public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
From: Alexander Graf <agraf-l3A5Bk7waGM@public.gmane.org>
To: kvm-ppc-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
Cc: KVM list <kvm-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>,
	linuxppc-dev
	<linuxppc-dev-uLR06cmDAlY/bJ5BZ2RsiQ@public.gmane.org>
Subject: [PATCH 26/26] KVM: PPC: Add Documentation about PV interface
Date: Sat, 26 Jun 2010 01:25:14 +0200	[thread overview]
Message-ID: <1277508314-915-27-git-send-email-agraf@suse.de> (raw)
In-Reply-To: <1277508314-915-1-git-send-email-agraf-l3A5Bk7waGM@public.gmane.org>

We just introduced a new PV interface that screams for documentation. So here
it is - a shiny new and awesome text file describing the internal works of
the PPC KVM paravirtual interface.

Signed-off-by: Alexander Graf <agraf-l3A5Bk7waGM@public.gmane.org>
---
 Documentation/kvm/ppc-pv.txt |  164 ++++++++++++++++++++++++++++++++++++++++++
 1 files changed, 164 insertions(+), 0 deletions(-)
 create mode 100644 Documentation/kvm/ppc-pv.txt

diff --git a/Documentation/kvm/ppc-pv.txt b/Documentation/kvm/ppc-pv.txt
new file mode 100644
index 0000000..7cbcd51
--- /dev/null
+++ b/Documentation/kvm/ppc-pv.txt
@@ -0,0 +1,164 @@
+The PPC KVM paravirtual interface
+=================================
+
+The basic execution principle by which KVM on PowerPC works is to run all kernel
+space code in PR=1 which is user space. This way we trap all privileged
+instructions and can emulate them accordingly.
+
+Unfortunately that is also the downfall. There are quite some privileged
+instructions that needlessly return us to the hypervisor even though they
+could be handled differently.
+
+This is what the PPC PV interface helps with. It takes privileged instructions
+and transforms them into unprivileged ones with some help from the hypervisor.
+This cuts down virtualization costs by about 50% on some of my benchmarks.
+
+The code for that interface can be found in arch/powerpc/kernel/kvm*
+
+Querying for existence
+======================
+
+To find out if we're running on KVM or not, we overlay the PVR register. Usually
+the PVR register contains an id that identifies your CPU type. If, however, you
+pass KVM_PVR_PARA in the register that you want the PVR result in, the register
+still contains KVM_PVR_PARA after the mfpvr call.
+
+	LOAD_REG_IMM(r5, KVM_PVR_PARA)
+	mfpvr	r5
+	[r5 still contains KVM_PVR_PARA]
+
+Once determined to run under a PV capable KVM, you can now use hypercalls as
+described below.
+
+PPC hypercalls
+==============
+
+The only viable ways to reliably get from guest context to host context are:
+
+	1) Call an invalid instruction
+	2) Call the "sc" instruction with a parameter to "sc"
+	3) Call the "sc" instruction with parameters in GPRs
+
+Method 1 is always a bad idea. Invalid instructions can be replaced later on
+by valid instructions, rendering the interface broken.
+
+Method 2 also has downfalls. If the parameter to "sc" is != 0 the spec is
+rather unclear if the sc is targeted directly for the hypervisor or the
+supervisor. It would also require that we read the syscall issuing instruction
+every time a syscall is issued, slowing down guest syscalls.
+
+Method 3 is what KVM uses. We pass magic constants (KVM_SC_MAGIC_R3 and
+KVM_SC_MAGIC_R4) in r3 and r4 respectively. If a syscall instruction with these
+magic values arrives from the guest's kernel mode, we take the syscall as a
+hypercall.
+
+The parameters are as follows:
+
+	r3		KVM_SC_MAGIC_R3
+	r4		KVM_SC_MAGIC_R4
+	r5		Hypercall number
+	r6		First parameter
+	r7		Second parameter
+	r8		Third parameter
+	r9		Fourth parameter
+
+Hypercall definitions are shared in generic code, so the same hypercall numbers
+apply for x86 and powerpc alike.
+
+The magic page
+==============
+
+To enable communication between the hypervisor and guest there is a new shared
+page that contains parts of supervisor visible register state. The guest can
+map this shared page using the KVM hypercall KVM_HC_PPC_MAP_MAGIC_PAGE.
+
+With this hypercall issued the guest always gets the magic page mapped at the
+desired location in effective and physical address space. For now, we always
+map the page to -4096. This way we can access it using absolute load and store
+functions. The following instruction reads the first field of the magic page:
+
+	ld	rX, -4096(0)
+
+The interface is designed to be extensible should there be need later to add
+additional registers to the magic page. If you add fields to the magic page,
+also define a new hypercall feature to indicate that the host can give you more
+registers. Only if the host supports the additional features, make use of them.
+
+The magic page has the following layout as described in
+arch/powerpc/include/asm/kvm_para.h:
+
+struct kvm_vcpu_arch_shared {
+	__u64 scratch1;
+	__u64 scratch2;
+	__u64 scratch3;
+	__u64 critical;		/* Guest may not get interrupts if == r1 */
+	__u64 sprg0;
+	__u64 sprg1;
+	__u64 sprg2;
+	__u64 sprg3;
+	__u64 srr0;
+	__u64 srr1;
+	__u64 dar;
+	__u64 msr;
+	__u32 dsisr;
+	__u32 int_pending;	/* Tells the guest if we have an interrupt */
+};
+
+Additions to the page must only occur at the end. Struct fields are always 32
+bit aligned.
+
+Patched instructions
+====================
+
+The "ld" and "std" instructions are transormed to "lwz" and "stw" instructions
+respectively on 32 bit systems with an added offset of 4 to accomodate for big
+endianness.
+
+From			To
+====			==
+
+mfmsr	rX		ld	rX, magic_page->msr
+mfsprg	rX, 0		ld	rX, magic_page->sprg0
+mfsprg	rX, 1		ld	rX, magic_page->sprg1
+mfsprg	rX, 2		ld	rX, magic_page->sprg2
+mfsprg	rX, 3		ld	rX, magic_page->sprg3
+mfsrr0	rX		ld	rX, magic_page->srr0
+mfsrr1	rX		ld	rX, magic_page->srr1
+mfdar	rX		ld	rX, magic_page->dar
+mfdsisr	rX		ld	rX, magic_page->dsisr
+
+mtmsr	rX		std	rX, magic_page->msr
+mtsprg	0, rX		std	rX, magic_page->sprg0
+mtsprg	1, rX		std	rX, magic_page->sprg1
+mtsprg	2, rX		std	rX, magic_page->sprg2
+mtsprg	3, rX		std	rX, magic_page->sprg3
+mtsrr0	rX		std	rX, magic_page->srr0
+mtsrr1	rX		std	rX, magic_page->srr1
+mtdar	rX		std	rX, magic_page->dar
+mtdsisr	rX		std	rX, magic_page->dsisr
+
+tlbsync			nop
+
+mtmsrd	rX, 0		b	<special mtmsr section>
+mtmsr			b	<special mtmsr section>
+
+mtmsrd	rX, 1		b	<special mtmsrd section>
+
+[BookE only]
+wrteei	[0|1]		b	<special wrteei section>
+
+
+Some instructions require more logic to determine what's going on than a load
+or store instruction can deliver. To enable patching of those, we keep some
+RAM around where we can live translate instructions to. What happens is the
+following:
+
+	1) copy emulation code to memory
+	2) patch that code to fit the emulated instruction
+	3) patch that code to return to the original pc + 4
+	4) patch the original instruction to branch to the new code
+
+That way we can inject an arbitrary amount of code as replacement for a single
+instruction. This allows us to check for pending interrupts when setting EE=1
+for example.
+
-- 
1.6.0.2

  parent reply	other threads:[~2010-06-25 23:25 UTC|newest]

Thread overview: 78+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2010-06-25 23:24 [PATCH 00/26] KVM PPC PV framework Alexander Graf
2010-06-25 23:24 ` [PATCH 01/26] KVM: PPC: Introduce shared page Alexander Graf
     [not found]   ` <1277508314-915-2-git-send-email-agraf-l3A5Bk7waGM@public.gmane.org>
2010-06-27 12:12     ` Avi Kivity
     [not found]       ` <4C274028.7020105-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2010-06-29  9:54         ` Alexander Graf
2010-06-29 10:55           ` Avi Kivity
     [not found] ` <1277508314-915-1-git-send-email-agraf-l3A5Bk7waGM@public.gmane.org>
2010-06-25 23:24   ` [PATCH 02/26] KVM: PPC: Convert MSR to " Alexander Graf
     [not found]     ` <1277508314-915-3-git-send-email-agraf-l3A5Bk7waGM@public.gmane.org>
2010-06-27  8:16       ` Avi Kivity
     [not found]         ` <4C2708EB.9020500-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2010-06-27  9:38           ` Alexander Graf
     [not found]             ` <651805F1-54AB-466F-8D23-D053D8082177-l3A5Bk7waGM@public.gmane.org>
2010-06-27  9:50               ` Avi Kivity
     [not found]                 ` <4C271EE5.1060401-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2010-06-27 10:40                   ` Alexander Graf
2010-06-25 23:24   ` [PATCH 04/26] KVM: PPC: Convert DAR " Alexander Graf
2010-06-25 23:24   ` [PATCH 08/26] KVM: PPC: Add PV guest critical sections Alexander Graf
     [not found]     ` <1277508314-915-9-git-send-email-agraf-l3A5Bk7waGM@public.gmane.org>
2010-06-27  8:21       ` Avi Kivity
     [not found]         ` <4C2709F4.10805-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2010-06-27  9:40           ` Alexander Graf
2010-06-27  9:52             ` Avi Kivity
2010-06-27 10:33               ` Alexander Graf
     [not found]                 ` <DFC77851-3BE7-4746-93DE-287D5E27EF7D-l3A5Bk7waGM@public.gmane.org>
2010-06-27 10:59                   ` Avi Kivity
     [not found]                     ` <4C272F08.8090709-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2010-06-27 11:49                       ` Alexander Graf
2010-06-27 11:53                         ` Avi Kivity
     [not found]                           ` <4C273BAD.2090305-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2010-06-27 12:06                             ` Alexander Graf
2010-06-27 22:03                               ` Benjamin Herrenschmidt
2010-06-27 10:03       ` Avi Kivity
     [not found]         ` <4C27220D.7090508-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2010-06-27 10:35           ` Alexander Graf
2010-06-25 23:25   ` [PATCH 13/26] KVM: PPC: Magic Page Book3s support Alexander Graf
2010-06-25 23:25   ` [PATCH 14/26] KVM: PPC: Magic Page BookE support Alexander Graf
2010-06-25 23:25   ` [PATCH 17/26] KVM: PPC: Generic KVM PV guest support Alexander Graf
2010-06-25 23:25   ` [PATCH 19/26] KVM: PPC: PV instructions to loads and stores Alexander Graf
2010-06-25 23:25   ` [PATCH 20/26] KVM: PPC: PV tlbsync to nop Alexander Graf
2010-06-25 23:25   ` [PATCH 22/26] KVM: PPC: PV assembler helpers Alexander Graf
2010-06-25 23:25   ` [PATCH 24/26] KVM: PPC: PV mtmsrd L=0 and mtmsr Alexander Graf
     [not found]     ` <1277508314-915-25-git-send-email-agraf-l3A5Bk7waGM@public.gmane.org>
2010-06-26 17:03       ` Segher Boessenkool
     [not found]         ` <EDF0A567-C440-4F1B-9AF5-2E0F8203D566-XVmvHMARGAS8U2dJNN8I7kB+6BGkLq7r@public.gmane.org>
2010-06-27  9:10           ` Alexander Graf
2010-06-29  7:37             ` Segher Boessenkool
2010-06-25 23:25   ` Alexander Graf [this message]
2010-06-27  8:14     ` [PATCH 26/26] KVM: PPC: Add Documentation about PV interface Avi Kivity
     [not found]       ` <4C270876.2050806-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2010-06-27  9:33         ` Alexander Graf
2010-06-28  7:18           ` Milton Miller
     [not found]             ` <1277709531_13308-qolCYAvwHvWlVDA81TZ6el6hYfS7NtTn@public.gmane.org>
2010-06-28  7:49               ` Alexander Graf
     [not found]                 ` <92F4A3F3-A89F-418D-BD4D-66E2489F2E42-l3A5Bk7waGM@public.gmane.org>
2010-06-28  8:13                   ` Avi Kivity
     [not found]                     ` <4C285991.1050303-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2010-06-28  8:21                       ` Alexander Graf
     [not found]                         ` <4330E5DC-63C5-40EA-9E99-34EE58074D1A-l3A5Bk7waGM@public.gmane.org>
2010-06-28  8:32                           ` Avi Kivity
     [not found]     ` <1277508314-915-27-git-send-email-agraf-l3A5Bk7waGM@public.gmane.org>
2010-06-27  8:34       ` Avi Kivity
2010-06-27  9:49         ` Alexander Graf
2010-06-25 23:24 ` [PATCH 03/26] KVM: PPC: Convert DSISR to shared page Alexander Graf
2010-06-25 23:24 ` [PATCH 05/26] KVM: PPC: Convert SRR0 and SRR1 " Alexander Graf
2010-06-25 23:24 ` [PATCH 06/26] KVM: PPC: Convert SPRG[0-4] " Alexander Graf
2010-06-25 23:24 ` [PATCH 07/26] KVM: PPC: Implement hypervisor interface Alexander Graf
2010-06-25 23:24 ` [PATCH 09/26] KVM: PPC: Add PV guest scratch registers Alexander Graf
     [not found]   ` <1277508314-915-10-git-send-email-agraf-l3A5Bk7waGM@public.gmane.org>
2010-06-27  8:22     ` Avi Kivity
     [not found]       ` <4C270A34.4020706-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2010-06-27  9:41         ` Alexander Graf
     [not found]           ` <27BB673F-F34E-4CC6-A22D-02CF95E7529F-l3A5Bk7waGM@public.gmane.org>
2010-06-27  9:53             ` Avi Kivity
2010-06-25 23:24 ` [PATCH 10/26] KVM: PPC: Tell guest about pending interrupts Alexander Graf
2010-06-25 23:24 ` [PATCH 11/26] KVM: PPC: Make RMO a define Alexander Graf
     [not found]   ` <1277508314-915-12-git-send-email-agraf-l3A5Bk7waGM@public.gmane.org>
2010-06-26 16:52     ` Segher Boessenkool
     [not found]       ` <2078D8A9-7D36-4B5D-A779-9BBAB545A53D-XVmvHMARGAS8U2dJNN8I7kB+6BGkLq7r@public.gmane.org>
2010-06-27  9:08         ` Alexander Graf
     [not found]           ` <9B84B663-7DC6-4543-96F7-23F77106065C-l3A5Bk7waGM@public.gmane.org>
2010-06-29  7:32             ` Segher Boessenkool
     [not found]               ` <07830DA6-1B53-4E84-A0E2-8449289C71F1-XVmvHMARGAS8U2dJNN8I7kB+6BGkLq7r@public.gmane.org>
2010-06-29  7:39                 ` Alexander Graf
2010-06-29  7:52                   ` Segher Boessenkool
     [not found]                     ` <1550A5F0-3A22-48ED-8251-96328E2FEAE3-XVmvHMARGAS8U2dJNN8I7kB+6BGkLq7r@public.gmane.org>
2010-06-29  8:04                       ` Alexander Graf
2010-06-25 23:25 ` [PATCH 12/26] KVM: PPC: First magic page steps Alexander Graf
     [not found]   ` <1277508314-915-13-git-send-email-agraf-l3A5Bk7waGM@public.gmane.org>
2010-06-27  8:24     ` Avi Kivity
2010-06-27  9:44       ` Alexander Graf
2010-06-25 23:25 ` [PATCH 15/26] KVM: PPC: Expose magic page support to guest Alexander Graf
2010-06-25 23:25 ` [PATCH 16/26] KVM: Move kvm_guest_init out of generic code Alexander Graf
2010-06-25 23:25 ` [PATCH 18/26] KVM: PPC: KVM PV guest stubs Alexander Graf
     [not found]   ` <1277508314-915-19-git-send-email-agraf-l3A5Bk7waGM@public.gmane.org>
2010-06-27  8:28     ` Avi Kivity
     [not found]       ` <4C270BB8.60404-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2010-06-27  9:47         ` Alexander Graf
2010-06-27 10:16           ` Avi Kivity
     [not found]             ` <4C272503.7030605-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2010-06-27 10:38               ` Alexander Graf
2010-06-27 22:04           ` Benjamin Herrenschmidt
2010-06-28  4:39     ` Matt Evans
     [not found]       ` <4C282794.1040209-mnsaURCQ41sdnm+yROfE0A@public.gmane.org>
2010-06-28  6:33         ` Alexander Graf
2010-06-28  8:15           ` Avi Kivity
     [not found]             ` <4C285A13.8070208-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2010-06-28  8:23               ` Alexander Graf
     [not found]                 ` <AD79CD04-74CF-49B9-BACC-4C190DF5214A-l3A5Bk7waGM@public.gmane.org>
2010-06-28  8:33                   ` Avi Kivity
2010-06-25 23:25 ` [PATCH 21/26] KVM: PPC: Introduce kvm_tmp framework Alexander Graf
2010-06-25 23:25 ` [PATCH 23/26] KVM: PPC: PV mtmsrd L=1 Alexander Graf
2010-06-25 23:25 ` [PATCH 25/26] KVM: PPC: PV wrteei Alexander Graf

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1277508314-915-27-git-send-email-agraf@suse.de \
    --to=agraf-l3a5bk7wagm@public.gmane.org \
    --cc=kvm-ppc-u79uwXL29TY76Z2rM5mHXA@public.gmane.org \
    --cc=kvm-u79uwXL29TY76Z2rM5mHXA@public.gmane.org \
    --cc=linuxppc-dev-uLR06cmDAlY/bJ5BZ2RsiQ@public.gmane.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox