Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp689623ybi; Fri, 2 Aug 2019 02:40:01 -0700 (PDT) X-Google-Smtp-Source: APXvYqyjh/GRVZeJqghbvf/p9j1V/C9FpSdkdxkt7DmXiSsU4dZDKDyBFVF/1diqdl3Mw8K/+2jk X-Received: by 2002:a17:90a:8c06:: with SMTP id a6mr3560664pjo.45.1564738801645; Fri, 02 Aug 2019 02:40:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564738801; cv=none; d=google.com; s=arc-20160816; b=HKmrl9tKpyQBj8ehadksQcZtPjgrER20Pipw4IkARzmlG3ZC5T59u6sGm5ktpvDosG 4zGKLV6mvk9JEb9iDsOw22HQZoDfy2jprOBJe7Ipx91eqg0qnWwk6zrLRYjscYhiWeHT ocR59DzQf/1VvCD63PGTHYrFGVhqRvmj6/OHnmKy71eGT+l/HfLDWa/Hiryhcj7DKDoq bNbZFgUgxvVtK7vL/VQf1LXLMZsIe9K4xUajb1aUt9UjR+s5ZUqBD8/zzsUxfdK4cK6+ 1b00vHk0R3b+AyFs2JMAx4MxCmRSscr/cDobwFm7dtY2bL3m8wLeato681/nCtjGeqCp g/0A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:openpgp:from:references:cc:to:subject; bh=tCaYIDdP2Ci1Rqrimk/5TgidRQI7nz3EH1dEhZNEucs=; b=040U8wu0IlmiOKyCtAPTk1GW1KY36JOhTebScajPKFNu49GYFEVtzI8BH0TypgODih /MuiUxl+t5z+WrUjdzuTg1lcrE3jhZJxNshi+rQllADeU2coG0bWJW+2pRWmpRyuAJTc S6KVxceDU9A1PZMjpxEHYuX69a4W5HXnJLnD1JGfPnQiIKWBrdWwdTA2ikpE7usVDLO1 pMtYL5zyqsPSh4DTLazxJu/iYkyCZRQniWEH55aLCfN8iNfp9TUSAdSssFyen3MBnKrH TPtuqaYSZRpSwrN/ZJpnYOYlm4gwTBizLcT2Ryuybhk24/qVWO9MWKX304lk6u61JpEZ XaRQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v41si38615693pgn.481.2019.08.02.02.39.46; Fri, 02 Aug 2019 02:40:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388318AbfHBJWc (ORCPT + 99 others); Fri, 2 Aug 2019 05:22:32 -0400 Received: from mail-wr1-f68.google.com ([209.85.221.68]:45666 "EHLO mail-wr1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728904AbfHBJWb (ORCPT ); Fri, 2 Aug 2019 05:22:31 -0400 Received: by mail-wr1-f68.google.com with SMTP id f9so76393858wre.12 for ; Fri, 02 Aug 2019 02:22:29 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:cc:references:from:openpgp:message-id :date:user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=tCaYIDdP2Ci1Rqrimk/5TgidRQI7nz3EH1dEhZNEucs=; b=Fj4qWu4vUTaoHGiMwZYhyfZjJ+NqSYQtCKzlX1iJ8f1wHUKXO7R345ZZZC278SR90V euv9fkdzX/ut3HGw7JOrio69AonQH5bCtzPCs9GPpfv6E2HDpV6eHCMr6RivI/SgfqNN VD104s065Qa3jUXgw7YEbr//dxXEk+QKWSF5KSMwqV4qdywCsJB+VPDXX4IWW+bUr0wd yhUjydmnjPXhtym7PWCvzoThQYj5FcO9+x+FY9KWxUcJplIFGMeeEW9Nhimj8PuQtENy iPNlasZ9mDWCEPGzhLU4/zVmJYlWhTQWKjvR6ZLkBqz+di8sSrdd0GKJU9x350P5a5+G 9UlQ== X-Gm-Message-State: APjAAAUFlKn797DLUKS24QznRe3Yubka2vo+UqKdfsX+2lkcJygX2Hu3 sW+T+wHQt3d9iq+2d2cAQCMbJEQz960= X-Received: by 2002:a05:6000:12c2:: with SMTP id l2mr30757948wrx.65.1564737748423; Fri, 02 Aug 2019 02:22:28 -0700 (PDT) Received: from ?IPv6:2001:b07:6468:f312:4013:e920:9388:c3ff? ([2001:b07:6468:f312:4013:e920:9388:c3ff]) by smtp.gmail.com with ESMTPSA id z1sm78098619wrp.51.2019.08.02.02.22.26 (version=TLS1_3 cipher=AEAD-AES128-GCM-SHA256 bits=128/128); Fri, 02 Aug 2019 02:22:27 -0700 (PDT) Subject: Re: [RFC PATCH v2 00/19] KVM RISC-V Support To: Anup Patel , Palmer Dabbelt , Paul Walmsley , Radim K Cc: Daniel Lezcano , Thomas Gleixner , Atish Patra , Alistair Francis , Damien Le Moal , Christoph Hellwig , Anup Patel , "kvm@vger.kernel.org" , "linux-riscv@lists.infradead.org" , "linux-kernel@vger.kernel.org" References: <20190802074620.115029-1-anup.patel@wdc.com> From: Paolo Bonzini Openpgp: preference=signencrypt Message-ID: <69900526-8d7d-1ccb-4e8f-262ac1ae078e@redhat.com> Date: Fri, 2 Aug 2019 11:22:27 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: <20190802074620.115029-1-anup.patel@wdc.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 02/08/19 09:46, Anup Patel wrote: > This series adds initial KVM RISC-V support. Currently, we are able to boot > RISC-V 64bit Linux Guests with multiple VCPUs. > > Few key aspects of KVM RISC-V added by this series are: > 1. Minimal possible KVM world-switch which touches only GPRs and few CSRs. > 2. Full Guest/VM switch is done via vcpu_get/vcpu_put infrastructure. > 3. KVM ONE_REG interface for VCPU register access from user-space. > 4. PLIC emulation is done in user-space. In-kernel PLIC emulation, will > be added in future. > 5. Timer and IPI emuation is done in-kernel. > 6. MMU notifiers supported. > 7. FP lazy save/restore supported. > 8. SBI v0.1 emulation for KVM Guest available. > > Here's a brief TODO list which we will work upon after this series: > 1. Handle trap from unpriv access in reading Guest instruction > 2. Handle trap from unpriv access in SBI v0.1 emulation > 3. Implement recursive stage2 page table programing > 4. SBI v0.2 emulation in-kernel > 5. SBI v0.2 hart hotplug emulation in-kernel > 6. In-kernel PLIC emulation > 7. ..... and more ..... > > This series is based upon KVM pre-patches sent by Atish earlier > (https://lkml.org/lkml/2019/7/31/1503) and it can be found in > riscv_kvm_v2 branch at: > https//github.com/avpatel/linux.git > > Our work-in-progress KVMTOOL RISC-V port can be found in riscv_v1 branch at: > https//github.com/avpatel/kvmtool.git > > We need OpenSBI with RISC-V hypervisor extension support which can be > found in hyp_ext_changes_v1 branch at: > https://github.com/riscv/opensbi.git > > The QEMU RISC-V hypervisor emulation is done by Alistair and is available > in riscv-hyp-work.next branch at: > https://github.com/alistair23/qemu.git > > To play around with KVM RISC-V, here are few reference commands: > 1) To cross-compile KVMTOOL: > $ make lkvm-static > 2) To launch RISC-V Host Linux: > $ qemu-system-riscv64 -monitor null -cpu rv64,h=true -M virt \ > -m 512M -display none -serial mon:stdio \ > -kernel opensbi/build/platform/qemu/virt/firmware/fw_jump.elf \ > -device loader,file=build-riscv64/arch/riscv/boot/Image,addr=0x80200000 \ > -initrd ./rootfs_kvm_riscv64.img \ > -append "root=/dev/ram rw console=ttyS0 earlycon=sbi" > 3) To launch RISC-V Guest Linux with 9P rootfs: > $ ./apps/lkvm-static run -m 128 -c2 --console serial \ > -p "console=ttyS0 earlycon=uart8250,mmio,0x3f8" -k ./apps/Image --debug > 4) To launch RISC-V Guest Linux with initrd: > $ ./apps/lkvm-static run -m 128 -c2 --console serial \ > -p "console=ttyS0 earlycon=uart8250,mmio,0x3f8" -k ./apps/Image \ > -i ./apps/rootfs.img --debug LGTM apart from the comments I've sent about locking---which was the focus of my review this time through---and the bug on reading VSIP). Please try to have your GPG key signed by some other Linux maintainers so that you can use signed pull requests for RISC-V KVM. Paolo > Changes since v1: > - Fixed compile errors in building KVM RISC-V as module > - Removed unused kvm_riscv_halt_guest() and kvm_riscv_resume_guest() > - Set KVM_CAP_SYNC_MMU capability only after MMU notifiers are implemented > - Made vmid_version as unsigned long instead of atomic > - Renamed KVM_REQ_UPDATE_PGTBL to KVM_REQ_UPDATE_HGATP > - Renamed kvm_riscv_stage2_update_pgtbl() to kvm_riscv_stage2_update_hgatp() > - Configure HIDELEG and HEDELEG in kvm_arch_hardware_enable() > - Updated ONE_REG interface for CSR access to user-space > - Removed irqs_pending_lock and use atomic bitops instead > - Added separate patch for FP ONE_REG interface > - Added separate patch for updating MAINTAINERS file > > Anup Patel (14): > KVM: RISC-V: Add KVM_REG_RISCV for ONE_REG interface > RISC-V: Add hypervisor extension related CSR defines > RISC-V: Add initial skeletal KVM support > RISC-V: KVM: Implement VCPU create, init and destroy functions > RISC-V: KVM: Implement VCPU interrupts and requests handling > RISC-V: KVM: Implement KVM_GET_ONE_REG/KVM_SET_ONE_REG ioctls > RISC-V: KVM: Implement VCPU world-switch > RISC-V: KVM: Handle MMIO exits for VCPU > RISC-V: KVM: Handle WFI exits for VCPU > RISC-V: KVM: Implement VMID allocator > RISC-V: KVM: Implement stage2 page table programming > RISC-V: KVM: Implement MMU notifiers > RISC-V: Enable VIRTIO drivers in RV64 and RV32 defconfig > RISC-V: KVM: Add MAINTAINERS entry > > Atish Patra (5): > RISC-V: Export few kernel symbols > RISC-V: KVM: Add timer functionality > RISC-V: KVM: FP lazy save/restore > RISC-V: KVM: Implement ONE REG interface for FP registers > RISC-V: KVM: Add SBI v0.1 support > > MAINTAINERS | 10 + > arch/riscv/Kconfig | 2 + > arch/riscv/Makefile | 2 + > arch/riscv/configs/defconfig | 23 +- > arch/riscv/configs/rv32_defconfig | 13 + > arch/riscv/include/asm/csr.h | 58 ++ > arch/riscv/include/asm/kvm_host.h | 228 ++++++ > arch/riscv/include/asm/kvm_vcpu_timer.h | 32 + > arch/riscv/include/asm/pgtable-bits.h | 1 + > arch/riscv/include/uapi/asm/kvm.h | 98 +++ > arch/riscv/kernel/asm-offsets.c | 148 ++++ > arch/riscv/kernel/smp.c | 2 +- > arch/riscv/kernel/time.c | 1 + > arch/riscv/kvm/Kconfig | 34 + > arch/riscv/kvm/Makefile | 14 + > arch/riscv/kvm/main.c | 84 +++ > arch/riscv/kvm/mmu.c | 904 +++++++++++++++++++++++ > arch/riscv/kvm/tlb.S | 43 ++ > arch/riscv/kvm/vcpu.c | 936 ++++++++++++++++++++++++ > arch/riscv/kvm/vcpu_exit.c | 554 ++++++++++++++ > arch/riscv/kvm/vcpu_sbi.c | 119 +++ > arch/riscv/kvm/vcpu_switch.S | 368 ++++++++++ > arch/riscv/kvm/vcpu_timer.c | 106 +++ > arch/riscv/kvm/vm.c | 86 +++ > arch/riscv/kvm/vmid.c | 124 ++++ > drivers/clocksource/timer-riscv.c | 8 + > include/clocksource/timer-riscv.h | 16 + > include/uapi/linux/kvm.h | 1 + > 28 files changed, 4009 insertions(+), 6 deletions(-) > create mode 100644 arch/riscv/include/asm/kvm_host.h > create mode 100644 arch/riscv/include/asm/kvm_vcpu_timer.h > create mode 100644 arch/riscv/include/uapi/asm/kvm.h > create mode 100644 arch/riscv/kvm/Kconfig > create mode 100644 arch/riscv/kvm/Makefile > create mode 100644 arch/riscv/kvm/main.c > create mode 100644 arch/riscv/kvm/mmu.c > create mode 100644 arch/riscv/kvm/tlb.S > create mode 100644 arch/riscv/kvm/vcpu.c > create mode 100644 arch/riscv/kvm/vcpu_exit.c > create mode 100644 arch/riscv/kvm/vcpu_sbi.c > create mode 100644 arch/riscv/kvm/vcpu_switch.S > create mode 100644 arch/riscv/kvm/vcpu_timer.c > create mode 100644 arch/riscv/kvm/vm.c > create mode 100644 arch/riscv/kvm/vmid.c > create mode 100644 include/clocksource/timer-riscv.h > > -- > 2.17.1 >