X-Git-Url: http://v3vee.org/palacios/gitweb/gitweb.cgi?a=blobdiff_plain;f=palacios%2Finclude%2Fpalacios%2Fvmm_hvm.h;h=c725d232654df3e7139104aad0a49acf1150daad;hb=d85300ed95766164d14a7f3b6c1c681b8b9a9c52;hp=9d441d66e85ea3cb9c1c466f669a56f8daf6c60b;hpb=d13fa71cb7a372c39ea92aaa69d74d63d9e0ed8e;p=palacios.git diff --git a/palacios/include/palacios/vmm_hvm.h b/palacios/include/palacios/vmm_hvm.h index 9d441d6..c725d23 100644 --- a/palacios/include/palacios/vmm_hvm.h +++ b/palacios/include/palacios/vmm_hvm.h @@ -27,7 +27,7 @@ #include struct v3_ros_event { - enum { ROS_NONE=0, ROS_PAGE_FAULT=1, ROS_SYSCALL=2 } event_type; + enum { ROS_NONE=0, ROS_PAGE_FAULT=1, ROS_SYSCALL=2, HRT_EXCEPTION=3, HRT_THREAD_EXIT=4, ROS_DONE=5} event_type; uint64_t last_ros_event_result; // valid when ROS_NONE union { struct { // valid when ROS_PAGE_FAULT @@ -38,10 +38,35 @@ struct v3_ros_event { struct { // valid when ROS_SYSCALL uint64_t args[8]; } syscall; + struct { // valid when HRT_EXCEPTION + uint64_t rip; + uint64_t vector; + } excp; + struct { // valid when HRT_THREAD_EXIT + uint64_t nktid; + } thread_exit; }; }; +struct v3_ros_signal { + // swapped atomically at entry check (xchg) + // so only one core does entry + // code = 0 => no signal is pending + uint64_t code; + + // ROS process context we inject to + // if any of these are zero, no injection happens + // it must be the case that the ROS is at CPL 3 + // and in user-mode for injection to occur + uint64_t cr3; + uint64_t handler; + uint64_t stack; +}; + struct v3_vm_hvm { + // used to serialize hypercalls across cores (hopefully temporary) + v3_lock_t hypercall_lock; + uint8_t is_hvm; uint32_t first_hrt_core; uint64_t first_hrt_gpa; @@ -49,6 +74,7 @@ struct v3_vm_hvm { void *hrt_image; // image provided by ROS, if any uint64_t hrt_image_size; // size of this image uint64_t hrt_entry_addr; + enum { HRT_BLOB, HRT_ELF64, HRT_MBOOT2, HRT_MBOOT64 } hrt_type; // The following parallel the content of mb_info_hrt_t in @@ -65,12 +91,17 @@ struct v3_vm_hvm { void *comm_page_hpa; void *comm_page_hva; - enum {HRT_IDLE=0, HRT_CALL=1, HRT_PARCALL=2, HRT_SYNCSETUP=3, HRT_SYNC=4, HRT_SYNCTEARDOWN=5, HRT_MERGE=6} trans_state; + enum {HRT_IDLE=0, HRT_CALL=1, HRT_PARCALL=2, HRT_SYNCSETUP=3, HRT_SYNC=4, HRT_SYNCTEARDOWN=5, HRT_MERGE=6, HRT_GDTSYNC=7} trans_state; uint64_t trans_count; // the ROS event to be handed back struct v3_ros_event ros_event; + // user-level interrupt injection state for ROS + struct v3_ros_signal ros_signal; + + uint64_t hrt_gdt_gva; + uint64_t ros_fsbase; }; struct v3_core_hvm { @@ -114,8 +145,14 @@ int v3_build_hrt_multiboot_tag(struct guest_info *core, mb_info_hrt_t *hrt); int v3_setup_hvm_vm_for_boot(struct v3_vm_info *vm); int v3_setup_hvm_hrt_core_for_boot(struct guest_info *core); +// 0 is not a valid code +int v3_hvm_signal_ros(struct v3_vm_info *vm, uint64_t code); + int v3_handle_hvm_reset(struct guest_info *core); +int v3_handle_hvm_entry(struct guest_info *core); +int v3_handle_hvm_exit(struct guest_info *core); + /* HVM/HRT interaction is as follows: @@ -152,13 +189,19 @@ int v3_handle_hvm_reset(struct guest_info *core); - flags copied from the HRT's HRT tag (position independence, page table model, offset, etc) 4. Downcalls: - hypercall 0xf00df00d with arguments depending on operation - with examples described below. + hypercall 0xf00d with arguments depending on operation + with examples described below. Some requests are only + allowed from an HRT core (or ROS core). rax is set to -1 + on error. 5. Upcalls - interrupt injected by VMM or a magic #PF - communication via a shared memory page, contents below + (To HRT) interrupt injected by VMM or a magic #PF + info via a shared memory page, contents below + (To ROS) ROS *app* can set itself up to receive a + *user-level* "interrupt" manufactured by the VMM + our user library automates this, making it look + sort of like a signal handler - Upcalls + Upcalls to HRT Type of upcall is determined by the first 64 bits in the commm page @@ -184,7 +227,7 @@ int v3_handle_hvm_reset(struct guest_info *core); 0x31 => Unmerge address space return the ROS memory mapping to normal (physical/virtual identity) - Downcalls + Downcalls from ROS or HRT HVM_HCALL is the general hypercall number used to talk to the HVM The first argument is the request number (below). The other arguments @@ -204,6 +247,10 @@ int v3_handle_hvm_reset(struct guest_info *core); 0x10 => ROS event request (HRT->ROS) first argument is pointer where to write the ROS event state + + 0x1e => HRT event ack (HRT->ROS) + the HRT has read the result of the previous event + 0x1f => ROS event completion (ROS->HRT) first argument is the result code @@ -211,7 +258,12 @@ int v3_handle_hvm_reset(struct guest_info *core); first argument is pointer to structure describing call 0x21 => Invoke function in parallel (ROS->HRT) same as above, but simultaneously on all HRT cores + + 0x28 => Set up for synchronous operation (ROS->HRT) + 0x29 => Tear down synchronous operation (ROS->HRT) + 0x2f => Function execution complete (HRT->ROS, once per core) + 0x30 => Merge address space (ROS->HRT) no arguments (CR3 implicit). Merge the current address space in the ROS with the address space on @@ -220,6 +272,26 @@ int v3_handle_hvm_reset(struct guest_info *core); release any address space merger and restore identity mapping 0x3f => Merge request complete (HRT->ROS) + 0x40 => Install user-mode interrupt/signal handler (ROS) + arg1 = handler, arg2 = stack + + 0x41 => Signal ROS handler (HRT->ROS) + arg1 = number (must != 0) + + 0x51 => Synchronize GDT (ROS->HRT) + ROS updates HRT's GDT area with its own + and then informs HRT + + 0x52 => Register HRT GDT area to support GDT synchronization (HRT only) + + 0x53 => Restore GDT (ROS->HRT) + + 0x5f => GDT Synchronization done (HRT->ROS) + + Upcalls to ROS + + (Currently all are application/HRT dependent) + */