fbdev: fbmem: Fix the implicit type casting
[linux-2.6-block.git] / drivers / hv / connection.c
CommitLineData
3b20eb23 1// SPDX-License-Identifier: GPL-2.0-only
3e7ee490
HJ
2/*
3 *
4 * Copyright (c) 2009, Microsoft Corporation.
5 *
3e7ee490
HJ
6 * Authors:
7 * Haiyang Zhang <haiyangz@microsoft.com>
8 * Hank Janssen <hjanssen@microsoft.com>
3e7ee490 9 */
0a46618d
HJ
10#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
11
a0086dc5 12#include <linux/kernel.h>
0c3b7b2f
S
13#include <linux/sched.h>
14#include <linux/wait.h>
5289d3d1 15#include <linux/delay.h>
a0086dc5 16#include <linux/mm.h>
931cccc9 17#include <linux/module.h>
5a0e3ad6 18#include <linux/slab.h>
a0086dc5 19#include <linux/vmalloc.h>
46a97191 20#include <linux/hyperv.h>
37f7278b 21#include <linux/export.h>
f2f136c0
TL
22#include <linux/io.h>
23#include <linux/set_memory.h>
fc53662f
VK
24#include <asm/mshyperv.h>
25
0f2a6619 26#include "hyperv_vmbus.h"
3e7ee490 27
3e7ee490 28
da9fcb72
HZ
29struct vmbus_connection vmbus_connection = {
30 .conn_state = DISCONNECTED,
8c2d5e06
APM
31 .unload_event = COMPLETION_INITIALIZER(
32 vmbus_connection.unload_event),
da9fcb72 33 .next_gpadl_handle = ATOMIC_INIT(0xE1E10),
b307b389 34
f850a4ca 35 .ready_for_suspend_event = COMPLETION_INITIALIZER(
b307b389 36 vmbus_connection.ready_for_suspend_event),
d8bd2d44
DC
37 .ready_for_resume_event = COMPLETION_INITIALIZER(
38 vmbus_connection.ready_for_resume_event),
3e7ee490 39};
95096f2f 40EXPORT_SYMBOL_GPL(vmbus_connection);
3e7ee490 41
37f7278b
S
42/*
43 * Negotiated protocol version with the host.
44 */
45__u32 vmbus_proto_version;
46EXPORT_SYMBOL_GPL(vmbus_proto_version);
47
bedc61a9
AP
48/*
49 * Table of VMBus versions listed from newest to oldest.
50 */
51static __u32 vmbus_versions[] = {
1df53d21 52 VERSION_WIN10_V5_3,
2d4f49b3
AP
53 VERSION_WIN10_V5_2,
54 VERSION_WIN10_V5_1,
bedc61a9 55 VERSION_WIN10_V5,
2d4f49b3 56 VERSION_WIN10_V4_1,
bedc61a9
AP
57 VERSION_WIN10,
58 VERSION_WIN8_1,
59 VERSION_WIN8,
60 VERSION_WIN7,
61 VERSION_WS2008
62};
610071c3 63
931cccc9
AP
64/*
65 * Maximal VMBus protocol version guests can negotiate. Useful to cap the
66 * VMBus version for testing and debugging purpose.
67 */
1df53d21 68static uint max_version = VERSION_WIN10_V5_3;
931cccc9
AP
69
70module_param(max_version, uint, S_IRUGO);
71MODULE_PARM_DESC(max_version,
72 "Maximal VMBus protocol version which can be negotiated");
73
f53335e3 74int vmbus_negotiate_version(struct vmbus_channel_msginfo *msginfo, u32 version)
610071c3
S
75{
76 int ret = 0;
77 struct vmbus_channel_initiate_contact *msg;
78 unsigned long flags;
610071c3
S
79
80 init_completion(&msginfo->waitevent);
81
82 msg = (struct vmbus_channel_initiate_contact *)msginfo->msg;
83
ae20b254 84 memset(msg, 0, sizeof(*msg));
610071c3
S
85 msg->header.msgtype = CHANNELMSG_INITIATE_CONTACT;
86 msg->vmbus_version_requested = version;
ae20b254
DC
87
88 /*
2d4f49b3
AP
89 * VMBus protocol 5.0 (VERSION_WIN10_V5) and higher require that we must
90 * use VMBUS_MESSAGE_CONNECTION_ID_4 for the Initiate Contact Message,
ae20b254
DC
91 * and for subsequent messages, we must use the Message Connection ID
92 * field in the host-returned Version Response Message. And, with
2d4f49b3
AP
93 * VERSION_WIN10_V5 and higher, we don't use msg->interrupt_page, but we
94 * tell the host explicitly that we still use VMBUS_MESSAGE_SINT(2) for
ae20b254
DC
95 * compatibility.
96 *
97 * On old hosts, we should always use VMBUS_MESSAGE_CONNECTION_ID (1).
98 */
99 if (version >= VERSION_WIN10_V5) {
100 msg->msg_sint = VMBUS_MESSAGE_SINT;
101 vmbus_connection.msg_conn_id = VMBUS_MESSAGE_CONNECTION_ID_4;
102 } else {
103 msg->interrupt_page = virt_to_phys(vmbus_connection.int_page);
104 vmbus_connection.msg_conn_id = VMBUS_MESSAGE_CONNECTION_ID;
105 }
106
f2f136c0
TL
107 msg->monitor_page1 = vmbus_connection.monitor_pages_pa[0];
108 msg->monitor_page2 = vmbus_connection.monitor_pages_pa[1];
109
8a857c55 110 msg->target_vcpu = hv_cpu_number_to_vp_number(VMBUS_CONNECT_CPU);
610071c3
S
111
112 /*
113 * Add to list before we send the request since we may
114 * receive the response before returning from this routine
115 */
116 spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
117 list_add_tail(&msginfo->msglistentry,
118 &vmbus_connection.chn_msg_list);
119
120 spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
121
122 ret = vmbus_post_msg(msg,
c0bb0392
VK
123 sizeof(struct vmbus_channel_initiate_contact),
124 true);
034ebf55
VK
125
126 trace_vmbus_negotiate_version(msg, ret);
127
610071c3
S
128 if (ret != 0) {
129 spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
130 list_del(&msginfo->msglistentry);
131 spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock,
132 flags);
133 return ret;
134 }
135
136 /* Wait for the connection response */
269f9794 137 wait_for_completion(&msginfo->waitevent);
610071c3
S
138
139 spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
140 list_del(&msginfo->msglistentry);
141 spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
142
143 /* Check if successful */
144 if (msginfo->response.version_response.version_supported) {
145 vmbus_connection.conn_state = CONNECTED;
ae20b254
DC
146
147 if (version >= VERSION_WIN10_V5)
148 vmbus_connection.msg_conn_id =
149 msginfo->response.version_response.msg_conn_id;
610071c3 150 } else {
610071c3
S
151 return -ECONNREFUSED;
152 }
153
154 return ret;
155}
156
3e189519 157/*
c6977677 158 * vmbus_connect - Sends a connect request on the partition service connection
fd8b85ea 159 */
c6977677 160int vmbus_connect(void)
3e7ee490 161{
15b2f647 162 struct vmbus_channel_msginfo *msginfo = NULL;
bedc61a9 163 int i, ret = 0;
610071c3 164 __u32 version;
3e7ee490 165
454f18a9 166 /* Initialize the vmbus connection */
da9fcb72
HZ
167 vmbus_connection.conn_state = CONNECTING;
168 vmbus_connection.work_queue = create_workqueue("hv_vmbus_con");
169 if (!vmbus_connection.work_queue) {
3a7546d9 170 ret = -ENOMEM;
b0043863 171 goto cleanup;
de65a384 172 }
3e7ee490 173
37c2578c
DC
174 vmbus_connection.handle_primary_chan_wq =
175 create_workqueue("hv_pri_chan");
176 if (!vmbus_connection.handle_primary_chan_wq) {
177 ret = -ENOMEM;
178 goto cleanup;
179 }
180
181 vmbus_connection.handle_sub_chan_wq =
182 create_workqueue("hv_sub_chan");
183 if (!vmbus_connection.handle_sub_chan_wq) {
184 ret = -ENOMEM;
185 goto cleanup;
186 }
187
da9fcb72 188 INIT_LIST_HEAD(&vmbus_connection.chn_msg_list);
15b2f647 189 spin_lock_init(&vmbus_connection.channelmsg_lock);
3e7ee490 190
da9fcb72 191 INIT_LIST_HEAD(&vmbus_connection.chn_list);
d6f591e3 192 mutex_init(&vmbus_connection.channel_mutex);
3e7ee490 193
454f18a9
BP
194 /*
195 * Setup the vmbus event connection for channel interrupt
196 * abstraction stuff
197 */
df3493e0 198 vmbus_connection.int_page =
53edce00 199 (void *)hv_alloc_hyperv_zeroed_page();
da9fcb72 200 if (vmbus_connection.int_page == NULL) {
3a7546d9 201 ret = -ENOMEM;
b0043863 202 goto cleanup;
3e7ee490
HJ
203 }
204
da9fcb72
HZ
205 vmbus_connection.recv_int_page = vmbus_connection.int_page;
206 vmbus_connection.send_int_page =
207 (void *)((unsigned long)vmbus_connection.int_page +
53edce00 208 (HV_HYP_PAGE_SIZE >> 1));
3e7ee490 209
fd8b85ea
GKH
210 /*
211 * Setup the monitor notification facility. The 1st page for
212 * parent->child and the 2nd page for child->parent
454f18a9 213 */
53edce00
HP
214 vmbus_connection.monitor_pages[0] = (void *)hv_alloc_hyperv_zeroed_page();
215 vmbus_connection.monitor_pages[1] = (void *)hv_alloc_hyperv_zeroed_page();
8681db44
GKH
216 if ((vmbus_connection.monitor_pages[0] == NULL) ||
217 (vmbus_connection.monitor_pages[1] == NULL)) {
3a7546d9 218 ret = -ENOMEM;
b0043863 219 goto cleanup;
3e7ee490
HJ
220 }
221
f2f136c0
TL
222 vmbus_connection.monitor_pages_original[0]
223 = vmbus_connection.monitor_pages[0];
224 vmbus_connection.monitor_pages_original[1]
225 = vmbus_connection.monitor_pages[1];
226 vmbus_connection.monitor_pages_pa[0]
227 = virt_to_phys(vmbus_connection.monitor_pages[0]);
228 vmbus_connection.monitor_pages_pa[1]
229 = virt_to_phys(vmbus_connection.monitor_pages[1]);
230
231 if (hv_is_isolation_supported()) {
232 ret = set_memory_decrypted((unsigned long)
233 vmbus_connection.monitor_pages[0],
234 1);
235 ret |= set_memory_decrypted((unsigned long)
236 vmbus_connection.monitor_pages[1],
237 1);
238 if (ret)
239 goto cleanup;
240
241 /*
242 * Isolation VM with AMD SNP needs to access monitor page via
243 * address space above shared gpa boundary.
244 */
245 if (hv_isolation_type_snp()) {
246 vmbus_connection.monitor_pages_pa[0] +=
247 ms_hyperv.shared_gpa_boundary;
248 vmbus_connection.monitor_pages_pa[1] +=
249 ms_hyperv.shared_gpa_boundary;
250
251 vmbus_connection.monitor_pages[0]
252 = memremap(vmbus_connection.monitor_pages_pa[0],
253 HV_HYP_PAGE_SIZE,
254 MEMREMAP_WB);
255 if (!vmbus_connection.monitor_pages[0]) {
256 ret = -ENOMEM;
257 goto cleanup;
258 }
259
260 vmbus_connection.monitor_pages[1]
261 = memremap(vmbus_connection.monitor_pages_pa[1],
262 HV_HYP_PAGE_SIZE,
263 MEMREMAP_WB);
264 if (!vmbus_connection.monitor_pages[1]) {
265 ret = -ENOMEM;
266 goto cleanup;
267 }
268 }
269
270 /*
271 * Set memory host visibility hvcall smears memory
272 * and so zero monitor pages here.
273 */
274 memset(vmbus_connection.monitor_pages[0], 0x00,
275 HV_HYP_PAGE_SIZE);
276 memset(vmbus_connection.monitor_pages[1], 0x00,
277 HV_HYP_PAGE_SIZE);
278
279 }
280
15b2f647 281 msginfo = kzalloc(sizeof(*msginfo) +
fd8b85ea
GKH
282 sizeof(struct vmbus_channel_initiate_contact),
283 GFP_KERNEL);
15b2f647 284 if (msginfo == NULL) {
8cad0af9 285 ret = -ENOMEM;
b0043863 286 goto cleanup;
3e7ee490
HJ
287 }
288
454f18a9 289 /*
610071c3
S
290 * Negotiate a compatible VMBUS version number with the
291 * host. We start with the highest number we can support
292 * and work our way down until we negotiate a compatible
293 * version.
454f18a9 294 */
3e7ee490 295
bedc61a9 296 for (i = 0; ; i++) {
9de6655c
JC
297 if (i == ARRAY_SIZE(vmbus_versions)) {
298 ret = -EDOM;
bedc61a9 299 goto cleanup;
9de6655c 300 }
bedc61a9
AP
301
302 version = vmbus_versions[i];
931cccc9
AP
303 if (version > max_version)
304 continue;
3e7ee490 305
610071c3 306 ret = vmbus_negotiate_version(msginfo, version);
8bbf9f44 307 if (ret == -ETIMEDOUT)
666b9adc
S
308 goto cleanup;
309
310 if (vmbus_connection.conn_state == CONNECTED)
610071c3 311 break;
bedc61a9 312 }
3e7ee490 313
7ef4b2f0
APM
314 if (hv_is_isolation_supported() && version < VERSION_WIN10_V5_2) {
315 pr_err("Invalid VMBus version %d.%d (expected >= %d.%d) from the host supporting isolation\n",
316 version >> 16, version & 0xFFFF, VERSION_WIN10_V5_2 >> 16, VERSION_WIN10_V5_2 & 0xFFFF);
317 ret = -EINVAL;
318 goto cleanup;
319 }
320
37f7278b 321 vmbus_proto_version = version;
8de8af7e
S
322 pr_info("Vmbus version:%d.%d\n",
323 version >> 16, version & 0xFFFF);
3bacaf0c 324
8b6a877c
APM
325 vmbus_connection.channels = kcalloc(MAX_CHANNEL_RELIDS,
326 sizeof(struct vmbus_channel *),
327 GFP_KERNEL);
328 if (vmbus_connection.channels == NULL) {
329 ret = -ENOMEM;
330 goto cleanup;
331 }
332
15b2f647 333 kfree(msginfo);
3e7ee490
HJ
334 return 0;
335
b0043863 336cleanup:
3bacaf0c 337 pr_err("Unable to connect to host\n");
09a19628 338
da9fcb72 339 vmbus_connection.conn_state = DISCONNECTED;
09a19628
VK
340 vmbus_disconnect();
341
342 kfree(msginfo);
343
344 return ret;
345}
3e7ee490 346
09a19628
VK
347void vmbus_disconnect(void)
348{
2db84eff
S
349 /*
350 * First send the unload request to the host.
351 */
75ff3a8a 352 vmbus_initiate_unload(false);
2db84eff 353
37c2578c
DC
354 if (vmbus_connection.handle_sub_chan_wq)
355 destroy_workqueue(vmbus_connection.handle_sub_chan_wq);
356
357 if (vmbus_connection.handle_primary_chan_wq)
358 destroy_workqueue(vmbus_connection.handle_primary_chan_wq);
359
360 if (vmbus_connection.work_queue)
da9fcb72 361 destroy_workqueue(vmbus_connection.work_queue);
3e7ee490 362
da9fcb72 363 if (vmbus_connection.int_page) {
53edce00 364 hv_free_hyperv_page((unsigned long)vmbus_connection.int_page);
da9fcb72 365 vmbus_connection.int_page = NULL;
3e7ee490
HJ
366 }
367
f2f136c0
TL
368 if (hv_is_isolation_supported()) {
369 /*
370 * memunmap() checks input address is ioremap address or not
371 * inside. It doesn't unmap any thing in the non-SNP CVM and
372 * so not check CVM type here.
373 */
374 memunmap(vmbus_connection.monitor_pages[0]);
375 memunmap(vmbus_connection.monitor_pages[1]);
376
377 set_memory_encrypted((unsigned long)
378 vmbus_connection.monitor_pages_original[0],
379 1);
380 set_memory_encrypted((unsigned long)
381 vmbus_connection.monitor_pages_original[1],
382 1);
383 }
384
385 hv_free_hyperv_page((unsigned long)
386 vmbus_connection.monitor_pages_original[0]);
387 hv_free_hyperv_page((unsigned long)
388 vmbus_connection.monitor_pages_original[1]);
389 vmbus_connection.monitor_pages_original[0] =
390 vmbus_connection.monitor_pages[0] = NULL;
391 vmbus_connection.monitor_pages_original[1] =
392 vmbus_connection.monitor_pages[1] = NULL;
3e7ee490
HJ
393}
394
3e189519 395/*
c6977677
HZ
396 * relid2channel - Get the channel object given its
397 * child relative id (ie channel id)
fd8b85ea 398 */
d43e2fe7 399struct vmbus_channel *relid2channel(u32 relid)
3e7ee490 400{
8b6a877c
APM
401 if (WARN_ON(relid >= MAX_CHANNEL_RELIDS))
402 return NULL;
403 return READ_ONCE(vmbus_connection.channels[relid]);
3e7ee490
HJ
404}
405
3e189519 406/*
631e63a9 407 * vmbus_on_event - Process a channel event notification
ada6eb11
SH
408 *
409 * For batched channels (default) optimize host to guest signaling
410 * by ensuring:
411 * 1. While reading the channel, we disable interrupts from host.
412 * 2. Ensure that we process all posted messages from the host
413 * before returning from this callback.
414 * 3. Once we return, enable signaling from the host. Once this
415 * state is set we check to see if additional packets are
416 * available to read. In this case we repeat the process.
417 * If this tasklet has been running for a long time
418 * then reschedule ourselves.
fd8b85ea 419 */
631e63a9 420void vmbus_on_event(unsigned long data)
3e7ee490 421{
631e63a9 422 struct vmbus_channel *channel = (void *) data;
ada6eb11 423 unsigned long time_limit = jiffies + 2;
3e7ee490 424
991f8f1c
VK
425 trace_vmbus_on_event(channel);
426
af9ca6f9 427 hv_debug_delay_test(channel, INTERRUPT_DELAY);
ada6eb11
SH
428 do {
429 void (*callback_fn)(void *);
430
431 /* A channel once created is persistent even when
432 * there is no driver handling the device. An
433 * unloading driver sets the onchannel_callback to NULL.
f878f3d5 434 */
ada6eb11
SH
435 callback_fn = READ_ONCE(channel->onchannel_callback);
436 if (unlikely(callback_fn == NULL))
437 return;
f878f3d5 438
ada6eb11
SH
439 (*callback_fn)(channel->channel_callback_context);
440
441 if (channel->callback_mode != HV_CALL_BATCHED)
442 return;
443
444 if (likely(hv_end_read(&channel->inbound) == 0))
445 return;
446
447 hv_begin_read(&channel->inbound);
448 } while (likely(time_before(jiffies, time_limit)));
449
450 /* The time limit (2 jiffies) has been reached */
451 tasklet_schedule(&channel->callback_event);
3e7ee490
HJ
452}
453
3e189519 454/*
c6977677 455 * vmbus_post_msg - Send a msg on the vmbus's message connection
fd8b85ea 456 */
c0bb0392 457int vmbus_post_msg(void *buffer, size_t buflen, bool can_sleep)
3e7ee490 458{
ae20b254 459 struct vmbus_channel_message_header *hdr;
15b2f647 460 union hv_connection_id conn_id;
5289d3d1
S
461 int ret = 0;
462 int retries = 0;
8de0d7e9 463 u32 usec = 1;
3e7ee490 464
15b2f647 465 conn_id.asu32 = 0;
ae20b254 466 conn_id.u.id = vmbus_connection.msg_conn_id;
5289d3d1
S
467
468 /*
469 * hv_post_message() can have transient failures because of
470 * insufficient resources. Retry the operation a couple of
471 * times before giving up.
472 */
c0bb0392 473 while (retries < 100) {
fdeebcc6
S
474 ret = hv_post_message(conn_id, 1, buffer, buflen);
475
476 switch (ret) {
89f9f679 477 case HV_STATUS_INVALID_CONNECTION_ID:
ae20b254
DC
478 /*
479 * See vmbus_negotiate_version(): VMBus protocol 5.0
2d4f49b3 480 * and higher require that we must use
ae20b254
DC
481 * VMBUS_MESSAGE_CONNECTION_ID_4 for the Initiate
482 * Contact message, but on old hosts that only
483 * support VMBus protocol 4.0 or lower, here we get
484 * HV_STATUS_INVALID_CONNECTION_ID and we should
485 * return an error immediately without retrying.
486 */
89760937 487 hdr = buffer;
ae20b254
DC
488 if (hdr->msgtype == CHANNELMSG_INITIATE_CONTACT)
489 return -EINVAL;
89f9f679
DC
490 /*
491 * We could get this if we send messages too
492 * frequently.
493 */
494 ret = -EAGAIN;
495 break;
496 case HV_STATUS_INSUFFICIENT_MEMORY:
fdeebcc6 497 case HV_STATUS_INSUFFICIENT_BUFFERS:
48f4ccdf 498 ret = -ENOBUFS;
fdeebcc6
S
499 break;
500 case HV_STATUS_SUCCESS:
5289d3d1 501 return ret;
fdeebcc6
S
502 default:
503 pr_err("hv_post_msg() failed; error code:%d\n", ret);
504 return -EINVAL;
505 }
506
5289d3d1 507 retries++;
c0bb0392
VK
508 if (can_sleep && usec > 1000)
509 msleep(usec / 1000);
510 else if (usec < MAX_UDELAY_MS * 1000)
511 udelay(usec);
512 else
513 mdelay(usec / 1000);
514
e917a5e2 515 if (retries < 22)
8de0d7e9 516 usec *= 2;
5289d3d1
S
517 }
518 return ret;
3e7ee490
HJ
519}
520
3e189519 521/*
c6977677 522 * vmbus_set_event - Send an event notification to the parent
fd8b85ea 523 */
1b807e10 524void vmbus_set_event(struct vmbus_channel *channel)
3e7ee490 525{
21c3bef5 526 u32 child_relid = channel->offermsg.child_relid;
7c369f40 527
5c1bec61
SH
528 if (!channel->is_dedicated_interrupt)
529 vmbus_send_interrupt(child_relid);
3be77774 530
6981fbf3
SH
531 ++channel->sig_events;
532
20c89a55
TL
533 if (hv_isolation_type_snp())
534 hv_ghcb_hypercall(HVCALL_SIGNAL_EVENT, &channel->sig_event,
535 NULL, sizeof(channel->sig_event));
536 else
537 hv_do_fast_hypercall8(HVCALL_SIGNAL_EVENT, channel->sig_event);
3e7ee490 538}
5cc47247 539EXPORT_SYMBOL_GPL(vmbus_set_event);