blob: 6bd7d6e84b8e0c3a76af87911ccb3a8ad939940e [file] [log] [blame]
Paul Durrant3254f832016-10-04 10:29:12 +01001/*
2 * Copyright (c) 2016 Citrix Systems Inc.
3 * Copyright (c) 2002-2005, K A Fraser
4 *
5 * This program is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU General Public License version 2
7 * as published by the Free Software Foundation; or, when distributed
8 * separately from the Linux kernel or incorporated into other
9 * software packages, subject to the following license:
10 *
11 * Permission is hereby granted, free of charge, to any person obtaining a copy
12 * of this source file (the "Software"), to deal in the Software without
13 * restriction, including without limitation the rights to use, copy, modify,
14 * merge, publish, distribute, sublicense, and/or sell copies of the Software,
15 * and to permit persons to whom the Software is furnished to do so, subject to
16 * the following conditions:
17 *
18 * The above copyright notice and this permission notice shall be included in
19 * all copies or substantial portions of the Software.
20 *
21 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
22 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
23 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
24 * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
25 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
26 * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
27 * IN THE SOFTWARE.
28 */
29
30#include "common.h"
31
32#include <linux/kthread.h>
33
34#include <xen/xen.h>
35#include <xen/events.h>
36
37static bool xenvif_rx_ring_slots_available(struct xenvif_queue *queue)
38{
39 RING_IDX prod, cons;
40 struct sk_buff *skb;
41 int needed;
42
43 skb = skb_peek(&queue->rx_queue);
44 if (!skb)
45 return false;
46
47 needed = DIV_ROUND_UP(skb->len, XEN_PAGE_SIZE);
48 if (skb_is_gso(skb))
49 needed++;
50 if (skb->sw_hash)
51 needed++;
52
53 do {
54 prod = queue->rx.sring->req_prod;
55 cons = queue->rx.req_cons;
56
57 if (prod - cons >= needed)
58 return true;
59
60 queue->rx.sring->req_event = prod + 1;
61
62 /* Make sure event is visible before we check prod
63 * again.
64 */
65 mb();
66 } while (queue->rx.sring->req_prod != prod);
67
68 return false;
69}
70
71void xenvif_rx_queue_tail(struct xenvif_queue *queue, struct sk_buff *skb)
72{
73 unsigned long flags;
74
75 spin_lock_irqsave(&queue->rx_queue.lock, flags);
76
77 __skb_queue_tail(&queue->rx_queue, skb);
78
79 queue->rx_queue_len += skb->len;
80 if (queue->rx_queue_len > queue->rx_queue_max) {
81 struct net_device *dev = queue->vif->dev;
82
83 netif_tx_stop_queue(netdev_get_tx_queue(dev, queue->id));
84 }
85
86 spin_unlock_irqrestore(&queue->rx_queue.lock, flags);
87}
88
89static struct sk_buff *xenvif_rx_dequeue(struct xenvif_queue *queue)
90{
91 struct sk_buff *skb;
92
93 spin_lock_irq(&queue->rx_queue.lock);
94
95 skb = __skb_dequeue(&queue->rx_queue);
96 if (skb)
97 queue->rx_queue_len -= skb->len;
98
99 spin_unlock_irq(&queue->rx_queue.lock);
100
101 return skb;
102}
103
104static void xenvif_rx_queue_maybe_wake(struct xenvif_queue *queue)
105{
106 spin_lock_irq(&queue->rx_queue.lock);
107
108 if (queue->rx_queue_len < queue->rx_queue_max) {
109 struct net_device *dev = queue->vif->dev;
110
111 netif_tx_wake_queue(netdev_get_tx_queue(dev, queue->id));
112 }
113
114 spin_unlock_irq(&queue->rx_queue.lock);
115}
116
117static void xenvif_rx_queue_purge(struct xenvif_queue *queue)
118{
119 struct sk_buff *skb;
120
121 while ((skb = xenvif_rx_dequeue(queue)) != NULL)
122 kfree_skb(skb);
123}
124
125static void xenvif_rx_queue_drop_expired(struct xenvif_queue *queue)
126{
127 struct sk_buff *skb;
128
129 for (;;) {
130 skb = skb_peek(&queue->rx_queue);
131 if (!skb)
132 break;
133 if (time_before(jiffies, XENVIF_RX_CB(skb)->expires))
134 break;
135 xenvif_rx_dequeue(queue);
136 kfree_skb(skb);
137 }
138}
139
140struct netrx_pending_operations {
141 unsigned int copy_prod, copy_cons;
142 unsigned int meta_prod, meta_cons;
143 struct gnttab_copy *copy;
144 struct xenvif_rx_meta *meta;
145 int copy_off;
146 grant_ref_t copy_gref;
147};
148
149static struct xenvif_rx_meta *get_next_rx_buffer(
150 struct xenvif_queue *queue,
151 struct netrx_pending_operations *npo)
152{
153 struct xenvif_rx_meta *meta;
154 struct xen_netif_rx_request req;
155
156 RING_COPY_REQUEST(&queue->rx, queue->rx.req_cons++, &req);
157
158 meta = npo->meta + npo->meta_prod++;
159 meta->gso_type = XEN_NETIF_GSO_TYPE_NONE;
160 meta->gso_size = 0;
161 meta->size = 0;
162 meta->id = req.id;
163
164 npo->copy_off = 0;
165 npo->copy_gref = req.gref;
166
167 return meta;
168}
169
170struct gop_frag_copy {
171 struct xenvif_queue *queue;
172 struct netrx_pending_operations *npo;
173 struct xenvif_rx_meta *meta;
174 int head;
175 int gso_type;
176 int protocol;
177 int hash_present;
178
179 struct page *page;
180};
181
182static void xenvif_setup_copy_gop(unsigned long gfn,
183 unsigned int offset,
184 unsigned int *len,
185 struct gop_frag_copy *info)
186{
187 struct gnttab_copy *copy_gop;
188 struct xen_page_foreign *foreign;
189 /* Convenient aliases */
190 struct xenvif_queue *queue = info->queue;
191 struct netrx_pending_operations *npo = info->npo;
192 struct page *page = info->page;
193
194 WARN_ON(npo->copy_off > MAX_BUFFER_OFFSET);
195
196 if (npo->copy_off == MAX_BUFFER_OFFSET)
197 info->meta = get_next_rx_buffer(queue, npo);
198
199 if (npo->copy_off + *len > MAX_BUFFER_OFFSET)
200 *len = MAX_BUFFER_OFFSET - npo->copy_off;
201
202 copy_gop = npo->copy + npo->copy_prod++;
203 copy_gop->flags = GNTCOPY_dest_gref;
204 copy_gop->len = *len;
205
206 foreign = xen_page_foreign(page);
207 if (foreign) {
208 copy_gop->source.domid = foreign->domid;
209 copy_gop->source.u.ref = foreign->gref;
210 copy_gop->flags |= GNTCOPY_source_gref;
211 } else {
212 copy_gop->source.domid = DOMID_SELF;
213 copy_gop->source.u.gmfn = gfn;
214 }
215 copy_gop->source.offset = offset;
216
217 copy_gop->dest.domid = queue->vif->domid;
218 copy_gop->dest.offset = npo->copy_off;
219 copy_gop->dest.u.ref = npo->copy_gref;
220
221 npo->copy_off += *len;
222 info->meta->size += *len;
223
224 if (!info->head)
225 return;
226
227 /* Leave a gap for the GSO descriptor. */
228 if ((1 << info->gso_type) & queue->vif->gso_mask)
229 queue->rx.req_cons++;
230
231 /* Leave a gap for the hash extra segment. */
232 if (info->hash_present)
233 queue->rx.req_cons++;
234
235 info->head = 0; /* There must be something in this buffer now */
236}
237
238static void xenvif_gop_frag_copy_grant(unsigned long gfn,
239 unsigned int offset,
240 unsigned int len,
241 void *data)
242{
243 unsigned int bytes;
244
245 while (len) {
246 bytes = len;
247 xenvif_setup_copy_gop(gfn, offset, &bytes, data);
248 offset += bytes;
249 len -= bytes;
250 }
251}
252
253/* Set up the grant operations for this fragment. If it's a flipping
254 * interface, we also set up the unmap request from here.
255 */
256static void xenvif_gop_frag_copy(struct xenvif_queue *queue,
257 struct sk_buff *skb,
258 struct netrx_pending_operations *npo,
259 struct page *page, unsigned long size,
260 unsigned long offset, int *head)
261{
262 struct gop_frag_copy info = {
263 .queue = queue,
264 .npo = npo,
265 .head = *head,
266 .gso_type = XEN_NETIF_GSO_TYPE_NONE,
267 /* xenvif_set_skb_hash() will have either set a s/w
268 * hash or cleared the hash depending on
269 * whether the the frontend wants a hash for this skb.
270 */
271 .hash_present = skb->sw_hash,
272 };
273 unsigned long bytes;
274
275 if (skb_is_gso(skb)) {
276 if (skb_shinfo(skb)->gso_type & SKB_GSO_TCPV4)
277 info.gso_type = XEN_NETIF_GSO_TYPE_TCPV4;
278 else if (skb_shinfo(skb)->gso_type & SKB_GSO_TCPV6)
279 info.gso_type = XEN_NETIF_GSO_TYPE_TCPV6;
280 }
281
282 /* Data must not cross a page boundary. */
283 WARN_ON(size + offset > (PAGE_SIZE << compound_order(page)));
284
285 info.meta = npo->meta + npo->meta_prod - 1;
286
287 /* Skip unused frames from start of page */
288 page += offset >> PAGE_SHIFT;
289 offset &= ~PAGE_MASK;
290
291 while (size > 0) {
292 WARN_ON(offset >= PAGE_SIZE);
293
294 bytes = PAGE_SIZE - offset;
295 if (bytes > size)
296 bytes = size;
297
298 info.page = page;
299 gnttab_foreach_grant_in_range(page, offset, bytes,
300 xenvif_gop_frag_copy_grant,
301 &info);
302 size -= bytes;
303 offset = 0;
304
305 /* Next page */
306 if (size) {
307 WARN_ON(!PageCompound(page));
308 page++;
309 }
310 }
311
312 *head = info.head;
313}
314
315/* Prepare an SKB to be transmitted to the frontend.
316 *
317 * This function is responsible for allocating grant operations, meta
318 * structures, etc.
319 *
320 * It returns the number of meta structures consumed. The number of
321 * ring slots used is always equal to the number of meta slots used
322 * plus the number of GSO descriptors used. Currently, we use either
323 * zero GSO descriptors (for non-GSO packets) or one descriptor (for
324 * frontend-side LRO).
325 */
326static int xenvif_gop_skb(struct sk_buff *skb,
327 struct netrx_pending_operations *npo,
328 struct xenvif_queue *queue)
329{
330 struct xenvif *vif = netdev_priv(skb->dev);
331 int nr_frags = skb_shinfo(skb)->nr_frags;
332 int i;
333 struct xen_netif_rx_request req;
334 struct xenvif_rx_meta *meta;
335 unsigned char *data;
336 int head = 1;
337 int old_meta_prod;
338 int gso_type;
339
340 old_meta_prod = npo->meta_prod;
341
342 gso_type = XEN_NETIF_GSO_TYPE_NONE;
343 if (skb_is_gso(skb)) {
344 if (skb_shinfo(skb)->gso_type & SKB_GSO_TCPV4)
345 gso_type = XEN_NETIF_GSO_TYPE_TCPV4;
346 else if (skb_shinfo(skb)->gso_type & SKB_GSO_TCPV6)
347 gso_type = XEN_NETIF_GSO_TYPE_TCPV6;
348 }
349
Paul Durrant3254f832016-10-04 10:29:12 +0100350 RING_COPY_REQUEST(&queue->rx, queue->rx.req_cons++, &req);
351 meta = npo->meta + npo->meta_prod++;
352
353 if ((1 << gso_type) & vif->gso_mask) {
354 meta->gso_type = gso_type;
355 meta->gso_size = skb_shinfo(skb)->gso_size;
356 } else {
357 meta->gso_type = XEN_NETIF_GSO_TYPE_NONE;
358 meta->gso_size = 0;
359 }
360
361 meta->size = 0;
362 meta->id = req.id;
363 npo->copy_off = 0;
364 npo->copy_gref = req.gref;
365
366 data = skb->data;
367 while (data < skb_tail_pointer(skb)) {
368 unsigned int offset = offset_in_page(data);
369 unsigned int len = PAGE_SIZE - offset;
370
371 if (data + len > skb_tail_pointer(skb))
372 len = skb_tail_pointer(skb) - data;
373
374 xenvif_gop_frag_copy(queue, skb, npo,
375 virt_to_page(data), len, offset, &head);
376 data += len;
377 }
378
379 for (i = 0; i < nr_frags; i++) {
380 xenvif_gop_frag_copy(queue, skb, npo,
381 skb_frag_page(&skb_shinfo(skb)->frags[i]),
382 skb_frag_size(&skb_shinfo(skb)->frags[i]),
383 skb_shinfo(skb)->frags[i].page_offset,
384 &head);
385 }
386
387 return npo->meta_prod - old_meta_prod;
388}
389
390/* This is a twin to xenvif_gop_skb. Assume that xenvif_gop_skb was
391 * used to set up the operations on the top of
392 * netrx_pending_operations, which have since been done. Check that
393 * they didn't give any errors and advance over them.
394 */
395static int xenvif_check_gop(struct xenvif *vif, int nr_meta_slots,
396 struct netrx_pending_operations *npo)
397{
398 struct gnttab_copy *copy_op;
399 int status = XEN_NETIF_RSP_OKAY;
400 int i;
401
402 for (i = 0; i < nr_meta_slots; i++) {
403 copy_op = npo->copy + npo->copy_cons++;
404 if (copy_op->status != GNTST_okay) {
405 netdev_dbg(vif->dev,
406 "Bad status %d from copy to DOM%d.\n",
407 copy_op->status, vif->domid);
408 status = XEN_NETIF_RSP_ERROR;
409 }
410 }
411
412 return status;
413}
414
415static struct xen_netif_rx_response *make_rx_response(
416 struct xenvif_queue *queue, u16 id, s8 st, u16 offset, u16 size,
417 u16 flags)
418{
419 RING_IDX i = queue->rx.rsp_prod_pvt;
420 struct xen_netif_rx_response *resp;
421
422 resp = RING_GET_RESPONSE(&queue->rx, i);
423 resp->offset = offset;
424 resp->flags = flags;
425 resp->id = id;
426 resp->status = (s16)size;
427 if (st < 0)
428 resp->status = (s16)st;
429
430 queue->rx.rsp_prod_pvt = ++i;
431
432 return resp;
433}
434
435static void xenvif_add_frag_responses(struct xenvif_queue *queue,
436 int status,
437 struct xenvif_rx_meta *meta,
438 int nr_meta_slots)
439{
440 int i;
441 unsigned long offset;
442
443 /* No fragments used */
444 if (nr_meta_slots <= 1)
445 return;
446
447 nr_meta_slots--;
448
449 for (i = 0; i < nr_meta_slots; i++) {
450 int flags;
451
452 if (i == nr_meta_slots - 1)
453 flags = 0;
454 else
455 flags = XEN_NETRXF_more_data;
456
457 offset = 0;
458 make_rx_response(queue, meta[i].id, status, offset,
459 meta[i].size, flags);
460 }
461}
462
463static void xenvif_rx_action(struct xenvif_queue *queue)
464{
465 struct xenvif *vif = queue->vif;
466 s8 status;
467 u16 flags;
468 struct xen_netif_rx_response *resp;
469 struct sk_buff_head rxq;
470 struct sk_buff *skb;
471 LIST_HEAD(notify);
472 int ret;
473 unsigned long offset;
474 bool need_to_notify = false;
475
476 struct netrx_pending_operations npo = {
477 .copy = queue->grant_copy_op,
478 .meta = queue->meta,
479 };
480
481 skb_queue_head_init(&rxq);
482
483 while (xenvif_rx_ring_slots_available(queue) &&
484 (skb = xenvif_rx_dequeue(queue)) != NULL) {
485 queue->last_rx_time = jiffies;
486
487 XENVIF_RX_CB(skb)->meta_slots_used =
488 xenvif_gop_skb(skb, &npo, queue);
489
490 __skb_queue_tail(&rxq, skb);
491 }
492
493 WARN_ON(npo.meta_prod > ARRAY_SIZE(queue->meta));
494
495 if (!npo.copy_prod)
496 goto done;
497
498 WARN_ON(npo.copy_prod > MAX_GRANT_COPY_OPS);
499 gnttab_batch_copy(queue->grant_copy_op, npo.copy_prod);
500
501 while ((skb = __skb_dequeue(&rxq)) != NULL) {
502 struct xen_netif_extra_info *extra = NULL;
503
Paul Durrant3254f832016-10-04 10:29:12 +0100504 queue->stats.tx_bytes += skb->len;
505 queue->stats.tx_packets++;
506
507 status = xenvif_check_gop(vif,
508 XENVIF_RX_CB(skb)->meta_slots_used,
509 &npo);
510
511 if (XENVIF_RX_CB(skb)->meta_slots_used == 1)
512 flags = 0;
513 else
514 flags = XEN_NETRXF_more_data;
515
516 if (skb->ip_summed == CHECKSUM_PARTIAL) /* local packet? */
517 flags |= XEN_NETRXF_csum_blank |
518 XEN_NETRXF_data_validated;
519 else if (skb->ip_summed == CHECKSUM_UNNECESSARY)
520 /* remote but checksummed. */
521 flags |= XEN_NETRXF_data_validated;
522
523 offset = 0;
524 resp = make_rx_response(queue, queue->meta[npo.meta_cons].id,
525 status, offset,
526 queue->meta[npo.meta_cons].size,
527 flags);
528
529 if ((1 << queue->meta[npo.meta_cons].gso_type) &
530 vif->gso_mask) {
531 extra = (struct xen_netif_extra_info *)
532 RING_GET_RESPONSE(&queue->rx,
533 queue->rx.rsp_prod_pvt++);
534
535 resp->flags |= XEN_NETRXF_extra_info;
536
537 extra->u.gso.type = queue->meta[npo.meta_cons].gso_type;
538 extra->u.gso.size = queue->meta[npo.meta_cons].gso_size;
539 extra->u.gso.pad = 0;
540 extra->u.gso.features = 0;
541
542 extra->type = XEN_NETIF_EXTRA_TYPE_GSO;
543 extra->flags = 0;
544 }
545
546 if (skb->sw_hash) {
547 /* Since the skb got here via xenvif_select_queue()
548 * we know that the hash has been re-calculated
549 * according to a configuration set by the frontend
550 * and therefore we know that it is legitimate to
551 * pass it to the frontend.
552 */
553 if (resp->flags & XEN_NETRXF_extra_info)
554 extra->flags |= XEN_NETIF_EXTRA_FLAG_MORE;
555 else
556 resp->flags |= XEN_NETRXF_extra_info;
557
558 extra = (struct xen_netif_extra_info *)
559 RING_GET_RESPONSE(&queue->rx,
560 queue->rx.rsp_prod_pvt++);
561
562 extra->u.hash.algorithm =
563 XEN_NETIF_CTRL_HASH_ALGORITHM_TOEPLITZ;
564
565 if (skb->l4_hash)
566 extra->u.hash.type =
567 skb->protocol == htons(ETH_P_IP) ?
568 _XEN_NETIF_CTRL_HASH_TYPE_IPV4_TCP :
569 _XEN_NETIF_CTRL_HASH_TYPE_IPV6_TCP;
570 else
571 extra->u.hash.type =
572 skb->protocol == htons(ETH_P_IP) ?
573 _XEN_NETIF_CTRL_HASH_TYPE_IPV4 :
574 _XEN_NETIF_CTRL_HASH_TYPE_IPV6;
575
576 *(uint32_t *)extra->u.hash.value =
577 skb_get_hash_raw(skb);
578
579 extra->type = XEN_NETIF_EXTRA_TYPE_HASH;
580 extra->flags = 0;
581 }
582
583 xenvif_add_frag_responses(queue, status,
584 queue->meta + npo.meta_cons + 1,
585 XENVIF_RX_CB(skb)->meta_slots_used);
586
587 RING_PUSH_RESPONSES_AND_CHECK_NOTIFY(&queue->rx, ret);
588
589 need_to_notify |= !!ret;
590
591 npo.meta_cons += XENVIF_RX_CB(skb)->meta_slots_used;
592 dev_kfree_skb(skb);
593 }
594
595done:
596 if (need_to_notify)
597 notify_remote_via_irq(queue->rx_irq);
598}
599
600static bool xenvif_rx_queue_stalled(struct xenvif_queue *queue)
601{
602 RING_IDX prod, cons;
603
604 prod = queue->rx.sring->req_prod;
605 cons = queue->rx.req_cons;
606
607 return !queue->stalled &&
608 prod - cons < 1 &&
609 time_after(jiffies,
610 queue->last_rx_time + queue->vif->stall_timeout);
611}
612
613static bool xenvif_rx_queue_ready(struct xenvif_queue *queue)
614{
615 RING_IDX prod, cons;
616
617 prod = queue->rx.sring->req_prod;
618 cons = queue->rx.req_cons;
619
620 return queue->stalled && prod - cons >= 1;
621}
622
623static bool xenvif_have_rx_work(struct xenvif_queue *queue)
624{
625 return xenvif_rx_ring_slots_available(queue) ||
626 (queue->vif->stall_timeout &&
627 (xenvif_rx_queue_stalled(queue) ||
628 xenvif_rx_queue_ready(queue))) ||
629 kthread_should_stop() ||
630 queue->vif->disabled;
631}
632
633static long xenvif_rx_queue_timeout(struct xenvif_queue *queue)
634{
635 struct sk_buff *skb;
636 long timeout;
637
638 skb = skb_peek(&queue->rx_queue);
639 if (!skb)
640 return MAX_SCHEDULE_TIMEOUT;
641
642 timeout = XENVIF_RX_CB(skb)->expires - jiffies;
643 return timeout < 0 ? 0 : timeout;
644}
645
646/* Wait until the guest Rx thread has work.
647 *
648 * The timeout needs to be adjusted based on the current head of the
649 * queue (and not just the head at the beginning). In particular, if
650 * the queue is initially empty an infinite timeout is used and this
651 * needs to be reduced when a skb is queued.
652 *
653 * This cannot be done with wait_event_timeout() because it only
654 * calculates the timeout once.
655 */
656static void xenvif_wait_for_rx_work(struct xenvif_queue *queue)
657{
658 DEFINE_WAIT(wait);
659
660 if (xenvif_have_rx_work(queue))
661 return;
662
663 for (;;) {
664 long ret;
665
666 prepare_to_wait(&queue->wq, &wait, TASK_INTERRUPTIBLE);
667 if (xenvif_have_rx_work(queue))
668 break;
669 ret = schedule_timeout(xenvif_rx_queue_timeout(queue));
670 if (!ret)
671 break;
672 }
673 finish_wait(&queue->wq, &wait);
674}
675
676static void xenvif_queue_carrier_off(struct xenvif_queue *queue)
677{
678 struct xenvif *vif = queue->vif;
679
680 queue->stalled = true;
681
682 /* At least one queue has stalled? Disable the carrier. */
683 spin_lock(&vif->lock);
684 if (vif->stalled_queues++ == 0) {
685 netdev_info(vif->dev, "Guest Rx stalled");
686 netif_carrier_off(vif->dev);
687 }
688 spin_unlock(&vif->lock);
689}
690
691static void xenvif_queue_carrier_on(struct xenvif_queue *queue)
692{
693 struct xenvif *vif = queue->vif;
694
695 queue->last_rx_time = jiffies; /* Reset Rx stall detection. */
696 queue->stalled = false;
697
698 /* All queues are ready? Enable the carrier. */
699 spin_lock(&vif->lock);
700 if (--vif->stalled_queues == 0) {
701 netdev_info(vif->dev, "Guest Rx ready");
702 netif_carrier_on(vif->dev);
703 }
704 spin_unlock(&vif->lock);
705}
706
707int xenvif_kthread_guest_rx(void *data)
708{
709 struct xenvif_queue *queue = data;
710 struct xenvif *vif = queue->vif;
711
712 if (!vif->stall_timeout)
713 xenvif_queue_carrier_on(queue);
714
715 for (;;) {
716 xenvif_wait_for_rx_work(queue);
717
718 if (kthread_should_stop())
719 break;
720
721 /* This frontend is found to be rogue, disable it in
722 * kthread context. Currently this is only set when
723 * netback finds out frontend sends malformed packet,
724 * but we cannot disable the interface in softirq
725 * context so we defer it here, if this thread is
726 * associated with queue 0.
727 */
728 if (unlikely(vif->disabled && queue->id == 0)) {
729 xenvif_carrier_off(vif);
730 break;
731 }
732
733 if (!skb_queue_empty(&queue->rx_queue))
734 xenvif_rx_action(queue);
735
736 /* If the guest hasn't provided any Rx slots for a
737 * while it's probably not responsive, drop the
738 * carrier so packets are dropped earlier.
739 */
740 if (vif->stall_timeout) {
741 if (xenvif_rx_queue_stalled(queue))
742 xenvif_queue_carrier_off(queue);
743 else if (xenvif_rx_queue_ready(queue))
744 xenvif_queue_carrier_on(queue);
745 }
746
747 /* Queued packets may have foreign pages from other
748 * domains. These cannot be queued indefinitely as
749 * this would starve guests of grant refs and transmit
750 * slots.
751 */
752 xenvif_rx_queue_drop_expired(queue);
753
754 xenvif_rx_queue_maybe_wake(queue);
755
756 cond_resched();
757 }
758
759 /* Bin any remaining skbs */
760 xenvif_rx_queue_purge(queue);
761
762 return 0;
763}