spapr/irq: Only claim VALID interrupts at the KVM level
[qemu/ar7.git] / hw / intc / xics_kvm.c
blobba90d6dc966cc3d3d614228bca9fcc4a48f3960e
1 /*
2 * QEMU PowerPC pSeries Logical Partition (aka sPAPR) hardware System Emulator
4 * PAPR Virtualized Interrupt System, aka ICS/ICP aka xics, in-kernel emulation
6 * Copyright (c) 2013 David Gibson, IBM Corporation.
8 * Permission is hereby granted, free of charge, to any person obtaining a copy
9 * of this software and associated documentation files (the "Software"), to deal
10 * in the Software without restriction, including without limitation the rights
11 * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
12 * copies of the Software, and to permit persons to whom the Software is
13 * furnished to do so, subject to the following conditions:
15 * The above copyright notice and this permission notice shall be included in
16 * all copies or substantial portions of the Software.
18 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
19 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
20 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
21 * THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
22 * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
23 * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
24 * THE SOFTWARE.
28 #include "qemu/osdep.h"
29 #include "qapi/error.h"
30 #include "qemu-common.h"
31 #include "cpu.h"
32 #include "trace.h"
33 #include "sysemu/kvm.h"
34 #include "hw/ppc/spapr.h"
35 #include "hw/ppc/spapr_cpu_core.h"
36 #include "hw/ppc/xics.h"
37 #include "hw/ppc/xics_spapr.h"
38 #include "kvm_ppc.h"
39 #include "qemu/config-file.h"
40 #include "qemu/error-report.h"
42 #include <sys/ioctl.h>
44 static int kernel_xics_fd = -1;
46 typedef struct KVMEnabledICP {
47 unsigned long vcpu_id;
48 QLIST_ENTRY(KVMEnabledICP) node;
49 } KVMEnabledICP;
51 static QLIST_HEAD(, KVMEnabledICP)
52 kvm_enabled_icps = QLIST_HEAD_INITIALIZER(&kvm_enabled_icps);
54 static void kvm_disable_icps(void)
56 KVMEnabledICP *enabled_icp, *next;
58 QLIST_FOREACH_SAFE(enabled_icp, &kvm_enabled_icps, node, next) {
59 QLIST_REMOVE(enabled_icp, node);
60 g_free(enabled_icp);
65 * ICP-KVM
67 void icp_get_kvm_state(ICPState *icp)
69 uint64_t state;
70 int ret;
72 /* The KVM XICS device is not in use */
73 if (kernel_xics_fd == -1) {
74 return;
77 /* ICP for this CPU thread is not in use, exiting */
78 if (!icp->cs) {
79 return;
82 ret = kvm_get_one_reg(icp->cs, KVM_REG_PPC_ICP_STATE, &state);
83 if (ret != 0) {
84 error_report("Unable to retrieve KVM interrupt controller state"
85 " for CPU %ld: %s", kvm_arch_vcpu_id(icp->cs), strerror(errno));
86 exit(1);
89 icp->xirr = state >> KVM_REG_PPC_ICP_XISR_SHIFT;
90 icp->mfrr = (state >> KVM_REG_PPC_ICP_MFRR_SHIFT)
91 & KVM_REG_PPC_ICP_MFRR_MASK;
92 icp->pending_priority = (state >> KVM_REG_PPC_ICP_PPRI_SHIFT)
93 & KVM_REG_PPC_ICP_PPRI_MASK;
96 static void do_icp_synchronize_state(CPUState *cpu, run_on_cpu_data arg)
98 icp_get_kvm_state(arg.host_ptr);
101 void icp_synchronize_state(ICPState *icp)
103 if (icp->cs) {
104 run_on_cpu(icp->cs, do_icp_synchronize_state, RUN_ON_CPU_HOST_PTR(icp));
108 int icp_set_kvm_state(ICPState *icp, Error **errp)
110 uint64_t state;
111 int ret;
113 /* The KVM XICS device is not in use */
114 if (kernel_xics_fd == -1) {
115 return 0;
118 /* ICP for this CPU thread is not in use, exiting */
119 if (!icp->cs) {
120 return 0;
123 state = ((uint64_t)icp->xirr << KVM_REG_PPC_ICP_XISR_SHIFT)
124 | ((uint64_t)icp->mfrr << KVM_REG_PPC_ICP_MFRR_SHIFT)
125 | ((uint64_t)icp->pending_priority << KVM_REG_PPC_ICP_PPRI_SHIFT);
127 ret = kvm_set_one_reg(icp->cs, KVM_REG_PPC_ICP_STATE, &state);
128 if (ret < 0) {
129 error_setg_errno(errp, -ret,
130 "Unable to restore KVM interrupt controller state (0x%"
131 PRIx64 ") for CPU %ld", state,
132 kvm_arch_vcpu_id(icp->cs));
133 return ret;
136 return 0;
139 void icp_kvm_realize(DeviceState *dev, Error **errp)
141 ICPState *icp = ICP(dev);
142 CPUState *cs;
143 KVMEnabledICP *enabled_icp;
144 unsigned long vcpu_id;
145 int ret;
147 /* The KVM XICS device is not in use */
148 if (kernel_xics_fd == -1) {
149 return;
152 cs = icp->cs;
153 vcpu_id = kvm_arch_vcpu_id(cs);
156 * If we are reusing a parked vCPU fd corresponding to the CPU
157 * which was hot-removed earlier we don't have to renable
158 * KVM_CAP_IRQ_XICS capability again.
160 QLIST_FOREACH(enabled_icp, &kvm_enabled_icps, node) {
161 if (enabled_icp->vcpu_id == vcpu_id) {
162 return;
166 ret = kvm_vcpu_enable_cap(cs, KVM_CAP_IRQ_XICS, 0, kernel_xics_fd, vcpu_id);
167 if (ret < 0) {
168 error_setg(errp, "Unable to connect CPU%ld to kernel XICS: %s", vcpu_id,
169 strerror(errno));
170 return;
172 enabled_icp = g_malloc(sizeof(*enabled_icp));
173 enabled_icp->vcpu_id = vcpu_id;
174 QLIST_INSERT_HEAD(&kvm_enabled_icps, enabled_icp, node);
178 * ICS-KVM
180 void ics_get_kvm_state(ICSState *ics)
182 uint64_t state;
183 int i;
185 /* The KVM XICS device is not in use */
186 if (kernel_xics_fd == -1) {
187 return;
190 for (i = 0; i < ics->nr_irqs; i++) {
191 ICSIRQState *irq = &ics->irqs[i];
193 if (ics_irq_free(ics, i)) {
194 continue;
197 kvm_device_access(kernel_xics_fd, KVM_DEV_XICS_GRP_SOURCES,
198 i + ics->offset, &state, false, &error_fatal);
200 irq->server = state & KVM_XICS_DESTINATION_MASK;
201 irq->saved_priority = (state >> KVM_XICS_PRIORITY_SHIFT)
202 & KVM_XICS_PRIORITY_MASK;
204 * To be consistent with the software emulation in xics.c, we
205 * split out the masked state + priority that we get from the
206 * kernel into 'current priority' (0xff if masked) and
207 * 'saved priority' (if masked, this is the priority the
208 * interrupt had before it was masked). Masking and unmasking
209 * are done with the ibm,int-off and ibm,int-on RTAS calls.
211 if (state & KVM_XICS_MASKED) {
212 irq->priority = 0xff;
213 } else {
214 irq->priority = irq->saved_priority;
217 irq->status = 0;
218 if (state & KVM_XICS_PENDING) {
219 if (state & KVM_XICS_LEVEL_SENSITIVE) {
220 irq->status |= XICS_STATUS_ASSERTED;
221 } else {
223 * A pending edge-triggered interrupt (or MSI)
224 * must have been rejected previously when we
225 * first detected it and tried to deliver it,
226 * so mark it as pending and previously rejected
227 * for consistency with how xics.c works.
229 irq->status |= XICS_STATUS_MASKED_PENDING
230 | XICS_STATUS_REJECTED;
233 if (state & KVM_XICS_PRESENTED) {
234 irq->status |= XICS_STATUS_PRESENTED;
236 if (state & KVM_XICS_QUEUED) {
237 irq->status |= XICS_STATUS_QUEUED;
242 void ics_synchronize_state(ICSState *ics)
244 ics_get_kvm_state(ics);
247 int ics_set_kvm_state_one(ICSState *ics, int srcno, Error **errp)
249 uint64_t state;
250 ICSIRQState *irq = &ics->irqs[srcno];
251 int ret;
253 /* The KVM XICS device is not in use */
254 if (kernel_xics_fd == -1) {
255 return 0;
258 state = irq->server;
259 state |= (uint64_t)(irq->saved_priority & KVM_XICS_PRIORITY_MASK)
260 << KVM_XICS_PRIORITY_SHIFT;
261 if (irq->priority != irq->saved_priority) {
262 assert(irq->priority == 0xff);
265 if (irq->priority == 0xff) {
266 state |= KVM_XICS_MASKED;
269 if (irq->flags & XICS_FLAGS_IRQ_LSI) {
270 state |= KVM_XICS_LEVEL_SENSITIVE;
271 if (irq->status & XICS_STATUS_ASSERTED) {
272 state |= KVM_XICS_PENDING;
274 } else {
275 if (irq->status & XICS_STATUS_MASKED_PENDING) {
276 state |= KVM_XICS_PENDING;
279 if (irq->status & XICS_STATUS_PRESENTED) {
280 state |= KVM_XICS_PRESENTED;
282 if (irq->status & XICS_STATUS_QUEUED) {
283 state |= KVM_XICS_QUEUED;
286 ret = kvm_device_access(kernel_xics_fd, KVM_DEV_XICS_GRP_SOURCES,
287 srcno + ics->offset, &state, true, errp);
288 if (ret < 0) {
289 return ret;
292 return 0;
295 int ics_set_kvm_state(ICSState *ics, Error **errp)
297 int i;
299 /* The KVM XICS device is not in use */
300 if (kernel_xics_fd == -1) {
301 return 0;
304 for (i = 0; i < ics->nr_irqs; i++) {
305 Error *local_err = NULL;
306 int ret;
308 if (ics_irq_free(ics, i)) {
309 continue;
312 ret = ics_set_kvm_state_one(ics, i, &local_err);
313 if (ret < 0) {
314 error_propagate(errp, local_err);
315 return ret;
319 return 0;
322 void ics_kvm_set_irq(ICSState *ics, int srcno, int val)
324 struct kvm_irq_level args;
325 int rc;
327 /* The KVM XICS device should be in use */
328 assert(kernel_xics_fd != -1);
330 args.irq = srcno + ics->offset;
331 if (ics->irqs[srcno].flags & XICS_FLAGS_IRQ_MSI) {
332 if (!val) {
333 return;
335 args.level = KVM_INTERRUPT_SET;
336 } else {
337 args.level = val ? KVM_INTERRUPT_SET_LEVEL : KVM_INTERRUPT_UNSET;
339 rc = kvm_vm_ioctl(kvm_state, KVM_IRQ_LINE, &args);
340 if (rc < 0) {
341 perror("kvm_irq_line");
345 int xics_kvm_connect(SpaprMachineState *spapr, Error **errp)
347 int rc;
348 CPUState *cs;
349 Error *local_err = NULL;
352 * The KVM XICS device already in use. This is the case when
353 * rebooting under the XICS-only interrupt mode.
355 if (kernel_xics_fd != -1) {
356 return 0;
359 if (!kvm_enabled() || !kvm_check_extension(kvm_state, KVM_CAP_IRQ_XICS)) {
360 error_setg(errp,
361 "KVM and IRQ_XICS capability must be present for in-kernel XICS");
362 return -1;
365 rc = kvmppc_define_rtas_kernel_token(RTAS_IBM_SET_XIVE, "ibm,set-xive");
366 if (rc < 0) {
367 error_setg_errno(&local_err, -rc,
368 "kvmppc_define_rtas_kernel_token: ibm,set-xive");
369 goto fail;
372 rc = kvmppc_define_rtas_kernel_token(RTAS_IBM_GET_XIVE, "ibm,get-xive");
373 if (rc < 0) {
374 error_setg_errno(&local_err, -rc,
375 "kvmppc_define_rtas_kernel_token: ibm,get-xive");
376 goto fail;
379 rc = kvmppc_define_rtas_kernel_token(RTAS_IBM_INT_ON, "ibm,int-on");
380 if (rc < 0) {
381 error_setg_errno(&local_err, -rc,
382 "kvmppc_define_rtas_kernel_token: ibm,int-on");
383 goto fail;
386 rc = kvmppc_define_rtas_kernel_token(RTAS_IBM_INT_OFF, "ibm,int-off");
387 if (rc < 0) {
388 error_setg_errno(&local_err, -rc,
389 "kvmppc_define_rtas_kernel_token: ibm,int-off");
390 goto fail;
393 /* Create the KVM XICS device */
394 rc = kvm_create_device(kvm_state, KVM_DEV_TYPE_XICS, false);
395 if (rc < 0) {
396 error_setg_errno(&local_err, -rc, "Error on KVM_CREATE_DEVICE for XICS");
397 goto fail;
400 kernel_xics_fd = rc;
401 kvm_kernel_irqchip = true;
402 kvm_msi_via_irqfd_allowed = true;
403 kvm_gsi_direct_mapping = true;
405 /* Create the presenters */
406 CPU_FOREACH(cs) {
407 PowerPCCPU *cpu = POWERPC_CPU(cs);
409 icp_kvm_realize(DEVICE(spapr_cpu_state(cpu)->icp), &local_err);
410 if (local_err) {
411 goto fail;
415 /* Update the KVM sources */
416 ics_set_kvm_state(spapr->ics, &local_err);
417 if (local_err) {
418 goto fail;
421 /* Connect the presenters to the initial VCPUs of the machine */
422 CPU_FOREACH(cs) {
423 PowerPCCPU *cpu = POWERPC_CPU(cs);
424 icp_set_kvm_state(spapr_cpu_state(cpu)->icp, &local_err);
425 if (local_err) {
426 goto fail;
430 return 0;
432 fail:
433 error_propagate(errp, local_err);
434 xics_kvm_disconnect(spapr, NULL);
435 return -1;
438 void xics_kvm_disconnect(SpaprMachineState *spapr, Error **errp)
441 * Only on P9 using the XICS-on XIVE KVM device:
443 * When the KVM device fd is closed, the device is destroyed and
444 * removed from the list of devices of the VM. The VCPU presenters
445 * are also detached from the device.
447 if (kernel_xics_fd != -1) {
448 close(kernel_xics_fd);
449 kernel_xics_fd = -1;
452 kvmppc_define_rtas_kernel_token(0, "ibm,set-xive");
453 kvmppc_define_rtas_kernel_token(0, "ibm,get-xive");
454 kvmppc_define_rtas_kernel_token(0, "ibm,int-on");
455 kvmppc_define_rtas_kernel_token(0, "ibm,int-off");
457 kvm_kernel_irqchip = false;
458 kvm_msi_via_irqfd_allowed = false;
459 kvm_gsi_direct_mapping = false;
461 /* Clear the presenter from the VCPUs */
462 kvm_disable_icps();
466 * This is a heuristic to detect older KVMs on POWER9 hosts that don't
467 * support destruction of a KVM XICS device while the VM is running.
468 * Required to start a spapr machine with ic-mode=dual,kernel-irqchip=on.
470 bool xics_kvm_has_broken_disconnect(SpaprMachineState *spapr)
472 int rc;
474 rc = kvm_create_device(kvm_state, KVM_DEV_TYPE_XICS, false);
475 if (rc < 0) {
477 * The error is ignored on purpose. The KVM XICS setup code
478 * will catch it again anyway. The goal here is to see if
479 * close() actually destroys the device or not.
481 return false;
484 close(rc);
486 rc = kvm_create_device(kvm_state, KVM_DEV_TYPE_XICS, false);
487 if (rc >= 0) {
488 close(rc);
489 return false;
492 return errno == EEXIST;