mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2024-11-01 08:58:07 +00:00
e880c6ea55
When KVM_REQ_MASTERCLOCK_UPDATE request is issued (e.g. after migration) we need to make sure no vCPU sees stale values in PV clock structures and thus all vCPUs are kicked with KVM_REQ_CLOCK_UPDATE. Hyper-V TSC page clocksource is global and kvm_guest_time_update() only updates in on vCPU0 but this is not entirely correct: nothing blocks some other vCPU from entering the guest before we finish the update on CPU0 and it can read stale values from the page. Invalidate TSC page in kvm_gen_update_masterclock() to switch all vCPUs to using MSR based clocksource (HV_X64_MSR_TIME_REF_COUNT). Signed-off-by: Vitaly Kuznetsov <vkuznets@redhat.com> Message-Id: <20210316143736.964151-3-vkuznets@redhat.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
145 lines
4.3 KiB
C
145 lines
4.3 KiB
C
/* SPDX-License-Identifier: GPL-2.0-only */
|
|
/*
|
|
* KVM Microsoft Hyper-V emulation
|
|
*
|
|
* derived from arch/x86/kvm/x86.c
|
|
*
|
|
* Copyright (C) 2006 Qumranet, Inc.
|
|
* Copyright (C) 2008 Qumranet, Inc.
|
|
* Copyright IBM Corporation, 2008
|
|
* Copyright 2010 Red Hat, Inc. and/or its affiliates.
|
|
* Copyright (C) 2015 Andrey Smetanin <asmetanin@virtuozzo.com>
|
|
*
|
|
* Authors:
|
|
* Avi Kivity <avi@qumranet.com>
|
|
* Yaniv Kamay <yaniv@qumranet.com>
|
|
* Amit Shah <amit.shah@qumranet.com>
|
|
* Ben-Ami Yassour <benami@il.ibm.com>
|
|
* Andrey Smetanin <asmetanin@virtuozzo.com>
|
|
*/
|
|
|
|
#ifndef __ARCH_X86_KVM_HYPERV_H__
|
|
#define __ARCH_X86_KVM_HYPERV_H__
|
|
|
|
#include <linux/kvm_host.h>
|
|
|
|
/*
|
|
* The #defines related to the synthetic debugger are required by KDNet, but
|
|
* they are not documented in the Hyper-V TLFS because the synthetic debugger
|
|
* functionality has been deprecated and is subject to removal in future
|
|
* versions of Windows.
|
|
*/
|
|
#define HYPERV_CPUID_SYNDBG_VENDOR_AND_MAX_FUNCTIONS 0x40000080
|
|
#define HYPERV_CPUID_SYNDBG_INTERFACE 0x40000081
|
|
#define HYPERV_CPUID_SYNDBG_PLATFORM_CAPABILITIES 0x40000082
|
|
|
|
/*
|
|
* Hyper-V synthetic debugger platform capabilities
|
|
* These are HYPERV_CPUID_SYNDBG_PLATFORM_CAPABILITIES.EAX bits.
|
|
*/
|
|
#define HV_X64_SYNDBG_CAP_ALLOW_KERNEL_DEBUGGING BIT(1)
|
|
|
|
/* Hyper-V Synthetic debug options MSR */
|
|
#define HV_X64_MSR_SYNDBG_CONTROL 0x400000F1
|
|
#define HV_X64_MSR_SYNDBG_STATUS 0x400000F2
|
|
#define HV_X64_MSR_SYNDBG_SEND_BUFFER 0x400000F3
|
|
#define HV_X64_MSR_SYNDBG_RECV_BUFFER 0x400000F4
|
|
#define HV_X64_MSR_SYNDBG_PENDING_BUFFER 0x400000F5
|
|
#define HV_X64_MSR_SYNDBG_OPTIONS 0x400000FF
|
|
|
|
/* Hyper-V HV_X64_MSR_SYNDBG_OPTIONS bits */
|
|
#define HV_X64_SYNDBG_OPTION_USE_HCALLS BIT(2)
|
|
|
|
static inline struct kvm_hv *to_kvm_hv(struct kvm *kvm)
|
|
{
|
|
return &kvm->arch.hyperv;
|
|
}
|
|
|
|
static inline struct kvm_vcpu_hv *to_hv_vcpu(struct kvm_vcpu *vcpu)
|
|
{
|
|
return vcpu->arch.hyperv;
|
|
}
|
|
|
|
static inline struct kvm_vcpu_hv_synic *to_hv_synic(struct kvm_vcpu *vcpu)
|
|
{
|
|
struct kvm_vcpu_hv *hv_vcpu = to_hv_vcpu(vcpu);
|
|
|
|
return &hv_vcpu->synic;
|
|
}
|
|
|
|
static inline struct kvm_vcpu *hv_synic_to_vcpu(struct kvm_vcpu_hv_synic *synic)
|
|
{
|
|
struct kvm_vcpu_hv *hv_vcpu = container_of(synic, struct kvm_vcpu_hv, synic);
|
|
|
|
return hv_vcpu->vcpu;
|
|
}
|
|
|
|
static inline struct kvm_hv_syndbg *to_hv_syndbg(struct kvm_vcpu *vcpu)
|
|
{
|
|
return &vcpu->kvm->arch.hyperv.hv_syndbg;
|
|
}
|
|
|
|
static inline u32 kvm_hv_get_vpindex(struct kvm_vcpu *vcpu)
|
|
{
|
|
struct kvm_vcpu_hv *hv_vcpu = to_hv_vcpu(vcpu);
|
|
|
|
return hv_vcpu ? hv_vcpu->vp_index : kvm_vcpu_get_idx(vcpu);
|
|
}
|
|
|
|
int kvm_hv_set_msr_common(struct kvm_vcpu *vcpu, u32 msr, u64 data, bool host);
|
|
int kvm_hv_get_msr_common(struct kvm_vcpu *vcpu, u32 msr, u64 *pdata, bool host);
|
|
|
|
bool kvm_hv_hypercall_enabled(struct kvm_vcpu *vcpu);
|
|
int kvm_hv_hypercall(struct kvm_vcpu *vcpu);
|
|
|
|
void kvm_hv_irq_routing_update(struct kvm *kvm);
|
|
int kvm_hv_synic_set_irq(struct kvm *kvm, u32 vcpu_id, u32 sint);
|
|
void kvm_hv_synic_send_eoi(struct kvm_vcpu *vcpu, int vector);
|
|
int kvm_hv_activate_synic(struct kvm_vcpu *vcpu, bool dont_zero_synic_pages);
|
|
|
|
void kvm_hv_vcpu_uninit(struct kvm_vcpu *vcpu);
|
|
|
|
bool kvm_hv_assist_page_enabled(struct kvm_vcpu *vcpu);
|
|
bool kvm_hv_get_assist_page(struct kvm_vcpu *vcpu,
|
|
struct hv_vp_assist_page *assist_page);
|
|
|
|
static inline struct kvm_vcpu_hv_stimer *to_hv_stimer(struct kvm_vcpu *vcpu,
|
|
int timer_index)
|
|
{
|
|
return &to_hv_vcpu(vcpu)->stimer[timer_index];
|
|
}
|
|
|
|
static inline struct kvm_vcpu *hv_stimer_to_vcpu(struct kvm_vcpu_hv_stimer *stimer)
|
|
{
|
|
struct kvm_vcpu_hv *hv_vcpu;
|
|
|
|
hv_vcpu = container_of(stimer - stimer->index, struct kvm_vcpu_hv,
|
|
stimer[0]);
|
|
return hv_vcpu->vcpu;
|
|
}
|
|
|
|
static inline bool kvm_hv_has_stimer_pending(struct kvm_vcpu *vcpu)
|
|
{
|
|
struct kvm_vcpu_hv *hv_vcpu = to_hv_vcpu(vcpu);
|
|
|
|
if (!hv_vcpu)
|
|
return false;
|
|
|
|
return !bitmap_empty(hv_vcpu->stimer_pending_bitmap,
|
|
HV_SYNIC_STIMER_COUNT);
|
|
}
|
|
|
|
void kvm_hv_process_stimers(struct kvm_vcpu *vcpu);
|
|
|
|
void kvm_hv_setup_tsc_page(struct kvm *kvm,
|
|
struct pvclock_vcpu_time_info *hv_clock);
|
|
void kvm_hv_invalidate_tsc_page(struct kvm *kvm);
|
|
|
|
void kvm_hv_init_vm(struct kvm *kvm);
|
|
void kvm_hv_destroy_vm(struct kvm *kvm);
|
|
void kvm_hv_set_cpuid(struct kvm_vcpu *vcpu);
|
|
int kvm_vm_ioctl_hv_eventfd(struct kvm *kvm, struct kvm_hyperv_eventfd *args);
|
|
int kvm_get_hv_cpuid(struct kvm_vcpu *vcpu, struct kvm_cpuid2 *cpuid,
|
|
struct kvm_cpuid_entry2 __user *entries);
|
|
|
|
#endif
|