Commit | Line | Data |
---|---|---|
3b20eb23 | 1 | // SPDX-License-Identifier: GPL-2.0-only |
3e7ee490 HJ |
2 | /* |
3 | * | |
4 | * Copyright (c) 2009, Microsoft Corporation. | |
5 | * | |
3e7ee490 HJ |
6 | * Authors: |
7 | * Haiyang Zhang <haiyangz@microsoft.com> | |
8 | * Hank Janssen <hjanssen@microsoft.com> | |
3e7ee490 | 9 | */ |
0a46618d HJ |
10 | #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt |
11 | ||
a0086dc5 | 12 | #include <linux/kernel.h> |
0c3b7b2f S |
13 | #include <linux/sched.h> |
14 | #include <linux/wait.h> | |
5289d3d1 | 15 | #include <linux/delay.h> |
a0086dc5 | 16 | #include <linux/mm.h> |
931cccc9 | 17 | #include <linux/module.h> |
5a0e3ad6 | 18 | #include <linux/slab.h> |
a0086dc5 | 19 | #include <linux/vmalloc.h> |
46a97191 | 20 | #include <linux/hyperv.h> |
37f7278b | 21 | #include <linux/export.h> |
f2f136c0 TL |
22 | #include <linux/io.h> |
23 | #include <linux/set_memory.h> | |
fc53662f VK |
24 | #include <asm/mshyperv.h> |
25 | ||
0f2a6619 | 26 | #include "hyperv_vmbus.h" |
3e7ee490 | 27 | |
3e7ee490 | 28 | |
da9fcb72 HZ |
29 | struct vmbus_connection vmbus_connection = { |
30 | .conn_state = DISCONNECTED, | |
8c2d5e06 APM |
31 | .unload_event = COMPLETION_INITIALIZER( |
32 | vmbus_connection.unload_event), | |
da9fcb72 | 33 | .next_gpadl_handle = ATOMIC_INIT(0xE1E10), |
b307b389 | 34 | |
f850a4ca | 35 | .ready_for_suspend_event = COMPLETION_INITIALIZER( |
b307b389 | 36 | vmbus_connection.ready_for_suspend_event), |
d8bd2d44 DC |
37 | .ready_for_resume_event = COMPLETION_INITIALIZER( |
38 | vmbus_connection.ready_for_resume_event), | |
3e7ee490 | 39 | }; |
95096f2f | 40 | EXPORT_SYMBOL_GPL(vmbus_connection); |
3e7ee490 | 41 | |
37f7278b S |
42 | /* |
43 | * Negotiated protocol version with the host. | |
44 | */ | |
45 | __u32 vmbus_proto_version; | |
46 | EXPORT_SYMBOL_GPL(vmbus_proto_version); | |
47 | ||
bedc61a9 AP |
48 | /* |
49 | * Table of VMBus versions listed from newest to oldest. | |
50 | */ | |
51 | static __u32 vmbus_versions[] = { | |
1df53d21 | 52 | VERSION_WIN10_V5_3, |
2d4f49b3 AP |
53 | VERSION_WIN10_V5_2, |
54 | VERSION_WIN10_V5_1, | |
bedc61a9 | 55 | VERSION_WIN10_V5, |
2d4f49b3 | 56 | VERSION_WIN10_V4_1, |
bedc61a9 AP |
57 | VERSION_WIN10, |
58 | VERSION_WIN8_1, | |
59 | VERSION_WIN8, | |
60 | VERSION_WIN7, | |
61 | VERSION_WS2008 | |
62 | }; | |
610071c3 | 63 | |
931cccc9 AP |
64 | /* |
65 | * Maximal VMBus protocol version guests can negotiate. Useful to cap the | |
66 | * VMBus version for testing and debugging purpose. | |
67 | */ | |
1df53d21 | 68 | static uint max_version = VERSION_WIN10_V5_3; |
931cccc9 AP |
69 | |
70 | module_param(max_version, uint, S_IRUGO); | |
71 | MODULE_PARM_DESC(max_version, | |
72 | "Maximal VMBus protocol version which can be negotiated"); | |
73 | ||
f53335e3 | 74 | int vmbus_negotiate_version(struct vmbus_channel_msginfo *msginfo, u32 version) |
610071c3 S |
75 | { |
76 | int ret = 0; | |
77 | struct vmbus_channel_initiate_contact *msg; | |
78 | unsigned long flags; | |
610071c3 S |
79 | |
80 | init_completion(&msginfo->waitevent); | |
81 | ||
82 | msg = (struct vmbus_channel_initiate_contact *)msginfo->msg; | |
83 | ||
ae20b254 | 84 | memset(msg, 0, sizeof(*msg)); |
610071c3 S |
85 | msg->header.msgtype = CHANNELMSG_INITIATE_CONTACT; |
86 | msg->vmbus_version_requested = version; | |
ae20b254 DC |
87 | |
88 | /* | |
2d4f49b3 AP |
89 | * VMBus protocol 5.0 (VERSION_WIN10_V5) and higher require that we must |
90 | * use VMBUS_MESSAGE_CONNECTION_ID_4 for the Initiate Contact Message, | |
ae20b254 DC |
91 | * and for subsequent messages, we must use the Message Connection ID |
92 | * field in the host-returned Version Response Message. And, with | |
2d4f49b3 AP |
93 | * VERSION_WIN10_V5 and higher, we don't use msg->interrupt_page, but we |
94 | * tell the host explicitly that we still use VMBUS_MESSAGE_SINT(2) for | |
ae20b254 DC |
95 | * compatibility. |
96 | * | |
97 | * On old hosts, we should always use VMBUS_MESSAGE_CONNECTION_ID (1). | |
98 | */ | |
99 | if (version >= VERSION_WIN10_V5) { | |
100 | msg->msg_sint = VMBUS_MESSAGE_SINT; | |
101 | vmbus_connection.msg_conn_id = VMBUS_MESSAGE_CONNECTION_ID_4; | |
102 | } else { | |
103 | msg->interrupt_page = virt_to_phys(vmbus_connection.int_page); | |
104 | vmbus_connection.msg_conn_id = VMBUS_MESSAGE_CONNECTION_ID; | |
105 | } | |
106 | ||
f2f136c0 TL |
107 | msg->monitor_page1 = vmbus_connection.monitor_pages_pa[0]; |
108 | msg->monitor_page2 = vmbus_connection.monitor_pages_pa[1]; | |
109 | ||
8a857c55 | 110 | msg->target_vcpu = hv_cpu_number_to_vp_number(VMBUS_CONNECT_CPU); |
610071c3 S |
111 | |
112 | /* | |
113 | * Add to list before we send the request since we may | |
114 | * receive the response before returning from this routine | |
115 | */ | |
116 | spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags); | |
117 | list_add_tail(&msginfo->msglistentry, | |
118 | &vmbus_connection.chn_msg_list); | |
119 | ||
120 | spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags); | |
121 | ||
122 | ret = vmbus_post_msg(msg, | |
c0bb0392 VK |
123 | sizeof(struct vmbus_channel_initiate_contact), |
124 | true); | |
034ebf55 VK |
125 | |
126 | trace_vmbus_negotiate_version(msg, ret); | |
127 | ||
610071c3 S |
128 | if (ret != 0) { |
129 | spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags); | |
130 | list_del(&msginfo->msglistentry); | |
131 | spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, | |
132 | flags); | |
133 | return ret; | |
134 | } | |
135 | ||
136 | /* Wait for the connection response */ | |
269f9794 | 137 | wait_for_completion(&msginfo->waitevent); |
610071c3 S |
138 | |
139 | spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags); | |
140 | list_del(&msginfo->msglistentry); | |
141 | spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags); | |
142 | ||
143 | /* Check if successful */ | |
144 | if (msginfo->response.version_response.version_supported) { | |
145 | vmbus_connection.conn_state = CONNECTED; | |
ae20b254 DC |
146 | |
147 | if (version >= VERSION_WIN10_V5) | |
148 | vmbus_connection.msg_conn_id = | |
149 | msginfo->response.version_response.msg_conn_id; | |
610071c3 | 150 | } else { |
610071c3 S |
151 | return -ECONNREFUSED; |
152 | } | |
153 | ||
154 | return ret; | |
155 | } | |
156 | ||
3e189519 | 157 | /* |
c6977677 | 158 | * vmbus_connect - Sends a connect request on the partition service connection |
fd8b85ea | 159 | */ |
c6977677 | 160 | int vmbus_connect(void) |
3e7ee490 | 161 | { |
15b2f647 | 162 | struct vmbus_channel_msginfo *msginfo = NULL; |
bedc61a9 | 163 | int i, ret = 0; |
610071c3 | 164 | __u32 version; |
3e7ee490 | 165 | |
454f18a9 | 166 | /* Initialize the vmbus connection */ |
da9fcb72 HZ |
167 | vmbus_connection.conn_state = CONNECTING; |
168 | vmbus_connection.work_queue = create_workqueue("hv_vmbus_con"); | |
169 | if (!vmbus_connection.work_queue) { | |
3a7546d9 | 170 | ret = -ENOMEM; |
b0043863 | 171 | goto cleanup; |
de65a384 | 172 | } |
3e7ee490 | 173 | |
37c2578c DC |
174 | vmbus_connection.handle_primary_chan_wq = |
175 | create_workqueue("hv_pri_chan"); | |
176 | if (!vmbus_connection.handle_primary_chan_wq) { | |
177 | ret = -ENOMEM; | |
178 | goto cleanup; | |
179 | } | |
180 | ||
181 | vmbus_connection.handle_sub_chan_wq = | |
182 | create_workqueue("hv_sub_chan"); | |
183 | if (!vmbus_connection.handle_sub_chan_wq) { | |
184 | ret = -ENOMEM; | |
185 | goto cleanup; | |
186 | } | |
187 | ||
da9fcb72 | 188 | INIT_LIST_HEAD(&vmbus_connection.chn_msg_list); |
15b2f647 | 189 | spin_lock_init(&vmbus_connection.channelmsg_lock); |
3e7ee490 | 190 | |
da9fcb72 | 191 | INIT_LIST_HEAD(&vmbus_connection.chn_list); |
d6f591e3 | 192 | mutex_init(&vmbus_connection.channel_mutex); |
3e7ee490 | 193 | |
454f18a9 BP |
194 | /* |
195 | * Setup the vmbus event connection for channel interrupt | |
196 | * abstraction stuff | |
197 | */ | |
df3493e0 | 198 | vmbus_connection.int_page = |
53edce00 | 199 | (void *)hv_alloc_hyperv_zeroed_page(); |
da9fcb72 | 200 | if (vmbus_connection.int_page == NULL) { |
3a7546d9 | 201 | ret = -ENOMEM; |
b0043863 | 202 | goto cleanup; |
3e7ee490 HJ |
203 | } |
204 | ||
da9fcb72 HZ |
205 | vmbus_connection.recv_int_page = vmbus_connection.int_page; |
206 | vmbus_connection.send_int_page = | |
207 | (void *)((unsigned long)vmbus_connection.int_page + | |
53edce00 | 208 | (HV_HYP_PAGE_SIZE >> 1)); |
3e7ee490 | 209 | |
fd8b85ea GKH |
210 | /* |
211 | * Setup the monitor notification facility. The 1st page for | |
212 | * parent->child and the 2nd page for child->parent | |
454f18a9 | 213 | */ |
53edce00 HP |
214 | vmbus_connection.monitor_pages[0] = (void *)hv_alloc_hyperv_zeroed_page(); |
215 | vmbus_connection.monitor_pages[1] = (void *)hv_alloc_hyperv_zeroed_page(); | |
8681db44 GKH |
216 | if ((vmbus_connection.monitor_pages[0] == NULL) || |
217 | (vmbus_connection.monitor_pages[1] == NULL)) { | |
3a7546d9 | 218 | ret = -ENOMEM; |
b0043863 | 219 | goto cleanup; |
3e7ee490 HJ |
220 | } |
221 | ||
f2f136c0 TL |
222 | vmbus_connection.monitor_pages_original[0] |
223 | = vmbus_connection.monitor_pages[0]; | |
224 | vmbus_connection.monitor_pages_original[1] | |
225 | = vmbus_connection.monitor_pages[1]; | |
226 | vmbus_connection.monitor_pages_pa[0] | |
227 | = virt_to_phys(vmbus_connection.monitor_pages[0]); | |
228 | vmbus_connection.monitor_pages_pa[1] | |
229 | = virt_to_phys(vmbus_connection.monitor_pages[1]); | |
230 | ||
231 | if (hv_is_isolation_supported()) { | |
232 | ret = set_memory_decrypted((unsigned long) | |
233 | vmbus_connection.monitor_pages[0], | |
234 | 1); | |
235 | ret |= set_memory_decrypted((unsigned long) | |
236 | vmbus_connection.monitor_pages[1], | |
237 | 1); | |
238 | if (ret) | |
239 | goto cleanup; | |
240 | ||
241 | /* | |
242 | * Isolation VM with AMD SNP needs to access monitor page via | |
243 | * address space above shared gpa boundary. | |
244 | */ | |
245 | if (hv_isolation_type_snp()) { | |
246 | vmbus_connection.monitor_pages_pa[0] += | |
247 | ms_hyperv.shared_gpa_boundary; | |
248 | vmbus_connection.monitor_pages_pa[1] += | |
249 | ms_hyperv.shared_gpa_boundary; | |
250 | ||
251 | vmbus_connection.monitor_pages[0] | |
252 | = memremap(vmbus_connection.monitor_pages_pa[0], | |
253 | HV_HYP_PAGE_SIZE, | |
254 | MEMREMAP_WB); | |
255 | if (!vmbus_connection.monitor_pages[0]) { | |
256 | ret = -ENOMEM; | |
257 | goto cleanup; | |
258 | } | |
259 | ||
260 | vmbus_connection.monitor_pages[1] | |
261 | = memremap(vmbus_connection.monitor_pages_pa[1], | |
262 | HV_HYP_PAGE_SIZE, | |
263 | MEMREMAP_WB); | |
264 | if (!vmbus_connection.monitor_pages[1]) { | |
265 | ret = -ENOMEM; | |
266 | goto cleanup; | |
267 | } | |
268 | } | |
269 | ||
270 | /* | |
271 | * Set memory host visibility hvcall smears memory | |
272 | * and so zero monitor pages here. | |
273 | */ | |
274 | memset(vmbus_connection.monitor_pages[0], 0x00, | |
275 | HV_HYP_PAGE_SIZE); | |
276 | memset(vmbus_connection.monitor_pages[1], 0x00, | |
277 | HV_HYP_PAGE_SIZE); | |
278 | ||
279 | } | |
280 | ||
15b2f647 | 281 | msginfo = kzalloc(sizeof(*msginfo) + |
fd8b85ea GKH |
282 | sizeof(struct vmbus_channel_initiate_contact), |
283 | GFP_KERNEL); | |
15b2f647 | 284 | if (msginfo == NULL) { |
8cad0af9 | 285 | ret = -ENOMEM; |
b0043863 | 286 | goto cleanup; |
3e7ee490 HJ |
287 | } |
288 | ||
454f18a9 | 289 | /* |
610071c3 S |
290 | * Negotiate a compatible VMBUS version number with the |
291 | * host. We start with the highest number we can support | |
292 | * and work our way down until we negotiate a compatible | |
293 | * version. | |
454f18a9 | 294 | */ |
3e7ee490 | 295 | |
bedc61a9 | 296 | for (i = 0; ; i++) { |
9de6655c JC |
297 | if (i == ARRAY_SIZE(vmbus_versions)) { |
298 | ret = -EDOM; | |
bedc61a9 | 299 | goto cleanup; |
9de6655c | 300 | } |
bedc61a9 AP |
301 | |
302 | version = vmbus_versions[i]; | |
931cccc9 AP |
303 | if (version > max_version) |
304 | continue; | |
3e7ee490 | 305 | |
610071c3 | 306 | ret = vmbus_negotiate_version(msginfo, version); |
8bbf9f44 | 307 | if (ret == -ETIMEDOUT) |
666b9adc S |
308 | goto cleanup; |
309 | ||
310 | if (vmbus_connection.conn_state == CONNECTED) | |
610071c3 | 311 | break; |
bedc61a9 | 312 | } |
3e7ee490 | 313 | |
7ef4b2f0 APM |
314 | if (hv_is_isolation_supported() && version < VERSION_WIN10_V5_2) { |
315 | pr_err("Invalid VMBus version %d.%d (expected >= %d.%d) from the host supporting isolation\n", | |
316 | version >> 16, version & 0xFFFF, VERSION_WIN10_V5_2 >> 16, VERSION_WIN10_V5_2 & 0xFFFF); | |
317 | ret = -EINVAL; | |
318 | goto cleanup; | |
319 | } | |
320 | ||
37f7278b | 321 | vmbus_proto_version = version; |
8de8af7e S |
322 | pr_info("Vmbus version:%d.%d\n", |
323 | version >> 16, version & 0xFFFF); | |
3bacaf0c | 324 | |
8b6a877c APM |
325 | vmbus_connection.channels = kcalloc(MAX_CHANNEL_RELIDS, |
326 | sizeof(struct vmbus_channel *), | |
327 | GFP_KERNEL); | |
328 | if (vmbus_connection.channels == NULL) { | |
329 | ret = -ENOMEM; | |
330 | goto cleanup; | |
331 | } | |
332 | ||
15b2f647 | 333 | kfree(msginfo); |
3e7ee490 HJ |
334 | return 0; |
335 | ||
b0043863 | 336 | cleanup: |
3bacaf0c | 337 | pr_err("Unable to connect to host\n"); |
09a19628 | 338 | |
da9fcb72 | 339 | vmbus_connection.conn_state = DISCONNECTED; |
09a19628 VK |
340 | vmbus_disconnect(); |
341 | ||
342 | kfree(msginfo); | |
343 | ||
344 | return ret; | |
345 | } | |
3e7ee490 | 346 | |
09a19628 VK |
347 | void vmbus_disconnect(void) |
348 | { | |
2db84eff S |
349 | /* |
350 | * First send the unload request to the host. | |
351 | */ | |
75ff3a8a | 352 | vmbus_initiate_unload(false); |
2db84eff | 353 | |
37c2578c DC |
354 | if (vmbus_connection.handle_sub_chan_wq) |
355 | destroy_workqueue(vmbus_connection.handle_sub_chan_wq); | |
356 | ||
357 | if (vmbus_connection.handle_primary_chan_wq) | |
358 | destroy_workqueue(vmbus_connection.handle_primary_chan_wq); | |
359 | ||
360 | if (vmbus_connection.work_queue) | |
da9fcb72 | 361 | destroy_workqueue(vmbus_connection.work_queue); |
3e7ee490 | 362 | |
da9fcb72 | 363 | if (vmbus_connection.int_page) { |
53edce00 | 364 | hv_free_hyperv_page((unsigned long)vmbus_connection.int_page); |
da9fcb72 | 365 | vmbus_connection.int_page = NULL; |
3e7ee490 HJ |
366 | } |
367 | ||
f2f136c0 TL |
368 | if (hv_is_isolation_supported()) { |
369 | /* | |
370 | * memunmap() checks input address is ioremap address or not | |
371 | * inside. It doesn't unmap any thing in the non-SNP CVM and | |
372 | * so not check CVM type here. | |
373 | */ | |
374 | memunmap(vmbus_connection.monitor_pages[0]); | |
375 | memunmap(vmbus_connection.monitor_pages[1]); | |
376 | ||
377 | set_memory_encrypted((unsigned long) | |
378 | vmbus_connection.monitor_pages_original[0], | |
379 | 1); | |
380 | set_memory_encrypted((unsigned long) | |
381 | vmbus_connection.monitor_pages_original[1], | |
382 | 1); | |
383 | } | |
384 | ||
385 | hv_free_hyperv_page((unsigned long) | |
386 | vmbus_connection.monitor_pages_original[0]); | |
387 | hv_free_hyperv_page((unsigned long) | |
388 | vmbus_connection.monitor_pages_original[1]); | |
389 | vmbus_connection.monitor_pages_original[0] = | |
390 | vmbus_connection.monitor_pages[0] = NULL; | |
391 | vmbus_connection.monitor_pages_original[1] = | |
392 | vmbus_connection.monitor_pages[1] = NULL; | |
3e7ee490 HJ |
393 | } |
394 | ||
3e189519 | 395 | /* |
c6977677 HZ |
396 | * relid2channel - Get the channel object given its |
397 | * child relative id (ie channel id) | |
fd8b85ea | 398 | */ |
d43e2fe7 | 399 | struct vmbus_channel *relid2channel(u32 relid) |
3e7ee490 | 400 | { |
8b6a877c APM |
401 | if (WARN_ON(relid >= MAX_CHANNEL_RELIDS)) |
402 | return NULL; | |
403 | return READ_ONCE(vmbus_connection.channels[relid]); | |
3e7ee490 HJ |
404 | } |
405 | ||
3e189519 | 406 | /* |
631e63a9 | 407 | * vmbus_on_event - Process a channel event notification |
ada6eb11 SH |
408 | * |
409 | * For batched channels (default) optimize host to guest signaling | |
410 | * by ensuring: | |
411 | * 1. While reading the channel, we disable interrupts from host. | |
412 | * 2. Ensure that we process all posted messages from the host | |
413 | * before returning from this callback. | |
414 | * 3. Once we return, enable signaling from the host. Once this | |
415 | * state is set we check to see if additional packets are | |
416 | * available to read. In this case we repeat the process. | |
417 | * If this tasklet has been running for a long time | |
418 | * then reschedule ourselves. | |
fd8b85ea | 419 | */ |
631e63a9 | 420 | void vmbus_on_event(unsigned long data) |
3e7ee490 | 421 | { |
631e63a9 | 422 | struct vmbus_channel *channel = (void *) data; |
ada6eb11 | 423 | unsigned long time_limit = jiffies + 2; |
3e7ee490 | 424 | |
991f8f1c VK |
425 | trace_vmbus_on_event(channel); |
426 | ||
af9ca6f9 | 427 | hv_debug_delay_test(channel, INTERRUPT_DELAY); |
ada6eb11 SH |
428 | do { |
429 | void (*callback_fn)(void *); | |
430 | ||
431 | /* A channel once created is persistent even when | |
432 | * there is no driver handling the device. An | |
433 | * unloading driver sets the onchannel_callback to NULL. | |
f878f3d5 | 434 | */ |
ada6eb11 SH |
435 | callback_fn = READ_ONCE(channel->onchannel_callback); |
436 | if (unlikely(callback_fn == NULL)) | |
437 | return; | |
f878f3d5 | 438 | |
ada6eb11 SH |
439 | (*callback_fn)(channel->channel_callback_context); |
440 | ||
441 | if (channel->callback_mode != HV_CALL_BATCHED) | |
442 | return; | |
443 | ||
444 | if (likely(hv_end_read(&channel->inbound) == 0)) | |
445 | return; | |
446 | ||
447 | hv_begin_read(&channel->inbound); | |
448 | } while (likely(time_before(jiffies, time_limit))); | |
449 | ||
450 | /* The time limit (2 jiffies) has been reached */ | |
451 | tasklet_schedule(&channel->callback_event); | |
3e7ee490 HJ |
452 | } |
453 | ||
3e189519 | 454 | /* |
c6977677 | 455 | * vmbus_post_msg - Send a msg on the vmbus's message connection |
fd8b85ea | 456 | */ |
c0bb0392 | 457 | int vmbus_post_msg(void *buffer, size_t buflen, bool can_sleep) |
3e7ee490 | 458 | { |
ae20b254 | 459 | struct vmbus_channel_message_header *hdr; |
15b2f647 | 460 | union hv_connection_id conn_id; |
5289d3d1 S |
461 | int ret = 0; |
462 | int retries = 0; | |
8de0d7e9 | 463 | u32 usec = 1; |
3e7ee490 | 464 | |
15b2f647 | 465 | conn_id.asu32 = 0; |
ae20b254 | 466 | conn_id.u.id = vmbus_connection.msg_conn_id; |
5289d3d1 S |
467 | |
468 | /* | |
469 | * hv_post_message() can have transient failures because of | |
470 | * insufficient resources. Retry the operation a couple of | |
471 | * times before giving up. | |
472 | */ | |
c0bb0392 | 473 | while (retries < 100) { |
fdeebcc6 S |
474 | ret = hv_post_message(conn_id, 1, buffer, buflen); |
475 | ||
476 | switch (ret) { | |
89f9f679 | 477 | case HV_STATUS_INVALID_CONNECTION_ID: |
ae20b254 DC |
478 | /* |
479 | * See vmbus_negotiate_version(): VMBus protocol 5.0 | |
2d4f49b3 | 480 | * and higher require that we must use |
ae20b254 DC |
481 | * VMBUS_MESSAGE_CONNECTION_ID_4 for the Initiate |
482 | * Contact message, but on old hosts that only | |
483 | * support VMBus protocol 4.0 or lower, here we get | |
484 | * HV_STATUS_INVALID_CONNECTION_ID and we should | |
485 | * return an error immediately without retrying. | |
486 | */ | |
89760937 | 487 | hdr = buffer; |
ae20b254 DC |
488 | if (hdr->msgtype == CHANNELMSG_INITIATE_CONTACT) |
489 | return -EINVAL; | |
89f9f679 DC |
490 | /* |
491 | * We could get this if we send messages too | |
492 | * frequently. | |
493 | */ | |
494 | ret = -EAGAIN; | |
495 | break; | |
496 | case HV_STATUS_INSUFFICIENT_MEMORY: | |
fdeebcc6 | 497 | case HV_STATUS_INSUFFICIENT_BUFFERS: |
48f4ccdf | 498 | ret = -ENOBUFS; |
fdeebcc6 S |
499 | break; |
500 | case HV_STATUS_SUCCESS: | |
5289d3d1 | 501 | return ret; |
fdeebcc6 S |
502 | default: |
503 | pr_err("hv_post_msg() failed; error code:%d\n", ret); | |
504 | return -EINVAL; | |
505 | } | |
506 | ||
5289d3d1 | 507 | retries++; |
c0bb0392 VK |
508 | if (can_sleep && usec > 1000) |
509 | msleep(usec / 1000); | |
510 | else if (usec < MAX_UDELAY_MS * 1000) | |
511 | udelay(usec); | |
512 | else | |
513 | mdelay(usec / 1000); | |
514 | ||
e917a5e2 | 515 | if (retries < 22) |
8de0d7e9 | 516 | usec *= 2; |
5289d3d1 S |
517 | } |
518 | return ret; | |
3e7ee490 HJ |
519 | } |
520 | ||
3e189519 | 521 | /* |
c6977677 | 522 | * vmbus_set_event - Send an event notification to the parent |
fd8b85ea | 523 | */ |
1b807e10 | 524 | void vmbus_set_event(struct vmbus_channel *channel) |
3e7ee490 | 525 | { |
21c3bef5 | 526 | u32 child_relid = channel->offermsg.child_relid; |
7c369f40 | 527 | |
5c1bec61 SH |
528 | if (!channel->is_dedicated_interrupt) |
529 | vmbus_send_interrupt(child_relid); | |
3be77774 | 530 | |
6981fbf3 SH |
531 | ++channel->sig_events; |
532 | ||
20c89a55 TL |
533 | if (hv_isolation_type_snp()) |
534 | hv_ghcb_hypercall(HVCALL_SIGNAL_EVENT, &channel->sig_event, | |
535 | NULL, sizeof(channel->sig_event)); | |
536 | else | |
537 | hv_do_fast_hypercall8(HVCALL_SIGNAL_EVENT, channel->sig_event); | |
3e7ee490 | 538 | } |
5cc47247 | 539 | EXPORT_SYMBOL_GPL(vmbus_set_event); |