xref: /qemu/target/i386/kvm/xen-emu.c (revision 32ead8e62fe222d433d135bc6ef25a2af20561a3)
161491cf4SDavid Woodhouse /*
261491cf4SDavid Woodhouse  * Xen HVM emulation support in KVM
361491cf4SDavid Woodhouse  *
461491cf4SDavid Woodhouse  * Copyright © 2019 Oracle and/or its affiliates. All rights reserved.
561491cf4SDavid Woodhouse  * Copyright © 2022 Amazon.com, Inc. or its affiliates. All Rights Reserved.
661491cf4SDavid Woodhouse  *
761491cf4SDavid Woodhouse  * This work is licensed under the terms of the GNU GPL, version 2 or later.
861491cf4SDavid Woodhouse  * See the COPYING file in the top-level directory.
961491cf4SDavid Woodhouse  *
1061491cf4SDavid Woodhouse  */
1161491cf4SDavid Woodhouse 
1261491cf4SDavid Woodhouse #include "qemu/osdep.h"
1355a3f666SJoao Martins #include "qemu/log.h"
1479b7067dSJoao Martins #include "qemu/main-loop.h"
15cc37d98bSRichard Henderson #include "qemu/error-report.h"
16fb0fd2ceSJoao Martins #include "hw/xen/xen.h"
1761491cf4SDavid Woodhouse #include "sysemu/kvm_int.h"
1861491cf4SDavid Woodhouse #include "sysemu/kvm_xen.h"
1961491cf4SDavid Woodhouse #include "kvm/kvm_i386.h"
20bedcc139SJoao Martins #include "exec/address-spaces.h"
2161491cf4SDavid Woodhouse #include "xen-emu.h"
2255a3f666SJoao Martins #include "trace.h"
2379b7067dSJoao Martins #include "sysemu/runstate.h"
2461491cf4SDavid Woodhouse 
2527d4075dSDavid Woodhouse #include "hw/pci/msi.h"
2627d4075dSDavid Woodhouse #include "hw/i386/apic-msidef.h"
278b57d5c5SDavid Woodhouse #include "hw/i386/e820_memory_layout.h"
28110a0ea5SDavid Woodhouse #include "hw/i386/kvm/xen_overlay.h"
2991cce756SDavid Woodhouse #include "hw/i386/kvm/xen_evtchn.h"
30a28b0fc0SDavid Woodhouse #include "hw/i386/kvm/xen_gnttab.h"
31a72ccc7fSDavid Woodhouse #include "hw/i386/kvm/xen_primary_console.h"
32c08f5d0eSDavid Woodhouse #include "hw/i386/kvm/xen_xenstore.h"
33110a0ea5SDavid Woodhouse 
34bedcc139SJoao Martins #include "hw/xen/interface/version.h"
3579b7067dSJoao Martins #include "hw/xen/interface/sched.h"
36fb0fd2ceSJoao Martins #include "hw/xen/interface/memory.h"
37671bfdcdSJoao Martins #include "hw/xen/interface/hvm/hvm_op.h"
38105b47fdSAnkur Arora #include "hw/xen/interface/hvm/params.h"
39d70bd6a4SJoao Martins #include "hw/xen/interface/vcpu.h"
403b06f29bSJoao Martins #include "hw/xen/interface/event_channel.h"
4128b7ae94SDavid Woodhouse #include "hw/xen/interface/grant_table.h"
42fb0fd2ceSJoao Martins 
43fb0fd2ceSJoao Martins #include "xen-compat.h"
44fb0fd2ceSJoao Martins 
45b746a779SJoao Martins static void xen_vcpu_singleshot_timer_event(void *opaque);
46b746a779SJoao Martins static void xen_vcpu_periodic_timer_event(void *opaque);
4719c417ecSDavid Woodhouse static int vcpuop_stop_singleshot_timer(CPUState *cs);
48b746a779SJoao Martins 
49fb0fd2ceSJoao Martins #ifdef TARGET_X86_64
50fb0fd2ceSJoao Martins #define hypercall_compat32(longmode) (!(longmode))
51fb0fd2ceSJoao Martins #else
52fb0fd2ceSJoao Martins #define hypercall_compat32(longmode) (false)
53fb0fd2ceSJoao Martins #endif
54bedcc139SJoao Martins 
55f0689302SJoao Martins static bool kvm_gva_to_gpa(CPUState *cs, uint64_t gva, uint64_t *gpa,
56f0689302SJoao Martins                            size_t *len, bool is_write)
57bedcc139SJoao Martins {
58bedcc139SJoao Martins         struct kvm_translation tr = {
59bedcc139SJoao Martins             .linear_address = gva,
60bedcc139SJoao Martins         };
61bedcc139SJoao Martins 
62f0689302SJoao Martins         if (len) {
63f0689302SJoao Martins             *len = TARGET_PAGE_SIZE - (gva & ~TARGET_PAGE_MASK);
64f0689302SJoao Martins         }
65f0689302SJoao Martins 
66f0689302SJoao Martins         if (kvm_vcpu_ioctl(cs, KVM_TRANSLATE, &tr) || !tr.valid ||
67f0689302SJoao Martins             (is_write && !tr.writeable)) {
68f0689302SJoao Martins             return false;
69f0689302SJoao Martins         }
70f0689302SJoao Martins         *gpa = tr.physical_address;
71f0689302SJoao Martins         return true;
72f0689302SJoao Martins }
73f0689302SJoao Martins 
74f0689302SJoao Martins static int kvm_gva_rw(CPUState *cs, uint64_t gva, void *_buf, size_t sz,
75f0689302SJoao Martins                       bool is_write)
76f0689302SJoao Martins {
77f0689302SJoao Martins     uint8_t *buf = (uint8_t *)_buf;
78f0689302SJoao Martins     uint64_t gpa;
79f0689302SJoao Martins     size_t len;
80f0689302SJoao Martins 
81f0689302SJoao Martins     while (sz) {
82f0689302SJoao Martins         if (!kvm_gva_to_gpa(cs, gva, &gpa, &len, is_write)) {
83f0689302SJoao Martins             return -EFAULT;
84f0689302SJoao Martins         }
85bedcc139SJoao Martins         if (len > sz) {
86bedcc139SJoao Martins             len = sz;
87bedcc139SJoao Martins         }
88bedcc139SJoao Martins 
89f0689302SJoao Martins         cpu_physical_memory_rw(gpa, buf, len, is_write);
90bedcc139SJoao Martins 
91bedcc139SJoao Martins         buf += len;
92bedcc139SJoao Martins         sz -= len;
93bedcc139SJoao Martins         gva += len;
94bedcc139SJoao Martins     }
95bedcc139SJoao Martins 
96bedcc139SJoao Martins     return 0;
97bedcc139SJoao Martins }
98bedcc139SJoao Martins 
99bedcc139SJoao Martins static inline int kvm_copy_from_gva(CPUState *cs, uint64_t gva, void *buf,
100bedcc139SJoao Martins                                     size_t sz)
101bedcc139SJoao Martins {
102bedcc139SJoao Martins     return kvm_gva_rw(cs, gva, buf, sz, false);
103bedcc139SJoao Martins }
104bedcc139SJoao Martins 
105bedcc139SJoao Martins static inline int kvm_copy_to_gva(CPUState *cs, uint64_t gva, void *buf,
106bedcc139SJoao Martins                                   size_t sz)
107bedcc139SJoao Martins {
108bedcc139SJoao Martins     return kvm_gva_rw(cs, gva, buf, sz, true);
109bedcc139SJoao Martins }
110bedcc139SJoao Martins 
111f66b8a83SJoao Martins int kvm_xen_init(KVMState *s, uint32_t hypercall_msr)
11261491cf4SDavid Woodhouse {
11361491cf4SDavid Woodhouse     const int required_caps = KVM_XEN_HVM_CONFIG_HYPERCALL_MSR |
11461491cf4SDavid Woodhouse         KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL | KVM_XEN_HVM_CONFIG_SHARED_INFO;
11561491cf4SDavid Woodhouse     struct kvm_xen_hvm_config cfg = {
116f66b8a83SJoao Martins         .msr = hypercall_msr,
11761491cf4SDavid Woodhouse         .flags = KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL,
11861491cf4SDavid Woodhouse     };
11961491cf4SDavid Woodhouse     int xen_caps, ret;
12061491cf4SDavid Woodhouse 
12161491cf4SDavid Woodhouse     xen_caps = kvm_check_extension(s, KVM_CAP_XEN_HVM);
12261491cf4SDavid Woodhouse     if (required_caps & ~xen_caps) {
12361491cf4SDavid Woodhouse         error_report("kvm: Xen HVM guest support not present or insufficient");
12461491cf4SDavid Woodhouse         return -ENOSYS;
12561491cf4SDavid Woodhouse     }
12661491cf4SDavid Woodhouse 
12761491cf4SDavid Woodhouse     if (xen_caps & KVM_XEN_HVM_CONFIG_EVTCHN_SEND) {
12861491cf4SDavid Woodhouse         struct kvm_xen_hvm_attr ha = {
12961491cf4SDavid Woodhouse             .type = KVM_XEN_ATTR_TYPE_XEN_VERSION,
13061491cf4SDavid Woodhouse             .u.xen_version = s->xen_version,
13161491cf4SDavid Woodhouse         };
13261491cf4SDavid Woodhouse         (void)kvm_vm_ioctl(s, KVM_XEN_HVM_SET_ATTR, &ha);
13361491cf4SDavid Woodhouse 
13461491cf4SDavid Woodhouse         cfg.flags |= KVM_XEN_HVM_CONFIG_EVTCHN_SEND;
13561491cf4SDavid Woodhouse     }
13661491cf4SDavid Woodhouse 
13761491cf4SDavid Woodhouse     ret = kvm_vm_ioctl(s, KVM_XEN_HVM_CONFIG, &cfg);
13861491cf4SDavid Woodhouse     if (ret < 0) {
13961491cf4SDavid Woodhouse         error_report("kvm: Failed to enable Xen HVM support: %s",
14061491cf4SDavid Woodhouse                      strerror(-ret));
14161491cf4SDavid Woodhouse         return ret;
14261491cf4SDavid Woodhouse     }
14361491cf4SDavid Woodhouse 
1442aff696bSDavid Woodhouse     /* If called a second time, don't repeat the rest of the setup. */
1452aff696bSDavid Woodhouse     if (s->xen_caps) {
1462aff696bSDavid Woodhouse         return 0;
1472aff696bSDavid Woodhouse     }
1482aff696bSDavid Woodhouse 
1492aff696bSDavid Woodhouse     /*
1502aff696bSDavid Woodhouse      * Event channel delivery via GSI/PCI_INTX needs to poll the vcpu_info
1512aff696bSDavid Woodhouse      * of vCPU0 to deassert the IRQ when ->evtchn_upcall_pending is cleared.
1522aff696bSDavid Woodhouse      *
1532aff696bSDavid Woodhouse      * In the kernel, there's a notifier hook on the PIC/IOAPIC which allows
1542aff696bSDavid Woodhouse      * such things to be polled at precisely the right time. We *could* do
1552aff696bSDavid Woodhouse      * it nicely in the kernel: check vcpu_info[0]->evtchn_upcall_pending at
1562aff696bSDavid Woodhouse      * the moment the IRQ is acked, and see if it should be reasserted.
1572aff696bSDavid Woodhouse      *
1582aff696bSDavid Woodhouse      * But the in-kernel irqchip is deprecated, so we're unlikely to add
1592aff696bSDavid Woodhouse      * that support in the kernel. Insist on using the split irqchip mode
1602aff696bSDavid Woodhouse      * instead.
1612aff696bSDavid Woodhouse      *
1622aff696bSDavid Woodhouse      * This leaves us polling for the level going low in QEMU, which lacks
1632aff696bSDavid Woodhouse      * the appropriate hooks in its PIC/IOAPIC code. Even VFIO is sending a
1642aff696bSDavid Woodhouse      * spurious 'ack' to an INTX IRQ every time there's any MMIO access to
1652aff696bSDavid Woodhouse      * the device (for which it has to unmap the device and trap access, for
1662aff696bSDavid Woodhouse      * some period after an IRQ!!). In the Xen case, we do it on exit from
1672aff696bSDavid Woodhouse      * KVM_RUN, if the flag is set to say that the GSI is currently asserted.
1682aff696bSDavid Woodhouse      * Which is kind of icky, but less so than the VFIO one. I may fix them
1692aff696bSDavid Woodhouse      * both later...
1702aff696bSDavid Woodhouse      */
1712aff696bSDavid Woodhouse     if (!kvm_kernel_irqchip_split()) {
1722aff696bSDavid Woodhouse         error_report("kvm: Xen support requires kernel-irqchip=split");
1732aff696bSDavid Woodhouse         return -EINVAL;
1742aff696bSDavid Woodhouse     }
1752aff696bSDavid Woodhouse 
17661491cf4SDavid Woodhouse     s->xen_caps = xen_caps;
1778b57d5c5SDavid Woodhouse 
1788b57d5c5SDavid Woodhouse     /* Tell fw_cfg to notify the BIOS to reserve the range. */
1798b57d5c5SDavid Woodhouse     ret = e820_add_entry(XEN_SPECIAL_AREA_ADDR, XEN_SPECIAL_AREA_SIZE,
1808b57d5c5SDavid Woodhouse                          E820_RESERVED);
1818b57d5c5SDavid Woodhouse     if (ret < 0) {
1828b57d5c5SDavid Woodhouse         fprintf(stderr, "e820_add_entry() table is full\n");
1838b57d5c5SDavid Woodhouse         return ret;
1848b57d5c5SDavid Woodhouse     }
1858b57d5c5SDavid Woodhouse 
186a72ccc7fSDavid Woodhouse     /* The pages couldn't be overlaid until KVM was initialized */
187a72ccc7fSDavid Woodhouse     xen_primary_console_reset();
188c08f5d0eSDavid Woodhouse     xen_xenstore_reset();
189c08f5d0eSDavid Woodhouse 
19061491cf4SDavid Woodhouse     return 0;
19161491cf4SDavid Woodhouse }
19261491cf4SDavid Woodhouse 
1935e691a95SDavid Woodhouse int kvm_xen_init_vcpu(CPUState *cs)
1945e691a95SDavid Woodhouse {
195c345104cSJoao Martins     X86CPU *cpu = X86_CPU(cs);
196c345104cSJoao Martins     CPUX86State *env = &cpu->env;
1975e691a95SDavid Woodhouse     int err;
1985e691a95SDavid Woodhouse 
1995e691a95SDavid Woodhouse     /*
2005e691a95SDavid Woodhouse      * The kernel needs to know the Xen/ACPI vCPU ID because that's
2015e691a95SDavid Woodhouse      * what the guest uses in hypercalls such as timers. It doesn't
2025e691a95SDavid Woodhouse      * match the APIC ID which is generally used for talking to the
2035e691a95SDavid Woodhouse      * kernel about vCPUs. And if vCPU threads race with creating
2045e691a95SDavid Woodhouse      * their KVM vCPUs out of order, it doesn't necessarily match
2055e691a95SDavid Woodhouse      * with the kernel's internal vCPU indices either.
2065e691a95SDavid Woodhouse      */
2075e691a95SDavid Woodhouse     if (kvm_xen_has_cap(EVTCHN_SEND)) {
2085e691a95SDavid Woodhouse         struct kvm_xen_vcpu_attr va = {
2095e691a95SDavid Woodhouse             .type = KVM_XEN_VCPU_ATTR_TYPE_VCPU_ID,
2105e691a95SDavid Woodhouse             .u.vcpu_id = cs->cpu_index,
2115e691a95SDavid Woodhouse         };
2125e691a95SDavid Woodhouse         err = kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_SET_ATTR, &va);
2135e691a95SDavid Woodhouse         if (err) {
2145e691a95SDavid Woodhouse             error_report("kvm: Failed to set Xen vCPU ID attribute: %s",
2155e691a95SDavid Woodhouse                          strerror(-err));
2165e691a95SDavid Woodhouse             return err;
2175e691a95SDavid Woodhouse         }
2185e691a95SDavid Woodhouse     }
2195e691a95SDavid Woodhouse 
220c345104cSJoao Martins     env->xen_vcpu_info_gpa = INVALID_GPA;
221c345104cSJoao Martins     env->xen_vcpu_info_default_gpa = INVALID_GPA;
222f0689302SJoao Martins     env->xen_vcpu_time_info_gpa = INVALID_GPA;
2235092db87SJoao Martins     env->xen_vcpu_runstate_gpa = INVALID_GPA;
224c345104cSJoao Martins 
225b746a779SJoao Martins     qemu_mutex_init(&env->xen_timers_lock);
226b746a779SJoao Martins     env->xen_singleshot_timer = timer_new_ns(QEMU_CLOCK_VIRTUAL,
227b746a779SJoao Martins                                              xen_vcpu_singleshot_timer_event,
228b746a779SJoao Martins                                              cpu);
229b746a779SJoao Martins     if (!env->xen_singleshot_timer) {
230b746a779SJoao Martins         return -ENOMEM;
231b746a779SJoao Martins     }
232b746a779SJoao Martins     env->xen_singleshot_timer->opaque = cs;
233b746a779SJoao Martins 
234b746a779SJoao Martins     env->xen_periodic_timer = timer_new_ns(QEMU_CLOCK_VIRTUAL,
235b746a779SJoao Martins                                            xen_vcpu_periodic_timer_event,
236b746a779SJoao Martins                                            cpu);
237b746a779SJoao Martins     if (!env->xen_periodic_timer) {
238b746a779SJoao Martins         return -ENOMEM;
239b746a779SJoao Martins     }
240b746a779SJoao Martins     env->xen_periodic_timer->opaque = cs;
241b746a779SJoao Martins 
2425e691a95SDavid Woodhouse     return 0;
2435e691a95SDavid Woodhouse }
2445e691a95SDavid Woodhouse 
24561491cf4SDavid Woodhouse uint32_t kvm_xen_get_caps(void)
24661491cf4SDavid Woodhouse {
24761491cf4SDavid Woodhouse     return kvm_state->xen_caps;
24861491cf4SDavid Woodhouse }
24955a3f666SJoao Martins 
250bedcc139SJoao Martins static bool kvm_xen_hcall_xen_version(struct kvm_xen_exit *exit, X86CPU *cpu,
251bedcc139SJoao Martins                                      int cmd, uint64_t arg)
252bedcc139SJoao Martins {
253bedcc139SJoao Martins     int err = 0;
254bedcc139SJoao Martins 
255bedcc139SJoao Martins     switch (cmd) {
256bedcc139SJoao Martins     case XENVER_get_features: {
257bedcc139SJoao Martins         struct xen_feature_info fi;
258bedcc139SJoao Martins 
259bedcc139SJoao Martins         /* No need for 32/64 compat handling */
260bedcc139SJoao Martins         qemu_build_assert(sizeof(fi) == 8);
261bedcc139SJoao Martins 
262bedcc139SJoao Martins         err = kvm_copy_from_gva(CPU(cpu), arg, &fi, sizeof(fi));
263bedcc139SJoao Martins         if (err) {
264bedcc139SJoao Martins             break;
265bedcc139SJoao Martins         }
266bedcc139SJoao Martins 
267bedcc139SJoao Martins         fi.submap = 0;
268bedcc139SJoao Martins         if (fi.submap_idx == 0) {
269bedcc139SJoao Martins             fi.submap |= 1 << XENFEAT_writable_page_tables |
270bedcc139SJoao Martins                          1 << XENFEAT_writable_descriptor_tables |
271bedcc139SJoao Martins                          1 << XENFEAT_auto_translated_physmap |
272b746a779SJoao Martins                          1 << XENFEAT_hvm_callback_vector |
2736096cf78SDavid Woodhouse                          1 << XENFEAT_hvm_safe_pvclock |
2746096cf78SDavid Woodhouse                          1 << XENFEAT_hvm_pirqs;
275bedcc139SJoao Martins         }
276bedcc139SJoao Martins 
277bedcc139SJoao Martins         err = kvm_copy_to_gva(CPU(cpu), arg, &fi, sizeof(fi));
278bedcc139SJoao Martins         break;
279bedcc139SJoao Martins     }
280bedcc139SJoao Martins 
281bedcc139SJoao Martins     default:
282bedcc139SJoao Martins         return false;
283bedcc139SJoao Martins     }
284bedcc139SJoao Martins 
285bedcc139SJoao Martins     exit->u.hcall.result = err;
286bedcc139SJoao Martins     return true;
287bedcc139SJoao Martins }
288bedcc139SJoao Martins 
289c345104cSJoao Martins static int kvm_xen_set_vcpu_attr(CPUState *cs, uint16_t type, uint64_t gpa)
290c345104cSJoao Martins {
291c345104cSJoao Martins     struct kvm_xen_vcpu_attr xhsi;
292c345104cSJoao Martins 
293c345104cSJoao Martins     xhsi.type = type;
294c345104cSJoao Martins     xhsi.u.gpa = gpa;
295c345104cSJoao Martins 
296c345104cSJoao Martins     trace_kvm_xen_set_vcpu_attr(cs->cpu_index, type, gpa);
297c345104cSJoao Martins 
298c345104cSJoao Martins     return kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_SET_ATTR, &xhsi);
299c345104cSJoao Martins }
300c345104cSJoao Martins 
301105b47fdSAnkur Arora static int kvm_xen_set_vcpu_callback_vector(CPUState *cs)
302105b47fdSAnkur Arora {
303105b47fdSAnkur Arora     uint8_t vector = X86_CPU(cs)->env.xen_vcpu_callback_vector;
304105b47fdSAnkur Arora     struct kvm_xen_vcpu_attr xva;
305105b47fdSAnkur Arora 
306105b47fdSAnkur Arora     xva.type = KVM_XEN_VCPU_ATTR_TYPE_UPCALL_VECTOR;
307105b47fdSAnkur Arora     xva.u.vector = vector;
308105b47fdSAnkur Arora 
309105b47fdSAnkur Arora     trace_kvm_xen_set_vcpu_callback(cs->cpu_index, vector);
310105b47fdSAnkur Arora 
311e7dbb62fSDavid Woodhouse     return kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_SET_ATTR, &xva);
312105b47fdSAnkur Arora }
313105b47fdSAnkur Arora 
314105b47fdSAnkur Arora static void do_set_vcpu_callback_vector(CPUState *cs, run_on_cpu_data data)
315105b47fdSAnkur Arora {
316105b47fdSAnkur Arora     X86CPU *cpu = X86_CPU(cs);
317105b47fdSAnkur Arora     CPUX86State *env = &cpu->env;
318105b47fdSAnkur Arora 
319105b47fdSAnkur Arora     env->xen_vcpu_callback_vector = data.host_int;
320105b47fdSAnkur Arora 
321105b47fdSAnkur Arora     if (kvm_xen_has_cap(EVTCHN_SEND)) {
322105b47fdSAnkur Arora         kvm_xen_set_vcpu_callback_vector(cs);
323105b47fdSAnkur Arora     }
324105b47fdSAnkur Arora }
325105b47fdSAnkur Arora 
32627d4075dSDavid Woodhouse static int set_vcpu_info(CPUState *cs, uint64_t gpa)
32727d4075dSDavid Woodhouse {
32827d4075dSDavid Woodhouse     X86CPU *cpu = X86_CPU(cs);
32927d4075dSDavid Woodhouse     CPUX86State *env = &cpu->env;
33027d4075dSDavid Woodhouse     MemoryRegionSection mrs = { .mr = NULL };
33127d4075dSDavid Woodhouse     void *vcpu_info_hva = NULL;
33227d4075dSDavid Woodhouse     int ret;
33327d4075dSDavid Woodhouse 
33427d4075dSDavid Woodhouse     ret = kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_INFO, gpa);
33527d4075dSDavid Woodhouse     if (ret || gpa == INVALID_GPA) {
33627d4075dSDavid Woodhouse         goto out;
33727d4075dSDavid Woodhouse     }
33827d4075dSDavid Woodhouse 
33927d4075dSDavid Woodhouse     mrs = memory_region_find(get_system_memory(), gpa,
34027d4075dSDavid Woodhouse                              sizeof(struct vcpu_info));
34127d4075dSDavid Woodhouse     if (mrs.mr && mrs.mr->ram_block &&
34227d4075dSDavid Woodhouse         !int128_lt(mrs.size, int128_make64(sizeof(struct vcpu_info)))) {
34327d4075dSDavid Woodhouse         vcpu_info_hva = qemu_map_ram_ptr(mrs.mr->ram_block,
34427d4075dSDavid Woodhouse                                          mrs.offset_within_region);
34527d4075dSDavid Woodhouse     }
34627d4075dSDavid Woodhouse     if (!vcpu_info_hva) {
34727d4075dSDavid Woodhouse         if (mrs.mr) {
34827d4075dSDavid Woodhouse             memory_region_unref(mrs.mr);
34927d4075dSDavid Woodhouse             mrs.mr = NULL;
35027d4075dSDavid Woodhouse         }
35127d4075dSDavid Woodhouse         ret = -EINVAL;
35227d4075dSDavid Woodhouse     }
35327d4075dSDavid Woodhouse 
35427d4075dSDavid Woodhouse  out:
35527d4075dSDavid Woodhouse     if (env->xen_vcpu_info_mr) {
35627d4075dSDavid Woodhouse         memory_region_unref(env->xen_vcpu_info_mr);
35727d4075dSDavid Woodhouse     }
35827d4075dSDavid Woodhouse     env->xen_vcpu_info_hva = vcpu_info_hva;
35927d4075dSDavid Woodhouse     env->xen_vcpu_info_mr = mrs.mr;
36027d4075dSDavid Woodhouse     return ret;
36127d4075dSDavid Woodhouse }
36227d4075dSDavid Woodhouse 
363c345104cSJoao Martins static void do_set_vcpu_info_default_gpa(CPUState *cs, run_on_cpu_data data)
364c345104cSJoao Martins {
365c345104cSJoao Martins     X86CPU *cpu = X86_CPU(cs);
366c345104cSJoao Martins     CPUX86State *env = &cpu->env;
367c345104cSJoao Martins 
368c345104cSJoao Martins     env->xen_vcpu_info_default_gpa = data.host_ulong;
369c345104cSJoao Martins 
370c345104cSJoao Martins     /* Changing the default does nothing if a vcpu_info was explicitly set. */
371c345104cSJoao Martins     if (env->xen_vcpu_info_gpa == INVALID_GPA) {
37227d4075dSDavid Woodhouse         set_vcpu_info(cs, env->xen_vcpu_info_default_gpa);
373c345104cSJoao Martins     }
374c345104cSJoao Martins }
375c345104cSJoao Martins 
376c345104cSJoao Martins static void do_set_vcpu_info_gpa(CPUState *cs, run_on_cpu_data data)
377c345104cSJoao Martins {
378c345104cSJoao Martins     X86CPU *cpu = X86_CPU(cs);
379c345104cSJoao Martins     CPUX86State *env = &cpu->env;
380c345104cSJoao Martins 
381c345104cSJoao Martins     env->xen_vcpu_info_gpa = data.host_ulong;
382c345104cSJoao Martins 
38327d4075dSDavid Woodhouse     set_vcpu_info(cs, env->xen_vcpu_info_gpa);
38427d4075dSDavid Woodhouse }
38527d4075dSDavid Woodhouse 
38627d4075dSDavid Woodhouse void *kvm_xen_get_vcpu_info_hva(uint32_t vcpu_id)
38727d4075dSDavid Woodhouse {
38827d4075dSDavid Woodhouse     CPUState *cs = qemu_get_cpu(vcpu_id);
38927d4075dSDavid Woodhouse     if (!cs) {
39027d4075dSDavid Woodhouse         return NULL;
39127d4075dSDavid Woodhouse     }
39227d4075dSDavid Woodhouse 
39327d4075dSDavid Woodhouse     return X86_CPU(cs)->env.xen_vcpu_info_hva;
39427d4075dSDavid Woodhouse }
39527d4075dSDavid Woodhouse 
396ddf0fd9aSDavid Woodhouse void kvm_xen_maybe_deassert_callback(CPUState *cs)
397ddf0fd9aSDavid Woodhouse {
398ddf0fd9aSDavid Woodhouse     CPUX86State *env = &X86_CPU(cs)->env;
399ddf0fd9aSDavid Woodhouse     struct vcpu_info *vi = env->xen_vcpu_info_hva;
400ddf0fd9aSDavid Woodhouse     if (!vi) {
401ddf0fd9aSDavid Woodhouse         return;
402ddf0fd9aSDavid Woodhouse     }
403ddf0fd9aSDavid Woodhouse 
404ddf0fd9aSDavid Woodhouse     /* If the evtchn_upcall_pending flag is cleared, turn the GSI off. */
405ddf0fd9aSDavid Woodhouse     if (!vi->evtchn_upcall_pending) {
406195801d7SStefan Hajnoczi         bql_lock();
407ddf0fd9aSDavid Woodhouse         /*
408ddf0fd9aSDavid Woodhouse          * Check again now we have the lock, because it may have been
409ddf0fd9aSDavid Woodhouse          * asserted in the interim. And we don't want to take the lock
410ddf0fd9aSDavid Woodhouse          * every time because this is a fast path.
411ddf0fd9aSDavid Woodhouse          */
412ddf0fd9aSDavid Woodhouse         if (!vi->evtchn_upcall_pending) {
413ddf0fd9aSDavid Woodhouse             X86_CPU(cs)->env.xen_callback_asserted = false;
414ddf0fd9aSDavid Woodhouse             xen_evtchn_set_callback_level(0);
415ddf0fd9aSDavid Woodhouse         }
416195801d7SStefan Hajnoczi         bql_unlock();
417ddf0fd9aSDavid Woodhouse     }
418ddf0fd9aSDavid Woodhouse }
419ddf0fd9aSDavid Woodhouse 
420ddf0fd9aSDavid Woodhouse void kvm_xen_set_callback_asserted(void)
421ddf0fd9aSDavid Woodhouse {
422ddf0fd9aSDavid Woodhouse     CPUState *cs = qemu_get_cpu(0);
423ddf0fd9aSDavid Woodhouse 
424ddf0fd9aSDavid Woodhouse     if (cs) {
425ddf0fd9aSDavid Woodhouse         X86_CPU(cs)->env.xen_callback_asserted = true;
426ddf0fd9aSDavid Woodhouse     }
427ddf0fd9aSDavid Woodhouse }
428ddf0fd9aSDavid Woodhouse 
42918e83f28SDavid Woodhouse bool kvm_xen_has_vcpu_callback_vector(void)
43018e83f28SDavid Woodhouse {
43118e83f28SDavid Woodhouse     CPUState *cs = qemu_get_cpu(0);
43218e83f28SDavid Woodhouse 
43318e83f28SDavid Woodhouse     return cs && !!X86_CPU(cs)->env.xen_vcpu_callback_vector;
43418e83f28SDavid Woodhouse }
43518e83f28SDavid Woodhouse 
43627d4075dSDavid Woodhouse void kvm_xen_inject_vcpu_callback_vector(uint32_t vcpu_id, int type)
43727d4075dSDavid Woodhouse {
43827d4075dSDavid Woodhouse     CPUState *cs = qemu_get_cpu(vcpu_id);
43927d4075dSDavid Woodhouse     uint8_t vector;
44027d4075dSDavid Woodhouse 
44127d4075dSDavid Woodhouse     if (!cs) {
44227d4075dSDavid Woodhouse         return;
44327d4075dSDavid Woodhouse     }
44427d4075dSDavid Woodhouse 
44527d4075dSDavid Woodhouse     vector = X86_CPU(cs)->env.xen_vcpu_callback_vector;
44627d4075dSDavid Woodhouse     if (vector) {
44727d4075dSDavid Woodhouse         /*
44827d4075dSDavid Woodhouse          * The per-vCPU callback vector injected via lapic. Just
44927d4075dSDavid Woodhouse          * deliver it as an MSI.
45027d4075dSDavid Woodhouse          */
45127d4075dSDavid Woodhouse         MSIMessage msg = {
452e7dbb62fSDavid Woodhouse             .address = APIC_DEFAULT_ADDRESS |
453e7dbb62fSDavid Woodhouse                        (X86_CPU(cs)->apic_id << MSI_ADDR_DEST_ID_SHIFT),
45427d4075dSDavid Woodhouse             .data = vector | (1UL << MSI_DATA_LEVEL_SHIFT),
45527d4075dSDavid Woodhouse         };
45627d4075dSDavid Woodhouse         kvm_irqchip_send_msi(kvm_state, msg);
45727d4075dSDavid Woodhouse         return;
45827d4075dSDavid Woodhouse     }
45927d4075dSDavid Woodhouse 
46027d4075dSDavid Woodhouse     switch (type) {
46127d4075dSDavid Woodhouse     case HVM_PARAM_CALLBACK_TYPE_VECTOR:
46227d4075dSDavid Woodhouse         /*
46327d4075dSDavid Woodhouse          * If the evtchn_upcall_pending field in the vcpu_info is set, then
46427d4075dSDavid Woodhouse          * KVM will automatically deliver the vector on entering the vCPU
46527d4075dSDavid Woodhouse          * so all we have to do is kick it out.
46627d4075dSDavid Woodhouse          */
46727d4075dSDavid Woodhouse         qemu_cpu_kick(cs);
46827d4075dSDavid Woodhouse         break;
469ddf0fd9aSDavid Woodhouse 
470ddf0fd9aSDavid Woodhouse     case HVM_PARAM_CALLBACK_TYPE_GSI:
471ddf0fd9aSDavid Woodhouse     case HVM_PARAM_CALLBACK_TYPE_PCI_INTX:
472ddf0fd9aSDavid Woodhouse         if (vcpu_id == 0) {
473ddf0fd9aSDavid Woodhouse             xen_evtchn_set_callback_level(1);
474ddf0fd9aSDavid Woodhouse         }
475ddf0fd9aSDavid Woodhouse         break;
47627d4075dSDavid Woodhouse     }
477c345104cSJoao Martins }
478c345104cSJoao Martins 
47919c417ecSDavid Woodhouse /* Must always be called with xen_timers_lock held */
480c723d4c1SDavid Woodhouse static int kvm_xen_set_vcpu_timer(CPUState *cs)
481c723d4c1SDavid Woodhouse {
482c723d4c1SDavid Woodhouse     X86CPU *cpu = X86_CPU(cs);
483c723d4c1SDavid Woodhouse     CPUX86State *env = &cpu->env;
484c723d4c1SDavid Woodhouse 
485c723d4c1SDavid Woodhouse     struct kvm_xen_vcpu_attr va = {
486c723d4c1SDavid Woodhouse         .type = KVM_XEN_VCPU_ATTR_TYPE_TIMER,
487c723d4c1SDavid Woodhouse         .u.timer.port = env->xen_virq[VIRQ_TIMER],
488c723d4c1SDavid Woodhouse         .u.timer.priority = KVM_IRQ_ROUTING_XEN_EVTCHN_PRIO_2LEVEL,
489c723d4c1SDavid Woodhouse         .u.timer.expires_ns = env->xen_singleshot_timer_ns,
490c723d4c1SDavid Woodhouse     };
491c723d4c1SDavid Woodhouse 
492c723d4c1SDavid Woodhouse     return kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_SET_ATTR, &va);
493c723d4c1SDavid Woodhouse }
494c723d4c1SDavid Woodhouse 
495c723d4c1SDavid Woodhouse static void do_set_vcpu_timer_virq(CPUState *cs, run_on_cpu_data data)
496c723d4c1SDavid Woodhouse {
49719c417ecSDavid Woodhouse     QEMU_LOCK_GUARD(&X86_CPU(cs)->env.xen_timers_lock);
498c723d4c1SDavid Woodhouse     kvm_xen_set_vcpu_timer(cs);
499c723d4c1SDavid Woodhouse }
500c723d4c1SDavid Woodhouse 
501c723d4c1SDavid Woodhouse int kvm_xen_set_vcpu_virq(uint32_t vcpu_id, uint16_t virq, uint16_t port)
502c723d4c1SDavid Woodhouse {
503c723d4c1SDavid Woodhouse     CPUState *cs = qemu_get_cpu(vcpu_id);
504c723d4c1SDavid Woodhouse 
505c723d4c1SDavid Woodhouse     if (!cs) {
506c723d4c1SDavid Woodhouse         return -ENOENT;
507c723d4c1SDavid Woodhouse     }
508c723d4c1SDavid Woodhouse 
509c723d4c1SDavid Woodhouse     /* cpu.h doesn't include the actual Xen header. */
510c723d4c1SDavid Woodhouse     qemu_build_assert(NR_VIRQS == XEN_NR_VIRQS);
511c723d4c1SDavid Woodhouse 
512c723d4c1SDavid Woodhouse     if (virq >= NR_VIRQS) {
513c723d4c1SDavid Woodhouse         return -EINVAL;
514c723d4c1SDavid Woodhouse     }
515c723d4c1SDavid Woodhouse 
516c723d4c1SDavid Woodhouse     if (port && X86_CPU(cs)->env.xen_virq[virq]) {
517c723d4c1SDavid Woodhouse         return -EEXIST;
518c723d4c1SDavid Woodhouse     }
519c723d4c1SDavid Woodhouse 
520c723d4c1SDavid Woodhouse     X86_CPU(cs)->env.xen_virq[virq] = port;
521c723d4c1SDavid Woodhouse     if (virq == VIRQ_TIMER && kvm_xen_has_cap(EVTCHN_SEND)) {
522c723d4c1SDavid Woodhouse         async_run_on_cpu(cs, do_set_vcpu_timer_virq,
523c723d4c1SDavid Woodhouse                          RUN_ON_CPU_HOST_INT(port));
524c723d4c1SDavid Woodhouse     }
525c723d4c1SDavid Woodhouse     return 0;
526c723d4c1SDavid Woodhouse }
527c723d4c1SDavid Woodhouse 
528f0689302SJoao Martins static void do_set_vcpu_time_info_gpa(CPUState *cs, run_on_cpu_data data)
529f0689302SJoao Martins {
530f0689302SJoao Martins     X86CPU *cpu = X86_CPU(cs);
531f0689302SJoao Martins     CPUX86State *env = &cpu->env;
532f0689302SJoao Martins 
533f0689302SJoao Martins     env->xen_vcpu_time_info_gpa = data.host_ulong;
534f0689302SJoao Martins 
535f0689302SJoao Martins     kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO,
536f0689302SJoao Martins                           env->xen_vcpu_time_info_gpa);
537f0689302SJoao Martins }
538f0689302SJoao Martins 
5395092db87SJoao Martins static void do_set_vcpu_runstate_gpa(CPUState *cs, run_on_cpu_data data)
5405092db87SJoao Martins {
5415092db87SJoao Martins     X86CPU *cpu = X86_CPU(cs);
5425092db87SJoao Martins     CPUX86State *env = &cpu->env;
5435092db87SJoao Martins 
5445092db87SJoao Martins     env->xen_vcpu_runstate_gpa = data.host_ulong;
5455092db87SJoao Martins 
5465092db87SJoao Martins     kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR,
5475092db87SJoao Martins                           env->xen_vcpu_runstate_gpa);
5485092db87SJoao Martins }
5495092db87SJoao Martins 
550c345104cSJoao Martins static void do_vcpu_soft_reset(CPUState *cs, run_on_cpu_data data)
551c345104cSJoao Martins {
552c345104cSJoao Martins     X86CPU *cpu = X86_CPU(cs);
553c345104cSJoao Martins     CPUX86State *env = &cpu->env;
554c345104cSJoao Martins 
555c345104cSJoao Martins     env->xen_vcpu_info_gpa = INVALID_GPA;
556c345104cSJoao Martins     env->xen_vcpu_info_default_gpa = INVALID_GPA;
557f0689302SJoao Martins     env->xen_vcpu_time_info_gpa = INVALID_GPA;
5585092db87SJoao Martins     env->xen_vcpu_runstate_gpa = INVALID_GPA;
559105b47fdSAnkur Arora     env->xen_vcpu_callback_vector = 0;
560c723d4c1SDavid Woodhouse     memset(env->xen_virq, 0, sizeof(env->xen_virq));
561c345104cSJoao Martins 
56227d4075dSDavid Woodhouse     set_vcpu_info(cs, INVALID_GPA);
563f0689302SJoao Martins     kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO,
564f0689302SJoao Martins                           INVALID_GPA);
5655092db87SJoao Martins     kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR,
5665092db87SJoao Martins                           INVALID_GPA);
567105b47fdSAnkur Arora     if (kvm_xen_has_cap(EVTCHN_SEND)) {
568105b47fdSAnkur Arora         kvm_xen_set_vcpu_callback_vector(cs);
56919c417ecSDavid Woodhouse 
57019c417ecSDavid Woodhouse         QEMU_LOCK_GUARD(&X86_CPU(cs)->env.xen_timers_lock);
57119c417ecSDavid Woodhouse         env->xen_singleshot_timer_ns = 0;
572c723d4c1SDavid Woodhouse         kvm_xen_set_vcpu_timer(cs);
57319c417ecSDavid Woodhouse     } else {
57419c417ecSDavid Woodhouse         vcpuop_stop_singleshot_timer(cs);
57519c417ecSDavid Woodhouse     };
5765092db87SJoao Martins 
577c345104cSJoao Martins }
578c345104cSJoao Martins 
579fb0fd2ceSJoao Martins static int xen_set_shared_info(uint64_t gfn)
580fb0fd2ceSJoao Martins {
581fb0fd2ceSJoao Martins     uint64_t gpa = gfn << TARGET_PAGE_BITS;
582c345104cSJoao Martins     int i, err;
583fb0fd2ceSJoao Martins 
584*32ead8e6SStefan Hajnoczi     BQL_LOCK_GUARD();
585fb0fd2ceSJoao Martins 
586fb0fd2ceSJoao Martins     /*
587fb0fd2ceSJoao Martins      * The xen_overlay device tells KVM about it too, since it had to
588fb0fd2ceSJoao Martins      * do that on migration load anyway (unless we're going to jump
589fb0fd2ceSJoao Martins      * through lots of hoops to maintain the fiction that this isn't
590fb0fd2ceSJoao Martins      * KVM-specific.
591fb0fd2ceSJoao Martins      */
592fb0fd2ceSJoao Martins     err = xen_overlay_map_shinfo_page(gpa);
593fb0fd2ceSJoao Martins     if (err) {
594fb0fd2ceSJoao Martins             return err;
595fb0fd2ceSJoao Martins     }
596fb0fd2ceSJoao Martins 
597fb0fd2ceSJoao Martins     trace_kvm_xen_set_shared_info(gfn);
598fb0fd2ceSJoao Martins 
599c345104cSJoao Martins     for (i = 0; i < XEN_LEGACY_MAX_VCPUS; i++) {
600c345104cSJoao Martins         CPUState *cpu = qemu_get_cpu(i);
601c345104cSJoao Martins         if (cpu) {
602c345104cSJoao Martins             async_run_on_cpu(cpu, do_set_vcpu_info_default_gpa,
603c345104cSJoao Martins                              RUN_ON_CPU_HOST_ULONG(gpa));
604c345104cSJoao Martins         }
605c345104cSJoao Martins         gpa += sizeof(vcpu_info_t);
606c345104cSJoao Martins     }
607c345104cSJoao Martins 
608fb0fd2ceSJoao Martins     return err;
609fb0fd2ceSJoao Martins }
610fb0fd2ceSJoao Martins 
611fb0fd2ceSJoao Martins static int add_to_physmap_one(uint32_t space, uint64_t idx, uint64_t gfn)
612fb0fd2ceSJoao Martins {
613fb0fd2ceSJoao Martins     switch (space) {
614fb0fd2ceSJoao Martins     case XENMAPSPACE_shared_info:
615fb0fd2ceSJoao Martins         if (idx > 0) {
616fb0fd2ceSJoao Martins             return -EINVAL;
617fb0fd2ceSJoao Martins         }
618fb0fd2ceSJoao Martins         return xen_set_shared_info(gfn);
619fb0fd2ceSJoao Martins 
620fb0fd2ceSJoao Martins     case XENMAPSPACE_grant_table:
621a28b0fc0SDavid Woodhouse         return xen_gnttab_map_page(idx, gfn);
622a28b0fc0SDavid Woodhouse 
623fb0fd2ceSJoao Martins     case XENMAPSPACE_gmfn:
624fb0fd2ceSJoao Martins     case XENMAPSPACE_gmfn_range:
625fb0fd2ceSJoao Martins         return -ENOTSUP;
626fb0fd2ceSJoao Martins 
627fb0fd2ceSJoao Martins     case XENMAPSPACE_gmfn_foreign:
628fb0fd2ceSJoao Martins     case XENMAPSPACE_dev_mmio:
629fb0fd2ceSJoao Martins         return -EPERM;
630fb0fd2ceSJoao Martins 
631fb0fd2ceSJoao Martins     default:
632fb0fd2ceSJoao Martins         return -EINVAL;
633fb0fd2ceSJoao Martins     }
634fb0fd2ceSJoao Martins }
635fb0fd2ceSJoao Martins 
636fb0fd2ceSJoao Martins static int do_add_to_physmap(struct kvm_xen_exit *exit, X86CPU *cpu,
637fb0fd2ceSJoao Martins                              uint64_t arg)
638fb0fd2ceSJoao Martins {
639fb0fd2ceSJoao Martins     struct xen_add_to_physmap xatp;
640fb0fd2ceSJoao Martins     CPUState *cs = CPU(cpu);
641fb0fd2ceSJoao Martins 
642fb0fd2ceSJoao Martins     if (hypercall_compat32(exit->u.hcall.longmode)) {
643fb0fd2ceSJoao Martins         struct compat_xen_add_to_physmap xatp32;
644fb0fd2ceSJoao Martins 
645fb0fd2ceSJoao Martins         qemu_build_assert(sizeof(struct compat_xen_add_to_physmap) == 16);
646fb0fd2ceSJoao Martins         if (kvm_copy_from_gva(cs, arg, &xatp32, sizeof(xatp32))) {
647fb0fd2ceSJoao Martins             return -EFAULT;
648fb0fd2ceSJoao Martins         }
649fb0fd2ceSJoao Martins         xatp.domid = xatp32.domid;
650fb0fd2ceSJoao Martins         xatp.size = xatp32.size;
651fb0fd2ceSJoao Martins         xatp.space = xatp32.space;
652fb0fd2ceSJoao Martins         xatp.idx = xatp32.idx;
653fb0fd2ceSJoao Martins         xatp.gpfn = xatp32.gpfn;
654fb0fd2ceSJoao Martins     } else {
655fb0fd2ceSJoao Martins         if (kvm_copy_from_gva(cs, arg, &xatp, sizeof(xatp))) {
656fb0fd2ceSJoao Martins             return -EFAULT;
657fb0fd2ceSJoao Martins         }
658fb0fd2ceSJoao Martins     }
659fb0fd2ceSJoao Martins 
660fb0fd2ceSJoao Martins     if (xatp.domid != DOMID_SELF && xatp.domid != xen_domid) {
661fb0fd2ceSJoao Martins         return -ESRCH;
662fb0fd2ceSJoao Martins     }
663fb0fd2ceSJoao Martins 
664fb0fd2ceSJoao Martins     return add_to_physmap_one(xatp.space, xatp.idx, xatp.gpfn);
665fb0fd2ceSJoao Martins }
666fb0fd2ceSJoao Martins 
667782a7960SDavid Woodhouse static int do_add_to_physmap_batch(struct kvm_xen_exit *exit, X86CPU *cpu,
668782a7960SDavid Woodhouse                                    uint64_t arg)
669782a7960SDavid Woodhouse {
670782a7960SDavid Woodhouse     struct xen_add_to_physmap_batch xatpb;
671782a7960SDavid Woodhouse     unsigned long idxs_gva, gpfns_gva, errs_gva;
672782a7960SDavid Woodhouse     CPUState *cs = CPU(cpu);
673782a7960SDavid Woodhouse     size_t op_sz;
674782a7960SDavid Woodhouse 
675782a7960SDavid Woodhouse     if (hypercall_compat32(exit->u.hcall.longmode)) {
676782a7960SDavid Woodhouse         struct compat_xen_add_to_physmap_batch xatpb32;
677782a7960SDavid Woodhouse 
678782a7960SDavid Woodhouse         qemu_build_assert(sizeof(struct compat_xen_add_to_physmap_batch) == 20);
679782a7960SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &xatpb32, sizeof(xatpb32))) {
680782a7960SDavid Woodhouse             return -EFAULT;
681782a7960SDavid Woodhouse         }
682782a7960SDavid Woodhouse         xatpb.domid = xatpb32.domid;
683782a7960SDavid Woodhouse         xatpb.space = xatpb32.space;
684782a7960SDavid Woodhouse         xatpb.size = xatpb32.size;
685782a7960SDavid Woodhouse 
686782a7960SDavid Woodhouse         idxs_gva = xatpb32.idxs.c;
687782a7960SDavid Woodhouse         gpfns_gva = xatpb32.gpfns.c;
688782a7960SDavid Woodhouse         errs_gva = xatpb32.errs.c;
689782a7960SDavid Woodhouse         op_sz = sizeof(uint32_t);
690782a7960SDavid Woodhouse     } else {
691782a7960SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &xatpb, sizeof(xatpb))) {
692782a7960SDavid Woodhouse             return -EFAULT;
693782a7960SDavid Woodhouse         }
694782a7960SDavid Woodhouse         op_sz = sizeof(unsigned long);
695782a7960SDavid Woodhouse         idxs_gva = (unsigned long)xatpb.idxs.p;
696782a7960SDavid Woodhouse         gpfns_gva = (unsigned long)xatpb.gpfns.p;
697782a7960SDavid Woodhouse         errs_gva = (unsigned long)xatpb.errs.p;
698782a7960SDavid Woodhouse     }
699782a7960SDavid Woodhouse 
700782a7960SDavid Woodhouse     if (xatpb.domid != DOMID_SELF && xatpb.domid != xen_domid) {
701782a7960SDavid Woodhouse         return -ESRCH;
702782a7960SDavid Woodhouse     }
703782a7960SDavid Woodhouse 
704782a7960SDavid Woodhouse     /* Explicitly invalid for the batch op. Not that we implement it anyway. */
705782a7960SDavid Woodhouse     if (xatpb.space == XENMAPSPACE_gmfn_range) {
706782a7960SDavid Woodhouse         return -EINVAL;
707782a7960SDavid Woodhouse     }
708782a7960SDavid Woodhouse 
709782a7960SDavid Woodhouse     while (xatpb.size--) {
710782a7960SDavid Woodhouse         unsigned long idx = 0;
711782a7960SDavid Woodhouse         unsigned long gpfn = 0;
712782a7960SDavid Woodhouse         int err;
713782a7960SDavid Woodhouse 
714782a7960SDavid Woodhouse         /* For 32-bit compat this only copies the low 32 bits of each */
715782a7960SDavid Woodhouse         if (kvm_copy_from_gva(cs, idxs_gva, &idx, op_sz) ||
716782a7960SDavid Woodhouse             kvm_copy_from_gva(cs, gpfns_gva, &gpfn, op_sz)) {
717782a7960SDavid Woodhouse             return -EFAULT;
718782a7960SDavid Woodhouse         }
719782a7960SDavid Woodhouse         idxs_gva += op_sz;
720782a7960SDavid Woodhouse         gpfns_gva += op_sz;
721782a7960SDavid Woodhouse 
722782a7960SDavid Woodhouse         err = add_to_physmap_one(xatpb.space, idx, gpfn);
723782a7960SDavid Woodhouse 
724782a7960SDavid Woodhouse         if (kvm_copy_to_gva(cs, errs_gva, &err, sizeof(err))) {
725782a7960SDavid Woodhouse             return -EFAULT;
726782a7960SDavid Woodhouse         }
727782a7960SDavid Woodhouse         errs_gva += sizeof(err);
728782a7960SDavid Woodhouse     }
729782a7960SDavid Woodhouse     return 0;
730782a7960SDavid Woodhouse }
731782a7960SDavid Woodhouse 
732fb0fd2ceSJoao Martins static bool kvm_xen_hcall_memory_op(struct kvm_xen_exit *exit, X86CPU *cpu,
733fb0fd2ceSJoao Martins                                    int cmd, uint64_t arg)
734fb0fd2ceSJoao Martins {
735fb0fd2ceSJoao Martins     int err;
736fb0fd2ceSJoao Martins 
737fb0fd2ceSJoao Martins     switch (cmd) {
738fb0fd2ceSJoao Martins     case XENMEM_add_to_physmap:
739fb0fd2ceSJoao Martins         err = do_add_to_physmap(exit, cpu, arg);
740fb0fd2ceSJoao Martins         break;
741fb0fd2ceSJoao Martins 
742782a7960SDavid Woodhouse     case XENMEM_add_to_physmap_batch:
743782a7960SDavid Woodhouse         err = do_add_to_physmap_batch(exit, cpu, arg);
744782a7960SDavid Woodhouse         break;
745782a7960SDavid Woodhouse 
746fb0fd2ceSJoao Martins     default:
747fb0fd2ceSJoao Martins         return false;
748fb0fd2ceSJoao Martins     }
749fb0fd2ceSJoao Martins 
750fb0fd2ceSJoao Martins     exit->u.hcall.result = err;
751fb0fd2ceSJoao Martins     return true;
752fb0fd2ceSJoao Martins }
753fb0fd2ceSJoao Martins 
7545dbcd01aSAnkur Arora static bool handle_set_param(struct kvm_xen_exit *exit, X86CPU *cpu,
7555dbcd01aSAnkur Arora                              uint64_t arg)
7565dbcd01aSAnkur Arora {
7575dbcd01aSAnkur Arora     CPUState *cs = CPU(cpu);
7585dbcd01aSAnkur Arora     struct xen_hvm_param hp;
7595dbcd01aSAnkur Arora     int err = 0;
7605dbcd01aSAnkur Arora 
7615dbcd01aSAnkur Arora     /* No need for 32/64 compat handling */
7625dbcd01aSAnkur Arora     qemu_build_assert(sizeof(hp) == 16);
7635dbcd01aSAnkur Arora 
7645dbcd01aSAnkur Arora     if (kvm_copy_from_gva(cs, arg, &hp, sizeof(hp))) {
7655dbcd01aSAnkur Arora         err = -EFAULT;
7665dbcd01aSAnkur Arora         goto out;
7675dbcd01aSAnkur Arora     }
7685dbcd01aSAnkur Arora 
7695dbcd01aSAnkur Arora     if (hp.domid != DOMID_SELF && hp.domid != xen_domid) {
7705dbcd01aSAnkur Arora         err = -ESRCH;
7715dbcd01aSAnkur Arora         goto out;
7725dbcd01aSAnkur Arora     }
7735dbcd01aSAnkur Arora 
7745dbcd01aSAnkur Arora     switch (hp.index) {
77591cce756SDavid Woodhouse     case HVM_PARAM_CALLBACK_IRQ:
776195801d7SStefan Hajnoczi         bql_lock();
77791cce756SDavid Woodhouse         err = xen_evtchn_set_callback_param(hp.value);
778195801d7SStefan Hajnoczi         bql_unlock();
77991cce756SDavid Woodhouse         xen_set_long_mode(exit->u.hcall.longmode);
78091cce756SDavid Woodhouse         break;
7815dbcd01aSAnkur Arora     default:
7825dbcd01aSAnkur Arora         return false;
7835dbcd01aSAnkur Arora     }
7845dbcd01aSAnkur Arora 
7855dbcd01aSAnkur Arora out:
7865dbcd01aSAnkur Arora     exit->u.hcall.result = err;
7875dbcd01aSAnkur Arora     return true;
7885dbcd01aSAnkur Arora }
7895dbcd01aSAnkur Arora 
790c6623cc3SJoao Martins static bool handle_get_param(struct kvm_xen_exit *exit, X86CPU *cpu,
791c6623cc3SJoao Martins                              uint64_t arg)
792c6623cc3SJoao Martins {
793c6623cc3SJoao Martins     CPUState *cs = CPU(cpu);
794c6623cc3SJoao Martins     struct xen_hvm_param hp;
795c6623cc3SJoao Martins     int err = 0;
796c6623cc3SJoao Martins 
797c6623cc3SJoao Martins     /* No need for 32/64 compat handling */
798c6623cc3SJoao Martins     qemu_build_assert(sizeof(hp) == 16);
799c6623cc3SJoao Martins 
800c6623cc3SJoao Martins     if (kvm_copy_from_gva(cs, arg, &hp, sizeof(hp))) {
801c6623cc3SJoao Martins         err = -EFAULT;
802c6623cc3SJoao Martins         goto out;
803c6623cc3SJoao Martins     }
804c6623cc3SJoao Martins 
805c6623cc3SJoao Martins     if (hp.domid != DOMID_SELF && hp.domid != xen_domid) {
806c6623cc3SJoao Martins         err = -ESRCH;
807c6623cc3SJoao Martins         goto out;
808c6623cc3SJoao Martins     }
809c6623cc3SJoao Martins 
810c6623cc3SJoao Martins     switch (hp.index) {
811c6623cc3SJoao Martins     case HVM_PARAM_STORE_PFN:
812c6623cc3SJoao Martins         hp.value = XEN_SPECIAL_PFN(XENSTORE);
813c6623cc3SJoao Martins         break;
814c08f5d0eSDavid Woodhouse     case HVM_PARAM_STORE_EVTCHN:
815c08f5d0eSDavid Woodhouse         hp.value = xen_xenstore_get_port();
816c08f5d0eSDavid Woodhouse         break;
817a72ccc7fSDavid Woodhouse     case HVM_PARAM_CONSOLE_PFN:
818a72ccc7fSDavid Woodhouse         hp.value = xen_primary_console_get_pfn();
819a72ccc7fSDavid Woodhouse         if (!hp.value) {
820a72ccc7fSDavid Woodhouse             err = -EINVAL;
821a72ccc7fSDavid Woodhouse         }
822a72ccc7fSDavid Woodhouse         break;
823a72ccc7fSDavid Woodhouse     case HVM_PARAM_CONSOLE_EVTCHN:
824a72ccc7fSDavid Woodhouse         hp.value = xen_primary_console_get_port();
825a72ccc7fSDavid Woodhouse         if (!hp.value) {
826a72ccc7fSDavid Woodhouse             err = -EINVAL;
827a72ccc7fSDavid Woodhouse         }
828a72ccc7fSDavid Woodhouse         break;
829c6623cc3SJoao Martins     default:
830c6623cc3SJoao Martins         return false;
831c6623cc3SJoao Martins     }
832c6623cc3SJoao Martins 
833a72ccc7fSDavid Woodhouse     if (!err && kvm_copy_to_gva(cs, arg, &hp, sizeof(hp))) {
834c6623cc3SJoao Martins         err = -EFAULT;
835c6623cc3SJoao Martins     }
836c6623cc3SJoao Martins out:
837c6623cc3SJoao Martins     exit->u.hcall.result = err;
838c6623cc3SJoao Martins     return true;
839c6623cc3SJoao Martins }
840c6623cc3SJoao Martins 
841105b47fdSAnkur Arora static int kvm_xen_hcall_evtchn_upcall_vector(struct kvm_xen_exit *exit,
842105b47fdSAnkur Arora                                               X86CPU *cpu, uint64_t arg)
843105b47fdSAnkur Arora {
844105b47fdSAnkur Arora     struct xen_hvm_evtchn_upcall_vector up;
845105b47fdSAnkur Arora     CPUState *target_cs;
846105b47fdSAnkur Arora 
847105b47fdSAnkur Arora     /* No need for 32/64 compat handling */
848105b47fdSAnkur Arora     qemu_build_assert(sizeof(up) == 8);
849105b47fdSAnkur Arora 
850105b47fdSAnkur Arora     if (kvm_copy_from_gva(CPU(cpu), arg, &up, sizeof(up))) {
851105b47fdSAnkur Arora         return -EFAULT;
852105b47fdSAnkur Arora     }
853105b47fdSAnkur Arora 
854105b47fdSAnkur Arora     if (up.vector < 0x10) {
855105b47fdSAnkur Arora         return -EINVAL;
856105b47fdSAnkur Arora     }
857105b47fdSAnkur Arora 
858105b47fdSAnkur Arora     target_cs = qemu_get_cpu(up.vcpu);
859105b47fdSAnkur Arora     if (!target_cs) {
860105b47fdSAnkur Arora         return -EINVAL;
861105b47fdSAnkur Arora     }
862105b47fdSAnkur Arora 
863105b47fdSAnkur Arora     async_run_on_cpu(target_cs, do_set_vcpu_callback_vector,
864105b47fdSAnkur Arora                      RUN_ON_CPU_HOST_INT(up.vector));
865105b47fdSAnkur Arora     return 0;
866105b47fdSAnkur Arora }
867105b47fdSAnkur Arora 
868671bfdcdSJoao Martins static bool kvm_xen_hcall_hvm_op(struct kvm_xen_exit *exit, X86CPU *cpu,
869671bfdcdSJoao Martins                                  int cmd, uint64_t arg)
870671bfdcdSJoao Martins {
871105b47fdSAnkur Arora     int ret = -ENOSYS;
872671bfdcdSJoao Martins     switch (cmd) {
873105b47fdSAnkur Arora     case HVMOP_set_evtchn_upcall_vector:
874e7dbb62fSDavid Woodhouse         ret = kvm_xen_hcall_evtchn_upcall_vector(exit, cpu, arg);
875105b47fdSAnkur Arora         break;
876105b47fdSAnkur Arora 
877671bfdcdSJoao Martins     case HVMOP_pagetable_dying:
878105b47fdSAnkur Arora         ret = -ENOSYS;
879105b47fdSAnkur Arora         break;
880671bfdcdSJoao Martins 
8815dbcd01aSAnkur Arora     case HVMOP_set_param:
8825dbcd01aSAnkur Arora         return handle_set_param(exit, cpu, arg);
8835dbcd01aSAnkur Arora 
884c6623cc3SJoao Martins     case HVMOP_get_param:
885c6623cc3SJoao Martins         return handle_get_param(exit, cpu, arg);
886c6623cc3SJoao Martins 
887671bfdcdSJoao Martins     default:
888671bfdcdSJoao Martins         return false;
889671bfdcdSJoao Martins     }
890105b47fdSAnkur Arora 
891105b47fdSAnkur Arora     exit->u.hcall.result = ret;
892105b47fdSAnkur Arora     return true;
893671bfdcdSJoao Martins }
894671bfdcdSJoao Martins 
895c345104cSJoao Martins static int vcpuop_register_vcpu_info(CPUState *cs, CPUState *target,
896c345104cSJoao Martins                                      uint64_t arg)
897c345104cSJoao Martins {
898c345104cSJoao Martins     struct vcpu_register_vcpu_info rvi;
899c345104cSJoao Martins     uint64_t gpa;
900c345104cSJoao Martins 
901c345104cSJoao Martins     /* No need for 32/64 compat handling */
902c345104cSJoao Martins     qemu_build_assert(sizeof(rvi) == 16);
903c345104cSJoao Martins     qemu_build_assert(sizeof(struct vcpu_info) == 64);
904c345104cSJoao Martins 
905c345104cSJoao Martins     if (!target) {
906c345104cSJoao Martins         return -ENOENT;
907c345104cSJoao Martins     }
908c345104cSJoao Martins 
909c345104cSJoao Martins     if (kvm_copy_from_gva(cs, arg, &rvi, sizeof(rvi))) {
910c345104cSJoao Martins         return -EFAULT;
911c345104cSJoao Martins     }
912c345104cSJoao Martins 
913c345104cSJoao Martins     if (rvi.offset > TARGET_PAGE_SIZE - sizeof(struct vcpu_info)) {
914c345104cSJoao Martins         return -EINVAL;
915c345104cSJoao Martins     }
916c345104cSJoao Martins 
917c345104cSJoao Martins     gpa = ((rvi.mfn << TARGET_PAGE_BITS) + rvi.offset);
918c345104cSJoao Martins     async_run_on_cpu(target, do_set_vcpu_info_gpa, RUN_ON_CPU_HOST_ULONG(gpa));
919c345104cSJoao Martins     return 0;
920c345104cSJoao Martins }
921c345104cSJoao Martins 
922f0689302SJoao Martins static int vcpuop_register_vcpu_time_info(CPUState *cs, CPUState *target,
923f0689302SJoao Martins                                           uint64_t arg)
924f0689302SJoao Martins {
925f0689302SJoao Martins     struct vcpu_register_time_memory_area tma;
926f0689302SJoao Martins     uint64_t gpa;
927f0689302SJoao Martins     size_t len;
928f0689302SJoao Martins 
929f0689302SJoao Martins     /* No need for 32/64 compat handling */
930f0689302SJoao Martins     qemu_build_assert(sizeof(tma) == 8);
931f0689302SJoao Martins     qemu_build_assert(sizeof(struct vcpu_time_info) == 32);
932f0689302SJoao Martins 
933f0689302SJoao Martins     if (!target) {
934f0689302SJoao Martins         return -ENOENT;
935f0689302SJoao Martins     }
936f0689302SJoao Martins 
937f0689302SJoao Martins     if (kvm_copy_from_gva(cs, arg, &tma, sizeof(tma))) {
938f0689302SJoao Martins         return -EFAULT;
939f0689302SJoao Martins     }
940f0689302SJoao Martins 
941f0689302SJoao Martins     /*
942f0689302SJoao Martins      * Xen actually uses the GVA and does the translation through the guest
943f0689302SJoao Martins      * page tables each time. But Linux/KVM uses the GPA, on the assumption
944f0689302SJoao Martins      * that guests only ever use *global* addresses (kernel virtual addresses)
945f0689302SJoao Martins      * for it. If Linux is changed to redo the GVA→GPA translation each time,
946f0689302SJoao Martins      * it will offer a new vCPU attribute for that, and we'll use it instead.
947f0689302SJoao Martins      */
948f0689302SJoao Martins     if (!kvm_gva_to_gpa(cs, tma.addr.p, &gpa, &len, false) ||
949f0689302SJoao Martins         len < sizeof(struct vcpu_time_info)) {
950f0689302SJoao Martins         return -EFAULT;
951f0689302SJoao Martins     }
952f0689302SJoao Martins 
953f0689302SJoao Martins     async_run_on_cpu(target, do_set_vcpu_time_info_gpa,
954f0689302SJoao Martins                      RUN_ON_CPU_HOST_ULONG(gpa));
955f0689302SJoao Martins     return 0;
956f0689302SJoao Martins }
957f0689302SJoao Martins 
9585092db87SJoao Martins static int vcpuop_register_runstate_info(CPUState *cs, CPUState *target,
9595092db87SJoao Martins                                          uint64_t arg)
9605092db87SJoao Martins {
9615092db87SJoao Martins     struct vcpu_register_runstate_memory_area rma;
9625092db87SJoao Martins     uint64_t gpa;
9635092db87SJoao Martins     size_t len;
9645092db87SJoao Martins 
9655092db87SJoao Martins     /* No need for 32/64 compat handling */
9665092db87SJoao Martins     qemu_build_assert(sizeof(rma) == 8);
9675092db87SJoao Martins     /* The runstate area actually does change size, but Linux copes. */
9685092db87SJoao Martins 
9695092db87SJoao Martins     if (!target) {
9705092db87SJoao Martins         return -ENOENT;
9715092db87SJoao Martins     }
9725092db87SJoao Martins 
9735092db87SJoao Martins     if (kvm_copy_from_gva(cs, arg, &rma, sizeof(rma))) {
9745092db87SJoao Martins         return -EFAULT;
9755092db87SJoao Martins     }
9765092db87SJoao Martins 
9775092db87SJoao Martins     /* As with vcpu_time_info, Xen actually uses the GVA but KVM doesn't. */
9785092db87SJoao Martins     if (!kvm_gva_to_gpa(cs, rma.addr.p, &gpa, &len, false)) {
9795092db87SJoao Martins         return -EFAULT;
9805092db87SJoao Martins     }
9815092db87SJoao Martins 
9825092db87SJoao Martins     async_run_on_cpu(target, do_set_vcpu_runstate_gpa,
9835092db87SJoao Martins                      RUN_ON_CPU_HOST_ULONG(gpa));
9845092db87SJoao Martins     return 0;
9855092db87SJoao Martins }
9865092db87SJoao Martins 
987b746a779SJoao Martins static uint64_t kvm_get_current_ns(void)
988b746a779SJoao Martins {
989b746a779SJoao Martins     struct kvm_clock_data data;
990b746a779SJoao Martins     int ret;
991b746a779SJoao Martins 
992b746a779SJoao Martins     ret = kvm_vm_ioctl(kvm_state, KVM_GET_CLOCK, &data);
993b746a779SJoao Martins     if (ret < 0) {
994b746a779SJoao Martins         fprintf(stderr, "KVM_GET_CLOCK failed: %s\n", strerror(ret));
995b746a779SJoao Martins                 abort();
996b746a779SJoao Martins     }
997b746a779SJoao Martins 
998b746a779SJoao Martins     return data.clock;
999b746a779SJoao Martins }
1000b746a779SJoao Martins 
1001b746a779SJoao Martins static void xen_vcpu_singleshot_timer_event(void *opaque)
1002b746a779SJoao Martins {
1003b746a779SJoao Martins     CPUState *cpu = opaque;
1004b746a779SJoao Martins     CPUX86State *env = &X86_CPU(cpu)->env;
1005b746a779SJoao Martins     uint16_t port = env->xen_virq[VIRQ_TIMER];
1006b746a779SJoao Martins 
1007b746a779SJoao Martins     if (likely(port)) {
1008b746a779SJoao Martins         xen_evtchn_set_port(port);
1009b746a779SJoao Martins     }
1010b746a779SJoao Martins 
1011b746a779SJoao Martins     qemu_mutex_lock(&env->xen_timers_lock);
1012b746a779SJoao Martins     env->xen_singleshot_timer_ns = 0;
1013b746a779SJoao Martins     qemu_mutex_unlock(&env->xen_timers_lock);
1014b746a779SJoao Martins }
1015b746a779SJoao Martins 
1016b746a779SJoao Martins static void xen_vcpu_periodic_timer_event(void *opaque)
1017b746a779SJoao Martins {
1018b746a779SJoao Martins     CPUState *cpu = opaque;
1019b746a779SJoao Martins     CPUX86State *env = &X86_CPU(cpu)->env;
1020b746a779SJoao Martins     uint16_t port = env->xen_virq[VIRQ_TIMER];
1021b746a779SJoao Martins     int64_t qemu_now;
1022b746a779SJoao Martins 
1023b746a779SJoao Martins     if (likely(port)) {
1024b746a779SJoao Martins         xen_evtchn_set_port(port);
1025b746a779SJoao Martins     }
1026b746a779SJoao Martins 
1027b746a779SJoao Martins     qemu_mutex_lock(&env->xen_timers_lock);
1028b746a779SJoao Martins 
1029b746a779SJoao Martins     qemu_now = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL);
1030b746a779SJoao Martins     timer_mod_ns(env->xen_periodic_timer,
1031b746a779SJoao Martins                  qemu_now + env->xen_periodic_timer_period);
1032b746a779SJoao Martins 
1033b746a779SJoao Martins     qemu_mutex_unlock(&env->xen_timers_lock);
1034b746a779SJoao Martins }
1035b746a779SJoao Martins 
1036b746a779SJoao Martins static int do_set_periodic_timer(CPUState *target, uint64_t period_ns)
1037b746a779SJoao Martins {
1038b746a779SJoao Martins     CPUX86State *tenv = &X86_CPU(target)->env;
1039b746a779SJoao Martins     int64_t qemu_now;
1040b746a779SJoao Martins 
1041b746a779SJoao Martins     timer_del(tenv->xen_periodic_timer);
1042b746a779SJoao Martins 
1043b746a779SJoao Martins     qemu_mutex_lock(&tenv->xen_timers_lock);
1044b746a779SJoao Martins 
1045b746a779SJoao Martins     qemu_now = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL);
1046b746a779SJoao Martins     timer_mod_ns(tenv->xen_periodic_timer, qemu_now + period_ns);
1047b746a779SJoao Martins     tenv->xen_periodic_timer_period = period_ns;
1048b746a779SJoao Martins 
1049b746a779SJoao Martins     qemu_mutex_unlock(&tenv->xen_timers_lock);
1050b746a779SJoao Martins     return 0;
1051b746a779SJoao Martins }
1052b746a779SJoao Martins 
1053b746a779SJoao Martins #define MILLISECS(_ms)  ((int64_t)((_ms) * 1000000ULL))
1054b746a779SJoao Martins #define MICROSECS(_us)  ((int64_t)((_us) * 1000ULL))
1055b746a779SJoao Martins #define STIME_MAX ((time_t)((int64_t)~0ull >> 1))
1056bad5cfcdSMichael Tokarev /* Chosen so (NOW() + delta) won't overflow without an uptime of 200 years */
1057b746a779SJoao Martins #define STIME_DELTA_MAX ((int64_t)((uint64_t)~0ull >> 2))
1058b746a779SJoao Martins 
1059b746a779SJoao Martins static int vcpuop_set_periodic_timer(CPUState *cs, CPUState *target,
1060b746a779SJoao Martins                                      uint64_t arg)
1061b746a779SJoao Martins {
1062b746a779SJoao Martins     struct vcpu_set_periodic_timer spt;
1063b746a779SJoao Martins 
1064b746a779SJoao Martins     qemu_build_assert(sizeof(spt) == 8);
1065b746a779SJoao Martins     if (kvm_copy_from_gva(cs, arg, &spt, sizeof(spt))) {
1066b746a779SJoao Martins         return -EFAULT;
1067b746a779SJoao Martins     }
1068b746a779SJoao Martins 
1069b746a779SJoao Martins     if (spt.period_ns < MILLISECS(1) || spt.period_ns > STIME_DELTA_MAX) {
1070b746a779SJoao Martins         return -EINVAL;
1071b746a779SJoao Martins     }
1072b746a779SJoao Martins 
1073b746a779SJoao Martins     return do_set_periodic_timer(target, spt.period_ns);
1074b746a779SJoao Martins }
1075b746a779SJoao Martins 
1076b746a779SJoao Martins static int vcpuop_stop_periodic_timer(CPUState *target)
1077b746a779SJoao Martins {
1078b746a779SJoao Martins     CPUX86State *tenv = &X86_CPU(target)->env;
1079b746a779SJoao Martins 
1080b746a779SJoao Martins     qemu_mutex_lock(&tenv->xen_timers_lock);
1081b746a779SJoao Martins 
1082b746a779SJoao Martins     timer_del(tenv->xen_periodic_timer);
1083b746a779SJoao Martins     tenv->xen_periodic_timer_period = 0;
1084b746a779SJoao Martins 
1085b746a779SJoao Martins     qemu_mutex_unlock(&tenv->xen_timers_lock);
1086b746a779SJoao Martins     return 0;
1087b746a779SJoao Martins }
1088b746a779SJoao Martins 
108919c417ecSDavid Woodhouse /*
109019c417ecSDavid Woodhouse  * Userspace handling of timer, for older kernels.
109119c417ecSDavid Woodhouse  * Must always be called with xen_timers_lock held.
109219c417ecSDavid Woodhouse  */
1093b746a779SJoao Martins static int do_set_singleshot_timer(CPUState *cs, uint64_t timeout_abs,
1094547c9757SDavid Woodhouse                                    bool linux_wa)
1095b746a779SJoao Martins {
1096b746a779SJoao Martins     CPUX86State *env = &X86_CPU(cs)->env;
1097b746a779SJoao Martins     int64_t now = kvm_get_current_ns();
1098b746a779SJoao Martins     int64_t qemu_now = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL);
1099b746a779SJoao Martins     int64_t delta = timeout_abs - now;
1100b746a779SJoao Martins 
1101b746a779SJoao Martins     if (linux_wa && unlikely((int64_t)timeout_abs < 0 ||
1102b746a779SJoao Martins                              (delta > 0 && (uint32_t)(delta >> 50) != 0))) {
1103b746a779SJoao Martins         /*
1104b746a779SJoao Martins          * Xen has a 'Linux workaround' in do_set_timer_op() which checks
1105b746a779SJoao Martins          * for negative absolute timeout values (caused by integer
1106b746a779SJoao Martins          * overflow), and for values about 13 days in the future (2^50ns)
1107b746a779SJoao Martins          * which would be caused by jiffies overflow. For those cases, it
1108b746a779SJoao Martins          * sets the timeout 100ms in the future (not *too* soon, since if
1109b746a779SJoao Martins          * a guest really did set a long timeout on purpose we don't want
1110b746a779SJoao Martins          * to keep churning CPU time by waking it up).
1111b746a779SJoao Martins          */
1112b746a779SJoao Martins         delta = (100 * SCALE_MS);
1113b746a779SJoao Martins         timeout_abs = now + delta;
1114b746a779SJoao Martins     }
1115b746a779SJoao Martins 
1116b746a779SJoao Martins     timer_mod_ns(env->xen_singleshot_timer, qemu_now + delta);
1117b746a779SJoao Martins     env->xen_singleshot_timer_ns = now + delta;
1118b746a779SJoao Martins     return 0;
1119b746a779SJoao Martins }
1120b746a779SJoao Martins 
1121b746a779SJoao Martins static int vcpuop_set_singleshot_timer(CPUState *cs, uint64_t arg)
1122b746a779SJoao Martins {
1123b746a779SJoao Martins     struct vcpu_set_singleshot_timer sst = { 0 };
1124b746a779SJoao Martins 
1125b746a779SJoao Martins     /*
1126b746a779SJoao Martins      * The struct is a uint64_t followed by a uint32_t. On 32-bit that
1127b746a779SJoao Martins      * makes it 12 bytes. On 64-bit it gets padded to 16. The parts
1128b746a779SJoao Martins      * that get used are identical, and there's four bytes of padding
1129b746a779SJoao Martins      * unused at the end. For true Xen compatibility we should attempt
1130b746a779SJoao Martins      * to copy the full 16 bytes from 64-bit guests, and return -EFAULT
1131b746a779SJoao Martins      * if we can't get the padding too. But that's daft. Just copy what
1132b746a779SJoao Martins      * we need.
1133b746a779SJoao Martins      */
1134b746a779SJoao Martins     qemu_build_assert(offsetof(struct vcpu_set_singleshot_timer, flags) == 8);
1135b746a779SJoao Martins     qemu_build_assert(sizeof(sst) >= 12);
1136b746a779SJoao Martins 
1137b746a779SJoao Martins     if (kvm_copy_from_gva(cs, arg, &sst, 12)) {
1138b746a779SJoao Martins         return -EFAULT;
1139b746a779SJoao Martins     }
1140b746a779SJoao Martins 
114119c417ecSDavid Woodhouse     QEMU_LOCK_GUARD(&X86_CPU(cs)->env.xen_timers_lock);
1142547c9757SDavid Woodhouse 
1143547c9757SDavid Woodhouse     /*
1144547c9757SDavid Woodhouse      * We ignore the VCPU_SSHOTTMR_future flag, just as Xen now does.
1145547c9757SDavid Woodhouse      * The only guest that ever used it, got it wrong.
1146547c9757SDavid Woodhouse      * https://xenbits.xen.org/gitweb/?p=xen.git;a=commitdiff;h=19c6cbd909
1147547c9757SDavid Woodhouse      */
1148547c9757SDavid Woodhouse     return do_set_singleshot_timer(cs, sst.timeout_abs_ns, false);
1149b746a779SJoao Martins }
1150b746a779SJoao Martins 
1151b746a779SJoao Martins static int vcpuop_stop_singleshot_timer(CPUState *cs)
1152b746a779SJoao Martins {
1153b746a779SJoao Martins     CPUX86State *env = &X86_CPU(cs)->env;
1154b746a779SJoao Martins 
1155b746a779SJoao Martins     qemu_mutex_lock(&env->xen_timers_lock);
1156b746a779SJoao Martins 
1157b746a779SJoao Martins     timer_del(env->xen_singleshot_timer);
1158b746a779SJoao Martins     env->xen_singleshot_timer_ns = 0;
1159b746a779SJoao Martins 
1160b746a779SJoao Martins     qemu_mutex_unlock(&env->xen_timers_lock);
1161b746a779SJoao Martins     return 0;
1162b746a779SJoao Martins }
1163b746a779SJoao Martins 
1164b746a779SJoao Martins static bool kvm_xen_hcall_set_timer_op(struct kvm_xen_exit *exit, X86CPU *cpu,
1165b746a779SJoao Martins                                        uint64_t timeout)
1166b746a779SJoao Martins {
1167b746a779SJoao Martins     int err;
1168b746a779SJoao Martins 
1169b746a779SJoao Martins     if (unlikely(timeout == 0)) {
1170b746a779SJoao Martins         err = vcpuop_stop_singleshot_timer(CPU(cpu));
1171b746a779SJoao Martins     } else {
117219c417ecSDavid Woodhouse         QEMU_LOCK_GUARD(&X86_CPU(cpu)->env.xen_timers_lock);
1173547c9757SDavid Woodhouse         err = do_set_singleshot_timer(CPU(cpu), timeout, true);
1174b746a779SJoao Martins     }
1175b746a779SJoao Martins     exit->u.hcall.result = err;
1176b746a779SJoao Martins     return true;
1177b746a779SJoao Martins }
1178b746a779SJoao Martins 
1179d70bd6a4SJoao Martins static bool kvm_xen_hcall_vcpu_op(struct kvm_xen_exit *exit, X86CPU *cpu,
1180d70bd6a4SJoao Martins                                   int cmd, int vcpu_id, uint64_t arg)
1181d70bd6a4SJoao Martins {
1182c345104cSJoao Martins     CPUState *cs = CPU(cpu);
1183b746a779SJoao Martins     CPUState *dest = cs->cpu_index == vcpu_id ? cs : qemu_get_cpu(vcpu_id);
1184d70bd6a4SJoao Martins     int err;
1185d70bd6a4SJoao Martins 
1186b746a779SJoao Martins     if (!dest) {
1187b746a779SJoao Martins         err = -ENOENT;
1188b746a779SJoao Martins         goto out;
1189b746a779SJoao Martins     }
1190b746a779SJoao Martins 
1191d70bd6a4SJoao Martins     switch (cmd) {
11925092db87SJoao Martins     case VCPUOP_register_runstate_memory_area:
11935092db87SJoao Martins         err = vcpuop_register_runstate_info(cs, dest, arg);
11945092db87SJoao Martins         break;
1195f0689302SJoao Martins     case VCPUOP_register_vcpu_time_memory_area:
1196f0689302SJoao Martins         err = vcpuop_register_vcpu_time_info(cs, dest, arg);
1197f0689302SJoao Martins         break;
1198d70bd6a4SJoao Martins     case VCPUOP_register_vcpu_info:
1199c345104cSJoao Martins         err = vcpuop_register_vcpu_info(cs, dest, arg);
1200d70bd6a4SJoao Martins         break;
1201b746a779SJoao Martins     case VCPUOP_set_singleshot_timer: {
1202b746a779SJoao Martins         if (cs->cpu_index == vcpu_id) {
1203b746a779SJoao Martins             err = vcpuop_set_singleshot_timer(dest, arg);
1204b746a779SJoao Martins         } else {
1205b746a779SJoao Martins             err = -EINVAL;
1206b746a779SJoao Martins         }
1207b746a779SJoao Martins         break;
1208b746a779SJoao Martins     }
1209b746a779SJoao Martins     case VCPUOP_stop_singleshot_timer:
1210b746a779SJoao Martins         if (cs->cpu_index == vcpu_id) {
1211b746a779SJoao Martins             err = vcpuop_stop_singleshot_timer(dest);
1212b746a779SJoao Martins         } else {
1213b746a779SJoao Martins             err = -EINVAL;
1214b746a779SJoao Martins         }
1215b746a779SJoao Martins         break;
1216b746a779SJoao Martins     case VCPUOP_set_periodic_timer: {
1217b746a779SJoao Martins         err = vcpuop_set_periodic_timer(cs, dest, arg);
1218b746a779SJoao Martins         break;
1219b746a779SJoao Martins     }
1220b746a779SJoao Martins     case VCPUOP_stop_periodic_timer:
1221b746a779SJoao Martins         err = vcpuop_stop_periodic_timer(dest);
1222b746a779SJoao Martins         break;
1223d70bd6a4SJoao Martins 
1224d70bd6a4SJoao Martins     default:
1225d70bd6a4SJoao Martins         return false;
1226d70bd6a4SJoao Martins     }
1227d70bd6a4SJoao Martins 
1228b746a779SJoao Martins  out:
1229d70bd6a4SJoao Martins     exit->u.hcall.result = err;
1230d70bd6a4SJoao Martins     return true;
1231d70bd6a4SJoao Martins }
1232d70bd6a4SJoao Martins 
12334858ba20SDavid Woodhouse static bool kvm_xen_hcall_evtchn_op(struct kvm_xen_exit *exit, X86CPU *cpu,
12343b06f29bSJoao Martins                                     int cmd, uint64_t arg)
12353b06f29bSJoao Martins {
12364858ba20SDavid Woodhouse     CPUState *cs = CPU(cpu);
12373b06f29bSJoao Martins     int err = -ENOSYS;
12383b06f29bSJoao Martins 
12393b06f29bSJoao Martins     switch (cmd) {
12403b06f29bSJoao Martins     case EVTCHNOP_init_control:
12413b06f29bSJoao Martins     case EVTCHNOP_expand_array:
12423b06f29bSJoao Martins     case EVTCHNOP_set_priority:
12433b06f29bSJoao Martins         /* We do not support FIFO channels at this point */
12443b06f29bSJoao Martins         err = -ENOSYS;
12453b06f29bSJoao Martins         break;
12463b06f29bSJoao Martins 
12474858ba20SDavid Woodhouse     case EVTCHNOP_status: {
12484858ba20SDavid Woodhouse         struct evtchn_status status;
12494858ba20SDavid Woodhouse 
12504858ba20SDavid Woodhouse         qemu_build_assert(sizeof(status) == 24);
12514858ba20SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &status, sizeof(status))) {
12524858ba20SDavid Woodhouse             err = -EFAULT;
12534858ba20SDavid Woodhouse             break;
12544858ba20SDavid Woodhouse         }
12554858ba20SDavid Woodhouse 
12564858ba20SDavid Woodhouse         err = xen_evtchn_status_op(&status);
12574858ba20SDavid Woodhouse         if (!err && kvm_copy_to_gva(cs, arg, &status, sizeof(status))) {
12584858ba20SDavid Woodhouse             err = -EFAULT;
12594858ba20SDavid Woodhouse         }
12604858ba20SDavid Woodhouse         break;
12614858ba20SDavid Woodhouse     }
126283eb5811SDavid Woodhouse     case EVTCHNOP_close: {
126383eb5811SDavid Woodhouse         struct evtchn_close close;
126483eb5811SDavid Woodhouse 
126583eb5811SDavid Woodhouse         qemu_build_assert(sizeof(close) == 4);
126683eb5811SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &close, sizeof(close))) {
126783eb5811SDavid Woodhouse             err = -EFAULT;
126883eb5811SDavid Woodhouse             break;
126983eb5811SDavid Woodhouse         }
127083eb5811SDavid Woodhouse 
127183eb5811SDavid Woodhouse         err = xen_evtchn_close_op(&close);
127283eb5811SDavid Woodhouse         break;
127383eb5811SDavid Woodhouse     }
1274190cc3c0SDavid Woodhouse     case EVTCHNOP_unmask: {
1275190cc3c0SDavid Woodhouse         struct evtchn_unmask unmask;
1276190cc3c0SDavid Woodhouse 
1277190cc3c0SDavid Woodhouse         qemu_build_assert(sizeof(unmask) == 4);
1278190cc3c0SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &unmask, sizeof(unmask))) {
1279190cc3c0SDavid Woodhouse             err = -EFAULT;
1280190cc3c0SDavid Woodhouse             break;
1281190cc3c0SDavid Woodhouse         }
1282190cc3c0SDavid Woodhouse 
1283190cc3c0SDavid Woodhouse         err = xen_evtchn_unmask_op(&unmask);
1284190cc3c0SDavid Woodhouse         break;
1285190cc3c0SDavid Woodhouse     }
1286c723d4c1SDavid Woodhouse     case EVTCHNOP_bind_virq: {
1287c723d4c1SDavid Woodhouse         struct evtchn_bind_virq virq;
1288c723d4c1SDavid Woodhouse 
1289c723d4c1SDavid Woodhouse         qemu_build_assert(sizeof(virq) == 12);
1290c723d4c1SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &virq, sizeof(virq))) {
1291c723d4c1SDavid Woodhouse             err = -EFAULT;
1292c723d4c1SDavid Woodhouse             break;
1293c723d4c1SDavid Woodhouse         }
1294c723d4c1SDavid Woodhouse 
1295c723d4c1SDavid Woodhouse         err = xen_evtchn_bind_virq_op(&virq);
1296c723d4c1SDavid Woodhouse         if (!err && kvm_copy_to_gva(cs, arg, &virq, sizeof(virq))) {
1297c723d4c1SDavid Woodhouse             err = -EFAULT;
1298c723d4c1SDavid Woodhouse         }
1299c723d4c1SDavid Woodhouse         break;
1300c723d4c1SDavid Woodhouse     }
1301aa98ee38SDavid Woodhouse     case EVTCHNOP_bind_pirq: {
1302aa98ee38SDavid Woodhouse         struct evtchn_bind_pirq pirq;
1303aa98ee38SDavid Woodhouse 
1304aa98ee38SDavid Woodhouse         qemu_build_assert(sizeof(pirq) == 12);
1305aa98ee38SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &pirq, sizeof(pirq))) {
1306aa98ee38SDavid Woodhouse             err = -EFAULT;
1307aa98ee38SDavid Woodhouse             break;
1308aa98ee38SDavid Woodhouse         }
1309aa98ee38SDavid Woodhouse 
1310aa98ee38SDavid Woodhouse         err = xen_evtchn_bind_pirq_op(&pirq);
1311aa98ee38SDavid Woodhouse         if (!err && kvm_copy_to_gva(cs, arg, &pirq, sizeof(pirq))) {
1312aa98ee38SDavid Woodhouse             err = -EFAULT;
1313aa98ee38SDavid Woodhouse         }
1314aa98ee38SDavid Woodhouse         break;
1315aa98ee38SDavid Woodhouse     }
1316f5417856SDavid Woodhouse     case EVTCHNOP_bind_ipi: {
1317f5417856SDavid Woodhouse         struct evtchn_bind_ipi ipi;
1318f5417856SDavid Woodhouse 
1319f5417856SDavid Woodhouse         qemu_build_assert(sizeof(ipi) == 8);
1320f5417856SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &ipi, sizeof(ipi))) {
1321f5417856SDavid Woodhouse             err = -EFAULT;
1322f5417856SDavid Woodhouse             break;
1323f5417856SDavid Woodhouse         }
1324f5417856SDavid Woodhouse 
1325f5417856SDavid Woodhouse         err = xen_evtchn_bind_ipi_op(&ipi);
1326f5417856SDavid Woodhouse         if (!err && kvm_copy_to_gva(cs, arg, &ipi, sizeof(ipi))) {
1327f5417856SDavid Woodhouse             err = -EFAULT;
1328f5417856SDavid Woodhouse         }
1329f5417856SDavid Woodhouse         break;
1330f5417856SDavid Woodhouse     }
1331cf7679abSDavid Woodhouse     case EVTCHNOP_send: {
1332cf7679abSDavid Woodhouse         struct evtchn_send send;
1333cf7679abSDavid Woodhouse 
1334cf7679abSDavid Woodhouse         qemu_build_assert(sizeof(send) == 4);
1335cf7679abSDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &send, sizeof(send))) {
1336cf7679abSDavid Woodhouse             err = -EFAULT;
1337cf7679abSDavid Woodhouse             break;
1338cf7679abSDavid Woodhouse         }
1339cf7679abSDavid Woodhouse 
1340cf7679abSDavid Woodhouse         err = xen_evtchn_send_op(&send);
1341cf7679abSDavid Woodhouse         break;
1342cf7679abSDavid Woodhouse     }
1343e1db61b8SDavid Woodhouse     case EVTCHNOP_alloc_unbound: {
1344e1db61b8SDavid Woodhouse         struct evtchn_alloc_unbound alloc;
1345e1db61b8SDavid Woodhouse 
1346e1db61b8SDavid Woodhouse         qemu_build_assert(sizeof(alloc) == 8);
1347e1db61b8SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &alloc, sizeof(alloc))) {
1348e1db61b8SDavid Woodhouse             err = -EFAULT;
1349e1db61b8SDavid Woodhouse             break;
1350e1db61b8SDavid Woodhouse         }
1351e1db61b8SDavid Woodhouse 
1352e1db61b8SDavid Woodhouse         err = xen_evtchn_alloc_unbound_op(&alloc);
1353e1db61b8SDavid Woodhouse         if (!err && kvm_copy_to_gva(cs, arg, &alloc, sizeof(alloc))) {
1354e1db61b8SDavid Woodhouse             err = -EFAULT;
1355e1db61b8SDavid Woodhouse         }
1356e1db61b8SDavid Woodhouse         break;
1357e1db61b8SDavid Woodhouse     }
135884327881SDavid Woodhouse     case EVTCHNOP_bind_interdomain: {
135984327881SDavid Woodhouse         struct evtchn_bind_interdomain interdomain;
136084327881SDavid Woodhouse 
136184327881SDavid Woodhouse         qemu_build_assert(sizeof(interdomain) == 12);
136284327881SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &interdomain, sizeof(interdomain))) {
136384327881SDavid Woodhouse             err = -EFAULT;
136484327881SDavid Woodhouse             break;
136584327881SDavid Woodhouse         }
136684327881SDavid Woodhouse 
136784327881SDavid Woodhouse         err = xen_evtchn_bind_interdomain_op(&interdomain);
136884327881SDavid Woodhouse         if (!err &&
136984327881SDavid Woodhouse             kvm_copy_to_gva(cs, arg, &interdomain, sizeof(interdomain))) {
137084327881SDavid Woodhouse             err = -EFAULT;
137184327881SDavid Woodhouse         }
137284327881SDavid Woodhouse         break;
137384327881SDavid Woodhouse     }
137430667046SDavid Woodhouse     case EVTCHNOP_bind_vcpu: {
137530667046SDavid Woodhouse         struct evtchn_bind_vcpu vcpu;
137630667046SDavid Woodhouse 
137730667046SDavid Woodhouse         qemu_build_assert(sizeof(vcpu) == 8);
137830667046SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &vcpu, sizeof(vcpu))) {
137930667046SDavid Woodhouse             err = -EFAULT;
138030667046SDavid Woodhouse             break;
138130667046SDavid Woodhouse         }
138230667046SDavid Woodhouse 
138330667046SDavid Woodhouse         err = xen_evtchn_bind_vcpu_op(&vcpu);
138430667046SDavid Woodhouse         break;
138530667046SDavid Woodhouse     }
1386a15b1097SDavid Woodhouse     case EVTCHNOP_reset: {
1387a15b1097SDavid Woodhouse         struct evtchn_reset reset;
1388a15b1097SDavid Woodhouse 
1389a15b1097SDavid Woodhouse         qemu_build_assert(sizeof(reset) == 2);
1390a15b1097SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &reset, sizeof(reset))) {
1391a15b1097SDavid Woodhouse             err = -EFAULT;
1392a15b1097SDavid Woodhouse             break;
1393a15b1097SDavid Woodhouse         }
1394a15b1097SDavid Woodhouse 
1395a15b1097SDavid Woodhouse         err = xen_evtchn_reset_op(&reset);
1396a15b1097SDavid Woodhouse         break;
1397a15b1097SDavid Woodhouse     }
13983b06f29bSJoao Martins     default:
13993b06f29bSJoao Martins         return false;
14003b06f29bSJoao Martins     }
14013b06f29bSJoao Martins 
14023b06f29bSJoao Martins     exit->u.hcall.result = err;
14033b06f29bSJoao Martins     return true;
14043b06f29bSJoao Martins }
14053b06f29bSJoao Martins 
140679b7067dSJoao Martins int kvm_xen_soft_reset(void)
140779b7067dSJoao Martins {
1408c345104cSJoao Martins     CPUState *cpu;
1409fb0fd2ceSJoao Martins     int err;
1410fb0fd2ceSJoao Martins 
1411195801d7SStefan Hajnoczi     assert(bql_locked());
141279b7067dSJoao Martins 
141379b7067dSJoao Martins     trace_kvm_xen_soft_reset();
141479b7067dSJoao Martins 
1415a15b1097SDavid Woodhouse     err = xen_evtchn_soft_reset();
1416a15b1097SDavid Woodhouse     if (err) {
1417a15b1097SDavid Woodhouse         return err;
1418a15b1097SDavid Woodhouse     }
1419a15b1097SDavid Woodhouse 
142091cce756SDavid Woodhouse     /*
142191cce756SDavid Woodhouse      * Zero is the reset/startup state for HVM_PARAM_CALLBACK_IRQ. Strictly,
142291cce756SDavid Woodhouse      * it maps to HVM_PARAM_CALLBACK_TYPE_GSI with GSI#0, but Xen refuses to
142391cce756SDavid Woodhouse      * to deliver to the timer interrupt and treats that as 'disabled'.
142491cce756SDavid Woodhouse      */
142591cce756SDavid Woodhouse     err = xen_evtchn_set_callback_param(0);
142691cce756SDavid Woodhouse     if (err) {
142791cce756SDavid Woodhouse         return err;
142891cce756SDavid Woodhouse     }
142991cce756SDavid Woodhouse 
1430c345104cSJoao Martins     CPU_FOREACH(cpu) {
1431c345104cSJoao Martins         async_run_on_cpu(cpu, do_vcpu_soft_reset, RUN_ON_CPU_NULL);
1432c345104cSJoao Martins     }
1433c345104cSJoao Martins 
1434fb0fd2ceSJoao Martins     err = xen_overlay_map_shinfo_page(INVALID_GFN);
1435fb0fd2ceSJoao Martins     if (err) {
1436fb0fd2ceSJoao Martins         return err;
1437fb0fd2ceSJoao Martins     }
1438fb0fd2ceSJoao Martins 
1439de26b261SDavid Woodhouse     err = xen_gnttab_reset();
1440de26b261SDavid Woodhouse     if (err) {
1441de26b261SDavid Woodhouse         return err;
1442de26b261SDavid Woodhouse     }
1443de26b261SDavid Woodhouse 
1444a72ccc7fSDavid Woodhouse     err = xen_primary_console_reset();
1445a72ccc7fSDavid Woodhouse     if (err) {
1446a72ccc7fSDavid Woodhouse         return err;
1447a72ccc7fSDavid Woodhouse     }
1448a72ccc7fSDavid Woodhouse 
1449c08f5d0eSDavid Woodhouse     err = xen_xenstore_reset();
1450c08f5d0eSDavid Woodhouse     if (err) {
1451c08f5d0eSDavid Woodhouse         return err;
1452c08f5d0eSDavid Woodhouse     }
1453c08f5d0eSDavid Woodhouse 
145479b7067dSJoao Martins     return 0;
145579b7067dSJoao Martins }
145679b7067dSJoao Martins 
145779b7067dSJoao Martins static int schedop_shutdown(CPUState *cs, uint64_t arg)
145879b7067dSJoao Martins {
145979b7067dSJoao Martins     struct sched_shutdown shutdown;
146079b7067dSJoao Martins     int ret = 0;
146179b7067dSJoao Martins 
146279b7067dSJoao Martins     /* No need for 32/64 compat handling */
146379b7067dSJoao Martins     qemu_build_assert(sizeof(shutdown) == 4);
146479b7067dSJoao Martins 
146579b7067dSJoao Martins     if (kvm_copy_from_gva(cs, arg, &shutdown, sizeof(shutdown))) {
146679b7067dSJoao Martins         return -EFAULT;
146779b7067dSJoao Martins     }
146879b7067dSJoao Martins 
146979b7067dSJoao Martins     switch (shutdown.reason) {
147079b7067dSJoao Martins     case SHUTDOWN_crash:
147179b7067dSJoao Martins         cpu_dump_state(cs, stderr, CPU_DUMP_CODE);
147279b7067dSJoao Martins         qemu_system_guest_panicked(NULL);
147379b7067dSJoao Martins         break;
147479b7067dSJoao Martins 
147579b7067dSJoao Martins     case SHUTDOWN_reboot:
147679b7067dSJoao Martins         qemu_system_reset_request(SHUTDOWN_CAUSE_GUEST_RESET);
147779b7067dSJoao Martins         break;
147879b7067dSJoao Martins 
147979b7067dSJoao Martins     case SHUTDOWN_poweroff:
148079b7067dSJoao Martins         qemu_system_shutdown_request(SHUTDOWN_CAUSE_GUEST_SHUTDOWN);
148179b7067dSJoao Martins         break;
148279b7067dSJoao Martins 
148379b7067dSJoao Martins     case SHUTDOWN_soft_reset:
1484195801d7SStefan Hajnoczi         bql_lock();
148579b7067dSJoao Martins         ret = kvm_xen_soft_reset();
1486195801d7SStefan Hajnoczi         bql_unlock();
148779b7067dSJoao Martins         break;
148879b7067dSJoao Martins 
148979b7067dSJoao Martins     default:
149079b7067dSJoao Martins         ret = -EINVAL;
149179b7067dSJoao Martins         break;
149279b7067dSJoao Martins     }
149379b7067dSJoao Martins 
149479b7067dSJoao Martins     return ret;
149579b7067dSJoao Martins }
149679b7067dSJoao Martins 
149779b7067dSJoao Martins static bool kvm_xen_hcall_sched_op(struct kvm_xen_exit *exit, X86CPU *cpu,
149879b7067dSJoao Martins                                    int cmd, uint64_t arg)
149979b7067dSJoao Martins {
150079b7067dSJoao Martins     CPUState *cs = CPU(cpu);
150179b7067dSJoao Martins     int err = -ENOSYS;
150279b7067dSJoao Martins 
150379b7067dSJoao Martins     switch (cmd) {
150479b7067dSJoao Martins     case SCHEDOP_shutdown:
150579b7067dSJoao Martins         err = schedop_shutdown(cs, arg);
150679b7067dSJoao Martins         break;
150779b7067dSJoao Martins 
1508c789b9efSDavid Woodhouse     case SCHEDOP_poll:
1509c789b9efSDavid Woodhouse         /*
1510c789b9efSDavid Woodhouse          * Linux will panic if this doesn't work. Just yield; it's not
1511c789b9efSDavid Woodhouse          * worth overthinking it because with event channel handling
1512c789b9efSDavid Woodhouse          * in KVM, the kernel will intercept this and it will never
1513c789b9efSDavid Woodhouse          * reach QEMU anyway. The semantics of the hypercall explicltly
1514c789b9efSDavid Woodhouse          * permit spurious wakeups.
1515c789b9efSDavid Woodhouse          */
1516c789b9efSDavid Woodhouse     case SCHEDOP_yield:
1517c789b9efSDavid Woodhouse         sched_yield();
1518c789b9efSDavid Woodhouse         err = 0;
1519c789b9efSDavid Woodhouse         break;
1520c789b9efSDavid Woodhouse 
152179b7067dSJoao Martins     default:
152279b7067dSJoao Martins         return false;
152379b7067dSJoao Martins     }
152479b7067dSJoao Martins 
152579b7067dSJoao Martins     exit->u.hcall.result = err;
152679b7067dSJoao Martins     return true;
152779b7067dSJoao Martins }
152879b7067dSJoao Martins 
152928b7ae94SDavid Woodhouse static bool kvm_xen_hcall_gnttab_op(struct kvm_xen_exit *exit, X86CPU *cpu,
153028b7ae94SDavid Woodhouse                                     int cmd, uint64_t arg, int count)
153128b7ae94SDavid Woodhouse {
153228b7ae94SDavid Woodhouse     CPUState *cs = CPU(cpu);
153328b7ae94SDavid Woodhouse     int err;
153428b7ae94SDavid Woodhouse 
153528b7ae94SDavid Woodhouse     switch (cmd) {
153628b7ae94SDavid Woodhouse     case GNTTABOP_set_version: {
153728b7ae94SDavid Woodhouse         struct gnttab_set_version set;
153828b7ae94SDavid Woodhouse 
153928b7ae94SDavid Woodhouse         qemu_build_assert(sizeof(set) == 4);
154028b7ae94SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &set, sizeof(set))) {
154128b7ae94SDavid Woodhouse             err = -EFAULT;
154228b7ae94SDavid Woodhouse             break;
154328b7ae94SDavid Woodhouse         }
154428b7ae94SDavid Woodhouse 
154528b7ae94SDavid Woodhouse         err = xen_gnttab_set_version_op(&set);
154628b7ae94SDavid Woodhouse         if (!err && kvm_copy_to_gva(cs, arg, &set, sizeof(set))) {
154728b7ae94SDavid Woodhouse             err = -EFAULT;
154828b7ae94SDavid Woodhouse         }
154928b7ae94SDavid Woodhouse         break;
155028b7ae94SDavid Woodhouse     }
155128b7ae94SDavid Woodhouse     case GNTTABOP_get_version: {
155228b7ae94SDavid Woodhouse         struct gnttab_get_version get;
155328b7ae94SDavid Woodhouse 
155428b7ae94SDavid Woodhouse         qemu_build_assert(sizeof(get) == 8);
155528b7ae94SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &get, sizeof(get))) {
155628b7ae94SDavid Woodhouse             err = -EFAULT;
155728b7ae94SDavid Woodhouse             break;
155828b7ae94SDavid Woodhouse         }
155928b7ae94SDavid Woodhouse 
156028b7ae94SDavid Woodhouse         err = xen_gnttab_get_version_op(&get);
156128b7ae94SDavid Woodhouse         if (!err && kvm_copy_to_gva(cs, arg, &get, sizeof(get))) {
156228b7ae94SDavid Woodhouse             err = -EFAULT;
156328b7ae94SDavid Woodhouse         }
156428b7ae94SDavid Woodhouse         break;
156528b7ae94SDavid Woodhouse     }
1566b46f9745SDavid Woodhouse     case GNTTABOP_query_size: {
1567b46f9745SDavid Woodhouse         struct gnttab_query_size size;
1568b46f9745SDavid Woodhouse 
1569b46f9745SDavid Woodhouse         qemu_build_assert(sizeof(size) == 16);
1570b46f9745SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &size, sizeof(size))) {
1571b46f9745SDavid Woodhouse             err = -EFAULT;
1572b46f9745SDavid Woodhouse             break;
1573b46f9745SDavid Woodhouse         }
1574b46f9745SDavid Woodhouse 
1575b46f9745SDavid Woodhouse         err = xen_gnttab_query_size_op(&size);
1576b46f9745SDavid Woodhouse         if (!err && kvm_copy_to_gva(cs, arg, &size, sizeof(size))) {
1577b46f9745SDavid Woodhouse             err = -EFAULT;
1578b46f9745SDavid Woodhouse         }
1579b46f9745SDavid Woodhouse         break;
1580b46f9745SDavid Woodhouse     }
158128b7ae94SDavid Woodhouse     case GNTTABOP_setup_table:
158228b7ae94SDavid Woodhouse     case GNTTABOP_copy:
158328b7ae94SDavid Woodhouse     case GNTTABOP_map_grant_ref:
158428b7ae94SDavid Woodhouse     case GNTTABOP_unmap_grant_ref:
158528b7ae94SDavid Woodhouse     case GNTTABOP_swap_grant_ref:
158628b7ae94SDavid Woodhouse         return false;
158728b7ae94SDavid Woodhouse 
158828b7ae94SDavid Woodhouse     default:
158928b7ae94SDavid Woodhouse         /* Xen explicitly returns -ENOSYS to HVM guests for all others */
159028b7ae94SDavid Woodhouse         err = -ENOSYS;
159128b7ae94SDavid Woodhouse         break;
159228b7ae94SDavid Woodhouse     }
159328b7ae94SDavid Woodhouse 
159428b7ae94SDavid Woodhouse     exit->u.hcall.result = err;
159528b7ae94SDavid Woodhouse     return true;
159628b7ae94SDavid Woodhouse }
159728b7ae94SDavid Woodhouse 
1598799c2354SDavid Woodhouse static bool kvm_xen_hcall_physdev_op(struct kvm_xen_exit *exit, X86CPU *cpu,
1599799c2354SDavid Woodhouse                                      int cmd, uint64_t arg)
1600799c2354SDavid Woodhouse {
1601799c2354SDavid Woodhouse     CPUState *cs = CPU(cpu);
1602799c2354SDavid Woodhouse     int err;
1603799c2354SDavid Woodhouse 
1604799c2354SDavid Woodhouse     switch (cmd) {
1605799c2354SDavid Woodhouse     case PHYSDEVOP_map_pirq: {
1606799c2354SDavid Woodhouse         struct physdev_map_pirq map;
1607799c2354SDavid Woodhouse 
1608799c2354SDavid Woodhouse         if (hypercall_compat32(exit->u.hcall.longmode)) {
1609799c2354SDavid Woodhouse             struct compat_physdev_map_pirq *map32 = (void *)&map;
1610799c2354SDavid Woodhouse 
1611799c2354SDavid Woodhouse             if (kvm_copy_from_gva(cs, arg, map32, sizeof(*map32))) {
1612799c2354SDavid Woodhouse                 return -EFAULT;
1613799c2354SDavid Woodhouse             }
1614799c2354SDavid Woodhouse 
1615799c2354SDavid Woodhouse             /*
1616799c2354SDavid Woodhouse              * The only thing that's different is the alignment of the
1617799c2354SDavid Woodhouse              * uint64_t table_base at the end, which gets padding to make
1618799c2354SDavid Woodhouse              * it 64-bit aligned in the 64-bit version.
1619799c2354SDavid Woodhouse              */
1620799c2354SDavid Woodhouse             qemu_build_assert(sizeof(*map32) == 36);
1621799c2354SDavid Woodhouse             qemu_build_assert(offsetof(struct physdev_map_pirq, entry_nr) ==
1622799c2354SDavid Woodhouse                               offsetof(struct compat_physdev_map_pirq, entry_nr));
1623799c2354SDavid Woodhouse             memmove(&map.table_base, &map32->table_base, sizeof(map.table_base));
1624799c2354SDavid Woodhouse         } else {
1625799c2354SDavid Woodhouse             if (kvm_copy_from_gva(cs, arg, &map, sizeof(map))) {
1626799c2354SDavid Woodhouse                 err = -EFAULT;
1627799c2354SDavid Woodhouse                 break;
1628799c2354SDavid Woodhouse             }
1629799c2354SDavid Woodhouse         }
1630799c2354SDavid Woodhouse         err = xen_physdev_map_pirq(&map);
1631799c2354SDavid Woodhouse         /*
1632799c2354SDavid Woodhouse          * Since table_base is an IN parameter and won't be changed, just
1633799c2354SDavid Woodhouse          * copy the size of the compat structure back to the guest.
1634799c2354SDavid Woodhouse          */
1635799c2354SDavid Woodhouse         if (!err && kvm_copy_to_gva(cs, arg, &map,
1636799c2354SDavid Woodhouse                                     sizeof(struct compat_physdev_map_pirq))) {
1637799c2354SDavid Woodhouse             err = -EFAULT;
1638799c2354SDavid Woodhouse         }
1639799c2354SDavid Woodhouse         break;
1640799c2354SDavid Woodhouse     }
1641799c2354SDavid Woodhouse     case PHYSDEVOP_unmap_pirq: {
1642799c2354SDavid Woodhouse         struct physdev_unmap_pirq unmap;
1643799c2354SDavid Woodhouse 
1644799c2354SDavid Woodhouse         qemu_build_assert(sizeof(unmap) == 8);
1645799c2354SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &unmap, sizeof(unmap))) {
1646799c2354SDavid Woodhouse             err = -EFAULT;
1647799c2354SDavid Woodhouse             break;
1648799c2354SDavid Woodhouse         }
1649799c2354SDavid Woodhouse 
1650799c2354SDavid Woodhouse         err = xen_physdev_unmap_pirq(&unmap);
1651799c2354SDavid Woodhouse         if (!err && kvm_copy_to_gva(cs, arg, &unmap, sizeof(unmap))) {
1652799c2354SDavid Woodhouse             err = -EFAULT;
1653799c2354SDavid Woodhouse         }
1654799c2354SDavid Woodhouse         break;
1655799c2354SDavid Woodhouse     }
1656799c2354SDavid Woodhouse     case PHYSDEVOP_eoi: {
1657799c2354SDavid Woodhouse         struct physdev_eoi eoi;
1658799c2354SDavid Woodhouse 
1659799c2354SDavid Woodhouse         qemu_build_assert(sizeof(eoi) == 4);
1660799c2354SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &eoi, sizeof(eoi))) {
1661799c2354SDavid Woodhouse             err = -EFAULT;
1662799c2354SDavid Woodhouse             break;
1663799c2354SDavid Woodhouse         }
1664799c2354SDavid Woodhouse 
1665799c2354SDavid Woodhouse         err = xen_physdev_eoi_pirq(&eoi);
1666799c2354SDavid Woodhouse         if (!err && kvm_copy_to_gva(cs, arg, &eoi, sizeof(eoi))) {
1667799c2354SDavid Woodhouse             err = -EFAULT;
1668799c2354SDavid Woodhouse         }
1669799c2354SDavid Woodhouse         break;
1670799c2354SDavid Woodhouse     }
1671799c2354SDavid Woodhouse     case PHYSDEVOP_irq_status_query: {
1672799c2354SDavid Woodhouse         struct physdev_irq_status_query query;
1673799c2354SDavid Woodhouse 
1674799c2354SDavid Woodhouse         qemu_build_assert(sizeof(query) == 8);
1675799c2354SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &query, sizeof(query))) {
1676799c2354SDavid Woodhouse             err = -EFAULT;
1677799c2354SDavid Woodhouse             break;
1678799c2354SDavid Woodhouse         }
1679799c2354SDavid Woodhouse 
1680799c2354SDavid Woodhouse         err = xen_physdev_query_pirq(&query);
1681799c2354SDavid Woodhouse         if (!err && kvm_copy_to_gva(cs, arg, &query, sizeof(query))) {
1682799c2354SDavid Woodhouse             err = -EFAULT;
1683799c2354SDavid Woodhouse         }
1684799c2354SDavid Woodhouse         break;
1685799c2354SDavid Woodhouse     }
1686799c2354SDavid Woodhouse     case PHYSDEVOP_get_free_pirq: {
1687799c2354SDavid Woodhouse         struct physdev_get_free_pirq get;
1688799c2354SDavid Woodhouse 
1689799c2354SDavid Woodhouse         qemu_build_assert(sizeof(get) == 8);
1690799c2354SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &get, sizeof(get))) {
1691799c2354SDavid Woodhouse             err = -EFAULT;
1692799c2354SDavid Woodhouse             break;
1693799c2354SDavid Woodhouse         }
1694799c2354SDavid Woodhouse 
1695799c2354SDavid Woodhouse         err = xen_physdev_get_free_pirq(&get);
1696799c2354SDavid Woodhouse         if (!err && kvm_copy_to_gva(cs, arg, &get, sizeof(get))) {
1697799c2354SDavid Woodhouse             err = -EFAULT;
1698799c2354SDavid Woodhouse         }
1699799c2354SDavid Woodhouse         break;
1700799c2354SDavid Woodhouse     }
1701799c2354SDavid Woodhouse     case PHYSDEVOP_pirq_eoi_gmfn_v2: /* FreeBSD 13 makes this hypercall */
1702799c2354SDavid Woodhouse         err = -ENOSYS;
1703799c2354SDavid Woodhouse         break;
1704799c2354SDavid Woodhouse 
1705799c2354SDavid Woodhouse     default:
1706799c2354SDavid Woodhouse         return false;
1707799c2354SDavid Woodhouse     }
1708799c2354SDavid Woodhouse 
1709799c2354SDavid Woodhouse     exit->u.hcall.result = err;
1710799c2354SDavid Woodhouse     return true;
1711799c2354SDavid Woodhouse }
1712799c2354SDavid Woodhouse 
171355a3f666SJoao Martins static bool do_kvm_xen_handle_exit(X86CPU *cpu, struct kvm_xen_exit *exit)
171455a3f666SJoao Martins {
171555a3f666SJoao Martins     uint16_t code = exit->u.hcall.input;
171655a3f666SJoao Martins 
171755a3f666SJoao Martins     if (exit->u.hcall.cpl > 0) {
171855a3f666SJoao Martins         exit->u.hcall.result = -EPERM;
171955a3f666SJoao Martins         return true;
172055a3f666SJoao Martins     }
172155a3f666SJoao Martins 
172255a3f666SJoao Martins     switch (code) {
1723b746a779SJoao Martins     case __HYPERVISOR_set_timer_op:
1724b746a779SJoao Martins         if (exit->u.hcall.longmode) {
1725b746a779SJoao Martins             return kvm_xen_hcall_set_timer_op(exit, cpu,
1726b746a779SJoao Martins                                               exit->u.hcall.params[0]);
1727b746a779SJoao Martins         } else {
1728b746a779SJoao Martins             /* In 32-bit mode, the 64-bit timer value is in two args. */
1729b746a779SJoao Martins             uint64_t val = ((uint64_t)exit->u.hcall.params[1]) << 32 |
1730b746a779SJoao Martins                 (uint32_t)exit->u.hcall.params[0];
1731b746a779SJoao Martins             return kvm_xen_hcall_set_timer_op(exit, cpu, val);
1732b746a779SJoao Martins         }
173328b7ae94SDavid Woodhouse     case __HYPERVISOR_grant_table_op:
173428b7ae94SDavid Woodhouse         return kvm_xen_hcall_gnttab_op(exit, cpu, exit->u.hcall.params[0],
173528b7ae94SDavid Woodhouse                                        exit->u.hcall.params[1],
173628b7ae94SDavid Woodhouse                                        exit->u.hcall.params[2]);
173779b7067dSJoao Martins     case __HYPERVISOR_sched_op:
173879b7067dSJoao Martins         return kvm_xen_hcall_sched_op(exit, cpu, exit->u.hcall.params[0],
173979b7067dSJoao Martins                                       exit->u.hcall.params[1]);
17403b06f29bSJoao Martins     case __HYPERVISOR_event_channel_op:
17414858ba20SDavid Woodhouse         return kvm_xen_hcall_evtchn_op(exit, cpu, exit->u.hcall.params[0],
17423b06f29bSJoao Martins                                        exit->u.hcall.params[1]);
1743d70bd6a4SJoao Martins     case __HYPERVISOR_vcpu_op:
1744d70bd6a4SJoao Martins         return kvm_xen_hcall_vcpu_op(exit, cpu,
1745d70bd6a4SJoao Martins                                      exit->u.hcall.params[0],
1746d70bd6a4SJoao Martins                                      exit->u.hcall.params[1],
1747d70bd6a4SJoao Martins                                      exit->u.hcall.params[2]);
1748671bfdcdSJoao Martins     case __HYPERVISOR_hvm_op:
1749671bfdcdSJoao Martins         return kvm_xen_hcall_hvm_op(exit, cpu, exit->u.hcall.params[0],
1750671bfdcdSJoao Martins                                     exit->u.hcall.params[1]);
1751fb0fd2ceSJoao Martins     case __HYPERVISOR_memory_op:
1752fb0fd2ceSJoao Martins         return kvm_xen_hcall_memory_op(exit, cpu, exit->u.hcall.params[0],
1753fb0fd2ceSJoao Martins                                        exit->u.hcall.params[1]);
1754799c2354SDavid Woodhouse     case __HYPERVISOR_physdev_op:
1755799c2354SDavid Woodhouse         return kvm_xen_hcall_physdev_op(exit, cpu, exit->u.hcall.params[0],
1756799c2354SDavid Woodhouse                                         exit->u.hcall.params[1]);
1757bedcc139SJoao Martins     case __HYPERVISOR_xen_version:
1758bedcc139SJoao Martins         return kvm_xen_hcall_xen_version(exit, cpu, exit->u.hcall.params[0],
1759bedcc139SJoao Martins                                          exit->u.hcall.params[1]);
176055a3f666SJoao Martins     default:
176155a3f666SJoao Martins         return false;
176255a3f666SJoao Martins     }
176355a3f666SJoao Martins }
176455a3f666SJoao Martins 
176555a3f666SJoao Martins int kvm_xen_handle_exit(X86CPU *cpu, struct kvm_xen_exit *exit)
176655a3f666SJoao Martins {
176755a3f666SJoao Martins     if (exit->type != KVM_EXIT_XEN_HCALL) {
176855a3f666SJoao Martins         return -1;
176955a3f666SJoao Martins     }
177055a3f666SJoao Martins 
1771110a0ea5SDavid Woodhouse     /*
1772110a0ea5SDavid Woodhouse      * The kernel latches the guest 32/64 mode when the MSR is used to fill
1773110a0ea5SDavid Woodhouse      * the hypercall page. So if we see a hypercall in a mode that doesn't
1774110a0ea5SDavid Woodhouse      * match our own idea of the guest mode, fetch the kernel's idea of the
1775110a0ea5SDavid Woodhouse      * "long mode" to remain in sync.
1776110a0ea5SDavid Woodhouse      */
1777110a0ea5SDavid Woodhouse     if (exit->u.hcall.longmode != xen_is_long_mode()) {
1778110a0ea5SDavid Woodhouse         xen_sync_long_mode();
1779110a0ea5SDavid Woodhouse     }
1780110a0ea5SDavid Woodhouse 
178155a3f666SJoao Martins     if (!do_kvm_xen_handle_exit(cpu, exit)) {
178255a3f666SJoao Martins         /*
178355a3f666SJoao Martins          * Some hypercalls will be deliberately "implemented" by returning
178455a3f666SJoao Martins          * -ENOSYS. This case is for hypercalls which are unexpected.
178555a3f666SJoao Martins          */
178655a3f666SJoao Martins         exit->u.hcall.result = -ENOSYS;
178755a3f666SJoao Martins         qemu_log_mask(LOG_UNIMP, "Unimplemented Xen hypercall %"
178855a3f666SJoao Martins                       PRId64 " (0x%" PRIx64 " 0x%" PRIx64 " 0x%" PRIx64 ")\n",
178955a3f666SJoao Martins                       (uint64_t)exit->u.hcall.input,
179055a3f666SJoao Martins                       (uint64_t)exit->u.hcall.params[0],
179155a3f666SJoao Martins                       (uint64_t)exit->u.hcall.params[1],
179255a3f666SJoao Martins                       (uint64_t)exit->u.hcall.params[2]);
179355a3f666SJoao Martins     }
179455a3f666SJoao Martins 
179555a3f666SJoao Martins     trace_kvm_xen_hypercall(CPU(cpu)->cpu_index, exit->u.hcall.cpl,
179655a3f666SJoao Martins                             exit->u.hcall.input, exit->u.hcall.params[0],
179755a3f666SJoao Martins                             exit->u.hcall.params[1], exit->u.hcall.params[2],
179855a3f666SJoao Martins                             exit->u.hcall.result);
179955a3f666SJoao Martins     return 0;
180055a3f666SJoao Martins }
1801c345104cSJoao Martins 
18026f43f2eeSDavid Woodhouse uint16_t kvm_xen_get_gnttab_max_frames(void)
18036f43f2eeSDavid Woodhouse {
18046f43f2eeSDavid Woodhouse     KVMState *s = KVM_STATE(current_accel());
18056f43f2eeSDavid Woodhouse     return s->xen_gnttab_max_frames;
18066f43f2eeSDavid Woodhouse }
18076f43f2eeSDavid Woodhouse 
1808e16aff4cSDavid Woodhouse uint16_t kvm_xen_get_evtchn_max_pirq(void)
1809e16aff4cSDavid Woodhouse {
1810e16aff4cSDavid Woodhouse     KVMState *s = KVM_STATE(current_accel());
1811e16aff4cSDavid Woodhouse     return s->xen_evtchn_max_pirq;
1812e16aff4cSDavid Woodhouse }
1813e16aff4cSDavid Woodhouse 
1814c345104cSJoao Martins int kvm_put_xen_state(CPUState *cs)
1815c345104cSJoao Martins {
1816c345104cSJoao Martins     X86CPU *cpu = X86_CPU(cs);
1817c345104cSJoao Martins     CPUX86State *env = &cpu->env;
1818c345104cSJoao Martins     uint64_t gpa;
1819c345104cSJoao Martins     int ret;
1820c345104cSJoao Martins 
1821c345104cSJoao Martins     gpa = env->xen_vcpu_info_gpa;
1822c345104cSJoao Martins     if (gpa == INVALID_GPA) {
1823c345104cSJoao Martins         gpa = env->xen_vcpu_info_default_gpa;
1824c345104cSJoao Martins     }
1825c345104cSJoao Martins 
1826c345104cSJoao Martins     if (gpa != INVALID_GPA) {
182727d4075dSDavid Woodhouse         ret = set_vcpu_info(cs, gpa);
1828c345104cSJoao Martins         if (ret < 0) {
1829c345104cSJoao Martins             return ret;
1830c345104cSJoao Martins         }
1831c345104cSJoao Martins     }
1832c345104cSJoao Martins 
1833f0689302SJoao Martins     gpa = env->xen_vcpu_time_info_gpa;
1834f0689302SJoao Martins     if (gpa != INVALID_GPA) {
1835f0689302SJoao Martins         ret = kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO,
1836f0689302SJoao Martins                                     gpa);
1837f0689302SJoao Martins         if (ret < 0) {
1838f0689302SJoao Martins             return ret;
1839f0689302SJoao Martins         }
1840f0689302SJoao Martins     }
1841f0689302SJoao Martins 
18425092db87SJoao Martins     gpa = env->xen_vcpu_runstate_gpa;
18435092db87SJoao Martins     if (gpa != INVALID_GPA) {
18445092db87SJoao Martins         ret = kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR,
18455092db87SJoao Martins                                     gpa);
18465092db87SJoao Martins         if (ret < 0) {
18475092db87SJoao Martins             return ret;
18485092db87SJoao Martins         }
18495092db87SJoao Martins     }
18505092db87SJoao Martins 
1851b746a779SJoao Martins     if (env->xen_periodic_timer_period) {
1852b746a779SJoao Martins         ret = do_set_periodic_timer(cs, env->xen_periodic_timer_period);
1853b746a779SJoao Martins         if (ret < 0) {
1854b746a779SJoao Martins             return ret;
1855b746a779SJoao Martins         }
1856b746a779SJoao Martins     }
1857b746a779SJoao Martins 
1858105b47fdSAnkur Arora     if (!kvm_xen_has_cap(EVTCHN_SEND)) {
1859b746a779SJoao Martins         /*
1860b746a779SJoao Martins          * If the kernel has EVTCHN_SEND support then it handles timers too,
1861b746a779SJoao Martins          * so the timer will be restored by kvm_xen_set_vcpu_timer() below.
1862b746a779SJoao Martins          */
186319c417ecSDavid Woodhouse         QEMU_LOCK_GUARD(&env->xen_timers_lock);
1864b746a779SJoao Martins         if (env->xen_singleshot_timer_ns) {
1865b746a779SJoao Martins             ret = do_set_singleshot_timer(cs, env->xen_singleshot_timer_ns,
1866547c9757SDavid Woodhouse                                           false);
1867b746a779SJoao Martins             if (ret < 0) {
1868b746a779SJoao Martins                 return ret;
1869b746a779SJoao Martins             }
1870b746a779SJoao Martins         }
1871105b47fdSAnkur Arora         return 0;
1872105b47fdSAnkur Arora     }
1873105b47fdSAnkur Arora 
1874105b47fdSAnkur Arora     if (env->xen_vcpu_callback_vector) {
1875105b47fdSAnkur Arora         ret = kvm_xen_set_vcpu_callback_vector(cs);
1876105b47fdSAnkur Arora         if (ret < 0) {
1877105b47fdSAnkur Arora             return ret;
1878105b47fdSAnkur Arora         }
1879105b47fdSAnkur Arora     }
1880105b47fdSAnkur Arora 
1881c723d4c1SDavid Woodhouse     if (env->xen_virq[VIRQ_TIMER]) {
188219c417ecSDavid Woodhouse         do_set_vcpu_timer_virq(cs,
188319c417ecSDavid Woodhouse                                RUN_ON_CPU_HOST_INT(env->xen_virq[VIRQ_TIMER]));
1884c723d4c1SDavid Woodhouse     }
1885c345104cSJoao Martins     return 0;
1886c345104cSJoao Martins }
1887c345104cSJoao Martins 
1888c345104cSJoao Martins int kvm_get_xen_state(CPUState *cs)
1889c345104cSJoao Martins {
1890c345104cSJoao Martins     X86CPU *cpu = X86_CPU(cs);
1891c345104cSJoao Martins     CPUX86State *env = &cpu->env;
1892c345104cSJoao Martins     uint64_t gpa;
1893c723d4c1SDavid Woodhouse     int ret;
1894c345104cSJoao Martins 
1895c345104cSJoao Martins     /*
1896c345104cSJoao Martins      * The kernel does not mark vcpu_info as dirty when it delivers interrupts
1897c345104cSJoao Martins      * to it. It's up to userspace to *assume* that any page shared thus is
1898c345104cSJoao Martins      * always considered dirty. The shared_info page is different since it's
1899c345104cSJoao Martins      * an overlay and migrated separately anyway.
1900c345104cSJoao Martins      */
1901c345104cSJoao Martins     gpa = env->xen_vcpu_info_gpa;
1902c345104cSJoao Martins     if (gpa == INVALID_GPA) {
1903c345104cSJoao Martins         gpa = env->xen_vcpu_info_default_gpa;
1904c345104cSJoao Martins     }
1905c345104cSJoao Martins     if (gpa != INVALID_GPA) {
1906c345104cSJoao Martins         MemoryRegionSection mrs = memory_region_find(get_system_memory(),
1907c345104cSJoao Martins                                                      gpa,
1908c345104cSJoao Martins                                                      sizeof(struct vcpu_info));
1909c345104cSJoao Martins         if (mrs.mr &&
1910c345104cSJoao Martins             !int128_lt(mrs.size, int128_make64(sizeof(struct vcpu_info)))) {
1911c345104cSJoao Martins             memory_region_set_dirty(mrs.mr, mrs.offset_within_region,
1912c345104cSJoao Martins                                     sizeof(struct vcpu_info));
1913c345104cSJoao Martins         }
1914c345104cSJoao Martins     }
1915c345104cSJoao Martins 
1916c723d4c1SDavid Woodhouse     if (!kvm_xen_has_cap(EVTCHN_SEND)) {
1917c723d4c1SDavid Woodhouse         return 0;
1918c723d4c1SDavid Woodhouse     }
1919c723d4c1SDavid Woodhouse 
1920c723d4c1SDavid Woodhouse     /*
1921c723d4c1SDavid Woodhouse      * If the kernel is accelerating timers, read out the current value of the
1922c723d4c1SDavid Woodhouse      * singleshot timer deadline.
1923c723d4c1SDavid Woodhouse      */
1924c723d4c1SDavid Woodhouse     if (env->xen_virq[VIRQ_TIMER]) {
1925c723d4c1SDavid Woodhouse         struct kvm_xen_vcpu_attr va = {
1926c723d4c1SDavid Woodhouse             .type = KVM_XEN_VCPU_ATTR_TYPE_TIMER,
1927c723d4c1SDavid Woodhouse         };
1928c723d4c1SDavid Woodhouse         ret = kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_GET_ATTR, &va);
1929c723d4c1SDavid Woodhouse         if (ret < 0) {
1930c723d4c1SDavid Woodhouse             return ret;
1931c723d4c1SDavid Woodhouse         }
193219c417ecSDavid Woodhouse 
193319c417ecSDavid Woodhouse         /*
193419c417ecSDavid Woodhouse          * This locking is fairly pointless, and is here to appease Coverity.
193519c417ecSDavid Woodhouse          * There is an unavoidable race condition if a different vCPU sets a
193619c417ecSDavid Woodhouse          * timer for this vCPU after the value has been read out. But that's
193719c417ecSDavid Woodhouse          * OK in practice because *all* the vCPUs need to be stopped before
193819c417ecSDavid Woodhouse          * we set about migrating their state.
193919c417ecSDavid Woodhouse          */
194019c417ecSDavid Woodhouse         QEMU_LOCK_GUARD(&X86_CPU(cs)->env.xen_timers_lock);
1941c723d4c1SDavid Woodhouse         env->xen_singleshot_timer_ns = va.u.timer.expires_ns;
1942c723d4c1SDavid Woodhouse     }
1943c723d4c1SDavid Woodhouse 
1944c345104cSJoao Martins     return 0;
1945c345104cSJoao Martins }
1946