Drivers: hv: vmbus: Teardown clockevent devices on module unload
[deliverable/linux.git] / drivers / hv / vmbus_drv.c
CommitLineData
3e7ee490 1/*
3e7ee490
HJ
2 * Copyright (c) 2009, Microsoft Corporation.
3 *
4 * This program is free software; you can redistribute it and/or modify it
5 * under the terms and conditions of the GNU General Public License,
6 * version 2, as published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope it will be useful, but WITHOUT
9 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
10 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
11 * more details.
12 *
13 * You should have received a copy of the GNU General Public License along with
14 * this program; if not, write to the Free Software Foundation, Inc., 59 Temple
15 * Place - Suite 330, Boston, MA 02111-1307 USA.
16 *
17 * Authors:
18 * Haiyang Zhang <haiyangz@microsoft.com>
19 * Hank Janssen <hjanssen@microsoft.com>
b0069f43 20 * K. Y. Srinivasan <kys@microsoft.com>
52e5c1ce 21 *
3e7ee490 22 */
0a46618d
HJ
23#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
24
3e7ee490
HJ
25#include <linux/init.h>
26#include <linux/module.h>
27#include <linux/device.h>
3e7ee490
HJ
28#include <linux/interrupt.h>
29#include <linux/sysctl.h>
5a0e3ad6 30#include <linux/slab.h>
b0069f43 31#include <linux/acpi.h>
8b5d6d3b 32#include <linux/completion.h>
46a97191 33#include <linux/hyperv.h>
b0209501 34#include <linux/kernel_stat.h>
4061ed9e 35#include <linux/clockchips.h>
e513229b 36#include <linux/cpu.h>
407dd164 37#include <asm/hyperv.h>
1f94ea81 38#include <asm/hypervisor.h>
302a3c0f 39#include <asm/mshyperv.h>
0f2a6619 40#include "hyperv_vmbus.h"
3e7ee490 41
607c1a11 42static struct acpi_device *hv_acpi_dev;
1168ac22 43
59c0e4f0 44static struct tasklet_struct msg_dpc;
71a6655d 45static struct completion probe_event;
b0069f43 46static int irq;
98db4335 47
90eedf0c
GH
48struct resource hyperv_mmio = {
49 .name = "hyperv mmio",
50 .flags = IORESOURCE_MEM,
51};
52EXPORT_SYMBOL_GPL(hyperv_mmio);
98db4335 53
cf6a2eac
S
54static int vmbus_exists(void)
55{
56 if (hv_acpi_dev == NULL)
57 return -ENODEV;
58
59 return 0;
60}
61
fd776ba9
OH
62#define VMBUS_ALIAS_LEN ((sizeof((struct hv_vmbus_device_id *)0)->guid) * 2)
63static void print_alias_name(struct hv_device *hv_dev, char *alias_name)
64{
65 int i;
66 for (i = 0; i < VMBUS_ALIAS_LEN; i += 2)
67 sprintf(&alias_name[i], "%02x", hv_dev->dev_type.b[i/2]);
68}
69
76c52bbe
GKH
70static u8 channel_monitor_group(struct vmbus_channel *channel)
71{
72 return (u8)channel->offermsg.monitorid / 32;
73}
74
75static u8 channel_monitor_offset(struct vmbus_channel *channel)
76{
77 return (u8)channel->offermsg.monitorid % 32;
78}
79
80static u32 channel_pending(struct vmbus_channel *channel,
81 struct hv_monitor_page *monitor_page)
82{
83 u8 monitor_group = channel_monitor_group(channel);
84 return monitor_page->trigger_group[monitor_group].pending;
85}
86
1cee272b
GKH
87static u32 channel_latency(struct vmbus_channel *channel,
88 struct hv_monitor_page *monitor_page)
89{
90 u8 monitor_group = channel_monitor_group(channel);
91 u8 monitor_offset = channel_monitor_offset(channel);
92 return monitor_page->latency[monitor_group][monitor_offset];
93}
94
4947c745
GKH
95static u32 channel_conn_id(struct vmbus_channel *channel,
96 struct hv_monitor_page *monitor_page)
97{
98 u8 monitor_group = channel_monitor_group(channel);
99 u8 monitor_offset = channel_monitor_offset(channel);
100 return monitor_page->parameter[monitor_group][monitor_offset].connectionid.u.id;
101}
102
03f3a910
GKH
103static ssize_t id_show(struct device *dev, struct device_attribute *dev_attr,
104 char *buf)
105{
106 struct hv_device *hv_dev = device_to_hv_device(dev);
107
108 if (!hv_dev->channel)
109 return -ENODEV;
110 return sprintf(buf, "%d\n", hv_dev->channel->offermsg.child_relid);
111}
112static DEVICE_ATTR_RO(id);
113
a8fb5f3d
GKH
114static ssize_t state_show(struct device *dev, struct device_attribute *dev_attr,
115 char *buf)
116{
117 struct hv_device *hv_dev = device_to_hv_device(dev);
118
119 if (!hv_dev->channel)
120 return -ENODEV;
121 return sprintf(buf, "%d\n", hv_dev->channel->state);
122}
123static DEVICE_ATTR_RO(state);
124
5ffd00e2
GKH
125static ssize_t monitor_id_show(struct device *dev,
126 struct device_attribute *dev_attr, char *buf)
127{
128 struct hv_device *hv_dev = device_to_hv_device(dev);
129
130 if (!hv_dev->channel)
131 return -ENODEV;
132 return sprintf(buf, "%d\n", hv_dev->channel->offermsg.monitorid);
133}
134static DEVICE_ATTR_RO(monitor_id);
135
68234c04
GKH
136static ssize_t class_id_show(struct device *dev,
137 struct device_attribute *dev_attr, char *buf)
138{
139 struct hv_device *hv_dev = device_to_hv_device(dev);
140
141 if (!hv_dev->channel)
142 return -ENODEV;
143 return sprintf(buf, "{%pUl}\n",
144 hv_dev->channel->offermsg.offer.if_type.b);
145}
146static DEVICE_ATTR_RO(class_id);
147
7c55e1d0
GKH
148static ssize_t device_id_show(struct device *dev,
149 struct device_attribute *dev_attr, char *buf)
150{
151 struct hv_device *hv_dev = device_to_hv_device(dev);
152
153 if (!hv_dev->channel)
154 return -ENODEV;
155 return sprintf(buf, "{%pUl}\n",
156 hv_dev->channel->offermsg.offer.if_instance.b);
157}
158static DEVICE_ATTR_RO(device_id);
159
647fa371
GKH
160static ssize_t modalias_show(struct device *dev,
161 struct device_attribute *dev_attr, char *buf)
162{
163 struct hv_device *hv_dev = device_to_hv_device(dev);
164 char alias_name[VMBUS_ALIAS_LEN + 1];
165
166 print_alias_name(hv_dev, alias_name);
167 return sprintf(buf, "vmbus:%s\n", alias_name);
168}
169static DEVICE_ATTR_RO(modalias);
170
76c52bbe
GKH
171static ssize_t server_monitor_pending_show(struct device *dev,
172 struct device_attribute *dev_attr,
173 char *buf)
174{
175 struct hv_device *hv_dev = device_to_hv_device(dev);
176
177 if (!hv_dev->channel)
178 return -ENODEV;
179 return sprintf(buf, "%d\n",
180 channel_pending(hv_dev->channel,
181 vmbus_connection.monitor_pages[1]));
182}
183static DEVICE_ATTR_RO(server_monitor_pending);
184
185static ssize_t client_monitor_pending_show(struct device *dev,
186 struct device_attribute *dev_attr,
187 char *buf)
188{
189 struct hv_device *hv_dev = device_to_hv_device(dev);
190
191 if (!hv_dev->channel)
192 return -ENODEV;
193 return sprintf(buf, "%d\n",
194 channel_pending(hv_dev->channel,
195 vmbus_connection.monitor_pages[1]));
196}
197static DEVICE_ATTR_RO(client_monitor_pending);
68234c04 198
1cee272b
GKH
199static ssize_t server_monitor_latency_show(struct device *dev,
200 struct device_attribute *dev_attr,
201 char *buf)
202{
203 struct hv_device *hv_dev = device_to_hv_device(dev);
204
205 if (!hv_dev->channel)
206 return -ENODEV;
207 return sprintf(buf, "%d\n",
208 channel_latency(hv_dev->channel,
209 vmbus_connection.monitor_pages[0]));
210}
211static DEVICE_ATTR_RO(server_monitor_latency);
212
213static ssize_t client_monitor_latency_show(struct device *dev,
214 struct device_attribute *dev_attr,
215 char *buf)
216{
217 struct hv_device *hv_dev = device_to_hv_device(dev);
218
219 if (!hv_dev->channel)
220 return -ENODEV;
221 return sprintf(buf, "%d\n",
222 channel_latency(hv_dev->channel,
223 vmbus_connection.monitor_pages[1]));
224}
225static DEVICE_ATTR_RO(client_monitor_latency);
226
4947c745
GKH
227static ssize_t server_monitor_conn_id_show(struct device *dev,
228 struct device_attribute *dev_attr,
229 char *buf)
230{
231 struct hv_device *hv_dev = device_to_hv_device(dev);
232
233 if (!hv_dev->channel)
234 return -ENODEV;
235 return sprintf(buf, "%d\n",
236 channel_conn_id(hv_dev->channel,
237 vmbus_connection.monitor_pages[0]));
238}
239static DEVICE_ATTR_RO(server_monitor_conn_id);
240
241static ssize_t client_monitor_conn_id_show(struct device *dev,
242 struct device_attribute *dev_attr,
243 char *buf)
244{
245 struct hv_device *hv_dev = device_to_hv_device(dev);
246
247 if (!hv_dev->channel)
248 return -ENODEV;
249 return sprintf(buf, "%d\n",
250 channel_conn_id(hv_dev->channel,
251 vmbus_connection.monitor_pages[1]));
252}
253static DEVICE_ATTR_RO(client_monitor_conn_id);
254
98f4c651
GKH
255static ssize_t out_intr_mask_show(struct device *dev,
256 struct device_attribute *dev_attr, char *buf)
257{
258 struct hv_device *hv_dev = device_to_hv_device(dev);
259 struct hv_ring_buffer_debug_info outbound;
260
261 if (!hv_dev->channel)
262 return -ENODEV;
263 hv_ringbuffer_get_debuginfo(&hv_dev->channel->outbound, &outbound);
264 return sprintf(buf, "%d\n", outbound.current_interrupt_mask);
265}
266static DEVICE_ATTR_RO(out_intr_mask);
267
268static ssize_t out_read_index_show(struct device *dev,
269 struct device_attribute *dev_attr, char *buf)
270{
271 struct hv_device *hv_dev = device_to_hv_device(dev);
272 struct hv_ring_buffer_debug_info outbound;
273
274 if (!hv_dev->channel)
275 return -ENODEV;
276 hv_ringbuffer_get_debuginfo(&hv_dev->channel->outbound, &outbound);
277 return sprintf(buf, "%d\n", outbound.current_read_index);
278}
279static DEVICE_ATTR_RO(out_read_index);
280
281static ssize_t out_write_index_show(struct device *dev,
282 struct device_attribute *dev_attr,
283 char *buf)
284{
285 struct hv_device *hv_dev = device_to_hv_device(dev);
286 struct hv_ring_buffer_debug_info outbound;
287
288 if (!hv_dev->channel)
289 return -ENODEV;
290 hv_ringbuffer_get_debuginfo(&hv_dev->channel->outbound, &outbound);
291 return sprintf(buf, "%d\n", outbound.current_write_index);
292}
293static DEVICE_ATTR_RO(out_write_index);
294
295static ssize_t out_read_bytes_avail_show(struct device *dev,
296 struct device_attribute *dev_attr,
297 char *buf)
298{
299 struct hv_device *hv_dev = device_to_hv_device(dev);
300 struct hv_ring_buffer_debug_info outbound;
301
302 if (!hv_dev->channel)
303 return -ENODEV;
304 hv_ringbuffer_get_debuginfo(&hv_dev->channel->outbound, &outbound);
305 return sprintf(buf, "%d\n", outbound.bytes_avail_toread);
306}
307static DEVICE_ATTR_RO(out_read_bytes_avail);
308
309static ssize_t out_write_bytes_avail_show(struct device *dev,
310 struct device_attribute *dev_attr,
311 char *buf)
312{
313 struct hv_device *hv_dev = device_to_hv_device(dev);
314 struct hv_ring_buffer_debug_info outbound;
315
316 if (!hv_dev->channel)
317 return -ENODEV;
318 hv_ringbuffer_get_debuginfo(&hv_dev->channel->outbound, &outbound);
319 return sprintf(buf, "%d\n", outbound.bytes_avail_towrite);
320}
321static DEVICE_ATTR_RO(out_write_bytes_avail);
322
323static ssize_t in_intr_mask_show(struct device *dev,
324 struct device_attribute *dev_attr, char *buf)
325{
326 struct hv_device *hv_dev = device_to_hv_device(dev);
327 struct hv_ring_buffer_debug_info inbound;
328
329 if (!hv_dev->channel)
330 return -ENODEV;
331 hv_ringbuffer_get_debuginfo(&hv_dev->channel->inbound, &inbound);
332 return sprintf(buf, "%d\n", inbound.current_interrupt_mask);
333}
334static DEVICE_ATTR_RO(in_intr_mask);
335
336static ssize_t in_read_index_show(struct device *dev,
337 struct device_attribute *dev_attr, char *buf)
338{
339 struct hv_device *hv_dev = device_to_hv_device(dev);
340 struct hv_ring_buffer_debug_info inbound;
341
342 if (!hv_dev->channel)
343 return -ENODEV;
344 hv_ringbuffer_get_debuginfo(&hv_dev->channel->inbound, &inbound);
345 return sprintf(buf, "%d\n", inbound.current_read_index);
346}
347static DEVICE_ATTR_RO(in_read_index);
348
349static ssize_t in_write_index_show(struct device *dev,
350 struct device_attribute *dev_attr, char *buf)
351{
352 struct hv_device *hv_dev = device_to_hv_device(dev);
353 struct hv_ring_buffer_debug_info inbound;
354
355 if (!hv_dev->channel)
356 return -ENODEV;
357 hv_ringbuffer_get_debuginfo(&hv_dev->channel->inbound, &inbound);
358 return sprintf(buf, "%d\n", inbound.current_write_index);
359}
360static DEVICE_ATTR_RO(in_write_index);
361
362static ssize_t in_read_bytes_avail_show(struct device *dev,
363 struct device_attribute *dev_attr,
364 char *buf)
365{
366 struct hv_device *hv_dev = device_to_hv_device(dev);
367 struct hv_ring_buffer_debug_info inbound;
368
369 if (!hv_dev->channel)
370 return -ENODEV;
371 hv_ringbuffer_get_debuginfo(&hv_dev->channel->inbound, &inbound);
372 return sprintf(buf, "%d\n", inbound.bytes_avail_toread);
373}
374static DEVICE_ATTR_RO(in_read_bytes_avail);
375
376static ssize_t in_write_bytes_avail_show(struct device *dev,
377 struct device_attribute *dev_attr,
378 char *buf)
379{
380 struct hv_device *hv_dev = device_to_hv_device(dev);
381 struct hv_ring_buffer_debug_info inbound;
382
383 if (!hv_dev->channel)
384 return -ENODEV;
385 hv_ringbuffer_get_debuginfo(&hv_dev->channel->inbound, &inbound);
386 return sprintf(buf, "%d\n", inbound.bytes_avail_towrite);
387}
388static DEVICE_ATTR_RO(in_write_bytes_avail);
389
390/* Set up per device attributes in /sys/bus/vmbus/devices/<bus device> */
03f3a910
GKH
391static struct attribute *vmbus_attrs[] = {
392 &dev_attr_id.attr,
a8fb5f3d 393 &dev_attr_state.attr,
5ffd00e2 394 &dev_attr_monitor_id.attr,
68234c04 395 &dev_attr_class_id.attr,
7c55e1d0 396 &dev_attr_device_id.attr,
647fa371 397 &dev_attr_modalias.attr,
76c52bbe
GKH
398 &dev_attr_server_monitor_pending.attr,
399 &dev_attr_client_monitor_pending.attr,
1cee272b
GKH
400 &dev_attr_server_monitor_latency.attr,
401 &dev_attr_client_monitor_latency.attr,
4947c745
GKH
402 &dev_attr_server_monitor_conn_id.attr,
403 &dev_attr_client_monitor_conn_id.attr,
98f4c651
GKH
404 &dev_attr_out_intr_mask.attr,
405 &dev_attr_out_read_index.attr,
406 &dev_attr_out_write_index.attr,
407 &dev_attr_out_read_bytes_avail.attr,
408 &dev_attr_out_write_bytes_avail.attr,
409 &dev_attr_in_intr_mask.attr,
410 &dev_attr_in_read_index.attr,
411 &dev_attr_in_write_index.attr,
412 &dev_attr_in_read_bytes_avail.attr,
413 &dev_attr_in_write_bytes_avail.attr,
03f3a910
GKH
414 NULL,
415};
416ATTRIBUTE_GROUPS(vmbus);
417
adde2487
S
418/*
419 * vmbus_uevent - add uevent for our device
420 *
421 * This routine is invoked when a device is added or removed on the vmbus to
422 * generate a uevent to udev in the userspace. The udev will then look at its
423 * rule and the uevent generated here to load the appropriate driver
0ddda660
S
424 *
425 * The alias string will be of the form vmbus:guid where guid is the string
426 * representation of the device guid (each byte of the guid will be
427 * represented with two hex characters.
adde2487
S
428 */
429static int vmbus_uevent(struct device *device, struct kobj_uevent_env *env)
430{
431 struct hv_device *dev = device_to_hv_device(device);
fd776ba9
OH
432 int ret;
433 char alias_name[VMBUS_ALIAS_LEN + 1];
0ddda660 434
fd776ba9 435 print_alias_name(dev, alias_name);
0ddda660
S
436 ret = add_uevent_var(env, "MODALIAS=vmbus:%s", alias_name);
437 return ret;
adde2487
S
438}
439
1b9d48f2 440static const uuid_le null_guid;
5841a829
S
441
442static inline bool is_null_guid(const __u8 *guid)
443{
444 if (memcmp(guid, &null_guid, sizeof(uuid_le)))
445 return false;
446 return true;
447}
448
3037a7b6
S
449/*
450 * Return a matching hv_vmbus_device_id pointer.
451 * If there is no match, return NULL.
452 */
453static const struct hv_vmbus_device_id *hv_vmbus_get_id(
454 const struct hv_vmbus_device_id *id,
1b9d48f2 455 const __u8 *guid)
3037a7b6
S
456{
457 for (; !is_null_guid(id->guid); id++)
458 if (!memcmp(&id->guid, guid, sizeof(uuid_le)))
459 return id;
460
461 return NULL;
462}
463
464
b7fc147b
S
465
466/*
467 * vmbus_match - Attempt to match the specified device to the specified driver
468 */
469static int vmbus_match(struct device *device, struct device_driver *driver)
470{
b7fc147b 471 struct hv_driver *drv = drv_to_hv_drv(driver);
e8e27047 472 struct hv_device *hv_dev = device_to_hv_device(device);
b7fc147b 473
3037a7b6
S
474 if (hv_vmbus_get_id(drv->id_table, hv_dev->dev_type.b))
475 return 1;
de632a2b 476
5841a829 477 return 0;
b7fc147b
S
478}
479
f1f0d67b
S
480/*
481 * vmbus_probe - Add the new vmbus's child device
482 */
483static int vmbus_probe(struct device *child_device)
484{
485 int ret = 0;
486 struct hv_driver *drv =
487 drv_to_hv_drv(child_device->driver);
9efd21e1 488 struct hv_device *dev = device_to_hv_device(child_device);
84946899 489 const struct hv_vmbus_device_id *dev_id;
f1f0d67b 490
84946899 491 dev_id = hv_vmbus_get_id(drv->id_table, dev->dev_type.b);
9efd21e1 492 if (drv->probe) {
84946899 493 ret = drv->probe(dev, dev_id);
b14a7b30 494 if (ret != 0)
0a46618d
HJ
495 pr_err("probe failed for device %s (%d)\n",
496 dev_name(child_device), ret);
f1f0d67b 497
f1f0d67b 498 } else {
0a46618d
HJ
499 pr_err("probe not set for driver %s\n",
500 dev_name(child_device));
6de925b1 501 ret = -ENODEV;
f1f0d67b
S
502 }
503 return ret;
504}
505
c5dce3db
S
506/*
507 * vmbus_remove - Remove a vmbus device
508 */
509static int vmbus_remove(struct device *child_device)
510{
d4372179 511 struct hv_driver *drv = drv_to_hv_drv(child_device->driver);
415b023a 512 struct hv_device *dev = device_to_hv_device(child_device);
c5dce3db 513
d4372179
S
514 if (drv->remove)
515 drv->remove(dev);
516 else
517 pr_err("remove not set for driver %s\n",
518 dev_name(child_device));
c5dce3db
S
519
520 return 0;
521}
522
eb1bb259
S
523
524/*
525 * vmbus_shutdown - Shutdown a vmbus device
526 */
527static void vmbus_shutdown(struct device *child_device)
528{
529 struct hv_driver *drv;
ca6887fb 530 struct hv_device *dev = device_to_hv_device(child_device);
eb1bb259
S
531
532
533 /* The device may not be attached yet */
534 if (!child_device->driver)
535 return;
536
537 drv = drv_to_hv_drv(child_device->driver);
538
ca6887fb
S
539 if (drv->shutdown)
540 drv->shutdown(dev);
eb1bb259
S
541
542 return;
543}
544
086e7a56
S
545
546/*
547 * vmbus_device_release - Final callback release of the vmbus child device
548 */
549static void vmbus_device_release(struct device *device)
550{
e8e27047 551 struct hv_device *hv_dev = device_to_hv_device(device);
086e7a56 552
e8e27047 553 kfree(hv_dev);
086e7a56
S
554
555}
556
454f18a9 557/* The one and only one */
9adcac5c
S
558static struct bus_type hv_bus = {
559 .name = "vmbus",
560 .match = vmbus_match,
561 .shutdown = vmbus_shutdown,
562 .remove = vmbus_remove,
563 .probe = vmbus_probe,
564 .uevent = vmbus_uevent,
03f3a910 565 .dev_groups = vmbus_groups,
3e7ee490
HJ
566};
567
bf6506f6
TT
568struct onmessage_work_context {
569 struct work_struct work;
570 struct hv_message msg;
571};
572
573static void vmbus_onmessage_work(struct work_struct *work)
574{
575 struct onmessage_work_context *ctx;
576
09a19628
VK
577 /* Do not process messages if we're in DISCONNECTED state */
578 if (vmbus_connection.conn_state == DISCONNECTED)
579 return;
580
bf6506f6
TT
581 ctx = container_of(work, struct onmessage_work_context,
582 work);
583 vmbus_onmessage(&ctx->msg);
584 kfree(ctx);
585}
586
d8a60e00 587static void hv_process_timer_expiration(struct hv_message *msg, int cpu)
4061ed9e
S
588{
589 struct clock_event_device *dev = hv_context.clk_evt[cpu];
590
591 if (dev->event_handler)
592 dev->event_handler(dev);
593
594 msg->header.message_type = HVMSG_NONE;
595
596 /*
597 * Make sure the write to MessageType (ie set to
598 * HVMSG_NONE) happens before we read the
599 * MessagePending and EOMing. Otherwise, the EOMing
600 * will not deliver any more messages since there is
601 * no empty slot
602 */
603 mb();
604
605 if (msg->header.message_flags.msg_pending) {
606 /*
607 * This will cause message queue rescan to
608 * possibly deliver another msg from the
609 * hypervisor
610 */
611 wrmsrl(HV_X64_MSR_EOM, 0);
612 }
613}
614
62c1059d 615static void vmbus_on_msg_dpc(unsigned long data)
36199a99
GKH
616{
617 int cpu = smp_processor_id();
618 void *page_addr = hv_context.synic_message_page[cpu];
619 struct hv_message *msg = (struct hv_message *)page_addr +
620 VMBUS_MESSAGE_SINT;
bf6506f6 621 struct onmessage_work_context *ctx;
36199a99
GKH
622
623 while (1) {
624 if (msg->header.message_type == HVMSG_NONE) {
625 /* no msg */
626 break;
627 } else {
bf6506f6
TT
628 ctx = kmalloc(sizeof(*ctx), GFP_ATOMIC);
629 if (ctx == NULL)
36199a99 630 continue;
bf6506f6
TT
631 INIT_WORK(&ctx->work, vmbus_onmessage_work);
632 memcpy(&ctx->msg, msg, sizeof(*msg));
da9fcb72 633 queue_work(vmbus_connection.work_queue, &ctx->work);
36199a99
GKH
634 }
635
636 msg->header.message_type = HVMSG_NONE;
637
638 /*
639 * Make sure the write to MessageType (ie set to
640 * HVMSG_NONE) happens before we read the
641 * MessagePending and EOMing. Otherwise, the EOMing
642 * will not deliver any more messages since there is
643 * no empty slot
644 */
35848f68 645 mb();
36199a99
GKH
646
647 if (msg->header.message_flags.msg_pending) {
648 /*
649 * This will cause message queue rescan to
650 * possibly deliver another msg from the
651 * hypervisor
652 */
653 wrmsrl(HV_X64_MSR_EOM, 0);
654 }
655 }
656}
657
76d388cd 658static void vmbus_isr(void)
36199a99 659{
36199a99
GKH
660 int cpu = smp_processor_id();
661 void *page_addr;
662 struct hv_message *msg;
663 union hv_synic_event_flags *event;
ae4636e6 664 bool handled = false;
36199a99 665
5ab05951
S
666 page_addr = hv_context.synic_event_page[cpu];
667 if (page_addr == NULL)
76d388cd 668 return;
5ab05951
S
669
670 event = (union hv_synic_event_flags *)page_addr +
671 VMBUS_MESSAGE_SINT;
7341d908
S
672 /*
673 * Check for events before checking for messages. This is the order
674 * in which events and messages are checked in Windows guests on
675 * Hyper-V, and the Windows team suggested we do the same.
676 */
36199a99 677
6552ecd7
S
678 if ((vmbus_proto_version == VERSION_WS2008) ||
679 (vmbus_proto_version == VERSION_WIN7)) {
36199a99 680
6552ecd7
S
681 /* Since we are a child, we only need to check bit 0 */
682 if (sync_test_and_clear_bit(0,
683 (unsigned long *) &event->flags32[0])) {
684 handled = true;
685 }
686 } else {
687 /*
688 * Our host is win8 or above. The signaling mechanism
689 * has changed and we can directly look at the event page.
690 * If bit n is set then we have an interrup on the channel
691 * whose id is n.
692 */
ae4636e6 693 handled = true;
ae4636e6 694 }
793be9c7 695
6552ecd7 696 if (handled)
db11f12a 697 tasklet_schedule(hv_context.event_dpc[cpu]);
6552ecd7
S
698
699
7341d908
S
700 page_addr = hv_context.synic_message_page[cpu];
701 msg = (struct hv_message *)page_addr + VMBUS_MESSAGE_SINT;
702
703 /* Check if there are actual msgs to be processed */
4061ed9e
S
704 if (msg->header.message_type != HVMSG_NONE) {
705 if (msg->header.message_type == HVMSG_TIMER_EXPIRED)
706 hv_process_timer_expiration(msg, cpu);
707 else
708 tasklet_schedule(&msg_dpc);
709 }
793be9c7
S
710}
711
e513229b
VK
712#ifdef CONFIG_HOTPLUG_CPU
713static int hyperv_cpu_disable(void)
714{
715 return -ENOSYS;
716}
717
718static void hv_cpu_hotplug_quirk(bool vmbus_loaded)
719{
720 static void *previous_cpu_disable;
721
722 /*
723 * Offlining a CPU when running on newer hypervisors (WS2012R2, Win8,
724 * ...) is not supported at this moment as channel interrupts are
725 * distributed across all of them.
726 */
727
728 if ((vmbus_proto_version == VERSION_WS2008) ||
729 (vmbus_proto_version == VERSION_WIN7))
730 return;
731
732 if (vmbus_loaded) {
733 previous_cpu_disable = smp_ops.cpu_disable;
734 smp_ops.cpu_disable = hyperv_cpu_disable;
735 pr_notice("CPU offlining is not supported by hypervisor\n");
736 } else if (previous_cpu_disable)
737 smp_ops.cpu_disable = previous_cpu_disable;
738}
739#else
740static void hv_cpu_hotplug_quirk(bool vmbus_loaded)
741{
742}
743#endif
744
3e189519 745/*
90c9960e
GKH
746 * vmbus_bus_init -Main vmbus driver initialization routine.
747 *
748 * Here, we
0686e4f4 749 * - initialize the vmbus driver context
0686e4f4
LL
750 * - invoke the vmbus hv main init routine
751 * - get the irq resource
0686e4f4 752 * - retrieve the channel offers
90c9960e 753 */
9aaa995e 754static int vmbus_bus_init(int irq)
3e7ee490 755{
90c9960e 756 int ret;
3e7ee490 757
6d26e38f
GKH
758 /* Hypervisor initialization...setup hypercall page..etc */
759 ret = hv_init();
90c9960e 760 if (ret != 0) {
0a46618d 761 pr_err("Unable to initialize the hypervisor - 0x%x\n", ret);
d6c1c5de 762 return ret;
3e7ee490
HJ
763 }
764
59c0e4f0 765 tasklet_init(&msg_dpc, vmbus_on_msg_dpc, 0);
3e7ee490 766
9adcac5c 767 ret = bus_register(&hv_bus);
d6c1c5de 768 if (ret)
8b9987e9 769 goto err_cleanup;
3e7ee490 770
76d388cd 771 hv_setup_vmbus_irq(vmbus_isr);
3e7ee490 772
2608fb65
JW
773 ret = hv_synic_alloc();
774 if (ret)
775 goto err_alloc;
800b6902 776 /*
302a3c0f 777 * Initialize the per-cpu interrupt state and
800b6902
S
778 * connect to the host.
779 */
302a3c0f 780 on_each_cpu(hv_synic_init, NULL, 1);
800b6902 781 ret = vmbus_connect();
8b9987e9 782 if (ret)
2608fb65 783 goto err_alloc;
800b6902 784
e513229b 785 hv_cpu_hotplug_quirk(true);
2d6e882b 786 vmbus_request_offers();
8b5d6d3b 787
d6c1c5de 788 return 0;
8b9987e9 789
2608fb65
JW
790err_alloc:
791 hv_synic_free();
76d388cd 792 hv_remove_vmbus_irq();
8b9987e9 793
8b9987e9
S
794 bus_unregister(&hv_bus);
795
796err_cleanup:
797 hv_cleanup();
798
799 return ret;
3e7ee490
HJ
800}
801
90c9960e 802/**
768fa219
GKH
803 * __vmbus_child_driver_register - Register a vmbus's driver
804 * @drv: Pointer to driver structure you want to register
805 * @owner: owner module of the drv
806 * @mod_name: module name string
3e189519
HJ
807 *
808 * Registers the given driver with Linux through the 'driver_register()' call
768fa219 809 * and sets up the hyper-v vmbus handling for this driver.
3e189519
HJ
810 * It will return the state of the 'driver_register()' call.
811 *
90c9960e 812 */
768fa219 813int __vmbus_driver_register(struct hv_driver *hv_driver, struct module *owner, const char *mod_name)
3e7ee490 814{
5d48a1c2 815 int ret;
3e7ee490 816
768fa219 817 pr_info("registering driver %s\n", hv_driver->name);
3e7ee490 818
cf6a2eac
S
819 ret = vmbus_exists();
820 if (ret < 0)
821 return ret;
822
768fa219
GKH
823 hv_driver->driver.name = hv_driver->name;
824 hv_driver->driver.owner = owner;
825 hv_driver->driver.mod_name = mod_name;
826 hv_driver->driver.bus = &hv_bus;
3e7ee490 827
768fa219 828 ret = driver_register(&hv_driver->driver);
3e7ee490 829
5d48a1c2 830 return ret;
3e7ee490 831}
768fa219 832EXPORT_SYMBOL_GPL(__vmbus_driver_register);
3e7ee490 833
90c9960e 834/**
768fa219
GKH
835 * vmbus_driver_unregister() - Unregister a vmbus's driver
836 * @drv: Pointer to driver structure you want to un-register
3e189519 837 *
768fa219
GKH
838 * Un-register the given driver that was previous registered with a call to
839 * vmbus_driver_register()
90c9960e 840 */
768fa219 841void vmbus_driver_unregister(struct hv_driver *hv_driver)
3e7ee490 842{
768fa219 843 pr_info("unregistering driver %s\n", hv_driver->name);
3e7ee490 844
cf6a2eac 845 if (!vmbus_exists())
8f257a14 846 driver_unregister(&hv_driver->driver);
3e7ee490 847}
768fa219 848EXPORT_SYMBOL_GPL(vmbus_driver_unregister);
3e7ee490 849
3e189519 850/*
f2c73011 851 * vmbus_device_create - Creates and registers a new child device
3e189519 852 * on the vmbus.
90c9960e 853 */
1b9d48f2 854struct hv_device *vmbus_device_create(const uuid_le *type,
855 const uuid_le *instance,
856 struct vmbus_channel *channel)
3e7ee490 857{
3d3b5518 858 struct hv_device *child_device_obj;
3e7ee490 859
6bad88da
S
860 child_device_obj = kzalloc(sizeof(struct hv_device), GFP_KERNEL);
861 if (!child_device_obj) {
0a46618d 862 pr_err("Unable to allocate device object for child device\n");
3e7ee490
HJ
863 return NULL;
864 }
865
cae5b843 866 child_device_obj->channel = channel;
358d2ee2 867 memcpy(&child_device_obj->dev_type, type, sizeof(uuid_le));
ca623ad3 868 memcpy(&child_device_obj->dev_instance, instance,
358d2ee2 869 sizeof(uuid_le));
3e7ee490 870
3e7ee490 871
3e7ee490
HJ
872 return child_device_obj;
873}
874
3e189519 875/*
22794281 876 * vmbus_device_register - Register the child device
90c9960e 877 */
22794281 878int vmbus_device_register(struct hv_device *child_device_obj)
3e7ee490 879{
90c9960e 880 int ret = 0;
6bad88da 881
bc63b6f6
VK
882 dev_set_name(&child_device_obj->device, "vmbus_%d",
883 child_device_obj->channel->id);
3e7ee490 884
0bce28b6 885 child_device_obj->device.bus = &hv_bus;
607c1a11 886 child_device_obj->device.parent = &hv_acpi_dev->dev;
6bad88da 887 child_device_obj->device.release = vmbus_device_release;
3e7ee490 888
90c9960e
GKH
889 /*
890 * Register with the LDM. This will kick off the driver/device
891 * binding...which will eventually call vmbus_match() and vmbus_probe()
892 */
6bad88da 893 ret = device_register(&child_device_obj->device);
3e7ee490 894
3e7ee490 895 if (ret)
0a46618d 896 pr_err("Unable to register child device\n");
3e7ee490 897 else
84672369 898 pr_debug("child device %s registered\n",
0a46618d 899 dev_name(&child_device_obj->device));
3e7ee490 900
3e7ee490
HJ
901 return ret;
902}
903
3e189519 904/*
696453ba 905 * vmbus_device_unregister - Remove the specified child device
3e189519 906 * from the vmbus.
90c9960e 907 */
696453ba 908void vmbus_device_unregister(struct hv_device *device_obj)
3e7ee490 909{
84672369
FS
910 pr_debug("child device %s unregistered\n",
911 dev_name(&device_obj->device));
912
90c9960e
GKH
913 /*
914 * Kick off the process of unregistering the device.
915 * This will call vmbus_remove() and eventually vmbus_device_release()
916 */
6bad88da 917 device_unregister(&device_obj->device);
3e7ee490
HJ
918}
919
3e7ee490 920
b0069f43 921/*
90f34535
S
922 * VMBUS is an acpi enumerated device. Get the the information we
923 * need from DSDT.
b0069f43
S
924 */
925
90f34535 926static acpi_status vmbus_walk_resources(struct acpi_resource *res, void *ctx)
b0069f43 927{
90f34535
S
928 switch (res->type) {
929 case ACPI_RESOURCE_TYPE_IRQ:
930 irq = res->data.irq.interrupts[0];
4eb923f8 931 break;
b0069f43 932
90f34535 933 case ACPI_RESOURCE_TYPE_ADDRESS64:
a45de93e
LZ
934 hyperv_mmio.start = res->data.address64.address.minimum;
935 hyperv_mmio.end = res->data.address64.address.maximum;
4eb923f8 936 break;
b0069f43
S
937 }
938
939 return AE_OK;
940}
941
942static int vmbus_acpi_add(struct acpi_device *device)
943{
944 acpi_status result;
90f34535 945 int ret_val = -ENODEV;
b0069f43 946
607c1a11
S
947 hv_acpi_dev = device;
948
0a4425b6 949 result = acpi_walk_resources(device->handle, METHOD_NAME__CRS,
90f34535 950 vmbus_walk_resources, NULL);
b0069f43 951
90f34535
S
952 if (ACPI_FAILURE(result))
953 goto acpi_walk_err;
954 /*
955 * The parent of the vmbus acpi device (Gen2 firmware) is the VMOD that
956 * has the mmio ranges. Get that.
957 */
958 if (device->parent) {
959 result = acpi_walk_resources(device->parent->handle,
960 METHOD_NAME__CRS,
961 vmbus_walk_resources, NULL);
962
963 if (ACPI_FAILURE(result))
964 goto acpi_walk_err;
90eedf0c
GH
965 if (hyperv_mmio.start && hyperv_mmio.end)
966 request_resource(&iomem_resource, &hyperv_mmio);
b0069f43 967 }
90f34535
S
968 ret_val = 0;
969
970acpi_walk_err:
b0069f43 971 complete(&probe_event);
90f34535 972 return ret_val;
b0069f43
S
973}
974
975static const struct acpi_device_id vmbus_acpi_device_ids[] = {
976 {"VMBUS", 0},
9d7b18d1 977 {"VMBus", 0},
b0069f43
S
978 {"", 0},
979};
980MODULE_DEVICE_TABLE(acpi, vmbus_acpi_device_ids);
981
982static struct acpi_driver vmbus_acpi_driver = {
983 .name = "vmbus",
984 .ids = vmbus_acpi_device_ids,
985 .ops = {
986 .add = vmbus_acpi_add,
987 },
988};
989
607c1a11 990static int __init hv_acpi_init(void)
1168ac22 991{
2dda95f8 992 int ret, t;
b0069f43 993
1f94ea81 994 if (x86_hyper != &x86_hyper_ms_hyperv)
0592969e
JW
995 return -ENODEV;
996
b0069f43
S
997 init_completion(&probe_event);
998
999 /*
1000 * Get irq resources first.
1001 */
0246604c
S
1002 ret = acpi_bus_register_driver(&vmbus_acpi_driver);
1003
b0069f43
S
1004 if (ret)
1005 return ret;
1006
2dda95f8
S
1007 t = wait_for_completion_timeout(&probe_event, 5*HZ);
1008 if (t == 0) {
1009 ret = -ETIMEDOUT;
1010 goto cleanup;
1011 }
b0069f43
S
1012
1013 if (irq <= 0) {
2dda95f8
S
1014 ret = -ENODEV;
1015 goto cleanup;
b0069f43
S
1016 }
1017
91fd799e
S
1018 ret = vmbus_bus_init(irq);
1019 if (ret)
2dda95f8
S
1020 goto cleanup;
1021
1022 return 0;
1023
1024cleanup:
1025 acpi_bus_unregister_driver(&vmbus_acpi_driver);
cf6a2eac 1026 hv_acpi_dev = NULL;
91fd799e 1027 return ret;
1168ac22
S
1028}
1029
93e5bd06
S
1030static void __exit vmbus_exit(void)
1031{
e72e7ac5
VK
1032 int cpu;
1033
09a19628 1034 vmbus_connection.conn_state = DISCONNECTED;
e086748c 1035 hv_synic_clockevents_cleanup();
76d388cd 1036 hv_remove_vmbus_irq();
93e5bd06
S
1037 vmbus_free_channels();
1038 bus_unregister(&hv_bus);
1039 hv_cleanup();
e72e7ac5
VK
1040 for_each_online_cpu(cpu)
1041 smp_call_function_single(cpu, hv_synic_cleanup, NULL, 1);
93e5bd06 1042 acpi_bus_unregister_driver(&vmbus_acpi_driver);
e513229b 1043 hv_cpu_hotplug_quirk(false);
09a19628 1044 vmbus_disconnect();
93e5bd06
S
1045}
1046
1168ac22 1047
90c9960e 1048MODULE_LICENSE("GPL");
3e7ee490 1049
43d4e119 1050subsys_initcall(hv_acpi_init);
93e5bd06 1051module_exit(vmbus_exit);
This page took 0.756002 seconds and 5 git commands to generate.