#include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "palacios.h" #include "mm.h" // The following can be used to track heap bugs // zero memory after allocation #define ALLOC_ZERO_MEM 0 // pad allocations by this many bytes on both ends of block #define ALLOC_PAD 0 u32 pg_allocs = 0; u32 pg_frees = 0; u32 mallocs = 0; u32 frees = 0; static struct v3_vm_info * irq_to_guest_map[256]; extern unsigned int cpu_khz; extern int cpu_list[NR_CPUS]; extern int cpu_list_len; static char *print_buffer[NR_CPUS]; static void deinit_print_buffers(void) { int i; for (i=0;iname); daemonize(thread_info->name); allow_signal(SIGKILL); */ ret = thread_info->fn(thread_info->arg); INFO("Palacios Thread (%s) EXITING\n", thread_info->name); palacios_free(thread_info); // handle cleanup do_exit(ret); return 0; // should not get here. } /** * Creates a kernel thread. */ void * palacios_start_kernel_thread( int (*fn) (void * arg), void * arg, char * thread_name) { struct lnx_thread_arg * thread_info = palacios_alloc(sizeof(struct lnx_thread_arg)); if (!thread_info) { ERROR("ALERT ALERT Unable to allocate thread\n"); return NULL; } thread_info->fn = fn; thread_info->arg = arg; thread_info->name = thread_name; return kthread_run( lnx_thread_target, thread_info, thread_name ); } /** * Starts a kernel thread on the specified CPU. */ void * palacios_start_thread_on_cpu(int cpu_id, int (*fn)(void * arg), void * arg, char * thread_name ) { struct task_struct * thread = NULL; struct lnx_thread_arg * thread_info = palacios_alloc(sizeof(struct lnx_thread_arg)); if (!thread_info) { ERROR("ALERT ALERT Unable to allocate thread to start on cpu\n"); return NULL; } thread_info->fn = fn; thread_info->arg = arg; thread_info->name = thread_name; thread = kthread_create( lnx_thread_target, thread_info, thread_name ); if (IS_ERR(thread)) { WARNING("Palacios error creating thread: %s\n", thread_name); palacios_free(thread_info); return NULL; } if (set_cpus_allowed_ptr(thread, cpumask_of(cpu_id)) != 0) { WARNING("Attempt to start thread on disallowed CPU\n"); kthread_stop(thread); palacios_free(thread_info); return NULL; } wake_up_process(thread); return thread; } /** * Rebind a kernel thread to the specified CPU * The thread will be running on target CPU on return * non-zero return means failure */ int palacios_move_thread_to_cpu(int new_cpu_id, void * thread_ptr) { struct task_struct * thread = (struct task_struct *)thread_ptr; INFO("Moving thread (%p) to cpu %d\n", thread, new_cpu_id); if (thread == NULL) { thread = current; } /* * Bind to the specified CPU. When this call returns, * the thread should be running on the target CPU. */ return set_cpus_allowed_ptr(thread, cpumask_of(new_cpu_id)); } /** * Returns the CPU ID that the caller is running on. */ unsigned int palacios_get_cpu(void) { /* We want to call smp_processor_id() * But this is not safe if kernel preemption is possible * We need to ensure that the palacios threads are bound to a give cpu */ unsigned int cpu_id = get_cpu(); put_cpu(); return cpu_id; } /** * Interrupts the physical CPU corresponding to the specified logical guest cpu. * * NOTE: * This is dependent on the implementation of xcall_reschedule(). Currently * xcall_reschedule does not explicitly call schedule() on the destination CPU, * but instead relies on the return to user space to handle it. Because * palacios is a kernel thread schedule will not be called, which is correct. * If it ever changes to induce side effects, we'll need to figure something * else out... */ #include static void palacios_interrupt_cpu( struct v3_vm_info * vm, int cpu_id, int vector ) { if (vector == 0) { smp_send_reschedule(cpu_id); } else { apic->send_IPI_mask(cpumask_of(cpu_id), vector); } return; } /** * Dispatches an interrupt to Palacios for handling. */ static void palacios_dispatch_interrupt( int vector, void * dev, struct pt_regs * regs ) { struct v3_interrupt intr = { .irq = vector, .error = regs->orig_ax, .should_ack = 1, }; if (irq_to_guest_map[vector]) { v3_deliver_irq(irq_to_guest_map[vector], &intr); } } /** * Instructs the kernel to forward the specified IRQ to Palacios. */ static int palacios_hook_interrupt(struct v3_vm_info * vm, unsigned int vector ) { INFO("hooking vector %d\n", vector); if (irq_to_guest_map[vector]) { WARNING( "%s: Interrupt vector %u is already hooked.\n", __func__, vector); return -1; } DEBUG( "%s: Hooking interrupt vector %u to vm %p.\n", __func__, vector, vm); irq_to_guest_map[vector] = vm; /* * NOTE: Normally PCI devices are supposed to be level sensitive, * but we need them to be edge sensitive so that they are * properly latched by Palacios. Leaving them as level * sensitive would lead to an interrupt storm. */ //ioapic_set_trigger_for_vector(vector, ioapic_edge_sensitive); //set_idtvec_handler(vector, palacios_dispatch_interrupt); if (vector < 32) { ERROR("unexpected vector for hooking\n"); return -1; } else { int device_id = 0; int flag = 0; int error; DEBUG("hooking vector: %d\n", vector); if (vector == 32) { flag = IRQF_TIMER; } else { flag = IRQF_SHARED; } error = request_irq((vector - 32), (void *)palacios_dispatch_interrupt, flag, "interrupt_for_palacios", &device_id); if (error) { ERROR("error code for request_irq is %d\n", error); ERROR("request vector %d failed", vector); return -1; } } return 0; } /** * Acknowledges an interrupt. */ static int palacios_ack_interrupt( int vector ) { ack_APIC_irq(); DEBUG("Pretending to ack interrupt, vector=%d\n", vector); return 0; } /** * Returns the CPU frequency in kilohertz. */ unsigned int palacios_get_cpu_khz(void) { INFO("cpu_khz is %u\n", cpu_khz); if (cpu_khz == 0) { INFO("faking cpu_khz to 1000000\n"); return 1000000; } else { return cpu_khz; } //return 1000000; } /** * Yield the CPU so other host OS tasks can run. * This will return immediately if there is no other thread that is runnable * And there is no real bound on how long it will yield */ void palacios_yield_cpu(void) { schedule(); return; } /** * Yield the CPU so other host OS tasks can run. * Given now immediately if there is no other thread that is runnable * And there is no real bound on how long it will yield */ void palacios_yield_cpu_timed(unsigned int us) { unsigned int uspj = 1000000U/HZ; unsigned int jiffies = us/uspj + ((us%uspj) !=0); // ceiling set_current_state(TASK_INTERRUPTIBLE); schedule_timeout(jiffies); } /** * Allocates a mutex. * Returns NULL on failure. */ void * palacios_mutex_alloc(void) { spinlock_t *lock = palacios_alloc(sizeof(spinlock_t)); if (lock) { spin_lock_init(lock); } else { ERROR("ALERT ALERT Unable to allocate lock\n"); return NULL; } return lock; } /** * Frees a mutex. */ void palacios_mutex_free(void * mutex) { palacios_free(mutex); } /** * Locks a mutex. */ void palacios_mutex_lock(void * mutex, int must_spin) { spin_lock((spinlock_t *)mutex); } /** * Locks a mutex, disabling interrupts on this core */ void * palacios_mutex_lock_irqsave(void * mutex, int must_spin) { unsigned long flags; spin_lock_irqsave((spinlock_t *)mutex,flags); return (void *)flags; } /** * Unlocks a mutex. */ void palacios_mutex_unlock( void * mutex ) { spin_unlock((spinlock_t *)mutex); } /** * Unlocks a mutex and restores previous interrupt state on this core */ void palacios_mutex_unlock_irqrestore(void *mutex, void *flags) { // This is correct, flags is opaque spin_unlock_irqrestore((spinlock_t *)mutex,(unsigned long)flags); } /** * Structure used by the Palacios hypervisor to interface with the host kernel. */ static struct v3_os_hooks palacios_os_hooks = { .print = palacios_print, .allocate_pages = palacios_allocate_pages, .free_pages = palacios_free_pages, .malloc = palacios_alloc, .free = palacios_free, .vaddr_to_paddr = palacios_vaddr_to_paddr, .paddr_to_vaddr = palacios_paddr_to_vaddr, .hook_interrupt = palacios_hook_interrupt, .ack_irq = palacios_ack_interrupt, .get_cpu_khz = palacios_get_cpu_khz, .start_kernel_thread = palacios_start_kernel_thread, .yield_cpu = palacios_yield_cpu, .yield_cpu_timed = palacios_yield_cpu_timed, .mutex_alloc = palacios_mutex_alloc, .mutex_free = palacios_mutex_free, .mutex_lock = palacios_mutex_lock, .mutex_unlock = palacios_mutex_unlock, .mutex_lock_irqsave = palacios_mutex_lock_irqsave, .mutex_unlock_irqrestore= palacios_mutex_unlock_irqrestore, .get_cpu = palacios_get_cpu, .interrupt_cpu = palacios_interrupt_cpu, .call_on_cpu = palacios_xcall, .start_thread_on_cpu = palacios_start_thread_on_cpu, .move_thread_to_cpu = palacios_move_thread_to_cpu, }; int palacios_vmm_init( void ) { int num_cpus = num_online_cpus(); char * cpu_mask = NULL; if (cpu_list_len > 0) { int major = 0; int minor = 0; int i = 0; cpu_mask = palacios_alloc((num_cpus / 8) + 1); if (!cpu_mask) { ERROR("Cannot allocate cpu mask\n"); return -1; } memset(cpu_mask, 0, (num_cpus / 8) + 1); for (i = 0; i < cpu_list_len; i++) { if (cpu_list[i] >= num_cpus) { WARNING("CPU (%d) exceeds number of available CPUs. Ignoring...\n", cpu_list[i]); continue; } major = cpu_list[i] / 8; minor = cpu_list[i] % 8; *(cpu_mask + major) |= (0x1 << minor); } } memset(irq_to_guest_map, 0, sizeof(struct v3_vm_info *) * 256); if (init_print_buffers()) { ERROR("Cannot initialize print buffers\n"); palacios_free(cpu_mask); return -1; } INFO("palacios_init starting - calling init_v3\n"); Init_V3(&palacios_os_hooks, cpu_mask, num_cpus); return 0; } int palacios_vmm_exit( void ) { Shutdown_V3(); INFO("palacios shutdown complete\n"); deinit_print_buffers(); return 0; }