The following series implements KVM support for ARM processors, specifically on the Cortex A-15 platform. Work is done in collaboration between Columbia University, Virtual Open Systems and ARM/Linaro. The patch series applies to kvm/next, specifically commit: 25e531a988ea5a64bd97a72dc9d3c65ad5850120 This is Version 8 of the patch series, but the first two versions were reviewed outside of the KVM mailing list. Changes can also be pulled from: git://github.com/virtualopensystems/linux-kvm-arm.git kvm-a15-v8 A non-flattened edition of the patch series can be found at: git://github.com/virtualopensystems/linux-kvm-arm.git kvm-a15-v8-stage The implementation is broken up into a logical set of patches, the first four are preparatory patches: 1. Add mem_type prot_pte accessor (ARM community) 2. Use KVM_CAP_IRQ_ROUTING to protect routing code (KVM community) 3. Introduce __KVM_HAVE_IRQ_LINE (KVM community) 4. Guard code with CONFIG_MMU_NOTIFIER (KVM community) KVM guys, please consider pulling the KVM generic patches as early as possible. Thanks. The main implementation is broken up into separate patches, the first containing a skeleton of files, makefile changes, the basic user space interface and KVM architecture specific stubs. Subsequent patches implement parts of the system as listed: 1. Preparatory patch introducing __KVM_HAVE_IRQ_LINE 2. Preparatory patch guarding mmu_notifier code with CONFIG_MMU_NOTIFIER 3. Skeleton 4. Identity Mapping for Hyp mode 5. Hypervisor initialization 6. Hypervisor module unloading 7. Memory virtualization setup (hyp mode mappings and 2nd stage) 8. Inject IRQs and FIQs from userspace 9. World-switch implementation and Hyp exception vectors 10. Emulation framework and CP15 emulation 11. Handle guest user memory aborts 12. Handle guest MMIO aborts 13. Support guest wait-for-interrupt instructions Testing: Limited testing, but have run GCC inside guest, which compiled a small hello-world program, which was successfully run. For v8 both ARM/Thumb-2 kernels were tested as both host/guest and both a compiled-in version and a kernel module version of KVM was tested. Hardware still unavailable to me, so all testing has been done on ARM Fast Models. For a guide on how to set up a testing environment and try out these patches, see: http://www.virtualopensystems.com/media/pdf/kvm-arm-guide.pdf There is an issue list available using the issue tracker on: https://github.com/virtualopensystems/linux-kvm-arm Additionally a few major milestones are coming up shortly: - Support Thumb MMIO emulation and test MMIO emulation code - Use section-based permanent identity mappings for init code. - Merge Marc Zyngier's patch series for VGIC and timers (review in progress) - Change from SMC based install to relying on booting the kernel in Hyp mode. This requires some larger changes, but will allow a guest kernel to boot with KVM configured. - Guest NEON/VFP support (work-in-progress from Virtual Open Systems) Changes since v7: - Traps accesses to ACTLR - Do not trap WFE execution - Upgrade barriers and TLB operations to inner-shareable domain - Restrucure hyp_pgd related code to be more opaque - Random SMP fixes - Random BUG fixes - Improve commenting - Support module loading/unloading of KVM/ARM - Thumb-2 support for host kernel and KVM - Unaligned cross-page wide guest Thumb instruction fetching - Support ITSTATE fields in CPSR for Thumb guests - Document HCR settings Changes since v6: - Support for MMU notifiers to not pin user pages in memory - Suport build with log debugging - Bugfix: v6 clobbered r7 in init code - Simplify hyp code mapping - Cleanup of register access code - Table-based CP15 emulation from Rusty Russell - Various other bug fixes and cleanups Changes since v5: - General bugfixes and nit fixes from reviews - Implemented re-use of VMIDs - Cleaned up the Hyp-mapping code to be readable by non-mm hackers (including myself) - Integrated preliminary SMP support in base patches - Lock-less interrupt injection and WFI support - Fixed signal-handling in while in guest (increases overall stability) Changes since v4: - Addressed reviewer comments from v4 * cleanup debug and trace code * remove printks * fixup kvm_arch_vcpu_ioctl_run * add trace details to mmio emulation - Fix from Marc Zyngier: Move kvm_guest_enter/exit into non-preemptible section (squashed into world-switch patch) - Cleanup create_hyp_mappings/remove_hyp_mappings from Marc Zyngier (squashed into hypervisor initialization patch) - Removed the remove_hyp_mappings feature. Removing hypervisor mappings could potentially unmap other important data shared in the same page. - Removed the arm_ prefix from the arch-specific files. - Initial SMP host/guest support Changes since v3: - v4 actually works, fully boots a guest - Support compiling as a module - Use static inlines instead of macros for vcpu_reg and friends - Optimize kvm_vcpu_reg function - Use Ftrace for trace capabilities - Updated documentation and commenting - Use KVM_IRQ_LINE instead of KVM_INTERRUPT - Emulates load/store instructions not supported through HSR syndrome information. - Frees 2nd stage translation tables on VM teardown - Handles IRQ/FIQ instructions - Handles more CP15 accesses - Support guest WFI calls - Uses debugfs instead of /proc - Support compiling in Thumb mode Changes since v2: - Performs world-switch code - Maps guest memory using 2nd stage translation - Emulates co-processor 15 instructions - Forwards I/O faults to QEMU. --- Christoffer Dall (12): KVM: Introduce __KVM_HAVE_IRQ_LINE ARM: KVM: Initial skeleton to compile KVM support ARM: KVM: Hypervisor identity mapping ARM: KVM: Hypervisor inititalization ARM: KVM: Module unloading support ARM: KVM: Memory virtualization setup ARM: KVM: Inject IRQs and FIQs from userspace ARM: KVM: World-switch implementation ARM: KVM: Emulation framework and CP15 emulation ARM: KVM: Handle guest faults in KVM ARM: KVM: Handle I/O aborts ARM: KVM: Guest wait-for-interrupts (WFI) support Marc Zyngier (3): ARM: add mem_type prot_pte accessor KVM: use KVM_CAP_IRQ_ROUTING to protect the routing related code KVM: Guard mmu_notifier specific code with CONFIG_MMU_NOTIFIER Documentation/virtual/kvm/api.txt | 12 arch/arm/Kconfig | 2 arch/arm/Makefile | 1 arch/arm/include/asm/kvm.h | 87 +++ arch/arm/include/asm/kvm_arm.h | 144 +++++ arch/arm/include/asm/kvm_asm.h | 56 ++ arch/arm/include/asm/kvm_emulate.h | 108 +++ arch/arm/include/asm/kvm_host.h | 140 ++++ arch/arm/include/asm/kvm_mmu.h | 43 + arch/arm/include/asm/mach/map.h | 1 arch/arm/include/asm/pgtable-3level-hwdef.h | 5 arch/arm/include/asm/pgtable-3level.h | 12 arch/arm/include/asm/pgtable.h | 10 arch/arm/include/asm/unified.h | 12 arch/arm/kernel/armksyms.c | 7 arch/arm/kernel/asm-offsets.c | 35 + arch/arm/kernel/entry-armv.S | 1 arch/arm/kvm/Kconfig | 45 + arch/arm/kvm/Makefile | 17 + arch/arm/kvm/arm.c | 843 +++++++++++++++++++++++++++ arch/arm/kvm/emulate.c | 747 ++++++++++++++++++++++++ arch/arm/kvm/exports.c | 35 + arch/arm/kvm/guest.c | 147 +++++ arch/arm/kvm/init.S | 144 +++++ arch/arm/kvm/interrupts.S | 596 +++++++++++++++++++ arch/arm/kvm/mmu.c | 608 +++++++++++++++++++ arch/arm/kvm/trace.h | 117 ++++ arch/arm/mm/Kconfig | 10 arch/arm/mm/idmap.c | 47 +- arch/arm/mm/mmu.c | 9 arch/ia64/include/asm/kvm.h | 1 arch/x86/include/asm/kvm.h | 1 include/linux/kvm.h | 1 include/linux/kvm_host.h | 6 include/trace/events/kvm.h | 4 mm/memory.c | 2 virt/kvm/kvm_main.c | 2 37 files changed, 4045 insertions(+), 13 deletions(-) create mode 100644 arch/arm/include/asm/kvm.h create mode 100644 arch/arm/include/asm/kvm_arm.h create mode 100644 arch/arm/include/asm/kvm_asm.h create mode 100644 arch/arm/include/asm/kvm_emulate.h create mode 100644 arch/arm/include/asm/kvm_host.h create mode 100644 arch/arm/include/asm/kvm_mmu.h create mode 100644 arch/arm/kvm/Kconfig create mode 100644 arch/arm/kvm/Makefile create mode 100644 arch/arm/kvm/arm.c create mode 100644 arch/arm/kvm/emulate.c create mode 100644 arch/arm/kvm/exports.c create mode 100644 arch/arm/kvm/guest.c create mode 100644 arch/arm/kvm/init.S create mode 100644 arch/arm/kvm/interrupts.S create mode 100644 arch/arm/kvm/mmu.c create mode 100644 arch/arm/kvm/trace.h -- -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html