2 * Copyright 2014 Google, Inc.
3 * Copyright (c) 2012, 2015 ARM Limited
6 * The license below extends only to copyright in the software and shall
7 * not be construed as granting a license to any other intellectual
8 * property including but not limited to intellectual property relating
9 * to a hardware implementation of the functionality of the software
10 * licensed hereunder. You may use the software subject to the license
11 * terms below provided that you ensure that this notice is replicated
12 * unmodified and in its entirety in all distributions of the software,
13 * modified or unmodified, in source code or in binary form.
15 * Redistribution and use in source and binary forms, with or without
16 * modification, are permitted provided that the following conditions are
17 * met: redistributions of source code must retain the above copyright
18 * notice, this list of conditions and the following disclaimer;
19 * redistributions in binary form must reproduce the above copyright
20 * notice, this list of conditions and the following disclaimer in the
21 * documentation and/or other materials provided with the distribution;
22 * neither the name of the copyright holders nor the names of its
23 * contributors may be used to endorse or promote products derived from
24 * this software without specific prior written permission.
26 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
27 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
28 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
29 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
30 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
31 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
32 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
33 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
34 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
35 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
36 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
38 * Authors: Andreas Sandberg
41 #include "cpu/kvm/vm.hh"
44 #include <linux/kvm.h>
45 #include <sys/ioctl.h>
47 #include <sys/types.h>
53 #include "cpu/kvm/base.hh"
54 #include "debug/Kvm.hh"
55 #include "params/KvmVM.hh"
56 #include "sim/system.hh"
58 #define EXPECTED_KVM_API_VERSION 12
60 #if EXPECTED_KVM_API_VERSION != KVM_API_VERSION
61 #error Unsupported KVM version
64 Kvm
*Kvm::instance
= NULL
;
67 : kvmFD(-1), apiVersion(-1), vcpuMMapSize(0)
69 kvmFD
= ::open("/dev/kvm", O_RDWR
);
71 fatal("KVM: Failed to open /dev/kvm\n");
73 apiVersion
= ioctl(KVM_GET_API_VERSION
);
74 if (apiVersion
!= EXPECTED_KVM_API_VERSION
)
75 fatal("KVM: Incompatible API version\n");
77 vcpuMMapSize
= ioctl(KVM_GET_VCPU_MMAP_SIZE
);
78 if (vcpuMMapSize
== -1)
79 panic("KVM: Failed to get virtual CPU MMAP size\n");
97 Kvm::capUserMemory() const
99 return checkExtension(KVM_CAP_USER_MEMORY
) != 0;
103 Kvm::capSetTSSAddress() const
105 return checkExtension(KVM_CAP_SET_TSS_ADDR
) != 0;
109 Kvm::capExtendedCPUID() const
111 return checkExtension(KVM_CAP_EXT_CPUID
) != 0;
115 Kvm::capUserNMI() const
117 #ifdef KVM_CAP_USER_NMI
118 return checkExtension(KVM_CAP_USER_NMI
) != 0;
125 Kvm::capCoalescedMMIO() const
127 return checkExtension(KVM_CAP_COALESCED_MMIO
);
131 Kvm::capNumMemSlots() const
133 #ifdef KVM_CAP_NR_MEMSLOTS
134 return checkExtension(KVM_CAP_NR_MEMSLOTS
);
141 Kvm::capOneReg() const
143 #ifdef KVM_CAP_ONE_REG
144 return checkExtension(KVM_CAP_ONE_REG
) != 0;
151 Kvm::capIRQChip() const
153 return checkExtension(KVM_CAP_IRQCHIP
) != 0;
157 Kvm::capVCPUEvents() const
159 #ifdef KVM_CAP_VCPU_EVENTS
160 return checkExtension(KVM_CAP_VCPU_EVENTS
) != 0;
167 Kvm::capDebugRegs() const
169 #ifdef KVM_CAP_DEBUGREGS
170 return checkExtension(KVM_CAP_DEBUGREGS
) != 0;
180 return checkExtension(KVM_CAP_XCRS
) != 0;
187 Kvm::capXSave() const
190 return checkExtension(KVM_CAP_XSAVE
) != 0;
197 #if defined(__i386__) || defined(__x86_64__)
199 Kvm::getSupportedCPUID(struct kvm_cpuid2
&cpuid
) const
201 if (ioctl(KVM_GET_SUPPORTED_CPUID
, (void *)&cpuid
) == -1) {
205 panic("KVM: Failed to get supported CPUID (errno: %i)\n", errno
);
210 const Kvm::CPUIDVector
&
211 Kvm::getSupportedCPUID() const
213 if (supportedCPUIDCache
.empty()) {
214 std::unique_ptr
<struct kvm_cpuid2
> cpuid
;
217 cpuid
.reset((struct kvm_cpuid2
*)operator new(
218 sizeof(kvm_cpuid2
) + i
* sizeof(kvm_cpuid_entry2
)));
222 } while (!getSupportedCPUID(*cpuid
));
223 supportedCPUIDCache
.assign(cpuid
->entries
,
224 cpuid
->entries
+ cpuid
->nent
);
227 return supportedCPUIDCache
;
231 Kvm::getSupportedMSRs(struct kvm_msr_list
&msrs
) const
233 if (ioctl(KVM_GET_MSR_INDEX_LIST
, (void *)&msrs
) == -1) {
237 panic("KVM: Failed to get supported CPUID (errno: %i)\n", errno
);
242 const Kvm::MSRIndexVector
&
243 Kvm::getSupportedMSRs() const
245 if (supportedMSRCache
.empty()) {
246 std::unique_ptr
<struct kvm_msr_list
> msrs
;
249 msrs
.reset((struct kvm_msr_list
*)operator new(
250 sizeof(kvm_msr_list
) + i
* sizeof(uint32_t)));
254 } while (!getSupportedMSRs(*msrs
));
255 supportedMSRCache
.assign(msrs
->indices
, msrs
->indices
+ msrs
->nmsrs
);
258 return supportedMSRCache
;
261 #endif // x86-specific
265 Kvm::checkExtension(int extension
) const
267 int ret
= ioctl(KVM_CHECK_EXTENSION
, extension
);
269 panic("KVM: ioctl failed when checking for extension\n");
274 Kvm::ioctl(int request
, long p1
) const
278 return ::ioctl(kvmFD
, request
, p1
);
286 vmFD
= ioctl(KVM_CREATE_VM
);
288 panic("Failed to create KVM VM\n");
294 KvmVM::KvmVM(KvmVMParams
*params
)
296 kvm(new Kvm()), system(nullptr),
297 vmFD(kvm
->createVM()),
301 maxMemorySlot
= kvm
->capNumMemSlots();
302 /* If we couldn't determine how memory slots there are, guess 32. */
305 /* Setup the coalesced MMIO regions */
306 for (int i
= 0; i
< params
->coalescedMMIO
.size(); ++i
)
307 coalesceMMIO(params
->coalescedMMIO
[i
]);
323 if (close(vmFD
) == -1)
324 warn("kvm VM: notifyFork failed to close vmFD\n");
344 KvmVM::delayedStartup()
346 assert(system
); // set by the system during its construction
347 const std::vector
<BackingStoreEntry
> &memories(
348 system
->getPhysMem().getBackingStore());
350 DPRINTF(Kvm
, "Mapping %i memory region(s)\n", memories
.size());
351 for (int slot(0); slot
< memories
.size(); ++slot
) {
352 if (!memories
[slot
].kvmMap
) {
353 DPRINTF(Kvm
, "Skipping region marked as not usable by KVM\n");
357 const AddrRange
&range(memories
[slot
].range
);
358 void *pmem(memories
[slot
].pmem
);
361 DPRINTF(Kvm
, "Mapping region: 0x%p -> 0x%llx [size: 0x%llx]\n",
362 pmem
, range
.start(), range
.size());
364 if (range
.interleaved()) {
365 panic("Tried to map an interleaved memory range into "
369 const MemSlot slot
= allocMemSlot(range
.size());
370 setupMemSlot(slot
, pmem
, range
.start(), 0/* flags */);
372 DPRINTF(Kvm
, "Zero-region not mapped: [0x%llx]\n", range
.start());
373 hack("KVM: Zero memory handled as IO\n");
379 KvmVM::allocMemSlot(uint64_t size
)
382 panic("Memory slots must have non-zero size.\n");
384 std::vector
<MemorySlot
>::iterator pos
;
385 for (pos
= memorySlots
.begin(); pos
!= memorySlots
.end(); pos
++) {
393 uint32_t nextSlot
= memorySlots
.size();
394 if (nextSlot
> maxMemorySlot
)
395 panic("Out of memory slots.\n");
399 slot
.slot
= nextSlot
;
402 memorySlots
.push_back(slot
);
403 return MemSlot(slot
.slot
);
407 KvmVM::setupMemSlot(const KvmVM::MemSlot num
, void *host_addr
, Addr guest
,
410 MemorySlot
&slot
= memorySlots
.at(num
.num
);
412 setUserMemoryRegion(num
.num
, host_addr
, guest
, slot
.size
, flags
);
416 KvmVM::disableMemSlot(const KvmVM::MemSlot num
)
418 MemorySlot
&slot
= memorySlots
.at(num
.num
);
420 setUserMemoryRegion(num
.num
, NULL
, 0, 0, 0);
425 KvmVM::freeMemSlot(const KvmVM::MemSlot num
)
427 disableMemSlot(num
.num
);
428 MemorySlot
&slot
= memorySlots
.at(num
.num
);
433 KvmVM::setUserMemoryRegion(uint32_t slot
,
434 void *host_addr
, Addr guest_addr
,
435 uint64_t len
, uint32_t flags
)
437 struct kvm_userspace_memory_region m
;
439 memset(&m
, 0, sizeof(m
));
442 m
.guest_phys_addr
= (uint64_t)guest_addr
;
444 m
.userspace_addr
= (__u64
)host_addr
;
446 if (ioctl(KVM_SET_USER_MEMORY_REGION
, (void *)&m
) == -1) {
447 panic("Failed to setup KVM memory region:\n"
448 "\tHost Address: 0x%p\n"
449 "\tGuest Address: 0x%llx\n",
452 m
.userspace_addr
, m
.guest_phys_addr
,
453 m
.memory_size
, m
.flags
);
458 KvmVM::coalesceMMIO(const AddrRange
&range
)
460 coalesceMMIO(range
.start(), range
.size());
464 KvmVM::coalesceMMIO(Addr start
, int size
)
466 struct kvm_coalesced_mmio_zone zone
;
472 DPRINTF(Kvm
, "KVM: Registering coalesced MMIO region [0x%x, 0x%x]\n",
473 zone
.addr
, zone
.addr
+ zone
.size
- 1);
474 if (ioctl(KVM_REGISTER_COALESCED_MMIO
, (void *)&zone
) == -1)
475 panic("KVM: Failed to register coalesced MMIO region (%i)\n",
480 KvmVM::setTSSAddress(Addr tss_address
)
482 if (ioctl(KVM_SET_TSS_ADDR
, (unsigned long)tss_address
) == -1)
483 panic("KVM: Failed to set VM TSS address\n");
487 KvmVM::createIRQChip()
489 if (_hasKernelIRQChip
)
490 panic("KvmVM::createIRQChip called twice.\n");
492 if (ioctl(KVM_CREATE_IRQCHIP
) != -1) {
493 _hasKernelIRQChip
= true;
495 warn("KVM: Failed to create in-kernel IRQ chip (errno: %i)\n",
497 _hasKernelIRQChip
= false;
502 KvmVM::setIRQLine(uint32_t irq
, bool high
)
504 struct kvm_irq_level kvm_level
;
507 kvm_level
.level
= high
? 1 : 0;
509 if (ioctl(KVM_IRQ_LINE
, &kvm_level
) == -1)
510 panic("KVM: Failed to set IRQ line level (errno: %i)\n",
515 KvmVM::createDevice(uint32_t type
, uint32_t flags
)
517 #if defined(KVM_CREATE_DEVICE)
518 struct kvm_create_device dev
= { type
, 0, flags
};
520 if (ioctl(KVM_CREATE_DEVICE
, &dev
) == -1) {
521 panic("KVM: Failed to create device (errno: %i)\n",
527 panic("Kernel headers don't support KVM_CREATE_DEVICE\n");
532 KvmVM::setSystem(System
*s
)
534 panic_if(system
!= nullptr, "setSystem() can only be called once");
535 panic_if(s
== nullptr, "setSystem() called with null System*");
540 KvmVM::contextIdToVCpuId(ContextID ctx
) const
542 assert(system
!= nullptr);
543 return dynamic_cast<BaseKvmCPU
*>
544 (system
->getThreadContext(ctx
)->getCpuPtr())->getVCpuID();
548 KvmVM::createVCPU(long vcpuID
)
552 fd
= ioctl(KVM_CREATE_VCPU
, vcpuID
);
554 panic("KVM: Failed to create virtual CPU");
565 #if defined(__aarch64__)
567 KvmVM::kvmArmPreferredTarget(struct kvm_vcpu_init
&target
) const
569 if (ioctl(KVM_ARM_PREFERRED_TARGET
, &target
) == -1) {
570 panic("KVM: Failed to get ARM preferred CPU target (errno: %i)\n",
577 KvmVM::ioctl(int request
, long p1
) const
581 return ::ioctl(vmFD
, request
, p1
);
586 KvmVMParams::create()
588 static bool created
= false;
590 warn_once("Use of multiple KvmVMs is currently untested!\n");
594 return new KvmVM(this);