161491cf4SDavid Woodhouse /* 261491cf4SDavid Woodhouse * Xen HVM emulation support in KVM 361491cf4SDavid Woodhouse * 461491cf4SDavid Woodhouse * Copyright © 2019 Oracle and/or its affiliates. All rights reserved. 561491cf4SDavid Woodhouse * Copyright © 2022 Amazon.com, Inc. or its affiliates. All Rights Reserved. 661491cf4SDavid Woodhouse * 761491cf4SDavid Woodhouse * This work is licensed under the terms of the GNU GPL, version 2 or later. 861491cf4SDavid Woodhouse * See the COPYING file in the top-level directory. 961491cf4SDavid Woodhouse * 1061491cf4SDavid Woodhouse */ 1161491cf4SDavid Woodhouse 1261491cf4SDavid Woodhouse #include "qemu/osdep.h" 1355a3f666SJoao Martins #include "qemu/log.h" 1479b7067dSJoao Martins #include "qemu/main-loop.h" 15fb0fd2ceSJoao Martins #include "hw/xen/xen.h" 1661491cf4SDavid Woodhouse #include "sysemu/kvm_int.h" 1761491cf4SDavid Woodhouse #include "sysemu/kvm_xen.h" 1861491cf4SDavid Woodhouse #include "kvm/kvm_i386.h" 19bedcc139SJoao Martins #include "exec/address-spaces.h" 2061491cf4SDavid Woodhouse #include "xen-emu.h" 2155a3f666SJoao Martins #include "trace.h" 2279b7067dSJoao Martins #include "sysemu/runstate.h" 2361491cf4SDavid Woodhouse 2427d4075dSDavid Woodhouse #include "hw/pci/msi.h" 2527d4075dSDavid Woodhouse #include "hw/i386/apic-msidef.h" 26110a0ea5SDavid Woodhouse #include "hw/i386/kvm/xen_overlay.h" 2791cce756SDavid Woodhouse #include "hw/i386/kvm/xen_evtchn.h" 28110a0ea5SDavid Woodhouse 29bedcc139SJoao Martins #include "hw/xen/interface/version.h" 3079b7067dSJoao Martins #include "hw/xen/interface/sched.h" 31fb0fd2ceSJoao Martins #include "hw/xen/interface/memory.h" 32671bfdcdSJoao Martins #include "hw/xen/interface/hvm/hvm_op.h" 33105b47fdSAnkur Arora #include "hw/xen/interface/hvm/params.h" 34d70bd6a4SJoao Martins #include "hw/xen/interface/vcpu.h" 353b06f29bSJoao Martins #include "hw/xen/interface/event_channel.h" 36fb0fd2ceSJoao Martins 37fb0fd2ceSJoao Martins #include "xen-compat.h" 38fb0fd2ceSJoao Martins 39fb0fd2ceSJoao Martins #ifdef TARGET_X86_64 40fb0fd2ceSJoao Martins #define hypercall_compat32(longmode) (!(longmode)) 41fb0fd2ceSJoao Martins #else 42fb0fd2ceSJoao Martins #define hypercall_compat32(longmode) (false) 43fb0fd2ceSJoao Martins #endif 44bedcc139SJoao Martins 45f0689302SJoao Martins static bool kvm_gva_to_gpa(CPUState *cs, uint64_t gva, uint64_t *gpa, 46f0689302SJoao Martins size_t *len, bool is_write) 47bedcc139SJoao Martins { 48bedcc139SJoao Martins struct kvm_translation tr = { 49bedcc139SJoao Martins .linear_address = gva, 50bedcc139SJoao Martins }; 51bedcc139SJoao Martins 52f0689302SJoao Martins if (len) { 53f0689302SJoao Martins *len = TARGET_PAGE_SIZE - (gva & ~TARGET_PAGE_MASK); 54f0689302SJoao Martins } 55f0689302SJoao Martins 56f0689302SJoao Martins if (kvm_vcpu_ioctl(cs, KVM_TRANSLATE, &tr) || !tr.valid || 57f0689302SJoao Martins (is_write && !tr.writeable)) { 58f0689302SJoao Martins return false; 59f0689302SJoao Martins } 60f0689302SJoao Martins *gpa = tr.physical_address; 61f0689302SJoao Martins return true; 62f0689302SJoao Martins } 63f0689302SJoao Martins 64f0689302SJoao Martins static int kvm_gva_rw(CPUState *cs, uint64_t gva, void *_buf, size_t sz, 65f0689302SJoao Martins bool is_write) 66f0689302SJoao Martins { 67f0689302SJoao Martins uint8_t *buf = (uint8_t *)_buf; 68f0689302SJoao Martins uint64_t gpa; 69f0689302SJoao Martins size_t len; 70f0689302SJoao Martins 71f0689302SJoao Martins while (sz) { 72f0689302SJoao Martins if (!kvm_gva_to_gpa(cs, gva, &gpa, &len, is_write)) { 73f0689302SJoao Martins return -EFAULT; 74f0689302SJoao Martins } 75bedcc139SJoao Martins if (len > sz) { 76bedcc139SJoao Martins len = sz; 77bedcc139SJoao Martins } 78bedcc139SJoao Martins 79f0689302SJoao Martins cpu_physical_memory_rw(gpa, buf, len, is_write); 80bedcc139SJoao Martins 81bedcc139SJoao Martins buf += len; 82bedcc139SJoao Martins sz -= len; 83bedcc139SJoao Martins gva += len; 84bedcc139SJoao Martins } 85bedcc139SJoao Martins 86bedcc139SJoao Martins return 0; 87bedcc139SJoao Martins } 88bedcc139SJoao Martins 89bedcc139SJoao Martins static inline int kvm_copy_from_gva(CPUState *cs, uint64_t gva, void *buf, 90bedcc139SJoao Martins size_t sz) 91bedcc139SJoao Martins { 92bedcc139SJoao Martins return kvm_gva_rw(cs, gva, buf, sz, false); 93bedcc139SJoao Martins } 94bedcc139SJoao Martins 95bedcc139SJoao Martins static inline int kvm_copy_to_gva(CPUState *cs, uint64_t gva, void *buf, 96bedcc139SJoao Martins size_t sz) 97bedcc139SJoao Martins { 98bedcc139SJoao Martins return kvm_gva_rw(cs, gva, buf, sz, true); 99bedcc139SJoao Martins } 100bedcc139SJoao Martins 101f66b8a83SJoao Martins int kvm_xen_init(KVMState *s, uint32_t hypercall_msr) 10261491cf4SDavid Woodhouse { 10361491cf4SDavid Woodhouse const int required_caps = KVM_XEN_HVM_CONFIG_HYPERCALL_MSR | 10461491cf4SDavid Woodhouse KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL | KVM_XEN_HVM_CONFIG_SHARED_INFO; 10561491cf4SDavid Woodhouse struct kvm_xen_hvm_config cfg = { 106f66b8a83SJoao Martins .msr = hypercall_msr, 10761491cf4SDavid Woodhouse .flags = KVM_XEN_HVM_CONFIG_INTERCEPT_HCALL, 10861491cf4SDavid Woodhouse }; 10961491cf4SDavid Woodhouse int xen_caps, ret; 11061491cf4SDavid Woodhouse 11161491cf4SDavid Woodhouse xen_caps = kvm_check_extension(s, KVM_CAP_XEN_HVM); 11261491cf4SDavid Woodhouse if (required_caps & ~xen_caps) { 11361491cf4SDavid Woodhouse error_report("kvm: Xen HVM guest support not present or insufficient"); 11461491cf4SDavid Woodhouse return -ENOSYS; 11561491cf4SDavid Woodhouse } 11661491cf4SDavid Woodhouse 11761491cf4SDavid Woodhouse if (xen_caps & KVM_XEN_HVM_CONFIG_EVTCHN_SEND) { 11861491cf4SDavid Woodhouse struct kvm_xen_hvm_attr ha = { 11961491cf4SDavid Woodhouse .type = KVM_XEN_ATTR_TYPE_XEN_VERSION, 12061491cf4SDavid Woodhouse .u.xen_version = s->xen_version, 12161491cf4SDavid Woodhouse }; 12261491cf4SDavid Woodhouse (void)kvm_vm_ioctl(s, KVM_XEN_HVM_SET_ATTR, &ha); 12361491cf4SDavid Woodhouse 12461491cf4SDavid Woodhouse cfg.flags |= KVM_XEN_HVM_CONFIG_EVTCHN_SEND; 12561491cf4SDavid Woodhouse } 12661491cf4SDavid Woodhouse 12761491cf4SDavid Woodhouse ret = kvm_vm_ioctl(s, KVM_XEN_HVM_CONFIG, &cfg); 12861491cf4SDavid Woodhouse if (ret < 0) { 12961491cf4SDavid Woodhouse error_report("kvm: Failed to enable Xen HVM support: %s", 13061491cf4SDavid Woodhouse strerror(-ret)); 13161491cf4SDavid Woodhouse return ret; 13261491cf4SDavid Woodhouse } 13361491cf4SDavid Woodhouse 13461491cf4SDavid Woodhouse s->xen_caps = xen_caps; 13561491cf4SDavid Woodhouse return 0; 13661491cf4SDavid Woodhouse } 13761491cf4SDavid Woodhouse 1385e691a95SDavid Woodhouse int kvm_xen_init_vcpu(CPUState *cs) 1395e691a95SDavid Woodhouse { 140c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs); 141c345104cSJoao Martins CPUX86State *env = &cpu->env; 1425e691a95SDavid Woodhouse int err; 1435e691a95SDavid Woodhouse 1445e691a95SDavid Woodhouse /* 1455e691a95SDavid Woodhouse * The kernel needs to know the Xen/ACPI vCPU ID because that's 1465e691a95SDavid Woodhouse * what the guest uses in hypercalls such as timers. It doesn't 1475e691a95SDavid Woodhouse * match the APIC ID which is generally used for talking to the 1485e691a95SDavid Woodhouse * kernel about vCPUs. And if vCPU threads race with creating 1495e691a95SDavid Woodhouse * their KVM vCPUs out of order, it doesn't necessarily match 1505e691a95SDavid Woodhouse * with the kernel's internal vCPU indices either. 1515e691a95SDavid Woodhouse */ 1525e691a95SDavid Woodhouse if (kvm_xen_has_cap(EVTCHN_SEND)) { 1535e691a95SDavid Woodhouse struct kvm_xen_vcpu_attr va = { 1545e691a95SDavid Woodhouse .type = KVM_XEN_VCPU_ATTR_TYPE_VCPU_ID, 1555e691a95SDavid Woodhouse .u.vcpu_id = cs->cpu_index, 1565e691a95SDavid Woodhouse }; 1575e691a95SDavid Woodhouse err = kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_SET_ATTR, &va); 1585e691a95SDavid Woodhouse if (err) { 1595e691a95SDavid Woodhouse error_report("kvm: Failed to set Xen vCPU ID attribute: %s", 1605e691a95SDavid Woodhouse strerror(-err)); 1615e691a95SDavid Woodhouse return err; 1625e691a95SDavid Woodhouse } 1635e691a95SDavid Woodhouse } 1645e691a95SDavid Woodhouse 165c345104cSJoao Martins env->xen_vcpu_info_gpa = INVALID_GPA; 166c345104cSJoao Martins env->xen_vcpu_info_default_gpa = INVALID_GPA; 167f0689302SJoao Martins env->xen_vcpu_time_info_gpa = INVALID_GPA; 1685092db87SJoao Martins env->xen_vcpu_runstate_gpa = INVALID_GPA; 169c345104cSJoao Martins 1705e691a95SDavid Woodhouse return 0; 1715e691a95SDavid Woodhouse } 1725e691a95SDavid Woodhouse 17361491cf4SDavid Woodhouse uint32_t kvm_xen_get_caps(void) 17461491cf4SDavid Woodhouse { 17561491cf4SDavid Woodhouse return kvm_state->xen_caps; 17661491cf4SDavid Woodhouse } 17755a3f666SJoao Martins 178bedcc139SJoao Martins static bool kvm_xen_hcall_xen_version(struct kvm_xen_exit *exit, X86CPU *cpu, 179bedcc139SJoao Martins int cmd, uint64_t arg) 180bedcc139SJoao Martins { 181bedcc139SJoao Martins int err = 0; 182bedcc139SJoao Martins 183bedcc139SJoao Martins switch (cmd) { 184bedcc139SJoao Martins case XENVER_get_features: { 185bedcc139SJoao Martins struct xen_feature_info fi; 186bedcc139SJoao Martins 187bedcc139SJoao Martins /* No need for 32/64 compat handling */ 188bedcc139SJoao Martins qemu_build_assert(sizeof(fi) == 8); 189bedcc139SJoao Martins 190bedcc139SJoao Martins err = kvm_copy_from_gva(CPU(cpu), arg, &fi, sizeof(fi)); 191bedcc139SJoao Martins if (err) { 192bedcc139SJoao Martins break; 193bedcc139SJoao Martins } 194bedcc139SJoao Martins 195bedcc139SJoao Martins fi.submap = 0; 196bedcc139SJoao Martins if (fi.submap_idx == 0) { 197bedcc139SJoao Martins fi.submap |= 1 << XENFEAT_writable_page_tables | 198bedcc139SJoao Martins 1 << XENFEAT_writable_descriptor_tables | 199bedcc139SJoao Martins 1 << XENFEAT_auto_translated_physmap | 200105b47fdSAnkur Arora 1 << XENFEAT_supervisor_mode_kernel | 201105b47fdSAnkur Arora 1 << XENFEAT_hvm_callback_vector; 202bedcc139SJoao Martins } 203bedcc139SJoao Martins 204bedcc139SJoao Martins err = kvm_copy_to_gva(CPU(cpu), arg, &fi, sizeof(fi)); 205bedcc139SJoao Martins break; 206bedcc139SJoao Martins } 207bedcc139SJoao Martins 208bedcc139SJoao Martins default: 209bedcc139SJoao Martins return false; 210bedcc139SJoao Martins } 211bedcc139SJoao Martins 212bedcc139SJoao Martins exit->u.hcall.result = err; 213bedcc139SJoao Martins return true; 214bedcc139SJoao Martins } 215bedcc139SJoao Martins 216c345104cSJoao Martins static int kvm_xen_set_vcpu_attr(CPUState *cs, uint16_t type, uint64_t gpa) 217c345104cSJoao Martins { 218c345104cSJoao Martins struct kvm_xen_vcpu_attr xhsi; 219c345104cSJoao Martins 220c345104cSJoao Martins xhsi.type = type; 221c345104cSJoao Martins xhsi.u.gpa = gpa; 222c345104cSJoao Martins 223c345104cSJoao Martins trace_kvm_xen_set_vcpu_attr(cs->cpu_index, type, gpa); 224c345104cSJoao Martins 225c345104cSJoao Martins return kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_SET_ATTR, &xhsi); 226c345104cSJoao Martins } 227c345104cSJoao Martins 228105b47fdSAnkur Arora static int kvm_xen_set_vcpu_callback_vector(CPUState *cs) 229105b47fdSAnkur Arora { 230105b47fdSAnkur Arora uint8_t vector = X86_CPU(cs)->env.xen_vcpu_callback_vector; 231105b47fdSAnkur Arora struct kvm_xen_vcpu_attr xva; 232105b47fdSAnkur Arora 233105b47fdSAnkur Arora xva.type = KVM_XEN_VCPU_ATTR_TYPE_UPCALL_VECTOR; 234105b47fdSAnkur Arora xva.u.vector = vector; 235105b47fdSAnkur Arora 236105b47fdSAnkur Arora trace_kvm_xen_set_vcpu_callback(cs->cpu_index, vector); 237105b47fdSAnkur Arora 238105b47fdSAnkur Arora return kvm_vcpu_ioctl(cs, KVM_XEN_HVM_SET_ATTR, &xva); 239105b47fdSAnkur Arora } 240105b47fdSAnkur Arora 241105b47fdSAnkur Arora static void do_set_vcpu_callback_vector(CPUState *cs, run_on_cpu_data data) 242105b47fdSAnkur Arora { 243105b47fdSAnkur Arora X86CPU *cpu = X86_CPU(cs); 244105b47fdSAnkur Arora CPUX86State *env = &cpu->env; 245105b47fdSAnkur Arora 246105b47fdSAnkur Arora env->xen_vcpu_callback_vector = data.host_int; 247105b47fdSAnkur Arora 248105b47fdSAnkur Arora if (kvm_xen_has_cap(EVTCHN_SEND)) { 249105b47fdSAnkur Arora kvm_xen_set_vcpu_callback_vector(cs); 250105b47fdSAnkur Arora } 251105b47fdSAnkur Arora } 252105b47fdSAnkur Arora 25327d4075dSDavid Woodhouse static int set_vcpu_info(CPUState *cs, uint64_t gpa) 25427d4075dSDavid Woodhouse { 25527d4075dSDavid Woodhouse X86CPU *cpu = X86_CPU(cs); 25627d4075dSDavid Woodhouse CPUX86State *env = &cpu->env; 25727d4075dSDavid Woodhouse MemoryRegionSection mrs = { .mr = NULL }; 25827d4075dSDavid Woodhouse void *vcpu_info_hva = NULL; 25927d4075dSDavid Woodhouse int ret; 26027d4075dSDavid Woodhouse 26127d4075dSDavid Woodhouse ret = kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_INFO, gpa); 26227d4075dSDavid Woodhouse if (ret || gpa == INVALID_GPA) { 26327d4075dSDavid Woodhouse goto out; 26427d4075dSDavid Woodhouse } 26527d4075dSDavid Woodhouse 26627d4075dSDavid Woodhouse mrs = memory_region_find(get_system_memory(), gpa, 26727d4075dSDavid Woodhouse sizeof(struct vcpu_info)); 26827d4075dSDavid Woodhouse if (mrs.mr && mrs.mr->ram_block && 26927d4075dSDavid Woodhouse !int128_lt(mrs.size, int128_make64(sizeof(struct vcpu_info)))) { 27027d4075dSDavid Woodhouse vcpu_info_hva = qemu_map_ram_ptr(mrs.mr->ram_block, 27127d4075dSDavid Woodhouse mrs.offset_within_region); 27227d4075dSDavid Woodhouse } 27327d4075dSDavid Woodhouse if (!vcpu_info_hva) { 27427d4075dSDavid Woodhouse if (mrs.mr) { 27527d4075dSDavid Woodhouse memory_region_unref(mrs.mr); 27627d4075dSDavid Woodhouse mrs.mr = NULL; 27727d4075dSDavid Woodhouse } 27827d4075dSDavid Woodhouse ret = -EINVAL; 27927d4075dSDavid Woodhouse } 28027d4075dSDavid Woodhouse 28127d4075dSDavid Woodhouse out: 28227d4075dSDavid Woodhouse if (env->xen_vcpu_info_mr) { 28327d4075dSDavid Woodhouse memory_region_unref(env->xen_vcpu_info_mr); 28427d4075dSDavid Woodhouse } 28527d4075dSDavid Woodhouse env->xen_vcpu_info_hva = vcpu_info_hva; 28627d4075dSDavid Woodhouse env->xen_vcpu_info_mr = mrs.mr; 28727d4075dSDavid Woodhouse return ret; 28827d4075dSDavid Woodhouse } 28927d4075dSDavid Woodhouse 290c345104cSJoao Martins static void do_set_vcpu_info_default_gpa(CPUState *cs, run_on_cpu_data data) 291c345104cSJoao Martins { 292c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs); 293c345104cSJoao Martins CPUX86State *env = &cpu->env; 294c345104cSJoao Martins 295c345104cSJoao Martins env->xen_vcpu_info_default_gpa = data.host_ulong; 296c345104cSJoao Martins 297c345104cSJoao Martins /* Changing the default does nothing if a vcpu_info was explicitly set. */ 298c345104cSJoao Martins if (env->xen_vcpu_info_gpa == INVALID_GPA) { 29927d4075dSDavid Woodhouse set_vcpu_info(cs, env->xen_vcpu_info_default_gpa); 300c345104cSJoao Martins } 301c345104cSJoao Martins } 302c345104cSJoao Martins 303c345104cSJoao Martins static void do_set_vcpu_info_gpa(CPUState *cs, run_on_cpu_data data) 304c345104cSJoao Martins { 305c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs); 306c345104cSJoao Martins CPUX86State *env = &cpu->env; 307c345104cSJoao Martins 308c345104cSJoao Martins env->xen_vcpu_info_gpa = data.host_ulong; 309c345104cSJoao Martins 31027d4075dSDavid Woodhouse set_vcpu_info(cs, env->xen_vcpu_info_gpa); 31127d4075dSDavid Woodhouse } 31227d4075dSDavid Woodhouse 31327d4075dSDavid Woodhouse void *kvm_xen_get_vcpu_info_hva(uint32_t vcpu_id) 31427d4075dSDavid Woodhouse { 31527d4075dSDavid Woodhouse CPUState *cs = qemu_get_cpu(vcpu_id); 31627d4075dSDavid Woodhouse if (!cs) { 31727d4075dSDavid Woodhouse return NULL; 31827d4075dSDavid Woodhouse } 31927d4075dSDavid Woodhouse 32027d4075dSDavid Woodhouse return X86_CPU(cs)->env.xen_vcpu_info_hva; 32127d4075dSDavid Woodhouse } 32227d4075dSDavid Woodhouse 323*ddf0fd9aSDavid Woodhouse void kvm_xen_maybe_deassert_callback(CPUState *cs) 324*ddf0fd9aSDavid Woodhouse { 325*ddf0fd9aSDavid Woodhouse CPUX86State *env = &X86_CPU(cs)->env; 326*ddf0fd9aSDavid Woodhouse struct vcpu_info *vi = env->xen_vcpu_info_hva; 327*ddf0fd9aSDavid Woodhouse if (!vi) { 328*ddf0fd9aSDavid Woodhouse return; 329*ddf0fd9aSDavid Woodhouse } 330*ddf0fd9aSDavid Woodhouse 331*ddf0fd9aSDavid Woodhouse /* If the evtchn_upcall_pending flag is cleared, turn the GSI off. */ 332*ddf0fd9aSDavid Woodhouse if (!vi->evtchn_upcall_pending) { 333*ddf0fd9aSDavid Woodhouse qemu_mutex_lock_iothread(); 334*ddf0fd9aSDavid Woodhouse /* 335*ddf0fd9aSDavid Woodhouse * Check again now we have the lock, because it may have been 336*ddf0fd9aSDavid Woodhouse * asserted in the interim. And we don't want to take the lock 337*ddf0fd9aSDavid Woodhouse * every time because this is a fast path. 338*ddf0fd9aSDavid Woodhouse */ 339*ddf0fd9aSDavid Woodhouse if (!vi->evtchn_upcall_pending) { 340*ddf0fd9aSDavid Woodhouse X86_CPU(cs)->env.xen_callback_asserted = false; 341*ddf0fd9aSDavid Woodhouse xen_evtchn_set_callback_level(0); 342*ddf0fd9aSDavid Woodhouse } 343*ddf0fd9aSDavid Woodhouse qemu_mutex_unlock_iothread(); 344*ddf0fd9aSDavid Woodhouse } 345*ddf0fd9aSDavid Woodhouse } 346*ddf0fd9aSDavid Woodhouse 347*ddf0fd9aSDavid Woodhouse void kvm_xen_set_callback_asserted(void) 348*ddf0fd9aSDavid Woodhouse { 349*ddf0fd9aSDavid Woodhouse CPUState *cs = qemu_get_cpu(0); 350*ddf0fd9aSDavid Woodhouse 351*ddf0fd9aSDavid Woodhouse if (cs) { 352*ddf0fd9aSDavid Woodhouse X86_CPU(cs)->env.xen_callback_asserted = true; 353*ddf0fd9aSDavid Woodhouse } 354*ddf0fd9aSDavid Woodhouse } 355*ddf0fd9aSDavid Woodhouse 35627d4075dSDavid Woodhouse void kvm_xen_inject_vcpu_callback_vector(uint32_t vcpu_id, int type) 35727d4075dSDavid Woodhouse { 35827d4075dSDavid Woodhouse CPUState *cs = qemu_get_cpu(vcpu_id); 35927d4075dSDavid Woodhouse uint8_t vector; 36027d4075dSDavid Woodhouse 36127d4075dSDavid Woodhouse if (!cs) { 36227d4075dSDavid Woodhouse return; 36327d4075dSDavid Woodhouse } 36427d4075dSDavid Woodhouse 36527d4075dSDavid Woodhouse vector = X86_CPU(cs)->env.xen_vcpu_callback_vector; 36627d4075dSDavid Woodhouse if (vector) { 36727d4075dSDavid Woodhouse /* 36827d4075dSDavid Woodhouse * The per-vCPU callback vector injected via lapic. Just 36927d4075dSDavid Woodhouse * deliver it as an MSI. 37027d4075dSDavid Woodhouse */ 37127d4075dSDavid Woodhouse MSIMessage msg = { 37227d4075dSDavid Woodhouse .address = APIC_DEFAULT_ADDRESS | X86_CPU(cs)->apic_id, 37327d4075dSDavid Woodhouse .data = vector | (1UL << MSI_DATA_LEVEL_SHIFT), 37427d4075dSDavid Woodhouse }; 37527d4075dSDavid Woodhouse kvm_irqchip_send_msi(kvm_state, msg); 37627d4075dSDavid Woodhouse return; 37727d4075dSDavid Woodhouse } 37827d4075dSDavid Woodhouse 37927d4075dSDavid Woodhouse switch (type) { 38027d4075dSDavid Woodhouse case HVM_PARAM_CALLBACK_TYPE_VECTOR: 38127d4075dSDavid Woodhouse /* 38227d4075dSDavid Woodhouse * If the evtchn_upcall_pending field in the vcpu_info is set, then 38327d4075dSDavid Woodhouse * KVM will automatically deliver the vector on entering the vCPU 38427d4075dSDavid Woodhouse * so all we have to do is kick it out. 38527d4075dSDavid Woodhouse */ 38627d4075dSDavid Woodhouse qemu_cpu_kick(cs); 38727d4075dSDavid Woodhouse break; 388*ddf0fd9aSDavid Woodhouse 389*ddf0fd9aSDavid Woodhouse case HVM_PARAM_CALLBACK_TYPE_GSI: 390*ddf0fd9aSDavid Woodhouse case HVM_PARAM_CALLBACK_TYPE_PCI_INTX: 391*ddf0fd9aSDavid Woodhouse if (vcpu_id == 0) { 392*ddf0fd9aSDavid Woodhouse xen_evtchn_set_callback_level(1); 393*ddf0fd9aSDavid Woodhouse } 394*ddf0fd9aSDavid Woodhouse break; 39527d4075dSDavid Woodhouse } 396c345104cSJoao Martins } 397c345104cSJoao Martins 398c723d4c1SDavid Woodhouse static int kvm_xen_set_vcpu_timer(CPUState *cs) 399c723d4c1SDavid Woodhouse { 400c723d4c1SDavid Woodhouse X86CPU *cpu = X86_CPU(cs); 401c723d4c1SDavid Woodhouse CPUX86State *env = &cpu->env; 402c723d4c1SDavid Woodhouse 403c723d4c1SDavid Woodhouse struct kvm_xen_vcpu_attr va = { 404c723d4c1SDavid Woodhouse .type = KVM_XEN_VCPU_ATTR_TYPE_TIMER, 405c723d4c1SDavid Woodhouse .u.timer.port = env->xen_virq[VIRQ_TIMER], 406c723d4c1SDavid Woodhouse .u.timer.priority = KVM_IRQ_ROUTING_XEN_EVTCHN_PRIO_2LEVEL, 407c723d4c1SDavid Woodhouse .u.timer.expires_ns = env->xen_singleshot_timer_ns, 408c723d4c1SDavid Woodhouse }; 409c723d4c1SDavid Woodhouse 410c723d4c1SDavid Woodhouse return kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_SET_ATTR, &va); 411c723d4c1SDavid Woodhouse } 412c723d4c1SDavid Woodhouse 413c723d4c1SDavid Woodhouse static void do_set_vcpu_timer_virq(CPUState *cs, run_on_cpu_data data) 414c723d4c1SDavid Woodhouse { 415c723d4c1SDavid Woodhouse kvm_xen_set_vcpu_timer(cs); 416c723d4c1SDavid Woodhouse } 417c723d4c1SDavid Woodhouse 418c723d4c1SDavid Woodhouse int kvm_xen_set_vcpu_virq(uint32_t vcpu_id, uint16_t virq, uint16_t port) 419c723d4c1SDavid Woodhouse { 420c723d4c1SDavid Woodhouse CPUState *cs = qemu_get_cpu(vcpu_id); 421c723d4c1SDavid Woodhouse 422c723d4c1SDavid Woodhouse if (!cs) { 423c723d4c1SDavid Woodhouse return -ENOENT; 424c723d4c1SDavid Woodhouse } 425c723d4c1SDavid Woodhouse 426c723d4c1SDavid Woodhouse /* cpu.h doesn't include the actual Xen header. */ 427c723d4c1SDavid Woodhouse qemu_build_assert(NR_VIRQS == XEN_NR_VIRQS); 428c723d4c1SDavid Woodhouse 429c723d4c1SDavid Woodhouse if (virq >= NR_VIRQS) { 430c723d4c1SDavid Woodhouse return -EINVAL; 431c723d4c1SDavid Woodhouse } 432c723d4c1SDavid Woodhouse 433c723d4c1SDavid Woodhouse if (port && X86_CPU(cs)->env.xen_virq[virq]) { 434c723d4c1SDavid Woodhouse return -EEXIST; 435c723d4c1SDavid Woodhouse } 436c723d4c1SDavid Woodhouse 437c723d4c1SDavid Woodhouse X86_CPU(cs)->env.xen_virq[virq] = port; 438c723d4c1SDavid Woodhouse if (virq == VIRQ_TIMER && kvm_xen_has_cap(EVTCHN_SEND)) { 439c723d4c1SDavid Woodhouse async_run_on_cpu(cs, do_set_vcpu_timer_virq, 440c723d4c1SDavid Woodhouse RUN_ON_CPU_HOST_INT(port)); 441c723d4c1SDavid Woodhouse } 442c723d4c1SDavid Woodhouse return 0; 443c723d4c1SDavid Woodhouse } 444c723d4c1SDavid Woodhouse 445f0689302SJoao Martins static void do_set_vcpu_time_info_gpa(CPUState *cs, run_on_cpu_data data) 446f0689302SJoao Martins { 447f0689302SJoao Martins X86CPU *cpu = X86_CPU(cs); 448f0689302SJoao Martins CPUX86State *env = &cpu->env; 449f0689302SJoao Martins 450f0689302SJoao Martins env->xen_vcpu_time_info_gpa = data.host_ulong; 451f0689302SJoao Martins 452f0689302SJoao Martins kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO, 453f0689302SJoao Martins env->xen_vcpu_time_info_gpa); 454f0689302SJoao Martins } 455f0689302SJoao Martins 4565092db87SJoao Martins static void do_set_vcpu_runstate_gpa(CPUState *cs, run_on_cpu_data data) 4575092db87SJoao Martins { 4585092db87SJoao Martins X86CPU *cpu = X86_CPU(cs); 4595092db87SJoao Martins CPUX86State *env = &cpu->env; 4605092db87SJoao Martins 4615092db87SJoao Martins env->xen_vcpu_runstate_gpa = data.host_ulong; 4625092db87SJoao Martins 4635092db87SJoao Martins kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR, 4645092db87SJoao Martins env->xen_vcpu_runstate_gpa); 4655092db87SJoao Martins } 4665092db87SJoao Martins 467c345104cSJoao Martins static void do_vcpu_soft_reset(CPUState *cs, run_on_cpu_data data) 468c345104cSJoao Martins { 469c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs); 470c345104cSJoao Martins CPUX86State *env = &cpu->env; 471c345104cSJoao Martins 472c345104cSJoao Martins env->xen_vcpu_info_gpa = INVALID_GPA; 473c345104cSJoao Martins env->xen_vcpu_info_default_gpa = INVALID_GPA; 474f0689302SJoao Martins env->xen_vcpu_time_info_gpa = INVALID_GPA; 4755092db87SJoao Martins env->xen_vcpu_runstate_gpa = INVALID_GPA; 476105b47fdSAnkur Arora env->xen_vcpu_callback_vector = 0; 477c723d4c1SDavid Woodhouse env->xen_singleshot_timer_ns = 0; 478c723d4c1SDavid Woodhouse memset(env->xen_virq, 0, sizeof(env->xen_virq)); 479c345104cSJoao Martins 48027d4075dSDavid Woodhouse set_vcpu_info(cs, INVALID_GPA); 481f0689302SJoao Martins kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO, 482f0689302SJoao Martins INVALID_GPA); 4835092db87SJoao Martins kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR, 4845092db87SJoao Martins INVALID_GPA); 485105b47fdSAnkur Arora if (kvm_xen_has_cap(EVTCHN_SEND)) { 486105b47fdSAnkur Arora kvm_xen_set_vcpu_callback_vector(cs); 487c723d4c1SDavid Woodhouse kvm_xen_set_vcpu_timer(cs); 488105b47fdSAnkur Arora } 4895092db87SJoao Martins 490c345104cSJoao Martins } 491c345104cSJoao Martins 492fb0fd2ceSJoao Martins static int xen_set_shared_info(uint64_t gfn) 493fb0fd2ceSJoao Martins { 494fb0fd2ceSJoao Martins uint64_t gpa = gfn << TARGET_PAGE_BITS; 495c345104cSJoao Martins int i, err; 496fb0fd2ceSJoao Martins 497fb0fd2ceSJoao Martins QEMU_IOTHREAD_LOCK_GUARD(); 498fb0fd2ceSJoao Martins 499fb0fd2ceSJoao Martins /* 500fb0fd2ceSJoao Martins * The xen_overlay device tells KVM about it too, since it had to 501fb0fd2ceSJoao Martins * do that on migration load anyway (unless we're going to jump 502fb0fd2ceSJoao Martins * through lots of hoops to maintain the fiction that this isn't 503fb0fd2ceSJoao Martins * KVM-specific. 504fb0fd2ceSJoao Martins */ 505fb0fd2ceSJoao Martins err = xen_overlay_map_shinfo_page(gpa); 506fb0fd2ceSJoao Martins if (err) { 507fb0fd2ceSJoao Martins return err; 508fb0fd2ceSJoao Martins } 509fb0fd2ceSJoao Martins 510fb0fd2ceSJoao Martins trace_kvm_xen_set_shared_info(gfn); 511fb0fd2ceSJoao Martins 512c345104cSJoao Martins for (i = 0; i < XEN_LEGACY_MAX_VCPUS; i++) { 513c345104cSJoao Martins CPUState *cpu = qemu_get_cpu(i); 514c345104cSJoao Martins if (cpu) { 515c345104cSJoao Martins async_run_on_cpu(cpu, do_set_vcpu_info_default_gpa, 516c345104cSJoao Martins RUN_ON_CPU_HOST_ULONG(gpa)); 517c345104cSJoao Martins } 518c345104cSJoao Martins gpa += sizeof(vcpu_info_t); 519c345104cSJoao Martins } 520c345104cSJoao Martins 521fb0fd2ceSJoao Martins return err; 522fb0fd2ceSJoao Martins } 523fb0fd2ceSJoao Martins 524fb0fd2ceSJoao Martins static int add_to_physmap_one(uint32_t space, uint64_t idx, uint64_t gfn) 525fb0fd2ceSJoao Martins { 526fb0fd2ceSJoao Martins switch (space) { 527fb0fd2ceSJoao Martins case XENMAPSPACE_shared_info: 528fb0fd2ceSJoao Martins if (idx > 0) { 529fb0fd2ceSJoao Martins return -EINVAL; 530fb0fd2ceSJoao Martins } 531fb0fd2ceSJoao Martins return xen_set_shared_info(gfn); 532fb0fd2ceSJoao Martins 533fb0fd2ceSJoao Martins case XENMAPSPACE_grant_table: 534fb0fd2ceSJoao Martins case XENMAPSPACE_gmfn: 535fb0fd2ceSJoao Martins case XENMAPSPACE_gmfn_range: 536fb0fd2ceSJoao Martins return -ENOTSUP; 537fb0fd2ceSJoao Martins 538fb0fd2ceSJoao Martins case XENMAPSPACE_gmfn_foreign: 539fb0fd2ceSJoao Martins case XENMAPSPACE_dev_mmio: 540fb0fd2ceSJoao Martins return -EPERM; 541fb0fd2ceSJoao Martins 542fb0fd2ceSJoao Martins default: 543fb0fd2ceSJoao Martins return -EINVAL; 544fb0fd2ceSJoao Martins } 545fb0fd2ceSJoao Martins } 546fb0fd2ceSJoao Martins 547fb0fd2ceSJoao Martins static int do_add_to_physmap(struct kvm_xen_exit *exit, X86CPU *cpu, 548fb0fd2ceSJoao Martins uint64_t arg) 549fb0fd2ceSJoao Martins { 550fb0fd2ceSJoao Martins struct xen_add_to_physmap xatp; 551fb0fd2ceSJoao Martins CPUState *cs = CPU(cpu); 552fb0fd2ceSJoao Martins 553fb0fd2ceSJoao Martins if (hypercall_compat32(exit->u.hcall.longmode)) { 554fb0fd2ceSJoao Martins struct compat_xen_add_to_physmap xatp32; 555fb0fd2ceSJoao Martins 556fb0fd2ceSJoao Martins qemu_build_assert(sizeof(struct compat_xen_add_to_physmap) == 16); 557fb0fd2ceSJoao Martins if (kvm_copy_from_gva(cs, arg, &xatp32, sizeof(xatp32))) { 558fb0fd2ceSJoao Martins return -EFAULT; 559fb0fd2ceSJoao Martins } 560fb0fd2ceSJoao Martins xatp.domid = xatp32.domid; 561fb0fd2ceSJoao Martins xatp.size = xatp32.size; 562fb0fd2ceSJoao Martins xatp.space = xatp32.space; 563fb0fd2ceSJoao Martins xatp.idx = xatp32.idx; 564fb0fd2ceSJoao Martins xatp.gpfn = xatp32.gpfn; 565fb0fd2ceSJoao Martins } else { 566fb0fd2ceSJoao Martins if (kvm_copy_from_gva(cs, arg, &xatp, sizeof(xatp))) { 567fb0fd2ceSJoao Martins return -EFAULT; 568fb0fd2ceSJoao Martins } 569fb0fd2ceSJoao Martins } 570fb0fd2ceSJoao Martins 571fb0fd2ceSJoao Martins if (xatp.domid != DOMID_SELF && xatp.domid != xen_domid) { 572fb0fd2ceSJoao Martins return -ESRCH; 573fb0fd2ceSJoao Martins } 574fb0fd2ceSJoao Martins 575fb0fd2ceSJoao Martins return add_to_physmap_one(xatp.space, xatp.idx, xatp.gpfn); 576fb0fd2ceSJoao Martins } 577fb0fd2ceSJoao Martins 578782a7960SDavid Woodhouse static int do_add_to_physmap_batch(struct kvm_xen_exit *exit, X86CPU *cpu, 579782a7960SDavid Woodhouse uint64_t arg) 580782a7960SDavid Woodhouse { 581782a7960SDavid Woodhouse struct xen_add_to_physmap_batch xatpb; 582782a7960SDavid Woodhouse unsigned long idxs_gva, gpfns_gva, errs_gva; 583782a7960SDavid Woodhouse CPUState *cs = CPU(cpu); 584782a7960SDavid Woodhouse size_t op_sz; 585782a7960SDavid Woodhouse 586782a7960SDavid Woodhouse if (hypercall_compat32(exit->u.hcall.longmode)) { 587782a7960SDavid Woodhouse struct compat_xen_add_to_physmap_batch xatpb32; 588782a7960SDavid Woodhouse 589782a7960SDavid Woodhouse qemu_build_assert(sizeof(struct compat_xen_add_to_physmap_batch) == 20); 590782a7960SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &xatpb32, sizeof(xatpb32))) { 591782a7960SDavid Woodhouse return -EFAULT; 592782a7960SDavid Woodhouse } 593782a7960SDavid Woodhouse xatpb.domid = xatpb32.domid; 594782a7960SDavid Woodhouse xatpb.space = xatpb32.space; 595782a7960SDavid Woodhouse xatpb.size = xatpb32.size; 596782a7960SDavid Woodhouse 597782a7960SDavid Woodhouse idxs_gva = xatpb32.idxs.c; 598782a7960SDavid Woodhouse gpfns_gva = xatpb32.gpfns.c; 599782a7960SDavid Woodhouse errs_gva = xatpb32.errs.c; 600782a7960SDavid Woodhouse op_sz = sizeof(uint32_t); 601782a7960SDavid Woodhouse } else { 602782a7960SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &xatpb, sizeof(xatpb))) { 603782a7960SDavid Woodhouse return -EFAULT; 604782a7960SDavid Woodhouse } 605782a7960SDavid Woodhouse op_sz = sizeof(unsigned long); 606782a7960SDavid Woodhouse idxs_gva = (unsigned long)xatpb.idxs.p; 607782a7960SDavid Woodhouse gpfns_gva = (unsigned long)xatpb.gpfns.p; 608782a7960SDavid Woodhouse errs_gva = (unsigned long)xatpb.errs.p; 609782a7960SDavid Woodhouse } 610782a7960SDavid Woodhouse 611782a7960SDavid Woodhouse if (xatpb.domid != DOMID_SELF && xatpb.domid != xen_domid) { 612782a7960SDavid Woodhouse return -ESRCH; 613782a7960SDavid Woodhouse } 614782a7960SDavid Woodhouse 615782a7960SDavid Woodhouse /* Explicitly invalid for the batch op. Not that we implement it anyway. */ 616782a7960SDavid Woodhouse if (xatpb.space == XENMAPSPACE_gmfn_range) { 617782a7960SDavid Woodhouse return -EINVAL; 618782a7960SDavid Woodhouse } 619782a7960SDavid Woodhouse 620782a7960SDavid Woodhouse while (xatpb.size--) { 621782a7960SDavid Woodhouse unsigned long idx = 0; 622782a7960SDavid Woodhouse unsigned long gpfn = 0; 623782a7960SDavid Woodhouse int err; 624782a7960SDavid Woodhouse 625782a7960SDavid Woodhouse /* For 32-bit compat this only copies the low 32 bits of each */ 626782a7960SDavid Woodhouse if (kvm_copy_from_gva(cs, idxs_gva, &idx, op_sz) || 627782a7960SDavid Woodhouse kvm_copy_from_gva(cs, gpfns_gva, &gpfn, op_sz)) { 628782a7960SDavid Woodhouse return -EFAULT; 629782a7960SDavid Woodhouse } 630782a7960SDavid Woodhouse idxs_gva += op_sz; 631782a7960SDavid Woodhouse gpfns_gva += op_sz; 632782a7960SDavid Woodhouse 633782a7960SDavid Woodhouse err = add_to_physmap_one(xatpb.space, idx, gpfn); 634782a7960SDavid Woodhouse 635782a7960SDavid Woodhouse if (kvm_copy_to_gva(cs, errs_gva, &err, sizeof(err))) { 636782a7960SDavid Woodhouse return -EFAULT; 637782a7960SDavid Woodhouse } 638782a7960SDavid Woodhouse errs_gva += sizeof(err); 639782a7960SDavid Woodhouse } 640782a7960SDavid Woodhouse return 0; 641782a7960SDavid Woodhouse } 642782a7960SDavid Woodhouse 643fb0fd2ceSJoao Martins static bool kvm_xen_hcall_memory_op(struct kvm_xen_exit *exit, X86CPU *cpu, 644fb0fd2ceSJoao Martins int cmd, uint64_t arg) 645fb0fd2ceSJoao Martins { 646fb0fd2ceSJoao Martins int err; 647fb0fd2ceSJoao Martins 648fb0fd2ceSJoao Martins switch (cmd) { 649fb0fd2ceSJoao Martins case XENMEM_add_to_physmap: 650fb0fd2ceSJoao Martins err = do_add_to_physmap(exit, cpu, arg); 651fb0fd2ceSJoao Martins break; 652fb0fd2ceSJoao Martins 653782a7960SDavid Woodhouse case XENMEM_add_to_physmap_batch: 654782a7960SDavid Woodhouse err = do_add_to_physmap_batch(exit, cpu, arg); 655782a7960SDavid Woodhouse break; 656782a7960SDavid Woodhouse 657fb0fd2ceSJoao Martins default: 658fb0fd2ceSJoao Martins return false; 659fb0fd2ceSJoao Martins } 660fb0fd2ceSJoao Martins 661fb0fd2ceSJoao Martins exit->u.hcall.result = err; 662fb0fd2ceSJoao Martins return true; 663fb0fd2ceSJoao Martins } 664fb0fd2ceSJoao Martins 6655dbcd01aSAnkur Arora static bool handle_set_param(struct kvm_xen_exit *exit, X86CPU *cpu, 6665dbcd01aSAnkur Arora uint64_t arg) 6675dbcd01aSAnkur Arora { 6685dbcd01aSAnkur Arora CPUState *cs = CPU(cpu); 6695dbcd01aSAnkur Arora struct xen_hvm_param hp; 6705dbcd01aSAnkur Arora int err = 0; 6715dbcd01aSAnkur Arora 6725dbcd01aSAnkur Arora /* No need for 32/64 compat handling */ 6735dbcd01aSAnkur Arora qemu_build_assert(sizeof(hp) == 16); 6745dbcd01aSAnkur Arora 6755dbcd01aSAnkur Arora if (kvm_copy_from_gva(cs, arg, &hp, sizeof(hp))) { 6765dbcd01aSAnkur Arora err = -EFAULT; 6775dbcd01aSAnkur Arora goto out; 6785dbcd01aSAnkur Arora } 6795dbcd01aSAnkur Arora 6805dbcd01aSAnkur Arora if (hp.domid != DOMID_SELF && hp.domid != xen_domid) { 6815dbcd01aSAnkur Arora err = -ESRCH; 6825dbcd01aSAnkur Arora goto out; 6835dbcd01aSAnkur Arora } 6845dbcd01aSAnkur Arora 6855dbcd01aSAnkur Arora switch (hp.index) { 68691cce756SDavid Woodhouse case HVM_PARAM_CALLBACK_IRQ: 68791cce756SDavid Woodhouse err = xen_evtchn_set_callback_param(hp.value); 68891cce756SDavid Woodhouse xen_set_long_mode(exit->u.hcall.longmode); 68991cce756SDavid Woodhouse break; 6905dbcd01aSAnkur Arora default: 6915dbcd01aSAnkur Arora return false; 6925dbcd01aSAnkur Arora } 6935dbcd01aSAnkur Arora 6945dbcd01aSAnkur Arora out: 6955dbcd01aSAnkur Arora exit->u.hcall.result = err; 6965dbcd01aSAnkur Arora return true; 6975dbcd01aSAnkur Arora } 6985dbcd01aSAnkur Arora 699105b47fdSAnkur Arora static int kvm_xen_hcall_evtchn_upcall_vector(struct kvm_xen_exit *exit, 700105b47fdSAnkur Arora X86CPU *cpu, uint64_t arg) 701105b47fdSAnkur Arora { 702105b47fdSAnkur Arora struct xen_hvm_evtchn_upcall_vector up; 703105b47fdSAnkur Arora CPUState *target_cs; 704105b47fdSAnkur Arora 705105b47fdSAnkur Arora /* No need for 32/64 compat handling */ 706105b47fdSAnkur Arora qemu_build_assert(sizeof(up) == 8); 707105b47fdSAnkur Arora 708105b47fdSAnkur Arora if (kvm_copy_from_gva(CPU(cpu), arg, &up, sizeof(up))) { 709105b47fdSAnkur Arora return -EFAULT; 710105b47fdSAnkur Arora } 711105b47fdSAnkur Arora 712105b47fdSAnkur Arora if (up.vector < 0x10) { 713105b47fdSAnkur Arora return -EINVAL; 714105b47fdSAnkur Arora } 715105b47fdSAnkur Arora 716105b47fdSAnkur Arora target_cs = qemu_get_cpu(up.vcpu); 717105b47fdSAnkur Arora if (!target_cs) { 718105b47fdSAnkur Arora return -EINVAL; 719105b47fdSAnkur Arora } 720105b47fdSAnkur Arora 721105b47fdSAnkur Arora async_run_on_cpu(target_cs, do_set_vcpu_callback_vector, 722105b47fdSAnkur Arora RUN_ON_CPU_HOST_INT(up.vector)); 723105b47fdSAnkur Arora return 0; 724105b47fdSAnkur Arora } 725105b47fdSAnkur Arora 726671bfdcdSJoao Martins static bool kvm_xen_hcall_hvm_op(struct kvm_xen_exit *exit, X86CPU *cpu, 727671bfdcdSJoao Martins int cmd, uint64_t arg) 728671bfdcdSJoao Martins { 729105b47fdSAnkur Arora int ret = -ENOSYS; 730671bfdcdSJoao Martins switch (cmd) { 731105b47fdSAnkur Arora case HVMOP_set_evtchn_upcall_vector: 732105b47fdSAnkur Arora ret = kvm_xen_hcall_evtchn_upcall_vector(exit, cpu, 733105b47fdSAnkur Arora exit->u.hcall.params[0]); 734105b47fdSAnkur Arora break; 735105b47fdSAnkur Arora 736671bfdcdSJoao Martins case HVMOP_pagetable_dying: 737105b47fdSAnkur Arora ret = -ENOSYS; 738105b47fdSAnkur Arora break; 739671bfdcdSJoao Martins 7405dbcd01aSAnkur Arora case HVMOP_set_param: 7415dbcd01aSAnkur Arora return handle_set_param(exit, cpu, arg); 7425dbcd01aSAnkur Arora 743671bfdcdSJoao Martins default: 744671bfdcdSJoao Martins return false; 745671bfdcdSJoao Martins } 746105b47fdSAnkur Arora 747105b47fdSAnkur Arora exit->u.hcall.result = ret; 748105b47fdSAnkur Arora return true; 749671bfdcdSJoao Martins } 750671bfdcdSJoao Martins 751c345104cSJoao Martins static int vcpuop_register_vcpu_info(CPUState *cs, CPUState *target, 752c345104cSJoao Martins uint64_t arg) 753c345104cSJoao Martins { 754c345104cSJoao Martins struct vcpu_register_vcpu_info rvi; 755c345104cSJoao Martins uint64_t gpa; 756c345104cSJoao Martins 757c345104cSJoao Martins /* No need for 32/64 compat handling */ 758c345104cSJoao Martins qemu_build_assert(sizeof(rvi) == 16); 759c345104cSJoao Martins qemu_build_assert(sizeof(struct vcpu_info) == 64); 760c345104cSJoao Martins 761c345104cSJoao Martins if (!target) { 762c345104cSJoao Martins return -ENOENT; 763c345104cSJoao Martins } 764c345104cSJoao Martins 765c345104cSJoao Martins if (kvm_copy_from_gva(cs, arg, &rvi, sizeof(rvi))) { 766c345104cSJoao Martins return -EFAULT; 767c345104cSJoao Martins } 768c345104cSJoao Martins 769c345104cSJoao Martins if (rvi.offset > TARGET_PAGE_SIZE - sizeof(struct vcpu_info)) { 770c345104cSJoao Martins return -EINVAL; 771c345104cSJoao Martins } 772c345104cSJoao Martins 773c345104cSJoao Martins gpa = ((rvi.mfn << TARGET_PAGE_BITS) + rvi.offset); 774c345104cSJoao Martins async_run_on_cpu(target, do_set_vcpu_info_gpa, RUN_ON_CPU_HOST_ULONG(gpa)); 775c345104cSJoao Martins return 0; 776c345104cSJoao Martins } 777c345104cSJoao Martins 778f0689302SJoao Martins static int vcpuop_register_vcpu_time_info(CPUState *cs, CPUState *target, 779f0689302SJoao Martins uint64_t arg) 780f0689302SJoao Martins { 781f0689302SJoao Martins struct vcpu_register_time_memory_area tma; 782f0689302SJoao Martins uint64_t gpa; 783f0689302SJoao Martins size_t len; 784f0689302SJoao Martins 785f0689302SJoao Martins /* No need for 32/64 compat handling */ 786f0689302SJoao Martins qemu_build_assert(sizeof(tma) == 8); 787f0689302SJoao Martins qemu_build_assert(sizeof(struct vcpu_time_info) == 32); 788f0689302SJoao Martins 789f0689302SJoao Martins if (!target) { 790f0689302SJoao Martins return -ENOENT; 791f0689302SJoao Martins } 792f0689302SJoao Martins 793f0689302SJoao Martins if (kvm_copy_from_gva(cs, arg, &tma, sizeof(tma))) { 794f0689302SJoao Martins return -EFAULT; 795f0689302SJoao Martins } 796f0689302SJoao Martins 797f0689302SJoao Martins /* 798f0689302SJoao Martins * Xen actually uses the GVA and does the translation through the guest 799f0689302SJoao Martins * page tables each time. But Linux/KVM uses the GPA, on the assumption 800f0689302SJoao Martins * that guests only ever use *global* addresses (kernel virtual addresses) 801f0689302SJoao Martins * for it. If Linux is changed to redo the GVA→GPA translation each time, 802f0689302SJoao Martins * it will offer a new vCPU attribute for that, and we'll use it instead. 803f0689302SJoao Martins */ 804f0689302SJoao Martins if (!kvm_gva_to_gpa(cs, tma.addr.p, &gpa, &len, false) || 805f0689302SJoao Martins len < sizeof(struct vcpu_time_info)) { 806f0689302SJoao Martins return -EFAULT; 807f0689302SJoao Martins } 808f0689302SJoao Martins 809f0689302SJoao Martins async_run_on_cpu(target, do_set_vcpu_time_info_gpa, 810f0689302SJoao Martins RUN_ON_CPU_HOST_ULONG(gpa)); 811f0689302SJoao Martins return 0; 812f0689302SJoao Martins } 813f0689302SJoao Martins 8145092db87SJoao Martins static int vcpuop_register_runstate_info(CPUState *cs, CPUState *target, 8155092db87SJoao Martins uint64_t arg) 8165092db87SJoao Martins { 8175092db87SJoao Martins struct vcpu_register_runstate_memory_area rma; 8185092db87SJoao Martins uint64_t gpa; 8195092db87SJoao Martins size_t len; 8205092db87SJoao Martins 8215092db87SJoao Martins /* No need for 32/64 compat handling */ 8225092db87SJoao Martins qemu_build_assert(sizeof(rma) == 8); 8235092db87SJoao Martins /* The runstate area actually does change size, but Linux copes. */ 8245092db87SJoao Martins 8255092db87SJoao Martins if (!target) { 8265092db87SJoao Martins return -ENOENT; 8275092db87SJoao Martins } 8285092db87SJoao Martins 8295092db87SJoao Martins if (kvm_copy_from_gva(cs, arg, &rma, sizeof(rma))) { 8305092db87SJoao Martins return -EFAULT; 8315092db87SJoao Martins } 8325092db87SJoao Martins 8335092db87SJoao Martins /* As with vcpu_time_info, Xen actually uses the GVA but KVM doesn't. */ 8345092db87SJoao Martins if (!kvm_gva_to_gpa(cs, rma.addr.p, &gpa, &len, false)) { 8355092db87SJoao Martins return -EFAULT; 8365092db87SJoao Martins } 8375092db87SJoao Martins 8385092db87SJoao Martins async_run_on_cpu(target, do_set_vcpu_runstate_gpa, 8395092db87SJoao Martins RUN_ON_CPU_HOST_ULONG(gpa)); 8405092db87SJoao Martins return 0; 8415092db87SJoao Martins } 8425092db87SJoao Martins 843d70bd6a4SJoao Martins static bool kvm_xen_hcall_vcpu_op(struct kvm_xen_exit *exit, X86CPU *cpu, 844d70bd6a4SJoao Martins int cmd, int vcpu_id, uint64_t arg) 845d70bd6a4SJoao Martins { 846c345104cSJoao Martins CPUState *dest = qemu_get_cpu(vcpu_id); 847c345104cSJoao Martins CPUState *cs = CPU(cpu); 848d70bd6a4SJoao Martins int err; 849d70bd6a4SJoao Martins 850d70bd6a4SJoao Martins switch (cmd) { 8515092db87SJoao Martins case VCPUOP_register_runstate_memory_area: 8525092db87SJoao Martins err = vcpuop_register_runstate_info(cs, dest, arg); 8535092db87SJoao Martins break; 854f0689302SJoao Martins case VCPUOP_register_vcpu_time_memory_area: 855f0689302SJoao Martins err = vcpuop_register_vcpu_time_info(cs, dest, arg); 856f0689302SJoao Martins break; 857d70bd6a4SJoao Martins case VCPUOP_register_vcpu_info: 858c345104cSJoao Martins err = vcpuop_register_vcpu_info(cs, dest, arg); 859d70bd6a4SJoao Martins break; 860d70bd6a4SJoao Martins 861d70bd6a4SJoao Martins default: 862d70bd6a4SJoao Martins return false; 863d70bd6a4SJoao Martins } 864d70bd6a4SJoao Martins 865d70bd6a4SJoao Martins exit->u.hcall.result = err; 866d70bd6a4SJoao Martins return true; 867d70bd6a4SJoao Martins } 868d70bd6a4SJoao Martins 8694858ba20SDavid Woodhouse static bool kvm_xen_hcall_evtchn_op(struct kvm_xen_exit *exit, X86CPU *cpu, 8703b06f29bSJoao Martins int cmd, uint64_t arg) 8713b06f29bSJoao Martins { 8724858ba20SDavid Woodhouse CPUState *cs = CPU(cpu); 8733b06f29bSJoao Martins int err = -ENOSYS; 8743b06f29bSJoao Martins 8753b06f29bSJoao Martins switch (cmd) { 8763b06f29bSJoao Martins case EVTCHNOP_init_control: 8773b06f29bSJoao Martins case EVTCHNOP_expand_array: 8783b06f29bSJoao Martins case EVTCHNOP_set_priority: 8793b06f29bSJoao Martins /* We do not support FIFO channels at this point */ 8803b06f29bSJoao Martins err = -ENOSYS; 8813b06f29bSJoao Martins break; 8823b06f29bSJoao Martins 8834858ba20SDavid Woodhouse case EVTCHNOP_status: { 8844858ba20SDavid Woodhouse struct evtchn_status status; 8854858ba20SDavid Woodhouse 8864858ba20SDavid Woodhouse qemu_build_assert(sizeof(status) == 24); 8874858ba20SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &status, sizeof(status))) { 8884858ba20SDavid Woodhouse err = -EFAULT; 8894858ba20SDavid Woodhouse break; 8904858ba20SDavid Woodhouse } 8914858ba20SDavid Woodhouse 8924858ba20SDavid Woodhouse err = xen_evtchn_status_op(&status); 8934858ba20SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &status, sizeof(status))) { 8944858ba20SDavid Woodhouse err = -EFAULT; 8954858ba20SDavid Woodhouse } 8964858ba20SDavid Woodhouse break; 8974858ba20SDavid Woodhouse } 89883eb5811SDavid Woodhouse case EVTCHNOP_close: { 89983eb5811SDavid Woodhouse struct evtchn_close close; 90083eb5811SDavid Woodhouse 90183eb5811SDavid Woodhouse qemu_build_assert(sizeof(close) == 4); 90283eb5811SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &close, sizeof(close))) { 90383eb5811SDavid Woodhouse err = -EFAULT; 90483eb5811SDavid Woodhouse break; 90583eb5811SDavid Woodhouse } 90683eb5811SDavid Woodhouse 90783eb5811SDavid Woodhouse err = xen_evtchn_close_op(&close); 90883eb5811SDavid Woodhouse break; 90983eb5811SDavid Woodhouse } 910190cc3c0SDavid Woodhouse case EVTCHNOP_unmask: { 911190cc3c0SDavid Woodhouse struct evtchn_unmask unmask; 912190cc3c0SDavid Woodhouse 913190cc3c0SDavid Woodhouse qemu_build_assert(sizeof(unmask) == 4); 914190cc3c0SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &unmask, sizeof(unmask))) { 915190cc3c0SDavid Woodhouse err = -EFAULT; 916190cc3c0SDavid Woodhouse break; 917190cc3c0SDavid Woodhouse } 918190cc3c0SDavid Woodhouse 919190cc3c0SDavid Woodhouse err = xen_evtchn_unmask_op(&unmask); 920190cc3c0SDavid Woodhouse break; 921190cc3c0SDavid Woodhouse } 922c723d4c1SDavid Woodhouse case EVTCHNOP_bind_virq: { 923c723d4c1SDavid Woodhouse struct evtchn_bind_virq virq; 924c723d4c1SDavid Woodhouse 925c723d4c1SDavid Woodhouse qemu_build_assert(sizeof(virq) == 12); 926c723d4c1SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &virq, sizeof(virq))) { 927c723d4c1SDavid Woodhouse err = -EFAULT; 928c723d4c1SDavid Woodhouse break; 929c723d4c1SDavid Woodhouse } 930c723d4c1SDavid Woodhouse 931c723d4c1SDavid Woodhouse err = xen_evtchn_bind_virq_op(&virq); 932c723d4c1SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &virq, sizeof(virq))) { 933c723d4c1SDavid Woodhouse err = -EFAULT; 934c723d4c1SDavid Woodhouse } 935c723d4c1SDavid Woodhouse break; 936c723d4c1SDavid Woodhouse } 937f5417856SDavid Woodhouse case EVTCHNOP_bind_ipi: { 938f5417856SDavid Woodhouse struct evtchn_bind_ipi ipi; 939f5417856SDavid Woodhouse 940f5417856SDavid Woodhouse qemu_build_assert(sizeof(ipi) == 8); 941f5417856SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &ipi, sizeof(ipi))) { 942f5417856SDavid Woodhouse err = -EFAULT; 943f5417856SDavid Woodhouse break; 944f5417856SDavid Woodhouse } 945f5417856SDavid Woodhouse 946f5417856SDavid Woodhouse err = xen_evtchn_bind_ipi_op(&ipi); 947f5417856SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &ipi, sizeof(ipi))) { 948f5417856SDavid Woodhouse err = -EFAULT; 949f5417856SDavid Woodhouse } 950f5417856SDavid Woodhouse break; 951f5417856SDavid Woodhouse } 952cf7679abSDavid Woodhouse case EVTCHNOP_send: { 953cf7679abSDavid Woodhouse struct evtchn_send send; 954cf7679abSDavid Woodhouse 955cf7679abSDavid Woodhouse qemu_build_assert(sizeof(send) == 4); 956cf7679abSDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &send, sizeof(send))) { 957cf7679abSDavid Woodhouse err = -EFAULT; 958cf7679abSDavid Woodhouse break; 959cf7679abSDavid Woodhouse } 960cf7679abSDavid Woodhouse 961cf7679abSDavid Woodhouse err = xen_evtchn_send_op(&send); 962cf7679abSDavid Woodhouse break; 963cf7679abSDavid Woodhouse } 964e1db61b8SDavid Woodhouse case EVTCHNOP_alloc_unbound: { 965e1db61b8SDavid Woodhouse struct evtchn_alloc_unbound alloc; 966e1db61b8SDavid Woodhouse 967e1db61b8SDavid Woodhouse qemu_build_assert(sizeof(alloc) == 8); 968e1db61b8SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &alloc, sizeof(alloc))) { 969e1db61b8SDavid Woodhouse err = -EFAULT; 970e1db61b8SDavid Woodhouse break; 971e1db61b8SDavid Woodhouse } 972e1db61b8SDavid Woodhouse 973e1db61b8SDavid Woodhouse err = xen_evtchn_alloc_unbound_op(&alloc); 974e1db61b8SDavid Woodhouse if (!err && kvm_copy_to_gva(cs, arg, &alloc, sizeof(alloc))) { 975e1db61b8SDavid Woodhouse err = -EFAULT; 976e1db61b8SDavid Woodhouse } 977e1db61b8SDavid Woodhouse break; 978e1db61b8SDavid Woodhouse } 97984327881SDavid Woodhouse case EVTCHNOP_bind_interdomain: { 98084327881SDavid Woodhouse struct evtchn_bind_interdomain interdomain; 98184327881SDavid Woodhouse 98284327881SDavid Woodhouse qemu_build_assert(sizeof(interdomain) == 12); 98384327881SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &interdomain, sizeof(interdomain))) { 98484327881SDavid Woodhouse err = -EFAULT; 98584327881SDavid Woodhouse break; 98684327881SDavid Woodhouse } 98784327881SDavid Woodhouse 98884327881SDavid Woodhouse err = xen_evtchn_bind_interdomain_op(&interdomain); 98984327881SDavid Woodhouse if (!err && 99084327881SDavid Woodhouse kvm_copy_to_gva(cs, arg, &interdomain, sizeof(interdomain))) { 99184327881SDavid Woodhouse err = -EFAULT; 99284327881SDavid Woodhouse } 99384327881SDavid Woodhouse break; 99484327881SDavid Woodhouse } 99530667046SDavid Woodhouse case EVTCHNOP_bind_vcpu: { 99630667046SDavid Woodhouse struct evtchn_bind_vcpu vcpu; 99730667046SDavid Woodhouse 99830667046SDavid Woodhouse qemu_build_assert(sizeof(vcpu) == 8); 99930667046SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &vcpu, sizeof(vcpu))) { 100030667046SDavid Woodhouse err = -EFAULT; 100130667046SDavid Woodhouse break; 100230667046SDavid Woodhouse } 100330667046SDavid Woodhouse 100430667046SDavid Woodhouse err = xen_evtchn_bind_vcpu_op(&vcpu); 100530667046SDavid Woodhouse break; 100630667046SDavid Woodhouse } 1007a15b1097SDavid Woodhouse case EVTCHNOP_reset: { 1008a15b1097SDavid Woodhouse struct evtchn_reset reset; 1009a15b1097SDavid Woodhouse 1010a15b1097SDavid Woodhouse qemu_build_assert(sizeof(reset) == 2); 1011a15b1097SDavid Woodhouse if (kvm_copy_from_gva(cs, arg, &reset, sizeof(reset))) { 1012a15b1097SDavid Woodhouse err = -EFAULT; 1013a15b1097SDavid Woodhouse break; 1014a15b1097SDavid Woodhouse } 1015a15b1097SDavid Woodhouse 1016a15b1097SDavid Woodhouse err = xen_evtchn_reset_op(&reset); 1017a15b1097SDavid Woodhouse break; 1018a15b1097SDavid Woodhouse } 10193b06f29bSJoao Martins default: 10203b06f29bSJoao Martins return false; 10213b06f29bSJoao Martins } 10223b06f29bSJoao Martins 10233b06f29bSJoao Martins exit->u.hcall.result = err; 10243b06f29bSJoao Martins return true; 10253b06f29bSJoao Martins } 10263b06f29bSJoao Martins 102779b7067dSJoao Martins int kvm_xen_soft_reset(void) 102879b7067dSJoao Martins { 1029c345104cSJoao Martins CPUState *cpu; 1030fb0fd2ceSJoao Martins int err; 1031fb0fd2ceSJoao Martins 103279b7067dSJoao Martins assert(qemu_mutex_iothread_locked()); 103379b7067dSJoao Martins 103479b7067dSJoao Martins trace_kvm_xen_soft_reset(); 103579b7067dSJoao Martins 1036a15b1097SDavid Woodhouse err = xen_evtchn_soft_reset(); 1037a15b1097SDavid Woodhouse if (err) { 1038a15b1097SDavid Woodhouse return err; 1039a15b1097SDavid Woodhouse } 1040a15b1097SDavid Woodhouse 104191cce756SDavid Woodhouse /* 104291cce756SDavid Woodhouse * Zero is the reset/startup state for HVM_PARAM_CALLBACK_IRQ. Strictly, 104391cce756SDavid Woodhouse * it maps to HVM_PARAM_CALLBACK_TYPE_GSI with GSI#0, but Xen refuses to 104491cce756SDavid Woodhouse * to deliver to the timer interrupt and treats that as 'disabled'. 104591cce756SDavid Woodhouse */ 104691cce756SDavid Woodhouse err = xen_evtchn_set_callback_param(0); 104791cce756SDavid Woodhouse if (err) { 104891cce756SDavid Woodhouse return err; 104991cce756SDavid Woodhouse } 105091cce756SDavid Woodhouse 1051c345104cSJoao Martins CPU_FOREACH(cpu) { 1052c345104cSJoao Martins async_run_on_cpu(cpu, do_vcpu_soft_reset, RUN_ON_CPU_NULL); 1053c345104cSJoao Martins } 1054c345104cSJoao Martins 1055fb0fd2ceSJoao Martins err = xen_overlay_map_shinfo_page(INVALID_GFN); 1056fb0fd2ceSJoao Martins if (err) { 1057fb0fd2ceSJoao Martins return err; 1058fb0fd2ceSJoao Martins } 1059fb0fd2ceSJoao Martins 106079b7067dSJoao Martins return 0; 106179b7067dSJoao Martins } 106279b7067dSJoao Martins 106379b7067dSJoao Martins static int schedop_shutdown(CPUState *cs, uint64_t arg) 106479b7067dSJoao Martins { 106579b7067dSJoao Martins struct sched_shutdown shutdown; 106679b7067dSJoao Martins int ret = 0; 106779b7067dSJoao Martins 106879b7067dSJoao Martins /* No need for 32/64 compat handling */ 106979b7067dSJoao Martins qemu_build_assert(sizeof(shutdown) == 4); 107079b7067dSJoao Martins 107179b7067dSJoao Martins if (kvm_copy_from_gva(cs, arg, &shutdown, sizeof(shutdown))) { 107279b7067dSJoao Martins return -EFAULT; 107379b7067dSJoao Martins } 107479b7067dSJoao Martins 107579b7067dSJoao Martins switch (shutdown.reason) { 107679b7067dSJoao Martins case SHUTDOWN_crash: 107779b7067dSJoao Martins cpu_dump_state(cs, stderr, CPU_DUMP_CODE); 107879b7067dSJoao Martins qemu_system_guest_panicked(NULL); 107979b7067dSJoao Martins break; 108079b7067dSJoao Martins 108179b7067dSJoao Martins case SHUTDOWN_reboot: 108279b7067dSJoao Martins qemu_system_reset_request(SHUTDOWN_CAUSE_GUEST_RESET); 108379b7067dSJoao Martins break; 108479b7067dSJoao Martins 108579b7067dSJoao Martins case SHUTDOWN_poweroff: 108679b7067dSJoao Martins qemu_system_shutdown_request(SHUTDOWN_CAUSE_GUEST_SHUTDOWN); 108779b7067dSJoao Martins break; 108879b7067dSJoao Martins 108979b7067dSJoao Martins case SHUTDOWN_soft_reset: 109079b7067dSJoao Martins qemu_mutex_lock_iothread(); 109179b7067dSJoao Martins ret = kvm_xen_soft_reset(); 109279b7067dSJoao Martins qemu_mutex_unlock_iothread(); 109379b7067dSJoao Martins break; 109479b7067dSJoao Martins 109579b7067dSJoao Martins default: 109679b7067dSJoao Martins ret = -EINVAL; 109779b7067dSJoao Martins break; 109879b7067dSJoao Martins } 109979b7067dSJoao Martins 110079b7067dSJoao Martins return ret; 110179b7067dSJoao Martins } 110279b7067dSJoao Martins 110379b7067dSJoao Martins static bool kvm_xen_hcall_sched_op(struct kvm_xen_exit *exit, X86CPU *cpu, 110479b7067dSJoao Martins int cmd, uint64_t arg) 110579b7067dSJoao Martins { 110679b7067dSJoao Martins CPUState *cs = CPU(cpu); 110779b7067dSJoao Martins int err = -ENOSYS; 110879b7067dSJoao Martins 110979b7067dSJoao Martins switch (cmd) { 111079b7067dSJoao Martins case SCHEDOP_shutdown: 111179b7067dSJoao Martins err = schedop_shutdown(cs, arg); 111279b7067dSJoao Martins break; 111379b7067dSJoao Martins 1114c789b9efSDavid Woodhouse case SCHEDOP_poll: 1115c789b9efSDavid Woodhouse /* 1116c789b9efSDavid Woodhouse * Linux will panic if this doesn't work. Just yield; it's not 1117c789b9efSDavid Woodhouse * worth overthinking it because with event channel handling 1118c789b9efSDavid Woodhouse * in KVM, the kernel will intercept this and it will never 1119c789b9efSDavid Woodhouse * reach QEMU anyway. The semantics of the hypercall explicltly 1120c789b9efSDavid Woodhouse * permit spurious wakeups. 1121c789b9efSDavid Woodhouse */ 1122c789b9efSDavid Woodhouse case SCHEDOP_yield: 1123c789b9efSDavid Woodhouse sched_yield(); 1124c789b9efSDavid Woodhouse err = 0; 1125c789b9efSDavid Woodhouse break; 1126c789b9efSDavid Woodhouse 112779b7067dSJoao Martins default: 112879b7067dSJoao Martins return false; 112979b7067dSJoao Martins } 113079b7067dSJoao Martins 113179b7067dSJoao Martins exit->u.hcall.result = err; 113279b7067dSJoao Martins return true; 113379b7067dSJoao Martins } 113479b7067dSJoao Martins 113555a3f666SJoao Martins static bool do_kvm_xen_handle_exit(X86CPU *cpu, struct kvm_xen_exit *exit) 113655a3f666SJoao Martins { 113755a3f666SJoao Martins uint16_t code = exit->u.hcall.input; 113855a3f666SJoao Martins 113955a3f666SJoao Martins if (exit->u.hcall.cpl > 0) { 114055a3f666SJoao Martins exit->u.hcall.result = -EPERM; 114155a3f666SJoao Martins return true; 114255a3f666SJoao Martins } 114355a3f666SJoao Martins 114455a3f666SJoao Martins switch (code) { 114579b7067dSJoao Martins case __HYPERVISOR_sched_op: 114679b7067dSJoao Martins return kvm_xen_hcall_sched_op(exit, cpu, exit->u.hcall.params[0], 114779b7067dSJoao Martins exit->u.hcall.params[1]); 11483b06f29bSJoao Martins case __HYPERVISOR_event_channel_op: 11494858ba20SDavid Woodhouse return kvm_xen_hcall_evtchn_op(exit, cpu, exit->u.hcall.params[0], 11503b06f29bSJoao Martins exit->u.hcall.params[1]); 1151d70bd6a4SJoao Martins case __HYPERVISOR_vcpu_op: 1152d70bd6a4SJoao Martins return kvm_xen_hcall_vcpu_op(exit, cpu, 1153d70bd6a4SJoao Martins exit->u.hcall.params[0], 1154d70bd6a4SJoao Martins exit->u.hcall.params[1], 1155d70bd6a4SJoao Martins exit->u.hcall.params[2]); 1156671bfdcdSJoao Martins case __HYPERVISOR_hvm_op: 1157671bfdcdSJoao Martins return kvm_xen_hcall_hvm_op(exit, cpu, exit->u.hcall.params[0], 1158671bfdcdSJoao Martins exit->u.hcall.params[1]); 1159fb0fd2ceSJoao Martins case __HYPERVISOR_memory_op: 1160fb0fd2ceSJoao Martins return kvm_xen_hcall_memory_op(exit, cpu, exit->u.hcall.params[0], 1161fb0fd2ceSJoao Martins exit->u.hcall.params[1]); 1162bedcc139SJoao Martins case __HYPERVISOR_xen_version: 1163bedcc139SJoao Martins return kvm_xen_hcall_xen_version(exit, cpu, exit->u.hcall.params[0], 1164bedcc139SJoao Martins exit->u.hcall.params[1]); 116555a3f666SJoao Martins default: 116655a3f666SJoao Martins return false; 116755a3f666SJoao Martins } 116855a3f666SJoao Martins } 116955a3f666SJoao Martins 117055a3f666SJoao Martins int kvm_xen_handle_exit(X86CPU *cpu, struct kvm_xen_exit *exit) 117155a3f666SJoao Martins { 117255a3f666SJoao Martins if (exit->type != KVM_EXIT_XEN_HCALL) { 117355a3f666SJoao Martins return -1; 117455a3f666SJoao Martins } 117555a3f666SJoao Martins 1176110a0ea5SDavid Woodhouse /* 1177110a0ea5SDavid Woodhouse * The kernel latches the guest 32/64 mode when the MSR is used to fill 1178110a0ea5SDavid Woodhouse * the hypercall page. So if we see a hypercall in a mode that doesn't 1179110a0ea5SDavid Woodhouse * match our own idea of the guest mode, fetch the kernel's idea of the 1180110a0ea5SDavid Woodhouse * "long mode" to remain in sync. 1181110a0ea5SDavid Woodhouse */ 1182110a0ea5SDavid Woodhouse if (exit->u.hcall.longmode != xen_is_long_mode()) { 1183110a0ea5SDavid Woodhouse xen_sync_long_mode(); 1184110a0ea5SDavid Woodhouse } 1185110a0ea5SDavid Woodhouse 118655a3f666SJoao Martins if (!do_kvm_xen_handle_exit(cpu, exit)) { 118755a3f666SJoao Martins /* 118855a3f666SJoao Martins * Some hypercalls will be deliberately "implemented" by returning 118955a3f666SJoao Martins * -ENOSYS. This case is for hypercalls which are unexpected. 119055a3f666SJoao Martins */ 119155a3f666SJoao Martins exit->u.hcall.result = -ENOSYS; 119255a3f666SJoao Martins qemu_log_mask(LOG_UNIMP, "Unimplemented Xen hypercall %" 119355a3f666SJoao Martins PRId64 " (0x%" PRIx64 " 0x%" PRIx64 " 0x%" PRIx64 ")\n", 119455a3f666SJoao Martins (uint64_t)exit->u.hcall.input, 119555a3f666SJoao Martins (uint64_t)exit->u.hcall.params[0], 119655a3f666SJoao Martins (uint64_t)exit->u.hcall.params[1], 119755a3f666SJoao Martins (uint64_t)exit->u.hcall.params[2]); 119855a3f666SJoao Martins } 119955a3f666SJoao Martins 120055a3f666SJoao Martins trace_kvm_xen_hypercall(CPU(cpu)->cpu_index, exit->u.hcall.cpl, 120155a3f666SJoao Martins exit->u.hcall.input, exit->u.hcall.params[0], 120255a3f666SJoao Martins exit->u.hcall.params[1], exit->u.hcall.params[2], 120355a3f666SJoao Martins exit->u.hcall.result); 120455a3f666SJoao Martins return 0; 120555a3f666SJoao Martins } 1206c345104cSJoao Martins 1207c345104cSJoao Martins int kvm_put_xen_state(CPUState *cs) 1208c345104cSJoao Martins { 1209c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs); 1210c345104cSJoao Martins CPUX86State *env = &cpu->env; 1211c345104cSJoao Martins uint64_t gpa; 1212c345104cSJoao Martins int ret; 1213c345104cSJoao Martins 1214c345104cSJoao Martins gpa = env->xen_vcpu_info_gpa; 1215c345104cSJoao Martins if (gpa == INVALID_GPA) { 1216c345104cSJoao Martins gpa = env->xen_vcpu_info_default_gpa; 1217c345104cSJoao Martins } 1218c345104cSJoao Martins 1219c345104cSJoao Martins if (gpa != INVALID_GPA) { 122027d4075dSDavid Woodhouse ret = set_vcpu_info(cs, gpa); 1221c345104cSJoao Martins if (ret < 0) { 1222c345104cSJoao Martins return ret; 1223c345104cSJoao Martins } 1224c345104cSJoao Martins } 1225c345104cSJoao Martins 1226f0689302SJoao Martins gpa = env->xen_vcpu_time_info_gpa; 1227f0689302SJoao Martins if (gpa != INVALID_GPA) { 1228f0689302SJoao Martins ret = kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_VCPU_TIME_INFO, 1229f0689302SJoao Martins gpa); 1230f0689302SJoao Martins if (ret < 0) { 1231f0689302SJoao Martins return ret; 1232f0689302SJoao Martins } 1233f0689302SJoao Martins } 1234f0689302SJoao Martins 12355092db87SJoao Martins gpa = env->xen_vcpu_runstate_gpa; 12365092db87SJoao Martins if (gpa != INVALID_GPA) { 12375092db87SJoao Martins ret = kvm_xen_set_vcpu_attr(cs, KVM_XEN_VCPU_ATTR_TYPE_RUNSTATE_ADDR, 12385092db87SJoao Martins gpa); 12395092db87SJoao Martins if (ret < 0) { 12405092db87SJoao Martins return ret; 12415092db87SJoao Martins } 12425092db87SJoao Martins } 12435092db87SJoao Martins 1244105b47fdSAnkur Arora if (!kvm_xen_has_cap(EVTCHN_SEND)) { 1245105b47fdSAnkur Arora return 0; 1246105b47fdSAnkur Arora } 1247105b47fdSAnkur Arora 1248105b47fdSAnkur Arora if (env->xen_vcpu_callback_vector) { 1249105b47fdSAnkur Arora ret = kvm_xen_set_vcpu_callback_vector(cs); 1250105b47fdSAnkur Arora if (ret < 0) { 1251105b47fdSAnkur Arora return ret; 1252105b47fdSAnkur Arora } 1253105b47fdSAnkur Arora } 1254105b47fdSAnkur Arora 1255c723d4c1SDavid Woodhouse if (env->xen_virq[VIRQ_TIMER]) { 1256c723d4c1SDavid Woodhouse ret = kvm_xen_set_vcpu_timer(cs); 1257c723d4c1SDavid Woodhouse if (ret < 0) { 1258c723d4c1SDavid Woodhouse return ret; 1259c723d4c1SDavid Woodhouse } 1260c723d4c1SDavid Woodhouse } 1261c345104cSJoao Martins return 0; 1262c345104cSJoao Martins } 1263c345104cSJoao Martins 1264c345104cSJoao Martins int kvm_get_xen_state(CPUState *cs) 1265c345104cSJoao Martins { 1266c345104cSJoao Martins X86CPU *cpu = X86_CPU(cs); 1267c345104cSJoao Martins CPUX86State *env = &cpu->env; 1268c345104cSJoao Martins uint64_t gpa; 1269c723d4c1SDavid Woodhouse int ret; 1270c345104cSJoao Martins 1271c345104cSJoao Martins /* 1272c345104cSJoao Martins * The kernel does not mark vcpu_info as dirty when it delivers interrupts 1273c345104cSJoao Martins * to it. It's up to userspace to *assume* that any page shared thus is 1274c345104cSJoao Martins * always considered dirty. The shared_info page is different since it's 1275c345104cSJoao Martins * an overlay and migrated separately anyway. 1276c345104cSJoao Martins */ 1277c345104cSJoao Martins gpa = env->xen_vcpu_info_gpa; 1278c345104cSJoao Martins if (gpa == INVALID_GPA) { 1279c345104cSJoao Martins gpa = env->xen_vcpu_info_default_gpa; 1280c345104cSJoao Martins } 1281c345104cSJoao Martins if (gpa != INVALID_GPA) { 1282c345104cSJoao Martins MemoryRegionSection mrs = memory_region_find(get_system_memory(), 1283c345104cSJoao Martins gpa, 1284c345104cSJoao Martins sizeof(struct vcpu_info)); 1285c345104cSJoao Martins if (mrs.mr && 1286c345104cSJoao Martins !int128_lt(mrs.size, int128_make64(sizeof(struct vcpu_info)))) { 1287c345104cSJoao Martins memory_region_set_dirty(mrs.mr, mrs.offset_within_region, 1288c345104cSJoao Martins sizeof(struct vcpu_info)); 1289c345104cSJoao Martins } 1290c345104cSJoao Martins } 1291c345104cSJoao Martins 1292c723d4c1SDavid Woodhouse if (!kvm_xen_has_cap(EVTCHN_SEND)) { 1293c723d4c1SDavid Woodhouse return 0; 1294c723d4c1SDavid Woodhouse } 1295c723d4c1SDavid Woodhouse 1296c723d4c1SDavid Woodhouse /* 1297c723d4c1SDavid Woodhouse * If the kernel is accelerating timers, read out the current value of the 1298c723d4c1SDavid Woodhouse * singleshot timer deadline. 1299c723d4c1SDavid Woodhouse */ 1300c723d4c1SDavid Woodhouse if (env->xen_virq[VIRQ_TIMER]) { 1301c723d4c1SDavid Woodhouse struct kvm_xen_vcpu_attr va = { 1302c723d4c1SDavid Woodhouse .type = KVM_XEN_VCPU_ATTR_TYPE_TIMER, 1303c723d4c1SDavid Woodhouse }; 1304c723d4c1SDavid Woodhouse ret = kvm_vcpu_ioctl(cs, KVM_XEN_VCPU_GET_ATTR, &va); 1305c723d4c1SDavid Woodhouse if (ret < 0) { 1306c723d4c1SDavid Woodhouse return ret; 1307c723d4c1SDavid Woodhouse } 1308c723d4c1SDavid Woodhouse env->xen_singleshot_timer_ns = va.u.timer.expires_ns; 1309c723d4c1SDavid Woodhouse } 1310c723d4c1SDavid Woodhouse 1311c345104cSJoao Martins return 0; 1312c345104cSJoao Martins } 1313