xnb.c revision da14cebe459d3275048785f25bd869cb09b5307f
/*
* CDDL HEADER START
*
* The contents of this file are subject to the terms of the
* Common Development and Distribution License (the "License").
* You may not use this file except in compliance with the License.
*
* You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
* or http://www.opensolaris.org/os/licensing.
* See the License for the specific language governing permissions
* and limitations under the License.
*
* When distributing Covered Code, include this CDDL HEADER in each
* file and include the License file at usr/src/OPENSOLARIS.LICENSE.
* If applicable, add the following below this CDDL HEADER, with the
* fields enclosed by brackets "[]" replaced with your own identifying
* information: Portions Copyright [yyyy] [name of copyright owner]
*
* CDDL HEADER END
*/
/*
* Copyright 2008 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
#ifdef DEBUG
#define XNB_DEBUG 1
#endif /* DEBUG */
#include "xnb.h"
#include <sys/sunddi.h>
#include <sys/sunndi.h>
#include <sys/modctl.h>
#include <sys/conf.h>
#include <sys/mac.h>
#include <sys/mac_impl.h> /* XXXXBOW - remove, included for mac_fix_cksum() */
#include <sys/dlpi.h>
#include <sys/strsubr.h>
#include <sys/strsun.h>
#include <sys/types.h>
#include <sys/pattr.h>
#include <vm/seg_kmem.h>
#include <vm/hat_i86.h>
#include <xen/sys/xenbus_impl.h>
#include <xen/sys/xendev.h>
#include <sys/balloon_impl.h>
#include <sys/evtchn_impl.h>
#include <sys/gnttab.h>
#include <vm/vm_dep.h>
#include <sys/gld.h>
#include <inet/ip.h>
#include <inet/ip_impl.h>
#include <sys/vnic_impl.h> /* blech. */
/*
* The terms "transmit" and "receive" are used in alignment with domU,
* which means that packets originating from the peer domU are "transmitted"
* to other parts of the system and packets are "received" from them.
*/
/*
* XXPV dme: things to do, as well as various things indicated
* throughout the source:
* - copy avoidance outbound.
* - copy avoidance inbound.
* - transfer credit limiting.
* - MAC address based filtering.
*/
/*
* Linux expects to have some headroom in received buffers. The Linux
* frontend driver (netfront) checks to see if the headroom is
* available and will re-allocate the buffer to make room if
* necessary. To avoid this we add RX_BUFFER_HEADROOM bytes of
* headroom to each packet we pass to the peer.
*/
#define RX_BUFFER_HEADROOM 16
/*
* Should we attempt to defer checksum calculation?
*/
static boolean_t xnb_cksum_offload = B_TRUE;
/*
* When receiving packets from a guest, should they be copied
* or used as-is (esballoc)?
*/
static boolean_t xnb_tx_always_copy = B_TRUE;
static boolean_t xnb_connect_rings(dev_info_t *);
static void xnb_disconnect_rings(dev_info_t *);
static void xnb_oe_state_change(dev_info_t *, ddi_eventcookie_t,
void *, void *);
static void xnb_hp_state_change(dev_info_t *, ddi_eventcookie_t,
void *, void *);
static int xnb_txbuf_constructor(void *, void *, int);
static void xnb_txbuf_destructor(void *, void *);
static xnb_txbuf_t *xnb_txbuf_get(xnb_t *, int);
static void xnb_txbuf_put(xnb_t *, xnb_txbuf_t *);
static void xnb_tx_notify_peer(xnb_t *);
static void xnb_tx_complete(xnb_txbuf_t *);
static void xnb_tx_mark_complete(xnb_t *, RING_IDX, int16_t);
static void xnb_tx_schedule_unmop(xnb_t *, gnttab_map_grant_ref_t *,
xnb_txbuf_t *);
static void xnb_tx_perform_pending_unmop(xnb_t *);
mblk_t *xnb_copy_to_peer(xnb_t *, mblk_t *);
int xnb_unmop_lowwat = NET_TX_RING_SIZE >> 2;
int xnb_unmop_hiwat = NET_TX_RING_SIZE - (NET_TX_RING_SIZE >> 2);
boolean_t xnb_hv_copy = B_TRUE;
boolean_t xnb_explicit_pageflip_set = B_FALSE;
/* XXPV dme: are these really invalid? */
#define INVALID_GRANT_HANDLE ((grant_handle_t)-1)
#define INVALID_GRANT_REF ((grant_ref_t)-1)
static kmem_cache_t *xnb_txbuf_cachep;
static kmutex_t xnb_alloc_page_lock;
/*
* Statistics.
*/
static char *aux_statistics[] = {
"rx_cksum_deferred",
"tx_cksum_no_need",
"rx_rsp_notok",
"tx_notify_deferred",
"tx_notify_sent",
"rx_notify_deferred",
"rx_notify_sent",
"tx_too_early",
"rx_too_early",
"rx_allocb_failed",
"tx_allocb_failed",
"rx_foreign_page",
"mac_full",
"spurious_intr",
"allocation_success",
"allocation_failure",
"small_allocation_success",
"small_allocation_failure",
"other_allocation_failure",
"rx_pageboundary_crossed",
"rx_cpoparea_grown",
"csum_hardware",
"csum_software",
};
static int
xnb_ks_aux_update(kstat_t *ksp, int flag)
{
xnb_t *xnbp;
kstat_named_t *knp;
if (flag != KSTAT_READ)
return (EACCES);
xnbp = ksp->ks_private;
knp = ksp->ks_data;
/*
* Assignment order should match that of the names in
* aux_statistics.
*/
(knp++)->value.ui64 = xnbp->xnb_stat_rx_cksum_deferred;
(knp++)->value.ui64 = xnbp->xnb_stat_tx_cksum_no_need;
(knp++)->value.ui64 = xnbp->xnb_stat_rx_rsp_notok;
(knp++)->value.ui64 = xnbp->xnb_stat_tx_notify_deferred;
(knp++)->value.ui64 = xnbp->xnb_stat_tx_notify_sent;
(knp++)->value.ui64 = xnbp->xnb_stat_rx_notify_deferred;
(knp++)->value.ui64 = xnbp->xnb_stat_rx_notify_sent;
(knp++)->value.ui64 = xnbp->xnb_stat_tx_too_early;
(knp++)->value.ui64 = xnbp->xnb_stat_rx_too_early;
(knp++)->value.ui64 = xnbp->xnb_stat_rx_allocb_failed;
(knp++)->value.ui64 = xnbp->xnb_stat_tx_allocb_failed;
(knp++)->value.ui64 = xnbp->xnb_stat_rx_foreign_page;
(knp++)->value.ui64 = xnbp->xnb_stat_mac_full;
(knp++)->value.ui64 = xnbp->xnb_stat_spurious_intr;
(knp++)->value.ui64 = xnbp->xnb_stat_allocation_success;
(knp++)->value.ui64 = xnbp->xnb_stat_allocation_failure;
(knp++)->value.ui64 = xnbp->xnb_stat_small_allocation_success;
(knp++)->value.ui64 = xnbp->xnb_stat_small_allocation_failure;
(knp++)->value.ui64 = xnbp->xnb_stat_other_allocation_failure;
(knp++)->value.ui64 = xnbp->xnb_stat_rx_pagebndry_crossed;
(knp++)->value.ui64 = xnbp->xnb_stat_rx_cpoparea_grown;
(knp++)->value.ui64 = xnbp->xnb_stat_csum_hardware;
(knp++)->value.ui64 = xnbp->xnb_stat_csum_software;
return (0);
}
static boolean_t
xnb_ks_init(xnb_t *xnbp)
{
int nstat = sizeof (aux_statistics) /
sizeof (aux_statistics[0]);
char **cp = aux_statistics;
kstat_named_t *knp;
/*
* Create and initialise kstats.
*/
xnbp->xnb_kstat_aux = kstat_create(ddi_driver_name(xnbp->xnb_devinfo),
ddi_get_instance(xnbp->xnb_devinfo), "aux_statistics", "net",
KSTAT_TYPE_NAMED, nstat, 0);
if (xnbp->xnb_kstat_aux == NULL)
return (B_FALSE);
xnbp->xnb_kstat_aux->ks_private = xnbp;
xnbp->xnb_kstat_aux->ks_update = xnb_ks_aux_update;
knp = xnbp->xnb_kstat_aux->ks_data;
while (nstat > 0) {
kstat_named_init(knp, *cp, KSTAT_DATA_UINT64);
knp++;
cp++;
nstat--;
}
kstat_install(xnbp->xnb_kstat_aux);
return (B_TRUE);
}
static void
xnb_ks_free(xnb_t *xnbp)
{
kstat_delete(xnbp->xnb_kstat_aux);
}
/*
* Software checksum calculation and insertion for an arbitrary packet.
*/
/*ARGSUSED*/
static mblk_t *
xnb_software_csum(xnb_t *xnbp, mblk_t *mp)
{
/*
* XXPV dme: shouldn't rely on vnic_fix_cksum(), not least
* because it doesn't cover all of the interesting cases :-(
*/
(void) hcksum_assoc(mp, NULL, NULL, 0, 0, 0, 0,
HCK_FULLCKSUM, KM_NOSLEEP);
return (mac_fix_cksum(mp));
}
mblk_t *
xnb_process_cksum_flags(xnb_t *xnbp, mblk_t *mp, uint32_t capab)
{
struct ether_header *ehp;
uint16_t sap;
uint32_t offset;
ipha_t *ipha;
ASSERT(mp->b_next == NULL);
/*
* Check that the packet is contained in a single mblk. In
* the "from peer" path this is true today, but will change
* when scatter gather support is added. In the "to peer"
* path we cannot be sure, but in most cases it will be true
* (in the xnbo case the packet has come from a MAC device
* which is unlikely to split packets).
*/
if (mp->b_cont != NULL)
goto software;
/*
* If the MAC has no hardware capability don't do any further
* checking.
*/
if (capab == 0)
goto software;
ASSERT(MBLKL(mp) >= sizeof (struct ether_header));
ehp = (struct ether_header *)mp->b_rptr;
if (ntohs(ehp->ether_type) == VLAN_TPID) {
struct ether_vlan_header *evhp;
ASSERT(MBLKL(mp) >= sizeof (struct ether_vlan_header));
evhp = (struct ether_vlan_header *)mp->b_rptr;
sap = ntohs(evhp->ether_type);
offset = sizeof (struct ether_vlan_header);
} else {
sap = ntohs(ehp->ether_type);
offset = sizeof (struct ether_header);
}
/*
* We only attempt to do IPv4 packets in hardware.
*/
if (sap != ETHERTYPE_IP)
goto software;
/*
* We know that this is an IPv4 packet.
*/
ipha = (ipha_t *)(mp->b_rptr + offset);
switch (ipha->ipha_protocol) {
case IPPROTO_TCP:
case IPPROTO_UDP: {
uint32_t start, length, stuff, cksum;
uint16_t *stuffp;
/*
* This is a TCP/IPv4 or UDP/IPv4 packet, for which we
* can use full IPv4 and partial checksum offload.
*/
if ((capab & (HCKSUM_INET_FULL_V4|HCKSUM_INET_PARTIAL)) == 0)
break;
start = IP_SIMPLE_HDR_LENGTH;
length = ntohs(ipha->ipha_length);
if (ipha->ipha_protocol == IPPROTO_TCP) {
stuff = start + TCP_CHECKSUM_OFFSET;
cksum = IP_TCP_CSUM_COMP;
} else {
stuff = start + UDP_CHECKSUM_OFFSET;
cksum = IP_UDP_CSUM_COMP;
}
stuffp = (uint16_t *)(mp->b_rptr + offset + stuff);
if (capab & HCKSUM_INET_FULL_V4) {
/*
* Some devices require that the checksum
* field of the packet is zero for full
* offload.
*/
*stuffp = 0;
(void) hcksum_assoc(mp, NULL, NULL,
0, 0, 0, 0,
HCK_FULLCKSUM, KM_NOSLEEP);
xnbp->xnb_stat_csum_hardware++;
return (mp);
}
if (capab & HCKSUM_INET_PARTIAL) {
if (*stuffp == 0) {
ipaddr_t src, dst;
/*
* Older Solaris guests don't insert
* the pseudo-header checksum, so we
* calculate it here.
*/
src = ipha->ipha_src;
dst = ipha->ipha_dst;
cksum += (dst >> 16) + (dst & 0xFFFF);
cksum += (src >> 16) + (src & 0xFFFF);
cksum += length - IP_SIMPLE_HDR_LENGTH;
cksum = (cksum >> 16) + (cksum & 0xFFFF);
cksum = (cksum >> 16) + (cksum & 0xFFFF);
ASSERT(cksum <= 0xFFFF);
*stuffp = (uint16_t)(cksum ? cksum : ~cksum);
}
(void) hcksum_assoc(mp, NULL, NULL,
start, stuff, length, 0,
HCK_PARTIALCKSUM, KM_NOSLEEP);
xnbp->xnb_stat_csum_hardware++;
return (mp);
}
/* NOTREACHED */
break;
}
default:
/* Use software. */
break;
}
software:
/*
* We are not able to use any offload so do the whole thing in
* software.
*/
xnbp->xnb_stat_csum_software++;
return (xnb_software_csum(xnbp, mp));
}
int
xnb_attach(dev_info_t *dip, xnb_flavour_t *flavour, void *flavour_data)
{
xnb_t *xnbp;
char *xsname, mac[ETHERADDRL * 3];
xnbp = kmem_zalloc(sizeof (*xnbp), KM_SLEEP);
xnbp->xnb_flavour = flavour;
xnbp->xnb_flavour_data = flavour_data;
xnbp->xnb_devinfo = dip;
xnbp->xnb_evtchn = INVALID_EVTCHN;
xnbp->xnb_irq = B_FALSE;
xnbp->xnb_tx_ring_handle = INVALID_GRANT_HANDLE;
xnbp->xnb_rx_ring_handle = INVALID_GRANT_HANDLE;
xnbp->xnb_cksum_offload = xnb_cksum_offload;
xnbp->xnb_connected = B_FALSE;
xnbp->xnb_hotplugged = B_FALSE;
xnbp->xnb_detachable = B_FALSE;
xnbp->xnb_peer = xvdi_get_oeid(dip);
xnbp->xnb_tx_pages_writable = B_FALSE;
xnbp->xnb_tx_always_copy = xnb_tx_always_copy;
xnbp->xnb_tx_buf_count = 0;
xnbp->xnb_tx_unmop_count = 0;
xnbp->xnb_hv_copy = B_FALSE;
xnbp->xnb_rx_va = vmem_alloc(heap_arena, PAGESIZE, VM_SLEEP);
ASSERT(xnbp->xnb_rx_va != NULL);
if (ddi_get_iblock_cookie(dip, 0, &xnbp->xnb_icookie)
!= DDI_SUCCESS)
goto failure;
/* allocated on demand, when/if we enter xnb_copy_to_peer() */
xnbp->xnb_rx_cpop = NULL;
xnbp->xnb_cpop_sz = 0;
mutex_init(&xnbp->xnb_tx_lock, NULL, MUTEX_DRIVER,
xnbp->xnb_icookie);
mutex_init(&xnbp->xnb_rx_lock, NULL, MUTEX_DRIVER,
xnbp->xnb_icookie);
/* set driver private pointer now */
ddi_set_driver_private(dip, xnbp);
if (!xnb_ks_init(xnbp))
goto failure_1;
/*
* Receive notification of changes in the state of the
* driver in the guest domain.
*/
if (xvdi_add_event_handler(dip, XS_OE_STATE, xnb_oe_state_change,
NULL) != DDI_SUCCESS)
goto failure_2;
/*
* Receive notification of hotplug events.
*/
if (xvdi_add_event_handler(dip, XS_HP_STATE, xnb_hp_state_change,
NULL) != DDI_SUCCESS)
goto failure_2;
xsname = xvdi_get_xsname(dip);
if (xenbus_printf(XBT_NULL, xsname,
"feature-no-csum-offload", "%d",
xnbp->xnb_cksum_offload ? 0 : 1) != 0)
goto failure_3;
/*
* Use global xnb_hv_copy to export this feature. This means that
* we have to decide what to do before starting up a guest domain
*/
if (xenbus_printf(XBT_NULL, xsname,
"feature-rx-copy", "%d", xnb_hv_copy ? 1 : 0) != 0)
goto failure_3;
/*
* Linux domUs seem to depend on "feature-rx-flip" being 0
* in addition to "feature-rx-copy" being 1. It seems strange
* to use four possible states to describe a binary decision,
* but we might as well play nice.
*/
if (xenbus_printf(XBT_NULL, xsname,
"feature-rx-flip", "%d", xnb_explicit_pageflip_set ? 1 : 0) != 0)
goto failure_3;
if (xenbus_scanf(XBT_NULL, xsname,
"mac", "%s", mac) != 0) {
cmn_err(CE_WARN, "xnb_attach: "
"cannot read mac address from %s",
xsname);
goto failure_3;
}
if (ether_aton(mac, xnbp->xnb_mac_addr) != ETHERADDRL) {
cmn_err(CE_WARN,
"xnb_attach: cannot parse mac address %s",
mac);
goto failure_3;
}
(void) xvdi_switch_state(dip, XBT_NULL, XenbusStateInitWait);
(void) xvdi_post_event(dip, XEN_HP_ADD);
return (DDI_SUCCESS);
failure_3:
xvdi_remove_event_handler(dip, NULL);
failure_2:
xnb_ks_free(xnbp);
failure_1:
mutex_destroy(&xnbp->xnb_rx_lock);
mutex_destroy(&xnbp->xnb_tx_lock);
failure:
vmem_free(heap_arena, xnbp->xnb_rx_va, PAGESIZE);
kmem_free(xnbp, sizeof (*xnbp));
return (DDI_FAILURE);
}
/*ARGSUSED*/
void
xnb_detach(dev_info_t *dip)
{
xnb_t *xnbp = ddi_get_driver_private(dip);
ASSERT(xnbp != NULL);
ASSERT(!xnbp->xnb_connected);
ASSERT(xnbp->xnb_tx_buf_count == 0);
xnb_disconnect_rings(dip);
xvdi_remove_event_handler(dip, NULL);
xnb_ks_free(xnbp);
ddi_set_driver_private(dip, NULL);
mutex_destroy(&xnbp->xnb_tx_lock);
mutex_destroy(&xnbp->xnb_rx_lock);
if (xnbp->xnb_cpop_sz > 0)
kmem_free(xnbp->xnb_rx_cpop, sizeof (*xnbp->xnb_rx_cpop)
* xnbp->xnb_cpop_sz);
ASSERT(xnbp->xnb_rx_va != NULL);
vmem_free(heap_arena, xnbp->xnb_rx_va, PAGESIZE);
kmem_free(xnbp, sizeof (*xnbp));
}
static mfn_t
xnb_alloc_page(xnb_t *xnbp)
{
#define WARNING_RATE_LIMIT 100
#define BATCH_SIZE 256
static mfn_t mfns[BATCH_SIZE]; /* common across all instances */
static int nth = BATCH_SIZE;
mfn_t mfn;
mutex_enter(&xnb_alloc_page_lock);
if (nth == BATCH_SIZE) {
if (balloon_alloc_pages(BATCH_SIZE, mfns) != BATCH_SIZE) {
xnbp->xnb_stat_allocation_failure++;
mutex_exit(&xnb_alloc_page_lock);
/*
* Try for a single page in low memory situations.
*/
if (balloon_alloc_pages(1, &mfn) != 1) {
if ((xnbp->xnb_stat_small_allocation_failure++
% WARNING_RATE_LIMIT) == 0)
cmn_err(CE_WARN, "xnb_alloc_page: "
"Cannot allocate memory to "
"transfer packets to peer.");
return (0);
} else {
xnbp->xnb_stat_small_allocation_success++;
return (mfn);
}
}
nth = 0;
xnbp->xnb_stat_allocation_success++;
}
mfn = mfns[nth++];
mutex_exit(&xnb_alloc_page_lock);
ASSERT(mfn != 0);
return (mfn);
#undef BATCH_SIZE
#undef WARNING_RATE_LIMIT
}
/*ARGSUSED*/
static void
xnb_free_page(xnb_t *xnbp, mfn_t mfn)
{
int r;
pfn_t pfn;
pfn = xen_assign_pfn(mfn);
pfnzero(pfn, 0, PAGESIZE);
xen_release_pfn(pfn);
/*
* This happens only in the error path, so batching is
* not worth the complication.
*/
if ((r = balloon_free_pages(1, &mfn, NULL, NULL)) != 1) {
cmn_err(CE_WARN, "free_page: cannot decrease memory "
"reservation (%d): page kept but unusable (mfn = 0x%lx).",
r, mfn);
}
}
/*
* Similar to RING_HAS_UNCONSUMED_REQUESTS(&xnbp->rx_ring) but
* using local variables.
*/
#define XNB_RING_HAS_UNCONSUMED_REQUESTS(_r) \
((((_r)->sring->req_prod - loop) < \
(RING_SIZE(_r) - (loop - prod))) ? \
((_r)->sring->req_prod - loop) : \
(RING_SIZE(_r) - (loop - prod)))
mblk_t *
xnb_to_peer(xnb_t *xnbp, mblk_t *mp)
{
mblk_t *free = mp, *prev = NULL;
size_t len;
gnttab_transfer_t *gop;
boolean_t notify;
RING_IDX loop, prod, end;
/*
* For each packet the sequence of operations is:
*
* 1. get a new page from the hypervisor.
* 2. get a request slot from the ring.
* 3. copy the data into the new page.
* 4. transfer the page to the peer.
* 5. update the request slot.
* 6. kick the peer.
* 7. free mp.
*
* In order to reduce the number of hypercalls, we prepare
* several packets for the peer and perform a single hypercall
* to transfer them.
*/
mutex_enter(&xnbp->xnb_rx_lock);
/*
* If we are not connected to the peer or have not yet
* finished hotplug it is too early to pass packets to the
* peer.
*/
if (!(xnbp->xnb_connected && xnbp->xnb_hotplugged)) {
mutex_exit(&xnbp->xnb_rx_lock);
DTRACE_PROBE(flip_rx_too_early);
xnbp->xnb_stat_rx_too_early++;
return (mp);
}
loop = xnbp->xnb_rx_ring.req_cons;
prod = xnbp->xnb_rx_ring.rsp_prod_pvt;
gop = xnbp->xnb_rx_top;
while ((mp != NULL) &&
XNB_RING_HAS_UNCONSUMED_REQUESTS(&xnbp->xnb_rx_ring)) {
mfn_t mfn;
pfn_t pfn;
netif_rx_request_t *rxreq;
netif_rx_response_t *rxresp;
char *valoop;
size_t offset;
mblk_t *ml;
uint16_t cksum_flags;
/* 1 */
if ((mfn = xnb_alloc_page(xnbp)) == 0) {
xnbp->xnb_stat_rx_defer++;
break;
}
/* 2 */
rxreq = RING_GET_REQUEST(&xnbp->xnb_rx_ring, loop);
#ifdef XNB_DEBUG
if (!(rxreq->id < NET_RX_RING_SIZE))
cmn_err(CE_PANIC, "xnb_to_peer: "
"id %d out of range in request 0x%p",
rxreq->id, (void *)rxreq);
#endif /* XNB_DEBUG */
/* Assign a pfn and map the new page at the allocated va. */
pfn = xen_assign_pfn(mfn);
hat_devload(kas.a_hat, xnbp->xnb_rx_va, PAGESIZE,
pfn, PROT_READ | PROT_WRITE, HAT_LOAD);
offset = RX_BUFFER_HEADROOM;
/* 3 */
len = 0;
valoop = xnbp->xnb_rx_va + offset;
for (ml = mp; ml != NULL; ml = ml->b_cont) {
size_t chunk = ml->b_wptr - ml->b_rptr;
bcopy(ml->b_rptr, valoop, chunk);
valoop += chunk;
len += chunk;
}
ASSERT(len + offset < PAGESIZE);
/* Release the pfn. */
hat_unload(kas.a_hat, xnbp->xnb_rx_va, PAGESIZE,
HAT_UNLOAD_UNMAP);
xen_release_pfn(pfn);
/* 4 */
gop->mfn = mfn;
gop->domid = xnbp->xnb_peer;
gop->ref = rxreq->gref;
/* 5.1 */
rxresp = RING_GET_RESPONSE(&xnbp->xnb_rx_ring, prod);
rxresp->offset = offset;
rxresp->flags = 0;
cksum_flags = xnbp->xnb_flavour->xf_cksum_to_peer(xnbp, mp);
if (cksum_flags != 0)
xnbp->xnb_stat_rx_cksum_deferred++;
rxresp->flags |= cksum_flags;
rxresp->id = RING_GET_REQUEST(&xnbp->xnb_rx_ring, prod)->id;
rxresp->status = len;
loop++;
prod++;
gop++;
prev = mp;
mp = mp->b_next;
}
/*
* Did we actually do anything?
*/
if (loop == xnbp->xnb_rx_ring.req_cons) {
mutex_exit(&xnbp->xnb_rx_lock);
return (mp);
}
end = loop;
/*
* Unlink the end of the 'done' list from the remainder.
*/
ASSERT(prev != NULL);
prev->b_next = NULL;
if (HYPERVISOR_grant_table_op(GNTTABOP_transfer, xnbp->xnb_rx_top,
loop - xnbp->xnb_rx_ring.req_cons) != 0) {
cmn_err(CE_WARN, "xnb_to_peer: transfer operation failed");
}
loop = xnbp->xnb_rx_ring.req_cons;
prod = xnbp->xnb_rx_ring.rsp_prod_pvt;
gop = xnbp->xnb_rx_top;
while (loop < end) {
int16_t status = NETIF_RSP_OKAY;
if (gop->status != 0) {
status = NETIF_RSP_ERROR;
/*
* If the status is anything other than
* GNTST_bad_page then we don't own the page
* any more, so don't try to give it back.
*/
if (gop->status != GNTST_bad_page)
gop->mfn = 0;
} else {
/* The page is no longer ours. */
gop->mfn = 0;
}
if (gop->mfn != 0)
/*
* Give back the page, as we won't be using
* it.
*/
xnb_free_page(xnbp, gop->mfn);
else
/*
* We gave away a page, update our accounting
* now.
*/
balloon_drv_subtracted(1);
/* 5.2 */
if (status != NETIF_RSP_OKAY) {
RING_GET_RESPONSE(&xnbp->xnb_rx_ring, prod)->status =
status;
} else {
xnbp->xnb_stat_ipackets++;
xnbp->xnb_stat_rbytes += len;
}
loop++;
prod++;
gop++;
}
xnbp->xnb_rx_ring.req_cons = loop;
xnbp->xnb_rx_ring.rsp_prod_pvt = prod;
/* 6 */
/* LINTED: constant in conditional context */
RING_PUSH_RESPONSES_AND_CHECK_NOTIFY(&xnbp->xnb_rx_ring, notify);
if (notify) {
ec_notify_via_evtchn(xnbp->xnb_evtchn);
xnbp->xnb_stat_rx_notify_sent++;
} else {
xnbp->xnb_stat_rx_notify_deferred++;
}
if (mp != NULL)
xnbp->xnb_stat_rx_defer++;
mutex_exit(&xnbp->xnb_rx_lock);
/* Free mblk_t's that we consumed. */
freemsgchain(free);
return (mp);
}
/* helper functions for xnb_copy_to_peer */
/*
* Grow the array of copy operation descriptors.
* Returns a pointer to the next available entry.
*/
gnttab_copy_t *
grow_cpop_area(xnb_t *xnbp, gnttab_copy_t *o_cpop)
{
/*
* o_cpop (arg.1) is a ptr to the area we would like to copy
* something into but cannot, because we haven't alloc'ed it
* yet, or NULL.
* old_cpop and new_cpop (local) are pointers to old/new
* versions of xnbp->xnb_rx_cpop.
*/
gnttab_copy_t *new_cpop, *old_cpop, *ret_cpop;
size_t newcount;
ASSERT(MUTEX_HELD(&xnbp->xnb_rx_lock));
old_cpop = xnbp->xnb_rx_cpop;
/*
* o_cpop is a pointer into the array pointed to by old_cpop;
* it would be an error for exactly one of these pointers to be NULL.
* We shouldn't call this function if xnb_rx_cpop has already
* been allocated, but we're starting to fill it from the beginning
* again.
*/
ASSERT((o_cpop == NULL && old_cpop == NULL) ||
(o_cpop != NULL && old_cpop != NULL && o_cpop != old_cpop));
newcount = xnbp->xnb_cpop_sz + CPOP_DEFCNT;
new_cpop = kmem_alloc(sizeof (*new_cpop) * newcount, KM_NOSLEEP);
if (new_cpop == NULL) {
xnbp->xnb_stat_other_allocation_failure++;
return (NULL);
}
if (o_cpop != NULL) {
size_t offset = (o_cpop - old_cpop);
/* we only need to move the parts in use ... */
(void) memmove(new_cpop, old_cpop, xnbp->xnb_cpop_sz *
(sizeof (*old_cpop)));
kmem_free(old_cpop, xnbp->xnb_cpop_sz * sizeof (*old_cpop));
ret_cpop = new_cpop + offset;
} else {
ret_cpop = new_cpop;
}
xnbp->xnb_rx_cpop = new_cpop;
xnbp->xnb_cpop_sz = newcount;
xnbp->xnb_stat_rx_cpoparea_grown++;
return (ret_cpop);
}
/*
* Check whether an address is on a page that's foreign to this domain.
*/
static boolean_t
is_foreign(void *addr)
{
pfn_t pfn = hat_getpfnum(kas.a_hat, addr);
return (pfn & PFN_IS_FOREIGN_MFN ? B_TRUE : B_FALSE);
}
/*
* Insert a newly allocated mblk into a chain, replacing the old one.
*/
static mblk_t *
replace_msg(mblk_t *mp, size_t len, mblk_t *mp_prev, mblk_t *ml_prev)
{
uint32_t start, stuff, end, value, flags;
mblk_t *new_mp;
new_mp = copyb(mp);
if (new_mp == NULL)
cmn_err(CE_PANIC, "replace_msg: cannot alloc new message"
"for %p, len %lu", (void *) mp, len);
hcksum_retrieve(mp, NULL, NULL, &start, &stuff, &end, &value, &flags);
(void) hcksum_assoc(new_mp, NULL, NULL, start, stuff, end, value,
flags, KM_NOSLEEP);
new_mp->b_next = mp->b_next;
new_mp->b_prev = mp->b_prev;
new_mp->b_cont = mp->b_cont;
/* Make sure we only overwrite pointers to the mblk being replaced. */
if (mp_prev != NULL && mp_prev->b_next == mp)
mp_prev->b_next = new_mp;
if (ml_prev != NULL && ml_prev->b_cont == mp)
ml_prev->b_cont = new_mp;
mp->b_next = mp->b_prev = mp->b_cont = NULL;
freemsg(mp);
return (new_mp);
}
/*
* Set all the fields in a gnttab_copy_t.
*/
static void
setup_gop(xnb_t *xnbp, gnttab_copy_t *gp, uchar_t *rptr,
size_t s_off, size_t d_off, size_t len, grant_ref_t d_ref)
{
ASSERT(xnbp != NULL && gp != NULL);
gp->source.offset = s_off;
gp->source.u.gmfn = pfn_to_mfn(hat_getpfnum(kas.a_hat, (caddr_t)rptr));
gp->source.domid = DOMID_SELF;
gp->len = (uint16_t)len;
gp->flags = GNTCOPY_dest_gref;
gp->status = 0;
gp->dest.u.ref = d_ref;
gp->dest.offset = d_off;
gp->dest.domid = xnbp->xnb_peer;
}
mblk_t *
xnb_copy_to_peer(xnb_t *xnbp, mblk_t *mp)
{
mblk_t *free = mp, *mp_prev = NULL, *saved_mp = mp;
mblk_t *ml, *ml_prev;
gnttab_copy_t *gop_cp;
boolean_t notify;
RING_IDX loop, prod;
int i;
if (!xnbp->xnb_hv_copy)
return (xnb_to_peer(xnbp, mp));
/*
* For each packet the sequence of operations is:
*
* 1. get a request slot from the ring.
* 2. set up data for hypercall (see NOTE below)
* 3. have the hypervisore copy the data
* 4. update the request slot.
* 5. kick the peer.
*
* NOTE ad 2.
* In order to reduce the number of hypercalls, we prepare
* several packets (mp->b_cont != NULL) for the peer and
* perform a single hypercall to transfer them.
* We also have to set up a seperate copy operation for
* every page.
*
* If we have more than one message (mp->b_next != NULL),
* we do this whole dance repeatedly.
*/
mutex_enter(&xnbp->xnb_rx_lock);
if (!(xnbp->xnb_connected && xnbp->xnb_hotplugged)) {
mutex_exit(&xnbp->xnb_rx_lock);
DTRACE_PROBE(copy_rx_too_early);
xnbp->xnb_stat_rx_too_early++;
return (mp);
}
loop = xnbp->xnb_rx_ring.req_cons;
prod = xnbp->xnb_rx_ring.rsp_prod_pvt;
while ((mp != NULL) &&
XNB_RING_HAS_UNCONSUMED_REQUESTS(&xnbp->xnb_rx_ring)) {
netif_rx_request_t *rxreq;
netif_rx_response_t *rxresp;
size_t offset, d_offset;
size_t len;
uint16_t cksum_flags;
int16_t status = NETIF_RSP_OKAY;
int item_count;
/* 1 */
rxreq = RING_GET_REQUEST(&xnbp->xnb_rx_ring, loop);
#ifdef XNB_DEBUG
if (!(rxreq->id < NET_RX_RING_SIZE))
cmn_err(CE_PANIC, "xnb_copy_to_peer: "
"id %d out of range in request 0x%p",
rxreq->id, (void *)rxreq);
#endif /* XNB_DEBUG */
/* 2 */
d_offset = offset = RX_BUFFER_HEADROOM;
len = 0;
item_count = 0;
gop_cp = xnbp->xnb_rx_cpop;
/*
* We walk the b_cont pointers and set up a gop_cp
* structure for every page in every data block we have.
*/
/* 2a */
for (ml = mp, ml_prev = NULL; ml != NULL; ml = ml->b_cont) {
size_t chunk = ml->b_wptr - ml->b_rptr;
uchar_t *r_tmp, *rpt_align;
size_t r_offset;
/*
* If we get an mblk on a page that doesn't belong to
* this domain, get a new mblk to replace the old one.
*/
if (is_foreign(ml->b_rptr) || is_foreign(ml->b_wptr)) {
mblk_t *ml_new = replace_msg(ml, chunk,
mp_prev, ml_prev);
/* We can still use old ml, but not *ml! */
if (free == ml)
free = ml_new;
if (mp == ml)
mp = ml_new;
ml = ml_new;
xnbp->xnb_stat_rx_foreign_page++;
}
rpt_align = (uchar_t *)ALIGN2PAGE(ml->b_rptr);
r_offset = (uint16_t)(ml->b_rptr - rpt_align);
r_tmp = ml->b_rptr;
if (d_offset + chunk > PAGESIZE)
cmn_err(CE_PANIC, "xnb_copy_to_peer: mp %p "
"(svd: %p), ml %p,rpt_alg. %p, d_offset "
"(%lu) + chunk (%lu) > PAGESIZE %d!",
(void *)mp, (void *)saved_mp, (void *)ml,
(void *)rpt_align,
d_offset, chunk, (int)PAGESIZE);
while (chunk > 0) {
size_t part_len;
item_count++;
if (item_count > xnbp->xnb_cpop_sz) {
gop_cp = grow_cpop_area(xnbp, gop_cp);
if (gop_cp == NULL)
goto failure;
}
/*
* If our mblk crosses a page boundary, we need
* to do a seperate copy for every page.
*/
if (r_offset + chunk > PAGESIZE) {
part_len = PAGESIZE - r_offset;
DTRACE_PROBE3(mblk_page_crossed,
(mblk_t *), ml, int, chunk, int,
(int)r_offset);
xnbp->xnb_stat_rx_pagebndry_crossed++;
} else {
part_len = chunk;
}
setup_gop(xnbp, gop_cp, r_tmp, r_offset,
d_offset, part_len, rxreq->gref);
chunk -= part_len;
len += part_len;
d_offset += part_len;
r_tmp += part_len;
/*
* The 2nd, 3rd ... last copies will always
* start at r_tmp, therefore r_offset is 0.
*/
r_offset = 0;
gop_cp++;
}
ml_prev = ml;
DTRACE_PROBE4(mblk_loop_end, (mblk_t *), ml, int,
chunk, int, len, int, item_count);
}
/* 3 */
if (HYPERVISOR_grant_table_op(GNTTABOP_copy, xnbp->xnb_rx_cpop,
item_count) != 0) {
cmn_err(CE_WARN, "xnb_copy_to_peer: copy op. failed");
DTRACE_PROBE(HV_granttableopfailed);
}
/* 4 */
rxresp = RING_GET_RESPONSE(&xnbp->xnb_rx_ring, prod);
rxresp->offset = offset;
rxresp->flags = 0;
DTRACE_PROBE4(got_RX_rsp, int, (int)rxresp->id, int,
(int)rxresp->offset, int, (int)rxresp->flags, int,
(int)rxresp->status);
cksum_flags = xnbp->xnb_flavour->xf_cksum_to_peer(xnbp, mp);
if (cksum_flags != 0)
xnbp->xnb_stat_rx_cksum_deferred++;
rxresp->flags |= cksum_flags;
rxresp->id = RING_GET_REQUEST(&xnbp->xnb_rx_ring, prod)->id;
rxresp->status = len;
DTRACE_PROBE4(RX_rsp_set, int, (int)rxresp->id, int,
(int)rxresp->offset, int, (int)rxresp->flags, int,
(int)rxresp->status);
for (i = 0; i < item_count; i++) {
if (xnbp->xnb_rx_cpop[i].status != 0) {
DTRACE_PROBE2(cpop__status__nonnull, int,
(int)xnbp->xnb_rx_cpop[i].status,
int, i);
status = NETIF_RSP_ERROR;
}
}
/* 5.2 */
if (status != NETIF_RSP_OKAY) {
RING_GET_RESPONSE(&xnbp->xnb_rx_ring, prod)->status =
status;
xnbp->xnb_stat_rx_rsp_notok++;
} else {
xnbp->xnb_stat_ipackets++;
xnbp->xnb_stat_rbytes += len;
}
loop++;
prod++;
mp_prev = mp;
mp = mp->b_next;
}
failure:
/*
* Did we actually do anything?
*/
if (loop == xnbp->xnb_rx_ring.req_cons) {
mutex_exit(&xnbp->xnb_rx_lock);
return (mp);
}
/*
* Unlink the end of the 'done' list from the remainder.
*/
ASSERT(mp_prev != NULL);
mp_prev->b_next = NULL;
xnbp->xnb_rx_ring.req_cons = loop;
xnbp->xnb_rx_ring.rsp_prod_pvt = prod;
/* 6 */
/* LINTED: constant in conditional context */
RING_PUSH_RESPONSES_AND_CHECK_NOTIFY(&xnbp->xnb_rx_ring, notify);
if (notify) {
ec_notify_via_evtchn(xnbp->xnb_evtchn);
xnbp->xnb_stat_rx_notify_sent++;
} else {
xnbp->xnb_stat_rx_notify_deferred++;
}
if (mp != NULL)
xnbp->xnb_stat_rx_defer++;
mutex_exit(&xnbp->xnb_rx_lock);
/* Free mblk_t structs we have consumed. */
freemsgchain(free);
return (mp);
}
/*ARGSUSED*/
static int
xnb_txbuf_constructor(void *buf, void *arg, int kmflag)
{
xnb_txbuf_t *txp = buf;
bzero(txp, sizeof (*txp));
txp->xt_free_rtn.free_func = xnb_tx_complete;
txp->xt_free_rtn.free_arg = (caddr_t)txp;
txp->xt_mop.host_addr =
(uint64_t)(uintptr_t)vmem_alloc(heap_arena, PAGESIZE,
((kmflag & KM_NOSLEEP) == KM_NOSLEEP) ?
VM_NOSLEEP : VM_SLEEP);
if (txp->xt_mop.host_addr == NULL) {
cmn_err(CE_WARN, "xnb_txbuf_constructor: "
"cannot get address space");
return (-1);
}
/*
* Have the hat ensure that page table exists for the VA.
*/
hat_prepare_mapping(kas.a_hat,
(caddr_t)(uintptr_t)txp->xt_mop.host_addr, NULL);
return (0);
}
/*ARGSUSED*/
static void
xnb_txbuf_destructor(void *buf, void *arg)
{
xnb_txbuf_t *txp = buf;
ASSERT(txp->xt_mop.host_addr != NULL);
ASSERT((txp->xt_flags & XNB_TXBUF_INUSE) == 0);
hat_release_mapping(kas.a_hat,
(caddr_t)(uintptr_t)txp->xt_mop.host_addr);
vmem_free(heap_arena,
(caddr_t)(uintptr_t)txp->xt_mop.host_addr, PAGESIZE);
}
static void
xnb_tx_notify_peer(xnb_t *xnbp)
{
boolean_t notify;
ASSERT(MUTEX_HELD(&xnbp->xnb_tx_lock));
/* LINTED: constant in conditional context */
RING_PUSH_RESPONSES_AND_CHECK_NOTIFY(&xnbp->xnb_tx_ring, notify);
if (notify) {
ec_notify_via_evtchn(xnbp->xnb_evtchn);
xnbp->xnb_stat_tx_notify_sent++;
} else {
xnbp->xnb_stat_tx_notify_deferred++;
}
}
static void
xnb_tx_complete(xnb_txbuf_t *txp)
{
xnb_t *xnbp = txp->xt_xnbp;
ASSERT((txp->xt_flags & XNB_TXBUF_INUSE) == XNB_TXBUF_INUSE);
mutex_enter(&xnbp->xnb_tx_lock);
xnb_tx_schedule_unmop(xnbp, &txp->xt_mop, txp);
mutex_exit(&xnbp->xnb_tx_lock);
}
static void
xnb_tx_mark_complete(xnb_t *xnbp, RING_IDX id, int16_t status)
{
RING_IDX i;
netif_tx_response_t *txresp;
ASSERT(MUTEX_HELD(&xnbp->xnb_tx_lock));
i = xnbp->xnb_tx_ring.rsp_prod_pvt;
txresp = RING_GET_RESPONSE(&xnbp->xnb_tx_ring, i);
txresp->id = id;
txresp->status = status;
xnbp->xnb_tx_ring.rsp_prod_pvt = i + 1;
/*
* Note that we don't push the change to the peer here - that
* is the callers responsibility.
*/
}
static void
xnb_tx_schedule_unmop(xnb_t *xnbp, gnttab_map_grant_ref_t *mop,
xnb_txbuf_t *txp)
{
gnttab_unmap_grant_ref_t *unmop;
int u_count;
int reqs_on_ring;
ASSERT(MUTEX_HELD(&xnbp->xnb_tx_lock));
ASSERT(xnbp->xnb_tx_unmop_count < NET_TX_RING_SIZE);
u_count = xnbp->xnb_tx_unmop_count++;
/* Cache data for the time when we actually unmap grant refs */
xnbp->xnb_tx_unmop_txp[u_count] = txp;
unmop = &xnbp->xnb_tx_unmop[u_count];
unmop->host_addr = mop->host_addr;
unmop->dev_bus_addr = mop->dev_bus_addr;
unmop->handle = mop->handle;
/*
* We cannot check the ring once we're disconnected from it. Batching
* doesn't seem to be a useful optimisation in this case either,
* so we directly call into the actual unmap function.
*/
if (xnbp->xnb_connected) {
reqs_on_ring = RING_HAS_UNCONSUMED_REQUESTS(&xnbp->xnb_tx_ring);
/*
* By tuning xnb_unmop_hiwat to N, we can emulate "N per batch"
* or (with N == 1) "immediate unmop" behaviour.
* The "> xnb_unmop_lowwat" is a guard against ring exhaustion.
*/
if (xnbp->xnb_tx_unmop_count < xnb_unmop_hiwat &&
reqs_on_ring > xnb_unmop_lowwat)
return;
}
xnb_tx_perform_pending_unmop(xnbp);
}
/*
* Here we perform the actual unmapping of the data that was
* accumulated in xnb_tx_schedule_unmop().
* Note that it is the caller's responsibility to make sure that
* there's actually something there to unmop.
*/
static void
xnb_tx_perform_pending_unmop(xnb_t *xnbp)
{
RING_IDX loop;
#ifdef XNB_DEBUG
gnttab_unmap_grant_ref_t *unmop;
#endif /* XNB_DEBUG */
ASSERT(MUTEX_HELD(&xnbp->xnb_tx_lock));
ASSERT(xnbp->xnb_tx_unmop_count > 0);
if (HYPERVISOR_grant_table_op(GNTTABOP_unmap_grant_ref,
xnbp->xnb_tx_unmop, xnbp->xnb_tx_unmop_count) < 0) {
cmn_err(CE_WARN, "xnb_tx_perform_pending_unmop: "
"unmap grant operation failed, "
"%d pages lost", xnbp->xnb_tx_unmop_count);
}
#ifdef XNB_DEBUG
for (loop = 0, unmop = xnbp->xnb_tx_unmop;
loop < xnbp->xnb_tx_unmop_count;
loop++, unmop++) {
if (unmop->status != 0) {
cmn_err(CE_WARN, "xnb_tx_perform_pending_unmop: "
"unmap grant reference failed (%d)",
unmop->status);
}
}
#endif /* XNB_DEBUG */
for (loop = 0; loop < xnbp->xnb_tx_unmop_count; loop++) {
xnb_txbuf_t *txp = xnbp->xnb_tx_unmop_txp[loop];
if (txp == NULL)
cmn_err(CE_PANIC,
"xnb_tx_perform_pending_unmop: "
"unexpected NULL txp (loop %d; count %d)!",
loop, xnbp->xnb_tx_unmop_count);
if (xnbp->xnb_connected)
xnb_tx_mark_complete(xnbp, txp->xt_id, txp->xt_status);
xnb_txbuf_put(xnbp, txp);
}
if (xnbp->xnb_connected)
xnb_tx_notify_peer(xnbp);
xnbp->xnb_tx_unmop_count = 0;
#ifdef XNB_DEBUG
bzero(xnbp->xnb_tx_unmop, sizeof (xnbp->xnb_tx_unmop));
bzero(xnbp->xnb_tx_unmop_txp, sizeof (xnbp->xnb_tx_unmop_txp));
#endif /* XNB_DEBUG */
}
static xnb_txbuf_t *
xnb_txbuf_get(xnb_t *xnbp, int flags)
{
xnb_txbuf_t *txp;
ASSERT(MUTEX_HELD(&xnbp->xnb_tx_lock));
txp = kmem_cache_alloc(xnb_txbuf_cachep, flags);
if (txp != NULL) {
ASSERT((txp->xt_flags & XNB_TXBUF_INUSE) == 0);
txp->xt_flags |= XNB_TXBUF_INUSE;
txp->xt_xnbp = xnbp;
txp->xt_mop.dom = xnbp->xnb_peer;
txp->xt_mop.flags = GNTMAP_host_map;
if (!xnbp->xnb_tx_pages_writable)
txp->xt_mop.flags |= GNTMAP_readonly;
xnbp->xnb_tx_buf_count++;
}
return (txp);
}
static void
xnb_txbuf_put(xnb_t *xnbp, xnb_txbuf_t *txp)
{
ASSERT(MUTEX_HELD(&xnbp->xnb_tx_lock));
ASSERT((txp->xt_flags & XNB_TXBUF_INUSE) == XNB_TXBUF_INUSE);
txp->xt_flags &= ~XNB_TXBUF_INUSE;
xnbp->xnb_tx_buf_count--;
kmem_cache_free(xnb_txbuf_cachep, txp);
}
static mblk_t *
xnb_from_peer(xnb_t *xnbp)
{
RING_IDX start, end, loop;
gnttab_map_grant_ref_t *mop;
xnb_txbuf_t **txpp;
netif_tx_request_t *txreq;
boolean_t work_to_do;
mblk_t *head, *tail;
/*
* If the peer granted a read-only mapping to the page then we
* must copy the data, as the local protocol stack (should the
* packet be destined for this host) will modify the packet
* 'in place'.
*/
boolean_t copy = xnbp->xnb_tx_always_copy ||
!xnbp->xnb_tx_pages_writable;
/*
* For each individual request, the sequence of actions is:
*
* 1. get the request.
* 2. map the page based on the grant ref.
* 3. allocate an mblk, copy the data to it.
* 4. release the grant.
* 5. update the ring.
* 6. pass the packet upward.
* 7. kick the peer.
*
* In fact, we try to perform the grant operations in batches,
* so there are two loops.
*/
head = tail = NULL;
around:
ASSERT(MUTEX_HELD(&xnbp->xnb_tx_lock));
/* LINTED: constant in conditional context */
RING_FINAL_CHECK_FOR_REQUESTS(&xnbp->xnb_tx_ring, work_to_do);
if (!work_to_do) {
finished:
return (head);
}
start = xnbp->xnb_tx_ring.req_cons;
end = xnbp->xnb_tx_ring.sring->req_prod;
if ((end - start) > NET_TX_RING_SIZE) {
/*
* This usually indicates that the frontend driver is
* misbehaving, as it's not possible to have more than
* NET_TX_RING_SIZE ring elements in play at any one
* time.
*
* We reset the ring pointers to the state declared by
* the frontend and try to carry on.
*/
cmn_err(CE_WARN, "xnb_from_peer: domain %d tried to give us %u "
"items in the ring, resetting and trying to recover.",
xnbp->xnb_peer, (end - start));
/* LINTED: constant in conditional context */
BACK_RING_ATTACH(&xnbp->xnb_tx_ring,
(netif_tx_sring_t *)xnbp->xnb_tx_ring_addr, PAGESIZE);
goto around;
}
for (loop = start, mop = xnbp->xnb_tx_mop, txpp = xnbp->xnb_tx_bufp;
loop != end;
loop++, mop++, txpp++) {
xnb_txbuf_t *txp;
txp = xnb_txbuf_get(xnbp, KM_NOSLEEP);
if (txp == NULL)
break;
ASSERT(xnbp->xnb_tx_pages_writable ||
((txp->xt_mop.flags & GNTMAP_readonly)
== GNTMAP_readonly));
txp->xt_mop.ref =
RING_GET_REQUEST(&xnbp->xnb_tx_ring, loop)->gref;
*mop = txp->xt_mop;
*txpp = txp;
}
if ((loop - start) == 0)
goto finished;
end = loop;
if (xen_map_gref(GNTTABOP_map_grant_ref, xnbp->xnb_tx_mop,
end - start, B_FALSE) != 0) {
cmn_err(CE_WARN, "xnb_from_peer: map grant operation failed");
loop = start;
txpp = xnbp->xnb_tx_bufp;
while (loop != end) {
xnb_txbuf_put(xnbp, *txpp);
loop++;
txpp++;
}
goto finished;
}
for (loop = start, mop = xnbp->xnb_tx_mop, txpp = xnbp->xnb_tx_bufp;
loop != end;
loop++, mop++, txpp++) {
mblk_t *mp = NULL;
int16_t status = NETIF_RSP_OKAY;
xnb_txbuf_t *txp = *txpp;
if (mop->status != 0) {
cmn_err(CE_WARN, "xnb_from_peer: "
"failed to map buffer: %d",
mop->status);
status = NETIF_RSP_ERROR;
}
txreq = RING_GET_REQUEST(&xnbp->xnb_tx_ring, loop);
if (status == NETIF_RSP_OKAY) {
if (copy) {
mp = allocb(txreq->size, BPRI_MED);
if (mp == NULL) {
status = NETIF_RSP_ERROR;
xnbp->xnb_stat_tx_allocb_failed++;
} else {
bcopy((caddr_t)(uintptr_t)
mop->host_addr + txreq->offset,
mp->b_wptr, txreq->size);
mp->b_wptr += txreq->size;
}
} else {
mp = desballoc((uchar_t *)(uintptr_t)
mop->host_addr + txreq->offset,
txreq->size, 0, &txp->xt_free_rtn);
if (mp == NULL) {
status = NETIF_RSP_ERROR;
xnbp->xnb_stat_tx_allocb_failed++;
} else {
txp->xt_id = txreq->id;
txp->xt_status = status;
txp->xt_mop = *mop;
mp->b_wptr += txreq->size;
}
}
/*
* If we have a buffer and there are checksum
* flags, process them appropriately.
*/
if ((mp != NULL) &&
((txreq->flags &
(NETTXF_csum_blank | NETTXF_data_validated))
!= 0)) {
mp = xnbp->xnb_flavour->xf_cksum_from_peer(xnbp,
mp, txreq->flags);
xnbp->xnb_stat_tx_cksum_no_need++;
}
}
if (copy || (mp == NULL)) {
txp->xt_status = status;
txp->xt_id = txreq->id;
xnb_tx_schedule_unmop(xnbp, mop, txp);
}
if (mp != NULL) {
xnbp->xnb_stat_opackets++;
xnbp->xnb_stat_obytes += txreq->size;
mp->b_next = NULL;
if (head == NULL) {
ASSERT(tail == NULL);
head = mp;
} else {
ASSERT(tail != NULL);
tail->b_next = mp;
}
tail = mp;
}
}
xnbp->xnb_tx_ring.req_cons = loop;
goto around;
/* NOTREACHED */
}
/*
* intr() -- ring interrupt service routine
*/
static uint_t
xnb_intr(caddr_t arg)
{
xnb_t *xnbp = (xnb_t *)arg;
mblk_t *mp;
xnbp->xnb_stat_intr++;
mutex_enter(&xnbp->xnb_tx_lock);
ASSERT(xnbp->xnb_connected);
mp = xnb_from_peer(xnbp);
mutex_exit(&xnbp->xnb_tx_lock);
if (!xnbp->xnb_hotplugged) {
xnbp->xnb_stat_tx_too_early++;
goto fail;
}
if (mp == NULL) {
xnbp->xnb_stat_spurious_intr++;
goto fail;
}
xnbp->xnb_flavour->xf_from_peer(xnbp, mp);
return (DDI_INTR_CLAIMED);
fail:
freemsgchain(mp);
return (DDI_INTR_CLAIMED);
}
static boolean_t
xnb_connect_rings(dev_info_t *dip)
{
xnb_t *xnbp = ddi_get_driver_private(dip);
char *oename;
struct gnttab_map_grant_ref map_op;
evtchn_port_t evtchn;
int i;
/*
* Cannot attempt to connect the rings if already connected.
*/
ASSERT(!xnbp->xnb_connected);
oename = xvdi_get_oename(dip);
if (xenbus_gather(XBT_NULL, oename,
"event-channel", "%u", &evtchn,
"tx-ring-ref", "%lu", &xnbp->xnb_tx_ring_ref,
"rx-ring-ref", "%lu", &xnbp->xnb_rx_ring_ref,
NULL) != 0) {
cmn_err(CE_WARN, "xnb_connect_rings: "
"cannot read other-end details from %s",
oename);
goto fail;
}
if (xenbus_scanf(XBT_NULL, oename,
"feature-tx-writable", "%d", &i) != 0)
i = 0;
if (i != 0)
xnbp->xnb_tx_pages_writable = B_TRUE;
if (xenbus_scanf(XBT_NULL, oename,
"feature-no-csum-offload", "%d", &i) != 0)
i = 0;
if ((i == 1) || !xnbp->xnb_cksum_offload)
xnbp->xnb_cksum_offload = B_FALSE;
/* Check whether our peer knows and requests hypervisor copy */
if (xenbus_scanf(XBT_NULL, oename, "request-rx-copy", "%d", &i)
!= 0)
i = 0;
if (i != 0)
xnbp->xnb_hv_copy = B_TRUE;
/*
* 1. allocate a vaddr for the tx page, one for the rx page.
* 2. call GNTTABOP_map_grant_ref to map the relevant pages
* into the allocated vaddr (one for tx, one for rx).
* 3. call EVTCHNOP_bind_interdomain to have the event channel
* bound to this domain.
* 4. associate the event channel with an interrupt.
* 5. declare ourselves connected.
* 6. enable the interrupt.
*/
/* 1.tx */
xnbp->xnb_tx_ring_addr = vmem_xalloc(heap_arena, PAGESIZE, PAGESIZE,
0, 0, 0, 0, VM_SLEEP);
ASSERT(xnbp->xnb_tx_ring_addr != NULL);
/* 2.tx */
map_op.host_addr = (uint64_t)((long)xnbp->xnb_tx_ring_addr);
map_op.flags = GNTMAP_host_map;
map_op.ref = xnbp->xnb_tx_ring_ref;
map_op.dom = xnbp->xnb_peer;
hat_prepare_mapping(kas.a_hat, xnbp->xnb_tx_ring_addr, NULL);
if (xen_map_gref(GNTTABOP_map_grant_ref, &map_op, 1, B_FALSE) != 0 ||
map_op.status != 0) {
cmn_err(CE_WARN, "xnb_connect_rings: cannot map tx-ring page.");
goto fail;
}
xnbp->xnb_tx_ring_handle = map_op.handle;
/* LINTED: constant in conditional context */
BACK_RING_INIT(&xnbp->xnb_tx_ring,
(netif_tx_sring_t *)xnbp->xnb_tx_ring_addr, PAGESIZE);
/* 1.rx */
xnbp->xnb_rx_ring_addr = vmem_xalloc(heap_arena, PAGESIZE, PAGESIZE,
0, 0, 0, 0, VM_SLEEP);
ASSERT(xnbp->xnb_rx_ring_addr != NULL);
/* 2.rx */
map_op.host_addr = (uint64_t)((long)xnbp->xnb_rx_ring_addr);
map_op.flags = GNTMAP_host_map;
map_op.ref = xnbp->xnb_rx_ring_ref;
map_op.dom = xnbp->xnb_peer;
hat_prepare_mapping(kas.a_hat, xnbp->xnb_rx_ring_addr, NULL);
if (xen_map_gref(GNTTABOP_map_grant_ref, &map_op, 1, B_FALSE) != 0 ||
map_op.status != 0) {
cmn_err(CE_WARN, "xnb_connect_rings: cannot map rx-ring page.");
goto fail;
}
xnbp->xnb_rx_ring_handle = map_op.handle;
/* LINTED: constant in conditional context */
BACK_RING_INIT(&xnbp->xnb_rx_ring,
(netif_rx_sring_t *)xnbp->xnb_rx_ring_addr, PAGESIZE);
/* 3 */
if (xvdi_bind_evtchn(dip, evtchn) != DDI_SUCCESS) {
cmn_err(CE_WARN, "xnb_connect_rings: "
"cannot bind event channel %d", xnbp->xnb_evtchn);
xnbp->xnb_evtchn = INVALID_EVTCHN;
goto fail;
}
xnbp->xnb_evtchn = xvdi_get_evtchn(dip);
/*
* It would be good to set the state to XenbusStateConnected
* here as well, but then what if ddi_add_intr() failed?
* Changing the state in the store will be noticed by the peer
* and cannot be "taken back".
*/
mutex_enter(&xnbp->xnb_tx_lock);
mutex_enter(&xnbp->xnb_rx_lock);
/* 5.1 */
xnbp->xnb_connected = B_TRUE;
mutex_exit(&xnbp->xnb_rx_lock);
mutex_exit(&xnbp->xnb_tx_lock);
/* 4, 6 */
if (ddi_add_intr(dip, 0, NULL, NULL, xnb_intr, (caddr_t)xnbp)
!= DDI_SUCCESS) {
cmn_err(CE_WARN, "xnb_connect_rings: cannot add interrupt");
goto fail;
}
xnbp->xnb_irq = B_TRUE;
/* 5.2 */
(void) xvdi_switch_state(dip, XBT_NULL, XenbusStateConnected);
return (B_TRUE);
fail:
mutex_enter(&xnbp->xnb_tx_lock);
mutex_enter(&xnbp->xnb_rx_lock);
xnbp->xnb_connected = B_FALSE;
mutex_exit(&xnbp->xnb_rx_lock);
mutex_exit(&xnbp->xnb_tx_lock);
return (B_FALSE);
}
static void
xnb_disconnect_rings(dev_info_t *dip)
{
xnb_t *xnbp = ddi_get_driver_private(dip);
if (xnbp->xnb_irq) {
ddi_remove_intr(dip, 0, NULL);
xnbp->xnb_irq = B_FALSE;
}
if (xnbp->xnb_tx_unmop_count > 0)
xnb_tx_perform_pending_unmop(xnbp);
if (xnbp->xnb_evtchn != INVALID_EVTCHN) {
xvdi_free_evtchn(dip);
xnbp->xnb_evtchn = INVALID_EVTCHN;
}
if (xnbp->xnb_rx_ring_handle != INVALID_GRANT_HANDLE) {
struct gnttab_unmap_grant_ref unmap_op;
unmap_op.host_addr = (uint64_t)(uintptr_t)
xnbp->xnb_rx_ring_addr;
unmap_op.dev_bus_addr = 0;
unmap_op.handle = xnbp->xnb_rx_ring_handle;
if (HYPERVISOR_grant_table_op(GNTTABOP_unmap_grant_ref,
&unmap_op, 1) != 0)
cmn_err(CE_WARN, "xnb_disconnect_rings: "
"cannot unmap rx-ring page (%d)",
unmap_op.status);
xnbp->xnb_rx_ring_handle = INVALID_GRANT_HANDLE;
}
if (xnbp->xnb_rx_ring_addr != NULL) {
hat_release_mapping(kas.a_hat, xnbp->xnb_rx_ring_addr);
vmem_free(heap_arena, xnbp->xnb_rx_ring_addr, PAGESIZE);
xnbp->xnb_rx_ring_addr = NULL;
}
if (xnbp->xnb_tx_ring_handle != INVALID_GRANT_HANDLE) {
struct gnttab_unmap_grant_ref unmap_op;
unmap_op.host_addr = (uint64_t)(uintptr_t)
xnbp->xnb_tx_ring_addr;
unmap_op.dev_bus_addr = 0;
unmap_op.handle = xnbp->xnb_tx_ring_handle;
if (HYPERVISOR_grant_table_op(GNTTABOP_unmap_grant_ref,
&unmap_op, 1) != 0)
cmn_err(CE_WARN, "xnb_disconnect_rings: "
"cannot unmap tx-ring page (%d)",
unmap_op.status);
xnbp->xnb_tx_ring_handle = INVALID_GRANT_HANDLE;
}
if (xnbp->xnb_tx_ring_addr != NULL) {
hat_release_mapping(kas.a_hat, xnbp->xnb_tx_ring_addr);
vmem_free(heap_arena, xnbp->xnb_tx_ring_addr, PAGESIZE);
xnbp->xnb_tx_ring_addr = NULL;
}
}
/*ARGSUSED*/
static void
xnb_oe_state_change(dev_info_t *dip, ddi_eventcookie_t id,
void *arg, void *impl_data)
{
xnb_t *xnbp = ddi_get_driver_private(dip);
XenbusState new_state = *(XenbusState *)impl_data;
ASSERT(xnbp != NULL);
switch (new_state) {
case XenbusStateConnected:
/* spurious state change */
if (xnbp->xnb_connected)
return;
if (xnb_connect_rings(dip)) {
xnbp->xnb_flavour->xf_peer_connected(xnbp);
} else {
xnbp->xnb_flavour->xf_peer_disconnected(xnbp);
xnb_disconnect_rings(dip);
(void) xvdi_switch_state(dip, XBT_NULL,
XenbusStateClosed);
(void) xvdi_post_event(dip, XEN_HP_REMOVE);
}
/*
* Now that we've attempted to connect it's reasonable
* to allow an attempt to detach.
*/
xnbp->xnb_detachable = B_TRUE;
break;
case XenbusStateClosing:
(void) xvdi_switch_state(dip, XBT_NULL, XenbusStateClosing);
break;
case XenbusStateClosed:
xnbp->xnb_flavour->xf_peer_disconnected(xnbp);
mutex_enter(&xnbp->xnb_tx_lock);
mutex_enter(&xnbp->xnb_rx_lock);
xnb_disconnect_rings(dip);
xnbp->xnb_connected = B_FALSE;
mutex_exit(&xnbp->xnb_rx_lock);
mutex_exit(&xnbp->xnb_tx_lock);
(void) xvdi_switch_state(dip, XBT_NULL, XenbusStateClosed);
(void) xvdi_post_event(dip, XEN_HP_REMOVE);
/*
* In all likelyhood this is already set (in the above
* case), but if the peer never attempted to connect
* and the domain is destroyed we get here without
* having been through the case above, so we set it to
* be sure.
*/
xnbp->xnb_detachable = B_TRUE;
break;
default:
break;
}
}
/*ARGSUSED*/
static void
xnb_hp_state_change(dev_info_t *dip, ddi_eventcookie_t id,
void *arg, void *impl_data)
{
xnb_t *xnbp = ddi_get_driver_private(dip);
xendev_hotplug_state_t state = *(xendev_hotplug_state_t *)impl_data;
boolean_t success;
ASSERT(xnbp != NULL);
switch (state) {
case Connected:
/* spurious hotplug event */
if (xnbp->xnb_hotplugged)
return;
success = xnbp->xnb_flavour->xf_hotplug_connected(xnbp);
mutex_enter(&xnbp->xnb_tx_lock);
mutex_enter(&xnbp->xnb_rx_lock);
xnbp->xnb_hotplugged = success;
mutex_exit(&xnbp->xnb_rx_lock);
mutex_exit(&xnbp->xnb_tx_lock);
break;
default:
break;
}
}
static struct modldrv modldrv = {
&mod_miscops, "xnb",
};
static struct modlinkage modlinkage = {
MODREV_1, &modldrv, NULL
};
int
_init(void)
{
int i;
mutex_init(&xnb_alloc_page_lock, NULL, MUTEX_DRIVER, NULL);
xnb_txbuf_cachep = kmem_cache_create("xnb_txbuf_cachep",
sizeof (xnb_txbuf_t), 0, xnb_txbuf_constructor,
xnb_txbuf_destructor, NULL, NULL, NULL, 0);
ASSERT(xnb_txbuf_cachep != NULL);
i = mod_install(&modlinkage);
if (i != DDI_SUCCESS) {
kmem_cache_destroy(xnb_txbuf_cachep);
mutex_destroy(&xnb_alloc_page_lock);
}
return (i);
}
int
_info(struct modinfo *modinfop)
{
return (mod_info(&modlinkage, modinfop));
}
int
_fini(void)
{
int i;
i = mod_remove(&modlinkage);
if (i == DDI_SUCCESS) {
kmem_cache_destroy(xnb_txbuf_cachep);
mutex_destroy(&xnb_alloc_page_lock);
}
return (i);
}