Re: [RFC PATCH v3 4/5] arm/arm64: vgic-new: Implement VGICv3 CPU interface access

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Sep 7, 2016 at 12:49 AM, Christoffer Dall
<christoffer.dall@xxxxxxxxxx> wrote:
> On Tue, Sep 06, 2016 at 07:43:23PM +0530, Vijay Kilari wrote:
>> Resending in plain text mode
>>
>> On Tue, Sep 6, 2016 at 7:18 PM, Vijay Kilari <vijay.kilari@xxxxxxxxx> wrote:
>> >
>> >
>> > On Tue, Aug 30, 2016 at 7:15 PM, Christoffer Dall
>> > <christoffer.dall@xxxxxxxxxx> wrote:
>> >>
>> >> On Wed, Aug 24, 2016 at 04:50:08PM +0530, vijay.kilari@xxxxxxxxx wrote:
>> >> > From: Vijaya Kumar K <Vijaya.Kumar@xxxxxxxxxx>
>> >
>> >
>> >>
>> >> > diff --git a/virt/kvm/arm/vgic/vgic-sys-reg-v3.c
>> >> > b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c
>> >>
>> >> > new file mode 100644
>> >> > index 0000000..581d053
>> >> > --- /dev/null
>> >> > +++ b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c
>> >> > @@ -0,0 +1,211 @@
>> >> > +#include <linux/irqchip/arm-gic-v3.h>
>> >> > +#include <linux/kvm.h>
>> >> > +#include <linux/kvm_host.h>
>> >> > +#include <kvm/iodev.h>
>> >> > +#include <kvm/arm_vgic.h>
>> >> > +#include <asm/kvm_emulate.h>
>> >> > +#include <asm/kvm_arm.h>
>> >> > +#include <asm/kvm_mmu.h>
>> >> > +
>> >> > +#include "vgic.h"
>> >> > +#include "vgic-mmio.h"
>> >> > +#include "sys_regs.h"
>> >> > +
>> >> > +static bool access_gic_ctlr(struct kvm_vcpu *vcpu, struct
>> >> > sys_reg_params *p,
>> >> > +                         const struct sys_reg_desc *r)
>> >> > +{
>> >> > +     struct vgic_vmcr vmcr;
>> >> > +
>> >> > +     vgic_get_vmcr(vcpu, &vmcr);
>> >> > +     if (p->is_write) {
>> >> > +             vmcr.ctlr = (u32)p->regval;
>> >> > +             vgic_set_vmcr(vcpu, &vmcr);
>> >> > +     } else {
>> >> > +             p->regval = vmcr.ctlr;
>> >> > +     }
>> >> > +
>> >>
>> >> really?  Have you looked at the spec and implementation of this or did
>> >> you just copy the v2 code?
>> >>
>> >> The ICH_VMCR_EL2 register field mappings are not identical to the ctlr
>> >> mappings.  I think this causes some rework for much of this patch, so
>> >> I'll have a look at the next revision.
>> >
>> >
>> >   ICH_VMCR_EL2.VEOIM &  ICH_VMCR_EL2.CBPR holds
>> > ICC_CTLR_EL1.EOImode & ICC_CTLR_EL1.CBPR  respectively.
>> > Remaining fields are Readonly except PHME. AFAIK, vgic is not
>> > holding ICC_CTLR_EL1 except the fields in ICH_VMCR_EL2.
>
> This function implements the accessor for ICC_CTLR_EL1 according to your
> own comment (and the system register encoding).
>
> If you planned on exposing ICH_VMCR_EL2 to userspace, then why did you
> expose it for the encoding of ICC_CTLR_EL1?
>
> More to the point, you're exposing the *VM's* state of the GIC, not
> details about the hypervisor implementation.

ICH_VMCR_EL2 provides virtual access to ICC_CTLR_EL1, PMR_EL1, BPR0_EL1,
and few more regs. So access for these registers, we rely on VMCR_EL2.
and more over VMCR_EL2 is EL2 register to expose to userspace.

>
>> >> > +     return true;
>> >> > +}
>> >> > +
>> >> > +static bool access_gic_pmr(struct kvm_vcpu *vcpu, struct sys_reg_params
>> >> > *p,
>> >> > +                        const struct sys_reg_desc *r)
>> >> > +{
>> >> > +     struct vgic_vmcr vmcr;
>> >> > +
>> >> > +     vgic_get_vmcr(vcpu, &vmcr);
>> >> > +     if (p->is_write) {
>> >> > +             vmcr.pmr = (u32)p->regval;
>> >> > +             vgic_set_vmcr(vcpu, &vmcr);
>> >> > +     } else {
>> >> > +             p->regval = vmcr.pmr;
>> >> > +     }
>> >> > +
>> >> > +     return true;
>> >> > +}
>> >> > +
>> >> > +static bool access_gic_bpr0(struct kvm_vcpu *vcpu, struct
>> >> > sys_reg_params *p,
>> >> > +                         const struct sys_reg_desc *r)
>> >> > +{
>> >> > +     struct vgic_vmcr vmcr;
>> >> > +
>> >> > +     vgic_get_vmcr(vcpu, &vmcr);
>> >> > +     if (p->is_write) {
>> >> > +             vmcr.bpr = (u32)p->regval;
>> >> > +             vgic_set_vmcr(vcpu, &vmcr);
>> >> > +     } else {
>> >> > +             p->regval = vmcr.bpr;
>> >> > +     }
>> >> > +
>> >> > +     return true;
>> >> > +}
>> >> > +
>> >> > +static bool access_gic_bpr1(struct kvm_vcpu *vcpu, struct
>> >> > sys_reg_params *p,
>> >> > +                         const struct sys_reg_desc *r)
>> >> > +{
>> >> > +     struct vgic_vmcr vmcr;
>> >> > +
>> >> > +     vgic_get_vmcr(vcpu, &vmcr);
>> >> > +     if (p->is_write) {
>> >> > +             vmcr.abpr = (u32)p->regval;
>> >> > +             vgic_set_vmcr(vcpu, &vmcr);
>> >> > +     } else {
>> >> > +             p->regval = vmcr.abpr;
>> >> > +     }
>> >> > +
>> >> > +     return true;
>> >> > +}
>> >> > +
>> >> > +static bool access_gic_grpen0(struct kvm_vcpu *vcpu, struct
>> >> > sys_reg_params *p,
>> >> > +                           const struct sys_reg_desc *r)
>> >> > +{
>> >> > +     struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;
>> >> > +
>> >> > +     if (p->is_write) {
>> >> > +             vgicv3->vgic_vmcr &= ~ICH_VMCR_ENG0;
>> >> > +             vgicv3->vgic_vmcr |= (p->regval << ICH_VMCR_ENG0_SHIFT) &
>> >> > +                                   ICH_VMCR_ENG0;
>> >> > +     } else {
>> >> > +             p->regval = (vgicv3->vgic_vmcr & ICH_VMCR_ENG0) >>
>> >> > +                          ICH_VMCR_ENG0_SHIFT;
>> >> > +     }
>> >>
>> >> so for example, why shouldn't these go through the vgic_set/get_vmcr
>> >> wrappers?
>> >
>> >
>> > The vgic_vmcr struct as below is not managing ENG0 and ENG1 fields.
>> > So could not use vgic_set/get wrappers.
>
> eh, but you could expand this structure, right?
OK, I will try to expand this structure
>
> It's strange that some things go through access functions, while others
> do not.  If there is a good reason for that, then document that somehow.
>
>> >
>> > struct vgic_vmcr {
>> >         u32     ctlr;
>> >         u32     abpr;
>> >         u32     bpr;
>> >         u32     pmr;
>> > };
>> >
>> >
>> >>
>> >>
>> >> > +
>> >> > +     return true;
>> >> > +}
>> >> > +
>> >> > +static bool access_gic_grpen1(struct kvm_vcpu *vcpu, struct
>> >> > sys_reg_params *p,
>> >> > +                           const struct sys_reg_desc *r)
>> >> > +{
>> >> > +     struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;
>> >> > +
>> >> > +     if (p->is_write) {
>> >> > +             vgicv3->vgic_vmcr &= ~ICH_VMCR_ENG1;
>> >> > +             vgicv3->vgic_vmcr |= (p->regval << ICH_VMCR_ENG1_SHIFT) &
>> >> > +                                   ICH_VMCR_ENG1;
>> >> > +     } else {
>> >> > +             p->regval = (vgicv3->vgic_vmcr & ICH_VMCR_ENG1) >>
>> >> > +                          ICH_VMCR_ENG1_SHIFT;
>> >> > +     }
>> >> > +
>> >> > +     return true;
>> >> > +}
>> >> > +
>> >> > +static bool access_gic_ap0r(struct kvm_vcpu *vcpu, struct
>> >> > sys_reg_params *p,
>> >> > +                         const struct sys_reg_desc *r)
>> >> > +{
>> >> > +     struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;
>> >> > +     u8 idx = r->Op2 & 3;
>> >> > +
>> >> > +     if (p->is_write)
>> >> > +             vgicv3->vgic_ap0r[idx] = p->regval;
>> >> > +     else
>> >> > +             p->regval = vgicv3->vgic_ap0r[idx];
>> >> > +
>> >> > +     return true;
>> >> > +}
>> >> > +
>> >> > +static bool access_gic_ap1r(struct kvm_vcpu *vcpu, struct
>> >> > sys_reg_params *p,
>> >> > +                         const struct sys_reg_desc *r)
>> >> > +{
>> >> > +     struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;
>> >> > +     u8 idx = r->Op2 & 3;
>> >> > +
>> >> > +     if (p->is_write)
>> >> > +             vgicv3->vgic_ap1r[idx] = p->regval;
>> >> > +     else
>> >> > +             p->regval = vgicv3->vgic_ap1r[idx];
>> >> > +
>> >> > +     return true;
>> >> > +}
>> >> > +
>> >> > +static const struct sys_reg_desc gic_v3_icc_reg_descs[] = {
>> >> > +     /* ICC_PMR_EL1 */
>> >> > +     { Op0(3), Op1(0), CRn(4), CRm(6), Op2(0), access_gic_pmr },
>> >> > +     /* ICC_BPR0_EL1 */
>> >> > +     { Op0(3), Op1(0), CRn(12), CRm(8), Op2(3), access_gic_bpr0 },
>> >> > +     /* ICC_AP0R0_EL1 */
>> >> > +     { Op0(3), Op1(0), CRn(12), CRm(8), Op2(4), access_gic_ap0r },
>> >> > +     /* ICC_AP0R1_EL1 */
>> >> > +     { Op0(3), Op1(0), CRn(12), CRm(8), Op2(5), access_gic_ap0r },
>> >> > +     /* ICC_AP0R2_EL1 */
>> >> > +     { Op0(3), Op1(0), CRn(12), CRm(8), Op2(6), access_gic_ap0r },
>> >> > +     /* ICC_AP0R3_EL1 */
>> >> > +     { Op0(3), Op1(0), CRn(12), CRm(8), Op2(7), access_gic_ap0r },
>> >> > +     /* ICC_AP1R0_EL1 */
>> >> > +     { Op0(3), Op1(0), CRn(12), CRm(9), Op2(0), access_gic_ap1r },
>> >> > +     /* ICC_AP1R1_EL1 */
>> >> > +     { Op0(3), Op1(0), CRn(12), CRm(9), Op2(1), access_gic_ap1r },
>> >> > +     /* ICC_AP1R2_EL1 */
>> >> > +     { Op0(3), Op1(0), CRn(12), CRm(9), Op2(2), access_gic_ap1r },
>> >> > +     /* ICC_AP1R3_EL1 */
>> >> > +     { Op0(3), Op1(0), CRn(12), CRm(9), Op2(3), access_gic_ap1r },
>> >> > +     /* ICC_BPR1_EL1 */
>> >> > +     { Op0(3), Op1(0), CRn(12), CRm(12), Op2(3), access_gic_bpr1 },
>> >> > +     /* ICC_CTLR_EL1 */
>> >> > +     { Op0(3), Op1(0), CRn(12), CRm(12), Op2(4), access_gic_ctlr },
>> >> > +     /* ICC_IGRPEN0_EL1 */
>> >> > +     { Op0(3), Op1(0), CRn(12), CRm(12), Op2(6), access_gic_grpen0 },
>> >> > +     /* ICC_GRPEN1_EL1 */
>> >> > +     { Op0(3), Op1(0), CRn(12), CRm(12), Op2(7), access_gic_grpen1 },
>> >>
>> >> Do we need to allow userspace to at least read ICC_SRE_EL1?
>> >
>> >
>> > ICC_SRE_EL1.SRE is enabled at vgic initialization and DIB and FDB are not
>> > configured.
>> >     So save and restore does not make any effect.
>
> I know, but that doesn't mean that userspace shouldn't be able to tell
> what the result of the vgic initialization was by looking at the
> register.
>
Ok, I will save and restore this registers with some verification in
userspace.

> So I am looking for slightly better arguments than 'it doesn't seem to
> matter in practice right now'.
>
>> >
>> >>
>> >> Should we verify that the DIB and FDB fields of that register are
>> >> written as the system understands them (clear, WI)?
>> >
>> >
>> >   What kind of verification we can do on DIB and FDB by userspace?.
>
> That userspace tries to write a value as it thinks they should be and
> the kernel code checks that this corresponds to the underlying hardware.
>
>> >>
>> >>
>> >> > +
>> >> > +int vgic_v3_cpu_sysregs_uaccess(struct kvm_vcpu *vcpu, bool is_write,
>> >> > u64 id,
>> >> > +                             u64 *reg)
>> >> > +{
>> >> > +     struct sys_reg_params params;
>> >> > +     const struct sys_reg_desc *r;
>> >> > +
>> >> > +     if (is_write)
>> >> > +             params.regval = le64_to_cpu(*reg);
>> >>
>> >> why do we need this conversion here?
>> >>
>> >    The registers are managed in LE mode.
>
> What do you mean?  They are stored as typed values, right?  Why is
> endianness a factor here.
>
> System registers are registers, they do not have an endianness.
>
>
>> >  So here the value to be
>> > writtern is coverted to LE mode and similarly on reading back it is
>> > converted
>> > from LE.
>> >
>
> I don't understand where you feel the mismatch in endianness comes from?
>
> The reason why we use vgic_data_host_to_mmio_bus() is historic and I
> think we can actually get rid of that in the uaccess part.  (Looking at
> the symmetry between vgic_uaccess and vgic_mmio_uaccess_{read,write}
> should tell us that this is completely unnecessary and we can just
> replace the prototype to take an unsigned long instead of a void * for
> the val parameter.)
>
> Can you provide an example of how it goes bad if you don't have this
> conversion?

You have added a comment for vgic_uaccess() that conversion is required
from the patch commit c3199f28e09496aa9fec9313b4f6e90e7dc913f0
"KVM: arm/arm64: vgic-new: Export register access interface"

If sysregs does not have endianess, then this conversion can be dropped
for sysregs.

>
> Thanks,
> -Christoffer
>
>> >> > +     params.is_write = is_write;
>> >> > +     params.is_aarch32 = false;
>> >> > +     params.is_32bit = false;
>> >> > +
>> >> > +     r = find_reg_by_id(id, &params, gic_v3_icc_reg_descs,
>> >> > +                        ARRAY_SIZE(gic_v3_icc_reg_descs));
>> >> > +     if (!r)
>> >> > +             return -ENXIO;
>> >> > +
>> >> > +     if (!r->access(vcpu, &params, r))
>> >> > +             return -EINVAL;
>> >> > +
>> >> > +     if (!is_write)
>> >> > +             *reg = cpu_to_le64(params.regval);
>> >>
>> >> same question as above
>> >>
>> >
_______________________________________________
kvmarm mailing list
kvmarm@xxxxxxxxxxxxxxxxxxxxx
https://lists.cs.columbia.edu/mailman/listinfo/kvmarm



[Index of Archives]     [Linux KVM]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux