Fix error handling in msix vector add
[qemu-kvm/fedora.git] / qemu-kvm-x86.c
blob492dbc543bcd7ea9a2ed098b94fc9bfc935a4a63
1 /*
2 * qemu/kvm integration, x86 specific code
4 * Copyright (C) 2006-2008 Qumranet Technologies
6 * Licensed under the terms of the GNU GPL version 2 or higher.
7 */
9 #include "config.h"
10 #include "config-host.h"
12 #include <string.h>
13 #include "hw/hw.h"
14 #include "gdbstub.h"
15 #include <sys/io.h>
17 #include "qemu-kvm.h"
18 #include "libkvm.h"
19 #include <pthread.h>
20 #include <sys/utsname.h>
21 #include <linux/kvm_para.h>
22 #include <sys/ioctl.h>
24 #include "kvm.h"
25 #include "hw/pc.h"
27 #define MSR_IA32_TSC 0x10
29 static struct kvm_msr_list *kvm_msr_list;
30 extern unsigned int kvm_shadow_memory;
31 static int kvm_has_msr_star;
32 static int kvm_has_vm_hsave_pa;
34 static int lm_capable_kernel;
36 int kvm_set_tss_addr(kvm_context_t kvm, unsigned long addr)
38 #ifdef KVM_CAP_SET_TSS_ADDR
39 int r;
41 r = kvm_ioctl(kvm_state, KVM_CHECK_EXTENSION, KVM_CAP_SET_TSS_ADDR);
42 if (r > 0) {
43 r = kvm_vm_ioctl(kvm_state, KVM_SET_TSS_ADDR, addr);
44 if (r < 0) {
45 fprintf(stderr, "kvm_set_tss_addr: %m\n");
46 return r;
48 return 0;
50 #endif
51 return -ENOSYS;
54 static int kvm_init_tss(kvm_context_t kvm)
56 #ifdef KVM_CAP_SET_TSS_ADDR
57 int r;
59 r = kvm_ioctl(kvm_state, KVM_CHECK_EXTENSION, KVM_CAP_SET_TSS_ADDR);
60 if (r > 0) {
62 * this address is 3 pages before the bios, and the bios should present
63 * as unavaible memory
65 r = kvm_set_tss_addr(kvm, 0xfffbd000);
66 if (r < 0) {
67 fprintf(stderr, "kvm_init_tss: unable to set tss addr\n");
68 return r;
72 #endif
73 return 0;
76 static int kvm_set_identity_map_addr(kvm_context_t kvm, unsigned long addr)
78 #ifdef KVM_CAP_SET_IDENTITY_MAP_ADDR
79 int r;
81 r = kvm_ioctl(kvm_state, KVM_CHECK_EXTENSION, KVM_CAP_SET_IDENTITY_MAP_ADDR);
82 if (r > 0) {
83 r = kvm_vm_ioctl(kvm_state, KVM_SET_IDENTITY_MAP_ADDR, &addr);
84 if (r == -1) {
85 fprintf(stderr, "kvm_set_identity_map_addr: %m\n");
86 return -errno;
88 return 0;
90 #endif
91 return -ENOSYS;
94 static int kvm_init_identity_map_page(kvm_context_t kvm)
96 #ifdef KVM_CAP_SET_IDENTITY_MAP_ADDR
97 int r;
99 r = kvm_ioctl(kvm_state, KVM_CHECK_EXTENSION, KVM_CAP_SET_IDENTITY_MAP_ADDR);
100 if (r > 0) {
102 * this address is 4 pages before the bios, and the bios should present
103 * as unavaible memory
105 r = kvm_set_identity_map_addr(kvm, 0xfffbc000);
106 if (r < 0) {
107 fprintf(stderr, "kvm_init_identity_map_page: "
108 "unable to set identity mapping addr\n");
109 return r;
113 #endif
114 return 0;
117 static int kvm_create_pit(kvm_context_t kvm)
119 #ifdef KVM_CAP_PIT
120 int r;
122 kvm->pit_in_kernel = 0;
123 if (!kvm->no_pit_creation) {
124 r = kvm_ioctl(kvm_state, KVM_CHECK_EXTENSION, KVM_CAP_PIT);
125 if (r > 0) {
126 r = kvm_vm_ioctl(kvm_state, KVM_CREATE_PIT);
127 if (r >= 0)
128 kvm->pit_in_kernel = 1;
129 else {
130 fprintf(stderr, "Create kernel PIC irqchip failed\n");
131 return r;
135 #endif
136 return 0;
139 int kvm_arch_create(kvm_context_t kvm, unsigned long phys_mem_bytes,
140 void **vm_mem)
142 int r = 0;
144 r = kvm_init_tss(kvm);
145 if (r < 0)
146 return r;
148 r = kvm_init_identity_map_page(kvm);
149 if (r < 0)
150 return r;
152 r = kvm_create_pit(kvm);
153 if (r < 0)
154 return r;
156 r = kvm_init_coalesced_mmio(kvm);
157 if (r < 0)
158 return r;
160 return 0;
163 #ifdef KVM_EXIT_TPR_ACCESS
165 static int kvm_handle_tpr_access(kvm_vcpu_context_t vcpu)
167 struct kvm_run *run = vcpu->run;
168 kvm_tpr_access_report(cpu_single_env,
169 run->tpr_access.rip,
170 run->tpr_access.is_write);
171 return 0;
175 int kvm_enable_vapic(kvm_vcpu_context_t vcpu, uint64_t vapic)
177 int r;
178 struct kvm_vapic_addr va = {
179 .vapic_addr = vapic,
182 r = ioctl(vcpu->fd, KVM_SET_VAPIC_ADDR, &va);
183 if (r == -1) {
184 r = -errno;
185 perror("kvm_enable_vapic");
186 return r;
188 return 0;
191 #endif
193 int kvm_arch_run(kvm_vcpu_context_t vcpu)
195 int r = 0;
196 struct kvm_run *run = vcpu->run;
199 switch (run->exit_reason) {
200 #ifdef KVM_EXIT_SET_TPR
201 case KVM_EXIT_SET_TPR:
202 break;
203 #endif
204 #ifdef KVM_EXIT_TPR_ACCESS
205 case KVM_EXIT_TPR_ACCESS:
206 r = kvm_handle_tpr_access(vcpu);
207 break;
208 #endif
209 default:
210 r = 1;
211 break;
214 return r;
217 #define MAX_ALIAS_SLOTS 4
218 static struct {
219 uint64_t start;
220 uint64_t len;
221 } kvm_aliases[MAX_ALIAS_SLOTS];
223 static int get_alias_slot(uint64_t start)
225 int i;
227 for (i=0; i<MAX_ALIAS_SLOTS; i++)
228 if (kvm_aliases[i].start == start)
229 return i;
230 return -1;
232 static int get_free_alias_slot(void)
234 int i;
236 for (i=0; i<MAX_ALIAS_SLOTS; i++)
237 if (kvm_aliases[i].len == 0)
238 return i;
239 return -1;
242 static void register_alias(int slot, uint64_t start, uint64_t len)
244 kvm_aliases[slot].start = start;
245 kvm_aliases[slot].len = len;
248 int kvm_create_memory_alias(kvm_context_t kvm,
249 uint64_t phys_start,
250 uint64_t len,
251 uint64_t target_phys)
253 struct kvm_memory_alias alias = {
254 .flags = 0,
255 .guest_phys_addr = phys_start,
256 .memory_size = len,
257 .target_phys_addr = target_phys,
259 int r;
260 int slot;
262 slot = get_alias_slot(phys_start);
263 if (slot < 0)
264 slot = get_free_alias_slot();
265 if (slot < 0)
266 return -EBUSY;
267 alias.slot = slot;
269 r = kvm_vm_ioctl(kvm_state, KVM_SET_MEMORY_ALIAS, &alias);
270 if (r == -1)
271 return -errno;
273 register_alias(slot, phys_start, len);
274 return 0;
277 int kvm_destroy_memory_alias(kvm_context_t kvm, uint64_t phys_start)
279 return kvm_create_memory_alias(kvm, phys_start, 0, 0);
282 #ifdef KVM_CAP_IRQCHIP
284 int kvm_get_lapic(kvm_vcpu_context_t vcpu, struct kvm_lapic_state *s)
286 int r;
287 if (!kvm_irqchip_in_kernel(vcpu->kvm))
288 return 0;
289 r = ioctl(vcpu->fd, KVM_GET_LAPIC, s);
290 if (r == -1) {
291 r = -errno;
292 perror("kvm_get_lapic");
294 return r;
297 int kvm_set_lapic(kvm_vcpu_context_t vcpu, struct kvm_lapic_state *s)
299 int r;
300 if (!kvm_irqchip_in_kernel(vcpu->kvm))
301 return 0;
302 r = ioctl(vcpu->fd, KVM_SET_LAPIC, s);
303 if (r == -1) {
304 r = -errno;
305 perror("kvm_set_lapic");
307 return r;
310 #endif
312 #ifdef KVM_CAP_PIT
314 int kvm_get_pit(kvm_context_t kvm, struct kvm_pit_state *s)
316 if (!kvm->pit_in_kernel)
317 return 0;
318 return kvm_vm_ioctl(kvm_state, KVM_GET_PIT, s);
321 int kvm_set_pit(kvm_context_t kvm, struct kvm_pit_state *s)
323 if (!kvm->pit_in_kernel)
324 return 0;
325 return kvm_vm_ioctl(kvm_state, KVM_SET_PIT, s);
328 #ifdef KVM_CAP_PIT_STATE2
329 int kvm_get_pit2(kvm_context_t kvm, struct kvm_pit_state2 *ps2)
331 if (!kvm->pit_in_kernel)
332 return 0;
333 return kvm_vm_ioctl(kvm_state, KVM_GET_PIT2, ps2);
336 int kvm_set_pit2(kvm_context_t kvm, struct kvm_pit_state2 *ps2)
338 if (!kvm->pit_in_kernel)
339 return 0;
340 return kvm_vm_ioctl(kvm_state, KVM_SET_PIT2, ps2);
343 #endif
344 #endif
346 int kvm_has_pit_state2(kvm_context_t kvm)
348 int r = 0;
350 #ifdef KVM_CAP_PIT_STATE2
351 r = kvm_check_extension(kvm_state, KVM_CAP_PIT_STATE2);
352 #endif
353 return r;
356 void kvm_show_code(kvm_vcpu_context_t vcpu)
358 #define SHOW_CODE_LEN 50
359 int fd = vcpu->fd;
360 struct kvm_regs regs;
361 struct kvm_sregs sregs;
362 int r, n;
363 int back_offset;
364 unsigned char code;
365 char code_str[SHOW_CODE_LEN * 3 + 1];
366 unsigned long rip;
367 kvm_context_t kvm = vcpu->kvm;
369 r = ioctl(fd, KVM_GET_SREGS, &sregs);
370 if (r == -1) {
371 perror("KVM_GET_SREGS");
372 return;
374 r = ioctl(fd, KVM_GET_REGS, &regs);
375 if (r == -1) {
376 perror("KVM_GET_REGS");
377 return;
379 rip = sregs.cs.base + regs.rip;
380 back_offset = regs.rip;
381 if (back_offset > 20)
382 back_offset = 20;
383 *code_str = 0;
384 for (n = -back_offset; n < SHOW_CODE_LEN-back_offset; ++n) {
385 if (n == 0)
386 strcat(code_str, " -->");
387 r = kvm_mmio_read(kvm->opaque, rip + n, &code, 1);
388 if (r < 0) {
389 strcat(code_str, " xx");
390 continue;
392 sprintf(code_str + strlen(code_str), " %02x", code);
394 fprintf(stderr, "code:%s\n", code_str);
399 * Returns available msr list. User must free.
401 struct kvm_msr_list *kvm_get_msr_list(kvm_context_t kvm)
403 struct kvm_msr_list sizer, *msrs;
404 int r;
406 sizer.nmsrs = 0;
407 r = kvm_ioctl(kvm_state, KVM_GET_MSR_INDEX_LIST, &sizer);
408 if (r < 0 && r != -E2BIG)
409 return NULL;
410 /* Old kernel modules had a bug and could write beyond the provided
411 memory. Allocate at least a safe amount of 1K. */
412 msrs = qemu_malloc(MAX(1024, sizeof(*msrs) +
413 sizer.nmsrs * sizeof(*msrs->indices)));
415 msrs->nmsrs = sizer.nmsrs;
416 r = kvm_ioctl(kvm_state, KVM_GET_MSR_INDEX_LIST, msrs);
417 if (r < 0) {
418 free(msrs);
419 errno = r;
420 return NULL;
422 return msrs;
425 int kvm_get_msrs(kvm_vcpu_context_t vcpu, struct kvm_msr_entry *msrs, int n)
427 struct kvm_msrs *kmsrs = qemu_malloc(sizeof *kmsrs + n * sizeof *msrs);
428 int r, e;
430 kmsrs->nmsrs = n;
431 memcpy(kmsrs->entries, msrs, n * sizeof *msrs);
432 r = ioctl(vcpu->fd, KVM_GET_MSRS, kmsrs);
433 e = errno;
434 memcpy(msrs, kmsrs->entries, n * sizeof *msrs);
435 free(kmsrs);
436 errno = e;
437 return r;
440 int kvm_set_msrs(kvm_vcpu_context_t vcpu, struct kvm_msr_entry *msrs, int n)
442 struct kvm_msrs *kmsrs = qemu_malloc(sizeof *kmsrs + n * sizeof *msrs);
443 int r, e;
445 kmsrs->nmsrs = n;
446 memcpy(kmsrs->entries, msrs, n * sizeof *msrs);
447 r = ioctl(vcpu->fd, KVM_SET_MSRS, kmsrs);
448 e = errno;
449 free(kmsrs);
450 errno = e;
451 return r;
454 int kvm_get_mce_cap_supported(kvm_context_t kvm, uint64_t *mce_cap,
455 int *max_banks)
457 #ifdef KVM_CAP_MCE
458 int r;
460 r = kvm_ioctl(kvm_state, KVM_CHECK_EXTENSION, KVM_CAP_MCE);
461 if (r > 0) {
462 *max_banks = r;
463 return kvm_ioctl(kvm_state, KVM_X86_GET_MCE_CAP_SUPPORTED, mce_cap);
465 #endif
466 return -ENOSYS;
469 int kvm_setup_mce(kvm_vcpu_context_t vcpu, uint64_t *mcg_cap)
471 #ifdef KVM_CAP_MCE
472 return ioctl(vcpu->fd, KVM_X86_SETUP_MCE, mcg_cap);
473 #else
474 return -ENOSYS;
475 #endif
478 int kvm_set_mce(kvm_vcpu_context_t vcpu, struct kvm_x86_mce *m)
480 #ifdef KVM_CAP_MCE
481 return ioctl(vcpu->fd, KVM_X86_SET_MCE, m);
482 #else
483 return -ENOSYS;
484 #endif
487 static void print_seg(FILE *file, const char *name, struct kvm_segment *seg)
489 fprintf(stderr,
490 "%s %04x (%08llx/%08x p %d dpl %d db %d s %d type %x l %d"
491 " g %d avl %d)\n",
492 name, seg->selector, seg->base, seg->limit, seg->present,
493 seg->dpl, seg->db, seg->s, seg->type, seg->l, seg->g,
494 seg->avl);
497 static void print_dt(FILE *file, const char *name, struct kvm_dtable *dt)
499 fprintf(stderr, "%s %llx/%x\n", name, dt->base, dt->limit);
502 void kvm_show_regs(kvm_vcpu_context_t vcpu)
504 int fd = vcpu->fd;
505 struct kvm_regs regs;
506 struct kvm_sregs sregs;
507 int r;
509 r = ioctl(fd, KVM_GET_REGS, &regs);
510 if (r == -1) {
511 perror("KVM_GET_REGS");
512 return;
514 fprintf(stderr,
515 "rax %016llx rbx %016llx rcx %016llx rdx %016llx\n"
516 "rsi %016llx rdi %016llx rsp %016llx rbp %016llx\n"
517 "r8 %016llx r9 %016llx r10 %016llx r11 %016llx\n"
518 "r12 %016llx r13 %016llx r14 %016llx r15 %016llx\n"
519 "rip %016llx rflags %08llx\n",
520 regs.rax, regs.rbx, regs.rcx, regs.rdx,
521 regs.rsi, regs.rdi, regs.rsp, regs.rbp,
522 regs.r8, regs.r9, regs.r10, regs.r11,
523 regs.r12, regs.r13, regs.r14, regs.r15,
524 regs.rip, regs.rflags);
525 r = ioctl(fd, KVM_GET_SREGS, &sregs);
526 if (r == -1) {
527 perror("KVM_GET_SREGS");
528 return;
530 print_seg(stderr, "cs", &sregs.cs);
531 print_seg(stderr, "ds", &sregs.ds);
532 print_seg(stderr, "es", &sregs.es);
533 print_seg(stderr, "ss", &sregs.ss);
534 print_seg(stderr, "fs", &sregs.fs);
535 print_seg(stderr, "gs", &sregs.gs);
536 print_seg(stderr, "tr", &sregs.tr);
537 print_seg(stderr, "ldt", &sregs.ldt);
538 print_dt(stderr, "gdt", &sregs.gdt);
539 print_dt(stderr, "idt", &sregs.idt);
540 fprintf(stderr, "cr0 %llx cr2 %llx cr3 %llx cr4 %llx cr8 %llx"
541 " efer %llx\n",
542 sregs.cr0, sregs.cr2, sregs.cr3, sregs.cr4, sregs.cr8,
543 sregs.efer);
546 uint64_t kvm_get_apic_base(kvm_vcpu_context_t vcpu)
548 return vcpu->run->apic_base;
551 void kvm_set_cr8(kvm_vcpu_context_t vcpu, uint64_t cr8)
553 vcpu->run->cr8 = cr8;
556 __u64 kvm_get_cr8(kvm_vcpu_context_t vcpu)
558 return vcpu->run->cr8;
561 int kvm_setup_cpuid(kvm_vcpu_context_t vcpu, int nent,
562 struct kvm_cpuid_entry *entries)
564 struct kvm_cpuid *cpuid;
565 int r;
567 cpuid = qemu_malloc(sizeof(*cpuid) + nent * sizeof(*entries));
569 cpuid->nent = nent;
570 memcpy(cpuid->entries, entries, nent * sizeof(*entries));
571 r = ioctl(vcpu->fd, KVM_SET_CPUID, cpuid);
573 free(cpuid);
574 return r;
577 int kvm_setup_cpuid2(kvm_vcpu_context_t vcpu, int nent,
578 struct kvm_cpuid_entry2 *entries)
580 struct kvm_cpuid2 *cpuid;
581 int r;
583 cpuid = qemu_malloc(sizeof(*cpuid) + nent * sizeof(*entries));
585 cpuid->nent = nent;
586 memcpy(cpuid->entries, entries, nent * sizeof(*entries));
587 r = ioctl(vcpu->fd, KVM_SET_CPUID2, cpuid);
588 if (r == -1) {
589 fprintf(stderr, "kvm_setup_cpuid2: %m\n");
590 r = -errno;
592 free(cpuid);
593 return r;
596 int kvm_set_shadow_pages(kvm_context_t kvm, unsigned int nrshadow_pages)
598 #ifdef KVM_CAP_MMU_SHADOW_CACHE_CONTROL
599 int r;
601 r = kvm_ioctl(kvm_state, KVM_CHECK_EXTENSION,
602 KVM_CAP_MMU_SHADOW_CACHE_CONTROL);
603 if (r > 0) {
604 r = kvm_vm_ioctl(kvm_state, KVM_SET_NR_MMU_PAGES, nrshadow_pages);
605 if (r < 0) {
606 fprintf(stderr, "kvm_set_shadow_pages: %m\n");
607 return r;
609 return 0;
611 #endif
612 return -1;
615 int kvm_get_shadow_pages(kvm_context_t kvm, unsigned int *nrshadow_pages)
617 #ifdef KVM_CAP_MMU_SHADOW_CACHE_CONTROL
618 int r;
620 r = kvm_ioctl(kvm_state, KVM_CHECK_EXTENSION,
621 KVM_CAP_MMU_SHADOW_CACHE_CONTROL);
622 if (r > 0) {
623 *nrshadow_pages = kvm_vm_ioctl(kvm_state, KVM_GET_NR_MMU_PAGES);
624 return 0;
626 #endif
627 return -1;
630 #ifdef KVM_CAP_VAPIC
632 static int tpr_access_reporting(kvm_vcpu_context_t vcpu, int enabled)
634 int r;
635 struct kvm_tpr_access_ctl tac = {
636 .enabled = enabled,
639 r = kvm_ioctl(kvm_state, KVM_CHECK_EXTENSION, KVM_CAP_VAPIC);
640 if (r <= 0)
641 return -ENOSYS;
642 r = ioctl(vcpu->fd, KVM_TPR_ACCESS_REPORTING, &tac);
643 if (r == -1) {
644 r = -errno;
645 perror("KVM_TPR_ACCESS_REPORTING");
646 return r;
648 return 0;
651 int kvm_enable_tpr_access_reporting(kvm_vcpu_context_t vcpu)
653 return tpr_access_reporting(vcpu, 1);
656 int kvm_disable_tpr_access_reporting(kvm_vcpu_context_t vcpu)
658 return tpr_access_reporting(vcpu, 0);
661 #endif
663 #ifdef KVM_CAP_EXT_CPUID
665 static struct kvm_cpuid2 *try_get_cpuid(kvm_context_t kvm, int max)
667 struct kvm_cpuid2 *cpuid;
668 int r, size;
670 size = sizeof(*cpuid) + max * sizeof(*cpuid->entries);
671 cpuid = qemu_malloc(size);
672 cpuid->nent = max;
673 r = kvm_ioctl(kvm_state, KVM_GET_SUPPORTED_CPUID, cpuid);
674 if (r == 0 && cpuid->nent >= max)
675 r = -E2BIG;
676 if (r < 0) {
677 if (r == -E2BIG) {
678 free(cpuid);
679 return NULL;
680 } else {
681 fprintf(stderr, "KVM_GET_SUPPORTED_CPUID failed: %s\n",
682 strerror(-r));
683 exit(1);
686 return cpuid;
689 #define R_EAX 0
690 #define R_ECX 1
691 #define R_EDX 2
692 #define R_EBX 3
693 #define R_ESP 4
694 #define R_EBP 5
695 #define R_ESI 6
696 #define R_EDI 7
698 uint32_t kvm_get_supported_cpuid(kvm_context_t kvm, uint32_t function, int reg)
700 struct kvm_cpuid2 *cpuid;
701 int i, max;
702 uint32_t ret = 0;
703 uint32_t cpuid_1_edx;
705 if (!kvm_check_extension(kvm_state, KVM_CAP_EXT_CPUID)) {
706 return -1U;
709 max = 1;
710 while ((cpuid = try_get_cpuid(kvm, max)) == NULL) {
711 max *= 2;
714 for (i = 0; i < cpuid->nent; ++i) {
715 if (cpuid->entries[i].function == function) {
716 switch (reg) {
717 case R_EAX:
718 ret = cpuid->entries[i].eax;
719 break;
720 case R_EBX:
721 ret = cpuid->entries[i].ebx;
722 break;
723 case R_ECX:
724 ret = cpuid->entries[i].ecx;
725 break;
726 case R_EDX:
727 ret = cpuid->entries[i].edx;
728 if (function == 1) {
729 /* kvm misreports the following features
731 ret |= 1 << 12; /* MTRR */
732 ret |= 1 << 16; /* PAT */
733 ret |= 1 << 7; /* MCE */
734 ret |= 1 << 14; /* MCA */
737 /* On Intel, kvm returns cpuid according to
738 * the Intel spec, so add missing bits
739 * according to the AMD spec:
741 if (function == 0x80000001) {
742 cpuid_1_edx = kvm_get_supported_cpuid(kvm, 1, R_EDX);
743 ret |= cpuid_1_edx & 0xdfeff7ff;
745 break;
750 free(cpuid);
752 return ret;
755 #else
757 uint32_t kvm_get_supported_cpuid(kvm_context_t kvm, uint32_t function, int reg)
759 return -1U;
762 #endif
763 int kvm_qemu_create_memory_alias(uint64_t phys_start,
764 uint64_t len,
765 uint64_t target_phys)
767 return kvm_create_memory_alias(kvm_context, phys_start, len, target_phys);
770 int kvm_qemu_destroy_memory_alias(uint64_t phys_start)
772 return kvm_destroy_memory_alias(kvm_context, phys_start);
775 int kvm_arch_qemu_create_context(void)
777 int i;
778 struct utsname utsname;
780 uname(&utsname);
781 lm_capable_kernel = strcmp(utsname.machine, "x86_64") == 0;
783 if (kvm_shadow_memory)
784 kvm_set_shadow_pages(kvm_context, kvm_shadow_memory);
786 kvm_msr_list = kvm_get_msr_list(kvm_context);
787 if (!kvm_msr_list)
788 return -1;
789 for (i = 0; i < kvm_msr_list->nmsrs; ++i) {
790 if (kvm_msr_list->indices[i] == MSR_STAR)
791 kvm_has_msr_star = 1;
792 if (kvm_msr_list->indices[i] == MSR_VM_HSAVE_PA)
793 kvm_has_vm_hsave_pa = 1;
796 return 0;
799 static void set_msr_entry(struct kvm_msr_entry *entry, uint32_t index,
800 uint64_t data)
802 entry->index = index;
803 entry->data = data;
806 /* returns 0 on success, non-0 on failure */
807 static int get_msr_entry(struct kvm_msr_entry *entry, CPUState *env)
809 switch (entry->index) {
810 case MSR_IA32_SYSENTER_CS:
811 env->sysenter_cs = entry->data;
812 break;
813 case MSR_IA32_SYSENTER_ESP:
814 env->sysenter_esp = entry->data;
815 break;
816 case MSR_IA32_SYSENTER_EIP:
817 env->sysenter_eip = entry->data;
818 break;
819 case MSR_STAR:
820 env->star = entry->data;
821 break;
822 #ifdef TARGET_X86_64
823 case MSR_CSTAR:
824 env->cstar = entry->data;
825 break;
826 case MSR_KERNELGSBASE:
827 env->kernelgsbase = entry->data;
828 break;
829 case MSR_FMASK:
830 env->fmask = entry->data;
831 break;
832 case MSR_LSTAR:
833 env->lstar = entry->data;
834 break;
835 #endif
836 case MSR_IA32_TSC:
837 env->tsc = entry->data;
838 break;
839 case MSR_VM_HSAVE_PA:
840 env->vm_hsave = entry->data;
841 break;
842 default:
843 printf("Warning unknown msr index 0x%x\n", entry->index);
844 return 1;
846 return 0;
849 #ifdef TARGET_X86_64
850 #define MSR_COUNT 9
851 #else
852 #define MSR_COUNT 5
853 #endif
855 static void set_v8086_seg(struct kvm_segment *lhs, const SegmentCache *rhs)
857 lhs->selector = rhs->selector;
858 lhs->base = rhs->base;
859 lhs->limit = rhs->limit;
860 lhs->type = 3;
861 lhs->present = 1;
862 lhs->dpl = 3;
863 lhs->db = 0;
864 lhs->s = 1;
865 lhs->l = 0;
866 lhs->g = 0;
867 lhs->avl = 0;
868 lhs->unusable = 0;
871 static void set_seg(struct kvm_segment *lhs, const SegmentCache *rhs)
873 unsigned flags = rhs->flags;
874 lhs->selector = rhs->selector;
875 lhs->base = rhs->base;
876 lhs->limit = rhs->limit;
877 lhs->type = (flags >> DESC_TYPE_SHIFT) & 15;
878 lhs->present = (flags & DESC_P_MASK) != 0;
879 lhs->dpl = rhs->selector & 3;
880 lhs->db = (flags >> DESC_B_SHIFT) & 1;
881 lhs->s = (flags & DESC_S_MASK) != 0;
882 lhs->l = (flags >> DESC_L_SHIFT) & 1;
883 lhs->g = (flags & DESC_G_MASK) != 0;
884 lhs->avl = (flags & DESC_AVL_MASK) != 0;
885 lhs->unusable = 0;
888 static void get_seg(SegmentCache *lhs, const struct kvm_segment *rhs)
890 lhs->selector = rhs->selector;
891 lhs->base = rhs->base;
892 lhs->limit = rhs->limit;
893 lhs->flags =
894 (rhs->type << DESC_TYPE_SHIFT)
895 | (rhs->present * DESC_P_MASK)
896 | (rhs->dpl << DESC_DPL_SHIFT)
897 | (rhs->db << DESC_B_SHIFT)
898 | (rhs->s * DESC_S_MASK)
899 | (rhs->l << DESC_L_SHIFT)
900 | (rhs->g * DESC_G_MASK)
901 | (rhs->avl * DESC_AVL_MASK);
904 void kvm_arch_load_regs(CPUState *env)
906 struct kvm_regs regs;
907 struct kvm_fpu fpu;
908 struct kvm_sregs sregs;
909 struct kvm_msr_entry msrs[MSR_COUNT];
910 int rc, n, i;
912 regs.rax = env->regs[R_EAX];
913 regs.rbx = env->regs[R_EBX];
914 regs.rcx = env->regs[R_ECX];
915 regs.rdx = env->regs[R_EDX];
916 regs.rsi = env->regs[R_ESI];
917 regs.rdi = env->regs[R_EDI];
918 regs.rsp = env->regs[R_ESP];
919 regs.rbp = env->regs[R_EBP];
920 #ifdef TARGET_X86_64
921 regs.r8 = env->regs[8];
922 regs.r9 = env->regs[9];
923 regs.r10 = env->regs[10];
924 regs.r11 = env->regs[11];
925 regs.r12 = env->regs[12];
926 regs.r13 = env->regs[13];
927 regs.r14 = env->regs[14];
928 regs.r15 = env->regs[15];
929 #endif
931 regs.rflags = env->eflags;
932 regs.rip = env->eip;
934 kvm_set_regs(env->kvm_cpu_state.vcpu_ctx, &regs);
936 memset(&fpu, 0, sizeof fpu);
937 fpu.fsw = env->fpus & ~(7 << 11);
938 fpu.fsw |= (env->fpstt & 7) << 11;
939 fpu.fcw = env->fpuc;
940 for (i = 0; i < 8; ++i)
941 fpu.ftwx |= (!env->fptags[i]) << i;
942 memcpy(fpu.fpr, env->fpregs, sizeof env->fpregs);
943 memcpy(fpu.xmm, env->xmm_regs, sizeof env->xmm_regs);
944 fpu.mxcsr = env->mxcsr;
945 kvm_set_fpu(env->kvm_cpu_state.vcpu_ctx, &fpu);
947 memcpy(sregs.interrupt_bitmap, env->interrupt_bitmap, sizeof(sregs.interrupt_bitmap));
949 if ((env->eflags & VM_MASK)) {
950 set_v8086_seg(&sregs.cs, &env->segs[R_CS]);
951 set_v8086_seg(&sregs.ds, &env->segs[R_DS]);
952 set_v8086_seg(&sregs.es, &env->segs[R_ES]);
953 set_v8086_seg(&sregs.fs, &env->segs[R_FS]);
954 set_v8086_seg(&sregs.gs, &env->segs[R_GS]);
955 set_v8086_seg(&sregs.ss, &env->segs[R_SS]);
956 } else {
957 set_seg(&sregs.cs, &env->segs[R_CS]);
958 set_seg(&sregs.ds, &env->segs[R_DS]);
959 set_seg(&sregs.es, &env->segs[R_ES]);
960 set_seg(&sregs.fs, &env->segs[R_FS]);
961 set_seg(&sregs.gs, &env->segs[R_GS]);
962 set_seg(&sregs.ss, &env->segs[R_SS]);
964 if (env->cr[0] & CR0_PE_MASK) {
965 /* force ss cpl to cs cpl */
966 sregs.ss.selector = (sregs.ss.selector & ~3) |
967 (sregs.cs.selector & 3);
968 sregs.ss.dpl = sregs.ss.selector & 3;
972 set_seg(&sregs.tr, &env->tr);
973 set_seg(&sregs.ldt, &env->ldt);
975 sregs.idt.limit = env->idt.limit;
976 sregs.idt.base = env->idt.base;
977 sregs.gdt.limit = env->gdt.limit;
978 sregs.gdt.base = env->gdt.base;
980 sregs.cr0 = env->cr[0];
981 sregs.cr2 = env->cr[2];
982 sregs.cr3 = env->cr[3];
983 sregs.cr4 = env->cr[4];
985 sregs.cr8 = cpu_get_apic_tpr(env);
986 sregs.apic_base = cpu_get_apic_base(env);
988 sregs.efer = env->efer;
990 kvm_set_sregs(env->kvm_cpu_state.vcpu_ctx, &sregs);
992 /* msrs */
993 n = 0;
994 set_msr_entry(&msrs[n++], MSR_IA32_SYSENTER_CS, env->sysenter_cs);
995 set_msr_entry(&msrs[n++], MSR_IA32_SYSENTER_ESP, env->sysenter_esp);
996 set_msr_entry(&msrs[n++], MSR_IA32_SYSENTER_EIP, env->sysenter_eip);
997 if (kvm_has_msr_star)
998 set_msr_entry(&msrs[n++], MSR_STAR, env->star);
999 if (kvm_has_vm_hsave_pa)
1000 set_msr_entry(&msrs[n++], MSR_VM_HSAVE_PA, env->vm_hsave);
1001 #ifdef TARGET_X86_64
1002 if (lm_capable_kernel) {
1003 set_msr_entry(&msrs[n++], MSR_CSTAR, env->cstar);
1004 set_msr_entry(&msrs[n++], MSR_KERNELGSBASE, env->kernelgsbase);
1005 set_msr_entry(&msrs[n++], MSR_FMASK, env->fmask);
1006 set_msr_entry(&msrs[n++], MSR_LSTAR , env->lstar);
1008 #endif
1010 rc = kvm_set_msrs(env->kvm_cpu_state.vcpu_ctx, msrs, n);
1011 if (rc == -1)
1012 perror("kvm_set_msrs FAILED");
1015 void kvm_load_tsc(CPUState *env)
1017 int rc;
1018 struct kvm_msr_entry msr;
1020 set_msr_entry(&msr, MSR_IA32_TSC, env->tsc);
1022 rc = kvm_set_msrs(env->kvm_cpu_state.vcpu_ctx, &msr, 1);
1023 if (rc == -1)
1024 perror("kvm_set_tsc FAILED.\n");
1027 void kvm_arch_save_mpstate(CPUState *env)
1029 #ifdef KVM_CAP_MP_STATE
1030 int r;
1031 struct kvm_mp_state mp_state;
1033 r = kvm_get_mpstate(env->kvm_cpu_state.vcpu_ctx, &mp_state);
1034 if (r < 0)
1035 env->mp_state = -1;
1036 else
1037 env->mp_state = mp_state.mp_state;
1038 #endif
1041 void kvm_arch_load_mpstate(CPUState *env)
1043 #ifdef KVM_CAP_MP_STATE
1044 struct kvm_mp_state mp_state = { .mp_state = env->mp_state };
1047 * -1 indicates that the host did not support GET_MP_STATE ioctl,
1048 * so don't touch it.
1050 if (env->mp_state != -1)
1051 kvm_set_mpstate(env->kvm_cpu_state.vcpu_ctx, &mp_state);
1052 #endif
1055 void kvm_arch_save_regs(CPUState *env)
1057 struct kvm_regs regs;
1058 struct kvm_fpu fpu;
1059 struct kvm_sregs sregs;
1060 struct kvm_msr_entry msrs[MSR_COUNT];
1061 uint32_t hflags;
1062 uint32_t i, n, rc;
1064 kvm_get_regs(env->kvm_cpu_state.vcpu_ctx, &regs);
1066 env->regs[R_EAX] = regs.rax;
1067 env->regs[R_EBX] = regs.rbx;
1068 env->regs[R_ECX] = regs.rcx;
1069 env->regs[R_EDX] = regs.rdx;
1070 env->regs[R_ESI] = regs.rsi;
1071 env->regs[R_EDI] = regs.rdi;
1072 env->regs[R_ESP] = regs.rsp;
1073 env->regs[R_EBP] = regs.rbp;
1074 #ifdef TARGET_X86_64
1075 env->regs[8] = regs.r8;
1076 env->regs[9] = regs.r9;
1077 env->regs[10] = regs.r10;
1078 env->regs[11] = regs.r11;
1079 env->regs[12] = regs.r12;
1080 env->regs[13] = regs.r13;
1081 env->regs[14] = regs.r14;
1082 env->regs[15] = regs.r15;
1083 #endif
1085 env->eflags = regs.rflags;
1086 env->eip = regs.rip;
1088 kvm_get_fpu(env->kvm_cpu_state.vcpu_ctx, &fpu);
1089 env->fpstt = (fpu.fsw >> 11) & 7;
1090 env->fpus = fpu.fsw;
1091 env->fpuc = fpu.fcw;
1092 for (i = 0; i < 8; ++i)
1093 env->fptags[i] = !((fpu.ftwx >> i) & 1);
1094 memcpy(env->fpregs, fpu.fpr, sizeof env->fpregs);
1095 memcpy(env->xmm_regs, fpu.xmm, sizeof env->xmm_regs);
1096 env->mxcsr = fpu.mxcsr;
1098 kvm_get_sregs(env->kvm_cpu_state.vcpu_ctx, &sregs);
1100 memcpy(env->interrupt_bitmap, sregs.interrupt_bitmap, sizeof(env->interrupt_bitmap));
1102 get_seg(&env->segs[R_CS], &sregs.cs);
1103 get_seg(&env->segs[R_DS], &sregs.ds);
1104 get_seg(&env->segs[R_ES], &sregs.es);
1105 get_seg(&env->segs[R_FS], &sregs.fs);
1106 get_seg(&env->segs[R_GS], &sregs.gs);
1107 get_seg(&env->segs[R_SS], &sregs.ss);
1109 get_seg(&env->tr, &sregs.tr);
1110 get_seg(&env->ldt, &sregs.ldt);
1112 env->idt.limit = sregs.idt.limit;
1113 env->idt.base = sregs.idt.base;
1114 env->gdt.limit = sregs.gdt.limit;
1115 env->gdt.base = sregs.gdt.base;
1117 env->cr[0] = sregs.cr0;
1118 env->cr[2] = sregs.cr2;
1119 env->cr[3] = sregs.cr3;
1120 env->cr[4] = sregs.cr4;
1122 cpu_set_apic_base(env, sregs.apic_base);
1124 env->efer = sregs.efer;
1125 //cpu_set_apic_tpr(env, sregs.cr8);
1127 #define HFLAG_COPY_MASK ~( \
1128 HF_CPL_MASK | HF_PE_MASK | HF_MP_MASK | HF_EM_MASK | \
1129 HF_TS_MASK | HF_TF_MASK | HF_VM_MASK | HF_IOPL_MASK | \
1130 HF_OSFXSR_MASK | HF_LMA_MASK | HF_CS32_MASK | \
1131 HF_SS32_MASK | HF_CS64_MASK | HF_ADDSEG_MASK)
1135 hflags = (env->segs[R_CS].flags >> DESC_DPL_SHIFT) & HF_CPL_MASK;
1136 hflags |= (env->cr[0] & CR0_PE_MASK) << (HF_PE_SHIFT - CR0_PE_SHIFT);
1137 hflags |= (env->cr[0] << (HF_MP_SHIFT - CR0_MP_SHIFT)) &
1138 (HF_MP_MASK | HF_EM_MASK | HF_TS_MASK);
1139 hflags |= (env->eflags & (HF_TF_MASK | HF_VM_MASK | HF_IOPL_MASK));
1140 hflags |= (env->cr[4] & CR4_OSFXSR_MASK) <<
1141 (HF_OSFXSR_SHIFT - CR4_OSFXSR_SHIFT);
1143 if (env->efer & MSR_EFER_LMA) {
1144 hflags |= HF_LMA_MASK;
1147 if ((hflags & HF_LMA_MASK) && (env->segs[R_CS].flags & DESC_L_MASK)) {
1148 hflags |= HF_CS32_MASK | HF_SS32_MASK | HF_CS64_MASK;
1149 } else {
1150 hflags |= (env->segs[R_CS].flags & DESC_B_MASK) >>
1151 (DESC_B_SHIFT - HF_CS32_SHIFT);
1152 hflags |= (env->segs[R_SS].flags & DESC_B_MASK) >>
1153 (DESC_B_SHIFT - HF_SS32_SHIFT);
1154 if (!(env->cr[0] & CR0_PE_MASK) ||
1155 (env->eflags & VM_MASK) ||
1156 !(hflags & HF_CS32_MASK)) {
1157 hflags |= HF_ADDSEG_MASK;
1158 } else {
1159 hflags |= ((env->segs[R_DS].base |
1160 env->segs[R_ES].base |
1161 env->segs[R_SS].base) != 0) <<
1162 HF_ADDSEG_SHIFT;
1165 env->hflags = (env->hflags & HFLAG_COPY_MASK) | hflags;
1167 /* msrs */
1168 n = 0;
1169 msrs[n++].index = MSR_IA32_SYSENTER_CS;
1170 msrs[n++].index = MSR_IA32_SYSENTER_ESP;
1171 msrs[n++].index = MSR_IA32_SYSENTER_EIP;
1172 if (kvm_has_msr_star)
1173 msrs[n++].index = MSR_STAR;
1174 msrs[n++].index = MSR_IA32_TSC;
1175 if (kvm_has_vm_hsave_pa)
1176 msrs[n++].index = MSR_VM_HSAVE_PA;
1177 #ifdef TARGET_X86_64
1178 if (lm_capable_kernel) {
1179 msrs[n++].index = MSR_CSTAR;
1180 msrs[n++].index = MSR_KERNELGSBASE;
1181 msrs[n++].index = MSR_FMASK;
1182 msrs[n++].index = MSR_LSTAR;
1184 #endif
1185 rc = kvm_get_msrs(env->kvm_cpu_state.vcpu_ctx, msrs, n);
1186 if (rc == -1) {
1187 perror("kvm_get_msrs FAILED");
1189 else {
1190 n = rc; /* actual number of MSRs */
1191 for (i=0 ; i<n; i++) {
1192 if (get_msr_entry(&msrs[i], env))
1193 return;
1198 static void do_cpuid_ent(struct kvm_cpuid_entry2 *e, uint32_t function,
1199 uint32_t count, CPUState *env)
1201 env->regs[R_EAX] = function;
1202 env->regs[R_ECX] = count;
1203 qemu_kvm_cpuid_on_env(env);
1204 e->function = function;
1205 e->flags = 0;
1206 e->index = 0;
1207 e->eax = env->regs[R_EAX];
1208 e->ebx = env->regs[R_EBX];
1209 e->ecx = env->regs[R_ECX];
1210 e->edx = env->regs[R_EDX];
1213 struct kvm_para_features {
1214 int cap;
1215 int feature;
1216 } para_features[] = {
1217 #ifdef KVM_CAP_CLOCKSOURCE
1218 { KVM_CAP_CLOCKSOURCE, KVM_FEATURE_CLOCKSOURCE },
1219 #endif
1220 #ifdef KVM_CAP_NOP_IO_DELAY
1221 { KVM_CAP_NOP_IO_DELAY, KVM_FEATURE_NOP_IO_DELAY },
1222 #endif
1223 #ifdef KVM_CAP_PV_MMU
1224 { KVM_CAP_PV_MMU, KVM_FEATURE_MMU_OP },
1225 #endif
1226 #ifdef KVM_CAP_CR3_CACHE
1227 { KVM_CAP_CR3_CACHE, KVM_FEATURE_CR3_CACHE },
1228 #endif
1229 { -1, -1 }
1232 static int get_para_features(kvm_context_t kvm_context)
1234 int i, features = 0;
1236 for (i = 0; i < ARRAY_SIZE(para_features)-1; i++) {
1237 if (kvm_check_extension(kvm_state, para_features[i].cap))
1238 features |= (1 << para_features[i].feature);
1241 return features;
1244 static void kvm_trim_features(uint32_t *features, uint32_t supported)
1246 int i;
1247 uint32_t mask;
1249 for (i = 0; i < 32; ++i) {
1250 mask = 1U << i;
1251 if ((*features & mask) && !(supported & mask)) {
1252 *features &= ~mask;
1257 int kvm_arch_qemu_init_env(CPUState *cenv)
1259 struct kvm_cpuid_entry2 cpuid_ent[100];
1260 #ifdef KVM_CPUID_SIGNATURE
1261 struct kvm_cpuid_entry2 *pv_ent;
1262 uint32_t signature[3];
1263 #endif
1264 int cpuid_nent = 0;
1265 CPUState copy;
1266 uint32_t i, j, limit;
1268 qemu_kvm_load_lapic(cenv);
1271 #ifdef KVM_CPUID_SIGNATURE
1272 /* Paravirtualization CPUIDs */
1273 memcpy(signature, "KVMKVMKVM\0\0\0", 12);
1274 pv_ent = &cpuid_ent[cpuid_nent++];
1275 memset(pv_ent, 0, sizeof(*pv_ent));
1276 pv_ent->function = KVM_CPUID_SIGNATURE;
1277 pv_ent->eax = 0;
1278 pv_ent->ebx = signature[0];
1279 pv_ent->ecx = signature[1];
1280 pv_ent->edx = signature[2];
1282 pv_ent = &cpuid_ent[cpuid_nent++];
1283 memset(pv_ent, 0, sizeof(*pv_ent));
1284 pv_ent->function = KVM_CPUID_FEATURES;
1285 pv_ent->eax = get_para_features(kvm_context);
1286 #endif
1288 kvm_trim_features(&cenv->cpuid_features,
1289 kvm_arch_get_supported_cpuid(cenv, 1, R_EDX));
1291 /* prevent the hypervisor bit from being cleared by the kernel */
1292 i = cenv->cpuid_ext_features & CPUID_EXT_HYPERVISOR;
1293 kvm_trim_features(&cenv->cpuid_ext_features,
1294 kvm_arch_get_supported_cpuid(cenv, 1, R_ECX));
1295 cenv->cpuid_ext_features |= i;
1297 kvm_trim_features(&cenv->cpuid_ext2_features,
1298 kvm_arch_get_supported_cpuid(cenv, 0x80000001, R_EDX));
1299 kvm_trim_features(&cenv->cpuid_ext3_features,
1300 kvm_arch_get_supported_cpuid(cenv, 0x80000001, R_ECX));
1302 copy = *cenv;
1304 copy.regs[R_EAX] = 0;
1305 qemu_kvm_cpuid_on_env(&copy);
1306 limit = copy.regs[R_EAX];
1308 for (i = 0; i <= limit; ++i) {
1309 if (i == 4 || i == 0xb || i == 0xd) {
1310 for (j = 0; ; ++j) {
1311 do_cpuid_ent(&cpuid_ent[cpuid_nent], i, j, &copy);
1313 cpuid_ent[cpuid_nent].flags = KVM_CPUID_FLAG_SIGNIFCANT_INDEX;
1314 cpuid_ent[cpuid_nent].index = j;
1316 cpuid_nent++;
1318 if (i == 4 && copy.regs[R_EAX] == 0)
1319 break;
1320 if (i == 0xb && !(copy.regs[R_ECX] & 0xff00))
1321 break;
1322 if (i == 0xd && copy.regs[R_EAX] == 0)
1323 break;
1325 } else
1326 do_cpuid_ent(&cpuid_ent[cpuid_nent++], i, 0, &copy);
1329 copy.regs[R_EAX] = 0x80000000;
1330 qemu_kvm_cpuid_on_env(&copy);
1331 limit = copy.regs[R_EAX];
1333 for (i = 0x80000000; i <= limit; ++i)
1334 do_cpuid_ent(&cpuid_ent[cpuid_nent++], i, 0, &copy);
1336 kvm_setup_cpuid2(cenv->kvm_cpu_state.vcpu_ctx, cpuid_nent, cpuid_ent);
1338 #ifdef KVM_CAP_MCE
1339 if (((cenv->cpuid_version >> 8)&0xF) >= 6
1340 && (cenv->cpuid_features&(CPUID_MCE|CPUID_MCA)) == (CPUID_MCE|CPUID_MCA)
1341 && kvm_check_extension(kvm_state, KVM_CAP_MCE) > 0) {
1342 uint64_t mcg_cap;
1343 int banks;
1345 if (kvm_get_mce_cap_supported(kvm_context, &mcg_cap, &banks))
1346 perror("kvm_get_mce_cap_supported FAILED");
1347 else {
1348 if (banks > MCE_BANKS_DEF)
1349 banks = MCE_BANKS_DEF;
1350 mcg_cap &= MCE_CAP_DEF;
1351 mcg_cap |= banks;
1352 if (kvm_setup_mce(cenv->kvm_cpu_state.vcpu_ctx, &mcg_cap))
1353 perror("kvm_setup_mce FAILED");
1354 else
1355 cenv->mcg_cap = mcg_cap;
1358 #endif
1360 return 0;
1363 int kvm_arch_halt(void *opaque, kvm_vcpu_context_t vcpu)
1365 CPUState *env = cpu_single_env;
1367 if (!((env->interrupt_request & CPU_INTERRUPT_HARD) &&
1368 (env->eflags & IF_MASK)) &&
1369 !(env->interrupt_request & CPU_INTERRUPT_NMI)) {
1370 env->halted = 1;
1372 return 1;
1375 void kvm_arch_pre_kvm_run(void *opaque, CPUState *env)
1377 if (!kvm_irqchip_in_kernel(kvm_context))
1378 kvm_set_cr8(env->kvm_cpu_state.vcpu_ctx, cpu_get_apic_tpr(env));
1381 void kvm_arch_post_kvm_run(void *opaque, CPUState *env)
1383 cpu_single_env = env;
1385 env->eflags = kvm_get_interrupt_flag(env->kvm_cpu_state.vcpu_ctx)
1386 ? env->eflags | IF_MASK : env->eflags & ~IF_MASK;
1388 cpu_set_apic_tpr(env, kvm_get_cr8(env->kvm_cpu_state.vcpu_ctx));
1389 cpu_set_apic_base(env, kvm_get_apic_base(env->kvm_cpu_state.vcpu_ctx));
1392 int kvm_arch_has_work(CPUState *env)
1394 if (((env->interrupt_request & CPU_INTERRUPT_HARD) &&
1395 (env->eflags & IF_MASK)) ||
1396 (env->interrupt_request & CPU_INTERRUPT_NMI))
1397 return 1;
1398 return 0;
1401 int kvm_arch_try_push_interrupts(void *opaque)
1403 CPUState *env = cpu_single_env;
1404 int r, irq;
1406 if (kvm_is_ready_for_interrupt_injection(env->kvm_cpu_state.vcpu_ctx) &&
1407 (env->interrupt_request & CPU_INTERRUPT_HARD) &&
1408 (env->eflags & IF_MASK)) {
1409 env->interrupt_request &= ~CPU_INTERRUPT_HARD;
1410 irq = cpu_get_pic_interrupt(env);
1411 if (irq >= 0) {
1412 r = kvm_inject_irq(env->kvm_cpu_state.vcpu_ctx, irq);
1413 if (r < 0)
1414 printf("cpu %d fail inject %x\n", env->cpu_index, irq);
1418 return (env->interrupt_request & CPU_INTERRUPT_HARD) != 0;
1421 #ifdef KVM_CAP_USER_NMI
1422 void kvm_arch_push_nmi(void *opaque)
1424 CPUState *env = cpu_single_env;
1425 int r;
1427 if (likely(!(env->interrupt_request & CPU_INTERRUPT_NMI)))
1428 return;
1430 env->interrupt_request &= ~CPU_INTERRUPT_NMI;
1431 r = kvm_inject_nmi(env->kvm_cpu_state.vcpu_ctx);
1432 if (r < 0)
1433 printf("cpu %d fail inject NMI\n", env->cpu_index);
1435 #endif /* KVM_CAP_USER_NMI */
1437 void kvm_arch_update_regs_for_sipi(CPUState *env)
1439 SegmentCache cs = env->segs[R_CS];
1441 kvm_arch_save_regs(env);
1442 env->segs[R_CS] = cs;
1443 env->eip = 0;
1444 kvm_arch_load_regs(env);
1447 void kvm_arch_cpu_reset(CPUState *env)
1449 kvm_arch_load_regs(env);
1450 if (!cpu_is_bsp(env)) {
1451 if (kvm_irqchip_in_kernel(kvm_context)) {
1452 #ifdef KVM_CAP_MP_STATE
1453 kvm_reset_mpstate(env->kvm_cpu_state.vcpu_ctx);
1454 #endif
1455 } else {
1456 env->interrupt_request &= ~CPU_INTERRUPT_HARD;
1457 env->halted = 1;
1462 int kvm_arch_insert_sw_breakpoint(CPUState *env, struct kvm_sw_breakpoint *bp)
1464 uint8_t int3 = 0xcc;
1466 if (cpu_memory_rw_debug(env, bp->pc, (uint8_t *)&bp->saved_insn, 1, 0) ||
1467 cpu_memory_rw_debug(env, bp->pc, &int3, 1, 1))
1468 return -EINVAL;
1469 return 0;
1472 int kvm_arch_remove_sw_breakpoint(CPUState *env, struct kvm_sw_breakpoint *bp)
1474 uint8_t int3;
1476 if (cpu_memory_rw_debug(env, bp->pc, &int3, 1, 0) || int3 != 0xcc ||
1477 cpu_memory_rw_debug(env, bp->pc, (uint8_t *)&bp->saved_insn, 1, 1))
1478 return -EINVAL;
1479 return 0;
1482 #ifdef KVM_CAP_SET_GUEST_DEBUG
1483 static struct {
1484 target_ulong addr;
1485 int len;
1486 int type;
1487 } hw_breakpoint[4];
1489 static int nb_hw_breakpoint;
1491 static int find_hw_breakpoint(target_ulong addr, int len, int type)
1493 int n;
1495 for (n = 0; n < nb_hw_breakpoint; n++)
1496 if (hw_breakpoint[n].addr == addr && hw_breakpoint[n].type == type &&
1497 (hw_breakpoint[n].len == len || len == -1))
1498 return n;
1499 return -1;
1502 int kvm_arch_insert_hw_breakpoint(target_ulong addr,
1503 target_ulong len, int type)
1505 switch (type) {
1506 case GDB_BREAKPOINT_HW:
1507 len = 1;
1508 break;
1509 case GDB_WATCHPOINT_WRITE:
1510 case GDB_WATCHPOINT_ACCESS:
1511 switch (len) {
1512 case 1:
1513 break;
1514 case 2:
1515 case 4:
1516 case 8:
1517 if (addr & (len - 1))
1518 return -EINVAL;
1519 break;
1520 default:
1521 return -EINVAL;
1523 break;
1524 default:
1525 return -ENOSYS;
1528 if (nb_hw_breakpoint == 4)
1529 return -ENOBUFS;
1531 if (find_hw_breakpoint(addr, len, type) >= 0)
1532 return -EEXIST;
1534 hw_breakpoint[nb_hw_breakpoint].addr = addr;
1535 hw_breakpoint[nb_hw_breakpoint].len = len;
1536 hw_breakpoint[nb_hw_breakpoint].type = type;
1537 nb_hw_breakpoint++;
1539 return 0;
1542 int kvm_arch_remove_hw_breakpoint(target_ulong addr,
1543 target_ulong len, int type)
1545 int n;
1547 n = find_hw_breakpoint(addr, (type == GDB_BREAKPOINT_HW) ? 1 : len, type);
1548 if (n < 0)
1549 return -ENOENT;
1551 nb_hw_breakpoint--;
1552 hw_breakpoint[n] = hw_breakpoint[nb_hw_breakpoint];
1554 return 0;
1557 void kvm_arch_remove_all_hw_breakpoints(void)
1559 nb_hw_breakpoint = 0;
1562 static CPUWatchpoint hw_watchpoint;
1564 int kvm_arch_debug(struct kvm_debug_exit_arch *arch_info)
1566 int handle = 0;
1567 int n;
1569 if (arch_info->exception == 1) {
1570 if (arch_info->dr6 & (1 << 14)) {
1571 if (cpu_single_env->singlestep_enabled)
1572 handle = 1;
1573 } else {
1574 for (n = 0; n < 4; n++)
1575 if (arch_info->dr6 & (1 << n))
1576 switch ((arch_info->dr7 >> (16 + n*4)) & 0x3) {
1577 case 0x0:
1578 handle = 1;
1579 break;
1580 case 0x1:
1581 handle = 1;
1582 cpu_single_env->watchpoint_hit = &hw_watchpoint;
1583 hw_watchpoint.vaddr = hw_breakpoint[n].addr;
1584 hw_watchpoint.flags = BP_MEM_WRITE;
1585 break;
1586 case 0x3:
1587 handle = 1;
1588 cpu_single_env->watchpoint_hit = &hw_watchpoint;
1589 hw_watchpoint.vaddr = hw_breakpoint[n].addr;
1590 hw_watchpoint.flags = BP_MEM_ACCESS;
1591 break;
1594 } else if (kvm_find_sw_breakpoint(cpu_single_env, arch_info->pc))
1595 handle = 1;
1597 if (!handle)
1598 kvm_update_guest_debug(cpu_single_env,
1599 (arch_info->exception == 1) ?
1600 KVM_GUESTDBG_INJECT_DB : KVM_GUESTDBG_INJECT_BP);
1602 return handle;
1605 void kvm_arch_update_guest_debug(CPUState *env, struct kvm_guest_debug *dbg)
1607 const uint8_t type_code[] = {
1608 [GDB_BREAKPOINT_HW] = 0x0,
1609 [GDB_WATCHPOINT_WRITE] = 0x1,
1610 [GDB_WATCHPOINT_ACCESS] = 0x3
1612 const uint8_t len_code[] = {
1613 [1] = 0x0, [2] = 0x1, [4] = 0x3, [8] = 0x2
1615 int n;
1617 if (kvm_sw_breakpoints_active(env))
1618 dbg->control |= KVM_GUESTDBG_ENABLE | KVM_GUESTDBG_USE_SW_BP;
1620 if (nb_hw_breakpoint > 0) {
1621 dbg->control |= KVM_GUESTDBG_ENABLE | KVM_GUESTDBG_USE_HW_BP;
1622 dbg->arch.debugreg[7] = 0x0600;
1623 for (n = 0; n < nb_hw_breakpoint; n++) {
1624 dbg->arch.debugreg[n] = hw_breakpoint[n].addr;
1625 dbg->arch.debugreg[7] |= (2 << (n * 2)) |
1626 (type_code[hw_breakpoint[n].type] << (16 + n*4)) |
1627 (len_code[hw_breakpoint[n].len] << (18 + n*4));
1631 #endif
1633 void kvm_arch_do_ioperm(void *_data)
1635 struct ioperm_data *data = _data;
1636 ioperm(data->start_port, data->num, data->turn_on);
1640 * Setup x86 specific IRQ routing
1642 int kvm_arch_init_irq_routing(void)
1644 int i, r;
1646 if (kvm_irqchip && kvm_has_gsi_routing(kvm_context)) {
1647 kvm_clear_gsi_routes(kvm_context);
1648 for (i = 0; i < 8; ++i) {
1649 if (i == 2)
1650 continue;
1651 r = kvm_add_irq_route(kvm_context, i, KVM_IRQCHIP_PIC_MASTER, i);
1652 if (r < 0)
1653 return r;
1655 for (i = 8; i < 16; ++i) {
1656 r = kvm_add_irq_route(kvm_context, i, KVM_IRQCHIP_PIC_SLAVE, i - 8);
1657 if (r < 0)
1658 return r;
1660 for (i = 0; i < 24; ++i) {
1661 if (i == 0) {
1662 r = kvm_add_irq_route(kvm_context, i, KVM_IRQCHIP_IOAPIC, 2);
1663 } else if (i != 2) {
1664 r = kvm_add_irq_route(kvm_context, i, KVM_IRQCHIP_IOAPIC, i);
1666 if (r < 0)
1667 return r;
1669 kvm_commit_irq_routes(kvm_context);
1671 return 0;
1674 uint32_t kvm_arch_get_supported_cpuid(CPUState *env, uint32_t function,
1675 int reg)
1677 return kvm_get_supported_cpuid(kvm_context, function, reg);
1680 void kvm_arch_process_irqchip_events(CPUState *env)
1682 kvm_arch_save_regs(env);
1683 if (env->interrupt_request & CPU_INTERRUPT_INIT)
1684 do_cpu_init(env);
1685 if (env->interrupt_request & CPU_INTERRUPT_SIPI)
1686 do_cpu_sipi(env);
1687 kvm_arch_load_regs(env);