]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - drivers/hv/hv.c
Merge tag 'xfs-for-linus-v3.13-rc1-2' of git://oss.sgi.com/xfs/xfs
[mirror_ubuntu-artful-kernel.git] / drivers / hv / hv.c
CommitLineData
3e7ee490 1/*
3e7ee490
HJ
2 * Copyright (c) 2009, Microsoft Corporation.
3 *
4 * This program is free software; you can redistribute it and/or modify it
5 * under the terms and conditions of the GNU General Public License,
6 * version 2, as published by the Free Software Foundation.
7 *
8 * This program is distributed in the hope it will be useful, but WITHOUT
9 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
10 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
11 * more details.
12 *
13 * You should have received a copy of the GNU General Public License along with
14 * this program; if not, write to the Free Software Foundation, Inc., 59 Temple
15 * Place - Suite 330, Boston, MA 02111-1307 USA.
16 *
17 * Authors:
18 * Haiyang Zhang <haiyangz@microsoft.com>
19 * Hank Janssen <hjanssen@microsoft.com>
20 *
21 */
0a46618d
HJ
22#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
23
a0086dc5
GKH
24#include <linux/kernel.h>
25#include <linux/mm.h>
5a0e3ad6 26#include <linux/slab.h>
b7c947f0 27#include <linux/vmalloc.h>
46a97191 28#include <linux/hyperv.h>
83ba0c4f 29#include <linux/version.h>
db11f12a 30#include <linux/interrupt.h>
407dd164 31#include <asm/hyperv.h>
0f2a6619 32#include "hyperv_vmbus.h"
3e7ee490 33
454f18a9 34/* The one and only */
6a0aaa18
HZ
35struct hv_context hv_context = {
36 .synic_initialized = false,
37 .hypercall_page = NULL,
3e7ee490
HJ
38};
39
3e189519 40/*
d44890c8 41 * query_hypervisor_info - Get version info of the windows hypervisor
0831ad04 42 */
5fbebb2d
S
43unsigned int host_info_eax;
44unsigned int host_info_ebx;
45unsigned int host_info_ecx;
46unsigned int host_info_edx;
47
d44890c8 48static int query_hypervisor_info(void)
0831ad04
GKH
49{
50 unsigned int eax;
51 unsigned int ebx;
52 unsigned int ecx;
53 unsigned int edx;
b8dfb264 54 unsigned int max_leaf;
0831ad04 55 unsigned int op;
3e7ee490 56
0831ad04
GKH
57 /*
58 * Its assumed that this is called after confirming that Viridian
59 * is present. Query id and revision.
60 */
61 eax = 0;
62 ebx = 0;
63 ecx = 0;
64 edx = 0;
f6feebe0 65 op = HVCPUID_VENDOR_MAXFUNCTION;
0831ad04 66 cpuid(op, &eax, &ebx, &ecx, &edx);
3e7ee490 67
b8dfb264 68 max_leaf = eax;
0831ad04 69
b8dfb264 70 if (max_leaf >= HVCPUID_VERSION) {
0831ad04
GKH
71 eax = 0;
72 ebx = 0;
73 ecx = 0;
74 edx = 0;
f6feebe0 75 op = HVCPUID_VERSION;
0831ad04 76 cpuid(op, &eax, &ebx, &ecx, &edx);
5fbebb2d
S
77 host_info_eax = eax;
78 host_info_ebx = ebx;
79 host_info_ecx = ecx;
80 host_info_edx = edx;
0831ad04 81 }
b8dfb264 82 return max_leaf;
0831ad04 83}
3e7ee490 84
3e189519 85/*
d44890c8 86 * do_hypercall- Invoke the specified hypercall
0831ad04 87 */
d44890c8 88static u64 do_hypercall(u64 control, void *input, void *output)
3e7ee490 89{
530cf207 90#ifdef CONFIG_X86_64
b8dfb264
HZ
91 u64 hv_status = 0;
92 u64 input_address = (input) ? virt_to_phys(input) : 0;
93 u64 output_address = (output) ? virt_to_phys(output) : 0;
dec317fd 94 void *hypercall_page = hv_context.hypercall_page;
3e7ee490 95
b8dfb264
HZ
96 __asm__ __volatile__("mov %0, %%r8" : : "r" (output_address) : "r8");
97 __asm__ __volatile__("call *%3" : "=a" (hv_status) :
98 "c" (control), "d" (input_address),
99 "m" (hypercall_page));
3e7ee490 100
b8dfb264 101 return hv_status;
3e7ee490
HJ
102
103#else
104
b8dfb264
HZ
105 u32 control_hi = control >> 32;
106 u32 control_lo = control & 0xFFFFFFFF;
107 u32 hv_status_hi = 1;
108 u32 hv_status_lo = 1;
109 u64 input_address = (input) ? virt_to_phys(input) : 0;
110 u32 input_address_hi = input_address >> 32;
111 u32 input_address_lo = input_address & 0xFFFFFFFF;
112 u64 output_address = (output) ? virt_to_phys(output) : 0;
113 u32 output_address_hi = output_address >> 32;
114 u32 output_address_lo = output_address & 0xFFFFFFFF;
dec317fd 115 void *hypercall_page = hv_context.hypercall_page;
3e7ee490 116
b8dfb264
HZ
117 __asm__ __volatile__ ("call *%8" : "=d"(hv_status_hi),
118 "=a"(hv_status_lo) : "d" (control_hi),
119 "a" (control_lo), "b" (input_address_hi),
120 "c" (input_address_lo), "D"(output_address_hi),
121 "S"(output_address_lo), "m" (hypercall_page));
3e7ee490 122
b8dfb264 123 return hv_status_lo | ((u64)hv_status_hi << 32);
0831ad04 124#endif /* !x86_64 */
3e7ee490
HJ
125}
126
3e189519 127/*
d44890c8 128 * hv_init - Main initialization routine.
0831ad04
GKH
129 *
130 * This routine must be called before any other routines in here are called
131 */
d44890c8 132int hv_init(void)
3e7ee490 133{
b8dfb264
HZ
134 int max_leaf;
135 union hv_x64_msr_hypercall_contents hypercall_msr;
136 void *virtaddr = NULL;
3e7ee490 137
14c1bf8a 138 memset(hv_context.synic_event_page, 0, sizeof(void *) * NR_CPUS);
6a0aaa18 139 memset(hv_context.synic_message_page, 0,
14c1bf8a 140 sizeof(void *) * NR_CPUS);
917ea427
S
141 memset(hv_context.vp_index, 0,
142 sizeof(int) * NR_CPUS);
db11f12a
S
143 memset(hv_context.event_dpc, 0,
144 sizeof(void *) * NR_CPUS);
3e7ee490 145
d44890c8 146 max_leaf = query_hypervisor_info();
3e7ee490 147
83ba0c4f
S
148 /*
149 * Write our OS ID.
150 */
151 hv_context.guestid = generate_guest_id(0, LINUX_VERSION_CODE, 0);
152 wrmsrl(HV_X64_MSR_GUEST_OS_ID, hv_context.guestid);
a73e6b7c 153
454f18a9 154 /* See if the hypercall page is already set */
b8dfb264 155 rdmsrl(HV_X64_MSR_HYPERCALL, hypercall_msr.as_uint64);
3e7ee490 156
df3493e0 157 virtaddr = __vmalloc(PAGE_SIZE, GFP_KERNEL, PAGE_KERNEL_EXEC);
3e7ee490 158
98e08702 159 if (!virtaddr)
44939d37 160 goto cleanup;
3e7ee490 161
b8dfb264 162 hypercall_msr.enable = 1;
a73e6b7c 163
b8dfb264
HZ
164 hypercall_msr.guest_physical_address = vmalloc_to_pfn(virtaddr);
165 wrmsrl(HV_X64_MSR_HYPERCALL, hypercall_msr.as_uint64);
a73e6b7c
HJ
166
167 /* Confirm that hypercall page did get setup. */
b8dfb264
HZ
168 hypercall_msr.as_uint64 = 0;
169 rdmsrl(HV_X64_MSR_HYPERCALL, hypercall_msr.as_uint64);
a73e6b7c 170
98e08702 171 if (!hypercall_msr.enable)
44939d37 172 goto cleanup;
3e7ee490 173
b8dfb264 174 hv_context.hypercall_page = virtaddr;
a73e6b7c 175
5433e003 176 return 0;
3e7ee490 177
44939d37 178cleanup:
b8dfb264
HZ
179 if (virtaddr) {
180 if (hypercall_msr.enable) {
181 hypercall_msr.as_uint64 = 0;
182 wrmsrl(HV_X64_MSR_HYPERCALL, hypercall_msr.as_uint64);
3e7ee490
HJ
183 }
184
b8dfb264 185 vfree(virtaddr);
3e7ee490 186 }
5433e003
S
187
188 return -ENOTSUPP;
3e7ee490
HJ
189}
190
3e189519 191/*
d44890c8 192 * hv_cleanup - Cleanup routine.
0831ad04
GKH
193 *
194 * This routine is called normally during driver unloading or exiting.
195 */
d44890c8 196void hv_cleanup(void)
3e7ee490 197{
b8dfb264 198 union hv_x64_msr_hypercall_contents hypercall_msr;
3e7ee490 199
93e5bd06
S
200 /* Reset our OS id */
201 wrmsrl(HV_X64_MSR_GUEST_OS_ID, 0);
202
6a0aaa18 203 if (hv_context.hypercall_page) {
b8dfb264
HZ
204 hypercall_msr.as_uint64 = 0;
205 wrmsrl(HV_X64_MSR_HYPERCALL, hypercall_msr.as_uint64);
6a0aaa18
HZ
206 vfree(hv_context.hypercall_page);
207 hv_context.hypercall_page = NULL;
3e7ee490 208 }
3e7ee490
HJ
209}
210
3e189519 211/*
d44890c8 212 * hv_post_message - Post a message using the hypervisor message IPC.
0831ad04
GKH
213 *
214 * This involves a hypercall.
215 */
415f0a02 216int hv_post_message(union hv_connection_id connection_id,
b8dfb264
HZ
217 enum hv_message_type message_type,
218 void *payload, size_t payload_size)
3e7ee490 219{
b8dfb264 220 struct aligned_input {
0831ad04 221 u64 alignment8;
cba4decd 222 struct hv_input_post_message msg;
3e7ee490
HJ
223 };
224
b8dfb264 225 struct hv_input_post_message *aligned_msg;
034469e6 226 u16 status;
c4b0bc94 227 unsigned long addr;
3e7ee490 228
b8dfb264 229 if (payload_size > HV_MESSAGE_PAYLOAD_BYTE_COUNT)
39594abc 230 return -EMSGSIZE;
3e7ee490 231
b8dfb264 232 addr = (unsigned long)kmalloc(sizeof(struct aligned_input), GFP_ATOMIC);
3e7ee490 233 if (!addr)
39594abc 234 return -ENOMEM;
3e7ee490 235
b8dfb264 236 aligned_msg = (struct hv_input_post_message *)
73509681 237 (ALIGN(addr, HV_HYPERCALL_PARAM_ALIGN));
3e7ee490 238
b8dfb264
HZ
239 aligned_msg->connectionid = connection_id;
240 aligned_msg->message_type = message_type;
241 aligned_msg->payload_size = payload_size;
242 memcpy((void *)aligned_msg->payload, payload, payload_size);
3e7ee490 243
d44890c8
HZ
244 status = do_hypercall(HVCALL_POST_MESSAGE, aligned_msg, NULL)
245 & 0xFFFF;
3e7ee490 246
0831ad04 247 kfree((void *)addr);
3e7ee490
HJ
248
249 return status;
250}
251
252
3e189519 253/*
d44890c8
HZ
254 * hv_signal_event -
255 * Signal an event on the specified connection using the hypervisor event IPC.
0831ad04
GKH
256 *
257 * This involves a hypercall.
258 */
1f42248d 259u16 hv_signal_event(void *con_id)
3e7ee490 260{
034469e6 261 u16 status;
3e7ee490 262
1f42248d
S
263 status = (do_hypercall(HVCALL_SIGNAL_EVENT, con_id, NULL) & 0xFFFF);
264
3e7ee490
HJ
265 return status;
266}
267
2608fb65
JW
268
269int hv_synic_alloc(void)
270{
271 size_t size = sizeof(struct tasklet_struct);
272 int cpu;
273
274 for_each_online_cpu(cpu) {
275 hv_context.event_dpc[cpu] = kmalloc(size, GFP_ATOMIC);
276 if (hv_context.event_dpc[cpu] == NULL) {
277 pr_err("Unable to allocate event dpc\n");
278 goto err;
279 }
280 tasklet_init(hv_context.event_dpc[cpu], vmbus_on_event, cpu);
281
282 hv_context.synic_message_page[cpu] =
283 (void *)get_zeroed_page(GFP_ATOMIC);
284
285 if (hv_context.synic_message_page[cpu] == NULL) {
286 pr_err("Unable to allocate SYNIC message page\n");
287 goto err;
288 }
289
290 hv_context.synic_event_page[cpu] =
291 (void *)get_zeroed_page(GFP_ATOMIC);
292
293 if (hv_context.synic_event_page[cpu] == NULL) {
294 pr_err("Unable to allocate SYNIC event page\n");
295 goto err;
296 }
297 }
298
299 return 0;
300err:
301 return -ENOMEM;
302}
303
304void hv_synic_free_cpu(int cpu)
305{
306 kfree(hv_context.event_dpc[cpu]);
fdf91dae 307 if (hv_context.synic_event_page[cpu])
2608fb65
JW
308 free_page((unsigned long)hv_context.synic_event_page[cpu]);
309 if (hv_context.synic_message_page[cpu])
310 free_page((unsigned long)hv_context.synic_message_page[cpu]);
311}
312
313void hv_synic_free(void)
314{
315 int cpu;
316
317 for_each_online_cpu(cpu)
318 hv_synic_free_cpu(cpu);
319}
320
3e189519 321/*
d44890c8 322 * hv_synic_init - Initialize the Synthethic Interrupt Controller.
0831ad04
GKH
323 *
324 * If it is already initialized by another entity (ie x2v shim), we need to
325 * retrieve the initialized message and event pages. Otherwise, we create and
326 * initialize the message and event pages.
327 */
302a3c0f 328void hv_synic_init(void *arg)
3e7ee490 329{
0831ad04 330 u64 version;
eacb1b4d
GKH
331 union hv_synic_simp simp;
332 union hv_synic_siefp siefp;
b8dfb264 333 union hv_synic_sint shared_sint;
eacb1b4d 334 union hv_synic_scontrol sctrl;
917ea427 335 u64 vp_index;
a73e6b7c 336
7692fd4d 337 int cpu = smp_processor_id();
3e7ee490 338
6a0aaa18 339 if (!hv_context.hypercall_page)
7692fd4d 340 return;
3e7ee490 341
454f18a9 342 /* Check the version */
a51ed7d6 343 rdmsrl(HV_X64_MSR_SVERSION, version);
3e7ee490 344
a73e6b7c 345 /* Setup the Synic's message page */
f6feebe0
HZ
346 rdmsrl(HV_X64_MSR_SIMP, simp.as_uint64);
347 simp.simp_enabled = 1;
6a0aaa18 348 simp.base_simp_gpa = virt_to_phys(hv_context.synic_message_page[cpu])
a73e6b7c 349 >> PAGE_SHIFT;
3e7ee490 350
f6feebe0 351 wrmsrl(HV_X64_MSR_SIMP, simp.as_uint64);
3e7ee490 352
a73e6b7c 353 /* Setup the Synic's event page */
f6feebe0
HZ
354 rdmsrl(HV_X64_MSR_SIEFP, siefp.as_uint64);
355 siefp.siefp_enabled = 1;
6a0aaa18 356 siefp.base_siefp_gpa = virt_to_phys(hv_context.synic_event_page[cpu])
a73e6b7c
HJ
357 >> PAGE_SHIFT;
358
f6feebe0 359 wrmsrl(HV_X64_MSR_SIEFP, siefp.as_uint64);
0831ad04 360
0831ad04 361 /* Setup the shared SINT. */
b8dfb264 362 rdmsrl(HV_X64_MSR_SINT0 + VMBUS_MESSAGE_SINT, shared_sint.as_uint64);
3e7ee490 363
b8dfb264 364 shared_sint.as_uint64 = 0;
302a3c0f 365 shared_sint.vector = HYPERVISOR_CALLBACK_VECTOR;
b8dfb264 366 shared_sint.masked = false;
b0209501 367 shared_sint.auto_eoi = true;
3e7ee490 368
b8dfb264 369 wrmsrl(HV_X64_MSR_SINT0 + VMBUS_MESSAGE_SINT, shared_sint.as_uint64);
3e7ee490 370
454f18a9 371 /* Enable the global synic bit */
f6feebe0
HZ
372 rdmsrl(HV_X64_MSR_SCONTROL, sctrl.as_uint64);
373 sctrl.enable = 1;
3e7ee490 374
f6feebe0 375 wrmsrl(HV_X64_MSR_SCONTROL, sctrl.as_uint64);
3e7ee490 376
6a0aaa18 377 hv_context.synic_initialized = true;
917ea427
S
378
379 /*
380 * Setup the mapping between Hyper-V's notion
381 * of cpuid and Linux' notion of cpuid.
382 * This array will be indexed using Linux cpuid.
383 */
384 rdmsrl(HV_X64_MSR_VP_INDEX, vp_index);
385 hv_context.vp_index[cpu] = (u32)vp_index;
7692fd4d 386 return;
3e7ee490
HJ
387}
388
3e189519 389/*
d44890c8 390 * hv_synic_cleanup - Cleanup routine for hv_synic_init().
0831ad04 391 */
d44890c8 392void hv_synic_cleanup(void *arg)
3e7ee490 393{
b8dfb264 394 union hv_synic_sint shared_sint;
eacb1b4d
GKH
395 union hv_synic_simp simp;
396 union hv_synic_siefp siefp;
7692fd4d 397 int cpu = smp_processor_id();
3e7ee490 398
6a0aaa18 399 if (!hv_context.synic_initialized)
3e7ee490 400 return;
3e7ee490 401
b8dfb264 402 rdmsrl(HV_X64_MSR_SINT0 + VMBUS_MESSAGE_SINT, shared_sint.as_uint64);
3e7ee490 403
b8dfb264 404 shared_sint.masked = 1;
3e7ee490 405
7692fd4d 406 /* Need to correctly cleanup in the case of SMP!!! */
454f18a9 407 /* Disable the interrupt */
b8dfb264 408 wrmsrl(HV_X64_MSR_SINT0 + VMBUS_MESSAGE_SINT, shared_sint.as_uint64);
3e7ee490 409
f6feebe0
HZ
410 rdmsrl(HV_X64_MSR_SIMP, simp.as_uint64);
411 simp.simp_enabled = 0;
412 simp.base_simp_gpa = 0;
3e7ee490 413
f6feebe0 414 wrmsrl(HV_X64_MSR_SIMP, simp.as_uint64);
3e7ee490 415
f6feebe0
HZ
416 rdmsrl(HV_X64_MSR_SIEFP, siefp.as_uint64);
417 siefp.siefp_enabled = 0;
418 siefp.base_siefp_gpa = 0;
3e7ee490 419
f6feebe0 420 wrmsrl(HV_X64_MSR_SIEFP, siefp.as_uint64);
3e7ee490 421
df3493e0
S
422 free_page((unsigned long)hv_context.synic_message_page[cpu]);
423 free_page((unsigned long)hv_context.synic_event_page[cpu]);
3e7ee490 424}