1 /* 2 * 3 * Copyright (c) 2011, Microsoft Corporation. 4 * 5 * This program is free software; you can redistribute it and/or modify it 6 * under the terms and conditions of the GNU General Public License, 7 * version 2, as published by the Free Software Foundation. 8 * 9 * This program is distributed in the hope it will be useful, but WITHOUT 10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for 12 * more details. 13 * 14 * You should have received a copy of the GNU General Public License along with 15 * this program; if not, write to the Free Software Foundation, Inc., 59 Temple 16 * Place - Suite 330, Boston, MA 02111-1307 USA. 17 * 18 * Authors: 19 * Haiyang Zhang <haiyangz@microsoft.com> 20 * Hank Janssen <hjanssen@microsoft.com> 21 * K. Y. Srinivasan <kys@microsoft.com> 22 * 23 */ 24 25 #ifndef _HYPERV_VMBUS_H 26 #define _HYPERV_VMBUS_H 27 28 #include <linux/list.h> 29 #include <asm/sync_bitops.h> 30 #include <linux/atomic.h> 31 #include <linux/hyperv.h> 32 33 /* 34 * Timeout for services such as KVP and fcopy. 35 */ 36 #define HV_UTIL_TIMEOUT 30 37 38 /* 39 * Timeout for guest-host handshake for services. 40 */ 41 #define HV_UTIL_NEGO_TIMEOUT 60 42 43 /* 44 * The below CPUID leaves are present if VersionAndFeatures.HypervisorPresent 45 * is set by CPUID(HVCPUID_VERSION_FEATURES). 46 */ 47 enum hv_cpuid_function { 48 HVCPUID_VERSION_FEATURES = 0x00000001, 49 HVCPUID_VENDOR_MAXFUNCTION = 0x40000000, 50 HVCPUID_INTERFACE = 0x40000001, 51 52 /* 53 * The remaining functions depend on the value of 54 * HVCPUID_INTERFACE 55 */ 56 HVCPUID_VERSION = 0x40000002, 57 HVCPUID_FEATURES = 0x40000003, 58 HVCPUID_ENLIGHTENMENT_INFO = 0x40000004, 59 HVCPUID_IMPLEMENTATION_LIMITS = 0x40000005, 60 }; 61 62 #define HV_FEATURE_GUEST_CRASH_MSR_AVAILABLE 0x400 63 64 #define HV_X64_MSR_CRASH_P0 0x40000100 65 #define HV_X64_MSR_CRASH_P1 0x40000101 66 #define HV_X64_MSR_CRASH_P2 0x40000102 67 #define HV_X64_MSR_CRASH_P3 0x40000103 68 #define HV_X64_MSR_CRASH_P4 0x40000104 69 #define HV_X64_MSR_CRASH_CTL 0x40000105 70 71 #define HV_CRASH_CTL_CRASH_NOTIFY (1ULL << 63) 72 73 /* Define version of the synthetic interrupt controller. */ 74 #define HV_SYNIC_VERSION (1) 75 76 #define HV_ANY_VP (0xFFFFFFFF) 77 78 /* Define synthetic interrupt controller flag constants. */ 79 #define HV_EVENT_FLAGS_COUNT (256 * 8) 80 #define HV_EVENT_FLAGS_BYTE_COUNT (256) 81 #define HV_EVENT_FLAGS_DWORD_COUNT (256 / sizeof(u32)) 82 83 /* Define invalid partition identifier. */ 84 #define HV_PARTITION_ID_INVALID ((u64)0x0) 85 86 /* Define port type. */ 87 enum hv_port_type { 88 HVPORT_MSG = 1, 89 HVPORT_EVENT = 2, 90 HVPORT_MONITOR = 3 91 }; 92 93 /* Define port information structure. */ 94 struct hv_port_info { 95 enum hv_port_type port_type; 96 u32 padding; 97 union { 98 struct { 99 u32 target_sint; 100 u32 target_vp; 101 u64 rsvdz; 102 } message_port_info; 103 struct { 104 u32 target_sint; 105 u32 target_vp; 106 u16 base_flag_number; 107 u16 flag_count; 108 u32 rsvdz; 109 } event_port_info; 110 struct { 111 u64 monitor_address; 112 u64 rsvdz; 113 } monitor_port_info; 114 }; 115 }; 116 117 struct hv_connection_info { 118 enum hv_port_type port_type; 119 u32 padding; 120 union { 121 struct { 122 u64 rsvdz; 123 } message_connection_info; 124 struct { 125 u64 rsvdz; 126 } event_connection_info; 127 struct { 128 u64 monitor_address; 129 } monitor_connection_info; 130 }; 131 }; 132 133 /* 134 * Timer configuration register. 135 */ 136 union hv_timer_config { 137 u64 as_uint64; 138 struct { 139 u64 enable:1; 140 u64 periodic:1; 141 u64 lazy:1; 142 u64 auto_enable:1; 143 u64 reserved_z0:12; 144 u64 sintx:4; 145 u64 reserved_z1:44; 146 }; 147 }; 148 149 /* Define the number of message buffers associated with each port. */ 150 #define HV_PORT_MESSAGE_BUFFER_COUNT (16) 151 152 /* Define the synthetic interrupt controller event flags format. */ 153 union hv_synic_event_flags { 154 u8 flags8[HV_EVENT_FLAGS_BYTE_COUNT]; 155 u32 flags32[HV_EVENT_FLAGS_DWORD_COUNT]; 156 }; 157 158 /* Define the synthetic interrupt flags page layout. */ 159 struct hv_synic_event_flags_page { 160 union hv_synic_event_flags sintevent_flags[HV_SYNIC_SINT_COUNT]; 161 }; 162 163 /* Define SynIC control register. */ 164 union hv_synic_scontrol { 165 u64 as_uint64; 166 struct { 167 u64 enable:1; 168 u64 reserved:63; 169 }; 170 }; 171 172 /* Define synthetic interrupt source. */ 173 union hv_synic_sint { 174 u64 as_uint64; 175 struct { 176 u64 vector:8; 177 u64 reserved1:8; 178 u64 masked:1; 179 u64 auto_eoi:1; 180 u64 reserved2:46; 181 }; 182 }; 183 184 /* Define the format of the SIMP register */ 185 union hv_synic_simp { 186 u64 as_uint64; 187 struct { 188 u64 simp_enabled:1; 189 u64 preserved:11; 190 u64 base_simp_gpa:52; 191 }; 192 }; 193 194 /* Define the format of the SIEFP register */ 195 union hv_synic_siefp { 196 u64 as_uint64; 197 struct { 198 u64 siefp_enabled:1; 199 u64 preserved:11; 200 u64 base_siefp_gpa:52; 201 }; 202 }; 203 204 /* Definitions for the monitored notification facility */ 205 union hv_monitor_trigger_group { 206 u64 as_uint64; 207 struct { 208 u32 pending; 209 u32 armed; 210 }; 211 }; 212 213 struct hv_monitor_parameter { 214 union hv_connection_id connectionid; 215 u16 flagnumber; 216 u16 rsvdz; 217 }; 218 219 union hv_monitor_trigger_state { 220 u32 asu32; 221 222 struct { 223 u32 group_enable:4; 224 u32 rsvdz:28; 225 }; 226 }; 227 228 /* struct hv_monitor_page Layout */ 229 /* ------------------------------------------------------ */ 230 /* | 0 | TriggerState (4 bytes) | Rsvd1 (4 bytes) | */ 231 /* | 8 | TriggerGroup[0] | */ 232 /* | 10 | TriggerGroup[1] | */ 233 /* | 18 | TriggerGroup[2] | */ 234 /* | 20 | TriggerGroup[3] | */ 235 /* | 28 | Rsvd2[0] | */ 236 /* | 30 | Rsvd2[1] | */ 237 /* | 38 | Rsvd2[2] | */ 238 /* | 40 | NextCheckTime[0][0] | NextCheckTime[0][1] | */ 239 /* | ... | */ 240 /* | 240 | Latency[0][0..3] | */ 241 /* | 340 | Rsvz3[0] | */ 242 /* | 440 | Parameter[0][0] | */ 243 /* | 448 | Parameter[0][1] | */ 244 /* | ... | */ 245 /* | 840 | Rsvd4[0] | */ 246 /* ------------------------------------------------------ */ 247 struct hv_monitor_page { 248 union hv_monitor_trigger_state trigger_state; 249 u32 rsvdz1; 250 251 union hv_monitor_trigger_group trigger_group[4]; 252 u64 rsvdz2[3]; 253 254 s32 next_checktime[4][32]; 255 256 u16 latency[4][32]; 257 u64 rsvdz3[32]; 258 259 struct hv_monitor_parameter parameter[4][32]; 260 261 u8 rsvdz4[1984]; 262 }; 263 264 /* Definition of the hv_post_message hypercall input structure. */ 265 struct hv_input_post_message { 266 union hv_connection_id connectionid; 267 u32 reserved; 268 u32 message_type; 269 u32 payload_size; 270 u64 payload[HV_MESSAGE_PAYLOAD_QWORD_COUNT]; 271 }; 272 273 /* 274 * Versioning definitions used for guests reporting themselves to the 275 * hypervisor, and visa versa. 276 */ 277 278 /* Version info reported by guest OS's */ 279 enum hv_guest_os_vendor { 280 HVGUESTOS_VENDOR_MICROSOFT = 0x0001 281 }; 282 283 enum hv_guest_os_microsoft_ids { 284 HVGUESTOS_MICROSOFT_UNDEFINED = 0x00, 285 HVGUESTOS_MICROSOFT_MSDOS = 0x01, 286 HVGUESTOS_MICROSOFT_WINDOWS3X = 0x02, 287 HVGUESTOS_MICROSOFT_WINDOWS9X = 0x03, 288 HVGUESTOS_MICROSOFT_WINDOWSNT = 0x04, 289 HVGUESTOS_MICROSOFT_WINDOWSCE = 0x05 290 }; 291 292 /* 293 * Declare the MSR used to identify the guest OS. 294 */ 295 #define HV_X64_MSR_GUEST_OS_ID 0x40000000 296 297 union hv_x64_msr_guest_os_id_contents { 298 u64 as_uint64; 299 struct { 300 u64 build_number:16; 301 u64 service_version:8; /* Service Pack, etc. */ 302 u64 minor_version:8; 303 u64 major_version:8; 304 u64 os_id:8; /* enum hv_guest_os_microsoft_ids (if Vendor=MS) */ 305 u64 vendor_id:16; /* enum hv_guest_os_vendor */ 306 }; 307 }; 308 309 /* 310 * Declare the MSR used to setup pages used to communicate with the hypervisor. 311 */ 312 #define HV_X64_MSR_HYPERCALL 0x40000001 313 314 union hv_x64_msr_hypercall_contents { 315 u64 as_uint64; 316 struct { 317 u64 enable:1; 318 u64 reserved:11; 319 u64 guest_physical_address:52; 320 }; 321 }; 322 323 324 enum { 325 VMBUS_MESSAGE_CONNECTION_ID = 1, 326 VMBUS_MESSAGE_PORT_ID = 1, 327 VMBUS_EVENT_CONNECTION_ID = 2, 328 VMBUS_EVENT_PORT_ID = 2, 329 VMBUS_MONITOR_CONNECTION_ID = 3, 330 VMBUS_MONITOR_PORT_ID = 3, 331 VMBUS_MESSAGE_SINT = 2, 332 }; 333 334 /* #defines */ 335 336 #define HV_PRESENT_BIT 0x80000000 337 338 /* 339 * The guest OS needs to register the guest ID with the hypervisor. 340 * The guest ID is a 64 bit entity and the structure of this ID is 341 * specified in the Hyper-V specification: 342 * 343 * http://msdn.microsoft.com/en-us/library/windows/hardware/ff542653%28v=vs.85%29.aspx 344 * 345 * While the current guideline does not specify how Linux guest ID(s) 346 * need to be generated, our plan is to publish the guidelines for 347 * Linux and other guest operating systems that currently are hosted 348 * on Hyper-V. The implementation here conforms to this yet 349 * unpublished guidelines. 350 * 351 * 352 * Bit(s) 353 * 63 - Indicates if the OS is Open Source or not; 1 is Open Source 354 * 62:56 - Os Type; Linux is 0x100 355 * 55:48 - Distro specific identification 356 * 47:16 - Linux kernel version number 357 * 15:0 - Distro specific identification 358 * 359 * 360 */ 361 362 #define HV_LINUX_VENDOR_ID 0x8100 363 364 /* 365 * Generate the guest ID based on the guideline described above. 366 */ 367 368 static inline __u64 generate_guest_id(__u8 d_info1, __u32 kernel_version, 369 __u16 d_info2) 370 { 371 __u64 guest_id = 0; 372 373 guest_id = (((__u64)HV_LINUX_VENDOR_ID) << 48); 374 guest_id |= (((__u64)(d_info1)) << 48); 375 guest_id |= (((__u64)(kernel_version)) << 16); 376 guest_id |= ((__u64)(d_info2)); 377 378 return guest_id; 379 } 380 381 382 #define HV_CPU_POWER_MANAGEMENT (1 << 0) 383 #define HV_RECOMMENDATIONS_MAX 4 384 385 #define HV_X64_MAX 5 386 #define HV_CAPS_MAX 8 387 388 389 #define HV_HYPERCALL_PARAM_ALIGN sizeof(u64) 390 391 392 /* Service definitions */ 393 394 #define HV_SERVICE_PARENT_PORT (0) 395 #define HV_SERVICE_PARENT_CONNECTION (0) 396 397 #define HV_SERVICE_CONNECT_RESPONSE_SUCCESS (0) 398 #define HV_SERVICE_CONNECT_RESPONSE_INVALID_PARAMETER (1) 399 #define HV_SERVICE_CONNECT_RESPONSE_UNKNOWN_SERVICE (2) 400 #define HV_SERVICE_CONNECT_RESPONSE_CONNECTION_REJECTED (3) 401 402 #define HV_SERVICE_CONNECT_REQUEST_MESSAGE_ID (1) 403 #define HV_SERVICE_CONNECT_RESPONSE_MESSAGE_ID (2) 404 #define HV_SERVICE_DISCONNECT_REQUEST_MESSAGE_ID (3) 405 #define HV_SERVICE_DISCONNECT_RESPONSE_MESSAGE_ID (4) 406 #define HV_SERVICE_MAX_MESSAGE_ID (4) 407 408 #define HV_SERVICE_PROTOCOL_VERSION (0x0010) 409 #define HV_CONNECT_PAYLOAD_BYTE_COUNT 64 410 411 /* #define VMBUS_REVISION_NUMBER 6 */ 412 413 /* Our local vmbus's port and connection id. Anything >0 is fine */ 414 /* #define VMBUS_PORT_ID 11 */ 415 416 /* 628180B8-308D-4c5e-B7DB-1BEB62E62EF4 */ 417 static const uuid_le VMBUS_SERVICE_ID = { 418 .b = { 419 0xb8, 0x80, 0x81, 0x62, 0x8d, 0x30, 0x5e, 0x4c, 420 0xb7, 0xdb, 0x1b, 0xeb, 0x62, 0xe6, 0x2e, 0xf4 421 }, 422 }; 423 424 425 426 struct hv_context { 427 /* We only support running on top of Hyper-V 428 * So at this point this really can only contain the Hyper-V ID 429 */ 430 u64 guestid; 431 432 void *hypercall_page; 433 void *tsc_page; 434 435 bool synic_initialized; 436 437 void *synic_message_page[NR_CPUS]; 438 void *synic_event_page[NR_CPUS]; 439 /* 440 * Hypervisor's notion of virtual processor ID is different from 441 * Linux' notion of CPU ID. This information can only be retrieved 442 * in the context of the calling CPU. Setup a map for easy access 443 * to this information: 444 * 445 * vp_index[a] is the Hyper-V's processor ID corresponding to 446 * Linux cpuid 'a'. 447 */ 448 u32 vp_index[NR_CPUS]; 449 /* 450 * Starting with win8, we can take channel interrupts on any CPU; 451 * we will manage the tasklet that handles events messages on a per CPU 452 * basis. 453 */ 454 struct tasklet_struct *event_dpc[NR_CPUS]; 455 struct tasklet_struct *msg_dpc[NR_CPUS]; 456 /* 457 * To optimize the mapping of relid to channel, maintain 458 * per-cpu list of the channels based on their CPU affinity. 459 */ 460 struct list_head percpu_list[NR_CPUS]; 461 /* 462 * buffer to post messages to the host. 463 */ 464 void *post_msg_page[NR_CPUS]; 465 /* 466 * Support PV clockevent device. 467 */ 468 struct clock_event_device *clk_evt[NR_CPUS]; 469 /* 470 * To manage allocations in a NUMA node. 471 * Array indexed by numa node ID. 472 */ 473 struct cpumask *hv_numa_map; 474 }; 475 476 extern struct hv_context hv_context; 477 478 struct ms_hyperv_tsc_page { 479 volatile u32 tsc_sequence; 480 u32 reserved1; 481 volatile u64 tsc_scale; 482 volatile s64 tsc_offset; 483 u64 reserved2[509]; 484 }; 485 486 struct hv_ring_buffer_debug_info { 487 u32 current_interrupt_mask; 488 u32 current_read_index; 489 u32 current_write_index; 490 u32 bytes_avail_toread; 491 u32 bytes_avail_towrite; 492 }; 493 494 /* Hv Interface */ 495 496 extern int hv_init(void); 497 498 extern void hv_cleanup(void); 499 500 extern int hv_post_message(union hv_connection_id connection_id, 501 enum hv_message_type message_type, 502 void *payload, size_t payload_size); 503 504 extern int hv_synic_alloc(void); 505 506 extern void hv_synic_free(void); 507 508 extern void hv_synic_init(void *irqarg); 509 510 extern void hv_synic_cleanup(void *arg); 511 512 extern void hv_synic_clockevents_cleanup(void); 513 514 /* 515 * Host version information. 516 */ 517 extern unsigned int host_info_eax; 518 extern unsigned int host_info_ebx; 519 extern unsigned int host_info_ecx; 520 extern unsigned int host_info_edx; 521 522 /* Interface */ 523 524 525 int hv_ringbuffer_init(struct hv_ring_buffer_info *ring_info, void *buffer, 526 u32 buflen); 527 528 void hv_ringbuffer_cleanup(struct hv_ring_buffer_info *ring_info); 529 530 int hv_ringbuffer_write(struct hv_ring_buffer_info *ring_info, 531 struct kvec *kv_list, 532 u32 kv_count, bool *signal, bool lock); 533 534 int hv_ringbuffer_read(struct hv_ring_buffer_info *inring_info, 535 void *buffer, u32 buflen, u32 *buffer_actual_len, 536 u64 *requestid, bool *signal, bool raw); 537 538 void hv_ringbuffer_get_debuginfo(struct hv_ring_buffer_info *ring_info, 539 struct hv_ring_buffer_debug_info *debug_info); 540 541 void hv_begin_read(struct hv_ring_buffer_info *rbi); 542 543 u32 hv_end_read(struct hv_ring_buffer_info *rbi); 544 545 /* 546 * Maximum channels is determined by the size of the interrupt page 547 * which is PAGE_SIZE. 1/2 of PAGE_SIZE is for send endpoint interrupt 548 * and the other is receive endpoint interrupt 549 */ 550 #define MAX_NUM_CHANNELS ((PAGE_SIZE >> 1) << 3) /* 16348 channels */ 551 552 /* The value here must be in multiple of 32 */ 553 /* TODO: Need to make this configurable */ 554 #define MAX_NUM_CHANNELS_SUPPORTED 256 555 556 557 enum vmbus_connect_state { 558 DISCONNECTED, 559 CONNECTING, 560 CONNECTED, 561 DISCONNECTING 562 }; 563 564 #define MAX_SIZE_CHANNEL_MESSAGE HV_MESSAGE_PAYLOAD_BYTE_COUNT 565 566 struct vmbus_connection { 567 enum vmbus_connect_state conn_state; 568 569 atomic_t next_gpadl_handle; 570 571 struct completion unload_event; 572 /* 573 * Represents channel interrupts. Each bit position represents a 574 * channel. When a channel sends an interrupt via VMBUS, it finds its 575 * bit in the sendInterruptPage, set it and calls Hv to generate a port 576 * event. The other end receives the port event and parse the 577 * recvInterruptPage to see which bit is set 578 */ 579 void *int_page; 580 void *send_int_page; 581 void *recv_int_page; 582 583 /* 584 * 2 pages - 1st page for parent->child notification and 2nd 585 * is child->parent notification 586 */ 587 struct hv_monitor_page *monitor_pages[2]; 588 struct list_head chn_msg_list; 589 spinlock_t channelmsg_lock; 590 591 /* List of channels */ 592 struct list_head chn_list; 593 struct mutex channel_mutex; 594 595 struct workqueue_struct *work_queue; 596 }; 597 598 599 struct vmbus_msginfo { 600 /* Bookkeeping stuff */ 601 struct list_head msglist_entry; 602 603 /* The message itself */ 604 unsigned char msg[0]; 605 }; 606 607 608 extern struct vmbus_connection vmbus_connection; 609 610 enum vmbus_message_handler_type { 611 /* The related handler can sleep. */ 612 VMHT_BLOCKING = 0, 613 614 /* The related handler must NOT sleep. */ 615 VMHT_NON_BLOCKING = 1, 616 }; 617 618 struct vmbus_channel_message_table_entry { 619 enum vmbus_channel_message_type message_type; 620 enum vmbus_message_handler_type handler_type; 621 void (*message_handler)(struct vmbus_channel_message_header *msg); 622 }; 623 624 extern struct vmbus_channel_message_table_entry 625 channel_message_table[CHANNELMSG_COUNT]; 626 627 /* Free the message slot and signal end-of-message if required */ 628 static inline void vmbus_signal_eom(struct hv_message *msg, u32 old_msg_type) 629 { 630 /* 631 * On crash we're reading some other CPU's message page and we need 632 * to be careful: this other CPU may already had cleared the header 633 * and the host may already had delivered some other message there. 634 * In case we blindly write msg->header.message_type we're going 635 * to lose it. We can still lose a message of the same type but 636 * we count on the fact that there can only be one 637 * CHANNELMSG_UNLOAD_RESPONSE and we don't care about other messages 638 * on crash. 639 */ 640 if (cmpxchg(&msg->header.message_type, old_msg_type, 641 HVMSG_NONE) != old_msg_type) 642 return; 643 644 /* 645 * Make sure the write to MessageType (ie set to 646 * HVMSG_NONE) happens before we read the 647 * MessagePending and EOMing. Otherwise, the EOMing 648 * will not deliver any more messages since there is 649 * no empty slot 650 */ 651 mb(); 652 653 if (msg->header.message_flags.msg_pending) { 654 /* 655 * This will cause message queue rescan to 656 * possibly deliver another msg from the 657 * hypervisor 658 */ 659 wrmsrl(HV_X64_MSR_EOM, 0); 660 } 661 } 662 663 /* General vmbus interface */ 664 665 struct hv_device *vmbus_device_create(const uuid_le *type, 666 const uuid_le *instance, 667 struct vmbus_channel *channel); 668 669 int vmbus_device_register(struct hv_device *child_device_obj); 670 void vmbus_device_unregister(struct hv_device *device_obj); 671 672 /* static void */ 673 /* VmbusChildDeviceDestroy( */ 674 /* struct hv_device *); */ 675 676 struct vmbus_channel *relid2channel(u32 relid); 677 678 void vmbus_free_channels(void); 679 680 /* Connection interface */ 681 682 int vmbus_connect(void); 683 void vmbus_disconnect(void); 684 685 int vmbus_post_msg(void *buffer, size_t buflen); 686 687 void vmbus_on_event(unsigned long data); 688 void vmbus_on_msg_dpc(unsigned long data); 689 690 int hv_kvp_init(struct hv_util_service *); 691 void hv_kvp_deinit(void); 692 void hv_kvp_onchannelcallback(void *); 693 694 int hv_vss_init(struct hv_util_service *); 695 void hv_vss_deinit(void); 696 void hv_vss_onchannelcallback(void *); 697 698 int hv_fcopy_init(struct hv_util_service *); 699 void hv_fcopy_deinit(void); 700 void hv_fcopy_onchannelcallback(void *); 701 void vmbus_initiate_unload(bool crash); 702 703 static inline void hv_poll_channel(struct vmbus_channel *channel, 704 void (*cb)(void *)) 705 { 706 if (!channel) 707 return; 708 709 smp_call_function_single(channel->target_cpu, cb, channel, true); 710 } 711 712 enum hvutil_device_state { 713 HVUTIL_DEVICE_INIT = 0, /* driver is loaded, waiting for userspace */ 714 HVUTIL_READY, /* userspace is registered */ 715 HVUTIL_HOSTMSG_RECEIVED, /* message from the host was received */ 716 HVUTIL_USERSPACE_REQ, /* request to userspace was sent */ 717 HVUTIL_USERSPACE_RECV, /* reply from userspace was received */ 718 HVUTIL_DEVICE_DYING, /* driver unload is in progress */ 719 }; 720 721 #endif /* _HYPERV_VMBUS_H */ 722