3 * Copyright (c) 2011, Microsoft Corporation.
5 * This program is free software; you can redistribute it and/or modify it
6 * under the terms and conditions of the GNU General Public License,
7 * version 2, as published by the Free Software Foundation.
9 * This program is distributed in the hope it will be useful, but WITHOUT
10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
14 * You should have received a copy of the GNU General Public License along with
15 * this program; if not, write to the Free Software Foundation, Inc., 59 Temple
16 * Place - Suite 330, Boston, MA 02111-1307 USA.
19 * Haiyang Zhang <haiyangz@microsoft.com>
20 * Hank Janssen <hjanssen@microsoft.com>
21 * K. Y. Srinivasan <kys@microsoft.com>
28 #include <linux/types.h>
31 * Framework version for util services.
34 #define UTIL_FW_MAJOR 3
35 #define UTIL_FW_MINOR 0
36 #define UTIL_FW_MAJOR_MINOR (UTIL_FW_MAJOR << 16 | UTIL_FW_MINOR)
40 * Implementation of host controlled snapshot of the guest.
43 #define VSS_OP_REGISTER 128
52 * Following operations are only supported with IC version >= 5.0
54 VSS_OP_FREEZE, /* Freeze the file systems in the VM */
55 VSS_OP_THAW, /* Unfreeze the file systems */
57 VSS_OP_COUNT /* Number of operations, must be last */
62 * Header for all VSS messages.
67 } __attribute__((packed));
71 * Flag values for the hv_vss_check_feature. Linux supports only
74 #define VSS_HBU_NO_AUTO_RECOVERY 0x00000005
76 struct hv_vss_check_feature {
78 } __attribute__((packed));
80 struct hv_vss_check_dm_info {
82 } __attribute__((packed));
86 struct hv_vss_hdr vss_hdr;
90 struct hv_vss_check_feature vss_cf;
91 struct hv_vss_check_dm_info dm_info;
93 } __attribute__((packed));
96 * An implementation of HyperV key value pair (KVP) functionality for Linux.
99 * Copyright (C) 2010, Novell, Inc.
100 * Author : K. Y. Srinivasan <ksrinivasan@novell.com>
105 * Maximum value size - used for both key names and value data, and includes
106 * any applicable NULL terminators.
108 * Note: This limit is somewhat arbitrary, but falls easily within what is
109 * supported for all native guests (back to Win 2000) and what is reasonable
110 * for the IC KVP exchange functionality. Note that Windows Me/98/95 are
111 * limited to 255 character key names.
113 * MSDN recommends not storing data values larger than 2048 bytes in the
116 * Note: This value is used in defining the KVP exchange message - this value
117 * cannot be modified without affecting the message size and compatibility.
121 * bytes, including any null terminators
123 #define HV_KVP_EXCHANGE_MAX_VALUE_SIZE (2048)
127 * Maximum key size - the registry limit for the length of an entry name
128 * is 256 characters, including the null terminator
131 #define HV_KVP_EXCHANGE_MAX_KEY_SIZE (512)
134 * In Linux, we implement the KVP functionality in two components:
135 * 1) The kernel component which is packaged as part of the hv_utils driver
136 * is responsible for communicating with the host and responsible for
137 * implementing the host/guest protocol. 2) A user level daemon that is
138 * responsible for data gathering.
140 * Host/Guest Protocol: The host iterates over an index and expects the guest
141 * to assign a key name to the index and also return the value corresponding to
142 * the key. The host will have atmost one KVP transaction outstanding at any
143 * given point in time. The host side iteration stops when the guest returns
144 * an error. Microsoft has specified the following mapping of key names to
145 * host specified index:
148 * 0 FullyQualifiedDomainName
149 * 1 IntegrationServicesVersion
150 * 2 NetworkAddressIPv4
151 * 3 NetworkAddressIPv6
157 * 9 ProcessorArchitecture
159 * The Windows host expects the Key Name and Key Value to be encoded in utf16.
161 * Guest Kernel/KVP Daemon Protocol: As noted earlier, we implement all of the
162 * data gathering functionality in a user mode daemon. The user level daemon
163 * is also responsible for binding the key name to the index as well. The
164 * kernel and user-level daemon communicate using a connector channel.
166 * The user mode component first registers with the
167 * the kernel component. Subsequently, the kernel component requests, data
168 * for the specified keys. In response to this message the user mode component
169 * fills in the value corresponding to the specified key. We overload the
170 * sequence field in the cn_msg header to define our KVP message types.
173 * The kernel component simply acts as a conduit for communication between the
174 * Windows host and the user-level daemon. The kernel component passes up the
175 * index received from the Host to the user-level daemon. If the index is
176 * valid (supported), the corresponding key as well as its
177 * value (both are strings) is returned. If the index is invalid
178 * (not supported), a NULL key string is returned.
183 * Registry value types.
191 * As we look at expanding the KVP functionality to include
192 * IP injection functionality, we need to maintain binary
193 * compatibility with older daemons.
195 * The KVP opcodes are defined by the host and it was unfortunate
196 * that I chose to treat the registration operation as part of the
197 * KVP operations defined by the host.
198 * Here is the level of compatibility
199 * (between the user level daemon and the kernel KVP driver) that we
202 * An older daemon will always be supported on a newer driver.
203 * A given user level daemon will require a minimal version of the
205 * If we cannot handle the version differences, we will fail gracefully
206 * (this can happen when we have a user level daemon that is more
207 * advanced than the KVP driver.
209 * We will use values used in this handshake for determining if we have
210 * workable user level daemon and the kernel driver. We begin by taking the
211 * registration opcode out of the KVP opcode namespace. We will however,
212 * maintain compatibility with the existing user-level daemon code.
216 * Daemon code not supporting IP injection (legacy daemon).
219 #define KVP_OP_REGISTER 4
222 * Daemon code supporting IP injection.
223 * The KVP opcode field is used to communicate the
224 * registration information; so define a namespace that
225 * will be distinct from the host defined KVP opcode.
228 #define KVP_OP_REGISTER1 100
230 enum hv_kvp_exchg_op {
237 KVP_OP_COUNT /* Number of operations, must be last. */
240 enum hv_kvp_exchg_pool {
241 KVP_POOL_EXTERNAL = 0,
244 KVP_POOL_AUTO_EXTERNAL,
245 KVP_POOL_AUTO_INTERNAL,
246 KVP_POOL_COUNT /* Number of pools, must be last. */
250 * Some Hyper-V status codes.
253 #define HV_S_OK 0x00000000
254 #define HV_E_FAIL 0x80004005
255 #define HV_S_CONT 0x80070103
256 #define HV_ERROR_NOT_SUPPORTED 0x80070032
257 #define HV_ERROR_MACHINE_LOCKED 0x800704F7
258 #define HV_ERROR_DEVICE_NOT_CONNECTED 0x8007048F
259 #define HV_INVALIDARG 0x80070057
260 #define HV_GUID_NOTFOUND 0x80041002
262 #define ADDR_FAMILY_NONE 0x00
263 #define ADDR_FAMILY_IPV4 0x01
264 #define ADDR_FAMILY_IPV6 0x02
266 #define MAX_ADAPTER_ID_SIZE 128
267 #define MAX_IP_ADDR_SIZE 1024
268 #define MAX_GATEWAY_SIZE 512
271 struct hv_kvp_ipaddr_value {
272 __u16 adapter_id[MAX_ADAPTER_ID_SIZE];
275 __u16 ip_addr[MAX_IP_ADDR_SIZE];
276 __u16 sub_net[MAX_IP_ADDR_SIZE];
277 __u16 gate_way[MAX_GATEWAY_SIZE];
278 __u16 dns_addr[MAX_IP_ADDR_SIZE];
279 } __attribute__((packed));
286 } __attribute__((packed));
288 struct hv_kvp_exchg_msg_value {
292 __u8 key[HV_KVP_EXCHANGE_MAX_KEY_SIZE];
294 __u8 value[HV_KVP_EXCHANGE_MAX_VALUE_SIZE];
298 } __attribute__((packed));
300 struct hv_kvp_msg_enumerate {
302 struct hv_kvp_exchg_msg_value data;
303 } __attribute__((packed));
305 struct hv_kvp_msg_get {
306 struct hv_kvp_exchg_msg_value data;
309 struct hv_kvp_msg_set {
310 struct hv_kvp_exchg_msg_value data;
313 struct hv_kvp_msg_delete {
315 __u8 key[HV_KVP_EXCHANGE_MAX_KEY_SIZE];
318 struct hv_kvp_register {
319 __u8 version[HV_KVP_EXCHANGE_MAX_KEY_SIZE];
324 struct hv_kvp_hdr kvp_hdr;
328 struct hv_kvp_msg_get kvp_get;
329 struct hv_kvp_msg_set kvp_set;
330 struct hv_kvp_msg_delete kvp_delete;
331 struct hv_kvp_msg_enumerate kvp_enum_data;
332 struct hv_kvp_ipaddr_value kvp_ip_val;
333 struct hv_kvp_register kvp_register;
335 } __attribute__((packed));
337 struct hv_kvp_ip_msg {
340 struct hv_kvp_ipaddr_value kvp_ip_val;
341 } __attribute__((packed));
344 #include <linux/scatterlist.h>
345 #include <linux/list.h>
346 #include <linux/uuid.h>
347 #include <linux/timer.h>
348 #include <linux/workqueue.h>
349 #include <linux/completion.h>
350 #include <linux/device.h>
351 #include <linux/mod_devicetable.h>
354 #define MAX_PAGE_BUFFER_COUNT 19
355 #define MAX_MULTIPAGE_BUFFER_COUNT 32 /* 128K */
357 #pragma pack(push, 1)
359 /* Single-page buffer */
360 struct hv_page_buffer {
366 /* Multiple-page buffer */
367 struct hv_multipage_buffer {
368 /* Length and Offset determines the # of pfns in the array */
371 u64 pfn_array[MAX_MULTIPAGE_BUFFER_COUNT];
374 /* 0x18 includes the proprietary packet header */
375 #define MAX_PAGE_BUFFER_PACKET (0x18 + \
376 (sizeof(struct hv_page_buffer) * \
377 MAX_PAGE_BUFFER_COUNT))
378 #define MAX_MULTIPAGE_BUFFER_PACKET (0x18 + \
379 sizeof(struct hv_multipage_buffer))
384 struct hv_ring_buffer {
385 /* Offset in bytes from the start of ring data below */
388 /* Offset in bytes from the start of ring data below */
394 * Win8 uses some of the reserved bits to implement
395 * interrupt driven flow management. On the send side
396 * we can request that the receiver interrupt the sender
397 * when the ring transitions from being full to being able
398 * to handle a message of size "pending_send_sz".
400 * Add necessary state for this enhancement.
408 u32 feat_pending_send_sz:1;
413 /* Pad it to PAGE_SIZE so that data starts on page boundary */
417 * Ring data starts here + RingDataStartOffset
418 * !!! DO NOT place any fields below this !!!
423 struct hv_ring_buffer_info {
424 struct hv_ring_buffer *ring_buffer;
425 u32 ring_size; /* Include the shared header */
426 spinlock_t ring_lock;
428 u32 ring_datasize; /* < ring_size */
429 u32 ring_data_startoffset;
432 struct hv_ring_buffer_debug_info {
433 u32 current_interrupt_mask;
434 u32 current_read_index;
435 u32 current_write_index;
436 u32 bytes_avail_toread;
437 u32 bytes_avail_towrite;
443 * hv_get_ringbuffer_availbytes()
445 * Get number of bytes available to read and to write to
446 * for the specified ring buffer
449 hv_get_ringbuffer_availbytes(struct hv_ring_buffer_info *rbi,
450 u32 *read, u32 *write)
452 u32 read_loc, write_loc, dsize;
454 smp_read_barrier_depends();
456 /* Capture the read/write indices before they changed */
457 read_loc = rbi->ring_buffer->read_index;
458 write_loc = rbi->ring_buffer->write_index;
459 dsize = rbi->ring_datasize;
461 *write = write_loc >= read_loc ? dsize - (write_loc - read_loc) :
462 read_loc - write_loc;
463 *read = dsize - *write;
468 * We use the same version numbering for all Hyper-V modules.
470 * Definition of versioning is as follows;
472 * Major Number Changes for these scenarios;
473 * 1. When a new version of Windows Hyper-V
475 * 2. A Major change has occurred in the
477 * (For example the merge for the first time
478 * into the kernel) Every time the Major Number
479 * changes, the Revision number is reset to 0.
480 * Minor Number Changes when new functionality is added
481 * to the Linux IC's that is not a bug fix.
483 * 3.1 - Added completed hv_utils driver. Shutdown/Heartbeat/Timesync
485 #define HV_DRV_VERSION "3.1"
488 * VMBUS version is 32 bit entity broken up into
489 * two 16 bit quantities: major_number. minor_number.
491 * 0 . 13 (Windows Server 2008)
496 #define VERSION_WS2008 ((0 << 16) | (13))
497 #define VERSION_WIN7 ((1 << 16) | (1))
498 #define VERSION_WIN8 ((2 << 16) | (4))
500 #define VERSION_INVAL -1
502 #define VERSION_CURRENT VERSION_WIN8
504 /* Make maximum size of pipe payload of 16K */
505 #define MAX_PIPE_DATA_PAYLOAD (sizeof(u8) * 16384)
507 /* Define PipeMode values. */
508 #define VMBUS_PIPE_TYPE_BYTE 0x00000000
509 #define VMBUS_PIPE_TYPE_MESSAGE 0x00000004
511 /* The size of the user defined data buffer for non-pipe offers. */
512 #define MAX_USER_DEFINED_BYTES 120
514 /* The size of the user defined data buffer for pipe offers. */
515 #define MAX_PIPE_USER_DEFINED_BYTES 116
518 * At the center of the Channel Management library is the Channel Offer. This
519 * struct contains the fundamental information about an offer.
521 struct vmbus_channel_offer {
526 * These two fields are not currently used.
532 u16 mmio_megabytes; /* in bytes * 1024 * 1024 */
535 /* Non-pipes: The user has MAX_USER_DEFINED_BYTES bytes. */
537 unsigned char user_def[MAX_USER_DEFINED_BYTES];
542 * The following sructure is an integrated pipe protocol, which
543 * is implemented on top of standard user-defined data. Pipe
544 * clients have MAX_PIPE_USER_DEFINED_BYTES left for their own
549 unsigned char user_def[MAX_PIPE_USER_DEFINED_BYTES];
553 * The sub_channel_index is defined in win8.
555 u16 sub_channel_index;
560 #define VMBUS_CHANNEL_ENUMERATE_DEVICE_INTERFACE 1
561 #define VMBUS_CHANNEL_SERVER_SUPPORTS_TRANSFER_PAGES 2
562 #define VMBUS_CHANNEL_SERVER_SUPPORTS_GPADLS 4
563 #define VMBUS_CHANNEL_NAMED_PIPE_MODE 0x10
564 #define VMBUS_CHANNEL_LOOPBACK_OFFER 0x100
565 #define VMBUS_CHANNEL_PARENT_OFFER 0x200
566 #define VMBUS_CHANNEL_REQUEST_MONITORED_NOTIFICATION 0x400
568 struct vmpacket_descriptor {
576 struct vmpacket_header {
577 u32 prev_pkt_start_offset;
578 struct vmpacket_descriptor descriptor;
581 struct vmtransfer_page_range {
586 struct vmtransfer_page_packet_header {
587 struct vmpacket_descriptor d;
592 struct vmtransfer_page_range ranges[1];
595 struct vmgpadl_packet_header {
596 struct vmpacket_descriptor d;
601 struct vmadd_remove_transfer_page_set {
602 struct vmpacket_descriptor d;
609 * This structure defines a range in guest physical space that can be made to
610 * look virtually contiguous.
619 * This is the format for an Establish Gpadl packet, which contains a handle by
620 * which this GPADL will be known and a set of GPA ranges associated with it.
621 * This can be converted to a MDL by the guest OS. If there are multiple GPA
622 * ranges, then the resulting MDL will be "chained," representing multiple VA
625 struct vmestablish_gpadl {
626 struct vmpacket_descriptor d;
629 struct gpa_range range[1];
633 * This is the format for a Teardown Gpadl packet, which indicates that the
634 * GPADL handle in the Establish Gpadl packet will never be referenced again.
636 struct vmteardown_gpadl {
637 struct vmpacket_descriptor d;
639 u32 reserved; /* for alignment to a 8-byte boundary */
643 * This is the format for a GPA-Direct packet, which contains a set of GPA
644 * ranges, in addition to commands and/or data.
646 struct vmdata_gpa_direct {
647 struct vmpacket_descriptor d;
650 struct gpa_range range[1];
653 /* This is the format for a Additional Data Packet. */
654 struct vmadditional_data {
655 struct vmpacket_descriptor d;
659 unsigned char data[1];
662 union vmpacket_largest_possible_header {
663 struct vmpacket_descriptor simple_hdr;
664 struct vmtransfer_page_packet_header xfer_page_hdr;
665 struct vmgpadl_packet_header gpadl_hdr;
666 struct vmadd_remove_transfer_page_set add_rm_xfer_page_hdr;
667 struct vmestablish_gpadl establish_gpadl_hdr;
668 struct vmteardown_gpadl teardown_gpadl_hdr;
669 struct vmdata_gpa_direct data_gpa_direct_hdr;
672 #define VMPACKET_DATA_START_ADDRESS(__packet) \
673 (void *)(((unsigned char *)__packet) + \
674 ((struct vmpacket_descriptor)__packet)->offset8 * 8)
676 #define VMPACKET_DATA_LENGTH(__packet) \
677 ((((struct vmpacket_descriptor)__packet)->len8 - \
678 ((struct vmpacket_descriptor)__packet)->offset8) * 8)
680 #define VMPACKET_TRANSFER_MODE(__packet) \
681 (((struct IMPACT)__packet)->type)
683 enum vmbus_packet_type {
684 VM_PKT_INVALID = 0x0,
686 VM_PKT_ADD_XFER_PAGESET = 0x2,
687 VM_PKT_RM_XFER_PAGESET = 0x3,
688 VM_PKT_ESTABLISH_GPADL = 0x4,
689 VM_PKT_TEARDOWN_GPADL = 0x5,
690 VM_PKT_DATA_INBAND = 0x6,
691 VM_PKT_DATA_USING_XFER_PAGES = 0x7,
692 VM_PKT_DATA_USING_GPADL = 0x8,
693 VM_PKT_DATA_USING_GPA_DIRECT = 0x9,
694 VM_PKT_CANCEL_REQUEST = 0xa,
696 VM_PKT_DATA_USING_ADDITIONAL_PKT = 0xc,
697 VM_PKT_ADDITIONAL_DATA = 0xd
700 #define VMBUS_DATA_PACKET_FLAG_COMPLETION_REQUESTED 1
703 /* Version 1 messages */
704 enum vmbus_channel_message_type {
705 CHANNELMSG_INVALID = 0,
706 CHANNELMSG_OFFERCHANNEL = 1,
707 CHANNELMSG_RESCIND_CHANNELOFFER = 2,
708 CHANNELMSG_REQUESTOFFERS = 3,
709 CHANNELMSG_ALLOFFERS_DELIVERED = 4,
710 CHANNELMSG_OPENCHANNEL = 5,
711 CHANNELMSG_OPENCHANNEL_RESULT = 6,
712 CHANNELMSG_CLOSECHANNEL = 7,
713 CHANNELMSG_GPADL_HEADER = 8,
714 CHANNELMSG_GPADL_BODY = 9,
715 CHANNELMSG_GPADL_CREATED = 10,
716 CHANNELMSG_GPADL_TEARDOWN = 11,
717 CHANNELMSG_GPADL_TORNDOWN = 12,
718 CHANNELMSG_RELID_RELEASED = 13,
719 CHANNELMSG_INITIATE_CONTACT = 14,
720 CHANNELMSG_VERSION_RESPONSE = 15,
721 CHANNELMSG_UNLOAD = 16,
722 #ifdef VMBUS_FEATURE_PARENT_OR_PEER_MEMORY_MAPPED_INTO_A_CHILD
723 CHANNELMSG_VIEWRANGE_ADD = 17,
724 CHANNELMSG_VIEWRANGE_REMOVE = 18,
729 struct vmbus_channel_message_header {
730 enum vmbus_channel_message_type msgtype;
734 /* Query VMBus Version parameters */
735 struct vmbus_channel_query_vmbus_version {
736 struct vmbus_channel_message_header header;
740 /* VMBus Version Supported parameters */
741 struct vmbus_channel_version_supported {
742 struct vmbus_channel_message_header header;
743 u8 version_supported;
746 /* Offer Channel parameters */
747 struct vmbus_channel_offer_channel {
748 struct vmbus_channel_message_header header;
749 struct vmbus_channel_offer offer;
753 * win7 and beyond splits this field into a bit field.
755 u8 monitor_allocated:1;
758 * These are new fields added in win7 and later.
759 * Do not access these fields without checking the
760 * negotiated protocol.
762 * If "is_dedicated_interrupt" is set, we must not set the
763 * associated bit in the channel bitmap while sending the
764 * interrupt to the host.
766 * connection_id is to be used in signaling the host.
768 u16 is_dedicated_interrupt:1;
773 /* Rescind Offer parameters */
774 struct vmbus_channel_rescind_offer {
775 struct vmbus_channel_message_header header;
780 * Request Offer -- no parameters, SynIC message contains the partition ID
781 * Set Snoop -- no parameters, SynIC message contains the partition ID
782 * Clear Snoop -- no parameters, SynIC message contains the partition ID
783 * All Offers Delivered -- no parameters, SynIC message contains the partition
785 * Flush Client -- no parameters, SynIC message contains the partition ID
788 /* Open Channel parameters */
789 struct vmbus_channel_open_channel {
790 struct vmbus_channel_message_header header;
792 /* Identifies the specific VMBus channel that is being opened. */
795 /* ID making a particular open request at a channel offer unique. */
798 /* GPADL for the channel's ring buffer. */
799 u32 ringbuffer_gpadlhandle;
802 * Starting with win8, this field will be used to specify
803 * the target virtual processor on which to deliver the interrupt for
804 * the host to guest communication.
805 * Prior to win8, incoming channel interrupts would only
806 * be delivered on cpu 0. Setting this value to 0 would
807 * preserve the earlier behavior.
812 * The upstream ring buffer begins at offset zero in the memory
813 * described by RingBufferGpadlHandle. The downstream ring buffer
814 * follows it at this offset (in pages).
816 u32 downstream_ringbuffer_pageoffset;
818 /* User-specific data to be passed along to the server endpoint. */
819 unsigned char userdata[MAX_USER_DEFINED_BYTES];
822 /* Open Channel Result parameters */
823 struct vmbus_channel_open_result {
824 struct vmbus_channel_message_header header;
830 /* Close channel parameters; */
831 struct vmbus_channel_close_channel {
832 struct vmbus_channel_message_header header;
836 /* Channel Message GPADL */
837 #define GPADL_TYPE_RING_BUFFER 1
838 #define GPADL_TYPE_SERVER_SAVE_AREA 2
839 #define GPADL_TYPE_TRANSACTION 8
842 * The number of PFNs in a GPADL message is defined by the number of
843 * pages that would be spanned by ByteCount and ByteOffset. If the
844 * implied number of PFNs won't fit in this packet, there will be a
845 * follow-up packet that contains more.
847 struct vmbus_channel_gpadl_header {
848 struct vmbus_channel_message_header header;
853 struct gpa_range range[0];
856 /* This is the followup packet that contains more PFNs. */
857 struct vmbus_channel_gpadl_body {
858 struct vmbus_channel_message_header header;
864 struct vmbus_channel_gpadl_created {
865 struct vmbus_channel_message_header header;
871 struct vmbus_channel_gpadl_teardown {
872 struct vmbus_channel_message_header header;
877 struct vmbus_channel_gpadl_torndown {
878 struct vmbus_channel_message_header header;
882 #ifdef VMBUS_FEATURE_PARENT_OR_PEER_MEMORY_MAPPED_INTO_A_CHILD
883 struct vmbus_channel_view_range_add {
884 struct vmbus_channel_message_header header;
885 PHYSICAL_ADDRESS viewrange_base;
886 u64 viewrange_length;
890 struct vmbus_channel_view_range_remove {
891 struct vmbus_channel_message_header header;
892 PHYSICAL_ADDRESS viewrange_base;
897 struct vmbus_channel_relid_released {
898 struct vmbus_channel_message_header header;
902 struct vmbus_channel_initiate_contact {
903 struct vmbus_channel_message_header header;
904 u32 vmbus_version_requested;
911 struct vmbus_channel_version_response {
912 struct vmbus_channel_message_header header;
913 u8 version_supported;
916 enum vmbus_channel_state {
918 CHANNEL_OPENING_STATE,
920 CHANNEL_OPENED_STATE,
923 struct vmbus_channel_debug_info {
925 enum vmbus_channel_state state;
926 uuid_le interfacetype;
927 uuid_le interface_instance;
929 u32 servermonitor_pending;
930 u32 servermonitor_latency;
931 u32 servermonitor_connectionid;
932 u32 clientmonitor_pending;
933 u32 clientmonitor_latency;
934 u32 clientmonitor_connectionid;
936 struct hv_ring_buffer_debug_info inbound;
937 struct hv_ring_buffer_debug_info outbound;
941 * Represents each channel msg on the vmbus connection This is a
942 * variable-size data structure depending on the msg type itself
944 struct vmbus_channel_msginfo {
945 /* Bookkeeping stuff */
946 struct list_head msglistentry;
948 /* So far, this is only used to handle gpadl body message */
949 struct list_head submsglist;
951 /* Synchronize the request/response if needed */
952 struct completion waitevent;
954 struct vmbus_channel_version_supported version_supported;
955 struct vmbus_channel_open_result open_result;
956 struct vmbus_channel_gpadl_torndown gpadl_torndown;
957 struct vmbus_channel_gpadl_created gpadl_created;
958 struct vmbus_channel_version_response version_response;
963 * The channel message that goes out on the "wire".
964 * It will contain at minimum the VMBUS_CHANNEL_MESSAGE_HEADER header
966 unsigned char msg[0];
969 struct vmbus_close_msg {
970 struct vmbus_channel_msginfo info;
971 struct vmbus_channel_close_channel msg;
974 /* Define connection identifier type. */
975 union hv_connection_id {
983 /* Definition of the hv_signal_event hypercall input structure. */
984 struct hv_input_signal_event {
985 union hv_connection_id connectionid;
990 struct hv_input_signal_event_buffer {
992 struct hv_input_signal_event event;
995 struct vmbus_channel {
996 struct list_head listentry;
998 struct hv_device *device_obj;
1000 struct work_struct work;
1002 enum vmbus_channel_state state;
1004 struct vmbus_channel_offer_channel offermsg;
1006 * These are based on the OfferMsg.MonitorId.
1007 * Save it here for easy access.
1012 u32 ringbuffer_gpadlhandle;
1014 /* Allocated memory for ring buffer */
1015 void *ringbuffer_pages;
1016 u32 ringbuffer_pagecount;
1017 struct hv_ring_buffer_info outbound; /* send to parent */
1018 struct hv_ring_buffer_info inbound; /* receive from parent */
1019 spinlock_t inbound_lock;
1020 struct workqueue_struct *controlwq;
1022 struct vmbus_close_msg close_msg;
1024 /* Channel callback are invoked in this workqueue context */
1025 /* HANDLE dataWorkQueue; */
1027 void (*onchannel_callback)(void *context);
1028 void *channel_callback_context;
1031 * A channel can be marked for efficient (batched)
1033 * If batched_reading is set to "true", we read until the
1034 * channel is empty and hold off interrupts from the host
1035 * during the entire read process.
1036 * If batched_reading is set to "false", the client is not
1037 * going to perform batched reading.
1039 * By default we will enable batched reading; specific
1040 * drivers that don't want this behavior can turn it off.
1043 bool batched_reading;
1045 bool is_dedicated_interrupt;
1046 struct hv_input_signal_event_buffer sig_buf;
1047 struct hv_input_signal_event *sig_event;
1050 * Starting with win8, this field will be used to specify
1051 * the target virtual processor on which to deliver the interrupt for
1052 * the host to guest communication.
1053 * Prior to win8, incoming channel interrupts would only
1054 * be delivered on cpu 0. Setting this value to 0 would
1055 * preserve the earlier behavior.
1059 * Support for sub-channels. For high performance devices,
1060 * it will be useful to have multiple sub-channels to support
1061 * a scalable communication infrastructure with the host.
1062 * The support for sub-channels is implemented as an extention
1063 * to the current infrastructure.
1064 * The initial offer is considered the primary channel and this
1065 * offer message will indicate if the host supports sub-channels.
1066 * The guest is free to ask for sub-channels to be offerred and can
1067 * open these sub-channels as a normal "primary" channel. However,
1068 * all sub-channels will have the same type and instance guids as the
1069 * primary channel. Requests sent on a given channel will result in a
1070 * response on the same channel.
1074 * Sub-channel creation callback. This callback will be called in
1075 * process context when a sub-channel offer is received from the host.
1076 * The guest can open the sub-channel in the context of this callback.
1078 void (*sc_creation_callback)(struct vmbus_channel *new_sc);
1082 * All Sub-channels of a primary channel are linked here.
1084 struct list_head sc_list;
1086 * The primary channel this sub-channel belongs to.
1087 * This will be NULL for the primary channel.
1089 struct vmbus_channel *primary_channel;
1092 static inline void set_channel_read_state(struct vmbus_channel *c, bool state)
1094 c->batched_reading = state;
1097 void vmbus_onmessage(void *context);
1099 int vmbus_request_offers(void);
1102 * APIs for managing sub-channels.
1105 void vmbus_set_sc_create_callback(struct vmbus_channel *primary_channel,
1106 void (*sc_cr_cb)(struct vmbus_channel *new_sc));
1109 * Retrieve the (sub) channel on which to send an outgoing request.
1110 * When a primary channel has multiple sub-channels, we choose a
1111 * channel whose VCPU binding is closest to the VCPU on which
1112 * this call is being made.
1114 struct vmbus_channel *vmbus_get_outgoing_channel(struct vmbus_channel *primary);
1117 * Check if sub-channels have already been offerred. This API will be useful
1118 * when the driver is unloaded after establishing sub-channels. In this case,
1119 * when the driver is re-loaded, the driver would have to check if the
1120 * subchannels have already been established before attempting to request
1121 * the creation of sub-channels.
1122 * This function returns TRUE to indicate that subchannels have already been
1124 * This function should be invoked after setting the callback function for
1125 * sub-channel creation.
1127 bool vmbus_are_subchannels_present(struct vmbus_channel *primary);
1129 /* The format must be the same as struct vmdata_gpa_direct */
1130 struct vmbus_channel_packet_page_buffer {
1138 struct hv_page_buffer range[MAX_PAGE_BUFFER_COUNT];
1141 /* The format must be the same as struct vmdata_gpa_direct */
1142 struct vmbus_channel_packet_multipage_buffer {
1149 u32 rangecount; /* Always 1 in this case */
1150 struct hv_multipage_buffer range;
1154 extern int vmbus_open(struct vmbus_channel *channel,
1155 u32 send_ringbuffersize,
1156 u32 recv_ringbuffersize,
1159 void(*onchannel_callback)(void *context),
1162 extern void vmbus_close(struct vmbus_channel *channel);
1164 extern int vmbus_sendpacket(struct vmbus_channel *channel,
1168 enum vmbus_packet_type type,
1171 extern int vmbus_sendpacket_pagebuffer(struct vmbus_channel *channel,
1172 struct hv_page_buffer pagebuffers[],
1178 extern int vmbus_sendpacket_multipagebuffer(struct vmbus_channel *channel,
1179 struct hv_multipage_buffer *mpb,
1184 extern int vmbus_establish_gpadl(struct vmbus_channel *channel,
1189 extern int vmbus_teardown_gpadl(struct vmbus_channel *channel,
1192 extern int vmbus_recvpacket(struct vmbus_channel *channel,
1195 u32 *buffer_actual_len,
1198 extern int vmbus_recvpacket_raw(struct vmbus_channel *channel,
1201 u32 *buffer_actual_len,
1205 extern void vmbus_get_debug_info(struct vmbus_channel *channel,
1206 struct vmbus_channel_debug_info *debug);
1208 extern void vmbus_ontimer(unsigned long data);
1210 struct hv_dev_port_info {
1214 u32 bytes_avail_toread;
1215 u32 bytes_avail_towrite;
1218 /* Base driver object */
1222 /* the device type supported by this driver */
1224 const struct hv_vmbus_device_id *id_table;
1226 struct device_driver driver;
1228 int (*probe)(struct hv_device *, const struct hv_vmbus_device_id *);
1229 int (*remove)(struct hv_device *);
1230 void (*shutdown)(struct hv_device *);
1234 /* Base device object */
1236 /* the device type id of this device */
1239 /* the device instance id of this device */
1240 uuid_le dev_instance;
1242 struct device device;
1244 struct vmbus_channel *channel;
1248 static inline struct hv_device *device_to_hv_device(struct device *d)
1250 return container_of(d, struct hv_device, device);
1253 static inline struct hv_driver *drv_to_hv_drv(struct device_driver *d)
1255 return container_of(d, struct hv_driver, driver);
1258 static inline void hv_set_drvdata(struct hv_device *dev, void *data)
1260 dev_set_drvdata(&dev->device, data);
1263 static inline void *hv_get_drvdata(struct hv_device *dev)
1265 return dev_get_drvdata(&dev->device);
1268 /* Vmbus interface */
1269 #define vmbus_driver_register(driver) \
1270 __vmbus_driver_register(driver, THIS_MODULE, KBUILD_MODNAME)
1271 int __must_check __vmbus_driver_register(struct hv_driver *hv_driver,
1272 struct module *owner,
1273 const char *mod_name);
1274 void vmbus_driver_unregister(struct hv_driver *hv_driver);
1277 * VMBUS_DEVICE - macro used to describe a specific hyperv vmbus device
1279 * This macro is used to create a struct hv_vmbus_device_id that matches a
1282 #define VMBUS_DEVICE(g0, g1, g2, g3, g4, g5, g6, g7, \
1283 g8, g9, ga, gb, gc, gd, ge, gf) \
1284 .guid = { g0, g1, g2, g3, g4, g5, g6, g7, \
1285 g8, g9, ga, gb, gc, gd, ge, gf },
1288 * GUID definitions of various offer types - services offered to the guest.
1293 * {f8615163-df3e-46c5-913f-f2d2f965ed0e}
1295 #define HV_NIC_GUID \
1297 0x63, 0x51, 0x61, 0xf8, 0x3e, 0xdf, 0xc5, 0x46, \
1298 0x91, 0x3f, 0xf2, 0xd2, 0xf9, 0x65, 0xed, 0x0e \
1303 * {32412632-86cb-44a2-9b5c-50d1417354f5}
1305 #define HV_IDE_GUID \
1307 0x32, 0x26, 0x41, 0x32, 0xcb, 0x86, 0xa2, 0x44, \
1308 0x9b, 0x5c, 0x50, 0xd1, 0x41, 0x73, 0x54, 0xf5 \
1313 * {ba6163d9-04a1-4d29-b605-72e2ffb1dc7f}
1315 #define HV_SCSI_GUID \
1317 0xd9, 0x63, 0x61, 0xba, 0xa1, 0x04, 0x29, 0x4d, \
1318 0xb6, 0x05, 0x72, 0xe2, 0xff, 0xb1, 0xdc, 0x7f \
1323 * {0e0b6031-5213-4934-818b-38d90ced39db}
1325 #define HV_SHUTDOWN_GUID \
1327 0x31, 0x60, 0x0b, 0x0e, 0x13, 0x52, 0x34, 0x49, \
1328 0x81, 0x8b, 0x38, 0xd9, 0x0c, 0xed, 0x39, 0xdb \
1333 * {9527E630-D0AE-497b-ADCE-E80AB0175CAF}
1335 #define HV_TS_GUID \
1337 0x30, 0xe6, 0x27, 0x95, 0xae, 0xd0, 0x7b, 0x49, \
1338 0xad, 0xce, 0xe8, 0x0a, 0xb0, 0x17, 0x5c, 0xaf \
1343 * {57164f39-9115-4e78-ab55-382f3bd5422d}
1345 #define HV_HEART_BEAT_GUID \
1347 0x39, 0x4f, 0x16, 0x57, 0x15, 0x91, 0x78, 0x4e, \
1348 0xab, 0x55, 0x38, 0x2f, 0x3b, 0xd5, 0x42, 0x2d \
1353 * {a9a0f4e7-5a45-4d96-b827-8a841e8c03e6}
1355 #define HV_KVP_GUID \
1357 0xe7, 0xf4, 0xa0, 0xa9, 0x45, 0x5a, 0x96, 0x4d, \
1358 0xb8, 0x27, 0x8a, 0x84, 0x1e, 0x8c, 0x3, 0xe6 \
1362 * Dynamic memory GUID
1363 * {525074dc-8985-46e2-8057-a307dc18a502}
1365 #define HV_DM_GUID \
1367 0xdc, 0x74, 0x50, 0X52, 0x85, 0x89, 0xe2, 0x46, \
1368 0x80, 0x57, 0xa3, 0x07, 0xdc, 0x18, 0xa5, 0x02 \
1373 * {cfa8b69e-5b4a-4cc0-b98b-8ba1a1f3f95a}
1375 #define HV_MOUSE_GUID \
1377 0x9e, 0xb6, 0xa8, 0xcf, 0x4a, 0x5b, 0xc0, 0x4c, \
1378 0xb9, 0x8b, 0x8b, 0xa1, 0xa1, 0xf3, 0xf9, 0x5a \
1382 * VSS (Backup/Restore) GUID
1384 #define HV_VSS_GUID \
1386 0x29, 0x2e, 0xfa, 0x35, 0x23, 0xea, 0x36, 0x42, \
1387 0x96, 0xae, 0x3a, 0x6e, 0xba, 0xcb, 0xa4, 0x40 \
1390 * Synthetic Video GUID
1391 * {DA0A7802-E377-4aac-8E77-0558EB1073F8}
1393 #define HV_SYNTHVID_GUID \
1395 0x02, 0x78, 0x0a, 0xda, 0x77, 0xe3, 0xac, 0x4a, \
1396 0x8e, 0x77, 0x05, 0x58, 0xeb, 0x10, 0x73, 0xf8 \
1401 * {2f9bcc4a-0069-4af3-b76b-6fd0be528cda}
1403 #define HV_SYNTHFC_GUID \
1405 0x4A, 0xCC, 0x9B, 0x2F, 0x69, 0x00, 0xF3, 0x4A, \
1406 0xB7, 0x6B, 0x6F, 0xD0, 0xBE, 0x52, 0x8C, 0xDA \
1410 * Common header for Hyper-V ICs
1413 #define ICMSGTYPE_NEGOTIATE 0
1414 #define ICMSGTYPE_HEARTBEAT 1
1415 #define ICMSGTYPE_KVPEXCHANGE 2
1416 #define ICMSGTYPE_SHUTDOWN 3
1417 #define ICMSGTYPE_TIMESYNC 4
1418 #define ICMSGTYPE_VSS 5
1420 #define ICMSGHDRFLAG_TRANSACTION 1
1421 #define ICMSGHDRFLAG_REQUEST 2
1422 #define ICMSGHDRFLAG_RESPONSE 4
1426 * While we want to handle util services as regular devices,
1427 * there is only one instance of each of these services; so
1428 * we statically allocate the service specific state.
1431 struct hv_util_service {
1433 void (*util_cb)(void *);
1434 int (*util_init)(struct hv_util_service *);
1435 void (*util_deinit)(void);
1438 struct vmbuspipe_hdr {
1449 struct ic_version icverframe;
1451 struct ic_version icvermsg;
1454 u8 ictransaction_id;
1459 struct icmsg_negotiate {
1463 struct ic_version icversion_data[1]; /* any size array */
1466 struct shutdown_msg_data {
1468 u32 timeout_seconds;
1470 u8 display_message[2048];
1473 struct heartbeat_msg_data {
1478 /* Time Sync IC defs */
1479 #define ICTIMESYNCFLAG_PROBE 0
1480 #define ICTIMESYNCFLAG_SYNC 1
1481 #define ICTIMESYNCFLAG_SAMPLE 2
1484 #define WLTIMEDELTA 116444736000000000L /* in 100ns unit */
1486 #define WLTIMEDELTA 116444736000000000LL
1489 struct ictimesync_data {
1496 struct hyperv_service_callback {
1500 struct vmbus_channel *channel;
1501 void (*callback) (void *context);
1504 #define MAX_SRV_VER 0x7ffffff
1505 extern bool vmbus_prep_negotiate_resp(struct icmsg_hdr *,
1506 struct icmsg_negotiate *, u8 *, int,
1509 int hv_kvp_init(struct hv_util_service *);
1510 void hv_kvp_deinit(void);
1511 void hv_kvp_onchannelcallback(void *);
1513 int hv_vss_init(struct hv_util_service *);
1514 void hv_vss_deinit(void);
1515 void hv_vss_onchannelcallback(void *);
1518 * Negotiated version with the Host.
1521 extern __u32 vmbus_proto_version;
1523 #endif /* __KERNEL__ */
1524 #endif /* _HYPERV_H */