xref: /openbmc/linux/drivers/net/hyperv/netvsc.c (revision c819e2cf)
1 /*
2  * Copyright (c) 2009, Microsoft Corporation.
3  *
4  * This program is free software; you can redistribute it and/or modify it
5  * under the terms and conditions of the GNU General Public License,
6  * version 2, as published by the Free Software Foundation.
7  *
8  * This program is distributed in the hope it will be useful, but WITHOUT
9  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
10  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for
11  * more details.
12  *
13  * You should have received a copy of the GNU General Public License along with
14  * this program; if not, see <http://www.gnu.org/licenses/>.
15  *
16  * Authors:
17  *   Haiyang Zhang <haiyangz@microsoft.com>
18  *   Hank Janssen  <hjanssen@microsoft.com>
19  */
20 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
21 
22 #include <linux/kernel.h>
23 #include <linux/sched.h>
24 #include <linux/wait.h>
25 #include <linux/mm.h>
26 #include <linux/delay.h>
27 #include <linux/io.h>
28 #include <linux/slab.h>
29 #include <linux/netdevice.h>
30 #include <linux/if_ether.h>
31 #include <asm/sync_bitops.h>
32 
33 #include "hyperv_net.h"
34 
35 
36 static struct netvsc_device *alloc_net_device(struct hv_device *device)
37 {
38 	struct netvsc_device *net_device;
39 	struct net_device *ndev = hv_get_drvdata(device);
40 
41 	net_device = kzalloc(sizeof(struct netvsc_device), GFP_KERNEL);
42 	if (!net_device)
43 		return NULL;
44 
45 	net_device->cb_buffer = kzalloc(NETVSC_PACKET_SIZE, GFP_KERNEL);
46 	if (!net_device->cb_buffer) {
47 		kfree(net_device);
48 		return NULL;
49 	}
50 
51 	init_waitqueue_head(&net_device->wait_drain);
52 	net_device->start_remove = false;
53 	net_device->destroy = false;
54 	net_device->dev = device;
55 	net_device->ndev = ndev;
56 
57 	hv_set_drvdata(device, net_device);
58 	return net_device;
59 }
60 
61 static void free_netvsc_device(struct netvsc_device *nvdev)
62 {
63 	kfree(nvdev->cb_buffer);
64 	kfree(nvdev);
65 }
66 
67 static struct netvsc_device *get_outbound_net_device(struct hv_device *device)
68 {
69 	struct netvsc_device *net_device;
70 
71 	net_device = hv_get_drvdata(device);
72 	if (net_device && net_device->destroy)
73 		net_device = NULL;
74 
75 	return net_device;
76 }
77 
78 static struct netvsc_device *get_inbound_net_device(struct hv_device *device)
79 {
80 	struct netvsc_device *net_device;
81 
82 	net_device = hv_get_drvdata(device);
83 
84 	if (!net_device)
85 		goto get_in_err;
86 
87 	if (net_device->destroy &&
88 		atomic_read(&net_device->num_outstanding_sends) == 0)
89 		net_device = NULL;
90 
91 get_in_err:
92 	return net_device;
93 }
94 
95 
96 static int netvsc_destroy_buf(struct netvsc_device *net_device)
97 {
98 	struct nvsp_message *revoke_packet;
99 	int ret = 0;
100 	struct net_device *ndev = net_device->ndev;
101 
102 	/*
103 	 * If we got a section count, it means we received a
104 	 * SendReceiveBufferComplete msg (ie sent
105 	 * NvspMessage1TypeSendReceiveBuffer msg) therefore, we need
106 	 * to send a revoke msg here
107 	 */
108 	if (net_device->recv_section_cnt) {
109 		/* Send the revoke receive buffer */
110 		revoke_packet = &net_device->revoke_packet;
111 		memset(revoke_packet, 0, sizeof(struct nvsp_message));
112 
113 		revoke_packet->hdr.msg_type =
114 			NVSP_MSG1_TYPE_REVOKE_RECV_BUF;
115 		revoke_packet->msg.v1_msg.
116 		revoke_recv_buf.id = NETVSC_RECEIVE_BUFFER_ID;
117 
118 		ret = vmbus_sendpacket(net_device->dev->channel,
119 				       revoke_packet,
120 				       sizeof(struct nvsp_message),
121 				       (unsigned long)revoke_packet,
122 				       VM_PKT_DATA_INBAND, 0);
123 		/*
124 		 * If we failed here, we might as well return and
125 		 * have a leak rather than continue and a bugchk
126 		 */
127 		if (ret != 0) {
128 			netdev_err(ndev, "unable to send "
129 				"revoke receive buffer to netvsp\n");
130 			return ret;
131 		}
132 	}
133 
134 	/* Teardown the gpadl on the vsp end */
135 	if (net_device->recv_buf_gpadl_handle) {
136 		ret = vmbus_teardown_gpadl(net_device->dev->channel,
137 			   net_device->recv_buf_gpadl_handle);
138 
139 		/* If we failed here, we might as well return and have a leak
140 		 * rather than continue and a bugchk
141 		 */
142 		if (ret != 0) {
143 			netdev_err(ndev,
144 				   "unable to teardown receive buffer's gpadl\n");
145 			return ret;
146 		}
147 		net_device->recv_buf_gpadl_handle = 0;
148 	}
149 
150 	if (net_device->recv_buf) {
151 		/* Free up the receive buffer */
152 		vfree(net_device->recv_buf);
153 		net_device->recv_buf = NULL;
154 	}
155 
156 	if (net_device->recv_section) {
157 		net_device->recv_section_cnt = 0;
158 		kfree(net_device->recv_section);
159 		net_device->recv_section = NULL;
160 	}
161 
162 	/* Deal with the send buffer we may have setup.
163 	 * If we got a  send section size, it means we received a
164 	 * NVSP_MSG1_TYPE_SEND_SEND_BUF_COMPLETE msg (ie sent
165 	 * NVSP_MSG1_TYPE_SEND_SEND_BUF msg) therefore, we need
166 	 * to send a revoke msg here
167 	 */
168 	if (net_device->send_section_size) {
169 		/* Send the revoke receive buffer */
170 		revoke_packet = &net_device->revoke_packet;
171 		memset(revoke_packet, 0, sizeof(struct nvsp_message));
172 
173 		revoke_packet->hdr.msg_type =
174 			NVSP_MSG1_TYPE_REVOKE_SEND_BUF;
175 		revoke_packet->msg.v1_msg.revoke_send_buf.id =
176 			NETVSC_SEND_BUFFER_ID;
177 
178 		ret = vmbus_sendpacket(net_device->dev->channel,
179 				       revoke_packet,
180 				       sizeof(struct nvsp_message),
181 				       (unsigned long)revoke_packet,
182 				       VM_PKT_DATA_INBAND, 0);
183 		/* If we failed here, we might as well return and
184 		 * have a leak rather than continue and a bugchk
185 		 */
186 		if (ret != 0) {
187 			netdev_err(ndev, "unable to send "
188 				   "revoke send buffer to netvsp\n");
189 			return ret;
190 		}
191 	}
192 	/* Teardown the gpadl on the vsp end */
193 	if (net_device->send_buf_gpadl_handle) {
194 		ret = vmbus_teardown_gpadl(net_device->dev->channel,
195 					   net_device->send_buf_gpadl_handle);
196 
197 		/* If we failed here, we might as well return and have a leak
198 		 * rather than continue and a bugchk
199 		 */
200 		if (ret != 0) {
201 			netdev_err(ndev,
202 				   "unable to teardown send buffer's gpadl\n");
203 			return ret;
204 		}
205 		net_device->send_buf_gpadl_handle = 0;
206 	}
207 	if (net_device->send_buf) {
208 		/* Free up the send buffer */
209 		vfree(net_device->send_buf);
210 		net_device->send_buf = NULL;
211 	}
212 	kfree(net_device->send_section_map);
213 
214 	return ret;
215 }
216 
217 static int netvsc_init_buf(struct hv_device *device)
218 {
219 	int ret = 0;
220 	int t;
221 	struct netvsc_device *net_device;
222 	struct nvsp_message *init_packet;
223 	struct net_device *ndev;
224 
225 	net_device = get_outbound_net_device(device);
226 	if (!net_device)
227 		return -ENODEV;
228 	ndev = net_device->ndev;
229 
230 	net_device->recv_buf = vzalloc(net_device->recv_buf_size);
231 	if (!net_device->recv_buf) {
232 		netdev_err(ndev, "unable to allocate receive "
233 			"buffer of size %d\n", net_device->recv_buf_size);
234 		ret = -ENOMEM;
235 		goto cleanup;
236 	}
237 
238 	/*
239 	 * Establish the gpadl handle for this buffer on this
240 	 * channel.  Note: This call uses the vmbus connection rather
241 	 * than the channel to establish the gpadl handle.
242 	 */
243 	ret = vmbus_establish_gpadl(device->channel, net_device->recv_buf,
244 				    net_device->recv_buf_size,
245 				    &net_device->recv_buf_gpadl_handle);
246 	if (ret != 0) {
247 		netdev_err(ndev,
248 			"unable to establish receive buffer's gpadl\n");
249 		goto cleanup;
250 	}
251 
252 
253 	/* Notify the NetVsp of the gpadl handle */
254 	init_packet = &net_device->channel_init_pkt;
255 
256 	memset(init_packet, 0, sizeof(struct nvsp_message));
257 
258 	init_packet->hdr.msg_type = NVSP_MSG1_TYPE_SEND_RECV_BUF;
259 	init_packet->msg.v1_msg.send_recv_buf.
260 		gpadl_handle = net_device->recv_buf_gpadl_handle;
261 	init_packet->msg.v1_msg.
262 		send_recv_buf.id = NETVSC_RECEIVE_BUFFER_ID;
263 
264 	/* Send the gpadl notification request */
265 	ret = vmbus_sendpacket(device->channel, init_packet,
266 			       sizeof(struct nvsp_message),
267 			       (unsigned long)init_packet,
268 			       VM_PKT_DATA_INBAND,
269 			       VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
270 	if (ret != 0) {
271 		netdev_err(ndev,
272 			"unable to send receive buffer's gpadl to netvsp\n");
273 		goto cleanup;
274 	}
275 
276 	t = wait_for_completion_timeout(&net_device->channel_init_wait, 5*HZ);
277 	BUG_ON(t == 0);
278 
279 
280 	/* Check the response */
281 	if (init_packet->msg.v1_msg.
282 	    send_recv_buf_complete.status != NVSP_STAT_SUCCESS) {
283 		netdev_err(ndev, "Unable to complete receive buffer "
284 			   "initialization with NetVsp - status %d\n",
285 			   init_packet->msg.v1_msg.
286 			   send_recv_buf_complete.status);
287 		ret = -EINVAL;
288 		goto cleanup;
289 	}
290 
291 	/* Parse the response */
292 
293 	net_device->recv_section_cnt = init_packet->msg.
294 		v1_msg.send_recv_buf_complete.num_sections;
295 
296 	net_device->recv_section = kmemdup(
297 		init_packet->msg.v1_msg.send_recv_buf_complete.sections,
298 		net_device->recv_section_cnt *
299 		sizeof(struct nvsp_1_receive_buffer_section),
300 		GFP_KERNEL);
301 	if (net_device->recv_section == NULL) {
302 		ret = -EINVAL;
303 		goto cleanup;
304 	}
305 
306 	/*
307 	 * For 1st release, there should only be 1 section that represents the
308 	 * entire receive buffer
309 	 */
310 	if (net_device->recv_section_cnt != 1 ||
311 	    net_device->recv_section->offset != 0) {
312 		ret = -EINVAL;
313 		goto cleanup;
314 	}
315 
316 	/* Now setup the send buffer.
317 	 */
318 	net_device->send_buf = vzalloc(net_device->send_buf_size);
319 	if (!net_device->send_buf) {
320 		netdev_err(ndev, "unable to allocate send "
321 			   "buffer of size %d\n", net_device->send_buf_size);
322 		ret = -ENOMEM;
323 		goto cleanup;
324 	}
325 
326 	/* Establish the gpadl handle for this buffer on this
327 	 * channel.  Note: This call uses the vmbus connection rather
328 	 * than the channel to establish the gpadl handle.
329 	 */
330 	ret = vmbus_establish_gpadl(device->channel, net_device->send_buf,
331 				    net_device->send_buf_size,
332 				    &net_device->send_buf_gpadl_handle);
333 	if (ret != 0) {
334 		netdev_err(ndev,
335 			   "unable to establish send buffer's gpadl\n");
336 		goto cleanup;
337 	}
338 
339 	/* Notify the NetVsp of the gpadl handle */
340 	init_packet = &net_device->channel_init_pkt;
341 	memset(init_packet, 0, sizeof(struct nvsp_message));
342 	init_packet->hdr.msg_type = NVSP_MSG1_TYPE_SEND_SEND_BUF;
343 	init_packet->msg.v1_msg.send_send_buf.gpadl_handle =
344 		net_device->send_buf_gpadl_handle;
345 	init_packet->msg.v1_msg.send_send_buf.id = NETVSC_SEND_BUFFER_ID;
346 
347 	/* Send the gpadl notification request */
348 	ret = vmbus_sendpacket(device->channel, init_packet,
349 			       sizeof(struct nvsp_message),
350 			       (unsigned long)init_packet,
351 			       VM_PKT_DATA_INBAND,
352 			       VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
353 	if (ret != 0) {
354 		netdev_err(ndev,
355 			   "unable to send send buffer's gpadl to netvsp\n");
356 		goto cleanup;
357 	}
358 
359 	t = wait_for_completion_timeout(&net_device->channel_init_wait, 5*HZ);
360 	BUG_ON(t == 0);
361 
362 	/* Check the response */
363 	if (init_packet->msg.v1_msg.
364 	    send_send_buf_complete.status != NVSP_STAT_SUCCESS) {
365 		netdev_err(ndev, "Unable to complete send buffer "
366 			   "initialization with NetVsp - status %d\n",
367 			   init_packet->msg.v1_msg.
368 			   send_send_buf_complete.status);
369 		ret = -EINVAL;
370 		goto cleanup;
371 	}
372 
373 	/* Parse the response */
374 	net_device->send_section_size = init_packet->msg.
375 				v1_msg.send_send_buf_complete.section_size;
376 
377 	/* Section count is simply the size divided by the section size.
378 	 */
379 	net_device->send_section_cnt =
380 		net_device->send_buf_size/net_device->send_section_size;
381 
382 	dev_info(&device->device, "Send section size: %d, Section count:%d\n",
383 		 net_device->send_section_size, net_device->send_section_cnt);
384 
385 	/* Setup state for managing the send buffer. */
386 	net_device->map_words = DIV_ROUND_UP(net_device->send_section_cnt,
387 					     BITS_PER_LONG);
388 
389 	net_device->send_section_map =
390 		kzalloc(net_device->map_words * sizeof(ulong), GFP_KERNEL);
391 	if (net_device->send_section_map == NULL) {
392 		ret = -ENOMEM;
393 		goto cleanup;
394 	}
395 
396 	goto exit;
397 
398 cleanup:
399 	netvsc_destroy_buf(net_device);
400 
401 exit:
402 	return ret;
403 }
404 
405 
406 /* Negotiate NVSP protocol version */
407 static int negotiate_nvsp_ver(struct hv_device *device,
408 			      struct netvsc_device *net_device,
409 			      struct nvsp_message *init_packet,
410 			      u32 nvsp_ver)
411 {
412 	int ret, t;
413 
414 	memset(init_packet, 0, sizeof(struct nvsp_message));
415 	init_packet->hdr.msg_type = NVSP_MSG_TYPE_INIT;
416 	init_packet->msg.init_msg.init.min_protocol_ver = nvsp_ver;
417 	init_packet->msg.init_msg.init.max_protocol_ver = nvsp_ver;
418 
419 	/* Send the init request */
420 	ret = vmbus_sendpacket(device->channel, init_packet,
421 			       sizeof(struct nvsp_message),
422 			       (unsigned long)init_packet,
423 			       VM_PKT_DATA_INBAND,
424 			       VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
425 
426 	if (ret != 0)
427 		return ret;
428 
429 	t = wait_for_completion_timeout(&net_device->channel_init_wait, 5*HZ);
430 
431 	if (t == 0)
432 		return -ETIMEDOUT;
433 
434 	if (init_packet->msg.init_msg.init_complete.status !=
435 	    NVSP_STAT_SUCCESS)
436 		return -EINVAL;
437 
438 	if (nvsp_ver == NVSP_PROTOCOL_VERSION_1)
439 		return 0;
440 
441 	/* NVSPv2 only: Send NDIS config */
442 	memset(init_packet, 0, sizeof(struct nvsp_message));
443 	init_packet->hdr.msg_type = NVSP_MSG2_TYPE_SEND_NDIS_CONFIG;
444 	init_packet->msg.v2_msg.send_ndis_config.mtu = net_device->ndev->mtu +
445 						       ETH_HLEN;
446 	init_packet->msg.v2_msg.send_ndis_config.capability.ieee8021q = 1;
447 
448 	ret = vmbus_sendpacket(device->channel, init_packet,
449 				sizeof(struct nvsp_message),
450 				(unsigned long)init_packet,
451 				VM_PKT_DATA_INBAND, 0);
452 
453 	return ret;
454 }
455 
456 static int netvsc_connect_vsp(struct hv_device *device)
457 {
458 	int ret;
459 	struct netvsc_device *net_device;
460 	struct nvsp_message *init_packet;
461 	int ndis_version;
462 	struct net_device *ndev;
463 	u32 ver_list[] = { NVSP_PROTOCOL_VERSION_1, NVSP_PROTOCOL_VERSION_2,
464 		NVSP_PROTOCOL_VERSION_4, NVSP_PROTOCOL_VERSION_5 };
465 	int i, num_ver = 4; /* number of different NVSP versions */
466 
467 	net_device = get_outbound_net_device(device);
468 	if (!net_device)
469 		return -ENODEV;
470 	ndev = net_device->ndev;
471 
472 	init_packet = &net_device->channel_init_pkt;
473 
474 	/* Negotiate the latest NVSP protocol supported */
475 	for (i = num_ver - 1; i >= 0; i--)
476 		if (negotiate_nvsp_ver(device, net_device, init_packet,
477 				       ver_list[i])  == 0) {
478 			net_device->nvsp_version = ver_list[i];
479 			break;
480 		}
481 
482 	if (i < 0) {
483 		ret = -EPROTO;
484 		goto cleanup;
485 	}
486 
487 	pr_debug("Negotiated NVSP version:%x\n", net_device->nvsp_version);
488 
489 	/* Send the ndis version */
490 	memset(init_packet, 0, sizeof(struct nvsp_message));
491 
492 	if (net_device->nvsp_version <= NVSP_PROTOCOL_VERSION_4)
493 		ndis_version = 0x00060001;
494 	else
495 		ndis_version = 0x0006001e;
496 
497 	init_packet->hdr.msg_type = NVSP_MSG1_TYPE_SEND_NDIS_VER;
498 	init_packet->msg.v1_msg.
499 		send_ndis_ver.ndis_major_ver =
500 				(ndis_version & 0xFFFF0000) >> 16;
501 	init_packet->msg.v1_msg.
502 		send_ndis_ver.ndis_minor_ver =
503 				ndis_version & 0xFFFF;
504 
505 	/* Send the init request */
506 	ret = vmbus_sendpacket(device->channel, init_packet,
507 				sizeof(struct nvsp_message),
508 				(unsigned long)init_packet,
509 				VM_PKT_DATA_INBAND, 0);
510 	if (ret != 0)
511 		goto cleanup;
512 
513 	/* Post the big receive buffer to NetVSP */
514 	if (net_device->nvsp_version <= NVSP_PROTOCOL_VERSION_2)
515 		net_device->recv_buf_size = NETVSC_RECEIVE_BUFFER_SIZE_LEGACY;
516 	else
517 		net_device->recv_buf_size = NETVSC_RECEIVE_BUFFER_SIZE;
518 	net_device->send_buf_size = NETVSC_SEND_BUFFER_SIZE;
519 
520 	ret = netvsc_init_buf(device);
521 
522 cleanup:
523 	return ret;
524 }
525 
526 static void netvsc_disconnect_vsp(struct netvsc_device *net_device)
527 {
528 	netvsc_destroy_buf(net_device);
529 }
530 
531 /*
532  * netvsc_device_remove - Callback when the root bus device is removed
533  */
534 int netvsc_device_remove(struct hv_device *device)
535 {
536 	struct netvsc_device *net_device;
537 	unsigned long flags;
538 
539 	net_device = hv_get_drvdata(device);
540 
541 	netvsc_disconnect_vsp(net_device);
542 
543 	/*
544 	 * Since we have already drained, we don't need to busy wait
545 	 * as was done in final_release_stor_device()
546 	 * Note that we cannot set the ext pointer to NULL until
547 	 * we have drained - to drain the outgoing packets, we need to
548 	 * allow incoming packets.
549 	 */
550 
551 	spin_lock_irqsave(&device->channel->inbound_lock, flags);
552 	hv_set_drvdata(device, NULL);
553 	spin_unlock_irqrestore(&device->channel->inbound_lock, flags);
554 
555 	/*
556 	 * At this point, no one should be accessing net_device
557 	 * except in here
558 	 */
559 	dev_notice(&device->device, "net device safe to remove\n");
560 
561 	/* Now, we can close the channel safely */
562 	vmbus_close(device->channel);
563 
564 	/* Release all resources */
565 	vfree(net_device->sub_cb_buf);
566 	free_netvsc_device(net_device);
567 	return 0;
568 }
569 
570 
571 #define RING_AVAIL_PERCENT_HIWATER 20
572 #define RING_AVAIL_PERCENT_LOWATER 10
573 
574 /*
575  * Get the percentage of available bytes to write in the ring.
576  * The return value is in range from 0 to 100.
577  */
578 static inline u32 hv_ringbuf_avail_percent(
579 		struct hv_ring_buffer_info *ring_info)
580 {
581 	u32 avail_read, avail_write;
582 
583 	hv_get_ringbuffer_availbytes(ring_info, &avail_read, &avail_write);
584 
585 	return avail_write * 100 / ring_info->ring_datasize;
586 }
587 
588 static inline void netvsc_free_send_slot(struct netvsc_device *net_device,
589 					 u32 index)
590 {
591 	sync_change_bit(index, net_device->send_section_map);
592 }
593 
594 static void netvsc_send_completion(struct netvsc_device *net_device,
595 				   struct hv_device *device,
596 				   struct vmpacket_descriptor *packet)
597 {
598 	struct nvsp_message *nvsp_packet;
599 	struct hv_netvsc_packet *nvsc_packet;
600 	struct net_device *ndev;
601 	u32 send_index;
602 
603 	ndev = net_device->ndev;
604 
605 	nvsp_packet = (struct nvsp_message *)((unsigned long)packet +
606 			(packet->offset8 << 3));
607 
608 	if ((nvsp_packet->hdr.msg_type == NVSP_MSG_TYPE_INIT_COMPLETE) ||
609 	    (nvsp_packet->hdr.msg_type ==
610 	     NVSP_MSG1_TYPE_SEND_RECV_BUF_COMPLETE) ||
611 	    (nvsp_packet->hdr.msg_type ==
612 	     NVSP_MSG1_TYPE_SEND_SEND_BUF_COMPLETE) ||
613 	    (nvsp_packet->hdr.msg_type ==
614 	     NVSP_MSG5_TYPE_SUBCHANNEL)) {
615 		/* Copy the response back */
616 		memcpy(&net_device->channel_init_pkt, nvsp_packet,
617 		       sizeof(struct nvsp_message));
618 		complete(&net_device->channel_init_wait);
619 	} else if (nvsp_packet->hdr.msg_type ==
620 		   NVSP_MSG1_TYPE_SEND_RNDIS_PKT_COMPLETE) {
621 		int num_outstanding_sends;
622 		u16 q_idx = 0;
623 		struct vmbus_channel *channel = device->channel;
624 		int queue_sends;
625 
626 		/* Get the send context */
627 		nvsc_packet = (struct hv_netvsc_packet *)(unsigned long)
628 			packet->trans_id;
629 
630 		/* Notify the layer above us */
631 		if (nvsc_packet) {
632 			send_index = nvsc_packet->send_buf_index;
633 			if (send_index != NETVSC_INVALID_INDEX)
634 				netvsc_free_send_slot(net_device, send_index);
635 			q_idx = nvsc_packet->q_idx;
636 			channel = nvsc_packet->channel;
637 			nvsc_packet->send_completion(nvsc_packet->
638 						     send_completion_ctx);
639 		}
640 
641 		num_outstanding_sends =
642 			atomic_dec_return(&net_device->num_outstanding_sends);
643 		queue_sends = atomic_dec_return(&net_device->
644 						queue_sends[q_idx]);
645 
646 		if (net_device->destroy && num_outstanding_sends == 0)
647 			wake_up(&net_device->wait_drain);
648 
649 		if (netif_tx_queue_stopped(netdev_get_tx_queue(ndev, q_idx)) &&
650 		    !net_device->start_remove &&
651 		    (hv_ringbuf_avail_percent(&channel->outbound) >
652 		     RING_AVAIL_PERCENT_HIWATER || queue_sends < 1))
653 				netif_tx_wake_queue(netdev_get_tx_queue(
654 						    ndev, q_idx));
655 	} else {
656 		netdev_err(ndev, "Unknown send completion packet type- "
657 			   "%d received!!\n", nvsp_packet->hdr.msg_type);
658 	}
659 
660 }
661 
662 static u32 netvsc_get_next_send_section(struct netvsc_device *net_device)
663 {
664 	unsigned long index;
665 	u32 max_words = net_device->map_words;
666 	unsigned long *map_addr = (unsigned long *)net_device->send_section_map;
667 	u32 section_cnt = net_device->send_section_cnt;
668 	int ret_val = NETVSC_INVALID_INDEX;
669 	int i;
670 	int prev_val;
671 
672 	for (i = 0; i < max_words; i++) {
673 		if (!~(map_addr[i]))
674 			continue;
675 		index = ffz(map_addr[i]);
676 		prev_val = sync_test_and_set_bit(index, &map_addr[i]);
677 		if (prev_val)
678 			continue;
679 		if ((index + (i * BITS_PER_LONG)) >= section_cnt)
680 			break;
681 		ret_val = (index + (i * BITS_PER_LONG));
682 		break;
683 	}
684 	return ret_val;
685 }
686 
687 u32 netvsc_copy_to_send_buf(struct netvsc_device *net_device,
688 			    unsigned int section_index,
689 			    struct hv_netvsc_packet *packet)
690 {
691 	char *start = net_device->send_buf;
692 	char *dest = (start + (section_index * net_device->send_section_size));
693 	int i;
694 	u32 msg_size = 0;
695 
696 	for (i = 0; i < packet->page_buf_cnt; i++) {
697 		char *src = phys_to_virt(packet->page_buf[i].pfn << PAGE_SHIFT);
698 		u32 offset = packet->page_buf[i].offset;
699 		u32 len = packet->page_buf[i].len;
700 
701 		memcpy(dest, (src + offset), len);
702 		msg_size += len;
703 		dest += len;
704 	}
705 	return msg_size;
706 }
707 
708 int netvsc_send(struct hv_device *device,
709 			struct hv_netvsc_packet *packet)
710 {
711 	struct netvsc_device *net_device;
712 	int ret = 0;
713 	struct nvsp_message sendMessage;
714 	struct net_device *ndev;
715 	struct vmbus_channel *out_channel = NULL;
716 	u64 req_id;
717 	unsigned int section_index = NETVSC_INVALID_INDEX;
718 	u32 msg_size = 0;
719 	struct sk_buff *skb;
720 	u16 q_idx = packet->q_idx;
721 
722 
723 	net_device = get_outbound_net_device(device);
724 	if (!net_device)
725 		return -ENODEV;
726 	ndev = net_device->ndev;
727 
728 	sendMessage.hdr.msg_type = NVSP_MSG1_TYPE_SEND_RNDIS_PKT;
729 	if (packet->is_data_pkt) {
730 		/* 0 is RMC_DATA; */
731 		sendMessage.msg.v1_msg.send_rndis_pkt.channel_type = 0;
732 	} else {
733 		/* 1 is RMC_CONTROL; */
734 		sendMessage.msg.v1_msg.send_rndis_pkt.channel_type = 1;
735 	}
736 
737 	/* Attempt to send via sendbuf */
738 	if (packet->total_data_buflen < net_device->send_section_size) {
739 		section_index = netvsc_get_next_send_section(net_device);
740 		if (section_index != NETVSC_INVALID_INDEX) {
741 			msg_size = netvsc_copy_to_send_buf(net_device,
742 							   section_index,
743 							   packet);
744 			skb = (struct sk_buff *)
745 			      (unsigned long)packet->send_completion_tid;
746 			if (skb)
747 				dev_kfree_skb_any(skb);
748 			packet->page_buf_cnt = 0;
749 		}
750 	}
751 	packet->send_buf_index = section_index;
752 
753 
754 	sendMessage.msg.v1_msg.send_rndis_pkt.send_buf_section_index =
755 		section_index;
756 	sendMessage.msg.v1_msg.send_rndis_pkt.send_buf_section_size = msg_size;
757 
758 	if (packet->send_completion)
759 		req_id = (ulong)packet;
760 	else
761 		req_id = 0;
762 
763 	out_channel = net_device->chn_table[packet->q_idx];
764 	if (out_channel == NULL)
765 		out_channel = device->channel;
766 	packet->channel = out_channel;
767 
768 	if (out_channel->rescind)
769 		return -ENODEV;
770 
771 	if (packet->page_buf_cnt) {
772 		ret = vmbus_sendpacket_pagebuffer(out_channel,
773 						  packet->page_buf,
774 						  packet->page_buf_cnt,
775 						  &sendMessage,
776 						  sizeof(struct nvsp_message),
777 						  req_id);
778 	} else {
779 		ret = vmbus_sendpacket(out_channel, &sendMessage,
780 				sizeof(struct nvsp_message),
781 				req_id,
782 				VM_PKT_DATA_INBAND,
783 				VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
784 	}
785 
786 	if (ret == 0) {
787 		atomic_inc(&net_device->num_outstanding_sends);
788 		atomic_inc(&net_device->queue_sends[q_idx]);
789 
790 		if (hv_ringbuf_avail_percent(&out_channel->outbound) <
791 			RING_AVAIL_PERCENT_LOWATER) {
792 			netif_tx_stop_queue(netdev_get_tx_queue(
793 					    ndev, q_idx));
794 
795 			if (atomic_read(&net_device->
796 				queue_sends[q_idx]) < 1)
797 				netif_tx_wake_queue(netdev_get_tx_queue(
798 						    ndev, q_idx));
799 		}
800 	} else if (ret == -EAGAIN) {
801 		netif_tx_stop_queue(netdev_get_tx_queue(
802 				    ndev, q_idx));
803 		if (atomic_read(&net_device->queue_sends[q_idx]) < 1) {
804 			netif_tx_wake_queue(netdev_get_tx_queue(
805 					    ndev, q_idx));
806 			ret = -ENOSPC;
807 		}
808 	} else {
809 		netdev_err(ndev, "Unable to send packet %p ret %d\n",
810 			   packet, ret);
811 	}
812 
813 	return ret;
814 }
815 
816 static void netvsc_send_recv_completion(struct hv_device *device,
817 					struct vmbus_channel *channel,
818 					struct netvsc_device *net_device,
819 					u64 transaction_id, u32 status)
820 {
821 	struct nvsp_message recvcompMessage;
822 	int retries = 0;
823 	int ret;
824 	struct net_device *ndev;
825 
826 	ndev = net_device->ndev;
827 
828 	recvcompMessage.hdr.msg_type =
829 				NVSP_MSG1_TYPE_SEND_RNDIS_PKT_COMPLETE;
830 
831 	recvcompMessage.msg.v1_msg.send_rndis_pkt_complete.status = status;
832 
833 retry_send_cmplt:
834 	/* Send the completion */
835 	ret = vmbus_sendpacket(channel, &recvcompMessage,
836 			       sizeof(struct nvsp_message), transaction_id,
837 			       VM_PKT_COMP, 0);
838 	if (ret == 0) {
839 		/* success */
840 		/* no-op */
841 	} else if (ret == -EAGAIN) {
842 		/* no more room...wait a bit and attempt to retry 3 times */
843 		retries++;
844 		netdev_err(ndev, "unable to send receive completion pkt"
845 			" (tid %llx)...retrying %d\n", transaction_id, retries);
846 
847 		if (retries < 4) {
848 			udelay(100);
849 			goto retry_send_cmplt;
850 		} else {
851 			netdev_err(ndev, "unable to send receive "
852 				"completion pkt (tid %llx)...give up retrying\n",
853 				transaction_id);
854 		}
855 	} else {
856 		netdev_err(ndev, "unable to send receive "
857 			"completion pkt - %llx\n", transaction_id);
858 	}
859 }
860 
861 static void netvsc_receive(struct netvsc_device *net_device,
862 			struct vmbus_channel *channel,
863 			struct hv_device *device,
864 			struct vmpacket_descriptor *packet)
865 {
866 	struct vmtransfer_page_packet_header *vmxferpage_packet;
867 	struct nvsp_message *nvsp_packet;
868 	struct hv_netvsc_packet nv_pkt;
869 	struct hv_netvsc_packet *netvsc_packet = &nv_pkt;
870 	u32 status = NVSP_STAT_SUCCESS;
871 	int i;
872 	int count = 0;
873 	struct net_device *ndev;
874 
875 	ndev = net_device->ndev;
876 
877 	/*
878 	 * All inbound packets other than send completion should be xfer page
879 	 * packet
880 	 */
881 	if (packet->type != VM_PKT_DATA_USING_XFER_PAGES) {
882 		netdev_err(ndev, "Unknown packet type received - %d\n",
883 			   packet->type);
884 		return;
885 	}
886 
887 	nvsp_packet = (struct nvsp_message *)((unsigned long)packet +
888 			(packet->offset8 << 3));
889 
890 	/* Make sure this is a valid nvsp packet */
891 	if (nvsp_packet->hdr.msg_type !=
892 	    NVSP_MSG1_TYPE_SEND_RNDIS_PKT) {
893 		netdev_err(ndev, "Unknown nvsp packet type received-"
894 			" %d\n", nvsp_packet->hdr.msg_type);
895 		return;
896 	}
897 
898 	vmxferpage_packet = (struct vmtransfer_page_packet_header *)packet;
899 
900 	if (vmxferpage_packet->xfer_pageset_id != NETVSC_RECEIVE_BUFFER_ID) {
901 		netdev_err(ndev, "Invalid xfer page set id - "
902 			   "expecting %x got %x\n", NETVSC_RECEIVE_BUFFER_ID,
903 			   vmxferpage_packet->xfer_pageset_id);
904 		return;
905 	}
906 
907 	count = vmxferpage_packet->range_cnt;
908 	netvsc_packet->device = device;
909 	netvsc_packet->channel = channel;
910 
911 	/* Each range represents 1 RNDIS pkt that contains 1 ethernet frame */
912 	for (i = 0; i < count; i++) {
913 		/* Initialize the netvsc packet */
914 		netvsc_packet->status = NVSP_STAT_SUCCESS;
915 		netvsc_packet->data = (void *)((unsigned long)net_device->
916 			recv_buf + vmxferpage_packet->ranges[i].byte_offset);
917 		netvsc_packet->total_data_buflen =
918 					vmxferpage_packet->ranges[i].byte_count;
919 
920 		/* Pass it to the upper layer */
921 		rndis_filter_receive(device, netvsc_packet);
922 
923 		if (netvsc_packet->status != NVSP_STAT_SUCCESS)
924 			status = NVSP_STAT_FAIL;
925 	}
926 
927 	netvsc_send_recv_completion(device, channel, net_device,
928 				    vmxferpage_packet->d.trans_id, status);
929 }
930 
931 
932 static void netvsc_send_table(struct hv_device *hdev,
933 			      struct vmpacket_descriptor *vmpkt)
934 {
935 	struct netvsc_device *nvscdev;
936 	struct net_device *ndev;
937 	struct nvsp_message *nvmsg;
938 	int i;
939 	u32 count, *tab;
940 
941 	nvscdev = get_outbound_net_device(hdev);
942 	if (!nvscdev)
943 		return;
944 	ndev = nvscdev->ndev;
945 
946 	nvmsg = (struct nvsp_message *)((unsigned long)vmpkt +
947 					(vmpkt->offset8 << 3));
948 
949 	if (nvmsg->hdr.msg_type != NVSP_MSG5_TYPE_SEND_INDIRECTION_TABLE)
950 		return;
951 
952 	count = nvmsg->msg.v5_msg.send_table.count;
953 	if (count != VRSS_SEND_TAB_SIZE) {
954 		netdev_err(ndev, "Received wrong send-table size:%u\n", count);
955 		return;
956 	}
957 
958 	tab = (u32 *)((unsigned long)&nvmsg->msg.v5_msg.send_table +
959 		      nvmsg->msg.v5_msg.send_table.offset);
960 
961 	for (i = 0; i < count; i++)
962 		nvscdev->send_table[i] = tab[i];
963 }
964 
965 void netvsc_channel_cb(void *context)
966 {
967 	int ret;
968 	struct vmbus_channel *channel = (struct vmbus_channel *)context;
969 	struct hv_device *device;
970 	struct netvsc_device *net_device;
971 	u32 bytes_recvd;
972 	u64 request_id;
973 	struct vmpacket_descriptor *desc;
974 	unsigned char *buffer;
975 	int bufferlen = NETVSC_PACKET_SIZE;
976 	struct net_device *ndev;
977 
978 	if (channel->primary_channel != NULL)
979 		device = channel->primary_channel->device_obj;
980 	else
981 		device = channel->device_obj;
982 
983 	net_device = get_inbound_net_device(device);
984 	if (!net_device)
985 		return;
986 	ndev = net_device->ndev;
987 	buffer = get_per_channel_state(channel);
988 
989 	do {
990 		ret = vmbus_recvpacket_raw(channel, buffer, bufferlen,
991 					   &bytes_recvd, &request_id);
992 		if (ret == 0) {
993 			if (bytes_recvd > 0) {
994 				desc = (struct vmpacket_descriptor *)buffer;
995 				switch (desc->type) {
996 				case VM_PKT_COMP:
997 					netvsc_send_completion(net_device,
998 								device, desc);
999 					break;
1000 
1001 				case VM_PKT_DATA_USING_XFER_PAGES:
1002 					netvsc_receive(net_device, channel,
1003 						       device, desc);
1004 					break;
1005 
1006 				case VM_PKT_DATA_INBAND:
1007 					netvsc_send_table(device, desc);
1008 					break;
1009 
1010 				default:
1011 					netdev_err(ndev,
1012 						   "unhandled packet type %d, "
1013 						   "tid %llx len %d\n",
1014 						   desc->type, request_id,
1015 						   bytes_recvd);
1016 					break;
1017 				}
1018 
1019 			} else {
1020 				/*
1021 				 * We are done for this pass.
1022 				 */
1023 				break;
1024 			}
1025 
1026 		} else if (ret == -ENOBUFS) {
1027 			if (bufferlen > NETVSC_PACKET_SIZE)
1028 				kfree(buffer);
1029 			/* Handle large packet */
1030 			buffer = kmalloc(bytes_recvd, GFP_ATOMIC);
1031 			if (buffer == NULL) {
1032 				/* Try again next time around */
1033 				netdev_err(ndev,
1034 					   "unable to allocate buffer of size "
1035 					   "(%d)!!\n", bytes_recvd);
1036 				break;
1037 			}
1038 
1039 			bufferlen = bytes_recvd;
1040 		}
1041 	} while (1);
1042 
1043 	if (bufferlen > NETVSC_PACKET_SIZE)
1044 		kfree(buffer);
1045 	return;
1046 }
1047 
1048 /*
1049  * netvsc_device_add - Callback when the device belonging to this
1050  * driver is added
1051  */
1052 int netvsc_device_add(struct hv_device *device, void *additional_info)
1053 {
1054 	int ret = 0;
1055 	int ring_size =
1056 	((struct netvsc_device_info *)additional_info)->ring_size;
1057 	struct netvsc_device *net_device;
1058 	struct net_device *ndev;
1059 
1060 	net_device = alloc_net_device(device);
1061 	if (!net_device)
1062 		return -ENOMEM;
1063 
1064 	net_device->ring_size = ring_size;
1065 
1066 	/*
1067 	 * Coming into this function, struct net_device * is
1068 	 * registered as the driver private data.
1069 	 * In alloc_net_device(), we register struct netvsc_device *
1070 	 * as the driver private data and stash away struct net_device *
1071 	 * in struct netvsc_device *.
1072 	 */
1073 	ndev = net_device->ndev;
1074 
1075 	/* Initialize the NetVSC channel extension */
1076 	init_completion(&net_device->channel_init_wait);
1077 
1078 	set_per_channel_state(device->channel, net_device->cb_buffer);
1079 
1080 	/* Open the channel */
1081 	ret = vmbus_open(device->channel, ring_size * PAGE_SIZE,
1082 			 ring_size * PAGE_SIZE, NULL, 0,
1083 			 netvsc_channel_cb, device->channel);
1084 
1085 	if (ret != 0) {
1086 		netdev_err(ndev, "unable to open channel: %d\n", ret);
1087 		goto cleanup;
1088 	}
1089 
1090 	/* Channel is opened */
1091 	pr_info("hv_netvsc channel opened successfully\n");
1092 
1093 	net_device->chn_table[0] = device->channel;
1094 
1095 	/* Connect with the NetVsp */
1096 	ret = netvsc_connect_vsp(device);
1097 	if (ret != 0) {
1098 		netdev_err(ndev,
1099 			"unable to connect to NetVSP - %d\n", ret);
1100 		goto close;
1101 	}
1102 
1103 	return ret;
1104 
1105 close:
1106 	/* Now, we can close the channel safely */
1107 	vmbus_close(device->channel);
1108 
1109 cleanup:
1110 	free_netvsc_device(net_device);
1111 
1112 	return ret;
1113 }
1114