETVSC_INVALID_INDEX) 634 netvsc_free_send_slot(net_device, send_index); 635 q_idx = nvsc_packet->q_idx; 636 channel = nvsc_packet->channel; 637 nvsc_packet->send_completion(nvsc_packet-> 638 send_completion_ctx); 639 } 640 641 num_outstanding_sends = 642 atomic_dec_return(&net_device->num_outstanding_sends); 643 queue_sends = atomic_dec_return(&net_device-> 644 queue_sends[q_idx]); 645 646 if (net_device->destroy && num_outstanding_sends == 0) 647 wake_up(&net_device->wait_drain); 648 649 if (netif_tx_queue_stopped(netdev_get_tx_queue(ndev, q_idx)) && 650 !net_device->start_remove && 651 (hv_ringbuf_avail_percent(&channel->outbound) > 652 RING_AVAIL_PERCENT_HIWATER || queue_sends < 1)) 653 netif_tx_wake_queue(netdev_get_tx_queue( 654 ndev, q_idx)); 655 } else { 656 netdev_err(ndev, "Unknown send completion packet type- " 657 "%d received!!\n", nvsp_packet->hdr.msg_type); 658 } 659 660 } 661 662 static u32 netvsc_get_next_send_section(struct netvsc_device *net_device) 663 { 664 unsigned long index; 665 u32 max_words = net_device->map_words; 666 unsigned long *map_addr = (unsigned long *)net_device->send_section_map; 667 u32 section_cnt = net_device->send_section_cnt; 668 int ret_val = NETVSC_INVALID_INDEX; 669 int i; 670 int prev_val; 671 672 for (i = 0; i < max_words; i++) { 673 if (!~(map_addr[i])) 674 continue; 675 index = ffz(map_addr[i]); 676 prev_val = sync_test_and_set_bit(index, &map_addr[i]); 677 if (prev_val) 678 continue; 679 if ((index + (i * BITS_PER_LONG)) >= section_cnt) 680 break; 681 ret_val = (index + (i * BITS_PER_LONG)); 682 break; 683 } 684 return ret_val; 685 } 686 687 u32 netvsc_copy_to_send_buf(struct netvsc_device *net_device, 688 unsigned int section_index, 689 struct hv_netvsc_packet *packet) 690 { 691 char *start = net_device->send_buf; 692 char *dest = (start + (section_index * net_device->send_section_size)); 693 int i; 694 u32 msg_size = 0; 695 696 for (i = 0; i < packet->page_buf_cnt; i++) { 697 char *src = phys_to_virt(packet->page_buf[i].pfn << PAGE_SHIFT); 698 u32 offset = packet->page_buf[i].offset; 699 u32 len = packet->page_buf[i].len; 700 701 memcpy(dest, (src + offset), len); 702 msg_size += len; 703 dest += len; 704 } 705 return msg_size; 706 } 707 708 int netvsc_send(struct hv_device *device, 709 struct hv_netvsc_packet *packet) 710 { 711 struct netvsc_device *net_device; 712 int ret = 0; 713 struct nvsp_message sendMessage; 714 struct net_device *ndev; 715 struct vmbus_channel *out_channel = NULL; 716 u64 req_id; 717 unsigned int section_index = NETVSC_INVALID_INDEX; 718 u32 msg_size = 0; 719 struct sk_buff *skb; 720 u16 q_idx = packet->q_idx; 721 722 723 net_device = get_outbound_net_device(device); 724 if (!net_device) 725 return -ENODEV; 726 ndev = net_device->ndev; 727 728 sendMessage.hdr.msg_type = NVSP_MSG1_TYPE_SEND_RNDIS_PKT; 729 if (packet->is_data_pkt) { 730 /* 0 is RMC_DATA; */ 731 sendMessage.msg.v1_msg.send_rndis_pkt.channel_type = 0; 732 } else { 733 /* 1 is RMC_CONTROL; */ 734 sendMessage.msg.v1_msg.send_rndis_pkt.channel_type = 1; 735 } 736 737 /* Attempt to send via sendbuf */ 738 if (packet->total_data_buflen < net_device->send_section_size) { 739 section_index = netvsc_get_next_send_section(net_device); 740 if (section_index != NETVSC_INVALID_INDEX) { 741 msg_size = netvsc_copy_to_send_buf(net_device, 742 section_index, 743 packet); 744 skb = (struct sk_buff *) 745 (unsigned long)packet->send_completion_tid; 746 if (skb) 747 dev_kfree_skb_any(skb); 748 packet->page_buf_cnt = 0; 749 } 750 } 751 packet->send_buf_index = section_index; 752 753 754 sendMessage.msg.v1_msg.send_rndis_pkt.send_buf_section_index = 755 section_index; 756 sendMessage.msg.v1_msg.send_rndis_pkt.send_buf_section_size = msg_size; 757 758 if (packet->send_completion) 759 req_id = (ulong)packet; 760 else 761 req_id = 0; 762 763 out_channel = net_device->chn_table[packet->q_idx]; 764 if (out_channel == NULL) 765 out_channel = device->channel; 766 packet->channel = out_channel; 767 768 if (out_channel->rescind) 769 return -ENODEV; 770 771 if (packet->page_buf_cnt) { 772 ret = vmbus_sendpacket_pagebuffer(out_channel, 773 packet->page_buf, 774 packet->page_buf_cnt, 775 &sendMessage, 776 sizeof(struct nvsp_message), 777 req_id); 778 } else { 779 ret = vmbus_sendpacket(out_channel, &sendMessage, 780 sizeof(struct nvsp_message), 781 req_id, 782 VM_PKT_DATA_INBAND, 783 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED); 784 } 785 786 if (ret == 0) { 787 atomic_inc(&net_device->num_outstanding_sends); 788 atomic_inc(&net_device->queue_sends[q_idx]); 789 790 if (hv_ringbuf_avail_percent(&out_channel->outbound) < 791 RING_AVAIL_PERCENT_LOWATER) { 792 netif_tx_stop_queue(netdev_get_tx_queue( 793 ndev, q_idx)); 794 795 if (atomic_read(&net_device-> 796 queue_sends[q_idx]) < 1) 797 netif_tx_wake_queue(netdev_get_tx_queue( 798 ndev, q_idx)); 799 } 800 } else if (ret == -EAGAIN) { 801 netif_tx_stop_queue(netdev_get_tx_queue( 802 ndev, q_idx)); 803 if (atomic_read(&net_device->queue_sends[q_idx]) < 1) { 804 netif_tx_wake_queue(netdev_get_tx_queue( 805 ndev, q_idx)); 806 ret = -ENOSPC; 807 } 808 } else { 809 netdev_err(ndev, "Unable to send packet %p ret %d\n", 810 packet, ret); 811 } 812 813 return ret; 814 } 815 816 static void netvsc_send_recv_completion(struct hv_device *device, 817 struct vmbus_channel *channel, 818 struct netvsc_device *net_device, 819 u64 transaction_id, u32 status) 820 { 821 struct nvsp_message recvcompMessage; 822 int retries = 0; 823 int ret; 824 struct net_device *ndev; 825 826 ndev = net_device->ndev; 827 828 recvcompMessage.hdr.msg_type = 829 NVSP_MSG1_TYPE_SEND_RNDIS_PKT_COMPLETE; 830 831 recvcompMessage.msg.v1_msg.send_rndis_pkt_complete.status = status; 832 833 retry_send_cmplt: 834 /* Send the completion */ 835 ret = vmbus_sendpacket(channel, &recvcompMessage, 836 sizeof(struct nvsp_message), transaction_id, 837 VM_PKT_COMP, 0); 838 if (ret == 0) { 839 /* success */ 840 /* no-op */ 841 } else if (ret == -EAGAIN) { 842 /* no more room...wait a bit and attempt to retry 3 times */ 843 retries++; 844 netdev_err(ndev, "unable to send receive completion pkt" 845 " (tid %llx)...retrying %d\n", transaction_id, retries); 846 847 if (retries < 4) { 848 udelay(100); 849 goto retry_send_cmplt; 850 } else { 851 netdev_err(ndev, "unable to send receive " 852 "completion pkt (tid %llx)...give up retrying\n", 853 transaction_id); 854 } 855 } else { 856 netdev_err(ndev, "unable to send receive " 857 "completion pkt - %llx\n", transaction_id); 858 } 859 } 860 861 static void netvsc_receive(struct netvsc_device *net_device, 862 struct vmbus_channel *channel, 863 struct hv_device *device, 864 struct vmpacket_descriptor *packet) 865 { 866 struct vmtransfer_page_packet_header *vmxferpage_packet; 867 struct nvsp_message *nvsp_packet; 868 struct hv_netvsc_packet nv_pkt; 869 struct hv_netvsc_packet *netvsc_packet = &nv_pkt; 870 u32 status = NVSP_STAT_SUCCESS; 871 int i; 872 int count = 0; 873 struct net_device *ndev; 874 875 ndev = net_device->ndev; 876 877 /* 878 * All inbound packets other than send completion should be xfer page 879 * packet 880 */ 881 if (packet->type != VM_PKT_DATA_USING_XFER_PAGES) { 882 netdev_err(ndev, "Unknown packet type received - %d\n", 883 packet->type); 884 return; 885 } 886 887 nvsp_packet = (struct nvsp_message *)((unsigned long)packet + 888 (packet->offset8 << 3)); 889 890 /* Make sure this is a valid nvsp packet */ 891 if (nvsp_packet->hdr.msg_type != 892 NVSP_MSG1_TYPE_SEND_RNDIS_PKT) { 893 netdev_err(ndev, "Unknown nvsp packet type received-" 894 " %d\n", nvsp_packet->hdr.msg_type); 895 return; 896 } 897 898 vmxferpage_packet = (struct vmtransfer_page_packet_header *)packet; 899 900 if (vmxferpage_packet->xfer_pageset_id != NETVSC_RECEIVE_BUFFER_ID) { 901 netdev_err(ndev, "Invalid xfer page set id - " 902 "expecting %x got %x\n", NETVSC_RECEIVE_BUFFER_ID, 903 vmxferpage_packet->xfer_pageset_id); 904 return; 905 } 906 907 count = vmxferpage_packet->range_cnt; 908 netvsc_packet->device = device; 909 netvsc_packet->channel = channel; 910 911 /* Each range represents 1 RNDIS pkt that contains 1 ethernet frame */ 912 for (i = 0; i < count; i++) { 913 /* Initialize the netvsc packet */ 914 netvsc_packet->status = NVSP_STAT_SUCCESS; 915 netvsc_packet->data = (void *)((unsigned long)net_device-> 916 recv_buf + vmxferpage_packet->ranges[i].byte_offset); 917 netvsc_packet->total_data_buflen = 918 vmxferpage_packet->ranges[i].byte_count; 919 920 /* Pass it to the upper layer */ 921 rndis_filter_receive(device, netvsc_packet); 922 923 if (netvsc_packet->status != NVSP_STAT_SUCCESS) 924 status = NVSP_STAT_FAIL; 925 } 926 927 netvsc_send_recv_completion(device, channel, net_device, 928 vmxferpage_packet->d.trans_id, status); 929 } 930 931 932 static void netvsc_send_table(struct hv_device *hdev, 933 struct vmpacket_descriptor *vmpkt) 934 { 935 struct netvsc_device *nvscdev; 936 struct net_device *ndev; 937 struct nvsp_message *nvmsg; 938 int i; 939 u32 count, *tab; 940 941 nvscdev = get_outbound_net_device(hdev); 942 if (!nvscdev) 943 return; 944 ndev = nvscdev->ndev; 945 946 nvmsg = (struct nvsp_message *)((unsigned long)vmpkt + 947 (vmpkt->offset8 << 3)); 948 949 if (nvmsg->hdr.msg_type != NVSP_MSG5_TYPE_SEND_INDIRECTION_TABLE) 950 return; 951 952 count = nvmsg->msg.v5_msg.send_table.count; 953 if (count != VRSS_SEND_TAB_SIZE) { 954 netdev_err(ndev, "Received wrong send-table size:%u\n", count); 955 return; 956 } 957 958 tab = (u32 *)((unsigned long)&nvmsg->msg.v5_msg.send_table + 959 nvmsg->msg.v5_msg.send_table.offset); 960 961 for (i = 0; i < count; i++) 962 nvscdev->send_table[i] = tab[i]; 963 } 964 965 void netvsc_channel_cb(void *context) 966 { 967 int ret; 968 struct vmbus_channel *channel = (struct vmbus_channel *)context; 969 struct hv_device *device; 970 struct netvsc_device *net_device; 971 u32 bytes_recvd; 972 u64 request_id; 973 struct vmpacket_descriptor *desc; 974 unsigned char *buffer; 975 int bufferlen = NETVSC_PACKET_SIZE; 976 struct net_device *ndev; 977 978 if (channel->primary_channel != NULL) 979 device = channel->primary_channel->device_obj; 980 else 981 device = channel->device_obj; 982 983 net_device = get_inbound_net_device(device); 984 if (!net_device) 985 return; 986 ndev = net_device->ndev; 987 buffer = get_per_channel_state(channel); 988 989 do { 990 ret = vmbus_recvpacket_raw(channel, buffer, bufferlen, 991 &bytes_recvd, &request_id); 992 if (ret == 0) { 993 if (bytes_recvd > 0) { 994 desc = (struct vmpacket_descriptor *)buffer; 995 switch (desc->type) { 996 case VM_PKT_COMP: 997 netvsc_send_completion(net_device, 998 device, desc); 999 break; 1000 1001 case VM_PKT_DATA_USING_XFER_PAGES: 1002 netvsc_receive(net_device, channel, 1003 device, desc); 1004 break; 1005 1006 case VM_PKT_DATA_INBAND: 1007 netvsc_send_table(device, desc); 1008 break; 1009 1010 default: 1011 netdev_err(ndev, 1012 "unhandled packet type %d, " 1013 "tid %llx len %d\n", 1014 desc->type, request_id, 1015 bytes_recvd); 1016 break; 1017 } 1018 1019 } else { 1020 /* 1021 * We are done for this pass. 1022 */ 1023 break; 1024 } 1025 1026 } else if (ret == -ENOBUFS) { 1027 if (bufferlen > NETVSC_PACKET_SIZE) 1028 kfree(buffer); 1029 /* Handle large packet */ 1030 buffer = kmalloc(bytes_recvd, GFP_ATOMIC); 1031 if (buffer == NULL) { 1032 /* Try again next time around */ 1033 netdev_err(ndev, 1034 "unable to allocate buffer of size " 1035 "(%d)!!\n", bytes_recvd); 1036 break; 1037 } 1038 1039 bufferlen = bytes_recvd; 1040 } 1041 } while (1); 1042 1043 if (bufferlen > NETVSC_PACKET_SIZE) 1044 kfree(buffer); 1045 return; 1046 } 1047 1048 /* 1049 * netvsc_device_add - Callback when the device belonging to this 1050 * driver is added 1051 */ 1052 int netvsc_device_add(struct hv_device *device, void *additional_info) 1053 { 1054 int ret = 0; 1055 int ring_size = 1056 ((struct netvsc_device_info *)additional_info)->ring_size; 1057 struct netvsc_device *net_device; 1058 struct net_device *ndev; 1059 1060 net_device = alloc_net_device(device); 1061 if (!net_device) 1062 return -ENOMEM; 1063 1064 net_device->ring_size = ring_size; 1065 1066 /* 1067 * Coming into this function, struct net_device * is 1068 * registered as the driver private data. 1069 * In alloc_net_device(), we register struct netvsc_device * 1070 * as the driver private data and stash away struct net_device * 1071 * in struct netvsc_device *. 1072 */ 1073 ndev = net_device->ndev; 1074 1075 /* Initialize the NetVSC channel extension */ 1076 init_completion(&net_device->channel_init_wait); 1077 1078 set_per_channel_state(device->channel, net_device->cb_buffer); 1079 1080 /* Open the channel */ 1081 ret = vmbus_open(device->channel, ring_size * PAGE_SIZE, 1082 ring_size * PAGE_SIZE, NULL, 0, 1083 netvsc_channel_cb, device->channel); 1084 1085 if (ret != 0) { 1086 netdev_err(ndev, "unable to open channel: %d\n", ret); 1087 goto cleanup; 1088 } 1089 1090 /* Channel is opened */ 1091 pr_info("hv_netvsc channel opened successfully\n"); 1092 1093 net_device->chn_table[0] = device->channel; 1094 1095 /* Connect with the NetVsp */ 1096 ret = netvsc_connect_vsp(device); 1097 if (ret != 0) { 1098 netdev_err(ndev, 1099 "unable to connect to NetVSP - %d\n", ret); 1100 goto close; 1101 } 1102 1103 return ret; 1104 1105 close: 1106 /* Now, we can close the channel safely */ 1107 vmbus_close(device->channel); 1108 1109 cleanup: 1110 free_netvsc_device(net_device); 1111 1112 return ret; 1113 } 1114