161491cf4SDavid Woodhouse /* 261491cf4SDavid Woodhouse * Xen HVM emulation support in KVM 361491cf4SDavid Woodhouse * 461491cf4SDavid Woodhouse * Copyright © 2019 Oracle and/or its affiliates. All rights reserved. 561491cf4SDavid Woodhouse * Copyright © 2022 Amazon.com, Inc. or its affiliates. All Rights Reserved. 661491cf4SDavid Woodhouse * 761491cf4SDavid Woodhouse * This work is licensed under the terms of the GNU GPL, version 2 or later. 861491cf4SDavid Woodhouse * See the COPYING file in the top-level directory. 961491cf4SDavid Woodhouse * 1061491cf4SDavid Woodhouse */ 1161491cf4SDavid Woodhouse 1261491cf4SDavid Woodhouse #include "qemu/osdep.h" 1355a3f666SJoao Martins #include "qemu/log.h" 1479b7067dSJoao Martins #include "qemu/main-loop.h" 15cc37d98bSRichard Henderson #include "qemu/error-report.h" 16fb0fd2ceSJoao Martins #include "hw/xen/xen.h" 1761491cf4SDavid Woodhouse #include "sysemu/kvm_int.h" 1861491cf4SDavid Woodhouse #include "sysemu/kvm_xen.h" 1961491cf4SDavid Woodhouse #include "kvm/kvm_i386.h" 20bedcc139SJoao Martins #include "exec/address-spaces.h" 2161491cf4SDavid Woodhouse #include "xen-emu.h" 2255a3f666SJoao Martins #include "trace.h" 2379b7067dSJoao Martins #include "sysemu/runstate.h" 2461491cf4SDavid Woodhouse 2527d4075dSDavid Woodhouse #include "hw/pci/msi.h" 2627d4075dSDavid Woodhouse #include "hw/i386/apic-msidef.h" 278b57d5c5SDavid Woodhouse #include "hw/i386/e820_memory_layout.h" 28110a0ea5SDavid Woodhouse #include "hw/i386/kvm/xen_overlay.h" 2991cce756SDavid Woodhouse #include "hw/i386/kvm/xen_evtchn.h" 30a28b0fc0SDavid Woodhouse #include "hw/i386/kvm/xen_gnttab.h" 31a72ccc7fSDavid Woodhouse #include "hw/i386/kvm/xen_primary_console.h" 32c08f5d0eSDavid Woodhouse #include "hw/i386/kvm/xen_xenstore.h" 33110a0ea5SDavid Woodhouse 34bedcc139SJoao Martins #include "hw/xen/interface/version.h" 3579b7067dSJoao Martins #include "hw/xen/interface/sched.h" 36fb0fd2ceSJoao Martins #include "hw/xen/interface/memory.h" 37671bfdcdSJoao Martins #include "hw/xen/interface/hvm/hvm_op.h" 38105b47fdSAnkur Arora #include "hw/xen/interface/hvm/params.h" 39d70bd6a4SJoao Martins #include "hw/xen/interface/vcpu.h" 403b06f29bSJoao Martins #include "hw/xen/interface/event_channel.h" 4128b7ae94SDavid Woodhouse #include "hw/xen/interface/grant_table.h" 42fb0fd2ceSJoao Martins 43fb0fd2ceSJoao Martins #include "xen-compat.h" 44fb0fd2ceSJoao Martins 45b746a779SJoao Martins static void xen_vcpu_singleshot_timer_event(void *opaque); 46b746a779SJoao Martins static void xen_vcpu_periodic_timer_event(void *opaque); 4719c417ecSDavid Woodhouse static int vcpuop_stop_singleshot_timer(CPUState *cs); 48b746a779SJoao Martins 49fb0fd2ceSJoao Martins #ifdef TARGET_X86_64 50fb0fd2ceSJoao Martins #define hypercall_compat32(longmode) (!(longmode)) 51fb0fd2ceSJoao Martins #else 52fb0fd2ceSJoao Martins #define hypercall_compat32(longmode) (false) 53fb0fd2ceSJoao Martins #endif 54bedcc139SJoao Martins 55f0689302SJoao Martins static bool kvm_gva_to_gpa(CPUState *cs, uint64_t gva, uint64_t *gpa, 56f0689302SJoao Martins size_t *len, bool is_write) 57bedcc139SJoao Martins { 58bedcc139SJoao Martins struct kvm_translation tr = { 59bedcc139SJoao Martins .linear_address = gva, 60bedcc139SJoao Martins }; 61bedcc139SJoao Martins 62f0689302SJoao Martins if (len) { 63f0689302SJoao Martins *len = TARGET_PAGE_SIZE - (gva & ~TARGET_PAGE_MASK); 64f0689302SJoao Martins } 65f0689302SJoao Martins 66f0689302SJoao Martins if (kvm_vcpu_ioctl(cs, KVM_TRANSLATE, &tr) || !tr.valid || 67f0689302SJoao Martins (is_write && !tr.writeable)) { 68f0689302SJoao Martins return false; 69f0689302SJoao Martins } 70f0689302SJoao Martins *gpa = tr.physical_address; 71f0689302SJoao Martins return true; 72f0689302SJoao Martins } 73f0689302SJoao Martins 74f0689302SJoao Martins static int kvm_gva_rw(CPUState *cs, uint64_t gva, void *_buf, size_t sz, 75f0689302SJoao Martins bool is_write) 76f0689302SJoao Martins { 77f0689302SJoao Martins uint8_t *buf = (uint8_t *)_buf; 78f0689302SJoao Martins uint64_t gpa; 79f0689302SJoao Martins size_t len; 80f0689302SJoao Martins 81f0689302SJoao Martins while (sz) { 82f0689302SJoao Martins if (!kvm_gva_to_gpa(cs, gva, &gpa, &len, is_write)) { 83f0689302SJoao Martins return -EFAULT; 84f0689302SJoao Martins } 85bedcc139SJoao Martins if (len > sz) { 86bedcc139SJoao Martins len = sz; 87bedcc139SJoao Martins } 88bedcc139SJoao Martins 89f0689302SJoao Martins cpu_physical_memory_rw(gpa, buf, len, is_write); 90bedcc139SJoao Martins 91bedcc139SJoao Martins buf += len; 92bedcc139SJoao Martins sz -= len; 93bedcc139SJoao Martins gva += len; 94bedcc139SJoao Martins } 95bedcc139SJoao Martins 96bedcc139SJoao Martins return 0; 97bedcc139SJoao Martins } 98bedcc139SJoao Martins 99bedcc139SJoao Martins static inline int kvm_copy_from_gva(CPUState *cs, uint64_t gva, void *buf, 100bedcc139SJoao Martins size_t sz) 101bedcc139SJoao Martins { 102bedcc139SJoao Martins return kvm_gva_rw(cs, gva, buf, sz, false); 103bedcc139SJoao Martins } 104bedcc139SJoao Martins 105bedcc139SJoao Martins static inline int kvm_copy_to_gva(CPUState *cs, uint64_t gva, void *buf, 106bedcc139SJoao Martins size_t sz) 107bedcc139SJoao Martins { 108bedcc139SJoao Martins return kvm_gva_rw(cs, gva, buf, sz, true); 109bedcc139SJoao Martins } 110bedcc139SJoao Martins 111f66b8a83SJoao Martins int kvm_xen_init(KVMState *s, uint32_t hypercall_msr) 11261491cf4SDavid Woodhouse { 11361491cf4SDavid Woodhouse const int required_caps = KVM_XEN_HVM_CONFIG_HYPERCALL_MSR | 11461491cf4SDavid Woodhouse KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL | KVM_XEN_HVM_CONFIG_SHARED_INFO; 11561491cf4SDavid Woodhouse struct kvm_xen_hvm_config cfg = { 116f66b8a83SJoao Martins .msr = hypercall_msr, 11761491cf4SDavid Woodhouse .flags = KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL, 11861491cf4SDavid Woodhouse }; 11961491cf4SDavid Woodhouse int xen_caps, ret; 12061491cf4SDavid Woodhouse 12161491cf4SDavid Woodhouse xen_caps = kvm_check_extension(s, KVM_CAP_XEN_HVM); 12261491cf4SDavid Woodhouse if (required_caps & ~xen_caps) { 12361491cf4SDavid Woodhouse error_report("kvm: Xen HVM guest support not present or insufficient"); 12461491cf4SDavid Woodhouse return -ENOSYS; 12561491cf4SDavid Woodhouse } 12661491cf4SDavid Woodhouse 12761491cf4SDavid Woodhouse if (xen_caps & KVM_XEN_HVM_CONFIG_EVTCHN_SEND) { 12861491cf4SDavid Woodhouse struct kvm_xen_hvm_attr ha = { 12961491cf4SDavid Woodhouse .type = KVM_XEN_ATTR_TYPE_XEN_VERSION, 13061491cf4SDavid Woodhouse .u.xen_version = s->xen_version, 13161491cf4SDavid Woodhouse }; 13261491cf4SDavid Woodhouse (void)kvm_vm_ioctl(s, KVM_XEN_HVM_SET_ATTR, &ha); 13361491cf4SDavid Woodhouse 13461491cf4SDavid Woodhouse cfg.flags |= KVM_XEN_HVM_CONFIG_EVTCHN_SEND; 13561491cf4SDavid Woodhouse } 13661491cf4SDavid Woodhouse 13761491cf4SDavid Woodhouse ret = kvm_vm_ioctl(s, KVM_XEN_HVM_CONFIG, &cfg); 13861491cf4SDavid Woodhouse if (ret < 0) { 13961491cf4SDavid Woodhouse error_report("kvm: Failed to enable Xen HVM support: %s", 14061491cf4SDavid Woodhouse strerror(-ret)); 14161491cf4SDavid Woodhouse return ret; 14261491cf4SDavid Woodhouse } 14361491cf4SDavid Woodhouse 1442aff696bSDavid Woodhouse /* If called a second time, don't repeat the rest of the setup. */ 1452aff696bSDavid Woodhouse if (s->xen_caps) { 1462aff696bSDavid Woodhouse return 0; 1472aff696bSDavid Woodhouse } 1482aff696bSDavid Woodhouse 1492aff696bSDavid Woodhouse /* 1502aff696bSDavid Woodhouse * Event channel delivery via GSI/PCI_INTX needs to poll the vcpu_info 1512aff696bSDavid Woodhouse * of vCPU0 to deassert the IRQ when ->evtchn_upcall_pending is cleared. 1522aff696bSDavid Woodhouse * 1532aff696bSDavid Woodhouse * In the kernel, there's a notifier hook on the PIC/IOAPIC which allows 1542aff696bSDavid Woodhouse * such things to be polled at precisely the right time. We *could* do 1552aff696bSDavid Woodhouse * it nicely in the kernel: check vcpu_info[0]->evtchn_upcall_pending at 1562aff696bSDavid Woodhouse * the moment the IRQ is acked, and see if it should be reasserted. 1572aff696bSDavid Woodhouse * 1582aff696bSDavid Woodhouse * But the in-kernel irqchip is deprecated, so we're unlikely to add 1592aff696bSDavid Woodhouse * that support in the kernel. Insist on using the split irqchip mode 1602aff696bSDavid Woodhouse * instead. 1612aff696bSDavid Woodhouse * 1622aff696bSDavid Woodhouse * This leaves us polling for the level going low in QEMU, which lacks 1632aff696bSDavid Woodhouse * the appropriate hooks in its PIC/IOAPIC code. Even VFIO is sending a 1642aff696bSDavid Woodhouse * spurious 'ack' to an INTX IRQ every time there's any MMIO access to 1652aff696bSDavid Woodhouse * the device (for which it has to unmap the device and trap access, for 1662aff696bSDavid Woodhouse * some period after an IRQ!!). In the Xen case, we do it on exit from 1672aff696bSDavid Woodhouse * KVM_RUN, if the flag is set to say that the GSI is currently asserted. 1682aff696bSDavid Woodhouse * Which is kind of icky, but less so than the VFIO one. I may fix them 1692aff696bSDavid Woodhouse * both later... 1702aff696bSDavid Woodhouse */ 1712aff696bSDavid Woodhouse if (!kvm_kernel_irqchip_split()) { 1722aff696bSDavid Woodhouse error_report("kvm: Xen support requires kernel-irqchip=split"); 1732aff696bSDavid Woodhouse return -EINVAL; 1742aff696bSDavid Woodhouse } 1752aff696bSDavid Woodhouse 17661491cf4SDavid Woodhouse s->xen_caps = xen_caps; 1778b57d5c5SDavid Woodhouse 1788b57d5c5SDavid Woodhouse /* Tell fw_cfg to notify the BIOS to reserve the range. */ 1798b57d5c5SDavid Woodhouse ret = e820_add_entry(XEN_SPECIAL_AREA_ADDR, XEN_SPECIAL_AREA_SIZE, 1808b57d5c5SDavid Woodhouse E820_RESERVED); 1818b57d5c5SDavid Woodhouse if (ret < 0) { 1828b57d5c5SDavid Woodhouse fprintf(stderr, "e820_add_entry() table is full\n"); 1838b57d5c5SDavid Woodhouse return ret; 1848b57d5c5SDavid Woodhouse } 1858b57d5c5SDavid Woodhouse 186a72ccc7fSDavid Woodhouse /* The pages couldn't be overlaid until KVM was initialized */ 187a72ccc7fSDavid Woodhouse xen_primary_console_reset(); 188c08f5d0eSDavid Woodhouse xen_xenstore_reset(); 189c08f5d0eSDavid Woodhouse 19061491cf4SDavid Woodhouse return 0; 19161491cf4SDavid Woodhouse } 19261491cf4SDavid Woodhouse 1935e691a95SDavid Woodhouse int kvm_xen_init_vcpu(CPUState *cs) 1945e691a95SDavid Woodhouse { 195c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs); 196c345104cSJoao Martins CPUX86State *env = &cpu->env; 1975e691a95SDavid Woodhouse int err; 1985e691a95SDavid Woodhouse 1995e691a95SDavid Woodhouse /* 2005e691a95SDavid Woodhouse * The kernel needs to know the Xen/ACPI vCPU ID because that's 2015e691a95SDavid Woodhouse * what the guest uses in hypercalls such as timers. It doesn't 2025e691a95SDavid Woodhouse * match the APIC ID which is generally used for talking to the 2035e691a95SDavid Woodhouse * kernel about vCPUs. And if vCPU threads race with creating 2045e691a95SDavid Woodhouse * their KVM vCPUs out of order, it doesn't necessarily match 2055e691a95SDavid Woodhouse * with the kernel's internal vCPU indices either. 2065e691a95SDavid Woodhouse */ 2075e691a95SDavid Woodhouse if (kvm_xen_has_cap(EVTCHN_SEND)) { 2085e691a95SDavid Woodhouse struct kvm_xen_vcpu_attr va = { 2095e691a95SDavid Woodhouse .type = KVM_XEN_VCPU_ATTR_TYPE_VCPU_ID, 2105e691a95SDavid Woodhouse .u.vcpu_id = cs->cpu_index, 2115e691a95SDavid Woodhouse }; 2125e691a95SDavid Woodhouse err = kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_SET_ATTR, &va); 2135e691a95SDavid Woodhouse if (err) { 2145e691a95SDavid Woodhouse error_report("kvm: Failed to set Xen vCPU ID attribute: %s", 2155e691a95SDavid Woodhouse strerror(-err)); 2165e691a95SDavid Woodhouse return err; 2175e691a95SDavid Woodhouse } 2185e691a95SDavid Woodhouse } 2195e691a95SDavid Woodhouse 220c345104cSJoao Martins env->xen_vcpu_info_gpa = INVALID_GPA; 221c345104cSJoao Martins env->xen_vcpu_info_default_gpa = INVALID_GPA; 222f0689302SJoao Martins env->xen_vcpu_time_info_gpa = INVALID_GPA; 2235092db87SJoao Martins env->xen_vcpu_runstate_gpa = INVALID_GPA; 224c345104cSJoao Martins 225b746a779SJoao Martins qemu_mutex_init(&env->xen_timers_lock); 226b746a779SJoao Martins env->xen_singleshot_timer = timer_new_ns(QEMU_CLOCK_VIRTUAL, 227b746a779SJoao Martins xen_vcpu_singleshot_timer_event, 228b746a779SJoao Martins cpu); 229b746a779SJoao Martins if (!env->xen_singleshot_timer) { 230b746a779SJoao Martins return -ENOMEM; 231b746a779SJoao Martins } 232b746a779SJoao Martins env->xen_singleshot_timer->opaque = cs; 233b746a779SJoao Martins 234b746a779SJoao Martins env->xen_periodic_timer = timer_new_ns(QEMU_CLOCK_VIRTUAL, 235b746a779SJoao Martins xen_vcpu_periodic_timer_event, 236b746a779SJoao Martins cpu); 237b746a779SJoao Martins if (!env->xen_periodic_timer) { 238b746a779SJoao Martins return -ENOMEM; 239b746a779SJoao Martins } 240b746a779SJoao Martins env->xen_periodic_timer->opaque = cs; 241b746a779SJoao Martins 2425e691a95SDavid Woodhouse return 0; 2435e691a95SDavid Woodhouse } 2445e691a95SDavid Woodhouse 24561491cf4SDavid Woodhouse uint32_t kvm_xen_get_caps(void) 24661491cf4SDavid Woodhouse { 24761491cf4SDavid Woodhouse return kvm_state->xen_caps; 24861491cf4SDavid Woodhouse } 24955a3f666SJoao Martins 250bedcc139SJoao Martins static bool kvm_xen_hcall_xen_version(struct kvm_xen_exit *exit, X86CPU *cpu, 251bedcc139SJoao Martins int cmd, uint64_t arg) 252bedcc139SJoao Martins { 253bedcc139SJoao Martins int err = 0; 254bedcc139SJoao Martins 255bedcc139SJoao Martins switch (cmd) { 256bedcc139SJoao Martins case XENVER_get_features: { 257bedcc139SJoao Martins struct xen_feature_info fi; 258bedcc139SJoao Martins 259bedcc139SJoao Martins /* No need for 32/64 compat handling */ 260bedcc139SJoao Martins qemu_build_assert(sizeof(fi) == 8); 261bedcc139SJoao Martins 262bedcc139SJoao Martins err = kvm_copy_from_gva(CPU(cpu), arg, &fi, sizeof(fi)); 263bedcc139SJoao Martins if (err) { 264bedcc139SJoao Martins break; 265bedcc139SJoao Martins } 266bedcc139SJoao Martins 267bedcc139SJoao Martins fi.submap = 0; 268bedcc139SJoao Martins if (fi.submap_idx == 0) { 269bedcc139SJoao Martins fi.submap |= 1 << XENFEAT_writable_page_tables | 270bedcc139SJoao Martins 1 << XENFEAT_writable_descriptor_tables | 271bedcc139SJoao Martins 1 << XENFEAT_auto_translated_physmap | 272b746a779SJoao Martins 1 << XENFEAT_hvm_callback_vector | 2736096cf78SDavid Woodhouse 1 << XENFEAT_hvm_safe_pvclock | 2746096cf78SDavid Woodhouse 1 << XENFEAT_hvm_pirqs; 275bedcc139SJoao Martins } 276bedcc139SJoao Martins 277bedcc139SJoao Martins err = kvm_copy_to_gva(CPU(cpu), arg, &fi, sizeof(fi)); 278bedcc139SJoao Martins break; 279bedcc139SJoao Martins } 280bedcc139SJoao Martins 281bedcc139SJoao Martins default: 282bedcc139SJoao Martins return false; 283bedcc139SJoao Martins } 284bedcc139SJoao Martins 285bedcc139SJoao Martins exit->u.hcall.result = err; 286bedcc139SJoao Martins return true; 287bedcc139SJoao Martins } 288bedcc139SJoao Martins 289c345104cSJoao Martins static int kvm_xen_set_vcpu_attr(CPUState *cs, uint16_t type, uint64_t gpa) 290c345104cSJoao Martins { 291c345104cSJoao Martins struct kvm_xen_vcpu_attr xhsi; 292c345104cSJoao Martins 293c345104cSJoao Martins xhsi.type = type; 294c345104cSJoao Martins xhsi.u.gpa = gpa; 295c345104cSJoao Martins 296c345104cSJoao Martins trace_kvm_xen_set_vcpu_attr(cs->cpu_index, type, gpa); 297c345104cSJoao Martins 298c345104cSJoao Martins return kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_SET_ATTR, &xhsi); 299c345104cSJoao Martins } 300c345104cSJoao Martins 301105b47fdSAnkur Arora static int kvm_xen_set_vcpu_callback_vector(CPUState *cs) 302105b47fdSAnkur Arora { 303105b47fdSAnkur Arora uint8_t vector = X86_CPU(cs)->env.xen_vcpu_callback_vector; 304105b47fdSAnkur Arora struct kvm_xen_vcpu_attr xva; 305105b47fdSAnkur Arora 306105b47fdSAnkur Arora xva.type = KVM_XEN_VCPU_ATTR_TYPE_UPCALL_VECTOR; 307105b47fdSAnkur Arora xva.u.vector = vector; 308105b47fdSAnkur Arora 309105b47fdSAnkur Arora trace_kvm_xen_set_vcpu_callback(cs->cpu_index, vector); 310105b47fdSAnkur Arora 311e7dbb62fSDavid Woodhouse return kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_SET_ATTR, &xva); 312105b47fdSAnkur Arora } 313105b47fdSAnkur Arora 314105b47fdSAnkur Arora static void do_set_vcpu_callback_vector(CPUState *cs, run_on_cpu_data data) 315105b47fdSAnkur Arora { 316105b47fdSAnkur Arora X86CPU *cpu = X86_CPU(cs); 317105b47fdSAnkur Arora CPUX86State *env = &cpu->env; 318105b47fdSAnkur Arora 319105b47fdSAnkur Arora env->xen_vcpu_callback_vector = data.host_int; 320105b47fdSAnkur Arora 321105b47fdSAnkur Arora if (kvm_xen_has_cap(EVTCHN_SEND)) { 322105b47fdSAnkur Arora kvm_xen_set_vcpu_callback_vector(cs); 323105b47fdSAnkur Arora } 324105b47fdSAnkur Arora } 325105b47fdSAnkur Arora 32627d4075dSDavid Woodhouse static int set_vcpu_info(CPUState *cs, uint64_t gpa) 32727d4075dSDavid Woodhouse { 32827d4075dSDavid Woodhouse X86CPU *cpu = X86_CPU(cs); 32927d4075dSDavid Woodhouse CPUX86State *env = &cpu->env; 33027d4075dSDavid Woodhouse MemoryRegionSection mrs = { .mr = NULL }; 33127d4075dSDavid Woodhouse void *vcpu_info_hva = NULL; 33227d4075dSDavid Woodhouse int ret; 33327d4075dSDavid Woodhouse 33427d4075dSDavid Woodhouse ret = kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_INFO, gpa); 33527d4075dSDavid Woodhouse if (ret || gpa == INVALID_GPA) { 33627d4075dSDavid Woodhouse goto out; 33727d4075dSDavid Woodhouse } 33827d4075dSDavid Woodhouse 33927d4075dSDavid Woodhouse mrs = memory_region_find(get_system_memory(), gpa, 34027d4075dSDavid Woodhouse sizeof(struct vcpu_info)); 34127d4075dSDavid Woodhouse if (mrs.mr && mrs.mr->ram_block && 34227d4075dSDavid Woodhouse !int128_lt(mrs.size, int128_make64(sizeof(struct vcpu_info)))) { 34327d4075dSDavid Woodhouse vcpu_info_hva = qemu_map_ram_ptr(mrs.mr->ram_block, 34427d4075dSDavid Woodhouse mrs.offset_within_region); 34527d4075dSDavid Woodhouse } 34627d4075dSDavid Woodhouse if (!vcpu_info_hva) { 34727d4075dSDavid Woodhouse if (mrs.mr) { 34827d4075dSDavid Woodhouse memory_region_unref(mrs.mr); 34927d4075dSDavid Woodhouse mrs.mr = NULL; 35027d4075dSDavid Woodhouse } 35127d4075dSDavid Woodhouse ret = -EINVAL; 35227d4075dSDavid Woodhouse } 35327d4075dSDavid Woodhouse 35427d4075dSDavid Woodhouse out: 35527d4075dSDavid Woodhouse if (env->xen_vcpu_info_mr) { 35627d4075dSDavid Woodhouse memory_region_unref(env->xen_vcpu_info_mr); 35727d4075dSDavid Woodhouse } 35827d4075dSDavid Woodhouse env->xen_vcpu_info_hva = vcpu_info_hva; 35927d4075dSDavid Woodhouse env->xen_vcpu_info_mr = mrs.mr; 36027d4075dSDavid Woodhouse return ret; 36127d4075dSDavid Woodhouse } 36227d4075dSDavid Woodhouse 363c345104cSJoao Martins static void do_set_vcpu_info_default_gpa(CPUState *cs, run_on_cpu_data data) 364c345104cSJoao Martins { 365c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs); 366c345104cSJoao Martins CPUX86State *env = &cpu->env; 367c345104cSJoao Martins 368c345104cSJoao Martins env->xen_vcpu_info_default_gpa = data.host_ulong; 369c345104cSJoao Martins 370c345104cSJoao Martins /* Changing the default does nothing if a vcpu_info was explicitly set. */ 371c345104cSJoao Martins if (env->xen_vcpu_info_gpa == INVALID_GPA) { 37227d4075dSDavid Woodhouse set_vcpu_info(cs, env->xen_vcpu_info_default_gpa); 373c345104cSJoao Martins } 374c345104cSJoao Martins } 375c345104cSJoao Martins 376c345104cSJoao Martins static void do_set_vcpu_info_gpa(CPUState *cs, run_on_cpu_data data) 377c345104cSJoao Martins { 378c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs); 379c345104cSJoao Martins CPUX86State *env = &cpu->env; 380c345104cSJoao Martins 381c345104cSJoao Martins env->xen_vcpu_info_gpa = data.host_ulong; 382c345104cSJoao Martins 38327d4075dSDavid Woodhouse set_vcpu_info(cs, env->xen_vcpu_info_gpa); 38427d4075dSDavid Woodhouse } 38527d4075dSDavid Woodhouse 38627d4075dSDavid Woodhouse void *kvm_xen_get_vcpu_info_hva(uint32_t vcpu_id) 38727d4075dSDavid Woodhouse { 38827d4075dSDavid Woodhouse CPUState *cs = qemu_get_cpu(vcpu_id); 38927d4075dSDavid Woodhouse if (!cs) { 39027d4075dSDavid Woodhouse return NULL; 39127d4075dSDavid Woodhouse } 39227d4075dSDavid Woodhouse 39327d4075dSDavid Woodhouse return X86_CPU(cs)->env.xen_vcpu_info_hva; 39427d4075dSDavid Woodhouse } 39527d4075dSDavid Woodhouse 396ddf0fd9aSDavid Woodhouse void kvm_xen_maybe_deassert_callback(CPUState *cs) 397ddf0fd9aSDavid Woodhouse { 398ddf0fd9aSDavid Woodhouse CPUX86State *env = &X86_CPU(cs)->env; 399ddf0fd9aSDavid Woodhouse struct vcpu_info *vi = env->xen_vcpu_info_hva; 400ddf0fd9aSDavid Woodhouse if (!vi) { 401ddf0fd9aSDavid Woodhouse return; 402ddf0fd9aSDavid Woodhouse } 403ddf0fd9aSDavid Woodhouse 404ddf0fd9aSDavid Woodhouse /* If the evtchn_upcall_pending flag is cleared, turn the GSI off. */ 405ddf0fd9aSDavid Woodhouse if (!vi->evtchn_upcall_pending) { 406195801d7SStefan Hajnoczi bql_lock(); 407ddf0fd9aSDavid Woodhouse /* 408ddf0fd9aSDavid Woodhouse * Check again now we have the lock, because it may have been 409ddf0fd9aSDavid Woodhouse * asserted in the interim. And we don't want to take the lock 410ddf0fd9aSDavid Woodhouse * every time because this is a fast path. 411ddf0fd9aSDavid Woodhouse */ 412ddf0fd9aSDavid Woodhouse if (!vi->evtchn_upcall_pending) { 413ddf0fd9aSDavid Woodhouse X86_CPU(cs)->env.xen_callback_asserted = false; 414ddf0fd9aSDavid Woodhouse xen_evtchn_set_callback_level(0); 415ddf0fd9aSDavid Woodhouse } 416195801d7SStefan Hajnoczi bql_unlock(); 417ddf0fd9aSDavid Woodhouse } 418ddf0fd9aSDavid Woodhouse } 419ddf0fd9aSDavid Woodhouse 420ddf0fd9aSDavid Woodhouse void kvm_xen_set_callback_asserted(void) 421ddf0fd9aSDavid Woodhouse { 422ddf0fd9aSDavid Woodhouse CPUState *cs = qemu_get_cpu(0); 423ddf0fd9aSDavid Woodhouse 424ddf0fd9aSDavid Woodhouse if (cs) { 425ddf0fd9aSDavid Woodhouse X86_CPU(cs)->env.xen_callback_asserted = true; 426ddf0fd9aSDavid Woodhouse } 427ddf0fd9aSDavid Woodhouse } 428ddf0fd9aSDavid Woodhouse 42918e83f28SDavid Woodhouse bool kvm_xen_has_vcpu_callback_vector(void) 43018e83f28SDavid Woodhouse { 43118e83f28SDavid Woodhouse CPUState *cs = qemu_get_cpu(0); 43218e83f28SDavid Woodhouse 43318e83f28SDavid Woodhouse return cs && !!X86_CPU(cs)->env.xen_vcpu_callback_vector; 43418e83f28SDavid Woodhouse } 43518e83f28SDavid Woodhouse 43627d4075dSDavid Woodhouse void kvm_xen_inject_vcpu_callback_vector(uint32_t vcpu_id, int type) 43727d4075dSDavid Woodhouse { 43827d4075dSDavid Woodhouse CPUState *cs = qemu_get_cpu(vcpu_id); 43927d4075dSDavid Woodhouse uint8_t vector; 44027d4075dSDavid Woodhouse 44127d4075dSDavid Woodhouse if (!cs) { 44227d4075dSDavid Woodhouse return; 44327d4075dSDavid Woodhouse } 44427d4075dSDavid Woodhouse 44527d4075dSDavid Woodhouse vector = X86_CPU(cs)->env.xen_vcpu_callback_vector; 44627d4075dSDavid Woodhouse if (vector) { 44727d4075dSDavid Woodhouse /* 44827d4075dSDavid Woodhouse * The per-vCPU callback vector injected via lapic. Just 44927d4075dSDavid Woodhouse * deliver it as an MSI. 45027d4075dSDavid Woodhouse */ 45127d4075dSDavid Woodhouse MSIMessage msg = { 452e7dbb62fSDavid Woodhouse .address = APIC_DEFAULT_ADDRESS | 453e7dbb62fSDavid Woodhouse (X86_CPU(cs)->apic_id << MSI_ADDR_DEST_ID_SHIFT), 45427d4075dSDavid Woodhouse .data = vector | (1UL << MSI_DATA_LEVEL_SHIFT), 45527d4075dSDavid Woodhouse }; 45627d4075dSDavid Woodhouse kvm_irqchip_send_msi(kvm_state, msg); 45727d4075dSDavid Woodhouse return; 45827d4075dSDavid Woodhouse } 45927d4075dSDavid Woodhouse 46027d4075dSDavid Woodhouse switch (type) { 46127d4075dSDavid Woodhouse case HVM_PARAM_CALLBACK_TYPE_VECTOR: 46227d4075dSDavid Woodhouse /* 46327d4075dSDavid Woodhouse * If the evtchn_upcall_pending field in the vcpu_info is set, then 46427d4075dSDavid Woodhouse * KVM will automatically deliver the vector on entering the vCPU 46527d4075dSDavid Woodhouse * so all we have to do is kick it out. 46627d4075dSDavid Woodhouse */ 46727d4075dSDavid Woodhouse qemu_cpu_kick(cs); 46827d4075dSDavid Woodhouse break; 469ddf0fd9aSDavid Woodhouse 470ddf0fd9aSDavid Woodhouse case HVM_PARAM_CALLBACK_TYPE_GSI: 471ddf0fd9aSDavid Woodhouse case HVM_PARAM_CALLBACK_TYPE_PCI_INTX: 472ddf0fd9aSDavid Woodhouse if (vcpu_id == 0) { 473ddf0fd9aSDavid Woodhouse xen_evtchn_set_callback_level(1); 474ddf0fd9aSDavid Woodhouse } 475ddf0fd9aSDavid Woodhouse break; 47627d4075dSDavid Woodhouse } 477c345104cSJoao Martins } 478c345104cSJoao Martins 47919c417ecSDavid Woodhouse /* Must always be called with xen_timers_lock held */ 480c723d4c1SDavid Woodhouse static int kvm_xen_set_vcpu_timer(CPUState *cs) 481c723d4c1SDavid Woodhouse { 482c723d4c1SDavid Woodhouse X86CPU *cpu = X86_CPU(cs); 483c723d4c1SDavid Woodhouse CPUX86State *env = &cpu->env; 484c723d4c1SDavid Woodhouse 485c723d4c1SDavid Woodhouse struct kvm_xen_vcpu_attr va = { 486c723d4c1SDavid Woodhouse .type = KVM_XEN_VCPU_ATTR_TYPE_TIMER, 487c723d4c1SDavid Woodhouse .u.timer.port = env->xen_virq[VIRQ_TIMER], 488c723d4c1SDavid Woodhouse .u.timer.priority = KVM_IRQ_ROUTING_XEN_EVTCHN_PRIO_2LEVEL, 489c723d4c1SDavid Woodhouse .u.timer.expires_ns = env->xen_singleshot_timer_ns, 490c723d4c1SDavid Woodhouse }; 491c723d4c1SDavid Woodhouse 492c723d4c1SDavid Woodhouse return kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_SET_ATTR, &va); 493c723d4c1SDavid Woodhouse } 494c723d4c1SDavid Woodhouse 495c723d4c1SDavid Woodhouse static void do_set_vcpu_timer_virq(CPUState *cs, run_on_cpu_data data) 496c723d4c1SDavid Woodhouse { 49719c417ecSDavid Woodhouse QEMU_LOCK_GUARD(&X86_CPU(cs)->env.xen_timers_lock); 498c723d4c1SDavid Woodhouse kvm_xen_set_vcpu_timer(cs); 499c723d4c1SDavid Woodhouse } 500c723d4c1SDavid Woodhouse 501c723d4c1SDavid Woodhouse int kvm_xen_set_vcpu_virq(uint32_t vcpu_id, uint16_t virq, uint16_t port) 502c723d4c1SDavid Woodhouse { 503c723d4c1SDavid Woodhouse CPUState *cs = qemu_get_cpu(vcpu_id); 504c723d4c1SDavid Woodhouse 505c723d4c1SDavid Woodhouse if (!cs) { 506c723d4c1SDavid Woodhouse return -ENOENT; 507c723d4c1SDavid Woodhouse } 508c723d4c1SDavid Woodhouse 509c723d4c1SDavid Woodhouse /* cpu.h doesn't include the actual Xen header. */ 510c723d4c1SDavid Woodhouse qemu_build_assert(NR_VIRQS == XEN_NR_VIRQS); 511c723d4c1SDavid Woodhouse 512c723d4c1SDavid Woodhouse if (virq >= NR_VIRQS) { 513c723d4c1SDavid Woodhouse return -EINVAL; 514c723d4c1SDavid Woodhouse } 515c723d4c1SDavid Woodhouse 516c723d4c1SDavid Woodhouse if (port && X86_CPU(cs)->env.xen_virq[virq]) { 517c723d4c1SDavid Woodhouse return -EEXIST; 518c723d4c1SDavid Woodhouse } 519c723d4c1SDavid Woodhouse 520c723d4c1SDavid Woodhouse X86_CPU(cs)->env.xen_virq[virq] = port; 521c723d4c1SDavid Woodhouse if (virq == VIRQ_TIMER && kvm_xen_has_cap(EVTCHN_SEND)) { 522c723d4c1SDavid Woodhouse async_run_on_cpu(cs, do_set_vcpu_timer_virq, 523c723d4c1SDavid Woodhouse RUN_ON_CPU_HOST_INT(port)); 524c723d4c1SDavid Woodhouse } 525c723d4c1SDavid Woodhouse return 0; 526c723d4c1SDavid Woodhouse } 527c723d4c1SDavid Woodhouse 528f0689302SJoao Martins static void do_set_vcpu_time_info_gpa(CPUState *cs, run_on_cpu_data data) 529f0689302SJoao Martins { 530f0689302SJoao Martins X86CPU *cpu = X86_CPU(cs); 531f0689302SJoao Martins CPUX86State *env = &cpu->env; 532f0689302SJoao Martins 533f0689302SJoao Martins env->xen_vcpu_time_info_gpa = data.host_ulong; 534f0689302SJoao Martins 535f0689302SJoao Martins kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO, 536f0689302SJoao Martins env->xen_vcpu_time_info_gpa); 537f0689302SJoao Martins } 538f0689302SJoao Martins 5395092db87SJoao Martins static void do_set_vcpu_runstate_gpa(CPUState *cs, run_on_cpu_data data) 5405092db87SJoao Martins { 5415092db87SJoao Martins X86CPU *cpu = X86_CPU(cs); 5425092db87SJoao Martins CPUX86State *env = &cpu->env; 5435092db87SJoao Martins 5445092db87SJoao Martins env->xen_vcpu_runstate_gpa = data.host_ulong; 5455092db87SJoao Martins 5465092db87SJoao Martins kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR, 5475092db87SJoao Martins env->xen_vcpu_runstate_gpa); 5485092db87SJoao Martins } 5495092db87SJoao Martins 550c345104cSJoao Martins static void do_vcpu_soft_reset(CPUState *cs, run_on_cpu_data data) 551c345104cSJoao Martins { 552c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs); 553c345104cSJoao Martins CPUX86State *env = &cpu->env; 554c345104cSJoao Martins 555c345104cSJoao Martins env->xen_vcpu_info_gpa = INVALID_GPA; 556c345104cSJoao Martins env->xen_vcpu_info_default_gpa = INVALID_GPA; 557f0689302SJoao Martins env->xen_vcpu_time_info_gpa = INVALID_GPA; 5585092db87SJoao Martins env->xen_vcpu_runstate_gpa = INVALID_GPA; 559105b47fdSAnkur Arora env->xen_vcpu_callback_vector = 0; 560c723d4c1SDavid Woodhouse memset(env->xen_virq, 0, sizeof(env->xen_virq)); 561c345104cSJoao Martins 56227d4075dSDavid Woodhouse set_vcpu_info(cs, INVALID_GPA); 563f0689302SJoao Martins kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO, 564f0689302SJoao Martins INVALID_GPA); 5655092db87SJoao Martins kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR, 5665092db87SJoao Martins INVALID_GPA); 567105b47fdSAnkur Arora if (kvm_xen_has_cap(EVTCHN_SEND)) { 568105b47fdSAnkur Arora kvm_xen_set_vcpu_callback_vector(cs); 56919c417ecSDavid Woodhouse 57019c417ecSDavid Woodhouse QEMU_LOCK_GUARD(&X86_CPU(cs)->env.xen_timers_lock); 57119c417ecSDavid Woodhouse env->xen_singleshot_timer_ns = 0; 572c723d4c1SDavid Woodhouse kvm_xen_set_vcpu_timer(cs); 57319c417ecSDavid Woodhouse } else { 57419c417ecSDavid Woodhouse vcpuop_stop_singleshot_timer(cs); 57519c417ecSDavid Woodhouse }; 5765092db87SJoao Martins 577c345104cSJoao Martins } 578c345104cSJoao Martins 579fb0fd2ceSJoao Martins static int xen_set_shared_info(uint64_t gfn) 580fb0fd2ceSJoao Martins { 581fb0fd2ceSJoao Martins uint64_t gpa = gfn << TARGET_PAGE_BITS; 582c345104cSJoao Martins int i, err; 583fb0fd2ceSJoao Martins 584*32ead8e6SStefan Hajnoczi BQL_LOCK_GUARD(); 585fb0fd2ceSJoao Martins 586fb0fd2ceSJoao Martins /* 587fb0fd2ceSJoao Martins * The xen_overlay device tells KVM about it too, since it had to 588fb0fd2ceSJoao Martins * do that on migration load anyway (unless we're going to jump 589fb0fd2ceSJoao Martins * through lots of hoops to maintain the fiction that this isn't 590fb0fd2ceSJoao Martins * KVM-specific. 591fb0fd2ceSJoao Martins */ 592fb0fd2ceSJoao Martins err = xen_overlay_map_shinfo_page(gpa); 593fb0fd2ceSJoao Martins if (err) { 594fb0fd2ceSJoao Martins return err; 595fb0fd2ceSJoao Martins } 596fb0fd2ceSJoao Martins 597fb0fd2ceSJoao Martins trace_kvm_xen_set_shared_info(gfn); 598fb0fd2ceSJoao Martins 599c345104cSJoao Martins for (i = 0; i < XEN_LEGACY_MAX_VCPUS; i++) { 600c345104cSJoao Martins CPUState *cpu = qemu_get_cpu(i); 601c345104cSJoao Martins if (cpu) { 602c345104cSJoao Martins async_run_on_cpu(cpu, do_set_vcpu_info_default_gpa, 603c345104cSJoao Martins RUN_ON_CPU_HOST_ULONG(gpa)); 604c345104cSJoao Martins } 605c345104cSJoao Martins gpa += sizeof(vcpu_info_t); 606c345104cSJoao Martins } 607c345104cSJoao Martins 608fb0fd2ceSJoao Martins return err; 609fb0fd2ceSJoao Martins } 610fb0fd2ceSJoao Martins 611fb0fd2ceSJoao Martins static int add_to_physmap_one(uint32_t space, uint64_t idx, uint64_t gfn) 612fb0fd2ceSJoao Martins { 613fb0fd2ceSJoao Martins switch (space) { 614fb0fd2ceSJoao Martins case XENMAPSPACE_shared_info: 615fb0fd2ceSJoao Martins if (idx > 0) { 616fb0fd2ceSJoao Martins return -EINVAL; 617fb0fd2ceSJoao Martins } 618fb0fd2ceSJoao Martins return xen_set_shared_info(gfn); 619fb0fd2ceSJoao Martins 620fb0fd2ceSJoao Martins case XENMAPSPACE_grant_table: 621a28b0fc0SDavid Woodhouse return xen_gnttab_map_page(idx, gfn); 622a28b0fc0SDavid Woodhouse 623fb0fd2ceSJoao Martins case XENMAPSPACE_gmfn: 624fb0fd2ceSJoao Martins case XENMAPSPACE_gmfn_range: 625fb0fd2ceSJoao Martins return -ENOTSUP; 626fb0fd2ceSJoao Martins 627fb0fd2ceSJoao Martins case XENMAPSPACE_gmfn_foreign: 628fb0fd2ceSJoao Martins case XENMAPSPACE_dev_mmio: 629fb0fd2ceSJoao Martins return -EPERM; 630fb0fd2ceSJoao Martins 631fb0fd2ceSJoao Martins default: 632fb0fd2ceSJoao Martins return -EINVAL; 633fb0fd2ceSJoao Martins } 634fb0fd2ceSJoao Martins } 635fb0fd2ceSJoao Martins 636fb0fd2ceSJoao Martins static int do_add_to_physmap(struct kvm_xen_exit *exit, X86CPU *cpu, 637fb0fd2ceSJoao Martins uint64_t arg) 638fb0fd2ceSJoao Martins { 639fb0fd2ceSJoao Martins struct xen_add_to_physmap xatp; 640fb0fd2ceSJoao Martins CPUState *cs = CPU(cpu); 641fb0fd2ceSJoao Martins 642fb0fd2ceSJoao Martins if (hypercall_compat32(exit->u.hcall.longmode)) { 643fb0fd2ceSJoao Martins struct compat_xen_add_to_physmap xatp32; 644fb0fd2ceSJoao Martins 645fb0fd2ceSJoao Martins qemu_build_assert(sizeof(struct compat_xen_add_to_physmap) == 16); 646fb0fd2ceSJoao Martins if (kvm_copy_from_gva(cs, arg, &xatp32, sizeof(xatp32))) { 647fb0fd2ceSJoao Martins return -EFAULT; 648fb0fd2ceSJoao Martins } 649fb0fd2ceSJoao Martins xatp.domid = xatp32.domid; 650fb0fd2ceSJoao Martins xatp.size = xatp32.size; 651fb0fd2ceSJoao Martins xatp.space = xatp32.space; 652fb0fd2ceSJoao Martins xatp.idx = xatp32.idx; 653fb0fd2ceSJoao Martins xatp.gpfn = xatp32.gpfn; 654fb0fd2ceSJoao Martins } else { 655fb0fd2ceSJoao Martins if (kvm_copy_from_gva(cs, arg, &xatp, sizeof(xatp))) { 656fb0fd2ceSJoao Martins return -EFAULT; 657fb0fd2ceSJoao Martins } 658fb0fd2ceSJoao Martins } 659fb0fd2ceSJoao Martins 660fb0fd2ceSJoao Martins if (xatp.domid != DOMID_SELF && xatp.domid != xen_domid) { 661fb0fd2ceSJoao Martins return -ESRCH; 662fb0fd2ceSJoao Martins } 663fb0fd2ceSJoao Martins 664fb0fd2ceSJoao Martins return add_to_physmap_one(xatp.space, xatp.idx, xatp.gpfn); 665fb0fd2ceSJoao Martins } 666fb0fd2ceSJoao Martins 667782a7960SDavid Woodhouse static int do_add_to_physmap_batch(struct kvm_xen_exit *exit, X86CPU *cpu, 668782a7960SDavid Woodhouse uint64_t arg) 669782a7960SDavid Woodhouse { 670782a7960SDavid Woodhouse struct xen_add_to_physmap_batch xatpb; 671782a7960SDavid Woodhouse unsigned long idxs_gva, gpfns_gva, errs_gva; 672782a7960SDavid Woodhouse CPUState *cs = CPU(cpu); 673782a7960SDavid Woodhouse size_t op_sz; 674782a7960SDavid Woodhouse 675782a7960SDavid Woodhouse if (hypercall_compat32(exit->u.hcall.longmode)) { 676782a7960SDavid Woodhouse struct compat_xen_add_to_physmap_batch xatpb32; 677782a7960SDavid Woodhouse 678782a7960SDavid Woodhouse qemu_build_assert(sizeof(struct compat_xen_add_to_physmap_batch) == 20); 679782a7960SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &xatpb32, sizeof(xatpb32))) { 680782a7960SDavid Woodhouse return -EFAULT; 681782a7960SDavid Woodhouse } 682782a7960SDavid Woodhouse xatpb.domid = xatpb32.domid; 683782a7960SDavid Woodhouse xatpb.space = xatpb32.space; 684782a7960SDavid Woodhouse xatpb.size = xatpb32.size; 685782a7960SDavid Woodhouse 686782a7960SDavid Woodhouse idxs_gva = xatpb32.idxs.c; 687782a7960SDavid Woodhouse gpfns_gva = xatpb32.gpfns.c; 688782a7960SDavid Woodhouse errs_gva = xatpb32.errs.c; 689782a7960SDavid Woodhouse op_sz = sizeof(uint32_t); 690782a7960SDavid Woodhouse } else { 691782a7960SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &xatpb, sizeof(xatpb))) { 692782a7960SDavid Woodhouse return -EFAULT; 693782a7960SDavid Woodhouse } 694782a7960SDavid Woodhouse op_sz = sizeof(unsigned long); 695782a7960SDavid Woodhouse idxs_gva = (unsigned long)xatpb.idxs.p; 696782a7960SDavid Woodhouse gpfns_gva = (unsigned long)xatpb.gpfns.p; 697782a7960SDavid Woodhouse errs_gva = (unsigned long)xatpb.errs.p; 698782a7960SDavid Woodhouse } 699782a7960SDavid Woodhouse 700782a7960SDavid Woodhouse if (xatpb.domid != DOMID_SELF && xatpb.domid != xen_domid) { 701782a7960SDavid Woodhouse return -ESRCH; 702782a7960SDavid Woodhouse } 703782a7960SDavid Woodhouse 704782a7960SDavid Woodhouse /* Explicitly invalid for the batch op. Not that we implement it anyway. */ 705782a7960SDavid Woodhouse if (xatpb.space == XENMAPSPACE_gmfn_range) { 706782a7960SDavid Woodhouse return -EINVAL; 707782a7960SDavid Woodhouse } 708782a7960SDavid Woodhouse 709782a7960SDavid Woodhouse while (xatpb.size--) { 710782a7960SDavid Woodhouse unsigned long idx = 0; 711782a7960SDavid Woodhouse unsigned long gpfn = 0; 712782a7960SDavid Woodhouse int err; 713782a7960SDavid Woodhouse 714782a7960SDavid Woodhouse /* For 32-bit compat this only copies the low 32 bits of each */ 715782a7960SDavid Woodhouse if (kvm_copy_from_gva(cs, idxs_gva, &idx, op_sz) || 716782a7960SDavid Woodhouse kvm_copy_from_gva(cs, gpfns_gva, &gpfn, op_sz)) { 717782a7960SDavid Woodhouse return -EFAULT; 718782a7960SDavid Woodhouse } 719782a7960SDavid Woodhouse idxs_gva += op_sz; 720782a7960SDavid Woodhouse gpfns_gva += op_sz; 721782a7960SDavid Woodhouse 722782a7960SDavid Woodhouse err = add_to_physmap_one(xatpb.space, idx, gpfn); 723782a7960SDavid Woodhouse 724782a7960SDavid Woodhouse if (kvm_copy_to_gva(cs, errs_gva, &err, sizeof(err))) { 725782a7960SDavid Woodhouse return -EFAULT; 726782a7960SDavid Woodhouse } 727782a7960SDavid Woodhouse errs_gva += sizeof(err); 728782a7960SDavid Woodhouse } 729782a7960SDavid Woodhouse return 0; 730782a7960SDavid Woodhouse } 731782a7960SDavid Woodhouse 732fb0fd2ceSJoao Martins static bool kvm_xen_hcall_memory_op(struct kvm_xen_exit *exit, X86CPU *cpu, 733fb0fd2ceSJoao Martins int cmd, uint64_t arg) 734fb0fd2ceSJoao Martins { 735fb0fd2ceSJoao Martins int err; 736fb0fd2ceSJoao Martins 737fb0fd2ceSJoao Martins switch (cmd) { 738fb0fd2ceSJoao Martins case XENMEM_add_to_physmap: 739fb0fd2ceSJoao Martins err = do_add_to_physmap(exit, cpu, arg); 740fb0fd2ceSJoao Martins break; 741fb0fd2ceSJoao Martins 742782a7960SDavid Woodhouse case XENMEM_add_to_physmap_batch: 743782a7960SDavid Woodhouse err = do_add_to_physmap_batch(exit, cpu, arg); 744782a7960SDavid Woodhouse break; 745782a7960SDavid Woodhouse 746fb0fd2ceSJoao Martins default: 747fb0fd2ceSJoao Martins return false; 748fb0fd2ceSJoao Martins } 749fb0fd2ceSJoao Martins 750fb0fd2ceSJoao Martins exit->u.hcall.result = err; 751fb0fd2ceSJoao Martins return true; 752fb0fd2ceSJoao Martins } 753fb0fd2ceSJoao Martins 7545dbcd01aSAnkur Arora static bool handle_set_param(struct kvm_xen_exit *exit, X86CPU *cpu, 7555dbcd01aSAnkur Arora uint64_t arg) 7565dbcd01aSAnkur Arora { 7575dbcd01aSAnkur Arora CPUState *cs = CPU(cpu); 7585dbcd01aSAnkur Arora struct xen_hvm_param hp; 7595dbcd01aSAnkur Arora int err = 0; 7605dbcd01aSAnkur Arora 7615dbcd01aSAnkur Arora /* No need for 32/64 compat handling */ 7625dbcd01aSAnkur Arora qemu_build_assert(sizeof(hp) == 16); 7635dbcd01aSAnkur Arora 7645dbcd01aSAnkur Arora if (kvm_copy_from_gva(cs, arg, &hp, sizeof(hp))) { 7655dbcd01aSAnkur Arora err = -EFAULT; 7665dbcd01aSAnkur Arora goto out; 7675dbcd01aSAnkur Arora } 7685dbcd01aSAnkur Arora 7695dbcd01aSAnkur Arora if (hp.domid != DOMID_SELF && hp.domid != xen_domid) { 7705dbcd01aSAnkur Arora err = -ESRCH; 7715dbcd01aSAnkur Arora goto out; 7725dbcd01aSAnkur Arora } 7735dbcd01aSAnkur Arora 7745dbcd01aSAnkur Arora switch (hp.index) { 77591cce756SDavid Woodhouse case HVM_PARAM_CALLBACK_IRQ: 776195801d7SStefan Hajnoczi bql_lock(); 77791cce756SDavid Woodhouse err = xen_evtchn_set_callback_param(hp.value); 778195801d7SStefan Hajnoczi bql_unlock(); 77991cce756SDavid Woodhouse xen_set_long_mode(exit->u.hcall.longmode); 78091cce756SDavid Woodhouse break; 7815dbcd01aSAnkur Arora default: 7825dbcd01aSAnkur Arora return false; 7835dbcd01aSAnkur Arora } 7845dbcd01aSAnkur Arora 7855dbcd01aSAnkur Arora out: 7865dbcd01aSAnkur Arora exit->u.hcall.result = err; 7875dbcd01aSAnkur Arora return true; 7885dbcd01aSAnkur Arora } 7895dbcd01aSAnkur Arora 790c6623cc3SJoao Martins static bool handle_get_param(struct kvm_xen_exit *exit, X86CPU *cpu, 791c6623cc3SJoao Martins uint64_t arg) 792c6623cc3SJoao Martins { 793c6623cc3SJoao Martins CPUState *cs = CPU(cpu); 794c6623cc3SJoao Martins struct xen_hvm_param hp; 795c6623cc3SJoao Martins int err = 0; 796c6623cc3SJoao Martins 797c6623cc3SJoao Martins /* No need for 32/64 compat handling */ 798c6623cc3SJoao Martins qemu_build_assert(sizeof(hp) == 16); 799c6623cc3SJoao Martins 800c6623cc3SJoao Martins if (kvm_copy_from_gva(cs, arg, &hp, sizeof(hp))) { 801c6623cc3SJoao Martins err = -EFAULT; 802c6623cc3SJoao Martins goto out; 803c6623cc3SJoao Martins } 804c6623cc3SJoao Martins 805c6623cc3SJoao Martins if (hp.domid != DOMID_SELF && hp.domid != xen_domid) { 806c6623cc3SJoao Martins err = -ESRCH; 807c6623cc3SJoao Martins goto out; 808c6623cc3SJoao Martins } 809c6623cc3SJoao Martins 810c6623cc3SJoao Martins switch (hp.index) { 811c6623cc3SJoao Martins case HVM_PARAM_STORE_PFN: 812c6623cc3SJoao Martins hp.value = XEN_SPECIAL_PFN(XENSTORE); 813c6623cc3SJoao Martins break; 814c08f5d0eSDavid Woodhouse case HVM_PARAM_STORE_EVTCHN: 815c08f5d0eSDavid Woodhouse hp.value = xen_xenstore_get_port(); 816c08f5d0eSDavid Woodhouse break; 817a72ccc7fSDavid Woodhouse case HVM_PARAM_CONSOLE_PFN: 818a72ccc7fSDavid Woodhouse hp.value = xen_primary_console_get_pfn(); 819a72ccc7fSDavid Woodhouse if (!hp.value) { 820a72ccc7fSDavid Woodhouse err = -EINVAL; 821a72ccc7fSDavid Woodhouse } 822a72ccc7fSDavid Woodhouse break; 823a72ccc7fSDavid Woodhouse case HVM_PARAM_CONSOLE_EVTCHN: 824a72ccc7fSDavid Woodhouse hp.value = xen_primary_console_get_port(); 825a72ccc7fSDavid Woodhouse if (!hp.value) { 826a72ccc7fSDavid Woodhouse err = -EINVAL; 827a72ccc7fSDavid Woodhouse } 828a72ccc7fSDavid Woodhouse break; 829c6623cc3SJoao Martins default: 830c6623cc3SJoao Martins return false; 831c6623cc3SJoao Martins } 832c6623cc3SJoao Martins 833a72ccc7fSDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &hp, sizeof(hp))) { 834c6623cc3SJoao Martins err = -EFAULT; 835c6623cc3SJoao Martins } 836c6623cc3SJoao Martins out: 837c6623cc3SJoao Martins exit->u.hcall.result = err; 838c6623cc3SJoao Martins return true; 839c6623cc3SJoao Martins } 840c6623cc3SJoao Martins 841105b47fdSAnkur Arora static int kvm_xen_hcall_evtchn_upcall_vector(struct kvm_xen_exit *exit, 842105b47fdSAnkur Arora X86CPU *cpu, uint64_t arg) 843105b47fdSAnkur Arora { 844105b47fdSAnkur Arora struct xen_hvm_evtchn_upcall_vector up; 845105b47fdSAnkur Arora CPUState *target_cs; 846105b47fdSAnkur Arora 847105b47fdSAnkur Arora /* No need for 32/64 compat handling */ 848105b47fdSAnkur Arora qemu_build_assert(sizeof(up) == 8); 849105b47fdSAnkur Arora 850105b47fdSAnkur Arora if (kvm_copy_from_gva(CPU(cpu), arg, &up, sizeof(up))) { 851105b47fdSAnkur Arora return -EFAULT; 852105b47fdSAnkur Arora } 853105b47fdSAnkur Arora 854105b47fdSAnkur Arora if (up.vector < 0x10) { 855105b47fdSAnkur Arora return -EINVAL; 856105b47fdSAnkur Arora } 857105b47fdSAnkur Arora 858105b47fdSAnkur Arora target_cs = qemu_get_cpu(up.vcpu); 859105b47fdSAnkur Arora if (!target_cs) { 860105b47fdSAnkur Arora return -EINVAL; 861105b47fdSAnkur Arora } 862105b47fdSAnkur Arora 863105b47fdSAnkur Arora async_run_on_cpu(target_cs, do_set_vcpu_callback_vector, 864105b47fdSAnkur Arora RUN_ON_CPU_HOST_INT(up.vector)); 865105b47fdSAnkur Arora return 0; 866105b47fdSAnkur Arora } 867105b47fdSAnkur Arora 868671bfdcdSJoao Martins static bool kvm_xen_hcall_hvm_op(struct kvm_xen_exit *exit, X86CPU *cpu, 869671bfdcdSJoao Martins int cmd, uint64_t arg) 870671bfdcdSJoao Martins { 871105b47fdSAnkur Arora int ret = -ENOSYS; 872671bfdcdSJoao Martins switch (cmd) { 873105b47fdSAnkur Arora case HVMOP_set_evtchn_upcall_vector: 874e7dbb62fSDavid Woodhouse ret = kvm_xen_hcall_evtchn_upcall_vector(exit, cpu, arg); 875105b47fdSAnkur Arora break; 876105b47fdSAnkur Arora 877671bfdcdSJoao Martins case HVMOP_pagetable_dying: 878105b47fdSAnkur Arora ret = -ENOSYS; 879105b47fdSAnkur Arora break; 880671bfdcdSJoao Martins 8815dbcd01aSAnkur Arora case HVMOP_set_param: 8825dbcd01aSAnkur Arora return handle_set_param(exit, cpu, arg); 8835dbcd01aSAnkur Arora 884c6623cc3SJoao Martins case HVMOP_get_param: 885c6623cc3SJoao Martins return handle_get_param(exit, cpu, arg); 886c6623cc3SJoao Martins 887671bfdcdSJoao Martins default: 888671bfdcdSJoao Martins return false; 889671bfdcdSJoao Martins } 890105b47fdSAnkur Arora 891105b47fdSAnkur Arora exit->u.hcall.result = ret; 892105b47fdSAnkur Arora return true; 893671bfdcdSJoao Martins } 894671bfdcdSJoao Martins 895c345104cSJoao Martins static int vcpuop_register_vcpu_info(CPUState *cs, CPUState *target, 896c345104cSJoao Martins uint64_t arg) 897c345104cSJoao Martins { 898c345104cSJoao Martins struct vcpu_register_vcpu_info rvi; 899c345104cSJoao Martins uint64_t gpa; 900c345104cSJoao Martins 901c345104cSJoao Martins /* No need for 32/64 compat handling */ 902c345104cSJoao Martins qemu_build_assert(sizeof(rvi) == 16); 903c345104cSJoao Martins qemu_build_assert(sizeof(struct vcpu_info) == 64); 904c345104cSJoao Martins 905c345104cSJoao Martins if (!target) { 906c345104cSJoao Martins return -ENOENT; 907c345104cSJoao Martins } 908c345104cSJoao Martins 909c345104cSJoao Martins if (kvm_copy_from_gva(cs, arg, &rvi, sizeof(rvi))) { 910c345104cSJoao Martins return -EFAULT; 911c345104cSJoao Martins } 912c345104cSJoao Martins 913c345104cSJoao Martins if (rvi.offset > TARGET_PAGE_SIZE - sizeof(struct vcpu_info)) { 914c345104cSJoao Martins return -EINVAL; 915c345104cSJoao Martins } 916c345104cSJoao Martins 917c345104cSJoao Martins gpa = ((rvi.mfn << TARGET_PAGE_BITS) + rvi.offset); 918c345104cSJoao Martins async_run_on_cpu(target, do_set_vcpu_info_gpa, RUN_ON_CPU_HOST_ULONG(gpa)); 919c345104cSJoao Martins return 0; 920c345104cSJoao Martins } 921c345104cSJoao Martins 922f0689302SJoao Martins static int vcpuop_register_vcpu_time_info(CPUState *cs, CPUState *target, 923f0689302SJoao Martins uint64_t arg) 924f0689302SJoao Martins { 925f0689302SJoao Martins struct vcpu_register_time_memory_area tma; 926f0689302SJoao Martins uint64_t gpa; 927f0689302SJoao Martins size_t len; 928f0689302SJoao Martins 929f0689302SJoao Martins /* No need for 32/64 compat handling */ 930f0689302SJoao Martins qemu_build_assert(sizeof(tma) == 8); 931f0689302SJoao Martins qemu_build_assert(sizeof(struct vcpu_time_info) == 32); 932f0689302SJoao Martins 933f0689302SJoao Martins if (!target) { 934f0689302SJoao Martins return -ENOENT; 935f0689302SJoao Martins } 936f0689302SJoao Martins 937f0689302SJoao Martins if (kvm_copy_from_gva(cs, arg, &tma, sizeof(tma))) { 938f0689302SJoao Martins return -EFAULT; 939f0689302SJoao Martins } 940f0689302SJoao Martins 941f0689302SJoao Martins /* 942f0689302SJoao Martins * Xen actually uses the GVA and does the translation through the guest 943f0689302SJoao Martins * page tables each time. But Linux/KVM uses the GPA, on the assumption 944f0689302SJoao Martins * that guests only ever use *global* addresses (kernel virtual addresses) 945f0689302SJoao Martins * for it. If Linux is changed to redo the GVA→GPA translation each time, 946f0689302SJoao Martins * it will offer a new vCPU attribute for that, and we'll use it instead. 947f0689302SJoao Martins */ 948f0689302SJoao Martins if (!kvm_gva_to_gpa(cs, tma.addr.p, &gpa, &len, false) || 949f0689302SJoao Martins len < sizeof(struct vcpu_time_info)) { 950f0689302SJoao Martins return -EFAULT; 951f0689302SJoao Martins } 952f0689302SJoao Martins 953f0689302SJoao Martins async_run_on_cpu(target, do_set_vcpu_time_info_gpa, 954f0689302SJoao Martins RUN_ON_CPU_HOST_ULONG(gpa)); 955f0689302SJoao Martins return 0; 956f0689302SJoao Martins } 957f0689302SJoao Martins 9585092db87SJoao Martins static int vcpuop_register_runstate_info(CPUState *cs, CPUState *target, 9595092db87SJoao Martins uint64_t arg) 9605092db87SJoao Martins { 9615092db87SJoao Martins struct vcpu_register_runstate_memory_area rma; 9625092db87SJoao Martins uint64_t gpa; 9635092db87SJoao Martins size_t len; 9645092db87SJoao Martins 9655092db87SJoao Martins /* No need for 32/64 compat handling */ 9665092db87SJoao Martins qemu_build_assert(sizeof(rma) == 8); 9675092db87SJoao Martins /* The runstate area actually does change size, but Linux copes. */ 9685092db87SJoao Martins 9695092db87SJoao Martins if (!target) { 9705092db87SJoao Martins return -ENOENT; 9715092db87SJoao Martins } 9725092db87SJoao Martins 9735092db87SJoao Martins if (kvm_copy_from_gva(cs, arg, &rma, sizeof(rma))) { 9745092db87SJoao Martins return -EFAULT; 9755092db87SJoao Martins } 9765092db87SJoao Martins 9775092db87SJoao Martins /* As with vcpu_time_info, Xen actually uses the GVA but KVM doesn't. */ 9785092db87SJoao Martins if (!kvm_gva_to_gpa(cs, rma.addr.p, &gpa, &len, false)) { 9795092db87SJoao Martins return -EFAULT; 9805092db87SJoao Martins } 9815092db87SJoao Martins 9825092db87SJoao Martins async_run_on_cpu(target, do_set_vcpu_runstate_gpa, 9835092db87SJoao Martins RUN_ON_CPU_HOST_ULONG(gpa)); 9845092db87SJoao Martins return 0; 9855092db87SJoao Martins } 9865092db87SJoao Martins 987b746a779SJoao Martins static uint64_t kvm_get_current_ns(void) 988b746a779SJoao Martins { 989b746a779SJoao Martins struct kvm_clock_data data; 990b746a779SJoao Martins int ret; 991b746a779SJoao Martins 992b746a779SJoao Martins ret = kvm_vm_ioctl(kvm_state, KVM_GET_CLOCK, &data); 993b746a779SJoao Martins if (ret < 0) { 994b746a779SJoao Martins fprintf(stderr, "KVM_GET_CLOCK failed: %s\n", strerror(ret)); 995b746a779SJoao Martins abort(); 996b746a779SJoao Martins } 997b746a779SJoao Martins 998b746a779SJoao Martins return data.clock; 999b746a779SJoao Martins } 1000b746a779SJoao Martins 1001b746a779SJoao Martins static void xen_vcpu_singleshot_timer_event(void *opaque) 1002b746a779SJoao Martins { 1003b746a779SJoao Martins CPUState *cpu = opaque; 1004b746a779SJoao Martins CPUX86State *env = &X86_CPU(cpu)->env; 1005b746a779SJoao Martins uint16_t port = env->xen_virq[VIRQ_TIMER]; 1006b746a779SJoao Martins 1007b746a779SJoao Martins if (likely(port)) { 1008b746a779SJoao Martins xen_evtchn_set_port(port); 1009b746a779SJoao Martins } 1010b746a779SJoao Martins 1011b746a779SJoao Martins qemu_mutex_lock(&env->xen_timers_lock); 1012b746a779SJoao Martins env->xen_singleshot_timer_ns = 0; 1013b746a779SJoao Martins qemu_mutex_unlock(&env->xen_timers_lock); 1014b746a779SJoao Martins } 1015b746a779SJoao Martins 1016b746a779SJoao Martins static void xen_vcpu_periodic_timer_event(void *opaque) 1017b746a779SJoao Martins { 1018b746a779SJoao Martins CPUState *cpu = opaque; 1019b746a779SJoao Martins CPUX86State *env = &X86_CPU(cpu)->env; 1020b746a779SJoao Martins uint16_t port = env->xen_virq[VIRQ_TIMER]; 1021b746a779SJoao Martins int64_t qemu_now; 1022b746a779SJoao Martins 1023b746a779SJoao Martins if (likely(port)) { 1024b746a779SJoao Martins xen_evtchn_set_port(port); 1025b746a779SJoao Martins } 1026b746a779SJoao Martins 1027b746a779SJoao Martins qemu_mutex_lock(&env->xen_timers_lock); 1028b746a779SJoao Martins 1029b746a779SJoao Martins qemu_now = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL); 1030b746a779SJoao Martins timer_mod_ns(env->xen_periodic_timer, 1031b746a779SJoao Martins qemu_now + env->xen_periodic_timer_period); 1032b746a779SJoao Martins 1033b746a779SJoao Martins qemu_mutex_unlock(&env->xen_timers_lock); 1034b746a779SJoao Martins } 1035b746a779SJoao Martins 1036b746a779SJoao Martins static int do_set_periodic_timer(CPUState *target, uint64_t period_ns) 1037b746a779SJoao Martins { 1038b746a779SJoao Martins CPUX86State *tenv = &X86_CPU(target)->env; 1039b746a779SJoao Martins int64_t qemu_now; 1040b746a779SJoao Martins 1041b746a779SJoao Martins timer_del(tenv->xen_periodic_timer); 1042b746a779SJoao Martins 1043b746a779SJoao Martins qemu_mutex_lock(&tenv->xen_timers_lock); 1044b746a779SJoao Martins 1045b746a779SJoao Martins qemu_now = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL); 1046b746a779SJoao Martins timer_mod_ns(tenv->xen_periodic_timer, qemu_now + period_ns); 1047b746a779SJoao Martins tenv->xen_periodic_timer_period = period_ns; 1048b746a779SJoao Martins 1049b746a779SJoao Martins qemu_mutex_unlock(&tenv->xen_timers_lock); 1050b746a779SJoao Martins return 0; 1051b746a779SJoao Martins } 1052b746a779SJoao Martins 1053b746a779SJoao Martins #define MILLISECS(_ms) ((int64_t)((_ms) * 1000000ULL)) 1054b746a779SJoao Martins #define MICROSECS(_us) ((int64_t)((_us) * 1000ULL)) 1055b746a779SJoao Martins #define STIME_MAX ((time_t)((int64_t)~0ull >> 1)) 1056bad5cfcdSMichael Tokarev /* Chosen so (NOW() + delta) won't overflow without an uptime of 200 years */ 1057b746a779SJoao Martins #define STIME_DELTA_MAX ((int64_t)((uint64_t)~0ull >> 2)) 1058b746a779SJoao Martins 1059b746a779SJoao Martins static int vcpuop_set_periodic_timer(CPUState *cs, CPUState *target, 1060b746a779SJoao Martins uint64_t arg) 1061b746a779SJoao Martins { 1062b746a779SJoao Martins struct vcpu_set_periodic_timer spt; 1063b746a779SJoao Martins 1064b746a779SJoao Martins qemu_build_assert(sizeof(spt) == 8); 1065b746a779SJoao Martins if (kvm_copy_from_gva(cs, arg, &spt, sizeof(spt))) { 1066b746a779SJoao Martins return -EFAULT; 1067b746a779SJoao Martins } 1068b746a779SJoao Martins 1069b746a779SJoao Martins if (spt.period_ns < MILLISECS(1) || spt.period_ns > STIME_DELTA_MAX) { 1070b746a779SJoao Martins return -EINVAL; 1071b746a779SJoao Martins } 1072b746a779SJoao Martins 1073b746a779SJoao Martins return do_set_periodic_timer(target, spt.period_ns); 1074b746a779SJoao Martins } 1075b746a779SJoao Martins 1076b746a779SJoao Martins static int vcpuop_stop_periodic_timer(CPUState *target) 1077b746a779SJoao Martins { 1078b746a779SJoao Martins CPUX86State *tenv = &X86_CPU(target)->env; 1079b746a779SJoao Martins 1080b746a779SJoao Martins qemu_mutex_lock(&tenv->xen_timers_lock); 1081b746a779SJoao Martins 1082b746a779SJoao Martins timer_del(tenv->xen_periodic_timer); 1083b746a779SJoao Martins tenv->xen_periodic_timer_period = 0; 1084b746a779SJoao Martins 1085b746a779SJoao Martins qemu_mutex_unlock(&tenv->xen_timers_lock); 1086b746a779SJoao Martins return 0; 1087b746a779SJoao Martins } 1088b746a779SJoao Martins 108919c417ecSDavid Woodhouse /* 109019c417ecSDavid Woodhouse * Userspace handling of timer, for older kernels. 109119c417ecSDavid Woodhouse * Must always be called with xen_timers_lock held. 109219c417ecSDavid Woodhouse */ 1093b746a779SJoao Martins static int do_set_singleshot_timer(CPUState *cs, uint64_t timeout_abs, 1094547c9757SDavid Woodhouse bool linux_wa) 1095b746a779SJoao Martins { 1096b746a779SJoao Martins CPUX86State *env = &X86_CPU(cs)->env; 1097b746a779SJoao Martins int64_t now = kvm_get_current_ns(); 1098b746a779SJoao Martins int64_t qemu_now = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL); 1099b746a779SJoao Martins int64_t delta = timeout_abs - now; 1100b746a779SJoao Martins 1101b746a779SJoao Martins if (linux_wa && unlikely((int64_t)timeout_abs < 0 || 1102b746a779SJoao Martins (delta > 0 && (uint32_t)(delta >> 50) != 0))) { 1103b746a779SJoao Martins /* 1104b746a779SJoao Martins * Xen has a 'Linux workaround' in do_set_timer_op() which checks 1105b746a779SJoao Martins * for negative absolute timeout values (caused by integer 1106b746a779SJoao Martins * overflow), and for values about 13 days in the future (2^50ns) 1107b746a779SJoao Martins * which would be caused by jiffies overflow. For those cases, it 1108b746a779SJoao Martins * sets the timeout 100ms in the future (not *too* soon, since if 1109b746a779SJoao Martins * a guest really did set a long timeout on purpose we don't want 1110b746a779SJoao Martins * to keep churning CPU time by waking it up). 1111b746a779SJoao Martins */ 1112b746a779SJoao Martins delta = (100 * SCALE_MS); 1113b746a779SJoao Martins timeout_abs = now + delta; 1114b746a779SJoao Martins } 1115b746a779SJoao Martins 1116b746a779SJoao Martins timer_mod_ns(env->xen_singleshot_timer, qemu_now + delta); 1117b746a779SJoao Martins env->xen_singleshot_timer_ns = now + delta; 1118b746a779SJoao Martins return 0; 1119b746a779SJoao Martins } 1120b746a779SJoao Martins 1121b746a779SJoao Martins static int vcpuop_set_singleshot_timer(CPUState *cs, uint64_t arg) 1122b746a779SJoao Martins { 1123b746a779SJoao Martins struct vcpu_set_singleshot_timer sst = { 0 }; 1124b746a779SJoao Martins 1125b746a779SJoao Martins /* 1126b746a779SJoao Martins * The struct is a uint64_t followed by a uint32_t. On 32-bit that 1127b746a779SJoao Martins * makes it 12 bytes. On 64-bit it gets padded to 16. The parts 1128b746a779SJoao Martins * that get used are identical, and there's four bytes of padding 1129b746a779SJoao Martins * unused at the end. For true Xen compatibility we should attempt 1130b746a779SJoao Martins * to copy the full 16 bytes from 64-bit guests, and return -EFAULT 1131b746a779SJoao Martins * if we can't get the padding too. But that's daft. Just copy what 1132b746a779SJoao Martins * we need. 1133b746a779SJoao Martins */ 1134b746a779SJoao Martins qemu_build_assert(offsetof(struct vcpu_set_singleshot_timer, flags) == 8); 1135b746a779SJoao Martins qemu_build_assert(sizeof(sst) >= 12); 1136b746a779SJoao Martins 1137b746a779SJoao Martins if (kvm_copy_from_gva(cs, arg, &sst, 12)) { 1138b746a779SJoao Martins return -EFAULT; 1139b746a779SJoao Martins } 1140b746a779SJoao Martins 114119c417ecSDavid Woodhouse QEMU_LOCK_GUARD(&X86_CPU(cs)->env.xen_timers_lock); 1142547c9757SDavid Woodhouse 1143547c9757SDavid Woodhouse /* 1144547c9757SDavid Woodhouse * We ignore the VCPU_SSHOTTMR_future flag, just as Xen now does. 1145547c9757SDavid Woodhouse * The only guest that ever used it, got it wrong. 1146547c9757SDavid Woodhouse * https://xenbits.xen.org/gitweb/?p=xen.git;a=commitdiff;h=19c6cbd909 1147547c9757SDavid Woodhouse */ 1148547c9757SDavid Woodhouse return do_set_singleshot_timer(cs, sst.timeout_abs_ns, false); 1149b746a779SJoao Martins } 1150b746a779SJoao Martins 1151b746a779SJoao Martins static int vcpuop_stop_singleshot_timer(CPUState *cs) 1152b746a779SJoao Martins { 1153b746a779SJoao Martins CPUX86State *env = &X86_CPU(cs)->env; 1154b746a779SJoao Martins 1155b746a779SJoao Martins qemu_mutex_lock(&env->xen_timers_lock); 1156b746a779SJoao Martins 1157b746a779SJoao Martins timer_del(env->xen_singleshot_timer); 1158b746a779SJoao Martins env->xen_singleshot_timer_ns = 0; 1159b746a779SJoao Martins 1160b746a779SJoao Martins qemu_mutex_unlock(&env->xen_timers_lock); 1161b746a779SJoao Martins return 0; 1162b746a779SJoao Martins } 1163b746a779SJoao Martins 1164b746a779SJoao Martins static bool kvm_xen_hcall_set_timer_op(struct kvm_xen_exit *exit, X86CPU *cpu, 1165b746a779SJoao Martins uint64_t timeout) 1166b746a779SJoao Martins { 1167b746a779SJoao Martins int err; 1168b746a779SJoao Martins 1169b746a779SJoao Martins if (unlikely(timeout == 0)) { 1170b746a779SJoao Martins err = vcpuop_stop_singleshot_timer(CPU(cpu)); 1171b746a779SJoao Martins } else { 117219c417ecSDavid Woodhouse QEMU_LOCK_GUARD(&X86_CPU(cpu)->env.xen_timers_lock); 1173547c9757SDavid Woodhouse err = do_set_singleshot_timer(CPU(cpu), timeout, true); 1174b746a779SJoao Martins } 1175b746a779SJoao Martins exit->u.hcall.result = err; 1176b746a779SJoao Martins return true; 1177b746a779SJoao Martins } 1178b746a779SJoao Martins 1179d70bd6a4SJoao Martins static bool kvm_xen_hcall_vcpu_op(struct kvm_xen_exit *exit, X86CPU *cpu, 1180d70bd6a4SJoao Martins int cmd, int vcpu_id, uint64_t arg) 1181d70bd6a4SJoao Martins { 1182c345104cSJoao Martins CPUState *cs = CPU(cpu); 1183b746a779SJoao Martins CPUState *dest = cs->cpu_index == vcpu_id ? cs : qemu_get_cpu(vcpu_id); 1184d70bd6a4SJoao Martins int err; 1185d70bd6a4SJoao Martins 1186b746a779SJoao Martins if (!dest) { 1187b746a779SJoao Martins err = -ENOENT; 1188b746a779SJoao Martins goto out; 1189b746a779SJoao Martins } 1190b746a779SJoao Martins 1191d70bd6a4SJoao Martins switch (cmd) { 11925092db87SJoao Martins case VCPUOP_register_runstate_memory_area: 11935092db87SJoao Martins err = vcpuop_register_runstate_info(cs, dest, arg); 11945092db87SJoao Martins break; 1195f0689302SJoao Martins case VCPUOP_register_vcpu_time_memory_area: 1196f0689302SJoao Martins err = vcpuop_register_vcpu_time_info(cs, dest, arg); 1197f0689302SJoao Martins break; 1198d70bd6a4SJoao Martins case VCPUOP_register_vcpu_info: 1199c345104cSJoao Martins err = vcpuop_register_vcpu_info(cs, dest, arg); 1200d70bd6a4SJoao Martins break; 1201b746a779SJoao Martins case VCPUOP_set_singleshot_timer: { 1202b746a779SJoao Martins if (cs->cpu_index == vcpu_id) { 1203b746a779SJoao Martins err = vcpuop_set_singleshot_timer(dest, arg); 1204b746a779SJoao Martins } else { 1205b746a779SJoao Martins err = -EINVAL; 1206b746a779SJoao Martins } 1207b746a779SJoao Martins break; 1208b746a779SJoao Martins } 1209b746a779SJoao Martins case VCPUOP_stop_singleshot_timer: 1210b746a779SJoao Martins if (cs->cpu_index == vcpu_id) { 1211b746a779SJoao Martins err = vcpuop_stop_singleshot_timer(dest); 1212b746a779SJoao Martins } else { 1213b746a779SJoao Martins err = -EINVAL; 1214b746a779SJoao Martins } 1215b746a779SJoao Martins break; 1216b746a779SJoao Martins case VCPUOP_set_periodic_timer: { 1217b746a779SJoao Martins err = vcpuop_set_periodic_timer(cs, dest, arg); 1218b746a779SJoao Martins break; 1219b746a779SJoao Martins } 1220b746a779SJoao Martins case VCPUOP_stop_periodic_timer: 1221b746a779SJoao Martins err = vcpuop_stop_periodic_timer(dest); 1222b746a779SJoao Martins break; 1223d70bd6a4SJoao Martins 1224d70bd6a4SJoao Martins default: 1225d70bd6a4SJoao Martins return false; 1226d70bd6a4SJoao Martins } 1227d70bd6a4SJoao Martins 1228b746a779SJoao Martins out: 1229d70bd6a4SJoao Martins exit->u.hcall.result = err; 1230d70bd6a4SJoao Martins return true; 1231d70bd6a4SJoao Martins } 1232d70bd6a4SJoao Martins 12334858ba20SDavid Woodhouse static bool kvm_xen_hcall_evtchn_op(struct kvm_xen_exit *exit, X86CPU *cpu, 12343b06f29bSJoao Martins int cmd, uint64_t arg) 12353b06f29bSJoao Martins { 12364858ba20SDavid Woodhouse CPUState *cs = CPU(cpu); 12373b06f29bSJoao Martins int err = -ENOSYS; 12383b06f29bSJoao Martins 12393b06f29bSJoao Martins switch (cmd) { 12403b06f29bSJoao Martins case EVTCHNOP_init_control: 12413b06f29bSJoao Martins case EVTCHNOP_expand_array: 12423b06f29bSJoao Martins case EVTCHNOP_set_priority: 12433b06f29bSJoao Martins /* We do not support FIFO channels at this point */ 12443b06f29bSJoao Martins err = -ENOSYS; 12453b06f29bSJoao Martins break; 12463b06f29bSJoao Martins 12474858ba20SDavid Woodhouse case EVTCHNOP_status: { 12484858ba20SDavid Woodhouse struct evtchn_status status; 12494858ba20SDavid Woodhouse 12504858ba20SDavid Woodhouse qemu_build_assert(sizeof(status) == 24); 12514858ba20SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &status, sizeof(status))) { 12524858ba20SDavid Woodhouse err = -EFAULT; 12534858ba20SDavid Woodhouse break; 12544858ba20SDavid Woodhouse } 12554858ba20SDavid Woodhouse 12564858ba20SDavid Woodhouse err = xen_evtchn_status_op(&status); 12574858ba20SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &status, sizeof(status))) { 12584858ba20SDavid Woodhouse err = -EFAULT; 12594858ba20SDavid Woodhouse } 12604858ba20SDavid Woodhouse break; 12614858ba20SDavid Woodhouse } 126283eb5811SDavid Woodhouse case EVTCHNOP_close: { 126383eb5811SDavid Woodhouse struct evtchn_close close; 126483eb5811SDavid Woodhouse 126583eb5811SDavid Woodhouse qemu_build_assert(sizeof(close) == 4); 126683eb5811SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &close, sizeof(close))) { 126783eb5811SDavid Woodhouse err = -EFAULT; 126883eb5811SDavid Woodhouse break; 126983eb5811SDavid Woodhouse } 127083eb5811SDavid Woodhouse 127183eb5811SDavid Woodhouse err = xen_evtchn_close_op(&close); 127283eb5811SDavid Woodhouse break; 127383eb5811SDavid Woodhouse } 1274190cc3c0SDavid Woodhouse case EVTCHNOP_unmask: { 1275190cc3c0SDavid Woodhouse struct evtchn_unmask unmask; 1276190cc3c0SDavid Woodhouse 1277190cc3c0SDavid Woodhouse qemu_build_assert(sizeof(unmask) == 4); 1278190cc3c0SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &unmask, sizeof(unmask))) { 1279190cc3c0SDavid Woodhouse err = -EFAULT; 1280190cc3c0SDavid Woodhouse break; 1281190cc3c0SDavid Woodhouse } 1282190cc3c0SDavid Woodhouse 1283190cc3c0SDavid Woodhouse err = xen_evtchn_unmask_op(&unmask); 1284190cc3c0SDavid Woodhouse break; 1285190cc3c0SDavid Woodhouse } 1286c723d4c1SDavid Woodhouse case EVTCHNOP_bind_virq: { 1287c723d4c1SDavid Woodhouse struct evtchn_bind_virq virq; 1288c723d4c1SDavid Woodhouse 1289c723d4c1SDavid Woodhouse qemu_build_assert(sizeof(virq) == 12); 1290c723d4c1SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &virq, sizeof(virq))) { 1291c723d4c1SDavid Woodhouse err = -EFAULT; 1292c723d4c1SDavid Woodhouse break; 1293c723d4c1SDavid Woodhouse } 1294c723d4c1SDavid Woodhouse 1295c723d4c1SDavid Woodhouse err = xen_evtchn_bind_virq_op(&virq); 1296c723d4c1SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &virq, sizeof(virq))) { 1297c723d4c1SDavid Woodhouse err = -EFAULT; 1298c723d4c1SDavid Woodhouse } 1299c723d4c1SDavid Woodhouse break; 1300c723d4c1SDavid Woodhouse } 1301aa98ee38SDavid Woodhouse case EVTCHNOP_bind_pirq: { 1302aa98ee38SDavid Woodhouse struct evtchn_bind_pirq pirq; 1303aa98ee38SDavid Woodhouse 1304aa98ee38SDavid Woodhouse qemu_build_assert(sizeof(pirq) == 12); 1305aa98ee38SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &pirq, sizeof(pirq))) { 1306aa98ee38SDavid Woodhouse err = -EFAULT; 1307aa98ee38SDavid Woodhouse break; 1308aa98ee38SDavid Woodhouse } 1309aa98ee38SDavid Woodhouse 1310aa98ee38SDavid Woodhouse err = xen_evtchn_bind_pirq_op(&pirq); 1311aa98ee38SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &pirq, sizeof(pirq))) { 1312aa98ee38SDavid Woodhouse err = -EFAULT; 1313aa98ee38SDavid Woodhouse } 1314aa98ee38SDavid Woodhouse break; 1315aa98ee38SDavid Woodhouse } 1316f5417856SDavid Woodhouse case EVTCHNOP_bind_ipi: { 1317f5417856SDavid Woodhouse struct evtchn_bind_ipi ipi; 1318f5417856SDavid Woodhouse 1319f5417856SDavid Woodhouse qemu_build_assert(sizeof(ipi) == 8); 1320f5417856SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &ipi, sizeof(ipi))) { 1321f5417856SDavid Woodhouse err = -EFAULT; 1322f5417856SDavid Woodhouse break; 1323f5417856SDavid Woodhouse } 1324f5417856SDavid Woodhouse 1325f5417856SDavid Woodhouse err = xen_evtchn_bind_ipi_op(&ipi); 1326f5417856SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &ipi, sizeof(ipi))) { 1327f5417856SDavid Woodhouse err = -EFAULT; 1328f5417856SDavid Woodhouse } 1329f5417856SDavid Woodhouse break; 1330f5417856SDavid Woodhouse } 1331cf7679abSDavid Woodhouse case EVTCHNOP_send: { 1332cf7679abSDavid Woodhouse struct evtchn_send send; 1333cf7679abSDavid Woodhouse 1334cf7679abSDavid Woodhouse qemu_build_assert(sizeof(send) == 4); 1335cf7679abSDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &send, sizeof(send))) { 1336cf7679abSDavid Woodhouse err = -EFAULT; 1337cf7679abSDavid Woodhouse break; 1338cf7679abSDavid Woodhouse } 1339cf7679abSDavid Woodhouse 1340cf7679abSDavid Woodhouse err = xen_evtchn_send_op(&send); 1341cf7679abSDavid Woodhouse break; 1342cf7679abSDavid Woodhouse } 1343e1db61b8SDavid Woodhouse case EVTCHNOP_alloc_unbound: { 1344e1db61b8SDavid Woodhouse struct evtchn_alloc_unbound alloc; 1345e1db61b8SDavid Woodhouse 1346e1db61b8SDavid Woodhouse qemu_build_assert(sizeof(alloc) == 8); 1347e1db61b8SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &alloc, sizeof(alloc))) { 1348e1db61b8SDavid Woodhouse err = -EFAULT; 1349e1db61b8SDavid Woodhouse break; 1350e1db61b8SDavid Woodhouse } 1351e1db61b8SDavid Woodhouse 1352e1db61b8SDavid Woodhouse err = xen_evtchn_alloc_unbound_op(&alloc); 1353e1db61b8SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &alloc, sizeof(alloc))) { 1354e1db61b8SDavid Woodhouse err = -EFAULT; 1355e1db61b8SDavid Woodhouse } 1356e1db61b8SDavid Woodhouse break; 1357e1db61b8SDavid Woodhouse } 135884327881SDavid Woodhouse case EVTCHNOP_bind_interdomain: { 135984327881SDavid Woodhouse struct evtchn_bind_interdomain interdomain; 136084327881SDavid Woodhouse 136184327881SDavid Woodhouse qemu_build_assert(sizeof(interdomain) == 12); 136284327881SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &interdomain, sizeof(interdomain))) { 136384327881SDavid Woodhouse err = -EFAULT; 136484327881SDavid Woodhouse break; 136584327881SDavid Woodhouse } 136684327881SDavid Woodhouse 136784327881SDavid Woodhouse err = xen_evtchn_bind_interdomain_op(&interdomain); 136884327881SDavid Woodhouse if (!err && 136984327881SDavid Woodhouse kvm_copy_to_gva(cs, arg, &interdomain, sizeof(interdomain))) { 137084327881SDavid Woodhouse err = -EFAULT; 137184327881SDavid Woodhouse } 137284327881SDavid Woodhouse break; 137384327881SDavid Woodhouse } 137430667046SDavid Woodhouse case EVTCHNOP_bind_vcpu: { 137530667046SDavid Woodhouse struct evtchn_bind_vcpu vcpu; 137630667046SDavid Woodhouse 137730667046SDavid Woodhouse qemu_build_assert(sizeof(vcpu) == 8); 137830667046SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &vcpu, sizeof(vcpu))) { 137930667046SDavid Woodhouse err = -EFAULT; 138030667046SDavid Woodhouse break; 138130667046SDavid Woodhouse } 138230667046SDavid Woodhouse 138330667046SDavid Woodhouse err = xen_evtchn_bind_vcpu_op(&vcpu); 138430667046SDavid Woodhouse break; 138530667046SDavid Woodhouse } 1386a15b1097SDavid Woodhouse case EVTCHNOP_reset: { 1387a15b1097SDavid Woodhouse struct evtchn_reset reset; 1388a15b1097SDavid Woodhouse 1389a15b1097SDavid Woodhouse qemu_build_assert(sizeof(reset) == 2); 1390a15b1097SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &reset, sizeof(reset))) { 1391a15b1097SDavid Woodhouse err = -EFAULT; 1392a15b1097SDavid Woodhouse break; 1393a15b1097SDavid Woodhouse } 1394a15b1097SDavid Woodhouse 1395a15b1097SDavid Woodhouse err = xen_evtchn_reset_op(&reset); 1396a15b1097SDavid Woodhouse break; 1397a15b1097SDavid Woodhouse } 13983b06f29bSJoao Martins default: 13993b06f29bSJoao Martins return false; 14003b06f29bSJoao Martins } 14013b06f29bSJoao Martins 14023b06f29bSJoao Martins exit->u.hcall.result = err; 14033b06f29bSJoao Martins return true; 14043b06f29bSJoao Martins } 14053b06f29bSJoao Martins 140679b7067dSJoao Martins int kvm_xen_soft_reset(void) 140779b7067dSJoao Martins { 1408c345104cSJoao Martins CPUState *cpu; 1409fb0fd2ceSJoao Martins int err; 1410fb0fd2ceSJoao Martins 1411195801d7SStefan Hajnoczi assert(bql_locked()); 141279b7067dSJoao Martins 141379b7067dSJoao Martins trace_kvm_xen_soft_reset(); 141479b7067dSJoao Martins 1415a15b1097SDavid Woodhouse err = xen_evtchn_soft_reset(); 1416a15b1097SDavid Woodhouse if (err) { 1417a15b1097SDavid Woodhouse return err; 1418a15b1097SDavid Woodhouse } 1419a15b1097SDavid Woodhouse 142091cce756SDavid Woodhouse /* 142191cce756SDavid Woodhouse * Zero is the reset/startup state for HVM_PARAM_CALLBACK_IRQ. Strictly, 142291cce756SDavid Woodhouse * it maps to HVM_PARAM_CALLBACK_TYPE_GSI with GSI#0, but Xen refuses to 142391cce756SDavid Woodhouse * to deliver to the timer interrupt and treats that as 'disabled'. 142491cce756SDavid Woodhouse */ 142591cce756SDavid Woodhouse err = xen_evtchn_set_callback_param(0); 142691cce756SDavid Woodhouse if (err) { 142791cce756SDavid Woodhouse return err; 142891cce756SDavid Woodhouse } 142991cce756SDavid Woodhouse 1430c345104cSJoao Martins CPU_FOREACH(cpu) { 1431c345104cSJoao Martins async_run_on_cpu(cpu, do_vcpu_soft_reset, RUN_ON_CPU_NULL); 1432c345104cSJoao Martins } 1433c345104cSJoao Martins 1434fb0fd2ceSJoao Martins err = xen_overlay_map_shinfo_page(INVALID_GFN); 1435fb0fd2ceSJoao Martins if (err) { 1436fb0fd2ceSJoao Martins return err; 1437fb0fd2ceSJoao Martins } 1438fb0fd2ceSJoao Martins 1439de26b261SDavid Woodhouse err = xen_gnttab_reset(); 1440de26b261SDavid Woodhouse if (err) { 1441de26b261SDavid Woodhouse return err; 1442de26b261SDavid Woodhouse } 1443de26b261SDavid Woodhouse 1444a72ccc7fSDavid Woodhouse err = xen_primary_console_reset(); 1445a72ccc7fSDavid Woodhouse if (err) { 1446a72ccc7fSDavid Woodhouse return err; 1447a72ccc7fSDavid Woodhouse } 1448a72ccc7fSDavid Woodhouse 1449c08f5d0eSDavid Woodhouse err = xen_xenstore_reset(); 1450c08f5d0eSDavid Woodhouse if (err) { 1451c08f5d0eSDavid Woodhouse return err; 1452c08f5d0eSDavid Woodhouse } 1453c08f5d0eSDavid Woodhouse 145479b7067dSJoao Martins return 0; 145579b7067dSJoao Martins } 145679b7067dSJoao Martins 145779b7067dSJoao Martins static int schedop_shutdown(CPUState *cs, uint64_t arg) 145879b7067dSJoao Martins { 145979b7067dSJoao Martins struct sched_shutdown shutdown; 146079b7067dSJoao Martins int ret = 0; 146179b7067dSJoao Martins 146279b7067dSJoao Martins /* No need for 32/64 compat handling */ 146379b7067dSJoao Martins qemu_build_assert(sizeof(shutdown) == 4); 146479b7067dSJoao Martins 146579b7067dSJoao Martins if (kvm_copy_from_gva(cs, arg, &shutdown, sizeof(shutdown))) { 146679b7067dSJoao Martins return -EFAULT; 146779b7067dSJoao Martins } 146879b7067dSJoao Martins 146979b7067dSJoao Martins switch (shutdown.reason) { 147079b7067dSJoao Martins case SHUTDOWN_crash: 147179b7067dSJoao Martins cpu_dump_state(cs, stderr, CPU_DUMP_CODE); 147279b7067dSJoao Martins qemu_system_guest_panicked(NULL); 147379b7067dSJoao Martins break; 147479b7067dSJoao Martins 147579b7067dSJoao Martins case SHUTDOWN_reboot: 147679b7067dSJoao Martins qemu_system_reset_request(SHUTDOWN_CAUSE_GUEST_RESET); 147779b7067dSJoao Martins break; 147879b7067dSJoao Martins 147979b7067dSJoao Martins case SHUTDOWN_poweroff: 148079b7067dSJoao Martins qemu_system_shutdown_request(SHUTDOWN_CAUSE_GUEST_SHUTDOWN); 148179b7067dSJoao Martins break; 148279b7067dSJoao Martins 148379b7067dSJoao Martins case SHUTDOWN_soft_reset: 1484195801d7SStefan Hajnoczi bql_lock(); 148579b7067dSJoao Martins ret = kvm_xen_soft_reset(); 1486195801d7SStefan Hajnoczi bql_unlock(); 148779b7067dSJoao Martins break; 148879b7067dSJoao Martins 148979b7067dSJoao Martins default: 149079b7067dSJoao Martins ret = -EINVAL; 149179b7067dSJoao Martins break; 149279b7067dSJoao Martins } 149379b7067dSJoao Martins 149479b7067dSJoao Martins return ret; 149579b7067dSJoao Martins } 149679b7067dSJoao Martins 149779b7067dSJoao Martins static bool kvm_xen_hcall_sched_op(struct kvm_xen_exit *exit, X86CPU *cpu, 149879b7067dSJoao Martins int cmd, uint64_t arg) 149979b7067dSJoao Martins { 150079b7067dSJoao Martins CPUState *cs = CPU(cpu); 150179b7067dSJoao Martins int err = -ENOSYS; 150279b7067dSJoao Martins 150379b7067dSJoao Martins switch (cmd) { 150479b7067dSJoao Martins case SCHEDOP_shutdown: 150579b7067dSJoao Martins err = schedop_shutdown(cs, arg); 150679b7067dSJoao Martins break; 150779b7067dSJoao Martins 1508c789b9efSDavid Woodhouse case SCHEDOP_poll: 1509c789b9efSDavid Woodhouse /* 1510c789b9efSDavid Woodhouse * Linux will panic if this doesn't work. Just yield; it's not 1511c789b9efSDavid Woodhouse * worth overthinking it because with event channel handling 1512c789b9efSDavid Woodhouse * in KVM, the kernel will intercept this and it will never 1513c789b9efSDavid Woodhouse * reach QEMU anyway. The semantics of the hypercall explicltly 1514c789b9efSDavid Woodhouse * permit spurious wakeups. 1515c789b9efSDavid Woodhouse */ 1516c789b9efSDavid Woodhouse case SCHEDOP_yield: 1517c789b9efSDavid Woodhouse sched_yield(); 1518c789b9efSDavid Woodhouse err = 0; 1519c789b9efSDavid Woodhouse break; 1520c789b9efSDavid Woodhouse 152179b7067dSJoao Martins default: 152279b7067dSJoao Martins return false; 152379b7067dSJoao Martins } 152479b7067dSJoao Martins 152579b7067dSJoao Martins exit->u.hcall.result = err; 152679b7067dSJoao Martins return true; 152779b7067dSJoao Martins } 152879b7067dSJoao Martins 152928b7ae94SDavid Woodhouse static bool kvm_xen_hcall_gnttab_op(struct kvm_xen_exit *exit, X86CPU *cpu, 153028b7ae94SDavid Woodhouse int cmd, uint64_t arg, int count) 153128b7ae94SDavid Woodhouse { 153228b7ae94SDavid Woodhouse CPUState *cs = CPU(cpu); 153328b7ae94SDavid Woodhouse int err; 153428b7ae94SDavid Woodhouse 153528b7ae94SDavid Woodhouse switch (cmd) { 153628b7ae94SDavid Woodhouse case GNTTABOP_set_version: { 153728b7ae94SDavid Woodhouse struct gnttab_set_version set; 153828b7ae94SDavid Woodhouse 153928b7ae94SDavid Woodhouse qemu_build_assert(sizeof(set) == 4); 154028b7ae94SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &set, sizeof(set))) { 154128b7ae94SDavid Woodhouse err = -EFAULT; 154228b7ae94SDavid Woodhouse break; 154328b7ae94SDavid Woodhouse } 154428b7ae94SDavid Woodhouse 154528b7ae94SDavid Woodhouse err = xen_gnttab_set_version_op(&set); 154628b7ae94SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &set, sizeof(set))) { 154728b7ae94SDavid Woodhouse err = -EFAULT; 154828b7ae94SDavid Woodhouse } 154928b7ae94SDavid Woodhouse break; 155028b7ae94SDavid Woodhouse } 155128b7ae94SDavid Woodhouse case GNTTABOP_get_version: { 155228b7ae94SDavid Woodhouse struct gnttab_get_version get; 155328b7ae94SDavid Woodhouse 155428b7ae94SDavid Woodhouse qemu_build_assert(sizeof(get) == 8); 155528b7ae94SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &get, sizeof(get))) { 155628b7ae94SDavid Woodhouse err = -EFAULT; 155728b7ae94SDavid Woodhouse break; 155828b7ae94SDavid Woodhouse } 155928b7ae94SDavid Woodhouse 156028b7ae94SDavid Woodhouse err = xen_gnttab_get_version_op(&get); 156128b7ae94SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &get, sizeof(get))) { 156228b7ae94SDavid Woodhouse err = -EFAULT; 156328b7ae94SDavid Woodhouse } 156428b7ae94SDavid Woodhouse break; 156528b7ae94SDavid Woodhouse } 1566b46f9745SDavid Woodhouse case GNTTABOP_query_size: { 1567b46f9745SDavid Woodhouse struct gnttab_query_size size; 1568b46f9745SDavid Woodhouse 1569b46f9745SDavid Woodhouse qemu_build_assert(sizeof(size) == 16); 1570b46f9745SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &size, sizeof(size))) { 1571b46f9745SDavid Woodhouse err = -EFAULT; 1572b46f9745SDavid Woodhouse break; 1573b46f9745SDavid Woodhouse } 1574b46f9745SDavid Woodhouse 1575b46f9745SDavid Woodhouse err = xen_gnttab_query_size_op(&size); 1576b46f9745SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &size, sizeof(size))) { 1577b46f9745SDavid Woodhouse err = -EFAULT; 1578b46f9745SDavid Woodhouse } 1579b46f9745SDavid Woodhouse break; 1580b46f9745SDavid Woodhouse } 158128b7ae94SDavid Woodhouse case GNTTABOP_setup_table: 158228b7ae94SDavid Woodhouse case GNTTABOP_copy: 158328b7ae94SDavid Woodhouse case GNTTABOP_map_grant_ref: 158428b7ae94SDavid Woodhouse case GNTTABOP_unmap_grant_ref: 158528b7ae94SDavid Woodhouse case GNTTABOP_swap_grant_ref: 158628b7ae94SDavid Woodhouse return false; 158728b7ae94SDavid Woodhouse 158828b7ae94SDavid Woodhouse default: 158928b7ae94SDavid Woodhouse /* Xen explicitly returns -ENOSYS to HVM guests for all others */ 159028b7ae94SDavid Woodhouse err = -ENOSYS; 159128b7ae94SDavid Woodhouse break; 159228b7ae94SDavid Woodhouse } 159328b7ae94SDavid Woodhouse 159428b7ae94SDavid Woodhouse exit->u.hcall.result = err; 159528b7ae94SDavid Woodhouse return true; 159628b7ae94SDavid Woodhouse } 159728b7ae94SDavid Woodhouse 1598799c2354SDavid Woodhouse static bool kvm_xen_hcall_physdev_op(struct kvm_xen_exit *exit, X86CPU *cpu, 1599799c2354SDavid Woodhouse int cmd, uint64_t arg) 1600799c2354SDavid Woodhouse { 1601799c2354SDavid Woodhouse CPUState *cs = CPU(cpu); 1602799c2354SDavid Woodhouse int err; 1603799c2354SDavid Woodhouse 1604799c2354SDavid Woodhouse switch (cmd) { 1605799c2354SDavid Woodhouse case PHYSDEVOP_map_pirq: { 1606799c2354SDavid Woodhouse struct physdev_map_pirq map; 1607799c2354SDavid Woodhouse 1608799c2354SDavid Woodhouse if (hypercall_compat32(exit->u.hcall.longmode)) { 1609799c2354SDavid Woodhouse struct compat_physdev_map_pirq *map32 = (void *)↦ 1610799c2354SDavid Woodhouse 1611799c2354SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, map32, sizeof(*map32))) { 1612799c2354SDavid Woodhouse return -EFAULT; 1613799c2354SDavid Woodhouse } 1614799c2354SDavid Woodhouse 1615799c2354SDavid Woodhouse /* 1616799c2354SDavid Woodhouse * The only thing that's different is the alignment of the 1617799c2354SDavid Woodhouse * uint64_t table_base at the end, which gets padding to make 1618799c2354SDavid Woodhouse * it 64-bit aligned in the 64-bit version. 1619799c2354SDavid Woodhouse */ 1620799c2354SDavid Woodhouse qemu_build_assert(sizeof(*map32) == 36); 1621799c2354SDavid Woodhouse qemu_build_assert(offsetof(struct physdev_map_pirq, entry_nr) == 1622799c2354SDavid Woodhouse offsetof(struct compat_physdev_map_pirq, entry_nr)); 1623799c2354SDavid Woodhouse memmove(&map.table_base, &map32->table_base, sizeof(map.table_base)); 1624799c2354SDavid Woodhouse } else { 1625799c2354SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &map, sizeof(map))) { 1626799c2354SDavid Woodhouse err = -EFAULT; 1627799c2354SDavid Woodhouse break; 1628799c2354SDavid Woodhouse } 1629799c2354SDavid Woodhouse } 1630799c2354SDavid Woodhouse err = xen_physdev_map_pirq(&map); 1631799c2354SDavid Woodhouse /* 1632799c2354SDavid Woodhouse * Since table_base is an IN parameter and won't be changed, just 1633799c2354SDavid Woodhouse * copy the size of the compat structure back to the guest. 1634799c2354SDavid Woodhouse */ 1635799c2354SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &map, 1636799c2354SDavid Woodhouse sizeof(struct compat_physdev_map_pirq))) { 1637799c2354SDavid Woodhouse err = -EFAULT; 1638799c2354SDavid Woodhouse } 1639799c2354SDavid Woodhouse break; 1640799c2354SDavid Woodhouse } 1641799c2354SDavid Woodhouse case PHYSDEVOP_unmap_pirq: { 1642799c2354SDavid Woodhouse struct physdev_unmap_pirq unmap; 1643799c2354SDavid Woodhouse 1644799c2354SDavid Woodhouse qemu_build_assert(sizeof(unmap) == 8); 1645799c2354SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &unmap, sizeof(unmap))) { 1646799c2354SDavid Woodhouse err = -EFAULT; 1647799c2354SDavid Woodhouse break; 1648799c2354SDavid Woodhouse } 1649799c2354SDavid Woodhouse 1650799c2354SDavid Woodhouse err = xen_physdev_unmap_pirq(&unmap); 1651799c2354SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &unmap, sizeof(unmap))) { 1652799c2354SDavid Woodhouse err = -EFAULT; 1653799c2354SDavid Woodhouse } 1654799c2354SDavid Woodhouse break; 1655799c2354SDavid Woodhouse } 1656799c2354SDavid Woodhouse case PHYSDEVOP_eoi: { 1657799c2354SDavid Woodhouse struct physdev_eoi eoi; 1658799c2354SDavid Woodhouse 1659799c2354SDavid Woodhouse qemu_build_assert(sizeof(eoi) == 4); 1660799c2354SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &eoi, sizeof(eoi))) { 1661799c2354SDavid Woodhouse err = -EFAULT; 1662799c2354SDavid Woodhouse break; 1663799c2354SDavid Woodhouse } 1664799c2354SDavid Woodhouse 1665799c2354SDavid Woodhouse err = xen_physdev_eoi_pirq(&eoi); 1666799c2354SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &eoi, sizeof(eoi))) { 1667799c2354SDavid Woodhouse err = -EFAULT; 1668799c2354SDavid Woodhouse } 1669799c2354SDavid Woodhouse break; 1670799c2354SDavid Woodhouse } 1671799c2354SDavid Woodhouse case PHYSDEVOP_irq_status_query: { 1672799c2354SDavid Woodhouse struct physdev_irq_status_query query; 1673799c2354SDavid Woodhouse 1674799c2354SDavid Woodhouse qemu_build_assert(sizeof(query) == 8); 1675799c2354SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &query, sizeof(query))) { 1676799c2354SDavid Woodhouse err = -EFAULT; 1677799c2354SDavid Woodhouse break; 1678799c2354SDavid Woodhouse } 1679799c2354SDavid Woodhouse 1680799c2354SDavid Woodhouse err = xen_physdev_query_pirq(&query); 1681799c2354SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &query, sizeof(query))) { 1682799c2354SDavid Woodhouse err = -EFAULT; 1683799c2354SDavid Woodhouse } 1684799c2354SDavid Woodhouse break; 1685799c2354SDavid Woodhouse } 1686799c2354SDavid Woodhouse case PHYSDEVOP_get_free_pirq: { 1687799c2354SDavid Woodhouse struct physdev_get_free_pirq get; 1688799c2354SDavid Woodhouse 1689799c2354SDavid Woodhouse qemu_build_assert(sizeof(get) == 8); 1690799c2354SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &get, sizeof(get))) { 1691799c2354SDavid Woodhouse err = -EFAULT; 1692799c2354SDavid Woodhouse break; 1693799c2354SDavid Woodhouse } 1694799c2354SDavid Woodhouse 1695799c2354SDavid Woodhouse err = xen_physdev_get_free_pirq(&get); 1696799c2354SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &get, sizeof(get))) { 1697799c2354SDavid Woodhouse err = -EFAULT; 1698799c2354SDavid Woodhouse } 1699799c2354SDavid Woodhouse break; 1700799c2354SDavid Woodhouse } 1701799c2354SDavid Woodhouse case PHYSDEVOP_pirq_eoi_gmfn_v2: /* FreeBSD 13 makes this hypercall */ 1702799c2354SDavid Woodhouse err = -ENOSYS; 1703799c2354SDavid Woodhouse break; 1704799c2354SDavid Woodhouse 1705799c2354SDavid Woodhouse default: 1706799c2354SDavid Woodhouse return false; 1707799c2354SDavid Woodhouse } 1708799c2354SDavid Woodhouse 1709799c2354SDavid Woodhouse exit->u.hcall.result = err; 1710799c2354SDavid Woodhouse return true; 1711799c2354SDavid Woodhouse } 1712799c2354SDavid Woodhouse 171355a3f666SJoao Martins static bool do_kvm_xen_handle_exit(X86CPU *cpu, struct kvm_xen_exit *exit) 171455a3f666SJoao Martins { 171555a3f666SJoao Martins uint16_t code = exit->u.hcall.input; 171655a3f666SJoao Martins 171755a3f666SJoao Martins if (exit->u.hcall.cpl > 0) { 171855a3f666SJoao Martins exit->u.hcall.result = -EPERM; 171955a3f666SJoao Martins return true; 172055a3f666SJoao Martins } 172155a3f666SJoao Martins 172255a3f666SJoao Martins switch (code) { 1723b746a779SJoao Martins case __HYPERVISOR_set_timer_op: 1724b746a779SJoao Martins if (exit->u.hcall.longmode) { 1725b746a779SJoao Martins return kvm_xen_hcall_set_timer_op(exit, cpu, 1726b746a779SJoao Martins exit->u.hcall.params[0]); 1727b746a779SJoao Martins } else { 1728b746a779SJoao Martins /* In 32-bit mode, the 64-bit timer value is in two args. */ 1729b746a779SJoao Martins uint64_t val = ((uint64_t)exit->u.hcall.params[1]) << 32 | 1730b746a779SJoao Martins (uint32_t)exit->u.hcall.params[0]; 1731b746a779SJoao Martins return kvm_xen_hcall_set_timer_op(exit, cpu, val); 1732b746a779SJoao Martins } 173328b7ae94SDavid Woodhouse case __HYPERVISOR_grant_table_op: 173428b7ae94SDavid Woodhouse return kvm_xen_hcall_gnttab_op(exit, cpu, exit->u.hcall.params[0], 173528b7ae94SDavid Woodhouse exit->u.hcall.params[1], 173628b7ae94SDavid Woodhouse exit->u.hcall.params[2]); 173779b7067dSJoao Martins case __HYPERVISOR_sched_op: 173879b7067dSJoao Martins return kvm_xen_hcall_sched_op(exit, cpu, exit->u.hcall.params[0], 173979b7067dSJoao Martins exit->u.hcall.params[1]); 17403b06f29bSJoao Martins case __HYPERVISOR_event_channel_op: 17414858ba20SDavid Woodhouse return kvm_xen_hcall_evtchn_op(exit, cpu, exit->u.hcall.params[0], 17423b06f29bSJoao Martins exit->u.hcall.params[1]); 1743d70bd6a4SJoao Martins case __HYPERVISOR_vcpu_op: 1744d70bd6a4SJoao Martins return kvm_xen_hcall_vcpu_op(exit, cpu, 1745d70bd6a4SJoao Martins exit->u.hcall.params[0], 1746d70bd6a4SJoao Martins exit->u.hcall.params[1], 1747d70bd6a4SJoao Martins exit->u.hcall.params[2]); 1748671bfdcdSJoao Martins case __HYPERVISOR_hvm_op: 1749671bfdcdSJoao Martins return kvm_xen_hcall_hvm_op(exit, cpu, exit->u.hcall.params[0], 1750671bfdcdSJoao Martins exit->u.hcall.params[1]); 1751fb0fd2ceSJoao Martins case __HYPERVISOR_memory_op: 1752fb0fd2ceSJoao Martins return kvm_xen_hcall_memory_op(exit, cpu, exit->u.hcall.params[0], 1753fb0fd2ceSJoao Martins exit->u.hcall.params[1]); 1754799c2354SDavid Woodhouse case __HYPERVISOR_physdev_op: 1755799c2354SDavid Woodhouse return kvm_xen_hcall_physdev_op(exit, cpu, exit->u.hcall.params[0], 1756799c2354SDavid Woodhouse exit->u.hcall.params[1]); 1757bedcc139SJoao Martins case __HYPERVISOR_xen_version: 1758bedcc139SJoao Martins return kvm_xen_hcall_xen_version(exit, cpu, exit->u.hcall.params[0], 1759bedcc139SJoao Martins exit->u.hcall.params[1]); 176055a3f666SJoao Martins default: 176155a3f666SJoao Martins return false; 176255a3f666SJoao Martins } 176355a3f666SJoao Martins } 176455a3f666SJoao Martins 176555a3f666SJoao Martins int kvm_xen_handle_exit(X86CPU *cpu, struct kvm_xen_exit *exit) 176655a3f666SJoao Martins { 176755a3f666SJoao Martins if (exit->type != KVM_EXIT_XEN_HCALL) { 176855a3f666SJoao Martins return -1; 176955a3f666SJoao Martins } 177055a3f666SJoao Martins 1771110a0ea5SDavid Woodhouse /* 1772110a0ea5SDavid Woodhouse * The kernel latches the guest 32/64 mode when the MSR is used to fill 1773110a0ea5SDavid Woodhouse * the hypercall page. So if we see a hypercall in a mode that doesn't 1774110a0ea5SDavid Woodhouse * match our own idea of the guest mode, fetch the kernel's idea of the 1775110a0ea5SDavid Woodhouse * "long mode" to remain in sync. 1776110a0ea5SDavid Woodhouse */ 1777110a0ea5SDavid Woodhouse if (exit->u.hcall.longmode != xen_is_long_mode()) { 1778110a0ea5SDavid Woodhouse xen_sync_long_mode(); 1779110a0ea5SDavid Woodhouse } 1780110a0ea5SDavid Woodhouse 178155a3f666SJoao Martins if (!do_kvm_xen_handle_exit(cpu, exit)) { 178255a3f666SJoao Martins /* 178355a3f666SJoao Martins * Some hypercalls will be deliberately "implemented" by returning 178455a3f666SJoao Martins * -ENOSYS. This case is for hypercalls which are unexpected. 178555a3f666SJoao Martins */ 178655a3f666SJoao Martins exit->u.hcall.result = -ENOSYS; 178755a3f666SJoao Martins qemu_log_mask(LOG_UNIMP, "Unimplemented Xen hypercall %" 178855a3f666SJoao Martins PRId64 " (0x%" PRIx64 " 0x%" PRIx64 " 0x%" PRIx64 ")\n", 178955a3f666SJoao Martins (uint64_t)exit->u.hcall.input, 179055a3f666SJoao Martins (uint64_t)exit->u.hcall.params[0], 179155a3f666SJoao Martins (uint64_t)exit->u.hcall.params[1], 179255a3f666SJoao Martins (uint64_t)exit->u.hcall.params[2]); 179355a3f666SJoao Martins } 179455a3f666SJoao Martins 179555a3f666SJoao Martins trace_kvm_xen_hypercall(CPU(cpu)->cpu_index, exit->u.hcall.cpl, 179655a3f666SJoao Martins exit->u.hcall.input, exit->u.hcall.params[0], 179755a3f666SJoao Martins exit->u.hcall.params[1], exit->u.hcall.params[2], 179855a3f666SJoao Martins exit->u.hcall.result); 179955a3f666SJoao Martins return 0; 180055a3f666SJoao Martins } 1801c345104cSJoao Martins 18026f43f2eeSDavid Woodhouse uint16_t kvm_xen_get_gnttab_max_frames(void) 18036f43f2eeSDavid Woodhouse { 18046f43f2eeSDavid Woodhouse KVMState *s = KVM_STATE(current_accel()); 18056f43f2eeSDavid Woodhouse return s->xen_gnttab_max_frames; 18066f43f2eeSDavid Woodhouse } 18076f43f2eeSDavid Woodhouse 1808e16aff4cSDavid Woodhouse uint16_t kvm_xen_get_evtchn_max_pirq(void) 1809e16aff4cSDavid Woodhouse { 1810e16aff4cSDavid Woodhouse KVMState *s = KVM_STATE(current_accel()); 1811e16aff4cSDavid Woodhouse return s->xen_evtchn_max_pirq; 1812e16aff4cSDavid Woodhouse } 1813e16aff4cSDavid Woodhouse 1814c345104cSJoao Martins int kvm_put_xen_state(CPUState *cs) 1815c345104cSJoao Martins { 1816c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs); 1817c345104cSJoao Martins CPUX86State *env = &cpu->env; 1818c345104cSJoao Martins uint64_t gpa; 1819c345104cSJoao Martins int ret; 1820c345104cSJoao Martins 1821c345104cSJoao Martins gpa = env->xen_vcpu_info_gpa; 1822c345104cSJoao Martins if (gpa == INVALID_GPA) { 1823c345104cSJoao Martins gpa = env->xen_vcpu_info_default_gpa; 1824c345104cSJoao Martins } 1825c345104cSJoao Martins 1826c345104cSJoao Martins if (gpa != INVALID_GPA) { 182727d4075dSDavid Woodhouse ret = set_vcpu_info(cs, gpa); 1828c345104cSJoao Martins if (ret < 0) { 1829c345104cSJoao Martins return ret; 1830c345104cSJoao Martins } 1831c345104cSJoao Martins } 1832c345104cSJoao Martins 1833f0689302SJoao Martins gpa = env->xen_vcpu_time_info_gpa; 1834f0689302SJoao Martins if (gpa != INVALID_GPA) { 1835f0689302SJoao Martins ret = kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO, 1836f0689302SJoao Martins gpa); 1837f0689302SJoao Martins if (ret < 0) { 1838f0689302SJoao Martins return ret; 1839f0689302SJoao Martins } 1840f0689302SJoao Martins } 1841f0689302SJoao Martins 18425092db87SJoao Martins gpa = env->xen_vcpu_runstate_gpa; 18435092db87SJoao Martins if (gpa != INVALID_GPA) { 18445092db87SJoao Martins ret = kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR, 18455092db87SJoao Martins gpa); 18465092db87SJoao Martins if (ret < 0) { 18475092db87SJoao Martins return ret; 18485092db87SJoao Martins } 18495092db87SJoao Martins } 18505092db87SJoao Martins 1851b746a779SJoao Martins if (env->xen_periodic_timer_period) { 1852b746a779SJoao Martins ret = do_set_periodic_timer(cs, env->xen_periodic_timer_period); 1853b746a779SJoao Martins if (ret < 0) { 1854b746a779SJoao Martins return ret; 1855b746a779SJoao Martins } 1856b746a779SJoao Martins } 1857b746a779SJoao Martins 1858105b47fdSAnkur Arora if (!kvm_xen_has_cap(EVTCHN_SEND)) { 1859b746a779SJoao Martins /* 1860b746a779SJoao Martins * If the kernel has EVTCHN_SEND support then it handles timers too, 1861b746a779SJoao Martins * so the timer will be restored by kvm_xen_set_vcpu_timer() below. 1862b746a779SJoao Martins */ 186319c417ecSDavid Woodhouse QEMU_LOCK_GUARD(&env->xen_timers_lock); 1864b746a779SJoao Martins if (env->xen_singleshot_timer_ns) { 1865b746a779SJoao Martins ret = do_set_singleshot_timer(cs, env->xen_singleshot_timer_ns, 1866547c9757SDavid Woodhouse false); 1867b746a779SJoao Martins if (ret < 0) { 1868b746a779SJoao Martins return ret; 1869b746a779SJoao Martins } 1870b746a779SJoao Martins } 1871105b47fdSAnkur Arora return 0; 1872105b47fdSAnkur Arora } 1873105b47fdSAnkur Arora 1874105b47fdSAnkur Arora if (env->xen_vcpu_callback_vector) { 1875105b47fdSAnkur Arora ret = kvm_xen_set_vcpu_callback_vector(cs); 1876105b47fdSAnkur Arora if (ret < 0) { 1877105b47fdSAnkur Arora return ret; 1878105b47fdSAnkur Arora } 1879105b47fdSAnkur Arora } 1880105b47fdSAnkur Arora 1881c723d4c1SDavid Woodhouse if (env->xen_virq[VIRQ_TIMER]) { 188219c417ecSDavid Woodhouse do_set_vcpu_timer_virq(cs, 188319c417ecSDavid Woodhouse RUN_ON_CPU_HOST_INT(env->xen_virq[VIRQ_TIMER])); 1884c723d4c1SDavid Woodhouse } 1885c345104cSJoao Martins return 0; 1886c345104cSJoao Martins } 1887c345104cSJoao Martins 1888c345104cSJoao Martins int kvm_get_xen_state(CPUState *cs) 1889c345104cSJoao Martins { 1890c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs); 1891c345104cSJoao Martins CPUX86State *env = &cpu->env; 1892c345104cSJoao Martins uint64_t gpa; 1893c723d4c1SDavid Woodhouse int ret; 1894c345104cSJoao Martins 1895c345104cSJoao Martins /* 1896c345104cSJoao Martins * The kernel does not mark vcpu_info as dirty when it delivers interrupts 1897c345104cSJoao Martins * to it. It's up to userspace to *assume* that any page shared thus is 1898c345104cSJoao Martins * always considered dirty. The shared_info page is different since it's 1899c345104cSJoao Martins * an overlay and migrated separately anyway. 1900c345104cSJoao Martins */ 1901c345104cSJoao Martins gpa = env->xen_vcpu_info_gpa; 1902c345104cSJoao Martins if (gpa == INVALID_GPA) { 1903c345104cSJoao Martins gpa = env->xen_vcpu_info_default_gpa; 1904c345104cSJoao Martins } 1905c345104cSJoao Martins if (gpa != INVALID_GPA) { 1906c345104cSJoao Martins MemoryRegionSection mrs = memory_region_find(get_system_memory(), 1907c345104cSJoao Martins gpa, 1908c345104cSJoao Martins sizeof(struct vcpu_info)); 1909c345104cSJoao Martins if (mrs.mr && 1910c345104cSJoao Martins !int128_lt(mrs.size, int128_make64(sizeof(struct vcpu_info)))) { 1911c345104cSJoao Martins memory_region_set_dirty(mrs.mr, mrs.offset_within_region, 1912c345104cSJoao Martins sizeof(struct vcpu_info)); 1913c345104cSJoao Martins } 1914c345104cSJoao Martins } 1915c345104cSJoao Martins 1916c723d4c1SDavid Woodhouse if (!kvm_xen_has_cap(EVTCHN_SEND)) { 1917c723d4c1SDavid Woodhouse return 0; 1918c723d4c1SDavid Woodhouse } 1919c723d4c1SDavid Woodhouse 1920c723d4c1SDavid Woodhouse /* 1921c723d4c1SDavid Woodhouse * If the kernel is accelerating timers, read out the current value of the 1922c723d4c1SDavid Woodhouse * singleshot timer deadline. 1923c723d4c1SDavid Woodhouse */ 1924c723d4c1SDavid Woodhouse if (env->xen_virq[VIRQ_TIMER]) { 1925c723d4c1SDavid Woodhouse struct kvm_xen_vcpu_attr va = { 1926c723d4c1SDavid Woodhouse .type = KVM_XEN_VCPU_ATTR_TYPE_TIMER, 1927c723d4c1SDavid Woodhouse }; 1928c723d4c1SDavid Woodhouse ret = kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_GET_ATTR, &va); 1929c723d4c1SDavid Woodhouse if (ret < 0) { 1930c723d4c1SDavid Woodhouse return ret; 1931c723d4c1SDavid Woodhouse } 193219c417ecSDavid Woodhouse 193319c417ecSDavid Woodhouse /* 193419c417ecSDavid Woodhouse * This locking is fairly pointless, and is here to appease Coverity. 193519c417ecSDavid Woodhouse * There is an unavoidable race condition if a different vCPU sets a 193619c417ecSDavid Woodhouse * timer for this vCPU after the value has been read out. But that's 193719c417ecSDavid Woodhouse * OK in practice because *all* the vCPUs need to be stopped before 193819c417ecSDavid Woodhouse * we set about migrating their state. 193919c417ecSDavid Woodhouse */ 194019c417ecSDavid Woodhouse QEMU_LOCK_GUARD(&X86_CPU(cs)->env.xen_timers_lock); 1941c723d4c1SDavid Woodhouse env->xen_singleshot_timer_ns = va.u.timer.expires_ns; 1942c723d4c1SDavid Woodhouse } 1943c723d4c1SDavid Woodhouse 1944c345104cSJoao Martins return 0; 1945c345104cSJoao Martins } 1946