1 /* 2 * QEMU KVM Hyper-V support 3 * 4 * Copyright (C) 2015 Andrey Smetanin <asmetanin@virtuozzo.com> 5 * 6 * Authors: 7 * Andrey Smetanin <asmetanin@virtuozzo.com> 8 * 9 * This work is licensed under the terms of the GNU GPL, version 2 or later. 10 * See the COPYING file in the top-level directory. 11 * 12 */ 13 14 #include "qemu/osdep.h" 15 #include "qemu/main-loop.h" 16 #include "exec/target_page.h" 17 #include "hyperv.h" 18 #include "hw/hyperv/hyperv.h" 19 #include "hyperv-proto.h" 20 21 int hyperv_x86_synic_add(X86CPU *cpu) 22 { 23 hyperv_synic_add(CPU(cpu)); 24 return 0; 25 } 26 27 /* 28 * All devices possibly using SynIC have to be reset before calling this to let 29 * them remove their SINT routes first. 30 */ 31 void hyperv_x86_synic_reset(X86CPU *cpu) 32 { 33 hyperv_synic_reset(CPU(cpu)); 34 } 35 36 void hyperv_x86_synic_update(X86CPU *cpu) 37 { 38 CPUX86State *env = &cpu->env; 39 bool enable = env->msr_hv_synic_control & HV_SYNIC_ENABLE; 40 hwaddr msg_page_addr = (env->msr_hv_synic_msg_page & HV_SIMP_ENABLE) ? 41 (env->msr_hv_synic_msg_page & TARGET_PAGE_MASK) : 0; 42 hwaddr event_page_addr = (env->msr_hv_synic_evt_page & HV_SIEFP_ENABLE) ? 43 (env->msr_hv_synic_evt_page & TARGET_PAGE_MASK) : 0; 44 hyperv_synic_update(CPU(cpu), enable, msg_page_addr, event_page_addr); 45 } 46 47 static void async_synic_update(CPUState *cs, run_on_cpu_data data) 48 { 49 bql_lock(); 50 hyperv_x86_synic_update(X86_CPU(cs)); 51 bql_unlock(); 52 } 53 54 int kvm_hv_handle_exit(X86CPU *cpu, struct kvm_hyperv_exit *exit) 55 { 56 CPUX86State *env = &cpu->env; 57 58 switch (exit->type) { 59 case KVM_EXIT_HYPERV_SYNIC: 60 if (!hyperv_feat_enabled(cpu, HYPERV_FEAT_SYNIC)) { 61 return -1; 62 } 63 64 switch (exit->u.synic.msr) { 65 case HV_X64_MSR_SCONTROL: 66 env->msr_hv_synic_control = exit->u.synic.control; 67 break; 68 case HV_X64_MSR_SIMP: 69 env->msr_hv_synic_msg_page = exit->u.synic.msg_page; 70 break; 71 case HV_X64_MSR_SIEFP: 72 env->msr_hv_synic_evt_page = exit->u.synic.evt_page; 73 break; 74 default: 75 return -1; 76 } 77 78 /* 79 * this will run in this cpu thread before it returns to KVM, but in a 80 * safe environment (i.e. when all cpus are quiescent) -- this is 81 * necessary because memory hierarchy is being changed 82 */ 83 async_safe_run_on_cpu(CPU(cpu), async_synic_update, RUN_ON_CPU_NULL); 84 cpu_exit(CPU(cpu)); 85 86 return EXCP_INTERRUPT; 87 case KVM_EXIT_HYPERV_HCALL: { 88 uint16_t code = exit->u.hcall.input & 0xffff; 89 bool fast = exit->u.hcall.input & HV_HYPERCALL_FAST; 90 uint64_t in_param = exit->u.hcall.params[0]; 91 uint64_t out_param = exit->u.hcall.params[1]; 92 93 switch (code) { 94 case HV_POST_MESSAGE: 95 exit->u.hcall.result = hyperv_hcall_post_message(in_param, fast); 96 break; 97 case HV_SIGNAL_EVENT: 98 exit->u.hcall.result = hyperv_hcall_signal_event(in_param, fast); 99 break; 100 case HV_POST_DEBUG_DATA: 101 exit->u.hcall.result = 102 hyperv_hcall_post_dbg_data(in_param, out_param, fast); 103 break; 104 case HV_RETRIEVE_DEBUG_DATA: 105 exit->u.hcall.result = 106 hyperv_hcall_retreive_dbg_data(in_param, out_param, fast); 107 break; 108 case HV_RESET_DEBUG_SESSION: 109 exit->u.hcall.result = 110 hyperv_hcall_reset_dbg_session(out_param); 111 break; 112 default: 113 exit->u.hcall.result = HV_STATUS_INVALID_HYPERCALL_CODE; 114 } 115 return 0; 116 } 117 118 case KVM_EXIT_HYPERV_SYNDBG: 119 if (!hyperv_feat_enabled(cpu, HYPERV_FEAT_SYNDBG)) { 120 return -1; 121 } 122 123 switch (exit->u.syndbg.msr) { 124 case HV_X64_MSR_SYNDBG_CONTROL: { 125 uint64_t control = exit->u.syndbg.control; 126 env->msr_hv_syndbg_control = control; 127 env->msr_hv_syndbg_send_page = exit->u.syndbg.send_page; 128 env->msr_hv_syndbg_recv_page = exit->u.syndbg.recv_page; 129 exit->u.syndbg.status = HV_STATUS_SUCCESS; 130 if (control & HV_SYNDBG_CONTROL_SEND) { 131 exit->u.syndbg.status = 132 hyperv_syndbg_send(env->msr_hv_syndbg_send_page, 133 HV_SYNDBG_CONTROL_SEND_SIZE(control)); 134 } else if (control & HV_SYNDBG_CONTROL_RECV) { 135 exit->u.syndbg.status = 136 hyperv_syndbg_recv(env->msr_hv_syndbg_recv_page, 137 TARGET_PAGE_SIZE); 138 } 139 break; 140 } 141 case HV_X64_MSR_SYNDBG_PENDING_BUFFER: 142 env->msr_hv_syndbg_pending_page = exit->u.syndbg.pending_page; 143 hyperv_syndbg_set_pending_page(env->msr_hv_syndbg_pending_page); 144 break; 145 default: 146 return -1; 147 } 148 149 return 0; 150 default: 151 return -1; 152 } 153 } 154 155 void hyperv_x86_set_vmbus_recommended_features_enabled(void) 156 { 157 hyperv_set_vmbus_recommended_features_enabled(); 158 } 159