161491cf4SDavid Woodhouse /* 261491cf4SDavid Woodhouse * Xen HVM emulation support in KVM 361491cf4SDavid Woodhouse * 461491cf4SDavid Woodhouse * Copyright © 2019 Oracle and/or its affiliates. All rights reserved. 561491cf4SDavid Woodhouse * Copyright © 2022 Amazon.com, Inc. or its affiliates. All Rights Reserved. 661491cf4SDavid Woodhouse * 761491cf4SDavid Woodhouse * This work is licensed under the terms of the GNU GPL, version 2 or later. 861491cf4SDavid Woodhouse * See the COPYING file in the top-level directory. 961491cf4SDavid Woodhouse * 1061491cf4SDavid Woodhouse */ 1161491cf4SDavid Woodhouse 1261491cf4SDavid Woodhouse #include "qemu/osdep.h" 1355a3f666SJoao Martins #include "qemu/log.h" 1479b7067dSJoao Martins #include "qemu/main-loop.h" 15fb0fd2ceSJoao Martins #include "hw/xen/xen.h" 1661491cf4SDavid Woodhouse #include "sysemu/kvm_int.h" 1761491cf4SDavid Woodhouse #include "sysemu/kvm_xen.h" 1861491cf4SDavid Woodhouse #include "kvm/kvm_i386.h" 19bedcc139SJoao Martins #include "exec/address-spaces.h" 2061491cf4SDavid Woodhouse #include "xen-emu.h" 2155a3f666SJoao Martins #include "trace.h" 2279b7067dSJoao Martins #include "sysemu/runstate.h" 2361491cf4SDavid Woodhouse 2427d4075dSDavid Woodhouse #include "hw/pci/msi.h" 2527d4075dSDavid Woodhouse #include "hw/i386/apic-msidef.h" 26*8b57d5c5SDavid Woodhouse #include "hw/i386/e820_memory_layout.h" 27110a0ea5SDavid Woodhouse #include "hw/i386/kvm/xen_overlay.h" 2891cce756SDavid Woodhouse #include "hw/i386/kvm/xen_evtchn.h" 29a28b0fc0SDavid Woodhouse #include "hw/i386/kvm/xen_gnttab.h" 30110a0ea5SDavid Woodhouse 31bedcc139SJoao Martins #include "hw/xen/interface/version.h" 3279b7067dSJoao Martins #include "hw/xen/interface/sched.h" 33fb0fd2ceSJoao Martins #include "hw/xen/interface/memory.h" 34671bfdcdSJoao Martins #include "hw/xen/interface/hvm/hvm_op.h" 35105b47fdSAnkur Arora #include "hw/xen/interface/hvm/params.h" 36d70bd6a4SJoao Martins #include "hw/xen/interface/vcpu.h" 373b06f29bSJoao Martins #include "hw/xen/interface/event_channel.h" 3828b7ae94SDavid Woodhouse #include "hw/xen/interface/grant_table.h" 39fb0fd2ceSJoao Martins 40fb0fd2ceSJoao Martins #include "xen-compat.h" 41fb0fd2ceSJoao Martins 42b746a779SJoao Martins static void xen_vcpu_singleshot_timer_event(void *opaque); 43b746a779SJoao Martins static void xen_vcpu_periodic_timer_event(void *opaque); 44b746a779SJoao Martins 45fb0fd2ceSJoao Martins #ifdef TARGET_X86_64 46fb0fd2ceSJoao Martins #define hypercall_compat32(longmode) (!(longmode)) 47fb0fd2ceSJoao Martins #else 48fb0fd2ceSJoao Martins #define hypercall_compat32(longmode) (false) 49fb0fd2ceSJoao Martins #endif 50bedcc139SJoao Martins 51f0689302SJoao Martins static bool kvm_gva_to_gpa(CPUState *cs, uint64_t gva, uint64_t *gpa, 52f0689302SJoao Martins size_t *len, bool is_write) 53bedcc139SJoao Martins { 54bedcc139SJoao Martins struct kvm_translation tr = { 55bedcc139SJoao Martins .linear_address = gva, 56bedcc139SJoao Martins }; 57bedcc139SJoao Martins 58f0689302SJoao Martins if (len) { 59f0689302SJoao Martins *len = TARGET_PAGE_SIZE - (gva & ~TARGET_PAGE_MASK); 60f0689302SJoao Martins } 61f0689302SJoao Martins 62f0689302SJoao Martins if (kvm_vcpu_ioctl(cs, KVM_TRANSLATE, &tr) || !tr.valid || 63f0689302SJoao Martins (is_write && !tr.writeable)) { 64f0689302SJoao Martins return false; 65f0689302SJoao Martins } 66f0689302SJoao Martins *gpa = tr.physical_address; 67f0689302SJoao Martins return true; 68f0689302SJoao Martins } 69f0689302SJoao Martins 70f0689302SJoao Martins static int kvm_gva_rw(CPUState *cs, uint64_t gva, void *_buf, size_t sz, 71f0689302SJoao Martins bool is_write) 72f0689302SJoao Martins { 73f0689302SJoao Martins uint8_t *buf = (uint8_t *)_buf; 74f0689302SJoao Martins uint64_t gpa; 75f0689302SJoao Martins size_t len; 76f0689302SJoao Martins 77f0689302SJoao Martins while (sz) { 78f0689302SJoao Martins if (!kvm_gva_to_gpa(cs, gva, &gpa, &len, is_write)) { 79f0689302SJoao Martins return -EFAULT; 80f0689302SJoao Martins } 81bedcc139SJoao Martins if (len > sz) { 82bedcc139SJoao Martins len = sz; 83bedcc139SJoao Martins } 84bedcc139SJoao Martins 85f0689302SJoao Martins cpu_physical_memory_rw(gpa, buf, len, is_write); 86bedcc139SJoao Martins 87bedcc139SJoao Martins buf += len; 88bedcc139SJoao Martins sz -= len; 89bedcc139SJoao Martins gva += len; 90bedcc139SJoao Martins } 91bedcc139SJoao Martins 92bedcc139SJoao Martins return 0; 93bedcc139SJoao Martins } 94bedcc139SJoao Martins 95bedcc139SJoao Martins static inline int kvm_copy_from_gva(CPUState *cs, uint64_t gva, void *buf, 96bedcc139SJoao Martins size_t sz) 97bedcc139SJoao Martins { 98bedcc139SJoao Martins return kvm_gva_rw(cs, gva, buf, sz, false); 99bedcc139SJoao Martins } 100bedcc139SJoao Martins 101bedcc139SJoao Martins static inline int kvm_copy_to_gva(CPUState *cs, uint64_t gva, void *buf, 102bedcc139SJoao Martins size_t sz) 103bedcc139SJoao Martins { 104bedcc139SJoao Martins return kvm_gva_rw(cs, gva, buf, sz, true); 105bedcc139SJoao Martins } 106bedcc139SJoao Martins 107f66b8a83SJoao Martins int kvm_xen_init(KVMState *s, uint32_t hypercall_msr) 10861491cf4SDavid Woodhouse { 10961491cf4SDavid Woodhouse const int required_caps = KVM_XEN_HVM_CONFIG_HYPERCALL_MSR | 11061491cf4SDavid Woodhouse KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL | KVM_XEN_HVM_CONFIG_SHARED_INFO; 11161491cf4SDavid Woodhouse struct kvm_xen_hvm_config cfg = { 112f66b8a83SJoao Martins .msr = hypercall_msr, 11361491cf4SDavid Woodhouse .flags = KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL, 11461491cf4SDavid Woodhouse }; 11561491cf4SDavid Woodhouse int xen_caps, ret; 11661491cf4SDavid Woodhouse 11761491cf4SDavid Woodhouse xen_caps = kvm_check_extension(s, KVM_CAP_XEN_HVM); 11861491cf4SDavid Woodhouse if (required_caps & ~xen_caps) { 11961491cf4SDavid Woodhouse error_report("kvm: Xen HVM guest support not present or insufficient"); 12061491cf4SDavid Woodhouse return -ENOSYS; 12161491cf4SDavid Woodhouse } 12261491cf4SDavid Woodhouse 12361491cf4SDavid Woodhouse if (xen_caps & KVM_XEN_HVM_CONFIG_EVTCHN_SEND) { 12461491cf4SDavid Woodhouse struct kvm_xen_hvm_attr ha = { 12561491cf4SDavid Woodhouse .type = KVM_XEN_ATTR_TYPE_XEN_VERSION, 12661491cf4SDavid Woodhouse .u.xen_version = s->xen_version, 12761491cf4SDavid Woodhouse }; 12861491cf4SDavid Woodhouse (void)kvm_vm_ioctl(s, KVM_XEN_HVM_SET_ATTR, &ha); 12961491cf4SDavid Woodhouse 13061491cf4SDavid Woodhouse cfg.flags |= KVM_XEN_HVM_CONFIG_EVTCHN_SEND; 13161491cf4SDavid Woodhouse } 13261491cf4SDavid Woodhouse 13361491cf4SDavid Woodhouse ret = kvm_vm_ioctl(s, KVM_XEN_HVM_CONFIG, &cfg); 13461491cf4SDavid Woodhouse if (ret < 0) { 13561491cf4SDavid Woodhouse error_report("kvm: Failed to enable Xen HVM support: %s", 13661491cf4SDavid Woodhouse strerror(-ret)); 13761491cf4SDavid Woodhouse return ret; 13861491cf4SDavid Woodhouse } 13961491cf4SDavid Woodhouse 1402aff696bSDavid Woodhouse /* If called a second time, don't repeat the rest of the setup. */ 1412aff696bSDavid Woodhouse if (s->xen_caps) { 1422aff696bSDavid Woodhouse return 0; 1432aff696bSDavid Woodhouse } 1442aff696bSDavid Woodhouse 1452aff696bSDavid Woodhouse /* 1462aff696bSDavid Woodhouse * Event channel delivery via GSI/PCI_INTX needs to poll the vcpu_info 1472aff696bSDavid Woodhouse * of vCPU0 to deassert the IRQ when ->evtchn_upcall_pending is cleared. 1482aff696bSDavid Woodhouse * 1492aff696bSDavid Woodhouse * In the kernel, there's a notifier hook on the PIC/IOAPIC which allows 1502aff696bSDavid Woodhouse * such things to be polled at precisely the right time. We *could* do 1512aff696bSDavid Woodhouse * it nicely in the kernel: check vcpu_info[0]->evtchn_upcall_pending at 1522aff696bSDavid Woodhouse * the moment the IRQ is acked, and see if it should be reasserted. 1532aff696bSDavid Woodhouse * 1542aff696bSDavid Woodhouse * But the in-kernel irqchip is deprecated, so we're unlikely to add 1552aff696bSDavid Woodhouse * that support in the kernel. Insist on using the split irqchip mode 1562aff696bSDavid Woodhouse * instead. 1572aff696bSDavid Woodhouse * 1582aff696bSDavid Woodhouse * This leaves us polling for the level going low in QEMU, which lacks 1592aff696bSDavid Woodhouse * the appropriate hooks in its PIC/IOAPIC code. Even VFIO is sending a 1602aff696bSDavid Woodhouse * spurious 'ack' to an INTX IRQ every time there's any MMIO access to 1612aff696bSDavid Woodhouse * the device (for which it has to unmap the device and trap access, for 1622aff696bSDavid Woodhouse * some period after an IRQ!!). In the Xen case, we do it on exit from 1632aff696bSDavid Woodhouse * KVM_RUN, if the flag is set to say that the GSI is currently asserted. 1642aff696bSDavid Woodhouse * Which is kind of icky, but less so than the VFIO one. I may fix them 1652aff696bSDavid Woodhouse * both later... 1662aff696bSDavid Woodhouse */ 1672aff696bSDavid Woodhouse if (!kvm_kernel_irqchip_split()) { 1682aff696bSDavid Woodhouse error_report("kvm: Xen support requires kernel-irqchip=split"); 1692aff696bSDavid Woodhouse return -EINVAL; 1702aff696bSDavid Woodhouse } 1712aff696bSDavid Woodhouse 17261491cf4SDavid Woodhouse s->xen_caps = xen_caps; 173*8b57d5c5SDavid Woodhouse 174*8b57d5c5SDavid Woodhouse /* Tell fw_cfg to notify the BIOS to reserve the range. */ 175*8b57d5c5SDavid Woodhouse ret = e820_add_entry(XEN_SPECIAL_AREA_ADDR, XEN_SPECIAL_AREA_SIZE, 176*8b57d5c5SDavid Woodhouse E820_RESERVED); 177*8b57d5c5SDavid Woodhouse if (ret < 0) { 178*8b57d5c5SDavid Woodhouse fprintf(stderr, "e820_add_entry() table is full\n"); 179*8b57d5c5SDavid Woodhouse return ret; 180*8b57d5c5SDavid Woodhouse } 181*8b57d5c5SDavid Woodhouse 18261491cf4SDavid Woodhouse return 0; 18361491cf4SDavid Woodhouse } 18461491cf4SDavid Woodhouse 1855e691a95SDavid Woodhouse int kvm_xen_init_vcpu(CPUState *cs) 1865e691a95SDavid Woodhouse { 187c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs); 188c345104cSJoao Martins CPUX86State *env = &cpu->env; 1895e691a95SDavid Woodhouse int err; 1905e691a95SDavid Woodhouse 1915e691a95SDavid Woodhouse /* 1925e691a95SDavid Woodhouse * The kernel needs to know the Xen/ACPI vCPU ID because that's 1935e691a95SDavid Woodhouse * what the guest uses in hypercalls such as timers. It doesn't 1945e691a95SDavid Woodhouse * match the APIC ID which is generally used for talking to the 1955e691a95SDavid Woodhouse * kernel about vCPUs. And if vCPU threads race with creating 1965e691a95SDavid Woodhouse * their KVM vCPUs out of order, it doesn't necessarily match 1975e691a95SDavid Woodhouse * with the kernel's internal vCPU indices either. 1985e691a95SDavid Woodhouse */ 1995e691a95SDavid Woodhouse if (kvm_xen_has_cap(EVTCHN_SEND)) { 2005e691a95SDavid Woodhouse struct kvm_xen_vcpu_attr va = { 2015e691a95SDavid Woodhouse .type = KVM_XEN_VCPU_ATTR_TYPE_VCPU_ID, 2025e691a95SDavid Woodhouse .u.vcpu_id = cs->cpu_index, 2035e691a95SDavid Woodhouse }; 2045e691a95SDavid Woodhouse err = kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_SET_ATTR, &va); 2055e691a95SDavid Woodhouse if (err) { 2065e691a95SDavid Woodhouse error_report("kvm: Failed to set Xen vCPU ID attribute: %s", 2075e691a95SDavid Woodhouse strerror(-err)); 2085e691a95SDavid Woodhouse return err; 2095e691a95SDavid Woodhouse } 2105e691a95SDavid Woodhouse } 2115e691a95SDavid Woodhouse 212c345104cSJoao Martins env->xen_vcpu_info_gpa = INVALID_GPA; 213c345104cSJoao Martins env->xen_vcpu_info_default_gpa = INVALID_GPA; 214f0689302SJoao Martins env->xen_vcpu_time_info_gpa = INVALID_GPA; 2155092db87SJoao Martins env->xen_vcpu_runstate_gpa = INVALID_GPA; 216c345104cSJoao Martins 217b746a779SJoao Martins qemu_mutex_init(&env->xen_timers_lock); 218b746a779SJoao Martins env->xen_singleshot_timer = timer_new_ns(QEMU_CLOCK_VIRTUAL, 219b746a779SJoao Martins xen_vcpu_singleshot_timer_event, 220b746a779SJoao Martins cpu); 221b746a779SJoao Martins if (!env->xen_singleshot_timer) { 222b746a779SJoao Martins return -ENOMEM; 223b746a779SJoao Martins } 224b746a779SJoao Martins env->xen_singleshot_timer->opaque = cs; 225b746a779SJoao Martins 226b746a779SJoao Martins env->xen_periodic_timer = timer_new_ns(QEMU_CLOCK_VIRTUAL, 227b746a779SJoao Martins xen_vcpu_periodic_timer_event, 228b746a779SJoao Martins cpu); 229b746a779SJoao Martins if (!env->xen_periodic_timer) { 230b746a779SJoao Martins return -ENOMEM; 231b746a779SJoao Martins } 232b746a779SJoao Martins env->xen_periodic_timer->opaque = cs; 233b746a779SJoao Martins 2345e691a95SDavid Woodhouse return 0; 2355e691a95SDavid Woodhouse } 2365e691a95SDavid Woodhouse 23761491cf4SDavid Woodhouse uint32_t kvm_xen_get_caps(void) 23861491cf4SDavid Woodhouse { 23961491cf4SDavid Woodhouse return kvm_state->xen_caps; 24061491cf4SDavid Woodhouse } 24155a3f666SJoao Martins 242bedcc139SJoao Martins static bool kvm_xen_hcall_xen_version(struct kvm_xen_exit *exit, X86CPU *cpu, 243bedcc139SJoao Martins int cmd, uint64_t arg) 244bedcc139SJoao Martins { 245bedcc139SJoao Martins int err = 0; 246bedcc139SJoao Martins 247bedcc139SJoao Martins switch (cmd) { 248bedcc139SJoao Martins case XENVER_get_features: { 249bedcc139SJoao Martins struct xen_feature_info fi; 250bedcc139SJoao Martins 251bedcc139SJoao Martins /* No need for 32/64 compat handling */ 252bedcc139SJoao Martins qemu_build_assert(sizeof(fi) == 8); 253bedcc139SJoao Martins 254bedcc139SJoao Martins err = kvm_copy_from_gva(CPU(cpu), arg, &fi, sizeof(fi)); 255bedcc139SJoao Martins if (err) { 256bedcc139SJoao Martins break; 257bedcc139SJoao Martins } 258bedcc139SJoao Martins 259bedcc139SJoao Martins fi.submap = 0; 260bedcc139SJoao Martins if (fi.submap_idx == 0) { 261bedcc139SJoao Martins fi.submap |= 1 << XENFEAT_writable_page_tables | 262bedcc139SJoao Martins 1 << XENFEAT_writable_descriptor_tables | 263bedcc139SJoao Martins 1 << XENFEAT_auto_translated_physmap | 264105b47fdSAnkur Arora 1 << XENFEAT_supervisor_mode_kernel | 265b746a779SJoao Martins 1 << XENFEAT_hvm_callback_vector | 266b746a779SJoao Martins 1 << XENFEAT_hvm_safe_pvclock; 267bedcc139SJoao Martins } 268bedcc139SJoao Martins 269bedcc139SJoao Martins err = kvm_copy_to_gva(CPU(cpu), arg, &fi, sizeof(fi)); 270bedcc139SJoao Martins break; 271bedcc139SJoao Martins } 272bedcc139SJoao Martins 273bedcc139SJoao Martins default: 274bedcc139SJoao Martins return false; 275bedcc139SJoao Martins } 276bedcc139SJoao Martins 277bedcc139SJoao Martins exit->u.hcall.result = err; 278bedcc139SJoao Martins return true; 279bedcc139SJoao Martins } 280bedcc139SJoao Martins 281c345104cSJoao Martins static int kvm_xen_set_vcpu_attr(CPUState *cs, uint16_t type, uint64_t gpa) 282c345104cSJoao Martins { 283c345104cSJoao Martins struct kvm_xen_vcpu_attr xhsi; 284c345104cSJoao Martins 285c345104cSJoao Martins xhsi.type = type; 286c345104cSJoao Martins xhsi.u.gpa = gpa; 287c345104cSJoao Martins 288c345104cSJoao Martins trace_kvm_xen_set_vcpu_attr(cs->cpu_index, type, gpa); 289c345104cSJoao Martins 290c345104cSJoao Martins return kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_SET_ATTR, &xhsi); 291c345104cSJoao Martins } 292c345104cSJoao Martins 293105b47fdSAnkur Arora static int kvm_xen_set_vcpu_callback_vector(CPUState *cs) 294105b47fdSAnkur Arora { 295105b47fdSAnkur Arora uint8_t vector = X86_CPU(cs)->env.xen_vcpu_callback_vector; 296105b47fdSAnkur Arora struct kvm_xen_vcpu_attr xva; 297105b47fdSAnkur Arora 298105b47fdSAnkur Arora xva.type = KVM_XEN_VCPU_ATTR_TYPE_UPCALL_VECTOR; 299105b47fdSAnkur Arora xva.u.vector = vector; 300105b47fdSAnkur Arora 301105b47fdSAnkur Arora trace_kvm_xen_set_vcpu_callback(cs->cpu_index, vector); 302105b47fdSAnkur Arora 303105b47fdSAnkur Arora return kvm_vcpu_ioctl(cs, KVM_XEN_HVM_SET_ATTR, &xva); 304105b47fdSAnkur Arora } 305105b47fdSAnkur Arora 306105b47fdSAnkur Arora static void do_set_vcpu_callback_vector(CPUState *cs, run_on_cpu_data data) 307105b47fdSAnkur Arora { 308105b47fdSAnkur Arora X86CPU *cpu = X86_CPU(cs); 309105b47fdSAnkur Arora CPUX86State *env = &cpu->env; 310105b47fdSAnkur Arora 311105b47fdSAnkur Arora env->xen_vcpu_callback_vector = data.host_int; 312105b47fdSAnkur Arora 313105b47fdSAnkur Arora if (kvm_xen_has_cap(EVTCHN_SEND)) { 314105b47fdSAnkur Arora kvm_xen_set_vcpu_callback_vector(cs); 315105b47fdSAnkur Arora } 316105b47fdSAnkur Arora } 317105b47fdSAnkur Arora 31827d4075dSDavid Woodhouse static int set_vcpu_info(CPUState *cs, uint64_t gpa) 31927d4075dSDavid Woodhouse { 32027d4075dSDavid Woodhouse X86CPU *cpu = X86_CPU(cs); 32127d4075dSDavid Woodhouse CPUX86State *env = &cpu->env; 32227d4075dSDavid Woodhouse MemoryRegionSection mrs = { .mr = NULL }; 32327d4075dSDavid Woodhouse void *vcpu_info_hva = NULL; 32427d4075dSDavid Woodhouse int ret; 32527d4075dSDavid Woodhouse 32627d4075dSDavid Woodhouse ret = kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_INFO, gpa); 32727d4075dSDavid Woodhouse if (ret || gpa == INVALID_GPA) { 32827d4075dSDavid Woodhouse goto out; 32927d4075dSDavid Woodhouse } 33027d4075dSDavid Woodhouse 33127d4075dSDavid Woodhouse mrs = memory_region_find(get_system_memory(), gpa, 33227d4075dSDavid Woodhouse sizeof(struct vcpu_info)); 33327d4075dSDavid Woodhouse if (mrs.mr && mrs.mr->ram_block && 33427d4075dSDavid Woodhouse !int128_lt(mrs.size, int128_make64(sizeof(struct vcpu_info)))) { 33527d4075dSDavid Woodhouse vcpu_info_hva = qemu_map_ram_ptr(mrs.mr->ram_block, 33627d4075dSDavid Woodhouse mrs.offset_within_region); 33727d4075dSDavid Woodhouse } 33827d4075dSDavid Woodhouse if (!vcpu_info_hva) { 33927d4075dSDavid Woodhouse if (mrs.mr) { 34027d4075dSDavid Woodhouse memory_region_unref(mrs.mr); 34127d4075dSDavid Woodhouse mrs.mr = NULL; 34227d4075dSDavid Woodhouse } 34327d4075dSDavid Woodhouse ret = -EINVAL; 34427d4075dSDavid Woodhouse } 34527d4075dSDavid Woodhouse 34627d4075dSDavid Woodhouse out: 34727d4075dSDavid Woodhouse if (env->xen_vcpu_info_mr) { 34827d4075dSDavid Woodhouse memory_region_unref(env->xen_vcpu_info_mr); 34927d4075dSDavid Woodhouse } 35027d4075dSDavid Woodhouse env->xen_vcpu_info_hva = vcpu_info_hva; 35127d4075dSDavid Woodhouse env->xen_vcpu_info_mr = mrs.mr; 35227d4075dSDavid Woodhouse return ret; 35327d4075dSDavid Woodhouse } 35427d4075dSDavid Woodhouse 355c345104cSJoao Martins static void do_set_vcpu_info_default_gpa(CPUState *cs, run_on_cpu_data data) 356c345104cSJoao Martins { 357c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs); 358c345104cSJoao Martins CPUX86State *env = &cpu->env; 359c345104cSJoao Martins 360c345104cSJoao Martins env->xen_vcpu_info_default_gpa = data.host_ulong; 361c345104cSJoao Martins 362c345104cSJoao Martins /* Changing the default does nothing if a vcpu_info was explicitly set. */ 363c345104cSJoao Martins if (env->xen_vcpu_info_gpa == INVALID_GPA) { 36427d4075dSDavid Woodhouse set_vcpu_info(cs, env->xen_vcpu_info_default_gpa); 365c345104cSJoao Martins } 366c345104cSJoao Martins } 367c345104cSJoao Martins 368c345104cSJoao Martins static void do_set_vcpu_info_gpa(CPUState *cs, run_on_cpu_data data) 369c345104cSJoao Martins { 370c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs); 371c345104cSJoao Martins CPUX86State *env = &cpu->env; 372c345104cSJoao Martins 373c345104cSJoao Martins env->xen_vcpu_info_gpa = data.host_ulong; 374c345104cSJoao Martins 37527d4075dSDavid Woodhouse set_vcpu_info(cs, env->xen_vcpu_info_gpa); 37627d4075dSDavid Woodhouse } 37727d4075dSDavid Woodhouse 37827d4075dSDavid Woodhouse void *kvm_xen_get_vcpu_info_hva(uint32_t vcpu_id) 37927d4075dSDavid Woodhouse { 38027d4075dSDavid Woodhouse CPUState *cs = qemu_get_cpu(vcpu_id); 38127d4075dSDavid Woodhouse if (!cs) { 38227d4075dSDavid Woodhouse return NULL; 38327d4075dSDavid Woodhouse } 38427d4075dSDavid Woodhouse 38527d4075dSDavid Woodhouse return X86_CPU(cs)->env.xen_vcpu_info_hva; 38627d4075dSDavid Woodhouse } 38727d4075dSDavid Woodhouse 388ddf0fd9aSDavid Woodhouse void kvm_xen_maybe_deassert_callback(CPUState *cs) 389ddf0fd9aSDavid Woodhouse { 390ddf0fd9aSDavid Woodhouse CPUX86State *env = &X86_CPU(cs)->env; 391ddf0fd9aSDavid Woodhouse struct vcpu_info *vi = env->xen_vcpu_info_hva; 392ddf0fd9aSDavid Woodhouse if (!vi) { 393ddf0fd9aSDavid Woodhouse return; 394ddf0fd9aSDavid Woodhouse } 395ddf0fd9aSDavid Woodhouse 396ddf0fd9aSDavid Woodhouse /* If the evtchn_upcall_pending flag is cleared, turn the GSI off. */ 397ddf0fd9aSDavid Woodhouse if (!vi->evtchn_upcall_pending) { 398ddf0fd9aSDavid Woodhouse qemu_mutex_lock_iothread(); 399ddf0fd9aSDavid Woodhouse /* 400ddf0fd9aSDavid Woodhouse * Check again now we have the lock, because it may have been 401ddf0fd9aSDavid Woodhouse * asserted in the interim. And we don't want to take the lock 402ddf0fd9aSDavid Woodhouse * every time because this is a fast path. 403ddf0fd9aSDavid Woodhouse */ 404ddf0fd9aSDavid Woodhouse if (!vi->evtchn_upcall_pending) { 405ddf0fd9aSDavid Woodhouse X86_CPU(cs)->env.xen_callback_asserted = false; 406ddf0fd9aSDavid Woodhouse xen_evtchn_set_callback_level(0); 407ddf0fd9aSDavid Woodhouse } 408ddf0fd9aSDavid Woodhouse qemu_mutex_unlock_iothread(); 409ddf0fd9aSDavid Woodhouse } 410ddf0fd9aSDavid Woodhouse } 411ddf0fd9aSDavid Woodhouse 412ddf0fd9aSDavid Woodhouse void kvm_xen_set_callback_asserted(void) 413ddf0fd9aSDavid Woodhouse { 414ddf0fd9aSDavid Woodhouse CPUState *cs = qemu_get_cpu(0); 415ddf0fd9aSDavid Woodhouse 416ddf0fd9aSDavid Woodhouse if (cs) { 417ddf0fd9aSDavid Woodhouse X86_CPU(cs)->env.xen_callback_asserted = true; 418ddf0fd9aSDavid Woodhouse } 419ddf0fd9aSDavid Woodhouse } 420ddf0fd9aSDavid Woodhouse 42127d4075dSDavid Woodhouse void kvm_xen_inject_vcpu_callback_vector(uint32_t vcpu_id, int type) 42227d4075dSDavid Woodhouse { 42327d4075dSDavid Woodhouse CPUState *cs = qemu_get_cpu(vcpu_id); 42427d4075dSDavid Woodhouse uint8_t vector; 42527d4075dSDavid Woodhouse 42627d4075dSDavid Woodhouse if (!cs) { 42727d4075dSDavid Woodhouse return; 42827d4075dSDavid Woodhouse } 42927d4075dSDavid Woodhouse 43027d4075dSDavid Woodhouse vector = X86_CPU(cs)->env.xen_vcpu_callback_vector; 43127d4075dSDavid Woodhouse if (vector) { 43227d4075dSDavid Woodhouse /* 43327d4075dSDavid Woodhouse * The per-vCPU callback vector injected via lapic. Just 43427d4075dSDavid Woodhouse * deliver it as an MSI. 43527d4075dSDavid Woodhouse */ 43627d4075dSDavid Woodhouse MSIMessage msg = { 43727d4075dSDavid Woodhouse .address = APIC_DEFAULT_ADDRESS | X86_CPU(cs)->apic_id, 43827d4075dSDavid Woodhouse .data = vector | (1UL << MSI_DATA_LEVEL_SHIFT), 43927d4075dSDavid Woodhouse }; 44027d4075dSDavid Woodhouse kvm_irqchip_send_msi(kvm_state, msg); 44127d4075dSDavid Woodhouse return; 44227d4075dSDavid Woodhouse } 44327d4075dSDavid Woodhouse 44427d4075dSDavid Woodhouse switch (type) { 44527d4075dSDavid Woodhouse case HVM_PARAM_CALLBACK_TYPE_VECTOR: 44627d4075dSDavid Woodhouse /* 44727d4075dSDavid Woodhouse * If the evtchn_upcall_pending field in the vcpu_info is set, then 44827d4075dSDavid Woodhouse * KVM will automatically deliver the vector on entering the vCPU 44927d4075dSDavid Woodhouse * so all we have to do is kick it out. 45027d4075dSDavid Woodhouse */ 45127d4075dSDavid Woodhouse qemu_cpu_kick(cs); 45227d4075dSDavid Woodhouse break; 453ddf0fd9aSDavid Woodhouse 454ddf0fd9aSDavid Woodhouse case HVM_PARAM_CALLBACK_TYPE_GSI: 455ddf0fd9aSDavid Woodhouse case HVM_PARAM_CALLBACK_TYPE_PCI_INTX: 456ddf0fd9aSDavid Woodhouse if (vcpu_id == 0) { 457ddf0fd9aSDavid Woodhouse xen_evtchn_set_callback_level(1); 458ddf0fd9aSDavid Woodhouse } 459ddf0fd9aSDavid Woodhouse break; 46027d4075dSDavid Woodhouse } 461c345104cSJoao Martins } 462c345104cSJoao Martins 463c723d4c1SDavid Woodhouse static int kvm_xen_set_vcpu_timer(CPUState *cs) 464c723d4c1SDavid Woodhouse { 465c723d4c1SDavid Woodhouse X86CPU *cpu = X86_CPU(cs); 466c723d4c1SDavid Woodhouse CPUX86State *env = &cpu->env; 467c723d4c1SDavid Woodhouse 468c723d4c1SDavid Woodhouse struct kvm_xen_vcpu_attr va = { 469c723d4c1SDavid Woodhouse .type = KVM_XEN_VCPU_ATTR_TYPE_TIMER, 470c723d4c1SDavid Woodhouse .u.timer.port = env->xen_virq[VIRQ_TIMER], 471c723d4c1SDavid Woodhouse .u.timer.priority = KVM_IRQ_ROUTING_XEN_EVTCHN_PRIO_2LEVEL, 472c723d4c1SDavid Woodhouse .u.timer.expires_ns = env->xen_singleshot_timer_ns, 473c723d4c1SDavid Woodhouse }; 474c723d4c1SDavid Woodhouse 475c723d4c1SDavid Woodhouse return kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_SET_ATTR, &va); 476c723d4c1SDavid Woodhouse } 477c723d4c1SDavid Woodhouse 478c723d4c1SDavid Woodhouse static void do_set_vcpu_timer_virq(CPUState *cs, run_on_cpu_data data) 479c723d4c1SDavid Woodhouse { 480c723d4c1SDavid Woodhouse kvm_xen_set_vcpu_timer(cs); 481c723d4c1SDavid Woodhouse } 482c723d4c1SDavid Woodhouse 483c723d4c1SDavid Woodhouse int kvm_xen_set_vcpu_virq(uint32_t vcpu_id, uint16_t virq, uint16_t port) 484c723d4c1SDavid Woodhouse { 485c723d4c1SDavid Woodhouse CPUState *cs = qemu_get_cpu(vcpu_id); 486c723d4c1SDavid Woodhouse 487c723d4c1SDavid Woodhouse if (!cs) { 488c723d4c1SDavid Woodhouse return -ENOENT; 489c723d4c1SDavid Woodhouse } 490c723d4c1SDavid Woodhouse 491c723d4c1SDavid Woodhouse /* cpu.h doesn't include the actual Xen header. */ 492c723d4c1SDavid Woodhouse qemu_build_assert(NR_VIRQS == XEN_NR_VIRQS); 493c723d4c1SDavid Woodhouse 494c723d4c1SDavid Woodhouse if (virq >= NR_VIRQS) { 495c723d4c1SDavid Woodhouse return -EINVAL; 496c723d4c1SDavid Woodhouse } 497c723d4c1SDavid Woodhouse 498c723d4c1SDavid Woodhouse if (port && X86_CPU(cs)->env.xen_virq[virq]) { 499c723d4c1SDavid Woodhouse return -EEXIST; 500c723d4c1SDavid Woodhouse } 501c723d4c1SDavid Woodhouse 502c723d4c1SDavid Woodhouse X86_CPU(cs)->env.xen_virq[virq] = port; 503c723d4c1SDavid Woodhouse if (virq == VIRQ_TIMER && kvm_xen_has_cap(EVTCHN_SEND)) { 504c723d4c1SDavid Woodhouse async_run_on_cpu(cs, do_set_vcpu_timer_virq, 505c723d4c1SDavid Woodhouse RUN_ON_CPU_HOST_INT(port)); 506c723d4c1SDavid Woodhouse } 507c723d4c1SDavid Woodhouse return 0; 508c723d4c1SDavid Woodhouse } 509c723d4c1SDavid Woodhouse 510f0689302SJoao Martins static void do_set_vcpu_time_info_gpa(CPUState *cs, run_on_cpu_data data) 511f0689302SJoao Martins { 512f0689302SJoao Martins X86CPU *cpu = X86_CPU(cs); 513f0689302SJoao Martins CPUX86State *env = &cpu->env; 514f0689302SJoao Martins 515f0689302SJoao Martins env->xen_vcpu_time_info_gpa = data.host_ulong; 516f0689302SJoao Martins 517f0689302SJoao Martins kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO, 518f0689302SJoao Martins env->xen_vcpu_time_info_gpa); 519f0689302SJoao Martins } 520f0689302SJoao Martins 5215092db87SJoao Martins static void do_set_vcpu_runstate_gpa(CPUState *cs, run_on_cpu_data data) 5225092db87SJoao Martins { 5235092db87SJoao Martins X86CPU *cpu = X86_CPU(cs); 5245092db87SJoao Martins CPUX86State *env = &cpu->env; 5255092db87SJoao Martins 5265092db87SJoao Martins env->xen_vcpu_runstate_gpa = data.host_ulong; 5275092db87SJoao Martins 5285092db87SJoao Martins kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR, 5295092db87SJoao Martins env->xen_vcpu_runstate_gpa); 5305092db87SJoao Martins } 5315092db87SJoao Martins 532c345104cSJoao Martins static void do_vcpu_soft_reset(CPUState *cs, run_on_cpu_data data) 533c345104cSJoao Martins { 534c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs); 535c345104cSJoao Martins CPUX86State *env = &cpu->env; 536c345104cSJoao Martins 537c345104cSJoao Martins env->xen_vcpu_info_gpa = INVALID_GPA; 538c345104cSJoao Martins env->xen_vcpu_info_default_gpa = INVALID_GPA; 539f0689302SJoao Martins env->xen_vcpu_time_info_gpa = INVALID_GPA; 5405092db87SJoao Martins env->xen_vcpu_runstate_gpa = INVALID_GPA; 541105b47fdSAnkur Arora env->xen_vcpu_callback_vector = 0; 542c723d4c1SDavid Woodhouse env->xen_singleshot_timer_ns = 0; 543c723d4c1SDavid Woodhouse memset(env->xen_virq, 0, sizeof(env->xen_virq)); 544c345104cSJoao Martins 54527d4075dSDavid Woodhouse set_vcpu_info(cs, INVALID_GPA); 546f0689302SJoao Martins kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO, 547f0689302SJoao Martins INVALID_GPA); 5485092db87SJoao Martins kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR, 5495092db87SJoao Martins INVALID_GPA); 550105b47fdSAnkur Arora if (kvm_xen_has_cap(EVTCHN_SEND)) { 551105b47fdSAnkur Arora kvm_xen_set_vcpu_callback_vector(cs); 552c723d4c1SDavid Woodhouse kvm_xen_set_vcpu_timer(cs); 553105b47fdSAnkur Arora } 5545092db87SJoao Martins 555c345104cSJoao Martins } 556c345104cSJoao Martins 557fb0fd2ceSJoao Martins static int xen_set_shared_info(uint64_t gfn) 558fb0fd2ceSJoao Martins { 559fb0fd2ceSJoao Martins uint64_t gpa = gfn << TARGET_PAGE_BITS; 560c345104cSJoao Martins int i, err; 561fb0fd2ceSJoao Martins 562fb0fd2ceSJoao Martins QEMU_IOTHREAD_LOCK_GUARD(); 563fb0fd2ceSJoao Martins 564fb0fd2ceSJoao Martins /* 565fb0fd2ceSJoao Martins * The xen_overlay device tells KVM about it too, since it had to 566fb0fd2ceSJoao Martins * do that on migration load anyway (unless we're going to jump 567fb0fd2ceSJoao Martins * through lots of hoops to maintain the fiction that this isn't 568fb0fd2ceSJoao Martins * KVM-specific. 569fb0fd2ceSJoao Martins */ 570fb0fd2ceSJoao Martins err = xen_overlay_map_shinfo_page(gpa); 571fb0fd2ceSJoao Martins if (err) { 572fb0fd2ceSJoao Martins return err; 573fb0fd2ceSJoao Martins } 574fb0fd2ceSJoao Martins 575fb0fd2ceSJoao Martins trace_kvm_xen_set_shared_info(gfn); 576fb0fd2ceSJoao Martins 577c345104cSJoao Martins for (i = 0; i < XEN_LEGACY_MAX_VCPUS; i++) { 578c345104cSJoao Martins CPUState *cpu = qemu_get_cpu(i); 579c345104cSJoao Martins if (cpu) { 580c345104cSJoao Martins async_run_on_cpu(cpu, do_set_vcpu_info_default_gpa, 581c345104cSJoao Martins RUN_ON_CPU_HOST_ULONG(gpa)); 582c345104cSJoao Martins } 583c345104cSJoao Martins gpa += sizeof(vcpu_info_t); 584c345104cSJoao Martins } 585c345104cSJoao Martins 586fb0fd2ceSJoao Martins return err; 587fb0fd2ceSJoao Martins } 588fb0fd2ceSJoao Martins 589fb0fd2ceSJoao Martins static int add_to_physmap_one(uint32_t space, uint64_t idx, uint64_t gfn) 590fb0fd2ceSJoao Martins { 591fb0fd2ceSJoao Martins switch (space) { 592fb0fd2ceSJoao Martins case XENMAPSPACE_shared_info: 593fb0fd2ceSJoao Martins if (idx > 0) { 594fb0fd2ceSJoao Martins return -EINVAL; 595fb0fd2ceSJoao Martins } 596fb0fd2ceSJoao Martins return xen_set_shared_info(gfn); 597fb0fd2ceSJoao Martins 598fb0fd2ceSJoao Martins case XENMAPSPACE_grant_table: 599a28b0fc0SDavid Woodhouse return xen_gnttab_map_page(idx, gfn); 600a28b0fc0SDavid Woodhouse 601fb0fd2ceSJoao Martins case XENMAPSPACE_gmfn: 602fb0fd2ceSJoao Martins case XENMAPSPACE_gmfn_range: 603fb0fd2ceSJoao Martins return -ENOTSUP; 604fb0fd2ceSJoao Martins 605fb0fd2ceSJoao Martins case XENMAPSPACE_gmfn_foreign: 606fb0fd2ceSJoao Martins case XENMAPSPACE_dev_mmio: 607fb0fd2ceSJoao Martins return -EPERM; 608fb0fd2ceSJoao Martins 609fb0fd2ceSJoao Martins default: 610fb0fd2ceSJoao Martins return -EINVAL; 611fb0fd2ceSJoao Martins } 612fb0fd2ceSJoao Martins } 613fb0fd2ceSJoao Martins 614fb0fd2ceSJoao Martins static int do_add_to_physmap(struct kvm_xen_exit *exit, X86CPU *cpu, 615fb0fd2ceSJoao Martins uint64_t arg) 616fb0fd2ceSJoao Martins { 617fb0fd2ceSJoao Martins struct xen_add_to_physmap xatp; 618fb0fd2ceSJoao Martins CPUState *cs = CPU(cpu); 619fb0fd2ceSJoao Martins 620fb0fd2ceSJoao Martins if (hypercall_compat32(exit->u.hcall.longmode)) { 621fb0fd2ceSJoao Martins struct compat_xen_add_to_physmap xatp32; 622fb0fd2ceSJoao Martins 623fb0fd2ceSJoao Martins qemu_build_assert(sizeof(struct compat_xen_add_to_physmap) == 16); 624fb0fd2ceSJoao Martins if (kvm_copy_from_gva(cs, arg, &xatp32, sizeof(xatp32))) { 625fb0fd2ceSJoao Martins return -EFAULT; 626fb0fd2ceSJoao Martins } 627fb0fd2ceSJoao Martins xatp.domid = xatp32.domid; 628fb0fd2ceSJoao Martins xatp.size = xatp32.size; 629fb0fd2ceSJoao Martins xatp.space = xatp32.space; 630fb0fd2ceSJoao Martins xatp.idx = xatp32.idx; 631fb0fd2ceSJoao Martins xatp.gpfn = xatp32.gpfn; 632fb0fd2ceSJoao Martins } else { 633fb0fd2ceSJoao Martins if (kvm_copy_from_gva(cs, arg, &xatp, sizeof(xatp))) { 634fb0fd2ceSJoao Martins return -EFAULT; 635fb0fd2ceSJoao Martins } 636fb0fd2ceSJoao Martins } 637fb0fd2ceSJoao Martins 638fb0fd2ceSJoao Martins if (xatp.domid != DOMID_SELF && xatp.domid != xen_domid) { 639fb0fd2ceSJoao Martins return -ESRCH; 640fb0fd2ceSJoao Martins } 641fb0fd2ceSJoao Martins 642fb0fd2ceSJoao Martins return add_to_physmap_one(xatp.space, xatp.idx, xatp.gpfn); 643fb0fd2ceSJoao Martins } 644fb0fd2ceSJoao Martins 645782a7960SDavid Woodhouse static int do_add_to_physmap_batch(struct kvm_xen_exit *exit, X86CPU *cpu, 646782a7960SDavid Woodhouse uint64_t arg) 647782a7960SDavid Woodhouse { 648782a7960SDavid Woodhouse struct xen_add_to_physmap_batch xatpb; 649782a7960SDavid Woodhouse unsigned long idxs_gva, gpfns_gva, errs_gva; 650782a7960SDavid Woodhouse CPUState *cs = CPU(cpu); 651782a7960SDavid Woodhouse size_t op_sz; 652782a7960SDavid Woodhouse 653782a7960SDavid Woodhouse if (hypercall_compat32(exit->u.hcall.longmode)) { 654782a7960SDavid Woodhouse struct compat_xen_add_to_physmap_batch xatpb32; 655782a7960SDavid Woodhouse 656782a7960SDavid Woodhouse qemu_build_assert(sizeof(struct compat_xen_add_to_physmap_batch) == 20); 657782a7960SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &xatpb32, sizeof(xatpb32))) { 658782a7960SDavid Woodhouse return -EFAULT; 659782a7960SDavid Woodhouse } 660782a7960SDavid Woodhouse xatpb.domid = xatpb32.domid; 661782a7960SDavid Woodhouse xatpb.space = xatpb32.space; 662782a7960SDavid Woodhouse xatpb.size = xatpb32.size; 663782a7960SDavid Woodhouse 664782a7960SDavid Woodhouse idxs_gva = xatpb32.idxs.c; 665782a7960SDavid Woodhouse gpfns_gva = xatpb32.gpfns.c; 666782a7960SDavid Woodhouse errs_gva = xatpb32.errs.c; 667782a7960SDavid Woodhouse op_sz = sizeof(uint32_t); 668782a7960SDavid Woodhouse } else { 669782a7960SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &xatpb, sizeof(xatpb))) { 670782a7960SDavid Woodhouse return -EFAULT; 671782a7960SDavid Woodhouse } 672782a7960SDavid Woodhouse op_sz = sizeof(unsigned long); 673782a7960SDavid Woodhouse idxs_gva = (unsigned long)xatpb.idxs.p; 674782a7960SDavid Woodhouse gpfns_gva = (unsigned long)xatpb.gpfns.p; 675782a7960SDavid Woodhouse errs_gva = (unsigned long)xatpb.errs.p; 676782a7960SDavid Woodhouse } 677782a7960SDavid Woodhouse 678782a7960SDavid Woodhouse if (xatpb.domid != DOMID_SELF && xatpb.domid != xen_domid) { 679782a7960SDavid Woodhouse return -ESRCH; 680782a7960SDavid Woodhouse } 681782a7960SDavid Woodhouse 682782a7960SDavid Woodhouse /* Explicitly invalid for the batch op. Not that we implement it anyway. */ 683782a7960SDavid Woodhouse if (xatpb.space == XENMAPSPACE_gmfn_range) { 684782a7960SDavid Woodhouse return -EINVAL; 685782a7960SDavid Woodhouse } 686782a7960SDavid Woodhouse 687782a7960SDavid Woodhouse while (xatpb.size--) { 688782a7960SDavid Woodhouse unsigned long idx = 0; 689782a7960SDavid Woodhouse unsigned long gpfn = 0; 690782a7960SDavid Woodhouse int err; 691782a7960SDavid Woodhouse 692782a7960SDavid Woodhouse /* For 32-bit compat this only copies the low 32 bits of each */ 693782a7960SDavid Woodhouse if (kvm_copy_from_gva(cs, idxs_gva, &idx, op_sz) || 694782a7960SDavid Woodhouse kvm_copy_from_gva(cs, gpfns_gva, &gpfn, op_sz)) { 695782a7960SDavid Woodhouse return -EFAULT; 696782a7960SDavid Woodhouse } 697782a7960SDavid Woodhouse idxs_gva += op_sz; 698782a7960SDavid Woodhouse gpfns_gva += op_sz; 699782a7960SDavid Woodhouse 700782a7960SDavid Woodhouse err = add_to_physmap_one(xatpb.space, idx, gpfn); 701782a7960SDavid Woodhouse 702782a7960SDavid Woodhouse if (kvm_copy_to_gva(cs, errs_gva, &err, sizeof(err))) { 703782a7960SDavid Woodhouse return -EFAULT; 704782a7960SDavid Woodhouse } 705782a7960SDavid Woodhouse errs_gva += sizeof(err); 706782a7960SDavid Woodhouse } 707782a7960SDavid Woodhouse return 0; 708782a7960SDavid Woodhouse } 709782a7960SDavid Woodhouse 710fb0fd2ceSJoao Martins static bool kvm_xen_hcall_memory_op(struct kvm_xen_exit *exit, X86CPU *cpu, 711fb0fd2ceSJoao Martins int cmd, uint64_t arg) 712fb0fd2ceSJoao Martins { 713fb0fd2ceSJoao Martins int err; 714fb0fd2ceSJoao Martins 715fb0fd2ceSJoao Martins switch (cmd) { 716fb0fd2ceSJoao Martins case XENMEM_add_to_physmap: 717fb0fd2ceSJoao Martins err = do_add_to_physmap(exit, cpu, arg); 718fb0fd2ceSJoao Martins break; 719fb0fd2ceSJoao Martins 720782a7960SDavid Woodhouse case XENMEM_add_to_physmap_batch: 721782a7960SDavid Woodhouse err = do_add_to_physmap_batch(exit, cpu, arg); 722782a7960SDavid Woodhouse break; 723782a7960SDavid Woodhouse 724fb0fd2ceSJoao Martins default: 725fb0fd2ceSJoao Martins return false; 726fb0fd2ceSJoao Martins } 727fb0fd2ceSJoao Martins 728fb0fd2ceSJoao Martins exit->u.hcall.result = err; 729fb0fd2ceSJoao Martins return true; 730fb0fd2ceSJoao Martins } 731fb0fd2ceSJoao Martins 7325dbcd01aSAnkur Arora static bool handle_set_param(struct kvm_xen_exit *exit, X86CPU *cpu, 7335dbcd01aSAnkur Arora uint64_t arg) 7345dbcd01aSAnkur Arora { 7355dbcd01aSAnkur Arora CPUState *cs = CPU(cpu); 7365dbcd01aSAnkur Arora struct xen_hvm_param hp; 7375dbcd01aSAnkur Arora int err = 0; 7385dbcd01aSAnkur Arora 7395dbcd01aSAnkur Arora /* No need for 32/64 compat handling */ 7405dbcd01aSAnkur Arora qemu_build_assert(sizeof(hp) == 16); 7415dbcd01aSAnkur Arora 7425dbcd01aSAnkur Arora if (kvm_copy_from_gva(cs, arg, &hp, sizeof(hp))) { 7435dbcd01aSAnkur Arora err = -EFAULT; 7445dbcd01aSAnkur Arora goto out; 7455dbcd01aSAnkur Arora } 7465dbcd01aSAnkur Arora 7475dbcd01aSAnkur Arora if (hp.domid != DOMID_SELF && hp.domid != xen_domid) { 7485dbcd01aSAnkur Arora err = -ESRCH; 7495dbcd01aSAnkur Arora goto out; 7505dbcd01aSAnkur Arora } 7515dbcd01aSAnkur Arora 7525dbcd01aSAnkur Arora switch (hp.index) { 75391cce756SDavid Woodhouse case HVM_PARAM_CALLBACK_IRQ: 7542aff696bSDavid Woodhouse qemu_mutex_lock_iothread(); 75591cce756SDavid Woodhouse err = xen_evtchn_set_callback_param(hp.value); 7562aff696bSDavid Woodhouse qemu_mutex_unlock_iothread(); 75791cce756SDavid Woodhouse xen_set_long_mode(exit->u.hcall.longmode); 75891cce756SDavid Woodhouse break; 7595dbcd01aSAnkur Arora default: 7605dbcd01aSAnkur Arora return false; 7615dbcd01aSAnkur Arora } 7625dbcd01aSAnkur Arora 7635dbcd01aSAnkur Arora out: 7645dbcd01aSAnkur Arora exit->u.hcall.result = err; 7655dbcd01aSAnkur Arora return true; 7665dbcd01aSAnkur Arora } 7675dbcd01aSAnkur Arora 768105b47fdSAnkur Arora static int kvm_xen_hcall_evtchn_upcall_vector(struct kvm_xen_exit *exit, 769105b47fdSAnkur Arora X86CPU *cpu, uint64_t arg) 770105b47fdSAnkur Arora { 771105b47fdSAnkur Arora struct xen_hvm_evtchn_upcall_vector up; 772105b47fdSAnkur Arora CPUState *target_cs; 773105b47fdSAnkur Arora 774105b47fdSAnkur Arora /* No need for 32/64 compat handling */ 775105b47fdSAnkur Arora qemu_build_assert(sizeof(up) == 8); 776105b47fdSAnkur Arora 777105b47fdSAnkur Arora if (kvm_copy_from_gva(CPU(cpu), arg, &up, sizeof(up))) { 778105b47fdSAnkur Arora return -EFAULT; 779105b47fdSAnkur Arora } 780105b47fdSAnkur Arora 781105b47fdSAnkur Arora if (up.vector < 0x10) { 782105b47fdSAnkur Arora return -EINVAL; 783105b47fdSAnkur Arora } 784105b47fdSAnkur Arora 785105b47fdSAnkur Arora target_cs = qemu_get_cpu(up.vcpu); 786105b47fdSAnkur Arora if (!target_cs) { 787105b47fdSAnkur Arora return -EINVAL; 788105b47fdSAnkur Arora } 789105b47fdSAnkur Arora 790105b47fdSAnkur Arora async_run_on_cpu(target_cs, do_set_vcpu_callback_vector, 791105b47fdSAnkur Arora RUN_ON_CPU_HOST_INT(up.vector)); 792105b47fdSAnkur Arora return 0; 793105b47fdSAnkur Arora } 794105b47fdSAnkur Arora 795671bfdcdSJoao Martins static bool kvm_xen_hcall_hvm_op(struct kvm_xen_exit *exit, X86CPU *cpu, 796671bfdcdSJoao Martins int cmd, uint64_t arg) 797671bfdcdSJoao Martins { 798105b47fdSAnkur Arora int ret = -ENOSYS; 799671bfdcdSJoao Martins switch (cmd) { 800105b47fdSAnkur Arora case HVMOP_set_evtchn_upcall_vector: 801105b47fdSAnkur Arora ret = kvm_xen_hcall_evtchn_upcall_vector(exit, cpu, 802105b47fdSAnkur Arora exit->u.hcall.params[0]); 803105b47fdSAnkur Arora break; 804105b47fdSAnkur Arora 805671bfdcdSJoao Martins case HVMOP_pagetable_dying: 806105b47fdSAnkur Arora ret = -ENOSYS; 807105b47fdSAnkur Arora break; 808671bfdcdSJoao Martins 8095dbcd01aSAnkur Arora case HVMOP_set_param: 8105dbcd01aSAnkur Arora return handle_set_param(exit, cpu, arg); 8115dbcd01aSAnkur Arora 812671bfdcdSJoao Martins default: 813671bfdcdSJoao Martins return false; 814671bfdcdSJoao Martins } 815105b47fdSAnkur Arora 816105b47fdSAnkur Arora exit->u.hcall.result = ret; 817105b47fdSAnkur Arora return true; 818671bfdcdSJoao Martins } 819671bfdcdSJoao Martins 820c345104cSJoao Martins static int vcpuop_register_vcpu_info(CPUState *cs, CPUState *target, 821c345104cSJoao Martins uint64_t arg) 822c345104cSJoao Martins { 823c345104cSJoao Martins struct vcpu_register_vcpu_info rvi; 824c345104cSJoao Martins uint64_t gpa; 825c345104cSJoao Martins 826c345104cSJoao Martins /* No need for 32/64 compat handling */ 827c345104cSJoao Martins qemu_build_assert(sizeof(rvi) == 16); 828c345104cSJoao Martins qemu_build_assert(sizeof(struct vcpu_info) == 64); 829c345104cSJoao Martins 830c345104cSJoao Martins if (!target) { 831c345104cSJoao Martins return -ENOENT; 832c345104cSJoao Martins } 833c345104cSJoao Martins 834c345104cSJoao Martins if (kvm_copy_from_gva(cs, arg, &rvi, sizeof(rvi))) { 835c345104cSJoao Martins return -EFAULT; 836c345104cSJoao Martins } 837c345104cSJoao Martins 838c345104cSJoao Martins if (rvi.offset > TARGET_PAGE_SIZE - sizeof(struct vcpu_info)) { 839c345104cSJoao Martins return -EINVAL; 840c345104cSJoao Martins } 841c345104cSJoao Martins 842c345104cSJoao Martins gpa = ((rvi.mfn << TARGET_PAGE_BITS) + rvi.offset); 843c345104cSJoao Martins async_run_on_cpu(target, do_set_vcpu_info_gpa, RUN_ON_CPU_HOST_ULONG(gpa)); 844c345104cSJoao Martins return 0; 845c345104cSJoao Martins } 846c345104cSJoao Martins 847f0689302SJoao Martins static int vcpuop_register_vcpu_time_info(CPUState *cs, CPUState *target, 848f0689302SJoao Martins uint64_t arg) 849f0689302SJoao Martins { 850f0689302SJoao Martins struct vcpu_register_time_memory_area tma; 851f0689302SJoao Martins uint64_t gpa; 852f0689302SJoao Martins size_t len; 853f0689302SJoao Martins 854f0689302SJoao Martins /* No need for 32/64 compat handling */ 855f0689302SJoao Martins qemu_build_assert(sizeof(tma) == 8); 856f0689302SJoao Martins qemu_build_assert(sizeof(struct vcpu_time_info) == 32); 857f0689302SJoao Martins 858f0689302SJoao Martins if (!target) { 859f0689302SJoao Martins return -ENOENT; 860f0689302SJoao Martins } 861f0689302SJoao Martins 862f0689302SJoao Martins if (kvm_copy_from_gva(cs, arg, &tma, sizeof(tma))) { 863f0689302SJoao Martins return -EFAULT; 864f0689302SJoao Martins } 865f0689302SJoao Martins 866f0689302SJoao Martins /* 867f0689302SJoao Martins * Xen actually uses the GVA and does the translation through the guest 868f0689302SJoao Martins * page tables each time. But Linux/KVM uses the GPA, on the assumption 869f0689302SJoao Martins * that guests only ever use *global* addresses (kernel virtual addresses) 870f0689302SJoao Martins * for it. If Linux is changed to redo the GVA→GPA translation each time, 871f0689302SJoao Martins * it will offer a new vCPU attribute for that, and we'll use it instead. 872f0689302SJoao Martins */ 873f0689302SJoao Martins if (!kvm_gva_to_gpa(cs, tma.addr.p, &gpa, &len, false) || 874f0689302SJoao Martins len < sizeof(struct vcpu_time_info)) { 875f0689302SJoao Martins return -EFAULT; 876f0689302SJoao Martins } 877f0689302SJoao Martins 878f0689302SJoao Martins async_run_on_cpu(target, do_set_vcpu_time_info_gpa, 879f0689302SJoao Martins RUN_ON_CPU_HOST_ULONG(gpa)); 880f0689302SJoao Martins return 0; 881f0689302SJoao Martins } 882f0689302SJoao Martins 8835092db87SJoao Martins static int vcpuop_register_runstate_info(CPUState *cs, CPUState *target, 8845092db87SJoao Martins uint64_t arg) 8855092db87SJoao Martins { 8865092db87SJoao Martins struct vcpu_register_runstate_memory_area rma; 8875092db87SJoao Martins uint64_t gpa; 8885092db87SJoao Martins size_t len; 8895092db87SJoao Martins 8905092db87SJoao Martins /* No need for 32/64 compat handling */ 8915092db87SJoao Martins qemu_build_assert(sizeof(rma) == 8); 8925092db87SJoao Martins /* The runstate area actually does change size, but Linux copes. */ 8935092db87SJoao Martins 8945092db87SJoao Martins if (!target) { 8955092db87SJoao Martins return -ENOENT; 8965092db87SJoao Martins } 8975092db87SJoao Martins 8985092db87SJoao Martins if (kvm_copy_from_gva(cs, arg, &rma, sizeof(rma))) { 8995092db87SJoao Martins return -EFAULT; 9005092db87SJoao Martins } 9015092db87SJoao Martins 9025092db87SJoao Martins /* As with vcpu_time_info, Xen actually uses the GVA but KVM doesn't. */ 9035092db87SJoao Martins if (!kvm_gva_to_gpa(cs, rma.addr.p, &gpa, &len, false)) { 9045092db87SJoao Martins return -EFAULT; 9055092db87SJoao Martins } 9065092db87SJoao Martins 9075092db87SJoao Martins async_run_on_cpu(target, do_set_vcpu_runstate_gpa, 9085092db87SJoao Martins RUN_ON_CPU_HOST_ULONG(gpa)); 9095092db87SJoao Martins return 0; 9105092db87SJoao Martins } 9115092db87SJoao Martins 912b746a779SJoao Martins static uint64_t kvm_get_current_ns(void) 913b746a779SJoao Martins { 914b746a779SJoao Martins struct kvm_clock_data data; 915b746a779SJoao Martins int ret; 916b746a779SJoao Martins 917b746a779SJoao Martins ret = kvm_vm_ioctl(kvm_state, KVM_GET_CLOCK, &data); 918b746a779SJoao Martins if (ret < 0) { 919b746a779SJoao Martins fprintf(stderr, "KVM_GET_CLOCK failed: %s\n", strerror(ret)); 920b746a779SJoao Martins abort(); 921b746a779SJoao Martins } 922b746a779SJoao Martins 923b746a779SJoao Martins return data.clock; 924b746a779SJoao Martins } 925b746a779SJoao Martins 926b746a779SJoao Martins static void xen_vcpu_singleshot_timer_event(void *opaque) 927b746a779SJoao Martins { 928b746a779SJoao Martins CPUState *cpu = opaque; 929b746a779SJoao Martins CPUX86State *env = &X86_CPU(cpu)->env; 930b746a779SJoao Martins uint16_t port = env->xen_virq[VIRQ_TIMER]; 931b746a779SJoao Martins 932b746a779SJoao Martins if (likely(port)) { 933b746a779SJoao Martins xen_evtchn_set_port(port); 934b746a779SJoao Martins } 935b746a779SJoao Martins 936b746a779SJoao Martins qemu_mutex_lock(&env->xen_timers_lock); 937b746a779SJoao Martins env->xen_singleshot_timer_ns = 0; 938b746a779SJoao Martins qemu_mutex_unlock(&env->xen_timers_lock); 939b746a779SJoao Martins } 940b746a779SJoao Martins 941b746a779SJoao Martins static void xen_vcpu_periodic_timer_event(void *opaque) 942b746a779SJoao Martins { 943b746a779SJoao Martins CPUState *cpu = opaque; 944b746a779SJoao Martins CPUX86State *env = &X86_CPU(cpu)->env; 945b746a779SJoao Martins uint16_t port = env->xen_virq[VIRQ_TIMER]; 946b746a779SJoao Martins int64_t qemu_now; 947b746a779SJoao Martins 948b746a779SJoao Martins if (likely(port)) { 949b746a779SJoao Martins xen_evtchn_set_port(port); 950b746a779SJoao Martins } 951b746a779SJoao Martins 952b746a779SJoao Martins qemu_mutex_lock(&env->xen_timers_lock); 953b746a779SJoao Martins 954b746a779SJoao Martins qemu_now = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL); 955b746a779SJoao Martins timer_mod_ns(env->xen_periodic_timer, 956b746a779SJoao Martins qemu_now + env->xen_periodic_timer_period); 957b746a779SJoao Martins 958b746a779SJoao Martins qemu_mutex_unlock(&env->xen_timers_lock); 959b746a779SJoao Martins } 960b746a779SJoao Martins 961b746a779SJoao Martins static int do_set_periodic_timer(CPUState *target, uint64_t period_ns) 962b746a779SJoao Martins { 963b746a779SJoao Martins CPUX86State *tenv = &X86_CPU(target)->env; 964b746a779SJoao Martins int64_t qemu_now; 965b746a779SJoao Martins 966b746a779SJoao Martins timer_del(tenv->xen_periodic_timer); 967b746a779SJoao Martins 968b746a779SJoao Martins qemu_mutex_lock(&tenv->xen_timers_lock); 969b746a779SJoao Martins 970b746a779SJoao Martins qemu_now = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL); 971b746a779SJoao Martins timer_mod_ns(tenv->xen_periodic_timer, qemu_now + period_ns); 972b746a779SJoao Martins tenv->xen_periodic_timer_period = period_ns; 973b746a779SJoao Martins 974b746a779SJoao Martins qemu_mutex_unlock(&tenv->xen_timers_lock); 975b746a779SJoao Martins return 0; 976b746a779SJoao Martins } 977b746a779SJoao Martins 978b746a779SJoao Martins #define MILLISECS(_ms) ((int64_t)((_ms) * 1000000ULL)) 979b746a779SJoao Martins #define MICROSECS(_us) ((int64_t)((_us) * 1000ULL)) 980b746a779SJoao Martins #define STIME_MAX ((time_t)((int64_t)~0ull >> 1)) 981b746a779SJoao Martins /* Chosen so (NOW() + delta) wont overflow without an uptime of 200 years */ 982b746a779SJoao Martins #define STIME_DELTA_MAX ((int64_t)((uint64_t)~0ull >> 2)) 983b746a779SJoao Martins 984b746a779SJoao Martins static int vcpuop_set_periodic_timer(CPUState *cs, CPUState *target, 985b746a779SJoao Martins uint64_t arg) 986b746a779SJoao Martins { 987b746a779SJoao Martins struct vcpu_set_periodic_timer spt; 988b746a779SJoao Martins 989b746a779SJoao Martins qemu_build_assert(sizeof(spt) == 8); 990b746a779SJoao Martins if (kvm_copy_from_gva(cs, arg, &spt, sizeof(spt))) { 991b746a779SJoao Martins return -EFAULT; 992b746a779SJoao Martins } 993b746a779SJoao Martins 994b746a779SJoao Martins if (spt.period_ns < MILLISECS(1) || spt.period_ns > STIME_DELTA_MAX) { 995b746a779SJoao Martins return -EINVAL; 996b746a779SJoao Martins } 997b746a779SJoao Martins 998b746a779SJoao Martins return do_set_periodic_timer(target, spt.period_ns); 999b746a779SJoao Martins } 1000b746a779SJoao Martins 1001b746a779SJoao Martins static int vcpuop_stop_periodic_timer(CPUState *target) 1002b746a779SJoao Martins { 1003b746a779SJoao Martins CPUX86State *tenv = &X86_CPU(target)->env; 1004b746a779SJoao Martins 1005b746a779SJoao Martins qemu_mutex_lock(&tenv->xen_timers_lock); 1006b746a779SJoao Martins 1007b746a779SJoao Martins timer_del(tenv->xen_periodic_timer); 1008b746a779SJoao Martins tenv->xen_periodic_timer_period = 0; 1009b746a779SJoao Martins 1010b746a779SJoao Martins qemu_mutex_unlock(&tenv->xen_timers_lock); 1011b746a779SJoao Martins return 0; 1012b746a779SJoao Martins } 1013b746a779SJoao Martins 1014b746a779SJoao Martins static int do_set_singleshot_timer(CPUState *cs, uint64_t timeout_abs, 1015b746a779SJoao Martins bool future, bool linux_wa) 1016b746a779SJoao Martins { 1017b746a779SJoao Martins CPUX86State *env = &X86_CPU(cs)->env; 1018b746a779SJoao Martins int64_t now = kvm_get_current_ns(); 1019b746a779SJoao Martins int64_t qemu_now = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL); 1020b746a779SJoao Martins int64_t delta = timeout_abs - now; 1021b746a779SJoao Martins 1022b746a779SJoao Martins if (future && timeout_abs < now) { 1023b746a779SJoao Martins return -ETIME; 1024b746a779SJoao Martins } 1025b746a779SJoao Martins 1026b746a779SJoao Martins if (linux_wa && unlikely((int64_t)timeout_abs < 0 || 1027b746a779SJoao Martins (delta > 0 && (uint32_t)(delta >> 50) != 0))) { 1028b746a779SJoao Martins /* 1029b746a779SJoao Martins * Xen has a 'Linux workaround' in do_set_timer_op() which checks 1030b746a779SJoao Martins * for negative absolute timeout values (caused by integer 1031b746a779SJoao Martins * overflow), and for values about 13 days in the future (2^50ns) 1032b746a779SJoao Martins * which would be caused by jiffies overflow. For those cases, it 1033b746a779SJoao Martins * sets the timeout 100ms in the future (not *too* soon, since if 1034b746a779SJoao Martins * a guest really did set a long timeout on purpose we don't want 1035b746a779SJoao Martins * to keep churning CPU time by waking it up). 1036b746a779SJoao Martins */ 1037b746a779SJoao Martins delta = (100 * SCALE_MS); 1038b746a779SJoao Martins timeout_abs = now + delta; 1039b746a779SJoao Martins } 1040b746a779SJoao Martins 1041b746a779SJoao Martins qemu_mutex_lock(&env->xen_timers_lock); 1042b746a779SJoao Martins 1043b746a779SJoao Martins timer_mod_ns(env->xen_singleshot_timer, qemu_now + delta); 1044b746a779SJoao Martins env->xen_singleshot_timer_ns = now + delta; 1045b746a779SJoao Martins 1046b746a779SJoao Martins qemu_mutex_unlock(&env->xen_timers_lock); 1047b746a779SJoao Martins return 0; 1048b746a779SJoao Martins } 1049b746a779SJoao Martins 1050b746a779SJoao Martins static int vcpuop_set_singleshot_timer(CPUState *cs, uint64_t arg) 1051b746a779SJoao Martins { 1052b746a779SJoao Martins struct vcpu_set_singleshot_timer sst = { 0 }; 1053b746a779SJoao Martins 1054b746a779SJoao Martins /* 1055b746a779SJoao Martins * The struct is a uint64_t followed by a uint32_t. On 32-bit that 1056b746a779SJoao Martins * makes it 12 bytes. On 64-bit it gets padded to 16. The parts 1057b746a779SJoao Martins * that get used are identical, and there's four bytes of padding 1058b746a779SJoao Martins * unused at the end. For true Xen compatibility we should attempt 1059b746a779SJoao Martins * to copy the full 16 bytes from 64-bit guests, and return -EFAULT 1060b746a779SJoao Martins * if we can't get the padding too. But that's daft. Just copy what 1061b746a779SJoao Martins * we need. 1062b746a779SJoao Martins */ 1063b746a779SJoao Martins qemu_build_assert(offsetof(struct vcpu_set_singleshot_timer, flags) == 8); 1064b746a779SJoao Martins qemu_build_assert(sizeof(sst) >= 12); 1065b746a779SJoao Martins 1066b746a779SJoao Martins if (kvm_copy_from_gva(cs, arg, &sst, 12)) { 1067b746a779SJoao Martins return -EFAULT; 1068b746a779SJoao Martins } 1069b746a779SJoao Martins 1070b746a779SJoao Martins return do_set_singleshot_timer(cs, sst.timeout_abs_ns, 1071b746a779SJoao Martins !!(sst.flags & VCPU_SSHOTTMR_future), 1072b746a779SJoao Martins false); 1073b746a779SJoao Martins } 1074b746a779SJoao Martins 1075b746a779SJoao Martins static int vcpuop_stop_singleshot_timer(CPUState *cs) 1076b746a779SJoao Martins { 1077b746a779SJoao Martins CPUX86State *env = &X86_CPU(cs)->env; 1078b746a779SJoao Martins 1079b746a779SJoao Martins qemu_mutex_lock(&env->xen_timers_lock); 1080b746a779SJoao Martins 1081b746a779SJoao Martins timer_del(env->xen_singleshot_timer); 1082b746a779SJoao Martins env->xen_singleshot_timer_ns = 0; 1083b746a779SJoao Martins 1084b746a779SJoao Martins qemu_mutex_unlock(&env->xen_timers_lock); 1085b746a779SJoao Martins return 0; 1086b746a779SJoao Martins } 1087b746a779SJoao Martins 1088b746a779SJoao Martins static bool kvm_xen_hcall_set_timer_op(struct kvm_xen_exit *exit, X86CPU *cpu, 1089b746a779SJoao Martins uint64_t timeout) 1090b746a779SJoao Martins { 1091b746a779SJoao Martins int err; 1092b746a779SJoao Martins 1093b746a779SJoao Martins if (unlikely(timeout == 0)) { 1094b746a779SJoao Martins err = vcpuop_stop_singleshot_timer(CPU(cpu)); 1095b746a779SJoao Martins } else { 1096b746a779SJoao Martins err = do_set_singleshot_timer(CPU(cpu), timeout, false, true); 1097b746a779SJoao Martins } 1098b746a779SJoao Martins exit->u.hcall.result = err; 1099b746a779SJoao Martins return true; 1100b746a779SJoao Martins } 1101b746a779SJoao Martins 1102d70bd6a4SJoao Martins static bool kvm_xen_hcall_vcpu_op(struct kvm_xen_exit *exit, X86CPU *cpu, 1103d70bd6a4SJoao Martins int cmd, int vcpu_id, uint64_t arg) 1104d70bd6a4SJoao Martins { 1105c345104cSJoao Martins CPUState *cs = CPU(cpu); 1106b746a779SJoao Martins CPUState *dest = cs->cpu_index == vcpu_id ? cs : qemu_get_cpu(vcpu_id); 1107d70bd6a4SJoao Martins int err; 1108d70bd6a4SJoao Martins 1109b746a779SJoao Martins if (!dest) { 1110b746a779SJoao Martins err = -ENOENT; 1111b746a779SJoao Martins goto out; 1112b746a779SJoao Martins } 1113b746a779SJoao Martins 1114d70bd6a4SJoao Martins switch (cmd) { 11155092db87SJoao Martins case VCPUOP_register_runstate_memory_area: 11165092db87SJoao Martins err = vcpuop_register_runstate_info(cs, dest, arg); 11175092db87SJoao Martins break; 1118f0689302SJoao Martins case VCPUOP_register_vcpu_time_memory_area: 1119f0689302SJoao Martins err = vcpuop_register_vcpu_time_info(cs, dest, arg); 1120f0689302SJoao Martins break; 1121d70bd6a4SJoao Martins case VCPUOP_register_vcpu_info: 1122c345104cSJoao Martins err = vcpuop_register_vcpu_info(cs, dest, arg); 1123d70bd6a4SJoao Martins break; 1124b746a779SJoao Martins case VCPUOP_set_singleshot_timer: { 1125b746a779SJoao Martins if (cs->cpu_index == vcpu_id) { 1126b746a779SJoao Martins err = vcpuop_set_singleshot_timer(dest, arg); 1127b746a779SJoao Martins } else { 1128b746a779SJoao Martins err = -EINVAL; 1129b746a779SJoao Martins } 1130b746a779SJoao Martins break; 1131b746a779SJoao Martins } 1132b746a779SJoao Martins case VCPUOP_stop_singleshot_timer: 1133b746a779SJoao Martins if (cs->cpu_index == vcpu_id) { 1134b746a779SJoao Martins err = vcpuop_stop_singleshot_timer(dest); 1135b746a779SJoao Martins } else { 1136b746a779SJoao Martins err = -EINVAL; 1137b746a779SJoao Martins } 1138b746a779SJoao Martins break; 1139b746a779SJoao Martins case VCPUOP_set_periodic_timer: { 1140b746a779SJoao Martins err = vcpuop_set_periodic_timer(cs, dest, arg); 1141b746a779SJoao Martins break; 1142b746a779SJoao Martins } 1143b746a779SJoao Martins case VCPUOP_stop_periodic_timer: 1144b746a779SJoao Martins err = vcpuop_stop_periodic_timer(dest); 1145b746a779SJoao Martins break; 1146d70bd6a4SJoao Martins 1147d70bd6a4SJoao Martins default: 1148d70bd6a4SJoao Martins return false; 1149d70bd6a4SJoao Martins } 1150d70bd6a4SJoao Martins 1151b746a779SJoao Martins out: 1152d70bd6a4SJoao Martins exit->u.hcall.result = err; 1153d70bd6a4SJoao Martins return true; 1154d70bd6a4SJoao Martins } 1155d70bd6a4SJoao Martins 11564858ba20SDavid Woodhouse static bool kvm_xen_hcall_evtchn_op(struct kvm_xen_exit *exit, X86CPU *cpu, 11573b06f29bSJoao Martins int cmd, uint64_t arg) 11583b06f29bSJoao Martins { 11594858ba20SDavid Woodhouse CPUState *cs = CPU(cpu); 11603b06f29bSJoao Martins int err = -ENOSYS; 11613b06f29bSJoao Martins 11623b06f29bSJoao Martins switch (cmd) { 11633b06f29bSJoao Martins case EVTCHNOP_init_control: 11643b06f29bSJoao Martins case EVTCHNOP_expand_array: 11653b06f29bSJoao Martins case EVTCHNOP_set_priority: 11663b06f29bSJoao Martins /* We do not support FIFO channels at this point */ 11673b06f29bSJoao Martins err = -ENOSYS; 11683b06f29bSJoao Martins break; 11693b06f29bSJoao Martins 11704858ba20SDavid Woodhouse case EVTCHNOP_status: { 11714858ba20SDavid Woodhouse struct evtchn_status status; 11724858ba20SDavid Woodhouse 11734858ba20SDavid Woodhouse qemu_build_assert(sizeof(status) == 24); 11744858ba20SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &status, sizeof(status))) { 11754858ba20SDavid Woodhouse err = -EFAULT; 11764858ba20SDavid Woodhouse break; 11774858ba20SDavid Woodhouse } 11784858ba20SDavid Woodhouse 11794858ba20SDavid Woodhouse err = xen_evtchn_status_op(&status); 11804858ba20SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &status, sizeof(status))) { 11814858ba20SDavid Woodhouse err = -EFAULT; 11824858ba20SDavid Woodhouse } 11834858ba20SDavid Woodhouse break; 11844858ba20SDavid Woodhouse } 118583eb5811SDavid Woodhouse case EVTCHNOP_close: { 118683eb5811SDavid Woodhouse struct evtchn_close close; 118783eb5811SDavid Woodhouse 118883eb5811SDavid Woodhouse qemu_build_assert(sizeof(close) == 4); 118983eb5811SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &close, sizeof(close))) { 119083eb5811SDavid Woodhouse err = -EFAULT; 119183eb5811SDavid Woodhouse break; 119283eb5811SDavid Woodhouse } 119383eb5811SDavid Woodhouse 119483eb5811SDavid Woodhouse err = xen_evtchn_close_op(&close); 119583eb5811SDavid Woodhouse break; 119683eb5811SDavid Woodhouse } 1197190cc3c0SDavid Woodhouse case EVTCHNOP_unmask: { 1198190cc3c0SDavid Woodhouse struct evtchn_unmask unmask; 1199190cc3c0SDavid Woodhouse 1200190cc3c0SDavid Woodhouse qemu_build_assert(sizeof(unmask) == 4); 1201190cc3c0SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &unmask, sizeof(unmask))) { 1202190cc3c0SDavid Woodhouse err = -EFAULT; 1203190cc3c0SDavid Woodhouse break; 1204190cc3c0SDavid Woodhouse } 1205190cc3c0SDavid Woodhouse 1206190cc3c0SDavid Woodhouse err = xen_evtchn_unmask_op(&unmask); 1207190cc3c0SDavid Woodhouse break; 1208190cc3c0SDavid Woodhouse } 1209c723d4c1SDavid Woodhouse case EVTCHNOP_bind_virq: { 1210c723d4c1SDavid Woodhouse struct evtchn_bind_virq virq; 1211c723d4c1SDavid Woodhouse 1212c723d4c1SDavid Woodhouse qemu_build_assert(sizeof(virq) == 12); 1213c723d4c1SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &virq, sizeof(virq))) { 1214c723d4c1SDavid Woodhouse err = -EFAULT; 1215c723d4c1SDavid Woodhouse break; 1216c723d4c1SDavid Woodhouse } 1217c723d4c1SDavid Woodhouse 1218c723d4c1SDavid Woodhouse err = xen_evtchn_bind_virq_op(&virq); 1219c723d4c1SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &virq, sizeof(virq))) { 1220c723d4c1SDavid Woodhouse err = -EFAULT; 1221c723d4c1SDavid Woodhouse } 1222c723d4c1SDavid Woodhouse break; 1223c723d4c1SDavid Woodhouse } 1224f5417856SDavid Woodhouse case EVTCHNOP_bind_ipi: { 1225f5417856SDavid Woodhouse struct evtchn_bind_ipi ipi; 1226f5417856SDavid Woodhouse 1227f5417856SDavid Woodhouse qemu_build_assert(sizeof(ipi) == 8); 1228f5417856SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &ipi, sizeof(ipi))) { 1229f5417856SDavid Woodhouse err = -EFAULT; 1230f5417856SDavid Woodhouse break; 1231f5417856SDavid Woodhouse } 1232f5417856SDavid Woodhouse 1233f5417856SDavid Woodhouse err = xen_evtchn_bind_ipi_op(&ipi); 1234f5417856SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &ipi, sizeof(ipi))) { 1235f5417856SDavid Woodhouse err = -EFAULT; 1236f5417856SDavid Woodhouse } 1237f5417856SDavid Woodhouse break; 1238f5417856SDavid Woodhouse } 1239cf7679abSDavid Woodhouse case EVTCHNOP_send: { 1240cf7679abSDavid Woodhouse struct evtchn_send send; 1241cf7679abSDavid Woodhouse 1242cf7679abSDavid Woodhouse qemu_build_assert(sizeof(send) == 4); 1243cf7679abSDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &send, sizeof(send))) { 1244cf7679abSDavid Woodhouse err = -EFAULT; 1245cf7679abSDavid Woodhouse break; 1246cf7679abSDavid Woodhouse } 1247cf7679abSDavid Woodhouse 1248cf7679abSDavid Woodhouse err = xen_evtchn_send_op(&send); 1249cf7679abSDavid Woodhouse break; 1250cf7679abSDavid Woodhouse } 1251e1db61b8SDavid Woodhouse case EVTCHNOP_alloc_unbound: { 1252e1db61b8SDavid Woodhouse struct evtchn_alloc_unbound alloc; 1253e1db61b8SDavid Woodhouse 1254e1db61b8SDavid Woodhouse qemu_build_assert(sizeof(alloc) == 8); 1255e1db61b8SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &alloc, sizeof(alloc))) { 1256e1db61b8SDavid Woodhouse err = -EFAULT; 1257e1db61b8SDavid Woodhouse break; 1258e1db61b8SDavid Woodhouse } 1259e1db61b8SDavid Woodhouse 1260e1db61b8SDavid Woodhouse err = xen_evtchn_alloc_unbound_op(&alloc); 1261e1db61b8SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &alloc, sizeof(alloc))) { 1262e1db61b8SDavid Woodhouse err = -EFAULT; 1263e1db61b8SDavid Woodhouse } 1264e1db61b8SDavid Woodhouse break; 1265e1db61b8SDavid Woodhouse } 126684327881SDavid Woodhouse case EVTCHNOP_bind_interdomain: { 126784327881SDavid Woodhouse struct evtchn_bind_interdomain interdomain; 126884327881SDavid Woodhouse 126984327881SDavid Woodhouse qemu_build_assert(sizeof(interdomain) == 12); 127084327881SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &interdomain, sizeof(interdomain))) { 127184327881SDavid Woodhouse err = -EFAULT; 127284327881SDavid Woodhouse break; 127384327881SDavid Woodhouse } 127484327881SDavid Woodhouse 127584327881SDavid Woodhouse err = xen_evtchn_bind_interdomain_op(&interdomain); 127684327881SDavid Woodhouse if (!err && 127784327881SDavid Woodhouse kvm_copy_to_gva(cs, arg, &interdomain, sizeof(interdomain))) { 127884327881SDavid Woodhouse err = -EFAULT; 127984327881SDavid Woodhouse } 128084327881SDavid Woodhouse break; 128184327881SDavid Woodhouse } 128230667046SDavid Woodhouse case EVTCHNOP_bind_vcpu: { 128330667046SDavid Woodhouse struct evtchn_bind_vcpu vcpu; 128430667046SDavid Woodhouse 128530667046SDavid Woodhouse qemu_build_assert(sizeof(vcpu) == 8); 128630667046SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &vcpu, sizeof(vcpu))) { 128730667046SDavid Woodhouse err = -EFAULT; 128830667046SDavid Woodhouse break; 128930667046SDavid Woodhouse } 129030667046SDavid Woodhouse 129130667046SDavid Woodhouse err = xen_evtchn_bind_vcpu_op(&vcpu); 129230667046SDavid Woodhouse break; 129330667046SDavid Woodhouse } 1294a15b1097SDavid Woodhouse case EVTCHNOP_reset: { 1295a15b1097SDavid Woodhouse struct evtchn_reset reset; 1296a15b1097SDavid Woodhouse 1297a15b1097SDavid Woodhouse qemu_build_assert(sizeof(reset) == 2); 1298a15b1097SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &reset, sizeof(reset))) { 1299a15b1097SDavid Woodhouse err = -EFAULT; 1300a15b1097SDavid Woodhouse break; 1301a15b1097SDavid Woodhouse } 1302a15b1097SDavid Woodhouse 1303a15b1097SDavid Woodhouse err = xen_evtchn_reset_op(&reset); 1304a15b1097SDavid Woodhouse break; 1305a15b1097SDavid Woodhouse } 13063b06f29bSJoao Martins default: 13073b06f29bSJoao Martins return false; 13083b06f29bSJoao Martins } 13093b06f29bSJoao Martins 13103b06f29bSJoao Martins exit->u.hcall.result = err; 13113b06f29bSJoao Martins return true; 13123b06f29bSJoao Martins } 13133b06f29bSJoao Martins 131479b7067dSJoao Martins int kvm_xen_soft_reset(void) 131579b7067dSJoao Martins { 1316c345104cSJoao Martins CPUState *cpu; 1317fb0fd2ceSJoao Martins int err; 1318fb0fd2ceSJoao Martins 131979b7067dSJoao Martins assert(qemu_mutex_iothread_locked()); 132079b7067dSJoao Martins 132179b7067dSJoao Martins trace_kvm_xen_soft_reset(); 132279b7067dSJoao Martins 1323a15b1097SDavid Woodhouse err = xen_evtchn_soft_reset(); 1324a15b1097SDavid Woodhouse if (err) { 1325a15b1097SDavid Woodhouse return err; 1326a15b1097SDavid Woodhouse } 1327a15b1097SDavid Woodhouse 132891cce756SDavid Woodhouse /* 132991cce756SDavid Woodhouse * Zero is the reset/startup state for HVM_PARAM_CALLBACK_IRQ. Strictly, 133091cce756SDavid Woodhouse * it maps to HVM_PARAM_CALLBACK_TYPE_GSI with GSI#0, but Xen refuses to 133191cce756SDavid Woodhouse * to deliver to the timer interrupt and treats that as 'disabled'. 133291cce756SDavid Woodhouse */ 133391cce756SDavid Woodhouse err = xen_evtchn_set_callback_param(0); 133491cce756SDavid Woodhouse if (err) { 133591cce756SDavid Woodhouse return err; 133691cce756SDavid Woodhouse } 133791cce756SDavid Woodhouse 1338c345104cSJoao Martins CPU_FOREACH(cpu) { 1339c345104cSJoao Martins async_run_on_cpu(cpu, do_vcpu_soft_reset, RUN_ON_CPU_NULL); 1340c345104cSJoao Martins } 1341c345104cSJoao Martins 1342fb0fd2ceSJoao Martins err = xen_overlay_map_shinfo_page(INVALID_GFN); 1343fb0fd2ceSJoao Martins if (err) { 1344fb0fd2ceSJoao Martins return err; 1345fb0fd2ceSJoao Martins } 1346fb0fd2ceSJoao Martins 134779b7067dSJoao Martins return 0; 134879b7067dSJoao Martins } 134979b7067dSJoao Martins 135079b7067dSJoao Martins static int schedop_shutdown(CPUState *cs, uint64_t arg) 135179b7067dSJoao Martins { 135279b7067dSJoao Martins struct sched_shutdown shutdown; 135379b7067dSJoao Martins int ret = 0; 135479b7067dSJoao Martins 135579b7067dSJoao Martins /* No need for 32/64 compat handling */ 135679b7067dSJoao Martins qemu_build_assert(sizeof(shutdown) == 4); 135779b7067dSJoao Martins 135879b7067dSJoao Martins if (kvm_copy_from_gva(cs, arg, &shutdown, sizeof(shutdown))) { 135979b7067dSJoao Martins return -EFAULT; 136079b7067dSJoao Martins } 136179b7067dSJoao Martins 136279b7067dSJoao Martins switch (shutdown.reason) { 136379b7067dSJoao Martins case SHUTDOWN_crash: 136479b7067dSJoao Martins cpu_dump_state(cs, stderr, CPU_DUMP_CODE); 136579b7067dSJoao Martins qemu_system_guest_panicked(NULL); 136679b7067dSJoao Martins break; 136779b7067dSJoao Martins 136879b7067dSJoao Martins case SHUTDOWN_reboot: 136979b7067dSJoao Martins qemu_system_reset_request(SHUTDOWN_CAUSE_GUEST_RESET); 137079b7067dSJoao Martins break; 137179b7067dSJoao Martins 137279b7067dSJoao Martins case SHUTDOWN_poweroff: 137379b7067dSJoao Martins qemu_system_shutdown_request(SHUTDOWN_CAUSE_GUEST_SHUTDOWN); 137479b7067dSJoao Martins break; 137579b7067dSJoao Martins 137679b7067dSJoao Martins case SHUTDOWN_soft_reset: 137779b7067dSJoao Martins qemu_mutex_lock_iothread(); 137879b7067dSJoao Martins ret = kvm_xen_soft_reset(); 137979b7067dSJoao Martins qemu_mutex_unlock_iothread(); 138079b7067dSJoao Martins break; 138179b7067dSJoao Martins 138279b7067dSJoao Martins default: 138379b7067dSJoao Martins ret = -EINVAL; 138479b7067dSJoao Martins break; 138579b7067dSJoao Martins } 138679b7067dSJoao Martins 138779b7067dSJoao Martins return ret; 138879b7067dSJoao Martins } 138979b7067dSJoao Martins 139079b7067dSJoao Martins static bool kvm_xen_hcall_sched_op(struct kvm_xen_exit *exit, X86CPU *cpu, 139179b7067dSJoao Martins int cmd, uint64_t arg) 139279b7067dSJoao Martins { 139379b7067dSJoao Martins CPUState *cs = CPU(cpu); 139479b7067dSJoao Martins int err = -ENOSYS; 139579b7067dSJoao Martins 139679b7067dSJoao Martins switch (cmd) { 139779b7067dSJoao Martins case SCHEDOP_shutdown: 139879b7067dSJoao Martins err = schedop_shutdown(cs, arg); 139979b7067dSJoao Martins break; 140079b7067dSJoao Martins 1401c789b9efSDavid Woodhouse case SCHEDOP_poll: 1402c789b9efSDavid Woodhouse /* 1403c789b9efSDavid Woodhouse * Linux will panic if this doesn't work. Just yield; it's not 1404c789b9efSDavid Woodhouse * worth overthinking it because with event channel handling 1405c789b9efSDavid Woodhouse * in KVM, the kernel will intercept this and it will never 1406c789b9efSDavid Woodhouse * reach QEMU anyway. The semantics of the hypercall explicltly 1407c789b9efSDavid Woodhouse * permit spurious wakeups. 1408c789b9efSDavid Woodhouse */ 1409c789b9efSDavid Woodhouse case SCHEDOP_yield: 1410c789b9efSDavid Woodhouse sched_yield(); 1411c789b9efSDavid Woodhouse err = 0; 1412c789b9efSDavid Woodhouse break; 1413c789b9efSDavid Woodhouse 141479b7067dSJoao Martins default: 141579b7067dSJoao Martins return false; 141679b7067dSJoao Martins } 141779b7067dSJoao Martins 141879b7067dSJoao Martins exit->u.hcall.result = err; 141979b7067dSJoao Martins return true; 142079b7067dSJoao Martins } 142179b7067dSJoao Martins 142228b7ae94SDavid Woodhouse static bool kvm_xen_hcall_gnttab_op(struct kvm_xen_exit *exit, X86CPU *cpu, 142328b7ae94SDavid Woodhouse int cmd, uint64_t arg, int count) 142428b7ae94SDavid Woodhouse { 142528b7ae94SDavid Woodhouse CPUState *cs = CPU(cpu); 142628b7ae94SDavid Woodhouse int err; 142728b7ae94SDavid Woodhouse 142828b7ae94SDavid Woodhouse switch (cmd) { 142928b7ae94SDavid Woodhouse case GNTTABOP_set_version: { 143028b7ae94SDavid Woodhouse struct gnttab_set_version set; 143128b7ae94SDavid Woodhouse 143228b7ae94SDavid Woodhouse qemu_build_assert(sizeof(set) == 4); 143328b7ae94SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &set, sizeof(set))) { 143428b7ae94SDavid Woodhouse err = -EFAULT; 143528b7ae94SDavid Woodhouse break; 143628b7ae94SDavid Woodhouse } 143728b7ae94SDavid Woodhouse 143828b7ae94SDavid Woodhouse err = xen_gnttab_set_version_op(&set); 143928b7ae94SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &set, sizeof(set))) { 144028b7ae94SDavid Woodhouse err = -EFAULT; 144128b7ae94SDavid Woodhouse } 144228b7ae94SDavid Woodhouse break; 144328b7ae94SDavid Woodhouse } 144428b7ae94SDavid Woodhouse case GNTTABOP_get_version: { 144528b7ae94SDavid Woodhouse struct gnttab_get_version get; 144628b7ae94SDavid Woodhouse 144728b7ae94SDavid Woodhouse qemu_build_assert(sizeof(get) == 8); 144828b7ae94SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &get, sizeof(get))) { 144928b7ae94SDavid Woodhouse err = -EFAULT; 145028b7ae94SDavid Woodhouse break; 145128b7ae94SDavid Woodhouse } 145228b7ae94SDavid Woodhouse 145328b7ae94SDavid Woodhouse err = xen_gnttab_get_version_op(&get); 145428b7ae94SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &get, sizeof(get))) { 145528b7ae94SDavid Woodhouse err = -EFAULT; 145628b7ae94SDavid Woodhouse } 145728b7ae94SDavid Woodhouse break; 145828b7ae94SDavid Woodhouse } 1459b46f9745SDavid Woodhouse case GNTTABOP_query_size: { 1460b46f9745SDavid Woodhouse struct gnttab_query_size size; 1461b46f9745SDavid Woodhouse 1462b46f9745SDavid Woodhouse qemu_build_assert(sizeof(size) == 16); 1463b46f9745SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &size, sizeof(size))) { 1464b46f9745SDavid Woodhouse err = -EFAULT; 1465b46f9745SDavid Woodhouse break; 1466b46f9745SDavid Woodhouse } 1467b46f9745SDavid Woodhouse 1468b46f9745SDavid Woodhouse err = xen_gnttab_query_size_op(&size); 1469b46f9745SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &size, sizeof(size))) { 1470b46f9745SDavid Woodhouse err = -EFAULT; 1471b46f9745SDavid Woodhouse } 1472b46f9745SDavid Woodhouse break; 1473b46f9745SDavid Woodhouse } 147428b7ae94SDavid Woodhouse case GNTTABOP_setup_table: 147528b7ae94SDavid Woodhouse case GNTTABOP_copy: 147628b7ae94SDavid Woodhouse case GNTTABOP_map_grant_ref: 147728b7ae94SDavid Woodhouse case GNTTABOP_unmap_grant_ref: 147828b7ae94SDavid Woodhouse case GNTTABOP_swap_grant_ref: 147928b7ae94SDavid Woodhouse return false; 148028b7ae94SDavid Woodhouse 148128b7ae94SDavid Woodhouse default: 148228b7ae94SDavid Woodhouse /* Xen explicitly returns -ENOSYS to HVM guests for all others */ 148328b7ae94SDavid Woodhouse err = -ENOSYS; 148428b7ae94SDavid Woodhouse break; 148528b7ae94SDavid Woodhouse } 148628b7ae94SDavid Woodhouse 148728b7ae94SDavid Woodhouse exit->u.hcall.result = err; 148828b7ae94SDavid Woodhouse return true; 148928b7ae94SDavid Woodhouse } 149028b7ae94SDavid Woodhouse 149155a3f666SJoao Martins static bool do_kvm_xen_handle_exit(X86CPU *cpu, struct kvm_xen_exit *exit) 149255a3f666SJoao Martins { 149355a3f666SJoao Martins uint16_t code = exit->u.hcall.input; 149455a3f666SJoao Martins 149555a3f666SJoao Martins if (exit->u.hcall.cpl > 0) { 149655a3f666SJoao Martins exit->u.hcall.result = -EPERM; 149755a3f666SJoao Martins return true; 149855a3f666SJoao Martins } 149955a3f666SJoao Martins 150055a3f666SJoao Martins switch (code) { 1501b746a779SJoao Martins case __HYPERVISOR_set_timer_op: 1502b746a779SJoao Martins if (exit->u.hcall.longmode) { 1503b746a779SJoao Martins return kvm_xen_hcall_set_timer_op(exit, cpu, 1504b746a779SJoao Martins exit->u.hcall.params[0]); 1505b746a779SJoao Martins } else { 1506b746a779SJoao Martins /* In 32-bit mode, the 64-bit timer value is in two args. */ 1507b746a779SJoao Martins uint64_t val = ((uint64_t)exit->u.hcall.params[1]) << 32 | 1508b746a779SJoao Martins (uint32_t)exit->u.hcall.params[0]; 1509b746a779SJoao Martins return kvm_xen_hcall_set_timer_op(exit, cpu, val); 1510b746a779SJoao Martins } 151128b7ae94SDavid Woodhouse case __HYPERVISOR_grant_table_op: 151228b7ae94SDavid Woodhouse return kvm_xen_hcall_gnttab_op(exit, cpu, exit->u.hcall.params[0], 151328b7ae94SDavid Woodhouse exit->u.hcall.params[1], 151428b7ae94SDavid Woodhouse exit->u.hcall.params[2]); 151579b7067dSJoao Martins case __HYPERVISOR_sched_op: 151679b7067dSJoao Martins return kvm_xen_hcall_sched_op(exit, cpu, exit->u.hcall.params[0], 151779b7067dSJoao Martins exit->u.hcall.params[1]); 15183b06f29bSJoao Martins case __HYPERVISOR_event_channel_op: 15194858ba20SDavid Woodhouse return kvm_xen_hcall_evtchn_op(exit, cpu, exit->u.hcall.params[0], 15203b06f29bSJoao Martins exit->u.hcall.params[1]); 1521d70bd6a4SJoao Martins case __HYPERVISOR_vcpu_op: 1522d70bd6a4SJoao Martins return kvm_xen_hcall_vcpu_op(exit, cpu, 1523d70bd6a4SJoao Martins exit->u.hcall.params[0], 1524d70bd6a4SJoao Martins exit->u.hcall.params[1], 1525d70bd6a4SJoao Martins exit->u.hcall.params[2]); 1526671bfdcdSJoao Martins case __HYPERVISOR_hvm_op: 1527671bfdcdSJoao Martins return kvm_xen_hcall_hvm_op(exit, cpu, exit->u.hcall.params[0], 1528671bfdcdSJoao Martins exit->u.hcall.params[1]); 1529fb0fd2ceSJoao Martins case __HYPERVISOR_memory_op: 1530fb0fd2ceSJoao Martins return kvm_xen_hcall_memory_op(exit, cpu, exit->u.hcall.params[0], 1531fb0fd2ceSJoao Martins exit->u.hcall.params[1]); 1532bedcc139SJoao Martins case __HYPERVISOR_xen_version: 1533bedcc139SJoao Martins return kvm_xen_hcall_xen_version(exit, cpu, exit->u.hcall.params[0], 1534bedcc139SJoao Martins exit->u.hcall.params[1]); 153555a3f666SJoao Martins default: 153655a3f666SJoao Martins return false; 153755a3f666SJoao Martins } 153855a3f666SJoao Martins } 153955a3f666SJoao Martins 154055a3f666SJoao Martins int kvm_xen_handle_exit(X86CPU *cpu, struct kvm_xen_exit *exit) 154155a3f666SJoao Martins { 154255a3f666SJoao Martins if (exit->type != KVM_EXIT_XEN_HCALL) { 154355a3f666SJoao Martins return -1; 154455a3f666SJoao Martins } 154555a3f666SJoao Martins 1546110a0ea5SDavid Woodhouse /* 1547110a0ea5SDavid Woodhouse * The kernel latches the guest 32/64 mode when the MSR is used to fill 1548110a0ea5SDavid Woodhouse * the hypercall page. So if we see a hypercall in a mode that doesn't 1549110a0ea5SDavid Woodhouse * match our own idea of the guest mode, fetch the kernel's idea of the 1550110a0ea5SDavid Woodhouse * "long mode" to remain in sync. 1551110a0ea5SDavid Woodhouse */ 1552110a0ea5SDavid Woodhouse if (exit->u.hcall.longmode != xen_is_long_mode()) { 1553110a0ea5SDavid Woodhouse xen_sync_long_mode(); 1554110a0ea5SDavid Woodhouse } 1555110a0ea5SDavid Woodhouse 155655a3f666SJoao Martins if (!do_kvm_xen_handle_exit(cpu, exit)) { 155755a3f666SJoao Martins /* 155855a3f666SJoao Martins * Some hypercalls will be deliberately "implemented" by returning 155955a3f666SJoao Martins * -ENOSYS. This case is for hypercalls which are unexpected. 156055a3f666SJoao Martins */ 156155a3f666SJoao Martins exit->u.hcall.result = -ENOSYS; 156255a3f666SJoao Martins qemu_log_mask(LOG_UNIMP, "Unimplemented Xen hypercall %" 156355a3f666SJoao Martins PRId64 " (0x%" PRIx64 " 0x%" PRIx64 " 0x%" PRIx64 ")\n", 156455a3f666SJoao Martins (uint64_t)exit->u.hcall.input, 156555a3f666SJoao Martins (uint64_t)exit->u.hcall.params[0], 156655a3f666SJoao Martins (uint64_t)exit->u.hcall.params[1], 156755a3f666SJoao Martins (uint64_t)exit->u.hcall.params[2]); 156855a3f666SJoao Martins } 156955a3f666SJoao Martins 157055a3f666SJoao Martins trace_kvm_xen_hypercall(CPU(cpu)->cpu_index, exit->u.hcall.cpl, 157155a3f666SJoao Martins exit->u.hcall.input, exit->u.hcall.params[0], 157255a3f666SJoao Martins exit->u.hcall.params[1], exit->u.hcall.params[2], 157355a3f666SJoao Martins exit->u.hcall.result); 157455a3f666SJoao Martins return 0; 157555a3f666SJoao Martins } 1576c345104cSJoao Martins 15776f43f2eeSDavid Woodhouse uint16_t kvm_xen_get_gnttab_max_frames(void) 15786f43f2eeSDavid Woodhouse { 15796f43f2eeSDavid Woodhouse KVMState *s = KVM_STATE(current_accel()); 15806f43f2eeSDavid Woodhouse return s->xen_gnttab_max_frames; 15816f43f2eeSDavid Woodhouse } 15826f43f2eeSDavid Woodhouse 1583c345104cSJoao Martins int kvm_put_xen_state(CPUState *cs) 1584c345104cSJoao Martins { 1585c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs); 1586c345104cSJoao Martins CPUX86State *env = &cpu->env; 1587c345104cSJoao Martins uint64_t gpa; 1588c345104cSJoao Martins int ret; 1589c345104cSJoao Martins 1590c345104cSJoao Martins gpa = env->xen_vcpu_info_gpa; 1591c345104cSJoao Martins if (gpa == INVALID_GPA) { 1592c345104cSJoao Martins gpa = env->xen_vcpu_info_default_gpa; 1593c345104cSJoao Martins } 1594c345104cSJoao Martins 1595c345104cSJoao Martins if (gpa != INVALID_GPA) { 159627d4075dSDavid Woodhouse ret = set_vcpu_info(cs, gpa); 1597c345104cSJoao Martins if (ret < 0) { 1598c345104cSJoao Martins return ret; 1599c345104cSJoao Martins } 1600c345104cSJoao Martins } 1601c345104cSJoao Martins 1602f0689302SJoao Martins gpa = env->xen_vcpu_time_info_gpa; 1603f0689302SJoao Martins if (gpa != INVALID_GPA) { 1604f0689302SJoao Martins ret = kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO, 1605f0689302SJoao Martins gpa); 1606f0689302SJoao Martins if (ret < 0) { 1607f0689302SJoao Martins return ret; 1608f0689302SJoao Martins } 1609f0689302SJoao Martins } 1610f0689302SJoao Martins 16115092db87SJoao Martins gpa = env->xen_vcpu_runstate_gpa; 16125092db87SJoao Martins if (gpa != INVALID_GPA) { 16135092db87SJoao Martins ret = kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR, 16145092db87SJoao Martins gpa); 16155092db87SJoao Martins if (ret < 0) { 16165092db87SJoao Martins return ret; 16175092db87SJoao Martins } 16185092db87SJoao Martins } 16195092db87SJoao Martins 1620b746a779SJoao Martins if (env->xen_periodic_timer_period) { 1621b746a779SJoao Martins ret = do_set_periodic_timer(cs, env->xen_periodic_timer_period); 1622b746a779SJoao Martins if (ret < 0) { 1623b746a779SJoao Martins return ret; 1624b746a779SJoao Martins } 1625b746a779SJoao Martins } 1626b746a779SJoao Martins 1627105b47fdSAnkur Arora if (!kvm_xen_has_cap(EVTCHN_SEND)) { 1628b746a779SJoao Martins /* 1629b746a779SJoao Martins * If the kernel has EVTCHN_SEND support then it handles timers too, 1630b746a779SJoao Martins * so the timer will be restored by kvm_xen_set_vcpu_timer() below. 1631b746a779SJoao Martins */ 1632b746a779SJoao Martins if (env->xen_singleshot_timer_ns) { 1633b746a779SJoao Martins ret = do_set_singleshot_timer(cs, env->xen_singleshot_timer_ns, 1634b746a779SJoao Martins false, false); 1635b746a779SJoao Martins if (ret < 0) { 1636b746a779SJoao Martins return ret; 1637b746a779SJoao Martins } 1638b746a779SJoao Martins } 1639105b47fdSAnkur Arora return 0; 1640105b47fdSAnkur Arora } 1641105b47fdSAnkur Arora 1642105b47fdSAnkur Arora if (env->xen_vcpu_callback_vector) { 1643105b47fdSAnkur Arora ret = kvm_xen_set_vcpu_callback_vector(cs); 1644105b47fdSAnkur Arora if (ret < 0) { 1645105b47fdSAnkur Arora return ret; 1646105b47fdSAnkur Arora } 1647105b47fdSAnkur Arora } 1648105b47fdSAnkur Arora 1649c723d4c1SDavid Woodhouse if (env->xen_virq[VIRQ_TIMER]) { 1650c723d4c1SDavid Woodhouse ret = kvm_xen_set_vcpu_timer(cs); 1651c723d4c1SDavid Woodhouse if (ret < 0) { 1652c723d4c1SDavid Woodhouse return ret; 1653c723d4c1SDavid Woodhouse } 1654c723d4c1SDavid Woodhouse } 1655c345104cSJoao Martins return 0; 1656c345104cSJoao Martins } 1657c345104cSJoao Martins 1658c345104cSJoao Martins int kvm_get_xen_state(CPUState *cs) 1659c345104cSJoao Martins { 1660c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs); 1661c345104cSJoao Martins CPUX86State *env = &cpu->env; 1662c345104cSJoao Martins uint64_t gpa; 1663c723d4c1SDavid Woodhouse int ret; 1664c345104cSJoao Martins 1665c345104cSJoao Martins /* 1666c345104cSJoao Martins * The kernel does not mark vcpu_info as dirty when it delivers interrupts 1667c345104cSJoao Martins * to it. It's up to userspace to *assume* that any page shared thus is 1668c345104cSJoao Martins * always considered dirty. The shared_info page is different since it's 1669c345104cSJoao Martins * an overlay and migrated separately anyway. 1670c345104cSJoao Martins */ 1671c345104cSJoao Martins gpa = env->xen_vcpu_info_gpa; 1672c345104cSJoao Martins if (gpa == INVALID_GPA) { 1673c345104cSJoao Martins gpa = env->xen_vcpu_info_default_gpa; 1674c345104cSJoao Martins } 1675c345104cSJoao Martins if (gpa != INVALID_GPA) { 1676c345104cSJoao Martins MemoryRegionSection mrs = memory_region_find(get_system_memory(), 1677c345104cSJoao Martins gpa, 1678c345104cSJoao Martins sizeof(struct vcpu_info)); 1679c345104cSJoao Martins if (mrs.mr && 1680c345104cSJoao Martins !int128_lt(mrs.size, int128_make64(sizeof(struct vcpu_info)))) { 1681c345104cSJoao Martins memory_region_set_dirty(mrs.mr, mrs.offset_within_region, 1682c345104cSJoao Martins sizeof(struct vcpu_info)); 1683c345104cSJoao Martins } 1684c345104cSJoao Martins } 1685c345104cSJoao Martins 1686c723d4c1SDavid Woodhouse if (!kvm_xen_has_cap(EVTCHN_SEND)) { 1687c723d4c1SDavid Woodhouse return 0; 1688c723d4c1SDavid Woodhouse } 1689c723d4c1SDavid Woodhouse 1690c723d4c1SDavid Woodhouse /* 1691c723d4c1SDavid Woodhouse * If the kernel is accelerating timers, read out the current value of the 1692c723d4c1SDavid Woodhouse * singleshot timer deadline. 1693c723d4c1SDavid Woodhouse */ 1694c723d4c1SDavid Woodhouse if (env->xen_virq[VIRQ_TIMER]) { 1695c723d4c1SDavid Woodhouse struct kvm_xen_vcpu_attr va = { 1696c723d4c1SDavid Woodhouse .type = KVM_XEN_VCPU_ATTR_TYPE_TIMER, 1697c723d4c1SDavid Woodhouse }; 1698c723d4c1SDavid Woodhouse ret = kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_GET_ATTR, &va); 1699c723d4c1SDavid Woodhouse if (ret < 0) { 1700c723d4c1SDavid Woodhouse return ret; 1701c723d4c1SDavid Woodhouse } 1702c723d4c1SDavid Woodhouse env->xen_singleshot_timer_ns = va.u.timer.expires_ns; 1703c723d4c1SDavid Woodhouse } 1704c723d4c1SDavid Woodhouse 1705c345104cSJoao Martins return 0; 1706c345104cSJoao Martins } 1707