1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3 * Copyright (c) 2009, Microsoft Corporation.
4 *
5 * Authors:
6 * Haiyang Zhang <haiyangz@microsoft.com>
7 * Hank Janssen <hjanssen@microsoft.com>
8 */
9 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
10
11 #include <linux/kernel.h>
12 #include <linux/interrupt.h>
13 #include <linux/sched.h>
14 #include <linux/wait.h>
15 #include <linux/mm.h>
16 #include <linux/slab.h>
17 #include <linux/list.h>
18 #include <linux/module.h>
19 #include <linux/completion.h>
20 #include <linux/delay.h>
21 #include <linux/cpu.h>
22 #include <linux/hyperv.h>
23 #include <asm/mshyperv.h>
24 #include <linux/sched/isolation.h>
25
26 #include "hyperv_vmbus.h"
27
28 static void init_vp_index(struct vmbus_channel *channel);
29
30 const struct vmbus_device vmbus_devs[] = {
31 /* IDE */
32 { .dev_type = HV_IDE,
33 HV_IDE_GUID,
34 .perf_device = true,
35 .allowed_in_isolated = false,
36 },
37
38 /* SCSI */
39 { .dev_type = HV_SCSI,
40 HV_SCSI_GUID,
41 .perf_device = true,
42 .allowed_in_isolated = true,
43 },
44
45 /* Fibre Channel */
46 { .dev_type = HV_FC,
47 HV_SYNTHFC_GUID,
48 .perf_device = true,
49 .allowed_in_isolated = false,
50 },
51
52 /* Synthetic NIC */
53 { .dev_type = HV_NIC,
54 HV_NIC_GUID,
55 .perf_device = true,
56 .allowed_in_isolated = true,
57 },
58
59 /* Network Direct */
60 { .dev_type = HV_ND,
61 HV_ND_GUID,
62 .perf_device = true,
63 .allowed_in_isolated = false,
64 },
65
66 /* PCIE */
67 { .dev_type = HV_PCIE,
68 HV_PCIE_GUID,
69 .perf_device = false,
70 .allowed_in_isolated = false,
71 },
72
73 /* Synthetic Frame Buffer */
74 { .dev_type = HV_FB,
75 HV_SYNTHVID_GUID,
76 .perf_device = false,
77 .allowed_in_isolated = false,
78 },
79
80 /* Synthetic Keyboard */
81 { .dev_type = HV_KBD,
82 HV_KBD_GUID,
83 .perf_device = false,
84 .allowed_in_isolated = false,
85 },
86
87 /* Synthetic MOUSE */
88 { .dev_type = HV_MOUSE,
89 HV_MOUSE_GUID,
90 .perf_device = false,
91 .allowed_in_isolated = false,
92 },
93
94 /* KVP */
95 { .dev_type = HV_KVP,
96 HV_KVP_GUID,
97 .perf_device = false,
98 .allowed_in_isolated = false,
99 },
100
101 /* Time Synch */
102 { .dev_type = HV_TS,
103 HV_TS_GUID,
104 .perf_device = false,
105 .allowed_in_isolated = true,
106 },
107
108 /* Heartbeat */
109 { .dev_type = HV_HB,
110 HV_HEART_BEAT_GUID,
111 .perf_device = false,
112 .allowed_in_isolated = true,
113 },
114
115 /* Shutdown */
116 { .dev_type = HV_SHUTDOWN,
117 HV_SHUTDOWN_GUID,
118 .perf_device = false,
119 .allowed_in_isolated = true,
120 },
121
122 /* File copy */
123 { .dev_type = HV_FCOPY,
124 HV_FCOPY_GUID,
125 .perf_device = false,
126 .allowed_in_isolated = false,
127 },
128
129 /* Backup */
130 { .dev_type = HV_BACKUP,
131 HV_VSS_GUID,
132 .perf_device = false,
133 .allowed_in_isolated = false,
134 },
135
136 /* Dynamic Memory */
137 { .dev_type = HV_DM,
138 HV_DM_GUID,
139 .perf_device = false,
140 .allowed_in_isolated = false,
141 },
142
143 /* Unknown GUID */
144 { .dev_type = HV_UNKNOWN,
145 .perf_device = false,
146 .allowed_in_isolated = false,
147 },
148 };
149
150 static const struct {
151 guid_t guid;
152 } vmbus_unsupported_devs[] = {
153 { HV_AVMA1_GUID },
154 { HV_AVMA2_GUID },
155 { HV_RDV_GUID },
156 { HV_IMC_GUID },
157 };
158
159 /*
160 * The rescinded channel may be blocked waiting for a response from the host;
161 * take care of that.
162 */
vmbus_rescind_cleanup(struct vmbus_channel * channel)163 static void vmbus_rescind_cleanup(struct vmbus_channel *channel)
164 {
165 struct vmbus_channel_msginfo *msginfo;
166 unsigned long flags;
167
168
169 spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
170 channel->rescind = true;
171 list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
172 msglistentry) {
173
174 if (msginfo->waiting_channel == channel) {
175 complete(&msginfo->waitevent);
176 break;
177 }
178 }
179 spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
180 }
181
is_unsupported_vmbus_devs(const guid_t * guid)182 static bool is_unsupported_vmbus_devs(const guid_t *guid)
183 {
184 int i;
185
186 for (i = 0; i < ARRAY_SIZE(vmbus_unsupported_devs); i++)
187 if (guid_equal(guid, &vmbus_unsupported_devs[i].guid))
188 return true;
189 return false;
190 }
191
hv_get_dev_type(const struct vmbus_channel * channel)192 static u16 hv_get_dev_type(const struct vmbus_channel *channel)
193 {
194 const guid_t *guid = &channel->offermsg.offer.if_type;
195 u16 i;
196
197 if (is_hvsock_channel(channel) || is_unsupported_vmbus_devs(guid))
198 return HV_UNKNOWN;
199
200 for (i = HV_IDE; i < HV_UNKNOWN; i++) {
201 if (guid_equal(guid, &vmbus_devs[i].guid))
202 return i;
203 }
204 pr_info("Unknown GUID: %pUl\n", guid);
205 return i;
206 }
207
208 /**
209 * vmbus_prep_negotiate_resp() - Create default response for Negotiate message
210 * @icmsghdrp: Pointer to msg header structure
211 * @buf: Raw buffer channel data
212 * @buflen: Length of the raw buffer channel data.
213 * @fw_version: The framework versions we can support.
214 * @fw_vercnt: The size of @fw_version.
215 * @srv_version: The service versions we can support.
216 * @srv_vercnt: The size of @srv_version.
217 * @nego_fw_version: The selected framework version.
218 * @nego_srv_version: The selected service version.
219 *
220 * Note: Versions are given in decreasing order.
221 *
222 * Set up and fill in default negotiate response message.
223 * Mainly used by Hyper-V drivers.
224 */
vmbus_prep_negotiate_resp(struct icmsg_hdr * icmsghdrp,u8 * buf,u32 buflen,const int * fw_version,int fw_vercnt,const int * srv_version,int srv_vercnt,int * nego_fw_version,int * nego_srv_version)225 bool vmbus_prep_negotiate_resp(struct icmsg_hdr *icmsghdrp, u8 *buf,
226 u32 buflen, const int *fw_version, int fw_vercnt,
227 const int *srv_version, int srv_vercnt,
228 int *nego_fw_version, int *nego_srv_version)
229 {
230 int icframe_major, icframe_minor;
231 int icmsg_major, icmsg_minor;
232 int fw_major, fw_minor;
233 int srv_major, srv_minor;
234 int i, j;
235 bool found_match = false;
236 struct icmsg_negotiate *negop;
237
238 /* Check that there's enough space for icframe_vercnt, icmsg_vercnt */
239 if (buflen < ICMSG_HDR + offsetof(struct icmsg_negotiate, reserved)) {
240 pr_err_ratelimited("Invalid icmsg negotiate\n");
241 return false;
242 }
243
244 icmsghdrp->icmsgsize = 0x10;
245 negop = (struct icmsg_negotiate *)&buf[ICMSG_HDR];
246
247 icframe_major = negop->icframe_vercnt;
248 icframe_minor = 0;
249
250 icmsg_major = negop->icmsg_vercnt;
251 icmsg_minor = 0;
252
253 /* Validate negop packet */
254 if (icframe_major > IC_VERSION_NEGOTIATION_MAX_VER_COUNT ||
255 icmsg_major > IC_VERSION_NEGOTIATION_MAX_VER_COUNT ||
256 ICMSG_NEGOTIATE_PKT_SIZE(icframe_major, icmsg_major) > buflen) {
257 pr_err_ratelimited("Invalid icmsg negotiate - icframe_major: %u, icmsg_major: %u\n",
258 icframe_major, icmsg_major);
259 goto fw_error;
260 }
261
262 /*
263 * Select the framework version number we will
264 * support.
265 */
266
267 for (i = 0; i < fw_vercnt; i++) {
268 fw_major = (fw_version[i] >> 16);
269 fw_minor = (fw_version[i] & 0xFFFF);
270
271 for (j = 0; j < negop->icframe_vercnt; j++) {
272 if ((negop->icversion_data[j].major == fw_major) &&
273 (negop->icversion_data[j].minor == fw_minor)) {
274 icframe_major = negop->icversion_data[j].major;
275 icframe_minor = negop->icversion_data[j].minor;
276 found_match = true;
277 break;
278 }
279 }
280
281 if (found_match)
282 break;
283 }
284
285 if (!found_match)
286 goto fw_error;
287
288 found_match = false;
289
290 for (i = 0; i < srv_vercnt; i++) {
291 srv_major = (srv_version[i] >> 16);
292 srv_minor = (srv_version[i] & 0xFFFF);
293
294 for (j = negop->icframe_vercnt;
295 (j < negop->icframe_vercnt + negop->icmsg_vercnt);
296 j++) {
297
298 if ((negop->icversion_data[j].major == srv_major) &&
299 (negop->icversion_data[j].minor == srv_minor)) {
300
301 icmsg_major = negop->icversion_data[j].major;
302 icmsg_minor = negop->icversion_data[j].minor;
303 found_match = true;
304 break;
305 }
306 }
307
308 if (found_match)
309 break;
310 }
311
312 /*
313 * Respond with the framework and service
314 * version numbers we can support.
315 */
316
317 fw_error:
318 if (!found_match) {
319 negop->icframe_vercnt = 0;
320 negop->icmsg_vercnt = 0;
321 } else {
322 negop->icframe_vercnt = 1;
323 negop->icmsg_vercnt = 1;
324 }
325
326 if (nego_fw_version)
327 *nego_fw_version = (icframe_major << 16) | icframe_minor;
328
329 if (nego_srv_version)
330 *nego_srv_version = (icmsg_major << 16) | icmsg_minor;
331
332 negop->icversion_data[0].major = icframe_major;
333 negop->icversion_data[0].minor = icframe_minor;
334 negop->icversion_data[1].major = icmsg_major;
335 negop->icversion_data[1].minor = icmsg_minor;
336 return found_match;
337 }
338 EXPORT_SYMBOL_GPL(vmbus_prep_negotiate_resp);
339
340 /*
341 * alloc_channel - Allocate and initialize a vmbus channel object
342 */
alloc_channel(void)343 static struct vmbus_channel *alloc_channel(void)
344 {
345 struct vmbus_channel *channel;
346
347 channel = kzalloc(sizeof(*channel), GFP_ATOMIC);
348 if (!channel)
349 return NULL;
350
351 spin_lock_init(&channel->sched_lock);
352 init_completion(&channel->rescind_event);
353
354 INIT_LIST_HEAD(&channel->sc_list);
355
356 tasklet_init(&channel->callback_event,
357 vmbus_on_event, (unsigned long)channel);
358
359 hv_ringbuffer_pre_init(channel);
360
361 return channel;
362 }
363
364 /*
365 * free_channel - Release the resources used by the vmbus channel object
366 */
free_channel(struct vmbus_channel * channel)367 static void free_channel(struct vmbus_channel *channel)
368 {
369 tasklet_kill(&channel->callback_event);
370 vmbus_remove_channel_attr_group(channel);
371
372 kobject_put(&channel->kobj);
373 }
374
vmbus_channel_map_relid(struct vmbus_channel * channel)375 void vmbus_channel_map_relid(struct vmbus_channel *channel)
376 {
377 if (WARN_ON(channel->offermsg.child_relid >= MAX_CHANNEL_RELIDS))
378 return;
379 /*
380 * The mapping of the channel's relid is visible from the CPUs that
381 * execute vmbus_chan_sched() by the time that vmbus_chan_sched() will
382 * execute:
383 *
384 * (a) In the "normal (i.e., not resuming from hibernation)" path,
385 * the full barrier in virt_store_mb() guarantees that the store
386 * is propagated to all CPUs before the add_channel_work work
387 * is queued. In turn, add_channel_work is queued before the
388 * channel's ring buffer is allocated/initialized and the
389 * OPENCHANNEL message for the channel is sent in vmbus_open().
390 * Hyper-V won't start sending the interrupts for the channel
391 * before the OPENCHANNEL message is acked. The memory barrier
392 * in vmbus_chan_sched() -> sync_test_and_clear_bit() ensures
393 * that vmbus_chan_sched() must find the channel's relid in
394 * recv_int_page before retrieving the channel pointer from the
395 * array of channels.
396 *
397 * (b) In the "resuming from hibernation" path, the virt_store_mb()
398 * guarantees that the store is propagated to all CPUs before
399 * the VMBus connection is marked as ready for the resume event
400 * (cf. check_ready_for_resume_event()). The interrupt handler
401 * of the VMBus driver and vmbus_chan_sched() can not run before
402 * vmbus_bus_resume() has completed execution (cf. resume_noirq).
403 */
404 virt_store_mb(
405 vmbus_connection.channels[channel->offermsg.child_relid],
406 channel);
407 }
408
vmbus_channel_unmap_relid(struct vmbus_channel * channel)409 void vmbus_channel_unmap_relid(struct vmbus_channel *channel)
410 {
411 if (WARN_ON(channel->offermsg.child_relid >= MAX_CHANNEL_RELIDS))
412 return;
413 WRITE_ONCE(
414 vmbus_connection.channels[channel->offermsg.child_relid],
415 NULL);
416 }
417
vmbus_release_relid(u32 relid)418 static void vmbus_release_relid(u32 relid)
419 {
420 struct vmbus_channel_relid_released msg;
421 int ret;
422
423 memset(&msg, 0, sizeof(struct vmbus_channel_relid_released));
424 msg.child_relid = relid;
425 msg.header.msgtype = CHANNELMSG_RELID_RELEASED;
426 ret = vmbus_post_msg(&msg, sizeof(struct vmbus_channel_relid_released),
427 true);
428
429 trace_vmbus_release_relid(&msg, ret);
430 }
431
hv_process_channel_removal(struct vmbus_channel * channel)432 void hv_process_channel_removal(struct vmbus_channel *channel)
433 {
434 lockdep_assert_held(&vmbus_connection.channel_mutex);
435 BUG_ON(!channel->rescind);
436
437 /*
438 * hv_process_channel_removal() could find INVALID_RELID only for
439 * hv_sock channels. See the inline comments in vmbus_onoffer().
440 */
441 WARN_ON(channel->offermsg.child_relid == INVALID_RELID &&
442 !is_hvsock_channel(channel));
443
444 /*
445 * Upon suspend, an in-use hv_sock channel is removed from the array of
446 * channels and the relid is invalidated. After hibernation, when the
447 * user-space application destroys the channel, it's unnecessary and
448 * unsafe to remove the channel from the array of channels. See also
449 * the inline comments before the call of vmbus_release_relid() below.
450 */
451 if (channel->offermsg.child_relid != INVALID_RELID)
452 vmbus_channel_unmap_relid(channel);
453
454 if (channel->primary_channel == NULL)
455 list_del(&channel->listentry);
456 else
457 list_del(&channel->sc_list);
458
459 /*
460 * If this is a "perf" channel, updates the hv_numa_map[] masks so that
461 * init_vp_index() can (re-)use the CPU.
462 */
463 if (hv_is_perf_channel(channel))
464 hv_clear_allocated_cpu(channel->target_cpu);
465
466 /*
467 * Upon suspend, an in-use hv_sock channel is marked as "rescinded" and
468 * the relid is invalidated; after hibernation, when the user-space app
469 * destroys the channel, the relid is INVALID_RELID, and in this case
470 * it's unnecessary and unsafe to release the old relid, since the same
471 * relid can refer to a completely different channel now.
472 */
473 if (channel->offermsg.child_relid != INVALID_RELID)
474 vmbus_release_relid(channel->offermsg.child_relid);
475
476 free_channel(channel);
477 }
478
vmbus_free_channels(void)479 void vmbus_free_channels(void)
480 {
481 struct vmbus_channel *channel, *tmp;
482
483 list_for_each_entry_safe(channel, tmp, &vmbus_connection.chn_list,
484 listentry) {
485 /* hv_process_channel_removal() needs this */
486 channel->rescind = true;
487
488 vmbus_device_unregister(channel->device_obj);
489 }
490 }
491
492 /* Note: the function can run concurrently for primary/sub channels. */
vmbus_add_channel_work(struct work_struct * work)493 static void vmbus_add_channel_work(struct work_struct *work)
494 {
495 struct vmbus_channel *newchannel =
496 container_of(work, struct vmbus_channel, add_channel_work);
497 struct vmbus_channel *primary_channel = newchannel->primary_channel;
498 int ret;
499
500 /*
501 * This state is used to indicate a successful open
502 * so that when we do close the channel normally, we
503 * can cleanup properly.
504 */
505 newchannel->state = CHANNEL_OPEN_STATE;
506
507 if (primary_channel != NULL) {
508 /* newchannel is a sub-channel. */
509 struct hv_device *dev = primary_channel->device_obj;
510
511 if (vmbus_add_channel_kobj(dev, newchannel))
512 goto err_deq_chan;
513
514 if (primary_channel->sc_creation_callback != NULL)
515 primary_channel->sc_creation_callback(newchannel);
516
517 newchannel->probe_done = true;
518 return;
519 }
520
521 /*
522 * Start the process of binding the primary channel to the driver
523 */
524 newchannel->device_obj = vmbus_device_create(
525 &newchannel->offermsg.offer.if_type,
526 &newchannel->offermsg.offer.if_instance,
527 newchannel);
528 if (!newchannel->device_obj)
529 goto err_deq_chan;
530
531 newchannel->device_obj->device_id = newchannel->device_id;
532 /*
533 * Add the new device to the bus. This will kick off device-driver
534 * binding which eventually invokes the device driver's AddDevice()
535 * method.
536 *
537 * If vmbus_device_register() fails, the 'device_obj' is freed in
538 * vmbus_device_release() as called by device_unregister() in the
539 * error path of vmbus_device_register(). In the outside error
540 * path, there's no need to free it.
541 */
542 ret = vmbus_device_register(newchannel->device_obj);
543
544 if (ret != 0) {
545 pr_err("unable to add child device object (relid %d)\n",
546 newchannel->offermsg.child_relid);
547 goto err_deq_chan;
548 }
549
550 newchannel->probe_done = true;
551 return;
552
553 err_deq_chan:
554 mutex_lock(&vmbus_connection.channel_mutex);
555
556 /*
557 * We need to set the flag, otherwise
558 * vmbus_onoffer_rescind() can be blocked.
559 */
560 newchannel->probe_done = true;
561
562 if (primary_channel == NULL)
563 list_del(&newchannel->listentry);
564 else
565 list_del(&newchannel->sc_list);
566
567 /* vmbus_process_offer() has mapped the channel. */
568 vmbus_channel_unmap_relid(newchannel);
569
570 mutex_unlock(&vmbus_connection.channel_mutex);
571
572 vmbus_release_relid(newchannel->offermsg.child_relid);
573
574 free_channel(newchannel);
575 }
576
577 /*
578 * vmbus_process_offer - Process the offer by creating a channel/device
579 * associated with this offer
580 */
vmbus_process_offer(struct vmbus_channel * newchannel)581 static void vmbus_process_offer(struct vmbus_channel *newchannel)
582 {
583 struct vmbus_channel *channel;
584 struct workqueue_struct *wq;
585 bool fnew = true;
586
587 /*
588 * Synchronize vmbus_process_offer() and CPU hotplugging:
589 *
590 * CPU1 CPU2
591 *
592 * [vmbus_process_offer()] [Hot removal of the CPU]
593 *
594 * CPU_READ_LOCK CPUS_WRITE_LOCK
595 * LOAD cpu_online_mask SEARCH chn_list
596 * STORE target_cpu LOAD target_cpu
597 * INSERT chn_list STORE cpu_online_mask
598 * CPUS_READ_UNLOCK CPUS_WRITE_UNLOCK
599 *
600 * Forbids: CPU1's LOAD from *not* seing CPU2's STORE &&
601 * CPU2's SEARCH from *not* seeing CPU1's INSERT
602 *
603 * Forbids: CPU2's SEARCH from seeing CPU1's INSERT &&
604 * CPU2's LOAD from *not* seing CPU1's STORE
605 */
606 cpus_read_lock();
607
608 /*
609 * Serializes the modifications of the chn_list list as well as
610 * the accesses to next_numa_node_id in init_vp_index().
611 */
612 mutex_lock(&vmbus_connection.channel_mutex);
613
614 list_for_each_entry(channel, &vmbus_connection.chn_list, listentry) {
615 if (guid_equal(&channel->offermsg.offer.if_type,
616 &newchannel->offermsg.offer.if_type) &&
617 guid_equal(&channel->offermsg.offer.if_instance,
618 &newchannel->offermsg.offer.if_instance)) {
619 fnew = false;
620 newchannel->primary_channel = channel;
621 break;
622 }
623 }
624
625 init_vp_index(newchannel);
626
627 /* Remember the channels that should be cleaned up upon suspend. */
628 if (is_hvsock_channel(newchannel) || is_sub_channel(newchannel))
629 atomic_inc(&vmbus_connection.nr_chan_close_on_suspend);
630
631 /*
632 * Now that we have acquired the channel_mutex,
633 * we can release the potentially racing rescind thread.
634 */
635 atomic_dec(&vmbus_connection.offer_in_progress);
636
637 if (fnew) {
638 list_add_tail(&newchannel->listentry,
639 &vmbus_connection.chn_list);
640 } else {
641 /*
642 * Check to see if this is a valid sub-channel.
643 */
644 if (newchannel->offermsg.offer.sub_channel_index == 0) {
645 mutex_unlock(&vmbus_connection.channel_mutex);
646 cpus_read_unlock();
647 /*
648 * Don't call free_channel(), because newchannel->kobj
649 * is not initialized yet.
650 */
651 kfree(newchannel);
652 WARN_ON_ONCE(1);
653 return;
654 }
655 /*
656 * Process the sub-channel.
657 */
658 list_add_tail(&newchannel->sc_list, &channel->sc_list);
659 }
660
661 vmbus_channel_map_relid(newchannel);
662
663 mutex_unlock(&vmbus_connection.channel_mutex);
664 cpus_read_unlock();
665
666 /*
667 * vmbus_process_offer() mustn't call channel->sc_creation_callback()
668 * directly for sub-channels, because sc_creation_callback() ->
669 * vmbus_open() may never get the host's response to the
670 * OPEN_CHANNEL message (the host may rescind a channel at any time,
671 * e.g. in the case of hot removing a NIC), and vmbus_onoffer_rescind()
672 * may not wake up the vmbus_open() as it's blocked due to a non-zero
673 * vmbus_connection.offer_in_progress, and finally we have a deadlock.
674 *
675 * The above is also true for primary channels, if the related device
676 * drivers use sync probing mode by default.
677 *
678 * And, usually the handling of primary channels and sub-channels can
679 * depend on each other, so we should offload them to different
680 * workqueues to avoid possible deadlock, e.g. in sync-probing mode,
681 * NIC1's netvsc_subchan_work() can race with NIC2's netvsc_probe() ->
682 * rtnl_lock(), and causes deadlock: the former gets the rtnl_lock
683 * and waits for all the sub-channels to appear, but the latter
684 * can't get the rtnl_lock and this blocks the handling of
685 * sub-channels.
686 */
687 INIT_WORK(&newchannel->add_channel_work, vmbus_add_channel_work);
688 wq = fnew ? vmbus_connection.handle_primary_chan_wq :
689 vmbus_connection.handle_sub_chan_wq;
690 queue_work(wq, &newchannel->add_channel_work);
691 }
692
693 /*
694 * Check if CPUs used by other channels of the same device.
695 * It should only be called by init_vp_index().
696 */
hv_cpuself_used(u32 cpu,struct vmbus_channel * chn)697 static bool hv_cpuself_used(u32 cpu, struct vmbus_channel *chn)
698 {
699 struct vmbus_channel *primary = chn->primary_channel;
700 struct vmbus_channel *sc;
701
702 lockdep_assert_held(&vmbus_connection.channel_mutex);
703
704 if (!primary)
705 return false;
706
707 if (primary->target_cpu == cpu)
708 return true;
709
710 list_for_each_entry(sc, &primary->sc_list, sc_list)
711 if (sc != chn && sc->target_cpu == cpu)
712 return true;
713
714 return false;
715 }
716
717 /*
718 * We use this state to statically distribute the channel interrupt load.
719 */
720 static int next_numa_node_id;
721
722 /*
723 * We can statically distribute the incoming channel interrupt load
724 * by binding a channel to VCPU.
725 *
726 * For non-performance critical channels we assign the VMBUS_CONNECT_CPU.
727 * Performance critical channels will be distributed evenly among all
728 * the available NUMA nodes. Once the node is assigned, we will assign
729 * the CPU based on a simple round robin scheme.
730 */
init_vp_index(struct vmbus_channel * channel)731 static void init_vp_index(struct vmbus_channel *channel)
732 {
733 bool perf_chn = hv_is_perf_channel(channel);
734 u32 i, ncpu = num_online_cpus();
735 cpumask_var_t available_mask;
736 struct cpumask *allocated_mask;
737 const struct cpumask *hk_mask = housekeeping_cpumask(HK_TYPE_MANAGED_IRQ);
738 u32 target_cpu;
739 int numa_node;
740
741 if (!perf_chn ||
742 !alloc_cpumask_var(&available_mask, GFP_KERNEL) ||
743 cpumask_empty(hk_mask)) {
744 /*
745 * If the channel is not a performance critical
746 * channel, bind it to VMBUS_CONNECT_CPU.
747 * In case alloc_cpumask_var() fails, bind it to
748 * VMBUS_CONNECT_CPU.
749 * If all the cpus are isolated, bind it to
750 * VMBUS_CONNECT_CPU.
751 */
752 channel->target_cpu = VMBUS_CONNECT_CPU;
753 if (perf_chn)
754 hv_set_allocated_cpu(VMBUS_CONNECT_CPU);
755 return;
756 }
757
758 for (i = 1; i <= ncpu + 1; i++) {
759 while (true) {
760 numa_node = next_numa_node_id++;
761 if (numa_node == nr_node_ids) {
762 next_numa_node_id = 0;
763 continue;
764 }
765 if (cpumask_empty(cpumask_of_node(numa_node)))
766 continue;
767 break;
768 }
769 allocated_mask = &hv_context.hv_numa_map[numa_node];
770
771 retry:
772 cpumask_xor(available_mask, allocated_mask, cpumask_of_node(numa_node));
773 cpumask_and(available_mask, available_mask, hk_mask);
774
775 if (cpumask_empty(available_mask)) {
776 /*
777 * We have cycled through all the CPUs in the node;
778 * reset the allocated map.
779 */
780 cpumask_clear(allocated_mask);
781 goto retry;
782 }
783
784 target_cpu = cpumask_first(available_mask);
785 cpumask_set_cpu(target_cpu, allocated_mask);
786
787 if (channel->offermsg.offer.sub_channel_index >= ncpu ||
788 i > ncpu || !hv_cpuself_used(target_cpu, channel))
789 break;
790 }
791
792 channel->target_cpu = target_cpu;
793
794 free_cpumask_var(available_mask);
795 }
796
797 #define UNLOAD_DELAY_UNIT_MS 10 /* 10 milliseconds */
798 #define UNLOAD_WAIT_MS (100*1000) /* 100 seconds */
799 #define UNLOAD_WAIT_LOOPS (UNLOAD_WAIT_MS/UNLOAD_DELAY_UNIT_MS)
800 #define UNLOAD_MSG_MS (5*1000) /* Every 5 seconds */
801 #define UNLOAD_MSG_LOOPS (UNLOAD_MSG_MS/UNLOAD_DELAY_UNIT_MS)
802
vmbus_wait_for_unload(void)803 static void vmbus_wait_for_unload(void)
804 {
805 int cpu;
806 void *page_addr;
807 struct hv_message *msg;
808 struct vmbus_channel_message_header *hdr;
809 u32 message_type, i;
810
811 /*
812 * CHANNELMSG_UNLOAD_RESPONSE is always delivered to the CPU which was
813 * used for initial contact or to CPU0 depending on host version. When
814 * we're crashing on a different CPU let's hope that IRQ handler on
815 * the cpu which receives CHANNELMSG_UNLOAD_RESPONSE is still
816 * functional and vmbus_unload_response() will complete
817 * vmbus_connection.unload_event. If not, the last thing we can do is
818 * read message pages for all CPUs directly.
819 *
820 * Wait up to 100 seconds since an Azure host must writeback any dirty
821 * data in its disk cache before the VMbus UNLOAD request will
822 * complete. This flushing has been empirically observed to take up
823 * to 50 seconds in cases with a lot of dirty data, so allow additional
824 * leeway and for inaccuracies in mdelay(). But eventually time out so
825 * that the panic path can't get hung forever in case the response
826 * message isn't seen.
827 */
828 for (i = 1; i <= UNLOAD_WAIT_LOOPS; i++) {
829 if (completion_done(&vmbus_connection.unload_event))
830 goto completed;
831
832 for_each_present_cpu(cpu) {
833 struct hv_per_cpu_context *hv_cpu
834 = per_cpu_ptr(hv_context.cpu_context, cpu);
835
836 /*
837 * In a CoCo VM the synic_message_page is not allocated
838 * in hv_synic_alloc(). Instead it is set/cleared in
839 * hv_synic_enable_regs() and hv_synic_disable_regs()
840 * such that it is set only when the CPU is online. If
841 * not all present CPUs are online, the message page
842 * might be NULL, so skip such CPUs.
843 */
844 page_addr = hv_cpu->synic_message_page;
845 if (!page_addr)
846 continue;
847
848 msg = (struct hv_message *)page_addr
849 + VMBUS_MESSAGE_SINT;
850
851 message_type = READ_ONCE(msg->header.message_type);
852 if (message_type == HVMSG_NONE)
853 continue;
854
855 hdr = (struct vmbus_channel_message_header *)
856 msg->u.payload;
857
858 if (hdr->msgtype == CHANNELMSG_UNLOAD_RESPONSE)
859 complete(&vmbus_connection.unload_event);
860
861 vmbus_signal_eom(msg, message_type);
862 }
863
864 /*
865 * Give a notice periodically so someone watching the
866 * serial output won't think it is completely hung.
867 */
868 if (!(i % UNLOAD_MSG_LOOPS))
869 pr_notice("Waiting for VMBus UNLOAD to complete\n");
870
871 mdelay(UNLOAD_DELAY_UNIT_MS);
872 }
873 pr_err("Continuing even though VMBus UNLOAD did not complete\n");
874
875 completed:
876 /*
877 * We're crashing and already got the UNLOAD_RESPONSE, cleanup all
878 * maybe-pending messages on all CPUs to be able to receive new
879 * messages after we reconnect.
880 */
881 for_each_present_cpu(cpu) {
882 struct hv_per_cpu_context *hv_cpu
883 = per_cpu_ptr(hv_context.cpu_context, cpu);
884
885 page_addr = hv_cpu->synic_message_page;
886 if (!page_addr)
887 continue;
888
889 msg = (struct hv_message *)page_addr + VMBUS_MESSAGE_SINT;
890 msg->header.message_type = HVMSG_NONE;
891 }
892 }
893
894 /*
895 * vmbus_unload_response - Handler for the unload response.
896 */
vmbus_unload_response(struct vmbus_channel_message_header * hdr)897 static void vmbus_unload_response(struct vmbus_channel_message_header *hdr)
898 {
899 /*
900 * This is a global event; just wakeup the waiting thread.
901 * Once we successfully unload, we can cleanup the monitor state.
902 *
903 * NB. A malicious or compromised Hyper-V could send a spurious
904 * message of type CHANNELMSG_UNLOAD_RESPONSE, and trigger a call
905 * of the complete() below. Make sure that unload_event has been
906 * initialized by the time this complete() is executed.
907 */
908 complete(&vmbus_connection.unload_event);
909 }
910
vmbus_initiate_unload(bool crash)911 void vmbus_initiate_unload(bool crash)
912 {
913 struct vmbus_channel_message_header hdr;
914
915 if (xchg(&vmbus_connection.conn_state, DISCONNECTED) == DISCONNECTED)
916 return;
917
918 /* Pre-Win2012R2 hosts don't support reconnect */
919 if (vmbus_proto_version < VERSION_WIN8_1)
920 return;
921
922 reinit_completion(&vmbus_connection.unload_event);
923 memset(&hdr, 0, sizeof(struct vmbus_channel_message_header));
924 hdr.msgtype = CHANNELMSG_UNLOAD;
925 vmbus_post_msg(&hdr, sizeof(struct vmbus_channel_message_header),
926 !crash);
927
928 /*
929 * vmbus_initiate_unload() is also called on crash and the crash can be
930 * happening in an interrupt context, where scheduling is impossible.
931 */
932 if (!crash)
933 wait_for_completion(&vmbus_connection.unload_event);
934 else
935 vmbus_wait_for_unload();
936 }
937
check_ready_for_resume_event(void)938 static void check_ready_for_resume_event(void)
939 {
940 /*
941 * If all the old primary channels have been fixed up, then it's safe
942 * to resume.
943 */
944 if (atomic_dec_and_test(&vmbus_connection.nr_chan_fixup_on_resume))
945 complete(&vmbus_connection.ready_for_resume_event);
946 }
947
vmbus_setup_channel_state(struct vmbus_channel * channel,struct vmbus_channel_offer_channel * offer)948 static void vmbus_setup_channel_state(struct vmbus_channel *channel,
949 struct vmbus_channel_offer_channel *offer)
950 {
951 /*
952 * Setup state for signalling the host.
953 */
954 channel->sig_event = VMBUS_EVENT_CONNECTION_ID;
955
956 channel->is_dedicated_interrupt =
957 (offer->is_dedicated_interrupt != 0);
958 channel->sig_event = offer->connection_id;
959
960 memcpy(&channel->offermsg, offer,
961 sizeof(struct vmbus_channel_offer_channel));
962 channel->monitor_grp = (u8)offer->monitorid / 32;
963 channel->monitor_bit = (u8)offer->monitorid % 32;
964 channel->device_id = hv_get_dev_type(channel);
965 }
966
967 /*
968 * find_primary_channel_by_offer - Get the channel object given the new offer.
969 * This is only used in the resume path of hibernation.
970 */
971 static struct vmbus_channel *
find_primary_channel_by_offer(const struct vmbus_channel_offer_channel * offer)972 find_primary_channel_by_offer(const struct vmbus_channel_offer_channel *offer)
973 {
974 struct vmbus_channel *channel = NULL, *iter;
975 const guid_t *inst1, *inst2;
976
977 /* Ignore sub-channel offers. */
978 if (offer->offer.sub_channel_index != 0)
979 return NULL;
980
981 mutex_lock(&vmbus_connection.channel_mutex);
982
983 list_for_each_entry(iter, &vmbus_connection.chn_list, listentry) {
984 inst1 = &iter->offermsg.offer.if_instance;
985 inst2 = &offer->offer.if_instance;
986
987 if (guid_equal(inst1, inst2)) {
988 channel = iter;
989 break;
990 }
991 }
992
993 mutex_unlock(&vmbus_connection.channel_mutex);
994
995 return channel;
996 }
997
vmbus_is_valid_offer(const struct vmbus_channel_offer_channel * offer)998 static bool vmbus_is_valid_offer(const struct vmbus_channel_offer_channel *offer)
999 {
1000 const guid_t *guid = &offer->offer.if_type;
1001 u16 i;
1002
1003 if (!hv_is_isolation_supported())
1004 return true;
1005
1006 if (is_hvsock_offer(offer))
1007 return true;
1008
1009 for (i = 0; i < ARRAY_SIZE(vmbus_devs); i++) {
1010 if (guid_equal(guid, &vmbus_devs[i].guid))
1011 return vmbus_devs[i].allowed_in_isolated;
1012 }
1013 return false;
1014 }
1015
1016 /*
1017 * vmbus_onoffer - Handler for channel offers from vmbus in parent partition.
1018 *
1019 */
vmbus_onoffer(struct vmbus_channel_message_header * hdr)1020 static void vmbus_onoffer(struct vmbus_channel_message_header *hdr)
1021 {
1022 struct vmbus_channel_offer_channel *offer;
1023 struct vmbus_channel *oldchannel, *newchannel;
1024 size_t offer_sz;
1025
1026 offer = (struct vmbus_channel_offer_channel *)hdr;
1027
1028 trace_vmbus_onoffer(offer);
1029
1030 if (!vmbus_is_valid_offer(offer)) {
1031 pr_err_ratelimited("Invalid offer %d from the host supporting isolation\n",
1032 offer->child_relid);
1033 atomic_dec(&vmbus_connection.offer_in_progress);
1034 return;
1035 }
1036
1037 oldchannel = find_primary_channel_by_offer(offer);
1038
1039 if (oldchannel != NULL) {
1040 /*
1041 * We're resuming from hibernation: all the sub-channel and
1042 * hv_sock channels we had before the hibernation should have
1043 * been cleaned up, and now we must be seeing a re-offered
1044 * primary channel that we had before the hibernation.
1045 */
1046
1047 /*
1048 * { Initially: channel relid = INVALID_RELID,
1049 * channels[valid_relid] = NULL }
1050 *
1051 * CPU1 CPU2
1052 *
1053 * [vmbus_onoffer()] [vmbus_device_release()]
1054 *
1055 * LOCK channel_mutex LOCK channel_mutex
1056 * STORE channel relid = valid_relid LOAD r1 = channel relid
1057 * MAP_RELID channel if (r1 != INVALID_RELID)
1058 * UNLOCK channel_mutex UNMAP_RELID channel
1059 * UNLOCK channel_mutex
1060 *
1061 * Forbids: r1 == valid_relid &&
1062 * channels[valid_relid] == channel
1063 *
1064 * Note. r1 can be INVALID_RELID only for an hv_sock channel.
1065 * None of the hv_sock channels which were present before the
1066 * suspend are re-offered upon the resume. See the WARN_ON()
1067 * in hv_process_channel_removal().
1068 */
1069 mutex_lock(&vmbus_connection.channel_mutex);
1070
1071 atomic_dec(&vmbus_connection.offer_in_progress);
1072
1073 WARN_ON(oldchannel->offermsg.child_relid != INVALID_RELID);
1074 /* Fix up the relid. */
1075 oldchannel->offermsg.child_relid = offer->child_relid;
1076
1077 offer_sz = sizeof(*offer);
1078 if (memcmp(offer, &oldchannel->offermsg, offer_sz) != 0) {
1079 /*
1080 * This is not an error, since the host can also change
1081 * the other field(s) of the offer, e.g. on WS RS5
1082 * (Build 17763), the offer->connection_id of the
1083 * Mellanox VF vmbus device can change when the host
1084 * reoffers the device upon resume.
1085 */
1086 pr_debug("vmbus offer changed: relid=%d\n",
1087 offer->child_relid);
1088
1089 print_hex_dump_debug("Old vmbus offer: ",
1090 DUMP_PREFIX_OFFSET, 16, 4,
1091 &oldchannel->offermsg, offer_sz,
1092 false);
1093 print_hex_dump_debug("New vmbus offer: ",
1094 DUMP_PREFIX_OFFSET, 16, 4,
1095 offer, offer_sz, false);
1096
1097 /* Fix up the old channel. */
1098 vmbus_setup_channel_state(oldchannel, offer);
1099 }
1100
1101 /* Add the channel back to the array of channels. */
1102 vmbus_channel_map_relid(oldchannel);
1103 check_ready_for_resume_event();
1104
1105 mutex_unlock(&vmbus_connection.channel_mutex);
1106 return;
1107 }
1108
1109 /* Allocate the channel object and save this offer. */
1110 newchannel = alloc_channel();
1111 if (!newchannel) {
1112 vmbus_release_relid(offer->child_relid);
1113 atomic_dec(&vmbus_connection.offer_in_progress);
1114 pr_err("Unable to allocate channel object\n");
1115 return;
1116 }
1117
1118 vmbus_setup_channel_state(newchannel, offer);
1119
1120 vmbus_process_offer(newchannel);
1121 }
1122
check_ready_for_suspend_event(void)1123 static void check_ready_for_suspend_event(void)
1124 {
1125 /*
1126 * If all the sub-channels or hv_sock channels have been cleaned up,
1127 * then it's safe to suspend.
1128 */
1129 if (atomic_dec_and_test(&vmbus_connection.nr_chan_close_on_suspend))
1130 complete(&vmbus_connection.ready_for_suspend_event);
1131 }
1132
1133 /*
1134 * vmbus_onoffer_rescind - Rescind offer handler.
1135 *
1136 * We queue a work item to process this offer synchronously
1137 */
vmbus_onoffer_rescind(struct vmbus_channel_message_header * hdr)1138 static void vmbus_onoffer_rescind(struct vmbus_channel_message_header *hdr)
1139 {
1140 struct vmbus_channel_rescind_offer *rescind;
1141 struct vmbus_channel *channel;
1142 struct device *dev;
1143 bool clean_up_chan_for_suspend;
1144
1145 rescind = (struct vmbus_channel_rescind_offer *)hdr;
1146
1147 trace_vmbus_onoffer_rescind(rescind);
1148
1149 /*
1150 * The offer msg and the corresponding rescind msg
1151 * from the host are guranteed to be ordered -
1152 * offer comes in first and then the rescind.
1153 * Since we process these events in work elements,
1154 * and with preemption, we may end up processing
1155 * the events out of order. We rely on the synchronization
1156 * provided by offer_in_progress and by channel_mutex for
1157 * ordering these events:
1158 *
1159 * { Initially: offer_in_progress = 1 }
1160 *
1161 * CPU1 CPU2
1162 *
1163 * [vmbus_onoffer()] [vmbus_onoffer_rescind()]
1164 *
1165 * LOCK channel_mutex WAIT_ON offer_in_progress == 0
1166 * DECREMENT offer_in_progress LOCK channel_mutex
1167 * STORE channels[] LOAD channels[]
1168 * UNLOCK channel_mutex UNLOCK channel_mutex
1169 *
1170 * Forbids: CPU2's LOAD from *not* seeing CPU1's STORE
1171 */
1172
1173 while (atomic_read(&vmbus_connection.offer_in_progress) != 0) {
1174 /*
1175 * We wait here until any channel offer is currently
1176 * being processed.
1177 */
1178 msleep(1);
1179 }
1180
1181 mutex_lock(&vmbus_connection.channel_mutex);
1182 channel = relid2channel(rescind->child_relid);
1183 if (channel != NULL) {
1184 /*
1185 * Guarantee that no other instance of vmbus_onoffer_rescind()
1186 * has got a reference to the channel object. Synchronize on
1187 * &vmbus_connection.channel_mutex.
1188 */
1189 if (channel->rescind_ref) {
1190 mutex_unlock(&vmbus_connection.channel_mutex);
1191 return;
1192 }
1193 channel->rescind_ref = true;
1194 }
1195 mutex_unlock(&vmbus_connection.channel_mutex);
1196
1197 if (channel == NULL) {
1198 /*
1199 * We failed in processing the offer message;
1200 * we would have cleaned up the relid in that
1201 * failure path.
1202 */
1203 return;
1204 }
1205
1206 clean_up_chan_for_suspend = is_hvsock_channel(channel) ||
1207 is_sub_channel(channel);
1208 /*
1209 * Before setting channel->rescind in vmbus_rescind_cleanup(), we
1210 * should make sure the channel callback is not running any more.
1211 */
1212 vmbus_reset_channel_cb(channel);
1213
1214 /*
1215 * Now wait for offer handling to complete.
1216 */
1217 vmbus_rescind_cleanup(channel);
1218 while (READ_ONCE(channel->probe_done) == false) {
1219 /*
1220 * We wait here until any channel offer is currently
1221 * being processed.
1222 */
1223 msleep(1);
1224 }
1225
1226 /*
1227 * At this point, the rescind handling can proceed safely.
1228 */
1229
1230 if (channel->device_obj) {
1231 if (channel->chn_rescind_callback) {
1232 channel->chn_rescind_callback(channel);
1233
1234 if (clean_up_chan_for_suspend)
1235 check_ready_for_suspend_event();
1236
1237 return;
1238 }
1239 /*
1240 * We will have to unregister this device from the
1241 * driver core.
1242 */
1243 dev = get_device(&channel->device_obj->device);
1244 if (dev) {
1245 vmbus_device_unregister(channel->device_obj);
1246 put_device(dev);
1247 }
1248 } else if (channel->primary_channel != NULL) {
1249 /*
1250 * Sub-channel is being rescinded. Following is the channel
1251 * close sequence when initiated from the driveri (refer to
1252 * vmbus_close() for details):
1253 * 1. Close all sub-channels first
1254 * 2. Then close the primary channel.
1255 */
1256 mutex_lock(&vmbus_connection.channel_mutex);
1257 if (channel->state == CHANNEL_OPEN_STATE) {
1258 /*
1259 * The channel is currently not open;
1260 * it is safe for us to cleanup the channel.
1261 */
1262 hv_process_channel_removal(channel);
1263 } else {
1264 complete(&channel->rescind_event);
1265 }
1266 mutex_unlock(&vmbus_connection.channel_mutex);
1267 }
1268
1269 /* The "channel" may have been freed. Do not access it any longer. */
1270
1271 if (clean_up_chan_for_suspend)
1272 check_ready_for_suspend_event();
1273 }
1274
vmbus_hvsock_device_unregister(struct vmbus_channel * channel)1275 void vmbus_hvsock_device_unregister(struct vmbus_channel *channel)
1276 {
1277 BUG_ON(!is_hvsock_channel(channel));
1278
1279 /* We always get a rescind msg when a connection is closed. */
1280 while (!READ_ONCE(channel->probe_done) || !READ_ONCE(channel->rescind))
1281 msleep(1);
1282
1283 vmbus_device_unregister(channel->device_obj);
1284 }
1285 EXPORT_SYMBOL_GPL(vmbus_hvsock_device_unregister);
1286
1287
1288 /*
1289 * vmbus_onoffers_delivered -
1290 * This is invoked when all offers have been delivered.
1291 *
1292 * Nothing to do here.
1293 */
vmbus_onoffers_delivered(struct vmbus_channel_message_header * hdr)1294 static void vmbus_onoffers_delivered(
1295 struct vmbus_channel_message_header *hdr)
1296 {
1297 }
1298
1299 /*
1300 * vmbus_onopen_result - Open result handler.
1301 *
1302 * This is invoked when we received a response to our channel open request.
1303 * Find the matching request, copy the response and signal the requesting
1304 * thread.
1305 */
vmbus_onopen_result(struct vmbus_channel_message_header * hdr)1306 static void vmbus_onopen_result(struct vmbus_channel_message_header *hdr)
1307 {
1308 struct vmbus_channel_open_result *result;
1309 struct vmbus_channel_msginfo *msginfo;
1310 struct vmbus_channel_message_header *requestheader;
1311 struct vmbus_channel_open_channel *openmsg;
1312 unsigned long flags;
1313
1314 result = (struct vmbus_channel_open_result *)hdr;
1315
1316 trace_vmbus_onopen_result(result);
1317
1318 /*
1319 * Find the open msg, copy the result and signal/unblock the wait event
1320 */
1321 spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
1322
1323 list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
1324 msglistentry) {
1325 requestheader =
1326 (struct vmbus_channel_message_header *)msginfo->msg;
1327
1328 if (requestheader->msgtype == CHANNELMSG_OPENCHANNEL) {
1329 openmsg =
1330 (struct vmbus_channel_open_channel *)msginfo->msg;
1331 if (openmsg->child_relid == result->child_relid &&
1332 openmsg->openid == result->openid) {
1333 memcpy(&msginfo->response.open_result,
1334 result,
1335 sizeof(
1336 struct vmbus_channel_open_result));
1337 complete(&msginfo->waitevent);
1338 break;
1339 }
1340 }
1341 }
1342 spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
1343 }
1344
1345 /*
1346 * vmbus_ongpadl_created - GPADL created handler.
1347 *
1348 * This is invoked when we received a response to our gpadl create request.
1349 * Find the matching request, copy the response and signal the requesting
1350 * thread.
1351 */
vmbus_ongpadl_created(struct vmbus_channel_message_header * hdr)1352 static void vmbus_ongpadl_created(struct vmbus_channel_message_header *hdr)
1353 {
1354 struct vmbus_channel_gpadl_created *gpadlcreated;
1355 struct vmbus_channel_msginfo *msginfo;
1356 struct vmbus_channel_message_header *requestheader;
1357 struct vmbus_channel_gpadl_header *gpadlheader;
1358 unsigned long flags;
1359
1360 gpadlcreated = (struct vmbus_channel_gpadl_created *)hdr;
1361
1362 trace_vmbus_ongpadl_created(gpadlcreated);
1363
1364 /*
1365 * Find the establish msg, copy the result and signal/unblock the wait
1366 * event
1367 */
1368 spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
1369
1370 list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
1371 msglistentry) {
1372 requestheader =
1373 (struct vmbus_channel_message_header *)msginfo->msg;
1374
1375 if (requestheader->msgtype == CHANNELMSG_GPADL_HEADER) {
1376 gpadlheader =
1377 (struct vmbus_channel_gpadl_header *)requestheader;
1378
1379 if ((gpadlcreated->child_relid ==
1380 gpadlheader->child_relid) &&
1381 (gpadlcreated->gpadl == gpadlheader->gpadl)) {
1382 memcpy(&msginfo->response.gpadl_created,
1383 gpadlcreated,
1384 sizeof(
1385 struct vmbus_channel_gpadl_created));
1386 complete(&msginfo->waitevent);
1387 break;
1388 }
1389 }
1390 }
1391 spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
1392 }
1393
1394 /*
1395 * vmbus_onmodifychannel_response - Modify Channel response handler.
1396 *
1397 * This is invoked when we received a response to our channel modify request.
1398 * Find the matching request, copy the response and signal the requesting thread.
1399 */
vmbus_onmodifychannel_response(struct vmbus_channel_message_header * hdr)1400 static void vmbus_onmodifychannel_response(struct vmbus_channel_message_header *hdr)
1401 {
1402 struct vmbus_channel_modifychannel_response *response;
1403 struct vmbus_channel_msginfo *msginfo;
1404 unsigned long flags;
1405
1406 response = (struct vmbus_channel_modifychannel_response *)hdr;
1407
1408 trace_vmbus_onmodifychannel_response(response);
1409
1410 /*
1411 * Find the modify msg, copy the response and signal/unblock the wait event.
1412 */
1413 spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
1414
1415 list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list, msglistentry) {
1416 struct vmbus_channel_message_header *responseheader =
1417 (struct vmbus_channel_message_header *)msginfo->msg;
1418
1419 if (responseheader->msgtype == CHANNELMSG_MODIFYCHANNEL) {
1420 struct vmbus_channel_modifychannel *modifymsg;
1421
1422 modifymsg = (struct vmbus_channel_modifychannel *)msginfo->msg;
1423 if (modifymsg->child_relid == response->child_relid) {
1424 memcpy(&msginfo->response.modify_response, response,
1425 sizeof(*response));
1426 complete(&msginfo->waitevent);
1427 break;
1428 }
1429 }
1430 }
1431 spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
1432 }
1433
1434 /*
1435 * vmbus_ongpadl_torndown - GPADL torndown handler.
1436 *
1437 * This is invoked when we received a response to our gpadl teardown request.
1438 * Find the matching request, copy the response and signal the requesting
1439 * thread.
1440 */
vmbus_ongpadl_torndown(struct vmbus_channel_message_header * hdr)1441 static void vmbus_ongpadl_torndown(
1442 struct vmbus_channel_message_header *hdr)
1443 {
1444 struct vmbus_channel_gpadl_torndown *gpadl_torndown;
1445 struct vmbus_channel_msginfo *msginfo;
1446 struct vmbus_channel_message_header *requestheader;
1447 struct vmbus_channel_gpadl_teardown *gpadl_teardown;
1448 unsigned long flags;
1449
1450 gpadl_torndown = (struct vmbus_channel_gpadl_torndown *)hdr;
1451
1452 trace_vmbus_ongpadl_torndown(gpadl_torndown);
1453
1454 /*
1455 * Find the open msg, copy the result and signal/unblock the wait event
1456 */
1457 spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
1458
1459 list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
1460 msglistentry) {
1461 requestheader =
1462 (struct vmbus_channel_message_header *)msginfo->msg;
1463
1464 if (requestheader->msgtype == CHANNELMSG_GPADL_TEARDOWN) {
1465 gpadl_teardown =
1466 (struct vmbus_channel_gpadl_teardown *)requestheader;
1467
1468 if (gpadl_torndown->gpadl == gpadl_teardown->gpadl) {
1469 memcpy(&msginfo->response.gpadl_torndown,
1470 gpadl_torndown,
1471 sizeof(
1472 struct vmbus_channel_gpadl_torndown));
1473 complete(&msginfo->waitevent);
1474 break;
1475 }
1476 }
1477 }
1478 spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
1479 }
1480
1481 /*
1482 * vmbus_onversion_response - Version response handler
1483 *
1484 * This is invoked when we received a response to our initiate contact request.
1485 * Find the matching request, copy the response and signal the requesting
1486 * thread.
1487 */
vmbus_onversion_response(struct vmbus_channel_message_header * hdr)1488 static void vmbus_onversion_response(
1489 struct vmbus_channel_message_header *hdr)
1490 {
1491 struct vmbus_channel_msginfo *msginfo;
1492 struct vmbus_channel_message_header *requestheader;
1493 struct vmbus_channel_version_response *version_response;
1494 unsigned long flags;
1495
1496 version_response = (struct vmbus_channel_version_response *)hdr;
1497
1498 trace_vmbus_onversion_response(version_response);
1499
1500 spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
1501
1502 list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
1503 msglistentry) {
1504 requestheader =
1505 (struct vmbus_channel_message_header *)msginfo->msg;
1506
1507 if (requestheader->msgtype ==
1508 CHANNELMSG_INITIATE_CONTACT) {
1509 memcpy(&msginfo->response.version_response,
1510 version_response,
1511 sizeof(struct vmbus_channel_version_response));
1512 complete(&msginfo->waitevent);
1513 }
1514 }
1515 spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
1516 }
1517
1518 /* Channel message dispatch table */
1519 const struct vmbus_channel_message_table_entry
1520 channel_message_table[CHANNELMSG_COUNT] = {
1521 { CHANNELMSG_INVALID, 0, NULL, 0},
1522 { CHANNELMSG_OFFERCHANNEL, 0, vmbus_onoffer,
1523 sizeof(struct vmbus_channel_offer_channel)},
1524 { CHANNELMSG_RESCIND_CHANNELOFFER, 0, vmbus_onoffer_rescind,
1525 sizeof(struct vmbus_channel_rescind_offer) },
1526 { CHANNELMSG_REQUESTOFFERS, 0, NULL, 0},
1527 { CHANNELMSG_ALLOFFERS_DELIVERED, 1, vmbus_onoffers_delivered, 0},
1528 { CHANNELMSG_OPENCHANNEL, 0, NULL, 0},
1529 { CHANNELMSG_OPENCHANNEL_RESULT, 1, vmbus_onopen_result,
1530 sizeof(struct vmbus_channel_open_result)},
1531 { CHANNELMSG_CLOSECHANNEL, 0, NULL, 0},
1532 { CHANNELMSG_GPADL_HEADER, 0, NULL, 0},
1533 { CHANNELMSG_GPADL_BODY, 0, NULL, 0},
1534 { CHANNELMSG_GPADL_CREATED, 1, vmbus_ongpadl_created,
1535 sizeof(struct vmbus_channel_gpadl_created)},
1536 { CHANNELMSG_GPADL_TEARDOWN, 0, NULL, 0},
1537 { CHANNELMSG_GPADL_TORNDOWN, 1, vmbus_ongpadl_torndown,
1538 sizeof(struct vmbus_channel_gpadl_torndown) },
1539 { CHANNELMSG_RELID_RELEASED, 0, NULL, 0},
1540 { CHANNELMSG_INITIATE_CONTACT, 0, NULL, 0},
1541 { CHANNELMSG_VERSION_RESPONSE, 1, vmbus_onversion_response,
1542 sizeof(struct vmbus_channel_version_response)},
1543 { CHANNELMSG_UNLOAD, 0, NULL, 0},
1544 { CHANNELMSG_UNLOAD_RESPONSE, 1, vmbus_unload_response, 0},
1545 { CHANNELMSG_18, 0, NULL, 0},
1546 { CHANNELMSG_19, 0, NULL, 0},
1547 { CHANNELMSG_20, 0, NULL, 0},
1548 { CHANNELMSG_TL_CONNECT_REQUEST, 0, NULL, 0},
1549 { CHANNELMSG_MODIFYCHANNEL, 0, NULL, 0},
1550 { CHANNELMSG_TL_CONNECT_RESULT, 0, NULL, 0},
1551 { CHANNELMSG_MODIFYCHANNEL_RESPONSE, 1, vmbus_onmodifychannel_response,
1552 sizeof(struct vmbus_channel_modifychannel_response)},
1553 };
1554
1555 /*
1556 * vmbus_onmessage - Handler for channel protocol messages.
1557 *
1558 * This is invoked in the vmbus worker thread context.
1559 */
vmbus_onmessage(struct vmbus_channel_message_header * hdr)1560 void vmbus_onmessage(struct vmbus_channel_message_header *hdr)
1561 {
1562 trace_vmbus_on_message(hdr);
1563
1564 /*
1565 * vmbus_on_msg_dpc() makes sure the hdr->msgtype here can not go
1566 * out of bound and the message_handler pointer can not be NULL.
1567 */
1568 channel_message_table[hdr->msgtype].message_handler(hdr);
1569 }
1570
1571 /*
1572 * vmbus_request_offers - Send a request to get all our pending offers.
1573 */
vmbus_request_offers(void)1574 int vmbus_request_offers(void)
1575 {
1576 struct vmbus_channel_message_header *msg;
1577 struct vmbus_channel_msginfo *msginfo;
1578 int ret;
1579
1580 msginfo = kzalloc(sizeof(*msginfo) +
1581 sizeof(struct vmbus_channel_message_header),
1582 GFP_KERNEL);
1583 if (!msginfo)
1584 return -ENOMEM;
1585
1586 msg = (struct vmbus_channel_message_header *)msginfo->msg;
1587
1588 msg->msgtype = CHANNELMSG_REQUESTOFFERS;
1589
1590 ret = vmbus_post_msg(msg, sizeof(struct vmbus_channel_message_header),
1591 true);
1592
1593 trace_vmbus_request_offers(ret);
1594
1595 if (ret != 0) {
1596 pr_err("Unable to request offers - %d\n", ret);
1597
1598 goto cleanup;
1599 }
1600
1601 cleanup:
1602 kfree(msginfo);
1603
1604 return ret;
1605 }
1606
vmbus_set_sc_create_callback(struct vmbus_channel * primary_channel,void (* sc_cr_cb)(struct vmbus_channel * new_sc))1607 void vmbus_set_sc_create_callback(struct vmbus_channel *primary_channel,
1608 void (*sc_cr_cb)(struct vmbus_channel *new_sc))
1609 {
1610 primary_channel->sc_creation_callback = sc_cr_cb;
1611 }
1612 EXPORT_SYMBOL_GPL(vmbus_set_sc_create_callback);
1613
vmbus_set_chn_rescind_callback(struct vmbus_channel * channel,void (* chn_rescind_cb)(struct vmbus_channel *))1614 void vmbus_set_chn_rescind_callback(struct vmbus_channel *channel,
1615 void (*chn_rescind_cb)(struct vmbus_channel *))
1616 {
1617 channel->chn_rescind_callback = chn_rescind_cb;
1618 }
1619 EXPORT_SYMBOL_GPL(vmbus_set_chn_rescind_callback);
1620