161491cf4SDavid Woodhouse /*
261491cf4SDavid Woodhouse * Xen HVM emulation support in KVM
361491cf4SDavid Woodhouse *
461491cf4SDavid Woodhouse * Copyright © 2019 Oracle and/or its affiliates. All rights reserved.
561491cf4SDavid Woodhouse * Copyright © 2022 Amazon.com, Inc. or its affiliates. All Rights Reserved.
661491cf4SDavid Woodhouse *
761491cf4SDavid Woodhouse * This work is licensed under the terms of the GNU GPL, version 2 or later.
861491cf4SDavid Woodhouse * See the COPYING file in the top-level directory.
961491cf4SDavid Woodhouse *
1061491cf4SDavid Woodhouse */
1161491cf4SDavid Woodhouse
1261491cf4SDavid Woodhouse #include "qemu/osdep.h"
1355a3f666SJoao Martins #include "qemu/log.h"
1479b7067dSJoao Martins #include "qemu/main-loop.h"
15cc37d98bSRichard Henderson #include "qemu/error-report.h"
16*9c2ff9cdSPierrick Bouvier #include "exec/target_page.h"
17fb0fd2ceSJoao Martins #include "hw/xen/xen.h"
1832cad1ffSPhilippe Mathieu-Daudé #include "system/kvm_int.h"
1932cad1ffSPhilippe Mathieu-Daudé #include "system/kvm_xen.h"
2061491cf4SDavid Woodhouse #include "kvm/kvm_i386.h"
21dfc56946SRichard Henderson #include "system/address-spaces.h"
2261491cf4SDavid Woodhouse #include "xen-emu.h"
2355a3f666SJoao Martins #include "trace.h"
2432cad1ffSPhilippe Mathieu-Daudé #include "system/runstate.h"
2561491cf4SDavid Woodhouse
2627d4075dSDavid Woodhouse #include "hw/pci/msi.h"
2727d4075dSDavid Woodhouse #include "hw/i386/apic-msidef.h"
288b57d5c5SDavid Woodhouse #include "hw/i386/e820_memory_layout.h"
29110a0ea5SDavid Woodhouse #include "hw/i386/kvm/xen_overlay.h"
3091cce756SDavid Woodhouse #include "hw/i386/kvm/xen_evtchn.h"
31a28b0fc0SDavid Woodhouse #include "hw/i386/kvm/xen_gnttab.h"
32a72ccc7fSDavid Woodhouse #include "hw/i386/kvm/xen_primary_console.h"
33c08f5d0eSDavid Woodhouse #include "hw/i386/kvm/xen_xenstore.h"
34110a0ea5SDavid Woodhouse
35bedcc139SJoao Martins #include "hw/xen/interface/version.h"
3679b7067dSJoao Martins #include "hw/xen/interface/sched.h"
37fb0fd2ceSJoao Martins #include "hw/xen/interface/memory.h"
38671bfdcdSJoao Martins #include "hw/xen/interface/hvm/hvm_op.h"
39105b47fdSAnkur Arora #include "hw/xen/interface/hvm/params.h"
40d70bd6a4SJoao Martins #include "hw/xen/interface/vcpu.h"
413b06f29bSJoao Martins #include "hw/xen/interface/event_channel.h"
4228b7ae94SDavid Woodhouse #include "hw/xen/interface/grant_table.h"
43fb0fd2ceSJoao Martins
44fb0fd2ceSJoao Martins #include "xen-compat.h"
45fb0fd2ceSJoao Martins
46b746a779SJoao Martins static void xen_vcpu_singleshot_timer_event(void *opaque);
47b746a779SJoao Martins static void xen_vcpu_periodic_timer_event(void *opaque);
4819c417ecSDavid Woodhouse static int vcpuop_stop_singleshot_timer(CPUState *cs);
49b746a779SJoao Martins
50fb0fd2ceSJoao Martins #ifdef TARGET_X86_64
51fb0fd2ceSJoao Martins #define hypercall_compat32(longmode) (!(longmode))
52fb0fd2ceSJoao Martins #else
53fb0fd2ceSJoao Martins #define hypercall_compat32(longmode) (false)
54fb0fd2ceSJoao Martins #endif
55bedcc139SJoao Martins
kvm_gva_to_gpa(CPUState * cs,uint64_t gva,uint64_t * gpa,size_t * len,bool is_write)56f0689302SJoao Martins static bool kvm_gva_to_gpa(CPUState *cs, uint64_t gva, uint64_t *gpa,
57f0689302SJoao Martins size_t *len, bool is_write)
58bedcc139SJoao Martins {
59bedcc139SJoao Martins struct kvm_translation tr = {
60bedcc139SJoao Martins .linear_address = gva,
61bedcc139SJoao Martins };
62bedcc139SJoao Martins
63f0689302SJoao Martins if (len) {
64f0689302SJoao Martins *len = TARGET_PAGE_SIZE - (gva & ~TARGET_PAGE_MASK);
65f0689302SJoao Martins }
66f0689302SJoao Martins
67f0689302SJoao Martins if (kvm_vcpu_ioctl(cs, KVM_TRANSLATE, &tr) || !tr.valid ||
68f0689302SJoao Martins (is_write && !tr.writeable)) {
69f0689302SJoao Martins return false;
70f0689302SJoao Martins }
71f0689302SJoao Martins *gpa = tr.physical_address;
72f0689302SJoao Martins return true;
73f0689302SJoao Martins }
74f0689302SJoao Martins
kvm_gva_rw(CPUState * cs,uint64_t gva,void * _buf,size_t sz,bool is_write)75f0689302SJoao Martins static int kvm_gva_rw(CPUState *cs, uint64_t gva, void *_buf, size_t sz,
76f0689302SJoao Martins bool is_write)
77f0689302SJoao Martins {
78f0689302SJoao Martins uint8_t *buf = (uint8_t *)_buf;
79f0689302SJoao Martins uint64_t gpa;
80f0689302SJoao Martins size_t len;
81f0689302SJoao Martins
82f0689302SJoao Martins while (sz) {
83f0689302SJoao Martins if (!kvm_gva_to_gpa(cs, gva, &gpa, &len, is_write)) {
84f0689302SJoao Martins return -EFAULT;
85f0689302SJoao Martins }
86bedcc139SJoao Martins if (len > sz) {
87bedcc139SJoao Martins len = sz;
88bedcc139SJoao Martins }
89bedcc139SJoao Martins
90f0689302SJoao Martins cpu_physical_memory_rw(gpa, buf, len, is_write);
91bedcc139SJoao Martins
92bedcc139SJoao Martins buf += len;
93bedcc139SJoao Martins sz -= len;
94bedcc139SJoao Martins gva += len;
95bedcc139SJoao Martins }
96bedcc139SJoao Martins
97bedcc139SJoao Martins return 0;
98bedcc139SJoao Martins }
99bedcc139SJoao Martins
kvm_copy_from_gva(CPUState * cs,uint64_t gva,void * buf,size_t sz)100bedcc139SJoao Martins static inline int kvm_copy_from_gva(CPUState *cs, uint64_t gva, void *buf,
101bedcc139SJoao Martins size_t sz)
102bedcc139SJoao Martins {
103bedcc139SJoao Martins return kvm_gva_rw(cs, gva, buf, sz, false);
104bedcc139SJoao Martins }
105bedcc139SJoao Martins
kvm_copy_to_gva(CPUState * cs,uint64_t gva,void * buf,size_t sz)106bedcc139SJoao Martins static inline int kvm_copy_to_gva(CPUState *cs, uint64_t gva, void *buf,
107bedcc139SJoao Martins size_t sz)
108bedcc139SJoao Martins {
109bedcc139SJoao Martins return kvm_gva_rw(cs, gva, buf, sz, true);
110bedcc139SJoao Martins }
111bedcc139SJoao Martins
kvm_xen_init(KVMState * s,uint32_t hypercall_msr)112f66b8a83SJoao Martins int kvm_xen_init(KVMState *s, uint32_t hypercall_msr)
11361491cf4SDavid Woodhouse {
11461491cf4SDavid Woodhouse const int required_caps = KVM_XEN_HVM_CONFIG_HYPERCALL_MSR |
11561491cf4SDavid Woodhouse KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL | KVM_XEN_HVM_CONFIG_SHARED_INFO;
11661491cf4SDavid Woodhouse struct kvm_xen_hvm_config cfg = {
117f66b8a83SJoao Martins .msr = hypercall_msr,
11861491cf4SDavid Woodhouse .flags = KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL,
11961491cf4SDavid Woodhouse };
12061491cf4SDavid Woodhouse int xen_caps, ret;
12161491cf4SDavid Woodhouse
12261491cf4SDavid Woodhouse xen_caps = kvm_check_extension(s, KVM_CAP_XEN_HVM);
12361491cf4SDavid Woodhouse if (required_caps & ~xen_caps) {
12461491cf4SDavid Woodhouse error_report("kvm: Xen HVM guest support not present or insufficient");
12561491cf4SDavid Woodhouse return -ENOSYS;
12661491cf4SDavid Woodhouse }
12761491cf4SDavid Woodhouse
12861491cf4SDavid Woodhouse if (xen_caps & KVM_XEN_HVM_CONFIG_EVTCHN_SEND) {
12961491cf4SDavid Woodhouse struct kvm_xen_hvm_attr ha = {
13061491cf4SDavid Woodhouse .type = KVM_XEN_ATTR_TYPE_XEN_VERSION,
13161491cf4SDavid Woodhouse .u.xen_version = s->xen_version,
13261491cf4SDavid Woodhouse };
13361491cf4SDavid Woodhouse (void)kvm_vm_ioctl(s, KVM_XEN_HVM_SET_ATTR, &ha);
13461491cf4SDavid Woodhouse
13561491cf4SDavid Woodhouse cfg.flags |= KVM_XEN_HVM_CONFIG_EVTCHN_SEND;
13661491cf4SDavid Woodhouse }
13761491cf4SDavid Woodhouse
13861491cf4SDavid Woodhouse ret = kvm_vm_ioctl(s, KVM_XEN_HVM_CONFIG, &cfg);
13961491cf4SDavid Woodhouse if (ret < 0) {
14061491cf4SDavid Woodhouse error_report("kvm: Failed to enable Xen HVM support: %s",
14161491cf4SDavid Woodhouse strerror(-ret));
14261491cf4SDavid Woodhouse return ret;
14361491cf4SDavid Woodhouse }
14461491cf4SDavid Woodhouse
1452aff696bSDavid Woodhouse /* If called a second time, don't repeat the rest of the setup. */
1462aff696bSDavid Woodhouse if (s->xen_caps) {
1472aff696bSDavid Woodhouse return 0;
1482aff696bSDavid Woodhouse }
1492aff696bSDavid Woodhouse
1502aff696bSDavid Woodhouse /*
1512aff696bSDavid Woodhouse * Event channel delivery via GSI/PCI_INTX needs to poll the vcpu_info
1522aff696bSDavid Woodhouse * of vCPU0 to deassert the IRQ when ->evtchn_upcall_pending is cleared.
1532aff696bSDavid Woodhouse *
1542aff696bSDavid Woodhouse * In the kernel, there's a notifier hook on the PIC/IOAPIC which allows
1552aff696bSDavid Woodhouse * such things to be polled at precisely the right time. We *could* do
1562aff696bSDavid Woodhouse * it nicely in the kernel: check vcpu_info[0]->evtchn_upcall_pending at
1572aff696bSDavid Woodhouse * the moment the IRQ is acked, and see if it should be reasserted.
1582aff696bSDavid Woodhouse *
1592aff696bSDavid Woodhouse * But the in-kernel irqchip is deprecated, so we're unlikely to add
1602aff696bSDavid Woodhouse * that support in the kernel. Insist on using the split irqchip mode
1612aff696bSDavid Woodhouse * instead.
1622aff696bSDavid Woodhouse *
1632aff696bSDavid Woodhouse * This leaves us polling for the level going low in QEMU, which lacks
1642aff696bSDavid Woodhouse * the appropriate hooks in its PIC/IOAPIC code. Even VFIO is sending a
1652aff696bSDavid Woodhouse * spurious 'ack' to an INTX IRQ every time there's any MMIO access to
1662aff696bSDavid Woodhouse * the device (for which it has to unmap the device and trap access, for
1672aff696bSDavid Woodhouse * some period after an IRQ!!). In the Xen case, we do it on exit from
1682aff696bSDavid Woodhouse * KVM_RUN, if the flag is set to say that the GSI is currently asserted.
1692aff696bSDavid Woodhouse * Which is kind of icky, but less so than the VFIO one. I may fix them
1702aff696bSDavid Woodhouse * both later...
1712aff696bSDavid Woodhouse */
1722aff696bSDavid Woodhouse if (!kvm_kernel_irqchip_split()) {
1732aff696bSDavid Woodhouse error_report("kvm: Xen support requires kernel-irqchip=split");
1742aff696bSDavid Woodhouse return -EINVAL;
1752aff696bSDavid Woodhouse }
1762aff696bSDavid Woodhouse
17761491cf4SDavid Woodhouse s->xen_caps = xen_caps;
1788b57d5c5SDavid Woodhouse
1798b57d5c5SDavid Woodhouse /* Tell fw_cfg to notify the BIOS to reserve the range. */
18093c76555SDavid Woodhouse e820_add_entry(XEN_SPECIAL_AREA_ADDR, XEN_SPECIAL_AREA_SIZE, E820_RESERVED);
1818b57d5c5SDavid Woodhouse
182a72ccc7fSDavid Woodhouse /* The pages couldn't be overlaid until KVM was initialized */
183a72ccc7fSDavid Woodhouse xen_primary_console_reset();
184c08f5d0eSDavid Woodhouse xen_xenstore_reset();
185c08f5d0eSDavid Woodhouse
18661491cf4SDavid Woodhouse return 0;
18761491cf4SDavid Woodhouse }
18861491cf4SDavid Woodhouse
kvm_xen_init_vcpu(CPUState * cs)1895e691a95SDavid Woodhouse int kvm_xen_init_vcpu(CPUState *cs)
1905e691a95SDavid Woodhouse {
191c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs);
192c345104cSJoao Martins CPUX86State *env = &cpu->env;
1935e691a95SDavid Woodhouse int err;
1945e691a95SDavid Woodhouse
1955e691a95SDavid Woodhouse /*
1965e691a95SDavid Woodhouse * The kernel needs to know the Xen/ACPI vCPU ID because that's
1975e691a95SDavid Woodhouse * what the guest uses in hypercalls such as timers. It doesn't
1985e691a95SDavid Woodhouse * match the APIC ID which is generally used for talking to the
1995e691a95SDavid Woodhouse * kernel about vCPUs. And if vCPU threads race with creating
2005e691a95SDavid Woodhouse * their KVM vCPUs out of order, it doesn't necessarily match
2015e691a95SDavid Woodhouse * with the kernel's internal vCPU indices either.
2025e691a95SDavid Woodhouse */
2035e691a95SDavid Woodhouse if (kvm_xen_has_cap(EVTCHN_SEND)) {
2045e691a95SDavid Woodhouse struct kvm_xen_vcpu_attr va = {
2055e691a95SDavid Woodhouse .type = KVM_XEN_VCPU_ATTR_TYPE_VCPU_ID,
2065e691a95SDavid Woodhouse .u.vcpu_id = cs->cpu_index,
2075e691a95SDavid Woodhouse };
2085e691a95SDavid Woodhouse err = kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_SET_ATTR, &va);
2095e691a95SDavid Woodhouse if (err) {
2105e691a95SDavid Woodhouse error_report("kvm: Failed to set Xen vCPU ID attribute: %s",
2115e691a95SDavid Woodhouse strerror(-err));
2125e691a95SDavid Woodhouse return err;
2135e691a95SDavid Woodhouse }
2145e691a95SDavid Woodhouse }
2155e691a95SDavid Woodhouse
216c345104cSJoao Martins env->xen_vcpu_info_gpa = INVALID_GPA;
217c345104cSJoao Martins env->xen_vcpu_info_default_gpa = INVALID_GPA;
218f0689302SJoao Martins env->xen_vcpu_time_info_gpa = INVALID_GPA;
2195092db87SJoao Martins env->xen_vcpu_runstate_gpa = INVALID_GPA;
220c345104cSJoao Martins
221b746a779SJoao Martins qemu_mutex_init(&env->xen_timers_lock);
222b746a779SJoao Martins env->xen_singleshot_timer = timer_new_ns(QEMU_CLOCK_VIRTUAL,
223b746a779SJoao Martins xen_vcpu_singleshot_timer_event,
224b746a779SJoao Martins cpu);
225b746a779SJoao Martins if (!env->xen_singleshot_timer) {
226b746a779SJoao Martins return -ENOMEM;
227b746a779SJoao Martins }
228b746a779SJoao Martins env->xen_singleshot_timer->opaque = cs;
229b746a779SJoao Martins
230b746a779SJoao Martins env->xen_periodic_timer = timer_new_ns(QEMU_CLOCK_VIRTUAL,
231b746a779SJoao Martins xen_vcpu_periodic_timer_event,
232b746a779SJoao Martins cpu);
233b746a779SJoao Martins if (!env->xen_periodic_timer) {
234b746a779SJoao Martins return -ENOMEM;
235b746a779SJoao Martins }
236b746a779SJoao Martins env->xen_periodic_timer->opaque = cs;
237b746a779SJoao Martins
2385e691a95SDavid Woodhouse return 0;
2395e691a95SDavid Woodhouse }
2405e691a95SDavid Woodhouse
kvm_xen_get_caps(void)24161491cf4SDavid Woodhouse uint32_t kvm_xen_get_caps(void)
24261491cf4SDavid Woodhouse {
24361491cf4SDavid Woodhouse return kvm_state->xen_caps;
24461491cf4SDavid Woodhouse }
24555a3f666SJoao Martins
kvm_xen_hcall_xen_version(struct kvm_xen_exit * exit,X86CPU * cpu,int cmd,uint64_t arg)246bedcc139SJoao Martins static bool kvm_xen_hcall_xen_version(struct kvm_xen_exit *exit, X86CPU *cpu,
247bedcc139SJoao Martins int cmd, uint64_t arg)
248bedcc139SJoao Martins {
249bedcc139SJoao Martins int err = 0;
250bedcc139SJoao Martins
251bedcc139SJoao Martins switch (cmd) {
252bedcc139SJoao Martins case XENVER_get_features: {
253bedcc139SJoao Martins struct xen_feature_info fi;
254bedcc139SJoao Martins
255bedcc139SJoao Martins /* No need for 32/64 compat handling */
256bedcc139SJoao Martins qemu_build_assert(sizeof(fi) == 8);
257bedcc139SJoao Martins
258bedcc139SJoao Martins err = kvm_copy_from_gva(CPU(cpu), arg, &fi, sizeof(fi));
259bedcc139SJoao Martins if (err) {
260bedcc139SJoao Martins break;
261bedcc139SJoao Martins }
262bedcc139SJoao Martins
263bedcc139SJoao Martins fi.submap = 0;
264bedcc139SJoao Martins if (fi.submap_idx == 0) {
265bedcc139SJoao Martins fi.submap |= 1 << XENFEAT_writable_page_tables |
266bedcc139SJoao Martins 1 << XENFEAT_writable_descriptor_tables |
267bedcc139SJoao Martins 1 << XENFEAT_auto_translated_physmap |
268b746a779SJoao Martins 1 << XENFEAT_hvm_callback_vector |
2696096cf78SDavid Woodhouse 1 << XENFEAT_hvm_safe_pvclock |
2706096cf78SDavid Woodhouse 1 << XENFEAT_hvm_pirqs;
271bedcc139SJoao Martins }
272bedcc139SJoao Martins
273bedcc139SJoao Martins err = kvm_copy_to_gva(CPU(cpu), arg, &fi, sizeof(fi));
274bedcc139SJoao Martins break;
275bedcc139SJoao Martins }
276bedcc139SJoao Martins
277bedcc139SJoao Martins default:
278bedcc139SJoao Martins return false;
279bedcc139SJoao Martins }
280bedcc139SJoao Martins
281bedcc139SJoao Martins exit->u.hcall.result = err;
282bedcc139SJoao Martins return true;
283bedcc139SJoao Martins }
284bedcc139SJoao Martins
kvm_xen_set_vcpu_attr(CPUState * cs,uint16_t type,uint64_t gpa)285c345104cSJoao Martins static int kvm_xen_set_vcpu_attr(CPUState *cs, uint16_t type, uint64_t gpa)
286c345104cSJoao Martins {
287c345104cSJoao Martins struct kvm_xen_vcpu_attr xhsi;
288c345104cSJoao Martins
289c345104cSJoao Martins xhsi.type = type;
290c345104cSJoao Martins xhsi.u.gpa = gpa;
291c345104cSJoao Martins
292c345104cSJoao Martins trace_kvm_xen_set_vcpu_attr(cs->cpu_index, type, gpa);
293c345104cSJoao Martins
294c345104cSJoao Martins return kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_SET_ATTR, &xhsi);
295c345104cSJoao Martins }
296c345104cSJoao Martins
kvm_xen_set_vcpu_callback_vector(CPUState * cs)297105b47fdSAnkur Arora static int kvm_xen_set_vcpu_callback_vector(CPUState *cs)
298105b47fdSAnkur Arora {
299105b47fdSAnkur Arora uint8_t vector = X86_CPU(cs)->env.xen_vcpu_callback_vector;
300105b47fdSAnkur Arora struct kvm_xen_vcpu_attr xva;
301105b47fdSAnkur Arora
302105b47fdSAnkur Arora xva.type = KVM_XEN_VCPU_ATTR_TYPE_UPCALL_VECTOR;
303105b47fdSAnkur Arora xva.u.vector = vector;
304105b47fdSAnkur Arora
305105b47fdSAnkur Arora trace_kvm_xen_set_vcpu_callback(cs->cpu_index, vector);
306105b47fdSAnkur Arora
307e7dbb62fSDavid Woodhouse return kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_SET_ATTR, &xva);
308105b47fdSAnkur Arora }
309105b47fdSAnkur Arora
do_set_vcpu_callback_vector(CPUState * cs,run_on_cpu_data data)310105b47fdSAnkur Arora static void do_set_vcpu_callback_vector(CPUState *cs, run_on_cpu_data data)
311105b47fdSAnkur Arora {
312105b47fdSAnkur Arora X86CPU *cpu = X86_CPU(cs);
313105b47fdSAnkur Arora CPUX86State *env = &cpu->env;
314105b47fdSAnkur Arora
315105b47fdSAnkur Arora env->xen_vcpu_callback_vector = data.host_int;
316105b47fdSAnkur Arora
317105b47fdSAnkur Arora if (kvm_xen_has_cap(EVTCHN_SEND)) {
318105b47fdSAnkur Arora kvm_xen_set_vcpu_callback_vector(cs);
319105b47fdSAnkur Arora }
320105b47fdSAnkur Arora }
321105b47fdSAnkur Arora
set_vcpu_info(CPUState * cs,uint64_t gpa)32227d4075dSDavid Woodhouse static int set_vcpu_info(CPUState *cs, uint64_t gpa)
32327d4075dSDavid Woodhouse {
32427d4075dSDavid Woodhouse X86CPU *cpu = X86_CPU(cs);
32527d4075dSDavid Woodhouse CPUX86State *env = &cpu->env;
32627d4075dSDavid Woodhouse MemoryRegionSection mrs = { .mr = NULL };
32727d4075dSDavid Woodhouse void *vcpu_info_hva = NULL;
32827d4075dSDavid Woodhouse int ret;
32927d4075dSDavid Woodhouse
33027d4075dSDavid Woodhouse ret = kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_INFO, gpa);
33127d4075dSDavid Woodhouse if (ret || gpa == INVALID_GPA) {
33227d4075dSDavid Woodhouse goto out;
33327d4075dSDavid Woodhouse }
33427d4075dSDavid Woodhouse
33527d4075dSDavid Woodhouse mrs = memory_region_find(get_system_memory(), gpa,
33627d4075dSDavid Woodhouse sizeof(struct vcpu_info));
33727d4075dSDavid Woodhouse if (mrs.mr && mrs.mr->ram_block &&
33827d4075dSDavid Woodhouse !int128_lt(mrs.size, int128_make64(sizeof(struct vcpu_info)))) {
33927d4075dSDavid Woodhouse vcpu_info_hva = qemu_map_ram_ptr(mrs.mr->ram_block,
34027d4075dSDavid Woodhouse mrs.offset_within_region);
34127d4075dSDavid Woodhouse }
34227d4075dSDavid Woodhouse if (!vcpu_info_hva) {
34327d4075dSDavid Woodhouse if (mrs.mr) {
34427d4075dSDavid Woodhouse memory_region_unref(mrs.mr);
34527d4075dSDavid Woodhouse mrs.mr = NULL;
34627d4075dSDavid Woodhouse }
34727d4075dSDavid Woodhouse ret = -EINVAL;
34827d4075dSDavid Woodhouse }
34927d4075dSDavid Woodhouse
35027d4075dSDavid Woodhouse out:
35127d4075dSDavid Woodhouse if (env->xen_vcpu_info_mr) {
35227d4075dSDavid Woodhouse memory_region_unref(env->xen_vcpu_info_mr);
35327d4075dSDavid Woodhouse }
35427d4075dSDavid Woodhouse env->xen_vcpu_info_hva = vcpu_info_hva;
35527d4075dSDavid Woodhouse env->xen_vcpu_info_mr = mrs.mr;
35627d4075dSDavid Woodhouse return ret;
35727d4075dSDavid Woodhouse }
35827d4075dSDavid Woodhouse
do_set_vcpu_info_default_gpa(CPUState * cs,run_on_cpu_data data)359c345104cSJoao Martins static void do_set_vcpu_info_default_gpa(CPUState *cs, run_on_cpu_data data)
360c345104cSJoao Martins {
361c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs);
362c345104cSJoao Martins CPUX86State *env = &cpu->env;
363c345104cSJoao Martins
364c345104cSJoao Martins env->xen_vcpu_info_default_gpa = data.host_ulong;
365c345104cSJoao Martins
366c345104cSJoao Martins /* Changing the default does nothing if a vcpu_info was explicitly set. */
367c345104cSJoao Martins if (env->xen_vcpu_info_gpa == INVALID_GPA) {
36827d4075dSDavid Woodhouse set_vcpu_info(cs, env->xen_vcpu_info_default_gpa);
369c345104cSJoao Martins }
370c345104cSJoao Martins }
371c345104cSJoao Martins
do_set_vcpu_info_gpa(CPUState * cs,run_on_cpu_data data)372c345104cSJoao Martins static void do_set_vcpu_info_gpa(CPUState *cs, run_on_cpu_data data)
373c345104cSJoao Martins {
374c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs);
375c345104cSJoao Martins CPUX86State *env = &cpu->env;
376c345104cSJoao Martins
377c345104cSJoao Martins env->xen_vcpu_info_gpa = data.host_ulong;
378c345104cSJoao Martins
37927d4075dSDavid Woodhouse set_vcpu_info(cs, env->xen_vcpu_info_gpa);
38027d4075dSDavid Woodhouse }
38127d4075dSDavid Woodhouse
kvm_xen_get_vcpu_info_hva(uint32_t vcpu_id)38227d4075dSDavid Woodhouse void *kvm_xen_get_vcpu_info_hva(uint32_t vcpu_id)
38327d4075dSDavid Woodhouse {
38427d4075dSDavid Woodhouse CPUState *cs = qemu_get_cpu(vcpu_id);
38527d4075dSDavid Woodhouse if (!cs) {
38627d4075dSDavid Woodhouse return NULL;
38727d4075dSDavid Woodhouse }
38827d4075dSDavid Woodhouse
38927d4075dSDavid Woodhouse return X86_CPU(cs)->env.xen_vcpu_info_hva;
39027d4075dSDavid Woodhouse }
39127d4075dSDavid Woodhouse
kvm_xen_maybe_deassert_callback(CPUState * cs)392ddf0fd9aSDavid Woodhouse void kvm_xen_maybe_deassert_callback(CPUState *cs)
393ddf0fd9aSDavid Woodhouse {
394ddf0fd9aSDavid Woodhouse CPUX86State *env = &X86_CPU(cs)->env;
395ddf0fd9aSDavid Woodhouse struct vcpu_info *vi = env->xen_vcpu_info_hva;
396ddf0fd9aSDavid Woodhouse if (!vi) {
397ddf0fd9aSDavid Woodhouse return;
398ddf0fd9aSDavid Woodhouse }
399ddf0fd9aSDavid Woodhouse
400ddf0fd9aSDavid Woodhouse /* If the evtchn_upcall_pending flag is cleared, turn the GSI off. */
401ddf0fd9aSDavid Woodhouse if (!vi->evtchn_upcall_pending) {
402195801d7SStefan Hajnoczi bql_lock();
403ddf0fd9aSDavid Woodhouse /*
404ddf0fd9aSDavid Woodhouse * Check again now we have the lock, because it may have been
405ddf0fd9aSDavid Woodhouse * asserted in the interim. And we don't want to take the lock
406ddf0fd9aSDavid Woodhouse * every time because this is a fast path.
407ddf0fd9aSDavid Woodhouse */
408ddf0fd9aSDavid Woodhouse if (!vi->evtchn_upcall_pending) {
409ddf0fd9aSDavid Woodhouse X86_CPU(cs)->env.xen_callback_asserted = false;
410ddf0fd9aSDavid Woodhouse xen_evtchn_set_callback_level(0);
411ddf0fd9aSDavid Woodhouse }
412195801d7SStefan Hajnoczi bql_unlock();
413ddf0fd9aSDavid Woodhouse }
414ddf0fd9aSDavid Woodhouse }
415ddf0fd9aSDavid Woodhouse
kvm_xen_set_callback_asserted(void)416ddf0fd9aSDavid Woodhouse void kvm_xen_set_callback_asserted(void)
417ddf0fd9aSDavid Woodhouse {
418ddf0fd9aSDavid Woodhouse CPUState *cs = qemu_get_cpu(0);
419ddf0fd9aSDavid Woodhouse
420ddf0fd9aSDavid Woodhouse if (cs) {
421ddf0fd9aSDavid Woodhouse X86_CPU(cs)->env.xen_callback_asserted = true;
422ddf0fd9aSDavid Woodhouse }
423ddf0fd9aSDavid Woodhouse }
424ddf0fd9aSDavid Woodhouse
kvm_xen_has_vcpu_callback_vector(void)42518e83f28SDavid Woodhouse bool kvm_xen_has_vcpu_callback_vector(void)
42618e83f28SDavid Woodhouse {
42718e83f28SDavid Woodhouse CPUState *cs = qemu_get_cpu(0);
42818e83f28SDavid Woodhouse
42918e83f28SDavid Woodhouse return cs && !!X86_CPU(cs)->env.xen_vcpu_callback_vector;
43018e83f28SDavid Woodhouse }
43118e83f28SDavid Woodhouse
kvm_xen_inject_vcpu_callback_vector(uint32_t vcpu_id,int type)43227d4075dSDavid Woodhouse void kvm_xen_inject_vcpu_callback_vector(uint32_t vcpu_id, int type)
43327d4075dSDavid Woodhouse {
43427d4075dSDavid Woodhouse CPUState *cs = qemu_get_cpu(vcpu_id);
43527d4075dSDavid Woodhouse uint8_t vector;
43627d4075dSDavid Woodhouse
43727d4075dSDavid Woodhouse if (!cs) {
43827d4075dSDavid Woodhouse return;
43927d4075dSDavid Woodhouse }
44027d4075dSDavid Woodhouse
44127d4075dSDavid Woodhouse vector = X86_CPU(cs)->env.xen_vcpu_callback_vector;
44227d4075dSDavid Woodhouse if (vector) {
44327d4075dSDavid Woodhouse /*
44427d4075dSDavid Woodhouse * The per-vCPU callback vector injected via lapic. Just
44527d4075dSDavid Woodhouse * deliver it as an MSI.
44627d4075dSDavid Woodhouse */
44727d4075dSDavid Woodhouse MSIMessage msg = {
448e7dbb62fSDavid Woodhouse .address = APIC_DEFAULT_ADDRESS |
449e7dbb62fSDavid Woodhouse (X86_CPU(cs)->apic_id << MSI_ADDR_DEST_ID_SHIFT),
45027d4075dSDavid Woodhouse .data = vector | (1UL << MSI_DATA_LEVEL_SHIFT),
45127d4075dSDavid Woodhouse };
45227d4075dSDavid Woodhouse kvm_irqchip_send_msi(kvm_state, msg);
45327d4075dSDavid Woodhouse return;
45427d4075dSDavid Woodhouse }
45527d4075dSDavid Woodhouse
45627d4075dSDavid Woodhouse switch (type) {
45727d4075dSDavid Woodhouse case HVM_PARAM_CALLBACK_TYPE_VECTOR:
45827d4075dSDavid Woodhouse /*
45927d4075dSDavid Woodhouse * If the evtchn_upcall_pending field in the vcpu_info is set, then
46027d4075dSDavid Woodhouse * KVM will automatically deliver the vector on entering the vCPU
46127d4075dSDavid Woodhouse * so all we have to do is kick it out.
46227d4075dSDavid Woodhouse */
46327d4075dSDavid Woodhouse qemu_cpu_kick(cs);
46427d4075dSDavid Woodhouse break;
465ddf0fd9aSDavid Woodhouse
466ddf0fd9aSDavid Woodhouse case HVM_PARAM_CALLBACK_TYPE_GSI:
467ddf0fd9aSDavid Woodhouse case HVM_PARAM_CALLBACK_TYPE_PCI_INTX:
468ddf0fd9aSDavid Woodhouse if (vcpu_id == 0) {
469ddf0fd9aSDavid Woodhouse xen_evtchn_set_callback_level(1);
470ddf0fd9aSDavid Woodhouse }
471ddf0fd9aSDavid Woodhouse break;
47227d4075dSDavid Woodhouse }
473c345104cSJoao Martins }
474c345104cSJoao Martins
47519c417ecSDavid Woodhouse /* Must always be called with xen_timers_lock held */
kvm_xen_set_vcpu_timer(CPUState * cs)476c723d4c1SDavid Woodhouse static int kvm_xen_set_vcpu_timer(CPUState *cs)
477c723d4c1SDavid Woodhouse {
478c723d4c1SDavid Woodhouse X86CPU *cpu = X86_CPU(cs);
479c723d4c1SDavid Woodhouse CPUX86State *env = &cpu->env;
480c723d4c1SDavid Woodhouse
481c723d4c1SDavid Woodhouse struct kvm_xen_vcpu_attr va = {
482c723d4c1SDavid Woodhouse .type = KVM_XEN_VCPU_ATTR_TYPE_TIMER,
483c723d4c1SDavid Woodhouse .u.timer.port = env->xen_virq[VIRQ_TIMER],
484c723d4c1SDavid Woodhouse .u.timer.priority = KVM_IRQ_ROUTING_XEN_EVTCHN_PRIO_2LEVEL,
485c723d4c1SDavid Woodhouse .u.timer.expires_ns = env->xen_singleshot_timer_ns,
486c723d4c1SDavid Woodhouse };
487c723d4c1SDavid Woodhouse
488c723d4c1SDavid Woodhouse return kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_SET_ATTR, &va);
489c723d4c1SDavid Woodhouse }
490c723d4c1SDavid Woodhouse
do_set_vcpu_timer_virq(CPUState * cs,run_on_cpu_data data)491c723d4c1SDavid Woodhouse static void do_set_vcpu_timer_virq(CPUState *cs, run_on_cpu_data data)
492c723d4c1SDavid Woodhouse {
49319c417ecSDavid Woodhouse QEMU_LOCK_GUARD(&X86_CPU(cs)->env.xen_timers_lock);
494c723d4c1SDavid Woodhouse kvm_xen_set_vcpu_timer(cs);
495c723d4c1SDavid Woodhouse }
496c723d4c1SDavid Woodhouse
kvm_xen_set_vcpu_virq(uint32_t vcpu_id,uint16_t virq,uint16_t port)497c723d4c1SDavid Woodhouse int kvm_xen_set_vcpu_virq(uint32_t vcpu_id, uint16_t virq, uint16_t port)
498c723d4c1SDavid Woodhouse {
499c723d4c1SDavid Woodhouse CPUState *cs = qemu_get_cpu(vcpu_id);
500c723d4c1SDavid Woodhouse
501c723d4c1SDavid Woodhouse if (!cs) {
502c723d4c1SDavid Woodhouse return -ENOENT;
503c723d4c1SDavid Woodhouse }
504c723d4c1SDavid Woodhouse
505c723d4c1SDavid Woodhouse /* cpu.h doesn't include the actual Xen header. */
506c723d4c1SDavid Woodhouse qemu_build_assert(NR_VIRQS == XEN_NR_VIRQS);
507c723d4c1SDavid Woodhouse
508c723d4c1SDavid Woodhouse if (virq >= NR_VIRQS) {
509c723d4c1SDavid Woodhouse return -EINVAL;
510c723d4c1SDavid Woodhouse }
511c723d4c1SDavid Woodhouse
512c723d4c1SDavid Woodhouse if (port && X86_CPU(cs)->env.xen_virq[virq]) {
513c723d4c1SDavid Woodhouse return -EEXIST;
514c723d4c1SDavid Woodhouse }
515c723d4c1SDavid Woodhouse
516c723d4c1SDavid Woodhouse X86_CPU(cs)->env.xen_virq[virq] = port;
517c723d4c1SDavid Woodhouse if (virq == VIRQ_TIMER && kvm_xen_has_cap(EVTCHN_SEND)) {
518c723d4c1SDavid Woodhouse async_run_on_cpu(cs, do_set_vcpu_timer_virq,
519c723d4c1SDavid Woodhouse RUN_ON_CPU_HOST_INT(port));
520c723d4c1SDavid Woodhouse }
521c723d4c1SDavid Woodhouse return 0;
522c723d4c1SDavid Woodhouse }
523c723d4c1SDavid Woodhouse
do_set_vcpu_time_info_gpa(CPUState * cs,run_on_cpu_data data)524f0689302SJoao Martins static void do_set_vcpu_time_info_gpa(CPUState *cs, run_on_cpu_data data)
525f0689302SJoao Martins {
526f0689302SJoao Martins X86CPU *cpu = X86_CPU(cs);
527f0689302SJoao Martins CPUX86State *env = &cpu->env;
528f0689302SJoao Martins
529f0689302SJoao Martins env->xen_vcpu_time_info_gpa = data.host_ulong;
530f0689302SJoao Martins
531f0689302SJoao Martins kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO,
532f0689302SJoao Martins env->xen_vcpu_time_info_gpa);
533f0689302SJoao Martins }
534f0689302SJoao Martins
do_set_vcpu_runstate_gpa(CPUState * cs,run_on_cpu_data data)5355092db87SJoao Martins static void do_set_vcpu_runstate_gpa(CPUState *cs, run_on_cpu_data data)
5365092db87SJoao Martins {
5375092db87SJoao Martins X86CPU *cpu = X86_CPU(cs);
5385092db87SJoao Martins CPUX86State *env = &cpu->env;
5395092db87SJoao Martins
5405092db87SJoao Martins env->xen_vcpu_runstate_gpa = data.host_ulong;
5415092db87SJoao Martins
5425092db87SJoao Martins kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR,
5435092db87SJoao Martins env->xen_vcpu_runstate_gpa);
5445092db87SJoao Martins }
5455092db87SJoao Martins
do_vcpu_soft_reset(CPUState * cs,run_on_cpu_data data)546c345104cSJoao Martins static void do_vcpu_soft_reset(CPUState *cs, run_on_cpu_data data)
547c345104cSJoao Martins {
548c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs);
549c345104cSJoao Martins CPUX86State *env = &cpu->env;
550c345104cSJoao Martins
551c345104cSJoao Martins env->xen_vcpu_info_gpa = INVALID_GPA;
552c345104cSJoao Martins env->xen_vcpu_info_default_gpa = INVALID_GPA;
553f0689302SJoao Martins env->xen_vcpu_time_info_gpa = INVALID_GPA;
5545092db87SJoao Martins env->xen_vcpu_runstate_gpa = INVALID_GPA;
555105b47fdSAnkur Arora env->xen_vcpu_callback_vector = 0;
556c723d4c1SDavid Woodhouse memset(env->xen_virq, 0, sizeof(env->xen_virq));
557c345104cSJoao Martins
55827d4075dSDavid Woodhouse set_vcpu_info(cs, INVALID_GPA);
559f0689302SJoao Martins kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO,
560f0689302SJoao Martins INVALID_GPA);
5615092db87SJoao Martins kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR,
5625092db87SJoao Martins INVALID_GPA);
563105b47fdSAnkur Arora if (kvm_xen_has_cap(EVTCHN_SEND)) {
564105b47fdSAnkur Arora kvm_xen_set_vcpu_callback_vector(cs);
56519c417ecSDavid Woodhouse
56619c417ecSDavid Woodhouse QEMU_LOCK_GUARD(&X86_CPU(cs)->env.xen_timers_lock);
56719c417ecSDavid Woodhouse env->xen_singleshot_timer_ns = 0;
568c723d4c1SDavid Woodhouse kvm_xen_set_vcpu_timer(cs);
56919c417ecSDavid Woodhouse } else {
57019c417ecSDavid Woodhouse vcpuop_stop_singleshot_timer(cs);
57119c417ecSDavid Woodhouse };
5725092db87SJoao Martins
573c345104cSJoao Martins }
574c345104cSJoao Martins
xen_set_shared_info(uint64_t gfn)575fb0fd2ceSJoao Martins static int xen_set_shared_info(uint64_t gfn)
576fb0fd2ceSJoao Martins {
577fb0fd2ceSJoao Martins uint64_t gpa = gfn << TARGET_PAGE_BITS;
578c345104cSJoao Martins int i, err;
579fb0fd2ceSJoao Martins
58032ead8e6SStefan Hajnoczi BQL_LOCK_GUARD();
581fb0fd2ceSJoao Martins
582fb0fd2ceSJoao Martins /*
583fb0fd2ceSJoao Martins * The xen_overlay device tells KVM about it too, since it had to
584fb0fd2ceSJoao Martins * do that on migration load anyway (unless we're going to jump
585fb0fd2ceSJoao Martins * through lots of hoops to maintain the fiction that this isn't
586fb0fd2ceSJoao Martins * KVM-specific.
587fb0fd2ceSJoao Martins */
588fb0fd2ceSJoao Martins err = xen_overlay_map_shinfo_page(gpa);
589fb0fd2ceSJoao Martins if (err) {
590fb0fd2ceSJoao Martins return err;
591fb0fd2ceSJoao Martins }
592fb0fd2ceSJoao Martins
593fb0fd2ceSJoao Martins trace_kvm_xen_set_shared_info(gfn);
594fb0fd2ceSJoao Martins
595c345104cSJoao Martins for (i = 0; i < XEN_LEGACY_MAX_VCPUS; i++) {
596c345104cSJoao Martins CPUState *cpu = qemu_get_cpu(i);
597c345104cSJoao Martins if (cpu) {
598c345104cSJoao Martins async_run_on_cpu(cpu, do_set_vcpu_info_default_gpa,
599c345104cSJoao Martins RUN_ON_CPU_HOST_ULONG(gpa));
600c345104cSJoao Martins }
601c345104cSJoao Martins gpa += sizeof(vcpu_info_t);
602c345104cSJoao Martins }
603c345104cSJoao Martins
604fb0fd2ceSJoao Martins return err;
605fb0fd2ceSJoao Martins }
606fb0fd2ceSJoao Martins
add_to_physmap_one(uint32_t space,uint64_t idx,uint64_t gfn)607fb0fd2ceSJoao Martins static int add_to_physmap_one(uint32_t space, uint64_t idx, uint64_t gfn)
608fb0fd2ceSJoao Martins {
609fb0fd2ceSJoao Martins switch (space) {
610fb0fd2ceSJoao Martins case XENMAPSPACE_shared_info:
611fb0fd2ceSJoao Martins if (idx > 0) {
612fb0fd2ceSJoao Martins return -EINVAL;
613fb0fd2ceSJoao Martins }
614fb0fd2ceSJoao Martins return xen_set_shared_info(gfn);
615fb0fd2ceSJoao Martins
616fb0fd2ceSJoao Martins case XENMAPSPACE_grant_table:
617a28b0fc0SDavid Woodhouse return xen_gnttab_map_page(idx, gfn);
618a28b0fc0SDavid Woodhouse
619fb0fd2ceSJoao Martins case XENMAPSPACE_gmfn:
620fb0fd2ceSJoao Martins case XENMAPSPACE_gmfn_range:
621fb0fd2ceSJoao Martins return -ENOTSUP;
622fb0fd2ceSJoao Martins
623fb0fd2ceSJoao Martins case XENMAPSPACE_gmfn_foreign:
624fb0fd2ceSJoao Martins case XENMAPSPACE_dev_mmio:
625fb0fd2ceSJoao Martins return -EPERM;
626fb0fd2ceSJoao Martins
627fb0fd2ceSJoao Martins default:
628fb0fd2ceSJoao Martins return -EINVAL;
629fb0fd2ceSJoao Martins }
630fb0fd2ceSJoao Martins }
631fb0fd2ceSJoao Martins
do_add_to_physmap(struct kvm_xen_exit * exit,X86CPU * cpu,uint64_t arg)632fb0fd2ceSJoao Martins static int do_add_to_physmap(struct kvm_xen_exit *exit, X86CPU *cpu,
633fb0fd2ceSJoao Martins uint64_t arg)
634fb0fd2ceSJoao Martins {
635fb0fd2ceSJoao Martins struct xen_add_to_physmap xatp;
636fb0fd2ceSJoao Martins CPUState *cs = CPU(cpu);
637fb0fd2ceSJoao Martins
638fb0fd2ceSJoao Martins if (hypercall_compat32(exit->u.hcall.longmode)) {
639fb0fd2ceSJoao Martins struct compat_xen_add_to_physmap xatp32;
640fb0fd2ceSJoao Martins
641fb0fd2ceSJoao Martins qemu_build_assert(sizeof(struct compat_xen_add_to_physmap) == 16);
642fb0fd2ceSJoao Martins if (kvm_copy_from_gva(cs, arg, &xatp32, sizeof(xatp32))) {
643fb0fd2ceSJoao Martins return -EFAULT;
644fb0fd2ceSJoao Martins }
645fb0fd2ceSJoao Martins xatp.domid = xatp32.domid;
646fb0fd2ceSJoao Martins xatp.size = xatp32.size;
647fb0fd2ceSJoao Martins xatp.space = xatp32.space;
648fb0fd2ceSJoao Martins xatp.idx = xatp32.idx;
649fb0fd2ceSJoao Martins xatp.gpfn = xatp32.gpfn;
650fb0fd2ceSJoao Martins } else {
651fb0fd2ceSJoao Martins if (kvm_copy_from_gva(cs, arg, &xatp, sizeof(xatp))) {
652fb0fd2ceSJoao Martins return -EFAULT;
653fb0fd2ceSJoao Martins }
654fb0fd2ceSJoao Martins }
655fb0fd2ceSJoao Martins
656fb0fd2ceSJoao Martins if (xatp.domid != DOMID_SELF && xatp.domid != xen_domid) {
657fb0fd2ceSJoao Martins return -ESRCH;
658fb0fd2ceSJoao Martins }
659fb0fd2ceSJoao Martins
660fb0fd2ceSJoao Martins return add_to_physmap_one(xatp.space, xatp.idx, xatp.gpfn);
661fb0fd2ceSJoao Martins }
662fb0fd2ceSJoao Martins
do_add_to_physmap_batch(struct kvm_xen_exit * exit,X86CPU * cpu,uint64_t arg)663782a7960SDavid Woodhouse static int do_add_to_physmap_batch(struct kvm_xen_exit *exit, X86CPU *cpu,
664782a7960SDavid Woodhouse uint64_t arg)
665782a7960SDavid Woodhouse {
666782a7960SDavid Woodhouse struct xen_add_to_physmap_batch xatpb;
667782a7960SDavid Woodhouse unsigned long idxs_gva, gpfns_gva, errs_gva;
668782a7960SDavid Woodhouse CPUState *cs = CPU(cpu);
669782a7960SDavid Woodhouse size_t op_sz;
670782a7960SDavid Woodhouse
671782a7960SDavid Woodhouse if (hypercall_compat32(exit->u.hcall.longmode)) {
672782a7960SDavid Woodhouse struct compat_xen_add_to_physmap_batch xatpb32;
673782a7960SDavid Woodhouse
674782a7960SDavid Woodhouse qemu_build_assert(sizeof(struct compat_xen_add_to_physmap_batch) == 20);
675782a7960SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &xatpb32, sizeof(xatpb32))) {
676782a7960SDavid Woodhouse return -EFAULT;
677782a7960SDavid Woodhouse }
678782a7960SDavid Woodhouse xatpb.domid = xatpb32.domid;
679782a7960SDavid Woodhouse xatpb.space = xatpb32.space;
680782a7960SDavid Woodhouse xatpb.size = xatpb32.size;
681782a7960SDavid Woodhouse
682782a7960SDavid Woodhouse idxs_gva = xatpb32.idxs.c;
683782a7960SDavid Woodhouse gpfns_gva = xatpb32.gpfns.c;
684782a7960SDavid Woodhouse errs_gva = xatpb32.errs.c;
685782a7960SDavid Woodhouse op_sz = sizeof(uint32_t);
686782a7960SDavid Woodhouse } else {
687782a7960SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &xatpb, sizeof(xatpb))) {
688782a7960SDavid Woodhouse return -EFAULT;
689782a7960SDavid Woodhouse }
690782a7960SDavid Woodhouse op_sz = sizeof(unsigned long);
691782a7960SDavid Woodhouse idxs_gva = (unsigned long)xatpb.idxs.p;
692782a7960SDavid Woodhouse gpfns_gva = (unsigned long)xatpb.gpfns.p;
693782a7960SDavid Woodhouse errs_gva = (unsigned long)xatpb.errs.p;
694782a7960SDavid Woodhouse }
695782a7960SDavid Woodhouse
696782a7960SDavid Woodhouse if (xatpb.domid != DOMID_SELF && xatpb.domid != xen_domid) {
697782a7960SDavid Woodhouse return -ESRCH;
698782a7960SDavid Woodhouse }
699782a7960SDavid Woodhouse
700782a7960SDavid Woodhouse /* Explicitly invalid for the batch op. Not that we implement it anyway. */
701782a7960SDavid Woodhouse if (xatpb.space == XENMAPSPACE_gmfn_range) {
702782a7960SDavid Woodhouse return -EINVAL;
703782a7960SDavid Woodhouse }
704782a7960SDavid Woodhouse
705782a7960SDavid Woodhouse while (xatpb.size--) {
706782a7960SDavid Woodhouse unsigned long idx = 0;
707782a7960SDavid Woodhouse unsigned long gpfn = 0;
708782a7960SDavid Woodhouse int err;
709782a7960SDavid Woodhouse
710782a7960SDavid Woodhouse /* For 32-bit compat this only copies the low 32 bits of each */
711782a7960SDavid Woodhouse if (kvm_copy_from_gva(cs, idxs_gva, &idx, op_sz) ||
712782a7960SDavid Woodhouse kvm_copy_from_gva(cs, gpfns_gva, &gpfn, op_sz)) {
713782a7960SDavid Woodhouse return -EFAULT;
714782a7960SDavid Woodhouse }
715782a7960SDavid Woodhouse idxs_gva += op_sz;
716782a7960SDavid Woodhouse gpfns_gva += op_sz;
717782a7960SDavid Woodhouse
718782a7960SDavid Woodhouse err = add_to_physmap_one(xatpb.space, idx, gpfn);
719782a7960SDavid Woodhouse
720782a7960SDavid Woodhouse if (kvm_copy_to_gva(cs, errs_gva, &err, sizeof(err))) {
721782a7960SDavid Woodhouse return -EFAULT;
722782a7960SDavid Woodhouse }
723782a7960SDavid Woodhouse errs_gva += sizeof(err);
724782a7960SDavid Woodhouse }
725782a7960SDavid Woodhouse return 0;
726782a7960SDavid Woodhouse }
727782a7960SDavid Woodhouse
kvm_xen_hcall_memory_op(struct kvm_xen_exit * exit,X86CPU * cpu,int cmd,uint64_t arg)728fb0fd2ceSJoao Martins static bool kvm_xen_hcall_memory_op(struct kvm_xen_exit *exit, X86CPU *cpu,
729fb0fd2ceSJoao Martins int cmd, uint64_t arg)
730fb0fd2ceSJoao Martins {
731fb0fd2ceSJoao Martins int err;
732fb0fd2ceSJoao Martins
733fb0fd2ceSJoao Martins switch (cmd) {
734fb0fd2ceSJoao Martins case XENMEM_add_to_physmap:
735fb0fd2ceSJoao Martins err = do_add_to_physmap(exit, cpu, arg);
736fb0fd2ceSJoao Martins break;
737fb0fd2ceSJoao Martins
738782a7960SDavid Woodhouse case XENMEM_add_to_physmap_batch:
739782a7960SDavid Woodhouse err = do_add_to_physmap_batch(exit, cpu, arg);
740782a7960SDavid Woodhouse break;
741782a7960SDavid Woodhouse
742fb0fd2ceSJoao Martins default:
743fb0fd2ceSJoao Martins return false;
744fb0fd2ceSJoao Martins }
745fb0fd2ceSJoao Martins
746fb0fd2ceSJoao Martins exit->u.hcall.result = err;
747fb0fd2ceSJoao Martins return true;
748fb0fd2ceSJoao Martins }
749fb0fd2ceSJoao Martins
handle_set_param(struct kvm_xen_exit * exit,X86CPU * cpu,uint64_t arg)7505dbcd01aSAnkur Arora static bool handle_set_param(struct kvm_xen_exit *exit, X86CPU *cpu,
7515dbcd01aSAnkur Arora uint64_t arg)
7525dbcd01aSAnkur Arora {
7535dbcd01aSAnkur Arora CPUState *cs = CPU(cpu);
7545dbcd01aSAnkur Arora struct xen_hvm_param hp;
7555dbcd01aSAnkur Arora int err = 0;
7565dbcd01aSAnkur Arora
7575dbcd01aSAnkur Arora /* No need for 32/64 compat handling */
7585dbcd01aSAnkur Arora qemu_build_assert(sizeof(hp) == 16);
7595dbcd01aSAnkur Arora
7605dbcd01aSAnkur Arora if (kvm_copy_from_gva(cs, arg, &hp, sizeof(hp))) {
7615dbcd01aSAnkur Arora err = -EFAULT;
7625dbcd01aSAnkur Arora goto out;
7635dbcd01aSAnkur Arora }
7645dbcd01aSAnkur Arora
7655dbcd01aSAnkur Arora if (hp.domid != DOMID_SELF && hp.domid != xen_domid) {
7665dbcd01aSAnkur Arora err = -ESRCH;
7675dbcd01aSAnkur Arora goto out;
7685dbcd01aSAnkur Arora }
7695dbcd01aSAnkur Arora
7705dbcd01aSAnkur Arora switch (hp.index) {
77191cce756SDavid Woodhouse case HVM_PARAM_CALLBACK_IRQ:
772195801d7SStefan Hajnoczi bql_lock();
77391cce756SDavid Woodhouse err = xen_evtchn_set_callback_param(hp.value);
774195801d7SStefan Hajnoczi bql_unlock();
77591cce756SDavid Woodhouse xen_set_long_mode(exit->u.hcall.longmode);
77691cce756SDavid Woodhouse break;
7775dbcd01aSAnkur Arora default:
7785dbcd01aSAnkur Arora return false;
7795dbcd01aSAnkur Arora }
7805dbcd01aSAnkur Arora
7815dbcd01aSAnkur Arora out:
7825dbcd01aSAnkur Arora exit->u.hcall.result = err;
7835dbcd01aSAnkur Arora return true;
7845dbcd01aSAnkur Arora }
7855dbcd01aSAnkur Arora
handle_get_param(struct kvm_xen_exit * exit,X86CPU * cpu,uint64_t arg)786c6623cc3SJoao Martins static bool handle_get_param(struct kvm_xen_exit *exit, X86CPU *cpu,
787c6623cc3SJoao Martins uint64_t arg)
788c6623cc3SJoao Martins {
789c6623cc3SJoao Martins CPUState *cs = CPU(cpu);
790c6623cc3SJoao Martins struct xen_hvm_param hp;
791c6623cc3SJoao Martins int err = 0;
792c6623cc3SJoao Martins
793c6623cc3SJoao Martins /* No need for 32/64 compat handling */
794c6623cc3SJoao Martins qemu_build_assert(sizeof(hp) == 16);
795c6623cc3SJoao Martins
796c6623cc3SJoao Martins if (kvm_copy_from_gva(cs, arg, &hp, sizeof(hp))) {
797c6623cc3SJoao Martins err = -EFAULT;
798c6623cc3SJoao Martins goto out;
799c6623cc3SJoao Martins }
800c6623cc3SJoao Martins
801c6623cc3SJoao Martins if (hp.domid != DOMID_SELF && hp.domid != xen_domid) {
802c6623cc3SJoao Martins err = -ESRCH;
803c6623cc3SJoao Martins goto out;
804c6623cc3SJoao Martins }
805c6623cc3SJoao Martins
806c6623cc3SJoao Martins switch (hp.index) {
807c6623cc3SJoao Martins case HVM_PARAM_STORE_PFN:
808c6623cc3SJoao Martins hp.value = XEN_SPECIAL_PFN(XENSTORE);
809c6623cc3SJoao Martins break;
810c08f5d0eSDavid Woodhouse case HVM_PARAM_STORE_EVTCHN:
811c08f5d0eSDavid Woodhouse hp.value = xen_xenstore_get_port();
812c08f5d0eSDavid Woodhouse break;
813a72ccc7fSDavid Woodhouse case HVM_PARAM_CONSOLE_PFN:
814a72ccc7fSDavid Woodhouse hp.value = xen_primary_console_get_pfn();
815a72ccc7fSDavid Woodhouse if (!hp.value) {
816a72ccc7fSDavid Woodhouse err = -EINVAL;
817a72ccc7fSDavid Woodhouse }
818a72ccc7fSDavid Woodhouse break;
819a72ccc7fSDavid Woodhouse case HVM_PARAM_CONSOLE_EVTCHN:
820a72ccc7fSDavid Woodhouse hp.value = xen_primary_console_get_port();
821a72ccc7fSDavid Woodhouse if (!hp.value) {
822a72ccc7fSDavid Woodhouse err = -EINVAL;
823a72ccc7fSDavid Woodhouse }
824a72ccc7fSDavid Woodhouse break;
825c6623cc3SJoao Martins default:
826c6623cc3SJoao Martins return false;
827c6623cc3SJoao Martins }
828c6623cc3SJoao Martins
829a72ccc7fSDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &hp, sizeof(hp))) {
830c6623cc3SJoao Martins err = -EFAULT;
831c6623cc3SJoao Martins }
832c6623cc3SJoao Martins out:
833c6623cc3SJoao Martins exit->u.hcall.result = err;
834c6623cc3SJoao Martins return true;
835c6623cc3SJoao Martins }
836c6623cc3SJoao Martins
kvm_xen_hcall_evtchn_upcall_vector(struct kvm_xen_exit * exit,X86CPU * cpu,uint64_t arg)837105b47fdSAnkur Arora static int kvm_xen_hcall_evtchn_upcall_vector(struct kvm_xen_exit *exit,
838105b47fdSAnkur Arora X86CPU *cpu, uint64_t arg)
839105b47fdSAnkur Arora {
840105b47fdSAnkur Arora struct xen_hvm_evtchn_upcall_vector up;
841105b47fdSAnkur Arora CPUState *target_cs;
842105b47fdSAnkur Arora
843105b47fdSAnkur Arora /* No need for 32/64 compat handling */
844105b47fdSAnkur Arora qemu_build_assert(sizeof(up) == 8);
845105b47fdSAnkur Arora
846105b47fdSAnkur Arora if (kvm_copy_from_gva(CPU(cpu), arg, &up, sizeof(up))) {
847105b47fdSAnkur Arora return -EFAULT;
848105b47fdSAnkur Arora }
849105b47fdSAnkur Arora
850105b47fdSAnkur Arora if (up.vector < 0x10) {
851105b47fdSAnkur Arora return -EINVAL;
852105b47fdSAnkur Arora }
853105b47fdSAnkur Arora
854105b47fdSAnkur Arora target_cs = qemu_get_cpu(up.vcpu);
855105b47fdSAnkur Arora if (!target_cs) {
856105b47fdSAnkur Arora return -EINVAL;
857105b47fdSAnkur Arora }
858105b47fdSAnkur Arora
859105b47fdSAnkur Arora async_run_on_cpu(target_cs, do_set_vcpu_callback_vector,
860105b47fdSAnkur Arora RUN_ON_CPU_HOST_INT(up.vector));
861105b47fdSAnkur Arora return 0;
862105b47fdSAnkur Arora }
863105b47fdSAnkur Arora
kvm_xen_hcall_hvm_op(struct kvm_xen_exit * exit,X86CPU * cpu,int cmd,uint64_t arg)864671bfdcdSJoao Martins static bool kvm_xen_hcall_hvm_op(struct kvm_xen_exit *exit, X86CPU *cpu,
865671bfdcdSJoao Martins int cmd, uint64_t arg)
866671bfdcdSJoao Martins {
867105b47fdSAnkur Arora int ret = -ENOSYS;
868671bfdcdSJoao Martins switch (cmd) {
869105b47fdSAnkur Arora case HVMOP_set_evtchn_upcall_vector:
870e7dbb62fSDavid Woodhouse ret = kvm_xen_hcall_evtchn_upcall_vector(exit, cpu, arg);
871105b47fdSAnkur Arora break;
872105b47fdSAnkur Arora
873671bfdcdSJoao Martins case HVMOP_pagetable_dying:
874105b47fdSAnkur Arora ret = -ENOSYS;
875105b47fdSAnkur Arora break;
876671bfdcdSJoao Martins
8775dbcd01aSAnkur Arora case HVMOP_set_param:
8785dbcd01aSAnkur Arora return handle_set_param(exit, cpu, arg);
8795dbcd01aSAnkur Arora
880c6623cc3SJoao Martins case HVMOP_get_param:
881c6623cc3SJoao Martins return handle_get_param(exit, cpu, arg);
882c6623cc3SJoao Martins
883671bfdcdSJoao Martins default:
884671bfdcdSJoao Martins return false;
885671bfdcdSJoao Martins }
886105b47fdSAnkur Arora
887105b47fdSAnkur Arora exit->u.hcall.result = ret;
888105b47fdSAnkur Arora return true;
889671bfdcdSJoao Martins }
890671bfdcdSJoao Martins
vcpuop_register_vcpu_info(CPUState * cs,CPUState * target,uint64_t arg)891c345104cSJoao Martins static int vcpuop_register_vcpu_info(CPUState *cs, CPUState *target,
892c345104cSJoao Martins uint64_t arg)
893c345104cSJoao Martins {
894c345104cSJoao Martins struct vcpu_register_vcpu_info rvi;
895c345104cSJoao Martins uint64_t gpa;
896c345104cSJoao Martins
897c345104cSJoao Martins /* No need for 32/64 compat handling */
898c345104cSJoao Martins qemu_build_assert(sizeof(rvi) == 16);
899c345104cSJoao Martins qemu_build_assert(sizeof(struct vcpu_info) == 64);
900c345104cSJoao Martins
901c345104cSJoao Martins if (!target) {
902c345104cSJoao Martins return -ENOENT;
903c345104cSJoao Martins }
904c345104cSJoao Martins
905c345104cSJoao Martins if (kvm_copy_from_gva(cs, arg, &rvi, sizeof(rvi))) {
906c345104cSJoao Martins return -EFAULT;
907c345104cSJoao Martins }
908c345104cSJoao Martins
909c345104cSJoao Martins if (rvi.offset > TARGET_PAGE_SIZE - sizeof(struct vcpu_info)) {
910c345104cSJoao Martins return -EINVAL;
911c345104cSJoao Martins }
912c345104cSJoao Martins
913c345104cSJoao Martins gpa = ((rvi.mfn << TARGET_PAGE_BITS) + rvi.offset);
914c345104cSJoao Martins async_run_on_cpu(target, do_set_vcpu_info_gpa, RUN_ON_CPU_HOST_ULONG(gpa));
915c345104cSJoao Martins return 0;
916c345104cSJoao Martins }
917c345104cSJoao Martins
vcpuop_register_vcpu_time_info(CPUState * cs,CPUState * target,uint64_t arg)918f0689302SJoao Martins static int vcpuop_register_vcpu_time_info(CPUState *cs, CPUState *target,
919f0689302SJoao Martins uint64_t arg)
920f0689302SJoao Martins {
921f0689302SJoao Martins struct vcpu_register_time_memory_area tma;
922f0689302SJoao Martins uint64_t gpa;
923f0689302SJoao Martins size_t len;
924f0689302SJoao Martins
925f0689302SJoao Martins /* No need for 32/64 compat handling */
926f0689302SJoao Martins qemu_build_assert(sizeof(tma) == 8);
927f0689302SJoao Martins qemu_build_assert(sizeof(struct vcpu_time_info) == 32);
928f0689302SJoao Martins
929f0689302SJoao Martins if (!target) {
930f0689302SJoao Martins return -ENOENT;
931f0689302SJoao Martins }
932f0689302SJoao Martins
933f0689302SJoao Martins if (kvm_copy_from_gva(cs, arg, &tma, sizeof(tma))) {
934f0689302SJoao Martins return -EFAULT;
935f0689302SJoao Martins }
936f0689302SJoao Martins
937f0689302SJoao Martins /*
938f0689302SJoao Martins * Xen actually uses the GVA and does the translation through the guest
939f0689302SJoao Martins * page tables each time. But Linux/KVM uses the GPA, on the assumption
940f0689302SJoao Martins * that guests only ever use *global* addresses (kernel virtual addresses)
941f0689302SJoao Martins * for it. If Linux is changed to redo the GVA→GPA translation each time,
942f0689302SJoao Martins * it will offer a new vCPU attribute for that, and we'll use it instead.
943f0689302SJoao Martins */
944f0689302SJoao Martins if (!kvm_gva_to_gpa(cs, tma.addr.p, &gpa, &len, false) ||
945f0689302SJoao Martins len < sizeof(struct vcpu_time_info)) {
946f0689302SJoao Martins return -EFAULT;
947f0689302SJoao Martins }
948f0689302SJoao Martins
949f0689302SJoao Martins async_run_on_cpu(target, do_set_vcpu_time_info_gpa,
950f0689302SJoao Martins RUN_ON_CPU_HOST_ULONG(gpa));
951f0689302SJoao Martins return 0;
952f0689302SJoao Martins }
953f0689302SJoao Martins
vcpuop_register_runstate_info(CPUState * cs,CPUState * target,uint64_t arg)9545092db87SJoao Martins static int vcpuop_register_runstate_info(CPUState *cs, CPUState *target,
9555092db87SJoao Martins uint64_t arg)
9565092db87SJoao Martins {
9575092db87SJoao Martins struct vcpu_register_runstate_memory_area rma;
9585092db87SJoao Martins uint64_t gpa;
9595092db87SJoao Martins size_t len;
9605092db87SJoao Martins
9615092db87SJoao Martins /* No need for 32/64 compat handling */
9625092db87SJoao Martins qemu_build_assert(sizeof(rma) == 8);
9635092db87SJoao Martins /* The runstate area actually does change size, but Linux copes. */
9645092db87SJoao Martins
9655092db87SJoao Martins if (!target) {
9665092db87SJoao Martins return -ENOENT;
9675092db87SJoao Martins }
9685092db87SJoao Martins
9695092db87SJoao Martins if (kvm_copy_from_gva(cs, arg, &rma, sizeof(rma))) {
9705092db87SJoao Martins return -EFAULT;
9715092db87SJoao Martins }
9725092db87SJoao Martins
9735092db87SJoao Martins /* As with vcpu_time_info, Xen actually uses the GVA but KVM doesn't. */
9745092db87SJoao Martins if (!kvm_gva_to_gpa(cs, rma.addr.p, &gpa, &len, false)) {
9755092db87SJoao Martins return -EFAULT;
9765092db87SJoao Martins }
9775092db87SJoao Martins
9785092db87SJoao Martins async_run_on_cpu(target, do_set_vcpu_runstate_gpa,
9795092db87SJoao Martins RUN_ON_CPU_HOST_ULONG(gpa));
9805092db87SJoao Martins return 0;
9815092db87SJoao Martins }
9825092db87SJoao Martins
kvm_get_current_ns(void)983b746a779SJoao Martins static uint64_t kvm_get_current_ns(void)
984b746a779SJoao Martins {
985b746a779SJoao Martins struct kvm_clock_data data;
986b746a779SJoao Martins int ret;
987b746a779SJoao Martins
988b746a779SJoao Martins ret = kvm_vm_ioctl(kvm_state, KVM_GET_CLOCK, &data);
989b746a779SJoao Martins if (ret < 0) {
990b746a779SJoao Martins fprintf(stderr, "KVM_GET_CLOCK failed: %s\n", strerror(ret));
991b746a779SJoao Martins abort();
992b746a779SJoao Martins }
993b746a779SJoao Martins
994b746a779SJoao Martins return data.clock;
995b746a779SJoao Martins }
996b746a779SJoao Martins
xen_vcpu_singleshot_timer_event(void * opaque)997b746a779SJoao Martins static void xen_vcpu_singleshot_timer_event(void *opaque)
998b746a779SJoao Martins {
999b746a779SJoao Martins CPUState *cpu = opaque;
1000b746a779SJoao Martins CPUX86State *env = &X86_CPU(cpu)->env;
1001b746a779SJoao Martins uint16_t port = env->xen_virq[VIRQ_TIMER];
1002b746a779SJoao Martins
1003b746a779SJoao Martins if (likely(port)) {
1004b746a779SJoao Martins xen_evtchn_set_port(port);
1005b746a779SJoao Martins }
1006b746a779SJoao Martins
1007b746a779SJoao Martins qemu_mutex_lock(&env->xen_timers_lock);
1008b746a779SJoao Martins env->xen_singleshot_timer_ns = 0;
1009b746a779SJoao Martins qemu_mutex_unlock(&env->xen_timers_lock);
1010b746a779SJoao Martins }
1011b746a779SJoao Martins
xen_vcpu_periodic_timer_event(void * opaque)1012b746a779SJoao Martins static void xen_vcpu_periodic_timer_event(void *opaque)
1013b746a779SJoao Martins {
1014b746a779SJoao Martins CPUState *cpu = opaque;
1015b746a779SJoao Martins CPUX86State *env = &X86_CPU(cpu)->env;
1016b746a779SJoao Martins uint16_t port = env->xen_virq[VIRQ_TIMER];
1017b746a779SJoao Martins int64_t qemu_now;
1018b746a779SJoao Martins
1019b746a779SJoao Martins if (likely(port)) {
1020b746a779SJoao Martins xen_evtchn_set_port(port);
1021b746a779SJoao Martins }
1022b746a779SJoao Martins
1023b746a779SJoao Martins qemu_mutex_lock(&env->xen_timers_lock);
1024b746a779SJoao Martins
1025b746a779SJoao Martins qemu_now = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL);
1026b746a779SJoao Martins timer_mod_ns(env->xen_periodic_timer,
1027b746a779SJoao Martins qemu_now + env->xen_periodic_timer_period);
1028b746a779SJoao Martins
1029b746a779SJoao Martins qemu_mutex_unlock(&env->xen_timers_lock);
1030b746a779SJoao Martins }
1031b746a779SJoao Martins
do_set_periodic_timer(CPUState * target,uint64_t period_ns)1032b746a779SJoao Martins static int do_set_periodic_timer(CPUState *target, uint64_t period_ns)
1033b746a779SJoao Martins {
1034b746a779SJoao Martins CPUX86State *tenv = &X86_CPU(target)->env;
1035b746a779SJoao Martins int64_t qemu_now;
1036b746a779SJoao Martins
1037b746a779SJoao Martins timer_del(tenv->xen_periodic_timer);
1038b746a779SJoao Martins
1039b746a779SJoao Martins qemu_mutex_lock(&tenv->xen_timers_lock);
1040b746a779SJoao Martins
1041b746a779SJoao Martins qemu_now = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL);
1042b746a779SJoao Martins timer_mod_ns(tenv->xen_periodic_timer, qemu_now + period_ns);
1043b746a779SJoao Martins tenv->xen_periodic_timer_period = period_ns;
1044b746a779SJoao Martins
1045b746a779SJoao Martins qemu_mutex_unlock(&tenv->xen_timers_lock);
1046b746a779SJoao Martins return 0;
1047b746a779SJoao Martins }
1048b746a779SJoao Martins
1049b746a779SJoao Martins #define MILLISECS(_ms) ((int64_t)((_ms) * 1000000ULL))
1050b746a779SJoao Martins #define MICROSECS(_us) ((int64_t)((_us) * 1000ULL))
1051b746a779SJoao Martins #define STIME_MAX ((time_t)((int64_t)~0ull >> 1))
1052bad5cfcdSMichael Tokarev /* Chosen so (NOW() + delta) won't overflow without an uptime of 200 years */
1053b746a779SJoao Martins #define STIME_DELTA_MAX ((int64_t)((uint64_t)~0ull >> 2))
1054b746a779SJoao Martins
vcpuop_set_periodic_timer(CPUState * cs,CPUState * target,uint64_t arg)1055b746a779SJoao Martins static int vcpuop_set_periodic_timer(CPUState *cs, CPUState *target,
1056b746a779SJoao Martins uint64_t arg)
1057b746a779SJoao Martins {
1058b746a779SJoao Martins struct vcpu_set_periodic_timer spt;
1059b746a779SJoao Martins
1060b746a779SJoao Martins qemu_build_assert(sizeof(spt) == 8);
1061b746a779SJoao Martins if (kvm_copy_from_gva(cs, arg, &spt, sizeof(spt))) {
1062b746a779SJoao Martins return -EFAULT;
1063b746a779SJoao Martins }
1064b746a779SJoao Martins
1065b746a779SJoao Martins if (spt.period_ns < MILLISECS(1) || spt.period_ns > STIME_DELTA_MAX) {
1066b746a779SJoao Martins return -EINVAL;
1067b746a779SJoao Martins }
1068b746a779SJoao Martins
1069b746a779SJoao Martins return do_set_periodic_timer(target, spt.period_ns);
1070b746a779SJoao Martins }
1071b746a779SJoao Martins
vcpuop_stop_periodic_timer(CPUState * target)1072b746a779SJoao Martins static int vcpuop_stop_periodic_timer(CPUState *target)
1073b746a779SJoao Martins {
1074b746a779SJoao Martins CPUX86State *tenv = &X86_CPU(target)->env;
1075b746a779SJoao Martins
1076b746a779SJoao Martins qemu_mutex_lock(&tenv->xen_timers_lock);
1077b746a779SJoao Martins
1078b746a779SJoao Martins timer_del(tenv->xen_periodic_timer);
1079b746a779SJoao Martins tenv->xen_periodic_timer_period = 0;
1080b746a779SJoao Martins
1081b746a779SJoao Martins qemu_mutex_unlock(&tenv->xen_timers_lock);
1082b746a779SJoao Martins return 0;
1083b746a779SJoao Martins }
1084b746a779SJoao Martins
108519c417ecSDavid Woodhouse /*
108619c417ecSDavid Woodhouse * Userspace handling of timer, for older kernels.
108719c417ecSDavid Woodhouse * Must always be called with xen_timers_lock held.
108819c417ecSDavid Woodhouse */
do_set_singleshot_timer(CPUState * cs,uint64_t timeout_abs,bool linux_wa)1089b746a779SJoao Martins static int do_set_singleshot_timer(CPUState *cs, uint64_t timeout_abs,
1090547c9757SDavid Woodhouse bool linux_wa)
1091b746a779SJoao Martins {
1092b746a779SJoao Martins CPUX86State *env = &X86_CPU(cs)->env;
1093b746a779SJoao Martins int64_t now = kvm_get_current_ns();
1094b746a779SJoao Martins int64_t qemu_now = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL);
1095b746a779SJoao Martins int64_t delta = timeout_abs - now;
1096b746a779SJoao Martins
1097b746a779SJoao Martins if (linux_wa && unlikely((int64_t)timeout_abs < 0 ||
1098b746a779SJoao Martins (delta > 0 && (uint32_t)(delta >> 50) != 0))) {
1099b746a779SJoao Martins /*
1100b746a779SJoao Martins * Xen has a 'Linux workaround' in do_set_timer_op() which checks
1101b746a779SJoao Martins * for negative absolute timeout values (caused by integer
1102b746a779SJoao Martins * overflow), and for values about 13 days in the future (2^50ns)
1103b746a779SJoao Martins * which would be caused by jiffies overflow. For those cases, it
1104b746a779SJoao Martins * sets the timeout 100ms in the future (not *too* soon, since if
1105b746a779SJoao Martins * a guest really did set a long timeout on purpose we don't want
1106b746a779SJoao Martins * to keep churning CPU time by waking it up).
1107b746a779SJoao Martins */
1108b746a779SJoao Martins delta = (100 * SCALE_MS);
1109b746a779SJoao Martins timeout_abs = now + delta;
1110b746a779SJoao Martins }
1111b746a779SJoao Martins
1112b746a779SJoao Martins timer_mod_ns(env->xen_singleshot_timer, qemu_now + delta);
1113b746a779SJoao Martins env->xen_singleshot_timer_ns = now + delta;
1114b746a779SJoao Martins return 0;
1115b746a779SJoao Martins }
1116b746a779SJoao Martins
vcpuop_set_singleshot_timer(CPUState * cs,uint64_t arg)1117b746a779SJoao Martins static int vcpuop_set_singleshot_timer(CPUState *cs, uint64_t arg)
1118b746a779SJoao Martins {
1119b746a779SJoao Martins struct vcpu_set_singleshot_timer sst = { 0 };
1120b746a779SJoao Martins
1121b746a779SJoao Martins /*
1122b746a779SJoao Martins * The struct is a uint64_t followed by a uint32_t. On 32-bit that
1123b746a779SJoao Martins * makes it 12 bytes. On 64-bit it gets padded to 16. The parts
1124b746a779SJoao Martins * that get used are identical, and there's four bytes of padding
1125b746a779SJoao Martins * unused at the end. For true Xen compatibility we should attempt
1126b746a779SJoao Martins * to copy the full 16 bytes from 64-bit guests, and return -EFAULT
1127b746a779SJoao Martins * if we can't get the padding too. But that's daft. Just copy what
1128b746a779SJoao Martins * we need.
1129b746a779SJoao Martins */
1130b746a779SJoao Martins qemu_build_assert(offsetof(struct vcpu_set_singleshot_timer, flags) == 8);
1131b746a779SJoao Martins qemu_build_assert(sizeof(sst) >= 12);
1132b746a779SJoao Martins
1133b746a779SJoao Martins if (kvm_copy_from_gva(cs, arg, &sst, 12)) {
1134b746a779SJoao Martins return -EFAULT;
1135b746a779SJoao Martins }
1136b746a779SJoao Martins
113719c417ecSDavid Woodhouse QEMU_LOCK_GUARD(&X86_CPU(cs)->env.xen_timers_lock);
1138547c9757SDavid Woodhouse
1139547c9757SDavid Woodhouse /*
1140547c9757SDavid Woodhouse * We ignore the VCPU_SSHOTTMR_future flag, just as Xen now does.
1141547c9757SDavid Woodhouse * The only guest that ever used it, got it wrong.
1142547c9757SDavid Woodhouse * https://xenbits.xen.org/gitweb/?p=xen.git;a=commitdiff;h=19c6cbd909
1143547c9757SDavid Woodhouse */
1144547c9757SDavid Woodhouse return do_set_singleshot_timer(cs, sst.timeout_abs_ns, false);
1145b746a779SJoao Martins }
1146b746a779SJoao Martins
vcpuop_stop_singleshot_timer(CPUState * cs)1147b746a779SJoao Martins static int vcpuop_stop_singleshot_timer(CPUState *cs)
1148b746a779SJoao Martins {
1149b746a779SJoao Martins CPUX86State *env = &X86_CPU(cs)->env;
1150b746a779SJoao Martins
1151b746a779SJoao Martins qemu_mutex_lock(&env->xen_timers_lock);
1152b746a779SJoao Martins
1153b746a779SJoao Martins timer_del(env->xen_singleshot_timer);
1154b746a779SJoao Martins env->xen_singleshot_timer_ns = 0;
1155b746a779SJoao Martins
1156b746a779SJoao Martins qemu_mutex_unlock(&env->xen_timers_lock);
1157b746a779SJoao Martins return 0;
1158b746a779SJoao Martins }
1159b746a779SJoao Martins
kvm_xen_hcall_set_timer_op(struct kvm_xen_exit * exit,X86CPU * cpu,uint64_t timeout)1160b746a779SJoao Martins static bool kvm_xen_hcall_set_timer_op(struct kvm_xen_exit *exit, X86CPU *cpu,
1161b746a779SJoao Martins uint64_t timeout)
1162b746a779SJoao Martins {
1163b746a779SJoao Martins int err;
1164b746a779SJoao Martins
1165b746a779SJoao Martins if (unlikely(timeout == 0)) {
1166b746a779SJoao Martins err = vcpuop_stop_singleshot_timer(CPU(cpu));
1167b746a779SJoao Martins } else {
116819c417ecSDavid Woodhouse QEMU_LOCK_GUARD(&X86_CPU(cpu)->env.xen_timers_lock);
1169547c9757SDavid Woodhouse err = do_set_singleshot_timer(CPU(cpu), timeout, true);
1170b746a779SJoao Martins }
1171b746a779SJoao Martins exit->u.hcall.result = err;
1172b746a779SJoao Martins return true;
1173b746a779SJoao Martins }
1174b746a779SJoao Martins
kvm_xen_hcall_vcpu_op(struct kvm_xen_exit * exit,X86CPU * cpu,int cmd,int vcpu_id,uint64_t arg)1175d70bd6a4SJoao Martins static bool kvm_xen_hcall_vcpu_op(struct kvm_xen_exit *exit, X86CPU *cpu,
1176d70bd6a4SJoao Martins int cmd, int vcpu_id, uint64_t arg)
1177d70bd6a4SJoao Martins {
1178c345104cSJoao Martins CPUState *cs = CPU(cpu);
1179b746a779SJoao Martins CPUState *dest = cs->cpu_index == vcpu_id ? cs : qemu_get_cpu(vcpu_id);
1180d70bd6a4SJoao Martins int err;
1181d70bd6a4SJoao Martins
1182b746a779SJoao Martins if (!dest) {
1183b746a779SJoao Martins err = -ENOENT;
1184b746a779SJoao Martins goto out;
1185b746a779SJoao Martins }
1186b746a779SJoao Martins
1187d70bd6a4SJoao Martins switch (cmd) {
11885092db87SJoao Martins case VCPUOP_register_runstate_memory_area:
11895092db87SJoao Martins err = vcpuop_register_runstate_info(cs, dest, arg);
11905092db87SJoao Martins break;
1191f0689302SJoao Martins case VCPUOP_register_vcpu_time_memory_area:
1192f0689302SJoao Martins err = vcpuop_register_vcpu_time_info(cs, dest, arg);
1193f0689302SJoao Martins break;
1194d70bd6a4SJoao Martins case VCPUOP_register_vcpu_info:
1195c345104cSJoao Martins err = vcpuop_register_vcpu_info(cs, dest, arg);
1196d70bd6a4SJoao Martins break;
1197b746a779SJoao Martins case VCPUOP_set_singleshot_timer: {
1198b746a779SJoao Martins if (cs->cpu_index == vcpu_id) {
1199b746a779SJoao Martins err = vcpuop_set_singleshot_timer(dest, arg);
1200b746a779SJoao Martins } else {
1201b746a779SJoao Martins err = -EINVAL;
1202b746a779SJoao Martins }
1203b746a779SJoao Martins break;
1204b746a779SJoao Martins }
1205b746a779SJoao Martins case VCPUOP_stop_singleshot_timer:
1206b746a779SJoao Martins if (cs->cpu_index == vcpu_id) {
1207b746a779SJoao Martins err = vcpuop_stop_singleshot_timer(dest);
1208b746a779SJoao Martins } else {
1209b746a779SJoao Martins err = -EINVAL;
1210b746a779SJoao Martins }
1211b746a779SJoao Martins break;
1212b746a779SJoao Martins case VCPUOP_set_periodic_timer: {
1213b746a779SJoao Martins err = vcpuop_set_periodic_timer(cs, dest, arg);
1214b746a779SJoao Martins break;
1215b746a779SJoao Martins }
1216b746a779SJoao Martins case VCPUOP_stop_periodic_timer:
1217b746a779SJoao Martins err = vcpuop_stop_periodic_timer(dest);
1218b746a779SJoao Martins break;
1219d70bd6a4SJoao Martins
1220d70bd6a4SJoao Martins default:
1221d70bd6a4SJoao Martins return false;
1222d70bd6a4SJoao Martins }
1223d70bd6a4SJoao Martins
1224b746a779SJoao Martins out:
1225d70bd6a4SJoao Martins exit->u.hcall.result = err;
1226d70bd6a4SJoao Martins return true;
1227d70bd6a4SJoao Martins }
1228d70bd6a4SJoao Martins
kvm_xen_hcall_evtchn_op(struct kvm_xen_exit * exit,X86CPU * cpu,int cmd,uint64_t arg)12294858ba20SDavid Woodhouse static bool kvm_xen_hcall_evtchn_op(struct kvm_xen_exit *exit, X86CPU *cpu,
12303b06f29bSJoao Martins int cmd, uint64_t arg)
12313b06f29bSJoao Martins {
12324858ba20SDavid Woodhouse CPUState *cs = CPU(cpu);
12333b06f29bSJoao Martins int err = -ENOSYS;
12343b06f29bSJoao Martins
12353b06f29bSJoao Martins switch (cmd) {
12363b06f29bSJoao Martins case EVTCHNOP_init_control:
12373b06f29bSJoao Martins case EVTCHNOP_expand_array:
12383b06f29bSJoao Martins case EVTCHNOP_set_priority:
12393b06f29bSJoao Martins /* We do not support FIFO channels at this point */
12403b06f29bSJoao Martins err = -ENOSYS;
12413b06f29bSJoao Martins break;
12423b06f29bSJoao Martins
12434858ba20SDavid Woodhouse case EVTCHNOP_status: {
12444858ba20SDavid Woodhouse struct evtchn_status status;
12454858ba20SDavid Woodhouse
12464858ba20SDavid Woodhouse qemu_build_assert(sizeof(status) == 24);
12474858ba20SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &status, sizeof(status))) {
12484858ba20SDavid Woodhouse err = -EFAULT;
12494858ba20SDavid Woodhouse break;
12504858ba20SDavid Woodhouse }
12514858ba20SDavid Woodhouse
12524858ba20SDavid Woodhouse err = xen_evtchn_status_op(&status);
12534858ba20SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &status, sizeof(status))) {
12544858ba20SDavid Woodhouse err = -EFAULT;
12554858ba20SDavid Woodhouse }
12564858ba20SDavid Woodhouse break;
12574858ba20SDavid Woodhouse }
125883eb5811SDavid Woodhouse case EVTCHNOP_close: {
125983eb5811SDavid Woodhouse struct evtchn_close close;
126083eb5811SDavid Woodhouse
126183eb5811SDavid Woodhouse qemu_build_assert(sizeof(close) == 4);
126283eb5811SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &close, sizeof(close))) {
126383eb5811SDavid Woodhouse err = -EFAULT;
126483eb5811SDavid Woodhouse break;
126583eb5811SDavid Woodhouse }
126683eb5811SDavid Woodhouse
126783eb5811SDavid Woodhouse err = xen_evtchn_close_op(&close);
126883eb5811SDavid Woodhouse break;
126983eb5811SDavid Woodhouse }
1270190cc3c0SDavid Woodhouse case EVTCHNOP_unmask: {
1271190cc3c0SDavid Woodhouse struct evtchn_unmask unmask;
1272190cc3c0SDavid Woodhouse
1273190cc3c0SDavid Woodhouse qemu_build_assert(sizeof(unmask) == 4);
1274190cc3c0SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &unmask, sizeof(unmask))) {
1275190cc3c0SDavid Woodhouse err = -EFAULT;
1276190cc3c0SDavid Woodhouse break;
1277190cc3c0SDavid Woodhouse }
1278190cc3c0SDavid Woodhouse
1279190cc3c0SDavid Woodhouse err = xen_evtchn_unmask_op(&unmask);
1280190cc3c0SDavid Woodhouse break;
1281190cc3c0SDavid Woodhouse }
1282c723d4c1SDavid Woodhouse case EVTCHNOP_bind_virq: {
1283c723d4c1SDavid Woodhouse struct evtchn_bind_virq virq;
1284c723d4c1SDavid Woodhouse
1285c723d4c1SDavid Woodhouse qemu_build_assert(sizeof(virq) == 12);
1286c723d4c1SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &virq, sizeof(virq))) {
1287c723d4c1SDavid Woodhouse err = -EFAULT;
1288c723d4c1SDavid Woodhouse break;
1289c723d4c1SDavid Woodhouse }
1290c723d4c1SDavid Woodhouse
1291c723d4c1SDavid Woodhouse err = xen_evtchn_bind_virq_op(&virq);
1292c723d4c1SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &virq, sizeof(virq))) {
1293c723d4c1SDavid Woodhouse err = -EFAULT;
1294c723d4c1SDavid Woodhouse }
1295c723d4c1SDavid Woodhouse break;
1296c723d4c1SDavid Woodhouse }
1297aa98ee38SDavid Woodhouse case EVTCHNOP_bind_pirq: {
1298aa98ee38SDavid Woodhouse struct evtchn_bind_pirq pirq;
1299aa98ee38SDavid Woodhouse
1300aa98ee38SDavid Woodhouse qemu_build_assert(sizeof(pirq) == 12);
1301aa98ee38SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &pirq, sizeof(pirq))) {
1302aa98ee38SDavid Woodhouse err = -EFAULT;
1303aa98ee38SDavid Woodhouse break;
1304aa98ee38SDavid Woodhouse }
1305aa98ee38SDavid Woodhouse
1306aa98ee38SDavid Woodhouse err = xen_evtchn_bind_pirq_op(&pirq);
1307aa98ee38SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &pirq, sizeof(pirq))) {
1308aa98ee38SDavid Woodhouse err = -EFAULT;
1309aa98ee38SDavid Woodhouse }
1310aa98ee38SDavid Woodhouse break;
1311aa98ee38SDavid Woodhouse }
1312f5417856SDavid Woodhouse case EVTCHNOP_bind_ipi: {
1313f5417856SDavid Woodhouse struct evtchn_bind_ipi ipi;
1314f5417856SDavid Woodhouse
1315f5417856SDavid Woodhouse qemu_build_assert(sizeof(ipi) == 8);
1316f5417856SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &ipi, sizeof(ipi))) {
1317f5417856SDavid Woodhouse err = -EFAULT;
1318f5417856SDavid Woodhouse break;
1319f5417856SDavid Woodhouse }
1320f5417856SDavid Woodhouse
1321f5417856SDavid Woodhouse err = xen_evtchn_bind_ipi_op(&ipi);
1322f5417856SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &ipi, sizeof(ipi))) {
1323f5417856SDavid Woodhouse err = -EFAULT;
1324f5417856SDavid Woodhouse }
1325f5417856SDavid Woodhouse break;
1326f5417856SDavid Woodhouse }
1327cf7679abSDavid Woodhouse case EVTCHNOP_send: {
1328cf7679abSDavid Woodhouse struct evtchn_send send;
1329cf7679abSDavid Woodhouse
1330cf7679abSDavid Woodhouse qemu_build_assert(sizeof(send) == 4);
1331cf7679abSDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &send, sizeof(send))) {
1332cf7679abSDavid Woodhouse err = -EFAULT;
1333cf7679abSDavid Woodhouse break;
1334cf7679abSDavid Woodhouse }
1335cf7679abSDavid Woodhouse
1336cf7679abSDavid Woodhouse err = xen_evtchn_send_op(&send);
1337cf7679abSDavid Woodhouse break;
1338cf7679abSDavid Woodhouse }
1339e1db61b8SDavid Woodhouse case EVTCHNOP_alloc_unbound: {
1340e1db61b8SDavid Woodhouse struct evtchn_alloc_unbound alloc;
1341e1db61b8SDavid Woodhouse
1342e1db61b8SDavid Woodhouse qemu_build_assert(sizeof(alloc) == 8);
1343e1db61b8SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &alloc, sizeof(alloc))) {
1344e1db61b8SDavid Woodhouse err = -EFAULT;
1345e1db61b8SDavid Woodhouse break;
1346e1db61b8SDavid Woodhouse }
1347e1db61b8SDavid Woodhouse
1348e1db61b8SDavid Woodhouse err = xen_evtchn_alloc_unbound_op(&alloc);
1349e1db61b8SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &alloc, sizeof(alloc))) {
1350e1db61b8SDavid Woodhouse err = -EFAULT;
1351e1db61b8SDavid Woodhouse }
1352e1db61b8SDavid Woodhouse break;
1353e1db61b8SDavid Woodhouse }
135484327881SDavid Woodhouse case EVTCHNOP_bind_interdomain: {
135584327881SDavid Woodhouse struct evtchn_bind_interdomain interdomain;
135684327881SDavid Woodhouse
135784327881SDavid Woodhouse qemu_build_assert(sizeof(interdomain) == 12);
135884327881SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &interdomain, sizeof(interdomain))) {
135984327881SDavid Woodhouse err = -EFAULT;
136084327881SDavid Woodhouse break;
136184327881SDavid Woodhouse }
136284327881SDavid Woodhouse
136384327881SDavid Woodhouse err = xen_evtchn_bind_interdomain_op(&interdomain);
136484327881SDavid Woodhouse if (!err &&
136584327881SDavid Woodhouse kvm_copy_to_gva(cs, arg, &interdomain, sizeof(interdomain))) {
136684327881SDavid Woodhouse err = -EFAULT;
136784327881SDavid Woodhouse }
136884327881SDavid Woodhouse break;
136984327881SDavid Woodhouse }
137030667046SDavid Woodhouse case EVTCHNOP_bind_vcpu: {
137130667046SDavid Woodhouse struct evtchn_bind_vcpu vcpu;
137230667046SDavid Woodhouse
137330667046SDavid Woodhouse qemu_build_assert(sizeof(vcpu) == 8);
137430667046SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &vcpu, sizeof(vcpu))) {
137530667046SDavid Woodhouse err = -EFAULT;
137630667046SDavid Woodhouse break;
137730667046SDavid Woodhouse }
137830667046SDavid Woodhouse
137930667046SDavid Woodhouse err = xen_evtchn_bind_vcpu_op(&vcpu);
138030667046SDavid Woodhouse break;
138130667046SDavid Woodhouse }
1382a15b1097SDavid Woodhouse case EVTCHNOP_reset: {
1383a15b1097SDavid Woodhouse struct evtchn_reset reset;
1384a15b1097SDavid Woodhouse
1385a15b1097SDavid Woodhouse qemu_build_assert(sizeof(reset) == 2);
1386a15b1097SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &reset, sizeof(reset))) {
1387a15b1097SDavid Woodhouse err = -EFAULT;
1388a15b1097SDavid Woodhouse break;
1389a15b1097SDavid Woodhouse }
1390a15b1097SDavid Woodhouse
1391a15b1097SDavid Woodhouse err = xen_evtchn_reset_op(&reset);
1392a15b1097SDavid Woodhouse break;
1393a15b1097SDavid Woodhouse }
13943b06f29bSJoao Martins default:
13953b06f29bSJoao Martins return false;
13963b06f29bSJoao Martins }
13973b06f29bSJoao Martins
13983b06f29bSJoao Martins exit->u.hcall.result = err;
13993b06f29bSJoao Martins return true;
14003b06f29bSJoao Martins }
14013b06f29bSJoao Martins
kvm_xen_soft_reset(void)140279b7067dSJoao Martins int kvm_xen_soft_reset(void)
140379b7067dSJoao Martins {
1404c345104cSJoao Martins CPUState *cpu;
1405fb0fd2ceSJoao Martins int err;
1406fb0fd2ceSJoao Martins
1407195801d7SStefan Hajnoczi assert(bql_locked());
140879b7067dSJoao Martins
140979b7067dSJoao Martins trace_kvm_xen_soft_reset();
141079b7067dSJoao Martins
1411a15b1097SDavid Woodhouse err = xen_evtchn_soft_reset();
1412a15b1097SDavid Woodhouse if (err) {
1413a15b1097SDavid Woodhouse return err;
1414a15b1097SDavid Woodhouse }
1415a15b1097SDavid Woodhouse
141691cce756SDavid Woodhouse /*
141791cce756SDavid Woodhouse * Zero is the reset/startup state for HVM_PARAM_CALLBACK_IRQ. Strictly,
141891cce756SDavid Woodhouse * it maps to HVM_PARAM_CALLBACK_TYPE_GSI with GSI#0, but Xen refuses to
141991cce756SDavid Woodhouse * to deliver to the timer interrupt and treats that as 'disabled'.
142091cce756SDavid Woodhouse */
142191cce756SDavid Woodhouse err = xen_evtchn_set_callback_param(0);
142291cce756SDavid Woodhouse if (err) {
142391cce756SDavid Woodhouse return err;
142491cce756SDavid Woodhouse }
142591cce756SDavid Woodhouse
1426c345104cSJoao Martins CPU_FOREACH(cpu) {
1427c345104cSJoao Martins async_run_on_cpu(cpu, do_vcpu_soft_reset, RUN_ON_CPU_NULL);
1428c345104cSJoao Martins }
1429c345104cSJoao Martins
1430fb0fd2ceSJoao Martins err = xen_overlay_map_shinfo_page(INVALID_GFN);
1431fb0fd2ceSJoao Martins if (err) {
1432fb0fd2ceSJoao Martins return err;
1433fb0fd2ceSJoao Martins }
1434fb0fd2ceSJoao Martins
1435de26b261SDavid Woodhouse err = xen_gnttab_reset();
1436de26b261SDavid Woodhouse if (err) {
1437de26b261SDavid Woodhouse return err;
1438de26b261SDavid Woodhouse }
1439de26b261SDavid Woodhouse
1440a72ccc7fSDavid Woodhouse err = xen_primary_console_reset();
1441a72ccc7fSDavid Woodhouse if (err) {
1442a72ccc7fSDavid Woodhouse return err;
1443a72ccc7fSDavid Woodhouse }
1444a72ccc7fSDavid Woodhouse
1445c08f5d0eSDavid Woodhouse err = xen_xenstore_reset();
1446c08f5d0eSDavid Woodhouse if (err) {
1447c08f5d0eSDavid Woodhouse return err;
1448c08f5d0eSDavid Woodhouse }
1449c08f5d0eSDavid Woodhouse
145079b7067dSJoao Martins return 0;
145179b7067dSJoao Martins }
145279b7067dSJoao Martins
schedop_shutdown(CPUState * cs,uint64_t arg)145379b7067dSJoao Martins static int schedop_shutdown(CPUState *cs, uint64_t arg)
145479b7067dSJoao Martins {
145579b7067dSJoao Martins struct sched_shutdown shutdown;
145679b7067dSJoao Martins int ret = 0;
145779b7067dSJoao Martins
145879b7067dSJoao Martins /* No need for 32/64 compat handling */
145979b7067dSJoao Martins qemu_build_assert(sizeof(shutdown) == 4);
146079b7067dSJoao Martins
146179b7067dSJoao Martins if (kvm_copy_from_gva(cs, arg, &shutdown, sizeof(shutdown))) {
146279b7067dSJoao Martins return -EFAULT;
146379b7067dSJoao Martins }
146479b7067dSJoao Martins
146579b7067dSJoao Martins switch (shutdown.reason) {
146679b7067dSJoao Martins case SHUTDOWN_crash:
146779b7067dSJoao Martins cpu_dump_state(cs, stderr, CPU_DUMP_CODE);
146879b7067dSJoao Martins qemu_system_guest_panicked(NULL);
146979b7067dSJoao Martins break;
147079b7067dSJoao Martins
147179b7067dSJoao Martins case SHUTDOWN_reboot:
147279b7067dSJoao Martins qemu_system_reset_request(SHUTDOWN_CAUSE_GUEST_RESET);
147379b7067dSJoao Martins break;
147479b7067dSJoao Martins
147579b7067dSJoao Martins case SHUTDOWN_poweroff:
147679b7067dSJoao Martins qemu_system_shutdown_request(SHUTDOWN_CAUSE_GUEST_SHUTDOWN);
147779b7067dSJoao Martins break;
147879b7067dSJoao Martins
147979b7067dSJoao Martins case SHUTDOWN_soft_reset:
1480195801d7SStefan Hajnoczi bql_lock();
148179b7067dSJoao Martins ret = kvm_xen_soft_reset();
1482195801d7SStefan Hajnoczi bql_unlock();
148379b7067dSJoao Martins break;
148479b7067dSJoao Martins
148579b7067dSJoao Martins default:
148679b7067dSJoao Martins ret = -EINVAL;
148779b7067dSJoao Martins break;
148879b7067dSJoao Martins }
148979b7067dSJoao Martins
149079b7067dSJoao Martins return ret;
149179b7067dSJoao Martins }
149279b7067dSJoao Martins
kvm_xen_hcall_sched_op(struct kvm_xen_exit * exit,X86CPU * cpu,int cmd,uint64_t arg)149379b7067dSJoao Martins static bool kvm_xen_hcall_sched_op(struct kvm_xen_exit *exit, X86CPU *cpu,
149479b7067dSJoao Martins int cmd, uint64_t arg)
149579b7067dSJoao Martins {
149679b7067dSJoao Martins CPUState *cs = CPU(cpu);
149779b7067dSJoao Martins int err = -ENOSYS;
149879b7067dSJoao Martins
149979b7067dSJoao Martins switch (cmd) {
150079b7067dSJoao Martins case SCHEDOP_shutdown:
150179b7067dSJoao Martins err = schedop_shutdown(cs, arg);
150279b7067dSJoao Martins break;
150379b7067dSJoao Martins
1504c789b9efSDavid Woodhouse case SCHEDOP_poll:
1505c789b9efSDavid Woodhouse /*
1506c789b9efSDavid Woodhouse * Linux will panic if this doesn't work. Just yield; it's not
1507c789b9efSDavid Woodhouse * worth overthinking it because with event channel handling
1508c789b9efSDavid Woodhouse * in KVM, the kernel will intercept this and it will never
1509c789b9efSDavid Woodhouse * reach QEMU anyway. The semantics of the hypercall explicltly
1510c789b9efSDavid Woodhouse * permit spurious wakeups.
1511c789b9efSDavid Woodhouse */
1512c789b9efSDavid Woodhouse case SCHEDOP_yield:
1513c789b9efSDavid Woodhouse sched_yield();
1514c789b9efSDavid Woodhouse err = 0;
1515c789b9efSDavid Woodhouse break;
1516c789b9efSDavid Woodhouse
151779b7067dSJoao Martins default:
151879b7067dSJoao Martins return false;
151979b7067dSJoao Martins }
152079b7067dSJoao Martins
152179b7067dSJoao Martins exit->u.hcall.result = err;
152279b7067dSJoao Martins return true;
152379b7067dSJoao Martins }
152479b7067dSJoao Martins
kvm_xen_hcall_gnttab_op(struct kvm_xen_exit * exit,X86CPU * cpu,int cmd,uint64_t arg,int count)152528b7ae94SDavid Woodhouse static bool kvm_xen_hcall_gnttab_op(struct kvm_xen_exit *exit, X86CPU *cpu,
152628b7ae94SDavid Woodhouse int cmd, uint64_t arg, int count)
152728b7ae94SDavid Woodhouse {
152828b7ae94SDavid Woodhouse CPUState *cs = CPU(cpu);
152928b7ae94SDavid Woodhouse int err;
153028b7ae94SDavid Woodhouse
153128b7ae94SDavid Woodhouse switch (cmd) {
153228b7ae94SDavid Woodhouse case GNTTABOP_set_version: {
153328b7ae94SDavid Woodhouse struct gnttab_set_version set;
153428b7ae94SDavid Woodhouse
153528b7ae94SDavid Woodhouse qemu_build_assert(sizeof(set) == 4);
153628b7ae94SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &set, sizeof(set))) {
153728b7ae94SDavid Woodhouse err = -EFAULT;
153828b7ae94SDavid Woodhouse break;
153928b7ae94SDavid Woodhouse }
154028b7ae94SDavid Woodhouse
154128b7ae94SDavid Woodhouse err = xen_gnttab_set_version_op(&set);
154228b7ae94SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &set, sizeof(set))) {
154328b7ae94SDavid Woodhouse err = -EFAULT;
154428b7ae94SDavid Woodhouse }
154528b7ae94SDavid Woodhouse break;
154628b7ae94SDavid Woodhouse }
154728b7ae94SDavid Woodhouse case GNTTABOP_get_version: {
154828b7ae94SDavid Woodhouse struct gnttab_get_version get;
154928b7ae94SDavid Woodhouse
155028b7ae94SDavid Woodhouse qemu_build_assert(sizeof(get) == 8);
155128b7ae94SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &get, sizeof(get))) {
155228b7ae94SDavid Woodhouse err = -EFAULT;
155328b7ae94SDavid Woodhouse break;
155428b7ae94SDavid Woodhouse }
155528b7ae94SDavid Woodhouse
155628b7ae94SDavid Woodhouse err = xen_gnttab_get_version_op(&get);
155728b7ae94SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &get, sizeof(get))) {
155828b7ae94SDavid Woodhouse err = -EFAULT;
155928b7ae94SDavid Woodhouse }
156028b7ae94SDavid Woodhouse break;
156128b7ae94SDavid Woodhouse }
1562b46f9745SDavid Woodhouse case GNTTABOP_query_size: {
1563b46f9745SDavid Woodhouse struct gnttab_query_size size;
1564b46f9745SDavid Woodhouse
1565b46f9745SDavid Woodhouse qemu_build_assert(sizeof(size) == 16);
1566b46f9745SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &size, sizeof(size))) {
1567b46f9745SDavid Woodhouse err = -EFAULT;
1568b46f9745SDavid Woodhouse break;
1569b46f9745SDavid Woodhouse }
1570b46f9745SDavid Woodhouse
1571b46f9745SDavid Woodhouse err = xen_gnttab_query_size_op(&size);
1572b46f9745SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &size, sizeof(size))) {
1573b46f9745SDavid Woodhouse err = -EFAULT;
1574b46f9745SDavid Woodhouse }
1575b46f9745SDavid Woodhouse break;
1576b46f9745SDavid Woodhouse }
157728b7ae94SDavid Woodhouse case GNTTABOP_setup_table:
157828b7ae94SDavid Woodhouse case GNTTABOP_copy:
157928b7ae94SDavid Woodhouse case GNTTABOP_map_grant_ref:
158028b7ae94SDavid Woodhouse case GNTTABOP_unmap_grant_ref:
158128b7ae94SDavid Woodhouse case GNTTABOP_swap_grant_ref:
158228b7ae94SDavid Woodhouse return false;
158328b7ae94SDavid Woodhouse
158428b7ae94SDavid Woodhouse default:
158528b7ae94SDavid Woodhouse /* Xen explicitly returns -ENOSYS to HVM guests for all others */
158628b7ae94SDavid Woodhouse err = -ENOSYS;
158728b7ae94SDavid Woodhouse break;
158828b7ae94SDavid Woodhouse }
158928b7ae94SDavid Woodhouse
159028b7ae94SDavid Woodhouse exit->u.hcall.result = err;
159128b7ae94SDavid Woodhouse return true;
159228b7ae94SDavid Woodhouse }
159328b7ae94SDavid Woodhouse
kvm_xen_hcall_physdev_op(struct kvm_xen_exit * exit,X86CPU * cpu,int cmd,uint64_t arg)1594799c2354SDavid Woodhouse static bool kvm_xen_hcall_physdev_op(struct kvm_xen_exit *exit, X86CPU *cpu,
1595799c2354SDavid Woodhouse int cmd, uint64_t arg)
1596799c2354SDavid Woodhouse {
1597799c2354SDavid Woodhouse CPUState *cs = CPU(cpu);
1598799c2354SDavid Woodhouse int err;
1599799c2354SDavid Woodhouse
1600799c2354SDavid Woodhouse switch (cmd) {
1601799c2354SDavid Woodhouse case PHYSDEVOP_map_pirq: {
1602799c2354SDavid Woodhouse struct physdev_map_pirq map;
1603799c2354SDavid Woodhouse
1604799c2354SDavid Woodhouse if (hypercall_compat32(exit->u.hcall.longmode)) {
1605799c2354SDavid Woodhouse struct compat_physdev_map_pirq *map32 = (void *)↦
1606799c2354SDavid Woodhouse
1607799c2354SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, map32, sizeof(*map32))) {
1608799c2354SDavid Woodhouse return -EFAULT;
1609799c2354SDavid Woodhouse }
1610799c2354SDavid Woodhouse
1611799c2354SDavid Woodhouse /*
1612799c2354SDavid Woodhouse * The only thing that's different is the alignment of the
1613799c2354SDavid Woodhouse * uint64_t table_base at the end, which gets padding to make
1614799c2354SDavid Woodhouse * it 64-bit aligned in the 64-bit version.
1615799c2354SDavid Woodhouse */
1616799c2354SDavid Woodhouse qemu_build_assert(sizeof(*map32) == 36);
1617799c2354SDavid Woodhouse qemu_build_assert(offsetof(struct physdev_map_pirq, entry_nr) ==
1618799c2354SDavid Woodhouse offsetof(struct compat_physdev_map_pirq, entry_nr));
1619799c2354SDavid Woodhouse memmove(&map.table_base, &map32->table_base, sizeof(map.table_base));
1620799c2354SDavid Woodhouse } else {
1621799c2354SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &map, sizeof(map))) {
1622799c2354SDavid Woodhouse err = -EFAULT;
1623799c2354SDavid Woodhouse break;
1624799c2354SDavid Woodhouse }
1625799c2354SDavid Woodhouse }
1626799c2354SDavid Woodhouse err = xen_physdev_map_pirq(&map);
1627799c2354SDavid Woodhouse /*
1628799c2354SDavid Woodhouse * Since table_base is an IN parameter and won't be changed, just
1629799c2354SDavid Woodhouse * copy the size of the compat structure back to the guest.
1630799c2354SDavid Woodhouse */
1631799c2354SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &map,
1632799c2354SDavid Woodhouse sizeof(struct compat_physdev_map_pirq))) {
1633799c2354SDavid Woodhouse err = -EFAULT;
1634799c2354SDavid Woodhouse }
1635799c2354SDavid Woodhouse break;
1636799c2354SDavid Woodhouse }
1637799c2354SDavid Woodhouse case PHYSDEVOP_unmap_pirq: {
1638799c2354SDavid Woodhouse struct physdev_unmap_pirq unmap;
1639799c2354SDavid Woodhouse
1640799c2354SDavid Woodhouse qemu_build_assert(sizeof(unmap) == 8);
1641799c2354SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &unmap, sizeof(unmap))) {
1642799c2354SDavid Woodhouse err = -EFAULT;
1643799c2354SDavid Woodhouse break;
1644799c2354SDavid Woodhouse }
1645799c2354SDavid Woodhouse
1646799c2354SDavid Woodhouse err = xen_physdev_unmap_pirq(&unmap);
1647799c2354SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &unmap, sizeof(unmap))) {
1648799c2354SDavid Woodhouse err = -EFAULT;
1649799c2354SDavid Woodhouse }
1650799c2354SDavid Woodhouse break;
1651799c2354SDavid Woodhouse }
1652799c2354SDavid Woodhouse case PHYSDEVOP_eoi: {
1653799c2354SDavid Woodhouse struct physdev_eoi eoi;
1654799c2354SDavid Woodhouse
1655799c2354SDavid Woodhouse qemu_build_assert(sizeof(eoi) == 4);
1656799c2354SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &eoi, sizeof(eoi))) {
1657799c2354SDavid Woodhouse err = -EFAULT;
1658799c2354SDavid Woodhouse break;
1659799c2354SDavid Woodhouse }
1660799c2354SDavid Woodhouse
1661799c2354SDavid Woodhouse err = xen_physdev_eoi_pirq(&eoi);
1662799c2354SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &eoi, sizeof(eoi))) {
1663799c2354SDavid Woodhouse err = -EFAULT;
1664799c2354SDavid Woodhouse }
1665799c2354SDavid Woodhouse break;
1666799c2354SDavid Woodhouse }
1667799c2354SDavid Woodhouse case PHYSDEVOP_irq_status_query: {
1668799c2354SDavid Woodhouse struct physdev_irq_status_query query;
1669799c2354SDavid Woodhouse
1670799c2354SDavid Woodhouse qemu_build_assert(sizeof(query) == 8);
1671799c2354SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &query, sizeof(query))) {
1672799c2354SDavid Woodhouse err = -EFAULT;
1673799c2354SDavid Woodhouse break;
1674799c2354SDavid Woodhouse }
1675799c2354SDavid Woodhouse
1676799c2354SDavid Woodhouse err = xen_physdev_query_pirq(&query);
1677799c2354SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &query, sizeof(query))) {
1678799c2354SDavid Woodhouse err = -EFAULT;
1679799c2354SDavid Woodhouse }
1680799c2354SDavid Woodhouse break;
1681799c2354SDavid Woodhouse }
1682799c2354SDavid Woodhouse case PHYSDEVOP_get_free_pirq: {
1683799c2354SDavid Woodhouse struct physdev_get_free_pirq get;
1684799c2354SDavid Woodhouse
1685799c2354SDavid Woodhouse qemu_build_assert(sizeof(get) == 8);
1686799c2354SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &get, sizeof(get))) {
1687799c2354SDavid Woodhouse err = -EFAULT;
1688799c2354SDavid Woodhouse break;
1689799c2354SDavid Woodhouse }
1690799c2354SDavid Woodhouse
1691799c2354SDavid Woodhouse err = xen_physdev_get_free_pirq(&get);
1692799c2354SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &get, sizeof(get))) {
1693799c2354SDavid Woodhouse err = -EFAULT;
1694799c2354SDavid Woodhouse }
1695799c2354SDavid Woodhouse break;
1696799c2354SDavid Woodhouse }
1697799c2354SDavid Woodhouse case PHYSDEVOP_pirq_eoi_gmfn_v2: /* FreeBSD 13 makes this hypercall */
1698799c2354SDavid Woodhouse err = -ENOSYS;
1699799c2354SDavid Woodhouse break;
1700799c2354SDavid Woodhouse
1701799c2354SDavid Woodhouse default:
1702799c2354SDavid Woodhouse return false;
1703799c2354SDavid Woodhouse }
1704799c2354SDavid Woodhouse
1705799c2354SDavid Woodhouse exit->u.hcall.result = err;
1706799c2354SDavid Woodhouse return true;
1707799c2354SDavid Woodhouse }
1708799c2354SDavid Woodhouse
do_kvm_xen_handle_exit(X86CPU * cpu,struct kvm_xen_exit * exit)170955a3f666SJoao Martins static bool do_kvm_xen_handle_exit(X86CPU *cpu, struct kvm_xen_exit *exit)
171055a3f666SJoao Martins {
171155a3f666SJoao Martins uint16_t code = exit->u.hcall.input;
171255a3f666SJoao Martins
171355a3f666SJoao Martins if (exit->u.hcall.cpl > 0) {
171455a3f666SJoao Martins exit->u.hcall.result = -EPERM;
171555a3f666SJoao Martins return true;
171655a3f666SJoao Martins }
171755a3f666SJoao Martins
171855a3f666SJoao Martins switch (code) {
1719b746a779SJoao Martins case __HYPERVISOR_set_timer_op:
1720b746a779SJoao Martins if (exit->u.hcall.longmode) {
1721b746a779SJoao Martins return kvm_xen_hcall_set_timer_op(exit, cpu,
1722b746a779SJoao Martins exit->u.hcall.params[0]);
1723b746a779SJoao Martins } else {
1724b746a779SJoao Martins /* In 32-bit mode, the 64-bit timer value is in two args. */
1725b746a779SJoao Martins uint64_t val = ((uint64_t)exit->u.hcall.params[1]) << 32 |
1726b746a779SJoao Martins (uint32_t)exit->u.hcall.params[0];
1727b746a779SJoao Martins return kvm_xen_hcall_set_timer_op(exit, cpu, val);
1728b746a779SJoao Martins }
172928b7ae94SDavid Woodhouse case __HYPERVISOR_grant_table_op:
173028b7ae94SDavid Woodhouse return kvm_xen_hcall_gnttab_op(exit, cpu, exit->u.hcall.params[0],
173128b7ae94SDavid Woodhouse exit->u.hcall.params[1],
173228b7ae94SDavid Woodhouse exit->u.hcall.params[2]);
173379b7067dSJoao Martins case __HYPERVISOR_sched_op:
173479b7067dSJoao Martins return kvm_xen_hcall_sched_op(exit, cpu, exit->u.hcall.params[0],
173579b7067dSJoao Martins exit->u.hcall.params[1]);
17363b06f29bSJoao Martins case __HYPERVISOR_event_channel_op:
17374858ba20SDavid Woodhouse return kvm_xen_hcall_evtchn_op(exit, cpu, exit->u.hcall.params[0],
17383b06f29bSJoao Martins exit->u.hcall.params[1]);
1739d70bd6a4SJoao Martins case __HYPERVISOR_vcpu_op:
1740d70bd6a4SJoao Martins return kvm_xen_hcall_vcpu_op(exit, cpu,
1741d70bd6a4SJoao Martins exit->u.hcall.params[0],
1742d70bd6a4SJoao Martins exit->u.hcall.params[1],
1743d70bd6a4SJoao Martins exit->u.hcall.params[2]);
1744671bfdcdSJoao Martins case __HYPERVISOR_hvm_op:
1745671bfdcdSJoao Martins return kvm_xen_hcall_hvm_op(exit, cpu, exit->u.hcall.params[0],
1746671bfdcdSJoao Martins exit->u.hcall.params[1]);
1747fb0fd2ceSJoao Martins case __HYPERVISOR_memory_op:
1748fb0fd2ceSJoao Martins return kvm_xen_hcall_memory_op(exit, cpu, exit->u.hcall.params[0],
1749fb0fd2ceSJoao Martins exit->u.hcall.params[1]);
1750799c2354SDavid Woodhouse case __HYPERVISOR_physdev_op:
1751799c2354SDavid Woodhouse return kvm_xen_hcall_physdev_op(exit, cpu, exit->u.hcall.params[0],
1752799c2354SDavid Woodhouse exit->u.hcall.params[1]);
1753bedcc139SJoao Martins case __HYPERVISOR_xen_version:
1754bedcc139SJoao Martins return kvm_xen_hcall_xen_version(exit, cpu, exit->u.hcall.params[0],
1755bedcc139SJoao Martins exit->u.hcall.params[1]);
175655a3f666SJoao Martins default:
175755a3f666SJoao Martins return false;
175855a3f666SJoao Martins }
175955a3f666SJoao Martins }
176055a3f666SJoao Martins
kvm_xen_handle_exit(X86CPU * cpu,struct kvm_xen_exit * exit)176155a3f666SJoao Martins int kvm_xen_handle_exit(X86CPU *cpu, struct kvm_xen_exit *exit)
176255a3f666SJoao Martins {
176355a3f666SJoao Martins if (exit->type != KVM_EXIT_XEN_HCALL) {
176455a3f666SJoao Martins return -1;
176555a3f666SJoao Martins }
176655a3f666SJoao Martins
1767110a0ea5SDavid Woodhouse /*
1768110a0ea5SDavid Woodhouse * The kernel latches the guest 32/64 mode when the MSR is used to fill
1769110a0ea5SDavid Woodhouse * the hypercall page. So if we see a hypercall in a mode that doesn't
1770110a0ea5SDavid Woodhouse * match our own idea of the guest mode, fetch the kernel's idea of the
1771110a0ea5SDavid Woodhouse * "long mode" to remain in sync.
1772110a0ea5SDavid Woodhouse */
1773110a0ea5SDavid Woodhouse if (exit->u.hcall.longmode != xen_is_long_mode()) {
1774110a0ea5SDavid Woodhouse xen_sync_long_mode();
1775110a0ea5SDavid Woodhouse }
1776110a0ea5SDavid Woodhouse
177755a3f666SJoao Martins if (!do_kvm_xen_handle_exit(cpu, exit)) {
177855a3f666SJoao Martins /*
177955a3f666SJoao Martins * Some hypercalls will be deliberately "implemented" by returning
178055a3f666SJoao Martins * -ENOSYS. This case is for hypercalls which are unexpected.
178155a3f666SJoao Martins */
178255a3f666SJoao Martins exit->u.hcall.result = -ENOSYS;
178355a3f666SJoao Martins qemu_log_mask(LOG_UNIMP, "Unimplemented Xen hypercall %"
178455a3f666SJoao Martins PRId64 " (0x%" PRIx64 " 0x%" PRIx64 " 0x%" PRIx64 ")\n",
178555a3f666SJoao Martins (uint64_t)exit->u.hcall.input,
178655a3f666SJoao Martins (uint64_t)exit->u.hcall.params[0],
178755a3f666SJoao Martins (uint64_t)exit->u.hcall.params[1],
178855a3f666SJoao Martins (uint64_t)exit->u.hcall.params[2]);
178955a3f666SJoao Martins }
179055a3f666SJoao Martins
179155a3f666SJoao Martins trace_kvm_xen_hypercall(CPU(cpu)->cpu_index, exit->u.hcall.cpl,
179255a3f666SJoao Martins exit->u.hcall.input, exit->u.hcall.params[0],
179355a3f666SJoao Martins exit->u.hcall.params[1], exit->u.hcall.params[2],
179455a3f666SJoao Martins exit->u.hcall.result);
179555a3f666SJoao Martins return 0;
179655a3f666SJoao Martins }
1797c345104cSJoao Martins
kvm_xen_get_gnttab_max_frames(void)17986f43f2eeSDavid Woodhouse uint16_t kvm_xen_get_gnttab_max_frames(void)
17996f43f2eeSDavid Woodhouse {
18006f43f2eeSDavid Woodhouse KVMState *s = KVM_STATE(current_accel());
18016f43f2eeSDavid Woodhouse return s->xen_gnttab_max_frames;
18026f43f2eeSDavid Woodhouse }
18036f43f2eeSDavid Woodhouse
kvm_xen_get_evtchn_max_pirq(void)1804e16aff4cSDavid Woodhouse uint16_t kvm_xen_get_evtchn_max_pirq(void)
1805e16aff4cSDavid Woodhouse {
1806e16aff4cSDavid Woodhouse KVMState *s = KVM_STATE(current_accel());
1807e16aff4cSDavid Woodhouse return s->xen_evtchn_max_pirq;
1808e16aff4cSDavid Woodhouse }
1809e16aff4cSDavid Woodhouse
kvm_put_xen_state(CPUState * cs)1810c345104cSJoao Martins int kvm_put_xen_state(CPUState *cs)
1811c345104cSJoao Martins {
1812c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs);
1813c345104cSJoao Martins CPUX86State *env = &cpu->env;
1814c345104cSJoao Martins uint64_t gpa;
1815c345104cSJoao Martins int ret;
1816c345104cSJoao Martins
1817c345104cSJoao Martins gpa = env->xen_vcpu_info_gpa;
1818c345104cSJoao Martins if (gpa == INVALID_GPA) {
1819c345104cSJoao Martins gpa = env->xen_vcpu_info_default_gpa;
1820c345104cSJoao Martins }
1821c345104cSJoao Martins
1822c345104cSJoao Martins if (gpa != INVALID_GPA) {
182327d4075dSDavid Woodhouse ret = set_vcpu_info(cs, gpa);
1824c345104cSJoao Martins if (ret < 0) {
1825c345104cSJoao Martins return ret;
1826c345104cSJoao Martins }
1827c345104cSJoao Martins }
1828c345104cSJoao Martins
1829f0689302SJoao Martins gpa = env->xen_vcpu_time_info_gpa;
1830f0689302SJoao Martins if (gpa != INVALID_GPA) {
1831f0689302SJoao Martins ret = kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO,
1832f0689302SJoao Martins gpa);
1833f0689302SJoao Martins if (ret < 0) {
1834f0689302SJoao Martins return ret;
1835f0689302SJoao Martins }
1836f0689302SJoao Martins }
1837f0689302SJoao Martins
18385092db87SJoao Martins gpa = env->xen_vcpu_runstate_gpa;
18395092db87SJoao Martins if (gpa != INVALID_GPA) {
18405092db87SJoao Martins ret = kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR,
18415092db87SJoao Martins gpa);
18425092db87SJoao Martins if (ret < 0) {
18435092db87SJoao Martins return ret;
18445092db87SJoao Martins }
18455092db87SJoao Martins }
18465092db87SJoao Martins
1847b746a779SJoao Martins if (env->xen_periodic_timer_period) {
1848b746a779SJoao Martins ret = do_set_periodic_timer(cs, env->xen_periodic_timer_period);
1849b746a779SJoao Martins if (ret < 0) {
1850b746a779SJoao Martins return ret;
1851b746a779SJoao Martins }
1852b746a779SJoao Martins }
1853b746a779SJoao Martins
1854105b47fdSAnkur Arora if (!kvm_xen_has_cap(EVTCHN_SEND)) {
1855b746a779SJoao Martins /*
1856b746a779SJoao Martins * If the kernel has EVTCHN_SEND support then it handles timers too,
1857b746a779SJoao Martins * so the timer will be restored by kvm_xen_set_vcpu_timer() below.
1858b746a779SJoao Martins */
185919c417ecSDavid Woodhouse QEMU_LOCK_GUARD(&env->xen_timers_lock);
1860b746a779SJoao Martins if (env->xen_singleshot_timer_ns) {
1861b746a779SJoao Martins ret = do_set_singleshot_timer(cs, env->xen_singleshot_timer_ns,
1862547c9757SDavid Woodhouse false);
1863b746a779SJoao Martins if (ret < 0) {
1864b746a779SJoao Martins return ret;
1865b746a779SJoao Martins }
1866b746a779SJoao Martins }
1867105b47fdSAnkur Arora return 0;
1868105b47fdSAnkur Arora }
1869105b47fdSAnkur Arora
1870105b47fdSAnkur Arora if (env->xen_vcpu_callback_vector) {
1871105b47fdSAnkur Arora ret = kvm_xen_set_vcpu_callback_vector(cs);
1872105b47fdSAnkur Arora if (ret < 0) {
1873105b47fdSAnkur Arora return ret;
1874105b47fdSAnkur Arora }
1875105b47fdSAnkur Arora }
1876105b47fdSAnkur Arora
1877c723d4c1SDavid Woodhouse if (env->xen_virq[VIRQ_TIMER]) {
187819c417ecSDavid Woodhouse do_set_vcpu_timer_virq(cs,
187919c417ecSDavid Woodhouse RUN_ON_CPU_HOST_INT(env->xen_virq[VIRQ_TIMER]));
1880c723d4c1SDavid Woodhouse }
1881c345104cSJoao Martins return 0;
1882c345104cSJoao Martins }
1883c345104cSJoao Martins
kvm_get_xen_state(CPUState * cs)1884c345104cSJoao Martins int kvm_get_xen_state(CPUState *cs)
1885c345104cSJoao Martins {
1886c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs);
1887c345104cSJoao Martins CPUX86State *env = &cpu->env;
1888c345104cSJoao Martins uint64_t gpa;
1889c723d4c1SDavid Woodhouse int ret;
1890c345104cSJoao Martins
1891c345104cSJoao Martins /*
1892c345104cSJoao Martins * The kernel does not mark vcpu_info as dirty when it delivers interrupts
1893c345104cSJoao Martins * to it. It's up to userspace to *assume* that any page shared thus is
1894c345104cSJoao Martins * always considered dirty. The shared_info page is different since it's
1895c345104cSJoao Martins * an overlay and migrated separately anyway.
1896c345104cSJoao Martins */
1897c345104cSJoao Martins gpa = env->xen_vcpu_info_gpa;
1898c345104cSJoao Martins if (gpa == INVALID_GPA) {
1899c345104cSJoao Martins gpa = env->xen_vcpu_info_default_gpa;
1900c345104cSJoao Martins }
1901c345104cSJoao Martins if (gpa != INVALID_GPA) {
1902c345104cSJoao Martins MemoryRegionSection mrs = memory_region_find(get_system_memory(),
1903c345104cSJoao Martins gpa,
1904c345104cSJoao Martins sizeof(struct vcpu_info));
1905c345104cSJoao Martins if (mrs.mr &&
1906c345104cSJoao Martins !int128_lt(mrs.size, int128_make64(sizeof(struct vcpu_info)))) {
1907c345104cSJoao Martins memory_region_set_dirty(mrs.mr, mrs.offset_within_region,
1908c345104cSJoao Martins sizeof(struct vcpu_info));
1909c345104cSJoao Martins }
1910c345104cSJoao Martins }
1911c345104cSJoao Martins
1912c723d4c1SDavid Woodhouse if (!kvm_xen_has_cap(EVTCHN_SEND)) {
1913c723d4c1SDavid Woodhouse return 0;
1914c723d4c1SDavid Woodhouse }
1915c723d4c1SDavid Woodhouse
1916c723d4c1SDavid Woodhouse /*
1917c723d4c1SDavid Woodhouse * If the kernel is accelerating timers, read out the current value of the
1918c723d4c1SDavid Woodhouse * singleshot timer deadline.
1919c723d4c1SDavid Woodhouse */
1920c723d4c1SDavid Woodhouse if (env->xen_virq[VIRQ_TIMER]) {
1921c723d4c1SDavid Woodhouse struct kvm_xen_vcpu_attr va = {
1922c723d4c1SDavid Woodhouse .type = KVM_XEN_VCPU_ATTR_TYPE_TIMER,
1923c723d4c1SDavid Woodhouse };
1924c723d4c1SDavid Woodhouse ret = kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_GET_ATTR, &va);
1925c723d4c1SDavid Woodhouse if (ret < 0) {
1926c723d4c1SDavid Woodhouse return ret;
1927c723d4c1SDavid Woodhouse }
192819c417ecSDavid Woodhouse
192919c417ecSDavid Woodhouse /*
193019c417ecSDavid Woodhouse * This locking is fairly pointless, and is here to appease Coverity.
193119c417ecSDavid Woodhouse * There is an unavoidable race condition if a different vCPU sets a
193219c417ecSDavid Woodhouse * timer for this vCPU after the value has been read out. But that's
193319c417ecSDavid Woodhouse * OK in practice because *all* the vCPUs need to be stopped before
193419c417ecSDavid Woodhouse * we set about migrating their state.
193519c417ecSDavid Woodhouse */
193619c417ecSDavid Woodhouse QEMU_LOCK_GUARD(&X86_CPU(cs)->env.xen_timers_lock);
1937c723d4c1SDavid Woodhouse env->xen_singleshot_timer_ns = va.u.timer.expires_ns;
1938c723d4c1SDavid Woodhouse }
1939c723d4c1SDavid Woodhouse
1940c345104cSJoao Martins return 0;
1941c345104cSJoao Martins }
1942