H. Peter Anvin | e08cae4 | 2010-05-07 16:57:28 -0700 | [diff] [blame] | 1 | #ifndef _ASM_X86_MSHYPER_H |
| 2 | #define _ASM_X86_MSHYPER_H |
Ky Srinivasan | a2a47c6 | 2010-05-06 12:08:41 -0700 | [diff] [blame] | 3 | |
H. Peter Anvin | e08cae4 | 2010-05-07 16:57:28 -0700 | [diff] [blame] | 4 | #include <linux/types.h> |
Thomas Gleixner | 1aec169 | 2014-02-23 21:40:22 +0000 | [diff] [blame] | 5 | #include <linux/interrupt.h> |
H. Peter Anvin | e08cae4 | 2010-05-07 16:57:28 -0700 | [diff] [blame] | 6 | #include <asm/hyperv.h> |
| 7 | |
K. Y. Srinivasan | 8de8af7 | 2017-01-19 11:51:47 -0700 | [diff] [blame] | 8 | /* |
| 9 | * The below CPUID leaves are present if VersionAndFeatures.HypervisorPresent |
| 10 | * is set by CPUID(HVCPUID_VERSION_FEATURES). |
| 11 | */ |
| 12 | enum hv_cpuid_function { |
| 13 | HVCPUID_VERSION_FEATURES = 0x00000001, |
| 14 | HVCPUID_VENDOR_MAXFUNCTION = 0x40000000, |
| 15 | HVCPUID_INTERFACE = 0x40000001, |
| 16 | |
| 17 | /* |
| 18 | * The remaining functions depend on the value of |
| 19 | * HVCPUID_INTERFACE |
| 20 | */ |
| 21 | HVCPUID_VERSION = 0x40000002, |
| 22 | HVCPUID_FEATURES = 0x40000003, |
| 23 | HVCPUID_ENLIGHTENMENT_INFO = 0x40000004, |
| 24 | HVCPUID_IMPLEMENTATION_LIMITS = 0x40000005, |
| 25 | }; |
| 26 | |
H. Peter Anvin | e08cae4 | 2010-05-07 16:57:28 -0700 | [diff] [blame] | 27 | struct ms_hyperv_info { |
| 28 | u32 features; |
Denis V. Lunev | cc2dd40 | 2015-08-01 16:08:20 -0700 | [diff] [blame] | 29 | u32 misc_features; |
H. Peter Anvin | e08cae4 | 2010-05-07 16:57:28 -0700 | [diff] [blame] | 30 | u32 hints; |
| 31 | }; |
| 32 | |
| 33 | extern struct ms_hyperv_info ms_hyperv; |
Ky Srinivasan | a2a47c6 | 2010-05-06 12:08:41 -0700 | [diff] [blame] | 34 | |
K. Y. Srinivasan | 3f646ed | 2017-01-18 16:45:00 -0700 | [diff] [blame] | 35 | /* |
| 36 | * Declare the MSR used to setup pages used to communicate with the hypervisor. |
| 37 | */ |
| 38 | union hv_x64_msr_hypercall_contents { |
| 39 | u64 as_uint64; |
| 40 | struct { |
| 41 | u64 enable:1; |
| 42 | u64 reserved:11; |
| 43 | u64 guest_physical_address:52; |
| 44 | }; |
| 45 | }; |
| 46 | |
K. Y. Srinivasan | 352c962 | 2017-01-18 16:45:01 -0700 | [diff] [blame] | 47 | /* |
K. Y. Srinivasan | 63ed4e0 | 2017-01-19 11:51:46 -0700 | [diff] [blame] | 48 | * TSC page layout. |
| 49 | */ |
| 50 | |
| 51 | struct ms_hyperv_tsc_page { |
| 52 | volatile u32 tsc_sequence; |
| 53 | u32 reserved1; |
| 54 | volatile u64 tsc_scale; |
| 55 | volatile s64 tsc_offset; |
| 56 | u64 reserved2[509]; |
| 57 | }; |
| 58 | |
| 59 | /* |
K. Y. Srinivasan | 352c962 | 2017-01-18 16:45:01 -0700 | [diff] [blame] | 60 | * The guest OS needs to register the guest ID with the hypervisor. |
| 61 | * The guest ID is a 64 bit entity and the structure of this ID is |
| 62 | * specified in the Hyper-V specification: |
| 63 | * |
| 64 | * msdn.microsoft.com/en-us/library/windows/hardware/ff542653%28v=vs.85%29.aspx |
| 65 | * |
| 66 | * While the current guideline does not specify how Linux guest ID(s) |
| 67 | * need to be generated, our plan is to publish the guidelines for |
| 68 | * Linux and other guest operating systems that currently are hosted |
| 69 | * on Hyper-V. The implementation here conforms to this yet |
| 70 | * unpublished guidelines. |
| 71 | * |
| 72 | * |
| 73 | * Bit(s) |
| 74 | * 63 - Indicates if the OS is Open Source or not; 1 is Open Source |
| 75 | * 62:56 - Os Type; Linux is 0x100 |
| 76 | * 55:48 - Distro specific identification |
| 77 | * 47:16 - Linux kernel version number |
| 78 | * 15:0 - Distro specific identification |
| 79 | * |
| 80 | * |
| 81 | */ |
| 82 | |
| 83 | #define HV_LINUX_VENDOR_ID 0x8800 |
| 84 | |
| 85 | /* |
| 86 | * Generate the guest ID based on the guideline described above. |
| 87 | */ |
| 88 | |
| 89 | static inline __u64 generate_guest_id(__u64 d_info1, __u64 kernel_version, |
| 90 | __u64 d_info2) |
| 91 | { |
| 92 | __u64 guest_id = 0; |
| 93 | |
| 94 | guest_id = (((__u64)HV_LINUX_VENDOR_ID) << 56); |
| 95 | guest_id |= (d_info1 << 48); |
| 96 | guest_id |= (kernel_version << 16); |
| 97 | guest_id |= d_info2; |
| 98 | |
| 99 | return guest_id; |
| 100 | } |
| 101 | |
K. Y. Srinivasan | e810e48 | 2017-01-19 11:51:50 -0700 | [diff] [blame] | 102 | |
| 103 | /* Free the message slot and signal end-of-message if required */ |
| 104 | static inline void vmbus_signal_eom(struct hv_message *msg, u32 old_msg_type) |
| 105 | { |
| 106 | /* |
| 107 | * On crash we're reading some other CPU's message page and we need |
| 108 | * to be careful: this other CPU may already had cleared the header |
| 109 | * and the host may already had delivered some other message there. |
| 110 | * In case we blindly write msg->header.message_type we're going |
| 111 | * to lose it. We can still lose a message of the same type but |
| 112 | * we count on the fact that there can only be one |
| 113 | * CHANNELMSG_UNLOAD_RESPONSE and we don't care about other messages |
| 114 | * on crash. |
| 115 | */ |
| 116 | if (cmpxchg(&msg->header.message_type, old_msg_type, |
| 117 | HVMSG_NONE) != old_msg_type) |
| 118 | return; |
| 119 | |
| 120 | /* |
| 121 | * Make sure the write to MessageType (ie set to |
| 122 | * HVMSG_NONE) happens before we read the |
| 123 | * MessagePending and EOMing. Otherwise, the EOMing |
| 124 | * will not deliver any more messages since there is |
| 125 | * no empty slot |
| 126 | */ |
| 127 | mb(); |
| 128 | |
| 129 | if (msg->header.message_flags.msg_pending) { |
| 130 | /* |
| 131 | * This will cause message queue rescan to |
| 132 | * possibly deliver another msg from the |
| 133 | * hypervisor |
| 134 | */ |
| 135 | wrmsrl(HV_X64_MSR_EOM, 0); |
| 136 | } |
| 137 | } |
| 138 | |
K. Y. Srinivasan | d5116b4 | 2017-01-19 11:51:51 -0700 | [diff] [blame] | 139 | #define hv_get_current_tick(tick) rdmsrl(HV_X64_MSR_TIME_REF_COUNT, tick) |
| 140 | #define hv_init_timer(timer, tick) wrmsrl(timer, tick) |
| 141 | #define hv_init_timer_config(config, val) wrmsrl(config, val) |
| 142 | |
K. Y. Srinivasan | 155e4a2 | 2017-01-19 11:51:54 -0700 | [diff] [blame] | 143 | #define hv_get_simp(val) rdmsrl(HV_X64_MSR_SIMP, val) |
| 144 | #define hv_set_simp(val) wrmsrl(HV_X64_MSR_SIMP, val) |
| 145 | |
K. Y. Srinivasan | 8e307bf | 2017-01-19 11:51:55 -0700 | [diff] [blame^] | 146 | #define hv_get_siefp(val) rdmsrl(HV_X64_MSR_SIEFP, val) |
| 147 | #define hv_set_siefp(val) wrmsrl(HV_X64_MSR_SIEFP, val) |
| 148 | |
K. Y. Srinivasan | bc2b033 | 2013-02-03 17:22:39 -0800 | [diff] [blame] | 149 | void hyperv_callback_vector(void); |
Seiji Aguchi | cf910e8 | 2013-06-20 11:46:53 -0400 | [diff] [blame] | 150 | #ifdef CONFIG_TRACING |
| 151 | #define trace_hyperv_callback_vector hyperv_callback_vector |
| 152 | #endif |
K. Y. Srinivasan | bc2b033 | 2013-02-03 17:22:39 -0800 | [diff] [blame] | 153 | void hyperv_vector_handler(struct pt_regs *regs); |
Thomas Gleixner | 76d388c | 2014-03-05 13:42:14 +0100 | [diff] [blame] | 154 | void hv_setup_vmbus_irq(void (*handler)(void)); |
| 155 | void hv_remove_vmbus_irq(void); |
K. Y. Srinivasan | bc2b033 | 2013-02-03 17:22:39 -0800 | [diff] [blame] | 156 | |
Vitaly Kuznetsov | 2517281 | 2015-08-01 16:08:07 -0700 | [diff] [blame] | 157 | void hv_setup_kexec_handler(void (*handler)(void)); |
| 158 | void hv_remove_kexec_handler(void); |
Vitaly Kuznetsov | b4370df | 2015-08-01 16:08:09 -0700 | [diff] [blame] | 159 | void hv_setup_crash_handler(void (*handler)(struct pt_regs *regs)); |
| 160 | void hv_remove_crash_handler(void); |
K. Y. Srinivasan | 8730046 | 2017-01-18 16:45:02 -0700 | [diff] [blame] | 161 | |
| 162 | #if IS_ENABLED(CONFIG_HYPERV) |
| 163 | void hyperv_init(void); |
K. Y. Srinivasan | d058fa7 | 2017-01-19 11:51:48 -0700 | [diff] [blame] | 164 | void hyperv_report_panic(struct pt_regs *regs); |
K. Y. Srinivasan | 73638cd | 2017-01-19 11:51:49 -0700 | [diff] [blame] | 165 | bool hv_is_hypercall_page_setup(void); |
K. Y. Srinivasan | 8730046 | 2017-01-18 16:45:02 -0700 | [diff] [blame] | 166 | #endif |
Ky Srinivasan | a2a47c6 | 2010-05-06 12:08:41 -0700 | [diff] [blame] | 167 | #endif |