Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp1684554pxb; Fri, 20 Nov 2020 16:33:49 -0800 (PST) X-Google-Smtp-Source: ABdhPJyp3QTclWqRHxMRNsj6wYdZQIg8Tdp2NpTSKSUTCbRcd5GCtyDfUdg2JSQbcmeke/vpURaF X-Received: by 2002:a50:950e:: with SMTP id u14mr37237775eda.260.1605918829155; Fri, 20 Nov 2020 16:33:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605918829; cv=none; d=google.com; s=arc-20160816; b=e9B9ab9xgmHoZCiKfCfsgYyJflOl29OkIBMtymVyOo0ZDPje2zovo5DEZeOqpP3KsA wpA2u522abn4MXK1rojZt7TEyneselaTZzZuWkl4qLIW4jmqKZmd8AC/qTph4xqb5RE8 toPyaletDTMG60cBO3zz7t3us67Z7ZZt4unOPt7cllQg5xjo0gfaCdr2ssXrwZ9HEWRv oxdV2GVFRB0blWS7oRoXddkLaLYw1qCeKKHGDmyjfCR0xEpdjUy0N+xax+EoraKwK/Y0 f7KKW8kCY3/QIxMlcGPtqFU6hR8rkrD7NW8LjD7zPio0X7DyxqmKmF0iQRL5aJg68RZW NOuw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from:dkim-signature:dkim-filter; bh=AMCVyNM/KQMdcwb7yqpx4jg4oyDZyHKU8w+wvG6tLp0=; b=leSpDxdhoazgjMMbpCHO1LJ4HWcz+y6lgyNc37EFRYZ2qbFtjIRSr7v+ZK846ME5f7 DwblAIvFupK/oUx+FeM7GpAAa7hRfsyMvA9jhDKThK6t7tAGG9e+25bLytrcg4kAQlIj Frf6fztQZf6lhjxXu+nqiGJ243dfxSNrAfP2GtzZBQTw+xO9tJJ6bysrt5ma5CySz+Vd hV1TYJ7P2D5mCQQyjFsoHGC1zvpFo+zsT4/RId+BNblvViDV6SHFNx7d5NRBUm9at9ha 1ZgP9Va1LsamsRMruYOTf0h1wwz73EYVbRKrU3Gd7qb1BaXW8hypPBJJEor588yGiSz5 PcFA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=HLm3bJ2X; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f9si2764927edy.248.2020.11.20.16.33.26; Fri, 20 Nov 2020 16:33:49 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=HLm3bJ2X; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729015AbgKUAa5 (ORCPT + 99 others); Fri, 20 Nov 2020 19:30:57 -0500 Received: from linux.microsoft.com ([13.77.154.182]:51186 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728571AbgKUAav (ORCPT ); Fri, 20 Nov 2020 19:30:51 -0500 Received: from linuxonhyperv3.guj3yctzbm1etfxqx2vob5hsef.xx.internal.cloudapp.net (linux.microsoft.com [13.77.154.182]) by linux.microsoft.com (Postfix) with ESMTPSA id 988A620B71D2; Fri, 20 Nov 2020 16:30:49 -0800 (PST) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 988A620B71D2 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1605918649; bh=AMCVyNM/KQMdcwb7yqpx4jg4oyDZyHKU8w+wvG6tLp0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=HLm3bJ2XtR2DjfXPWMTOC2WS19idt8F8b791ILPt7MUASV0C3AoqmnJhfzliLyWQ/ u+nV2iGn+h4S25WrF+hFiRw+mCIxdCqyiLfoVpxNjIayVpb8HPBmWn9dPek9yjvMT+ JE1qw5rbzGb433Pr3PpdqP1UYjKLVP+GwupF/URg= From: Nuno Das Neves To: linux-hyperv@vger.kernel.org Cc: virtualization@lists.linux-foundation.org, linux-kernel@vger.kernel.org, mikelley@microsoft.com, viremana@linux.microsoft.com, sunilmut@microsoft.com, nunodasneves@linux.microsoft.com, wei.liu@kernel.org, ligrassi@microsoft.com, kys@microsoft.com Subject: [RFC PATCH 04/18] virt/mshv: request version ioctl Date: Fri, 20 Nov 2020 16:30:23 -0800 Message-Id: <1605918637-12192-5-git-send-email-nunodasneves@linux.microsoft.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1605918637-12192-1-git-send-email-nunodasneves@linux.microsoft.com> References: <1605918637-12192-1-git-send-email-nunodasneves@linux.microsoft.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Reserve ioctl number in userpsace-api/ioctl/ioctl-number.rst Introduce MSHV_REQUEST_VERSION ioctl. Introduce documentation for /dev/mshv in Documentation/virt/mshv Signed-off-by: Nuno Das Neves --- .../userspace-api/ioctl/ioctl-number.rst | 2 + Documentation/virt/mshv/api.rst | 62 +++++++++++++++++++ include/linux/mshv.h | 11 ++++ include/uapi/linux/mshv.h | 19 ++++++ virt/mshv/mshv_main.c | 49 +++++++++++++++ 5 files changed, 143 insertions(+) create mode 100644 Documentation/virt/mshv/api.rst create mode 100644 include/linux/mshv.h create mode 100644 include/uapi/linux/mshv.h diff --git a/Documentation/userspace-api/ioctl/ioctl-number.rst b/Documentation/userspace-api/ioctl/ioctl-number.rst index 55a2d9b2ce33..13a4d3ecafca 100644 --- a/Documentation/userspace-api/ioctl/ioctl-number.rst +++ b/Documentation/userspace-api/ioctl/ioctl-number.rst @@ -343,6 +343,8 @@ Code Seq# Include File Comments 0xB5 00-0F uapi/linux/rpmsg.h 0xB6 all linux/fpga-dfl.h 0xB7 all uapi/linux/remoteproc_cdev.h +0xB8 all uapi/linux/mshv.h Microsoft Hypervisor root partition APIs + 0xC0 00-0F linux/usb/iowarrior.h 0xCA 00-0F uapi/misc/cxl.h 0xCA 10-2F uapi/misc/ocxl.h diff --git a/Documentation/virt/mshv/api.rst b/Documentation/virt/mshv/api.rst new file mode 100644 index 000000000000..82e32de48d03 --- /dev/null +++ b/Documentation/virt/mshv/api.rst @@ -0,0 +1,62 @@ +.. SPDX-License-Identifier: GPL-2.0 + +===================================================== +Microsoft Hypervisor Root Partition API Documentation +===================================================== + +1. Overview +=========== + +This document describes APIs for creating and managing guest virtual machines +when running Linux as the root partition on the Microsoft Hypervisor. + +This API is not yet stable. + +2. Glossary/Terms +================= + +hv +-- +Short for Hyper-V. This name is used in the kernel to describe interfaces to +the Microsoft Hypervisor. + +mshv +---- +Short for Microsoft Hypervisor. This is the name of the userland API module +described in this document. + +Partition +--------- +A virtual machine running on the Microsoft Hypervisor. + +Root Partition +-------------- +The partition that is created and assumes control when the machine boots. The +root partition can use mshv APIs to create guest partitions. + +3. API description +================== + +The module is named mshv and can be configured with CONFIG_HYPERV_ROOT_API. + +Mshv is file descriptor-based, following a similar pattern to KVM. + +To get a handle to the mshv driver, use open("/dev/mshv"). + +3.1 MSHV_REQUEST_VERSION +------------------------ +:Type: /dev/mshv ioctl +:Parameters: pointer to a u32 +:Returns: 0 on success + +Before issuing any other ioctls, a MSHV_REQUEST_VERSION ioctl must be called to +establish the interface version with the kernel module. + +The caller should pass the MSHV_VERSION as an argument. + +The kernel module will check which interface versions it supports and return 0 +if one of them matches. + +This /dev/mshv file descriptor will remain 'locked' to that version as long as +it is open - this ioctl can only be called once per open. + diff --git a/include/linux/mshv.h b/include/linux/mshv.h new file mode 100644 index 000000000000..a0982fe2c0b8 --- /dev/null +++ b/include/linux/mshv.h @@ -0,0 +1,11 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +#ifndef _LINUX_MSHV_H +#define _LINUX_MSHV_H + +/* + * Microsoft Hypervisor root partition driver for /dev/mshv + */ + +#include + +#endif diff --git a/include/uapi/linux/mshv.h b/include/uapi/linux/mshv.h new file mode 100644 index 000000000000..dd30fc2f0a80 --- /dev/null +++ b/include/uapi/linux/mshv.h @@ -0,0 +1,19 @@ +/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ +#ifndef _UAPI_LINUX_MSHV_H +#define _UAPI_LINUX_MSHV_H + +/* + * Userspace interface for /dev/mshv + * Microsoft Hypervisor root partition APIs + */ + +#include + +#define MSHV_VERSION 0x0 + +#define MSHV_IOCTL 0xB8 + +/* mshv device */ +#define MSHV_REQUEST_VERSION _IOW(MSHV_IOCTL, 0x00, __u32) + +#endif diff --git a/virt/mshv/mshv_main.c b/virt/mshv/mshv_main.c index ecb9089761fe..62f631f85301 100644 --- a/virt/mshv/mshv_main.c +++ b/virt/mshv/mshv_main.c @@ -11,25 +11,74 @@ #include #include #include +#include +#include MODULE_AUTHOR("Microsoft"); MODULE_LICENSE("GPL"); +#define MSHV_INVALID_VERSION 0xFFFFFFFF +#define MSHV_CURRENT_VERSION MSHV_VERSION + +static u32 supported_versions[] = { + MSHV_CURRENT_VERSION, +}; + +static long +mshv_ioctl_request_version(u32 *version, void __user *user_arg) +{ + u32 arg; + int i; + + if (copy_from_user(&arg, user_arg, sizeof(arg))) + return -EFAULT; + + for (i = 0; i < ARRAY_SIZE(supported_versions); ++i) { + if (supported_versions[i] == arg) { + *version = supported_versions[i]; + return 0; + } + } + return -ENOTSUPP; +} + static long mshv_dev_ioctl(struct file *filp, unsigned int ioctl, unsigned long arg) { + u32 *version = (u32 *)filp->private_data; + + if (ioctl == MSHV_REQUEST_VERSION) { + /* Version can only be set once */ + if (*version != MSHV_INVALID_VERSION) + return -EBADFD; + + return mshv_ioctl_request_version(version, (void __user *)arg); + } + + /* Version must be set before other ioctls can be called */ + if (*version == MSHV_INVALID_VERSION) + return -EBADFD; + + /* TODO other ioctls */ + return -ENOTTY; } static int mshv_dev_open(struct inode *inode, struct file *filp) { + filp->private_data = kmalloc(sizeof(u32), GFP_KERNEL); + if (!filp->private_data) + return -ENOMEM; + *(u32 *)filp->private_data = MSHV_INVALID_VERSION; + return 0; } static int mshv_dev_release(struct inode *inode, struct file *filp) { + kfree(filp->private_data); return 0; } -- 2.25.1