]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blob - drivers/misc/vmw_vmci/vmci_doorbell.c
Merge branch 'for-linus' of git://git.kernel.dk/linux-block
[mirror_ubuntu-artful-kernel.git] / drivers / misc / vmw_vmci / vmci_doorbell.c
1 /*
2 * VMware VMCI Driver
3 *
4 * Copyright (C) 2012 VMware, Inc. All rights reserved.
5 *
6 * This program is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the
8 * Free Software Foundation version 2 and no later version.
9 *
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
12 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
13 * for more details.
14 */
15
16 #include <linux/vmw_vmci_defs.h>
17 #include <linux/vmw_vmci_api.h>
18 #include <linux/completion.h>
19 #include <linux/hash.h>
20 #include <linux/kernel.h>
21 #include <linux/list.h>
22 #include <linux/module.h>
23 #include <linux/sched.h>
24 #include <linux/slab.h>
25
26 #include "vmci_datagram.h"
27 #include "vmci_doorbell.h"
28 #include "vmci_resource.h"
29 #include "vmci_driver.h"
30 #include "vmci_route.h"
31
32
33 #define VMCI_DOORBELL_INDEX_BITS 6
34 #define VMCI_DOORBELL_INDEX_TABLE_SIZE (1 << VMCI_DOORBELL_INDEX_BITS)
35 #define VMCI_DOORBELL_HASH(_idx) hash_32(_idx, VMCI_DOORBELL_INDEX_BITS)
36
37 /*
38 * DoorbellEntry describes the a doorbell notification handle allocated by the
39 * host.
40 */
41 struct dbell_entry {
42 struct vmci_resource resource;
43 struct hlist_node node;
44 struct work_struct work;
45 vmci_callback notify_cb;
46 void *client_data;
47 u32 idx;
48 u32 priv_flags;
49 bool run_delayed;
50 atomic_t active; /* Only used by guest personality */
51 };
52
53 /* The VMCI index table keeps track of currently registered doorbells. */
54 struct dbell_index_table {
55 spinlock_t lock; /* Index table lock */
56 struct hlist_head entries[VMCI_DOORBELL_INDEX_TABLE_SIZE];
57 };
58
59 static struct dbell_index_table vmci_doorbell_it = {
60 .lock = __SPIN_LOCK_UNLOCKED(vmci_doorbell_it.lock),
61 };
62
63 /*
64 * The max_notify_idx is one larger than the currently known bitmap index in
65 * use, and is used to determine how much of the bitmap needs to be scanned.
66 */
67 static u32 max_notify_idx;
68
69 /*
70 * The notify_idx_count is used for determining whether there are free entries
71 * within the bitmap (if notify_idx_count + 1 < max_notify_idx).
72 */
73 static u32 notify_idx_count;
74
75 /*
76 * The last_notify_idx_reserved is used to track the last index handed out - in
77 * the case where multiple handles share a notification index, we hand out
78 * indexes round robin based on last_notify_idx_reserved.
79 */
80 static u32 last_notify_idx_reserved;
81
82 /* This is a one entry cache used to by the index allocation. */
83 static u32 last_notify_idx_released = PAGE_SIZE;
84
85
86 /*
87 * Utility function that retrieves the privilege flags associated
88 * with a given doorbell handle. For guest endpoints, the
89 * privileges are determined by the context ID, but for host
90 * endpoints privileges are associated with the complete
91 * handle. Hypervisor endpoints are not yet supported.
92 */
93 int vmci_dbell_get_priv_flags(struct vmci_handle handle, u32 *priv_flags)
94 {
95 if (priv_flags == NULL || handle.context == VMCI_INVALID_ID)
96 return VMCI_ERROR_INVALID_ARGS;
97
98 if (handle.context == VMCI_HOST_CONTEXT_ID) {
99 struct dbell_entry *entry;
100 struct vmci_resource *resource;
101
102 resource = vmci_resource_by_handle(handle,
103 VMCI_RESOURCE_TYPE_DOORBELL);
104 if (!resource)
105 return VMCI_ERROR_NOT_FOUND;
106
107 entry = container_of(resource, struct dbell_entry, resource);
108 *priv_flags = entry->priv_flags;
109 vmci_resource_put(resource);
110 } else if (handle.context == VMCI_HYPERVISOR_CONTEXT_ID) {
111 /*
112 * Hypervisor endpoints for notifications are not
113 * supported (yet).
114 */
115 return VMCI_ERROR_INVALID_ARGS;
116 } else {
117 *priv_flags = vmci_context_get_priv_flags(handle.context);
118 }
119
120 return VMCI_SUCCESS;
121 }
122
123 /*
124 * Find doorbell entry by bitmap index.
125 */
126 static struct dbell_entry *dbell_index_table_find(u32 idx)
127 {
128 u32 bucket = VMCI_DOORBELL_HASH(idx);
129 struct dbell_entry *dbell;
130
131 hlist_for_each_entry(dbell, &vmci_doorbell_it.entries[bucket],
132 node) {
133 if (idx == dbell->idx)
134 return dbell;
135 }
136
137 return NULL;
138 }
139
140 /*
141 * Add the given entry to the index table. This willi take a reference to the
142 * entry's resource so that the entry is not deleted before it is removed from
143 * the * table.
144 */
145 static void dbell_index_table_add(struct dbell_entry *entry)
146 {
147 u32 bucket;
148 u32 new_notify_idx;
149
150 vmci_resource_get(&entry->resource);
151
152 spin_lock_bh(&vmci_doorbell_it.lock);
153
154 /*
155 * Below we try to allocate an index in the notification
156 * bitmap with "not too much" sharing between resources. If we
157 * use less that the full bitmap, we either add to the end if
158 * there are no unused flags within the currently used area,
159 * or we search for unused ones. If we use the full bitmap, we
160 * allocate the index round robin.
161 */
162 if (max_notify_idx < PAGE_SIZE || notify_idx_count < PAGE_SIZE) {
163 if (last_notify_idx_released < max_notify_idx &&
164 !dbell_index_table_find(last_notify_idx_released)) {
165 new_notify_idx = last_notify_idx_released;
166 last_notify_idx_released = PAGE_SIZE;
167 } else {
168 bool reused = false;
169 new_notify_idx = last_notify_idx_reserved;
170 if (notify_idx_count + 1 < max_notify_idx) {
171 do {
172 if (!dbell_index_table_find
173 (new_notify_idx)) {
174 reused = true;
175 break;
176 }
177 new_notify_idx = (new_notify_idx + 1) %
178 max_notify_idx;
179 } while (new_notify_idx !=
180 last_notify_idx_released);
181 }
182 if (!reused) {
183 new_notify_idx = max_notify_idx;
184 max_notify_idx++;
185 }
186 }
187 } else {
188 new_notify_idx = (last_notify_idx_reserved + 1) % PAGE_SIZE;
189 }
190
191 last_notify_idx_reserved = new_notify_idx;
192 notify_idx_count++;
193
194 entry->idx = new_notify_idx;
195 bucket = VMCI_DOORBELL_HASH(entry->idx);
196 hlist_add_head(&entry->node, &vmci_doorbell_it.entries[bucket]);
197
198 spin_unlock_bh(&vmci_doorbell_it.lock);
199 }
200
201 /*
202 * Remove the given entry from the index table. This will release() the
203 * entry's resource.
204 */
205 static void dbell_index_table_remove(struct dbell_entry *entry)
206 {
207 spin_lock_bh(&vmci_doorbell_it.lock);
208
209 hlist_del_init(&entry->node);
210
211 notify_idx_count--;
212 if (entry->idx == max_notify_idx - 1) {
213 /*
214 * If we delete an entry with the maximum known
215 * notification index, we take the opportunity to
216 * prune the current max. As there might be other
217 * unused indices immediately below, we lower the
218 * maximum until we hit an index in use.
219 */
220 while (max_notify_idx > 0 &&
221 !dbell_index_table_find(max_notify_idx - 1))
222 max_notify_idx--;
223 }
224
225 last_notify_idx_released = entry->idx;
226
227 spin_unlock_bh(&vmci_doorbell_it.lock);
228
229 vmci_resource_put(&entry->resource);
230 }
231
232 /*
233 * Creates a link between the given doorbell handle and the given
234 * index in the bitmap in the device backend. A notification state
235 * is created in hypervisor.
236 */
237 static int dbell_link(struct vmci_handle handle, u32 notify_idx)
238 {
239 struct vmci_doorbell_link_msg link_msg;
240
241 link_msg.hdr.dst = vmci_make_handle(VMCI_HYPERVISOR_CONTEXT_ID,
242 VMCI_DOORBELL_LINK);
243 link_msg.hdr.src = VMCI_ANON_SRC_HANDLE;
244 link_msg.hdr.payload_size = sizeof(link_msg) - VMCI_DG_HEADERSIZE;
245 link_msg.handle = handle;
246 link_msg.notify_idx = notify_idx;
247
248 return vmci_send_datagram(&link_msg.hdr);
249 }
250
251 /*
252 * Unlinks the given doorbell handle from an index in the bitmap in
253 * the device backend. The notification state is destroyed in hypervisor.
254 */
255 static int dbell_unlink(struct vmci_handle handle)
256 {
257 struct vmci_doorbell_unlink_msg unlink_msg;
258
259 unlink_msg.hdr.dst = vmci_make_handle(VMCI_HYPERVISOR_CONTEXT_ID,
260 VMCI_DOORBELL_UNLINK);
261 unlink_msg.hdr.src = VMCI_ANON_SRC_HANDLE;
262 unlink_msg.hdr.payload_size = sizeof(unlink_msg) - VMCI_DG_HEADERSIZE;
263 unlink_msg.handle = handle;
264
265 return vmci_send_datagram(&unlink_msg.hdr);
266 }
267
268 /*
269 * Notify another guest or the host. We send a datagram down to the
270 * host via the hypervisor with the notification info.
271 */
272 static int dbell_notify_as_guest(struct vmci_handle handle, u32 priv_flags)
273 {
274 struct vmci_doorbell_notify_msg notify_msg;
275
276 notify_msg.hdr.dst = vmci_make_handle(VMCI_HYPERVISOR_CONTEXT_ID,
277 VMCI_DOORBELL_NOTIFY);
278 notify_msg.hdr.src = VMCI_ANON_SRC_HANDLE;
279 notify_msg.hdr.payload_size = sizeof(notify_msg) - VMCI_DG_HEADERSIZE;
280 notify_msg.handle = handle;
281
282 return vmci_send_datagram(&notify_msg.hdr);
283 }
284
285 /*
286 * Calls the specified callback in a delayed context.
287 */
288 static void dbell_delayed_dispatch(struct work_struct *work)
289 {
290 struct dbell_entry *entry = container_of(work,
291 struct dbell_entry, work);
292
293 entry->notify_cb(entry->client_data);
294 vmci_resource_put(&entry->resource);
295 }
296
297 /*
298 * Dispatches a doorbell notification to the host context.
299 */
300 int vmci_dbell_host_context_notify(u32 src_cid, struct vmci_handle handle)
301 {
302 struct dbell_entry *entry;
303 struct vmci_resource *resource;
304
305 if (vmci_handle_is_invalid(handle)) {
306 pr_devel("Notifying an invalid doorbell (handle=0x%x:0x%x)\n",
307 handle.context, handle.resource);
308 return VMCI_ERROR_INVALID_ARGS;
309 }
310
311 resource = vmci_resource_by_handle(handle,
312 VMCI_RESOURCE_TYPE_DOORBELL);
313 if (!resource) {
314 pr_devel("Notifying an unknown doorbell (handle=0x%x:0x%x)\n",
315 handle.context, handle.resource);
316 return VMCI_ERROR_NOT_FOUND;
317 }
318
319 entry = container_of(resource, struct dbell_entry, resource);
320 if (entry->run_delayed) {
321 schedule_work(&entry->work);
322 } else {
323 entry->notify_cb(entry->client_data);
324 vmci_resource_put(resource);
325 }
326
327 return VMCI_SUCCESS;
328 }
329
330 /*
331 * Register the notification bitmap with the host.
332 */
333 bool vmci_dbell_register_notification_bitmap(u32 bitmap_ppn)
334 {
335 int result;
336 struct vmci_notify_bm_set_msg bitmap_set_msg;
337
338 bitmap_set_msg.hdr.dst = vmci_make_handle(VMCI_HYPERVISOR_CONTEXT_ID,
339 VMCI_SET_NOTIFY_BITMAP);
340 bitmap_set_msg.hdr.src = VMCI_ANON_SRC_HANDLE;
341 bitmap_set_msg.hdr.payload_size = sizeof(bitmap_set_msg) -
342 VMCI_DG_HEADERSIZE;
343 bitmap_set_msg.bitmap_ppn = bitmap_ppn;
344
345 result = vmci_send_datagram(&bitmap_set_msg.hdr);
346 if (result != VMCI_SUCCESS) {
347 pr_devel("Failed to register (PPN=%u) as notification bitmap (error=%d)\n",
348 bitmap_ppn, result);
349 return false;
350 }
351 return true;
352 }
353
354 /*
355 * Executes or schedules the handlers for a given notify index.
356 */
357 static void dbell_fire_entries(u32 notify_idx)
358 {
359 u32 bucket = VMCI_DOORBELL_HASH(notify_idx);
360 struct dbell_entry *dbell;
361
362 spin_lock_bh(&vmci_doorbell_it.lock);
363
364 hlist_for_each_entry(dbell, &vmci_doorbell_it.entries[bucket], node) {
365 if (dbell->idx == notify_idx &&
366 atomic_read(&dbell->active) == 1) {
367 if (dbell->run_delayed) {
368 vmci_resource_get(&dbell->resource);
369 schedule_work(&dbell->work);
370 } else {
371 dbell->notify_cb(dbell->client_data);
372 }
373 }
374 }
375
376 spin_unlock_bh(&vmci_doorbell_it.lock);
377 }
378
379 /*
380 * Scans the notification bitmap, collects pending notifications,
381 * resets the bitmap and invokes appropriate callbacks.
382 */
383 void vmci_dbell_scan_notification_entries(u8 *bitmap)
384 {
385 u32 idx;
386
387 for (idx = 0; idx < max_notify_idx; idx++) {
388 if (bitmap[idx] & 0x1) {
389 bitmap[idx] &= ~1;
390 dbell_fire_entries(idx);
391 }
392 }
393 }
394
395 /*
396 * vmci_doorbell_create() - Creates a doorbell
397 * @handle: A handle used to track the resource. Can be invalid.
398 * @flags: Flag that determines context of callback.
399 * @priv_flags: Privileges flags.
400 * @notify_cb: The callback to be ivoked when the doorbell fires.
401 * @client_data: A parameter to be passed to the callback.
402 *
403 * Creates a doorbell with the given callback. If the handle is
404 * VMCI_INVALID_HANDLE, a free handle will be assigned, if
405 * possible. The callback can be run immediately (potentially with
406 * locks held - the default) or delayed (in a kernel thread) by
407 * specifying the flag VMCI_FLAG_DELAYED_CB. If delayed execution
408 * is selected, a given callback may not be run if the kernel is
409 * unable to allocate memory for the delayed execution (highly
410 * unlikely).
411 */
412 int vmci_doorbell_create(struct vmci_handle *handle,
413 u32 flags,
414 u32 priv_flags,
415 vmci_callback notify_cb, void *client_data)
416 {
417 struct dbell_entry *entry;
418 struct vmci_handle new_handle;
419 int result;
420
421 if (!handle || !notify_cb || flags & ~VMCI_FLAG_DELAYED_CB ||
422 priv_flags & ~VMCI_PRIVILEGE_ALL_FLAGS)
423 return VMCI_ERROR_INVALID_ARGS;
424
425 entry = kmalloc(sizeof(*entry), GFP_KERNEL);
426 if (entry == NULL) {
427 pr_warn("Failed allocating memory for datagram entry\n");
428 return VMCI_ERROR_NO_MEM;
429 }
430
431 if (vmci_handle_is_invalid(*handle)) {
432 u32 context_id = vmci_get_context_id();
433
434 if (context_id == VMCI_INVALID_ID) {
435 pr_warn("Failed to get context ID\n");
436 result = VMCI_ERROR_NO_RESOURCES;
437 goto free_mem;
438 }
439
440 /* Let resource code allocate a free ID for us */
441 new_handle = vmci_make_handle(context_id, VMCI_INVALID_ID);
442 } else {
443 bool valid_context = false;
444
445 /*
446 * Validate the handle. We must do both of the checks below
447 * because we can be acting as both a host and a guest at the
448 * same time. We always allow the host context ID, since the
449 * host functionality is in practice always there with the
450 * unified driver.
451 */
452 if (handle->context == VMCI_HOST_CONTEXT_ID ||
453 (vmci_guest_code_active() &&
454 vmci_get_context_id() == handle->context)) {
455 valid_context = true;
456 }
457
458 if (!valid_context || handle->resource == VMCI_INVALID_ID) {
459 pr_devel("Invalid argument (handle=0x%x:0x%x)\n",
460 handle->context, handle->resource);
461 result = VMCI_ERROR_INVALID_ARGS;
462 goto free_mem;
463 }
464
465 new_handle = *handle;
466 }
467
468 entry->idx = 0;
469 INIT_HLIST_NODE(&entry->node);
470 entry->priv_flags = priv_flags;
471 INIT_WORK(&entry->work, dbell_delayed_dispatch);
472 entry->run_delayed = flags & VMCI_FLAG_DELAYED_CB;
473 entry->notify_cb = notify_cb;
474 entry->client_data = client_data;
475 atomic_set(&entry->active, 0);
476
477 result = vmci_resource_add(&entry->resource,
478 VMCI_RESOURCE_TYPE_DOORBELL,
479 new_handle);
480 if (result != VMCI_SUCCESS) {
481 pr_warn("Failed to add new resource (handle=0x%x:0x%x), error: %d\n",
482 new_handle.context, new_handle.resource, result);
483 goto free_mem;
484 }
485
486 new_handle = vmci_resource_handle(&entry->resource);
487 if (vmci_guest_code_active()) {
488 dbell_index_table_add(entry);
489 result = dbell_link(new_handle, entry->idx);
490 if (VMCI_SUCCESS != result)
491 goto destroy_resource;
492
493 atomic_set(&entry->active, 1);
494 }
495
496 *handle = new_handle;
497
498 return result;
499
500 destroy_resource:
501 dbell_index_table_remove(entry);
502 vmci_resource_remove(&entry->resource);
503 free_mem:
504 kfree(entry);
505 return result;
506 }
507 EXPORT_SYMBOL_GPL(vmci_doorbell_create);
508
509 /*
510 * vmci_doorbell_destroy() - Destroy a doorbell.
511 * @handle: The handle tracking the resource.
512 *
513 * Destroys a doorbell previously created with vmcii_doorbell_create. This
514 * operation may block waiting for a callback to finish.
515 */
516 int vmci_doorbell_destroy(struct vmci_handle handle)
517 {
518 struct dbell_entry *entry;
519 struct vmci_resource *resource;
520
521 if (vmci_handle_is_invalid(handle))
522 return VMCI_ERROR_INVALID_ARGS;
523
524 resource = vmci_resource_by_handle(handle,
525 VMCI_RESOURCE_TYPE_DOORBELL);
526 if (!resource) {
527 pr_devel("Failed to destroy doorbell (handle=0x%x:0x%x)\n",
528 handle.context, handle.resource);
529 return VMCI_ERROR_NOT_FOUND;
530 }
531
532 entry = container_of(resource, struct dbell_entry, resource);
533
534 if (!hlist_unhashed(&entry->node)) {
535 int result;
536
537 dbell_index_table_remove(entry);
538
539 result = dbell_unlink(handle);
540 if (VMCI_SUCCESS != result) {
541
542 /*
543 * The only reason this should fail would be
544 * an inconsistency between guest and
545 * hypervisor state, where the guest believes
546 * it has an active registration whereas the
547 * hypervisor doesn't. One case where this may
548 * happen is if a doorbell is unregistered
549 * following a hibernation at a time where the
550 * doorbell state hasn't been restored on the
551 * hypervisor side yet. Since the handle has
552 * now been removed in the guest, we just
553 * print a warning and return success.
554 */
555 pr_devel("Unlink of doorbell (handle=0x%x:0x%x) unknown by hypervisor (error=%d)\n",
556 handle.context, handle.resource, result);
557 }
558 }
559
560 /*
561 * Now remove the resource from the table. It might still be in use
562 * after this, in a callback or still on the delayed work queue.
563 */
564 vmci_resource_put(&entry->resource);
565 vmci_resource_remove(&entry->resource);
566
567 kfree(entry);
568
569 return VMCI_SUCCESS;
570 }
571 EXPORT_SYMBOL_GPL(vmci_doorbell_destroy);
572
573 /*
574 * vmci_doorbell_notify() - Ring the doorbell (and hide in the bushes).
575 * @dst: The handlle identifying the doorbell resource
576 * @priv_flags: Priviledge flags.
577 *
578 * Generates a notification on the doorbell identified by the
579 * handle. For host side generation of notifications, the caller
580 * can specify what the privilege of the calling side is.
581 */
582 int vmci_doorbell_notify(struct vmci_handle dst, u32 priv_flags)
583 {
584 int retval;
585 enum vmci_route route;
586 struct vmci_handle src;
587
588 if (vmci_handle_is_invalid(dst) ||
589 (priv_flags & ~VMCI_PRIVILEGE_ALL_FLAGS))
590 return VMCI_ERROR_INVALID_ARGS;
591
592 src = VMCI_INVALID_HANDLE;
593 retval = vmci_route(&src, &dst, false, &route);
594 if (retval < VMCI_SUCCESS)
595 return retval;
596
597 if (VMCI_ROUTE_AS_HOST == route)
598 return vmci_ctx_notify_dbell(VMCI_HOST_CONTEXT_ID,
599 dst, priv_flags);
600
601 if (VMCI_ROUTE_AS_GUEST == route)
602 return dbell_notify_as_guest(dst, priv_flags);
603
604 pr_warn("Unknown route (%d) for doorbell\n", route);
605 return VMCI_ERROR_DST_UNREACHABLE;
606 }
607 EXPORT_SYMBOL_GPL(vmci_doorbell_notify);