xref: /openbmc/qemu/hw/i386/xen/xen-hvm.c (revision 6fdc5bc1)
1 /*
2  * Copyright (C) 2010       Citrix Ltd.
3  *
4  * This work is licensed under the terms of the GNU GPL, version 2.  See
5  * the COPYING file in the top-level directory.
6  *
7  * Contributions after 2012-01-13 are licensed under the terms of the
8  * GNU GPL, version 2 or (at your option) any later version.
9  */
10 
11 #include "qemu/osdep.h"
12 #include "qemu/units.h"
13 #include "qapi/error.h"
14 #include "qapi/qapi-commands-migration.h"
15 #include "trace.h"
16 
17 #include "hw/i386/pc.h"
18 #include "hw/irq.h"
19 #include "hw/i386/apic-msidef.h"
20 #include "hw/xen/xen-x86.h"
21 #include "qemu/range.h"
22 
23 #include "hw/xen/xen-hvm-common.h"
24 #include "hw/xen/arch_hvm.h"
25 #include <xen/hvm/e820.h>
26 #include "exec/target_page.h"
27 
28 static MemoryRegion ram_640k, ram_lo, ram_hi;
29 static MemoryRegion *framebuffer;
30 static bool xen_in_migration;
31 
32 /* Compatibility with older version */
33 
34 /*
35  * This allows QEMU to build on a system that has Xen 4.5 or earlier installed.
36  * This is here (not in hw/xen/xen_native.h) because xen/hvm/ioreq.h needs to
37  * be included before this block and hw/xen/xen_native.h needs to be included
38  * before xen/hvm/ioreq.h
39  */
40 #ifndef IOREQ_TYPE_VMWARE_PORT
41 #define IOREQ_TYPE_VMWARE_PORT  3
42 struct vmware_regs {
43     uint32_t esi;
44     uint32_t edi;
45     uint32_t ebx;
46     uint32_t ecx;
47     uint32_t edx;
48 };
49 typedef struct vmware_regs vmware_regs_t;
50 
51 struct shared_vmport_iopage {
52     struct vmware_regs vcpu_vmport_regs[1];
53 };
54 typedef struct shared_vmport_iopage shared_vmport_iopage_t;
55 #endif
56 
57 static shared_vmport_iopage_t *shared_vmport_page;
58 
59 static QLIST_HEAD(, XenPhysmap) xen_physmap;
60 static const XenPhysmap *log_for_dirtybit;
61 /* Buffer used by xen_sync_dirty_bitmap */
62 static unsigned long *dirty_bitmap;
63 static Notifier suspend;
64 static Notifier wakeup;
65 
66 /* Xen specific function for piix pci */
67 
68 int xen_pci_slot_get_pirq(PCIDevice *pci_dev, int irq_num)
69 {
70     return irq_num + (PCI_SLOT(pci_dev->devfn) << 2);
71 }
72 
73 void xen_intx_set_irq(void *opaque, int irq_num, int level)
74 {
75     xen_set_pci_intx_level(xen_domid, 0, 0, irq_num >> 2,
76                            irq_num & 3, level);
77 }
78 
79 int xen_set_pci_link_route(uint8_t link, uint8_t irq)
80 {
81     return xendevicemodel_set_pci_link_route(xen_dmod, xen_domid, link, irq);
82 }
83 
84 int xen_is_pirq_msi(uint32_t msi_data)
85 {
86     /* If vector is 0, the msi is remapped into a pirq, passed as
87      * dest_id.
88      */
89     return ((msi_data & MSI_DATA_VECTOR_MASK) >> MSI_DATA_VECTOR_SHIFT) == 0;
90 }
91 
92 void xen_hvm_inject_msi(uint64_t addr, uint32_t data)
93 {
94     xen_inject_msi(xen_domid, addr, data);
95 }
96 
97 static void xen_suspend_notifier(Notifier *notifier, void *data)
98 {
99     xc_set_hvm_param(xen_xc, xen_domid, HVM_PARAM_ACPI_S_STATE, 3);
100 }
101 
102 /* Xen Interrupt Controller */
103 
104 static void xen_set_irq(void *opaque, int irq, int level)
105 {
106     xen_set_isa_irq_level(xen_domid, irq, level);
107 }
108 
109 qemu_irq *xen_interrupt_controller_init(void)
110 {
111     return qemu_allocate_irqs(xen_set_irq, NULL, 16);
112 }
113 
114 /* Memory Ops */
115 
116 static void xen_ram_init(PCMachineState *pcms,
117                          ram_addr_t ram_size, MemoryRegion **ram_memory_p)
118 {
119     X86MachineState *x86ms = X86_MACHINE(pcms);
120     MemoryRegion *sysmem = get_system_memory();
121     ram_addr_t block_len;
122     uint64_t user_lowmem =
123         object_property_get_uint(qdev_get_machine(),
124                                  PC_MACHINE_MAX_RAM_BELOW_4G,
125                                  &error_abort);
126 
127     /* Handle the machine opt max-ram-below-4g.  It is basically doing
128      * min(xen limit, user limit).
129      */
130     if (!user_lowmem) {
131         user_lowmem = HVM_BELOW_4G_RAM_END; /* default */
132     }
133     if (HVM_BELOW_4G_RAM_END <= user_lowmem) {
134         user_lowmem = HVM_BELOW_4G_RAM_END;
135     }
136 
137     if (ram_size >= user_lowmem) {
138         x86ms->above_4g_mem_size = ram_size - user_lowmem;
139         x86ms->below_4g_mem_size = user_lowmem;
140     } else {
141         x86ms->above_4g_mem_size = 0;
142         x86ms->below_4g_mem_size = ram_size;
143     }
144     if (!x86ms->above_4g_mem_size) {
145         block_len = ram_size;
146     } else {
147         /*
148          * Xen does not allocate the memory continuously, it keeps a
149          * hole of the size computed above or passed in.
150          */
151         block_len = (4 * GiB) + x86ms->above_4g_mem_size;
152     }
153     memory_region_init_ram(&xen_memory, NULL, "xen.ram", block_len,
154                            &error_fatal);
155     *ram_memory_p = &xen_memory;
156 
157     memory_region_init_alias(&ram_640k, NULL, "xen.ram.640k",
158                              &xen_memory, 0, 0xa0000);
159     memory_region_add_subregion(sysmem, 0, &ram_640k);
160     /* Skip of the VGA IO memory space, it will be registered later by the VGA
161      * emulated device.
162      *
163      * The area between 0xc0000 and 0x100000 will be used by SeaBIOS to load
164      * the Options ROM, so it is registered here as RAM.
165      */
166     memory_region_init_alias(&ram_lo, NULL, "xen.ram.lo",
167                              &xen_memory, 0xc0000,
168                              x86ms->below_4g_mem_size - 0xc0000);
169     memory_region_add_subregion(sysmem, 0xc0000, &ram_lo);
170     if (x86ms->above_4g_mem_size > 0) {
171         memory_region_init_alias(&ram_hi, NULL, "xen.ram.hi",
172                                  &xen_memory, 0x100000000ULL,
173                                  x86ms->above_4g_mem_size);
174         memory_region_add_subregion(sysmem, 0x100000000ULL, &ram_hi);
175     }
176 }
177 
178 static XenPhysmap *get_physmapping(hwaddr start_addr, ram_addr_t size,
179                                    int page_mask)
180 {
181     XenPhysmap *physmap = NULL;
182 
183     start_addr &= page_mask;
184 
185     QLIST_FOREACH(physmap, &xen_physmap, list) {
186         if (range_covers_byte(physmap->start_addr, physmap->size, start_addr)) {
187             return physmap;
188         }
189     }
190     return NULL;
191 }
192 
193 static hwaddr xen_phys_offset_to_gaddr(hwaddr phys_offset, ram_addr_t size,
194                                        int page_mask)
195 {
196     hwaddr addr = phys_offset & page_mask;
197     XenPhysmap *physmap = NULL;
198 
199     QLIST_FOREACH(physmap, &xen_physmap, list) {
200         if (range_covers_byte(physmap->phys_offset, physmap->size, addr)) {
201             return physmap->start_addr + (phys_offset - physmap->phys_offset);
202         }
203     }
204 
205     return phys_offset;
206 }
207 
208 #ifdef XEN_COMPAT_PHYSMAP
209 static int xen_save_physmap(XenIOState *state, XenPhysmap *physmap)
210 {
211     char path[80], value[17];
212 
213     snprintf(path, sizeof(path),
214             "/local/domain/0/device-model/%d/physmap/%"PRIx64"/start_addr",
215             xen_domid, (uint64_t)physmap->phys_offset);
216     snprintf(value, sizeof(value), "%"PRIx64, (uint64_t)physmap->start_addr);
217     if (!xs_write(state->xenstore, 0, path, value, strlen(value))) {
218         return -1;
219     }
220     snprintf(path, sizeof(path),
221             "/local/domain/0/device-model/%d/physmap/%"PRIx64"/size",
222             xen_domid, (uint64_t)physmap->phys_offset);
223     snprintf(value, sizeof(value), "%"PRIx64, (uint64_t)physmap->size);
224     if (!xs_write(state->xenstore, 0, path, value, strlen(value))) {
225         return -1;
226     }
227     if (physmap->name) {
228         snprintf(path, sizeof(path),
229                 "/local/domain/0/device-model/%d/physmap/%"PRIx64"/name",
230                 xen_domid, (uint64_t)physmap->phys_offset);
231         if (!xs_write(state->xenstore, 0, path,
232                       physmap->name, strlen(physmap->name))) {
233             return -1;
234         }
235     }
236     return 0;
237 }
238 #else
239 static int xen_save_physmap(XenIOState *state, XenPhysmap *physmap)
240 {
241     return 0;
242 }
243 #endif
244 
245 static int xen_add_to_physmap(XenIOState *state,
246                               hwaddr start_addr,
247                               ram_addr_t size,
248                               MemoryRegion *mr,
249                               hwaddr offset_within_region)
250 {
251     unsigned target_page_bits = qemu_target_page_bits();
252     int page_size = qemu_target_page_size();
253     int page_mask = -page_size;
254     unsigned long nr_pages;
255     int rc = 0;
256     XenPhysmap *physmap = NULL;
257     hwaddr pfn, start_gpfn;
258     hwaddr phys_offset = memory_region_get_ram_addr(mr);
259     const char *mr_name;
260 
261     if (get_physmapping(start_addr, size, page_mask)) {
262         return 0;
263     }
264     if (size <= 0) {
265         return -1;
266     }
267 
268     /* Xen can only handle a single dirty log region for now and we want
269      * the linear framebuffer to be that region.
270      * Avoid tracking any regions that is not videoram and avoid tracking
271      * the legacy vga region. */
272     if (mr == framebuffer && start_addr > 0xbffff) {
273         goto go_physmap;
274     }
275     return -1;
276 
277 go_physmap:
278     DPRINTF("mapping vram to %"HWADDR_PRIx" - %"HWADDR_PRIx"\n",
279             start_addr, start_addr + size);
280 
281     mr_name = memory_region_name(mr);
282 
283     physmap = g_new(XenPhysmap, 1);
284 
285     physmap->start_addr = start_addr;
286     physmap->size = size;
287     physmap->name = mr_name;
288     physmap->phys_offset = phys_offset;
289 
290     QLIST_INSERT_HEAD(&xen_physmap, physmap, list);
291 
292     if (runstate_check(RUN_STATE_INMIGRATE)) {
293         /* Now when we have a physmap entry we can replace a dummy mapping with
294          * a real one of guest foreign memory. */
295         uint8_t *p = xen_replace_cache_entry(phys_offset, start_addr, size);
296         assert(p && p == memory_region_get_ram_ptr(mr));
297 
298         return 0;
299     }
300 
301     pfn = phys_offset >> target_page_bits;
302     start_gpfn = start_addr >> target_page_bits;
303     nr_pages = size >> target_page_bits;
304     rc = xendevicemodel_relocate_memory(xen_dmod, xen_domid, nr_pages, pfn,
305                                         start_gpfn);
306     if (rc) {
307         int saved_errno = errno;
308 
309         error_report("relocate_memory %lu pages from GFN %"HWADDR_PRIx
310                      " to GFN %"HWADDR_PRIx" failed: %s",
311                      nr_pages, pfn, start_gpfn, strerror(saved_errno));
312         errno = saved_errno;
313         return -1;
314     }
315 
316     rc = xendevicemodel_pin_memory_cacheattr(xen_dmod, xen_domid,
317                                    start_addr >> target_page_bits,
318                                    (start_addr + size - 1) >> target_page_bits,
319                                    XEN_DOMCTL_MEM_CACHEATTR_WB);
320     if (rc) {
321         error_report("pin_memory_cacheattr failed: %s", strerror(errno));
322     }
323     return xen_save_physmap(state, physmap);
324 }
325 
326 static int xen_remove_from_physmap(XenIOState *state,
327                                    hwaddr start_addr,
328                                    ram_addr_t size)
329 {
330     unsigned target_page_bits = qemu_target_page_bits();
331     int page_size = qemu_target_page_size();
332     int page_mask = -page_size;
333     int rc = 0;
334     XenPhysmap *physmap = NULL;
335     hwaddr phys_offset = 0;
336 
337     physmap = get_physmapping(start_addr, size, page_mask);
338     if (physmap == NULL) {
339         return -1;
340     }
341 
342     phys_offset = physmap->phys_offset;
343     size = physmap->size;
344 
345     DPRINTF("unmapping vram to %"HWADDR_PRIx" - %"HWADDR_PRIx", at "
346             "%"HWADDR_PRIx"\n", start_addr, start_addr + size, phys_offset);
347 
348     size >>= target_page_bits;
349     start_addr >>= target_page_bits;
350     phys_offset >>= target_page_bits;
351     rc = xendevicemodel_relocate_memory(xen_dmod, xen_domid, size, start_addr,
352                                         phys_offset);
353     if (rc) {
354         int saved_errno = errno;
355 
356         error_report("relocate_memory "RAM_ADDR_FMT" pages"
357                      " from GFN %"HWADDR_PRIx
358                      " to GFN %"HWADDR_PRIx" failed: %s",
359                      size, start_addr, phys_offset, strerror(saved_errno));
360         errno = saved_errno;
361         return -1;
362     }
363 
364     QLIST_REMOVE(physmap, list);
365     if (log_for_dirtybit == physmap) {
366         log_for_dirtybit = NULL;
367         g_free(dirty_bitmap);
368         dirty_bitmap = NULL;
369     }
370     g_free(physmap);
371 
372     return 0;
373 }
374 
375 static void xen_sync_dirty_bitmap(XenIOState *state,
376                                   hwaddr start_addr,
377                                   ram_addr_t size)
378 {
379     unsigned target_page_bits = qemu_target_page_bits();
380     int page_size = qemu_target_page_size();
381     int page_mask = -page_size;
382     hwaddr npages = size >> target_page_bits;
383     const int width = sizeof(unsigned long) * 8;
384     size_t bitmap_size = DIV_ROUND_UP(npages, width);
385     int rc, i, j;
386     const XenPhysmap *physmap = NULL;
387 
388     physmap = get_physmapping(start_addr, size, page_mask);
389     if (physmap == NULL) {
390         /* not handled */
391         return;
392     }
393 
394     if (log_for_dirtybit == NULL) {
395         log_for_dirtybit = physmap;
396         dirty_bitmap = g_new(unsigned long, bitmap_size);
397     } else if (log_for_dirtybit != physmap) {
398         /* Only one range for dirty bitmap can be tracked. */
399         return;
400     }
401 
402     rc = xen_track_dirty_vram(xen_domid, start_addr >> target_page_bits,
403                               npages, dirty_bitmap);
404     if (rc < 0) {
405 #ifndef ENODATA
406 #define ENODATA  ENOENT
407 #endif
408         if (errno == ENODATA) {
409             memory_region_set_dirty(framebuffer, 0, size);
410             DPRINTF("xen: track_dirty_vram failed (0x" HWADDR_FMT_plx
411                     ", 0x" HWADDR_FMT_plx "): %s\n",
412                     start_addr, start_addr + size, strerror(errno));
413         }
414         return;
415     }
416 
417     for (i = 0; i < bitmap_size; i++) {
418         unsigned long map = dirty_bitmap[i];
419         while (map != 0) {
420             j = ctzl(map);
421             map &= ~(1ul << j);
422             memory_region_set_dirty(framebuffer,
423                                     (i * width + j) * page_size, page_size);
424         };
425     }
426 }
427 
428 static void xen_log_start(MemoryListener *listener,
429                           MemoryRegionSection *section,
430                           int old, int new)
431 {
432     XenIOState *state = container_of(listener, XenIOState, memory_listener);
433 
434     if (new & ~old & (1 << DIRTY_MEMORY_VGA)) {
435         xen_sync_dirty_bitmap(state, section->offset_within_address_space,
436                               int128_get64(section->size));
437     }
438 }
439 
440 static void xen_log_stop(MemoryListener *listener, MemoryRegionSection *section,
441                          int old, int new)
442 {
443     if (old & ~new & (1 << DIRTY_MEMORY_VGA)) {
444         log_for_dirtybit = NULL;
445         g_free(dirty_bitmap);
446         dirty_bitmap = NULL;
447         /* Disable dirty bit tracking */
448         xen_track_dirty_vram(xen_domid, 0, 0, NULL);
449     }
450 }
451 
452 static void xen_log_sync(MemoryListener *listener, MemoryRegionSection *section)
453 {
454     XenIOState *state = container_of(listener, XenIOState, memory_listener);
455 
456     xen_sync_dirty_bitmap(state, section->offset_within_address_space,
457                           int128_get64(section->size));
458 }
459 
460 static bool xen_log_global_start(MemoryListener *listener, Error **errp)
461 {
462     if (xen_enabled()) {
463         xen_in_migration = true;
464     }
465     return true;
466 }
467 
468 static void xen_log_global_stop(MemoryListener *listener)
469 {
470     xen_in_migration = false;
471 }
472 
473 static const MemoryListener xen_memory_listener = {
474     .name = "xen-memory",
475     .region_add = xen_region_add,
476     .region_del = xen_region_del,
477     .log_start = xen_log_start,
478     .log_stop = xen_log_stop,
479     .log_sync = xen_log_sync,
480     .log_global_start = xen_log_global_start,
481     .log_global_stop = xen_log_global_stop,
482     .priority = MEMORY_LISTENER_PRIORITY_ACCEL,
483 };
484 
485 static void regs_to_cpu(vmware_regs_t *vmport_regs, ioreq_t *req)
486 {
487     X86CPU *cpu;
488     CPUX86State *env;
489 
490     cpu = X86_CPU(current_cpu);
491     env = &cpu->env;
492     env->regs[R_EAX] = req->data;
493     env->regs[R_EBX] = vmport_regs->ebx;
494     env->regs[R_ECX] = vmport_regs->ecx;
495     env->regs[R_EDX] = vmport_regs->edx;
496     env->regs[R_ESI] = vmport_regs->esi;
497     env->regs[R_EDI] = vmport_regs->edi;
498 }
499 
500 static void regs_from_cpu(vmware_regs_t *vmport_regs)
501 {
502     X86CPU *cpu = X86_CPU(current_cpu);
503     CPUX86State *env = &cpu->env;
504 
505     vmport_regs->ebx = env->regs[R_EBX];
506     vmport_regs->ecx = env->regs[R_ECX];
507     vmport_regs->edx = env->regs[R_EDX];
508     vmport_regs->esi = env->regs[R_ESI];
509     vmport_regs->edi = env->regs[R_EDI];
510 }
511 
512 static void handle_vmport_ioreq(XenIOState *state, ioreq_t *req)
513 {
514     vmware_regs_t *vmport_regs;
515 
516     assert(shared_vmport_page);
517     vmport_regs =
518         &shared_vmport_page->vcpu_vmport_regs[state->send_vcpu];
519     QEMU_BUILD_BUG_ON(sizeof(*req) < sizeof(*vmport_regs));
520 
521     current_cpu = state->cpu_by_vcpu_id[state->send_vcpu];
522     regs_to_cpu(vmport_regs, req);
523     cpu_ioreq_pio(req);
524     regs_from_cpu(vmport_regs);
525     current_cpu = NULL;
526 }
527 
528 #ifdef XEN_COMPAT_PHYSMAP
529 static void xen_read_physmap(XenIOState *state)
530 {
531     XenPhysmap *physmap = NULL;
532     unsigned int len, num, i;
533     char path[80], *value = NULL;
534     char **entries = NULL;
535 
536     snprintf(path, sizeof(path),
537             "/local/domain/0/device-model/%d/physmap", xen_domid);
538     entries = xs_directory(state->xenstore, 0, path, &num);
539     if (entries == NULL)
540         return;
541 
542     for (i = 0; i < num; i++) {
543         physmap = g_new(XenPhysmap, 1);
544         physmap->phys_offset = strtoull(entries[i], NULL, 16);
545         snprintf(path, sizeof(path),
546                 "/local/domain/0/device-model/%d/physmap/%s/start_addr",
547                 xen_domid, entries[i]);
548         value = xs_read(state->xenstore, 0, path, &len);
549         if (value == NULL) {
550             g_free(physmap);
551             continue;
552         }
553         physmap->start_addr = strtoull(value, NULL, 16);
554         free(value);
555 
556         snprintf(path, sizeof(path),
557                 "/local/domain/0/device-model/%d/physmap/%s/size",
558                 xen_domid, entries[i]);
559         value = xs_read(state->xenstore, 0, path, &len);
560         if (value == NULL) {
561             g_free(physmap);
562             continue;
563         }
564         physmap->size = strtoull(value, NULL, 16);
565         free(value);
566 
567         snprintf(path, sizeof(path),
568                 "/local/domain/0/device-model/%d/physmap/%s/name",
569                 xen_domid, entries[i]);
570         physmap->name = xs_read(state->xenstore, 0, path, &len);
571 
572         QLIST_INSERT_HEAD(&xen_physmap, physmap, list);
573     }
574     free(entries);
575 }
576 #else
577 static void xen_read_physmap(XenIOState *state)
578 {
579 }
580 #endif
581 
582 static void xen_wakeup_notifier(Notifier *notifier, void *data)
583 {
584     xc_set_hvm_param(xen_xc, xen_domid, HVM_PARAM_ACPI_S_STATE, 0);
585 }
586 
587 static bool xen_check_stubdomain(struct xs_handle *xsh)
588 {
589     char *dm_path = g_strdup_printf(
590         "/local/domain/%d/image/device-model-domid", xen_domid);
591     char *val;
592     int32_t dm_domid;
593     bool is_stubdom = false;
594 
595     val = xs_read(xsh, 0, dm_path, NULL);
596     if (val) {
597         if (sscanf(val, "%d", &dm_domid) == 1) {
598             is_stubdom = dm_domid != 0;
599         }
600         free(val);
601     }
602 
603     g_free(dm_path);
604     return is_stubdom;
605 }
606 
607 void xen_hvm_init_pc(PCMachineState *pcms, MemoryRegion **ram_memory)
608 {
609     MachineState *ms = MACHINE(pcms);
610     unsigned int max_cpus = ms->smp.max_cpus;
611     int rc;
612     xen_pfn_t ioreq_pfn;
613     XenIOState *state;
614 
615     state = g_new0(XenIOState, 1);
616 
617     xen_register_ioreq(state, max_cpus,
618                        HVM_IOREQSRV_BUFIOREQ_ATOMIC,
619                        &xen_memory_listener);
620 
621     xen_is_stubdomain = xen_check_stubdomain(state->xenstore);
622 
623     QLIST_INIT(&xen_physmap);
624     xen_read_physmap(state);
625 
626     suspend.notify = xen_suspend_notifier;
627     qemu_register_suspend_notifier(&suspend);
628 
629     wakeup.notify = xen_wakeup_notifier;
630     qemu_register_wakeup_notifier(&wakeup);
631 
632     rc = xen_get_vmport_regs_pfn(xen_xc, xen_domid, &ioreq_pfn);
633     if (!rc) {
634         DPRINTF("shared vmport page at pfn %lx\n", ioreq_pfn);
635         shared_vmport_page =
636             xenforeignmemory_map(xen_fmem, xen_domid, PROT_READ|PROT_WRITE,
637                                  1, &ioreq_pfn, NULL);
638         if (shared_vmport_page == NULL) {
639             error_report("map shared vmport IO page returned error %d handle=%p",
640                          errno, xen_xc);
641             goto err;
642         }
643     } else if (rc != -ENOSYS) {
644         error_report("get vmport regs pfn returned error %d, rc=%d",
645                      errno, rc);
646         goto err;
647     }
648 
649     xen_ram_init(pcms, ms->ram_size, ram_memory);
650 
651     /* Disable ACPI build because Xen handles it */
652     pcms->acpi_build_enabled = false;
653 
654     return;
655 
656 err:
657     error_report("xen hardware virtual machine initialisation failed");
658     exit(1);
659 }
660 
661 void xen_register_framebuffer(MemoryRegion *mr)
662 {
663     framebuffer = mr;
664 }
665 
666 void xen_hvm_modified_memory(ram_addr_t start, ram_addr_t length)
667 {
668     unsigned target_page_bits = qemu_target_page_bits();
669     int page_size = qemu_target_page_size();
670     int page_mask = -page_size;
671 
672     if (unlikely(xen_in_migration)) {
673         int rc;
674         ram_addr_t start_pfn, nb_pages;
675 
676         start = xen_phys_offset_to_gaddr(start, length, page_mask);
677 
678         if (length == 0) {
679             length = page_size;
680         }
681         start_pfn = start >> target_page_bits;
682         nb_pages = ((start + length + page_size - 1) >> target_page_bits)
683             - start_pfn;
684         rc = xen_modified_memory(xen_domid, start_pfn, nb_pages);
685         if (rc) {
686             fprintf(stderr,
687                     "%s failed for "RAM_ADDR_FMT" ("RAM_ADDR_FMT"): %i, %s\n",
688                     __func__, start, nb_pages, errno, strerror(errno));
689         }
690     }
691 }
692 
693 void qmp_xen_set_global_dirty_log(bool enable, Error **errp)
694 {
695     if (enable) {
696         memory_global_dirty_log_start(GLOBAL_DIRTY_MIGRATION, errp);
697     } else {
698         memory_global_dirty_log_stop(GLOBAL_DIRTY_MIGRATION);
699     }
700 }
701 
702 void arch_xen_set_memory(XenIOState *state, MemoryRegionSection *section,
703                                 bool add)
704 {
705     unsigned target_page_bits = qemu_target_page_bits();
706     int page_size = qemu_target_page_size();
707     int page_mask = -page_size;
708     hwaddr start_addr = section->offset_within_address_space;
709     ram_addr_t size = int128_get64(section->size);
710     bool log_dirty = memory_region_is_logging(section->mr, DIRTY_MEMORY_VGA);
711     hvmmem_type_t mem_type;
712 
713     if (!memory_region_is_ram(section->mr)) {
714         return;
715     }
716 
717     if (log_dirty != add) {
718         return;
719     }
720 
721     trace_xen_client_set_memory(start_addr, size, log_dirty);
722 
723     start_addr &= page_mask;
724     size = ROUND_UP(size, page_size);
725 
726     if (add) {
727         if (!memory_region_is_rom(section->mr)) {
728             xen_add_to_physmap(state, start_addr, size,
729                                section->mr, section->offset_within_region);
730         } else {
731             mem_type = HVMMEM_ram_ro;
732             if (xen_set_mem_type(xen_domid, mem_type,
733                                  start_addr >> target_page_bits,
734                                  size >> target_page_bits)) {
735                 DPRINTF("xen_set_mem_type error, addr: "HWADDR_FMT_plx"\n",
736                         start_addr);
737             }
738         }
739     } else {
740         if (xen_remove_from_physmap(state, start_addr, size) < 0) {
741             DPRINTF("physmapping does not exist at "HWADDR_FMT_plx"\n", start_addr);
742         }
743     }
744 }
745 
746 void arch_handle_ioreq(XenIOState *state, ioreq_t *req)
747 {
748     switch (req->type) {
749     case IOREQ_TYPE_VMWARE_PORT:
750             handle_vmport_ioreq(state, req);
751         break;
752     default:
753         hw_error("Invalid ioreq type 0x%x\n", req->type);
754     }
755 
756     return;
757 }
758