2008-04-17 12:28:09 +08:00
|
|
|
/*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License, version 2, as
|
|
|
|
* published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, write to the Free Software
|
|
|
|
* Foundation, 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
|
|
*
|
|
|
|
* Copyright IBM Corp. 2008
|
|
|
|
*
|
|
|
|
* Authors: Hollis Blanchard <hollisb@us.ibm.com>
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef __POWERPC_KVM_PPC_H__
|
|
|
|
#define __POWERPC_KVM_PPC_H__
|
|
|
|
|
|
|
|
/* This file exists just so we can dereference kvm_vcpu, avoiding nested header
|
|
|
|
* dependencies. */
|
|
|
|
|
|
|
|
#include <linux/mutex.h>
|
|
|
|
#include <linux/timer.h>
|
|
|
|
#include <linux/types.h>
|
|
|
|
#include <linux/kvm_types.h>
|
|
|
|
#include <linux/kvm_host.h>
|
2012-09-26 04:31:56 +08:00
|
|
|
#include <linux/bug.h>
|
2010-01-15 21:49:12 +08:00
|
|
|
#ifdef CONFIG_PPC_BOOK3S
|
|
|
|
#include <asm/kvm_book3s.h>
|
2010-04-16 06:11:40 +08:00
|
|
|
#else
|
|
|
|
#include <asm/kvm_booke.h>
|
2010-01-15 21:49:12 +08:00
|
|
|
#endif
|
KVM: PPC: Allow book3s_hv guests to use SMT processor modes
This lifts the restriction that book3s_hv guests can only run one
hardware thread per core, and allows them to use up to 4 threads
per core on POWER7. The host still has to run single-threaded.
This capability is advertised to qemu through a new KVM_CAP_PPC_SMT
capability. The return value of the ioctl querying this capability
is the number of vcpus per virtual CPU core (vcore), currently 4.
To use this, the host kernel should be booted with all threads
active, and then all the secondary threads should be offlined.
This will put the secondary threads into nap mode. KVM will then
wake them from nap mode and use them for running guest code (while
they are still offline). To wake the secondary threads, we send
them an IPI using a new xics_wake_cpu() function, implemented in
arch/powerpc/sysdev/xics/icp-native.c. In other words, at this stage
we assume that the platform has a XICS interrupt controller and
we are using icp-native.c to drive it. Since the woken thread will
need to acknowledge and clear the IPI, we also export the base
physical address of the XICS registers using kvmppc_set_xics_phys()
for use in the low-level KVM book3s code.
When a vcpu is created, it is assigned to a virtual CPU core.
The vcore number is obtained by dividing the vcpu number by the
number of threads per core in the host. This number is exported
to userspace via the KVM_CAP_PPC_SMT capability. If qemu wishes
to run the guest in single-threaded mode, it should make all vcpu
numbers be multiples of the number of threads per core.
We distinguish three states of a vcpu: runnable (i.e., ready to execute
the guest), blocked (that is, idle), and busy in host. We currently
implement a policy that the vcore can run only when all its threads
are runnable or blocked. This way, if a vcpu needs to execute elsewhere
in the kernel or in qemu, it can do so without being starved of CPU
by the other vcpus.
When a vcore starts to run, it executes in the context of one of the
vcpu threads. The other vcpu threads all go to sleep and stay asleep
until something happens requiring the vcpu thread to return to qemu,
or to wake up to run the vcore (this can happen when another vcpu
thread goes from busy in host state to blocked).
It can happen that a vcpu goes from blocked to runnable state (e.g.
because of an interrupt), and the vcore it belongs to is already
running. In that case it can start to run immediately as long as
the none of the vcpus in the vcore have started to exit the guest.
We send the next free thread in the vcore an IPI to get it to start
to execute the guest. It synchronizes with the other threads via
the vcore->entry_exit_count field to make sure that it doesn't go
into the guest if the other vcpus are exiting by the time that it
is ready to actually enter the guest.
Note that there is no fixed relationship between the hardware thread
number and the vcpu number. Hardware threads are assigned to vcpus
as they become runnable, so we will always use the lower-numbered
hardware threads in preference to higher-numbered threads if not all
the vcpus in the vcore are runnable, regardless of which vcpus are
runnable.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2011-06-29 08:23:08 +08:00
|
|
|
#ifdef CONFIG_KVM_BOOK3S_64_HANDLER
|
|
|
|
#include <asm/paca.h>
|
|
|
|
#endif
|
2008-04-17 12:28:09 +08:00
|
|
|
|
2014-09-10 01:07:35 +08:00
|
|
|
/*
|
|
|
|
* KVMPPC_INST_SW_BREAKPOINT is debug Instruction
|
|
|
|
* for supporting software breakpoint.
|
|
|
|
*/
|
|
|
|
#define KVMPPC_INST_SW_BREAKPOINT 0x00dddd00
|
|
|
|
|
2008-04-17 12:28:09 +08:00
|
|
|
enum emulation_result {
|
|
|
|
EMULATE_DONE, /* no further processing */
|
|
|
|
EMULATE_DO_MMIO, /* kvm_run filled with MMIO request */
|
|
|
|
EMULATE_FAIL, /* can't emulate this instruction */
|
2010-02-19 18:00:31 +08:00
|
|
|
EMULATE_AGAIN, /* something went wrong. go again */
|
2013-04-08 08:32:13 +08:00
|
|
|
EMULATE_EXIT_USER, /* emulation requires exit to user-space */
|
2008-04-17 12:28:09 +08:00
|
|
|
};
|
|
|
|
|
2014-07-24 00:06:21 +08:00
|
|
|
enum instruction_type {
|
|
|
|
INST_GENERIC,
|
|
|
|
INST_SC, /* system call */
|
|
|
|
};
|
|
|
|
|
2014-06-20 19:52:36 +08:00
|
|
|
enum xlate_instdata {
|
|
|
|
XLATE_INST, /* translate instruction address */
|
|
|
|
XLATE_DATA /* translate data address */
|
|
|
|
};
|
|
|
|
|
|
|
|
enum xlate_readwrite {
|
|
|
|
XLATE_READ, /* check for read permissions */
|
|
|
|
XLATE_WRITE /* check for write permissions */
|
|
|
|
};
|
|
|
|
|
2011-06-29 08:19:50 +08:00
|
|
|
extern int kvmppc_vcpu_run(struct kvm_run *kvm_run, struct kvm_vcpu *vcpu);
|
2008-04-17 12:28:09 +08:00
|
|
|
extern int __kvmppc_vcpu_run(struct kvm_run *kvm_run, struct kvm_vcpu *vcpu);
|
2009-10-30 13:47:07 +08:00
|
|
|
extern void kvmppc_handler_highmem(void);
|
2008-04-17 12:28:09 +08:00
|
|
|
|
|
|
|
extern void kvmppc_dump_vcpu(struct kvm_vcpu *vcpu);
|
|
|
|
extern int kvmppc_handle_load(struct kvm_run *run, struct kvm_vcpu *vcpu,
|
|
|
|
unsigned int rt, unsigned int bytes,
|
2014-01-09 18:51:16 +08:00
|
|
|
int is_default_endian);
|
2010-02-19 18:00:30 +08:00
|
|
|
extern int kvmppc_handle_loads(struct kvm_run *run, struct kvm_vcpu *vcpu,
|
|
|
|
unsigned int rt, unsigned int bytes,
|
2014-01-09 18:51:16 +08:00
|
|
|
int is_default_endian);
|
KVM: PPC: Book3S: Add MMIO emulation for FP and VSX instructions
This patch provides the MMIO load/store emulation for instructions
of 'double & vector unsigned char & vector signed char & vector
unsigned short & vector signed short & vector unsigned int & vector
signed int & vector double '.
The instructions that this adds emulation for are:
- ldx, ldux, lwax,
- lfs, lfsx, lfsu, lfsux, lfd, lfdx, lfdu, lfdux,
- stfs, stfsx, stfsu, stfsux, stfd, stfdx, stfdu, stfdux, stfiwx,
- lxsdx, lxsspx, lxsiwax, lxsiwzx, lxvd2x, lxvw4x, lxvdsx,
- stxsdx, stxsspx, stxsiwx, stxvd2x, stxvw4x
[paulus@ozlabs.org - some cleanups, fixes and rework, make it
compile for Book E, fix build when PR KVM is built in]
Signed-off-by: Bin Lu <lblulb@linux.vnet.ibm.com>
Signed-off-by: Paul Mackerras <paulus@ozlabs.org>
2017-02-21 21:12:36 +08:00
|
|
|
extern int kvmppc_handle_vsx_load(struct kvm_run *run, struct kvm_vcpu *vcpu,
|
|
|
|
unsigned int rt, unsigned int bytes,
|
|
|
|
int is_default_endian, int mmio_sign_extend);
|
2008-04-17 12:28:09 +08:00
|
|
|
extern int kvmppc_handle_store(struct kvm_run *run, struct kvm_vcpu *vcpu,
|
2014-01-09 18:51:16 +08:00
|
|
|
u64 val, unsigned int bytes,
|
|
|
|
int is_default_endian);
|
KVM: PPC: Book3S: Add MMIO emulation for FP and VSX instructions
This patch provides the MMIO load/store emulation for instructions
of 'double & vector unsigned char & vector signed char & vector
unsigned short & vector signed short & vector unsigned int & vector
signed int & vector double '.
The instructions that this adds emulation for are:
- ldx, ldux, lwax,
- lfs, lfsx, lfsu, lfsux, lfd, lfdx, lfdu, lfdux,
- stfs, stfsx, stfsu, stfsux, stfd, stfdx, stfdu, stfdux, stfiwx,
- lxsdx, lxsspx, lxsiwax, lxsiwzx, lxvd2x, lxvw4x, lxvdsx,
- stxsdx, stxsspx, stxsiwx, stxvd2x, stxvw4x
[paulus@ozlabs.org - some cleanups, fixes and rework, make it
compile for Book E, fix build when PR KVM is built in]
Signed-off-by: Bin Lu <lblulb@linux.vnet.ibm.com>
Signed-off-by: Paul Mackerras <paulus@ozlabs.org>
2017-02-21 21:12:36 +08:00
|
|
|
extern int kvmppc_handle_vsx_store(struct kvm_run *run, struct kvm_vcpu *vcpu,
|
|
|
|
int rs, unsigned int bytes,
|
|
|
|
int is_default_endian);
|
2008-04-17 12:28:09 +08:00
|
|
|
|
2014-07-24 00:06:21 +08:00
|
|
|
extern int kvmppc_load_last_inst(struct kvm_vcpu *vcpu,
|
|
|
|
enum instruction_type type, u32 *inst);
|
|
|
|
|
2014-06-20 19:58:16 +08:00
|
|
|
extern int kvmppc_ld(struct kvm_vcpu *vcpu, ulong *eaddr, int size, void *ptr,
|
|
|
|
bool data);
|
|
|
|
extern int kvmppc_st(struct kvm_vcpu *vcpu, ulong *eaddr, int size, void *ptr,
|
|
|
|
bool data);
|
2008-04-17 12:28:09 +08:00
|
|
|
extern int kvmppc_emulate_instruction(struct kvm_run *run,
|
|
|
|
struct kvm_vcpu *vcpu);
|
2014-06-18 20:53:49 +08:00
|
|
|
extern int kvmppc_emulate_loadstore(struct kvm_vcpu *vcpu);
|
2008-05-22 07:22:51 +08:00
|
|
|
extern int kvmppc_emulate_mmio(struct kvm_run *run, struct kvm_vcpu *vcpu);
|
2008-11-05 23:36:16 +08:00
|
|
|
extern void kvmppc_emulate_dec(struct kvm_vcpu *vcpu);
|
2011-04-28 06:24:21 +08:00
|
|
|
extern u32 kvmppc_get_dec(struct kvm_vcpu *vcpu, u64 tb);
|
2014-09-01 22:19:56 +08:00
|
|
|
extern void kvmppc_decrementer_func(struct kvm_vcpu *vcpu);
|
2011-08-10 19:57:08 +08:00
|
|
|
extern int kvmppc_sanity_check(struct kvm_vcpu *vcpu);
|
2012-08-09 04:38:19 +08:00
|
|
|
extern int kvmppc_subarch_vcpu_init(struct kvm_vcpu *vcpu);
|
|
|
|
extern void kvmppc_subarch_vcpu_uninit(struct kvm_vcpu *vcpu);
|
2008-04-17 12:28:09 +08:00
|
|
|
|
2009-01-04 06:22:59 +08:00
|
|
|
/* Core-specific hooks */
|
|
|
|
|
2008-12-03 05:51:53 +08:00
|
|
|
extern void kvmppc_mmu_map(struct kvm_vcpu *vcpu, u64 gvaddr, gpa_t gpaddr,
|
2008-12-03 05:51:55 +08:00
|
|
|
unsigned int gtlb_idx);
|
2008-04-17 12:28:09 +08:00
|
|
|
extern void kvmppc_mmu_priv_switch(struct kvm_vcpu *vcpu, int usermode);
|
2008-07-26 02:54:53 +08:00
|
|
|
extern void kvmppc_mmu_switch_pid(struct kvm_vcpu *vcpu, u32 pid);
|
2009-01-04 06:22:59 +08:00
|
|
|
extern void kvmppc_mmu_destroy(struct kvm_vcpu *vcpu);
|
2010-04-16 06:11:45 +08:00
|
|
|
extern int kvmppc_mmu_init(struct kvm_vcpu *vcpu);
|
2009-01-04 06:23:03 +08:00
|
|
|
extern int kvmppc_mmu_dtlb_index(struct kvm_vcpu *vcpu, gva_t eaddr);
|
|
|
|
extern int kvmppc_mmu_itlb_index(struct kvm_vcpu *vcpu, gva_t eaddr);
|
2009-01-04 06:23:02 +08:00
|
|
|
extern gpa_t kvmppc_mmu_xlate(struct kvm_vcpu *vcpu, unsigned int gtlb_index,
|
|
|
|
gva_t eaddr);
|
2009-01-04 06:23:11 +08:00
|
|
|
extern void kvmppc_mmu_dtlb_miss(struct kvm_vcpu *vcpu);
|
|
|
|
extern void kvmppc_mmu_itlb_miss(struct kvm_vcpu *vcpu);
|
2014-06-20 19:52:36 +08:00
|
|
|
extern int kvmppc_xlate(struct kvm_vcpu *vcpu, ulong eaddr,
|
|
|
|
enum xlate_instdata xlid, enum xlate_readwrite xlrw,
|
|
|
|
struct kvmppc_pte *pte);
|
2008-11-05 23:36:14 +08:00
|
|
|
|
2008-11-05 23:36:18 +08:00
|
|
|
extern struct kvm_vcpu *kvmppc_core_vcpu_create(struct kvm *kvm,
|
|
|
|
unsigned int id);
|
|
|
|
extern void kvmppc_core_vcpu_free(struct kvm_vcpu *vcpu);
|
2008-11-05 23:36:17 +08:00
|
|
|
extern int kvmppc_core_vcpu_setup(struct kvm_vcpu *vcpu);
|
2008-11-05 23:36:14 +08:00
|
|
|
extern int kvmppc_core_check_processor_compat(void);
|
2008-11-05 23:36:17 +08:00
|
|
|
extern int kvmppc_core_vcpu_translate(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_translation *tr);
|
2008-11-05 23:36:14 +08:00
|
|
|
|
|
|
|
extern void kvmppc_core_vcpu_load(struct kvm_vcpu *vcpu, int cpu);
|
|
|
|
extern void kvmppc_core_vcpu_put(struct kvm_vcpu *vcpu);
|
|
|
|
|
2012-02-16 22:07:37 +08:00
|
|
|
extern int kvmppc_core_prepare_to_enter(struct kvm_vcpu *vcpu);
|
2008-11-05 23:36:14 +08:00
|
|
|
extern int kvmppc_core_pending_dec(struct kvm_vcpu *vcpu);
|
2010-01-08 09:58:07 +08:00
|
|
|
extern void kvmppc_core_queue_program(struct kvm_vcpu *vcpu, ulong flags);
|
2017-03-22 18:02:08 +08:00
|
|
|
extern void kvmppc_core_queue_fpunavail(struct kvm_vcpu *vcpu);
|
|
|
|
extern void kvmppc_core_queue_vec_unavail(struct kvm_vcpu *vcpu);
|
|
|
|
extern void kvmppc_core_queue_vsx_unavail(struct kvm_vcpu *vcpu);
|
2008-11-05 23:36:14 +08:00
|
|
|
extern void kvmppc_core_queue_dec(struct kvm_vcpu *vcpu);
|
2009-12-22 03:21:24 +08:00
|
|
|
extern void kvmppc_core_dequeue_dec(struct kvm_vcpu *vcpu);
|
2008-11-05 23:36:14 +08:00
|
|
|
extern void kvmppc_core_queue_external(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_interrupt *irq);
|
2013-02-14 22:00:25 +08:00
|
|
|
extern void kvmppc_core_dequeue_external(struct kvm_vcpu *vcpu);
|
2014-06-19 03:56:55 +08:00
|
|
|
extern void kvmppc_core_queue_dtlb_miss(struct kvm_vcpu *vcpu, ulong dear_flags,
|
|
|
|
ulong esr_flags);
|
|
|
|
extern void kvmppc_core_queue_data_storage(struct kvm_vcpu *vcpu,
|
|
|
|
ulong dear_flags,
|
|
|
|
ulong esr_flags);
|
|
|
|
extern void kvmppc_core_queue_itlb_miss(struct kvm_vcpu *vcpu);
|
|
|
|
extern void kvmppc_core_queue_inst_storage(struct kvm_vcpu *vcpu,
|
|
|
|
ulong esr_flags);
|
2012-07-31 06:19:50 +08:00
|
|
|
extern void kvmppc_core_flush_tlb(struct kvm_vcpu *vcpu);
|
2012-08-13 18:50:35 +08:00
|
|
|
extern int kvmppc_core_check_requests(struct kvm_vcpu *vcpu);
|
2008-11-05 23:36:16 +08:00
|
|
|
|
2008-11-05 23:36:18 +08:00
|
|
|
extern int kvmppc_booke_init(void);
|
|
|
|
extern void kvmppc_booke_exit(void);
|
|
|
|
|
2008-11-25 01:37:38 +08:00
|
|
|
extern void kvmppc_core_destroy_mmu(struct kvm_vcpu *vcpu);
|
2010-07-29 20:47:48 +08:00
|
|
|
extern int kvmppc_kvm_pv(struct kvm_vcpu *vcpu);
|
2011-06-15 07:34:41 +08:00
|
|
|
extern void kvmppc_map_magic(struct kvm_vcpu *vcpu);
|
2008-11-25 01:37:38 +08:00
|
|
|
|
KVM: PPC: Book3S HV: Split HPT allocation from activation
Currently, kvmppc_alloc_hpt() both allocates a new hashed page table (HPT)
and sets it up as the active page table for a VM. For the upcoming HPT
resize implementation we're going to want to allocate HPTs separately from
activating them.
So, split the allocation itself out into kvmppc_allocate_hpt() and perform
the activation with a new kvmppc_set_hpt() function. Likewise we split
kvmppc_free_hpt(), which just frees the HPT, from kvmppc_release_hpt()
which unsets it as an active HPT, then frees it.
We also move the logic to fall back to smaller HPT sizes if the first try
fails into the single caller which used that behaviour,
kvmppc_hv_setup_htab_rma(). This introduces a slight semantic change, in
that previously if the initial attempt at CMA allocation failed, we would
fall back to attempting smaller sizes with the page allocator. Now, we
try first CMA, then the page allocator at each size. As far as I can tell
this change should be harmless.
To match, we make kvmppc_free_hpt() just free the actual HPT itself. The
call to kvmppc_free_lpid() that was there, we move to the single caller.
Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
Signed-off-by: Paul Mackerras <paulus@ozlabs.org>
2016-12-20 13:49:02 +08:00
|
|
|
extern int kvmppc_allocate_hpt(struct kvm_hpt_info *info, u32 order);
|
|
|
|
extern void kvmppc_set_hpt(struct kvm *kvm, struct kvm_hpt_info *info);
|
2016-12-20 13:49:03 +08:00
|
|
|
extern long kvmppc_alloc_reset_hpt(struct kvm *kvm, int order);
|
KVM: PPC: Book3S HV: Split HPT allocation from activation
Currently, kvmppc_alloc_hpt() both allocates a new hashed page table (HPT)
and sets it up as the active page table for a VM. For the upcoming HPT
resize implementation we're going to want to allocate HPTs separately from
activating them.
So, split the allocation itself out into kvmppc_allocate_hpt() and perform
the activation with a new kvmppc_set_hpt() function. Likewise we split
kvmppc_free_hpt(), which just frees the HPT, from kvmppc_release_hpt()
which unsets it as an active HPT, then frees it.
We also move the logic to fall back to smaller HPT sizes if the first try
fails into the single caller which used that behaviour,
kvmppc_hv_setup_htab_rma(). This introduces a slight semantic change, in
that previously if the initial attempt at CMA allocation failed, we would
fall back to attempting smaller sizes with the page allocator. Now, we
try first CMA, then the page allocator at each size. As far as I can tell
this change should be harmless.
To match, we make kvmppc_free_hpt() just free the actual HPT itself. The
call to kvmppc_free_lpid() that was there, we move to the single caller.
Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
Signed-off-by: Paul Mackerras <paulus@ozlabs.org>
2016-12-20 13:49:02 +08:00
|
|
|
extern void kvmppc_free_hpt(struct kvm_hpt_info *info);
|
KVM: PPC: Add support for Book3S processors in hypervisor mode
This adds support for KVM running on 64-bit Book 3S processors,
specifically POWER7, in hypervisor mode. Using hypervisor mode means
that the guest can use the processor's supervisor mode. That means
that the guest can execute privileged instructions and access privileged
registers itself without trapping to the host. This gives excellent
performance, but does mean that KVM cannot emulate a processor
architecture other than the one that the hardware implements.
This code assumes that the guest is running paravirtualized using the
PAPR (Power Architecture Platform Requirements) interface, which is the
interface that IBM's PowerVM hypervisor uses. That means that existing
Linux distributions that run on IBM pSeries machines will also run
under KVM without modification. In order to communicate the PAPR
hypercalls to qemu, this adds a new KVM_EXIT_PAPR_HCALL exit code
to include/linux/kvm.h.
Currently the choice between book3s_hv support and book3s_pr support
(i.e. the existing code, which runs the guest in user mode) has to be
made at kernel configuration time, so a given kernel binary can only
do one or the other.
This new book3s_hv code doesn't support MMIO emulation at present.
Since we are running paravirtualized guests, this isn't a serious
restriction.
With the guest running in supervisor mode, most exceptions go straight
to the guest. We will never get data or instruction storage or segment
interrupts, alignment interrupts, decrementer interrupts, program
interrupts, single-step interrupts, etc., coming to the hypervisor from
the guest. Therefore this introduces a new KVMTEST_NONHV macro for the
exception entry path so that we don't have to do the KVM test on entry
to those exception handlers.
We do however get hypervisor decrementer, hypervisor data storage,
hypervisor instruction storage, and hypervisor emulation assist
interrupts, so we have to handle those.
In hypervisor mode, real-mode accesses can access all of RAM, not just
a limited amount. Therefore we put all the guest state in the vcpu.arch
and use the shadow_vcpu in the PACA only for temporary scratch space.
We allocate the vcpu with kzalloc rather than vzalloc, and we don't use
anything in the kvmppc_vcpu_book3s struct, so we don't allocate it.
We don't have a shared page with the guest, but we still need a
kvm_vcpu_arch_shared struct to store the values of various registers,
so we include one in the vcpu_arch struct.
The POWER7 processor has a restriction that all threads in a core have
to be in the same partition. MMU-on kernel code counts as a partition
(partition 0), so we have to do a partition switch on every entry to and
exit from the guest. At present we require the host and guest to run
in single-thread mode because of this hardware restriction.
This code allocates a hashed page table for the guest and initializes
it with HPTEs for the guest's Virtual Real Memory Area (VRMA). We
require that the guest memory is allocated using 16MB huge pages, in
order to simplify the low-level memory management. This also means that
we can get away without tracking paging activity in the host for now,
since huge pages can't be paged or swapped.
This also adds a few new exports needed by the book3s_hv code.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2011-06-29 08:21:34 +08:00
|
|
|
extern long kvmppc_prepare_vrma(struct kvm *kvm,
|
|
|
|
struct kvm_userspace_memory_region *mem);
|
KVM: PPC: Only get pages when actually needed, not in prepare_memory_region()
This removes the code from kvmppc_core_prepare_memory_region() that
looked up the VMA for the region being added and called hva_to_page
to get the pfns for the memory. We have no guarantee that there will
be anything mapped there at the time of the KVM_SET_USER_MEMORY_REGION
ioctl call; userspace can do that ioctl and then map memory into the
region later.
Instead we defer looking up the pfn for each memory page until it is
needed, which generally means when the guest does an H_ENTER hcall on
the page. Since we can't call get_user_pages in real mode, if we don't
already have the pfn for the page, kvmppc_h_enter() will return
H_TOO_HARD and we then call kvmppc_virtmode_h_enter() once we get back
to kernel context. That calls kvmppc_get_guest_page() to get the pfn
for the page, and then calls back to kvmppc_h_enter() to redo the HPTE
insertion.
When the first vcpu starts executing, we need to have the RMO or VRMA
region mapped so that the guest's real mode accesses will work. Thus
we now have a check in kvmppc_vcpu_run() to see if the RMO/VRMA is set
up and if not, call kvmppc_hv_setup_rma(). It checks if the memslot
starting at guest physical 0 now has RMO memory mapped there; if so it
sets it up for the guest, otherwise on POWER7 it sets up the VRMA.
The function that does that, kvmppc_map_vrma, is now a bit simpler,
as it calls kvmppc_virtmode_h_enter instead of creating the HPTE itself.
Since we are now potentially updating entries in the slot_phys[]
arrays from multiple vcpu threads, we now have a spinlock protecting
those updates to ensure that we don't lose track of any references
to pages.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-12-12 20:31:00 +08:00
|
|
|
extern void kvmppc_map_vrma(struct kvm_vcpu *vcpu,
|
2011-12-12 20:31:41 +08:00
|
|
|
struct kvm_memory_slot *memslot, unsigned long porder);
|
2011-06-29 08:22:05 +08:00
|
|
|
extern int kvmppc_pseries_do_hcall(struct kvm_vcpu *vcpu);
|
2017-03-22 12:21:56 +08:00
|
|
|
extern long kvm_spapr_tce_attach_iommu_group(struct kvm *kvm, int tablefd,
|
|
|
|
struct iommu_group *grp);
|
|
|
|
extern void kvm_spapr_tce_release_iommu_group(struct kvm *kvm,
|
|
|
|
struct iommu_group *grp);
|
2013-04-18 04:30:26 +08:00
|
|
|
|
2011-06-29 08:22:41 +08:00
|
|
|
extern long kvm_vm_ioctl_create_spapr_tce(struct kvm *kvm,
|
2016-03-01 14:54:40 +08:00
|
|
|
struct kvm_create_spapr_tce_64 *args);
|
2016-02-15 09:55:09 +08:00
|
|
|
extern struct kvmppc_spapr_tce_table *kvmppc_find_table(
|
2017-03-22 12:21:53 +08:00
|
|
|
struct kvm *kvm, unsigned long liobn);
|
2017-03-22 12:21:55 +08:00
|
|
|
#define kvmppc_ioba_validate(stt, ioba, npages) \
|
|
|
|
(iommu_tce_check_ioba((stt)->page_shift, (stt)->offset, \
|
|
|
|
(stt)->size, (ioba), (npages)) ? \
|
|
|
|
H_PARAMETER : H_SUCCESS)
|
2016-02-15 09:55:08 +08:00
|
|
|
extern long kvmppc_tce_validate(struct kvmppc_spapr_tce_table *tt,
|
|
|
|
unsigned long tce);
|
2016-02-15 09:55:09 +08:00
|
|
|
extern long kvmppc_gpa_to_ua(struct kvm *kvm, unsigned long gpa,
|
|
|
|
unsigned long *ua, unsigned long **prmap);
|
|
|
|
extern void kvmppc_tce_put(struct kvmppc_spapr_tce_table *tt,
|
|
|
|
unsigned long idx, unsigned long tce);
|
2012-03-16 05:58:34 +08:00
|
|
|
extern long kvmppc_h_put_tce(struct kvm_vcpu *vcpu, unsigned long liobn,
|
|
|
|
unsigned long ioba, unsigned long tce);
|
2016-02-15 09:55:09 +08:00
|
|
|
extern long kvmppc_h_put_tce_indirect(struct kvm_vcpu *vcpu,
|
|
|
|
unsigned long liobn, unsigned long ioba,
|
|
|
|
unsigned long tce_list, unsigned long npages);
|
|
|
|
extern long kvmppc_h_stuff_tce(struct kvm_vcpu *vcpu,
|
|
|
|
unsigned long liobn, unsigned long ioba,
|
|
|
|
unsigned long tce_value, unsigned long npages);
|
2014-02-21 23:31:10 +08:00
|
|
|
extern long kvmppc_h_get_tce(struct kvm_vcpu *vcpu, unsigned long liobn,
|
|
|
|
unsigned long ioba);
|
2016-12-20 13:48:59 +08:00
|
|
|
extern struct page *kvm_alloc_hpt_cma(unsigned long nr_pages);
|
|
|
|
extern void kvm_free_hpt_cma(struct page *page, unsigned long nr_pages);
|
2011-06-29 08:19:22 +08:00
|
|
|
extern int kvmppc_core_init_vm(struct kvm *kvm);
|
|
|
|
extern void kvmppc_core_destroy_vm(struct kvm *kvm);
|
2013-10-08 00:48:00 +08:00
|
|
|
extern void kvmppc_core_free_memslot(struct kvm *kvm,
|
|
|
|
struct kvm_memory_slot *free,
|
2012-09-11 21:27:46 +08:00
|
|
|
struct kvm_memory_slot *dont);
|
2013-10-08 00:48:00 +08:00
|
|
|
extern int kvmppc_core_create_memslot(struct kvm *kvm,
|
|
|
|
struct kvm_memory_slot *slot,
|
2012-09-11 21:27:46 +08:00
|
|
|
unsigned long npages);
|
2011-06-29 08:19:22 +08:00
|
|
|
extern int kvmppc_core_prepare_memory_region(struct kvm *kvm,
|
2012-09-11 21:27:46 +08:00
|
|
|
struct kvm_memory_slot *memslot,
|
2015-05-18 19:59:39 +08:00
|
|
|
const struct kvm_userspace_memory_region *mem);
|
2011-06-29 08:19:22 +08:00
|
|
|
extern void kvmppc_core_commit_memory_region(struct kvm *kvm,
|
2015-05-18 19:59:39 +08:00
|
|
|
const struct kvm_userspace_memory_region *mem,
|
2015-05-18 19:20:23 +08:00
|
|
|
const struct kvm_memory_slot *old,
|
|
|
|
const struct kvm_memory_slot *new);
|
2012-04-27 03:43:42 +08:00
|
|
|
extern int kvm_vm_ioctl_get_smmu_info(struct kvm *kvm,
|
|
|
|
struct kvm_ppc_smmu_info *info);
|
2012-09-11 21:28:18 +08:00
|
|
|
extern void kvmppc_core_flush_memslot(struct kvm *kvm,
|
|
|
|
struct kvm_memory_slot *memslot);
|
2011-06-29 08:19:22 +08:00
|
|
|
|
2011-12-20 23:34:43 +08:00
|
|
|
extern int kvmppc_bookehv_init(void);
|
|
|
|
extern void kvmppc_bookehv_exit(void);
|
|
|
|
|
2012-08-10 18:28:50 +08:00
|
|
|
extern int kvmppc_prepare_to_enter(struct kvm_vcpu *vcpu);
|
|
|
|
|
KVM: PPC: Book3S HV: Provide a method for userspace to read and write the HPT
A new ioctl, KVM_PPC_GET_HTAB_FD, returns a file descriptor. Reads on
this fd return the contents of the HPT (hashed page table), writes
create and/or remove entries in the HPT. There is a new capability,
KVM_CAP_PPC_HTAB_FD, to indicate the presence of the ioctl. The ioctl
takes an argument structure with the index of the first HPT entry to
read out and a set of flags. The flags indicate whether the user is
intending to read or write the HPT, and whether to return all entries
or only the "bolted" entries (those with the bolted bit, 0x10, set in
the first doubleword).
This is intended for use in implementing qemu's savevm/loadvm and for
live migration. Therefore, on reads, the first pass returns information
about all HPTEs (or all bolted HPTEs). When the first pass reaches the
end of the HPT, it returns from the read. Subsequent reads only return
information about HPTEs that have changed since they were last read.
A read that finds no changed HPTEs in the HPT following where the last
read finished will return 0 bytes.
The format of the data provides a simple run-length compression of the
invalid entries. Each block of data starts with a header that indicates
the index (position in the HPT, which is just an array), the number of
valid entries starting at that index (may be zero), and the number of
invalid entries following those valid entries. The valid entries, 16
bytes each, follow the header. The invalid entries are not explicitly
represented.
Signed-off-by: Paul Mackerras <paulus@samba.org>
[agraf: fix documentation]
Signed-off-by: Alexander Graf <agraf@suse.de>
2012-11-20 06:57:20 +08:00
|
|
|
extern int kvm_vm_ioctl_get_htab_fd(struct kvm *kvm, struct kvm_get_htab_fd *);
|
2016-12-20 13:49:05 +08:00
|
|
|
extern long kvm_vm_ioctl_resize_hpt_prepare(struct kvm *kvm,
|
|
|
|
struct kvm_ppc_resize_hpt *rhpt);
|
|
|
|
extern long kvm_vm_ioctl_resize_hpt_commit(struct kvm *kvm,
|
|
|
|
struct kvm_ppc_resize_hpt *rhpt);
|
KVM: PPC: Book3S HV: Provide a method for userspace to read and write the HPT
A new ioctl, KVM_PPC_GET_HTAB_FD, returns a file descriptor. Reads on
this fd return the contents of the HPT (hashed page table), writes
create and/or remove entries in the HPT. There is a new capability,
KVM_CAP_PPC_HTAB_FD, to indicate the presence of the ioctl. The ioctl
takes an argument structure with the index of the first HPT entry to
read out and a set of flags. The flags indicate whether the user is
intending to read or write the HPT, and whether to return all entries
or only the "bolted" entries (those with the bolted bit, 0x10, set in
the first doubleword).
This is intended for use in implementing qemu's savevm/loadvm and for
live migration. Therefore, on reads, the first pass returns information
about all HPTEs (or all bolted HPTEs). When the first pass reaches the
end of the HPT, it returns from the read. Subsequent reads only return
information about HPTEs that have changed since they were last read.
A read that finds no changed HPTEs in the HPT following where the last
read finished will return 0 bytes.
The format of the data provides a simple run-length compression of the
invalid entries. Each block of data starts with a header that indicates
the index (position in the HPT, which is just an array), the number of
valid entries starting at that index (may be zero), and the number of
invalid entries following those valid entries. The valid entries, 16
bytes each, follow the header. The invalid entries are not explicitly
represented.
Signed-off-by: Paul Mackerras <paulus@samba.org>
[agraf: fix documentation]
Signed-off-by: Alexander Graf <agraf@suse.de>
2012-11-20 06:57:20 +08:00
|
|
|
|
2013-04-12 22:08:46 +08:00
|
|
|
int kvm_vcpu_ioctl_interrupt(struct kvm_vcpu *vcpu, struct kvm_interrupt *irq);
|
|
|
|
|
2013-04-18 04:30:00 +08:00
|
|
|
extern int kvm_vm_ioctl_rtas_define_token(struct kvm *kvm, void __user *argp);
|
|
|
|
extern int kvmppc_rtas_hcall(struct kvm_vcpu *vcpu);
|
|
|
|
extern void kvmppc_rtas_tokens_free(struct kvm *kvm);
|
2017-04-05 15:54:56 +08:00
|
|
|
|
2013-04-18 04:30:26 +08:00
|
|
|
extern int kvmppc_xics_set_xive(struct kvm *kvm, u32 irq, u32 server,
|
|
|
|
u32 priority);
|
|
|
|
extern int kvmppc_xics_get_xive(struct kvm *kvm, u32 irq, u32 *server,
|
|
|
|
u32 *priority);
|
2013-04-18 04:32:04 +08:00
|
|
|
extern int kvmppc_xics_int_on(struct kvm *kvm, u32 irq);
|
|
|
|
extern int kvmppc_xics_int_off(struct kvm *kvm, u32 irq);
|
2013-04-18 04:30:00 +08:00
|
|
|
|
2014-08-13 17:09:44 +08:00
|
|
|
void kvmppc_core_dequeue_debug(struct kvm_vcpu *vcpu);
|
|
|
|
void kvmppc_core_queue_debug(struct kvm_vcpu *vcpu);
|
|
|
|
|
2013-10-08 00:47:53 +08:00
|
|
|
union kvmppc_one_reg {
|
|
|
|
u32 wval;
|
|
|
|
u64 dval;
|
|
|
|
vector128 vval;
|
|
|
|
u64 vsxval[2];
|
KVM: PPC: Book3S: Add MMIO emulation for FP and VSX instructions
This patch provides the MMIO load/store emulation for instructions
of 'double & vector unsigned char & vector signed char & vector
unsigned short & vector signed short & vector unsigned int & vector
signed int & vector double '.
The instructions that this adds emulation for are:
- ldx, ldux, lwax,
- lfs, lfsx, lfsu, lfsux, lfd, lfdx, lfdu, lfdux,
- stfs, stfsx, stfsu, stfsux, stfd, stfdx, stfdu, stfdux, stfiwx,
- lxsdx, lxsspx, lxsiwax, lxsiwzx, lxvd2x, lxvw4x, lxvdsx,
- stxsdx, stxsspx, stxsiwx, stxvd2x, stxvw4x
[paulus@ozlabs.org - some cleanups, fixes and rework, make it
compile for Book E, fix build when PR KVM is built in]
Signed-off-by: Bin Lu <lblulb@linux.vnet.ibm.com>
Signed-off-by: Paul Mackerras <paulus@ozlabs.org>
2017-02-21 21:12:36 +08:00
|
|
|
u32 vsx32val[4];
|
2013-10-08 00:47:53 +08:00
|
|
|
struct {
|
|
|
|
u64 addr;
|
|
|
|
u64 length;
|
|
|
|
} vpaval;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct kvmppc_ops {
|
2013-10-08 00:48:01 +08:00
|
|
|
struct module *owner;
|
2013-10-08 00:47:53 +08:00
|
|
|
int (*get_sregs)(struct kvm_vcpu *vcpu, struct kvm_sregs *sregs);
|
|
|
|
int (*set_sregs)(struct kvm_vcpu *vcpu, struct kvm_sregs *sregs);
|
|
|
|
int (*get_one_reg)(struct kvm_vcpu *vcpu, u64 id,
|
|
|
|
union kvmppc_one_reg *val);
|
|
|
|
int (*set_one_reg)(struct kvm_vcpu *vcpu, u64 id,
|
|
|
|
union kvmppc_one_reg *val);
|
|
|
|
void (*vcpu_load)(struct kvm_vcpu *vcpu, int cpu);
|
|
|
|
void (*vcpu_put)(struct kvm_vcpu *vcpu);
|
|
|
|
void (*set_msr)(struct kvm_vcpu *vcpu, u64 msr);
|
|
|
|
int (*vcpu_run)(struct kvm_run *run, struct kvm_vcpu *vcpu);
|
|
|
|
struct kvm_vcpu *(*vcpu_create)(struct kvm *kvm, unsigned int id);
|
|
|
|
void (*vcpu_free)(struct kvm_vcpu *vcpu);
|
|
|
|
int (*check_requests)(struct kvm_vcpu *vcpu);
|
|
|
|
int (*get_dirty_log)(struct kvm *kvm, struct kvm_dirty_log *log);
|
|
|
|
void (*flush_memslot)(struct kvm *kvm, struct kvm_memory_slot *memslot);
|
|
|
|
int (*prepare_memory_region)(struct kvm *kvm,
|
|
|
|
struct kvm_memory_slot *memslot,
|
2015-05-18 19:59:39 +08:00
|
|
|
const struct kvm_userspace_memory_region *mem);
|
2013-10-08 00:47:53 +08:00
|
|
|
void (*commit_memory_region)(struct kvm *kvm,
|
2015-05-18 19:59:39 +08:00
|
|
|
const struct kvm_userspace_memory_region *mem,
|
2015-05-18 19:20:23 +08:00
|
|
|
const struct kvm_memory_slot *old,
|
|
|
|
const struct kvm_memory_slot *new);
|
2013-10-08 00:47:53 +08:00
|
|
|
int (*unmap_hva)(struct kvm *kvm, unsigned long hva);
|
|
|
|
int (*unmap_hva_range)(struct kvm *kvm, unsigned long start,
|
|
|
|
unsigned long end);
|
2014-09-23 05:54:42 +08:00
|
|
|
int (*age_hva)(struct kvm *kvm, unsigned long start, unsigned long end);
|
2013-10-08 00:47:53 +08:00
|
|
|
int (*test_age_hva)(struct kvm *kvm, unsigned long hva);
|
|
|
|
void (*set_spte_hva)(struct kvm *kvm, unsigned long hva, pte_t pte);
|
|
|
|
void (*mmu_destroy)(struct kvm_vcpu *vcpu);
|
|
|
|
void (*free_memslot)(struct kvm_memory_slot *free,
|
|
|
|
struct kvm_memory_slot *dont);
|
|
|
|
int (*create_memslot)(struct kvm_memory_slot *slot,
|
|
|
|
unsigned long npages);
|
|
|
|
int (*init_vm)(struct kvm *kvm);
|
|
|
|
void (*destroy_vm)(struct kvm *kvm);
|
|
|
|
int (*get_smmu_info)(struct kvm *kvm, struct kvm_ppc_smmu_info *info);
|
|
|
|
int (*emulate_op)(struct kvm_run *run, struct kvm_vcpu *vcpu,
|
|
|
|
unsigned int inst, int *advance);
|
|
|
|
int (*emulate_mtspr)(struct kvm_vcpu *vcpu, int sprn, ulong spr_val);
|
|
|
|
int (*emulate_mfspr)(struct kvm_vcpu *vcpu, int sprn, ulong *spr_val);
|
|
|
|
void (*fast_vcpu_kick)(struct kvm_vcpu *vcpu);
|
|
|
|
long (*arch_vm_ioctl)(struct file *filp, unsigned int ioctl,
|
|
|
|
unsigned long arg);
|
2014-06-02 09:03:00 +08:00
|
|
|
int (*hcall_implemented)(unsigned long hcall);
|
2016-08-19 13:35:47 +08:00
|
|
|
int (*irq_bypass_add_producer)(struct irq_bypass_consumer *,
|
|
|
|
struct irq_bypass_producer *);
|
|
|
|
void (*irq_bypass_del_producer)(struct irq_bypass_consumer *,
|
|
|
|
struct irq_bypass_producer *);
|
2017-01-30 18:21:41 +08:00
|
|
|
int (*configure_mmu)(struct kvm *kvm, struct kvm_ppc_mmuv3_cfg *cfg);
|
|
|
|
int (*get_rmmu_info)(struct kvm *kvm, struct kvm_ppc_rmmu_info *info);
|
2013-10-08 00:47:53 +08:00
|
|
|
};
|
|
|
|
|
2013-10-08 00:48:01 +08:00
|
|
|
extern struct kvmppc_ops *kvmppc_hv_ops;
|
|
|
|
extern struct kvmppc_ops *kvmppc_pr_ops;
|
2013-10-08 00:47:53 +08:00
|
|
|
|
2014-07-24 00:06:21 +08:00
|
|
|
static inline int kvmppc_get_last_inst(struct kvm_vcpu *vcpu,
|
|
|
|
enum instruction_type type, u32 *inst)
|
|
|
|
{
|
|
|
|
int ret = EMULATE_DONE;
|
|
|
|
u32 fetched_inst;
|
|
|
|
|
|
|
|
/* Load the instruction manually if it failed to do so in the
|
|
|
|
* exit path */
|
|
|
|
if (vcpu->arch.last_inst == KVM_INST_FETCH_FAILED)
|
|
|
|
ret = kvmppc_load_last_inst(vcpu, type, &vcpu->arch.last_inst);
|
|
|
|
|
|
|
|
/* Write fetch_failed unswapped if the fetch failed */
|
|
|
|
if (ret == EMULATE_DONE)
|
|
|
|
fetched_inst = kvmppc_need_byteswap(vcpu) ?
|
|
|
|
swab32(vcpu->arch.last_inst) :
|
|
|
|
vcpu->arch.last_inst;
|
|
|
|
else
|
|
|
|
fetched_inst = vcpu->arch.last_inst;
|
|
|
|
|
|
|
|
*inst = fetched_inst;
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2013-10-08 00:48:02 +08:00
|
|
|
static inline bool is_kvmppc_hv_enabled(struct kvm *kvm)
|
|
|
|
{
|
|
|
|
return kvm->arch.kvm_ops == kvmppc_hv_ops;
|
|
|
|
}
|
|
|
|
|
2015-03-20 17:39:41 +08:00
|
|
|
extern int kvmppc_hwrng_present(void);
|
|
|
|
|
2010-02-19 18:00:42 +08:00
|
|
|
/*
|
|
|
|
* Cuts out inst bits with ordering according to spec.
|
|
|
|
* That means the leftmost bit is zero. All given bits are included.
|
|
|
|
*/
|
|
|
|
static inline u32 kvmppc_get_field(u64 inst, int msb, int lsb)
|
|
|
|
{
|
|
|
|
u32 r;
|
|
|
|
u32 mask;
|
|
|
|
|
|
|
|
BUG_ON(msb > lsb);
|
|
|
|
|
|
|
|
mask = (1 << (lsb - msb + 1)) - 1;
|
|
|
|
r = (inst >> (63 - lsb)) & mask;
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Replaces inst bits with ordering according to spec.
|
|
|
|
*/
|
|
|
|
static inline u32 kvmppc_set_field(u64 inst, int msb, int lsb, int value)
|
|
|
|
{
|
|
|
|
u32 r;
|
|
|
|
u32 mask;
|
|
|
|
|
|
|
|
BUG_ON(msb > lsb);
|
|
|
|
|
|
|
|
mask = ((1 << (lsb - msb + 1)) - 1) << (63 - lsb);
|
|
|
|
r = (inst & ~mask) | ((value << (63 - lsb)) & mask);
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2012-09-26 04:31:56 +08:00
|
|
|
#define one_reg_size(id) \
|
|
|
|
(1ul << (((id) & KVM_REG_SIZE_MASK) >> KVM_REG_SIZE_SHIFT))
|
|
|
|
|
|
|
|
#define get_reg_val(id, reg) ({ \
|
|
|
|
union kvmppc_one_reg __u; \
|
|
|
|
switch (one_reg_size(id)) { \
|
|
|
|
case 4: __u.wval = (reg); break; \
|
|
|
|
case 8: __u.dval = (reg); break; \
|
|
|
|
default: BUG(); \
|
|
|
|
} \
|
|
|
|
__u; \
|
|
|
|
})
|
|
|
|
|
|
|
|
|
|
|
|
#define set_reg_val(id, val) ({ \
|
|
|
|
u64 __v; \
|
|
|
|
switch (one_reg_size(id)) { \
|
|
|
|
case 4: __v = (val).wval; break; \
|
|
|
|
case 8: __v = (val).dval; break; \
|
|
|
|
default: BUG(); \
|
|
|
|
} \
|
|
|
|
__v; \
|
|
|
|
})
|
|
|
|
|
2013-10-08 00:47:53 +08:00
|
|
|
int kvmppc_core_get_sregs(struct kvm_vcpu *vcpu, struct kvm_sregs *sregs);
|
2011-04-28 06:24:21 +08:00
|
|
|
int kvmppc_core_set_sregs(struct kvm_vcpu *vcpu, struct kvm_sregs *sregs);
|
|
|
|
|
2013-10-08 00:47:53 +08:00
|
|
|
int kvmppc_get_sregs_ivor(struct kvm_vcpu *vcpu, struct kvm_sregs *sregs);
|
2011-04-28 06:24:21 +08:00
|
|
|
int kvmppc_set_sregs_ivor(struct kvm_vcpu *vcpu, struct kvm_sregs *sregs);
|
|
|
|
|
2011-12-12 20:26:50 +08:00
|
|
|
int kvm_vcpu_ioctl_get_one_reg(struct kvm_vcpu *vcpu, struct kvm_one_reg *reg);
|
|
|
|
int kvm_vcpu_ioctl_set_one_reg(struct kvm_vcpu *vcpu, struct kvm_one_reg *reg);
|
2012-09-26 04:31:56 +08:00
|
|
|
int kvmppc_get_one_reg(struct kvm_vcpu *vcpu, u64 id, union kvmppc_one_reg *);
|
|
|
|
int kvmppc_set_one_reg(struct kvm_vcpu *vcpu, u64 id, union kvmppc_one_reg *);
|
2011-12-12 20:26:50 +08:00
|
|
|
|
2011-04-28 06:24:21 +08:00
|
|
|
void kvmppc_set_pid(struct kvm_vcpu *vcpu, u32 pid);
|
|
|
|
|
2013-04-12 22:08:46 +08:00
|
|
|
struct openpic;
|
|
|
|
|
2013-10-08 00:47:52 +08:00
|
|
|
#ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE
|
2013-07-02 13:45:16 +08:00
|
|
|
extern void kvm_cma_reserve(void) __init;
|
KVM: PPC: Allow book3s_hv guests to use SMT processor modes
This lifts the restriction that book3s_hv guests can only run one
hardware thread per core, and allows them to use up to 4 threads
per core on POWER7. The host still has to run single-threaded.
This capability is advertised to qemu through a new KVM_CAP_PPC_SMT
capability. The return value of the ioctl querying this capability
is the number of vcpus per virtual CPU core (vcore), currently 4.
To use this, the host kernel should be booted with all threads
active, and then all the secondary threads should be offlined.
This will put the secondary threads into nap mode. KVM will then
wake them from nap mode and use them for running guest code (while
they are still offline). To wake the secondary threads, we send
them an IPI using a new xics_wake_cpu() function, implemented in
arch/powerpc/sysdev/xics/icp-native.c. In other words, at this stage
we assume that the platform has a XICS interrupt controller and
we are using icp-native.c to drive it. Since the woken thread will
need to acknowledge and clear the IPI, we also export the base
physical address of the XICS registers using kvmppc_set_xics_phys()
for use in the low-level KVM book3s code.
When a vcpu is created, it is assigned to a virtual CPU core.
The vcore number is obtained by dividing the vcpu number by the
number of threads per core in the host. This number is exported
to userspace via the KVM_CAP_PPC_SMT capability. If qemu wishes
to run the guest in single-threaded mode, it should make all vcpu
numbers be multiples of the number of threads per core.
We distinguish three states of a vcpu: runnable (i.e., ready to execute
the guest), blocked (that is, idle), and busy in host. We currently
implement a policy that the vcore can run only when all its threads
are runnable or blocked. This way, if a vcpu needs to execute elsewhere
in the kernel or in qemu, it can do so without being starved of CPU
by the other vcpus.
When a vcore starts to run, it executes in the context of one of the
vcpu threads. The other vcpu threads all go to sleep and stay asleep
until something happens requiring the vcpu thread to return to qemu,
or to wake up to run the vcore (this can happen when another vcpu
thread goes from busy in host state to blocked).
It can happen that a vcpu goes from blocked to runnable state (e.g.
because of an interrupt), and the vcore it belongs to is already
running. In that case it can start to run immediately as long as
the none of the vcpus in the vcore have started to exit the guest.
We send the next free thread in the vcore an IPI to get it to start
to execute the guest. It synchronizes with the other threads via
the vcore->entry_exit_count field to make sure that it doesn't go
into the guest if the other vcpus are exiting by the time that it
is ready to actually enter the guest.
Note that there is no fixed relationship between the hardware thread
number and the vcpu number. Hardware threads are assigned to vcpus
as they become runnable, so we will always use the lower-numbered
hardware threads in preference to higher-numbered threads if not all
the vcpus in the vcore are runnable, regardless of which vcpus are
runnable.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2011-06-29 08:23:08 +08:00
|
|
|
static inline void kvmppc_set_xics_phys(int cpu, unsigned long addr)
|
|
|
|
{
|
2017-04-05 15:54:54 +08:00
|
|
|
paca[cpu].kvm_hstate.xics_phys = (void __iomem *)addr;
|
KVM: PPC: Allow book3s_hv guests to use SMT processor modes
This lifts the restriction that book3s_hv guests can only run one
hardware thread per core, and allows them to use up to 4 threads
per core on POWER7. The host still has to run single-threaded.
This capability is advertised to qemu through a new KVM_CAP_PPC_SMT
capability. The return value of the ioctl querying this capability
is the number of vcpus per virtual CPU core (vcore), currently 4.
To use this, the host kernel should be booted with all threads
active, and then all the secondary threads should be offlined.
This will put the secondary threads into nap mode. KVM will then
wake them from nap mode and use them for running guest code (while
they are still offline). To wake the secondary threads, we send
them an IPI using a new xics_wake_cpu() function, implemented in
arch/powerpc/sysdev/xics/icp-native.c. In other words, at this stage
we assume that the platform has a XICS interrupt controller and
we are using icp-native.c to drive it. Since the woken thread will
need to acknowledge and clear the IPI, we also export the base
physical address of the XICS registers using kvmppc_set_xics_phys()
for use in the low-level KVM book3s code.
When a vcpu is created, it is assigned to a virtual CPU core.
The vcore number is obtained by dividing the vcpu number by the
number of threads per core in the host. This number is exported
to userspace via the KVM_CAP_PPC_SMT capability. If qemu wishes
to run the guest in single-threaded mode, it should make all vcpu
numbers be multiples of the number of threads per core.
We distinguish three states of a vcpu: runnable (i.e., ready to execute
the guest), blocked (that is, idle), and busy in host. We currently
implement a policy that the vcore can run only when all its threads
are runnable or blocked. This way, if a vcpu needs to execute elsewhere
in the kernel or in qemu, it can do so without being starved of CPU
by the other vcpus.
When a vcore starts to run, it executes in the context of one of the
vcpu threads. The other vcpu threads all go to sleep and stay asleep
until something happens requiring the vcpu thread to return to qemu,
or to wake up to run the vcore (this can happen when another vcpu
thread goes from busy in host state to blocked).
It can happen that a vcpu goes from blocked to runnable state (e.g.
because of an interrupt), and the vcore it belongs to is already
running. In that case it can start to run immediately as long as
the none of the vcpus in the vcore have started to exit the guest.
We send the next free thread in the vcore an IPI to get it to start
to execute the guest. It synchronizes with the other threads via
the vcore->entry_exit_count field to make sure that it doesn't go
into the guest if the other vcpus are exiting by the time that it
is ready to actually enter the guest.
Note that there is no fixed relationship between the hardware thread
number and the vcpu number. Hardware threads are assigned to vcpus
as they become runnable, so we will always use the lower-numbered
hardware threads in preference to higher-numbered threads if not all
the vcpus in the vcore are runnable, regardless of which vcpus are
runnable.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2011-06-29 08:23:08 +08:00
|
|
|
}
|
KVM: PPC: Allocate RMAs (Real Mode Areas) at boot for use by guests
This adds infrastructure which will be needed to allow book3s_hv KVM to
run on older POWER processors, including PPC970, which don't support
the Virtual Real Mode Area (VRMA) facility, but only the Real Mode
Offset (RMO) facility. These processors require a physically
contiguous, aligned area of memory for each guest. When the guest does
an access in real mode (MMU off), the address is compared against a
limit value, and if it is lower, the address is ORed with an offset
value (from the Real Mode Offset Register (RMOR)) and the result becomes
the real address for the access. The size of the RMA has to be one of
a set of supported values, which usually includes 64MB, 128MB, 256MB
and some larger powers of 2.
Since we are unlikely to be able to allocate 64MB or more of physically
contiguous memory after the kernel has been running for a while, we
allocate a pool of RMAs at boot time using the bootmem allocator. The
size and number of the RMAs can be set using the kvm_rma_size=xx and
kvm_rma_count=xx kernel command line options.
KVM exports a new capability, KVM_CAP_PPC_RMA, to signal the availability
of the pool of preallocated RMAs. The capability value is 1 if the
processor can use an RMA but doesn't require one (because it supports
the VRMA facility), or 2 if the processor requires an RMA for each guest.
This adds a new ioctl, KVM_ALLOCATE_RMA, which allocates an RMA from the
pool and returns a file descriptor which can be used to map the RMA. It
also returns the size of the RMA in the argument structure.
Having an RMA means we will get multiple KMV_SET_USER_MEMORY_REGION
ioctl calls from userspace. To cope with this, we now preallocate the
kvm->arch.ram_pginfo array when the VM is created with a size sufficient
for up to 64GB of guest memory. Subsequently we will get rid of this
array and use memory associated with each memslot instead.
This moves most of the code that translates the user addresses into
host pfns (page frame numbers) out of kvmppc_prepare_vrma up one level
to kvmppc_core_prepare_memory_region. Also, instead of having to look
up the VMA for each page in order to check the page size, we now check
that the pages we get are compound pages of 16MB. However, if we are
adding memory that is mapped to an RMA, we don't bother with calling
get_user_pages_fast and instead just offset from the base pfn for the
RMA.
Typically the RMA gets added after vcpus are created, which makes it
inconvenient to have the LPCR (logical partition control register) value
in the vcpu->arch struct, since the LPCR controls whether the processor
uses RMA or VRMA for the guest. This moves the LPCR value into the
kvm->arch struct and arranges for the MER (mediated external request)
bit, which is the only bit that varies between vcpus, to be set in
assembly code when going into the guest if there is a pending external
interrupt request.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2011-06-29 08:25:44 +08:00
|
|
|
|
2017-04-05 15:54:56 +08:00
|
|
|
static inline void kvmppc_set_xive_tima(int cpu,
|
|
|
|
unsigned long phys_addr,
|
|
|
|
void __iomem *virt_addr)
|
|
|
|
{
|
|
|
|
paca[cpu].kvm_hstate.xive_tima_phys = (void __iomem *)phys_addr;
|
|
|
|
paca[cpu].kvm_hstate.xive_tima_virt = virt_addr;
|
KVM: PPC: Allow book3s_hv guests to use SMT processor modes
This lifts the restriction that book3s_hv guests can only run one
hardware thread per core, and allows them to use up to 4 threads
per core on POWER7. The host still has to run single-threaded.
This capability is advertised to qemu through a new KVM_CAP_PPC_SMT
capability. The return value of the ioctl querying this capability
is the number of vcpus per virtual CPU core (vcore), currently 4.
To use this, the host kernel should be booted with all threads
active, and then all the secondary threads should be offlined.
This will put the secondary threads into nap mode. KVM will then
wake them from nap mode and use them for running guest code (while
they are still offline). To wake the secondary threads, we send
them an IPI using a new xics_wake_cpu() function, implemented in
arch/powerpc/sysdev/xics/icp-native.c. In other words, at this stage
we assume that the platform has a XICS interrupt controller and
we are using icp-native.c to drive it. Since the woken thread will
need to acknowledge and clear the IPI, we also export the base
physical address of the XICS registers using kvmppc_set_xics_phys()
for use in the low-level KVM book3s code.
When a vcpu is created, it is assigned to a virtual CPU core.
The vcore number is obtained by dividing the vcpu number by the
number of threads per core in the host. This number is exported
to userspace via the KVM_CAP_PPC_SMT capability. If qemu wishes
to run the guest in single-threaded mode, it should make all vcpu
numbers be multiples of the number of threads per core.
We distinguish three states of a vcpu: runnable (i.e., ready to execute
the guest), blocked (that is, idle), and busy in host. We currently
implement a policy that the vcore can run only when all its threads
are runnable or blocked. This way, if a vcpu needs to execute elsewhere
in the kernel or in qemu, it can do so without being starved of CPU
by the other vcpus.
When a vcore starts to run, it executes in the context of one of the
vcpu threads. The other vcpu threads all go to sleep and stay asleep
until something happens requiring the vcpu thread to return to qemu,
or to wake up to run the vcore (this can happen when another vcpu
thread goes from busy in host state to blocked).
It can happen that a vcpu goes from blocked to runnable state (e.g.
because of an interrupt), and the vcore it belongs to is already
running. In that case it can start to run immediately as long as
the none of the vcpus in the vcore have started to exit the guest.
We send the next free thread in the vcore an IPI to get it to start
to execute the guest. It synchronizes with the other threads via
the vcore->entry_exit_count field to make sure that it doesn't go
into the guest if the other vcpus are exiting by the time that it
is ready to actually enter the guest.
Note that there is no fixed relationship between the hardware thread
number and the vcpu number. Hardware threads are assigned to vcpus
as they become runnable, so we will always use the lower-numbered
hardware threads in preference to higher-numbered threads if not all
the vcpus in the vcore are runnable, regardless of which vcpus are
runnable.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2011-06-29 08:23:08 +08:00
|
|
|
}
|
KVM: PPC: Allocate RMAs (Real Mode Areas) at boot for use by guests
This adds infrastructure which will be needed to allow book3s_hv KVM to
run on older POWER processors, including PPC970, which don't support
the Virtual Real Mode Area (VRMA) facility, but only the Real Mode
Offset (RMO) facility. These processors require a physically
contiguous, aligned area of memory for each guest. When the guest does
an access in real mode (MMU off), the address is compared against a
limit value, and if it is lower, the address is ORed with an offset
value (from the Real Mode Offset Register (RMOR)) and the result becomes
the real address for the access. The size of the RMA has to be one of
a set of supported values, which usually includes 64MB, 128MB, 256MB
and some larger powers of 2.
Since we are unlikely to be able to allocate 64MB or more of physically
contiguous memory after the kernel has been running for a while, we
allocate a pool of RMAs at boot time using the bootmem allocator. The
size and number of the RMAs can be set using the kvm_rma_size=xx and
kvm_rma_count=xx kernel command line options.
KVM exports a new capability, KVM_CAP_PPC_RMA, to signal the availability
of the pool of preallocated RMAs. The capability value is 1 if the
processor can use an RMA but doesn't require one (because it supports
the VRMA facility), or 2 if the processor requires an RMA for each guest.
This adds a new ioctl, KVM_ALLOCATE_RMA, which allocates an RMA from the
pool and returns a file descriptor which can be used to map the RMA. It
also returns the size of the RMA in the argument structure.
Having an RMA means we will get multiple KMV_SET_USER_MEMORY_REGION
ioctl calls from userspace. To cope with this, we now preallocate the
kvm->arch.ram_pginfo array when the VM is created with a size sufficient
for up to 64GB of guest memory. Subsequently we will get rid of this
array and use memory associated with each memslot instead.
This moves most of the code that translates the user addresses into
host pfns (page frame numbers) out of kvmppc_prepare_vrma up one level
to kvmppc_core_prepare_memory_region. Also, instead of having to look
up the VMA for each page in order to check the page size, we now check
that the pages we get are compound pages of 16MB. However, if we are
adding memory that is mapped to an RMA, we don't bother with calling
get_user_pages_fast and instead just offset from the base pfn for the
RMA.
Typically the RMA gets added after vcpus are created, which makes it
inconvenient to have the LPCR (logical partition control register) value
in the vcpu->arch struct, since the LPCR controls whether the processor
uses RMA or VRMA for the guest. This moves the LPCR value into the
kvm->arch struct and arranges for the MER (mediated external request)
bit, which is the only bit that varies between vcpus, to be set in
assembly code when going into the guest if there is a pending external
interrupt request.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2011-06-29 08:25:44 +08:00
|
|
|
|
2013-04-18 04:30:50 +08:00
|
|
|
static inline u32 kvmppc_get_xics_latch(void)
|
|
|
|
{
|
2013-10-08 00:47:56 +08:00
|
|
|
u32 xirr;
|
2013-04-18 04:30:50 +08:00
|
|
|
|
2013-10-08 00:47:56 +08:00
|
|
|
xirr = get_paca()->kvm_hstate.saved_xirr;
|
2013-04-18 04:30:50 +08:00
|
|
|
get_paca()->kvm_hstate.saved_xirr = 0;
|
|
|
|
return xirr;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void kvmppc_set_host_ipi(int cpu, u8 host_ipi)
|
|
|
|
{
|
|
|
|
paca[cpu].kvm_hstate.host_ipi = host_ipi;
|
|
|
|
}
|
|
|
|
|
2013-10-08 00:47:53 +08:00
|
|
|
static inline void kvmppc_fast_vcpu_kick(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2013-10-08 00:48:01 +08:00
|
|
|
vcpu->kvm->arch.kvm_ops->fast_vcpu_kick(vcpu);
|
2013-10-08 00:47:53 +08:00
|
|
|
}
|
KVM: PPC: Allocate RMAs (Real Mode Areas) at boot for use by guests
This adds infrastructure which will be needed to allow book3s_hv KVM to
run on older POWER processors, including PPC970, which don't support
the Virtual Real Mode Area (VRMA) facility, but only the Real Mode
Offset (RMO) facility. These processors require a physically
contiguous, aligned area of memory for each guest. When the guest does
an access in real mode (MMU off), the address is compared against a
limit value, and if it is lower, the address is ORed with an offset
value (from the Real Mode Offset Register (RMOR)) and the result becomes
the real address for the access. The size of the RMA has to be one of
a set of supported values, which usually includes 64MB, 128MB, 256MB
and some larger powers of 2.
Since we are unlikely to be able to allocate 64MB or more of physically
contiguous memory after the kernel has been running for a while, we
allocate a pool of RMAs at boot time using the bootmem allocator. The
size and number of the RMAs can be set using the kvm_rma_size=xx and
kvm_rma_count=xx kernel command line options.
KVM exports a new capability, KVM_CAP_PPC_RMA, to signal the availability
of the pool of preallocated RMAs. The capability value is 1 if the
processor can use an RMA but doesn't require one (because it supports
the VRMA facility), or 2 if the processor requires an RMA for each guest.
This adds a new ioctl, KVM_ALLOCATE_RMA, which allocates an RMA from the
pool and returns a file descriptor which can be used to map the RMA. It
also returns the size of the RMA in the argument structure.
Having an RMA means we will get multiple KMV_SET_USER_MEMORY_REGION
ioctl calls from userspace. To cope with this, we now preallocate the
kvm->arch.ram_pginfo array when the VM is created with a size sufficient
for up to 64GB of guest memory. Subsequently we will get rid of this
array and use memory associated with each memslot instead.
This moves most of the code that translates the user addresses into
host pfns (page frame numbers) out of kvmppc_prepare_vrma up one level
to kvmppc_core_prepare_memory_region. Also, instead of having to look
up the VMA for each page in order to check the page size, we now check
that the pages we get are compound pages of 16MB. However, if we are
adding memory that is mapped to an RMA, we don't bother with calling
get_user_pages_fast and instead just offset from the base pfn for the
RMA.
Typically the RMA gets added after vcpus are created, which makes it
inconvenient to have the LPCR (logical partition control register) value
in the vcpu->arch struct, since the LPCR controls whether the processor
uses RMA or VRMA for the guest. This moves the LPCR value into the
kvm->arch struct and arranges for the MER (mediated external request)
bit, which is the only bit that varies between vcpus, to be set in
assembly code when going into the guest if there is a pending external
interrupt request.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2011-06-29 08:25:44 +08:00
|
|
|
|
2014-05-23 16:15:25 +08:00
|
|
|
extern void kvm_hv_vm_activated(void);
|
|
|
|
extern void kvm_hv_vm_deactivated(void);
|
|
|
|
extern bool kvm_hv_mode_active(void);
|
|
|
|
|
KVM: PPC: Allow book3s_hv guests to use SMT processor modes
This lifts the restriction that book3s_hv guests can only run one
hardware thread per core, and allows them to use up to 4 threads
per core on POWER7. The host still has to run single-threaded.
This capability is advertised to qemu through a new KVM_CAP_PPC_SMT
capability. The return value of the ioctl querying this capability
is the number of vcpus per virtual CPU core (vcore), currently 4.
To use this, the host kernel should be booted with all threads
active, and then all the secondary threads should be offlined.
This will put the secondary threads into nap mode. KVM will then
wake them from nap mode and use them for running guest code (while
they are still offline). To wake the secondary threads, we send
them an IPI using a new xics_wake_cpu() function, implemented in
arch/powerpc/sysdev/xics/icp-native.c. In other words, at this stage
we assume that the platform has a XICS interrupt controller and
we are using icp-native.c to drive it. Since the woken thread will
need to acknowledge and clear the IPI, we also export the base
physical address of the XICS registers using kvmppc_set_xics_phys()
for use in the low-level KVM book3s code.
When a vcpu is created, it is assigned to a virtual CPU core.
The vcore number is obtained by dividing the vcpu number by the
number of threads per core in the host. This number is exported
to userspace via the KVM_CAP_PPC_SMT capability. If qemu wishes
to run the guest in single-threaded mode, it should make all vcpu
numbers be multiples of the number of threads per core.
We distinguish three states of a vcpu: runnable (i.e., ready to execute
the guest), blocked (that is, idle), and busy in host. We currently
implement a policy that the vcore can run only when all its threads
are runnable or blocked. This way, if a vcpu needs to execute elsewhere
in the kernel or in qemu, it can do so without being starved of CPU
by the other vcpus.
When a vcore starts to run, it executes in the context of one of the
vcpu threads. The other vcpu threads all go to sleep and stay asleep
until something happens requiring the vcpu thread to return to qemu,
or to wake up to run the vcore (this can happen when another vcpu
thread goes from busy in host state to blocked).
It can happen that a vcpu goes from blocked to runnable state (e.g.
because of an interrupt), and the vcore it belongs to is already
running. In that case it can start to run immediately as long as
the none of the vcpus in the vcore have started to exit the guest.
We send the next free thread in the vcore an IPI to get it to start
to execute the guest. It synchronizes with the other threads via
the vcore->entry_exit_count field to make sure that it doesn't go
into the guest if the other vcpus are exiting by the time that it
is ready to actually enter the guest.
Note that there is no fixed relationship between the hardware thread
number and the vcpu number. Hardware threads are assigned to vcpus
as they become runnable, so we will always use the lower-numbered
hardware threads in preference to higher-numbered threads if not all
the vcpus in the vcore are runnable, regardless of which vcpus are
runnable.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2011-06-29 08:23:08 +08:00
|
|
|
#else
|
2013-07-02 13:45:16 +08:00
|
|
|
static inline void __init kvm_cma_reserve(void)
|
|
|
|
{}
|
|
|
|
|
KVM: PPC: Allow book3s_hv guests to use SMT processor modes
This lifts the restriction that book3s_hv guests can only run one
hardware thread per core, and allows them to use up to 4 threads
per core on POWER7. The host still has to run single-threaded.
This capability is advertised to qemu through a new KVM_CAP_PPC_SMT
capability. The return value of the ioctl querying this capability
is the number of vcpus per virtual CPU core (vcore), currently 4.
To use this, the host kernel should be booted with all threads
active, and then all the secondary threads should be offlined.
This will put the secondary threads into nap mode. KVM will then
wake them from nap mode and use them for running guest code (while
they are still offline). To wake the secondary threads, we send
them an IPI using a new xics_wake_cpu() function, implemented in
arch/powerpc/sysdev/xics/icp-native.c. In other words, at this stage
we assume that the platform has a XICS interrupt controller and
we are using icp-native.c to drive it. Since the woken thread will
need to acknowledge and clear the IPI, we also export the base
physical address of the XICS registers using kvmppc_set_xics_phys()
for use in the low-level KVM book3s code.
When a vcpu is created, it is assigned to a virtual CPU core.
The vcore number is obtained by dividing the vcpu number by the
number of threads per core in the host. This number is exported
to userspace via the KVM_CAP_PPC_SMT capability. If qemu wishes
to run the guest in single-threaded mode, it should make all vcpu
numbers be multiples of the number of threads per core.
We distinguish three states of a vcpu: runnable (i.e., ready to execute
the guest), blocked (that is, idle), and busy in host. We currently
implement a policy that the vcore can run only when all its threads
are runnable or blocked. This way, if a vcpu needs to execute elsewhere
in the kernel or in qemu, it can do so without being starved of CPU
by the other vcpus.
When a vcore starts to run, it executes in the context of one of the
vcpu threads. The other vcpu threads all go to sleep and stay asleep
until something happens requiring the vcpu thread to return to qemu,
or to wake up to run the vcore (this can happen when another vcpu
thread goes from busy in host state to blocked).
It can happen that a vcpu goes from blocked to runnable state (e.g.
because of an interrupt), and the vcore it belongs to is already
running. In that case it can start to run immediately as long as
the none of the vcpus in the vcore have started to exit the guest.
We send the next free thread in the vcore an IPI to get it to start
to execute the guest. It synchronizes with the other threads via
the vcore->entry_exit_count field to make sure that it doesn't go
into the guest if the other vcpus are exiting by the time that it
is ready to actually enter the guest.
Note that there is no fixed relationship between the hardware thread
number and the vcpu number. Hardware threads are assigned to vcpus
as they become runnable, so we will always use the lower-numbered
hardware threads in preference to higher-numbered threads if not all
the vcpus in the vcore are runnable, regardless of which vcpus are
runnable.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2011-06-29 08:23:08 +08:00
|
|
|
static inline void kvmppc_set_xics_phys(int cpu, unsigned long addr)
|
|
|
|
{}
|
KVM: PPC: Allocate RMAs (Real Mode Areas) at boot for use by guests
This adds infrastructure which will be needed to allow book3s_hv KVM to
run on older POWER processors, including PPC970, which don't support
the Virtual Real Mode Area (VRMA) facility, but only the Real Mode
Offset (RMO) facility. These processors require a physically
contiguous, aligned area of memory for each guest. When the guest does
an access in real mode (MMU off), the address is compared against a
limit value, and if it is lower, the address is ORed with an offset
value (from the Real Mode Offset Register (RMOR)) and the result becomes
the real address for the access. The size of the RMA has to be one of
a set of supported values, which usually includes 64MB, 128MB, 256MB
and some larger powers of 2.
Since we are unlikely to be able to allocate 64MB or more of physically
contiguous memory after the kernel has been running for a while, we
allocate a pool of RMAs at boot time using the bootmem allocator. The
size and number of the RMAs can be set using the kvm_rma_size=xx and
kvm_rma_count=xx kernel command line options.
KVM exports a new capability, KVM_CAP_PPC_RMA, to signal the availability
of the pool of preallocated RMAs. The capability value is 1 if the
processor can use an RMA but doesn't require one (because it supports
the VRMA facility), or 2 if the processor requires an RMA for each guest.
This adds a new ioctl, KVM_ALLOCATE_RMA, which allocates an RMA from the
pool and returns a file descriptor which can be used to map the RMA. It
also returns the size of the RMA in the argument structure.
Having an RMA means we will get multiple KMV_SET_USER_MEMORY_REGION
ioctl calls from userspace. To cope with this, we now preallocate the
kvm->arch.ram_pginfo array when the VM is created with a size sufficient
for up to 64GB of guest memory. Subsequently we will get rid of this
array and use memory associated with each memslot instead.
This moves most of the code that translates the user addresses into
host pfns (page frame numbers) out of kvmppc_prepare_vrma up one level
to kvmppc_core_prepare_memory_region. Also, instead of having to look
up the VMA for each page in order to check the page size, we now check
that the pages we get are compound pages of 16MB. However, if we are
adding memory that is mapped to an RMA, we don't bother with calling
get_user_pages_fast and instead just offset from the base pfn for the
RMA.
Typically the RMA gets added after vcpus are created, which makes it
inconvenient to have the LPCR (logical partition control register) value
in the vcpu->arch struct, since the LPCR controls whether the processor
uses RMA or VRMA for the guest. This moves the LPCR value into the
kvm->arch struct and arranges for the MER (mediated external request)
bit, which is the only bit that varies between vcpus, to be set in
assembly code when going into the guest if there is a pending external
interrupt request.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2011-06-29 08:25:44 +08:00
|
|
|
|
2017-04-05 15:54:56 +08:00
|
|
|
static inline void kvmppc_set_xive_tima(int cpu,
|
|
|
|
unsigned long phys_addr,
|
|
|
|
void __iomem *virt_addr)
|
|
|
|
{}
|
|
|
|
|
2013-04-18 04:30:50 +08:00
|
|
|
static inline u32 kvmppc_get_xics_latch(void)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void kvmppc_set_host_ipi(int cpu, u8 host_ipi)
|
|
|
|
{}
|
|
|
|
|
|
|
|
static inline void kvmppc_fast_vcpu_kick(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
kvm_vcpu_kick(vcpu);
|
|
|
|
}
|
2014-05-23 16:15:25 +08:00
|
|
|
|
|
|
|
static inline bool kvm_hv_mode_active(void) { return false; }
|
|
|
|
|
2013-04-18 04:30:26 +08:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef CONFIG_KVM_XICS
|
|
|
|
static inline int kvmppc_xics_enabled(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
return vcpu->arch.irq_type == KVMPPC_IRQ_XICS;
|
|
|
|
}
|
2016-08-19 13:35:48 +08:00
|
|
|
|
|
|
|
static inline struct kvmppc_passthru_irqmap *kvmppc_get_passthru_irqmap(
|
|
|
|
struct kvm *kvm)
|
|
|
|
{
|
2016-08-19 13:35:54 +08:00
|
|
|
if (kvm && kvm_irq_bypass)
|
2016-08-19 13:35:48 +08:00
|
|
|
return kvm->arch.pimap;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2015-12-18 04:59:06 +08:00
|
|
|
extern void kvmppc_alloc_host_rm_ops(void);
|
|
|
|
extern void kvmppc_free_host_rm_ops(void);
|
2016-08-19 13:35:48 +08:00
|
|
|
extern void kvmppc_free_pimap(struct kvm *kvm);
|
2016-08-19 13:35:52 +08:00
|
|
|
extern int kvmppc_xics_rm_complete(struct kvm_vcpu *vcpu, u32 hcall);
|
2013-04-18 04:30:26 +08:00
|
|
|
extern void kvmppc_xics_free_icp(struct kvm_vcpu *vcpu);
|
|
|
|
extern int kvmppc_xics_hcall(struct kvm_vcpu *vcpu, u32 cmd);
|
2013-04-18 04:32:26 +08:00
|
|
|
extern u64 kvmppc_xics_get_icp(struct kvm_vcpu *vcpu);
|
|
|
|
extern int kvmppc_xics_set_icp(struct kvm_vcpu *vcpu, u64 icpval);
|
2013-04-27 08:28:37 +08:00
|
|
|
extern int kvmppc_xics_connect_vcpu(struct kvm_device *dev,
|
|
|
|
struct kvm_vcpu *vcpu, u32 cpu);
|
2015-12-18 04:59:09 +08:00
|
|
|
extern void kvmppc_xics_ipi_action(void);
|
KVM: PPC: Book3S HV: Set server for passed-through interrupts
When a guest has a PCI pass-through device with an interrupt, it
will direct the interrupt to a particular guest VCPU. In fact the
physical interrupt might arrive on any CPU, and then get
delivered to the target VCPU in the emulated XICS (guest interrupt
controller), and eventually delivered to the target VCPU.
Now that we have code to handle device interrupts in real mode
without exiting to the host kernel, there is an advantage to having
the device interrupt arrive on the same sub(core) as the target
VCPU is running on. In this situation, the interrupt can be
delivered to the target VCPU without any exit to the host kernel
(using a hypervisor doorbell interrupt between threads if
necessary).
This patch aims to get passed-through device interrupts arriving
on the correct core by setting the interrupt server in the real
hardware XICS for the interrupt to the first thread in the (sub)core
where its target VCPU is running. We do this in the real-mode H_EOI
code because the H_EOI handler already needs to look at the
emulated ICS state for the interrupt (whereas the H_XIRR handler
doesn't), and we know we are running in the target VCPU context
at that point.
We set the server CPU in hardware using an OPAL call, regardless of
what the IRQ affinity mask for the interrupt says, and without
updating the affinity mask. This amounts to saying that when an
interrupt is passed through to a guest, as a matter of policy we
allow the guest's affinity for the interrupt to override the host's.
This is inspired by an earlier patch from Suresh Warrier, although
none of this code came from that earlier patch.
Signed-off-by: Paul Mackerras <paulus@ozlabs.org>
2016-08-19 13:35:56 +08:00
|
|
|
extern void kvmppc_xics_set_mapped(struct kvm *kvm, unsigned long guest_irq,
|
|
|
|
unsigned long host_irq);
|
|
|
|
extern void kvmppc_xics_clr_mapped(struct kvm *kvm, unsigned long guest_irq,
|
|
|
|
unsigned long host_irq);
|
KVM: PPC: Book3S HV: Use OPAL XICS emulation on POWER9
POWER9 includes a new interrupt controller, called XIVE, which is
quite different from the XICS interrupt controller on POWER7 and
POWER8 machines. KVM-HV accesses the XICS directly in several places
in order to send and clear IPIs and handle interrupts from PCI
devices being passed through to the guest.
In order to make the transition to XIVE easier, OPAL firmware will
include an emulation of XICS on top of XIVE. Access to the emulated
XICS is via OPAL calls. The one complication is that the EOI
(end-of-interrupt) function can now return a value indicating that
another interrupt is pending; in this case, the XIVE will not signal
an interrupt in hardware to the CPU, and software is supposed to
acknowledge the new interrupt without waiting for another interrupt
to be delivered in hardware.
This adapts KVM-HV to use the OPAL calls on machines where there is
no XICS hardware. When there is no XICS, we look for a device-tree
node with "ibm,opal-intc" in its compatible property, which is how
OPAL indicates that it provides XICS emulation.
In order to handle the EOI return value, kvmppc_read_intr() has
become kvmppc_read_one_intr(), with a boolean variable passed by
reference which can be set by the EOI functions to indicate that
another interrupt is pending. The new kvmppc_read_intr() keeps
calling kvmppc_read_one_intr() until there are no more interrupts
to process. The return value from kvmppc_read_intr() is the
largest non-zero value of the returns from kvmppc_read_one_intr().
Signed-off-by: Paul Mackerras <paulus@ozlabs.org>
2016-11-18 06:02:08 +08:00
|
|
|
extern long kvmppc_deliver_irq_passthru(struct kvm_vcpu *vcpu, __be32 xirr,
|
|
|
|
struct kvmppc_irq_map *irq_map,
|
|
|
|
struct kvmppc_passthru_irqmap *pimap,
|
|
|
|
bool *again);
|
2017-04-05 15:54:56 +08:00
|
|
|
|
|
|
|
extern int kvmppc_xics_set_irq(struct kvm *kvm, int irq_source_id, u32 irq,
|
|
|
|
int level, bool line_status);
|
|
|
|
|
2015-12-22 06:33:57 +08:00
|
|
|
extern int h_ipi_redirect;
|
2013-04-18 04:30:26 +08:00
|
|
|
#else
|
2016-08-19 13:35:48 +08:00
|
|
|
static inline struct kvmppc_passthru_irqmap *kvmppc_get_passthru_irqmap(
|
|
|
|
struct kvm *kvm)
|
|
|
|
{ return NULL; }
|
2015-12-18 04:59:06 +08:00
|
|
|
static inline void kvmppc_alloc_host_rm_ops(void) {};
|
|
|
|
static inline void kvmppc_free_host_rm_ops(void) {};
|
2016-08-19 13:35:48 +08:00
|
|
|
static inline void kvmppc_free_pimap(struct kvm *kvm) {};
|
2016-08-19 13:35:52 +08:00
|
|
|
static inline int kvmppc_xics_rm_complete(struct kvm_vcpu *vcpu, u32 hcall)
|
|
|
|
{ return 0; }
|
2013-04-18 04:30:26 +08:00
|
|
|
static inline int kvmppc_xics_enabled(struct kvm_vcpu *vcpu)
|
|
|
|
{ return 0; }
|
|
|
|
static inline void kvmppc_xics_free_icp(struct kvm_vcpu *vcpu) { }
|
|
|
|
static inline int kvmppc_xics_hcall(struct kvm_vcpu *vcpu, u32 cmd)
|
|
|
|
{ return 0; }
|
KVM: PPC: Allow book3s_hv guests to use SMT processor modes
This lifts the restriction that book3s_hv guests can only run one
hardware thread per core, and allows them to use up to 4 threads
per core on POWER7. The host still has to run single-threaded.
This capability is advertised to qemu through a new KVM_CAP_PPC_SMT
capability. The return value of the ioctl querying this capability
is the number of vcpus per virtual CPU core (vcore), currently 4.
To use this, the host kernel should be booted with all threads
active, and then all the secondary threads should be offlined.
This will put the secondary threads into nap mode. KVM will then
wake them from nap mode and use them for running guest code (while
they are still offline). To wake the secondary threads, we send
them an IPI using a new xics_wake_cpu() function, implemented in
arch/powerpc/sysdev/xics/icp-native.c. In other words, at this stage
we assume that the platform has a XICS interrupt controller and
we are using icp-native.c to drive it. Since the woken thread will
need to acknowledge and clear the IPI, we also export the base
physical address of the XICS registers using kvmppc_set_xics_phys()
for use in the low-level KVM book3s code.
When a vcpu is created, it is assigned to a virtual CPU core.
The vcore number is obtained by dividing the vcpu number by the
number of threads per core in the host. This number is exported
to userspace via the KVM_CAP_PPC_SMT capability. If qemu wishes
to run the guest in single-threaded mode, it should make all vcpu
numbers be multiples of the number of threads per core.
We distinguish three states of a vcpu: runnable (i.e., ready to execute
the guest), blocked (that is, idle), and busy in host. We currently
implement a policy that the vcore can run only when all its threads
are runnable or blocked. This way, if a vcpu needs to execute elsewhere
in the kernel or in qemu, it can do so without being starved of CPU
by the other vcpus.
When a vcore starts to run, it executes in the context of one of the
vcpu threads. The other vcpu threads all go to sleep and stay asleep
until something happens requiring the vcpu thread to return to qemu,
or to wake up to run the vcore (this can happen when another vcpu
thread goes from busy in host state to blocked).
It can happen that a vcpu goes from blocked to runnable state (e.g.
because of an interrupt), and the vcore it belongs to is already
running. In that case it can start to run immediately as long as
the none of the vcpus in the vcore have started to exit the guest.
We send the next free thread in the vcore an IPI to get it to start
to execute the guest. It synchronizes with the other threads via
the vcore->entry_exit_count field to make sure that it doesn't go
into the guest if the other vcpus are exiting by the time that it
is ready to actually enter the guest.
Note that there is no fixed relationship between the hardware thread
number and the vcpu number. Hardware threads are assigned to vcpus
as they become runnable, so we will always use the lower-numbered
hardware threads in preference to higher-numbered threads if not all
the vcpus in the vcore are runnable, regardless of which vcpus are
runnable.
Signed-off-by: Paul Mackerras <paulus@samba.org>
Signed-off-by: Alexander Graf <agraf@suse.de>
2011-06-29 08:23:08 +08:00
|
|
|
#endif
|
|
|
|
|
2017-04-05 15:54:56 +08:00
|
|
|
#ifdef CONFIG_KVM_XIVE
|
|
|
|
/*
|
|
|
|
* Below the first "xive" is the "eXternal Interrupt Virtualization Engine"
|
|
|
|
* ie. P9 new interrupt controller, while the second "xive" is the legacy
|
|
|
|
* "eXternal Interrupt Vector Entry" which is the configuration of an
|
|
|
|
* interrupt on the "xics" interrupt controller on P8 and earlier. Those
|
|
|
|
* two function consume or produce a legacy "XIVE" state from the
|
|
|
|
* new "XIVE" interrupt controller.
|
|
|
|
*/
|
|
|
|
extern int kvmppc_xive_set_xive(struct kvm *kvm, u32 irq, u32 server,
|
|
|
|
u32 priority);
|
|
|
|
extern int kvmppc_xive_get_xive(struct kvm *kvm, u32 irq, u32 *server,
|
|
|
|
u32 *priority);
|
|
|
|
extern int kvmppc_xive_int_on(struct kvm *kvm, u32 irq);
|
|
|
|
extern int kvmppc_xive_int_off(struct kvm *kvm, u32 irq);
|
|
|
|
extern void kvmppc_xive_init_module(void);
|
|
|
|
extern void kvmppc_xive_exit_module(void);
|
|
|
|
|
|
|
|
extern int kvmppc_xive_connect_vcpu(struct kvm_device *dev,
|
|
|
|
struct kvm_vcpu *vcpu, u32 cpu);
|
|
|
|
extern void kvmppc_xive_cleanup_vcpu(struct kvm_vcpu *vcpu);
|
|
|
|
extern int kvmppc_xive_set_mapped(struct kvm *kvm, unsigned long guest_irq,
|
|
|
|
struct irq_desc *host_desc);
|
|
|
|
extern int kvmppc_xive_clr_mapped(struct kvm *kvm, unsigned long guest_irq,
|
|
|
|
struct irq_desc *host_desc);
|
|
|
|
extern u64 kvmppc_xive_get_icp(struct kvm_vcpu *vcpu);
|
|
|
|
extern int kvmppc_xive_set_icp(struct kvm_vcpu *vcpu, u64 icpval);
|
|
|
|
|
|
|
|
extern int kvmppc_xive_set_irq(struct kvm *kvm, int irq_source_id, u32 irq,
|
|
|
|
int level, bool line_status);
|
|
|
|
#else
|
|
|
|
static inline int kvmppc_xive_set_xive(struct kvm *kvm, u32 irq, u32 server,
|
|
|
|
u32 priority) { return -1; }
|
|
|
|
static inline int kvmppc_xive_get_xive(struct kvm *kvm, u32 irq, u32 *server,
|
|
|
|
u32 *priority) { return -1; }
|
|
|
|
static inline int kvmppc_xive_int_on(struct kvm *kvm, u32 irq) { return -1; }
|
|
|
|
static inline int kvmppc_xive_int_off(struct kvm *kvm, u32 irq) { return -1; }
|
|
|
|
static inline void kvmppc_xive_init_module(void) { }
|
|
|
|
static inline void kvmppc_xive_exit_module(void) { }
|
|
|
|
|
|
|
|
static inline int kvmppc_xive_connect_vcpu(struct kvm_device *dev,
|
|
|
|
struct kvm_vcpu *vcpu, u32 cpu) { return -EBUSY; }
|
|
|
|
static inline void kvmppc_xive_cleanup_vcpu(struct kvm_vcpu *vcpu) { }
|
|
|
|
static inline int kvmppc_xive_set_mapped(struct kvm *kvm, unsigned long guest_irq,
|
|
|
|
struct irq_desc *host_desc) { return -ENODEV; }
|
|
|
|
static inline int kvmppc_xive_clr_mapped(struct kvm *kvm, unsigned long guest_irq,
|
|
|
|
struct irq_desc *host_desc) { return -ENODEV; }
|
|
|
|
static inline u64 kvmppc_xive_get_icp(struct kvm_vcpu *vcpu) { return 0; }
|
|
|
|
static inline int kvmppc_xive_set_icp(struct kvm_vcpu *vcpu, u64 icpval) { return -ENOENT; }
|
|
|
|
|
|
|
|
static inline int kvmppc_xive_set_irq(struct kvm *kvm, int irq_source_id, u32 irq,
|
|
|
|
int level, bool line_status) { return -ENODEV; }
|
|
|
|
#endif /* CONFIG_KVM_XIVE */
|
|
|
|
|
2016-12-01 11:03:46 +08:00
|
|
|
/*
|
|
|
|
* Prototypes for functions called only from assembler code.
|
|
|
|
* Having prototypes reduces sparse errors.
|
|
|
|
*/
|
|
|
|
long kvmppc_rm_h_put_tce(struct kvm_vcpu *vcpu, unsigned long liobn,
|
|
|
|
unsigned long ioba, unsigned long tce);
|
|
|
|
long kvmppc_rm_h_put_tce_indirect(struct kvm_vcpu *vcpu,
|
|
|
|
unsigned long liobn, unsigned long ioba,
|
|
|
|
unsigned long tce_list, unsigned long npages);
|
|
|
|
long kvmppc_rm_h_stuff_tce(struct kvm_vcpu *vcpu,
|
|
|
|
unsigned long liobn, unsigned long ioba,
|
|
|
|
unsigned long tce_value, unsigned long npages);
|
|
|
|
long int kvmppc_rm_h_confer(struct kvm_vcpu *vcpu, int target,
|
|
|
|
unsigned int yield_count);
|
|
|
|
long kvmppc_h_random(struct kvm_vcpu *vcpu);
|
|
|
|
void kvmhv_commence_exit(int trap);
|
|
|
|
long kvmppc_realmode_machine_check(struct kvm_vcpu *vcpu);
|
|
|
|
void kvmppc_subcore_enter_guest(void);
|
|
|
|
void kvmppc_subcore_exit_guest(void);
|
|
|
|
long kvmppc_realmode_hmi_handler(void);
|
|
|
|
long kvmppc_h_enter(struct kvm_vcpu *vcpu, unsigned long flags,
|
|
|
|
long pte_index, unsigned long pteh, unsigned long ptel);
|
|
|
|
long kvmppc_h_remove(struct kvm_vcpu *vcpu, unsigned long flags,
|
|
|
|
unsigned long pte_index, unsigned long avpn);
|
|
|
|
long kvmppc_h_bulk_remove(struct kvm_vcpu *vcpu);
|
|
|
|
long kvmppc_h_protect(struct kvm_vcpu *vcpu, unsigned long flags,
|
|
|
|
unsigned long pte_index, unsigned long avpn,
|
|
|
|
unsigned long va);
|
|
|
|
long kvmppc_h_read(struct kvm_vcpu *vcpu, unsigned long flags,
|
|
|
|
unsigned long pte_index);
|
|
|
|
long kvmppc_h_clear_ref(struct kvm_vcpu *vcpu, unsigned long flags,
|
|
|
|
unsigned long pte_index);
|
|
|
|
long kvmppc_h_clear_mod(struct kvm_vcpu *vcpu, unsigned long flags,
|
|
|
|
unsigned long pte_index);
|
|
|
|
long kvmppc_hpte_hv_fault(struct kvm_vcpu *vcpu, unsigned long addr,
|
|
|
|
unsigned long slb_v, unsigned int status, bool data);
|
|
|
|
unsigned long kvmppc_rm_h_xirr(struct kvm_vcpu *vcpu);
|
2017-04-05 15:54:56 +08:00
|
|
|
unsigned long kvmppc_rm_h_xirr_x(struct kvm_vcpu *vcpu);
|
|
|
|
unsigned long kvmppc_rm_h_ipoll(struct kvm_vcpu *vcpu, unsigned long server);
|
2016-12-01 11:03:46 +08:00
|
|
|
int kvmppc_rm_h_ipi(struct kvm_vcpu *vcpu, unsigned long server,
|
|
|
|
unsigned long mfrr);
|
|
|
|
int kvmppc_rm_h_cppr(struct kvm_vcpu *vcpu, unsigned long cppr);
|
|
|
|
int kvmppc_rm_h_eoi(struct kvm_vcpu *vcpu, unsigned long xirr);
|
|
|
|
|
2015-12-18 04:59:06 +08:00
|
|
|
/*
|
|
|
|
* Host-side operations we want to set up while running in real
|
|
|
|
* mode in the guest operating on the xics.
|
|
|
|
* Currently only VCPU wakeup is supported.
|
|
|
|
*/
|
|
|
|
|
|
|
|
union kvmppc_rm_state {
|
|
|
|
unsigned long raw;
|
|
|
|
struct {
|
|
|
|
u32 in_host;
|
|
|
|
u32 rm_action;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
struct kvmppc_host_rm_core {
|
|
|
|
union kvmppc_rm_state rm_state;
|
|
|
|
void *rm_data;
|
|
|
|
char pad[112];
|
|
|
|
};
|
|
|
|
|
|
|
|
struct kvmppc_host_rm_ops {
|
|
|
|
struct kvmppc_host_rm_core *rm_core;
|
|
|
|
void (*vcpu_kick)(struct kvm_vcpu *vcpu);
|
|
|
|
};
|
|
|
|
|
|
|
|
extern struct kvmppc_host_rm_ops *kvmppc_host_rm_ops_hv;
|
|
|
|
|
2014-07-17 19:31:40 +08:00
|
|
|
static inline unsigned long kvmppc_get_epr(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_KVM_BOOKE_HV
|
|
|
|
return mfspr(SPRN_GEPR);
|
|
|
|
#elif defined(CONFIG_BOOKE)
|
|
|
|
return vcpu->arch.epr;
|
|
|
|
#else
|
|
|
|
return 0;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2013-01-05 01:12:48 +08:00
|
|
|
static inline void kvmppc_set_epr(struct kvm_vcpu *vcpu, u32 epr)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_KVM_BOOKE_HV
|
|
|
|
mtspr(SPRN_GEPR, epr);
|
|
|
|
#elif defined(CONFIG_BOOKE)
|
|
|
|
vcpu->arch.epr = epr;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2013-04-12 22:08:46 +08:00
|
|
|
#ifdef CONFIG_KVM_MPIC
|
|
|
|
|
|
|
|
void kvmppc_mpic_set_epr(struct kvm_vcpu *vcpu);
|
2013-04-12 22:08:47 +08:00
|
|
|
int kvmppc_mpic_connect_vcpu(struct kvm_device *dev, struct kvm_vcpu *vcpu,
|
|
|
|
u32 cpu);
|
|
|
|
void kvmppc_mpic_disconnect_vcpu(struct openpic *opp, struct kvm_vcpu *vcpu);
|
2013-04-12 22:08:46 +08:00
|
|
|
|
|
|
|
#else
|
|
|
|
|
|
|
|
static inline void kvmppc_mpic_set_epr(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2013-04-12 22:08:47 +08:00
|
|
|
static inline int kvmppc_mpic_connect_vcpu(struct kvm_device *dev,
|
|
|
|
struct kvm_vcpu *vcpu, u32 cpu)
|
|
|
|
{
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void kvmppc_mpic_disconnect_vcpu(struct openpic *opp,
|
|
|
|
struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2013-04-12 22:08:46 +08:00
|
|
|
#endif /* CONFIG_KVM_MPIC */
|
|
|
|
|
2011-08-19 04:25:21 +08:00
|
|
|
int kvm_vcpu_ioctl_config_tlb(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_config_tlb *cfg);
|
|
|
|
int kvm_vcpu_ioctl_dirty_tlb(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_dirty_tlb *cfg);
|
|
|
|
|
2011-12-20 23:34:20 +08:00
|
|
|
long kvmppc_alloc_lpid(void);
|
|
|
|
void kvmppc_claim_lpid(long lpid);
|
|
|
|
void kvmppc_free_lpid(long lpid);
|
|
|
|
void kvmppc_init_lpid(unsigned long nr_lpids);
|
|
|
|
|
kvm: rename pfn_t to kvm_pfn_t
To date, we have implemented two I/O usage models for persistent memory,
PMEM (a persistent "ram disk") and DAX (mmap persistent memory into
userspace). This series adds a third, DAX-GUP, that allows DAX mappings
to be the target of direct-i/o. It allows userspace to coordinate
DMA/RDMA from/to persistent memory.
The implementation leverages the ZONE_DEVICE mm-zone that went into
4.3-rc1 (also discussed at kernel summit) to flag pages that are owned
and dynamically mapped by a device driver. The pmem driver, after
mapping a persistent memory range into the system memmap via
devm_memremap_pages(), arranges for DAX to distinguish pfn-only versus
page-backed pmem-pfns via flags in the new pfn_t type.
The DAX code, upon seeing a PFN_DEV+PFN_MAP flagged pfn, flags the
resulting pte(s) inserted into the process page tables with a new
_PAGE_DEVMAP flag. Later, when get_user_pages() is walking ptes it keys
off _PAGE_DEVMAP to pin the device hosting the page range active.
Finally, get_page() and put_page() are modified to take references
against the device driver established page mapping.
Finally, this need for "struct page" for persistent memory requires
memory capacity to store the memmap array. Given the memmap array for a
large pool of persistent may exhaust available DRAM introduce a
mechanism to allocate the memmap from persistent memory. The new
"struct vmem_altmap *" parameter to devm_memremap_pages() enables
arch_add_memory() to use reserved pmem capacity rather than the page
allocator.
This patch (of 18):
The core has developed a need for a "pfn_t" type [1]. Move the existing
pfn_t in KVM to kvm_pfn_t [2].
[1]: https://lists.01.org/pipermail/linux-nvdimm/2015-September/002199.html
[2]: https://lists.01.org/pipermail/linux-nvdimm/2015-September/002218.html
Signed-off-by: Dan Williams <dan.j.williams@intel.com>
Acked-by: Christoffer Dall <christoffer.dall@linaro.org>
Cc: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2016-01-16 08:56:11 +08:00
|
|
|
static inline void kvmppc_mmu_flush_icache(kvm_pfn_t pfn)
|
2012-08-03 19:56:33 +08:00
|
|
|
{
|
|
|
|
struct page *page;
|
2013-04-25 14:33:57 +08:00
|
|
|
/*
|
|
|
|
* We can only access pages that the kernel maps
|
|
|
|
* as memory. Bail out for unmapped ones.
|
|
|
|
*/
|
|
|
|
if (!pfn_valid(pfn))
|
|
|
|
return;
|
|
|
|
|
|
|
|
/* Clear i-cache for new pages */
|
2012-08-03 19:56:33 +08:00
|
|
|
page = pfn_to_page(pfn);
|
|
|
|
if (!test_bit(PG_arch_1, &page->flags)) {
|
|
|
|
flush_dcache_icache_page(page);
|
|
|
|
set_bit(PG_arch_1, &page->flags);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-04-24 19:46:24 +08:00
|
|
|
/*
|
|
|
|
* Shared struct helpers. The shared struct can be little or big endian,
|
|
|
|
* depending on the guest endianness. So expose helpers to all of them.
|
|
|
|
*/
|
|
|
|
static inline bool kvmppc_shared_big_endian(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
#if defined(CONFIG_PPC_BOOK3S_64) && defined(CONFIG_KVM_BOOK3S_PR_POSSIBLE)
|
|
|
|
/* Only Book3S_64 PR supports bi-endian for now */
|
|
|
|
return vcpu->arch.shared_big_endian;
|
|
|
|
#elif defined(CONFIG_PPC_BOOK3S_64) && defined(__LITTLE_ENDIAN__)
|
|
|
|
/* Book3s_64 HV on little endian is always little endian */
|
|
|
|
return false;
|
|
|
|
#else
|
|
|
|
return true;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2014-07-30 17:33:56 +08:00
|
|
|
#define SPRNG_WRAPPER_GET(reg, bookehv_spr) \
|
2014-07-17 19:31:35 +08:00
|
|
|
static inline ulong kvmppc_get_##reg(struct kvm_vcpu *vcpu) \
|
|
|
|
{ \
|
2014-07-30 17:33:56 +08:00
|
|
|
return mfspr(bookehv_spr); \
|
2014-07-17 19:31:35 +08:00
|
|
|
} \
|
|
|
|
|
2014-07-30 17:33:56 +08:00
|
|
|
#define SPRNG_WRAPPER_SET(reg, bookehv_spr) \
|
2014-07-17 19:31:35 +08:00
|
|
|
static inline void kvmppc_set_##reg(struct kvm_vcpu *vcpu, ulong val) \
|
|
|
|
{ \
|
2014-07-30 17:33:56 +08:00
|
|
|
mtspr(bookehv_spr, val); \
|
2014-07-17 19:31:35 +08:00
|
|
|
} \
|
|
|
|
|
2014-04-24 19:46:24 +08:00
|
|
|
#define SHARED_WRAPPER_GET(reg, size) \
|
2014-07-17 19:31:35 +08:00
|
|
|
static inline u##size kvmppc_get_##reg(struct kvm_vcpu *vcpu) \
|
2014-04-24 19:46:24 +08:00
|
|
|
{ \
|
|
|
|
if (kvmppc_shared_big_endian(vcpu)) \
|
|
|
|
return be##size##_to_cpu(vcpu->arch.shared->reg); \
|
|
|
|
else \
|
|
|
|
return le##size##_to_cpu(vcpu->arch.shared->reg); \
|
|
|
|
} \
|
|
|
|
|
|
|
|
#define SHARED_WRAPPER_SET(reg, size) \
|
|
|
|
static inline void kvmppc_set_##reg(struct kvm_vcpu *vcpu, u##size val) \
|
|
|
|
{ \
|
|
|
|
if (kvmppc_shared_big_endian(vcpu)) \
|
|
|
|
vcpu->arch.shared->reg = cpu_to_be##size(val); \
|
|
|
|
else \
|
|
|
|
vcpu->arch.shared->reg = cpu_to_le##size(val); \
|
|
|
|
} \
|
|
|
|
|
|
|
|
#define SHARED_WRAPPER(reg, size) \
|
|
|
|
SHARED_WRAPPER_GET(reg, size) \
|
|
|
|
SHARED_WRAPPER_SET(reg, size) \
|
|
|
|
|
2014-07-30 17:33:56 +08:00
|
|
|
#define SPRNG_WRAPPER(reg, bookehv_spr) \
|
|
|
|
SPRNG_WRAPPER_GET(reg, bookehv_spr) \
|
|
|
|
SPRNG_WRAPPER_SET(reg, bookehv_spr) \
|
2014-07-17 19:31:35 +08:00
|
|
|
|
|
|
|
#ifdef CONFIG_KVM_BOOKE_HV
|
|
|
|
|
2014-07-30 17:33:56 +08:00
|
|
|
#define SHARED_SPRNG_WRAPPER(reg, size, bookehv_spr) \
|
|
|
|
SPRNG_WRAPPER(reg, bookehv_spr) \
|
2014-07-17 19:31:35 +08:00
|
|
|
|
|
|
|
#else
|
|
|
|
|
2014-07-30 17:33:56 +08:00
|
|
|
#define SHARED_SPRNG_WRAPPER(reg, size, bookehv_spr) \
|
2014-07-17 19:31:35 +08:00
|
|
|
SHARED_WRAPPER(reg, size) \
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2014-04-24 19:46:24 +08:00
|
|
|
SHARED_WRAPPER(critical, 64)
|
2014-07-17 19:31:35 +08:00
|
|
|
SHARED_SPRNG_WRAPPER(sprg0, 64, SPRN_GSPRG0)
|
|
|
|
SHARED_SPRNG_WRAPPER(sprg1, 64, SPRN_GSPRG1)
|
|
|
|
SHARED_SPRNG_WRAPPER(sprg2, 64, SPRN_GSPRG2)
|
|
|
|
SHARED_SPRNG_WRAPPER(sprg3, 64, SPRN_GSPRG3)
|
|
|
|
SHARED_SPRNG_WRAPPER(srr0, 64, SPRN_GSRR0)
|
|
|
|
SHARED_SPRNG_WRAPPER(srr1, 64, SPRN_GSRR1)
|
|
|
|
SHARED_SPRNG_WRAPPER(dar, 64, SPRN_GDEAR)
|
2014-07-17 19:31:38 +08:00
|
|
|
SHARED_SPRNG_WRAPPER(esr, 64, SPRN_GESR)
|
2014-04-24 19:46:24 +08:00
|
|
|
SHARED_WRAPPER_GET(msr, 64)
|
|
|
|
static inline void kvmppc_set_msr_fast(struct kvm_vcpu *vcpu, u64 val)
|
|
|
|
{
|
|
|
|
if (kvmppc_shared_big_endian(vcpu))
|
|
|
|
vcpu->arch.shared->msr = cpu_to_be64(val);
|
|
|
|
else
|
|
|
|
vcpu->arch.shared->msr = cpu_to_le64(val);
|
|
|
|
}
|
|
|
|
SHARED_WRAPPER(dsisr, 32)
|
|
|
|
SHARED_WRAPPER(int_pending, 32)
|
|
|
|
SHARED_WRAPPER(sprg4, 64)
|
|
|
|
SHARED_WRAPPER(sprg5, 64)
|
|
|
|
SHARED_WRAPPER(sprg6, 64)
|
|
|
|
SHARED_WRAPPER(sprg7, 64)
|
|
|
|
|
|
|
|
static inline u32 kvmppc_get_sr(struct kvm_vcpu *vcpu, int nr)
|
|
|
|
{
|
|
|
|
if (kvmppc_shared_big_endian(vcpu))
|
|
|
|
return be32_to_cpu(vcpu->arch.shared->sr[nr]);
|
|
|
|
else
|
|
|
|
return le32_to_cpu(vcpu->arch.shared->sr[nr]);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void kvmppc_set_sr(struct kvm_vcpu *vcpu, int nr, u32 val)
|
|
|
|
{
|
|
|
|
if (kvmppc_shared_big_endian(vcpu))
|
|
|
|
vcpu->arch.shared->sr[nr] = cpu_to_be32(val);
|
|
|
|
else
|
|
|
|
vcpu->arch.shared->sr[nr] = cpu_to_le32(val);
|
|
|
|
}
|
|
|
|
|
2013-07-11 06:47:39 +08:00
|
|
|
/*
|
|
|
|
* Please call after prepare_to_enter. This function puts the lazy ee and irq
|
|
|
|
* disabled tracking state back to normal mode, without actually enabling
|
|
|
|
* interrupts.
|
|
|
|
*/
|
|
|
|
static inline void kvmppc_fix_ee_before_entry(void)
|
2012-08-13 07:04:19 +08:00
|
|
|
{
|
2013-07-11 06:47:39 +08:00
|
|
|
trace_hardirqs_on();
|
|
|
|
|
2012-08-13 07:04:19 +08:00
|
|
|
#ifdef CONFIG_PPC64
|
2014-01-10 09:18:40 +08:00
|
|
|
/*
|
|
|
|
* To avoid races, the caller must have gone directly from having
|
|
|
|
* interrupts fully-enabled to hard-disabled.
|
|
|
|
*/
|
|
|
|
WARN_ON(local_paca->irq_happened != PACA_IRQ_HARD_DIS);
|
|
|
|
|
2012-08-13 07:04:19 +08:00
|
|
|
/* Only need to enable IRQs by hard enabling them after this */
|
|
|
|
local_paca->irq_happened = 0;
|
|
|
|
local_paca->soft_enabled = 1;
|
|
|
|
#endif
|
|
|
|
}
|
2012-08-03 19:56:33 +08:00
|
|
|
|
2012-10-11 14:13:22 +08:00
|
|
|
static inline ulong kvmppc_get_ea_indexed(struct kvm_vcpu *vcpu, int ra, int rb)
|
|
|
|
{
|
|
|
|
ulong ea;
|
2012-10-11 14:13:23 +08:00
|
|
|
ulong msr_64bit = 0;
|
2012-10-11 14:13:22 +08:00
|
|
|
|
|
|
|
ea = kvmppc_get_gpr(vcpu, rb);
|
|
|
|
if (ra)
|
|
|
|
ea += kvmppc_get_gpr(vcpu, ra);
|
|
|
|
|
2012-10-11 14:13:23 +08:00
|
|
|
#if defined(CONFIG_PPC_BOOK3E_64)
|
|
|
|
msr_64bit = MSR_CM;
|
|
|
|
#elif defined(CONFIG_PPC_BOOK3S_64)
|
|
|
|
msr_64bit = MSR_SF;
|
|
|
|
#endif
|
|
|
|
|
2014-04-24 19:46:24 +08:00
|
|
|
if (!(kvmppc_get_msr(vcpu) & msr_64bit))
|
2012-10-11 14:13:23 +08:00
|
|
|
ea = (uint32_t)ea;
|
|
|
|
|
2012-10-11 14:13:22 +08:00
|
|
|
return ea;
|
|
|
|
}
|
|
|
|
|
2013-04-18 04:30:50 +08:00
|
|
|
extern void xics_wake_cpu(int cpu);
|
|
|
|
|
2008-04-17 12:28:09 +08:00
|
|
|
#endif /* __POWERPC_KVM_PPC_H__ */
|