1 /* SPDX-License-Identifier: GPL-2.0-only */
4 * Copyright (c) 2011, Microsoft Corporation.
7 * Haiyang Zhang <haiyangz@microsoft.com>
8 * Hank Janssen <hjanssen@microsoft.com>
9 * K. Y. Srinivasan <kys@microsoft.com>
12 #ifndef _HYPERV_VMBUS_H
13 #define _HYPERV_VMBUS_H
15 #include <linux/list.h>
16 #include <linux/bitops.h>
17 #include <asm/sync_bitops.h>
18 #include <asm/hyperv-tlfs.h>
19 #include <linux/atomic.h>
20 #include <linux/hyperv.h>
21 #include <linux/interrupt.h>
26 * Timeout for services such as KVP and fcopy.
28 #define HV_UTIL_TIMEOUT 30
31 * Timeout for guest-host handshake for services.
33 #define HV_UTIL_NEGO_TIMEOUT 55
36 /* Definitions for the monitored notification facility */
37 union hv_monitor_trigger_group
{
45 struct hv_monitor_parameter
{
46 union hv_connection_id connectionid
;
51 union hv_monitor_trigger_state
{
60 /* struct hv_monitor_page Layout */
61 /* ------------------------------------------------------ */
62 /* | 0 | TriggerState (4 bytes) | Rsvd1 (4 bytes) | */
63 /* | 8 | TriggerGroup[0] | */
64 /* | 10 | TriggerGroup[1] | */
65 /* | 18 | TriggerGroup[2] | */
66 /* | 20 | TriggerGroup[3] | */
67 /* | 28 | Rsvd2[0] | */
68 /* | 30 | Rsvd2[1] | */
69 /* | 38 | Rsvd2[2] | */
70 /* | 40 | NextCheckTime[0][0] | NextCheckTime[0][1] | */
72 /* | 240 | Latency[0][0..3] | */
73 /* | 340 | Rsvz3[0] | */
74 /* | 440 | Parameter[0][0] | */
75 /* | 448 | Parameter[0][1] | */
77 /* | 840 | Rsvd4[0] | */
78 /* ------------------------------------------------------ */
79 struct hv_monitor_page
{
80 union hv_monitor_trigger_state trigger_state
;
83 union hv_monitor_trigger_group trigger_group
[4];
86 s32 next_checktime
[4][32];
91 struct hv_monitor_parameter parameter
[4][32];
96 #define HV_HYPERCALL_PARAM_ALIGN sizeof(u64)
98 /* Definition of the hv_post_message hypercall input structure. */
99 struct hv_input_post_message
{
100 union hv_connection_id connectionid
;
104 u64 payload
[HV_MESSAGE_PAYLOAD_QWORD_COUNT
];
109 VMBUS_MESSAGE_CONNECTION_ID
= 1,
110 VMBUS_MESSAGE_CONNECTION_ID_4
= 4,
111 VMBUS_MESSAGE_PORT_ID
= 1,
112 VMBUS_EVENT_CONNECTION_ID
= 2,
113 VMBUS_EVENT_PORT_ID
= 2,
114 VMBUS_MONITOR_CONNECTION_ID
= 3,
115 VMBUS_MONITOR_PORT_ID
= 3,
116 VMBUS_MESSAGE_SINT
= 2,
120 * Per cpu state for channel handling
122 struct hv_per_cpu_context
{
123 void *synic_message_page
;
124 void *synic_event_page
;
127 * The page is only used in hv_post_message() for a TDX VM (with the
128 * paravisor) to post a messages to Hyper-V: when such a VM calls
129 * HVCALL_POST_MESSAGE, it can't use the hyperv_pcpu_input_arg (which
130 * is encrypted in such a VM) as the hypercall input page, because
131 * the input page for HVCALL_POST_MESSAGE must be decrypted in such a
132 * VM, so post_msg_page (which is decrypted in hv_synic_alloc()) is
133 * introduced for this purpose. See hyperv_init() for more comments.
138 * Starting with win8, we can take channel interrupts on any CPU;
139 * we will manage the tasklet that handles events messages on a per CPU
142 struct tasklet_struct msg_dpc
;
146 /* We only support running on top of Hyper-V
147 * So at this point this really can only contain the Hyper-V ID
151 struct hv_per_cpu_context __percpu
*cpu_context
;
154 * To manage allocations in a NUMA node.
155 * Array indexed by numa node ID.
157 struct cpumask
*hv_numa_map
;
160 extern struct hv_context hv_context
;
164 extern int hv_init(void);
166 extern int hv_post_message(union hv_connection_id connection_id
,
167 enum hv_message_type message_type
,
168 void *payload
, size_t payload_size
);
170 extern int hv_synic_alloc(void);
172 extern void hv_synic_free(void);
174 extern void hv_synic_enable_regs(unsigned int cpu
);
175 extern int hv_synic_init(unsigned int cpu
);
177 extern void hv_synic_disable_regs(unsigned int cpu
);
178 extern int hv_synic_cleanup(unsigned int cpu
);
182 void hv_ringbuffer_pre_init(struct vmbus_channel
*channel
);
184 int hv_ringbuffer_init(struct hv_ring_buffer_info
*ring_info
,
185 struct page
*pages
, u32 pagecnt
, u32 max_pkt_size
);
187 void hv_ringbuffer_cleanup(struct hv_ring_buffer_info
*ring_info
);
189 int hv_ringbuffer_write(struct vmbus_channel
*channel
,
190 const struct kvec
*kv_list
, u32 kv_count
,
191 u64 requestid
, u64
*trans_id
);
193 int hv_ringbuffer_read(struct vmbus_channel
*channel
,
194 void *buffer
, u32 buflen
, u32
*buffer_actual_len
,
195 u64
*requestid
, bool raw
);
198 * The Maximum number of channels (16384) is determined by the size of the
199 * interrupt page, which is HV_HYP_PAGE_SIZE. 1/2 of HV_HYP_PAGE_SIZE is to
200 * send endpoint interrupts, and the other is to receive endpoint interrupts.
202 #define MAX_NUM_CHANNELS ((HV_HYP_PAGE_SIZE >> 1) << 3)
204 /* The value here must be in multiple of 32 */
205 #define MAX_NUM_CHANNELS_SUPPORTED 256
207 #define MAX_CHANNEL_RELIDS \
208 max(MAX_NUM_CHANNELS_SUPPORTED, HV_EVENT_FLAGS_COUNT)
210 enum vmbus_connect_state
{
217 #define MAX_SIZE_CHANNEL_MESSAGE HV_MESSAGE_PAYLOAD_BYTE_COUNT
220 * The CPU that Hyper-V will interrupt for VMBUS messages, such as
221 * CHANNELMSG_OFFERCHANNEL and CHANNELMSG_RESCIND_CHANNELOFFER.
223 #define VMBUS_CONNECT_CPU 0
225 struct vmbus_connection
{
228 atomic_t offer_in_progress
;
230 enum vmbus_connect_state conn_state
;
232 atomic_t next_gpadl_handle
;
234 struct completion unload_event
;
236 * Represents channel interrupts. Each bit position represents a
237 * channel. When a channel sends an interrupt via VMBUS, it finds its
238 * bit in the sendInterruptPage, set it and calls Hv to generate a port
239 * event. The other end receives the port event and parse the
240 * recvInterruptPage to see which bit is set
247 * 2 pages - 1st page for parent->child notification and 2nd
248 * is child->parent notification
250 struct hv_monitor_page
*monitor_pages
[2];
251 struct list_head chn_msg_list
;
252 spinlock_t channelmsg_lock
;
254 /* List of channels */
255 struct list_head chn_list
;
256 struct mutex channel_mutex
;
258 /* Array of channels */
259 struct vmbus_channel
**channels
;
262 * An offer message is handled first on the work_queue, and then
263 * is further handled on handle_primary_chan_wq or
264 * handle_sub_chan_wq.
266 struct workqueue_struct
*work_queue
;
267 struct workqueue_struct
*handle_primary_chan_wq
;
268 struct workqueue_struct
*handle_sub_chan_wq
;
269 struct workqueue_struct
*rescind_work_queue
;
272 * On suspension of the vmbus, the accumulated offer messages
275 bool ignore_any_offer_msg
;
278 * The number of sub-channels and hv_sock channels that should be
279 * cleaned up upon suspend: sub-channels will be re-created upon
280 * resume, and hv_sock channels should not survive suspend.
282 atomic_t nr_chan_close_on_suspend
;
284 * vmbus_bus_suspend() waits for "nr_chan_close_on_suspend" to
287 struct completion ready_for_suspend_event
;
290 * The number of primary channels that should be "fixed up"
291 * upon resume: these channels are re-offered upon resume, and some
292 * fields of the channel offers (i.e. child_relid and connection_id)
293 * can change, so the old offermsg must be fixed up, before the resume
294 * callbacks of the VSC drivers start to further touch the channels.
296 atomic_t nr_chan_fixup_on_resume
;
298 * vmbus_bus_resume() waits for "nr_chan_fixup_on_resume" to
301 struct completion ready_for_resume_event
;
305 struct vmbus_msginfo
{
306 /* Bookkeeping stuff */
307 struct list_head msglist_entry
;
309 /* The message itself */
314 extern struct vmbus_connection vmbus_connection
;
316 int vmbus_negotiate_version(struct vmbus_channel_msginfo
*msginfo
, u32 version
);
318 static inline void vmbus_send_interrupt(u32 relid
)
320 sync_set_bit(relid
, vmbus_connection
.send_int_page
);
323 enum vmbus_message_handler_type
{
324 /* The related handler can sleep. */
327 /* The related handler must NOT sleep. */
328 VMHT_NON_BLOCKING
= 1,
331 struct vmbus_channel_message_table_entry
{
332 enum vmbus_channel_message_type message_type
;
333 enum vmbus_message_handler_type handler_type
;
334 void (*message_handler
)(struct vmbus_channel_message_header
*msg
);
338 extern const struct vmbus_channel_message_table_entry
339 channel_message_table
[CHANNELMSG_COUNT
];
342 /* General vmbus interface */
344 struct hv_device
*vmbus_device_create(const guid_t
*type
,
345 const guid_t
*instance
,
346 struct vmbus_channel
*channel
);
348 int vmbus_device_register(struct hv_device
*child_device_obj
);
349 void vmbus_device_unregister(struct hv_device
*device_obj
);
350 int vmbus_add_channel_kobj(struct hv_device
*device_obj
,
351 struct vmbus_channel
*channel
);
353 void vmbus_remove_channel_attr_group(struct vmbus_channel
*channel
);
355 void vmbus_channel_map_relid(struct vmbus_channel
*channel
);
356 void vmbus_channel_unmap_relid(struct vmbus_channel
*channel
);
358 struct vmbus_channel
*relid2channel(u32 relid
);
360 void vmbus_free_channels(void);
362 /* Connection interface */
364 int vmbus_connect(void);
365 void vmbus_disconnect(void);
367 int vmbus_post_msg(void *buffer
, size_t buflen
, bool can_sleep
);
369 void vmbus_on_event(unsigned long data
);
370 void vmbus_on_msg_dpc(unsigned long data
);
372 int hv_kvp_init(struct hv_util_service
*srv
);
373 void hv_kvp_deinit(void);
374 int hv_kvp_pre_suspend(void);
375 int hv_kvp_pre_resume(void);
376 void hv_kvp_onchannelcallback(void *context
);
378 int hv_vss_init(struct hv_util_service
*srv
);
379 void hv_vss_deinit(void);
380 int hv_vss_pre_suspend(void);
381 int hv_vss_pre_resume(void);
382 void hv_vss_onchannelcallback(void *context
);
383 void vmbus_initiate_unload(bool crash
);
385 static inline void hv_poll_channel(struct vmbus_channel
*channel
,
393 enum hvutil_device_state
{
394 HVUTIL_DEVICE_INIT
= 0, /* driver is loaded, waiting for userspace */
395 HVUTIL_READY
, /* userspace is registered */
396 HVUTIL_HOSTMSG_RECEIVED
, /* message from the host was received */
397 HVUTIL_USERSPACE_REQ
, /* request to userspace was sent */
398 HVUTIL_USERSPACE_RECV
, /* reply from userspace was received */
399 HVUTIL_DEVICE_DYING
, /* driver unload is in progress */
407 extern const struct vmbus_device vmbus_devs
[];
409 static inline bool hv_is_perf_channel(struct vmbus_channel
*channel
)
411 return vmbus_devs
[channel
->device_id
].perf_device
;
414 static inline size_t hv_dev_ring_size(struct vmbus_channel
*channel
)
416 return vmbus_devs
[channel
->device_id
].pref_ring_size
;
419 static inline bool hv_is_allocated_cpu(unsigned int cpu
)
421 struct vmbus_channel
*channel
, *sc
;
423 lockdep_assert_held(&vmbus_connection
.channel_mutex
);
425 * List additions/deletions as well as updates of the target CPUs are
426 * protected by channel_mutex.
428 list_for_each_entry(channel
, &vmbus_connection
.chn_list
, listentry
) {
429 if (!hv_is_perf_channel(channel
))
431 if (channel
->target_cpu
== cpu
)
433 list_for_each_entry(sc
, &channel
->sc_list
, sc_list
) {
434 if (sc
->target_cpu
== cpu
)
441 static inline void hv_set_allocated_cpu(unsigned int cpu
)
443 cpumask_set_cpu(cpu
, &hv_context
.hv_numa_map
[cpu_to_node(cpu
)]);
446 static inline void hv_clear_allocated_cpu(unsigned int cpu
)
448 if (hv_is_allocated_cpu(cpu
))
450 cpumask_clear_cpu(cpu
, &hv_context
.hv_numa_map
[cpu_to_node(cpu
)]);
453 static inline void hv_update_allocated_cpus(unsigned int old_cpu
,
454 unsigned int new_cpu
)
456 hv_set_allocated_cpu(new_cpu
);
457 hv_clear_allocated_cpu(old_cpu
);
460 #ifdef CONFIG_HYPERV_TESTING
462 int hv_debug_add_dev_dir(struct hv_device
*dev
);
463 void hv_debug_rm_dev_dir(struct hv_device
*dev
);
464 void hv_debug_rm_all_dir(void);
465 int hv_debug_init(void);
466 void hv_debug_delay_test(struct vmbus_channel
*channel
, enum delay delay_type
);
468 #else /* CONFIG_HYPERV_TESTING */
470 static inline void hv_debug_rm_dev_dir(struct hv_device
*dev
) {};
471 static inline void hv_debug_rm_all_dir(void) {};
472 static inline void hv_debug_delay_test(struct vmbus_channel
*channel
,
473 enum delay delay_type
) {};
474 static inline int hv_debug_init(void)
479 static inline int hv_debug_add_dev_dir(struct hv_device
*dev
)
484 #endif /* CONFIG_HYPERV_TESTING */
486 #endif /* _HYPERV_VMBUS_H */