blob: 46e3c132c8e46f0ae09e68f1ecfd29bc42f62d73 [file] [log] [blame]
/*
**************************************************************************
* Copyright (c) 2019, The Linux Foundation. All rights reserved.
* Permission to use, copy, modify, and/or distribute this software for
* any purpose with or without fee is hereby granted, provided that the
* above copyright notice and this permission notice appear in all copies.
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
* OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
**************************************************************************
*/
#include "nss_tx_rx_common.h"
#include "nss_qvpn_stats.h"
#include "nss_qvpn_log.h"
#define NSS_QVPN_TX_TIMEOUT 1000 /* 1 Second */
/*
* Private data structure
*/
static struct nss_qvpn_pvt {
struct semaphore sem;
struct completion complete;
unsigned long if_map[NSS_QVPN_INTERFACE_MAX_LONG];
enum nss_qvpn_error_type resp;
} qvpn_pvt;
/*
* nss_qvpn_verify_if_num()
* Verify if_num passed to us.
*/
static bool nss_qvpn_verify_if_num(uint32_t if_num)
{
enum nss_dynamic_interface_type if_type;
if_type = nss_dynamic_interface_get_type(nss_qvpn_get_context(), if_num);
if ((if_type != NSS_DYNAMIC_INTERFACE_TYPE_QVPN_INNER) &&
(if_type != NSS_DYNAMIC_INTERFACE_TYPE_QVPN_OUTER)) {
nss_warning("%p: if_num = %u interface type returned is %d\n", nss_qvpn_get_context(), if_num, if_type);
return false;
}
return true;
}
/*
* nss_qvpn_tunnel_stats_sync
* Update qvpn interface statistics.
*/
static void nss_qvpn_tunnel_stats_sync(struct nss_ctx_instance *nss_ctx, struct nss_cmn_msg *ncm)
{
struct nss_qvpn_msg *ndcm = (struct nss_qvpn_msg *)ncm;
struct nss_top_instance *nss_top = nss_ctx->nss_top;
struct nss_qvpn_stats_sync_msg *msg_stats = &ndcm->msg.stats;
uint64_t *if_stats;
spin_lock_bh(&nss_top->stats_lock);
/*
* Update common node stats
*/
if_stats = nss_top->stats_node[ncm->interface];
if_stats[NSS_STATS_NODE_RX_PKTS] += msg_stats->node_stats.rx_packets;
if_stats[NSS_STATS_NODE_RX_BYTES] += msg_stats->node_stats.rx_bytes;
if_stats[NSS_STATS_NODE_RX_QUEUE_0_DROPPED] += msg_stats->node_stats.rx_dropped[0];
if_stats[NSS_STATS_NODE_RX_QUEUE_1_DROPPED] += msg_stats->node_stats.rx_dropped[1];
if_stats[NSS_STATS_NODE_RX_QUEUE_2_DROPPED] += msg_stats->node_stats.rx_dropped[2];
if_stats[NSS_STATS_NODE_RX_QUEUE_3_DROPPED] += msg_stats->node_stats.rx_dropped[3];
if_stats[NSS_STATS_NODE_TX_PKTS] += msg_stats->node_stats.tx_packets;
if_stats[NSS_STATS_NODE_TX_BYTES] += msg_stats->node_stats.tx_bytes;
spin_unlock_bh(&nss_top->stats_lock);
}
/*
* nss_qvpn_handler()
* Handle NSS to HLOS messages for QVPN
*/
static void nss_qvpn_handler(struct nss_ctx_instance *nss_ctx, struct nss_cmn_msg *ncm, void *app_data)
{
nss_qvpn_msg_callback_t cb;
nss_assert(nss_qvpn_verify_if_num(ncm->interface));
NSS_VERIFY_CTX_MAGIC(nss_ctx);
/*
* Is this a valid request/response packet?
*/
if (ncm->type >= NSS_QVPN_MSG_TYPE_MAX) {
nss_warning("%p: received invalid message %d for qvpn interface", nss_ctx, ncm->type);
return;
}
if (nss_cmn_get_msg_len(ncm) > sizeof(struct nss_qvpn_msg)) {
nss_warning("%p: length of message is greater than required: %d", nss_ctx, nss_cmn_get_msg_len(ncm));
return;
}
/*
* Log failures
*/
nss_core_log_msg_failures(nss_ctx, ncm);
/*
* Trace messages.
*/
nss_qvpn_log_rx_msg((struct nss_qvpn_msg *)ncm);
if (ncm->type == NSS_QVPN_MSG_TYPE_SYNC_STATS) {
nss_qvpn_tunnel_stats_sync(nss_ctx, ncm);
}
/*
* Update the callback and app_data for NOTIFY messages, qvpn sends all notify messages
* to the same callback/app_data.
*/
if (ncm->response == NSS_CMN_RESPONSE_NOTIFY) {
ncm->cb = (nss_ptr_t)nss_top_main.if_rx_msg_callback[ncm->interface];
ncm->app_data = (nss_ptr_t)nss_ctx->nss_rx_interface_handlers[nss_ctx->id][ncm->interface].app_data;
}
/*
* load, test & call
*/
cb = (nss_qvpn_msg_callback_t)ncm->cb;
if (unlikely(!cb)) {
nss_trace("%p: rx handler unregistered for i/f: %u\n", nss_ctx, ncm->interface);
return;
}
cb((void *)ncm->app_data, ncm);
}
/*
* nss_qvpn_callback()
* Callback to handle the completion of NSS to HLOS messages.
*/
static void nss_qvpn_callback(void *app_data, struct nss_qvpn_msg *nvm)
{
enum nss_qvpn_error_type *resp = (enum nss_qvpn_error_type *)app_data;
*resp = (nvm->cm.response == NSS_CMN_RESPONSE_ACK) ? NSS_QVPN_ERROR_TYPE_NONE : nvm->cm.error;
/*
* Write memory barrier
*/
smp_wmb();
complete(&qvpn_pvt.complete);
}
/*
* nss_qvpn_ifmap_get()
* Return QVPN active interfaces map.
*/
unsigned long *nss_qvpn_ifmap_get(void)
{
return qvpn_pvt.if_map;
}
/*
* nss_qvpn_get_context()
* Return NSS QVPN context.
*/
struct nss_ctx_instance *nss_qvpn_get_context(void)
{
return &nss_top_main.nss[nss_top_main.qvpn_handler_id];
}
EXPORT_SYMBOL(nss_qvpn_get_context);
/*
* nss_qvpn_tx_msg()
* Transmit a QVPN message to NSS firmware
*/
nss_tx_status_t nss_qvpn_tx_msg(struct nss_ctx_instance *nss_ctx, struct nss_qvpn_msg *msg)
{
struct nss_cmn_msg *ncm = &msg->cm;
/*
* Sanity check the message
*/
if (!nss_qvpn_verify_if_num(ncm->interface)) {
nss_warning("%p: tx request for interface that is not a qvpn: %u\n", nss_ctx, ncm->interface);
return NSS_TX_FAILURE_BAD_PARAM;
}
if (ncm->type >= NSS_QVPN_MSG_TYPE_MAX) {
nss_warning("%p: message type out of range: %d\n", nss_ctx, ncm->type);
return NSS_TX_FAILURE_BAD_PARAM;
}
/*
* Trace messages.
*/
nss_qvpn_log_tx_msg(msg);
return nss_core_send_cmd(nss_ctx, msg, sizeof(*msg), NSS_NBUF_PAYLOAD_SIZE);
}
EXPORT_SYMBOL(nss_qvpn_tx_msg);
/*
* nss_qvpn_tx_msg_sync()
* Transmit a QVPN message to NSS firmware synchronously.
*/
nss_tx_status_t nss_qvpn_tx_msg_sync(struct nss_ctx_instance *nss_ctx, struct nss_qvpn_msg *nvm,
uint32_t if_num, enum nss_qvpn_msg_type type, uint16_t len, enum nss_qvpn_error_type *resp)
{
struct nss_qvpn_msg nqm;
nss_tx_status_t status;
int ret = 0;
NSS_VERIFY_CTX_MAGIC(nss_ctx);
if (len > sizeof(nqm.msg)) {
nss_warning("%p: Incorrect message length=%u for type %d and if_num=%u\n", nss_ctx, len, type, if_num);
return NSS_TX_FAILURE_TOO_LARGE;
}
if (!resp) {
nss_warning("%p: Invalid input, resp=NULL\n", nss_ctx);
return NSS_TX_FAILURE_BAD_PARAM;
}
nss_qvpn_msg_init(&nqm, if_num, type, len, nss_qvpn_callback, &qvpn_pvt.resp);
memcpy(&nqm.msg, &nvm->msg, len);
down(&qvpn_pvt.sem);
status = nss_qvpn_tx_msg(nss_ctx, &nqm);
if (status != NSS_TX_SUCCESS) {
nss_warning("%p: qvpn_tx_msg failed\n", nss_ctx);
goto done;
}
ret = wait_for_completion_timeout(&qvpn_pvt.complete, msecs_to_jiffies(NSS_QVPN_TX_TIMEOUT));
if (!ret) {
nss_warning("%p: qvpn msg tx failed due to timeout\n", nss_ctx);
status = NSS_TX_FAILURE_SYNC_TIMEOUT;
goto done;
}
/*
* Read memory barrier
*/
smp_rmb();
*resp = qvpn_pvt.resp;
if (*resp != NSS_QVPN_ERROR_TYPE_NONE)
status = NSS_TX_FAILURE;
done:
up(&qvpn_pvt.sem);
return status;
}
EXPORT_SYMBOL(nss_qvpn_tx_msg_sync);
/*
* nss_qvpn_tx_buf()
* Send packet to QVPN interface owned by NSS
*/
nss_tx_status_t nss_qvpn_tx_buf(struct nss_ctx_instance *nss_ctx, uint32_t if_num, struct sk_buff *skb)
{
if (!nss_qvpn_verify_if_num(if_num)) {
nss_warning("%p: tx request for interface that is not a qvpn: %u\n", nss_ctx, if_num);
return NSS_TX_FAILURE_BAD_PARAM;
}
return nss_core_send_packet(nss_ctx, skb, if_num, H2N_BIT_FLAG_BUFFER_REUSABLE);
}
EXPORT_SYMBOL(nss_qvpn_tx_buf);
/*
* nss_qvpn_msg_init()
* Initialize nss_qvpn_msg.
*/
void nss_qvpn_msg_init(struct nss_qvpn_msg *ncm, uint16_t if_num, uint32_t type, uint32_t len, void *cb, void *app_data)
{
nss_cmn_msg_init(&ncm->cm, if_num, type, len, cb, app_data);
}
EXPORT_SYMBOL(nss_qvpn_msg_init);
/*
* nss_qvpn_register_if()
* Register QVPN interface.
*/
struct nss_ctx_instance *nss_qvpn_register_if(uint32_t if_num, nss_qvpn_callback_t qvpn_data_callback,
nss_qvpn_msg_callback_t qvpn_event_callback,
struct net_device *netdev, uint32_t features, void *app_ctx)
{
struct nss_ctx_instance *nss_ctx = nss_qvpn_get_context();
nss_assert(nss_ctx);
nss_assert(nss_qvpn_verify_if_num(if_num));
nss_core_register_subsys_dp(nss_ctx, if_num, qvpn_data_callback, NULL, app_ctx, netdev, features);
nss_core_register_handler(nss_ctx, if_num, nss_qvpn_handler, app_ctx);
nss_top_main.if_rx_msg_callback[if_num] = qvpn_event_callback;
set_bit(if_num, qvpn_pvt.if_map);
return nss_ctx;
}
EXPORT_SYMBOL(nss_qvpn_register_if);
/*
* nss_unregister_qvpn_if()
* Unregister QVPN interface.
*/
void nss_qvpn_unregister_if(uint32_t if_num)
{
struct nss_ctx_instance *nss_ctx = nss_qvpn_get_context();
nss_assert(nss_qvpn_verify_if_num(if_num));
clear_bit(if_num, qvpn_pvt.if_map);
nss_core_unregister_subsys_dp(nss_ctx, if_num);
nss_core_unregister_handler(nss_ctx, if_num);
nss_top_main.if_rx_msg_callback[if_num] = NULL;
}
EXPORT_SYMBOL(nss_qvpn_unregister_if);
/*
* nss_qvpn_ifnum_with_core_id()
* Append core id to QVPN interface number
*/
int nss_qvpn_ifnum_with_core_id(int if_num)
{
struct nss_ctx_instance *nss_ctx = nss_qvpn_get_context();
NSS_VERIFY_CTX_MAGIC(nss_ctx);
if (nss_qvpn_verify_if_num(if_num) == false) {
nss_info("%p: if_num: %u is not QVPN interface\n", nss_ctx, if_num);
return 0;
}
return NSS_INTERFACE_NUM_APPEND_COREID(nss_ctx, if_num);
}
EXPORT_SYMBOL(nss_qvpn_ifnum_with_core_id);
/*
* nss_qvpn_register_handler()
* Intialize QVPN driver and register handler.
*/
void nss_qvpn_register_handler(void)
{
nss_info("nss_qvpn_register_handler\n");
sema_init(&qvpn_pvt.sem, 1);
init_completion(&qvpn_pvt.complete);
nss_qvpn_stats_dentry_create();
}