[qca-nss-drv] Add pvxlan support

Change-Id: Id528f23d0878c1f4065ce62d63adddfd97e6c73b
Signed-off-by: Cemil Coskun <ccoskun@codeaurora.org>
diff --git a/nss_pvxlan.c b/nss_pvxlan.c
new file mode 100644
index 0000000..6958abc
--- /dev/null
+++ b/nss_pvxlan.c
@@ -0,0 +1,447 @@
+/*
+ **************************************************************************
+ * Copyright (c) 2019, The Linux Foundation. All rights reserved.
+ * Permission to use, copy, modify, and/or distribute this software for
+ * any purpose with or without fee is hereby granted, provided that the
+ * above copyright notice and this permission notice appear in all copies.
+ * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
+ * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
+ * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
+ * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
+ * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
+ * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
+ * OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
+ **************************************************************************
+ */
+
+ /*
+  * nss_pvxlan.c
+  *	NSS PVXLAN driver interface APIs
+  */
+#include "nss_core.h"
+#include "nss_pvxlan.h"
+#include "nss_cmn.h"
+#include "nss_tx_rx_common.h"
+#include "nss_pvxlan_stats.h"
+#include "nss_pvxlan_log.h"
+
+#define NSS_PVXLAN_TX_TIMEOUT 3000
+
+/*
+ * Spinlock for protecting tunnel operations colliding with a tunnel destroy
+ */
+DEFINE_SPINLOCK(nss_pvxlan_spinlock);
+
+/*
+ * Private data structure
+ */
+static struct nss_pvxlan_pvt {
+	struct semaphore sem;		/* Semaphore structure. */
+	struct completion complete;	/* Completion structure. */
+	int response;			/* Response from FW. */
+	void *cb;			/* Original cb for msgs. */
+	void *app_data;			/* Original app_data for msgs. */
+} pvxlan_pvt;
+
+/*
+ * Per PVxLAN tunnel/interface number instance.
+ */
+struct nss_pvxlan_handle {
+	atomic_t refcnt;			/* Reference count on the tunnel */
+	uint32_t if_num;			/* Interface number */
+	uint32_t tunnel_status;			/* 0=disable, 1=enabled */
+	nss_pvxlan_msg_callback_t msg_callback;	/* Msg callback */
+	void *app_data;				/* App data (argument) */
+};
+
+/*
+ * Array of pointer for NSS PvLAN handles. Each handle has per-tunnel
+ * stats based on the if_num which is an index.
+ */
+static struct nss_pvxlan_handle *nss_pvxlan_hdl[NSS_MAX_DYNAMIC_INTERFACES];
+
+/*
+ * nss_pvxlan_verify_if_num()
+ *	Verify if_num passed to us.
+ */
+static bool nss_pvxlan_verify_if_num(uint32_t if_num)
+{
+	uint32_t type = nss_dynamic_interface_get_type(nss_pvxlan_get_ctx(), if_num);
+
+	return ((type == NSS_DYNAMIC_INTERFACE_TYPE_PVXLAN_HOST_INNER) ||
+				(type == NSS_DYNAMIC_INTERFACE_TYPE_PVXLAN_OUTER));
+}
+
+/*
+ * nss_pvxlan_hdl_instance_free()
+ *	Free PVxLAN tunnel handle instance.
+ */
+static bool nss_pvxlan_hdl_instance_free(struct nss_ctx_instance *nss_ctx, uint32_t if_num)
+{
+	struct nss_pvxlan_handle *h;
+
+	spin_lock(&nss_pvxlan_spinlock);
+	h = nss_pvxlan_hdl[if_num - NSS_DYNAMIC_IF_START];
+	if (!h) {
+		spin_unlock(&nss_pvxlan_spinlock);
+		nss_warning("%p: Instance does not exist: %d", nss_ctx, if_num);
+		return false;
+	}
+
+	if (h->if_num != if_num) {
+		spin_unlock(&nss_pvxlan_spinlock);
+		nss_warning("%p: Not correct if_num: %d", nss_ctx, if_num);
+		return false;
+	}
+
+	nss_pvxlan_hdl[if_num - NSS_DYNAMIC_IF_START] = NULL;
+	spin_unlock(&nss_pvxlan_spinlock);
+	kfree(h);
+	return true;
+}
+
+/*
+ * nss_pvxlan_hdl_instance_alloc()
+ *	Allocate PVxLAN tunnel instance.
+ */
+static bool nss_pvxlan_hdl_instance_alloc(struct nss_ctx_instance *nss_ctx, uint32_t if_num,
+							nss_pvxlan_msg_callback_t notify_cb, void *app_data)
+{
+	struct nss_pvxlan_handle *h;
+
+	/*
+	 * Allocate a handle
+	 */
+	h = kzalloc(sizeof(struct nss_pvxlan_handle), GFP_ATOMIC);
+	if (!h) {
+		nss_warning("%p: no memory for allocating PVxLAN handle instance for interface : %d", nss_ctx, if_num);
+		return false;
+	}
+	h->if_num = if_num;
+
+	spin_lock(&nss_pvxlan_spinlock);
+	if (nss_pvxlan_hdl[if_num - NSS_DYNAMIC_IF_START] != NULL) {
+		spin_unlock(&nss_pvxlan_spinlock);
+		kfree(h);
+		nss_warning("%p: The handle has been taken by another thread :%d", nss_ctx, if_num);
+		return false;
+	}
+
+	h->msg_callback = notify_cb;
+	h->app_data = app_data;
+	nss_pvxlan_hdl[if_num - NSS_DYNAMIC_IF_START] = h;
+	spin_unlock(&nss_pvxlan_spinlock);
+
+	return true;
+}
+
+/*
+ * nss_pvxlan_callback()
+ *	Callback to handle the completion of NSS->HLOS messages.
+ */
+static void nss_pvxlan_callback(void *app_data, struct nss_pvxlan_msg *nvxm)
+{
+	nss_pvxlan_msg_callback_t callback = (nss_pvxlan_msg_callback_t)pvxlan_pvt.cb;
+	void *data = pvxlan_pvt.app_data;
+
+	pvxlan_pvt.response = NSS_TX_SUCCESS;
+	pvxlan_pvt.cb = NULL;
+	pvxlan_pvt.app_data = NULL;
+
+	if (nvxm->cm.response != NSS_CMN_RESPONSE_ACK) {
+		nss_warning("Pvxlan Error response %d\n", nvxm->cm.response);
+		pvxlan_pvt.response = nvxm->cm.response;
+	}
+
+	if (callback) {
+		callback(data, nvxm);
+	}
+	complete(&pvxlan_pvt.complete);
+}
+
+/*
+ * nss_pvxlan_handler()
+ *	Handle NSS -> HLOS messages for PVxLAN.
+ */
+static void nss_pvxlan_msg_handler(struct nss_ctx_instance *nss_ctx, struct nss_cmn_msg *ncm, __attribute__((unused))void *app_data)
+{
+	struct nss_pvxlan_msg *nvxm = (struct nss_pvxlan_msg *)ncm;
+	nss_pvxlan_msg_callback_t cb;
+	struct nss_pvxlan_handle * h;
+
+	BUG_ON(!nss_pvxlan_verify_if_num(ncm->interface));
+
+	/*
+	 * Is this a valid request/response packet?
+	 */
+	if (ncm->type >= NSS_PVXLAN_MSG_TYPE_MAX) {
+		nss_warning("%p: received invalid message %d for PVXLAN interface", nss_ctx, ncm->type);
+		return;
+	}
+
+	if (nss_cmn_get_msg_len(ncm) > sizeof(struct nss_pvxlan_msg)) {
+		nss_warning("%p: Length of message is greater than required: %d", nss_ctx, nss_cmn_get_msg_len(ncm));
+		return;
+	}
+
+	/*
+	 * Trace messages.
+	 */
+	nss_core_log_msg_failures(nss_ctx, ncm);
+	nss_pvxlan_log_rx_msg(nvxm);
+
+	switch (nvxm->cm.type) {
+	case NSS_PVXLAN_MSG_TYPE_SYNC_STATS:
+		nss_pvxlan_stats_sync(nss_ctx, &nvxm->msg.stats, ncm->interface);
+		break;
+	}
+
+
+	/*
+	 * Update the callback and app_data for NOTIFY messages.
+	 */
+	if (ncm->response == NSS_CMN_RESPONSE_NOTIFY) {
+		uint32_t if_num = ncm->interface - NSS_DYNAMIC_IF_START;
+		spin_lock(&nss_pvxlan_spinlock);
+		h = nss_pvxlan_hdl[if_num];
+		if (h) {
+			ncm->cb = (nss_ptr_t)h->msg_callback;
+			ncm->app_data = (nss_ptr_t)h->app_data;
+		}
+		spin_unlock(&nss_pvxlan_spinlock);
+
+	}
+
+	cb = (nss_pvxlan_msg_callback_t)ncm->cb;
+
+	/*
+	 * Do we have a callback
+	 */
+	if (!cb) {
+		nss_trace("%p: cb is null for interface %d", nss_ctx, ncm->interface);
+		return;
+	}
+
+	cb((void *)ncm->app_data, nvxm);
+}
+
+/*
+ * nss_pvxlan_tx_msg()
+ *	Transmit a PVXLAN message to NSS FW. Don't call this from softirq/interrupts.
+ */
+nss_tx_status_t nss_pvxlan_tx_msg(struct nss_ctx_instance *nss_ctx, struct nss_pvxlan_msg *msg)
+{
+	struct nss_cmn_msg *ncm = &msg->cm;
+
+	if (!nss_pvxlan_verify_if_num(msg->cm.interface)) {
+		return NSS_TX_FAILURE_BAD_PARAM;
+	}
+
+	if (ncm->type >= NSS_PVXLAN_MSG_TYPE_MAX) {
+		return NSS_TX_FAILURE_BAD_PARAM;
+	}
+
+	/*
+	 * Trace messages.
+	 */
+	nss_pvxlan_log_tx_msg(msg);
+
+	return nss_core_send_cmd(nss_ctx, msg, sizeof(*msg), NSS_NBUF_PAYLOAD_SIZE);
+}
+EXPORT_SYMBOL(nss_pvxlan_tx_msg);
+
+/*
+ * nss_pvxlan_tx_msg_sync()
+ *	Transmit a pvxlan message to NSS firmware synchronously.
+ */
+nss_tx_status_t nss_pvxlan_tx_msg_sync(struct nss_ctx_instance *nss_ctx, struct nss_pvxlan_msg *nvxm)
+{
+	nss_tx_status_t status;
+	int ret;
+
+	down(&pvxlan_pvt.sem);
+	nvxm->cm.cb = (nss_ptr_t)nss_pvxlan_callback;
+	nvxm->cm.app_data = (nss_ptr_t)NULL;
+
+	status = nss_pvxlan_tx_msg(nss_ctx, nvxm);
+	if (status != NSS_TX_SUCCESS) {
+		nss_warning("%p: pvxlan_tx_msg failed\n", nss_ctx);
+		up(&pvxlan_pvt.sem);
+		return status;
+	}
+
+	ret = wait_for_completion_timeout(&pvxlan_pvt.complete, msecs_to_jiffies(NSS_PVXLAN_TX_TIMEOUT));
+	if (!ret) {
+		nss_warning("%p: pvxlan tx sync failed due to timeout\n", nss_ctx);
+		pvxlan_pvt.response = NSS_TX_FAILURE;
+	}
+
+	status = pvxlan_pvt.response;
+	up(&pvxlan_pvt.sem);
+	return status;
+}
+EXPORT_SYMBOL(nss_pvxlan_tx_msg_sync);
+
+/*
+ * nss_pvxlan_tx_buf()
+ *	Transmit data buffer (skb) to a NSS interface number
+ */
+nss_tx_status_t nss_pvxlan_tx_buf(struct nss_ctx_instance *nss_ctx, struct sk_buff *buf, uint32_t if_num)
+{
+	BUG_ON(!nss_pvxlan_verify_if_num(if_num));
+
+	return nss_core_send_packet(nss_ctx, buf, if_num, H2N_BIT_FLAG_VIRTUAL_BUFFER);
+}
+EXPORT_SYMBOL(nss_pvxlan_tx_buf);
+
+/*
+ ***********************************
+ * Register/Unregister/Miscellaneous APIs
+ ***********************************
+ */
+
+/*
+ * nss_pvxlan_unregister()
+ *	Unregister a data packet notifier with NSS FW.
+ */
+bool nss_pvxlan_unregister(uint32_t if_num)
+{
+	struct nss_ctx_instance *nss_ctx;
+	int32_t i;
+
+	nss_ctx = nss_pvxlan_get_ctx();
+	if (!nss_pvxlan_verify_if_num(if_num)) {
+		nss_warning("%p: data unregister received for invalid interface %d", nss_ctx, if_num);
+		return false;
+	}
+
+	spin_lock_bh(&nss_pvxlan_tunnel_stats_debug_lock);
+	for (i = 0; i < NSS_PVXLAN_MAX_INTERFACES; i++) {
+		if (nss_pvxlan_tunnel_debug_stats[i].if_num != if_num) {
+			continue;
+		}
+
+		memset(&nss_pvxlan_tunnel_debug_stats[i], 0,
+			sizeof(struct nss_pvxlan_tunnel_stats_debug));
+		break;
+	}
+	spin_unlock_bh(&nss_pvxlan_tunnel_stats_debug_lock);
+
+	nss_core_unregister_handler(nss_ctx, if_num);
+	nss_core_unregister_subsys_dp(nss_ctx, if_num);
+	nss_pvxlan_hdl_instance_free(nss_ctx, if_num);
+	return true;
+}
+EXPORT_SYMBOL(nss_pvxlan_unregister);
+
+/*
+ * nss_pvxlan_register()
+ *	Registers a data packet notifier with NSS FW.
+ */
+struct nss_ctx_instance *nss_pvxlan_register(uint32_t if_num,
+						nss_pvxlan_buf_callback_t data_cb,
+						nss_pvxlan_msg_callback_t notify_cb,
+						struct net_device *netdev,
+						uint32_t features)
+{
+	struct nss_ctx_instance *nss_ctx;
+	int core_status;
+	int32_t i;
+
+	nss_ctx = nss_pvxlan_get_ctx();
+	if (!nss_pvxlan_verify_if_num(if_num)) {
+		nss_warning("%p: data register received for invalid interface %d", nss_ctx, if_num);
+		return NULL;
+	}
+
+	core_status = nss_core_register_handler(nss_ctx, if_num, nss_pvxlan_msg_handler, NULL);
+	if (core_status != NSS_CORE_STATUS_SUCCESS) {
+		nss_warning("%p: nss core register handler failed for if_num:%d with error :%d", nss_ctx, if_num, core_status);
+		return NULL;
+	}
+
+	if (!nss_pvxlan_hdl_instance_alloc(nss_ctx, if_num, notify_cb, (void *)netdev)) {
+		nss_core_unregister_handler(nss_ctx, if_num);
+		nss_warning("%p: couldn't allocate handle instance for if_num:%d", nss_ctx, if_num);
+		return NULL;
+	}
+
+	spin_lock_bh(&nss_pvxlan_tunnel_stats_debug_lock);
+	for (i = 0; i < NSS_PVXLAN_MAX_INTERFACES; i++) {
+		if (nss_pvxlan_tunnel_debug_stats[i].valid) {
+			continue;
+		}
+
+		nss_pvxlan_tunnel_debug_stats[i].valid = true;
+		nss_pvxlan_tunnel_debug_stats[i].if_num = if_num;
+		nss_pvxlan_tunnel_debug_stats[i].if_index = netdev->ifindex;
+		break;
+	}
+	spin_unlock_bh(&nss_pvxlan_tunnel_stats_debug_lock);
+
+	if (i == NSS_PVXLAN_MAX_INTERFACES) {
+		nss_warning("%p: No available debug stats instance :%d", nss_ctx, if_num);
+		nss_pvxlan_hdl_instance_free(nss_ctx, if_num);
+		nss_core_unregister_handler(nss_ctx, if_num);
+		return NULL;
+	}
+
+	nss_core_register_subsys_dp(nss_ctx, if_num, data_cb, NULL, NULL, netdev, features);
+	return nss_ctx;
+}
+EXPORT_SYMBOL(nss_pvxlan_register);
+
+/*
+ * nss_pvxlan_ifnum_with_core_id()
+ *	Append core id to pvxlan interface num.
+ */
+int nss_pvxlan_ifnum_with_core_id(int if_num)
+{
+	struct nss_ctx_instance *nss_ctx = nss_pvxlan_get_ctx();
+
+	NSS_VERIFY_CTX_MAGIC(nss_ctx);
+
+	if (!nss_is_dynamic_interface(if_num)) {
+		nss_warning("%p: Invalid if_num: %d, must be a dynamic interface\n", nss_ctx, if_num);
+		return 0;
+	}
+	return NSS_INTERFACE_NUM_APPEND_COREID(nss_ctx, if_num);
+}
+EXPORT_SYMBOL(nss_pvxlan_ifnum_with_core_id);
+
+/*
+ * nss_pvxlan_msg_init()
+ *	Initialize pvxlan message.
+ */
+void nss_pvxlan_msg_init(struct nss_pvxlan_msg *ncm, uint16_t if_num, uint32_t type, uint32_t len,
+				nss_pvxlan_msg_callback_t cb, void *app_data)
+{
+	nss_cmn_msg_init(&ncm->cm, if_num, type, len, (void*)cb, app_data);
+}
+EXPORT_SYMBOL(nss_pvxlan_msg_init);
+
+/*
+ * nss_pvxlan_get_ctx()
+ *	Return a Pvxlan NSS context.
+ */
+struct nss_ctx_instance *nss_pvxlan_get_ctx()
+{
+	struct nss_ctx_instance *nss_ctx;
+
+	nss_ctx = &nss_top_main.nss[nss_top_main.pvxlan_handler_id];
+	return nss_ctx;
+}
+EXPORT_SYMBOL(nss_pvxlan_get_ctx);
+
+/*
+ * nss_pvxlan_init()
+ *	Initializes Pvxlan. Gets called from nss_init.c.
+ */
+void nss_pvxlan_init()
+{
+	nss_pvxlan_stats_dentry_create();
+	sema_init(&pvxlan_pvt.sem, 1);
+	init_completion(&pvxlan_pvt.complete);
+
+	memset(&nss_pvxlan_hdl, 0, sizeof(nss_pvxlan_hdl));
+}