xref: /openbmc/linux/drivers/hv/channel_mgmt.c (revision f71a261a)
1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3  * Copyright (c) 2009, Microsoft Corporation.
4  *
5  * Authors:
6  *   Haiyang Zhang <haiyangz@microsoft.com>
7  *   Hank Janssen  <hjanssen@microsoft.com>
8  */
9 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
10 
11 #include <linux/kernel.h>
12 #include <linux/interrupt.h>
13 #include <linux/sched.h>
14 #include <linux/wait.h>
15 #include <linux/mm.h>
16 #include <linux/slab.h>
17 #include <linux/list.h>
18 #include <linux/module.h>
19 #include <linux/completion.h>
20 #include <linux/delay.h>
21 #include <linux/cpu.h>
22 #include <linux/hyperv.h>
23 #include <asm/mshyperv.h>
24 
25 #include "hyperv_vmbus.h"
26 
27 static void init_vp_index(struct vmbus_channel *channel);
28 
29 const struct vmbus_device vmbus_devs[] = {
30 	/* IDE */
31 	{ .dev_type = HV_IDE,
32 	  HV_IDE_GUID,
33 	  .perf_device = true,
34 	  .allowed_in_isolated = false,
35 	},
36 
37 	/* SCSI */
38 	{ .dev_type = HV_SCSI,
39 	  HV_SCSI_GUID,
40 	  .perf_device = true,
41 	  .allowed_in_isolated = true,
42 	},
43 
44 	/* Fibre Channel */
45 	{ .dev_type = HV_FC,
46 	  HV_SYNTHFC_GUID,
47 	  .perf_device = true,
48 	  .allowed_in_isolated = false,
49 	},
50 
51 	/* Synthetic NIC */
52 	{ .dev_type = HV_NIC,
53 	  HV_NIC_GUID,
54 	  .perf_device = true,
55 	  .allowed_in_isolated = true,
56 	},
57 
58 	/* Network Direct */
59 	{ .dev_type = HV_ND,
60 	  HV_ND_GUID,
61 	  .perf_device = true,
62 	  .allowed_in_isolated = false,
63 	},
64 
65 	/* PCIE */
66 	{ .dev_type = HV_PCIE,
67 	  HV_PCIE_GUID,
68 	  .perf_device = false,
69 	  .allowed_in_isolated = false,
70 	},
71 
72 	/* Synthetic Frame Buffer */
73 	{ .dev_type = HV_FB,
74 	  HV_SYNTHVID_GUID,
75 	  .perf_device = false,
76 	  .allowed_in_isolated = false,
77 	},
78 
79 	/* Synthetic Keyboard */
80 	{ .dev_type = HV_KBD,
81 	  HV_KBD_GUID,
82 	  .perf_device = false,
83 	  .allowed_in_isolated = false,
84 	},
85 
86 	/* Synthetic MOUSE */
87 	{ .dev_type = HV_MOUSE,
88 	  HV_MOUSE_GUID,
89 	  .perf_device = false,
90 	  .allowed_in_isolated = false,
91 	},
92 
93 	/* KVP */
94 	{ .dev_type = HV_KVP,
95 	  HV_KVP_GUID,
96 	  .perf_device = false,
97 	  .allowed_in_isolated = false,
98 	},
99 
100 	/* Time Synch */
101 	{ .dev_type = HV_TS,
102 	  HV_TS_GUID,
103 	  .perf_device = false,
104 	  .allowed_in_isolated = true,
105 	},
106 
107 	/* Heartbeat */
108 	{ .dev_type = HV_HB,
109 	  HV_HEART_BEAT_GUID,
110 	  .perf_device = false,
111 	  .allowed_in_isolated = true,
112 	},
113 
114 	/* Shutdown */
115 	{ .dev_type = HV_SHUTDOWN,
116 	  HV_SHUTDOWN_GUID,
117 	  .perf_device = false,
118 	  .allowed_in_isolated = true,
119 	},
120 
121 	/* File copy */
122 	{ .dev_type = HV_FCOPY,
123 	  HV_FCOPY_GUID,
124 	  .perf_device = false,
125 	  .allowed_in_isolated = false,
126 	},
127 
128 	/* Backup */
129 	{ .dev_type = HV_BACKUP,
130 	  HV_VSS_GUID,
131 	  .perf_device = false,
132 	  .allowed_in_isolated = false,
133 	},
134 
135 	/* Dynamic Memory */
136 	{ .dev_type = HV_DM,
137 	  HV_DM_GUID,
138 	  .perf_device = false,
139 	  .allowed_in_isolated = false,
140 	},
141 
142 	/* Unknown GUID */
143 	{ .dev_type = HV_UNKNOWN,
144 	  .perf_device = false,
145 	  .allowed_in_isolated = false,
146 	},
147 };
148 
149 static const struct {
150 	guid_t guid;
151 } vmbus_unsupported_devs[] = {
152 	{ HV_AVMA1_GUID },
153 	{ HV_AVMA2_GUID },
154 	{ HV_RDV_GUID	},
155 	{ HV_IMC_GUID	},
156 };
157 
158 /*
159  * The rescinded channel may be blocked waiting for a response from the host;
160  * take care of that.
161  */
162 static void vmbus_rescind_cleanup(struct vmbus_channel *channel)
163 {
164 	struct vmbus_channel_msginfo *msginfo;
165 	unsigned long flags;
166 
167 
168 	spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
169 	channel->rescind = true;
170 	list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
171 				msglistentry) {
172 
173 		if (msginfo->waiting_channel == channel) {
174 			complete(&msginfo->waitevent);
175 			break;
176 		}
177 	}
178 	spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
179 }
180 
181 static bool is_unsupported_vmbus_devs(const guid_t *guid)
182 {
183 	int i;
184 
185 	for (i = 0; i < ARRAY_SIZE(vmbus_unsupported_devs); i++)
186 		if (guid_equal(guid, &vmbus_unsupported_devs[i].guid))
187 			return true;
188 	return false;
189 }
190 
191 static u16 hv_get_dev_type(const struct vmbus_channel *channel)
192 {
193 	const guid_t *guid = &channel->offermsg.offer.if_type;
194 	u16 i;
195 
196 	if (is_hvsock_channel(channel) || is_unsupported_vmbus_devs(guid))
197 		return HV_UNKNOWN;
198 
199 	for (i = HV_IDE; i < HV_UNKNOWN; i++) {
200 		if (guid_equal(guid, &vmbus_devs[i].guid))
201 			return i;
202 	}
203 	pr_info("Unknown GUID: %pUl\n", guid);
204 	return i;
205 }
206 
207 /**
208  * vmbus_prep_negotiate_resp() - Create default response for Negotiate message
209  * @icmsghdrp: Pointer to msg header structure
210  * @buf: Raw buffer channel data
211  * @buflen: Length of the raw buffer channel data.
212  * @fw_version: The framework versions we can support.
213  * @fw_vercnt: The size of @fw_version.
214  * @srv_version: The service versions we can support.
215  * @srv_vercnt: The size of @srv_version.
216  * @nego_fw_version: The selected framework version.
217  * @nego_srv_version: The selected service version.
218  *
219  * Note: Versions are given in decreasing order.
220  *
221  * Set up and fill in default negotiate response message.
222  * Mainly used by Hyper-V drivers.
223  */
224 bool vmbus_prep_negotiate_resp(struct icmsg_hdr *icmsghdrp, u8 *buf,
225 				u32 buflen, const int *fw_version, int fw_vercnt,
226 				const int *srv_version, int srv_vercnt,
227 				int *nego_fw_version, int *nego_srv_version)
228 {
229 	int icframe_major, icframe_minor;
230 	int icmsg_major, icmsg_minor;
231 	int fw_major, fw_minor;
232 	int srv_major, srv_minor;
233 	int i, j;
234 	bool found_match = false;
235 	struct icmsg_negotiate *negop;
236 
237 	/* Check that there's enough space for icframe_vercnt, icmsg_vercnt */
238 	if (buflen < ICMSG_HDR + offsetof(struct icmsg_negotiate, reserved)) {
239 		pr_err_ratelimited("Invalid icmsg negotiate\n");
240 		return false;
241 	}
242 
243 	icmsghdrp->icmsgsize = 0x10;
244 	negop = (struct icmsg_negotiate *)&buf[ICMSG_HDR];
245 
246 	icframe_major = negop->icframe_vercnt;
247 	icframe_minor = 0;
248 
249 	icmsg_major = negop->icmsg_vercnt;
250 	icmsg_minor = 0;
251 
252 	/* Validate negop packet */
253 	if (icframe_major > IC_VERSION_NEGOTIATION_MAX_VER_COUNT ||
254 	    icmsg_major > IC_VERSION_NEGOTIATION_MAX_VER_COUNT ||
255 	    ICMSG_NEGOTIATE_PKT_SIZE(icframe_major, icmsg_major) > buflen) {
256 		pr_err_ratelimited("Invalid icmsg negotiate - icframe_major: %u, icmsg_major: %u\n",
257 				   icframe_major, icmsg_major);
258 		goto fw_error;
259 	}
260 
261 	/*
262 	 * Select the framework version number we will
263 	 * support.
264 	 */
265 
266 	for (i = 0; i < fw_vercnt; i++) {
267 		fw_major = (fw_version[i] >> 16);
268 		fw_minor = (fw_version[i] & 0xFFFF);
269 
270 		for (j = 0; j < negop->icframe_vercnt; j++) {
271 			if ((negop->icversion_data[j].major == fw_major) &&
272 			    (negop->icversion_data[j].minor == fw_minor)) {
273 				icframe_major = negop->icversion_data[j].major;
274 				icframe_minor = negop->icversion_data[j].minor;
275 				found_match = true;
276 				break;
277 			}
278 		}
279 
280 		if (found_match)
281 			break;
282 	}
283 
284 	if (!found_match)
285 		goto fw_error;
286 
287 	found_match = false;
288 
289 	for (i = 0; i < srv_vercnt; i++) {
290 		srv_major = (srv_version[i] >> 16);
291 		srv_minor = (srv_version[i] & 0xFFFF);
292 
293 		for (j = negop->icframe_vercnt;
294 			(j < negop->icframe_vercnt + negop->icmsg_vercnt);
295 			j++) {
296 
297 			if ((negop->icversion_data[j].major == srv_major) &&
298 				(negop->icversion_data[j].minor == srv_minor)) {
299 
300 				icmsg_major = negop->icversion_data[j].major;
301 				icmsg_minor = negop->icversion_data[j].minor;
302 				found_match = true;
303 				break;
304 			}
305 		}
306 
307 		if (found_match)
308 			break;
309 	}
310 
311 	/*
312 	 * Respond with the framework and service
313 	 * version numbers we can support.
314 	 */
315 
316 fw_error:
317 	if (!found_match) {
318 		negop->icframe_vercnt = 0;
319 		negop->icmsg_vercnt = 0;
320 	} else {
321 		negop->icframe_vercnt = 1;
322 		negop->icmsg_vercnt = 1;
323 	}
324 
325 	if (nego_fw_version)
326 		*nego_fw_version = (icframe_major << 16) | icframe_minor;
327 
328 	if (nego_srv_version)
329 		*nego_srv_version = (icmsg_major << 16) | icmsg_minor;
330 
331 	negop->icversion_data[0].major = icframe_major;
332 	negop->icversion_data[0].minor = icframe_minor;
333 	negop->icversion_data[1].major = icmsg_major;
334 	negop->icversion_data[1].minor = icmsg_minor;
335 	return found_match;
336 }
337 EXPORT_SYMBOL_GPL(vmbus_prep_negotiate_resp);
338 
339 /*
340  * alloc_channel - Allocate and initialize a vmbus channel object
341  */
342 static struct vmbus_channel *alloc_channel(void)
343 {
344 	struct vmbus_channel *channel;
345 
346 	channel = kzalloc(sizeof(*channel), GFP_ATOMIC);
347 	if (!channel)
348 		return NULL;
349 
350 	spin_lock_init(&channel->sched_lock);
351 	init_completion(&channel->rescind_event);
352 
353 	INIT_LIST_HEAD(&channel->sc_list);
354 
355 	tasklet_init(&channel->callback_event,
356 		     vmbus_on_event, (unsigned long)channel);
357 
358 	hv_ringbuffer_pre_init(channel);
359 
360 	return channel;
361 }
362 
363 /*
364  * free_channel - Release the resources used by the vmbus channel object
365  */
366 static void free_channel(struct vmbus_channel *channel)
367 {
368 	tasklet_kill(&channel->callback_event);
369 	vmbus_remove_channel_attr_group(channel);
370 
371 	kobject_put(&channel->kobj);
372 }
373 
374 void vmbus_channel_map_relid(struct vmbus_channel *channel)
375 {
376 	if (WARN_ON(channel->offermsg.child_relid >= MAX_CHANNEL_RELIDS))
377 		return;
378 	/*
379 	 * The mapping of the channel's relid is visible from the CPUs that
380 	 * execute vmbus_chan_sched() by the time that vmbus_chan_sched() will
381 	 * execute:
382 	 *
383 	 *  (a) In the "normal (i.e., not resuming from hibernation)" path,
384 	 *      the full barrier in virt_store_mb() guarantees that the store
385 	 *      is propagated to all CPUs before the add_channel_work work
386 	 *      is queued.  In turn, add_channel_work is queued before the
387 	 *      channel's ring buffer is allocated/initialized and the
388 	 *      OPENCHANNEL message for the channel is sent in vmbus_open().
389 	 *      Hyper-V won't start sending the interrupts for the channel
390 	 *      before the OPENCHANNEL message is acked.  The memory barrier
391 	 *      in vmbus_chan_sched() -> sync_test_and_clear_bit() ensures
392 	 *      that vmbus_chan_sched() must find the channel's relid in
393 	 *      recv_int_page before retrieving the channel pointer from the
394 	 *      array of channels.
395 	 *
396 	 *  (b) In the "resuming from hibernation" path, the virt_store_mb()
397 	 *      guarantees that the store is propagated to all CPUs before
398 	 *      the VMBus connection is marked as ready for the resume event
399 	 *      (cf. check_ready_for_resume_event()).  The interrupt handler
400 	 *      of the VMBus driver and vmbus_chan_sched() can not run before
401 	 *      vmbus_bus_resume() has completed execution (cf. resume_noirq).
402 	 */
403 	virt_store_mb(
404 		vmbus_connection.channels[channel->offermsg.child_relid],
405 		channel);
406 }
407 
408 void vmbus_channel_unmap_relid(struct vmbus_channel *channel)
409 {
410 	if (WARN_ON(channel->offermsg.child_relid >= MAX_CHANNEL_RELIDS))
411 		return;
412 	WRITE_ONCE(
413 		vmbus_connection.channels[channel->offermsg.child_relid],
414 		NULL);
415 }
416 
417 static void vmbus_release_relid(u32 relid)
418 {
419 	struct vmbus_channel_relid_released msg;
420 	int ret;
421 
422 	memset(&msg, 0, sizeof(struct vmbus_channel_relid_released));
423 	msg.child_relid = relid;
424 	msg.header.msgtype = CHANNELMSG_RELID_RELEASED;
425 	ret = vmbus_post_msg(&msg, sizeof(struct vmbus_channel_relid_released),
426 			     true);
427 
428 	trace_vmbus_release_relid(&msg, ret);
429 }
430 
431 void hv_process_channel_removal(struct vmbus_channel *channel)
432 {
433 	lockdep_assert_held(&vmbus_connection.channel_mutex);
434 	BUG_ON(!channel->rescind);
435 
436 	/*
437 	 * hv_process_channel_removal() could find INVALID_RELID only for
438 	 * hv_sock channels.  See the inline comments in vmbus_onoffer().
439 	 */
440 	WARN_ON(channel->offermsg.child_relid == INVALID_RELID &&
441 		!is_hvsock_channel(channel));
442 
443 	/*
444 	 * Upon suspend, an in-use hv_sock channel is removed from the array of
445 	 * channels and the relid is invalidated.  After hibernation, when the
446 	 * user-space application destroys the channel, it's unnecessary and
447 	 * unsafe to remove the channel from the array of channels.  See also
448 	 * the inline comments before the call of vmbus_release_relid() below.
449 	 */
450 	if (channel->offermsg.child_relid != INVALID_RELID)
451 		vmbus_channel_unmap_relid(channel);
452 
453 	if (channel->primary_channel == NULL)
454 		list_del(&channel->listentry);
455 	else
456 		list_del(&channel->sc_list);
457 
458 	/*
459 	 * If this is a "perf" channel, updates the hv_numa_map[] masks so that
460 	 * init_vp_index() can (re-)use the CPU.
461 	 */
462 	if (hv_is_perf_channel(channel))
463 		hv_clear_allocated_cpu(channel->target_cpu);
464 
465 	/*
466 	 * Upon suspend, an in-use hv_sock channel is marked as "rescinded" and
467 	 * the relid is invalidated; after hibernation, when the user-space app
468 	 * destroys the channel, the relid is INVALID_RELID, and in this case
469 	 * it's unnecessary and unsafe to release the old relid, since the same
470 	 * relid can refer to a completely different channel now.
471 	 */
472 	if (channel->offermsg.child_relid != INVALID_RELID)
473 		vmbus_release_relid(channel->offermsg.child_relid);
474 
475 	free_channel(channel);
476 }
477 
478 void vmbus_free_channels(void)
479 {
480 	struct vmbus_channel *channel, *tmp;
481 
482 	list_for_each_entry_safe(channel, tmp, &vmbus_connection.chn_list,
483 		listentry) {
484 		/* hv_process_channel_removal() needs this */
485 		channel->rescind = true;
486 
487 		vmbus_device_unregister(channel->device_obj);
488 	}
489 }
490 
491 /* Note: the function can run concurrently for primary/sub channels. */
492 static void vmbus_add_channel_work(struct work_struct *work)
493 {
494 	struct vmbus_channel *newchannel =
495 		container_of(work, struct vmbus_channel, add_channel_work);
496 	struct vmbus_channel *primary_channel = newchannel->primary_channel;
497 	int ret;
498 
499 	/*
500 	 * This state is used to indicate a successful open
501 	 * so that when we do close the channel normally, we
502 	 * can cleanup properly.
503 	 */
504 	newchannel->state = CHANNEL_OPEN_STATE;
505 
506 	if (primary_channel != NULL) {
507 		/* newchannel is a sub-channel. */
508 		struct hv_device *dev = primary_channel->device_obj;
509 
510 		if (vmbus_add_channel_kobj(dev, newchannel))
511 			goto err_deq_chan;
512 
513 		if (primary_channel->sc_creation_callback != NULL)
514 			primary_channel->sc_creation_callback(newchannel);
515 
516 		newchannel->probe_done = true;
517 		return;
518 	}
519 
520 	/*
521 	 * Start the process of binding the primary channel to the driver
522 	 */
523 	newchannel->device_obj = vmbus_device_create(
524 		&newchannel->offermsg.offer.if_type,
525 		&newchannel->offermsg.offer.if_instance,
526 		newchannel);
527 	if (!newchannel->device_obj)
528 		goto err_deq_chan;
529 
530 	newchannel->device_obj->device_id = newchannel->device_id;
531 	/*
532 	 * Add the new device to the bus. This will kick off device-driver
533 	 * binding which eventually invokes the device driver's AddDevice()
534 	 * method.
535 	 */
536 	ret = vmbus_device_register(newchannel->device_obj);
537 
538 	if (ret != 0) {
539 		pr_err("unable to add child device object (relid %d)\n",
540 			newchannel->offermsg.child_relid);
541 		kfree(newchannel->device_obj);
542 		goto err_deq_chan;
543 	}
544 
545 	newchannel->probe_done = true;
546 	return;
547 
548 err_deq_chan:
549 	mutex_lock(&vmbus_connection.channel_mutex);
550 
551 	/*
552 	 * We need to set the flag, otherwise
553 	 * vmbus_onoffer_rescind() can be blocked.
554 	 */
555 	newchannel->probe_done = true;
556 
557 	if (primary_channel == NULL)
558 		list_del(&newchannel->listentry);
559 	else
560 		list_del(&newchannel->sc_list);
561 
562 	/* vmbus_process_offer() has mapped the channel. */
563 	vmbus_channel_unmap_relid(newchannel);
564 
565 	mutex_unlock(&vmbus_connection.channel_mutex);
566 
567 	vmbus_release_relid(newchannel->offermsg.child_relid);
568 
569 	free_channel(newchannel);
570 }
571 
572 /*
573  * vmbus_process_offer - Process the offer by creating a channel/device
574  * associated with this offer
575  */
576 static void vmbus_process_offer(struct vmbus_channel *newchannel)
577 {
578 	struct vmbus_channel *channel;
579 	struct workqueue_struct *wq;
580 	bool fnew = true;
581 
582 	/*
583 	 * Synchronize vmbus_process_offer() and CPU hotplugging:
584 	 *
585 	 * CPU1				CPU2
586 	 *
587 	 * [vmbus_process_offer()]	[Hot removal of the CPU]
588 	 *
589 	 * CPU_READ_LOCK		CPUS_WRITE_LOCK
590 	 * LOAD cpu_online_mask		SEARCH chn_list
591 	 * STORE target_cpu		LOAD target_cpu
592 	 * INSERT chn_list		STORE cpu_online_mask
593 	 * CPUS_READ_UNLOCK		CPUS_WRITE_UNLOCK
594 	 *
595 	 * Forbids: CPU1's LOAD from *not* seing CPU2's STORE &&
596 	 *              CPU2's SEARCH from *not* seeing CPU1's INSERT
597 	 *
598 	 * Forbids: CPU2's SEARCH from seeing CPU1's INSERT &&
599 	 *              CPU2's LOAD from *not* seing CPU1's STORE
600 	 */
601 	cpus_read_lock();
602 
603 	/*
604 	 * Serializes the modifications of the chn_list list as well as
605 	 * the accesses to next_numa_node_id in init_vp_index().
606 	 */
607 	mutex_lock(&vmbus_connection.channel_mutex);
608 
609 	list_for_each_entry(channel, &vmbus_connection.chn_list, listentry) {
610 		if (guid_equal(&channel->offermsg.offer.if_type,
611 			       &newchannel->offermsg.offer.if_type) &&
612 		    guid_equal(&channel->offermsg.offer.if_instance,
613 			       &newchannel->offermsg.offer.if_instance)) {
614 			fnew = false;
615 			newchannel->primary_channel = channel;
616 			break;
617 		}
618 	}
619 
620 	init_vp_index(newchannel);
621 
622 	/* Remember the channels that should be cleaned up upon suspend. */
623 	if (is_hvsock_channel(newchannel) || is_sub_channel(newchannel))
624 		atomic_inc(&vmbus_connection.nr_chan_close_on_suspend);
625 
626 	/*
627 	 * Now that we have acquired the channel_mutex,
628 	 * we can release the potentially racing rescind thread.
629 	 */
630 	atomic_dec(&vmbus_connection.offer_in_progress);
631 
632 	if (fnew) {
633 		list_add_tail(&newchannel->listentry,
634 			      &vmbus_connection.chn_list);
635 	} else {
636 		/*
637 		 * Check to see if this is a valid sub-channel.
638 		 */
639 		if (newchannel->offermsg.offer.sub_channel_index == 0) {
640 			mutex_unlock(&vmbus_connection.channel_mutex);
641 			/*
642 			 * Don't call free_channel(), because newchannel->kobj
643 			 * is not initialized yet.
644 			 */
645 			kfree(newchannel);
646 			WARN_ON_ONCE(1);
647 			return;
648 		}
649 		/*
650 		 * Process the sub-channel.
651 		 */
652 		list_add_tail(&newchannel->sc_list, &channel->sc_list);
653 	}
654 
655 	vmbus_channel_map_relid(newchannel);
656 
657 	mutex_unlock(&vmbus_connection.channel_mutex);
658 	cpus_read_unlock();
659 
660 	/*
661 	 * vmbus_process_offer() mustn't call channel->sc_creation_callback()
662 	 * directly for sub-channels, because sc_creation_callback() ->
663 	 * vmbus_open() may never get the host's response to the
664 	 * OPEN_CHANNEL message (the host may rescind a channel at any time,
665 	 * e.g. in the case of hot removing a NIC), and vmbus_onoffer_rescind()
666 	 * may not wake up the vmbus_open() as it's blocked due to a non-zero
667 	 * vmbus_connection.offer_in_progress, and finally we have a deadlock.
668 	 *
669 	 * The above is also true for primary channels, if the related device
670 	 * drivers use sync probing mode by default.
671 	 *
672 	 * And, usually the handling of primary channels and sub-channels can
673 	 * depend on each other, so we should offload them to different
674 	 * workqueues to avoid possible deadlock, e.g. in sync-probing mode,
675 	 * NIC1's netvsc_subchan_work() can race with NIC2's netvsc_probe() ->
676 	 * rtnl_lock(), and causes deadlock: the former gets the rtnl_lock
677 	 * and waits for all the sub-channels to appear, but the latter
678 	 * can't get the rtnl_lock and this blocks the handling of
679 	 * sub-channels.
680 	 */
681 	INIT_WORK(&newchannel->add_channel_work, vmbus_add_channel_work);
682 	wq = fnew ? vmbus_connection.handle_primary_chan_wq :
683 		    vmbus_connection.handle_sub_chan_wq;
684 	queue_work(wq, &newchannel->add_channel_work);
685 }
686 
687 /*
688  * Check if CPUs used by other channels of the same device.
689  * It should only be called by init_vp_index().
690  */
691 static bool hv_cpuself_used(u32 cpu, struct vmbus_channel *chn)
692 {
693 	struct vmbus_channel *primary = chn->primary_channel;
694 	struct vmbus_channel *sc;
695 
696 	lockdep_assert_held(&vmbus_connection.channel_mutex);
697 
698 	if (!primary)
699 		return false;
700 
701 	if (primary->target_cpu == cpu)
702 		return true;
703 
704 	list_for_each_entry(sc, &primary->sc_list, sc_list)
705 		if (sc != chn && sc->target_cpu == cpu)
706 			return true;
707 
708 	return false;
709 }
710 
711 /*
712  * We use this state to statically distribute the channel interrupt load.
713  */
714 static int next_numa_node_id;
715 
716 /*
717  * We can statically distribute the incoming channel interrupt load
718  * by binding a channel to VCPU.
719  *
720  * For non-performance critical channels we assign the VMBUS_CONNECT_CPU.
721  * Performance critical channels will be distributed evenly among all
722  * the available NUMA nodes.  Once the node is assigned, we will assign
723  * the CPU based on a simple round robin scheme.
724  */
725 static void init_vp_index(struct vmbus_channel *channel)
726 {
727 	bool perf_chn = hv_is_perf_channel(channel);
728 	u32 i, ncpu = num_online_cpus();
729 	cpumask_var_t available_mask;
730 	struct cpumask *allocated_mask;
731 	u32 target_cpu;
732 	int numa_node;
733 
734 	if (!perf_chn ||
735 	    !alloc_cpumask_var(&available_mask, GFP_KERNEL)) {
736 		/*
737 		 * If the channel is not a performance critical
738 		 * channel, bind it to VMBUS_CONNECT_CPU.
739 		 * In case alloc_cpumask_var() fails, bind it to
740 		 * VMBUS_CONNECT_CPU.
741 		 */
742 		channel->target_cpu = VMBUS_CONNECT_CPU;
743 		if (perf_chn)
744 			hv_set_allocated_cpu(VMBUS_CONNECT_CPU);
745 		return;
746 	}
747 
748 	for (i = 1; i <= ncpu + 1; i++) {
749 		while (true) {
750 			numa_node = next_numa_node_id++;
751 			if (numa_node == nr_node_ids) {
752 				next_numa_node_id = 0;
753 				continue;
754 			}
755 			if (cpumask_empty(cpumask_of_node(numa_node)))
756 				continue;
757 			break;
758 		}
759 		allocated_mask = &hv_context.hv_numa_map[numa_node];
760 
761 		if (cpumask_equal(allocated_mask, cpumask_of_node(numa_node))) {
762 			/*
763 			 * We have cycled through all the CPUs in the node;
764 			 * reset the allocated map.
765 			 */
766 			cpumask_clear(allocated_mask);
767 		}
768 
769 		cpumask_xor(available_mask, allocated_mask,
770 			    cpumask_of_node(numa_node));
771 
772 		target_cpu = cpumask_first(available_mask);
773 		cpumask_set_cpu(target_cpu, allocated_mask);
774 
775 		if (channel->offermsg.offer.sub_channel_index >= ncpu ||
776 		    i > ncpu || !hv_cpuself_used(target_cpu, channel))
777 			break;
778 	}
779 
780 	channel->target_cpu = target_cpu;
781 
782 	free_cpumask_var(available_mask);
783 }
784 
785 #define UNLOAD_DELAY_UNIT_MS	10		/* 10 milliseconds */
786 #define UNLOAD_WAIT_MS		(100*1000)	/* 100 seconds */
787 #define UNLOAD_WAIT_LOOPS	(UNLOAD_WAIT_MS/UNLOAD_DELAY_UNIT_MS)
788 #define UNLOAD_MSG_MS		(5*1000)	/* Every 5 seconds */
789 #define UNLOAD_MSG_LOOPS	(UNLOAD_MSG_MS/UNLOAD_DELAY_UNIT_MS)
790 
791 static void vmbus_wait_for_unload(void)
792 {
793 	int cpu;
794 	void *page_addr;
795 	struct hv_message *msg;
796 	struct vmbus_channel_message_header *hdr;
797 	u32 message_type, i;
798 
799 	/*
800 	 * CHANNELMSG_UNLOAD_RESPONSE is always delivered to the CPU which was
801 	 * used for initial contact or to CPU0 depending on host version. When
802 	 * we're crashing on a different CPU let's hope that IRQ handler on
803 	 * the cpu which receives CHANNELMSG_UNLOAD_RESPONSE is still
804 	 * functional and vmbus_unload_response() will complete
805 	 * vmbus_connection.unload_event. If not, the last thing we can do is
806 	 * read message pages for all CPUs directly.
807 	 *
808 	 * Wait up to 100 seconds since an Azure host must writeback any dirty
809 	 * data in its disk cache before the VMbus UNLOAD request will
810 	 * complete. This flushing has been empirically observed to take up
811 	 * to 50 seconds in cases with a lot of dirty data, so allow additional
812 	 * leeway and for inaccuracies in mdelay(). But eventually time out so
813 	 * that the panic path can't get hung forever in case the response
814 	 * message isn't seen.
815 	 */
816 	for (i = 1; i <= UNLOAD_WAIT_LOOPS; i++) {
817 		if (completion_done(&vmbus_connection.unload_event))
818 			goto completed;
819 
820 		for_each_online_cpu(cpu) {
821 			struct hv_per_cpu_context *hv_cpu
822 				= per_cpu_ptr(hv_context.cpu_context, cpu);
823 
824 			page_addr = hv_cpu->synic_message_page;
825 			msg = (struct hv_message *)page_addr
826 				+ VMBUS_MESSAGE_SINT;
827 
828 			message_type = READ_ONCE(msg->header.message_type);
829 			if (message_type == HVMSG_NONE)
830 				continue;
831 
832 			hdr = (struct vmbus_channel_message_header *)
833 				msg->u.payload;
834 
835 			if (hdr->msgtype == CHANNELMSG_UNLOAD_RESPONSE)
836 				complete(&vmbus_connection.unload_event);
837 
838 			vmbus_signal_eom(msg, message_type);
839 		}
840 
841 		/*
842 		 * Give a notice periodically so someone watching the
843 		 * serial output won't think it is completely hung.
844 		 */
845 		if (!(i % UNLOAD_MSG_LOOPS))
846 			pr_notice("Waiting for VMBus UNLOAD to complete\n");
847 
848 		mdelay(UNLOAD_DELAY_UNIT_MS);
849 	}
850 	pr_err("Continuing even though VMBus UNLOAD did not complete\n");
851 
852 completed:
853 	/*
854 	 * We're crashing and already got the UNLOAD_RESPONSE, cleanup all
855 	 * maybe-pending messages on all CPUs to be able to receive new
856 	 * messages after we reconnect.
857 	 */
858 	for_each_online_cpu(cpu) {
859 		struct hv_per_cpu_context *hv_cpu
860 			= per_cpu_ptr(hv_context.cpu_context, cpu);
861 
862 		page_addr = hv_cpu->synic_message_page;
863 		msg = (struct hv_message *)page_addr + VMBUS_MESSAGE_SINT;
864 		msg->header.message_type = HVMSG_NONE;
865 	}
866 }
867 
868 /*
869  * vmbus_unload_response - Handler for the unload response.
870  */
871 static void vmbus_unload_response(struct vmbus_channel_message_header *hdr)
872 {
873 	/*
874 	 * This is a global event; just wakeup the waiting thread.
875 	 * Once we successfully unload, we can cleanup the monitor state.
876 	 *
877 	 * NB.  A malicious or compromised Hyper-V could send a spurious
878 	 * message of type CHANNELMSG_UNLOAD_RESPONSE, and trigger a call
879 	 * of the complete() below.  Make sure that unload_event has been
880 	 * initialized by the time this complete() is executed.
881 	 */
882 	complete(&vmbus_connection.unload_event);
883 }
884 
885 void vmbus_initiate_unload(bool crash)
886 {
887 	struct vmbus_channel_message_header hdr;
888 
889 	if (xchg(&vmbus_connection.conn_state, DISCONNECTED) == DISCONNECTED)
890 		return;
891 
892 	/* Pre-Win2012R2 hosts don't support reconnect */
893 	if (vmbus_proto_version < VERSION_WIN8_1)
894 		return;
895 
896 	reinit_completion(&vmbus_connection.unload_event);
897 	memset(&hdr, 0, sizeof(struct vmbus_channel_message_header));
898 	hdr.msgtype = CHANNELMSG_UNLOAD;
899 	vmbus_post_msg(&hdr, sizeof(struct vmbus_channel_message_header),
900 		       !crash);
901 
902 	/*
903 	 * vmbus_initiate_unload() is also called on crash and the crash can be
904 	 * happening in an interrupt context, where scheduling is impossible.
905 	 */
906 	if (!crash)
907 		wait_for_completion(&vmbus_connection.unload_event);
908 	else
909 		vmbus_wait_for_unload();
910 }
911 
912 static void check_ready_for_resume_event(void)
913 {
914 	/*
915 	 * If all the old primary channels have been fixed up, then it's safe
916 	 * to resume.
917 	 */
918 	if (atomic_dec_and_test(&vmbus_connection.nr_chan_fixup_on_resume))
919 		complete(&vmbus_connection.ready_for_resume_event);
920 }
921 
922 static void vmbus_setup_channel_state(struct vmbus_channel *channel,
923 				      struct vmbus_channel_offer_channel *offer)
924 {
925 	/*
926 	 * Setup state for signalling the host.
927 	 */
928 	channel->sig_event = VMBUS_EVENT_CONNECTION_ID;
929 
930 	channel->is_dedicated_interrupt =
931 			(offer->is_dedicated_interrupt != 0);
932 	channel->sig_event = offer->connection_id;
933 
934 	memcpy(&channel->offermsg, offer,
935 	       sizeof(struct vmbus_channel_offer_channel));
936 	channel->monitor_grp = (u8)offer->monitorid / 32;
937 	channel->monitor_bit = (u8)offer->monitorid % 32;
938 	channel->device_id = hv_get_dev_type(channel);
939 }
940 
941 /*
942  * find_primary_channel_by_offer - Get the channel object given the new offer.
943  * This is only used in the resume path of hibernation.
944  */
945 static struct vmbus_channel *
946 find_primary_channel_by_offer(const struct vmbus_channel_offer_channel *offer)
947 {
948 	struct vmbus_channel *channel = NULL, *iter;
949 	const guid_t *inst1, *inst2;
950 
951 	/* Ignore sub-channel offers. */
952 	if (offer->offer.sub_channel_index != 0)
953 		return NULL;
954 
955 	mutex_lock(&vmbus_connection.channel_mutex);
956 
957 	list_for_each_entry(iter, &vmbus_connection.chn_list, listentry) {
958 		inst1 = &iter->offermsg.offer.if_instance;
959 		inst2 = &offer->offer.if_instance;
960 
961 		if (guid_equal(inst1, inst2)) {
962 			channel = iter;
963 			break;
964 		}
965 	}
966 
967 	mutex_unlock(&vmbus_connection.channel_mutex);
968 
969 	return channel;
970 }
971 
972 static bool vmbus_is_valid_offer(const struct vmbus_channel_offer_channel *offer)
973 {
974 	const guid_t *guid = &offer->offer.if_type;
975 	u16 i;
976 
977 	if (!hv_is_isolation_supported())
978 		return true;
979 
980 	if (is_hvsock_offer(offer))
981 		return true;
982 
983 	for (i = 0; i < ARRAY_SIZE(vmbus_devs); i++) {
984 		if (guid_equal(guid, &vmbus_devs[i].guid))
985 			return vmbus_devs[i].allowed_in_isolated;
986 	}
987 	return false;
988 }
989 
990 /*
991  * vmbus_onoffer - Handler for channel offers from vmbus in parent partition.
992  *
993  */
994 static void vmbus_onoffer(struct vmbus_channel_message_header *hdr)
995 {
996 	struct vmbus_channel_offer_channel *offer;
997 	struct vmbus_channel *oldchannel, *newchannel;
998 	size_t offer_sz;
999 
1000 	offer = (struct vmbus_channel_offer_channel *)hdr;
1001 
1002 	trace_vmbus_onoffer(offer);
1003 
1004 	if (!vmbus_is_valid_offer(offer)) {
1005 		pr_err_ratelimited("Invalid offer %d from the host supporting isolation\n",
1006 				   offer->child_relid);
1007 		atomic_dec(&vmbus_connection.offer_in_progress);
1008 		return;
1009 	}
1010 
1011 	oldchannel = find_primary_channel_by_offer(offer);
1012 
1013 	if (oldchannel != NULL) {
1014 		/*
1015 		 * We're resuming from hibernation: all the sub-channel and
1016 		 * hv_sock channels we had before the hibernation should have
1017 		 * been cleaned up, and now we must be seeing a re-offered
1018 		 * primary channel that we had before the hibernation.
1019 		 */
1020 
1021 		/*
1022 		 * { Initially: channel relid = INVALID_RELID,
1023 		 *		channels[valid_relid] = NULL }
1024 		 *
1025 		 * CPU1					CPU2
1026 		 *
1027 		 * [vmbus_onoffer()]			[vmbus_device_release()]
1028 		 *
1029 		 * LOCK channel_mutex			LOCK channel_mutex
1030 		 * STORE channel relid = valid_relid	LOAD r1 = channel relid
1031 		 * MAP_RELID channel			if (r1 != INVALID_RELID)
1032 		 * UNLOCK channel_mutex			  UNMAP_RELID channel
1033 		 *					UNLOCK channel_mutex
1034 		 *
1035 		 * Forbids: r1 == valid_relid &&
1036 		 *              channels[valid_relid] == channel
1037 		 *
1038 		 * Note.  r1 can be INVALID_RELID only for an hv_sock channel.
1039 		 * None of the hv_sock channels which were present before the
1040 		 * suspend are re-offered upon the resume.  See the WARN_ON()
1041 		 * in hv_process_channel_removal().
1042 		 */
1043 		mutex_lock(&vmbus_connection.channel_mutex);
1044 
1045 		atomic_dec(&vmbus_connection.offer_in_progress);
1046 
1047 		WARN_ON(oldchannel->offermsg.child_relid != INVALID_RELID);
1048 		/* Fix up the relid. */
1049 		oldchannel->offermsg.child_relid = offer->child_relid;
1050 
1051 		offer_sz = sizeof(*offer);
1052 		if (memcmp(offer, &oldchannel->offermsg, offer_sz) != 0) {
1053 			/*
1054 			 * This is not an error, since the host can also change
1055 			 * the other field(s) of the offer, e.g. on WS RS5
1056 			 * (Build 17763), the offer->connection_id of the
1057 			 * Mellanox VF vmbus device can change when the host
1058 			 * reoffers the device upon resume.
1059 			 */
1060 			pr_debug("vmbus offer changed: relid=%d\n",
1061 				 offer->child_relid);
1062 
1063 			print_hex_dump_debug("Old vmbus offer: ",
1064 					     DUMP_PREFIX_OFFSET, 16, 4,
1065 					     &oldchannel->offermsg, offer_sz,
1066 					     false);
1067 			print_hex_dump_debug("New vmbus offer: ",
1068 					     DUMP_PREFIX_OFFSET, 16, 4,
1069 					     offer, offer_sz, false);
1070 
1071 			/* Fix up the old channel. */
1072 			vmbus_setup_channel_state(oldchannel, offer);
1073 		}
1074 
1075 		/* Add the channel back to the array of channels. */
1076 		vmbus_channel_map_relid(oldchannel);
1077 		check_ready_for_resume_event();
1078 
1079 		mutex_unlock(&vmbus_connection.channel_mutex);
1080 		return;
1081 	}
1082 
1083 	/* Allocate the channel object and save this offer. */
1084 	newchannel = alloc_channel();
1085 	if (!newchannel) {
1086 		vmbus_release_relid(offer->child_relid);
1087 		atomic_dec(&vmbus_connection.offer_in_progress);
1088 		pr_err("Unable to allocate channel object\n");
1089 		return;
1090 	}
1091 
1092 	vmbus_setup_channel_state(newchannel, offer);
1093 
1094 	vmbus_process_offer(newchannel);
1095 }
1096 
1097 static void check_ready_for_suspend_event(void)
1098 {
1099 	/*
1100 	 * If all the sub-channels or hv_sock channels have been cleaned up,
1101 	 * then it's safe to suspend.
1102 	 */
1103 	if (atomic_dec_and_test(&vmbus_connection.nr_chan_close_on_suspend))
1104 		complete(&vmbus_connection.ready_for_suspend_event);
1105 }
1106 
1107 /*
1108  * vmbus_onoffer_rescind - Rescind offer handler.
1109  *
1110  * We queue a work item to process this offer synchronously
1111  */
1112 static void vmbus_onoffer_rescind(struct vmbus_channel_message_header *hdr)
1113 {
1114 	struct vmbus_channel_rescind_offer *rescind;
1115 	struct vmbus_channel *channel;
1116 	struct device *dev;
1117 	bool clean_up_chan_for_suspend;
1118 
1119 	rescind = (struct vmbus_channel_rescind_offer *)hdr;
1120 
1121 	trace_vmbus_onoffer_rescind(rescind);
1122 
1123 	/*
1124 	 * The offer msg and the corresponding rescind msg
1125 	 * from the host are guranteed to be ordered -
1126 	 * offer comes in first and then the rescind.
1127 	 * Since we process these events in work elements,
1128 	 * and with preemption, we may end up processing
1129 	 * the events out of order.  We rely on the synchronization
1130 	 * provided by offer_in_progress and by channel_mutex for
1131 	 * ordering these events:
1132 	 *
1133 	 * { Initially: offer_in_progress = 1 }
1134 	 *
1135 	 * CPU1				CPU2
1136 	 *
1137 	 * [vmbus_onoffer()]		[vmbus_onoffer_rescind()]
1138 	 *
1139 	 * LOCK channel_mutex		WAIT_ON offer_in_progress == 0
1140 	 * DECREMENT offer_in_progress	LOCK channel_mutex
1141 	 * STORE channels[]		LOAD channels[]
1142 	 * UNLOCK channel_mutex		UNLOCK channel_mutex
1143 	 *
1144 	 * Forbids: CPU2's LOAD from *not* seeing CPU1's STORE
1145 	 */
1146 
1147 	while (atomic_read(&vmbus_connection.offer_in_progress) != 0) {
1148 		/*
1149 		 * We wait here until any channel offer is currently
1150 		 * being processed.
1151 		 */
1152 		msleep(1);
1153 	}
1154 
1155 	mutex_lock(&vmbus_connection.channel_mutex);
1156 	channel = relid2channel(rescind->child_relid);
1157 	if (channel != NULL) {
1158 		/*
1159 		 * Guarantee that no other instance of vmbus_onoffer_rescind()
1160 		 * has got a reference to the channel object.  Synchronize on
1161 		 * &vmbus_connection.channel_mutex.
1162 		 */
1163 		if (channel->rescind_ref) {
1164 			mutex_unlock(&vmbus_connection.channel_mutex);
1165 			return;
1166 		}
1167 		channel->rescind_ref = true;
1168 	}
1169 	mutex_unlock(&vmbus_connection.channel_mutex);
1170 
1171 	if (channel == NULL) {
1172 		/*
1173 		 * We failed in processing the offer message;
1174 		 * we would have cleaned up the relid in that
1175 		 * failure path.
1176 		 */
1177 		return;
1178 	}
1179 
1180 	clean_up_chan_for_suspend = is_hvsock_channel(channel) ||
1181 				    is_sub_channel(channel);
1182 	/*
1183 	 * Before setting channel->rescind in vmbus_rescind_cleanup(), we
1184 	 * should make sure the channel callback is not running any more.
1185 	 */
1186 	vmbus_reset_channel_cb(channel);
1187 
1188 	/*
1189 	 * Now wait for offer handling to complete.
1190 	 */
1191 	vmbus_rescind_cleanup(channel);
1192 	while (READ_ONCE(channel->probe_done) == false) {
1193 		/*
1194 		 * We wait here until any channel offer is currently
1195 		 * being processed.
1196 		 */
1197 		msleep(1);
1198 	}
1199 
1200 	/*
1201 	 * At this point, the rescind handling can proceed safely.
1202 	 */
1203 
1204 	if (channel->device_obj) {
1205 		if (channel->chn_rescind_callback) {
1206 			channel->chn_rescind_callback(channel);
1207 
1208 			if (clean_up_chan_for_suspend)
1209 				check_ready_for_suspend_event();
1210 
1211 			return;
1212 		}
1213 		/*
1214 		 * We will have to unregister this device from the
1215 		 * driver core.
1216 		 */
1217 		dev = get_device(&channel->device_obj->device);
1218 		if (dev) {
1219 			vmbus_device_unregister(channel->device_obj);
1220 			put_device(dev);
1221 		}
1222 	} else if (channel->primary_channel != NULL) {
1223 		/*
1224 		 * Sub-channel is being rescinded. Following is the channel
1225 		 * close sequence when initiated from the driveri (refer to
1226 		 * vmbus_close() for details):
1227 		 * 1. Close all sub-channels first
1228 		 * 2. Then close the primary channel.
1229 		 */
1230 		mutex_lock(&vmbus_connection.channel_mutex);
1231 		if (channel->state == CHANNEL_OPEN_STATE) {
1232 			/*
1233 			 * The channel is currently not open;
1234 			 * it is safe for us to cleanup the channel.
1235 			 */
1236 			hv_process_channel_removal(channel);
1237 		} else {
1238 			complete(&channel->rescind_event);
1239 		}
1240 		mutex_unlock(&vmbus_connection.channel_mutex);
1241 	}
1242 
1243 	/* The "channel" may have been freed. Do not access it any longer. */
1244 
1245 	if (clean_up_chan_for_suspend)
1246 		check_ready_for_suspend_event();
1247 }
1248 
1249 void vmbus_hvsock_device_unregister(struct vmbus_channel *channel)
1250 {
1251 	BUG_ON(!is_hvsock_channel(channel));
1252 
1253 	/* We always get a rescind msg when a connection is closed. */
1254 	while (!READ_ONCE(channel->probe_done) || !READ_ONCE(channel->rescind))
1255 		msleep(1);
1256 
1257 	vmbus_device_unregister(channel->device_obj);
1258 }
1259 EXPORT_SYMBOL_GPL(vmbus_hvsock_device_unregister);
1260 
1261 
1262 /*
1263  * vmbus_onoffers_delivered -
1264  * This is invoked when all offers have been delivered.
1265  *
1266  * Nothing to do here.
1267  */
1268 static void vmbus_onoffers_delivered(
1269 			struct vmbus_channel_message_header *hdr)
1270 {
1271 }
1272 
1273 /*
1274  * vmbus_onopen_result - Open result handler.
1275  *
1276  * This is invoked when we received a response to our channel open request.
1277  * Find the matching request, copy the response and signal the requesting
1278  * thread.
1279  */
1280 static void vmbus_onopen_result(struct vmbus_channel_message_header *hdr)
1281 {
1282 	struct vmbus_channel_open_result *result;
1283 	struct vmbus_channel_msginfo *msginfo;
1284 	struct vmbus_channel_message_header *requestheader;
1285 	struct vmbus_channel_open_channel *openmsg;
1286 	unsigned long flags;
1287 
1288 	result = (struct vmbus_channel_open_result *)hdr;
1289 
1290 	trace_vmbus_onopen_result(result);
1291 
1292 	/*
1293 	 * Find the open msg, copy the result and signal/unblock the wait event
1294 	 */
1295 	spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
1296 
1297 	list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
1298 				msglistentry) {
1299 		requestheader =
1300 			(struct vmbus_channel_message_header *)msginfo->msg;
1301 
1302 		if (requestheader->msgtype == CHANNELMSG_OPENCHANNEL) {
1303 			openmsg =
1304 			(struct vmbus_channel_open_channel *)msginfo->msg;
1305 			if (openmsg->child_relid == result->child_relid &&
1306 			    openmsg->openid == result->openid) {
1307 				memcpy(&msginfo->response.open_result,
1308 				       result,
1309 				       sizeof(
1310 					struct vmbus_channel_open_result));
1311 				complete(&msginfo->waitevent);
1312 				break;
1313 			}
1314 		}
1315 	}
1316 	spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
1317 }
1318 
1319 /*
1320  * vmbus_ongpadl_created - GPADL created handler.
1321  *
1322  * This is invoked when we received a response to our gpadl create request.
1323  * Find the matching request, copy the response and signal the requesting
1324  * thread.
1325  */
1326 static void vmbus_ongpadl_created(struct vmbus_channel_message_header *hdr)
1327 {
1328 	struct vmbus_channel_gpadl_created *gpadlcreated;
1329 	struct vmbus_channel_msginfo *msginfo;
1330 	struct vmbus_channel_message_header *requestheader;
1331 	struct vmbus_channel_gpadl_header *gpadlheader;
1332 	unsigned long flags;
1333 
1334 	gpadlcreated = (struct vmbus_channel_gpadl_created *)hdr;
1335 
1336 	trace_vmbus_ongpadl_created(gpadlcreated);
1337 
1338 	/*
1339 	 * Find the establish msg, copy the result and signal/unblock the wait
1340 	 * event
1341 	 */
1342 	spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
1343 
1344 	list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
1345 				msglistentry) {
1346 		requestheader =
1347 			(struct vmbus_channel_message_header *)msginfo->msg;
1348 
1349 		if (requestheader->msgtype == CHANNELMSG_GPADL_HEADER) {
1350 			gpadlheader =
1351 			(struct vmbus_channel_gpadl_header *)requestheader;
1352 
1353 			if ((gpadlcreated->child_relid ==
1354 			     gpadlheader->child_relid) &&
1355 			    (gpadlcreated->gpadl == gpadlheader->gpadl)) {
1356 				memcpy(&msginfo->response.gpadl_created,
1357 				       gpadlcreated,
1358 				       sizeof(
1359 					struct vmbus_channel_gpadl_created));
1360 				complete(&msginfo->waitevent);
1361 				break;
1362 			}
1363 		}
1364 	}
1365 	spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
1366 }
1367 
1368 /*
1369  * vmbus_onmodifychannel_response - Modify Channel response handler.
1370  *
1371  * This is invoked when we received a response to our channel modify request.
1372  * Find the matching request, copy the response and signal the requesting thread.
1373  */
1374 static void vmbus_onmodifychannel_response(struct vmbus_channel_message_header *hdr)
1375 {
1376 	struct vmbus_channel_modifychannel_response *response;
1377 	struct vmbus_channel_msginfo *msginfo;
1378 	unsigned long flags;
1379 
1380 	response = (struct vmbus_channel_modifychannel_response *)hdr;
1381 
1382 	trace_vmbus_onmodifychannel_response(response);
1383 
1384 	/*
1385 	 * Find the modify msg, copy the response and signal/unblock the wait event.
1386 	 */
1387 	spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
1388 
1389 	list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list, msglistentry) {
1390 		struct vmbus_channel_message_header *responseheader =
1391 				(struct vmbus_channel_message_header *)msginfo->msg;
1392 
1393 		if (responseheader->msgtype == CHANNELMSG_MODIFYCHANNEL) {
1394 			struct vmbus_channel_modifychannel *modifymsg;
1395 
1396 			modifymsg = (struct vmbus_channel_modifychannel *)msginfo->msg;
1397 			if (modifymsg->child_relid == response->child_relid) {
1398 				memcpy(&msginfo->response.modify_response, response,
1399 				       sizeof(*response));
1400 				complete(&msginfo->waitevent);
1401 				break;
1402 			}
1403 		}
1404 	}
1405 	spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
1406 }
1407 
1408 /*
1409  * vmbus_ongpadl_torndown - GPADL torndown handler.
1410  *
1411  * This is invoked when we received a response to our gpadl teardown request.
1412  * Find the matching request, copy the response and signal the requesting
1413  * thread.
1414  */
1415 static void vmbus_ongpadl_torndown(
1416 			struct vmbus_channel_message_header *hdr)
1417 {
1418 	struct vmbus_channel_gpadl_torndown *gpadl_torndown;
1419 	struct vmbus_channel_msginfo *msginfo;
1420 	struct vmbus_channel_message_header *requestheader;
1421 	struct vmbus_channel_gpadl_teardown *gpadl_teardown;
1422 	unsigned long flags;
1423 
1424 	gpadl_torndown = (struct vmbus_channel_gpadl_torndown *)hdr;
1425 
1426 	trace_vmbus_ongpadl_torndown(gpadl_torndown);
1427 
1428 	/*
1429 	 * Find the open msg, copy the result and signal/unblock the wait event
1430 	 */
1431 	spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
1432 
1433 	list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
1434 				msglistentry) {
1435 		requestheader =
1436 			(struct vmbus_channel_message_header *)msginfo->msg;
1437 
1438 		if (requestheader->msgtype == CHANNELMSG_GPADL_TEARDOWN) {
1439 			gpadl_teardown =
1440 			(struct vmbus_channel_gpadl_teardown *)requestheader;
1441 
1442 			if (gpadl_torndown->gpadl == gpadl_teardown->gpadl) {
1443 				memcpy(&msginfo->response.gpadl_torndown,
1444 				       gpadl_torndown,
1445 				       sizeof(
1446 					struct vmbus_channel_gpadl_torndown));
1447 				complete(&msginfo->waitevent);
1448 				break;
1449 			}
1450 		}
1451 	}
1452 	spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
1453 }
1454 
1455 /*
1456  * vmbus_onversion_response - Version response handler
1457  *
1458  * This is invoked when we received a response to our initiate contact request.
1459  * Find the matching request, copy the response and signal the requesting
1460  * thread.
1461  */
1462 static void vmbus_onversion_response(
1463 		struct vmbus_channel_message_header *hdr)
1464 {
1465 	struct vmbus_channel_msginfo *msginfo;
1466 	struct vmbus_channel_message_header *requestheader;
1467 	struct vmbus_channel_version_response *version_response;
1468 	unsigned long flags;
1469 
1470 	version_response = (struct vmbus_channel_version_response *)hdr;
1471 
1472 	trace_vmbus_onversion_response(version_response);
1473 
1474 	spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
1475 
1476 	list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
1477 				msglistentry) {
1478 		requestheader =
1479 			(struct vmbus_channel_message_header *)msginfo->msg;
1480 
1481 		if (requestheader->msgtype ==
1482 		    CHANNELMSG_INITIATE_CONTACT) {
1483 			memcpy(&msginfo->response.version_response,
1484 			      version_response,
1485 			      sizeof(struct vmbus_channel_version_response));
1486 			complete(&msginfo->waitevent);
1487 		}
1488 	}
1489 	spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
1490 }
1491 
1492 /* Channel message dispatch table */
1493 const struct vmbus_channel_message_table_entry
1494 channel_message_table[CHANNELMSG_COUNT] = {
1495 	{ CHANNELMSG_INVALID,			0, NULL, 0},
1496 	{ CHANNELMSG_OFFERCHANNEL,		0, vmbus_onoffer,
1497 		sizeof(struct vmbus_channel_offer_channel)},
1498 	{ CHANNELMSG_RESCIND_CHANNELOFFER,	0, vmbus_onoffer_rescind,
1499 		sizeof(struct vmbus_channel_rescind_offer) },
1500 	{ CHANNELMSG_REQUESTOFFERS,		0, NULL, 0},
1501 	{ CHANNELMSG_ALLOFFERS_DELIVERED,	1, vmbus_onoffers_delivered, 0},
1502 	{ CHANNELMSG_OPENCHANNEL,		0, NULL, 0},
1503 	{ CHANNELMSG_OPENCHANNEL_RESULT,	1, vmbus_onopen_result,
1504 		sizeof(struct vmbus_channel_open_result)},
1505 	{ CHANNELMSG_CLOSECHANNEL,		0, NULL, 0},
1506 	{ CHANNELMSG_GPADL_HEADER,		0, NULL, 0},
1507 	{ CHANNELMSG_GPADL_BODY,		0, NULL, 0},
1508 	{ CHANNELMSG_GPADL_CREATED,		1, vmbus_ongpadl_created,
1509 		sizeof(struct vmbus_channel_gpadl_created)},
1510 	{ CHANNELMSG_GPADL_TEARDOWN,		0, NULL, 0},
1511 	{ CHANNELMSG_GPADL_TORNDOWN,		1, vmbus_ongpadl_torndown,
1512 		sizeof(struct vmbus_channel_gpadl_torndown) },
1513 	{ CHANNELMSG_RELID_RELEASED,		0, NULL, 0},
1514 	{ CHANNELMSG_INITIATE_CONTACT,		0, NULL, 0},
1515 	{ CHANNELMSG_VERSION_RESPONSE,		1, vmbus_onversion_response,
1516 		sizeof(struct vmbus_channel_version_response)},
1517 	{ CHANNELMSG_UNLOAD,			0, NULL, 0},
1518 	{ CHANNELMSG_UNLOAD_RESPONSE,		1, vmbus_unload_response, 0},
1519 	{ CHANNELMSG_18,			0, NULL, 0},
1520 	{ CHANNELMSG_19,			0, NULL, 0},
1521 	{ CHANNELMSG_20,			0, NULL, 0},
1522 	{ CHANNELMSG_TL_CONNECT_REQUEST,	0, NULL, 0},
1523 	{ CHANNELMSG_MODIFYCHANNEL,		0, NULL, 0},
1524 	{ CHANNELMSG_TL_CONNECT_RESULT,		0, NULL, 0},
1525 	{ CHANNELMSG_MODIFYCHANNEL_RESPONSE,	1, vmbus_onmodifychannel_response,
1526 		sizeof(struct vmbus_channel_modifychannel_response)},
1527 };
1528 
1529 /*
1530  * vmbus_onmessage - Handler for channel protocol messages.
1531  *
1532  * This is invoked in the vmbus worker thread context.
1533  */
1534 void vmbus_onmessage(struct vmbus_channel_message_header *hdr)
1535 {
1536 	trace_vmbus_on_message(hdr);
1537 
1538 	/*
1539 	 * vmbus_on_msg_dpc() makes sure the hdr->msgtype here can not go
1540 	 * out of bound and the message_handler pointer can not be NULL.
1541 	 */
1542 	channel_message_table[hdr->msgtype].message_handler(hdr);
1543 }
1544 
1545 /*
1546  * vmbus_request_offers - Send a request to get all our pending offers.
1547  */
1548 int vmbus_request_offers(void)
1549 {
1550 	struct vmbus_channel_message_header *msg;
1551 	struct vmbus_channel_msginfo *msginfo;
1552 	int ret;
1553 
1554 	msginfo = kzalloc(sizeof(*msginfo) +
1555 			  sizeof(struct vmbus_channel_message_header),
1556 			  GFP_KERNEL);
1557 	if (!msginfo)
1558 		return -ENOMEM;
1559 
1560 	msg = (struct vmbus_channel_message_header *)msginfo->msg;
1561 
1562 	msg->msgtype = CHANNELMSG_REQUESTOFFERS;
1563 
1564 	ret = vmbus_post_msg(msg, sizeof(struct vmbus_channel_message_header),
1565 			     true);
1566 
1567 	trace_vmbus_request_offers(ret);
1568 
1569 	if (ret != 0) {
1570 		pr_err("Unable to request offers - %d\n", ret);
1571 
1572 		goto cleanup;
1573 	}
1574 
1575 cleanup:
1576 	kfree(msginfo);
1577 
1578 	return ret;
1579 }
1580 
1581 void vmbus_set_sc_create_callback(struct vmbus_channel *primary_channel,
1582 				void (*sc_cr_cb)(struct vmbus_channel *new_sc))
1583 {
1584 	primary_channel->sc_creation_callback = sc_cr_cb;
1585 }
1586 EXPORT_SYMBOL_GPL(vmbus_set_sc_create_callback);
1587 
1588 void vmbus_set_chn_rescind_callback(struct vmbus_channel *channel,
1589 		void (*chn_rescind_cb)(struct vmbus_channel *))
1590 {
1591 	channel->chn_rescind_callback = chn_rescind_cb;
1592 }
1593 EXPORT_SYMBOL_GPL(vmbus_set_chn_rescind_callback);
1594