ACPI: thinkpad-acpi: add development version tag
[linux-2.6/linux-acpi-2.6/ibm-acpi-2.6.git] / drivers / staging / hv / Hv.c
blobb12237f90db24e1e63a2013af0b57a1d130b7b96
1 /*
2 * Copyright (c) 2009, Microsoft Corporation.
4 * This program is free software; you can redistribute it and/or modify it
5 * under the terms and conditions of the GNU General Public License,
6 * version 2, as published by the Free Software Foundation.
8 * This program is distributed in the hope it will be useful, but WITHOUT
9 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
10 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
11 * more details.
13 * You should have received a copy of the GNU General Public License along with
14 * this program; if not, write to the Free Software Foundation, Inc., 59 Temple
15 * Place - Suite 330, Boston, MA 02111-1307 USA.
17 * Authors:
18 * Haiyang Zhang <haiyangz@microsoft.com>
19 * Hank Janssen <hjanssen@microsoft.com>
22 #include <linux/kernel.h>
23 #include <linux/mm.h>
24 #include <linux/vmalloc.h>
25 #include "osd.h"
26 #include "logging.h"
27 #include "VmbusPrivate.h"
29 /* The one and only */
30 struct hv_context gHvContext = {
31 .SynICInitialized = false,
32 .HypercallPage = NULL,
33 .SignalEventParam = NULL,
34 .SignalEventBuffer = NULL,
37 /**
38 * HvQueryHypervisorPresence - Query the cpuid for presense of windows hypervisor
40 static int HvQueryHypervisorPresence(void)
42 unsigned int eax;
43 unsigned int ebx;
44 unsigned int ecx;
45 unsigned int edx;
46 unsigned int op;
48 eax = 0;
49 ebx = 0;
50 ecx = 0;
51 edx = 0;
52 op = HvCpuIdFunctionVersionAndFeatures;
53 cpuid(op, &eax, &ebx, &ecx, &edx);
55 return ecx & HV_PRESENT_BIT;
58 /**
59 * HvQueryHypervisorInfo - Get version info of the windows hypervisor
61 static int HvQueryHypervisorInfo(void)
63 unsigned int eax;
64 unsigned int ebx;
65 unsigned int ecx;
66 unsigned int edx;
67 unsigned int maxLeaf;
68 unsigned int op;
71 * Its assumed that this is called after confirming that Viridian
72 * is present. Query id and revision.
74 eax = 0;
75 ebx = 0;
76 ecx = 0;
77 edx = 0;
78 op = HvCpuIdFunctionHvVendorAndMaxFunction;
79 cpuid(op, &eax, &ebx, &ecx, &edx);
81 DPRINT_INFO(VMBUS, "Vendor ID: %c%c%c%c%c%c%c%c%c%c%c%c",
82 (ebx & 0xFF),
83 ((ebx >> 8) & 0xFF),
84 ((ebx >> 16) & 0xFF),
85 ((ebx >> 24) & 0xFF),
86 (ecx & 0xFF),
87 ((ecx >> 8) & 0xFF),
88 ((ecx >> 16) & 0xFF),
89 ((ecx >> 24) & 0xFF),
90 (edx & 0xFF),
91 ((edx >> 8) & 0xFF),
92 ((edx >> 16) & 0xFF),
93 ((edx >> 24) & 0xFF));
95 maxLeaf = eax;
96 eax = 0;
97 ebx = 0;
98 ecx = 0;
99 edx = 0;
100 op = HvCpuIdFunctionHvInterface;
101 cpuid(op, &eax, &ebx, &ecx, &edx);
103 DPRINT_INFO(VMBUS, "Interface ID: %c%c%c%c",
104 (eax & 0xFF),
105 ((eax >> 8) & 0xFF),
106 ((eax >> 16) & 0xFF),
107 ((eax >> 24) & 0xFF));
109 if (maxLeaf >= HvCpuIdFunctionMsHvVersion) {
110 eax = 0;
111 ebx = 0;
112 ecx = 0;
113 edx = 0;
114 op = HvCpuIdFunctionMsHvVersion;
115 cpuid(op, &eax, &ebx, &ecx, &edx);
116 DPRINT_INFO(VMBUS, "OS Build:%d-%d.%d-%d-%d.%d",\
117 eax,
118 ebx >> 16,
119 ebx & 0xFFFF,
120 ecx,
121 edx >> 24,
122 edx & 0xFFFFFF);
124 return maxLeaf;
128 * HvDoHypercall - Invoke the specified hypercall
130 static u64 HvDoHypercall(u64 Control, void *Input, void *Output)
132 #ifdef CONFIG_X86_64
133 u64 hvStatus = 0;
134 u64 inputAddress = (Input) ? virt_to_phys(Input) : 0;
135 u64 outputAddress = (Output) ? virt_to_phys(Output) : 0;
136 volatile void *hypercallPage = gHvContext.HypercallPage;
138 DPRINT_DBG(VMBUS, "Hypercall <control %llx input phys %llx virt %p "
139 "output phys %llx virt %p hypercall %p>",
140 Control, inputAddress, Input,
141 outputAddress, Output, hypercallPage);
143 __asm__ __volatile__("mov %0, %%r8" : : "r" (outputAddress) : "r8");
144 __asm__ __volatile__("call *%3" : "=a" (hvStatus) :
145 "c" (Control), "d" (inputAddress),
146 "m" (hypercallPage));
148 DPRINT_DBG(VMBUS, "Hypercall <return %llx>", hvStatus);
150 return hvStatus;
152 #else
154 u32 controlHi = Control >> 32;
155 u32 controlLo = Control & 0xFFFFFFFF;
156 u32 hvStatusHi = 1;
157 u32 hvStatusLo = 1;
158 u64 inputAddress = (Input) ? virt_to_phys(Input) : 0;
159 u32 inputAddressHi = inputAddress >> 32;
160 u32 inputAddressLo = inputAddress & 0xFFFFFFFF;
161 u64 outputAddress = (Output) ? virt_to_phys(Output) : 0;
162 u32 outputAddressHi = outputAddress >> 32;
163 u32 outputAddressLo = outputAddress & 0xFFFFFFFF;
164 volatile void *hypercallPage = gHvContext.HypercallPage;
166 DPRINT_DBG(VMBUS, "Hypercall <control %llx input %p output %p>",
167 Control, Input, Output);
169 __asm__ __volatile__ ("call *%8" : "=d"(hvStatusHi),
170 "=a"(hvStatusLo) : "d" (controlHi),
171 "a" (controlLo), "b" (inputAddressHi),
172 "c" (inputAddressLo), "D"(outputAddressHi),
173 "S"(outputAddressLo), "m" (hypercallPage));
175 DPRINT_DBG(VMBUS, "Hypercall <return %llx>",
176 hvStatusLo | ((u64)hvStatusHi << 32));
178 return hvStatusLo | ((u64)hvStatusHi << 32);
179 #endif /* !x86_64 */
183 * HvInit - Main initialization routine.
185 * This routine must be called before any other routines in here are called
187 int HvInit(void)
189 int ret = 0;
190 int maxLeaf;
191 union hv_x64_msr_hypercall_contents hypercallMsr;
192 void *virtAddr = NULL;
194 DPRINT_ENTER(VMBUS);
196 memset(gHvContext.synICEventPage, 0, sizeof(void *) * MAX_NUM_CPUS);
197 memset(gHvContext.synICMessagePage, 0, sizeof(void *) * MAX_NUM_CPUS);
199 if (!HvQueryHypervisorPresence()) {
200 DPRINT_ERR(VMBUS, "No Windows hypervisor detected!!");
201 goto Cleanup;
204 DPRINT_INFO(VMBUS,
205 "Windows hypervisor detected! Retrieving more info...");
207 maxLeaf = HvQueryHypervisorInfo();
208 /* HvQueryHypervisorFeatures(maxLeaf); */
211 * Determine if we are running on xenlinux (ie x2v shim) or native
212 * linux
214 rdmsrl(HV_X64_MSR_GUEST_OS_ID, gHvContext.GuestId);
215 if (gHvContext.GuestId == 0) {
216 /* Write our OS info */
217 wrmsrl(HV_X64_MSR_GUEST_OS_ID, HV_LINUX_GUEST_ID);
218 gHvContext.GuestId = HV_LINUX_GUEST_ID;
221 /* See if the hypercall page is already set */
222 rdmsrl(HV_X64_MSR_HYPERCALL, hypercallMsr.AsUINT64);
223 if (gHvContext.GuestId == HV_LINUX_GUEST_ID) {
224 /* Allocate the hypercall page memory */
225 /* virtAddr = osd_PageAlloc(1); */
226 virtAddr = osd_VirtualAllocExec(PAGE_SIZE);
228 if (!virtAddr) {
229 DPRINT_ERR(VMBUS,
230 "unable to allocate hypercall page!!");
231 goto Cleanup;
234 hypercallMsr.Enable = 1;
235 /* hypercallMsr.GuestPhysicalAddress =
236 * virt_to_phys(virtAddr) >> PAGE_SHIFT; */
237 hypercallMsr.GuestPhysicalAddress = vmalloc_to_pfn(virtAddr);
238 wrmsrl(HV_X64_MSR_HYPERCALL, hypercallMsr.AsUINT64);
240 /* Confirm that hypercall page did get setup. */
241 hypercallMsr.AsUINT64 = 0;
242 rdmsrl(HV_X64_MSR_HYPERCALL, hypercallMsr.AsUINT64);
243 if (!hypercallMsr.Enable) {
244 DPRINT_ERR(VMBUS, "unable to set hypercall page!!");
245 goto Cleanup;
248 gHvContext.HypercallPage = virtAddr;
249 } else {
250 DPRINT_ERR(VMBUS, "Unknown guest id (0x%llx)!!",
251 gHvContext.GuestId);
252 goto Cleanup;
255 DPRINT_INFO(VMBUS, "Hypercall page VA=%p, PA=0x%0llx",
256 gHvContext.HypercallPage,
257 (u64)hypercallMsr.GuestPhysicalAddress << PAGE_SHIFT);
259 /* Setup the global signal event param for the signal event hypercall */
260 gHvContext.SignalEventBuffer =
261 kmalloc(sizeof(struct hv_input_signal_event_buffer),
262 GFP_KERNEL);
263 if (!gHvContext.SignalEventBuffer)
264 goto Cleanup;
266 gHvContext.SignalEventParam =
267 (struct hv_input_signal_event *)
268 (ALIGN_UP((unsigned long)gHvContext.SignalEventBuffer,
269 HV_HYPERCALL_PARAM_ALIGN));
270 gHvContext.SignalEventParam->ConnectionId.Asu32 = 0;
271 gHvContext.SignalEventParam->ConnectionId.u.Id =
272 VMBUS_EVENT_CONNECTION_ID;
273 gHvContext.SignalEventParam->FlagNumber = 0;
274 gHvContext.SignalEventParam->RsvdZ = 0;
276 /* DPRINT_DBG(VMBUS, "My id %llu", HvGetCurrentPartitionId()); */
278 DPRINT_EXIT(VMBUS);
280 return ret;
282 Cleanup:
283 if (virtAddr) {
284 if (hypercallMsr.Enable) {
285 hypercallMsr.AsUINT64 = 0;
286 wrmsrl(HV_X64_MSR_HYPERCALL, hypercallMsr.AsUINT64);
289 vfree(virtAddr);
291 ret = -1;
292 DPRINT_EXIT(VMBUS);
294 return ret;
298 * HvCleanup - Cleanup routine.
300 * This routine is called normally during driver unloading or exiting.
302 void HvCleanup(void)
304 union hv_x64_msr_hypercall_contents hypercallMsr;
306 DPRINT_ENTER(VMBUS);
308 if (gHvContext.SignalEventBuffer) {
309 kfree(gHvContext.SignalEventBuffer);
310 gHvContext.SignalEventBuffer = NULL;
311 gHvContext.SignalEventParam = NULL;
314 if (gHvContext.GuestId == HV_LINUX_GUEST_ID) {
315 if (gHvContext.HypercallPage) {
316 hypercallMsr.AsUINT64 = 0;
317 wrmsrl(HV_X64_MSR_HYPERCALL, hypercallMsr.AsUINT64);
318 vfree(gHvContext.HypercallPage);
319 gHvContext.HypercallPage = NULL;
323 DPRINT_EXIT(VMBUS);
328 * HvPostMessage - Post a message using the hypervisor message IPC.
330 * This involves a hypercall.
332 u16 HvPostMessage(union hv_connection_id connectionId,
333 enum hv_message_type messageType,
334 void *payload, size_t payloadSize)
336 struct alignedInput {
337 u64 alignment8;
338 struct hv_input_post_message msg;
341 struct hv_input_post_message *alignedMsg;
342 u16 status;
343 unsigned long addr;
345 if (payloadSize > HV_MESSAGE_PAYLOAD_BYTE_COUNT)
346 return -1;
348 addr = (unsigned long)kmalloc(sizeof(struct alignedInput), GFP_ATOMIC);
349 if (!addr)
350 return -1;
352 alignedMsg = (struct hv_input_post_message *)
353 (ALIGN_UP(addr, HV_HYPERCALL_PARAM_ALIGN));
355 alignedMsg->ConnectionId = connectionId;
356 alignedMsg->MessageType = messageType;
357 alignedMsg->PayloadSize = payloadSize;
358 memcpy((void *)alignedMsg->Payload, payload, payloadSize);
360 status = HvDoHypercall(HvCallPostMessage, alignedMsg, NULL) & 0xFFFF;
362 kfree((void *)addr);
364 return status;
369 * HvSignalEvent - Signal an event on the specified connection using the hypervisor event IPC.
371 * This involves a hypercall.
373 u16 HvSignalEvent(void)
375 u16 status;
377 status = HvDoHypercall(HvCallSignalEvent, gHvContext.SignalEventParam,
378 NULL) & 0xFFFF;
379 return status;
383 * HvSynicInit - Initialize the Synthethic Interrupt Controller.
385 * If it is already initialized by another entity (ie x2v shim), we need to
386 * retrieve the initialized message and event pages. Otherwise, we create and
387 * initialize the message and event pages.
389 void HvSynicInit(void *irqarg)
391 u64 version;
392 union hv_synic_simp simp;
393 union hv_synic_siefp siefp;
394 union hv_synic_sint sharedSint;
395 union hv_synic_scontrol sctrl;
396 u64 guestID;
397 u32 irqVector = *((u32 *)(irqarg));
398 int cpu = smp_processor_id();
400 DPRINT_ENTER(VMBUS);
402 if (!gHvContext.HypercallPage) {
403 DPRINT_EXIT(VMBUS);
404 return;
407 /* Check the version */
408 rdmsrl(HV_X64_MSR_SVERSION, version);
410 DPRINT_INFO(VMBUS, "SynIC version: %llx", version);
412 /* TODO: Handle SMP */
413 if (gHvContext.GuestId == HV_XENLINUX_GUEST_ID) {
414 DPRINT_INFO(VMBUS, "Skipping SIMP and SIEFP setup since "
415 "it is already set.");
417 rdmsrl(HV_X64_MSR_SIMP, simp.AsUINT64);
418 rdmsrl(HV_X64_MSR_SIEFP, siefp.AsUINT64);
420 DPRINT_DBG(VMBUS, "Simp: %llx, Sifep: %llx",
421 simp.AsUINT64, siefp.AsUINT64);
424 * Determine if we are running on xenlinux (ie x2v shim) or
425 * native linux
427 rdmsrl(HV_X64_MSR_GUEST_OS_ID, guestID);
428 if (guestID == HV_LINUX_GUEST_ID) {
429 gHvContext.synICMessagePage[cpu] =
430 phys_to_virt(simp.BaseSimpGpa << PAGE_SHIFT);
431 gHvContext.synICEventPage[cpu] =
432 phys_to_virt(siefp.BaseSiefpGpa << PAGE_SHIFT);
433 } else {
434 DPRINT_ERR(VMBUS, "unknown guest id!!");
435 goto Cleanup;
437 DPRINT_DBG(VMBUS, "MAPPED: Simp: %p, Sifep: %p",
438 gHvContext.synICMessagePage[cpu],
439 gHvContext.synICEventPage[cpu]);
440 } else {
441 gHvContext.synICMessagePage[cpu] = (void *)get_zeroed_page(GFP_ATOMIC);
442 if (gHvContext.synICMessagePage[cpu] == NULL) {
443 DPRINT_ERR(VMBUS,
444 "unable to allocate SYNIC message page!!");
445 goto Cleanup;
448 gHvContext.synICEventPage[cpu] = (void *)get_zeroed_page(GFP_ATOMIC);
449 if (gHvContext.synICEventPage[cpu] == NULL) {
450 DPRINT_ERR(VMBUS,
451 "unable to allocate SYNIC event page!!");
452 goto Cleanup;
455 /* Setup the Synic's message page */
456 rdmsrl(HV_X64_MSR_SIMP, simp.AsUINT64);
457 simp.SimpEnabled = 1;
458 simp.BaseSimpGpa = virt_to_phys(gHvContext.synICMessagePage[cpu])
459 >> PAGE_SHIFT;
461 DPRINT_DBG(VMBUS, "HV_X64_MSR_SIMP msr set to: %llx",
462 simp.AsUINT64);
464 wrmsrl(HV_X64_MSR_SIMP, simp.AsUINT64);
466 /* Setup the Synic's event page */
467 rdmsrl(HV_X64_MSR_SIEFP, siefp.AsUINT64);
468 siefp.SiefpEnabled = 1;
469 siefp.BaseSiefpGpa = virt_to_phys(gHvContext.synICEventPage[cpu])
470 >> PAGE_SHIFT;
472 DPRINT_DBG(VMBUS, "HV_X64_MSR_SIEFP msr set to: %llx",
473 siefp.AsUINT64);
475 wrmsrl(HV_X64_MSR_SIEFP, siefp.AsUINT64);
478 /* Setup the interception SINT. */
479 /* wrmsrl((HV_X64_MSR_SINT0 + HV_SYNIC_INTERCEPTION_SINT_INDEX), */
480 /* interceptionSint.AsUINT64); */
482 /* Setup the shared SINT. */
483 rdmsrl(HV_X64_MSR_SINT0 + VMBUS_MESSAGE_SINT, sharedSint.AsUINT64);
485 sharedSint.AsUINT64 = 0;
486 sharedSint.Vector = irqVector; /* HV_SHARED_SINT_IDT_VECTOR + 0x20; */
487 sharedSint.Masked = false;
488 sharedSint.AutoEoi = true;
490 DPRINT_DBG(VMBUS, "HV_X64_MSR_SINT1 msr set to: %llx",
491 sharedSint.AsUINT64);
493 wrmsrl(HV_X64_MSR_SINT0 + VMBUS_MESSAGE_SINT, sharedSint.AsUINT64);
495 /* Enable the global synic bit */
496 rdmsrl(HV_X64_MSR_SCONTROL, sctrl.AsUINT64);
497 sctrl.Enable = 1;
499 wrmsrl(HV_X64_MSR_SCONTROL, sctrl.AsUINT64);
501 gHvContext.SynICInitialized = true;
503 DPRINT_EXIT(VMBUS);
505 return;
507 Cleanup:
508 if (gHvContext.GuestId == HV_LINUX_GUEST_ID) {
509 if (gHvContext.synICEventPage[cpu])
510 osd_PageFree(gHvContext.synICEventPage[cpu], 1);
512 if (gHvContext.synICMessagePage[cpu])
513 osd_PageFree(gHvContext.synICMessagePage[cpu], 1);
516 DPRINT_EXIT(VMBUS);
517 return;
521 * HvSynicCleanup - Cleanup routine for HvSynicInit().
523 void HvSynicCleanup(void *arg)
525 union hv_synic_sint sharedSint;
526 union hv_synic_simp simp;
527 union hv_synic_siefp siefp;
528 int cpu = smp_processor_id();
530 DPRINT_ENTER(VMBUS);
532 if (!gHvContext.SynICInitialized) {
533 DPRINT_EXIT(VMBUS);
534 return;
537 rdmsrl(HV_X64_MSR_SINT0 + VMBUS_MESSAGE_SINT, sharedSint.AsUINT64);
539 sharedSint.Masked = 1;
541 /* Need to correctly cleanup in the case of SMP!!! */
542 /* Disable the interrupt */
543 wrmsrl(HV_X64_MSR_SINT0 + VMBUS_MESSAGE_SINT, sharedSint.AsUINT64);
546 * Disable and free the resources only if we are running as
547 * native linux since in xenlinux, we are sharing the
548 * resources with the x2v shim
550 if (gHvContext.GuestId == HV_LINUX_GUEST_ID) {
551 rdmsrl(HV_X64_MSR_SIMP, simp.AsUINT64);
552 simp.SimpEnabled = 0;
553 simp.BaseSimpGpa = 0;
555 wrmsrl(HV_X64_MSR_SIMP, simp.AsUINT64);
557 rdmsrl(HV_X64_MSR_SIEFP, siefp.AsUINT64);
558 siefp.SiefpEnabled = 0;
559 siefp.BaseSiefpGpa = 0;
561 wrmsrl(HV_X64_MSR_SIEFP, siefp.AsUINT64);
563 osd_PageFree(gHvContext.synICMessagePage[cpu], 1);
564 osd_PageFree(gHvContext.synICEventPage[cpu], 1);
567 DPRINT_EXIT(VMBUS);