]> git.proxmox.com Git - qemu.git/blame - xen-all.c
xen, vga: add API for registering the framebuffer
[qemu.git] / xen-all.c
CommitLineData
3285cf4f
AP
1/*
2 * Copyright (C) 2010 Citrix Ltd.
3 *
4 * This work is licensed under the terms of the GNU GPL, version 2. See
5 * the COPYING file in the top-level directory.
6 *
7 */
8
9ce94e7c
AS
9#include <sys/mman.h>
10
41445300 11#include "hw/pci.h"
c9622478 12#include "hw/pc.h"
3285cf4f
AP
13#include "hw/xen_common.h"
14#include "hw/xen_backend.h"
15
b4dd7802 16#include "range.h"
432d268c
JN
17#include "xen-mapcache.h"
18#include "trace.h"
ce76b8a8 19#include "exec-memory.h"
432d268c 20
9ce94e7c
AS
21#include <xen/hvm/ioreq.h>
22#include <xen/hvm/params.h>
8a369e20 23#include <xen/hvm/e820.h>
9ce94e7c
AS
24
25//#define DEBUG_XEN
26
27#ifdef DEBUG_XEN
28#define DPRINTF(fmt, ...) \
29 do { fprintf(stderr, "xen: " fmt, ## __VA_ARGS__); } while (0)
30#else
31#define DPRINTF(fmt, ...) \
32 do { } while (0)
33#endif
34
ce76b8a8 35static MemoryRegion ram_memory, ram_640k, ram_lo, ram_hi;
c65adf9b 36static MemoryRegion *framebuffer;
ce76b8a8 37
9ce94e7c
AS
38/* Compatibility with older version */
39#if __XEN_LATEST_INTERFACE_VERSION__ < 0x0003020a
40static inline uint32_t xen_vcpu_eport(shared_iopage_t *shared_page, int i)
41{
42 return shared_page->vcpu_iodata[i].vp_eport;
43}
44static inline ioreq_t *xen_vcpu_ioreq(shared_iopage_t *shared_page, int vcpu)
45{
46 return &shared_page->vcpu_iodata[vcpu].vp_ioreq;
47}
48# define FMT_ioreq_size PRIx64
49#else
50static inline uint32_t xen_vcpu_eport(shared_iopage_t *shared_page, int i)
51{
52 return shared_page->vcpu_ioreq[i].vp_eport;
53}
54static inline ioreq_t *xen_vcpu_ioreq(shared_iopage_t *shared_page, int vcpu)
55{
56 return &shared_page->vcpu_ioreq[vcpu];
57}
58# define FMT_ioreq_size "u"
59#endif
60
61#define BUFFER_IO_MAX_DELAY 100
62
b4dd7802
AP
63typedef struct XenPhysmap {
64 target_phys_addr_t start_addr;
65 ram_addr_t size;
66 target_phys_addr_t phys_offset;
67
68 QLIST_ENTRY(XenPhysmap) list;
69} XenPhysmap;
70
9ce94e7c
AS
71typedef struct XenIOState {
72 shared_iopage_t *shared_page;
73 buffered_iopage_t *buffered_io_page;
74 QEMUTimer *buffered_io_timer;
75 /* the evtchn port for polling the notification, */
76 evtchn_port_t *ioreq_local_port;
77 /* the evtchn fd for polling */
78 XenEvtchn xce_handle;
79 /* which vcpu we are serving */
80 int send_vcpu;
81
29321335 82 struct xs_handle *xenstore;
b4dd7802
AP
83 CPUPhysMemoryClient client;
84 QLIST_HEAD(, XenPhysmap) physmap;
85 const XenPhysmap *log_for_dirtybit;
29321335 86
9ce94e7c
AS
87 Notifier exit;
88} XenIOState;
89
41445300
AP
90/* Xen specific function for piix pci */
91
92int xen_pci_slot_get_pirq(PCIDevice *pci_dev, int irq_num)
93{
94 return irq_num + ((pci_dev->devfn >> 3) << 2);
95}
96
97void xen_piix3_set_irq(void *opaque, int irq_num, int level)
98{
99 xc_hvm_set_pci_intx_level(xen_xc, xen_domid, 0, 0, irq_num >> 2,
100 irq_num & 3, level);
101}
102
103void xen_piix_pci_write_config_client(uint32_t address, uint32_t val, int len)
104{
105 int i;
106
107 /* Scan for updates to PCI link routes (0x60-0x63). */
108 for (i = 0; i < len; i++) {
109 uint8_t v = (val >> (8 * i)) & 0xff;
110 if (v & 0x80) {
111 v = 0;
112 }
113 v &= 0xf;
114 if (((address + i) >= 0x60) && ((address + i) <= 0x63)) {
115 xc_hvm_set_pci_link_route(xen_xc, xen_domid, address + i - 0x60, v);
116 }
117 }
118}
119
c9622478
AP
120void xen_cmos_set_s3_resume(void *opaque, int irq, int level)
121{
122 pc_cmos_set_s3_resume(opaque, irq, level);
123 if (level) {
124 xc_set_hvm_param(xen_xc, xen_domid, HVM_PARAM_ACPI_S_STATE, 3);
125 }
126}
127
9c11a8ac
AP
128/* Xen Interrupt Controller */
129
130static void xen_set_irq(void *opaque, int irq, int level)
131{
132 xc_hvm_set_isa_irq_level(xen_xc, xen_domid, irq, level);
133}
134
135qemu_irq *xen_interrupt_controller_init(void)
136{
137 return qemu_allocate_irqs(xen_set_irq, NULL, 16);
138}
139
432d268c
JN
140/* Memory Ops */
141
142static void xen_ram_init(ram_addr_t ram_size)
143{
ce76b8a8 144 MemoryRegion *sysmem = get_system_memory();
432d268c 145 ram_addr_t below_4g_mem_size, above_4g_mem_size = 0;
ce76b8a8 146 ram_addr_t block_len;
432d268c 147
ce76b8a8 148 block_len = ram_size;
8a369e20
AP
149 if (ram_size >= HVM_BELOW_4G_RAM_END) {
150 /* Xen does not allocate the memory continuously, and keep a hole at
151 * HVM_BELOW_4G_MMIO_START of HVM_BELOW_4G_MMIO_LENGTH
152 */
ce76b8a8 153 block_len += HVM_BELOW_4G_MMIO_LENGTH;
8a369e20 154 }
ce76b8a8 155 memory_region_init_ram(&ram_memory, NULL, "xen.ram", block_len);
432d268c 156
8a369e20
AP
157 if (ram_size >= HVM_BELOW_4G_RAM_END) {
158 above_4g_mem_size = ram_size - HVM_BELOW_4G_RAM_END;
159 below_4g_mem_size = HVM_BELOW_4G_RAM_END;
432d268c
JN
160 } else {
161 below_4g_mem_size = ram_size;
162 }
163
ce76b8a8
AK
164 memory_region_init_alias(&ram_640k, "xen.ram.640k",
165 &ram_memory, 0, 0xa0000);
166 memory_region_add_subregion(sysmem, 0, &ram_640k);
8a369e20
AP
167 /* Skip of the VGA IO memory space, it will be registered later by the VGA
168 * emulated device.
169 *
170 * The area between 0xc0000 and 0x100000 will be used by SeaBIOS to load
171 * the Options ROM, so it is registered here as RAM.
172 */
ce76b8a8
AK
173 memory_region_init_alias(&ram_lo, "xen.ram.lo",
174 &ram_memory, 0xc0000, below_4g_mem_size - 0xc0000);
175 memory_region_add_subregion(sysmem, 0xc0000, &ram_lo);
432d268c 176 if (above_4g_mem_size > 0) {
ce76b8a8
AK
177 memory_region_init_alias(&ram_hi, "xen.ram.hi",
178 &ram_memory, 0x100000000ULL,
179 above_4g_mem_size);
180 memory_region_add_subregion(sysmem, 0x100000000ULL, &ram_hi);
432d268c 181 }
432d268c
JN
182}
183
fce537d4 184void xen_ram_alloc(ram_addr_t ram_addr, ram_addr_t size, MemoryRegion *mr)
432d268c
JN
185{
186 unsigned long nr_pfn;
187 xen_pfn_t *pfn_list;
188 int i;
189
ce76b8a8
AK
190 if (mr == &ram_memory) {
191 return;
192 }
193
432d268c
JN
194 trace_xen_ram_alloc(ram_addr, size);
195
196 nr_pfn = size >> TARGET_PAGE_BITS;
7267c094 197 pfn_list = g_malloc(sizeof (*pfn_list) * nr_pfn);
432d268c
JN
198
199 for (i = 0; i < nr_pfn; i++) {
200 pfn_list[i] = (ram_addr >> TARGET_PAGE_BITS) + i;
201 }
202
203 if (xc_domain_populate_physmap_exact(xen_xc, xen_domid, nr_pfn, 0, 0, pfn_list)) {
f15fbc4b 204 hw_error("xen: failed to populate ram at " RAM_ADDR_FMT, ram_addr);
432d268c
JN
205 }
206
7267c094 207 g_free(pfn_list);
432d268c
JN
208}
209
b4dd7802
AP
210static XenPhysmap *get_physmapping(XenIOState *state,
211 target_phys_addr_t start_addr, ram_addr_t size)
212{
213 XenPhysmap *physmap = NULL;
214
215 start_addr &= TARGET_PAGE_MASK;
216
217 QLIST_FOREACH(physmap, &state->physmap, list) {
218 if (range_covers_byte(physmap->start_addr, physmap->size, start_addr)) {
219 return physmap;
220 }
221 }
222 return NULL;
223}
224
225#if CONFIG_XEN_CTRL_INTERFACE_VERSION >= 340
226static int xen_add_to_physmap(XenIOState *state,
227 target_phys_addr_t start_addr,
228 ram_addr_t size,
229 target_phys_addr_t phys_offset)
230{
231 unsigned long i = 0;
232 int rc = 0;
233 XenPhysmap *physmap = NULL;
234 target_phys_addr_t pfn, start_gpfn;
ebed8505 235 RAMBlock *block;
b4dd7802
AP
236
237 if (get_physmapping(state, start_addr, size)) {
238 return 0;
239 }
240 if (size <= 0) {
241 return -1;
242 }
243
ebed8505
SS
244 /* Xen can only handle a single dirty log region for now and we want
245 * the linear framebuffer to be that region.
246 * Avoid tracking any regions that is not videoram and avoid tracking
247 * the legacy vga region. */
248 QLIST_FOREACH(block, &ram_list.blocks, next) {
249 if (!strcmp(block->idstr, "vga.vram") && block->offset == phys_offset
250 && start_addr > 0xbffff) {
251 goto go_physmap;
252 }
253 }
254 return -1;
255
256go_physmap:
b4dd7802
AP
257 DPRINTF("mapping vram to %llx - %llx, from %llx\n",
258 start_addr, start_addr + size, phys_offset);
259
260 pfn = phys_offset >> TARGET_PAGE_BITS;
261 start_gpfn = start_addr >> TARGET_PAGE_BITS;
262 for (i = 0; i < size >> TARGET_PAGE_BITS; i++) {
263 unsigned long idx = pfn + i;
264 xen_pfn_t gpfn = start_gpfn + i;
265
266 rc = xc_domain_add_to_physmap(xen_xc, xen_domid, XENMAPSPACE_gmfn, idx, gpfn);
267 if (rc) {
268 DPRINTF("add_to_physmap MFN %"PRI_xen_pfn" to PFN %"
269 PRI_xen_pfn" failed: %d\n", idx, gpfn, rc);
270 return -rc;
271 }
272 }
273
7267c094 274 physmap = g_malloc(sizeof (XenPhysmap));
b4dd7802
AP
275
276 physmap->start_addr = start_addr;
277 physmap->size = size;
278 physmap->phys_offset = phys_offset;
279
280 QLIST_INSERT_HEAD(&state->physmap, physmap, list);
281
282 xc_domain_pin_memory_cacheattr(xen_xc, xen_domid,
283 start_addr >> TARGET_PAGE_BITS,
284 (start_addr + size) >> TARGET_PAGE_BITS,
285 XEN_DOMCTL_MEM_CACHEATTR_WB);
286 return 0;
287}
288
289static int xen_remove_from_physmap(XenIOState *state,
290 target_phys_addr_t start_addr,
291 ram_addr_t size)
292{
293 unsigned long i = 0;
294 int rc = 0;
295 XenPhysmap *physmap = NULL;
296 target_phys_addr_t phys_offset = 0;
297
298 physmap = get_physmapping(state, start_addr, size);
299 if (physmap == NULL) {
300 return -1;
301 }
302
303 phys_offset = physmap->phys_offset;
304 size = physmap->size;
305
306 DPRINTF("unmapping vram to %llx - %llx, from %llx\n",
307 phys_offset, phys_offset + size, start_addr);
308
309 size >>= TARGET_PAGE_BITS;
310 start_addr >>= TARGET_PAGE_BITS;
311 phys_offset >>= TARGET_PAGE_BITS;
312 for (i = 0; i < size; i++) {
313 unsigned long idx = start_addr + i;
314 xen_pfn_t gpfn = phys_offset + i;
315
316 rc = xc_domain_add_to_physmap(xen_xc, xen_domid, XENMAPSPACE_gmfn, idx, gpfn);
317 if (rc) {
318 fprintf(stderr, "add_to_physmap MFN %"PRI_xen_pfn" to PFN %"
319 PRI_xen_pfn" failed: %d\n", idx, gpfn, rc);
320 return -rc;
321 }
322 }
323
324 QLIST_REMOVE(physmap, list);
325 if (state->log_for_dirtybit == physmap) {
326 state->log_for_dirtybit = NULL;
327 }
328 free(physmap);
329
330 return 0;
331}
332
333#else
334static int xen_add_to_physmap(XenIOState *state,
335 target_phys_addr_t start_addr,
336 ram_addr_t size,
337 target_phys_addr_t phys_offset)
338{
339 return -ENOSYS;
340}
341
342static int xen_remove_from_physmap(XenIOState *state,
343 target_phys_addr_t start_addr,
344 ram_addr_t size)
345{
346 return -ENOSYS;
347}
348#endif
349
350static void xen_client_set_memory(struct CPUPhysMemoryClient *client,
351 target_phys_addr_t start_addr,
352 ram_addr_t size,
353 ram_addr_t phys_offset,
354 bool log_dirty)
355{
356 XenIOState *state = container_of(client, XenIOState, client);
357 ram_addr_t flags = phys_offset & ~TARGET_PAGE_MASK;
358 hvmmem_type_t mem_type;
359
360 if (!(start_addr != phys_offset
361 && ( (log_dirty && flags < IO_MEM_UNASSIGNED)
362 || (!log_dirty && flags == IO_MEM_UNASSIGNED)))) {
363 return;
364 }
365
366 trace_xen_client_set_memory(start_addr, size, phys_offset, log_dirty);
367
368 start_addr &= TARGET_PAGE_MASK;
369 size = TARGET_PAGE_ALIGN(size);
370 phys_offset &= TARGET_PAGE_MASK;
371
372 switch (flags) {
373 case IO_MEM_RAM:
374 xen_add_to_physmap(state, start_addr, size, phys_offset);
375 break;
376 case IO_MEM_ROM:
377 mem_type = HVMMEM_ram_ro;
378 if (xc_hvm_set_mem_type(xen_xc, xen_domid, mem_type,
379 start_addr >> TARGET_PAGE_BITS,
380 size >> TARGET_PAGE_BITS)) {
381 DPRINTF("xc_hvm_set_mem_type error, addr: "TARGET_FMT_plx"\n",
382 start_addr);
383 }
384 break;
385 case IO_MEM_UNASSIGNED:
386 if (xen_remove_from_physmap(state, start_addr, size) < 0) {
387 DPRINTF("physmapping does not exist at "TARGET_FMT_plx"\n", start_addr);
388 }
389 break;
390 }
391}
392
393static int xen_sync_dirty_bitmap(XenIOState *state,
394 target_phys_addr_t start_addr,
395 ram_addr_t size)
396{
397 target_phys_addr_t npages = size >> TARGET_PAGE_BITS;
398 target_phys_addr_t vram_offset = 0;
399 const int width = sizeof(unsigned long) * 8;
400 unsigned long bitmap[(npages + width - 1) / width];
401 int rc, i, j;
402 const XenPhysmap *physmap = NULL;
403
404 physmap = get_physmapping(state, start_addr, size);
405 if (physmap == NULL) {
406 /* not handled */
407 return -1;
408 }
409
410 if (state->log_for_dirtybit == NULL) {
411 state->log_for_dirtybit = physmap;
412 } else if (state->log_for_dirtybit != physmap) {
413 return -1;
414 }
415 vram_offset = physmap->phys_offset;
416
417 rc = xc_hvm_track_dirty_vram(xen_xc, xen_domid,
418 start_addr >> TARGET_PAGE_BITS, npages,
419 bitmap);
420 if (rc) {
421 return rc;
422 }
423
424 for (i = 0; i < ARRAY_SIZE(bitmap); i++) {
425 unsigned long map = bitmap[i];
426 while (map != 0) {
427 j = ffsl(map) - 1;
428 map &= ~(1ul << j);
429 cpu_physical_memory_set_dirty(vram_offset + (i * width + j) * TARGET_PAGE_SIZE);
430 };
431 }
432
433 return 0;
434}
435
436static int xen_log_start(CPUPhysMemoryClient *client, target_phys_addr_t phys_addr, ram_addr_t size)
437{
438 XenIOState *state = container_of(client, XenIOState, client);
439
440 return xen_sync_dirty_bitmap(state, phys_addr, size);
441}
442
443static int xen_log_stop(CPUPhysMemoryClient *client, target_phys_addr_t phys_addr, ram_addr_t size)
444{
445 XenIOState *state = container_of(client, XenIOState, client);
446
447 state->log_for_dirtybit = NULL;
448 /* Disable dirty bit tracking */
449 return xc_hvm_track_dirty_vram(xen_xc, xen_domid, 0, 0, NULL);
450}
451
452static int xen_client_sync_dirty_bitmap(struct CPUPhysMemoryClient *client,
453 target_phys_addr_t start_addr,
454 target_phys_addr_t end_addr)
455{
456 XenIOState *state = container_of(client, XenIOState, client);
457
458 return xen_sync_dirty_bitmap(state, start_addr, end_addr - start_addr);
459}
460
461static int xen_client_migration_log(struct CPUPhysMemoryClient *client,
462 int enable)
463{
464 return 0;
465}
466
467static CPUPhysMemoryClient xen_cpu_phys_memory_client = {
468 .set_memory = xen_client_set_memory,
469 .sync_dirty_bitmap = xen_client_sync_dirty_bitmap,
470 .migration_log = xen_client_migration_log,
471 .log_start = xen_log_start,
472 .log_stop = xen_log_stop,
473};
432d268c 474
29d3ccde
AP
475/* VCPU Operations, MMIO, IO ring ... */
476
477static void xen_reset_vcpu(void *opaque)
478{
479 CPUState *env = opaque;
480
481 env->halted = 1;
482}
483
484void xen_vcpu_init(void)
485{
486 CPUState *first_cpu;
487
488 if ((first_cpu = qemu_get_cpu(0))) {
489 qemu_register_reset(xen_reset_vcpu, first_cpu);
490 xen_reset_vcpu(first_cpu);
491 }
492}
493
9ce94e7c
AS
494/* get the ioreq packets from share mem */
495static ioreq_t *cpu_get_ioreq_from_shared_memory(XenIOState *state, int vcpu)
496{
497 ioreq_t *req = xen_vcpu_ioreq(state->shared_page, vcpu);
498
499 if (req->state != STATE_IOREQ_READY) {
500 DPRINTF("I/O request not ready: "
501 "%x, ptr: %x, port: %"PRIx64", "
502 "data: %"PRIx64", count: %" FMT_ioreq_size ", size: %" FMT_ioreq_size "\n",
503 req->state, req->data_is_ptr, req->addr,
504 req->data, req->count, req->size);
505 return NULL;
506 }
507
508 xen_rmb(); /* see IOREQ_READY /then/ read contents of ioreq */
509
510 req->state = STATE_IOREQ_INPROCESS;
511 return req;
512}
513
514/* use poll to get the port notification */
515/* ioreq_vec--out,the */
516/* retval--the number of ioreq packet */
517static ioreq_t *cpu_get_ioreq(XenIOState *state)
518{
519 int i;
520 evtchn_port_t port;
521
522 port = xc_evtchn_pending(state->xce_handle);
523 if (port != -1) {
524 for (i = 0; i < smp_cpus; i++) {
525 if (state->ioreq_local_port[i] == port) {
526 break;
527 }
528 }
529
530 if (i == smp_cpus) {
531 hw_error("Fatal error while trying to get io event!\n");
532 }
533
534 /* unmask the wanted port again */
535 xc_evtchn_unmask(state->xce_handle, port);
536
537 /* get the io packet from shared memory */
538 state->send_vcpu = i;
539 return cpu_get_ioreq_from_shared_memory(state, i);
540 }
541
542 /* read error or read nothing */
543 return NULL;
544}
545
546static uint32_t do_inp(pio_addr_t addr, unsigned long size)
547{
548 switch (size) {
549 case 1:
550 return cpu_inb(addr);
551 case 2:
552 return cpu_inw(addr);
553 case 4:
554 return cpu_inl(addr);
555 default:
556 hw_error("inp: bad size: %04"FMT_pioaddr" %lx", addr, size);
557 }
558}
559
560static void do_outp(pio_addr_t addr,
561 unsigned long size, uint32_t val)
562{
563 switch (size) {
564 case 1:
565 return cpu_outb(addr, val);
566 case 2:
567 return cpu_outw(addr, val);
568 case 4:
569 return cpu_outl(addr, val);
570 default:
571 hw_error("outp: bad size: %04"FMT_pioaddr" %lx", addr, size);
572 }
573}
574
575static void cpu_ioreq_pio(ioreq_t *req)
576{
577 int i, sign;
578
579 sign = req->df ? -1 : 1;
580
581 if (req->dir == IOREQ_READ) {
582 if (!req->data_is_ptr) {
583 req->data = do_inp(req->addr, req->size);
584 } else {
585 uint32_t tmp;
586
587 for (i = 0; i < req->count; i++) {
588 tmp = do_inp(req->addr, req->size);
589 cpu_physical_memory_write(req->data + (sign * i * req->size),
590 (uint8_t *) &tmp, req->size);
591 }
592 }
593 } else if (req->dir == IOREQ_WRITE) {
594 if (!req->data_is_ptr) {
595 do_outp(req->addr, req->size, req->data);
596 } else {
597 for (i = 0; i < req->count; i++) {
598 uint32_t tmp = 0;
599
600 cpu_physical_memory_read(req->data + (sign * i * req->size),
601 (uint8_t*) &tmp, req->size);
602 do_outp(req->addr, req->size, tmp);
603 }
604 }
605 }
606}
607
608static void cpu_ioreq_move(ioreq_t *req)
609{
610 int i, sign;
611
612 sign = req->df ? -1 : 1;
613
614 if (!req->data_is_ptr) {
615 if (req->dir == IOREQ_READ) {
616 for (i = 0; i < req->count; i++) {
617 cpu_physical_memory_read(req->addr + (sign * i * req->size),
618 (uint8_t *) &req->data, req->size);
619 }
620 } else if (req->dir == IOREQ_WRITE) {
621 for (i = 0; i < req->count; i++) {
622 cpu_physical_memory_write(req->addr + (sign * i * req->size),
623 (uint8_t *) &req->data, req->size);
624 }
625 }
626 } else {
2b734340 627 uint64_t tmp;
9ce94e7c
AS
628
629 if (req->dir == IOREQ_READ) {
630 for (i = 0; i < req->count; i++) {
631 cpu_physical_memory_read(req->addr + (sign * i * req->size),
632 (uint8_t*) &tmp, req->size);
633 cpu_physical_memory_write(req->data + (sign * i * req->size),
634 (uint8_t*) &tmp, req->size);
635 }
636 } else if (req->dir == IOREQ_WRITE) {
637 for (i = 0; i < req->count; i++) {
638 cpu_physical_memory_read(req->data + (sign * i * req->size),
639 (uint8_t*) &tmp, req->size);
640 cpu_physical_memory_write(req->addr + (sign * i * req->size),
641 (uint8_t*) &tmp, req->size);
642 }
643 }
644 }
645}
646
647static void handle_ioreq(ioreq_t *req)
648{
649 if (!req->data_is_ptr && (req->dir == IOREQ_WRITE) &&
650 (req->size < sizeof (target_ulong))) {
651 req->data &= ((target_ulong) 1 << (8 * req->size)) - 1;
652 }
653
654 switch (req->type) {
655 case IOREQ_TYPE_PIO:
656 cpu_ioreq_pio(req);
657 break;
658 case IOREQ_TYPE_COPY:
659 cpu_ioreq_move(req);
660 break;
661 case IOREQ_TYPE_TIMEOFFSET:
662 break;
663 case IOREQ_TYPE_INVALIDATE:
e41d7c69 664 xen_invalidate_map_cache();
9ce94e7c
AS
665 break;
666 default:
667 hw_error("Invalid ioreq type 0x%x\n", req->type);
668 }
669}
670
671static void handle_buffered_iopage(XenIOState *state)
672{
673 buf_ioreq_t *buf_req = NULL;
674 ioreq_t req;
675 int qw;
676
677 if (!state->buffered_io_page) {
678 return;
679 }
680
681 while (state->buffered_io_page->read_pointer != state->buffered_io_page->write_pointer) {
682 buf_req = &state->buffered_io_page->buf_ioreq[
683 state->buffered_io_page->read_pointer % IOREQ_BUFFER_SLOT_NUM];
684 req.size = 1UL << buf_req->size;
685 req.count = 1;
686 req.addr = buf_req->addr;
687 req.data = buf_req->data;
688 req.state = STATE_IOREQ_READY;
689 req.dir = buf_req->dir;
690 req.df = 1;
691 req.type = buf_req->type;
692 req.data_is_ptr = 0;
693 qw = (req.size == 8);
694 if (qw) {
695 buf_req = &state->buffered_io_page->buf_ioreq[
696 (state->buffered_io_page->read_pointer + 1) % IOREQ_BUFFER_SLOT_NUM];
697 req.data |= ((uint64_t)buf_req->data) << 32;
698 }
699
700 handle_ioreq(&req);
701
702 xen_mb();
703 state->buffered_io_page->read_pointer += qw ? 2 : 1;
704 }
705}
706
707static void handle_buffered_io(void *opaque)
708{
709 XenIOState *state = opaque;
710
711 handle_buffered_iopage(state);
712 qemu_mod_timer(state->buffered_io_timer,
713 BUFFER_IO_MAX_DELAY + qemu_get_clock_ms(rt_clock));
714}
715
716static void cpu_handle_ioreq(void *opaque)
717{
718 XenIOState *state = opaque;
719 ioreq_t *req = cpu_get_ioreq(state);
720
721 handle_buffered_iopage(state);
722 if (req) {
723 handle_ioreq(req);
724
725 if (req->state != STATE_IOREQ_INPROCESS) {
726 fprintf(stderr, "Badness in I/O request ... not in service?!: "
727 "%x, ptr: %x, port: %"PRIx64", "
728 "data: %"PRIx64", count: %" FMT_ioreq_size ", size: %" FMT_ioreq_size "\n",
729 req->state, req->data_is_ptr, req->addr,
730 req->data, req->count, req->size);
731 destroy_hvm_domain();
732 return;
733 }
734
735 xen_wmb(); /* Update ioreq contents /then/ update state. */
736
737 /*
738 * We do this before we send the response so that the tools
739 * have the opportunity to pick up on the reset before the
740 * guest resumes and does a hlt with interrupts disabled which
741 * causes Xen to powerdown the domain.
742 */
1354869c 743 if (runstate_is_running()) {
9ce94e7c
AS
744 if (qemu_shutdown_requested_get()) {
745 destroy_hvm_domain();
746 }
747 if (qemu_reset_requested_get()) {
e063eb1f 748 qemu_system_reset(VMRESET_REPORT);
9ce94e7c
AS
749 }
750 }
751
752 req->state = STATE_IORESP_READY;
753 xc_evtchn_notify(state->xce_handle, state->ioreq_local_port[state->send_vcpu]);
754 }
755}
756
0f51726a
SS
757static int store_dev_info(int domid, CharDriverState *cs, const char *string)
758{
759 struct xs_handle *xs = NULL;
760 char *path = NULL;
761 char *newpath = NULL;
762 char *pts = NULL;
763 int ret = -1;
764
765 /* Only continue if we're talking to a pty. */
766 if (strncmp(cs->filename, "pty:", 4)) {
767 return 0;
768 }
769 pts = cs->filename + 4;
770
771 /* We now have everything we need to set the xenstore entry. */
772 xs = xs_open(0);
773 if (xs == NULL) {
774 fprintf(stderr, "Could not contact XenStore\n");
775 goto out;
776 }
777
778 path = xs_get_domain_path(xs, domid);
779 if (path == NULL) {
780 fprintf(stderr, "xs_get_domain_path() error\n");
781 goto out;
782 }
783 newpath = realloc(path, (strlen(path) + strlen(string) +
784 strlen("/tty") + 1));
785 if (newpath == NULL) {
786 fprintf(stderr, "realloc error\n");
787 goto out;
788 }
789 path = newpath;
790
791 strcat(path, string);
792 strcat(path, "/tty");
793 if (!xs_write(xs, XBT_NULL, path, pts, strlen(pts))) {
794 fprintf(stderr, "xs_write for '%s' fail", string);
795 goto out;
796 }
797 ret = 0;
798
799out:
800 free(path);
801 xs_close(xs);
802
803 return ret;
804}
805
806void xenstore_store_pv_console_info(int i, CharDriverState *chr)
807{
808 if (i == 0) {
809 store_dev_info(xen_domid, chr, "/console");
810 } else {
811 char buf[32];
812 snprintf(buf, sizeof(buf), "/device/console/%d", i);
813 store_dev_info(xen_domid, chr, buf);
814 }
815}
816
fb4bb2b5 817static void xenstore_record_dm_state(struct xs_handle *xs, const char *state)
29321335
AP
818{
819 char path[50];
820
fb4bb2b5
AP
821 if (xs == NULL) {
822 fprintf(stderr, "xenstore connection not initialized\n");
823 exit(1);
824 }
825
29321335 826 snprintf(path, sizeof (path), "/local/domain/0/device-model/%u/state", xen_domid);
fb4bb2b5 827 if (!xs_write(xs, XBT_NULL, path, state, strlen(state))) {
29321335
AP
828 fprintf(stderr, "error recording dm state\n");
829 exit(1);
830 }
831}
832
9ce94e7c
AS
833static void xen_main_loop_prepare(XenIOState *state)
834{
835 int evtchn_fd = -1;
836
837 if (state->xce_handle != XC_HANDLER_INITIAL_VALUE) {
838 evtchn_fd = xc_evtchn_fd(state->xce_handle);
839 }
840
841 state->buffered_io_timer = qemu_new_timer_ms(rt_clock, handle_buffered_io,
842 state);
843 qemu_mod_timer(state->buffered_io_timer, qemu_get_clock_ms(rt_clock));
844
845 if (evtchn_fd != -1) {
846 qemu_set_fd_handler(evtchn_fd, cpu_handle_ioreq, NULL, state);
847 }
848}
849
850
3285cf4f
AP
851/* Initialise Xen */
852
1dfb4dd9
LC
853static void xen_change_state_handler(void *opaque, int running,
854 RunState state)
fb4bb2b5
AP
855{
856 if (running) {
857 /* record state running */
858 xenstore_record_dm_state(xenstore, "running");
859 }
860}
861
1dfb4dd9
LC
862static void xen_hvm_change_state_handler(void *opaque, int running,
863 RunState rstate)
9ce94e7c 864{
1dfb4dd9 865 XenIOState *xstate = opaque;
9ce94e7c 866 if (running) {
1dfb4dd9 867 xen_main_loop_prepare(xstate);
9ce94e7c
AS
868 }
869}
870
9e8dd451 871static void xen_exit_notifier(Notifier *n, void *data)
9ce94e7c
AS
872{
873 XenIOState *state = container_of(n, XenIOState, exit);
874
875 xc_evtchn_close(state->xce_handle);
29321335 876 xs_daemon_close(state->xenstore);
9ce94e7c
AS
877}
878
3285cf4f
AP
879int xen_init(void)
880{
881 xen_xc = xen_xc_interface_open(0, 0, 0);
882 if (xen_xc == XC_HANDLER_INITIAL_VALUE) {
883 xen_be_printf(NULL, 0, "can't open xen interface\n");
884 return -1;
885 }
fb4bb2b5 886 qemu_add_vm_change_state_handler(xen_change_state_handler, NULL);
3285cf4f
AP
887
888 return 0;
889}
29d3ccde
AP
890
891int xen_hvm_init(void)
892{
9ce94e7c
AS
893 int i, rc;
894 unsigned long ioreq_pfn;
895 XenIOState *state;
896
7267c094 897 state = g_malloc0(sizeof (XenIOState));
9ce94e7c
AS
898
899 state->xce_handle = xen_xc_evtchn_open(NULL, 0);
900 if (state->xce_handle == XC_HANDLER_INITIAL_VALUE) {
901 perror("xen: event channel open");
902 return -errno;
903 }
904
29321335
AP
905 state->xenstore = xs_daemon_open();
906 if (state->xenstore == NULL) {
907 perror("xen: xenstore open");
908 return -errno;
909 }
910
9ce94e7c
AS
911 state->exit.notify = xen_exit_notifier;
912 qemu_add_exit_notifier(&state->exit);
913
914 xc_get_hvm_param(xen_xc, xen_domid, HVM_PARAM_IOREQ_PFN, &ioreq_pfn);
915 DPRINTF("shared page at pfn %lx\n", ioreq_pfn);
916 state->shared_page = xc_map_foreign_range(xen_xc, xen_domid, XC_PAGE_SIZE,
917 PROT_READ|PROT_WRITE, ioreq_pfn);
918 if (state->shared_page == NULL) {
919 hw_error("map shared IO page returned error %d handle=" XC_INTERFACE_FMT,
920 errno, xen_xc);
921 }
922
923 xc_get_hvm_param(xen_xc, xen_domid, HVM_PARAM_BUFIOREQ_PFN, &ioreq_pfn);
924 DPRINTF("buffered io page at pfn %lx\n", ioreq_pfn);
925 state->buffered_io_page = xc_map_foreign_range(xen_xc, xen_domid, XC_PAGE_SIZE,
926 PROT_READ|PROT_WRITE, ioreq_pfn);
927 if (state->buffered_io_page == NULL) {
928 hw_error("map buffered IO page returned error %d", errno);
929 }
930
7267c094 931 state->ioreq_local_port = g_malloc0(smp_cpus * sizeof (evtchn_port_t));
9ce94e7c
AS
932
933 /* FIXME: how about if we overflow the page here? */
934 for (i = 0; i < smp_cpus; i++) {
935 rc = xc_evtchn_bind_interdomain(state->xce_handle, xen_domid,
936 xen_vcpu_eport(state->shared_page, i));
937 if (rc == -1) {
938 fprintf(stderr, "bind interdomain ioctl error %d\n", errno);
939 return -1;
940 }
941 state->ioreq_local_port[i] = rc;
942 }
943
432d268c 944 /* Init RAM management */
e41d7c69 945 xen_map_cache_init();
432d268c
JN
946 xen_ram_init(ram_size);
947
fb4bb2b5 948 qemu_add_vm_change_state_handler(xen_hvm_change_state_handler, state);
9ce94e7c 949
b4dd7802
AP
950 state->client = xen_cpu_phys_memory_client;
951 QLIST_INIT(&state->physmap);
952 cpu_register_phys_memory_client(&state->client);
953 state->log_for_dirtybit = NULL;
954
ad35a7da
SS
955 /* Initialize backend core & drivers */
956 if (xen_be_init() != 0) {
957 fprintf(stderr, "%s: xen backend core setup failed\n", __FUNCTION__);
958 exit(1);
959 }
960 xen_be_register("console", &xen_console_ops);
37cdfcf1 961 xen_be_register("vkbd", &xen_kbdmouse_ops);
ad35a7da
SS
962 xen_be_register("qdisk", &xen_blkdev_ops);
963
29d3ccde
AP
964 return 0;
965}
9ce94e7c
AS
966
967void destroy_hvm_domain(void)
968{
969 XenXC xc_handle;
970 int sts;
971
972 xc_handle = xen_xc_interface_open(0, 0, 0);
973 if (xc_handle == XC_HANDLER_INITIAL_VALUE) {
974 fprintf(stderr, "Cannot acquire xenctrl handle\n");
975 } else {
976 sts = xc_domain_shutdown(xc_handle, xen_domid, SHUTDOWN_poweroff);
977 if (sts != 0) {
978 fprintf(stderr, "? xc_domain_shutdown failed to issue poweroff, "
979 "sts %d, %s\n", sts, strerror(errno));
980 } else {
981 fprintf(stderr, "Issued domain %d poweroff\n", xen_domid);
982 }
983 xc_interface_close(xc_handle);
984 }
985}
c65adf9b
AK
986
987void xen_register_framebuffer(MemoryRegion *mr)
988{
989 framebuffer = mr;
990}