]> Git Repo - J-linux.git/blob - drivers/hv/channel_mgmt.c
Merge tag 'vfs-6.13-rc7.fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs
[J-linux.git] / drivers / hv / channel_mgmt.c
1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3  * Copyright (c) 2009, Microsoft Corporation.
4  *
5  * Authors:
6  *   Haiyang Zhang <[email protected]>
7  *   Hank Janssen  <[email protected]>
8  */
9 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
10
11 #include <linux/kernel.h>
12 #include <linux/interrupt.h>
13 #include <linux/sched.h>
14 #include <linux/wait.h>
15 #include <linux/mm.h>
16 #include <linux/slab.h>
17 #include <linux/list.h>
18 #include <linux/module.h>
19 #include <linux/completion.h>
20 #include <linux/delay.h>
21 #include <linux/cpu.h>
22 #include <linux/hyperv.h>
23 #include <asm/mshyperv.h>
24 #include <linux/sched/isolation.h>
25
26 #include "hyperv_vmbus.h"
27
28 static void init_vp_index(struct vmbus_channel *channel);
29
30 const struct vmbus_device vmbus_devs[] = {
31         /* IDE */
32         { .dev_type = HV_IDE,
33           HV_IDE_GUID,
34           .perf_device = true,
35           .allowed_in_isolated = false,
36         },
37
38         /* SCSI */
39         { .dev_type = HV_SCSI,
40           HV_SCSI_GUID,
41           .perf_device = true,
42           .allowed_in_isolated = true,
43         },
44
45         /* Fibre Channel */
46         { .dev_type = HV_FC,
47           HV_SYNTHFC_GUID,
48           .perf_device = true,
49           .allowed_in_isolated = false,
50         },
51
52         /* Synthetic NIC */
53         { .dev_type = HV_NIC,
54           HV_NIC_GUID,
55           .perf_device = true,
56           .allowed_in_isolated = true,
57         },
58
59         /* Network Direct */
60         { .dev_type = HV_ND,
61           HV_ND_GUID,
62           .perf_device = true,
63           .allowed_in_isolated = false,
64         },
65
66         /* PCIE */
67         { .dev_type = HV_PCIE,
68           HV_PCIE_GUID,
69           .perf_device = false,
70           .allowed_in_isolated = true,
71         },
72
73         /* Synthetic Frame Buffer */
74         { .dev_type = HV_FB,
75           HV_SYNTHVID_GUID,
76           .perf_device = false,
77           .allowed_in_isolated = false,
78         },
79
80         /* Synthetic Keyboard */
81         { .dev_type = HV_KBD,
82           HV_KBD_GUID,
83           .perf_device = false,
84           .allowed_in_isolated = false,
85         },
86
87         /* Synthetic MOUSE */
88         { .dev_type = HV_MOUSE,
89           HV_MOUSE_GUID,
90           .perf_device = false,
91           .allowed_in_isolated = false,
92         },
93
94         /* KVP */
95         { .dev_type = HV_KVP,
96           HV_KVP_GUID,
97           .perf_device = false,
98           .allowed_in_isolated = false,
99         },
100
101         /* Time Synch */
102         { .dev_type = HV_TS,
103           HV_TS_GUID,
104           .perf_device = false,
105           .allowed_in_isolated = true,
106         },
107
108         /* Heartbeat */
109         { .dev_type = HV_HB,
110           HV_HEART_BEAT_GUID,
111           .perf_device = false,
112           .allowed_in_isolated = true,
113         },
114
115         /* Shutdown */
116         { .dev_type = HV_SHUTDOWN,
117           HV_SHUTDOWN_GUID,
118           .perf_device = false,
119           .allowed_in_isolated = true,
120         },
121
122         /* File copy */
123         /* fcopy always uses 16KB ring buffer size and is working well for last many years */
124         { .pref_ring_size = 0x4000,
125           .dev_type = HV_FCOPY,
126           HV_FCOPY_GUID,
127           .perf_device = false,
128           .allowed_in_isolated = false,
129         },
130
131         /* Backup */
132         { .dev_type = HV_BACKUP,
133           HV_VSS_GUID,
134           .perf_device = false,
135           .allowed_in_isolated = false,
136         },
137
138         /* Dynamic Memory */
139         { .dev_type = HV_DM,
140           HV_DM_GUID,
141           .perf_device = false,
142           .allowed_in_isolated = false,
143         },
144
145         /*
146          * Unknown GUID
147          * 64 KB ring buffer + 4 KB header should be sufficient size for any Hyper-V device apart
148          * from HV_NIC and HV_SCSI. This case avoid the fallback for unknown devices to allocate
149          * much bigger (2 MB) of ring size.
150          */
151         { .pref_ring_size = 0x11000,
152           .dev_type = HV_UNKNOWN,
153           .perf_device = false,
154           .allowed_in_isolated = false,
155         },
156 };
157 EXPORT_SYMBOL_GPL(vmbus_devs);
158
159 static const struct {
160         guid_t guid;
161 } vmbus_unsupported_devs[] = {
162         { HV_AVMA1_GUID },
163         { HV_AVMA2_GUID },
164         { HV_RDV_GUID   },
165         { HV_IMC_GUID   },
166 };
167
168 /*
169  * The rescinded channel may be blocked waiting for a response from the host;
170  * take care of that.
171  */
172 static void vmbus_rescind_cleanup(struct vmbus_channel *channel)
173 {
174         struct vmbus_channel_msginfo *msginfo;
175         unsigned long flags;
176
177
178         spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
179         channel->rescind = true;
180         list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
181                                 msglistentry) {
182
183                 if (msginfo->waiting_channel == channel) {
184                         complete(&msginfo->waitevent);
185                         break;
186                 }
187         }
188         spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
189 }
190
191 static bool is_unsupported_vmbus_devs(const guid_t *guid)
192 {
193         int i;
194
195         for (i = 0; i < ARRAY_SIZE(vmbus_unsupported_devs); i++)
196                 if (guid_equal(guid, &vmbus_unsupported_devs[i].guid))
197                         return true;
198         return false;
199 }
200
201 static u16 hv_get_dev_type(const struct vmbus_channel *channel)
202 {
203         const guid_t *guid = &channel->offermsg.offer.if_type;
204         u16 i;
205
206         if (is_hvsock_channel(channel) || is_unsupported_vmbus_devs(guid))
207                 return HV_UNKNOWN;
208
209         for (i = HV_IDE; i < HV_UNKNOWN; i++) {
210                 if (guid_equal(guid, &vmbus_devs[i].guid))
211                         return i;
212         }
213         pr_info("Unknown GUID: %pUl\n", guid);
214         return i;
215 }
216
217 /**
218  * vmbus_prep_negotiate_resp() - Create default response for Negotiate message
219  * @icmsghdrp: Pointer to msg header structure
220  * @buf: Raw buffer channel data
221  * @buflen: Length of the raw buffer channel data.
222  * @fw_version: The framework versions we can support.
223  * @fw_vercnt: The size of @fw_version.
224  * @srv_version: The service versions we can support.
225  * @srv_vercnt: The size of @srv_version.
226  * @nego_fw_version: The selected framework version.
227  * @nego_srv_version: The selected service version.
228  *
229  * Note: Versions are given in decreasing order.
230  *
231  * Set up and fill in default negotiate response message.
232  * Mainly used by Hyper-V drivers.
233  */
234 bool vmbus_prep_negotiate_resp(struct icmsg_hdr *icmsghdrp, u8 *buf,
235                                 u32 buflen, const int *fw_version, int fw_vercnt,
236                                 const int *srv_version, int srv_vercnt,
237                                 int *nego_fw_version, int *nego_srv_version)
238 {
239         int icframe_major, icframe_minor;
240         int icmsg_major, icmsg_minor;
241         int fw_major, fw_minor;
242         int srv_major, srv_minor;
243         int i, j;
244         bool found_match = false;
245         struct icmsg_negotiate *negop;
246
247         /* Check that there's enough space for icframe_vercnt, icmsg_vercnt */
248         if (buflen < ICMSG_HDR + offsetof(struct icmsg_negotiate, reserved)) {
249                 pr_err_ratelimited("Invalid icmsg negotiate\n");
250                 return false;
251         }
252
253         icmsghdrp->icmsgsize = 0x10;
254         negop = (struct icmsg_negotiate *)&buf[ICMSG_HDR];
255
256         icframe_major = negop->icframe_vercnt;
257         icframe_minor = 0;
258
259         icmsg_major = negop->icmsg_vercnt;
260         icmsg_minor = 0;
261
262         /* Validate negop packet */
263         if (icframe_major > IC_VERSION_NEGOTIATION_MAX_VER_COUNT ||
264             icmsg_major > IC_VERSION_NEGOTIATION_MAX_VER_COUNT ||
265             ICMSG_NEGOTIATE_PKT_SIZE(icframe_major, icmsg_major) > buflen) {
266                 pr_err_ratelimited("Invalid icmsg negotiate - icframe_major: %u, icmsg_major: %u\n",
267                                    icframe_major, icmsg_major);
268                 goto fw_error;
269         }
270
271         /*
272          * Select the framework version number we will
273          * support.
274          */
275
276         for (i = 0; i < fw_vercnt; i++) {
277                 fw_major = (fw_version[i] >> 16);
278                 fw_minor = (fw_version[i] & 0xFFFF);
279
280                 for (j = 0; j < negop->icframe_vercnt; j++) {
281                         if ((negop->icversion_data[j].major == fw_major) &&
282                             (negop->icversion_data[j].minor == fw_minor)) {
283                                 icframe_major = negop->icversion_data[j].major;
284                                 icframe_minor = negop->icversion_data[j].minor;
285                                 found_match = true;
286                                 break;
287                         }
288                 }
289
290                 if (found_match)
291                         break;
292         }
293
294         if (!found_match)
295                 goto fw_error;
296
297         found_match = false;
298
299         for (i = 0; i < srv_vercnt; i++) {
300                 srv_major = (srv_version[i] >> 16);
301                 srv_minor = (srv_version[i] & 0xFFFF);
302
303                 for (j = negop->icframe_vercnt;
304                         (j < negop->icframe_vercnt + negop->icmsg_vercnt);
305                         j++) {
306
307                         if ((negop->icversion_data[j].major == srv_major) &&
308                                 (negop->icversion_data[j].minor == srv_minor)) {
309
310                                 icmsg_major = negop->icversion_data[j].major;
311                                 icmsg_minor = negop->icversion_data[j].minor;
312                                 found_match = true;
313                                 break;
314                         }
315                 }
316
317                 if (found_match)
318                         break;
319         }
320
321         /*
322          * Respond with the framework and service
323          * version numbers we can support.
324          */
325
326 fw_error:
327         if (!found_match) {
328                 negop->icframe_vercnt = 0;
329                 negop->icmsg_vercnt = 0;
330         } else {
331                 negop->icframe_vercnt = 1;
332                 negop->icmsg_vercnt = 1;
333         }
334
335         if (nego_fw_version)
336                 *nego_fw_version = (icframe_major << 16) | icframe_minor;
337
338         if (nego_srv_version)
339                 *nego_srv_version = (icmsg_major << 16) | icmsg_minor;
340
341         negop->icversion_data[0].major = icframe_major;
342         negop->icversion_data[0].minor = icframe_minor;
343         negop->icversion_data[1].major = icmsg_major;
344         negop->icversion_data[1].minor = icmsg_minor;
345         return found_match;
346 }
347 EXPORT_SYMBOL_GPL(vmbus_prep_negotiate_resp);
348
349 /*
350  * alloc_channel - Allocate and initialize a vmbus channel object
351  */
352 static struct vmbus_channel *alloc_channel(void)
353 {
354         struct vmbus_channel *channel;
355
356         channel = kzalloc(sizeof(*channel), GFP_ATOMIC);
357         if (!channel)
358                 return NULL;
359
360         spin_lock_init(&channel->sched_lock);
361         init_completion(&channel->rescind_event);
362
363         INIT_LIST_HEAD(&channel->sc_list);
364
365         tasklet_init(&channel->callback_event,
366                      vmbus_on_event, (unsigned long)channel);
367
368         hv_ringbuffer_pre_init(channel);
369
370         return channel;
371 }
372
373 /*
374  * free_channel - Release the resources used by the vmbus channel object
375  */
376 static void free_channel(struct vmbus_channel *channel)
377 {
378         tasklet_kill(&channel->callback_event);
379         vmbus_remove_channel_attr_group(channel);
380
381         kobject_put(&channel->kobj);
382 }
383
384 void vmbus_channel_map_relid(struct vmbus_channel *channel)
385 {
386         if (WARN_ON(channel->offermsg.child_relid >= MAX_CHANNEL_RELIDS))
387                 return;
388         /*
389          * The mapping of the channel's relid is visible from the CPUs that
390          * execute vmbus_chan_sched() by the time that vmbus_chan_sched() will
391          * execute:
392          *
393          *  (a) In the "normal (i.e., not resuming from hibernation)" path,
394          *      the full barrier in virt_store_mb() guarantees that the store
395          *      is propagated to all CPUs before the add_channel_work work
396          *      is queued.  In turn, add_channel_work is queued before the
397          *      channel's ring buffer is allocated/initialized and the
398          *      OPENCHANNEL message for the channel is sent in vmbus_open().
399          *      Hyper-V won't start sending the interrupts for the channel
400          *      before the OPENCHANNEL message is acked.  The memory barrier
401          *      in vmbus_chan_sched() -> sync_test_and_clear_bit() ensures
402          *      that vmbus_chan_sched() must find the channel's relid in
403          *      recv_int_page before retrieving the channel pointer from the
404          *      array of channels.
405          *
406          *  (b) In the "resuming from hibernation" path, the virt_store_mb()
407          *      guarantees that the store is propagated to all CPUs before
408          *      the VMBus connection is marked as ready for the resume event
409          *      (cf. check_ready_for_resume_event()).  The interrupt handler
410          *      of the VMBus driver and vmbus_chan_sched() can not run before
411          *      vmbus_bus_resume() has completed execution (cf. resume_noirq).
412          */
413         virt_store_mb(
414                 vmbus_connection.channels[channel->offermsg.child_relid],
415                 channel);
416 }
417
418 void vmbus_channel_unmap_relid(struct vmbus_channel *channel)
419 {
420         if (WARN_ON(channel->offermsg.child_relid >= MAX_CHANNEL_RELIDS))
421                 return;
422         WRITE_ONCE(
423                 vmbus_connection.channels[channel->offermsg.child_relid],
424                 NULL);
425 }
426
427 static void vmbus_release_relid(u32 relid)
428 {
429         struct vmbus_channel_relid_released msg;
430         int ret;
431
432         memset(&msg, 0, sizeof(struct vmbus_channel_relid_released));
433         msg.child_relid = relid;
434         msg.header.msgtype = CHANNELMSG_RELID_RELEASED;
435         ret = vmbus_post_msg(&msg, sizeof(struct vmbus_channel_relid_released),
436                              true);
437
438         trace_vmbus_release_relid(&msg, ret);
439 }
440
441 void hv_process_channel_removal(struct vmbus_channel *channel)
442 {
443         lockdep_assert_held(&vmbus_connection.channel_mutex);
444         BUG_ON(!channel->rescind);
445
446         /*
447          * hv_process_channel_removal() could find INVALID_RELID only for
448          * hv_sock channels.  See the inline comments in vmbus_onoffer().
449          */
450         WARN_ON(channel->offermsg.child_relid == INVALID_RELID &&
451                 !is_hvsock_channel(channel));
452
453         /*
454          * Upon suspend, an in-use hv_sock channel is removed from the array of
455          * channels and the relid is invalidated.  After hibernation, when the
456          * user-space application destroys the channel, it's unnecessary and
457          * unsafe to remove the channel from the array of channels.  See also
458          * the inline comments before the call of vmbus_release_relid() below.
459          */
460         if (channel->offermsg.child_relid != INVALID_RELID)
461                 vmbus_channel_unmap_relid(channel);
462
463         if (channel->primary_channel == NULL)
464                 list_del(&channel->listentry);
465         else
466                 list_del(&channel->sc_list);
467
468         /*
469          * If this is a "perf" channel, updates the hv_numa_map[] masks so that
470          * init_vp_index() can (re-)use the CPU.
471          */
472         if (hv_is_perf_channel(channel))
473                 hv_clear_allocated_cpu(channel->target_cpu);
474
475         /*
476          * Upon suspend, an in-use hv_sock channel is marked as "rescinded" and
477          * the relid is invalidated; after hibernation, when the user-space app
478          * destroys the channel, the relid is INVALID_RELID, and in this case
479          * it's unnecessary and unsafe to release the old relid, since the same
480          * relid can refer to a completely different channel now.
481          */
482         if (channel->offermsg.child_relid != INVALID_RELID)
483                 vmbus_release_relid(channel->offermsg.child_relid);
484
485         free_channel(channel);
486 }
487
488 void vmbus_free_channels(void)
489 {
490         struct vmbus_channel *channel, *tmp;
491
492         list_for_each_entry_safe(channel, tmp, &vmbus_connection.chn_list,
493                 listentry) {
494                 /* hv_process_channel_removal() needs this */
495                 channel->rescind = true;
496
497                 vmbus_device_unregister(channel->device_obj);
498         }
499 }
500
501 /* Note: the function can run concurrently for primary/sub channels. */
502 static void vmbus_add_channel_work(struct work_struct *work)
503 {
504         struct vmbus_channel *newchannel =
505                 container_of(work, struct vmbus_channel, add_channel_work);
506         struct vmbus_channel *primary_channel = newchannel->primary_channel;
507         int ret;
508
509         /*
510          * This state is used to indicate a successful open
511          * so that when we do close the channel normally, we
512          * can cleanup properly.
513          */
514         newchannel->state = CHANNEL_OPEN_STATE;
515
516         if (primary_channel != NULL) {
517                 /* newchannel is a sub-channel. */
518                 struct hv_device *dev = primary_channel->device_obj;
519
520                 if (vmbus_add_channel_kobj(dev, newchannel))
521                         goto err_deq_chan;
522
523                 if (primary_channel->sc_creation_callback != NULL)
524                         primary_channel->sc_creation_callback(newchannel);
525
526                 newchannel->probe_done = true;
527                 return;
528         }
529
530         /*
531          * Start the process of binding the primary channel to the driver
532          */
533         newchannel->device_obj = vmbus_device_create(
534                 &newchannel->offermsg.offer.if_type,
535                 &newchannel->offermsg.offer.if_instance,
536                 newchannel);
537         if (!newchannel->device_obj)
538                 goto err_deq_chan;
539
540         newchannel->device_obj->device_id = newchannel->device_id;
541         /*
542          * Add the new device to the bus. This will kick off device-driver
543          * binding which eventually invokes the device driver's AddDevice()
544          * method.
545          *
546          * If vmbus_device_register() fails, the 'device_obj' is freed in
547          * vmbus_device_release() as called by device_unregister() in the
548          * error path of vmbus_device_register(). In the outside error
549          * path, there's no need to free it.
550          */
551         ret = vmbus_device_register(newchannel->device_obj);
552
553         if (ret != 0) {
554                 pr_err("unable to add child device object (relid %d)\n",
555                         newchannel->offermsg.child_relid);
556                 goto err_deq_chan;
557         }
558
559         newchannel->probe_done = true;
560         return;
561
562 err_deq_chan:
563         mutex_lock(&vmbus_connection.channel_mutex);
564
565         /*
566          * We need to set the flag, otherwise
567          * vmbus_onoffer_rescind() can be blocked.
568          */
569         newchannel->probe_done = true;
570
571         if (primary_channel == NULL)
572                 list_del(&newchannel->listentry);
573         else
574                 list_del(&newchannel->sc_list);
575
576         /* vmbus_process_offer() has mapped the channel. */
577         vmbus_channel_unmap_relid(newchannel);
578
579         mutex_unlock(&vmbus_connection.channel_mutex);
580
581         vmbus_release_relid(newchannel->offermsg.child_relid);
582
583         free_channel(newchannel);
584 }
585
586 /*
587  * vmbus_process_offer - Process the offer by creating a channel/device
588  * associated with this offer
589  */
590 static void vmbus_process_offer(struct vmbus_channel *newchannel)
591 {
592         struct vmbus_channel *channel;
593         struct workqueue_struct *wq;
594         bool fnew = true;
595
596         /*
597          * Synchronize vmbus_process_offer() and CPU hotplugging:
598          *
599          * CPU1                         CPU2
600          *
601          * [vmbus_process_offer()]      [Hot removal of the CPU]
602          *
603          * CPU_READ_LOCK                CPUS_WRITE_LOCK
604          * LOAD cpu_online_mask         SEARCH chn_list
605          * STORE target_cpu             LOAD target_cpu
606          * INSERT chn_list              STORE cpu_online_mask
607          * CPUS_READ_UNLOCK             CPUS_WRITE_UNLOCK
608          *
609          * Forbids: CPU1's LOAD from *not* seing CPU2's STORE &&
610          *              CPU2's SEARCH from *not* seeing CPU1's INSERT
611          *
612          * Forbids: CPU2's SEARCH from seeing CPU1's INSERT &&
613          *              CPU2's LOAD from *not* seing CPU1's STORE
614          */
615         cpus_read_lock();
616
617         /*
618          * Serializes the modifications of the chn_list list as well as
619          * the accesses to next_numa_node_id in init_vp_index().
620          */
621         mutex_lock(&vmbus_connection.channel_mutex);
622
623         list_for_each_entry(channel, &vmbus_connection.chn_list, listentry) {
624                 if (guid_equal(&channel->offermsg.offer.if_type,
625                                &newchannel->offermsg.offer.if_type) &&
626                     guid_equal(&channel->offermsg.offer.if_instance,
627                                &newchannel->offermsg.offer.if_instance)) {
628                         fnew = false;
629                         newchannel->primary_channel = channel;
630                         break;
631                 }
632         }
633
634         init_vp_index(newchannel);
635
636         /* Remember the channels that should be cleaned up upon suspend. */
637         if (is_hvsock_channel(newchannel) || is_sub_channel(newchannel))
638                 atomic_inc(&vmbus_connection.nr_chan_close_on_suspend);
639
640         /*
641          * Now that we have acquired the channel_mutex,
642          * we can release the potentially racing rescind thread.
643          */
644         atomic_dec(&vmbus_connection.offer_in_progress);
645
646         if (fnew) {
647                 list_add_tail(&newchannel->listentry,
648                               &vmbus_connection.chn_list);
649         } else {
650                 /*
651                  * Check to see if this is a valid sub-channel.
652                  */
653                 if (newchannel->offermsg.offer.sub_channel_index == 0) {
654                         mutex_unlock(&vmbus_connection.channel_mutex);
655                         cpus_read_unlock();
656                         /*
657                          * Don't call free_channel(), because newchannel->kobj
658                          * is not initialized yet.
659                          */
660                         kfree(newchannel);
661                         WARN_ON_ONCE(1);
662                         return;
663                 }
664                 /*
665                  * Process the sub-channel.
666                  */
667                 list_add_tail(&newchannel->sc_list, &channel->sc_list);
668         }
669
670         vmbus_channel_map_relid(newchannel);
671
672         mutex_unlock(&vmbus_connection.channel_mutex);
673         cpus_read_unlock();
674
675         /*
676          * vmbus_process_offer() mustn't call channel->sc_creation_callback()
677          * directly for sub-channels, because sc_creation_callback() ->
678          * vmbus_open() may never get the host's response to the
679          * OPEN_CHANNEL message (the host may rescind a channel at any time,
680          * e.g. in the case of hot removing a NIC), and vmbus_onoffer_rescind()
681          * may not wake up the vmbus_open() as it's blocked due to a non-zero
682          * vmbus_connection.offer_in_progress, and finally we have a deadlock.
683          *
684          * The above is also true for primary channels, if the related device
685          * drivers use sync probing mode by default.
686          *
687          * And, usually the handling of primary channels and sub-channels can
688          * depend on each other, so we should offload them to different
689          * workqueues to avoid possible deadlock, e.g. in sync-probing mode,
690          * NIC1's netvsc_subchan_work() can race with NIC2's netvsc_probe() ->
691          * rtnl_lock(), and causes deadlock: the former gets the rtnl_lock
692          * and waits for all the sub-channels to appear, but the latter
693          * can't get the rtnl_lock and this blocks the handling of
694          * sub-channels.
695          */
696         INIT_WORK(&newchannel->add_channel_work, vmbus_add_channel_work);
697         wq = fnew ? vmbus_connection.handle_primary_chan_wq :
698                     vmbus_connection.handle_sub_chan_wq;
699         queue_work(wq, &newchannel->add_channel_work);
700 }
701
702 /*
703  * Check if CPUs used by other channels of the same device.
704  * It should only be called by init_vp_index().
705  */
706 static bool hv_cpuself_used(u32 cpu, struct vmbus_channel *chn)
707 {
708         struct vmbus_channel *primary = chn->primary_channel;
709         struct vmbus_channel *sc;
710
711         lockdep_assert_held(&vmbus_connection.channel_mutex);
712
713         if (!primary)
714                 return false;
715
716         if (primary->target_cpu == cpu)
717                 return true;
718
719         list_for_each_entry(sc, &primary->sc_list, sc_list)
720                 if (sc != chn && sc->target_cpu == cpu)
721                         return true;
722
723         return false;
724 }
725
726 /*
727  * We use this state to statically distribute the channel interrupt load.
728  */
729 static int next_numa_node_id;
730
731 /*
732  * We can statically distribute the incoming channel interrupt load
733  * by binding a channel to VCPU.
734  *
735  * For non-performance critical channels we assign the VMBUS_CONNECT_CPU.
736  * Performance critical channels will be distributed evenly among all
737  * the available NUMA nodes.  Once the node is assigned, we will assign
738  * the CPU based on a simple round robin scheme.
739  */
740 static void init_vp_index(struct vmbus_channel *channel)
741 {
742         bool perf_chn = hv_is_perf_channel(channel);
743         u32 i, ncpu = num_online_cpus();
744         cpumask_var_t available_mask;
745         struct cpumask *allocated_mask;
746         const struct cpumask *hk_mask = housekeeping_cpumask(HK_TYPE_MANAGED_IRQ);
747         u32 target_cpu;
748         int numa_node;
749
750         if (!perf_chn ||
751             !alloc_cpumask_var(&available_mask, GFP_KERNEL) ||
752             cpumask_empty(hk_mask)) {
753                 /*
754                  * If the channel is not a performance critical
755                  * channel, bind it to VMBUS_CONNECT_CPU.
756                  * In case alloc_cpumask_var() fails, bind it to
757                  * VMBUS_CONNECT_CPU.
758                  * If all the cpus are isolated, bind it to
759                  * VMBUS_CONNECT_CPU.
760                  */
761                 channel->target_cpu = VMBUS_CONNECT_CPU;
762                 if (perf_chn)
763                         hv_set_allocated_cpu(VMBUS_CONNECT_CPU);
764                 return;
765         }
766
767         for (i = 1; i <= ncpu + 1; i++) {
768                 while (true) {
769                         numa_node = next_numa_node_id++;
770                         if (numa_node == nr_node_ids) {
771                                 next_numa_node_id = 0;
772                                 continue;
773                         }
774                         if (cpumask_empty(cpumask_of_node(numa_node)))
775                                 continue;
776                         break;
777                 }
778                 allocated_mask = &hv_context.hv_numa_map[numa_node];
779
780 retry:
781                 cpumask_xor(available_mask, allocated_mask, cpumask_of_node(numa_node));
782                 cpumask_and(available_mask, available_mask, hk_mask);
783
784                 if (cpumask_empty(available_mask)) {
785                         /*
786                          * We have cycled through all the CPUs in the node;
787                          * reset the allocated map.
788                          */
789                         cpumask_clear(allocated_mask);
790                         goto retry;
791                 }
792
793                 target_cpu = cpumask_first(available_mask);
794                 cpumask_set_cpu(target_cpu, allocated_mask);
795
796                 if (channel->offermsg.offer.sub_channel_index >= ncpu ||
797                     i > ncpu || !hv_cpuself_used(target_cpu, channel))
798                         break;
799         }
800
801         channel->target_cpu = target_cpu;
802
803         free_cpumask_var(available_mask);
804 }
805
806 #define UNLOAD_DELAY_UNIT_MS    10              /* 10 milliseconds */
807 #define UNLOAD_WAIT_MS          (100*1000)      /* 100 seconds */
808 #define UNLOAD_WAIT_LOOPS       (UNLOAD_WAIT_MS/UNLOAD_DELAY_UNIT_MS)
809 #define UNLOAD_MSG_MS           (5*1000)        /* Every 5 seconds */
810 #define UNLOAD_MSG_LOOPS        (UNLOAD_MSG_MS/UNLOAD_DELAY_UNIT_MS)
811
812 static void vmbus_wait_for_unload(void)
813 {
814         int cpu;
815         void *page_addr;
816         struct hv_message *msg;
817         struct vmbus_channel_message_header *hdr;
818         u32 message_type, i;
819
820         /*
821          * CHANNELMSG_UNLOAD_RESPONSE is always delivered to the CPU which was
822          * used for initial contact or to CPU0 depending on host version. When
823          * we're crashing on a different CPU let's hope that IRQ handler on
824          * the cpu which receives CHANNELMSG_UNLOAD_RESPONSE is still
825          * functional and vmbus_unload_response() will complete
826          * vmbus_connection.unload_event. If not, the last thing we can do is
827          * read message pages for all CPUs directly.
828          *
829          * Wait up to 100 seconds since an Azure host must writeback any dirty
830          * data in its disk cache before the VMbus UNLOAD request will
831          * complete. This flushing has been empirically observed to take up
832          * to 50 seconds in cases with a lot of dirty data, so allow additional
833          * leeway and for inaccuracies in mdelay(). But eventually time out so
834          * that the panic path can't get hung forever in case the response
835          * message isn't seen.
836          */
837         for (i = 1; i <= UNLOAD_WAIT_LOOPS; i++) {
838                 if (completion_done(&vmbus_connection.unload_event))
839                         goto completed;
840
841                 for_each_present_cpu(cpu) {
842                         struct hv_per_cpu_context *hv_cpu
843                                 = per_cpu_ptr(hv_context.cpu_context, cpu);
844
845                         /*
846                          * In a CoCo VM the synic_message_page is not allocated
847                          * in hv_synic_alloc(). Instead it is set/cleared in
848                          * hv_synic_enable_regs() and hv_synic_disable_regs()
849                          * such that it is set only when the CPU is online. If
850                          * not all present CPUs are online, the message page
851                          * might be NULL, so skip such CPUs.
852                          */
853                         page_addr = hv_cpu->synic_message_page;
854                         if (!page_addr)
855                                 continue;
856
857                         msg = (struct hv_message *)page_addr
858                                 + VMBUS_MESSAGE_SINT;
859
860                         message_type = READ_ONCE(msg->header.message_type);
861                         if (message_type == HVMSG_NONE)
862                                 continue;
863
864                         hdr = (struct vmbus_channel_message_header *)
865                                 msg->u.payload;
866
867                         if (hdr->msgtype == CHANNELMSG_UNLOAD_RESPONSE)
868                                 complete(&vmbus_connection.unload_event);
869
870                         vmbus_signal_eom(msg, message_type);
871                 }
872
873                 /*
874                  * Give a notice periodically so someone watching the
875                  * serial output won't think it is completely hung.
876                  */
877                 if (!(i % UNLOAD_MSG_LOOPS))
878                         pr_notice("Waiting for VMBus UNLOAD to complete\n");
879
880                 mdelay(UNLOAD_DELAY_UNIT_MS);
881         }
882         pr_err("Continuing even though VMBus UNLOAD did not complete\n");
883
884 completed:
885         /*
886          * We're crashing and already got the UNLOAD_RESPONSE, cleanup all
887          * maybe-pending messages on all CPUs to be able to receive new
888          * messages after we reconnect.
889          */
890         for_each_present_cpu(cpu) {
891                 struct hv_per_cpu_context *hv_cpu
892                         = per_cpu_ptr(hv_context.cpu_context, cpu);
893
894                 page_addr = hv_cpu->synic_message_page;
895                 if (!page_addr)
896                         continue;
897
898                 msg = (struct hv_message *)page_addr + VMBUS_MESSAGE_SINT;
899                 msg->header.message_type = HVMSG_NONE;
900         }
901 }
902
903 /*
904  * vmbus_unload_response - Handler for the unload response.
905  */
906 static void vmbus_unload_response(struct vmbus_channel_message_header *hdr)
907 {
908         /*
909          * This is a global event; just wakeup the waiting thread.
910          * Once we successfully unload, we can cleanup the monitor state.
911          *
912          * NB.  A malicious or compromised Hyper-V could send a spurious
913          * message of type CHANNELMSG_UNLOAD_RESPONSE, and trigger a call
914          * of the complete() below.  Make sure that unload_event has been
915          * initialized by the time this complete() is executed.
916          */
917         complete(&vmbus_connection.unload_event);
918 }
919
920 void vmbus_initiate_unload(bool crash)
921 {
922         struct vmbus_channel_message_header hdr;
923
924         if (xchg(&vmbus_connection.conn_state, DISCONNECTED) == DISCONNECTED)
925                 return;
926
927         /* Pre-Win2012R2 hosts don't support reconnect */
928         if (vmbus_proto_version < VERSION_WIN8_1)
929                 return;
930
931         reinit_completion(&vmbus_connection.unload_event);
932         memset(&hdr, 0, sizeof(struct vmbus_channel_message_header));
933         hdr.msgtype = CHANNELMSG_UNLOAD;
934         vmbus_post_msg(&hdr, sizeof(struct vmbus_channel_message_header),
935                        !crash);
936
937         /*
938          * vmbus_initiate_unload() is also called on crash and the crash can be
939          * happening in an interrupt context, where scheduling is impossible.
940          */
941         if (!crash)
942                 wait_for_completion(&vmbus_connection.unload_event);
943         else
944                 vmbus_wait_for_unload();
945 }
946
947 static void check_ready_for_resume_event(void)
948 {
949         /*
950          * If all the old primary channels have been fixed up, then it's safe
951          * to resume.
952          */
953         if (atomic_dec_and_test(&vmbus_connection.nr_chan_fixup_on_resume))
954                 complete(&vmbus_connection.ready_for_resume_event);
955 }
956
957 static void vmbus_setup_channel_state(struct vmbus_channel *channel,
958                                       struct vmbus_channel_offer_channel *offer)
959 {
960         /*
961          * Setup state for signalling the host.
962          */
963         channel->sig_event = VMBUS_EVENT_CONNECTION_ID;
964
965         channel->is_dedicated_interrupt =
966                         (offer->is_dedicated_interrupt != 0);
967         channel->sig_event = offer->connection_id;
968
969         memcpy(&channel->offermsg, offer,
970                sizeof(struct vmbus_channel_offer_channel));
971         channel->monitor_grp = (u8)offer->monitorid / 32;
972         channel->monitor_bit = (u8)offer->monitorid % 32;
973         channel->device_id = hv_get_dev_type(channel);
974 }
975
976 /*
977  * find_primary_channel_by_offer - Get the channel object given the new offer.
978  * This is only used in the resume path of hibernation.
979  */
980 static struct vmbus_channel *
981 find_primary_channel_by_offer(const struct vmbus_channel_offer_channel *offer)
982 {
983         struct vmbus_channel *channel = NULL, *iter;
984         const guid_t *inst1, *inst2;
985
986         /* Ignore sub-channel offers. */
987         if (offer->offer.sub_channel_index != 0)
988                 return NULL;
989
990         mutex_lock(&vmbus_connection.channel_mutex);
991
992         list_for_each_entry(iter, &vmbus_connection.chn_list, listentry) {
993                 inst1 = &iter->offermsg.offer.if_instance;
994                 inst2 = &offer->offer.if_instance;
995
996                 if (guid_equal(inst1, inst2)) {
997                         channel = iter;
998                         break;
999                 }
1000         }
1001
1002         mutex_unlock(&vmbus_connection.channel_mutex);
1003
1004         return channel;
1005 }
1006
1007 static bool vmbus_is_valid_offer(const struct vmbus_channel_offer_channel *offer)
1008 {
1009         const guid_t *guid = &offer->offer.if_type;
1010         u16 i;
1011
1012         if (!hv_is_isolation_supported())
1013                 return true;
1014
1015         if (is_hvsock_offer(offer))
1016                 return true;
1017
1018         for (i = 0; i < ARRAY_SIZE(vmbus_devs); i++) {
1019                 if (guid_equal(guid, &vmbus_devs[i].guid))
1020                         return vmbus_devs[i].allowed_in_isolated;
1021         }
1022         return false;
1023 }
1024
1025 /*
1026  * vmbus_onoffer - Handler for channel offers from vmbus in parent partition.
1027  *
1028  */
1029 static void vmbus_onoffer(struct vmbus_channel_message_header *hdr)
1030 {
1031         struct vmbus_channel_offer_channel *offer;
1032         struct vmbus_channel *oldchannel, *newchannel;
1033         size_t offer_sz;
1034
1035         offer = (struct vmbus_channel_offer_channel *)hdr;
1036
1037         trace_vmbus_onoffer(offer);
1038
1039         if (!vmbus_is_valid_offer(offer)) {
1040                 pr_err_ratelimited("Invalid offer %d from the host supporting isolation\n",
1041                                    offer->child_relid);
1042                 atomic_dec(&vmbus_connection.offer_in_progress);
1043                 return;
1044         }
1045
1046         oldchannel = find_primary_channel_by_offer(offer);
1047
1048         if (oldchannel != NULL) {
1049                 /*
1050                  * We're resuming from hibernation: all the sub-channel and
1051                  * hv_sock channels we had before the hibernation should have
1052                  * been cleaned up, and now we must be seeing a re-offered
1053                  * primary channel that we had before the hibernation.
1054                  */
1055
1056                 /*
1057                  * { Initially: channel relid = INVALID_RELID,
1058                  *              channels[valid_relid] = NULL }
1059                  *
1060                  * CPU1                                 CPU2
1061                  *
1062                  * [vmbus_onoffer()]                    [vmbus_device_release()]
1063                  *
1064                  * LOCK channel_mutex                   LOCK channel_mutex
1065                  * STORE channel relid = valid_relid    LOAD r1 = channel relid
1066                  * MAP_RELID channel                    if (r1 != INVALID_RELID)
1067                  * UNLOCK channel_mutex                   UNMAP_RELID channel
1068                  *                                      UNLOCK channel_mutex
1069                  *
1070                  * Forbids: r1 == valid_relid &&
1071                  *              channels[valid_relid] == channel
1072                  *
1073                  * Note.  r1 can be INVALID_RELID only for an hv_sock channel.
1074                  * None of the hv_sock channels which were present before the
1075                  * suspend are re-offered upon the resume.  See the WARN_ON()
1076                  * in hv_process_channel_removal().
1077                  */
1078                 mutex_lock(&vmbus_connection.channel_mutex);
1079
1080                 atomic_dec(&vmbus_connection.offer_in_progress);
1081
1082                 WARN_ON(oldchannel->offermsg.child_relid != INVALID_RELID);
1083                 /* Fix up the relid. */
1084                 oldchannel->offermsg.child_relid = offer->child_relid;
1085
1086                 offer_sz = sizeof(*offer);
1087                 if (memcmp(offer, &oldchannel->offermsg, offer_sz) != 0) {
1088                         /*
1089                          * This is not an error, since the host can also change
1090                          * the other field(s) of the offer, e.g. on WS RS5
1091                          * (Build 17763), the offer->connection_id of the
1092                          * Mellanox VF vmbus device can change when the host
1093                          * reoffers the device upon resume.
1094                          */
1095                         pr_debug("vmbus offer changed: relid=%d\n",
1096                                  offer->child_relid);
1097
1098                         print_hex_dump_debug("Old vmbus offer: ",
1099                                              DUMP_PREFIX_OFFSET, 16, 4,
1100                                              &oldchannel->offermsg, offer_sz,
1101                                              false);
1102                         print_hex_dump_debug("New vmbus offer: ",
1103                                              DUMP_PREFIX_OFFSET, 16, 4,
1104                                              offer, offer_sz, false);
1105
1106                         /* Fix up the old channel. */
1107                         vmbus_setup_channel_state(oldchannel, offer);
1108                 }
1109
1110                 /* Add the channel back to the array of channels. */
1111                 vmbus_channel_map_relid(oldchannel);
1112                 check_ready_for_resume_event();
1113
1114                 mutex_unlock(&vmbus_connection.channel_mutex);
1115                 return;
1116         }
1117
1118         /* Allocate the channel object and save this offer. */
1119         newchannel = alloc_channel();
1120         if (!newchannel) {
1121                 vmbus_release_relid(offer->child_relid);
1122                 atomic_dec(&vmbus_connection.offer_in_progress);
1123                 pr_err("Unable to allocate channel object\n");
1124                 return;
1125         }
1126
1127         vmbus_setup_channel_state(newchannel, offer);
1128
1129         vmbus_process_offer(newchannel);
1130 }
1131
1132 static void check_ready_for_suspend_event(void)
1133 {
1134         /*
1135          * If all the sub-channels or hv_sock channels have been cleaned up,
1136          * then it's safe to suspend.
1137          */
1138         if (atomic_dec_and_test(&vmbus_connection.nr_chan_close_on_suspend))
1139                 complete(&vmbus_connection.ready_for_suspend_event);
1140 }
1141
1142 /*
1143  * vmbus_onoffer_rescind - Rescind offer handler.
1144  *
1145  * We queue a work item to process this offer synchronously
1146  */
1147 static void vmbus_onoffer_rescind(struct vmbus_channel_message_header *hdr)
1148 {
1149         struct vmbus_channel_rescind_offer *rescind;
1150         struct vmbus_channel *channel;
1151         struct device *dev;
1152         bool clean_up_chan_for_suspend;
1153
1154         rescind = (struct vmbus_channel_rescind_offer *)hdr;
1155
1156         trace_vmbus_onoffer_rescind(rescind);
1157
1158         /*
1159          * The offer msg and the corresponding rescind msg
1160          * from the host are guranteed to be ordered -
1161          * offer comes in first and then the rescind.
1162          * Since we process these events in work elements,
1163          * and with preemption, we may end up processing
1164          * the events out of order.  We rely on the synchronization
1165          * provided by offer_in_progress and by channel_mutex for
1166          * ordering these events:
1167          *
1168          * { Initially: offer_in_progress = 1 }
1169          *
1170          * CPU1                         CPU2
1171          *
1172          * [vmbus_onoffer()]            [vmbus_onoffer_rescind()]
1173          *
1174          * LOCK channel_mutex           WAIT_ON offer_in_progress == 0
1175          * DECREMENT offer_in_progress  LOCK channel_mutex
1176          * STORE channels[]             LOAD channels[]
1177          * UNLOCK channel_mutex         UNLOCK channel_mutex
1178          *
1179          * Forbids: CPU2's LOAD from *not* seeing CPU1's STORE
1180          */
1181
1182         while (atomic_read(&vmbus_connection.offer_in_progress) != 0) {
1183                 /*
1184                  * We wait here until any channel offer is currently
1185                  * being processed.
1186                  */
1187                 msleep(1);
1188         }
1189
1190         mutex_lock(&vmbus_connection.channel_mutex);
1191         channel = relid2channel(rescind->child_relid);
1192         if (channel != NULL) {
1193                 /*
1194                  * Guarantee that no other instance of vmbus_onoffer_rescind()
1195                  * has got a reference to the channel object.  Synchronize on
1196                  * &vmbus_connection.channel_mutex.
1197                  */
1198                 if (channel->rescind_ref) {
1199                         mutex_unlock(&vmbus_connection.channel_mutex);
1200                         return;
1201                 }
1202                 channel->rescind_ref = true;
1203         }
1204         mutex_unlock(&vmbus_connection.channel_mutex);
1205
1206         if (channel == NULL) {
1207                 /*
1208                  * We failed in processing the offer message;
1209                  * we would have cleaned up the relid in that
1210                  * failure path.
1211                  */
1212                 return;
1213         }
1214
1215         clean_up_chan_for_suspend = is_hvsock_channel(channel) ||
1216                                     is_sub_channel(channel);
1217         /*
1218          * Before setting channel->rescind in vmbus_rescind_cleanup(), we
1219          * should make sure the channel callback is not running any more.
1220          */
1221         vmbus_reset_channel_cb(channel);
1222
1223         /*
1224          * Now wait for offer handling to complete.
1225          */
1226         vmbus_rescind_cleanup(channel);
1227         while (READ_ONCE(channel->probe_done) == false) {
1228                 /*
1229                  * We wait here until any channel offer is currently
1230                  * being processed.
1231                  */
1232                 msleep(1);
1233         }
1234
1235         /*
1236          * At this point, the rescind handling can proceed safely.
1237          */
1238
1239         if (channel->device_obj) {
1240                 if (channel->chn_rescind_callback) {
1241                         channel->chn_rescind_callback(channel);
1242
1243                         if (clean_up_chan_for_suspend)
1244                                 check_ready_for_suspend_event();
1245
1246                         return;
1247                 }
1248                 /*
1249                  * We will have to unregister this device from the
1250                  * driver core.
1251                  */
1252                 dev = get_device(&channel->device_obj->device);
1253                 if (dev) {
1254                         vmbus_device_unregister(channel->device_obj);
1255                         put_device(dev);
1256                 }
1257         } else if (channel->primary_channel != NULL) {
1258                 /*
1259                  * Sub-channel is being rescinded. Following is the channel
1260                  * close sequence when initiated from the driveri (refer to
1261                  * vmbus_close() for details):
1262                  * 1. Close all sub-channels first
1263                  * 2. Then close the primary channel.
1264                  */
1265                 mutex_lock(&vmbus_connection.channel_mutex);
1266                 if (channel->state == CHANNEL_OPEN_STATE) {
1267                         /*
1268                          * The channel is currently not open;
1269                          * it is safe for us to cleanup the channel.
1270                          */
1271                         hv_process_channel_removal(channel);
1272                 } else {
1273                         complete(&channel->rescind_event);
1274                 }
1275                 mutex_unlock(&vmbus_connection.channel_mutex);
1276         }
1277
1278         /* The "channel" may have been freed. Do not access it any longer. */
1279
1280         if (clean_up_chan_for_suspend)
1281                 check_ready_for_suspend_event();
1282 }
1283
1284 void vmbus_hvsock_device_unregister(struct vmbus_channel *channel)
1285 {
1286         BUG_ON(!is_hvsock_channel(channel));
1287
1288         /* We always get a rescind msg when a connection is closed. */
1289         while (!READ_ONCE(channel->probe_done) || !READ_ONCE(channel->rescind))
1290                 msleep(1);
1291
1292         vmbus_device_unregister(channel->device_obj);
1293 }
1294 EXPORT_SYMBOL_GPL(vmbus_hvsock_device_unregister);
1295
1296
1297 /*
1298  * vmbus_onoffers_delivered -
1299  * This is invoked when all offers have been delivered.
1300  *
1301  * Nothing to do here.
1302  */
1303 static void vmbus_onoffers_delivered(
1304                         struct vmbus_channel_message_header *hdr)
1305 {
1306 }
1307
1308 /*
1309  * vmbus_onopen_result - Open result handler.
1310  *
1311  * This is invoked when we received a response to our channel open request.
1312  * Find the matching request, copy the response and signal the requesting
1313  * thread.
1314  */
1315 static void vmbus_onopen_result(struct vmbus_channel_message_header *hdr)
1316 {
1317         struct vmbus_channel_open_result *result;
1318         struct vmbus_channel_msginfo *msginfo;
1319         struct vmbus_channel_message_header *requestheader;
1320         struct vmbus_channel_open_channel *openmsg;
1321         unsigned long flags;
1322
1323         result = (struct vmbus_channel_open_result *)hdr;
1324
1325         trace_vmbus_onopen_result(result);
1326
1327         /*
1328          * Find the open msg, copy the result and signal/unblock the wait event
1329          */
1330         spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
1331
1332         list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
1333                                 msglistentry) {
1334                 requestheader =
1335                         (struct vmbus_channel_message_header *)msginfo->msg;
1336
1337                 if (requestheader->msgtype == CHANNELMSG_OPENCHANNEL) {
1338                         openmsg =
1339                         (struct vmbus_channel_open_channel *)msginfo->msg;
1340                         if (openmsg->child_relid == result->child_relid &&
1341                             openmsg->openid == result->openid) {
1342                                 memcpy(&msginfo->response.open_result,
1343                                        result,
1344                                        sizeof(
1345                                         struct vmbus_channel_open_result));
1346                                 complete(&msginfo->waitevent);
1347                                 break;
1348                         }
1349                 }
1350         }
1351         spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
1352 }
1353
1354 /*
1355  * vmbus_ongpadl_created - GPADL created handler.
1356  *
1357  * This is invoked when we received a response to our gpadl create request.
1358  * Find the matching request, copy the response and signal the requesting
1359  * thread.
1360  */
1361 static void vmbus_ongpadl_created(struct vmbus_channel_message_header *hdr)
1362 {
1363         struct vmbus_channel_gpadl_created *gpadlcreated;
1364         struct vmbus_channel_msginfo *msginfo;
1365         struct vmbus_channel_message_header *requestheader;
1366         struct vmbus_channel_gpadl_header *gpadlheader;
1367         unsigned long flags;
1368
1369         gpadlcreated = (struct vmbus_channel_gpadl_created *)hdr;
1370
1371         trace_vmbus_ongpadl_created(gpadlcreated);
1372
1373         /*
1374          * Find the establish msg, copy the result and signal/unblock the wait
1375          * event
1376          */
1377         spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
1378
1379         list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
1380                                 msglistentry) {
1381                 requestheader =
1382                         (struct vmbus_channel_message_header *)msginfo->msg;
1383
1384                 if (requestheader->msgtype == CHANNELMSG_GPADL_HEADER) {
1385                         gpadlheader =
1386                         (struct vmbus_channel_gpadl_header *)requestheader;
1387
1388                         if ((gpadlcreated->child_relid ==
1389                              gpadlheader->child_relid) &&
1390                             (gpadlcreated->gpadl == gpadlheader->gpadl)) {
1391                                 memcpy(&msginfo->response.gpadl_created,
1392                                        gpadlcreated,
1393                                        sizeof(
1394                                         struct vmbus_channel_gpadl_created));
1395                                 complete(&msginfo->waitevent);
1396                                 break;
1397                         }
1398                 }
1399         }
1400         spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
1401 }
1402
1403 /*
1404  * vmbus_onmodifychannel_response - Modify Channel response handler.
1405  *
1406  * This is invoked when we received a response to our channel modify request.
1407  * Find the matching request, copy the response and signal the requesting thread.
1408  */
1409 static void vmbus_onmodifychannel_response(struct vmbus_channel_message_header *hdr)
1410 {
1411         struct vmbus_channel_modifychannel_response *response;
1412         struct vmbus_channel_msginfo *msginfo;
1413         unsigned long flags;
1414
1415         response = (struct vmbus_channel_modifychannel_response *)hdr;
1416
1417         trace_vmbus_onmodifychannel_response(response);
1418
1419         /*
1420          * Find the modify msg, copy the response and signal/unblock the wait event.
1421          */
1422         spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
1423
1424         list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list, msglistentry) {
1425                 struct vmbus_channel_message_header *responseheader =
1426                                 (struct vmbus_channel_message_header *)msginfo->msg;
1427
1428                 if (responseheader->msgtype == CHANNELMSG_MODIFYCHANNEL) {
1429                         struct vmbus_channel_modifychannel *modifymsg;
1430
1431                         modifymsg = (struct vmbus_channel_modifychannel *)msginfo->msg;
1432                         if (modifymsg->child_relid == response->child_relid) {
1433                                 memcpy(&msginfo->response.modify_response, response,
1434                                        sizeof(*response));
1435                                 complete(&msginfo->waitevent);
1436                                 break;
1437                         }
1438                 }
1439         }
1440         spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
1441 }
1442
1443 /*
1444  * vmbus_ongpadl_torndown - GPADL torndown handler.
1445  *
1446  * This is invoked when we received a response to our gpadl teardown request.
1447  * Find the matching request, copy the response and signal the requesting
1448  * thread.
1449  */
1450 static void vmbus_ongpadl_torndown(
1451                         struct vmbus_channel_message_header *hdr)
1452 {
1453         struct vmbus_channel_gpadl_torndown *gpadl_torndown;
1454         struct vmbus_channel_msginfo *msginfo;
1455         struct vmbus_channel_message_header *requestheader;
1456         struct vmbus_channel_gpadl_teardown *gpadl_teardown;
1457         unsigned long flags;
1458
1459         gpadl_torndown = (struct vmbus_channel_gpadl_torndown *)hdr;
1460
1461         trace_vmbus_ongpadl_torndown(gpadl_torndown);
1462
1463         /*
1464          * Find the open msg, copy the result and signal/unblock the wait event
1465          */
1466         spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
1467
1468         list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
1469                                 msglistentry) {
1470                 requestheader =
1471                         (struct vmbus_channel_message_header *)msginfo->msg;
1472
1473                 if (requestheader->msgtype == CHANNELMSG_GPADL_TEARDOWN) {
1474                         gpadl_teardown =
1475                         (struct vmbus_channel_gpadl_teardown *)requestheader;
1476
1477                         if (gpadl_torndown->gpadl == gpadl_teardown->gpadl) {
1478                                 memcpy(&msginfo->response.gpadl_torndown,
1479                                        gpadl_torndown,
1480                                        sizeof(
1481                                         struct vmbus_channel_gpadl_torndown));
1482                                 complete(&msginfo->waitevent);
1483                                 break;
1484                         }
1485                 }
1486         }
1487         spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
1488 }
1489
1490 /*
1491  * vmbus_onversion_response - Version response handler
1492  *
1493  * This is invoked when we received a response to our initiate contact request.
1494  * Find the matching request, copy the response and signal the requesting
1495  * thread.
1496  */
1497 static void vmbus_onversion_response(
1498                 struct vmbus_channel_message_header *hdr)
1499 {
1500         struct vmbus_channel_msginfo *msginfo;
1501         struct vmbus_channel_message_header *requestheader;
1502         struct vmbus_channel_version_response *version_response;
1503         unsigned long flags;
1504
1505         version_response = (struct vmbus_channel_version_response *)hdr;
1506
1507         trace_vmbus_onversion_response(version_response);
1508
1509         spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
1510
1511         list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
1512                                 msglistentry) {
1513                 requestheader =
1514                         (struct vmbus_channel_message_header *)msginfo->msg;
1515
1516                 if (requestheader->msgtype ==
1517                     CHANNELMSG_INITIATE_CONTACT) {
1518                         memcpy(&msginfo->response.version_response,
1519                               version_response,
1520                               sizeof(struct vmbus_channel_version_response));
1521                         complete(&msginfo->waitevent);
1522                 }
1523         }
1524         spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
1525 }
1526
1527 /* Channel message dispatch table */
1528 const struct vmbus_channel_message_table_entry
1529 channel_message_table[CHANNELMSG_COUNT] = {
1530         { CHANNELMSG_INVALID,                   0, NULL, 0},
1531         { CHANNELMSG_OFFERCHANNEL,              0, vmbus_onoffer,
1532                 sizeof(struct vmbus_channel_offer_channel)},
1533         { CHANNELMSG_RESCIND_CHANNELOFFER,      0, vmbus_onoffer_rescind,
1534                 sizeof(struct vmbus_channel_rescind_offer) },
1535         { CHANNELMSG_REQUESTOFFERS,             0, NULL, 0},
1536         { CHANNELMSG_ALLOFFERS_DELIVERED,       1, vmbus_onoffers_delivered, 0},
1537         { CHANNELMSG_OPENCHANNEL,               0, NULL, 0},
1538         { CHANNELMSG_OPENCHANNEL_RESULT,        1, vmbus_onopen_result,
1539                 sizeof(struct vmbus_channel_open_result)},
1540         { CHANNELMSG_CLOSECHANNEL,              0, NULL, 0},
1541         { CHANNELMSG_GPADL_HEADER,              0, NULL, 0},
1542         { CHANNELMSG_GPADL_BODY,                0, NULL, 0},
1543         { CHANNELMSG_GPADL_CREATED,             1, vmbus_ongpadl_created,
1544                 sizeof(struct vmbus_channel_gpadl_created)},
1545         { CHANNELMSG_GPADL_TEARDOWN,            0, NULL, 0},
1546         { CHANNELMSG_GPADL_TORNDOWN,            1, vmbus_ongpadl_torndown,
1547                 sizeof(struct vmbus_channel_gpadl_torndown) },
1548         { CHANNELMSG_RELID_RELEASED,            0, NULL, 0},
1549         { CHANNELMSG_INITIATE_CONTACT,          0, NULL, 0},
1550         { CHANNELMSG_VERSION_RESPONSE,          1, vmbus_onversion_response,
1551                 sizeof(struct vmbus_channel_version_response)},
1552         { CHANNELMSG_UNLOAD,                    0, NULL, 0},
1553         { CHANNELMSG_UNLOAD_RESPONSE,           1, vmbus_unload_response, 0},
1554         { CHANNELMSG_18,                        0, NULL, 0},
1555         { CHANNELMSG_19,                        0, NULL, 0},
1556         { CHANNELMSG_20,                        0, NULL, 0},
1557         { CHANNELMSG_TL_CONNECT_REQUEST,        0, NULL, 0},
1558         { CHANNELMSG_MODIFYCHANNEL,             0, NULL, 0},
1559         { CHANNELMSG_TL_CONNECT_RESULT,         0, NULL, 0},
1560         { CHANNELMSG_MODIFYCHANNEL_RESPONSE,    1, vmbus_onmodifychannel_response,
1561                 sizeof(struct vmbus_channel_modifychannel_response)},
1562 };
1563
1564 /*
1565  * vmbus_onmessage - Handler for channel protocol messages.
1566  *
1567  * This is invoked in the vmbus worker thread context.
1568  */
1569 void vmbus_onmessage(struct vmbus_channel_message_header *hdr)
1570 {
1571         trace_vmbus_on_message(hdr);
1572
1573         /*
1574          * vmbus_on_msg_dpc() makes sure the hdr->msgtype here can not go
1575          * out of bound and the message_handler pointer can not be NULL.
1576          */
1577         channel_message_table[hdr->msgtype].message_handler(hdr);
1578 }
1579
1580 /*
1581  * vmbus_request_offers - Send a request to get all our pending offers.
1582  */
1583 int vmbus_request_offers(void)
1584 {
1585         struct vmbus_channel_message_header *msg;
1586         struct vmbus_channel_msginfo *msginfo;
1587         int ret;
1588
1589         msginfo = kzalloc(sizeof(*msginfo) +
1590                           sizeof(struct vmbus_channel_message_header),
1591                           GFP_KERNEL);
1592         if (!msginfo)
1593                 return -ENOMEM;
1594
1595         msg = (struct vmbus_channel_message_header *)msginfo->msg;
1596
1597         msg->msgtype = CHANNELMSG_REQUESTOFFERS;
1598
1599         ret = vmbus_post_msg(msg, sizeof(struct vmbus_channel_message_header),
1600                              true);
1601
1602         trace_vmbus_request_offers(ret);
1603
1604         if (ret != 0) {
1605                 pr_err("Unable to request offers - %d\n", ret);
1606
1607                 goto cleanup;
1608         }
1609
1610 cleanup:
1611         kfree(msginfo);
1612
1613         return ret;
1614 }
1615
1616 void vmbus_set_sc_create_callback(struct vmbus_channel *primary_channel,
1617                                 void (*sc_cr_cb)(struct vmbus_channel *new_sc))
1618 {
1619         primary_channel->sc_creation_callback = sc_cr_cb;
1620 }
1621 EXPORT_SYMBOL_GPL(vmbus_set_sc_create_callback);
1622
1623 void vmbus_set_chn_rescind_callback(struct vmbus_channel *channel,
1624                 void (*chn_rescind_cb)(struct vmbus_channel *))
1625 {
1626         channel->chn_rescind_callback = chn_rescind_cb;
1627 }
1628 EXPORT_SYMBOL_GPL(vmbus_set_chn_rescind_callback);
This page took 0.11946 seconds and 4 git commands to generate.