kvmvapic.c 24.0 KB
Newer Older
1 2 3 4 5 6 7 8 9 10
/*
 * TPR optimization for 32-bit Windows guests (XP and Server 2003)
 *
 * Copyright (C) 2007-2008 Qumranet Technologies
 * Copyright (C) 2012      Jan Kiszka, Siemens AG
 *
 * This work is licensed under the terms of the GNU GPL version 2, or
 * (at your option) any later version. See the COPYING file in the
 * top-level directory.
 */
P
Peter Maydell 已提交
11
#include "qemu/osdep.h"
12 13
#include "qemu-common.h"
#include "cpu.h"
14 15
#include "sysemu/sysemu.h"
#include "sysemu/cpus.h"
16
#include "sysemu/hw_accel.h"
17
#include "sysemu/kvm.h"
P
Paolo Bonzini 已提交
18
#include "hw/i386/apic_internal.h"
19
#include "hw/sysbus.h"
20
#include "tcg/tcg.h"
21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66

#define VAPIC_IO_PORT           0x7e

#define VAPIC_CPU_SHIFT         7

#define ROM_BLOCK_SIZE          512
#define ROM_BLOCK_MASK          (~(ROM_BLOCK_SIZE - 1))

typedef enum VAPICMode {
    VAPIC_INACTIVE = 0,
    VAPIC_ACTIVE   = 1,
    VAPIC_STANDBY  = 2,
} VAPICMode;

typedef struct VAPICHandlers {
    uint32_t set_tpr;
    uint32_t set_tpr_eax;
    uint32_t get_tpr[8];
    uint32_t get_tpr_stack;
} QEMU_PACKED VAPICHandlers;

typedef struct GuestROMState {
    char signature[8];
    uint32_t vaddr;
    uint32_t fixup_start;
    uint32_t fixup_end;
    uint32_t vapic_vaddr;
    uint32_t vapic_size;
    uint32_t vcpu_shift;
    uint32_t real_tpr_addr;
    VAPICHandlers up;
    VAPICHandlers mp;
} QEMU_PACKED GuestROMState;

typedef struct VAPICROMState {
    SysBusDevice busdev;
    MemoryRegion io;
    MemoryRegion rom;
    uint32_t state;
    uint32_t rom_state_paddr;
    uint32_t rom_state_vaddr;
    uint32_t vapic_paddr;
    uint32_t real_tpr_addr;
    GuestROMState rom_state;
    size_t rom_size;
    bool rom_mapped_writable;
67
    VMChangeStateEntry *vmsentry;
68 69
} VAPICROMState;

70 71 72
#define TYPE_VAPIC "kvmvapic"
#define VAPIC(obj) OBJECT_CHECK(VAPICROMState, (obj), TYPE_VAPIC)

73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132
#define TPR_INSTR_ABS_MODRM             0x1
#define TPR_INSTR_MATCH_MODRM_REG       0x2

typedef struct TPRInstruction {
    uint8_t opcode;
    uint8_t modrm_reg;
    unsigned int flags;
    TPRAccess access;
    size_t length;
    off_t addr_offset;
} TPRInstruction;

/* must be sorted by length, shortest first */
static const TPRInstruction tpr_instr[] = {
    { /* mov abs to eax */
        .opcode = 0xa1,
        .access = TPR_ACCESS_READ,
        .length = 5,
        .addr_offset = 1,
    },
    { /* mov eax to abs */
        .opcode = 0xa3,
        .access = TPR_ACCESS_WRITE,
        .length = 5,
        .addr_offset = 1,
    },
    { /* mov r32 to r/m32 */
        .opcode = 0x89,
        .flags = TPR_INSTR_ABS_MODRM,
        .access = TPR_ACCESS_WRITE,
        .length = 6,
        .addr_offset = 2,
    },
    { /* mov r/m32 to r32 */
        .opcode = 0x8b,
        .flags = TPR_INSTR_ABS_MODRM,
        .access = TPR_ACCESS_READ,
        .length = 6,
        .addr_offset = 2,
    },
    { /* push r/m32 */
        .opcode = 0xff,
        .modrm_reg = 6,
        .flags = TPR_INSTR_ABS_MODRM | TPR_INSTR_MATCH_MODRM_REG,
        .access = TPR_ACCESS_READ,
        .length = 6,
        .addr_offset = 2,
    },
    { /* mov imm32, r/m32 (c7/0) */
        .opcode = 0xc7,
        .modrm_reg = 0,
        .flags = TPR_INSTR_ABS_MODRM | TPR_INSTR_MATCH_MODRM_REG,
        .access = TPR_ACCESS_WRITE,
        .length = 10,
        .addr_offset = 2,
    },
};

static void read_guest_rom_state(VAPICROMState *s)
{
133 134
    cpu_physical_memory_read(s->rom_state_paddr, &s->rom_state,
                             sizeof(GuestROMState));
135 136 137 138
}

static void write_guest_rom_state(VAPICROMState *s)
{
139 140
    cpu_physical_memory_write(s->rom_state_paddr, &s->rom_state,
                              sizeof(GuestROMState));
141 142 143 144 145 146 147 148 149 150 151 152
}

static void update_guest_rom_state(VAPICROMState *s)
{
    read_guest_rom_state(s);

    s->rom_state.real_tpr_addr = cpu_to_le32(s->real_tpr_addr);
    s->rom_state.vcpu_shift = cpu_to_le32(VAPIC_CPU_SHIFT);

    write_guest_rom_state(s);
}

A
Andreas Färber 已提交
153
static int find_real_tpr_addr(VAPICROMState *s, CPUX86State *env)
154
{
155
    CPUState *cs = CPU(x86_env_get_cpu(env));
A
Avi Kivity 已提交
156
    hwaddr paddr;
157 158 159 160 161 162 163 164 165 166 167
    target_ulong addr;

    if (s->state == VAPIC_ACTIVE) {
        return 0;
    }
    /*
     * If there is no prior TPR access instruction we could analyze (which is
     * the case after resume from hibernation), we need to scan the possible
     * virtual address space for the APIC mapping.
     */
    for (addr = 0xfffff000; addr >= 0x80000000; addr -= TARGET_PAGE_SIZE) {
168
        paddr = cpu_get_phys_page_debug(cs, addr);
169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196
        if (paddr != APIC_DEFAULT_ADDRESS) {
            continue;
        }
        s->real_tpr_addr = addr + 0x80;
        update_guest_rom_state(s);
        return 0;
    }
    return -1;
}

static uint8_t modrm_reg(uint8_t modrm)
{
    return (modrm >> 3) & 7;
}

static bool is_abs_modrm(uint8_t modrm)
{
    return (modrm & 0xc7) == 0x05;
}

static bool opcode_matches(uint8_t *opcode, const TPRInstruction *instr)
{
    return opcode[0] == instr->opcode &&
        (!(instr->flags & TPR_INSTR_ABS_MODRM) || is_abs_modrm(opcode[1])) &&
        (!(instr->flags & TPR_INSTR_MATCH_MODRM_REG) ||
         modrm_reg(opcode[1]) == instr->modrm_reg);
}

197
static int evaluate_tpr_instruction(VAPICROMState *s, X86CPU *cpu,
198 199
                                    target_ulong *pip, TPRAccess access)
{
200
    CPUState *cs = CPU(cpu);
201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220
    const TPRInstruction *instr;
    target_ulong ip = *pip;
    uint8_t opcode[2];
    uint32_t real_tpr_addr;
    int i;

    if ((ip & 0xf0000000ULL) != 0x80000000ULL &&
        (ip & 0xf0000000ULL) != 0xe0000000ULL) {
        return -1;
    }

    /*
     * Early Windows 2003 SMP initialization contains a
     *
     *   mov imm32, r/m32
     *
     * instruction that is patched by TPR optimization. The problem is that
     * RSP, used by the patched instruction, is zero, so the guest gets a
     * double fault and dies.
     */
221
    if (cpu->env.regs[R_ESP] == 0) {
222 223 224 225 226 227 228 229 230 231 232 233 234 235
        return -1;
    }

    if (kvm_enabled() && !kvm_irqchip_in_kernel()) {
        /*
         * KVM without kernel-based TPR access reporting will pass an IP that
         * points after the accessing instruction. So we need to look backward
         * to find the reason.
         */
        for (i = 0; i < ARRAY_SIZE(tpr_instr); i++) {
            instr = &tpr_instr[i];
            if (instr->access != access) {
                continue;
            }
236
            if (cpu_memory_rw_debug(cs, ip - instr->length, opcode,
237 238 239 240 241 242 243 244 245 246
                                    sizeof(opcode), 0) < 0) {
                return -1;
            }
            if (opcode_matches(opcode, instr)) {
                ip -= instr->length;
                goto instruction_ok;
            }
        }
        return -1;
    } else {
247
        if (cpu_memory_rw_debug(cs, ip, opcode, sizeof(opcode), 0) < 0) {
248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263
            return -1;
        }
        for (i = 0; i < ARRAY_SIZE(tpr_instr); i++) {
            instr = &tpr_instr[i];
            if (opcode_matches(opcode, instr)) {
                goto instruction_ok;
            }
        }
        return -1;
    }

instruction_ok:
    /*
     * Grab the virtual TPR address from the instruction
     * and update the cached values.
     */
264
    if (cpu_memory_rw_debug(cs, ip + instr->addr_offset,
265 266 267 268 269 270 271 272 273 274 275 276 277 278 279
                            (void *)&real_tpr_addr,
                            sizeof(real_tpr_addr), 0) < 0) {
        return -1;
    }
    real_tpr_addr = le32_to_cpu(real_tpr_addr);
    if ((real_tpr_addr & 0xfff) != 0x80) {
        return -1;
    }
    s->real_tpr_addr = real_tpr_addr;
    update_guest_rom_state(s);

    *pip = ip;
    return 0;
}

A
Andreas Färber 已提交
280
static int update_rom_mapping(VAPICROMState *s, CPUX86State *env, target_ulong ip)
281
{
282
    CPUState *cs = CPU(x86_env_get_cpu(env));
A
Avi Kivity 已提交
283
    hwaddr paddr;
284 285 286 287 288 289 290 291 292 293 294 295 296 297 298
    uint32_t rom_state_vaddr;
    uint32_t pos, patch, offset;

    /* nothing to do if already activated */
    if (s->state == VAPIC_ACTIVE) {
        return 0;
    }

    /* bail out if ROM init code was not executed (missing ROM?) */
    if (s->state == VAPIC_INACTIVE) {
        return -1;
    }

    /* find out virtual address of the ROM */
    rom_state_vaddr = s->rom_state_paddr + (ip & 0xf0000000);
299
    paddr = cpu_get_phys_page_debug(cs, rom_state_vaddr);
300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319
    if (paddr == -1) {
        return -1;
    }
    paddr += rom_state_vaddr & ~TARGET_PAGE_MASK;
    if (paddr != s->rom_state_paddr) {
        return -1;
    }
    read_guest_rom_state(s);
    if (memcmp(s->rom_state.signature, "kvm aPiC", 8) != 0) {
        return -1;
    }
    s->rom_state_vaddr = rom_state_vaddr;

    /* fixup addresses in ROM if needed */
    if (rom_state_vaddr == le32_to_cpu(s->rom_state.vaddr)) {
        return 0;
    }
    for (pos = le32_to_cpu(s->rom_state.fixup_start);
         pos < le32_to_cpu(s->rom_state.fixup_end);
         pos += 4) {
320 321
        cpu_physical_memory_read(paddr + pos - s->rom_state.vaddr,
                                 &offset, sizeof(offset));
322
        offset = le32_to_cpu(offset);
323
        cpu_physical_memory_read(paddr + offset, &patch, sizeof(patch));
324 325 326
        patch = le32_to_cpu(patch);
        patch += rom_state_vaddr - le32_to_cpu(s->rom_state.vaddr);
        patch = cpu_to_le32(patch);
327
        cpu_physical_memory_write(paddr + offset, &patch, sizeof(patch));
328 329 330 331 332 333 334 335 336 337 338 339 340 341
    }
    read_guest_rom_state(s);
    s->vapic_paddr = paddr + le32_to_cpu(s->rom_state.vapic_vaddr) -
        le32_to_cpu(s->rom_state.vaddr);

    return 0;
}

/*
 * Tries to read the unique processor number from the Kernel Processor Control
 * Region (KPCR) of 32-bit Windows XP and Server 2003. Returns -1 if the KPCR
 * cannot be accessed or is considered invalid. This also ensures that we are
 * not patching the wrong guest.
 */
342
static int get_kpcr_number(X86CPU *cpu)
343
{
344
    CPUX86State *env = &cpu->env;
345 346 347 348 349 350 351
    struct kpcr {
        uint8_t  fill1[0x1c];
        uint32_t self;
        uint8_t  fill2[0x31];
        uint8_t  number;
    } QEMU_PACKED kpcr;

352
    if (cpu_memory_rw_debug(CPU(cpu), env->segs[R_FS].base,
353 354 355 356 357 358 359
                            (void *)&kpcr, sizeof(kpcr), 0) < 0 ||
        kpcr.self != env->segs[R_FS].base) {
        return -1;
    }
    return kpcr.number;
}

360
static int vapic_enable(VAPICROMState *s, X86CPU *cpu)
361
{
362
    int cpu_number = get_kpcr_number(cpu);
A
Avi Kivity 已提交
363
    hwaddr vapic_paddr;
364 365 366 367 368 369
    static const uint8_t enabled = 1;

    if (cpu_number < 0) {
        return -1;
    }
    vapic_paddr = s->vapic_paddr +
A
Avi Kivity 已提交
370
        (((hwaddr)cpu_number) << VAPIC_CPU_SHIFT);
371 372
    cpu_physical_memory_write(vapic_paddr + offsetof(VAPICState, enabled),
                              &enabled, sizeof(enabled));
373
    apic_enable_vapic(cpu->apic_state, vapic_paddr);
374 375 376 377 378 379

    s->state = VAPIC_ACTIVE;

    return 0;
}

380
static void patch_byte(X86CPU *cpu, target_ulong addr, uint8_t byte)
381
{
382
    cpu_memory_rw_debug(CPU(cpu), addr, &byte, 1, 1);
383 384
}

385
static void patch_call(X86CPU *cpu, target_ulong ip, uint32_t target)
386 387 388 389
{
    uint32_t offset;

    offset = cpu_to_le32(target - ip - 5);
390 391
    patch_byte(cpu, ip, 0xe8); /* call near */
    cpu_memory_rw_debug(CPU(cpu), ip + 1, (void *)&offset, sizeof(offset), 1);
392 393
}

394 395 396 397 398 399
typedef struct PatchInfo {
    VAPICHandlers *handler;
    target_ulong ip;
} PatchInfo;

static void do_patch_instruction(CPUState *cs, run_on_cpu_data data)
400
{
401 402 403 404
    X86CPU *x86_cpu = X86_CPU(cs);
    PatchInfo *info = (PatchInfo *) data.host_ptr;
    VAPICHandlers *handlers = info->handler;
    target_ulong ip = info->ip;
405
    uint8_t opcode[2];
406
    uint32_t imm32 = 0;
407

408
    cpu_memory_rw_debug(cs, ip, opcode, sizeof(opcode), 0);
409 410 411

    switch (opcode[0]) {
    case 0x89: /* mov r32 to r/m32 */
412 413
        patch_byte(x86_cpu, ip, 0x50 + modrm_reg(opcode[1]));  /* push reg */
        patch_call(x86_cpu, ip + 1, handlers->set_tpr);
414 415
        break;
    case 0x8b: /* mov r/m32 to r32 */
416 417
        patch_byte(x86_cpu, ip, 0x90);
        patch_call(x86_cpu, ip + 1, handlers->get_tpr[modrm_reg(opcode[1])]);
418 419
        break;
    case 0xa1: /* mov abs to eax */
420
        patch_call(x86_cpu, ip, handlers->get_tpr[0]);
421 422
        break;
    case 0xa3: /* mov eax to abs */
423
        patch_call(x86_cpu, ip, handlers->set_tpr_eax);
424 425
        break;
    case 0xc7: /* mov imm32, r/m32 (c7/0) */
426
        patch_byte(x86_cpu, ip, 0x68);  /* push imm32 */
427 428
        cpu_memory_rw_debug(cs, ip + 6, (void *)&imm32, sizeof(imm32), 0);
        cpu_memory_rw_debug(cs, ip + 1, (void *)&imm32, sizeof(imm32), 1);
429
        patch_call(x86_cpu, ip + 5, handlers->set_tpr);
430 431
        break;
    case 0xff: /* push r/m32 */
432 433
        patch_byte(x86_cpu, ip, 0x50); /* push eax */
        patch_call(x86_cpu, ip + 1, handlers->get_tpr_stack);
434 435 436 437 438
        break;
    default:
        abort();
    }

439 440 441 442 443 444 445 446
    g_free(info);
}

static void patch_instruction(VAPICROMState *s, X86CPU *cpu, target_ulong ip)
{
    CPUState *cs = CPU(cpu);
    VAPICHandlers *handlers;
    PatchInfo *info;
447

448 449 450 451
    if (smp_cpus == 1) {
        handlers = &s->rom_state.up;
    } else {
        handlers = &s->rom_state.mp;
452
    }
453 454 455 456 457 458

    info  = g_new(PatchInfo, 1);
    info->handler = handlers;
    info->ip = ip;

    async_safe_run_on_cpu(cs, do_patch_instruction, RUN_ON_CPU_HOST_PTR(info));
459 460
}

461
void vapic_report_tpr_access(DeviceState *dev, CPUState *cs, target_ulong ip,
462 463
                             TPRAccess access)
{
A
Andreas Färber 已提交
464
    VAPICROMState *s = VAPIC(dev);
465 466
    X86CPU *cpu = X86_CPU(cs);
    CPUX86State *env = &cpu->env;
467

468
    cpu_synchronize_state(cs);
469

470
    if (evaluate_tpr_instruction(s, cpu, &ip, access) < 0) {
471
        if (s->state == VAPIC_ACTIVE) {
472
            vapic_enable(s, cpu);
473 474 475 476 477 478
        }
        return;
    }
    if (update_rom_mapping(s, env, ip) < 0) {
        return;
    }
479
    if (vapic_enable(s, cpu) < 0) {
480 481
        return;
    }
482
    patch_instruction(s, cpu, ip);
483 484 485 486 487 488 489
}

typedef struct VAPICEnableTPRReporting {
    DeviceState *apic;
    bool enable;
} VAPICEnableTPRReporting;

490
static void vapic_do_enable_tpr_reporting(CPUState *cpu, run_on_cpu_data data)
491
{
492
    VAPICEnableTPRReporting *info = data.host_ptr;
493 494 495 496 497 498 499 500
    apic_enable_tpr_access_reporting(info->apic, info->enable);
}

static void vapic_enable_tpr_reporting(bool enable)
{
    VAPICEnableTPRReporting info = {
        .enable = enable,
    };
501
    CPUState *cs;
502
    X86CPU *cpu;
503

A
Andreas Färber 已提交
504
    CPU_FOREACH(cs) {
505
        cpu = X86_CPU(cs);
506
        info.apic = cpu->apic_state;
507
        run_on_cpu(cs, vapic_do_enable_tpr_reporting, RUN_ON_CPU_HOST_PTR(&info));
508 509 510 511 512
    }
}

static void vapic_reset(DeviceState *dev)
{
A
Andreas Färber 已提交
513
    VAPICROMState *s = VAPIC(dev);
514

515
    s->state = VAPIC_INACTIVE;
516
    s->rom_state_paddr = 0;
517 518 519 520 521 522 523 524 525 526
    vapic_enable_tpr_reporting(false);
}

/*
 * Set the IRQ polling hypercalls to the supported variant:
 *  - vmcall if using KVM in-kernel irqchip
 *  - 32-bit VAPIC port write otherwise
 */
static int patch_hypercalls(VAPICROMState *s)
{
A
Avi Kivity 已提交
527
    hwaddr rom_paddr = s->rom_state_paddr & ROM_BLOCK_MASK;
528 529 530 531 532 533 534 535 536 537 538 539 540
    static const uint8_t vmcall_pattern[] = { /* vmcall */
        0xb8, 0x1, 0, 0, 0, 0xf, 0x1, 0xc1
    };
    static const uint8_t outl_pattern[] = { /* nop; outl %eax,0x7e */
        0xb8, 0x1, 0, 0, 0, 0x90, 0xe7, 0x7e
    };
    uint8_t alternates[2];
    const uint8_t *pattern;
    const uint8_t *patch;
    off_t pos;
    uint8_t *rom;

    rom = g_malloc(s->rom_size);
541
    cpu_physical_memory_read(rom_paddr, rom, s->rom_size);
542 543 544 545 546 547 548 549 550 551 552 553 554 555 556

    for (pos = 0; pos < s->rom_size - sizeof(vmcall_pattern); pos++) {
        if (kvm_irqchip_in_kernel()) {
            pattern = outl_pattern;
            alternates[0] = outl_pattern[7];
            alternates[1] = outl_pattern[7];
            patch = &vmcall_pattern[5];
        } else {
            pattern = vmcall_pattern;
            alternates[0] = vmcall_pattern[7];
            alternates[1] = 0xd9; /* AMD's VMMCALL */
            patch = &outl_pattern[5];
        }
        if (memcmp(rom + pos, pattern, 7) == 0 &&
            (rom[pos + 7] == alternates[0] || rom[pos + 7] == alternates[1])) {
557
            cpu_physical_memory_write(rom_paddr + pos + 5, patch, 3);
558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574
            /*
             * Don't flush the tb here. Under ordinary conditions, the patched
             * calls are miles away from the current IP. Under malicious
             * conditions, the guest could trick us to crash.
             */
        }
    }

    g_free(rom);
    return 0;
}

/*
 * For TCG mode or the time KVM honors read-only memory regions, we need to
 * enable write access to the option ROM so that variables can be updated by
 * the guest.
 */
J
Jan Kiszka 已提交
575
static int vapic_map_rom_writable(VAPICROMState *s)
576
{
A
Avi Kivity 已提交
577
    hwaddr rom_paddr = s->rom_state_paddr & ROM_BLOCK_MASK;
578 579 580 581 582 583 584 585 586
    MemoryRegionSection section;
    MemoryRegion *as;
    size_t rom_size;
    uint8_t *ram;

    as = sysbus_address_space(&s->busdev);

    if (s->rom_mapped_writable) {
        memory_region_del_subregion(as, &s->rom);
587
        object_unparent(OBJECT(&s->rom));
588 589 590 591 592 593
    }

    /* grab RAM memory region (region @rom_paddr may still be pc.rom) */
    section = memory_region_find(as, 0, 1);

    /* read ROM size from RAM region */
594 595 596
    if (rom_paddr + 2 >= memory_region_size(section.mr)) {
        return -1;
    }
597 598
    ram = memory_region_get_ram_ptr(section.mr);
    rom_size = ram[rom_paddr + 2] * ROM_BLOCK_SIZE;
J
Jan Kiszka 已提交
599 600 601
    if (rom_size == 0) {
        return -1;
    }
602 603
    s->rom_size = rom_size;

604
    /* We need to round to avoid creating subpages
605
     * from which we cannot run code. */
606 607
    rom_size += rom_paddr & ~TARGET_PAGE_MASK;
    rom_paddr &= TARGET_PAGE_MASK;
608 609
    rom_size = TARGET_PAGE_ALIGN(rom_size);

610 611
    memory_region_init_alias(&s->rom, OBJECT(s), "kvmvapic-rom", section.mr,
                             rom_paddr, rom_size);
612 613
    memory_region_add_subregion_overlap(as, rom_paddr, &s->rom, 1000);
    s->rom_mapped_writable = true;
P
Paolo Bonzini 已提交
614
    memory_region_unref(section.mr);
J
Jan Kiszka 已提交
615 616

    return 0;
617 618 619 620
}

static int vapic_prepare(VAPICROMState *s)
{
J
Jan Kiszka 已提交
621 622 623
    if (vapic_map_rom_writable(s) < 0) {
        return -1;
    }
624 625 626 627 628 629 630 631 632 633

    if (patch_hypercalls(s) < 0) {
        return -1;
    }

    vapic_enable_tpr_reporting(true);

    return 0;
}

A
Avi Kivity 已提交
634
static void vapic_write(void *opaque, hwaddr addr, uint64_t data,
635 636 637
                        unsigned int size)
{
    VAPICROMState *s = opaque;
P
P J P 已提交
638 639 640
    X86CPU *cpu;
    CPUX86State *env;
    hwaddr rom_paddr;
641

P
P J P 已提交
642 643 644 645 646 647 648
    if (!current_cpu) {
        return;
    }

    cpu_synchronize_state(current_cpu);
    cpu = X86_CPU(current_cpu);
    env = &cpu->env;
649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670

    /*
     * The VAPIC supports two PIO-based hypercalls, both via port 0x7E.
     *  o 16-bit write access:
     *    Reports the option ROM initialization to the hypervisor. Written
     *    value is the offset of the state structure in the ROM.
     *  o 8-bit write access:
     *    Reactivates the VAPIC after a guest hibernation, i.e. after the
     *    option ROM content has been re-initialized by a guest power cycle.
     *  o 32-bit write access:
     *    Poll for pending IRQs, considering the current VAPIC state.
     */
    switch (size) {
    case 2:
        if (s->state == VAPIC_INACTIVE) {
            rom_paddr = (env->segs[R_CS].base + env->eip) & ROM_BLOCK_MASK;
            s->rom_state_paddr = rom_paddr + data;

            s->state = VAPIC_STANDBY;
        }
        if (vapic_prepare(s) < 0) {
            s->state = VAPIC_INACTIVE;
671
            s->rom_state_paddr = 0;
672 673 674 675 676 677 678 679 680 681 682 683
            break;
        }
        break;
    case 1:
        if (kvm_enabled()) {
            /*
             * Disable triggering instruction in ROM by writing a NOP.
             *
             * We cannot do this in TCG mode as the reported IP is not
             * accurate.
             */
            pause_all_vcpus();
684 685
            patch_byte(cpu, env->eip - 2, 0x66);
            patch_byte(cpu, env->eip - 1, 0x90);
686 687 688 689 690 691 692 693 694 695 696 697
            resume_all_vcpus();
        }

        if (s->state == VAPIC_ACTIVE) {
            break;
        }
        if (update_rom_mapping(s, env, env->eip) < 0) {
            break;
        }
        if (find_real_tpr_addr(s, env) < 0) {
            break;
        }
698
        vapic_enable(s, cpu);
699 700 701 702
        break;
    default:
    case 4:
        if (!kvm_irqchip_in_kernel()) {
703
            apic_poll_irq(cpu->apic_state);
704 705 706 707 708
        }
        break;
    }
}

709 710 711 712 713
static uint64_t vapic_read(void *opaque, hwaddr addr, unsigned size)
{
    return 0xffffffff;
}

714 715
static const MemoryRegionOps vapic_ops = {
    .write = vapic_write,
716
    .read = vapic_read,
717 718 719
    .endianness = DEVICE_NATIVE_ENDIAN,
};

H
Hu Tao 已提交
720
static void vapic_realize(DeviceState *dev, Error **errp)
721
{
H
Hu Tao 已提交
722
    SysBusDevice *sbd = SYS_BUS_DEVICE(dev);
723
    VAPICROMState *s = VAPIC(dev);
724

725
    memory_region_init_io(&s->io, OBJECT(s), &vapic_ops, s, "kvmvapic", 2);
H
Hu Tao 已提交
726 727
    sysbus_add_io(sbd, VAPIC_IO_PORT, &s->io);
    sysbus_init_ioports(sbd, VAPIC_IO_PORT, 2);
728 729 730 731 732 733

    option_rom[nb_option_roms].name = "kvmvapic.bin";
    option_rom[nb_option_roms].bootindex = -1;
    nb_option_roms++;
}

734
static void do_vapic_enable(CPUState *cs, run_on_cpu_data data)
735
{
736
    VAPICROMState *s = data.host_ptr;
737
    X86CPU *cpu = X86_CPU(cs);
738

739 740 741 742 743
    static const uint8_t enabled = 1;
    cpu_physical_memory_write(s->vapic_paddr + offsetof(VAPICState, enabled),
                              &enabled, sizeof(enabled));
    apic_enable_vapic(cpu->apic_state, s->vapic_paddr);
    s->state = VAPIC_ACTIVE;
744 745
}

746 747
static void kvmvapic_vm_state_change(void *opaque, int running,
                                     RunState state)
748 749 750 751
{
    VAPICROMState *s = opaque;
    uint8_t *zero;

752 753 754 755 756 757
    if (!running) {
        return;
    }

    if (s->state == VAPIC_ACTIVE) {
        if (smp_cpus == 1) {
758
            run_on_cpu(first_cpu, do_vapic_enable, RUN_ON_CPU_HOST_PTR(s));
759 760 761 762 763 764 765 766 767
        } else {
            zero = g_malloc0(s->rom_state.vapic_size);
            cpu_physical_memory_write(s->vapic_paddr, zero,
                                      s->rom_state.vapic_size);
            g_free(zero);
        }
    }

    qemu_del_vm_change_state_handler(s->vmsentry);
768
    s->vmsentry = NULL;
769 770 771 772 773 774
}

static int vapic_post_load(void *opaque, int version_id)
{
    VAPICROMState *s = opaque;

775 776 777 778 779 780 781 782 783 784 785 786 787 788
    /*
     * The old implementation of qemu-kvm did not provide the state
     * VAPIC_STANDBY. Reconstruct it.
     */
    if (s->state == VAPIC_INACTIVE && s->rom_state_paddr != 0) {
        s->state = VAPIC_STANDBY;
    }

    if (s->state != VAPIC_INACTIVE) {
        if (vapic_prepare(s) < 0) {
            return -1;
        }
    }

789 790 791 792
    if (!s->vmsentry) {
        s->vmsentry =
            qemu_add_vm_change_state_handler(kvmvapic_vm_state_change, s);
    }
793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850
    return 0;
}

static const VMStateDescription vmstate_handlers = {
    .name = "kvmvapic-handlers",
    .version_id = 1,
    .minimum_version_id = 1,
    .fields = (VMStateField[]) {
        VMSTATE_UINT32(set_tpr, VAPICHandlers),
        VMSTATE_UINT32(set_tpr_eax, VAPICHandlers),
        VMSTATE_UINT32_ARRAY(get_tpr, VAPICHandlers, 8),
        VMSTATE_UINT32(get_tpr_stack, VAPICHandlers),
        VMSTATE_END_OF_LIST()
    }
};

static const VMStateDescription vmstate_guest_rom = {
    .name = "kvmvapic-guest-rom",
    .version_id = 1,
    .minimum_version_id = 1,
    .fields = (VMStateField[]) {
        VMSTATE_UNUSED(8),     /* signature */
        VMSTATE_UINT32(vaddr, GuestROMState),
        VMSTATE_UINT32(fixup_start, GuestROMState),
        VMSTATE_UINT32(fixup_end, GuestROMState),
        VMSTATE_UINT32(vapic_vaddr, GuestROMState),
        VMSTATE_UINT32(vapic_size, GuestROMState),
        VMSTATE_UINT32(vcpu_shift, GuestROMState),
        VMSTATE_UINT32(real_tpr_addr, GuestROMState),
        VMSTATE_STRUCT(up, GuestROMState, 0, vmstate_handlers, VAPICHandlers),
        VMSTATE_STRUCT(mp, GuestROMState, 0, vmstate_handlers, VAPICHandlers),
        VMSTATE_END_OF_LIST()
    }
};

static const VMStateDescription vmstate_vapic = {
    .name = "kvm-tpr-opt",      /* compatible with qemu-kvm VAPIC */
    .version_id = 1,
    .minimum_version_id = 1,
    .post_load = vapic_post_load,
    .fields = (VMStateField[]) {
        VMSTATE_STRUCT(rom_state, VAPICROMState, 0, vmstate_guest_rom,
                       GuestROMState),
        VMSTATE_UINT32(state, VAPICROMState),
        VMSTATE_UINT32(real_tpr_addr, VAPICROMState),
        VMSTATE_UINT32(rom_state_vaddr, VAPICROMState),
        VMSTATE_UINT32(vapic_paddr, VAPICROMState),
        VMSTATE_UINT32(rom_state_paddr, VAPICROMState),
        VMSTATE_END_OF_LIST()
    }
};

static void vapic_class_init(ObjectClass *klass, void *data)
{
    DeviceClass *dc = DEVICE_CLASS(klass);

    dc->reset   = vapic_reset;
    dc->vmsd    = &vmstate_vapic;
H
Hu Tao 已提交
851
    dc->realize = vapic_realize;
852 853
}

854
static const TypeInfo vapic_type = {
855
    .name          = TYPE_VAPIC,
856 857 858 859 860 861 862 863 864 865 866
    .parent        = TYPE_SYS_BUS_DEVICE,
    .instance_size = sizeof(VAPICROMState),
    .class_init    = vapic_class_init,
};

static void vapic_register(void)
{
    type_register_static(&vapic_type);
}

type_init(vapic_register);