1 // SPDX-License-Identifier: GPL-2.0-only 2 /* 3 * Copyright (c) 2009, Microsoft Corporation. 4 * 5 * Authors: 6 * Haiyang Zhang <haiyangz@microsoft.com> 7 * Hank Janssen <hjanssen@microsoft.com> 8 */ 9 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt 10 11 #include <linux/kernel.h> 12 #include <linux/interrupt.h> 13 #include <linux/sched.h> 14 #include <linux/wait.h> 15 #include <linux/mm.h> 16 #include <linux/slab.h> 17 #include <linux/list.h> 18 #include <linux/module.h> 19 #include <linux/completion.h> 20 #include <linux/delay.h> 21 #include <linux/cpu.h> 22 #include <linux/hyperv.h> 23 #include <asm/mshyperv.h> 24 #include <linux/sched/isolation.h> 25 26 #include "hyperv_vmbus.h" 27 28 static void init_vp_index(struct vmbus_channel *channel); 29 30 const struct vmbus_device vmbus_devs[] = { 31 /* IDE */ 32 { .dev_type = HV_IDE, 33 HV_IDE_GUID, 34 .perf_device = true, 35 .allowed_in_isolated = false, 36 }, 37 38 /* SCSI */ 39 { .dev_type = HV_SCSI, 40 HV_SCSI_GUID, 41 .perf_device = true, 42 .allowed_in_isolated = true, 43 }, 44 45 /* Fibre Channel */ 46 { .dev_type = HV_FC, 47 HV_SYNTHFC_GUID, 48 .perf_device = true, 49 .allowed_in_isolated = false, 50 }, 51 52 /* Synthetic NIC */ 53 { .dev_type = HV_NIC, 54 HV_NIC_GUID, 55 .perf_device = true, 56 .allowed_in_isolated = true, 57 }, 58 59 /* Network Direct */ 60 { .dev_type = HV_ND, 61 HV_ND_GUID, 62 .perf_device = true, 63 .allowed_in_isolated = false, 64 }, 65 66 /* PCIE */ 67 { .dev_type = HV_PCIE, 68 HV_PCIE_GUID, 69 .perf_device = false, 70 .allowed_in_isolated = true, 71 }, 72 73 /* Synthetic Frame Buffer */ 74 { .dev_type = HV_FB, 75 HV_SYNTHVID_GUID, 76 .perf_device = false, 77 .allowed_in_isolated = false, 78 }, 79 80 /* Synthetic Keyboard */ 81 { .dev_type = HV_KBD, 82 HV_KBD_GUID, 83 .perf_device = false, 84 .allowed_in_isolated = false, 85 }, 86 87 /* Synthetic MOUSE */ 88 { .dev_type = HV_MOUSE, 89 HV_MOUSE_GUID, 90 .perf_device = false, 91 .allowed_in_isolated = false, 92 }, 93 94 /* KVP */ 95 { .dev_type = HV_KVP, 96 HV_KVP_GUID, 97 .perf_device = false, 98 .allowed_in_isolated = false, 99 }, 100 101 /* Time Synch */ 102 { .dev_type = HV_TS, 103 HV_TS_GUID, 104 .perf_device = false, 105 .allowed_in_isolated = true, 106 }, 107 108 /* Heartbeat */ 109 { .dev_type = HV_HB, 110 HV_HEART_BEAT_GUID, 111 .perf_device = false, 112 .allowed_in_isolated = true, 113 }, 114 115 /* Shutdown */ 116 { .dev_type = HV_SHUTDOWN, 117 HV_SHUTDOWN_GUID, 118 .perf_device = false, 119 .allowed_in_isolated = true, 120 }, 121 122 /* File copy */ 123 { .dev_type = HV_FCOPY, 124 HV_FCOPY_GUID, 125 .perf_device = false, 126 .allowed_in_isolated = false, 127 }, 128 129 /* Backup */ 130 { .dev_type = HV_BACKUP, 131 HV_VSS_GUID, 132 .perf_device = false, 133 .allowed_in_isolated = false, 134 }, 135 136 /* Dynamic Memory */ 137 { .dev_type = HV_DM, 138 HV_DM_GUID, 139 .perf_device = false, 140 .allowed_in_isolated = false, 141 }, 142 143 /* Unknown GUID */ 144 { .dev_type = HV_UNKNOWN, 145 .perf_device = false, 146 .allowed_in_isolated = false, 147 }, 148 }; 149 150 static const struct { 151 guid_t guid; 152 } vmbus_unsupported_devs[] = { 153 { HV_AVMA1_GUID }, 154 { HV_AVMA2_GUID }, 155 { HV_RDV_GUID }, 156 { HV_IMC_GUID }, 157 }; 158 159 /* 160 * The rescinded channel may be blocked waiting for a response from the host; 161 * take care of that. 162 */ 163 static void vmbus_rescind_cleanup(struct vmbus_channel *channel) 164 { 165 struct vmbus_channel_msginfo *msginfo; 166 unsigned long flags; 167 168 169 spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags); 170 channel->rescind = true; 171 list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list, 172 msglistentry) { 173 174 if (msginfo->waiting_channel == channel) { 175 complete(&msginfo->waitevent); 176 break; 177 } 178 } 179 spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags); 180 } 181 182 static bool is_unsupported_vmbus_devs(const guid_t *guid) 183 { 184 int i; 185 186 for (i = 0; i < ARRAY_SIZE(vmbus_unsupported_devs); i++) 187 if (guid_equal(guid, &vmbus_unsupported_devs[i].guid)) 188 return true; 189 return false; 190 } 191 192 static u16 hv_get_dev_type(const struct vmbus_channel *channel) 193 { 194 const guid_t *guid = &channel->offermsg.offer.if_type; 195 u16 i; 196 197 if (is_hvsock_channel(channel) || is_unsupported_vmbus_devs(guid)) 198 return HV_UNKNOWN; 199 200 for (i = HV_IDE; i < HV_UNKNOWN; i++) { 201 if (guid_equal(guid, &vmbus_devs[i].guid)) 202 return i; 203 } 204 pr_info("Unknown GUID: %pUl\n", guid); 205 return i; 206 } 207 208 /** 209 * vmbus_prep_negotiate_resp() - Create default response for Negotiate message 210 * @icmsghdrp: Pointer to msg header structure 211 * @buf: Raw buffer channel data 212 * @buflen: Length of the raw buffer channel data. 213 * @fw_version: The framework versions we can support. 214 * @fw_vercnt: The size of @fw_version. 215 * @srv_version: The service versions we can support. 216 * @srv_vercnt: The size of @srv_version. 217 * @nego_fw_version: The selected framework version. 218 * @nego_srv_version: The selected service version. 219 * 220 * Note: Versions are given in decreasing order. 221 * 222 * Set up and fill in default negotiate response message. 223 * Mainly used by Hyper-V drivers. 224 */ 225 bool vmbus_prep_negotiate_resp(struct icmsg_hdr *icmsghdrp, u8 *buf, 226 u32 buflen, const int *fw_version, int fw_vercnt, 227 const int *srv_version, int srv_vercnt, 228 int *nego_fw_version, int *nego_srv_version) 229 { 230 int icframe_major, icframe_minor; 231 int icmsg_major, icmsg_minor; 232 int fw_major, fw_minor; 233 int srv_major, srv_minor; 234 int i, j; 235 bool found_match = false; 236 struct icmsg_negotiate *negop; 237 238 /* Check that there's enough space for icframe_vercnt, icmsg_vercnt */ 239 if (buflen < ICMSG_HDR + offsetof(struct icmsg_negotiate, reserved)) { 240 pr_err_ratelimited("Invalid icmsg negotiate\n"); 241 return false; 242 } 243 244 icmsghdrp->icmsgsize = 0x10; 245 negop = (struct icmsg_negotiate *)&buf[ICMSG_HDR]; 246 247 icframe_major = negop->icframe_vercnt; 248 icframe_minor = 0; 249 250 icmsg_major = negop->icmsg_vercnt; 251 icmsg_minor = 0; 252 253 /* Validate negop packet */ 254 if (icframe_major > IC_VERSION_NEGOTIATION_MAX_VER_COUNT || 255 icmsg_major > IC_VERSION_NEGOTIATION_MAX_VER_COUNT || 256 ICMSG_NEGOTIATE_PKT_SIZE(icframe_major, icmsg_major) > buflen) { 257 pr_err_ratelimited("Invalid icmsg negotiate - icframe_major: %u, icmsg_major: %u\n", 258 icframe_major, icmsg_major); 259 goto fw_error; 260 } 261 262 /* 263 * Select the framework version number we will 264 * support. 265 */ 266 267 for (i = 0; i < fw_vercnt; i++) { 268 fw_major = (fw_version[i] >> 16); 269 fw_minor = (fw_version[i] & 0xFFFF); 270 271 for (j = 0; j < negop->icframe_vercnt; j++) { 272 if ((negop->icversion_data[j].major == fw_major) && 273 (negop->icversion_data[j].minor == fw_minor)) { 274 icframe_major = negop->icversion_data[j].major; 275 icframe_minor = negop->icversion_data[j].minor; 276 found_match = true; 277 break; 278 } 279 } 280 281 if (found_match) 282 break; 283 } 284 285 if (!found_match) 286 goto fw_error; 287 288 found_match = false; 289 290 for (i = 0; i < srv_vercnt; i++) { 291 srv_major = (srv_version[i] >> 16); 292 srv_minor = (srv_version[i] & 0xFFFF); 293 294 for (j = negop->icframe_vercnt; 295 (j < negop->icframe_vercnt + negop->icmsg_vercnt); 296 j++) { 297 298 if ((negop->icversion_data[j].major == srv_major) && 299 (negop->icversion_data[j].minor == srv_minor)) { 300 301 icmsg_major = negop->icversion_data[j].major; 302 icmsg_minor = negop->icversion_data[j].minor; 303 found_match = true; 304 break; 305 } 306 } 307 308 if (found_match) 309 break; 310 } 311 312 /* 313 * Respond with the framework and service 314 * version numbers we can support. 315 */ 316 317 fw_error: 318 if (!found_match) { 319 negop->icframe_vercnt = 0; 320 negop->icmsg_vercnt = 0; 321 } else { 322 negop->icframe_vercnt = 1; 323 negop->icmsg_vercnt = 1; 324 } 325 326 if (nego_fw_version) 327 *nego_fw_version = (icframe_major << 16) | icframe_minor; 328 329 if (nego_srv_version) 330 *nego_srv_version = (icmsg_major << 16) | icmsg_minor; 331 332 negop->icversion_data[0].major = icframe_major; 333 negop->icversion_data[0].minor = icframe_minor; 334 negop->icversion_data[1].major = icmsg_major; 335 negop->icversion_data[1].minor = icmsg_minor; 336 return found_match; 337 } 338 EXPORT_SYMBOL_GPL(vmbus_prep_negotiate_resp); 339 340 /* 341 * alloc_channel - Allocate and initialize a vmbus channel object 342 */ 343 static struct vmbus_channel *alloc_channel(void) 344 { 345 struct vmbus_channel *channel; 346 347 channel = kzalloc(sizeof(*channel), GFP_ATOMIC); 348 if (!channel) 349 return NULL; 350 351 spin_lock_init(&channel->sched_lock); 352 init_completion(&channel->rescind_event); 353 354 INIT_LIST_HEAD(&channel->sc_list); 355 356 tasklet_init(&channel->callback_event, 357 vmbus_on_event, (unsigned long)channel); 358 359 hv_ringbuffer_pre_init(channel); 360 361 return channel; 362 } 363 364 /* 365 * free_channel - Release the resources used by the vmbus channel object 366 */ 367 static void free_channel(struct vmbus_channel *channel) 368 { 369 tasklet_kill(&channel->callback_event); 370 vmbus_remove_channel_attr_group(channel); 371 372 kobject_put(&channel->kobj); 373 } 374 375 void vmbus_channel_map_relid(struct vmbus_channel *channel) 376 { 377 if (WARN_ON(channel->offermsg.child_relid >= MAX_CHANNEL_RELIDS)) 378 return; 379 /* 380 * The mapping of the channel's relid is visible from the CPUs that 381 * execute vmbus_chan_sched() by the time that vmbus_chan_sched() will 382 * execute: 383 * 384 * (a) In the "normal (i.e., not resuming from hibernation)" path, 385 * the full barrier in virt_store_mb() guarantees that the store 386 * is propagated to all CPUs before the add_channel_work work 387 * is queued. In turn, add_channel_work is queued before the 388 * channel's ring buffer is allocated/initialized and the 389 * OPENCHANNEL message for the channel is sent in vmbus_open(). 390 * Hyper-V won't start sending the interrupts for the channel 391 * before the OPENCHANNEL message is acked. The memory barrier 392 * in vmbus_chan_sched() -> sync_test_and_clear_bit() ensures 393 * that vmbus_chan_sched() must find the channel's relid in 394 * recv_int_page before retrieving the channel pointer from the 395 * array of channels. 396 * 397 * (b) In the "resuming from hibernation" path, the virt_store_mb() 398 * guarantees that the store is propagated to all CPUs before 399 * the VMBus connection is marked as ready for the resume event 400 * (cf. check_ready_for_resume_event()). The interrupt handler 401 * of the VMBus driver and vmbus_chan_sched() can not run before 402 * vmbus_bus_resume() has completed execution (cf. resume_noirq). 403 */ 404 virt_store_mb( 405 vmbus_connection.channels[channel->offermsg.child_relid], 406 channel); 407 } 408 409 void vmbus_channel_unmap_relid(struct vmbus_channel *channel) 410 { 411 if (WARN_ON(channel->offermsg.child_relid >= MAX_CHANNEL_RELIDS)) 412 return; 413 WRITE_ONCE( 414 vmbus_connection.channels[channel->offermsg.child_relid], 415 NULL); 416 } 417 418 static void vmbus_release_relid(u32 relid) 419 { 420 struct vmbus_channel_relid_released msg; 421 int ret; 422 423 memset(&msg, 0, sizeof(struct vmbus_channel_relid_released)); 424 msg.child_relid = relid; 425 msg.header.msgtype = CHANNELMSG_RELID_RELEASED; 426 ret = vmbus_post_msg(&msg, sizeof(struct vmbus_channel_relid_released), 427 true); 428 429 trace_vmbus_release_relid(&msg, ret); 430 } 431 432 void hv_process_channel_removal(struct vmbus_channel *channel) 433 { 434 lockdep_assert_held(&vmbus_connection.channel_mutex); 435 BUG_ON(!channel->rescind); 436 437 /* 438 * hv_process_channel_removal() could find INVALID_RELID only for 439 * hv_sock channels. See the inline comments in vmbus_onoffer(). 440 */ 441 WARN_ON(channel->offermsg.child_relid == INVALID_RELID && 442 !is_hvsock_channel(channel)); 443 444 /* 445 * Upon suspend, an in-use hv_sock channel is removed from the array of 446 * channels and the relid is invalidated. After hibernation, when the 447 * user-space application destroys the channel, it's unnecessary and 448 * unsafe to remove the channel from the array of channels. See also 449 * the inline comments before the call of vmbus_release_relid() below. 450 */ 451 if (channel->offermsg.child_relid != INVALID_RELID) 452 vmbus_channel_unmap_relid(channel); 453 454 if (channel->primary_channel == NULL) 455 list_del(&channel->listentry); 456 else 457 list_del(&channel->sc_list); 458 459 /* 460 * If this is a "perf" channel, updates the hv_numa_map[] masks so that 461 * init_vp_index() can (re-)use the CPU. 462 */ 463 if (hv_is_perf_channel(channel)) 464 hv_clear_allocated_cpu(channel->target_cpu); 465 466 /* 467 * Upon suspend, an in-use hv_sock channel is marked as "rescinded" and 468 * the relid is invalidated; after hibernation, when the user-space app 469 * destroys the channel, the relid is INVALID_RELID, and in this case 470 * it's unnecessary and unsafe to release the old relid, since the same 471 * relid can refer to a completely different channel now. 472 */ 473 if (channel->offermsg.child_relid != INVALID_RELID) 474 vmbus_release_relid(channel->offermsg.child_relid); 475 476 free_channel(channel); 477 } 478 479 void vmbus_free_channels(void) 480 { 481 struct vmbus_channel *channel, *tmp; 482 483 list_for_each_entry_safe(channel, tmp, &vmbus_connection.chn_list, 484 listentry) { 485 /* hv_process_channel_removal() needs this */ 486 channel->rescind = true; 487 488 vmbus_device_unregister(channel->device_obj); 489 } 490 } 491 492 /* Note: the function can run concurrently for primary/sub channels. */ 493 static void vmbus_add_channel_work(struct work_struct *work) 494 { 495 struct vmbus_channel *newchannel = 496 container_of(work, struct vmbus_channel, add_channel_work); 497 struct vmbus_channel *primary_channel = newchannel->primary_channel; 498 int ret; 499 500 /* 501 * This state is used to indicate a successful open 502 * so that when we do close the channel normally, we 503 * can cleanup properly. 504 */ 505 newchannel->state = CHANNEL_OPEN_STATE; 506 507 if (primary_channel != NULL) { 508 /* newchannel is a sub-channel. */ 509 struct hv_device *dev = primary_channel->device_obj; 510 511 if (vmbus_add_channel_kobj(dev, newchannel)) 512 goto err_deq_chan; 513 514 if (primary_channel->sc_creation_callback != NULL) 515 primary_channel->sc_creation_callback(newchannel); 516 517 newchannel->probe_done = true; 518 return; 519 } 520 521 /* 522 * Start the process of binding the primary channel to the driver 523 */ 524 newchannel->device_obj = vmbus_device_create( 525 &newchannel->offermsg.offer.if_type, 526 &newchannel->offermsg.offer.if_instance, 527 newchannel); 528 if (!newchannel->device_obj) 529 goto err_deq_chan; 530 531 newchannel->device_obj->device_id = newchannel->device_id; 532 /* 533 * Add the new device to the bus. This will kick off device-driver 534 * binding which eventually invokes the device driver's AddDevice() 535 * method. 536 * 537 * If vmbus_device_register() fails, the 'device_obj' is freed in 538 * vmbus_device_release() as called by device_unregister() in the 539 * error path of vmbus_device_register(). In the outside error 540 * path, there's no need to free it. 541 */ 542 ret = vmbus_device_register(newchannel->device_obj); 543 544 if (ret != 0) { 545 pr_err("unable to add child device object (relid %d)\n", 546 newchannel->offermsg.child_relid); 547 goto err_deq_chan; 548 } 549 550 newchannel->probe_done = true; 551 return; 552 553 err_deq_chan: 554 mutex_lock(&vmbus_connection.channel_mutex); 555 556 /* 557 * We need to set the flag, otherwise 558 * vmbus_onoffer_rescind() can be blocked. 559 */ 560 newchannel->probe_done = true; 561 562 if (primary_channel == NULL) 563 list_del(&newchannel->listentry); 564 else 565 list_del(&newchannel->sc_list); 566 567 /* vmbus_process_offer() has mapped the channel. */ 568 vmbus_channel_unmap_relid(newchannel); 569 570 mutex_unlock(&vmbus_connection.channel_mutex); 571 572 vmbus_release_relid(newchannel->offermsg.child_relid); 573 574 free_channel(newchannel); 575 } 576 577 /* 578 * vmbus_process_offer - Process the offer by creating a channel/device 579 * associated with this offer 580 */ 581 static void vmbus_process_offer(struct vmbus_channel *newchannel) 582 { 583 struct vmbus_channel *channel; 584 struct workqueue_struct *wq; 585 bool fnew = true; 586 587 /* 588 * Synchronize vmbus_process_offer() and CPU hotplugging: 589 * 590 * CPU1 CPU2 591 * 592 * [vmbus_process_offer()] [Hot removal of the CPU] 593 * 594 * CPU_READ_LOCK CPUS_WRITE_LOCK 595 * LOAD cpu_online_mask SEARCH chn_list 596 * STORE target_cpu LOAD target_cpu 597 * INSERT chn_list STORE cpu_online_mask 598 * CPUS_READ_UNLOCK CPUS_WRITE_UNLOCK 599 * 600 * Forbids: CPU1's LOAD from *not* seing CPU2's STORE && 601 * CPU2's SEARCH from *not* seeing CPU1's INSERT 602 * 603 * Forbids: CPU2's SEARCH from seeing CPU1's INSERT && 604 * CPU2's LOAD from *not* seing CPU1's STORE 605 */ 606 cpus_read_lock(); 607 608 /* 609 * Serializes the modifications of the chn_list list as well as 610 * the accesses to next_numa_node_id in init_vp_index(). 611 */ 612 mutex_lock(&vmbus_connection.channel_mutex); 613 614 list_for_each_entry(channel, &vmbus_connection.chn_list, listentry) { 615 if (guid_equal(&channel->offermsg.offer.if_type, 616 &newchannel->offermsg.offer.if_type) && 617 guid_equal(&channel->offermsg.offer.if_instance, 618 &newchannel->offermsg.offer.if_instance)) { 619 fnew = false; 620 newchannel->primary_channel = channel; 621 break; 622 } 623 } 624 625 init_vp_index(newchannel); 626 627 /* Remember the channels that should be cleaned up upon suspend. */ 628 if (is_hvsock_channel(newchannel) || is_sub_channel(newchannel)) 629 atomic_inc(&vmbus_connection.nr_chan_close_on_suspend); 630 631 /* 632 * Now that we have acquired the channel_mutex, 633 * we can release the potentially racing rescind thread. 634 */ 635 atomic_dec(&vmbus_connection.offer_in_progress); 636 637 if (fnew) { 638 list_add_tail(&newchannel->listentry, 639 &vmbus_connection.chn_list); 640 } else { 641 /* 642 * Check to see if this is a valid sub-channel. 643 */ 644 if (newchannel->offermsg.offer.sub_channel_index == 0) { 645 mutex_unlock(&vmbus_connection.channel_mutex); 646 cpus_read_unlock(); 647 /* 648 * Don't call free_channel(), because newchannel->kobj 649 * is not initialized yet. 650 */ 651 kfree(newchannel); 652 WARN_ON_ONCE(1); 653 return; 654 } 655 /* 656 * Process the sub-channel. 657 */ 658 list_add_tail(&newchannel->sc_list, &channel->sc_list); 659 } 660 661 vmbus_channel_map_relid(newchannel); 662 663 mutex_unlock(&vmbus_connection.channel_mutex); 664 cpus_read_unlock(); 665 666 /* 667 * vmbus_process_offer() mustn't call channel->sc_creation_callback() 668 * directly for sub-channels, because sc_creation_callback() -> 669 * vmbus_open() may never get the host's response to the 670 * OPEN_CHANNEL message (the host may rescind a channel at any time, 671 * e.g. in the case of hot removing a NIC), and vmbus_onoffer_rescind() 672 * may not wake up the vmbus_open() as it's blocked due to a non-zero 673 * vmbus_connection.offer_in_progress, and finally we have a deadlock. 674 * 675 * The above is also true for primary channels, if the related device 676 * drivers use sync probing mode by default. 677 * 678 * And, usually the handling of primary channels and sub-channels can 679 * depend on each other, so we should offload them to different 680 * workqueues to avoid possible deadlock, e.g. in sync-probing mode, 681 * NIC1's netvsc_subchan_work() can race with NIC2's netvsc_probe() -> 682 * rtnl_lock(), and causes deadlock: the former gets the rtnl_lock 683 * and waits for all the sub-channels to appear, but the latter 684 * can't get the rtnl_lock and this blocks the handling of 685 * sub-channels. 686 */ 687 INIT_WORK(&newchannel->add_channel_work, vmbus_add_channel_work); 688 wq = fnew ? vmbus_connection.handle_primary_chan_wq : 689 vmbus_connection.handle_sub_chan_wq; 690 queue_work(wq, &newchannel->add_channel_work); 691 } 692 693 /* 694 * Check if CPUs used by other channels of the same device. 695 * It should only be called by init_vp_index(). 696 */ 697 static bool hv_cpuself_used(u32 cpu, struct vmbus_channel *chn) 698 { 699 struct vmbus_channel *primary = chn->primary_channel; 700 struct vmbus_channel *sc; 701 702 lockdep_assert_held(&vmbus_connection.channel_mutex); 703 704 if (!primary) 705 return false; 706 707 if (primary->target_cpu == cpu) 708 return true; 709 710 list_for_each_entry(sc, &primary->sc_list, sc_list) 711 if (sc != chn && sc->target_cpu == cpu) 712 return true; 713 714 return false; 715 } 716 717 /* 718 * We use this state to statically distribute the channel interrupt load. 719 */ 720 static int next_numa_node_id; 721 722 /* 723 * We can statically distribute the incoming channel interrupt load 724 * by binding a channel to VCPU. 725 * 726 * For non-performance critical channels we assign the VMBUS_CONNECT_CPU. 727 * Performance critical channels will be distributed evenly among all 728 * the available NUMA nodes. Once the node is assigned, we will assign 729 * the CPU based on a simple round robin scheme. 730 */ 731 static void init_vp_index(struct vmbus_channel *channel) 732 { 733 bool perf_chn = hv_is_perf_channel(channel); 734 u32 i, ncpu = num_online_cpus(); 735 cpumask_var_t available_mask; 736 struct cpumask *allocated_mask; 737 const struct cpumask *hk_mask = housekeeping_cpumask(HK_TYPE_MANAGED_IRQ); 738 u32 target_cpu; 739 int numa_node; 740 741 if (!perf_chn || 742 !alloc_cpumask_var(&available_mask, GFP_KERNEL) || 743 cpumask_empty(hk_mask)) { 744 /* 745 * If the channel is not a performance critical 746 * channel, bind it to VMBUS_CONNECT_CPU. 747 * In case alloc_cpumask_var() fails, bind it to 748 * VMBUS_CONNECT_CPU. 749 * If all the cpus are isolated, bind it to 750 * VMBUS_CONNECT_CPU. 751 */ 752 channel->target_cpu = VMBUS_CONNECT_CPU; 753 if (perf_chn) 754 hv_set_allocated_cpu(VMBUS_CONNECT_CPU); 755 return; 756 } 757 758 for (i = 1; i <= ncpu + 1; i++) { 759 while (true) { 760 numa_node = next_numa_node_id++; 761 if (numa_node == nr_node_ids) { 762 next_numa_node_id = 0; 763 continue; 764 } 765 if (cpumask_empty(cpumask_of_node(numa_node))) 766 continue; 767 break; 768 } 769 allocated_mask = &hv_context.hv_numa_map[numa_node]; 770 771 retry: 772 cpumask_xor(available_mask, allocated_mask, cpumask_of_node(numa_node)); 773 cpumask_and(available_mask, available_mask, hk_mask); 774 775 if (cpumask_empty(available_mask)) { 776 /* 777 * We have cycled through all the CPUs in the node; 778 * reset the allocated map. 779 */ 780 cpumask_clear(allocated_mask); 781 goto retry; 782 } 783 784 target_cpu = cpumask_first(available_mask); 785 cpumask_set_cpu(target_cpu, allocated_mask); 786 787 if (channel->offermsg.offer.sub_channel_index >= ncpu || 788 i > ncpu || !hv_cpuself_used(target_cpu, channel)) 789 break; 790 } 791 792 channel->target_cpu = target_cpu; 793 794 free_cpumask_var(available_mask); 795 } 796 797 #define UNLOAD_DELAY_UNIT_MS 10 /* 10 milliseconds */ 798 #define UNLOAD_WAIT_MS (100*1000) /* 100 seconds */ 799 #define UNLOAD_WAIT_LOOPS (UNLOAD_WAIT_MS/UNLOAD_DELAY_UNIT_MS) 800 #define UNLOAD_MSG_MS (5*1000) /* Every 5 seconds */ 801 #define UNLOAD_MSG_LOOPS (UNLOAD_MSG_MS/UNLOAD_DELAY_UNIT_MS) 802 803 static void vmbus_wait_for_unload(void) 804 { 805 int cpu; 806 void *page_addr; 807 struct hv_message *msg; 808 struct vmbus_channel_message_header *hdr; 809 u32 message_type, i; 810 811 /* 812 * CHANNELMSG_UNLOAD_RESPONSE is always delivered to the CPU which was 813 * used for initial contact or to CPU0 depending on host version. When 814 * we're crashing on a different CPU let's hope that IRQ handler on 815 * the cpu which receives CHANNELMSG_UNLOAD_RESPONSE is still 816 * functional and vmbus_unload_response() will complete 817 * vmbus_connection.unload_event. If not, the last thing we can do is 818 * read message pages for all CPUs directly. 819 * 820 * Wait up to 100 seconds since an Azure host must writeback any dirty 821 * data in its disk cache before the VMbus UNLOAD request will 822 * complete. This flushing has been empirically observed to take up 823 * to 50 seconds in cases with a lot of dirty data, so allow additional 824 * leeway and for inaccuracies in mdelay(). But eventually time out so 825 * that the panic path can't get hung forever in case the response 826 * message isn't seen. 827 */ 828 for (i = 1; i <= UNLOAD_WAIT_LOOPS; i++) { 829 if (completion_done(&vmbus_connection.unload_event)) 830 goto completed; 831 832 for_each_present_cpu(cpu) { 833 struct hv_per_cpu_context *hv_cpu 834 = per_cpu_ptr(hv_context.cpu_context, cpu); 835 836 /* 837 * In a CoCo VM the synic_message_page is not allocated 838 * in hv_synic_alloc(). Instead it is set/cleared in 839 * hv_synic_enable_regs() and hv_synic_disable_regs() 840 * such that it is set only when the CPU is online. If 841 * not all present CPUs are online, the message page 842 * might be NULL, so skip such CPUs. 843 */ 844 page_addr = hv_cpu->synic_message_page; 845 if (!page_addr) 846 continue; 847 848 msg = (struct hv_message *)page_addr 849 + VMBUS_MESSAGE_SINT; 850 851 message_type = READ_ONCE(msg->header.message_type); 852 if (message_type == HVMSG_NONE) 853 continue; 854 855 hdr = (struct vmbus_channel_message_header *) 856 msg->u.payload; 857 858 if (hdr->msgtype == CHANNELMSG_UNLOAD_RESPONSE) 859 complete(&vmbus_connection.unload_event); 860 861 vmbus_signal_eom(msg, message_type); 862 } 863 864 /* 865 * Give a notice periodically so someone watching the 866 * serial output won't think it is completely hung. 867 */ 868 if (!(i % UNLOAD_MSG_LOOPS)) 869 pr_notice("Waiting for VMBus UNLOAD to complete\n"); 870 871 mdelay(UNLOAD_DELAY_UNIT_MS); 872 } 873 pr_err("Continuing even though VMBus UNLOAD did not complete\n"); 874 875 completed: 876 /* 877 * We're crashing and already got the UNLOAD_RESPONSE, cleanup all 878 * maybe-pending messages on all CPUs to be able to receive new 879 * messages after we reconnect. 880 */ 881 for_each_present_cpu(cpu) { 882 struct hv_per_cpu_context *hv_cpu 883 = per_cpu_ptr(hv_context.cpu_context, cpu); 884 885 page_addr = hv_cpu->synic_message_page; 886 if (!page_addr) 887 continue; 888 889 msg = (struct hv_message *)page_addr + VMBUS_MESSAGE_SINT; 890 msg->header.message_type = HVMSG_NONE; 891 } 892 } 893 894 /* 895 * vmbus_unload_response - Handler for the unload response. 896 */ 897 static void vmbus_unload_response(struct vmbus_channel_message_header *hdr) 898 { 899 /* 900 * This is a global event; just wakeup the waiting thread. 901 * Once we successfully unload, we can cleanup the monitor state. 902 * 903 * NB. A malicious or compromised Hyper-V could send a spurious 904 * message of type CHANNELMSG_UNLOAD_RESPONSE, and trigger a call 905 * of the complete() below. Make sure that unload_event has been 906 * initialized by the time this complete() is executed. 907 */ 908 complete(&vmbus_connection.unload_event); 909 } 910 911 void vmbus_initiate_unload(bool crash) 912 { 913 struct vmbus_channel_message_header hdr; 914 915 if (xchg(&vmbus_connection.conn_state, DISCONNECTED) == DISCONNECTED) 916 return; 917 918 /* Pre-Win2012R2 hosts don't support reconnect */ 919 if (vmbus_proto_version < VERSION_WIN8_1) 920 return; 921 922 reinit_completion(&vmbus_connection.unload_event); 923 memset(&hdr, 0, sizeof(struct vmbus_channel_message_header)); 924 hdr.msgtype = CHANNELMSG_UNLOAD; 925 vmbus_post_msg(&hdr, sizeof(struct vmbus_channel_message_header), 926 !crash); 927 928 /* 929 * vmbus_initiate_unload() is also called on crash and the crash can be 930 * happening in an interrupt context, where scheduling is impossible. 931 */ 932 if (!crash) 933 wait_for_completion(&vmbus_connection.unload_event); 934 else 935 vmbus_wait_for_unload(); 936 } 937 938 static void check_ready_for_resume_event(void) 939 { 940 /* 941 * If all the old primary channels have been fixed up, then it's safe 942 * to resume. 943 */ 944 if (atomic_dec_and_test(&vmbus_connection.nr_chan_fixup_on_resume)) 945 complete(&vmbus_connection.ready_for_resume_event); 946 } 947 948 static void vmbus_setup_channel_state(struct vmbus_channel *channel, 949 struct vmbus_channel_offer_channel *offer) 950 { 951 /* 952 * Setup state for signalling the host. 953 */ 954 channel->sig_event = VMBUS_EVENT_CONNECTION_ID; 955 956 channel->is_dedicated_interrupt = 957 (offer->is_dedicated_interrupt != 0); 958 channel->sig_event = offer->connection_id; 959 960 memcpy(&channel->offermsg, offer, 961 sizeof(struct vmbus_channel_offer_channel)); 962 channel->monitor_grp = (u8)offer->monitorid / 32; 963 channel->monitor_bit = (u8)offer->monitorid % 32; 964 channel->device_id = hv_get_dev_type(channel); 965 } 966 967 /* 968 * find_primary_channel_by_offer - Get the channel object given the new offer. 969 * This is only used in the resume path of hibernation. 970 */ 971 static struct vmbus_channel * 972 find_primary_channel_by_offer(const struct vmbus_channel_offer_channel *offer) 973 { 974 struct vmbus_channel *channel = NULL, *iter; 975 const guid_t *inst1, *inst2; 976 977 /* Ignore sub-channel offers. */ 978 if (offer->offer.sub_channel_index != 0) 979 return NULL; 980 981 mutex_lock(&vmbus_connection.channel_mutex); 982 983 list_for_each_entry(iter, &vmbus_connection.chn_list, listentry) { 984 inst1 = &iter->offermsg.offer.if_instance; 985 inst2 = &offer->offer.if_instance; 986 987 if (guid_equal(inst1, inst2)) { 988 channel = iter; 989 break; 990 } 991 } 992 993 mutex_unlock(&vmbus_connection.channel_mutex); 994 995 return channel; 996 } 997 998 static bool vmbus_is_valid_offer(const struct vmbus_channel_offer_channel *offer) 999 { 1000 const guid_t *guid = &offer->offer.if_type; 1001 u16 i; 1002 1003 if (!hv_is_isolation_supported()) 1004 return true; 1005 1006 if (is_hvsock_offer(offer)) 1007 return true; 1008 1009 for (i = 0; i < ARRAY_SIZE(vmbus_devs); i++) { 1010 if (guid_equal(guid, &vmbus_devs[i].guid)) 1011 return vmbus_devs[i].allowed_in_isolated; 1012 } 1013 return false; 1014 } 1015 1016 /* 1017 * vmbus_onoffer - Handler for channel offers from vmbus in parent partition. 1018 * 1019 */ 1020 static void vmbus_onoffer(struct vmbus_channel_message_header *hdr) 1021 { 1022 struct vmbus_channel_offer_channel *offer; 1023 struct vmbus_channel *oldchannel, *newchannel; 1024 size_t offer_sz; 1025 1026 offer = (struct vmbus_channel_offer_channel *)hdr; 1027 1028 trace_vmbus_onoffer(offer); 1029 1030 if (!vmbus_is_valid_offer(offer)) { 1031 pr_err_ratelimited("Invalid offer %d from the host supporting isolation\n", 1032 offer->child_relid); 1033 atomic_dec(&vmbus_connection.offer_in_progress); 1034 return; 1035 } 1036 1037 oldchannel = find_primary_channel_by_offer(offer); 1038 1039 if (oldchannel != NULL) { 1040 /* 1041 * We're resuming from hibernation: all the sub-channel and 1042 * hv_sock channels we had before the hibernation should have 1043 * been cleaned up, and now we must be seeing a re-offered 1044 * primary channel that we had before the hibernation. 1045 */ 1046 1047 /* 1048 * { Initially: channel relid = INVALID_RELID, 1049 * channels[valid_relid] = NULL } 1050 * 1051 * CPU1 CPU2 1052 * 1053 * [vmbus_onoffer()] [vmbus_device_release()] 1054 * 1055 * LOCK channel_mutex LOCK channel_mutex 1056 * STORE channel relid = valid_relid LOAD r1 = channel relid 1057 * MAP_RELID channel if (r1 != INVALID_RELID) 1058 * UNLOCK channel_mutex UNMAP_RELID channel 1059 * UNLOCK channel_mutex 1060 * 1061 * Forbids: r1 == valid_relid && 1062 * channels[valid_relid] == channel 1063 * 1064 * Note. r1 can be INVALID_RELID only for an hv_sock channel. 1065 * None of the hv_sock channels which were present before the 1066 * suspend are re-offered upon the resume. See the WARN_ON() 1067 * in hv_process_channel_removal(). 1068 */ 1069 mutex_lock(&vmbus_connection.channel_mutex); 1070 1071 atomic_dec(&vmbus_connection.offer_in_progress); 1072 1073 WARN_ON(oldchannel->offermsg.child_relid != INVALID_RELID); 1074 /* Fix up the relid. */ 1075 oldchannel->offermsg.child_relid = offer->child_relid; 1076 1077 offer_sz = sizeof(*offer); 1078 if (memcmp(offer, &oldchannel->offermsg, offer_sz) != 0) { 1079 /* 1080 * This is not an error, since the host can also change 1081 * the other field(s) of the offer, e.g. on WS RS5 1082 * (Build 17763), the offer->connection_id of the 1083 * Mellanox VF vmbus device can change when the host 1084 * reoffers the device upon resume. 1085 */ 1086 pr_debug("vmbus offer changed: relid=%d\n", 1087 offer->child_relid); 1088 1089 print_hex_dump_debug("Old vmbus offer: ", 1090 DUMP_PREFIX_OFFSET, 16, 4, 1091 &oldchannel->offermsg, offer_sz, 1092 false); 1093 print_hex_dump_debug("New vmbus offer: ", 1094 DUMP_PREFIX_OFFSET, 16, 4, 1095 offer, offer_sz, false); 1096 1097 /* Fix up the old channel. */ 1098 vmbus_setup_channel_state(oldchannel, offer); 1099 } 1100 1101 /* Add the channel back to the array of channels. */ 1102 vmbus_channel_map_relid(oldchannel); 1103 check_ready_for_resume_event(); 1104 1105 mutex_unlock(&vmbus_connection.channel_mutex); 1106 return; 1107 } 1108 1109 /* Allocate the channel object and save this offer. */ 1110 newchannel = alloc_channel(); 1111 if (!newchannel) { 1112 vmbus_release_relid(offer->child_relid); 1113 atomic_dec(&vmbus_connection.offer_in_progress); 1114 pr_err("Unable to allocate channel object\n"); 1115 return; 1116 } 1117 1118 vmbus_setup_channel_state(newchannel, offer); 1119 1120 vmbus_process_offer(newchannel); 1121 } 1122 1123 static void check_ready_for_suspend_event(void) 1124 { 1125 /* 1126 * If all the sub-channels or hv_sock channels have been cleaned up, 1127 * then it's safe to suspend. 1128 */ 1129 if (atomic_dec_and_test(&vmbus_connection.nr_chan_close_on_suspend)) 1130 complete(&vmbus_connection.ready_for_suspend_event); 1131 } 1132 1133 /* 1134 * vmbus_onoffer_rescind - Rescind offer handler. 1135 * 1136 * We queue a work item to process this offer synchronously 1137 */ 1138 static void vmbus_onoffer_rescind(struct vmbus_channel_message_header *hdr) 1139 { 1140 struct vmbus_channel_rescind_offer *rescind; 1141 struct vmbus_channel *channel; 1142 struct device *dev; 1143 bool clean_up_chan_for_suspend; 1144 1145 rescind = (struct vmbus_channel_rescind_offer *)hdr; 1146 1147 trace_vmbus_onoffer_rescind(rescind); 1148 1149 /* 1150 * The offer msg and the corresponding rescind msg 1151 * from the host are guranteed to be ordered - 1152 * offer comes in first and then the rescind. 1153 * Since we process these events in work elements, 1154 * and with preemption, we may end up processing 1155 * the events out of order. We rely on the synchronization 1156 * provided by offer_in_progress and by channel_mutex for 1157 * ordering these events: 1158 * 1159 * { Initially: offer_in_progress = 1 } 1160 * 1161 * CPU1 CPU2 1162 * 1163 * [vmbus_onoffer()] [vmbus_onoffer_rescind()] 1164 * 1165 * LOCK channel_mutex WAIT_ON offer_in_progress == 0 1166 * DECREMENT offer_in_progress LOCK channel_mutex 1167 * STORE channels[] LOAD channels[] 1168 * UNLOCK channel_mutex UNLOCK channel_mutex 1169 * 1170 * Forbids: CPU2's LOAD from *not* seeing CPU1's STORE 1171 */ 1172 1173 while (atomic_read(&vmbus_connection.offer_in_progress) != 0) { 1174 /* 1175 * We wait here until any channel offer is currently 1176 * being processed. 1177 */ 1178 msleep(1); 1179 } 1180 1181 mutex_lock(&vmbus_connection.channel_mutex); 1182 channel = relid2channel(rescind->child_relid); 1183 if (channel != NULL) { 1184 /* 1185 * Guarantee that no other instance of vmbus_onoffer_rescind() 1186 * has got a reference to the channel object. Synchronize on 1187 * &vmbus_connection.channel_mutex. 1188 */ 1189 if (channel->rescind_ref) { 1190 mutex_unlock(&vmbus_connection.channel_mutex); 1191 return; 1192 } 1193 channel->rescind_ref = true; 1194 } 1195 mutex_unlock(&vmbus_connection.channel_mutex); 1196 1197 if (channel == NULL) { 1198 /* 1199 * We failed in processing the offer message; 1200 * we would have cleaned up the relid in that 1201 * failure path. 1202 */ 1203 return; 1204 } 1205 1206 clean_up_chan_for_suspend = is_hvsock_channel(channel) || 1207 is_sub_channel(channel); 1208 /* 1209 * Before setting channel->rescind in vmbus_rescind_cleanup(), we 1210 * should make sure the channel callback is not running any more. 1211 */ 1212 vmbus_reset_channel_cb(channel); 1213 1214 /* 1215 * Now wait for offer handling to complete. 1216 */ 1217 vmbus_rescind_cleanup(channel); 1218 while (READ_ONCE(channel->probe_done) == false) { 1219 /* 1220 * We wait here until any channel offer is currently 1221 * being processed. 1222 */ 1223 msleep(1); 1224 } 1225 1226 /* 1227 * At this point, the rescind handling can proceed safely. 1228 */ 1229 1230 if (channel->device_obj) { 1231 if (channel->chn_rescind_callback) { 1232 channel->chn_rescind_callback(channel); 1233 1234 if (clean_up_chan_for_suspend) 1235 check_ready_for_suspend_event(); 1236 1237 return; 1238 } 1239 /* 1240 * We will have to unregister this device from the 1241 * driver core. 1242 */ 1243 dev = get_device(&channel->device_obj->device); 1244 if (dev) { 1245 vmbus_device_unregister(channel->device_obj); 1246 put_device(dev); 1247 } 1248 } else if (channel->primary_channel != NULL) { 1249 /* 1250 * Sub-channel is being rescinded. Following is the channel 1251 * close sequence when initiated from the driveri (refer to 1252 * vmbus_close() for details): 1253 * 1. Close all sub-channels first 1254 * 2. Then close the primary channel. 1255 */ 1256 mutex_lock(&vmbus_connection.channel_mutex); 1257 if (channel->state == CHANNEL_OPEN_STATE) { 1258 /* 1259 * The channel is currently not open; 1260 * it is safe for us to cleanup the channel. 1261 */ 1262 hv_process_channel_removal(channel); 1263 } else { 1264 complete(&channel->rescind_event); 1265 } 1266 mutex_unlock(&vmbus_connection.channel_mutex); 1267 } 1268 1269 /* The "channel" may have been freed. Do not access it any longer. */ 1270 1271 if (clean_up_chan_for_suspend) 1272 check_ready_for_suspend_event(); 1273 } 1274 1275 void vmbus_hvsock_device_unregister(struct vmbus_channel *channel) 1276 { 1277 BUG_ON(!is_hvsock_channel(channel)); 1278 1279 /* We always get a rescind msg when a connection is closed. */ 1280 while (!READ_ONCE(channel->probe_done) || !READ_ONCE(channel->rescind)) 1281 msleep(1); 1282 1283 vmbus_device_unregister(channel->device_obj); 1284 } 1285 EXPORT_SYMBOL_GPL(vmbus_hvsock_device_unregister); 1286 1287 1288 /* 1289 * vmbus_onoffers_delivered - 1290 * This is invoked when all offers have been delivered. 1291 * 1292 * Nothing to do here. 1293 */ 1294 static void vmbus_onoffers_delivered( 1295 struct vmbus_channel_message_header *hdr) 1296 { 1297 } 1298 1299 /* 1300 * vmbus_onopen_result - Open result handler. 1301 * 1302 * This is invoked when we received a response to our channel open request. 1303 * Find the matching request, copy the response and signal the requesting 1304 * thread. 1305 */ 1306 static void vmbus_onopen_result(struct vmbus_channel_message_header *hdr) 1307 { 1308 struct vmbus_channel_open_result *result; 1309 struct vmbus_channel_msginfo *msginfo; 1310 struct vmbus_channel_message_header *requestheader; 1311 struct vmbus_channel_open_channel *openmsg; 1312 unsigned long flags; 1313 1314 result = (struct vmbus_channel_open_result *)hdr; 1315 1316 trace_vmbus_onopen_result(result); 1317 1318 /* 1319 * Find the open msg, copy the result and signal/unblock the wait event 1320 */ 1321 spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags); 1322 1323 list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list, 1324 msglistentry) { 1325 requestheader = 1326 (struct vmbus_channel_message_header *)msginfo->msg; 1327 1328 if (requestheader->msgtype == CHANNELMSG_OPENCHANNEL) { 1329 openmsg = 1330 (struct vmbus_channel_open_channel *)msginfo->msg; 1331 if (openmsg->child_relid == result->child_relid && 1332 openmsg->openid == result->openid) { 1333 memcpy(&msginfo->response.open_result, 1334 result, 1335 sizeof( 1336 struct vmbus_channel_open_result)); 1337 complete(&msginfo->waitevent); 1338 break; 1339 } 1340 } 1341 } 1342 spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags); 1343 } 1344 1345 /* 1346 * vmbus_ongpadl_created - GPADL created handler. 1347 * 1348 * This is invoked when we received a response to our gpadl create request. 1349 * Find the matching request, copy the response and signal the requesting 1350 * thread. 1351 */ 1352 static void vmbus_ongpadl_created(struct vmbus_channel_message_header *hdr) 1353 { 1354 struct vmbus_channel_gpadl_created *gpadlcreated; 1355 struct vmbus_channel_msginfo *msginfo; 1356 struct vmbus_channel_message_header *requestheader; 1357 struct vmbus_channel_gpadl_header *gpadlheader; 1358 unsigned long flags; 1359 1360 gpadlcreated = (struct vmbus_channel_gpadl_created *)hdr; 1361 1362 trace_vmbus_ongpadl_created(gpadlcreated); 1363 1364 /* 1365 * Find the establish msg, copy the result and signal/unblock the wait 1366 * event 1367 */ 1368 spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags); 1369 1370 list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list, 1371 msglistentry) { 1372 requestheader = 1373 (struct vmbus_channel_message_header *)msginfo->msg; 1374 1375 if (requestheader->msgtype == CHANNELMSG_GPADL_HEADER) { 1376 gpadlheader = 1377 (struct vmbus_channel_gpadl_header *)requestheader; 1378 1379 if ((gpadlcreated->child_relid == 1380 gpadlheader->child_relid) && 1381 (gpadlcreated->gpadl == gpadlheader->gpadl)) { 1382 memcpy(&msginfo->response.gpadl_created, 1383 gpadlcreated, 1384 sizeof( 1385 struct vmbus_channel_gpadl_created)); 1386 complete(&msginfo->waitevent); 1387 break; 1388 } 1389 } 1390 } 1391 spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags); 1392 } 1393 1394 /* 1395 * vmbus_onmodifychannel_response - Modify Channel response handler. 1396 * 1397 * This is invoked when we received a response to our channel modify request. 1398 * Find the matching request, copy the response and signal the requesting thread. 1399 */ 1400 static void vmbus_onmodifychannel_response(struct vmbus_channel_message_header *hdr) 1401 { 1402 struct vmbus_channel_modifychannel_response *response; 1403 struct vmbus_channel_msginfo *msginfo; 1404 unsigned long flags; 1405 1406 response = (struct vmbus_channel_modifychannel_response *)hdr; 1407 1408 trace_vmbus_onmodifychannel_response(response); 1409 1410 /* 1411 * Find the modify msg, copy the response and signal/unblock the wait event. 1412 */ 1413 spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags); 1414 1415 list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list, msglistentry) { 1416 struct vmbus_channel_message_header *responseheader = 1417 (struct vmbus_channel_message_header *)msginfo->msg; 1418 1419 if (responseheader->msgtype == CHANNELMSG_MODIFYCHANNEL) { 1420 struct vmbus_channel_modifychannel *modifymsg; 1421 1422 modifymsg = (struct vmbus_channel_modifychannel *)msginfo->msg; 1423 if (modifymsg->child_relid == response->child_relid) { 1424 memcpy(&msginfo->response.modify_response, response, 1425 sizeof(*response)); 1426 complete(&msginfo->waitevent); 1427 break; 1428 } 1429 } 1430 } 1431 spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags); 1432 } 1433 1434 /* 1435 * vmbus_ongpadl_torndown - GPADL torndown handler. 1436 * 1437 * This is invoked when we received a response to our gpadl teardown request. 1438 * Find the matching request, copy the response and signal the requesting 1439 * thread. 1440 */ 1441 static void vmbus_ongpadl_torndown( 1442 struct vmbus_channel_message_header *hdr) 1443 { 1444 struct vmbus_channel_gpadl_torndown *gpadl_torndown; 1445 struct vmbus_channel_msginfo *msginfo; 1446 struct vmbus_channel_message_header *requestheader; 1447 struct vmbus_channel_gpadl_teardown *gpadl_teardown; 1448 unsigned long flags; 1449 1450 gpadl_torndown = (struct vmbus_channel_gpadl_torndown *)hdr; 1451 1452 trace_vmbus_ongpadl_torndown(gpadl_torndown); 1453 1454 /* 1455 * Find the open msg, copy the result and signal/unblock the wait event 1456 */ 1457 spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags); 1458 1459 list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list, 1460 msglistentry) { 1461 requestheader = 1462 (struct vmbus_channel_message_header *)msginfo->msg; 1463 1464 if (requestheader->msgtype == CHANNELMSG_GPADL_TEARDOWN) { 1465 gpadl_teardown = 1466 (struct vmbus_channel_gpadl_teardown *)requestheader; 1467 1468 if (gpadl_torndown->gpadl == gpadl_teardown->gpadl) { 1469 memcpy(&msginfo->response.gpadl_torndown, 1470 gpadl_torndown, 1471 sizeof( 1472 struct vmbus_channel_gpadl_torndown)); 1473 complete(&msginfo->waitevent); 1474 break; 1475 } 1476 } 1477 } 1478 spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags); 1479 } 1480 1481 /* 1482 * vmbus_onversion_response - Version response handler 1483 * 1484 * This is invoked when we received a response to our initiate contact request. 1485 * Find the matching request, copy the response and signal the requesting 1486 * thread. 1487 */ 1488 static void vmbus_onversion_response( 1489 struct vmbus_channel_message_header *hdr) 1490 { 1491 struct vmbus_channel_msginfo *msginfo; 1492 struct vmbus_channel_message_header *requestheader; 1493 struct vmbus_channel_version_response *version_response; 1494 unsigned long flags; 1495 1496 version_response = (struct vmbus_channel_version_response *)hdr; 1497 1498 trace_vmbus_onversion_response(version_response); 1499 1500 spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags); 1501 1502 list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list, 1503 msglistentry) { 1504 requestheader = 1505 (struct vmbus_channel_message_header *)msginfo->msg; 1506 1507 if (requestheader->msgtype == 1508 CHANNELMSG_INITIATE_CONTACT) { 1509 memcpy(&msginfo->response.version_response, 1510 version_response, 1511 sizeof(struct vmbus_channel_version_response)); 1512 complete(&msginfo->waitevent); 1513 } 1514 } 1515 spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags); 1516 } 1517 1518 /* Channel message dispatch table */ 1519 const struct vmbus_channel_message_table_entry 1520 channel_message_table[CHANNELMSG_COUNT] = { 1521 { CHANNELMSG_INVALID, 0, NULL, 0}, 1522 { CHANNELMSG_OFFERCHANNEL, 0, vmbus_onoffer, 1523 sizeof(struct vmbus_channel_offer_channel)}, 1524 { CHANNELMSG_RESCIND_CHANNELOFFER, 0, vmbus_onoffer_rescind, 1525 sizeof(struct vmbus_channel_rescind_offer) }, 1526 { CHANNELMSG_REQUESTOFFERS, 0, NULL, 0}, 1527 { CHANNELMSG_ALLOFFERS_DELIVERED, 1, vmbus_onoffers_delivered, 0}, 1528 { CHANNELMSG_OPENCHANNEL, 0, NULL, 0}, 1529 { CHANNELMSG_OPENCHANNEL_RESULT, 1, vmbus_onopen_result, 1530 sizeof(struct vmbus_channel_open_result)}, 1531 { CHANNELMSG_CLOSECHANNEL, 0, NULL, 0}, 1532 { CHANNELMSG_GPADL_HEADER, 0, NULL, 0}, 1533 { CHANNELMSG_GPADL_BODY, 0, NULL, 0}, 1534 { CHANNELMSG_GPADL_CREATED, 1, vmbus_ongpadl_created, 1535 sizeof(struct vmbus_channel_gpadl_created)}, 1536 { CHANNELMSG_GPADL_TEARDOWN, 0, NULL, 0}, 1537 { CHANNELMSG_GPADL_TORNDOWN, 1, vmbus_ongpadl_torndown, 1538 sizeof(struct vmbus_channel_gpadl_torndown) }, 1539 { CHANNELMSG_RELID_RELEASED, 0, NULL, 0}, 1540 { CHANNELMSG_INITIATE_CONTACT, 0, NULL, 0}, 1541 { CHANNELMSG_VERSION_RESPONSE, 1, vmbus_onversion_response, 1542 sizeof(struct vmbus_channel_version_response)}, 1543 { CHANNELMSG_UNLOAD, 0, NULL, 0}, 1544 { CHANNELMSG_UNLOAD_RESPONSE, 1, vmbus_unload_response, 0}, 1545 { CHANNELMSG_18, 0, NULL, 0}, 1546 { CHANNELMSG_19, 0, NULL, 0}, 1547 { CHANNELMSG_20, 0, NULL, 0}, 1548 { CHANNELMSG_TL_CONNECT_REQUEST, 0, NULL, 0}, 1549 { CHANNELMSG_MODIFYCHANNEL, 0, NULL, 0}, 1550 { CHANNELMSG_TL_CONNECT_RESULT, 0, NULL, 0}, 1551 { CHANNELMSG_MODIFYCHANNEL_RESPONSE, 1, vmbus_onmodifychannel_response, 1552 sizeof(struct vmbus_channel_modifychannel_response)}, 1553 }; 1554 1555 /* 1556 * vmbus_onmessage - Handler for channel protocol messages. 1557 * 1558 * This is invoked in the vmbus worker thread context. 1559 */ 1560 void vmbus_onmessage(struct vmbus_channel_message_header *hdr) 1561 { 1562 trace_vmbus_on_message(hdr); 1563 1564 /* 1565 * vmbus_on_msg_dpc() makes sure the hdr->msgtype here can not go 1566 * out of bound and the message_handler pointer can not be NULL. 1567 */ 1568 channel_message_table[hdr->msgtype].message_handler(hdr); 1569 } 1570 1571 /* 1572 * vmbus_request_offers - Send a request to get all our pending offers. 1573 */ 1574 int vmbus_request_offers(void) 1575 { 1576 struct vmbus_channel_message_header *msg; 1577 struct vmbus_channel_msginfo *msginfo; 1578 int ret; 1579 1580 msginfo = kzalloc(sizeof(*msginfo) + 1581 sizeof(struct vmbus_channel_message_header), 1582 GFP_KERNEL); 1583 if (!msginfo) 1584 return -ENOMEM; 1585 1586 msg = (struct vmbus_channel_message_header *)msginfo->msg; 1587 1588 msg->msgtype = CHANNELMSG_REQUESTOFFERS; 1589 1590 ret = vmbus_post_msg(msg, sizeof(struct vmbus_channel_message_header), 1591 true); 1592 1593 trace_vmbus_request_offers(ret); 1594 1595 if (ret != 0) { 1596 pr_err("Unable to request offers - %d\n", ret); 1597 1598 goto cleanup; 1599 } 1600 1601 cleanup: 1602 kfree(msginfo); 1603 1604 return ret; 1605 } 1606 1607 void vmbus_set_sc_create_callback(struct vmbus_channel *primary_channel, 1608 void (*sc_cr_cb)(struct vmbus_channel *new_sc)) 1609 { 1610 primary_channel->sc_creation_callback = sc_cr_cb; 1611 } 1612 EXPORT_SYMBOL_GPL(vmbus_set_sc_create_callback); 1613 1614 void vmbus_set_chn_rescind_callback(struct vmbus_channel *channel, 1615 void (*chn_rescind_cb)(struct vmbus_channel *)) 1616 { 1617 channel->chn_rescind_callback = chn_rescind_cb; 1618 } 1619 EXPORT_SYMBOL_GPL(vmbus_set_chn_rescind_callback); 1620