x86: acpi: let the firmware handle pending "CPU remove" events in SMM
[qemu.git] / cpu.c
blob0be5dcb6f3e18fcc5d8c262feca5ac394b04a13f
1 /*
2 * Target-specific parts of the CPU object
4 * Copyright (c) 2003 Fabrice Bellard
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, see <http://www.gnu.org/licenses/>.
20 #include "qemu/osdep.h"
21 #include "qemu-common.h"
22 #include "qapi/error.h"
24 #include "exec/target_page.h"
25 #include "hw/qdev-core.h"
26 #include "hw/qdev-properties.h"
27 #include "qemu/error-report.h"
28 #include "migration/vmstate.h"
29 #ifdef CONFIG_USER_ONLY
30 #include "qemu.h"
31 #else
32 #include "exec/address-spaces.h"
33 #endif
34 #include "sysemu/tcg.h"
35 #include "sysemu/kvm.h"
36 #include "sysemu/replay.h"
37 #include "translate-all.h"
38 #include "exec/log.h"
40 uintptr_t qemu_host_page_size;
41 intptr_t qemu_host_page_mask;
43 #ifndef CONFIG_USER_ONLY
44 static int cpu_common_post_load(void *opaque, int version_id)
46 CPUState *cpu = opaque;
48 /* 0x01 was CPU_INTERRUPT_EXIT. This line can be removed when the
49 version_id is increased. */
50 cpu->interrupt_request &= ~0x01;
51 tlb_flush(cpu);
53 /* loadvm has just updated the content of RAM, bypassing the
54 * usual mechanisms that ensure we flush TBs for writes to
55 * memory we've translated code from. So we must flush all TBs,
56 * which will now be stale.
58 tb_flush(cpu);
60 return 0;
63 static int cpu_common_pre_load(void *opaque)
65 CPUState *cpu = opaque;
67 cpu->exception_index = -1;
69 return 0;
72 static bool cpu_common_exception_index_needed(void *opaque)
74 CPUState *cpu = opaque;
76 return tcg_enabled() && cpu->exception_index != -1;
79 static const VMStateDescription vmstate_cpu_common_exception_index = {
80 .name = "cpu_common/exception_index",
81 .version_id = 1,
82 .minimum_version_id = 1,
83 .needed = cpu_common_exception_index_needed,
84 .fields = (VMStateField[]) {
85 VMSTATE_INT32(exception_index, CPUState),
86 VMSTATE_END_OF_LIST()
90 static bool cpu_common_crash_occurred_needed(void *opaque)
92 CPUState *cpu = opaque;
94 return cpu->crash_occurred;
97 static const VMStateDescription vmstate_cpu_common_crash_occurred = {
98 .name = "cpu_common/crash_occurred",
99 .version_id = 1,
100 .minimum_version_id = 1,
101 .needed = cpu_common_crash_occurred_needed,
102 .fields = (VMStateField[]) {
103 VMSTATE_BOOL(crash_occurred, CPUState),
104 VMSTATE_END_OF_LIST()
108 const VMStateDescription vmstate_cpu_common = {
109 .name = "cpu_common",
110 .version_id = 1,
111 .minimum_version_id = 1,
112 .pre_load = cpu_common_pre_load,
113 .post_load = cpu_common_post_load,
114 .fields = (VMStateField[]) {
115 VMSTATE_UINT32(halted, CPUState),
116 VMSTATE_UINT32(interrupt_request, CPUState),
117 VMSTATE_END_OF_LIST()
119 .subsections = (const VMStateDescription*[]) {
120 &vmstate_cpu_common_exception_index,
121 &vmstate_cpu_common_crash_occurred,
122 NULL
125 #endif
127 void cpu_exec_unrealizefn(CPUState *cpu)
129 CPUClass *cc = CPU_GET_CLASS(cpu);
131 tlb_destroy(cpu);
132 cpu_list_remove(cpu);
134 #ifdef CONFIG_USER_ONLY
135 assert(cc->vmsd == NULL);
136 #else
137 if (cc->vmsd != NULL) {
138 vmstate_unregister(NULL, cc->vmsd, cpu);
140 if (qdev_get_vmsd(DEVICE(cpu)) == NULL) {
141 vmstate_unregister(NULL, &vmstate_cpu_common, cpu);
143 tcg_iommu_free_notifier_list(cpu);
144 #endif
147 Property cpu_common_props[] = {
148 #ifndef CONFIG_USER_ONLY
149 /* Create a memory property for softmmu CPU object,
150 * so users can wire up its memory. (This can't go in hw/core/cpu.c
151 * because that file is compiled only once for both user-mode
152 * and system builds.) The default if no link is set up is to use
153 * the system address space.
155 DEFINE_PROP_LINK("memory", CPUState, memory, TYPE_MEMORY_REGION,
156 MemoryRegion *),
157 #endif
158 DEFINE_PROP_BOOL("start-powered-off", CPUState, start_powered_off, false),
159 DEFINE_PROP_END_OF_LIST(),
162 void cpu_exec_initfn(CPUState *cpu)
164 cpu->as = NULL;
165 cpu->num_ases = 0;
167 #ifndef CONFIG_USER_ONLY
168 cpu->thread_id = qemu_get_thread_id();
169 cpu->memory = get_system_memory();
170 object_ref(OBJECT(cpu->memory));
171 #endif
174 void cpu_exec_realizefn(CPUState *cpu, Error **errp)
176 CPUClass *cc = CPU_GET_CLASS(cpu);
177 static bool tcg_target_initialized;
179 cpu_list_add(cpu);
181 if (tcg_enabled() && !tcg_target_initialized) {
182 tcg_target_initialized = true;
183 cc->tcg_initialize();
185 tlb_init(cpu);
187 qemu_plugin_vcpu_init_hook(cpu);
189 #ifdef CONFIG_USER_ONLY
190 assert(cc->vmsd == NULL);
191 #else /* !CONFIG_USER_ONLY */
192 if (qdev_get_vmsd(DEVICE(cpu)) == NULL) {
193 vmstate_register(NULL, cpu->cpu_index, &vmstate_cpu_common, cpu);
195 if (cc->vmsd != NULL) {
196 vmstate_register(NULL, cpu->cpu_index, cc->vmsd, cpu);
199 tcg_iommu_init_notifier_list(cpu);
200 #endif
203 const char *parse_cpu_option(const char *cpu_option)
205 ObjectClass *oc;
206 CPUClass *cc;
207 gchar **model_pieces;
208 const char *cpu_type;
210 model_pieces = g_strsplit(cpu_option, ",", 2);
211 if (!model_pieces[0]) {
212 error_report("-cpu option cannot be empty");
213 exit(1);
216 oc = cpu_class_by_name(CPU_RESOLVING_TYPE, model_pieces[0]);
217 if (oc == NULL) {
218 error_report("unable to find CPU model '%s'", model_pieces[0]);
219 g_strfreev(model_pieces);
220 exit(EXIT_FAILURE);
223 cpu_type = object_class_get_name(oc);
224 cc = CPU_CLASS(oc);
225 cc->parse_features(cpu_type, model_pieces[1], &error_fatal);
226 g_strfreev(model_pieces);
227 return cpu_type;
230 #if defined(CONFIG_USER_ONLY)
231 void tb_invalidate_phys_addr(target_ulong addr)
233 mmap_lock();
234 tb_invalidate_phys_page_range(addr, addr + 1);
235 mmap_unlock();
238 static void breakpoint_invalidate(CPUState *cpu, target_ulong pc)
240 tb_invalidate_phys_addr(pc);
242 #else
243 void tb_invalidate_phys_addr(AddressSpace *as, hwaddr addr, MemTxAttrs attrs)
245 ram_addr_t ram_addr;
246 MemoryRegion *mr;
247 hwaddr l = 1;
249 if (!tcg_enabled()) {
250 return;
253 RCU_READ_LOCK_GUARD();
254 mr = address_space_translate(as, addr, &addr, &l, false, attrs);
255 if (!(memory_region_is_ram(mr)
256 || memory_region_is_romd(mr))) {
257 return;
259 ram_addr = memory_region_get_ram_addr(mr) + addr;
260 tb_invalidate_phys_page_range(ram_addr, ram_addr + 1);
263 static void breakpoint_invalidate(CPUState *cpu, target_ulong pc)
266 * There may not be a virtual to physical translation for the pc
267 * right now, but there may exist cached TB for this pc.
268 * Flush the whole TB cache to force re-translation of such TBs.
269 * This is heavyweight, but we're debugging anyway.
271 tb_flush(cpu);
273 #endif
275 /* Add a breakpoint. */
276 int cpu_breakpoint_insert(CPUState *cpu, vaddr pc, int flags,
277 CPUBreakpoint **breakpoint)
279 CPUBreakpoint *bp;
281 bp = g_malloc(sizeof(*bp));
283 bp->pc = pc;
284 bp->flags = flags;
286 /* keep all GDB-injected breakpoints in front */
287 if (flags & BP_GDB) {
288 QTAILQ_INSERT_HEAD(&cpu->breakpoints, bp, entry);
289 } else {
290 QTAILQ_INSERT_TAIL(&cpu->breakpoints, bp, entry);
293 breakpoint_invalidate(cpu, pc);
295 if (breakpoint) {
296 *breakpoint = bp;
298 return 0;
301 /* Remove a specific breakpoint. */
302 int cpu_breakpoint_remove(CPUState *cpu, vaddr pc, int flags)
304 CPUBreakpoint *bp;
306 QTAILQ_FOREACH(bp, &cpu->breakpoints, entry) {
307 if (bp->pc == pc && bp->flags == flags) {
308 cpu_breakpoint_remove_by_ref(cpu, bp);
309 return 0;
312 return -ENOENT;
315 /* Remove a specific breakpoint by reference. */
316 void cpu_breakpoint_remove_by_ref(CPUState *cpu, CPUBreakpoint *breakpoint)
318 QTAILQ_REMOVE(&cpu->breakpoints, breakpoint, entry);
320 breakpoint_invalidate(cpu, breakpoint->pc);
322 g_free(breakpoint);
325 /* Remove all matching breakpoints. */
326 void cpu_breakpoint_remove_all(CPUState *cpu, int mask)
328 CPUBreakpoint *bp, *next;
330 QTAILQ_FOREACH_SAFE(bp, &cpu->breakpoints, entry, next) {
331 if (bp->flags & mask) {
332 cpu_breakpoint_remove_by_ref(cpu, bp);
337 /* enable or disable single step mode. EXCP_DEBUG is returned by the
338 CPU loop after each instruction */
339 void cpu_single_step(CPUState *cpu, int enabled)
341 if (cpu->singlestep_enabled != enabled) {
342 cpu->singlestep_enabled = enabled;
343 if (kvm_enabled()) {
344 kvm_update_guest_debug(cpu, 0);
345 } else {
346 /* must flush all the translated code to avoid inconsistencies */
347 /* XXX: only flush what is necessary */
348 tb_flush(cpu);
353 void cpu_abort(CPUState *cpu, const char *fmt, ...)
355 va_list ap;
356 va_list ap2;
358 va_start(ap, fmt);
359 va_copy(ap2, ap);
360 fprintf(stderr, "qemu: fatal: ");
361 vfprintf(stderr, fmt, ap);
362 fprintf(stderr, "\n");
363 cpu_dump_state(cpu, stderr, CPU_DUMP_FPU | CPU_DUMP_CCOP);
364 if (qemu_log_separate()) {
365 FILE *logfile = qemu_log_lock();
366 qemu_log("qemu: fatal: ");
367 qemu_log_vprintf(fmt, ap2);
368 qemu_log("\n");
369 log_cpu_state(cpu, CPU_DUMP_FPU | CPU_DUMP_CCOP);
370 qemu_log_flush();
371 qemu_log_unlock(logfile);
372 qemu_log_close();
374 va_end(ap2);
375 va_end(ap);
376 replay_finish();
377 #if defined(CONFIG_USER_ONLY)
379 struct sigaction act;
380 sigfillset(&act.sa_mask);
381 act.sa_handler = SIG_DFL;
382 act.sa_flags = 0;
383 sigaction(SIGABRT, &act, NULL);
385 #endif
386 abort();
389 /* physical memory access (slow version, mainly for debug) */
390 #if defined(CONFIG_USER_ONLY)
391 int cpu_memory_rw_debug(CPUState *cpu, target_ulong addr,
392 void *ptr, target_ulong len, bool is_write)
394 int flags;
395 target_ulong l, page;
396 void * p;
397 uint8_t *buf = ptr;
399 while (len > 0) {
400 page = addr & TARGET_PAGE_MASK;
401 l = (page + TARGET_PAGE_SIZE) - addr;
402 if (l > len)
403 l = len;
404 flags = page_get_flags(page);
405 if (!(flags & PAGE_VALID))
406 return -1;
407 if (is_write) {
408 if (!(flags & PAGE_WRITE))
409 return -1;
410 /* XXX: this code should not depend on lock_user */
411 if (!(p = lock_user(VERIFY_WRITE, addr, l, 0)))
412 return -1;
413 memcpy(p, buf, l);
414 unlock_user(p, addr, l);
415 } else {
416 if (!(flags & PAGE_READ))
417 return -1;
418 /* XXX: this code should not depend on lock_user */
419 if (!(p = lock_user(VERIFY_READ, addr, l, 1)))
420 return -1;
421 memcpy(buf, p, l);
422 unlock_user(p, addr, 0);
424 len -= l;
425 buf += l;
426 addr += l;
428 return 0;
430 #endif
432 bool target_words_bigendian(void)
434 #if defined(TARGET_WORDS_BIGENDIAN)
435 return true;
436 #else
437 return false;
438 #endif
441 void page_size_init(void)
443 /* NOTE: we can always suppose that qemu_host_page_size >=
444 TARGET_PAGE_SIZE */
445 if (qemu_host_page_size == 0) {
446 qemu_host_page_size = qemu_real_host_page_size;
448 if (qemu_host_page_size < TARGET_PAGE_SIZE) {
449 qemu_host_page_size = TARGET_PAGE_SIZE;
451 qemu_host_page_mask = -(intptr_t)qemu_host_page_size;