1701189e3SRoman Kagan /* 2701189e3SRoman Kagan * Hyper-V guest/hypervisor interaction 3701189e3SRoman Kagan * 4701189e3SRoman Kagan * Copyright (c) 2015-2018 Virtuozzo International GmbH. 5701189e3SRoman Kagan * 6701189e3SRoman Kagan * This work is licensed under the terms of the GNU GPL, version 2 or later. 7701189e3SRoman Kagan * See the COPYING file in the top-level directory. 8701189e3SRoman Kagan */ 9701189e3SRoman Kagan 10701189e3SRoman Kagan #include "qemu/osdep.h" 11701189e3SRoman Kagan #include "qemu/main-loop.h" 120b8fa32fSMarkus Armbruster #include "qemu/module.h" 13606c34bfSRoman Kagan #include "qapi/error.h" 14267e071bSRoman Kagan #include "exec/address-spaces.h" 15701189e3SRoman Kagan #include "sysemu/kvm.h" 16f5642f8bSRoman Kagan #include "qemu/bitops.h" 178d3bc0b7SRoman Kagan #include "qemu/error-report.h" 1808b689aaSSimran Singhal #include "qemu/lockable.h" 19e6ea9f45SRoman Kagan #include "qemu/queue.h" 20e6ea9f45SRoman Kagan #include "qemu/rcu.h" 21e6ea9f45SRoman Kagan #include "qemu/rcu_queue.h" 22701189e3SRoman Kagan #include "hw/hyperv/hyperv.h" 23db1015e9SEduardo Habkost #include "qom/object.h" 24701189e3SRoman Kagan 25db1015e9SEduardo Habkost struct SynICState { 26606c34bfSRoman Kagan DeviceState parent_obj; 27606c34bfSRoman Kagan 28606c34bfSRoman Kagan CPUState *cs; 29606c34bfSRoman Kagan 30606c34bfSRoman Kagan bool enabled; 31606c34bfSRoman Kagan hwaddr msg_page_addr; 32606c34bfSRoman Kagan hwaddr event_page_addr; 33267e071bSRoman Kagan MemoryRegion msg_page_mr; 34267e071bSRoman Kagan MemoryRegion event_page_mr; 35267e071bSRoman Kagan struct hyperv_message_page *msg_page; 36267e071bSRoman Kagan struct hyperv_event_flags_page *event_page; 37db1015e9SEduardo Habkost }; 38606c34bfSRoman Kagan 39606c34bfSRoman Kagan #define TYPE_SYNIC "hyperv-synic" 40*8063396bSEduardo Habkost OBJECT_DECLARE_SIMPLE_TYPE(SynICState, SYNIC) 41606c34bfSRoman Kagan 42d42cd961SJon Doron static bool synic_enabled; 43d42cd961SJon Doron 44d42cd961SJon Doron bool hyperv_is_synic_enabled(void) 45d42cd961SJon Doron { 46d42cd961SJon Doron return synic_enabled; 47d42cd961SJon Doron } 48d42cd961SJon Doron 49606c34bfSRoman Kagan static SynICState *get_synic(CPUState *cs) 50606c34bfSRoman Kagan { 51606c34bfSRoman Kagan return SYNIC(object_resolve_path_component(OBJECT(cs), "synic")); 52606c34bfSRoman Kagan } 53606c34bfSRoman Kagan 54606c34bfSRoman Kagan static void synic_update(SynICState *synic, bool enable, 55606c34bfSRoman Kagan hwaddr msg_page_addr, hwaddr event_page_addr) 56606c34bfSRoman Kagan { 57606c34bfSRoman Kagan 58606c34bfSRoman Kagan synic->enabled = enable; 59267e071bSRoman Kagan if (synic->msg_page_addr != msg_page_addr) { 60267e071bSRoman Kagan if (synic->msg_page_addr) { 61267e071bSRoman Kagan memory_region_del_subregion(get_system_memory(), 62267e071bSRoman Kagan &synic->msg_page_mr); 63267e071bSRoman Kagan } 64267e071bSRoman Kagan if (msg_page_addr) { 65267e071bSRoman Kagan memory_region_add_subregion(get_system_memory(), msg_page_addr, 66267e071bSRoman Kagan &synic->msg_page_mr); 67267e071bSRoman Kagan } 68606c34bfSRoman Kagan synic->msg_page_addr = msg_page_addr; 69267e071bSRoman Kagan } 70267e071bSRoman Kagan if (synic->event_page_addr != event_page_addr) { 71267e071bSRoman Kagan if (synic->event_page_addr) { 72267e071bSRoman Kagan memory_region_del_subregion(get_system_memory(), 73267e071bSRoman Kagan &synic->event_page_mr); 74267e071bSRoman Kagan } 75267e071bSRoman Kagan if (event_page_addr) { 76267e071bSRoman Kagan memory_region_add_subregion(get_system_memory(), event_page_addr, 77267e071bSRoman Kagan &synic->event_page_mr); 78267e071bSRoman Kagan } 79606c34bfSRoman Kagan synic->event_page_addr = event_page_addr; 80606c34bfSRoman Kagan } 81267e071bSRoman Kagan } 82606c34bfSRoman Kagan 83606c34bfSRoman Kagan void hyperv_synic_update(CPUState *cs, bool enable, 84606c34bfSRoman Kagan hwaddr msg_page_addr, hwaddr event_page_addr) 85606c34bfSRoman Kagan { 86606c34bfSRoman Kagan SynICState *synic = get_synic(cs); 87606c34bfSRoman Kagan 88606c34bfSRoman Kagan if (!synic) { 89606c34bfSRoman Kagan return; 90606c34bfSRoman Kagan } 91606c34bfSRoman Kagan 92606c34bfSRoman Kagan synic_update(synic, enable, msg_page_addr, event_page_addr); 93606c34bfSRoman Kagan } 94606c34bfSRoman Kagan 95606c34bfSRoman Kagan static void synic_realize(DeviceState *dev, Error **errp) 96606c34bfSRoman Kagan { 97267e071bSRoman Kagan Object *obj = OBJECT(dev); 98267e071bSRoman Kagan SynICState *synic = SYNIC(dev); 99267e071bSRoman Kagan char *msgp_name, *eventp_name; 100267e071bSRoman Kagan uint32_t vp_index; 101606c34bfSRoman Kagan 102267e071bSRoman Kagan /* memory region names have to be globally unique */ 103267e071bSRoman Kagan vp_index = hyperv_vp_index(synic->cs); 104267e071bSRoman Kagan msgp_name = g_strdup_printf("synic-%u-msg-page", vp_index); 105267e071bSRoman Kagan eventp_name = g_strdup_printf("synic-%u-event-page", vp_index); 106267e071bSRoman Kagan 107267e071bSRoman Kagan memory_region_init_ram(&synic->msg_page_mr, obj, msgp_name, 108267e071bSRoman Kagan sizeof(*synic->msg_page), &error_abort); 109267e071bSRoman Kagan memory_region_init_ram(&synic->event_page_mr, obj, eventp_name, 110267e071bSRoman Kagan sizeof(*synic->event_page), &error_abort); 111267e071bSRoman Kagan synic->msg_page = memory_region_get_ram_ptr(&synic->msg_page_mr); 112267e071bSRoman Kagan synic->event_page = memory_region_get_ram_ptr(&synic->event_page_mr); 113267e071bSRoman Kagan 114267e071bSRoman Kagan g_free(msgp_name); 115267e071bSRoman Kagan g_free(eventp_name); 116267e071bSRoman Kagan } 117606c34bfSRoman Kagan static void synic_reset(DeviceState *dev) 118606c34bfSRoman Kagan { 119606c34bfSRoman Kagan SynICState *synic = SYNIC(dev); 120267e071bSRoman Kagan memset(synic->msg_page, 0, sizeof(*synic->msg_page)); 121267e071bSRoman Kagan memset(synic->event_page, 0, sizeof(*synic->event_page)); 122606c34bfSRoman Kagan synic_update(synic, false, 0, 0); 123606c34bfSRoman Kagan } 124606c34bfSRoman Kagan 125606c34bfSRoman Kagan static void synic_class_init(ObjectClass *klass, void *data) 126606c34bfSRoman Kagan { 127606c34bfSRoman Kagan DeviceClass *dc = DEVICE_CLASS(klass); 128606c34bfSRoman Kagan 129606c34bfSRoman Kagan dc->realize = synic_realize; 130606c34bfSRoman Kagan dc->reset = synic_reset; 131606c34bfSRoman Kagan dc->user_creatable = false; 132606c34bfSRoman Kagan } 133606c34bfSRoman Kagan 134606c34bfSRoman Kagan void hyperv_synic_add(CPUState *cs) 135606c34bfSRoman Kagan { 136606c34bfSRoman Kagan Object *obj; 137606c34bfSRoman Kagan SynICState *synic; 138606c34bfSRoman Kagan 139606c34bfSRoman Kagan obj = object_new(TYPE_SYNIC); 140606c34bfSRoman Kagan synic = SYNIC(obj); 141606c34bfSRoman Kagan synic->cs = cs; 142d2623129SMarkus Armbruster object_property_add_child(OBJECT(cs), "synic", obj); 143606c34bfSRoman Kagan object_unref(obj); 144ce189ab2SMarkus Armbruster qdev_realize(DEVICE(obj), NULL, &error_abort); 145d42cd961SJon Doron synic_enabled = true; 146606c34bfSRoman Kagan } 147606c34bfSRoman Kagan 148606c34bfSRoman Kagan void hyperv_synic_reset(CPUState *cs) 149606c34bfSRoman Kagan { 15030a759b6SRoman Kagan SynICState *synic = get_synic(cs); 15130a759b6SRoman Kagan 15230a759b6SRoman Kagan if (synic) { 153f703a04cSDamien Hedde device_legacy_reset(DEVICE(synic)); 15430a759b6SRoman Kagan } 155606c34bfSRoman Kagan } 156606c34bfSRoman Kagan 157606c34bfSRoman Kagan static const TypeInfo synic_type_info = { 158606c34bfSRoman Kagan .name = TYPE_SYNIC, 159606c34bfSRoman Kagan .parent = TYPE_DEVICE, 160606c34bfSRoman Kagan .instance_size = sizeof(SynICState), 161606c34bfSRoman Kagan .class_init = synic_class_init, 162606c34bfSRoman Kagan }; 163606c34bfSRoman Kagan 164606c34bfSRoman Kagan static void synic_register_types(void) 165606c34bfSRoman Kagan { 166606c34bfSRoman Kagan type_register_static(&synic_type_info); 167606c34bfSRoman Kagan } 168606c34bfSRoman Kagan 169606c34bfSRoman Kagan type_init(synic_register_types) 170606c34bfSRoman Kagan 1714cbaf3c1SRoman Kagan /* 1724cbaf3c1SRoman Kagan * KVM has its own message producers (SynIC timers). To guarantee 1734cbaf3c1SRoman Kagan * serialization with both KVM vcpu and the guest cpu, the messages are first 1744cbaf3c1SRoman Kagan * staged in an intermediate area and then posted to the SynIC message page in 1754cbaf3c1SRoman Kagan * the vcpu thread. 1764cbaf3c1SRoman Kagan */ 1774cbaf3c1SRoman Kagan typedef struct HvSintStagedMessage { 1784cbaf3c1SRoman Kagan /* message content staged by hyperv_post_msg */ 1794cbaf3c1SRoman Kagan struct hyperv_message msg; 1804cbaf3c1SRoman Kagan /* callback + data (r/o) to complete the processing in a BH */ 1814cbaf3c1SRoman Kagan HvSintMsgCb cb; 1824cbaf3c1SRoman Kagan void *cb_data; 1834cbaf3c1SRoman Kagan /* message posting status filled by cpu_post_msg */ 1844cbaf3c1SRoman Kagan int status; 1854cbaf3c1SRoman Kagan /* passing the buck: */ 1864cbaf3c1SRoman Kagan enum { 1874cbaf3c1SRoman Kagan /* initial state */ 1884cbaf3c1SRoman Kagan HV_STAGED_MSG_FREE, 1894cbaf3c1SRoman Kagan /* 1904cbaf3c1SRoman Kagan * hyperv_post_msg (e.g. in main loop) grabs the staged area (FREE -> 1914cbaf3c1SRoman Kagan * BUSY), copies msg, and schedules cpu_post_msg on the assigned cpu 1924cbaf3c1SRoman Kagan */ 1934cbaf3c1SRoman Kagan HV_STAGED_MSG_BUSY, 1944cbaf3c1SRoman Kagan /* 1954cbaf3c1SRoman Kagan * cpu_post_msg (vcpu thread) tries to copy staged msg to msg slot, 1964cbaf3c1SRoman Kagan * notify the guest, records the status, marks the posting done (BUSY 1974cbaf3c1SRoman Kagan * -> POSTED), and schedules sint_msg_bh BH 1984cbaf3c1SRoman Kagan */ 1994cbaf3c1SRoman Kagan HV_STAGED_MSG_POSTED, 2004cbaf3c1SRoman Kagan /* 2014cbaf3c1SRoman Kagan * sint_msg_bh (BH) verifies that the posting is done, runs the 2024cbaf3c1SRoman Kagan * callback, and starts over (POSTED -> FREE) 2034cbaf3c1SRoman Kagan */ 2044cbaf3c1SRoman Kagan } state; 2054cbaf3c1SRoman Kagan } HvSintStagedMessage; 2064cbaf3c1SRoman Kagan 207701189e3SRoman Kagan struct HvSintRoute { 208701189e3SRoman Kagan uint32_t sint; 209606c34bfSRoman Kagan SynICState *synic; 210701189e3SRoman Kagan int gsi; 211701189e3SRoman Kagan EventNotifier sint_set_notifier; 212701189e3SRoman Kagan EventNotifier sint_ack_notifier; 2134cbaf3c1SRoman Kagan 2144cbaf3c1SRoman Kagan HvSintStagedMessage *staged_msg; 2154cbaf3c1SRoman Kagan 216701189e3SRoman Kagan unsigned refcount; 217701189e3SRoman Kagan }; 218701189e3SRoman Kagan 219701189e3SRoman Kagan static CPUState *hyperv_find_vcpu(uint32_t vp_index) 220701189e3SRoman Kagan { 221701189e3SRoman Kagan CPUState *cs = qemu_get_cpu(vp_index); 222701189e3SRoman Kagan assert(hyperv_vp_index(cs) == vp_index); 223701189e3SRoman Kagan return cs; 224701189e3SRoman Kagan } 225701189e3SRoman Kagan 2264cbaf3c1SRoman Kagan /* 2274cbaf3c1SRoman Kagan * BH to complete the processing of a staged message. 2284cbaf3c1SRoman Kagan */ 2294cbaf3c1SRoman Kagan static void sint_msg_bh(void *opaque) 2304cbaf3c1SRoman Kagan { 2314cbaf3c1SRoman Kagan HvSintRoute *sint_route = opaque; 2324cbaf3c1SRoman Kagan HvSintStagedMessage *staged_msg = sint_route->staged_msg; 2334cbaf3c1SRoman Kagan 2344cbaf3c1SRoman Kagan if (atomic_read(&staged_msg->state) != HV_STAGED_MSG_POSTED) { 2354cbaf3c1SRoman Kagan /* status nor ready yet (spurious ack from guest?), ignore */ 2364cbaf3c1SRoman Kagan return; 2374cbaf3c1SRoman Kagan } 2384cbaf3c1SRoman Kagan 2394cbaf3c1SRoman Kagan staged_msg->cb(staged_msg->cb_data, staged_msg->status); 2404cbaf3c1SRoman Kagan staged_msg->status = 0; 2414cbaf3c1SRoman Kagan 2424cbaf3c1SRoman Kagan /* staged message processing finished, ready to start over */ 2434cbaf3c1SRoman Kagan atomic_set(&staged_msg->state, HV_STAGED_MSG_FREE); 2444cbaf3c1SRoman Kagan /* drop the reference taken in hyperv_post_msg */ 2454cbaf3c1SRoman Kagan hyperv_sint_route_unref(sint_route); 2464cbaf3c1SRoman Kagan } 2474cbaf3c1SRoman Kagan 2484cbaf3c1SRoman Kagan /* 2494cbaf3c1SRoman Kagan * Worker to transfer the message from the staging area into the SynIC message 2504cbaf3c1SRoman Kagan * page in vcpu context. 2514cbaf3c1SRoman Kagan */ 2524cbaf3c1SRoman Kagan static void cpu_post_msg(CPUState *cs, run_on_cpu_data data) 2534cbaf3c1SRoman Kagan { 2544cbaf3c1SRoman Kagan HvSintRoute *sint_route = data.host_ptr; 2554cbaf3c1SRoman Kagan HvSintStagedMessage *staged_msg = sint_route->staged_msg; 2564cbaf3c1SRoman Kagan SynICState *synic = sint_route->synic; 2574cbaf3c1SRoman Kagan struct hyperv_message *dst_msg; 2584cbaf3c1SRoman Kagan bool wait_for_sint_ack = false; 2594cbaf3c1SRoman Kagan 2604cbaf3c1SRoman Kagan assert(staged_msg->state == HV_STAGED_MSG_BUSY); 2614cbaf3c1SRoman Kagan 2624cbaf3c1SRoman Kagan if (!synic->enabled || !synic->msg_page_addr) { 2634cbaf3c1SRoman Kagan staged_msg->status = -ENXIO; 2644cbaf3c1SRoman Kagan goto posted; 2654cbaf3c1SRoman Kagan } 2664cbaf3c1SRoman Kagan 2674cbaf3c1SRoman Kagan dst_msg = &synic->msg_page->slot[sint_route->sint]; 2684cbaf3c1SRoman Kagan 2694cbaf3c1SRoman Kagan if (dst_msg->header.message_type != HV_MESSAGE_NONE) { 2704cbaf3c1SRoman Kagan dst_msg->header.message_flags |= HV_MESSAGE_FLAG_PENDING; 2714cbaf3c1SRoman Kagan staged_msg->status = -EAGAIN; 2724cbaf3c1SRoman Kagan wait_for_sint_ack = true; 2734cbaf3c1SRoman Kagan } else { 2744cbaf3c1SRoman Kagan memcpy(dst_msg, &staged_msg->msg, sizeof(*dst_msg)); 2754cbaf3c1SRoman Kagan staged_msg->status = hyperv_sint_route_set_sint(sint_route); 2764cbaf3c1SRoman Kagan } 2774cbaf3c1SRoman Kagan 2784cbaf3c1SRoman Kagan memory_region_set_dirty(&synic->msg_page_mr, 0, sizeof(*synic->msg_page)); 2794cbaf3c1SRoman Kagan 2804cbaf3c1SRoman Kagan posted: 2814cbaf3c1SRoman Kagan atomic_set(&staged_msg->state, HV_STAGED_MSG_POSTED); 2824cbaf3c1SRoman Kagan /* 2834cbaf3c1SRoman Kagan * Notify the msg originator of the progress made; if the slot was busy we 2844cbaf3c1SRoman Kagan * set msg_pending flag in it so it will be the guest who will do EOM and 2854cbaf3c1SRoman Kagan * trigger the notification from KVM via sint_ack_notifier 2864cbaf3c1SRoman Kagan */ 2874cbaf3c1SRoman Kagan if (!wait_for_sint_ack) { 2884cbaf3c1SRoman Kagan aio_bh_schedule_oneshot(qemu_get_aio_context(), sint_msg_bh, 2894cbaf3c1SRoman Kagan sint_route); 2904cbaf3c1SRoman Kagan } 2914cbaf3c1SRoman Kagan } 2924cbaf3c1SRoman Kagan 2934cbaf3c1SRoman Kagan /* 2944cbaf3c1SRoman Kagan * Post a Hyper-V message to the staging area, for delivery to guest in the 2954cbaf3c1SRoman Kagan * vcpu thread. 2964cbaf3c1SRoman Kagan */ 2974cbaf3c1SRoman Kagan int hyperv_post_msg(HvSintRoute *sint_route, struct hyperv_message *src_msg) 2984cbaf3c1SRoman Kagan { 2994cbaf3c1SRoman Kagan HvSintStagedMessage *staged_msg = sint_route->staged_msg; 3004cbaf3c1SRoman Kagan 3014cbaf3c1SRoman Kagan assert(staged_msg); 3024cbaf3c1SRoman Kagan 3034cbaf3c1SRoman Kagan /* grab the staging area */ 3044cbaf3c1SRoman Kagan if (atomic_cmpxchg(&staged_msg->state, HV_STAGED_MSG_FREE, 3054cbaf3c1SRoman Kagan HV_STAGED_MSG_BUSY) != HV_STAGED_MSG_FREE) { 3064cbaf3c1SRoman Kagan return -EAGAIN; 3074cbaf3c1SRoman Kagan } 3084cbaf3c1SRoman Kagan 3094cbaf3c1SRoman Kagan memcpy(&staged_msg->msg, src_msg, sizeof(*src_msg)); 3104cbaf3c1SRoman Kagan 3114cbaf3c1SRoman Kagan /* hold a reference on sint_route until the callback is finished */ 3124cbaf3c1SRoman Kagan hyperv_sint_route_ref(sint_route); 3134cbaf3c1SRoman Kagan 3144cbaf3c1SRoman Kagan /* schedule message posting attempt in vcpu thread */ 3154cbaf3c1SRoman Kagan async_run_on_cpu(sint_route->synic->cs, cpu_post_msg, 3164cbaf3c1SRoman Kagan RUN_ON_CPU_HOST_PTR(sint_route)); 3174cbaf3c1SRoman Kagan return 0; 3184cbaf3c1SRoman Kagan } 3194cbaf3c1SRoman Kagan 3204cbaf3c1SRoman Kagan static void sint_ack_handler(EventNotifier *notifier) 321701189e3SRoman Kagan { 322701189e3SRoman Kagan HvSintRoute *sint_route = container_of(notifier, HvSintRoute, 323701189e3SRoman Kagan sint_ack_notifier); 324701189e3SRoman Kagan event_notifier_test_and_clear(notifier); 3254cbaf3c1SRoman Kagan 3264cbaf3c1SRoman Kagan /* 3274cbaf3c1SRoman Kagan * the guest consumed the previous message so complete the current one with 3284cbaf3c1SRoman Kagan * -EAGAIN and let the msg originator retry 3294cbaf3c1SRoman Kagan */ 3304cbaf3c1SRoman Kagan aio_bh_schedule_oneshot(qemu_get_aio_context(), sint_msg_bh, sint_route); 331701189e3SRoman Kagan } 332701189e3SRoman Kagan 333f5642f8bSRoman Kagan /* 334f5642f8bSRoman Kagan * Set given event flag for a given sint on a given vcpu, and signal the sint. 335f5642f8bSRoman Kagan */ 336f5642f8bSRoman Kagan int hyperv_set_event_flag(HvSintRoute *sint_route, unsigned eventno) 337f5642f8bSRoman Kagan { 338f5642f8bSRoman Kagan int ret; 339f5642f8bSRoman Kagan SynICState *synic = sint_route->synic; 340f5642f8bSRoman Kagan unsigned long *flags, set_mask; 341f5642f8bSRoman Kagan unsigned set_idx; 342f5642f8bSRoman Kagan 343f5642f8bSRoman Kagan if (eventno > HV_EVENT_FLAGS_COUNT) { 344f5642f8bSRoman Kagan return -EINVAL; 345f5642f8bSRoman Kagan } 346f5642f8bSRoman Kagan if (!synic->enabled || !synic->event_page_addr) { 347f5642f8bSRoman Kagan return -ENXIO; 348f5642f8bSRoman Kagan } 349f5642f8bSRoman Kagan 350f5642f8bSRoman Kagan set_idx = BIT_WORD(eventno); 351f5642f8bSRoman Kagan set_mask = BIT_MASK(eventno); 352f5642f8bSRoman Kagan flags = synic->event_page->slot[sint_route->sint].flags; 353f5642f8bSRoman Kagan 354f5642f8bSRoman Kagan if ((atomic_fetch_or(&flags[set_idx], set_mask) & set_mask) != set_mask) { 355f5642f8bSRoman Kagan memory_region_set_dirty(&synic->event_page_mr, 0, 356f5642f8bSRoman Kagan sizeof(*synic->event_page)); 357f5642f8bSRoman Kagan ret = hyperv_sint_route_set_sint(sint_route); 358f5642f8bSRoman Kagan } else { 359f5642f8bSRoman Kagan ret = 0; 360f5642f8bSRoman Kagan } 361f5642f8bSRoman Kagan return ret; 362f5642f8bSRoman Kagan } 363f5642f8bSRoman Kagan 364701189e3SRoman Kagan HvSintRoute *hyperv_sint_route_new(uint32_t vp_index, uint32_t sint, 3654cbaf3c1SRoman Kagan HvSintMsgCb cb, void *cb_data) 366701189e3SRoman Kagan { 367701189e3SRoman Kagan HvSintRoute *sint_route; 368701189e3SRoman Kagan EventNotifier *ack_notifier; 369701189e3SRoman Kagan int r, gsi; 370701189e3SRoman Kagan CPUState *cs; 371606c34bfSRoman Kagan SynICState *synic; 372701189e3SRoman Kagan 373701189e3SRoman Kagan cs = hyperv_find_vcpu(vp_index); 374701189e3SRoman Kagan if (!cs) { 375701189e3SRoman Kagan return NULL; 376701189e3SRoman Kagan } 377701189e3SRoman Kagan 378606c34bfSRoman Kagan synic = get_synic(cs); 379606c34bfSRoman Kagan if (!synic) { 380606c34bfSRoman Kagan return NULL; 381606c34bfSRoman Kagan } 382606c34bfSRoman Kagan 383701189e3SRoman Kagan sint_route = g_new0(HvSintRoute, 1); 384701189e3SRoman Kagan r = event_notifier_init(&sint_route->sint_set_notifier, false); 385701189e3SRoman Kagan if (r) { 386701189e3SRoman Kagan goto err; 387701189e3SRoman Kagan } 388701189e3SRoman Kagan 3894cbaf3c1SRoman Kagan 3904cbaf3c1SRoman Kagan ack_notifier = cb ? &sint_route->sint_ack_notifier : NULL; 391701189e3SRoman Kagan if (ack_notifier) { 3924cbaf3c1SRoman Kagan sint_route->staged_msg = g_new0(HvSintStagedMessage, 1); 3934cbaf3c1SRoman Kagan sint_route->staged_msg->cb = cb; 3944cbaf3c1SRoman Kagan sint_route->staged_msg->cb_data = cb_data; 3954cbaf3c1SRoman Kagan 396701189e3SRoman Kagan r = event_notifier_init(ack_notifier, false); 397701189e3SRoman Kagan if (r) { 398701189e3SRoman Kagan goto err_sint_set_notifier; 399701189e3SRoman Kagan } 400701189e3SRoman Kagan 4014cbaf3c1SRoman Kagan event_notifier_set_handler(ack_notifier, sint_ack_handler); 402701189e3SRoman Kagan } 403701189e3SRoman Kagan 404701189e3SRoman Kagan gsi = kvm_irqchip_add_hv_sint_route(kvm_state, vp_index, sint); 405701189e3SRoman Kagan if (gsi < 0) { 406701189e3SRoman Kagan goto err_gsi; 407701189e3SRoman Kagan } 408701189e3SRoman Kagan 409701189e3SRoman Kagan r = kvm_irqchip_add_irqfd_notifier_gsi(kvm_state, 410701189e3SRoman Kagan &sint_route->sint_set_notifier, 411701189e3SRoman Kagan ack_notifier, gsi); 412701189e3SRoman Kagan if (r) { 413701189e3SRoman Kagan goto err_irqfd; 414701189e3SRoman Kagan } 415701189e3SRoman Kagan sint_route->gsi = gsi; 416606c34bfSRoman Kagan sint_route->synic = synic; 417701189e3SRoman Kagan sint_route->sint = sint; 418701189e3SRoman Kagan sint_route->refcount = 1; 419701189e3SRoman Kagan 420701189e3SRoman Kagan return sint_route; 421701189e3SRoman Kagan 422701189e3SRoman Kagan err_irqfd: 423701189e3SRoman Kagan kvm_irqchip_release_virq(kvm_state, gsi); 424701189e3SRoman Kagan err_gsi: 425701189e3SRoman Kagan if (ack_notifier) { 426701189e3SRoman Kagan event_notifier_set_handler(ack_notifier, NULL); 427701189e3SRoman Kagan event_notifier_cleanup(ack_notifier); 4284cbaf3c1SRoman Kagan g_free(sint_route->staged_msg); 429701189e3SRoman Kagan } 430701189e3SRoman Kagan err_sint_set_notifier: 431701189e3SRoman Kagan event_notifier_cleanup(&sint_route->sint_set_notifier); 432701189e3SRoman Kagan err: 433701189e3SRoman Kagan g_free(sint_route); 434701189e3SRoman Kagan 435701189e3SRoman Kagan return NULL; 436701189e3SRoman Kagan } 437701189e3SRoman Kagan 438701189e3SRoman Kagan void hyperv_sint_route_ref(HvSintRoute *sint_route) 439701189e3SRoman Kagan { 440701189e3SRoman Kagan sint_route->refcount++; 441701189e3SRoman Kagan } 442701189e3SRoman Kagan 443701189e3SRoman Kagan void hyperv_sint_route_unref(HvSintRoute *sint_route) 444701189e3SRoman Kagan { 445701189e3SRoman Kagan if (!sint_route) { 446701189e3SRoman Kagan return; 447701189e3SRoman Kagan } 448701189e3SRoman Kagan 449701189e3SRoman Kagan assert(sint_route->refcount > 0); 450701189e3SRoman Kagan 451701189e3SRoman Kagan if (--sint_route->refcount) { 452701189e3SRoman Kagan return; 453701189e3SRoman Kagan } 454701189e3SRoman Kagan 455701189e3SRoman Kagan kvm_irqchip_remove_irqfd_notifier_gsi(kvm_state, 456701189e3SRoman Kagan &sint_route->sint_set_notifier, 457701189e3SRoman Kagan sint_route->gsi); 458701189e3SRoman Kagan kvm_irqchip_release_virq(kvm_state, sint_route->gsi); 4594cbaf3c1SRoman Kagan if (sint_route->staged_msg) { 460701189e3SRoman Kagan event_notifier_set_handler(&sint_route->sint_ack_notifier, NULL); 461701189e3SRoman Kagan event_notifier_cleanup(&sint_route->sint_ack_notifier); 4624cbaf3c1SRoman Kagan g_free(sint_route->staged_msg); 463701189e3SRoman Kagan } 464701189e3SRoman Kagan event_notifier_cleanup(&sint_route->sint_set_notifier); 465701189e3SRoman Kagan g_free(sint_route); 466701189e3SRoman Kagan } 467701189e3SRoman Kagan 468701189e3SRoman Kagan int hyperv_sint_route_set_sint(HvSintRoute *sint_route) 469701189e3SRoman Kagan { 470701189e3SRoman Kagan return event_notifier_set(&sint_route->sint_set_notifier); 471701189e3SRoman Kagan } 472e6ea9f45SRoman Kagan 47376036a5fSRoman Kagan typedef struct MsgHandler { 47476036a5fSRoman Kagan struct rcu_head rcu; 47576036a5fSRoman Kagan QLIST_ENTRY(MsgHandler) link; 47676036a5fSRoman Kagan uint32_t conn_id; 47776036a5fSRoman Kagan HvMsgHandler handler; 47876036a5fSRoman Kagan void *data; 47976036a5fSRoman Kagan } MsgHandler; 48076036a5fSRoman Kagan 481e6ea9f45SRoman Kagan typedef struct EventFlagHandler { 482e6ea9f45SRoman Kagan struct rcu_head rcu; 483e6ea9f45SRoman Kagan QLIST_ENTRY(EventFlagHandler) link; 484e6ea9f45SRoman Kagan uint32_t conn_id; 485e6ea9f45SRoman Kagan EventNotifier *notifier; 486e6ea9f45SRoman Kagan } EventFlagHandler; 487e6ea9f45SRoman Kagan 48876036a5fSRoman Kagan static QLIST_HEAD(, MsgHandler) msg_handlers; 489e6ea9f45SRoman Kagan static QLIST_HEAD(, EventFlagHandler) event_flag_handlers; 490e6ea9f45SRoman Kagan static QemuMutex handlers_mutex; 491e6ea9f45SRoman Kagan 492e6ea9f45SRoman Kagan static void __attribute__((constructor)) hv_init(void) 493e6ea9f45SRoman Kagan { 49476036a5fSRoman Kagan QLIST_INIT(&msg_handlers); 495e6ea9f45SRoman Kagan QLIST_INIT(&event_flag_handlers); 496e6ea9f45SRoman Kagan qemu_mutex_init(&handlers_mutex); 497e6ea9f45SRoman Kagan } 498e6ea9f45SRoman Kagan 49976036a5fSRoman Kagan int hyperv_set_msg_handler(uint32_t conn_id, HvMsgHandler handler, void *data) 50076036a5fSRoman Kagan { 50176036a5fSRoman Kagan int ret; 50276036a5fSRoman Kagan MsgHandler *mh; 50376036a5fSRoman Kagan 50408b689aaSSimran Singhal QEMU_LOCK_GUARD(&handlers_mutex); 50576036a5fSRoman Kagan QLIST_FOREACH(mh, &msg_handlers, link) { 50676036a5fSRoman Kagan if (mh->conn_id == conn_id) { 50776036a5fSRoman Kagan if (handler) { 50876036a5fSRoman Kagan ret = -EEXIST; 50976036a5fSRoman Kagan } else { 51076036a5fSRoman Kagan QLIST_REMOVE_RCU(mh, link); 51176036a5fSRoman Kagan g_free_rcu(mh, rcu); 51276036a5fSRoman Kagan ret = 0; 51376036a5fSRoman Kagan } 51408b689aaSSimran Singhal return ret; 51576036a5fSRoman Kagan } 51676036a5fSRoman Kagan } 51776036a5fSRoman Kagan 51876036a5fSRoman Kagan if (handler) { 51976036a5fSRoman Kagan mh = g_new(MsgHandler, 1); 52076036a5fSRoman Kagan mh->conn_id = conn_id; 52176036a5fSRoman Kagan mh->handler = handler; 52276036a5fSRoman Kagan mh->data = data; 52376036a5fSRoman Kagan QLIST_INSERT_HEAD_RCU(&msg_handlers, mh, link); 52476036a5fSRoman Kagan ret = 0; 52576036a5fSRoman Kagan } else { 52676036a5fSRoman Kagan ret = -ENOENT; 52776036a5fSRoman Kagan } 52808b689aaSSimran Singhal 52976036a5fSRoman Kagan return ret; 53076036a5fSRoman Kagan } 53176036a5fSRoman Kagan 53276036a5fSRoman Kagan uint16_t hyperv_hcall_post_message(uint64_t param, bool fast) 53376036a5fSRoman Kagan { 53476036a5fSRoman Kagan uint16_t ret; 53576036a5fSRoman Kagan hwaddr len; 53676036a5fSRoman Kagan struct hyperv_post_message_input *msg; 53776036a5fSRoman Kagan MsgHandler *mh; 53876036a5fSRoman Kagan 53976036a5fSRoman Kagan if (fast) { 54076036a5fSRoman Kagan return HV_STATUS_INVALID_HYPERCALL_CODE; 54176036a5fSRoman Kagan } 54276036a5fSRoman Kagan if (param & (__alignof__(*msg) - 1)) { 54376036a5fSRoman Kagan return HV_STATUS_INVALID_ALIGNMENT; 54476036a5fSRoman Kagan } 54576036a5fSRoman Kagan 54676036a5fSRoman Kagan len = sizeof(*msg); 54776036a5fSRoman Kagan msg = cpu_physical_memory_map(param, &len, 0); 54876036a5fSRoman Kagan if (len < sizeof(*msg)) { 54976036a5fSRoman Kagan ret = HV_STATUS_INSUFFICIENT_MEMORY; 55076036a5fSRoman Kagan goto unmap; 55176036a5fSRoman Kagan } 55276036a5fSRoman Kagan if (msg->payload_size > sizeof(msg->payload)) { 55376036a5fSRoman Kagan ret = HV_STATUS_INVALID_HYPERCALL_INPUT; 55476036a5fSRoman Kagan goto unmap; 55576036a5fSRoman Kagan } 55676036a5fSRoman Kagan 55776036a5fSRoman Kagan ret = HV_STATUS_INVALID_CONNECTION_ID; 558b66173afSDr. David Alan Gilbert WITH_RCU_READ_LOCK_GUARD() { 55976036a5fSRoman Kagan QLIST_FOREACH_RCU(mh, &msg_handlers, link) { 56076036a5fSRoman Kagan if (mh->conn_id == (msg->connection_id & HV_CONNECTION_ID_MASK)) { 56176036a5fSRoman Kagan ret = mh->handler(msg, mh->data); 56276036a5fSRoman Kagan break; 56376036a5fSRoman Kagan } 56476036a5fSRoman Kagan } 565b66173afSDr. David Alan Gilbert } 56676036a5fSRoman Kagan 56776036a5fSRoman Kagan unmap: 56876036a5fSRoman Kagan cpu_physical_memory_unmap(msg, len, 0, 0); 56976036a5fSRoman Kagan return ret; 57076036a5fSRoman Kagan } 57176036a5fSRoman Kagan 5728d3bc0b7SRoman Kagan static int set_event_flag_handler(uint32_t conn_id, EventNotifier *notifier) 573e6ea9f45SRoman Kagan { 574e6ea9f45SRoman Kagan int ret; 575e6ea9f45SRoman Kagan EventFlagHandler *handler; 576e6ea9f45SRoman Kagan 57708b689aaSSimran Singhal QEMU_LOCK_GUARD(&handlers_mutex); 578e6ea9f45SRoman Kagan QLIST_FOREACH(handler, &event_flag_handlers, link) { 579e6ea9f45SRoman Kagan if (handler->conn_id == conn_id) { 580e6ea9f45SRoman Kagan if (notifier) { 581e6ea9f45SRoman Kagan ret = -EEXIST; 582e6ea9f45SRoman Kagan } else { 583e6ea9f45SRoman Kagan QLIST_REMOVE_RCU(handler, link); 584e6ea9f45SRoman Kagan g_free_rcu(handler, rcu); 585e6ea9f45SRoman Kagan ret = 0; 586e6ea9f45SRoman Kagan } 58708b689aaSSimran Singhal return ret; 588e6ea9f45SRoman Kagan } 589e6ea9f45SRoman Kagan } 590e6ea9f45SRoman Kagan 591e6ea9f45SRoman Kagan if (notifier) { 592e6ea9f45SRoman Kagan handler = g_new(EventFlagHandler, 1); 593e6ea9f45SRoman Kagan handler->conn_id = conn_id; 594e6ea9f45SRoman Kagan handler->notifier = notifier; 595e6ea9f45SRoman Kagan QLIST_INSERT_HEAD_RCU(&event_flag_handlers, handler, link); 596e6ea9f45SRoman Kagan ret = 0; 597e6ea9f45SRoman Kagan } else { 598e6ea9f45SRoman Kagan ret = -ENOENT; 599e6ea9f45SRoman Kagan } 60008b689aaSSimran Singhal 601e6ea9f45SRoman Kagan return ret; 602e6ea9f45SRoman Kagan } 603e6ea9f45SRoman Kagan 6048d3bc0b7SRoman Kagan static bool process_event_flags_userspace; 6058d3bc0b7SRoman Kagan 6068d3bc0b7SRoman Kagan int hyperv_set_event_flag_handler(uint32_t conn_id, EventNotifier *notifier) 6078d3bc0b7SRoman Kagan { 6088d3bc0b7SRoman Kagan if (!process_event_flags_userspace && 6098d3bc0b7SRoman Kagan !kvm_check_extension(kvm_state, KVM_CAP_HYPERV_EVENTFD)) { 6108d3bc0b7SRoman Kagan process_event_flags_userspace = true; 6118d3bc0b7SRoman Kagan 6128d3bc0b7SRoman Kagan warn_report("Hyper-V event signaling is not supported by this kernel; " 6138d3bc0b7SRoman Kagan "using slower userspace hypercall processing"); 6148d3bc0b7SRoman Kagan } 6158d3bc0b7SRoman Kagan 6168d3bc0b7SRoman Kagan if (!process_event_flags_userspace) { 6178d3bc0b7SRoman Kagan struct kvm_hyperv_eventfd hvevfd = { 6188d3bc0b7SRoman Kagan .conn_id = conn_id, 6198d3bc0b7SRoman Kagan .fd = notifier ? event_notifier_get_fd(notifier) : -1, 6208d3bc0b7SRoman Kagan .flags = notifier ? 0 : KVM_HYPERV_EVENTFD_DEASSIGN, 6218d3bc0b7SRoman Kagan }; 6228d3bc0b7SRoman Kagan 6238d3bc0b7SRoman Kagan return kvm_vm_ioctl(kvm_state, KVM_HYPERV_EVENTFD, &hvevfd); 6248d3bc0b7SRoman Kagan } 6258d3bc0b7SRoman Kagan return set_event_flag_handler(conn_id, notifier); 6268d3bc0b7SRoman Kagan } 6278d3bc0b7SRoman Kagan 628e6ea9f45SRoman Kagan uint16_t hyperv_hcall_signal_event(uint64_t param, bool fast) 629e6ea9f45SRoman Kagan { 630e6ea9f45SRoman Kagan EventFlagHandler *handler; 631e6ea9f45SRoman Kagan 632e6ea9f45SRoman Kagan if (unlikely(!fast)) { 633e6ea9f45SRoman Kagan hwaddr addr = param; 634e6ea9f45SRoman Kagan 635e6ea9f45SRoman Kagan if (addr & (__alignof__(addr) - 1)) { 636e6ea9f45SRoman Kagan return HV_STATUS_INVALID_ALIGNMENT; 637e6ea9f45SRoman Kagan } 638e6ea9f45SRoman Kagan 639e6ea9f45SRoman Kagan param = ldq_phys(&address_space_memory, addr); 640e6ea9f45SRoman Kagan } 641e6ea9f45SRoman Kagan 642e6ea9f45SRoman Kagan /* 643e6ea9f45SRoman Kagan * Per spec, bits 32-47 contain the extra "flag number". However, we 644e6ea9f45SRoman Kagan * have no use for it, and in all known usecases it is zero, so just 645e6ea9f45SRoman Kagan * report lookup failure if it isn't. 646e6ea9f45SRoman Kagan */ 647e6ea9f45SRoman Kagan if (param & 0xffff00000000ULL) { 648e6ea9f45SRoman Kagan return HV_STATUS_INVALID_PORT_ID; 649e6ea9f45SRoman Kagan } 650e6ea9f45SRoman Kagan /* remaining bits are reserved-zero */ 651e6ea9f45SRoman Kagan if (param & ~HV_CONNECTION_ID_MASK) { 652e6ea9f45SRoman Kagan return HV_STATUS_INVALID_HYPERCALL_INPUT; 653e6ea9f45SRoman Kagan } 654e6ea9f45SRoman Kagan 655b66173afSDr. David Alan Gilbert RCU_READ_LOCK_GUARD(); 656e6ea9f45SRoman Kagan QLIST_FOREACH_RCU(handler, &event_flag_handlers, link) { 657e6ea9f45SRoman Kagan if (handler->conn_id == param) { 658e6ea9f45SRoman Kagan event_notifier_set(handler->notifier); 659b66173afSDr. David Alan Gilbert return 0; 660e6ea9f45SRoman Kagan } 661e6ea9f45SRoman Kagan } 662b66173afSDr. David Alan Gilbert return HV_STATUS_INVALID_CONNECTION_ID; 663e6ea9f45SRoman Kagan } 664