Message ID | 1478258013-6669-7-git-send-email-vijay.kilari@gmail.com |
---|---|
State | New |
Headers | show |
On Fri, Nov 04, 2016 at 04:43:32PM +0530, vijay.kilari@gmail.com wrote: > From: Vijaya Kumar K <Vijaya.Kumar@cavium.com> > > VGICv3 CPU interface registers are accessed using > KVM_DEV_ARM_VGIC_CPU_SYSREGS ioctl. These registers are accessed > as 64-bit. The cpu MPIDR value is passed along with register id. > is used to identify the cpu for registers access. > > The version of VGIC v3 specification is define here > http://lists.infradead.org/pipermail/linux-arm-kernel/2016-July/445611.html > > Signed-off-by: Pavel Fedin <p.fedin@samsung.com> > Signed-off-by: Vijaya Kumar K <Vijaya.Kumar@cavium.com> > --- > arch/arm64/include/uapi/asm/kvm.h | 3 + > arch/arm64/kvm/Makefile | 1 + > include/kvm/arm_vgic.h | 9 + > virt/kvm/arm/vgic/vgic-kvm-device.c | 27 +++ > virt/kvm/arm/vgic/vgic-mmio-v3.c | 19 +++ > virt/kvm/arm/vgic/vgic-sys-reg-v3.c | 324 ++++++++++++++++++++++++++++++++++++ > virt/kvm/arm/vgic/vgic-v3.c | 8 + > virt/kvm/arm/vgic/vgic.h | 4 + > 8 files changed, 395 insertions(+) > > diff --git a/arch/arm64/include/uapi/asm/kvm.h b/arch/arm64/include/uapi/asm/kvm.h > index 56dc08d..91c7137 100644 > --- a/arch/arm64/include/uapi/asm/kvm.h > +++ b/arch/arm64/include/uapi/asm/kvm.h > @@ -206,9 +206,12 @@ struct kvm_arch_memory_slot { > (0xffffffffULL << KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT) > #define KVM_DEV_ARM_VGIC_OFFSET_SHIFT 0 > #define KVM_DEV_ARM_VGIC_OFFSET_MASK (0xffffffffULL << KVM_DEV_ARM_VGIC_OFFSET_SHIFT) > +#define KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK (0xffff) > #define KVM_DEV_ARM_VGIC_GRP_NR_IRQS 3 > #define KVM_DEV_ARM_VGIC_GRP_CTRL 4 > #define KVM_DEV_ARM_VGIC_GRP_REDIST_REGS 5 > +#define KVM_DEV_ARM_VGIC_CPU_SYSREGS 6 > + > #define KVM_DEV_ARM_VGIC_CTRL_INIT 0 > > /* Device Control API on vcpu fd */ > diff --git a/arch/arm64/kvm/Makefile b/arch/arm64/kvm/Makefile > index d50a82a..1a14e29 100644 > --- a/arch/arm64/kvm/Makefile > +++ b/arch/arm64/kvm/Makefile > @@ -32,5 +32,6 @@ kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-mmio-v3.o > kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-kvm-device.o > kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-its.o > kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/irqchip.o > +kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-sys-reg-v3.o Thi is making me wonder: Are we properly handling GICv3 save/restore for AArch32 now that we have GICv3 support for AArch32? By properly I mean that either it is clearly only supported on AArch64 systems or it's supported on both AArch64 and AArch32, but it shouldn't break randomly on AArch32. > kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/arch_timer.o > kvm-$(CONFIG_KVM_ARM_PMU) += $(KVM)/arm/pmu.o > diff --git a/include/kvm/arm_vgic.h b/include/kvm/arm_vgic.h > index 002f092..730a18a 100644 > --- a/include/kvm/arm_vgic.h > +++ b/include/kvm/arm_vgic.h > @@ -71,6 +71,9 @@ struct vgic_global { > > /* GIC system register CPU interface */ > struct static_key_false gicv3_cpuif; > + > + /* Cache ICH_VTR_EL2 reg value */ > + u32 ich_vtr_el2; > }; > > extern struct vgic_global kvm_vgic_global_state; > @@ -269,6 +272,12 @@ struct vgic_cpu { > u64 pendbaser; > > bool lpis_enabled; > + > + /* Cache guest priority bits */ > + u32 num_pri_bits; > + > + /* Cache guest interrupt ID bits */ > + u32 num_id_bits; > }; > > extern struct static_key_false vgic_v2_cpuif_trap; > diff --git a/virt/kvm/arm/vgic/vgic-kvm-device.c b/virt/kvm/arm/vgic/vgic-kvm-device.c > index 6c7d30c..da532d1 100644 > --- a/virt/kvm/arm/vgic/vgic-kvm-device.c > +++ b/virt/kvm/arm/vgic/vgic-kvm-device.c > @@ -504,6 +504,14 @@ static int vgic_v3_attr_regs_access(struct kvm_device *dev, > if (!is_write) > *reg = tmp32; > break; > + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { > + u64 regid; > + > + regid = (attr->attr & KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK); > + ret = vgic_v3_cpu_sysregs_uaccess(vcpu, is_write, > + regid, reg); > + break; > + } > default: > ret = -EINVAL; > break; > @@ -537,6 +545,15 @@ static int vgic_v3_set_attr(struct kvm_device *dev, > reg = tmp32; > return vgic_v3_attr_regs_access(dev, attr, ®, true); > } > + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { > + u64 __user *uaddr = (u64 __user *)(long)attr->addr; > + u64 reg; > + > + if (get_user(reg, uaddr)) > + return -EFAULT; > + > + return vgic_v3_attr_regs_access(dev, attr, ®, true); > + } > } > return -ENXIO; > } > @@ -563,6 +580,15 @@ static int vgic_v3_get_attr(struct kvm_device *dev, > tmp32 = reg; > return put_user(tmp32, uaddr); > } > + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { > + u64 __user *uaddr = (u64 __user *)(long)attr->addr; > + u64 reg; > + > + ret = vgic_v3_attr_regs_access(dev, attr, ®, false); > + if (ret) > + return ret; > + return put_user(reg, uaddr); > + } > } > > return -ENXIO; > @@ -581,6 +607,7 @@ static int vgic_v3_has_attr(struct kvm_device *dev, > break; > case KVM_DEV_ARM_VGIC_GRP_DIST_REGS: > case KVM_DEV_ARM_VGIC_GRP_REDIST_REGS: > + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: > return vgic_v3_has_attr_regs(dev, attr); > case KVM_DEV_ARM_VGIC_GRP_NR_IRQS: > return 0; > diff --git a/virt/kvm/arm/vgic/vgic-mmio-v3.c b/virt/kvm/arm/vgic/vgic-mmio-v3.c > index b35fb83..519b919 100644 > --- a/virt/kvm/arm/vgic/vgic-mmio-v3.c > +++ b/virt/kvm/arm/vgic/vgic-mmio-v3.c > @@ -23,6 +23,7 @@ > > #include "vgic.h" > #include "vgic-mmio.h" > +#include "sys_regs.h" > > /* extract @num bytes at @offset bytes offset in data */ > unsigned long extract_bytes(u64 data, unsigned int offset, > @@ -639,6 +640,24 @@ int vgic_v3_has_attr_regs(struct kvm_device *dev, struct kvm_device_attr *attr) > nr_regions = ARRAY_SIZE(vgic_v3_rdbase_registers); > break; > } > + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { > + u64 reg, id; > + unsigned long vgic_mpidr, mpidr_reg; > + struct kvm_vcpu *vcpu; > + > + vgic_mpidr = (attr->attr & KVM_DEV_ARM_VGIC_V3_MPIDR_MASK) >> > + KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT; > + > + /* Convert plain mpidr value to MPIDR reg format */ > + mpidr_reg = VGIC_TO_MPIDR(vgic_mpidr); > + > + vcpu = kvm_mpidr_to_vcpu(dev->kvm, mpidr_reg); > + if (!vcpu) > + return -EINVAL; > + > + id = (attr->attr & KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK); > + return vgic_v3_has_cpu_sysregs_attr(vcpu, 0, id, ®); > + } > default: > return -ENXIO; > } > diff --git a/virt/kvm/arm/vgic/vgic-sys-reg-v3.c b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c > new file mode 100644 > index 0000000..69d8597 > --- /dev/null > +++ b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c Shouldn't we have a GPL header here? > @@ -0,0 +1,324 @@ > +#include <linux/irqchip/arm-gic-v3.h> > +#include <linux/kvm.h> > +#include <linux/kvm_host.h> > +#include <kvm/iodev.h> > +#include <kvm/arm_vgic.h> > +#include <asm/kvm_emulate.h> > +#include <asm/kvm_arm.h> > +#include <asm/kvm_mmu.h> > + > +#include "vgic.h" > +#include "vgic-mmio.h" > +#include "sys_regs.h" > + > +static bool access_gic_ctlr(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > + const struct sys_reg_desc *r) > +{ > + struct vgic_cpu *vgic_v3_cpu = &vcpu->arch.vgic_cpu; > + struct vgic_vmcr vmcr; > + u64 val; > + u32 num_pri_bits, num_id_bits; > + > + vgic_get_vmcr(vcpu, &vmcr); > + if (p->is_write) { > + val = p->regval; > + > + /* > + * Does not allow update of ICC_CTLR_EL1 if HW does not support > + * guest programmed ID and PRI bits > + */ I would suggest rewording this comment: Disallow restoring VM state not supported by this hardware. > + num_pri_bits = ((val & ICC_CTLR_EL1_PRI_BITS_MASK) >> > + ICC_CTLR_EL1_PRI_BITS_SHIFT) + 1; > + if (num_pri_bits > vgic_v3_cpu->num_pri_bits) > + return false; > + > + vgic_v3_cpu->num_pri_bits = num_pri_bits; hmmm, this looks weird to me, because vgic_v3_cpu->num_pri_bits I don't understand which effect this is intended to have? Sure, it may limit what you do with other registers later, but since there's no ordering requirement that the ctlr be restored first, I'm not sure it makes sense. Also, since this field is RO in the ICH_VTR, we'll have a strange situation during runtime after a GICv3 restore where the vgic_v3_cpu->num_pri_its differs from the hardware's ICH_VTR_EL2 field, which is never the case if you didn't do a save/restore. Finally, should we somehow ensure that this field is set to the same value across VCPUs or is that not an architectural requirement? > + > + num_id_bits = (val & ICC_CTLR_EL1_ID_BITS_MASK) >> > + ICC_CTLR_EL1_ID_BITS_SHIFT; > + if (num_id_bits > vgic_v3_cpu->num_id_bits) > + return false; > + > + vgic_v3_cpu->num_id_bits = num_id_bits; same questions > + > + vmcr.ctlr &= ~(ICH_VMCR_CBPR_MASK | ICH_VMCR_EOIM_MASK); > + vmcr.ctlr |= ((val & ICC_CTLR_EL1_CBPR_MASK) >> > + ICC_CTLR_EL1_CBPR_SHIFT) << ICH_VMCR_CBPR_SHIFT; > + vmcr.ctlr |= ((val & ICC_CTLR_EL1_EOImode_MASK) >> > + ICC_CTLR_EL1_EOImode_SHIFT) << > + ICH_VMCR_EOIM_SHIFT; I'm really confused here. Is the vmcr.ctlr field in the ICC_CTLR_EL1 format or in the VMCR format? I would assume the former, since otherwise I don't get the point with this indirection, and for GICv2 vmcr.ctlr captures the GICC_CTLR value and git_set_vmcr transforms this into VMCR values. Having a line that says "ctlr &= ~ICH_VMCR" should make some alarm bells ring. > + vgic_set_vmcr(vcpu, &vmcr); Should we check compatibility between the source and destination for the SEIS and A3V support here? > + } else { > + val = 0; > + val |= (vgic_v3_cpu->num_pri_bits - 1) << > + ICC_CTLR_EL1_PRI_BITS_SHIFT; > + val |= vgic_v3_cpu->num_id_bits << > + ICC_CTLR_EL1_ID_BITS_SHIFT; > + val |= ((kvm_vgic_global_state.ich_vtr_el2 & > + ICH_VTR_SEIS_MASK) >> ICH_VTR_SEIS_SHIFT) << > + ICC_CTLR_EL1_SEIS_SHIFT; > + val |= ((kvm_vgic_global_state.ich_vtr_el2 & > + ICH_VTR_A3V_MASK) >> ICH_VTR_A3V_SHIFT) << > + ICC_CTLR_EL1_A3V_SHIFT; > + val |= ((vmcr.ctlr & ICH_VMCR_CBPR_MASK) >> > + ICH_VMCR_CBPR_SHIFT) << ICC_CTLR_EL1_CBPR_SHIFT; > + val |= ((vmcr.ctlr & ICH_VMCR_EOIM_MASK) >> > + ICH_VMCR_EOIM_SHIFT) << ICC_CTLR_EL1_EOImode_SHIFT; again, these last two look weird to me. > + > + p->regval = val; > + } > + > + return true; > +} > + > +static bool access_gic_pmr(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > + const struct sys_reg_desc *r) > +{ > + struct vgic_vmcr vmcr; > + > + vgic_get_vmcr(vcpu, &vmcr); > + if (p->is_write) { > + vmcr.pmr = (p->regval & ICC_PMR_EL1_MASK) >> ICC_PMR_EL1_SHIFT; > + vgic_set_vmcr(vcpu, &vmcr); > + } else { > + p->regval = (vmcr.pmr << ICC_PMR_EL1_SHIFT) & ICC_PMR_EL1_MASK; > + } > + > + return true; > +} > + > +static bool access_gic_bpr0(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > + const struct sys_reg_desc *r) > +{ > + struct vgic_vmcr vmcr; > + > + vgic_get_vmcr(vcpu, &vmcr); > + if (p->is_write) { > + vmcr.bpr = (p->regval & ICC_BPR0_EL1_MASK) >> > + ICC_BPR0_EL1_SHIFT; > + vgic_set_vmcr(vcpu, &vmcr); > + } else { > + p->regval = (vmcr.bpr << ICC_BPR0_EL1_SHIFT) & > + ICC_BPR0_EL1_MASK; > + } > + > + return true; > +} > + > +static bool access_gic_bpr1(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > + const struct sys_reg_desc *r) > +{ > + struct vgic_vmcr vmcr; > + > + if (!p->is_write) > + p->regval = 0; > + > + vgic_get_vmcr(vcpu, &vmcr); > + if (!((vmcr.ctlr & ICH_VMCR_CBPR_MASK) >> ICH_VMCR_CBPR_SHIFT)) { > + if (p->is_write) { > + vmcr.abpr = (p->regval & ICC_BPR1_EL1_MASK) >> > + ICC_BPR1_EL1_SHIFT; > + vgic_set_vmcr(vcpu, &vmcr); > + } else { > + p->regval = (vmcr.abpr << ICC_BPR1_EL1_SHIFT) & > + ICC_BPR1_EL1_MASK; > + } > + } else { > + if (!p->is_write) > + p->regval = min((vmcr.bpr + 1), 7U); > + } > + > + return true; > +} > + > +static bool access_gic_grpen0(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > + const struct sys_reg_desc *r) > +{ > + struct vgic_vmcr vmcr; > + > + vgic_get_vmcr(vcpu, &vmcr); > + if (p->is_write) { > + vmcr.grpen0 = (p->regval & ICC_IGRPEN0_EL1_MASK) >> > + ICC_IGRPEN0_EL1_SHIFT; > + vgic_set_vmcr(vcpu, &vmcr); > + } else { > + p->regval = (vmcr.grpen0 << ICC_IGRPEN0_EL1_SHIFT) & > + ICC_IGRPEN0_EL1_MASK; > + } > + > + return true; > +} > + > +static bool access_gic_grpen1(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > + const struct sys_reg_desc *r) > +{ > + struct vgic_vmcr vmcr; > + > + vgic_get_vmcr(vcpu, &vmcr); > + if (p->is_write) { > + vmcr.grpen1 = (p->regval & ICC_IGRPEN1_EL1_MASK) >> > + ICC_IGRPEN1_EL1_SHIFT; > + vgic_set_vmcr(vcpu, &vmcr); > + } else { > + p->regval = (vmcr.grpen1 << ICC_IGRPEN1_EL1_SHIFT) & > + ICC_IGRPEN1_EL1_MASK; > + } > + > + return true; > +} > + > +static void vgic_v3_access_apr_reg(struct kvm_vcpu *vcpu, > + struct sys_reg_params *p, u8 apr, u8 idx) > +{ > + struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3; > + uint32_t *ap_reg; > + > + if (apr) > + ap_reg = &vgicv3->vgic_ap1r[idx]; > + else > + ap_reg = &vgicv3->vgic_ap0r[idx]; > + > + if (p->is_write) > + *ap_reg = p->regval; > + else > + p->regval = *ap_reg; > +} > + > +static void access_gic_aprn(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > + const struct sys_reg_desc *r, u8 apr) > +{ > + struct vgic_cpu *vgic_v3_cpu = &vcpu->arch.vgic_cpu; > + u8 idx = r->Op2 & 3; > + > + switch (vgic_v3_cpu->num_pri_bits) { > + case 7: > + if (idx > 3) > + goto err; idx cannot be higher than three given the mask above, right? > + vgic_v3_access_apr_reg(vcpu, p, apr, idx); > + break; > + case 6: > + if (idx > 1) > + goto err; > + vgic_v3_access_apr_reg(vcpu, p, apr, idx); > + break; > + default: > + if (idx > 0) > + goto err; > + vgic_v3_access_apr_reg(vcpu, p, apr, idx); > + } what's the rationale behind ignoring the case where userspace is using unsupported priorities? Is it that this will be checked during save/restore of the ctlr? This sort of thing just looks like the case that's impossible to debug, because userspace could be scratching its head trying to understand why the value it wrote isn't recorded anywhere... If there's a good rationale for doing it this way, then could we have a comment to that effect? > + > + return; > +err: > + if (!p->is_write) > + p->regval = 0; > +} > + > +static bool access_gic_ap0r(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > + const struct sys_reg_desc *r) > +{ > + access_gic_aprn(vcpu, p, r, 0); > + > + return true; > +} > + > +static bool access_gic_ap1r(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > + const struct sys_reg_desc *r) > +{ > + access_gic_aprn(vcpu, p, r, 1); > + > + return true; > +} > + > +static bool access_gic_sre(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > + const struct sys_reg_desc *r) > +{ > + struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3; > + > + /* Validate SRE bit */ > + if (p->is_write) { > + if (!(p->regval & ICC_SRE_EL1_SRE)) > + return false; > + } else { > + p->regval = vgicv3->vgic_sre; > + } > + > + return true; > +} > + > +static const struct sys_reg_desc gic_v3_icc_reg_descs[] = { > + /* ICC_PMR_EL1 */ > + { Op0(3), Op1(0), CRn(4), CRm(6), Op2(0), access_gic_pmr }, > + /* ICC_BPR0_EL1 */ > + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(3), access_gic_bpr0 }, > + /* ICC_AP0R0_EL1 */ > + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(4), access_gic_ap0r }, > + /* ICC_AP0R1_EL1 */ > + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(5), access_gic_ap0r }, > + /* ICC_AP0R2_EL1 */ > + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(6), access_gic_ap0r }, > + /* ICC_AP0R3_EL1 */ > + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(7), access_gic_ap0r }, > + /* ICC_AP1R0_EL1 */ > + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(0), access_gic_ap1r }, > + /* ICC_AP1R1_EL1 */ > + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(1), access_gic_ap1r }, > + /* ICC_AP1R2_EL1 */ > + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(2), access_gic_ap1r }, > + /* ICC_AP1R3_EL1 */ > + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(3), access_gic_ap1r }, > + /* ICC_BPR1_EL1 */ > + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(3), access_gic_bpr1 }, > + /* ICC_CTLR_EL1 */ > + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(4), access_gic_ctlr }, > + /* ICC_SRE_EL1 */ > + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(5), access_gic_sre }, > + /* ICC_IGRPEN0_EL1 */ > + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(6), access_gic_grpen0 }, > + /* ICC_GRPEN1_EL1 */ > + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(7), access_gic_grpen1 }, > +}; > + > +int vgic_v3_has_cpu_sysregs_attr(struct kvm_vcpu *vcpu, bool is_write, u64 id, > + u64 *reg) > +{ > + struct sys_reg_params params; > + u64 sysreg = (id & KVM_DEV_ARM_VGIC_SYSREG_MASK) | KVM_REG_SIZE_U64; > + > + params.regval = *reg; > + params.is_write = is_write; > + params.is_aarch32 = false; > + params.is_32bit = false; > + > + if (find_reg_by_id(sysreg, ¶ms, gic_v3_icc_reg_descs, > + ARRAY_SIZE(gic_v3_icc_reg_descs))) > + return 0; > + > + return -ENXIO; > +} > + > +int vgic_v3_cpu_sysregs_uaccess(struct kvm_vcpu *vcpu, bool is_write, u64 id, > + u64 *reg) > +{ > + struct sys_reg_params params; > + const struct sys_reg_desc *r; > + u64 sysreg = (id & KVM_DEV_ARM_VGIC_SYSREG_MASK) | KVM_REG_SIZE_U64; > + > + if (is_write) > + params.regval = *reg; > + params.is_write = is_write; > + params.is_aarch32 = false; > + params.is_32bit = false; > + > + r = find_reg_by_id(sysreg, ¶ms, gic_v3_icc_reg_descs, > + ARRAY_SIZE(gic_v3_icc_reg_descs)); > + if (!r) > + return -ENXIO; > + > + if (!r->access(vcpu, ¶ms, r)) > + return -EINVAL; According to the API, EINVAL meansinvalid mpidr. Should we expand on how it can be used or allocate a new error code? > + > + if (!is_write) > + *reg = params.regval; > + > + return 0; > +} > diff --git a/virt/kvm/arm/vgic/vgic-v3.c b/virt/kvm/arm/vgic/vgic-v3.c > index 967c295..1139971 100644 > --- a/virt/kvm/arm/vgic/vgic-v3.c > +++ b/virt/kvm/arm/vgic/vgic-v3.c > @@ -228,6 +228,13 @@ void vgic_v3_enable(struct kvm_vcpu *vcpu) > vgic_v3->vgic_sre = 0; > } > > + vcpu->arch.vgic_cpu.num_id_bits = (kvm_vgic_global_state.ich_vtr_el2 & > + ICH_VTR_ID_BITS_MASK) >> > + ICH_VTR_ID_BITS_SHIFT; > + vcpu->arch.vgic_cpu.num_pri_bits = ((kvm_vgic_global_state.ich_vtr_el2 & > + ICH_VTR_PRI_BITS_MASK) >> > + ICH_VTR_PRI_BITS_SHIFT) + 1; > + > /* Get the show on the road... */ > vgic_v3->vgic_hcr = ICH_HCR_EN; > } > @@ -328,6 +335,7 @@ int vgic_v3_probe(const struct gic_kvm_info *info) > */ > kvm_vgic_global_state.nr_lr = (ich_vtr_el2 & 0xf) + 1; > kvm_vgic_global_state.can_emulate_gicv2 = false; > + kvm_vgic_global_state.ich_vtr_el2 = ich_vtr_el2; > > if (!info->vcpu.start) { > kvm_info("GICv3: no GICV resource entry\n"); > diff --git a/virt/kvm/arm/vgic/vgic.h b/virt/kvm/arm/vgic/vgic.h > index c461f6b..0e632d0 100644 > --- a/virt/kvm/arm/vgic/vgic.h > +++ b/virt/kvm/arm/vgic/vgic.h > @@ -126,6 +126,10 @@ int vgic_v3_dist_uaccess(struct kvm_vcpu *vcpu, bool is_write, > int offset, u32 *val); > int vgic_v3_redist_uaccess(struct kvm_vcpu *vcpu, bool is_write, > int offset, u32 *val); > +int vgic_v3_cpu_sysregs_uaccess(struct kvm_vcpu *vcpu, bool is_write, > + u64 id, u64 *val); > +int vgic_v3_has_cpu_sysregs_attr(struct kvm_vcpu *vcpu, bool is_write, u64 id, > + u64 *reg); > #else > static inline int vgic_register_its_iodevs(struct kvm *kvm) > { > -- Thanks, -Christoffer _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
On Thu, Nov 17, 2016 at 12:22 AM, Christoffer Dall <christoffer.dall@linaro.org> wrote: > On Fri, Nov 04, 2016 at 04:43:32PM +0530, vijay.kilari@gmail.com wrote: >> From: Vijaya Kumar K <Vijaya.Kumar@cavium.com> >> >> VGICv3 CPU interface registers are accessed using >> KVM_DEV_ARM_VGIC_CPU_SYSREGS ioctl. These registers are accessed >> as 64-bit. The cpu MPIDR value is passed along with register id. >> is used to identify the cpu for registers access. >> >> The version of VGIC v3 specification is define here >> http://lists.infradead.org/pipermail/linux-arm-kernel/2016-July/445611.html >> >> Signed-off-by: Pavel Fedin <p.fedin@samsung.com> >> Signed-off-by: Vijaya Kumar K <Vijaya.Kumar@cavium.com> >> --- >> arch/arm64/include/uapi/asm/kvm.h | 3 + >> arch/arm64/kvm/Makefile | 1 + >> include/kvm/arm_vgic.h | 9 + >> virt/kvm/arm/vgic/vgic-kvm-device.c | 27 +++ >> virt/kvm/arm/vgic/vgic-mmio-v3.c | 19 +++ >> virt/kvm/arm/vgic/vgic-sys-reg-v3.c | 324 ++++++++++++++++++++++++++++++++++++ >> virt/kvm/arm/vgic/vgic-v3.c | 8 + >> virt/kvm/arm/vgic/vgic.h | 4 + >> 8 files changed, 395 insertions(+) >> >> diff --git a/arch/arm64/include/uapi/asm/kvm.h b/arch/arm64/include/uapi/asm/kvm.h >> index 56dc08d..91c7137 100644 >> --- a/arch/arm64/include/uapi/asm/kvm.h >> +++ b/arch/arm64/include/uapi/asm/kvm.h >> @@ -206,9 +206,12 @@ struct kvm_arch_memory_slot { >> (0xffffffffULL << KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT) >> #define KVM_DEV_ARM_VGIC_OFFSET_SHIFT 0 >> #define KVM_DEV_ARM_VGIC_OFFSET_MASK (0xffffffffULL << KVM_DEV_ARM_VGIC_OFFSET_SHIFT) >> +#define KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK (0xffff) >> #define KVM_DEV_ARM_VGIC_GRP_NR_IRQS 3 >> #define KVM_DEV_ARM_VGIC_GRP_CTRL 4 >> #define KVM_DEV_ARM_VGIC_GRP_REDIST_REGS 5 >> +#define KVM_DEV_ARM_VGIC_CPU_SYSREGS 6 >> + >> #define KVM_DEV_ARM_VGIC_CTRL_INIT 0 >> >> /* Device Control API on vcpu fd */ >> diff --git a/arch/arm64/kvm/Makefile b/arch/arm64/kvm/Makefile >> index d50a82a..1a14e29 100644 >> --- a/arch/arm64/kvm/Makefile >> +++ b/arch/arm64/kvm/Makefile >> @@ -32,5 +32,6 @@ kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-mmio-v3.o >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-kvm-device.o >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-its.o >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/irqchip.o >> +kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-sys-reg-v3.o > > Thi is making me wonder: Are we properly handling GICv3 save/restore > for AArch32 now that we have GICv3 support for AArch32? By properly I > mean that either it is clearly only supported on AArch64 systems or it's > supported on both AArch64 and AArch32, but it shouldn't break randomly > on AArch32. It supports both AArch64 and AArch64 in handling of system registers save/restore. All system registers that we save/restore are 32-bit for both aarch64 and aarch32. Though opcode op0 should be zero for aarch32, the remaining Op and CRn codes are same. However the codes sent by qemu is matched and register are handled properly irrespective of AArch32 or AArch64. I don't have platform which support AArch32 guests to verify. > >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/arch_timer.o >> kvm-$(CONFIG_KVM_ARM_PMU) += $(KVM)/arm/pmu.o >> diff --git a/include/kvm/arm_vgic.h b/include/kvm/arm_vgic.h >> index 002f092..730a18a 100644 >> --- a/include/kvm/arm_vgic.h >> +++ b/include/kvm/arm_vgic.h >> @@ -71,6 +71,9 @@ struct vgic_global { >> >> /* GIC system register CPU interface */ >> struct static_key_false gicv3_cpuif; >> + >> + /* Cache ICH_VTR_EL2 reg value */ >> + u32 ich_vtr_el2; >> }; >> >> extern struct vgic_global kvm_vgic_global_state; >> @@ -269,6 +272,12 @@ struct vgic_cpu { >> u64 pendbaser; >> >> bool lpis_enabled; >> + >> + /* Cache guest priority bits */ >> + u32 num_pri_bits; >> + >> + /* Cache guest interrupt ID bits */ >> + u32 num_id_bits; >> }; >> >> extern struct static_key_false vgic_v2_cpuif_trap; >> diff --git a/virt/kvm/arm/vgic/vgic-kvm-device.c b/virt/kvm/arm/vgic/vgic-kvm-device.c >> index 6c7d30c..da532d1 100644 >> --- a/virt/kvm/arm/vgic/vgic-kvm-device.c >> +++ b/virt/kvm/arm/vgic/vgic-kvm-device.c >> @@ -504,6 +504,14 @@ static int vgic_v3_attr_regs_access(struct kvm_device *dev, >> if (!is_write) >> *reg = tmp32; >> break; >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { >> + u64 regid; >> + >> + regid = (attr->attr & KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK); >> + ret = vgic_v3_cpu_sysregs_uaccess(vcpu, is_write, >> + regid, reg); >> + break; >> + } >> default: >> ret = -EINVAL; >> break; >> @@ -537,6 +545,15 @@ static int vgic_v3_set_attr(struct kvm_device *dev, >> reg = tmp32; >> return vgic_v3_attr_regs_access(dev, attr, ®, true); >> } >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { >> + u64 __user *uaddr = (u64 __user *)(long)attr->addr; >> + u64 reg; >> + >> + if (get_user(reg, uaddr)) >> + return -EFAULT; >> + >> + return vgic_v3_attr_regs_access(dev, attr, ®, true); >> + } >> } >> return -ENXIO; >> } >> @@ -563,6 +580,15 @@ static int vgic_v3_get_attr(struct kvm_device *dev, >> tmp32 = reg; >> return put_user(tmp32, uaddr); >> } >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { >> + u64 __user *uaddr = (u64 __user *)(long)attr->addr; >> + u64 reg; >> + >> + ret = vgic_v3_attr_regs_access(dev, attr, ®, false); >> + if (ret) >> + return ret; >> + return put_user(reg, uaddr); >> + } >> } >> >> return -ENXIO; >> @@ -581,6 +607,7 @@ static int vgic_v3_has_attr(struct kvm_device *dev, >> break; >> case KVM_DEV_ARM_VGIC_GRP_DIST_REGS: >> case KVM_DEV_ARM_VGIC_GRP_REDIST_REGS: >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: >> return vgic_v3_has_attr_regs(dev, attr); >> case KVM_DEV_ARM_VGIC_GRP_NR_IRQS: >> return 0; >> diff --git a/virt/kvm/arm/vgic/vgic-mmio-v3.c b/virt/kvm/arm/vgic/vgic-mmio-v3.c >> index b35fb83..519b919 100644 >> --- a/virt/kvm/arm/vgic/vgic-mmio-v3.c >> +++ b/virt/kvm/arm/vgic/vgic-mmio-v3.c >> @@ -23,6 +23,7 @@ >> >> #include "vgic.h" >> #include "vgic-mmio.h" >> +#include "sys_regs.h" >> >> /* extract @num bytes at @offset bytes offset in data */ >> unsigned long extract_bytes(u64 data, unsigned int offset, >> @@ -639,6 +640,24 @@ int vgic_v3_has_attr_regs(struct kvm_device *dev, struct kvm_device_attr *attr) >> nr_regions = ARRAY_SIZE(vgic_v3_rdbase_registers); >> break; >> } >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { >> + u64 reg, id; >> + unsigned long vgic_mpidr, mpidr_reg; >> + struct kvm_vcpu *vcpu; >> + >> + vgic_mpidr = (attr->attr & KVM_DEV_ARM_VGIC_V3_MPIDR_MASK) >> >> + KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT; >> + >> + /* Convert plain mpidr value to MPIDR reg format */ >> + mpidr_reg = VGIC_TO_MPIDR(vgic_mpidr); >> + >> + vcpu = kvm_mpidr_to_vcpu(dev->kvm, mpidr_reg); >> + if (!vcpu) >> + return -EINVAL; >> + >> + id = (attr->attr & KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK); >> + return vgic_v3_has_cpu_sysregs_attr(vcpu, 0, id, ®); >> + } >> default: >> return -ENXIO; >> } >> diff --git a/virt/kvm/arm/vgic/vgic-sys-reg-v3.c b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c >> new file mode 100644 >> index 0000000..69d8597 >> --- /dev/null >> +++ b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c > > Shouldn't we have a GPL header here? > >> @@ -0,0 +1,324 @@ >> +#include <linux/irqchip/arm-gic-v3.h> >> +#include <linux/kvm.h> >> +#include <linux/kvm_host.h> >> +#include <kvm/iodev.h> >> +#include <kvm/arm_vgic.h> >> +#include <asm/kvm_emulate.h> >> +#include <asm/kvm_arm.h> >> +#include <asm/kvm_mmu.h> >> + >> +#include "vgic.h" >> +#include "vgic-mmio.h" >> +#include "sys_regs.h" >> + >> +static bool access_gic_ctlr(struct kvm_vcpu *vcpu, struct sys_reg_params *p, >> + const struct sys_reg_desc *r) >> +{ >> + struct vgic_cpu *vgic_v3_cpu = &vcpu->arch.vgic_cpu; >> + struct vgic_vmcr vmcr; >> + u64 val; >> + u32 num_pri_bits, num_id_bits; >> + >> + vgic_get_vmcr(vcpu, &vmcr); >> + if (p->is_write) { >> + val = p->regval; >> + >> + /* >> + * Does not allow update of ICC_CTLR_EL1 if HW does not support >> + * guest programmed ID and PRI bits >> + */ > > I would suggest rewording this comment: > Disallow restoring VM state not supported by this hardware. > >> + num_pri_bits = ((val & ICC_CTLR_EL1_PRI_BITS_MASK) >> >> + ICC_CTLR_EL1_PRI_BITS_SHIFT) + 1; >> + if (num_pri_bits > vgic_v3_cpu->num_pri_bits) >> + return false; >> + >> + vgic_v3_cpu->num_pri_bits = num_pri_bits; > > hmmm, this looks weird to me, because vgic_v3_cpu->num_pri_bits I don't > understand which effect this is intended to have? > > Sure, it may limit what you do with other registers later, but since > there's no ordering requirement that the ctlr be restored first, I'm not > sure it makes sense. > > Also, since this field is RO in the ICH_VTR, we'll have a strange > situation during runtime after a GICv3 restore where the > vgic_v3_cpu->num_pri_its differs from the hardware's ICH_VTR_EL2 field, > which is never the case if you didn't do a save/restore. Yes, but in any case, vgic_v3_cpu->num_pri_bits will be always less than HW supported value. > > Finally, should we somehow ensure that this field is set to the same > value across VCPUs or is that not an architectural requirement? > Yes it is nice to have it same across VCPUs. But should be ok as we are ensuring value is not greater than HW supported value. There is no single point of place where we can make such a check >> + >> + num_id_bits = (val & ICC_CTLR_EL1_ID_BITS_MASK) >> >> + ICC_CTLR_EL1_ID_BITS_SHIFT; >> + if (num_id_bits > vgic_v3_cpu->num_id_bits) >> + return false; >> + >> + vgic_v3_cpu->num_id_bits = num_id_bits; > > same questions > >> + >> + vmcr.ctlr &= ~(ICH_VMCR_CBPR_MASK | ICH_VMCR_EOIM_MASK); >> + vmcr.ctlr |= ((val & ICC_CTLR_EL1_CBPR_MASK) >> >> + ICC_CTLR_EL1_CBPR_SHIFT) << ICH_VMCR_CBPR_SHIFT; >> + vmcr.ctlr |= ((val & ICC_CTLR_EL1_EOImode_MASK) >> >> + ICC_CTLR_EL1_EOImode_SHIFT) << >> + ICH_VMCR_EOIM_SHIFT; > > I'm really confused here. Is the vmcr.ctlr field in the ICC_CTLR_EL1 > format or in the VMCR format? I would assume the former, since > otherwise I don't get the point with this indirection, and for GICv2 > vmcr.ctlr captures the GICC_CTLR value and git_set_vmcr transforms this > into VMCR values. > > Having a line that says "ctlr &= ~ICH_VMCR" should make some alarm bells > ring. I will check and fix it. > >> + vgic_set_vmcr(vcpu, &vmcr); > > Should we check compatibility between the source and destination for the > SEIS and A3V support here? Can be checked. But I feel A3V check makes more sense than checking for SEIS. > >> + } else { >> + val = 0; >> + val |= (vgic_v3_cpu->num_pri_bits - 1) << >> + ICC_CTLR_EL1_PRI_BITS_SHIFT; >> + val |= vgic_v3_cpu->num_id_bits << >> + ICC_CTLR_EL1_ID_BITS_SHIFT; >> + val |= ((kvm_vgic_global_state.ich_vtr_el2 & >> + ICH_VTR_SEIS_MASK) >> ICH_VTR_SEIS_SHIFT) << >> + ICC_CTLR_EL1_SEIS_SHIFT; >> + val |= ((kvm_vgic_global_state.ich_vtr_el2 & >> + ICH_VTR_A3V_MASK) >> ICH_VTR_A3V_SHIFT) << >> + ICC_CTLR_EL1_A3V_SHIFT; >> + val |= ((vmcr.ctlr & ICH_VMCR_CBPR_MASK) >> >> + ICH_VMCR_CBPR_SHIFT) << ICC_CTLR_EL1_CBPR_SHIFT; >> + val |= ((vmcr.ctlr & ICH_VMCR_EOIM_MASK) >> >> + ICH_VMCR_EOIM_SHIFT) << ICC_CTLR_EL1_EOImode_SHIFT; > > again, these last two look weird to me. > >> + >> + p->regval = val; >> + } >> + >> + return true; >> +} >> + >> +static bool access_gic_pmr(struct kvm_vcpu *vcpu, struct sys_reg_params *p, >> + const struct sys_reg_desc *r) >> +{ >> + struct vgic_vmcr vmcr; >> + >> + vgic_get_vmcr(vcpu, &vmcr); >> + if (p->is_write) { >> + vmcr.pmr = (p->regval & ICC_PMR_EL1_MASK) >> ICC_PMR_EL1_SHIFT; >> + vgic_set_vmcr(vcpu, &vmcr); >> + } else { >> + p->regval = (vmcr.pmr << ICC_PMR_EL1_SHIFT) & ICC_PMR_EL1_MASK; >> + } >> + >> + return true; >> +} >> + >> +static bool access_gic_bpr0(struct kvm_vcpu *vcpu, struct sys_reg_params *p, >> + const struct sys_reg_desc *r) >> +{ >> + struct vgic_vmcr vmcr; >> + >> + vgic_get_vmcr(vcpu, &vmcr); >> + if (p->is_write) { >> + vmcr.bpr = (p->regval & ICC_BPR0_EL1_MASK) >> >> + ICC_BPR0_EL1_SHIFT; >> + vgic_set_vmcr(vcpu, &vmcr); >> + } else { >> + p->regval = (vmcr.bpr << ICC_BPR0_EL1_SHIFT) & >> + ICC_BPR0_EL1_MASK; >> + } >> + >> + return true; >> +} >> + >> +static bool access_gic_bpr1(struct kvm_vcpu *vcpu, struct sys_reg_params *p, >> + const struct sys_reg_desc *r) >> +{ >> + struct vgic_vmcr vmcr; >> + >> + if (!p->is_write) >> + p->regval = 0; >> + >> + vgic_get_vmcr(vcpu, &vmcr); >> + if (!((vmcr.ctlr & ICH_VMCR_CBPR_MASK) >> ICH_VMCR_CBPR_SHIFT)) { >> + if (p->is_write) { >> + vmcr.abpr = (p->regval & ICC_BPR1_EL1_MASK) >> >> + ICC_BPR1_EL1_SHIFT; >> + vgic_set_vmcr(vcpu, &vmcr); >> + } else { >> + p->regval = (vmcr.abpr << ICC_BPR1_EL1_SHIFT) & >> + ICC_BPR1_EL1_MASK; >> + } >> + } else { >> + if (!p->is_write) >> + p->regval = min((vmcr.bpr + 1), 7U); >> + } >> + >> + return true; >> +} >> + >> +static bool access_gic_grpen0(struct kvm_vcpu *vcpu, struct sys_reg_params *p, >> + const struct sys_reg_desc *r) >> +{ >> + struct vgic_vmcr vmcr; >> + >> + vgic_get_vmcr(vcpu, &vmcr); >> + if (p->is_write) { >> + vmcr.grpen0 = (p->regval & ICC_IGRPEN0_EL1_MASK) >> >> + ICC_IGRPEN0_EL1_SHIFT; >> + vgic_set_vmcr(vcpu, &vmcr); >> + } else { >> + p->regval = (vmcr.grpen0 << ICC_IGRPEN0_EL1_SHIFT) & >> + ICC_IGRPEN0_EL1_MASK; >> + } >> + >> + return true; >> +} >> + >> +static bool access_gic_grpen1(struct kvm_vcpu *vcpu, struct sys_reg_params *p, >> + const struct sys_reg_desc *r) >> +{ >> + struct vgic_vmcr vmcr; >> + >> + vgic_get_vmcr(vcpu, &vmcr); >> + if (p->is_write) { >> + vmcr.grpen1 = (p->regval & ICC_IGRPEN1_EL1_MASK) >> >> + ICC_IGRPEN1_EL1_SHIFT; >> + vgic_set_vmcr(vcpu, &vmcr); >> + } else { >> + p->regval = (vmcr.grpen1 << ICC_IGRPEN1_EL1_SHIFT) & >> + ICC_IGRPEN1_EL1_MASK; >> + } >> + >> + return true; >> +} >> + >> +static void vgic_v3_access_apr_reg(struct kvm_vcpu *vcpu, >> + struct sys_reg_params *p, u8 apr, u8 idx) >> +{ >> + struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3; >> + uint32_t *ap_reg; >> + >> + if (apr) >> + ap_reg = &vgicv3->vgic_ap1r[idx]; >> + else >> + ap_reg = &vgicv3->vgic_ap0r[idx]; >> + >> + if (p->is_write) >> + *ap_reg = p->regval; >> + else >> + p->regval = *ap_reg; >> +} >> + >> +static void access_gic_aprn(struct kvm_vcpu *vcpu, struct sys_reg_params *p, >> + const struct sys_reg_desc *r, u8 apr) >> +{ >> + struct vgic_cpu *vgic_v3_cpu = &vcpu->arch.vgic_cpu; >> + u8 idx = r->Op2 & 3; >> + >> + switch (vgic_v3_cpu->num_pri_bits) { >> + case 7: >> + if (idx > 3) >> + goto err; > > idx cannot be higher than three given the mask above, right? > >> + vgic_v3_access_apr_reg(vcpu, p, apr, idx); >> + break; >> + case 6: >> + if (idx > 1) >> + goto err; >> + vgic_v3_access_apr_reg(vcpu, p, apr, idx); >> + break; >> + default: >> + if (idx > 0) >> + goto err; >> + vgic_v3_access_apr_reg(vcpu, p, apr, idx); >> + } > > what's the rationale behind ignoring the case where userspace is using > unsupported priorities? Is it that this will be checked during > save/restore of the ctlr? > > This sort of thing just looks like the case that's impossible to debug, > because userspace could be scratching its head trying to understand why > the value it wrote isn't recorded anywhere... > > If there's a good rationale for doing it this way, then could we have a > comment to that effect? Accessing umplemented priority registers raised UNDEF exception. So userspace accesing should be ignored instead of recording unsupported values. > >> + >> + return; >> +err: >> + if (!p->is_write) >> + p->regval = 0; >> +} >> + >> +static bool access_gic_ap0r(struct kvm_vcpu *vcpu, struct sys_reg_params *p, >> + const struct sys_reg_desc *r) >> +{ >> + access_gic_aprn(vcpu, p, r, 0); >> + >> + return true; >> +} >> + >> +static bool access_gic_ap1r(struct kvm_vcpu *vcpu, struct sys_reg_params *p, >> + const struct sys_reg_desc *r) >> +{ >> + access_gic_aprn(vcpu, p, r, 1); >> + >> + return true; >> +} >> + >> +static bool access_gic_sre(struct kvm_vcpu *vcpu, struct sys_reg_params *p, >> + const struct sys_reg_desc *r) >> +{ >> + struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3; >> + >> + /* Validate SRE bit */ >> + if (p->is_write) { >> + if (!(p->regval & ICC_SRE_EL1_SRE)) >> + return false; >> + } else { >> + p->regval = vgicv3->vgic_sre; >> + } >> + >> + return true; >> +} >> + >> +static const struct sys_reg_desc gic_v3_icc_reg_descs[] = { >> + /* ICC_PMR_EL1 */ >> + { Op0(3), Op1(0), CRn(4), CRm(6), Op2(0), access_gic_pmr }, >> + /* ICC_BPR0_EL1 */ >> + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(3), access_gic_bpr0 }, >> + /* ICC_AP0R0_EL1 */ >> + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(4), access_gic_ap0r }, >> + /* ICC_AP0R1_EL1 */ >> + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(5), access_gic_ap0r }, >> + /* ICC_AP0R2_EL1 */ >> + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(6), access_gic_ap0r }, >> + /* ICC_AP0R3_EL1 */ >> + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(7), access_gic_ap0r }, >> + /* ICC_AP1R0_EL1 */ >> + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(0), access_gic_ap1r }, >> + /* ICC_AP1R1_EL1 */ >> + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(1), access_gic_ap1r }, >> + /* ICC_AP1R2_EL1 */ >> + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(2), access_gic_ap1r }, >> + /* ICC_AP1R3_EL1 */ >> + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(3), access_gic_ap1r }, >> + /* ICC_BPR1_EL1 */ >> + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(3), access_gic_bpr1 }, >> + /* ICC_CTLR_EL1 */ >> + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(4), access_gic_ctlr }, >> + /* ICC_SRE_EL1 */ >> + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(5), access_gic_sre }, >> + /* ICC_IGRPEN0_EL1 */ >> + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(6), access_gic_grpen0 }, >> + /* ICC_GRPEN1_EL1 */ >> + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(7), access_gic_grpen1 }, >> +}; >> + >> +int vgic_v3_has_cpu_sysregs_attr(struct kvm_vcpu *vcpu, bool is_write, u64 id, >> + u64 *reg) >> +{ >> + struct sys_reg_params params; >> + u64 sysreg = (id & KVM_DEV_ARM_VGIC_SYSREG_MASK) | KVM_REG_SIZE_U64; >> + >> + params.regval = *reg; >> + params.is_write = is_write; >> + params.is_aarch32 = false; >> + params.is_32bit = false; >> + >> + if (find_reg_by_id(sysreg, ¶ms, gic_v3_icc_reg_descs, >> + ARRAY_SIZE(gic_v3_icc_reg_descs))) >> + return 0; >> + >> + return -ENXIO; >> +} >> + >> +int vgic_v3_cpu_sysregs_uaccess(struct kvm_vcpu *vcpu, bool is_write, u64 id, >> + u64 *reg) >> +{ >> + struct sys_reg_params params; >> + const struct sys_reg_desc *r; >> + u64 sysreg = (id & KVM_DEV_ARM_VGIC_SYSREG_MASK) | KVM_REG_SIZE_U64; >> + >> + if (is_write) >> + params.regval = *reg; >> + params.is_write = is_write; >> + params.is_aarch32 = false; >> + params.is_32bit = false; >> + >> + r = find_reg_by_id(sysreg, ¶ms, gic_v3_icc_reg_descs, >> + ARRAY_SIZE(gic_v3_icc_reg_descs)); >> + if (!r) >> + return -ENXIO; >> + >> + if (!r->access(vcpu, ¶ms, r)) >> + return -EINVAL; > > According to the API, EINVAL meansinvalid mpidr. Should we expand on > how it can be used or allocate a new error code? How abt EACCES error code? > >> + >> + if (!is_write) >> + *reg = params.regval; >> + >> + return 0; >> +} >> diff --git a/virt/kvm/arm/vgic/vgic-v3.c b/virt/kvm/arm/vgic/vgic-v3.c >> index 967c295..1139971 100644 >> --- a/virt/kvm/arm/vgic/vgic-v3.c >> +++ b/virt/kvm/arm/vgic/vgic-v3.c >> @@ -228,6 +228,13 @@ void vgic_v3_enable(struct kvm_vcpu *vcpu) >> vgic_v3->vgic_sre = 0; >> } >> >> + vcpu->arch.vgic_cpu.num_id_bits = (kvm_vgic_global_state.ich_vtr_el2 & >> + ICH_VTR_ID_BITS_MASK) >> >> + ICH_VTR_ID_BITS_SHIFT; >> + vcpu->arch.vgic_cpu.num_pri_bits = ((kvm_vgic_global_state.ich_vtr_el2 & >> + ICH_VTR_PRI_BITS_MASK) >> >> + ICH_VTR_PRI_BITS_SHIFT) + 1; >> + >> /* Get the show on the road... */ >> vgic_v3->vgic_hcr = ICH_HCR_EN; >> } >> @@ -328,6 +335,7 @@ int vgic_v3_probe(const struct gic_kvm_info *info) >> */ >> kvm_vgic_global_state.nr_lr = (ich_vtr_el2 & 0xf) + 1; >> kvm_vgic_global_state.can_emulate_gicv2 = false; >> + kvm_vgic_global_state.ich_vtr_el2 = ich_vtr_el2; >> >> if (!info->vcpu.start) { >> kvm_info("GICv3: no GICV resource entry\n"); >> diff --git a/virt/kvm/arm/vgic/vgic.h b/virt/kvm/arm/vgic/vgic.h >> index c461f6b..0e632d0 100644 >> --- a/virt/kvm/arm/vgic/vgic.h >> +++ b/virt/kvm/arm/vgic/vgic.h >> @@ -126,6 +126,10 @@ int vgic_v3_dist_uaccess(struct kvm_vcpu *vcpu, bool is_write, >> int offset, u32 *val); >> int vgic_v3_redist_uaccess(struct kvm_vcpu *vcpu, bool is_write, >> int offset, u32 *val); >> +int vgic_v3_cpu_sysregs_uaccess(struct kvm_vcpu *vcpu, bool is_write, >> + u64 id, u64 *val); >> +int vgic_v3_has_cpu_sysregs_attr(struct kvm_vcpu *vcpu, bool is_write, u64 id, >> + u64 *reg); >> #else >> static inline int vgic_register_its_iodevs(struct kvm *kvm) >> { >> -- > > > Thanks, > -Christoffer _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
On Thu, Nov 17, 2016 at 09:25:59PM +0530, Vijay Kilari wrote: > On Thu, Nov 17, 2016 at 12:22 AM, Christoffer Dall > <christoffer.dall@linaro.org> wrote: > > On Fri, Nov 04, 2016 at 04:43:32PM +0530, vijay.kilari@gmail.com wrote: > >> From: Vijaya Kumar K <Vijaya.Kumar@cavium.com> > >> > >> VGICv3 CPU interface registers are accessed using > >> KVM_DEV_ARM_VGIC_CPU_SYSREGS ioctl. These registers are accessed > >> as 64-bit. The cpu MPIDR value is passed along with register id. > >> is used to identify the cpu for registers access. > >> > >> The version of VGIC v3 specification is define here > >> http://lists.infradead.org/pipermail/linux-arm-kernel/2016-July/445611.html > >> > >> Signed-off-by: Pavel Fedin <p.fedin@samsung.com> > >> Signed-off-by: Vijaya Kumar K <Vijaya.Kumar@cavium.com> > >> --- > >> arch/arm64/include/uapi/asm/kvm.h | 3 + > >> arch/arm64/kvm/Makefile | 1 + > >> include/kvm/arm_vgic.h | 9 + > >> virt/kvm/arm/vgic/vgic-kvm-device.c | 27 +++ > >> virt/kvm/arm/vgic/vgic-mmio-v3.c | 19 +++ > >> virt/kvm/arm/vgic/vgic-sys-reg-v3.c | 324 ++++++++++++++++++++++++++++++++++++ > >> virt/kvm/arm/vgic/vgic-v3.c | 8 + > >> virt/kvm/arm/vgic/vgic.h | 4 + > >> 8 files changed, 395 insertions(+) > >> > >> diff --git a/arch/arm64/include/uapi/asm/kvm.h b/arch/arm64/include/uapi/asm/kvm.h > >> index 56dc08d..91c7137 100644 > >> --- a/arch/arm64/include/uapi/asm/kvm.h > >> +++ b/arch/arm64/include/uapi/asm/kvm.h > >> @@ -206,9 +206,12 @@ struct kvm_arch_memory_slot { > >> (0xffffffffULL << KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT) > >> #define KVM_DEV_ARM_VGIC_OFFSET_SHIFT 0 > >> #define KVM_DEV_ARM_VGIC_OFFSET_MASK (0xffffffffULL << KVM_DEV_ARM_VGIC_OFFSET_SHIFT) > >> +#define KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK (0xffff) > >> #define KVM_DEV_ARM_VGIC_GRP_NR_IRQS 3 > >> #define KVM_DEV_ARM_VGIC_GRP_CTRL 4 > >> #define KVM_DEV_ARM_VGIC_GRP_REDIST_REGS 5 > >> +#define KVM_DEV_ARM_VGIC_CPU_SYSREGS 6 > >> + > >> #define KVM_DEV_ARM_VGIC_CTRL_INIT 0 > >> > >> /* Device Control API on vcpu fd */ > >> diff --git a/arch/arm64/kvm/Makefile b/arch/arm64/kvm/Makefile > >> index d50a82a..1a14e29 100644 > >> --- a/arch/arm64/kvm/Makefile > >> +++ b/arch/arm64/kvm/Makefile > >> @@ -32,5 +32,6 @@ kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-mmio-v3.o > >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-kvm-device.o > >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-its.o > >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/irqchip.o > >> +kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-sys-reg-v3.o > > > > Thi is making me wonder: Are we properly handling GICv3 save/restore > > for AArch32 now that we have GICv3 support for AArch32? By properly I > > mean that either it is clearly only supported on AArch64 systems or it's > > supported on both AArch64 and AArch32, but it shouldn't break randomly > > on AArch32. > > It supports both AArch64 and AArch64 in handling of system registers > save/restore. > All system registers that we save/restore are 32-bit for both aarch64 > and aarch32. > Though opcode op0 should be zero for aarch32, the remaining Op and CRn codes > are same. However the codes sent by qemu is matched and register > are handled properly irrespective of AArch32 or AArch64. > > I don't have platform which support AArch32 guests to verify. Actually this is not about the guest, it's about an ARMv8 AArch32 host that has a GICv3. I just tried to do a v7 compile with your patches, and it results in an epic failure, so there's something for you to look at. > > > >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/arch_timer.o > >> kvm-$(CONFIG_KVM_ARM_PMU) += $(KVM)/arm/pmu.o > >> diff --git a/include/kvm/arm_vgic.h b/include/kvm/arm_vgic.h > >> index 002f092..730a18a 100644 > >> --- a/include/kvm/arm_vgic.h > >> +++ b/include/kvm/arm_vgic.h > >> @@ -71,6 +71,9 @@ struct vgic_global { > >> > >> /* GIC system register CPU interface */ > >> struct static_key_false gicv3_cpuif; > >> + > >> + /* Cache ICH_VTR_EL2 reg value */ > >> + u32 ich_vtr_el2; > >> }; > >> > >> extern struct vgic_global kvm_vgic_global_state; > >> @@ -269,6 +272,12 @@ struct vgic_cpu { > >> u64 pendbaser; > >> > >> bool lpis_enabled; > >> + > >> + /* Cache guest priority bits */ > >> + u32 num_pri_bits; > >> + > >> + /* Cache guest interrupt ID bits */ > >> + u32 num_id_bits; > >> }; > >> > >> extern struct static_key_false vgic_v2_cpuif_trap; > >> diff --git a/virt/kvm/arm/vgic/vgic-kvm-device.c b/virt/kvm/arm/vgic/vgic-kvm-device.c > >> index 6c7d30c..da532d1 100644 > >> --- a/virt/kvm/arm/vgic/vgic-kvm-device.c > >> +++ b/virt/kvm/arm/vgic/vgic-kvm-device.c > >> @@ -504,6 +504,14 @@ static int vgic_v3_attr_regs_access(struct kvm_device *dev, > >> if (!is_write) > >> *reg = tmp32; > >> break; > >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { > >> + u64 regid; > >> + > >> + regid = (attr->attr & KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK); > >> + ret = vgic_v3_cpu_sysregs_uaccess(vcpu, is_write, > >> + regid, reg); > >> + break; > >> + } > >> default: > >> ret = -EINVAL; > >> break; > >> @@ -537,6 +545,15 @@ static int vgic_v3_set_attr(struct kvm_device *dev, > >> reg = tmp32; > >> return vgic_v3_attr_regs_access(dev, attr, ®, true); > >> } > >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { > >> + u64 __user *uaddr = (u64 __user *)(long)attr->addr; > >> + u64 reg; > >> + > >> + if (get_user(reg, uaddr)) > >> + return -EFAULT; > >> + > >> + return vgic_v3_attr_regs_access(dev, attr, ®, true); > >> + } > >> } > >> return -ENXIO; > >> } > >> @@ -563,6 +580,15 @@ static int vgic_v3_get_attr(struct kvm_device *dev, > >> tmp32 = reg; > >> return put_user(tmp32, uaddr); > >> } > >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { > >> + u64 __user *uaddr = (u64 __user *)(long)attr->addr; > >> + u64 reg; > >> + > >> + ret = vgic_v3_attr_regs_access(dev, attr, ®, false); > >> + if (ret) > >> + return ret; > >> + return put_user(reg, uaddr); > >> + } > >> } > >> > >> return -ENXIO; > >> @@ -581,6 +607,7 @@ static int vgic_v3_has_attr(struct kvm_device *dev, > >> break; > >> case KVM_DEV_ARM_VGIC_GRP_DIST_REGS: > >> case KVM_DEV_ARM_VGIC_GRP_REDIST_REGS: > >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: > >> return vgic_v3_has_attr_regs(dev, attr); > >> case KVM_DEV_ARM_VGIC_GRP_NR_IRQS: > >> return 0; > >> diff --git a/virt/kvm/arm/vgic/vgic-mmio-v3.c b/virt/kvm/arm/vgic/vgic-mmio-v3.c > >> index b35fb83..519b919 100644 > >> --- a/virt/kvm/arm/vgic/vgic-mmio-v3.c > >> +++ b/virt/kvm/arm/vgic/vgic-mmio-v3.c > >> @@ -23,6 +23,7 @@ > >> > >> #include "vgic.h" > >> #include "vgic-mmio.h" > >> +#include "sys_regs.h" > >> > >> /* extract @num bytes at @offset bytes offset in data */ > >> unsigned long extract_bytes(u64 data, unsigned int offset, > >> @@ -639,6 +640,24 @@ int vgic_v3_has_attr_regs(struct kvm_device *dev, struct kvm_device_attr *attr) > >> nr_regions = ARRAY_SIZE(vgic_v3_rdbase_registers); > >> break; > >> } > >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { > >> + u64 reg, id; > >> + unsigned long vgic_mpidr, mpidr_reg; > >> + struct kvm_vcpu *vcpu; > >> + > >> + vgic_mpidr = (attr->attr & KVM_DEV_ARM_VGIC_V3_MPIDR_MASK) >> > >> + KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT; > >> + > >> + /* Convert plain mpidr value to MPIDR reg format */ > >> + mpidr_reg = VGIC_TO_MPIDR(vgic_mpidr); > >> + > >> + vcpu = kvm_mpidr_to_vcpu(dev->kvm, mpidr_reg); > >> + if (!vcpu) > >> + return -EINVAL; > >> + > >> + id = (attr->attr & KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK); > >> + return vgic_v3_has_cpu_sysregs_attr(vcpu, 0, id, ®); > >> + } > >> default: > >> return -ENXIO; > >> } > >> diff --git a/virt/kvm/arm/vgic/vgic-sys-reg-v3.c b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c > >> new file mode 100644 > >> index 0000000..69d8597 > >> --- /dev/null > >> +++ b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c > > > > Shouldn't we have a GPL header here? > > > >> @@ -0,0 +1,324 @@ > >> +#include <linux/irqchip/arm-gic-v3.h> > >> +#include <linux/kvm.h> > >> +#include <linux/kvm_host.h> > >> +#include <kvm/iodev.h> > >> +#include <kvm/arm_vgic.h> > >> +#include <asm/kvm_emulate.h> > >> +#include <asm/kvm_arm.h> > >> +#include <asm/kvm_mmu.h> > >> + > >> +#include "vgic.h" > >> +#include "vgic-mmio.h" > >> +#include "sys_regs.h" > >> + > >> +static bool access_gic_ctlr(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > >> + const struct sys_reg_desc *r) > >> +{ > >> + struct vgic_cpu *vgic_v3_cpu = &vcpu->arch.vgic_cpu; > >> + struct vgic_vmcr vmcr; > >> + u64 val; > >> + u32 num_pri_bits, num_id_bits; > >> + > >> + vgic_get_vmcr(vcpu, &vmcr); > >> + if (p->is_write) { > >> + val = p->regval; > >> + > >> + /* > >> + * Does not allow update of ICC_CTLR_EL1 if HW does not support > >> + * guest programmed ID and PRI bits > >> + */ > > > > I would suggest rewording this comment: > > Disallow restoring VM state not supported by this hardware. > > > >> + num_pri_bits = ((val & ICC_CTLR_EL1_PRI_BITS_MASK) >> > >> + ICC_CTLR_EL1_PRI_BITS_SHIFT) + 1; > >> + if (num_pri_bits > vgic_v3_cpu->num_pri_bits) > >> + return false; > >> + > >> + vgic_v3_cpu->num_pri_bits = num_pri_bits; > > > > hmmm, this looks weird to me, because vgic_v3_cpu->num_pri_bits I don't > > understand which effect this is intended to have? > > > > Sure, it may limit what you do with other registers later, but since > > there's no ordering requirement that the ctlr be restored first, I'm not > > sure it makes sense. > > > > Also, since this field is RO in the ICH_VTR, we'll have a strange > > situation during runtime after a GICv3 restore where the > > vgic_v3_cpu->num_pri_its differs from the hardware's ICH_VTR_EL2 field, > > which is never the case if you didn't do a save/restore. > > Yes, but in any case, vgic_v3_cpu->num_pri_bits will be always less > than HW supported > value. > So answer my question: What is the intended effect of writing this value? Is it just so that if you migrate this platform back again, then you're checking compatibility with what the guest would potentially do, or should you maintain the num_pri_bits limitation during runtime somehow? > > > > Finally, should we somehow ensure that this field is set to the same > > value across VCPUs or is that not an architectural requirement? > > > Yes it is nice to have it same across VCPUs. But should be ok as > we are ensuring value is not greater than HW supported value. Does the architecture allow having a different number of priority bits supported across CPUs? If not, you shouldn't allow a VM programming things that way either. > There is no single point of place where we can make such a check > > >> + > >> + num_id_bits = (val & ICC_CTLR_EL1_ID_BITS_MASK) >> > >> + ICC_CTLR_EL1_ID_BITS_SHIFT; > >> + if (num_id_bits > vgic_v3_cpu->num_id_bits) > >> + return false; > >> + > >> + vgic_v3_cpu->num_id_bits = num_id_bits; > > > > same questions > > > >> + > >> + vmcr.ctlr &= ~(ICH_VMCR_CBPR_MASK | ICH_VMCR_EOIM_MASK); > >> + vmcr.ctlr |= ((val & ICC_CTLR_EL1_CBPR_MASK) >> > >> + ICC_CTLR_EL1_CBPR_SHIFT) << ICH_VMCR_CBPR_SHIFT; > >> + vmcr.ctlr |= ((val & ICC_CTLR_EL1_EOImode_MASK) >> > >> + ICC_CTLR_EL1_EOImode_SHIFT) << > >> + ICH_VMCR_EOIM_SHIFT; > > > > I'm really confused here. Is the vmcr.ctlr field in the ICC_CTLR_EL1 > > format or in the VMCR format? I would assume the former, since > > otherwise I don't get the point with this indirection, and for GICv2 > > vmcr.ctlr captures the GICC_CTLR value and git_set_vmcr transforms this > > into VMCR values. > > > > Having a line that says "ctlr &= ~ICH_VMCR" should make some alarm bells > > ring. > > I will check and fix it. > > > >> + vgic_set_vmcr(vcpu, &vmcr); > > > > Should we check compatibility between the source and destination for the > > SEIS and A3V support here? > > Can be checked. But I feel A3V check makes more sense than checking for > SEIS. > Please argue the *why* for whatever you end up doing with respect to both bits in the commit message of your next patch revision. > > > >> + } else { > >> + val = 0; > >> + val |= (vgic_v3_cpu->num_pri_bits - 1) << > >> + ICC_CTLR_EL1_PRI_BITS_SHIFT; > >> + val |= vgic_v3_cpu->num_id_bits << > >> + ICC_CTLR_EL1_ID_BITS_SHIFT; > >> + val |= ((kvm_vgic_global_state.ich_vtr_el2 & > >> + ICH_VTR_SEIS_MASK) >> ICH_VTR_SEIS_SHIFT) << > >> + ICC_CTLR_EL1_SEIS_SHIFT; > >> + val |= ((kvm_vgic_global_state.ich_vtr_el2 & > >> + ICH_VTR_A3V_MASK) >> ICH_VTR_A3V_SHIFT) << > >> + ICC_CTLR_EL1_A3V_SHIFT; > >> + val |= ((vmcr.ctlr & ICH_VMCR_CBPR_MASK) >> > >> + ICH_VMCR_CBPR_SHIFT) << ICC_CTLR_EL1_CBPR_SHIFT; > >> + val |= ((vmcr.ctlr & ICH_VMCR_EOIM_MASK) >> > >> + ICH_VMCR_EOIM_SHIFT) << ICC_CTLR_EL1_EOImode_SHIFT; > > > > again, these last two look weird to me. > > > >> + > >> + p->regval = val; > >> + } > >> + > >> + return true; > >> +} > >> + > >> +static bool access_gic_pmr(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > >> + const struct sys_reg_desc *r) > >> +{ > >> + struct vgic_vmcr vmcr; > >> + > >> + vgic_get_vmcr(vcpu, &vmcr); > >> + if (p->is_write) { > >> + vmcr.pmr = (p->regval & ICC_PMR_EL1_MASK) >> ICC_PMR_EL1_SHIFT; > >> + vgic_set_vmcr(vcpu, &vmcr); > >> + } else { > >> + p->regval = (vmcr.pmr << ICC_PMR_EL1_SHIFT) & ICC_PMR_EL1_MASK; > >> + } > >> + > >> + return true; > >> +} > >> + > >> +static bool access_gic_bpr0(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > >> + const struct sys_reg_desc *r) > >> +{ > >> + struct vgic_vmcr vmcr; > >> + > >> + vgic_get_vmcr(vcpu, &vmcr); > >> + if (p->is_write) { > >> + vmcr.bpr = (p->regval & ICC_BPR0_EL1_MASK) >> > >> + ICC_BPR0_EL1_SHIFT; > >> + vgic_set_vmcr(vcpu, &vmcr); > >> + } else { > >> + p->regval = (vmcr.bpr << ICC_BPR0_EL1_SHIFT) & > >> + ICC_BPR0_EL1_MASK; > >> + } > >> + > >> + return true; > >> +} > >> + > >> +static bool access_gic_bpr1(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > >> + const struct sys_reg_desc *r) > >> +{ > >> + struct vgic_vmcr vmcr; > >> + > >> + if (!p->is_write) > >> + p->regval = 0; > >> + > >> + vgic_get_vmcr(vcpu, &vmcr); > >> + if (!((vmcr.ctlr & ICH_VMCR_CBPR_MASK) >> ICH_VMCR_CBPR_SHIFT)) { > >> + if (p->is_write) { > >> + vmcr.abpr = (p->regval & ICC_BPR1_EL1_MASK) >> > >> + ICC_BPR1_EL1_SHIFT; > >> + vgic_set_vmcr(vcpu, &vmcr); > >> + } else { > >> + p->regval = (vmcr.abpr << ICC_BPR1_EL1_SHIFT) & > >> + ICC_BPR1_EL1_MASK; > >> + } > >> + } else { > >> + if (!p->is_write) > >> + p->regval = min((vmcr.bpr + 1), 7U); > >> + } > >> + > >> + return true; > >> +} > >> + > >> +static bool access_gic_grpen0(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > >> + const struct sys_reg_desc *r) > >> +{ > >> + struct vgic_vmcr vmcr; > >> + > >> + vgic_get_vmcr(vcpu, &vmcr); > >> + if (p->is_write) { > >> + vmcr.grpen0 = (p->regval & ICC_IGRPEN0_EL1_MASK) >> > >> + ICC_IGRPEN0_EL1_SHIFT; > >> + vgic_set_vmcr(vcpu, &vmcr); > >> + } else { > >> + p->regval = (vmcr.grpen0 << ICC_IGRPEN0_EL1_SHIFT) & > >> + ICC_IGRPEN0_EL1_MASK; > >> + } > >> + > >> + return true; > >> +} > >> + > >> +static bool access_gic_grpen1(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > >> + const struct sys_reg_desc *r) > >> +{ > >> + struct vgic_vmcr vmcr; > >> + > >> + vgic_get_vmcr(vcpu, &vmcr); > >> + if (p->is_write) { > >> + vmcr.grpen1 = (p->regval & ICC_IGRPEN1_EL1_MASK) >> > >> + ICC_IGRPEN1_EL1_SHIFT; > >> + vgic_set_vmcr(vcpu, &vmcr); > >> + } else { > >> + p->regval = (vmcr.grpen1 << ICC_IGRPEN1_EL1_SHIFT) & > >> + ICC_IGRPEN1_EL1_MASK; > >> + } > >> + > >> + return true; > >> +} > >> + > >> +static void vgic_v3_access_apr_reg(struct kvm_vcpu *vcpu, > >> + struct sys_reg_params *p, u8 apr, u8 idx) > >> +{ > >> + struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3; > >> + uint32_t *ap_reg; > >> + > >> + if (apr) > >> + ap_reg = &vgicv3->vgic_ap1r[idx]; > >> + else > >> + ap_reg = &vgicv3->vgic_ap0r[idx]; > >> + > >> + if (p->is_write) > >> + *ap_reg = p->regval; > >> + else > >> + p->regval = *ap_reg; > >> +} > >> + > >> +static void access_gic_aprn(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > >> + const struct sys_reg_desc *r, u8 apr) > >> +{ > >> + struct vgic_cpu *vgic_v3_cpu = &vcpu->arch.vgic_cpu; > >> + u8 idx = r->Op2 & 3; > >> + > >> + switch (vgic_v3_cpu->num_pri_bits) { > >> + case 7: > >> + if (idx > 3) > >> + goto err; > > > > idx cannot be higher than three given the mask above, right? > > > >> + vgic_v3_access_apr_reg(vcpu, p, apr, idx); > >> + break; > >> + case 6: > >> + if (idx > 1) > >> + goto err; > >> + vgic_v3_access_apr_reg(vcpu, p, apr, idx); > >> + break; > >> + default: > >> + if (idx > 0) > >> + goto err; > >> + vgic_v3_access_apr_reg(vcpu, p, apr, idx); > >> + } > > > > what's the rationale behind ignoring the case where userspace is using > > unsupported priorities? Is it that this will be checked during > > save/restore of the ctlr? > > > > This sort of thing just looks like the case that's impossible to debug, > > because userspace could be scratching its head trying to understand why > > the value it wrote isn't recorded anywhere... > > > > If there's a good rationale for doing it this way, then could we have a > > comment to that effect? > > Accessing umplemented priority registers raised UNDEF exception. > So userspace accesing should be ignored instead of recording unsupported > values. > That's not what I asked. I asked why it's silently ignored as opposed to raising an error visible to user space? > > > >> + > >> + return; > >> +err: > >> + if (!p->is_write) > >> + p->regval = 0; > >> +} > >> + > >> +static bool access_gic_ap0r(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > >> + const struct sys_reg_desc *r) > >> +{ > >> + access_gic_aprn(vcpu, p, r, 0); > >> + > >> + return true; > >> +} > >> + > >> +static bool access_gic_ap1r(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > >> + const struct sys_reg_desc *r) > >> +{ > >> + access_gic_aprn(vcpu, p, r, 1); > >> + > >> + return true; > >> +} > >> + > >> +static bool access_gic_sre(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > >> + const struct sys_reg_desc *r) > >> +{ > >> + struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3; > >> + > >> + /* Validate SRE bit */ > >> + if (p->is_write) { > >> + if (!(p->regval & ICC_SRE_EL1_SRE)) > >> + return false; > >> + } else { > >> + p->regval = vgicv3->vgic_sre; > >> + } > >> + > >> + return true; > >> +} > >> + > >> +static const struct sys_reg_desc gic_v3_icc_reg_descs[] = { > >> + /* ICC_PMR_EL1 */ > >> + { Op0(3), Op1(0), CRn(4), CRm(6), Op2(0), access_gic_pmr }, > >> + /* ICC_BPR0_EL1 */ > >> + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(3), access_gic_bpr0 }, > >> + /* ICC_AP0R0_EL1 */ > >> + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(4), access_gic_ap0r }, > >> + /* ICC_AP0R1_EL1 */ > >> + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(5), access_gic_ap0r }, > >> + /* ICC_AP0R2_EL1 */ > >> + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(6), access_gic_ap0r }, > >> + /* ICC_AP0R3_EL1 */ > >> + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(7), access_gic_ap0r }, > >> + /* ICC_AP1R0_EL1 */ > >> + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(0), access_gic_ap1r }, > >> + /* ICC_AP1R1_EL1 */ > >> + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(1), access_gic_ap1r }, > >> + /* ICC_AP1R2_EL1 */ > >> + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(2), access_gic_ap1r }, > >> + /* ICC_AP1R3_EL1 */ > >> + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(3), access_gic_ap1r }, > >> + /* ICC_BPR1_EL1 */ > >> + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(3), access_gic_bpr1 }, > >> + /* ICC_CTLR_EL1 */ > >> + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(4), access_gic_ctlr }, > >> + /* ICC_SRE_EL1 */ > >> + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(5), access_gic_sre }, > >> + /* ICC_IGRPEN0_EL1 */ > >> + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(6), access_gic_grpen0 }, > >> + /* ICC_GRPEN1_EL1 */ > >> + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(7), access_gic_grpen1 }, > >> +}; > >> + > >> +int vgic_v3_has_cpu_sysregs_attr(struct kvm_vcpu *vcpu, bool is_write, u64 id, > >> + u64 *reg) > >> +{ > >> + struct sys_reg_params params; > >> + u64 sysreg = (id & KVM_DEV_ARM_VGIC_SYSREG_MASK) | KVM_REG_SIZE_U64; > >> + > >> + params.regval = *reg; > >> + params.is_write = is_write; > >> + params.is_aarch32 = false; > >> + params.is_32bit = false; > >> + > >> + if (find_reg_by_id(sysreg, ¶ms, gic_v3_icc_reg_descs, > >> + ARRAY_SIZE(gic_v3_icc_reg_descs))) > >> + return 0; > >> + > >> + return -ENXIO; > >> +} > >> + > >> +int vgic_v3_cpu_sysregs_uaccess(struct kvm_vcpu *vcpu, bool is_write, u64 id, > >> + u64 *reg) > >> +{ > >> + struct sys_reg_params params; > >> + const struct sys_reg_desc *r; > >> + u64 sysreg = (id & KVM_DEV_ARM_VGIC_SYSREG_MASK) | KVM_REG_SIZE_U64; > >> + > >> + if (is_write) > >> + params.regval = *reg; > >> + params.is_write = is_write; > >> + params.is_aarch32 = false; > >> + params.is_32bit = false; > >> + > >> + r = find_reg_by_id(sysreg, ¶ms, gic_v3_icc_reg_descs, > >> + ARRAY_SIZE(gic_v3_icc_reg_descs)); > >> + if (!r) > >> + return -ENXIO; > >> + > >> + if (!r->access(vcpu, ¶ms, r)) > >> + return -EINVAL; > > > > According to the API, EINVAL meansinvalid mpidr. Should we expand on > > how it can be used or allocate a new error code? > How abt EACCES error code? > That would mean permission denied, which is a bit weird. > > > >> + > >> + if (!is_write) > >> + *reg = params.regval; > >> + > >> + return 0; > >> +} > >> diff --git a/virt/kvm/arm/vgic/vgic-v3.c b/virt/kvm/arm/vgic/vgic-v3.c > >> index 967c295..1139971 100644 > >> --- a/virt/kvm/arm/vgic/vgic-v3.c > >> +++ b/virt/kvm/arm/vgic/vgic-v3.c > >> @@ -228,6 +228,13 @@ void vgic_v3_enable(struct kvm_vcpu *vcpu) > >> vgic_v3->vgic_sre = 0; > >> } > >> > >> + vcpu->arch.vgic_cpu.num_id_bits = (kvm_vgic_global_state.ich_vtr_el2 & > >> + ICH_VTR_ID_BITS_MASK) >> > >> + ICH_VTR_ID_BITS_SHIFT; > >> + vcpu->arch.vgic_cpu.num_pri_bits = ((kvm_vgic_global_state.ich_vtr_el2 & > >> + ICH_VTR_PRI_BITS_MASK) >> > >> + ICH_VTR_PRI_BITS_SHIFT) + 1; > >> + > >> /* Get the show on the road... */ > >> vgic_v3->vgic_hcr = ICH_HCR_EN; > >> } > >> @@ -328,6 +335,7 @@ int vgic_v3_probe(const struct gic_kvm_info *info) > >> */ > >> kvm_vgic_global_state.nr_lr = (ich_vtr_el2 & 0xf) + 1; > >> kvm_vgic_global_state.can_emulate_gicv2 = false; > >> + kvm_vgic_global_state.ich_vtr_el2 = ich_vtr_el2; > >> > >> if (!info->vcpu.start) { > >> kvm_info("GICv3: no GICV resource entry\n"); > >> diff --git a/virt/kvm/arm/vgic/vgic.h b/virt/kvm/arm/vgic/vgic.h > >> index c461f6b..0e632d0 100644 > >> --- a/virt/kvm/arm/vgic/vgic.h > >> +++ b/virt/kvm/arm/vgic/vgic.h > >> @@ -126,6 +126,10 @@ int vgic_v3_dist_uaccess(struct kvm_vcpu *vcpu, bool is_write, > >> int offset, u32 *val); > >> int vgic_v3_redist_uaccess(struct kvm_vcpu *vcpu, bool is_write, > >> int offset, u32 *val); > >> +int vgic_v3_cpu_sysregs_uaccess(struct kvm_vcpu *vcpu, bool is_write, > >> + u64 id, u64 *val); > >> +int vgic_v3_has_cpu_sysregs_attr(struct kvm_vcpu *vcpu, bool is_write, u64 id, > >> + u64 *reg); > >> #else > >> static inline int vgic_register_its_iodevs(struct kvm *kvm) > >> { > >> -- Thanks, -Christoffer _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
On Thu, Nov 17, 2016 at 9:39 PM, Christoffer Dall <christoffer.dall@linaro.org> wrote: > On Thu, Nov 17, 2016 at 09:25:59PM +0530, Vijay Kilari wrote: >> On Thu, Nov 17, 2016 at 12:22 AM, Christoffer Dall >> <christoffer.dall@linaro.org> wrote: >> > On Fri, Nov 04, 2016 at 04:43:32PM +0530, vijay.kilari@gmail.com wrote: >> >> From: Vijaya Kumar K <Vijaya.Kumar@cavium.com> >> >> >> >> VGICv3 CPU interface registers are accessed using >> >> KVM_DEV_ARM_VGIC_CPU_SYSREGS ioctl. These registers are accessed >> >> as 64-bit. The cpu MPIDR value is passed along with register id. >> >> is used to identify the cpu for registers access. >> >> >> >> The version of VGIC v3 specification is define here >> >> http://lists.infradead.org/pipermail/linux-arm-kernel/2016-July/445611.html >> >> >> >> Signed-off-by: Pavel Fedin <p.fedin@samsung.com> >> >> Signed-off-by: Vijaya Kumar K <Vijaya.Kumar@cavium.com> >> >> --- >> >> arch/arm64/include/uapi/asm/kvm.h | 3 + >> >> arch/arm64/kvm/Makefile | 1 + >> >> include/kvm/arm_vgic.h | 9 + >> >> virt/kvm/arm/vgic/vgic-kvm-device.c | 27 +++ >> >> virt/kvm/arm/vgic/vgic-mmio-v3.c | 19 +++ >> >> virt/kvm/arm/vgic/vgic-sys-reg-v3.c | 324 ++++++++++++++++++++++++++++++++++++ >> >> virt/kvm/arm/vgic/vgic-v3.c | 8 + >> >> virt/kvm/arm/vgic/vgic.h | 4 + >> >> 8 files changed, 395 insertions(+) >> >> >> >> diff --git a/arch/arm64/include/uapi/asm/kvm.h b/arch/arm64/include/uapi/asm/kvm.h >> >> index 56dc08d..91c7137 100644 >> >> --- a/arch/arm64/include/uapi/asm/kvm.h >> >> +++ b/arch/arm64/include/uapi/asm/kvm.h >> >> @@ -206,9 +206,12 @@ struct kvm_arch_memory_slot { >> >> (0xffffffffULL << KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT) >> >> #define KVM_DEV_ARM_VGIC_OFFSET_SHIFT 0 >> >> #define KVM_DEV_ARM_VGIC_OFFSET_MASK (0xffffffffULL << KVM_DEV_ARM_VGIC_OFFSET_SHIFT) >> >> +#define KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK (0xffff) >> >> #define KVM_DEV_ARM_VGIC_GRP_NR_IRQS 3 >> >> #define KVM_DEV_ARM_VGIC_GRP_CTRL 4 >> >> #define KVM_DEV_ARM_VGIC_GRP_REDIST_REGS 5 >> >> +#define KVM_DEV_ARM_VGIC_CPU_SYSREGS 6 >> >> + >> >> #define KVM_DEV_ARM_VGIC_CTRL_INIT 0 >> >> >> >> /* Device Control API on vcpu fd */ >> >> diff --git a/arch/arm64/kvm/Makefile b/arch/arm64/kvm/Makefile >> >> index d50a82a..1a14e29 100644 >> >> --- a/arch/arm64/kvm/Makefile >> >> +++ b/arch/arm64/kvm/Makefile >> >> @@ -32,5 +32,6 @@ kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-mmio-v3.o >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-kvm-device.o >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-its.o >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/irqchip.o >> >> +kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-sys-reg-v3.o >> > >> > Thi is making me wonder: Are we properly handling GICv3 save/restore >> > for AArch32 now that we have GICv3 support for AArch32? By properly I >> > mean that either it is clearly only supported on AArch64 systems or it's >> > supported on both AArch64 and AArch32, but it shouldn't break randomly >> > on AArch32. >> >> It supports both AArch64 and AArch64 in handling of system registers >> save/restore. >> All system registers that we save/restore are 32-bit for both aarch64 >> and aarch32. >> Though opcode op0 should be zero for aarch32, the remaining Op and CRn codes >> are same. However the codes sent by qemu is matched and register >> are handled properly irrespective of AArch32 or AArch64. >> >> I don't have platform which support AArch32 guests to verify. > > Actually this is not about the guest, it's about an ARMv8 AArch32 host > that has a GICv3. > > I just tried to do a v7 compile with your patches, and it results in an > epic failure, so there's something for you to look at. > >> > >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/arch_timer.o >> >> kvm-$(CONFIG_KVM_ARM_PMU) += $(KVM)/arm/pmu.o >> >> diff --git a/include/kvm/arm_vgic.h b/include/kvm/arm_vgic.h >> >> index 002f092..730a18a 100644 >> >> --- a/include/kvm/arm_vgic.h >> >> +++ b/include/kvm/arm_vgic.h >> >> @@ -71,6 +71,9 @@ struct vgic_global { >> >> >> >> /* GIC system register CPU interface */ >> >> struct static_key_false gicv3_cpuif; >> >> + >> >> + /* Cache ICH_VTR_EL2 reg value */ >> >> + u32 ich_vtr_el2; >> >> }; >> >> >> >> extern struct vgic_global kvm_vgic_global_state; >> >> @@ -269,6 +272,12 @@ struct vgic_cpu { >> >> u64 pendbaser; >> >> >> >> bool lpis_enabled; >> >> + >> >> + /* Cache guest priority bits */ >> >> + u32 num_pri_bits; >> >> + >> >> + /* Cache guest interrupt ID bits */ >> >> + u32 num_id_bits; >> >> }; >> >> >> >> extern struct static_key_false vgic_v2_cpuif_trap; >> >> diff --git a/virt/kvm/arm/vgic/vgic-kvm-device.c b/virt/kvm/arm/vgic/vgic-kvm-device.c >> >> index 6c7d30c..da532d1 100644 >> >> --- a/virt/kvm/arm/vgic/vgic-kvm-device.c >> >> +++ b/virt/kvm/arm/vgic/vgic-kvm-device.c >> >> @@ -504,6 +504,14 @@ static int vgic_v3_attr_regs_access(struct kvm_device *dev, >> >> if (!is_write) >> >> *reg = tmp32; >> >> break; >> >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { >> >> + u64 regid; >> >> + >> >> + regid = (attr->attr & KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK); >> >> + ret = vgic_v3_cpu_sysregs_uaccess(vcpu, is_write, >> >> + regid, reg); >> >> + break; >> >> + } >> >> default: >> >> ret = -EINVAL; >> >> break; >> >> @@ -537,6 +545,15 @@ static int vgic_v3_set_attr(struct kvm_device *dev, >> >> reg = tmp32; >> >> return vgic_v3_attr_regs_access(dev, attr, ®, true); >> >> } >> >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { >> >> + u64 __user *uaddr = (u64 __user *)(long)attr->addr; >> >> + u64 reg; >> >> + >> >> + if (get_user(reg, uaddr)) >> >> + return -EFAULT; >> >> + >> >> + return vgic_v3_attr_regs_access(dev, attr, ®, true); >> >> + } >> >> } >> >> return -ENXIO; >> >> } >> >> @@ -563,6 +580,15 @@ static int vgic_v3_get_attr(struct kvm_device *dev, >> >> tmp32 = reg; >> >> return put_user(tmp32, uaddr); >> >> } >> >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { >> >> + u64 __user *uaddr = (u64 __user *)(long)attr->addr; >> >> + u64 reg; >> >> + >> >> + ret = vgic_v3_attr_regs_access(dev, attr, ®, false); >> >> + if (ret) >> >> + return ret; >> >> + return put_user(reg, uaddr); >> >> + } >> >> } >> >> >> >> return -ENXIO; >> >> @@ -581,6 +607,7 @@ static int vgic_v3_has_attr(struct kvm_device *dev, >> >> break; >> >> case KVM_DEV_ARM_VGIC_GRP_DIST_REGS: >> >> case KVM_DEV_ARM_VGIC_GRP_REDIST_REGS: >> >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: >> >> return vgic_v3_has_attr_regs(dev, attr); >> >> case KVM_DEV_ARM_VGIC_GRP_NR_IRQS: >> >> return 0; >> >> diff --git a/virt/kvm/arm/vgic/vgic-mmio-v3.c b/virt/kvm/arm/vgic/vgic-mmio-v3.c >> >> index b35fb83..519b919 100644 >> >> --- a/virt/kvm/arm/vgic/vgic-mmio-v3.c >> >> +++ b/virt/kvm/arm/vgic/vgic-mmio-v3.c >> >> @@ -23,6 +23,7 @@ >> >> >> >> #include "vgic.h" >> >> #include "vgic-mmio.h" >> >> +#include "sys_regs.h" >> >> >> >> /* extract @num bytes at @offset bytes offset in data */ >> >> unsigned long extract_bytes(u64 data, unsigned int offset, >> >> @@ -639,6 +640,24 @@ int vgic_v3_has_attr_regs(struct kvm_device *dev, struct kvm_device_attr *attr) >> >> nr_regions = ARRAY_SIZE(vgic_v3_rdbase_registers); >> >> break; >> >> } >> >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { >> >> + u64 reg, id; >> >> + unsigned long vgic_mpidr, mpidr_reg; >> >> + struct kvm_vcpu *vcpu; >> >> + >> >> + vgic_mpidr = (attr->attr & KVM_DEV_ARM_VGIC_V3_MPIDR_MASK) >> >> >> + KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT; >> >> + >> >> + /* Convert plain mpidr value to MPIDR reg format */ >> >> + mpidr_reg = VGIC_TO_MPIDR(vgic_mpidr); >> >> + >> >> + vcpu = kvm_mpidr_to_vcpu(dev->kvm, mpidr_reg); >> >> + if (!vcpu) >> >> + return -EINVAL; >> >> + >> >> + id = (attr->attr & KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK); >> >> + return vgic_v3_has_cpu_sysregs_attr(vcpu, 0, id, ®); >> >> + } >> >> default: >> >> return -ENXIO; >> >> } >> >> diff --git a/virt/kvm/arm/vgic/vgic-sys-reg-v3.c b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c >> >> new file mode 100644 >> >> index 0000000..69d8597 >> >> --- /dev/null >> >> +++ b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c >> > >> > Shouldn't we have a GPL header here? >> > >> >> @@ -0,0 +1,324 @@ >> >> +#include <linux/irqchip/arm-gic-v3.h> >> >> +#include <linux/kvm.h> >> >> +#include <linux/kvm_host.h> >> >> +#include <kvm/iodev.h> >> >> +#include <kvm/arm_vgic.h> >> >> +#include <asm/kvm_emulate.h> >> >> +#include <asm/kvm_arm.h> >> >> +#include <asm/kvm_mmu.h> >> >> + >> >> +#include "vgic.h" >> >> +#include "vgic-mmio.h" >> >> +#include "sys_regs.h" >> >> + >> >> +static bool access_gic_ctlr(struct kvm_vcpu *vcpu, struct sys_reg_params *p, >> >> + const struct sys_reg_desc *r) >> >> +{ >> >> + struct vgic_cpu *vgic_v3_cpu = &vcpu->arch.vgic_cpu; >> >> + struct vgic_vmcr vmcr; >> >> + u64 val; >> >> + u32 num_pri_bits, num_id_bits; >> >> + >> >> + vgic_get_vmcr(vcpu, &vmcr); >> >> + if (p->is_write) { >> >> + val = p->regval; >> >> + >> >> + /* >> >> + * Does not allow update of ICC_CTLR_EL1 if HW does not support >> >> + * guest programmed ID and PRI bits >> >> + */ >> > >> > I would suggest rewording this comment: >> > Disallow restoring VM state not supported by this hardware. >> > >> >> + num_pri_bits = ((val & ICC_CTLR_EL1_PRI_BITS_MASK) >> >> >> + ICC_CTLR_EL1_PRI_BITS_SHIFT) + 1; >> >> + if (num_pri_bits > vgic_v3_cpu->num_pri_bits) >> >> + return false; >> >> + >> >> + vgic_v3_cpu->num_pri_bits = num_pri_bits; >> > >> > hmmm, this looks weird to me, because vgic_v3_cpu->num_pri_bits I don't >> > understand which effect this is intended to have? >> > >> > Sure, it may limit what you do with other registers later, but since >> > there's no ordering requirement that the ctlr be restored first, I'm not >> > sure it makes sense. >> > >> > Also, since this field is RO in the ICH_VTR, we'll have a strange >> > situation during runtime after a GICv3 restore where the >> > vgic_v3_cpu->num_pri_its differs from the hardware's ICH_VTR_EL2 field, >> > which is never the case if you didn't do a save/restore. >> >> Yes, but in any case, vgic_v3_cpu->num_pri_bits will be always less >> than HW supported >> value. >> > > So answer my question: What is the intended effect of writing this > value? Is it just so that if you migrate this platform back again, then > you're checking compatibility with what the guest would potentially do, Yes and also to limit the valid aprn registers access as you said above. But that has ordering restriction. Which I think we should follow. > or should you maintain the num_pri_bits limitation during runtime > somehow? Once after checking compatibility, at runtime it is not updated and this value is not used at all in VGIC further > >> > >> > Finally, should we somehow ensure that this field is set to the same >> > value across VCPUs or is that not an architectural requirement? >> > >> Yes it is nice to have it same across VCPUs. But should be ok as >> we are ensuring value is not greater than HW supported value. > > Does the architecture allow having a different number of priority bits > supported across CPUs? If not, you shouldn't allow a VM programming > things that way either. AFAIK, architecturally it is not mentioned any where in the spec that priority bits should be same across CPUs. > >> There is no single point of place where we can make such a check >> >> >> + >> >> + num_id_bits = (val & ICC_CTLR_EL1_ID_BITS_MASK) >> >> >> + ICC_CTLR_EL1_ID_BITS_SHIFT; >> >> + if (num_id_bits > vgic_v3_cpu->num_id_bits) >> >> + return false; >> >> + >> >> + vgic_v3_cpu->num_id_bits = num_id_bits; >> > >> > same questions >> > >> >> + >> >> + vmcr.ctlr &= ~(ICH_VMCR_CBPR_MASK | ICH_VMCR_EOIM_MASK); >> >> + vmcr.ctlr |= ((val & ICC_CTLR_EL1_CBPR_MASK) >> >> >> + ICC_CTLR_EL1_CBPR_SHIFT) << ICH_VMCR_CBPR_SHIFT; >> >> + vmcr.ctlr |= ((val & ICC_CTLR_EL1_EOImode_MASK) >> >> >> + ICC_CTLR_EL1_EOImode_SHIFT) << >> >> + ICH_VMCR_EOIM_SHIFT; >> > >> > I'm really confused here. Is the vmcr.ctlr field in the ICC_CTLR_EL1 >> > format or in the VMCR format? I would assume the former, since >> > otherwise I don't get the point with this indirection, and for GICv2 >> > vmcr.ctlr captures the GICC_CTLR value and git_set_vmcr transforms this >> > into VMCR values. >> > >> > Having a line that says "ctlr &= ~ICH_VMCR" should make some alarm bells >> > ring. >> >> I will check and fix it. >> > >> >> + vgic_set_vmcr(vcpu, &vmcr); >> > >> > Should we check compatibility between the source and destination for the >> > SEIS and A3V support here? >> >> Can be checked. But I feel A3V check makes more sense than checking for >> SEIS. >> > > Please argue the *why* for whatever you end up doing with respect to > both bits in the commit message of your next patch revision. > >> > >> >> + } else { >> >> + val = 0; >> >> + val |= (vgic_v3_cpu->num_pri_bits - 1) << >> >> + ICC_CTLR_EL1_PRI_BITS_SHIFT; >> >> + val |= vgic_v3_cpu->num_id_bits << >> >> + ICC_CTLR_EL1_ID_BITS_SHIFT; >> >> + val |= ((kvm_vgic_global_state.ich_vtr_el2 & >> >> + ICH_VTR_SEIS_MASK) >> ICH_VTR_SEIS_SHIFT) << >> >> + ICC_CTLR_EL1_SEIS_SHIFT; >> >> + val |= ((kvm_vgic_global_state.ich_vtr_el2 & >> >> + ICH_VTR_A3V_MASK) >> ICH_VTR_A3V_SHIFT) << >> >> + ICC_CTLR_EL1_A3V_SHIFT; >> >> + val |= ((vmcr.ctlr & ICH_VMCR_CBPR_MASK) >> >> >> + ICH_VMCR_CBPR_SHIFT) << ICC_CTLR_EL1_CBPR_SHIFT; >> >> + val |= ((vmcr.ctlr & ICH_VMCR_EOIM_MASK) >> >> >> + ICH_VMCR_EOIM_SHIFT) << ICC_CTLR_EL1_EOImode_SHIFT; >> > >> > again, these last two look weird to me. >> > >> >> + >> >> + p->regval = val; >> >> + } >> >> + >> >> + return true; >> >> +} >> >> + >> >> +static bool access_gic_pmr(struct kvm_vcpu *vcpu, struct sys_reg_params *p, >> >> + const struct sys_reg_desc *r) >> >> +{ >> >> + struct vgic_vmcr vmcr; >> >> + >> >> + vgic_get_vmcr(vcpu, &vmcr); >> >> + if (p->is_write) { >> >> + vmcr.pmr = (p->regval & ICC_PMR_EL1_MASK) >> ICC_PMR_EL1_SHIFT; >> >> + vgic_set_vmcr(vcpu, &vmcr); >> >> + } else { >> >> + p->regval = (vmcr.pmr << ICC_PMR_EL1_SHIFT) & ICC_PMR_EL1_MASK; >> >> + } >> >> + >> >> + return true; >> >> +} >> >> + >> >> +static bool access_gic_bpr0(struct kvm_vcpu *vcpu, struct sys_reg_params *p, >> >> + const struct sys_reg_desc *r) >> >> +{ >> >> + struct vgic_vmcr vmcr; >> >> + >> >> + vgic_get_vmcr(vcpu, &vmcr); >> >> + if (p->is_write) { >> >> + vmcr.bpr = (p->regval & ICC_BPR0_EL1_MASK) >> >> >> + ICC_BPR0_EL1_SHIFT; >> >> + vgic_set_vmcr(vcpu, &vmcr); >> >> + } else { >> >> + p->regval = (vmcr.bpr << ICC_BPR0_EL1_SHIFT) & >> >> + ICC_BPR0_EL1_MASK; >> >> + } >> >> + >> >> + return true; >> >> +} >> >> + >> >> +static bool access_gic_bpr1(struct kvm_vcpu *vcpu, struct sys_reg_params *p, >> >> + const struct sys_reg_desc *r) >> >> +{ >> >> + struct vgic_vmcr vmcr; >> >> + >> >> + if (!p->is_write) >> >> + p->regval = 0; >> >> + >> >> + vgic_get_vmcr(vcpu, &vmcr); >> >> + if (!((vmcr.ctlr & ICH_VMCR_CBPR_MASK) >> ICH_VMCR_CBPR_SHIFT)) { >> >> + if (p->is_write) { >> >> + vmcr.abpr = (p->regval & ICC_BPR1_EL1_MASK) >> >> >> + ICC_BPR1_EL1_SHIFT; >> >> + vgic_set_vmcr(vcpu, &vmcr); >> >> + } else { >> >> + p->regval = (vmcr.abpr << ICC_BPR1_EL1_SHIFT) & >> >> + ICC_BPR1_EL1_MASK; >> >> + } >> >> + } else { >> >> + if (!p->is_write) >> >> + p->regval = min((vmcr.bpr + 1), 7U); >> >> + } >> >> + >> >> + return true; >> >> +} >> >> + >> >> +static bool access_gic_grpen0(struct kvm_vcpu *vcpu, struct sys_reg_params *p, >> >> + const struct sys_reg_desc *r) >> >> +{ >> >> + struct vgic_vmcr vmcr; >> >> + >> >> + vgic_get_vmcr(vcpu, &vmcr); >> >> + if (p->is_write) { >> >> + vmcr.grpen0 = (p->regval & ICC_IGRPEN0_EL1_MASK) >> >> >> + ICC_IGRPEN0_EL1_SHIFT; >> >> + vgic_set_vmcr(vcpu, &vmcr); >> >> + } else { >> >> + p->regval = (vmcr.grpen0 << ICC_IGRPEN0_EL1_SHIFT) & >> >> + ICC_IGRPEN0_EL1_MASK; >> >> + } >> >> + >> >> + return true; >> >> +} >> >> + >> >> +static bool access_gic_grpen1(struct kvm_vcpu *vcpu, struct sys_reg_params *p, >> >> + const struct sys_reg_desc *r) >> >> +{ >> >> + struct vgic_vmcr vmcr; >> >> + >> >> + vgic_get_vmcr(vcpu, &vmcr); >> >> + if (p->is_write) { >> >> + vmcr.grpen1 = (p->regval & ICC_IGRPEN1_EL1_MASK) >> >> >> + ICC_IGRPEN1_EL1_SHIFT; >> >> + vgic_set_vmcr(vcpu, &vmcr); >> >> + } else { >> >> + p->regval = (vmcr.grpen1 << ICC_IGRPEN1_EL1_SHIFT) & >> >> + ICC_IGRPEN1_EL1_MASK; >> >> + } >> >> + >> >> + return true; >> >> +} >> >> + >> >> +static void vgic_v3_access_apr_reg(struct kvm_vcpu *vcpu, >> >> + struct sys_reg_params *p, u8 apr, u8 idx) >> >> +{ >> >> + struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3; >> >> + uint32_t *ap_reg; >> >> + >> >> + if (apr) >> >> + ap_reg = &vgicv3->vgic_ap1r[idx]; >> >> + else >> >> + ap_reg = &vgicv3->vgic_ap0r[idx]; >> >> + >> >> + if (p->is_write) >> >> + *ap_reg = p->regval; >> >> + else >> >> + p->regval = *ap_reg; >> >> +} >> >> + >> >> +static void access_gic_aprn(struct kvm_vcpu *vcpu, struct sys_reg_params *p, >> >> + const struct sys_reg_desc *r, u8 apr) >> >> +{ >> >> + struct vgic_cpu *vgic_v3_cpu = &vcpu->arch.vgic_cpu; >> >> + u8 idx = r->Op2 & 3; >> >> + >> >> + switch (vgic_v3_cpu->num_pri_bits) { >> >> + case 7: >> >> + if (idx > 3) >> >> + goto err; >> > >> > idx cannot be higher than three given the mask above, right? >> > >> >> + vgic_v3_access_apr_reg(vcpu, p, apr, idx); >> >> + break; >> >> + case 6: >> >> + if (idx > 1) >> >> + goto err; >> >> + vgic_v3_access_apr_reg(vcpu, p, apr, idx); >> >> + break; >> >> + default: >> >> + if (idx > 0) >> >> + goto err; >> >> + vgic_v3_access_apr_reg(vcpu, p, apr, idx); >> >> + } >> > >> > what's the rationale behind ignoring the case where userspace is using >> > unsupported priorities? Is it that this will be checked during >> > save/restore of the ctlr? >> > >> > This sort of thing just looks like the case that's impossible to debug, >> > because userspace could be scratching its head trying to understand why >> > the value it wrote isn't recorded anywhere... >> > >> > If there's a good rationale for doing it this way, then could we have a >> > comment to that effect? >> >> Accessing umplemented priority registers raised UNDEF exception. >> So userspace accesing should be ignored instead of recording unsupported >> values. >> > > That's not what I asked. > > I asked why it's silently ignored as opposed to raising an error visible > to user space? > >> > >> >> + >> >> + return; >> >> +err: >> >> + if (!p->is_write) >> >> + p->regval = 0; >> >> +} >> >> + >> >> +static bool access_gic_ap0r(struct kvm_vcpu *vcpu, struct sys_reg_params *p, >> >> + const struct sys_reg_desc *r) >> >> +{ >> >> + access_gic_aprn(vcpu, p, r, 0); >> >> + >> >> + return true; >> >> +} >> >> + >> >> +static bool access_gic_ap1r(struct kvm_vcpu *vcpu, struct sys_reg_params *p, >> >> + const struct sys_reg_desc *r) >> >> +{ >> >> + access_gic_aprn(vcpu, p, r, 1); >> >> + >> >> + return true; >> >> +} >> >> + >> >> +static bool access_gic_sre(struct kvm_vcpu *vcpu, struct sys_reg_params *p, >> >> + const struct sys_reg_desc *r) >> >> +{ >> >> + struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3; >> >> + >> >> + /* Validate SRE bit */ >> >> + if (p->is_write) { >> >> + if (!(p->regval & ICC_SRE_EL1_SRE)) >> >> + return false; >> >> + } else { >> >> + p->regval = vgicv3->vgic_sre; >> >> + } >> >> + >> >> + return true; >> >> +} >> >> + >> >> +static const struct sys_reg_desc gic_v3_icc_reg_descs[] = { >> >> + /* ICC_PMR_EL1 */ >> >> + { Op0(3), Op1(0), CRn(4), CRm(6), Op2(0), access_gic_pmr }, >> >> + /* ICC_BPR0_EL1 */ >> >> + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(3), access_gic_bpr0 }, >> >> + /* ICC_AP0R0_EL1 */ >> >> + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(4), access_gic_ap0r }, >> >> + /* ICC_AP0R1_EL1 */ >> >> + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(5), access_gic_ap0r }, >> >> + /* ICC_AP0R2_EL1 */ >> >> + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(6), access_gic_ap0r }, >> >> + /* ICC_AP0R3_EL1 */ >> >> + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(7), access_gic_ap0r }, >> >> + /* ICC_AP1R0_EL1 */ >> >> + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(0), access_gic_ap1r }, >> >> + /* ICC_AP1R1_EL1 */ >> >> + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(1), access_gic_ap1r }, >> >> + /* ICC_AP1R2_EL1 */ >> >> + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(2), access_gic_ap1r }, >> >> + /* ICC_AP1R3_EL1 */ >> >> + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(3), access_gic_ap1r }, >> >> + /* ICC_BPR1_EL1 */ >> >> + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(3), access_gic_bpr1 }, >> >> + /* ICC_CTLR_EL1 */ >> >> + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(4), access_gic_ctlr }, >> >> + /* ICC_SRE_EL1 */ >> >> + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(5), access_gic_sre }, >> >> + /* ICC_IGRPEN0_EL1 */ >> >> + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(6), access_gic_grpen0 }, >> >> + /* ICC_GRPEN1_EL1 */ >> >> + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(7), access_gic_grpen1 }, >> >> +}; >> >> + >> >> +int vgic_v3_has_cpu_sysregs_attr(struct kvm_vcpu *vcpu, bool is_write, u64 id, >> >> + u64 *reg) >> >> +{ >> >> + struct sys_reg_params params; >> >> + u64 sysreg = (id & KVM_DEV_ARM_VGIC_SYSREG_MASK) | KVM_REG_SIZE_U64; >> >> + >> >> + params.regval = *reg; >> >> + params.is_write = is_write; >> >> + params.is_aarch32 = false; >> >> + params.is_32bit = false; >> >> + >> >> + if (find_reg_by_id(sysreg, ¶ms, gic_v3_icc_reg_descs, >> >> + ARRAY_SIZE(gic_v3_icc_reg_descs))) >> >> + return 0; >> >> + >> >> + return -ENXIO; >> >> +} >> >> + >> >> +int vgic_v3_cpu_sysregs_uaccess(struct kvm_vcpu *vcpu, bool is_write, u64 id, >> >> + u64 *reg) >> >> +{ >> >> + struct sys_reg_params params; >> >> + const struct sys_reg_desc *r; >> >> + u64 sysreg = (id & KVM_DEV_ARM_VGIC_SYSREG_MASK) | KVM_REG_SIZE_U64; >> >> + >> >> + if (is_write) >> >> + params.regval = *reg; >> >> + params.is_write = is_write; >> >> + params.is_aarch32 = false; >> >> + params.is_32bit = false; >> >> + >> >> + r = find_reg_by_id(sysreg, ¶ms, gic_v3_icc_reg_descs, >> >> + ARRAY_SIZE(gic_v3_icc_reg_descs)); >> >> + if (!r) >> >> + return -ENXIO; >> >> + >> >> + if (!r->access(vcpu, ¶ms, r)) >> >> + return -EINVAL; >> > >> > According to the API, EINVAL meansinvalid mpidr. Should we expand on >> > how it can be used or allocate a new error code? >> How abt EACCES error code? >> > > That would mean permission denied, which is a bit weird. Yes I agree, but you can suggest. > >> > >> >> + >> >> + if (!is_write) >> >> + *reg = params.regval; >> >> + >> >> + return 0; >> >> +} >> >> diff --git a/virt/kvm/arm/vgic/vgic-v3.c b/virt/kvm/arm/vgic/vgic-v3.c >> >> index 967c295..1139971 100644 >> >> --- a/virt/kvm/arm/vgic/vgic-v3.c >> >> +++ b/virt/kvm/arm/vgic/vgic-v3.c >> >> @@ -228,6 +228,13 @@ void vgic_v3_enable(struct kvm_vcpu *vcpu) >> >> vgic_v3->vgic_sre = 0; >> >> } >> >> >> >> + vcpu->arch.vgic_cpu.num_id_bits = (kvm_vgic_global_state.ich_vtr_el2 & >> >> + ICH_VTR_ID_BITS_MASK) >> >> >> + ICH_VTR_ID_BITS_SHIFT; >> >> + vcpu->arch.vgic_cpu.num_pri_bits = ((kvm_vgic_global_state.ich_vtr_el2 & >> >> + ICH_VTR_PRI_BITS_MASK) >> >> >> + ICH_VTR_PRI_BITS_SHIFT) + 1; >> >> + >> >> /* Get the show on the road... */ >> >> vgic_v3->vgic_hcr = ICH_HCR_EN; >> >> } >> >> @@ -328,6 +335,7 @@ int vgic_v3_probe(const struct gic_kvm_info *info) >> >> */ >> >> kvm_vgic_global_state.nr_lr = (ich_vtr_el2 & 0xf) + 1; >> >> kvm_vgic_global_state.can_emulate_gicv2 = false; >> >> + kvm_vgic_global_state.ich_vtr_el2 = ich_vtr_el2; >> >> >> >> if (!info->vcpu.start) { >> >> kvm_info("GICv3: no GICV resource entry\n"); >> >> diff --git a/virt/kvm/arm/vgic/vgic.h b/virt/kvm/arm/vgic/vgic.h >> >> index c461f6b..0e632d0 100644 >> >> --- a/virt/kvm/arm/vgic/vgic.h >> >> +++ b/virt/kvm/arm/vgic/vgic.h >> >> @@ -126,6 +126,10 @@ int vgic_v3_dist_uaccess(struct kvm_vcpu *vcpu, bool is_write, >> >> int offset, u32 *val); >> >> int vgic_v3_redist_uaccess(struct kvm_vcpu *vcpu, bool is_write, >> >> int offset, u32 *val); >> >> +int vgic_v3_cpu_sysregs_uaccess(struct kvm_vcpu *vcpu, bool is_write, >> >> + u64 id, u64 *val); >> >> +int vgic_v3_has_cpu_sysregs_attr(struct kvm_vcpu *vcpu, bool is_write, u64 id, >> >> + u64 *reg); >> >> #else >> >> static inline int vgic_register_its_iodevs(struct kvm *kvm) >> >> { >> >> -- > > Thanks, > -Christoffer _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
On Thu, Nov 17, 2016 at 9:39 PM, Christoffer Dall <christoffer.dall@linaro.org> wrote: > On Thu, Nov 17, 2016 at 09:25:59PM +0530, Vijay Kilari wrote: >> On Thu, Nov 17, 2016 at 12:22 AM, Christoffer Dall >> <christoffer.dall@linaro.org> wrote: >> > On Fri, Nov 04, 2016 at 04:43:32PM +0530, vijay.kilari@gmail.com wrote: >> >> From: Vijaya Kumar K <Vijaya.Kumar@cavium.com> >> >> >> >> VGICv3 CPU interface registers are accessed using >> >> KVM_DEV_ARM_VGIC_CPU_SYSREGS ioctl. These registers are accessed >> >> as 64-bit. The cpu MPIDR value is passed along with register id. >> >> is used to identify the cpu for registers access. >> >> >> >> The version of VGIC v3 specification is define here >> >> http://lists.infradead.org/pipermail/linux-arm-kernel/2016-July/445611.html >> >> >> >> Signed-off-by: Pavel Fedin <p.fedin@samsung.com> >> >> Signed-off-by: Vijaya Kumar K <Vijaya.Kumar@cavium.com> >> >> --- >> >> arch/arm64/include/uapi/asm/kvm.h | 3 + >> >> arch/arm64/kvm/Makefile | 1 + >> >> include/kvm/arm_vgic.h | 9 + >> >> virt/kvm/arm/vgic/vgic-kvm-device.c | 27 +++ >> >> virt/kvm/arm/vgic/vgic-mmio-v3.c | 19 +++ >> >> virt/kvm/arm/vgic/vgic-sys-reg-v3.c | 324 ++++++++++++++++++++++++++++++++++++ >> >> virt/kvm/arm/vgic/vgic-v3.c | 8 + >> >> virt/kvm/arm/vgic/vgic.h | 4 + >> >> 8 files changed, 395 insertions(+) >> >> >> >> diff --git a/arch/arm64/include/uapi/asm/kvm.h b/arch/arm64/include/uapi/asm/kvm.h >> >> index 56dc08d..91c7137 100644 >> >> --- a/arch/arm64/include/uapi/asm/kvm.h >> >> +++ b/arch/arm64/include/uapi/asm/kvm.h >> >> @@ -206,9 +206,12 @@ struct kvm_arch_memory_slot { >> >> (0xffffffffULL << KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT) >> >> #define KVM_DEV_ARM_VGIC_OFFSET_SHIFT 0 >> >> #define KVM_DEV_ARM_VGIC_OFFSET_MASK (0xffffffffULL << KVM_DEV_ARM_VGIC_OFFSET_SHIFT) >> >> +#define KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK (0xffff) >> >> #define KVM_DEV_ARM_VGIC_GRP_NR_IRQS 3 >> >> #define KVM_DEV_ARM_VGIC_GRP_CTRL 4 >> >> #define KVM_DEV_ARM_VGIC_GRP_REDIST_REGS 5 >> >> +#define KVM_DEV_ARM_VGIC_CPU_SYSREGS 6 >> >> + >> >> #define KVM_DEV_ARM_VGIC_CTRL_INIT 0 >> >> >> >> /* Device Control API on vcpu fd */ >> >> diff --git a/arch/arm64/kvm/Makefile b/arch/arm64/kvm/Makefile >> >> index d50a82a..1a14e29 100644 >> >> --- a/arch/arm64/kvm/Makefile >> >> +++ b/arch/arm64/kvm/Makefile >> >> @@ -32,5 +32,6 @@ kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-mmio-v3.o >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-kvm-device.o >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-its.o >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/irqchip.o >> >> +kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-sys-reg-v3.o >> > >> > Thi is making me wonder: Are we properly handling GICv3 save/restore >> > for AArch32 now that we have GICv3 support for AArch32? By properly I >> > mean that either it is clearly only supported on AArch64 systems or it's >> > supported on both AArch64 and AArch32, but it shouldn't break randomly >> > on AArch32. >> >> It supports both AArch64 and AArch64 in handling of system registers >> save/restore. >> All system registers that we save/restore are 32-bit for both aarch64 >> and aarch32. >> Though opcode op0 should be zero for aarch32, the remaining Op and CRn codes >> are same. However the codes sent by qemu is matched and register >> are handled properly irrespective of AArch32 or AArch64. >> >> I don't have platform which support AArch32 guests to verify. > > Actually this is not about the guest, it's about an ARMv8 AArch32 host > that has a GICv3. > > I just tried to do a v7 compile with your patches, and it results in an > epic failure, so there's something for you to look at. > Could you please share you config file?. I tried with multi_v7 defconfig with CONFIG KVM and CONFIG_KVM_ARM_HOST enabled. it compiled for me. _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
On Sat, Nov 19, 2016 at 12:18:53AM +0530, Vijay Kilari wrote: > On Thu, Nov 17, 2016 at 9:39 PM, Christoffer Dall > <christoffer.dall@linaro.org> wrote: > > On Thu, Nov 17, 2016 at 09:25:59PM +0530, Vijay Kilari wrote: > >> On Thu, Nov 17, 2016 at 12:22 AM, Christoffer Dall > >> <christoffer.dall@linaro.org> wrote: > >> > On Fri, Nov 04, 2016 at 04:43:32PM +0530, vijay.kilari@gmail.com wrote: > >> >> From: Vijaya Kumar K <Vijaya.Kumar@cavium.com> > >> >> > >> >> VGICv3 CPU interface registers are accessed using > >> >> KVM_DEV_ARM_VGIC_CPU_SYSREGS ioctl. These registers are accessed > >> >> as 64-bit. The cpu MPIDR value is passed along with register id. > >> >> is used to identify the cpu for registers access. > >> >> > >> >> The version of VGIC v3 specification is define here > >> >> http://lists.infradead.org/pipermail/linux-arm-kernel/2016-July/445611.html > >> >> > >> >> Signed-off-by: Pavel Fedin <p.fedin@samsung.com> > >> >> Signed-off-by: Vijaya Kumar K <Vijaya.Kumar@cavium.com> > >> >> --- > >> >> arch/arm64/include/uapi/asm/kvm.h | 3 + > >> >> arch/arm64/kvm/Makefile | 1 + > >> >> include/kvm/arm_vgic.h | 9 + > >> >> virt/kvm/arm/vgic/vgic-kvm-device.c | 27 +++ > >> >> virt/kvm/arm/vgic/vgic-mmio-v3.c | 19 +++ > >> >> virt/kvm/arm/vgic/vgic-sys-reg-v3.c | 324 ++++++++++++++++++++++++++++++++++++ > >> >> virt/kvm/arm/vgic/vgic-v3.c | 8 + > >> >> virt/kvm/arm/vgic/vgic.h | 4 + > >> >> 8 files changed, 395 insertions(+) > >> >> > >> >> diff --git a/arch/arm64/include/uapi/asm/kvm.h b/arch/arm64/include/uapi/asm/kvm.h > >> >> index 56dc08d..91c7137 100644 > >> >> --- a/arch/arm64/include/uapi/asm/kvm.h > >> >> +++ b/arch/arm64/include/uapi/asm/kvm.h > >> >> @@ -206,9 +206,12 @@ struct kvm_arch_memory_slot { > >> >> (0xffffffffULL << KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT) > >> >> #define KVM_DEV_ARM_VGIC_OFFSET_SHIFT 0 > >> >> #define KVM_DEV_ARM_VGIC_OFFSET_MASK (0xffffffffULL << KVM_DEV_ARM_VGIC_OFFSET_SHIFT) > >> >> +#define KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK (0xffff) > >> >> #define KVM_DEV_ARM_VGIC_GRP_NR_IRQS 3 > >> >> #define KVM_DEV_ARM_VGIC_GRP_CTRL 4 > >> >> #define KVM_DEV_ARM_VGIC_GRP_REDIST_REGS 5 > >> >> +#define KVM_DEV_ARM_VGIC_CPU_SYSREGS 6 > >> >> + > >> >> #define KVM_DEV_ARM_VGIC_CTRL_INIT 0 > >> >> > >> >> /* Device Control API on vcpu fd */ > >> >> diff --git a/arch/arm64/kvm/Makefile b/arch/arm64/kvm/Makefile > >> >> index d50a82a..1a14e29 100644 > >> >> --- a/arch/arm64/kvm/Makefile > >> >> +++ b/arch/arm64/kvm/Makefile > >> >> @@ -32,5 +32,6 @@ kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-mmio-v3.o > >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-kvm-device.o > >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-its.o > >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/irqchip.o > >> >> +kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-sys-reg-v3.o > >> > > >> > Thi is making me wonder: Are we properly handling GICv3 save/restore > >> > for AArch32 now that we have GICv3 support for AArch32? By properly I > >> > mean that either it is clearly only supported on AArch64 systems or it's > >> > supported on both AArch64 and AArch32, but it shouldn't break randomly > >> > on AArch32. > >> > >> It supports both AArch64 and AArch64 in handling of system registers > >> save/restore. > >> All system registers that we save/restore are 32-bit for both aarch64 > >> and aarch32. > >> Though opcode op0 should be zero for aarch32, the remaining Op and CRn codes > >> are same. However the codes sent by qemu is matched and register > >> are handled properly irrespective of AArch32 or AArch64. > >> > >> I don't have platform which support AArch32 guests to verify. > > > > Actually this is not about the guest, it's about an ARMv8 AArch32 host > > that has a GICv3. > > > > I just tried to do a v7 compile with your patches, and it results in an > > epic failure, so there's something for you to look at. > > > > Could you please share you config file?. I tried with multi_v7 defconfig with > CONFIG KVM and CONFIG_KVM_ARM_HOST enabled. it compiled for me. I think this has to do with which branch you apply your patches to. When applied to kvmarm/next, it fails. Here's the integration I did: https://git.linaro.org/people/christoffer.dall/linux-kvm-arm.git tmp-gicv3-migrate-v8 Here's the config: https://transfer.sh/xkAxp/.config Here's the compile output: /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-mmio-v3.c:26:22: fatal error: sys_regs.h: No such file or directory #include "sys_regs.h" ^ compilation terminated. make[2]: *** [arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-mmio-v3.o] Error 1 make[2]: *** Waiting for unfinished jobs.... /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c: In function ‘vgic_v3_parse_attr’: /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:438:29: error: ‘KVM_DEV_ARM_VGIC_V3_MPIDR_MASK’ undeclared (first use in this function) vgic_mpidr = (attr->attr & KVM_DEV_ARM_VGIC_V3_MPIDR_MASK) >> ^ /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:438:29: note: each undeclared identifier is reported only once for each function it appears in /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:439:9: error: ‘KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT’ undeclared (first use in this function) KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT; ^ /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:441:2: error: implicit declaration of function ‘MPIDR_LEVEL_SHIFT’ [-Werror=implicit-function-declaration] mpidr_reg = VGIC_TO_MPIDR(vgic_mpidr); ^ /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c: In function ‘vgic_v3_attr_regs_access’: /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:497:7: error: ‘KVM_DEV_ARM_VGIC_GRP_REDIST_REGS’ undeclared (first use in this function) case KVM_DEV_ARM_VGIC_GRP_REDIST_REGS: ^ /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:505:7: error: ‘KVM_DEV_ARM_VGIC_CPU_SYSREGS’ undeclared (first use in this function) case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { ^ /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:508:25: error: ‘KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK’ undeclared (first use in this function) regid = (attr->attr & KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK); ^ /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:513:7: error: ‘KVM_DEV_ARM_VGIC_GRP_LEVEL_INFO’ undeclared (first use in this function) case KVM_DEV_ARM_VGIC_GRP_LEVEL_INFO: { ^ /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:516:24: error: ‘KVM_DEV_ARM_VGIC_LINE_LEVEL_INFO_MASK’ undeclared (first use in this function) info = (attr->attr & KVM_DEV_ARM_VGIC_LINE_LEVEL_INFO_MASK) >> ^ /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:517:4: error: ‘KVM_DEV_ARM_VGIC_LINE_LEVEL_INFO_SHIFT’ undeclared (first use in this function) KVM_DEV_ARM_VGIC_LINE_LEVEL_INFO_SHIFT; ^ /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:518:15: error: ‘VGIC_LEVEL_INFO_LINE_LEVEL’ undeclared (first use in this function) if (info == VGIC_LEVEL_INFO_LINE_LEVEL) { ^ /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:522:5: error: ‘KVM_DEV_ARM_VGIC_LINE_LEVEL_INTID_MASK’ undeclared (first use in this function) KVM_DEV_ARM_VGIC_LINE_LEVEL_INTID_MASK; ^ /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c: In function ‘vgic_v3_set_attr’: /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:554:7: error: ‘KVM_DEV_ARM_VGIC_GRP_REDIST_REGS’ undeclared (first use in this function) case KVM_DEV_ARM_VGIC_GRP_REDIST_REGS: { ^ /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:565:7: error: ‘KVM_DEV_ARM_VGIC_CPU_SYSREGS’ undeclared (first use in this function) case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { ^ /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:574:7: error: ‘KVM_DEV_ARM_VGIC_GRP_LEVEL_INFO’ undeclared (first use in this function) case KVM_DEV_ARM_VGIC_GRP_LEVEL_INFO: { ^ /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c: In function ‘vgic_v3_get_attr’: /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:600:7: error: ‘KVM_DEV_ARM_VGIC_GRP_REDIST_REGS’ undeclared (first use in this function) case KVM_DEV_ARM_VGIC_GRP_REDIST_REGS: { ^ /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:611:7: error: ‘KVM_DEV_ARM_VGIC_CPU_SYSREGS’ undeclared (first use in this function) case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { ^ /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:620:7: error: ‘KVM_DEV_ARM_VGIC_GRP_LEVEL_INFO’ undeclared (first use in this function) case KVM_DEV_ARM_VGIC_GRP_LEVEL_INFO: { ^ /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c: In function ‘vgic_v3_has_attr’: /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:647:7: error: ‘KVM_DEV_ARM_VGIC_GRP_REDIST_REGS’ undeclared (first use in this function) case KVM_DEV_ARM_VGIC_GRP_REDIST_REGS: ^ /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:648:7: error: ‘KVM_DEV_ARM_VGIC_CPU_SYSREGS’ undeclared (first use in this function) case KVM_DEV_ARM_VGIC_CPU_SYSREGS: ^ /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:652:7: error: ‘KVM_DEV_ARM_VGIC_GRP_LEVEL_INFO’ undeclared (first use in this function) case KVM_DEV_ARM_VGIC_GRP_LEVEL_INFO: { ^ /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:653:22: error: ‘KVM_DEV_ARM_VGIC_LINE_LEVEL_INFO_MASK’ undeclared (first use in this function) if (((attr->attr & KVM_DEV_ARM_VGIC_LINE_LEVEL_INFO_MASK) >> ^ /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:654:9: error: ‘KVM_DEV_ARM_VGIC_LINE_LEVEL_INFO_SHIFT’ undeclared (first use in this function) KVM_DEV_ARM_VGIC_LINE_LEVEL_INFO_SHIFT) == ^ /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:655:9: error: ‘VGIC_LEVEL_INFO_LINE_LEVEL’ undeclared (first use in this function) VGIC_LEVEL_INFO_LINE_LEVEL) ^ cc1: some warnings being treated as errors make[2]: *** [arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.o] Error 1 make[1]: *** [arch/arm/kvm] Error 2 make[1]: *** Waiting for unfinished jobs.... make: *** [sub-make] Error 2 Thanks, -Christoffer
On Fri, Nov 18, 2016 at 10:28:34PM +0530, Vijay Kilari wrote: > On Thu, Nov 17, 2016 at 9:39 PM, Christoffer Dall > <christoffer.dall@linaro.org> wrote: > > On Thu, Nov 17, 2016 at 09:25:59PM +0530, Vijay Kilari wrote: > >> On Thu, Nov 17, 2016 at 12:22 AM, Christoffer Dall > >> <christoffer.dall@linaro.org> wrote: > >> > On Fri, Nov 04, 2016 at 04:43:32PM +0530, vijay.kilari@gmail.com wrote: > >> >> From: Vijaya Kumar K <Vijaya.Kumar@cavium.com> > >> >> > >> >> VGICv3 CPU interface registers are accessed using > >> >> KVM_DEV_ARM_VGIC_CPU_SYSREGS ioctl. These registers are accessed > >> >> as 64-bit. The cpu MPIDR value is passed along with register id. > >> >> is used to identify the cpu for registers access. > >> >> > >> >> The version of VGIC v3 specification is define here > >> >> http://lists.infradead.org/pipermail/linux-arm-kernel/2016-July/445611.html > >> >> > >> >> Signed-off-by: Pavel Fedin <p.fedin@samsung.com> > >> >> Signed-off-by: Vijaya Kumar K <Vijaya.Kumar@cavium.com> > >> >> --- > >> >> arch/arm64/include/uapi/asm/kvm.h | 3 + > >> >> arch/arm64/kvm/Makefile | 1 + > >> >> include/kvm/arm_vgic.h | 9 + > >> >> virt/kvm/arm/vgic/vgic-kvm-device.c | 27 +++ > >> >> virt/kvm/arm/vgic/vgic-mmio-v3.c | 19 +++ > >> >> virt/kvm/arm/vgic/vgic-sys-reg-v3.c | 324 ++++++++++++++++++++++++++++++++++++ > >> >> virt/kvm/arm/vgic/vgic-v3.c | 8 + > >> >> virt/kvm/arm/vgic/vgic.h | 4 + > >> >> 8 files changed, 395 insertions(+) > >> >> > >> >> diff --git a/arch/arm64/include/uapi/asm/kvm.h b/arch/arm64/include/uapi/asm/kvm.h > >> >> index 56dc08d..91c7137 100644 > >> >> --- a/arch/arm64/include/uapi/asm/kvm.h > >> >> +++ b/arch/arm64/include/uapi/asm/kvm.h > >> >> @@ -206,9 +206,12 @@ struct kvm_arch_memory_slot { > >> >> (0xffffffffULL << KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT) > >> >> #define KVM_DEV_ARM_VGIC_OFFSET_SHIFT 0 > >> >> #define KVM_DEV_ARM_VGIC_OFFSET_MASK (0xffffffffULL << KVM_DEV_ARM_VGIC_OFFSET_SHIFT) > >> >> +#define KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK (0xffff) > >> >> #define KVM_DEV_ARM_VGIC_GRP_NR_IRQS 3 > >> >> #define KVM_DEV_ARM_VGIC_GRP_CTRL 4 > >> >> #define KVM_DEV_ARM_VGIC_GRP_REDIST_REGS 5 > >> >> +#define KVM_DEV_ARM_VGIC_CPU_SYSREGS 6 > >> >> + > >> >> #define KVM_DEV_ARM_VGIC_CTRL_INIT 0 > >> >> > >> >> /* Device Control API on vcpu fd */ > >> >> diff --git a/arch/arm64/kvm/Makefile b/arch/arm64/kvm/Makefile > >> >> index d50a82a..1a14e29 100644 > >> >> --- a/arch/arm64/kvm/Makefile > >> >> +++ b/arch/arm64/kvm/Makefile > >> >> @@ -32,5 +32,6 @@ kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-mmio-v3.o > >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-kvm-device.o > >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-its.o > >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/irqchip.o > >> >> +kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-sys-reg-v3.o > >> > > >> > Thi is making me wonder: Are we properly handling GICv3 save/restore > >> > for AArch32 now that we have GICv3 support for AArch32? By properly I > >> > mean that either it is clearly only supported on AArch64 systems or it's > >> > supported on both AArch64 and AArch32, but it shouldn't break randomly > >> > on AArch32. > >> > >> It supports both AArch64 and AArch64 in handling of system registers > >> save/restore. > >> All system registers that we save/restore are 32-bit for both aarch64 > >> and aarch32. > >> Though opcode op0 should be zero for aarch32, the remaining Op and CRn codes > >> are same. However the codes sent by qemu is matched and register > >> are handled properly irrespective of AArch32 or AArch64. > >> > >> I don't have platform which support AArch32 guests to verify. > > > > Actually this is not about the guest, it's about an ARMv8 AArch32 host > > that has a GICv3. > > > > I just tried to do a v7 compile with your patches, and it results in an > > epic failure, so there's something for you to look at. > > > >> > > >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/arch_timer.o > >> >> kvm-$(CONFIG_KVM_ARM_PMU) += $(KVM)/arm/pmu.o > >> >> diff --git a/include/kvm/arm_vgic.h b/include/kvm/arm_vgic.h > >> >> index 002f092..730a18a 100644 > >> >> --- a/include/kvm/arm_vgic.h > >> >> +++ b/include/kvm/arm_vgic.h > >> >> @@ -71,6 +71,9 @@ struct vgic_global { > >> >> > >> >> /* GIC system register CPU interface */ > >> >> struct static_key_false gicv3_cpuif; > >> >> + > >> >> + /* Cache ICH_VTR_EL2 reg value */ > >> >> + u32 ich_vtr_el2; > >> >> }; > >> >> > >> >> extern struct vgic_global kvm_vgic_global_state; > >> >> @@ -269,6 +272,12 @@ struct vgic_cpu { > >> >> u64 pendbaser; > >> >> > >> >> bool lpis_enabled; > >> >> + > >> >> + /* Cache guest priority bits */ > >> >> + u32 num_pri_bits; > >> >> + > >> >> + /* Cache guest interrupt ID bits */ > >> >> + u32 num_id_bits; > >> >> }; > >> >> > >> >> extern struct static_key_false vgic_v2_cpuif_trap; > >> >> diff --git a/virt/kvm/arm/vgic/vgic-kvm-device.c b/virt/kvm/arm/vgic/vgic-kvm-device.c > >> >> index 6c7d30c..da532d1 100644 > >> >> --- a/virt/kvm/arm/vgic/vgic-kvm-device.c > >> >> +++ b/virt/kvm/arm/vgic/vgic-kvm-device.c > >> >> @@ -504,6 +504,14 @@ static int vgic_v3_attr_regs_access(struct kvm_device *dev, > >> >> if (!is_write) > >> >> *reg = tmp32; > >> >> break; > >> >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { > >> >> + u64 regid; > >> >> + > >> >> + regid = (attr->attr & KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK); > >> >> + ret = vgic_v3_cpu_sysregs_uaccess(vcpu, is_write, > >> >> + regid, reg); > >> >> + break; > >> >> + } > >> >> default: > >> >> ret = -EINVAL; > >> >> break; > >> >> @@ -537,6 +545,15 @@ static int vgic_v3_set_attr(struct kvm_device *dev, > >> >> reg = tmp32; > >> >> return vgic_v3_attr_regs_access(dev, attr, ®, true); > >> >> } > >> >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { > >> >> + u64 __user *uaddr = (u64 __user *)(long)attr->addr; > >> >> + u64 reg; > >> >> + > >> >> + if (get_user(reg, uaddr)) > >> >> + return -EFAULT; > >> >> + > >> >> + return vgic_v3_attr_regs_access(dev, attr, ®, true); > >> >> + } > >> >> } > >> >> return -ENXIO; > >> >> } > >> >> @@ -563,6 +580,15 @@ static int vgic_v3_get_attr(struct kvm_device *dev, > >> >> tmp32 = reg; > >> >> return put_user(tmp32, uaddr); > >> >> } > >> >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { > >> >> + u64 __user *uaddr = (u64 __user *)(long)attr->addr; > >> >> + u64 reg; > >> >> + > >> >> + ret = vgic_v3_attr_regs_access(dev, attr, ®, false); > >> >> + if (ret) > >> >> + return ret; > >> >> + return put_user(reg, uaddr); > >> >> + } > >> >> } > >> >> > >> >> return -ENXIO; > >> >> @@ -581,6 +607,7 @@ static int vgic_v3_has_attr(struct kvm_device *dev, > >> >> break; > >> >> case KVM_DEV_ARM_VGIC_GRP_DIST_REGS: > >> >> case KVM_DEV_ARM_VGIC_GRP_REDIST_REGS: > >> >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: > >> >> return vgic_v3_has_attr_regs(dev, attr); > >> >> case KVM_DEV_ARM_VGIC_GRP_NR_IRQS: > >> >> return 0; > >> >> diff --git a/virt/kvm/arm/vgic/vgic-mmio-v3.c b/virt/kvm/arm/vgic/vgic-mmio-v3.c > >> >> index b35fb83..519b919 100644 > >> >> --- a/virt/kvm/arm/vgic/vgic-mmio-v3.c > >> >> +++ b/virt/kvm/arm/vgic/vgic-mmio-v3.c > >> >> @@ -23,6 +23,7 @@ > >> >> > >> >> #include "vgic.h" > >> >> #include "vgic-mmio.h" > >> >> +#include "sys_regs.h" > >> >> > >> >> /* extract @num bytes at @offset bytes offset in data */ > >> >> unsigned long extract_bytes(u64 data, unsigned int offset, > >> >> @@ -639,6 +640,24 @@ int vgic_v3_has_attr_regs(struct kvm_device *dev, struct kvm_device_attr *attr) > >> >> nr_regions = ARRAY_SIZE(vgic_v3_rdbase_registers); > >> >> break; > >> >> } > >> >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { > >> >> + u64 reg, id; > >> >> + unsigned long vgic_mpidr, mpidr_reg; > >> >> + struct kvm_vcpu *vcpu; > >> >> + > >> >> + vgic_mpidr = (attr->attr & KVM_DEV_ARM_VGIC_V3_MPIDR_MASK) >> > >> >> + KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT; > >> >> + > >> >> + /* Convert plain mpidr value to MPIDR reg format */ > >> >> + mpidr_reg = VGIC_TO_MPIDR(vgic_mpidr); > >> >> + > >> >> + vcpu = kvm_mpidr_to_vcpu(dev->kvm, mpidr_reg); > >> >> + if (!vcpu) > >> >> + return -EINVAL; > >> >> + > >> >> + id = (attr->attr & KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK); > >> >> + return vgic_v3_has_cpu_sysregs_attr(vcpu, 0, id, ®); > >> >> + } > >> >> default: > >> >> return -ENXIO; > >> >> } > >> >> diff --git a/virt/kvm/arm/vgic/vgic-sys-reg-v3.c b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c > >> >> new file mode 100644 > >> >> index 0000000..69d8597 > >> >> --- /dev/null > >> >> +++ b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c > >> > > >> > Shouldn't we have a GPL header here? > >> > > >> >> @@ -0,0 +1,324 @@ > >> >> +#include <linux/irqchip/arm-gic-v3.h> > >> >> +#include <linux/kvm.h> > >> >> +#include <linux/kvm_host.h> > >> >> +#include <kvm/iodev.h> > >> >> +#include <kvm/arm_vgic.h> > >> >> +#include <asm/kvm_emulate.h> > >> >> +#include <asm/kvm_arm.h> > >> >> +#include <asm/kvm_mmu.h> > >> >> + > >> >> +#include "vgic.h" > >> >> +#include "vgic-mmio.h" > >> >> +#include "sys_regs.h" > >> >> + > >> >> +static bool access_gic_ctlr(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > >> >> + const struct sys_reg_desc *r) > >> >> +{ > >> >> + struct vgic_cpu *vgic_v3_cpu = &vcpu->arch.vgic_cpu; > >> >> + struct vgic_vmcr vmcr; > >> >> + u64 val; > >> >> + u32 num_pri_bits, num_id_bits; > >> >> + > >> >> + vgic_get_vmcr(vcpu, &vmcr); > >> >> + if (p->is_write) { > >> >> + val = p->regval; > >> >> + > >> >> + /* > >> >> + * Does not allow update of ICC_CTLR_EL1 if HW does not support > >> >> + * guest programmed ID and PRI bits > >> >> + */ > >> > > >> > I would suggest rewording this comment: > >> > Disallow restoring VM state not supported by this hardware. > >> > > >> >> + num_pri_bits = ((val & ICC_CTLR_EL1_PRI_BITS_MASK) >> > >> >> + ICC_CTLR_EL1_PRI_BITS_SHIFT) + 1; > >> >> + if (num_pri_bits > vgic_v3_cpu->num_pri_bits) > >> >> + return false; > >> >> + > >> >> + vgic_v3_cpu->num_pri_bits = num_pri_bits; > >> > > >> > hmmm, this looks weird to me, because vgic_v3_cpu->num_pri_bits I don't > >> > understand which effect this is intended to have? > >> > > >> > Sure, it may limit what you do with other registers later, but since > >> > there's no ordering requirement that the ctlr be restored first, I'm not > >> > sure it makes sense. > >> > > >> > Also, since this field is RO in the ICH_VTR, we'll have a strange > >> > situation during runtime after a GICv3 restore where the > >> > vgic_v3_cpu->num_pri_its differs from the hardware's ICH_VTR_EL2 field, > >> > which is never the case if you didn't do a save/restore. > >> > >> Yes, but in any case, vgic_v3_cpu->num_pri_bits will be always less > >> than HW supported > >> value. > >> > > > > So answer my question: What is the intended effect of writing this > > value? Is it just so that if you migrate this platform back again, then > > you're checking compatibility with what the guest would potentially do, > > Yes Then add a comment explaining that > and also to limit the valid aprn registers access as you said above. > But that has ordering restriction. Which I think we should follow. > I'm sorry, now I'm confused. Is there an ordering requirement in the API, or how should we follow this? > > or should you maintain the num_pri_bits limitation during runtime > > somehow? > Once after checking compatibility, at runtime it is not updated > and this value is not used at all in VGIC further > > > >> > > >> > Finally, should we somehow ensure that this field is set to the same > >> > value across VCPUs or is that not an architectural requirement? > >> > > >> Yes it is nice to have it same across VCPUs. But should be ok as > >> we are ensuring value is not greater than HW supported value. > > > > Does the architecture allow having a different number of priority bits > > supported across CPUs? If not, you shouldn't allow a VM programming > > things that way either. > > AFAIK, architecturally it is not mentioned any where in the spec that priority > bits should be same across CPUs. ok > > > >> There is no single point of place where we can make such a check > >> > >> >> + > >> >> + num_id_bits = (val & ICC_CTLR_EL1_ID_BITS_MASK) >> > >> >> + ICC_CTLR_EL1_ID_BITS_SHIFT; > >> >> + if (num_id_bits > vgic_v3_cpu->num_id_bits) > >> >> + return false; > >> >> + > >> >> + vgic_v3_cpu->num_id_bits = num_id_bits; > >> > > >> > same questions > >> > > >> >> + > >> >> + vmcr.ctlr &= ~(ICH_VMCR_CBPR_MASK | ICH_VMCR_EOIM_MASK); > >> >> + vmcr.ctlr |= ((val & ICC_CTLR_EL1_CBPR_MASK) >> > >> >> + ICC_CTLR_EL1_CBPR_SHIFT) << ICH_VMCR_CBPR_SHIFT; > >> >> + vmcr.ctlr |= ((val & ICC_CTLR_EL1_EOImode_MASK) >> > >> >> + ICC_CTLR_EL1_EOImode_SHIFT) << > >> >> + ICH_VMCR_EOIM_SHIFT; > >> > > >> > I'm really confused here. Is the vmcr.ctlr field in the ICC_CTLR_EL1 > >> > format or in the VMCR format? I would assume the former, since > >> > otherwise I don't get the point with this indirection, and for GICv2 > >> > vmcr.ctlr captures the GICC_CTLR value and git_set_vmcr transforms this > >> > into VMCR values. > >> > > >> > Having a line that says "ctlr &= ~ICH_VMCR" should make some alarm bells > >> > ring. > >> > >> I will check and fix it. > >> > > >> >> + vgic_set_vmcr(vcpu, &vmcr); > >> > > >> > Should we check compatibility between the source and destination for the > >> > SEIS and A3V support here? > >> > >> Can be checked. But I feel A3V check makes more sense than checking for > >> SEIS. > >> > > > > Please argue the *why* for whatever you end up doing with respect to > > both bits in the commit message of your next patch revision. > > > >> > > >> >> + } else { > >> >> + val = 0; > >> >> + val |= (vgic_v3_cpu->num_pri_bits - 1) << > >> >> + ICC_CTLR_EL1_PRI_BITS_SHIFT; > >> >> + val |= vgic_v3_cpu->num_id_bits << > >> >> + ICC_CTLR_EL1_ID_BITS_SHIFT; > >> >> + val |= ((kvm_vgic_global_state.ich_vtr_el2 & > >> >> + ICH_VTR_SEIS_MASK) >> ICH_VTR_SEIS_SHIFT) << > >> >> + ICC_CTLR_EL1_SEIS_SHIFT; > >> >> + val |= ((kvm_vgic_global_state.ich_vtr_el2 & > >> >> + ICH_VTR_A3V_MASK) >> ICH_VTR_A3V_SHIFT) << > >> >> + ICC_CTLR_EL1_A3V_SHIFT; > >> >> + val |= ((vmcr.ctlr & ICH_VMCR_CBPR_MASK) >> > >> >> + ICH_VMCR_CBPR_SHIFT) << ICC_CTLR_EL1_CBPR_SHIFT; > >> >> + val |= ((vmcr.ctlr & ICH_VMCR_EOIM_MASK) >> > >> >> + ICH_VMCR_EOIM_SHIFT) << ICC_CTLR_EL1_EOImode_SHIFT; > >> > > >> > again, these last two look weird to me. > >> > > >> >> + > >> >> + p->regval = val; > >> >> + } > >> >> + > >> >> + return true; > >> >> +} > >> >> + > >> >> +static bool access_gic_pmr(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > >> >> + const struct sys_reg_desc *r) > >> >> +{ > >> >> + struct vgic_vmcr vmcr; > >> >> + > >> >> + vgic_get_vmcr(vcpu, &vmcr); > >> >> + if (p->is_write) { > >> >> + vmcr.pmr = (p->regval & ICC_PMR_EL1_MASK) >> ICC_PMR_EL1_SHIFT; > >> >> + vgic_set_vmcr(vcpu, &vmcr); > >> >> + } else { > >> >> + p->regval = (vmcr.pmr << ICC_PMR_EL1_SHIFT) & ICC_PMR_EL1_MASK; > >> >> + } > >> >> + > >> >> + return true; > >> >> +} > >> >> + > >> >> +static bool access_gic_bpr0(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > >> >> + const struct sys_reg_desc *r) > >> >> +{ > >> >> + struct vgic_vmcr vmcr; > >> >> + > >> >> + vgic_get_vmcr(vcpu, &vmcr); > >> >> + if (p->is_write) { > >> >> + vmcr.bpr = (p->regval & ICC_BPR0_EL1_MASK) >> > >> >> + ICC_BPR0_EL1_SHIFT; > >> >> + vgic_set_vmcr(vcpu, &vmcr); > >> >> + } else { > >> >> + p->regval = (vmcr.bpr << ICC_BPR0_EL1_SHIFT) & > >> >> + ICC_BPR0_EL1_MASK; > >> >> + } > >> >> + > >> >> + return true; > >> >> +} > >> >> + > >> >> +static bool access_gic_bpr1(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > >> >> + const struct sys_reg_desc *r) > >> >> +{ > >> >> + struct vgic_vmcr vmcr; > >> >> + > >> >> + if (!p->is_write) > >> >> + p->regval = 0; > >> >> + > >> >> + vgic_get_vmcr(vcpu, &vmcr); > >> >> + if (!((vmcr.ctlr & ICH_VMCR_CBPR_MASK) >> ICH_VMCR_CBPR_SHIFT)) { > >> >> + if (p->is_write) { > >> >> + vmcr.abpr = (p->regval & ICC_BPR1_EL1_MASK) >> > >> >> + ICC_BPR1_EL1_SHIFT; > >> >> + vgic_set_vmcr(vcpu, &vmcr); > >> >> + } else { > >> >> + p->regval = (vmcr.abpr << ICC_BPR1_EL1_SHIFT) & > >> >> + ICC_BPR1_EL1_MASK; > >> >> + } > >> >> + } else { > >> >> + if (!p->is_write) > >> >> + p->regval = min((vmcr.bpr + 1), 7U); > >> >> + } > >> >> + > >> >> + return true; > >> >> +} > >> >> + > >> >> +static bool access_gic_grpen0(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > >> >> + const struct sys_reg_desc *r) > >> >> +{ > >> >> + struct vgic_vmcr vmcr; > >> >> + > >> >> + vgic_get_vmcr(vcpu, &vmcr); > >> >> + if (p->is_write) { > >> >> + vmcr.grpen0 = (p->regval & ICC_IGRPEN0_EL1_MASK) >> > >> >> + ICC_IGRPEN0_EL1_SHIFT; > >> >> + vgic_set_vmcr(vcpu, &vmcr); > >> >> + } else { > >> >> + p->regval = (vmcr.grpen0 << ICC_IGRPEN0_EL1_SHIFT) & > >> >> + ICC_IGRPEN0_EL1_MASK; > >> >> + } > >> >> + > >> >> + return true; > >> >> +} > >> >> + > >> >> +static bool access_gic_grpen1(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > >> >> + const struct sys_reg_desc *r) > >> >> +{ > >> >> + struct vgic_vmcr vmcr; > >> >> + > >> >> + vgic_get_vmcr(vcpu, &vmcr); > >> >> + if (p->is_write) { > >> >> + vmcr.grpen1 = (p->regval & ICC_IGRPEN1_EL1_MASK) >> > >> >> + ICC_IGRPEN1_EL1_SHIFT; > >> >> + vgic_set_vmcr(vcpu, &vmcr); > >> >> + } else { > >> >> + p->regval = (vmcr.grpen1 << ICC_IGRPEN1_EL1_SHIFT) & > >> >> + ICC_IGRPEN1_EL1_MASK; > >> >> + } > >> >> + > >> >> + return true; > >> >> +} > >> >> + > >> >> +static void vgic_v3_access_apr_reg(struct kvm_vcpu *vcpu, > >> >> + struct sys_reg_params *p, u8 apr, u8 idx) > >> >> +{ > >> >> + struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3; > >> >> + uint32_t *ap_reg; > >> >> + > >> >> + if (apr) > >> >> + ap_reg = &vgicv3->vgic_ap1r[idx]; > >> >> + else > >> >> + ap_reg = &vgicv3->vgic_ap0r[idx]; > >> >> + > >> >> + if (p->is_write) > >> >> + *ap_reg = p->regval; > >> >> + else > >> >> + p->regval = *ap_reg; > >> >> +} > >> >> + > >> >> +static void access_gic_aprn(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > >> >> + const struct sys_reg_desc *r, u8 apr) > >> >> +{ > >> >> + struct vgic_cpu *vgic_v3_cpu = &vcpu->arch.vgic_cpu; > >> >> + u8 idx = r->Op2 & 3; > >> >> + > >> >> + switch (vgic_v3_cpu->num_pri_bits) { > >> >> + case 7: > >> >> + if (idx > 3) > >> >> + goto err; > >> > > >> > idx cannot be higher than three given the mask above, right? > >> > > >> >> + vgic_v3_access_apr_reg(vcpu, p, apr, idx); > >> >> + break; > >> >> + case 6: > >> >> + if (idx > 1) > >> >> + goto err; > >> >> + vgic_v3_access_apr_reg(vcpu, p, apr, idx); > >> >> + break; > >> >> + default: > >> >> + if (idx > 0) > >> >> + goto err; > >> >> + vgic_v3_access_apr_reg(vcpu, p, apr, idx); > >> >> + } > >> > > >> > what's the rationale behind ignoring the case where userspace is using > >> > unsupported priorities? Is it that this will be checked during > >> > save/restore of the ctlr? > >> > > >> > This sort of thing just looks like the case that's impossible to debug, > >> > because userspace could be scratching its head trying to understand why > >> > the value it wrote isn't recorded anywhere... > >> > > >> > If there's a good rationale for doing it this way, then could we have a > >> > comment to that effect? > >> > >> Accessing umplemented priority registers raised UNDEF exception. > >> So userspace accesing should be ignored instead of recording unsupported > >> values. > >> > > > > That's not what I asked. > > > > I asked why it's silently ignored as opposed to raising an error visible > > to user space? > > > >> > > >> >> + > >> >> + return; > >> >> +err: > >> >> + if (!p->is_write) > >> >> + p->regval = 0; > >> >> +} > >> >> + > >> >> +static bool access_gic_ap0r(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > >> >> + const struct sys_reg_desc *r) > >> >> +{ > >> >> + access_gic_aprn(vcpu, p, r, 0); > >> >> + > >> >> + return true; > >> >> +} > >> >> + > >> >> +static bool access_gic_ap1r(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > >> >> + const struct sys_reg_desc *r) > >> >> +{ > >> >> + access_gic_aprn(vcpu, p, r, 1); > >> >> + > >> >> + return true; > >> >> +} > >> >> + > >> >> +static bool access_gic_sre(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > >> >> + const struct sys_reg_desc *r) > >> >> +{ > >> >> + struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3; > >> >> + > >> >> + /* Validate SRE bit */ > >> >> + if (p->is_write) { > >> >> + if (!(p->regval & ICC_SRE_EL1_SRE)) > >> >> + return false; > >> >> + } else { > >> >> + p->regval = vgicv3->vgic_sre; > >> >> + } > >> >> + > >> >> + return true; > >> >> +} > >> >> + > >> >> +static const struct sys_reg_desc gic_v3_icc_reg_descs[] = { > >> >> + /* ICC_PMR_EL1 */ > >> >> + { Op0(3), Op1(0), CRn(4), CRm(6), Op2(0), access_gic_pmr }, > >> >> + /* ICC_BPR0_EL1 */ > >> >> + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(3), access_gic_bpr0 }, > >> >> + /* ICC_AP0R0_EL1 */ > >> >> + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(4), access_gic_ap0r }, > >> >> + /* ICC_AP0R1_EL1 */ > >> >> + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(5), access_gic_ap0r }, > >> >> + /* ICC_AP0R2_EL1 */ > >> >> + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(6), access_gic_ap0r }, > >> >> + /* ICC_AP0R3_EL1 */ > >> >> + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(7), access_gic_ap0r }, > >> >> + /* ICC_AP1R0_EL1 */ > >> >> + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(0), access_gic_ap1r }, > >> >> + /* ICC_AP1R1_EL1 */ > >> >> + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(1), access_gic_ap1r }, > >> >> + /* ICC_AP1R2_EL1 */ > >> >> + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(2), access_gic_ap1r }, > >> >> + /* ICC_AP1R3_EL1 */ > >> >> + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(3), access_gic_ap1r }, > >> >> + /* ICC_BPR1_EL1 */ > >> >> + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(3), access_gic_bpr1 }, > >> >> + /* ICC_CTLR_EL1 */ > >> >> + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(4), access_gic_ctlr }, > >> >> + /* ICC_SRE_EL1 */ > >> >> + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(5), access_gic_sre }, > >> >> + /* ICC_IGRPEN0_EL1 */ > >> >> + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(6), access_gic_grpen0 }, > >> >> + /* ICC_GRPEN1_EL1 */ > >> >> + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(7), access_gic_grpen1 }, > >> >> +}; > >> >> + > >> >> +int vgic_v3_has_cpu_sysregs_attr(struct kvm_vcpu *vcpu, bool is_write, u64 id, > >> >> + u64 *reg) > >> >> +{ > >> >> + struct sys_reg_params params; > >> >> + u64 sysreg = (id & KVM_DEV_ARM_VGIC_SYSREG_MASK) | KVM_REG_SIZE_U64; > >> >> + > >> >> + params.regval = *reg; > >> >> + params.is_write = is_write; > >> >> + params.is_aarch32 = false; > >> >> + params.is_32bit = false; > >> >> + > >> >> + if (find_reg_by_id(sysreg, ¶ms, gic_v3_icc_reg_descs, > >> >> + ARRAY_SIZE(gic_v3_icc_reg_descs))) > >> >> + return 0; > >> >> + > >> >> + return -ENXIO; > >> >> +} > >> >> + > >> >> +int vgic_v3_cpu_sysregs_uaccess(struct kvm_vcpu *vcpu, bool is_write, u64 id, > >> >> + u64 *reg) > >> >> +{ > >> >> + struct sys_reg_params params; > >> >> + const struct sys_reg_desc *r; > >> >> + u64 sysreg = (id & KVM_DEV_ARM_VGIC_SYSREG_MASK) | KVM_REG_SIZE_U64; > >> >> + > >> >> + if (is_write) > >> >> + params.regval = *reg; > >> >> + params.is_write = is_write; > >> >> + params.is_aarch32 = false; > >> >> + params.is_32bit = false; > >> >> + > >> >> + r = find_reg_by_id(sysreg, ¶ms, gic_v3_icc_reg_descs, > >> >> + ARRAY_SIZE(gic_v3_icc_reg_descs)); > >> >> + if (!r) > >> >> + return -ENXIO; > >> >> + > >> >> + if (!r->access(vcpu, ¶ms, r)) > >> >> + return -EINVAL; > >> > > >> > According to the API, EINVAL meansinvalid mpidr. Should we expand on > >> > how it can be used or allocate a new error code? > >> How abt EACCES error code? > >> > > > > That would mean permission denied, which is a bit weird. > Yes I agree, but you can suggest. You could expand the meaning in the API doc for gicv3 and use EINVAL, or you could expand on what ENXIO means. Thanks, -Christoffer _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
On Mon, Nov 21, 2016 at 3:49 PM, Christoffer Dall <christoffer.dall@linaro.org> wrote: > On Fri, Nov 18, 2016 at 10:28:34PM +0530, Vijay Kilari wrote: >> On Thu, Nov 17, 2016 at 9:39 PM, Christoffer Dall >> <christoffer.dall@linaro.org> wrote: >> > On Thu, Nov 17, 2016 at 09:25:59PM +0530, Vijay Kilari wrote: >> >> On Thu, Nov 17, 2016 at 12:22 AM, Christoffer Dall >> >> <christoffer.dall@linaro.org> wrote: >> >> > On Fri, Nov 04, 2016 at 04:43:32PM +0530, vijay.kilari@gmail.com wrote: >> >> >> From: Vijaya Kumar K <Vijaya.Kumar@cavium.com> >> >> >> >> >> >> VGICv3 CPU interface registers are accessed using >> >> >> KVM_DEV_ARM_VGIC_CPU_SYSREGS ioctl. These registers are accessed >> >> >> as 64-bit. The cpu MPIDR value is passed along with register id. >> >> >> is used to identify the cpu for registers access. >> >> >> >> >> >> The version of VGIC v3 specification is define here >> >> >> http://lists.infradead.org/pipermail/linux-arm-kernel/2016-July/445611.html >> >> >> >> >> >> Signed-off-by: Pavel Fedin <p.fedin@samsung.com> >> >> >> Signed-off-by: Vijaya Kumar K <Vijaya.Kumar@cavium.com> >> >> >> --- >> >> >> arch/arm64/include/uapi/asm/kvm.h | 3 + >> >> >> arch/arm64/kvm/Makefile | 1 + >> >> >> include/kvm/arm_vgic.h | 9 + >> >> >> virt/kvm/arm/vgic/vgic-kvm-device.c | 27 +++ >> >> >> virt/kvm/arm/vgic/vgic-mmio-v3.c | 19 +++ >> >> >> virt/kvm/arm/vgic/vgic-sys-reg-v3.c | 324 ++++++++++++++++++++++++++++++++++++ >> >> >> virt/kvm/arm/vgic/vgic-v3.c | 8 + >> >> >> virt/kvm/arm/vgic/vgic.h | 4 + >> >> >> 8 files changed, 395 insertions(+) >> >> >> >> >> >> diff --git a/arch/arm64/include/uapi/asm/kvm.h b/arch/arm64/include/uapi/asm/kvm.h >> >> >> index 56dc08d..91c7137 100644 >> >> >> --- a/arch/arm64/include/uapi/asm/kvm.h >> >> >> +++ b/arch/arm64/include/uapi/asm/kvm.h >> >> >> @@ -206,9 +206,12 @@ struct kvm_arch_memory_slot { >> >> >> (0xffffffffULL << KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT) >> >> >> #define KVM_DEV_ARM_VGIC_OFFSET_SHIFT 0 >> >> >> #define KVM_DEV_ARM_VGIC_OFFSET_MASK (0xffffffffULL << KVM_DEV_ARM_VGIC_OFFSET_SHIFT) >> >> >> +#define KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK (0xffff) >> >> >> #define KVM_DEV_ARM_VGIC_GRP_NR_IRQS 3 >> >> >> #define KVM_DEV_ARM_VGIC_GRP_CTRL 4 >> >> >> #define KVM_DEV_ARM_VGIC_GRP_REDIST_REGS 5 >> >> >> +#define KVM_DEV_ARM_VGIC_CPU_SYSREGS 6 >> >> >> + >> >> >> #define KVM_DEV_ARM_VGIC_CTRL_INIT 0 >> >> >> >> >> >> /* Device Control API on vcpu fd */ >> >> >> diff --git a/arch/arm64/kvm/Makefile b/arch/arm64/kvm/Makefile >> >> >> index d50a82a..1a14e29 100644 >> >> >> --- a/arch/arm64/kvm/Makefile >> >> >> +++ b/arch/arm64/kvm/Makefile >> >> >> @@ -32,5 +32,6 @@ kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-mmio-v3.o >> >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-kvm-device.o >> >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-its.o >> >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/irqchip.o >> >> >> +kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-sys-reg-v3.o >> >> > >> >> > Thi is making me wonder: Are we properly handling GICv3 save/restore >> >> > for AArch32 now that we have GICv3 support for AArch32? By properly I >> >> > mean that either it is clearly only supported on AArch64 systems or it's >> >> > supported on both AArch64 and AArch32, but it shouldn't break randomly >> >> > on AArch32. >> >> >> >> It supports both AArch64 and AArch64 in handling of system registers >> >> save/restore. >> >> All system registers that we save/restore are 32-bit for both aarch64 >> >> and aarch32. >> >> Though opcode op0 should be zero for aarch32, the remaining Op and CRn codes >> >> are same. However the codes sent by qemu is matched and register >> >> are handled properly irrespective of AArch32 or AArch64. >> >> >> >> I don't have platform which support AArch32 guests to verify. >> > >> > Actually this is not about the guest, it's about an ARMv8 AArch32 host >> > that has a GICv3. >> > >> > I just tried to do a v7 compile with your patches, and it results in an >> > epic failure, so there's something for you to look at. >> > >> >> > >> >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/arch_timer.o >> >> >> kvm-$(CONFIG_KVM_ARM_PMU) += $(KVM)/arm/pmu.o >> >> >> diff --git a/include/kvm/arm_vgic.h b/include/kvm/arm_vgic.h >> >> >> index 002f092..730a18a 100644 >> >> >> --- a/include/kvm/arm_vgic.h >> >> >> +++ b/include/kvm/arm_vgic.h >> >> >> @@ -71,6 +71,9 @@ struct vgic_global { >> >> >> >> >> >> /* GIC system register CPU interface */ >> >> >> struct static_key_false gicv3_cpuif; >> >> >> + >> >> >> + /* Cache ICH_VTR_EL2 reg value */ >> >> >> + u32 ich_vtr_el2; >> >> >> }; >> >> >> >> >> >> extern struct vgic_global kvm_vgic_global_state; >> >> >> @@ -269,6 +272,12 @@ struct vgic_cpu { >> >> >> u64 pendbaser; >> >> >> >> >> >> bool lpis_enabled; >> >> >> + >> >> >> + /* Cache guest priority bits */ >> >> >> + u32 num_pri_bits; >> >> >> + >> >> >> + /* Cache guest interrupt ID bits */ >> >> >> + u32 num_id_bits; >> >> >> }; >> >> >> >> >> >> extern struct static_key_false vgic_v2_cpuif_trap; >> >> >> diff --git a/virt/kvm/arm/vgic/vgic-kvm-device.c b/virt/kvm/arm/vgic/vgic-kvm-device.c >> >> >> index 6c7d30c..da532d1 100644 >> >> >> --- a/virt/kvm/arm/vgic/vgic-kvm-device.c >> >> >> +++ b/virt/kvm/arm/vgic/vgic-kvm-device.c >> >> >> @@ -504,6 +504,14 @@ static int vgic_v3_attr_regs_access(struct kvm_device *dev, >> >> >> if (!is_write) >> >> >> *reg = tmp32; >> >> >> break; >> >> >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { >> >> >> + u64 regid; >> >> >> + >> >> >> + regid = (attr->attr & KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK); >> >> >> + ret = vgic_v3_cpu_sysregs_uaccess(vcpu, is_write, >> >> >> + regid, reg); >> >> >> + break; >> >> >> + } >> >> >> default: >> >> >> ret = -EINVAL; >> >> >> break; >> >> >> @@ -537,6 +545,15 @@ static int vgic_v3_set_attr(struct kvm_device *dev, >> >> >> reg = tmp32; >> >> >> return vgic_v3_attr_regs_access(dev, attr, ®, true); >> >> >> } >> >> >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { >> >> >> + u64 __user *uaddr = (u64 __user *)(long)attr->addr; >> >> >> + u64 reg; >> >> >> + >> >> >> + if (get_user(reg, uaddr)) >> >> >> + return -EFAULT; >> >> >> + >> >> >> + return vgic_v3_attr_regs_access(dev, attr, ®, true); >> >> >> + } >> >> >> } >> >> >> return -ENXIO; >> >> >> } >> >> >> @@ -563,6 +580,15 @@ static int vgic_v3_get_attr(struct kvm_device *dev, >> >> >> tmp32 = reg; >> >> >> return put_user(tmp32, uaddr); >> >> >> } >> >> >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { >> >> >> + u64 __user *uaddr = (u64 __user *)(long)attr->addr; >> >> >> + u64 reg; >> >> >> + >> >> >> + ret = vgic_v3_attr_regs_access(dev, attr, ®, false); >> >> >> + if (ret) >> >> >> + return ret; >> >> >> + return put_user(reg, uaddr); >> >> >> + } >> >> >> } >> >> >> >> >> >> return -ENXIO; >> >> >> @@ -581,6 +607,7 @@ static int vgic_v3_has_attr(struct kvm_device *dev, >> >> >> break; >> >> >> case KVM_DEV_ARM_VGIC_GRP_DIST_REGS: >> >> >> case KVM_DEV_ARM_VGIC_GRP_REDIST_REGS: >> >> >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: >> >> >> return vgic_v3_has_attr_regs(dev, attr); >> >> >> case KVM_DEV_ARM_VGIC_GRP_NR_IRQS: >> >> >> return 0; >> >> >> diff --git a/virt/kvm/arm/vgic/vgic-mmio-v3.c b/virt/kvm/arm/vgic/vgic-mmio-v3.c >> >> >> index b35fb83..519b919 100644 >> >> >> --- a/virt/kvm/arm/vgic/vgic-mmio-v3.c >> >> >> +++ b/virt/kvm/arm/vgic/vgic-mmio-v3.c >> >> >> @@ -23,6 +23,7 @@ >> >> >> >> >> >> #include "vgic.h" >> >> >> #include "vgic-mmio.h" >> >> >> +#include "sys_regs.h" >> >> >> >> >> >> /* extract @num bytes at @offset bytes offset in data */ >> >> >> unsigned long extract_bytes(u64 data, unsigned int offset, >> >> >> @@ -639,6 +640,24 @@ int vgic_v3_has_attr_regs(struct kvm_device *dev, struct kvm_device_attr *attr) >> >> >> nr_regions = ARRAY_SIZE(vgic_v3_rdbase_registers); >> >> >> break; >> >> >> } >> >> >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { >> >> >> + u64 reg, id; >> >> >> + unsigned long vgic_mpidr, mpidr_reg; >> >> >> + struct kvm_vcpu *vcpu; >> >> >> + >> >> >> + vgic_mpidr = (attr->attr & KVM_DEV_ARM_VGIC_V3_MPIDR_MASK) >> >> >> >> + KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT; >> >> >> + >> >> >> + /* Convert plain mpidr value to MPIDR reg format */ >> >> >> + mpidr_reg = VGIC_TO_MPIDR(vgic_mpidr); >> >> >> + >> >> >> + vcpu = kvm_mpidr_to_vcpu(dev->kvm, mpidr_reg); >> >> >> + if (!vcpu) >> >> >> + return -EINVAL; >> >> >> + >> >> >> + id = (attr->attr & KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK); >> >> >> + return vgic_v3_has_cpu_sysregs_attr(vcpu, 0, id, ®); >> >> >> + } >> >> >> default: >> >> >> return -ENXIO; >> >> >> } >> >> >> diff --git a/virt/kvm/arm/vgic/vgic-sys-reg-v3.c b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c >> >> >> new file mode 100644 >> >> >> index 0000000..69d8597 >> >> >> --- /dev/null >> >> >> +++ b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c >> >> > >> >> > Shouldn't we have a GPL header here? >> >> > >> >> >> @@ -0,0 +1,324 @@ >> >> >> +#include <linux/irqchip/arm-gic-v3.h> >> >> >> +#include <linux/kvm.h> >> >> >> +#include <linux/kvm_host.h> >> >> >> +#include <kvm/iodev.h> >> >> >> +#include <kvm/arm_vgic.h> >> >> >> +#include <asm/kvm_emulate.h> >> >> >> +#include <asm/kvm_arm.h> >> >> >> +#include <asm/kvm_mmu.h> >> >> >> + >> >> >> +#include "vgic.h" >> >> >> +#include "vgic-mmio.h" >> >> >> +#include "sys_regs.h" >> >> >> + >> >> >> +static bool access_gic_ctlr(struct kvm_vcpu *vcpu, struct sys_reg_params *p, >> >> >> + const struct sys_reg_desc *r) >> >> >> +{ >> >> >> + struct vgic_cpu *vgic_v3_cpu = &vcpu->arch.vgic_cpu; >> >> >> + struct vgic_vmcr vmcr; >> >> >> + u64 val; >> >> >> + u32 num_pri_bits, num_id_bits; >> >> >> + >> >> >> + vgic_get_vmcr(vcpu, &vmcr); >> >> >> + if (p->is_write) { >> >> >> + val = p->regval; >> >> >> + >> >> >> + /* >> >> >> + * Does not allow update of ICC_CTLR_EL1 if HW does not support >> >> >> + * guest programmed ID and PRI bits >> >> >> + */ >> >> > >> >> > I would suggest rewording this comment: >> >> > Disallow restoring VM state not supported by this hardware. >> >> > >> >> >> + num_pri_bits = ((val & ICC_CTLR_EL1_PRI_BITS_MASK) >> >> >> >> + ICC_CTLR_EL1_PRI_BITS_SHIFT) + 1; >> >> >> + if (num_pri_bits > vgic_v3_cpu->num_pri_bits) >> >> >> + return false; >> >> >> + >> >> >> + vgic_v3_cpu->num_pri_bits = num_pri_bits; >> >> > >> >> > hmmm, this looks weird to me, because vgic_v3_cpu->num_pri_bits I don't >> >> > understand which effect this is intended to have? >> >> > >> >> > Sure, it may limit what you do with other registers later, but since >> >> > there's no ordering requirement that the ctlr be restored first, I'm not >> >> > sure it makes sense. >> >> > >> >> > Also, since this field is RO in the ICH_VTR, we'll have a strange >> >> > situation during runtime after a GICv3 restore where the >> >> > vgic_v3_cpu->num_pri_its differs from the hardware's ICH_VTR_EL2 field, >> >> > which is never the case if you didn't do a save/restore. >> >> >> >> Yes, but in any case, vgic_v3_cpu->num_pri_bits will be always less >> >> than HW supported >> >> value. >> >> >> > >> > So answer my question: What is the intended effect of writing this >> > value? Is it just so that if you migrate this platform back again, then >> > you're checking compatibility with what the guest would potentially do, >> >> Yes > > Then add a comment explaining that > >> and also to limit the valid aprn registers access as you said above. >> But that has ordering restriction. Which I think we should follow. >> > > I'm sorry, now I'm confused. Is there an ordering requirement in the > API, or how should we follow this? There is no ordering requirement mentioned in the API doc. However the APRn registers depends on num_pri_bits. Hence first ICC_CTLR_EL1 should be restored before APRn restore. If ordering is not followed then APRn registers restore is allowed as per hw supported num_pri_bits. This should be mentioned in doc. _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
On Sun, Nov 20, 2016 at 6:50 PM, Christoffer Dall <christoffer.dall@linaro.org> wrote: > On Sat, Nov 19, 2016 at 12:18:53AM +0530, Vijay Kilari wrote: >> On Thu, Nov 17, 2016 at 9:39 PM, Christoffer Dall >> <christoffer.dall@linaro.org> wrote: >> > On Thu, Nov 17, 2016 at 09:25:59PM +0530, Vijay Kilari wrote: >> >> On Thu, Nov 17, 2016 at 12:22 AM, Christoffer Dall >> >> <christoffer.dall@linaro.org> wrote: >> >> > On Fri, Nov 04, 2016 at 04:43:32PM +0530, vijay.kilari@gmail.com wrote: >> >> >> From: Vijaya Kumar K <Vijaya.Kumar@cavium.com> >> >> >> >> >> >> VGICv3 CPU interface registers are accessed using >> >> >> KVM_DEV_ARM_VGIC_CPU_SYSREGS ioctl. These registers are accessed >> >> >> as 64-bit. The cpu MPIDR value is passed along with register id. >> >> >> is used to identify the cpu for registers access. >> >> >> >> >> >> The version of VGIC v3 specification is define here >> >> >> http://lists.infradead.org/pipermail/linux-arm-kernel/2016-July/445611.html >> >> >> >> >> >> Signed-off-by: Pavel Fedin <p.fedin@samsung.com> >> >> >> Signed-off-by: Vijaya Kumar K <Vijaya.Kumar@cavium.com> >> >> >> --- >> >> >> arch/arm64/include/uapi/asm/kvm.h | 3 + >> >> >> arch/arm64/kvm/Makefile | 1 + >> >> >> include/kvm/arm_vgic.h | 9 + >> >> >> virt/kvm/arm/vgic/vgic-kvm-device.c | 27 +++ >> >> >> virt/kvm/arm/vgic/vgic-mmio-v3.c | 19 +++ >> >> >> virt/kvm/arm/vgic/vgic-sys-reg-v3.c | 324 ++++++++++++++++++++++++++++++++++++ >> >> >> virt/kvm/arm/vgic/vgic-v3.c | 8 + >> >> >> virt/kvm/arm/vgic/vgic.h | 4 + >> >> >> 8 files changed, 395 insertions(+) >> >> >> >> >> >> diff --git a/arch/arm64/include/uapi/asm/kvm.h b/arch/arm64/include/uapi/asm/kvm.h >> >> >> index 56dc08d..91c7137 100644 >> >> >> --- a/arch/arm64/include/uapi/asm/kvm.h >> >> >> +++ b/arch/arm64/include/uapi/asm/kvm.h >> >> >> @@ -206,9 +206,12 @@ struct kvm_arch_memory_slot { >> >> >> (0xffffffffULL << KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT) >> >> >> #define KVM_DEV_ARM_VGIC_OFFSET_SHIFT 0 >> >> >> #define KVM_DEV_ARM_VGIC_OFFSET_MASK (0xffffffffULL << KVM_DEV_ARM_VGIC_OFFSET_SHIFT) >> >> >> +#define KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK (0xffff) >> >> >> #define KVM_DEV_ARM_VGIC_GRP_NR_IRQS 3 >> >> >> #define KVM_DEV_ARM_VGIC_GRP_CTRL 4 >> >> >> #define KVM_DEV_ARM_VGIC_GRP_REDIST_REGS 5 >> >> >> +#define KVM_DEV_ARM_VGIC_CPU_SYSREGS 6 >> >> >> + >> >> >> #define KVM_DEV_ARM_VGIC_CTRL_INIT 0 >> >> >> >> >> >> /* Device Control API on vcpu fd */ >> >> >> diff --git a/arch/arm64/kvm/Makefile b/arch/arm64/kvm/Makefile >> >> >> index d50a82a..1a14e29 100644 >> >> >> --- a/arch/arm64/kvm/Makefile >> >> >> +++ b/arch/arm64/kvm/Makefile >> >> >> @@ -32,5 +32,6 @@ kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-mmio-v3.o >> >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-kvm-device.o >> >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-its.o >> >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/irqchip.o >> >> >> +kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-sys-reg-v3.o >> >> > >> >> > Thi is making me wonder: Are we properly handling GICv3 save/restore >> >> > for AArch32 now that we have GICv3 support for AArch32? By properly I >> >> > mean that either it is clearly only supported on AArch64 systems or it's >> >> > supported on both AArch64 and AArch32, but it shouldn't break randomly >> >> > on AArch32. >> >> >> >> It supports both AArch64 and AArch64 in handling of system registers >> >> save/restore. >> >> All system registers that we save/restore are 32-bit for both aarch64 >> >> and aarch32. >> >> Though opcode op0 should be zero for aarch32, the remaining Op and CRn codes >> >> are same. However the codes sent by qemu is matched and register >> >> are handled properly irrespective of AArch32 or AArch64. >> >> >> >> I don't have platform which support AArch32 guests to verify. >> > >> > Actually this is not about the guest, it's about an ARMv8 AArch32 host >> > that has a GICv3. >> > >> > I just tried to do a v7 compile with your patches, and it results in an >> > epic failure, so there's something for you to look at. >> > >> >> Could you please share you config file?. I tried with multi_v7 defconfig with >> CONFIG KVM and CONFIG_KVM_ARM_HOST enabled. it compiled for me. > > I think this has to do with which branch you apply your patches to. > When applied to kvmarm/next, it fails. > > Here's the integration I did: > https://git.linaro.org/people/christoffer.dall/linux-kvm-arm.git tmp-gicv3-migrate-v8 > > Here's the config: > https://transfer.sh/xkAxp/.config > Thanks for shareing the details, I could reproduce them. However virt/kvm/arm/vgic/vgic-sys-reg-v3.c is written with sys_regs_desc for AArch64. For AArch32/v7, it has be to coproc_reg. I propose to add separate file for arm which handles ICC* reg save/restore using coproc_reg. > Here's the compile output: > > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-mmio-v3.c:26:22: fatal error: sys_regs.h: No such file or directory > #include "sys_regs.h" > ^ > compilation terminated. > make[2]: *** [arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-mmio-v3.o] Error 1 > make[2]: *** Waiting for unfinished jobs.... > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c: In function ‘vgic_v3_parse_attr’: > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:438:29: error: ‘KVM_DEV_ARM_VGIC_V3_MPIDR_MASK’ undeclared (first use in this function) > vgic_mpidr = (attr->attr & KVM_DEV_ARM_VGIC_V3_MPIDR_MASK) >> > ^ > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:438:29: note: each undeclared identifier is reported only once for each function it appears in > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:439:9: error: ‘KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT’ undeclared (first use in this function) > KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT; > ^ > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:441:2: error: implicit declaration of function ‘MPIDR_LEVEL_SHIFT’ [-Werror=implicit-function-declaration] > mpidr_reg = VGIC_TO_MPIDR(vgic_mpidr); > ^ > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c: In function ‘vgic_v3_attr_regs_access’: > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:497:7: error: ‘KVM_DEV_ARM_VGIC_GRP_REDIST_REGS’ undeclared (first use in this function) > case KVM_DEV_ARM_VGIC_GRP_REDIST_REGS: > ^ > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:505:7: error: ‘KVM_DEV_ARM_VGIC_CPU_SYSREGS’ undeclared (first use in this function) > case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { > ^ > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:508:25: error: ‘KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK’ undeclared (first use in this function) > regid = (attr->attr & KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK); > ^ > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:513:7: error: ‘KVM_DEV_ARM_VGIC_GRP_LEVEL_INFO’ undeclared (first use in this function) > case KVM_DEV_ARM_VGIC_GRP_LEVEL_INFO: { > ^ > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:516:24: error: ‘KVM_DEV_ARM_VGIC_LINE_LEVEL_INFO_MASK’ undeclared (first use in this function) > info = (attr->attr & KVM_DEV_ARM_VGIC_LINE_LEVEL_INFO_MASK) >> > ^ > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:517:4: error: ‘KVM_DEV_ARM_VGIC_LINE_LEVEL_INFO_SHIFT’ undeclared (first use in this function) > KVM_DEV_ARM_VGIC_LINE_LEVEL_INFO_SHIFT; > ^ > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:518:15: error: ‘VGIC_LEVEL_INFO_LINE_LEVEL’ undeclared (first use in this function) > if (info == VGIC_LEVEL_INFO_LINE_LEVEL) { > ^ > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:522:5: error: ‘KVM_DEV_ARM_VGIC_LINE_LEVEL_INTID_MASK’ undeclared (first use in this function) > KVM_DEV_ARM_VGIC_LINE_LEVEL_INTID_MASK; > ^ > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c: In function ‘vgic_v3_set_attr’: > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:554:7: error: ‘KVM_DEV_ARM_VGIC_GRP_REDIST_REGS’ undeclared (first use in this function) > case KVM_DEV_ARM_VGIC_GRP_REDIST_REGS: { > ^ > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:565:7: error: ‘KVM_DEV_ARM_VGIC_CPU_SYSREGS’ undeclared (first use in this function) > case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { > ^ > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:574:7: error: ‘KVM_DEV_ARM_VGIC_GRP_LEVEL_INFO’ undeclared (first use in this function) > case KVM_DEV_ARM_VGIC_GRP_LEVEL_INFO: { > ^ > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c: In function ‘vgic_v3_get_attr’: > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:600:7: error: ‘KVM_DEV_ARM_VGIC_GRP_REDIST_REGS’ undeclared (first use in this function) > case KVM_DEV_ARM_VGIC_GRP_REDIST_REGS: { > ^ > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:611:7: error: ‘KVM_DEV_ARM_VGIC_CPU_SYSREGS’ undeclared (first use in this function) > case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { > ^ > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:620:7: error: ‘KVM_DEV_ARM_VGIC_GRP_LEVEL_INFO’ undeclared (first use in this function) > case KVM_DEV_ARM_VGIC_GRP_LEVEL_INFO: { > ^ > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c: In function ‘vgic_v3_has_attr’: > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:647:7: error: ‘KVM_DEV_ARM_VGIC_GRP_REDIST_REGS’ undeclared (first use in this function) > case KVM_DEV_ARM_VGIC_GRP_REDIST_REGS: > ^ > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:648:7: error: ‘KVM_DEV_ARM_VGIC_CPU_SYSREGS’ undeclared (first use in this function) > case KVM_DEV_ARM_VGIC_CPU_SYSREGS: > ^ > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:652:7: error: ‘KVM_DEV_ARM_VGIC_GRP_LEVEL_INFO’ undeclared (first use in this function) > case KVM_DEV_ARM_VGIC_GRP_LEVEL_INFO: { > ^ > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:653:22: error: ‘KVM_DEV_ARM_VGIC_LINE_LEVEL_INFO_MASK’ undeclared (first use in this function) > if (((attr->attr & KVM_DEV_ARM_VGIC_LINE_LEVEL_INFO_MASK) >> > ^ > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:654:9: error: ‘KVM_DEV_ARM_VGIC_LINE_LEVEL_INFO_SHIFT’ undeclared (first use in this function) > KVM_DEV_ARM_VGIC_LINE_LEVEL_INFO_SHIFT) == > ^ > /home/christoffer/src/kvmarm/linux/arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.c:655:9: error: ‘VGIC_LEVEL_INFO_LINE_LEVEL’ undeclared (first use in this function) > VGIC_LEVEL_INFO_LINE_LEVEL) > ^ > cc1: some warnings being treated as errors > make[2]: *** [arch/arm/kvm/../../../virt/kvm/arm/vgic/vgic-kvm-device.o] Error 1 > make[1]: *** [arch/arm/kvm] Error 2 > make[1]: *** Waiting for unfinished jobs.... > make: *** [sub-make] Error 2 > > Thanks, > -Christoffer
On Mon, Nov 21, 2016 at 07:02:36PM +0530, Vijay Kilari wrote: > On Sun, Nov 20, 2016 at 6:50 PM, Christoffer Dall > <christoffer.dall@linaro.org> wrote: > > On Sat, Nov 19, 2016 at 12:18:53AM +0530, Vijay Kilari wrote: > >> On Thu, Nov 17, 2016 at 9:39 PM, Christoffer Dall > >> <christoffer.dall@linaro.org> wrote: > >> > On Thu, Nov 17, 2016 at 09:25:59PM +0530, Vijay Kilari wrote: > >> >> On Thu, Nov 17, 2016 at 12:22 AM, Christoffer Dall > >> >> <christoffer.dall@linaro.org> wrote: > >> >> > On Fri, Nov 04, 2016 at 04:43:32PM +0530, vijay.kilari@gmail.com wrote: > >> >> >> From: Vijaya Kumar K <Vijaya.Kumar@cavium.com> > >> >> >> > >> >> >> VGICv3 CPU interface registers are accessed using > >> >> >> KVM_DEV_ARM_VGIC_CPU_SYSREGS ioctl. These registers are accessed > >> >> >> as 64-bit. The cpu MPIDR value is passed along with register id. > >> >> >> is used to identify the cpu for registers access. > >> >> >> > >> >> >> The version of VGIC v3 specification is define here > >> >> >> http://lists.infradead.org/pipermail/linux-arm-kernel/2016-July/445611.html > >> >> >> > >> >> >> Signed-off-by: Pavel Fedin <p.fedin@samsung.com> > >> >> >> Signed-off-by: Vijaya Kumar K <Vijaya.Kumar@cavium.com> > >> >> >> --- > >> >> >> arch/arm64/include/uapi/asm/kvm.h | 3 + > >> >> >> arch/arm64/kvm/Makefile | 1 + > >> >> >> include/kvm/arm_vgic.h | 9 + > >> >> >> virt/kvm/arm/vgic/vgic-kvm-device.c | 27 +++ > >> >> >> virt/kvm/arm/vgic/vgic-mmio-v3.c | 19 +++ > >> >> >> virt/kvm/arm/vgic/vgic-sys-reg-v3.c | 324 ++++++++++++++++++++++++++++++++++++ > >> >> >> virt/kvm/arm/vgic/vgic-v3.c | 8 + > >> >> >> virt/kvm/arm/vgic/vgic.h | 4 + > >> >> >> 8 files changed, 395 insertions(+) > >> >> >> > >> >> >> diff --git a/arch/arm64/include/uapi/asm/kvm.h b/arch/arm64/include/uapi/asm/kvm.h > >> >> >> index 56dc08d..91c7137 100644 > >> >> >> --- a/arch/arm64/include/uapi/asm/kvm.h > >> >> >> +++ b/arch/arm64/include/uapi/asm/kvm.h > >> >> >> @@ -206,9 +206,12 @@ struct kvm_arch_memory_slot { > >> >> >> (0xffffffffULL << KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT) > >> >> >> #define KVM_DEV_ARM_VGIC_OFFSET_SHIFT 0 > >> >> >> #define KVM_DEV_ARM_VGIC_OFFSET_MASK (0xffffffffULL << KVM_DEV_ARM_VGIC_OFFSET_SHIFT) > >> >> >> +#define KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK (0xffff) > >> >> >> #define KVM_DEV_ARM_VGIC_GRP_NR_IRQS 3 > >> >> >> #define KVM_DEV_ARM_VGIC_GRP_CTRL 4 > >> >> >> #define KVM_DEV_ARM_VGIC_GRP_REDIST_REGS 5 > >> >> >> +#define KVM_DEV_ARM_VGIC_CPU_SYSREGS 6 > >> >> >> + > >> >> >> #define KVM_DEV_ARM_VGIC_CTRL_INIT 0 > >> >> >> > >> >> >> /* Device Control API on vcpu fd */ > >> >> >> diff --git a/arch/arm64/kvm/Makefile b/arch/arm64/kvm/Makefile > >> >> >> index d50a82a..1a14e29 100644 > >> >> >> --- a/arch/arm64/kvm/Makefile > >> >> >> +++ b/arch/arm64/kvm/Makefile > >> >> >> @@ -32,5 +32,6 @@ kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-mmio-v3.o > >> >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-kvm-device.o > >> >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-its.o > >> >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/irqchip.o > >> >> >> +kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-sys-reg-v3.o > >> >> > > >> >> > Thi is making me wonder: Are we properly handling GICv3 save/restore > >> >> > for AArch32 now that we have GICv3 support for AArch32? By properly I > >> >> > mean that either it is clearly only supported on AArch64 systems or it's > >> >> > supported on both AArch64 and AArch32, but it shouldn't break randomly > >> >> > on AArch32. > >> >> > >> >> It supports both AArch64 and AArch64 in handling of system registers > >> >> save/restore. > >> >> All system registers that we save/restore are 32-bit for both aarch64 > >> >> and aarch32. > >> >> Though opcode op0 should be zero for aarch32, the remaining Op and CRn codes > >> >> are same. However the codes sent by qemu is matched and register > >> >> are handled properly irrespective of AArch32 or AArch64. > >> >> > >> >> I don't have platform which support AArch32 guests to verify. > >> > > >> > Actually this is not about the guest, it's about an ARMv8 AArch32 host > >> > that has a GICv3. > >> > > >> > I just tried to do a v7 compile with your patches, and it results in an > >> > epic failure, so there's something for you to look at. > >> > > >> > >> Could you please share you config file?. I tried with multi_v7 defconfig with > >> CONFIG KVM and CONFIG_KVM_ARM_HOST enabled. it compiled for me. > > > > I think this has to do with which branch you apply your patches to. > > When applied to kvmarm/next, it fails. > > > > Here's the integration I did: > > https://git.linaro.org/people/christoffer.dall/linux-kvm-arm.git tmp-gicv3-migrate-v8 > > > > Here's the config: > > https://transfer.sh/xkAxp/.config > > > > Thanks for shareing the details, I could reproduce them. > However virt/kvm/arm/vgic/vgic-sys-reg-v3.c is written with > sys_regs_desc for AArch64. > For AArch32/v7, it has be to coproc_reg. I propose to add separate file for arm > which handles ICC* reg save/restore using coproc_reg. That might make sense. In that case they want to be moved into arch/arm/kvm/ and arch/arm64/kvm/ -Christoffer _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
On Mon, Nov 21, 2016 at 06:56:08PM +0530, Vijay Kilari wrote: > On Mon, Nov 21, 2016 at 3:49 PM, Christoffer Dall > <christoffer.dall@linaro.org> wrote: > > On Fri, Nov 18, 2016 at 10:28:34PM +0530, Vijay Kilari wrote: > >> On Thu, Nov 17, 2016 at 9:39 PM, Christoffer Dall > >> <christoffer.dall@linaro.org> wrote: > >> > On Thu, Nov 17, 2016 at 09:25:59PM +0530, Vijay Kilari wrote: > >> >> On Thu, Nov 17, 2016 at 12:22 AM, Christoffer Dall > >> >> <christoffer.dall@linaro.org> wrote: > >> >> > On Fri, Nov 04, 2016 at 04:43:32PM +0530, vijay.kilari@gmail.com wrote: > >> >> >> From: Vijaya Kumar K <Vijaya.Kumar@cavium.com> > >> >> >> > >> >> >> VGICv3 CPU interface registers are accessed using > >> >> >> KVM_DEV_ARM_VGIC_CPU_SYSREGS ioctl. These registers are accessed > >> >> >> as 64-bit. The cpu MPIDR value is passed along with register id. > >> >> >> is used to identify the cpu for registers access. > >> >> >> > >> >> >> The version of VGIC v3 specification is define here > >> >> >> http://lists.infradead.org/pipermail/linux-arm-kernel/2016-July/445611.html > >> >> >> > >> >> >> Signed-off-by: Pavel Fedin <p.fedin@samsung.com> > >> >> >> Signed-off-by: Vijaya Kumar K <Vijaya.Kumar@cavium.com> > >> >> >> --- > >> >> >> arch/arm64/include/uapi/asm/kvm.h | 3 + > >> >> >> arch/arm64/kvm/Makefile | 1 + > >> >> >> include/kvm/arm_vgic.h | 9 + > >> >> >> virt/kvm/arm/vgic/vgic-kvm-device.c | 27 +++ > >> >> >> virt/kvm/arm/vgic/vgic-mmio-v3.c | 19 +++ > >> >> >> virt/kvm/arm/vgic/vgic-sys-reg-v3.c | 324 ++++++++++++++++++++++++++++++++++++ > >> >> >> virt/kvm/arm/vgic/vgic-v3.c | 8 + > >> >> >> virt/kvm/arm/vgic/vgic.h | 4 + > >> >> >> 8 files changed, 395 insertions(+) > >> >> >> > >> >> >> diff --git a/arch/arm64/include/uapi/asm/kvm.h b/arch/arm64/include/uapi/asm/kvm.h > >> >> >> index 56dc08d..91c7137 100644 > >> >> >> --- a/arch/arm64/include/uapi/asm/kvm.h > >> >> >> +++ b/arch/arm64/include/uapi/asm/kvm.h > >> >> >> @@ -206,9 +206,12 @@ struct kvm_arch_memory_slot { > >> >> >> (0xffffffffULL << KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT) > >> >> >> #define KVM_DEV_ARM_VGIC_OFFSET_SHIFT 0 > >> >> >> #define KVM_DEV_ARM_VGIC_OFFSET_MASK (0xffffffffULL << KVM_DEV_ARM_VGIC_OFFSET_SHIFT) > >> >> >> +#define KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK (0xffff) > >> >> >> #define KVM_DEV_ARM_VGIC_GRP_NR_IRQS 3 > >> >> >> #define KVM_DEV_ARM_VGIC_GRP_CTRL 4 > >> >> >> #define KVM_DEV_ARM_VGIC_GRP_REDIST_REGS 5 > >> >> >> +#define KVM_DEV_ARM_VGIC_CPU_SYSREGS 6 > >> >> >> + > >> >> >> #define KVM_DEV_ARM_VGIC_CTRL_INIT 0 > >> >> >> > >> >> >> /* Device Control API on vcpu fd */ > >> >> >> diff --git a/arch/arm64/kvm/Makefile b/arch/arm64/kvm/Makefile > >> >> >> index d50a82a..1a14e29 100644 > >> >> >> --- a/arch/arm64/kvm/Makefile > >> >> >> +++ b/arch/arm64/kvm/Makefile > >> >> >> @@ -32,5 +32,6 @@ kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-mmio-v3.o > >> >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-kvm-device.o > >> >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-its.o > >> >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/irqchip.o > >> >> >> +kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-sys-reg-v3.o > >> >> > > >> >> > Thi is making me wonder: Are we properly handling GICv3 save/restore > >> >> > for AArch32 now that we have GICv3 support for AArch32? By properly I > >> >> > mean that either it is clearly only supported on AArch64 systems or it's > >> >> > supported on both AArch64 and AArch32, but it shouldn't break randomly > >> >> > on AArch32. > >> >> > >> >> It supports both AArch64 and AArch64 in handling of system registers > >> >> save/restore. > >> >> All system registers that we save/restore are 32-bit for both aarch64 > >> >> and aarch32. > >> >> Though opcode op0 should be zero for aarch32, the remaining Op and CRn codes > >> >> are same. However the codes sent by qemu is matched and register > >> >> are handled properly irrespective of AArch32 or AArch64. > >> >> > >> >> I don't have platform which support AArch32 guests to verify. > >> > > >> > Actually this is not about the guest, it's about an ARMv8 AArch32 host > >> > that has a GICv3. > >> > > >> > I just tried to do a v7 compile with your patches, and it results in an > >> > epic failure, so there's something for you to look at. > >> > > >> >> > > >> >> >> kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/arch_timer.o > >> >> >> kvm-$(CONFIG_KVM_ARM_PMU) += $(KVM)/arm/pmu.o > >> >> >> diff --git a/include/kvm/arm_vgic.h b/include/kvm/arm_vgic.h > >> >> >> index 002f092..730a18a 100644 > >> >> >> --- a/include/kvm/arm_vgic.h > >> >> >> +++ b/include/kvm/arm_vgic.h > >> >> >> @@ -71,6 +71,9 @@ struct vgic_global { > >> >> >> > >> >> >> /* GIC system register CPU interface */ > >> >> >> struct static_key_false gicv3_cpuif; > >> >> >> + > >> >> >> + /* Cache ICH_VTR_EL2 reg value */ > >> >> >> + u32 ich_vtr_el2; > >> >> >> }; > >> >> >> > >> >> >> extern struct vgic_global kvm_vgic_global_state; > >> >> >> @@ -269,6 +272,12 @@ struct vgic_cpu { > >> >> >> u64 pendbaser; > >> >> >> > >> >> >> bool lpis_enabled; > >> >> >> + > >> >> >> + /* Cache guest priority bits */ > >> >> >> + u32 num_pri_bits; > >> >> >> + > >> >> >> + /* Cache guest interrupt ID bits */ > >> >> >> + u32 num_id_bits; > >> >> >> }; > >> >> >> > >> >> >> extern struct static_key_false vgic_v2_cpuif_trap; > >> >> >> diff --git a/virt/kvm/arm/vgic/vgic-kvm-device.c b/virt/kvm/arm/vgic/vgic-kvm-device.c > >> >> >> index 6c7d30c..da532d1 100644 > >> >> >> --- a/virt/kvm/arm/vgic/vgic-kvm-device.c > >> >> >> +++ b/virt/kvm/arm/vgic/vgic-kvm-device.c > >> >> >> @@ -504,6 +504,14 @@ static int vgic_v3_attr_regs_access(struct kvm_device *dev, > >> >> >> if (!is_write) > >> >> >> *reg = tmp32; > >> >> >> break; > >> >> >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { > >> >> >> + u64 regid; > >> >> >> + > >> >> >> + regid = (attr->attr & KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK); > >> >> >> + ret = vgic_v3_cpu_sysregs_uaccess(vcpu, is_write, > >> >> >> + regid, reg); > >> >> >> + break; > >> >> >> + } > >> >> >> default: > >> >> >> ret = -EINVAL; > >> >> >> break; > >> >> >> @@ -537,6 +545,15 @@ static int vgic_v3_set_attr(struct kvm_device *dev, > >> >> >> reg = tmp32; > >> >> >> return vgic_v3_attr_regs_access(dev, attr, ®, true); > >> >> >> } > >> >> >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { > >> >> >> + u64 __user *uaddr = (u64 __user *)(long)attr->addr; > >> >> >> + u64 reg; > >> >> >> + > >> >> >> + if (get_user(reg, uaddr)) > >> >> >> + return -EFAULT; > >> >> >> + > >> >> >> + return vgic_v3_attr_regs_access(dev, attr, ®, true); > >> >> >> + } > >> >> >> } > >> >> >> return -ENXIO; > >> >> >> } > >> >> >> @@ -563,6 +580,15 @@ static int vgic_v3_get_attr(struct kvm_device *dev, > >> >> >> tmp32 = reg; > >> >> >> return put_user(tmp32, uaddr); > >> >> >> } > >> >> >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { > >> >> >> + u64 __user *uaddr = (u64 __user *)(long)attr->addr; > >> >> >> + u64 reg; > >> >> >> + > >> >> >> + ret = vgic_v3_attr_regs_access(dev, attr, ®, false); > >> >> >> + if (ret) > >> >> >> + return ret; > >> >> >> + return put_user(reg, uaddr); > >> >> >> + } > >> >> >> } > >> >> >> > >> >> >> return -ENXIO; > >> >> >> @@ -581,6 +607,7 @@ static int vgic_v3_has_attr(struct kvm_device *dev, > >> >> >> break; > >> >> >> case KVM_DEV_ARM_VGIC_GRP_DIST_REGS: > >> >> >> case KVM_DEV_ARM_VGIC_GRP_REDIST_REGS: > >> >> >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: > >> >> >> return vgic_v3_has_attr_regs(dev, attr); > >> >> >> case KVM_DEV_ARM_VGIC_GRP_NR_IRQS: > >> >> >> return 0; > >> >> >> diff --git a/virt/kvm/arm/vgic/vgic-mmio-v3.c b/virt/kvm/arm/vgic/vgic-mmio-v3.c > >> >> >> index b35fb83..519b919 100644 > >> >> >> --- a/virt/kvm/arm/vgic/vgic-mmio-v3.c > >> >> >> +++ b/virt/kvm/arm/vgic/vgic-mmio-v3.c > >> >> >> @@ -23,6 +23,7 @@ > >> >> >> > >> >> >> #include "vgic.h" > >> >> >> #include "vgic-mmio.h" > >> >> >> +#include "sys_regs.h" > >> >> >> > >> >> >> /* extract @num bytes at @offset bytes offset in data */ > >> >> >> unsigned long extract_bytes(u64 data, unsigned int offset, > >> >> >> @@ -639,6 +640,24 @@ int vgic_v3_has_attr_regs(struct kvm_device *dev, struct kvm_device_attr *attr) > >> >> >> nr_regions = ARRAY_SIZE(vgic_v3_rdbase_registers); > >> >> >> break; > >> >> >> } > >> >> >> + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { > >> >> >> + u64 reg, id; > >> >> >> + unsigned long vgic_mpidr, mpidr_reg; > >> >> >> + struct kvm_vcpu *vcpu; > >> >> >> + > >> >> >> + vgic_mpidr = (attr->attr & KVM_DEV_ARM_VGIC_V3_MPIDR_MASK) >> > >> >> >> + KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT; > >> >> >> + > >> >> >> + /* Convert plain mpidr value to MPIDR reg format */ > >> >> >> + mpidr_reg = VGIC_TO_MPIDR(vgic_mpidr); > >> >> >> + > >> >> >> + vcpu = kvm_mpidr_to_vcpu(dev->kvm, mpidr_reg); > >> >> >> + if (!vcpu) > >> >> >> + return -EINVAL; > >> >> >> + > >> >> >> + id = (attr->attr & KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK); > >> >> >> + return vgic_v3_has_cpu_sysregs_attr(vcpu, 0, id, ®); > >> >> >> + } > >> >> >> default: > >> >> >> return -ENXIO; > >> >> >> } > >> >> >> diff --git a/virt/kvm/arm/vgic/vgic-sys-reg-v3.c b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c > >> >> >> new file mode 100644 > >> >> >> index 0000000..69d8597 > >> >> >> --- /dev/null > >> >> >> +++ b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c > >> >> > > >> >> > Shouldn't we have a GPL header here? > >> >> > > >> >> >> @@ -0,0 +1,324 @@ > >> >> >> +#include <linux/irqchip/arm-gic-v3.h> > >> >> >> +#include <linux/kvm.h> > >> >> >> +#include <linux/kvm_host.h> > >> >> >> +#include <kvm/iodev.h> > >> >> >> +#include <kvm/arm_vgic.h> > >> >> >> +#include <asm/kvm_emulate.h> > >> >> >> +#include <asm/kvm_arm.h> > >> >> >> +#include <asm/kvm_mmu.h> > >> >> >> + > >> >> >> +#include "vgic.h" > >> >> >> +#include "vgic-mmio.h" > >> >> >> +#include "sys_regs.h" > >> >> >> + > >> >> >> +static bool access_gic_ctlr(struct kvm_vcpu *vcpu, struct sys_reg_params *p, > >> >> >> + const struct sys_reg_desc *r) > >> >> >> +{ > >> >> >> + struct vgic_cpu *vgic_v3_cpu = &vcpu->arch.vgic_cpu; > >> >> >> + struct vgic_vmcr vmcr; > >> >> >> + u64 val; > >> >> >> + u32 num_pri_bits, num_id_bits; > >> >> >> + > >> >> >> + vgic_get_vmcr(vcpu, &vmcr); > >> >> >> + if (p->is_write) { > >> >> >> + val = p->regval; > >> >> >> + > >> >> >> + /* > >> >> >> + * Does not allow update of ICC_CTLR_EL1 if HW does not support > >> >> >> + * guest programmed ID and PRI bits > >> >> >> + */ > >> >> > > >> >> > I would suggest rewording this comment: > >> >> > Disallow restoring VM state not supported by this hardware. > >> >> > > >> >> >> + num_pri_bits = ((val & ICC_CTLR_EL1_PRI_BITS_MASK) >> > >> >> >> + ICC_CTLR_EL1_PRI_BITS_SHIFT) + 1; > >> >> >> + if (num_pri_bits > vgic_v3_cpu->num_pri_bits) > >> >> >> + return false; > >> >> >> + > >> >> >> + vgic_v3_cpu->num_pri_bits = num_pri_bits; > >> >> > > >> >> > hmmm, this looks weird to me, because vgic_v3_cpu->num_pri_bits I don't > >> >> > understand which effect this is intended to have? > >> >> > > >> >> > Sure, it may limit what you do with other registers later, but since > >> >> > there's no ordering requirement that the ctlr be restored first, I'm not > >> >> > sure it makes sense. > >> >> > > >> >> > Also, since this field is RO in the ICH_VTR, we'll have a strange > >> >> > situation during runtime after a GICv3 restore where the > >> >> > vgic_v3_cpu->num_pri_its differs from the hardware's ICH_VTR_EL2 field, > >> >> > which is never the case if you didn't do a save/restore. > >> >> > >> >> Yes, but in any case, vgic_v3_cpu->num_pri_bits will be always less > >> >> than HW supported > >> >> value. > >> >> > >> > > >> > So answer my question: What is the intended effect of writing this > >> > value? Is it just so that if you migrate this platform back again, then > >> > you're checking compatibility with what the guest would potentially do, > >> > >> Yes > > > > Then add a comment explaining that > > > >> and also to limit the valid aprn registers access as you said above. > >> But that has ordering restriction. Which I think we should follow. > >> > > > > I'm sorry, now I'm confused. Is there an ordering requirement in the > > API, or how should we follow this? > > There is no ordering requirement mentioned in the API doc. > However the APRn registers depends on num_pri_bits. Hence first > ICC_CTLR_EL1 should be restored before APRn restore. > > If ordering is not followed then APRn registers restore is allowed > as per hw supported num_pri_bits. > > This should be mentioned in doc. How about just having a consistency check function that you call from uaccess updates to both functions, and in that way avoid requireing any ordering which is likely to not be followed etc.? Thanks, -Christoffer _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
diff --git a/arch/arm64/include/uapi/asm/kvm.h b/arch/arm64/include/uapi/asm/kvm.h index 56dc08d..91c7137 100644 --- a/arch/arm64/include/uapi/asm/kvm.h +++ b/arch/arm64/include/uapi/asm/kvm.h @@ -206,9 +206,12 @@ struct kvm_arch_memory_slot { (0xffffffffULL << KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT) #define KVM_DEV_ARM_VGIC_OFFSET_SHIFT 0 #define KVM_DEV_ARM_VGIC_OFFSET_MASK (0xffffffffULL << KVM_DEV_ARM_VGIC_OFFSET_SHIFT) +#define KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK (0xffff) #define KVM_DEV_ARM_VGIC_GRP_NR_IRQS 3 #define KVM_DEV_ARM_VGIC_GRP_CTRL 4 #define KVM_DEV_ARM_VGIC_GRP_REDIST_REGS 5 +#define KVM_DEV_ARM_VGIC_CPU_SYSREGS 6 + #define KVM_DEV_ARM_VGIC_CTRL_INIT 0 /* Device Control API on vcpu fd */ diff --git a/arch/arm64/kvm/Makefile b/arch/arm64/kvm/Makefile index d50a82a..1a14e29 100644 --- a/arch/arm64/kvm/Makefile +++ b/arch/arm64/kvm/Makefile @@ -32,5 +32,6 @@ kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-mmio-v3.o kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-kvm-device.o kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-its.o kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/irqchip.o +kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-sys-reg-v3.o kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/arch_timer.o kvm-$(CONFIG_KVM_ARM_PMU) += $(KVM)/arm/pmu.o diff --git a/include/kvm/arm_vgic.h b/include/kvm/arm_vgic.h index 002f092..730a18a 100644 --- a/include/kvm/arm_vgic.h +++ b/include/kvm/arm_vgic.h @@ -71,6 +71,9 @@ struct vgic_global { /* GIC system register CPU interface */ struct static_key_false gicv3_cpuif; + + /* Cache ICH_VTR_EL2 reg value */ + u32 ich_vtr_el2; }; extern struct vgic_global kvm_vgic_global_state; @@ -269,6 +272,12 @@ struct vgic_cpu { u64 pendbaser; bool lpis_enabled; + + /* Cache guest priority bits */ + u32 num_pri_bits; + + /* Cache guest interrupt ID bits */ + u32 num_id_bits; }; extern struct static_key_false vgic_v2_cpuif_trap; diff --git a/virt/kvm/arm/vgic/vgic-kvm-device.c b/virt/kvm/arm/vgic/vgic-kvm-device.c index 6c7d30c..da532d1 100644 --- a/virt/kvm/arm/vgic/vgic-kvm-device.c +++ b/virt/kvm/arm/vgic/vgic-kvm-device.c @@ -504,6 +504,14 @@ static int vgic_v3_attr_regs_access(struct kvm_device *dev, if (!is_write) *reg = tmp32; break; + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { + u64 regid; + + regid = (attr->attr & KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK); + ret = vgic_v3_cpu_sysregs_uaccess(vcpu, is_write, + regid, reg); + break; + } default: ret = -EINVAL; break; @@ -537,6 +545,15 @@ static int vgic_v3_set_attr(struct kvm_device *dev, reg = tmp32; return vgic_v3_attr_regs_access(dev, attr, ®, true); } + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { + u64 __user *uaddr = (u64 __user *)(long)attr->addr; + u64 reg; + + if (get_user(reg, uaddr)) + return -EFAULT; + + return vgic_v3_attr_regs_access(dev, attr, ®, true); + } } return -ENXIO; } @@ -563,6 +580,15 @@ static int vgic_v3_get_attr(struct kvm_device *dev, tmp32 = reg; return put_user(tmp32, uaddr); } + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { + u64 __user *uaddr = (u64 __user *)(long)attr->addr; + u64 reg; + + ret = vgic_v3_attr_regs_access(dev, attr, ®, false); + if (ret) + return ret; + return put_user(reg, uaddr); + } } return -ENXIO; @@ -581,6 +607,7 @@ static int vgic_v3_has_attr(struct kvm_device *dev, break; case KVM_DEV_ARM_VGIC_GRP_DIST_REGS: case KVM_DEV_ARM_VGIC_GRP_REDIST_REGS: + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: return vgic_v3_has_attr_regs(dev, attr); case KVM_DEV_ARM_VGIC_GRP_NR_IRQS: return 0; diff --git a/virt/kvm/arm/vgic/vgic-mmio-v3.c b/virt/kvm/arm/vgic/vgic-mmio-v3.c index b35fb83..519b919 100644 --- a/virt/kvm/arm/vgic/vgic-mmio-v3.c +++ b/virt/kvm/arm/vgic/vgic-mmio-v3.c @@ -23,6 +23,7 @@ #include "vgic.h" #include "vgic-mmio.h" +#include "sys_regs.h" /* extract @num bytes at @offset bytes offset in data */ unsigned long extract_bytes(u64 data, unsigned int offset, @@ -639,6 +640,24 @@ int vgic_v3_has_attr_regs(struct kvm_device *dev, struct kvm_device_attr *attr) nr_regions = ARRAY_SIZE(vgic_v3_rdbase_registers); break; } + case KVM_DEV_ARM_VGIC_CPU_SYSREGS: { + u64 reg, id; + unsigned long vgic_mpidr, mpidr_reg; + struct kvm_vcpu *vcpu; + + vgic_mpidr = (attr->attr & KVM_DEV_ARM_VGIC_V3_MPIDR_MASK) >> + KVM_DEV_ARM_VGIC_V3_MPIDR_SHIFT; + + /* Convert plain mpidr value to MPIDR reg format */ + mpidr_reg = VGIC_TO_MPIDR(vgic_mpidr); + + vcpu = kvm_mpidr_to_vcpu(dev->kvm, mpidr_reg); + if (!vcpu) + return -EINVAL; + + id = (attr->attr & KVM_DEV_ARM_VGIC_SYSREG_INSTR_MASK); + return vgic_v3_has_cpu_sysregs_attr(vcpu, 0, id, ®); + } default: return -ENXIO; } diff --git a/virt/kvm/arm/vgic/vgic-sys-reg-v3.c b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c new file mode 100644 index 0000000..69d8597 --- /dev/null +++ b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c @@ -0,0 +1,324 @@ +#include <linux/irqchip/arm-gic-v3.h> +#include <linux/kvm.h> +#include <linux/kvm_host.h> +#include <kvm/iodev.h> +#include <kvm/arm_vgic.h> +#include <asm/kvm_emulate.h> +#include <asm/kvm_arm.h> +#include <asm/kvm_mmu.h> + +#include "vgic.h" +#include "vgic-mmio.h" +#include "sys_regs.h" + +static bool access_gic_ctlr(struct kvm_vcpu *vcpu, struct sys_reg_params *p, + const struct sys_reg_desc *r) +{ + struct vgic_cpu *vgic_v3_cpu = &vcpu->arch.vgic_cpu; + struct vgic_vmcr vmcr; + u64 val; + u32 num_pri_bits, num_id_bits; + + vgic_get_vmcr(vcpu, &vmcr); + if (p->is_write) { + val = p->regval; + + /* + * Does not allow update of ICC_CTLR_EL1 if HW does not support + * guest programmed ID and PRI bits + */ + num_pri_bits = ((val & ICC_CTLR_EL1_PRI_BITS_MASK) >> + ICC_CTLR_EL1_PRI_BITS_SHIFT) + 1; + if (num_pri_bits > vgic_v3_cpu->num_pri_bits) + return false; + + vgic_v3_cpu->num_pri_bits = num_pri_bits; + + num_id_bits = (val & ICC_CTLR_EL1_ID_BITS_MASK) >> + ICC_CTLR_EL1_ID_BITS_SHIFT; + if (num_id_bits > vgic_v3_cpu->num_id_bits) + return false; + + vgic_v3_cpu->num_id_bits = num_id_bits; + + vmcr.ctlr &= ~(ICH_VMCR_CBPR_MASK | ICH_VMCR_EOIM_MASK); + vmcr.ctlr |= ((val & ICC_CTLR_EL1_CBPR_MASK) >> + ICC_CTLR_EL1_CBPR_SHIFT) << ICH_VMCR_CBPR_SHIFT; + vmcr.ctlr |= ((val & ICC_CTLR_EL1_EOImode_MASK) >> + ICC_CTLR_EL1_EOImode_SHIFT) << + ICH_VMCR_EOIM_SHIFT; + vgic_set_vmcr(vcpu, &vmcr); + } else { + val = 0; + val |= (vgic_v3_cpu->num_pri_bits - 1) << + ICC_CTLR_EL1_PRI_BITS_SHIFT; + val |= vgic_v3_cpu->num_id_bits << + ICC_CTLR_EL1_ID_BITS_SHIFT; + val |= ((kvm_vgic_global_state.ich_vtr_el2 & + ICH_VTR_SEIS_MASK) >> ICH_VTR_SEIS_SHIFT) << + ICC_CTLR_EL1_SEIS_SHIFT; + val |= ((kvm_vgic_global_state.ich_vtr_el2 & + ICH_VTR_A3V_MASK) >> ICH_VTR_A3V_SHIFT) << + ICC_CTLR_EL1_A3V_SHIFT; + val |= ((vmcr.ctlr & ICH_VMCR_CBPR_MASK) >> + ICH_VMCR_CBPR_SHIFT) << ICC_CTLR_EL1_CBPR_SHIFT; + val |= ((vmcr.ctlr & ICH_VMCR_EOIM_MASK) >> + ICH_VMCR_EOIM_SHIFT) << ICC_CTLR_EL1_EOImode_SHIFT; + + p->regval = val; + } + + return true; +} + +static bool access_gic_pmr(struct kvm_vcpu *vcpu, struct sys_reg_params *p, + const struct sys_reg_desc *r) +{ + struct vgic_vmcr vmcr; + + vgic_get_vmcr(vcpu, &vmcr); + if (p->is_write) { + vmcr.pmr = (p->regval & ICC_PMR_EL1_MASK) >> ICC_PMR_EL1_SHIFT; + vgic_set_vmcr(vcpu, &vmcr); + } else { + p->regval = (vmcr.pmr << ICC_PMR_EL1_SHIFT) & ICC_PMR_EL1_MASK; + } + + return true; +} + +static bool access_gic_bpr0(struct kvm_vcpu *vcpu, struct sys_reg_params *p, + const struct sys_reg_desc *r) +{ + struct vgic_vmcr vmcr; + + vgic_get_vmcr(vcpu, &vmcr); + if (p->is_write) { + vmcr.bpr = (p->regval & ICC_BPR0_EL1_MASK) >> + ICC_BPR0_EL1_SHIFT; + vgic_set_vmcr(vcpu, &vmcr); + } else { + p->regval = (vmcr.bpr << ICC_BPR0_EL1_SHIFT) & + ICC_BPR0_EL1_MASK; + } + + return true; +} + +static bool access_gic_bpr1(struct kvm_vcpu *vcpu, struct sys_reg_params *p, + const struct sys_reg_desc *r) +{ + struct vgic_vmcr vmcr; + + if (!p->is_write) + p->regval = 0; + + vgic_get_vmcr(vcpu, &vmcr); + if (!((vmcr.ctlr & ICH_VMCR_CBPR_MASK) >> ICH_VMCR_CBPR_SHIFT)) { + if (p->is_write) { + vmcr.abpr = (p->regval & ICC_BPR1_EL1_MASK) >> + ICC_BPR1_EL1_SHIFT; + vgic_set_vmcr(vcpu, &vmcr); + } else { + p->regval = (vmcr.abpr << ICC_BPR1_EL1_SHIFT) & + ICC_BPR1_EL1_MASK; + } + } else { + if (!p->is_write) + p->regval = min((vmcr.bpr + 1), 7U); + } + + return true; +} + +static bool access_gic_grpen0(struct kvm_vcpu *vcpu, struct sys_reg_params *p, + const struct sys_reg_desc *r) +{ + struct vgic_vmcr vmcr; + + vgic_get_vmcr(vcpu, &vmcr); + if (p->is_write) { + vmcr.grpen0 = (p->regval & ICC_IGRPEN0_EL1_MASK) >> + ICC_IGRPEN0_EL1_SHIFT; + vgic_set_vmcr(vcpu, &vmcr); + } else { + p->regval = (vmcr.grpen0 << ICC_IGRPEN0_EL1_SHIFT) & + ICC_IGRPEN0_EL1_MASK; + } + + return true; +} + +static bool access_gic_grpen1(struct kvm_vcpu *vcpu, struct sys_reg_params *p, + const struct sys_reg_desc *r) +{ + struct vgic_vmcr vmcr; + + vgic_get_vmcr(vcpu, &vmcr); + if (p->is_write) { + vmcr.grpen1 = (p->regval & ICC_IGRPEN1_EL1_MASK) >> + ICC_IGRPEN1_EL1_SHIFT; + vgic_set_vmcr(vcpu, &vmcr); + } else { + p->regval = (vmcr.grpen1 << ICC_IGRPEN1_EL1_SHIFT) & + ICC_IGRPEN1_EL1_MASK; + } + + return true; +} + +static void vgic_v3_access_apr_reg(struct kvm_vcpu *vcpu, + struct sys_reg_params *p, u8 apr, u8 idx) +{ + struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3; + uint32_t *ap_reg; + + if (apr) + ap_reg = &vgicv3->vgic_ap1r[idx]; + else + ap_reg = &vgicv3->vgic_ap0r[idx]; + + if (p->is_write) + *ap_reg = p->regval; + else + p->regval = *ap_reg; +} + +static void access_gic_aprn(struct kvm_vcpu *vcpu, struct sys_reg_params *p, + const struct sys_reg_desc *r, u8 apr) +{ + struct vgic_cpu *vgic_v3_cpu = &vcpu->arch.vgic_cpu; + u8 idx = r->Op2 & 3; + + switch (vgic_v3_cpu->num_pri_bits) { + case 7: + if (idx > 3) + goto err; + vgic_v3_access_apr_reg(vcpu, p, apr, idx); + break; + case 6: + if (idx > 1) + goto err; + vgic_v3_access_apr_reg(vcpu, p, apr, idx); + break; + default: + if (idx > 0) + goto err; + vgic_v3_access_apr_reg(vcpu, p, apr, idx); + } + + return; +err: + if (!p->is_write) + p->regval = 0; +} + +static bool access_gic_ap0r(struct kvm_vcpu *vcpu, struct sys_reg_params *p, + const struct sys_reg_desc *r) +{ + access_gic_aprn(vcpu, p, r, 0); + + return true; +} + +static bool access_gic_ap1r(struct kvm_vcpu *vcpu, struct sys_reg_params *p, + const struct sys_reg_desc *r) +{ + access_gic_aprn(vcpu, p, r, 1); + + return true; +} + +static bool access_gic_sre(struct kvm_vcpu *vcpu, struct sys_reg_params *p, + const struct sys_reg_desc *r) +{ + struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3; + + /* Validate SRE bit */ + if (p->is_write) { + if (!(p->regval & ICC_SRE_EL1_SRE)) + return false; + } else { + p->regval = vgicv3->vgic_sre; + } + + return true; +} + +static const struct sys_reg_desc gic_v3_icc_reg_descs[] = { + /* ICC_PMR_EL1 */ + { Op0(3), Op1(0), CRn(4), CRm(6), Op2(0), access_gic_pmr }, + /* ICC_BPR0_EL1 */ + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(3), access_gic_bpr0 }, + /* ICC_AP0R0_EL1 */ + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(4), access_gic_ap0r }, + /* ICC_AP0R1_EL1 */ + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(5), access_gic_ap0r }, + /* ICC_AP0R2_EL1 */ + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(6), access_gic_ap0r }, + /* ICC_AP0R3_EL1 */ + { Op0(3), Op1(0), CRn(12), CRm(8), Op2(7), access_gic_ap0r }, + /* ICC_AP1R0_EL1 */ + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(0), access_gic_ap1r }, + /* ICC_AP1R1_EL1 */ + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(1), access_gic_ap1r }, + /* ICC_AP1R2_EL1 */ + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(2), access_gic_ap1r }, + /* ICC_AP1R3_EL1 */ + { Op0(3), Op1(0), CRn(12), CRm(9), Op2(3), access_gic_ap1r }, + /* ICC_BPR1_EL1 */ + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(3), access_gic_bpr1 }, + /* ICC_CTLR_EL1 */ + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(4), access_gic_ctlr }, + /* ICC_SRE_EL1 */ + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(5), access_gic_sre }, + /* ICC_IGRPEN0_EL1 */ + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(6), access_gic_grpen0 }, + /* ICC_GRPEN1_EL1 */ + { Op0(3), Op1(0), CRn(12), CRm(12), Op2(7), access_gic_grpen1 }, +}; + +int vgic_v3_has_cpu_sysregs_attr(struct kvm_vcpu *vcpu, bool is_write, u64 id, + u64 *reg) +{ + struct sys_reg_params params; + u64 sysreg = (id & KVM_DEV_ARM_VGIC_SYSREG_MASK) | KVM_REG_SIZE_U64; + + params.regval = *reg; + params.is_write = is_write; + params.is_aarch32 = false; + params.is_32bit = false; + + if (find_reg_by_id(sysreg, ¶ms, gic_v3_icc_reg_descs, + ARRAY_SIZE(gic_v3_icc_reg_descs))) + return 0; + + return -ENXIO; +} + +int vgic_v3_cpu_sysregs_uaccess(struct kvm_vcpu *vcpu, bool is_write, u64 id, + u64 *reg) +{ + struct sys_reg_params params; + const struct sys_reg_desc *r; + u64 sysreg = (id & KVM_DEV_ARM_VGIC_SYSREG_MASK) | KVM_REG_SIZE_U64; + + if (is_write) + params.regval = *reg; + params.is_write = is_write; + params.is_aarch32 = false; + params.is_32bit = false; + + r = find_reg_by_id(sysreg, ¶ms, gic_v3_icc_reg_descs, + ARRAY_SIZE(gic_v3_icc_reg_descs)); + if (!r) + return -ENXIO; + + if (!r->access(vcpu, ¶ms, r)) + return -EINVAL; + + if (!is_write) + *reg = params.regval; + + return 0; +} diff --git a/virt/kvm/arm/vgic/vgic-v3.c b/virt/kvm/arm/vgic/vgic-v3.c index 967c295..1139971 100644 --- a/virt/kvm/arm/vgic/vgic-v3.c +++ b/virt/kvm/arm/vgic/vgic-v3.c @@ -228,6 +228,13 @@ void vgic_v3_enable(struct kvm_vcpu *vcpu) vgic_v3->vgic_sre = 0; } + vcpu->arch.vgic_cpu.num_id_bits = (kvm_vgic_global_state.ich_vtr_el2 & + ICH_VTR_ID_BITS_MASK) >> + ICH_VTR_ID_BITS_SHIFT; + vcpu->arch.vgic_cpu.num_pri_bits = ((kvm_vgic_global_state.ich_vtr_el2 & + ICH_VTR_PRI_BITS_MASK) >> + ICH_VTR_PRI_BITS_SHIFT) + 1; + /* Get the show on the road... */ vgic_v3->vgic_hcr = ICH_HCR_EN; } @@ -328,6 +335,7 @@ int vgic_v3_probe(const struct gic_kvm_info *info) */ kvm_vgic_global_state.nr_lr = (ich_vtr_el2 & 0xf) + 1; kvm_vgic_global_state.can_emulate_gicv2 = false; + kvm_vgic_global_state.ich_vtr_el2 = ich_vtr_el2; if (!info->vcpu.start) { kvm_info("GICv3: no GICV resource entry\n"); diff --git a/virt/kvm/arm/vgic/vgic.h b/virt/kvm/arm/vgic/vgic.h index c461f6b..0e632d0 100644 --- a/virt/kvm/arm/vgic/vgic.h +++ b/virt/kvm/arm/vgic/vgic.h @@ -126,6 +126,10 @@ int vgic_v3_dist_uaccess(struct kvm_vcpu *vcpu, bool is_write, int offset, u32 *val); int vgic_v3_redist_uaccess(struct kvm_vcpu *vcpu, bool is_write, int offset, u32 *val); +int vgic_v3_cpu_sysregs_uaccess(struct kvm_vcpu *vcpu, bool is_write, + u64 id, u64 *val); +int vgic_v3_has_cpu_sysregs_attr(struct kvm_vcpu *vcpu, bool is_write, u64 id, + u64 *reg); #else static inline int vgic_register_its_iodevs(struct kvm *kvm) {