tests/qtest/bios-tables-test: Check for dup2() failure
[qemu/ar7.git] / hw / intc / xics_kvm.c
blobf5bfc501bc15b20776355157a4436266e14f3f19
1 /*
2 * QEMU PowerPC pSeries Logical Partition (aka sPAPR) hardware System Emulator
4 * PAPR Virtualized Interrupt System, aka ICS/ICP aka xics, in-kernel emulation
6 * Copyright (c) 2013 David Gibson, IBM Corporation.
8 * Permission is hereby granted, free of charge, to any person obtaining a copy
9 * of this software and associated documentation files (the "Software"), to deal
10 * in the Software without restriction, including without limitation the rights
11 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
12 * copies of the Software, and to permit persons to whom the Software is
13 * furnished to do so, subject to the following conditions:
15 * The above copyright notice and this permission notice shall be included in
16 * all copies or substantial portions of the Software.
18 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
19 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
20 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
21 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
22 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
23 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
24 * THE SOFTWARE.
28 #include "qemu/osdep.h"
29 #include "qapi/error.h"
30 #include "qemu-common.h"
31 #include "trace.h"
32 #include "sysemu/kvm.h"
33 #include "hw/ppc/spapr.h"
34 #include "hw/ppc/spapr_cpu_core.h"
35 #include "hw/ppc/xics.h"
36 #include "hw/ppc/xics_spapr.h"
37 #include "kvm_ppc.h"
38 #include "qemu/config-file.h"
39 #include "qemu/error-report.h"
41 #include <sys/ioctl.h>
43 static int kernel_xics_fd = -1;
45 typedef struct KVMEnabledICP {
46 unsigned long vcpu_id;
47 QLIST_ENTRY(KVMEnabledICP) node;
48 } KVMEnabledICP;
50 static QLIST_HEAD(, KVMEnabledICP)
51 kvm_enabled_icps = QLIST_HEAD_INITIALIZER(&kvm_enabled_icps);
53 static void kvm_disable_icps(void)
55 KVMEnabledICP *enabled_icp, *next;
57 QLIST_FOREACH_SAFE(enabled_icp, &kvm_enabled_icps, node, next) {
58 QLIST_REMOVE(enabled_icp, node);
59 g_free(enabled_icp);
64 * ICP-KVM
66 void icp_get_kvm_state(ICPState *icp)
68 uint64_t state;
69 int ret;
71 /* The KVM XICS device is not in use */
72 if (kernel_xics_fd == -1) {
73 return;
76 /* ICP for this CPU thread is not in use, exiting */
77 if (!icp->cs) {
78 return;
81 ret = kvm_get_one_reg(icp->cs, KVM_REG_PPC_ICP_STATE, &state);
82 if (ret != 0) {
83 error_report("Unable to retrieve KVM interrupt controller state"
84 " for CPU %ld: %s", kvm_arch_vcpu_id(icp->cs), strerror(errno));
85 exit(1);
88 icp->xirr = state >> KVM_REG_PPC_ICP_XISR_SHIFT;
89 icp->mfrr = (state >> KVM_REG_PPC_ICP_MFRR_SHIFT)
90 & KVM_REG_PPC_ICP_MFRR_MASK;
91 icp->pending_priority = (state >> KVM_REG_PPC_ICP_PPRI_SHIFT)
92 & KVM_REG_PPC_ICP_PPRI_MASK;
95 static void do_icp_synchronize_state(CPUState *cpu, run_on_cpu_data arg)
97 icp_get_kvm_state(arg.host_ptr);
100 void icp_synchronize_state(ICPState *icp)
102 if (icp->cs) {
103 run_on_cpu(icp->cs, do_icp_synchronize_state, RUN_ON_CPU_HOST_PTR(icp));
107 int icp_set_kvm_state(ICPState *icp, Error **errp)
109 uint64_t state;
110 int ret;
112 /* The KVM XICS device is not in use */
113 if (kernel_xics_fd == -1) {
114 return 0;
117 /* ICP for this CPU thread is not in use, exiting */
118 if (!icp->cs) {
119 return 0;
122 state = ((uint64_t)icp->xirr << KVM_REG_PPC_ICP_XISR_SHIFT)
123 | ((uint64_t)icp->mfrr << KVM_REG_PPC_ICP_MFRR_SHIFT)
124 | ((uint64_t)icp->pending_priority << KVM_REG_PPC_ICP_PPRI_SHIFT);
126 ret = kvm_set_one_reg(icp->cs, KVM_REG_PPC_ICP_STATE, &state);
127 if (ret < 0) {
128 error_setg_errno(errp, -ret,
129 "Unable to restore KVM interrupt controller state (0x%"
130 PRIx64 ") for CPU %ld", state,
131 kvm_arch_vcpu_id(icp->cs));
132 return ret;
135 return 0;
138 void icp_kvm_realize(DeviceState *dev, Error **errp)
140 ICPState *icp = ICP(dev);
141 CPUState *cs;
142 KVMEnabledICP *enabled_icp;
143 unsigned long vcpu_id;
144 int ret;
146 /* The KVM XICS device is not in use */
147 if (kernel_xics_fd == -1) {
148 return;
151 cs = icp->cs;
152 vcpu_id = kvm_arch_vcpu_id(cs);
155 * If we are reusing a parked vCPU fd corresponding to the CPU
156 * which was hot-removed earlier we don't have to renable
157 * KVM_CAP_IRQ_XICS capability again.
159 QLIST_FOREACH(enabled_icp, &kvm_enabled_icps, node) {
160 if (enabled_icp->vcpu_id == vcpu_id) {
161 return;
165 ret = kvm_vcpu_enable_cap(cs, KVM_CAP_IRQ_XICS, 0, kernel_xics_fd, vcpu_id);
166 if (ret < 0) {
167 Error *local_err = NULL;
169 error_setg(&local_err, "Unable to connect CPU%ld to kernel XICS: %s",
170 vcpu_id, strerror(errno));
171 if (errno == ENOSPC) {
172 error_append_hint(&local_err, "Try -smp maxcpus=N with N < %u\n",
173 MACHINE(qdev_get_machine())->smp.max_cpus);
175 error_propagate(errp, local_err);
176 return;
178 enabled_icp = g_malloc(sizeof(*enabled_icp));
179 enabled_icp->vcpu_id = vcpu_id;
180 QLIST_INSERT_HEAD(&kvm_enabled_icps, enabled_icp, node);
184 * ICS-KVM
186 void ics_get_kvm_state(ICSState *ics)
188 uint64_t state;
189 int i;
191 /* The KVM XICS device is not in use */
192 if (kernel_xics_fd == -1) {
193 return;
196 for (i = 0; i < ics->nr_irqs; i++) {
197 ICSIRQState *irq = &ics->irqs[i];
199 if (ics_irq_free(ics, i)) {
200 continue;
203 kvm_device_access(kernel_xics_fd, KVM_DEV_XICS_GRP_SOURCES,
204 i + ics->offset, &state, false, &error_fatal);
206 irq->server = state & KVM_XICS_DESTINATION_MASK;
207 irq->saved_priority = (state >> KVM_XICS_PRIORITY_SHIFT)
208 & KVM_XICS_PRIORITY_MASK;
210 * To be consistent with the software emulation in xics.c, we
211 * split out the masked state + priority that we get from the
212 * kernel into 'current priority' (0xff if masked) and
213 * 'saved priority' (if masked, this is the priority the
214 * interrupt had before it was masked). Masking and unmasking
215 * are done with the ibm,int-off and ibm,int-on RTAS calls.
217 if (state & KVM_XICS_MASKED) {
218 irq->priority = 0xff;
219 } else {
220 irq->priority = irq->saved_priority;
223 irq->status = 0;
224 if (state & KVM_XICS_PENDING) {
225 if (state & KVM_XICS_LEVEL_SENSITIVE) {
226 irq->status |= XICS_STATUS_ASSERTED;
227 } else {
229 * A pending edge-triggered interrupt (or MSI)
230 * must have been rejected previously when we
231 * first detected it and tried to deliver it,
232 * so mark it as pending and previously rejected
233 * for consistency with how xics.c works.
235 irq->status |= XICS_STATUS_MASKED_PENDING
236 | XICS_STATUS_REJECTED;
239 if (state & KVM_XICS_PRESENTED) {
240 irq->status |= XICS_STATUS_PRESENTED;
242 if (state & KVM_XICS_QUEUED) {
243 irq->status |= XICS_STATUS_QUEUED;
248 void ics_synchronize_state(ICSState *ics)
250 ics_get_kvm_state(ics);
253 int ics_set_kvm_state_one(ICSState *ics, int srcno, Error **errp)
255 uint64_t state;
256 ICSIRQState *irq = &ics->irqs[srcno];
257 int ret;
259 /* The KVM XICS device is not in use */
260 if (kernel_xics_fd == -1) {
261 return 0;
264 state = irq->server;
265 state |= (uint64_t)(irq->saved_priority & KVM_XICS_PRIORITY_MASK)
266 << KVM_XICS_PRIORITY_SHIFT;
267 if (irq->priority != irq->saved_priority) {
268 assert(irq->priority == 0xff);
271 if (irq->priority == 0xff) {
272 state |= KVM_XICS_MASKED;
275 if (irq->flags & XICS_FLAGS_IRQ_LSI) {
276 state |= KVM_XICS_LEVEL_SENSITIVE;
277 if (irq->status & XICS_STATUS_ASSERTED) {
278 state |= KVM_XICS_PENDING;
280 } else {
281 if (irq->status & XICS_STATUS_MASKED_PENDING) {
282 state |= KVM_XICS_PENDING;
285 if (irq->status & XICS_STATUS_PRESENTED) {
286 state |= KVM_XICS_PRESENTED;
288 if (irq->status & XICS_STATUS_QUEUED) {
289 state |= KVM_XICS_QUEUED;
292 ret = kvm_device_access(kernel_xics_fd, KVM_DEV_XICS_GRP_SOURCES,
293 srcno + ics->offset, &state, true, errp);
294 if (ret < 0) {
295 return ret;
298 return 0;
301 int ics_set_kvm_state(ICSState *ics, Error **errp)
303 int i;
305 /* The KVM XICS device is not in use */
306 if (kernel_xics_fd == -1) {
307 return 0;
310 for (i = 0; i < ics->nr_irqs; i++) {
311 int ret;
313 if (ics_irq_free(ics, i)) {
314 continue;
317 ret = ics_set_kvm_state_one(ics, i, errp);
318 if (ret < 0) {
319 return ret;
323 return 0;
326 void ics_kvm_set_irq(ICSState *ics, int srcno, int val)
328 struct kvm_irq_level args;
329 int rc;
331 /* The KVM XICS device should be in use */
332 assert(kernel_xics_fd != -1);
334 args.irq = srcno + ics->offset;
335 if (ics->irqs[srcno].flags & XICS_FLAGS_IRQ_MSI) {
336 if (!val) {
337 return;
339 args.level = KVM_INTERRUPT_SET;
340 } else {
341 args.level = val ? KVM_INTERRUPT_SET_LEVEL : KVM_INTERRUPT_UNSET;
343 rc = kvm_vm_ioctl(kvm_state, KVM_IRQ_LINE, &args);
344 if (rc < 0) {
345 perror("kvm_irq_line");
349 int xics_kvm_connect(SpaprInterruptController *intc, uint32_t nr_servers,
350 Error **errp)
352 ICSState *ics = ICS_SPAPR(intc);
353 int rc;
354 CPUState *cs;
355 Error *local_err = NULL;
358 * The KVM XICS device already in use. This is the case when
359 * rebooting under the XICS-only interrupt mode.
361 if (kernel_xics_fd != -1) {
362 return 0;
365 if (!kvm_enabled() || !kvm_check_extension(kvm_state, KVM_CAP_IRQ_XICS)) {
366 error_setg(errp,
367 "KVM and IRQ_XICS capability must be present for in-kernel XICS");
368 return -1;
371 rc = kvmppc_define_rtas_kernel_token(RTAS_IBM_SET_XIVE, "ibm,set-xive");
372 if (rc < 0) {
373 error_setg_errno(&local_err, -rc,
374 "kvmppc_define_rtas_kernel_token: ibm,set-xive");
375 goto fail;
378 rc = kvmppc_define_rtas_kernel_token(RTAS_IBM_GET_XIVE, "ibm,get-xive");
379 if (rc < 0) {
380 error_setg_errno(&local_err, -rc,
381 "kvmppc_define_rtas_kernel_token: ibm,get-xive");
382 goto fail;
385 rc = kvmppc_define_rtas_kernel_token(RTAS_IBM_INT_ON, "ibm,int-on");
386 if (rc < 0) {
387 error_setg_errno(&local_err, -rc,
388 "kvmppc_define_rtas_kernel_token: ibm,int-on");
389 goto fail;
392 rc = kvmppc_define_rtas_kernel_token(RTAS_IBM_INT_OFF, "ibm,int-off");
393 if (rc < 0) {
394 error_setg_errno(&local_err, -rc,
395 "kvmppc_define_rtas_kernel_token: ibm,int-off");
396 goto fail;
399 /* Create the KVM XICS device */
400 rc = kvm_create_device(kvm_state, KVM_DEV_TYPE_XICS, false);
401 if (rc < 0) {
402 error_setg_errno(&local_err, -rc, "Error on KVM_CREATE_DEVICE for XICS");
403 goto fail;
406 /* Tell KVM about the # of VCPUs we may have (POWER9 and newer only) */
407 if (kvm_device_check_attr(rc, KVM_DEV_XICS_GRP_CTRL,
408 KVM_DEV_XICS_NR_SERVERS)) {
409 if (kvm_device_access(rc, KVM_DEV_XICS_GRP_CTRL,
410 KVM_DEV_XICS_NR_SERVERS, &nr_servers, true,
411 &local_err)) {
412 goto fail;
416 kernel_xics_fd = rc;
417 kvm_kernel_irqchip = true;
418 kvm_msi_via_irqfd_allowed = true;
419 kvm_gsi_direct_mapping = true;
421 /* Create the presenters */
422 CPU_FOREACH(cs) {
423 PowerPCCPU *cpu = POWERPC_CPU(cs);
425 icp_kvm_realize(DEVICE(spapr_cpu_state(cpu)->icp), &local_err);
426 if (local_err) {
427 goto fail;
431 /* Update the KVM sources */
432 ics_set_kvm_state(ics, &local_err);
433 if (local_err) {
434 goto fail;
437 /* Connect the presenters to the initial VCPUs of the machine */
438 CPU_FOREACH(cs) {
439 PowerPCCPU *cpu = POWERPC_CPU(cs);
440 icp_set_kvm_state(spapr_cpu_state(cpu)->icp, &local_err);
441 if (local_err) {
442 goto fail;
446 return 0;
448 fail:
449 error_propagate(errp, local_err);
450 xics_kvm_disconnect(intc);
451 return -1;
454 void xics_kvm_disconnect(SpaprInterruptController *intc)
457 * Only on P9 using the XICS-on XIVE KVM device:
459 * When the KVM device fd is closed, the device is destroyed and
460 * removed from the list of devices of the VM. The VCPU presenters
461 * are also detached from the device.
463 if (kernel_xics_fd != -1) {
464 close(kernel_xics_fd);
465 kernel_xics_fd = -1;
468 kvmppc_define_rtas_kernel_token(0, "ibm,set-xive");
469 kvmppc_define_rtas_kernel_token(0, "ibm,get-xive");
470 kvmppc_define_rtas_kernel_token(0, "ibm,int-on");
471 kvmppc_define_rtas_kernel_token(0, "ibm,int-off");
473 kvm_kernel_irqchip = false;
474 kvm_msi_via_irqfd_allowed = false;
475 kvm_gsi_direct_mapping = false;
477 /* Clear the presenter from the VCPUs */
478 kvm_disable_icps();
482 * This is a heuristic to detect older KVMs on POWER9 hosts that don't
483 * support destruction of a KVM XICS device while the VM is running.
484 * Required to start a spapr machine with ic-mode=dual,kernel-irqchip=on.
486 bool xics_kvm_has_broken_disconnect(void)
488 int rc;
490 rc = kvm_create_device(kvm_state, KVM_DEV_TYPE_XICS, false);
491 if (rc < 0) {
493 * The error is ignored on purpose. The KVM XICS setup code
494 * will catch it again anyway. The goal here is to see if
495 * close() actually destroys the device or not.
497 return false;
500 close(rc);
502 rc = kvm_create_device(kvm_state, KVM_DEV_TYPE_XICS, false);
503 if (rc >= 0) {
504 close(rc);
505 return false;
508 return errno == EEXIST;