]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - drivers/net/sfc/tx.c
sfc: Remove unused field and comment on a previously removed field
[mirror_ubuntu-artful-kernel.git] / drivers / net / sfc / tx.c
CommitLineData
8ceee660
BH
1/****************************************************************************
2 * Driver for Solarflare Solarstorm network controllers and boards
3 * Copyright 2005-2006 Fen Systems Ltd.
906bb26c 4 * Copyright 2005-2009 Solarflare Communications Inc.
8ceee660
BH
5 *
6 * This program is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License version 2 as published
8 * by the Free Software Foundation, incorporated herein by reference.
9 */
10
11#include <linux/pci.h>
12#include <linux/tcp.h>
13#include <linux/ip.h>
14#include <linux/in.h>
738a8f4b 15#include <linux/ipv6.h>
5a0e3ad6 16#include <linux/slab.h>
738a8f4b 17#include <net/ipv6.h>
8ceee660
BH
18#include <linux/if_ether.h>
19#include <linux/highmem.h>
20#include "net_driver.h"
8ceee660 21#include "efx.h"
744093c9 22#include "nic.h"
8ceee660
BH
23#include "workarounds.h"
24
25/*
26 * TX descriptor ring full threshold
27 *
28 * The tx_queue descriptor ring fill-level must fall below this value
29 * before we restart the netif queue
30 */
ecc910f5 31#define EFX_TXQ_THRESHOLD(_efx) ((_efx)->txq_entries / 2u)
8ceee660 32
a4900ac9
BH
33/* We need to be able to nest calls to netif_tx_stop_queue(), partly
34 * because of the 2 hardware queues associated with each core queue,
35 * but also so that we can inhibit TX for reasons other than a full
36 * hardware queue. */
37void efx_stop_queue(struct efx_channel *channel)
8ceee660 38{
a4900ac9 39 struct efx_nic *efx = channel->efx;
f7d12cdc 40 struct efx_tx_queue *tx_queue = efx_channel_get_tx_queue(channel, 0);
a4900ac9 41
f7d12cdc 42 if (!tx_queue)
a4900ac9
BH
43 return;
44
45 spin_lock_bh(&channel->tx_stop_lock);
62776d03 46 netif_vdbg(efx, tx_queued, efx->net_dev, "stop TX queue\n");
8ceee660 47
a4900ac9
BH
48 atomic_inc(&channel->tx_stop_count);
49 netif_tx_stop_queue(
f7d12cdc
BH
50 netdev_get_tx_queue(efx->net_dev,
51 tx_queue->queue / EFX_TXQ_TYPES));
8ceee660 52
a4900ac9 53 spin_unlock_bh(&channel->tx_stop_lock);
8ceee660
BH
54}
55
a4900ac9
BH
56/* Decrement core TX queue stop count and wake it if the count is 0 */
57void efx_wake_queue(struct efx_channel *channel)
8ceee660 58{
a4900ac9 59 struct efx_nic *efx = channel->efx;
f7d12cdc 60 struct efx_tx_queue *tx_queue = efx_channel_get_tx_queue(channel, 0);
a4900ac9 61
f7d12cdc 62 if (!tx_queue)
a4900ac9
BH
63 return;
64
8ceee660 65 local_bh_disable();
a4900ac9
BH
66 if (atomic_dec_and_lock(&channel->tx_stop_count,
67 &channel->tx_stop_lock)) {
62776d03 68 netif_vdbg(efx, tx_queued, efx->net_dev, "waking TX queue\n");
a4900ac9 69 netif_tx_wake_queue(
f7d12cdc
BH
70 netdev_get_tx_queue(efx->net_dev,
71 tx_queue->queue / EFX_TXQ_TYPES));
a4900ac9 72 spin_unlock(&channel->tx_stop_lock);
8ceee660
BH
73 }
74 local_bh_enable();
75}
76
4d566063
BH
77static void efx_dequeue_buffer(struct efx_tx_queue *tx_queue,
78 struct efx_tx_buffer *buffer)
8ceee660
BH
79{
80 if (buffer->unmap_len) {
81 struct pci_dev *pci_dev = tx_queue->efx->pci_dev;
cc12dac2
BH
82 dma_addr_t unmap_addr = (buffer->dma_addr + buffer->len -
83 buffer->unmap_len);
8ceee660 84 if (buffer->unmap_single)
cc12dac2
BH
85 pci_unmap_single(pci_dev, unmap_addr, buffer->unmap_len,
86 PCI_DMA_TODEVICE);
8ceee660 87 else
cc12dac2
BH
88 pci_unmap_page(pci_dev, unmap_addr, buffer->unmap_len,
89 PCI_DMA_TODEVICE);
8ceee660 90 buffer->unmap_len = 0;
dc8cfa55 91 buffer->unmap_single = false;
8ceee660
BH
92 }
93
94 if (buffer->skb) {
95 dev_kfree_skb_any((struct sk_buff *) buffer->skb);
96 buffer->skb = NULL;
62776d03
BH
97 netif_vdbg(tx_queue->efx, tx_done, tx_queue->efx->net_dev,
98 "TX queue %d transmission id %x complete\n",
99 tx_queue->queue, tx_queue->read_count);
8ceee660
BH
100 }
101}
102
b9b39b62
BH
103/**
104 * struct efx_tso_header - a DMA mapped buffer for packet headers
105 * @next: Linked list of free ones.
106 * The list is protected by the TX queue lock.
107 * @dma_unmap_len: Length to unmap for an oversize buffer, or 0.
108 * @dma_addr: The DMA address of the header below.
109 *
110 * This controls the memory used for a TSO header. Use TSOH_DATA()
111 * to find the packet header data. Use TSOH_SIZE() to calculate the
112 * total size required for a given packet header length. TSO headers
113 * in the free list are exactly %TSOH_STD_SIZE bytes in size.
114 */
115struct efx_tso_header {
116 union {
117 struct efx_tso_header *next;
118 size_t unmap_len;
119 };
120 dma_addr_t dma_addr;
121};
122
123static int efx_enqueue_skb_tso(struct efx_tx_queue *tx_queue,
740847da 124 struct sk_buff *skb);
b9b39b62
BH
125static void efx_fini_tso(struct efx_tx_queue *tx_queue);
126static void efx_tsoh_heap_free(struct efx_tx_queue *tx_queue,
127 struct efx_tso_header *tsoh);
128
4d566063
BH
129static void efx_tsoh_free(struct efx_tx_queue *tx_queue,
130 struct efx_tx_buffer *buffer)
b9b39b62
BH
131{
132 if (buffer->tsoh) {
133 if (likely(!buffer->tsoh->unmap_len)) {
134 buffer->tsoh->next = tx_queue->tso_headers_free;
135 tx_queue->tso_headers_free = buffer->tsoh;
136 } else {
137 efx_tsoh_heap_free(tx_queue, buffer->tsoh);
138 }
139 buffer->tsoh = NULL;
140 }
141}
142
8ceee660 143
63f19884
BH
144static inline unsigned
145efx_max_tx_len(struct efx_nic *efx, dma_addr_t dma_addr)
146{
147 /* Depending on the NIC revision, we can use descriptor
148 * lengths up to 8K or 8K-1. However, since PCI Express
149 * devices must split read requests at 4K boundaries, there is
150 * little benefit from using descriptors that cross those
151 * boundaries and we keep things simple by not doing so.
152 */
153 unsigned len = (~dma_addr & 0xfff) + 1;
154
155 /* Work around hardware bug for unaligned buffers. */
156 if (EFX_WORKAROUND_5391(efx) && (dma_addr & 0xf))
157 len = min_t(unsigned, len, 512 - (dma_addr & 0xf));
158
159 return len;
160}
161
8ceee660
BH
162/*
163 * Add a socket buffer to a TX queue
164 *
165 * This maps all fragments of a socket buffer for DMA and adds them to
166 * the TX queue. The queue's insert pointer will be incremented by
167 * the number of fragments in the socket buffer.
168 *
169 * If any DMA mapping fails, any mapped fragments will be unmapped,
170 * the queue's insert pointer will be restored to its original value.
171 *
497f5ba3
BH
172 * This function is split out from efx_hard_start_xmit to allow the
173 * loopback test to direct packets via specific TX queues.
174 *
8ceee660
BH
175 * Returns NETDEV_TX_OK or NETDEV_TX_BUSY
176 * You must hold netif_tx_lock() to call this function.
177 */
497f5ba3 178netdev_tx_t efx_enqueue_skb(struct efx_tx_queue *tx_queue, struct sk_buff *skb)
8ceee660
BH
179{
180 struct efx_nic *efx = tx_queue->efx;
181 struct pci_dev *pci_dev = efx->pci_dev;
182 struct efx_tx_buffer *buffer;
183 skb_frag_t *fragment;
184 struct page *page;
185 int page_offset;
63f19884 186 unsigned int len, unmap_len = 0, fill_level, insert_ptr;
8ceee660
BH
187 dma_addr_t dma_addr, unmap_addr = 0;
188 unsigned int dma_len;
dc8cfa55 189 bool unmap_single;
8ceee660 190 int q_space, i = 0;
61357325 191 netdev_tx_t rc = NETDEV_TX_OK;
8ceee660
BH
192
193 EFX_BUG_ON_PARANOID(tx_queue->write_count != tx_queue->insert_count);
194
9bc183d7 195 if (skb_shinfo(skb)->gso_size)
b9b39b62
BH
196 return efx_enqueue_skb_tso(tx_queue, skb);
197
8ceee660
BH
198 /* Get size of the initial fragment */
199 len = skb_headlen(skb);
200
bb145a9e
BH
201 /* Pad if necessary */
202 if (EFX_WORKAROUND_15592(efx) && skb->len <= 32) {
203 EFX_BUG_ON_PARANOID(skb->data_len);
204 len = 32 + 1;
205 if (skb_pad(skb, len - skb->len))
206 return NETDEV_TX_OK;
207 }
208
8ceee660 209 fill_level = tx_queue->insert_count - tx_queue->old_read_count;
ecc910f5 210 q_space = efx->txq_entries - 1 - fill_level;
8ceee660
BH
211
212 /* Map for DMA. Use pci_map_single rather than pci_map_page
213 * since this is more efficient on machines with sparse
214 * memory.
215 */
dc8cfa55 216 unmap_single = true;
8ceee660
BH
217 dma_addr = pci_map_single(pci_dev, skb->data, len, PCI_DMA_TODEVICE);
218
219 /* Process all fragments */
220 while (1) {
8d8bb39b 221 if (unlikely(pci_dma_mapping_error(pci_dev, dma_addr)))
8ceee660
BH
222 goto pci_err;
223
224 /* Store fields for marking in the per-fragment final
225 * descriptor */
226 unmap_len = len;
227 unmap_addr = dma_addr;
228
229 /* Add to TX queue, splitting across DMA boundaries */
230 do {
231 if (unlikely(q_space-- <= 0)) {
232 /* It might be that completions have
233 * happened since the xmit path last
234 * checked. Update the xmit path's
235 * copy of read_count.
236 */
237 ++tx_queue->stopped;
238 /* This memory barrier protects the
239 * change of stopped from the access
240 * of read_count. */
241 smp_mb();
242 tx_queue->old_read_count =
51c56f40 243 ACCESS_ONCE(tx_queue->read_count);
8ceee660
BH
244 fill_level = (tx_queue->insert_count
245 - tx_queue->old_read_count);
ecc910f5 246 q_space = efx->txq_entries - 1 - fill_level;
8ceee660
BH
247 if (unlikely(q_space-- <= 0))
248 goto stop;
249 smp_mb();
250 --tx_queue->stopped;
251 }
252
ecc910f5 253 insert_ptr = tx_queue->insert_count & tx_queue->ptr_mask;
8ceee660 254 buffer = &tx_queue->buffer[insert_ptr];
b9b39b62
BH
255 efx_tsoh_free(tx_queue, buffer);
256 EFX_BUG_ON_PARANOID(buffer->tsoh);
8ceee660
BH
257 EFX_BUG_ON_PARANOID(buffer->skb);
258 EFX_BUG_ON_PARANOID(buffer->len);
dc8cfa55 259 EFX_BUG_ON_PARANOID(!buffer->continuation);
8ceee660
BH
260 EFX_BUG_ON_PARANOID(buffer->unmap_len);
261
63f19884
BH
262 dma_len = efx_max_tx_len(efx, dma_addr);
263 if (likely(dma_len >= len))
8ceee660
BH
264 dma_len = len;
265
8ceee660
BH
266 /* Fill out per descriptor fields */
267 buffer->len = dma_len;
268 buffer->dma_addr = dma_addr;
269 len -= dma_len;
270 dma_addr += dma_len;
271 ++tx_queue->insert_count;
272 } while (len);
273
274 /* Transfer ownership of the unmapping to the final buffer */
8ceee660
BH
275 buffer->unmap_single = unmap_single;
276 buffer->unmap_len = unmap_len;
277 unmap_len = 0;
278
279 /* Get address and size of next fragment */
280 if (i >= skb_shinfo(skb)->nr_frags)
281 break;
282 fragment = &skb_shinfo(skb)->frags[i];
283 len = fragment->size;
284 page = fragment->page;
285 page_offset = fragment->page_offset;
286 i++;
287 /* Map for DMA */
dc8cfa55 288 unmap_single = false;
8ceee660
BH
289 dma_addr = pci_map_page(pci_dev, page, page_offset, len,
290 PCI_DMA_TODEVICE);
291 }
292
293 /* Transfer ownership of the skb to the final buffer */
294 buffer->skb = skb;
dc8cfa55 295 buffer->continuation = false;
8ceee660
BH
296
297 /* Pass off to hardware */
152b6a62 298 efx_nic_push_buffers(tx_queue);
8ceee660
BH
299
300 return NETDEV_TX_OK;
301
302 pci_err:
62776d03
BH
303 netif_err(efx, tx_err, efx->net_dev,
304 " TX queue %d could not map skb with %d bytes %d "
305 "fragments for DMA\n", tx_queue->queue, skb->len,
306 skb_shinfo(skb)->nr_frags + 1);
8ceee660
BH
307
308 /* Mark the packet as transmitted, and free the SKB ourselves */
9bc183d7 309 dev_kfree_skb_any(skb);
8ceee660
BH
310 goto unwind;
311
312 stop:
313 rc = NETDEV_TX_BUSY;
314
315 if (tx_queue->stopped == 1)
a4900ac9 316 efx_stop_queue(tx_queue->channel);
8ceee660
BH
317
318 unwind:
319 /* Work backwards until we hit the original insert pointer value */
320 while (tx_queue->insert_count != tx_queue->write_count) {
321 --tx_queue->insert_count;
ecc910f5 322 insert_ptr = tx_queue->insert_count & tx_queue->ptr_mask;
8ceee660
BH
323 buffer = &tx_queue->buffer[insert_ptr];
324 efx_dequeue_buffer(tx_queue, buffer);
325 buffer->len = 0;
326 }
327
328 /* Free the fragment we were mid-way through pushing */
ecbd95c1
BH
329 if (unmap_len) {
330 if (unmap_single)
331 pci_unmap_single(pci_dev, unmap_addr, unmap_len,
332 PCI_DMA_TODEVICE);
333 else
334 pci_unmap_page(pci_dev, unmap_addr, unmap_len,
335 PCI_DMA_TODEVICE);
336 }
8ceee660
BH
337
338 return rc;
339}
340
341/* Remove packets from the TX queue
342 *
343 * This removes packets from the TX queue, up to and including the
344 * specified index.
345 */
4d566063
BH
346static void efx_dequeue_buffers(struct efx_tx_queue *tx_queue,
347 unsigned int index)
8ceee660
BH
348{
349 struct efx_nic *efx = tx_queue->efx;
350 unsigned int stop_index, read_ptr;
8ceee660 351
ecc910f5
SH
352 stop_index = (index + 1) & tx_queue->ptr_mask;
353 read_ptr = tx_queue->read_count & tx_queue->ptr_mask;
8ceee660
BH
354
355 while (read_ptr != stop_index) {
356 struct efx_tx_buffer *buffer = &tx_queue->buffer[read_ptr];
357 if (unlikely(buffer->len == 0)) {
62776d03
BH
358 netif_err(efx, tx_err, efx->net_dev,
359 "TX queue %d spurious TX completion id %x\n",
360 tx_queue->queue, read_ptr);
8ceee660
BH
361 efx_schedule_reset(efx, RESET_TYPE_TX_SKIP);
362 return;
363 }
364
365 efx_dequeue_buffer(tx_queue, buffer);
dc8cfa55 366 buffer->continuation = true;
8ceee660
BH
367 buffer->len = 0;
368
369 ++tx_queue->read_count;
ecc910f5 370 read_ptr = tx_queue->read_count & tx_queue->ptr_mask;
8ceee660
BH
371 }
372}
373
8ceee660
BH
374/* Initiate a packet transmission. We use one channel per CPU
375 * (sharing when we have more CPUs than channels). On Falcon, the TX
376 * completion events will be directed back to the CPU that transmitted
377 * the packet, which should be cache-efficient.
378 *
379 * Context: non-blocking.
380 * Note that returning anything other than NETDEV_TX_OK will cause the
381 * OS to free the skb.
382 */
61357325
SH
383netdev_tx_t efx_hard_start_xmit(struct sk_buff *skb,
384 struct net_device *net_dev)
8ceee660 385{
767e468c 386 struct efx_nic *efx = netdev_priv(net_dev);
60ac1065
BH
387 struct efx_tx_queue *tx_queue;
388
a7ef5933
BH
389 if (unlikely(efx->port_inhibited))
390 return NETDEV_TX_BUSY;
391
f7d12cdc
BH
392 tx_queue = efx_get_tx_queue(efx, skb_get_queue_mapping(skb),
393 skb->ip_summed == CHECKSUM_PARTIAL ?
394 EFX_TXQ_TYPE_OFFLOAD : 0);
60ac1065 395
497f5ba3 396 return efx_enqueue_skb(tx_queue, skb);
8ceee660
BH
397}
398
399void efx_xmit_done(struct efx_tx_queue *tx_queue, unsigned int index)
400{
401 unsigned fill_level;
402 struct efx_nic *efx = tx_queue->efx;
4f3907e9 403 struct netdev_queue *queue;
8ceee660 404
ecc910f5 405 EFX_BUG_ON_PARANOID(index > tx_queue->ptr_mask);
8ceee660
BH
406
407 efx_dequeue_buffers(tx_queue, index);
408
409 /* See if we need to restart the netif queue. This barrier
410 * separates the update of read_count from the test of
411 * stopped. */
412 smp_mb();
32d76007 413 if (unlikely(tx_queue->stopped) && likely(efx->port_enabled)) {
8ceee660 414 fill_level = tx_queue->insert_count - tx_queue->read_count;
ecc910f5 415 if (fill_level < EFX_TXQ_THRESHOLD(efx)) {
55668611 416 EFX_BUG_ON_PARANOID(!efx_dev_registered(efx));
8ceee660
BH
417
418 /* Do this under netif_tx_lock(), to avoid racing
419 * with efx_xmit(). */
4f3907e9
SH
420 queue = netdev_get_tx_queue(
421 efx->net_dev,
422 tx_queue->queue / EFX_TXQ_TYPES);
423 __netif_tx_lock(queue, smp_processor_id());
8ceee660
BH
424 if (tx_queue->stopped) {
425 tx_queue->stopped = 0;
a4900ac9 426 efx_wake_queue(tx_queue->channel);
8ceee660 427 }
4f3907e9 428 __netif_tx_unlock(queue);
8ceee660
BH
429 }
430 }
cd38557d
BH
431
432 /* Check whether the hardware queue is now empty */
433 if ((int)(tx_queue->read_count - tx_queue->old_write_count) >= 0) {
434 tx_queue->old_write_count = ACCESS_ONCE(tx_queue->write_count);
435 if (tx_queue->read_count == tx_queue->old_write_count) {
436 smp_mb();
437 tx_queue->empty_read_count =
438 tx_queue->read_count | EFX_EMPTY_COUNT_VALID;
439 }
440 }
8ceee660
BH
441}
442
443int efx_probe_tx_queue(struct efx_tx_queue *tx_queue)
444{
445 struct efx_nic *efx = tx_queue->efx;
ecc910f5 446 unsigned int entries;
8ceee660
BH
447 int i, rc;
448
ecc910f5
SH
449 /* Create the smallest power-of-two aligned ring */
450 entries = max(roundup_pow_of_two(efx->txq_entries), EFX_MIN_DMAQ_SIZE);
451 EFX_BUG_ON_PARANOID(entries > EFX_MAX_DMAQ_SIZE);
452 tx_queue->ptr_mask = entries - 1;
453
454 netif_dbg(efx, probe, efx->net_dev,
455 "creating TX queue %d size %#x mask %#x\n",
456 tx_queue->queue, efx->txq_entries, tx_queue->ptr_mask);
8ceee660
BH
457
458 /* Allocate software ring */
ecc910f5
SH
459 tx_queue->buffer = kzalloc(entries * sizeof(*tx_queue->buffer),
460 GFP_KERNEL);
60ac1065
BH
461 if (!tx_queue->buffer)
462 return -ENOMEM;
ecc910f5 463 for (i = 0; i <= tx_queue->ptr_mask; ++i)
dc8cfa55 464 tx_queue->buffer[i].continuation = true;
8ceee660
BH
465
466 /* Allocate hardware ring */
152b6a62 467 rc = efx_nic_probe_tx(tx_queue);
8ceee660 468 if (rc)
60ac1065 469 goto fail;
8ceee660
BH
470
471 return 0;
472
60ac1065 473 fail:
8ceee660
BH
474 kfree(tx_queue->buffer);
475 tx_queue->buffer = NULL;
8ceee660
BH
476 return rc;
477}
478
bc3c90a2 479void efx_init_tx_queue(struct efx_tx_queue *tx_queue)
8ceee660 480{
62776d03
BH
481 netif_dbg(tx_queue->efx, drv, tx_queue->efx->net_dev,
482 "initialising TX queue %d\n", tx_queue->queue);
8ceee660
BH
483
484 tx_queue->insert_count = 0;
485 tx_queue->write_count = 0;
cd38557d 486 tx_queue->old_write_count = 0;
8ceee660
BH
487 tx_queue->read_count = 0;
488 tx_queue->old_read_count = 0;
cd38557d 489 tx_queue->empty_read_count = 0 | EFX_EMPTY_COUNT_VALID;
8ceee660
BH
490 BUG_ON(tx_queue->stopped);
491
492 /* Set up TX descriptor ring */
152b6a62 493 efx_nic_init_tx(tx_queue);
8ceee660
BH
494}
495
496void efx_release_tx_buffers(struct efx_tx_queue *tx_queue)
497{
498 struct efx_tx_buffer *buffer;
499
500 if (!tx_queue->buffer)
501 return;
502
503 /* Free any buffers left in the ring */
504 while (tx_queue->read_count != tx_queue->write_count) {
ecc910f5 505 buffer = &tx_queue->buffer[tx_queue->read_count & tx_queue->ptr_mask];
8ceee660 506 efx_dequeue_buffer(tx_queue, buffer);
dc8cfa55 507 buffer->continuation = true;
8ceee660
BH
508 buffer->len = 0;
509
510 ++tx_queue->read_count;
511 }
512}
513
514void efx_fini_tx_queue(struct efx_tx_queue *tx_queue)
515{
62776d03
BH
516 netif_dbg(tx_queue->efx, drv, tx_queue->efx->net_dev,
517 "shutting down TX queue %d\n", tx_queue->queue);
8ceee660
BH
518
519 /* Flush TX queue, remove descriptor ring */
152b6a62 520 efx_nic_fini_tx(tx_queue);
8ceee660
BH
521
522 efx_release_tx_buffers(tx_queue);
523
b9b39b62
BH
524 /* Free up TSO header cache */
525 efx_fini_tso(tx_queue);
526
8ceee660
BH
527 /* Release queue's stop on port, if any */
528 if (tx_queue->stopped) {
529 tx_queue->stopped = 0;
a4900ac9 530 efx_wake_queue(tx_queue->channel);
8ceee660
BH
531 }
532}
533
534void efx_remove_tx_queue(struct efx_tx_queue *tx_queue)
535{
62776d03
BH
536 netif_dbg(tx_queue->efx, drv, tx_queue->efx->net_dev,
537 "destroying TX queue %d\n", tx_queue->queue);
152b6a62 538 efx_nic_remove_tx(tx_queue);
8ceee660
BH
539
540 kfree(tx_queue->buffer);
541 tx_queue->buffer = NULL;
8ceee660
BH
542}
543
544
b9b39b62
BH
545/* Efx TCP segmentation acceleration.
546 *
547 * Why? Because by doing it here in the driver we can go significantly
548 * faster than the GSO.
549 *
550 * Requires TX checksum offload support.
551 */
552
553/* Number of bytes inserted at the start of a TSO header buffer,
554 * similar to NET_IP_ALIGN.
555 */
13e9ab11 556#ifdef CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS
b9b39b62
BH
557#define TSOH_OFFSET 0
558#else
559#define TSOH_OFFSET NET_IP_ALIGN
560#endif
561
562#define TSOH_BUFFER(tsoh) ((u8 *)(tsoh + 1) + TSOH_OFFSET)
563
564/* Total size of struct efx_tso_header, buffer and padding */
565#define TSOH_SIZE(hdr_len) \
566 (sizeof(struct efx_tso_header) + TSOH_OFFSET + hdr_len)
567
568/* Size of blocks on free list. Larger blocks must be allocated from
569 * the heap.
570 */
571#define TSOH_STD_SIZE 128
572
573#define PTR_DIFF(p1, p2) ((u8 *)(p1) - (u8 *)(p2))
574#define ETH_HDR_LEN(skb) (skb_network_header(skb) - (skb)->data)
575#define SKB_TCP_OFF(skb) PTR_DIFF(tcp_hdr(skb), (skb)->data)
576#define SKB_IPV4_OFF(skb) PTR_DIFF(ip_hdr(skb), (skb)->data)
738a8f4b 577#define SKB_IPV6_OFF(skb) PTR_DIFF(ipv6_hdr(skb), (skb)->data)
b9b39b62
BH
578
579/**
580 * struct tso_state - TSO state for an SKB
23d9e60b 581 * @out_len: Remaining length in current segment
b9b39b62 582 * @seqnum: Current sequence number
23d9e60b 583 * @ipv4_id: Current IPv4 ID, host endian
b9b39b62 584 * @packet_space: Remaining space in current packet
23d9e60b
BH
585 * @dma_addr: DMA address of current position
586 * @in_len: Remaining length in current SKB fragment
587 * @unmap_len: Length of SKB fragment
588 * @unmap_addr: DMA address of SKB fragment
589 * @unmap_single: DMA single vs page mapping flag
738a8f4b 590 * @protocol: Network protocol (after any VLAN header)
23d9e60b
BH
591 * @header_len: Number of bytes of header
592 * @full_packet_size: Number of bytes to put in each outgoing segment
b9b39b62
BH
593 *
594 * The state used during segmentation. It is put into this data structure
595 * just to make it easy to pass into inline functions.
596 */
597struct tso_state {
23d9e60b
BH
598 /* Output position */
599 unsigned out_len;
b9b39b62 600 unsigned seqnum;
23d9e60b 601 unsigned ipv4_id;
b9b39b62
BH
602 unsigned packet_space;
603
23d9e60b
BH
604 /* Input position */
605 dma_addr_t dma_addr;
606 unsigned in_len;
607 unsigned unmap_len;
608 dma_addr_t unmap_addr;
609 bool unmap_single;
610
738a8f4b 611 __be16 protocol;
23d9e60b
BH
612 unsigned header_len;
613 int full_packet_size;
b9b39b62
BH
614};
615
616
617/*
618 * Verify that our various assumptions about sk_buffs and the conditions
738a8f4b 619 * under which TSO will be attempted hold true. Return the protocol number.
b9b39b62 620 */
738a8f4b 621static __be16 efx_tso_check_protocol(struct sk_buff *skb)
b9b39b62 622{
740847da
BH
623 __be16 protocol = skb->protocol;
624
b9b39b62 625 EFX_BUG_ON_PARANOID(((struct ethhdr *)skb->data)->h_proto !=
740847da
BH
626 protocol);
627 if (protocol == htons(ETH_P_8021Q)) {
628 /* Find the encapsulated protocol; reset network header
629 * and transport header based on that. */
630 struct vlan_ethhdr *veh = (struct vlan_ethhdr *)skb->data;
631 protocol = veh->h_vlan_encapsulated_proto;
632 skb_set_network_header(skb, sizeof(*veh));
633 if (protocol == htons(ETH_P_IP))
634 skb_set_transport_header(skb, sizeof(*veh) +
635 4 * ip_hdr(skb)->ihl);
738a8f4b
BH
636 else if (protocol == htons(ETH_P_IPV6))
637 skb_set_transport_header(skb, sizeof(*veh) +
638 sizeof(struct ipv6hdr));
740847da
BH
639 }
640
738a8f4b
BH
641 if (protocol == htons(ETH_P_IP)) {
642 EFX_BUG_ON_PARANOID(ip_hdr(skb)->protocol != IPPROTO_TCP);
643 } else {
644 EFX_BUG_ON_PARANOID(protocol != htons(ETH_P_IPV6));
645 EFX_BUG_ON_PARANOID(ipv6_hdr(skb)->nexthdr != NEXTHDR_TCP);
646 }
b9b39b62
BH
647 EFX_BUG_ON_PARANOID((PTR_DIFF(tcp_hdr(skb), skb->data)
648 + (tcp_hdr(skb)->doff << 2u)) >
649 skb_headlen(skb));
738a8f4b
BH
650
651 return protocol;
b9b39b62
BH
652}
653
654
655/*
656 * Allocate a page worth of efx_tso_header structures, and string them
657 * into the tx_queue->tso_headers_free linked list. Return 0 or -ENOMEM.
658 */
659static int efx_tsoh_block_alloc(struct efx_tx_queue *tx_queue)
660{
661
662 struct pci_dev *pci_dev = tx_queue->efx->pci_dev;
663 struct efx_tso_header *tsoh;
664 dma_addr_t dma_addr;
665 u8 *base_kva, *kva;
666
667 base_kva = pci_alloc_consistent(pci_dev, PAGE_SIZE, &dma_addr);
668 if (base_kva == NULL) {
62776d03
BH
669 netif_err(tx_queue->efx, tx_err, tx_queue->efx->net_dev,
670 "Unable to allocate page for TSO headers\n");
b9b39b62
BH
671 return -ENOMEM;
672 }
673
674 /* pci_alloc_consistent() allocates pages. */
675 EFX_BUG_ON_PARANOID(dma_addr & (PAGE_SIZE - 1u));
676
677 for (kva = base_kva; kva < base_kva + PAGE_SIZE; kva += TSOH_STD_SIZE) {
678 tsoh = (struct efx_tso_header *)kva;
679 tsoh->dma_addr = dma_addr + (TSOH_BUFFER(tsoh) - base_kva);
680 tsoh->next = tx_queue->tso_headers_free;
681 tx_queue->tso_headers_free = tsoh;
682 }
683
684 return 0;
685}
686
687
688/* Free up a TSO header, and all others in the same page. */
689static void efx_tsoh_block_free(struct efx_tx_queue *tx_queue,
690 struct efx_tso_header *tsoh,
691 struct pci_dev *pci_dev)
692{
693 struct efx_tso_header **p;
694 unsigned long base_kva;
695 dma_addr_t base_dma;
696
697 base_kva = (unsigned long)tsoh & PAGE_MASK;
698 base_dma = tsoh->dma_addr & PAGE_MASK;
699
700 p = &tx_queue->tso_headers_free;
b3475645 701 while (*p != NULL) {
b9b39b62
BH
702 if (((unsigned long)*p & PAGE_MASK) == base_kva)
703 *p = (*p)->next;
704 else
705 p = &(*p)->next;
b3475645 706 }
b9b39b62
BH
707
708 pci_free_consistent(pci_dev, PAGE_SIZE, (void *)base_kva, base_dma);
709}
710
711static struct efx_tso_header *
712efx_tsoh_heap_alloc(struct efx_tx_queue *tx_queue, size_t header_len)
713{
714 struct efx_tso_header *tsoh;
715
716 tsoh = kmalloc(TSOH_SIZE(header_len), GFP_ATOMIC | GFP_DMA);
717 if (unlikely(!tsoh))
718 return NULL;
719
720 tsoh->dma_addr = pci_map_single(tx_queue->efx->pci_dev,
721 TSOH_BUFFER(tsoh), header_len,
722 PCI_DMA_TODEVICE);
8d8bb39b
FT
723 if (unlikely(pci_dma_mapping_error(tx_queue->efx->pci_dev,
724 tsoh->dma_addr))) {
b9b39b62
BH
725 kfree(tsoh);
726 return NULL;
727 }
728
729 tsoh->unmap_len = header_len;
730 return tsoh;
731}
732
733static void
734efx_tsoh_heap_free(struct efx_tx_queue *tx_queue, struct efx_tso_header *tsoh)
735{
736 pci_unmap_single(tx_queue->efx->pci_dev,
737 tsoh->dma_addr, tsoh->unmap_len,
738 PCI_DMA_TODEVICE);
739 kfree(tsoh);
740}
741
742/**
743 * efx_tx_queue_insert - push descriptors onto the TX queue
744 * @tx_queue: Efx TX queue
745 * @dma_addr: DMA address of fragment
746 * @len: Length of fragment
ecbd95c1 747 * @final_buffer: The final buffer inserted into the queue
b9b39b62
BH
748 *
749 * Push descriptors onto the TX queue. Return 0 on success or 1 if
750 * @tx_queue full.
751 */
752static int efx_tx_queue_insert(struct efx_tx_queue *tx_queue,
753 dma_addr_t dma_addr, unsigned len,
ecbd95c1 754 struct efx_tx_buffer **final_buffer)
b9b39b62
BH
755{
756 struct efx_tx_buffer *buffer;
757 struct efx_nic *efx = tx_queue->efx;
63f19884 758 unsigned dma_len, fill_level, insert_ptr;
b9b39b62
BH
759 int q_space;
760
761 EFX_BUG_ON_PARANOID(len <= 0);
762
763 fill_level = tx_queue->insert_count - tx_queue->old_read_count;
764 /* -1 as there is no way to represent all descriptors used */
ecc910f5 765 q_space = efx->txq_entries - 1 - fill_level;
b9b39b62
BH
766
767 while (1) {
768 if (unlikely(q_space-- <= 0)) {
769 /* It might be that completions have happened
770 * since the xmit path last checked. Update
771 * the xmit path's copy of read_count.
772 */
773 ++tx_queue->stopped;
774 /* This memory barrier protects the change of
775 * stopped from the access of read_count. */
776 smp_mb();
777 tx_queue->old_read_count =
51c56f40 778 ACCESS_ONCE(tx_queue->read_count);
b9b39b62
BH
779 fill_level = (tx_queue->insert_count
780 - tx_queue->old_read_count);
ecc910f5 781 q_space = efx->txq_entries - 1 - fill_level;
ecbd95c1
BH
782 if (unlikely(q_space-- <= 0)) {
783 *final_buffer = NULL;
b9b39b62 784 return 1;
ecbd95c1 785 }
b9b39b62
BH
786 smp_mb();
787 --tx_queue->stopped;
788 }
789
ecc910f5 790 insert_ptr = tx_queue->insert_count & tx_queue->ptr_mask;
b9b39b62
BH
791 buffer = &tx_queue->buffer[insert_ptr];
792 ++tx_queue->insert_count;
793
794 EFX_BUG_ON_PARANOID(tx_queue->insert_count -
ecc910f5
SH
795 tx_queue->read_count >=
796 efx->txq_entries);
b9b39b62
BH
797
798 efx_tsoh_free(tx_queue, buffer);
799 EFX_BUG_ON_PARANOID(buffer->len);
800 EFX_BUG_ON_PARANOID(buffer->unmap_len);
801 EFX_BUG_ON_PARANOID(buffer->skb);
dc8cfa55 802 EFX_BUG_ON_PARANOID(!buffer->continuation);
b9b39b62
BH
803 EFX_BUG_ON_PARANOID(buffer->tsoh);
804
805 buffer->dma_addr = dma_addr;
806
63f19884 807 dma_len = efx_max_tx_len(efx, dma_addr);
b9b39b62
BH
808
809 /* If there is enough space to send then do so */
810 if (dma_len >= len)
811 break;
812
813 buffer->len = dma_len; /* Don't set the other members */
814 dma_addr += dma_len;
815 len -= dma_len;
816 }
817
818 EFX_BUG_ON_PARANOID(!len);
819 buffer->len = len;
ecbd95c1 820 *final_buffer = buffer;
b9b39b62
BH
821 return 0;
822}
823
824
825/*
826 * Put a TSO header into the TX queue.
827 *
828 * This is special-cased because we know that it is small enough to fit in
829 * a single fragment, and we know it doesn't cross a page boundary. It
830 * also allows us to not worry about end-of-packet etc.
831 */
4d566063
BH
832static void efx_tso_put_header(struct efx_tx_queue *tx_queue,
833 struct efx_tso_header *tsoh, unsigned len)
b9b39b62
BH
834{
835 struct efx_tx_buffer *buffer;
836
ecc910f5 837 buffer = &tx_queue->buffer[tx_queue->insert_count & tx_queue->ptr_mask];
b9b39b62
BH
838 efx_tsoh_free(tx_queue, buffer);
839 EFX_BUG_ON_PARANOID(buffer->len);
840 EFX_BUG_ON_PARANOID(buffer->unmap_len);
841 EFX_BUG_ON_PARANOID(buffer->skb);
dc8cfa55 842 EFX_BUG_ON_PARANOID(!buffer->continuation);
b9b39b62
BH
843 EFX_BUG_ON_PARANOID(buffer->tsoh);
844 buffer->len = len;
845 buffer->dma_addr = tsoh->dma_addr;
846 buffer->tsoh = tsoh;
847
848 ++tx_queue->insert_count;
849}
850
851
852/* Remove descriptors put into a tx_queue. */
853static void efx_enqueue_unwind(struct efx_tx_queue *tx_queue)
854{
855 struct efx_tx_buffer *buffer;
cc12dac2 856 dma_addr_t unmap_addr;
b9b39b62
BH
857
858 /* Work backwards until we hit the original insert pointer value */
859 while (tx_queue->insert_count != tx_queue->write_count) {
860 --tx_queue->insert_count;
861 buffer = &tx_queue->buffer[tx_queue->insert_count &
ecc910f5 862 tx_queue->ptr_mask];
b9b39b62
BH
863 efx_tsoh_free(tx_queue, buffer);
864 EFX_BUG_ON_PARANOID(buffer->skb);
b9b39b62 865 if (buffer->unmap_len) {
cc12dac2
BH
866 unmap_addr = (buffer->dma_addr + buffer->len -
867 buffer->unmap_len);
ecbd95c1
BH
868 if (buffer->unmap_single)
869 pci_unmap_single(tx_queue->efx->pci_dev,
cc12dac2 870 unmap_addr, buffer->unmap_len,
ecbd95c1
BH
871 PCI_DMA_TODEVICE);
872 else
873 pci_unmap_page(tx_queue->efx->pci_dev,
cc12dac2 874 unmap_addr, buffer->unmap_len,
ecbd95c1 875 PCI_DMA_TODEVICE);
b9b39b62
BH
876 buffer->unmap_len = 0;
877 }
a7ebd27a
NT
878 buffer->len = 0;
879 buffer->continuation = true;
b9b39b62
BH
880 }
881}
882
883
884/* Parse the SKB header and initialise state. */
4d566063 885static void tso_start(struct tso_state *st, const struct sk_buff *skb)
b9b39b62
BH
886{
887 /* All ethernet/IP/TCP headers combined size is TCP header size
888 * plus offset of TCP header relative to start of packet.
889 */
23d9e60b
BH
890 st->header_len = ((tcp_hdr(skb)->doff << 2u)
891 + PTR_DIFF(tcp_hdr(skb), skb->data));
892 st->full_packet_size = st->header_len + skb_shinfo(skb)->gso_size;
b9b39b62 893
738a8f4b
BH
894 if (st->protocol == htons(ETH_P_IP))
895 st->ipv4_id = ntohs(ip_hdr(skb)->id);
896 else
897 st->ipv4_id = 0;
b9b39b62
BH
898 st->seqnum = ntohl(tcp_hdr(skb)->seq);
899
900 EFX_BUG_ON_PARANOID(tcp_hdr(skb)->urg);
901 EFX_BUG_ON_PARANOID(tcp_hdr(skb)->syn);
902 EFX_BUG_ON_PARANOID(tcp_hdr(skb)->rst);
903
23d9e60b
BH
904 st->packet_space = st->full_packet_size;
905 st->out_len = skb->len - st->header_len;
906 st->unmap_len = 0;
907 st->unmap_single = false;
b9b39b62
BH
908}
909
4d566063
BH
910static int tso_get_fragment(struct tso_state *st, struct efx_nic *efx,
911 skb_frag_t *frag)
b9b39b62 912{
23d9e60b
BH
913 st->unmap_addr = pci_map_page(efx->pci_dev, frag->page,
914 frag->page_offset, frag->size,
915 PCI_DMA_TODEVICE);
916 if (likely(!pci_dma_mapping_error(efx->pci_dev, st->unmap_addr))) {
917 st->unmap_single = false;
918 st->unmap_len = frag->size;
919 st->in_len = frag->size;
920 st->dma_addr = st->unmap_addr;
ecbd95c1
BH
921 return 0;
922 }
923 return -ENOMEM;
924}
925
4d566063
BH
926static int tso_get_head_fragment(struct tso_state *st, struct efx_nic *efx,
927 const struct sk_buff *skb)
ecbd95c1 928{
23d9e60b 929 int hl = st->header_len;
ecbd95c1 930 int len = skb_headlen(skb) - hl;
b9b39b62 931
23d9e60b
BH
932 st->unmap_addr = pci_map_single(efx->pci_dev, skb->data + hl,
933 len, PCI_DMA_TODEVICE);
934 if (likely(!pci_dma_mapping_error(efx->pci_dev, st->unmap_addr))) {
935 st->unmap_single = true;
936 st->unmap_len = len;
937 st->in_len = len;
938 st->dma_addr = st->unmap_addr;
b9b39b62
BH
939 return 0;
940 }
941 return -ENOMEM;
942}
943
944
945/**
946 * tso_fill_packet_with_fragment - form descriptors for the current fragment
947 * @tx_queue: Efx TX queue
948 * @skb: Socket buffer
949 * @st: TSO state
950 *
951 * Form descriptors for the current fragment, until we reach the end
952 * of fragment or end-of-packet. Return 0 on success, 1 if not enough
953 * space in @tx_queue.
954 */
4d566063
BH
955static int tso_fill_packet_with_fragment(struct efx_tx_queue *tx_queue,
956 const struct sk_buff *skb,
957 struct tso_state *st)
b9b39b62 958{
ecbd95c1 959 struct efx_tx_buffer *buffer;
b9b39b62
BH
960 int n, end_of_packet, rc;
961
23d9e60b 962 if (st->in_len == 0)
b9b39b62
BH
963 return 0;
964 if (st->packet_space == 0)
965 return 0;
966
23d9e60b 967 EFX_BUG_ON_PARANOID(st->in_len <= 0);
b9b39b62
BH
968 EFX_BUG_ON_PARANOID(st->packet_space <= 0);
969
23d9e60b 970 n = min(st->in_len, st->packet_space);
b9b39b62
BH
971
972 st->packet_space -= n;
23d9e60b
BH
973 st->out_len -= n;
974 st->in_len -= n;
b9b39b62 975
23d9e60b 976 rc = efx_tx_queue_insert(tx_queue, st->dma_addr, n, &buffer);
ecbd95c1 977 if (likely(rc == 0)) {
23d9e60b 978 if (st->out_len == 0)
ecbd95c1
BH
979 /* Transfer ownership of the skb */
980 buffer->skb = skb;
b9b39b62 981
23d9e60b 982 end_of_packet = st->out_len == 0 || st->packet_space == 0;
ecbd95c1 983 buffer->continuation = !end_of_packet;
b9b39b62 984
23d9e60b 985 if (st->in_len == 0) {
ecbd95c1 986 /* Transfer ownership of the pci mapping */
23d9e60b
BH
987 buffer->unmap_len = st->unmap_len;
988 buffer->unmap_single = st->unmap_single;
989 st->unmap_len = 0;
ecbd95c1
BH
990 }
991 }
992
23d9e60b 993 st->dma_addr += n;
b9b39b62
BH
994 return rc;
995}
996
997
998/**
999 * tso_start_new_packet - generate a new header and prepare for the new packet
1000 * @tx_queue: Efx TX queue
1001 * @skb: Socket buffer
1002 * @st: TSO state
1003 *
1004 * Generate a new header and prepare for the new packet. Return 0 on
1005 * success, or -1 if failed to alloc header.
1006 */
4d566063
BH
1007static int tso_start_new_packet(struct efx_tx_queue *tx_queue,
1008 const struct sk_buff *skb,
1009 struct tso_state *st)
b9b39b62
BH
1010{
1011 struct efx_tso_header *tsoh;
b9b39b62
BH
1012 struct tcphdr *tsoh_th;
1013 unsigned ip_length;
1014 u8 *header;
1015
1016 /* Allocate a DMA-mapped header buffer. */
23d9e60b 1017 if (likely(TSOH_SIZE(st->header_len) <= TSOH_STD_SIZE)) {
b3475645 1018 if (tx_queue->tso_headers_free == NULL) {
b9b39b62
BH
1019 if (efx_tsoh_block_alloc(tx_queue))
1020 return -1;
b3475645 1021 }
b9b39b62
BH
1022 EFX_BUG_ON_PARANOID(!tx_queue->tso_headers_free);
1023 tsoh = tx_queue->tso_headers_free;
1024 tx_queue->tso_headers_free = tsoh->next;
1025 tsoh->unmap_len = 0;
1026 } else {
1027 tx_queue->tso_long_headers++;
23d9e60b 1028 tsoh = efx_tsoh_heap_alloc(tx_queue, st->header_len);
b9b39b62
BH
1029 if (unlikely(!tsoh))
1030 return -1;
1031 }
1032
1033 header = TSOH_BUFFER(tsoh);
1034 tsoh_th = (struct tcphdr *)(header + SKB_TCP_OFF(skb));
b9b39b62
BH
1035
1036 /* Copy and update the headers. */
23d9e60b 1037 memcpy(header, skb->data, st->header_len);
b9b39b62
BH
1038
1039 tsoh_th->seq = htonl(st->seqnum);
1040 st->seqnum += skb_shinfo(skb)->gso_size;
23d9e60b 1041 if (st->out_len > skb_shinfo(skb)->gso_size) {
b9b39b62 1042 /* This packet will not finish the TSO burst. */
23d9e60b 1043 ip_length = st->full_packet_size - ETH_HDR_LEN(skb);
b9b39b62
BH
1044 tsoh_th->fin = 0;
1045 tsoh_th->psh = 0;
1046 } else {
1047 /* This packet will be the last in the TSO burst. */
23d9e60b 1048 ip_length = st->header_len - ETH_HDR_LEN(skb) + st->out_len;
b9b39b62
BH
1049 tsoh_th->fin = tcp_hdr(skb)->fin;
1050 tsoh_th->psh = tcp_hdr(skb)->psh;
1051 }
b9b39b62 1052
738a8f4b
BH
1053 if (st->protocol == htons(ETH_P_IP)) {
1054 struct iphdr *tsoh_iph =
1055 (struct iphdr *)(header + SKB_IPV4_OFF(skb));
1056
1057 tsoh_iph->tot_len = htons(ip_length);
1058
1059 /* Linux leaves suitable gaps in the IP ID space for us to fill. */
1060 tsoh_iph->id = htons(st->ipv4_id);
1061 st->ipv4_id++;
1062 } else {
1063 struct ipv6hdr *tsoh_iph =
1064 (struct ipv6hdr *)(header + SKB_IPV6_OFF(skb));
1065
1066 tsoh_iph->payload_len = htons(ip_length - sizeof(*tsoh_iph));
1067 }
b9b39b62
BH
1068
1069 st->packet_space = skb_shinfo(skb)->gso_size;
1070 ++tx_queue->tso_packets;
1071
1072 /* Form a descriptor for this header. */
23d9e60b 1073 efx_tso_put_header(tx_queue, tsoh, st->header_len);
b9b39b62
BH
1074
1075 return 0;
1076}
1077
1078
1079/**
1080 * efx_enqueue_skb_tso - segment and transmit a TSO socket buffer
1081 * @tx_queue: Efx TX queue
1082 * @skb: Socket buffer
1083 *
1084 * Context: You must hold netif_tx_lock() to call this function.
1085 *
1086 * Add socket buffer @skb to @tx_queue, doing TSO or return != 0 if
1087 * @skb was not enqueued. In all cases @skb is consumed. Return
1088 * %NETDEV_TX_OK or %NETDEV_TX_BUSY.
1089 */
1090static int efx_enqueue_skb_tso(struct efx_tx_queue *tx_queue,
740847da 1091 struct sk_buff *skb)
b9b39b62 1092{
ecbd95c1 1093 struct efx_nic *efx = tx_queue->efx;
b9b39b62
BH
1094 int frag_i, rc, rc2 = NETDEV_TX_OK;
1095 struct tso_state state;
b9b39b62 1096
738a8f4b
BH
1097 /* Find the packet protocol and sanity-check it */
1098 state.protocol = efx_tso_check_protocol(skb);
b9b39b62
BH
1099
1100 EFX_BUG_ON_PARANOID(tx_queue->write_count != tx_queue->insert_count);
1101
1102 tso_start(&state, skb);
1103
1104 /* Assume that skb header area contains exactly the headers, and
1105 * all payload is in the frag list.
1106 */
23d9e60b 1107 if (skb_headlen(skb) == state.header_len) {
b9b39b62
BH
1108 /* Grab the first payload fragment. */
1109 EFX_BUG_ON_PARANOID(skb_shinfo(skb)->nr_frags < 1);
1110 frag_i = 0;
ecbd95c1
BH
1111 rc = tso_get_fragment(&state, efx,
1112 skb_shinfo(skb)->frags + frag_i);
b9b39b62
BH
1113 if (rc)
1114 goto mem_err;
1115 } else {
ecbd95c1 1116 rc = tso_get_head_fragment(&state, efx, skb);
b9b39b62
BH
1117 if (rc)
1118 goto mem_err;
1119 frag_i = -1;
1120 }
1121
1122 if (tso_start_new_packet(tx_queue, skb, &state) < 0)
1123 goto mem_err;
1124
1125 while (1) {
1126 rc = tso_fill_packet_with_fragment(tx_queue, skb, &state);
1127 if (unlikely(rc))
1128 goto stop;
1129
1130 /* Move onto the next fragment? */
23d9e60b 1131 if (state.in_len == 0) {
b9b39b62
BH
1132 if (++frag_i >= skb_shinfo(skb)->nr_frags)
1133 /* End of payload reached. */
1134 break;
ecbd95c1
BH
1135 rc = tso_get_fragment(&state, efx,
1136 skb_shinfo(skb)->frags + frag_i);
b9b39b62
BH
1137 if (rc)
1138 goto mem_err;
1139 }
1140
1141 /* Start at new packet? */
1142 if (state.packet_space == 0 &&
1143 tso_start_new_packet(tx_queue, skb, &state) < 0)
1144 goto mem_err;
1145 }
1146
1147 /* Pass off to hardware */
152b6a62 1148 efx_nic_push_buffers(tx_queue);
b9b39b62
BH
1149
1150 tx_queue->tso_bursts++;
1151 return NETDEV_TX_OK;
1152
1153 mem_err:
62776d03
BH
1154 netif_err(efx, tx_err, efx->net_dev,
1155 "Out of memory for TSO headers, or PCI mapping error\n");
9bc183d7 1156 dev_kfree_skb_any(skb);
b9b39b62
BH
1157 goto unwind;
1158
1159 stop:
1160 rc2 = NETDEV_TX_BUSY;
1161
1162 /* Stop the queue if it wasn't stopped before. */
1163 if (tx_queue->stopped == 1)
a4900ac9 1164 efx_stop_queue(tx_queue->channel);
b9b39b62
BH
1165
1166 unwind:
5988b63a 1167 /* Free the DMA mapping we were in the process of writing out */
23d9e60b
BH
1168 if (state.unmap_len) {
1169 if (state.unmap_single)
1170 pci_unmap_single(efx->pci_dev, state.unmap_addr,
1171 state.unmap_len, PCI_DMA_TODEVICE);
ecbd95c1 1172 else
23d9e60b
BH
1173 pci_unmap_page(efx->pci_dev, state.unmap_addr,
1174 state.unmap_len, PCI_DMA_TODEVICE);
ecbd95c1 1175 }
5988b63a 1176
b9b39b62
BH
1177 efx_enqueue_unwind(tx_queue);
1178 return rc2;
1179}
1180
1181
1182/*
1183 * Free up all TSO datastructures associated with tx_queue. This
1184 * routine should be called only once the tx_queue is both empty and
1185 * will no longer be used.
1186 */
1187static void efx_fini_tso(struct efx_tx_queue *tx_queue)
1188{
1189 unsigned i;
1190
b3475645 1191 if (tx_queue->buffer) {
ecc910f5 1192 for (i = 0; i <= tx_queue->ptr_mask; ++i)
b9b39b62 1193 efx_tsoh_free(tx_queue, &tx_queue->buffer[i]);
b3475645 1194 }
b9b39b62
BH
1195
1196 while (tx_queue->tso_headers_free != NULL)
1197 efx_tsoh_block_free(tx_queue, tx_queue->tso_headers_free,
1198 tx_queue->efx->pci_dev);
1199}