2
* Copyright (C) 2010 Citrix Ltd.
4
* This work is licensed under the terms of the GNU GPL, version 2. See
5
* the COPYING file in the top-level directory.
7
* Contributions after 2012-01-13 are licensed under the terms of the
8
* GNU GPL, version 2 or (at your option) any later version.
13
#include "hw/pci/pci.h"
14
#include "hw/i386/pc.h"
15
#include "hw/xen/xen_common.h"
16
#include "hw/xen/xen_backend.h"
17
#include "qmp-commands.h"
19
#include "sysemu/char.h"
20
#include "qemu/range.h"
21
#include "sysemu/xen-mapcache.h"
23
#include "exec/address-spaces.h"
25
#include <xen/hvm/ioreq.h>
26
#include <xen/hvm/params.h>
27
#include <xen/hvm/e820.h>
32
#define DPRINTF(fmt, ...) \
33
do { fprintf(stderr, "xen: " fmt, ## __VA_ARGS__); } while (0)
35
#define DPRINTF(fmt, ...) \
39
static MemoryRegion ram_memory, ram_640k, ram_lo, ram_hi;
40
static MemoryRegion *framebuffer;
41
static bool xen_in_migration;
43
/* Compatibility with older version */
44
#if __XEN_LATEST_INTERFACE_VERSION__ < 0x0003020a
45
static inline uint32_t xen_vcpu_eport(shared_iopage_t *shared_page, int i)
47
return shared_page->vcpu_iodata[i].vp_eport;
49
static inline ioreq_t *xen_vcpu_ioreq(shared_iopage_t *shared_page, int vcpu)
51
return &shared_page->vcpu_iodata[vcpu].vp_ioreq;
53
# define FMT_ioreq_size PRIx64
55
static inline uint32_t xen_vcpu_eport(shared_iopage_t *shared_page, int i)
57
return shared_page->vcpu_ioreq[i].vp_eport;
59
static inline ioreq_t *xen_vcpu_ioreq(shared_iopage_t *shared_page, int vcpu)
61
return &shared_page->vcpu_ioreq[vcpu];
63
# define FMT_ioreq_size "u"
65
#ifndef HVM_PARAM_BUFIOREQ_EVTCHN
66
#define HVM_PARAM_BUFIOREQ_EVTCHN 26
69
#define BUFFER_IO_MAX_DELAY 100
71
typedef struct XenPhysmap {
77
QLIST_ENTRY(XenPhysmap) list;
80
typedef struct XenIOState {
81
shared_iopage_t *shared_page;
82
buffered_iopage_t *buffered_io_page;
83
QEMUTimer *buffered_io_timer;
84
/* the evtchn port for polling the notification, */
85
evtchn_port_t *ioreq_local_port;
86
/* evtchn local port for buffered io */
87
evtchn_port_t bufioreq_local_port;
88
/* the evtchn fd for polling */
90
/* which vcpu we are serving */
93
struct xs_handle *xenstore;
94
MemoryListener memory_listener;
95
QLIST_HEAD(, XenPhysmap) physmap;
96
hwaddr free_phys_offset;
97
const XenPhysmap *log_for_dirtybit;
103
/* Xen specific function for piix pci */
105
int xen_pci_slot_get_pirq(PCIDevice *pci_dev, int irq_num)
107
return irq_num + ((pci_dev->devfn >> 3) << 2);
110
void xen_piix3_set_irq(void *opaque, int irq_num, int level)
112
xc_hvm_set_pci_intx_level(xen_xc, xen_domid, 0, 0, irq_num >> 2,
116
void xen_piix_pci_write_config_client(uint32_t address, uint32_t val, int len)
120
/* Scan for updates to PCI link routes (0x60-0x63). */
121
for (i = 0; i < len; i++) {
122
uint8_t v = (val >> (8 * i)) & 0xff;
127
if (((address + i) >= 0x60) && ((address + i) <= 0x63)) {
128
xc_hvm_set_pci_link_route(xen_xc, xen_domid, address + i - 0x60, v);
133
void xen_hvm_inject_msi(uint64_t addr, uint32_t data)
135
xen_xc_hvm_inject_msi(xen_xc, xen_domid, addr, data);
138
static void xen_suspend_notifier(Notifier *notifier, void *data)
140
xc_set_hvm_param(xen_xc, xen_domid, HVM_PARAM_ACPI_S_STATE, 3);
143
/* Xen Interrupt Controller */
145
static void xen_set_irq(void *opaque, int irq, int level)
147
xc_hvm_set_isa_irq_level(xen_xc, xen_domid, irq, level);
150
qemu_irq *xen_interrupt_controller_init(void)
152
return qemu_allocate_irqs(xen_set_irq, NULL, 16);
157
static void xen_ram_init(ram_addr_t ram_size)
159
MemoryRegion *sysmem = get_system_memory();
160
ram_addr_t below_4g_mem_size, above_4g_mem_size = 0;
161
ram_addr_t block_len;
163
block_len = ram_size;
164
if (ram_size >= HVM_BELOW_4G_RAM_END) {
165
/* Xen does not allocate the memory continuously, and keep a hole at
166
* HVM_BELOW_4G_MMIO_START of HVM_BELOW_4G_MMIO_LENGTH
168
block_len += HVM_BELOW_4G_MMIO_LENGTH;
170
memory_region_init_ram(&ram_memory, NULL, "xen.ram", block_len);
171
vmstate_register_ram_global(&ram_memory);
173
if (ram_size >= HVM_BELOW_4G_RAM_END) {
174
above_4g_mem_size = ram_size - HVM_BELOW_4G_RAM_END;
175
below_4g_mem_size = HVM_BELOW_4G_RAM_END;
177
below_4g_mem_size = ram_size;
180
memory_region_init_alias(&ram_640k, NULL, "xen.ram.640k",
181
&ram_memory, 0, 0xa0000);
182
memory_region_add_subregion(sysmem, 0, &ram_640k);
183
/* Skip of the VGA IO memory space, it will be registered later by the VGA
186
* The area between 0xc0000 and 0x100000 will be used by SeaBIOS to load
187
* the Options ROM, so it is registered here as RAM.
189
memory_region_init_alias(&ram_lo, NULL, "xen.ram.lo",
190
&ram_memory, 0xc0000, below_4g_mem_size - 0xc0000);
191
memory_region_add_subregion(sysmem, 0xc0000, &ram_lo);
192
if (above_4g_mem_size > 0) {
193
memory_region_init_alias(&ram_hi, NULL, "xen.ram.hi",
194
&ram_memory, 0x100000000ULL,
196
memory_region_add_subregion(sysmem, 0x100000000ULL, &ram_hi);
200
void xen_ram_alloc(ram_addr_t ram_addr, ram_addr_t size, MemoryRegion *mr)
202
unsigned long nr_pfn;
206
if (runstate_check(RUN_STATE_INMIGRATE)) {
207
/* RAM already populated in Xen */
208
fprintf(stderr, "%s: do not alloc "RAM_ADDR_FMT
209
" bytes of ram at "RAM_ADDR_FMT" when runstate is INMIGRATE\n",
210
__func__, size, ram_addr);
214
if (mr == &ram_memory) {
218
trace_xen_ram_alloc(ram_addr, size);
220
nr_pfn = size >> TARGET_PAGE_BITS;
221
pfn_list = g_malloc(sizeof (*pfn_list) * nr_pfn);
223
for (i = 0; i < nr_pfn; i++) {
224
pfn_list[i] = (ram_addr >> TARGET_PAGE_BITS) + i;
227
if (xc_domain_populate_physmap_exact(xen_xc, xen_domid, nr_pfn, 0, 0, pfn_list)) {
228
hw_error("xen: failed to populate ram at " RAM_ADDR_FMT, ram_addr);
234
static XenPhysmap *get_physmapping(XenIOState *state,
235
hwaddr start_addr, ram_addr_t size)
237
XenPhysmap *physmap = NULL;
239
start_addr &= TARGET_PAGE_MASK;
241
QLIST_FOREACH(physmap, &state->physmap, list) {
242
if (range_covers_byte(physmap->start_addr, physmap->size, start_addr)) {
249
static hwaddr xen_phys_offset_to_gaddr(hwaddr start_addr,
250
ram_addr_t size, void *opaque)
252
hwaddr addr = start_addr & TARGET_PAGE_MASK;
253
XenIOState *xen_io_state = opaque;
254
XenPhysmap *physmap = NULL;
256
QLIST_FOREACH(physmap, &xen_io_state->physmap, list) {
257
if (range_covers_byte(physmap->phys_offset, physmap->size, addr)) {
258
return physmap->start_addr;
265
#if CONFIG_XEN_CTRL_INTERFACE_VERSION >= 340
266
static int xen_add_to_physmap(XenIOState *state,
270
hwaddr offset_within_region)
274
XenPhysmap *physmap = NULL;
275
hwaddr pfn, start_gpfn;
276
hwaddr phys_offset = memory_region_get_ram_addr(mr);
277
char path[80], value[17];
279
if (get_physmapping(state, start_addr, size)) {
286
/* Xen can only handle a single dirty log region for now and we want
287
* the linear framebuffer to be that region.
288
* Avoid tracking any regions that is not videoram and avoid tracking
289
* the legacy vga region. */
290
if (mr == framebuffer && start_addr > 0xbffff) {
296
DPRINTF("mapping vram to %"HWADDR_PRIx" - %"HWADDR_PRIx"\n",
297
start_addr, start_addr + size);
299
pfn = phys_offset >> TARGET_PAGE_BITS;
300
start_gpfn = start_addr >> TARGET_PAGE_BITS;
301
for (i = 0; i < size >> TARGET_PAGE_BITS; i++) {
302
unsigned long idx = pfn + i;
303
xen_pfn_t gpfn = start_gpfn + i;
305
rc = xc_domain_add_to_physmap(xen_xc, xen_domid, XENMAPSPACE_gmfn, idx, gpfn);
307
DPRINTF("add_to_physmap MFN %"PRI_xen_pfn" to PFN %"
308
PRI_xen_pfn" failed: %d\n", idx, gpfn, rc);
313
physmap = g_malloc(sizeof (XenPhysmap));
315
physmap->start_addr = start_addr;
316
physmap->size = size;
317
physmap->name = (char *)mr->name;
318
physmap->phys_offset = phys_offset;
320
QLIST_INSERT_HEAD(&state->physmap, physmap, list);
322
xc_domain_pin_memory_cacheattr(xen_xc, xen_domid,
323
start_addr >> TARGET_PAGE_BITS,
324
(start_addr + size) >> TARGET_PAGE_BITS,
325
XEN_DOMCTL_MEM_CACHEATTR_WB);
327
snprintf(path, sizeof(path),
328
"/local/domain/0/device-model/%d/physmap/%"PRIx64"/start_addr",
329
xen_domid, (uint64_t)phys_offset);
330
snprintf(value, sizeof(value), "%"PRIx64, (uint64_t)start_addr);
331
if (!xs_write(state->xenstore, 0, path, value, strlen(value))) {
334
snprintf(path, sizeof(path),
335
"/local/domain/0/device-model/%d/physmap/%"PRIx64"/size",
336
xen_domid, (uint64_t)phys_offset);
337
snprintf(value, sizeof(value), "%"PRIx64, (uint64_t)size);
338
if (!xs_write(state->xenstore, 0, path, value, strlen(value))) {
342
snprintf(path, sizeof(path),
343
"/local/domain/0/device-model/%d/physmap/%"PRIx64"/name",
344
xen_domid, (uint64_t)phys_offset);
345
if (!xs_write(state->xenstore, 0, path, mr->name, strlen(mr->name))) {
353
static int xen_remove_from_physmap(XenIOState *state,
359
XenPhysmap *physmap = NULL;
360
hwaddr phys_offset = 0;
362
physmap = get_physmapping(state, start_addr, size);
363
if (physmap == NULL) {
367
phys_offset = physmap->phys_offset;
368
size = physmap->size;
370
DPRINTF("unmapping vram to %"HWADDR_PRIx" - %"HWADDR_PRIx", from ",
371
"%"HWADDR_PRIx"\n", phys_offset, phys_offset + size, start_addr);
373
size >>= TARGET_PAGE_BITS;
374
start_addr >>= TARGET_PAGE_BITS;
375
phys_offset >>= TARGET_PAGE_BITS;
376
for (i = 0; i < size; i++) {
377
unsigned long idx = start_addr + i;
378
xen_pfn_t gpfn = phys_offset + i;
380
rc = xc_domain_add_to_physmap(xen_xc, xen_domid, XENMAPSPACE_gmfn, idx, gpfn);
382
fprintf(stderr, "add_to_physmap MFN %"PRI_xen_pfn" to PFN %"
383
PRI_xen_pfn" failed: %d\n", idx, gpfn, rc);
388
QLIST_REMOVE(physmap, list);
389
if (state->log_for_dirtybit == physmap) {
390
state->log_for_dirtybit = NULL;
398
static int xen_add_to_physmap(XenIOState *state,
402
hwaddr offset_within_region)
407
static int xen_remove_from_physmap(XenIOState *state,
415
static void xen_set_memory(struct MemoryListener *listener,
416
MemoryRegionSection *section,
419
XenIOState *state = container_of(listener, XenIOState, memory_listener);
420
hwaddr start_addr = section->offset_within_address_space;
421
ram_addr_t size = int128_get64(section->size);
422
bool log_dirty = memory_region_is_logging(section->mr);
423
hvmmem_type_t mem_type;
425
if (!memory_region_is_ram(section->mr)) {
429
if (!(section->mr != &ram_memory
430
&& ( (log_dirty && add) || (!log_dirty && !add)))) {
434
trace_xen_client_set_memory(start_addr, size, log_dirty);
436
start_addr &= TARGET_PAGE_MASK;
437
size = TARGET_PAGE_ALIGN(size);
440
if (!memory_region_is_rom(section->mr)) {
441
xen_add_to_physmap(state, start_addr, size,
442
section->mr, section->offset_within_region);
444
mem_type = HVMMEM_ram_ro;
445
if (xc_hvm_set_mem_type(xen_xc, xen_domid, mem_type,
446
start_addr >> TARGET_PAGE_BITS,
447
size >> TARGET_PAGE_BITS)) {
448
DPRINTF("xc_hvm_set_mem_type error, addr: "TARGET_FMT_plx"\n",
453
if (xen_remove_from_physmap(state, start_addr, size) < 0) {
454
DPRINTF("physmapping does not exist at "TARGET_FMT_plx"\n", start_addr);
459
static void xen_region_add(MemoryListener *listener,
460
MemoryRegionSection *section)
462
memory_region_ref(section->mr);
463
xen_set_memory(listener, section, true);
466
static void xen_region_del(MemoryListener *listener,
467
MemoryRegionSection *section)
469
xen_set_memory(listener, section, false);
470
memory_region_unref(section->mr);
473
static void xen_sync_dirty_bitmap(XenIOState *state,
477
hwaddr npages = size >> TARGET_PAGE_BITS;
478
const int width = sizeof(unsigned long) * 8;
479
unsigned long bitmap[(npages + width - 1) / width];
481
const XenPhysmap *physmap = NULL;
483
physmap = get_physmapping(state, start_addr, size);
484
if (physmap == NULL) {
489
if (state->log_for_dirtybit == NULL) {
490
state->log_for_dirtybit = physmap;
491
} else if (state->log_for_dirtybit != physmap) {
492
/* Only one range for dirty bitmap can be tracked. */
496
rc = xc_hvm_track_dirty_vram(xen_xc, xen_domid,
497
start_addr >> TARGET_PAGE_BITS, npages,
500
if (rc != -ENODATA) {
501
memory_region_set_dirty(framebuffer, 0, size);
502
DPRINTF("xen: track_dirty_vram failed (0x" TARGET_FMT_plx
503
", 0x" TARGET_FMT_plx "): %s\n",
504
start_addr, start_addr + size, strerror(-rc));
509
for (i = 0; i < ARRAY_SIZE(bitmap); i++) {
510
unsigned long map = bitmap[i];
514
memory_region_set_dirty(framebuffer,
515
(i * width + j) * TARGET_PAGE_SIZE,
521
static void xen_log_start(MemoryListener *listener,
522
MemoryRegionSection *section)
524
XenIOState *state = container_of(listener, XenIOState, memory_listener);
526
xen_sync_dirty_bitmap(state, section->offset_within_address_space,
527
int128_get64(section->size));
530
static void xen_log_stop(MemoryListener *listener, MemoryRegionSection *section)
532
XenIOState *state = container_of(listener, XenIOState, memory_listener);
534
state->log_for_dirtybit = NULL;
535
/* Disable dirty bit tracking */
536
xc_hvm_track_dirty_vram(xen_xc, xen_domid, 0, 0, NULL);
539
static void xen_log_sync(MemoryListener *listener, MemoryRegionSection *section)
541
XenIOState *state = container_of(listener, XenIOState, memory_listener);
543
xen_sync_dirty_bitmap(state, section->offset_within_address_space,
544
int128_get64(section->size));
547
static void xen_log_global_start(MemoryListener *listener)
550
xen_in_migration = true;
554
static void xen_log_global_stop(MemoryListener *listener)
556
xen_in_migration = false;
559
static MemoryListener xen_memory_listener = {
560
.region_add = xen_region_add,
561
.region_del = xen_region_del,
562
.log_start = xen_log_start,
563
.log_stop = xen_log_stop,
564
.log_sync = xen_log_sync,
565
.log_global_start = xen_log_global_start,
566
.log_global_stop = xen_log_global_stop,
570
void qmp_xen_set_global_dirty_log(bool enable, Error **errp)
573
memory_global_dirty_log_start();
575
memory_global_dirty_log_stop();
579
/* get the ioreq packets from share mem */
580
static ioreq_t *cpu_get_ioreq_from_shared_memory(XenIOState *state, int vcpu)
582
ioreq_t *req = xen_vcpu_ioreq(state->shared_page, vcpu);
584
if (req->state != STATE_IOREQ_READY) {
585
DPRINTF("I/O request not ready: "
586
"%x, ptr: %x, port: %"PRIx64", "
587
"data: %"PRIx64", count: %" FMT_ioreq_size ", size: %" FMT_ioreq_size "\n",
588
req->state, req->data_is_ptr, req->addr,
589
req->data, req->count, req->size);
593
xen_rmb(); /* see IOREQ_READY /then/ read contents of ioreq */
595
req->state = STATE_IOREQ_INPROCESS;
599
/* use poll to get the port notification */
600
/* ioreq_vec--out,the */
601
/* retval--the number of ioreq packet */
602
static ioreq_t *cpu_get_ioreq(XenIOState *state)
607
port = xc_evtchn_pending(state->xce_handle);
608
if (port == state->bufioreq_local_port) {
609
qemu_mod_timer(state->buffered_io_timer,
610
BUFFER_IO_MAX_DELAY + qemu_get_clock_ms(rt_clock));
615
for (i = 0; i < smp_cpus; i++) {
616
if (state->ioreq_local_port[i] == port) {
622
hw_error("Fatal error while trying to get io event!\n");
625
/* unmask the wanted port again */
626
xc_evtchn_unmask(state->xce_handle, port);
628
/* get the io packet from shared memory */
629
state->send_vcpu = i;
630
return cpu_get_ioreq_from_shared_memory(state, i);
633
/* read error or read nothing */
637
static uint32_t do_inp(pio_addr_t addr, unsigned long size)
641
return cpu_inb(addr);
643
return cpu_inw(addr);
645
return cpu_inl(addr);
647
hw_error("inp: bad size: %04"FMT_pioaddr" %lx", addr, size);
651
static void do_outp(pio_addr_t addr,
652
unsigned long size, uint32_t val)
656
return cpu_outb(addr, val);
658
return cpu_outw(addr, val);
660
return cpu_outl(addr, val);
662
hw_error("outp: bad size: %04"FMT_pioaddr" %lx", addr, size);
667
* Helper functions which read/write an object from/to physical guest
668
* memory, as part of the implementation of an ioreq.
671
* cpu_physical_memory_rw(addr + (req->df ? -1 : +1) * req->size * i,
672
* val, req->size, 0/1)
673
* except without the integer overflow problems.
675
static void rw_phys_req_item(hwaddr addr,
676
ioreq_t *req, uint32_t i, void *val, int rw)
678
/* Do everything unsigned so overflow just results in a truncated result
679
* and accesses to undesired parts of guest memory, which is up
681
hwaddr offset = (hwaddr)req->size * i;
687
cpu_physical_memory_rw(addr, val, req->size, rw);
690
static inline void read_phys_req_item(hwaddr addr,
691
ioreq_t *req, uint32_t i, void *val)
693
rw_phys_req_item(addr, req, i, val, 0);
695
static inline void write_phys_req_item(hwaddr addr,
696
ioreq_t *req, uint32_t i, void *val)
698
rw_phys_req_item(addr, req, i, val, 1);
702
static void cpu_ioreq_pio(ioreq_t *req)
706
if (req->dir == IOREQ_READ) {
707
if (!req->data_is_ptr) {
708
req->data = do_inp(req->addr, req->size);
712
for (i = 0; i < req->count; i++) {
713
tmp = do_inp(req->addr, req->size);
714
write_phys_req_item(req->data, req, i, &tmp);
717
} else if (req->dir == IOREQ_WRITE) {
718
if (!req->data_is_ptr) {
719
do_outp(req->addr, req->size, req->data);
721
for (i = 0; i < req->count; i++) {
724
read_phys_req_item(req->data, req, i, &tmp);
725
do_outp(req->addr, req->size, tmp);
731
static void cpu_ioreq_move(ioreq_t *req)
735
if (!req->data_is_ptr) {
736
if (req->dir == IOREQ_READ) {
737
for (i = 0; i < req->count; i++) {
738
read_phys_req_item(req->addr, req, i, &req->data);
740
} else if (req->dir == IOREQ_WRITE) {
741
for (i = 0; i < req->count; i++) {
742
write_phys_req_item(req->addr, req, i, &req->data);
748
if (req->dir == IOREQ_READ) {
749
for (i = 0; i < req->count; i++) {
750
read_phys_req_item(req->addr, req, i, &tmp);
751
write_phys_req_item(req->data, req, i, &tmp);
753
} else if (req->dir == IOREQ_WRITE) {
754
for (i = 0; i < req->count; i++) {
755
read_phys_req_item(req->data, req, i, &tmp);
756
write_phys_req_item(req->addr, req, i, &tmp);
762
static void handle_ioreq(ioreq_t *req)
764
if (!req->data_is_ptr && (req->dir == IOREQ_WRITE) &&
765
(req->size < sizeof (target_ulong))) {
766
req->data &= ((target_ulong) 1 << (8 * req->size)) - 1;
773
case IOREQ_TYPE_COPY:
776
case IOREQ_TYPE_TIMEOFFSET:
778
case IOREQ_TYPE_INVALIDATE:
779
xen_invalidate_map_cache();
782
hw_error("Invalid ioreq type 0x%x\n", req->type);
786
static int handle_buffered_iopage(XenIOState *state)
788
buf_ioreq_t *buf_req = NULL;
792
if (!state->buffered_io_page) {
796
memset(&req, 0x00, sizeof(req));
798
while (state->buffered_io_page->read_pointer != state->buffered_io_page->write_pointer) {
799
buf_req = &state->buffered_io_page->buf_ioreq[
800
state->buffered_io_page->read_pointer % IOREQ_BUFFER_SLOT_NUM];
801
req.size = 1UL << buf_req->size;
803
req.addr = buf_req->addr;
804
req.data = buf_req->data;
805
req.state = STATE_IOREQ_READY;
806
req.dir = buf_req->dir;
808
req.type = buf_req->type;
810
qw = (req.size == 8);
812
buf_req = &state->buffered_io_page->buf_ioreq[
813
(state->buffered_io_page->read_pointer + 1) % IOREQ_BUFFER_SLOT_NUM];
814
req.data |= ((uint64_t)buf_req->data) << 32;
820
state->buffered_io_page->read_pointer += qw ? 2 : 1;
826
static void handle_buffered_io(void *opaque)
828
XenIOState *state = opaque;
830
if (handle_buffered_iopage(state)) {
831
qemu_mod_timer(state->buffered_io_timer,
832
BUFFER_IO_MAX_DELAY + qemu_get_clock_ms(rt_clock));
834
qemu_del_timer(state->buffered_io_timer);
835
xc_evtchn_unmask(state->xce_handle, state->bufioreq_local_port);
839
static void cpu_handle_ioreq(void *opaque)
841
XenIOState *state = opaque;
842
ioreq_t *req = cpu_get_ioreq(state);
844
handle_buffered_iopage(state);
848
if (req->state != STATE_IOREQ_INPROCESS) {
849
fprintf(stderr, "Badness in I/O request ... not in service?!: "
850
"%x, ptr: %x, port: %"PRIx64", "
851
"data: %"PRIx64", count: %" FMT_ioreq_size ", size: %" FMT_ioreq_size "\n",
852
req->state, req->data_is_ptr, req->addr,
853
req->data, req->count, req->size);
854
destroy_hvm_domain(false);
858
xen_wmb(); /* Update ioreq contents /then/ update state. */
861
* We do this before we send the response so that the tools
862
* have the opportunity to pick up on the reset before the
863
* guest resumes and does a hlt with interrupts disabled which
864
* causes Xen to powerdown the domain.
866
if (runstate_is_running()) {
867
if (qemu_shutdown_requested_get()) {
868
destroy_hvm_domain(false);
870
if (qemu_reset_requested_get()) {
871
qemu_system_reset(VMRESET_REPORT);
872
destroy_hvm_domain(true);
876
req->state = STATE_IORESP_READY;
877
xc_evtchn_notify(state->xce_handle, state->ioreq_local_port[state->send_vcpu]);
881
static int store_dev_info(int domid, CharDriverState *cs, const char *string)
883
struct xs_handle *xs = NULL;
885
char *newpath = NULL;
889
/* Only continue if we're talking to a pty. */
890
if (strncmp(cs->filename, "pty:", 4)) {
893
pts = cs->filename + 4;
895
/* We now have everything we need to set the xenstore entry. */
898
fprintf(stderr, "Could not contact XenStore\n");
902
path = xs_get_domain_path(xs, domid);
904
fprintf(stderr, "xs_get_domain_path() error\n");
907
newpath = realloc(path, (strlen(path) + strlen(string) +
908
strlen("/tty") + 1));
909
if (newpath == NULL) {
910
fprintf(stderr, "realloc error\n");
915
strcat(path, string);
916
strcat(path, "/tty");
917
if (!xs_write(xs, XBT_NULL, path, pts, strlen(pts))) {
918
fprintf(stderr, "xs_write for '%s' fail", string);
930
void xenstore_store_pv_console_info(int i, CharDriverState *chr)
933
store_dev_info(xen_domid, chr, "/console");
936
snprintf(buf, sizeof(buf), "/device/console/%d", i);
937
store_dev_info(xen_domid, chr, buf);
941
static void xenstore_record_dm_state(struct xs_handle *xs, const char *state)
946
fprintf(stderr, "xenstore connection not initialized\n");
950
snprintf(path, sizeof (path), "/local/domain/0/device-model/%u/state", xen_domid);
951
if (!xs_write(xs, XBT_NULL, path, state, strlen(state))) {
952
fprintf(stderr, "error recording dm state\n");
957
static void xen_main_loop_prepare(XenIOState *state)
961
if (state->xce_handle != XC_HANDLER_INITIAL_VALUE) {
962
evtchn_fd = xc_evtchn_fd(state->xce_handle);
965
state->buffered_io_timer = qemu_new_timer_ms(rt_clock, handle_buffered_io,
968
if (evtchn_fd != -1) {
969
qemu_set_fd_handler(evtchn_fd, cpu_handle_ioreq, NULL, state);
976
static void xen_change_state_handler(void *opaque, int running,
980
/* record state running */
981
xenstore_record_dm_state(xenstore, "running");
985
static void xen_hvm_change_state_handler(void *opaque, int running,
988
XenIOState *xstate = opaque;
990
xen_main_loop_prepare(xstate);
994
static void xen_exit_notifier(Notifier *n, void *data)
996
XenIOState *state = container_of(n, XenIOState, exit);
998
xc_evtchn_close(state->xce_handle);
999
xs_daemon_close(state->xenstore);
1004
xen_xc = xen_xc_interface_open(0, 0, 0);
1005
if (xen_xc == XC_HANDLER_INITIAL_VALUE) {
1006
xen_be_printf(NULL, 0, "can't open xen interface\n");
1009
qemu_add_vm_change_state_handler(xen_change_state_handler, NULL);
1014
static void xen_read_physmap(XenIOState *state)
1016
XenPhysmap *physmap = NULL;
1017
unsigned int len, num, i;
1018
char path[80], *value = NULL;
1019
char **entries = NULL;
1021
snprintf(path, sizeof(path),
1022
"/local/domain/0/device-model/%d/physmap", xen_domid);
1023
entries = xs_directory(state->xenstore, 0, path, &num);
1024
if (entries == NULL)
1027
for (i = 0; i < num; i++) {
1028
physmap = g_malloc(sizeof (XenPhysmap));
1029
physmap->phys_offset = strtoull(entries[i], NULL, 16);
1030
snprintf(path, sizeof(path),
1031
"/local/domain/0/device-model/%d/physmap/%s/start_addr",
1032
xen_domid, entries[i]);
1033
value = xs_read(state->xenstore, 0, path, &len);
1034
if (value == NULL) {
1038
physmap->start_addr = strtoull(value, NULL, 16);
1041
snprintf(path, sizeof(path),
1042
"/local/domain/0/device-model/%d/physmap/%s/size",
1043
xen_domid, entries[i]);
1044
value = xs_read(state->xenstore, 0, path, &len);
1045
if (value == NULL) {
1049
physmap->size = strtoull(value, NULL, 16);
1052
snprintf(path, sizeof(path),
1053
"/local/domain/0/device-model/%d/physmap/%s/name",
1054
xen_domid, entries[i]);
1055
physmap->name = xs_read(state->xenstore, 0, path, &len);
1057
QLIST_INSERT_HEAD(&state->physmap, physmap, list);
1062
int xen_hvm_init(void)
1065
unsigned long ioreq_pfn;
1066
unsigned long bufioreq_evtchn;
1069
state = g_malloc0(sizeof (XenIOState));
1071
state->xce_handle = xen_xc_evtchn_open(NULL, 0);
1072
if (state->xce_handle == XC_HANDLER_INITIAL_VALUE) {
1073
perror("xen: event channel open");
1078
state->xenstore = xs_daemon_open();
1079
if (state->xenstore == NULL) {
1080
perror("xen: xenstore open");
1085
state->exit.notify = xen_exit_notifier;
1086
qemu_add_exit_notifier(&state->exit);
1088
state->suspend.notify = xen_suspend_notifier;
1089
qemu_register_suspend_notifier(&state->suspend);
1091
xc_get_hvm_param(xen_xc, xen_domid, HVM_PARAM_IOREQ_PFN, &ioreq_pfn);
1092
DPRINTF("shared page at pfn %lx\n", ioreq_pfn);
1093
state->shared_page = xc_map_foreign_range(xen_xc, xen_domid, XC_PAGE_SIZE,
1094
PROT_READ|PROT_WRITE, ioreq_pfn);
1095
if (state->shared_page == NULL) {
1096
hw_error("map shared IO page returned error %d handle=" XC_INTERFACE_FMT,
1100
xc_get_hvm_param(xen_xc, xen_domid, HVM_PARAM_BUFIOREQ_PFN, &ioreq_pfn);
1101
DPRINTF("buffered io page at pfn %lx\n", ioreq_pfn);
1102
state->buffered_io_page = xc_map_foreign_range(xen_xc, xen_domid, XC_PAGE_SIZE,
1103
PROT_READ|PROT_WRITE, ioreq_pfn);
1104
if (state->buffered_io_page == NULL) {
1105
hw_error("map buffered IO page returned error %d", errno);
1108
state->ioreq_local_port = g_malloc0(smp_cpus * sizeof (evtchn_port_t));
1110
/* FIXME: how about if we overflow the page here? */
1111
for (i = 0; i < smp_cpus; i++) {
1112
rc = xc_evtchn_bind_interdomain(state->xce_handle, xen_domid,
1113
xen_vcpu_eport(state->shared_page, i));
1115
fprintf(stderr, "bind interdomain ioctl error %d\n", errno);
1118
state->ioreq_local_port[i] = rc;
1121
rc = xc_get_hvm_param(xen_xc, xen_domid, HVM_PARAM_BUFIOREQ_EVTCHN,
1124
fprintf(stderr, "failed to get HVM_PARAM_BUFIOREQ_EVTCHN\n");
1127
rc = xc_evtchn_bind_interdomain(state->xce_handle, xen_domid,
1128
(uint32_t)bufioreq_evtchn);
1130
fprintf(stderr, "bind interdomain ioctl error %d\n", errno);
1133
state->bufioreq_local_port = rc;
1135
/* Init RAM management */
1136
xen_map_cache_init(xen_phys_offset_to_gaddr, state);
1137
xen_ram_init(ram_size);
1139
qemu_add_vm_change_state_handler(xen_hvm_change_state_handler, state);
1141
state->memory_listener = xen_memory_listener;
1142
QLIST_INIT(&state->physmap);
1143
memory_listener_register(&state->memory_listener, &address_space_memory);
1144
state->log_for_dirtybit = NULL;
1146
/* Initialize backend core & drivers */
1147
if (xen_be_init() != 0) {
1148
fprintf(stderr, "%s: xen backend core setup failed\n", __FUNCTION__);
1151
xen_be_register("console", &xen_console_ops);
1152
xen_be_register("vkbd", &xen_kbdmouse_ops);
1153
xen_be_register("qdisk", &xen_blkdev_ops);
1154
xen_read_physmap(state);
1159
void destroy_hvm_domain(bool reboot)
1164
xc_handle = xen_xc_interface_open(0, 0, 0);
1165
if (xc_handle == XC_HANDLER_INITIAL_VALUE) {
1166
fprintf(stderr, "Cannot acquire xenctrl handle\n");
1168
sts = xc_domain_shutdown(xc_handle, xen_domid,
1169
reboot ? SHUTDOWN_reboot : SHUTDOWN_poweroff);
1171
fprintf(stderr, "xc_domain_shutdown failed to issue %s, "
1172
"sts %d, %s\n", reboot ? "reboot" : "poweroff",
1173
sts, strerror(errno));
1175
fprintf(stderr, "Issued domain %d %s\n", xen_domid,
1176
reboot ? "reboot" : "poweroff");
1178
xc_interface_close(xc_handle);
1182
void xen_register_framebuffer(MemoryRegion *mr)
1187
void xen_shutdown_fatal_error(const char *fmt, ...)
1192
vfprintf(stderr, fmt, ap);
1194
fprintf(stderr, "Will destroy the domain.\n");
1195
/* destroy the domain */
1196
qemu_system_shutdown_request();
1199
void xen_modified_memory(ram_addr_t start, ram_addr_t length)
1201
if (unlikely(xen_in_migration)) {
1203
ram_addr_t start_pfn, nb_pages;
1206
length = TARGET_PAGE_SIZE;
1208
start_pfn = start >> TARGET_PAGE_BITS;
1209
nb_pages = ((start + length + TARGET_PAGE_SIZE - 1) >> TARGET_PAGE_BITS)
1211
rc = xc_hvm_modified_memory(xen_xc, xen_domid, start_pfn, nb_pages);
1214
"%s failed for "RAM_ADDR_FMT" ("RAM_ADDR_FMT"): %i, %s\n",
1215
__func__, start, nb_pages, rc, strerror(-rc));