[PATCH v6 19/24] KVM: arm64: vgic-its: Collection table save/restore
Auger Eric
eric.auger at redhat.com
Fri May 5 07:43:19 PDT 2017
Hi,
On 05/05/2017 16:28, Auger Eric wrote:
> Hi
>
> On 05/05/2017 14:28, Christoffer Dall wrote:
>> On Thu, May 04, 2017 at 01:44:39PM +0200, Eric Auger wrote:
>>> The save path copies the collection entries into guest RAM
>>> at the GPA specified in the BASER register. This obviously
>>> requires the BASER to be set. The last written element is a
>>> dummy collection table entry.
>>>
>>> We do not index by collection ID as the collection entry
>>> can fit into 8 bytes while containing the collection ID.
>>>
>>> On restore path we re-allocate the collection objects.
>>>
>>> Signed-off-by: Eric Auger <eric.auger at redhat.com>
>>>
>>> ---
>>> v5 -> v6:
>>> - remove the valid pointer from vgic_its_restore_cte and
>>> return +1 if no error and last elt not found
>>> - check the BASER valid bit
>>> - add BUG_ON to check esz versus val size
>>>
>>> v4 -> v5:
>>> - add macros for field encoding/decoding
>>> - use abi->cte_esz
>>> - rename flush into save
>>> - check the target_addr is valid
>>>
>>> v3 -> v4:
>>> - replaced u64 *ptr by gpa_t gpa
>>> - check the collection does not exist before allocating it
>>>
>>> v1 -> v2:
>>> - reword commit message and directly use 8 as entry size
>>> - no kvm parameter anymore
>>> - add helper for flush/restore cte
>>> - table size computed here
>>> - add le64/cpu conversions
>>> ---
>>> virt/kvm/arm/vgic/vgic-its.c | 102 ++++++++++++++++++++++++++++++++++++++++++-
>>> virt/kvm/arm/vgic/vgic.h | 9 ++++
>>> 2 files changed, 109 insertions(+), 2 deletions(-)
>>>
>>> diff --git a/virt/kvm/arm/vgic/vgic-its.c b/virt/kvm/arm/vgic/vgic-its.c
>>> index 1db7e38..6bef9147 100644
>>> --- a/virt/kvm/arm/vgic/vgic-its.c
>>> +++ b/virt/kvm/arm/vgic/vgic-its.c
>>> @@ -1804,13 +1804,91 @@ static int vgic_its_restore_device_tables(struct vgic_its *its)
>>> return -ENXIO;
>>> }
>>>
>>> +static int vgic_its_save_cte(struct vgic_its *its,
>>> + struct its_collection *collection,
>>> + gpa_t gpa, int esz)
>>> +{
>>> + u64 val;
>>> +
>>> + val = (1ULL << KVM_ITS_CTE_VALID_SHIFT |
>>> + ((u64)collection->target_addr << KVM_ITS_CTE_RDBASE_SHIFT) |
>>> + collection->collection_id);
>>> + val = cpu_to_le64(val);
>>> + return kvm_write_guest(its->dev->kvm, gpa, &val, esz);
>>> +}
>>> +
>>> +static int vgic_its_restore_cte(struct vgic_its *its, gpa_t gpa, int esz)
>>> +{
>>> + struct its_collection *collection;
>>> + struct kvm *kvm = its->dev->kvm;
>>> + u32 target_addr, coll_id;
>>> + u64 val;
>>> + int ret;
>>> +
>>> + BUG_ON(esz > sizeof(val));
>>> + ret = kvm_read_guest(kvm, gpa, &val, esz);
>>> + if (ret)
>>> + return ret;
>>> + val = le64_to_cpu(val);
>>> + if (!(val & KVM_ITS_CTE_VALID_MASK))
>>> + return 0;
>>> +
>>> + target_addr = (u32)(val >> KVM_ITS_CTE_RDBASE_SHIFT);
>>> + coll_id = val & KVM_ITS_CTE_ICID_MASK;
>>> +
>>> + if (target_addr >= atomic_read(&kvm->online_vcpus))
>>> + return -EINVAL;
>>> +
>>> + collection = find_collection(its, coll_id);
>>> + if (collection)
>>> + return -EEXIST;
>>> + ret = vgic_its_alloc_collection(its, &collection, coll_id);
>>> + if (ret)
>>> + return ret;
>>> + collection->target_addr = target_addr;
>>> + return 1;
>>> +}
>>> +
>>> /**
>>> * vgic_its_save_collection_table - Save the collection table into
>>> * guest RAM
>>> */
>>> static int vgic_its_save_collection_table(struct vgic_its *its)
>>> {
>>> - return -ENXIO;
>>> + const struct vgic_its_abi *abi = vgic_its_get_abi(its);
>>> + struct its_collection *collection;
>>> + u64 val;
>>> + gpa_t gpa;
>>> + size_t max_size, filled = 0;
>>> + int ret, cte_esz = abi->cte_esz;
>>> +
>>> + gpa = BASER_ADDRESS(its->baser_coll_table);
>>> + if (!gpa)
>>> + return 0;
>>> +
>>> + max_size = GITS_BASER_NR_PAGES(its->baser_coll_table) * SZ_64K;
>>> +
>>> + list_for_each_entry(collection, &its->collection_list, coll_list) {
>>> + if (filled == max_size)
>>> + return -ENOSPC;
>>
>> should this ever happen? Shouldn't we check limit in
>> vgic_its_cmd_handle_mapi() ?
> Yes you're right. This should be done in vgic_its_cmd_handle_mapc()
>>
>> We can fix that later, and it shouldn't block this patch, just asking
>> the question here because I'm noticing it.
>
> OK, I will fix that later then.
actually the check already is done in
vgic_its_alloc_collection/vgic_its_check_id called from both
mapi and mapti.
so I can directly remove the above check.
Thanks
Eric
>
> Thanks
>
> Eric
>>
>>> + ret = vgic_its_save_cte(its, collection, gpa, cte_esz);
>>> + if (ret)
>>> + return ret;
>>> + gpa += cte_esz;
>>> + filled += cte_esz;
>>> + }
>>> +
>>> + if (filled == max_size)
>>> + return 0;
>>> +
>>> + /*
>>> + * table is not fully filled, add a last dummy element
>>> + * with valid bit unset
>>> + */
>>> + val = 0;
>>> + BUG_ON(cte_esz > sizeof(val));
>>> + ret = kvm_write_guest(its->dev->kvm, gpa, &val, cte_esz);
>>> + return ret;
>>> }
>>>
>>> /**
>>> @@ -1820,7 +1898,27 @@ static int vgic_its_save_collection_table(struct vgic_its *its)
>>> */
>>> static int vgic_its_restore_collection_table(struct vgic_its *its)
>>> {
>>> - return -ENXIO;
>>> + const struct vgic_its_abi *abi = vgic_its_get_abi(its);
>>> + int cte_esz = abi->cte_esz;
>>> + size_t max_size, read = 0;
>>> + gpa_t gpa;
>>> + int ret;
>>> +
>>> + if (!(its->baser_coll_table & GITS_BASER_VALID))
>>> + return 0;
>>> +
>>> + gpa = BASER_ADDRESS(its->baser_coll_table);
>>> +
>>> + max_size = GITS_BASER_NR_PAGES(its->baser_coll_table) * SZ_64K;
>>> +
>>> + while (read < max_size) {
>>> + ret = vgic_its_restore_cte(its, gpa, cte_esz);
>>> + if (ret <= 0)
>>> + break;
>>> + gpa += cte_esz;
>>> + read += cte_esz;
>>> + }
>>> + return ret;
>>> }
>>>
>>> /**
>>> diff --git a/virt/kvm/arm/vgic/vgic.h b/virt/kvm/arm/vgic/vgic.h
>>> index 309ab64..58adcae 100644
>>> --- a/virt/kvm/arm/vgic/vgic.h
>>> +++ b/virt/kvm/arm/vgic/vgic.h
>>> @@ -73,6 +73,15 @@
>>> KVM_REG_ARM_VGIC_SYSREG_CRM_MASK | \
>>> KVM_REG_ARM_VGIC_SYSREG_OP2_MASK)
>>>
>>> +/*
>>> + * As per Documentation/virtual/kvm/devices/arm-vgic-its.txt,
>>> + * below macros are defined for ITS table entry encoding.
>>> + */
>>> +#define KVM_ITS_CTE_VALID_SHIFT 63
>>> +#define KVM_ITS_CTE_VALID_MASK BIT_ULL(63)
>>> +#define KVM_ITS_CTE_RDBASE_SHIFT 16
>>> +#define KVM_ITS_CTE_ICID_MASK GENMASK_ULL(15, 0)
>>> +
>>> static inline bool irq_is_pending(struct vgic_irq *irq)
>>> {
>>> if (irq->config == VGIC_CONFIG_EDGE)
>>> --
>>> 2.5.5
>>>
>>
>> Reviewed-by: Christoffer Dall <cdall at linaro.org>
>>
>> _______________________________________________
>> linux-arm-kernel mailing list
>> linux-arm-kernel at lists.infradead.org
>> http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
>>
More information about the linux-arm-kernel
mailing list