From nobody Sun Feb 8 09:11:07 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=gmail.com ARC-Seal: i=1; a=rsa-sha256; t=1643969904; cv=none; d=zohomail.com; s=zohoarc; b=i9S2NYLs2DCHPIMvq7TdlQxjeBbXyUZ4Ib/YFsWTkOYrHasLjNBaGAzGxJawpZWyqcTRGUfuZXanJ5NtAr5aZvovVG6jrHoEdIIhiH1xZUvC4jwG5RQGXlEF2cDuUO4yA/8mSGopbpguMvASp5rHU5+0UQw1LWZBWPWcvuMFUrA= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1643969904; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=ALUT9NrheV33/ehcrPuhcm5VH2gEBiaZUAODpzDB6dA=; b=AbaMMCK9iwcq6VdbBKccW9joKLTpW2EMgGaPEMmWov4P0QVwq6WiZ21TnHG9B9b5Z4xAHp9lGOLTxqGqZVfREypW5OrmndSl3jhPGpn7p1PO2spsHwKphMT6OKNKjajmDJbHSKjwqLT7FdxkZ+rBuRcDNZfQKL4G0ZXoJkrKlyo= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1643969904119304.43632712160934; Fri, 4 Feb 2022 02:18:24 -0800 (PST) Received: from localhost ([::1]:40430 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1nFvfb-00030P-3q for importer@patchew.org; Fri, 04 Feb 2022 05:18:23 -0500 Received: from eggs.gnu.org ([209.51.188.92]:39508) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1nFvVT-0002aw-Qh for qemu-devel@nongnu.org; Fri, 04 Feb 2022 05:07:55 -0500 Received: from [2a00:1450:4864:20::42e] (port=44824 helo=mail-wr1-x42e.google.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1nFvVR-0000js-0d for qemu-devel@nongnu.org; Fri, 04 Feb 2022 05:07:55 -0500 Received: by mail-wr1-x42e.google.com with SMTP id k18so10290920wrg.11 for ; Fri, 04 Feb 2022 02:07:52 -0800 (PST) Received: from localhost.localdomain ([2a0d:6fc2:4af1:7d00:5e41:a6ea:ffaa:548c]) by smtp.gmail.com with ESMTPSA id u18sm657227wrn.110.2022.02.04.02.07.50 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 04 Feb 2022 02:07:50 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=ALUT9NrheV33/ehcrPuhcm5VH2gEBiaZUAODpzDB6dA=; b=l9GT5oGiciXxCT6S+yMXwsSRdsTAeX0X3AM/p4tKEhv33BJadU3jevGUf30RvHJhPb GxTrSMOP+zMj0qoD5tQLDKCyRFWEV6E7QEKNvhEVcEFsr25E2mBFh1nihtuABe4/C5Lc ufIQ8c2tzAQwxwWAQ/iVDjLdXz00l7GIzmlrCfeSrppYg/QwwJsx+EbTlGcuRki+gYz+ 6z6dcrg0lbKyBgM4b4KQuLFKmLm6UJyF3npyBcpYKCPgOYCVgnNqwQrLY9RUfK3QJu/9 cZdEI7J5hSp9pDfhwAdcqgsVdFprYj63FY+zzyC7o8y/XfUX1MvkvC72eLvRP+BHwPRv uJSw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=ALUT9NrheV33/ehcrPuhcm5VH2gEBiaZUAODpzDB6dA=; b=HrL4ukzyK+gMt5+qVTY0K9nW+4DI5MxrnO3gYc1U4K5/zSpT4p8NdomKw3tr4EimIQ FQdXoPZAurSLICiQEmXrsRisFklDtMhE+TS1QOapkxdsGZI4TcLH0m4AyjwShnFyX/S7 o8S7AqydzdHK1ewFu+tzUWLZ6OPdlLuxROBa9VErckGSVfeBoXCqr4dXG17qUHXKjAKl cTOH0KW/wizsAUqSMatZrHF6SKCoU0jYB+kaMTDUmEgSuFn0pdJCAouoNuEOzQJOgiox NWlniVssmqnswuWaCnL0CSZOYCFfu8OKDEPXW05iP+Uj0EWWH3Rrrq2yrxc9fRhPKbh0 OusA== X-Gm-Message-State: AOAM530ARrEqb+PJgZAqvNcM1ViDbgMyReyIK/F+rDI/RBQEf8jEsdy7 geLdI4ePkYysxk2CkyBWKh9UBp+/+jE= X-Google-Smtp-Source: ABdhPJy6TwSn6iLV0jeTjATU7+6hHTCIDtpRBR5O0Ogy8fdnaKYwf4epXZfmd4OyY9NCbODgtHGrRA== X-Received: by 2002:a05:6000:1b8a:: with SMTP id r10mr1842471wru.665.1643969271314; Fri, 04 Feb 2022 02:07:51 -0800 (PST) From: Jon Doron To: qemu-devel@nongnu.org Subject: [PATCH v1 1/4] hyperv: SControl is optional to enable SynIc Date: Fri, 4 Feb 2022 12:07:20 +0200 Message-Id: <20220204100723.406121-2-arilou@gmail.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220204100723.406121-1-arilou@gmail.com> References: <20220204100723.406121-1-arilou@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Host-Lookup-Failed: Reverse DNS lookup failed for 2a00:1450:4864:20::42e (failed) Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=2a00:1450:4864:20::42e; envelope-from=arilou@gmail.com; helo=mail-wr1-x42e.google.com X-Spam_score_int: -12 X-Spam_score: -1.3 X-Spam_bar: - X-Spam_report: (-1.3 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, PDS_HP_HELO_NORDNS=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RDNS_NONE=0.793, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: pbonzini@redhat.com, vkuznets@redhat.com, Jon Doron Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: pass (identity @gmail.com) X-ZM-MESSAGEID: 1643969905223100001 Content-Type: text/plain; charset="utf-8" SynIc can be enabled regardless of the SControl mechanisim which can register a GSI for a given SintRoute. This behaviour can achived by setting enabling SIMP and then the guest will poll on the message slot. Once there is another message pending the host will set the message slot with the pending flag. When the guest polls from the message slot, incase the pending flag is set it will write to the HV_X64_MSR_EOM indicating it has cleared the slow and we can try and push our message again. Signed-off-by: Jon Doron --- hw/hyperv/hyperv.c | 233 ++++++++++++++++++++++++------------- include/hw/hyperv/hyperv.h | 2 + 2 files changed, 153 insertions(+), 82 deletions(-) diff --git a/hw/hyperv/hyperv.c b/hw/hyperv/hyperv.c index cb1074f234..88c9cc1334 100644 --- a/hw/hyperv/hyperv.c +++ b/hw/hyperv/hyperv.c @@ -27,18 +27,70 @@ struct SynICState { =20 CPUState *cs; =20 - bool enabled; + bool sctl_enabled; hwaddr msg_page_addr; hwaddr event_page_addr; MemoryRegion msg_page_mr; MemoryRegion event_page_mr; struct hyperv_message_page *msg_page; struct hyperv_event_flags_page *event_page; + + QemuMutex sint_routes_mutex; + QLIST_HEAD(, HvSintRoute) sint_routes; }; =20 #define TYPE_SYNIC "hyperv-synic" OBJECT_DECLARE_SIMPLE_TYPE(SynICState, SYNIC) =20 +/* + * KVM has its own message producers (SynIC timers). To guarantee + * serialization with both KVM vcpu and the guest cpu, the messages are fi= rst + * staged in an intermediate area and then posted to the SynIC message pag= e in + * the vcpu thread. + */ +typedef struct HvSintStagedMessage { + /* message content staged by hyperv_post_msg */ + struct hyperv_message msg; + /* callback + data (r/o) to complete the processing in a BH */ + HvSintMsgCb cb; + void *cb_data; + /* message posting status filled by cpu_post_msg */ + int status; + /* passing the buck: */ + enum { + /* initial state */ + HV_STAGED_MSG_FREE, + /* + * hyperv_post_msg (e.g. in main loop) grabs the staged area (FREE= -> + * BUSY), copies msg, and schedules cpu_post_msg on the assigned c= pu + */ + HV_STAGED_MSG_BUSY, + /* + * cpu_post_msg (vcpu thread) tries to copy staged msg to msg slot, + * notify the guest, records the status, marks the posting done (B= USY + * -> POSTED), and schedules sint_msg_bh BH + */ + HV_STAGED_MSG_POSTED, + /* + * sint_msg_bh (BH) verifies that the posting is done, runs the + * callback, and starts over (POSTED -> FREE) + */ + } state; +} HvSintStagedMessage; + +struct HvSintRoute { + uint32_t sint; + SynICState *synic; + int gsi; + EventNotifier sint_set_notifier; + EventNotifier sint_ack_notifier; + + HvSintStagedMessage *staged_msg; + + unsigned refcount; + QLIST_ENTRY(HvSintRoute) link; +}; + static bool synic_enabled; =20 bool hyperv_is_synic_enabled(void) @@ -51,11 +103,11 @@ static SynICState *get_synic(CPUState *cs) return SYNIC(object_resolve_path_component(OBJECT(cs), "synic")); } =20 -static void synic_update(SynICState *synic, bool enable, +static void synic_update(SynICState *synic, bool sctl_enable, hwaddr msg_page_addr, hwaddr event_page_addr) { =20 - synic->enabled =3D enable; + synic->sctl_enabled =3D sctl_enable; if (synic->msg_page_addr !=3D msg_page_addr) { if (synic->msg_page_addr) { memory_region_del_subregion(get_system_memory(), @@ -80,7 +132,7 @@ static void synic_update(SynICState *synic, bool enable, } } =20 -void hyperv_synic_update(CPUState *cs, bool enable, +void hyperv_synic_update(CPUState *cs, bool sctl_enable, hwaddr msg_page_addr, hwaddr event_page_addr) { SynICState *synic =3D get_synic(cs); @@ -89,7 +141,7 @@ void hyperv_synic_update(CPUState *cs, bool enable, return; } =20 - synic_update(synic, enable, msg_page_addr, event_page_addr); + synic_update(synic, sctl_enable, msg_page_addr, event_page_addr); } =20 static void synic_realize(DeviceState *dev, Error **errp) @@ -110,16 +162,20 @@ static void synic_realize(DeviceState *dev, Error **e= rrp) sizeof(*synic->event_page), &error_abort); synic->msg_page =3D memory_region_get_ram_ptr(&synic->msg_page_mr); synic->event_page =3D memory_region_get_ram_ptr(&synic->event_page_mr); + qemu_mutex_init(&synic->sint_routes_mutex); + QLIST_INIT(&synic->sint_routes); =20 g_free(msgp_name); g_free(eventp_name); } + static void synic_reset(DeviceState *dev) { SynICState *synic =3D SYNIC(dev); memset(synic->msg_page, 0, sizeof(*synic->msg_page)); memset(synic->event_page, 0, sizeof(*synic->event_page)); synic_update(synic, false, 0, 0); + assert(QLIST_EMPTY(&synic->sint_routes)); } =20 static void synic_class_init(ObjectClass *klass, void *data) @@ -168,54 +224,6 @@ static void synic_register_types(void) =20 type_init(synic_register_types) =20 -/* - * KVM has its own message producers (SynIC timers). To guarantee - * serialization with both KVM vcpu and the guest cpu, the messages are fi= rst - * staged in an intermediate area and then posted to the SynIC message pag= e in - * the vcpu thread. - */ -typedef struct HvSintStagedMessage { - /* message content staged by hyperv_post_msg */ - struct hyperv_message msg; - /* callback + data (r/o) to complete the processing in a BH */ - HvSintMsgCb cb; - void *cb_data; - /* message posting status filled by cpu_post_msg */ - int status; - /* passing the buck: */ - enum { - /* initial state */ - HV_STAGED_MSG_FREE, - /* - * hyperv_post_msg (e.g. in main loop) grabs the staged area (FREE= -> - * BUSY), copies msg, and schedules cpu_post_msg on the assigned c= pu - */ - HV_STAGED_MSG_BUSY, - /* - * cpu_post_msg (vcpu thread) tries to copy staged msg to msg slot, - * notify the guest, records the status, marks the posting done (B= USY - * -> POSTED), and schedules sint_msg_bh BH - */ - HV_STAGED_MSG_POSTED, - /* - * sint_msg_bh (BH) verifies that the posting is done, runs the - * callback, and starts over (POSTED -> FREE) - */ - } state; -} HvSintStagedMessage; - -struct HvSintRoute { - uint32_t sint; - SynICState *synic; - int gsi; - EventNotifier sint_set_notifier; - EventNotifier sint_ack_notifier; - - HvSintStagedMessage *staged_msg; - - unsigned refcount; -}; - static CPUState *hyperv_find_vcpu(uint32_t vp_index) { CPUState *cs =3D qemu_get_cpu(vp_index); @@ -259,7 +267,7 @@ static void cpu_post_msg(CPUState *cs, run_on_cpu_data = data) =20 assert(staged_msg->state =3D=3D HV_STAGED_MSG_BUSY); =20 - if (!synic->enabled || !synic->msg_page_addr) { + if (!synic->msg_page_addr) { staged_msg->status =3D -ENXIO; goto posted; } @@ -343,7 +351,7 @@ int hyperv_set_event_flag(HvSintRoute *sint_route, unsi= gned eventno) if (eventno > HV_EVENT_FLAGS_COUNT) { return -EINVAL; } - if (!synic->enabled || !synic->event_page_addr) { + if (!synic->sctl_enabled || !synic->event_page_addr) { return -ENXIO; } =20 @@ -364,11 +372,13 @@ int hyperv_set_event_flag(HvSintRoute *sint_route, un= signed eventno) HvSintRoute *hyperv_sint_route_new(uint32_t vp_index, uint32_t sint, HvSintMsgCb cb, void *cb_data) { - HvSintRoute *sint_route; - EventNotifier *ack_notifier; + HvSintRoute *sint_route =3D NULL; + EventNotifier *ack_notifier =3D NULL; int r, gsi; CPUState *cs; SynICState *synic; + bool ack_event_initialized =3D false, sint_notifier_initialized =3D fa= lse, + irqfd_initialized =3D false; =20 cs =3D hyperv_find_vcpu(vp_index); if (!cs) { @@ -381,57 +391,82 @@ HvSintRoute *hyperv_sint_route_new(uint32_t vp_index,= uint32_t sint, } =20 sint_route =3D g_new0(HvSintRoute, 1); - r =3D event_notifier_init(&sint_route->sint_set_notifier, false); - if (r) { - goto err; + if (!sint_route) { + goto cleanup_err; } =20 + sint_route->gsi =3D 0; + sint_route->synic =3D synic; + sint_route->sint =3D sint; + sint_route->refcount =3D 1; =20 ack_notifier =3D cb ? &sint_route->sint_ack_notifier : NULL; if (ack_notifier) { sint_route->staged_msg =3D g_new0(HvSintStagedMessage, 1); + if (!sint_route->staged_msg) { + goto cleanup_err; + } sint_route->staged_msg->cb =3D cb; sint_route->staged_msg->cb_data =3D cb_data; =20 r =3D event_notifier_init(ack_notifier, false); if (r) { - goto err_sint_set_notifier; + goto cleanup_err; } - event_notifier_set_handler(ack_notifier, sint_ack_handler); + ack_event_initialized =3D true; + } + + /* See if we are done or we need to setup a GSI for this SintRoute */ + if (!synic->sctl_enabled) { + goto cleanup; } =20 + /* We need to setup a GSI for this SintRoute */ + r =3D event_notifier_init(&sint_route->sint_set_notifier, false); + if (r) { + goto cleanup_err; + } + sint_notifier_initialized =3D true; + gsi =3D kvm_irqchip_add_hv_sint_route(kvm_state, vp_index, sint); if (gsi < 0) { - goto err_gsi; + goto cleanup_err; } + irqfd_initialized =3D true; =20 r =3D kvm_irqchip_add_irqfd_notifier_gsi(kvm_state, &sint_route->sint_set_notifier, ack_notifier, gsi); if (r) { - goto err_irqfd; + goto cleanup_err; } sint_route->gsi =3D gsi; - sint_route->synic =3D synic; - sint_route->sint =3D sint; - sint_route->refcount =3D 1; - +cleanup: + qemu_mutex_lock(&synic->sint_routes_mutex); + QLIST_INSERT_HEAD_RCU(&synic->sint_routes, sint_route, link); + qemu_mutex_unlock(&synic->sint_routes_mutex); return sint_route; =20 -err_irqfd: - kvm_irqchip_release_virq(kvm_state, gsi); -err_gsi: +cleanup_err: + if (irqfd_initialized) { + kvm_irqchip_release_virq(kvm_state, gsi); + } + + if (sint_notifier_initialized) { + event_notifier_cleanup(&sint_route->sint_set_notifier); + } + if (ack_notifier) { - event_notifier_set_handler(ack_notifier, NULL); - event_notifier_cleanup(ack_notifier); + if (ack_event_initialized) { + event_notifier_set_handler(ack_notifier, NULL); + event_notifier_cleanup(ack_notifier); + } + g_free(sint_route->staged_msg); } -err_sint_set_notifier: - event_notifier_cleanup(&sint_route->sint_set_notifier); -err: - g_free(sint_route); =20 + g_free(sint_route); return NULL; } =20 @@ -442,6 +477,8 @@ void hyperv_sint_route_ref(HvSintRoute *sint_route) =20 void hyperv_sint_route_unref(HvSintRoute *sint_route) { + SynICState *synic; + if (!sint_route) { return; } @@ -452,21 +489,33 @@ void hyperv_sint_route_unref(HvSintRoute *sint_route) return; } =20 - kvm_irqchip_remove_irqfd_notifier_gsi(kvm_state, - &sint_route->sint_set_notifier, - sint_route->gsi); - kvm_irqchip_release_virq(kvm_state, sint_route->gsi); + synic =3D sint_route->synic; + qemu_mutex_lock(&synic->sint_routes_mutex); + QLIST_REMOVE_RCU(sint_route, link); + qemu_mutex_unlock(&synic->sint_routes_mutex); + + if (sint_route->gsi) { + kvm_irqchip_remove_irqfd_notifier_gsi(kvm_state, + &sint_route->sint_set_notifi= er, + sint_route->gsi); + kvm_irqchip_release_virq(kvm_state, sint_route->gsi); + event_notifier_cleanup(&sint_route->sint_set_notifier); + } + if (sint_route->staged_msg) { event_notifier_set_handler(&sint_route->sint_ack_notifier, NULL); event_notifier_cleanup(&sint_route->sint_ack_notifier); g_free(sint_route->staged_msg); } - event_notifier_cleanup(&sint_route->sint_set_notifier); g_free(sint_route); } =20 int hyperv_sint_route_set_sint(HvSintRoute *sint_route) { + if (!sint_route->gsi) { + return 0; + } + return event_notifier_set(&sint_route->sint_set_notifier); } =20 @@ -529,6 +578,26 @@ int hyperv_set_msg_handler(uint32_t conn_id, HvMsgHand= ler handler, void *data) return ret; } =20 +int hyperv_synic_eom(CPUState *cs) +{ + SynICState *synic =3D get_synic(cs); + HvSintRoute *sint_route; + + if (!synic) { + return -1; + } + + qemu_mutex_lock(&synic->sint_routes_mutex); + QLIST_FOREACH(sint_route, &synic->sint_routes, link) { + /* Try to complete every SintRoute */ + aio_bh_schedule_oneshot(qemu_get_aio_context(), sint_msg_bh, + sint_route); + } + qemu_mutex_unlock(&synic->sint_routes_mutex); + + return 0; +} + uint16_t hyperv_hcall_post_message(uint64_t param, bool fast) { uint16_t ret; diff --git a/include/hw/hyperv/hyperv.h b/include/hw/hyperv/hyperv.h index a63ee0003c..ef9f6b6c09 100644 --- a/include/hw/hyperv/hyperv.h +++ b/include/hw/hyperv/hyperv.h @@ -28,6 +28,8 @@ void hyperv_sint_route_unref(HvSintRoute *sint_route); =20 int hyperv_sint_route_set_sint(HvSintRoute *sint_route); =20 +int hyperv_synic_eom(CPUState *cs); + /* * Submit a message to be posted in vcpu context. If the submission succe= eds, * the status of posting the message is reported via the callback associat= ed --=20 2.34.1 From nobody Sun Feb 8 09:11:07 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=gmail.com ARC-Seal: i=1; a=rsa-sha256; t=1643970599; cv=none; d=zohomail.com; s=zohoarc; b=RqzqYSKX++aAxWNAdNSqT17oV/WbGwZKMDAhTcc5Xc8KGvu2viIrIkloOiVAE4dJig5IlnEWFZC13SITGgXFe4sYTLq86bFYV8iAiS8vtsuHX3EH+emBpRe2WXn1SPGWyeNk7e0rdMCNizh7dYuQSZY7yMiD+sy3ZmmsNBI9Dwc= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1643970599; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=b1XWnjDcCbZm2gwImaeo2S68uMNinomIBhWrSxvxoDE=; b=C40qjiSjLQ0879/48VTWjhubtUp5BwiIRKR04zYRSywqCtFNCDo1ZjhfdERYf9aEqN51A4qIKrb+HlfvUurtk/AhQy4iW7di+s2Eis9viGRMlC0OLRZ1PkJDNEDBFgQxynjPgMGC4VV92WqhCSxm9PbPu0oniyaof4XdLeNI0bU= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1643970599488450.658586837125; Fri, 4 Feb 2022 02:29:59 -0800 (PST) Received: from localhost ([::1]:55940 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1nFvqn-0005gR-Ri for importer@patchew.org; Fri, 04 Feb 2022 05:29:57 -0500 Received: from eggs.gnu.org ([209.51.188.92]:39520) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1nFvVU-0002d1-EV for qemu-devel@nongnu.org; Fri, 04 Feb 2022 05:07:57 -0500 Received: from [2a00:1450:4864:20::436] (port=33488 helo=mail-wr1-x436.google.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1nFvVS-0000kI-Fb for qemu-devel@nongnu.org; Fri, 04 Feb 2022 05:07:56 -0500 Received: by mail-wr1-x436.google.com with SMTP id e8so10393567wrc.0 for ; Fri, 04 Feb 2022 02:07:54 -0800 (PST) Received: from localhost.localdomain ([2a0d:6fc2:4af1:7d00:5e41:a6ea:ffaa:548c]) by smtp.gmail.com with ESMTPSA id u18sm657227wrn.110.2022.02.04.02.07.51 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 04 Feb 2022 02:07:52 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=b1XWnjDcCbZm2gwImaeo2S68uMNinomIBhWrSxvxoDE=; b=fokLoMQQSexAaQJbWD4IU9lu5oBzKpjivqjgfvmeCFo28pTIEXKWYcD6CUJVxjW0es 7vvU0bvytkhGCcgvVQnCl0fQzYcwkVt7CehItdhBAFy1SuVtkdQvq+bUgFUs8dRp1vD+ EaAcbNa8DWtH0cm22M/p2Vs2yhAw5bkZA5Vluv1KKUrr1xEAAvb4gvmOElkHJqUFmW7o 8fHvCakXclIl8mdWyUugOxLRslbG5kmR8Zk+31LoZAgzfiZ5b2TUHbd8P4NM33DU+rWM 3JidNcv35k83li1JKtWDPQB8wZu1uBURH2pEa1eu3paOpuOSyg51ywPjdyK87hpfRbio kAAw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=b1XWnjDcCbZm2gwImaeo2S68uMNinomIBhWrSxvxoDE=; b=i4Q7Et9w5TsBqrTRiglTSY2PV/D6Lyvjke4+5AWU70aEX4RgpKMhiMAXsXveGUSYWo TeHDdUEJyjJ34VvhUDrTb+BFrnFWQMYb9A3+LBb8J7uBLANSvW+KumEftRo6RxBdTer5 tONgylXdJwMMnAtnDqEJWIi7Zpf/IP9u8PtF6h1dFaDztMrqYa55UyG9n6NMHz0+CviB pSu7zovDfB/2fK0IsRwNgrgcPFo+6jnlbgWRTd9ctZh69i7c9CVv058hlA+XL/eL3chJ 7T6wtOW4qr+XxX+ujRx01GaPrf43j/K/NVWL4LS6lQRCSHY3deszfjTq4Hx1SNCHqQMP snpA== X-Gm-Message-State: AOAM5302pPgT9/MB5nRUxhSsf1q1cDaoPRrXUzhSXiNtZlU3RF0iputB mCCp+NG9DypeWFFCFav92yA5P8JbPAA= X-Google-Smtp-Source: ABdhPJzMt+EHqRGzG9OJvRPSmYMXENvw670+raG2ZvQXcp3FHM+am9873k+snCeuaDit5s9X5IOZwA== X-Received: by 2002:a05:6000:18a1:: with SMTP id b1mr1781811wri.403.1643969272978; Fri, 04 Feb 2022 02:07:52 -0800 (PST) From: Jon Doron To: qemu-devel@nongnu.org Subject: [PATCH v1 2/4] hyperv: Add definitions for syndbg Date: Fri, 4 Feb 2022 12:07:21 +0200 Message-Id: <20220204100723.406121-3-arilou@gmail.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220204100723.406121-1-arilou@gmail.com> References: <20220204100723.406121-1-arilou@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Host-Lookup-Failed: Reverse DNS lookup failed for 2a00:1450:4864:20::436 (failed) Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=2a00:1450:4864:20::436; envelope-from=arilou@gmail.com; helo=mail-wr1-x436.google.com X-Spam_score_int: -12 X-Spam_score: -1.3 X-Spam_bar: - X-Spam_report: (-1.3 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, PDS_HP_HELO_NORDNS=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RDNS_NONE=0.793, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: pbonzini@redhat.com, vkuznets@redhat.com, Jon Doron Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: pass (identity @gmail.com) X-ZM-MESSAGEID: 1643970601809100001 Content-Type: text/plain; charset="utf-8" Add all required definitions for hyperv synthetic debugger interface. Signed-off-by: Jon Doron --- include/hw/hyperv/hyperv-proto.h | 52 ++++++++++++++++++++++++++++++++ target/i386/kvm/hyperv-proto.h | 37 +++++++++++++++++++++++ 2 files changed, 89 insertions(+) diff --git a/include/hw/hyperv/hyperv-proto.h b/include/hw/hyperv/hyperv-pr= oto.h index 21dc28aee9..94c9658eb0 100644 --- a/include/hw/hyperv/hyperv-proto.h +++ b/include/hw/hyperv/hyperv-proto.h @@ -24,12 +24,17 @@ #define HV_STATUS_INVALID_PORT_ID 17 #define HV_STATUS_INVALID_CONNECTION_ID 18 #define HV_STATUS_INSUFFICIENT_BUFFERS 19 +#define HV_STATUS_NOT_ACKNOWLEDGED 20 +#define HV_STATUS_NO_DATA 27 =20 /* * Hypercall numbers */ #define HV_POST_MESSAGE 0x005c #define HV_SIGNAL_EVENT 0x005d +#define HV_POST_DEBUG_DATA 0x0069 +#define HV_RETREIVE_DEBUG_DATA 0x006a +#define HV_RESET_DEBUG_SESSION 0x006b #define HV_HYPERCALL_FAST (1u << 16) =20 /* @@ -127,4 +132,51 @@ struct hyperv_event_flags_page { struct hyperv_event_flags slot[HV_SINT_COUNT]; }; =20 +/* + * Kernel debugger structures + */ + +/* Options flags for hyperv_reset_debug_session */ +#define HV_DEBUG_PURGE_INCOMING_DATA 0x00000001 +#define HV_DEBUG_PURGE_OUTGOING_DATA 0x00000002 +struct hyperv_reset_debug_session_input { + uint32_t options; +} __attribute__ ((__packed__)); + +struct hyperv_reset_debug_session_output { + uint32_t host_ip; + uint32_t target_ip; + uint16_t host_port; + uint16_t target_port; + uint8_t host_mac[6]; + uint8_t target_mac[6]; +} __attribute__ ((__packed__)); + +/* Options for hyperv_post_debug_data */ +#define HV_DEBUG_POST_LOOP 0x00000001 + +struct hyperv_post_debug_data_input { + uint32_t count; + uint32_t options; + /*uint8_t data[HV_HYP_PAGE_SIZE - 2 * sizeof(uint32_t)];*/ +} __attribute__ ((__packed__)); + +struct hyperv_post_debug_data_output { + uint32_t pending_count; +} __attribute__ ((__packed__)); + +/* Options for hyperv_retrieve_debug_data */ +#define HV_DEBUG_RETRIEVE_LOOP 0x00000001 +#define HV_DEBUG_RETRIEVE_TEST_ACTIVITY 0x00000002 + +struct hyperv_retrieve_debug_data_input { + uint32_t count; + uint32_t options; + uint64_t timeout; +} __attribute__ ((__packed__)); + +struct hyperv_retrieve_debug_data_output { + uint32_t retrieved_count; + uint32_t remaining_count; +} __attribute__ ((__packed__)); #endif diff --git a/target/i386/kvm/hyperv-proto.h b/target/i386/kvm/hyperv-proto.h index 89f81afda7..9480bcdf04 100644 --- a/target/i386/kvm/hyperv-proto.h +++ b/target/i386/kvm/hyperv-proto.h @@ -19,6 +19,9 @@ #define HV_CPUID_ENLIGHTMENT_INFO 0x40000004 #define HV_CPUID_IMPLEMENT_LIMITS 0x40000005 #define HV_CPUID_NESTED_FEATURES 0x4000000A +#define HV_CPUID_SYNDBG_VENDOR_AND_MAX_FUNCTIONS 0x40000080 +#define HV_CPUID_SYNDBG_INTERFACE 0x40000081 +#define HV_CPUID_SYNDBG_PLATFORM_CAPABILITIES 0x40000082 #define HV_CPUID_MIN 0x40000005 #define HV_CPUID_MAX 0x4000ffff #define HV_HYPERVISOR_PRESENT_BIT 0x80000000 @@ -55,8 +58,14 @@ #define HV_GUEST_IDLE_STATE_AVAILABLE (1u << 5) #define HV_FREQUENCY_MSRS_AVAILABLE (1u << 8) #define HV_GUEST_CRASH_MSR_AVAILABLE (1u << 10) +#define HV_FEATURE_DEBUG_MSRS_AVAILABLE (1u << 11) #define HV_STIMER_DIRECT_MODE_AVAILABLE (1u << 19) =20 +/* + * HV_CPUID_FEATURES.EBX bits + */ +#define HV_PARTITION_DEUBGGING_ALLOWED (1u << 12) + /* * HV_CPUID_ENLIGHTMENT_INFO.EAX bits */ @@ -72,6 +81,11 @@ #define HV_ENLIGHTENED_VMCS_RECOMMENDED (1u << 14) #define HV_NO_NONARCH_CORESHARING (1u << 18) =20 +/* + * HV_CPUID_SYNDBG_PLATFORM_CAPABILITIES.EAX bits + */ +#define HV_SYNDBG_CAP_ALLOW_KERNEL_DEBUGGING (1u << 1) + /* * Basic virtualized MSRs */ @@ -130,6 +144,18 @@ #define HV_X64_MSR_STIMER3_CONFIG 0x400000B6 #define HV_X64_MSR_STIMER3_COUNT 0x400000B7 =20 +/* + * Hyper-V Synthetic debug options MSR + */ +#define HV_X64_MSR_SYNDBG_CONTROL 0x400000F1 +#define HV_X64_MSR_SYNDBG_STATUS 0x400000F2 +#define HV_X64_MSR_SYNDBG_SEND_BUFFER 0x400000F3 +#define HV_X64_MSR_SYNDBG_RECV_BUFFER 0x400000F4 +#define HV_X64_MSR_SYNDBG_PENDING_BUFFER 0x400000F5 +#define HV_X64_MSR_SYNDBG_OPTIONS 0x400000FF + +#define HV_X64_SYNDBG_OPTION_USE_HCALLS BIT(2) + /* * Guest crash notification MSRs */ @@ -168,5 +194,16 @@ =20 #define HV_STIMER_COUNT 4 =20 +/* + * Synthetic debugger control definitions + */ +#define HV_SYNDBG_CONTROL_SEND (1u << 0) +#define HV_SYNDBG_CONTROL_RECV (1u << 1) +#define HV_SYNDBG_CONTROL_SEND_SIZE(ctl) ((ctl >> 16) & 0xffff) +#define HV_SYNDBG_STATUS_INVALID (0) +#define HV_SYNDBG_STATUS_SEND_SUCCESS (1u << 0) +#define HV_SYNDBG_STATUS_RECV_SUCCESS (1u << 2) +#define HV_SYNDBG_STATUS_RESET (1u << 3) +#define HV_SYNDBG_STATUS_SET_SIZE(st, sz) (st | (sz << 16)) =20 #endif --=20 2.34.1 From nobody Sun Feb 8 09:11:07 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=gmail.com ARC-Seal: i=1; a=rsa-sha256; t=1643969550; cv=none; d=zohomail.com; s=zohoarc; b=RZreVozmsDClILEGBOMAbQqGQw2lUHvReyr+0/6KwLYsb4HWBJx1XPphsRqS99TZ9Q7RoBaN5I5hOJXHSvewJ5afU4sX6lS199WR9QguyuQwHYlJLh6azWYQigfr89X0BaaVKp98yvPz4UnSrhCUvGdgsrCYXsqyytxk7DcGSKo= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1643969550; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=fe73YI0ae9DKZRIzMcZuuOzL10GmzZwem/yBE+DlZCQ=; b=Wo2iQ/22mDa2EtjGXd55wBoQDJTP+1RrnUz/xCIceFeCrYVpU7VusiETObQOgMc9Lu4CHY/Fr2eU2HxOsimTXKutBwBiwT1tBmBlfKc/1flODVPD9QOokekuHcm+xcI3ZYKosQ24w8XchPYCCchVWgdXFIRJysLdRFuapEcsNRU= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1643969550977635.4583947397754; Fri, 4 Feb 2022 02:12:30 -0800 (PST) Received: from localhost ([::1]:60588 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1nFvZt-0005ZI-1J for importer@patchew.org; Fri, 04 Feb 2022 05:12:29 -0500 Received: from eggs.gnu.org ([209.51.188.92]:39566) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1nFvVX-0002fg-7m for qemu-devel@nongnu.org; Fri, 04 Feb 2022 05:07:59 -0500 Received: from [2a00:1450:4864:20::329] (port=34522 helo=mail-wm1-x329.google.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1nFvVT-0000lV-TE for qemu-devel@nongnu.org; Fri, 04 Feb 2022 05:07:58 -0500 Received: by mail-wm1-x329.google.com with SMTP id bg19-20020a05600c3c9300b0034565e837b6so4787259wmb.1 for ; Fri, 04 Feb 2022 02:07:55 -0800 (PST) Received: from localhost.localdomain ([2a0d:6fc2:4af1:7d00:5e41:a6ea:ffaa:548c]) by smtp.gmail.com with ESMTPSA id u18sm657227wrn.110.2022.02.04.02.07.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 04 Feb 2022 02:07:53 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=fe73YI0ae9DKZRIzMcZuuOzL10GmzZwem/yBE+DlZCQ=; b=hDhkmLQiNdD+Wjtl/NM9/53GqSgiNWvRJg6dquW1ILRjrqMOQCtgMrsquFL4q352/c rZbeRmFVrkzB5R7EgAI2OmlPWFf6DQvl3/NhTP+9QoCJDMLR38ZE8+q3med3bZz+VRlD W4EG2E9yM0M+4TW3NjbksVJWvpjeodWKfv+E+wDAWYaBsIr0Cwc9MFtJyRvcJyCoaRgy +HrhwvWm9WPEM+W6PgPyRxspQf1xYUS9HCzS/oYSnA0K4WIuA1PRfXMGc9QYoriRzmr3 7fiakl7r2VMWPcPKRb/a7TMDYD80CGMuen9VMXJZ10F5q90NFnALdhe8ilsf+/jKwCtP ijuQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=fe73YI0ae9DKZRIzMcZuuOzL10GmzZwem/yBE+DlZCQ=; b=ie8YfBGCmGFQHW6gvyIoOjpqv4Z+rCFBPppFUVcWmmcvLVmvWtfn1V5Mnfe69Kd6PZ 0xzEzSV61UJutq/d5YDkqnJQAj/jQD2UH5sisrEsKxXqXmLnH95cy0nO9SGo4Wvjlp6a vdnBDoEYpY132OVO3jJhQNCaBQIceLKsm9RyLbjIe4H8db98OiaT8PSWjk8GHJU6sYHJ FMvN1vCAyRJNq0E+zeN4Ql36YYiQK8XsRtIpUeQWmlVHu+cVL0kwkPZTJa4rnXQs74dL z8vIWC7od+1ZlLGvBaSXAzt5LWTYAL6Sq3LvQ7MYOaa+6FmlZfRZBPyIM2ONQuCZW4BZ fJvA== X-Gm-Message-State: AOAM530TAsOtDLgKsFZYLeIue852DbhH5iW+wWgqgCRs4L7+wiJKvL7o FSfzJA2LYwmh6ynrcHs8oE94QZ6t1uk= X-Google-Smtp-Source: ABdhPJxpolTFldMJKEHL3ou1DdPO1egdXtH9+Lx8j1PyGGXPKRcAH53XsSIAGIPeh4GLNdN5eoik+g== X-Received: by 2002:a05:600c:687:: with SMTP id a7mr1655107wmn.104.1643969274125; Fri, 04 Feb 2022 02:07:54 -0800 (PST) From: Jon Doron To: qemu-devel@nongnu.org Subject: [PATCH v1 3/4] hyperv: Add support to process syndbg commands Date: Fri, 4 Feb 2022 12:07:22 +0200 Message-Id: <20220204100723.406121-4-arilou@gmail.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220204100723.406121-1-arilou@gmail.com> References: <20220204100723.406121-1-arilou@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Host-Lookup-Failed: Reverse DNS lookup failed for 2a00:1450:4864:20::329 (failed) Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=2a00:1450:4864:20::329; envelope-from=arilou@gmail.com; helo=mail-wm1-x329.google.com X-Spam_score_int: -12 X-Spam_score: -1.3 X-Spam_bar: - X-Spam_report: (-1.3 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, PDS_HP_HELO_NORDNS=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RDNS_NONE=0.793, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: pbonzini@redhat.com, vkuznets@redhat.com, Jon Doron Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: pass (identity @gmail.com) X-ZM-MESSAGEID: 1643969551425100001 Content-Type: text/plain; charset="utf-8" SynDbg commands can come from two different flows: 1. Hypercalls, in this mode the data being sent is fully encapsulated network packets. 2. SynDbg specific MSRs, in this mode only the data that needs to be transfered is passed. Signed-off-by: Jon Doron --- docs/hyperv.txt | 15 +++ hw/hyperv/hyperv.c | 242 ++++++++++++++++++++++++++++++++++ include/hw/hyperv/hyperv.h | 58 ++++++++ target/i386/cpu.c | 2 + target/i386/cpu.h | 7 + target/i386/kvm/hyperv-stub.c | 6 + target/i386/kvm/hyperv.c | 52 +++++++- target/i386/kvm/kvm.c | 76 ++++++++++- 8 files changed, 450 insertions(+), 8 deletions(-) diff --git a/docs/hyperv.txt b/docs/hyperv.txt index 0417c183a3..7abc1b2d89 100644 --- a/docs/hyperv.txt +++ b/docs/hyperv.txt @@ -225,6 +225,21 @@ default (WS2016). Note: hv-version-id-* are not enlightenments and thus don't enable Hyper-V identification when specified without any other enlightenments. =20 +3.21. hv-syndbg +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D +Enables Hyper-V synthetic debugger interface, this is a special interface = used +by Windows Kernel debugger to send the packets through, rather than sending +them via serial/network . +Whe enabled, this enlightenment provides additional communication faciliti= es +to the guest: SynDbg messages. +This new communication is used by Windows Kernel debugger rather than send= ing +packets via serial/network, adding significant performance boost over the = other +comm channels. +This enlightenment requires a VMBus device (-device vmbus-bridge,irq=3D15) +and the follow enlightenments to work: +hv-relaxed,hv_time,hv-vapic,hv-vpindex,hv-synic,hv-runtime,hv-stimer + + 4. Supplementary features =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D =20 diff --git a/hw/hyperv/hyperv.c b/hw/hyperv/hyperv.c index 88c9cc1334..c86e2aa02e 100644 --- a/hw/hyperv/hyperv.c +++ b/hw/hyperv/hyperv.c @@ -730,3 +730,245 @@ uint16_t hyperv_hcall_signal_event(uint64_t param, bo= ol fast) } return HV_STATUS_INVALID_CONNECTION_ID; } + +static HvSynDbgHandler hv_syndbg_handler; +static void *hv_syndbg_context; +void hyperv_set_syndbg_handler(HvSynDbgHandler handler, void *context) +{ + assert(!hv_syndbg_handler); + hv_syndbg_handler =3D handler; + hv_syndbg_context =3D context; +} + +uint16_t hyperv_hcall_reset_dbg_session(uint64_t outgpa) +{ + uint16_t ret; + HvSynDbgMsg msg; + struct hyperv_reset_debug_session_output *reset_dbg_session =3D NULL; + hwaddr len; + + if (!hv_syndbg_handler) { + ret =3D HV_STATUS_INVALID_HYPERCALL_CODE; + goto cleanup; + } + + len =3D sizeof(*reset_dbg_session); + reset_dbg_session =3D cpu_physical_memory_map(outgpa, &len, 1); + if (!reset_dbg_session || len < sizeof(*reset_dbg_session)) { + ret =3D HV_STATUS_INSUFFICIENT_MEMORY; + goto cleanup; + } + + msg.type =3D HV_SYNDBG_MSG_CONNECTION_INFO; + ret =3D hv_syndbg_handler(hv_syndbg_context, &msg); + if (ret) { + goto cleanup; + } + + reset_dbg_session->host_ip =3D msg.u.connection_info.host_ip; + reset_dbg_session->host_port =3D msg.u.connection_info.host_port; + /* The following fields are only used as validation for KDVM */ + memset(&reset_dbg_session->host_mac, 0, + sizeof(reset_dbg_session->host_mac)); + reset_dbg_session->target_ip =3D msg.u.connection_info.host_ip; + reset_dbg_session->target_port =3D msg.u.connection_info.host_port; + memset(&reset_dbg_session->target_mac, 0, + sizeof(reset_dbg_session->target_mac)); +cleanup: + if (reset_dbg_session) { + cpu_physical_memory_unmap(reset_dbg_session, + sizeof(*reset_dbg_session), 1, len); + } + + return ret; +} + +uint16_t hyperv_hcall_retreive_dbg_data(uint64_t ingpa, uint64_t outgpa, + bool fast) +{ + uint16_t ret; + struct hyperv_retrieve_debug_data_input *debug_data_in =3D NULL; + struct hyperv_retrieve_debug_data_output *debug_data_out =3D NULL; + hwaddr in_len, out_len; + HvSynDbgMsg msg; + + if (fast || !hv_syndbg_handler) { + ret =3D HV_STATUS_INVALID_HYPERCALL_CODE; + goto cleanup; + } + + in_len =3D sizeof(*debug_data_in); + debug_data_in =3D cpu_physical_memory_map(ingpa, &in_len, 0); + if (!debug_data_in || in_len < sizeof(*debug_data_in)) { + ret =3D HV_STATUS_INSUFFICIENT_MEMORY; + goto cleanup; + } + + out_len =3D sizeof(*debug_data_out); + debug_data_out =3D cpu_physical_memory_map(outgpa, &out_len, 1); + if (!debug_data_out || out_len < sizeof(*debug_data_out)) { + ret =3D HV_STATUS_INSUFFICIENT_MEMORY; + goto cleanup; + } + + msg.type =3D HV_SYNDBG_MSG_RECV; + msg.u.recv.buf_gpa =3D outgpa + sizeof(*debug_data_out); + msg.u.recv.count =3D TARGET_PAGE_SIZE - sizeof(*debug_data_out); + msg.u.recv.options =3D debug_data_in->options; + msg.u.recv.timeout =3D debug_data_in->timeout; + msg.u.recv.is_raw =3D true; + ret =3D hv_syndbg_handler(hv_syndbg_context, &msg); + if (ret =3D=3D HV_STATUS_NO_DATA) { + debug_data_out->retrieved_count =3D 0; + debug_data_out->remaining_count =3D debug_data_in->count; + goto cleanup; + } else if (ret !=3D HV_STATUS_SUCCESS) { + goto cleanup; + } + + debug_data_out->retrieved_count =3D msg.u.recv.retrieved_count; + debug_data_out->remaining_count =3D + debug_data_in->count - msg.u.recv.retrieved_count; +cleanup: + if (debug_data_out) { + cpu_physical_memory_unmap(debug_data_out, sizeof(*debug_data_out),= 1, + out_len); + } + + if (debug_data_in) { + cpu_physical_memory_unmap(debug_data_in, sizeof(*debug_data_in), 0, + in_len); + } + + return ret; +} + +uint16_t hyperv_hcall_post_dbg_data(uint64_t ingpa, uint64_t outgpa, bool = fast) +{ + uint16_t ret; + struct hyperv_post_debug_data_input *post_data_in =3D NULL; + struct hyperv_post_debug_data_output *post_data_out =3D NULL; + hwaddr in_len, out_len; + HvSynDbgMsg msg; + + if (fast || !hv_syndbg_handler) { + ret =3D HV_STATUS_INVALID_HYPERCALL_CODE; + goto cleanup; + } + + in_len =3D sizeof(*post_data_in); + post_data_in =3D cpu_physical_memory_map(ingpa, &in_len, 0); + if (!post_data_in || in_len < sizeof(*post_data_in)) { + ret =3D HV_STATUS_INSUFFICIENT_MEMORY; + goto cleanup; + } + + if (post_data_in->count > TARGET_PAGE_SIZE - sizeof(*post_data_in)) { + ret =3D HV_STATUS_INVALID_PARAMETER; + goto cleanup; + } + + out_len =3D sizeof(*post_data_out); + post_data_out =3D cpu_physical_memory_map(outgpa, &out_len, 1); + if (!post_data_out || out_len < sizeof(*post_data_out)) { + ret =3D HV_STATUS_INSUFFICIENT_MEMORY; + goto cleanup; + } + + msg.type =3D HV_SYNDBG_MSG_SEND; + msg.u.send.buf_gpa =3D ingpa + sizeof(*post_data_in); + msg.u.send.count =3D post_data_in->count; + msg.u.send.is_raw =3D true; + ret =3D hv_syndbg_handler(hv_syndbg_context, &msg); + if (ret !=3D HV_STATUS_SUCCESS) { + goto cleanup; + } + + post_data_out->pending_count =3D msg.u.send.pending_count; + ret =3D post_data_out->pending_count ? HV_STATUS_INSUFFICIENT_BUFFERS : + HV_STATUS_SUCCESS; +cleanup: + if (post_data_out) { + cpu_physical_memory_unmap(post_data_out, + sizeof(*post_data_out), 1, out_len); + } + + if (post_data_in) { + cpu_physical_memory_unmap(post_data_in, + sizeof(*post_data_in), 0, in_len); + } + + return ret; +} + +uint32_t hyperv_syndbg_send(uint64_t ingpa, uint32_t count) +{ + HvSynDbgMsg msg; + + if (!hv_syndbg_handler) { + return HV_SYNDBG_STATUS_INVALID; + } + + msg.type =3D HV_SYNDBG_MSG_SEND; + msg.u.send.buf_gpa =3D ingpa; + msg.u.send.count =3D count; + msg.u.send.is_raw =3D false; + if (hv_syndbg_handler(hv_syndbg_context, &msg)) { + return HV_SYNDBG_STATUS_INVALID; + } + + return HV_SYNDBG_STATUS_SEND_SUCCESS; +} + +uint32_t hyperv_syndbg_recv(uint64_t ingpa, uint32_t count) +{ + uint16_t ret; + HvSynDbgMsg msg; + + if (!hv_syndbg_handler) { + return HV_SYNDBG_STATUS_INVALID; + } + + msg.type =3D HV_SYNDBG_MSG_RECV; + msg.u.recv.buf_gpa =3D ingpa; + msg.u.recv.count =3D count; + msg.u.recv.options =3D 0; + msg.u.recv.timeout =3D 0; + msg.u.recv.is_raw =3D false; + ret =3D hv_syndbg_handler(hv_syndbg_context, &msg); + if (ret !=3D HV_STATUS_SUCCESS) { + return 0; + } + + return HV_SYNDBG_STATUS_SET_SIZE(HV_SYNDBG_STATUS_RECV_SUCCESS, + msg.u.recv.retrieved_count); +} + +void hyperv_syndbg_set_pending_page(uint64_t ingpa) +{ + HvSynDbgMsg msg; + + if (!hv_syndbg_handler) { + return; + } + + msg.type =3D HV_SYNDBG_MSG_SET_PENDING_PAGE; + msg.u.pending_page.buf_gpa =3D ingpa; + hv_syndbg_handler(hv_syndbg_context, &msg); +} + +uint64_t hyperv_syndbg_query_options(void) +{ + HvSynDbgMsg msg; + + if (!hv_syndbg_handler) { + return 0; + } + + msg.type =3D HV_SYNDBG_MSG_QUERY_OPTIONS; + if (hv_syndbg_handler(hv_syndbg_context, &msg) !=3D HV_STATUS_SUCCESS)= { + return 0; + } + + return msg.u.query_options.options; +} diff --git a/include/hw/hyperv/hyperv.h b/include/hw/hyperv/hyperv.h index ef9f6b6c09..e7a85156b0 100644 --- a/include/hw/hyperv/hyperv.h +++ b/include/hw/hyperv/hyperv.h @@ -83,4 +83,62 @@ void hyperv_synic_update(CPUState *cs, bool enable, hwaddr msg_page_addr, hwaddr event_page_addr); bool hyperv_is_synic_enabled(void); =20 +/* + * Process HVCALL_RESET_DEBUG_SESSION hypercall. + */ +uint16_t hyperv_hcall_reset_dbg_session(uint64_t outgpa); +/* + * Process HVCALL_RETREIVE_DEBUG_DATA hypercall. + */ +uint16_t hyperv_hcall_retreive_dbg_data(uint64_t ingpa, uint64_t outgpa, + bool fast); +/* + * Process HVCALL_POST_DEBUG_DATA hypercall. + */ +uint16_t hyperv_hcall_post_dbg_data(uint64_t ingpa, uint64_t outgpa, bool = fast); + +uint32_t hyperv_syndbg_send(uint64_t ingpa, uint32_t count); +uint32_t hyperv_syndbg_recv(uint64_t ingpa, uint32_t count); +void hyperv_syndbg_set_pending_page(uint64_t ingpa); +uint64_t hyperv_syndbg_query_options(void); + +typedef enum HvSynthDbgMsgType { + HV_SYNDBG_MSG_CONNECTION_INFO, + HV_SYNDBG_MSG_SEND, + HV_SYNDBG_MSG_RECV, + HV_SYNDBG_MSG_SET_PENDING_PAGE, + HV_SYNDBG_MSG_QUERY_OPTIONS +} HvDbgSynthMsgType; + +typedef struct HvSynDbgMsg { + HvDbgSynthMsgType type; + union { + struct { + uint32_t host_ip; + uint16_t host_port; + } connection_info; + struct { + uint64_t buf_gpa; + uint32_t count; + uint32_t pending_count; + bool is_raw; + } send; + struct { + uint64_t buf_gpa; + uint32_t count; + uint32_t options; + uint64_t timeout; + uint32_t retrieved_count; + bool is_raw; + } recv; + struct { + uint64_t buf_gpa; + } pending_page; + struct { + uint64_t options; + } query_options; + } u; +} HvSynDbgMsg; +typedef uint16_t (*HvSynDbgHandler)(void *context, HvSynDbgMsg *msg); +void hyperv_set_syndbg_handler(HvSynDbgHandler handler, void *context); #endif diff --git a/target/i386/cpu.c b/target/i386/cpu.c index aa9e636800..9529a6389a 100644 --- a/target/i386/cpu.c +++ b/target/i386/cpu.c @@ -6841,6 +6841,8 @@ static Property x86_cpu_properties[] =3D { HYPERV_FEAT_AVIC, 0), DEFINE_PROP_ON_OFF_AUTO("hv-no-nonarch-coresharing", X86CPU, hyperv_no_nonarch_cs, ON_OFF_AUTO_OFF), + DEFINE_PROP_BIT64("hv-syndbg", X86CPU, hyperv_features, + HYPERV_FEAT_SYNDBG, 0), DEFINE_PROP_BOOL("hv-passthrough", X86CPU, hyperv_passthrough, false), DEFINE_PROP_BOOL("hv-enforce-cpuid", X86CPU, hyperv_enforce_cpuid, fal= se), =20 diff --git a/target/i386/cpu.h b/target/i386/cpu.h index 9911d7c871..56e0317924 100644 --- a/target/i386/cpu.h +++ b/target/i386/cpu.h @@ -1060,6 +1060,7 @@ typedef uint64_t FeatureWordArray[FEATURE_WORDS]; #define HYPERV_FEAT_IPI 13 #define HYPERV_FEAT_STIMER_DIRECT 14 #define HYPERV_FEAT_AVIC 15 +#define HYPERV_FEAT_SYNDBG 16 =20 #ifndef HYPERV_SPINLOCK_NEVER_NOTIFY #define HYPERV_SPINLOCK_NEVER_NOTIFY 0xFFFFFFFF @@ -1560,6 +1561,12 @@ typedef struct CPUX86State { uint64_t msr_hv_hypercall; uint64_t msr_hv_guest_os_id; uint64_t msr_hv_tsc; + uint64_t msr_hv_syndbg_control; + uint64_t msr_hv_syndbg_status; + uint64_t msr_hv_syndbg_send_page; + uint64_t msr_hv_syndbg_recv_page; + uint64_t msr_hv_syndbg_pending_page; + uint64_t msr_hv_syndbg_options; =20 /* Per-VCPU HV MSRs */ uint64_t msr_hv_vapic; diff --git a/target/i386/kvm/hyperv-stub.c b/target/i386/kvm/hyperv-stub.c index 0028527e79..778ed782e6 100644 --- a/target/i386/kvm/hyperv-stub.c +++ b/target/i386/kvm/hyperv-stub.c @@ -27,6 +27,12 @@ int kvm_hv_handle_exit(X86CPU *cpu, struct kvm_hyperv_ex= it *exit) return 0; case KVM_EXIT_HYPERV_HCALL: exit->u.hcall.result =3D HV_STATUS_INVALID_HYPERCALL_CODE; + return 0; + case KVM_EXIT_HYPERV_SYNDBG: + if (!hyperv_feat_enabled(cpu, HYPERV_FEAT_SYNDBG)) { + return -1; + } + return 0; default: return -1; diff --git a/target/i386/kvm/hyperv.c b/target/i386/kvm/hyperv.c index 26efc1e0e6..a70f695205 100644 --- a/target/i386/kvm/hyperv.c +++ b/target/i386/kvm/hyperv.c @@ -81,20 +81,66 @@ int kvm_hv_handle_exit(X86CPU *cpu, struct kvm_hyperv_e= xit *exit) case KVM_EXIT_HYPERV_HCALL: { uint16_t code =3D exit->u.hcall.input & 0xffff; bool fast =3D exit->u.hcall.input & HV_HYPERCALL_FAST; - uint64_t param =3D exit->u.hcall.params[0]; + uint64_t in_param =3D exit->u.hcall.params[0]; + uint64_t out_param =3D exit->u.hcall.params[1]; =20 switch (code) { case HV_POST_MESSAGE: - exit->u.hcall.result =3D hyperv_hcall_post_message(param, fast= ); + exit->u.hcall.result =3D hyperv_hcall_post_message(in_param, f= ast); break; case HV_SIGNAL_EVENT: - exit->u.hcall.result =3D hyperv_hcall_signal_event(param, fast= ); + exit->u.hcall.result =3D hyperv_hcall_signal_event(in_param, f= ast); + break; + case HV_POST_DEBUG_DATA: + exit->u.hcall.result =3D + hyperv_hcall_post_dbg_data(in_param, out_param, fast); + break; + case HV_RETREIVE_DEBUG_DATA: + exit->u.hcall.result =3D + hyperv_hcall_retreive_dbg_data(in_param, out_param, fast); + break; + case HV_RESET_DEBUG_SESSION: + exit->u.hcall.result =3D + hyperv_hcall_reset_dbg_session(out_param); break; default: exit->u.hcall.result =3D HV_STATUS_INVALID_HYPERCALL_CODE; } return 0; } + + case KVM_EXIT_HYPERV_SYNDBG: + if (!hyperv_feat_enabled(cpu, HYPERV_FEAT_SYNDBG)) { + return -1; + } + + switch (exit->u.syndbg.msr) { + case HV_X64_MSR_SYNDBG_CONTROL: { + uint64_t control =3D exit->u.syndbg.control; + env->msr_hv_syndbg_control =3D control; + env->msr_hv_syndbg_send_page =3D exit->u.syndbg.send_page; + env->msr_hv_syndbg_recv_page =3D exit->u.syndbg.recv_page; + exit->u.syndbg.status =3D HV_STATUS_SUCCESS; + if (control & HV_SYNDBG_CONTROL_SEND) { + exit->u.syndbg.status =3D + hyperv_syndbg_send(env->msr_hv_syndbg_send_page, + HV_SYNDBG_CONTROL_SEND_SIZE(control)); + } else if (control & HV_SYNDBG_CONTROL_RECV) { + exit->u.syndbg.status =3D + hyperv_syndbg_recv(env->msr_hv_syndbg_recv_page, + TARGET_PAGE_SIZE); + } + break; + } + case HV_X64_MSR_SYNDBG_PENDING_BUFFER: + env->msr_hv_syndbg_pending_page =3D exit->u.syndbg.pending_pag= e; + hyperv_syndbg_set_pending_page(env->msr_hv_syndbg_pending_page= ); + break; + default: + return -1; + } + + return 0; default: return -1; } diff --git a/target/i386/kvm/kvm.c b/target/i386/kvm/kvm.c index 2c8feb4a6f..ecabb332d7 100644 --- a/target/i386/kvm/kvm.c +++ b/target/i386/kvm/kvm.c @@ -102,6 +102,7 @@ static bool has_msr_hv_synic; static bool has_msr_hv_stimer; static bool has_msr_hv_frequencies; static bool has_msr_hv_reenlightenment; +static bool has_msr_hv_syndbg_options; static bool has_msr_xss; static bool has_msr_umwait; static bool has_msr_spec_ctrl; @@ -932,6 +933,14 @@ static struct { .bits =3D HV_DEPRECATING_AEOI_RECOMMENDED} } }, + [HYPERV_FEAT_SYNDBG] =3D { + .desc =3D "Enable synthetic kernel debugger channel (hv-syndbg)", + .flags =3D { + {.func =3D HV_CPUID_FEATURES, .reg =3D R_EDX, + .bits =3D HV_FEATURE_DEBUG_MSRS_AVAILABLE} + }, + .dependencies =3D BIT(HYPERV_FEAT_SYNIC) | BIT(HYPERV_FEAT_RELAXED) + }, }; =20 static struct kvm_cpuid2 *try_get_hv_cpuid(CPUState *cs, int max, @@ -972,8 +981,8 @@ static struct kvm_cpuid2 *try_get_hv_cpuid(CPUState *cs= , int max, static struct kvm_cpuid2 *get_supported_hv_cpuid(CPUState *cs) { struct kvm_cpuid2 *cpuid; - /* 0x40000000..0x40000005, 0x4000000A, 0x40000080..0x40000080 leaves */ - int max =3D 10; + /* 0x40000000..0x40000005, 0x4000000A, 0x40000080..0x40000082 leaves */ + int max =3D 11; int i; bool do_sys_ioctl; =20 @@ -1086,6 +1095,12 @@ static struct kvm_cpuid2 *get_supported_hv_cpuid_leg= acy(CPUState *cs) entry_feat->eax |=3D HV_SYNTIMERS_AVAILABLE; } =20 + if (has_msr_hv_syndbg_options) { + entry_feat->edx |=3D HV_GUEST_DEBUGGING_AVAILABLE; + entry_feat->edx |=3D HV_FEATURE_DEBUG_MSRS_AVAILABLE; + entry_feat->ebx |=3D HV_PARTITION_DEUBGGING_ALLOWED; + } + if (kvm_check_extension(cs->kvm_state, KVM_CAP_HYPERV_TLBFLUSH) > 0) { entry_recomm->eax |=3D HV_REMOTE_TLB_FLUSH_RECOMMENDED; @@ -1337,12 +1352,22 @@ static int hyperv_fill_cpuids(CPUState *cs, { X86CPU *cpu =3D X86_CPU(cs); struct kvm_cpuid_entry2 *c; - uint32_t cpuid_i =3D 0; + uint32_t signature[3]; + uint32_t cpuid_i =3D 0, max_cpuid_leaf =3D 0; + + max_cpuid_leaf =3D HV_CPUID_IMPLEMENT_LIMITS; + if (hyperv_feat_enabled(cpu, HYPERV_FEAT_EVMCS)) { + max_cpuid_leaf =3D MAX(max_cpuid_leaf, HV_CPUID_NESTED_FEATURES); + } + + if (hyperv_feat_enabled(cpu, HYPERV_FEAT_SYNDBG)) { + max_cpuid_leaf =3D + MAX(max_cpuid_leaf, HV_CPUID_SYNDBG_PLATFORM_CAPABILITIES); + } =20 c =3D &cpuid_ent[cpuid_i++]; c->function =3D HV_CPUID_VENDOR_AND_MAX_FUNCTIONS; - c->eax =3D hyperv_feat_enabled(cpu, HYPERV_FEAT_EVMCS) ? - HV_CPUID_NESTED_FEATURES : HV_CPUID_IMPLEMENT_LIMITS; + c->eax =3D max_cpuid_leaf; c->ebx =3D cpu->hyperv_vendor_id[0]; c->ecx =3D cpu->hyperv_vendor_id[1]; c->edx =3D cpu->hyperv_vendor_id[2]; @@ -1421,6 +1446,33 @@ static int hyperv_fill_cpuids(CPUState *cs, c->eax =3D cpu->hyperv_nested[0]; } =20 + if (hyperv_feat_enabled(cpu, HYPERV_FEAT_SYNDBG)) { + c =3D &cpuid_ent[cpuid_i++]; + c->function =3D HV_CPUID_SYNDBG_VENDOR_AND_MAX_FUNCTIONS; + c->eax =3D hyperv_feat_enabled(cpu, HYPERV_FEAT_EVMCS) ? + HV_CPUID_NESTED_FEATURES : HV_CPUID_IMPLEMENT_LIMITS; + memcpy(signature, "Microsoft VS", 12); + c->eax =3D 0; + c->ebx =3D signature[0]; + c->ecx =3D signature[1]; + c->edx =3D signature[2]; + + c =3D &cpuid_ent[cpuid_i++]; + c->function =3D HV_CPUID_SYNDBG_INTERFACE; + memcpy(signature, "VS#1\0\0\0\0\0\0\0\0", 12); + c->eax =3D signature[0]; + c->ebx =3D 0; + c->ecx =3D 0; + c->edx =3D 0; + + c =3D &cpuid_ent[cpuid_i++]; + c->function =3D HV_CPUID_SYNDBG_PLATFORM_CAPABILITIES; + c->eax =3D HV_SYNDBG_CAP_ALLOW_KERNEL_DEBUGGING; + c->ebx =3D 0; + c->ecx =3D 0; + c->edx =3D 0; + } + return cpuid_i; } =20 @@ -2215,6 +2267,9 @@ static int kvm_get_supported_msrs(KVMState *s) case HV_X64_MSR_REENLIGHTENMENT_CONTROL: has_msr_hv_reenlightenment =3D true; break; + case HV_X64_MSR_SYNDBG_OPTIONS: + has_msr_hv_syndbg_options =3D true; + break; case MSR_IA32_SPEC_CTRL: has_msr_spec_ctrl =3D true; break; @@ -3132,6 +3187,11 @@ static int kvm_put_msrs(X86CPU *cpu, int level) kvm_msr_entry_add(cpu, HV_X64_MSR_TSC_EMULATION_STATUS, env->msr_hv_tsc_emulation_status); } + if (hyperv_feat_enabled(cpu, HYPERV_FEAT_SYNDBG) && + has_msr_hv_syndbg_options) { + kvm_msr_entry_add(cpu, HV_X64_MSR_SYNDBG_OPTIONS, + hyperv_syndbg_query_options()); + } } if (hyperv_feat_enabled(cpu, HYPERV_FEAT_VAPIC)) { kvm_msr_entry_add(cpu, HV_X64_MSR_APIC_ASSIST_PAGE, @@ -3565,6 +3625,9 @@ static int kvm_get_msrs(X86CPU *cpu) kvm_msr_entry_add(cpu, HV_X64_MSR_TSC_EMULATION_CONTROL, 0); kvm_msr_entry_add(cpu, HV_X64_MSR_TSC_EMULATION_STATUS, 0); } + if (has_msr_hv_syndbg_options) { + kvm_msr_entry_add(cpu, HV_X64_MSR_SYNDBG_OPTIONS, 0); + } if (has_msr_hv_crash) { int j; =20 @@ -3851,6 +3914,9 @@ static int kvm_get_msrs(X86CPU *cpu) case HV_X64_MSR_TSC_EMULATION_STATUS: env->msr_hv_tsc_emulation_status =3D msrs[i].data; break; + case HV_X64_MSR_SYNDBG_OPTIONS: + env->msr_hv_syndbg_options =3D msrs[i].data; + break; case MSR_MTRRdefType: env->mtrr_deftype =3D msrs[i].data; break; --=20 2.34.1 From nobody Sun Feb 8 09:11:07 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass(p=none dis=none) header.from=gmail.com ARC-Seal: i=1; a=rsa-sha256; t=1643970715; cv=none; d=zohomail.com; s=zohoarc; b=PZ8bqLwZkradqgXPbsLb0MfXjA8ejUsxlWBdNo/iTIKpBfXGrcsWVUDMU5G30BksJ3shEHbuGr50Qc4BH8KoqKWpxGE9jDZ1ZO3mvj3ymjjs/eEXViYqFTRr4T4ma0mg1rPxlwu8s3didaf209g6jmnd7O7uJrruq7ZzoraXEMY= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1643970715; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Archive:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=zWzbfX96odE2rh2jvwTjrQYzVCnnDxTDUpmMvVhPlVo=; b=Iq630IsQHdtW69bOWZSTdCJIxyxkVVPbRLYb2Wd6XR7FDOp0JzxvGKnIaClr/e6EV9+umjwBNVBmy86dUXo0h8F1PSvH0K07+MRmfQFzKdIjSdKVqWCFjWoBsAjm7lyxSVbG9tDkQdE3lS9CR9/pb3j5AnJj61X+5PZK4hqPaTQ= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) smtp.mailfrom=qemu-devel-bounces+importer=patchew.org@nongnu.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) by mx.zohomail.com with SMTPS id 1643970715692809.8727325967201; Fri, 4 Feb 2022 02:31:55 -0800 (PST) Received: from localhost ([::1]:58376 helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1nFvsg-0007Li-Mt for importer@patchew.org; Fri, 04 Feb 2022 05:31:54 -0500 Received: from eggs.gnu.org ([209.51.188.92]:39582) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1nFvVY-0002gO-UD for qemu-devel@nongnu.org; Fri, 04 Feb 2022 05:08:01 -0500 Received: from [2a00:1450:4864:20::42d] (port=44824 helo=mail-wr1-x42d.google.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.90_1) (envelope-from ) id 1nFvVW-0000mq-8Y for qemu-devel@nongnu.org; Fri, 04 Feb 2022 05:08:00 -0500 Received: by mail-wr1-x42d.google.com with SMTP id k18so10291231wrg.11 for ; Fri, 04 Feb 2022 02:07:57 -0800 (PST) Received: from localhost.localdomain ([2a0d:6fc2:4af1:7d00:5e41:a6ea:ffaa:548c]) by smtp.gmail.com with ESMTPSA id u18sm657227wrn.110.2022.02.04.02.07.54 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 04 Feb 2022 02:07:55 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=zWzbfX96odE2rh2jvwTjrQYzVCnnDxTDUpmMvVhPlVo=; b=BfCT4txghQ3dZKkgjRbxkWvM1QJDF+iSFe1lBrfAEvvy1eLUIkyCawx3cHWmmuFVc1 DLZ6YaE37sG29a5HwrBlcU0ttaDh/SJOM+zQokmyLplw7tofqbVZxtuJwgf14PUHaeoC gmYnlCXbuNd19QTUCE6ymcyNCncOqWCQp5/587b+7EHAc88OPMbErqYqaZ4Qs4pLR+PZ lJJ/JQrUbfOdaGe7fIc9ISaDl23/gWLJP1UMtVadEL0gZdlbxaTvE7iohMnbRdO0IdBM /bgFFZ1UArdWIxcotJmQptdu1HLcGCpoCGU2NGDZclT9DvBEtAThBgvnqPj8+RNWGkns FBdQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=zWzbfX96odE2rh2jvwTjrQYzVCnnDxTDUpmMvVhPlVo=; b=kONvLgiWHmfgLtx20+EAVQv8180xtGbk6EPBK5/CrxrX+4CvhL7qkhj/zJo4Im/gCS 85F5oy21MzgM686tpmDE/LSXbyQ6A3AJdbkBsQXzpy2iLHtJgl+HYCepvN98dO/rlzvP jpjY/GM6kb3L1xNxE5gtin5fzCPvtFmLMyyQHcjx5x8ux7z/qFKXn+Dz288CV2dSCH4T YzXDlnVGG8DW2yBF7SMeCH5dLvxVDQVstMBkLwoGARYqj2xHo8icUS8uV1hBeliWtT73 KiVroPiXWWLWkWVfLDS40WYU40++W7IykthNDkkHBbRRd81v0e/en6us+qjYJ/Vu09uj PtEg== X-Gm-Message-State: AOAM530fbnHzyAgOvfr21SAZmMUfPOqiMbtccXBkUGQQ/FUcSKpy95RE KcTl5ABKX8HEQ9bIdYzwI+fRwZpV3uk= X-Google-Smtp-Source: ABdhPJxX4M8FVJwBknXlRD1+tf27riAxRr/EG0DUYhUa1fZITMyC1d3oX1AvjjkeqRPIGXls/P1oLg== X-Received: by 2002:adf:fa8f:: with SMTP id h15mr1774425wrr.235.1643969275915; Fri, 04 Feb 2022 02:07:55 -0800 (PST) From: Jon Doron To: qemu-devel@nongnu.org Subject: [PATCH v1 4/4] hw: hyperv: Initial commit for Synthetic Debugging device Date: Fri, 4 Feb 2022 12:07:23 +0200 Message-Id: <20220204100723.406121-5-arilou@gmail.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220204100723.406121-1-arilou@gmail.com> References: <20220204100723.406121-1-arilou@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Host-Lookup-Failed: Reverse DNS lookup failed for 2a00:1450:4864:20::42d (failed) Received-SPF: pass (zohomail.com: domain of gnu.org designates 209.51.188.17 as permitted sender) client-ip=209.51.188.17; envelope-from=qemu-devel-bounces+importer=patchew.org@nongnu.org; helo=lists.gnu.org; Received-SPF: pass client-ip=2a00:1450:4864:20::42d; envelope-from=arilou@gmail.com; helo=mail-wr1-x42d.google.com X-Spam_score_int: -12 X-Spam_score: -1.3 X-Spam_bar: - X-Spam_report: (-1.3 / 5.0 requ) BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, PDS_HP_HELO_NORDNS=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RDNS_NONE=0.793, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=no autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: pbonzini@redhat.com, vkuznets@redhat.com, Jon Doron Errors-To: qemu-devel-bounces+importer=patchew.org@nongnu.org Sender: "Qemu-devel" X-ZohoMail-DKIM: pass (identity @gmail.com) X-ZM-MESSAGEID: 1643970719336100001 Content-Type: text/plain; charset="utf-8" Signed-off-by: Jon Doron --- hw/hyperv/Kconfig | 5 + hw/hyperv/meson.build | 1 + hw/hyperv/syndbg.c | 407 ++++++++++++++++++++++++++++++++++++++++++ 3 files changed, 413 insertions(+) create mode 100644 hw/hyperv/syndbg.c diff --git a/hw/hyperv/Kconfig b/hw/hyperv/Kconfig index 3fbfe41c9e..fcf65903bd 100644 --- a/hw/hyperv/Kconfig +++ b/hw/hyperv/Kconfig @@ -11,3 +11,8 @@ config VMBUS bool default y depends on HYPERV + +config SYNDBG + bool + default y + depends on VMBUS diff --git a/hw/hyperv/meson.build b/hw/hyperv/meson.build index 1367e2994f..b43f119ea5 100644 --- a/hw/hyperv/meson.build +++ b/hw/hyperv/meson.build @@ -1,3 +1,4 @@ specific_ss.add(when: 'CONFIG_HYPERV', if_true: files('hyperv.c')) specific_ss.add(when: 'CONFIG_HYPERV_TESTDEV', if_true: files('hyperv_test= dev.c')) specific_ss.add(when: 'CONFIG_VMBUS', if_true: files('vmbus.c')) +specific_ss.add(when: 'CONFIG_SYNDBG', if_true: files('syndbg.c')) diff --git a/hw/hyperv/syndbg.c b/hw/hyperv/syndbg.c new file mode 100644 index 0000000000..837eb33458 --- /dev/null +++ b/hw/hyperv/syndbg.c @@ -0,0 +1,407 @@ +/* + * QEMU Hyper-V Synthetic Debugging device + * + * This work is licensed under the terms of the GNU GPL, version 2 or late= r. + * See the COPYING file in the top-level directory. + */ + +#include "qemu/ctype.h" +#include "qemu/osdep.h" +#include "qemu/error-report.h" +#include "qemu/main-loop.h" +#include "qemu/sockets.h" +#include "qemu-common.h" +#include "qapi/error.h" +#include "migration/vmstate.h" +#include "hw/qdev-properties.h" +#include "hw/loader.h" +#include "cpu.h" +#include "hw/hyperv/hyperv.h" +#include "hw/hyperv/vmbus-bridge.h" +#include "hw/hyperv/hyperv-proto.h" +#include "net/net.h" +#include "net/eth.h" +#include "net/checksum.h" +#include "trace.h" + +#define TYPE_HV_SYNDBG "hv-syndbg" + +typedef struct HvSynDbg { + DeviceState parent_obj; + + char *host_ip; + uint16_t host_port; + bool use_hcalls; + + uint32_t target_ip; + struct sockaddr_in servaddr; + int socket; + bool has_data_pending; + uint64_t pending_page_gpa; +} HvSynDbg; + +#define HVSYNDBG(obj) OBJECT_CHECK(HvSynDbg, (obj), TYPE_HV_SYNDBG) + +/* returns NULL unless there is exactly one HV Synth debug device */ +static HvSynDbg *hv_syndbg_find(void) +{ + /* Returns NULL unless there is exactly one hvsd device */ + return HVSYNDBG(object_resolve_path_type("", TYPE_HV_SYNDBG, NULL)); +} + +static void set_pending_state(HvSynDbg *syndbg, bool has_pending) +{ + hwaddr out_len; + void *out_data; + + syndbg->has_data_pending =3D has_pending; + + if (!syndbg->pending_page_gpa) { + return; + } + + out_len =3D 1; + out_data =3D cpu_physical_memory_map(syndbg->pending_page_gpa, &out_le= n, 1); + if (out_data) { + *(uint8_t *)out_data =3D !!has_pending; + cpu_physical_memory_unmap(out_data, out_len, 1, out_len); + } +} + +static bool get_udb_pkt_data(void *p, uint32_t len, uint32_t *data_ofs, + uint32_t *src_ip) +{ + uint32_t offset, curr_len =3D len; + + if (curr_len < sizeof(struct eth_header) || + (be16_to_cpu(PKT_GET_ETH_HDR(p)->h_proto) !=3D ETH_P_IP)) { + return false; + } + offset =3D sizeof(struct eth_header); + curr_len -=3D sizeof(struct eth_header); + + if (curr_len < sizeof(struct ip_header) || + PKT_GET_IP_HDR(p)->ip_p !=3D IP_PROTO_UDP) { + return false; + } + offset +=3D PKT_GET_IP_HDR_LEN(p); + curr_len -=3D PKT_GET_IP_HDR_LEN(p); + + if (curr_len < sizeof(struct udp_header)) { + return false; + } + + offset +=3D sizeof(struct udp_header); + *data_ofs =3D offset; + *src_ip =3D PKT_GET_IP_HDR(p)->ip_src; + return true; +} + +static uint16_t handle_send_msg(HvSynDbg *syndbg, uint64_t ingpa, + uint32_t count, bool is_raw, + uint32_t *pending_count) +{ + uint16_t ret; + hwaddr data_len; + void *debug_data =3D NULL; + uint32_t udp_data_ofs =3D 0; + const void *pkt_data; + int sent_count; + + data_len =3D count; + debug_data =3D cpu_physical_memory_map(ingpa, &data_len, 0); + if (!debug_data || data_len < count) { + ret =3D HV_STATUS_INSUFFICIENT_MEMORY; + goto cleanup; + } + + if (is_raw && + !get_udb_pkt_data(debug_data, count, &udp_data_ofs, + &syndbg->target_ip)) { + ret =3D HV_STATUS_SUCCESS; + goto cleanup; + } + + pkt_data =3D (const void *)((uintptr_t)debug_data + udp_data_ofs); + sent_count =3D qemu_sendto(syndbg->socket, pkt_data, count - udp_data_= ofs, + MSG_NOSIGNAL, NULL, 0); + if (sent_count =3D=3D -1) { + ret =3D HV_STATUS_INSUFFICIENT_MEMORY; + goto cleanup; + } + + *pending_count =3D count - (sent_count + udp_data_ofs); + ret =3D HV_STATUS_SUCCESS; +cleanup: + if (debug_data) { + cpu_physical_memory_unmap(debug_data, count, 0, data_len); + } + + return ret; +} + +#define UDP_PKT_HEADER_SIZE \ + (sizeof(struct eth_header) + sizeof(struct ip_header) +\ + sizeof(struct udp_header)) + +static bool create_udp_pkt(HvSynDbg *syndbg, void *pkt, uint32_t pkt_len, + void *udp_data, uint32_t udp_data_len) +{ + struct udp_header *udp_part; + + if (pkt_len < (UDP_PKT_HEADER_SIZE + udp_data_len)) { + return false; + } + + /* Setup the eth */ + memset(&PKT_GET_ETH_HDR(pkt)->h_source, 0, ETH_ALEN); + memset(&PKT_GET_ETH_HDR(pkt)->h_dest, 0, ETH_ALEN); + PKT_GET_ETH_HDR(pkt)->h_proto =3D cpu_to_be16(ETH_P_IP); + + /* Setup the ip */ + PKT_GET_IP_HDR(pkt)->ip_ver_len =3D + (4 << 4) | (sizeof(struct ip_header) >> 2); + PKT_GET_IP_HDR(pkt)->ip_tos =3D 0; + PKT_GET_IP_HDR(pkt)->ip_id =3D 0; + PKT_GET_IP_HDR(pkt)->ip_off =3D 0; + PKT_GET_IP_HDR(pkt)->ip_ttl =3D 64; /* IPDEFTTL */ + PKT_GET_IP_HDR(pkt)->ip_p =3D IP_PROTO_UDP; + PKT_GET_IP_HDR(pkt)->ip_src =3D syndbg->servaddr.sin_addr.s_addr; + PKT_GET_IP_HDR(pkt)->ip_dst =3D syndbg->target_ip; + PKT_GET_IP_HDR(pkt)->ip_len =3D + cpu_to_be16(sizeof(struct ip_header) + sizeof(struct udp_header) + + udp_data_len); + eth_fix_ip4_checksum(PKT_GET_IP_HDR(pkt), PKT_GET_IP_HDR_LEN(pkt)); + + udp_part =3D (struct udp_header *)((uintptr_t)pkt + + sizeof(struct eth_header) + + PKT_GET_IP_HDR_LEN(pkt)); + udp_part->uh_sport =3D syndbg->servaddr.sin_port; + udp_part->uh_dport =3D syndbg->servaddr.sin_port; + udp_part->uh_ulen =3D cpu_to_be16(sizeof(struct udp_header) + udp_data= _len); + memcpy(udp_part + 1, udp_data, udp_data_len); + net_checksum_calculate(pkt, UDP_PKT_HEADER_SIZE + udp_data_len, CSUM_A= LL); + return true; +} + +static uint16_t handle_recv_msg(HvSynDbg *syndbg, uint64_t outgpa, + uint32_t count, bool is_raw, uint32_t opti= ons, + uint64_t timeout, uint32_t *retrieved_coun= t) +{ + uint16_t ret; + uint8_t data_buf[TARGET_PAGE_SIZE - UDP_PKT_HEADER_SIZE]; + hwaddr out_len; + void *out_data =3D NULL; + ssize_t recv_byte_count; + + /* TODO: Handle options and timeout */ + (void)options; + (void)timeout; + + if (!syndbg->has_data_pending) { + recv_byte_count =3D 0; + } else { + recv_byte_count =3D qemu_recv(syndbg->socket, data_buf, + MIN(sizeof(data_buf), count), MSG_WAIT= ALL); + if (recv_byte_count =3D=3D -1) { + ret =3D HV_STATUS_INVALID_PARAMETER; + goto cleanup; + } + } + + if (!recv_byte_count) { + *retrieved_count =3D 0; + ret =3D HV_STATUS_NO_DATA; + goto cleanup; + } + + set_pending_state(syndbg, false); + + out_len =3D recv_byte_count; + if (is_raw) { + out_len +=3D UDP_PKT_HEADER_SIZE; + } + out_data =3D cpu_physical_memory_map(outgpa, &out_len, 1); + if (!out_data) { + ret =3D HV_STATUS_INSUFFICIENT_MEMORY; + goto cleanup; + } + + if (is_raw && + !create_udp_pkt(syndbg, out_data, + recv_byte_count + UDP_PKT_HEADER_SIZE, + data_buf, recv_byte_count)) { + ret =3D HV_STATUS_INSUFFICIENT_MEMORY; + goto cleanup; + } else if (!is_raw) { + memcpy(out_data, data_buf, recv_byte_count); + } + + *retrieved_count =3D recv_byte_count; + if (is_raw) { + *retrieved_count +=3D UDP_PKT_HEADER_SIZE; + } + ret =3D HV_STATUS_SUCCESS; +cleanup: + if (out_data) { + cpu_physical_memory_unmap(out_data, out_len, 1, out_len); + } + + return ret; +} + +static uint16_t hv_syndbg_handler(void *context, HvSynDbgMsg *msg) +{ + HvSynDbg *syndbg =3D context; + uint16_t ret =3D HV_STATUS_INVALID_HYPERCALL_CODE; + + switch (msg->type) { + case HV_SYNDBG_MSG_CONNECTION_INFO: + msg->u.connection_info.host_ip =3D + ntohl(syndbg->servaddr.sin_addr.s_addr); + msg->u.connection_info.host_port =3D + ntohs(syndbg->servaddr.sin_port); + ret =3D HV_STATUS_SUCCESS; + break; + case HV_SYNDBG_MSG_SEND: + ret =3D handle_send_msg(syndbg, msg->u.send.buf_gpa, msg->u.send.c= ount, + msg->u.send.is_raw, &msg->u.send.pending_cou= nt); + break; + case HV_SYNDBG_MSG_RECV: + ret =3D handle_recv_msg(syndbg, msg->u.recv.buf_gpa, msg->u.recv.c= ount, + msg->u.recv.is_raw, msg->u.recv.options, + msg->u.recv.timeout, + &msg->u.recv.retrieved_count); + break; + case HV_SYNDBG_MSG_SET_PENDING_PAGE: + syndbg->pending_page_gpa =3D msg->u.pending_page.buf_gpa; + ret =3D HV_STATUS_SUCCESS; + break; + case HV_SYNDBG_MSG_QUERY_OPTIONS: + msg->u.query_options.options =3D 0; + if (syndbg->use_hcalls) { + msg->u.query_options.options =3D HV_X64_SYNDBG_OPTION_USE_HCAL= LS; + } + ret =3D HV_STATUS_SUCCESS; + break; + default: + break; + } + + return ret; +} + +static void hv_syndbg_recv_event(void *opaque) +{ + HvSynDbg *syndbg =3D opaque; + struct timeval tv; + fd_set rfds; + + tv.tv_sec =3D 0; + tv.tv_usec =3D 0; + FD_ZERO(&rfds); + FD_SET(syndbg->socket, &rfds); + if (select(syndbg->socket + 1, &rfds, NULL, NULL, &tv) > 0) { + set_pending_state(syndbg, true); + } +} + +static void hv_syndbg_realize(DeviceState *dev, Error **errp) +{ + HvSynDbg *syndbg =3D HVSYNDBG(dev); + + if (!hv_syndbg_find()) { + error_setg(errp, "at most one %s device is permitted", TYPE_HV_SYN= DBG); + return; + } + + if (!vmbus_bridge_find()) { + error_setg(errp, "%s device requires vmbus-bridge device", + TYPE_HV_SYNDBG); + return; + } + + /* Parse and host_ip */ + if (qemu_isdigit(syndbg->host_ip[0])) { + syndbg->servaddr.sin_addr.s_addr =3D inet_addr(syndbg->host_ip); + } else { + struct hostent *he =3D gethostbyname(syndbg->host_ip); + if (!he) { + error_setg(errp, "%s failed to resolve host name %s", + TYPE_HV_SYNDBG, syndbg->host_ip); + return; + } + syndbg->servaddr.sin_addr =3D *(struct in_addr *)he->h_addr; + } + + syndbg->socket =3D socket(AF_INET, SOCK_DGRAM, 0); + if (syndbg->socket < 0) { + error_setg(errp, "%s failed to create socket", TYPE_HV_SYNDBG); + return; + } + + qemu_set_nonblock(syndbg->socket); + + syndbg->servaddr.sin_port =3D htons(syndbg->host_port); + syndbg->servaddr.sin_family =3D AF_INET; + if (connect(syndbg->socket, (struct sockaddr *)&syndbg->servaddr, + sizeof(syndbg->servaddr)) < 0) { + closesocket(syndbg->socket); + error_setg(errp, "%s failed to connect to socket", TYPE_HV_SYNDBG); + return; + } + + syndbg->pending_page_gpa =3D 0; + syndbg->has_data_pending =3D false; + hyperv_set_syndbg_handler(hv_syndbg_handler, syndbg); + qemu_set_fd_handler(syndbg->socket, hv_syndbg_recv_event, NULL, syndbg= ); +} + +static void hv_syndbg_unrealize(DeviceState *dev) +{ + HvSynDbg *syndbg =3D HVSYNDBG(dev); + + if (syndbg->socket > 0) { + qemu_set_fd_handler(syndbg->socket, NULL, NULL, NULL); + closesocket(syndbg->socket); + } +} + +static const VMStateDescription vmstate_hv_syndbg =3D { + .name =3D TYPE_HV_SYNDBG, + .unmigratable =3D 1, +}; + +static Property hv_syndbg_properties[] =3D { + DEFINE_PROP_STRING("host_ip", HvSynDbg, host_ip), + DEFINE_PROP_UINT16("host_port", HvSynDbg, host_port, 50000), + DEFINE_PROP_BOOL("use_hcalls", HvSynDbg, use_hcalls, false), + DEFINE_PROP_END_OF_LIST(), +}; + +static void hv_syndbg_class_init(ObjectClass *klass, void *data) +{ + DeviceClass *dc =3D DEVICE_CLASS(klass); + + device_class_set_props(dc, hv_syndbg_properties); + dc->fw_name =3D TYPE_HV_SYNDBG; + dc->vmsd =3D &vmstate_hv_syndbg; + dc->realize =3D hv_syndbg_realize; + dc->unrealize =3D hv_syndbg_unrealize; + dc->user_creatable =3D true; + set_bit(DEVICE_CATEGORY_MISC, dc->categories); +} + +static const TypeInfo hv_syndbg_type_info =3D { + .name =3D TYPE_HV_SYNDBG, + .parent =3D TYPE_DEVICE, + .instance_size =3D sizeof(HvSynDbg), + .class_init =3D hv_syndbg_class_init, +}; + +static void hv_syndbg_register_types(void) +{ + type_register_static(&hv_syndbg_type_info); +} + +type_init(hv_syndbg_register_types) --=20 2.34.1