2019-05-30 06:57:35 +07:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
2009-07-14 06:02:34 +07:00
|
|
|
/*
|
|
|
|
* Copyright (c) 2009, Microsoft Corporation.
|
|
|
|
*
|
|
|
|
* Authors:
|
|
|
|
* Haiyang Zhang <haiyangz@microsoft.com>
|
|
|
|
* Hank Janssen <hjanssen@microsoft.com>
|
|
|
|
*/
|
2011-03-30 03:58:47 +07:00
|
|
|
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
|
|
|
|
|
2009-08-18 07:22:08 +07:00
|
|
|
#include <linux/kernel.h>
|
2016-06-10 08:47:24 +07:00
|
|
|
#include <linux/interrupt.h>
|
2011-02-12 00:59:43 +07:00
|
|
|
#include <linux/sched.h>
|
|
|
|
#include <linux/wait.h>
|
2009-08-18 07:22:08 +07:00
|
|
|
#include <linux/mm.h>
|
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h
percpu.h is included by sched.h and module.h and thus ends up being
included when building most .c files. percpu.h includes slab.h which
in turn includes gfp.h making everything defined by the two files
universally available and complicating inclusion dependencies.
percpu.h -> slab.h dependency is about to be removed. Prepare for
this change by updating users of gfp and slab facilities include those
headers directly instead of assuming availability. As this conversion
needs to touch large number of source files, the following script is
used as the basis of conversion.
http://userweb.kernel.org/~tj/misc/slabh-sweep.py
The script does the followings.
* Scan files for gfp and slab usages and update includes such that
only the necessary includes are there. ie. if only gfp is used,
gfp.h, if slab is used, slab.h.
* When the script inserts a new include, it looks at the include
blocks and try to put the new include such that its order conforms
to its surrounding. It's put in the include block which contains
core kernel includes, in the same order that the rest are ordered -
alphabetical, Christmas tree, rev-Xmas-tree or at the end if there
doesn't seem to be any matching order.
* If the script can't find a place to put a new include (mostly
because the file doesn't have fitting include block), it prints out
an error message indicating which .h file needs to be added to the
file.
The conversion was done in the following steps.
1. The initial automatic conversion of all .c files updated slightly
over 4000 files, deleting around 700 includes and adding ~480 gfp.h
and ~3000 slab.h inclusions. The script emitted errors for ~400
files.
2. Each error was manually checked. Some didn't need the inclusion,
some needed manual addition while adding it to implementation .h or
embedding .c file was more appropriate for others. This step added
inclusions to around 150 files.
3. The script was run again and the output was compared to the edits
from #2 to make sure no file was left behind.
4. Several build tests were done and a couple of problems were fixed.
e.g. lib/decompress_*.c used malloc/free() wrappers around slab
APIs requiring slab.h to be added manually.
5. The script was run on all .h files but without automatically
editing them as sprinkling gfp.h and slab.h inclusions around .h
files could easily lead to inclusion dependency hell. Most gfp.h
inclusion directives were ignored as stuff from gfp.h was usually
wildly available and often used in preprocessor macros. Each
slab.h inclusion directive was examined and added manually as
necessary.
6. percpu.h was updated not to include slab.h.
7. Build test were done on the following configurations and failures
were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my
distributed build env didn't work with gcov compiles) and a few
more options had to be turned off depending on archs to make things
build (like ipr on powerpc/64 which failed due to missing writeq).
* x86 and x86_64 UP and SMP allmodconfig and a custom test config.
* powerpc and powerpc64 SMP allmodconfig
* sparc and sparc64 SMP allmodconfig
* ia64 SMP allmodconfig
* s390 SMP allmodconfig
* alpha SMP allmodconfig
* um on x86_64 SMP allmodconfig
8. percpu.h modifications were reverted so that it could be applied as
a separate patch and serve as bisection point.
Given the fact that I had only a couple of failures from tests on step
6, I'm fairly confident about the coverage of this conversion patch.
If there is a breakage, it's likely to be something in one of the arch
headers which should be easily discoverable easily on most builds of
the specific arch.
Signed-off-by: Tejun Heo <tj@kernel.org>
Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
2010-03-24 15:04:11 +07:00
|
|
|
#include <linux/slab.h>
|
2009-09-12 08:46:44 +07:00
|
|
|
#include <linux/list.h>
|
2010-05-05 05:55:05 +07:00
|
|
|
#include <linux/module.h>
|
2010-05-29 06:22:44 +07:00
|
|
|
#include <linux/completion.h>
|
2016-01-28 13:29:35 +07:00
|
|
|
#include <linux/delay.h>
|
2011-10-05 02:29:52 +07:00
|
|
|
#include <linux/hyperv.h>
|
2017-01-20 01:51:50 +07:00
|
|
|
#include <asm/mshyperv.h>
|
2011-05-13 09:34:15 +07:00
|
|
|
|
2011-05-13 09:34:28 +07:00
|
|
|
#include "hyperv_vmbus.h"
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2015-12-26 11:00:30 +07:00
|
|
|
static void init_vp_index(struct vmbus_channel *channel, u16 dev_type);
|
|
|
|
|
|
|
|
static const struct vmbus_device vmbus_devs[] = {
|
|
|
|
/* IDE */
|
|
|
|
{ .dev_type = HV_IDE,
|
|
|
|
HV_IDE_GUID,
|
|
|
|
.perf_device = true,
|
|
|
|
},
|
|
|
|
|
|
|
|
/* SCSI */
|
|
|
|
{ .dev_type = HV_SCSI,
|
|
|
|
HV_SCSI_GUID,
|
|
|
|
.perf_device = true,
|
|
|
|
},
|
|
|
|
|
|
|
|
/* Fibre Channel */
|
|
|
|
{ .dev_type = HV_FC,
|
|
|
|
HV_SYNTHFC_GUID,
|
|
|
|
.perf_device = true,
|
|
|
|
},
|
|
|
|
|
|
|
|
/* Synthetic NIC */
|
|
|
|
{ .dev_type = HV_NIC,
|
|
|
|
HV_NIC_GUID,
|
|
|
|
.perf_device = true,
|
|
|
|
},
|
|
|
|
|
|
|
|
/* Network Direct */
|
|
|
|
{ .dev_type = HV_ND,
|
|
|
|
HV_ND_GUID,
|
|
|
|
.perf_device = true,
|
|
|
|
},
|
|
|
|
|
|
|
|
/* PCIE */
|
|
|
|
{ .dev_type = HV_PCIE,
|
|
|
|
HV_PCIE_GUID,
|
2018-03-28 05:01:02 +07:00
|
|
|
.perf_device = false,
|
2015-12-26 11:00:30 +07:00
|
|
|
},
|
|
|
|
|
|
|
|
/* Synthetic Frame Buffer */
|
|
|
|
{ .dev_type = HV_FB,
|
|
|
|
HV_SYNTHVID_GUID,
|
|
|
|
.perf_device = false,
|
|
|
|
},
|
|
|
|
|
|
|
|
/* Synthetic Keyboard */
|
|
|
|
{ .dev_type = HV_KBD,
|
|
|
|
HV_KBD_GUID,
|
|
|
|
.perf_device = false,
|
|
|
|
},
|
|
|
|
|
|
|
|
/* Synthetic MOUSE */
|
|
|
|
{ .dev_type = HV_MOUSE,
|
|
|
|
HV_MOUSE_GUID,
|
|
|
|
.perf_device = false,
|
|
|
|
},
|
|
|
|
|
|
|
|
/* KVP */
|
|
|
|
{ .dev_type = HV_KVP,
|
|
|
|
HV_KVP_GUID,
|
|
|
|
.perf_device = false,
|
|
|
|
},
|
|
|
|
|
|
|
|
/* Time Synch */
|
|
|
|
{ .dev_type = HV_TS,
|
|
|
|
HV_TS_GUID,
|
|
|
|
.perf_device = false,
|
|
|
|
},
|
|
|
|
|
|
|
|
/* Heartbeat */
|
|
|
|
{ .dev_type = HV_HB,
|
|
|
|
HV_HEART_BEAT_GUID,
|
|
|
|
.perf_device = false,
|
|
|
|
},
|
|
|
|
|
|
|
|
/* Shutdown */
|
|
|
|
{ .dev_type = HV_SHUTDOWN,
|
|
|
|
HV_SHUTDOWN_GUID,
|
|
|
|
.perf_device = false,
|
|
|
|
},
|
|
|
|
|
|
|
|
/* File copy */
|
|
|
|
{ .dev_type = HV_FCOPY,
|
|
|
|
HV_FCOPY_GUID,
|
|
|
|
.perf_device = false,
|
|
|
|
},
|
|
|
|
|
|
|
|
/* Backup */
|
|
|
|
{ .dev_type = HV_BACKUP,
|
|
|
|
HV_VSS_GUID,
|
|
|
|
.perf_device = false,
|
|
|
|
},
|
|
|
|
|
|
|
|
/* Dynamic Memory */
|
|
|
|
{ .dev_type = HV_DM,
|
|
|
|
HV_DM_GUID,
|
|
|
|
.perf_device = false,
|
|
|
|
},
|
|
|
|
|
|
|
|
/* Unknown GUID */
|
2016-12-04 03:34:29 +07:00
|
|
|
{ .dev_type = HV_UNKNOWN,
|
2015-12-26 11:00:30 +07:00
|
|
|
.perf_device = false,
|
|
|
|
},
|
|
|
|
};
|
|
|
|
|
2016-09-07 19:39:34 +07:00
|
|
|
static const struct {
|
2019-01-10 21:25:32 +07:00
|
|
|
guid_t guid;
|
2016-09-07 19:39:34 +07:00
|
|
|
} vmbus_unsupported_devs[] = {
|
|
|
|
{ HV_AVMA1_GUID },
|
|
|
|
{ HV_AVMA2_GUID },
|
|
|
|
{ HV_RDV_GUID },
|
|
|
|
};
|
|
|
|
|
2016-12-23 07:54:00 +07:00
|
|
|
/*
|
|
|
|
* The rescinded channel may be blocked waiting for a response from the host;
|
|
|
|
* take care of that.
|
|
|
|
*/
|
|
|
|
static void vmbus_rescind_cleanup(struct vmbus_channel *channel)
|
|
|
|
{
|
|
|
|
struct vmbus_channel_msginfo *msginfo;
|
|
|
|
unsigned long flags;
|
|
|
|
|
|
|
|
|
|
|
|
spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
|
2017-09-30 11:09:36 +07:00
|
|
|
channel->rescind = true;
|
2016-12-23 07:54:00 +07:00
|
|
|
list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
|
|
|
|
msglistentry) {
|
|
|
|
|
|
|
|
if (msginfo->waiting_channel == channel) {
|
|
|
|
complete(&msginfo->waitevent);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
|
|
|
|
}
|
|
|
|
|
2019-01-10 21:25:32 +07:00
|
|
|
static bool is_unsupported_vmbus_devs(const guid_t *guid)
|
2016-09-07 19:39:34 +07:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(vmbus_unsupported_devs); i++)
|
2019-01-10 21:25:32 +07:00
|
|
|
if (guid_equal(guid, &vmbus_unsupported_devs[i].guid))
|
2016-09-07 19:39:34 +07:00
|
|
|
return true;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static u16 hv_get_dev_type(const struct vmbus_channel *channel)
|
2015-12-26 11:00:30 +07:00
|
|
|
{
|
2019-01-10 21:25:32 +07:00
|
|
|
const guid_t *guid = &channel->offermsg.offer.if_type;
|
2015-12-26 11:00:30 +07:00
|
|
|
u16 i;
|
|
|
|
|
2016-09-07 19:39:34 +07:00
|
|
|
if (is_hvsock_channel(channel) || is_unsupported_vmbus_devs(guid))
|
2016-12-04 03:34:29 +07:00
|
|
|
return HV_UNKNOWN;
|
2016-09-07 19:39:34 +07:00
|
|
|
|
2016-12-04 03:34:29 +07:00
|
|
|
for (i = HV_IDE; i < HV_UNKNOWN; i++) {
|
2019-01-10 21:25:32 +07:00
|
|
|
if (guid_equal(guid, &vmbus_devs[i].guid))
|
2015-12-26 11:00:30 +07:00
|
|
|
return i;
|
|
|
|
}
|
|
|
|
pr_info("Unknown GUID: %pUl\n", guid);
|
|
|
|
return i;
|
|
|
|
}
|
2015-05-07 07:47:45 +07:00
|
|
|
|
2010-05-05 05:55:05 +07:00
|
|
|
/**
|
2018-09-24 04:10:41 +07:00
|
|
|
* vmbus_prep_negotiate_resp() - Create default response for Negotiate message
|
2010-05-05 05:55:05 +07:00
|
|
|
* @icmsghdrp: Pointer to msg header structure
|
|
|
|
* @buf: Raw buffer channel data
|
2018-09-24 04:10:41 +07:00
|
|
|
* @fw_version: The framework versions we can support.
|
|
|
|
* @fw_vercnt: The size of @fw_version.
|
|
|
|
* @srv_version: The service versions we can support.
|
|
|
|
* @srv_vercnt: The size of @srv_version.
|
|
|
|
* @nego_fw_version: The selected framework version.
|
|
|
|
* @nego_srv_version: The selected service version.
|
2010-05-05 05:55:05 +07:00
|
|
|
*
|
2018-09-24 04:10:41 +07:00
|
|
|
* Note: Versions are given in decreasing order.
|
2010-05-05 05:55:05 +07:00
|
|
|
*
|
2018-09-24 04:10:41 +07:00
|
|
|
* Set up and fill in default negotiate response message.
|
2010-05-05 05:55:05 +07:00
|
|
|
* Mainly used by Hyper-V drivers.
|
|
|
|
*/
|
2013-07-03 00:31:30 +07:00
|
|
|
bool vmbus_prep_negotiate_resp(struct icmsg_hdr *icmsghdrp,
|
2017-01-29 02:37:17 +07:00
|
|
|
u8 *buf, const int *fw_version, int fw_vercnt,
|
|
|
|
const int *srv_version, int srv_vercnt,
|
|
|
|
int *nego_fw_version, int *nego_srv_version)
|
2010-05-05 05:55:05 +07:00
|
|
|
{
|
2013-07-03 00:31:30 +07:00
|
|
|
int icframe_major, icframe_minor;
|
|
|
|
int icmsg_major, icmsg_minor;
|
|
|
|
int fw_major, fw_minor;
|
|
|
|
int srv_major, srv_minor;
|
2017-01-29 02:37:17 +07:00
|
|
|
int i, j;
|
2013-07-03 00:31:30 +07:00
|
|
|
bool found_match = false;
|
2017-01-29 02:37:17 +07:00
|
|
|
struct icmsg_negotiate *negop;
|
2012-05-13 03:44:58 +07:00
|
|
|
|
2012-05-13 03:44:57 +07:00
|
|
|
icmsghdrp->icmsgsize = 0x10;
|
|
|
|
negop = (struct icmsg_negotiate *)&buf[
|
|
|
|
sizeof(struct vmbuspipe_hdr) +
|
|
|
|
sizeof(struct icmsg_hdr)];
|
2010-05-05 05:55:05 +07:00
|
|
|
|
2013-07-03 00:31:30 +07:00
|
|
|
icframe_major = negop->icframe_vercnt;
|
|
|
|
icframe_minor = 0;
|
|
|
|
|
|
|
|
icmsg_major = negop->icmsg_vercnt;
|
|
|
|
icmsg_minor = 0;
|
2012-05-13 03:44:58 +07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Select the framework version number we will
|
|
|
|
* support.
|
|
|
|
*/
|
|
|
|
|
2017-01-29 02:37:17 +07:00
|
|
|
for (i = 0; i < fw_vercnt; i++) {
|
|
|
|
fw_major = (fw_version[i] >> 16);
|
|
|
|
fw_minor = (fw_version[i] & 0xFFFF);
|
|
|
|
|
|
|
|
for (j = 0; j < negop->icframe_vercnt; j++) {
|
|
|
|
if ((negop->icversion_data[j].major == fw_major) &&
|
|
|
|
(negop->icversion_data[j].minor == fw_minor)) {
|
|
|
|
icframe_major = negop->icversion_data[j].major;
|
|
|
|
icframe_minor = negop->icversion_data[j].minor;
|
|
|
|
found_match = true;
|
|
|
|
break;
|
|
|
|
}
|
2013-07-03 00:31:30 +07:00
|
|
|
}
|
2017-01-29 02:37:17 +07:00
|
|
|
|
|
|
|
if (found_match)
|
|
|
|
break;
|
2012-05-13 03:44:58 +07:00
|
|
|
}
|
|
|
|
|
2013-07-03 00:31:30 +07:00
|
|
|
if (!found_match)
|
|
|
|
goto fw_error;
|
|
|
|
|
|
|
|
found_match = false;
|
|
|
|
|
2017-01-29 02:37:17 +07:00
|
|
|
for (i = 0; i < srv_vercnt; i++) {
|
|
|
|
srv_major = (srv_version[i] >> 16);
|
|
|
|
srv_minor = (srv_version[i] & 0xFFFF);
|
|
|
|
|
|
|
|
for (j = negop->icframe_vercnt;
|
|
|
|
(j < negop->icframe_vercnt + negop->icmsg_vercnt);
|
|
|
|
j++) {
|
|
|
|
|
|
|
|
if ((negop->icversion_data[j].major == srv_major) &&
|
|
|
|
(negop->icversion_data[j].minor == srv_minor)) {
|
|
|
|
|
|
|
|
icmsg_major = negop->icversion_data[j].major;
|
|
|
|
icmsg_minor = negop->icversion_data[j].minor;
|
|
|
|
found_match = true;
|
|
|
|
break;
|
|
|
|
}
|
2013-07-03 00:31:30 +07:00
|
|
|
}
|
2017-01-29 02:37:17 +07:00
|
|
|
|
|
|
|
if (found_match)
|
|
|
|
break;
|
2010-05-05 05:55:05 +07:00
|
|
|
}
|
2012-05-13 03:44:57 +07:00
|
|
|
|
2012-05-13 03:44:58 +07:00
|
|
|
/*
|
2013-07-03 00:31:30 +07:00
|
|
|
* Respond with the framework and service
|
2012-05-13 03:44:58 +07:00
|
|
|
* version numbers we can support.
|
|
|
|
*/
|
2013-07-03 00:31:30 +07:00
|
|
|
|
|
|
|
fw_error:
|
|
|
|
if (!found_match) {
|
|
|
|
negop->icframe_vercnt = 0;
|
|
|
|
negop->icmsg_vercnt = 0;
|
|
|
|
} else {
|
|
|
|
negop->icframe_vercnt = 1;
|
|
|
|
negop->icmsg_vercnt = 1;
|
|
|
|
}
|
|
|
|
|
2017-01-29 02:37:17 +07:00
|
|
|
if (nego_fw_version)
|
|
|
|
*nego_fw_version = (icframe_major << 16) | icframe_minor;
|
|
|
|
|
|
|
|
if (nego_srv_version)
|
|
|
|
*nego_srv_version = (icmsg_major << 16) | icmsg_minor;
|
|
|
|
|
2013-07-03 00:31:30 +07:00
|
|
|
negop->icversion_data[0].major = icframe_major;
|
|
|
|
negop->icversion_data[0].minor = icframe_minor;
|
|
|
|
negop->icversion_data[1].major = icmsg_major;
|
|
|
|
negop->icversion_data[1].minor = icmsg_minor;
|
|
|
|
return found_match;
|
2010-05-05 05:55:05 +07:00
|
|
|
}
|
2012-05-13 03:44:57 +07:00
|
|
|
|
2011-10-11 21:42:28 +07:00
|
|
|
EXPORT_SYMBOL_GPL(vmbus_prep_negotiate_resp);
|
2010-05-05 05:55:05 +07:00
|
|
|
|
2010-03-05 05:11:00 +07:00
|
|
|
/*
|
2010-10-16 00:14:07 +07:00
|
|
|
* alloc_channel - Allocate and initialize a vmbus channel object
|
2009-09-01 11:47:21 +07:00
|
|
|
*/
|
2010-10-21 05:51:57 +07:00
|
|
|
static struct vmbus_channel *alloc_channel(void)
|
2009-07-14 06:02:34 +07:00
|
|
|
{
|
2009-08-19 05:21:19 +07:00
|
|
|
struct vmbus_channel *channel;
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2009-08-19 05:21:19 +07:00
|
|
|
channel = kzalloc(sizeof(*channel), GFP_ATOMIC);
|
2009-07-14 06:02:34 +07:00
|
|
|
if (!channel)
|
|
|
|
return NULL;
|
|
|
|
|
2015-01-20 22:45:05 +07:00
|
|
|
spin_lock_init(&channel->lock);
|
2017-11-14 20:53:33 +07:00
|
|
|
init_completion(&channel->rescind_event);
|
2013-05-24 02:02:32 +07:00
|
|
|
|
|
|
|
INIT_LIST_HEAD(&channel->sc_list);
|
2014-04-09 08:45:54 +07:00
|
|
|
INIT_LIST_HEAD(&channel->percpu_list);
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2017-02-12 13:02:20 +07:00
|
|
|
tasklet_init(&channel->callback_event,
|
|
|
|
vmbus_on_event, (unsigned long)channel);
|
|
|
|
|
2019-03-15 03:05:15 +07:00
|
|
|
hv_ringbuffer_pre_init(channel);
|
|
|
|
|
2009-07-14 06:02:34 +07:00
|
|
|
return channel;
|
|
|
|
}
|
|
|
|
|
2010-03-05 05:11:00 +07:00
|
|
|
/*
|
2010-10-16 00:14:07 +07:00
|
|
|
* free_channel - Release the resources used by the vmbus channel object
|
2009-09-01 11:47:21 +07:00
|
|
|
*/
|
2011-10-11 22:40:01 +07:00
|
|
|
static void free_channel(struct vmbus_channel *channel)
|
2009-07-14 06:02:34 +07:00
|
|
|
{
|
2017-02-12 13:02:20 +07:00
|
|
|
tasklet_kill(&channel->callback_event);
|
2019-03-19 11:04:01 +07:00
|
|
|
vmbus_remove_channel_attr_group(channel);
|
2017-03-05 08:13:57 +07:00
|
|
|
|
2017-09-22 10:58:49 +07:00
|
|
|
kobject_put(&channel->kobj);
|
2009-07-14 06:02:34 +07:00
|
|
|
}
|
|
|
|
|
2014-04-09 08:45:54 +07:00
|
|
|
static void percpu_channel_enq(void *arg)
|
|
|
|
{
|
|
|
|
struct vmbus_channel *channel = arg;
|
2017-02-12 13:02:19 +07:00
|
|
|
struct hv_per_cpu_context *hv_cpu
|
|
|
|
= this_cpu_ptr(hv_context.cpu_context);
|
2014-04-09 08:45:54 +07:00
|
|
|
|
2017-03-05 08:13:57 +07:00
|
|
|
list_add_tail_rcu(&channel->percpu_list, &hv_cpu->chan_list);
|
2014-04-09 08:45:54 +07:00
|
|
|
}
|
2010-05-29 06:22:44 +07:00
|
|
|
|
2014-04-09 08:45:54 +07:00
|
|
|
static void percpu_channel_deq(void *arg)
|
|
|
|
{
|
|
|
|
struct vmbus_channel *channel = arg;
|
|
|
|
|
2017-03-05 08:13:57 +07:00
|
|
|
list_del_rcu(&channel->percpu_list);
|
2014-04-09 08:45:54 +07:00
|
|
|
}
|
2010-05-29 06:22:44 +07:00
|
|
|
|
2015-03-01 02:18:17 +07:00
|
|
|
|
2015-12-15 07:01:50 +07:00
|
|
|
static void vmbus_release_relid(u32 relid)
|
2010-12-16 01:48:09 +07:00
|
|
|
{
|
2015-03-01 02:18:17 +07:00
|
|
|
struct vmbus_channel_relid_released msg;
|
2017-10-30 02:21:14 +07:00
|
|
|
int ret;
|
2010-12-16 01:48:09 +07:00
|
|
|
|
2013-03-16 02:25:44 +07:00
|
|
|
memset(&msg, 0, sizeof(struct vmbus_channel_relid_released));
|
2015-03-01 02:18:17 +07:00
|
|
|
msg.child_relid = relid;
|
2013-03-16 02:25:44 +07:00
|
|
|
msg.header.msgtype = CHANNELMSG_RELID_RELEASED;
|
2017-10-30 02:21:14 +07:00
|
|
|
ret = vmbus_post_msg(&msg, sizeof(struct vmbus_channel_relid_released),
|
|
|
|
true);
|
|
|
|
|
|
|
|
trace_vmbus_release_relid(&msg, ret);
|
2015-12-15 07:01:50 +07:00
|
|
|
}
|
2013-03-16 02:25:44 +07:00
|
|
|
|
2018-09-14 23:10:15 +07:00
|
|
|
void hv_process_channel_removal(struct vmbus_channel *channel)
|
2015-12-15 07:01:50 +07:00
|
|
|
{
|
2018-09-14 23:10:15 +07:00
|
|
|
struct vmbus_channel *primary_channel;
|
2015-12-15 07:01:50 +07:00
|
|
|
unsigned long flags;
|
|
|
|
|
2016-01-28 13:29:43 +07:00
|
|
|
BUG_ON(!mutex_is_locked(&vmbus_connection.channel_mutex));
|
2017-09-30 11:09:36 +07:00
|
|
|
BUG_ON(!channel->rescind);
|
2018-09-14 23:10:15 +07:00
|
|
|
|
2014-08-29 08:29:53 +07:00
|
|
|
if (channel->target_cpu != get_cpu()) {
|
|
|
|
put_cpu();
|
2014-04-09 08:45:54 +07:00
|
|
|
smp_call_function_single(channel->target_cpu,
|
|
|
|
percpu_channel_deq, channel, true);
|
2014-08-29 08:29:53 +07:00
|
|
|
} else {
|
2014-04-09 08:45:54 +07:00
|
|
|
percpu_channel_deq(channel);
|
2014-08-29 08:29:53 +07:00
|
|
|
put_cpu();
|
|
|
|
}
|
2014-04-09 08:45:54 +07:00
|
|
|
|
2013-05-24 02:02:32 +07:00
|
|
|
if (channel->primary_channel == NULL) {
|
|
|
|
list_del(&channel->listentry);
|
2015-08-14 07:07:03 +07:00
|
|
|
|
|
|
|
primary_channel = channel;
|
2013-05-24 02:02:32 +07:00
|
|
|
} else {
|
|
|
|
primary_channel = channel->primary_channel;
|
2015-01-20 22:45:05 +07:00
|
|
|
spin_lock_irqsave(&primary_channel->lock, flags);
|
2013-10-17 09:27:19 +07:00
|
|
|
list_del(&channel->sc_list);
|
2015-01-20 22:45:05 +07:00
|
|
|
spin_unlock_irqrestore(&primary_channel->lock, flags);
|
2013-05-24 02:02:32 +07:00
|
|
|
}
|
2015-08-14 07:07:03 +07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* We need to free the bit for init_vp_index() to work in the case
|
|
|
|
* of sub-channel, when we reload drivers like hv_netvsc.
|
|
|
|
*/
|
2016-09-02 19:58:23 +07:00
|
|
|
if (channel->affinity_policy == HV_LOCALIZED)
|
|
|
|
cpumask_clear_cpu(channel->target_cpu,
|
|
|
|
&primary_channel->alloced_cpus_in_node);
|
2015-08-14 07:07:03 +07:00
|
|
|
|
2019-09-06 06:01:22 +07:00
|
|
|
/*
|
|
|
|
* Upon suspend, an in-use hv_sock channel is marked as "rescinded" and
|
|
|
|
* the relid is invalidated; after hibernation, when the user-space app
|
|
|
|
* destroys the channel, the relid is INVALID_RELID, and in this case
|
|
|
|
* it's unnecessary and unsafe to release the old relid, since the same
|
|
|
|
* relid can refer to a completely different channel now.
|
|
|
|
*/
|
|
|
|
if (channel->offermsg.child_relid != INVALID_RELID)
|
|
|
|
vmbus_release_relid(channel->offermsg.child_relid);
|
2016-06-10 08:47:24 +07:00
|
|
|
|
2013-03-16 02:25:44 +07:00
|
|
|
free_channel(channel);
|
2010-12-16 01:48:09 +07:00
|
|
|
}
|
2010-05-29 06:22:44 +07:00
|
|
|
|
2011-12-13 00:29:17 +07:00
|
|
|
void vmbus_free_channels(void)
|
|
|
|
{
|
2015-04-23 11:31:30 +07:00
|
|
|
struct vmbus_channel *channel, *tmp;
|
|
|
|
|
|
|
|
list_for_each_entry_safe(channel, tmp, &vmbus_connection.chn_list,
|
|
|
|
listentry) {
|
Drivers: hv: vmbus: fix rescind-offer handling for device without a driver
In the path vmbus_onoffer_rescind() -> vmbus_device_unregister() ->
device_unregister() -> ... -> __device_release_driver(), we can see for a
device without a driver loaded: dev->driver is NULL, so
dev->bus->remove(dev), namely vmbus_remove(), isn't invoked.
As a result, vmbus_remove() -> hv_process_channel_removal() isn't invoked
and some cleanups(like sending a CHANNELMSG_RELID_RELEASED message to the
host) aren't done.
We can demo the issue this way:
1. rmmod hv_utils;
2. disable the Heartbeat Integration Service in Hyper-V Manager and lsvmbus
shows the device disappears.
3. re-enable the Heartbeat in Hyper-V Manager and modprobe hv_utils, but
lsvmbus shows the device can't appear again.
This is because, the host thinks the VM hasn't released the relid, so can't
re-offer the device to the VM.
We can fix the issue by moving hv_process_channel_removal()
from vmbus_close_internal() to vmbus_device_release(), since the latter is
always invoked on device_unregister(), whether or not the dev has a driver
loaded.
Signed-off-by: Dexuan Cui <decui@microsoft.com>
Signed-off-by: K. Y. Srinivasan <kys@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2015-12-15 07:01:49 +07:00
|
|
|
/* hv_process_channel_removal() needs this */
|
2015-04-23 11:31:30 +07:00
|
|
|
channel->rescind = true;
|
2011-12-13 00:29:17 +07:00
|
|
|
|
|
|
|
vmbus_device_unregister(channel->device_obj);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
Drivers: hv: vmbus: Offload the handling of channels to two workqueues
vmbus_process_offer() mustn't call channel->sc_creation_callback()
directly for sub-channels, because sc_creation_callback() ->
vmbus_open() may never get the host's response to the
OPEN_CHANNEL message (the host may rescind a channel at any time,
e.g. in the case of hot removing a NIC), and vmbus_onoffer_rescind()
may not wake up the vmbus_open() as it's blocked due to a non-zero
vmbus_connection.offer_in_progress, and finally we have a deadlock.
The above is also true for primary channels, if the related device
drivers use sync probing mode by default.
And, usually the handling of primary channels and sub-channels can
depend on each other, so we should offload them to different
workqueues to avoid possible deadlock, e.g. in sync-probing mode,
NIC1's netvsc_subchan_work() can race with NIC2's netvsc_probe() ->
rtnl_lock(), and causes deadlock: the former gets the rtnl_lock
and waits for all the sub-channels to appear, but the latter
can't get the rtnl_lock and this blocks the handling of sub-channels.
The patch can fix the multiple-NIC deadlock described above for
v3.x kernels (e.g. RHEL 7.x) which don't support async-probing
of devices, and v4.4, v4.9, v4.14 and v4.18 which support async-probing
but don't enable async-probing for Hyper-V drivers (yet).
The patch can also fix the hang issue in sub-channel's handling described
above for all versions of kernels, including v4.19 and v4.20-rc4.
So actually the patch should be applied to all the existing kernels,
not only the kernels that have 8195b1396ec8.
Fixes: 8195b1396ec8 ("hv_netvsc: fix deadlock on hotplug")
Cc: stable@vger.kernel.org
Cc: Stephen Hemminger <sthemmin@microsoft.com>
Cc: K. Y. Srinivasan <kys@microsoft.com>
Cc: Haiyang Zhang <haiyangz@microsoft.com>
Signed-off-by: Dexuan Cui <decui@microsoft.com>
Signed-off-by: K. Y. Srinivasan <kys@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2018-12-03 07:54:35 +07:00
|
|
|
/* Note: the function can run concurrently for primary/sub channels. */
|
|
|
|
static void vmbus_add_channel_work(struct work_struct *work)
|
2009-07-14 06:02:34 +07:00
|
|
|
{
|
Drivers: hv: vmbus: Offload the handling of channels to two workqueues
vmbus_process_offer() mustn't call channel->sc_creation_callback()
directly for sub-channels, because sc_creation_callback() ->
vmbus_open() may never get the host's response to the
OPEN_CHANNEL message (the host may rescind a channel at any time,
e.g. in the case of hot removing a NIC), and vmbus_onoffer_rescind()
may not wake up the vmbus_open() as it's blocked due to a non-zero
vmbus_connection.offer_in_progress, and finally we have a deadlock.
The above is also true for primary channels, if the related device
drivers use sync probing mode by default.
And, usually the handling of primary channels and sub-channels can
depend on each other, so we should offload them to different
workqueues to avoid possible deadlock, e.g. in sync-probing mode,
NIC1's netvsc_subchan_work() can race with NIC2's netvsc_probe() ->
rtnl_lock(), and causes deadlock: the former gets the rtnl_lock
and waits for all the sub-channels to appear, but the latter
can't get the rtnl_lock and this blocks the handling of sub-channels.
The patch can fix the multiple-NIC deadlock described above for
v3.x kernels (e.g. RHEL 7.x) which don't support async-probing
of devices, and v4.4, v4.9, v4.14 and v4.18 which support async-probing
but don't enable async-probing for Hyper-V drivers (yet).
The patch can also fix the hang issue in sub-channel's handling described
above for all versions of kernels, including v4.19 and v4.20-rc4.
So actually the patch should be applied to all the existing kernels,
not only the kernels that have 8195b1396ec8.
Fixes: 8195b1396ec8 ("hv_netvsc: fix deadlock on hotplug")
Cc: stable@vger.kernel.org
Cc: Stephen Hemminger <sthemmin@microsoft.com>
Cc: K. Y. Srinivasan <kys@microsoft.com>
Cc: Haiyang Zhang <haiyangz@microsoft.com>
Signed-off-by: Dexuan Cui <decui@microsoft.com>
Signed-off-by: K. Y. Srinivasan <kys@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2018-12-03 07:54:35 +07:00
|
|
|
struct vmbus_channel *newchannel =
|
|
|
|
container_of(work, struct vmbus_channel, add_channel_work);
|
|
|
|
struct vmbus_channel *primary_channel = newchannel->primary_channel;
|
2009-07-16 04:57:16 +07:00
|
|
|
unsigned long flags;
|
2015-12-26 11:00:30 +07:00
|
|
|
u16 dev_type;
|
2016-01-28 13:29:43 +07:00
|
|
|
int ret;
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2016-09-07 19:39:34 +07:00
|
|
|
dev_type = hv_get_dev_type(newchannel);
|
2015-12-26 11:00:30 +07:00
|
|
|
|
|
|
|
init_vp_index(newchannel, dev_type);
|
2015-05-07 07:47:45 +07:00
|
|
|
|
2015-05-07 07:47:42 +07:00
|
|
|
if (newchannel->target_cpu != get_cpu()) {
|
|
|
|
put_cpu();
|
|
|
|
smp_call_function_single(newchannel->target_cpu,
|
|
|
|
percpu_channel_enq,
|
|
|
|
newchannel, true);
|
|
|
|
} else {
|
|
|
|
percpu_channel_enq(newchannel);
|
|
|
|
put_cpu();
|
2009-07-14 06:02:34 +07:00
|
|
|
}
|
|
|
|
|
2013-08-27 04:08:58 +07:00
|
|
|
/*
|
|
|
|
* This state is used to indicate a successful open
|
|
|
|
* so that when we do close the channel normally, we
|
Drivers: hv: vmbus: Offload the handling of channels to two workqueues
vmbus_process_offer() mustn't call channel->sc_creation_callback()
directly for sub-channels, because sc_creation_callback() ->
vmbus_open() may never get the host's response to the
OPEN_CHANNEL message (the host may rescind a channel at any time,
e.g. in the case of hot removing a NIC), and vmbus_onoffer_rescind()
may not wake up the vmbus_open() as it's blocked due to a non-zero
vmbus_connection.offer_in_progress, and finally we have a deadlock.
The above is also true for primary channels, if the related device
drivers use sync probing mode by default.
And, usually the handling of primary channels and sub-channels can
depend on each other, so we should offload them to different
workqueues to avoid possible deadlock, e.g. in sync-probing mode,
NIC1's netvsc_subchan_work() can race with NIC2's netvsc_probe() ->
rtnl_lock(), and causes deadlock: the former gets the rtnl_lock
and waits for all the sub-channels to appear, but the latter
can't get the rtnl_lock and this blocks the handling of sub-channels.
The patch can fix the multiple-NIC deadlock described above for
v3.x kernels (e.g. RHEL 7.x) which don't support async-probing
of devices, and v4.4, v4.9, v4.14 and v4.18 which support async-probing
but don't enable async-probing for Hyper-V drivers (yet).
The patch can also fix the hang issue in sub-channel's handling described
above for all versions of kernels, including v4.19 and v4.20-rc4.
So actually the patch should be applied to all the existing kernels,
not only the kernels that have 8195b1396ec8.
Fixes: 8195b1396ec8 ("hv_netvsc: fix deadlock on hotplug")
Cc: stable@vger.kernel.org
Cc: Stephen Hemminger <sthemmin@microsoft.com>
Cc: K. Y. Srinivasan <kys@microsoft.com>
Cc: Haiyang Zhang <haiyangz@microsoft.com>
Signed-off-by: Dexuan Cui <decui@microsoft.com>
Signed-off-by: K. Y. Srinivasan <kys@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2018-12-03 07:54:35 +07:00
|
|
|
* can cleanup properly.
|
2013-08-27 04:08:58 +07:00
|
|
|
*/
|
|
|
|
newchannel->state = CHANNEL_OPEN_STATE;
|
|
|
|
|
Drivers: hv: vmbus: Offload the handling of channels to two workqueues
vmbus_process_offer() mustn't call channel->sc_creation_callback()
directly for sub-channels, because sc_creation_callback() ->
vmbus_open() may never get the host's response to the
OPEN_CHANNEL message (the host may rescind a channel at any time,
e.g. in the case of hot removing a NIC), and vmbus_onoffer_rescind()
may not wake up the vmbus_open() as it's blocked due to a non-zero
vmbus_connection.offer_in_progress, and finally we have a deadlock.
The above is also true for primary channels, if the related device
drivers use sync probing mode by default.
And, usually the handling of primary channels and sub-channels can
depend on each other, so we should offload them to different
workqueues to avoid possible deadlock, e.g. in sync-probing mode,
NIC1's netvsc_subchan_work() can race with NIC2's netvsc_probe() ->
rtnl_lock(), and causes deadlock: the former gets the rtnl_lock
and waits for all the sub-channels to appear, but the latter
can't get the rtnl_lock and this blocks the handling of sub-channels.
The patch can fix the multiple-NIC deadlock described above for
v3.x kernels (e.g. RHEL 7.x) which don't support async-probing
of devices, and v4.4, v4.9, v4.14 and v4.18 which support async-probing
but don't enable async-probing for Hyper-V drivers (yet).
The patch can also fix the hang issue in sub-channel's handling described
above for all versions of kernels, including v4.19 and v4.20-rc4.
So actually the patch should be applied to all the existing kernels,
not only the kernels that have 8195b1396ec8.
Fixes: 8195b1396ec8 ("hv_netvsc: fix deadlock on hotplug")
Cc: stable@vger.kernel.org
Cc: Stephen Hemminger <sthemmin@microsoft.com>
Cc: K. Y. Srinivasan <kys@microsoft.com>
Cc: Haiyang Zhang <haiyangz@microsoft.com>
Signed-off-by: Dexuan Cui <decui@microsoft.com>
Signed-off-by: K. Y. Srinivasan <kys@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2018-12-03 07:54:35 +07:00
|
|
|
if (primary_channel != NULL) {
|
|
|
|
/* newchannel is a sub-channel. */
|
|
|
|
struct hv_device *dev = primary_channel->device_obj;
|
2017-09-22 10:58:49 +07:00
|
|
|
|
2018-06-06 03:37:52 +07:00
|
|
|
if (vmbus_add_channel_kobj(dev, newchannel))
|
Drivers: hv: vmbus: Offload the handling of channels to two workqueues
vmbus_process_offer() mustn't call channel->sc_creation_callback()
directly for sub-channels, because sc_creation_callback() ->
vmbus_open() may never get the host's response to the
OPEN_CHANNEL message (the host may rescind a channel at any time,
e.g. in the case of hot removing a NIC), and vmbus_onoffer_rescind()
may not wake up the vmbus_open() as it's blocked due to a non-zero
vmbus_connection.offer_in_progress, and finally we have a deadlock.
The above is also true for primary channels, if the related device
drivers use sync probing mode by default.
And, usually the handling of primary channels and sub-channels can
depend on each other, so we should offload them to different
workqueues to avoid possible deadlock, e.g. in sync-probing mode,
NIC1's netvsc_subchan_work() can race with NIC2's netvsc_probe() ->
rtnl_lock(), and causes deadlock: the former gets the rtnl_lock
and waits for all the sub-channels to appear, but the latter
can't get the rtnl_lock and this blocks the handling of sub-channels.
The patch can fix the multiple-NIC deadlock described above for
v3.x kernels (e.g. RHEL 7.x) which don't support async-probing
of devices, and v4.4, v4.9, v4.14 and v4.18 which support async-probing
but don't enable async-probing for Hyper-V drivers (yet).
The patch can also fix the hang issue in sub-channel's handling described
above for all versions of kernels, including v4.19 and v4.20-rc4.
So actually the patch should be applied to all the existing kernels,
not only the kernels that have 8195b1396ec8.
Fixes: 8195b1396ec8 ("hv_netvsc: fix deadlock on hotplug")
Cc: stable@vger.kernel.org
Cc: Stephen Hemminger <sthemmin@microsoft.com>
Cc: K. Y. Srinivasan <kys@microsoft.com>
Cc: Haiyang Zhang <haiyangz@microsoft.com>
Signed-off-by: Dexuan Cui <decui@microsoft.com>
Signed-off-by: K. Y. Srinivasan <kys@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2018-12-03 07:54:35 +07:00
|
|
|
goto err_deq_chan;
|
|
|
|
|
|
|
|
if (primary_channel->sc_creation_callback != NULL)
|
|
|
|
primary_channel->sc_creation_callback(newchannel);
|
2017-09-22 10:58:49 +07:00
|
|
|
|
2017-09-30 11:09:36 +07:00
|
|
|
newchannel->probe_done = true;
|
2015-05-07 07:47:42 +07:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2009-09-01 11:47:21 +07:00
|
|
|
/*
|
Drivers: hv: vmbus: Offload the handling of channels to two workqueues
vmbus_process_offer() mustn't call channel->sc_creation_callback()
directly for sub-channels, because sc_creation_callback() ->
vmbus_open() may never get the host's response to the
OPEN_CHANNEL message (the host may rescind a channel at any time,
e.g. in the case of hot removing a NIC), and vmbus_onoffer_rescind()
may not wake up the vmbus_open() as it's blocked due to a non-zero
vmbus_connection.offer_in_progress, and finally we have a deadlock.
The above is also true for primary channels, if the related device
drivers use sync probing mode by default.
And, usually the handling of primary channels and sub-channels can
depend on each other, so we should offload them to different
workqueues to avoid possible deadlock, e.g. in sync-probing mode,
NIC1's netvsc_subchan_work() can race with NIC2's netvsc_probe() ->
rtnl_lock(), and causes deadlock: the former gets the rtnl_lock
and waits for all the sub-channels to appear, but the latter
can't get the rtnl_lock and this blocks the handling of sub-channels.
The patch can fix the multiple-NIC deadlock described above for
v3.x kernels (e.g. RHEL 7.x) which don't support async-probing
of devices, and v4.4, v4.9, v4.14 and v4.18 which support async-probing
but don't enable async-probing for Hyper-V drivers (yet).
The patch can also fix the hang issue in sub-channel's handling described
above for all versions of kernels, including v4.19 and v4.20-rc4.
So actually the patch should be applied to all the existing kernels,
not only the kernels that have 8195b1396ec8.
Fixes: 8195b1396ec8 ("hv_netvsc: fix deadlock on hotplug")
Cc: stable@vger.kernel.org
Cc: Stephen Hemminger <sthemmin@microsoft.com>
Cc: K. Y. Srinivasan <kys@microsoft.com>
Cc: Haiyang Zhang <haiyangz@microsoft.com>
Signed-off-by: Dexuan Cui <decui@microsoft.com>
Signed-off-by: K. Y. Srinivasan <kys@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2018-12-03 07:54:35 +07:00
|
|
|
* Start the process of binding the primary channel to the driver
|
2009-09-01 11:47:21 +07:00
|
|
|
*/
|
2011-09-08 21:24:12 +07:00
|
|
|
newchannel->device_obj = vmbus_device_create(
|
2011-01-27 03:12:12 +07:00
|
|
|
&newchannel->offermsg.offer.if_type,
|
|
|
|
&newchannel->offermsg.offer.if_instance,
|
2010-10-16 00:14:06 +07:00
|
|
|
newchannel);
|
2015-01-20 22:45:04 +07:00
|
|
|
if (!newchannel->device_obj)
|
2015-03-01 02:18:19 +07:00
|
|
|
goto err_deq_chan;
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2015-12-26 11:00:30 +07:00
|
|
|
newchannel->device_obj->device_id = dev_type;
|
2009-07-28 03:47:24 +07:00
|
|
|
/*
|
|
|
|
* Add the new device to the bus. This will kick off device-driver
|
|
|
|
* binding which eventually invokes the device driver's AddDevice()
|
|
|
|
* method.
|
|
|
|
*/
|
2016-01-28 13:29:43 +07:00
|
|
|
ret = vmbus_device_register(newchannel->device_obj);
|
|
|
|
|
|
|
|
if (ret != 0) {
|
2015-03-27 23:10:09 +07:00
|
|
|
pr_err("unable to add child device object (relid %d)\n",
|
|
|
|
newchannel->offermsg.child_relid);
|
|
|
|
kfree(newchannel->device_obj);
|
|
|
|
goto err_deq_chan;
|
|
|
|
}
|
2017-05-01 06:21:18 +07:00
|
|
|
|
2017-08-12 00:03:59 +07:00
|
|
|
newchannel->probe_done = true;
|
2015-01-20 22:45:04 +07:00
|
|
|
return;
|
2015-03-01 02:18:18 +07:00
|
|
|
|
2015-03-01 02:18:19 +07:00
|
|
|
err_deq_chan:
|
2015-12-15 07:01:51 +07:00
|
|
|
mutex_lock(&vmbus_connection.channel_mutex);
|
Drivers: hv: vmbus: Offload the handling of channels to two workqueues
vmbus_process_offer() mustn't call channel->sc_creation_callback()
directly for sub-channels, because sc_creation_callback() ->
vmbus_open() may never get the host's response to the
OPEN_CHANNEL message (the host may rescind a channel at any time,
e.g. in the case of hot removing a NIC), and vmbus_onoffer_rescind()
may not wake up the vmbus_open() as it's blocked due to a non-zero
vmbus_connection.offer_in_progress, and finally we have a deadlock.
The above is also true for primary channels, if the related device
drivers use sync probing mode by default.
And, usually the handling of primary channels and sub-channels can
depend on each other, so we should offload them to different
workqueues to avoid possible deadlock, e.g. in sync-probing mode,
NIC1's netvsc_subchan_work() can race with NIC2's netvsc_probe() ->
rtnl_lock(), and causes deadlock: the former gets the rtnl_lock
and waits for all the sub-channels to appear, but the latter
can't get the rtnl_lock and this blocks the handling of sub-channels.
The patch can fix the multiple-NIC deadlock described above for
v3.x kernels (e.g. RHEL 7.x) which don't support async-probing
of devices, and v4.4, v4.9, v4.14 and v4.18 which support async-probing
but don't enable async-probing for Hyper-V drivers (yet).
The patch can also fix the hang issue in sub-channel's handling described
above for all versions of kernels, including v4.19 and v4.20-rc4.
So actually the patch should be applied to all the existing kernels,
not only the kernels that have 8195b1396ec8.
Fixes: 8195b1396ec8 ("hv_netvsc: fix deadlock on hotplug")
Cc: stable@vger.kernel.org
Cc: Stephen Hemminger <sthemmin@microsoft.com>
Cc: K. Y. Srinivasan <kys@microsoft.com>
Cc: Haiyang Zhang <haiyangz@microsoft.com>
Signed-off-by: Dexuan Cui <decui@microsoft.com>
Signed-off-by: K. Y. Srinivasan <kys@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2018-12-03 07:54:35 +07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* We need to set the flag, otherwise
|
|
|
|
* vmbus_onoffer_rescind() can be blocked.
|
|
|
|
*/
|
|
|
|
newchannel->probe_done = true;
|
|
|
|
|
|
|
|
if (primary_channel == NULL) {
|
|
|
|
list_del(&newchannel->listentry);
|
|
|
|
} else {
|
|
|
|
spin_lock_irqsave(&primary_channel->lock, flags);
|
|
|
|
list_del(&newchannel->sc_list);
|
|
|
|
spin_unlock_irqrestore(&primary_channel->lock, flags);
|
|
|
|
}
|
|
|
|
|
2015-12-15 07:01:51 +07:00
|
|
|
mutex_unlock(&vmbus_connection.channel_mutex);
|
2015-03-01 02:18:19 +07:00
|
|
|
|
|
|
|
if (newchannel->target_cpu != get_cpu()) {
|
|
|
|
put_cpu();
|
|
|
|
smp_call_function_single(newchannel->target_cpu,
|
Drivers: hv: vmbus: Offload the handling of channels to two workqueues
vmbus_process_offer() mustn't call channel->sc_creation_callback()
directly for sub-channels, because sc_creation_callback() ->
vmbus_open() may never get the host's response to the
OPEN_CHANNEL message (the host may rescind a channel at any time,
e.g. in the case of hot removing a NIC), and vmbus_onoffer_rescind()
may not wake up the vmbus_open() as it's blocked due to a non-zero
vmbus_connection.offer_in_progress, and finally we have a deadlock.
The above is also true for primary channels, if the related device
drivers use sync probing mode by default.
And, usually the handling of primary channels and sub-channels can
depend on each other, so we should offload them to different
workqueues to avoid possible deadlock, e.g. in sync-probing mode,
NIC1's netvsc_subchan_work() can race with NIC2's netvsc_probe() ->
rtnl_lock(), and causes deadlock: the former gets the rtnl_lock
and waits for all the sub-channels to appear, but the latter
can't get the rtnl_lock and this blocks the handling of sub-channels.
The patch can fix the multiple-NIC deadlock described above for
v3.x kernels (e.g. RHEL 7.x) which don't support async-probing
of devices, and v4.4, v4.9, v4.14 and v4.18 which support async-probing
but don't enable async-probing for Hyper-V drivers (yet).
The patch can also fix the hang issue in sub-channel's handling described
above for all versions of kernels, including v4.19 and v4.20-rc4.
So actually the patch should be applied to all the existing kernels,
not only the kernels that have 8195b1396ec8.
Fixes: 8195b1396ec8 ("hv_netvsc: fix deadlock on hotplug")
Cc: stable@vger.kernel.org
Cc: Stephen Hemminger <sthemmin@microsoft.com>
Cc: K. Y. Srinivasan <kys@microsoft.com>
Cc: Haiyang Zhang <haiyangz@microsoft.com>
Signed-off-by: Dexuan Cui <decui@microsoft.com>
Signed-off-by: K. Y. Srinivasan <kys@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2018-12-03 07:54:35 +07:00
|
|
|
percpu_channel_deq,
|
|
|
|
newchannel, true);
|
2015-03-01 02:18:19 +07:00
|
|
|
} else {
|
|
|
|
percpu_channel_deq(newchannel);
|
|
|
|
put_cpu();
|
|
|
|
}
|
2016-06-10 08:47:24 +07:00
|
|
|
|
|
|
|
vmbus_release_relid(newchannel->offermsg.child_relid);
|
2015-03-01 02:18:19 +07:00
|
|
|
|
2015-01-20 22:45:04 +07:00
|
|
|
free_channel(newchannel);
|
2009-07-14 06:02:34 +07:00
|
|
|
}
|
|
|
|
|
Drivers: hv: vmbus: Offload the handling of channels to two workqueues
vmbus_process_offer() mustn't call channel->sc_creation_callback()
directly for sub-channels, because sc_creation_callback() ->
vmbus_open() may never get the host's response to the
OPEN_CHANNEL message (the host may rescind a channel at any time,
e.g. in the case of hot removing a NIC), and vmbus_onoffer_rescind()
may not wake up the vmbus_open() as it's blocked due to a non-zero
vmbus_connection.offer_in_progress, and finally we have a deadlock.
The above is also true for primary channels, if the related device
drivers use sync probing mode by default.
And, usually the handling of primary channels and sub-channels can
depend on each other, so we should offload them to different
workqueues to avoid possible deadlock, e.g. in sync-probing mode,
NIC1's netvsc_subchan_work() can race with NIC2's netvsc_probe() ->
rtnl_lock(), and causes deadlock: the former gets the rtnl_lock
and waits for all the sub-channels to appear, but the latter
can't get the rtnl_lock and this blocks the handling of sub-channels.
The patch can fix the multiple-NIC deadlock described above for
v3.x kernels (e.g. RHEL 7.x) which don't support async-probing
of devices, and v4.4, v4.9, v4.14 and v4.18 which support async-probing
but don't enable async-probing for Hyper-V drivers (yet).
The patch can also fix the hang issue in sub-channel's handling described
above for all versions of kernels, including v4.19 and v4.20-rc4.
So actually the patch should be applied to all the existing kernels,
not only the kernels that have 8195b1396ec8.
Fixes: 8195b1396ec8 ("hv_netvsc: fix deadlock on hotplug")
Cc: stable@vger.kernel.org
Cc: Stephen Hemminger <sthemmin@microsoft.com>
Cc: K. Y. Srinivasan <kys@microsoft.com>
Cc: Haiyang Zhang <haiyangz@microsoft.com>
Signed-off-by: Dexuan Cui <decui@microsoft.com>
Signed-off-by: K. Y. Srinivasan <kys@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2018-12-03 07:54:35 +07:00
|
|
|
/*
|
|
|
|
* vmbus_process_offer - Process the offer by creating a channel/device
|
|
|
|
* associated with this offer
|
|
|
|
*/
|
|
|
|
static void vmbus_process_offer(struct vmbus_channel *newchannel)
|
|
|
|
{
|
|
|
|
struct vmbus_channel *channel;
|
|
|
|
struct workqueue_struct *wq;
|
|
|
|
unsigned long flags;
|
|
|
|
bool fnew = true;
|
|
|
|
|
|
|
|
mutex_lock(&vmbus_connection.channel_mutex);
|
|
|
|
|
2019-09-06 06:01:21 +07:00
|
|
|
/* Remember the channels that should be cleaned up upon suspend. */
|
|
|
|
if (is_hvsock_channel(newchannel) || is_sub_channel(newchannel))
|
|
|
|
atomic_inc(&vmbus_connection.nr_chan_close_on_suspend);
|
|
|
|
|
Drivers: hv: vmbus: Offload the handling of channels to two workqueues
vmbus_process_offer() mustn't call channel->sc_creation_callback()
directly for sub-channels, because sc_creation_callback() ->
vmbus_open() may never get the host's response to the
OPEN_CHANNEL message (the host may rescind a channel at any time,
e.g. in the case of hot removing a NIC), and vmbus_onoffer_rescind()
may not wake up the vmbus_open() as it's blocked due to a non-zero
vmbus_connection.offer_in_progress, and finally we have a deadlock.
The above is also true for primary channels, if the related device
drivers use sync probing mode by default.
And, usually the handling of primary channels and sub-channels can
depend on each other, so we should offload them to different
workqueues to avoid possible deadlock, e.g. in sync-probing mode,
NIC1's netvsc_subchan_work() can race with NIC2's netvsc_probe() ->
rtnl_lock(), and causes deadlock: the former gets the rtnl_lock
and waits for all the sub-channels to appear, but the latter
can't get the rtnl_lock and this blocks the handling of sub-channels.
The patch can fix the multiple-NIC deadlock described above for
v3.x kernels (e.g. RHEL 7.x) which don't support async-probing
of devices, and v4.4, v4.9, v4.14 and v4.18 which support async-probing
but don't enable async-probing for Hyper-V drivers (yet).
The patch can also fix the hang issue in sub-channel's handling described
above for all versions of kernels, including v4.19 and v4.20-rc4.
So actually the patch should be applied to all the existing kernels,
not only the kernels that have 8195b1396ec8.
Fixes: 8195b1396ec8 ("hv_netvsc: fix deadlock on hotplug")
Cc: stable@vger.kernel.org
Cc: Stephen Hemminger <sthemmin@microsoft.com>
Cc: K. Y. Srinivasan <kys@microsoft.com>
Cc: Haiyang Zhang <haiyangz@microsoft.com>
Signed-off-by: Dexuan Cui <decui@microsoft.com>
Signed-off-by: K. Y. Srinivasan <kys@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2018-12-03 07:54:35 +07:00
|
|
|
/*
|
|
|
|
* Now that we have acquired the channel_mutex,
|
|
|
|
* we can release the potentially racing rescind thread.
|
|
|
|
*/
|
|
|
|
atomic_dec(&vmbus_connection.offer_in_progress);
|
|
|
|
|
|
|
|
list_for_each_entry(channel, &vmbus_connection.chn_list, listentry) {
|
2019-01-10 21:25:32 +07:00
|
|
|
if (guid_equal(&channel->offermsg.offer.if_type,
|
|
|
|
&newchannel->offermsg.offer.if_type) &&
|
|
|
|
guid_equal(&channel->offermsg.offer.if_instance,
|
|
|
|
&newchannel->offermsg.offer.if_instance)) {
|
Drivers: hv: vmbus: Offload the handling of channels to two workqueues
vmbus_process_offer() mustn't call channel->sc_creation_callback()
directly for sub-channels, because sc_creation_callback() ->
vmbus_open() may never get the host's response to the
OPEN_CHANNEL message (the host may rescind a channel at any time,
e.g. in the case of hot removing a NIC), and vmbus_onoffer_rescind()
may not wake up the vmbus_open() as it's blocked due to a non-zero
vmbus_connection.offer_in_progress, and finally we have a deadlock.
The above is also true for primary channels, if the related device
drivers use sync probing mode by default.
And, usually the handling of primary channels and sub-channels can
depend on each other, so we should offload them to different
workqueues to avoid possible deadlock, e.g. in sync-probing mode,
NIC1's netvsc_subchan_work() can race with NIC2's netvsc_probe() ->
rtnl_lock(), and causes deadlock: the former gets the rtnl_lock
and waits for all the sub-channels to appear, but the latter
can't get the rtnl_lock and this blocks the handling of sub-channels.
The patch can fix the multiple-NIC deadlock described above for
v3.x kernels (e.g. RHEL 7.x) which don't support async-probing
of devices, and v4.4, v4.9, v4.14 and v4.18 which support async-probing
but don't enable async-probing for Hyper-V drivers (yet).
The patch can also fix the hang issue in sub-channel's handling described
above for all versions of kernels, including v4.19 and v4.20-rc4.
So actually the patch should be applied to all the existing kernels,
not only the kernels that have 8195b1396ec8.
Fixes: 8195b1396ec8 ("hv_netvsc: fix deadlock on hotplug")
Cc: stable@vger.kernel.org
Cc: Stephen Hemminger <sthemmin@microsoft.com>
Cc: K. Y. Srinivasan <kys@microsoft.com>
Cc: Haiyang Zhang <haiyangz@microsoft.com>
Signed-off-by: Dexuan Cui <decui@microsoft.com>
Signed-off-by: K. Y. Srinivasan <kys@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2018-12-03 07:54:35 +07:00
|
|
|
fnew = false;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (fnew)
|
|
|
|
list_add_tail(&newchannel->listentry,
|
|
|
|
&vmbus_connection.chn_list);
|
|
|
|
else {
|
|
|
|
/*
|
|
|
|
* Check to see if this is a valid sub-channel.
|
|
|
|
*/
|
|
|
|
if (newchannel->offermsg.offer.sub_channel_index == 0) {
|
|
|
|
mutex_unlock(&vmbus_connection.channel_mutex);
|
|
|
|
/*
|
|
|
|
* Don't call free_channel(), because newchannel->kobj
|
|
|
|
* is not initialized yet.
|
|
|
|
*/
|
|
|
|
kfree(newchannel);
|
|
|
|
WARN_ON_ONCE(1);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* Process the sub-channel.
|
|
|
|
*/
|
|
|
|
newchannel->primary_channel = channel;
|
|
|
|
spin_lock_irqsave(&channel->lock, flags);
|
|
|
|
list_add_tail(&newchannel->sc_list, &channel->sc_list);
|
|
|
|
spin_unlock_irqrestore(&channel->lock, flags);
|
|
|
|
}
|
|
|
|
|
|
|
|
mutex_unlock(&vmbus_connection.channel_mutex);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* vmbus_process_offer() mustn't call channel->sc_creation_callback()
|
|
|
|
* directly for sub-channels, because sc_creation_callback() ->
|
|
|
|
* vmbus_open() may never get the host's response to the
|
|
|
|
* OPEN_CHANNEL message (the host may rescind a channel at any time,
|
|
|
|
* e.g. in the case of hot removing a NIC), and vmbus_onoffer_rescind()
|
|
|
|
* may not wake up the vmbus_open() as it's blocked due to a non-zero
|
|
|
|
* vmbus_connection.offer_in_progress, and finally we have a deadlock.
|
|
|
|
*
|
|
|
|
* The above is also true for primary channels, if the related device
|
|
|
|
* drivers use sync probing mode by default.
|
|
|
|
*
|
|
|
|
* And, usually the handling of primary channels and sub-channels can
|
|
|
|
* depend on each other, so we should offload them to different
|
|
|
|
* workqueues to avoid possible deadlock, e.g. in sync-probing mode,
|
|
|
|
* NIC1's netvsc_subchan_work() can race with NIC2's netvsc_probe() ->
|
|
|
|
* rtnl_lock(), and causes deadlock: the former gets the rtnl_lock
|
|
|
|
* and waits for all the sub-channels to appear, but the latter
|
|
|
|
* can't get the rtnl_lock and this blocks the handling of
|
|
|
|
* sub-channels.
|
|
|
|
*/
|
|
|
|
INIT_WORK(&newchannel->add_channel_work, vmbus_add_channel_work);
|
|
|
|
wq = fnew ? vmbus_connection.handle_primary_chan_wq :
|
|
|
|
vmbus_connection.handle_sub_chan_wq;
|
|
|
|
queue_work(wq, &newchannel->add_channel_work);
|
|
|
|
}
|
|
|
|
|
2012-12-01 21:46:50 +07:00
|
|
|
/*
|
|
|
|
* We use this state to statically distribute the channel interrupt load.
|
|
|
|
*/
|
2015-05-31 13:37:48 +07:00
|
|
|
static int next_numa_node_id;
|
Drivers: hv: vmbus: Offload the handling of channels to two workqueues
vmbus_process_offer() mustn't call channel->sc_creation_callback()
directly for sub-channels, because sc_creation_callback() ->
vmbus_open() may never get the host's response to the
OPEN_CHANNEL message (the host may rescind a channel at any time,
e.g. in the case of hot removing a NIC), and vmbus_onoffer_rescind()
may not wake up the vmbus_open() as it's blocked due to a non-zero
vmbus_connection.offer_in_progress, and finally we have a deadlock.
The above is also true for primary channels, if the related device
drivers use sync probing mode by default.
And, usually the handling of primary channels and sub-channels can
depend on each other, so we should offload them to different
workqueues to avoid possible deadlock, e.g. in sync-probing mode,
NIC1's netvsc_subchan_work() can race with NIC2's netvsc_probe() ->
rtnl_lock(), and causes deadlock: the former gets the rtnl_lock
and waits for all the sub-channels to appear, but the latter
can't get the rtnl_lock and this blocks the handling of sub-channels.
The patch can fix the multiple-NIC deadlock described above for
v3.x kernels (e.g. RHEL 7.x) which don't support async-probing
of devices, and v4.4, v4.9, v4.14 and v4.18 which support async-probing
but don't enable async-probing for Hyper-V drivers (yet).
The patch can also fix the hang issue in sub-channel's handling described
above for all versions of kernels, including v4.19 and v4.20-rc4.
So actually the patch should be applied to all the existing kernels,
not only the kernels that have 8195b1396ec8.
Fixes: 8195b1396ec8 ("hv_netvsc: fix deadlock on hotplug")
Cc: stable@vger.kernel.org
Cc: Stephen Hemminger <sthemmin@microsoft.com>
Cc: K. Y. Srinivasan <kys@microsoft.com>
Cc: Haiyang Zhang <haiyangz@microsoft.com>
Signed-off-by: Dexuan Cui <decui@microsoft.com>
Signed-off-by: K. Y. Srinivasan <kys@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2018-12-03 07:54:35 +07:00
|
|
|
/*
|
|
|
|
* init_vp_index() accesses global variables like next_numa_node_id, and
|
|
|
|
* it can run concurrently for primary channels and sub-channels: see
|
|
|
|
* vmbus_process_offer(), so we need the lock to protect the global
|
|
|
|
* variables.
|
|
|
|
*/
|
|
|
|
static DEFINE_SPINLOCK(bind_channel_to_cpu_lock);
|
2012-12-01 21:46:50 +07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Starting with Win8, we can statically distribute the incoming
|
2015-05-31 13:37:48 +07:00
|
|
|
* channel interrupt load by binding a channel to VCPU.
|
2018-03-05 12:17:17 +07:00
|
|
|
* We distribute the interrupt loads to one or more NUMA nodes based on
|
|
|
|
* the channel's affinity_policy.
|
2015-05-31 13:37:48 +07:00
|
|
|
*
|
|
|
|
* For pre-win8 hosts or non-performance critical channels we assign the
|
|
|
|
* first CPU in the first NUMA node.
|
2012-12-01 21:46:50 +07:00
|
|
|
*/
|
2015-12-26 11:00:30 +07:00
|
|
|
static void init_vp_index(struct vmbus_channel *channel, u16 dev_type)
|
2012-12-01 21:46:50 +07:00
|
|
|
{
|
|
|
|
u32 cur_cpu;
|
2015-12-26 11:00:30 +07:00
|
|
|
bool perf_chn = vmbus_devs[dev_type].perf_device;
|
2015-05-31 13:37:48 +07:00
|
|
|
struct vmbus_channel *primary = channel->primary_channel;
|
|
|
|
int next_node;
|
2018-09-24 04:10:44 +07:00
|
|
|
cpumask_var_t available_mask;
|
2015-08-05 14:52:38 +07:00
|
|
|
struct cpumask *alloced_mask;
|
2012-12-01 21:46:50 +07:00
|
|
|
|
|
|
|
if ((vmbus_proto_version == VERSION_WS2008) ||
|
2018-09-24 04:10:44 +07:00
|
|
|
(vmbus_proto_version == VERSION_WIN7) || (!perf_chn) ||
|
|
|
|
!alloc_cpumask_var(&available_mask, GFP_KERNEL)) {
|
2012-12-01 21:46:50 +07:00
|
|
|
/*
|
|
|
|
* Prior to win8, all channel interrupts are
|
|
|
|
* delivered on cpu 0.
|
|
|
|
* Also if the channel is not a performance critical
|
|
|
|
* channel, bind it to cpu 0.
|
2018-09-24 04:10:44 +07:00
|
|
|
* In case alloc_cpumask_var() fails, bind it to cpu 0.
|
2012-12-01 21:46:50 +07:00
|
|
|
*/
|
2015-05-31 13:37:48 +07:00
|
|
|
channel->numa_node = 0;
|
2014-04-09 08:45:53 +07:00
|
|
|
channel->target_cpu = 0;
|
2017-08-02 23:09:18 +07:00
|
|
|
channel->target_vp = hv_cpu_number_to_vp_number(0);
|
2014-04-09 08:45:53 +07:00
|
|
|
return;
|
2012-12-01 21:46:50 +07:00
|
|
|
}
|
2015-05-07 07:47:46 +07:00
|
|
|
|
Drivers: hv: vmbus: Offload the handling of channels to two workqueues
vmbus_process_offer() mustn't call channel->sc_creation_callback()
directly for sub-channels, because sc_creation_callback() ->
vmbus_open() may never get the host's response to the
OPEN_CHANNEL message (the host may rescind a channel at any time,
e.g. in the case of hot removing a NIC), and vmbus_onoffer_rescind()
may not wake up the vmbus_open() as it's blocked due to a non-zero
vmbus_connection.offer_in_progress, and finally we have a deadlock.
The above is also true for primary channels, if the related device
drivers use sync probing mode by default.
And, usually the handling of primary channels and sub-channels can
depend on each other, so we should offload them to different
workqueues to avoid possible deadlock, e.g. in sync-probing mode,
NIC1's netvsc_subchan_work() can race with NIC2's netvsc_probe() ->
rtnl_lock(), and causes deadlock: the former gets the rtnl_lock
and waits for all the sub-channels to appear, but the latter
can't get the rtnl_lock and this blocks the handling of sub-channels.
The patch can fix the multiple-NIC deadlock described above for
v3.x kernels (e.g. RHEL 7.x) which don't support async-probing
of devices, and v4.4, v4.9, v4.14 and v4.18 which support async-probing
but don't enable async-probing for Hyper-V drivers (yet).
The patch can also fix the hang issue in sub-channel's handling described
above for all versions of kernels, including v4.19 and v4.20-rc4.
So actually the patch should be applied to all the existing kernels,
not only the kernels that have 8195b1396ec8.
Fixes: 8195b1396ec8 ("hv_netvsc: fix deadlock on hotplug")
Cc: stable@vger.kernel.org
Cc: Stephen Hemminger <sthemmin@microsoft.com>
Cc: K. Y. Srinivasan <kys@microsoft.com>
Cc: Haiyang Zhang <haiyangz@microsoft.com>
Signed-off-by: Dexuan Cui <decui@microsoft.com>
Signed-off-by: K. Y. Srinivasan <kys@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2018-12-03 07:54:35 +07:00
|
|
|
spin_lock(&bind_channel_to_cpu_lock);
|
|
|
|
|
2015-05-07 07:47:46 +07:00
|
|
|
/*
|
2016-09-02 19:58:23 +07:00
|
|
|
* Based on the channel affinity policy, we will assign the NUMA
|
|
|
|
* nodes.
|
2015-05-07 07:47:46 +07:00
|
|
|
*/
|
2016-09-02 19:58:23 +07:00
|
|
|
|
|
|
|
if ((channel->affinity_policy == HV_BALANCED) || (!primary)) {
|
2015-05-31 13:37:48 +07:00
|
|
|
while (true) {
|
|
|
|
next_node = next_numa_node_id++;
|
2016-09-02 19:58:23 +07:00
|
|
|
if (next_node == nr_node_ids) {
|
2015-05-31 13:37:48 +07:00
|
|
|
next_node = next_numa_node_id = 0;
|
2016-09-02 19:58:23 +07:00
|
|
|
continue;
|
|
|
|
}
|
2015-05-31 13:37:48 +07:00
|
|
|
if (cpumask_empty(cpumask_of_node(next_node)))
|
|
|
|
continue;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
channel->numa_node = next_node;
|
|
|
|
primary = channel;
|
|
|
|
}
|
2015-08-05 14:52:38 +07:00
|
|
|
alloced_mask = &hv_context.hv_numa_map[primary->numa_node];
|
2015-05-31 13:37:48 +07:00
|
|
|
|
2015-08-05 14:52:38 +07:00
|
|
|
if (cpumask_weight(alloced_mask) ==
|
2015-05-31 13:37:48 +07:00
|
|
|
cpumask_weight(cpumask_of_node(primary->numa_node))) {
|
2015-05-07 07:47:46 +07:00
|
|
|
/*
|
2015-05-31 13:37:48 +07:00
|
|
|
* We have cycled through all the CPUs in the node;
|
|
|
|
* reset the alloced map.
|
2015-05-07 07:47:46 +07:00
|
|
|
*/
|
2015-08-05 14:52:38 +07:00
|
|
|
cpumask_clear(alloced_mask);
|
2015-05-07 07:47:46 +07:00
|
|
|
}
|
|
|
|
|
2018-09-24 04:10:44 +07:00
|
|
|
cpumask_xor(available_mask, alloced_mask,
|
2015-05-31 13:37:48 +07:00
|
|
|
cpumask_of_node(primary->numa_node));
|
|
|
|
|
2015-08-05 14:52:39 +07:00
|
|
|
cur_cpu = -1;
|
2016-01-28 13:29:34 +07:00
|
|
|
|
2016-09-02 19:58:23 +07:00
|
|
|
if (primary->affinity_policy == HV_LOCALIZED) {
|
|
|
|
/*
|
|
|
|
* Normally Hyper-V host doesn't create more subchannels
|
|
|
|
* than there are VCPUs on the node but it is possible when not
|
|
|
|
* all present VCPUs on the node are initialized by guest.
|
|
|
|
* Clear the alloced_cpus_in_node to start over.
|
|
|
|
*/
|
|
|
|
if (cpumask_equal(&primary->alloced_cpus_in_node,
|
|
|
|
cpumask_of_node(primary->numa_node)))
|
|
|
|
cpumask_clear(&primary->alloced_cpus_in_node);
|
|
|
|
}
|
2016-01-28 13:29:34 +07:00
|
|
|
|
2015-08-05 14:52:39 +07:00
|
|
|
while (true) {
|
2018-09-24 04:10:44 +07:00
|
|
|
cur_cpu = cpumask_next(cur_cpu, available_mask);
|
2015-08-05 14:52:39 +07:00
|
|
|
if (cur_cpu >= nr_cpu_ids) {
|
|
|
|
cur_cpu = -1;
|
2018-09-24 04:10:44 +07:00
|
|
|
cpumask_copy(available_mask,
|
2015-08-05 14:52:39 +07:00
|
|
|
cpumask_of_node(primary->numa_node));
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2016-09-02 19:58:23 +07:00
|
|
|
if (primary->affinity_policy == HV_LOCALIZED) {
|
|
|
|
/*
|
|
|
|
* NOTE: in the case of sub-channel, we clear the
|
|
|
|
* sub-channel related bit(s) in
|
|
|
|
* primary->alloced_cpus_in_node in
|
|
|
|
* hv_process_channel_removal(), so when we
|
|
|
|
* reload drivers like hv_netvsc in SMP guest, here
|
|
|
|
* we're able to re-allocate
|
|
|
|
* bit from primary->alloced_cpus_in_node.
|
|
|
|
*/
|
|
|
|
if (!cpumask_test_cpu(cur_cpu,
|
|
|
|
&primary->alloced_cpus_in_node)) {
|
|
|
|
cpumask_set_cpu(cur_cpu,
|
|
|
|
&primary->alloced_cpus_in_node);
|
|
|
|
cpumask_set_cpu(cur_cpu, alloced_mask);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} else {
|
2015-08-05 14:52:39 +07:00
|
|
|
cpumask_set_cpu(cur_cpu, alloced_mask);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2015-05-31 13:37:48 +07:00
|
|
|
|
2014-04-09 08:45:53 +07:00
|
|
|
channel->target_cpu = cur_cpu;
|
2017-08-02 23:09:18 +07:00
|
|
|
channel->target_vp = hv_cpu_number_to_vp_number(cur_cpu);
|
2018-09-24 04:10:44 +07:00
|
|
|
|
Drivers: hv: vmbus: Offload the handling of channels to two workqueues
vmbus_process_offer() mustn't call channel->sc_creation_callback()
directly for sub-channels, because sc_creation_callback() ->
vmbus_open() may never get the host's response to the
OPEN_CHANNEL message (the host may rescind a channel at any time,
e.g. in the case of hot removing a NIC), and vmbus_onoffer_rescind()
may not wake up the vmbus_open() as it's blocked due to a non-zero
vmbus_connection.offer_in_progress, and finally we have a deadlock.
The above is also true for primary channels, if the related device
drivers use sync probing mode by default.
And, usually the handling of primary channels and sub-channels can
depend on each other, so we should offload them to different
workqueues to avoid possible deadlock, e.g. in sync-probing mode,
NIC1's netvsc_subchan_work() can race with NIC2's netvsc_probe() ->
rtnl_lock(), and causes deadlock: the former gets the rtnl_lock
and waits for all the sub-channels to appear, but the latter
can't get the rtnl_lock and this blocks the handling of sub-channels.
The patch can fix the multiple-NIC deadlock described above for
v3.x kernels (e.g. RHEL 7.x) which don't support async-probing
of devices, and v4.4, v4.9, v4.14 and v4.18 which support async-probing
but don't enable async-probing for Hyper-V drivers (yet).
The patch can also fix the hang issue in sub-channel's handling described
above for all versions of kernels, including v4.19 and v4.20-rc4.
So actually the patch should be applied to all the existing kernels,
not only the kernels that have 8195b1396ec8.
Fixes: 8195b1396ec8 ("hv_netvsc: fix deadlock on hotplug")
Cc: stable@vger.kernel.org
Cc: Stephen Hemminger <sthemmin@microsoft.com>
Cc: K. Y. Srinivasan <kys@microsoft.com>
Cc: Haiyang Zhang <haiyangz@microsoft.com>
Signed-off-by: Dexuan Cui <decui@microsoft.com>
Signed-off-by: K. Y. Srinivasan <kys@microsoft.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2018-12-03 07:54:35 +07:00
|
|
|
spin_unlock(&bind_channel_to_cpu_lock);
|
|
|
|
|
2018-09-24 04:10:44 +07:00
|
|
|
free_cpumask_var(available_mask);
|
2012-12-01 21:46:50 +07:00
|
|
|
}
|
|
|
|
|
2016-01-28 13:29:35 +07:00
|
|
|
static void vmbus_wait_for_unload(void)
|
|
|
|
{
|
2016-05-01 09:21:34 +07:00
|
|
|
int cpu;
|
|
|
|
void *page_addr;
|
|
|
|
struct hv_message *msg;
|
2016-01-28 13:29:35 +07:00
|
|
|
struct vmbus_channel_message_header *hdr;
|
2016-05-01 09:21:34 +07:00
|
|
|
u32 message_type;
|
2016-01-28 13:29:35 +07:00
|
|
|
|
2016-05-01 09:21:34 +07:00
|
|
|
/*
|
|
|
|
* CHANNELMSG_UNLOAD_RESPONSE is always delivered to the CPU which was
|
|
|
|
* used for initial contact or to CPU0 depending on host version. When
|
|
|
|
* we're crashing on a different CPU let's hope that IRQ handler on
|
|
|
|
* the cpu which receives CHANNELMSG_UNLOAD_RESPONSE is still
|
|
|
|
* functional and vmbus_unload_response() will complete
|
|
|
|
* vmbus_connection.unload_event. If not, the last thing we can do is
|
|
|
|
* read message pages for all CPUs directly.
|
|
|
|
*/
|
2016-01-28 13:29:35 +07:00
|
|
|
while (1) {
|
2016-05-01 09:21:34 +07:00
|
|
|
if (completion_done(&vmbus_connection.unload_event))
|
|
|
|
break;
|
2016-01-28 13:29:35 +07:00
|
|
|
|
2016-05-01 09:21:34 +07:00
|
|
|
for_each_online_cpu(cpu) {
|
2017-02-12 13:02:19 +07:00
|
|
|
struct hv_per_cpu_context *hv_cpu
|
|
|
|
= per_cpu_ptr(hv_context.cpu_context, cpu);
|
|
|
|
|
|
|
|
page_addr = hv_cpu->synic_message_page;
|
|
|
|
msg = (struct hv_message *)page_addr
|
|
|
|
+ VMBUS_MESSAGE_SINT;
|
2016-01-28 13:29:35 +07:00
|
|
|
|
2016-05-01 09:21:34 +07:00
|
|
|
message_type = READ_ONCE(msg->header.message_type);
|
|
|
|
if (message_type == HVMSG_NONE)
|
|
|
|
continue;
|
2016-01-28 13:29:35 +07:00
|
|
|
|
2016-05-01 09:21:34 +07:00
|
|
|
hdr = (struct vmbus_channel_message_header *)
|
|
|
|
msg->u.payload;
|
|
|
|
|
|
|
|
if (hdr->msgtype == CHANNELMSG_UNLOAD_RESPONSE)
|
|
|
|
complete(&vmbus_connection.unload_event);
|
|
|
|
|
|
|
|
vmbus_signal_eom(msg, message_type);
|
|
|
|
}
|
|
|
|
|
|
|
|
mdelay(10);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We're crashing and already got the UNLOAD_RESPONSE, cleanup all
|
|
|
|
* maybe-pending messages on all CPUs to be able to receive new
|
|
|
|
* messages after we reconnect.
|
|
|
|
*/
|
|
|
|
for_each_online_cpu(cpu) {
|
2017-02-12 13:02:19 +07:00
|
|
|
struct hv_per_cpu_context *hv_cpu
|
|
|
|
= per_cpu_ptr(hv_context.cpu_context, cpu);
|
|
|
|
|
|
|
|
page_addr = hv_cpu->synic_message_page;
|
2016-05-01 09:21:34 +07:00
|
|
|
msg = (struct hv_message *)page_addr + VMBUS_MESSAGE_SINT;
|
|
|
|
msg->header.message_type = HVMSG_NONE;
|
2016-01-28 13:29:35 +07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-23 11:31:32 +07:00
|
|
|
/*
|
|
|
|
* vmbus_unload_response - Handler for the unload response.
|
|
|
|
*/
|
|
|
|
static void vmbus_unload_response(struct vmbus_channel_message_header *hdr)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* This is a global event; just wakeup the waiting thread.
|
|
|
|
* Once we successfully unload, we can cleanup the monitor state.
|
|
|
|
*/
|
|
|
|
complete(&vmbus_connection.unload_event);
|
|
|
|
}
|
|
|
|
|
2016-02-27 06:13:16 +07:00
|
|
|
void vmbus_initiate_unload(bool crash)
|
2015-04-23 11:31:32 +07:00
|
|
|
{
|
|
|
|
struct vmbus_channel_message_header hdr;
|
|
|
|
|
2015-08-02 06:08:19 +07:00
|
|
|
/* Pre-Win2012R2 hosts don't support reconnect */
|
|
|
|
if (vmbus_proto_version < VERSION_WIN8_1)
|
|
|
|
return;
|
|
|
|
|
2015-04-23 11:31:32 +07:00
|
|
|
init_completion(&vmbus_connection.unload_event);
|
|
|
|
memset(&hdr, 0, sizeof(struct vmbus_channel_message_header));
|
|
|
|
hdr.msgtype = CHANNELMSG_UNLOAD;
|
2016-12-07 16:16:24 +07:00
|
|
|
vmbus_post_msg(&hdr, sizeof(struct vmbus_channel_message_header),
|
|
|
|
!crash);
|
2015-04-23 11:31:32 +07:00
|
|
|
|
2016-01-28 13:29:35 +07:00
|
|
|
/*
|
|
|
|
* vmbus_initiate_unload() is also called on crash and the crash can be
|
|
|
|
* happening in an interrupt context, where scheduling is impossible.
|
|
|
|
*/
|
2016-02-27 06:13:16 +07:00
|
|
|
if (!crash)
|
2016-01-28 13:29:35 +07:00
|
|
|
wait_for_completion(&vmbus_connection.unload_event);
|
|
|
|
else
|
|
|
|
vmbus_wait_for_unload();
|
2015-04-23 11:31:32 +07:00
|
|
|
}
|
|
|
|
|
2019-09-06 06:01:22 +07:00
|
|
|
static void check_ready_for_resume_event(void)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* If all the old primary channels have been fixed up, then it's safe
|
|
|
|
* to resume.
|
|
|
|
*/
|
|
|
|
if (atomic_dec_and_test(&vmbus_connection.nr_chan_fixup_on_resume))
|
|
|
|
complete(&vmbus_connection.ready_for_resume_event);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void vmbus_setup_channel_state(struct vmbus_channel *channel,
|
|
|
|
struct vmbus_channel_offer_channel *offer)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Setup state for signalling the host.
|
|
|
|
*/
|
|
|
|
channel->sig_event = VMBUS_EVENT_CONNECTION_ID;
|
|
|
|
|
|
|
|
if (vmbus_proto_version != VERSION_WS2008) {
|
|
|
|
channel->is_dedicated_interrupt =
|
|
|
|
(offer->is_dedicated_interrupt != 0);
|
|
|
|
channel->sig_event = offer->connection_id;
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(&channel->offermsg, offer,
|
|
|
|
sizeof(struct vmbus_channel_offer_channel));
|
|
|
|
channel->monitor_grp = (u8)offer->monitorid / 32;
|
|
|
|
channel->monitor_bit = (u8)offer->monitorid % 32;
|
|
|
|
}
|
|
|
|
|
2019-09-06 06:01:18 +07:00
|
|
|
/*
|
|
|
|
* find_primary_channel_by_offer - Get the channel object given the new offer.
|
|
|
|
* This is only used in the resume path of hibernation.
|
|
|
|
*/
|
|
|
|
static struct vmbus_channel *
|
|
|
|
find_primary_channel_by_offer(const struct vmbus_channel_offer_channel *offer)
|
|
|
|
{
|
|
|
|
struct vmbus_channel *channel = NULL, *iter;
|
|
|
|
const guid_t *inst1, *inst2;
|
|
|
|
|
|
|
|
/* Ignore sub-channel offers. */
|
|
|
|
if (offer->offer.sub_channel_index != 0)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
mutex_lock(&vmbus_connection.channel_mutex);
|
|
|
|
|
|
|
|
list_for_each_entry(iter, &vmbus_connection.chn_list, listentry) {
|
|
|
|
inst1 = &iter->offermsg.offer.if_instance;
|
|
|
|
inst2 = &offer->offer.if_instance;
|
|
|
|
|
|
|
|
if (guid_equal(inst1, inst2)) {
|
|
|
|
channel = iter;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
mutex_unlock(&vmbus_connection.channel_mutex);
|
|
|
|
|
|
|
|
return channel;
|
|
|
|
}
|
|
|
|
|
2010-03-05 05:11:00 +07:00
|
|
|
/*
|
2010-10-16 00:14:07 +07:00
|
|
|
* vmbus_onoffer - Handler for channel offers from vmbus in parent partition.
|
2009-09-01 11:47:21 +07:00
|
|
|
*
|
|
|
|
*/
|
2010-10-16 00:14:07 +07:00
|
|
|
static void vmbus_onoffer(struct vmbus_channel_message_header *hdr)
|
2009-07-14 06:02:34 +07:00
|
|
|
{
|
2009-09-01 11:47:21 +07:00
|
|
|
struct vmbus_channel_offer_channel *offer;
|
2019-09-06 06:01:18 +07:00
|
|
|
struct vmbus_channel *oldchannel, *newchannel;
|
|
|
|
size_t offer_sz;
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2009-09-01 11:47:21 +07:00
|
|
|
offer = (struct vmbus_channel_offer_channel *)hdr;
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2017-10-30 02:21:02 +07:00
|
|
|
trace_vmbus_onoffer(offer);
|
|
|
|
|
2019-09-06 06:01:18 +07:00
|
|
|
oldchannel = find_primary_channel_by_offer(offer);
|
|
|
|
|
|
|
|
if (oldchannel != NULL) {
|
|
|
|
atomic_dec(&vmbus_connection.offer_in_progress);
|
|
|
|
|
|
|
|
/*
|
2019-09-06 06:01:22 +07:00
|
|
|
* We're resuming from hibernation: all the sub-channel and
|
|
|
|
* hv_sock channels we had before the hibernation should have
|
|
|
|
* been cleaned up, and now we must be seeing a re-offered
|
|
|
|
* primary channel that we had before the hibernation.
|
2019-09-06 06:01:18 +07:00
|
|
|
*/
|
2019-09-06 06:01:22 +07:00
|
|
|
|
|
|
|
WARN_ON(oldchannel->offermsg.child_relid != INVALID_RELID);
|
|
|
|
/* Fix up the relid. */
|
|
|
|
oldchannel->offermsg.child_relid = offer->child_relid;
|
|
|
|
|
2019-09-06 06:01:18 +07:00
|
|
|
offer_sz = sizeof(*offer);
|
2019-09-06 06:01:22 +07:00
|
|
|
if (memcmp(offer, &oldchannel->offermsg, offer_sz) == 0) {
|
|
|
|
check_ready_for_resume_event();
|
2019-09-06 06:01:18 +07:00
|
|
|
return;
|
2019-09-06 06:01:22 +07:00
|
|
|
}
|
2019-09-06 06:01:18 +07:00
|
|
|
|
2019-09-06 06:01:22 +07:00
|
|
|
/*
|
|
|
|
* This is not an error, since the host can also change the
|
|
|
|
* other field(s) of the offer, e.g. on WS RS5 (Build 17763),
|
|
|
|
* the offer->connection_id of the Mellanox VF vmbus device
|
|
|
|
* can change when the host reoffers the device upon resume.
|
|
|
|
*/
|
|
|
|
pr_debug("vmbus offer changed: relid=%d\n",
|
2019-09-06 06:01:18 +07:00
|
|
|
offer->child_relid);
|
|
|
|
|
|
|
|
print_hex_dump_debug("Old vmbus offer: ", DUMP_PREFIX_OFFSET,
|
|
|
|
16, 4, &oldchannel->offermsg, offer_sz,
|
|
|
|
false);
|
|
|
|
print_hex_dump_debug("New vmbus offer: ", DUMP_PREFIX_OFFSET,
|
|
|
|
16, 4, offer, offer_sz, false);
|
2019-09-06 06:01:22 +07:00
|
|
|
|
|
|
|
/* Fix up the old channel. */
|
|
|
|
vmbus_setup_channel_state(oldchannel, offer);
|
|
|
|
|
|
|
|
check_ready_for_resume_event();
|
|
|
|
|
2019-09-06 06:01:18 +07:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2009-07-28 03:47:24 +07:00
|
|
|
/* Allocate the channel object and save this offer. */
|
2010-10-16 00:14:07 +07:00
|
|
|
newchannel = alloc_channel();
|
2010-10-16 00:14:06 +07:00
|
|
|
if (!newchannel) {
|
2017-03-14 05:57:09 +07:00
|
|
|
vmbus_release_relid(offer->child_relid);
|
2017-05-01 06:21:18 +07:00
|
|
|
atomic_dec(&vmbus_connection.offer_in_progress);
|
2011-03-30 03:58:47 +07:00
|
|
|
pr_err("Unable to allocate channel object\n");
|
2009-07-14 06:02:34 +07:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-09-06 06:01:22 +07:00
|
|
|
vmbus_setup_channel_state(newchannel, offer);
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2015-03-01 02:18:18 +07:00
|
|
|
vmbus_process_offer(newchannel);
|
2009-07-14 06:02:34 +07:00
|
|
|
}
|
|
|
|
|
2019-09-06 06:01:21 +07:00
|
|
|
static void check_ready_for_suspend_event(void)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* If all the sub-channels or hv_sock channels have been cleaned up,
|
|
|
|
* then it's safe to suspend.
|
|
|
|
*/
|
|
|
|
if (atomic_dec_and_test(&vmbus_connection.nr_chan_close_on_suspend))
|
|
|
|
complete(&vmbus_connection.ready_for_suspend_event);
|
|
|
|
}
|
|
|
|
|
2010-03-05 05:11:00 +07:00
|
|
|
/*
|
2010-10-16 00:14:07 +07:00
|
|
|
* vmbus_onoffer_rescind - Rescind offer handler.
|
2009-09-01 11:47:21 +07:00
|
|
|
*
|
|
|
|
* We queue a work item to process this offer synchronously
|
|
|
|
*/
|
2010-10-16 00:14:07 +07:00
|
|
|
static void vmbus_onoffer_rescind(struct vmbus_channel_message_header *hdr)
|
2009-07-14 06:02:34 +07:00
|
|
|
{
|
2009-09-01 11:47:21 +07:00
|
|
|
struct vmbus_channel_rescind_offer *rescind;
|
2009-08-19 05:21:19 +07:00
|
|
|
struct vmbus_channel *channel;
|
2015-03-27 23:10:09 +07:00
|
|
|
struct device *dev;
|
2019-09-06 06:01:21 +07:00
|
|
|
bool clean_up_chan_for_suspend;
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2009-09-01 11:47:21 +07:00
|
|
|
rescind = (struct vmbus_channel_rescind_offer *)hdr;
|
2016-01-28 13:29:43 +07:00
|
|
|
|
2017-10-30 02:21:03 +07:00
|
|
|
trace_vmbus_onoffer_rescind(rescind);
|
|
|
|
|
2017-05-01 06:21:18 +07:00
|
|
|
/*
|
|
|
|
* The offer msg and the corresponding rescind msg
|
|
|
|
* from the host are guranteed to be ordered -
|
|
|
|
* offer comes in first and then the rescind.
|
|
|
|
* Since we process these events in work elements,
|
|
|
|
* and with preemption, we may end up processing
|
|
|
|
* the events out of order. Given that we handle these
|
|
|
|
* work elements on the same CPU, this is possible only
|
|
|
|
* in the case of preemption. In any case wait here
|
|
|
|
* until the offer processing has moved beyond the
|
|
|
|
* point where the channel is discoverable.
|
|
|
|
*/
|
|
|
|
|
|
|
|
while (atomic_read(&vmbus_connection.offer_in_progress) != 0) {
|
|
|
|
/*
|
|
|
|
* We wait here until any channel offer is currently
|
|
|
|
* being processed.
|
|
|
|
*/
|
|
|
|
msleep(1);
|
|
|
|
}
|
|
|
|
|
2016-01-28 13:29:43 +07:00
|
|
|
mutex_lock(&vmbus_connection.channel_mutex);
|
2015-03-27 23:10:09 +07:00
|
|
|
channel = relid2channel(rescind->child_relid);
|
2017-05-01 06:21:18 +07:00
|
|
|
mutex_unlock(&vmbus_connection.channel_mutex);
|
2011-03-30 03:58:44 +07:00
|
|
|
|
2015-03-01 02:18:18 +07:00
|
|
|
if (channel == NULL) {
|
2015-12-15 07:01:50 +07:00
|
|
|
/*
|
2017-05-01 06:21:18 +07:00
|
|
|
* We failed in processing the offer message;
|
|
|
|
* we would have cleaned up the relid in that
|
|
|
|
* failure path.
|
2015-12-15 07:01:50 +07:00
|
|
|
*/
|
2017-05-01 06:21:18 +07:00
|
|
|
return;
|
2015-03-01 02:18:18 +07:00
|
|
|
}
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2019-09-06 06:01:21 +07:00
|
|
|
clean_up_chan_for_suspend = is_hvsock_channel(channel) ||
|
|
|
|
is_sub_channel(channel);
|
2018-08-02 10:08:23 +07:00
|
|
|
/*
|
|
|
|
* Before setting channel->rescind in vmbus_rescind_cleanup(), we
|
|
|
|
* should make sure the channel callback is not running any more.
|
|
|
|
*/
|
|
|
|
vmbus_reset_channel_cb(channel);
|
|
|
|
|
2017-08-12 00:03:59 +07:00
|
|
|
/*
|
|
|
|
* Now wait for offer handling to complete.
|
|
|
|
*/
|
2017-11-14 20:53:33 +07:00
|
|
|
vmbus_rescind_cleanup(channel);
|
2017-08-12 00:03:59 +07:00
|
|
|
while (READ_ONCE(channel->probe_done) == false) {
|
|
|
|
/*
|
|
|
|
* We wait here until any channel offer is currently
|
|
|
|
* being processed.
|
|
|
|
*/
|
|
|
|
msleep(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* At this point, the rescind handling can proceed safely.
|
|
|
|
*/
|
|
|
|
|
2015-03-27 23:10:09 +07:00
|
|
|
if (channel->device_obj) {
|
2016-01-28 13:29:42 +07:00
|
|
|
if (channel->chn_rescind_callback) {
|
|
|
|
channel->chn_rescind_callback(channel);
|
2019-09-06 06:01:21 +07:00
|
|
|
|
|
|
|
if (clean_up_chan_for_suspend)
|
|
|
|
check_ready_for_suspend_event();
|
|
|
|
|
2017-05-01 06:21:18 +07:00
|
|
|
return;
|
2016-01-28 13:29:42 +07:00
|
|
|
}
|
2015-03-27 23:10:09 +07:00
|
|
|
/*
|
|
|
|
* We will have to unregister this device from the
|
|
|
|
* driver core.
|
|
|
|
*/
|
|
|
|
dev = get_device(&channel->device_obj->device);
|
|
|
|
if (dev) {
|
|
|
|
vmbus_device_unregister(channel->device_obj);
|
|
|
|
put_device(dev);
|
|
|
|
}
|
2015-03-01 02:18:18 +07:00
|
|
|
}
|
2017-05-01 06:21:18 +07:00
|
|
|
if (channel->primary_channel != NULL) {
|
|
|
|
/*
|
|
|
|
* Sub-channel is being rescinded. Following is the channel
|
|
|
|
* close sequence when initiated from the driveri (refer to
|
|
|
|
* vmbus_close() for details):
|
|
|
|
* 1. Close all sub-channels first
|
|
|
|
* 2. Then close the primary channel.
|
|
|
|
*/
|
2017-09-30 11:09:36 +07:00
|
|
|
mutex_lock(&vmbus_connection.channel_mutex);
|
2017-05-01 06:21:18 +07:00
|
|
|
if (channel->state == CHANNEL_OPEN_STATE) {
|
|
|
|
/*
|
|
|
|
* The channel is currently not open;
|
|
|
|
* it is safe for us to cleanup the channel.
|
|
|
|
*/
|
2018-09-14 23:10:15 +07:00
|
|
|
hv_process_channel_removal(channel);
|
2017-11-14 20:53:33 +07:00
|
|
|
} else {
|
|
|
|
complete(&channel->rescind_event);
|
2017-05-01 06:21:18 +07:00
|
|
|
}
|
2017-09-30 11:09:36 +07:00
|
|
|
mutex_unlock(&vmbus_connection.channel_mutex);
|
2017-05-01 06:21:18 +07:00
|
|
|
}
|
2019-09-06 06:01:21 +07:00
|
|
|
|
|
|
|
/* The "channel" may have been freed. Do not access it any longer. */
|
|
|
|
|
|
|
|
if (clean_up_chan_for_suspend)
|
|
|
|
check_ready_for_suspend_event();
|
2016-01-28 13:29:43 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
void vmbus_hvsock_device_unregister(struct vmbus_channel *channel)
|
|
|
|
{
|
|
|
|
BUG_ON(!is_hvsock_channel(channel));
|
|
|
|
|
2017-10-18 16:08:40 +07:00
|
|
|
/* We always get a rescind msg when a connection is closed. */
|
|
|
|
while (!READ_ONCE(channel->probe_done) || !READ_ONCE(channel->rescind))
|
|
|
|
msleep(1);
|
|
|
|
|
2016-01-28 13:29:43 +07:00
|
|
|
vmbus_device_unregister(channel->device_obj);
|
2009-07-14 06:02:34 +07:00
|
|
|
}
|
2016-01-28 13:29:43 +07:00
|
|
|
EXPORT_SYMBOL_GPL(vmbus_hvsock_device_unregister);
|
|
|
|
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2010-03-05 05:11:00 +07:00
|
|
|
/*
|
2010-10-16 00:14:07 +07:00
|
|
|
* vmbus_onoffers_delivered -
|
|
|
|
* This is invoked when all offers have been delivered.
|
2009-09-01 11:47:21 +07:00
|
|
|
*
|
|
|
|
* Nothing to do here.
|
|
|
|
*/
|
2010-10-16 00:14:07 +07:00
|
|
|
static void vmbus_onoffers_delivered(
|
2009-09-01 11:47:21 +07:00
|
|
|
struct vmbus_channel_message_header *hdr)
|
2009-07-14 06:02:34 +07:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2010-03-05 05:11:00 +07:00
|
|
|
/*
|
2010-10-16 00:14:07 +07:00
|
|
|
* vmbus_onopen_result - Open result handler.
|
2009-09-01 11:47:21 +07:00
|
|
|
*
|
|
|
|
* This is invoked when we received a response to our channel open request.
|
|
|
|
* Find the matching request, copy the response and signal the requesting
|
|
|
|
* thread.
|
|
|
|
*/
|
2010-10-16 00:14:07 +07:00
|
|
|
static void vmbus_onopen_result(struct vmbus_channel_message_header *hdr)
|
2009-07-14 06:02:34 +07:00
|
|
|
{
|
2009-09-01 11:47:21 +07:00
|
|
|
struct vmbus_channel_open_result *result;
|
2010-10-16 00:14:06 +07:00
|
|
|
struct vmbus_channel_msginfo *msginfo;
|
|
|
|
struct vmbus_channel_message_header *requestheader;
|
|
|
|
struct vmbus_channel_open_channel *openmsg;
|
2009-07-16 04:56:45 +07:00
|
|
|
unsigned long flags;
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2009-09-01 11:47:21 +07:00
|
|
|
result = (struct vmbus_channel_open_result *)hdr;
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2017-10-30 02:21:04 +07:00
|
|
|
trace_vmbus_onopen_result(result);
|
|
|
|
|
2009-09-01 11:47:21 +07:00
|
|
|
/*
|
|
|
|
* Find the open msg, copy the result and signal/unblock the wait event
|
|
|
|
*/
|
2011-01-27 03:12:07 +07:00
|
|
|
spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2011-02-19 03:39:57 +07:00
|
|
|
list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
|
|
|
|
msglistentry) {
|
2010-10-16 00:14:06 +07:00
|
|
|
requestheader =
|
2010-11-09 05:04:38 +07:00
|
|
|
(struct vmbus_channel_message_header *)msginfo->msg;
|
2010-10-16 00:14:06 +07:00
|
|
|
|
2010-11-09 05:04:38 +07:00
|
|
|
if (requestheader->msgtype == CHANNELMSG_OPENCHANNEL) {
|
2010-10-16 00:14:06 +07:00
|
|
|
openmsg =
|
2010-11-09 05:04:38 +07:00
|
|
|
(struct vmbus_channel_open_channel *)msginfo->msg;
|
|
|
|
if (openmsg->child_relid == result->child_relid &&
|
|
|
|
openmsg->openid == result->openid) {
|
|
|
|
memcpy(&msginfo->response.open_result,
|
2009-09-01 11:47:21 +07:00
|
|
|
result,
|
2011-05-10 21:55:39 +07:00
|
|
|
sizeof(
|
|
|
|
struct vmbus_channel_open_result));
|
|
|
|
complete(&msginfo->waitevent);
|
2009-07-14 06:02:34 +07:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2011-01-27 03:12:07 +07:00
|
|
|
spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
|
2009-07-14 06:02:34 +07:00
|
|
|
}
|
|
|
|
|
2010-03-05 05:11:00 +07:00
|
|
|
/*
|
2010-10-16 00:14:07 +07:00
|
|
|
* vmbus_ongpadl_created - GPADL created handler.
|
2009-09-01 11:47:21 +07:00
|
|
|
*
|
|
|
|
* This is invoked when we received a response to our gpadl create request.
|
|
|
|
* Find the matching request, copy the response and signal the requesting
|
|
|
|
* thread.
|
|
|
|
*/
|
2010-10-16 00:14:07 +07:00
|
|
|
static void vmbus_ongpadl_created(struct vmbus_channel_message_header *hdr)
|
2009-07-14 06:02:34 +07:00
|
|
|
{
|
2010-10-16 00:14:06 +07:00
|
|
|
struct vmbus_channel_gpadl_created *gpadlcreated;
|
|
|
|
struct vmbus_channel_msginfo *msginfo;
|
|
|
|
struct vmbus_channel_message_header *requestheader;
|
|
|
|
struct vmbus_channel_gpadl_header *gpadlheader;
|
2009-07-16 04:56:45 +07:00
|
|
|
unsigned long flags;
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2010-10-16 00:14:06 +07:00
|
|
|
gpadlcreated = (struct vmbus_channel_gpadl_created *)hdr;
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2017-10-30 02:21:05 +07:00
|
|
|
trace_vmbus_ongpadl_created(gpadlcreated);
|
|
|
|
|
2009-09-01 11:47:21 +07:00
|
|
|
/*
|
|
|
|
* Find the establish msg, copy the result and signal/unblock the wait
|
|
|
|
* event
|
|
|
|
*/
|
2011-01-27 03:12:07 +07:00
|
|
|
spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2011-02-19 03:39:57 +07:00
|
|
|
list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
|
|
|
|
msglistentry) {
|
2010-10-16 00:14:06 +07:00
|
|
|
requestheader =
|
2010-11-09 05:04:38 +07:00
|
|
|
(struct vmbus_channel_message_header *)msginfo->msg;
|
2010-10-16 00:14:06 +07:00
|
|
|
|
2010-11-09 05:04:38 +07:00
|
|
|
if (requestheader->msgtype == CHANNELMSG_GPADL_HEADER) {
|
2010-10-16 00:14:06 +07:00
|
|
|
gpadlheader =
|
|
|
|
(struct vmbus_channel_gpadl_header *)requestheader;
|
|
|
|
|
2010-11-09 05:04:38 +07:00
|
|
|
if ((gpadlcreated->child_relid ==
|
|
|
|
gpadlheader->child_relid) &&
|
|
|
|
(gpadlcreated->gpadl == gpadlheader->gpadl)) {
|
|
|
|
memcpy(&msginfo->response.gpadl_created,
|
2010-10-16 00:14:06 +07:00
|
|
|
gpadlcreated,
|
2011-05-10 21:55:39 +07:00
|
|
|
sizeof(
|
|
|
|
struct vmbus_channel_gpadl_created));
|
|
|
|
complete(&msginfo->waitevent);
|
2009-07-14 06:02:34 +07:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2011-01-27 03:12:07 +07:00
|
|
|
spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
|
2009-07-14 06:02:34 +07:00
|
|
|
}
|
|
|
|
|
2010-03-05 05:11:00 +07:00
|
|
|
/*
|
2010-10-16 00:14:07 +07:00
|
|
|
* vmbus_ongpadl_torndown - GPADL torndown handler.
|
2009-09-01 11:47:21 +07:00
|
|
|
*
|
|
|
|
* This is invoked when we received a response to our gpadl teardown request.
|
|
|
|
* Find the matching request, copy the response and signal the requesting
|
|
|
|
* thread.
|
|
|
|
*/
|
2010-10-16 00:14:07 +07:00
|
|
|
static void vmbus_ongpadl_torndown(
|
2009-09-01 11:47:21 +07:00
|
|
|
struct vmbus_channel_message_header *hdr)
|
2009-07-14 06:02:34 +07:00
|
|
|
{
|
2010-10-16 00:14:06 +07:00
|
|
|
struct vmbus_channel_gpadl_torndown *gpadl_torndown;
|
|
|
|
struct vmbus_channel_msginfo *msginfo;
|
|
|
|
struct vmbus_channel_message_header *requestheader;
|
|
|
|
struct vmbus_channel_gpadl_teardown *gpadl_teardown;
|
2009-07-16 04:56:45 +07:00
|
|
|
unsigned long flags;
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2010-10-16 00:14:06 +07:00
|
|
|
gpadl_torndown = (struct vmbus_channel_gpadl_torndown *)hdr;
|
2009-09-01 11:47:21 +07:00
|
|
|
|
2017-10-30 02:21:06 +07:00
|
|
|
trace_vmbus_ongpadl_torndown(gpadl_torndown);
|
|
|
|
|
2009-09-01 11:47:21 +07:00
|
|
|
/*
|
|
|
|
* Find the open msg, copy the result and signal/unblock the wait event
|
|
|
|
*/
|
2011-01-27 03:12:07 +07:00
|
|
|
spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2011-02-19 03:39:57 +07:00
|
|
|
list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
|
|
|
|
msglistentry) {
|
2010-10-16 00:14:06 +07:00
|
|
|
requestheader =
|
2010-11-09 05:04:38 +07:00
|
|
|
(struct vmbus_channel_message_header *)msginfo->msg;
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2010-11-09 05:04:38 +07:00
|
|
|
if (requestheader->msgtype == CHANNELMSG_GPADL_TEARDOWN) {
|
2010-10-16 00:14:06 +07:00
|
|
|
gpadl_teardown =
|
|
|
|
(struct vmbus_channel_gpadl_teardown *)requestheader;
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2010-11-09 05:04:38 +07:00
|
|
|
if (gpadl_torndown->gpadl == gpadl_teardown->gpadl) {
|
|
|
|
memcpy(&msginfo->response.gpadl_torndown,
|
2010-10-16 00:14:06 +07:00
|
|
|
gpadl_torndown,
|
2011-05-10 21:55:39 +07:00
|
|
|
sizeof(
|
|
|
|
struct vmbus_channel_gpadl_torndown));
|
|
|
|
complete(&msginfo->waitevent);
|
2009-07-14 06:02:34 +07:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2011-01-27 03:12:07 +07:00
|
|
|
spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
|
2009-07-14 06:02:34 +07:00
|
|
|
}
|
|
|
|
|
2010-03-05 05:11:00 +07:00
|
|
|
/*
|
2010-10-16 00:14:07 +07:00
|
|
|
* vmbus_onversion_response - Version response handler
|
2009-09-01 11:47:21 +07:00
|
|
|
*
|
|
|
|
* This is invoked when we received a response to our initiate contact request.
|
|
|
|
* Find the matching request, copy the response and signal the requesting
|
|
|
|
* thread.
|
|
|
|
*/
|
2010-10-16 00:14:07 +07:00
|
|
|
static void vmbus_onversion_response(
|
2009-09-01 11:47:21 +07:00
|
|
|
struct vmbus_channel_message_header *hdr)
|
2009-07-14 06:02:34 +07:00
|
|
|
{
|
2010-10-16 00:14:06 +07:00
|
|
|
struct vmbus_channel_msginfo *msginfo;
|
|
|
|
struct vmbus_channel_message_header *requestheader;
|
|
|
|
struct vmbus_channel_version_response *version_response;
|
2009-07-16 04:56:45 +07:00
|
|
|
unsigned long flags;
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2010-10-16 00:14:06 +07:00
|
|
|
version_response = (struct vmbus_channel_version_response *)hdr;
|
2017-10-30 02:21:07 +07:00
|
|
|
|
|
|
|
trace_vmbus_onversion_response(version_response);
|
|
|
|
|
2011-01-27 03:12:07 +07:00
|
|
|
spin_lock_irqsave(&vmbus_connection.channelmsg_lock, flags);
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2011-02-19 03:39:57 +07:00
|
|
|
list_for_each_entry(msginfo, &vmbus_connection.chn_msg_list,
|
|
|
|
msglistentry) {
|
2010-10-16 00:14:06 +07:00
|
|
|
requestheader =
|
2010-11-09 05:04:38 +07:00
|
|
|
(struct vmbus_channel_message_header *)msginfo->msg;
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2010-11-09 05:04:38 +07:00
|
|
|
if (requestheader->msgtype ==
|
|
|
|
CHANNELMSG_INITIATE_CONTACT) {
|
|
|
|
memcpy(&msginfo->response.version_response,
|
2010-10-16 00:14:06 +07:00
|
|
|
version_response,
|
2009-09-01 11:47:21 +07:00
|
|
|
sizeof(struct vmbus_channel_version_response));
|
2011-05-10 21:55:39 +07:00
|
|
|
complete(&msginfo->waitevent);
|
2009-07-14 06:02:34 +07:00
|
|
|
}
|
|
|
|
}
|
2011-01-27 03:12:07 +07:00
|
|
|
spin_unlock_irqrestore(&vmbus_connection.channelmsg_lock, flags);
|
2009-07-14 06:02:34 +07:00
|
|
|
}
|
|
|
|
|
2009-09-01 11:51:50 +07:00
|
|
|
/* Channel message dispatch table */
|
2017-03-05 08:27:16 +07:00
|
|
|
const struct vmbus_channel_message_table_entry
|
|
|
|
channel_message_table[CHANNELMSG_COUNT] = {
|
|
|
|
{ CHANNELMSG_INVALID, 0, NULL },
|
|
|
|
{ CHANNELMSG_OFFERCHANNEL, 0, vmbus_onoffer },
|
|
|
|
{ CHANNELMSG_RESCIND_CHANNELOFFER, 0, vmbus_onoffer_rescind },
|
|
|
|
{ CHANNELMSG_REQUESTOFFERS, 0, NULL },
|
|
|
|
{ CHANNELMSG_ALLOFFERS_DELIVERED, 1, vmbus_onoffers_delivered },
|
|
|
|
{ CHANNELMSG_OPENCHANNEL, 0, NULL },
|
|
|
|
{ CHANNELMSG_OPENCHANNEL_RESULT, 1, vmbus_onopen_result },
|
|
|
|
{ CHANNELMSG_CLOSECHANNEL, 0, NULL },
|
|
|
|
{ CHANNELMSG_GPADL_HEADER, 0, NULL },
|
|
|
|
{ CHANNELMSG_GPADL_BODY, 0, NULL },
|
|
|
|
{ CHANNELMSG_GPADL_CREATED, 1, vmbus_ongpadl_created },
|
|
|
|
{ CHANNELMSG_GPADL_TEARDOWN, 0, NULL },
|
|
|
|
{ CHANNELMSG_GPADL_TORNDOWN, 1, vmbus_ongpadl_torndown },
|
|
|
|
{ CHANNELMSG_RELID_RELEASED, 0, NULL },
|
|
|
|
{ CHANNELMSG_INITIATE_CONTACT, 0, NULL },
|
|
|
|
{ CHANNELMSG_VERSION_RESPONSE, 1, vmbus_onversion_response },
|
|
|
|
{ CHANNELMSG_UNLOAD, 0, NULL },
|
|
|
|
{ CHANNELMSG_UNLOAD_RESPONSE, 1, vmbus_unload_response },
|
|
|
|
{ CHANNELMSG_18, 0, NULL },
|
|
|
|
{ CHANNELMSG_19, 0, NULL },
|
|
|
|
{ CHANNELMSG_20, 0, NULL },
|
|
|
|
{ CHANNELMSG_TL_CONNECT_REQUEST, 0, NULL },
|
2009-09-01 11:51:50 +07:00
|
|
|
};
|
|
|
|
|
2010-03-05 05:11:00 +07:00
|
|
|
/*
|
2010-10-16 00:14:07 +07:00
|
|
|
* vmbus_onmessage - Handler for channel protocol messages.
|
2009-09-01 11:47:21 +07:00
|
|
|
*
|
|
|
|
* This is invoked in the vmbus worker thread context.
|
|
|
|
*/
|
2010-10-16 00:14:07 +07:00
|
|
|
void vmbus_onmessage(void *context)
|
2009-07-14 06:02:34 +07:00
|
|
|
{
|
2010-10-16 00:14:06 +07:00
|
|
|
struct hv_message *msg = context;
|
2009-08-27 05:16:04 +07:00
|
|
|
struct vmbus_channel_message_header *hdr;
|
2009-07-14 06:02:34 +07:00
|
|
|
int size;
|
|
|
|
|
2010-11-09 05:04:39 +07:00
|
|
|
hdr = (struct vmbus_channel_message_header *)msg->u.payload;
|
|
|
|
size = msg->header.payload_size;
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2017-10-30 02:21:01 +07:00
|
|
|
trace_vmbus_on_message(hdr);
|
|
|
|
|
2010-11-09 05:04:38 +07:00
|
|
|
if (hdr->msgtype >= CHANNELMSG_COUNT) {
|
2011-03-30 03:58:47 +07:00
|
|
|
pr_err("Received invalid channel message type %d size %d\n",
|
2010-11-09 05:04:38 +07:00
|
|
|
hdr->msgtype, size);
|
2009-07-17 02:35:37 +07:00
|
|
|
print_hex_dump_bytes("", DUMP_PREFIX_NONE,
|
2010-11-09 05:04:39 +07:00
|
|
|
(unsigned char *)msg->u.payload, size);
|
2009-07-14 06:02:34 +07:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2011-05-10 21:55:38 +07:00
|
|
|
if (channel_message_table[hdr->msgtype].message_handler)
|
|
|
|
channel_message_table[hdr->msgtype].message_handler(hdr);
|
2009-07-14 06:02:34 +07:00
|
|
|
else
|
2011-03-30 03:58:47 +07:00
|
|
|
pr_err("Unhandled channel message type %d\n", hdr->msgtype);
|
2009-07-14 06:02:34 +07:00
|
|
|
}
|
|
|
|
|
2010-03-05 05:11:00 +07:00
|
|
|
/*
|
2010-10-16 00:14:07 +07:00
|
|
|
* vmbus_request_offers - Send a request to get all our pending offers.
|
2009-09-01 11:47:21 +07:00
|
|
|
*/
|
2010-10-16 00:14:07 +07:00
|
|
|
int vmbus_request_offers(void)
|
2009-07-14 06:02:34 +07:00
|
|
|
{
|
2009-08-27 05:16:04 +07:00
|
|
|
struct vmbus_channel_message_header *msg;
|
2010-10-16 00:14:06 +07:00
|
|
|
struct vmbus_channel_msginfo *msginfo;
|
2015-02-28 02:26:02 +07:00
|
|
|
int ret;
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2010-10-16 00:14:06 +07:00
|
|
|
msginfo = kmalloc(sizeof(*msginfo) +
|
2009-09-01 11:47:21 +07:00
|
|
|
sizeof(struct vmbus_channel_message_header),
|
|
|
|
GFP_KERNEL);
|
2010-10-16 00:14:06 +07:00
|
|
|
if (!msginfo)
|
2010-05-06 02:27:31 +07:00
|
|
|
return -ENOMEM;
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2010-11-09 05:04:38 +07:00
|
|
|
msg = (struct vmbus_channel_message_header *)msginfo->msg;
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2010-11-09 05:04:38 +07:00
|
|
|
msg->msgtype = CHANNELMSG_REQUESTOFFERS;
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2016-12-07 16:16:24 +07:00
|
|
|
ret = vmbus_post_msg(msg, sizeof(struct vmbus_channel_message_header),
|
|
|
|
true);
|
2017-10-30 02:21:08 +07:00
|
|
|
|
|
|
|
trace_vmbus_request_offers(ret);
|
|
|
|
|
2009-09-01 11:47:21 +07:00
|
|
|
if (ret != 0) {
|
2011-03-30 03:58:47 +07:00
|
|
|
pr_err("Unable to request offers - %d\n", ret);
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2011-02-12 00:59:43 +07:00
|
|
|
goto cleanup;
|
|
|
|
}
|
2009-07-14 06:02:34 +07:00
|
|
|
|
2011-02-12 00:59:43 +07:00
|
|
|
cleanup:
|
2011-03-13 12:29:00 +07:00
|
|
|
kfree(msginfo);
|
2009-07-14 06:02:34 +07:00
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2013-05-24 02:02:32 +07:00
|
|
|
static void invoke_sc_cb(struct vmbus_channel *primary_channel)
|
|
|
|
{
|
|
|
|
struct list_head *cur, *tmp;
|
|
|
|
struct vmbus_channel *cur_channel;
|
|
|
|
|
|
|
|
if (primary_channel->sc_creation_callback == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
list_for_each_safe(cur, tmp, &primary_channel->sc_list) {
|
|
|
|
cur_channel = list_entry(cur, struct vmbus_channel, sc_list);
|
|
|
|
|
|
|
|
primary_channel->sc_creation_callback(cur_channel);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void vmbus_set_sc_create_callback(struct vmbus_channel *primary_channel,
|
|
|
|
void (*sc_cr_cb)(struct vmbus_channel *new_sc))
|
|
|
|
{
|
|
|
|
primary_channel->sc_creation_callback = sc_cr_cb;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(vmbus_set_sc_create_callback);
|
|
|
|
|
|
|
|
bool vmbus_are_subchannels_present(struct vmbus_channel *primary)
|
|
|
|
{
|
|
|
|
bool ret;
|
|
|
|
|
|
|
|
ret = !list_empty(&primary->sc_list);
|
|
|
|
|
|
|
|
if (ret) {
|
|
|
|
/*
|
|
|
|
* Invoke the callback on sub-channel creation.
|
|
|
|
* This will present a uniform interface to the
|
|
|
|
* clients.
|
|
|
|
*/
|
|
|
|
invoke_sc_cb(primary);
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(vmbus_are_subchannels_present);
|
2016-01-28 13:29:42 +07:00
|
|
|
|
|
|
|
void vmbus_set_chn_rescind_callback(struct vmbus_channel *channel,
|
|
|
|
void (*chn_rescind_cb)(struct vmbus_channel *))
|
|
|
|
{
|
|
|
|
channel->chn_rescind_callback = chn_rescind_cb;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(vmbus_set_chn_rescind_callback);
|