xref: /openbmc/linux/drivers/hv/channel_mgmt.c (revision a5d46d9a)
1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3  * Copyright (c) 2009, Microsoft Corporation.
4  *
5  * Authors:
6  *   Haiyang Zhang <haiyangz@microsoft.com>
7  *   Hank Janssen  <hjanssen@microsoft.com>
8  */
9 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
10 
11 #include <linux/kernel.h>
12 #include <linux/interrupt.h>
13 #include <linux/sched.h>
14 #include <linux/wait.h>
15 #include <linux/mm.h>
16 #include <linux/slab.h>
17 #include <linux/list.h>
18 #include <linux/module.h>
19 #include <linux/completion.h>
20 #include <linux/delay.h>
21 #include <linux/cpu.h>
22 #include <linux/hyperv.h>
23 #include <asm/mshyperv.h>
24 
25 #include "hyperv_vmbus.h"
26 
27 static void init_vp_index(struct vmbus_channel *channel);
28 
29 const struct vmbus_device vmbus_devs[] = {
30 	/* IDE */
31 	{ .dev_type = HV_IDE,
32 	  HV_IDE_GUID,
33 	  .perf_device = true,
34 	  .allowed_in_isolated = false,
35 	},
36 
37 	/* SCSI */
38 	{ .dev_type = HV_SCSI,
39 	  HV_SCSI_GUID,
40 	  .perf_device = true,
41 	  .allowed_in_isolated = true,
42 	},
43 
44 	/* Fibre Channel */
45 	{ .dev_type = HV_FC,
46 	  HV_SYNTHFC_GUID,
47 	  .perf_device = true,
48 	  .allowed_in_isolated = false,
49 	},
50 
51 	/* Synthetic NIC */
52 	{ .dev_type = HV_NIC,
53 	  HV_NIC_GUID,
54 	  .perf_device = true,
55 	  .allowed_in_isolated = true,
56 	},
57 
58 	/* Network Direct */
59 	{ .dev_type = HV_ND,
60 	  HV_ND_GUID,
61 	  .perf_device = true,
62 	  .allowed_in_isolated = false,
63 	},
64 
65 	/* PCIE */
66 	{ .dev_type = HV_PCIE,
67 	  HV_PCIE_GUID,
68 	  .perf_device = false,
69 	  .allowed_in_isolated = false,
70 	},
71 
72 	/* Synthetic Frame Buffer */
73 	{ .dev_type = HV_FB,
74 	  HV_SYNTHVID_GUID,
75 	  .perf_device = false,
76 	  .allowed_in_isolated = false,
77 	},
78 
79 	/* Synthetic Keyboard */
80 	{ .dev_type = HV_KBD,
81 	  HV_KBD_GUID,
82 	  .perf_device = false,
83 	  .allowed_in_isolated = false,
84 	},
85 
86 	/* Synthetic MOUSE */
87 	{ .dev_type = HV_MOUSE,
88 	  HV_MOUSE_GUID,
89 	  .perf_device = false,
90 	  .allowed_in_isolated = false,
91 	},
92 
93 	/* KVP */
94 	{ .dev_type = HV_KVP,
95 	  HV_KVP_GUID,
96 	  .perf_device = false,
97 	  .allowed_in_isolated = false,
98 	},
99 
100 	/* Time Synch */
101 	{ .dev_type = HV_TS,
102 	  HV_TS_GUID,
103 	  .perf_device = false,
104 	  .allowed_in_isolated = true,
105 	},
106 
107 	/* Heartbeat */
108 	{ .dev_type = HV_HB,
109 	  HV_HEART_BEAT_GUID,
110 	  .perf_device = false,
111 	  .allowed_in_isolated = true,
112 	},
113 
114 	/* Shutdown */
115 	{ .dev_type = HV_SHUTDOWN,
116 	  HV_SHUTDOWN_GUID,
117 	  .perf_device = false,
118 	  .allowed_in_isolated = true,
119 	},
120 
121 	/* File copy */
122 	{ .dev_type = HV_FCOPY,
123 	  HV_FCOPY_GUID,
124 	  .perf_device = false,
125 	  .allowed_in_isolated = false,
126 	},
127 
128 	/* Backup */
129 	{ .dev_type = HV_BACKUP,
130 	  HV_VSS_GUID,
131 	  .perf_device = false,
132 	  .allowed_in_isolated = false,
133 	},
134 
135 	/* Dynamic Memory */
136 	{ .dev_type = HV_DM,
137 	  HV_DM_GUID,
138 	  .perf_device = false,
139 	  .allowed_in_isolated = false,
140 	},
141 
142 	/* Unknown GUID */
143 	{ .dev_type = HV_UNKNOWN,
144 	  .perf_device = false,
145 	  .allowed_in_isolated = false,
146 	},
147 };
148 
149 static const struct {
150 	guid_t guid;
151 } vmbus_unsupported_devs[] = {
152 	{ HV_AVMA1_GUID },
153 	{ HV_AVMA2_GUID },
154 	{ HV_RDV_GUID	},
155 };
156 
157 /*
158  * The rescinded channel may be blocked waiting for a response from the host;
159  * take care of that.
160  */
161 static void vmbus_rescind_cleanup(struct vmbus_channel *channel)
162 {
163 	struct vmbus_channel_msginfo *msginfo;
164 	unsigned long flags;
165 
166 
167 	spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
168 	channel->rescind = true;
169 	list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
170 				msglistentry) {
171 
172 		if (msginfo->waiting_channel == channel) {
173 			complete(&msginfo->waitevent);
174 			break;
175 		}
176 	}
177 	spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
178 }
179 
180 static bool is_unsupported_vmbus_devs(const guid_t *guid)
181 {
182 	int i;
183 
184 	for (i = 0; i < ARRAY_SIZE(vmbus_unsupported_devs); i++)
185 		if (guid_equal(guid, &vmbus_unsupported_devs[i].guid))
186 			return true;
187 	return false;
188 }
189 
190 static u16 hv_get_dev_type(const struct vmbus_channel *channel)
191 {
192 	const guid_t *guid = &channel->offermsg.offer.if_type;
193 	u16 i;
194 
195 	if (is_hvsock_channel(channel) || is_unsupported_vmbus_devs(guid))
196 		return HV_UNKNOWN;
197 
198 	for (i = HV_IDE; i < HV_UNKNOWN; i++) {
199 		if (guid_equal(guid, &vmbus_devs[i].guid))
200 			return i;
201 	}
202 	pr_info("Unknown GUID: %pUl\n", guid);
203 	return i;
204 }
205 
206 /**
207  * vmbus_prep_negotiate_resp() - Create default response for Negotiate message
208  * @icmsghdrp: Pointer to msg header structure
209  * @buf: Raw buffer channel data
210  * @buflen: Length of the raw buffer channel data.
211  * @fw_version: The framework versions we can support.
212  * @fw_vercnt: The size of @fw_version.
213  * @srv_version: The service versions we can support.
214  * @srv_vercnt: The size of @srv_version.
215  * @nego_fw_version: The selected framework version.
216  * @nego_srv_version: The selected service version.
217  *
218  * Note: Versions are given in decreasing order.
219  *
220  * Set up and fill in default negotiate response message.
221  * Mainly used by Hyper-V drivers.
222  */
223 bool vmbus_prep_negotiate_resp(struct icmsg_hdr *icmsghdrp, u8 *buf,
224 				u32 buflen, const int *fw_version, int fw_vercnt,
225 				const int *srv_version, int srv_vercnt,
226 				int *nego_fw_version, int *nego_srv_version)
227 {
228 	int icframe_major, icframe_minor;
229 	int icmsg_major, icmsg_minor;
230 	int fw_major, fw_minor;
231 	int srv_major, srv_minor;
232 	int i, j;
233 	bool found_match = false;
234 	struct icmsg_negotiate *negop;
235 
236 	/* Check that there's enough space for icframe_vercnt, icmsg_vercnt */
237 	if (buflen < ICMSG_HDR + offsetof(struct icmsg_negotiate, reserved)) {
238 		pr_err_ratelimited("Invalid icmsg negotiate\n");
239 		return false;
240 	}
241 
242 	icmsghdrp->icmsgsize = 0x10;
243 	negop = (struct icmsg_negotiate *)&buf[ICMSG_HDR];
244 
245 	icframe_major = negop->icframe_vercnt;
246 	icframe_minor = 0;
247 
248 	icmsg_major = negop->icmsg_vercnt;
249 	icmsg_minor = 0;
250 
251 	/* Validate negop packet */
252 	if (icframe_major > IC_VERSION_NEGOTIATION_MAX_VER_COUNT ||
253 	    icmsg_major > IC_VERSION_NEGOTIATION_MAX_VER_COUNT ||
254 	    ICMSG_NEGOTIATE_PKT_SIZE(icframe_major, icmsg_major) > buflen) {
255 		pr_err_ratelimited("Invalid icmsg negotiate - icframe_major: %u, icmsg_major: %u\n",
256 				   icframe_major, icmsg_major);
257 		goto fw_error;
258 	}
259 
260 	/*
261 	 * Select the framework version number we will
262 	 * support.
263 	 */
264 
265 	for (i = 0; i < fw_vercnt; i++) {
266 		fw_major = (fw_version[i] >> 16);
267 		fw_minor = (fw_version[i] & 0xFFFF);
268 
269 		for (j = 0; j < negop->icframe_vercnt; j++) {
270 			if ((negop->icversion_data[j].major == fw_major) &&
271 			    (negop->icversion_data[j].minor == fw_minor)) {
272 				icframe_major = negop->icversion_data[j].major;
273 				icframe_minor = negop->icversion_data[j].minor;
274 				found_match = true;
275 				break;
276 			}
277 		}
278 
279 		if (found_match)
280 			break;
281 	}
282 
283 	if (!found_match)
284 		goto fw_error;
285 
286 	found_match = false;
287 
288 	for (i = 0; i < srv_vercnt; i++) {
289 		srv_major = (srv_version[i] >> 16);
290 		srv_minor = (srv_version[i] & 0xFFFF);
291 
292 		for (j = negop->icframe_vercnt;
293 			(j < negop->icframe_vercnt + negop->icmsg_vercnt);
294 			j++) {
295 
296 			if ((negop->icversion_data[j].major == srv_major) &&
297 				(negop->icversion_data[j].minor == srv_minor)) {
298 
299 				icmsg_major = negop->icversion_data[j].major;
300 				icmsg_minor = negop->icversion_data[j].minor;
301 				found_match = true;
302 				break;
303 			}
304 		}
305 
306 		if (found_match)
307 			break;
308 	}
309 
310 	/*
311 	 * Respond with the framework and service
312 	 * version numbers we can support.
313 	 */
314 
315 fw_error:
316 	if (!found_match) {
317 		negop->icframe_vercnt = 0;
318 		negop->icmsg_vercnt = 0;
319 	} else {
320 		negop->icframe_vercnt = 1;
321 		negop->icmsg_vercnt = 1;
322 	}
323 
324 	if (nego_fw_version)
325 		*nego_fw_version = (icframe_major << 16) | icframe_minor;
326 
327 	if (nego_srv_version)
328 		*nego_srv_version = (icmsg_major << 16) | icmsg_minor;
329 
330 	negop->icversion_data[0].major = icframe_major;
331 	negop->icversion_data[0].minor = icframe_minor;
332 	negop->icversion_data[1].major = icmsg_major;
333 	negop->icversion_data[1].minor = icmsg_minor;
334 	return found_match;
335 }
336 EXPORT_SYMBOL_GPL(vmbus_prep_negotiate_resp);
337 
338 /*
339  * alloc_channel - Allocate and initialize a vmbus channel object
340  */
341 static struct vmbus_channel *alloc_channel(void)
342 {
343 	struct vmbus_channel *channel;
344 
345 	channel = kzalloc(sizeof(*channel), GFP_ATOMIC);
346 	if (!channel)
347 		return NULL;
348 
349 	spin_lock_init(&channel->sched_lock);
350 	init_completion(&channel->rescind_event);
351 
352 	INIT_LIST_HEAD(&channel->sc_list);
353 
354 	tasklet_init(&channel->callback_event,
355 		     vmbus_on_event, (unsigned long)channel);
356 
357 	hv_ringbuffer_pre_init(channel);
358 
359 	return channel;
360 }
361 
362 /*
363  * free_channel - Release the resources used by the vmbus channel object
364  */
365 static void free_channel(struct vmbus_channel *channel)
366 {
367 	tasklet_kill(&channel->callback_event);
368 	vmbus_remove_channel_attr_group(channel);
369 
370 	kobject_put(&channel->kobj);
371 }
372 
373 void vmbus_channel_map_relid(struct vmbus_channel *channel)
374 {
375 	if (WARN_ON(channel->offermsg.child_relid >= MAX_CHANNEL_RELIDS))
376 		return;
377 	/*
378 	 * The mapping of the channel's relid is visible from the CPUs that
379 	 * execute vmbus_chan_sched() by the time that vmbus_chan_sched() will
380 	 * execute:
381 	 *
382 	 *  (a) In the "normal (i.e., not resuming from hibernation)" path,
383 	 *      the full barrier in smp_store_mb() guarantees that the store
384 	 *      is propagated to all CPUs before the add_channel_work work
385 	 *      is queued.  In turn, add_channel_work is queued before the
386 	 *      channel's ring buffer is allocated/initialized and the
387 	 *      OPENCHANNEL message for the channel is sent in vmbus_open().
388 	 *      Hyper-V won't start sending the interrupts for the channel
389 	 *      before the OPENCHANNEL message is acked.  The memory barrier
390 	 *      in vmbus_chan_sched() -> sync_test_and_clear_bit() ensures
391 	 *      that vmbus_chan_sched() must find the channel's relid in
392 	 *      recv_int_page before retrieving the channel pointer from the
393 	 *      array of channels.
394 	 *
395 	 *  (b) In the "resuming from hibernation" path, the smp_store_mb()
396 	 *      guarantees that the store is propagated to all CPUs before
397 	 *      the VMBus connection is marked as ready for the resume event
398 	 *      (cf. check_ready_for_resume_event()).  The interrupt handler
399 	 *      of the VMBus driver and vmbus_chan_sched() can not run before
400 	 *      vmbus_bus_resume() has completed execution (cf. resume_noirq).
401 	 */
402 	smp_store_mb(
403 		vmbus_connection.channels[channel->offermsg.child_relid],
404 		channel);
405 }
406 
407 void vmbus_channel_unmap_relid(struct vmbus_channel *channel)
408 {
409 	if (WARN_ON(channel->offermsg.child_relid >= MAX_CHANNEL_RELIDS))
410 		return;
411 	WRITE_ONCE(
412 		vmbus_connection.channels[channel->offermsg.child_relid],
413 		NULL);
414 }
415 
416 static void vmbus_release_relid(u32 relid)
417 {
418 	struct vmbus_channel_relid_released msg;
419 	int ret;
420 
421 	memset(&msg, 0, sizeof(struct vmbus_channel_relid_released));
422 	msg.child_relid = relid;
423 	msg.header.msgtype = CHANNELMSG_RELID_RELEASED;
424 	ret = vmbus_post_msg(&msg, sizeof(struct vmbus_channel_relid_released),
425 			     true);
426 
427 	trace_vmbus_release_relid(&msg, ret);
428 }
429 
430 void hv_process_channel_removal(struct vmbus_channel *channel)
431 {
432 	lockdep_assert_held(&vmbus_connection.channel_mutex);
433 	BUG_ON(!channel->rescind);
434 
435 	/*
436 	 * hv_process_channel_removal() could find INVALID_RELID only for
437 	 * hv_sock channels.  See the inline comments in vmbus_onoffer().
438 	 */
439 	WARN_ON(channel->offermsg.child_relid == INVALID_RELID &&
440 		!is_hvsock_channel(channel));
441 
442 	/*
443 	 * Upon suspend, an in-use hv_sock channel is removed from the array of
444 	 * channels and the relid is invalidated.  After hibernation, when the
445 	 * user-space appplication destroys the channel, it's unnecessary and
446 	 * unsafe to remove the channel from the array of channels.  See also
447 	 * the inline comments before the call of vmbus_release_relid() below.
448 	 */
449 	if (channel->offermsg.child_relid != INVALID_RELID)
450 		vmbus_channel_unmap_relid(channel);
451 
452 	if (channel->primary_channel == NULL)
453 		list_del(&channel->listentry);
454 	else
455 		list_del(&channel->sc_list);
456 
457 	/*
458 	 * If this is a "perf" channel, updates the hv_numa_map[] masks so that
459 	 * init_vp_index() can (re-)use the CPU.
460 	 */
461 	if (hv_is_perf_channel(channel))
462 		hv_clear_alloced_cpu(channel->target_cpu);
463 
464 	/*
465 	 * Upon suspend, an in-use hv_sock channel is marked as "rescinded" and
466 	 * the relid is invalidated; after hibernation, when the user-space app
467 	 * destroys the channel, the relid is INVALID_RELID, and in this case
468 	 * it's unnecessary and unsafe to release the old relid, since the same
469 	 * relid can refer to a completely different channel now.
470 	 */
471 	if (channel->offermsg.child_relid != INVALID_RELID)
472 		vmbus_release_relid(channel->offermsg.child_relid);
473 
474 	free_channel(channel);
475 }
476 
477 void vmbus_free_channels(void)
478 {
479 	struct vmbus_channel *channel, *tmp;
480 
481 	list_for_each_entry_safe(channel, tmp, &vmbus_connection.chn_list,
482 		listentry) {
483 		/* hv_process_channel_removal() needs this */
484 		channel->rescind = true;
485 
486 		vmbus_device_unregister(channel->device_obj);
487 	}
488 }
489 
490 /* Note: the function can run concurrently for primary/sub channels. */
491 static void vmbus_add_channel_work(struct work_struct *work)
492 {
493 	struct vmbus_channel *newchannel =
494 		container_of(work, struct vmbus_channel, add_channel_work);
495 	struct vmbus_channel *primary_channel = newchannel->primary_channel;
496 	int ret;
497 
498 	/*
499 	 * This state is used to indicate a successful open
500 	 * so that when we do close the channel normally, we
501 	 * can cleanup properly.
502 	 */
503 	newchannel->state = CHANNEL_OPEN_STATE;
504 
505 	if (primary_channel != NULL) {
506 		/* newchannel is a sub-channel. */
507 		struct hv_device *dev = primary_channel->device_obj;
508 
509 		if (vmbus_add_channel_kobj(dev, newchannel))
510 			goto err_deq_chan;
511 
512 		if (primary_channel->sc_creation_callback != NULL)
513 			primary_channel->sc_creation_callback(newchannel);
514 
515 		newchannel->probe_done = true;
516 		return;
517 	}
518 
519 	/*
520 	 * Start the process of binding the primary channel to the driver
521 	 */
522 	newchannel->device_obj = vmbus_device_create(
523 		&newchannel->offermsg.offer.if_type,
524 		&newchannel->offermsg.offer.if_instance,
525 		newchannel);
526 	if (!newchannel->device_obj)
527 		goto err_deq_chan;
528 
529 	newchannel->device_obj->device_id = newchannel->device_id;
530 	/*
531 	 * Add the new device to the bus. This will kick off device-driver
532 	 * binding which eventually invokes the device driver's AddDevice()
533 	 * method.
534 	 */
535 	ret = vmbus_device_register(newchannel->device_obj);
536 
537 	if (ret != 0) {
538 		pr_err("unable to add child device object (relid %d)\n",
539 			newchannel->offermsg.child_relid);
540 		kfree(newchannel->device_obj);
541 		goto err_deq_chan;
542 	}
543 
544 	newchannel->probe_done = true;
545 	return;
546 
547 err_deq_chan:
548 	mutex_lock(&vmbus_connection.channel_mutex);
549 
550 	/*
551 	 * We need to set the flag, otherwise
552 	 * vmbus_onoffer_rescind() can be blocked.
553 	 */
554 	newchannel->probe_done = true;
555 
556 	if (primary_channel == NULL)
557 		list_del(&newchannel->listentry);
558 	else
559 		list_del(&newchannel->sc_list);
560 
561 	/* vmbus_process_offer() has mapped the channel. */
562 	vmbus_channel_unmap_relid(newchannel);
563 
564 	mutex_unlock(&vmbus_connection.channel_mutex);
565 
566 	vmbus_release_relid(newchannel->offermsg.child_relid);
567 
568 	free_channel(newchannel);
569 }
570 
571 /*
572  * vmbus_process_offer - Process the offer by creating a channel/device
573  * associated with this offer
574  */
575 static void vmbus_process_offer(struct vmbus_channel *newchannel)
576 {
577 	struct vmbus_channel *channel;
578 	struct workqueue_struct *wq;
579 	bool fnew = true;
580 
581 	/*
582 	 * Synchronize vmbus_process_offer() and CPU hotplugging:
583 	 *
584 	 * CPU1				CPU2
585 	 *
586 	 * [vmbus_process_offer()]	[Hot removal of the CPU]
587 	 *
588 	 * CPU_READ_LOCK		CPUS_WRITE_LOCK
589 	 * LOAD cpu_online_mask		SEARCH chn_list
590 	 * STORE target_cpu		LOAD target_cpu
591 	 * INSERT chn_list		STORE cpu_online_mask
592 	 * CPUS_READ_UNLOCK		CPUS_WRITE_UNLOCK
593 	 *
594 	 * Forbids: CPU1's LOAD from *not* seing CPU2's STORE &&
595 	 *              CPU2's SEARCH from *not* seeing CPU1's INSERT
596 	 *
597 	 * Forbids: CPU2's SEARCH from seeing CPU1's INSERT &&
598 	 *              CPU2's LOAD from *not* seing CPU1's STORE
599 	 */
600 	cpus_read_lock();
601 
602 	/*
603 	 * Serializes the modifications of the chn_list list as well as
604 	 * the accesses to next_numa_node_id in init_vp_index().
605 	 */
606 	mutex_lock(&vmbus_connection.channel_mutex);
607 
608 	init_vp_index(newchannel);
609 
610 	/* Remember the channels that should be cleaned up upon suspend. */
611 	if (is_hvsock_channel(newchannel) || is_sub_channel(newchannel))
612 		atomic_inc(&vmbus_connection.nr_chan_close_on_suspend);
613 
614 	/*
615 	 * Now that we have acquired the channel_mutex,
616 	 * we can release the potentially racing rescind thread.
617 	 */
618 	atomic_dec(&vmbus_connection.offer_in_progress);
619 
620 	list_for_each_entry(channel, &vmbus_connection.chn_list, listentry) {
621 		if (guid_equal(&channel->offermsg.offer.if_type,
622 			       &newchannel->offermsg.offer.if_type) &&
623 		    guid_equal(&channel->offermsg.offer.if_instance,
624 			       &newchannel->offermsg.offer.if_instance)) {
625 			fnew = false;
626 			break;
627 		}
628 	}
629 
630 	if (fnew) {
631 		list_add_tail(&newchannel->listentry,
632 			      &vmbus_connection.chn_list);
633 	} else {
634 		/*
635 		 * Check to see if this is a valid sub-channel.
636 		 */
637 		if (newchannel->offermsg.offer.sub_channel_index == 0) {
638 			mutex_unlock(&vmbus_connection.channel_mutex);
639 			/*
640 			 * Don't call free_channel(), because newchannel->kobj
641 			 * is not initialized yet.
642 			 */
643 			kfree(newchannel);
644 			WARN_ON_ONCE(1);
645 			return;
646 		}
647 		/*
648 		 * Process the sub-channel.
649 		 */
650 		newchannel->primary_channel = channel;
651 		list_add_tail(&newchannel->sc_list, &channel->sc_list);
652 	}
653 
654 	vmbus_channel_map_relid(newchannel);
655 
656 	mutex_unlock(&vmbus_connection.channel_mutex);
657 	cpus_read_unlock();
658 
659 	/*
660 	 * vmbus_process_offer() mustn't call channel->sc_creation_callback()
661 	 * directly for sub-channels, because sc_creation_callback() ->
662 	 * vmbus_open() may never get the host's response to the
663 	 * OPEN_CHANNEL message (the host may rescind a channel at any time,
664 	 * e.g. in the case of hot removing a NIC), and vmbus_onoffer_rescind()
665 	 * may not wake up the vmbus_open() as it's blocked due to a non-zero
666 	 * vmbus_connection.offer_in_progress, and finally we have a deadlock.
667 	 *
668 	 * The above is also true for primary channels, if the related device
669 	 * drivers use sync probing mode by default.
670 	 *
671 	 * And, usually the handling of primary channels and sub-channels can
672 	 * depend on each other, so we should offload them to different
673 	 * workqueues to avoid possible deadlock, e.g. in sync-probing mode,
674 	 * NIC1's netvsc_subchan_work() can race with NIC2's netvsc_probe() ->
675 	 * rtnl_lock(), and causes deadlock: the former gets the rtnl_lock
676 	 * and waits for all the sub-channels to appear, but the latter
677 	 * can't get the rtnl_lock and this blocks the handling of
678 	 * sub-channels.
679 	 */
680 	INIT_WORK(&newchannel->add_channel_work, vmbus_add_channel_work);
681 	wq = fnew ? vmbus_connection.handle_primary_chan_wq :
682 		    vmbus_connection.handle_sub_chan_wq;
683 	queue_work(wq, &newchannel->add_channel_work);
684 }
685 
686 /*
687  * We use this state to statically distribute the channel interrupt load.
688  */
689 static int next_numa_node_id;
690 
691 /*
692  * Starting with Win8, we can statically distribute the incoming
693  * channel interrupt load by binding a channel to VCPU.
694  *
695  * For pre-win8 hosts or non-performance critical channels we assign the
696  * VMBUS_CONNECT_CPU.
697  *
698  * Starting with win8, performance critical channels will be distributed
699  * evenly among all the available NUMA nodes.  Once the node is assigned,
700  * we will assign the CPU based on a simple round robin scheme.
701  */
702 static void init_vp_index(struct vmbus_channel *channel)
703 {
704 	bool perf_chn = hv_is_perf_channel(channel);
705 	cpumask_var_t available_mask;
706 	struct cpumask *alloced_mask;
707 	u32 target_cpu;
708 	int numa_node;
709 
710 	if ((vmbus_proto_version == VERSION_WS2008) ||
711 	    (vmbus_proto_version == VERSION_WIN7) || (!perf_chn) ||
712 	    !alloc_cpumask_var(&available_mask, GFP_KERNEL)) {
713 		/*
714 		 * Prior to win8, all channel interrupts are
715 		 * delivered on VMBUS_CONNECT_CPU.
716 		 * Also if the channel is not a performance critical
717 		 * channel, bind it to VMBUS_CONNECT_CPU.
718 		 * In case alloc_cpumask_var() fails, bind it to
719 		 * VMBUS_CONNECT_CPU.
720 		 */
721 		channel->target_cpu = VMBUS_CONNECT_CPU;
722 		if (perf_chn)
723 			hv_set_alloced_cpu(VMBUS_CONNECT_CPU);
724 		return;
725 	}
726 
727 	while (true) {
728 		numa_node = next_numa_node_id++;
729 		if (numa_node == nr_node_ids) {
730 			next_numa_node_id = 0;
731 			continue;
732 		}
733 		if (cpumask_empty(cpumask_of_node(numa_node)))
734 			continue;
735 		break;
736 	}
737 	alloced_mask = &hv_context.hv_numa_map[numa_node];
738 
739 	if (cpumask_weight(alloced_mask) ==
740 	    cpumask_weight(cpumask_of_node(numa_node))) {
741 		/*
742 		 * We have cycled through all the CPUs in the node;
743 		 * reset the alloced map.
744 		 */
745 		cpumask_clear(alloced_mask);
746 	}
747 
748 	cpumask_xor(available_mask, alloced_mask, cpumask_of_node(numa_node));
749 
750 	target_cpu = cpumask_first(available_mask);
751 	cpumask_set_cpu(target_cpu, alloced_mask);
752 
753 	channel->target_cpu = target_cpu;
754 
755 	free_cpumask_var(available_mask);
756 }
757 
758 #define UNLOAD_DELAY_UNIT_MS	10		/* 10 milliseconds */
759 #define UNLOAD_WAIT_MS		(100*1000)	/* 100 seconds */
760 #define UNLOAD_WAIT_LOOPS	(UNLOAD_WAIT_MS/UNLOAD_DELAY_UNIT_MS)
761 #define UNLOAD_MSG_MS		(5*1000)	/* Every 5 seconds */
762 #define UNLOAD_MSG_LOOPS	(UNLOAD_MSG_MS/UNLOAD_DELAY_UNIT_MS)
763 
764 static void vmbus_wait_for_unload(void)
765 {
766 	int cpu;
767 	void *page_addr;
768 	struct hv_message *msg;
769 	struct vmbus_channel_message_header *hdr;
770 	u32 message_type, i;
771 
772 	/*
773 	 * CHANNELMSG_UNLOAD_RESPONSE is always delivered to the CPU which was
774 	 * used for initial contact or to CPU0 depending on host version. When
775 	 * we're crashing on a different CPU let's hope that IRQ handler on
776 	 * the cpu which receives CHANNELMSG_UNLOAD_RESPONSE is still
777 	 * functional and vmbus_unload_response() will complete
778 	 * vmbus_connection.unload_event. If not, the last thing we can do is
779 	 * read message pages for all CPUs directly.
780 	 *
781 	 * Wait up to 100 seconds since an Azure host must writeback any dirty
782 	 * data in its disk cache before the VMbus UNLOAD request will
783 	 * complete. This flushing has been empirically observed to take up
784 	 * to 50 seconds in cases with a lot of dirty data, so allow additional
785 	 * leeway and for inaccuracies in mdelay(). But eventually time out so
786 	 * that the panic path can't get hung forever in case the response
787 	 * message isn't seen.
788 	 */
789 	for (i = 1; i <= UNLOAD_WAIT_LOOPS; i++) {
790 		if (completion_done(&vmbus_connection.unload_event))
791 			goto completed;
792 
793 		for_each_online_cpu(cpu) {
794 			struct hv_per_cpu_context *hv_cpu
795 				= per_cpu_ptr(hv_context.cpu_context, cpu);
796 
797 			page_addr = hv_cpu->synic_message_page;
798 			msg = (struct hv_message *)page_addr
799 				+ VMBUS_MESSAGE_SINT;
800 
801 			message_type = READ_ONCE(msg->header.message_type);
802 			if (message_type == HVMSG_NONE)
803 				continue;
804 
805 			hdr = (struct vmbus_channel_message_header *)
806 				msg->u.payload;
807 
808 			if (hdr->msgtype == CHANNELMSG_UNLOAD_RESPONSE)
809 				complete(&vmbus_connection.unload_event);
810 
811 			vmbus_signal_eom(msg, message_type);
812 		}
813 
814 		/*
815 		 * Give a notice periodically so someone watching the
816 		 * serial output won't think it is completely hung.
817 		 */
818 		if (!(i % UNLOAD_MSG_LOOPS))
819 			pr_notice("Waiting for VMBus UNLOAD to complete\n");
820 
821 		mdelay(UNLOAD_DELAY_UNIT_MS);
822 	}
823 	pr_err("Continuing even though VMBus UNLOAD did not complete\n");
824 
825 completed:
826 	/*
827 	 * We're crashing and already got the UNLOAD_RESPONSE, cleanup all
828 	 * maybe-pending messages on all CPUs to be able to receive new
829 	 * messages after we reconnect.
830 	 */
831 	for_each_online_cpu(cpu) {
832 		struct hv_per_cpu_context *hv_cpu
833 			= per_cpu_ptr(hv_context.cpu_context, cpu);
834 
835 		page_addr = hv_cpu->synic_message_page;
836 		msg = (struct hv_message *)page_addr + VMBUS_MESSAGE_SINT;
837 		msg->header.message_type = HVMSG_NONE;
838 	}
839 }
840 
841 /*
842  * vmbus_unload_response - Handler for the unload response.
843  */
844 static void vmbus_unload_response(struct vmbus_channel_message_header *hdr)
845 {
846 	/*
847 	 * This is a global event; just wakeup the waiting thread.
848 	 * Once we successfully unload, we can cleanup the monitor state.
849 	 *
850 	 * NB.  A malicious or compromised Hyper-V could send a spurious
851 	 * message of type CHANNELMSG_UNLOAD_RESPONSE, and trigger a call
852 	 * of the complete() below.  Make sure that unload_event has been
853 	 * initialized by the time this complete() is executed.
854 	 */
855 	complete(&vmbus_connection.unload_event);
856 }
857 
858 void vmbus_initiate_unload(bool crash)
859 {
860 	struct vmbus_channel_message_header hdr;
861 
862 	if (xchg(&vmbus_connection.conn_state, DISCONNECTED) == DISCONNECTED)
863 		return;
864 
865 	/* Pre-Win2012R2 hosts don't support reconnect */
866 	if (vmbus_proto_version < VERSION_WIN8_1)
867 		return;
868 
869 	reinit_completion(&vmbus_connection.unload_event);
870 	memset(&hdr, 0, sizeof(struct vmbus_channel_message_header));
871 	hdr.msgtype = CHANNELMSG_UNLOAD;
872 	vmbus_post_msg(&hdr, sizeof(struct vmbus_channel_message_header),
873 		       !crash);
874 
875 	/*
876 	 * vmbus_initiate_unload() is also called on crash and the crash can be
877 	 * happening in an interrupt context, where scheduling is impossible.
878 	 */
879 	if (!crash)
880 		wait_for_completion(&vmbus_connection.unload_event);
881 	else
882 		vmbus_wait_for_unload();
883 }
884 
885 static void check_ready_for_resume_event(void)
886 {
887 	/*
888 	 * If all the old primary channels have been fixed up, then it's safe
889 	 * to resume.
890 	 */
891 	if (atomic_dec_and_test(&vmbus_connection.nr_chan_fixup_on_resume))
892 		complete(&vmbus_connection.ready_for_resume_event);
893 }
894 
895 static void vmbus_setup_channel_state(struct vmbus_channel *channel,
896 				      struct vmbus_channel_offer_channel *offer)
897 {
898 	/*
899 	 * Setup state for signalling the host.
900 	 */
901 	channel->sig_event = VMBUS_EVENT_CONNECTION_ID;
902 
903 	if (vmbus_proto_version != VERSION_WS2008) {
904 		channel->is_dedicated_interrupt =
905 				(offer->is_dedicated_interrupt != 0);
906 		channel->sig_event = offer->connection_id;
907 	}
908 
909 	memcpy(&channel->offermsg, offer,
910 	       sizeof(struct vmbus_channel_offer_channel));
911 	channel->monitor_grp = (u8)offer->monitorid / 32;
912 	channel->monitor_bit = (u8)offer->monitorid % 32;
913 	channel->device_id = hv_get_dev_type(channel);
914 }
915 
916 /*
917  * find_primary_channel_by_offer - Get the channel object given the new offer.
918  * This is only used in the resume path of hibernation.
919  */
920 static struct vmbus_channel *
921 find_primary_channel_by_offer(const struct vmbus_channel_offer_channel *offer)
922 {
923 	struct vmbus_channel *channel = NULL, *iter;
924 	const guid_t *inst1, *inst2;
925 
926 	/* Ignore sub-channel offers. */
927 	if (offer->offer.sub_channel_index != 0)
928 		return NULL;
929 
930 	mutex_lock(&vmbus_connection.channel_mutex);
931 
932 	list_for_each_entry(iter, &vmbus_connection.chn_list, listentry) {
933 		inst1 = &iter->offermsg.offer.if_instance;
934 		inst2 = &offer->offer.if_instance;
935 
936 		if (guid_equal(inst1, inst2)) {
937 			channel = iter;
938 			break;
939 		}
940 	}
941 
942 	mutex_unlock(&vmbus_connection.channel_mutex);
943 
944 	return channel;
945 }
946 
947 static bool vmbus_is_valid_device(const guid_t *guid)
948 {
949 	u16 i;
950 
951 	if (!hv_is_isolation_supported())
952 		return true;
953 
954 	for (i = 0; i < ARRAY_SIZE(vmbus_devs); i++) {
955 		if (guid_equal(guid, &vmbus_devs[i].guid))
956 			return vmbus_devs[i].allowed_in_isolated;
957 	}
958 	return false;
959 }
960 
961 /*
962  * vmbus_onoffer - Handler for channel offers from vmbus in parent partition.
963  *
964  */
965 static void vmbus_onoffer(struct vmbus_channel_message_header *hdr)
966 {
967 	struct vmbus_channel_offer_channel *offer;
968 	struct vmbus_channel *oldchannel, *newchannel;
969 	size_t offer_sz;
970 
971 	offer = (struct vmbus_channel_offer_channel *)hdr;
972 
973 	trace_vmbus_onoffer(offer);
974 
975 	if (!vmbus_is_valid_device(&offer->offer.if_type)) {
976 		pr_err_ratelimited("Invalid offer %d from the host supporting isolation\n",
977 				   offer->child_relid);
978 		atomic_dec(&vmbus_connection.offer_in_progress);
979 		return;
980 	}
981 
982 	oldchannel = find_primary_channel_by_offer(offer);
983 
984 	if (oldchannel != NULL) {
985 		/*
986 		 * We're resuming from hibernation: all the sub-channel and
987 		 * hv_sock channels we had before the hibernation should have
988 		 * been cleaned up, and now we must be seeing a re-offered
989 		 * primary channel that we had before the hibernation.
990 		 */
991 
992 		/*
993 		 * { Initially: channel relid = INVALID_RELID,
994 		 *		channels[valid_relid] = NULL }
995 		 *
996 		 * CPU1					CPU2
997 		 *
998 		 * [vmbus_onoffer()]			[vmbus_device_release()]
999 		 *
1000 		 * LOCK channel_mutex			LOCK channel_mutex
1001 		 * STORE channel relid = valid_relid	LOAD r1 = channel relid
1002 		 * MAP_RELID channel			if (r1 != INVALID_RELID)
1003 		 * UNLOCK channel_mutex			  UNMAP_RELID channel
1004 		 *					UNLOCK channel_mutex
1005 		 *
1006 		 * Forbids: r1 == valid_relid &&
1007 		 *              channels[valid_relid] == channel
1008 		 *
1009 		 * Note.  r1 can be INVALID_RELID only for an hv_sock channel.
1010 		 * None of the hv_sock channels which were present before the
1011 		 * suspend are re-offered upon the resume.  See the WARN_ON()
1012 		 * in hv_process_channel_removal().
1013 		 */
1014 		mutex_lock(&vmbus_connection.channel_mutex);
1015 
1016 		atomic_dec(&vmbus_connection.offer_in_progress);
1017 
1018 		WARN_ON(oldchannel->offermsg.child_relid != INVALID_RELID);
1019 		/* Fix up the relid. */
1020 		oldchannel->offermsg.child_relid = offer->child_relid;
1021 
1022 		offer_sz = sizeof(*offer);
1023 		if (memcmp(offer, &oldchannel->offermsg, offer_sz) != 0) {
1024 			/*
1025 			 * This is not an error, since the host can also change
1026 			 * the other field(s) of the offer, e.g. on WS RS5
1027 			 * (Build 17763), the offer->connection_id of the
1028 			 * Mellanox VF vmbus device can change when the host
1029 			 * reoffers the device upon resume.
1030 			 */
1031 			pr_debug("vmbus offer changed: relid=%d\n",
1032 				 offer->child_relid);
1033 
1034 			print_hex_dump_debug("Old vmbus offer: ",
1035 					     DUMP_PREFIX_OFFSET, 16, 4,
1036 					     &oldchannel->offermsg, offer_sz,
1037 					     false);
1038 			print_hex_dump_debug("New vmbus offer: ",
1039 					     DUMP_PREFIX_OFFSET, 16, 4,
1040 					     offer, offer_sz, false);
1041 
1042 			/* Fix up the old channel. */
1043 			vmbus_setup_channel_state(oldchannel, offer);
1044 		}
1045 
1046 		/* Add the channel back to the array of channels. */
1047 		vmbus_channel_map_relid(oldchannel);
1048 		check_ready_for_resume_event();
1049 
1050 		mutex_unlock(&vmbus_connection.channel_mutex);
1051 		return;
1052 	}
1053 
1054 	/* Allocate the channel object and save this offer. */
1055 	newchannel = alloc_channel();
1056 	if (!newchannel) {
1057 		vmbus_release_relid(offer->child_relid);
1058 		atomic_dec(&vmbus_connection.offer_in_progress);
1059 		pr_err("Unable to allocate channel object\n");
1060 		return;
1061 	}
1062 
1063 	vmbus_setup_channel_state(newchannel, offer);
1064 
1065 	vmbus_process_offer(newchannel);
1066 }
1067 
1068 static void check_ready_for_suspend_event(void)
1069 {
1070 	/*
1071 	 * If all the sub-channels or hv_sock channels have been cleaned up,
1072 	 * then it's safe to suspend.
1073 	 */
1074 	if (atomic_dec_and_test(&vmbus_connection.nr_chan_close_on_suspend))
1075 		complete(&vmbus_connection.ready_for_suspend_event);
1076 }
1077 
1078 /*
1079  * vmbus_onoffer_rescind - Rescind offer handler.
1080  *
1081  * We queue a work item to process this offer synchronously
1082  */
1083 static void vmbus_onoffer_rescind(struct vmbus_channel_message_header *hdr)
1084 {
1085 	struct vmbus_channel_rescind_offer *rescind;
1086 	struct vmbus_channel *channel;
1087 	struct device *dev;
1088 	bool clean_up_chan_for_suspend;
1089 
1090 	rescind = (struct vmbus_channel_rescind_offer *)hdr;
1091 
1092 	trace_vmbus_onoffer_rescind(rescind);
1093 
1094 	/*
1095 	 * The offer msg and the corresponding rescind msg
1096 	 * from the host are guranteed to be ordered -
1097 	 * offer comes in first and then the rescind.
1098 	 * Since we process these events in work elements,
1099 	 * and with preemption, we may end up processing
1100 	 * the events out of order.  We rely on the synchronization
1101 	 * provided by offer_in_progress and by channel_mutex for
1102 	 * ordering these events:
1103 	 *
1104 	 * { Initially: offer_in_progress = 1 }
1105 	 *
1106 	 * CPU1				CPU2
1107 	 *
1108 	 * [vmbus_onoffer()]		[vmbus_onoffer_rescind()]
1109 	 *
1110 	 * LOCK channel_mutex		WAIT_ON offer_in_progress == 0
1111 	 * DECREMENT offer_in_progress	LOCK channel_mutex
1112 	 * STORE channels[]		LOAD channels[]
1113 	 * UNLOCK channel_mutex		UNLOCK channel_mutex
1114 	 *
1115 	 * Forbids: CPU2's LOAD from *not* seeing CPU1's STORE
1116 	 */
1117 
1118 	while (atomic_read(&vmbus_connection.offer_in_progress) != 0) {
1119 		/*
1120 		 * We wait here until any channel offer is currently
1121 		 * being processed.
1122 		 */
1123 		msleep(1);
1124 	}
1125 
1126 	mutex_lock(&vmbus_connection.channel_mutex);
1127 	channel = relid2channel(rescind->child_relid);
1128 	if (channel != NULL) {
1129 		/*
1130 		 * Guarantee that no other instance of vmbus_onoffer_rescind()
1131 		 * has got a reference to the channel object.  Synchronize on
1132 		 * &vmbus_connection.channel_mutex.
1133 		 */
1134 		if (channel->rescind_ref) {
1135 			mutex_unlock(&vmbus_connection.channel_mutex);
1136 			return;
1137 		}
1138 		channel->rescind_ref = true;
1139 	}
1140 	mutex_unlock(&vmbus_connection.channel_mutex);
1141 
1142 	if (channel == NULL) {
1143 		/*
1144 		 * We failed in processing the offer message;
1145 		 * we would have cleaned up the relid in that
1146 		 * failure path.
1147 		 */
1148 		return;
1149 	}
1150 
1151 	clean_up_chan_for_suspend = is_hvsock_channel(channel) ||
1152 				    is_sub_channel(channel);
1153 	/*
1154 	 * Before setting channel->rescind in vmbus_rescind_cleanup(), we
1155 	 * should make sure the channel callback is not running any more.
1156 	 */
1157 	vmbus_reset_channel_cb(channel);
1158 
1159 	/*
1160 	 * Now wait for offer handling to complete.
1161 	 */
1162 	vmbus_rescind_cleanup(channel);
1163 	while (READ_ONCE(channel->probe_done) == false) {
1164 		/*
1165 		 * We wait here until any channel offer is currently
1166 		 * being processed.
1167 		 */
1168 		msleep(1);
1169 	}
1170 
1171 	/*
1172 	 * At this point, the rescind handling can proceed safely.
1173 	 */
1174 
1175 	if (channel->device_obj) {
1176 		if (channel->chn_rescind_callback) {
1177 			channel->chn_rescind_callback(channel);
1178 
1179 			if (clean_up_chan_for_suspend)
1180 				check_ready_for_suspend_event();
1181 
1182 			return;
1183 		}
1184 		/*
1185 		 * We will have to unregister this device from the
1186 		 * driver core.
1187 		 */
1188 		dev = get_device(&channel->device_obj->device);
1189 		if (dev) {
1190 			vmbus_device_unregister(channel->device_obj);
1191 			put_device(dev);
1192 		}
1193 	} else if (channel->primary_channel != NULL) {
1194 		/*
1195 		 * Sub-channel is being rescinded. Following is the channel
1196 		 * close sequence when initiated from the driveri (refer to
1197 		 * vmbus_close() for details):
1198 		 * 1. Close all sub-channels first
1199 		 * 2. Then close the primary channel.
1200 		 */
1201 		mutex_lock(&vmbus_connection.channel_mutex);
1202 		if (channel->state == CHANNEL_OPEN_STATE) {
1203 			/*
1204 			 * The channel is currently not open;
1205 			 * it is safe for us to cleanup the channel.
1206 			 */
1207 			hv_process_channel_removal(channel);
1208 		} else {
1209 			complete(&channel->rescind_event);
1210 		}
1211 		mutex_unlock(&vmbus_connection.channel_mutex);
1212 	}
1213 
1214 	/* The "channel" may have been freed. Do not access it any longer. */
1215 
1216 	if (clean_up_chan_for_suspend)
1217 		check_ready_for_suspend_event();
1218 }
1219 
1220 void vmbus_hvsock_device_unregister(struct vmbus_channel *channel)
1221 {
1222 	BUG_ON(!is_hvsock_channel(channel));
1223 
1224 	/* We always get a rescind msg when a connection is closed. */
1225 	while (!READ_ONCE(channel->probe_done) || !READ_ONCE(channel->rescind))
1226 		msleep(1);
1227 
1228 	vmbus_device_unregister(channel->device_obj);
1229 }
1230 EXPORT_SYMBOL_GPL(vmbus_hvsock_device_unregister);
1231 
1232 
1233 /*
1234  * vmbus_onoffers_delivered -
1235  * This is invoked when all offers have been delivered.
1236  *
1237  * Nothing to do here.
1238  */
1239 static void vmbus_onoffers_delivered(
1240 			struct vmbus_channel_message_header *hdr)
1241 {
1242 }
1243 
1244 /*
1245  * vmbus_onopen_result - Open result handler.
1246  *
1247  * This is invoked when we received a response to our channel open request.
1248  * Find the matching request, copy the response and signal the requesting
1249  * thread.
1250  */
1251 static void vmbus_onopen_result(struct vmbus_channel_message_header *hdr)
1252 {
1253 	struct vmbus_channel_open_result *result;
1254 	struct vmbus_channel_msginfo *msginfo;
1255 	struct vmbus_channel_message_header *requestheader;
1256 	struct vmbus_channel_open_channel *openmsg;
1257 	unsigned long flags;
1258 
1259 	result = (struct vmbus_channel_open_result *)hdr;
1260 
1261 	trace_vmbus_onopen_result(result);
1262 
1263 	/*
1264 	 * Find the open msg, copy the result and signal/unblock the wait event
1265 	 */
1266 	spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
1267 
1268 	list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
1269 				msglistentry) {
1270 		requestheader =
1271 			(struct vmbus_channel_message_header *)msginfo->msg;
1272 
1273 		if (requestheader->msgtype == CHANNELMSG_OPENCHANNEL) {
1274 			openmsg =
1275 			(struct vmbus_channel_open_channel *)msginfo->msg;
1276 			if (openmsg->child_relid == result->child_relid &&
1277 			    openmsg->openid == result->openid) {
1278 				memcpy(&msginfo->response.open_result,
1279 				       result,
1280 				       sizeof(
1281 					struct vmbus_channel_open_result));
1282 				complete(&msginfo->waitevent);
1283 				break;
1284 			}
1285 		}
1286 	}
1287 	spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
1288 }
1289 
1290 /*
1291  * vmbus_ongpadl_created - GPADL created handler.
1292  *
1293  * This is invoked when we received a response to our gpadl create request.
1294  * Find the matching request, copy the response and signal the requesting
1295  * thread.
1296  */
1297 static void vmbus_ongpadl_created(struct vmbus_channel_message_header *hdr)
1298 {
1299 	struct vmbus_channel_gpadl_created *gpadlcreated;
1300 	struct vmbus_channel_msginfo *msginfo;
1301 	struct vmbus_channel_message_header *requestheader;
1302 	struct vmbus_channel_gpadl_header *gpadlheader;
1303 	unsigned long flags;
1304 
1305 	gpadlcreated = (struct vmbus_channel_gpadl_created *)hdr;
1306 
1307 	trace_vmbus_ongpadl_created(gpadlcreated);
1308 
1309 	/*
1310 	 * Find the establish msg, copy the result and signal/unblock the wait
1311 	 * event
1312 	 */
1313 	spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
1314 
1315 	list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
1316 				msglistentry) {
1317 		requestheader =
1318 			(struct vmbus_channel_message_header *)msginfo->msg;
1319 
1320 		if (requestheader->msgtype == CHANNELMSG_GPADL_HEADER) {
1321 			gpadlheader =
1322 			(struct vmbus_channel_gpadl_header *)requestheader;
1323 
1324 			if ((gpadlcreated->child_relid ==
1325 			     gpadlheader->child_relid) &&
1326 			    (gpadlcreated->gpadl == gpadlheader->gpadl)) {
1327 				memcpy(&msginfo->response.gpadl_created,
1328 				       gpadlcreated,
1329 				       sizeof(
1330 					struct vmbus_channel_gpadl_created));
1331 				complete(&msginfo->waitevent);
1332 				break;
1333 			}
1334 		}
1335 	}
1336 	spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
1337 }
1338 
1339 /*
1340  * vmbus_onmodifychannel_response - Modify Channel response handler.
1341  *
1342  * This is invoked when we received a response to our channel modify request.
1343  * Find the matching request, copy the response and signal the requesting thread.
1344  */
1345 static void vmbus_onmodifychannel_response(struct vmbus_channel_message_header *hdr)
1346 {
1347 	struct vmbus_channel_modifychannel_response *response;
1348 	struct vmbus_channel_msginfo *msginfo;
1349 	unsigned long flags;
1350 
1351 	response = (struct vmbus_channel_modifychannel_response *)hdr;
1352 
1353 	trace_vmbus_onmodifychannel_response(response);
1354 
1355 	/*
1356 	 * Find the modify msg, copy the response and signal/unblock the wait event.
1357 	 */
1358 	spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
1359 
1360 	list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list, msglistentry) {
1361 		struct vmbus_channel_message_header *responseheader =
1362 				(struct vmbus_channel_message_header *)msginfo->msg;
1363 
1364 		if (responseheader->msgtype == CHANNELMSG_MODIFYCHANNEL) {
1365 			struct vmbus_channel_modifychannel *modifymsg;
1366 
1367 			modifymsg = (struct vmbus_channel_modifychannel *)msginfo->msg;
1368 			if (modifymsg->child_relid == response->child_relid) {
1369 				memcpy(&msginfo->response.modify_response, response,
1370 				       sizeof(*response));
1371 				complete(&msginfo->waitevent);
1372 				break;
1373 			}
1374 		}
1375 	}
1376 	spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
1377 }
1378 
1379 /*
1380  * vmbus_ongpadl_torndown - GPADL torndown handler.
1381  *
1382  * This is invoked when we received a response to our gpadl teardown request.
1383  * Find the matching request, copy the response and signal the requesting
1384  * thread.
1385  */
1386 static void vmbus_ongpadl_torndown(
1387 			struct vmbus_channel_message_header *hdr)
1388 {
1389 	struct vmbus_channel_gpadl_torndown *gpadl_torndown;
1390 	struct vmbus_channel_msginfo *msginfo;
1391 	struct vmbus_channel_message_header *requestheader;
1392 	struct vmbus_channel_gpadl_teardown *gpadl_teardown;
1393 	unsigned long flags;
1394 
1395 	gpadl_torndown = (struct vmbus_channel_gpadl_torndown *)hdr;
1396 
1397 	trace_vmbus_ongpadl_torndown(gpadl_torndown);
1398 
1399 	/*
1400 	 * Find the open msg, copy the result and signal/unblock the wait event
1401 	 */
1402 	spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
1403 
1404 	list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
1405 				msglistentry) {
1406 		requestheader =
1407 			(struct vmbus_channel_message_header *)msginfo->msg;
1408 
1409 		if (requestheader->msgtype == CHANNELMSG_GPADL_TEARDOWN) {
1410 			gpadl_teardown =
1411 			(struct vmbus_channel_gpadl_teardown *)requestheader;
1412 
1413 			if (gpadl_torndown->gpadl == gpadl_teardown->gpadl) {
1414 				memcpy(&msginfo->response.gpadl_torndown,
1415 				       gpadl_torndown,
1416 				       sizeof(
1417 					struct vmbus_channel_gpadl_torndown));
1418 				complete(&msginfo->waitevent);
1419 				break;
1420 			}
1421 		}
1422 	}
1423 	spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
1424 }
1425 
1426 /*
1427  * vmbus_onversion_response - Version response handler
1428  *
1429  * This is invoked when we received a response to our initiate contact request.
1430  * Find the matching request, copy the response and signal the requesting
1431  * thread.
1432  */
1433 static void vmbus_onversion_response(
1434 		struct vmbus_channel_message_header *hdr)
1435 {
1436 	struct vmbus_channel_msginfo *msginfo;
1437 	struct vmbus_channel_message_header *requestheader;
1438 	struct vmbus_channel_version_response *version_response;
1439 	unsigned long flags;
1440 
1441 	version_response = (struct vmbus_channel_version_response *)hdr;
1442 
1443 	trace_vmbus_onversion_response(version_response);
1444 
1445 	spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
1446 
1447 	list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
1448 				msglistentry) {
1449 		requestheader =
1450 			(struct vmbus_channel_message_header *)msginfo->msg;
1451 
1452 		if (requestheader->msgtype ==
1453 		    CHANNELMSG_INITIATE_CONTACT) {
1454 			memcpy(&msginfo->response.version_response,
1455 			      version_response,
1456 			      sizeof(struct vmbus_channel_version_response));
1457 			complete(&msginfo->waitevent);
1458 		}
1459 	}
1460 	spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
1461 }
1462 
1463 /* Channel message dispatch table */
1464 const struct vmbus_channel_message_table_entry
1465 channel_message_table[CHANNELMSG_COUNT] = {
1466 	{ CHANNELMSG_INVALID,			0, NULL, 0},
1467 	{ CHANNELMSG_OFFERCHANNEL,		0, vmbus_onoffer,
1468 		sizeof(struct vmbus_channel_offer_channel)},
1469 	{ CHANNELMSG_RESCIND_CHANNELOFFER,	0, vmbus_onoffer_rescind,
1470 		sizeof(struct vmbus_channel_rescind_offer) },
1471 	{ CHANNELMSG_REQUESTOFFERS,		0, NULL, 0},
1472 	{ CHANNELMSG_ALLOFFERS_DELIVERED,	1, vmbus_onoffers_delivered, 0},
1473 	{ CHANNELMSG_OPENCHANNEL,		0, NULL, 0},
1474 	{ CHANNELMSG_OPENCHANNEL_RESULT,	1, vmbus_onopen_result,
1475 		sizeof(struct vmbus_channel_open_result)},
1476 	{ CHANNELMSG_CLOSECHANNEL,		0, NULL, 0},
1477 	{ CHANNELMSG_GPADL_HEADER,		0, NULL, 0},
1478 	{ CHANNELMSG_GPADL_BODY,		0, NULL, 0},
1479 	{ CHANNELMSG_GPADL_CREATED,		1, vmbus_ongpadl_created,
1480 		sizeof(struct vmbus_channel_gpadl_created)},
1481 	{ CHANNELMSG_GPADL_TEARDOWN,		0, NULL, 0},
1482 	{ CHANNELMSG_GPADL_TORNDOWN,		1, vmbus_ongpadl_torndown,
1483 		sizeof(struct vmbus_channel_gpadl_torndown) },
1484 	{ CHANNELMSG_RELID_RELEASED,		0, NULL, 0},
1485 	{ CHANNELMSG_INITIATE_CONTACT,		0, NULL, 0},
1486 	{ CHANNELMSG_VERSION_RESPONSE,		1, vmbus_onversion_response,
1487 		sizeof(struct vmbus_channel_version_response)},
1488 	{ CHANNELMSG_UNLOAD,			0, NULL, 0},
1489 	{ CHANNELMSG_UNLOAD_RESPONSE,		1, vmbus_unload_response, 0},
1490 	{ CHANNELMSG_18,			0, NULL, 0},
1491 	{ CHANNELMSG_19,			0, NULL, 0},
1492 	{ CHANNELMSG_20,			0, NULL, 0},
1493 	{ CHANNELMSG_TL_CONNECT_REQUEST,	0, NULL, 0},
1494 	{ CHANNELMSG_MODIFYCHANNEL,		0, NULL, 0},
1495 	{ CHANNELMSG_TL_CONNECT_RESULT,		0, NULL, 0},
1496 	{ CHANNELMSG_MODIFYCHANNEL_RESPONSE,	1, vmbus_onmodifychannel_response,
1497 		sizeof(struct vmbus_channel_modifychannel_response)},
1498 };
1499 
1500 /*
1501  * vmbus_onmessage - Handler for channel protocol messages.
1502  *
1503  * This is invoked in the vmbus worker thread context.
1504  */
1505 void vmbus_onmessage(struct vmbus_channel_message_header *hdr)
1506 {
1507 	trace_vmbus_on_message(hdr);
1508 
1509 	/*
1510 	 * vmbus_on_msg_dpc() makes sure the hdr->msgtype here can not go
1511 	 * out of bound and the message_handler pointer can not be NULL.
1512 	 */
1513 	channel_message_table[hdr->msgtype].message_handler(hdr);
1514 }
1515 
1516 /*
1517  * vmbus_request_offers - Send a request to get all our pending offers.
1518  */
1519 int vmbus_request_offers(void)
1520 {
1521 	struct vmbus_channel_message_header *msg;
1522 	struct vmbus_channel_msginfo *msginfo;
1523 	int ret;
1524 
1525 	msginfo = kmalloc(sizeof(*msginfo) +
1526 			  sizeof(struct vmbus_channel_message_header),
1527 			  GFP_KERNEL);
1528 	if (!msginfo)
1529 		return -ENOMEM;
1530 
1531 	msg = (struct vmbus_channel_message_header *)msginfo->msg;
1532 
1533 	msg->msgtype = CHANNELMSG_REQUESTOFFERS;
1534 
1535 	ret = vmbus_post_msg(msg, sizeof(struct vmbus_channel_message_header),
1536 			     true);
1537 
1538 	trace_vmbus_request_offers(ret);
1539 
1540 	if (ret != 0) {
1541 		pr_err("Unable to request offers - %d\n", ret);
1542 
1543 		goto cleanup;
1544 	}
1545 
1546 cleanup:
1547 	kfree(msginfo);
1548 
1549 	return ret;
1550 }
1551 
1552 static void invoke_sc_cb(struct vmbus_channel *primary_channel)
1553 {
1554 	struct list_head *cur, *tmp;
1555 	struct vmbus_channel *cur_channel;
1556 
1557 	if (primary_channel->sc_creation_callback == NULL)
1558 		return;
1559 
1560 	list_for_each_safe(cur, tmp, &primary_channel->sc_list) {
1561 		cur_channel = list_entry(cur, struct vmbus_channel, sc_list);
1562 
1563 		primary_channel->sc_creation_callback(cur_channel);
1564 	}
1565 }
1566 
1567 void vmbus_set_sc_create_callback(struct vmbus_channel *primary_channel,
1568 				void (*sc_cr_cb)(struct vmbus_channel *new_sc))
1569 {
1570 	primary_channel->sc_creation_callback = sc_cr_cb;
1571 }
1572 EXPORT_SYMBOL_GPL(vmbus_set_sc_create_callback);
1573 
1574 bool vmbus_are_subchannels_present(struct vmbus_channel *primary)
1575 {
1576 	bool ret;
1577 
1578 	ret = !list_empty(&primary->sc_list);
1579 
1580 	if (ret) {
1581 		/*
1582 		 * Invoke the callback on sub-channel creation.
1583 		 * This will present a uniform interface to the
1584 		 * clients.
1585 		 */
1586 		invoke_sc_cb(primary);
1587 	}
1588 
1589 	return ret;
1590 }
1591 EXPORT_SYMBOL_GPL(vmbus_are_subchannels_present);
1592 
1593 void vmbus_set_chn_rescind_callback(struct vmbus_channel *channel,
1594 		void (*chn_rescind_cb)(struct vmbus_channel *))
1595 {
1596 	channel->chn_rescind_callback = chn_rescind_cb;
1597 }
1598 EXPORT_SYMBOL_GPL(vmbus_set_chn_rescind_callback);
1599