From patchwork Wed Dec 25 03:00:16 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Anup Patel X-Patchwork-Id: 11309951 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 171A8138C for ; Wed, 25 Dec 2019 03:00:21 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id DD68420679 for ; Wed, 25 Dec 2019 03:00:20 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=wdc.com header.i=@wdc.com header.b="S0+GOOo2"; dkim=pass (1024-bit key) header.d=sharedspace.onmicrosoft.com header.i=@sharedspace.onmicrosoft.com header.b="U3pjF0Rl" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726832AbfLYDAT (ORCPT ); Tue, 24 Dec 2019 22:00:19 -0500 Received: from esa5.hgst.iphmx.com ([216.71.153.144]:60709 "EHLO esa5.hgst.iphmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726317AbfLYDAT (ORCPT ); Tue, 24 Dec 2019 22:00:19 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=wdc.com; i=@wdc.com; q=dns/txt; s=dkim.wdc.com; t=1577242819; x=1608778819; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=9uAyxwPTbPHGRWGGdDPJKb3hPSPge7ga0ymvBLIQCjE=; b=S0+GOOo2vN3Yr6OKSD9k18IsTx1YW6CdnF5jccRNljEUutDqb5G3qHGr Z6AA3c42A43ZjAt7w9x2zDdIjuGKLR/7/0CjU1SCE2P/kIcWXJXNX2y6q xA6B1D5VS18koMsCpnegdnP8v7BR13SjOUt7UB6YoARUaZFYs7mqxTWdq xRCytkS5Cg3DYEYLSXdn06nSu/l3somdzv1xozae7IfPMTWL7QOAWaAdO ecoio5lkJegP4f75x571hdhyK/7ijMly7vl3GPNet7eFIFhkFcW9BnZpE wHu8S2S1T4lf6F8XShNO5xerh69ml8QMA88S7Y6vtrwQ6GIv9r1RzUXRj g==; IronPort-SDR: LH712Gpc6U3n+Ulc2gPtcmatOPC1xodPRTZg9R7Ipf/RoCi9mqvR3Pn9b9NPjcGMyvxJiEhghj Dgu/BpW9r8dQbHCAfQvZi7Sc69Kd4ZzbYRIKngODyoHTezf02ZMmfKmWM8x3TmDnWXd5Z43iJ6 7TvyKEMS3ZnpzJe3FUYrMJIHuqcBJnCjRZI2SpuF2Z5UUR+sB5anBHLw8KJSNflcp565fgzAvt 4Kv+XrVXCCeUQRbSWfpoZ8S9pNlM5ZXVkefke3bnFN0ETgIlQUv7bKn+YMXLW/GJLcW7GLB7ne xsY= X-IronPort-AV: E=Sophos;i="5.69,353,1571673600"; d="scan'208";a="126854665" Received: from mail-dm6nam11lp2174.outbound.protection.outlook.com (HELO NAM11-DM6-obe.outbound.protection.outlook.com) ([104.47.57.174]) by ob1.hgst.iphmx.com with ESMTP; 25 Dec 2019 11:00:18 +0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=H+/qn4Ay2hGS43yJ+anl30egcs5YoEHV+BjATt640ym5+AOMWKfRv5TpwOjALf/IDSOwR0WmubL/maLDy8ZiTGk7wdE0biV78AbAqjaQOgbFDLjfKb+GcNSrXy59t+zKE736MeqxBytlz2GMb5MyJL+fcrIs28LW06ZbTtJWYD6XlxcZFeMgQXaq3sQAWWVt67bmbl5J5UKcJ7BL7U52WrqR0efi7opNhCDo9eB3pOJXJtLJZ6BD0JdDn13oMYOL5xGwjf+dprAE7jhsErfsPTE5MMjaMysJkIRZCvppTS60WkUiFKy6lh69MVJl01FBxiycYyr1iFG/lMZBFK/Nlg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Z4YkFa03dgbiSlO2HLH5jlHKon49iUZYuIiYSldGZj4=; b=Jp4CmZ0iastWzt+F3JGe598xm9iBI/JSaFrp+EHLZ46Gjomu5xpbRRF/IEW2j9uAXSCiC3tPh5ylc3V0syvbrRPE52pMXkDOYa9Ndj45Z1EqnBtDaGOBXSO3mflbVRNzFjVT4p+KSkFHLmJ1/oSIxWYd1FUgmCSdBMBb91PNtr0wUnPSUUdTl0uR7UOBtAMUl/rEp0M/a4Jh5qMLyg/VS3GZuVnB5l0czy5zw1T+1JjZ2jHeis+Pta8R8rn8leBYzJ7BR6p75Mt3Z7isTFjkSF8gl/uZWA0ZjNQTu3zM9Znc5blCKl2k2n7X78cA4Nk9+enizqq3Wmojsmc8X2jymw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=wdc.com; dmarc=pass action=none header.from=wdc.com; dkim=pass header.d=wdc.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sharedspace.onmicrosoft.com; s=selector2-sharedspace-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Z4YkFa03dgbiSlO2HLH5jlHKon49iUZYuIiYSldGZj4=; b=U3pjF0Rl9IgKQzVW7RksA2B3P7DP+I4X2yL0WDpjLsa9DewuO2hn/lNHh10CA4ExlcKvS/jCwdjR3vK3jQLpklMzEzm7D8LFAM3L8De0RbnQzFY2Jo6cDRWisGNPmGf39CLeI3N6UmMQ/m4DEuAAvHoUIT5LMe17VE0O7Gg0TQg= Received: from MN2PR04MB6061.namprd04.prod.outlook.com (20.178.246.15) by MN2PR04MB5597.namprd04.prod.outlook.com (20.179.22.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2581.11; Wed, 25 Dec 2019 03:00:16 +0000 Received: from MN2PR04MB6061.namprd04.prod.outlook.com ([fe80::a9a0:3ffa:371f:ad89]) by MN2PR04MB6061.namprd04.prod.outlook.com ([fe80::a9a0:3ffa:371f:ad89%7]) with mapi id 15.20.2559.017; Wed, 25 Dec 2019 03:00:16 +0000 Received: from wdc.com (106.51.19.73) by MAXPR01CA0084.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:49::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2581.11 via Frontend Transport; Wed, 25 Dec 2019 03:00:13 +0000 From: Anup Patel To: Will Deacon CC: Paolo Bonzini , Atish Patra , Alistair Francis , Anup Patel , "kvm@vger.kernel.org" , "kvm-riscv@lists.infradead.org" , Anup Patel Subject: [kvmtool RFC PATCH 1/8] update_headers: Sync-up ABI headers with Linux-5.5-rc3 Thread-Topic: [kvmtool RFC PATCH 1/8] update_headers: Sync-up ABI headers with Linux-5.5-rc3 Thread-Index: AQHVus9uADFpxo6O5U2AUwBDP3nTWA== Date: Wed, 25 Dec 2019 03:00:16 +0000 Message-ID: <20191225025945.108466-2-anup.patel@wdc.com> References: <20191225025945.108466-1-anup.patel@wdc.com> In-Reply-To: <20191225025945.108466-1-anup.patel@wdc.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-clientproxiedby: MAXPR01CA0084.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:49::26) To MN2PR04MB6061.namprd04.prod.outlook.com (2603:10b6:208:d8::15) authentication-results: spf=none (sender IP is ) smtp.mailfrom=Anup.Patel@wdc.com; x-ms-exchange-messagesentrepresentingtype: 1 x-mailer: git-send-email 2.17.1 x-originating-ip: [106.51.19.73] x-ms-publictraffictype: Email x-ms-office365-filtering-ht: Tenant x-ms-office365-filtering-correlation-id: f7e844bd-5c75-4b88-7276-08d788e69141 x-ms-traffictypediagnostic: MN2PR04MB5597: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: wdcipoutbound: EOP-TRUE x-ms-oob-tlc-oobclassifiers: OLM:541; x-forefront-prvs: 02622CEF0A x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(4636009)(39860400002)(136003)(346002)(376002)(366004)(396003)(199004)(189003)(5660300002)(86362001)(2906002)(4326008)(54906003)(81156014)(81166006)(66946007)(8676002)(1076003)(6916009)(8886007)(71200400001)(44832011)(66556008)(64756008)(1006002)(66446008)(52116002)(66476007)(55236004)(7696005)(16526019)(186003)(316002)(26005)(55016002)(956004)(2616005)(36756003)(478600001)(8936002)(32040200004);DIR:OUT;SFP:1102;SCL:1;SRVR:MN2PR04MB5597;H:MN2PR04MB6061.namprd04.prod.outlook.com;FPR:;SPF:None;LANG:en;PTR:InfoNoRecords;A:1;MX:1; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 MIME-Version: 1.0 X-OriginatorOrg: wdc.com X-MS-Exchange-CrossTenant-Network-Message-Id: f7e844bd-5c75-4b88-7276-08d788e69141 X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Dec 2019 03:00:16.1353 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b61c8803-16f3-4c35-9b17-6f65f441df86 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 8PIDA/UNSpmsZN1oBYDa7UVzpOxGqbcMbtGzMXnoqfipAQUnvrDAWZDE5wLRLMB9BV6jDc80/7uUt4yrF+12Nw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR04MB5597 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org We sync-up all ABI headers with Linux-5.5-rc3. This will allow us to use ONE_REG interface for KVMTOOL RISC-V port. Signed-off-by: Anup Patel --- arm/aarch32/include/asm/kvm.h | 7 +++++-- arm/aarch64/include/asm/kvm.h | 9 +++++++-- include/linux/kvm.h | 25 +++++++++++++++++++++++++ powerpc/include/asm/kvm.h | 3 +++ 4 files changed, 40 insertions(+), 4 deletions(-) diff --git a/arm/aarch32/include/asm/kvm.h b/arm/aarch32/include/asm/kvm.h index a4217c1..03cd7c1 100644 --- a/arm/aarch32/include/asm/kvm.h +++ b/arm/aarch32/include/asm/kvm.h @@ -131,8 +131,9 @@ struct kvm_vcpu_events { struct { __u8 serror_pending; __u8 serror_has_esr; + __u8 ext_dabt_pending; /* Align it to 8 bytes */ - __u8 pad[6]; + __u8 pad[5]; __u64 serror_esr; } exception; __u32 reserved[12]; @@ -266,8 +267,10 @@ struct kvm_vcpu_events { #define KVM_DEV_ARM_ITS_CTRL_RESET 4 /* KVM_IRQ_LINE irq field index values */ +#define KVM_ARM_IRQ_VCPU2_SHIFT 28 +#define KVM_ARM_IRQ_VCPU2_MASK 0xf #define KVM_ARM_IRQ_TYPE_SHIFT 24 -#define KVM_ARM_IRQ_TYPE_MASK 0xff +#define KVM_ARM_IRQ_TYPE_MASK 0xf #define KVM_ARM_IRQ_VCPU_SHIFT 16 #define KVM_ARM_IRQ_VCPU_MASK 0xff #define KVM_ARM_IRQ_NUM_SHIFT 0 diff --git a/arm/aarch64/include/asm/kvm.h b/arm/aarch64/include/asm/kvm.h index 9a50771..820e575 100644 --- a/arm/aarch64/include/asm/kvm.h +++ b/arm/aarch64/include/asm/kvm.h @@ -164,8 +164,9 @@ struct kvm_vcpu_events { struct { __u8 serror_pending; __u8 serror_has_esr; + __u8 ext_dabt_pending; /* Align it to 8 bytes */ - __u8 pad[6]; + __u8 pad[5]; __u64 serror_esr; } exception; __u32 reserved[12]; @@ -323,10 +324,14 @@ struct kvm_vcpu_events { #define KVM_ARM_VCPU_TIMER_CTRL 1 #define KVM_ARM_VCPU_TIMER_IRQ_VTIMER 0 #define KVM_ARM_VCPU_TIMER_IRQ_PTIMER 1 +#define KVM_ARM_VCPU_PVTIME_CTRL 2 +#define KVM_ARM_VCPU_PVTIME_IPA 0 /* KVM_IRQ_LINE irq field index values */ +#define KVM_ARM_IRQ_VCPU2_SHIFT 28 +#define KVM_ARM_IRQ_VCPU2_MASK 0xf #define KVM_ARM_IRQ_TYPE_SHIFT 24 -#define KVM_ARM_IRQ_TYPE_MASK 0xff +#define KVM_ARM_IRQ_TYPE_MASK 0xf #define KVM_ARM_IRQ_VCPU_SHIFT 16 #define KVM_ARM_IRQ_VCPU_MASK 0xff #define KVM_ARM_IRQ_NUM_SHIFT 0 diff --git a/include/linux/kvm.h b/include/linux/kvm.h index 5e3f12d..b6a90dd 100644 --- a/include/linux/kvm.h +++ b/include/linux/kvm.h @@ -235,6 +235,8 @@ struct kvm_hyperv_exit { #define KVM_EXIT_S390_STSI 25 #define KVM_EXIT_IOAPIC_EOI 26 #define KVM_EXIT_HYPERV 27 +#define KVM_EXIT_ARM_NISV 28 +#define KVM_EXIT_RISCV_SBI 28 /* For KVM_EXIT_INTERNAL_ERROR */ /* Emulate instruction failed. */ @@ -243,6 +245,8 @@ struct kvm_hyperv_exit { #define KVM_INTERNAL_ERROR_SIMUL_EX 2 /* Encounter unexpected vm-exit due to delivery event. */ #define KVM_INTERNAL_ERROR_DELIVERY_EV 3 +/* Encounter unexpected vm-exit reason */ +#define KVM_INTERNAL_ERROR_UNEXPECTED_EXIT_REASON 4 /* for KVM_RUN, returned by mmap(vcpu_fd, offset=0) */ struct kvm_run { @@ -392,6 +396,18 @@ struct kvm_run { } eoi; /* KVM_EXIT_HYPERV */ struct kvm_hyperv_exit hyperv; + /* KVM_EXIT_ARM_NISV */ + struct { + __u64 esr_iss; + __u64 fault_ipa; + } arm_nisv; + /* KVM_EXIT_RISCV_SBI */ + struct { + unsigned long extension_id; + unsigned long function_id; + unsigned long args[6]; + unsigned long ret[2]; + } riscv_sbi; /* Fix the size of the union. */ char padding[256]; }; @@ -996,6 +1012,11 @@ struct kvm_ppc_resize_hpt { #define KVM_CAP_ARM_PTRAUTH_ADDRESS 171 #define KVM_CAP_ARM_PTRAUTH_GENERIC 172 #define KVM_CAP_PMU_EVENT_FILTER 173 +#define KVM_CAP_ARM_IRQ_LINE_LAYOUT_2 174 +#define KVM_CAP_HYPERV_DIRECT_TLBFLUSH 175 +#define KVM_CAP_PPC_GUEST_DEBUG_SSTEP 176 +#define KVM_CAP_ARM_NISV_TO_USER 177 +#define KVM_CAP_ARM_INJECT_EXT_DABT 178 #ifdef KVM_CAP_IRQ_ROUTING @@ -1142,6 +1163,7 @@ struct kvm_dirty_tlb { #define KVM_REG_S390 0x5000000000000000ULL #define KVM_REG_ARM64 0x6000000000000000ULL #define KVM_REG_MIPS 0x7000000000000000ULL +#define KVM_REG_RISCV 0x8000000000000000ULL #define KVM_REG_SIZE_SHIFT 52 #define KVM_REG_SIZE_MASK 0x00f0000000000000ULL @@ -1222,6 +1244,8 @@ enum kvm_device_type { #define KVM_DEV_TYPE_ARM_VGIC_ITS KVM_DEV_TYPE_ARM_VGIC_ITS KVM_DEV_TYPE_XIVE, #define KVM_DEV_TYPE_XIVE KVM_DEV_TYPE_XIVE + KVM_DEV_TYPE_ARM_PV_TIME, +#define KVM_DEV_TYPE_ARM_PV_TIME KVM_DEV_TYPE_ARM_PV_TIME KVM_DEV_TYPE_MAX, }; @@ -1332,6 +1356,7 @@ struct kvm_s390_ucas_mapping { #define KVM_PPC_GET_CPU_CHAR _IOR(KVMIO, 0xb1, struct kvm_ppc_cpu_char) /* Available with KVM_CAP_PMU_EVENT_FILTER */ #define KVM_SET_PMU_EVENT_FILTER _IOW(KVMIO, 0xb2, struct kvm_pmu_event_filter) +#define KVM_PPC_SVM_OFF _IO(KVMIO, 0xb3) /* ioctl for vm fd */ #define KVM_CREATE_DEVICE _IOWR(KVMIO, 0xe0, struct kvm_create_device) diff --git a/powerpc/include/asm/kvm.h b/powerpc/include/asm/kvm.h index b0f72de..264e266 100644 --- a/powerpc/include/asm/kvm.h +++ b/powerpc/include/asm/kvm.h @@ -667,6 +667,8 @@ struct kvm_ppc_cpu_char { /* PPC64 eXternal Interrupt Controller Specification */ #define KVM_DEV_XICS_GRP_SOURCES 1 /* 64-bit source attributes */ +#define KVM_DEV_XICS_GRP_CTRL 2 +#define KVM_DEV_XICS_NR_SERVERS 1 /* Layout of 64-bit source attribute values */ #define KVM_XICS_DESTINATION_SHIFT 0 @@ -683,6 +685,7 @@ struct kvm_ppc_cpu_char { #define KVM_DEV_XIVE_GRP_CTRL 1 #define KVM_DEV_XIVE_RESET 1 #define KVM_DEV_XIVE_EQ_SYNC 2 +#define KVM_DEV_XIVE_NR_SERVERS 3 #define KVM_DEV_XIVE_GRP_SOURCE 2 /* 64-bit source identifier */ #define KVM_DEV_XIVE_GRP_SOURCE_CONFIG 3 /* 64-bit source identifier */ #define KVM_DEV_XIVE_GRP_EQ_CONFIG 4 /* 64-bit EQ identifier */ From patchwork Wed Dec 25 03:00:19 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Anup Patel X-Patchwork-Id: 11309953 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 635FF14E3 for ; Wed, 25 Dec 2019 03:00:24 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 2DB9120679 for ; Wed, 25 Dec 2019 03:00:24 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=wdc.com header.i=@wdc.com header.b="pm8K1AzG"; dkim=pass (1024-bit key) header.d=sharedspace.onmicrosoft.com header.i=@sharedspace.onmicrosoft.com header.b="0LZwUYlF" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726375AbfLYDAX (ORCPT ); Tue, 24 Dec 2019 22:00:23 -0500 Received: from esa5.hgst.iphmx.com ([216.71.153.144]:60709 "EHLO esa5.hgst.iphmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726317AbfLYDAX (ORCPT ); Tue, 24 Dec 2019 22:00:23 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=wdc.com; i=@wdc.com; q=dns/txt; s=dkim.wdc.com; t=1577242822; x=1608778822; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=bIPB3MakH71c9FnNWLYQZiEUTqa390C1qmN/JyWCuwE=; b=pm8K1AzG/fAL3wYbVTWyPVdqgHH175V+Nl+VWYEzQPDvo5F4fHdSzpmJ jn1RIi2sv6iS3iH/IDNWyXlRiRyzCKj73jPNyYJ1nTXRYsFwEk1ZMW58y dlo+2LmkQ4PzhExXTd/P/FE5QsZcaaD25cIt2liwmI1+sYWmFIGchfqra /QX9OhloH/LL8Pv63nJYOLmm2rZROzCaoVVCnh90mKclQy2nOA/vtHgyo zI/tGBVhkyJHqU0/066nhFEPjb59Uo4qvHwT7qr7VolTPFlvYJG3p85MQ 6TKWhgIT9YimIcVjZOTX2y331V754H/nXtPfHtmm1PxWb9tPYQz/xlEsc Q==; IronPort-SDR: z0UTfo6Le0ny0kW9AK6b8QIS/mGG4sjn3S9RZSk3KQBNOnDb13FgWLu6JZkXLW8n/eG7xzkSbq TagXyUBEd/nrREbU/7cF0ibxlgiXIQVPhrI3fqcRViyEZUnuWXPX3yABzADjvPg6ZdyiAKT+P4 hbD+AEVyGT+9gz7LpkomG54EUlRL/Hk1YdgAppn3DRtx4tvhAJzVd+f+ez8WVp4vI5csiOGJLX Oyw0eid6vQG9P1AvnPCJwZutULO0x0/W7B0Kliv+FPh/bphuQVQRh72O0oNUBx2IMnWirGaTwr vBo= X-IronPort-AV: E=Sophos;i="5.69,353,1571673600"; d="scan'208";a="126854669" Received: from mail-dm6nam11lp2170.outbound.protection.outlook.com (HELO NAM11-DM6-obe.outbound.protection.outlook.com) ([104.47.57.170]) by ob1.hgst.iphmx.com with ESMTP; 25 Dec 2019 11:00:21 +0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=mFzPEq0DxWk8JvqyOlKc0+waQYdN46DYyBSlOucVGnUD04kA2kqhU2s/fjAxDqOSN8XIEmVud8TUD9/qWGVhwUupjZmJP94sVqQrinNXcG7RlDdTr38Q7oMdFK7Rs107rU2nXovTFnutSNVAe02ev9lyhilhyowf30RffMnhTL/9Z1wES/+oowMQuWL1TvInTb94VXR5WdgPsYeXKcaHCU+TkDRI9qjVnhufAdzUbxpRs1t8QoPTk3z4ZYX8/7bcMJGtPO4/sMwIAyauAEzCPm0t0bofHccQoZYPtz6E25rzkmLm551mt/KtThUUC2baDkvPmsKsRU7iWUQL/8x89Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lxCRpy7ydS4nGUpj9iVYi3TBvTnplZ+3wBkKEjHv06E=; b=GhK7ZRRpWS2o4Y2zGEHPIpT8OMBbQ8dpkyhmZe/VxSwjDTmbpTlsxMgUv2XGsBFAGC7Rkb3wiP7O0TDZl07zCZDvAFCzkpOPByAOo/4cg1Nqb6VYrEgqeygPCpEl7dxXpA7Pnm8x8BNbu+f9nKTNxXIApTvxDQImhgmBDmssfnWl5g92KHqriZO00reyXRX5YglMzn/gsLc7ZmDJm2sn1ywgQxrg/X7ucxHwS3Z/xb476UT8ZgErNQc6mUD6G1AhFWGLOvQaR7vdSNORUNr3T8WNLVt4hq+sJ1V8ZICF5/aBTyCEnt52ASyP0Rix8crWdFz7oNmNuxd8JkK5K0ZZzg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=wdc.com; dmarc=pass action=none header.from=wdc.com; dkim=pass header.d=wdc.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sharedspace.onmicrosoft.com; s=selector2-sharedspace-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lxCRpy7ydS4nGUpj9iVYi3TBvTnplZ+3wBkKEjHv06E=; b=0LZwUYlFQERZaMfxnjotytK1S/kveiaeOYj/s1J3nmUb/R27EkLrI0iPuVTRTgbyHCBUm8LYn4dLNhCdD8LuuKHOdKjqUIpRXrrpY5qFsQN7nVeTC5wZAfbUGJHbB56+W2SwgT7+ScfiVu0tuqav8/+ubxzlmZMTyPOIffLXals= Received: from MN2PR04MB6061.namprd04.prod.outlook.com (20.178.246.15) by MN2PR04MB5597.namprd04.prod.outlook.com (20.179.22.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2581.11; Wed, 25 Dec 2019 03:00:20 +0000 Received: from MN2PR04MB6061.namprd04.prod.outlook.com ([fe80::a9a0:3ffa:371f:ad89]) by MN2PR04MB6061.namprd04.prod.outlook.com ([fe80::a9a0:3ffa:371f:ad89%7]) with mapi id 15.20.2559.017; Wed, 25 Dec 2019 03:00:20 +0000 Received: from wdc.com (106.51.19.73) by MAXPR01CA0084.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:49::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2581.11 via Frontend Transport; Wed, 25 Dec 2019 03:00:17 +0000 From: Anup Patel To: Will Deacon CC: Paolo Bonzini , Atish Patra , Alistair Francis , Anup Patel , "kvm@vger.kernel.org" , "kvm-riscv@lists.infradead.org" , Anup Patel Subject: [kvmtool RFC PATCH 2/8] riscv: Initial skeletal support Thread-Topic: [kvmtool RFC PATCH 2/8] riscv: Initial skeletal support Thread-Index: AQHVus9xhMXHnUi41EGmDqPAYrZ5kg== Date: Wed, 25 Dec 2019 03:00:19 +0000 Message-ID: <20191225025945.108466-3-anup.patel@wdc.com> References: <20191225025945.108466-1-anup.patel@wdc.com> In-Reply-To: <20191225025945.108466-1-anup.patel@wdc.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-clientproxiedby: MAXPR01CA0084.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:49::26) To MN2PR04MB6061.namprd04.prod.outlook.com (2603:10b6:208:d8::15) authentication-results: spf=none (sender IP is ) smtp.mailfrom=Anup.Patel@wdc.com; x-ms-exchange-messagesentrepresentingtype: 1 x-mailer: git-send-email 2.17.1 x-originating-ip: [106.51.19.73] x-ms-publictraffictype: Email x-ms-office365-filtering-ht: Tenant x-ms-office365-filtering-correlation-id: 1f58cd11-da34-46bf-1182-08d788e693ab x-ms-traffictypediagnostic: MN2PR04MB5597: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: wdcipoutbound: EOP-TRUE x-ms-oob-tlc-oobclassifiers: OLM:439; x-forefront-prvs: 02622CEF0A x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(4636009)(39860400002)(136003)(346002)(376002)(366004)(396003)(199004)(189003)(5660300002)(86362001)(2906002)(4326008)(54906003)(81156014)(81166006)(66946007)(8676002)(1076003)(6916009)(8886007)(71200400001)(44832011)(66556008)(64756008)(1006002)(66446008)(52116002)(66476007)(55236004)(7696005)(16526019)(186003)(316002)(26005)(55016002)(956004)(2616005)(36756003)(478600001)(30864003)(8936002)(32040200004);DIR:OUT;SFP:1102;SCL:1;SRVR:MN2PR04MB5597;H:MN2PR04MB6061.namprd04.prod.outlook.com;FPR:;SPF:None;LANG:en;PTR:InfoNoRecords;A:1;MX:1; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 MIME-Version: 1.0 X-OriginatorOrg: wdc.com X-MS-Exchange-CrossTenant-Network-Message-Id: 1f58cd11-da34-46bf-1182-08d788e693ab X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Dec 2019 03:00:20.0220 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b61c8803-16f3-4c35-9b17-6f65f441df86 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: W6jRNPzARAfSDvjLKELvajGc8mOAnfUByP2cbIqlsUhyG/nNbtaIP/i24Ciq4lgvJYf4ng+BgdDIb3yu4yaE+Q== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR04MB5597 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org This patch adds initial skeletal KVMTOOL RISC-V support which just compiles for RV32 and RV64 host. Signed-off-by: Anup Patel --- INSTALL | 7 +- Makefile | 15 +++- riscv/include/asm/kvm.h | 127 ++++++++++++++++++++++++++++ riscv/include/kvm/barrier.h | 14 +++ riscv/include/kvm/fdt-arch.h | 4 + riscv/include/kvm/kvm-arch.h | 58 +++++++++++++ riscv/include/kvm/kvm-config-arch.h | 9 ++ riscv/include/kvm/kvm-cpu-arch.h | 49 +++++++++++ riscv/ioport.c | 11 +++ riscv/irq.c | 13 +++ riscv/kvm-cpu.c | 64 ++++++++++++++ riscv/kvm.c | 61 +++++++++++++ util/update_headers.sh | 2 +- 13 files changed, 429 insertions(+), 5 deletions(-) create mode 100644 riscv/include/asm/kvm.h create mode 100644 riscv/include/kvm/barrier.h create mode 100644 riscv/include/kvm/fdt-arch.h create mode 100644 riscv/include/kvm/kvm-arch.h create mode 100644 riscv/include/kvm/kvm-config-arch.h create mode 100644 riscv/include/kvm/kvm-cpu-arch.h create mode 100644 riscv/ioport.c create mode 100644 riscv/irq.c create mode 100644 riscv/kvm-cpu.c create mode 100644 riscv/kvm.c diff --git a/INSTALL b/INSTALL index ca8e022..951b123 100644 --- a/INSTALL +++ b/INSTALL @@ -26,8 +26,8 @@ For Fedora based systems: For OpenSUSE based systems: # zypper install glibc-devel-static -Architectures which require device tree (PowerPC, ARM, ARM64) also require -libfdt. +Architectures which require device tree (PowerPC, ARM, ARM64, RISC-V) also +require libfdt. deb: $ sudo apt-get install libfdt-dev Fedora: # yum install libfdt-devel OpenSUSE: # zypper install libfdt1-devel @@ -64,6 +64,7 @@ to the Linux name of the architecture. Architectures supported: - arm - arm64 - mips +- riscv If ARCH is not provided, the target architecture will be automatically determined by running "uname -m" on your host, resulting in a native build. @@ -81,7 +82,7 @@ On multiarch system you should be able to install those be appending the architecture name after the package (example for ARM64): $ sudo apt-get install libfdt-dev:arm64 -PowerPC and ARM/ARM64 require libfdt to be installed. If you cannot use +PowerPC, ARM/ARM64 and RISC-V require libfdt to be installed. If you cannot use precompiled mulitarch packages, you could either copy the required header and library files from an installed target system into the SYSROOT (you will need /usr/include/*fdt*.h and /usr/lib64/libfdt-v.v.v.so and its symlinks), or you diff --git a/Makefile b/Makefile index 3862112..972fa63 100644 --- a/Makefile +++ b/Makefile @@ -106,7 +106,8 @@ OBJS += hw/i8042.o # Translate uname -m into ARCH string ARCH ?= $(shell uname -m | sed -e s/i.86/i386/ -e s/ppc.*/powerpc/ \ - -e s/armv.*/arm/ -e s/aarch64.*/arm64/ -e s/mips64/mips/) + -e s/armv.*/arm/ -e s/aarch64.*/arm64/ -e s/mips64/mips/ \ + -e s/riscv64/riscv/ -e s/riscv32/riscv/) ifeq ($(ARCH),i386) ARCH := x86 @@ -190,6 +191,18 @@ ifeq ($(ARCH),mips) OBJS += mips/kvm.o OBJS += mips/kvm-cpu.o endif + +# RISC-V (RV32 and RV64) +ifeq ($(ARCH),riscv) + DEFINES += -DCONFIG_RISCV + ARCH_INCLUDE := riscv/include + OBJS += riscv/ioport.o + OBJS += riscv/irq.o + OBJS += riscv/kvm.o + OBJS += riscv/kvm-cpu.o + + ARCH_WANT_LIBFDT := y +endif ### ifeq (,$(ARCH_INCLUDE)) diff --git a/riscv/include/asm/kvm.h b/riscv/include/asm/kvm.h new file mode 100644 index 0000000..f4274c2 --- /dev/null +++ b/riscv/include/asm/kvm.h @@ -0,0 +1,127 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +/* + * Copyright (C) 2019 Western Digital Corporation or its affiliates. + * + * Authors: + * Anup Patel + */ + +#ifndef __LINUX_KVM_RISCV_H +#define __LINUX_KVM_RISCV_H + +#ifndef __ASSEMBLY__ + +#include +#include + +#define __KVM_HAVE_READONLY_MEM + +#define KVM_COALESCED_MMIO_PAGE_OFFSET 1 + +#define KVM_INTERRUPT_SET -1U +#define KVM_INTERRUPT_UNSET -2U + +/* for KVM_GET_REGS and KVM_SET_REGS */ +struct kvm_regs { +}; + +/* for KVM_GET_FPU and KVM_SET_FPU */ +struct kvm_fpu { +}; + +/* KVM Debug exit structure */ +struct kvm_debug_exit_arch { +}; + +/* for KVM_SET_GUEST_DEBUG */ +struct kvm_guest_debug_arch { +}; + +/* definition of registers in kvm_run */ +struct kvm_sync_regs { +}; + +/* for KVM_GET_SREGS and KVM_SET_SREGS */ +struct kvm_sregs { +}; + +/* CONFIG registers for KVM_GET_ONE_REG and KVM_SET_ONE_REG */ +struct kvm_riscv_config { + unsigned long isa; +}; + +/* CORE registers for KVM_GET_ONE_REG and KVM_SET_ONE_REG */ +struct kvm_riscv_core { + struct user_regs_struct regs; + unsigned long mode; +}; + +/* Possible privilege modes for kvm_riscv_core */ +#define KVM_RISCV_MODE_S 1 +#define KVM_RISCV_MODE_U 0 + +/* CSR registers for KVM_GET_ONE_REG and KVM_SET_ONE_REG */ +struct kvm_riscv_csr { + unsigned long sstatus; + unsigned long sie; + unsigned long stvec; + unsigned long sscratch; + unsigned long sepc; + unsigned long scause; + unsigned long stval; + unsigned long sip; + unsigned long satp; +}; + +/* TIMER registers for KVM_GET_ONE_REG and KVM_SET_ONE_REG */ +struct kvm_riscv_timer { + u64 frequency; + u64 time; + u64 compare; + u64 state; +}; + +/* Possible states for kvm_riscv_timer */ +#define KVM_RISCV_TIMER_STATE_OFF 0 +#define KVM_RISCV_TIMER_STATE_ON 1 + +#define KVM_REG_SIZE(id) \ + (1U << (((id) & KVM_REG_SIZE_MASK) >> KVM_REG_SIZE_SHIFT)) + +/* If you need to interpret the index values, here is the key: */ +#define KVM_REG_RISCV_TYPE_MASK 0x00000000FF000000 +#define KVM_REG_RISCV_TYPE_SHIFT 24 + +/* Config registers are mapped as type 1 */ +#define KVM_REG_RISCV_CONFIG (0x01 << KVM_REG_RISCV_TYPE_SHIFT) +#define KVM_REG_RISCV_CONFIG_REG(name) \ + (offsetof(struct kvm_riscv_config, name) / sizeof(unsigned long)) + +/* Core registers are mapped as type 2 */ +#define KVM_REG_RISCV_CORE (0x02 << KVM_REG_RISCV_TYPE_SHIFT) +#define KVM_REG_RISCV_CORE_REG(name) \ + (offsetof(struct kvm_riscv_core, name) / sizeof(unsigned long)) + +/* Control and status registers are mapped as type 3 */ +#define KVM_REG_RISCV_CSR (0x03 << KVM_REG_RISCV_TYPE_SHIFT) +#define KVM_REG_RISCV_CSR_REG(name) \ + (offsetof(struct kvm_riscv_csr, name) / sizeof(unsigned long)) + +/* Timer registers are mapped as type 4 */ +#define KVM_REG_RISCV_TIMER (0x04 << KVM_REG_RISCV_TYPE_SHIFT) +#define KVM_REG_RISCV_TIMER_REG(name) \ + (offsetof(struct kvm_riscv_timer, name) / sizeof(u64)) + +/* F extension registers are mapped as type 5 */ +#define KVM_REG_RISCV_FP_F (0x05 << KVM_REG_RISCV_TYPE_SHIFT) +#define KVM_REG_RISCV_FP_F_REG(name) \ + (offsetof(struct __riscv_f_ext_state, name) / sizeof(u32)) + +/* D extension registers are mapped as type 6 */ +#define KVM_REG_RISCV_FP_D (0x06 << KVM_REG_RISCV_TYPE_SHIFT) +#define KVM_REG_RISCV_FP_D_REG(name) \ + (offsetof(struct __riscv_d_ext_state, name) / sizeof(u64)) + +#endif + +#endif /* __LINUX_KVM_RISCV_H */ diff --git a/riscv/include/kvm/barrier.h b/riscv/include/kvm/barrier.h new file mode 100644 index 0000000..235f610 --- /dev/null +++ b/riscv/include/kvm/barrier.h @@ -0,0 +1,14 @@ +#ifndef KVM__KVM_BARRIER_H +#define KVM__KVM_BARRIER_H + +#define nop() __asm__ __volatile__ ("nop") + +#define RISCV_FENCE(p, s) \ + __asm__ __volatile__ ("fence " #p "," #s : : : "memory") + +/* These barriers need to enforce ordering on both devices or memory. */ +#define mb() RISCV_FENCE(iorw,iorw) +#define rmb() RISCV_FENCE(ir,ir) +#define wmb() RISCV_FENCE(ow,ow) + +#endif /* KVM__KVM_BARRIER_H */ diff --git a/riscv/include/kvm/fdt-arch.h b/riscv/include/kvm/fdt-arch.h new file mode 100644 index 0000000..9450fc5 --- /dev/null +++ b/riscv/include/kvm/fdt-arch.h @@ -0,0 +1,4 @@ +#ifndef KVM__KVM_FDT_H +#define KVM__KVM_FDT_H + +#endif /* KVM__KVM_FDT_H */ diff --git a/riscv/include/kvm/kvm-arch.h b/riscv/include/kvm/kvm-arch.h new file mode 100644 index 0000000..7e9c578 --- /dev/null +++ b/riscv/include/kvm/kvm-arch.h @@ -0,0 +1,58 @@ +#ifndef KVM__KVM_ARCH_H +#define KVM__KVM_ARCH_H + +#include +#include +#include + +#define RISCV_IOPORT 0x00000000ULL +#define RISCV_IOPORT_SIZE 0x00010000ULL +#define RISCV_PLIC 0x0c000000ULL +#define RISCV_PLIC_SIZE 0x04000000ULL +#define RISCV_MMIO 0x10000000ULL +#define RISCV_MMIO_SIZE 0x20000000ULL +#define RISCV_PCI 0x30000000ULL +#define RISCV_PCI_CFG_SIZE 0x10000000ULL +#define RISCV_PCI_SIZE 0x50000000ULL +#define RISCV_PCI_MMIO_SIZE (RISCV_PCI_SIZE - RISCV_PCI_CFG_SIZE) + +#define RISCV_RAM 0x80000000ULL + +#define RISCV_LOMAP_MAX_MEMORY ((1ULL << 32) - RISCV_RAM) +#define RISCV_HIMAP_MAX_MEMORY ((1ULL << 40) - RISCV_RAM) + +#if __riscv_xlen == 64 +#define RISCV_MAX_MEMORY(kvm) RISCV_HIMAP_MAX_MEMORY +#elif __riscv_xlen == 32 +#define RISCV_MAX_MEMORY(kvm) RISCV_LOMAP_MAX_MEMORY +#endif + +#define KVM_IOPORT_AREA RISCV_IOPORT +#define KVM_PCI_CFG_AREA RISCV_PCI +#define KVM_PCI_MMIO_AREA (KVM_PCI_CFG_AREA + RISCV_PCI_CFG_SIZE) +#define KVM_VIRTIO_MMIO_AREA RISCV_MMIO + +#define KVM_IOEVENTFD_HAS_PIO 0 + +#define KVM_IRQ_OFFSET 0 + +#define KVM_VM_TYPE 0 + +#define VIRTIO_DEFAULT_TRANS(kvm) VIRTIO_MMIO + +#define VIRTIO_RING_ENDIAN VIRTIO_ENDIAN_LE + +struct kvm; + +struct kvm_arch { +}; + +static inline bool riscv_addr_in_ioport_region(u64 phys_addr) +{ + u64 limit = KVM_IOPORT_AREA + RISCV_IOPORT_SIZE; + return phys_addr >= KVM_IOPORT_AREA && phys_addr < limit; +} + +enum irq_type; + +#endif /* KVM__KVM_ARCH_H */ diff --git a/riscv/include/kvm/kvm-config-arch.h b/riscv/include/kvm/kvm-config-arch.h new file mode 100644 index 0000000..60c7333 --- /dev/null +++ b/riscv/include/kvm/kvm-config-arch.h @@ -0,0 +1,9 @@ +#ifndef KVM__KVM_CONFIG_ARCH_H +#define KVM__KVM_CONFIG_ARCH_H + +#include "kvm/parse-options.h" + +struct kvm_config_arch { +}; + +#endif /* KVM__KVM_CONFIG_ARCH_H */ diff --git a/riscv/include/kvm/kvm-cpu-arch.h b/riscv/include/kvm/kvm-cpu-arch.h new file mode 100644 index 0000000..09a50e8 --- /dev/null +++ b/riscv/include/kvm/kvm-cpu-arch.h @@ -0,0 +1,49 @@ +#ifndef KVM__KVM_CPU_ARCH_H +#define KVM__KVM_CPU_ARCH_H + +#include +#include +#include + +#include "kvm/kvm.h" + +struct kvm; + +struct kvm_cpu { + pthread_t thread; + + unsigned long cpu_id; + + struct kvm *kvm; + int vcpu_fd; + struct kvm_run *kvm_run; + struct kvm_cpu_task *task; + + u8 is_running; + u8 paused; + u8 needs_nmi; + + struct kvm_coalesced_mmio_ring *ring; +}; + +static inline bool kvm_cpu__emulate_io(struct kvm_cpu *vcpu, u16 port, + void *data, int direction, + int size, u32 count) +{ + return false; +} + +static inline bool kvm_cpu__emulate_mmio(struct kvm_cpu *vcpu, u64 phys_addr, + u8 *data, u32 len, u8 is_write) +{ + if (riscv_addr_in_ioport_region(phys_addr)) { + int direction = is_write ? KVM_EXIT_IO_OUT : KVM_EXIT_IO_IN; + u16 port = (phys_addr - KVM_IOPORT_AREA) & USHRT_MAX; + + return kvm__emulate_io(vcpu, port, data, direction, len, 1); + } + + return kvm__emulate_mmio(vcpu, phys_addr, data, len, is_write); +} + +#endif /* KVM__KVM_CPU_ARCH_H */ diff --git a/riscv/ioport.c b/riscv/ioport.c new file mode 100644 index 0000000..bdd30b6 --- /dev/null +++ b/riscv/ioport.c @@ -0,0 +1,11 @@ +#include "kvm/ioport.h" +#include "kvm/irq.h" + +void ioport__setup_arch(struct kvm *kvm) +{ +} + +void ioport__map_irq(u8 *irq) +{ + *irq = irq__alloc_line(); +} diff --git a/riscv/irq.c b/riscv/irq.c new file mode 100644 index 0000000..8e605ef --- /dev/null +++ b/riscv/irq.c @@ -0,0 +1,13 @@ +#include "kvm/kvm.h" +#include "kvm/kvm-cpu.h" +#include "kvm/irq.h" + +void kvm__irq_line(struct kvm *kvm, int irq, int level) +{ + /* TODO: */ +} + +void kvm__irq_trigger(struct kvm *kvm, int irq) +{ + /* TODO: */ +} diff --git a/riscv/kvm-cpu.c b/riscv/kvm-cpu.c new file mode 100644 index 0000000..e4b8fa5 --- /dev/null +++ b/riscv/kvm-cpu.c @@ -0,0 +1,64 @@ +#include "kvm/kvm-cpu.h" +#include "kvm/kvm.h" +#include "kvm/virtio.h" +#include "kvm/term.h" + +#include + +static int debug_fd; + +void kvm_cpu__set_debug_fd(int fd) +{ + debug_fd = fd; +} + +int kvm_cpu__get_debug_fd(void) +{ + return debug_fd; +} + +struct kvm_cpu *kvm_cpu__arch_init(struct kvm *kvm, unsigned long cpu_id) +{ + /* TODO: */ + return NULL; +} + +void kvm_cpu__arch_nmi(struct kvm_cpu *cpu) +{ +} + +void kvm_cpu__delete(struct kvm_cpu *vcpu) +{ + /* TODO: */ +} + +bool kvm_cpu__handle_exit(struct kvm_cpu *vcpu) +{ + /* TODO: */ + return false; +} + +void kvm_cpu__show_page_tables(struct kvm_cpu *vcpu) +{ + /* TODO: */ +} + +void kvm_cpu__reset_vcpu(struct kvm_cpu *vcpu) +{ + /* TODO: */ +} + +int kvm_cpu__get_endianness(struct kvm_cpu *vcpu) +{ + return VIRTIO_ENDIAN_LE; +} + +void kvm_cpu__show_code(struct kvm_cpu *vcpu) +{ + /* TODO: */ +} + +void kvm_cpu__show_registers(struct kvm_cpu *vcpu) +{ + /* TODO: */ +} diff --git a/riscv/kvm.c b/riscv/kvm.c new file mode 100644 index 0000000..e816ef5 --- /dev/null +++ b/riscv/kvm.c @@ -0,0 +1,61 @@ +#include "kvm/kvm.h" +#include "kvm/util.h" +#include "kvm/fdt.h" + +#include +#include +#include + +struct kvm_ext kvm_req_ext[] = { + { DEFINE_KVM_EXT(KVM_CAP_ONE_REG) }, + { 0, 0 }, +}; + +bool kvm__arch_cpu_supports_vm(void) +{ + /* The KVM capability check is enough. */ + return true; +} + +void kvm__init_ram(struct kvm *kvm) +{ + /* TODO: */ +} + +void kvm__arch_delete_ram(struct kvm *kvm) +{ + /* TODO: */ +} + +void kvm__arch_read_term(struct kvm *kvm) +{ + /* TODO: */ +} + +void kvm__arch_set_cmdline(char *cmdline, bool video) +{ + /* TODO: */ +} + +void kvm__arch_init(struct kvm *kvm, const char *hugetlbfs_path, u64 ram_size) +{ + /* TODO: */ +} + +bool kvm__arch_load_kernel_image(struct kvm *kvm, int fd_kernel, int fd_initrd, + const char *kernel_cmdline) +{ + /* TODO: */ + return true; +} + +bool kvm__load_firmware(struct kvm *kvm, const char *firmware_filename) +{ + /* TODO: Firmware loading to be supported later. */ + return false; +} + +int kvm__arch_setup_firmware(struct kvm *kvm) +{ + return 0; +} diff --git a/util/update_headers.sh b/util/update_headers.sh index bf87ef6..78eba1f 100755 --- a/util/update_headers.sh +++ b/util/update_headers.sh @@ -36,7 +36,7 @@ copy_optional_arch () { fi } -for arch in arm arm64 mips powerpc x86 +for arch in arm arm64 mips powerpc riscv x86 do case "$arch" in arm) KVMTOOL_PATH=arm/aarch32 ;; From patchwork Wed Dec 25 03:00:23 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Anup Patel X-Patchwork-Id: 11309955 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 7306414E3 for ; Wed, 25 Dec 2019 03:00:27 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 4807F206B7 for ; Wed, 25 Dec 2019 03:00:27 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=wdc.com header.i=@wdc.com header.b="Ji313gdQ"; dkim=pass (1024-bit key) header.d=sharedspace.onmicrosoft.com header.i=@sharedspace.onmicrosoft.com header.b="nlit+WP9" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726884AbfLYDA0 (ORCPT ); Tue, 24 Dec 2019 22:00:26 -0500 Received: from esa5.hgst.iphmx.com ([216.71.153.144]:60709 "EHLO esa5.hgst.iphmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726866AbfLYDA0 (ORCPT ); Tue, 24 Dec 2019 22:00:26 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=wdc.com; i=@wdc.com; q=dns/txt; s=dkim.wdc.com; t=1577242825; x=1608778825; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=k8WkmdrxvXeWgu5n6ykO2rJL05Hd2wL5SpZ+PJ49JA4=; b=Ji313gdQ1m+9CoAH2Wmv3HW6a5+F2E6oqTVncw32CDZGKa9eJxmmY+Gb 42/YszP4e0cBCEf2hFhZjXU7YPLg/oLMiLrYoKd6lDqKOQucD4WL4LmUr wb9gEM7Kqurnwo+lE6KoQAVgVU16pQEfuJJUQopBQ9tqOK+VaxK4u79c+ chky9YJll/6Y66lrDpwgln5WVo5KDnhYgyFklUdOWwXh/TA5ktVlTSP5x a5AWyFsyTZTw2ewHLnMV0a82qCQ9bIItWBuzOfX20ixdH1bjVBWXQuk5g tiZsrqhQew6JI3jDADt4azD+haA7xaZgAx8d+EfErj6o5hkUmcZoON5Or Q==; IronPort-SDR: 5ADsdxV0X6SeV6stwABHtoMLQOf/F7zGnF9ippnx8ZJrXnFY/2OxcXj7tGWeYFnw1Ac+vhhyPi uu1UFL0AbrMvJDfn79e3ubr3HP7R49SVRbKgl9eg3nCFtzh7rozYdyjkvpW95TU0/tainSauf0 RKvRElH6XNVYpu1U7czWmLsWnHjjUpVBL+QaDx5hqPVx2WU3T10IZ4YjYcVpVQze4aUtbYxVXF GGh0LYtZyLSkImMIHwuQ4Eo7+yiBsaEdUJC5HcPjTMzzwEENlFx5eoYOSfK7QvHKK5H4f0Ndor lIk= X-IronPort-AV: E=Sophos;i="5.69,353,1571673600"; d="scan'208";a="126854676" Received: from mail-dm6nam11lp2175.outbound.protection.outlook.com (HELO NAM11-DM6-obe.outbound.protection.outlook.com) ([104.47.57.175]) by ob1.hgst.iphmx.com with ESMTP; 25 Dec 2019 11:00:25 +0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ObUGP7x1T2A/jItFajdCveZqMKUbxoa+Eq5Qdwi9nG/2YR3sh9+qb58sZ87XHo3jAqtP1WLF1gZBwBdImLK11zdnlAxtKfV4Y1gHIbrbyqGqVFZFxrTx7LLGCX2VicKEkxbCzH5Kq79LuHYZK7263mvWsgiYAxtdqHpt9gS2Gk1NO9KGrXJvil4FASW3JR3jpB7ef1u9IqA1rZPoiN3IkNwzpHAAotwXX2c0kdKS6KO2ySPoXUVmsvtao2NiCyW06I3KhsCOF3AWGZEu9dMQvvMHx/8CgZd2jiXc/sXDHXG/S8FYF3mC3yuiyEt/K6meYn4YrC8FcJ1T7Mf6W1/UhA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=aOtboORL9ajL1bx5qrvZnUWRgxAEXMgYbS1kOaciHQM=; b=KyrNvHArf1tXvGRZ4LCnj0sf5mh7Fz7w+a5n0wq7ozpTZi4Glc2sVE9pDIMYg+SEbJ/k84GXQkDAySN53jcXcIECaF+ofywk36M5yV9q5CRyuRAQenaxbs6cJYAJ9KmAqhlKvNIQRRL1YM5OuGj0jsP28oEyqNBxJMdBY1QGuJdpgiFEtlEpmYRDWILguS6LkLQ12i/3EG9HS8+3S7WITHAN86yYdRBJZQUq+pkEWovyA2x4ErVLrl592oLT9oBoRvzliBQMha1/M4pRiLoF+E76/jJs3Bi+yA2CpaK4KV+7n+gHfIiYHUy5OsdEnPwsmHq3N/xQ10l+Nq1173fu0A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=wdc.com; dmarc=pass action=none header.from=wdc.com; dkim=pass header.d=wdc.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sharedspace.onmicrosoft.com; s=selector2-sharedspace-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=aOtboORL9ajL1bx5qrvZnUWRgxAEXMgYbS1kOaciHQM=; b=nlit+WP91oPxXRScCAY28cUTMvJgCQ070yKNW5t0FwY0l6mOPn8/nYoGByl46YYKK7DtLUF6suP9L5kJBmhQuiqMCggpZjTBChYDndWR0btxAf26WLFGrc6eEdhJQkc4ZGN570S9MLeiBlhYLqx+MwV7r75cYEzzhYExYmvddGs= Received: from MN2PR04MB6061.namprd04.prod.outlook.com (20.178.246.15) by MN2PR04MB5597.namprd04.prod.outlook.com (20.179.22.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2581.11; Wed, 25 Dec 2019 03:00:24 +0000 Received: from MN2PR04MB6061.namprd04.prod.outlook.com ([fe80::a9a0:3ffa:371f:ad89]) by MN2PR04MB6061.namprd04.prod.outlook.com ([fe80::a9a0:3ffa:371f:ad89%7]) with mapi id 15.20.2559.017; Wed, 25 Dec 2019 03:00:24 +0000 Received: from wdc.com (106.51.19.73) by MAXPR01CA0084.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:49::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2581.11 via Frontend Transport; Wed, 25 Dec 2019 03:00:21 +0000 From: Anup Patel To: Will Deacon CC: Paolo Bonzini , Atish Patra , Alistair Francis , Anup Patel , "kvm@vger.kernel.org" , "kvm-riscv@lists.infradead.org" , Anup Patel Subject: [kvmtool RFC PATCH 3/8] riscv: Implement Guest/VM arch functions Thread-Topic: [kvmtool RFC PATCH 3/8] riscv: Implement Guest/VM arch functions Thread-Index: AQHVus9zGpQfJlH86kCOGUsVzcQrXQ== Date: Wed, 25 Dec 2019 03:00:23 +0000 Message-ID: <20191225025945.108466-4-anup.patel@wdc.com> References: <20191225025945.108466-1-anup.patel@wdc.com> In-Reply-To: <20191225025945.108466-1-anup.patel@wdc.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-clientproxiedby: MAXPR01CA0084.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:49::26) To MN2PR04MB6061.namprd04.prod.outlook.com (2603:10b6:208:d8::15) authentication-results: spf=none (sender IP is ) smtp.mailfrom=Anup.Patel@wdc.com; x-ms-exchange-messagesentrepresentingtype: 1 x-mailer: git-send-email 2.17.1 x-originating-ip: [106.51.19.73] x-ms-publictraffictype: Email x-ms-office365-filtering-ht: Tenant x-ms-office365-filtering-correlation-id: aea10b54-41c3-49d0-a46a-08d788e69608 x-ms-traffictypediagnostic: MN2PR04MB5597: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: wdcipoutbound: EOP-TRUE x-ms-oob-tlc-oobclassifiers: OLM:8882; x-forefront-prvs: 02622CEF0A x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(4636009)(39860400002)(136003)(346002)(376002)(366004)(396003)(199004)(189003)(5660300002)(86362001)(2906002)(4326008)(54906003)(81156014)(81166006)(66946007)(8676002)(1076003)(6916009)(8886007)(71200400001)(44832011)(66556008)(64756008)(1006002)(66446008)(52116002)(66476007)(55236004)(7696005)(16526019)(186003)(316002)(26005)(55016002)(956004)(2616005)(36756003)(478600001)(8936002)(32040200004);DIR:OUT;SFP:1102;SCL:1;SRVR:MN2PR04MB5597;H:MN2PR04MB6061.namprd04.prod.outlook.com;FPR:;SPF:None;LANG:en;PTR:InfoNoRecords;A:1;MX:1; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 MIME-Version: 1.0 X-OriginatorOrg: wdc.com X-MS-Exchange-CrossTenant-Network-Message-Id: aea10b54-41c3-49d0-a46a-08d788e69608 X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Dec 2019 03:00:23.9147 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b61c8803-16f3-4c35-9b17-6f65f441df86 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: /NktHu3C2+TdLLRaXVwtWtpdx9bHPpbt9dY/MVPO11KSXczoMEbWbPPTn93O0fdWnro5+4d6yO+zRoETkkwbdw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR04MB5597 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org This patch implements all kvm__arch_ Guest/VM arch functions. These functions mostly deal with: 1. Guest/VM RAM initialization 2. Updating terminals on character read 3. Loading kernel and initrd images Firmware loading is not implemented currently because initially we will be booting kernel directly without any bootloader. In future, we will certainly support firmware loading. Signed-off-by: Anup Patel --- riscv/include/kvm/kvm-arch.h | 15 +++++ riscv/kvm.c | 126 +++++++++++++++++++++++++++++++++-- 2 files changed, 135 insertions(+), 6 deletions(-) diff --git a/riscv/include/kvm/kvm-arch.h b/riscv/include/kvm/kvm-arch.h index 7e9c578..b3ec2d6 100644 --- a/riscv/include/kvm/kvm-arch.h +++ b/riscv/include/kvm/kvm-arch.h @@ -45,6 +45,21 @@ struct kvm; struct kvm_arch { + /* + * We may have to align the guest memory for virtio, so keep the + * original pointers here for munmap. + */ + void *ram_alloc_start; + u64 ram_alloc_size; + + /* + * Guest addresses for memory layout. + */ + u64 memory_guest_start; + u64 kern_guest_start; + u64 initrd_guest_start; + u64 initrd_size; + u64 dtb_guest_start; }; static inline bool riscv_addr_in_ioport_region(u64 phys_addr) diff --git a/riscv/kvm.c b/riscv/kvm.c index e816ef5..c0d3639 100644 --- a/riscv/kvm.c +++ b/riscv/kvm.c @@ -1,5 +1,7 @@ #include "kvm/kvm.h" #include "kvm/util.h" +#include "kvm/8250-serial.h" +#include "kvm/virtio-console.h" #include "kvm/fdt.h" #include @@ -19,33 +21,145 @@ bool kvm__arch_cpu_supports_vm(void) void kvm__init_ram(struct kvm *kvm) { - /* TODO: */ + int err; + u64 phys_start, phys_size; + void *host_mem; + + phys_start = RISCV_RAM; + phys_size = kvm->ram_size; + host_mem = kvm->ram_start; + + err = kvm__register_ram(kvm, phys_start, phys_size, host_mem); + if (err) + die("Failed to register %lld bytes of memory at physical " + "address 0x%llx [err %d]", phys_size, phys_start, err); + + kvm->arch.memory_guest_start = phys_start; } void kvm__arch_delete_ram(struct kvm *kvm) { - /* TODO: */ + munmap(kvm->arch.ram_alloc_start, kvm->arch.ram_alloc_size); } void kvm__arch_read_term(struct kvm *kvm) { - /* TODO: */ + serial8250__update_consoles(kvm); + virtio_console__inject_interrupt(kvm); } void kvm__arch_set_cmdline(char *cmdline, bool video) { - /* TODO: */ } void kvm__arch_init(struct kvm *kvm, const char *hugetlbfs_path, u64 ram_size) { - /* TODO: */ + /* + * Allocate guest memory. We must align our buffer to 64K to + * correlate with the maximum guest page size for virtio-mmio. + * If using THP, then our minimal alignment becomes 2M. + * 2M trumps 64K, so let's go with that. + */ + kvm->ram_size = min(ram_size, (u64)RISCV_MAX_MEMORY(kvm)); + kvm->arch.ram_alloc_size = kvm->ram_size + SZ_2M; + kvm->arch.ram_alloc_start = mmap_anon_or_hugetlbfs(kvm, hugetlbfs_path, + kvm->arch.ram_alloc_size); + + if (kvm->arch.ram_alloc_start == MAP_FAILED) + die("Failed to map %lld bytes for guest memory (%d)", + kvm->arch.ram_alloc_size, errno); + + kvm->ram_start = (void *)ALIGN((unsigned long)kvm->arch.ram_alloc_start, + SZ_2M); + + madvise(kvm->arch.ram_alloc_start, kvm->arch.ram_alloc_size, + MADV_MERGEABLE); + + madvise(kvm->arch.ram_alloc_start, kvm->arch.ram_alloc_size, + MADV_HUGEPAGE); } +#define FDT_ALIGN SZ_4M +#define INITRD_ALIGN 4 bool kvm__arch_load_kernel_image(struct kvm *kvm, int fd_kernel, int fd_initrd, const char *kernel_cmdline) { - /* TODO: */ + void *pos, *kernel_end, *limit; + unsigned long guest_addr, kernel_offset; + ssize_t file_size; + + /* + * Linux requires the initrd and dtb to be mapped inside lowmem, + * so we can't just place them at the top of memory. + */ + limit = kvm->ram_start + min(kvm->ram_size, (u64)SZ_256M) - 1; + +#if __riscv_xlen == 64 + /* Linux expects to be booted at 2M boundary for RV64 */ + kernel_offset = 0x200000; +#else + /* Linux expects to be booted at 4M boundary for RV32 */ + kernel_offset = 0x400000; +#endif + + pos = kvm->ram_start + kernel_offset; + kvm->arch.kern_guest_start = host_to_guest_flat(kvm, pos); + file_size = read_file(fd_kernel, pos, limit - pos); + if (file_size < 0) { + if (errno == ENOMEM) + die("kernel image too big to fit in guest memory."); + + die_perror("kernel read"); + } + kernel_end = pos + file_size; + pr_debug("Loaded kernel to 0x%llx (%zd bytes)", + kvm->arch.kern_guest_start, file_size); + + /* Place FDT just after kernel at FDT_ALIGN address */ + pos = kernel_end + FDT_ALIGN; + guest_addr = ALIGN(host_to_guest_flat(kvm, pos), FDT_ALIGN); + pos = guest_flat_to_host(kvm, guest_addr); + if (pos < kernel_end) + die("fdt overlaps with kernel image."); + + kvm->arch.dtb_guest_start = guest_addr; + pr_debug("Placing fdt at 0x%llx - 0x%llx", + kvm->arch.dtb_guest_start, + host_to_guest_flat(kvm, limit)); + limit = pos; + + /* ... and finally the initrd, if we have one. */ + if (fd_initrd != -1) { + struct stat sb; + unsigned long initrd_start; + + if (fstat(fd_initrd, &sb)) + die_perror("fstat"); + + pos -= (sb.st_size + INITRD_ALIGN); + guest_addr = ALIGN(host_to_guest_flat(kvm, pos), INITRD_ALIGN); + pos = guest_flat_to_host(kvm, guest_addr); + if (pos < kernel_end) + die("initrd overlaps with kernel image."); + + initrd_start = guest_addr; + file_size = read_file(fd_initrd, pos, limit - pos); + if (file_size == -1) { + if (errno == ENOMEM) + die("initrd too big to fit in guest memory."); + + die_perror("initrd read"); + } + + kvm->arch.initrd_guest_start = initrd_start; + kvm->arch.initrd_size = file_size; + pr_debug("Loaded initrd to 0x%llx (%llu bytes)", + kvm->arch.initrd_guest_start, + kvm->arch.initrd_size); + } else { + kvm->arch.initrd_size = 0; + } + return true; } From patchwork Wed Dec 25 03:00:27 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Anup Patel X-Patchwork-Id: 11309959 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 7D01514E3 for ; Wed, 25 Dec 2019 03:00:31 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 5185A206B7 for ; Wed, 25 Dec 2019 03:00:31 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=wdc.com header.i=@wdc.com header.b="GeKLGDmD"; dkim=pass (1024-bit key) header.d=sharedspace.onmicrosoft.com header.i=@sharedspace.onmicrosoft.com header.b="zLwE/Lh5" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726910AbfLYDAa (ORCPT ); Tue, 24 Dec 2019 22:00:30 -0500 Received: from esa5.hgst.iphmx.com ([216.71.153.144]:60709 "EHLO esa5.hgst.iphmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726887AbfLYDAa (ORCPT ); Tue, 24 Dec 2019 22:00:30 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=wdc.com; i=@wdc.com; q=dns/txt; s=dkim.wdc.com; t=1577242829; x=1608778829; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=+eY7UwcGW1TQ1xVqRTxG+DnSYAtMBXh/oQGI0v+94wo=; b=GeKLGDmDTBZLwkfBz9ofiiClj/5xbK/tX/C/WKW0dzX+feR/zCoxwYtC 31g8yipK3KjxdpkuV2xHlOkqZewBPtuNKbJVy/BmyunBlqdfafXLOGLJZ 3D7uvxYlLh7ueFJIjI8WACsAvnmaJBQgBYp4FCjECv4VjWs65wHabNXuE tfpKS3xhS6ZgUN1ZKo2pVdXDKN8qRUbB9CXt16KlBhdk1YMFptEacAHHy ovq67bOibDy2cYIJQlYxKwFNez9f+nfM8VKgOQ7vSqyoSbSSqfn/wUDV3 JLVnTafM99rxROfLUTN8CaJh7jkyGuL9sy7SDHumSBNfLadsDFHiWVD0P w==; IronPort-SDR: xzyJtRzz6aaBDltoGmi2K6AtO3It2oHjnQUIyJcjyYxJ6NoRbdWO8faxGSRgPOt6Jld0dcUG+G N3Dh6ES7xnXuNHbhOOyIZGOZ+VF6+icJmV3W37c/iiIwCKDJhpp3YGGtFArtuxS0Ox5+Auk9ta aDCywjUTx2ybY+NlswBREHF6Ej7svfgEHD01dMfy0dOZIpSK6xLZ62ksfuGn76hMxvgbb+Fbta EBrAmd5KCBC18dp4S3ZkJVoQiadOyemL4IWi5hTiMsMPMY2+NPsNJHFZO5Ew1u13Wp4FiLycgA f/A= X-IronPort-AV: E=Sophos;i="5.69,353,1571673600"; d="scan'208";a="126854682" Received: from mail-dm6nam11lp2173.outbound.protection.outlook.com (HELO NAM11-DM6-obe.outbound.protection.outlook.com) ([104.47.57.173]) by ob1.hgst.iphmx.com with ESMTP; 25 Dec 2019 11:00:29 +0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=KbKNV/9tKE0ikMGgsJhQfTgSNbMn1E4dL6lAIrjcHtmQzVtiP2tMJ7krrUc+hPIYejtnqWkNSY5CaBtBH1J9Rf0i9C2Mxe/nrrhoizEpLP+oheRuy5+z1sY9gHoo6nCZWT7kyjKGDQhl4meRGXbDyza2VrLEJCuIO6MfpOOHfI2or+UHbpjNRPKDtIBX8LemS/mwFBlreMh5mP/ZNs9NMuVqbnpg6cfIeoOIP5SvECgF8o8o8/MTYnzOH/ZEntXisBFejWPQ/XBXemQANuXp0ms0xtUhBKyrv9TrRTpERzGfgOasX6y61Nh6/7fYrLxCsfZt1ckEhQDjWqDr21c93w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lunjEF3xLLuQo/PJM+P5xoW0YLs8DF8eyWrT6+nz6BY=; b=Rz1BhlAWBE/bwvDWF0d7htZbhMt8164txQJxu5wB/+qOe23p0svRir40/UGyTIFftn8YsgN8KCfqQXfU3dL58ImIZW9rXq9z5McVIeruIM7S1bHGKipbwIyHW+YR9Pf6Ncx21WMkfck6PTysn22gZkDDoHkRXpOU/lJxJaNncT9TdFycjR4oKb7mckwSaSzT82IIk6kZaL7cnfgA50d4lE1Qrwf3GQnu37O0V9buLfSEZWziR6lZ5Jrtf75plQWFlpEn9WYmtL+VNObF9EKmZ9z5RulNbPxsn+lWXQl3VZdxz1mWUemdmZNMqvKsnvHPNKaDQ/1MWZEhpcwjTspovw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=wdc.com; dmarc=pass action=none header.from=wdc.com; dkim=pass header.d=wdc.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sharedspace.onmicrosoft.com; s=selector2-sharedspace-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lunjEF3xLLuQo/PJM+P5xoW0YLs8DF8eyWrT6+nz6BY=; b=zLwE/Lh55UvGVdCAI+WTl2cJPy4ewvwPNNBUEVmZKRxME/ZORYSeGe+Aci9x3wsWTER7r6YPGTfPPvC3MH0XWFUEJpWEQNt8zAMHCr/up6vHau1fctJqwIqGXBU1fjzEUP8L2jHOI6Zr9fPjLh+9rTueWvHfCzlk56nkN4OzeZU= Received: from MN2PR04MB6061.namprd04.prod.outlook.com (20.178.246.15) by MN2PR04MB5597.namprd04.prod.outlook.com (20.179.22.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2581.11; Wed, 25 Dec 2019 03:00:27 +0000 Received: from MN2PR04MB6061.namprd04.prod.outlook.com ([fe80::a9a0:3ffa:371f:ad89]) by MN2PR04MB6061.namprd04.prod.outlook.com ([fe80::a9a0:3ffa:371f:ad89%7]) with mapi id 15.20.2559.017; Wed, 25 Dec 2019 03:00:27 +0000 Received: from wdc.com (106.51.19.73) by MAXPR01CA0084.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:49::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2581.11 via Frontend Transport; Wed, 25 Dec 2019 03:00:25 +0000 From: Anup Patel To: Will Deacon CC: Paolo Bonzini , Atish Patra , Alistair Francis , Anup Patel , "kvm@vger.kernel.org" , "kvm-riscv@lists.infradead.org" , Anup Patel Subject: [kvmtool RFC PATCH 4/8] riscv: Implement Guest/VM VCPU arch functions Thread-Topic: [kvmtool RFC PATCH 4/8] riscv: Implement Guest/VM VCPU arch functions Thread-Index: AQHVus92sNNicOn2XEqL3+OyR0jqEw== Date: Wed, 25 Dec 2019 03:00:27 +0000 Message-ID: <20191225025945.108466-5-anup.patel@wdc.com> References: <20191225025945.108466-1-anup.patel@wdc.com> In-Reply-To: <20191225025945.108466-1-anup.patel@wdc.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-clientproxiedby: MAXPR01CA0084.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:49::26) To MN2PR04MB6061.namprd04.prod.outlook.com (2603:10b6:208:d8::15) authentication-results: spf=none (sender IP is ) smtp.mailfrom=Anup.Patel@wdc.com; x-ms-exchange-messagesentrepresentingtype: 1 x-mailer: git-send-email 2.17.1 x-originating-ip: [106.51.19.73] x-ms-publictraffictype: Email x-ms-office365-filtering-ht: Tenant x-ms-office365-filtering-correlation-id: 8605f17e-5436-4ef6-2f0a-08d788e69861 x-ms-traffictypediagnostic: MN2PR04MB5597: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: wdcipoutbound: EOP-TRUE x-ms-oob-tlc-oobclassifiers: OLM:6790; x-forefront-prvs: 02622CEF0A x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(4636009)(39860400002)(136003)(346002)(376002)(366004)(396003)(199004)(189003)(5660300002)(86362001)(2906002)(4326008)(54906003)(81156014)(81166006)(66946007)(8676002)(1076003)(6916009)(8886007)(71200400001)(44832011)(66556008)(64756008)(1006002)(66446008)(52116002)(66476007)(55236004)(7696005)(16526019)(186003)(316002)(26005)(55016002)(956004)(2616005)(36756003)(478600001)(30864003)(8936002)(32040200004);DIR:OUT;SFP:1102;SCL:1;SRVR:MN2PR04MB5597;H:MN2PR04MB6061.namprd04.prod.outlook.com;FPR:;SPF:None;LANG:en;PTR:InfoNoRecords;A:1;MX:1; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 MIME-Version: 1.0 X-OriginatorOrg: wdc.com X-MS-Exchange-CrossTenant-Network-Message-Id: 8605f17e-5436-4ef6-2f0a-08d788e69861 X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Dec 2019 03:00:27.8674 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b61c8803-16f3-4c35-9b17-6f65f441df86 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: vVeISnIcGHZONxCrzyX+GN+5yGRmGOiJuIfl4l6iVi7MfuDoUVX1k72M/3YXxmZFruoeE9k7m0VMEPQLI8YNGg== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR04MB5597 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org This patch implements kvm_cpu__ Guest/VM VCPU arch functions. These functions mostly deal with: 1. VCPU allocation and initialization 2. VCPU reset 3. VCPU show/dump code 4. VCPU show/dump registers We also save RISC-V ISA, XLEN, and TIMEBASE frequency for each VCPU so that it can be later used for generating Guest/VM FDT. Signed-off-by: Anup Patel --- riscv/include/kvm/kvm-cpu-arch.h | 4 + riscv/kvm-cpu.c | 307 ++++++++++++++++++++++++++++++- 2 files changed, 304 insertions(+), 7 deletions(-) diff --git a/riscv/include/kvm/kvm-cpu-arch.h b/riscv/include/kvm/kvm-cpu-arch.h index 09a50e8..035965e 100644 --- a/riscv/include/kvm/kvm-cpu-arch.h +++ b/riscv/include/kvm/kvm-cpu-arch.h @@ -14,6 +14,10 @@ struct kvm_cpu { unsigned long cpu_id; + unsigned long riscv_xlen; + unsigned long riscv_isa; + unsigned long riscv_timebase; + struct kvm *kvm; int vcpu_fd; struct kvm_run *kvm_run; diff --git a/riscv/kvm-cpu.c b/riscv/kvm-cpu.c index e4b8fa5..1565275 100644 --- a/riscv/kvm-cpu.c +++ b/riscv/kvm-cpu.c @@ -17,10 +17,84 @@ int kvm_cpu__get_debug_fd(void) return debug_fd; } +static __u64 __kvm_reg_id(__u64 type, __u64 idx) +{ + __u64 id = KVM_REG_RISCV | type | idx; + + if (sizeof(unsigned long) == 8) + id |= KVM_REG_SIZE_U64; + else + id |= KVM_REG_SIZE_U32; + + return id; +} + +#define RISCV_CONFIG_REG(name) __kvm_reg_id(KVM_REG_RISCV_CONFIG, \ + KVM_REG_RISCV_CONFIG_REG(name)) + +#define RISCV_CORE_REG(name) __kvm_reg_id(KVM_REG_RISCV_CORE, \ + KVM_REG_RISCV_CORE_REG(name)) + +#define RISCV_CSR_REG(name) __kvm_reg_id(KVM_REG_RISCV_CSR, \ + KVM_REG_RISCV_CSR_REG(name)) + +#define RISCV_TIMER_REG(name) __kvm_reg_id(KVM_REG_RISCV_TIMER, \ + KVM_REG_RISCV_TIMER_REG(name)) + struct kvm_cpu *kvm_cpu__arch_init(struct kvm *kvm, unsigned long cpu_id) { - /* TODO: */ - return NULL; + struct kvm_cpu *vcpu; + unsigned long timebase = 0, isa = 0; + int coalesced_offset, mmap_size; + struct kvm_one_reg reg; + + vcpu = calloc(1, sizeof(struct kvm_cpu)); + if (!vcpu) + return NULL; + + vcpu->vcpu_fd = ioctl(kvm->vm_fd, KVM_CREATE_VCPU, cpu_id); + if (vcpu->vcpu_fd < 0) + die_perror("KVM_CREATE_VCPU ioctl"); + + reg.id = RISCV_CONFIG_REG(isa); + reg.addr = (unsigned long)&isa; + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (config.isa)"); + + reg.id = RISCV_TIMER_REG(frequency); + reg.addr = (unsigned long)&timebase; + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (config.timebase)"); + + mmap_size = ioctl(kvm->sys_fd, KVM_GET_VCPU_MMAP_SIZE, 0); + if (mmap_size < 0) + die_perror("KVM_GET_VCPU_MMAP_SIZE ioctl"); + + vcpu->kvm_run = mmap(NULL, mmap_size, PROT_RW, MAP_SHARED, + vcpu->vcpu_fd, 0); + if (vcpu->kvm_run == MAP_FAILED) + die("unable to mmap vcpu fd"); + + coalesced_offset = ioctl(kvm->sys_fd, KVM_CHECK_EXTENSION, + KVM_CAP_COALESCED_MMIO); + if (coalesced_offset) + vcpu->ring = (void *)vcpu->kvm_run + + (coalesced_offset * PAGE_SIZE); + + reg.id = RISCV_CONFIG_REG(isa); + reg.addr = (unsigned long)&isa; + if (ioctl(vcpu->vcpu_fd, KVM_SET_ONE_REG, ®) < 0) + die("KVM_SET_ONE_REG failed (config.isa)"); + + /* Populate the vcpu structure. */ + vcpu->kvm = kvm; + vcpu->cpu_id = cpu_id; + vcpu->riscv_isa = isa; + vcpu->riscv_xlen = __riscv_xlen; + vcpu->riscv_timebase = timebase; + vcpu->is_running = true; + + return vcpu; } void kvm_cpu__arch_nmi(struct kvm_cpu *cpu) @@ -29,7 +103,7 @@ void kvm_cpu__arch_nmi(struct kvm_cpu *cpu) void kvm_cpu__delete(struct kvm_cpu *vcpu) { - /* TODO: */ + free(vcpu); } bool kvm_cpu__handle_exit(struct kvm_cpu *vcpu) @@ -40,12 +114,43 @@ bool kvm_cpu__handle_exit(struct kvm_cpu *vcpu) void kvm_cpu__show_page_tables(struct kvm_cpu *vcpu) { - /* TODO: */ } void kvm_cpu__reset_vcpu(struct kvm_cpu *vcpu) { - /* TODO: */ + struct kvm *kvm = vcpu->kvm; + struct kvm_mp_state mp_state; + struct kvm_one_reg reg; + unsigned long data; + + if (ioctl(vcpu->vcpu_fd, KVM_GET_MP_STATE, &mp_state) < 0) + die_perror("KVM_GET_MP_STATE failed"); + + /* + * If MP state is stopped then it means Linux KVM RISC-V emulates + * SBI v0.2 (or higher) with HART power managment and give VCPU + * will power-up at boot-time by boot VCPU. For such VCPU, we + * don't update PC, A0 and A1 here. + */ + if (mp_state.mp_state == KVM_MP_STATE_STOPPED) + return; + + reg.addr = (unsigned long)&data; + + data = kvm->arch.kern_guest_start; + reg.id = RISCV_CORE_REG(regs.pc); + if (ioctl(vcpu->vcpu_fd, KVM_SET_ONE_REG, ®) < 0) + die_perror("KVM_SET_ONE_REG failed (pc)"); + + data = vcpu->cpu_id; + reg.id = RISCV_CORE_REG(regs.a0); + if (ioctl(vcpu->vcpu_fd, KVM_SET_ONE_REG, ®) < 0) + die_perror("KVM_SET_ONE_REG failed (a0)"); + + data = kvm->arch.dtb_guest_start; + reg.id = RISCV_CORE_REG(regs.a1); + if (ioctl(vcpu->vcpu_fd, KVM_SET_ONE_REG, ®) < 0) + die_perror("KVM_SET_ONE_REG failed (a1)"); } int kvm_cpu__get_endianness(struct kvm_cpu *vcpu) @@ -55,10 +160,198 @@ int kvm_cpu__get_endianness(struct kvm_cpu *vcpu) void kvm_cpu__show_code(struct kvm_cpu *vcpu) { - /* TODO: */ + struct kvm_one_reg reg; + unsigned long data; + int debug_fd = kvm_cpu__get_debug_fd(); + + reg.addr = (unsigned long)&data; + + dprintf(debug_fd, "\n*PC:\n"); + reg.id = RISCV_CORE_REG(regs.pc); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (show_code @ PC)"); + + kvm__dump_mem(vcpu->kvm, data, 32, debug_fd); + + dprintf(debug_fd, "\n*RA:\n"); + reg.id = RISCV_CORE_REG(regs.ra); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (show_code @ RA)"); + + kvm__dump_mem(vcpu->kvm, data, 32, debug_fd); } void kvm_cpu__show_registers(struct kvm_cpu *vcpu) { - /* TODO: */ + struct kvm_one_reg reg; + unsigned long data; + int debug_fd = kvm_cpu__get_debug_fd(); + + reg.addr = (unsigned long)&data; + dprintf(debug_fd, "\n Registers:\n"); + + reg.id = RISCV_CORE_REG(mode); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (mode)"); + dprintf(debug_fd, " MODE: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.pc); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (pc)"); + dprintf(debug_fd, " PC: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.ra); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (ra)"); + dprintf(debug_fd, " RA: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.sp); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (sp)"); + dprintf(debug_fd, " SP: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.gp); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (gp)"); + dprintf(debug_fd, " GP: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.tp); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (tp)"); + dprintf(debug_fd, " TP: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.t0); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (t0)"); + dprintf(debug_fd, " T0: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.t1); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (t1)"); + dprintf(debug_fd, " T1: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.t2); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (t2)"); + dprintf(debug_fd, " T2: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.s0); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (s0)"); + dprintf(debug_fd, " S0: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.s1); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (s1)"); + dprintf(debug_fd, " S1: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.a0); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (a0)"); + dprintf(debug_fd, " A0: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.a1); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (a1)"); + dprintf(debug_fd, " A1: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.a2); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (a2)"); + dprintf(debug_fd, " A2: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.a3); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (a3)"); + dprintf(debug_fd, " A3: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.a4); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (a4)"); + dprintf(debug_fd, " A4: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.a5); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (a5)"); + dprintf(debug_fd, " A5: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.a6); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (a6)"); + dprintf(debug_fd, " A6: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.a7); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (a7)"); + dprintf(debug_fd, " A7: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.s2); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (s2)"); + dprintf(debug_fd, " S2: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.s3); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (s3)"); + dprintf(debug_fd, " S3: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.s4); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (s4)"); + dprintf(debug_fd, " S4: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.s5); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (s5)"); + dprintf(debug_fd, " S5: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.s6); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (s6)"); + dprintf(debug_fd, " S6: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.s7); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (s7)"); + dprintf(debug_fd, " S7: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.s8); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (s8)"); + dprintf(debug_fd, " S8: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.s9); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (s9)"); + dprintf(debug_fd, " S9: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.s10); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (s10)"); + dprintf(debug_fd, " S10: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.s11); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (s11)"); + dprintf(debug_fd, " S11: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.t3); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (t3)"); + dprintf(debug_fd, " T3: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.t4); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (t4)"); + dprintf(debug_fd, " T4: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.t5); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (t5)"); + dprintf(debug_fd, " T5: 0x%lx\n", data); + + reg.id = RISCV_CORE_REG(regs.t6); + if (ioctl(vcpu->vcpu_fd, KVM_GET_ONE_REG, ®) < 0) + die("KVM_GET_ONE_REG failed (t6)"); + dprintf(debug_fd, " T6: 0x%lx\n", data); } From patchwork Wed Dec 25 03:00:31 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Anup Patel X-Patchwork-Id: 11309961 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id C3089138C for ; Wed, 25 Dec 2019 03:00:42 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 8C33420679 for ; Wed, 25 Dec 2019 03:00:42 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=wdc.com header.i=@wdc.com header.b="aEP0wFkJ"; dkim=pass (1024-bit key) header.d=sharedspace.onmicrosoft.com header.i=@sharedspace.onmicrosoft.com header.b="G3026v8S" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726890AbfLYDAl (ORCPT ); Tue, 24 Dec 2019 22:00:41 -0500 Received: from esa2.hgst.iphmx.com ([68.232.143.124]:18614 "EHLO esa2.hgst.iphmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726885AbfLYDAl (ORCPT ); Tue, 24 Dec 2019 22:00:41 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=wdc.com; i=@wdc.com; q=dns/txt; s=dkim.wdc.com; t=1577242849; x=1608778849; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=Z1KQCJU7OqrmIu8kb2t7FriYvpjXbdmCGzYQCEfjYAY=; b=aEP0wFkJdHUjOdfFZx5tOg1BQp21EKWuyfo8WyedI7wXl+rKJmpbl7TA wK4IVnaoPw+OIJF8Ql/LUbAoKxS/qtlhYXL0B/PBubj/aS/shKTqgfw1S Ds1gCDQpRQhvKyOs8c6/0kTM8tOwNgHxlDftiCBPv42a+pdbuk4O1dO3l 7S0+9nkG4Bg9qp5vorGg6uYUiYD6xaJuche3X6ws/UWWKqeecElr6G/aR QcYw0zhGyLnI23E3gM+qoyfGurY992Or9no5L9+8ACf/FYur6UDNx9cCL sJQRc8ppWzF0HhsL2XBkalOBiteJrP4pxOSllC7cve6Rkxpof208herwT w==; IronPort-SDR: NJ5S9sABdAMGpcdMb5n49CRYg2kkV8Lm7Wke5xGr4i2Svkbxq5GtZx9mMWPTLa4n3cvsokmc3u 9C06byaEukTLaaSRxjwYzAo/tPKu2pL3/Oyx5eSqdhbGRd9bphUMbJyKym6EEGFaOcnerLxnRJ ec3+Er6A//tQGFqHhoEQlrQfK/tdA1+yh5YQqbcH/rZrGDydCZs3fZ2CEDPXVDcBQ+ruTEGII7 LPV4KTrY9MKmDSaLfiaAsS4JgelIvoG6sos1kLdgTc+sl5qP4Jcuc6nJ7Mjr7WoWjg0zMhCHuw R4s= X-IronPort-AV: E=Sophos;i="5.69,353,1571673600"; d="scan'208";a="227751809" Received: from mail-dm6nam11lp2169.outbound.protection.outlook.com (HELO NAM11-DM6-obe.outbound.protection.outlook.com) ([104.47.57.169]) by ob1.hgst.iphmx.com with ESMTP; 25 Dec 2019 11:00:37 +0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=NoQDgCbioUfVKGEsVI9MXndbY7L0dW+JcFKMjrqXhVmVEPZ5m0B7dfGuAtZSfhaayViM1Wrhyhfn7r5ktLlyND4JblskVdqwkXQpC15G2YwAmvglooKnjvb79OnR/xdl3Bs2whFLSu6prMlcmV2cMkh6qgLf5dWMnEJyhSWoHfjY3MhUL9I5eZfKu6yCkWWTkZFRERp2H6xJBrDgADZdrxZhYU7BV2sxEBDMutet1dIZYPPyy8RP5Sk8Idi9Bw5dnWQD0uFPHZ3OGCFQhNZ/KlVchHIhxnHdgXJwURj6TK71sYrhssDmBHxBfgjbY3DO6liSEw9+oVshEquK59XUsg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1QtRrVZcguk/w81Ouv/LVIlRAFQD0WcN63iWf9vW9Zo=; b=WEL/kw0nTdTqVZVowG6WoseK8HYmRJmm9JOKPt1E6D99LnxWKtfzNUfArnBiZ6iuxUJyyWv7+OWpF14tvSch2uBxGjVgJGFay/CHTI8oad1RFkDoPYADhWOEiWVt1kJWPz/q0RtcODV2rAyWLgNY6JVfhzNqxEtn5IN1KvOT/14SOI9Ei8yM/c8AYCt8s2y4Dxn6k8aSsehvQkiINfgFoD/mx9nlYj2WhCN2E5bwMCvtnQIq/LChfd8E+krS/pwzcgQFiPIrVvqapnTduaOND+htfJNgl3Aetde+KKk1wXUMTc0moRFQhmze6yNw6vjP4i+pY5/CRmzrs7o0cWWhzg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=wdc.com; dmarc=pass action=none header.from=wdc.com; dkim=pass header.d=wdc.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sharedspace.onmicrosoft.com; s=selector2-sharedspace-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1QtRrVZcguk/w81Ouv/LVIlRAFQD0WcN63iWf9vW9Zo=; b=G3026v8SFt1Ri3Aw3qckt+6SttVmKRbySbteitWYtfr698hoNbvPOCUiEFyjjcOE5oXhN7NRYjIgBbkpeO095ovAcfOI9rHqWirgoLyk6/rW6WKwa5R2GSybAezfvzqj1zxv/pcrwAuED2viKEAG/Iu7B+4yTrMLg2EXNJWo7UE= Received: from MN2PR04MB6061.namprd04.prod.outlook.com (20.178.246.15) by MN2PR04MB5597.namprd04.prod.outlook.com (20.179.22.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2581.11; Wed, 25 Dec 2019 03:00:31 +0000 Received: from MN2PR04MB6061.namprd04.prod.outlook.com ([fe80::a9a0:3ffa:371f:ad89]) by MN2PR04MB6061.namprd04.prod.outlook.com ([fe80::a9a0:3ffa:371f:ad89%7]) with mapi id 15.20.2559.017; Wed, 25 Dec 2019 03:00:31 +0000 Received: from wdc.com (106.51.19.73) by MAXPR01CA0084.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:49::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2581.11 via Frontend Transport; Wed, 25 Dec 2019 03:00:29 +0000 From: Anup Patel To: Will Deacon CC: Paolo Bonzini , Atish Patra , Alistair Francis , Anup Patel , "kvm@vger.kernel.org" , "kvm-riscv@lists.infradead.org" , Anup Patel Subject: [kvmtool RFC PATCH 5/8] riscv: Add PLIC device emulation Thread-Topic: [kvmtool RFC PATCH 5/8] riscv: Add PLIC device emulation Thread-Index: AQHVus94YrC0lLHbe0yijyK7/5iGxw== Date: Wed, 25 Dec 2019 03:00:31 +0000 Message-ID: <20191225025945.108466-6-anup.patel@wdc.com> References: <20191225025945.108466-1-anup.patel@wdc.com> In-Reply-To: <20191225025945.108466-1-anup.patel@wdc.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-clientproxiedby: MAXPR01CA0084.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:49::26) To MN2PR04MB6061.namprd04.prod.outlook.com (2603:10b6:208:d8::15) authentication-results: spf=none (sender IP is ) smtp.mailfrom=Anup.Patel@wdc.com; x-ms-exchange-messagesentrepresentingtype: 1 x-mailer: git-send-email 2.17.1 x-originating-ip: [106.51.19.73] x-ms-publictraffictype: Email x-ms-office365-filtering-ht: Tenant x-ms-office365-filtering-correlation-id: e4b671c8-1b20-4c67-1530-08d788e69ab4 x-ms-traffictypediagnostic: MN2PR04MB5597: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: wdcipoutbound: EOP-TRUE x-ms-oob-tlc-oobclassifiers: OLM:5236; x-forefront-prvs: 02622CEF0A x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(4636009)(39860400002)(136003)(346002)(376002)(366004)(396003)(199004)(189003)(5660300002)(86362001)(2906002)(4326008)(54906003)(81156014)(81166006)(66946007)(8676002)(1076003)(6916009)(8886007)(71200400001)(44832011)(6666004)(66556008)(64756008)(1006002)(66446008)(52116002)(66476007)(55236004)(7696005)(16526019)(186003)(316002)(26005)(55016002)(956004)(2616005)(36756003)(478600001)(30864003)(8936002)(32040200004);DIR:OUT;SFP:1102;SCL:1;SRVR:MN2PR04MB5597;H:MN2PR04MB6061.namprd04.prod.outlook.com;FPR:;SPF:None;LANG:en;PTR:InfoNoRecords;A:1;MX:1; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: MZx2TfkU45wN2KIwTES949QN9j5GUw2ZfDLU276lZQez1UqL0x4u4PNozXDbThGqjVIIRZ2XqISXJRkjBEz0QRDJZduVOEMqMjc1zTX1kWYCRR4E5nKFubIoFmjmhLe9N4rTMiXEkNV/sohlD9l7A0eIskYdtNaAKFVUCOvJLmJG2ne6WKHu4GmCd5Bviybq+wQE41ifJF8NPHb54S2hwQWPEQvZIfEUp5LnF9N4kHDf5siNk0frfrKpDNVDgssVEbG7veK3yc9OoN4/3fgU5eLst5zqJZumePpCC/ZAct9mUol4w865SBY8lr/j8J38GlBt1aLdDoswdWL3CKTKUNUd2whatZ4fK7fiUTZohrxoAbyqPfzqkX0GAX+2kaAbibANwHmYaRXgwhuEqOAnNceZ3qYd6NIqoLJB1aUle09wkULGB8MvaBQs64CVQdm2rqNLsva989uQth/2ITnVgusFDM+lTSzaTv3t4eHl7xvlXzaqGgawYlfNYFbtMvpC MIME-Version: 1.0 X-OriginatorOrg: wdc.com X-MS-Exchange-CrossTenant-Network-Message-Id: e4b671c8-1b20-4c67-1530-08d788e69ab4 X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Dec 2019 03:00:31.7951 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b61c8803-16f3-4c35-9b17-6f65f441df86 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: xcupOhQ8OsFzN6fO8FiOK8rJZ8ZYQubRo1wuA6Sn98cbhe5CppaSK0Y/M308D1O11SN8PZn5S2+e1j6XSq3G9g== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR04MB5597 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org The PLIC (platform level interrupt controller) manages peripheral interrupts in RISC-V world. The per-CPU interrupts are managed using CPU CSRs hence virtualized in-kernel by KVM RISC-V. This patch adds PLIC device emulation for KVMTOOL RISC-V. Signed-off-by: Anup Patel --- Makefile | 1 + riscv/include/kvm/kvm-arch.h | 2 + riscv/irq.c | 4 +- riscv/plic.c | 508 +++++++++++++++++++++++++++++++++++ 4 files changed, 513 insertions(+), 2 deletions(-) create mode 100644 riscv/plic.c diff --git a/Makefile b/Makefile index 972fa63..3220ad3 100644 --- a/Makefile +++ b/Makefile @@ -200,6 +200,7 @@ ifeq ($(ARCH),riscv) OBJS += riscv/irq.o OBJS += riscv/kvm.o OBJS += riscv/kvm-cpu.o + OBJS += riscv/plic.o ARCH_WANT_LIBFDT := y endif diff --git a/riscv/include/kvm/kvm-arch.h b/riscv/include/kvm/kvm-arch.h index b3ec2d6..b1af70f 100644 --- a/riscv/include/kvm/kvm-arch.h +++ b/riscv/include/kvm/kvm-arch.h @@ -70,4 +70,6 @@ static inline bool riscv_addr_in_ioport_region(u64 phys_addr) enum irq_type; +void plic__irq_trig(struct kvm *kvm, int irq, int level, bool edge); + #endif /* KVM__KVM_ARCH_H */ diff --git a/riscv/irq.c b/riscv/irq.c index 8e605ef..78a582d 100644 --- a/riscv/irq.c +++ b/riscv/irq.c @@ -4,10 +4,10 @@ void kvm__irq_line(struct kvm *kvm, int irq, int level) { - /* TODO: */ + plic__irq_trig(kvm, irq, level, false); } void kvm__irq_trigger(struct kvm *kvm, int irq) { - /* TODO: */ + plic__irq_trig(kvm, irq, 1, true); } diff --git a/riscv/plic.c b/riscv/plic.c new file mode 100644 index 0000000..93bfbc5 --- /dev/null +++ b/riscv/plic.c @@ -0,0 +1,508 @@ + +#include "kvm/devices.h" +#include "kvm/ioeventfd.h" +#include "kvm/ioport.h" +#include "kvm/kvm.h" +#include "kvm/kvm-cpu.h" +#include "kvm/irq.h" +#include "kvm/mutex.h" + +#include +#include +#include +#include + +/* + * From the RISC-V Privlidged Spec v1.10: + * + * Global interrupt sources are assigned small unsigned integer identifiers, + * beginning at the value 1. An interrupt ID of 0 is reserved to mean no + * interrupt. Interrupt identifiers are also used to break ties when two or + * more interrupt sources have the same assigned priority. Smaller values of + * interrupt ID take precedence over larger values of interrupt ID. + * + * While the RISC-V supervisor spec doesn't define the maximum number of + * devices supported by the PLIC, the largest number supported by devices + * marked as 'riscv,plic0' (which is the only device type this driver supports, + * and is the only extant PLIC as of now) is 1024. As mentioned above, device + * 0 is defined to be non-existant so this device really only supports 1023 + * devices. + */ + +#define MAX_DEVICES 1024 +#define MAX_CONTEXTS 15872 + +/* + * The PLIC consists of memory-mapped control registers, with a memory map as + * follows: + * + * base + 0x000000: Reserved (interrupt source 0 does not exist) + * base + 0x000004: Interrupt source 1 priority + * base + 0x000008: Interrupt source 2 priority + * ... + * base + 0x000FFC: Interrupt source 1023 priority + * base + 0x001000: Pending 0 + * base + 0x001FFF: Pending + * base + 0x002000: Enable bits for sources 0-31 on context 0 + * base + 0x002004: Enable bits for sources 32-63 on context 0 + * ... + * base + 0x0020FC: Enable bits for sources 992-1023 on context 0 + * base + 0x002080: Enable bits for sources 0-31 on context 1 + * ... + * base + 0x002100: Enable bits for sources 0-31 on context 2 + * ... + * base + 0x1F1F80: Enable bits for sources 992-1023 on context 15871 + * base + 0x1F1F84: Reserved + * ... (higher context IDs would fit here, but wouldn't fit + * inside the per-context priority vector) + * base + 0x1FFFFC: Reserved + * base + 0x200000: Priority threshold for context 0 + * base + 0x200004: Claim/complete for context 0 + * base + 0x200008: Reserved + * ... + * base + 0x200FFC: Reserved + * base + 0x201000: Priority threshold for context 1 + * base + 0x201004: Claim/complete for context 1 + * ... + * base + 0xFFE000: Priority threshold for context 15871 + * base + 0xFFE004: Claim/complete for context 15871 + * base + 0xFFE008: Reserved + * ... + * base + 0xFFFFFC: Reserved + */ + +/* Each interrupt source has a priority register associated with it. */ +#define PRIORITY_BASE 0 +#define PRIORITY_PER_ID 4 + +/* + * Each hart context has a vector of interupt enable bits associated with it. + * There's one bit for each interrupt source. + */ +#define ENABLE_BASE 0x2000 +#define ENABLE_PER_HART 0x80 + +/* + * Each hart context has a set of control registers associated with it. Right + * now there's only two: a source priority threshold over which the hart will + * take an interrupt, and a register to claim interrupts. + */ +#define CONTEXT_BASE 0x200000 +#define CONTEXT_PER_HART 0x1000 +#define CONTEXT_THRESHOLD 0 +#define CONTEXT_CLAIM 4 + +#define REG_SIZE 0x1000000 + +struct plic_state; + +struct plic_context { + /* State to which this belongs */ + struct plic_state *s; + + /* Static Configuration */ + u32 num; + struct kvm_cpu *vcpu; + + /* Local IRQ state */ + struct mutex irq_lock; + u8 irq_priority_threshold; + u32 irq_enable[MAX_DEVICES/32]; + u32 irq_pending[MAX_DEVICES/32]; + u8 irq_pending_priority[MAX_DEVICES]; + u32 irq_claimed[MAX_DEVICES/32]; + u32 irq_autoclear[MAX_DEVICES/32]; +}; + +struct plic_state { + bool ready; + struct kvm *kvm; + struct device_header dev_hdr; + + /* Static Configuration */ + u32 num_irq; + u32 num_irq_word; + u32 max_prio; + + /* Context Array */ + u32 num_context; + struct plic_context *contexts; + + /* Global IRQ state */ + struct mutex irq_lock; + u8 irq_priority[MAX_DEVICES]; + u32 irq_level[MAX_DEVICES/32]; +}; + +static struct plic_state plic; + +/* Note: Must be called with c->irq_lock held */ +static u32 __plic_context_best_pending_irq(struct plic_state *s, + struct plic_context *c) +{ + u8 best_irq_prio = 0; + u32 i, j, irq, best_irq = 0; + + for (i = 0; i < s->num_irq_word; i++) { + if (!c->irq_pending[i]) + continue; + + for (j = 0; j < 32; j++) { + irq = i * 32 + j; + if ((s->num_irq <= irq) || + !(c->irq_pending[i] & (1 << j)) || + (c->irq_claimed[i] & (1 << j))) + continue; + + if (!best_irq || + (best_irq_prio < c->irq_pending_priority[irq])) { + best_irq = irq; + best_irq_prio = c->irq_pending_priority[irq]; + } + } + } + + return best_irq; +} + +/* Note: Must be called with c->irq_lock held */ +static void __plic_context_irq_update(struct plic_state *s, + struct plic_context *c) +{ + u32 best_irq = __plic_context_best_pending_irq(s, c); + u32 virq = (best_irq) ? KVM_INTERRUPT_SET : KVM_INTERRUPT_UNSET; + + if (ioctl(c->vcpu->vcpu_fd, KVM_INTERRUPT, &virq) < 0) + pr_warning("KVM_INTERRUPT failed"); +} + +/* Note: Must be called with c->irq_lock held */ +static u32 __plic_context_irq_claim(struct plic_state *s, + struct plic_context *c) +{ + u32 virq = KVM_INTERRUPT_UNSET; + u32 best_irq = __plic_context_best_pending_irq(s, c); + u32 best_irq_word = best_irq / 32; + u32 best_irq_mask = (1 << (best_irq % 32)); + + if (ioctl(c->vcpu->vcpu_fd, KVM_INTERRUPT, &virq) < 0) + pr_warning("KVM_INTERRUPT failed"); + + if (best_irq) { + if (c->irq_autoclear[best_irq_word] & best_irq_mask) { + c->irq_pending[best_irq_word] &= ~best_irq_mask; + c->irq_pending_priority[best_irq] = 0; + c->irq_claimed[best_irq_word] &= ~best_irq_mask; + c->irq_autoclear[best_irq_word] &= ~best_irq_mask; + } else + c->irq_claimed[best_irq_word] |= best_irq_mask; + } + + __plic_context_irq_update(s, c); + + return best_irq; +} + +void plic__irq_trig(struct kvm *kvm, int irq, int level, bool edge) +{ + bool irq_marked = false; + u8 i, irq_prio, irq_word; + u32 irq_mask; + struct plic_context *c = NULL; + struct plic_state *s = &plic; + + if (!s->ready) + return; + + if (irq <= 0 || s->num_irq <= (u32)irq) + goto done; + + mutex_lock(&s->irq_lock); + + irq_prio = s->irq_priority[irq]; + irq_word = irq / 32; + irq_mask = 1 << (irq % 32); + + if (level) + s->irq_level[irq_word] |= irq_mask; + else + s->irq_level[irq_word] &= ~irq_mask; + + /* + * Note: PLIC interrupts are level-triggered. As of now, + * there is no notion of edge-triggered interrupts. To + * handle this we auto-clear edge-triggered interrupts + * when PLIC context CLAIM register is read. + */ + for (i = 0; i < s->num_context; i++) { + c = &s->contexts[i]; + + mutex_lock(&c->irq_lock); + if (c->irq_enable[irq_word] & irq_mask) { + if (level) { + c->irq_pending[irq_word] |= irq_mask; + c->irq_pending_priority[irq] = irq_prio; + if (edge) + c->irq_autoclear[irq_word] |= irq_mask; + } else { + c->irq_pending[irq_word] &= ~irq_mask; + c->irq_pending_priority[irq] = 0; + c->irq_claimed[irq_word] &= ~irq_mask; + c->irq_autoclear[irq_word] &= ~irq_mask; + } + __plic_context_irq_update(s, c); + irq_marked = true; + } + mutex_unlock(&c->irq_lock); + + if (irq_marked) + break; + } + +done: + mutex_unlock(&s->irq_lock); +} + +static void plic__priority_read(struct plic_state *s, + u64 offset, void *data) +{ + u32 irq = (offset >> 2); + + if (irq == 0 || irq >= s->num_irq) + return; + + mutex_lock(&s->irq_lock); + ioport__write32(data, s->irq_priority[irq]); + mutex_unlock(&s->irq_lock); +} + +static void plic__priority_write(struct plic_state *s, + u64 offset, void *data) +{ + u32 val, irq = (offset >> 2); + + if (irq == 0 || irq >= s->num_irq) + return; + + mutex_lock(&s->irq_lock); + val = ioport__read32(data); + val &= ((1 << PRIORITY_PER_ID) - 1); + s->irq_priority[irq] = val; + mutex_unlock(&s->irq_lock); +} + +static void plic__context_enable_read(struct plic_state *s, + struct plic_context *c, + u64 offset, void *data) +{ + u32 irq_word = offset >> 2; + + if (s->num_irq_word < irq_word) + return; + + mutex_lock(&c->irq_lock); + ioport__write32(data, c->irq_enable[irq_word]); + mutex_unlock(&c->irq_lock); +} + +static void plic__context_enable_write(struct plic_state *s, + struct plic_context *c, + u64 offset, void *data) +{ + u8 irq_prio; + u32 i, irq, irq_mask; + u32 irq_word = offset >> 2; + u32 old_val, new_val, xor_val; + + if (s->num_irq_word < irq_word) + return; + + mutex_lock(&s->irq_lock); + + mutex_lock(&c->irq_lock); + + old_val = c->irq_enable[irq_word]; + new_val = ioport__read32(data); + + if (irq_word == 0) + new_val &= ~0x1; + + c->irq_enable[irq_word] = new_val; + + xor_val = old_val ^ new_val; + for (i = 0; i < 32; i++) { + irq = irq_word * 32 + i; + irq_mask = 1 << i; + irq_prio = s->irq_priority[irq]; + if (!(xor_val & irq_mask)) + continue; + if ((new_val & irq_mask) && + (s->irq_level[irq_word] & irq_mask)) { + c->irq_pending[irq_word] |= irq_mask; + c->irq_pending_priority[irq] = irq_prio; + } else if (!(new_val & irq_mask)) { + c->irq_pending[irq_word] &= ~irq_mask; + c->irq_pending_priority[irq] = 0; + c->irq_claimed[irq_word] &= ~irq_mask; + } + } + + __plic_context_irq_update(s, c); + + mutex_unlock(&c->irq_lock); + + mutex_unlock(&s->irq_lock); +} + +static void plic__context_read(struct plic_state *s, + struct plic_context *c, + u64 offset, void *data) +{ + mutex_lock(&c->irq_lock); + + switch (offset) { + case CONTEXT_THRESHOLD: + ioport__write32(data, c->irq_priority_threshold); + break; + case CONTEXT_CLAIM: + ioport__write32(data, __plic_context_irq_claim(s, c)); + break; + default: + break; + }; + + mutex_unlock(&c->irq_lock); +} + +static void plic__context_write(struct plic_state *s, + struct plic_context *c, + u64 offset, void *data) +{ + u32 val; + bool irq_update = false; + + mutex_lock(&c->irq_lock); + + switch (offset) { + case CONTEXT_THRESHOLD: + val = ioport__read32(data); + val &= ((1 << PRIORITY_PER_ID) - 1); + if (val <= s->max_prio) + c->irq_priority_threshold = val; + else + irq_update = true; + break; + case CONTEXT_CLAIM: + break; + default: + irq_update = true; + break; + }; + + if (irq_update) + __plic_context_irq_update(s, c); + + mutex_unlock(&c->irq_lock); +} + +static void plic__mmio_callback(struct kvm_cpu *vcpu, + u64 addr, u8 *data, u32 len, + u8 is_write, void *ptr) +{ + u32 cntx; + struct plic_state *s = ptr; + + if (len != 4) + die("plic: invalid len=%d", len); + + addr &= ~0x3; + addr -= RISCV_PLIC; + + if (is_write) { + if (PRIORITY_BASE <= addr && addr < ENABLE_BASE) { + plic__priority_write(s, addr, data); + } else if (ENABLE_BASE <= addr && addr < CONTEXT_BASE) { + cntx = (addr - ENABLE_BASE) / ENABLE_PER_HART; + addr -= cntx * ENABLE_PER_HART + ENABLE_BASE; + if (cntx < s->num_context) + plic__context_enable_write(s, + &s->contexts[cntx], + addr, data); + } else if (CONTEXT_BASE <= addr && addr < REG_SIZE) { + cntx = (addr - CONTEXT_BASE) / CONTEXT_PER_HART; + addr -= cntx * CONTEXT_PER_HART + CONTEXT_BASE; + if (cntx < s->num_context) + plic__context_write(s, &s->contexts[cntx], + addr, data); + } + } else { + if (PRIORITY_BASE <= addr && addr < ENABLE_BASE) { + plic__priority_read(s, addr, data); + } else if (ENABLE_BASE <= addr && addr < CONTEXT_BASE) { + cntx = (addr - ENABLE_BASE) / ENABLE_PER_HART; + addr -= cntx * ENABLE_PER_HART + ENABLE_BASE; + if (cntx < s->num_context) + plic__context_enable_read(s, + &s->contexts[cntx], + addr, data); + } else if (CONTEXT_BASE <= addr && addr < REG_SIZE) { + cntx = (addr - CONTEXT_BASE) / CONTEXT_PER_HART; + addr -= cntx * CONTEXT_PER_HART + CONTEXT_BASE; + if (cntx < s->num_context) + plic__context_read(s, &s->contexts[cntx], + addr, data); + } + } +} + +static int plic__init(struct kvm *kvm) +{ + u32 i; + struct plic_context *c; + + plic.kvm = kvm; + plic.dev_hdr = (struct device_header) { + .bus_type = DEVICE_BUS_MMIO, + }; + + plic.num_irq = MAX_DEVICES; + plic.num_irq_word = plic.num_irq / 32; + if ((plic.num_irq_word * 32) < plic.num_irq) + plic.num_irq_word++; + plic.max_prio = (1UL << PRIORITY_PER_ID) - 1; + + plic.num_context = kvm->nrcpus * 2; + plic.contexts = calloc(plic.num_context, sizeof(struct plic_context)); + if (!plic.contexts) + return -ENOMEM; + for (i = 0; i < plic.num_context; i++) { + c = &plic.contexts[i]; + c->s = &plic; + c->num = i; + c->vcpu = kvm->cpus[i / 2]; + mutex_init(&c->irq_lock); + } + + mutex_init(&plic.irq_lock); + + kvm__register_mmio(kvm, RISCV_PLIC, RISCV_PLIC_SIZE, + false, plic__mmio_callback, &plic); + + device__register(&plic.dev_hdr); + + plic.ready = true; + + return 0; + +} +dev_init(plic__init); + +static int plic__exit(struct kvm *kvm) +{ + plic.ready = false; + kvm__deregister_mmio(kvm, RISCV_PLIC); + free(plic.contexts); + + return 0; +} +dev_exit(plic__exit); From patchwork Wed Dec 25 03:00:35 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Anup Patel X-Patchwork-Id: 11309963 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 0CE8B138C for ; Wed, 25 Dec 2019 03:00:44 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id D4FCC2053B for ; Wed, 25 Dec 2019 03:00:43 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=wdc.com header.i=@wdc.com header.b="UcQTs1hJ"; dkim=pass (1024-bit key) header.d=sharedspace.onmicrosoft.com header.i=@sharedspace.onmicrosoft.com header.b="wm98lryT" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726925AbfLYDAn (ORCPT ); Tue, 24 Dec 2019 22:00:43 -0500 Received: from esa2.hgst.iphmx.com ([68.232.143.124]:18614 "EHLO esa2.hgst.iphmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726920AbfLYDAm (ORCPT ); Tue, 24 Dec 2019 22:00:42 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=wdc.com; i=@wdc.com; q=dns/txt; s=dkim.wdc.com; t=1577242851; x=1608778851; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=NIoev8oOzJAMFzztwqQMkH6dK6u9TAZ5gaIAiniu3hs=; b=UcQTs1hJD/x/4l81M4mhCZWFMoTz7NBvI0bBKvCG0VDOoLLdlrusb0Qd GnO/Gr/tYWnWnJgQu82NgP+RWKM0UxtEosmw8T3HNDTKJEIPdBKY9I/Rh Yn7UhidB8b6kqdYp0UJyD+UefKlg4Bp8dzKvLBznX33wiaGomnWF8Ow9d YQBxyeH6XJLMsv6HA3nf3tc3u0IexpHdEj5MMK+jcoTO70WA/TV/9MZsF GAemF34AEVGXtuAG3/SXutQmX+5Qw0WZZ0E8JnP+bXTlCHj3NdPm1t6Rc WJUPAk1JvU1qfOE267Jh6ZmxBA3hHGQlusSGjJ1TyEt6uVEQd6VLNhwg+ Q==; IronPort-SDR: 9NnGUSk3J5vVuccgC8pHA5s/uV3CqD2FUBs1fvoIXMyEWnjlC8VC2O41a6fCouoj1vSBe8wjay z6313AnmW36x7j/x5vLdnQfzX8mTrp9MUu2oHMAO9zN5AP+ULHUUXMf98WkS8aCjEUE4+KKt0u 2kepiHfKBsX7ukhPHddKjlohoY+6NUlbevFQhJk3D22x/tLj/gpKFB0w5ZetpnvoXvcDytSOpn 9guXZXfS/x8UyS6z+H5OkwsCtKOB/xdeooxbuS0L5384wjZKuIfZ85NoNFEgpzftQhi/7aSwtb l70= X-IronPort-AV: E=Sophos;i="5.69,353,1571673600"; d="scan'208";a="227751823" Received: from mail-dm6nam11lp2170.outbound.protection.outlook.com (HELO NAM11-DM6-obe.outbound.protection.outlook.com) ([104.47.57.170]) by ob1.hgst.iphmx.com with ESMTP; 25 Dec 2019 11:00:43 +0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=TAIaAr4Mvf55oyEyfQ5F2+bQ19UqSNXPsnT6Eif0dHMRzRvTJDGCcFdZeGleP5Vq7z0G6FXSC1zgXyfrUuW0Q7Tr837yk+QY8rcPFE48VWAtNO6gxzlrvIhYFgQrk/kHnI6ZztC9jfQtT6awRVi/5z4zu2iDyMt2FrTqeV6iMXBhJK4K3Eus5D6DQEbp77v4bmhKoCBSiglBV71Ltiia0dmC6TLSOEW0SFzNjxdjD8xKqZAvZimPmyV+BI5gWAh51YDL3EJo+B2zbBahc0hV1O2ct39Of53AEyYqzPfqKV92+l0EZLdS/Nal2y7opR/JLD+gHREnfR7pLqZfVYQAGA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=whcSjLBTN9ANHKeqOL7JcAzE4xnxORCZUkVFSGpOUMQ=; b=Ox+VA5C0Agif4OZDSCs8IpoV0kXdTghUaHtyCMLpd6h0lHGLGu1iFAyggsjcCWnZYZt+lcg+oKg6sq9vnUB0EN3RBrs6z5WwA0/epkXwFFSbTMP8J/hZWy5H0NAHZkqctYfuWjsuu8nChT+mVxhe8/fHIjPZjLNxez5prwm51gGAAm4Ddvy6izf+m7MDGhY4rkM8fPwSurld4FaUglkqUWtviOWfRK30xrBwkLLEjG+a/6ah9fpTXk9aTeoAlnEX++RQViRcoRM7qXye0bEmbuiQ1HfX9XofuFoClZboBdw0JSxh9AXr3wxVSQZy5cjTObjV9BGL0YMupO5ql1Fq2Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=wdc.com; dmarc=pass action=none header.from=wdc.com; dkim=pass header.d=wdc.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sharedspace.onmicrosoft.com; s=selector2-sharedspace-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=whcSjLBTN9ANHKeqOL7JcAzE4xnxORCZUkVFSGpOUMQ=; b=wm98lryTEjlrFxaSYoaxwVEOjrTX/8rSvJJrvPp4AodQfnGGS4on7bR5SWlazdwflYJ5vnp5hAnEDPwAKmZIyK1KQRC8wnfQw1guqZlDZdpibyQiur2aedGsoBJxaqLgECXFndedrqYhjTLfUoW5Qp+KZycViEJAZ/CerEndw5M= Received: from MN2PR04MB6061.namprd04.prod.outlook.com (20.178.246.15) by MN2PR04MB5597.namprd04.prod.outlook.com (20.179.22.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2581.11; Wed, 25 Dec 2019 03:00:35 +0000 Received: from MN2PR04MB6061.namprd04.prod.outlook.com ([fe80::a9a0:3ffa:371f:ad89]) by MN2PR04MB6061.namprd04.prod.outlook.com ([fe80::a9a0:3ffa:371f:ad89%7]) with mapi id 15.20.2559.017; Wed, 25 Dec 2019 03:00:35 +0000 Received: from wdc.com (106.51.19.73) by MAXPR01CA0084.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:49::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2581.11 via Frontend Transport; Wed, 25 Dec 2019 03:00:33 +0000 From: Anup Patel To: Will Deacon CC: Paolo Bonzini , Atish Patra , Alistair Francis , Anup Patel , "kvm@vger.kernel.org" , "kvm-riscv@lists.infradead.org" , Anup Patel Subject: [kvmtool RFC PATCH 6/8] riscv: Generate FDT at runtime for Guest/VM Thread-Topic: [kvmtool RFC PATCH 6/8] riscv: Generate FDT at runtime for Guest/VM Thread-Index: AQHVus96mbgEpYMHfEiuyBbwtI1ecQ== Date: Wed, 25 Dec 2019 03:00:35 +0000 Message-ID: <20191225025945.108466-7-anup.patel@wdc.com> References: <20191225025945.108466-1-anup.patel@wdc.com> In-Reply-To: <20191225025945.108466-1-anup.patel@wdc.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-clientproxiedby: MAXPR01CA0084.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:49::26) To MN2PR04MB6061.namprd04.prod.outlook.com (2603:10b6:208:d8::15) authentication-results: spf=none (sender IP is ) smtp.mailfrom=Anup.Patel@wdc.com; x-ms-exchange-messagesentrepresentingtype: 1 x-mailer: git-send-email 2.17.1 x-originating-ip: [106.51.19.73] x-ms-publictraffictype: Email x-ms-office365-filtering-ht: Tenant x-ms-office365-filtering-correlation-id: e37601fd-e911-4a5a-730d-08d788e69d20 x-ms-traffictypediagnostic: MN2PR04MB5597: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: wdcipoutbound: EOP-TRUE x-ms-oob-tlc-oobclassifiers: OLM:31; x-forefront-prvs: 02622CEF0A x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(4636009)(39860400002)(136003)(346002)(376002)(366004)(396003)(199004)(189003)(5660300002)(86362001)(2906002)(4326008)(54906003)(81156014)(81166006)(66946007)(8676002)(1076003)(6916009)(8886007)(71200400001)(44832011)(66556008)(64756008)(1006002)(66446008)(52116002)(66476007)(55236004)(7696005)(16526019)(186003)(316002)(26005)(55016002)(956004)(2616005)(36756003)(478600001)(8936002)(32040200004);DIR:OUT;SFP:1102;SCL:1;SRVR:MN2PR04MB5597;H:MN2PR04MB6061.namprd04.prod.outlook.com;FPR:;SPF:None;LANG:en;PTR:InfoNoRecords;A:1;MX:1; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 MIME-Version: 1.0 X-OriginatorOrg: wdc.com X-MS-Exchange-CrossTenant-Network-Message-Id: e37601fd-e911-4a5a-730d-08d788e69d20 X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Dec 2019 03:00:35.8718 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b61c8803-16f3-4c35-9b17-6f65f441df86 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: G/GTfMDgQ3AM6uw0KDqlLhg8X1OWlMMcW7RJflhPfaZCjX2PXjNMuUvPhNofU1PBWhnLG8+ZVLwd/KwlwVB/AQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR04MB5597 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org We generate FDT at runtime for RISC-V Guest/VM so that KVMTOOL users don't have to pass FDT separately via command-line parameters. Also, we provide "--dump-dtb " command-line option to dump generated FDT into a file for debugging purpose. Signed-off-by: Atish Patra Signed-off-by: Anup Patel --- Makefile | 1 + riscv/fdt.c | 192 ++++++++++++++++++++++++++++ riscv/include/kvm/fdt-arch.h | 4 + riscv/include/kvm/kvm-arch.h | 2 + riscv/include/kvm/kvm-config-arch.h | 6 + riscv/plic.c | 50 ++++++++ 6 files changed, 255 insertions(+) create mode 100644 riscv/fdt.c diff --git a/Makefile b/Makefile index 3220ad3..fb78fa2 100644 --- a/Makefile +++ b/Makefile @@ -196,6 +196,7 @@ endif ifeq ($(ARCH),riscv) DEFINES += -DCONFIG_RISCV ARCH_INCLUDE := riscv/include + OBJS += riscv/fdt.o OBJS += riscv/ioport.o OBJS += riscv/irq.o OBJS += riscv/kvm.o diff --git a/riscv/fdt.c b/riscv/fdt.c new file mode 100644 index 0000000..3b56e30 --- /dev/null +++ b/riscv/fdt.c @@ -0,0 +1,192 @@ +#include "kvm/devices.h" +#include "kvm/fdt.h" +#include "kvm/kvm.h" +#include "kvm/kvm-cpu.h" + +#include + +#include +#include +#include + +static void dump_fdt(const char *dtb_file, void *fdt) +{ + int count, fd; + + fd = open(dtb_file, O_CREAT | O_TRUNC | O_RDWR, 0666); + if (fd < 0) + die("Failed to write dtb to %s", dtb_file); + + count = write(fd, fdt, FDT_MAX_SIZE); + if (count < 0) + die_perror("Failed to dump dtb"); + + pr_debug("Wrote %d bytes to dtb %s", count, dtb_file); + close(fd); +} + +#define CPU_NAME_MAX_LEN 15 +#define CPU_ISA_MAX_LEN 128 +static void generate_cpu_nodes(void *fdt, struct kvm *kvm) +{ + int cpu, pos, i, index, valid_isa_len; + const char *valid_isa_order = "IEMAFDQCLBJTPVNSUHKORWXYZG"; + + _FDT(fdt_begin_node(fdt, "cpus")); + _FDT(fdt_property_cell(fdt, "#address-cells", 0x1)); + _FDT(fdt_property_cell(fdt, "#size-cells", 0x0)); + _FDT(fdt_property_cell(fdt, "timebase-frequency", + kvm->cpus[0]->riscv_timebase)); + + for (cpu = 0; cpu < kvm->nrcpus; ++cpu) { + char cpu_name[CPU_NAME_MAX_LEN]; + char cpu_isa[CPU_ISA_MAX_LEN]; + struct kvm_cpu *vcpu = kvm->cpus[cpu]; + + snprintf(cpu_name, CPU_NAME_MAX_LEN, "cpu@%x", cpu); + + snprintf(cpu_isa, CPU_ISA_MAX_LEN, "rv%ld", vcpu->riscv_xlen); + pos = strlen(cpu_isa); + valid_isa_len = strlen(valid_isa_order); + for (i = 0; i < valid_isa_len; i++) { + index = valid_isa_order[i] - 'A'; + if (vcpu->riscv_isa & (1 << (index))) + cpu_isa[pos++] = 'a' + index; + } + cpu_isa[pos] = '\0'; + + _FDT(fdt_begin_node(fdt, cpu_name)); + _FDT(fdt_property_string(fdt, "device_type", "cpu")); + _FDT(fdt_property_string(fdt, "compatible", "riscv")); + if (vcpu->riscv_xlen == 64) + _FDT(fdt_property_string(fdt, "mmu-type", + "riscv,sv48")); + else + _FDT(fdt_property_string(fdt, "mmu-type", + "riscv,sv32")); + _FDT(fdt_property_string(fdt, "riscv,isa", cpu_isa)); + _FDT(fdt_property_cell(fdt, "reg", cpu)); + _FDT(fdt_property_string(fdt, "status", "okay")); + + _FDT(fdt_begin_node(fdt, "interrupt-controller")); + _FDT(fdt_property_string(fdt, "compatible", "riscv,cpu-intc")); + _FDT(fdt_property_cell(fdt, "#interrupt-cells", 1)); + _FDT(fdt_property(fdt, "interrupt-controller", NULL, 0)); + _FDT(fdt_property_cell(fdt, "phandle", + PHANDLE_CPU_INTC_BASE + cpu)); + _FDT(fdt_end_node(fdt)); + + _FDT(fdt_end_node(fdt)); + } + + _FDT(fdt_end_node(fdt)); +} + +static int setup_fdt(struct kvm *kvm) +{ + struct device_header *dev_hdr; + u8 staging_fdt[FDT_MAX_SIZE]; + u64 mem_reg_prop[] = { + cpu_to_fdt64(kvm->arch.memory_guest_start), + cpu_to_fdt64(kvm->ram_size), + }; + void *fdt = staging_fdt; + void *fdt_dest = guest_flat_to_host(kvm, + kvm->arch.dtb_guest_start); + void (*generate_mmio_fdt_nodes)(void *, struct device_header *, + void (*)(void *, u8, enum irq_type)); + + /* Create new tree without a reserve map */ + _FDT(fdt_create(fdt, FDT_MAX_SIZE)); + _FDT(fdt_finish_reservemap(fdt)); + + /* Header */ + _FDT(fdt_begin_node(fdt, "")); + _FDT(fdt_property_cell(fdt, "interrupt-parent", PHANDLE_PLIC)); + _FDT(fdt_property_string(fdt, "compatible", "linux,dummy-virt")); + _FDT(fdt_property_cell(fdt, "#address-cells", 0x2)); + _FDT(fdt_property_cell(fdt, "#size-cells", 0x2)); + + /* /chosen */ + _FDT(fdt_begin_node(fdt, "chosen")); + + /* Pass on our amended command line to a Linux kernel only. */ + if (kvm->cfg.firmware_filename) { + if (kvm->cfg.kernel_cmdline) + _FDT(fdt_property_string(fdt, "bootargs", + kvm->cfg.kernel_cmdline)); + } else + _FDT(fdt_property_string(fdt, "bootargs", + kvm->cfg.real_cmdline)); + + _FDT(fdt_property_string(fdt, "stdout-path", "serial0")); + + /* Initrd */ + if (kvm->arch.initrd_size != 0) { + u64 ird_st_prop = cpu_to_fdt64(kvm->arch.initrd_guest_start); + u64 ird_end_prop = cpu_to_fdt64(kvm->arch.initrd_guest_start + + kvm->arch.initrd_size); + + _FDT(fdt_property(fdt, "linux,initrd-start", + &ird_st_prop, sizeof(ird_st_prop))); + _FDT(fdt_property(fdt, "linux,initrd-end", + &ird_end_prop, sizeof(ird_end_prop))); + } + + _FDT(fdt_end_node(fdt)); + + /* Memory */ + _FDT(fdt_begin_node(fdt, "memory")); + _FDT(fdt_property_string(fdt, "device_type", "memory")); + _FDT(fdt_property(fdt, "reg", mem_reg_prop, sizeof(mem_reg_prop))); + _FDT(fdt_end_node(fdt)); + + /* CPUs */ + generate_cpu_nodes(fdt, kvm); + + /* Simple Bus */ + _FDT(fdt_begin_node(fdt, "smb")); + _FDT(fdt_property_string(fdt, "compatible", "simple-bus")); + _FDT(fdt_property_cell(fdt, "#address-cells", 0x2)); + _FDT(fdt_property_cell(fdt, "#size-cells", 0x2)); + _FDT(fdt_property(fdt, "ranges", NULL, 0)); + + /* Virtio MMIO devices */ + dev_hdr = device__first_dev(DEVICE_BUS_MMIO); + while (dev_hdr) { + generate_mmio_fdt_nodes = dev_hdr->data; + generate_mmio_fdt_nodes(fdt, dev_hdr, plic__generate_irq_prop); + dev_hdr = device__next_dev(dev_hdr); + } + + /* IOPORT devices */ + dev_hdr = device__first_dev(DEVICE_BUS_IOPORT); + while (dev_hdr) { + generate_mmio_fdt_nodes = dev_hdr->data; + generate_mmio_fdt_nodes(fdt, dev_hdr, plic__generate_irq_prop); + dev_hdr = device__next_dev(dev_hdr); + } + + _FDT(fdt_end_node(fdt)); + + if (fdt_stdout_path) { + _FDT(fdt_begin_node(fdt, "aliases")); + _FDT(fdt_property_string(fdt, "serial0", fdt_stdout_path)); + _FDT(fdt_end_node(fdt)); + + free(fdt_stdout_path); + fdt_stdout_path = NULL; + } + + /* Finalise. */ + _FDT(fdt_end_node(fdt)); + _FDT(fdt_finish(fdt)); + + _FDT(fdt_open_into(fdt, fdt_dest, FDT_MAX_SIZE)); + _FDT(fdt_pack(fdt_dest)); + + if (kvm->cfg.arch.dump_dtb_filename) + dump_fdt(kvm->cfg.arch.dump_dtb_filename, fdt_dest); + return 0; +} +late_init(setup_fdt); diff --git a/riscv/include/kvm/fdt-arch.h b/riscv/include/kvm/fdt-arch.h index 9450fc5..f7548e8 100644 --- a/riscv/include/kvm/fdt-arch.h +++ b/riscv/include/kvm/fdt-arch.h @@ -1,4 +1,8 @@ #ifndef KVM__KVM_FDT_H #define KVM__KVM_FDT_H +enum phandles {PHANDLE_RESERVED = 0, PHANDLE_PLIC, PHANDLES_MAX}; + +#define PHANDLE_CPU_INTC_BASE PHANDLES_MAX + #endif /* KVM__KVM_FDT_H */ diff --git a/riscv/include/kvm/kvm-arch.h b/riscv/include/kvm/kvm-arch.h index b1af70f..7d3fd73 100644 --- a/riscv/include/kvm/kvm-arch.h +++ b/riscv/include/kvm/kvm-arch.h @@ -70,6 +70,8 @@ static inline bool riscv_addr_in_ioport_region(u64 phys_addr) enum irq_type; +void plic__generate_irq_prop(void *fdt, u8 irq, enum irq_type irq_type); + void plic__irq_trig(struct kvm *kvm, int irq, int level, bool edge); #endif /* KVM__KVM_ARCH_H */ diff --git a/riscv/include/kvm/kvm-config-arch.h b/riscv/include/kvm/kvm-config-arch.h index 60c7333..526fca2 100644 --- a/riscv/include/kvm/kvm-config-arch.h +++ b/riscv/include/kvm/kvm-config-arch.h @@ -4,6 +4,12 @@ #include "kvm/parse-options.h" struct kvm_config_arch { + const char *dump_dtb_filename; }; +#define OPT_ARCH_RUN(pfx, cfg) \ + pfx, \ + OPT_STRING('\0', "dump-dtb", &(cfg)->dump_dtb_filename, \ + ".dtb file", "Dump generated .dtb to specified file"), + #endif /* KVM__KVM_CONFIG_ARCH_H */ diff --git a/riscv/plic.c b/riscv/plic.c index 93bfbc5..1112d16 100644 --- a/riscv/plic.c +++ b/riscv/plic.c @@ -1,5 +1,6 @@ #include "kvm/devices.h" +#include "kvm/fdt.h" #include "kvm/ioeventfd.h" #include "kvm/ioport.h" #include "kvm/kvm.h" @@ -455,6 +456,54 @@ static void plic__mmio_callback(struct kvm_cpu *vcpu, } } +void plic__generate_irq_prop(void *fdt, u8 irq, enum irq_type irq_type) +{ + u32 irq_prop[] = { + cpu_to_fdt32(irq) + }; + + _FDT(fdt_property(fdt, "interrupts", irq_prop, sizeof(irq_prop))); +} + +static void plic__generate_fdt_node(void *fdt, + struct device_header *dev_hdr, + void (*generate_irq_prop)(void *fdt, + u8 irq, + enum irq_type)) +{ + u32 i; + u32 reg_cells[4], *irq_cells; + + reg_cells[0] = 0; + reg_cells[1] = cpu_to_fdt32(RISCV_PLIC); + reg_cells[2] = 0; + reg_cells[3] = cpu_to_fdt32(RISCV_PLIC_SIZE); + + irq_cells = calloc(plic.num_context * 2, sizeof(u32)); + if (!irq_cells) + die("Failed to alloc irq_cells"); + + _FDT(fdt_begin_node(fdt, "interrupt-controller@0c000000")); + _FDT(fdt_property_string(fdt, "compatible", "riscv,plic0")); + _FDT(fdt_property(fdt, "reg", reg_cells, sizeof(reg_cells))); + _FDT(fdt_property_cell(fdt, "#interrupt-cells", 1)); + _FDT(fdt_property(fdt, "interrupt-controller", NULL, 0)); + _FDT(fdt_property_cell(fdt, "riscv,max-priority", plic.max_prio)); + _FDT(fdt_property_cell(fdt, "riscv,ndev", MAX_DEVICES)); + _FDT(fdt_property_cell(fdt, "phandle", PHANDLE_PLIC)); + for (i = 0; i < (plic.num_context / 2); i++) { + irq_cells[4*i + 0] = cpu_to_fdt32(PHANDLE_CPU_INTC_BASE + i); + irq_cells[4*i + 1] = cpu_to_fdt32(0xffffffff); + irq_cells[4*i + 2] = cpu_to_fdt32(PHANDLE_CPU_INTC_BASE + i); + irq_cells[4*i + 3] = cpu_to_fdt32(9); + } + _FDT(fdt_property(fdt, "interrupts-extended", irq_cells, + sizeof(u32) * plic.num_context * 2)); + _FDT(fdt_end_node(fdt)); + + free(irq_cells); +} + static int plic__init(struct kvm *kvm) { u32 i; @@ -463,6 +512,7 @@ static int plic__init(struct kvm *kvm) plic.kvm = kvm; plic.dev_hdr = (struct device_header) { .bus_type = DEVICE_BUS_MMIO, + .data = plic__generate_fdt_node, }; plic.num_irq = MAX_DEVICES; From patchwork Wed Dec 25 03:00:39 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Anup Patel X-Patchwork-Id: 11309967 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 14F65138C for ; Wed, 25 Dec 2019 03:00:55 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id DD9FC206B7 for ; Wed, 25 Dec 2019 03:00:54 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=wdc.com header.i=@wdc.com header.b="rtL5YkJc"; dkim=pass (1024-bit key) header.d=sharedspace.onmicrosoft.com header.i=@sharedspace.onmicrosoft.com header.b="XNj+5ICQ" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726944AbfLYDAy (ORCPT ); Tue, 24 Dec 2019 22:00:54 -0500 Received: from esa2.hgst.iphmx.com ([68.232.143.124]:18645 "EHLO esa2.hgst.iphmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726920AbfLYDAx (ORCPT ); Tue, 24 Dec 2019 22:00:53 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=wdc.com; i=@wdc.com; q=dns/txt; s=dkim.wdc.com; t=1577242868; x=1608778868; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=OdGcUXEE0YiIz6C8exm2S5IpKJ/QGf5AedbZs4I9roc=; b=rtL5YkJc9fyMwRjaykGILIECdT4QvXi4N2StxhlR/oEPXgvk9GWODLeQ oEo6li27D5p6P/x+GTKmeJX18/kiR08VsMV/5GS75FFrbxC8WDUrTbfqv NIuDEU+y7pRDLV7hRpr3IKGNxtOR0CUkW/qdw4yfGXseTf2zC4CdrYzPD 7uT6IzQwL+47J8T5kyjoFSSQXGOPRZHytJy5IFlUi4hJqVVtKXNNOGvbY MpC93swnOyikhovlME1ZG/nyIytvvUE0peAg80h6lnrP/qVxJxEMNj2t4 1WtJeW34YyyoPjtNiq7RUqesdhBOsarlBJ+FSHXUuoE89CKGTqFUh4+Tf w==; IronPort-SDR: jhuJ4etaOL20ZT0nXtwpDdpjEzeGca9qjzlzvwkES/9iAYkvtVhO5SaGR7nTsYzZBiAV91vNjh w7blbX6dIBpORk4ryaf3Nba90KkjuVb0c2+N3f9s7mNeFBzaPMqOVjkfoWACmWOqxQskLotn+q aIUHsbJ3vKslL3s8KYVXlwLN2NjThrSNHJfggg4inscpIvqebmDOdP0Hd6OjVIBuZLI0fp7x0p OnFPzI0PZp+980M2de2Uuvpulhw4/XqOqibt11X/5p8n4oVc6Pn8cf7EqTdPHukmx1AIsu7EGs AeA= X-IronPort-AV: E=Sophos;i="5.69,353,1571673600"; d="scan'208";a="227751837" Received: from mail-dm6nam11lp2172.outbound.protection.outlook.com (HELO NAM11-DM6-obe.outbound.protection.outlook.com) ([104.47.57.172]) by ob1.hgst.iphmx.com with ESMTP; 25 Dec 2019 11:01:02 +0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DU+7ZQ0ePwmxoAh6o6Sg7F0go3UNCG61kwwdpzCC7hRmbw5bM7r7Pl6OCc9mygxLujBieuz90KwcWm4J5pFSKFqwg/mxHq+h1Z5KtlbcMn1YmNe1PdEEWAqg20j01zi+V6SA+bkndwHEQxhvlhkUsxG+VnLROhnI76gNr9vo7rMauiQ0PijdYDxouPL0NnMYpc7qORmVlqr6LpowE4wgqL2zw7SDH/a5CCSp4wGNGWAgWFwqJvgPEML4NJfcZrjdO482R+Deet8LPLXFvkwMJLgPtpQRA2ZMumcVA+tgVe8Qk1U6JcYXSHBwLXMU3WzVelO3lz2sZ9FZXy1KnLuyDw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1VugAecuM7ochO3Ap8jisuS/jsrAx9JMRyyNw4SCEms=; b=NmZ79km9GtToxFyieGqD1REfsl+8AcJlIhT6yEMoLoLJMMwRp3n4KbH8BGfef745pU9mYgdn+8tyigYD2358+zpw5BYuH+BRoKCtgU7WZzRfB3HWMrN/K4bhRPM7ElSe2u5jT6cSjYUAoJ0ybTcRAUS2n8VFg6I8UYZymf8p+tlJJVXjnLjYpE50dXYR1tRsITSVQvBYrgnCJkVs6mjvyp6naA2mrDWfXrvYJPTllzfLZhGrM6tZr8ch//ta9NbGt0AMxDGFs+3nph1FI8uZLAxtXBgMsqex9ns2xToq9ApfIemMi2biLwtXakUd4z6dRZRn8DDFZgqxFHyyrnb3og== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=wdc.com; dmarc=pass action=none header.from=wdc.com; dkim=pass header.d=wdc.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sharedspace.onmicrosoft.com; s=selector2-sharedspace-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1VugAecuM7ochO3Ap8jisuS/jsrAx9JMRyyNw4SCEms=; b=XNj+5ICQ6bQ1w+6/ZZQE7K3o3o3Ej9EZULjX4BboPdcmhHPoya3EQcg0+5oyZpJyHg+rrePCVyt7mgCx3EA+WUAVxCl9hCp0M8c9ehm5ZyG9uf6Kf78lul4iuaTiD+Wv4QLghvmT5KdEc8vIUpGLlb0IDIdRWFJA+8fdSebuCoM= Received: from MN2PR04MB6061.namprd04.prod.outlook.com (20.178.246.15) by MN2PR04MB5597.namprd04.prod.outlook.com (20.179.22.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2581.11; Wed, 25 Dec 2019 03:00:40 +0000 Received: from MN2PR04MB6061.namprd04.prod.outlook.com ([fe80::a9a0:3ffa:371f:ad89]) by MN2PR04MB6061.namprd04.prod.outlook.com ([fe80::a9a0:3ffa:371f:ad89%7]) with mapi id 15.20.2559.017; Wed, 25 Dec 2019 03:00:40 +0000 Received: from wdc.com (106.51.19.73) by MAXPR01CA0084.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:49::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2581.11 via Frontend Transport; Wed, 25 Dec 2019 03:00:37 +0000 From: Anup Patel To: Will Deacon CC: Paolo Bonzini , Atish Patra , Alistair Francis , Anup Patel , "kvm@vger.kernel.org" , "kvm-riscv@lists.infradead.org" , Anup Patel Subject: [kvmtool RFC PATCH 7/8] riscv: Handle SBI calls forwarded to user space Thread-Topic: [kvmtool RFC PATCH 7/8] riscv: Handle SBI calls forwarded to user space Thread-Index: AQHVus99rAgl7tfMdE+2bkPQRMU1PQ== Date: Wed, 25 Dec 2019 03:00:39 +0000 Message-ID: <20191225025945.108466-8-anup.patel@wdc.com> References: <20191225025945.108466-1-anup.patel@wdc.com> In-Reply-To: <20191225025945.108466-1-anup.patel@wdc.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-clientproxiedby: MAXPR01CA0084.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:49::26) To MN2PR04MB6061.namprd04.prod.outlook.com (2603:10b6:208:d8::15) authentication-results: spf=none (sender IP is ) smtp.mailfrom=Anup.Patel@wdc.com; x-ms-exchange-messagesentrepresentingtype: 1 x-mailer: git-send-email 2.17.1 x-originating-ip: [106.51.19.73] x-ms-publictraffictype: Email x-ms-office365-filtering-ht: Tenant x-ms-office365-filtering-correlation-id: 301c0de1-8a69-4c0c-c9e8-08d788e69f75 x-ms-traffictypediagnostic: MN2PR04MB5597:|MN2PR04MB5597: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: wdcipoutbound: EOP-TRUE x-ms-oob-tlc-oobclassifiers: OLM:2803; x-forefront-prvs: 02622CEF0A x-forefront-antispam-report: SFV:SPM;SFS:(10019020)(4636009)(39860400002)(136003)(346002)(376002)(366004)(396003)(199004)(189003)(5660300002)(86362001)(2906002)(4326008)(54906003)(81156014)(81166006)(66946007)(8676002)(1076003)(6916009)(8886007)(71200400001)(44832011)(66556008)(64756008)(1006002)(66446008)(52116002)(66476007)(55236004)(7696005)(16526019)(186003)(316002)(26005)(55016002)(956004)(2616005)(36756003)(478600001)(8936002)(32030200002);DIR:OUT;SFP:1501;SCL:5;SRVR:MN2PR04MB5597;H:MN2PR04MB6061.namprd04.prod.outlook.com;FPR:;SPF:None;LANG:en;PTR:InfoNoRecords;A:1;MX:1;CAT:OSPM; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 MIME-Version: 1.0 X-OriginatorOrg: wdc.com X-MS-Exchange-CrossTenant-Network-Message-Id: 301c0de1-8a69-4c0c-c9e8-08d788e69f75 X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Dec 2019 03:00:39.9474 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b61c8803-16f3-4c35-9b17-6f65f441df86 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: LLWAgPn3hDqlfZXErv9N96bH99SYp8UyJFw0Y+dRVBxKMoN7V5dUuBev4k4mH2litAmfWedSqpG88AdWrFGWNw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR04MB5597 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org The kernel KVM RISC-V module will forward certain SBI calls to user space. These forwared SBI calls will usually be the SBI calls which cannot be emulated in kernel space such as PUTCHAR and GETCHAR calls. This patch extends kvm_cpu__handle_exit() to handle SBI calls forwarded to user space. Signed-off-by: Atish Patra Signed-off-by: Anup Patel --- riscv/include/kvm/sbi.h | 48 ++++++++++++++++++++++++++++++++++++++++ riscv/kvm-cpu.c | 49 ++++++++++++++++++++++++++++++++++++++++- 2 files changed, 96 insertions(+), 1 deletion(-) create mode 100644 riscv/include/kvm/sbi.h diff --git a/riscv/include/kvm/sbi.h b/riscv/include/kvm/sbi.h new file mode 100644 index 0000000..f4b4182 --- /dev/null +++ b/riscv/include/kvm/sbi.h @@ -0,0 +1,48 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +/* + * Common SBI related defines and macros to be used by RISC-V kernel, + * RISC-V KVM and userspace. + * + * Copyright (c) 2019 Western Digital Corporation or its affiliates. + */ + +#ifndef __RISCV_SBI_H__ +#define __RISCV_SBI_H__ + +enum sbi_ext_id { + SBI_EXT_0_1_SET_TIMER = 0x0, + SBI_EXT_0_1_CONSOLE_PUTCHAR = 0x1, + SBI_EXT_0_1_CONSOLE_GETCHAR = 0x2, + SBI_EXT_0_1_CLEAR_IPI = 0x3, + SBI_EXT_0_1_SEND_IPI = 0x4, + SBI_EXT_0_1_REMOTE_FENCE_I = 0x5, + SBI_EXT_0_1_REMOTE_SFENCE_VMA = 0x6, + SBI_EXT_0_1_REMOTE_SFENCE_VMA_ASID = 0x7, + SBI_EXT_0_1_SHUTDOWN = 0x8, + SBI_EXT_BASE = 0x10, +}; + +enum sbi_ext_base_fid { + SBI_BASE_GET_SPEC_VERSION = 0, + SBI_BASE_GET_IMP_ID, + SBI_BASE_GET_IMP_VERSION, + SBI_BASE_PROBE_EXT, + SBI_BASE_GET_MVENDORID, + SBI_BASE_GET_MARCHID, + SBI_BASE_GET_MIMPID, +}; + +#define SBI_SPEC_VERSION_DEFAULT 0x1 +#define SBI_SPEC_VERSION_MAJOR_OFFSET 24 +#define SBI_SPEC_VERSION_MAJOR_MASK 0x7f +#define SBI_SPEC_VERSION_MINOR_MASK 0xffffff + +/* SBI return error codes */ +#define SBI_SUCCESS 0 +#define SBI_ERR_FAILURE -1 +#define SBI_ERR_NOT_SUPPORTED -2 +#define SBI_ERR_INVALID_PARAM -3 +#define SBI_ERR_DENIED -4 +#define SBI_ERR_INVALID_ADDRESS -5 + +#endif diff --git a/riscv/kvm-cpu.c b/riscv/kvm-cpu.c index 1565275..4f52b92 100644 --- a/riscv/kvm-cpu.c +++ b/riscv/kvm-cpu.c @@ -1,6 +1,7 @@ #include "kvm/kvm-cpu.h" #include "kvm/kvm.h" #include "kvm/virtio.h" +#include "kvm/sbi.h" #include "kvm/term.h" #include @@ -106,9 +107,55 @@ void kvm_cpu__delete(struct kvm_cpu *vcpu) free(vcpu); } +static bool kvm_cpu_riscv_sbi(struct kvm_cpu *vcpu) +{ + char ch; + bool ret = true; + int dfd = kvm_cpu__get_debug_fd(); + + switch (vcpu->kvm_run->riscv_sbi.extension_id) { + case SBI_EXT_0_1_CONSOLE_PUTCHAR: + ch = vcpu->kvm_run->riscv_sbi.args[0]; + term_putc(&ch, 1, 0); + vcpu->kvm_run->riscv_sbi.ret[0] = 0; + break; + case SBI_EXT_0_1_CONSOLE_GETCHAR: + if (term_readable(0)) + vcpu->kvm_run->riscv_sbi.ret[0] = + term_getc(vcpu->kvm, 0); + else + vcpu->kvm_run->riscv_sbi.ret[0] = SBI_ERR_FAILURE; + break; + default: + dprintf(dfd, "Unhandled SBI call\n"); + dprintf(dfd, "extension_id=0x%lx function_id=0x%lx\n", + vcpu->kvm_run->riscv_sbi.extension_id, + vcpu->kvm_run->riscv_sbi.function_id); + dprintf(dfd, "args[0]=0x%lx args[1]=0x%lx\n", + vcpu->kvm_run->riscv_sbi.args[0], + vcpu->kvm_run->riscv_sbi.args[1]); + dprintf(dfd, "args[2]=0x%lx args[3]=0x%lx\n", + vcpu->kvm_run->riscv_sbi.args[2], + vcpu->kvm_run->riscv_sbi.args[3]); + dprintf(dfd, "args[4]=0x%lx args[5]=0x%lx\n", + vcpu->kvm_run->riscv_sbi.args[4], + vcpu->kvm_run->riscv_sbi.args[5]); + ret = false; + break; + }; + + return ret; +} + bool kvm_cpu__handle_exit(struct kvm_cpu *vcpu) { - /* TODO: */ + switch (vcpu->kvm_run->exit_reason) { + case KVM_EXIT_RISCV_SBI: + return kvm_cpu_riscv_sbi(vcpu); + default: + break; + }; + return false; } From patchwork Wed Dec 25 03:00:43 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Anup Patel X-Patchwork-Id: 11309965 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 3314F14E3 for ; Wed, 25 Dec 2019 03:00:54 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 06C6820679 for ; Wed, 25 Dec 2019 03:00:54 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=wdc.com header.i=@wdc.com header.b="o4Wkp5lC"; dkim=pass (1024-bit key) header.d=sharedspace.onmicrosoft.com header.i=@sharedspace.onmicrosoft.com header.b="TEOMR7Mz" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726942AbfLYDAx (ORCPT ); Tue, 24 Dec 2019 22:00:53 -0500 Received: from esa2.hgst.iphmx.com ([68.232.143.124]:18645 "EHLO esa2.hgst.iphmx.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726893AbfLYDAx (ORCPT ); Tue, 24 Dec 2019 22:00:53 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=wdc.com; i=@wdc.com; q=dns/txt; s=dkim.wdc.com; t=1577242866; x=1608778866; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=Izfao+Gt84hom3Z9uqW0gnKHIOz/66lOkq4GRNQT21U=; b=o4Wkp5lC2PuKKlO6V2aoKsDEU1ewGYTE/AwBOP3IOS8YAF1ohSFnDEpD uVg21uws+V5gZHEe8IjueuDAivM+FkWDduseSejKBblZMEhTxVjO/8JD3 hJOXXR1l9KoGATLrmcMkWSdn36v7e/WuPZBRQyMKGTFgsO8bnEH45S6Qu ql0DUtWXhB8eyZgMfyLsPxV0d6EwHUaYmUPU9uI/YWirqeKg2euNkZhUz GRBzoYF6WNm1yID4j1f4NKcmlA4FTQkc7OzRqvb7SBL7+zaif7V130lVt 78Yl1oGsLhi1ayk1mgFZUkk5SkugZFkxkwh0mokn1j98DfQpS4TOK9nJk A==; IronPort-SDR: Km8FUS3aejlnARf6suqWIzqaisPlmnJUjVcMXCy3FTaZgraIbkyvMwZ8PVITgD4tfeC2iQf4An rBI+tQxB72ayIn8BgOK2EzOlSV9P1SaEVGK6lliimVJe5T9fToijU4NomI+9AC/rThhy47jkJg Q6t933V0ovXdQEdrgHE/iZhgeo2LDDqRwTJ8SzvSg7/um7R2C8SaE+4N340BVuH/dwDW6R6LBl 8EyneL75mFNdWbcc5LiDUn4mdQgYl2Na25K6HjDTNxsDc5fRN5i2d0OVXpwuk8PNFUNn0cW7k9 M38= X-IronPort-AV: E=Sophos;i="5.69,353,1571673600"; d="scan'208";a="227751832" Received: from mail-dm6nam11lp2174.outbound.protection.outlook.com (HELO NAM11-DM6-obe.outbound.protection.outlook.com) ([104.47.57.174]) by ob1.hgst.iphmx.com with ESMTP; 25 Dec 2019 11:00:55 +0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DqqYObzlif6Ocga867KI46t05OxkUGTd68mwQhOtuT45S7lErcCQG6jS5K/+qrxRXNK4ygsXcRP8OL77TVYb6LF7cdL+8v++jUPMMCNbEsXCGHXrh9FKeC5PrWdQkLaEwh8D6wLnKM7DTkJq/X1PEoC1Jk/08MgyripK4CUiOK8Ak4yRuTXaoZZWaZ8RlzFE568+dSapWv9HfIqg4v8HVODRHyqaMGwbEay2xczlKYYsK2EKlXrdHw7l9jpwjkPMjlHdN/f4TEX88cTgL5xYny+aehjsjEz9rBZK8wFqGGPB5xNWsCp7xrpBaO22Zu3X0OmCgz8iZLMLOJ9Zb5apjw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SFaO/JM2jRk0PXpBrVn3x4Zx+/vpep7/B9nOrE04Kak=; b=i7XDJa+sk0gCYLXTHU2D9uKy5/0N2JVLg86zNf8e0S/nhoRO+sv8UcdzjEE4dxzL/snFaesKecumDPWZpEMYM3kACbSkW4Dk/sXaz6iXvrA7JByOdSWZ8T4RK7JrzNTxxSF0S992VXiC12qRGezDoDKxb7P667bHuh2FEMbzwoFNW3lY9onicS82PtobSnYAkDEeCItD2rw5VwQ1Nzzh5b7bi7+Bq+pVnHqk6Ske2jP8lk0RaqWH5HUWoYhnghuC3BUJBR9jGYMIydJYVDGIfPVxqDDhs4m5J7uwjXoOjSh9J1IPgzBuMuEzpZtc3CqORsJnxK8ld25ss08eC444YA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=wdc.com; dmarc=pass action=none header.from=wdc.com; dkim=pass header.d=wdc.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sharedspace.onmicrosoft.com; s=selector2-sharedspace-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=SFaO/JM2jRk0PXpBrVn3x4Zx+/vpep7/B9nOrE04Kak=; b=TEOMR7MzyNI5DKckmr0Xhxob1JSj1LGngY5SL+ljk55vb5qRjWDIiFFb0oaYDo3NcA+kRLH/TPVjH0sTP5EIVzTyEB7tLMBz8NsseSj0jbQ8XUkEwAIS9NkUZUkcIRjONrGp0hRG6FM6XJuc86DElDeje6cCfVZGFEcbp1Fy+No= Received: from MN2PR04MB6061.namprd04.prod.outlook.com (20.178.246.15) by MN2PR04MB5597.namprd04.prod.outlook.com (20.179.22.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2581.11; Wed, 25 Dec 2019 03:00:44 +0000 Received: from MN2PR04MB6061.namprd04.prod.outlook.com ([fe80::a9a0:3ffa:371f:ad89]) by MN2PR04MB6061.namprd04.prod.outlook.com ([fe80::a9a0:3ffa:371f:ad89%7]) with mapi id 15.20.2559.017; Wed, 25 Dec 2019 03:00:44 +0000 Received: from wdc.com (106.51.19.73) by MAXPR01CA0084.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:49::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2581.11 via Frontend Transport; Wed, 25 Dec 2019 03:00:41 +0000 From: Anup Patel To: Will Deacon CC: Paolo Bonzini , Atish Patra , Alistair Francis , Anup Patel , "kvm@vger.kernel.org" , "kvm-riscv@lists.infradead.org" , Anup Patel Subject: [kvmtool RFC PATCH 8/8] riscv: Generate PCI host DT node Thread-Topic: [kvmtool RFC PATCH 8/8] riscv: Generate PCI host DT node Thread-Index: AQHVus9/uPMDxJI6OUWRrFMCHyYUcA== Date: Wed, 25 Dec 2019 03:00:43 +0000 Message-ID: <20191225025945.108466-9-anup.patel@wdc.com> References: <20191225025945.108466-1-anup.patel@wdc.com> In-Reply-To: <20191225025945.108466-1-anup.patel@wdc.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-clientproxiedby: MAXPR01CA0084.INDPRD01.PROD.OUTLOOK.COM (2603:1096:a00:49::26) To MN2PR04MB6061.namprd04.prod.outlook.com (2603:10b6:208:d8::15) authentication-results: spf=none (sender IP is ) smtp.mailfrom=Anup.Patel@wdc.com; x-ms-exchange-messagesentrepresentingtype: 1 x-mailer: git-send-email 2.17.1 x-originating-ip: [106.51.19.73] x-ms-publictraffictype: Email x-ms-office365-filtering-ht: Tenant x-ms-office365-filtering-correlation-id: 8761b41f-8acc-45ba-f7c7-08d788e6a1e5 x-ms-traffictypediagnostic: MN2PR04MB5597: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: wdcipoutbound: EOP-TRUE x-ms-oob-tlc-oobclassifiers: OLM:6108; x-forefront-prvs: 02622CEF0A x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(4636009)(39860400002)(136003)(346002)(376002)(366004)(396003)(199004)(189003)(5660300002)(86362001)(2906002)(4326008)(54906003)(81156014)(81166006)(66946007)(8676002)(1076003)(6916009)(8886007)(71200400001)(44832011)(66556008)(64756008)(1006002)(66446008)(52116002)(66476007)(55236004)(7696005)(16526019)(186003)(316002)(26005)(55016002)(956004)(2616005)(36756003)(478600001)(8936002)(32040200004);DIR:OUT;SFP:1102;SCL:1;SRVR:MN2PR04MB5597;H:MN2PR04MB6061.namprd04.prod.outlook.com;FPR:;SPF:None;LANG:en;PTR:InfoNoRecords;A:1;MX:1; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 MIME-Version: 1.0 X-OriginatorOrg: wdc.com X-MS-Exchange-CrossTenant-Network-Message-Id: 8761b41f-8acc-45ba-f7c7-08d788e6a1e5 X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Dec 2019 03:00:43.8321 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: b61c8803-16f3-4c35-9b17-6f65f441df86 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: rdzie6aUY8TUWJA1HYl8hSVBAUl26N49NYuyVOQzD2yclE6SSnPBi6x6UrIkMhoFY8/e1ev6ky+oHNOmCYdesA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR04MB5597 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org This patch extends FDT generation to generate PCI host DT node. Of course, PCI host for Guest/VM is not useful at the moment because it's mostly for PCI pass-through and we don't have IOMMU and interrupt routing available for KVM RISC-V. In future, we might be able to use PCI host for VirtIO PCI transport or other software emulated PCI devices. Signed-off-by: Anup Patel --- Makefile | 1 + riscv/fdt.c | 3 + riscv/include/kvm/kvm-arch.h | 2 + riscv/pci.c | 109 +++++++++++++++++++++++++++++++++++ 4 files changed, 115 insertions(+) create mode 100644 riscv/pci.c diff --git a/Makefile b/Makefile index fb78fa2..fa5e4f7 100644 --- a/Makefile +++ b/Makefile @@ -201,6 +201,7 @@ ifeq ($(ARCH),riscv) OBJS += riscv/irq.o OBJS += riscv/kvm.o OBJS += riscv/kvm-cpu.o + OBJS += riscv/pci.o OBJS += riscv/plic.o ARCH_WANT_LIBFDT := y diff --git a/riscv/fdt.c b/riscv/fdt.c index 3b56e30..fc8aa88 100644 --- a/riscv/fdt.c +++ b/riscv/fdt.c @@ -167,6 +167,9 @@ static int setup_fdt(struct kvm *kvm) dev_hdr = device__next_dev(dev_hdr); } + /* PCI host controller */ + pci__generate_fdt_nodes(fdt); + _FDT(fdt_end_node(fdt)); if (fdt_stdout_path) { diff --git a/riscv/include/kvm/kvm-arch.h b/riscv/include/kvm/kvm-arch.h index 7d3fd73..54a8c69 100644 --- a/riscv/include/kvm/kvm-arch.h +++ b/riscv/include/kvm/kvm-arch.h @@ -74,4 +74,6 @@ void plic__generate_irq_prop(void *fdt, u8 irq, enum irq_type irq_type); void plic__irq_trig(struct kvm *kvm, int irq, int level, bool edge); +void pci__generate_fdt_nodes(void *fdt); + #endif /* KVM__KVM_ARCH_H */ diff --git a/riscv/pci.c b/riscv/pci.c new file mode 100644 index 0000000..666a452 --- /dev/null +++ b/riscv/pci.c @@ -0,0 +1,109 @@ +#include "kvm/devices.h" +#include "kvm/fdt.h" +#include "kvm/kvm.h" +#include "kvm/of_pci.h" +#include "kvm/pci.h" +#include "kvm/util.h" + +/* + * An entry in the interrupt-map table looks like: + * + */ + +struct of_interrupt_map_entry { + struct of_pci_irq_mask pci_irq_mask; + u32 plic_phandle; + u32 plic_irq; +} __attribute__((packed)); + +void pci__generate_fdt_nodes(void *fdt) +{ + struct device_header *dev_hdr; + struct of_interrupt_map_entry irq_map[OF_PCI_IRQ_MAP_MAX]; + unsigned nentries = 0; + /* Bus range */ + u32 bus_range[] = { cpu_to_fdt32(0), cpu_to_fdt32(1), }; + /* Configuration Space */ + u64 cfg_reg_prop[] = { cpu_to_fdt64(KVM_PCI_CFG_AREA), + cpu_to_fdt64(RISCV_PCI_CFG_SIZE), }; + /* Describe the memory ranges */ + struct of_pci_ranges_entry ranges[] = { + { + .pci_addr = { + .hi = cpu_to_fdt32(of_pci_b_ss(OF_PCI_SS_IO)), + .mid = 0, + .lo = 0, + }, + .cpu_addr = cpu_to_fdt64(KVM_IOPORT_AREA), + .length = cpu_to_fdt64(RISCV_IOPORT_SIZE), + }, + { + .pci_addr = { + .hi = cpu_to_fdt32(of_pci_b_ss(OF_PCI_SS_M32)), + .mid = cpu_to_fdt32(KVM_PCI_MMIO_AREA >> 32), + .lo = cpu_to_fdt32(KVM_PCI_MMIO_AREA), + }, + .cpu_addr = cpu_to_fdt64(KVM_PCI_MMIO_AREA), + .length = cpu_to_fdt64(RISCV_PCI_MMIO_SIZE), + }, + }; + + /* Boilerplate PCI properties */ + _FDT(fdt_begin_node(fdt, "pci")); + _FDT(fdt_property_string(fdt, "device_type", "pci")); + _FDT(fdt_property_cell(fdt, "#address-cells", 0x3)); + _FDT(fdt_property_cell(fdt, "#size-cells", 0x2)); + _FDT(fdt_property_cell(fdt, "#interrupt-cells", 0x1)); + _FDT(fdt_property_string(fdt, "compatible", "pci-host-cam-generic")); + _FDT(fdt_property(fdt, "dma-coherent", NULL, 0)); + + _FDT(fdt_property(fdt, "bus-range", bus_range, sizeof(bus_range))); + _FDT(fdt_property(fdt, "reg", &cfg_reg_prop, sizeof(cfg_reg_prop))); + _FDT(fdt_property(fdt, "ranges", ranges, sizeof(ranges))); + + /* Generate the interrupt map ... */ + dev_hdr = device__first_dev(DEVICE_BUS_PCI); + while (dev_hdr && nentries < ARRAY_SIZE(irq_map)) { + struct of_interrupt_map_entry *entry = &irq_map[nentries]; + struct pci_device_header *pci_hdr = dev_hdr->data; + u8 dev_num = dev_hdr->dev_num; + u8 pin = pci_hdr->irq_pin; + u8 irq = pci_hdr->irq_line; + + *entry = (struct of_interrupt_map_entry) { + .pci_irq_mask = { + .pci_addr = { + .hi = cpu_to_fdt32(of_pci_b_ddddd(dev_num)), + .mid = 0, + .lo = 0, + }, + .pci_pin = cpu_to_fdt32(pin), + }, + .plic_phandle = cpu_to_fdt32(PHANDLE_PLIC), + .plic_irq = cpu_to_fdt32(irq), + }; + + nentries++; + dev_hdr = device__next_dev(dev_hdr); + } + + _FDT(fdt_property(fdt, "interrupt-map", irq_map, + sizeof(struct of_interrupt_map_entry) * nentries)); + + /* ... and the corresponding mask. */ + if (nentries) { + struct of_pci_irq_mask irq_mask = { + .pci_addr = { + .hi = cpu_to_fdt32(of_pci_b_ddddd(-1)), + .mid = 0, + .lo = 0, + }, + .pci_pin = cpu_to_fdt32(7), + }; + + _FDT(fdt_property(fdt, "interrupt-map-mask", &irq_mask, + sizeof(irq_mask))); + } + + _FDT(fdt_end_node(fdt)); +}