2011-05-13 04:54:01 +00:00
|
|
|
/*-
|
2017-11-26 02:00:33 +00:00
|
|
|
* SPDX-License-Identifier: BSD-2-Clause-FreeBSD
|
|
|
|
*
|
2011-05-13 04:54:01 +00:00
|
|
|
* Copyright (c) 2011 NetApp, Inc.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY NETAPP, INC ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL NETAPP, INC OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*
|
|
|
|
* $FreeBSD$
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <sys/cdefs.h>
|
|
|
|
__FBSDID("$FreeBSD$");
|
|
|
|
|
2014-05-31 23:37:34 +00:00
|
|
|
#include <sys/param.h>
|
2011-05-13 04:54:01 +00:00
|
|
|
#include <sys/sysctl.h>
|
|
|
|
#include <sys/ioctl.h>
|
2019-12-17 01:33:26 +00:00
|
|
|
#include <sys/linker.h>
|
2011-05-13 04:54:01 +00:00
|
|
|
#include <sys/mman.h>
|
2019-12-17 01:33:26 +00:00
|
|
|
#include <sys/module.h>
|
2014-05-26 18:21:08 +00:00
|
|
|
#include <sys/_iovec.h>
|
2014-05-31 23:37:34 +00:00
|
|
|
#include <sys/cpuset.h>
|
2011-05-13 04:54:01 +00:00
|
|
|
|
2014-07-23 04:28:51 +00:00
|
|
|
#include <x86/segments.h>
|
2011-05-13 04:54:01 +00:00
|
|
|
#include <machine/specialreg.h>
|
|
|
|
|
2015-05-06 16:25:20 +00:00
|
|
|
#include <errno.h>
|
Initial support for bhyve save and restore.
Save and restore (also known as suspend and resume) permits a snapshot
to be taken of a guest's state that can later be resumed. In the
current implementation, bhyve(8) creates a UNIX domain socket that is
used by bhyvectl(8) to send a request to save a snapshot (and
optionally exit after the snapshot has been taken). A snapshot
currently consists of two files: the first holds a copy of guest RAM,
and the second file holds other guest state such as vCPU register
values and device model state.
To resume a guest, bhyve(8) must be started with a matching pair of
command line arguments to instantiate the same set of device models as
well as a pointer to the saved snapshot.
While the current implementation is useful for several uses cases, it
has a few limitations. The file format for saving the guest state is
tied to the ABI of internal bhyve structures and is not
self-describing (in that it does not communicate the set of device
models present in the system). In addition, the state saved for some
device models closely matches the internal data structures which might
prove a challenge for compatibility of snapshot files across a range
of bhyve versions. The file format also does not currently support
versioning of individual chunks of state. As a result, the current
file format is not a fixed binary format and future revisions to save
and restore will break binary compatiblity of snapshot files. The
goal is to move to a more flexible format that adds versioning,
etc. and at that point to commit to providing a reasonable level of
compatibility. As a result, the current implementation is not enabled
by default. It can be enabled via the WITH_BHYVE_SNAPSHOT=yes option
for userland builds, and the kernel option BHYVE_SHAPSHOT.
Submitted by: Mihai Tiganus, Flavius Anton, Darius Mihai
Submitted by: Elena Mihailescu, Mihai Carabas, Sergiu Weisz
Relnotes: yes
Sponsored by: University Politehnica of Bucharest
Sponsored by: Matthew Grooms (student scholarships)
Sponsored by: iXsystems
Differential Revision: https://reviews.freebsd.org/D19495
2020-05-05 00:02:04 +00:00
|
|
|
#include <stdbool.h>
|
2011-05-13 04:54:01 +00:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <assert.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <fcntl.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
|
2013-10-09 03:56:07 +00:00
|
|
|
#include <libutil.h>
|
|
|
|
|
Initial support for bhyve save and restore.
Save and restore (also known as suspend and resume) permits a snapshot
to be taken of a guest's state that can later be resumed. In the
current implementation, bhyve(8) creates a UNIX domain socket that is
used by bhyvectl(8) to send a request to save a snapshot (and
optionally exit after the snapshot has been taken). A snapshot
currently consists of two files: the first holds a copy of guest RAM,
and the second file holds other guest state such as vCPU register
values and device model state.
To resume a guest, bhyve(8) must be started with a matching pair of
command line arguments to instantiate the same set of device models as
well as a pointer to the saved snapshot.
While the current implementation is useful for several uses cases, it
has a few limitations. The file format for saving the guest state is
tied to the ABI of internal bhyve structures and is not
self-describing (in that it does not communicate the set of device
models present in the system). In addition, the state saved for some
device models closely matches the internal data structures which might
prove a challenge for compatibility of snapshot files across a range
of bhyve versions. The file format also does not currently support
versioning of individual chunks of state. As a result, the current
file format is not a fixed binary format and future revisions to save
and restore will break binary compatiblity of snapshot files. The
goal is to move to a more flexible format that adds versioning,
etc. and at that point to commit to providing a reasonable level of
compatibility. As a result, the current implementation is not enabled
by default. It can be enabled via the WITH_BHYVE_SNAPSHOT=yes option
for userland builds, and the kernel option BHYVE_SHAPSHOT.
Submitted by: Mihai Tiganus, Flavius Anton, Darius Mihai
Submitted by: Elena Mihailescu, Mihai Carabas, Sergiu Weisz
Relnotes: yes
Sponsored by: University Politehnica of Bucharest
Sponsored by: Matthew Grooms (student scholarships)
Sponsored by: iXsystems
Differential Revision: https://reviews.freebsd.org/D19495
2020-05-05 00:02:04 +00:00
|
|
|
#include <vm/vm.h>
|
2011-05-13 04:54:01 +00:00
|
|
|
#include <machine/vmm.h>
|
|
|
|
#include <machine/vmm_dev.h>
|
Initial support for bhyve save and restore.
Save and restore (also known as suspend and resume) permits a snapshot
to be taken of a guest's state that can later be resumed. In the
current implementation, bhyve(8) creates a UNIX domain socket that is
used by bhyvectl(8) to send a request to save a snapshot (and
optionally exit after the snapshot has been taken). A snapshot
currently consists of two files: the first holds a copy of guest RAM,
and the second file holds other guest state such as vCPU register
values and device model state.
To resume a guest, bhyve(8) must be started with a matching pair of
command line arguments to instantiate the same set of device models as
well as a pointer to the saved snapshot.
While the current implementation is useful for several uses cases, it
has a few limitations. The file format for saving the guest state is
tied to the ABI of internal bhyve structures and is not
self-describing (in that it does not communicate the set of device
models present in the system). In addition, the state saved for some
device models closely matches the internal data structures which might
prove a challenge for compatibility of snapshot files across a range
of bhyve versions. The file format also does not currently support
versioning of individual chunks of state. As a result, the current
file format is not a fixed binary format and future revisions to save
and restore will break binary compatiblity of snapshot files. The
goal is to move to a more flexible format that adds versioning,
etc. and at that point to commit to providing a reasonable level of
compatibility. As a result, the current implementation is not enabled
by default. It can be enabled via the WITH_BHYVE_SNAPSHOT=yes option
for userland builds, and the kernel option BHYVE_SHAPSHOT.
Submitted by: Mihai Tiganus, Flavius Anton, Darius Mihai
Submitted by: Elena Mihailescu, Mihai Carabas, Sergiu Weisz
Relnotes: yes
Sponsored by: University Politehnica of Bucharest
Sponsored by: Matthew Grooms (student scholarships)
Sponsored by: iXsystems
Differential Revision: https://reviews.freebsd.org/D19495
2020-05-05 00:02:04 +00:00
|
|
|
#include <machine/vmm_snapshot.h>
|
2011-05-13 04:54:01 +00:00
|
|
|
|
|
|
|
#include "vmmapi.h"
|
|
|
|
|
2013-10-09 03:56:07 +00:00
|
|
|
#define MB (1024 * 1024UL)
|
2013-03-18 22:38:30 +00:00
|
|
|
#define GB (1024 * 1024 * 1024UL)
|
|
|
|
|
2015-06-18 06:00:17 +00:00
|
|
|
/*
|
|
|
|
* Size of the guard region before and after the virtual address space
|
|
|
|
* mapping the guest physical memory. This must be a multiple of the
|
|
|
|
* superpage size for performance reasons.
|
|
|
|
*/
|
|
|
|
#define VM_MMAP_GUARD_SIZE (4 * MB)
|
|
|
|
|
|
|
|
#define PROT_RW (PROT_READ | PROT_WRITE)
|
|
|
|
#define PROT_ALL (PROT_READ | PROT_WRITE | PROT_EXEC)
|
|
|
|
|
2011-05-13 04:54:01 +00:00
|
|
|
struct vmctx {
|
|
|
|
int fd;
|
2013-03-18 22:38:30 +00:00
|
|
|
uint32_t lowmem_limit;
|
2014-05-13 16:40:27 +00:00
|
|
|
int memflags;
|
2013-03-18 22:38:30 +00:00
|
|
|
size_t lowmem;
|
|
|
|
size_t highmem;
|
2015-06-18 06:00:17 +00:00
|
|
|
char *baseaddr;
|
2011-05-13 04:54:01 +00:00
|
|
|
char *name;
|
|
|
|
};
|
|
|
|
|
|
|
|
#define CREATE(x) sysctlbyname("hw.vmm.create", NULL, NULL, (x), strlen((x)))
|
|
|
|
#define DESTROY(x) sysctlbyname("hw.vmm.destroy", NULL, NULL, (x), strlen((x)))
|
|
|
|
|
|
|
|
static int
|
|
|
|
vm_device_open(const char *name)
|
|
|
|
{
|
2018-06-14 01:28:55 +00:00
|
|
|
int fd, len;
|
|
|
|
char *vmfile;
|
2011-05-13 04:54:01 +00:00
|
|
|
|
|
|
|
len = strlen("/dev/vmm/") + strlen(name) + 1;
|
|
|
|
vmfile = malloc(len);
|
|
|
|
assert(vmfile != NULL);
|
|
|
|
snprintf(vmfile, len, "/dev/vmm/%s", name);
|
|
|
|
|
2018-06-14 01:28:55 +00:00
|
|
|
/* Open the device file */
|
|
|
|
fd = open(vmfile, O_RDWR, 0);
|
2011-05-13 04:54:01 +00:00
|
|
|
|
|
|
|
free(vmfile);
|
2018-06-14 01:28:55 +00:00
|
|
|
return (fd);
|
2011-05-13 04:54:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vm_create(const char *name)
|
|
|
|
{
|
2019-12-17 01:33:26 +00:00
|
|
|
/* Try to load vmm(4) module before creating a guest. */
|
2019-12-17 01:37:02 +00:00
|
|
|
if (modfind("vmm") < 0)
|
|
|
|
kldload("vmm");
|
2021-07-26 16:40:16 -04:00
|
|
|
return (CREATE(name));
|
2011-05-13 04:54:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
struct vmctx *
|
|
|
|
vm_open(const char *name)
|
|
|
|
{
|
|
|
|
struct vmctx *vm;
|
2021-03-11 10:27:43 -09:00
|
|
|
int saved_errno;
|
2011-05-13 04:54:01 +00:00
|
|
|
|
|
|
|
vm = malloc(sizeof(struct vmctx) + strlen(name) + 1);
|
|
|
|
assert(vm != NULL);
|
|
|
|
|
|
|
|
vm->fd = -1;
|
2014-05-13 16:40:27 +00:00
|
|
|
vm->memflags = 0;
|
2013-03-18 22:38:30 +00:00
|
|
|
vm->lowmem_limit = 3 * GB;
|
2011-05-13 04:54:01 +00:00
|
|
|
vm->name = (char *)(vm + 1);
|
|
|
|
strcpy(vm->name, name);
|
|
|
|
|
|
|
|
if ((vm->fd = vm_device_open(vm->name)) < 0)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
return (vm);
|
|
|
|
err:
|
2021-03-11 10:27:43 -09:00
|
|
|
saved_errno = errno;
|
2021-03-06 21:19:30 -09:00
|
|
|
free(vm);
|
2021-03-11 10:27:43 -09:00
|
|
|
errno = saved_errno;
|
2011-05-13 04:54:01 +00:00
|
|
|
return (NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
vm_destroy(struct vmctx *vm)
|
|
|
|
{
|
|
|
|
assert(vm != NULL);
|
|
|
|
|
|
|
|
if (vm->fd >= 0)
|
|
|
|
close(vm->fd);
|
2012-10-04 02:27:14 +00:00
|
|
|
DESTROY(vm->name);
|
|
|
|
|
2011-05-13 04:54:01 +00:00
|
|
|
free(vm);
|
|
|
|
}
|
|
|
|
|
2013-10-09 03:56:07 +00:00
|
|
|
int
|
2021-07-26 16:40:16 -04:00
|
|
|
vm_parse_memsize(const char *opt, size_t *ret_memsize)
|
2013-10-09 03:56:07 +00:00
|
|
|
{
|
|
|
|
char *endptr;
|
|
|
|
size_t optval;
|
|
|
|
int error;
|
|
|
|
|
2021-07-26 16:40:16 -04:00
|
|
|
optval = strtoul(opt, &endptr, 0);
|
|
|
|
if (*opt != '\0' && *endptr == '\0') {
|
2013-10-09 03:56:07 +00:00
|
|
|
/*
|
|
|
|
* For the sake of backward compatibility if the memory size
|
|
|
|
* specified on the command line is less than a megabyte then
|
|
|
|
* it is interpreted as being in units of MB.
|
|
|
|
*/
|
|
|
|
if (optval < MB)
|
|
|
|
optval *= MB;
|
|
|
|
*ret_memsize = optval;
|
|
|
|
error = 0;
|
|
|
|
} else
|
2021-07-26 16:40:16 -04:00
|
|
|
error = expand_number(opt, ret_memsize);
|
2013-10-09 03:56:07 +00:00
|
|
|
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2013-03-18 22:38:30 +00:00
|
|
|
uint32_t
|
|
|
|
vm_get_lowmem_limit(struct vmctx *ctx)
|
|
|
|
{
|
|
|
|
|
|
|
|
return (ctx->lowmem_limit);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
vm_set_lowmem_limit(struct vmctx *ctx, uint32_t limit)
|
|
|
|
{
|
|
|
|
|
|
|
|
ctx->lowmem_limit = limit;
|
|
|
|
}
|
|
|
|
|
2014-05-13 16:40:27 +00:00
|
|
|
void
|
|
|
|
vm_set_memflags(struct vmctx *ctx, int flags)
|
|
|
|
{
|
|
|
|
|
|
|
|
ctx->memflags = flags;
|
|
|
|
}
|
|
|
|
|
2015-06-18 06:00:17 +00:00
|
|
|
int
|
|
|
|
vm_get_memflags(struct vmctx *ctx)
|
|
|
|
{
|
|
|
|
|
|
|
|
return (ctx->memflags);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Map segment 'segid' starting at 'off' into guest address range [gpa,gpa+len).
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
vm_mmap_memseg(struct vmctx *ctx, vm_paddr_t gpa, int segid, vm_ooffset_t off,
|
|
|
|
size_t len, int prot)
|
|
|
|
{
|
|
|
|
struct vm_memmap memmap;
|
|
|
|
int error, flags;
|
|
|
|
|
|
|
|
memmap.gpa = gpa;
|
|
|
|
memmap.segid = segid;
|
|
|
|
memmap.segoff = off;
|
|
|
|
memmap.len = len;
|
|
|
|
memmap.prot = prot;
|
|
|
|
memmap.flags = 0;
|
|
|
|
|
|
|
|
if (ctx->memflags & VM_MEM_F_WIRED)
|
|
|
|
memmap.flags |= VM_MEMMAP_F_WIRED;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If this mapping already exists then don't create it again. This
|
|
|
|
* is the common case for SYSMEM mappings created by bhyveload(8).
|
|
|
|
*/
|
|
|
|
error = vm_mmap_getnext(ctx, &gpa, &segid, &off, &len, &prot, &flags);
|
|
|
|
if (error == 0 && gpa == memmap.gpa) {
|
|
|
|
if (segid != memmap.segid || off != memmap.segoff ||
|
|
|
|
prot != memmap.prot || flags != memmap.flags) {
|
|
|
|
errno = EEXIST;
|
|
|
|
return (-1);
|
|
|
|
} else {
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
error = ioctl(ctx->fd, VM_MMAP_MEMSEG, &memmap);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
Initial support for bhyve save and restore.
Save and restore (also known as suspend and resume) permits a snapshot
to be taken of a guest's state that can later be resumed. In the
current implementation, bhyve(8) creates a UNIX domain socket that is
used by bhyvectl(8) to send a request to save a snapshot (and
optionally exit after the snapshot has been taken). A snapshot
currently consists of two files: the first holds a copy of guest RAM,
and the second file holds other guest state such as vCPU register
values and device model state.
To resume a guest, bhyve(8) must be started with a matching pair of
command line arguments to instantiate the same set of device models as
well as a pointer to the saved snapshot.
While the current implementation is useful for several uses cases, it
has a few limitations. The file format for saving the guest state is
tied to the ABI of internal bhyve structures and is not
self-describing (in that it does not communicate the set of device
models present in the system). In addition, the state saved for some
device models closely matches the internal data structures which might
prove a challenge for compatibility of snapshot files across a range
of bhyve versions. The file format also does not currently support
versioning of individual chunks of state. As a result, the current
file format is not a fixed binary format and future revisions to save
and restore will break binary compatiblity of snapshot files. The
goal is to move to a more flexible format that adds versioning,
etc. and at that point to commit to providing a reasonable level of
compatibility. As a result, the current implementation is not enabled
by default. It can be enabled via the WITH_BHYVE_SNAPSHOT=yes option
for userland builds, and the kernel option BHYVE_SHAPSHOT.
Submitted by: Mihai Tiganus, Flavius Anton, Darius Mihai
Submitted by: Elena Mihailescu, Mihai Carabas, Sergiu Weisz
Relnotes: yes
Sponsored by: University Politehnica of Bucharest
Sponsored by: Matthew Grooms (student scholarships)
Sponsored by: iXsystems
Differential Revision: https://reviews.freebsd.org/D19495
2020-05-05 00:02:04 +00:00
|
|
|
int
|
|
|
|
vm_get_guestmem_from_ctx(struct vmctx *ctx, char **guest_baseaddr,
|
|
|
|
size_t *lowmem_size, size_t *highmem_size)
|
|
|
|
{
|
|
|
|
|
|
|
|
*guest_baseaddr = ctx->baseaddr;
|
|
|
|
*lowmem_size = ctx->lowmem;
|
|
|
|
*highmem_size = ctx->highmem;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2021-03-19 00:08:52 +08:00
|
|
|
int
|
|
|
|
vm_munmap_memseg(struct vmctx *ctx, vm_paddr_t gpa, size_t len)
|
|
|
|
{
|
|
|
|
struct vm_munmap munmap;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
munmap.gpa = gpa;
|
|
|
|
munmap.len = len;
|
|
|
|
|
|
|
|
error = ioctl(ctx->fd, VM_MUNMAP_MEMSEG, &munmap);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2015-06-18 06:00:17 +00:00
|
|
|
int
|
|
|
|
vm_mmap_getnext(struct vmctx *ctx, vm_paddr_t *gpa, int *segid,
|
|
|
|
vm_ooffset_t *segoff, size_t *len, int *prot, int *flags)
|
|
|
|
{
|
|
|
|
struct vm_memmap memmap;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
bzero(&memmap, sizeof(struct vm_memmap));
|
|
|
|
memmap.gpa = *gpa;
|
|
|
|
error = ioctl(ctx->fd, VM_MMAP_GETNEXT, &memmap);
|
|
|
|
if (error == 0) {
|
|
|
|
*gpa = memmap.gpa;
|
|
|
|
*segid = memmap.segid;
|
|
|
|
*segoff = memmap.segoff;
|
|
|
|
*len = memmap.len;
|
|
|
|
*prot = memmap.prot;
|
|
|
|
*flags = memmap.flags;
|
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Return 0 if the segments are identical and non-zero otherwise.
|
|
|
|
*
|
|
|
|
* This is slightly complicated by the fact that only device memory segments
|
|
|
|
* are named.
|
|
|
|
*/
|
2013-03-18 22:38:30 +00:00
|
|
|
static int
|
2015-06-18 06:00:17 +00:00
|
|
|
cmpseg(size_t len, const char *str, size_t len2, const char *str2)
|
2011-05-13 04:54:01 +00:00
|
|
|
{
|
2015-06-18 06:00:17 +00:00
|
|
|
|
|
|
|
if (len == len2) {
|
|
|
|
if ((!str && !str2) || (str && str2 && !strcmp(str, str2)))
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
vm_alloc_memseg(struct vmctx *ctx, int segid, size_t len, const char *name)
|
|
|
|
{
|
|
|
|
struct vm_memseg memseg;
|
|
|
|
size_t n;
|
|
|
|
int error;
|
2011-05-13 04:54:01 +00:00
|
|
|
|
|
|
|
/*
|
2015-06-18 06:00:17 +00:00
|
|
|
* If the memory segment has already been created then just return.
|
|
|
|
* This is the usual case for the SYSMEM segment created by userspace
|
|
|
|
* loaders like bhyveload(8).
|
2011-05-13 04:54:01 +00:00
|
|
|
*/
|
2015-06-18 06:00:17 +00:00
|
|
|
error = vm_get_memseg(ctx, segid, &memseg.len, memseg.name,
|
|
|
|
sizeof(memseg.name));
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
if (memseg.len != 0) {
|
|
|
|
if (cmpseg(len, name, memseg.len, VM_MEMSEG_NAME(&memseg))) {
|
|
|
|
errno = EINVAL;
|
|
|
|
return (-1);
|
|
|
|
} else {
|
|
|
|
return (0);
|
|
|
|
}
|
2011-05-13 04:54:01 +00:00
|
|
|
}
|
2015-06-18 06:00:17 +00:00
|
|
|
|
|
|
|
bzero(&memseg, sizeof(struct vm_memseg));
|
|
|
|
memseg.segid = segid;
|
|
|
|
memseg.len = len;
|
|
|
|
if (name != NULL) {
|
|
|
|
n = strlcpy(memseg.name, name, sizeof(memseg.name));
|
|
|
|
if (n >= sizeof(memseg.name)) {
|
|
|
|
errno = ENAMETOOLONG;
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
error = ioctl(ctx->fd, VM_ALLOC_MEMSEG, &memseg);
|
2011-05-13 04:54:01 +00:00
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2013-03-18 22:38:30 +00:00
|
|
|
int
|
2015-06-18 06:00:17 +00:00
|
|
|
vm_get_memseg(struct vmctx *ctx, int segid, size_t *lenp, char *namebuf,
|
|
|
|
size_t bufsize)
|
2013-03-18 22:38:30 +00:00
|
|
|
{
|
2015-06-18 06:00:17 +00:00
|
|
|
struct vm_memseg memseg;
|
|
|
|
size_t n;
|
2013-03-18 22:38:30 +00:00
|
|
|
int error;
|
|
|
|
|
2015-06-18 06:00:17 +00:00
|
|
|
memseg.segid = segid;
|
|
|
|
error = ioctl(ctx->fd, VM_GET_MEMSEG, &memseg);
|
|
|
|
if (error == 0) {
|
|
|
|
*lenp = memseg.len;
|
|
|
|
n = strlcpy(namebuf, memseg.name, bufsize);
|
|
|
|
if (n >= bufsize) {
|
|
|
|
errno = ENAMETOOLONG;
|
|
|
|
error = -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
setup_memory_segment(struct vmctx *ctx, vm_paddr_t gpa, size_t len, char *base)
|
|
|
|
{
|
|
|
|
char *ptr;
|
|
|
|
int error, flags;
|
|
|
|
|
|
|
|
/* Map 'len' bytes starting at 'gpa' in the guest address space */
|
|
|
|
error = vm_mmap_memseg(ctx, gpa, VM_SYSMEM, gpa, len, PROT_ALL);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
flags = MAP_SHARED | MAP_FIXED;
|
|
|
|
if ((ctx->memflags & VM_MEM_F_INCORE) == 0)
|
|
|
|
flags |= MAP_NOCORE;
|
|
|
|
|
|
|
|
/* mmap into the process address space on the host */
|
|
|
|
ptr = mmap(base + gpa, len, PROT_RW, flags, ctx->fd, gpa);
|
|
|
|
if (ptr == MAP_FAILED)
|
|
|
|
return (-1);
|
|
|
|
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vm_setup_memory(struct vmctx *ctx, size_t memsize, enum vm_mmap_style vms)
|
|
|
|
{
|
|
|
|
size_t objsize, len;
|
|
|
|
vm_paddr_t gpa;
|
|
|
|
char *baseaddr, *ptr;
|
2018-09-06 20:29:40 +00:00
|
|
|
int error;
|
2015-06-18 06:00:17 +00:00
|
|
|
|
|
|
|
assert(vms == VM_MMAP_ALL);
|
2013-03-18 22:38:30 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If 'memsize' cannot fit entirely in the 'lowmem' segment then
|
|
|
|
* create another 'highmem' segment above 4GB for the remainder.
|
|
|
|
*/
|
|
|
|
if (memsize > ctx->lowmem_limit) {
|
|
|
|
ctx->lowmem = ctx->lowmem_limit;
|
2015-06-18 06:00:17 +00:00
|
|
|
ctx->highmem = memsize - ctx->lowmem_limit;
|
|
|
|
objsize = 4*GB + ctx->highmem;
|
2013-03-18 22:38:30 +00:00
|
|
|
} else {
|
|
|
|
ctx->lowmem = memsize;
|
|
|
|
ctx->highmem = 0;
|
2015-06-18 06:00:17 +00:00
|
|
|
objsize = ctx->lowmem;
|
2013-03-18 22:38:30 +00:00
|
|
|
}
|
|
|
|
|
2015-06-18 06:00:17 +00:00
|
|
|
error = vm_alloc_memseg(ctx, VM_SYSMEM, objsize, NULL);
|
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Stake out a contiguous region covering the guest physical memory
|
|
|
|
* and the adjoining guard regions.
|
|
|
|
*/
|
|
|
|
len = VM_MMAP_GUARD_SIZE + objsize + VM_MMAP_GUARD_SIZE;
|
2018-09-06 20:29:40 +00:00
|
|
|
ptr = mmap(NULL, len, PROT_NONE, MAP_GUARD | MAP_ALIGNED_SUPER, -1, 0);
|
2015-06-18 06:00:17 +00:00
|
|
|
if (ptr == MAP_FAILED)
|
|
|
|
return (-1);
|
|
|
|
|
|
|
|
baseaddr = ptr + VM_MMAP_GUARD_SIZE;
|
|
|
|
if (ctx->highmem > 0) {
|
|
|
|
gpa = 4*GB;
|
|
|
|
len = ctx->highmem;
|
|
|
|
error = setup_memory_segment(ctx, gpa, len, baseaddr);
|
2013-03-18 22:38:30 +00:00
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2015-06-18 06:00:17 +00:00
|
|
|
if (ctx->lowmem > 0) {
|
|
|
|
gpa = 0;
|
|
|
|
len = ctx->lowmem;
|
|
|
|
error = setup_memory_segment(ctx, gpa, len, baseaddr);
|
2013-03-18 22:38:30 +00:00
|
|
|
if (error)
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2015-06-18 06:00:17 +00:00
|
|
|
ctx->baseaddr = baseaddr;
|
|
|
|
|
2013-03-18 22:38:30 +00:00
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2015-06-22 00:30:34 +00:00
|
|
|
/*
|
|
|
|
* Returns a non-NULL pointer if [gaddr, gaddr+len) is entirely contained in
|
|
|
|
* the lowmem or highmem regions.
|
|
|
|
*
|
|
|
|
* In particular return NULL if [gaddr, gaddr+len) falls in guest MMIO region.
|
|
|
|
* The instruction emulation code depends on this behavior.
|
|
|
|
*/
|
2013-03-18 22:38:30 +00:00
|
|
|
void *
|
|
|
|
vm_map_gpa(struct vmctx *ctx, vm_paddr_t gaddr, size_t len)
|
2011-05-13 04:54:01 +00:00
|
|
|
{
|
|
|
|
|
2015-06-22 00:30:34 +00:00
|
|
|
if (ctx->lowmem > 0) {
|
2016-12-06 18:50:44 +00:00
|
|
|
if (gaddr < ctx->lowmem && len <= ctx->lowmem &&
|
|
|
|
gaddr + len <= ctx->lowmem)
|
2015-06-22 00:30:34 +00:00
|
|
|
return (ctx->baseaddr + gaddr);
|
|
|
|
}
|
2013-03-18 22:38:30 +00:00
|
|
|
|
2015-06-22 00:30:34 +00:00
|
|
|
if (ctx->highmem > 0) {
|
2016-12-06 18:50:44 +00:00
|
|
|
if (gaddr >= 4*GB) {
|
|
|
|
if (gaddr < 4*GB + ctx->highmem &&
|
|
|
|
len <= ctx->highmem &&
|
|
|
|
gaddr + len <= 4*GB + ctx->highmem)
|
|
|
|
return (ctx->baseaddr + gaddr);
|
|
|
|
}
|
2015-06-22 00:30:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return (NULL);
|
2011-05-13 04:54:01 +00:00
|
|
|
}
|
|
|
|
|
Initial support for bhyve save and restore.
Save and restore (also known as suspend and resume) permits a snapshot
to be taken of a guest's state that can later be resumed. In the
current implementation, bhyve(8) creates a UNIX domain socket that is
used by bhyvectl(8) to send a request to save a snapshot (and
optionally exit after the snapshot has been taken). A snapshot
currently consists of two files: the first holds a copy of guest RAM,
and the second file holds other guest state such as vCPU register
values and device model state.
To resume a guest, bhyve(8) must be started with a matching pair of
command line arguments to instantiate the same set of device models as
well as a pointer to the saved snapshot.
While the current implementation is useful for several uses cases, it
has a few limitations. The file format for saving the guest state is
tied to the ABI of internal bhyve structures and is not
self-describing (in that it does not communicate the set of device
models present in the system). In addition, the state saved for some
device models closely matches the internal data structures which might
prove a challenge for compatibility of snapshot files across a range
of bhyve versions. The file format also does not currently support
versioning of individual chunks of state. As a result, the current
file format is not a fixed binary format and future revisions to save
and restore will break binary compatiblity of snapshot files. The
goal is to move to a more flexible format that adds versioning,
etc. and at that point to commit to providing a reasonable level of
compatibility. As a result, the current implementation is not enabled
by default. It can be enabled via the WITH_BHYVE_SNAPSHOT=yes option
for userland builds, and the kernel option BHYVE_SHAPSHOT.
Submitted by: Mihai Tiganus, Flavius Anton, Darius Mihai
Submitted by: Elena Mihailescu, Mihai Carabas, Sergiu Weisz
Relnotes: yes
Sponsored by: University Politehnica of Bucharest
Sponsored by: Matthew Grooms (student scholarships)
Sponsored by: iXsystems
Differential Revision: https://reviews.freebsd.org/D19495
2020-05-05 00:02:04 +00:00
|
|
|
vm_paddr_t
|
|
|
|
vm_rev_map_gpa(struct vmctx *ctx, void *addr)
|
|
|
|
{
|
|
|
|
vm_paddr_t offaddr;
|
|
|
|
|
|
|
|
offaddr = (char *)addr - ctx->baseaddr;
|
|
|
|
|
|
|
|
if (ctx->lowmem > 0)
|
2021-09-15 09:03:17 -07:00
|
|
|
if (offaddr <= ctx->lowmem)
|
Initial support for bhyve save and restore.
Save and restore (also known as suspend and resume) permits a snapshot
to be taken of a guest's state that can later be resumed. In the
current implementation, bhyve(8) creates a UNIX domain socket that is
used by bhyvectl(8) to send a request to save a snapshot (and
optionally exit after the snapshot has been taken). A snapshot
currently consists of two files: the first holds a copy of guest RAM,
and the second file holds other guest state such as vCPU register
values and device model state.
To resume a guest, bhyve(8) must be started with a matching pair of
command line arguments to instantiate the same set of device models as
well as a pointer to the saved snapshot.
While the current implementation is useful for several uses cases, it
has a few limitations. The file format for saving the guest state is
tied to the ABI of internal bhyve structures and is not
self-describing (in that it does not communicate the set of device
models present in the system). In addition, the state saved for some
device models closely matches the internal data structures which might
prove a challenge for compatibility of snapshot files across a range
of bhyve versions. The file format also does not currently support
versioning of individual chunks of state. As a result, the current
file format is not a fixed binary format and future revisions to save
and restore will break binary compatiblity of snapshot files. The
goal is to move to a more flexible format that adds versioning,
etc. and at that point to commit to providing a reasonable level of
compatibility. As a result, the current implementation is not enabled
by default. It can be enabled via the WITH_BHYVE_SNAPSHOT=yes option
for userland builds, and the kernel option BHYVE_SHAPSHOT.
Submitted by: Mihai Tiganus, Flavius Anton, Darius Mihai
Submitted by: Elena Mihailescu, Mihai Carabas, Sergiu Weisz
Relnotes: yes
Sponsored by: University Politehnica of Bucharest
Sponsored by: Matthew Grooms (student scholarships)
Sponsored by: iXsystems
Differential Revision: https://reviews.freebsd.org/D19495
2020-05-05 00:02:04 +00:00
|
|
|
return (offaddr);
|
|
|
|
|
|
|
|
if (ctx->highmem > 0)
|
|
|
|
if (offaddr >= 4*GB && offaddr < 4*GB + ctx->highmem)
|
|
|
|
return (offaddr);
|
|
|
|
|
|
|
|
return ((vm_paddr_t)-1);
|
|
|
|
}
|
|
|
|
|
2022-03-17 21:26:54 -08:00
|
|
|
const char *
|
|
|
|
vm_get_name(struct vmctx *ctx)
|
Initial support for bhyve save and restore.
Save and restore (also known as suspend and resume) permits a snapshot
to be taken of a guest's state that can later be resumed. In the
current implementation, bhyve(8) creates a UNIX domain socket that is
used by bhyvectl(8) to send a request to save a snapshot (and
optionally exit after the snapshot has been taken). A snapshot
currently consists of two files: the first holds a copy of guest RAM,
and the second file holds other guest state such as vCPU register
values and device model state.
To resume a guest, bhyve(8) must be started with a matching pair of
command line arguments to instantiate the same set of device models as
well as a pointer to the saved snapshot.
While the current implementation is useful for several uses cases, it
has a few limitations. The file format for saving the guest state is
tied to the ABI of internal bhyve structures and is not
self-describing (in that it does not communicate the set of device
models present in the system). In addition, the state saved for some
device models closely matches the internal data structures which might
prove a challenge for compatibility of snapshot files across a range
of bhyve versions. The file format also does not currently support
versioning of individual chunks of state. As a result, the current
file format is not a fixed binary format and future revisions to save
and restore will break binary compatiblity of snapshot files. The
goal is to move to a more flexible format that adds versioning,
etc. and at that point to commit to providing a reasonable level of
compatibility. As a result, the current implementation is not enabled
by default. It can be enabled via the WITH_BHYVE_SNAPSHOT=yes option
for userland builds, and the kernel option BHYVE_SHAPSHOT.
Submitted by: Mihai Tiganus, Flavius Anton, Darius Mihai
Submitted by: Elena Mihailescu, Mihai Carabas, Sergiu Weisz
Relnotes: yes
Sponsored by: University Politehnica of Bucharest
Sponsored by: Matthew Grooms (student scholarships)
Sponsored by: iXsystems
Differential Revision: https://reviews.freebsd.org/D19495
2020-05-05 00:02:04 +00:00
|
|
|
{
|
|
|
|
|
2022-03-17 21:26:54 -08:00
|
|
|
return (ctx->name);
|
Initial support for bhyve save and restore.
Save and restore (also known as suspend and resume) permits a snapshot
to be taken of a guest's state that can later be resumed. In the
current implementation, bhyve(8) creates a UNIX domain socket that is
used by bhyvectl(8) to send a request to save a snapshot (and
optionally exit after the snapshot has been taken). A snapshot
currently consists of two files: the first holds a copy of guest RAM,
and the second file holds other guest state such as vCPU register
values and device model state.
To resume a guest, bhyve(8) must be started with a matching pair of
command line arguments to instantiate the same set of device models as
well as a pointer to the saved snapshot.
While the current implementation is useful for several uses cases, it
has a few limitations. The file format for saving the guest state is
tied to the ABI of internal bhyve structures and is not
self-describing (in that it does not communicate the set of device
models present in the system). In addition, the state saved for some
device models closely matches the internal data structures which might
prove a challenge for compatibility of snapshot files across a range
of bhyve versions. The file format also does not currently support
versioning of individual chunks of state. As a result, the current
file format is not a fixed binary format and future revisions to save
and restore will break binary compatiblity of snapshot files. The
goal is to move to a more flexible format that adds versioning,
etc. and at that point to commit to providing a reasonable level of
compatibility. As a result, the current implementation is not enabled
by default. It can be enabled via the WITH_BHYVE_SNAPSHOT=yes option
for userland builds, and the kernel option BHYVE_SHAPSHOT.
Submitted by: Mihai Tiganus, Flavius Anton, Darius Mihai
Submitted by: Elena Mihailescu, Mihai Carabas, Sergiu Weisz
Relnotes: yes
Sponsored by: University Politehnica of Bucharest
Sponsored by: Matthew Grooms (student scholarships)
Sponsored by: iXsystems
Differential Revision: https://reviews.freebsd.org/D19495
2020-05-05 00:02:04 +00:00
|
|
|
}
|
|
|
|
|
2014-06-24 02:02:51 +00:00
|
|
|
size_t
|
|
|
|
vm_get_lowmem_size(struct vmctx *ctx)
|
|
|
|
{
|
|
|
|
|
|
|
|
return (ctx->lowmem);
|
|
|
|
}
|
|
|
|
|
|
|
|
size_t
|
|
|
|
vm_get_highmem_size(struct vmctx *ctx)
|
|
|
|
{
|
|
|
|
|
|
|
|
return (ctx->highmem);
|
|
|
|
}
|
|
|
|
|
2015-06-18 06:00:17 +00:00
|
|
|
void *
|
|
|
|
vm_create_devmem(struct vmctx *ctx, int segid, const char *name, size_t len)
|
|
|
|
{
|
|
|
|
char pathname[MAXPATHLEN];
|
|
|
|
size_t len2;
|
|
|
|
char *base, *ptr;
|
|
|
|
int fd, error, flags;
|
|
|
|
|
|
|
|
fd = -1;
|
|
|
|
ptr = MAP_FAILED;
|
|
|
|
if (name == NULL || strlen(name) == 0) {
|
|
|
|
errno = EINVAL;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
error = vm_alloc_memseg(ctx, segid, len, name);
|
|
|
|
if (error)
|
|
|
|
goto done;
|
|
|
|
|
2015-07-06 19:41:43 +00:00
|
|
|
strlcpy(pathname, "/dev/vmm.io/", sizeof(pathname));
|
2015-06-18 06:00:17 +00:00
|
|
|
strlcat(pathname, ctx->name, sizeof(pathname));
|
|
|
|
strlcat(pathname, ".", sizeof(pathname));
|
|
|
|
strlcat(pathname, name, sizeof(pathname));
|
|
|
|
|
|
|
|
fd = open(pathname, O_RDWR);
|
|
|
|
if (fd < 0)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Stake out a contiguous region covering the device memory and the
|
|
|
|
* adjoining guard regions.
|
|
|
|
*/
|
|
|
|
len2 = VM_MMAP_GUARD_SIZE + len + VM_MMAP_GUARD_SIZE;
|
2018-09-06 20:29:40 +00:00
|
|
|
base = mmap(NULL, len2, PROT_NONE, MAP_GUARD | MAP_ALIGNED_SUPER, -1,
|
|
|
|
0);
|
2015-06-18 06:00:17 +00:00
|
|
|
if (base == MAP_FAILED)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
flags = MAP_SHARED | MAP_FIXED;
|
|
|
|
if ((ctx->memflags & VM_MEM_F_INCORE) == 0)
|
|
|
|
flags |= MAP_NOCORE;
|
|
|
|
|
|
|
|
/* mmap the devmem region in the host address space */
|
|
|
|
ptr = mmap(base + VM_MMAP_GUARD_SIZE, len, PROT_RW, flags, fd, 0);
|
|
|
|
done:
|
|
|
|
if (fd >= 0)
|
|
|
|
close(fd);
|
|
|
|
return (ptr);
|
|
|
|
}
|
|
|
|
|
2011-05-13 04:54:01 +00:00
|
|
|
int
|
|
|
|
vm_set_desc(struct vmctx *ctx, int vcpu, int reg,
|
|
|
|
uint64_t base, uint32_t limit, uint32_t access)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
struct vm_seg_desc vmsegdesc;
|
|
|
|
|
|
|
|
bzero(&vmsegdesc, sizeof(vmsegdesc));
|
|
|
|
vmsegdesc.cpuid = vcpu;
|
|
|
|
vmsegdesc.regnum = reg;
|
|
|
|
vmsegdesc.desc.base = base;
|
|
|
|
vmsegdesc.desc.limit = limit;
|
|
|
|
vmsegdesc.desc.access = access;
|
|
|
|
|
|
|
|
error = ioctl(ctx->fd, VM_SET_SEGMENT_DESCRIPTOR, &vmsegdesc);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vm_get_desc(struct vmctx *ctx, int vcpu, int reg,
|
|
|
|
uint64_t *base, uint32_t *limit, uint32_t *access)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
struct vm_seg_desc vmsegdesc;
|
|
|
|
|
|
|
|
bzero(&vmsegdesc, sizeof(vmsegdesc));
|
|
|
|
vmsegdesc.cpuid = vcpu;
|
|
|
|
vmsegdesc.regnum = reg;
|
|
|
|
|
|
|
|
error = ioctl(ctx->fd, VM_GET_SEGMENT_DESCRIPTOR, &vmsegdesc);
|
|
|
|
if (error == 0) {
|
|
|
|
*base = vmsegdesc.desc.base;
|
|
|
|
*limit = vmsegdesc.desc.limit;
|
|
|
|
*access = vmsegdesc.desc.access;
|
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2014-07-23 04:28:51 +00:00
|
|
|
int
|
|
|
|
vm_get_seg_desc(struct vmctx *ctx, int vcpu, int reg, struct seg_desc *seg_desc)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
|
|
|
|
error = vm_get_desc(ctx, vcpu, reg, &seg_desc->base, &seg_desc->limit,
|
|
|
|
&seg_desc->access);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2011-05-13 04:54:01 +00:00
|
|
|
int
|
|
|
|
vm_set_register(struct vmctx *ctx, int vcpu, int reg, uint64_t val)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
struct vm_register vmreg;
|
|
|
|
|
|
|
|
bzero(&vmreg, sizeof(vmreg));
|
|
|
|
vmreg.cpuid = vcpu;
|
|
|
|
vmreg.regnum = reg;
|
|
|
|
vmreg.regval = val;
|
|
|
|
|
|
|
|
error = ioctl(ctx->fd, VM_SET_REGISTER, &vmreg);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vm_get_register(struct vmctx *ctx, int vcpu, int reg, uint64_t *ret_val)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
struct vm_register vmreg;
|
|
|
|
|
|
|
|
bzero(&vmreg, sizeof(vmreg));
|
|
|
|
vmreg.cpuid = vcpu;
|
|
|
|
vmreg.regnum = reg;
|
|
|
|
|
|
|
|
error = ioctl(ctx->fd, VM_GET_REGISTER, &vmreg);
|
|
|
|
*ret_val = vmreg.regval;
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2018-02-22 00:39:25 +00:00
|
|
|
int
|
|
|
|
vm_set_register_set(struct vmctx *ctx, int vcpu, unsigned int count,
|
|
|
|
const int *regnums, uint64_t *regvals)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
struct vm_register_set vmregset;
|
|
|
|
|
|
|
|
bzero(&vmregset, sizeof(vmregset));
|
|
|
|
vmregset.cpuid = vcpu;
|
|
|
|
vmregset.count = count;
|
|
|
|
vmregset.regnums = regnums;
|
|
|
|
vmregset.regvals = regvals;
|
|
|
|
|
|
|
|
error = ioctl(ctx->fd, VM_SET_REGISTER_SET, &vmregset);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vm_get_register_set(struct vmctx *ctx, int vcpu, unsigned int count,
|
|
|
|
const int *regnums, uint64_t *regvals)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
struct vm_register_set vmregset;
|
|
|
|
|
|
|
|
bzero(&vmregset, sizeof(vmregset));
|
|
|
|
vmregset.cpuid = vcpu;
|
|
|
|
vmregset.count = count;
|
|
|
|
vmregset.regnums = regnums;
|
|
|
|
vmregset.regvals = regvals;
|
|
|
|
|
|
|
|
error = ioctl(ctx->fd, VM_GET_REGISTER_SET, &vmregset);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2011-05-13 04:54:01 +00:00
|
|
|
int
|
2015-01-18 03:08:30 +00:00
|
|
|
vm_run(struct vmctx *ctx, int vcpu, struct vm_exit *vmexit)
|
2011-05-13 04:54:01 +00:00
|
|
|
{
|
|
|
|
int error;
|
|
|
|
struct vm_run vmrun;
|
|
|
|
|
|
|
|
bzero(&vmrun, sizeof(vmrun));
|
|
|
|
vmrun.cpuid = vcpu;
|
|
|
|
|
|
|
|
error = ioctl(ctx->fd, VM_RUN, &vmrun);
|
|
|
|
bcopy(&vmrun.vm_exit, vmexit, sizeof(struct vm_exit));
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2014-03-26 23:34:27 +00:00
|
|
|
int
|
2014-04-28 22:06:40 +00:00
|
|
|
vm_suspend(struct vmctx *ctx, enum vm_suspend_how how)
|
2014-03-26 23:34:27 +00:00
|
|
|
{
|
2014-04-28 22:06:40 +00:00
|
|
|
struct vm_suspend vmsuspend;
|
2014-03-26 23:34:27 +00:00
|
|
|
|
2014-04-28 22:06:40 +00:00
|
|
|
bzero(&vmsuspend, sizeof(vmsuspend));
|
|
|
|
vmsuspend.how = how;
|
|
|
|
return (ioctl(ctx->fd, VM_SUSPEND, &vmsuspend));
|
2014-03-26 23:34:27 +00:00
|
|
|
}
|
|
|
|
|
2014-06-07 21:36:52 +00:00
|
|
|
int
|
|
|
|
vm_reinit(struct vmctx *ctx)
|
|
|
|
{
|
|
|
|
|
|
|
|
return (ioctl(ctx->fd, VM_REINIT, 0));
|
|
|
|
}
|
|
|
|
|
2015-01-18 03:08:30 +00:00
|
|
|
int
|
|
|
|
vm_inject_exception(struct vmctx *ctx, int vcpu, int vector, int errcode_valid,
|
|
|
|
uint32_t errcode, int restart_instruction)
|
2011-05-13 04:54:01 +00:00
|
|
|
{
|
2014-02-26 00:52:05 +00:00
|
|
|
struct vm_exception exc;
|
2011-05-13 04:54:01 +00:00
|
|
|
|
2014-02-26 00:52:05 +00:00
|
|
|
exc.cpuid = vcpu;
|
|
|
|
exc.vector = vector;
|
2015-01-18 03:08:30 +00:00
|
|
|
exc.error_code = errcode;
|
|
|
|
exc.error_code_valid = errcode_valid;
|
|
|
|
exc.restart_instruction = restart_instruction;
|
2011-05-13 04:54:01 +00:00
|
|
|
|
2014-02-26 00:52:05 +00:00
|
|
|
return (ioctl(ctx->fd, VM_INJECT_EXCEPTION, &exc));
|
2011-05-13 04:54:01 +00:00
|
|
|
}
|
|
|
|
|
2012-08-04 02:38:05 +00:00
|
|
|
int
|
2021-07-26 16:40:16 -04:00
|
|
|
vm_apicid2vcpu(struct vmctx *ctx __unused, int apicid)
|
2012-08-04 02:38:05 +00:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* The apic id associated with the 'vcpu' has the same numerical value
|
|
|
|
* as the 'vcpu' itself.
|
|
|
|
*/
|
|
|
|
return (apicid);
|
|
|
|
}
|
|
|
|
|
2011-05-13 04:54:01 +00:00
|
|
|
int
|
|
|
|
vm_lapic_irq(struct vmctx *ctx, int vcpu, int vector)
|
|
|
|
{
|
|
|
|
struct vm_lapic_irq vmirq;
|
|
|
|
|
|
|
|
bzero(&vmirq, sizeof(vmirq));
|
|
|
|
vmirq.cpuid = vcpu;
|
|
|
|
vmirq.vector = vector;
|
|
|
|
|
|
|
|
return (ioctl(ctx->fd, VM_LAPIC_IRQ, &vmirq));
|
|
|
|
}
|
|
|
|
|
2013-12-23 19:29:07 +00:00
|
|
|
int
|
|
|
|
vm_lapic_local_irq(struct vmctx *ctx, int vcpu, int vector)
|
|
|
|
{
|
|
|
|
struct vm_lapic_irq vmirq;
|
|
|
|
|
|
|
|
bzero(&vmirq, sizeof(vmirq));
|
|
|
|
vmirq.cpuid = vcpu;
|
|
|
|
vmirq.vector = vector;
|
|
|
|
|
|
|
|
return (ioctl(ctx->fd, VM_LAPIC_LOCAL_IRQ, &vmirq));
|
|
|
|
}
|
|
|
|
|
2013-12-16 19:59:31 +00:00
|
|
|
int
|
|
|
|
vm_lapic_msi(struct vmctx *ctx, uint64_t addr, uint64_t msg)
|
|
|
|
{
|
|
|
|
struct vm_lapic_msi vmmsi;
|
|
|
|
|
|
|
|
bzero(&vmmsi, sizeof(vmmsi));
|
|
|
|
vmmsi.addr = addr;
|
|
|
|
vmmsi.msg = msg;
|
|
|
|
|
|
|
|
return (ioctl(ctx->fd, VM_LAPIC_MSI, &vmmsi));
|
|
|
|
}
|
|
|
|
|
2013-11-12 22:51:03 +00:00
|
|
|
int
|
|
|
|
vm_ioapic_assert_irq(struct vmctx *ctx, int irq)
|
|
|
|
{
|
|
|
|
struct vm_ioapic_irq ioapic_irq;
|
|
|
|
|
|
|
|
bzero(&ioapic_irq, sizeof(struct vm_ioapic_irq));
|
|
|
|
ioapic_irq.irq = irq;
|
|
|
|
|
|
|
|
return (ioctl(ctx->fd, VM_IOAPIC_ASSERT_IRQ, &ioapic_irq));
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vm_ioapic_deassert_irq(struct vmctx *ctx, int irq)
|
|
|
|
{
|
|
|
|
struct vm_ioapic_irq ioapic_irq;
|
|
|
|
|
|
|
|
bzero(&ioapic_irq, sizeof(struct vm_ioapic_irq));
|
|
|
|
ioapic_irq.irq = irq;
|
|
|
|
|
|
|
|
return (ioctl(ctx->fd, VM_IOAPIC_DEASSERT_IRQ, &ioapic_irq));
|
|
|
|
}
|
|
|
|
|
2013-11-23 03:56:03 +00:00
|
|
|
int
|
|
|
|
vm_ioapic_pulse_irq(struct vmctx *ctx, int irq)
|
|
|
|
{
|
|
|
|
struct vm_ioapic_irq ioapic_irq;
|
|
|
|
|
|
|
|
bzero(&ioapic_irq, sizeof(struct vm_ioapic_irq));
|
|
|
|
ioapic_irq.irq = irq;
|
|
|
|
|
|
|
|
return (ioctl(ctx->fd, VM_IOAPIC_PULSE_IRQ, &ioapic_irq));
|
|
|
|
}
|
|
|
|
|
2014-01-29 14:56:48 +00:00
|
|
|
int
|
|
|
|
vm_ioapic_pincount(struct vmctx *ctx, int *pincount)
|
|
|
|
{
|
|
|
|
|
|
|
|
return (ioctl(ctx->fd, VM_IOAPIC_PINCOUNT, pincount));
|
|
|
|
}
|
|
|
|
|
2020-05-15 15:54:22 +00:00
|
|
|
int
|
|
|
|
vm_readwrite_kernemu_device(struct vmctx *ctx, int vcpu, vm_paddr_t gpa,
|
|
|
|
bool write, int size, uint64_t *value)
|
|
|
|
{
|
|
|
|
struct vm_readwrite_kernemu_device irp = {
|
|
|
|
.vcpuid = vcpu,
|
|
|
|
.access_width = fls(size) - 1,
|
|
|
|
.gpa = gpa,
|
|
|
|
.value = write ? *value : ~0ul,
|
|
|
|
};
|
|
|
|
long cmd = (write ? VM_SET_KERNEMU_DEV : VM_GET_KERNEMU_DEV);
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
rc = ioctl(ctx->fd, cmd, &irp);
|
|
|
|
if (rc == 0 && !write)
|
|
|
|
*value = irp.value;
|
|
|
|
return (rc);
|
|
|
|
}
|
|
|
|
|
2014-03-11 16:56:00 +00:00
|
|
|
int
|
|
|
|
vm_isa_assert_irq(struct vmctx *ctx, int atpic_irq, int ioapic_irq)
|
|
|
|
{
|
|
|
|
struct vm_isa_irq isa_irq;
|
|
|
|
|
|
|
|
bzero(&isa_irq, sizeof(struct vm_isa_irq));
|
|
|
|
isa_irq.atpic_irq = atpic_irq;
|
|
|
|
isa_irq.ioapic_irq = ioapic_irq;
|
|
|
|
|
|
|
|
return (ioctl(ctx->fd, VM_ISA_ASSERT_IRQ, &isa_irq));
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vm_isa_deassert_irq(struct vmctx *ctx, int atpic_irq, int ioapic_irq)
|
|
|
|
{
|
|
|
|
struct vm_isa_irq isa_irq;
|
|
|
|
|
|
|
|
bzero(&isa_irq, sizeof(struct vm_isa_irq));
|
|
|
|
isa_irq.atpic_irq = atpic_irq;
|
|
|
|
isa_irq.ioapic_irq = ioapic_irq;
|
|
|
|
|
|
|
|
return (ioctl(ctx->fd, VM_ISA_DEASSERT_IRQ, &isa_irq));
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vm_isa_pulse_irq(struct vmctx *ctx, int atpic_irq, int ioapic_irq)
|
|
|
|
{
|
|
|
|
struct vm_isa_irq isa_irq;
|
2014-05-15 14:16:55 +00:00
|
|
|
|
2014-03-11 16:56:00 +00:00
|
|
|
bzero(&isa_irq, sizeof(struct vm_isa_irq));
|
|
|
|
isa_irq.atpic_irq = atpic_irq;
|
|
|
|
isa_irq.ioapic_irq = ioapic_irq;
|
|
|
|
|
|
|
|
return (ioctl(ctx->fd, VM_ISA_PULSE_IRQ, &isa_irq));
|
|
|
|
}
|
|
|
|
|
2014-05-15 14:16:55 +00:00
|
|
|
int
|
|
|
|
vm_isa_set_irq_trigger(struct vmctx *ctx, int atpic_irq,
|
|
|
|
enum vm_intr_trigger trigger)
|
|
|
|
{
|
|
|
|
struct vm_isa_irq_trigger isa_irq_trigger;
|
|
|
|
|
|
|
|
bzero(&isa_irq_trigger, sizeof(struct vm_isa_irq_trigger));
|
|
|
|
isa_irq_trigger.atpic_irq = atpic_irq;
|
|
|
|
isa_irq_trigger.trigger = trigger;
|
|
|
|
|
|
|
|
return (ioctl(ctx->fd, VM_ISA_SET_IRQ_TRIGGER, &isa_irq_trigger));
|
|
|
|
}
|
|
|
|
|
2011-05-13 04:54:01 +00:00
|
|
|
int
|
|
|
|
vm_inject_nmi(struct vmctx *ctx, int vcpu)
|
|
|
|
{
|
|
|
|
struct vm_nmi vmnmi;
|
|
|
|
|
|
|
|
bzero(&vmnmi, sizeof(vmnmi));
|
|
|
|
vmnmi.cpuid = vcpu;
|
|
|
|
|
|
|
|
return (ioctl(ctx->fd, VM_INJECT_NMI, &vmnmi));
|
|
|
|
}
|
|
|
|
|
2020-04-21 17:30:56 +00:00
|
|
|
static const char *capstrmap[] = {
|
|
|
|
[VM_CAP_HALT_EXIT] = "hlt_exit",
|
|
|
|
[VM_CAP_MTRAP_EXIT] = "mtrap_exit",
|
|
|
|
[VM_CAP_PAUSE_EXIT] = "pause_exit",
|
|
|
|
[VM_CAP_UNRESTRICTED_GUEST] = "unrestricted_guest",
|
|
|
|
[VM_CAP_ENABLE_INVPCID] = "enable_invpcid",
|
|
|
|
[VM_CAP_BPT_EXIT] = "bpt_exit",
|
2012-10-12 17:39:28 +00:00
|
|
|
};
|
|
|
|
|
2011-05-13 04:54:01 +00:00
|
|
|
int
|
|
|
|
vm_capability_name2type(const char *capname)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
2021-07-26 16:40:16 -04:00
|
|
|
for (i = 0; i < (int)nitems(capstrmap); i++) {
|
2020-04-21 17:30:56 +00:00
|
|
|
if (strcmp(capstrmap[i], capname) == 0)
|
|
|
|
return (i);
|
2011-05-13 04:54:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
|
2012-10-12 17:39:28 +00:00
|
|
|
const char *
|
|
|
|
vm_capability_type2name(int type)
|
|
|
|
{
|
2021-07-26 16:40:16 -04:00
|
|
|
if (type >= 0 && type < (int)nitems(capstrmap))
|
2020-04-21 17:30:56 +00:00
|
|
|
return (capstrmap[type]);
|
2012-10-12 17:39:28 +00:00
|
|
|
|
|
|
|
return (NULL);
|
|
|
|
}
|
|
|
|
|
2011-05-13 04:54:01 +00:00
|
|
|
int
|
|
|
|
vm_get_capability(struct vmctx *ctx, int vcpu, enum vm_cap_type cap,
|
|
|
|
int *retval)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
struct vm_capability vmcap;
|
|
|
|
|
|
|
|
bzero(&vmcap, sizeof(vmcap));
|
|
|
|
vmcap.cpuid = vcpu;
|
|
|
|
vmcap.captype = cap;
|
|
|
|
|
|
|
|
error = ioctl(ctx->fd, VM_GET_CAPABILITY, &vmcap);
|
|
|
|
*retval = vmcap.capval;
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vm_set_capability(struct vmctx *ctx, int vcpu, enum vm_cap_type cap, int val)
|
|
|
|
{
|
|
|
|
struct vm_capability vmcap;
|
|
|
|
|
|
|
|
bzero(&vmcap, sizeof(vmcap));
|
|
|
|
vmcap.cpuid = vcpu;
|
|
|
|
vmcap.captype = cap;
|
|
|
|
vmcap.capval = val;
|
2018-06-14 01:28:55 +00:00
|
|
|
|
2011-05-13 04:54:01 +00:00
|
|
|
return (ioctl(ctx->fd, VM_SET_CAPABILITY, &vmcap));
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vm_assign_pptdev(struct vmctx *ctx, int bus, int slot, int func)
|
|
|
|
{
|
|
|
|
struct vm_pptdev pptdev;
|
|
|
|
|
|
|
|
bzero(&pptdev, sizeof(pptdev));
|
|
|
|
pptdev.bus = bus;
|
|
|
|
pptdev.slot = slot;
|
|
|
|
pptdev.func = func;
|
|
|
|
|
|
|
|
return (ioctl(ctx->fd, VM_BIND_PPTDEV, &pptdev));
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vm_unassign_pptdev(struct vmctx *ctx, int bus, int slot, int func)
|
|
|
|
{
|
|
|
|
struct vm_pptdev pptdev;
|
|
|
|
|
|
|
|
bzero(&pptdev, sizeof(pptdev));
|
|
|
|
pptdev.bus = bus;
|
|
|
|
pptdev.slot = slot;
|
|
|
|
pptdev.func = func;
|
|
|
|
|
|
|
|
return (ioctl(ctx->fd, VM_UNBIND_PPTDEV, &pptdev));
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vm_map_pptdev_mmio(struct vmctx *ctx, int bus, int slot, int func,
|
|
|
|
vm_paddr_t gpa, size_t len, vm_paddr_t hpa)
|
|
|
|
{
|
|
|
|
struct vm_pptdev_mmio pptmmio;
|
|
|
|
|
|
|
|
bzero(&pptmmio, sizeof(pptmmio));
|
|
|
|
pptmmio.bus = bus;
|
|
|
|
pptmmio.slot = slot;
|
|
|
|
pptmmio.func = func;
|
|
|
|
pptmmio.gpa = gpa;
|
|
|
|
pptmmio.len = len;
|
|
|
|
pptmmio.hpa = hpa;
|
|
|
|
|
|
|
|
return (ioctl(ctx->fd, VM_MAP_PPTDEV_MMIO, &pptmmio));
|
|
|
|
}
|
|
|
|
|
2021-03-19 00:08:52 +08:00
|
|
|
int
|
|
|
|
vm_unmap_pptdev_mmio(struct vmctx *ctx, int bus, int slot, int func,
|
|
|
|
vm_paddr_t gpa, size_t len)
|
|
|
|
{
|
|
|
|
struct vm_pptdev_mmio pptmmio;
|
|
|
|
|
|
|
|
bzero(&pptmmio, sizeof(pptmmio));
|
|
|
|
pptmmio.bus = bus;
|
|
|
|
pptmmio.slot = slot;
|
|
|
|
pptmmio.func = func;
|
|
|
|
pptmmio.gpa = gpa;
|
|
|
|
pptmmio.len = len;
|
|
|
|
|
|
|
|
return (ioctl(ctx->fd, VM_UNMAP_PPTDEV_MMIO, &pptmmio));
|
|
|
|
}
|
|
|
|
|
2011-05-13 04:54:01 +00:00
|
|
|
int
|
2013-12-18 03:58:51 +00:00
|
|
|
vm_setup_pptdev_msi(struct vmctx *ctx, int vcpu, int bus, int slot, int func,
|
|
|
|
uint64_t addr, uint64_t msg, int numvec)
|
2011-05-13 04:54:01 +00:00
|
|
|
{
|
|
|
|
struct vm_pptdev_msi pptmsi;
|
|
|
|
|
|
|
|
bzero(&pptmsi, sizeof(pptmsi));
|
|
|
|
pptmsi.vcpu = vcpu;
|
|
|
|
pptmsi.bus = bus;
|
|
|
|
pptmsi.slot = slot;
|
|
|
|
pptmsi.func = func;
|
2013-12-16 19:59:31 +00:00
|
|
|
pptmsi.msg = msg;
|
|
|
|
pptmsi.addr = addr;
|
2011-05-13 04:54:01 +00:00
|
|
|
pptmsi.numvec = numvec;
|
|
|
|
|
|
|
|
return (ioctl(ctx->fd, VM_PPTDEV_MSI, &pptmsi));
|
|
|
|
}
|
|
|
|
|
2012-04-28 16:28:00 +00:00
|
|
|
int
|
2013-12-18 03:58:51 +00:00
|
|
|
vm_setup_pptdev_msix(struct vmctx *ctx, int vcpu, int bus, int slot, int func,
|
|
|
|
int idx, uint64_t addr, uint64_t msg, uint32_t vector_control)
|
2012-04-28 16:28:00 +00:00
|
|
|
{
|
|
|
|
struct vm_pptdev_msix pptmsix;
|
|
|
|
|
|
|
|
bzero(&pptmsix, sizeof(pptmsix));
|
|
|
|
pptmsix.vcpu = vcpu;
|
|
|
|
pptmsix.bus = bus;
|
|
|
|
pptmsix.slot = slot;
|
|
|
|
pptmsix.func = func;
|
|
|
|
pptmsix.idx = idx;
|
|
|
|
pptmsix.msg = msg;
|
|
|
|
pptmsix.addr = addr;
|
|
|
|
pptmsix.vector_control = vector_control;
|
|
|
|
|
|
|
|
return ioctl(ctx->fd, VM_PPTDEV_MSIX, &pptmsix);
|
|
|
|
}
|
|
|
|
|
2020-11-24 23:18:52 +00:00
|
|
|
int
|
|
|
|
vm_disable_pptdev_msix(struct vmctx *ctx, int bus, int slot, int func)
|
|
|
|
{
|
|
|
|
struct vm_pptdev ppt;
|
|
|
|
|
|
|
|
bzero(&ppt, sizeof(ppt));
|
|
|
|
ppt.bus = bus;
|
|
|
|
ppt.slot = slot;
|
|
|
|
ppt.func = func;
|
|
|
|
|
|
|
|
return ioctl(ctx->fd, VM_PPTDEV_DISABLE_MSIX, &ppt);
|
|
|
|
}
|
|
|
|
|
2011-05-13 04:54:01 +00:00
|
|
|
uint64_t *
|
|
|
|
vm_get_stats(struct vmctx *ctx, int vcpu, struct timeval *ret_tv,
|
|
|
|
int *ret_entries)
|
|
|
|
{
|
2022-02-07 14:11:10 -08:00
|
|
|
static _Thread_local uint64_t *stats_buf;
|
|
|
|
static _Thread_local u_int stats_count;
|
|
|
|
uint64_t *new_stats;
|
|
|
|
struct vm_stats vmstats;
|
|
|
|
u_int count, index;
|
|
|
|
bool have_stats;
|
|
|
|
|
|
|
|
have_stats = false;
|
2011-05-13 04:54:01 +00:00
|
|
|
vmstats.cpuid = vcpu;
|
2022-02-07 14:11:10 -08:00
|
|
|
count = 0;
|
|
|
|
for (index = 0;; index += nitems(vmstats.statbuf)) {
|
|
|
|
vmstats.index = index;
|
|
|
|
if (ioctl(ctx->fd, VM_STATS, &vmstats) != 0)
|
|
|
|
break;
|
|
|
|
if (stats_count < index + vmstats.num_entries) {
|
|
|
|
new_stats = realloc(stats_buf,
|
|
|
|
(index + vmstats.num_entries) * sizeof(uint64_t));
|
|
|
|
if (new_stats == NULL) {
|
|
|
|
errno = ENOMEM;
|
|
|
|
return (NULL);
|
|
|
|
}
|
|
|
|
stats_count = index + vmstats.num_entries;
|
|
|
|
stats_buf = new_stats;
|
|
|
|
}
|
|
|
|
memcpy(stats_buf + index, vmstats.statbuf,
|
|
|
|
vmstats.num_entries * sizeof(uint64_t));
|
|
|
|
count += vmstats.num_entries;
|
|
|
|
have_stats = true;
|
2011-05-13 04:54:01 +00:00
|
|
|
|
2022-02-07 14:11:10 -08:00
|
|
|
if (vmstats.num_entries != nitems(vmstats.statbuf))
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (have_stats) {
|
2011-05-13 04:54:01 +00:00
|
|
|
if (ret_entries)
|
2022-02-07 14:11:10 -08:00
|
|
|
*ret_entries = count;
|
2011-05-13 04:54:01 +00:00
|
|
|
if (ret_tv)
|
|
|
|
*ret_tv = vmstats.tv;
|
2022-02-07 14:11:10 -08:00
|
|
|
return (stats_buf);
|
2011-05-13 04:54:01 +00:00
|
|
|
} else
|
|
|
|
return (NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
const char *
|
|
|
|
vm_get_stat_desc(struct vmctx *ctx, int index)
|
|
|
|
{
|
|
|
|
static struct vm_stat_desc statdesc;
|
|
|
|
|
|
|
|
statdesc.index = index;
|
|
|
|
if (ioctl(ctx->fd, VM_STAT_DESC, &statdesc) == 0)
|
|
|
|
return (statdesc.desc);
|
|
|
|
else
|
|
|
|
return (NULL);
|
|
|
|
}
|
|
|
|
|
2012-09-25 19:08:51 +00:00
|
|
|
int
|
|
|
|
vm_get_x2apic_state(struct vmctx *ctx, int vcpu, enum x2apic_state *state)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
struct vm_x2apic x2apic;
|
|
|
|
|
|
|
|
bzero(&x2apic, sizeof(x2apic));
|
|
|
|
x2apic.cpuid = vcpu;
|
|
|
|
|
|
|
|
error = ioctl(ctx->fd, VM_GET_X2APIC_STATE, &x2apic);
|
|
|
|
*state = x2apic.state;
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vm_set_x2apic_state(struct vmctx *ctx, int vcpu, enum x2apic_state state)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
struct vm_x2apic x2apic;
|
|
|
|
|
|
|
|
bzero(&x2apic, sizeof(x2apic));
|
|
|
|
x2apic.cpuid = vcpu;
|
|
|
|
x2apic.state = state;
|
|
|
|
|
|
|
|
error = ioctl(ctx->fd, VM_SET_X2APIC_STATE, &x2apic);
|
|
|
|
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2011-05-13 04:54:01 +00:00
|
|
|
/*
|
|
|
|
* From Intel Vol 3a:
|
|
|
|
* Table 9-1. IA-32 Processor States Following Power-up, Reset or INIT
|
|
|
|
*/
|
|
|
|
int
|
|
|
|
vcpu_reset(struct vmctx *vmctx, int vcpu)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
uint64_t rflags, rip, cr0, cr4, zero, desc_base, rdx;
|
|
|
|
uint32_t desc_access, desc_limit;
|
|
|
|
uint16_t sel;
|
|
|
|
|
|
|
|
zero = 0;
|
|
|
|
|
|
|
|
rflags = 0x2;
|
|
|
|
error = vm_set_register(vmctx, vcpu, VM_REG_GUEST_RFLAGS, rflags);
|
|
|
|
if (error)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
rip = 0xfff0;
|
|
|
|
if ((error = vm_set_register(vmctx, vcpu, VM_REG_GUEST_RIP, rip)) != 0)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
cr0 = CR0_NE;
|
|
|
|
if ((error = vm_set_register(vmctx, vcpu, VM_REG_GUEST_CR0, cr0)) != 0)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
if ((error = vm_set_register(vmctx, vcpu, VM_REG_GUEST_CR3, zero)) != 0)
|
|
|
|
goto done;
|
|
|
|
|
2012-08-04 02:14:27 +00:00
|
|
|
cr4 = 0;
|
2011-05-13 04:54:01 +00:00
|
|
|
if ((error = vm_set_register(vmctx, vcpu, VM_REG_GUEST_CR4, cr4)) != 0)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* CS: present, r/w, accessed, 16-bit, byte granularity, usable
|
|
|
|
*/
|
|
|
|
desc_base = 0xffff0000;
|
|
|
|
desc_limit = 0xffff;
|
|
|
|
desc_access = 0x0093;
|
|
|
|
error = vm_set_desc(vmctx, vcpu, VM_REG_GUEST_CS,
|
|
|
|
desc_base, desc_limit, desc_access);
|
|
|
|
if (error)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
sel = 0xf000;
|
|
|
|
if ((error = vm_set_register(vmctx, vcpu, VM_REG_GUEST_CS, sel)) != 0)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* SS,DS,ES,FS,GS: present, r/w, accessed, 16-bit, byte granularity
|
|
|
|
*/
|
|
|
|
desc_base = 0;
|
|
|
|
desc_limit = 0xffff;
|
|
|
|
desc_access = 0x0093;
|
|
|
|
error = vm_set_desc(vmctx, vcpu, VM_REG_GUEST_SS,
|
|
|
|
desc_base, desc_limit, desc_access);
|
|
|
|
if (error)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
error = vm_set_desc(vmctx, vcpu, VM_REG_GUEST_DS,
|
|
|
|
desc_base, desc_limit, desc_access);
|
|
|
|
if (error)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
error = vm_set_desc(vmctx, vcpu, VM_REG_GUEST_ES,
|
|
|
|
desc_base, desc_limit, desc_access);
|
|
|
|
if (error)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
error = vm_set_desc(vmctx, vcpu, VM_REG_GUEST_FS,
|
|
|
|
desc_base, desc_limit, desc_access);
|
|
|
|
if (error)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
error = vm_set_desc(vmctx, vcpu, VM_REG_GUEST_GS,
|
|
|
|
desc_base, desc_limit, desc_access);
|
|
|
|
if (error)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
sel = 0;
|
|
|
|
if ((error = vm_set_register(vmctx, vcpu, VM_REG_GUEST_SS, sel)) != 0)
|
|
|
|
goto done;
|
|
|
|
if ((error = vm_set_register(vmctx, vcpu, VM_REG_GUEST_DS, sel)) != 0)
|
|
|
|
goto done;
|
|
|
|
if ((error = vm_set_register(vmctx, vcpu, VM_REG_GUEST_ES, sel)) != 0)
|
|
|
|
goto done;
|
|
|
|
if ((error = vm_set_register(vmctx, vcpu, VM_REG_GUEST_FS, sel)) != 0)
|
|
|
|
goto done;
|
|
|
|
if ((error = vm_set_register(vmctx, vcpu, VM_REG_GUEST_GS, sel)) != 0)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
/* General purpose registers */
|
|
|
|
rdx = 0xf00;
|
|
|
|
if ((error = vm_set_register(vmctx, vcpu, VM_REG_GUEST_RAX, zero)) != 0)
|
|
|
|
goto done;
|
|
|
|
if ((error = vm_set_register(vmctx, vcpu, VM_REG_GUEST_RBX, zero)) != 0)
|
|
|
|
goto done;
|
|
|
|
if ((error = vm_set_register(vmctx, vcpu, VM_REG_GUEST_RCX, zero)) != 0)
|
|
|
|
goto done;
|
|
|
|
if ((error = vm_set_register(vmctx, vcpu, VM_REG_GUEST_RDX, rdx)) != 0)
|
|
|
|
goto done;
|
|
|
|
if ((error = vm_set_register(vmctx, vcpu, VM_REG_GUEST_RSI, zero)) != 0)
|
|
|
|
goto done;
|
|
|
|
if ((error = vm_set_register(vmctx, vcpu, VM_REG_GUEST_RDI, zero)) != 0)
|
|
|
|
goto done;
|
|
|
|
if ((error = vm_set_register(vmctx, vcpu, VM_REG_GUEST_RBP, zero)) != 0)
|
|
|
|
goto done;
|
|
|
|
if ((error = vm_set_register(vmctx, vcpu, VM_REG_GUEST_RSP, zero)) != 0)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
/* GDTR, IDTR */
|
|
|
|
desc_base = 0;
|
|
|
|
desc_limit = 0xffff;
|
|
|
|
desc_access = 0;
|
|
|
|
error = vm_set_desc(vmctx, vcpu, VM_REG_GUEST_GDTR,
|
|
|
|
desc_base, desc_limit, desc_access);
|
|
|
|
if (error != 0)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
error = vm_set_desc(vmctx, vcpu, VM_REG_GUEST_IDTR,
|
|
|
|
desc_base, desc_limit, desc_access);
|
|
|
|
if (error != 0)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
/* TR */
|
|
|
|
desc_base = 0;
|
|
|
|
desc_limit = 0xffff;
|
|
|
|
desc_access = 0x0000008b;
|
|
|
|
error = vm_set_desc(vmctx, vcpu, VM_REG_GUEST_TR, 0, 0, desc_access);
|
|
|
|
if (error)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
sel = 0;
|
|
|
|
if ((error = vm_set_register(vmctx, vcpu, VM_REG_GUEST_TR, sel)) != 0)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
/* LDTR */
|
|
|
|
desc_base = 0;
|
|
|
|
desc_limit = 0xffff;
|
|
|
|
desc_access = 0x00000082;
|
|
|
|
error = vm_set_desc(vmctx, vcpu, VM_REG_GUEST_LDTR, desc_base,
|
|
|
|
desc_limit, desc_access);
|
|
|
|
if (error)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
sel = 0;
|
|
|
|
if ((error = vm_set_register(vmctx, vcpu, VM_REG_GUEST_LDTR, 0)) != 0)
|
|
|
|
goto done;
|
|
|
|
|
|
|
|
/* XXX cr2, debug registers */
|
|
|
|
|
|
|
|
error = 0;
|
|
|
|
done:
|
|
|
|
return (error);
|
|
|
|
}
|
2013-10-05 21:22:35 +00:00
|
|
|
|
|
|
|
int
|
|
|
|
vm_get_gpa_pmap(struct vmctx *ctx, uint64_t gpa, uint64_t *pte, int *num)
|
|
|
|
{
|
|
|
|
int error, i;
|
|
|
|
struct vm_gpa_pte gpapte;
|
|
|
|
|
|
|
|
bzero(&gpapte, sizeof(gpapte));
|
|
|
|
gpapte.gpa = gpa;
|
|
|
|
|
|
|
|
error = ioctl(ctx->fd, VM_GET_GPA_PMAP, &gpapte);
|
|
|
|
|
|
|
|
if (error == 0) {
|
|
|
|
*num = gpapte.ptenum;
|
|
|
|
for (i = 0; i < gpapte.ptenum; i++)
|
|
|
|
pte[i] = gpapte.pte[i];
|
|
|
|
}
|
|
|
|
|
|
|
|
return (error);
|
|
|
|
}
|
2013-11-25 19:04:51 +00:00
|
|
|
|
|
|
|
int
|
|
|
|
vm_get_hpet_capabilities(struct vmctx *ctx, uint32_t *capabilities)
|
|
|
|
{
|
|
|
|
int error;
|
|
|
|
struct vm_hpet_cap cap;
|
|
|
|
|
|
|
|
bzero(&cap, sizeof(struct vm_hpet_cap));
|
|
|
|
error = ioctl(ctx->fd, VM_GET_HPET_CAPABILITIES, &cap);
|
|
|
|
if (capabilities != NULL)
|
|
|
|
*capabilities = cap.capabilities;
|
|
|
|
return (error);
|
|
|
|
}
|
2014-05-24 23:12:30 +00:00
|
|
|
|
2015-05-06 16:25:20 +00:00
|
|
|
int
|
|
|
|
vm_gla2gpa(struct vmctx *ctx, int vcpu, struct vm_guest_paging *paging,
|
|
|
|
uint64_t gla, int prot, uint64_t *gpa, int *fault)
|
2014-05-24 23:12:30 +00:00
|
|
|
{
|
|
|
|
struct vm_gla2gpa gg;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
bzero(&gg, sizeof(struct vm_gla2gpa));
|
|
|
|
gg.vcpuid = vcpu;
|
|
|
|
gg.prot = prot;
|
|
|
|
gg.gla = gla;
|
|
|
|
gg.paging = *paging;
|
|
|
|
|
|
|
|
error = ioctl(ctx->fd, VM_GLA2GPA, &gg);
|
|
|
|
if (error == 0) {
|
|
|
|
*fault = gg.fault;
|
|
|
|
*gpa = gg.gpa;
|
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2018-02-26 19:19:05 +00:00
|
|
|
int
|
|
|
|
vm_gla2gpa_nofault(struct vmctx *ctx, int vcpu, struct vm_guest_paging *paging,
|
|
|
|
uint64_t gla, int prot, uint64_t *gpa, int *fault)
|
|
|
|
{
|
|
|
|
struct vm_gla2gpa gg;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
bzero(&gg, sizeof(struct vm_gla2gpa));
|
|
|
|
gg.vcpuid = vcpu;
|
|
|
|
gg.prot = prot;
|
|
|
|
gg.gla = gla;
|
|
|
|
gg.paging = *paging;
|
|
|
|
|
|
|
|
error = ioctl(ctx->fd, VM_GLA2GPA_NOFAULT, &gg);
|
|
|
|
if (error == 0) {
|
|
|
|
*fault = gg.fault;
|
|
|
|
*gpa = gg.gpa;
|
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2014-05-24 23:12:30 +00:00
|
|
|
#ifndef min
|
|
|
|
#define min(a,b) (((a) < (b)) ? (a) : (b))
|
|
|
|
#endif
|
|
|
|
|
|
|
|
int
|
2014-07-23 04:28:51 +00:00
|
|
|
vm_copy_setup(struct vmctx *ctx, int vcpu, struct vm_guest_paging *paging,
|
2015-05-06 16:25:20 +00:00
|
|
|
uint64_t gla, size_t len, int prot, struct iovec *iov, int iovcnt,
|
|
|
|
int *fault)
|
2014-05-24 23:12:30 +00:00
|
|
|
{
|
2015-01-19 06:51:04 +00:00
|
|
|
void *va;
|
2021-07-26 16:40:16 -04:00
|
|
|
uint64_t gpa, off;
|
|
|
|
int error, i, n;
|
2014-05-26 18:21:08 +00:00
|
|
|
|
|
|
|
for (i = 0; i < iovcnt; i++) {
|
|
|
|
iov[i].iov_base = 0;
|
|
|
|
iov[i].iov_len = 0;
|
|
|
|
}
|
2014-05-24 23:12:30 +00:00
|
|
|
|
|
|
|
while (len) {
|
2014-05-26 18:21:08 +00:00
|
|
|
assert(iovcnt > 0);
|
2015-05-06 16:25:20 +00:00
|
|
|
error = vm_gla2gpa(ctx, vcpu, paging, gla, prot, &gpa, fault);
|
|
|
|
if (error || *fault)
|
|
|
|
return (error);
|
2014-05-24 23:12:30 +00:00
|
|
|
|
|
|
|
off = gpa & PAGE_MASK;
|
2021-07-26 16:40:16 -04:00
|
|
|
n = MIN(len, PAGE_SIZE - off);
|
2014-05-26 18:21:08 +00:00
|
|
|
|
2015-01-19 06:51:04 +00:00
|
|
|
va = vm_map_gpa(ctx, gpa, n);
|
|
|
|
if (va == NULL)
|
2015-05-06 16:25:20 +00:00
|
|
|
return (EFAULT);
|
2015-01-19 06:51:04 +00:00
|
|
|
|
|
|
|
iov->iov_base = va;
|
2014-05-26 18:21:08 +00:00
|
|
|
iov->iov_len = n;
|
|
|
|
iov++;
|
|
|
|
iovcnt--;
|
2014-05-24 23:12:30 +00:00
|
|
|
|
|
|
|
gla += n;
|
|
|
|
len -= n;
|
|
|
|
}
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
2015-01-19 06:51:04 +00:00
|
|
|
void
|
2021-07-26 16:40:16 -04:00
|
|
|
vm_copy_teardown(struct vmctx *ctx __unused, int vcpu __unused,
|
|
|
|
struct iovec *iov __unused, int iovcnt __unused)
|
2015-01-19 06:51:04 +00:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2014-05-26 18:21:08 +00:00
|
|
|
void
|
2021-07-26 16:40:16 -04:00
|
|
|
vm_copyin(struct vmctx *ctx __unused, int vcpu __unused, struct iovec *iov,
|
|
|
|
void *vp, size_t len)
|
2014-05-24 23:12:30 +00:00
|
|
|
{
|
2014-05-26 18:21:08 +00:00
|
|
|
const char *src;
|
2014-05-24 23:12:30 +00:00
|
|
|
char *dst;
|
2014-05-26 18:21:08 +00:00
|
|
|
size_t n;
|
|
|
|
|
|
|
|
dst = vp;
|
|
|
|
while (len) {
|
|
|
|
assert(iov->iov_len);
|
|
|
|
n = min(len, iov->iov_len);
|
2015-01-19 06:51:04 +00:00
|
|
|
src = iov->iov_base;
|
2014-05-26 18:21:08 +00:00
|
|
|
bcopy(src, dst, n);
|
|
|
|
|
|
|
|
iov++;
|
|
|
|
dst += n;
|
|
|
|
len -= n;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2021-07-26 16:40:16 -04:00
|
|
|
vm_copyout(struct vmctx *ctx __unused, int vcpu __unused, const void *vp,
|
|
|
|
struct iovec *iov, size_t len)
|
2014-05-26 18:21:08 +00:00
|
|
|
{
|
2014-05-24 23:12:30 +00:00
|
|
|
const char *src;
|
2014-05-26 18:21:08 +00:00
|
|
|
char *dst;
|
|
|
|
size_t n;
|
2014-05-24 23:12:30 +00:00
|
|
|
|
|
|
|
src = vp;
|
|
|
|
while (len) {
|
2014-05-26 18:21:08 +00:00
|
|
|
assert(iov->iov_len);
|
|
|
|
n = min(len, iov->iov_len);
|
2015-01-19 06:51:04 +00:00
|
|
|
dst = iov->iov_base;
|
2014-05-24 23:12:30 +00:00
|
|
|
bcopy(src, dst, n);
|
|
|
|
|
2014-05-26 18:21:08 +00:00
|
|
|
iov++;
|
2014-05-24 23:12:30 +00:00
|
|
|
src += n;
|
|
|
|
len -= n;
|
|
|
|
}
|
|
|
|
}
|
2014-05-31 23:37:34 +00:00
|
|
|
|
|
|
|
static int
|
|
|
|
vm_get_cpus(struct vmctx *ctx, int which, cpuset_t *cpus)
|
|
|
|
{
|
|
|
|
struct vm_cpuset vm_cpuset;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
bzero(&vm_cpuset, sizeof(struct vm_cpuset));
|
|
|
|
vm_cpuset.which = which;
|
|
|
|
vm_cpuset.cpusetsize = sizeof(cpuset_t);
|
|
|
|
vm_cpuset.cpus = cpus;
|
|
|
|
|
|
|
|
error = ioctl(ctx->fd, VM_GET_CPUS, &vm_cpuset);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vm_active_cpus(struct vmctx *ctx, cpuset_t *cpus)
|
|
|
|
{
|
|
|
|
|
|
|
|
return (vm_get_cpus(ctx, VM_ACTIVE_CPUS, cpus));
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vm_suspended_cpus(struct vmctx *ctx, cpuset_t *cpus)
|
|
|
|
{
|
|
|
|
|
|
|
|
return (vm_get_cpus(ctx, VM_SUSPENDED_CPUS, cpus));
|
|
|
|
}
|
|
|
|
|
2018-04-06 22:03:43 +00:00
|
|
|
int
|
|
|
|
vm_debug_cpus(struct vmctx *ctx, cpuset_t *cpus)
|
|
|
|
{
|
|
|
|
|
|
|
|
return (vm_get_cpus(ctx, VM_DEBUG_CPUS, cpus));
|
|
|
|
}
|
|
|
|
|
2014-05-31 23:37:34 +00:00
|
|
|
int
|
|
|
|
vm_activate_cpu(struct vmctx *ctx, int vcpu)
|
|
|
|
{
|
|
|
|
struct vm_activate_cpu ac;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
bzero(&ac, sizeof(struct vm_activate_cpu));
|
|
|
|
ac.vcpuid = vcpu;
|
|
|
|
error = ioctl(ctx->fd, VM_ACTIVATE_CPU, &ac);
|
|
|
|
return (error);
|
|
|
|
}
|
2014-07-19 20:59:08 +00:00
|
|
|
|
2018-04-06 22:03:43 +00:00
|
|
|
int
|
|
|
|
vm_suspend_cpu(struct vmctx *ctx, int vcpu)
|
|
|
|
{
|
|
|
|
struct vm_activate_cpu ac;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
bzero(&ac, sizeof(struct vm_activate_cpu));
|
|
|
|
ac.vcpuid = vcpu;
|
|
|
|
error = ioctl(ctx->fd, VM_SUSPEND_CPU, &ac);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vm_resume_cpu(struct vmctx *ctx, int vcpu)
|
|
|
|
{
|
|
|
|
struct vm_activate_cpu ac;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
bzero(&ac, sizeof(struct vm_activate_cpu));
|
|
|
|
ac.vcpuid = vcpu;
|
|
|
|
error = ioctl(ctx->fd, VM_RESUME_CPU, &ac);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2014-07-19 20:59:08 +00:00
|
|
|
int
|
|
|
|
vm_get_intinfo(struct vmctx *ctx, int vcpu, uint64_t *info1, uint64_t *info2)
|
|
|
|
{
|
|
|
|
struct vm_intinfo vmii;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
bzero(&vmii, sizeof(struct vm_intinfo));
|
|
|
|
vmii.vcpuid = vcpu;
|
|
|
|
error = ioctl(ctx->fd, VM_GET_INTINFO, &vmii);
|
|
|
|
if (error == 0) {
|
|
|
|
*info1 = vmii.info1;
|
|
|
|
*info2 = vmii.info2;
|
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vm_set_intinfo(struct vmctx *ctx, int vcpu, uint64_t info1)
|
|
|
|
{
|
|
|
|
struct vm_intinfo vmii;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
bzero(&vmii, sizeof(struct vm_intinfo));
|
|
|
|
vmii.vcpuid = vcpu;
|
|
|
|
vmii.info1 = info1;
|
|
|
|
error = ioctl(ctx->fd, VM_SET_INTINFO, &vmii);
|
|
|
|
return (error);
|
|
|
|
}
|
2014-12-30 22:19:34 +00:00
|
|
|
|
|
|
|
int
|
|
|
|
vm_rtc_write(struct vmctx *ctx, int offset, uint8_t value)
|
|
|
|
{
|
|
|
|
struct vm_rtc_data rtcdata;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
bzero(&rtcdata, sizeof(struct vm_rtc_data));
|
|
|
|
rtcdata.offset = offset;
|
|
|
|
rtcdata.value = value;
|
|
|
|
error = ioctl(ctx->fd, VM_RTC_WRITE, &rtcdata);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vm_rtc_read(struct vmctx *ctx, int offset, uint8_t *retval)
|
|
|
|
{
|
|
|
|
struct vm_rtc_data rtcdata;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
bzero(&rtcdata, sizeof(struct vm_rtc_data));
|
|
|
|
rtcdata.offset = offset;
|
|
|
|
error = ioctl(ctx->fd, VM_RTC_READ, &rtcdata);
|
|
|
|
if (error == 0)
|
|
|
|
*retval = rtcdata.value;
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vm_rtc_settime(struct vmctx *ctx, time_t secs)
|
|
|
|
{
|
|
|
|
struct vm_rtc_time rtctime;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
bzero(&rtctime, sizeof(struct vm_rtc_time));
|
|
|
|
rtctime.secs = secs;
|
|
|
|
error = ioctl(ctx->fd, VM_RTC_SETTIME, &rtctime);
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vm_rtc_gettime(struct vmctx *ctx, time_t *secs)
|
|
|
|
{
|
|
|
|
struct vm_rtc_time rtctime;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
bzero(&rtctime, sizeof(struct vm_rtc_time));
|
|
|
|
error = ioctl(ctx->fd, VM_RTC_GETTIME, &rtctime);
|
|
|
|
if (error == 0)
|
|
|
|
*secs = rtctime.secs;
|
|
|
|
return (error);
|
|
|
|
}
|
2015-01-18 03:08:30 +00:00
|
|
|
|
|
|
|
int
|
|
|
|
vm_restart_instruction(void *arg, int vcpu)
|
|
|
|
{
|
|
|
|
struct vmctx *ctx = arg;
|
|
|
|
|
|
|
|
return (ioctl(ctx->fd, VM_RESTART_INSTRUCTION, &vcpu));
|
|
|
|
}
|
2017-02-14 13:35:59 +00:00
|
|
|
|
Initial support for bhyve save and restore.
Save and restore (also known as suspend and resume) permits a snapshot
to be taken of a guest's state that can later be resumed. In the
current implementation, bhyve(8) creates a UNIX domain socket that is
used by bhyvectl(8) to send a request to save a snapshot (and
optionally exit after the snapshot has been taken). A snapshot
currently consists of two files: the first holds a copy of guest RAM,
and the second file holds other guest state such as vCPU register
values and device model state.
To resume a guest, bhyve(8) must be started with a matching pair of
command line arguments to instantiate the same set of device models as
well as a pointer to the saved snapshot.
While the current implementation is useful for several uses cases, it
has a few limitations. The file format for saving the guest state is
tied to the ABI of internal bhyve structures and is not
self-describing (in that it does not communicate the set of device
models present in the system). In addition, the state saved for some
device models closely matches the internal data structures which might
prove a challenge for compatibility of snapshot files across a range
of bhyve versions. The file format also does not currently support
versioning of individual chunks of state. As a result, the current
file format is not a fixed binary format and future revisions to save
and restore will break binary compatiblity of snapshot files. The
goal is to move to a more flexible format that adds versioning,
etc. and at that point to commit to providing a reasonable level of
compatibility. As a result, the current implementation is not enabled
by default. It can be enabled via the WITH_BHYVE_SNAPSHOT=yes option
for userland builds, and the kernel option BHYVE_SHAPSHOT.
Submitted by: Mihai Tiganus, Flavius Anton, Darius Mihai
Submitted by: Elena Mihailescu, Mihai Carabas, Sergiu Weisz
Relnotes: yes
Sponsored by: University Politehnica of Bucharest
Sponsored by: Matthew Grooms (student scholarships)
Sponsored by: iXsystems
Differential Revision: https://reviews.freebsd.org/D19495
2020-05-05 00:02:04 +00:00
|
|
|
int
|
|
|
|
vm_snapshot_req(struct vm_snapshot_meta *meta)
|
|
|
|
{
|
|
|
|
|
|
|
|
if (ioctl(meta->ctx->fd, VM_SNAPSHOT_REQ, meta) == -1) {
|
|
|
|
#ifdef SNAPSHOT_DEBUG
|
|
|
|
fprintf(stderr, "%s: snapshot failed for %s: %d\r\n",
|
|
|
|
__func__, meta->dev_name, errno);
|
|
|
|
#endif
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vm_restore_time(struct vmctx *ctx)
|
|
|
|
{
|
|
|
|
int dummy;
|
|
|
|
|
|
|
|
dummy = 0;
|
|
|
|
return (ioctl(ctx->fd, VM_RESTORE_TIME, &dummy));
|
|
|
|
}
|
|
|
|
|
Add the ability to control the CPU topology of created VMs
from userland without the need to use sysctls, it allows the old
sysctls to continue to function, but deprecates them at
FreeBSD_version 1200060 (Relnotes for deprecate).
The command line of bhyve is maintained in a backwards compatible way.
The API of libvmmapi is maintained in a backwards compatible way.
The sysctl's are maintained in a backwards compatible way.
Added command option looks like:
bhyve -c [[cpus=]n][,sockets=n][,cores=n][,threads=n][,maxcpus=n]
The optional parts can be specified in any order, but only a single
integer invokes the backwards compatible parse. [,maxcpus=n] is
hidden by #ifdef until kernel support is added, though the api
is put in place.
bhyvectl --get-cpu-topology option added.
Reviewed by: grehan (maintainer, earlier version),
Reviewed by: bcr (manpages)
Approved by: bde (mentor), phk (mentor)
Tested by: Oleg Ginzburg <olevole@olevole.ru> (cbsd)
MFC after: 1 week
Relnotes: Y
Differential Revision: https://reviews.freebsd.org/D9930
2018-04-08 19:24:49 +00:00
|
|
|
int
|
|
|
|
vm_set_topology(struct vmctx *ctx,
|
|
|
|
uint16_t sockets, uint16_t cores, uint16_t threads, uint16_t maxcpus)
|
|
|
|
{
|
|
|
|
struct vm_cpu_topology topology;
|
|
|
|
|
|
|
|
bzero(&topology, sizeof (struct vm_cpu_topology));
|
|
|
|
topology.sockets = sockets;
|
|
|
|
topology.cores = cores;
|
|
|
|
topology.threads = threads;
|
|
|
|
topology.maxcpus = maxcpus;
|
|
|
|
return (ioctl(ctx->fd, VM_SET_TOPOLOGY, &topology));
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
vm_get_topology(struct vmctx *ctx,
|
|
|
|
uint16_t *sockets, uint16_t *cores, uint16_t *threads, uint16_t *maxcpus)
|
|
|
|
{
|
|
|
|
struct vm_cpu_topology topology;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
bzero(&topology, sizeof (struct vm_cpu_topology));
|
|
|
|
error = ioctl(ctx->fd, VM_GET_TOPOLOGY, &topology);
|
|
|
|
if (error == 0) {
|
|
|
|
*sockets = topology.sockets;
|
|
|
|
*cores = topology.cores;
|
|
|
|
*threads = topology.threads;
|
|
|
|
*maxcpus = topology.maxcpus;
|
|
|
|
}
|
|
|
|
return (error);
|
|
|
|
}
|
|
|
|
|
2017-02-14 13:35:59 +00:00
|
|
|
int
|
|
|
|
vm_get_device_fd(struct vmctx *ctx)
|
|
|
|
{
|
|
|
|
|
|
|
|
return (ctx->fd);
|
|
|
|
}
|
|
|
|
|
|
|
|
const cap_ioctl_t *
|
|
|
|
vm_get_ioctls(size_t *len)
|
|
|
|
{
|
|
|
|
cap_ioctl_t *cmds;
|
|
|
|
/* keep in sync with machine/vmm_dev.h */
|
|
|
|
static const cap_ioctl_t vm_ioctl_cmds[] = { VM_RUN, VM_SUSPEND, VM_REINIT,
|
|
|
|
VM_ALLOC_MEMSEG, VM_GET_MEMSEG, VM_MMAP_MEMSEG, VM_MMAP_MEMSEG,
|
2021-03-19 00:08:52 +08:00
|
|
|
VM_MMAP_GETNEXT, VM_MUNMAP_MEMSEG, VM_SET_REGISTER, VM_GET_REGISTER,
|
2017-02-14 13:35:59 +00:00
|
|
|
VM_SET_SEGMENT_DESCRIPTOR, VM_GET_SEGMENT_DESCRIPTOR,
|
2018-02-22 00:39:25 +00:00
|
|
|
VM_SET_REGISTER_SET, VM_GET_REGISTER_SET,
|
2020-05-15 15:54:22 +00:00
|
|
|
VM_SET_KERNEMU_DEV, VM_GET_KERNEMU_DEV,
|
2017-02-14 13:35:59 +00:00
|
|
|
VM_INJECT_EXCEPTION, VM_LAPIC_IRQ, VM_LAPIC_LOCAL_IRQ,
|
|
|
|
VM_LAPIC_MSI, VM_IOAPIC_ASSERT_IRQ, VM_IOAPIC_DEASSERT_IRQ,
|
|
|
|
VM_IOAPIC_PULSE_IRQ, VM_IOAPIC_PINCOUNT, VM_ISA_ASSERT_IRQ,
|
|
|
|
VM_ISA_DEASSERT_IRQ, VM_ISA_PULSE_IRQ, VM_ISA_SET_IRQ_TRIGGER,
|
|
|
|
VM_SET_CAPABILITY, VM_GET_CAPABILITY, VM_BIND_PPTDEV,
|
|
|
|
VM_UNBIND_PPTDEV, VM_MAP_PPTDEV_MMIO, VM_PPTDEV_MSI,
|
2021-03-19 00:08:52 +08:00
|
|
|
VM_PPTDEV_MSIX, VM_UNMAP_PPTDEV_MMIO, VM_PPTDEV_DISABLE_MSIX,
|
2020-11-24 23:18:52 +00:00
|
|
|
VM_INJECT_NMI, VM_STATS, VM_STAT_DESC,
|
2017-02-14 13:35:59 +00:00
|
|
|
VM_SET_X2APIC_STATE, VM_GET_X2APIC_STATE,
|
|
|
|
VM_GET_HPET_CAPABILITIES, VM_GET_GPA_PMAP, VM_GLA2GPA,
|
2018-02-26 19:19:05 +00:00
|
|
|
VM_GLA2GPA_NOFAULT,
|
2018-04-06 22:03:43 +00:00
|
|
|
VM_ACTIVATE_CPU, VM_GET_CPUS, VM_SUSPEND_CPU, VM_RESUME_CPU,
|
|
|
|
VM_SET_INTINFO, VM_GET_INTINFO,
|
2017-02-14 13:35:59 +00:00
|
|
|
VM_RTC_WRITE, VM_RTC_READ, VM_RTC_SETTIME, VM_RTC_GETTIME,
|
Add the ability to control the CPU topology of created VMs
from userland without the need to use sysctls, it allows the old
sysctls to continue to function, but deprecates them at
FreeBSD_version 1200060 (Relnotes for deprecate).
The command line of bhyve is maintained in a backwards compatible way.
The API of libvmmapi is maintained in a backwards compatible way.
The sysctl's are maintained in a backwards compatible way.
Added command option looks like:
bhyve -c [[cpus=]n][,sockets=n][,cores=n][,threads=n][,maxcpus=n]
The optional parts can be specified in any order, but only a single
integer invokes the backwards compatible parse. [,maxcpus=n] is
hidden by #ifdef until kernel support is added, though the api
is put in place.
bhyvectl --get-cpu-topology option added.
Reviewed by: grehan (maintainer, earlier version),
Reviewed by: bcr (manpages)
Approved by: bde (mentor), phk (mentor)
Tested by: Oleg Ginzburg <olevole@olevole.ru> (cbsd)
MFC after: 1 week
Relnotes: Y
Differential Revision: https://reviews.freebsd.org/D9930
2018-04-08 19:24:49 +00:00
|
|
|
VM_RESTART_INSTRUCTION, VM_SET_TOPOLOGY, VM_GET_TOPOLOGY };
|
2017-02-14 13:35:59 +00:00
|
|
|
|
|
|
|
if (len == NULL) {
|
|
|
|
cmds = malloc(sizeof(vm_ioctl_cmds));
|
|
|
|
if (cmds == NULL)
|
|
|
|
return (NULL);
|
|
|
|
bcopy(vm_ioctl_cmds, cmds, sizeof(vm_ioctl_cmds));
|
|
|
|
return (cmds);
|
|
|
|
}
|
|
|
|
|
|
|
|
*len = nitems(vm_ioctl_cmds);
|
|
|
|
return (NULL);
|
|
|
|
}
|