From patchwork Wed Sep 27 03:09:34 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: zhaotianrui X-Patchwork-Id: 14566 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:cae8:0:b0:403:3b70:6f57 with SMTP id r8csp2383130vqu; Tue, 26 Sep 2023 21:46:42 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGk++G64AN9NtrSXavYW304NtDI7UllOawGNWnopxF5DJQ/RfB8Kmk3FyVRflvsH/46kSTv X-Received: by 2002:a05:6a21:19e:b0:15e:1351:f33a with SMTP id le30-20020a056a21019e00b0015e1351f33amr1104615pzb.47.1695790002669; Tue, 26 Sep 2023 21:46:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695790002; cv=none; d=google.com; s=arc-20160816; b=AGTPyPGbA/vxN3UvQxWRGegrH3z+loIIX4nM5+fD3KIovU+2eC+fSvbI+WNcygeHyu zQ+T6rmK8IIsFzL9C5rcNpCS0GnTDQ14AL4MMLSqThb/eWgziE/3f0wEulDTIPk06K89 LtMM6SIY/qtWna4jHv2thodJY1qtNRj17VOkbI9NU6JySsea32n0eeV8jHi0w9X8uphJ 7eUxTdeRYaiMa7hzPGU22C22VWaH0Kwf3VfbkHSL4GpE9fz6HX2QDFOI4+P/fdLFUt8W l8Vtuzst90YcrQb/6fMNuDUyqvzYqnMZkaqRJeOVGCsuEW27Y61wfKRVDT01kQ0LUbDv MIyw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=xtW69yQpT/rMCZLkLcyQrWDh+1dHb4o8CnVA41uzJVs=; fh=ejoaVAUUbBXsA/6jM/beuI9xCYtV2osdR9SpI7hjY84=; b=wxHJLMb/5xUt+aEY6tJv22cvvkvwNCxF81su23QsapqvN0Kh7q6RJ5iEfMSvm3R2Jy +kkNZdHf+E1DdPK7L8jsV48gxz2p6bq8lOqothzWOaaZgPsiKTrCac5eVQAMRQE7o5Bu doRy6pX3qOKYMMTp1z09ooruMc+apMkleWKT898ilTqPGx2j+yjVEbJ0MfrNNm3prJ/Q fN/royMpypsV4KOS7kso8dq6SSpYPKHugSiTvcOlX5/rUKbqVV3Njl9q/+iIge/Z0bXA H+LdSQhrBchy0Fk82tEyBsIJ2d78rvqK/z27/C1K3CfWCk/scQkc80x3JwwCdCfxNAm0 xbzQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from morse.vger.email (morse.vger.email. [2620:137:e000::3:1]) by mx.google.com with ESMTPS id m9-20020a170902c44900b001b3bd85f54bsi13683406plm.35.2023.09.26.21.46.42 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 26 Sep 2023 21:46:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) client-ip=2620:137:e000::3:1; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id DB05F82072F6; Tue, 26 Sep 2023 21:37:56 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229546AbjI0Egp (ORCPT + 26 others); Wed, 27 Sep 2023 00:36:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57218 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229660AbjI0Efa (ORCPT ); Wed, 27 Sep 2023 00:35:30 -0400 Received: from mail.loongson.cn (mail.loongson.cn [114.242.206.163]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id ED1D911F; Tue, 26 Sep 2023 20:10:03 -0700 (PDT) Received: from loongson.cn (unknown [10.2.5.185]) by gateway (Coremail) with SMTP id _____8Cx7+sJnRNlyBYtAA--.19613S3; Wed, 27 Sep 2023 11:10:01 +0800 (CST) Received: from localhost.localdomain (unknown [10.2.5.185]) by localhost.localdomain (Coremail) with SMTP id AQAAf8Cxjd4InRNlhZETAA--.42466S2; Wed, 27 Sep 2023 11:10:00 +0800 (CST) From: Tianrui Zhao To: linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: Paolo Bonzini , Huacai Chen , WANG Xuerui , Greg Kroah-Hartman , loongarch@lists.linux.dev, Jens Axboe , Mark Brown , Alex Deucher , Oliver Upton , maobibo@loongson.cn, Xi Ruoyao , zhaotianrui@loongson.cn Subject: [PATCH v22 00/25] Add KVM LoongArch support Date: Wed, 27 Sep 2023 11:09:34 +0800 Message-Id: <20230927030959.3629941-1-zhaotianrui@loongson.cn> X-Mailer: git-send-email 2.39.1 MIME-Version: 1.0 X-CM-TRANSID: AQAAf8Cxjd4InRNlhZETAA--.42466S2 X-CM-SenderInfo: p2kd03xldq233l6o00pqjv00gofq/ X-Coremail-Antispam: 1Uk129KBjDUn29KB7ZKAUJUUUUU529EdanIXcx71UUUUU7KY7 ZEXasCq-sGcSsGvfJ3UbIjqfuFe4nvWSU5nxnvy29KBjDU0xBIdaVrnUUvcSsGvfC2Kfnx nUUI43ZEXa7xR_UUUUUUUUU== X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Tue, 26 Sep 2023 21:37:56 -0700 (PDT) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1778164697438408047 X-GMAIL-MSGID: 1778164697438408047 From: zhaotianrui This series adds KVM LoongArch support. Loongson 3A5000 supports hardware assisted virtualization. With cpu virtualization, there are separate hw-supported user mode and kernel mode in guest mode. With memory virtualization, there are two-level hw mmu table for guest mode and host mode. Also there is separate hw cpu timer with consant frequency in guest mode, so that vm can migrate between hosts with different freq. Currently, we are able to boot LoongArch Linux Guests. Few key aspects of KVM LoongArch added by this series are: 1. Enable kvm hardware function when kvm module is loaded. 2. Implement VM and vcpu related ioctl interface such as vcpu create, vcpu run etc. GET_ONE_REG/SET_ONE_REG ioctl commands are use to get general registers one by one. 3. Hardware access about MMU, timer and csr are emulated in kernel. 4. Hardwares such as mmio and iocsr device are emulated in user space such as APIC, IPI, pci devices etc. The running environment of LoongArch virt machine: 1. Cross tools for building kernel and uefi: https://github.com/loongson/build-tools 2. This series is based on the linux source code: https://github.com/loongson/linux-loongarch-kvm Build command: git checkout kvm-loongarch make ARCH=loongarch CROSS_COMPILE=loongarch64-unknown-linux-gnu- loongson3_defconfig make ARCH=loongarch CROSS_COMPILE=loongarch64-unknown-linux-gnu- 3. QEMU hypervisor with LoongArch supported: https://github.com/loongson/qemu Build command: git checkout kvm-loongarch ./configure --target-list="loongarch64-softmmu" --enable-kvm make 4. Uefi bios of LoongArch virt machine: Link: https://github.com/tianocore/edk2-platforms/tree/master/Platform/Loongson/LoongArchQemuPkg#readme 5. you can also access the binary files we have already build: https://github.com/yangxiaojuan-loongson/qemu-binary The command to boot loongarch virt machine: $ qemu-system-loongarch64 -machine virt -m 4G -cpu la464 \ -smp 1 -bios QEMU_EFI.fd -kernel vmlinuz.efi -initrd ramdisk \ -serial stdio -monitor telnet:localhost:4495,server,nowait \ -append "root=/dev/ram rdinit=/sbin/init console=ttyS0,115200" \ --nographic Changes for v22: 1. Combine very small patches. 2. Define KVM_REG_LOONGARCH_KVM registers begin with 1. 3. Remove unused KVM_LOONGSON_IRQ_* definitions. 4. Mark HW_GCSR/SW_GCSR correctly in kvm_init_gcsr_flag(). 5. Make kvm_flush_tlb_gpa() be a void function, since it always return 0. 6. Rename KVM_REG_LOONGARCH_FPU to KVM_REG_LOONGARCH_FPSIMD which is more accurate. 7. Rename KVM_LARCH_CSR to KVM_LARCH_SWCSR_LATEST, corresponding to KVM_LARCH_HWCSR_USABLE. 8. Rename int_to_coreint to priority_to_irq, corresponding to the defined variable names. 9. Replace if-else with switch-case in kvm_handle_csr(). 10. Replace if-else with switch-case in kvm_emu_mmio_read() and kvm_emu_mmio_write(). 11. Remove ANON_INODES/SRCU in Kconfig since they are already selected unconditinally. 12. Many coding style adjustment and typo fixes. 13. Remove kvm_init_fault function and init kvm_fault_tables when it is defined. Changes for v21: 1. Remove unnecessary prefix '_' in some kvm function names. 2. Replace check_vmid with check_vpid, and move the functions to main.c. 3. Re-order the file names and config names by alphabetical in KVM makefile and Kconfig. 4. Code clean up for KVM mmu and get,set gcsr and vcpu_arch ioctl functions. changes for v20: 1. Remove the binary code of virtualization instructions in insn_def.h and csr_ops.S and directly use the default csrrd, csrwr,csrxchg instructions. And let CONFIG_KVM depends on the AS_HAS_LVZ_EXTENSION, so we should use the binutils that have already supported them to compile the KVM. This can make our LoongArch KVM codes more maintainable and easier. changes for v19: 1. Use the common interface xfer_to_guest_mode_handle_work to Check conditions before entering the guest. 2. Add vcpu dirty ring support. changes for v18: 1. Code cleanup for vcpu timer: remove unnecessary timer_period_ns, timer_bias, timer_dyn_bias variables in kvm_vcpu_arch and rename the stable_ktime_saved variable to expire. 2. Change the value of KVM_ARCH_NR_OBJS_PER_MEMORY_CACHE to 40. changes for v17: 1. Add CONFIG_AS_HAS_LVZ_EXTENSION config option which depends on binutils that support LVZ assemble instruction. 2. Change kvm mmu related functions, such as rename level2_ptw_pgd to kvm_ptw_pgd, replace kvm_flush_range with kvm_ptw_pgd pagewalk framework, replace kvm_arch.gpa_mm with kvm_arch.pgd, set mark_page_dirty/kvm_set_pfn_dirty out of mmu_lock in kvm page fault handling. 3. Replace kvm_loongarch_interrupt with standard kvm_interrupt when injecting IRQ. 4. Replace vcpu_arch.last_exec_cpu with existing vcpu.cpu, remove kvm_arch.online_vcpus and kvm_arch.is_migrating, 5. Remove EXCCODE_TLBNR and EXCCODE_TLBNX in kvm exception table, since NR/NX bit is not set in kvm page fault handling. Changes for v16: 1. Free allocated memory of vmcs,kvm_loongarch_ops in kvm module init, exit to avoid memory leak problem. 2. Simplify some assemble codes in switch.S which are necessary to be replaced with pseudo-instructions. And any other instructions do not need to be replaced anymore. 3. Add kvm_{save,restore}_guest_gprs macros to replace these ld.d,st.d guest regs instructions when vcpu world switch. 4. It is more secure to disable irq when flush guest tlb by gpa, so replace preempt_disable with loacl_irq_save in kvm_flush_tlb_gpa. Changes for v15: 1. Re-order some macros and variables in LoongArch kvm headers, put them together which have the same meaning. 2. Make some function definitions in one line, as it is not needed to split them. 3. Re-name some macros such as KVM_REG_LOONGARCH_GPR. Changes for v14: 1. Remove the macro CONFIG_KVM_GENERIC_HARDWARE_ENABLING in loongarch/kvm/main.c, as it is not useful. 2. Add select KVM_GENERIC_HARDWARE_ENABLING in loongarch/kvm/Kconfig, as it is used by virt/kvm. 3. Fix the LoongArch KVM source link in MAINTAINERS. 4. Improve LoongArch KVM documentation, such as add comment for LoongArch kvm_regs. Changes for v13: 1. Remove patch-28 "Implement probe virtualization when cpu init", as the virtualization information about FPU,PMP,LSX in guest.options,options_dyn is not used and the gcfg reg value can be read in kvm_hardware_enable, so remove the previous cpu_probe_lvz function. 2. Fix vcpu_enable_cap interface, it should return -EINVAL directly, as FPU cap is enable by default, and do not support any other caps now. 3. Simplify the jirl instruction with jr when without return addr, simplify case HW0 ... HW7 statment in interrupt.c 4. Rename host_stack,host_gp in kvm_vcpu_arch to host_sp,host_tp. 5. Remove 'cpu' parameter in _kvm_check_requests, as 'cpu' is not used, and remove 'cpu' parameter in kvm_check_vmid function, as it can get cpu number by itself. Changes for v12: 1. Improve the gcsr write/read/xchg interface to avoid the previous instruction statment like parse_r and make the code easy understanding, they are implemented in asm/insn-def.h and the instructions consistent of "opcode" "rj" "rd" "simm14" arguments. 2. Fix the maintainers list of LoongArch KVM. Changes for v11: 1. Add maintainers for LoongArch KVM. Changes for v10: 1. Fix grammatical problems in LoongArch documentation. 2. It is not necessary to save or restore the LOONGARCH_CSR_PGD when vcpu put and vcpu load, so we remove it. Changes for v9: 1. Apply the new defined interrupt number macros in loongarch.h to kvm, such as INT_SWI0, INT_HWI0, INT_TI, INT_IPI, etc. And remove the previous unused macros. 2. Remove unused variables in kvm_vcpu_arch, and reorder the variables to make them more standard. Changes for v8: 1. Adjust the cpu_data.guest.options structure, add the ases flag into it, and remove the previous guest.ases. We do this to keep consistent with host cpu_data.options structure. 2. Remove the "#include " in some files which also include the "". As linux/kvm_host.h already include the asm/kvm_host.h. 3. Fix some unstandard spelling and grammar errors in comments, and improve a little code format to make it easier and standard. Changes for v7: 1. Fix the kvm_save/restore_hw_gcsr compiling warnings reported by kernel test robot. The report link is: https://lore.kernel.org/oe-kbuild-all/202304131526.iXfLaVZc-lkp@intel.com/ 2. Fix loongarch kvm trace related compiling problems. Changes for v6: 1. Fix the Documentation/virt/kvm/api.rst compile warning about loongarch parts. Changes for v5: 1. Implement get/set mp_state ioctl interface, and only the KVM_MP_STATE_RUNNABLE state is supported now, and other states will be completed in the future. The state is also used when vcpu run idle instruction, if vcpu state is changed to RUNNABLE, the vcpu will have the possibility to be woken up. 2. Supplement kvm document about loongarch-specific part, such as add api introduction for GET/SET_ONE_REG, GET/SET_FPU, GET/SET_MP_STATE, etc. 3. Improve the kvm_switch_to_guest function in switch.S, remove the previous tmp,tmp1 arguments and replace it with t0,t1 reg. Changes for v4: 1. Add a csr_need_update flag in _vcpu_put, as most csr registers keep unchanged during process context switch, so we need not to update it every time. We can do this only if the soft csr is different form hardware. That is to say all of csrs should update after vcpu enter guest, as for set_csr_ioctl, we have written soft csr to keep consistent with hardware. 2. Improve get/set_csr_ioctl interface, we set SW or HW or INVALID flag for all csrs according to it's features when kvm init. In get/set_csr_ioctl, if csr is HW, we use gcsrrd/ gcsrwr instruction to access it, else if csr is SW, we use software to emulate it, and others return false. 3. Add set_hw_gcsr function in csr_ops.S, and it is used in set_csr_ioctl. We have splited hw gcsr into three parts, so we can calculate the code offset by gcsrid and jump here to run the gcsrwr instruction. We use this function to make the code easier and avoid to use the previous SET_HW_GCSR(XXX) interface. 4. Improve kvm mmu functions, such as flush page table and make clean page table interface. Changes for v3: 1. Remove the vpid array list in kvm_vcpu_arch and use a vpid variable here, because a vpid will never be recycled if a vCPU migrates from physical CPU A to B and back to A. 2. Make some constant variables in kvm_context to global such as vpid_mask, guest_eentry, enter_guest, etc. 3. Add some new tracepoints, such as kvm_trace_idle, kvm_trace_cache, kvm_trace_gspr, etc. 4. There are some duplicate codes in kvm_handle_exit and kvm_vcpu_run, so we move it to a new function kvm_pre_enter_guest. 5. Change the RESUME_HOST, RESUME_GUEST value, return 1 for resume guest and "<= 0" for resume host. 6. Fcsr and fpu registers are saved/restored together. Changes for v2: 1. Seprate the original patch-01 and patch-03 into small patches, and the patches mainly contain kvm module init, module exit, vcpu create, vcpu run, etc. 2. Remove the original KVM_{GET,SET}_CSRS ioctl in the kvm uapi header, and we use the common KVM_{GET,SET}_ONE_REG to access register. 3. Use BIT(x) to replace the "1 << n_bits" statement. Tianrui Zhao (25): LoongArch: KVM: Add kvm related header files LoongArch: KVM: Implement kvm module related interface LoongArch: KVM: Implement kvm hardware enable, disable interface LoongArch: KVM: Implement VM related functions LoongArch: KVM: Add vcpu related header files LoongArch: KVM: Implement basic vcpu interfaces LoongArch: KVM: Implement basic vcpu ioctl interfaces LoongArch: KVM: Implement fpu operations for vcpu LoongArch: KVM: Implement vcpu interrupt operations LoongArch: KVM: Implement vcpu load and vcpu put operations LoongArch: KVM: Implement misc vcpu related interfaces LoongArch: KVM: Implement vcpu timer operations LoongArch: KVM: Implement virtual machine tlb operations LoongArch: KVM: Implement kvm mmu operations LoongArch: KVM: Implement handle csr exception LoongArch: KVM: Implement handle iocsr exception LoongArch: KVM: Implement handle idle exception LoongArch: KVM: Implement handle gspr exception LoongArch: KVM: Implement handle mmio exception LoongArch: KVM: Implement handle fpu exception LoongArch: KVM: Implement kvm exception vectors LoongArch: KVM: Implement vcpu world switch LoongArch: KVM: Enable kvm config and add the makefile LoongArch: KVM: Supplement kvm document about LoongArch-specific part LoongArch: KVM: Add maintainers for LoongArch KVM Documentation/virt/kvm/api.rst | 70 +- MAINTAINERS | 12 + arch/loongarch/Kbuild | 2 + arch/loongarch/Kconfig | 6 + arch/loongarch/configs/loongson3_defconfig | 2 + arch/loongarch/include/asm/inst.h | 16 + arch/loongarch/include/asm/kvm_csr.h | 211 +++++ arch/loongarch/include/asm/kvm_host.h | 237 ++++++ arch/loongarch/include/asm/kvm_mmu.h | 139 +++ arch/loongarch/include/asm/kvm_types.h | 11 + arch/loongarch/include/asm/kvm_vcpu.h | 93 ++ arch/loongarch/include/asm/loongarch.h | 19 +- arch/loongarch/include/uapi/asm/kvm.h | 108 +++ arch/loongarch/kernel/asm-offsets.c | 32 + arch/loongarch/kvm/Kconfig | 40 + arch/loongarch/kvm/Makefile | 20 + arch/loongarch/kvm/exit.c | 696 +++++++++++++++ arch/loongarch/kvm/interrupt.c | 183 ++++ arch/loongarch/kvm/main.c | 420 +++++++++ arch/loongarch/kvm/mmu.c | 914 ++++++++++++++++++++ arch/loongarch/kvm/switch.S | 250 ++++++ arch/loongarch/kvm/timer.c | 197 +++++ arch/loongarch/kvm/tlb.c | 32 + arch/loongarch/kvm/trace.h | 162 ++++ arch/loongarch/kvm/vcpu.c | 939 +++++++++++++++++++++ arch/loongarch/kvm/vm.c | 92 ++ include/uapi/linux/kvm.h | 9 + 27 files changed, 4898 insertions(+), 14 deletions(-) create mode 100644 arch/loongarch/include/asm/kvm_csr.h create mode 100644 arch/loongarch/include/asm/kvm_host.h create mode 100644 arch/loongarch/include/asm/kvm_mmu.h create mode 100644 arch/loongarch/include/asm/kvm_types.h create mode 100644 arch/loongarch/include/asm/kvm_vcpu.h create mode 100644 arch/loongarch/include/uapi/asm/kvm.h create mode 100644 arch/loongarch/kvm/Kconfig create mode 100644 arch/loongarch/kvm/Makefile create mode 100644 arch/loongarch/kvm/exit.c create mode 100644 arch/loongarch/kvm/interrupt.c create mode 100644 arch/loongarch/kvm/main.c create mode 100644 arch/loongarch/kvm/mmu.c create mode 100644 arch/loongarch/kvm/switch.S create mode 100644 arch/loongarch/kvm/timer.c create mode 100644 arch/loongarch/kvm/tlb.c create mode 100644 arch/loongarch/kvm/trace.h create mode 100644 arch/loongarch/kvm/vcpu.c create mode 100644 arch/loongarch/kvm/vm.c