X-Git-Url: http://v3vee.org/palacios/gitweb/gitweb.cgi?p=palacios.git;a=blobdiff_plain;f=palacios%2Finclude%2Fpalacios%2Fvmm.h;h=87d50edbbb48143bed1defcb30b84d09b33943ff;hp=d81f4b682ad1d6d4616e646b1396d79f74d3b627;hb=123a1ba27ea09c8fa77a1b36ce625b43d7c48b14;hpb=a109eb919a162bd7de58d62020801bc2e633be50 diff --git a/palacios/include/palacios/vmm.h b/palacios/include/palacios/vmm.h index d81f4b6..87d50ed 100644 --- a/palacios/include/palacios/vmm.h +++ b/palacios/include/palacios/vmm.h @@ -1,107 +1,252 @@ -#ifndef __VMM_H -#define __VMM_H +/* + * This file is part of the Palacios Virtual Machine Monitor developed + * by the V3VEE Project with funding from the United States National + * Science Foundation and the Department of Energy. + * + * The V3VEE Project is a joint project between Northwestern University + * and the University of New Mexico. You can find out more at + * http://www.v3vee.org + * + * Copyright (c) 2008, Jack Lange + * Copyright (c) 2008, The V3VEE Project + * All rights reserved. + * + * Author: Jack Lange + * + * This is free software. You are permitted to use, + * redistribute, and modify it as specified in the file "V3VEE_LICENSE". + */ + +#ifndef __VMM_H__ +#define __VMM_H__ + + +//#include +#include +#include + +struct guest_info; +#ifdef __V3VEE__ + //#include #include -#include -//#include -#include +//#include /* utility definitions */ + + +#define V3_Print(fmt, args...) \ + do { \ + extern struct v3_os_hooks * os_hooks; \ + if ((os_hooks) && (os_hooks)->print) { \ + (os_hooks)->print((fmt), ##args); \ + } \ + } while (0) + + #define PrintDebug(fmt, args...) \ - do { \ - extern struct vmm_os_hooks * os_hooks; \ - if ((os_hooks) && (os_hooks)->print_debug) { \ - (os_hooks)->print_debug((fmt), ##args); \ - } \ - } while (0) \ + do { \ + extern struct v3_os_hooks * os_hooks; \ + if ((os_hooks) && (os_hooks)->print) { \ + (os_hooks)->print((fmt), ##args); \ + } \ + } while (0) + + +#define PrintError(fmt, args...) \ + do { \ + extern struct v3_os_hooks * os_hooks; \ + if ((os_hooks) && (os_hooks)->print) { \ + (os_hooks)->print("%s(%d): " fmt, __FILE__, __LINE__, ##args); \ + } \ + } while (0) + + + +#define V3_AllocPages(num_pages) \ + ({ \ + extern struct v3_os_hooks * os_hooks; \ + void * ptr = 0; \ + if ((os_hooks) && (os_hooks)->allocate_pages) { \ + ptr = (os_hooks)->allocate_pages(num_pages); \ + } \ + ptr; \ + }) + + +#define V3_FreePage(page) \ + do { \ + extern struct v3_os_hooks * os_hooks; \ + if ((os_hooks) && (os_hooks)->free_page) { \ + (os_hooks)->free_page(page); \ + } \ + } while(0) + + +#define V3_VAddr(addr) ({ \ + extern struct v3_os_hooks * os_hooks; \ + void * var = 0; \ + if ((os_hooks) && (os_hooks)->paddr_to_vaddr) { \ + var = (os_hooks)->paddr_to_vaddr(addr); \ + } \ + var; \ + }) + + +#define V3_PAddr(addr) ({ \ + extern struct v3_os_hooks * os_hooks; \ + void * var = 0; \ + if ((os_hooks) && (os_hooks)->vaddr_to_paddr) { \ + var = (os_hooks)->vaddr_to_paddr(addr); \ + } \ + var; \ + }) + + + +#define V3_Malloc(size) ({ \ + extern struct v3_os_hooks * os_hooks; \ + void * var = 0; \ + if ((os_hooks) && (os_hooks)->malloc) { \ + var = (os_hooks)->malloc(size); \ + } \ + var; \ + }) +// We need to check the hook structure at runtime to ensure its SAFE +#define V3_Free(addr) \ + do { \ + extern struct v3_os_hooks * os_hooks; \ + if ((os_hooks) && (os_hooks)->free) { \ + (os_hooks)->free(addr); \ + } \ + } while (0) + +// uint_t V3_CPU_KHZ(); +#define V3_CPU_KHZ() ({ \ + unsigned int khz = 0; \ + extern struct v3_os_hooks * os_hooks; \ + if ((os_hooks) && (os_hooks)->get_cpu_khz) { \ + khz = (os_hooks)->get_cpu_khz(); \ + } \ + khz; \ + }) \ + + + +#define V3_CREATE_THREAD(fn, arg, name) \ + do { \ + extern struct v3_os_hooks * os_hooks; \ + if ((os_hooks) && (os_hooks)->start_kernel_thread) { \ + (os_hooks)->start_kernel_thread(fn, arg, name); \ + } \ + } while (0) + + +#define V3_Hook_Interrupt(irq, opaque) ({ \ + int ret = 0; \ + extern struct v3_os_hooks * os_hooks; \ + if ((os_hooks) && (os_hooks)->hook_interrupt) { \ + ret = (os_hooks)->hook_interrupt(irq, opaque); \ + } \ + ret; \ + }) \ + + +#define V3_ACK_IRQ(irq) \ + do { \ + extern struct v3_os_hooks * os_hooks; \ + if ((os_hooks) && (os_hooks)->ack_irq) { \ + (os_hooks)->ack_irq(irq); \ + } \ + } while (0) -#define PrintInfo(fmt, args...) \ - do { \ - extern struct vmm_os_hooks * os_hooks; \ - if ((os_hooks) && (os_hooks)->print_info) { \ - (os_hooks)->print_info((fmt), ##args); \ - } \ - } while (0) \ -#define PrintTrace(fmt, args...) \ - do { \ - extern struct vmm_os_hooks * os_hooks; \ - if ((os_hooks) && (os_hooks)->print_trace) { \ - (os_hooks)->print_trace((fmt), ##args); \ - } \ - } while (0) \ +/* ** */ +#define V3_ASSERT(x) \ + do { \ + if (!(x)) { \ + PrintDebug("Failed assertion in %s: %s at %s, line %d, RA=%lx\n", \ + __func__, #x, __FILE__, __LINE__, \ + (ulong_t) __builtin_return_address(0)); \ + while(1); \ + } \ + } while(0) \ + -/* This clearly won't work, we need some way to get a return value out of it */ -#define VMMMalloc(size) \ - do { \ - extern struct vmm_os_hooks * os_hooks; \ - if ((os_hooks) && (os_hooks)->malloc) { \ - (os_hooks)->malloc(size); \ - } \ - } while (0) \ -// We need to check the hook structure at runtime to ensure its SAFE -#define VMMFree(addr) \ - do { \ - extern struct vmm_os_hooks * os_hooks; \ - if ((os_hooks) && (os_hooks)->free) { \ - (os_hooks)->free(addr); \ - } \ - } while (0) \ +typedef enum v3_vm_class {V3_INVALID_VM, V3_PC_VM, V3_CRAY_VM} v3_vm_class_t; -/* ** */ +// Maybe make this a define.... +typedef enum v3_cpu_arch {V3_INVALID_CPU, V3_SVM_CPU, V3_SVM_REV3_CPU, V3_VMX_CPU, V3_VMX_EPT_CPU} v3_cpu_arch_t; + +v3_cpu_mode_t v3_get_host_cpu_mode(); -#define VMM_INVALID_CPU 0 -#define VMM_VMX_CPU 1 -#define VMM_SVM_CPU 2 +void v3_yield(struct guest_info * info); +void v3_yield_cond(struct guest_info * info); +void v3_interrupt_cpu(struct guest_info * vm, int logical_cpu); +unsigned int v3_get_cpu_id(); +v3_cpu_arch_t v3_get_cpu_type(int cpu_id); -/* We need a memory map and an IO device map */ +int v3_vm_enter(struct guest_info * info); + + +#endif //!__V3VEE__ + + + +struct guest_info; /* This will contain function pointers that provide OS services */ -struct vmm_os_hooks { - void (*print_info)(const char * format, ...); - void (*print_debug)(const char * format, ...); - void (*print_trace)(const char * format, ...); +struct v3_os_hooks { + void (*print)(const char * format, ...) + __attribute__ ((format (printf, 1, 2))); - void *(*allocate_pages)(int numPages); - void (*free_page)(void * page); + void *(*allocate_pages)(int numPages); + void (*free_page)(void * page); - void *(*malloc)(unsigned int size); - void (*free)(void * addr); + void *(*malloc)(unsigned int size); + void (*free)(void * addr); - void *(*paddr_to_vaddr)(void *addr); - void *(*vaddr_to_paddr)(void *addr); + void *(*paddr_to_vaddr)(void *addr); + void *(*vaddr_to_paddr)(void *addr); + int (*hook_interrupt)(struct guest_info * vm, unsigned int irq); - void (*start_kernel_thread)(); // include pointer to function -}; + int (*ack_irq)(int irq); + + unsigned int (*get_cpu_khz)(void); + void (*start_kernel_thread)(int (*fn)(void * arg), void * arg, char * thread_name); + void (*yield_cpu)(void); + void *(*mutex_alloc)(void); + void (*mutex_free)(void * mutex); + void (*mutex_lock)(void * mutex, int must_spin); + void (*mutex_unlock)(void * mutex); -/* This will contain Function pointers that control the VMs */ -struct vmm_ctrl_ops { - int (*init_guest)(struct guest_info* info); - int (*start_guest)(struct guest_info * info); - // int (*stop_vm)(uint_t vm_id); + unsigned int (*get_cpu)(void); + void (*interrupt_cpu)(struct guest_info * vm, int logical_cpu); + void (*call_on_cpu)(int logical_cpu, void (*fn)(void * arg), void * arg); + void (*start_thread_on_cpu)(int logical_cpu, int (*fn)(void * arg), void * arg, char * thread_name); }; @@ -110,9 +255,28 @@ struct vmm_ctrl_ops { -void Init_VMM(struct vmm_os_hooks * hooks, struct vmm_ctrl_ops * vmm_ops); +// +// +// This is the interrupt state that the VMM's interrupt handlers need to see +// +struct v3_interrupt { + unsigned int irq; + unsigned int error; + + unsigned int should_ack; // Should the vmm ack this interrupt, or will + // the host OS do it? +}; + + + + +void Init_V3(struct v3_os_hooks * hooks, int num_cpus); + +int v3_start_vm(struct guest_info * info, unsigned int cpu_mask); +struct guest_info * v3_create_vm(void * cfg); +int v3_deliver_irq(struct guest_info * vm, struct v3_interrupt * intr);