From patchwork Thu Jun 19 21:43:13 2014 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Chalamarla, Tirumalesh" X-Patchwork-Id: 4386441 Return-Path: X-Original-To: patchwork-linux-arm@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork1.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.19.201]) by patchwork1.web.kernel.org (Postfix) with ESMTP id F3F109F314 for ; Thu, 19 Jun 2014 21:46:04 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id EF52F203AA for ; Thu, 19 Jun 2014 21:46:03 +0000 (UTC) Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.9]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id DE190203A9 for ; Thu, 19 Jun 2014 21:46:02 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.80.1 #2 (Red Hat Linux)) id 1Wxk7U-0003SU-1G; Thu, 19 Jun 2014 21:43:44 +0000 Received: from mail-bn1blp0181.outbound.protection.outlook.com ([207.46.163.181] helo=na01-bn1-obe.outbound.protection.outlook.com) by bombadil.infradead.org with esmtps (Exim 4.80.1 #2 (Red Hat Linux)) id 1Wxk7Q-0003Mn-Hy for linux-arm-kernel@lists.infradead.org; Thu, 19 Jun 2014 21:43:41 +0000 Received: from BY2PR07MB202.namprd07.prod.outlook.com (10.242.46.13) by BY2PR07MB203.namprd07.prod.outlook.com (10.242.46.16) with Microsoft SMTP Server (TLS) id 15.0.954.9; Thu, 19 Jun 2014 21:43:17 +0000 Received: from BY2PR07MB203.namprd07.prod.outlook.com (10.242.46.16) by BY2PR07MB202.namprd07.prod.outlook.com (10.242.46.13) with Microsoft SMTP Server (TLS) id 15.0.959.24; Thu, 19 Jun 2014 21:43:15 +0000 Received: from BY2PR07MB203.namprd07.prod.outlook.com ([169.254.13.8]) by BY2PR07MB203.namprd07.prod.outlook.com ([169.254.13.8]) with mapi id 15.00.0954.000; Thu, 19 Jun 2014 21:43:14 +0000 From: "Chalamarla, Tirumalesh" To: Andre Przywara , "linux-arm-kernel@lists.infradead.org" , "kvmarm@lists.cs.columbia.edu" , "kvm@vger.kernel.org" Subject: RE: [PATCH 13/14] arm/arm64: KVM: enable kernel side of GICv3 emulation Thread-Topic: [PATCH 13/14] arm/arm64: KVM: enable kernel side of GICv3 emulation Thread-Index: AQHPi6N1OMOMozLN9EOi4pw6fzRSIJt490/g Date: Thu, 19 Jun 2014 21:43:13 +0000 Message-ID: <7783833e172b468a89c53fa18c3f3bc5@BY2PR07MB203.namprd07.prod.outlook.com> References: <1403171152-24067-1-git-send-email-andre.przywara@arm.com> <1403171152-24067-14-git-send-email-andre.przywara@arm.com> In-Reply-To: <1403171152-24067-14-git-send-email-andre.przywara@arm.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [64.2.3.195] x-microsoft-antispam: BCL:0;PCL:0;RULEID: x-forefront-prvs: 02475B2A01 x-forefront-antispam-report: SFV:NSPM; SFS:(6009001)(428001)(189002)(199002)(13464003)(377454003)(77982001)(20776003)(80022001)(66066001)(19580405001)(15975445006)(76482001)(83322001)(2201001)(81342001)(83072002)(85852003)(4396001)(92566001)(79102001)(64706001)(19580395003)(21056001)(86362001)(33646001)(105586002)(76576001)(77096002)(99396002)(76176999)(50986999)(81542001)(54356999)(46102001)(74662001)(74502001)(31966008)(87936001)(99286002)(101416001)(2171001)(2656002)(106116001)(95666004)(85306003)(74316001)(24736002); DIR:OUT; SFP:; SCL:1; SRVR:BY2PR07MB202; H:BY2PR07MB203.namprd07.prod.outlook.com; FPR:; MLV:sfv; PTR:InfoNoRecords; MX:1; A:1; LANG:en; received-spf: None (: caviumnetworks.com does not designate permitted sender hosts) authentication-results: spf=none (sender IP is ) smtp.mailfrom=Tirumalesh.Chalamarla@caviumnetworks.com; MIME-Version: 1.0 X-Microsoft-Antispam: BL:0; ACTION:Default; RISK:Low; SCL:0; SPMLVL:NotSpam; PCL:0; RULEID: X-OriginatorOrg: caviumnetworks.com X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20140619_144340_965658_956CAF50 X-CRM114-Status: GOOD ( 22.13 ) X-Spam-Score: -0.1 (/) Cc: "christoffer.dall@linaro.org" X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+patchwork-linux-arm=patchwork.kernel.org@lists.infradead.org X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, T_RP_MATCHES_RCVD, UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP -----Original Message----- From: kvmarm-bounces@lists.cs.columbia.edu [mailto:kvmarm-bounces@lists.cs.columbia.edu] On Behalf Of Andre Przywara Sent: Thursday, June 19, 2014 2:46 AM To: linux-arm-kernel@lists.infradead.org; kvmarm@lists.cs.columbia.edu; kvm@vger.kernel.org Cc: christoffer.dall@linaro.org Subject: [PATCH 13/14] arm/arm64: KVM: enable kernel side of GICv3 emulation With all the necessary GICv3 emulation code in place, we can now connect the code to the GICv3 backend in the kernel. The LR register handling is different depending on the emulated GIC model, so provide different implementations for each. Also allow non-v2-compatible GICv3 implementations (which don't provide MMIO regions for the virtual CPU interface in the DT), but restrict those hosts to use GICv3 guests only. Signed-off-by: Andre Przywara --- virt/kvm/arm/vgic-v3.c | 138 ++++++++++++++++++++++++++++++++++++++---------- virt/kvm/arm/vgic.c | 2 + 2 files changed, 112 insertions(+), 28 deletions(-) -- 1.7.9.5 diff --git a/virt/kvm/arm/vgic-v3.c b/virt/kvm/arm/vgic-v3.c index 7d9c85e..d26d12f 100644 --- a/virt/kvm/arm/vgic-v3.c +++ b/virt/kvm/arm/vgic-v3.c @@ -34,6 +34,7 @@ #define GICH_LR_VIRTUALID (0x3ffUL << 0) #define GICH_LR_PHYSID_CPUID_SHIFT (10) #define GICH_LR_PHYSID_CPUID (7UL << GICH_LR_PHYSID_CPUID_SHIFT) +#define ICH_LR_VIRTUALID_MASK (BIT_ULL(32) - 1) /* * LRs are stored in reverse order in memory. make sure we index them @@ -43,7 +44,35 @@ static u32 ich_vtr_el2; -static struct vgic_lr vgic_v3_get_lr(const struct kvm_vcpu *vcpu, int lr) +static u64 sync_lr_val(u8 state) +{ + u64 lr_val = 0; + + if (state & LR_STATE_PENDING) + lr_val |= ICH_LR_PENDING_BIT; + if (state & LR_STATE_ACTIVE) + lr_val |= ICH_LR_ACTIVE_BIT; + if (state & LR_EOI_INT) + lr_val |= ICH_LR_EOI; + + return lr_val; +} + +static u8 sync_lr_state(u64 lr_val) +{ + u8 state = 0; + + if (lr_val & ICH_LR_PENDING_BIT) + state |= LR_STATE_PENDING; + if (lr_val & ICH_LR_ACTIVE_BIT) + state |= LR_STATE_ACTIVE; + if (lr_val & ICH_LR_EOI) + state |= LR_EOI_INT; + + return state; +} + +static struct vgic_lr vgic_v2_on_v3_get_lr(const struct kvm_vcpu *vcpu, +int lr) { struct vgic_lr lr_desc; u64 val = vcpu->arch.vgic_cpu.vgic_v3.vgic_lr[LR_INDEX(lr)]; @@ -53,30 +82,53 @@ static struct vgic_lr vgic_v3_get_lr(const struct kvm_vcpu *vcpu, int lr) lr_desc.source = (val >> GICH_LR_PHYSID_CPUID_SHIFT) & 0x7; else lr_desc.source = 0; - lr_desc.state = 0; + lr_desc.state = sync_lr_state(val); - if (val & ICH_LR_PENDING_BIT) - lr_desc.state |= LR_STATE_PENDING; - if (val & ICH_LR_ACTIVE_BIT) - lr_desc.state |= LR_STATE_ACTIVE; - if (val & ICH_LR_EOI) - lr_desc.state |= LR_EOI_INT; + return lr_desc; +} + +static struct vgic_lr vgic_v3_on_v3_get_lr(const struct kvm_vcpu *vcpu, +int lr) { + struct vgic_lr lr_desc; + u64 val = vcpu->arch.vgic_cpu.vgic_v3.vgic_lr[LR_INDEX(lr)]; + + lr_desc.irq = val & ICH_LR_VIRTUALID_MASK; + lr_desc.source = 0; + lr_desc.state = sync_lr_state(val); return lr_desc; } -static void vgic_v3_set_lr(struct kvm_vcpu *vcpu, int lr, - struct vgic_lr lr_desc) +static void vgic_v3_on_v3_set_lr(struct kvm_vcpu *vcpu, int lr, + struct vgic_lr lr_desc) { - u64 lr_val = (((u32)lr_desc.source << GICH_LR_PHYSID_CPUID_SHIFT) | - lr_desc.irq); + u64 lr_val; - if (lr_desc.state & LR_STATE_PENDING) - lr_val |= ICH_LR_PENDING_BIT; - if (lr_desc.state & LR_STATE_ACTIVE) - lr_val |= ICH_LR_ACTIVE_BIT; - if (lr_desc.state & LR_EOI_INT) - lr_val |= ICH_LR_EOI; + lr_val = lr_desc.irq; + + /* + * currently all guest IRQs are Group1, as Group0 would result + * in a FIQ in the guest, which it wouldn't expect. + * Eventually we want to make this configurable, so we may revisit + * this in the future. + */ + lr_val |= ICH_LR_GROUP; + + lr_val |= sync_lr_val(lr_desc.state); + + vcpu->arch.vgic_cpu.vgic_v3.vgic_lr[LR_INDEX(lr)] = lr_val; } + +static void vgic_v2_on_v3_set_lr(struct kvm_vcpu *vcpu, int lr, + struct vgic_lr lr_desc) +{ + u64 lr_val; + + lr_val = lr_desc.irq; + + lr_val |= (u32)lr_desc.source << GICH_LR_PHYSID_CPUID_SHIFT; + + lr_val |= sync_lr_val(lr_desc.state); vcpu->arch.vgic_cpu.vgic_v3.vgic_lr[LR_INDEX(lr)] = lr_val; } @@ -145,9 +197,8 @@ static void vgic_v3_set_vmcr(struct kvm_vcpu *vcpu, struct vgic_vmcr *vmcrp) static void vgic_v3_enable(struct kvm_vcpu *vcpu) { - struct vgic_v3_cpu_if *vgic_v3; + struct vgic_v3_cpu_if *vgic_v3 = &vcpu->arch.vgic_cpu.vgic_v3; - vgic_v3 = &vcpu->arch.vgic_cpu.vgic_v3; /* * By forcing VMCR to zero, the GIC will restore the binary * points to their reset values. Anything else resets to zero @@ -155,7 +206,14 @@ static void vgic_v3_enable(struct kvm_vcpu *vcpu) */ vgic_v3->vgic_vmcr = 0; - vgic_v3->vgic_sre = 0; + /* + * Set the SRE_EL1 value depending on the configured + * emulated vGIC model. + */ + if (vcpu->kvm->arch.vgic.vgic_model == KVM_DEV_TYPE_ARM_VGIC_V3) + vgic_v3->vgic_sre = ICC_SRE_EL1_SRE; + else + vgic_v3->vgic_sre = 0; /* Get the show on the road... */ vgic_v3->vgic_hcr = ICH_HCR_EN; @@ -173,6 +231,15 @@ static const struct vgic_ops vgic_v3_ops = { .enable = vgic_v3_enable, }; +static void init_vgic_v3_emul(struct kvm *kvm) { + struct vgic_vm_ops *vm_ops = &kvm->arch.vgic.vm_ops; + + vm_ops->get_lr = vgic_v3_on_v3_get_lr; + vm_ops->set_lr = vgic_v3_on_v3_set_lr; + kvm->arch.max_vcpus = KVM_MAX_VCPUS; +} + static bool vgic_v3_init_emul_compat(struct kvm *kvm, int type) { struct vgic_vm_ops *vm_ops = &kvm->arch.vgic.vm_ops; @@ -184,14 +251,28 @@ static bool vgic_v3_init_emul_compat(struct kvm *kvm, int type) if (nr_vcpus > 8) return false; - vm_ops->get_lr = vgic_v3_get_lr; - vm_ops->set_lr = vgic_v3_set_lr; + vm_ops->get_lr = vgic_v2_on_v3_get_lr; + vm_ops->set_lr = vgic_v2_on_v3_set_lr; kvm->arch.max_vcpus = 8; return true; + case KVM_DEV_TYPE_ARM_VGIC_V3: + init_vgic_v3_emul(kvm); + return true; } return false; } +static bool vgic_v3_init_emul(struct kvm *kvm, int type) { + switch (type) { + case KVM_DEV_TYPE_ARM_VGIC_V3: + init_vgic_v3_emul(kvm); + return true; + } + + return false; +} + static struct vgic_params vgic_v3_params; /** @@ -233,12 +314,13 @@ int vgic_v3_probe(struct device_node *vgic_node, gicv_idx += 3; /* Also skip GICD, GICC, GICH */ if (of_address_to_resource(vgic_node, gicv_idx, &vcpu_res)) { - kvm_err("Cannot obtain GICV region\n"); - ret = -ENXIO; - goto out; + kvm_info("GICv3: GICv2 emulation not available\n"); + vgic->vcpu_base = 0; + vgic->init_emul = vgic_v3_init_emul; + } else { + vgic->vcpu_base = vcpu_res.start; + vgic->init_emul = vgic_v3_init_emul_compat; } Are we returning error while GICv2 emulation is request from user when it is not supported, I might have missed the code. - vgic->init_emul = vgic_v3_init_emul_compat; - vgic->vcpu_base = vcpu_res.start; vgic->vctrl_base = NULL; vgic->type = VGIC_V3; diff --git a/virt/kvm/arm/vgic.c b/virt/kvm/arm/vgic.c index fa150c7..8a584e0 100644 --- a/virt/kvm/arm/vgic.c +++ b/virt/kvm/arm/vgic.c @@ -1424,6 +1424,8 @@ static bool init_emulation_ops(struct kvm *kvm, int type) switch (type) { case KVM_DEV_TYPE_ARM_VGIC_V2: return vgic_v2_init_emulation_ops(kvm, type); + case KVM_DEV_TYPE_ARM_VGIC_V3: + return vgic_v3_init_emulation_ops(kvm, type); } return false; }