1 // SPDX-License-Identifier: GPL-2.0+ 2 /* 3 * IBM Power Systems Virtual Management Channel Support. 4 * 5 * Copyright (c) 2004, 2018 IBM Corp. 6 * Dave Engebretsen engebret@us.ibm.com 7 * Steven Royer seroyer@linux.vnet.ibm.com 8 * Adam Reznechek adreznec@linux.vnet.ibm.com 9 * Bryant G. Ly <bryantly@linux.vnet.ibm.com> 10 */ 11 12 #include <linux/module.h> 13 #include <linux/kernel.h> 14 #include <linux/kthread.h> 15 #include <linux/major.h> 16 #include <linux/string.h> 17 #include <linux/fcntl.h> 18 #include <linux/slab.h> 19 #include <linux/poll.h> 20 #include <linux/init.h> 21 #include <linux/fs.h> 22 #include <linux/interrupt.h> 23 #include <linux/spinlock.h> 24 #include <linux/percpu.h> 25 #include <linux/delay.h> 26 #include <linux/uaccess.h> 27 #include <linux/io.h> 28 #include <linux/miscdevice.h> 29 #include <linux/sched/signal.h> 30 31 #include <asm/byteorder.h> 32 #include <asm/irq.h> 33 #include <asm/vio.h> 34 35 #include "ibmvmc.h" 36 37 #define IBMVMC_DRIVER_VERSION "1.0" 38 39 /* 40 * Static global variables 41 */ 42 static DECLARE_WAIT_QUEUE_HEAD(ibmvmc_read_wait); 43 44 static const char ibmvmc_driver_name[] = "ibmvmc"; 45 46 static struct ibmvmc_struct ibmvmc; 47 static struct ibmvmc_hmc hmcs[MAX_HMCS]; 48 static struct crq_server_adapter ibmvmc_adapter; 49 50 static int ibmvmc_max_buf_pool_size = DEFAULT_BUF_POOL_SIZE; 51 static int ibmvmc_max_hmcs = DEFAULT_HMCS; 52 static int ibmvmc_max_mtu = DEFAULT_MTU; 53 54 static inline long h_copy_rdma(s64 length, u64 sliobn, u64 slioba, 55 u64 dliobn, u64 dlioba) 56 { 57 long rc = 0; 58 59 /* Ensure all writes to source memory are visible before hcall */ 60 dma_wmb(); 61 pr_debug("ibmvmc: h_copy_rdma(0x%llx, 0x%llx, 0x%llx, 0x%llx, 0x%llx\n", 62 length, sliobn, slioba, dliobn, dlioba); 63 rc = plpar_hcall_norets(H_COPY_RDMA, length, sliobn, slioba, 64 dliobn, dlioba); 65 pr_debug("ibmvmc: h_copy_rdma rc = 0x%lx\n", rc); 66 67 return rc; 68 } 69 70 static inline void h_free_crq(uint32_t unit_address) 71 { 72 long rc = 0; 73 74 do { 75 if (H_IS_LONG_BUSY(rc)) 76 msleep(get_longbusy_msecs(rc)); 77 78 rc = plpar_hcall_norets(H_FREE_CRQ, unit_address); 79 } while ((rc == H_BUSY) || (H_IS_LONG_BUSY(rc))); 80 } 81 82 /** 83 * h_request_vmc: - request a hypervisor virtual management channel device 84 * @vmc_index: drc index of the vmc device created 85 * 86 * Requests the hypervisor create a new virtual management channel device, 87 * allowing this partition to send hypervisor virtualization control 88 * commands. 89 * 90 * Return: 91 * 0 - Success 92 * Non-zero - Failure 93 */ 94 static inline long h_request_vmc(u32 *vmc_index) 95 { 96 long rc = 0; 97 unsigned long retbuf[PLPAR_HCALL_BUFSIZE]; 98 99 do { 100 if (H_IS_LONG_BUSY(rc)) 101 msleep(get_longbusy_msecs(rc)); 102 103 /* Call to request the VMC device from phyp */ 104 rc = plpar_hcall(H_REQUEST_VMC, retbuf); 105 pr_debug("ibmvmc: %s rc = 0x%lx\n", __func__, rc); 106 *vmc_index = retbuf[0]; 107 } while ((rc == H_BUSY) || (H_IS_LONG_BUSY(rc))); 108 109 return rc; 110 } 111 112 /* routines for managing a command/response queue */ 113 /** 114 * ibmvmc_handle_event: - Interrupt handler for crq events 115 * @irq: number of irq to handle, not used 116 * @dev_instance: crq_server_adapter that received interrupt 117 * 118 * Disables interrupts and schedules ibmvmc_task 119 * 120 * Always returns IRQ_HANDLED 121 */ 122 static irqreturn_t ibmvmc_handle_event(int irq, void *dev_instance) 123 { 124 struct crq_server_adapter *adapter = 125 (struct crq_server_adapter *)dev_instance; 126 127 vio_disable_interrupts(to_vio_dev(adapter->dev)); 128 tasklet_schedule(&adapter->work_task); 129 130 return IRQ_HANDLED; 131 } 132 133 /** 134 * ibmvmc_release_crq_queue - Release CRQ Queue 135 * 136 * @adapter: crq_server_adapter struct 137 * 138 * Return: 139 * 0 - Success 140 * Non-Zero - Failure 141 */ 142 static void ibmvmc_release_crq_queue(struct crq_server_adapter *adapter) 143 { 144 struct vio_dev *vdev = to_vio_dev(adapter->dev); 145 struct crq_queue *queue = &adapter->queue; 146 147 free_irq(vdev->irq, (void *)adapter); 148 tasklet_kill(&adapter->work_task); 149 150 if (adapter->reset_task) 151 kthread_stop(adapter->reset_task); 152 153 h_free_crq(vdev->unit_address); 154 dma_unmap_single(adapter->dev, 155 queue->msg_token, 156 queue->size * sizeof(*queue->msgs), DMA_BIDIRECTIONAL); 157 free_page((unsigned long)queue->msgs); 158 } 159 160 /** 161 * ibmvmc_reset_crq_queue - Reset CRQ Queue 162 * 163 * @adapter: crq_server_adapter struct 164 * 165 * This function calls h_free_crq and then calls H_REG_CRQ and does all the 166 * bookkeeping to get us back to where we can communicate. 167 * 168 * Return: 169 * 0 - Success 170 * Non-Zero - Failure 171 */ 172 static int ibmvmc_reset_crq_queue(struct crq_server_adapter *adapter) 173 { 174 struct vio_dev *vdev = to_vio_dev(adapter->dev); 175 struct crq_queue *queue = &adapter->queue; 176 int rc = 0; 177 178 /* Close the CRQ */ 179 h_free_crq(vdev->unit_address); 180 181 /* Clean out the queue */ 182 memset(queue->msgs, 0x00, PAGE_SIZE); 183 queue->cur = 0; 184 185 /* And re-open it again */ 186 rc = plpar_hcall_norets(H_REG_CRQ, 187 vdev->unit_address, 188 queue->msg_token, PAGE_SIZE); 189 if (rc == 2) 190 /* Adapter is good, but other end is not ready */ 191 dev_warn(adapter->dev, "Partner adapter not ready\n"); 192 else if (rc != 0) 193 dev_err(adapter->dev, "couldn't register crq--rc 0x%x\n", rc); 194 195 return rc; 196 } 197 198 /** 199 * crq_queue_next_crq: - Returns the next entry in message queue 200 * @queue: crq_queue to use 201 * 202 * Returns pointer to next entry in queue, or NULL if there are no new 203 * entried in the CRQ. 204 */ 205 static struct ibmvmc_crq_msg *crq_queue_next_crq(struct crq_queue *queue) 206 { 207 struct ibmvmc_crq_msg *crq; 208 unsigned long flags; 209 210 spin_lock_irqsave(&queue->lock, flags); 211 crq = &queue->msgs[queue->cur]; 212 if (crq->valid & 0x80) { 213 if (++queue->cur == queue->size) 214 queue->cur = 0; 215 216 /* Ensure the read of the valid bit occurs before reading any 217 * other bits of the CRQ entry 218 */ 219 dma_rmb(); 220 } else { 221 crq = NULL; 222 } 223 224 spin_unlock_irqrestore(&queue->lock, flags); 225 226 return crq; 227 } 228 229 /** 230 * ibmvmc_send_crq - Send CRQ 231 * 232 * @adapter: crq_server_adapter struct 233 * @word1: Word1 Data field 234 * @word2: Word2 Data field 235 * 236 * Return: 237 * 0 - Success 238 * Non-Zero - Failure 239 */ 240 static long ibmvmc_send_crq(struct crq_server_adapter *adapter, 241 u64 word1, u64 word2) 242 { 243 struct vio_dev *vdev = to_vio_dev(adapter->dev); 244 long rc = 0; 245 246 dev_dbg(adapter->dev, "(0x%x, 0x%016llx, 0x%016llx)\n", 247 vdev->unit_address, word1, word2); 248 249 /* 250 * Ensure the command buffer is flushed to memory before handing it 251 * over to the other side to prevent it from fetching any stale data. 252 */ 253 dma_wmb(); 254 rc = plpar_hcall_norets(H_SEND_CRQ, vdev->unit_address, word1, word2); 255 dev_dbg(adapter->dev, "rc = 0x%lx\n", rc); 256 257 return rc; 258 } 259 260 /** 261 * alloc_dma_buffer - Create DMA Buffer 262 * 263 * @vdev: vio_dev struct 264 * @size: Size field 265 * @dma_handle: DMA address field 266 * 267 * Allocates memory for the command queue and maps remote memory into an 268 * ioba. 269 * 270 * Returns a pointer to the buffer 271 */ 272 static void *alloc_dma_buffer(struct vio_dev *vdev, size_t size, 273 dma_addr_t *dma_handle) 274 { 275 /* allocate memory */ 276 void *buffer = kzalloc(size, GFP_ATOMIC); 277 278 if (!buffer) { 279 *dma_handle = 0; 280 return NULL; 281 } 282 283 /* DMA map */ 284 *dma_handle = dma_map_single(&vdev->dev, buffer, size, 285 DMA_BIDIRECTIONAL); 286 287 if (dma_mapping_error(&vdev->dev, *dma_handle)) { 288 *dma_handle = 0; 289 kfree_sensitive(buffer); 290 return NULL; 291 } 292 293 return buffer; 294 } 295 296 /** 297 * free_dma_buffer - Free DMA Buffer 298 * 299 * @vdev: vio_dev struct 300 * @size: Size field 301 * @vaddr: Address field 302 * @dma_handle: DMA address field 303 * 304 * Releases memory for a command queue and unmaps mapped remote memory. 305 */ 306 static void free_dma_buffer(struct vio_dev *vdev, size_t size, void *vaddr, 307 dma_addr_t dma_handle) 308 { 309 /* DMA unmap */ 310 dma_unmap_single(&vdev->dev, dma_handle, size, DMA_BIDIRECTIONAL); 311 312 /* deallocate memory */ 313 kfree_sensitive(vaddr); 314 } 315 316 /** 317 * ibmvmc_get_valid_hmc_buffer - Retrieve Valid HMC Buffer 318 * 319 * @hmc_index: HMC Index Field 320 * 321 * Return: 322 * Pointer to ibmvmc_buffer 323 */ 324 static struct ibmvmc_buffer *ibmvmc_get_valid_hmc_buffer(u8 hmc_index) 325 { 326 struct ibmvmc_buffer *buffer; 327 struct ibmvmc_buffer *ret_buf = NULL; 328 unsigned long i; 329 330 if (hmc_index > ibmvmc.max_hmc_index) 331 return NULL; 332 333 buffer = hmcs[hmc_index].buffer; 334 335 for (i = 0; i < ibmvmc_max_buf_pool_size; i++) { 336 if (buffer[i].valid && buffer[i].free && 337 buffer[i].owner == VMC_BUF_OWNER_ALPHA) { 338 buffer[i].free = 0; 339 ret_buf = &buffer[i]; 340 break; 341 } 342 } 343 344 return ret_buf; 345 } 346 347 /** 348 * ibmvmc_get_free_hmc_buffer - Get Free HMC Buffer 349 * 350 * @adapter: crq_server_adapter struct 351 * @hmc_index: Hmc Index field 352 * 353 * Return: 354 * Pointer to ibmvmc_buffer 355 */ 356 static struct ibmvmc_buffer *ibmvmc_get_free_hmc_buffer(struct crq_server_adapter *adapter, 357 u8 hmc_index) 358 { 359 struct ibmvmc_buffer *buffer; 360 struct ibmvmc_buffer *ret_buf = NULL; 361 unsigned long i; 362 363 if (hmc_index > ibmvmc.max_hmc_index) { 364 dev_info(adapter->dev, "get_free_hmc_buffer: invalid hmc_index=0x%x\n", 365 hmc_index); 366 return NULL; 367 } 368 369 buffer = hmcs[hmc_index].buffer; 370 371 for (i = 0; i < ibmvmc_max_buf_pool_size; i++) { 372 if (buffer[i].free && 373 buffer[i].owner == VMC_BUF_OWNER_ALPHA) { 374 buffer[i].free = 0; 375 ret_buf = &buffer[i]; 376 break; 377 } 378 } 379 380 return ret_buf; 381 } 382 383 /** 384 * ibmvmc_free_hmc_buffer - Free an HMC Buffer 385 * 386 * @hmc: ibmvmc_hmc struct 387 * @buffer: ibmvmc_buffer struct 388 * 389 */ 390 static void ibmvmc_free_hmc_buffer(struct ibmvmc_hmc *hmc, 391 struct ibmvmc_buffer *buffer) 392 { 393 unsigned long flags; 394 395 spin_lock_irqsave(&hmc->lock, flags); 396 buffer->free = 1; 397 spin_unlock_irqrestore(&hmc->lock, flags); 398 } 399 400 /** 401 * ibmvmc_count_hmc_buffers - Count HMC Buffers 402 * 403 * @hmc_index: HMC Index field 404 * @valid: Valid number of buffers field 405 * @free: Free number of buffers field 406 * 407 */ 408 static void ibmvmc_count_hmc_buffers(u8 hmc_index, unsigned int *valid, 409 unsigned int *free) 410 { 411 struct ibmvmc_buffer *buffer; 412 unsigned long i; 413 unsigned long flags; 414 415 if (hmc_index > ibmvmc.max_hmc_index) 416 return; 417 418 if (!valid || !free) 419 return; 420 421 *valid = 0; *free = 0; 422 423 buffer = hmcs[hmc_index].buffer; 424 spin_lock_irqsave(&hmcs[hmc_index].lock, flags); 425 426 for (i = 0; i < ibmvmc_max_buf_pool_size; i++) { 427 if (buffer[i].valid) { 428 *valid = *valid + 1; 429 if (buffer[i].free) 430 *free = *free + 1; 431 } 432 } 433 434 spin_unlock_irqrestore(&hmcs[hmc_index].lock, flags); 435 } 436 437 /** 438 * ibmvmc_get_free_hmc - Get Free HMC 439 * 440 * Return: 441 * Pointer to an available HMC Connection 442 * Null otherwise 443 */ 444 static struct ibmvmc_hmc *ibmvmc_get_free_hmc(void) 445 { 446 unsigned long i; 447 unsigned long flags; 448 449 /* 450 * Find an available HMC connection. 451 */ 452 for (i = 0; i <= ibmvmc.max_hmc_index; i++) { 453 spin_lock_irqsave(&hmcs[i].lock, flags); 454 if (hmcs[i].state == ibmhmc_state_free) { 455 hmcs[i].index = i; 456 hmcs[i].state = ibmhmc_state_initial; 457 spin_unlock_irqrestore(&hmcs[i].lock, flags); 458 return &hmcs[i]; 459 } 460 spin_unlock_irqrestore(&hmcs[i].lock, flags); 461 } 462 463 return NULL; 464 } 465 466 /** 467 * ibmvmc_return_hmc - Return an HMC Connection 468 * 469 * @hmc: ibmvmc_hmc struct 470 * @release_readers: Number of readers connected to session 471 * 472 * This function releases the HMC connections back into the pool. 473 * 474 * Return: 475 * 0 - Success 476 * Non-zero - Failure 477 */ 478 static int ibmvmc_return_hmc(struct ibmvmc_hmc *hmc, bool release_readers) 479 { 480 struct ibmvmc_buffer *buffer; 481 struct crq_server_adapter *adapter; 482 struct vio_dev *vdev; 483 unsigned long i; 484 unsigned long flags; 485 486 if (!hmc || !hmc->adapter) 487 return -EIO; 488 489 if (release_readers) { 490 if (hmc->file_session) { 491 struct ibmvmc_file_session *session = hmc->file_session; 492 493 session->valid = 0; 494 wake_up_interruptible(&ibmvmc_read_wait); 495 } 496 } 497 498 adapter = hmc->adapter; 499 vdev = to_vio_dev(adapter->dev); 500 501 spin_lock_irqsave(&hmc->lock, flags); 502 hmc->index = 0; 503 hmc->state = ibmhmc_state_free; 504 hmc->queue_head = 0; 505 hmc->queue_tail = 0; 506 buffer = hmc->buffer; 507 for (i = 0; i < ibmvmc_max_buf_pool_size; i++) { 508 if (buffer[i].valid) { 509 free_dma_buffer(vdev, 510 ibmvmc.max_mtu, 511 buffer[i].real_addr_local, 512 buffer[i].dma_addr_local); 513 dev_dbg(adapter->dev, "Forgot buffer id 0x%lx\n", i); 514 } 515 memset(&buffer[i], 0, sizeof(struct ibmvmc_buffer)); 516 517 hmc->queue_outbound_msgs[i] = VMC_INVALID_BUFFER_ID; 518 } 519 520 spin_unlock_irqrestore(&hmc->lock, flags); 521 522 return 0; 523 } 524 525 /** 526 * ibmvmc_send_open - Interface Open 527 * @buffer: Pointer to ibmvmc_buffer struct 528 * @hmc: Pointer to ibmvmc_hmc struct 529 * 530 * This command is sent by the management partition as the result of a 531 * management partition device request. It causes the hypervisor to 532 * prepare a set of data buffers for the management application connection 533 * indicated HMC idx. A unique HMC Idx would be used if multiple management 534 * applications running concurrently were desired. Before responding to this 535 * command, the hypervisor must provide the management partition with at 536 * least one of these new buffers via the Add Buffer. This indicates whether 537 * the messages are inbound or outbound from the hypervisor. 538 * 539 * Return: 540 * 0 - Success 541 * Non-zero - Failure 542 */ 543 static int ibmvmc_send_open(struct ibmvmc_buffer *buffer, 544 struct ibmvmc_hmc *hmc) 545 { 546 struct ibmvmc_crq_msg crq_msg; 547 struct crq_server_adapter *adapter; 548 __be64 *crq_as_u64 = (__be64 *)&crq_msg; 549 int rc = 0; 550 551 if (!hmc || !hmc->adapter) 552 return -EIO; 553 554 adapter = hmc->adapter; 555 556 dev_dbg(adapter->dev, "send_open: 0x%lx 0x%lx 0x%lx 0x%lx 0x%lx\n", 557 (unsigned long)buffer->size, (unsigned long)adapter->liobn, 558 (unsigned long)buffer->dma_addr_local, 559 (unsigned long)adapter->riobn, 560 (unsigned long)buffer->dma_addr_remote); 561 562 rc = h_copy_rdma(buffer->size, 563 adapter->liobn, 564 buffer->dma_addr_local, 565 adapter->riobn, 566 buffer->dma_addr_remote); 567 if (rc) { 568 dev_err(adapter->dev, "Error: In send_open, h_copy_rdma rc 0x%x\n", 569 rc); 570 return -EIO; 571 } 572 573 hmc->state = ibmhmc_state_opening; 574 575 crq_msg.valid = 0x80; 576 crq_msg.type = VMC_MSG_OPEN; 577 crq_msg.status = 0; 578 crq_msg.var1.rsvd = 0; 579 crq_msg.hmc_session = hmc->session; 580 crq_msg.hmc_index = hmc->index; 581 crq_msg.var2.buffer_id = cpu_to_be16(buffer->id); 582 crq_msg.rsvd = 0; 583 crq_msg.var3.rsvd = 0; 584 585 ibmvmc_send_crq(adapter, be64_to_cpu(crq_as_u64[0]), 586 be64_to_cpu(crq_as_u64[1])); 587 588 return rc; 589 } 590 591 /** 592 * ibmvmc_send_close - Interface Close 593 * @hmc: Pointer to ibmvmc_hmc struct 594 * 595 * This command is sent by the management partition to terminate a 596 * management application to hypervisor connection. When this command is 597 * sent, the management partition has quiesced all I/O operations to all 598 * buffers associated with this management application connection, and 599 * has freed any storage for these buffers. 600 * 601 * Return: 602 * 0 - Success 603 * Non-zero - Failure 604 */ 605 static int ibmvmc_send_close(struct ibmvmc_hmc *hmc) 606 { 607 struct ibmvmc_crq_msg crq_msg; 608 struct crq_server_adapter *adapter; 609 __be64 *crq_as_u64 = (__be64 *)&crq_msg; 610 int rc = 0; 611 612 if (!hmc || !hmc->adapter) 613 return -EIO; 614 615 adapter = hmc->adapter; 616 617 dev_info(adapter->dev, "CRQ send: close\n"); 618 619 crq_msg.valid = 0x80; 620 crq_msg.type = VMC_MSG_CLOSE; 621 crq_msg.status = 0; 622 crq_msg.var1.rsvd = 0; 623 crq_msg.hmc_session = hmc->session; 624 crq_msg.hmc_index = hmc->index; 625 crq_msg.var2.rsvd = 0; 626 crq_msg.rsvd = 0; 627 crq_msg.var3.rsvd = 0; 628 629 ibmvmc_send_crq(adapter, be64_to_cpu(crq_as_u64[0]), 630 be64_to_cpu(crq_as_u64[1])); 631 632 return rc; 633 } 634 635 /** 636 * ibmvmc_send_capabilities - Send VMC Capabilities 637 * 638 * @adapter: crq_server_adapter struct 639 * 640 * The capabilities message is an administrative message sent after the CRQ 641 * initialization sequence of messages and is used to exchange VMC capabilities 642 * between the management partition and the hypervisor. The management 643 * partition must send this message and the hypervisor must respond with VMC 644 * capabilities Response message before HMC interface message can begin. Any 645 * HMC interface messages received before the exchange of capabilities has 646 * complete are dropped. 647 * 648 * Return: 649 * 0 - Success 650 */ 651 static int ibmvmc_send_capabilities(struct crq_server_adapter *adapter) 652 { 653 struct ibmvmc_admin_crq_msg crq_msg; 654 __be64 *crq_as_u64 = (__be64 *)&crq_msg; 655 656 dev_dbg(adapter->dev, "ibmvmc: CRQ send: capabilities\n"); 657 crq_msg.valid = 0x80; 658 crq_msg.type = VMC_MSG_CAP; 659 crq_msg.status = 0; 660 crq_msg.rsvd[0] = 0; 661 crq_msg.rsvd[1] = 0; 662 crq_msg.max_hmc = ibmvmc_max_hmcs; 663 crq_msg.max_mtu = cpu_to_be32(ibmvmc_max_mtu); 664 crq_msg.pool_size = cpu_to_be16(ibmvmc_max_buf_pool_size); 665 crq_msg.crq_size = cpu_to_be16(adapter->queue.size); 666 crq_msg.version = cpu_to_be16(IBMVMC_PROTOCOL_VERSION); 667 668 ibmvmc_send_crq(adapter, be64_to_cpu(crq_as_u64[0]), 669 be64_to_cpu(crq_as_u64[1])); 670 671 ibmvmc.state = ibmvmc_state_capabilities; 672 673 return 0; 674 } 675 676 /** 677 * ibmvmc_send_add_buffer_resp - Add Buffer Response 678 * 679 * @adapter: crq_server_adapter struct 680 * @status: Status field 681 * @hmc_session: HMC Session field 682 * @hmc_index: HMC Index field 683 * @buffer_id: Buffer Id field 684 * 685 * This command is sent by the management partition to the hypervisor in 686 * response to the Add Buffer message. The Status field indicates the result of 687 * the command. 688 * 689 * Return: 690 * 0 - Success 691 */ 692 static int ibmvmc_send_add_buffer_resp(struct crq_server_adapter *adapter, 693 u8 status, u8 hmc_session, 694 u8 hmc_index, u16 buffer_id) 695 { 696 struct ibmvmc_crq_msg crq_msg; 697 __be64 *crq_as_u64 = (__be64 *)&crq_msg; 698 699 dev_dbg(adapter->dev, "CRQ send: add_buffer_resp\n"); 700 crq_msg.valid = 0x80; 701 crq_msg.type = VMC_MSG_ADD_BUF_RESP; 702 crq_msg.status = status; 703 crq_msg.var1.rsvd = 0; 704 crq_msg.hmc_session = hmc_session; 705 crq_msg.hmc_index = hmc_index; 706 crq_msg.var2.buffer_id = cpu_to_be16(buffer_id); 707 crq_msg.rsvd = 0; 708 crq_msg.var3.rsvd = 0; 709 710 ibmvmc_send_crq(adapter, be64_to_cpu(crq_as_u64[0]), 711 be64_to_cpu(crq_as_u64[1])); 712 713 return 0; 714 } 715 716 /** 717 * ibmvmc_send_rem_buffer_resp - Remove Buffer Response 718 * 719 * @adapter: crq_server_adapter struct 720 * @status: Status field 721 * @hmc_session: HMC Session field 722 * @hmc_index: HMC Index field 723 * @buffer_id: Buffer Id field 724 * 725 * This command is sent by the management partition to the hypervisor in 726 * response to the Remove Buffer message. The Buffer ID field indicates 727 * which buffer the management partition selected to remove. The Status 728 * field indicates the result of the command. 729 * 730 * Return: 731 * 0 - Success 732 */ 733 static int ibmvmc_send_rem_buffer_resp(struct crq_server_adapter *adapter, 734 u8 status, u8 hmc_session, 735 u8 hmc_index, u16 buffer_id) 736 { 737 struct ibmvmc_crq_msg crq_msg; 738 __be64 *crq_as_u64 = (__be64 *)&crq_msg; 739 740 dev_dbg(adapter->dev, "CRQ send: rem_buffer_resp\n"); 741 crq_msg.valid = 0x80; 742 crq_msg.type = VMC_MSG_REM_BUF_RESP; 743 crq_msg.status = status; 744 crq_msg.var1.rsvd = 0; 745 crq_msg.hmc_session = hmc_session; 746 crq_msg.hmc_index = hmc_index; 747 crq_msg.var2.buffer_id = cpu_to_be16(buffer_id); 748 crq_msg.rsvd = 0; 749 crq_msg.var3.rsvd = 0; 750 751 ibmvmc_send_crq(adapter, be64_to_cpu(crq_as_u64[0]), 752 be64_to_cpu(crq_as_u64[1])); 753 754 return 0; 755 } 756 757 /** 758 * ibmvmc_send_msg - Signal Message 759 * 760 * @adapter: crq_server_adapter struct 761 * @buffer: ibmvmc_buffer struct 762 * @hmc: ibmvmc_hmc struct 763 * @msg_len: message length field 764 * 765 * This command is sent between the management partition and the hypervisor 766 * in order to signal the arrival of an HMC protocol message. The command 767 * can be sent by both the management partition and the hypervisor. It is 768 * used for all traffic between the management application and the hypervisor, 769 * regardless of who initiated the communication. 770 * 771 * There is no response to this message. 772 * 773 * Return: 774 * 0 - Success 775 * Non-zero - Failure 776 */ 777 static int ibmvmc_send_msg(struct crq_server_adapter *adapter, 778 struct ibmvmc_buffer *buffer, 779 struct ibmvmc_hmc *hmc, int msg_len) 780 { 781 struct ibmvmc_crq_msg crq_msg; 782 __be64 *crq_as_u64 = (__be64 *)&crq_msg; 783 int rc = 0; 784 785 dev_dbg(adapter->dev, "CRQ send: rdma to HV\n"); 786 rc = h_copy_rdma(msg_len, 787 adapter->liobn, 788 buffer->dma_addr_local, 789 adapter->riobn, 790 buffer->dma_addr_remote); 791 if (rc) { 792 dev_err(adapter->dev, "Error in send_msg, h_copy_rdma rc 0x%x\n", 793 rc); 794 return rc; 795 } 796 797 crq_msg.valid = 0x80; 798 crq_msg.type = VMC_MSG_SIGNAL; 799 crq_msg.status = 0; 800 crq_msg.var1.rsvd = 0; 801 crq_msg.hmc_session = hmc->session; 802 crq_msg.hmc_index = hmc->index; 803 crq_msg.var2.buffer_id = cpu_to_be16(buffer->id); 804 crq_msg.var3.msg_len = cpu_to_be32(msg_len); 805 dev_dbg(adapter->dev, "CRQ send: msg to HV 0x%llx 0x%llx\n", 806 be64_to_cpu(crq_as_u64[0]), be64_to_cpu(crq_as_u64[1])); 807 808 buffer->owner = VMC_BUF_OWNER_HV; 809 ibmvmc_send_crq(adapter, be64_to_cpu(crq_as_u64[0]), 810 be64_to_cpu(crq_as_u64[1])); 811 812 return rc; 813 } 814 815 /** 816 * ibmvmc_open - Open Session 817 * 818 * @inode: inode struct 819 * @file: file struct 820 * 821 * Return: 822 * 0 - Success 823 * Non-zero - Failure 824 */ 825 static int ibmvmc_open(struct inode *inode, struct file *file) 826 { 827 struct ibmvmc_file_session *session; 828 829 pr_debug("%s: inode = 0x%lx, file = 0x%lx, state = 0x%x\n", __func__, 830 (unsigned long)inode, (unsigned long)file, 831 ibmvmc.state); 832 833 session = kzalloc(sizeof(*session), GFP_KERNEL); 834 if (!session) 835 return -ENOMEM; 836 837 session->file = file; 838 file->private_data = session; 839 840 return 0; 841 } 842 843 /** 844 * ibmvmc_close - Close Session 845 * 846 * @inode: inode struct 847 * @file: file struct 848 * 849 * Return: 850 * 0 - Success 851 * Non-zero - Failure 852 */ 853 static int ibmvmc_close(struct inode *inode, struct file *file) 854 { 855 struct ibmvmc_file_session *session; 856 struct ibmvmc_hmc *hmc; 857 int rc = 0; 858 unsigned long flags; 859 860 pr_debug("%s: file = 0x%lx, state = 0x%x\n", __func__, 861 (unsigned long)file, ibmvmc.state); 862 863 session = file->private_data; 864 if (!session) 865 return -EIO; 866 867 hmc = session->hmc; 868 if (hmc) { 869 if (!hmc->adapter) 870 return -EIO; 871 872 if (ibmvmc.state == ibmvmc_state_failed) { 873 dev_warn(hmc->adapter->dev, "close: state_failed\n"); 874 return -EIO; 875 } 876 877 spin_lock_irqsave(&hmc->lock, flags); 878 if (hmc->state >= ibmhmc_state_opening) { 879 rc = ibmvmc_send_close(hmc); 880 if (rc) 881 dev_warn(hmc->adapter->dev, "close: send_close failed.\n"); 882 } 883 spin_unlock_irqrestore(&hmc->lock, flags); 884 } 885 886 kfree_sensitive(session); 887 888 return rc; 889 } 890 891 /** 892 * ibmvmc_read - Read 893 * 894 * @file: file struct 895 * @buf: Character buffer 896 * @nbytes: Size in bytes 897 * @ppos: Offset 898 * 899 * Return: 900 * 0 - Success 901 * Non-zero - Failure 902 */ 903 static ssize_t ibmvmc_read(struct file *file, char *buf, size_t nbytes, 904 loff_t *ppos) 905 { 906 struct ibmvmc_file_session *session; 907 struct ibmvmc_hmc *hmc; 908 struct crq_server_adapter *adapter; 909 struct ibmvmc_buffer *buffer; 910 ssize_t n; 911 ssize_t retval = 0; 912 unsigned long flags; 913 DEFINE_WAIT(wait); 914 915 pr_debug("ibmvmc: read: file = 0x%lx, buf = 0x%lx, nbytes = 0x%lx\n", 916 (unsigned long)file, (unsigned long)buf, 917 (unsigned long)nbytes); 918 919 if (nbytes == 0) 920 return 0; 921 922 if (nbytes > ibmvmc.max_mtu) { 923 pr_warn("ibmvmc: read: nbytes invalid 0x%x\n", 924 (unsigned int)nbytes); 925 return -EINVAL; 926 } 927 928 session = file->private_data; 929 if (!session) { 930 pr_warn("ibmvmc: read: no session\n"); 931 return -EIO; 932 } 933 934 hmc = session->hmc; 935 if (!hmc) { 936 pr_warn("ibmvmc: read: no hmc\n"); 937 return -EIO; 938 } 939 940 adapter = hmc->adapter; 941 if (!adapter) { 942 pr_warn("ibmvmc: read: no adapter\n"); 943 return -EIO; 944 } 945 946 do { 947 prepare_to_wait(&ibmvmc_read_wait, &wait, TASK_INTERRUPTIBLE); 948 949 spin_lock_irqsave(&hmc->lock, flags); 950 if (hmc->queue_tail != hmc->queue_head) 951 /* Data is available */ 952 break; 953 954 spin_unlock_irqrestore(&hmc->lock, flags); 955 956 if (!session->valid) { 957 retval = -EBADFD; 958 goto out; 959 } 960 if (file->f_flags & O_NONBLOCK) { 961 retval = -EAGAIN; 962 goto out; 963 } 964 965 schedule(); 966 967 if (signal_pending(current)) { 968 retval = -ERESTARTSYS; 969 goto out; 970 } 971 } while (1); 972 973 buffer = &(hmc->buffer[hmc->queue_outbound_msgs[hmc->queue_tail]]); 974 hmc->queue_tail++; 975 if (hmc->queue_tail == ibmvmc_max_buf_pool_size) 976 hmc->queue_tail = 0; 977 spin_unlock_irqrestore(&hmc->lock, flags); 978 979 nbytes = min_t(size_t, nbytes, buffer->msg_len); 980 n = copy_to_user((void *)buf, buffer->real_addr_local, nbytes); 981 dev_dbg(adapter->dev, "read: copy to user nbytes = 0x%lx.\n", nbytes); 982 ibmvmc_free_hmc_buffer(hmc, buffer); 983 retval = nbytes; 984 985 if (n) { 986 dev_warn(adapter->dev, "read: copy to user failed.\n"); 987 retval = -EFAULT; 988 } 989 990 out: 991 finish_wait(&ibmvmc_read_wait, &wait); 992 dev_dbg(adapter->dev, "read: out %ld\n", retval); 993 return retval; 994 } 995 996 /** 997 * ibmvmc_poll - Poll 998 * 999 * @file: file struct 1000 * @wait: Poll Table 1001 * 1002 * Return: 1003 * poll.h return values 1004 */ 1005 static unsigned int ibmvmc_poll(struct file *file, poll_table *wait) 1006 { 1007 struct ibmvmc_file_session *session; 1008 struct ibmvmc_hmc *hmc; 1009 unsigned int mask = 0; 1010 1011 session = file->private_data; 1012 if (!session) 1013 return 0; 1014 1015 hmc = session->hmc; 1016 if (!hmc) 1017 return 0; 1018 1019 poll_wait(file, &ibmvmc_read_wait, wait); 1020 1021 if (hmc->queue_head != hmc->queue_tail) 1022 mask |= POLLIN | POLLRDNORM; 1023 1024 return mask; 1025 } 1026 1027 /** 1028 * ibmvmc_write - Write 1029 * 1030 * @file: file struct 1031 * @buffer: Character buffer 1032 * @count: Count field 1033 * @ppos: Offset 1034 * 1035 * Return: 1036 * 0 - Success 1037 * Non-zero - Failure 1038 */ 1039 static ssize_t ibmvmc_write(struct file *file, const char *buffer, 1040 size_t count, loff_t *ppos) 1041 { 1042 struct inode *inode; 1043 struct ibmvmc_buffer *vmc_buffer; 1044 struct ibmvmc_file_session *session; 1045 struct crq_server_adapter *adapter; 1046 struct ibmvmc_hmc *hmc; 1047 unsigned char *buf; 1048 unsigned long flags; 1049 size_t bytes; 1050 const char *p = buffer; 1051 size_t c = count; 1052 int ret = 0; 1053 1054 session = file->private_data; 1055 if (!session) 1056 return -EIO; 1057 1058 hmc = session->hmc; 1059 if (!hmc) 1060 return -EIO; 1061 1062 spin_lock_irqsave(&hmc->lock, flags); 1063 if (hmc->state == ibmhmc_state_free) { 1064 /* HMC connection is not valid (possibly was reset under us). */ 1065 ret = -EIO; 1066 goto out; 1067 } 1068 1069 adapter = hmc->adapter; 1070 if (!adapter) { 1071 ret = -EIO; 1072 goto out; 1073 } 1074 1075 if (count > ibmvmc.max_mtu) { 1076 dev_warn(adapter->dev, "invalid buffer size 0x%lx\n", 1077 (unsigned long)count); 1078 ret = -EIO; 1079 goto out; 1080 } 1081 1082 /* Waiting for the open resp message to the ioctl(1) - retry */ 1083 if (hmc->state == ibmhmc_state_opening) { 1084 ret = -EBUSY; 1085 goto out; 1086 } 1087 1088 /* Make sure the ioctl() was called & the open msg sent, and that 1089 * the HMC connection has not failed. 1090 */ 1091 if (hmc->state != ibmhmc_state_ready) { 1092 ret = -EIO; 1093 goto out; 1094 } 1095 1096 vmc_buffer = ibmvmc_get_valid_hmc_buffer(hmc->index); 1097 if (!vmc_buffer) { 1098 /* No buffer available for the msg send, or we have not yet 1099 * completed the open/open_resp sequence. Retry until this is 1100 * complete. 1101 */ 1102 ret = -EBUSY; 1103 goto out; 1104 } 1105 if (!vmc_buffer->real_addr_local) { 1106 dev_err(adapter->dev, "no buffer storage assigned\n"); 1107 ret = -EIO; 1108 goto out; 1109 } 1110 buf = vmc_buffer->real_addr_local; 1111 1112 while (c > 0) { 1113 bytes = min_t(size_t, c, vmc_buffer->size); 1114 1115 bytes -= copy_from_user(buf, p, bytes); 1116 if (!bytes) { 1117 ret = -EFAULT; 1118 goto out; 1119 } 1120 c -= bytes; 1121 p += bytes; 1122 } 1123 if (p == buffer) 1124 goto out; 1125 1126 inode = file_inode(file); 1127 inode->i_mtime = inode_set_ctime_current(inode); 1128 mark_inode_dirty(inode); 1129 1130 dev_dbg(adapter->dev, "write: file = 0x%lx, count = 0x%lx\n", 1131 (unsigned long)file, (unsigned long)count); 1132 1133 ibmvmc_send_msg(adapter, vmc_buffer, hmc, count); 1134 ret = p - buffer; 1135 out: 1136 spin_unlock_irqrestore(&hmc->lock, flags); 1137 return (ssize_t)(ret); 1138 } 1139 1140 /** 1141 * ibmvmc_setup_hmc - Setup the HMC 1142 * 1143 * @session: ibmvmc_file_session struct 1144 * 1145 * Return: 1146 * 0 - Success 1147 * Non-zero - Failure 1148 */ 1149 static long ibmvmc_setup_hmc(struct ibmvmc_file_session *session) 1150 { 1151 struct ibmvmc_hmc *hmc; 1152 unsigned int valid, free, index; 1153 1154 if (ibmvmc.state == ibmvmc_state_failed) { 1155 pr_warn("ibmvmc: Reserve HMC: state_failed\n"); 1156 return -EIO; 1157 } 1158 1159 if (ibmvmc.state < ibmvmc_state_ready) { 1160 pr_warn("ibmvmc: Reserve HMC: not state_ready\n"); 1161 return -EAGAIN; 1162 } 1163 1164 /* Device is busy until capabilities have been exchanged and we 1165 * have a generic buffer for each possible HMC connection. 1166 */ 1167 for (index = 0; index <= ibmvmc.max_hmc_index; index++) { 1168 valid = 0; 1169 ibmvmc_count_hmc_buffers(index, &valid, &free); 1170 if (valid == 0) { 1171 pr_warn("ibmvmc: buffers not ready for index %d\n", 1172 index); 1173 return -ENOBUFS; 1174 } 1175 } 1176 1177 /* Get an hmc object, and transition to ibmhmc_state_initial */ 1178 hmc = ibmvmc_get_free_hmc(); 1179 if (!hmc) { 1180 pr_warn("%s: free hmc not found\n", __func__); 1181 return -EBUSY; 1182 } 1183 1184 hmc->session = hmc->session + 1; 1185 if (hmc->session == 0xff) 1186 hmc->session = 1; 1187 1188 session->hmc = hmc; 1189 hmc->adapter = &ibmvmc_adapter; 1190 hmc->file_session = session; 1191 session->valid = 1; 1192 1193 return 0; 1194 } 1195 1196 /** 1197 * ibmvmc_ioctl_sethmcid - IOCTL Set HMC ID 1198 * 1199 * @session: ibmvmc_file_session struct 1200 * @new_hmc_id: HMC id field 1201 * 1202 * IOCTL command to setup the hmc id 1203 * 1204 * Return: 1205 * 0 - Success 1206 * Non-zero - Failure 1207 */ 1208 static long ibmvmc_ioctl_sethmcid(struct ibmvmc_file_session *session, 1209 unsigned char __user *new_hmc_id) 1210 { 1211 struct ibmvmc_hmc *hmc; 1212 struct ibmvmc_buffer *buffer; 1213 size_t bytes; 1214 char print_buffer[HMC_ID_LEN + 1]; 1215 unsigned long flags; 1216 long rc = 0; 1217 1218 /* Reserve HMC session */ 1219 hmc = session->hmc; 1220 if (!hmc) { 1221 rc = ibmvmc_setup_hmc(session); 1222 if (rc) 1223 return rc; 1224 1225 hmc = session->hmc; 1226 if (!hmc) { 1227 pr_err("ibmvmc: setup_hmc success but no hmc\n"); 1228 return -EIO; 1229 } 1230 } 1231 1232 if (hmc->state != ibmhmc_state_initial) { 1233 pr_warn("ibmvmc: sethmcid: invalid state to send open 0x%x\n", 1234 hmc->state); 1235 return -EIO; 1236 } 1237 1238 bytes = copy_from_user(hmc->hmc_id, new_hmc_id, HMC_ID_LEN); 1239 if (bytes) 1240 return -EFAULT; 1241 1242 /* Send Open Session command */ 1243 spin_lock_irqsave(&hmc->lock, flags); 1244 buffer = ibmvmc_get_valid_hmc_buffer(hmc->index); 1245 spin_unlock_irqrestore(&hmc->lock, flags); 1246 1247 if (!buffer || !buffer->real_addr_local) { 1248 pr_warn("ibmvmc: sethmcid: no buffer available\n"); 1249 return -EIO; 1250 } 1251 1252 /* Make sure buffer is NULL terminated before trying to print it */ 1253 memset(print_buffer, 0, HMC_ID_LEN + 1); 1254 strncpy(print_buffer, hmc->hmc_id, HMC_ID_LEN); 1255 pr_info("ibmvmc: sethmcid: Set HMC ID: \"%s\"\n", print_buffer); 1256 1257 memcpy(buffer->real_addr_local, hmc->hmc_id, HMC_ID_LEN); 1258 /* RDMA over ID, send open msg, change state to ibmhmc_state_opening */ 1259 rc = ibmvmc_send_open(buffer, hmc); 1260 1261 return rc; 1262 } 1263 1264 /** 1265 * ibmvmc_ioctl_query - IOCTL Query 1266 * 1267 * @session: ibmvmc_file_session struct 1268 * @ret_struct: ibmvmc_query_struct 1269 * 1270 * Return: 1271 * 0 - Success 1272 * Non-zero - Failure 1273 */ 1274 static long ibmvmc_ioctl_query(struct ibmvmc_file_session *session, 1275 struct ibmvmc_query_struct __user *ret_struct) 1276 { 1277 struct ibmvmc_query_struct query_struct; 1278 size_t bytes; 1279 1280 memset(&query_struct, 0, sizeof(query_struct)); 1281 query_struct.have_vmc = (ibmvmc.state > ibmvmc_state_initial); 1282 query_struct.state = ibmvmc.state; 1283 query_struct.vmc_drc_index = ibmvmc.vmc_drc_index; 1284 1285 bytes = copy_to_user(ret_struct, &query_struct, 1286 sizeof(query_struct)); 1287 if (bytes) 1288 return -EFAULT; 1289 1290 return 0; 1291 } 1292 1293 /** 1294 * ibmvmc_ioctl_requestvmc - IOCTL Request VMC 1295 * 1296 * @session: ibmvmc_file_session struct 1297 * @ret_vmc_index: VMC Index 1298 * 1299 * Return: 1300 * 0 - Success 1301 * Non-zero - Failure 1302 */ 1303 static long ibmvmc_ioctl_requestvmc(struct ibmvmc_file_session *session, 1304 u32 __user *ret_vmc_index) 1305 { 1306 /* TODO: (adreznec) Add locking to control multiple process access */ 1307 size_t bytes; 1308 long rc; 1309 u32 vmc_drc_index; 1310 1311 /* Call to request the VMC device from phyp*/ 1312 rc = h_request_vmc(&vmc_drc_index); 1313 pr_debug("ibmvmc: requestvmc: H_REQUEST_VMC rc = 0x%lx\n", rc); 1314 1315 if (rc == H_SUCCESS) { 1316 rc = 0; 1317 } else if (rc == H_FUNCTION) { 1318 pr_err("ibmvmc: requestvmc: h_request_vmc not supported\n"); 1319 return -EPERM; 1320 } else if (rc == H_AUTHORITY) { 1321 pr_err("ibmvmc: requestvmc: hypervisor denied vmc request\n"); 1322 return -EPERM; 1323 } else if (rc == H_HARDWARE) { 1324 pr_err("ibmvmc: requestvmc: hypervisor hardware fault\n"); 1325 return -EIO; 1326 } else if (rc == H_RESOURCE) { 1327 pr_err("ibmvmc: requestvmc: vmc resource unavailable\n"); 1328 return -ENODEV; 1329 } else if (rc == H_NOT_AVAILABLE) { 1330 pr_err("ibmvmc: requestvmc: system cannot be vmc managed\n"); 1331 return -EPERM; 1332 } else if (rc == H_PARAMETER) { 1333 pr_err("ibmvmc: requestvmc: invalid parameter\n"); 1334 return -EINVAL; 1335 } 1336 1337 /* Success, set the vmc index in global struct */ 1338 ibmvmc.vmc_drc_index = vmc_drc_index; 1339 1340 bytes = copy_to_user(ret_vmc_index, &vmc_drc_index, 1341 sizeof(*ret_vmc_index)); 1342 if (bytes) { 1343 pr_warn("ibmvmc: requestvmc: copy to user failed.\n"); 1344 return -EFAULT; 1345 } 1346 return rc; 1347 } 1348 1349 /** 1350 * ibmvmc_ioctl - IOCTL 1351 * 1352 * @file: file information 1353 * @cmd: cmd field 1354 * @arg: Argument field 1355 * 1356 * Return: 1357 * 0 - Success 1358 * Non-zero - Failure 1359 */ 1360 static long ibmvmc_ioctl(struct file *file, 1361 unsigned int cmd, unsigned long arg) 1362 { 1363 struct ibmvmc_file_session *session = file->private_data; 1364 1365 pr_debug("ibmvmc: ioctl file=0x%lx, cmd=0x%x, arg=0x%lx, ses=0x%lx\n", 1366 (unsigned long)file, cmd, arg, 1367 (unsigned long)session); 1368 1369 if (!session) { 1370 pr_warn("ibmvmc: ioctl: no session\n"); 1371 return -EIO; 1372 } 1373 1374 switch (cmd) { 1375 case VMC_IOCTL_SETHMCID: 1376 return ibmvmc_ioctl_sethmcid(session, 1377 (unsigned char __user *)arg); 1378 case VMC_IOCTL_QUERY: 1379 return ibmvmc_ioctl_query(session, 1380 (struct ibmvmc_query_struct __user *)arg); 1381 case VMC_IOCTL_REQUESTVMC: 1382 return ibmvmc_ioctl_requestvmc(session, 1383 (unsigned int __user *)arg); 1384 default: 1385 pr_warn("ibmvmc: unknown ioctl 0x%x\n", cmd); 1386 return -EINVAL; 1387 } 1388 } 1389 1390 static const struct file_operations ibmvmc_fops = { 1391 .owner = THIS_MODULE, 1392 .read = ibmvmc_read, 1393 .write = ibmvmc_write, 1394 .poll = ibmvmc_poll, 1395 .unlocked_ioctl = ibmvmc_ioctl, 1396 .open = ibmvmc_open, 1397 .release = ibmvmc_close, 1398 }; 1399 1400 /** 1401 * ibmvmc_add_buffer - Add Buffer 1402 * 1403 * @adapter: crq_server_adapter struct 1404 * @crq: ibmvmc_crq_msg struct 1405 * 1406 * This message transfers a buffer from hypervisor ownership to management 1407 * partition ownership. The LIOBA is obtained from the virtual TCE table 1408 * associated with the hypervisor side of the VMC device, and points to a 1409 * buffer of size MTU (as established in the capabilities exchange). 1410 * 1411 * Typical flow for ading buffers: 1412 * 1. A new management application connection is opened by the management 1413 * partition. 1414 * 2. The hypervisor assigns new buffers for the traffic associated with 1415 * that connection. 1416 * 3. The hypervisor sends VMC Add Buffer messages to the management 1417 * partition, informing it of the new buffers. 1418 * 4. The hypervisor sends an HMC protocol message (to the management 1419 * application) notifying it of the new buffers. This informs the 1420 * application that it has buffers available for sending HMC 1421 * commands. 1422 * 1423 * Return: 1424 * 0 - Success 1425 * Non-zero - Failure 1426 */ 1427 static int ibmvmc_add_buffer(struct crq_server_adapter *adapter, 1428 struct ibmvmc_crq_msg *crq) 1429 { 1430 struct ibmvmc_buffer *buffer; 1431 u8 hmc_index; 1432 u8 hmc_session; 1433 u16 buffer_id; 1434 unsigned long flags; 1435 int rc = 0; 1436 1437 if (!crq) 1438 return -1; 1439 1440 hmc_session = crq->hmc_session; 1441 hmc_index = crq->hmc_index; 1442 buffer_id = be16_to_cpu(crq->var2.buffer_id); 1443 1444 if (hmc_index > ibmvmc.max_hmc_index) { 1445 dev_err(adapter->dev, "add_buffer: invalid hmc_index = 0x%x\n", 1446 hmc_index); 1447 ibmvmc_send_add_buffer_resp(adapter, VMC_MSG_INVALID_HMC_INDEX, 1448 hmc_session, hmc_index, buffer_id); 1449 return -1; 1450 } 1451 1452 if (buffer_id >= ibmvmc.max_buffer_pool_size) { 1453 dev_err(adapter->dev, "add_buffer: invalid buffer_id = 0x%x\n", 1454 buffer_id); 1455 ibmvmc_send_add_buffer_resp(adapter, VMC_MSG_INVALID_BUFFER_ID, 1456 hmc_session, hmc_index, buffer_id); 1457 return -1; 1458 } 1459 1460 spin_lock_irqsave(&hmcs[hmc_index].lock, flags); 1461 buffer = &hmcs[hmc_index].buffer[buffer_id]; 1462 1463 if (buffer->real_addr_local || buffer->dma_addr_local) { 1464 dev_warn(adapter->dev, "add_buffer: already allocated id = 0x%lx\n", 1465 (unsigned long)buffer_id); 1466 spin_unlock_irqrestore(&hmcs[hmc_index].lock, flags); 1467 ibmvmc_send_add_buffer_resp(adapter, VMC_MSG_INVALID_BUFFER_ID, 1468 hmc_session, hmc_index, buffer_id); 1469 return -1; 1470 } 1471 1472 buffer->real_addr_local = alloc_dma_buffer(to_vio_dev(adapter->dev), 1473 ibmvmc.max_mtu, 1474 &buffer->dma_addr_local); 1475 1476 if (!buffer->real_addr_local) { 1477 dev_err(adapter->dev, "add_buffer: alloc_dma_buffer failed.\n"); 1478 spin_unlock_irqrestore(&hmcs[hmc_index].lock, flags); 1479 ibmvmc_send_add_buffer_resp(adapter, VMC_MSG_INTERFACE_FAILURE, 1480 hmc_session, hmc_index, buffer_id); 1481 return -1; 1482 } 1483 1484 buffer->dma_addr_remote = be32_to_cpu(crq->var3.lioba); 1485 buffer->size = ibmvmc.max_mtu; 1486 buffer->owner = crq->var1.owner; 1487 buffer->free = 1; 1488 /* Must ensure valid==1 is observable only after all other fields are */ 1489 dma_wmb(); 1490 buffer->valid = 1; 1491 buffer->id = buffer_id; 1492 1493 dev_dbg(adapter->dev, "add_buffer: successfully added a buffer:\n"); 1494 dev_dbg(adapter->dev, " index: %d, session: %d, buffer: 0x%x, owner: %d\n", 1495 hmc_index, hmc_session, buffer_id, buffer->owner); 1496 dev_dbg(adapter->dev, " local: 0x%x, remote: 0x%x\n", 1497 (u32)buffer->dma_addr_local, 1498 (u32)buffer->dma_addr_remote); 1499 spin_unlock_irqrestore(&hmcs[hmc_index].lock, flags); 1500 1501 ibmvmc_send_add_buffer_resp(adapter, VMC_MSG_SUCCESS, hmc_session, 1502 hmc_index, buffer_id); 1503 1504 return rc; 1505 } 1506 1507 /** 1508 * ibmvmc_rem_buffer - Remove Buffer 1509 * 1510 * @adapter: crq_server_adapter struct 1511 * @crq: ibmvmc_crq_msg struct 1512 * 1513 * This message requests an HMC buffer to be transferred from management 1514 * partition ownership to hypervisor ownership. The management partition may 1515 * not be able to satisfy the request at a particular point in time if all its 1516 * buffers are in use. The management partition requires a depth of at least 1517 * one inbound buffer to allow management application commands to flow to the 1518 * hypervisor. It is, therefore, an interface error for the hypervisor to 1519 * attempt to remove the management partition's last buffer. 1520 * 1521 * The hypervisor is expected to manage buffer usage with the management 1522 * application directly and inform the management partition when buffers may be 1523 * removed. The typical flow for removing buffers: 1524 * 1525 * 1. The management application no longer needs a communication path to a 1526 * particular hypervisor function. That function is closed. 1527 * 2. The hypervisor and the management application quiesce all traffic to that 1528 * function. The hypervisor requests a reduction in buffer pool size. 1529 * 3. The management application acknowledges the reduction in buffer pool size. 1530 * 4. The hypervisor sends a Remove Buffer message to the management partition, 1531 * informing it of the reduction in buffers. 1532 * 5. The management partition verifies it can remove the buffer. This is 1533 * possible if buffers have been quiesced. 1534 * 1535 * Return: 1536 * 0 - Success 1537 * Non-zero - Failure 1538 */ 1539 /* 1540 * The hypervisor requested that we pick an unused buffer, and return it. 1541 * Before sending the buffer back, we free any storage associated with the 1542 * buffer. 1543 */ 1544 static int ibmvmc_rem_buffer(struct crq_server_adapter *adapter, 1545 struct ibmvmc_crq_msg *crq) 1546 { 1547 struct ibmvmc_buffer *buffer; 1548 u8 hmc_index; 1549 u8 hmc_session; 1550 u16 buffer_id = 0; 1551 unsigned long flags; 1552 int rc = 0; 1553 1554 if (!crq) 1555 return -1; 1556 1557 hmc_session = crq->hmc_session; 1558 hmc_index = crq->hmc_index; 1559 1560 if (hmc_index > ibmvmc.max_hmc_index) { 1561 dev_warn(adapter->dev, "rem_buffer: invalid hmc_index = 0x%x\n", 1562 hmc_index); 1563 ibmvmc_send_rem_buffer_resp(adapter, VMC_MSG_INVALID_HMC_INDEX, 1564 hmc_session, hmc_index, buffer_id); 1565 return -1; 1566 } 1567 1568 spin_lock_irqsave(&hmcs[hmc_index].lock, flags); 1569 buffer = ibmvmc_get_free_hmc_buffer(adapter, hmc_index); 1570 if (!buffer) { 1571 dev_info(adapter->dev, "rem_buffer: no buffer to remove\n"); 1572 spin_unlock_irqrestore(&hmcs[hmc_index].lock, flags); 1573 ibmvmc_send_rem_buffer_resp(adapter, VMC_MSG_NO_BUFFER, 1574 hmc_session, hmc_index, 1575 VMC_INVALID_BUFFER_ID); 1576 return -1; 1577 } 1578 1579 buffer_id = buffer->id; 1580 1581 if (buffer->valid) 1582 free_dma_buffer(to_vio_dev(adapter->dev), 1583 ibmvmc.max_mtu, 1584 buffer->real_addr_local, 1585 buffer->dma_addr_local); 1586 1587 memset(buffer, 0, sizeof(struct ibmvmc_buffer)); 1588 spin_unlock_irqrestore(&hmcs[hmc_index].lock, flags); 1589 1590 dev_dbg(adapter->dev, "rem_buffer: removed buffer 0x%x.\n", buffer_id); 1591 ibmvmc_send_rem_buffer_resp(adapter, VMC_MSG_SUCCESS, hmc_session, 1592 hmc_index, buffer_id); 1593 1594 return rc; 1595 } 1596 1597 static int ibmvmc_recv_msg(struct crq_server_adapter *adapter, 1598 struct ibmvmc_crq_msg *crq) 1599 { 1600 struct ibmvmc_buffer *buffer; 1601 struct ibmvmc_hmc *hmc; 1602 unsigned long msg_len; 1603 u8 hmc_index; 1604 u8 hmc_session; 1605 u16 buffer_id; 1606 unsigned long flags; 1607 int rc = 0; 1608 1609 if (!crq) 1610 return -1; 1611 1612 /* Hypervisor writes CRQs directly into our memory in big endian */ 1613 dev_dbg(adapter->dev, "Recv_msg: msg from HV 0x%016llx 0x%016llx\n", 1614 be64_to_cpu(*((unsigned long *)crq)), 1615 be64_to_cpu(*(((unsigned long *)crq) + 1))); 1616 1617 hmc_session = crq->hmc_session; 1618 hmc_index = crq->hmc_index; 1619 buffer_id = be16_to_cpu(crq->var2.buffer_id); 1620 msg_len = be32_to_cpu(crq->var3.msg_len); 1621 1622 if (hmc_index > ibmvmc.max_hmc_index) { 1623 dev_err(adapter->dev, "Recv_msg: invalid hmc_index = 0x%x\n", 1624 hmc_index); 1625 ibmvmc_send_add_buffer_resp(adapter, VMC_MSG_INVALID_HMC_INDEX, 1626 hmc_session, hmc_index, buffer_id); 1627 return -1; 1628 } 1629 1630 if (buffer_id >= ibmvmc.max_buffer_pool_size) { 1631 dev_err(adapter->dev, "Recv_msg: invalid buffer_id = 0x%x\n", 1632 buffer_id); 1633 ibmvmc_send_add_buffer_resp(adapter, VMC_MSG_INVALID_BUFFER_ID, 1634 hmc_session, hmc_index, buffer_id); 1635 return -1; 1636 } 1637 1638 hmc = &hmcs[hmc_index]; 1639 spin_lock_irqsave(&hmc->lock, flags); 1640 1641 if (hmc->state == ibmhmc_state_free) { 1642 dev_err(adapter->dev, "Recv_msg: invalid hmc state = 0x%x\n", 1643 hmc->state); 1644 /* HMC connection is not valid (possibly was reset under us). */ 1645 spin_unlock_irqrestore(&hmc->lock, flags); 1646 return -1; 1647 } 1648 1649 buffer = &hmc->buffer[buffer_id]; 1650 1651 if (buffer->valid == 0 || buffer->owner == VMC_BUF_OWNER_ALPHA) { 1652 dev_err(adapter->dev, "Recv_msg: not valid, or not HV. 0x%x 0x%x\n", 1653 buffer->valid, buffer->owner); 1654 spin_unlock_irqrestore(&hmc->lock, flags); 1655 return -1; 1656 } 1657 1658 /* RDMA the data into the partition. */ 1659 rc = h_copy_rdma(msg_len, 1660 adapter->riobn, 1661 buffer->dma_addr_remote, 1662 adapter->liobn, 1663 buffer->dma_addr_local); 1664 1665 dev_dbg(adapter->dev, "Recv_msg: msg_len = 0x%x, buffer_id = 0x%x, queue_head = 0x%x, hmc_idx = 0x%x\n", 1666 (unsigned int)msg_len, (unsigned int)buffer_id, 1667 (unsigned int)hmc->queue_head, (unsigned int)hmc_index); 1668 buffer->msg_len = msg_len; 1669 buffer->free = 0; 1670 buffer->owner = VMC_BUF_OWNER_ALPHA; 1671 1672 if (rc) { 1673 dev_err(adapter->dev, "Failure in recv_msg: h_copy_rdma = 0x%x\n", 1674 rc); 1675 spin_unlock_irqrestore(&hmc->lock, flags); 1676 return -1; 1677 } 1678 1679 /* Must be locked because read operates on the same data */ 1680 hmc->queue_outbound_msgs[hmc->queue_head] = buffer_id; 1681 hmc->queue_head++; 1682 if (hmc->queue_head == ibmvmc_max_buf_pool_size) 1683 hmc->queue_head = 0; 1684 1685 if (hmc->queue_head == hmc->queue_tail) 1686 dev_err(adapter->dev, "outbound buffer queue wrapped.\n"); 1687 1688 spin_unlock_irqrestore(&hmc->lock, flags); 1689 1690 wake_up_interruptible(&ibmvmc_read_wait); 1691 1692 return 0; 1693 } 1694 1695 /** 1696 * ibmvmc_process_capabilities - Process Capabilities 1697 * 1698 * @adapter: crq_server_adapter struct 1699 * @crqp: ibmvmc_crq_msg struct 1700 * 1701 */ 1702 static void ibmvmc_process_capabilities(struct crq_server_adapter *adapter, 1703 struct ibmvmc_crq_msg *crqp) 1704 { 1705 struct ibmvmc_admin_crq_msg *crq = (struct ibmvmc_admin_crq_msg *)crqp; 1706 1707 if ((be16_to_cpu(crq->version) >> 8) != 1708 (IBMVMC_PROTOCOL_VERSION >> 8)) { 1709 dev_err(adapter->dev, "init failed, incompatible versions 0x%x 0x%x\n", 1710 be16_to_cpu(crq->version), 1711 IBMVMC_PROTOCOL_VERSION); 1712 ibmvmc.state = ibmvmc_state_failed; 1713 return; 1714 } 1715 1716 ibmvmc.max_mtu = min_t(u32, ibmvmc_max_mtu, be32_to_cpu(crq->max_mtu)); 1717 ibmvmc.max_buffer_pool_size = min_t(u16, ibmvmc_max_buf_pool_size, 1718 be16_to_cpu(crq->pool_size)); 1719 ibmvmc.max_hmc_index = min_t(u8, ibmvmc_max_hmcs, crq->max_hmc) - 1; 1720 ibmvmc.state = ibmvmc_state_ready; 1721 1722 dev_info(adapter->dev, "Capabilities: mtu=0x%x, pool_size=0x%x, max_hmc=0x%x\n", 1723 ibmvmc.max_mtu, ibmvmc.max_buffer_pool_size, 1724 ibmvmc.max_hmc_index); 1725 } 1726 1727 /** 1728 * ibmvmc_validate_hmc_session - Validate HMC Session 1729 * 1730 * @adapter: crq_server_adapter struct 1731 * @crq: ibmvmc_crq_msg struct 1732 * 1733 * Return: 1734 * 0 - Success 1735 * Non-zero - Failure 1736 */ 1737 static int ibmvmc_validate_hmc_session(struct crq_server_adapter *adapter, 1738 struct ibmvmc_crq_msg *crq) 1739 { 1740 unsigned char hmc_index; 1741 1742 hmc_index = crq->hmc_index; 1743 1744 if (crq->hmc_session == 0) 1745 return 0; 1746 1747 if (hmc_index > ibmvmc.max_hmc_index) 1748 return -1; 1749 1750 if (hmcs[hmc_index].session != crq->hmc_session) { 1751 dev_warn(adapter->dev, "Drop, bad session: expected 0x%x, recv 0x%x\n", 1752 hmcs[hmc_index].session, crq->hmc_session); 1753 return -1; 1754 } 1755 1756 return 0; 1757 } 1758 1759 /** 1760 * ibmvmc_reset - Reset 1761 * 1762 * @adapter: crq_server_adapter struct 1763 * @xport_event: export_event field 1764 * 1765 * Closes all HMC sessions and conditionally schedules a CRQ reset. 1766 * @xport_event: If true, the partner closed their CRQ; we don't need to reset. 1767 * If false, we need to schedule a CRQ reset. 1768 */ 1769 static void ibmvmc_reset(struct crq_server_adapter *adapter, bool xport_event) 1770 { 1771 int i; 1772 1773 if (ibmvmc.state != ibmvmc_state_sched_reset) { 1774 dev_info(adapter->dev, "*** Reset to initial state.\n"); 1775 for (i = 0; i < ibmvmc_max_hmcs; i++) 1776 ibmvmc_return_hmc(&hmcs[i], xport_event); 1777 1778 if (xport_event) { 1779 /* CRQ was closed by the partner. We don't need to do 1780 * anything except set ourself to the correct state to 1781 * handle init msgs. 1782 */ 1783 ibmvmc.state = ibmvmc_state_crqinit; 1784 } else { 1785 /* The partner did not close their CRQ - instead, we're 1786 * closing the CRQ on our end. Need to schedule this 1787 * for process context, because CRQ reset may require a 1788 * sleep. 1789 * 1790 * Setting ibmvmc.state here immediately prevents 1791 * ibmvmc_open from completing until the reset 1792 * completes in process context. 1793 */ 1794 ibmvmc.state = ibmvmc_state_sched_reset; 1795 dev_dbg(adapter->dev, "Device reset scheduled"); 1796 wake_up_interruptible(&adapter->reset_wait_queue); 1797 } 1798 } 1799 } 1800 1801 /** 1802 * ibmvmc_reset_task - Reset Task 1803 * 1804 * @data: Data field 1805 * 1806 * Performs a CRQ reset of the VMC device in process context. 1807 * NOTE: This function should not be called directly, use ibmvmc_reset. 1808 */ 1809 static int ibmvmc_reset_task(void *data) 1810 { 1811 struct crq_server_adapter *adapter = data; 1812 int rc; 1813 1814 set_user_nice(current, -20); 1815 1816 while (!kthread_should_stop()) { 1817 wait_event_interruptible(adapter->reset_wait_queue, 1818 (ibmvmc.state == ibmvmc_state_sched_reset) || 1819 kthread_should_stop()); 1820 1821 if (kthread_should_stop()) 1822 break; 1823 1824 dev_dbg(adapter->dev, "CRQ resetting in process context"); 1825 tasklet_disable(&adapter->work_task); 1826 1827 rc = ibmvmc_reset_crq_queue(adapter); 1828 1829 if (rc != H_SUCCESS && rc != H_RESOURCE) { 1830 dev_err(adapter->dev, "Error initializing CRQ. rc = 0x%x\n", 1831 rc); 1832 ibmvmc.state = ibmvmc_state_failed; 1833 } else { 1834 ibmvmc.state = ibmvmc_state_crqinit; 1835 1836 if (ibmvmc_send_crq(adapter, 0xC001000000000000LL, 0) 1837 != 0 && rc != H_RESOURCE) 1838 dev_warn(adapter->dev, "Failed to send initialize CRQ message\n"); 1839 } 1840 1841 vio_enable_interrupts(to_vio_dev(adapter->dev)); 1842 tasklet_enable(&adapter->work_task); 1843 } 1844 1845 return 0; 1846 } 1847 1848 /** 1849 * ibmvmc_process_open_resp - Process Open Response 1850 * 1851 * @crq: ibmvmc_crq_msg struct 1852 * @adapter: crq_server_adapter struct 1853 * 1854 * This command is sent by the hypervisor in response to the Interface 1855 * Open message. When this message is received, the indicated buffer is 1856 * again available for management partition use. 1857 */ 1858 static void ibmvmc_process_open_resp(struct ibmvmc_crq_msg *crq, 1859 struct crq_server_adapter *adapter) 1860 { 1861 unsigned char hmc_index; 1862 unsigned short buffer_id; 1863 1864 hmc_index = crq->hmc_index; 1865 if (hmc_index > ibmvmc.max_hmc_index) { 1866 /* Why would PHYP give an index > max negotiated? */ 1867 ibmvmc_reset(adapter, false); 1868 return; 1869 } 1870 1871 if (crq->status) { 1872 dev_warn(adapter->dev, "open_resp: failed - status 0x%x\n", 1873 crq->status); 1874 ibmvmc_return_hmc(&hmcs[hmc_index], false); 1875 return; 1876 } 1877 1878 if (hmcs[hmc_index].state == ibmhmc_state_opening) { 1879 buffer_id = be16_to_cpu(crq->var2.buffer_id); 1880 if (buffer_id >= ibmvmc.max_buffer_pool_size) { 1881 dev_err(adapter->dev, "open_resp: invalid buffer_id = 0x%x\n", 1882 buffer_id); 1883 hmcs[hmc_index].state = ibmhmc_state_failed; 1884 } else { 1885 ibmvmc_free_hmc_buffer(&hmcs[hmc_index], 1886 &hmcs[hmc_index].buffer[buffer_id]); 1887 hmcs[hmc_index].state = ibmhmc_state_ready; 1888 dev_dbg(adapter->dev, "open_resp: set hmc state = ready\n"); 1889 } 1890 } else { 1891 dev_warn(adapter->dev, "open_resp: invalid hmc state (0x%x)\n", 1892 hmcs[hmc_index].state); 1893 } 1894 } 1895 1896 /** 1897 * ibmvmc_process_close_resp - Process Close Response 1898 * 1899 * @crq: ibmvmc_crq_msg struct 1900 * @adapter: crq_server_adapter struct 1901 * 1902 * This command is sent by the hypervisor in response to the managemant 1903 * application Interface Close message. 1904 * 1905 * If the close fails, simply reset the entire driver as the state of the VMC 1906 * must be in tough shape. 1907 */ 1908 static void ibmvmc_process_close_resp(struct ibmvmc_crq_msg *crq, 1909 struct crq_server_adapter *adapter) 1910 { 1911 unsigned char hmc_index; 1912 1913 hmc_index = crq->hmc_index; 1914 if (hmc_index > ibmvmc.max_hmc_index) { 1915 ibmvmc_reset(adapter, false); 1916 return; 1917 } 1918 1919 if (crq->status) { 1920 dev_warn(adapter->dev, "close_resp: failed - status 0x%x\n", 1921 crq->status); 1922 ibmvmc_reset(adapter, false); 1923 return; 1924 } 1925 1926 ibmvmc_return_hmc(&hmcs[hmc_index], false); 1927 } 1928 1929 /** 1930 * ibmvmc_crq_process - Process CRQ 1931 * 1932 * @adapter: crq_server_adapter struct 1933 * @crq: ibmvmc_crq_msg struct 1934 * 1935 * Process the CRQ message based upon the type of message received. 1936 * 1937 */ 1938 static void ibmvmc_crq_process(struct crq_server_adapter *adapter, 1939 struct ibmvmc_crq_msg *crq) 1940 { 1941 switch (crq->type) { 1942 case VMC_MSG_CAP_RESP: 1943 dev_dbg(adapter->dev, "CRQ recv: capabilities resp (0x%x)\n", 1944 crq->type); 1945 if (ibmvmc.state == ibmvmc_state_capabilities) 1946 ibmvmc_process_capabilities(adapter, crq); 1947 else 1948 dev_warn(adapter->dev, "caps msg invalid in state 0x%x\n", 1949 ibmvmc.state); 1950 break; 1951 case VMC_MSG_OPEN_RESP: 1952 dev_dbg(adapter->dev, "CRQ recv: open resp (0x%x)\n", 1953 crq->type); 1954 if (ibmvmc_validate_hmc_session(adapter, crq) == 0) 1955 ibmvmc_process_open_resp(crq, adapter); 1956 break; 1957 case VMC_MSG_ADD_BUF: 1958 dev_dbg(adapter->dev, "CRQ recv: add buf (0x%x)\n", 1959 crq->type); 1960 if (ibmvmc_validate_hmc_session(adapter, crq) == 0) 1961 ibmvmc_add_buffer(adapter, crq); 1962 break; 1963 case VMC_MSG_REM_BUF: 1964 dev_dbg(adapter->dev, "CRQ recv: rem buf (0x%x)\n", 1965 crq->type); 1966 if (ibmvmc_validate_hmc_session(adapter, crq) == 0) 1967 ibmvmc_rem_buffer(adapter, crq); 1968 break; 1969 case VMC_MSG_SIGNAL: 1970 dev_dbg(adapter->dev, "CRQ recv: signal msg (0x%x)\n", 1971 crq->type); 1972 if (ibmvmc_validate_hmc_session(adapter, crq) == 0) 1973 ibmvmc_recv_msg(adapter, crq); 1974 break; 1975 case VMC_MSG_CLOSE_RESP: 1976 dev_dbg(adapter->dev, "CRQ recv: close resp (0x%x)\n", 1977 crq->type); 1978 if (ibmvmc_validate_hmc_session(adapter, crq) == 0) 1979 ibmvmc_process_close_resp(crq, adapter); 1980 break; 1981 case VMC_MSG_CAP: 1982 case VMC_MSG_OPEN: 1983 case VMC_MSG_CLOSE: 1984 case VMC_MSG_ADD_BUF_RESP: 1985 case VMC_MSG_REM_BUF_RESP: 1986 dev_warn(adapter->dev, "CRQ recv: unexpected msg (0x%x)\n", 1987 crq->type); 1988 break; 1989 default: 1990 dev_warn(adapter->dev, "CRQ recv: unknown msg (0x%x)\n", 1991 crq->type); 1992 break; 1993 } 1994 } 1995 1996 /** 1997 * ibmvmc_handle_crq_init - Handle CRQ Init 1998 * 1999 * @crq: ibmvmc_crq_msg struct 2000 * @adapter: crq_server_adapter struct 2001 * 2002 * Handle the type of crq initialization based on whether 2003 * it is a message or a response. 2004 * 2005 */ 2006 static void ibmvmc_handle_crq_init(struct ibmvmc_crq_msg *crq, 2007 struct crq_server_adapter *adapter) 2008 { 2009 switch (crq->type) { 2010 case 0x01: /* Initialization message */ 2011 dev_dbg(adapter->dev, "CRQ recv: CRQ init msg - state 0x%x\n", 2012 ibmvmc.state); 2013 if (ibmvmc.state == ibmvmc_state_crqinit) { 2014 /* Send back a response */ 2015 if (ibmvmc_send_crq(adapter, 0xC002000000000000, 2016 0) == 0) 2017 ibmvmc_send_capabilities(adapter); 2018 else 2019 dev_err(adapter->dev, " Unable to send init rsp\n"); 2020 } else { 2021 dev_err(adapter->dev, "Invalid state 0x%x mtu = 0x%x\n", 2022 ibmvmc.state, ibmvmc.max_mtu); 2023 } 2024 2025 break; 2026 case 0x02: /* Initialization response */ 2027 dev_dbg(adapter->dev, "CRQ recv: initialization resp msg - state 0x%x\n", 2028 ibmvmc.state); 2029 if (ibmvmc.state == ibmvmc_state_crqinit) 2030 ibmvmc_send_capabilities(adapter); 2031 break; 2032 default: 2033 dev_warn(adapter->dev, "Unknown crq message type 0x%lx\n", 2034 (unsigned long)crq->type); 2035 } 2036 } 2037 2038 /** 2039 * ibmvmc_handle_crq - Handle CRQ 2040 * 2041 * @crq: ibmvmc_crq_msg struct 2042 * @adapter: crq_server_adapter struct 2043 * 2044 * Read the command elements from the command queue and execute the 2045 * requests based upon the type of crq message. 2046 * 2047 */ 2048 static void ibmvmc_handle_crq(struct ibmvmc_crq_msg *crq, 2049 struct crq_server_adapter *adapter) 2050 { 2051 switch (crq->valid) { 2052 case 0xC0: /* initialization */ 2053 ibmvmc_handle_crq_init(crq, adapter); 2054 break; 2055 case 0xFF: /* Hypervisor telling us the connection is closed */ 2056 dev_warn(adapter->dev, "CRQ recv: virtual adapter failed - resetting.\n"); 2057 ibmvmc_reset(adapter, true); 2058 break; 2059 case 0x80: /* real payload */ 2060 ibmvmc_crq_process(adapter, crq); 2061 break; 2062 default: 2063 dev_warn(adapter->dev, "CRQ recv: unknown msg 0x%02x.\n", 2064 crq->valid); 2065 break; 2066 } 2067 } 2068 2069 static void ibmvmc_task(unsigned long data) 2070 { 2071 struct crq_server_adapter *adapter = 2072 (struct crq_server_adapter *)data; 2073 struct vio_dev *vdev = to_vio_dev(adapter->dev); 2074 struct ibmvmc_crq_msg *crq; 2075 int done = 0; 2076 2077 while (!done) { 2078 /* Pull all the valid messages off the CRQ */ 2079 while ((crq = crq_queue_next_crq(&adapter->queue)) != NULL) { 2080 ibmvmc_handle_crq(crq, adapter); 2081 crq->valid = 0x00; 2082 /* CRQ reset was requested, stop processing CRQs. 2083 * Interrupts will be re-enabled by the reset task. 2084 */ 2085 if (ibmvmc.state == ibmvmc_state_sched_reset) 2086 return; 2087 } 2088 2089 vio_enable_interrupts(vdev); 2090 crq = crq_queue_next_crq(&adapter->queue); 2091 if (crq) { 2092 vio_disable_interrupts(vdev); 2093 ibmvmc_handle_crq(crq, adapter); 2094 crq->valid = 0x00; 2095 /* CRQ reset was requested, stop processing CRQs. 2096 * Interrupts will be re-enabled by the reset task. 2097 */ 2098 if (ibmvmc.state == ibmvmc_state_sched_reset) 2099 return; 2100 } else { 2101 done = 1; 2102 } 2103 } 2104 } 2105 2106 /** 2107 * ibmvmc_init_crq_queue - Init CRQ Queue 2108 * 2109 * @adapter: crq_server_adapter struct 2110 * 2111 * Return: 2112 * 0 - Success 2113 * Non-zero - Failure 2114 */ 2115 static int ibmvmc_init_crq_queue(struct crq_server_adapter *adapter) 2116 { 2117 struct vio_dev *vdev = to_vio_dev(adapter->dev); 2118 struct crq_queue *queue = &adapter->queue; 2119 int rc = 0; 2120 int retrc = 0; 2121 2122 queue->msgs = (struct ibmvmc_crq_msg *)get_zeroed_page(GFP_KERNEL); 2123 2124 if (!queue->msgs) 2125 goto malloc_failed; 2126 2127 queue->size = PAGE_SIZE / sizeof(*queue->msgs); 2128 2129 queue->msg_token = dma_map_single(adapter->dev, queue->msgs, 2130 queue->size * sizeof(*queue->msgs), 2131 DMA_BIDIRECTIONAL); 2132 2133 if (dma_mapping_error(adapter->dev, queue->msg_token)) 2134 goto map_failed; 2135 2136 retrc = plpar_hcall_norets(H_REG_CRQ, 2137 vdev->unit_address, 2138 queue->msg_token, PAGE_SIZE); 2139 rc = retrc; 2140 2141 if (rc == H_RESOURCE) 2142 rc = ibmvmc_reset_crq_queue(adapter); 2143 2144 if (rc == 2) { 2145 dev_warn(adapter->dev, "Partner adapter not ready\n"); 2146 retrc = 0; 2147 } else if (rc != 0) { 2148 dev_err(adapter->dev, "Error %d opening adapter\n", rc); 2149 goto reg_crq_failed; 2150 } 2151 2152 queue->cur = 0; 2153 spin_lock_init(&queue->lock); 2154 2155 tasklet_init(&adapter->work_task, ibmvmc_task, (unsigned long)adapter); 2156 2157 if (request_irq(vdev->irq, 2158 ibmvmc_handle_event, 2159 0, "ibmvmc", (void *)adapter) != 0) { 2160 dev_err(adapter->dev, "couldn't register irq 0x%x\n", 2161 vdev->irq); 2162 goto req_irq_failed; 2163 } 2164 2165 rc = vio_enable_interrupts(vdev); 2166 if (rc != 0) { 2167 dev_err(adapter->dev, "Error %d enabling interrupts!!!\n", rc); 2168 goto req_irq_failed; 2169 } 2170 2171 return retrc; 2172 2173 req_irq_failed: 2174 /* Cannot have any work since we either never got our IRQ registered, 2175 * or never got interrupts enabled 2176 */ 2177 tasklet_kill(&adapter->work_task); 2178 h_free_crq(vdev->unit_address); 2179 reg_crq_failed: 2180 dma_unmap_single(adapter->dev, 2181 queue->msg_token, 2182 queue->size * sizeof(*queue->msgs), DMA_BIDIRECTIONAL); 2183 map_failed: 2184 free_page((unsigned long)queue->msgs); 2185 malloc_failed: 2186 return -ENOMEM; 2187 } 2188 2189 /* Fill in the liobn and riobn fields on the adapter */ 2190 static int read_dma_window(struct vio_dev *vdev, 2191 struct crq_server_adapter *adapter) 2192 { 2193 const __be32 *dma_window; 2194 const __be32 *prop; 2195 2196 /* TODO Using of_parse_dma_window would be better, but it doesn't give 2197 * a way to read multiple windows without already knowing the size of 2198 * a window or the number of windows 2199 */ 2200 dma_window = 2201 (const __be32 *)vio_get_attribute(vdev, "ibm,my-dma-window", 2202 NULL); 2203 if (!dma_window) { 2204 dev_warn(adapter->dev, "Couldn't find ibm,my-dma-window property\n"); 2205 return -1; 2206 } 2207 2208 adapter->liobn = be32_to_cpu(*dma_window); 2209 dma_window++; 2210 2211 prop = (const __be32 *)vio_get_attribute(vdev, "ibm,#dma-address-cells", 2212 NULL); 2213 if (!prop) { 2214 dev_warn(adapter->dev, "Couldn't find ibm,#dma-address-cells property\n"); 2215 dma_window++; 2216 } else { 2217 dma_window += be32_to_cpu(*prop); 2218 } 2219 2220 prop = (const __be32 *)vio_get_attribute(vdev, "ibm,#dma-size-cells", 2221 NULL); 2222 if (!prop) { 2223 dev_warn(adapter->dev, "Couldn't find ibm,#dma-size-cells property\n"); 2224 dma_window++; 2225 } else { 2226 dma_window += be32_to_cpu(*prop); 2227 } 2228 2229 /* dma_window should point to the second window now */ 2230 adapter->riobn = be32_to_cpu(*dma_window); 2231 2232 return 0; 2233 } 2234 2235 static int ibmvmc_probe(struct vio_dev *vdev, const struct vio_device_id *id) 2236 { 2237 struct crq_server_adapter *adapter = &ibmvmc_adapter; 2238 int rc; 2239 2240 dev_set_drvdata(&vdev->dev, NULL); 2241 memset(adapter, 0, sizeof(*adapter)); 2242 adapter->dev = &vdev->dev; 2243 2244 dev_info(adapter->dev, "Probe for UA 0x%x\n", vdev->unit_address); 2245 2246 rc = read_dma_window(vdev, adapter); 2247 if (rc != 0) { 2248 ibmvmc.state = ibmvmc_state_failed; 2249 return -1; 2250 } 2251 2252 dev_dbg(adapter->dev, "Probe: liobn 0x%x, riobn 0x%x\n", 2253 adapter->liobn, adapter->riobn); 2254 2255 init_waitqueue_head(&adapter->reset_wait_queue); 2256 adapter->reset_task = kthread_run(ibmvmc_reset_task, adapter, "ibmvmc"); 2257 if (IS_ERR(adapter->reset_task)) { 2258 dev_err(adapter->dev, "Failed to start reset thread\n"); 2259 ibmvmc.state = ibmvmc_state_failed; 2260 rc = PTR_ERR(adapter->reset_task); 2261 adapter->reset_task = NULL; 2262 return rc; 2263 } 2264 2265 rc = ibmvmc_init_crq_queue(adapter); 2266 if (rc != 0 && rc != H_RESOURCE) { 2267 dev_err(adapter->dev, "Error initializing CRQ. rc = 0x%x\n", 2268 rc); 2269 ibmvmc.state = ibmvmc_state_failed; 2270 goto crq_failed; 2271 } 2272 2273 ibmvmc.state = ibmvmc_state_crqinit; 2274 2275 /* Try to send an initialization message. Note that this is allowed 2276 * to fail if the other end is not acive. In that case we just wait 2277 * for the other side to initialize. 2278 */ 2279 if (ibmvmc_send_crq(adapter, 0xC001000000000000LL, 0) != 0 && 2280 rc != H_RESOURCE) 2281 dev_warn(adapter->dev, "Failed to send initialize CRQ message\n"); 2282 2283 dev_set_drvdata(&vdev->dev, adapter); 2284 2285 return 0; 2286 2287 crq_failed: 2288 kthread_stop(adapter->reset_task); 2289 adapter->reset_task = NULL; 2290 return -EPERM; 2291 } 2292 2293 static void ibmvmc_remove(struct vio_dev *vdev) 2294 { 2295 struct crq_server_adapter *adapter = dev_get_drvdata(&vdev->dev); 2296 2297 dev_info(adapter->dev, "Entering remove for UA 0x%x\n", 2298 vdev->unit_address); 2299 ibmvmc_release_crq_queue(adapter); 2300 } 2301 2302 static struct vio_device_id ibmvmc_device_table[] = { 2303 { "ibm,vmc", "IBM,vmc" }, 2304 { "", "" } 2305 }; 2306 MODULE_DEVICE_TABLE(vio, ibmvmc_device_table); 2307 2308 static struct vio_driver ibmvmc_driver = { 2309 .name = ibmvmc_driver_name, 2310 .id_table = ibmvmc_device_table, 2311 .probe = ibmvmc_probe, 2312 .remove = ibmvmc_remove, 2313 }; 2314 2315 static void __init ibmvmc_scrub_module_parms(void) 2316 { 2317 if (ibmvmc_max_mtu > MAX_MTU) { 2318 pr_warn("ibmvmc: Max MTU reduced to %d\n", MAX_MTU); 2319 ibmvmc_max_mtu = MAX_MTU; 2320 } else if (ibmvmc_max_mtu < MIN_MTU) { 2321 pr_warn("ibmvmc: Max MTU increased to %d\n", MIN_MTU); 2322 ibmvmc_max_mtu = MIN_MTU; 2323 } 2324 2325 if (ibmvmc_max_buf_pool_size > MAX_BUF_POOL_SIZE) { 2326 pr_warn("ibmvmc: Max buffer pool size reduced to %d\n", 2327 MAX_BUF_POOL_SIZE); 2328 ibmvmc_max_buf_pool_size = MAX_BUF_POOL_SIZE; 2329 } else if (ibmvmc_max_buf_pool_size < MIN_BUF_POOL_SIZE) { 2330 pr_warn("ibmvmc: Max buffer pool size increased to %d\n", 2331 MIN_BUF_POOL_SIZE); 2332 ibmvmc_max_buf_pool_size = MIN_BUF_POOL_SIZE; 2333 } 2334 2335 if (ibmvmc_max_hmcs > MAX_HMCS) { 2336 pr_warn("ibmvmc: Max HMCs reduced to %d\n", MAX_HMCS); 2337 ibmvmc_max_hmcs = MAX_HMCS; 2338 } else if (ibmvmc_max_hmcs < MIN_HMCS) { 2339 pr_warn("ibmvmc: Max HMCs increased to %d\n", MIN_HMCS); 2340 ibmvmc_max_hmcs = MIN_HMCS; 2341 } 2342 } 2343 2344 static struct miscdevice ibmvmc_miscdev = { 2345 .name = ibmvmc_driver_name, 2346 .minor = MISC_DYNAMIC_MINOR, 2347 .fops = &ibmvmc_fops, 2348 }; 2349 2350 static int __init ibmvmc_module_init(void) 2351 { 2352 int rc, i, j; 2353 2354 ibmvmc.state = ibmvmc_state_initial; 2355 pr_info("ibmvmc: version %s\n", IBMVMC_DRIVER_VERSION); 2356 2357 rc = misc_register(&ibmvmc_miscdev); 2358 if (rc) { 2359 pr_err("ibmvmc: misc registration failed\n"); 2360 goto misc_register_failed; 2361 } 2362 pr_info("ibmvmc: node %d:%d\n", MISC_MAJOR, 2363 ibmvmc_miscdev.minor); 2364 2365 /* Initialize data structures */ 2366 memset(hmcs, 0, sizeof(struct ibmvmc_hmc) * MAX_HMCS); 2367 for (i = 0; i < MAX_HMCS; i++) { 2368 spin_lock_init(&hmcs[i].lock); 2369 hmcs[i].state = ibmhmc_state_free; 2370 for (j = 0; j < MAX_BUF_POOL_SIZE; j++) 2371 hmcs[i].queue_outbound_msgs[j] = VMC_INVALID_BUFFER_ID; 2372 } 2373 2374 /* Sanity check module parms */ 2375 ibmvmc_scrub_module_parms(); 2376 2377 /* 2378 * Initialize some reasonable values. Might be negotiated smaller 2379 * values during the capabilities exchange. 2380 */ 2381 ibmvmc.max_mtu = ibmvmc_max_mtu; 2382 ibmvmc.max_buffer_pool_size = ibmvmc_max_buf_pool_size; 2383 ibmvmc.max_hmc_index = ibmvmc_max_hmcs - 1; 2384 2385 rc = vio_register_driver(&ibmvmc_driver); 2386 2387 if (rc) { 2388 pr_err("ibmvmc: rc %d from vio_register_driver\n", rc); 2389 goto vio_reg_failed; 2390 } 2391 2392 return 0; 2393 2394 vio_reg_failed: 2395 misc_deregister(&ibmvmc_miscdev); 2396 misc_register_failed: 2397 return rc; 2398 } 2399 2400 static void __exit ibmvmc_module_exit(void) 2401 { 2402 pr_info("ibmvmc: module exit\n"); 2403 vio_unregister_driver(&ibmvmc_driver); 2404 misc_deregister(&ibmvmc_miscdev); 2405 } 2406 2407 module_init(ibmvmc_module_init); 2408 module_exit(ibmvmc_module_exit); 2409 2410 module_param_named(buf_pool_size, ibmvmc_max_buf_pool_size, 2411 int, 0644); 2412 MODULE_PARM_DESC(buf_pool_size, "Buffer pool size"); 2413 module_param_named(max_hmcs, ibmvmc_max_hmcs, int, 0644); 2414 MODULE_PARM_DESC(max_hmcs, "Max HMCs"); 2415 module_param_named(max_mtu, ibmvmc_max_mtu, int, 0644); 2416 MODULE_PARM_DESC(max_mtu, "Max MTU"); 2417 2418 MODULE_AUTHOR("Steven Royer <seroyer@linux.vnet.ibm.com>"); 2419 MODULE_DESCRIPTION("IBM VMC"); 2420 MODULE_VERSION(IBMVMC_DRIVER_VERSION); 2421 MODULE_LICENSE("GPL v2"); 2422