xref: /openbmc/linux/drivers/uio/uio_hv_generic.c (revision 49c23519)
1 // SPDX-License-Identifier: GPL-2.0
2 /*
3  * uio_hv_generic - generic UIO driver for VMBus
4  *
5  * Copyright (c) 2013-2016 Brocade Communications Systems, Inc.
6  * Copyright (c) 2016, Microsoft Corporation.
7  *
8  * Since the driver does not declare any device ids, you must allocate
9  * id and bind the device to the driver yourself.  For example:
10  *
11  * Associate Network GUID with UIO device
12  * # echo "f8615163-df3e-46c5-913f-f2d2f965ed0e" \
13  *    > /sys/bus/vmbus/drivers/uio_hv_generic/new_id
14  * Then rebind
15  * # echo -n "ed963694-e847-4b2a-85af-bc9cfc11d6f3" \
16  *    > /sys/bus/vmbus/drivers/hv_netvsc/unbind
17  * # echo -n "ed963694-e847-4b2a-85af-bc9cfc11d6f3" \
18  *    > /sys/bus/vmbus/drivers/uio_hv_generic/bind
19  */
20 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
21 
22 #include <linux/device.h>
23 #include <linux/kernel.h>
24 #include <linux/module.h>
25 #include <linux/uio_driver.h>
26 #include <linux/netdevice.h>
27 #include <linux/if_ether.h>
28 #include <linux/skbuff.h>
29 #include <linux/hyperv.h>
30 #include <linux/vmalloc.h>
31 #include <linux/slab.h>
32 
33 #include "../hv/hyperv_vmbus.h"
34 
35 #define DRIVER_VERSION	"0.02.1"
36 #define DRIVER_AUTHOR	"Stephen Hemminger <sthemmin at microsoft.com>"
37 #define DRIVER_DESC	"Generic UIO driver for VMBus devices"
38 
39 #define HV_RING_SIZE	 512	/* pages */
40 #define SEND_BUFFER_SIZE (16 * 1024 * 1024)
41 #define RECV_BUFFER_SIZE (31 * 1024 * 1024)
42 
43 /*
44  * List of resources to be mapped to user space
45  * can be extended up to MAX_UIO_MAPS(5) items
46  */
47 enum hv_uio_map {
48 	TXRX_RING_MAP = 0,
49 	INT_PAGE_MAP,
50 	MON_PAGE_MAP,
51 	RECV_BUF_MAP,
52 	SEND_BUF_MAP
53 };
54 
55 struct hv_uio_private_data {
56 	struct uio_info info;
57 	struct hv_device *device;
58 	atomic_t refcnt;
59 
60 	void	*recv_buf;
61 	struct vmbus_gpadl recv_gpadl;
62 	char	recv_name[32];	/* "recv_4294967295" */
63 
64 	void	*send_buf;
65 	struct vmbus_gpadl send_gpadl;
66 	char	send_name[32];
67 };
68 
69 /*
70  * This is the irqcontrol callback to be registered to uio_info.
71  * It can be used to disable/enable interrupt from user space processes.
72  *
73  * @param info
74  *  pointer to uio_info.
75  * @param irq_state
76  *  state value. 1 to enable interrupt, 0 to disable interrupt.
77  */
78 static int
79 hv_uio_irqcontrol(struct uio_info *info, s32 irq_state)
80 {
81 	struct hv_uio_private_data *pdata = info->priv;
82 	struct hv_device *dev = pdata->device;
83 
84 	dev->channel->inbound.ring_buffer->interrupt_mask = !irq_state;
85 	virt_mb();
86 
87 	return 0;
88 }
89 
90 /*
91  * Callback from vmbus_event when something is in inbound ring.
92  */
93 static void hv_uio_channel_cb(void *context)
94 {
95 	struct vmbus_channel *chan = context;
96 	struct hv_device *hv_dev = chan->device_obj;
97 	struct hv_uio_private_data *pdata = hv_get_drvdata(hv_dev);
98 
99 	chan->inbound.ring_buffer->interrupt_mask = 1;
100 	virt_mb();
101 
102 	uio_event_notify(&pdata->info);
103 }
104 
105 /*
106  * Callback from vmbus_event when channel is rescinded.
107  */
108 static void hv_uio_rescind(struct vmbus_channel *channel)
109 {
110 	struct hv_device *hv_dev = channel->primary_channel->device_obj;
111 	struct hv_uio_private_data *pdata = hv_get_drvdata(hv_dev);
112 
113 	/*
114 	 * Turn off the interrupt file handle
115 	 * Next read for event will return -EIO
116 	 */
117 	pdata->info.irq = 0;
118 
119 	/* Wake up reader */
120 	uio_event_notify(&pdata->info);
121 }
122 
123 /* Sysfs API to allow mmap of the ring buffers
124  * The ring buffer is allocated as contiguous memory by vmbus_open
125  */
126 static int hv_uio_ring_mmap(struct file *filp, struct kobject *kobj,
127 			    struct bin_attribute *attr,
128 			    struct vm_area_struct *vma)
129 {
130 	struct vmbus_channel *channel
131 		= container_of(kobj, struct vmbus_channel, kobj);
132 	void *ring_buffer = page_address(channel->ringbuffer_page);
133 
134 	if (channel->state != CHANNEL_OPENED_STATE)
135 		return -ENODEV;
136 
137 	return vm_iomap_memory(vma, virt_to_phys(ring_buffer),
138 			       channel->ringbuffer_pagecount << PAGE_SHIFT);
139 }
140 
141 static const struct bin_attribute ring_buffer_bin_attr = {
142 	.attr = {
143 		.name = "ring",
144 		.mode = 0600,
145 	},
146 	.size = 2 * HV_RING_SIZE * PAGE_SIZE,
147 	.mmap = hv_uio_ring_mmap,
148 };
149 
150 /* Callback from VMBUS subsystem when new channel created. */
151 static void
152 hv_uio_new_channel(struct vmbus_channel *new_sc)
153 {
154 	struct hv_device *hv_dev = new_sc->primary_channel->device_obj;
155 	struct device *device = &hv_dev->device;
156 	const size_t ring_bytes = HV_RING_SIZE * PAGE_SIZE;
157 	int ret;
158 
159 	/* Create host communication ring */
160 	ret = vmbus_open(new_sc, ring_bytes, ring_bytes, NULL, 0,
161 			 hv_uio_channel_cb, new_sc);
162 	if (ret) {
163 		dev_err(device, "vmbus_open subchannel failed: %d\n", ret);
164 		return;
165 	}
166 
167 	/* Disable interrupts on sub channel */
168 	new_sc->inbound.ring_buffer->interrupt_mask = 1;
169 	set_channel_read_mode(new_sc, HV_CALL_ISR);
170 
171 	ret = sysfs_create_bin_file(&new_sc->kobj, &ring_buffer_bin_attr);
172 	if (ret) {
173 		dev_err(device, "sysfs create ring bin file failed; %d\n", ret);
174 		vmbus_close(new_sc);
175 	}
176 }
177 
178 /* free the reserved buffers for send and receive */
179 static void
180 hv_uio_cleanup(struct hv_device *dev, struct hv_uio_private_data *pdata)
181 {
182 	if (pdata->send_gpadl.gpadl_handle) {
183 		vmbus_teardown_gpadl(dev->channel, &pdata->send_gpadl);
184 		if (!pdata->send_gpadl.decrypted)
185 			vfree(pdata->send_buf);
186 	}
187 
188 	if (pdata->recv_gpadl.gpadl_handle) {
189 		vmbus_teardown_gpadl(dev->channel, &pdata->recv_gpadl);
190 		if (!pdata->recv_gpadl.decrypted)
191 			vfree(pdata->recv_buf);
192 	}
193 }
194 
195 /* VMBus primary channel is opened on first use */
196 static int
197 hv_uio_open(struct uio_info *info, struct inode *inode)
198 {
199 	struct hv_uio_private_data *pdata
200 		= container_of(info, struct hv_uio_private_data, info);
201 	struct hv_device *dev = pdata->device;
202 	int ret;
203 
204 	if (atomic_inc_return(&pdata->refcnt) != 1)
205 		return 0;
206 
207 	vmbus_set_chn_rescind_callback(dev->channel, hv_uio_rescind);
208 	vmbus_set_sc_create_callback(dev->channel, hv_uio_new_channel);
209 
210 	ret = vmbus_connect_ring(dev->channel,
211 				 hv_uio_channel_cb, dev->channel);
212 	if (ret == 0)
213 		dev->channel->inbound.ring_buffer->interrupt_mask = 1;
214 	else
215 		atomic_dec(&pdata->refcnt);
216 
217 	return ret;
218 }
219 
220 /* VMBus primary channel is closed on last close */
221 static int
222 hv_uio_release(struct uio_info *info, struct inode *inode)
223 {
224 	struct hv_uio_private_data *pdata
225 		= container_of(info, struct hv_uio_private_data, info);
226 	struct hv_device *dev = pdata->device;
227 	int ret = 0;
228 
229 	if (atomic_dec_and_test(&pdata->refcnt))
230 		ret = vmbus_disconnect_ring(dev->channel);
231 
232 	return ret;
233 }
234 
235 static int
236 hv_uio_probe(struct hv_device *dev,
237 	     const struct hv_vmbus_device_id *dev_id)
238 {
239 	struct vmbus_channel *channel = dev->channel;
240 	struct hv_uio_private_data *pdata;
241 	void *ring_buffer;
242 	int ret;
243 
244 	/* Communicating with host has to be via shared memory not hypercall */
245 	if (!channel->offermsg.monitor_allocated) {
246 		dev_err(&dev->device, "vmbus channel requires hypercall\n");
247 		return -ENOTSUPP;
248 	}
249 
250 	pdata = devm_kzalloc(&dev->device, sizeof(*pdata), GFP_KERNEL);
251 	if (!pdata)
252 		return -ENOMEM;
253 
254 	ret = vmbus_alloc_ring(channel, HV_RING_SIZE * PAGE_SIZE,
255 			       HV_RING_SIZE * PAGE_SIZE);
256 	if (ret)
257 		return ret;
258 
259 	set_channel_read_mode(channel, HV_CALL_ISR);
260 
261 	/* Fill general uio info */
262 	pdata->info.name = "uio_hv_generic";
263 	pdata->info.version = DRIVER_VERSION;
264 	pdata->info.irqcontrol = hv_uio_irqcontrol;
265 	pdata->info.open = hv_uio_open;
266 	pdata->info.release = hv_uio_release;
267 	pdata->info.irq = UIO_IRQ_CUSTOM;
268 	atomic_set(&pdata->refcnt, 0);
269 
270 	/* mem resources */
271 	pdata->info.mem[TXRX_RING_MAP].name = "txrx_rings";
272 	ring_buffer = page_address(channel->ringbuffer_page);
273 	pdata->info.mem[TXRX_RING_MAP].addr
274 		= (uintptr_t)virt_to_phys(ring_buffer);
275 	pdata->info.mem[TXRX_RING_MAP].size
276 		= channel->ringbuffer_pagecount << PAGE_SHIFT;
277 	pdata->info.mem[TXRX_RING_MAP].memtype = UIO_MEM_IOVA;
278 
279 	pdata->info.mem[INT_PAGE_MAP].name = "int_page";
280 	pdata->info.mem[INT_PAGE_MAP].addr
281 		= (uintptr_t)vmbus_connection.int_page;
282 	pdata->info.mem[INT_PAGE_MAP].size = PAGE_SIZE;
283 	pdata->info.mem[INT_PAGE_MAP].memtype = UIO_MEM_LOGICAL;
284 
285 	pdata->info.mem[MON_PAGE_MAP].name = "monitor_page";
286 	pdata->info.mem[MON_PAGE_MAP].addr
287 		= (uintptr_t)vmbus_connection.monitor_pages[1];
288 	pdata->info.mem[MON_PAGE_MAP].size = PAGE_SIZE;
289 	pdata->info.mem[MON_PAGE_MAP].memtype = UIO_MEM_LOGICAL;
290 
291 	pdata->recv_buf = vzalloc(RECV_BUFFER_SIZE);
292 	if (pdata->recv_buf == NULL) {
293 		ret = -ENOMEM;
294 		goto fail_free_ring;
295 	}
296 
297 	ret = vmbus_establish_gpadl(channel, pdata->recv_buf,
298 				    RECV_BUFFER_SIZE, &pdata->recv_gpadl);
299 	if (ret) {
300 		if (!pdata->recv_gpadl.decrypted)
301 			vfree(pdata->recv_buf);
302 		goto fail_close;
303 	}
304 
305 	/* put Global Physical Address Label in name */
306 	snprintf(pdata->recv_name, sizeof(pdata->recv_name),
307 		 "recv:%u", pdata->recv_gpadl.gpadl_handle);
308 	pdata->info.mem[RECV_BUF_MAP].name = pdata->recv_name;
309 	pdata->info.mem[RECV_BUF_MAP].addr
310 		= (uintptr_t)pdata->recv_buf;
311 	pdata->info.mem[RECV_BUF_MAP].size = RECV_BUFFER_SIZE;
312 	pdata->info.mem[RECV_BUF_MAP].memtype = UIO_MEM_VIRTUAL;
313 
314 	pdata->send_buf = vzalloc(SEND_BUFFER_SIZE);
315 	if (pdata->send_buf == NULL) {
316 		ret = -ENOMEM;
317 		goto fail_close;
318 	}
319 
320 	ret = vmbus_establish_gpadl(channel, pdata->send_buf,
321 				    SEND_BUFFER_SIZE, &pdata->send_gpadl);
322 	if (ret) {
323 		if (!pdata->send_gpadl.decrypted)
324 			vfree(pdata->send_buf);
325 		goto fail_close;
326 	}
327 
328 	snprintf(pdata->send_name, sizeof(pdata->send_name),
329 		 "send:%u", pdata->send_gpadl.gpadl_handle);
330 	pdata->info.mem[SEND_BUF_MAP].name = pdata->send_name;
331 	pdata->info.mem[SEND_BUF_MAP].addr
332 		= (uintptr_t)pdata->send_buf;
333 	pdata->info.mem[SEND_BUF_MAP].size = SEND_BUFFER_SIZE;
334 	pdata->info.mem[SEND_BUF_MAP].memtype = UIO_MEM_VIRTUAL;
335 
336 	pdata->info.priv = pdata;
337 	pdata->device = dev;
338 
339 	ret = uio_register_device(&dev->device, &pdata->info);
340 	if (ret) {
341 		dev_err(&dev->device, "hv_uio register failed\n");
342 		goto fail_close;
343 	}
344 
345 	ret = sysfs_create_bin_file(&channel->kobj, &ring_buffer_bin_attr);
346 	if (ret)
347 		dev_notice(&dev->device,
348 			   "sysfs create ring bin file failed; %d\n", ret);
349 
350 	hv_set_drvdata(dev, pdata);
351 
352 	return 0;
353 
354 fail_close:
355 	hv_uio_cleanup(dev, pdata);
356 fail_free_ring:
357 	vmbus_free_ring(dev->channel);
358 
359 	return ret;
360 }
361 
362 static void
363 hv_uio_remove(struct hv_device *dev)
364 {
365 	struct hv_uio_private_data *pdata = hv_get_drvdata(dev);
366 
367 	if (!pdata)
368 		return;
369 
370 	sysfs_remove_bin_file(&dev->channel->kobj, &ring_buffer_bin_attr);
371 	uio_unregister_device(&pdata->info);
372 	hv_uio_cleanup(dev, pdata);
373 
374 	vmbus_free_ring(dev->channel);
375 }
376 
377 static struct hv_driver hv_uio_drv = {
378 	.name = "uio_hv_generic",
379 	.id_table = NULL, /* only dynamic id's */
380 	.probe = hv_uio_probe,
381 	.remove = hv_uio_remove,
382 };
383 
384 static int __init
385 hyperv_module_init(void)
386 {
387 	return vmbus_driver_register(&hv_uio_drv);
388 }
389 
390 static void __exit
391 hyperv_module_exit(void)
392 {
393 	vmbus_driver_unregister(&hv_uio_drv);
394 }
395 
396 module_init(hyperv_module_init);
397 module_exit(hyperv_module_exit);
398 
399 MODULE_VERSION(DRIVER_VERSION);
400 MODULE_LICENSE("GPL v2");
401 MODULE_AUTHOR(DRIVER_AUTHOR);
402 MODULE_DESCRIPTION(DRIVER_DESC);
403