qemu-kvm: Process exit requests in kvm loop
[qemu-kvm/amd-iommu.git] / qemu-kvm.h
blobba3808a83eec30c53b209dc3bfc6c5d925e6c852
1 /*
2 * qemu/kvm integration
4 * Copyright (C) 2006-2008 Qumranet Technologies
6 * Licensed under the terms of the GNU GPL version 2 or higher.
7 */
8 #ifndef THE_ORIGINAL_AND_TRUE_QEMU_KVM_H
9 #define THE_ORIGINAL_AND_TRUE_QEMU_KVM_H
11 #include "cpu.h"
13 #include <signal.h>
14 #include <stdlib.h>
16 #ifdef CONFIG_KVM
18 #if defined(__s390__)
19 #include <asm/ptrace.h>
20 #endif
22 #include <stdint.h>
24 #ifndef __user
25 #define __user /* temporary, until installed via make headers_install */
26 #endif
28 #include <linux/kvm.h>
30 #include <signal.h>
32 /* FIXME: share this number with kvm */
33 /* FIXME: or dynamically alloc/realloc regions */
34 #ifdef __s390__
35 #define KVM_MAX_NUM_MEM_REGIONS 1u
36 #define MAX_VCPUS 64
37 #define LIBKVM_S390_ORIGIN (0UL)
38 #elif defined(__ia64__)
39 #define KVM_MAX_NUM_MEM_REGIONS 32u
40 #define MAX_VCPUS 256
41 #else
42 #define KVM_MAX_NUM_MEM_REGIONS 32u
43 #define MAX_VCPUS 16
44 #endif
46 /* kvm abi verison variable */
47 extern int kvm_abi;
49 /**
50 * \brief The KVM context
52 * The verbose KVM context
55 struct kvm_context {
56 void *opaque;
57 /// is dirty pages logging enabled for all regions or not
58 int dirty_pages_log_all;
59 /// do not create in-kernel irqchip if set
60 int no_irqchip_creation;
61 /// in-kernel irqchip status
62 int irqchip_in_kernel;
63 /// ioctl to use to inject interrupts
64 int irqchip_inject_ioctl;
65 /// do not create in-kernel pit if set
66 int no_pit_creation;
67 #ifdef KVM_CAP_IRQ_ROUTING
68 struct kvm_irq_routing *irq_routes;
69 int nr_allocated_irq_routes;
70 #endif
71 void *used_gsi_bitmap;
72 int max_gsi;
75 typedef struct kvm_context *kvm_context_t;
77 #include "kvm.h"
78 int kvm_alloc_kernel_memory(kvm_context_t kvm, unsigned long memory,
79 void **vm_mem);
80 int kvm_alloc_userspace_memory(kvm_context_t kvm, unsigned long memory,
81 void **vm_mem);
83 int kvm_arch_create(kvm_context_t kvm, unsigned long phys_mem_bytes,
84 void **vm_mem);
86 int kvm_arch_run(CPUState *env);
89 void kvm_show_code(CPUState *env);
91 int handle_halt(CPUState *env);
93 int handle_shutdown(kvm_context_t kvm, CPUState *env);
94 void post_kvm_run(kvm_context_t kvm, CPUState *env);
95 int pre_kvm_run(kvm_context_t kvm, CPUState *env);
96 int handle_io_window(kvm_context_t kvm);
97 int try_push_interrupts(kvm_context_t kvm);
99 #if defined(__x86_64__) || defined(__i386__)
100 struct kvm_msr_list *kvm_get_msr_list(kvm_context_t);
101 int kvm_get_msrs(CPUState *env, struct kvm_msr_entry *msrs, int n);
102 int kvm_set_msrs(CPUState *env, struct kvm_msr_entry *msrs, int n);
103 int kvm_get_mce_cap_supported(kvm_context_t, uint64_t *mce_cap,
104 int *max_banks);
105 int kvm_setup_mce(CPUState *env, uint64_t *mcg_cap);
106 struct kvm_x86_mce;
107 int kvm_set_mce(CPUState *env, struct kvm_x86_mce *mce);
108 #endif
111 * \brief Create new KVM context
113 * This creates a new kvm_context. A KVM context is a small area of data that
114 * holds information about the KVM instance that gets created by this call.\n
115 * This should always be your first call to KVM.
117 * \param opaque Not used
118 * \return NULL on failure
120 int kvm_init(int smp_cpus);
123 * \brief Disable the in-kernel IRQCHIP creation
125 * In-kernel irqchip is enabled by default. If userspace irqchip is to be used,
126 * this should be called prior to kvm_create().
128 * \param kvm Pointer to the kvm_context
130 void kvm_disable_irqchip_creation(kvm_context_t kvm);
133 * \brief Disable the in-kernel PIT creation
135 * In-kernel pit is enabled by default. If userspace pit is to be used,
136 * this should be called prior to kvm_create().
138 * \param kvm Pointer to the kvm_context
140 void kvm_disable_pit_creation(kvm_context_t kvm);
143 * \brief Create new virtual machine
145 * This creates a new virtual machine, maps physical RAM to it, and creates a
146 * virtual CPU for it.\n
147 * \n
148 * Memory gets mapped for addresses 0->0xA0000, 0xC0000->phys_mem_bytes
150 * \param kvm Pointer to the current kvm_context
151 * \param phys_mem_bytes The amount of physical ram you want the VM to have
152 * \param phys_mem This pointer will be set to point to the memory that
153 * kvm_create allocates for physical RAM
154 * \return 0 on success
156 int kvm_create(kvm_context_t kvm, unsigned long phys_mem_bytes,
157 void **phys_mem);
158 int kvm_create_vm(kvm_context_t kvm);
159 void kvm_create_irqchip(kvm_context_t kvm);
162 * \brief Start the VCPU
164 * This starts the VCPU and virtualization is started.\n
165 * \n
166 * This function will not return until any of these conditions are met:
167 * - An IO/MMIO handler does not return "0"
168 * - An exception that neither the guest OS, nor KVM can handle occurs
170 * \note This function will call the callbacks registered in kvm_init()
171 * to emulate those functions
172 * \note If you at any point want to interrupt the VCPU, kvm_run() will
173 * listen to the EINTR signal. This allows you to simulate external interrupts
174 * and asyncronous IO.
176 * \param kvm Pointer to the current kvm_context
177 * \param vcpu Which virtual CPU should be started
178 * \return 0 on success, but you really shouldn't expect this function to
179 * return except for when an error has occured, or when you have sent it
180 * an EINTR signal.
182 int kvm_run(CPUState *env);
185 * \brief Check if a vcpu is ready for interrupt injection
187 * This checks if vcpu interrupts are not masked by mov ss or sti.
189 * \param kvm Pointer to the current kvm_context
190 * \param vcpu Which virtual CPU should get dumped
191 * \return boolean indicating interrupt injection readiness
193 int kvm_is_ready_for_interrupt_injection(CPUState *env);
196 * \brief Read VCPU registers
198 * This gets the GP registers from the VCPU and outputs them
199 * into a kvm_regs structure
201 * \note This function returns a \b copy of the VCPUs registers.\n
202 * If you wish to modify the VCPUs GP registers, you should call kvm_set_regs()
204 * \param kvm Pointer to the current kvm_context
205 * \param vcpu Which virtual CPU should get dumped
206 * \param regs Pointer to a kvm_regs which will be populated with the VCPUs
207 * registers values
208 * \return 0 on success
210 int kvm_get_regs(CPUState *env, struct kvm_regs *regs);
213 * \brief Write VCPU registers
215 * This sets the GP registers on the VCPU from a kvm_regs structure
217 * \note When this function returns, the regs pointer and the data it points to
218 * can be discarded
219 * \param kvm Pointer to the current kvm_context
220 * \param vcpu Which virtual CPU should get dumped
221 * \param regs Pointer to a kvm_regs which will be populated with the VCPUs
222 * registers values
223 * \return 0 on success
225 int kvm_set_regs(CPUState *env, struct kvm_regs *regs);
227 * \brief Read VCPU fpu registers
229 * This gets the FPU registers from the VCPU and outputs them
230 * into a kvm_fpu structure
232 * \note This function returns a \b copy of the VCPUs registers.\n
233 * If you wish to modify the VCPU FPU registers, you should call kvm_set_fpu()
235 * \param kvm Pointer to the current kvm_context
236 * \param vcpu Which virtual CPU should get dumped
237 * \param fpu Pointer to a kvm_fpu which will be populated with the VCPUs
238 * fpu registers values
239 * \return 0 on success
241 int kvm_get_fpu(CPUState *env, struct kvm_fpu *fpu);
244 * \brief Write VCPU fpu registers
246 * This sets the FPU registers on the VCPU from a kvm_fpu structure
248 * \note When this function returns, the fpu pointer and the data it points to
249 * can be discarded
250 * \param kvm Pointer to the current kvm_context
251 * \param vcpu Which virtual CPU should get dumped
252 * \param fpu Pointer to a kvm_fpu which holds the new vcpu fpu state
253 * \return 0 on success
255 int kvm_set_fpu(CPUState *env, struct kvm_fpu *fpu);
258 * \brief Read VCPU system registers
260 * This gets the non-GP registers from the VCPU and outputs them
261 * into a kvm_sregs structure
263 * \note This function returns a \b copy of the VCPUs registers.\n
264 * If you wish to modify the VCPUs non-GP registers, you should call
265 * kvm_set_sregs()
267 * \param kvm Pointer to the current kvm_context
268 * \param vcpu Which virtual CPU should get dumped
269 * \param regs Pointer to a kvm_sregs which will be populated with the VCPUs
270 * registers values
271 * \return 0 on success
273 int kvm_get_sregs(CPUState *env, struct kvm_sregs *regs);
276 * \brief Write VCPU system registers
278 * This sets the non-GP registers on the VCPU from a kvm_sregs structure
280 * \note When this function returns, the regs pointer and the data it points to
281 * can be discarded
282 * \param kvm Pointer to the current kvm_context
283 * \param vcpu Which virtual CPU should get dumped
284 * \param regs Pointer to a kvm_sregs which will be populated with the VCPUs
285 * registers values
286 * \return 0 on success
288 int kvm_set_sregs(CPUState *env, struct kvm_sregs *regs);
290 #ifdef KVM_CAP_MP_STATE
292 * * \brief Read VCPU MP state
295 int kvm_get_mpstate(CPUState *env, struct kvm_mp_state *mp_state);
298 * * \brief Write VCPU MP state
301 int kvm_set_mpstate(CPUState *env, struct kvm_mp_state *mp_state);
302 #endif
305 * \brief Simulate an external vectored interrupt
307 * This allows you to simulate an external vectored interrupt.
309 * \param kvm Pointer to the current kvm_context
310 * \param vcpu Which virtual CPU should get dumped
311 * \param irq Vector number
312 * \return 0 on success
314 int kvm_inject_irq(CPUState *env, unsigned irq);
316 #if defined(__i386__) || defined(__x86_64__)
318 * \brief Setup a vcpu's cpuid instruction emulation
320 * Set up a table of cpuid function to cpuid outputs.\n
322 * \param kvm Pointer to the current kvm_context
323 * \param vcpu Which virtual CPU should be initialized
324 * \param nent number of entries to be installed
325 * \param entries cpuid function entries table
326 * \return 0 on success, or -errno on error
328 int kvm_setup_cpuid(CPUState *env, int nent,
329 struct kvm_cpuid_entry *entries);
332 * \brief Setup a vcpu's cpuid instruction emulation
334 * Set up a table of cpuid function to cpuid outputs.
335 * This call replaces the older kvm_setup_cpuid interface by adding a few
336 * parameters to support cpuid functions that have sub-leaf values.
338 * \param kvm Pointer to the current kvm_context
339 * \param vcpu Which virtual CPU should be initialized
340 * \param nent number of entries to be installed
341 * \param entries cpuid function entries table
342 * \return 0 on success, or -errno on error
344 int kvm_setup_cpuid2(CPUState *env, int nent,
345 struct kvm_cpuid_entry2 *entries);
348 * \brief Setting the number of shadow pages to be allocated to the vm
350 * \param kvm pointer to kvm_context
351 * \param nrshadow_pages number of pages to be allocated
353 int kvm_set_shadow_pages(kvm_context_t kvm, unsigned int nrshadow_pages);
356 * \brief Getting the number of shadow pages that are allocated to the vm
358 * \param kvm pointer to kvm_context
359 * \param nrshadow_pages number of pages to be allocated
361 int kvm_get_shadow_pages(kvm_context_t kvm, unsigned int *nrshadow_pages);
363 #endif
366 * \brief Dump VCPU registers
368 * This dumps some of the information that KVM has about a virtual CPU, namely:
369 * - GP Registers
371 * A much more verbose version of this is available as kvm_dump_vcpu()
373 * \param kvm Pointer to the current kvm_context
374 * \param vcpu Which virtual CPU should get dumped
375 * \return 0 on success
377 void kvm_show_regs(CPUState *env);
380 void *kvm_create_phys_mem(kvm_context_t, unsigned long phys_start,
381 unsigned long len, int log, int writable);
382 void kvm_destroy_phys_mem(kvm_context_t, unsigned long phys_start,
383 unsigned long len);
384 void kvm_unregister_memory_area(kvm_context_t, uint64_t phys_start,
385 unsigned long len);
387 int kvm_is_containing_region(kvm_context_t kvm, unsigned long phys_start,
388 unsigned long size);
389 int kvm_register_phys_mem(kvm_context_t kvm, unsigned long phys_start,
390 void *userspace_addr, unsigned long len, int log);
391 int kvm_get_dirty_pages(kvm_context_t, unsigned long phys_addr, void *buf);
392 int kvm_get_dirty_pages_range(kvm_context_t kvm, unsigned long phys_addr,
393 unsigned long end_addr, void *opaque,
394 int (*cb)(unsigned long start,
395 unsigned long len, void *bitmap,
396 void *opaque));
397 int kvm_register_coalesced_mmio(kvm_context_t kvm, uint64_t addr,
398 uint32_t size);
399 int kvm_unregister_coalesced_mmio(kvm_context_t kvm, uint64_t addr,
400 uint32_t size);
403 * \brief Create a memory alias
405 * Aliases a portion of physical memory to another portion. If the guest
406 * accesses the alias region, it will behave exactly as if it accessed
407 * the target memory.
409 int kvm_create_memory_alias(kvm_context_t, uint64_t phys_start, uint64_t len,
410 uint64_t target_phys);
413 * \brief Destroy a memory alias
415 * Removes an alias created with kvm_create_memory_alias().
417 int kvm_destroy_memory_alias(kvm_context_t, uint64_t phys_start);
420 * \brief Get a bitmap of guest ram pages which are allocated to the guest.
422 * \param kvm Pointer to the current kvm_context
423 * \param phys_addr Memory slot phys addr
424 * \param bitmap Long aligned address of a big enough bitmap (one bit per page)
426 int kvm_get_mem_map(kvm_context_t kvm, unsigned long phys_addr, void *bitmap);
427 int kvm_get_mem_map_range(kvm_context_t kvm, unsigned long phys_addr,
428 unsigned long len, void *buf, void *opaque,
429 int (*cb)(unsigned long start,
430 unsigned long len, void *bitmap,
431 void *opaque));
432 int kvm_set_irq_level(kvm_context_t kvm, int irq, int level, int *status);
434 int kvm_dirty_pages_log_enable_slot(kvm_context_t kvm, uint64_t phys_start,
435 uint64_t len);
436 int kvm_dirty_pages_log_disable_slot(kvm_context_t kvm, uint64_t phys_start,
437 uint64_t len);
439 * \brief Enable dirty-pages-logging for all memory regions
441 * \param kvm Pointer to the current kvm_context
443 int kvm_dirty_pages_log_enable_all(kvm_context_t kvm);
446 * \brief Disable dirty-page-logging for some memory regions
448 * Disable dirty-pages-logging for those memory regions that were
449 * created with dirty-page-logging disabled.
451 * \param kvm Pointer to the current kvm_context
453 int kvm_dirty_pages_log_reset(kvm_context_t kvm);
455 #ifdef KVM_CAP_IRQCHIP
457 * \brief Dump in kernel IRQCHIP contents
459 * Dump one of the in kernel irq chip devices, including PIC (master/slave)
460 * and IOAPIC into a kvm_irqchip structure
462 * \param kvm Pointer to the current kvm_context
463 * \param chip The irq chip device to be dumped
465 int kvm_get_irqchip(kvm_context_t kvm, struct kvm_irqchip *chip);
468 * \brief Set in kernel IRQCHIP contents
470 * Write one of the in kernel irq chip devices, including PIC (master/slave)
471 * and IOAPIC
474 * \param kvm Pointer to the current kvm_context
475 * \param chip THe irq chip device to be written
477 int kvm_set_irqchip(kvm_context_t kvm, struct kvm_irqchip *chip);
479 #if defined(__i386__) || defined(__x86_64__)
481 * \brief Get in kernel local APIC for vcpu
483 * Save the local apic state including the timer of a virtual CPU
485 * \param kvm Pointer to the current kvm_context
486 * \param vcpu Which virtual CPU should be accessed
487 * \param s Local apic state of the specific virtual CPU
489 int kvm_get_lapic(CPUState *env, struct kvm_lapic_state *s);
492 * \brief Set in kernel local APIC for vcpu
494 * Restore the local apic state including the timer of a virtual CPU
496 * \param kvm Pointer to the current kvm_context
497 * \param vcpu Which virtual CPU should be accessed
498 * \param s Local apic state of the specific virtual CPU
500 int kvm_set_lapic(CPUState *env, struct kvm_lapic_state *s);
502 #endif
505 * \brief Simulate an NMI
507 * This allows you to simulate a non-maskable interrupt.
509 * \param kvm Pointer to the current kvm_context
510 * \param vcpu Which virtual CPU should get dumped
511 * \return 0 on success
513 int kvm_inject_nmi(CPUState *env);
515 #endif
518 * \brief Simulate an x86 MCE
520 * This allows you to simulate a x86 MCE.
522 * \param cenv Which virtual CPU should get MCE injected
523 * \param bank Bank number
524 * \param status MSR_MCI_STATUS
525 * \param mcg_status MSR_MCG_STATUS
526 * \param addr MSR_MCI_ADDR
527 * \param misc MSR_MCI_MISC
528 * \param abort_on_error abort on error
530 void kvm_inject_x86_mce(CPUState *cenv, int bank, uint64_t status,
531 uint64_t mcg_status, uint64_t addr, uint64_t misc,
532 int abort_on_error);
535 * \brief Initialize coalesced MMIO
537 * Check for coalesced MMIO capability and store in context
539 * \param kvm Pointer to the current kvm_context
541 int kvm_init_coalesced_mmio(kvm_context_t kvm);
543 #ifdef KVM_CAP_PIT
545 #if defined(__i386__) || defined(__x86_64__)
547 * \brief Get in kernel PIT of the virtual domain
549 * Save the PIT state.
551 * \param kvm Pointer to the current kvm_context
552 * \param s PIT state of the virtual domain
554 int kvm_get_pit(kvm_context_t kvm, struct kvm_pit_state *s);
557 * \brief Set in kernel PIT of the virtual domain
559 * Restore the PIT state.
560 * Timer would be retriggerred after restored.
562 * \param kvm Pointer to the current kvm_context
563 * \param s PIT state of the virtual domain
565 int kvm_set_pit(kvm_context_t kvm, struct kvm_pit_state *s);
567 int kvm_reinject_control(kvm_context_t kvm, int pit_reinject);
569 #ifdef KVM_CAP_PIT_STATE2
571 * \brief Check for kvm support of kvm_pit_state2
573 * \param kvm Pointer to the current kvm_context
574 * \return 0 on success
576 int kvm_has_pit_state2(kvm_context_t kvm);
579 * \brief Set in kernel PIT state2 of the virtual domain
582 * \param kvm Pointer to the current kvm_context
583 * \param ps2 PIT state2 of the virtual domain
584 * \return 0 on success
586 int kvm_set_pit2(kvm_context_t kvm, struct kvm_pit_state2 *ps2);
589 * \brief Get in kernel PIT state2 of the virtual domain
592 * \param kvm Pointer to the current kvm_context
593 * \param ps2 PIT state2 of the virtual domain
594 * \return 0 on success
596 int kvm_get_pit2(kvm_context_t kvm, struct kvm_pit_state2 *ps2);
598 #endif
599 #endif
600 #endif
602 #ifdef KVM_CAP_VAPIC
604 int kvm_enable_vapic(CPUState *env, uint64_t vapic);
606 #endif
608 #if defined(__s390__)
609 int kvm_s390_initial_reset(kvm_context_t kvm, int slot);
610 int kvm_s390_interrupt(kvm_context_t kvm, int slot,
611 struct kvm_s390_interrupt *kvmint);
612 int kvm_s390_set_initial_psw(kvm_context_t kvm, int slot, psw_t psw);
613 int kvm_s390_store_status(kvm_context_t kvm, int slot, unsigned long addr);
614 #endif
616 #ifdef KVM_CAP_DEVICE_ASSIGNMENT
618 * \brief Notifies host kernel about a PCI device to be assigned to a guest
620 * Used for PCI device assignment, this function notifies the host
621 * kernel about the assigning of the physical PCI device to a guest.
623 * \param kvm Pointer to the current kvm_context
624 * \param assigned_dev Parameters, like bus, devfn number, etc
626 int kvm_assign_pci_device(kvm_context_t kvm,
627 struct kvm_assigned_pci_dev *assigned_dev);
630 * \brief Assign IRQ for an assigned device
632 * Used for PCI device assignment, this function assigns IRQ numbers for
633 * an physical device and guest IRQ handling.
635 * \param kvm Pointer to the current kvm_context
636 * \param assigned_irq Parameters, like dev id, host irq, guest irq, etc
638 int kvm_assign_irq(kvm_context_t kvm, struct kvm_assigned_irq *assigned_irq);
640 #ifdef KVM_CAP_ASSIGN_DEV_IRQ
642 * \brief Deassign IRQ for an assigned device
644 * Used for PCI device assignment, this function deassigns IRQ numbers
645 * for an assigned device.
647 * \param kvm Pointer to the current kvm_context
648 * \param assigned_irq Parameters, like dev id, host irq, guest irq, etc
650 int kvm_deassign_irq(kvm_context_t kvm, struct kvm_assigned_irq *assigned_irq);
651 #endif
652 #endif
655 * \brief Determines whether destroying memory regions is allowed
657 * KVM before 2.6.29 had a bug when destroying memory regions.
659 * \param kvm Pointer to the current kvm_context
661 int kvm_destroy_memory_region_works(kvm_context_t kvm);
663 #ifdef KVM_CAP_DEVICE_DEASSIGNMENT
665 * \brief Notifies host kernel about a PCI device to be deassigned from a guest
667 * Used for hot remove PCI device, this function notifies the host
668 * kernel about the deassigning of the physical PCI device from a guest.
670 * \param kvm Pointer to the current kvm_context
671 * \param assigned_dev Parameters, like bus, devfn number, etc
673 int kvm_deassign_pci_device(kvm_context_t kvm,
674 struct kvm_assigned_pci_dev *assigned_dev);
675 #endif
678 * \brief Checks whether the generic irq routing capability is present
680 * Checks whether kvm can reroute interrupts among the various interrupt
681 * controllers.
683 * \param kvm Pointer to the current kvm_context
685 int kvm_has_gsi_routing(kvm_context_t kvm);
688 * \brief Determines the number of gsis that can be routed
690 * Returns the number of distinct gsis that can be routed by kvm. This is
691 * also the number of distinct routes (if a gsi has two routes, than another
692 * gsi cannot be used...)
694 * \param kvm Pointer to the current kvm_context
696 int kvm_get_gsi_count(kvm_context_t kvm);
699 * \brief Clears the temporary irq routing table
701 * Clears the temporary irq routing table. Nothing is committed to the
702 * running VM.
704 * \param kvm Pointer to the current kvm_context
706 int kvm_clear_gsi_routes(kvm_context_t kvm);
709 * \brief Adds an irq route to the temporary irq routing table
711 * Adds an irq route to the temporary irq routing table. Nothing is
712 * committed to the running VM.
714 * \param kvm Pointer to the current kvm_context
716 int kvm_add_irq_route(kvm_context_t kvm, int gsi, int irqchip, int pin);
719 * \brief Removes an irq route from the temporary irq routing table
721 * Adds an irq route to the temporary irq routing table. Nothing is
722 * committed to the running VM.
724 * \param kvm Pointer to the current kvm_context
726 int kvm_del_irq_route(kvm_context_t kvm, int gsi, int irqchip, int pin);
728 struct kvm_irq_routing_entry;
730 * \brief Adds a routing entry to the temporary irq routing table
732 * Adds a filled routing entry to the temporary irq routing table. Nothing is
733 * committed to the running VM.
735 * \param kvm Pointer to the current kvm_context
737 int kvm_add_routing_entry(kvm_context_t kvm,
738 struct kvm_irq_routing_entry *entry);
741 * \brief Removes a routing from the temporary irq routing table
743 * Remove a routing to the temporary irq routing table. Nothing is
744 * committed to the running VM.
746 * \param kvm Pointer to the current kvm_context
748 int kvm_del_routing_entry(kvm_context_t kvm,
749 struct kvm_irq_routing_entry *entry);
752 * \brief Updates a routing in the temporary irq routing table
754 * Update a routing in the temporary irq routing table
755 * with a new value. entry type and GSI can not be changed.
756 * Nothing is committed to the running VM.
758 * \param kvm Pointer to the current kvm_context
760 int kvm_update_routing_entry(kvm_context_t kvm,
761 struct kvm_irq_routing_entry *entry,
762 struct kvm_irq_routing_entry *newentry);
765 * \brief Commit the temporary irq routing table
767 * Commit the temporary irq routing table to the running VM.
769 * \param kvm Pointer to the current kvm_context
771 int kvm_commit_irq_routes(kvm_context_t kvm);
774 * \brief Get unused GSI number for irq routing table
776 * Get unused GSI number for irq routing table
778 * \param kvm Pointer to the current kvm_context
780 int kvm_get_irq_route_gsi(kvm_context_t kvm);
783 * \brief Create a file descriptor for injecting interrupts
785 * Creates an eventfd based file-descriptor that maps to a specific GSI
786 * in the guest. eventfd compliant signaling (write() from userspace, or
787 * eventfd_signal() from kernelspace) will cause the GSI to inject
788 * itself into the guest at the next available window.
790 * \param kvm Pointer to the current kvm_context
791 * \param gsi GSI to assign to this fd
792 * \param flags reserved, must be zero
794 int kvm_irqfd(kvm_context_t kvm, int gsi, int flags);
796 #ifdef KVM_CAP_DEVICE_MSIX
797 int kvm_assign_set_msix_nr(kvm_context_t kvm,
798 struct kvm_assigned_msix_nr *msix_nr);
799 int kvm_assign_set_msix_entry(kvm_context_t kvm,
800 struct kvm_assigned_msix_entry *entry);
801 #endif
803 #else /* !CONFIG_KVM */
805 typedef struct kvm_context *kvm_context_t;
806 typedef struct kvm_vcpu_context *kvm_vcpu_context_t;
808 struct kvm_pit_state {
811 static inline int kvm_init(int smp_cpus)
813 return 0;
816 static inline void kvm_inject_x86_mce(CPUState *cenv, int bank,
817 uint64_t status, uint64_t mcg_status,
818 uint64_t addr, uint64_t misc,
819 int abort_on_error)
821 if (abort_on_error)
822 abort();
825 #endif /* !CONFIG_KVM */
828 int kvm_main_loop(void);
829 int kvm_init_ap(void);
830 int kvm_vcpu_inited(CPUState *env);
831 void kvm_save_lapic(CPUState *env);
832 void kvm_load_lapic(CPUState *env);
834 void kvm_hpet_enable_kpit(void);
835 void kvm_hpet_disable_kpit(void);
836 int kvm_set_irq(int irq, int level, int *status);
838 int kvm_physical_memory_set_dirty_tracking(int enable);
840 void qemu_kvm_call_with_env(void (*func)(void *), void *data, CPUState *env);
841 void qemu_kvm_cpuid_on_env(CPUState *env);
842 void kvm_inject_interrupt(CPUState *env, int mask);
843 void kvm_update_after_sipi(CPUState *env);
844 void kvm_update_interrupt_request(CPUState *env);
845 void kvm_set_phys_mem(target_phys_addr_t start_addr, ram_addr_t size,
846 ram_addr_t phys_offset);
847 void *kvm_cpu_create_phys_mem(target_phys_addr_t start_addr, unsigned long size,
848 int log, int writable);
850 void kvm_cpu_destroy_phys_mem(target_phys_addr_t start_addr,
851 unsigned long size);
852 void kvm_qemu_log_memory(target_phys_addr_t start, target_phys_addr_t size,
853 int log);
854 int kvm_qemu_create_memory_alias(uint64_t phys_start, uint64_t len,
855 uint64_t target_phys);
856 int kvm_qemu_destroy_memory_alias(uint64_t phys_start);
858 int kvm_arch_qemu_create_context(void);
860 void kvm_arch_save_regs(CPUState *env);
861 void kvm_arch_load_regs(CPUState *env, int level);
862 int kvm_arch_has_work(CPUState *env);
863 void kvm_arch_process_irqchip_events(CPUState *env);
864 int kvm_arch_try_push_interrupts(void *opaque);
865 void kvm_arch_push_nmi(void *opaque);
866 void kvm_arch_cpu_reset(CPUState *env);
867 int kvm_set_boot_cpu_id(uint32_t id);
869 void qemu_kvm_aio_wait_start(void);
870 void qemu_kvm_aio_wait(void);
871 void qemu_kvm_aio_wait_end(void);
873 void qemu_kvm_notify_work(void);
875 void kvm_tpr_access_report(CPUState *env, uint64_t rip, int is_write);
877 int kvm_arch_init_irq_routing(void);
879 int kvm_mmio_read(void *opaque, uint64_t addr, uint8_t * data, int len);
880 int kvm_mmio_write(void *opaque, uint64_t addr, uint8_t * data, int len);
882 #ifdef CONFIG_KVM_DEVICE_ASSIGNMENT
883 struct ioperm_data;
885 void kvm_ioperm(CPUState *env, void *data);
886 void kvm_add_ioperm_data(struct ioperm_data *data);
887 void kvm_remove_ioperm_data(unsigned long start_port, unsigned long num);
888 void kvm_arch_do_ioperm(void *_data);
889 #endif
891 #define ALIGN(x, y) (((x)+(y)-1) & ~((y)-1))
892 #define BITMAP_SIZE(m) (ALIGN(((m)>>TARGET_PAGE_BITS), HOST_LONG_BITS) / 8)
894 #ifdef CONFIG_KVM
895 #include "qemu-queue.h"
897 extern int kvm_irqchip;
898 extern int kvm_pit;
899 extern int kvm_pit_reinject;
900 extern int kvm_nested;
901 extern kvm_context_t kvm_context;
903 struct ioperm_data {
904 unsigned long start_port;
905 unsigned long num;
906 int turn_on;
907 QLIST_ENTRY(ioperm_data) entries;
910 void qemu_kvm_cpu_stop(CPUState *env);
911 int kvm_arch_halt(CPUState *env);
912 int handle_tpr_access(void *opaque, CPUState *env, uint64_t rip,
913 int is_write);
915 #define qemu_kvm_has_gsi_routing() kvm_has_gsi_routing(kvm_context)
916 #ifdef TARGET_I386
917 #define qemu_kvm_has_pit_state2() kvm_has_pit_state2(kvm_context)
918 #endif
919 #else
920 #define kvm_nested 0
921 #define qemu_kvm_has_gsi_routing() (0)
922 #ifdef TARGET_I386
923 #define qemu_kvm_has_pit_state2() (0)
924 #endif
925 #define qemu_kvm_cpu_stop(env) do {} while(0)
926 #endif
928 void kvm_mutex_unlock(void);
929 void kvm_mutex_lock(void);
931 int kvm_physical_sync_dirty_bitmap(target_phys_addr_t start_addr,
932 target_phys_addr_t end_addr);
935 static inline int kvm_sync_vcpus(void)
937 return 0;
940 static inline int kvm_set_migration_log(int enable)
942 return kvm_physical_memory_set_dirty_tracking(enable);
946 #ifdef CONFIG_KVM
948 typedef struct KVMSlot {
949 target_phys_addr_t start_addr;
950 ram_addr_t memory_size;
951 ram_addr_t phys_offset;
952 int slot;
953 int flags;
954 } KVMSlot;
956 typedef struct kvm_dirty_log KVMDirtyLog;
958 struct KVMState {
959 KVMSlot slots[32];
960 int fd;
961 int vmfd;
962 int coalesced_mmio;
963 #ifdef KVM_CAP_COALESCED_MMIO
964 struct kvm_coalesced_mmio_ring *coalesced_mmio_ring;
965 #endif
966 int broken_set_mem_region;
967 int migration_log;
968 int vcpu_events;
969 int robust_singlestep;
970 int debugregs;
971 #ifdef KVM_CAP_SET_GUEST_DEBUG
972 QTAILQ_HEAD(, kvm_sw_breakpoint) kvm_sw_breakpoints;
973 #endif
974 int irqchip_in_kernel;
975 int pit_in_kernel;
977 struct kvm_context kvm_context;
980 extern struct KVMState *kvm_state;
982 int kvm_tpr_enable_vapic(CPUState *env);
984 unsigned long kvm_get_thread_id(void);
985 int kvm_cpu_is_stopped(CPUState *env);
987 #endif
989 #endif