On Sun, Aug 25, 2013 at 04:21:58PM +0100, Alexander Graf wrote:
On 23.08.2013, at 20:20, Christoffer Dall wrote:
Add infrastructure to handle distributor and cpu interface register accesses through the KVM_{GET/SET}_DEVICE_ATTR interface by adding the KVM_DEV_ARM_VGIC_GRP_DIST_REGS and KVM_DEV_ARM_VGIC_GRP_CPU_REGS groups and defining the semantics of the attr field to be the MMIO offset as specified in the GICv2 specs.
Missing register accesses or other changes in individual register access functions to support save/restore of the VGIC state is added in subsequent patches.
Signed-off-by: Christoffer Dall christoffer.dall@linaro.org
Documentation/virtual/kvm/devices/arm-vgic.txt | 35 ++++++ virt/kvm/arm/vgic.c | 143 ++++++++++++++++++++++++ 2 files changed, 178 insertions(+)
diff --git a/Documentation/virtual/kvm/devices/arm-vgic.txt b/Documentation/virtual/kvm/devices/arm-vgic.txt index c9febb2..1b68475 100644 --- a/Documentation/virtual/kvm/devices/arm-vgic.txt +++ b/Documentation/virtual/kvm/devices/arm-vgic.txt @@ -19,3 +19,38 @@ Groups: KVM_VGIC_V2_ADDR_TYPE_CPU (rw, 64-bit) Base address in the guest physical address space of the GIC virtual cpu interface register mappings.
- KVM_DEV_ARM_VGIC_GRP_DIST_REGS
- Attributes:
- The attr field of kvm_device_attr encodes two values:
- bits: | 63 .... 40 | 39 .. 32 | 31 .... 0 |
- values: | reserved | cpu id | offset |
- All distributor regs are (rw, 32-bit)
- The offset is relative to the "Distributor base address" as defined in the
- GICv2 specs. Getting or setting such a register has the same effect as
- reading or writing the register on the actual hardware from the cpu
- specified with cpu id field. Note that most distributor fields are not
- banked, but return the same value regardless of the cpu id used to access
- the register.
- Limitations:
- Priorities are not implemented, and registers are RAZ/WI
- Errors:
- ENODEV: Getting or setting this register is not yet supported
- KVM_DEV_ARM_VGIC_GRP_CPU_REGS
- Attributes:
- The attr field of kvm_device_attr encodes two values:
- bits: | 63 .... 40 | 39 .. 32 | 31 .... 0 |
- values: | reserved | cpu id | offset |
- All CPU regs are (rw, 32-bit)
- The offsetspecifies the offset from the "CPU interface base address" as
offset specifies
- defined in the GICv2 specs. Getting or setting such a register has the
- same effect as reading or writing the register on the actual hardware.
- Limitations:
- Priorities are not implemented, and registers are RAZ/WI
- Errors:
- ENODEV: Getting or setting this register is not yet supported
diff --git a/virt/kvm/arm/vgic.c b/virt/kvm/arm/vgic.c index 629caeb..e31625c 100644 --- a/virt/kvm/arm/vgic.c +++ b/virt/kvm/arm/vgic.c @@ -591,11 +591,29 @@ static bool handle_mmio_sgi_reg(struct kvm_vcpu *vcpu, return false; }
+static bool handle_mmio_sgi_clear(struct kvm_vcpu *vcpu,
struct kvm_exit_mmio *mmio,
phys_addr_t offset)
+{
- return false;
+}
+static bool handle_mmio_sgi_set(struct kvm_vcpu *vcpu,
struct kvm_exit_mmio *mmio,
phys_addr_t offset)
+{
- return false;
+}
/*
- I would have liked to use the kvm_bus_io_*() API instead, but it
- cannot cope with banked registers (only the VM pointer is passed
- around, and we need the vcpu). One of these days, someone please
- fix it!
- Note that the handle_mmio implementations should not use the phys_addr
- field from the kvm_exit_mmio struct as this will not have any sane values
- when used to save/restore state from user space.
*/ struct mmio_range { phys_addr_t base; @@ -665,6 +683,16 @@ static const struct mmio_range vgic_dist_ranges[] = { .len = 4, .handle_mmio = handle_mmio_sgi_reg, },
- {
.base = GIC_DIST_SGI_CLEAR,
.len = VGIC_NR_SGIS,
.handle_mmio = handle_mmio_sgi_clear,
- },
- {
.base = GIC_DIST_SGI_SET,
.len = VGIC_NR_SGIS,
.handle_mmio = handle_mmio_sgi_set,
- }, {}
};
@@ -1543,6 +1571,80 @@ int kvm_vgic_addr(struct kvm *kvm, unsigned long type, u64 *addr, bool write) return r; }
+static bool handle_cpu_mmio_misc(struct kvm_vcpu *vcpu,
struct kvm_exit_mmio *mmio, phys_addr_t offset)
+{
- return true;
+}
+static const struct mmio_range vgic_cpu_ranges[] = {
- {
.base = GIC_CPU_CTRL,
.len = 12,
.handle_mmio = handle_cpu_mmio_misc,
- },
- {
.base = GIC_CPU_ALIAS_BINPOINT,
.len = 4,
.handle_mmio = handle_cpu_mmio_misc,
- },
- {
.base = GIC_CPU_ACTIVEPRIO,
.len = 16,
.handle_mmio = handle_cpu_mmio_misc,
- },
- {
.base = GIC_CPU_IDENT,
.len = 4,
.handle_mmio = handle_cpu_mmio_misc,
- },
+};
+static struct kvm_exit_mmio dev_attr_mmio = { .len = 4 };
+static int vgic_attr_regs_access(struct kvm_device *dev,
struct kvm_device_attr *attr,
u32 *reg, bool is_write)
+{
- const struct mmio_range *r = NULL;
- phys_addr_t offset;
- int cpuid;
- struct kvm_vcpu *vcpu;
- struct kvm_exit_mmio mmio;
- offset = attr->attr & KVM_DEV_ARM_VGIC_OFFSET_MASK;
- cpuid = (attr->attr & KVM_DEV_ARM_VGIC_CPUID_MASK) >>
KVM_DEV_ARM_VGIC_CPUID_SHIFT;
- if (cpuid >= atomic_read(&dev->kvm->online_vcpus))
return -EINVAL;
- vcpu = kvm_get_vcpu(dev->kvm, cpuid);
- mmio.len = 4;
- mmio.is_write = is_write;
- if (is_write)
memcpy(mmio.data, reg, sizeof(*reg));
Is this endianness safe?
With a big-endian kernel, no. But I suspect that breaks KVM elsewhere too. However, this is actually nicer:
diff --git a/virt/kvm/arm/vgic.c b/virt/kvm/arm/vgic.c index ea7fb5c..191ff9f 100644 --- a/virt/kvm/arm/vgic.c +++ b/virt/kvm/arm/vgic.c @@ -1622,7 +1622,7 @@ static int vgic_attr_regs_access(struct kvm_device *dev, mmio.len = 4; mmio.is_write = is_write; if (is_write) - memcpy(mmio.data, reg, sizeof(*reg)); + mmio_data_write(mmio, ~0, *reg);
if (attr->group == KVM_DEV_ARM_VGIC_GRP_DIST_REGS) r = find_matching_range(vgic_dist_ranges, &mmio, offset); @@ -1638,7 +1638,7 @@ static int vgic_attr_regs_access(struct kvm_device *dev, spin_unlock(&vcpu->kvm->arch.vgic.lock);
if (!is_write) - memcpy(reg, mmio.data, sizeof(*reg)); + *reg = mmio_data_read(mmio, ~0);
return 0; }
Thanks, -Christoffer