drivers: net: xgene: fix: Out of order descriptor bytes read
[linux-2.6-block.git] / drivers / net / hyperv / netvsc.c
CommitLineData
fceaf24a 1/*
fceaf24a
HJ
2 * Copyright (c) 2009, Microsoft Corporation.
3 *
4 * This program is free software; you can redistribute it and/or modify it
5 * under the terms and conditions of the GNU General Public License,
6 * version 2, as published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope it will be useful, but WITHOUT
9 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
10 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
11 * more details.
12 *
13 * You should have received a copy of the GNU General Public License along with
adf8d3ff 14 * this program; if not, see <http://www.gnu.org/licenses/>.
fceaf24a
HJ
15 *
16 * Authors:
d0e94d17 17 * Haiyang Zhang <haiyangz@microsoft.com>
fceaf24a 18 * Hank Janssen <hjanssen@microsoft.com>
fceaf24a 19 */
eb335bc4
HJ
20#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
21
5654e932 22#include <linux/kernel.h>
0c3b7b2f
S
23#include <linux/sched.h>
24#include <linux/wait.h>
0ffa63b0 25#include <linux/mm.h>
b4362c9c 26#include <linux/delay.h>
21a80820 27#include <linux/io.h>
5a0e3ad6 28#include <linux/slab.h>
d9871158 29#include <linux/netdevice.h>
f157e78d 30#include <linux/if_ether.h>
c25aaf81 31#include <asm/sync_bitops.h>
3f335ea2 32
5ca7252a 33#include "hyperv_net.h"
fceaf24a
HJ
34
35
5a71ae30 36static struct netvsc_device *alloc_net_device(struct hv_device *device)
fceaf24a 37{
85799a37 38 struct netvsc_device *net_device;
2ddd5e5f 39 struct net_device *ndev = hv_get_drvdata(device);
fceaf24a 40
85799a37
HZ
41 net_device = kzalloc(sizeof(struct netvsc_device), GFP_KERNEL);
42 if (!net_device)
fceaf24a
HJ
43 return NULL;
44
f90251c8
HZ
45 net_device->cb_buffer = kzalloc(NETVSC_PACKET_SIZE, GFP_KERNEL);
46 if (!net_device->cb_buffer) {
47 kfree(net_device);
48 return NULL;
49 }
50
dc5cd894 51 init_waitqueue_head(&net_device->wait_drain);
4d447c9a 52 net_device->start_remove = false;
c38b9c71 53 net_device->destroy = false;
53d21fdb 54 net_device->dev = device;
2ddd5e5f 55 net_device->ndev = ndev;
fceaf24a 56
2ddd5e5f 57 hv_set_drvdata(device, net_device);
85799a37 58 return net_device;
fceaf24a
HJ
59}
60
f90251c8
HZ
61static void free_netvsc_device(struct netvsc_device *nvdev)
62{
63 kfree(nvdev->cb_buffer);
64 kfree(nvdev);
65}
66
5a71ae30 67static struct netvsc_device *get_outbound_net_device(struct hv_device *device)
fceaf24a 68{
85799a37 69 struct netvsc_device *net_device;
fceaf24a 70
2ddd5e5f 71 net_device = hv_get_drvdata(device);
9d88f33a 72 if (net_device && net_device->destroy)
85799a37 73 net_device = NULL;
fceaf24a 74
85799a37 75 return net_device;
fceaf24a
HJ
76}
77
5a71ae30 78static struct netvsc_device *get_inbound_net_device(struct hv_device *device)
fceaf24a 79{
85799a37 80 struct netvsc_device *net_device;
fceaf24a 81
2ddd5e5f 82 net_device = hv_get_drvdata(device);
9d88f33a
S
83
84 if (!net_device)
85 goto get_in_err;
86
87 if (net_device->destroy &&
88 atomic_read(&net_device->num_outstanding_sends) == 0)
85799a37 89 net_device = NULL;
fceaf24a 90
9d88f33a 91get_in_err:
85799a37 92 return net_device;
fceaf24a
HJ
93}
94
fceaf24a 95
c25aaf81 96static int netvsc_destroy_buf(struct netvsc_device *net_device)
ec91cd09
HZ
97{
98 struct nvsp_message *revoke_packet;
99 int ret = 0;
2ddd5e5f 100 struct net_device *ndev = net_device->ndev;
ec91cd09
HZ
101
102 /*
103 * If we got a section count, it means we received a
104 * SendReceiveBufferComplete msg (ie sent
105 * NvspMessage1TypeSendReceiveBuffer msg) therefore, we need
106 * to send a revoke msg here
107 */
108 if (net_device->recv_section_cnt) {
109 /* Send the revoke receive buffer */
110 revoke_packet = &net_device->revoke_packet;
111 memset(revoke_packet, 0, sizeof(struct nvsp_message));
112
113 revoke_packet->hdr.msg_type =
114 NVSP_MSG1_TYPE_REVOKE_RECV_BUF;
115 revoke_packet->msg.v1_msg.
116 revoke_recv_buf.id = NETVSC_RECEIVE_BUFFER_ID;
117
118 ret = vmbus_sendpacket(net_device->dev->channel,
119 revoke_packet,
120 sizeof(struct nvsp_message),
121 (unsigned long)revoke_packet,
122 VM_PKT_DATA_INBAND, 0);
123 /*
124 * If we failed here, we might as well return and
125 * have a leak rather than continue and a bugchk
126 */
127 if (ret != 0) {
d9871158 128 netdev_err(ndev, "unable to send "
c909ebbd 129 "revoke receive buffer to netvsp\n");
a3e00530 130 return ret;
ec91cd09
HZ
131 }
132 }
133
134 /* Teardown the gpadl on the vsp end */
135 if (net_device->recv_buf_gpadl_handle) {
136 ret = vmbus_teardown_gpadl(net_device->dev->channel,
137 net_device->recv_buf_gpadl_handle);
138
139 /* If we failed here, we might as well return and have a leak
140 * rather than continue and a bugchk
141 */
142 if (ret != 0) {
d9871158 143 netdev_err(ndev,
c909ebbd 144 "unable to teardown receive buffer's gpadl\n");
7f9615e6 145 return ret;
ec91cd09
HZ
146 }
147 net_device->recv_buf_gpadl_handle = 0;
148 }
149
150 if (net_device->recv_buf) {
151 /* Free up the receive buffer */
b679ef73 152 vfree(net_device->recv_buf);
ec91cd09
HZ
153 net_device->recv_buf = NULL;
154 }
155
156 if (net_device->recv_section) {
157 net_device->recv_section_cnt = 0;
158 kfree(net_device->recv_section);
159 net_device->recv_section = NULL;
160 }
161
c25aaf81
KS
162 /* Deal with the send buffer we may have setup.
163 * If we got a send section size, it means we received a
c51ed182
HZ
164 * NVSP_MSG1_TYPE_SEND_SEND_BUF_COMPLETE msg (ie sent
165 * NVSP_MSG1_TYPE_SEND_SEND_BUF msg) therefore, we need
c25aaf81
KS
166 * to send a revoke msg here
167 */
168 if (net_device->send_section_size) {
169 /* Send the revoke receive buffer */
170 revoke_packet = &net_device->revoke_packet;
171 memset(revoke_packet, 0, sizeof(struct nvsp_message));
172
173 revoke_packet->hdr.msg_type =
174 NVSP_MSG1_TYPE_REVOKE_SEND_BUF;
c51ed182
HZ
175 revoke_packet->msg.v1_msg.revoke_send_buf.id =
176 NETVSC_SEND_BUFFER_ID;
c25aaf81
KS
177
178 ret = vmbus_sendpacket(net_device->dev->channel,
179 revoke_packet,
180 sizeof(struct nvsp_message),
181 (unsigned long)revoke_packet,
182 VM_PKT_DATA_INBAND, 0);
183 /* If we failed here, we might as well return and
184 * have a leak rather than continue and a bugchk
185 */
186 if (ret != 0) {
187 netdev_err(ndev, "unable to send "
188 "revoke send buffer to netvsp\n");
189 return ret;
190 }
191 }
192 /* Teardown the gpadl on the vsp end */
193 if (net_device->send_buf_gpadl_handle) {
194 ret = vmbus_teardown_gpadl(net_device->dev->channel,
195 net_device->send_buf_gpadl_handle);
196
197 /* If we failed here, we might as well return and have a leak
198 * rather than continue and a bugchk
199 */
200 if (ret != 0) {
201 netdev_err(ndev,
202 "unable to teardown send buffer's gpadl\n");
203 return ret;
204 }
2f18423d 205 net_device->send_buf_gpadl_handle = 0;
c25aaf81
KS
206 }
207 if (net_device->send_buf) {
c51ed182 208 /* Free up the send buffer */
06b47aac 209 vfree(net_device->send_buf);
c25aaf81
KS
210 net_device->send_buf = NULL;
211 }
212 kfree(net_device->send_section_map);
213
ec91cd09
HZ
214 return ret;
215}
216
c25aaf81 217static int netvsc_init_buf(struct hv_device *device)
fceaf24a 218{
21a80820 219 int ret = 0;
35abb21a 220 int t;
85799a37
HZ
221 struct netvsc_device *net_device;
222 struct nvsp_message *init_packet;
2ddd5e5f 223 struct net_device *ndev;
fceaf24a 224
5a71ae30 225 net_device = get_outbound_net_device(device);
2ddd5e5f 226 if (!net_device)
927bc33c 227 return -ENODEV;
2ddd5e5f 228 ndev = net_device->ndev;
fceaf24a 229
b679ef73 230 net_device->recv_buf = vzalloc(net_device->recv_buf_size);
53d21fdb 231 if (!net_device->recv_buf) {
d9871158 232 netdev_err(ndev, "unable to allocate receive "
c909ebbd 233 "buffer of size %d\n", net_device->recv_buf_size);
927bc33c 234 ret = -ENOMEM;
0c3b7b2f 235 goto cleanup;
fceaf24a 236 }
fceaf24a 237
454f18a9
BP
238 /*
239 * Establish the gpadl handle for this buffer on this
240 * channel. Note: This call uses the vmbus connection rather
241 * than the channel to establish the gpadl handle.
242 */
53d21fdb
HZ
243 ret = vmbus_establish_gpadl(device->channel, net_device->recv_buf,
244 net_device->recv_buf_size,
245 &net_device->recv_buf_gpadl_handle);
21a80820 246 if (ret != 0) {
d9871158 247 netdev_err(ndev,
c909ebbd 248 "unable to establish receive buffer's gpadl\n");
0c3b7b2f 249 goto cleanup;
fceaf24a
HJ
250 }
251
fceaf24a 252
454f18a9 253 /* Notify the NetVsp of the gpadl handle */
53d21fdb 254 init_packet = &net_device->channel_init_pkt;
fceaf24a 255
85799a37 256 memset(init_packet, 0, sizeof(struct nvsp_message));
fceaf24a 257
53d21fdb
HZ
258 init_packet->hdr.msg_type = NVSP_MSG1_TYPE_SEND_RECV_BUF;
259 init_packet->msg.v1_msg.send_recv_buf.
260 gpadl_handle = net_device->recv_buf_gpadl_handle;
261 init_packet->msg.v1_msg.
262 send_recv_buf.id = NETVSC_RECEIVE_BUFFER_ID;
fceaf24a 263
454f18a9 264 /* Send the gpadl notification request */
85799a37 265 ret = vmbus_sendpacket(device->channel, init_packet,
5a4df290 266 sizeof(struct nvsp_message),
85799a37 267 (unsigned long)init_packet,
415f2287 268 VM_PKT_DATA_INBAND,
5a4df290 269 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
21a80820 270 if (ret != 0) {
d9871158 271 netdev_err(ndev,
c909ebbd 272 "unable to send receive buffer's gpadl to netvsp\n");
0c3b7b2f 273 goto cleanup;
fceaf24a
HJ
274 }
275
5c5781b3 276 t = wait_for_completion_timeout(&net_device->channel_init_wait, 5*HZ);
35abb21a 277 BUG_ON(t == 0);
0c3b7b2f 278
fceaf24a 279
454f18a9 280 /* Check the response */
53d21fdb
HZ
281 if (init_packet->msg.v1_msg.
282 send_recv_buf_complete.status != NVSP_STAT_SUCCESS) {
d9871158 283 netdev_err(ndev, "Unable to complete receive buffer "
8bff33ab 284 "initialization with NetVsp - status %d\n",
53d21fdb
HZ
285 init_packet->msg.v1_msg.
286 send_recv_buf_complete.status);
927bc33c 287 ret = -EINVAL;
0c3b7b2f 288 goto cleanup;
fceaf24a
HJ
289 }
290
454f18a9 291 /* Parse the response */
fceaf24a 292
53d21fdb
HZ
293 net_device->recv_section_cnt = init_packet->msg.
294 v1_msg.send_recv_buf_complete.num_sections;
fceaf24a 295
c1813200
HZ
296 net_device->recv_section = kmemdup(
297 init_packet->msg.v1_msg.send_recv_buf_complete.sections,
298 net_device->recv_section_cnt *
299 sizeof(struct nvsp_1_receive_buffer_section),
300 GFP_KERNEL);
53d21fdb 301 if (net_device->recv_section == NULL) {
927bc33c 302 ret = -EINVAL;
0c3b7b2f 303 goto cleanup;
fceaf24a
HJ
304 }
305
21a80820
GKH
306 /*
307 * For 1st release, there should only be 1 section that represents the
308 * entire receive buffer
309 */
53d21fdb
HZ
310 if (net_device->recv_section_cnt != 1 ||
311 net_device->recv_section->offset != 0) {
927bc33c 312 ret = -EINVAL;
0c3b7b2f 313 goto cleanup;
fceaf24a
HJ
314 }
315
c25aaf81
KS
316 /* Now setup the send buffer.
317 */
06b47aac 318 net_device->send_buf = vzalloc(net_device->send_buf_size);
c25aaf81
KS
319 if (!net_device->send_buf) {
320 netdev_err(ndev, "unable to allocate send "
321 "buffer of size %d\n", net_device->send_buf_size);
322 ret = -ENOMEM;
323 goto cleanup;
324 }
325
326 /* Establish the gpadl handle for this buffer on this
327 * channel. Note: This call uses the vmbus connection rather
328 * than the channel to establish the gpadl handle.
329 */
330 ret = vmbus_establish_gpadl(device->channel, net_device->send_buf,
331 net_device->send_buf_size,
332 &net_device->send_buf_gpadl_handle);
333 if (ret != 0) {
334 netdev_err(ndev,
335 "unable to establish send buffer's gpadl\n");
336 goto cleanup;
337 }
338
339 /* Notify the NetVsp of the gpadl handle */
340 init_packet = &net_device->channel_init_pkt;
341 memset(init_packet, 0, sizeof(struct nvsp_message));
342 init_packet->hdr.msg_type = NVSP_MSG1_TYPE_SEND_SEND_BUF;
c51ed182 343 init_packet->msg.v1_msg.send_send_buf.gpadl_handle =
c25aaf81 344 net_device->send_buf_gpadl_handle;
c51ed182 345 init_packet->msg.v1_msg.send_send_buf.id = NETVSC_SEND_BUFFER_ID;
c25aaf81
KS
346
347 /* Send the gpadl notification request */
348 ret = vmbus_sendpacket(device->channel, init_packet,
349 sizeof(struct nvsp_message),
350 (unsigned long)init_packet,
351 VM_PKT_DATA_INBAND,
352 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
353 if (ret != 0) {
354 netdev_err(ndev,
355 "unable to send send buffer's gpadl to netvsp\n");
356 goto cleanup;
357 }
358
359 t = wait_for_completion_timeout(&net_device->channel_init_wait, 5*HZ);
360 BUG_ON(t == 0);
361
362 /* Check the response */
363 if (init_packet->msg.v1_msg.
364 send_send_buf_complete.status != NVSP_STAT_SUCCESS) {
365 netdev_err(ndev, "Unable to complete send buffer "
366 "initialization with NetVsp - status %d\n",
367 init_packet->msg.v1_msg.
c51ed182 368 send_send_buf_complete.status);
c25aaf81
KS
369 ret = -EINVAL;
370 goto cleanup;
371 }
372
373 /* Parse the response */
374 net_device->send_section_size = init_packet->msg.
375 v1_msg.send_send_buf_complete.section_size;
376
377 /* Section count is simply the size divided by the section size.
378 */
379 net_device->send_section_cnt =
380 net_device->send_buf_size/net_device->send_section_size;
381
382 dev_info(&device->device, "Send section size: %d, Section count:%d\n",
383 net_device->send_section_size, net_device->send_section_cnt);
384
385 /* Setup state for managing the send buffer. */
386 net_device->map_words = DIV_ROUND_UP(net_device->send_section_cnt,
387 BITS_PER_LONG);
388
389 net_device->send_section_map =
390 kzalloc(net_device->map_words * sizeof(ulong), GFP_KERNEL);
dd1d3f8f
WY
391 if (net_device->send_section_map == NULL) {
392 ret = -ENOMEM;
c25aaf81 393 goto cleanup;
dd1d3f8f 394 }
c25aaf81 395
0c3b7b2f 396 goto exit;
fceaf24a 397
0c3b7b2f 398cleanup:
c25aaf81 399 netvsc_destroy_buf(net_device);
fceaf24a 400
0c3b7b2f 401exit:
fceaf24a
HJ
402 return ret;
403}
404
fceaf24a 405
f157e78d
HZ
406/* Negotiate NVSP protocol version */
407static int negotiate_nvsp_ver(struct hv_device *device,
408 struct netvsc_device *net_device,
409 struct nvsp_message *init_packet,
410 u32 nvsp_ver)
fceaf24a 411{
35abb21a 412 int ret, t;
fceaf24a 413
85799a37 414 memset(init_packet, 0, sizeof(struct nvsp_message));
53d21fdb 415 init_packet->hdr.msg_type = NVSP_MSG_TYPE_INIT;
f157e78d
HZ
416 init_packet->msg.init_msg.init.min_protocol_ver = nvsp_ver;
417 init_packet->msg.init_msg.init.max_protocol_ver = nvsp_ver;
fceaf24a 418
454f18a9 419 /* Send the init request */
85799a37 420 ret = vmbus_sendpacket(device->channel, init_packet,
5a4df290 421 sizeof(struct nvsp_message),
85799a37 422 (unsigned long)init_packet,
415f2287 423 VM_PKT_DATA_INBAND,
5a4df290 424 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
21a80820 425
b8a3d52b 426 if (ret != 0)
f157e78d 427 return ret;
fceaf24a 428
5c5781b3 429 t = wait_for_completion_timeout(&net_device->channel_init_wait, 5*HZ);
35abb21a 430
f157e78d
HZ
431 if (t == 0)
432 return -ETIMEDOUT;
fceaf24a 433
53d21fdb 434 if (init_packet->msg.init_msg.init_complete.status !=
f157e78d
HZ
435 NVSP_STAT_SUCCESS)
436 return -EINVAL;
fceaf24a 437
a1eabb01 438 if (nvsp_ver == NVSP_PROTOCOL_VERSION_1)
f157e78d
HZ
439 return 0;
440
441 /* NVSPv2 only: Send NDIS config */
442 memset(init_packet, 0, sizeof(struct nvsp_message));
443 init_packet->hdr.msg_type = NVSP_MSG2_TYPE_SEND_NDIS_CONFIG;
4d3c9d37
HZ
444 init_packet->msg.v2_msg.send_ndis_config.mtu = net_device->ndev->mtu +
445 ETH_HLEN;
1f5f3a75 446 init_packet->msg.v2_msg.send_ndis_config.capability.ieee8021q = 1;
f157e78d
HZ
447
448 ret = vmbus_sendpacket(device->channel, init_packet,
449 sizeof(struct nvsp_message),
450 (unsigned long)init_packet,
451 VM_PKT_DATA_INBAND, 0);
452
453 return ret;
454}
455
456static int netvsc_connect_vsp(struct hv_device *device)
457{
458 int ret;
459 struct netvsc_device *net_device;
460 struct nvsp_message *init_packet;
461 int ndis_version;
462 struct net_device *ndev;
a1eabb01
HZ
463 u32 ver_list[] = { NVSP_PROTOCOL_VERSION_1, NVSP_PROTOCOL_VERSION_2,
464 NVSP_PROTOCOL_VERSION_4, NVSP_PROTOCOL_VERSION_5 };
465 int i, num_ver = 4; /* number of different NVSP versions */
f157e78d
HZ
466
467 net_device = get_outbound_net_device(device);
468 if (!net_device)
469 return -ENODEV;
470 ndev = net_device->ndev;
471
472 init_packet = &net_device->channel_init_pkt;
473
474 /* Negotiate the latest NVSP protocol supported */
a1eabb01
HZ
475 for (i = num_ver - 1; i >= 0; i--)
476 if (negotiate_nvsp_ver(device, net_device, init_packet,
477 ver_list[i]) == 0) {
478 net_device->nvsp_version = ver_list[i];
479 break;
480 }
481
482 if (i < 0) {
0f48c72c 483 ret = -EPROTO;
0c3b7b2f 484 goto cleanup;
fceaf24a 485 }
f157e78d
HZ
486
487 pr_debug("Negotiated NVSP version:%x\n", net_device->nvsp_version);
488
454f18a9 489 /* Send the ndis version */
85799a37 490 memset(init_packet, 0, sizeof(struct nvsp_message));
fceaf24a 491
a1eabb01 492 if (net_device->nvsp_version <= NVSP_PROTOCOL_VERSION_4)
1f73db49 493 ndis_version = 0x00060001;
a1eabb01
HZ
494 else
495 ndis_version = 0x0006001e;
fceaf24a 496
53d21fdb
HZ
497 init_packet->hdr.msg_type = NVSP_MSG1_TYPE_SEND_NDIS_VER;
498 init_packet->msg.v1_msg.
499 send_ndis_ver.ndis_major_ver =
85799a37 500 (ndis_version & 0xFFFF0000) >> 16;
53d21fdb
HZ
501 init_packet->msg.v1_msg.
502 send_ndis_ver.ndis_minor_ver =
85799a37 503 ndis_version & 0xFFFF;
fceaf24a 504
454f18a9 505 /* Send the init request */
85799a37 506 ret = vmbus_sendpacket(device->channel, init_packet,
0c3b7b2f
S
507 sizeof(struct nvsp_message),
508 (unsigned long)init_packet,
509 VM_PKT_DATA_INBAND, 0);
0f48c72c 510 if (ret != 0)
0c3b7b2f 511 goto cleanup;
454f18a9
BP
512
513 /* Post the big receive buffer to NetVSP */
99d3016d
HZ
514 if (net_device->nvsp_version <= NVSP_PROTOCOL_VERSION_2)
515 net_device->recv_buf_size = NETVSC_RECEIVE_BUFFER_SIZE_LEGACY;
516 else
517 net_device->recv_buf_size = NETVSC_RECEIVE_BUFFER_SIZE;
c25aaf81 518 net_device->send_buf_size = NETVSC_SEND_BUFFER_SIZE;
99d3016d 519
c25aaf81 520 ret = netvsc_init_buf(device);
fceaf24a 521
0c3b7b2f 522cleanup:
fceaf24a
HJ
523 return ret;
524}
525
648dc598 526static void netvsc_disconnect_vsp(struct netvsc_device *net_device)
fceaf24a 527{
c25aaf81 528 netvsc_destroy_buf(net_device);
fceaf24a
HJ
529}
530
3e189519 531/*
5a71ae30 532 * netvsc_device_remove - Callback when the root bus device is removed
21a80820 533 */
905620d1 534int netvsc_device_remove(struct hv_device *device)
fceaf24a 535{
85799a37 536 struct netvsc_device *net_device;
c38b9c71 537 unsigned long flags;
fceaf24a 538
2ddd5e5f 539 net_device = hv_get_drvdata(device);
fceaf24a 540
648dc598 541 netvsc_disconnect_vsp(net_device);
fceaf24a 542
3852409b 543 /*
9d88f33a
S
544 * Since we have already drained, we don't need to busy wait
545 * as was done in final_release_stor_device()
546 * Note that we cannot set the ext pointer to NULL until
547 * we have drained - to drain the outgoing packets, we need to
548 * allow incoming packets.
3852409b 549 */
9d88f33a
S
550
551 spin_lock_irqsave(&device->channel->inbound_lock, flags);
2ddd5e5f 552 hv_set_drvdata(device, NULL);
9d88f33a 553 spin_unlock_irqrestore(&device->channel->inbound_lock, flags);
3852409b 554
86c921af
S
555 /*
556 * At this point, no one should be accessing net_device
557 * except in here
558 */
c909ebbd 559 dev_notice(&device->device, "net device safe to remove\n");
fceaf24a 560
454f18a9 561 /* Now, we can close the channel safely */
85799a37 562 vmbus_close(device->channel);
fceaf24a 563
454f18a9 564 /* Release all resources */
aa99c479 565 vfree(net_device->sub_cb_buf);
f90251c8 566 free_netvsc_device(net_device);
21a80820 567 return 0;
fceaf24a
HJ
568}
569
33be96e4
HZ
570
571#define RING_AVAIL_PERCENT_HIWATER 20
572#define RING_AVAIL_PERCENT_LOWATER 10
573
574/*
575 * Get the percentage of available bytes to write in the ring.
576 * The return value is in range from 0 to 100.
577 */
578static inline u32 hv_ringbuf_avail_percent(
579 struct hv_ring_buffer_info *ring_info)
580{
581 u32 avail_read, avail_write;
582
583 hv_get_ringbuffer_availbytes(ring_info, &avail_read, &avail_write);
584
585 return avail_write * 100 / ring_info->ring_datasize;
586}
587
c25aaf81
KS
588static inline void netvsc_free_send_slot(struct netvsc_device *net_device,
589 u32 index)
590{
591 sync_change_bit(index, net_device->send_section_map);
592}
593
97c1723a
KS
594static void netvsc_send_completion(struct netvsc_device *net_device,
595 struct hv_device *device,
85799a37 596 struct vmpacket_descriptor *packet)
fceaf24a 597{
85799a37
HZ
598 struct nvsp_message *nvsp_packet;
599 struct hv_netvsc_packet *nvsc_packet;
2ddd5e5f 600 struct net_device *ndev;
c25aaf81 601 u32 send_index;
fceaf24a 602
2ddd5e5f 603 ndev = net_device->ndev;
fceaf24a 604
85799a37 605 nvsp_packet = (struct nvsp_message *)((unsigned long)packet +
415f2287 606 (packet->offset8 << 3));
fceaf24a 607
53d21fdb
HZ
608 if ((nvsp_packet->hdr.msg_type == NVSP_MSG_TYPE_INIT_COMPLETE) ||
609 (nvsp_packet->hdr.msg_type ==
610 NVSP_MSG1_TYPE_SEND_RECV_BUF_COMPLETE) ||
611 (nvsp_packet->hdr.msg_type ==
5b54dac8
HZ
612 NVSP_MSG1_TYPE_SEND_SEND_BUF_COMPLETE) ||
613 (nvsp_packet->hdr.msg_type ==
614 NVSP_MSG5_TYPE_SUBCHANNEL)) {
454f18a9 615 /* Copy the response back */
53d21fdb 616 memcpy(&net_device->channel_init_pkt, nvsp_packet,
21a80820 617 sizeof(struct nvsp_message));
35abb21a 618 complete(&net_device->channel_init_wait);
53d21fdb
HZ
619 } else if (nvsp_packet->hdr.msg_type ==
620 NVSP_MSG1_TYPE_SEND_RNDIS_PKT_COMPLETE) {
33be96e4 621 int num_outstanding_sends;
5b54dac8
HZ
622 u16 q_idx = 0;
623 struct vmbus_channel *channel = device->channel;
624 int queue_sends;
33be96e4 625
454f18a9 626 /* Get the send context */
85799a37 627 nvsc_packet = (struct hv_netvsc_packet *)(unsigned long)
415f2287 628 packet->trans_id;
fceaf24a 629
454f18a9 630 /* Notify the layer above us */
5b54dac8 631 if (nvsc_packet) {
c25aaf81
KS
632 send_index = nvsc_packet->send_buf_index;
633 if (send_index != NETVSC_INVALID_INDEX)
634 netvsc_free_send_slot(net_device, send_index);
5b54dac8
HZ
635 q_idx = nvsc_packet->q_idx;
636 channel = nvsc_packet->channel;
893f6627
HZ
637 nvsc_packet->send_completion(nvsc_packet->
638 send_completion_ctx);
5b54dac8 639 }
fceaf24a 640
33be96e4
HZ
641 num_outstanding_sends =
642 atomic_dec_return(&net_device->num_outstanding_sends);
5b54dac8
HZ
643 queue_sends = atomic_dec_return(&net_device->
644 queue_sends[q_idx]);
1d06825b 645
dc5cd894
HZ
646 if (net_device->destroy && num_outstanding_sends == 0)
647 wake_up(&net_device->wait_drain);
648
5b54dac8
HZ
649 if (netif_tx_queue_stopped(netdev_get_tx_queue(ndev, q_idx)) &&
650 !net_device->start_remove &&
651 (hv_ringbuf_avail_percent(&channel->outbound) >
652 RING_AVAIL_PERCENT_HIWATER || queue_sends < 1))
653 netif_tx_wake_queue(netdev_get_tx_queue(
654 ndev, q_idx));
21a80820 655 } else {
d9871158 656 netdev_err(ndev, "Unknown send completion packet type- "
c909ebbd 657 "%d received!!\n", nvsp_packet->hdr.msg_type);
fceaf24a
HJ
658 }
659
fceaf24a
HJ
660}
661
c25aaf81
KS
662static u32 netvsc_get_next_send_section(struct netvsc_device *net_device)
663{
664 unsigned long index;
665 u32 max_words = net_device->map_words;
666 unsigned long *map_addr = (unsigned long *)net_device->send_section_map;
667 u32 section_cnt = net_device->send_section_cnt;
668 int ret_val = NETVSC_INVALID_INDEX;
669 int i;
670 int prev_val;
671
672 for (i = 0; i < max_words; i++) {
673 if (!~(map_addr[i]))
674 continue;
675 index = ffz(map_addr[i]);
676 prev_val = sync_test_and_set_bit(index, &map_addr[i]);
677 if (prev_val)
678 continue;
679 if ((index + (i * BITS_PER_LONG)) >= section_cnt)
680 break;
681 ret_val = (index + (i * BITS_PER_LONG));
682 break;
683 }
684 return ret_val;
685}
686
687u32 netvsc_copy_to_send_buf(struct netvsc_device *net_device,
688 unsigned int section_index,
689 struct hv_netvsc_packet *packet)
690{
691 char *start = net_device->send_buf;
692 char *dest = (start + (section_index * net_device->send_section_size));
693 int i;
694 u32 msg_size = 0;
695
696 for (i = 0; i < packet->page_buf_cnt; i++) {
697 char *src = phys_to_virt(packet->page_buf[i].pfn << PAGE_SHIFT);
698 u32 offset = packet->page_buf[i].offset;
699 u32 len = packet->page_buf[i].len;
700
701 memcpy(dest, (src + offset), len);
702 msg_size += len;
703 dest += len;
704 }
705 return msg_size;
706}
707
f9819f05 708int netvsc_send(struct hv_device *device,
85799a37 709 struct hv_netvsc_packet *packet)
fceaf24a 710{
85799a37 711 struct netvsc_device *net_device;
21a80820 712 int ret = 0;
223c1aa6 713 struct nvsp_message sendMessage;
2ddd5e5f 714 struct net_device *ndev;
5b54dac8 715 struct vmbus_channel *out_channel = NULL;
f1ea3cd7 716 u64 req_id;
c25aaf81
KS
717 unsigned int section_index = NETVSC_INVALID_INDEX;
718 u32 msg_size = 0;
719 struct sk_buff *skb;
3a67c9cc 720 u16 q_idx = packet->q_idx;
c25aaf81 721
fceaf24a 722
5a71ae30 723 net_device = get_outbound_net_device(device);
2ddd5e5f 724 if (!net_device)
ff2bd69a 725 return -ENODEV;
2ddd5e5f 726 ndev = net_device->ndev;
fceaf24a 727
53d21fdb 728 sendMessage.hdr.msg_type = NVSP_MSG1_TYPE_SEND_RNDIS_PKT;
72a2f5bd 729 if (packet->is_data_pkt) {
21a80820 730 /* 0 is RMC_DATA; */
53d21fdb 731 sendMessage.msg.v1_msg.send_rndis_pkt.channel_type = 0;
21a80820
GKH
732 } else {
733 /* 1 is RMC_CONTROL; */
53d21fdb 734 sendMessage.msg.v1_msg.send_rndis_pkt.channel_type = 1;
21a80820 735 }
fceaf24a 736
c25aaf81
KS
737 /* Attempt to send via sendbuf */
738 if (packet->total_data_buflen < net_device->send_section_size) {
739 section_index = netvsc_get_next_send_section(net_device);
740 if (section_index != NETVSC_INVALID_INDEX) {
741 msg_size = netvsc_copy_to_send_buf(net_device,
742 section_index,
743 packet);
744 skb = (struct sk_buff *)
745 (unsigned long)packet->send_completion_tid;
746 if (skb)
747 dev_kfree_skb_any(skb);
748 packet->page_buf_cnt = 0;
749 }
750 }
751 packet->send_buf_index = section_index;
752
753
53d21fdb 754 sendMessage.msg.v1_msg.send_rndis_pkt.send_buf_section_index =
c25aaf81
KS
755 section_index;
756 sendMessage.msg.v1_msg.send_rndis_pkt.send_buf_section_size = msg_size;
21a80820 757
893f6627 758 if (packet->send_completion)
00ca8f0c 759 req_id = (ulong)packet;
f1ea3cd7
HZ
760 else
761 req_id = 0;
762
5b54dac8
HZ
763 out_channel = net_device->chn_table[packet->q_idx];
764 if (out_channel == NULL)
765 out_channel = device->channel;
766 packet->channel = out_channel;
767
c3582a2c
HZ
768 if (out_channel->rescind)
769 return -ENODEV;
770
72a2f5bd 771 if (packet->page_buf_cnt) {
5b54dac8 772 ret = vmbus_sendpacket_pagebuffer(out_channel,
72a2f5bd
HZ
773 packet->page_buf,
774 packet->page_buf_cnt,
ff3f8eec
GKH
775 &sendMessage,
776 sizeof(struct nvsp_message),
f1ea3cd7 777 req_id);
21a80820 778 } else {
5b54dac8 779 ret = vmbus_sendpacket(out_channel, &sendMessage,
e4d59ac5 780 sizeof(struct nvsp_message),
f1ea3cd7 781 req_id,
e4d59ac5
HZ
782 VM_PKT_DATA_INBAND,
783 VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED);
fceaf24a
HJ
784 }
785
1d06825b
HZ
786 if (ret == 0) {
787 atomic_inc(&net_device->num_outstanding_sends);
3a67c9cc 788 atomic_inc(&net_device->queue_sends[q_idx]);
5b54dac8
HZ
789
790 if (hv_ringbuf_avail_percent(&out_channel->outbound) <
33be96e4 791 RING_AVAIL_PERCENT_LOWATER) {
5b54dac8 792 netif_tx_stop_queue(netdev_get_tx_queue(
3a67c9cc 793 ndev, q_idx));
5b54dac8 794
33be96e4 795 if (atomic_read(&net_device->
3a67c9cc 796 queue_sends[q_idx]) < 1)
5b54dac8 797 netif_tx_wake_queue(netdev_get_tx_queue(
3a67c9cc 798 ndev, q_idx));
33be96e4 799 }
1d06825b 800 } else if (ret == -EAGAIN) {
5b54dac8 801 netif_tx_stop_queue(netdev_get_tx_queue(
3a67c9cc
KS
802 ndev, q_idx));
803 if (atomic_read(&net_device->queue_sends[q_idx]) < 1) {
5b54dac8 804 netif_tx_wake_queue(netdev_get_tx_queue(
3a67c9cc 805 ndev, q_idx));
33be96e4
HZ
806 ret = -ENOSPC;
807 }
1d06825b 808 } else {
d9871158 809 netdev_err(ndev, "Unable to send packet %p ret %d\n",
85799a37 810 packet, ret);
1d06825b 811 }
fceaf24a 812
fceaf24a
HJ
813 return ret;
814}
815
5fa9d3c5 816static void netvsc_send_recv_completion(struct hv_device *device,
5b54dac8 817 struct vmbus_channel *channel,
97c1723a 818 struct netvsc_device *net_device,
63f6921d 819 u64 transaction_id, u32 status)
5fa9d3c5
HZ
820{
821 struct nvsp_message recvcompMessage;
822 int retries = 0;
823 int ret;
2ddd5e5f 824 struct net_device *ndev;
2ddd5e5f
S
825
826 ndev = net_device->ndev;
5fa9d3c5
HZ
827
828 recvcompMessage.hdr.msg_type =
829 NVSP_MSG1_TYPE_SEND_RNDIS_PKT_COMPLETE;
830
63f6921d 831 recvcompMessage.msg.v1_msg.send_rndis_pkt_complete.status = status;
5fa9d3c5
HZ
832
833retry_send_cmplt:
834 /* Send the completion */
5b54dac8 835 ret = vmbus_sendpacket(channel, &recvcompMessage,
5fa9d3c5
HZ
836 sizeof(struct nvsp_message), transaction_id,
837 VM_PKT_COMP, 0);
838 if (ret == 0) {
839 /* success */
840 /* no-op */
d2598f01 841 } else if (ret == -EAGAIN) {
5fa9d3c5
HZ
842 /* no more room...wait a bit and attempt to retry 3 times */
843 retries++;
d9871158 844 netdev_err(ndev, "unable to send receive completion pkt"
c909ebbd 845 " (tid %llx)...retrying %d\n", transaction_id, retries);
5fa9d3c5
HZ
846
847 if (retries < 4) {
848 udelay(100);
849 goto retry_send_cmplt;
850 } else {
d9871158 851 netdev_err(ndev, "unable to send receive "
c909ebbd 852 "completion pkt (tid %llx)...give up retrying\n",
5fa9d3c5
HZ
853 transaction_id);
854 }
855 } else {
d9871158 856 netdev_err(ndev, "unable to send receive "
c909ebbd 857 "completion pkt - %llx\n", transaction_id);
5fa9d3c5
HZ
858 }
859}
860
97c1723a 861static void netvsc_receive(struct netvsc_device *net_device,
5b54dac8 862 struct vmbus_channel *channel,
97c1723a
KS
863 struct hv_device *device,
864 struct vmpacket_descriptor *packet)
fceaf24a 865{
85799a37
HZ
866 struct vmtransfer_page_packet_header *vmxferpage_packet;
867 struct nvsp_message *nvsp_packet;
4baab261
HZ
868 struct hv_netvsc_packet nv_pkt;
869 struct hv_netvsc_packet *netvsc_packet = &nv_pkt;
870 u32 status = NVSP_STAT_SUCCESS;
45326342
HZ
871 int i;
872 int count = 0;
2ddd5e5f 873 struct net_device *ndev;
779b4d17 874
2ddd5e5f 875 ndev = net_device->ndev;
fceaf24a 876
21a80820
GKH
877 /*
878 * All inbound packets other than send completion should be xfer page
879 * packet
880 */
415f2287 881 if (packet->type != VM_PKT_DATA_USING_XFER_PAGES) {
d9871158 882 netdev_err(ndev, "Unknown packet type received - %d\n",
415f2287 883 packet->type);
fceaf24a
HJ
884 return;
885 }
886
85799a37 887 nvsp_packet = (struct nvsp_message *)((unsigned long)packet +
415f2287 888 (packet->offset8 << 3));
fceaf24a 889
454f18a9 890 /* Make sure this is a valid nvsp packet */
53d21fdb
HZ
891 if (nvsp_packet->hdr.msg_type !=
892 NVSP_MSG1_TYPE_SEND_RNDIS_PKT) {
d9871158 893 netdev_err(ndev, "Unknown nvsp packet type received-"
c909ebbd 894 " %d\n", nvsp_packet->hdr.msg_type);
fceaf24a
HJ
895 return;
896 }
897
85799a37 898 vmxferpage_packet = (struct vmtransfer_page_packet_header *)packet;
fceaf24a 899
415f2287 900 if (vmxferpage_packet->xfer_pageset_id != NETVSC_RECEIVE_BUFFER_ID) {
d9871158 901 netdev_err(ndev, "Invalid xfer page set id - "
c909ebbd 902 "expecting %x got %x\n", NETVSC_RECEIVE_BUFFER_ID,
415f2287 903 vmxferpage_packet->xfer_pageset_id);
fceaf24a
HJ
904 return;
905 }
906
4baab261
HZ
907 count = vmxferpage_packet->range_cnt;
908 netvsc_packet->device = device;
909 netvsc_packet->channel = channel;
fceaf24a 910
454f18a9 911 /* Each range represents 1 RNDIS pkt that contains 1 ethernet frame */
4baab261 912 for (i = 0; i < count; i++) {
454f18a9 913 /* Initialize the netvsc packet */
63f6921d 914 netvsc_packet->status = NVSP_STAT_SUCCESS;
45326342
HZ
915 netvsc_packet->data = (void *)((unsigned long)net_device->
916 recv_buf + vmxferpage_packet->ranges[i].byte_offset);
72a2f5bd 917 netvsc_packet->total_data_buflen =
415f2287 918 vmxferpage_packet->ranges[i].byte_count;
fceaf24a 919
454f18a9 920 /* Pass it to the upper layer */
ac6f7859 921 rndis_filter_receive(device, netvsc_packet);
fceaf24a 922
4baab261
HZ
923 if (netvsc_packet->status != NVSP_STAT_SUCCESS)
924 status = NVSP_STAT_FAIL;
fceaf24a
HJ
925 }
926
4baab261
HZ
927 netvsc_send_recv_completion(device, channel, net_device,
928 vmxferpage_packet->d.trans_id, status);
fceaf24a
HJ
929}
930
5b54dac8
HZ
931
932static void netvsc_send_table(struct hv_device *hdev,
933 struct vmpacket_descriptor *vmpkt)
934{
935 struct netvsc_device *nvscdev;
936 struct net_device *ndev;
937 struct nvsp_message *nvmsg;
938 int i;
939 u32 count, *tab;
940
941 nvscdev = get_outbound_net_device(hdev);
942 if (!nvscdev)
943 return;
944 ndev = nvscdev->ndev;
945
946 nvmsg = (struct nvsp_message *)((unsigned long)vmpkt +
947 (vmpkt->offset8 << 3));
948
949 if (nvmsg->hdr.msg_type != NVSP_MSG5_TYPE_SEND_INDIRECTION_TABLE)
950 return;
951
952 count = nvmsg->msg.v5_msg.send_table.count;
953 if (count != VRSS_SEND_TAB_SIZE) {
954 netdev_err(ndev, "Received wrong send-table size:%u\n", count);
955 return;
956 }
957
958 tab = (u32 *)((unsigned long)&nvmsg->msg.v5_msg.send_table +
959 nvmsg->msg.v5_msg.send_table.offset);
960
961 for (i = 0; i < count; i++)
962 nvscdev->send_table[i] = tab[i];
963}
964
965void netvsc_channel_cb(void *context)
fceaf24a 966{
21a80820 967 int ret;
5b54dac8
HZ
968 struct vmbus_channel *channel = (struct vmbus_channel *)context;
969 struct hv_device *device;
85799a37
HZ
970 struct netvsc_device *net_device;
971 u32 bytes_recvd;
972 u64 request_id;
8dc0a06a 973 struct vmpacket_descriptor *desc;
c6fcf0ba
BP
974 unsigned char *buffer;
975 int bufferlen = NETVSC_PACKET_SIZE;
2ddd5e5f 976 struct net_device *ndev;
fceaf24a 977
5b54dac8
HZ
978 if (channel->primary_channel != NULL)
979 device = channel->primary_channel->device_obj;
980 else
981 device = channel->device_obj;
982
5a71ae30 983 net_device = get_inbound_net_device(device);
2ddd5e5f 984 if (!net_device)
ee0c4c39 985 return;
2ddd5e5f 986 ndev = net_device->ndev;
5b54dac8 987 buffer = get_per_channel_state(channel);
fceaf24a 988
21a80820 989 do {
5b54dac8 990 ret = vmbus_recvpacket_raw(channel, buffer, bufferlen,
85799a37 991 &bytes_recvd, &request_id);
21a80820 992 if (ret == 0) {
85799a37 993 if (bytes_recvd > 0) {
21a80820 994 desc = (struct vmpacket_descriptor *)buffer;
415f2287
HZ
995 switch (desc->type) {
996 case VM_PKT_COMP:
97c1723a
KS
997 netvsc_send_completion(net_device,
998 device, desc);
21a80820
GKH
999 break;
1000
415f2287 1001 case VM_PKT_DATA_USING_XFER_PAGES:
5b54dac8
HZ
1002 netvsc_receive(net_device, channel,
1003 device, desc);
1004 break;
1005
1006 case VM_PKT_DATA_INBAND:
1007 netvsc_send_table(device, desc);
21a80820
GKH
1008 break;
1009
1010 default:
d9871158 1011 netdev_err(ndev,
21a80820
GKH
1012 "unhandled packet type %d, "
1013 "tid %llx len %d\n",
415f2287 1014 desc->type, request_id,
85799a37 1015 bytes_recvd);
21a80820 1016 break;
fceaf24a
HJ
1017 }
1018
21a80820 1019 } else {
ee0c4c39
KS
1020 /*
1021 * We are done for this pass.
1022 */
fceaf24a
HJ
1023 break;
1024 }
ee0c4c39 1025
3d5cad97 1026 } else if (ret == -ENOBUFS) {
ee0c4c39
KS
1027 if (bufferlen > NETVSC_PACKET_SIZE)
1028 kfree(buffer);
21a80820 1029 /* Handle large packet */
85799a37 1030 buffer = kmalloc(bytes_recvd, GFP_ATOMIC);
21a80820 1031 if (buffer == NULL) {
454f18a9 1032 /* Try again next time around */
d9871158 1033 netdev_err(ndev,
21a80820 1034 "unable to allocate buffer of size "
c909ebbd 1035 "(%d)!!\n", bytes_recvd);
fceaf24a
HJ
1036 break;
1037 }
1038
85799a37 1039 bufferlen = bytes_recvd;
fceaf24a
HJ
1040 }
1041 } while (1);
1042
ee0c4c39
KS
1043 if (bufferlen > NETVSC_PACKET_SIZE)
1044 kfree(buffer);
fceaf24a
HJ
1045 return;
1046}
af24ce42 1047
b637e023
HZ
1048/*
1049 * netvsc_device_add - Callback when the device belonging to this
1050 * driver is added
1051 */
7bd23a4d 1052int netvsc_device_add(struct hv_device *device, void *additional_info)
b637e023
HZ
1053{
1054 int ret = 0;
aae23986
S
1055 int ring_size =
1056 ((struct netvsc_device_info *)additional_info)->ring_size;
b637e023 1057 struct netvsc_device *net_device;
2ddd5e5f 1058 struct net_device *ndev;
b637e023
HZ
1059
1060 net_device = alloc_net_device(device);
b1c84927
DC
1061 if (!net_device)
1062 return -ENOMEM;
b637e023 1063
5b54dac8
HZ
1064 net_device->ring_size = ring_size;
1065
2ddd5e5f
S
1066 /*
1067 * Coming into this function, struct net_device * is
1068 * registered as the driver private data.
1069 * In alloc_net_device(), we register struct netvsc_device *
1070 * as the driver private data and stash away struct net_device *
1071 * in struct netvsc_device *.
1072 */
1073 ndev = net_device->ndev;
1074
b637e023 1075 /* Initialize the NetVSC channel extension */
35abb21a 1076 init_completion(&net_device->channel_init_wait);
b637e023 1077
5b54dac8
HZ
1078 set_per_channel_state(device->channel, net_device->cb_buffer);
1079
b637e023 1080 /* Open the channel */
aae23986
S
1081 ret = vmbus_open(device->channel, ring_size * PAGE_SIZE,
1082 ring_size * PAGE_SIZE, NULL, 0,
5b54dac8 1083 netvsc_channel_cb, device->channel);
b637e023
HZ
1084
1085 if (ret != 0) {
d9871158 1086 netdev_err(ndev, "unable to open channel: %d\n", ret);
b637e023
HZ
1087 goto cleanup;
1088 }
1089
1090 /* Channel is opened */
c909ebbd 1091 pr_info("hv_netvsc channel opened successfully\n");
b637e023 1092
5b54dac8
HZ
1093 net_device->chn_table[0] = device->channel;
1094
b637e023
HZ
1095 /* Connect with the NetVsp */
1096 ret = netvsc_connect_vsp(device);
1097 if (ret != 0) {
d9871158 1098 netdev_err(ndev,
c909ebbd 1099 "unable to connect to NetVSP - %d\n", ret);
b637e023
HZ
1100 goto close;
1101 }
1102
1103 return ret;
1104
1105close:
1106 /* Now, we can close the channel safely */
1107 vmbus_close(device->channel);
1108
1109cleanup:
f90251c8 1110 free_netvsc_device(net_device);
b637e023
HZ
1111
1112 return ret;
1113}