xref: /qemu/target/i386/kvm/xen-emu.c (revision 8b57d5c523f8f1a650188ffa58939e1c5aaa6254)
161491cf4SDavid Woodhouse /*
261491cf4SDavid Woodhouse  * Xen HVM emulation support in KVM
361491cf4SDavid Woodhouse  *
461491cf4SDavid Woodhouse  * Copyright © 2019 Oracle and/or its affiliates. All rights reserved.
561491cf4SDavid Woodhouse  * Copyright © 2022 Amazon.com, Inc. or its affiliates. All Rights Reserved.
661491cf4SDavid Woodhouse  *
761491cf4SDavid Woodhouse  * This work is licensed under the terms of the GNU GPL, version 2 or later.
861491cf4SDavid Woodhouse  * See the COPYING file in the top-level directory.
961491cf4SDavid Woodhouse  *
1061491cf4SDavid Woodhouse  */
1161491cf4SDavid Woodhouse 
1261491cf4SDavid Woodhouse #include "qemu/osdep.h"
1355a3f666SJoao Martins #include "qemu/log.h"
1479b7067dSJoao Martins #include "qemu/main-loop.h"
15fb0fd2ceSJoao Martins #include "hw/xen/xen.h"
1661491cf4SDavid Woodhouse #include "sysemu/kvm_int.h"
1761491cf4SDavid Woodhouse #include "sysemu/kvm_xen.h"
1861491cf4SDavid Woodhouse #include "kvm/kvm_i386.h"
19bedcc139SJoao Martins #include "exec/address-spaces.h"
2061491cf4SDavid Woodhouse #include "xen-emu.h"
2155a3f666SJoao Martins #include "trace.h"
2279b7067dSJoao Martins #include "sysemu/runstate.h"
2361491cf4SDavid Woodhouse 
2427d4075dSDavid Woodhouse #include "hw/pci/msi.h"
2527d4075dSDavid Woodhouse #include "hw/i386/apic-msidef.h"
26*8b57d5c5SDavid Woodhouse #include "hw/i386/e820_memory_layout.h"
27110a0ea5SDavid Woodhouse #include "hw/i386/kvm/xen_overlay.h"
2891cce756SDavid Woodhouse #include "hw/i386/kvm/xen_evtchn.h"
29a28b0fc0SDavid Woodhouse #include "hw/i386/kvm/xen_gnttab.h"
30110a0ea5SDavid Woodhouse 
31bedcc139SJoao Martins #include "hw/xen/interface/version.h"
3279b7067dSJoao Martins #include "hw/xen/interface/sched.h"
33fb0fd2ceSJoao Martins #include "hw/xen/interface/memory.h"
34671bfdcdSJoao Martins #include "hw/xen/interface/hvm/hvm_op.h"
35105b47fdSAnkur Arora #include "hw/xen/interface/hvm/params.h"
36d70bd6a4SJoao Martins #include "hw/xen/interface/vcpu.h"
373b06f29bSJoao Martins #include "hw/xen/interface/event_channel.h"
3828b7ae94SDavid Woodhouse #include "hw/xen/interface/grant_table.h"
39fb0fd2ceSJoao Martins 
40fb0fd2ceSJoao Martins #include "xen-compat.h"
41fb0fd2ceSJoao Martins 
42b746a779SJoao Martins static void xen_vcpu_singleshot_timer_event(void *opaque);
43b746a779SJoao Martins static void xen_vcpu_periodic_timer_event(void *opaque);
44b746a779SJoao Martins 
45fb0fd2ceSJoao Martins #ifdef TARGET_X86_64
46fb0fd2ceSJoao Martins #define hypercall_compat32(longmode) (!(longmode))
47fb0fd2ceSJoao Martins #else
48fb0fd2ceSJoao Martins #define hypercall_compat32(longmode) (false)
49fb0fd2ceSJoao Martins #endif
50bedcc139SJoao Martins 
51f0689302SJoao Martins static bool kvm_gva_to_gpa(CPUState *cs, uint64_t gva, uint64_t *gpa,
52f0689302SJoao Martins                            size_t *len, bool is_write)
53bedcc139SJoao Martins {
54bedcc139SJoao Martins         struct kvm_translation tr = {
55bedcc139SJoao Martins             .linear_address = gva,
56bedcc139SJoao Martins         };
57bedcc139SJoao Martins 
58f0689302SJoao Martins         if (len) {
59f0689302SJoao Martins             *len = TARGET_PAGE_SIZE - (gva & ~TARGET_PAGE_MASK);
60f0689302SJoao Martins         }
61f0689302SJoao Martins 
62f0689302SJoao Martins         if (kvm_vcpu_ioctl(cs, KVM_TRANSLATE, &tr) || !tr.valid ||
63f0689302SJoao Martins             (is_write && !tr.writeable)) {
64f0689302SJoao Martins             return false;
65f0689302SJoao Martins         }
66f0689302SJoao Martins         *gpa = tr.physical_address;
67f0689302SJoao Martins         return true;
68f0689302SJoao Martins }
69f0689302SJoao Martins 
70f0689302SJoao Martins static int kvm_gva_rw(CPUState *cs, uint64_t gva, void *_buf, size_t sz,
71f0689302SJoao Martins                       bool is_write)
72f0689302SJoao Martins {
73f0689302SJoao Martins     uint8_t *buf = (uint8_t *)_buf;
74f0689302SJoao Martins     uint64_t gpa;
75f0689302SJoao Martins     size_t len;
76f0689302SJoao Martins 
77f0689302SJoao Martins     while (sz) {
78f0689302SJoao Martins         if (!kvm_gva_to_gpa(cs, gva, &gpa, &len, is_write)) {
79f0689302SJoao Martins             return -EFAULT;
80f0689302SJoao Martins         }
81bedcc139SJoao Martins         if (len > sz) {
82bedcc139SJoao Martins             len = sz;
83bedcc139SJoao Martins         }
84bedcc139SJoao Martins 
85f0689302SJoao Martins         cpu_physical_memory_rw(gpa, buf, len, is_write);
86bedcc139SJoao Martins 
87bedcc139SJoao Martins         buf += len;
88bedcc139SJoao Martins         sz -= len;
89bedcc139SJoao Martins         gva += len;
90bedcc139SJoao Martins     }
91bedcc139SJoao Martins 
92bedcc139SJoao Martins     return 0;
93bedcc139SJoao Martins }
94bedcc139SJoao Martins 
95bedcc139SJoao Martins static inline int kvm_copy_from_gva(CPUState *cs, uint64_t gva, void *buf,
96bedcc139SJoao Martins                                     size_t sz)
97bedcc139SJoao Martins {
98bedcc139SJoao Martins     return kvm_gva_rw(cs, gva, buf, sz, false);
99bedcc139SJoao Martins }
100bedcc139SJoao Martins 
101bedcc139SJoao Martins static inline int kvm_copy_to_gva(CPUState *cs, uint64_t gva, void *buf,
102bedcc139SJoao Martins                                   size_t sz)
103bedcc139SJoao Martins {
104bedcc139SJoao Martins     return kvm_gva_rw(cs, gva, buf, sz, true);
105bedcc139SJoao Martins }
106bedcc139SJoao Martins 
107f66b8a83SJoao Martins int kvm_xen_init(KVMState *s, uint32_t hypercall_msr)
10861491cf4SDavid Woodhouse {
10961491cf4SDavid Woodhouse     const int required_caps = KVM_XEN_HVM_CONFIG_HYPERCALL_MSR |
11061491cf4SDavid Woodhouse         KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL | KVM_XEN_HVM_CONFIG_SHARED_INFO;
11161491cf4SDavid Woodhouse     struct kvm_xen_hvm_config cfg = {
112f66b8a83SJoao Martins         .msr = hypercall_msr,
11361491cf4SDavid Woodhouse         .flags = KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL,
11461491cf4SDavid Woodhouse     };
11561491cf4SDavid Woodhouse     int xen_caps, ret;
11661491cf4SDavid Woodhouse 
11761491cf4SDavid Woodhouse     xen_caps = kvm_check_extension(s, KVM_CAP_XEN_HVM);
11861491cf4SDavid Woodhouse     if (required_caps & ~xen_caps) {
11961491cf4SDavid Woodhouse         error_report("kvm: Xen HVM guest support not present or insufficient");
12061491cf4SDavid Woodhouse         return -ENOSYS;
12161491cf4SDavid Woodhouse     }
12261491cf4SDavid Woodhouse 
12361491cf4SDavid Woodhouse     if (xen_caps & KVM_XEN_HVM_CONFIG_EVTCHN_SEND) {
12461491cf4SDavid Woodhouse         struct kvm_xen_hvm_attr ha = {
12561491cf4SDavid Woodhouse             .type = KVM_XEN_ATTR_TYPE_XEN_VERSION,
12661491cf4SDavid Woodhouse             .u.xen_version = s->xen_version,
12761491cf4SDavid Woodhouse         };
12861491cf4SDavid Woodhouse         (void)kvm_vm_ioctl(s, KVM_XEN_HVM_SET_ATTR, &ha);
12961491cf4SDavid Woodhouse 
13061491cf4SDavid Woodhouse         cfg.flags |= KVM_XEN_HVM_CONFIG_EVTCHN_SEND;
13161491cf4SDavid Woodhouse     }
13261491cf4SDavid Woodhouse 
13361491cf4SDavid Woodhouse     ret = kvm_vm_ioctl(s, KVM_XEN_HVM_CONFIG, &cfg);
13461491cf4SDavid Woodhouse     if (ret < 0) {
13561491cf4SDavid Woodhouse         error_report("kvm: Failed to enable Xen HVM support: %s",
13661491cf4SDavid Woodhouse                      strerror(-ret));
13761491cf4SDavid Woodhouse         return ret;
13861491cf4SDavid Woodhouse     }
13961491cf4SDavid Woodhouse 
1402aff696bSDavid Woodhouse     /* If called a second time, don't repeat the rest of the setup. */
1412aff696bSDavid Woodhouse     if (s->xen_caps) {
1422aff696bSDavid Woodhouse         return 0;
1432aff696bSDavid Woodhouse     }
1442aff696bSDavid Woodhouse 
1452aff696bSDavid Woodhouse     /*
1462aff696bSDavid Woodhouse      * Event channel delivery via GSI/PCI_INTX needs to poll the vcpu_info
1472aff696bSDavid Woodhouse      * of vCPU0 to deassert the IRQ when ->evtchn_upcall_pending is cleared.
1482aff696bSDavid Woodhouse      *
1492aff696bSDavid Woodhouse      * In the kernel, there's a notifier hook on the PIC/IOAPIC which allows
1502aff696bSDavid Woodhouse      * such things to be polled at precisely the right time. We *could* do
1512aff696bSDavid Woodhouse      * it nicely in the kernel: check vcpu_info[0]->evtchn_upcall_pending at
1522aff696bSDavid Woodhouse      * the moment the IRQ is acked, and see if it should be reasserted.
1532aff696bSDavid Woodhouse      *
1542aff696bSDavid Woodhouse      * But the in-kernel irqchip is deprecated, so we're unlikely to add
1552aff696bSDavid Woodhouse      * that support in the kernel. Insist on using the split irqchip mode
1562aff696bSDavid Woodhouse      * instead.
1572aff696bSDavid Woodhouse      *
1582aff696bSDavid Woodhouse      * This leaves us polling for the level going low in QEMU, which lacks
1592aff696bSDavid Woodhouse      * the appropriate hooks in its PIC/IOAPIC code. Even VFIO is sending a
1602aff696bSDavid Woodhouse      * spurious 'ack' to an INTX IRQ every time there's any MMIO access to
1612aff696bSDavid Woodhouse      * the device (for which it has to unmap the device and trap access, for
1622aff696bSDavid Woodhouse      * some period after an IRQ!!). In the Xen case, we do it on exit from
1632aff696bSDavid Woodhouse      * KVM_RUN, if the flag is set to say that the GSI is currently asserted.
1642aff696bSDavid Woodhouse      * Which is kind of icky, but less so than the VFIO one. I may fix them
1652aff696bSDavid Woodhouse      * both later...
1662aff696bSDavid Woodhouse      */
1672aff696bSDavid Woodhouse     if (!kvm_kernel_irqchip_split()) {
1682aff696bSDavid Woodhouse         error_report("kvm: Xen support requires kernel-irqchip=split");
1692aff696bSDavid Woodhouse         return -EINVAL;
1702aff696bSDavid Woodhouse     }
1712aff696bSDavid Woodhouse 
17261491cf4SDavid Woodhouse     s->xen_caps = xen_caps;
173*8b57d5c5SDavid Woodhouse 
174*8b57d5c5SDavid Woodhouse     /* Tell fw_cfg to notify the BIOS to reserve the range. */
175*8b57d5c5SDavid Woodhouse     ret = e820_add_entry(XEN_SPECIAL_AREA_ADDR, XEN_SPECIAL_AREA_SIZE,
176*8b57d5c5SDavid Woodhouse                          E820_RESERVED);
177*8b57d5c5SDavid Woodhouse     if (ret < 0) {
178*8b57d5c5SDavid Woodhouse         fprintf(stderr, "e820_add_entry() table is full\n");
179*8b57d5c5SDavid Woodhouse         return ret;
180*8b57d5c5SDavid Woodhouse     }
181*8b57d5c5SDavid Woodhouse 
18261491cf4SDavid Woodhouse     return 0;
18361491cf4SDavid Woodhouse }
18461491cf4SDavid Woodhouse 
1855e691a95SDavid Woodhouse int kvm_xen_init_vcpu(CPUState *cs)
1865e691a95SDavid Woodhouse {
187c345104cSJoao Martins     X86CPU *cpu = X86_CPU(cs);
188c345104cSJoao Martins     CPUX86State *env = &cpu->env;
1895e691a95SDavid Woodhouse     int err;
1905e691a95SDavid Woodhouse 
1915e691a95SDavid Woodhouse     /*
1925e691a95SDavid Woodhouse      * The kernel needs to know the Xen/ACPI vCPU ID because that's
1935e691a95SDavid Woodhouse      * what the guest uses in hypercalls such as timers. It doesn't
1945e691a95SDavid Woodhouse      * match the APIC ID which is generally used for talking to the
1955e691a95SDavid Woodhouse      * kernel about vCPUs. And if vCPU threads race with creating
1965e691a95SDavid Woodhouse      * their KVM vCPUs out of order, it doesn't necessarily match
1975e691a95SDavid Woodhouse      * with the kernel's internal vCPU indices either.
1985e691a95SDavid Woodhouse      */
1995e691a95SDavid Woodhouse     if (kvm_xen_has_cap(EVTCHN_SEND)) {
2005e691a95SDavid Woodhouse         struct kvm_xen_vcpu_attr va = {
2015e691a95SDavid Woodhouse             .type = KVM_XEN_VCPU_ATTR_TYPE_VCPU_ID,
2025e691a95SDavid Woodhouse             .u.vcpu_id = cs->cpu_index,
2035e691a95SDavid Woodhouse         };
2045e691a95SDavid Woodhouse         err = kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_SET_ATTR, &va);
2055e691a95SDavid Woodhouse         if (err) {
2065e691a95SDavid Woodhouse             error_report("kvm: Failed to set Xen vCPU ID attribute: %s",
2075e691a95SDavid Woodhouse                          strerror(-err));
2085e691a95SDavid Woodhouse             return err;
2095e691a95SDavid Woodhouse         }
2105e691a95SDavid Woodhouse     }
2115e691a95SDavid Woodhouse 
212c345104cSJoao Martins     env->xen_vcpu_info_gpa = INVALID_GPA;
213c345104cSJoao Martins     env->xen_vcpu_info_default_gpa = INVALID_GPA;
214f0689302SJoao Martins     env->xen_vcpu_time_info_gpa = INVALID_GPA;
2155092db87SJoao Martins     env->xen_vcpu_runstate_gpa = INVALID_GPA;
216c345104cSJoao Martins 
217b746a779SJoao Martins     qemu_mutex_init(&env->xen_timers_lock);
218b746a779SJoao Martins     env->xen_singleshot_timer = timer_new_ns(QEMU_CLOCK_VIRTUAL,
219b746a779SJoao Martins                                              xen_vcpu_singleshot_timer_event,
220b746a779SJoao Martins                                              cpu);
221b746a779SJoao Martins     if (!env->xen_singleshot_timer) {
222b746a779SJoao Martins         return -ENOMEM;
223b746a779SJoao Martins     }
224b746a779SJoao Martins     env->xen_singleshot_timer->opaque = cs;
225b746a779SJoao Martins 
226b746a779SJoao Martins     env->xen_periodic_timer = timer_new_ns(QEMU_CLOCK_VIRTUAL,
227b746a779SJoao Martins                                            xen_vcpu_periodic_timer_event,
228b746a779SJoao Martins                                            cpu);
229b746a779SJoao Martins     if (!env->xen_periodic_timer) {
230b746a779SJoao Martins         return -ENOMEM;
231b746a779SJoao Martins     }
232b746a779SJoao Martins     env->xen_periodic_timer->opaque = cs;
233b746a779SJoao Martins 
2345e691a95SDavid Woodhouse     return 0;
2355e691a95SDavid Woodhouse }
2365e691a95SDavid Woodhouse 
23761491cf4SDavid Woodhouse uint32_t kvm_xen_get_caps(void)
23861491cf4SDavid Woodhouse {
23961491cf4SDavid Woodhouse     return kvm_state->xen_caps;
24061491cf4SDavid Woodhouse }
24155a3f666SJoao Martins 
242bedcc139SJoao Martins static bool kvm_xen_hcall_xen_version(struct kvm_xen_exit *exit, X86CPU *cpu,
243bedcc139SJoao Martins                                      int cmd, uint64_t arg)
244bedcc139SJoao Martins {
245bedcc139SJoao Martins     int err = 0;
246bedcc139SJoao Martins 
247bedcc139SJoao Martins     switch (cmd) {
248bedcc139SJoao Martins     case XENVER_get_features: {
249bedcc139SJoao Martins         struct xen_feature_info fi;
250bedcc139SJoao Martins 
251bedcc139SJoao Martins         /* No need for 32/64 compat handling */
252bedcc139SJoao Martins         qemu_build_assert(sizeof(fi) == 8);
253bedcc139SJoao Martins 
254bedcc139SJoao Martins         err = kvm_copy_from_gva(CPU(cpu), arg, &fi, sizeof(fi));
255bedcc139SJoao Martins         if (err) {
256bedcc139SJoao Martins             break;
257bedcc139SJoao Martins         }
258bedcc139SJoao Martins 
259bedcc139SJoao Martins         fi.submap = 0;
260bedcc139SJoao Martins         if (fi.submap_idx == 0) {
261bedcc139SJoao Martins             fi.submap |= 1 << XENFEAT_writable_page_tables |
262bedcc139SJoao Martins                          1 << XENFEAT_writable_descriptor_tables |
263bedcc139SJoao Martins                          1 << XENFEAT_auto_translated_physmap |
264105b47fdSAnkur Arora                          1 << XENFEAT_supervisor_mode_kernel |
265b746a779SJoao Martins                          1 << XENFEAT_hvm_callback_vector |
266b746a779SJoao Martins                          1 << XENFEAT_hvm_safe_pvclock;
267bedcc139SJoao Martins         }
268bedcc139SJoao Martins 
269bedcc139SJoao Martins         err = kvm_copy_to_gva(CPU(cpu), arg, &fi, sizeof(fi));
270bedcc139SJoao Martins         break;
271bedcc139SJoao Martins     }
272bedcc139SJoao Martins 
273bedcc139SJoao Martins     default:
274bedcc139SJoao Martins         return false;
275bedcc139SJoao Martins     }
276bedcc139SJoao Martins 
277bedcc139SJoao Martins     exit->u.hcall.result = err;
278bedcc139SJoao Martins     return true;
279bedcc139SJoao Martins }
280bedcc139SJoao Martins 
281c345104cSJoao Martins static int kvm_xen_set_vcpu_attr(CPUState *cs, uint16_t type, uint64_t gpa)
282c345104cSJoao Martins {
283c345104cSJoao Martins     struct kvm_xen_vcpu_attr xhsi;
284c345104cSJoao Martins 
285c345104cSJoao Martins     xhsi.type = type;
286c345104cSJoao Martins     xhsi.u.gpa = gpa;
287c345104cSJoao Martins 
288c345104cSJoao Martins     trace_kvm_xen_set_vcpu_attr(cs->cpu_index, type, gpa);
289c345104cSJoao Martins 
290c345104cSJoao Martins     return kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_SET_ATTR, &xhsi);
291c345104cSJoao Martins }
292c345104cSJoao Martins 
293105b47fdSAnkur Arora static int kvm_xen_set_vcpu_callback_vector(CPUState *cs)
294105b47fdSAnkur Arora {
295105b47fdSAnkur Arora     uint8_t vector = X86_CPU(cs)->env.xen_vcpu_callback_vector;
296105b47fdSAnkur Arora     struct kvm_xen_vcpu_attr xva;
297105b47fdSAnkur Arora 
298105b47fdSAnkur Arora     xva.type = KVM_XEN_VCPU_ATTR_TYPE_UPCALL_VECTOR;
299105b47fdSAnkur Arora     xva.u.vector = vector;
300105b47fdSAnkur Arora 
301105b47fdSAnkur Arora     trace_kvm_xen_set_vcpu_callback(cs->cpu_index, vector);
302105b47fdSAnkur Arora 
303105b47fdSAnkur Arora     return kvm_vcpu_ioctl(cs, KVM_XEN_HVM_SET_ATTR, &xva);
304105b47fdSAnkur Arora }
305105b47fdSAnkur Arora 
306105b47fdSAnkur Arora static void do_set_vcpu_callback_vector(CPUState *cs, run_on_cpu_data data)
307105b47fdSAnkur Arora {
308105b47fdSAnkur Arora     X86CPU *cpu = X86_CPU(cs);
309105b47fdSAnkur Arora     CPUX86State *env = &cpu->env;
310105b47fdSAnkur Arora 
311105b47fdSAnkur Arora     env->xen_vcpu_callback_vector = data.host_int;
312105b47fdSAnkur Arora 
313105b47fdSAnkur Arora     if (kvm_xen_has_cap(EVTCHN_SEND)) {
314105b47fdSAnkur Arora         kvm_xen_set_vcpu_callback_vector(cs);
315105b47fdSAnkur Arora     }
316105b47fdSAnkur Arora }
317105b47fdSAnkur Arora 
31827d4075dSDavid Woodhouse static int set_vcpu_info(CPUState *cs, uint64_t gpa)
31927d4075dSDavid Woodhouse {
32027d4075dSDavid Woodhouse     X86CPU *cpu = X86_CPU(cs);
32127d4075dSDavid Woodhouse     CPUX86State *env = &cpu->env;
32227d4075dSDavid Woodhouse     MemoryRegionSection mrs = { .mr = NULL };
32327d4075dSDavid Woodhouse     void *vcpu_info_hva = NULL;
32427d4075dSDavid Woodhouse     int ret;
32527d4075dSDavid Woodhouse 
32627d4075dSDavid Woodhouse     ret = kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_INFO, gpa);
32727d4075dSDavid Woodhouse     if (ret || gpa == INVALID_GPA) {
32827d4075dSDavid Woodhouse         goto out;
32927d4075dSDavid Woodhouse     }
33027d4075dSDavid Woodhouse 
33127d4075dSDavid Woodhouse     mrs = memory_region_find(get_system_memory(), gpa,
33227d4075dSDavid Woodhouse                              sizeof(struct vcpu_info));
33327d4075dSDavid Woodhouse     if (mrs.mr && mrs.mr->ram_block &&
33427d4075dSDavid Woodhouse         !int128_lt(mrs.size, int128_make64(sizeof(struct vcpu_info)))) {
33527d4075dSDavid Woodhouse         vcpu_info_hva = qemu_map_ram_ptr(mrs.mr->ram_block,
33627d4075dSDavid Woodhouse                                          mrs.offset_within_region);
33727d4075dSDavid Woodhouse     }
33827d4075dSDavid Woodhouse     if (!vcpu_info_hva) {
33927d4075dSDavid Woodhouse         if (mrs.mr) {
34027d4075dSDavid Woodhouse             memory_region_unref(mrs.mr);
34127d4075dSDavid Woodhouse             mrs.mr = NULL;
34227d4075dSDavid Woodhouse         }
34327d4075dSDavid Woodhouse         ret = -EINVAL;
34427d4075dSDavid Woodhouse     }
34527d4075dSDavid Woodhouse 
34627d4075dSDavid Woodhouse  out:
34727d4075dSDavid Woodhouse     if (env->xen_vcpu_info_mr) {
34827d4075dSDavid Woodhouse         memory_region_unref(env->xen_vcpu_info_mr);
34927d4075dSDavid Woodhouse     }
35027d4075dSDavid Woodhouse     env->xen_vcpu_info_hva = vcpu_info_hva;
35127d4075dSDavid Woodhouse     env->xen_vcpu_info_mr = mrs.mr;
35227d4075dSDavid Woodhouse     return ret;
35327d4075dSDavid Woodhouse }
35427d4075dSDavid Woodhouse 
355c345104cSJoao Martins static void do_set_vcpu_info_default_gpa(CPUState *cs, run_on_cpu_data data)
356c345104cSJoao Martins {
357c345104cSJoao Martins     X86CPU *cpu = X86_CPU(cs);
358c345104cSJoao Martins     CPUX86State *env = &cpu->env;
359c345104cSJoao Martins 
360c345104cSJoao Martins     env->xen_vcpu_info_default_gpa = data.host_ulong;
361c345104cSJoao Martins 
362c345104cSJoao Martins     /* Changing the default does nothing if a vcpu_info was explicitly set. */
363c345104cSJoao Martins     if (env->xen_vcpu_info_gpa == INVALID_GPA) {
36427d4075dSDavid Woodhouse         set_vcpu_info(cs, env->xen_vcpu_info_default_gpa);
365c345104cSJoao Martins     }
366c345104cSJoao Martins }
367c345104cSJoao Martins 
368c345104cSJoao Martins static void do_set_vcpu_info_gpa(CPUState *cs, run_on_cpu_data data)
369c345104cSJoao Martins {
370c345104cSJoao Martins     X86CPU *cpu = X86_CPU(cs);
371c345104cSJoao Martins     CPUX86State *env = &cpu->env;
372c345104cSJoao Martins 
373c345104cSJoao Martins     env->xen_vcpu_info_gpa = data.host_ulong;
374c345104cSJoao Martins 
37527d4075dSDavid Woodhouse     set_vcpu_info(cs, env->xen_vcpu_info_gpa);
37627d4075dSDavid Woodhouse }
37727d4075dSDavid Woodhouse 
37827d4075dSDavid Woodhouse void *kvm_xen_get_vcpu_info_hva(uint32_t vcpu_id)
37927d4075dSDavid Woodhouse {
38027d4075dSDavid Woodhouse     CPUState *cs = qemu_get_cpu(vcpu_id);
38127d4075dSDavid Woodhouse     if (!cs) {
38227d4075dSDavid Woodhouse         return NULL;
38327d4075dSDavid Woodhouse     }
38427d4075dSDavid Woodhouse 
38527d4075dSDavid Woodhouse     return X86_CPU(cs)->env.xen_vcpu_info_hva;
38627d4075dSDavid Woodhouse }
38727d4075dSDavid Woodhouse 
388ddf0fd9aSDavid Woodhouse void kvm_xen_maybe_deassert_callback(CPUState *cs)
389ddf0fd9aSDavid Woodhouse {
390ddf0fd9aSDavid Woodhouse     CPUX86State *env = &X86_CPU(cs)->env;
391ddf0fd9aSDavid Woodhouse     struct vcpu_info *vi = env->xen_vcpu_info_hva;
392ddf0fd9aSDavid Woodhouse     if (!vi) {
393ddf0fd9aSDavid Woodhouse         return;
394ddf0fd9aSDavid Woodhouse     }
395ddf0fd9aSDavid Woodhouse 
396ddf0fd9aSDavid Woodhouse     /* If the evtchn_upcall_pending flag is cleared, turn the GSI off. */
397ddf0fd9aSDavid Woodhouse     if (!vi->evtchn_upcall_pending) {
398ddf0fd9aSDavid Woodhouse         qemu_mutex_lock_iothread();
399ddf0fd9aSDavid Woodhouse         /*
400ddf0fd9aSDavid Woodhouse          * Check again now we have the lock, because it may have been
401ddf0fd9aSDavid Woodhouse          * asserted in the interim. And we don't want to take the lock
402ddf0fd9aSDavid Woodhouse          * every time because this is a fast path.
403ddf0fd9aSDavid Woodhouse          */
404ddf0fd9aSDavid Woodhouse         if (!vi->evtchn_upcall_pending) {
405ddf0fd9aSDavid Woodhouse             X86_CPU(cs)->env.xen_callback_asserted = false;
406ddf0fd9aSDavid Woodhouse             xen_evtchn_set_callback_level(0);
407ddf0fd9aSDavid Woodhouse         }
408ddf0fd9aSDavid Woodhouse         qemu_mutex_unlock_iothread();
409ddf0fd9aSDavid Woodhouse     }
410ddf0fd9aSDavid Woodhouse }
411ddf0fd9aSDavid Woodhouse 
412ddf0fd9aSDavid Woodhouse void kvm_xen_set_callback_asserted(void)
413ddf0fd9aSDavid Woodhouse {
414ddf0fd9aSDavid Woodhouse     CPUState *cs = qemu_get_cpu(0);
415ddf0fd9aSDavid Woodhouse 
416ddf0fd9aSDavid Woodhouse     if (cs) {
417ddf0fd9aSDavid Woodhouse         X86_CPU(cs)->env.xen_callback_asserted = true;
418ddf0fd9aSDavid Woodhouse     }
419ddf0fd9aSDavid Woodhouse }
420ddf0fd9aSDavid Woodhouse 
42127d4075dSDavid Woodhouse void kvm_xen_inject_vcpu_callback_vector(uint32_t vcpu_id, int type)
42227d4075dSDavid Woodhouse {
42327d4075dSDavid Woodhouse     CPUState *cs = qemu_get_cpu(vcpu_id);
42427d4075dSDavid Woodhouse     uint8_t vector;
42527d4075dSDavid Woodhouse 
42627d4075dSDavid Woodhouse     if (!cs) {
42727d4075dSDavid Woodhouse         return;
42827d4075dSDavid Woodhouse     }
42927d4075dSDavid Woodhouse 
43027d4075dSDavid Woodhouse     vector = X86_CPU(cs)->env.xen_vcpu_callback_vector;
43127d4075dSDavid Woodhouse     if (vector) {
43227d4075dSDavid Woodhouse         /*
43327d4075dSDavid Woodhouse          * The per-vCPU callback vector injected via lapic. Just
43427d4075dSDavid Woodhouse          * deliver it as an MSI.
43527d4075dSDavid Woodhouse          */
43627d4075dSDavid Woodhouse         MSIMessage msg = {
43727d4075dSDavid Woodhouse             .address = APIC_DEFAULT_ADDRESS | X86_CPU(cs)->apic_id,
43827d4075dSDavid Woodhouse             .data = vector | (1UL << MSI_DATA_LEVEL_SHIFT),
43927d4075dSDavid Woodhouse         };
44027d4075dSDavid Woodhouse         kvm_irqchip_send_msi(kvm_state, msg);
44127d4075dSDavid Woodhouse         return;
44227d4075dSDavid Woodhouse     }
44327d4075dSDavid Woodhouse 
44427d4075dSDavid Woodhouse     switch (type) {
44527d4075dSDavid Woodhouse     case HVM_PARAM_CALLBACK_TYPE_VECTOR:
44627d4075dSDavid Woodhouse         /*
44727d4075dSDavid Woodhouse          * If the evtchn_upcall_pending field in the vcpu_info is set, then
44827d4075dSDavid Woodhouse          * KVM will automatically deliver the vector on entering the vCPU
44927d4075dSDavid Woodhouse          * so all we have to do is kick it out.
45027d4075dSDavid Woodhouse          */
45127d4075dSDavid Woodhouse         qemu_cpu_kick(cs);
45227d4075dSDavid Woodhouse         break;
453ddf0fd9aSDavid Woodhouse 
454ddf0fd9aSDavid Woodhouse     case HVM_PARAM_CALLBACK_TYPE_GSI:
455ddf0fd9aSDavid Woodhouse     case HVM_PARAM_CALLBACK_TYPE_PCI_INTX:
456ddf0fd9aSDavid Woodhouse         if (vcpu_id == 0) {
457ddf0fd9aSDavid Woodhouse             xen_evtchn_set_callback_level(1);
458ddf0fd9aSDavid Woodhouse         }
459ddf0fd9aSDavid Woodhouse         break;
46027d4075dSDavid Woodhouse     }
461c345104cSJoao Martins }
462c345104cSJoao Martins 
463c723d4c1SDavid Woodhouse static int kvm_xen_set_vcpu_timer(CPUState *cs)
464c723d4c1SDavid Woodhouse {
465c723d4c1SDavid Woodhouse     X86CPU *cpu = X86_CPU(cs);
466c723d4c1SDavid Woodhouse     CPUX86State *env = &cpu->env;
467c723d4c1SDavid Woodhouse 
468c723d4c1SDavid Woodhouse     struct kvm_xen_vcpu_attr va = {
469c723d4c1SDavid Woodhouse         .type = KVM_XEN_VCPU_ATTR_TYPE_TIMER,
470c723d4c1SDavid Woodhouse         .u.timer.port = env->xen_virq[VIRQ_TIMER],
471c723d4c1SDavid Woodhouse         .u.timer.priority = KVM_IRQ_ROUTING_XEN_EVTCHN_PRIO_2LEVEL,
472c723d4c1SDavid Woodhouse         .u.timer.expires_ns = env->xen_singleshot_timer_ns,
473c723d4c1SDavid Woodhouse     };
474c723d4c1SDavid Woodhouse 
475c723d4c1SDavid Woodhouse     return kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_SET_ATTR, &va);
476c723d4c1SDavid Woodhouse }
477c723d4c1SDavid Woodhouse 
478c723d4c1SDavid Woodhouse static void do_set_vcpu_timer_virq(CPUState *cs, run_on_cpu_data data)
479c723d4c1SDavid Woodhouse {
480c723d4c1SDavid Woodhouse     kvm_xen_set_vcpu_timer(cs);
481c723d4c1SDavid Woodhouse }
482c723d4c1SDavid Woodhouse 
483c723d4c1SDavid Woodhouse int kvm_xen_set_vcpu_virq(uint32_t vcpu_id, uint16_t virq, uint16_t port)
484c723d4c1SDavid Woodhouse {
485c723d4c1SDavid Woodhouse     CPUState *cs = qemu_get_cpu(vcpu_id);
486c723d4c1SDavid Woodhouse 
487c723d4c1SDavid Woodhouse     if (!cs) {
488c723d4c1SDavid Woodhouse         return -ENOENT;
489c723d4c1SDavid Woodhouse     }
490c723d4c1SDavid Woodhouse 
491c723d4c1SDavid Woodhouse     /* cpu.h doesn't include the actual Xen header. */
492c723d4c1SDavid Woodhouse     qemu_build_assert(NR_VIRQS == XEN_NR_VIRQS);
493c723d4c1SDavid Woodhouse 
494c723d4c1SDavid Woodhouse     if (virq >= NR_VIRQS) {
495c723d4c1SDavid Woodhouse         return -EINVAL;
496c723d4c1SDavid Woodhouse     }
497c723d4c1SDavid Woodhouse 
498c723d4c1SDavid Woodhouse     if (port && X86_CPU(cs)->env.xen_virq[virq]) {
499c723d4c1SDavid Woodhouse         return -EEXIST;
500c723d4c1SDavid Woodhouse     }
501c723d4c1SDavid Woodhouse 
502c723d4c1SDavid Woodhouse     X86_CPU(cs)->env.xen_virq[virq] = port;
503c723d4c1SDavid Woodhouse     if (virq == VIRQ_TIMER && kvm_xen_has_cap(EVTCHN_SEND)) {
504c723d4c1SDavid Woodhouse         async_run_on_cpu(cs, do_set_vcpu_timer_virq,
505c723d4c1SDavid Woodhouse                          RUN_ON_CPU_HOST_INT(port));
506c723d4c1SDavid Woodhouse     }
507c723d4c1SDavid Woodhouse     return 0;
508c723d4c1SDavid Woodhouse }
509c723d4c1SDavid Woodhouse 
510f0689302SJoao Martins static void do_set_vcpu_time_info_gpa(CPUState *cs, run_on_cpu_data data)
511f0689302SJoao Martins {
512f0689302SJoao Martins     X86CPU *cpu = X86_CPU(cs);
513f0689302SJoao Martins     CPUX86State *env = &cpu->env;
514f0689302SJoao Martins 
515f0689302SJoao Martins     env->xen_vcpu_time_info_gpa = data.host_ulong;
516f0689302SJoao Martins 
517f0689302SJoao Martins     kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO,
518f0689302SJoao Martins                           env->xen_vcpu_time_info_gpa);
519f0689302SJoao Martins }
520f0689302SJoao Martins 
5215092db87SJoao Martins static void do_set_vcpu_runstate_gpa(CPUState *cs, run_on_cpu_data data)
5225092db87SJoao Martins {
5235092db87SJoao Martins     X86CPU *cpu = X86_CPU(cs);
5245092db87SJoao Martins     CPUX86State *env = &cpu->env;
5255092db87SJoao Martins 
5265092db87SJoao Martins     env->xen_vcpu_runstate_gpa = data.host_ulong;
5275092db87SJoao Martins 
5285092db87SJoao Martins     kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR,
5295092db87SJoao Martins                           env->xen_vcpu_runstate_gpa);
5305092db87SJoao Martins }
5315092db87SJoao Martins 
532c345104cSJoao Martins static void do_vcpu_soft_reset(CPUState *cs, run_on_cpu_data data)
533c345104cSJoao Martins {
534c345104cSJoao Martins     X86CPU *cpu = X86_CPU(cs);
535c345104cSJoao Martins     CPUX86State *env = &cpu->env;
536c345104cSJoao Martins 
537c345104cSJoao Martins     env->xen_vcpu_info_gpa = INVALID_GPA;
538c345104cSJoao Martins     env->xen_vcpu_info_default_gpa = INVALID_GPA;
539f0689302SJoao Martins     env->xen_vcpu_time_info_gpa = INVALID_GPA;
5405092db87SJoao Martins     env->xen_vcpu_runstate_gpa = INVALID_GPA;
541105b47fdSAnkur Arora     env->xen_vcpu_callback_vector = 0;
542c723d4c1SDavid Woodhouse     env->xen_singleshot_timer_ns = 0;
543c723d4c1SDavid Woodhouse     memset(env->xen_virq, 0, sizeof(env->xen_virq));
544c345104cSJoao Martins 
54527d4075dSDavid Woodhouse     set_vcpu_info(cs, INVALID_GPA);
546f0689302SJoao Martins     kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO,
547f0689302SJoao Martins                           INVALID_GPA);
5485092db87SJoao Martins     kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR,
5495092db87SJoao Martins                           INVALID_GPA);
550105b47fdSAnkur Arora     if (kvm_xen_has_cap(EVTCHN_SEND)) {
551105b47fdSAnkur Arora         kvm_xen_set_vcpu_callback_vector(cs);
552c723d4c1SDavid Woodhouse         kvm_xen_set_vcpu_timer(cs);
553105b47fdSAnkur Arora     }
5545092db87SJoao Martins 
555c345104cSJoao Martins }
556c345104cSJoao Martins 
557fb0fd2ceSJoao Martins static int xen_set_shared_info(uint64_t gfn)
558fb0fd2ceSJoao Martins {
559fb0fd2ceSJoao Martins     uint64_t gpa = gfn << TARGET_PAGE_BITS;
560c345104cSJoao Martins     int i, err;
561fb0fd2ceSJoao Martins 
562fb0fd2ceSJoao Martins     QEMU_IOTHREAD_LOCK_GUARD();
563fb0fd2ceSJoao Martins 
564fb0fd2ceSJoao Martins     /*
565fb0fd2ceSJoao Martins      * The xen_overlay device tells KVM about it too, since it had to
566fb0fd2ceSJoao Martins      * do that on migration load anyway (unless we're going to jump
567fb0fd2ceSJoao Martins      * through lots of hoops to maintain the fiction that this isn't
568fb0fd2ceSJoao Martins      * KVM-specific.
569fb0fd2ceSJoao Martins      */
570fb0fd2ceSJoao Martins     err = xen_overlay_map_shinfo_page(gpa);
571fb0fd2ceSJoao Martins     if (err) {
572fb0fd2ceSJoao Martins             return err;
573fb0fd2ceSJoao Martins     }
574fb0fd2ceSJoao Martins 
575fb0fd2ceSJoao Martins     trace_kvm_xen_set_shared_info(gfn);
576fb0fd2ceSJoao Martins 
577c345104cSJoao Martins     for (i = 0; i < XEN_LEGACY_MAX_VCPUS; i++) {
578c345104cSJoao Martins         CPUState *cpu = qemu_get_cpu(i);
579c345104cSJoao Martins         if (cpu) {
580c345104cSJoao Martins             async_run_on_cpu(cpu, do_set_vcpu_info_default_gpa,
581c345104cSJoao Martins                              RUN_ON_CPU_HOST_ULONG(gpa));
582c345104cSJoao Martins         }
583c345104cSJoao Martins         gpa += sizeof(vcpu_info_t);
584c345104cSJoao Martins     }
585c345104cSJoao Martins 
586fb0fd2ceSJoao Martins     return err;
587fb0fd2ceSJoao Martins }
588fb0fd2ceSJoao Martins 
589fb0fd2ceSJoao Martins static int add_to_physmap_one(uint32_t space, uint64_t idx, uint64_t gfn)
590fb0fd2ceSJoao Martins {
591fb0fd2ceSJoao Martins     switch (space) {
592fb0fd2ceSJoao Martins     case XENMAPSPACE_shared_info:
593fb0fd2ceSJoao Martins         if (idx > 0) {
594fb0fd2ceSJoao Martins             return -EINVAL;
595fb0fd2ceSJoao Martins         }
596fb0fd2ceSJoao Martins         return xen_set_shared_info(gfn);
597fb0fd2ceSJoao Martins 
598fb0fd2ceSJoao Martins     case XENMAPSPACE_grant_table:
599a28b0fc0SDavid Woodhouse         return xen_gnttab_map_page(idx, gfn);
600a28b0fc0SDavid Woodhouse 
601fb0fd2ceSJoao Martins     case XENMAPSPACE_gmfn:
602fb0fd2ceSJoao Martins     case XENMAPSPACE_gmfn_range:
603fb0fd2ceSJoao Martins         return -ENOTSUP;
604fb0fd2ceSJoao Martins 
605fb0fd2ceSJoao Martins     case XENMAPSPACE_gmfn_foreign:
606fb0fd2ceSJoao Martins     case XENMAPSPACE_dev_mmio:
607fb0fd2ceSJoao Martins         return -EPERM;
608fb0fd2ceSJoao Martins 
609fb0fd2ceSJoao Martins     default:
610fb0fd2ceSJoao Martins         return -EINVAL;
611fb0fd2ceSJoao Martins     }
612fb0fd2ceSJoao Martins }
613fb0fd2ceSJoao Martins 
614fb0fd2ceSJoao Martins static int do_add_to_physmap(struct kvm_xen_exit *exit, X86CPU *cpu,
615fb0fd2ceSJoao Martins                              uint64_t arg)
616fb0fd2ceSJoao Martins {
617fb0fd2ceSJoao Martins     struct xen_add_to_physmap xatp;
618fb0fd2ceSJoao Martins     CPUState *cs = CPU(cpu);
619fb0fd2ceSJoao Martins 
620fb0fd2ceSJoao Martins     if (hypercall_compat32(exit->u.hcall.longmode)) {
621fb0fd2ceSJoao Martins         struct compat_xen_add_to_physmap xatp32;
622fb0fd2ceSJoao Martins 
623fb0fd2ceSJoao Martins         qemu_build_assert(sizeof(struct compat_xen_add_to_physmap) == 16);
624fb0fd2ceSJoao Martins         if (kvm_copy_from_gva(cs, arg, &xatp32, sizeof(xatp32))) {
625fb0fd2ceSJoao Martins             return -EFAULT;
626fb0fd2ceSJoao Martins         }
627fb0fd2ceSJoao Martins         xatp.domid = xatp32.domid;
628fb0fd2ceSJoao Martins         xatp.size = xatp32.size;
629fb0fd2ceSJoao Martins         xatp.space = xatp32.space;
630fb0fd2ceSJoao Martins         xatp.idx = xatp32.idx;
631fb0fd2ceSJoao Martins         xatp.gpfn = xatp32.gpfn;
632fb0fd2ceSJoao Martins     } else {
633fb0fd2ceSJoao Martins         if (kvm_copy_from_gva(cs, arg, &xatp, sizeof(xatp))) {
634fb0fd2ceSJoao Martins             return -EFAULT;
635fb0fd2ceSJoao Martins         }
636fb0fd2ceSJoao Martins     }
637fb0fd2ceSJoao Martins 
638fb0fd2ceSJoao Martins     if (xatp.domid != DOMID_SELF && xatp.domid != xen_domid) {
639fb0fd2ceSJoao Martins         return -ESRCH;
640fb0fd2ceSJoao Martins     }
641fb0fd2ceSJoao Martins 
642fb0fd2ceSJoao Martins     return add_to_physmap_one(xatp.space, xatp.idx, xatp.gpfn);
643fb0fd2ceSJoao Martins }
644fb0fd2ceSJoao Martins 
645782a7960SDavid Woodhouse static int do_add_to_physmap_batch(struct kvm_xen_exit *exit, X86CPU *cpu,
646782a7960SDavid Woodhouse                                    uint64_t arg)
647782a7960SDavid Woodhouse {
648782a7960SDavid Woodhouse     struct xen_add_to_physmap_batch xatpb;
649782a7960SDavid Woodhouse     unsigned long idxs_gva, gpfns_gva, errs_gva;
650782a7960SDavid Woodhouse     CPUState *cs = CPU(cpu);
651782a7960SDavid Woodhouse     size_t op_sz;
652782a7960SDavid Woodhouse 
653782a7960SDavid Woodhouse     if (hypercall_compat32(exit->u.hcall.longmode)) {
654782a7960SDavid Woodhouse         struct compat_xen_add_to_physmap_batch xatpb32;
655782a7960SDavid Woodhouse 
656782a7960SDavid Woodhouse         qemu_build_assert(sizeof(struct compat_xen_add_to_physmap_batch) == 20);
657782a7960SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &xatpb32, sizeof(xatpb32))) {
658782a7960SDavid Woodhouse             return -EFAULT;
659782a7960SDavid Woodhouse         }
660782a7960SDavid Woodhouse         xatpb.domid = xatpb32.domid;
661782a7960SDavid Woodhouse         xatpb.space = xatpb32.space;
662782a7960SDavid Woodhouse         xatpb.size = xatpb32.size;
663782a7960SDavid Woodhouse 
664782a7960SDavid Woodhouse         idxs_gva = xatpb32.idxs.c;
665782a7960SDavid Woodhouse         gpfns_gva = xatpb32.gpfns.c;
666782a7960SDavid Woodhouse         errs_gva = xatpb32.errs.c;
667782a7960SDavid Woodhouse         op_sz = sizeof(uint32_t);
668782a7960SDavid Woodhouse     } else {
669782a7960SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &xatpb, sizeof(xatpb))) {
670782a7960SDavid Woodhouse             return -EFAULT;
671782a7960SDavid Woodhouse         }
672782a7960SDavid Woodhouse         op_sz = sizeof(unsigned long);
673782a7960SDavid Woodhouse         idxs_gva = (unsigned long)xatpb.idxs.p;
674782a7960SDavid Woodhouse         gpfns_gva = (unsigned long)xatpb.gpfns.p;
675782a7960SDavid Woodhouse         errs_gva = (unsigned long)xatpb.errs.p;
676782a7960SDavid Woodhouse     }
677782a7960SDavid Woodhouse 
678782a7960SDavid Woodhouse     if (xatpb.domid != DOMID_SELF && xatpb.domid != xen_domid) {
679782a7960SDavid Woodhouse         return -ESRCH;
680782a7960SDavid Woodhouse     }
681782a7960SDavid Woodhouse 
682782a7960SDavid Woodhouse     /* Explicitly invalid for the batch op. Not that we implement it anyway. */
683782a7960SDavid Woodhouse     if (xatpb.space == XENMAPSPACE_gmfn_range) {
684782a7960SDavid Woodhouse         return -EINVAL;
685782a7960SDavid Woodhouse     }
686782a7960SDavid Woodhouse 
687782a7960SDavid Woodhouse     while (xatpb.size--) {
688782a7960SDavid Woodhouse         unsigned long idx = 0;
689782a7960SDavid Woodhouse         unsigned long gpfn = 0;
690782a7960SDavid Woodhouse         int err;
691782a7960SDavid Woodhouse 
692782a7960SDavid Woodhouse         /* For 32-bit compat this only copies the low 32 bits of each */
693782a7960SDavid Woodhouse         if (kvm_copy_from_gva(cs, idxs_gva, &idx, op_sz) ||
694782a7960SDavid Woodhouse             kvm_copy_from_gva(cs, gpfns_gva, &gpfn, op_sz)) {
695782a7960SDavid Woodhouse             return -EFAULT;
696782a7960SDavid Woodhouse         }
697782a7960SDavid Woodhouse         idxs_gva += op_sz;
698782a7960SDavid Woodhouse         gpfns_gva += op_sz;
699782a7960SDavid Woodhouse 
700782a7960SDavid Woodhouse         err = add_to_physmap_one(xatpb.space, idx, gpfn);
701782a7960SDavid Woodhouse 
702782a7960SDavid Woodhouse         if (kvm_copy_to_gva(cs, errs_gva, &err, sizeof(err))) {
703782a7960SDavid Woodhouse             return -EFAULT;
704782a7960SDavid Woodhouse         }
705782a7960SDavid Woodhouse         errs_gva += sizeof(err);
706782a7960SDavid Woodhouse     }
707782a7960SDavid Woodhouse     return 0;
708782a7960SDavid Woodhouse }
709782a7960SDavid Woodhouse 
710fb0fd2ceSJoao Martins static bool kvm_xen_hcall_memory_op(struct kvm_xen_exit *exit, X86CPU *cpu,
711fb0fd2ceSJoao Martins                                    int cmd, uint64_t arg)
712fb0fd2ceSJoao Martins {
713fb0fd2ceSJoao Martins     int err;
714fb0fd2ceSJoao Martins 
715fb0fd2ceSJoao Martins     switch (cmd) {
716fb0fd2ceSJoao Martins     case XENMEM_add_to_physmap:
717fb0fd2ceSJoao Martins         err = do_add_to_physmap(exit, cpu, arg);
718fb0fd2ceSJoao Martins         break;
719fb0fd2ceSJoao Martins 
720782a7960SDavid Woodhouse     case XENMEM_add_to_physmap_batch:
721782a7960SDavid Woodhouse         err = do_add_to_physmap_batch(exit, cpu, arg);
722782a7960SDavid Woodhouse         break;
723782a7960SDavid Woodhouse 
724fb0fd2ceSJoao Martins     default:
725fb0fd2ceSJoao Martins         return false;
726fb0fd2ceSJoao Martins     }
727fb0fd2ceSJoao Martins 
728fb0fd2ceSJoao Martins     exit->u.hcall.result = err;
729fb0fd2ceSJoao Martins     return true;
730fb0fd2ceSJoao Martins }
731fb0fd2ceSJoao Martins 
7325dbcd01aSAnkur Arora static bool handle_set_param(struct kvm_xen_exit *exit, X86CPU *cpu,
7335dbcd01aSAnkur Arora                              uint64_t arg)
7345dbcd01aSAnkur Arora {
7355dbcd01aSAnkur Arora     CPUState *cs = CPU(cpu);
7365dbcd01aSAnkur Arora     struct xen_hvm_param hp;
7375dbcd01aSAnkur Arora     int err = 0;
7385dbcd01aSAnkur Arora 
7395dbcd01aSAnkur Arora     /* No need for 32/64 compat handling */
7405dbcd01aSAnkur Arora     qemu_build_assert(sizeof(hp) == 16);
7415dbcd01aSAnkur Arora 
7425dbcd01aSAnkur Arora     if (kvm_copy_from_gva(cs, arg, &hp, sizeof(hp))) {
7435dbcd01aSAnkur Arora         err = -EFAULT;
7445dbcd01aSAnkur Arora         goto out;
7455dbcd01aSAnkur Arora     }
7465dbcd01aSAnkur Arora 
7475dbcd01aSAnkur Arora     if (hp.domid != DOMID_SELF && hp.domid != xen_domid) {
7485dbcd01aSAnkur Arora         err = -ESRCH;
7495dbcd01aSAnkur Arora         goto out;
7505dbcd01aSAnkur Arora     }
7515dbcd01aSAnkur Arora 
7525dbcd01aSAnkur Arora     switch (hp.index) {
75391cce756SDavid Woodhouse     case HVM_PARAM_CALLBACK_IRQ:
7542aff696bSDavid Woodhouse         qemu_mutex_lock_iothread();
75591cce756SDavid Woodhouse         err = xen_evtchn_set_callback_param(hp.value);
7562aff696bSDavid Woodhouse         qemu_mutex_unlock_iothread();
75791cce756SDavid Woodhouse         xen_set_long_mode(exit->u.hcall.longmode);
75891cce756SDavid Woodhouse         break;
7595dbcd01aSAnkur Arora     default:
7605dbcd01aSAnkur Arora         return false;
7615dbcd01aSAnkur Arora     }
7625dbcd01aSAnkur Arora 
7635dbcd01aSAnkur Arora out:
7645dbcd01aSAnkur Arora     exit->u.hcall.result = err;
7655dbcd01aSAnkur Arora     return true;
7665dbcd01aSAnkur Arora }
7675dbcd01aSAnkur Arora 
768105b47fdSAnkur Arora static int kvm_xen_hcall_evtchn_upcall_vector(struct kvm_xen_exit *exit,
769105b47fdSAnkur Arora                                               X86CPU *cpu, uint64_t arg)
770105b47fdSAnkur Arora {
771105b47fdSAnkur Arora     struct xen_hvm_evtchn_upcall_vector up;
772105b47fdSAnkur Arora     CPUState *target_cs;
773105b47fdSAnkur Arora 
774105b47fdSAnkur Arora     /* No need for 32/64 compat handling */
775105b47fdSAnkur Arora     qemu_build_assert(sizeof(up) == 8);
776105b47fdSAnkur Arora 
777105b47fdSAnkur Arora     if (kvm_copy_from_gva(CPU(cpu), arg, &up, sizeof(up))) {
778105b47fdSAnkur Arora         return -EFAULT;
779105b47fdSAnkur Arora     }
780105b47fdSAnkur Arora 
781105b47fdSAnkur Arora     if (up.vector < 0x10) {
782105b47fdSAnkur Arora         return -EINVAL;
783105b47fdSAnkur Arora     }
784105b47fdSAnkur Arora 
785105b47fdSAnkur Arora     target_cs = qemu_get_cpu(up.vcpu);
786105b47fdSAnkur Arora     if (!target_cs) {
787105b47fdSAnkur Arora         return -EINVAL;
788105b47fdSAnkur Arora     }
789105b47fdSAnkur Arora 
790105b47fdSAnkur Arora     async_run_on_cpu(target_cs, do_set_vcpu_callback_vector,
791105b47fdSAnkur Arora                      RUN_ON_CPU_HOST_INT(up.vector));
792105b47fdSAnkur Arora     return 0;
793105b47fdSAnkur Arora }
794105b47fdSAnkur Arora 
795671bfdcdSJoao Martins static bool kvm_xen_hcall_hvm_op(struct kvm_xen_exit *exit, X86CPU *cpu,
796671bfdcdSJoao Martins                                  int cmd, uint64_t arg)
797671bfdcdSJoao Martins {
798105b47fdSAnkur Arora     int ret = -ENOSYS;
799671bfdcdSJoao Martins     switch (cmd) {
800105b47fdSAnkur Arora     case HVMOP_set_evtchn_upcall_vector:
801105b47fdSAnkur Arora         ret = kvm_xen_hcall_evtchn_upcall_vector(exit, cpu,
802105b47fdSAnkur Arora                                                  exit->u.hcall.params[0]);
803105b47fdSAnkur Arora         break;
804105b47fdSAnkur Arora 
805671bfdcdSJoao Martins     case HVMOP_pagetable_dying:
806105b47fdSAnkur Arora         ret = -ENOSYS;
807105b47fdSAnkur Arora         break;
808671bfdcdSJoao Martins 
8095dbcd01aSAnkur Arora     case HVMOP_set_param:
8105dbcd01aSAnkur Arora         return handle_set_param(exit, cpu, arg);
8115dbcd01aSAnkur Arora 
812671bfdcdSJoao Martins     default:
813671bfdcdSJoao Martins         return false;
814671bfdcdSJoao Martins     }
815105b47fdSAnkur Arora 
816105b47fdSAnkur Arora     exit->u.hcall.result = ret;
817105b47fdSAnkur Arora     return true;
818671bfdcdSJoao Martins }
819671bfdcdSJoao Martins 
820c345104cSJoao Martins static int vcpuop_register_vcpu_info(CPUState *cs, CPUState *target,
821c345104cSJoao Martins                                      uint64_t arg)
822c345104cSJoao Martins {
823c345104cSJoao Martins     struct vcpu_register_vcpu_info rvi;
824c345104cSJoao Martins     uint64_t gpa;
825c345104cSJoao Martins 
826c345104cSJoao Martins     /* No need for 32/64 compat handling */
827c345104cSJoao Martins     qemu_build_assert(sizeof(rvi) == 16);
828c345104cSJoao Martins     qemu_build_assert(sizeof(struct vcpu_info) == 64);
829c345104cSJoao Martins 
830c345104cSJoao Martins     if (!target) {
831c345104cSJoao Martins         return -ENOENT;
832c345104cSJoao Martins     }
833c345104cSJoao Martins 
834c345104cSJoao Martins     if (kvm_copy_from_gva(cs, arg, &rvi, sizeof(rvi))) {
835c345104cSJoao Martins         return -EFAULT;
836c345104cSJoao Martins     }
837c345104cSJoao Martins 
838c345104cSJoao Martins     if (rvi.offset > TARGET_PAGE_SIZE - sizeof(struct vcpu_info)) {
839c345104cSJoao Martins         return -EINVAL;
840c345104cSJoao Martins     }
841c345104cSJoao Martins 
842c345104cSJoao Martins     gpa = ((rvi.mfn << TARGET_PAGE_BITS) + rvi.offset);
843c345104cSJoao Martins     async_run_on_cpu(target, do_set_vcpu_info_gpa, RUN_ON_CPU_HOST_ULONG(gpa));
844c345104cSJoao Martins     return 0;
845c345104cSJoao Martins }
846c345104cSJoao Martins 
847f0689302SJoao Martins static int vcpuop_register_vcpu_time_info(CPUState *cs, CPUState *target,
848f0689302SJoao Martins                                           uint64_t arg)
849f0689302SJoao Martins {
850f0689302SJoao Martins     struct vcpu_register_time_memory_area tma;
851f0689302SJoao Martins     uint64_t gpa;
852f0689302SJoao Martins     size_t len;
853f0689302SJoao Martins 
854f0689302SJoao Martins     /* No need for 32/64 compat handling */
855f0689302SJoao Martins     qemu_build_assert(sizeof(tma) == 8);
856f0689302SJoao Martins     qemu_build_assert(sizeof(struct vcpu_time_info) == 32);
857f0689302SJoao Martins 
858f0689302SJoao Martins     if (!target) {
859f0689302SJoao Martins         return -ENOENT;
860f0689302SJoao Martins     }
861f0689302SJoao Martins 
862f0689302SJoao Martins     if (kvm_copy_from_gva(cs, arg, &tma, sizeof(tma))) {
863f0689302SJoao Martins         return -EFAULT;
864f0689302SJoao Martins     }
865f0689302SJoao Martins 
866f0689302SJoao Martins     /*
867f0689302SJoao Martins      * Xen actually uses the GVA and does the translation through the guest
868f0689302SJoao Martins      * page tables each time. But Linux/KVM uses the GPA, on the assumption
869f0689302SJoao Martins      * that guests only ever use *global* addresses (kernel virtual addresses)
870f0689302SJoao Martins      * for it. If Linux is changed to redo the GVA→GPA translation each time,
871f0689302SJoao Martins      * it will offer a new vCPU attribute for that, and we'll use it instead.
872f0689302SJoao Martins      */
873f0689302SJoao Martins     if (!kvm_gva_to_gpa(cs, tma.addr.p, &gpa, &len, false) ||
874f0689302SJoao Martins         len < sizeof(struct vcpu_time_info)) {
875f0689302SJoao Martins         return -EFAULT;
876f0689302SJoao Martins     }
877f0689302SJoao Martins 
878f0689302SJoao Martins     async_run_on_cpu(target, do_set_vcpu_time_info_gpa,
879f0689302SJoao Martins                      RUN_ON_CPU_HOST_ULONG(gpa));
880f0689302SJoao Martins     return 0;
881f0689302SJoao Martins }
882f0689302SJoao Martins 
8835092db87SJoao Martins static int vcpuop_register_runstate_info(CPUState *cs, CPUState *target,
8845092db87SJoao Martins                                          uint64_t arg)
8855092db87SJoao Martins {
8865092db87SJoao Martins     struct vcpu_register_runstate_memory_area rma;
8875092db87SJoao Martins     uint64_t gpa;
8885092db87SJoao Martins     size_t len;
8895092db87SJoao Martins 
8905092db87SJoao Martins     /* No need for 32/64 compat handling */
8915092db87SJoao Martins     qemu_build_assert(sizeof(rma) == 8);
8925092db87SJoao Martins     /* The runstate area actually does change size, but Linux copes. */
8935092db87SJoao Martins 
8945092db87SJoao Martins     if (!target) {
8955092db87SJoao Martins         return -ENOENT;
8965092db87SJoao Martins     }
8975092db87SJoao Martins 
8985092db87SJoao Martins     if (kvm_copy_from_gva(cs, arg, &rma, sizeof(rma))) {
8995092db87SJoao Martins         return -EFAULT;
9005092db87SJoao Martins     }
9015092db87SJoao Martins 
9025092db87SJoao Martins     /* As with vcpu_time_info, Xen actually uses the GVA but KVM doesn't. */
9035092db87SJoao Martins     if (!kvm_gva_to_gpa(cs, rma.addr.p, &gpa, &len, false)) {
9045092db87SJoao Martins         return -EFAULT;
9055092db87SJoao Martins     }
9065092db87SJoao Martins 
9075092db87SJoao Martins     async_run_on_cpu(target, do_set_vcpu_runstate_gpa,
9085092db87SJoao Martins                      RUN_ON_CPU_HOST_ULONG(gpa));
9095092db87SJoao Martins     return 0;
9105092db87SJoao Martins }
9115092db87SJoao Martins 
912b746a779SJoao Martins static uint64_t kvm_get_current_ns(void)
913b746a779SJoao Martins {
914b746a779SJoao Martins     struct kvm_clock_data data;
915b746a779SJoao Martins     int ret;
916b746a779SJoao Martins 
917b746a779SJoao Martins     ret = kvm_vm_ioctl(kvm_state, KVM_GET_CLOCK, &data);
918b746a779SJoao Martins     if (ret < 0) {
919b746a779SJoao Martins         fprintf(stderr, "KVM_GET_CLOCK failed: %s\n", strerror(ret));
920b746a779SJoao Martins                 abort();
921b746a779SJoao Martins     }
922b746a779SJoao Martins 
923b746a779SJoao Martins     return data.clock;
924b746a779SJoao Martins }
925b746a779SJoao Martins 
926b746a779SJoao Martins static void xen_vcpu_singleshot_timer_event(void *opaque)
927b746a779SJoao Martins {
928b746a779SJoao Martins     CPUState *cpu = opaque;
929b746a779SJoao Martins     CPUX86State *env = &X86_CPU(cpu)->env;
930b746a779SJoao Martins     uint16_t port = env->xen_virq[VIRQ_TIMER];
931b746a779SJoao Martins 
932b746a779SJoao Martins     if (likely(port)) {
933b746a779SJoao Martins         xen_evtchn_set_port(port);
934b746a779SJoao Martins     }
935b746a779SJoao Martins 
936b746a779SJoao Martins     qemu_mutex_lock(&env->xen_timers_lock);
937b746a779SJoao Martins     env->xen_singleshot_timer_ns = 0;
938b746a779SJoao Martins     qemu_mutex_unlock(&env->xen_timers_lock);
939b746a779SJoao Martins }
940b746a779SJoao Martins 
941b746a779SJoao Martins static void xen_vcpu_periodic_timer_event(void *opaque)
942b746a779SJoao Martins {
943b746a779SJoao Martins     CPUState *cpu = opaque;
944b746a779SJoao Martins     CPUX86State *env = &X86_CPU(cpu)->env;
945b746a779SJoao Martins     uint16_t port = env->xen_virq[VIRQ_TIMER];
946b746a779SJoao Martins     int64_t qemu_now;
947b746a779SJoao Martins 
948b746a779SJoao Martins     if (likely(port)) {
949b746a779SJoao Martins         xen_evtchn_set_port(port);
950b746a779SJoao Martins     }
951b746a779SJoao Martins 
952b746a779SJoao Martins     qemu_mutex_lock(&env->xen_timers_lock);
953b746a779SJoao Martins 
954b746a779SJoao Martins     qemu_now = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL);
955b746a779SJoao Martins     timer_mod_ns(env->xen_periodic_timer,
956b746a779SJoao Martins                  qemu_now + env->xen_periodic_timer_period);
957b746a779SJoao Martins 
958b746a779SJoao Martins     qemu_mutex_unlock(&env->xen_timers_lock);
959b746a779SJoao Martins }
960b746a779SJoao Martins 
961b746a779SJoao Martins static int do_set_periodic_timer(CPUState *target, uint64_t period_ns)
962b746a779SJoao Martins {
963b746a779SJoao Martins     CPUX86State *tenv = &X86_CPU(target)->env;
964b746a779SJoao Martins     int64_t qemu_now;
965b746a779SJoao Martins 
966b746a779SJoao Martins     timer_del(tenv->xen_periodic_timer);
967b746a779SJoao Martins 
968b746a779SJoao Martins     qemu_mutex_lock(&tenv->xen_timers_lock);
969b746a779SJoao Martins 
970b746a779SJoao Martins     qemu_now = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL);
971b746a779SJoao Martins     timer_mod_ns(tenv->xen_periodic_timer, qemu_now + period_ns);
972b746a779SJoao Martins     tenv->xen_periodic_timer_period = period_ns;
973b746a779SJoao Martins 
974b746a779SJoao Martins     qemu_mutex_unlock(&tenv->xen_timers_lock);
975b746a779SJoao Martins     return 0;
976b746a779SJoao Martins }
977b746a779SJoao Martins 
978b746a779SJoao Martins #define MILLISECS(_ms)  ((int64_t)((_ms) * 1000000ULL))
979b746a779SJoao Martins #define MICROSECS(_us)  ((int64_t)((_us) * 1000ULL))
980b746a779SJoao Martins #define STIME_MAX ((time_t)((int64_t)~0ull >> 1))
981b746a779SJoao Martins /* Chosen so (NOW() + delta) wont overflow without an uptime of 200 years */
982b746a779SJoao Martins #define STIME_DELTA_MAX ((int64_t)((uint64_t)~0ull >> 2))
983b746a779SJoao Martins 
984b746a779SJoao Martins static int vcpuop_set_periodic_timer(CPUState *cs, CPUState *target,
985b746a779SJoao Martins                                      uint64_t arg)
986b746a779SJoao Martins {
987b746a779SJoao Martins     struct vcpu_set_periodic_timer spt;
988b746a779SJoao Martins 
989b746a779SJoao Martins     qemu_build_assert(sizeof(spt) == 8);
990b746a779SJoao Martins     if (kvm_copy_from_gva(cs, arg, &spt, sizeof(spt))) {
991b746a779SJoao Martins         return -EFAULT;
992b746a779SJoao Martins     }
993b746a779SJoao Martins 
994b746a779SJoao Martins     if (spt.period_ns < MILLISECS(1) || spt.period_ns > STIME_DELTA_MAX) {
995b746a779SJoao Martins         return -EINVAL;
996b746a779SJoao Martins     }
997b746a779SJoao Martins 
998b746a779SJoao Martins     return do_set_periodic_timer(target, spt.period_ns);
999b746a779SJoao Martins }
1000b746a779SJoao Martins 
1001b746a779SJoao Martins static int vcpuop_stop_periodic_timer(CPUState *target)
1002b746a779SJoao Martins {
1003b746a779SJoao Martins     CPUX86State *tenv = &X86_CPU(target)->env;
1004b746a779SJoao Martins 
1005b746a779SJoao Martins     qemu_mutex_lock(&tenv->xen_timers_lock);
1006b746a779SJoao Martins 
1007b746a779SJoao Martins     timer_del(tenv->xen_periodic_timer);
1008b746a779SJoao Martins     tenv->xen_periodic_timer_period = 0;
1009b746a779SJoao Martins 
1010b746a779SJoao Martins     qemu_mutex_unlock(&tenv->xen_timers_lock);
1011b746a779SJoao Martins     return 0;
1012b746a779SJoao Martins }
1013b746a779SJoao Martins 
1014b746a779SJoao Martins static int do_set_singleshot_timer(CPUState *cs, uint64_t timeout_abs,
1015b746a779SJoao Martins                                    bool future, bool linux_wa)
1016b746a779SJoao Martins {
1017b746a779SJoao Martins     CPUX86State *env = &X86_CPU(cs)->env;
1018b746a779SJoao Martins     int64_t now = kvm_get_current_ns();
1019b746a779SJoao Martins     int64_t qemu_now = qemu_clock_get_ns(QEMU_CLOCK_VIRTUAL);
1020b746a779SJoao Martins     int64_t delta = timeout_abs - now;
1021b746a779SJoao Martins 
1022b746a779SJoao Martins     if (future && timeout_abs < now) {
1023b746a779SJoao Martins         return -ETIME;
1024b746a779SJoao Martins     }
1025b746a779SJoao Martins 
1026b746a779SJoao Martins     if (linux_wa && unlikely((int64_t)timeout_abs < 0 ||
1027b746a779SJoao Martins                              (delta > 0 && (uint32_t)(delta >> 50) != 0))) {
1028b746a779SJoao Martins         /*
1029b746a779SJoao Martins          * Xen has a 'Linux workaround' in do_set_timer_op() which checks
1030b746a779SJoao Martins          * for negative absolute timeout values (caused by integer
1031b746a779SJoao Martins          * overflow), and for values about 13 days in the future (2^50ns)
1032b746a779SJoao Martins          * which would be caused by jiffies overflow. For those cases, it
1033b746a779SJoao Martins          * sets the timeout 100ms in the future (not *too* soon, since if
1034b746a779SJoao Martins          * a guest really did set a long timeout on purpose we don't want
1035b746a779SJoao Martins          * to keep churning CPU time by waking it up).
1036b746a779SJoao Martins          */
1037b746a779SJoao Martins         delta = (100 * SCALE_MS);
1038b746a779SJoao Martins         timeout_abs = now + delta;
1039b746a779SJoao Martins     }
1040b746a779SJoao Martins 
1041b746a779SJoao Martins     qemu_mutex_lock(&env->xen_timers_lock);
1042b746a779SJoao Martins 
1043b746a779SJoao Martins     timer_mod_ns(env->xen_singleshot_timer, qemu_now + delta);
1044b746a779SJoao Martins     env->xen_singleshot_timer_ns = now + delta;
1045b746a779SJoao Martins 
1046b746a779SJoao Martins     qemu_mutex_unlock(&env->xen_timers_lock);
1047b746a779SJoao Martins     return 0;
1048b746a779SJoao Martins }
1049b746a779SJoao Martins 
1050b746a779SJoao Martins static int vcpuop_set_singleshot_timer(CPUState *cs, uint64_t arg)
1051b746a779SJoao Martins {
1052b746a779SJoao Martins     struct vcpu_set_singleshot_timer sst = { 0 };
1053b746a779SJoao Martins 
1054b746a779SJoao Martins     /*
1055b746a779SJoao Martins      * The struct is a uint64_t followed by a uint32_t. On 32-bit that
1056b746a779SJoao Martins      * makes it 12 bytes. On 64-bit it gets padded to 16. The parts
1057b746a779SJoao Martins      * that get used are identical, and there's four bytes of padding
1058b746a779SJoao Martins      * unused at the end. For true Xen compatibility we should attempt
1059b746a779SJoao Martins      * to copy the full 16 bytes from 64-bit guests, and return -EFAULT
1060b746a779SJoao Martins      * if we can't get the padding too. But that's daft. Just copy what
1061b746a779SJoao Martins      * we need.
1062b746a779SJoao Martins      */
1063b746a779SJoao Martins     qemu_build_assert(offsetof(struct vcpu_set_singleshot_timer, flags) == 8);
1064b746a779SJoao Martins     qemu_build_assert(sizeof(sst) >= 12);
1065b746a779SJoao Martins 
1066b746a779SJoao Martins     if (kvm_copy_from_gva(cs, arg, &sst, 12)) {
1067b746a779SJoao Martins         return -EFAULT;
1068b746a779SJoao Martins     }
1069b746a779SJoao Martins 
1070b746a779SJoao Martins     return do_set_singleshot_timer(cs, sst.timeout_abs_ns,
1071b746a779SJoao Martins                                    !!(sst.flags & VCPU_SSHOTTMR_future),
1072b746a779SJoao Martins                                    false);
1073b746a779SJoao Martins }
1074b746a779SJoao Martins 
1075b746a779SJoao Martins static int vcpuop_stop_singleshot_timer(CPUState *cs)
1076b746a779SJoao Martins {
1077b746a779SJoao Martins     CPUX86State *env = &X86_CPU(cs)->env;
1078b746a779SJoao Martins 
1079b746a779SJoao Martins     qemu_mutex_lock(&env->xen_timers_lock);
1080b746a779SJoao Martins 
1081b746a779SJoao Martins     timer_del(env->xen_singleshot_timer);
1082b746a779SJoao Martins     env->xen_singleshot_timer_ns = 0;
1083b746a779SJoao Martins 
1084b746a779SJoao Martins     qemu_mutex_unlock(&env->xen_timers_lock);
1085b746a779SJoao Martins     return 0;
1086b746a779SJoao Martins }
1087b746a779SJoao Martins 
1088b746a779SJoao Martins static bool kvm_xen_hcall_set_timer_op(struct kvm_xen_exit *exit, X86CPU *cpu,
1089b746a779SJoao Martins                                        uint64_t timeout)
1090b746a779SJoao Martins {
1091b746a779SJoao Martins     int err;
1092b746a779SJoao Martins 
1093b746a779SJoao Martins     if (unlikely(timeout == 0)) {
1094b746a779SJoao Martins         err = vcpuop_stop_singleshot_timer(CPU(cpu));
1095b746a779SJoao Martins     } else {
1096b746a779SJoao Martins         err = do_set_singleshot_timer(CPU(cpu), timeout, false, true);
1097b746a779SJoao Martins     }
1098b746a779SJoao Martins     exit->u.hcall.result = err;
1099b746a779SJoao Martins     return true;
1100b746a779SJoao Martins }
1101b746a779SJoao Martins 
1102d70bd6a4SJoao Martins static bool kvm_xen_hcall_vcpu_op(struct kvm_xen_exit *exit, X86CPU *cpu,
1103d70bd6a4SJoao Martins                                   int cmd, int vcpu_id, uint64_t arg)
1104d70bd6a4SJoao Martins {
1105c345104cSJoao Martins     CPUState *cs = CPU(cpu);
1106b746a779SJoao Martins     CPUState *dest = cs->cpu_index == vcpu_id ? cs : qemu_get_cpu(vcpu_id);
1107d70bd6a4SJoao Martins     int err;
1108d70bd6a4SJoao Martins 
1109b746a779SJoao Martins     if (!dest) {
1110b746a779SJoao Martins         err = -ENOENT;
1111b746a779SJoao Martins         goto out;
1112b746a779SJoao Martins     }
1113b746a779SJoao Martins 
1114d70bd6a4SJoao Martins     switch (cmd) {
11155092db87SJoao Martins     case VCPUOP_register_runstate_memory_area:
11165092db87SJoao Martins         err = vcpuop_register_runstate_info(cs, dest, arg);
11175092db87SJoao Martins         break;
1118f0689302SJoao Martins     case VCPUOP_register_vcpu_time_memory_area:
1119f0689302SJoao Martins         err = vcpuop_register_vcpu_time_info(cs, dest, arg);
1120f0689302SJoao Martins         break;
1121d70bd6a4SJoao Martins     case VCPUOP_register_vcpu_info:
1122c345104cSJoao Martins         err = vcpuop_register_vcpu_info(cs, dest, arg);
1123d70bd6a4SJoao Martins         break;
1124b746a779SJoao Martins     case VCPUOP_set_singleshot_timer: {
1125b746a779SJoao Martins         if (cs->cpu_index == vcpu_id) {
1126b746a779SJoao Martins             err = vcpuop_set_singleshot_timer(dest, arg);
1127b746a779SJoao Martins         } else {
1128b746a779SJoao Martins             err = -EINVAL;
1129b746a779SJoao Martins         }
1130b746a779SJoao Martins         break;
1131b746a779SJoao Martins     }
1132b746a779SJoao Martins     case VCPUOP_stop_singleshot_timer:
1133b746a779SJoao Martins         if (cs->cpu_index == vcpu_id) {
1134b746a779SJoao Martins             err = vcpuop_stop_singleshot_timer(dest);
1135b746a779SJoao Martins         } else {
1136b746a779SJoao Martins             err = -EINVAL;
1137b746a779SJoao Martins         }
1138b746a779SJoao Martins         break;
1139b746a779SJoao Martins     case VCPUOP_set_periodic_timer: {
1140b746a779SJoao Martins         err = vcpuop_set_periodic_timer(cs, dest, arg);
1141b746a779SJoao Martins         break;
1142b746a779SJoao Martins     }
1143b746a779SJoao Martins     case VCPUOP_stop_periodic_timer:
1144b746a779SJoao Martins         err = vcpuop_stop_periodic_timer(dest);
1145b746a779SJoao Martins         break;
1146d70bd6a4SJoao Martins 
1147d70bd6a4SJoao Martins     default:
1148d70bd6a4SJoao Martins         return false;
1149d70bd6a4SJoao Martins     }
1150d70bd6a4SJoao Martins 
1151b746a779SJoao Martins  out:
1152d70bd6a4SJoao Martins     exit->u.hcall.result = err;
1153d70bd6a4SJoao Martins     return true;
1154d70bd6a4SJoao Martins }
1155d70bd6a4SJoao Martins 
11564858ba20SDavid Woodhouse static bool kvm_xen_hcall_evtchn_op(struct kvm_xen_exit *exit, X86CPU *cpu,
11573b06f29bSJoao Martins                                     int cmd, uint64_t arg)
11583b06f29bSJoao Martins {
11594858ba20SDavid Woodhouse     CPUState *cs = CPU(cpu);
11603b06f29bSJoao Martins     int err = -ENOSYS;
11613b06f29bSJoao Martins 
11623b06f29bSJoao Martins     switch (cmd) {
11633b06f29bSJoao Martins     case EVTCHNOP_init_control:
11643b06f29bSJoao Martins     case EVTCHNOP_expand_array:
11653b06f29bSJoao Martins     case EVTCHNOP_set_priority:
11663b06f29bSJoao Martins         /* We do not support FIFO channels at this point */
11673b06f29bSJoao Martins         err = -ENOSYS;
11683b06f29bSJoao Martins         break;
11693b06f29bSJoao Martins 
11704858ba20SDavid Woodhouse     case EVTCHNOP_status: {
11714858ba20SDavid Woodhouse         struct evtchn_status status;
11724858ba20SDavid Woodhouse 
11734858ba20SDavid Woodhouse         qemu_build_assert(sizeof(status) == 24);
11744858ba20SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &status, sizeof(status))) {
11754858ba20SDavid Woodhouse             err = -EFAULT;
11764858ba20SDavid Woodhouse             break;
11774858ba20SDavid Woodhouse         }
11784858ba20SDavid Woodhouse 
11794858ba20SDavid Woodhouse         err = xen_evtchn_status_op(&status);
11804858ba20SDavid Woodhouse         if (!err && kvm_copy_to_gva(cs, arg, &status, sizeof(status))) {
11814858ba20SDavid Woodhouse             err = -EFAULT;
11824858ba20SDavid Woodhouse         }
11834858ba20SDavid Woodhouse         break;
11844858ba20SDavid Woodhouse     }
118583eb5811SDavid Woodhouse     case EVTCHNOP_close: {
118683eb5811SDavid Woodhouse         struct evtchn_close close;
118783eb5811SDavid Woodhouse 
118883eb5811SDavid Woodhouse         qemu_build_assert(sizeof(close) == 4);
118983eb5811SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &close, sizeof(close))) {
119083eb5811SDavid Woodhouse             err = -EFAULT;
119183eb5811SDavid Woodhouse             break;
119283eb5811SDavid Woodhouse         }
119383eb5811SDavid Woodhouse 
119483eb5811SDavid Woodhouse         err = xen_evtchn_close_op(&close);
119583eb5811SDavid Woodhouse         break;
119683eb5811SDavid Woodhouse     }
1197190cc3c0SDavid Woodhouse     case EVTCHNOP_unmask: {
1198190cc3c0SDavid Woodhouse         struct evtchn_unmask unmask;
1199190cc3c0SDavid Woodhouse 
1200190cc3c0SDavid Woodhouse         qemu_build_assert(sizeof(unmask) == 4);
1201190cc3c0SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &unmask, sizeof(unmask))) {
1202190cc3c0SDavid Woodhouse             err = -EFAULT;
1203190cc3c0SDavid Woodhouse             break;
1204190cc3c0SDavid Woodhouse         }
1205190cc3c0SDavid Woodhouse 
1206190cc3c0SDavid Woodhouse         err = xen_evtchn_unmask_op(&unmask);
1207190cc3c0SDavid Woodhouse         break;
1208190cc3c0SDavid Woodhouse     }
1209c723d4c1SDavid Woodhouse     case EVTCHNOP_bind_virq: {
1210c723d4c1SDavid Woodhouse         struct evtchn_bind_virq virq;
1211c723d4c1SDavid Woodhouse 
1212c723d4c1SDavid Woodhouse         qemu_build_assert(sizeof(virq) == 12);
1213c723d4c1SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &virq, sizeof(virq))) {
1214c723d4c1SDavid Woodhouse             err = -EFAULT;
1215c723d4c1SDavid Woodhouse             break;
1216c723d4c1SDavid Woodhouse         }
1217c723d4c1SDavid Woodhouse 
1218c723d4c1SDavid Woodhouse         err = xen_evtchn_bind_virq_op(&virq);
1219c723d4c1SDavid Woodhouse         if (!err && kvm_copy_to_gva(cs, arg, &virq, sizeof(virq))) {
1220c723d4c1SDavid Woodhouse             err = -EFAULT;
1221c723d4c1SDavid Woodhouse         }
1222c723d4c1SDavid Woodhouse         break;
1223c723d4c1SDavid Woodhouse     }
1224f5417856SDavid Woodhouse     case EVTCHNOP_bind_ipi: {
1225f5417856SDavid Woodhouse         struct evtchn_bind_ipi ipi;
1226f5417856SDavid Woodhouse 
1227f5417856SDavid Woodhouse         qemu_build_assert(sizeof(ipi) == 8);
1228f5417856SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &ipi, sizeof(ipi))) {
1229f5417856SDavid Woodhouse             err = -EFAULT;
1230f5417856SDavid Woodhouse             break;
1231f5417856SDavid Woodhouse         }
1232f5417856SDavid Woodhouse 
1233f5417856SDavid Woodhouse         err = xen_evtchn_bind_ipi_op(&ipi);
1234f5417856SDavid Woodhouse         if (!err && kvm_copy_to_gva(cs, arg, &ipi, sizeof(ipi))) {
1235f5417856SDavid Woodhouse             err = -EFAULT;
1236f5417856SDavid Woodhouse         }
1237f5417856SDavid Woodhouse         break;
1238f5417856SDavid Woodhouse     }
1239cf7679abSDavid Woodhouse     case EVTCHNOP_send: {
1240cf7679abSDavid Woodhouse         struct evtchn_send send;
1241cf7679abSDavid Woodhouse 
1242cf7679abSDavid Woodhouse         qemu_build_assert(sizeof(send) == 4);
1243cf7679abSDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &send, sizeof(send))) {
1244cf7679abSDavid Woodhouse             err = -EFAULT;
1245cf7679abSDavid Woodhouse             break;
1246cf7679abSDavid Woodhouse         }
1247cf7679abSDavid Woodhouse 
1248cf7679abSDavid Woodhouse         err = xen_evtchn_send_op(&send);
1249cf7679abSDavid Woodhouse         break;
1250cf7679abSDavid Woodhouse     }
1251e1db61b8SDavid Woodhouse     case EVTCHNOP_alloc_unbound: {
1252e1db61b8SDavid Woodhouse         struct evtchn_alloc_unbound alloc;
1253e1db61b8SDavid Woodhouse 
1254e1db61b8SDavid Woodhouse         qemu_build_assert(sizeof(alloc) == 8);
1255e1db61b8SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &alloc, sizeof(alloc))) {
1256e1db61b8SDavid Woodhouse             err = -EFAULT;
1257e1db61b8SDavid Woodhouse             break;
1258e1db61b8SDavid Woodhouse         }
1259e1db61b8SDavid Woodhouse 
1260e1db61b8SDavid Woodhouse         err = xen_evtchn_alloc_unbound_op(&alloc);
1261e1db61b8SDavid Woodhouse         if (!err && kvm_copy_to_gva(cs, arg, &alloc, sizeof(alloc))) {
1262e1db61b8SDavid Woodhouse             err = -EFAULT;
1263e1db61b8SDavid Woodhouse         }
1264e1db61b8SDavid Woodhouse         break;
1265e1db61b8SDavid Woodhouse     }
126684327881SDavid Woodhouse     case EVTCHNOP_bind_interdomain: {
126784327881SDavid Woodhouse         struct evtchn_bind_interdomain interdomain;
126884327881SDavid Woodhouse 
126984327881SDavid Woodhouse         qemu_build_assert(sizeof(interdomain) == 12);
127084327881SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &interdomain, sizeof(interdomain))) {
127184327881SDavid Woodhouse             err = -EFAULT;
127284327881SDavid Woodhouse             break;
127384327881SDavid Woodhouse         }
127484327881SDavid Woodhouse 
127584327881SDavid Woodhouse         err = xen_evtchn_bind_interdomain_op(&interdomain);
127684327881SDavid Woodhouse         if (!err &&
127784327881SDavid Woodhouse             kvm_copy_to_gva(cs, arg, &interdomain, sizeof(interdomain))) {
127884327881SDavid Woodhouse             err = -EFAULT;
127984327881SDavid Woodhouse         }
128084327881SDavid Woodhouse         break;
128184327881SDavid Woodhouse     }
128230667046SDavid Woodhouse     case EVTCHNOP_bind_vcpu: {
128330667046SDavid Woodhouse         struct evtchn_bind_vcpu vcpu;
128430667046SDavid Woodhouse 
128530667046SDavid Woodhouse         qemu_build_assert(sizeof(vcpu) == 8);
128630667046SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &vcpu, sizeof(vcpu))) {
128730667046SDavid Woodhouse             err = -EFAULT;
128830667046SDavid Woodhouse             break;
128930667046SDavid Woodhouse         }
129030667046SDavid Woodhouse 
129130667046SDavid Woodhouse         err = xen_evtchn_bind_vcpu_op(&vcpu);
129230667046SDavid Woodhouse         break;
129330667046SDavid Woodhouse     }
1294a15b1097SDavid Woodhouse     case EVTCHNOP_reset: {
1295a15b1097SDavid Woodhouse         struct evtchn_reset reset;
1296a15b1097SDavid Woodhouse 
1297a15b1097SDavid Woodhouse         qemu_build_assert(sizeof(reset) == 2);
1298a15b1097SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &reset, sizeof(reset))) {
1299a15b1097SDavid Woodhouse             err = -EFAULT;
1300a15b1097SDavid Woodhouse             break;
1301a15b1097SDavid Woodhouse         }
1302a15b1097SDavid Woodhouse 
1303a15b1097SDavid Woodhouse         err = xen_evtchn_reset_op(&reset);
1304a15b1097SDavid Woodhouse         break;
1305a15b1097SDavid Woodhouse     }
13063b06f29bSJoao Martins     default:
13073b06f29bSJoao Martins         return false;
13083b06f29bSJoao Martins     }
13093b06f29bSJoao Martins 
13103b06f29bSJoao Martins     exit->u.hcall.result = err;
13113b06f29bSJoao Martins     return true;
13123b06f29bSJoao Martins }
13133b06f29bSJoao Martins 
131479b7067dSJoao Martins int kvm_xen_soft_reset(void)
131579b7067dSJoao Martins {
1316c345104cSJoao Martins     CPUState *cpu;
1317fb0fd2ceSJoao Martins     int err;
1318fb0fd2ceSJoao Martins 
131979b7067dSJoao Martins     assert(qemu_mutex_iothread_locked());
132079b7067dSJoao Martins 
132179b7067dSJoao Martins     trace_kvm_xen_soft_reset();
132279b7067dSJoao Martins 
1323a15b1097SDavid Woodhouse     err = xen_evtchn_soft_reset();
1324a15b1097SDavid Woodhouse     if (err) {
1325a15b1097SDavid Woodhouse         return err;
1326a15b1097SDavid Woodhouse     }
1327a15b1097SDavid Woodhouse 
132891cce756SDavid Woodhouse     /*
132991cce756SDavid Woodhouse      * Zero is the reset/startup state for HVM_PARAM_CALLBACK_IRQ. Strictly,
133091cce756SDavid Woodhouse      * it maps to HVM_PARAM_CALLBACK_TYPE_GSI with GSI#0, but Xen refuses to
133191cce756SDavid Woodhouse      * to deliver to the timer interrupt and treats that as 'disabled'.
133291cce756SDavid Woodhouse      */
133391cce756SDavid Woodhouse     err = xen_evtchn_set_callback_param(0);
133491cce756SDavid Woodhouse     if (err) {
133591cce756SDavid Woodhouse         return err;
133691cce756SDavid Woodhouse     }
133791cce756SDavid Woodhouse 
1338c345104cSJoao Martins     CPU_FOREACH(cpu) {
1339c345104cSJoao Martins         async_run_on_cpu(cpu, do_vcpu_soft_reset, RUN_ON_CPU_NULL);
1340c345104cSJoao Martins     }
1341c345104cSJoao Martins 
1342fb0fd2ceSJoao Martins     err = xen_overlay_map_shinfo_page(INVALID_GFN);
1343fb0fd2ceSJoao Martins     if (err) {
1344fb0fd2ceSJoao Martins         return err;
1345fb0fd2ceSJoao Martins     }
1346fb0fd2ceSJoao Martins 
134779b7067dSJoao Martins     return 0;
134879b7067dSJoao Martins }
134979b7067dSJoao Martins 
135079b7067dSJoao Martins static int schedop_shutdown(CPUState *cs, uint64_t arg)
135179b7067dSJoao Martins {
135279b7067dSJoao Martins     struct sched_shutdown shutdown;
135379b7067dSJoao Martins     int ret = 0;
135479b7067dSJoao Martins 
135579b7067dSJoao Martins     /* No need for 32/64 compat handling */
135679b7067dSJoao Martins     qemu_build_assert(sizeof(shutdown) == 4);
135779b7067dSJoao Martins 
135879b7067dSJoao Martins     if (kvm_copy_from_gva(cs, arg, &shutdown, sizeof(shutdown))) {
135979b7067dSJoao Martins         return -EFAULT;
136079b7067dSJoao Martins     }
136179b7067dSJoao Martins 
136279b7067dSJoao Martins     switch (shutdown.reason) {
136379b7067dSJoao Martins     case SHUTDOWN_crash:
136479b7067dSJoao Martins         cpu_dump_state(cs, stderr, CPU_DUMP_CODE);
136579b7067dSJoao Martins         qemu_system_guest_panicked(NULL);
136679b7067dSJoao Martins         break;
136779b7067dSJoao Martins 
136879b7067dSJoao Martins     case SHUTDOWN_reboot:
136979b7067dSJoao Martins         qemu_system_reset_request(SHUTDOWN_CAUSE_GUEST_RESET);
137079b7067dSJoao Martins         break;
137179b7067dSJoao Martins 
137279b7067dSJoao Martins     case SHUTDOWN_poweroff:
137379b7067dSJoao Martins         qemu_system_shutdown_request(SHUTDOWN_CAUSE_GUEST_SHUTDOWN);
137479b7067dSJoao Martins         break;
137579b7067dSJoao Martins 
137679b7067dSJoao Martins     case SHUTDOWN_soft_reset:
137779b7067dSJoao Martins         qemu_mutex_lock_iothread();
137879b7067dSJoao Martins         ret = kvm_xen_soft_reset();
137979b7067dSJoao Martins         qemu_mutex_unlock_iothread();
138079b7067dSJoao Martins         break;
138179b7067dSJoao Martins 
138279b7067dSJoao Martins     default:
138379b7067dSJoao Martins         ret = -EINVAL;
138479b7067dSJoao Martins         break;
138579b7067dSJoao Martins     }
138679b7067dSJoao Martins 
138779b7067dSJoao Martins     return ret;
138879b7067dSJoao Martins }
138979b7067dSJoao Martins 
139079b7067dSJoao Martins static bool kvm_xen_hcall_sched_op(struct kvm_xen_exit *exit, X86CPU *cpu,
139179b7067dSJoao Martins                                    int cmd, uint64_t arg)
139279b7067dSJoao Martins {
139379b7067dSJoao Martins     CPUState *cs = CPU(cpu);
139479b7067dSJoao Martins     int err = -ENOSYS;
139579b7067dSJoao Martins 
139679b7067dSJoao Martins     switch (cmd) {
139779b7067dSJoao Martins     case SCHEDOP_shutdown:
139879b7067dSJoao Martins         err = schedop_shutdown(cs, arg);
139979b7067dSJoao Martins         break;
140079b7067dSJoao Martins 
1401c789b9efSDavid Woodhouse     case SCHEDOP_poll:
1402c789b9efSDavid Woodhouse         /*
1403c789b9efSDavid Woodhouse          * Linux will panic if this doesn't work. Just yield; it's not
1404c789b9efSDavid Woodhouse          * worth overthinking it because with event channel handling
1405c789b9efSDavid Woodhouse          * in KVM, the kernel will intercept this and it will never
1406c789b9efSDavid Woodhouse          * reach QEMU anyway. The semantics of the hypercall explicltly
1407c789b9efSDavid Woodhouse          * permit spurious wakeups.
1408c789b9efSDavid Woodhouse          */
1409c789b9efSDavid Woodhouse     case SCHEDOP_yield:
1410c789b9efSDavid Woodhouse         sched_yield();
1411c789b9efSDavid Woodhouse         err = 0;
1412c789b9efSDavid Woodhouse         break;
1413c789b9efSDavid Woodhouse 
141479b7067dSJoao Martins     default:
141579b7067dSJoao Martins         return false;
141679b7067dSJoao Martins     }
141779b7067dSJoao Martins 
141879b7067dSJoao Martins     exit->u.hcall.result = err;
141979b7067dSJoao Martins     return true;
142079b7067dSJoao Martins }
142179b7067dSJoao Martins 
142228b7ae94SDavid Woodhouse static bool kvm_xen_hcall_gnttab_op(struct kvm_xen_exit *exit, X86CPU *cpu,
142328b7ae94SDavid Woodhouse                                     int cmd, uint64_t arg, int count)
142428b7ae94SDavid Woodhouse {
142528b7ae94SDavid Woodhouse     CPUState *cs = CPU(cpu);
142628b7ae94SDavid Woodhouse     int err;
142728b7ae94SDavid Woodhouse 
142828b7ae94SDavid Woodhouse     switch (cmd) {
142928b7ae94SDavid Woodhouse     case GNTTABOP_set_version: {
143028b7ae94SDavid Woodhouse         struct gnttab_set_version set;
143128b7ae94SDavid Woodhouse 
143228b7ae94SDavid Woodhouse         qemu_build_assert(sizeof(set) == 4);
143328b7ae94SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &set, sizeof(set))) {
143428b7ae94SDavid Woodhouse             err = -EFAULT;
143528b7ae94SDavid Woodhouse             break;
143628b7ae94SDavid Woodhouse         }
143728b7ae94SDavid Woodhouse 
143828b7ae94SDavid Woodhouse         err = xen_gnttab_set_version_op(&set);
143928b7ae94SDavid Woodhouse         if (!err && kvm_copy_to_gva(cs, arg, &set, sizeof(set))) {
144028b7ae94SDavid Woodhouse             err = -EFAULT;
144128b7ae94SDavid Woodhouse         }
144228b7ae94SDavid Woodhouse         break;
144328b7ae94SDavid Woodhouse     }
144428b7ae94SDavid Woodhouse     case GNTTABOP_get_version: {
144528b7ae94SDavid Woodhouse         struct gnttab_get_version get;
144628b7ae94SDavid Woodhouse 
144728b7ae94SDavid Woodhouse         qemu_build_assert(sizeof(get) == 8);
144828b7ae94SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &get, sizeof(get))) {
144928b7ae94SDavid Woodhouse             err = -EFAULT;
145028b7ae94SDavid Woodhouse             break;
145128b7ae94SDavid Woodhouse         }
145228b7ae94SDavid Woodhouse 
145328b7ae94SDavid Woodhouse         err = xen_gnttab_get_version_op(&get);
145428b7ae94SDavid Woodhouse         if (!err && kvm_copy_to_gva(cs, arg, &get, sizeof(get))) {
145528b7ae94SDavid Woodhouse             err = -EFAULT;
145628b7ae94SDavid Woodhouse         }
145728b7ae94SDavid Woodhouse         break;
145828b7ae94SDavid Woodhouse     }
1459b46f9745SDavid Woodhouse     case GNTTABOP_query_size: {
1460b46f9745SDavid Woodhouse         struct gnttab_query_size size;
1461b46f9745SDavid Woodhouse 
1462b46f9745SDavid Woodhouse         qemu_build_assert(sizeof(size) == 16);
1463b46f9745SDavid Woodhouse         if (kvm_copy_from_gva(cs, arg, &size, sizeof(size))) {
1464b46f9745SDavid Woodhouse             err = -EFAULT;
1465b46f9745SDavid Woodhouse             break;
1466b46f9745SDavid Woodhouse         }
1467b46f9745SDavid Woodhouse 
1468b46f9745SDavid Woodhouse         err = xen_gnttab_query_size_op(&size);
1469b46f9745SDavid Woodhouse         if (!err && kvm_copy_to_gva(cs, arg, &size, sizeof(size))) {
1470b46f9745SDavid Woodhouse             err = -EFAULT;
1471b46f9745SDavid Woodhouse         }
1472b46f9745SDavid Woodhouse         break;
1473b46f9745SDavid Woodhouse     }
147428b7ae94SDavid Woodhouse     case GNTTABOP_setup_table:
147528b7ae94SDavid Woodhouse     case GNTTABOP_copy:
147628b7ae94SDavid Woodhouse     case GNTTABOP_map_grant_ref:
147728b7ae94SDavid Woodhouse     case GNTTABOP_unmap_grant_ref:
147828b7ae94SDavid Woodhouse     case GNTTABOP_swap_grant_ref:
147928b7ae94SDavid Woodhouse         return false;
148028b7ae94SDavid Woodhouse 
148128b7ae94SDavid Woodhouse     default:
148228b7ae94SDavid Woodhouse         /* Xen explicitly returns -ENOSYS to HVM guests for all others */
148328b7ae94SDavid Woodhouse         err = -ENOSYS;
148428b7ae94SDavid Woodhouse         break;
148528b7ae94SDavid Woodhouse     }
148628b7ae94SDavid Woodhouse 
148728b7ae94SDavid Woodhouse     exit->u.hcall.result = err;
148828b7ae94SDavid Woodhouse     return true;
148928b7ae94SDavid Woodhouse }
149028b7ae94SDavid Woodhouse 
149155a3f666SJoao Martins static bool do_kvm_xen_handle_exit(X86CPU *cpu, struct kvm_xen_exit *exit)
149255a3f666SJoao Martins {
149355a3f666SJoao Martins     uint16_t code = exit->u.hcall.input;
149455a3f666SJoao Martins 
149555a3f666SJoao Martins     if (exit->u.hcall.cpl > 0) {
149655a3f666SJoao Martins         exit->u.hcall.result = -EPERM;
149755a3f666SJoao Martins         return true;
149855a3f666SJoao Martins     }
149955a3f666SJoao Martins 
150055a3f666SJoao Martins     switch (code) {
1501b746a779SJoao Martins     case __HYPERVISOR_set_timer_op:
1502b746a779SJoao Martins         if (exit->u.hcall.longmode) {
1503b746a779SJoao Martins             return kvm_xen_hcall_set_timer_op(exit, cpu,
1504b746a779SJoao Martins                                               exit->u.hcall.params[0]);
1505b746a779SJoao Martins         } else {
1506b746a779SJoao Martins             /* In 32-bit mode, the 64-bit timer value is in two args. */
1507b746a779SJoao Martins             uint64_t val = ((uint64_t)exit->u.hcall.params[1]) << 32 |
1508b746a779SJoao Martins                 (uint32_t)exit->u.hcall.params[0];
1509b746a779SJoao Martins             return kvm_xen_hcall_set_timer_op(exit, cpu, val);
1510b746a779SJoao Martins         }
151128b7ae94SDavid Woodhouse     case __HYPERVISOR_grant_table_op:
151228b7ae94SDavid Woodhouse         return kvm_xen_hcall_gnttab_op(exit, cpu, exit->u.hcall.params[0],
151328b7ae94SDavid Woodhouse                                        exit->u.hcall.params[1],
151428b7ae94SDavid Woodhouse                                        exit->u.hcall.params[2]);
151579b7067dSJoao Martins     case __HYPERVISOR_sched_op:
151679b7067dSJoao Martins         return kvm_xen_hcall_sched_op(exit, cpu, exit->u.hcall.params[0],
151779b7067dSJoao Martins                                       exit->u.hcall.params[1]);
15183b06f29bSJoao Martins     case __HYPERVISOR_event_channel_op:
15194858ba20SDavid Woodhouse         return kvm_xen_hcall_evtchn_op(exit, cpu, exit->u.hcall.params[0],
15203b06f29bSJoao Martins                                        exit->u.hcall.params[1]);
1521d70bd6a4SJoao Martins     case __HYPERVISOR_vcpu_op:
1522d70bd6a4SJoao Martins         return kvm_xen_hcall_vcpu_op(exit, cpu,
1523d70bd6a4SJoao Martins                                      exit->u.hcall.params[0],
1524d70bd6a4SJoao Martins                                      exit->u.hcall.params[1],
1525d70bd6a4SJoao Martins                                      exit->u.hcall.params[2]);
1526671bfdcdSJoao Martins     case __HYPERVISOR_hvm_op:
1527671bfdcdSJoao Martins         return kvm_xen_hcall_hvm_op(exit, cpu, exit->u.hcall.params[0],
1528671bfdcdSJoao Martins                                     exit->u.hcall.params[1]);
1529fb0fd2ceSJoao Martins     case __HYPERVISOR_memory_op:
1530fb0fd2ceSJoao Martins         return kvm_xen_hcall_memory_op(exit, cpu, exit->u.hcall.params[0],
1531fb0fd2ceSJoao Martins                                        exit->u.hcall.params[1]);
1532bedcc139SJoao Martins     case __HYPERVISOR_xen_version:
1533bedcc139SJoao Martins         return kvm_xen_hcall_xen_version(exit, cpu, exit->u.hcall.params[0],
1534bedcc139SJoao Martins                                          exit->u.hcall.params[1]);
153555a3f666SJoao Martins     default:
153655a3f666SJoao Martins         return false;
153755a3f666SJoao Martins     }
153855a3f666SJoao Martins }
153955a3f666SJoao Martins 
154055a3f666SJoao Martins int kvm_xen_handle_exit(X86CPU *cpu, struct kvm_xen_exit *exit)
154155a3f666SJoao Martins {
154255a3f666SJoao Martins     if (exit->type != KVM_EXIT_XEN_HCALL) {
154355a3f666SJoao Martins         return -1;
154455a3f666SJoao Martins     }
154555a3f666SJoao Martins 
1546110a0ea5SDavid Woodhouse     /*
1547110a0ea5SDavid Woodhouse      * The kernel latches the guest 32/64 mode when the MSR is used to fill
1548110a0ea5SDavid Woodhouse      * the hypercall page. So if we see a hypercall in a mode that doesn't
1549110a0ea5SDavid Woodhouse      * match our own idea of the guest mode, fetch the kernel's idea of the
1550110a0ea5SDavid Woodhouse      * "long mode" to remain in sync.
1551110a0ea5SDavid Woodhouse      */
1552110a0ea5SDavid Woodhouse     if (exit->u.hcall.longmode != xen_is_long_mode()) {
1553110a0ea5SDavid Woodhouse         xen_sync_long_mode();
1554110a0ea5SDavid Woodhouse     }
1555110a0ea5SDavid Woodhouse 
155655a3f666SJoao Martins     if (!do_kvm_xen_handle_exit(cpu, exit)) {
155755a3f666SJoao Martins         /*
155855a3f666SJoao Martins          * Some hypercalls will be deliberately "implemented" by returning
155955a3f666SJoao Martins          * -ENOSYS. This case is for hypercalls which are unexpected.
156055a3f666SJoao Martins          */
156155a3f666SJoao Martins         exit->u.hcall.result = -ENOSYS;
156255a3f666SJoao Martins         qemu_log_mask(LOG_UNIMP, "Unimplemented Xen hypercall %"
156355a3f666SJoao Martins                       PRId64 " (0x%" PRIx64 " 0x%" PRIx64 " 0x%" PRIx64 ")\n",
156455a3f666SJoao Martins                       (uint64_t)exit->u.hcall.input,
156555a3f666SJoao Martins                       (uint64_t)exit->u.hcall.params[0],
156655a3f666SJoao Martins                       (uint64_t)exit->u.hcall.params[1],
156755a3f666SJoao Martins                       (uint64_t)exit->u.hcall.params[2]);
156855a3f666SJoao Martins     }
156955a3f666SJoao Martins 
157055a3f666SJoao Martins     trace_kvm_xen_hypercall(CPU(cpu)->cpu_index, exit->u.hcall.cpl,
157155a3f666SJoao Martins                             exit->u.hcall.input, exit->u.hcall.params[0],
157255a3f666SJoao Martins                             exit->u.hcall.params[1], exit->u.hcall.params[2],
157355a3f666SJoao Martins                             exit->u.hcall.result);
157455a3f666SJoao Martins     return 0;
157555a3f666SJoao Martins }
1576c345104cSJoao Martins 
15776f43f2eeSDavid Woodhouse uint16_t kvm_xen_get_gnttab_max_frames(void)
15786f43f2eeSDavid Woodhouse {
15796f43f2eeSDavid Woodhouse     KVMState *s = KVM_STATE(current_accel());
15806f43f2eeSDavid Woodhouse     return s->xen_gnttab_max_frames;
15816f43f2eeSDavid Woodhouse }
15826f43f2eeSDavid Woodhouse 
1583c345104cSJoao Martins int kvm_put_xen_state(CPUState *cs)
1584c345104cSJoao Martins {
1585c345104cSJoao Martins     X86CPU *cpu = X86_CPU(cs);
1586c345104cSJoao Martins     CPUX86State *env = &cpu->env;
1587c345104cSJoao Martins     uint64_t gpa;
1588c345104cSJoao Martins     int ret;
1589c345104cSJoao Martins 
1590c345104cSJoao Martins     gpa = env->xen_vcpu_info_gpa;
1591c345104cSJoao Martins     if (gpa == INVALID_GPA) {
1592c345104cSJoao Martins         gpa = env->xen_vcpu_info_default_gpa;
1593c345104cSJoao Martins     }
1594c345104cSJoao Martins 
1595c345104cSJoao Martins     if (gpa != INVALID_GPA) {
159627d4075dSDavid Woodhouse         ret = set_vcpu_info(cs, gpa);
1597c345104cSJoao Martins         if (ret < 0) {
1598c345104cSJoao Martins             return ret;
1599c345104cSJoao Martins         }
1600c345104cSJoao Martins     }
1601c345104cSJoao Martins 
1602f0689302SJoao Martins     gpa = env->xen_vcpu_time_info_gpa;
1603f0689302SJoao Martins     if (gpa != INVALID_GPA) {
1604f0689302SJoao Martins         ret = kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO,
1605f0689302SJoao Martins                                     gpa);
1606f0689302SJoao Martins         if (ret < 0) {
1607f0689302SJoao Martins             return ret;
1608f0689302SJoao Martins         }
1609f0689302SJoao Martins     }
1610f0689302SJoao Martins 
16115092db87SJoao Martins     gpa = env->xen_vcpu_runstate_gpa;
16125092db87SJoao Martins     if (gpa != INVALID_GPA) {
16135092db87SJoao Martins         ret = kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR,
16145092db87SJoao Martins                                     gpa);
16155092db87SJoao Martins         if (ret < 0) {
16165092db87SJoao Martins             return ret;
16175092db87SJoao Martins         }
16185092db87SJoao Martins     }
16195092db87SJoao Martins 
1620b746a779SJoao Martins     if (env->xen_periodic_timer_period) {
1621b746a779SJoao Martins         ret = do_set_periodic_timer(cs, env->xen_periodic_timer_period);
1622b746a779SJoao Martins         if (ret < 0) {
1623b746a779SJoao Martins             return ret;
1624b746a779SJoao Martins         }
1625b746a779SJoao Martins     }
1626b746a779SJoao Martins 
1627105b47fdSAnkur Arora     if (!kvm_xen_has_cap(EVTCHN_SEND)) {
1628b746a779SJoao Martins         /*
1629b746a779SJoao Martins          * If the kernel has EVTCHN_SEND support then it handles timers too,
1630b746a779SJoao Martins          * so the timer will be restored by kvm_xen_set_vcpu_timer() below.
1631b746a779SJoao Martins          */
1632b746a779SJoao Martins         if (env->xen_singleshot_timer_ns) {
1633b746a779SJoao Martins             ret = do_set_singleshot_timer(cs, env->xen_singleshot_timer_ns,
1634b746a779SJoao Martins                                     false, false);
1635b746a779SJoao Martins             if (ret < 0) {
1636b746a779SJoao Martins                 return ret;
1637b746a779SJoao Martins             }
1638b746a779SJoao Martins         }
1639105b47fdSAnkur Arora         return 0;
1640105b47fdSAnkur Arora     }
1641105b47fdSAnkur Arora 
1642105b47fdSAnkur Arora     if (env->xen_vcpu_callback_vector) {
1643105b47fdSAnkur Arora         ret = kvm_xen_set_vcpu_callback_vector(cs);
1644105b47fdSAnkur Arora         if (ret < 0) {
1645105b47fdSAnkur Arora             return ret;
1646105b47fdSAnkur Arora         }
1647105b47fdSAnkur Arora     }
1648105b47fdSAnkur Arora 
1649c723d4c1SDavid Woodhouse     if (env->xen_virq[VIRQ_TIMER]) {
1650c723d4c1SDavid Woodhouse         ret = kvm_xen_set_vcpu_timer(cs);
1651c723d4c1SDavid Woodhouse         if (ret < 0) {
1652c723d4c1SDavid Woodhouse             return ret;
1653c723d4c1SDavid Woodhouse         }
1654c723d4c1SDavid Woodhouse     }
1655c345104cSJoao Martins     return 0;
1656c345104cSJoao Martins }
1657c345104cSJoao Martins 
1658c345104cSJoao Martins int kvm_get_xen_state(CPUState *cs)
1659c345104cSJoao Martins {
1660c345104cSJoao Martins     X86CPU *cpu = X86_CPU(cs);
1661c345104cSJoao Martins     CPUX86State *env = &cpu->env;
1662c345104cSJoao Martins     uint64_t gpa;
1663c723d4c1SDavid Woodhouse     int ret;
1664c345104cSJoao Martins 
1665c345104cSJoao Martins     /*
1666c345104cSJoao Martins      * The kernel does not mark vcpu_info as dirty when it delivers interrupts
1667c345104cSJoao Martins      * to it. It's up to userspace to *assume* that any page shared thus is
1668c345104cSJoao Martins      * always considered dirty. The shared_info page is different since it's
1669c345104cSJoao Martins      * an overlay and migrated separately anyway.
1670c345104cSJoao Martins      */
1671c345104cSJoao Martins     gpa = env->xen_vcpu_info_gpa;
1672c345104cSJoao Martins     if (gpa == INVALID_GPA) {
1673c345104cSJoao Martins         gpa = env->xen_vcpu_info_default_gpa;
1674c345104cSJoao Martins     }
1675c345104cSJoao Martins     if (gpa != INVALID_GPA) {
1676c345104cSJoao Martins         MemoryRegionSection mrs = memory_region_find(get_system_memory(),
1677c345104cSJoao Martins                                                      gpa,
1678c345104cSJoao Martins                                                      sizeof(struct vcpu_info));
1679c345104cSJoao Martins         if (mrs.mr &&
1680c345104cSJoao Martins             !int128_lt(mrs.size, int128_make64(sizeof(struct vcpu_info)))) {
1681c345104cSJoao Martins             memory_region_set_dirty(mrs.mr, mrs.offset_within_region,
1682c345104cSJoao Martins                                     sizeof(struct vcpu_info));
1683c345104cSJoao Martins         }
1684c345104cSJoao Martins     }
1685c345104cSJoao Martins 
1686c723d4c1SDavid Woodhouse     if (!kvm_xen_has_cap(EVTCHN_SEND)) {
1687c723d4c1SDavid Woodhouse         return 0;
1688c723d4c1SDavid Woodhouse     }
1689c723d4c1SDavid Woodhouse 
1690c723d4c1SDavid Woodhouse     /*
1691c723d4c1SDavid Woodhouse      * If the kernel is accelerating timers, read out the current value of the
1692c723d4c1SDavid Woodhouse      * singleshot timer deadline.
1693c723d4c1SDavid Woodhouse      */
1694c723d4c1SDavid Woodhouse     if (env->xen_virq[VIRQ_TIMER]) {
1695c723d4c1SDavid Woodhouse         struct kvm_xen_vcpu_attr va = {
1696c723d4c1SDavid Woodhouse             .type = KVM_XEN_VCPU_ATTR_TYPE_TIMER,
1697c723d4c1SDavid Woodhouse         };
1698c723d4c1SDavid Woodhouse         ret = kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_GET_ATTR, &va);
1699c723d4c1SDavid Woodhouse         if (ret < 0) {
1700c723d4c1SDavid Woodhouse             return ret;
1701c723d4c1SDavid Woodhouse         }
1702c723d4c1SDavid Woodhouse         env->xen_singleshot_timer_ns = va.u.timer.expires_ns;
1703c723d4c1SDavid Woodhouse     }
1704c723d4c1SDavid Woodhouse 
1705c345104cSJoao Martins     return 0;
1706c345104cSJoao Martins }
1707