1 /*
2 * Copyright (C) 2010 Citrix Ltd.
3 *
4 * This work is licensed under the terms of the GNU GPL, version 2. See
5 * the COPYING file in the top-level directory.
6 *
7 * Contributions after 2012-01-13 are licensed under the terms of the
8 * GNU GPL, version 2 or (at your option) any later version.
9 */
10
11 #include "qemu/osdep.h"
12 #include "qemu/units.h"
13 #include "qapi/error.h"
14 #include "qapi/qapi-commands-migration.h"
15 #include "trace.h"
16
17 #include "hw/i386/pc.h"
18 #include "hw/irq.h"
19 #include "hw/i386/apic-msidef.h"
20 #include "hw/xen/xen-x86.h"
21 #include "qemu/range.h"
22
23 #include "hw/xen/xen-hvm-common.h"
24 #include "hw/xen/arch_hvm.h"
25 #include <xen/hvm/e820.h>
26 #include "exec/target_page.h"
27
28 static MemoryRegion ram_640k, ram_lo, ram_hi;
29 static MemoryRegion *framebuffer;
30 static bool xen_in_migration;
31
32 /* Compatibility with older version */
33
34 /*
35 * This allows QEMU to build on a system that has Xen 4.5 or earlier installed.
36 * This is here (not in hw/xen/xen_native.h) because xen/hvm/ioreq.h needs to
37 * be included before this block and hw/xen/xen_native.h needs to be included
38 * before xen/hvm/ioreq.h
39 */
40 #ifndef IOREQ_TYPE_VMWARE_PORT
41 #define IOREQ_TYPE_VMWARE_PORT 3
42 struct vmware_regs {
43 uint32_t esi;
44 uint32_t edi;
45 uint32_t ebx;
46 uint32_t ecx;
47 uint32_t edx;
48 };
49 typedef struct vmware_regs vmware_regs_t;
50
51 struct shared_vmport_iopage {
52 struct vmware_regs vcpu_vmport_regs[1];
53 };
54 typedef struct shared_vmport_iopage shared_vmport_iopage_t;
55 #endif
56
57 static shared_vmport_iopage_t *shared_vmport_page;
58
59 static QLIST_HEAD(, XenPhysmap) xen_physmap;
60 static const XenPhysmap *log_for_dirtybit;
61 /* Buffer used by xen_sync_dirty_bitmap */
62 static unsigned long *dirty_bitmap;
63 static Notifier suspend;
64 static Notifier wakeup;
65
66 /* Xen specific function for piix pci */
67
xen_pci_slot_get_pirq(PCIDevice * pci_dev,int irq_num)68 int xen_pci_slot_get_pirq(PCIDevice *pci_dev, int irq_num)
69 {
70 return irq_num + (PCI_SLOT(pci_dev->devfn) << 2);
71 }
72
xen_intx_set_irq(void * opaque,int irq_num,int level)73 void xen_intx_set_irq(void *opaque, int irq_num, int level)
74 {
75 xen_set_pci_intx_level(xen_domid, 0, 0, irq_num >> 2,
76 irq_num & 3, level);
77 }
78
xen_set_pci_link_route(uint8_t link,uint8_t irq)79 int xen_set_pci_link_route(uint8_t link, uint8_t irq)
80 {
81 return xendevicemodel_set_pci_link_route(xen_dmod, xen_domid, link, irq);
82 }
83
xen_is_pirq_msi(uint32_t msi_data)84 int xen_is_pirq_msi(uint32_t msi_data)
85 {
86 /* If vector is 0, the msi is remapped into a pirq, passed as
87 * dest_id.
88 */
89 return ((msi_data & MSI_DATA_VECTOR_MASK) >> MSI_DATA_VECTOR_SHIFT) == 0;
90 }
91
xen_hvm_inject_msi(uint64_t addr,uint32_t data)92 void xen_hvm_inject_msi(uint64_t addr, uint32_t data)
93 {
94 xen_inject_msi(xen_domid, addr, data);
95 }
96
xen_suspend_notifier(Notifier * notifier,void * data)97 static void xen_suspend_notifier(Notifier *notifier, void *data)
98 {
99 xc_set_hvm_param(xen_xc, xen_domid, HVM_PARAM_ACPI_S_STATE, 3);
100 }
101
102 /* Xen Interrupt Controller */
103
xen_set_irq(void * opaque,int irq,int level)104 static void xen_set_irq(void *opaque, int irq, int level)
105 {
106 xen_set_isa_irq_level(xen_domid, irq, level);
107 }
108
xen_interrupt_controller_init(void)109 qemu_irq *xen_interrupt_controller_init(void)
110 {
111 return qemu_allocate_irqs(xen_set_irq, NULL, 16);
112 }
113
114 /* Memory Ops */
115
xen_ram_init(PCMachineState * pcms,ram_addr_t ram_size,MemoryRegion ** ram_memory_p)116 static void xen_ram_init(PCMachineState *pcms,
117 ram_addr_t ram_size, MemoryRegion **ram_memory_p)
118 {
119 X86MachineState *x86ms = X86_MACHINE(pcms);
120 MemoryRegion *sysmem = get_system_memory();
121 ram_addr_t block_len;
122 uint64_t user_lowmem =
123 object_property_get_uint(qdev_get_machine(),
124 PC_MACHINE_MAX_RAM_BELOW_4G,
125 &error_abort);
126
127 /* Handle the machine opt max-ram-below-4g. It is basically doing
128 * min(xen limit, user limit).
129 */
130 if (!user_lowmem) {
131 user_lowmem = HVM_BELOW_4G_RAM_END; /* default */
132 }
133 if (HVM_BELOW_4G_RAM_END <= user_lowmem) {
134 user_lowmem = HVM_BELOW_4G_RAM_END;
135 }
136
137 if (ram_size >= user_lowmem) {
138 x86ms->above_4g_mem_size = ram_size - user_lowmem;
139 x86ms->below_4g_mem_size = user_lowmem;
140 } else {
141 x86ms->above_4g_mem_size = 0;
142 x86ms->below_4g_mem_size = ram_size;
143 }
144 if (!x86ms->above_4g_mem_size) {
145 block_len = ram_size;
146 } else {
147 /*
148 * Xen does not allocate the memory continuously, it keeps a
149 * hole of the size computed above or passed in.
150 */
151 block_len = (4 * GiB) + x86ms->above_4g_mem_size;
152 }
153 memory_region_init_ram(&xen_memory, NULL, "xen.ram", block_len,
154 &error_fatal);
155 *ram_memory_p = &xen_memory;
156
157 memory_region_init_alias(&ram_640k, NULL, "xen.ram.640k",
158 &xen_memory, 0, 0xa0000);
159 memory_region_add_subregion(sysmem, 0, &ram_640k);
160 /* Skip of the VGA IO memory space, it will be registered later by the VGA
161 * emulated device.
162 *
163 * The area between 0xc0000 and 0x100000 will be used by SeaBIOS to load
164 * the Options ROM, so it is registered here as RAM.
165 */
166 memory_region_init_alias(&ram_lo, NULL, "xen.ram.lo",
167 &xen_memory, 0xc0000,
168 x86ms->below_4g_mem_size - 0xc0000);
169 memory_region_add_subregion(sysmem, 0xc0000, &ram_lo);
170 if (x86ms->above_4g_mem_size > 0) {
171 memory_region_init_alias(&ram_hi, NULL, "xen.ram.hi",
172 &xen_memory, 0x100000000ULL,
173 x86ms->above_4g_mem_size);
174 memory_region_add_subregion(sysmem, 0x100000000ULL, &ram_hi);
175 }
176 }
177
get_physmapping(hwaddr start_addr,ram_addr_t size,int page_mask)178 static XenPhysmap *get_physmapping(hwaddr start_addr, ram_addr_t size,
179 int page_mask)
180 {
181 XenPhysmap *physmap = NULL;
182
183 start_addr &= page_mask;
184
185 QLIST_FOREACH(physmap, &xen_physmap, list) {
186 if (range_covers_byte(physmap->start_addr, physmap->size, start_addr)) {
187 return physmap;
188 }
189 }
190 return NULL;
191 }
192
xen_phys_offset_to_gaddr(hwaddr phys_offset,ram_addr_t size,int page_mask)193 static hwaddr xen_phys_offset_to_gaddr(hwaddr phys_offset, ram_addr_t size,
194 int page_mask)
195 {
196 hwaddr addr = phys_offset & page_mask;
197 XenPhysmap *physmap = NULL;
198
199 QLIST_FOREACH(physmap, &xen_physmap, list) {
200 if (range_covers_byte(physmap->phys_offset, physmap->size, addr)) {
201 return physmap->start_addr + (phys_offset - physmap->phys_offset);
202 }
203 }
204
205 return phys_offset;
206 }
207
208 #ifdef XEN_COMPAT_PHYSMAP
xen_save_physmap(XenIOState * state,XenPhysmap * physmap)209 static int xen_save_physmap(XenIOState *state, XenPhysmap *physmap)
210 {
211 char path[80], value[17];
212
213 snprintf(path, sizeof(path),
214 "/local/domain/0/device-model/%d/physmap/%"PRIx64"/start_addr",
215 xen_domid, (uint64_t)physmap->phys_offset);
216 snprintf(value, sizeof(value), "%"PRIx64, (uint64_t)physmap->start_addr);
217 if (!xs_write(state->xenstore, 0, path, value, strlen(value))) {
218 return -1;
219 }
220 snprintf(path, sizeof(path),
221 "/local/domain/0/device-model/%d/physmap/%"PRIx64"/size",
222 xen_domid, (uint64_t)physmap->phys_offset);
223 snprintf(value, sizeof(value), "%"PRIx64, (uint64_t)physmap->size);
224 if (!xs_write(state->xenstore, 0, path, value, strlen(value))) {
225 return -1;
226 }
227 if (physmap->name) {
228 snprintf(path, sizeof(path),
229 "/local/domain/0/device-model/%d/physmap/%"PRIx64"/name",
230 xen_domid, (uint64_t)physmap->phys_offset);
231 if (!xs_write(state->xenstore, 0, path,
232 physmap->name, strlen(physmap->name))) {
233 return -1;
234 }
235 }
236 return 0;
237 }
238 #else
xen_save_physmap(XenIOState * state,XenPhysmap * physmap)239 static int xen_save_physmap(XenIOState *state, XenPhysmap *physmap)
240 {
241 return 0;
242 }
243 #endif
244
xen_add_to_physmap(XenIOState * state,hwaddr start_addr,ram_addr_t size,MemoryRegion * mr,hwaddr offset_within_region)245 static int xen_add_to_physmap(XenIOState *state,
246 hwaddr start_addr,
247 ram_addr_t size,
248 MemoryRegion *mr,
249 hwaddr offset_within_region)
250 {
251 unsigned target_page_bits = qemu_target_page_bits();
252 int page_size = qemu_target_page_size();
253 int page_mask = -page_size;
254 unsigned long nr_pages;
255 int rc = 0;
256 XenPhysmap *physmap = NULL;
257 hwaddr pfn, start_gpfn;
258 hwaddr phys_offset = memory_region_get_ram_addr(mr);
259 const char *mr_name;
260
261 if (get_physmapping(start_addr, size, page_mask)) {
262 return 0;
263 }
264 if (size <= 0) {
265 return -1;
266 }
267
268 /* Xen can only handle a single dirty log region for now and we want
269 * the linear framebuffer to be that region.
270 * Avoid tracking any regions that is not videoram and avoid tracking
271 * the legacy vga region. */
272 if (mr == framebuffer && start_addr > 0xbffff) {
273 goto go_physmap;
274 }
275 return -1;
276
277 go_physmap:
278 DPRINTF("mapping vram to %"HWADDR_PRIx" - %"HWADDR_PRIx"\n",
279 start_addr, start_addr + size);
280
281 mr_name = memory_region_name(mr);
282
283 physmap = g_new(XenPhysmap, 1);
284
285 physmap->start_addr = start_addr;
286 physmap->size = size;
287 physmap->name = mr_name;
288 physmap->phys_offset = phys_offset;
289
290 QLIST_INSERT_HEAD(&xen_physmap, physmap, list);
291
292 if (runstate_check(RUN_STATE_INMIGRATE)) {
293 /* Now when we have a physmap entry we can replace a dummy mapping with
294 * a real one of guest foreign memory. */
295 uint8_t *p = xen_replace_cache_entry(phys_offset, start_addr, size);
296 assert(p && p == memory_region_get_ram_ptr(mr));
297
298 return 0;
299 }
300
301 pfn = phys_offset >> target_page_bits;
302 start_gpfn = start_addr >> target_page_bits;
303 nr_pages = size >> target_page_bits;
304 rc = xendevicemodel_relocate_memory(xen_dmod, xen_domid, nr_pages, pfn,
305 start_gpfn);
306 if (rc) {
307 int saved_errno = errno;
308
309 error_report("relocate_memory %lu pages from GFN %"HWADDR_PRIx
310 " to GFN %"HWADDR_PRIx" failed: %s",
311 nr_pages, pfn, start_gpfn, strerror(saved_errno));
312 errno = saved_errno;
313 return -1;
314 }
315
316 rc = xendevicemodel_pin_memory_cacheattr(xen_dmod, xen_domid,
317 start_addr >> target_page_bits,
318 (start_addr + size - 1) >> target_page_bits,
319 XEN_DOMCTL_MEM_CACHEATTR_WB);
320 if (rc) {
321 error_report("pin_memory_cacheattr failed: %s", strerror(errno));
322 }
323 return xen_save_physmap(state, physmap);
324 }
325
xen_remove_from_physmap(XenIOState * state,hwaddr start_addr,ram_addr_t size)326 static int xen_remove_from_physmap(XenIOState *state,
327 hwaddr start_addr,
328 ram_addr_t size)
329 {
330 unsigned target_page_bits = qemu_target_page_bits();
331 int page_size = qemu_target_page_size();
332 int page_mask = -page_size;
333 int rc = 0;
334 XenPhysmap *physmap = NULL;
335 hwaddr phys_offset = 0;
336
337 physmap = get_physmapping(start_addr, size, page_mask);
338 if (physmap == NULL) {
339 return -1;
340 }
341
342 phys_offset = physmap->phys_offset;
343 size = physmap->size;
344
345 DPRINTF("unmapping vram to %"HWADDR_PRIx" - %"HWADDR_PRIx", at "
346 "%"HWADDR_PRIx"\n", start_addr, start_addr + size, phys_offset);
347
348 size >>= target_page_bits;
349 start_addr >>= target_page_bits;
350 phys_offset >>= target_page_bits;
351 rc = xendevicemodel_relocate_memory(xen_dmod, xen_domid, size, start_addr,
352 phys_offset);
353 if (rc) {
354 int saved_errno = errno;
355
356 error_report("relocate_memory "RAM_ADDR_FMT" pages"
357 " from GFN %"HWADDR_PRIx
358 " to GFN %"HWADDR_PRIx" failed: %s",
359 size, start_addr, phys_offset, strerror(saved_errno));
360 errno = saved_errno;
361 return -1;
362 }
363
364 QLIST_REMOVE(physmap, list);
365 if (log_for_dirtybit == physmap) {
366 log_for_dirtybit = NULL;
367 g_free(dirty_bitmap);
368 dirty_bitmap = NULL;
369 }
370 g_free(physmap);
371
372 return 0;
373 }
374
xen_sync_dirty_bitmap(XenIOState * state,hwaddr start_addr,ram_addr_t size)375 static void xen_sync_dirty_bitmap(XenIOState *state,
376 hwaddr start_addr,
377 ram_addr_t size)
378 {
379 unsigned target_page_bits = qemu_target_page_bits();
380 int page_size = qemu_target_page_size();
381 int page_mask = -page_size;
382 hwaddr npages = size >> target_page_bits;
383 const int width = sizeof(unsigned long) * 8;
384 size_t bitmap_size = DIV_ROUND_UP(npages, width);
385 int rc, i, j;
386 const XenPhysmap *physmap = NULL;
387
388 physmap = get_physmapping(start_addr, size, page_mask);
389 if (physmap == NULL) {
390 /* not handled */
391 return;
392 }
393
394 if (log_for_dirtybit == NULL) {
395 log_for_dirtybit = physmap;
396 dirty_bitmap = g_new(unsigned long, bitmap_size);
397 } else if (log_for_dirtybit != physmap) {
398 /* Only one range for dirty bitmap can be tracked. */
399 return;
400 }
401
402 rc = xen_track_dirty_vram(xen_domid, start_addr >> target_page_bits,
403 npages, dirty_bitmap);
404 if (rc < 0) {
405 #ifndef ENODATA
406 #define ENODATA ENOENT
407 #endif
408 if (errno == ENODATA) {
409 memory_region_set_dirty(framebuffer, 0, size);
410 DPRINTF("xen: track_dirty_vram failed (0x" HWADDR_FMT_plx
411 ", 0x" HWADDR_FMT_plx "): %s\n",
412 start_addr, start_addr + size, strerror(errno));
413 }
414 return;
415 }
416
417 for (i = 0; i < bitmap_size; i++) {
418 unsigned long map = dirty_bitmap[i];
419 while (map != 0) {
420 j = ctzl(map);
421 map &= ~(1ul << j);
422 memory_region_set_dirty(framebuffer,
423 (i * width + j) * page_size, page_size);
424 };
425 }
426 }
427
xen_log_start(MemoryListener * listener,MemoryRegionSection * section,int old,int new)428 static void xen_log_start(MemoryListener *listener,
429 MemoryRegionSection *section,
430 int old, int new)
431 {
432 XenIOState *state = container_of(listener, XenIOState, memory_listener);
433
434 if (new & ~old & (1 << DIRTY_MEMORY_VGA)) {
435 xen_sync_dirty_bitmap(state, section->offset_within_address_space,
436 int128_get64(section->size));
437 }
438 }
439
xen_log_stop(MemoryListener * listener,MemoryRegionSection * section,int old,int new)440 static void xen_log_stop(MemoryListener *listener, MemoryRegionSection *section,
441 int old, int new)
442 {
443 if (old & ~new & (1 << DIRTY_MEMORY_VGA)) {
444 log_for_dirtybit = NULL;
445 g_free(dirty_bitmap);
446 dirty_bitmap = NULL;
447 /* Disable dirty bit tracking */
448 xen_track_dirty_vram(xen_domid, 0, 0, NULL);
449 }
450 }
451
xen_log_sync(MemoryListener * listener,MemoryRegionSection * section)452 static void xen_log_sync(MemoryListener *listener, MemoryRegionSection *section)
453 {
454 XenIOState *state = container_of(listener, XenIOState, memory_listener);
455
456 xen_sync_dirty_bitmap(state, section->offset_within_address_space,
457 int128_get64(section->size));
458 }
459
xen_log_global_start(MemoryListener * listener,Error ** errp)460 static bool xen_log_global_start(MemoryListener *listener, Error **errp)
461 {
462 if (xen_enabled()) {
463 xen_in_migration = true;
464 }
465 return true;
466 }
467
xen_log_global_stop(MemoryListener * listener)468 static void xen_log_global_stop(MemoryListener *listener)
469 {
470 xen_in_migration = false;
471 }
472
473 static const MemoryListener xen_memory_listener = {
474 .name = "xen-memory",
475 .region_add = xen_region_add,
476 .region_del = xen_region_del,
477 .log_start = xen_log_start,
478 .log_stop = xen_log_stop,
479 .log_sync = xen_log_sync,
480 .log_global_start = xen_log_global_start,
481 .log_global_stop = xen_log_global_stop,
482 .priority = MEMORY_LISTENER_PRIORITY_ACCEL,
483 };
484
regs_to_cpu(vmware_regs_t * vmport_regs,ioreq_t * req)485 static void regs_to_cpu(vmware_regs_t *vmport_regs, ioreq_t *req)
486 {
487 X86CPU *cpu;
488 CPUX86State *env;
489
490 cpu = X86_CPU(current_cpu);
491 env = &cpu->env;
492 env->regs[R_EAX] = req->data;
493 env->regs[R_EBX] = vmport_regs->ebx;
494 env->regs[R_ECX] = vmport_regs->ecx;
495 env->regs[R_EDX] = vmport_regs->edx;
496 env->regs[R_ESI] = vmport_regs->esi;
497 env->regs[R_EDI] = vmport_regs->edi;
498 }
499
regs_from_cpu(vmware_regs_t * vmport_regs)500 static void regs_from_cpu(vmware_regs_t *vmport_regs)
501 {
502 X86CPU *cpu = X86_CPU(current_cpu);
503 CPUX86State *env = &cpu->env;
504
505 vmport_regs->ebx = env->regs[R_EBX];
506 vmport_regs->ecx = env->regs[R_ECX];
507 vmport_regs->edx = env->regs[R_EDX];
508 vmport_regs->esi = env->regs[R_ESI];
509 vmport_regs->edi = env->regs[R_EDI];
510 }
511
handle_vmport_ioreq(XenIOState * state,ioreq_t * req)512 static void handle_vmport_ioreq(XenIOState *state, ioreq_t *req)
513 {
514 vmware_regs_t *vmport_regs;
515
516 assert(shared_vmport_page);
517 vmport_regs =
518 &shared_vmport_page->vcpu_vmport_regs[state->send_vcpu];
519 QEMU_BUILD_BUG_ON(sizeof(*req) < sizeof(*vmport_regs));
520
521 current_cpu = state->cpu_by_vcpu_id[state->send_vcpu];
522 regs_to_cpu(vmport_regs, req);
523 cpu_ioreq_pio(req);
524 regs_from_cpu(vmport_regs);
525 current_cpu = NULL;
526 }
527
528 #ifdef XEN_COMPAT_PHYSMAP
xen_read_physmap(XenIOState * state)529 static void xen_read_physmap(XenIOState *state)
530 {
531 XenPhysmap *physmap = NULL;
532 unsigned int len, num, i;
533 char path[80], *value = NULL;
534 char **entries = NULL;
535
536 snprintf(path, sizeof(path),
537 "/local/domain/0/device-model/%d/physmap", xen_domid);
538 entries = xs_directory(state->xenstore, 0, path, &num);
539 if (entries == NULL)
540 return;
541
542 for (i = 0; i < num; i++) {
543 physmap = g_new(XenPhysmap, 1);
544 physmap->phys_offset = strtoull(entries[i], NULL, 16);
545 snprintf(path, sizeof(path),
546 "/local/domain/0/device-model/%d/physmap/%s/start_addr",
547 xen_domid, entries[i]);
548 value = xs_read(state->xenstore, 0, path, &len);
549 if (value == NULL) {
550 g_free(physmap);
551 continue;
552 }
553 physmap->start_addr = strtoull(value, NULL, 16);
554 free(value);
555
556 snprintf(path, sizeof(path),
557 "/local/domain/0/device-model/%d/physmap/%s/size",
558 xen_domid, entries[i]);
559 value = xs_read(state->xenstore, 0, path, &len);
560 if (value == NULL) {
561 g_free(physmap);
562 continue;
563 }
564 physmap->size = strtoull(value, NULL, 16);
565 free(value);
566
567 snprintf(path, sizeof(path),
568 "/local/domain/0/device-model/%d/physmap/%s/name",
569 xen_domid, entries[i]);
570 physmap->name = xs_read(state->xenstore, 0, path, &len);
571
572 QLIST_INSERT_HEAD(&xen_physmap, physmap, list);
573 }
574 free(entries);
575 }
576 #else
xen_read_physmap(XenIOState * state)577 static void xen_read_physmap(XenIOState *state)
578 {
579 }
580 #endif
581
xen_wakeup_notifier(Notifier * notifier,void * data)582 static void xen_wakeup_notifier(Notifier *notifier, void *data)
583 {
584 xc_set_hvm_param(xen_xc, xen_domid, HVM_PARAM_ACPI_S_STATE, 0);
585 }
586
xen_check_stubdomain(struct xs_handle * xsh)587 static bool xen_check_stubdomain(struct xs_handle *xsh)
588 {
589 char *dm_path = g_strdup_printf(
590 "/local/domain/%d/image/device-model-domid", xen_domid);
591 char *val;
592 int32_t dm_domid;
593 bool is_stubdom = false;
594
595 val = xs_read(xsh, 0, dm_path, NULL);
596 if (val) {
597 if (sscanf(val, "%d", &dm_domid) == 1) {
598 is_stubdom = dm_domid != 0;
599 }
600 free(val);
601 }
602
603 g_free(dm_path);
604 return is_stubdom;
605 }
606
xen_hvm_init_pc(PCMachineState * pcms,MemoryRegion ** ram_memory)607 void xen_hvm_init_pc(PCMachineState *pcms, MemoryRegion **ram_memory)
608 {
609 MachineState *ms = MACHINE(pcms);
610 unsigned int max_cpus = ms->smp.max_cpus;
611 int rc;
612 xen_pfn_t ioreq_pfn;
613 XenIOState *state;
614
615 state = g_new0(XenIOState, 1);
616
617 xen_register_ioreq(state, max_cpus, &xen_memory_listener);
618
619 xen_is_stubdomain = xen_check_stubdomain(state->xenstore);
620
621 QLIST_INIT(&xen_physmap);
622 xen_read_physmap(state);
623
624 suspend.notify = xen_suspend_notifier;
625 qemu_register_suspend_notifier(&suspend);
626
627 wakeup.notify = xen_wakeup_notifier;
628 qemu_register_wakeup_notifier(&wakeup);
629
630 rc = xen_get_vmport_regs_pfn(xen_xc, xen_domid, &ioreq_pfn);
631 if (!rc) {
632 DPRINTF("shared vmport page at pfn %lx\n", ioreq_pfn);
633 shared_vmport_page =
634 xenforeignmemory_map(xen_fmem, xen_domid, PROT_READ|PROT_WRITE,
635 1, &ioreq_pfn, NULL);
636 if (shared_vmport_page == NULL) {
637 error_report("map shared vmport IO page returned error %d handle=%p",
638 errno, xen_xc);
639 goto err;
640 }
641 } else if (rc != -ENOSYS) {
642 error_report("get vmport regs pfn returned error %d, rc=%d",
643 errno, rc);
644 goto err;
645 }
646
647 xen_ram_init(pcms, ms->ram_size, ram_memory);
648
649 /* Disable ACPI build because Xen handles it */
650 pcms->acpi_build_enabled = false;
651
652 return;
653
654 err:
655 error_report("xen hardware virtual machine initialisation failed");
656 exit(1);
657 }
658
xen_register_framebuffer(MemoryRegion * mr)659 void xen_register_framebuffer(MemoryRegion *mr)
660 {
661 framebuffer = mr;
662 }
663
xen_hvm_modified_memory(ram_addr_t start,ram_addr_t length)664 void xen_hvm_modified_memory(ram_addr_t start, ram_addr_t length)
665 {
666 unsigned target_page_bits = qemu_target_page_bits();
667 int page_size = qemu_target_page_size();
668 int page_mask = -page_size;
669
670 if (unlikely(xen_in_migration)) {
671 int rc;
672 ram_addr_t start_pfn, nb_pages;
673
674 start = xen_phys_offset_to_gaddr(start, length, page_mask);
675
676 if (length == 0) {
677 length = page_size;
678 }
679 start_pfn = start >> target_page_bits;
680 nb_pages = ((start + length + page_size - 1) >> target_page_bits)
681 - start_pfn;
682 rc = xen_modified_memory(xen_domid, start_pfn, nb_pages);
683 if (rc) {
684 fprintf(stderr,
685 "%s failed for "RAM_ADDR_FMT" ("RAM_ADDR_FMT"): %i, %s\n",
686 __func__, start, nb_pages, errno, strerror(errno));
687 }
688 }
689 }
690
qmp_xen_set_global_dirty_log(bool enable,Error ** errp)691 void qmp_xen_set_global_dirty_log(bool enable, Error **errp)
692 {
693 if (enable) {
694 memory_global_dirty_log_start(GLOBAL_DIRTY_MIGRATION, errp);
695 } else {
696 memory_global_dirty_log_stop(GLOBAL_DIRTY_MIGRATION);
697 }
698 }
699
arch_xen_set_memory(XenIOState * state,MemoryRegionSection * section,bool add)700 void arch_xen_set_memory(XenIOState *state, MemoryRegionSection *section,
701 bool add)
702 {
703 unsigned target_page_bits = qemu_target_page_bits();
704 int page_size = qemu_target_page_size();
705 int page_mask = -page_size;
706 hwaddr start_addr = section->offset_within_address_space;
707 ram_addr_t size = int128_get64(section->size);
708 bool log_dirty = memory_region_is_logging(section->mr, DIRTY_MEMORY_VGA);
709 hvmmem_type_t mem_type;
710
711 if (!memory_region_is_ram(section->mr)) {
712 return;
713 }
714
715 if (log_dirty != add) {
716 return;
717 }
718
719 trace_xen_client_set_memory(start_addr, size, log_dirty);
720
721 start_addr &= page_mask;
722 size = ROUND_UP(size, page_size);
723
724 if (add) {
725 if (!memory_region_is_rom(section->mr)) {
726 xen_add_to_physmap(state, start_addr, size,
727 section->mr, section->offset_within_region);
728 } else {
729 mem_type = HVMMEM_ram_ro;
730 if (xen_set_mem_type(xen_domid, mem_type,
731 start_addr >> target_page_bits,
732 size >> target_page_bits)) {
733 DPRINTF("xen_set_mem_type error, addr: "HWADDR_FMT_plx"\n",
734 start_addr);
735 }
736 }
737 } else {
738 if (xen_remove_from_physmap(state, start_addr, size) < 0) {
739 DPRINTF("physmapping does not exist at "HWADDR_FMT_plx"\n", start_addr);
740 }
741 }
742 }
743
arch_handle_ioreq(XenIOState * state,ioreq_t * req)744 void arch_handle_ioreq(XenIOState *state, ioreq_t *req)
745 {
746 switch (req->type) {
747 case IOREQ_TYPE_VMWARE_PORT:
748 handle_vmport_ioreq(state, req);
749 break;
750 default:
751 hw_error("Invalid ioreq type 0x%x\n", req->type);
752 }
753
754 return;
755 }
756