ac4b6bcd17
If virtio_setup_intr() failed during boot, we would hang in taskqueue_free() -> taskqueue_terminate() for all the taskq threads to terminate. This will never happen since the scheduler is not running by this point. Reported by: neel, grehan Approved by: grehan (mentor)
2747 lines
64 KiB
C
2747 lines
64 KiB
C
/*-
|
|
* Copyright (c) 2011, Bryan Venteicher <bryanv@daemoninthecloset.org>
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice unmodified, this list of conditions, and the following
|
|
* disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
* IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
* INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
* DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
* THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
|
|
/* Driver for VirtIO network devices. */
|
|
|
|
#include <sys/cdefs.h>
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
#ifdef HAVE_KERNEL_OPTION_HEADERS
|
|
#include "opt_device_polling.h"
|
|
#endif
|
|
|
|
#include <sys/param.h>
|
|
#include <sys/systm.h>
|
|
#include <sys/kernel.h>
|
|
#include <sys/sockio.h>
|
|
#include <sys/mbuf.h>
|
|
#include <sys/malloc.h>
|
|
#include <sys/module.h>
|
|
#include <sys/socket.h>
|
|
#include <sys/sysctl.h>
|
|
#include <sys/taskqueue.h>
|
|
#include <sys/random.h>
|
|
#include <sys/sglist.h>
|
|
#include <sys/lock.h>
|
|
#include <sys/mutex.h>
|
|
|
|
#include <vm/uma.h>
|
|
|
|
#include <net/ethernet.h>
|
|
#include <net/if.h>
|
|
#include <net/if_arp.h>
|
|
#include <net/if_dl.h>
|
|
#include <net/if_types.h>
|
|
#include <net/if_media.h>
|
|
#include <net/if_vlan_var.h>
|
|
|
|
#include <net/bpf.h>
|
|
|
|
#include <netinet/in_systm.h>
|
|
#include <netinet/in.h>
|
|
#include <netinet/ip.h>
|
|
#include <netinet/ip6.h>
|
|
#include <netinet/udp.h>
|
|
#include <netinet/tcp.h>
|
|
#include <netinet/sctp.h>
|
|
|
|
#include <machine/bus.h>
|
|
#include <machine/resource.h>
|
|
#include <sys/bus.h>
|
|
#include <sys/rman.h>
|
|
|
|
#include <dev/virtio/virtio.h>
|
|
#include <dev/virtio/virtqueue.h>
|
|
#include <dev/virtio/network/virtio_net.h>
|
|
#include <dev/virtio/network/if_vtnetvar.h>
|
|
|
|
#include "virtio_if.h"
|
|
|
|
static int vtnet_modevent(module_t, int, void *);
|
|
|
|
static int vtnet_probe(device_t);
|
|
static int vtnet_attach(device_t);
|
|
static int vtnet_detach(device_t);
|
|
static int vtnet_suspend(device_t);
|
|
static int vtnet_resume(device_t);
|
|
static int vtnet_shutdown(device_t);
|
|
static int vtnet_config_change(device_t);
|
|
|
|
static void vtnet_negotiate_features(struct vtnet_softc *);
|
|
static int vtnet_alloc_virtqueues(struct vtnet_softc *);
|
|
static void vtnet_get_hwaddr(struct vtnet_softc *);
|
|
static void vtnet_set_hwaddr(struct vtnet_softc *);
|
|
static int vtnet_is_link_up(struct vtnet_softc *);
|
|
static void vtnet_update_link_status(struct vtnet_softc *);
|
|
static void vtnet_watchdog(struct vtnet_softc *);
|
|
static void vtnet_config_change_task(void *, int);
|
|
static int vtnet_change_mtu(struct vtnet_softc *, int);
|
|
static int vtnet_ioctl(struct ifnet *, u_long, caddr_t);
|
|
|
|
static int vtnet_init_rx_vq(struct vtnet_softc *);
|
|
static void vtnet_free_rx_mbufs(struct vtnet_softc *);
|
|
static void vtnet_free_tx_mbufs(struct vtnet_softc *);
|
|
static void vtnet_free_ctrl_vq(struct vtnet_softc *);
|
|
|
|
#ifdef DEVICE_POLLING
|
|
static poll_handler_t vtnet_poll;
|
|
#endif
|
|
|
|
static struct mbuf * vtnet_alloc_rxbuf(struct vtnet_softc *, int,
|
|
struct mbuf **);
|
|
static int vtnet_replace_rxbuf(struct vtnet_softc *,
|
|
struct mbuf *, int);
|
|
static int vtnet_newbuf(struct vtnet_softc *);
|
|
static void vtnet_discard_merged_rxbuf(struct vtnet_softc *, int);
|
|
static void vtnet_discard_rxbuf(struct vtnet_softc *, struct mbuf *);
|
|
static int vtnet_enqueue_rxbuf(struct vtnet_softc *, struct mbuf *);
|
|
static void vtnet_vlan_tag_remove(struct mbuf *);
|
|
static int vtnet_rx_csum(struct vtnet_softc *, struct mbuf *,
|
|
struct virtio_net_hdr *);
|
|
static int vtnet_rxeof_merged(struct vtnet_softc *, struct mbuf *, int);
|
|
static int vtnet_rxeof(struct vtnet_softc *, int, int *);
|
|
static void vtnet_rx_intr_task(void *, int);
|
|
static int vtnet_rx_vq_intr(void *);
|
|
|
|
static void vtnet_txeof(struct vtnet_softc *);
|
|
static struct mbuf * vtnet_tx_offload(struct vtnet_softc *, struct mbuf *,
|
|
struct virtio_net_hdr *);
|
|
static int vtnet_enqueue_txbuf(struct vtnet_softc *, struct mbuf **,
|
|
struct vtnet_tx_header *);
|
|
static int vtnet_encap(struct vtnet_softc *, struct mbuf **);
|
|
static void vtnet_start_locked(struct ifnet *);
|
|
static void vtnet_start(struct ifnet *);
|
|
static void vtnet_tick(void *);
|
|
static void vtnet_tx_intr_task(void *, int);
|
|
static int vtnet_tx_vq_intr(void *);
|
|
|
|
static void vtnet_stop(struct vtnet_softc *);
|
|
static int vtnet_reinit(struct vtnet_softc *);
|
|
static void vtnet_init_locked(struct vtnet_softc *);
|
|
static void vtnet_init(void *);
|
|
|
|
static void vtnet_exec_ctrl_cmd(struct vtnet_softc *, void *,
|
|
struct sglist *, int, int);
|
|
|
|
static void vtnet_rx_filter(struct vtnet_softc *sc);
|
|
static int vtnet_ctrl_rx_cmd(struct vtnet_softc *, int, int);
|
|
static int vtnet_set_promisc(struct vtnet_softc *, int);
|
|
static int vtnet_set_allmulti(struct vtnet_softc *, int);
|
|
static void vtnet_rx_filter_mac(struct vtnet_softc *);
|
|
|
|
static int vtnet_exec_vlan_filter(struct vtnet_softc *, int, uint16_t);
|
|
static void vtnet_rx_filter_vlan(struct vtnet_softc *);
|
|
static void vtnet_set_vlan_filter(struct vtnet_softc *, int, uint16_t);
|
|
static void vtnet_register_vlan(void *, struct ifnet *, uint16_t);
|
|
static void vtnet_unregister_vlan(void *, struct ifnet *, uint16_t);
|
|
|
|
static int vtnet_ifmedia_upd(struct ifnet *);
|
|
static void vtnet_ifmedia_sts(struct ifnet *, struct ifmediareq *);
|
|
|
|
static void vtnet_add_statistics(struct vtnet_softc *);
|
|
|
|
static int vtnet_enable_rx_intr(struct vtnet_softc *);
|
|
static int vtnet_enable_tx_intr(struct vtnet_softc *);
|
|
static void vtnet_disable_rx_intr(struct vtnet_softc *);
|
|
static void vtnet_disable_tx_intr(struct vtnet_softc *);
|
|
|
|
/* Tunables. */
|
|
static int vtnet_csum_disable = 0;
|
|
TUNABLE_INT("hw.vtnet.csum_disable", &vtnet_csum_disable);
|
|
static int vtnet_tso_disable = 0;
|
|
TUNABLE_INT("hw.vtnet.tso_disable", &vtnet_tso_disable);
|
|
static int vtnet_lro_disable = 0;
|
|
TUNABLE_INT("hw.vtnet.lro_disable", &vtnet_lro_disable);
|
|
|
|
/*
|
|
* Reducing the number of transmit completed interrupts can
|
|
* improve performance. To do so, the define below keeps the
|
|
* Tx vq interrupt disabled and adds calls to vtnet_txeof()
|
|
* in the start and watchdog paths. The price to pay for this
|
|
* is the m_free'ing of transmitted mbufs may be delayed until
|
|
* the watchdog fires.
|
|
*/
|
|
#define VTNET_TX_INTR_MODERATION
|
|
|
|
static uma_zone_t vtnet_tx_header_zone;
|
|
|
|
static struct virtio_feature_desc vtnet_feature_desc[] = {
|
|
{ VIRTIO_NET_F_CSUM, "TxChecksum" },
|
|
{ VIRTIO_NET_F_GUEST_CSUM, "RxChecksum" },
|
|
{ VIRTIO_NET_F_MAC, "MacAddress" },
|
|
{ VIRTIO_NET_F_GSO, "TxAllGSO" },
|
|
{ VIRTIO_NET_F_GUEST_TSO4, "RxTSOv4" },
|
|
{ VIRTIO_NET_F_GUEST_TSO6, "RxTSOv6" },
|
|
{ VIRTIO_NET_F_GUEST_ECN, "RxECN" },
|
|
{ VIRTIO_NET_F_GUEST_UFO, "RxUFO" },
|
|
{ VIRTIO_NET_F_HOST_TSO4, "TxTSOv4" },
|
|
{ VIRTIO_NET_F_HOST_TSO6, "TxTSOv6" },
|
|
{ VIRTIO_NET_F_HOST_ECN, "TxTSOECN" },
|
|
{ VIRTIO_NET_F_HOST_UFO, "TxUFO" },
|
|
{ VIRTIO_NET_F_MRG_RXBUF, "MrgRxBuf" },
|
|
{ VIRTIO_NET_F_STATUS, "Status" },
|
|
{ VIRTIO_NET_F_CTRL_VQ, "ControlVq" },
|
|
{ VIRTIO_NET_F_CTRL_RX, "RxMode" },
|
|
{ VIRTIO_NET_F_CTRL_VLAN, "VLanFilter" },
|
|
{ VIRTIO_NET_F_CTRL_RX_EXTRA, "RxModeExtra" },
|
|
|
|
{ 0, NULL }
|
|
};
|
|
|
|
static device_method_t vtnet_methods[] = {
|
|
/* Device methods. */
|
|
DEVMETHOD(device_probe, vtnet_probe),
|
|
DEVMETHOD(device_attach, vtnet_attach),
|
|
DEVMETHOD(device_detach, vtnet_detach),
|
|
DEVMETHOD(device_suspend, vtnet_suspend),
|
|
DEVMETHOD(device_resume, vtnet_resume),
|
|
DEVMETHOD(device_shutdown, vtnet_shutdown),
|
|
|
|
/* VirtIO methods. */
|
|
DEVMETHOD(virtio_config_change, vtnet_config_change),
|
|
|
|
DEVMETHOD_END
|
|
};
|
|
|
|
static driver_t vtnet_driver = {
|
|
"vtnet",
|
|
vtnet_methods,
|
|
sizeof(struct vtnet_softc)
|
|
};
|
|
static devclass_t vtnet_devclass;
|
|
|
|
DRIVER_MODULE(vtnet, virtio_pci, vtnet_driver, vtnet_devclass,
|
|
vtnet_modevent, 0);
|
|
MODULE_VERSION(vtnet, 1);
|
|
MODULE_DEPEND(vtnet, virtio, 1, 1, 1);
|
|
|
|
static int
|
|
vtnet_modevent(module_t mod, int type, void *unused)
|
|
{
|
|
int error;
|
|
|
|
error = 0;
|
|
|
|
switch (type) {
|
|
case MOD_LOAD:
|
|
vtnet_tx_header_zone = uma_zcreate("vtnet_tx_hdr",
|
|
sizeof(struct vtnet_tx_header),
|
|
NULL, NULL, NULL, NULL, 0, 0);
|
|
break;
|
|
case MOD_QUIESCE:
|
|
case MOD_UNLOAD:
|
|
if (uma_zone_get_cur(vtnet_tx_header_zone) > 0)
|
|
error = EBUSY;
|
|
else if (type == MOD_UNLOAD) {
|
|
uma_zdestroy(vtnet_tx_header_zone);
|
|
vtnet_tx_header_zone = NULL;
|
|
}
|
|
break;
|
|
case MOD_SHUTDOWN:
|
|
break;
|
|
default:
|
|
error = EOPNOTSUPP;
|
|
break;
|
|
}
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
vtnet_probe(device_t dev)
|
|
{
|
|
|
|
if (virtio_get_device_type(dev) != VIRTIO_ID_NETWORK)
|
|
return (ENXIO);
|
|
|
|
device_set_desc(dev, "VirtIO Networking Adapter");
|
|
|
|
return (BUS_PROBE_DEFAULT);
|
|
}
|
|
|
|
static int
|
|
vtnet_attach(device_t dev)
|
|
{
|
|
struct vtnet_softc *sc;
|
|
struct ifnet *ifp;
|
|
int tx_size, error;
|
|
|
|
sc = device_get_softc(dev);
|
|
sc->vtnet_dev = dev;
|
|
|
|
VTNET_LOCK_INIT(sc);
|
|
callout_init_mtx(&sc->vtnet_tick_ch, VTNET_MTX(sc), 0);
|
|
|
|
ifmedia_init(&sc->vtnet_media, IFM_IMASK, vtnet_ifmedia_upd,
|
|
vtnet_ifmedia_sts);
|
|
ifmedia_add(&sc->vtnet_media, VTNET_MEDIATYPE, 0, NULL);
|
|
ifmedia_set(&sc->vtnet_media, VTNET_MEDIATYPE);
|
|
|
|
vtnet_add_statistics(sc);
|
|
|
|
virtio_set_feature_desc(dev, vtnet_feature_desc);
|
|
vtnet_negotiate_features(sc);
|
|
|
|
if (virtio_with_feature(dev, VIRTIO_NET_F_MRG_RXBUF)) {
|
|
sc->vtnet_flags |= VTNET_FLAG_MRG_RXBUFS;
|
|
sc->vtnet_hdr_size = sizeof(struct virtio_net_hdr_mrg_rxbuf);
|
|
} else
|
|
sc->vtnet_hdr_size = sizeof(struct virtio_net_hdr);
|
|
|
|
sc->vtnet_rx_mbuf_size = MCLBYTES;
|
|
sc->vtnet_rx_mbuf_count = VTNET_NEEDED_RX_MBUFS(sc);
|
|
|
|
if (virtio_with_feature(dev, VIRTIO_NET_F_CTRL_VQ)) {
|
|
sc->vtnet_flags |= VTNET_FLAG_CTRL_VQ;
|
|
|
|
if (virtio_with_feature(dev, VIRTIO_NET_F_CTRL_RX)) {
|
|
sc->vtnet_mac_filter = malloc(
|
|
sizeof(struct vtnet_mac_filter), M_DEVBUF,
|
|
M_NOWAIT | M_ZERO);
|
|
if (sc->vtnet_mac_filter == NULL) {
|
|
device_printf(dev,
|
|
"cannot allocate mac filter table\n");
|
|
error = ENOMEM;
|
|
goto fail;
|
|
}
|
|
|
|
sc->vtnet_flags |= VTNET_FLAG_CTRL_RX;
|
|
}
|
|
|
|
if (virtio_with_feature(dev, VIRTIO_NET_F_CTRL_VLAN))
|
|
sc->vtnet_flags |= VTNET_FLAG_VLAN_FILTER;
|
|
}
|
|
|
|
vtnet_get_hwaddr(sc);
|
|
|
|
error = vtnet_alloc_virtqueues(sc);
|
|
if (error) {
|
|
device_printf(dev, "cannot allocate virtqueues\n");
|
|
goto fail;
|
|
}
|
|
|
|
ifp = sc->vtnet_ifp = if_alloc(IFT_ETHER);
|
|
if (ifp == NULL) {
|
|
device_printf(dev, "cannot allocate ifnet structure\n");
|
|
error = ENOSPC;
|
|
goto fail;
|
|
}
|
|
|
|
ifp->if_softc = sc;
|
|
if_initname(ifp, device_get_name(dev), device_get_unit(dev));
|
|
ifp->if_flags = IFF_BROADCAST | IFF_SIMPLEX | IFF_MULTICAST;
|
|
ifp->if_init = vtnet_init;
|
|
ifp->if_start = vtnet_start;
|
|
ifp->if_ioctl = vtnet_ioctl;
|
|
|
|
sc->vtnet_rx_size = virtqueue_size(sc->vtnet_rx_vq);
|
|
sc->vtnet_rx_process_limit = sc->vtnet_rx_size;
|
|
|
|
tx_size = virtqueue_size(sc->vtnet_tx_vq);
|
|
sc->vtnet_tx_size = tx_size;
|
|
IFQ_SET_MAXLEN(&ifp->if_snd, tx_size - 1);
|
|
ifp->if_snd.ifq_drv_maxlen = tx_size - 1;
|
|
IFQ_SET_READY(&ifp->if_snd);
|
|
|
|
ether_ifattach(ifp, sc->vtnet_hwaddr);
|
|
|
|
if (virtio_with_feature(dev, VIRTIO_NET_F_STATUS))
|
|
ifp->if_capabilities |= IFCAP_LINKSTATE;
|
|
|
|
/* Tell the upper layer(s) we support long frames. */
|
|
ifp->if_data.ifi_hdrlen = sizeof(struct ether_vlan_header);
|
|
ifp->if_capabilities |= IFCAP_JUMBO_MTU | IFCAP_VLAN_MTU;
|
|
|
|
if (virtio_with_feature(dev, VIRTIO_NET_F_CSUM)) {
|
|
ifp->if_capabilities |= IFCAP_TXCSUM;
|
|
|
|
if (virtio_with_feature(dev, VIRTIO_NET_F_HOST_TSO4))
|
|
ifp->if_capabilities |= IFCAP_TSO4;
|
|
if (virtio_with_feature(dev, VIRTIO_NET_F_HOST_TSO6))
|
|
ifp->if_capabilities |= IFCAP_TSO6;
|
|
if (ifp->if_capabilities & IFCAP_TSO)
|
|
ifp->if_capabilities |= IFCAP_VLAN_HWTSO;
|
|
|
|
if (virtio_with_feature(dev, VIRTIO_NET_F_HOST_ECN))
|
|
sc->vtnet_flags |= VTNET_FLAG_TSO_ECN;
|
|
}
|
|
|
|
if (virtio_with_feature(dev, VIRTIO_NET_F_GUEST_CSUM)) {
|
|
ifp->if_capabilities |= IFCAP_RXCSUM;
|
|
|
|
if (virtio_with_feature(dev, VIRTIO_NET_F_GUEST_TSO4) ||
|
|
virtio_with_feature(dev, VIRTIO_NET_F_GUEST_TSO6))
|
|
ifp->if_capabilities |= IFCAP_LRO;
|
|
}
|
|
|
|
if (ifp->if_capabilities & IFCAP_HWCSUM) {
|
|
/*
|
|
* VirtIO does not support VLAN tagging, but we can fake
|
|
* it by inserting and removing the 802.1Q header during
|
|
* transmit and receive. We are then able to do checksum
|
|
* offloading of VLAN frames.
|
|
*/
|
|
ifp->if_capabilities |=
|
|
IFCAP_VLAN_HWTAGGING | IFCAP_VLAN_HWCSUM;
|
|
}
|
|
|
|
ifp->if_capenable = ifp->if_capabilities;
|
|
|
|
/*
|
|
* Capabilities after here are not enabled by default.
|
|
*/
|
|
|
|
if (sc->vtnet_flags & VTNET_FLAG_VLAN_FILTER) {
|
|
ifp->if_capabilities |= IFCAP_VLAN_HWFILTER;
|
|
|
|
sc->vtnet_vlan_attach = EVENTHANDLER_REGISTER(vlan_config,
|
|
vtnet_register_vlan, sc, EVENTHANDLER_PRI_FIRST);
|
|
sc->vtnet_vlan_detach = EVENTHANDLER_REGISTER(vlan_unconfig,
|
|
vtnet_unregister_vlan, sc, EVENTHANDLER_PRI_FIRST);
|
|
}
|
|
|
|
#ifdef DEVICE_POLLING
|
|
ifp->if_capabilities |= IFCAP_POLLING;
|
|
#endif
|
|
|
|
TASK_INIT(&sc->vtnet_rx_intr_task, 0, vtnet_rx_intr_task, sc);
|
|
TASK_INIT(&sc->vtnet_tx_intr_task, 0, vtnet_tx_intr_task, sc);
|
|
TASK_INIT(&sc->vtnet_cfgchg_task, 0, vtnet_config_change_task, sc);
|
|
|
|
sc->vtnet_tq = taskqueue_create_fast("vtnet_taskq", M_NOWAIT,
|
|
taskqueue_thread_enqueue, &sc->vtnet_tq);
|
|
if (sc->vtnet_tq == NULL) {
|
|
error = ENOMEM;
|
|
device_printf(dev, "cannot allocate taskqueue\n");
|
|
ether_ifdetach(ifp);
|
|
goto fail;
|
|
}
|
|
|
|
error = virtio_setup_intr(dev, INTR_TYPE_NET);
|
|
if (error) {
|
|
device_printf(dev, "cannot setup virtqueue interrupts\n");
|
|
ether_ifdetach(ifp);
|
|
goto fail;
|
|
}
|
|
|
|
taskqueue_start_threads(&sc->vtnet_tq, 1, PI_NET, "%s taskq",
|
|
device_get_nameunit(dev));
|
|
|
|
/*
|
|
* Device defaults to promiscuous mode for backwards
|
|
* compatibility. Turn it off if possible.
|
|
*/
|
|
if (sc->vtnet_flags & VTNET_FLAG_CTRL_RX) {
|
|
VTNET_LOCK(sc);
|
|
if (vtnet_set_promisc(sc, 0) != 0) {
|
|
ifp->if_flags |= IFF_PROMISC;
|
|
device_printf(dev,
|
|
"cannot disable promiscuous mode\n");
|
|
}
|
|
VTNET_UNLOCK(sc);
|
|
} else
|
|
ifp->if_flags |= IFF_PROMISC;
|
|
|
|
fail:
|
|
if (error)
|
|
vtnet_detach(dev);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
vtnet_detach(device_t dev)
|
|
{
|
|
struct vtnet_softc *sc;
|
|
struct ifnet *ifp;
|
|
|
|
sc = device_get_softc(dev);
|
|
ifp = sc->vtnet_ifp;
|
|
|
|
KASSERT(mtx_initialized(VTNET_MTX(sc)),
|
|
("vtnet mutex not initialized"));
|
|
|
|
#ifdef DEVICE_POLLING
|
|
if (ifp != NULL && ifp->if_capenable & IFCAP_POLLING)
|
|
ether_poll_deregister(ifp);
|
|
#endif
|
|
|
|
if (device_is_attached(dev)) {
|
|
VTNET_LOCK(sc);
|
|
vtnet_stop(sc);
|
|
VTNET_UNLOCK(sc);
|
|
|
|
callout_drain(&sc->vtnet_tick_ch);
|
|
taskqueue_drain(taskqueue_fast, &sc->vtnet_cfgchg_task);
|
|
|
|
ether_ifdetach(ifp);
|
|
}
|
|
|
|
if (sc->vtnet_tq != NULL) {
|
|
taskqueue_drain(sc->vtnet_tq, &sc->vtnet_rx_intr_task);
|
|
taskqueue_drain(sc->vtnet_tq, &sc->vtnet_tx_intr_task);
|
|
taskqueue_free(sc->vtnet_tq);
|
|
sc->vtnet_tq = NULL;
|
|
}
|
|
|
|
if (sc->vtnet_vlan_attach != NULL) {
|
|
EVENTHANDLER_DEREGISTER(vlan_config, sc->vtnet_vlan_attach);
|
|
sc->vtnet_vlan_attach = NULL;
|
|
}
|
|
if (sc->vtnet_vlan_detach != NULL) {
|
|
EVENTHANDLER_DEREGISTER(vlan_unconfg, sc->vtnet_vlan_detach);
|
|
sc->vtnet_vlan_detach = NULL;
|
|
}
|
|
|
|
if (sc->vtnet_mac_filter != NULL) {
|
|
free(sc->vtnet_mac_filter, M_DEVBUF);
|
|
sc->vtnet_mac_filter = NULL;
|
|
}
|
|
|
|
if (ifp != NULL) {
|
|
if_free(ifp);
|
|
sc->vtnet_ifp = NULL;
|
|
}
|
|
|
|
if (sc->vtnet_rx_vq != NULL)
|
|
vtnet_free_rx_mbufs(sc);
|
|
if (sc->vtnet_tx_vq != NULL)
|
|
vtnet_free_tx_mbufs(sc);
|
|
if (sc->vtnet_ctrl_vq != NULL)
|
|
vtnet_free_ctrl_vq(sc);
|
|
|
|
ifmedia_removeall(&sc->vtnet_media);
|
|
VTNET_LOCK_DESTROY(sc);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
vtnet_suspend(device_t dev)
|
|
{
|
|
struct vtnet_softc *sc;
|
|
|
|
sc = device_get_softc(dev);
|
|
|
|
VTNET_LOCK(sc);
|
|
vtnet_stop(sc);
|
|
sc->vtnet_flags |= VTNET_FLAG_SUSPENDED;
|
|
VTNET_UNLOCK(sc);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
vtnet_resume(device_t dev)
|
|
{
|
|
struct vtnet_softc *sc;
|
|
struct ifnet *ifp;
|
|
|
|
sc = device_get_softc(dev);
|
|
ifp = sc->vtnet_ifp;
|
|
|
|
VTNET_LOCK(sc);
|
|
if (ifp->if_flags & IFF_UP)
|
|
vtnet_init_locked(sc);
|
|
sc->vtnet_flags &= ~VTNET_FLAG_SUSPENDED;
|
|
VTNET_UNLOCK(sc);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
vtnet_shutdown(device_t dev)
|
|
{
|
|
|
|
/*
|
|
* Suspend already does all of what we need to
|
|
* do here; we just never expect to be resumed.
|
|
*/
|
|
return (vtnet_suspend(dev));
|
|
}
|
|
|
|
static int
|
|
vtnet_config_change(device_t dev)
|
|
{
|
|
struct vtnet_softc *sc;
|
|
|
|
sc = device_get_softc(dev);
|
|
|
|
taskqueue_enqueue_fast(taskqueue_fast, &sc->vtnet_cfgchg_task);
|
|
|
|
return (1);
|
|
}
|
|
|
|
static void
|
|
vtnet_negotiate_features(struct vtnet_softc *sc)
|
|
{
|
|
device_t dev;
|
|
uint64_t mask, features;
|
|
|
|
dev = sc->vtnet_dev;
|
|
mask = 0;
|
|
|
|
if (vtnet_csum_disable)
|
|
mask |= VIRTIO_NET_F_CSUM | VIRTIO_NET_F_GUEST_CSUM;
|
|
|
|
/*
|
|
* TSO and LRO are only available when their corresponding
|
|
* checksum offload feature is also negotiated.
|
|
*/
|
|
|
|
if (vtnet_csum_disable || vtnet_tso_disable)
|
|
mask |= VIRTIO_NET_F_HOST_TSO4 | VIRTIO_NET_F_HOST_TSO6 |
|
|
VIRTIO_NET_F_HOST_ECN;
|
|
|
|
if (vtnet_csum_disable || vtnet_lro_disable)
|
|
mask |= VTNET_LRO_FEATURES;
|
|
|
|
features = VTNET_FEATURES & ~mask;
|
|
#ifdef VTNET_TX_INTR_MODERATION
|
|
features |= VIRTIO_F_NOTIFY_ON_EMPTY;
|
|
#endif
|
|
sc->vtnet_features = virtio_negotiate_features(dev, features);
|
|
|
|
if (virtio_with_feature(dev, VIRTIO_NET_F_MRG_RXBUF) == 0 &&
|
|
virtio_with_feature(dev, VTNET_LRO_FEATURES)) {
|
|
/*
|
|
* LRO without mergeable buffers requires special care. This
|
|
* is not ideal because every receive buffer must be large
|
|
* enough to hold the maximum TCP packet, the Ethernet header,
|
|
* and the vtnet_rx_header. This requires up to 34 descriptors
|
|
* when using MCLBYTES clusters. If we do not have indirect
|
|
* descriptors, LRO is disabled since the virtqueue will not
|
|
* be able to contain very many receive buffers.
|
|
*/
|
|
if (virtio_with_feature(dev,
|
|
VIRTIO_RING_F_INDIRECT_DESC) == 0) {
|
|
device_printf(dev,
|
|
"LRO disabled due to lack of both mergeable "
|
|
"buffers and indirect descriptors\n");
|
|
|
|
sc->vtnet_features = virtio_negotiate_features(dev,
|
|
features & ~VTNET_LRO_FEATURES);
|
|
} else
|
|
sc->vtnet_flags |= VTNET_FLAG_LRO_NOMRG;
|
|
}
|
|
}
|
|
|
|
static int
|
|
vtnet_alloc_virtqueues(struct vtnet_softc *sc)
|
|
{
|
|
device_t dev;
|
|
struct vq_alloc_info vq_info[3];
|
|
int nvqs, rxsegs;
|
|
|
|
dev = sc->vtnet_dev;
|
|
nvqs = 2;
|
|
|
|
/*
|
|
* Indirect descriptors are not needed for the Rx
|
|
* virtqueue when mergeable buffers are negotiated.
|
|
* The header is placed inline with the data, not
|
|
* in a separate descriptor, and mbuf clusters are
|
|
* always physically contiguous.
|
|
*/
|
|
if ((sc->vtnet_flags & VTNET_FLAG_MRG_RXBUFS) == 0) {
|
|
rxsegs = sc->vtnet_flags & VTNET_FLAG_LRO_NOMRG ?
|
|
VTNET_MAX_RX_SEGS : VTNET_MIN_RX_SEGS;
|
|
} else
|
|
rxsegs = 0;
|
|
|
|
VQ_ALLOC_INFO_INIT(&vq_info[0], rxsegs,
|
|
vtnet_rx_vq_intr, sc, &sc->vtnet_rx_vq,
|
|
"%s receive", device_get_nameunit(dev));
|
|
|
|
VQ_ALLOC_INFO_INIT(&vq_info[1], VTNET_MAX_TX_SEGS,
|
|
vtnet_tx_vq_intr, sc, &sc->vtnet_tx_vq,
|
|
"%s transmit", device_get_nameunit(dev));
|
|
|
|
if (sc->vtnet_flags & VTNET_FLAG_CTRL_VQ) {
|
|
nvqs++;
|
|
|
|
VQ_ALLOC_INFO_INIT(&vq_info[2], 0, NULL, NULL,
|
|
&sc->vtnet_ctrl_vq, "%s control",
|
|
device_get_nameunit(dev));
|
|
}
|
|
|
|
return (virtio_alloc_virtqueues(dev, 0, nvqs, vq_info));
|
|
}
|
|
|
|
static void
|
|
vtnet_get_hwaddr(struct vtnet_softc *sc)
|
|
{
|
|
device_t dev;
|
|
|
|
dev = sc->vtnet_dev;
|
|
|
|
if (virtio_with_feature(dev, VIRTIO_NET_F_MAC)) {
|
|
virtio_read_device_config(dev,
|
|
offsetof(struct virtio_net_config, mac),
|
|
sc->vtnet_hwaddr, ETHER_ADDR_LEN);
|
|
} else {
|
|
/* Generate random locally administered unicast address. */
|
|
sc->vtnet_hwaddr[0] = 0xB2;
|
|
arc4rand(&sc->vtnet_hwaddr[1], ETHER_ADDR_LEN - 1, 0);
|
|
|
|
vtnet_set_hwaddr(sc);
|
|
}
|
|
}
|
|
|
|
static void
|
|
vtnet_set_hwaddr(struct vtnet_softc *sc)
|
|
{
|
|
device_t dev;
|
|
|
|
dev = sc->vtnet_dev;
|
|
|
|
virtio_write_device_config(dev,
|
|
offsetof(struct virtio_net_config, mac),
|
|
sc->vtnet_hwaddr, ETHER_ADDR_LEN);
|
|
}
|
|
|
|
static int
|
|
vtnet_is_link_up(struct vtnet_softc *sc)
|
|
{
|
|
device_t dev;
|
|
struct ifnet *ifp;
|
|
uint16_t status;
|
|
|
|
dev = sc->vtnet_dev;
|
|
ifp = sc->vtnet_ifp;
|
|
|
|
VTNET_LOCK_ASSERT(sc);
|
|
|
|
if ((ifp->if_capenable & IFCAP_LINKSTATE) == 0)
|
|
return (1);
|
|
|
|
status = virtio_read_dev_config_2(dev,
|
|
offsetof(struct virtio_net_config, status));
|
|
|
|
return ((status & VIRTIO_NET_S_LINK_UP) != 0);
|
|
}
|
|
|
|
static void
|
|
vtnet_update_link_status(struct vtnet_softc *sc)
|
|
{
|
|
struct ifnet *ifp;
|
|
int link;
|
|
|
|
ifp = sc->vtnet_ifp;
|
|
|
|
link = vtnet_is_link_up(sc);
|
|
|
|
if (link && ((sc->vtnet_flags & VTNET_FLAG_LINK) == 0)) {
|
|
sc->vtnet_flags |= VTNET_FLAG_LINK;
|
|
if_link_state_change(ifp, LINK_STATE_UP);
|
|
if (!IFQ_DRV_IS_EMPTY(&ifp->if_snd))
|
|
vtnet_start_locked(ifp);
|
|
} else if (!link && (sc->vtnet_flags & VTNET_FLAG_LINK)) {
|
|
sc->vtnet_flags &= ~VTNET_FLAG_LINK;
|
|
if_link_state_change(ifp, LINK_STATE_DOWN);
|
|
}
|
|
}
|
|
|
|
static void
|
|
vtnet_watchdog(struct vtnet_softc *sc)
|
|
{
|
|
struct ifnet *ifp;
|
|
|
|
ifp = sc->vtnet_ifp;
|
|
|
|
#ifdef VTNET_TX_INTR_MODERATION
|
|
vtnet_txeof(sc);
|
|
#endif
|
|
|
|
if (sc->vtnet_watchdog_timer == 0 || --sc->vtnet_watchdog_timer)
|
|
return;
|
|
|
|
if_printf(ifp, "watchdog timeout -- resetting\n");
|
|
#ifdef VTNET_DEBUG
|
|
virtqueue_dump(sc->vtnet_tx_vq);
|
|
#endif
|
|
ifp->if_oerrors++;
|
|
ifp->if_drv_flags &= ~IFF_DRV_RUNNING;
|
|
vtnet_init_locked(sc);
|
|
}
|
|
|
|
static void
|
|
vtnet_config_change_task(void *arg, int pending)
|
|
{
|
|
struct vtnet_softc *sc;
|
|
|
|
sc = arg;
|
|
|
|
VTNET_LOCK(sc);
|
|
vtnet_update_link_status(sc);
|
|
VTNET_UNLOCK(sc);
|
|
}
|
|
|
|
static int
|
|
vtnet_ioctl(struct ifnet *ifp, u_long cmd, caddr_t data)
|
|
{
|
|
struct vtnet_softc *sc;
|
|
struct ifreq *ifr;
|
|
int reinit, mask, error;
|
|
|
|
sc = ifp->if_softc;
|
|
ifr = (struct ifreq *) data;
|
|
reinit = 0;
|
|
error = 0;
|
|
|
|
switch (cmd) {
|
|
case SIOCSIFMTU:
|
|
if (ifr->ifr_mtu < ETHERMIN || ifr->ifr_mtu > VTNET_MAX_MTU)
|
|
error = EINVAL;
|
|
else if (ifp->if_mtu != ifr->ifr_mtu) {
|
|
VTNET_LOCK(sc);
|
|
error = vtnet_change_mtu(sc, ifr->ifr_mtu);
|
|
VTNET_UNLOCK(sc);
|
|
}
|
|
break;
|
|
|
|
case SIOCSIFFLAGS:
|
|
VTNET_LOCK(sc);
|
|
if ((ifp->if_flags & IFF_UP) == 0) {
|
|
if (ifp->if_drv_flags & IFF_DRV_RUNNING)
|
|
vtnet_stop(sc);
|
|
} else if (ifp->if_drv_flags & IFF_DRV_RUNNING) {
|
|
if ((ifp->if_flags ^ sc->vtnet_if_flags) &
|
|
(IFF_PROMISC | IFF_ALLMULTI)) {
|
|
if (sc->vtnet_flags & VTNET_FLAG_CTRL_RX)
|
|
vtnet_rx_filter(sc);
|
|
else
|
|
error = ENOTSUP;
|
|
}
|
|
} else
|
|
vtnet_init_locked(sc);
|
|
|
|
if (error == 0)
|
|
sc->vtnet_if_flags = ifp->if_flags;
|
|
VTNET_UNLOCK(sc);
|
|
break;
|
|
|
|
case SIOCADDMULTI:
|
|
case SIOCDELMULTI:
|
|
VTNET_LOCK(sc);
|
|
if ((sc->vtnet_flags & VTNET_FLAG_CTRL_RX) &&
|
|
(ifp->if_drv_flags & IFF_DRV_RUNNING))
|
|
vtnet_rx_filter_mac(sc);
|
|
VTNET_UNLOCK(sc);
|
|
break;
|
|
|
|
case SIOCSIFMEDIA:
|
|
case SIOCGIFMEDIA:
|
|
error = ifmedia_ioctl(ifp, ifr, &sc->vtnet_media, cmd);
|
|
break;
|
|
|
|
case SIOCSIFCAP:
|
|
mask = ifr->ifr_reqcap ^ ifp->if_capenable;
|
|
|
|
#ifdef DEVICE_POLLING
|
|
if (mask & IFCAP_POLLING) {
|
|
if (ifr->ifr_reqcap & IFCAP_POLLING) {
|
|
error = ether_poll_register(vtnet_poll, ifp);
|
|
if (error)
|
|
break;
|
|
|
|
VTNET_LOCK(sc);
|
|
vtnet_disable_rx_intr(sc);
|
|
vtnet_disable_tx_intr(sc);
|
|
ifp->if_capenable |= IFCAP_POLLING;
|
|
VTNET_UNLOCK(sc);
|
|
} else {
|
|
error = ether_poll_deregister(ifp);
|
|
|
|
/* Enable interrupts even in error case. */
|
|
VTNET_LOCK(sc);
|
|
vtnet_enable_tx_intr(sc);
|
|
vtnet_enable_rx_intr(sc);
|
|
ifp->if_capenable &= ~IFCAP_POLLING;
|
|
VTNET_UNLOCK(sc);
|
|
}
|
|
}
|
|
#endif
|
|
VTNET_LOCK(sc);
|
|
|
|
if (mask & IFCAP_TXCSUM) {
|
|
ifp->if_capenable ^= IFCAP_TXCSUM;
|
|
if (ifp->if_capenable & IFCAP_TXCSUM)
|
|
ifp->if_hwassist |= VTNET_CSUM_OFFLOAD;
|
|
else
|
|
ifp->if_hwassist &= ~VTNET_CSUM_OFFLOAD;
|
|
}
|
|
|
|
if (mask & IFCAP_TSO4) {
|
|
ifp->if_capenable ^= IFCAP_TSO4;
|
|
if (ifp->if_capenable & IFCAP_TSO4)
|
|
ifp->if_hwassist |= CSUM_TSO;
|
|
else
|
|
ifp->if_hwassist &= ~CSUM_TSO;
|
|
}
|
|
|
|
if (mask & IFCAP_RXCSUM) {
|
|
ifp->if_capenable ^= IFCAP_RXCSUM;
|
|
reinit = 1;
|
|
}
|
|
|
|
if (mask & IFCAP_LRO) {
|
|
ifp->if_capenable ^= IFCAP_LRO;
|
|
reinit = 1;
|
|
}
|
|
|
|
if (mask & IFCAP_VLAN_HWFILTER) {
|
|
ifp->if_capenable ^= IFCAP_VLAN_HWFILTER;
|
|
reinit = 1;
|
|
}
|
|
|
|
if (mask & IFCAP_VLAN_HWTSO)
|
|
ifp->if_capenable ^= IFCAP_VLAN_HWTSO;
|
|
|
|
if (mask & IFCAP_VLAN_HWTAGGING)
|
|
ifp->if_capenable ^= IFCAP_VLAN_HWTAGGING;
|
|
|
|
if (reinit && (ifp->if_drv_flags & IFF_DRV_RUNNING)) {
|
|
ifp->if_drv_flags &= ~IFF_DRV_RUNNING;
|
|
vtnet_init_locked(sc);
|
|
}
|
|
VLAN_CAPABILITIES(ifp);
|
|
|
|
VTNET_UNLOCK(sc);
|
|
break;
|
|
|
|
default:
|
|
error = ether_ioctl(ifp, cmd, data);
|
|
break;
|
|
}
|
|
|
|
VTNET_LOCK_ASSERT_NOTOWNED(sc);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
vtnet_change_mtu(struct vtnet_softc *sc, int new_mtu)
|
|
{
|
|
struct ifnet *ifp;
|
|
int new_frame_size, clsize;
|
|
|
|
ifp = sc->vtnet_ifp;
|
|
|
|
if ((sc->vtnet_flags & VTNET_FLAG_MRG_RXBUFS) == 0) {
|
|
new_frame_size = sizeof(struct vtnet_rx_header) +
|
|
sizeof(struct ether_vlan_header) + new_mtu;
|
|
|
|
if (new_frame_size > MJUM9BYTES)
|
|
return (EINVAL);
|
|
|
|
if (new_frame_size <= MCLBYTES)
|
|
clsize = MCLBYTES;
|
|
else
|
|
clsize = MJUM9BYTES;
|
|
} else {
|
|
new_frame_size = sizeof(struct virtio_net_hdr_mrg_rxbuf) +
|
|
sizeof(struct ether_vlan_header) + new_mtu;
|
|
|
|
if (new_frame_size <= MCLBYTES)
|
|
clsize = MCLBYTES;
|
|
else
|
|
clsize = MJUMPAGESIZE;
|
|
}
|
|
|
|
sc->vtnet_rx_mbuf_size = clsize;
|
|
sc->vtnet_rx_mbuf_count = VTNET_NEEDED_RX_MBUFS(sc);
|
|
KASSERT(sc->vtnet_rx_mbuf_count < VTNET_MAX_RX_SEGS,
|
|
("too many rx mbufs: %d", sc->vtnet_rx_mbuf_count));
|
|
|
|
ifp->if_mtu = new_mtu;
|
|
|
|
if (ifp->if_drv_flags & IFF_DRV_RUNNING) {
|
|
ifp->if_drv_flags &= ~IFF_DRV_RUNNING;
|
|
vtnet_init_locked(sc);
|
|
}
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
vtnet_init_rx_vq(struct vtnet_softc *sc)
|
|
{
|
|
struct virtqueue *vq;
|
|
int nbufs, error;
|
|
|
|
vq = sc->vtnet_rx_vq;
|
|
nbufs = 0;
|
|
error = ENOSPC;
|
|
|
|
while (!virtqueue_full(vq)) {
|
|
if ((error = vtnet_newbuf(sc)) != 0)
|
|
break;
|
|
nbufs++;
|
|
}
|
|
|
|
if (nbufs > 0) {
|
|
virtqueue_notify(vq);
|
|
|
|
/*
|
|
* EMSGSIZE signifies the virtqueue did not have enough
|
|
* entries available to hold the last mbuf. This is not
|
|
* an error. We should not get ENOSPC since we check if
|
|
* the virtqueue is full before attempting to add a
|
|
* buffer.
|
|
*/
|
|
if (error == EMSGSIZE)
|
|
error = 0;
|
|
}
|
|
|
|
return (error);
|
|
}
|
|
|
|
static void
|
|
vtnet_free_rx_mbufs(struct vtnet_softc *sc)
|
|
{
|
|
struct virtqueue *vq;
|
|
struct mbuf *m;
|
|
int last;
|
|
|
|
vq = sc->vtnet_rx_vq;
|
|
last = 0;
|
|
|
|
while ((m = virtqueue_drain(vq, &last)) != NULL)
|
|
m_freem(m);
|
|
|
|
KASSERT(virtqueue_empty(vq), ("mbufs remaining in Rx Vq"));
|
|
}
|
|
|
|
static void
|
|
vtnet_free_tx_mbufs(struct vtnet_softc *sc)
|
|
{
|
|
struct virtqueue *vq;
|
|
struct vtnet_tx_header *txhdr;
|
|
int last;
|
|
|
|
vq = sc->vtnet_tx_vq;
|
|
last = 0;
|
|
|
|
while ((txhdr = virtqueue_drain(vq, &last)) != NULL) {
|
|
m_freem(txhdr->vth_mbuf);
|
|
uma_zfree(vtnet_tx_header_zone, txhdr);
|
|
}
|
|
|
|
KASSERT(virtqueue_empty(vq), ("mbufs remaining in Tx Vq"));
|
|
}
|
|
|
|
static void
|
|
vtnet_free_ctrl_vq(struct vtnet_softc *sc)
|
|
{
|
|
|
|
/*
|
|
* The control virtqueue is only polled, therefore
|
|
* it should already be empty.
|
|
*/
|
|
KASSERT(virtqueue_empty(sc->vtnet_ctrl_vq),
|
|
("Ctrl Vq not empty"));
|
|
}
|
|
|
|
#ifdef DEVICE_POLLING
|
|
static int
|
|
vtnet_poll(struct ifnet *ifp, enum poll_cmd cmd, int count)
|
|
{
|
|
struct vtnet_softc *sc;
|
|
int rx_done;
|
|
|
|
sc = ifp->if_softc;
|
|
rx_done = 0;
|
|
|
|
VTNET_LOCK(sc);
|
|
if (ifp->if_drv_flags & IFF_DRV_RUNNING) {
|
|
if (cmd == POLL_AND_CHECK_STATUS)
|
|
vtnet_update_link_status(sc);
|
|
|
|
if (virtqueue_nused(sc->vtnet_rx_vq) > 0)
|
|
vtnet_rxeof(sc, count, &rx_done);
|
|
|
|
vtnet_txeof(sc);
|
|
if (!IFQ_DRV_IS_EMPTY(&ifp->if_snd))
|
|
vtnet_start_locked(ifp);
|
|
}
|
|
VTNET_UNLOCK(sc);
|
|
|
|
return (rx_done);
|
|
}
|
|
#endif /* DEVICE_POLLING */
|
|
|
|
static struct mbuf *
|
|
vtnet_alloc_rxbuf(struct vtnet_softc *sc, int nbufs, struct mbuf **m_tailp)
|
|
{
|
|
struct mbuf *m_head, *m_tail, *m;
|
|
int i, clsize;
|
|
|
|
clsize = sc->vtnet_rx_mbuf_size;
|
|
|
|
m_head = m_getjcl(M_NOWAIT, MT_DATA, M_PKTHDR, clsize);
|
|
if (m_head == NULL)
|
|
goto fail;
|
|
|
|
m_head->m_len = clsize;
|
|
m_tail = m_head;
|
|
|
|
if (nbufs > 1) {
|
|
KASSERT(sc->vtnet_flags & VTNET_FLAG_LRO_NOMRG,
|
|
("chained Rx mbuf requested without LRO_NOMRG"));
|
|
|
|
for (i = 1; i < nbufs; i++) {
|
|
m = m_getjcl(M_NOWAIT, MT_DATA, 0, clsize);
|
|
if (m == NULL)
|
|
goto fail;
|
|
|
|
m->m_len = clsize;
|
|
m_tail->m_next = m;
|
|
m_tail = m;
|
|
}
|
|
}
|
|
|
|
if (m_tailp != NULL)
|
|
*m_tailp = m_tail;
|
|
|
|
return (m_head);
|
|
|
|
fail:
|
|
sc->vtnet_stats.mbuf_alloc_failed++;
|
|
m_freem(m_head);
|
|
|
|
return (NULL);
|
|
}
|
|
|
|
static int
|
|
vtnet_replace_rxbuf(struct vtnet_softc *sc, struct mbuf *m0, int len0)
|
|
{
|
|
struct mbuf *m, *m_prev;
|
|
struct mbuf *m_new, *m_tail;
|
|
int len, clsize, nreplace, error;
|
|
|
|
m = m0;
|
|
m_prev = NULL;
|
|
len = len0;
|
|
|
|
m_tail = NULL;
|
|
clsize = sc->vtnet_rx_mbuf_size;
|
|
nreplace = 0;
|
|
|
|
KASSERT(sc->vtnet_flags & VTNET_FLAG_LRO_NOMRG ||
|
|
m->m_next == NULL, ("chained Rx mbuf without LRO_NOMRG"));
|
|
|
|
/*
|
|
* Since LRO_NOMRG mbuf chains are so large, we want to avoid
|
|
* allocating an entire chain for each received frame. When
|
|
* the received frame's length is less than that of the chain,
|
|
* the unused mbufs are reassigned to the new chain.
|
|
*/
|
|
while (len > 0) {
|
|
/*
|
|
* Something is seriously wrong if we received
|
|
* a frame larger than the mbuf chain. Drop it.
|
|
*/
|
|
if (m == NULL) {
|
|
sc->vtnet_stats.rx_frame_too_large++;
|
|
return (EMSGSIZE);
|
|
}
|
|
|
|
KASSERT(m->m_len == clsize,
|
|
("mbuf length not expected cluster size: %d",
|
|
m->m_len));
|
|
|
|
m->m_len = MIN(m->m_len, len);
|
|
len -= m->m_len;
|
|
|
|
m_prev = m;
|
|
m = m->m_next;
|
|
nreplace++;
|
|
}
|
|
|
|
KASSERT(m_prev != NULL, ("m_prev == NULL"));
|
|
KASSERT(nreplace <= sc->vtnet_rx_mbuf_count,
|
|
("too many replacement mbufs: %d/%d", nreplace,
|
|
sc->vtnet_rx_mbuf_count));
|
|
|
|
m_new = vtnet_alloc_rxbuf(sc, nreplace, &m_tail);
|
|
if (m_new == NULL) {
|
|
m_prev->m_len = clsize;
|
|
return (ENOBUFS);
|
|
}
|
|
|
|
/*
|
|
* Move unused mbufs, if any, from the original chain
|
|
* onto the end of the new chain.
|
|
*/
|
|
if (m_prev->m_next != NULL) {
|
|
m_tail->m_next = m_prev->m_next;
|
|
m_prev->m_next = NULL;
|
|
}
|
|
|
|
error = vtnet_enqueue_rxbuf(sc, m_new);
|
|
if (error) {
|
|
/*
|
|
* BAD! We could not enqueue the replacement mbuf chain. We
|
|
* must restore the m0 chain to the original state if it was
|
|
* modified so we can subsequently discard it.
|
|
*
|
|
* NOTE: The replacement is suppose to be an identical copy
|
|
* to the one just dequeued so this is an unexpected error.
|
|
*/
|
|
sc->vtnet_stats.rx_enq_replacement_failed++;
|
|
|
|
if (m_tail->m_next != NULL) {
|
|
m_prev->m_next = m_tail->m_next;
|
|
m_tail->m_next = NULL;
|
|
}
|
|
|
|
m_prev->m_len = clsize;
|
|
m_freem(m_new);
|
|
}
|
|
|
|
return (error);
|
|
}
|
|
|
|
static int
|
|
vtnet_newbuf(struct vtnet_softc *sc)
|
|
{
|
|
struct mbuf *m;
|
|
int error;
|
|
|
|
m = vtnet_alloc_rxbuf(sc, sc->vtnet_rx_mbuf_count, NULL);
|
|
if (m == NULL)
|
|
return (ENOBUFS);
|
|
|
|
error = vtnet_enqueue_rxbuf(sc, m);
|
|
if (error)
|
|
m_freem(m);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static void
|
|
vtnet_discard_merged_rxbuf(struct vtnet_softc *sc, int nbufs)
|
|
{
|
|
struct virtqueue *vq;
|
|
struct mbuf *m;
|
|
|
|
vq = sc->vtnet_rx_vq;
|
|
|
|
while (--nbufs > 0) {
|
|
if ((m = virtqueue_dequeue(vq, NULL)) == NULL)
|
|
break;
|
|
vtnet_discard_rxbuf(sc, m);
|
|
}
|
|
}
|
|
|
|
static void
|
|
vtnet_discard_rxbuf(struct vtnet_softc *sc, struct mbuf *m)
|
|
{
|
|
int error;
|
|
|
|
/*
|
|
* Requeue the discarded mbuf. This should always be
|
|
* successful since it was just dequeued.
|
|
*/
|
|
error = vtnet_enqueue_rxbuf(sc, m);
|
|
KASSERT(error == 0, ("cannot requeue discarded mbuf"));
|
|
}
|
|
|
|
static int
|
|
vtnet_enqueue_rxbuf(struct vtnet_softc *sc, struct mbuf *m)
|
|
{
|
|
struct sglist sg;
|
|
struct sglist_seg segs[VTNET_MAX_RX_SEGS];
|
|
struct vtnet_rx_header *rxhdr;
|
|
struct virtio_net_hdr *hdr;
|
|
uint8_t *mdata;
|
|
int offset, error;
|
|
|
|
VTNET_LOCK_ASSERT(sc);
|
|
KASSERT(sc->vtnet_flags & VTNET_FLAG_LRO_NOMRG ||
|
|
m->m_next == NULL, ("chained Rx mbuf without LRO_NOMRG"));
|
|
|
|
sglist_init(&sg, VTNET_MAX_RX_SEGS, segs);
|
|
|
|
mdata = mtod(m, uint8_t *);
|
|
offset = 0;
|
|
|
|
if ((sc->vtnet_flags & VTNET_FLAG_MRG_RXBUFS) == 0) {
|
|
rxhdr = (struct vtnet_rx_header *) mdata;
|
|
hdr = &rxhdr->vrh_hdr;
|
|
offset += sizeof(struct vtnet_rx_header);
|
|
|
|
error = sglist_append(&sg, hdr, sc->vtnet_hdr_size);
|
|
KASSERT(error == 0, ("cannot add header to sglist"));
|
|
}
|
|
|
|
error = sglist_append(&sg, mdata + offset, m->m_len - offset);
|
|
if (error)
|
|
return (error);
|
|
|
|
if (m->m_next != NULL) {
|
|
error = sglist_append_mbuf(&sg, m->m_next);
|
|
if (error)
|
|
return (error);
|
|
}
|
|
|
|
return (virtqueue_enqueue(sc->vtnet_rx_vq, m, &sg, 0, sg.sg_nseg));
|
|
}
|
|
|
|
static void
|
|
vtnet_vlan_tag_remove(struct mbuf *m)
|
|
{
|
|
struct ether_vlan_header *evl;
|
|
|
|
evl = mtod(m, struct ether_vlan_header *);
|
|
|
|
m->m_pkthdr.ether_vtag = ntohs(evl->evl_tag);
|
|
m->m_flags |= M_VLANTAG;
|
|
|
|
/* Strip the 802.1Q header. */
|
|
bcopy((char *) evl, (char *) evl + ETHER_VLAN_ENCAP_LEN,
|
|
ETHER_HDR_LEN - ETHER_TYPE_LEN);
|
|
m_adj(m, ETHER_VLAN_ENCAP_LEN);
|
|
}
|
|
|
|
#ifdef notyet
|
|
static int
|
|
vtnet_rx_csum(struct vtnet_softc *sc, struct mbuf *m,
|
|
struct virtio_net_hdr *hdr)
|
|
{
|
|
struct ether_header *eh;
|
|
struct ether_vlan_header *evh;
|
|
struct ip *ip;
|
|
struct ip6_hdr *ip6;
|
|
struct udphdr *udp;
|
|
int ip_offset, csum_start, csum_offset, hlen;
|
|
uint16_t eth_type;
|
|
uint8_t ip_proto;
|
|
|
|
/*
|
|
* Convert the VirtIO checksum interface to FreeBSD's interface.
|
|
* The host only provides us with the offset at which to start
|
|
* checksumming, and the offset from that to place the completed
|
|
* checksum. While this maps well with how Linux does checksums,
|
|
* for FreeBSD, we must parse the received packet in order to set
|
|
* the appropriate CSUM_* flags.
|
|
*/
|
|
|
|
/*
|
|
* Every mbuf added to the receive virtqueue is always at least
|
|
* MCLBYTES big, so assume something is amiss if the first mbuf
|
|
* does not contain both the Ethernet and protocol headers.
|
|
*/
|
|
ip_offset = sizeof(struct ether_header);
|
|
if (m->m_len < ip_offset)
|
|
return (1);
|
|
|
|
eh = mtod(m, struct ether_header *);
|
|
eth_type = ntohs(eh->ether_type);
|
|
if (eth_type == ETHERTYPE_VLAN) {
|
|
ip_offset = sizeof(struct ether_vlan_header);
|
|
if (m->m_len < ip_offset)
|
|
return (1);
|
|
evh = mtod(m, struct ether_vlan_header *);
|
|
eth_type = ntohs(evh->evl_proto);
|
|
}
|
|
|
|
switch (eth_type) {
|
|
case ETHERTYPE_IP:
|
|
if (m->m_len < ip_offset + sizeof(struct ip))
|
|
return (1);
|
|
|
|
ip = (struct ip *)(mtod(m, uint8_t *) + ip_offset);
|
|
/* Sanity check the IP header. */
|
|
if (ip->ip_v != IPVERSION)
|
|
return (1);
|
|
hlen = ip->ip_hl << 2;
|
|
if (hlen < sizeof(struct ip))
|
|
return (1);
|
|
if (ntohs(ip->ip_len) < hlen)
|
|
return (1);
|
|
if (ntohs(ip->ip_len) != (m->m_pkthdr.len - ip_offset))
|
|
return (1);
|
|
|
|
ip_proto = ip->ip_p;
|
|
csum_start = ip_offset + hlen;
|
|
break;
|
|
|
|
case ETHERTYPE_IPV6:
|
|
if (m->m_len < ip_offset + sizeof(struct ip6_hdr))
|
|
return (1);
|
|
|
|
/*
|
|
* XXX FreeBSD does not handle any IPv6 checksum offloading
|
|
* at the moment.
|
|
*/
|
|
|
|
ip6 = (struct ip6_hdr *)(mtod(m, uint8_t *) + ip_offset);
|
|
/* XXX Assume no extension headers are present. */
|
|
ip_proto = ip6->ip6_nxt;
|
|
csum_start = ip_offset + sizeof(struct ip6_hdr);
|
|
break;
|
|
|
|
default:
|
|
sc->vtnet_stats.rx_csum_bad_ethtype++;
|
|
return (1);
|
|
}
|
|
|
|
/* Assume checksum begins right after the IP header. */
|
|
if (hdr->csum_start != csum_start) {
|
|
sc->vtnet_stats.rx_csum_bad_start++;
|
|
return (1);
|
|
}
|
|
|
|
switch (ip_proto) {
|
|
case IPPROTO_TCP:
|
|
csum_offset = offsetof(struct tcphdr, th_sum);
|
|
break;
|
|
|
|
case IPPROTO_UDP:
|
|
csum_offset = offsetof(struct udphdr, uh_sum);
|
|
break;
|
|
|
|
case IPPROTO_SCTP:
|
|
csum_offset = offsetof(struct sctphdr, checksum);
|
|
break;
|
|
|
|
default:
|
|
sc->vtnet_stats.rx_csum_bad_ipproto++;
|
|
return (1);
|
|
}
|
|
|
|
if (hdr->csum_offset != csum_offset) {
|
|
sc->vtnet_stats.rx_csum_bad_offset++;
|
|
return (1);
|
|
}
|
|
|
|
/*
|
|
* The IP header checksum is almost certainly valid but I'm
|
|
* uncertain if that is guaranteed.
|
|
*
|
|
* m->m_pkthdr.csum_flags |= CSUM_IP_CHECKED | CSUM_IP_VALID;
|
|
*/
|
|
|
|
switch (ip_proto) {
|
|
case IPPROTO_UDP:
|
|
if (m->m_len < csum_start + sizeof(struct udphdr))
|
|
return (1);
|
|
|
|
udp = (struct udphdr *)(mtod(m, uint8_t *) + csum_start);
|
|
if (udp->uh_sum == 0)
|
|
return (0);
|
|
|
|
/* FALLTHROUGH */
|
|
|
|
case IPPROTO_TCP:
|
|
m->m_pkthdr.csum_flags |= CSUM_DATA_VALID | CSUM_PSEUDO_HDR;
|
|
m->m_pkthdr.csum_data = 0xFFFF;
|
|
break;
|
|
|
|
case IPPROTO_SCTP:
|
|
m->m_pkthdr.csum_flags |= CSUM_SCTP_VALID;
|
|
break;
|
|
}
|
|
|
|
sc->vtnet_stats.rx_csum_offloaded++;
|
|
|
|
return (0);
|
|
}
|
|
#endif
|
|
|
|
/*
|
|
* Alternative method of doing receive checksum offloading. Rather
|
|
* than parsing the received frame down to the IP header, use the
|
|
* csum_offset to determine which CSUM_* flags are appropriate. We
|
|
* can get by with doing this only because the checksum offsets are
|
|
* unique for the things we care about.
|
|
*/
|
|
static int
|
|
vtnet_rx_csum(struct vtnet_softc *sc, struct mbuf *m,
|
|
struct virtio_net_hdr *hdr)
|
|
{
|
|
struct ether_header *eh;
|
|
struct ether_vlan_header *evh;
|
|
struct udphdr *udp;
|
|
int csum_len;
|
|
uint16_t eth_type;
|
|
|
|
csum_len = hdr->csum_start + hdr->csum_offset;
|
|
|
|
if (csum_len < sizeof(struct ether_header) + sizeof(struct ip))
|
|
return (1);
|
|
if (m->m_len < csum_len)
|
|
return (1);
|
|
|
|
eh = mtod(m, struct ether_header *);
|
|
eth_type = ntohs(eh->ether_type);
|
|
if (eth_type == ETHERTYPE_VLAN) {
|
|
evh = mtod(m, struct ether_vlan_header *);
|
|
eth_type = ntohs(evh->evl_proto);
|
|
}
|
|
|
|
if (eth_type != ETHERTYPE_IP && eth_type != ETHERTYPE_IPV6) {
|
|
sc->vtnet_stats.rx_csum_bad_ethtype++;
|
|
return (1);
|
|
}
|
|
|
|
/* Use the offset to determine the appropriate CSUM_* flags. */
|
|
switch (hdr->csum_offset) {
|
|
case offsetof(struct udphdr, uh_sum):
|
|
if (m->m_len < hdr->csum_start + sizeof(struct udphdr))
|
|
return (1);
|
|
udp = (struct udphdr *)(mtod(m, uint8_t *) + hdr->csum_start);
|
|
if (udp->uh_sum == 0)
|
|
return (0);
|
|
|
|
/* FALLTHROUGH */
|
|
|
|
case offsetof(struct tcphdr, th_sum):
|
|
m->m_pkthdr.csum_flags |= CSUM_DATA_VALID | CSUM_PSEUDO_HDR;
|
|
m->m_pkthdr.csum_data = 0xFFFF;
|
|
break;
|
|
|
|
case offsetof(struct sctphdr, checksum):
|
|
m->m_pkthdr.csum_flags |= CSUM_SCTP_VALID;
|
|
break;
|
|
|
|
default:
|
|
sc->vtnet_stats.rx_csum_bad_offset++;
|
|
return (1);
|
|
}
|
|
|
|
sc->vtnet_stats.rx_csum_offloaded++;
|
|
|
|
return (0);
|
|
}
|
|
|
|
static int
|
|
vtnet_rxeof_merged(struct vtnet_softc *sc, struct mbuf *m_head, int nbufs)
|
|
{
|
|
struct ifnet *ifp;
|
|
struct virtqueue *vq;
|
|
struct mbuf *m, *m_tail;
|
|
int len;
|
|
|
|
ifp = sc->vtnet_ifp;
|
|
vq = sc->vtnet_rx_vq;
|
|
m_tail = m_head;
|
|
|
|
while (--nbufs > 0) {
|
|
m = virtqueue_dequeue(vq, &len);
|
|
if (m == NULL) {
|
|
ifp->if_ierrors++;
|
|
goto fail;
|
|
}
|
|
|
|
if (vtnet_newbuf(sc) != 0) {
|
|
ifp->if_iqdrops++;
|
|
vtnet_discard_rxbuf(sc, m);
|
|
if (nbufs > 1)
|
|
vtnet_discard_merged_rxbuf(sc, nbufs);
|
|
goto fail;
|
|
}
|
|
|
|
if (m->m_len < len)
|
|
len = m->m_len;
|
|
|
|
m->m_len = len;
|
|
m->m_flags &= ~M_PKTHDR;
|
|
|
|
m_head->m_pkthdr.len += len;
|
|
m_tail->m_next = m;
|
|
m_tail = m;
|
|
}
|
|
|
|
return (0);
|
|
|
|
fail:
|
|
sc->vtnet_stats.rx_mergeable_failed++;
|
|
m_freem(m_head);
|
|
|
|
return (1);
|
|
}
|
|
|
|
static int
|
|
vtnet_rxeof(struct vtnet_softc *sc, int count, int *rx_npktsp)
|
|
{
|
|
struct virtio_net_hdr lhdr;
|
|
struct ifnet *ifp;
|
|
struct virtqueue *vq;
|
|
struct mbuf *m;
|
|
struct ether_header *eh;
|
|
struct virtio_net_hdr *hdr;
|
|
struct virtio_net_hdr_mrg_rxbuf *mhdr;
|
|
int len, deq, nbufs, adjsz, rx_npkts;
|
|
|
|
ifp = sc->vtnet_ifp;
|
|
vq = sc->vtnet_rx_vq;
|
|
hdr = &lhdr;
|
|
deq = 0;
|
|
rx_npkts = 0;
|
|
|
|
VTNET_LOCK_ASSERT(sc);
|
|
|
|
while (--count >= 0) {
|
|
m = virtqueue_dequeue(vq, &len);
|
|
if (m == NULL)
|
|
break;
|
|
deq++;
|
|
|
|
if (len < sc->vtnet_hdr_size + ETHER_HDR_LEN) {
|
|
ifp->if_ierrors++;
|
|
vtnet_discard_rxbuf(sc, m);
|
|
continue;
|
|
}
|
|
|
|
if ((sc->vtnet_flags & VTNET_FLAG_MRG_RXBUFS) == 0) {
|
|
nbufs = 1;
|
|
adjsz = sizeof(struct vtnet_rx_header);
|
|
/*
|
|
* Account for our pad between the header and
|
|
* the actual start of the frame.
|
|
*/
|
|
len += VTNET_RX_HEADER_PAD;
|
|
} else {
|
|
mhdr = mtod(m, struct virtio_net_hdr_mrg_rxbuf *);
|
|
nbufs = mhdr->num_buffers;
|
|
adjsz = sizeof(struct virtio_net_hdr_mrg_rxbuf);
|
|
}
|
|
|
|
if (vtnet_replace_rxbuf(sc, m, len) != 0) {
|
|
ifp->if_iqdrops++;
|
|
vtnet_discard_rxbuf(sc, m);
|
|
if (nbufs > 1)
|
|
vtnet_discard_merged_rxbuf(sc, nbufs);
|
|
continue;
|
|
}
|
|
|
|
m->m_pkthdr.len = len;
|
|
m->m_pkthdr.rcvif = ifp;
|
|
m->m_pkthdr.csum_flags = 0;
|
|
|
|
if (nbufs > 1) {
|
|
if (vtnet_rxeof_merged(sc, m, nbufs) != 0)
|
|
continue;
|
|
}
|
|
|
|
ifp->if_ipackets++;
|
|
|
|
/*
|
|
* Save copy of header before we strip it. For both mergeable
|
|
* and non-mergeable, the VirtIO header is placed first in the
|
|
* mbuf's data. We no longer need num_buffers, so always use a
|
|
* virtio_net_hdr.
|
|
*/
|
|
memcpy(hdr, mtod(m, void *), sizeof(struct virtio_net_hdr));
|
|
m_adj(m, adjsz);
|
|
|
|
if (ifp->if_capenable & IFCAP_VLAN_HWTAGGING) {
|
|
eh = mtod(m, struct ether_header *);
|
|
if (eh->ether_type == htons(ETHERTYPE_VLAN)) {
|
|
vtnet_vlan_tag_remove(m);
|
|
|
|
/*
|
|
* With the 802.1Q header removed, update the
|
|
* checksum starting location accordingly.
|
|
*/
|
|
if (hdr->flags & VIRTIO_NET_HDR_F_NEEDS_CSUM)
|
|
hdr->csum_start -=
|
|
ETHER_VLAN_ENCAP_LEN;
|
|
}
|
|
}
|
|
|
|
if (ifp->if_capenable & IFCAP_RXCSUM &&
|
|
hdr->flags & VIRTIO_NET_HDR_F_NEEDS_CSUM) {
|
|
if (vtnet_rx_csum(sc, m, hdr) != 0)
|
|
sc->vtnet_stats.rx_csum_failed++;
|
|
}
|
|
|
|
VTNET_UNLOCK(sc);
|
|
rx_npkts++;
|
|
(*ifp->if_input)(ifp, m);
|
|
VTNET_LOCK(sc);
|
|
|
|
/*
|
|
* The interface may have been stopped while we were
|
|
* passing the packet up the network stack.
|
|
*/
|
|
if ((ifp->if_drv_flags & IFF_DRV_RUNNING) == 0)
|
|
break;
|
|
}
|
|
|
|
if (deq > 0)
|
|
virtqueue_notify(vq);
|
|
|
|
if (rx_npktsp != NULL)
|
|
*rx_npktsp = rx_npkts;
|
|
|
|
return (count > 0 ? 0 : EAGAIN);
|
|
}
|
|
|
|
static void
|
|
vtnet_rx_intr_task(void *arg, int pending)
|
|
{
|
|
struct vtnet_softc *sc;
|
|
struct ifnet *ifp;
|
|
int more;
|
|
|
|
sc = arg;
|
|
ifp = sc->vtnet_ifp;
|
|
|
|
VTNET_LOCK(sc);
|
|
|
|
#ifdef DEVICE_POLLING
|
|
if (ifp->if_capenable & IFCAP_POLLING) {
|
|
VTNET_UNLOCK(sc);
|
|
return;
|
|
}
|
|
#endif
|
|
|
|
if ((ifp->if_drv_flags & IFF_DRV_RUNNING) == 0) {
|
|
vtnet_enable_rx_intr(sc);
|
|
VTNET_UNLOCK(sc);
|
|
return;
|
|
}
|
|
|
|
more = vtnet_rxeof(sc, sc->vtnet_rx_process_limit, NULL);
|
|
if (!more && vtnet_enable_rx_intr(sc) != 0) {
|
|
vtnet_disable_rx_intr(sc);
|
|
more = 1;
|
|
}
|
|
|
|
VTNET_UNLOCK(sc);
|
|
|
|
if (more) {
|
|
sc->vtnet_stats.rx_task_rescheduled++;
|
|
taskqueue_enqueue_fast(sc->vtnet_tq,
|
|
&sc->vtnet_rx_intr_task);
|
|
}
|
|
}
|
|
|
|
static int
|
|
vtnet_rx_vq_intr(void *xsc)
|
|
{
|
|
struct vtnet_softc *sc;
|
|
|
|
sc = xsc;
|
|
|
|
vtnet_disable_rx_intr(sc);
|
|
taskqueue_enqueue_fast(sc->vtnet_tq, &sc->vtnet_rx_intr_task);
|
|
|
|
return (1);
|
|
}
|
|
|
|
static void
|
|
vtnet_txeof(struct vtnet_softc *sc)
|
|
{
|
|
struct virtqueue *vq;
|
|
struct ifnet *ifp;
|
|
struct vtnet_tx_header *txhdr;
|
|
int deq;
|
|
|
|
vq = sc->vtnet_tx_vq;
|
|
ifp = sc->vtnet_ifp;
|
|
deq = 0;
|
|
|
|
VTNET_LOCK_ASSERT(sc);
|
|
|
|
while ((txhdr = virtqueue_dequeue(vq, NULL)) != NULL) {
|
|
deq++;
|
|
ifp->if_opackets++;
|
|
m_freem(txhdr->vth_mbuf);
|
|
uma_zfree(vtnet_tx_header_zone, txhdr);
|
|
}
|
|
|
|
if (deq > 0) {
|
|
ifp->if_drv_flags &= ~IFF_DRV_OACTIVE;
|
|
if (virtqueue_empty(vq))
|
|
sc->vtnet_watchdog_timer = 0;
|
|
}
|
|
}
|
|
|
|
static struct mbuf *
|
|
vtnet_tx_offload(struct vtnet_softc *sc, struct mbuf *m,
|
|
struct virtio_net_hdr *hdr)
|
|
{
|
|
struct ifnet *ifp;
|
|
struct ether_header *eh;
|
|
struct ether_vlan_header *evh;
|
|
struct ip *ip;
|
|
struct ip6_hdr *ip6;
|
|
struct tcphdr *tcp;
|
|
int ip_offset;
|
|
uint16_t eth_type, csum_start;
|
|
uint8_t ip_proto, gso_type;
|
|
|
|
ifp = sc->vtnet_ifp;
|
|
M_ASSERTPKTHDR(m);
|
|
|
|
ip_offset = sizeof(struct ether_header);
|
|
if (m->m_len < ip_offset) {
|
|
if ((m = m_pullup(m, ip_offset)) == NULL)
|
|
return (NULL);
|
|
}
|
|
|
|
eh = mtod(m, struct ether_header *);
|
|
eth_type = ntohs(eh->ether_type);
|
|
if (eth_type == ETHERTYPE_VLAN) {
|
|
ip_offset = sizeof(struct ether_vlan_header);
|
|
if (m->m_len < ip_offset) {
|
|
if ((m = m_pullup(m, ip_offset)) == NULL)
|
|
return (NULL);
|
|
}
|
|
evh = mtod(m, struct ether_vlan_header *);
|
|
eth_type = ntohs(evh->evl_proto);
|
|
}
|
|
|
|
switch (eth_type) {
|
|
case ETHERTYPE_IP:
|
|
if (m->m_len < ip_offset + sizeof(struct ip)) {
|
|
m = m_pullup(m, ip_offset + sizeof(struct ip));
|
|
if (m == NULL)
|
|
return (NULL);
|
|
}
|
|
|
|
ip = (struct ip *)(mtod(m, uint8_t *) + ip_offset);
|
|
ip_proto = ip->ip_p;
|
|
csum_start = ip_offset + (ip->ip_hl << 2);
|
|
gso_type = VIRTIO_NET_HDR_GSO_TCPV4;
|
|
break;
|
|
|
|
case ETHERTYPE_IPV6:
|
|
if (m->m_len < ip_offset + sizeof(struct ip6_hdr)) {
|
|
m = m_pullup(m, ip_offset + sizeof(struct ip6_hdr));
|
|
if (m == NULL)
|
|
return (NULL);
|
|
}
|
|
|
|
ip6 = (struct ip6_hdr *)(mtod(m, uint8_t *) + ip_offset);
|
|
/*
|
|
* XXX Assume no extension headers are present. Presently,
|
|
* this will always be true in the case of TSO, and FreeBSD
|
|
* does not perform checksum offloading of IPv6 yet.
|
|
*/
|
|
ip_proto = ip6->ip6_nxt;
|
|
csum_start = ip_offset + sizeof(struct ip6_hdr);
|
|
gso_type = VIRTIO_NET_HDR_GSO_TCPV6;
|
|
break;
|
|
|
|
default:
|
|
return (m);
|
|
}
|
|
|
|
if (m->m_pkthdr.csum_flags & VTNET_CSUM_OFFLOAD) {
|
|
hdr->flags |= VIRTIO_NET_HDR_F_NEEDS_CSUM;
|
|
hdr->csum_start = csum_start;
|
|
hdr->csum_offset = m->m_pkthdr.csum_data;
|
|
|
|
sc->vtnet_stats.tx_csum_offloaded++;
|
|
}
|
|
|
|
if (m->m_pkthdr.csum_flags & CSUM_TSO) {
|
|
if (ip_proto != IPPROTO_TCP)
|
|
return (m);
|
|
|
|
if (m->m_len < csum_start + sizeof(struct tcphdr)) {
|
|
m = m_pullup(m, csum_start + sizeof(struct tcphdr));
|
|
if (m == NULL)
|
|
return (NULL);
|
|
}
|
|
|
|
tcp = (struct tcphdr *)(mtod(m, uint8_t *) + csum_start);
|
|
hdr->gso_type = gso_type;
|
|
hdr->hdr_len = csum_start + (tcp->th_off << 2);
|
|
hdr->gso_size = m->m_pkthdr.tso_segsz;
|
|
|
|
if (tcp->th_flags & TH_CWR) {
|
|
/*
|
|
* Drop if we did not negotiate VIRTIO_NET_F_HOST_ECN.
|
|
* ECN support is only configurable globally with the
|
|
* net.inet.tcp.ecn.enable sysctl knob.
|
|
*/
|
|
if ((sc->vtnet_flags & VTNET_FLAG_TSO_ECN) == 0) {
|
|
if_printf(ifp, "TSO with ECN not supported "
|
|
"by host\n");
|
|
m_freem(m);
|
|
return (NULL);
|
|
}
|
|
|
|
hdr->flags |= VIRTIO_NET_HDR_GSO_ECN;
|
|
}
|
|
|
|
sc->vtnet_stats.tx_tso_offloaded++;
|
|
}
|
|
|
|
return (m);
|
|
}
|
|
|
|
static int
|
|
vtnet_enqueue_txbuf(struct vtnet_softc *sc, struct mbuf **m_head,
|
|
struct vtnet_tx_header *txhdr)
|
|
{
|
|
struct sglist sg;
|
|
struct sglist_seg segs[VTNET_MAX_TX_SEGS];
|
|
struct virtqueue *vq;
|
|
struct mbuf *m;
|
|
int collapsed, error;
|
|
|
|
vq = sc->vtnet_tx_vq;
|
|
m = *m_head;
|
|
collapsed = 0;
|
|
|
|
sglist_init(&sg, VTNET_MAX_TX_SEGS, segs);
|
|
error = sglist_append(&sg, &txhdr->vth_uhdr, sc->vtnet_hdr_size);
|
|
KASSERT(error == 0 && sg.sg_nseg == 1,
|
|
("cannot add header to sglist"));
|
|
|
|
again:
|
|
error = sglist_append_mbuf(&sg, m);
|
|
if (error) {
|
|
if (collapsed)
|
|
goto fail;
|
|
|
|
m = m_collapse(m, M_NOWAIT, VTNET_MAX_TX_SEGS - 1);
|
|
if (m == NULL)
|
|
goto fail;
|
|
|
|
*m_head = m;
|
|
collapsed = 1;
|
|
goto again;
|
|
}
|
|
|
|
txhdr->vth_mbuf = m;
|
|
|
|
return (virtqueue_enqueue(vq, txhdr, &sg, sg.sg_nseg, 0));
|
|
|
|
fail:
|
|
m_freem(*m_head);
|
|
*m_head = NULL;
|
|
|
|
return (ENOBUFS);
|
|
}
|
|
|
|
static int
|
|
vtnet_encap(struct vtnet_softc *sc, struct mbuf **m_head)
|
|
{
|
|
struct vtnet_tx_header *txhdr;
|
|
struct virtio_net_hdr *hdr;
|
|
struct mbuf *m;
|
|
int error;
|
|
|
|
m = *m_head;
|
|
|
|
txhdr = uma_zalloc(vtnet_tx_header_zone, M_NOWAIT | M_ZERO);
|
|
if (txhdr == NULL) {
|
|
*m_head = NULL;
|
|
m_freem(m);
|
|
return (ENOMEM);
|
|
}
|
|
|
|
/*
|
|
* Always use the non-mergeable header to simplify things. When
|
|
* the mergeable feature is negotiated, the num_buffers field
|
|
* must be set to zero. We use vtnet_hdr_size later to enqueue
|
|
* the correct header size to the host.
|
|
*/
|
|
hdr = &txhdr->vth_uhdr.hdr;
|
|
|
|
if (m->m_flags & M_VLANTAG) {
|
|
m = ether_vlanencap(m, m->m_pkthdr.ether_vtag);
|
|
if ((*m_head = m) == NULL) {
|
|
error = ENOBUFS;
|
|
goto fail;
|
|
}
|
|
m->m_flags &= ~M_VLANTAG;
|
|
}
|
|
|
|
if (m->m_pkthdr.csum_flags != 0) {
|
|
m = vtnet_tx_offload(sc, m, hdr);
|
|
if ((*m_head = m) == NULL) {
|
|
error = ENOBUFS;
|
|
goto fail;
|
|
}
|
|
}
|
|
|
|
error = vtnet_enqueue_txbuf(sc, m_head, txhdr);
|
|
fail:
|
|
if (error)
|
|
uma_zfree(vtnet_tx_header_zone, txhdr);
|
|
|
|
return (error);
|
|
}
|
|
|
|
static void
|
|
vtnet_start(struct ifnet *ifp)
|
|
{
|
|
struct vtnet_softc *sc;
|
|
|
|
sc = ifp->if_softc;
|
|
|
|
VTNET_LOCK(sc);
|
|
vtnet_start_locked(ifp);
|
|
VTNET_UNLOCK(sc);
|
|
}
|
|
|
|
static void
|
|
vtnet_start_locked(struct ifnet *ifp)
|
|
{
|
|
struct vtnet_softc *sc;
|
|
struct virtqueue *vq;
|
|
struct mbuf *m0;
|
|
int enq;
|
|
|
|
sc = ifp->if_softc;
|
|
vq = sc->vtnet_tx_vq;
|
|
enq = 0;
|
|
|
|
VTNET_LOCK_ASSERT(sc);
|
|
|
|
if ((ifp->if_drv_flags & (IFF_DRV_RUNNING | IFF_DRV_OACTIVE)) !=
|
|
IFF_DRV_RUNNING || ((sc->vtnet_flags & VTNET_FLAG_LINK) == 0))
|
|
return;
|
|
|
|
#ifdef VTNET_TX_INTR_MODERATION
|
|
if (virtqueue_nused(vq) >= sc->vtnet_tx_size / 2)
|
|
vtnet_txeof(sc);
|
|
#endif
|
|
|
|
while (!IFQ_DRV_IS_EMPTY(&ifp->if_snd)) {
|
|
if (virtqueue_full(vq)) {
|
|
ifp->if_drv_flags |= IFF_DRV_OACTIVE;
|
|
break;
|
|
}
|
|
|
|
IFQ_DRV_DEQUEUE(&ifp->if_snd, m0);
|
|
if (m0 == NULL)
|
|
break;
|
|
|
|
if (vtnet_encap(sc, &m0) != 0) {
|
|
if (m0 == NULL)
|
|
break;
|
|
IFQ_DRV_PREPEND(&ifp->if_snd, m0);
|
|
ifp->if_drv_flags |= IFF_DRV_OACTIVE;
|
|
break;
|
|
}
|
|
|
|
enq++;
|
|
ETHER_BPF_MTAP(ifp, m0);
|
|
}
|
|
|
|
if (enq > 0) {
|
|
virtqueue_notify(vq);
|
|
sc->vtnet_watchdog_timer = VTNET_WATCHDOG_TIMEOUT;
|
|
}
|
|
}
|
|
|
|
static void
|
|
vtnet_tick(void *xsc)
|
|
{
|
|
struct vtnet_softc *sc;
|
|
|
|
sc = xsc;
|
|
|
|
VTNET_LOCK_ASSERT(sc);
|
|
#ifdef VTNET_DEBUG
|
|
virtqueue_dump(sc->vtnet_rx_vq);
|
|
virtqueue_dump(sc->vtnet_tx_vq);
|
|
#endif
|
|
|
|
vtnet_watchdog(sc);
|
|
callout_reset(&sc->vtnet_tick_ch, hz, vtnet_tick, sc);
|
|
}
|
|
|
|
static void
|
|
vtnet_tx_intr_task(void *arg, int pending)
|
|
{
|
|
struct vtnet_softc *sc;
|
|
struct ifnet *ifp;
|
|
|
|
sc = arg;
|
|
ifp = sc->vtnet_ifp;
|
|
|
|
VTNET_LOCK(sc);
|
|
|
|
#ifdef DEVICE_POLLING
|
|
if (ifp->if_capenable & IFCAP_POLLING) {
|
|
VTNET_UNLOCK(sc);
|
|
return;
|
|
}
|
|
#endif
|
|
|
|
if ((ifp->if_drv_flags & IFF_DRV_RUNNING) == 0) {
|
|
vtnet_enable_tx_intr(sc);
|
|
VTNET_UNLOCK(sc);
|
|
return;
|
|
}
|
|
|
|
vtnet_txeof(sc);
|
|
|
|
if (!IFQ_DRV_IS_EMPTY(&ifp->if_snd))
|
|
vtnet_start_locked(ifp);
|
|
|
|
if (vtnet_enable_tx_intr(sc) != 0) {
|
|
vtnet_disable_tx_intr(sc);
|
|
sc->vtnet_stats.tx_task_rescheduled++;
|
|
VTNET_UNLOCK(sc);
|
|
taskqueue_enqueue_fast(sc->vtnet_tq, &sc->vtnet_tx_intr_task);
|
|
return;
|
|
}
|
|
|
|
VTNET_UNLOCK(sc);
|
|
}
|
|
|
|
static int
|
|
vtnet_tx_vq_intr(void *xsc)
|
|
{
|
|
struct vtnet_softc *sc;
|
|
|
|
sc = xsc;
|
|
|
|
vtnet_disable_tx_intr(sc);
|
|
taskqueue_enqueue_fast(sc->vtnet_tq, &sc->vtnet_tx_intr_task);
|
|
|
|
return (1);
|
|
}
|
|
|
|
static void
|
|
vtnet_stop(struct vtnet_softc *sc)
|
|
{
|
|
device_t dev;
|
|
struct ifnet *ifp;
|
|
|
|
dev = sc->vtnet_dev;
|
|
ifp = sc->vtnet_ifp;
|
|
|
|
VTNET_LOCK_ASSERT(sc);
|
|
|
|
sc->vtnet_watchdog_timer = 0;
|
|
callout_stop(&sc->vtnet_tick_ch);
|
|
ifp->if_drv_flags &= ~(IFF_DRV_RUNNING | IFF_DRV_OACTIVE);
|
|
|
|
vtnet_disable_rx_intr(sc);
|
|
vtnet_disable_tx_intr(sc);
|
|
|
|
/*
|
|
* Stop the host VirtIO adapter. Note this will reset the host
|
|
* adapter's state back to the pre-initialized state, so in
|
|
* order to make the device usable again, we must drive it
|
|
* through virtio_reinit() and virtio_reinit_complete().
|
|
*/
|
|
virtio_stop(dev);
|
|
|
|
sc->vtnet_flags &= ~VTNET_FLAG_LINK;
|
|
|
|
vtnet_free_rx_mbufs(sc);
|
|
vtnet_free_tx_mbufs(sc);
|
|
}
|
|
|
|
static int
|
|
vtnet_reinit(struct vtnet_softc *sc)
|
|
{
|
|
struct ifnet *ifp;
|
|
uint64_t features;
|
|
|
|
ifp = sc->vtnet_ifp;
|
|
features = sc->vtnet_features;
|
|
|
|
/*
|
|
* Re-negotiate with the host, removing any disabled receive
|
|
* features. Transmit features are disabled only on our side
|
|
* via if_capenable and if_hwassist.
|
|
*/
|
|
|
|
if (ifp->if_capabilities & IFCAP_RXCSUM) {
|
|
if ((ifp->if_capenable & IFCAP_RXCSUM) == 0)
|
|
features &= ~VIRTIO_NET_F_GUEST_CSUM;
|
|
}
|
|
|
|
if (ifp->if_capabilities & IFCAP_LRO) {
|
|
if ((ifp->if_capenable & IFCAP_LRO) == 0)
|
|
features &= ~VTNET_LRO_FEATURES;
|
|
}
|
|
|
|
if (ifp->if_capabilities & IFCAP_VLAN_HWFILTER) {
|
|
if ((ifp->if_capenable & IFCAP_VLAN_HWFILTER) == 0)
|
|
features &= ~VIRTIO_NET_F_CTRL_VLAN;
|
|
}
|
|
|
|
return (virtio_reinit(sc->vtnet_dev, features));
|
|
}
|
|
|
|
static void
|
|
vtnet_init_locked(struct vtnet_softc *sc)
|
|
{
|
|
device_t dev;
|
|
struct ifnet *ifp;
|
|
int error;
|
|
|
|
dev = sc->vtnet_dev;
|
|
ifp = sc->vtnet_ifp;
|
|
|
|
VTNET_LOCK_ASSERT(sc);
|
|
|
|
if (ifp->if_drv_flags & IFF_DRV_RUNNING)
|
|
return;
|
|
|
|
/* Stop host's adapter, cancel any pending I/O. */
|
|
vtnet_stop(sc);
|
|
|
|
/* Reinitialize the host device. */
|
|
error = vtnet_reinit(sc);
|
|
if (error) {
|
|
device_printf(dev,
|
|
"reinitialization failed, stopping device...\n");
|
|
vtnet_stop(sc);
|
|
return;
|
|
}
|
|
|
|
/* Update host with assigned MAC address. */
|
|
bcopy(IF_LLADDR(ifp), sc->vtnet_hwaddr, ETHER_ADDR_LEN);
|
|
vtnet_set_hwaddr(sc);
|
|
|
|
ifp->if_hwassist = 0;
|
|
if (ifp->if_capenable & IFCAP_TXCSUM)
|
|
ifp->if_hwassist |= VTNET_CSUM_OFFLOAD;
|
|
if (ifp->if_capenable & IFCAP_TSO4)
|
|
ifp->if_hwassist |= CSUM_TSO;
|
|
|
|
error = vtnet_init_rx_vq(sc);
|
|
if (error) {
|
|
device_printf(dev,
|
|
"cannot allocate mbufs for Rx virtqueue\n");
|
|
vtnet_stop(sc);
|
|
return;
|
|
}
|
|
|
|
if (sc->vtnet_flags & VTNET_FLAG_CTRL_VQ) {
|
|
if (sc->vtnet_flags & VTNET_FLAG_CTRL_RX) {
|
|
/* Restore promiscuous and all-multicast modes. */
|
|
vtnet_rx_filter(sc);
|
|
|
|
/* Restore filtered MAC addresses. */
|
|
vtnet_rx_filter_mac(sc);
|
|
}
|
|
|
|
/* Restore VLAN filters. */
|
|
if (ifp->if_capenable & IFCAP_VLAN_HWFILTER)
|
|
vtnet_rx_filter_vlan(sc);
|
|
}
|
|
|
|
#ifdef DEVICE_POLLING
|
|
if (ifp->if_capenable & IFCAP_POLLING) {
|
|
vtnet_disable_rx_intr(sc);
|
|
vtnet_disable_tx_intr(sc);
|
|
} else
|
|
#endif
|
|
{
|
|
vtnet_enable_rx_intr(sc);
|
|
vtnet_enable_tx_intr(sc);
|
|
}
|
|
|
|
ifp->if_drv_flags |= IFF_DRV_RUNNING;
|
|
ifp->if_drv_flags &= ~IFF_DRV_OACTIVE;
|
|
|
|
virtio_reinit_complete(dev);
|
|
|
|
vtnet_update_link_status(sc);
|
|
callout_reset(&sc->vtnet_tick_ch, hz, vtnet_tick, sc);
|
|
}
|
|
|
|
static void
|
|
vtnet_init(void *xsc)
|
|
{
|
|
struct vtnet_softc *sc;
|
|
|
|
sc = xsc;
|
|
|
|
VTNET_LOCK(sc);
|
|
vtnet_init_locked(sc);
|
|
VTNET_UNLOCK(sc);
|
|
}
|
|
|
|
static void
|
|
vtnet_exec_ctrl_cmd(struct vtnet_softc *sc, void *cookie,
|
|
struct sglist *sg, int readable, int writable)
|
|
{
|
|
struct virtqueue *vq;
|
|
void *c;
|
|
|
|
vq = sc->vtnet_ctrl_vq;
|
|
|
|
VTNET_LOCK_ASSERT(sc);
|
|
KASSERT(sc->vtnet_flags & VTNET_FLAG_CTRL_VQ,
|
|
("no control virtqueue"));
|
|
KASSERT(virtqueue_empty(vq),
|
|
("control command already enqueued"));
|
|
|
|
if (virtqueue_enqueue(vq, cookie, sg, readable, writable) != 0)
|
|
return;
|
|
|
|
virtqueue_notify(vq);
|
|
|
|
/*
|
|
* Poll until the command is complete. Previously, we would
|
|
* sleep until the control virtqueue interrupt handler woke
|
|
* us up, but dropping the VTNET_MTX leads to serialization
|
|
* difficulties.
|
|
*
|
|
* Furthermore, it appears QEMU/KVM only allocates three MSIX
|
|
* vectors. Two of those vectors are needed for the Rx and Tx
|
|
* virtqueues. We do not support sharing both a Vq and config
|
|
* changed notification on the same MSIX vector.
|
|
*/
|
|
c = virtqueue_poll(vq, NULL);
|
|
KASSERT(c == cookie, ("unexpected control command response"));
|
|
}
|
|
|
|
static void
|
|
vtnet_rx_filter(struct vtnet_softc *sc)
|
|
{
|
|
device_t dev;
|
|
struct ifnet *ifp;
|
|
|
|
dev = sc->vtnet_dev;
|
|
ifp = sc->vtnet_ifp;
|
|
|
|
VTNET_LOCK_ASSERT(sc);
|
|
KASSERT(sc->vtnet_flags & VTNET_FLAG_CTRL_RX,
|
|
("CTRL_RX feature not negotiated"));
|
|
|
|
if (vtnet_set_promisc(sc, ifp->if_flags & IFF_PROMISC) != 0)
|
|
device_printf(dev, "cannot %s promiscuous mode\n",
|
|
ifp->if_flags & IFF_PROMISC ? "enable" : "disable");
|
|
|
|
if (vtnet_set_allmulti(sc, ifp->if_flags & IFF_ALLMULTI) != 0)
|
|
device_printf(dev, "cannot %s all-multicast mode\n",
|
|
ifp->if_flags & IFF_ALLMULTI ? "enable" : "disable");
|
|
}
|
|
|
|
static int
|
|
vtnet_ctrl_rx_cmd(struct vtnet_softc *sc, int cmd, int on)
|
|
{
|
|
struct virtio_net_ctrl_hdr hdr;
|
|
struct sglist_seg segs[3];
|
|
struct sglist sg;
|
|
uint8_t onoff, ack;
|
|
int error;
|
|
|
|
if ((sc->vtnet_flags & VTNET_FLAG_CTRL_RX) == 0)
|
|
return (ENOTSUP);
|
|
|
|
error = 0;
|
|
|
|
hdr.class = VIRTIO_NET_CTRL_RX;
|
|
hdr.cmd = cmd;
|
|
onoff = !!on;
|
|
ack = VIRTIO_NET_ERR;
|
|
|
|
sglist_init(&sg, 3, segs);
|
|
error |= sglist_append(&sg, &hdr, sizeof(struct virtio_net_ctrl_hdr));
|
|
error |= sglist_append(&sg, &onoff, sizeof(uint8_t));
|
|
error |= sglist_append(&sg, &ack, sizeof(uint8_t));
|
|
KASSERT(error == 0 && sg.sg_nseg == 3,
|
|
("error adding Rx filter message to sglist"));
|
|
|
|
vtnet_exec_ctrl_cmd(sc, &ack, &sg, sg.sg_nseg - 1, 1);
|
|
|
|
return (ack == VIRTIO_NET_OK ? 0 : EIO);
|
|
}
|
|
|
|
static int
|
|
vtnet_set_promisc(struct vtnet_softc *sc, int on)
|
|
{
|
|
|
|
return (vtnet_ctrl_rx_cmd(sc, VIRTIO_NET_CTRL_RX_PROMISC, on));
|
|
}
|
|
|
|
static int
|
|
vtnet_set_allmulti(struct vtnet_softc *sc, int on)
|
|
{
|
|
|
|
return (vtnet_ctrl_rx_cmd(sc, VIRTIO_NET_CTRL_RX_ALLMULTI, on));
|
|
}
|
|
|
|
static void
|
|
vtnet_rx_filter_mac(struct vtnet_softc *sc)
|
|
{
|
|
struct virtio_net_ctrl_hdr hdr;
|
|
struct vtnet_mac_filter *filter;
|
|
struct sglist_seg segs[4];
|
|
struct sglist sg;
|
|
struct ifnet *ifp;
|
|
struct ifaddr *ifa;
|
|
struct ifmultiaddr *ifma;
|
|
int ucnt, mcnt, promisc, allmulti, error;
|
|
uint8_t ack;
|
|
|
|
ifp = sc->vtnet_ifp;
|
|
filter = sc->vtnet_mac_filter;
|
|
ucnt = 0;
|
|
mcnt = 0;
|
|
promisc = 0;
|
|
allmulti = 0;
|
|
error = 0;
|
|
|
|
VTNET_LOCK_ASSERT(sc);
|
|
KASSERT(sc->vtnet_flags & VTNET_FLAG_CTRL_RX,
|
|
("CTRL_RX feature not negotiated"));
|
|
|
|
/* Unicast MAC addresses: */
|
|
if_addr_rlock(ifp);
|
|
TAILQ_FOREACH(ifa, &ifp->if_addrhead, ifa_link) {
|
|
if (ifa->ifa_addr->sa_family != AF_LINK)
|
|
continue;
|
|
else if (ucnt == VTNET_MAX_MAC_ENTRIES)
|
|
break;
|
|
|
|
bcopy(LLADDR((struct sockaddr_dl *)ifa->ifa_addr),
|
|
&filter->vmf_unicast.macs[ucnt], ETHER_ADDR_LEN);
|
|
ucnt++;
|
|
}
|
|
if_addr_runlock(ifp);
|
|
|
|
if (ucnt >= VTNET_MAX_MAC_ENTRIES) {
|
|
promisc = 1;
|
|
filter->vmf_unicast.nentries = 0;
|
|
|
|
if_printf(ifp, "more than %d MAC addresses assigned, "
|
|
"falling back to promiscuous mode\n",
|
|
VTNET_MAX_MAC_ENTRIES);
|
|
} else
|
|
filter->vmf_unicast.nentries = ucnt;
|
|
|
|
/* Multicast MAC addresses: */
|
|
if_maddr_rlock(ifp);
|
|
TAILQ_FOREACH(ifma, &ifp->if_multiaddrs, ifma_link) {
|
|
if (ifma->ifma_addr->sa_family != AF_LINK)
|
|
continue;
|
|
else if (mcnt == VTNET_MAX_MAC_ENTRIES)
|
|
break;
|
|
|
|
bcopy(LLADDR((struct sockaddr_dl *)ifma->ifma_addr),
|
|
&filter->vmf_multicast.macs[mcnt], ETHER_ADDR_LEN);
|
|
mcnt++;
|
|
}
|
|
if_maddr_runlock(ifp);
|
|
|
|
if (mcnt >= VTNET_MAX_MAC_ENTRIES) {
|
|
allmulti = 1;
|
|
filter->vmf_multicast.nentries = 0;
|
|
|
|
if_printf(ifp, "more than %d multicast MAC addresses "
|
|
"assigned, falling back to all-multicast mode\n",
|
|
VTNET_MAX_MAC_ENTRIES);
|
|
} else
|
|
filter->vmf_multicast.nentries = mcnt;
|
|
|
|
if (promisc && allmulti)
|
|
goto out;
|
|
|
|
hdr.class = VIRTIO_NET_CTRL_MAC;
|
|
hdr.cmd = VIRTIO_NET_CTRL_MAC_TABLE_SET;
|
|
ack = VIRTIO_NET_ERR;
|
|
|
|
sglist_init(&sg, 4, segs);
|
|
error |= sglist_append(&sg, &hdr, sizeof(struct virtio_net_ctrl_hdr));
|
|
error |= sglist_append(&sg, &filter->vmf_unicast,
|
|
sizeof(struct vtnet_mac_table));
|
|
error |= sglist_append(&sg, &filter->vmf_multicast,
|
|
sizeof(struct vtnet_mac_table));
|
|
error |= sglist_append(&sg, &ack, sizeof(uint8_t));
|
|
KASSERT(error == 0 && sg.sg_nseg == 4,
|
|
("error adding MAC filtering message to sglist"));
|
|
|
|
vtnet_exec_ctrl_cmd(sc, &ack, &sg, sg.sg_nseg - 1, 1);
|
|
|
|
if (ack != VIRTIO_NET_OK)
|
|
if_printf(ifp, "error setting host MAC filter table\n");
|
|
|
|
out:
|
|
if (promisc)
|
|
if (vtnet_set_promisc(sc, 1) != 0)
|
|
if_printf(ifp, "cannot enable promiscuous mode\n");
|
|
if (allmulti)
|
|
if (vtnet_set_allmulti(sc, 1) != 0)
|
|
if_printf(ifp, "cannot enable all-multicast mode\n");
|
|
}
|
|
|
|
static int
|
|
vtnet_exec_vlan_filter(struct vtnet_softc *sc, int add, uint16_t tag)
|
|
{
|
|
struct virtio_net_ctrl_hdr hdr;
|
|
struct sglist_seg segs[3];
|
|
struct sglist sg;
|
|
uint8_t ack;
|
|
int error;
|
|
|
|
hdr.class = VIRTIO_NET_CTRL_VLAN;
|
|
hdr.cmd = add ? VIRTIO_NET_CTRL_VLAN_ADD : VIRTIO_NET_CTRL_VLAN_DEL;
|
|
ack = VIRTIO_NET_ERR;
|
|
error = 0;
|
|
|
|
sglist_init(&sg, 3, segs);
|
|
error |= sglist_append(&sg, &hdr, sizeof(struct virtio_net_ctrl_hdr));
|
|
error |= sglist_append(&sg, &tag, sizeof(uint16_t));
|
|
error |= sglist_append(&sg, &ack, sizeof(uint8_t));
|
|
KASSERT(error == 0 && sg.sg_nseg == 3,
|
|
("error adding VLAN control message to sglist"));
|
|
|
|
vtnet_exec_ctrl_cmd(sc, &ack, &sg, sg.sg_nseg - 1, 1);
|
|
|
|
return (ack == VIRTIO_NET_OK ? 0 : EIO);
|
|
}
|
|
|
|
static void
|
|
vtnet_rx_filter_vlan(struct vtnet_softc *sc)
|
|
{
|
|
device_t dev;
|
|
uint32_t w, mask;
|
|
uint16_t tag;
|
|
int i, nvlans, error;
|
|
|
|
VTNET_LOCK_ASSERT(sc);
|
|
KASSERT(sc->vtnet_flags & VTNET_FLAG_VLAN_FILTER,
|
|
("VLAN_FILTER feature not negotiated"));
|
|
|
|
dev = sc->vtnet_dev;
|
|
nvlans = sc->vtnet_nvlans;
|
|
error = 0;
|
|
|
|
/* Enable filtering for each configured VLAN. */
|
|
for (i = 0; i < VTNET_VLAN_SHADOW_SIZE && nvlans > 0; i++) {
|
|
w = sc->vtnet_vlan_shadow[i];
|
|
for (mask = 1, tag = i * 32; w != 0; mask <<= 1, tag++) {
|
|
if ((w & mask) != 0) {
|
|
w &= ~mask;
|
|
nvlans--;
|
|
if (vtnet_exec_vlan_filter(sc, 1, tag) != 0)
|
|
error++;
|
|
}
|
|
}
|
|
}
|
|
|
|
KASSERT(nvlans == 0, ("VLAN count incorrect"));
|
|
if (error)
|
|
device_printf(dev, "cannot restore VLAN filter table\n");
|
|
}
|
|
|
|
static void
|
|
vtnet_set_vlan_filter(struct vtnet_softc *sc, int add, uint16_t tag)
|
|
{
|
|
struct ifnet *ifp;
|
|
int idx, bit;
|
|
|
|
KASSERT(sc->vtnet_flags & VTNET_FLAG_VLAN_FILTER,
|
|
("VLAN_FILTER feature not negotiated"));
|
|
|
|
if ((tag == 0) || (tag > 4095))
|
|
return;
|
|
|
|
ifp = sc->vtnet_ifp;
|
|
idx = (tag >> 5) & 0x7F;
|
|
bit = tag & 0x1F;
|
|
|
|
VTNET_LOCK(sc);
|
|
|
|
/* Update shadow VLAN table. */
|
|
if (add) {
|
|
sc->vtnet_nvlans++;
|
|
sc->vtnet_vlan_shadow[idx] |= (1 << bit);
|
|
} else {
|
|
sc->vtnet_nvlans--;
|
|
sc->vtnet_vlan_shadow[idx] &= ~(1 << bit);
|
|
}
|
|
|
|
if (ifp->if_capenable & IFCAP_VLAN_HWFILTER) {
|
|
if (vtnet_exec_vlan_filter(sc, add, tag) != 0) {
|
|
device_printf(sc->vtnet_dev,
|
|
"cannot %s VLAN %d %s the host filter table\n",
|
|
add ? "add" : "remove", tag,
|
|
add ? "to" : "from");
|
|
}
|
|
}
|
|
|
|
VTNET_UNLOCK(sc);
|
|
}
|
|
|
|
static void
|
|
vtnet_register_vlan(void *arg, struct ifnet *ifp, uint16_t tag)
|
|
{
|
|
|
|
if (ifp->if_softc != arg)
|
|
return;
|
|
|
|
vtnet_set_vlan_filter(arg, 1, tag);
|
|
}
|
|
|
|
static void
|
|
vtnet_unregister_vlan(void *arg, struct ifnet *ifp, uint16_t tag)
|
|
{
|
|
|
|
if (ifp->if_softc != arg)
|
|
return;
|
|
|
|
vtnet_set_vlan_filter(arg, 0, tag);
|
|
}
|
|
|
|
static int
|
|
vtnet_ifmedia_upd(struct ifnet *ifp)
|
|
{
|
|
struct vtnet_softc *sc;
|
|
struct ifmedia *ifm;
|
|
|
|
sc = ifp->if_softc;
|
|
ifm = &sc->vtnet_media;
|
|
|
|
if (IFM_TYPE(ifm->ifm_media) != IFM_ETHER)
|
|
return (EINVAL);
|
|
|
|
return (0);
|
|
}
|
|
|
|
static void
|
|
vtnet_ifmedia_sts(struct ifnet *ifp, struct ifmediareq *ifmr)
|
|
{
|
|
struct vtnet_softc *sc;
|
|
|
|
sc = ifp->if_softc;
|
|
|
|
ifmr->ifm_status = IFM_AVALID;
|
|
ifmr->ifm_active = IFM_ETHER;
|
|
|
|
VTNET_LOCK(sc);
|
|
if (vtnet_is_link_up(sc) != 0) {
|
|
ifmr->ifm_status |= IFM_ACTIVE;
|
|
ifmr->ifm_active |= VTNET_MEDIATYPE;
|
|
} else
|
|
ifmr->ifm_active |= IFM_NONE;
|
|
VTNET_UNLOCK(sc);
|
|
}
|
|
|
|
static void
|
|
vtnet_add_statistics(struct vtnet_softc *sc)
|
|
{
|
|
device_t dev;
|
|
struct vtnet_statistics *stats;
|
|
struct sysctl_ctx_list *ctx;
|
|
struct sysctl_oid *tree;
|
|
struct sysctl_oid_list *child;
|
|
|
|
dev = sc->vtnet_dev;
|
|
stats = &sc->vtnet_stats;
|
|
ctx = device_get_sysctl_ctx(dev);
|
|
tree = device_get_sysctl_tree(dev);
|
|
child = SYSCTL_CHILDREN(tree);
|
|
|
|
SYSCTL_ADD_ULONG(ctx, child, OID_AUTO, "mbuf_alloc_failed",
|
|
CTLFLAG_RD, &stats->mbuf_alloc_failed,
|
|
"Mbuf cluster allocation failures");
|
|
|
|
SYSCTL_ADD_ULONG(ctx, child, OID_AUTO, "rx_frame_too_large",
|
|
CTLFLAG_RD, &stats->rx_frame_too_large,
|
|
"Received frame larger than the mbuf chain");
|
|
SYSCTL_ADD_ULONG(ctx, child, OID_AUTO, "rx_enq_replacement_failed",
|
|
CTLFLAG_RD, &stats->rx_enq_replacement_failed,
|
|
"Enqueuing the replacement receive mbuf failed");
|
|
SYSCTL_ADD_ULONG(ctx, child, OID_AUTO, "rx_mergeable_failed",
|
|
CTLFLAG_RD, &stats->rx_mergeable_failed,
|
|
"Mergeable buffers receive failures");
|
|
SYSCTL_ADD_ULONG(ctx, child, OID_AUTO, "rx_csum_bad_ethtype",
|
|
CTLFLAG_RD, &stats->rx_csum_bad_ethtype,
|
|
"Received checksum offloaded buffer with unsupported "
|
|
"Ethernet type");
|
|
SYSCTL_ADD_ULONG(ctx, child, OID_AUTO, "rx_csum_bad_start",
|
|
CTLFLAG_RD, &stats->rx_csum_bad_start,
|
|
"Received checksum offloaded buffer with incorrect start offset");
|
|
SYSCTL_ADD_ULONG(ctx, child, OID_AUTO, "rx_csum_bad_ipproto",
|
|
CTLFLAG_RD, &stats->rx_csum_bad_ipproto,
|
|
"Received checksum offloaded buffer with incorrect IP protocol");
|
|
SYSCTL_ADD_ULONG(ctx, child, OID_AUTO, "rx_csum_bad_offset",
|
|
CTLFLAG_RD, &stats->rx_csum_bad_offset,
|
|
"Received checksum offloaded buffer with incorrect offset");
|
|
SYSCTL_ADD_ULONG(ctx, child, OID_AUTO, "rx_csum_failed",
|
|
CTLFLAG_RD, &stats->rx_csum_failed,
|
|
"Received buffer checksum offload failed");
|
|
SYSCTL_ADD_ULONG(ctx, child, OID_AUTO, "rx_csum_offloaded",
|
|
CTLFLAG_RD, &stats->rx_csum_offloaded,
|
|
"Received buffer checksum offload succeeded");
|
|
SYSCTL_ADD_ULONG(ctx, child, OID_AUTO, "rx_task_rescheduled",
|
|
CTLFLAG_RD, &stats->rx_task_rescheduled,
|
|
"Times the receive interrupt task rescheduled itself");
|
|
|
|
SYSCTL_ADD_ULONG(ctx, child, OID_AUTO, "tx_csum_offloaded",
|
|
CTLFLAG_RD, &stats->tx_csum_offloaded,
|
|
"Offloaded checksum of transmitted buffer");
|
|
SYSCTL_ADD_ULONG(ctx, child, OID_AUTO, "tx_tso_offloaded",
|
|
CTLFLAG_RD, &stats->tx_tso_offloaded,
|
|
"Segmentation offload of transmitted buffer");
|
|
SYSCTL_ADD_ULONG(ctx, child, OID_AUTO, "tx_csum_bad_ethtype",
|
|
CTLFLAG_RD, &stats->tx_csum_bad_ethtype,
|
|
"Aborted transmit of checksum offloaded buffer with unknown "
|
|
"Ethernet type");
|
|
SYSCTL_ADD_ULONG(ctx, child, OID_AUTO, "tx_tso_bad_ethtype",
|
|
CTLFLAG_RD, &stats->tx_tso_bad_ethtype,
|
|
"Aborted transmit of TSO buffer with unknown Ethernet type");
|
|
SYSCTL_ADD_ULONG(ctx, child, OID_AUTO, "tx_task_rescheduled",
|
|
CTLFLAG_RD, &stats->tx_task_rescheduled,
|
|
"Times the transmit interrupt task rescheduled itself");
|
|
}
|
|
|
|
static int
|
|
vtnet_enable_rx_intr(struct vtnet_softc *sc)
|
|
{
|
|
|
|
return (virtqueue_enable_intr(sc->vtnet_rx_vq));
|
|
}
|
|
|
|
static void
|
|
vtnet_disable_rx_intr(struct vtnet_softc *sc)
|
|
{
|
|
|
|
virtqueue_disable_intr(sc->vtnet_rx_vq);
|
|
}
|
|
|
|
static int
|
|
vtnet_enable_tx_intr(struct vtnet_softc *sc)
|
|
{
|
|
|
|
#ifdef VTNET_TX_INTR_MODERATION
|
|
return (0);
|
|
#else
|
|
return (virtqueue_enable_intr(sc->vtnet_tx_vq));
|
|
#endif
|
|
}
|
|
|
|
static void
|
|
vtnet_disable_tx_intr(struct vtnet_softc *sc)
|
|
{
|
|
|
|
virtqueue_disable_intr(sc->vtnet_tx_vq);
|
|
}
|