diff mbox

[RFC,v3,4/5] arm/arm64: vgic-new: Implement VGICv3 CPU interface access

Message ID 1472037609-4164-5-git-send-email-vijay.kilari@gmail.com
State New
Headers show

Commit Message

Vijay Kilari Aug. 24, 2016, 11:20 a.m. UTC
From: Vijaya Kumar K <Vijaya.Kumar@cavium.com>


VGICv3 CPU interface registers are accessed using
KVM_DEV_ARM_VGIC_CPU_SYSREGS ioctl. These registers are accessed
as 64-bit. The cpu MPIDR value is passed along with register id.
is used to identify the cpu for registers access.

The version of VGIC v3 specification is define here
http://lists.infradead.org/pipermail/linux-arm-kernel/2016-July/445611.html

Signed-off-by: Pavel Fedin <p.fedin@samsung.com>

Signed-off-by: Vijaya Kumar K <Vijaya.Kumar@cavium.com>

---
 arch/arm64/include/uapi/asm/kvm.h   |  15 ++-
 arch/arm64/kvm/Makefile             |   1 +
 include/linux/irqchip/arm-gic-v3.h  |   4 +
 virt/kvm/arm/vgic/vgic-kvm-device.c |  29 +++++
 virt/kvm/arm/vgic/vgic-mmio-v2.c    |   4 +-
 virt/kvm/arm/vgic/vgic-mmio-v3.c    |   6 +
 virt/kvm/arm/vgic/vgic-sys-reg-v3.c | 211 ++++++++++++++++++++++++++++++++++++
 virt/kvm/arm/vgic/vgic.h            |   6 +
 8 files changed, 271 insertions(+), 5 deletions(-)

-- 
1.9.1


_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

Comments

Christoffer Dall Aug. 30, 2016, 1:45 p.m. UTC | #1
On Wed, Aug 24, 2016 at 04:50:08PM +0530, vijay.kilari@gmail.com wrote:
> From: Vijaya Kumar K <Vijaya.Kumar@cavium.com>

> 

> VGICv3 CPU interface registers are accessed using

> KVM_DEV_ARM_VGIC_CPU_SYSREGS ioctl. These registers are accessed

> as 64-bit. The cpu MPIDR value is passed along with register id.

> is used to identify the cpu for registers access.

> 

> The version of VGIC v3 specification is define here

> http://lists.infradead.org/pipermail/linux-arm-kernel/2016-July/445611.html

> 

> Signed-off-by: Pavel Fedin <p.fedin@samsung.com>

> Signed-off-by: Vijaya Kumar K <Vijaya.Kumar@cavium.com>

> ---

>  arch/arm64/include/uapi/asm/kvm.h   |  15 ++-

>  arch/arm64/kvm/Makefile             |   1 +

>  include/linux/irqchip/arm-gic-v3.h  |   4 +

>  virt/kvm/arm/vgic/vgic-kvm-device.c |  29 +++++

>  virt/kvm/arm/vgic/vgic-mmio-v2.c    |   4 +-

>  virt/kvm/arm/vgic/vgic-mmio-v3.c    |   6 +

>  virt/kvm/arm/vgic/vgic-sys-reg-v3.c | 211 ++++++++++++++++++++++++++++++++++++

>  virt/kvm/arm/vgic/vgic.h            |   6 +

>  8 files changed, 271 insertions(+), 5 deletions(-)

> 

> diff --git a/arch/arm64/include/uapi/asm/kvm.h b/arch/arm64/include/uapi/asm/kvm.h

> index 94ea676..b13c944 100644

> --- a/arch/arm64/include/uapi/asm/kvm.h

> +++ b/arch/arm64/include/uapi/asm/kvm.h

> @@ -182,14 +182,14 @@ struct kvm_arch_memory_slot {

>  	KVM_REG_ARM64_SYSREG_ ## n ## _MASK)

>  

>  #define __ARM64_SYS_REG(op0,op1,crn,crm,op2) \

> -	(KVM_REG_ARM64 | KVM_REG_ARM64_SYSREG | \

> -	ARM64_SYS_REG_SHIFT_MASK(op0, OP0) | \

> +	(ARM64_SYS_REG_SHIFT_MASK(op0, OP0) | \

>  	ARM64_SYS_REG_SHIFT_MASK(op1, OP1) | \

>  	ARM64_SYS_REG_SHIFT_MASK(crn, CRN) | \

>  	ARM64_SYS_REG_SHIFT_MASK(crm, CRM) | \

>  	ARM64_SYS_REG_SHIFT_MASK(op2, OP2))


eh, no, please don't modify an exported userspace API header file in
this way.

If you want to reuse this, then add a new define for the sysreg field
generators and call that from __ARM64_SYS_REG() and from
KVM_DEV_ARM_VGIC_SYSREG.

>  

> -#define ARM64_SYS_REG(...) (__ARM64_SYS_REG(__VA_ARGS__) | KVM_REG_SIZE_U64)

> +#define ARM64_SYS_REG(...) (__ARM64_SYS_REG(__VA_ARGS__) | KVM_REG_SIZE_U64 | \

> +			    KVM_REG_ARM64 | KVM_REG_ARM64_SYSREG)

>  

>  #define KVM_REG_ARM_TIMER_CTL		ARM64_SYS_REG(3, 3, 14, 3, 1)

>  #define KVM_REG_ARM_TIMER_CNT		ARM64_SYS_REG(3, 3, 14, 3, 2)

> @@ -208,7 +208,16 @@ struct kvm_arch_memory_slot {

>  #define KVM_DEV_ARM_VGIC_GRP_NR_IRQS	3

>  #define KVM_DEV_ARM_VGIC_GRP_CTRL	4

>  #define KVM_DEV_ARM_VGIC_GRP_REDIST_REGS 5

> +#define KVM_DEV_ARM_VGIC_CPU_SYSREGS    6

> +

>  #define   KVM_DEV_ARM_VGIC_CTRL_INIT	0

> +#define   KVM_DEV_ARM_VGIC_SYSREG_MASK (KVM_REG_ARM64_SYSREG_OP0_MASK | \

> +					KVM_REG_ARM64_SYSREG_OP1_MASK | \

> +					KVM_REG_ARM64_SYSREG_CRN_MASK | \

> +					KVM_REG_ARM64_SYSREG_CRM_MASK | \

> +					KVM_REG_ARM64_SYSREG_OP2_MASK)


we didn't need this for the existing userspace to kernel sysreg
interface, why do we need this now, and even need to export it to
userspace?

> +#define   KVM_DEV_ARM_VGIC_SYSREG(op0, op1, crn, crm, op2) \

> +					__ARM64_SYS_REG(op0, op1, crn, crm, op2)

>  

>  /* Device Control API on vcpu fd */

>  #define KVM_ARM_VCPU_PMU_V3_CTRL	0

> diff --git a/arch/arm64/kvm/Makefile b/arch/arm64/kvm/Makefile

> index 695eb3c..dafbd0e 100644

> --- a/arch/arm64/kvm/Makefile

> +++ b/arch/arm64/kvm/Makefile

> @@ -31,5 +31,6 @@ kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-mmio-v3.o

>  kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-kvm-device.o

>  kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-its.o

>  kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/irqchip.o

> +kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-sys-reg-v3.o

>  kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/arch_timer.o

>  kvm-$(CONFIG_KVM_ARM_PMU) += $(KVM)/arm/pmu.o

> diff --git a/include/linux/irqchip/arm-gic-v3.h b/include/linux/irqchip/arm-gic-v3.h

> index 56b0b7e..164463b 100644

> --- a/include/linux/irqchip/arm-gic-v3.h

> +++ b/include/linux/irqchip/arm-gic-v3.h

> @@ -383,6 +383,10 @@

>  

>  #define ICH_VMCR_CTLR_SHIFT		0

>  #define ICH_VMCR_CTLR_MASK		(0x21f << ICH_VMCR_CTLR_SHIFT)

> +#define ICH_VMCR_ENG0_SHIFT		0

> +#define ICH_VMCR_ENG0			(1 << ICH_VMCR_ENG0_SHIFT)

> +#define ICH_VMCR_ENG1_SHIFT		1

> +#define ICH_VMCR_ENG1			(1 << ICH_VMCR_ENG1_SHIFT)

>  #define ICH_VMCR_BPR1_SHIFT		18

>  #define ICH_VMCR_BPR1_MASK		(7 << ICH_VMCR_BPR1_SHIFT)

>  #define ICH_VMCR_BPR0_SHIFT		21

> diff --git a/virt/kvm/arm/vgic/vgic-kvm-device.c b/virt/kvm/arm/vgic/vgic-kvm-device.c

> index 06f0158..74e5c38 100644

> --- a/virt/kvm/arm/vgic/vgic-kvm-device.c

> +++ b/virt/kvm/arm/vgic/vgic-kvm-device.c

> @@ -500,6 +500,15 @@ static int vgic_attr_regs_access_v3(struct kvm_device *dev,

>  		if (!is_write)

>  			*reg = tmp32;

>  		break;

> +	case KVM_DEV_ARM_VGIC_CPU_SYSREGS: {

> +		u64 regid;

> +

> +		regid = (attr->attr & KVM_DEV_ARM_VGIC_SYSREG_MASK) |

> +			 KVM_REG_SIZE_U64;


I think the simpler way, which is analogous to what the other sysreg
access functions do, it so simply define a mask fort the 'instr' field
(0xffff) and let the lookup function worry about the individual fields.

> +		ret = vgic_v3_cpu_sysregs_uaccess(vcpu, is_write,

> +						  regid, reg);

> +		break;

> +	}

>  	default:

>  		ret = -EINVAL;

>  		break;

> @@ -533,6 +542,15 @@ static int vgic_v3_set_attr(struct kvm_device *dev,

>  		reg = tmp32;

>  		return vgic_attr_regs_access_v3(dev, attr, &reg, true);

>  	}

> +	case KVM_DEV_ARM_VGIC_CPU_SYSREGS: {

> +		u64 __user *uaddr = (u64 __user *)(long)attr->addr;

> +		u64 reg;

> +

> +		if (get_user(reg, uaddr))

> +			return -EFAULT;

> +

> +		return vgic_attr_regs_access_v3(dev, attr, &reg, true);

> +	}

>  	}

>  	return -ENXIO;

>  }

> @@ -560,6 +578,16 @@ static int vgic_v3_get_attr(struct kvm_device *dev,

>  		ret = put_user(tmp32, uaddr);

>  		return ret;

>  	}

> +	case KVM_DEV_ARM_VGIC_CPU_SYSREGS: {

> +		u64 __user *uaddr = (u64 __user *)(long)attr->addr;

> +		u64 reg;

> +

> +		ret = vgic_attr_regs_access_v3(dev, attr, &reg, false);

> +		if (ret)

> +			return ret;

> +		ret = put_user(reg, uaddr);

> +		return ret;


nit: you can just do 'return put_user(reg, uaddr);'

> +	}

>  	}

>  

>  	return -ENXIO;

> @@ -578,6 +606,7 @@ static int vgic_v3_has_attr(struct kvm_device *dev,

>  		break;

>  	case KVM_DEV_ARM_VGIC_GRP_DIST_REGS:

>  	case KVM_DEV_ARM_VGIC_GRP_REDIST_REGS:

> +	case KVM_DEV_ARM_VGIC_CPU_SYSREGS:

>  		return vgic_v3_has_attr_regs(dev, attr);

>  	case KVM_DEV_ARM_VGIC_GRP_NR_IRQS:

>  		return 0;

> diff --git a/virt/kvm/arm/vgic/vgic-mmio-v2.c b/virt/kvm/arm/vgic/vgic-mmio-v2.c

> index cd37159..4a35eb8 100644

> --- a/virt/kvm/arm/vgic/vgic-mmio-v2.c

> +++ b/virt/kvm/arm/vgic/vgic-mmio-v2.c

> @@ -212,7 +212,7 @@ static void vgic_mmio_write_sgipends(struct kvm_vcpu *vcpu,

>  	}

>  }

>  

> -static void vgic_set_vmcr(struct kvm_vcpu *vcpu, struct vgic_vmcr *vmcr)

> +void vgic_set_vmcr(struct kvm_vcpu *vcpu, struct vgic_vmcr *vmcr)

>  {

>  	if (kvm_vgic_global_state.type == VGIC_V2)

>  		vgic_v2_set_vmcr(vcpu, vmcr);

> @@ -220,7 +220,7 @@ static void vgic_set_vmcr(struct kvm_vcpu *vcpu, struct vgic_vmcr *vmcr)

>  		vgic_v3_set_vmcr(vcpu, vmcr);

>  }

>  

> -static void vgic_get_vmcr(struct kvm_vcpu *vcpu, struct vgic_vmcr *vmcr)

> +void vgic_get_vmcr(struct kvm_vcpu *vcpu, struct vgic_vmcr *vmcr)

>  {

>  	if (kvm_vgic_global_state.type == VGIC_V2)

>  		vgic_v2_get_vmcr(vcpu, vmcr);

> diff --git a/virt/kvm/arm/vgic/vgic-mmio-v3.c b/virt/kvm/arm/vgic/vgic-mmio-v3.c

> index c2df103..61abea0 100644

> --- a/virt/kvm/arm/vgic/vgic-mmio-v3.c

> +++ b/virt/kvm/arm/vgic/vgic-mmio-v3.c

> @@ -23,6 +23,7 @@

>  

>  #include "vgic.h"

>  #include "vgic-mmio.h"

> +#include "sys_regs.h"

>  

>  /* extract @num bytes at @offset bytes offset in data */

>  unsigned long extract_bytes(unsigned long data, unsigned int offset,

> @@ -598,6 +599,11 @@ int vgic_v3_has_attr_regs(struct kvm_device *dev, struct kvm_device_attr *attr)

>  		nr_regions = ARRAY_SIZE(vgic_v3_rdbase_registers);

>  		break;

>  	}

> +	case KVM_DEV_ARM_VGIC_CPU_SYSREGS: {

> +		u64 reg;

> +

> +		return vgic_v3_has_cpu_sysregs_attr(vcpu, 0, cpuid, &reg);

> +	}

>  	default:

>  		return -ENXIO;

>  	}

> diff --git a/virt/kvm/arm/vgic/vgic-sys-reg-v3.c b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c

> new file mode 100644

> index 0000000..581d053

> --- /dev/null

> +++ b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c

> @@ -0,0 +1,211 @@

> +#include <linux/irqchip/arm-gic-v3.h>

> +#include <linux/kvm.h>

> +#include <linux/kvm_host.h>

> +#include <kvm/iodev.h>

> +#include <kvm/arm_vgic.h>

> +#include <asm/kvm_emulate.h>

> +#include <asm/kvm_arm.h>

> +#include <asm/kvm_mmu.h>

> +

> +#include "vgic.h"

> +#include "vgic-mmio.h"

> +#include "sys_regs.h"

> +

> +static bool access_gic_ctlr(struct kvm_vcpu *vcpu, struct sys_reg_params *p,

> +			    const struct sys_reg_desc *r)

> +{

> +	struct vgic_vmcr vmcr;

> +

> +	vgic_get_vmcr(vcpu, &vmcr);

> +	if (p->is_write) {

> +		vmcr.ctlr = (u32)p->regval;

> +		vgic_set_vmcr(vcpu, &vmcr);

> +	} else {

> +		p->regval = vmcr.ctlr;

> +	}

> +


really?  Have you looked at the spec and implementation of this or did
you just copy the v2 code?

The ICH_VMCR_EL2 register field mappings are not identical to the ctlr
mappings.  I think this causes some rework for much of this patch, so
I'll have a look at the next revision.

> +	return true;

> +}

> +

> +static bool access_gic_pmr(struct kvm_vcpu *vcpu, struct sys_reg_params *p,

> +			   const struct sys_reg_desc *r)

> +{

> +	struct vgic_vmcr vmcr;

> +

> +	vgic_get_vmcr(vcpu, &vmcr);

> +	if (p->is_write) {

> +		vmcr.pmr = (u32)p->regval;

> +		vgic_set_vmcr(vcpu, &vmcr);

> +	} else {

> +		p->regval = vmcr.pmr;

> +	}

> +

> +	return true;

> +}

> +

> +static bool access_gic_bpr0(struct kvm_vcpu *vcpu, struct sys_reg_params *p,

> +			    const struct sys_reg_desc *r)

> +{

> +	struct vgic_vmcr vmcr;

> +

> +	vgic_get_vmcr(vcpu, &vmcr);

> +	if (p->is_write) {

> +		vmcr.bpr = (u32)p->regval;

> +		vgic_set_vmcr(vcpu, &vmcr);

> +	} else {

> +		p->regval = vmcr.bpr;

> +	}

> +

> +	return true;

> +}

> +

> +static bool access_gic_bpr1(struct kvm_vcpu *vcpu, struct sys_reg_params *p,

> +			    const struct sys_reg_desc *r)

> +{

> +	struct vgic_vmcr vmcr;

> +

> +	vgic_get_vmcr(vcpu, &vmcr);

> +	if (p->is_write) {

> +		vmcr.abpr = (u32)p->regval;

> +		vgic_set_vmcr(vcpu, &vmcr);

> +	} else {

> +		p->regval = vmcr.abpr;

> +	}

> +

> +	return true;

> +}

> +

> +static bool access_gic_grpen0(struct kvm_vcpu *vcpu, struct sys_reg_params *p,

> +			      const struct sys_reg_desc *r)

> +{

> +	struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;

> +

> +	if (p->is_write) {

> +		vgicv3->vgic_vmcr &= ~ICH_VMCR_ENG0;

> +		vgicv3->vgic_vmcr |= (p->regval << ICH_VMCR_ENG0_SHIFT) &

> +				      ICH_VMCR_ENG0;

> +	} else {

> +		p->regval = (vgicv3->vgic_vmcr & ICH_VMCR_ENG0) >>

> +			     ICH_VMCR_ENG0_SHIFT;

> +	}


so for example, why shouldn't these go through the vgic_set/get_vmcr
wrappers?

> +

> +	return true;

> +}

> +

> +static bool access_gic_grpen1(struct kvm_vcpu *vcpu, struct sys_reg_params *p,

> +			      const struct sys_reg_desc *r)

> +{

> +	struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;

> +

> +	if (p->is_write) {

> +		vgicv3->vgic_vmcr &= ~ICH_VMCR_ENG1;

> +		vgicv3->vgic_vmcr |= (p->regval << ICH_VMCR_ENG1_SHIFT) &

> +				      ICH_VMCR_ENG1;

> +	} else {

> +		p->regval = (vgicv3->vgic_vmcr & ICH_VMCR_ENG1) >>

> +			     ICH_VMCR_ENG1_SHIFT;

> +	}

> +

> +	return true;

> +}

> +

> +static bool access_gic_ap0r(struct kvm_vcpu *vcpu, struct sys_reg_params *p,

> +			    const struct sys_reg_desc *r)

> +{

> +	struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;

> +	u8 idx = r->Op2 & 3;

> +

> +	if (p->is_write)

> +		vgicv3->vgic_ap0r[idx] = p->regval;

> +	else

> +		p->regval = vgicv3->vgic_ap0r[idx];

> +

> +	return true;

> +}

> +

> +static bool access_gic_ap1r(struct kvm_vcpu *vcpu, struct sys_reg_params *p,

> +			    const struct sys_reg_desc *r)

> +{

> +	struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;

> +	u8 idx = r->Op2 & 3;

> +

> +	if (p->is_write)

> +		vgicv3->vgic_ap1r[idx] = p->regval;

> +	else

> +		p->regval = vgicv3->vgic_ap1r[idx];

> +

> +	return true;

> +}

> +

> +static const struct sys_reg_desc gic_v3_icc_reg_descs[] = {

> +	/* ICC_PMR_EL1 */

> +	{ Op0(3), Op1(0), CRn(4), CRm(6), Op2(0), access_gic_pmr },

> +	/* ICC_BPR0_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(8), Op2(3), access_gic_bpr0 },

> +	/* ICC_AP0R0_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(8), Op2(4), access_gic_ap0r },

> +	/* ICC_AP0R1_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(8), Op2(5), access_gic_ap0r },

> +	/* ICC_AP0R2_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(8), Op2(6), access_gic_ap0r },

> +	/* ICC_AP0R3_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(8), Op2(7), access_gic_ap0r },

> +	/* ICC_AP1R0_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(9), Op2(0), access_gic_ap1r },

> +	/* ICC_AP1R1_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(9), Op2(1), access_gic_ap1r },

> +	/* ICC_AP1R2_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(9), Op2(2), access_gic_ap1r },

> +	/* ICC_AP1R3_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(9), Op2(3), access_gic_ap1r },

> +	/* ICC_BPR1_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(12), Op2(3), access_gic_bpr1 },

> +	/* ICC_CTLR_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(12), Op2(4), access_gic_ctlr },

> +	/* ICC_IGRPEN0_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(12), Op2(6), access_gic_grpen0 },

> +	/* ICC_GRPEN1_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(12), Op2(7), access_gic_grpen1 },


Do we need to allow userspace to at least read ICC_SRE_EL1?

Should we verify that the DIB and FDB fields of that register are
written as the system understands them (clear, WI)?

> +};

> +

> +int vgic_v3_has_cpu_sysregs_attr(struct kvm_vcpu *vcpu, bool is_write, u64 id,

> +				u64 *reg)

> +{

> +	struct sys_reg_params params;

> +

> +	params.regval = le64_to_cpu(*reg);

> +	params.is_write = is_write;

> +	params.is_aarch32 = false;

> +	params.is_32bit = false;

> +

> +	return find_reg_by_id(id, &params, gic_v3_icc_reg_descs,

> +			      ARRAY_SIZE(gic_v3_icc_reg_descs)) ?

> +		0 : -ENXIO;


this looks terrible, please rewrite without the ternary operator.

> +}

> +

> +int vgic_v3_cpu_sysregs_uaccess(struct kvm_vcpu *vcpu, bool is_write, u64 id,

> +				u64 *reg)

> +{

> +	struct sys_reg_params params;

> +	const struct sys_reg_desc *r;

> +

> +	if (is_write)

> +		params.regval = le64_to_cpu(*reg);


why do we need this conversion here?

> +	params.is_write = is_write;

> +	params.is_aarch32 = false;

> +	params.is_32bit = false;

> +

> +	r = find_reg_by_id(id, &params, gic_v3_icc_reg_descs,

> +			   ARRAY_SIZE(gic_v3_icc_reg_descs));

> +	if (!r)

> +		return -ENXIO;

> +

> +	if (!r->access(vcpu, &params, r))

> +		return -EINVAL;

> +

> +	if (!is_write)

> +		*reg = cpu_to_le64(params.regval);


same question as above

> +

> +	return 0;

> +}

> +

> diff --git a/virt/kvm/arm/vgic/vgic.h b/virt/kvm/arm/vgic/vgic.h

> index 14e4ce5..20eab36c 100644

> --- a/virt/kvm/arm/vgic/vgic.h

> +++ b/virt/kvm/arm/vgic/vgic.h

> @@ -96,6 +96,10 @@ int vgic_v3_dist_uaccess(struct kvm_vcpu *vcpu, bool is_write,

>  			 int offset, u32 *val);

>  int vgic_v3_redist_uaccess(struct kvm_vcpu *vcpu, bool is_write,

>  			 int offset, u32 *val);

> +int vgic_v3_cpu_sysregs_uaccess(struct kvm_vcpu *vcpu, bool is_write,

> +			 u64 id, u64 *val);

> +int vgic_v3_has_cpu_sysregs_attr(struct kvm_vcpu *vcpu, bool is_write, u64 id,

> +				u64 *reg);

>  #else

>  static inline void vgic_v3_process_maintenance(struct kvm_vcpu *vcpu)

>  {

> @@ -169,6 +173,8 @@ static inline int vgic_its_inject_msi(struct kvm *kvm, struct kvm_msi *msi)

>  #endif

>  

>  int kvm_register_vgic_device(unsigned long type);

> +void vgic_set_vmcr(struct kvm_vcpu *vcpu, struct vgic_vmcr *vmcr);

> +void vgic_get_vmcr(struct kvm_vcpu *vcpu, struct vgic_vmcr *vmcr);

>  int vgic_lazy_init(struct kvm *kvm);

>  int vgic_init(struct kvm *kvm);

>  

> -- 

> 1.9.1

> 


_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
Christoffer Dall Sept. 6, 2016, 5:10 p.m. UTC | #2
On Wed, Aug 24, 2016 at 04:50:08PM +0530, vijay.kilari@gmail.com wrote:
> From: Vijaya Kumar K <Vijaya.Kumar@cavium.com>

> 

> VGICv3 CPU interface registers are accessed using

> KVM_DEV_ARM_VGIC_CPU_SYSREGS ioctl. These registers are accessed

> as 64-bit. The cpu MPIDR value is passed along with register id.

> is used to identify the cpu for registers access.

> 

> The version of VGIC v3 specification is define here

> http://lists.infradead.org/pipermail/linux-arm-kernel/2016-July/445611.html

> 

> Signed-off-by: Pavel Fedin <p.fedin@samsung.com>

> Signed-off-by: Vijaya Kumar K <Vijaya.Kumar@cavium.com>

> ---

>  arch/arm64/include/uapi/asm/kvm.h   |  15 ++-

>  arch/arm64/kvm/Makefile             |   1 +

>  include/linux/irqchip/arm-gic-v3.h  |   4 +

>  virt/kvm/arm/vgic/vgic-kvm-device.c |  29 +++++

>  virt/kvm/arm/vgic/vgic-mmio-v2.c    |   4 +-

>  virt/kvm/arm/vgic/vgic-mmio-v3.c    |   6 +

>  virt/kvm/arm/vgic/vgic-sys-reg-v3.c | 211 ++++++++++++++++++++++++++++++++++++

>  virt/kvm/arm/vgic/vgic.h            |   6 +

>  8 files changed, 271 insertions(+), 5 deletions(-)

> 

> diff --git a/arch/arm64/include/uapi/asm/kvm.h b/arch/arm64/include/uapi/asm/kvm.h

> index 94ea676..b13c944 100644

> --- a/arch/arm64/include/uapi/asm/kvm.h

> +++ b/arch/arm64/include/uapi/asm/kvm.h

> @@ -182,14 +182,14 @@ struct kvm_arch_memory_slot {

>  	KVM_REG_ARM64_SYSREG_ ## n ## _MASK)

>  

>  #define __ARM64_SYS_REG(op0,op1,crn,crm,op2) \

> -	(KVM_REG_ARM64 | KVM_REG_ARM64_SYSREG | \

> -	ARM64_SYS_REG_SHIFT_MASK(op0, OP0) | \

> +	(ARM64_SYS_REG_SHIFT_MASK(op0, OP0) | \

>  	ARM64_SYS_REG_SHIFT_MASK(op1, OP1) | \

>  	ARM64_SYS_REG_SHIFT_MASK(crn, CRN) | \

>  	ARM64_SYS_REG_SHIFT_MASK(crm, CRM) | \

>  	ARM64_SYS_REG_SHIFT_MASK(op2, OP2))

>  

> -#define ARM64_SYS_REG(...) (__ARM64_SYS_REG(__VA_ARGS__) | KVM_REG_SIZE_U64)

> +#define ARM64_SYS_REG(...) (__ARM64_SYS_REG(__VA_ARGS__) | KVM_REG_SIZE_U64 | \

> +			    KVM_REG_ARM64 | KVM_REG_ARM64_SYSREG)

>  

>  #define KVM_REG_ARM_TIMER_CTL		ARM64_SYS_REG(3, 3, 14, 3, 1)

>  #define KVM_REG_ARM_TIMER_CNT		ARM64_SYS_REG(3, 3, 14, 3, 2)

> @@ -208,7 +208,16 @@ struct kvm_arch_memory_slot {

>  #define KVM_DEV_ARM_VGIC_GRP_NR_IRQS	3

>  #define KVM_DEV_ARM_VGIC_GRP_CTRL	4

>  #define KVM_DEV_ARM_VGIC_GRP_REDIST_REGS 5

> +#define KVM_DEV_ARM_VGIC_CPU_SYSREGS    6

> +

>  #define   KVM_DEV_ARM_VGIC_CTRL_INIT	0

> +#define   KVM_DEV_ARM_VGIC_SYSREG_MASK (KVM_REG_ARM64_SYSREG_OP0_MASK | \

> +					KVM_REG_ARM64_SYSREG_OP1_MASK | \

> +					KVM_REG_ARM64_SYSREG_CRN_MASK | \

> +					KVM_REG_ARM64_SYSREG_CRM_MASK | \

> +					KVM_REG_ARM64_SYSREG_OP2_MASK)

> +#define   KVM_DEV_ARM_VGIC_SYSREG(op0, op1, crn, crm, op2) \

> +					__ARM64_SYS_REG(op0, op1, crn, crm, op2)

>  

>  /* Device Control API on vcpu fd */

>  #define KVM_ARM_VCPU_PMU_V3_CTRL	0

> diff --git a/arch/arm64/kvm/Makefile b/arch/arm64/kvm/Makefile

> index 695eb3c..dafbd0e 100644

> --- a/arch/arm64/kvm/Makefile

> +++ b/arch/arm64/kvm/Makefile

> @@ -31,5 +31,6 @@ kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-mmio-v3.o

>  kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-kvm-device.o

>  kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-its.o

>  kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/irqchip.o

> +kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-sys-reg-v3.o

>  kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/arch_timer.o

>  kvm-$(CONFIG_KVM_ARM_PMU) += $(KVM)/arm/pmu.o

> diff --git a/include/linux/irqchip/arm-gic-v3.h b/include/linux/irqchip/arm-gic-v3.h

> index 56b0b7e..164463b 100644

> --- a/include/linux/irqchip/arm-gic-v3.h

> +++ b/include/linux/irqchip/arm-gic-v3.h

> @@ -383,6 +383,10 @@

>  

>  #define ICH_VMCR_CTLR_SHIFT		0

>  #define ICH_VMCR_CTLR_MASK		(0x21f << ICH_VMCR_CTLR_SHIFT)

> +#define ICH_VMCR_ENG0_SHIFT		0

> +#define ICH_VMCR_ENG0			(1 << ICH_VMCR_ENG0_SHIFT)

> +#define ICH_VMCR_ENG1_SHIFT		1

> +#define ICH_VMCR_ENG1			(1 << ICH_VMCR_ENG1_SHIFT)

>  #define ICH_VMCR_BPR1_SHIFT		18

>  #define ICH_VMCR_BPR1_MASK		(7 << ICH_VMCR_BPR1_SHIFT)

>  #define ICH_VMCR_BPR0_SHIFT		21

> diff --git a/virt/kvm/arm/vgic/vgic-kvm-device.c b/virt/kvm/arm/vgic/vgic-kvm-device.c

> index 06f0158..74e5c38 100644

> --- a/virt/kvm/arm/vgic/vgic-kvm-device.c

> +++ b/virt/kvm/arm/vgic/vgic-kvm-device.c

> @@ -500,6 +500,15 @@ static int vgic_attr_regs_access_v3(struct kvm_device *dev,

>  		if (!is_write)

>  			*reg = tmp32;

>  		break;

> +	case KVM_DEV_ARM_VGIC_CPU_SYSREGS: {

> +		u64 regid;

> +

> +		regid = (attr->attr & KVM_DEV_ARM_VGIC_SYSREG_MASK) |

> +			 KVM_REG_SIZE_U64;

> +		ret = vgic_v3_cpu_sysregs_uaccess(vcpu, is_write,

> +						  regid, reg);

> +		break;

> +	}

>  	default:

>  		ret = -EINVAL;

>  		break;

> @@ -533,6 +542,15 @@ static int vgic_v3_set_attr(struct kvm_device *dev,

>  		reg = tmp32;

>  		return vgic_attr_regs_access_v3(dev, attr, &reg, true);

>  	}

> +	case KVM_DEV_ARM_VGIC_CPU_SYSREGS: {

> +		u64 __user *uaddr = (u64 __user *)(long)attr->addr;

> +		u64 reg;

> +

> +		if (get_user(reg, uaddr))

> +			return -EFAULT;

> +

> +		return vgic_attr_regs_access_v3(dev, attr, &reg, true);

> +	}

>  	}

>  	return -ENXIO;

>  }

> @@ -560,6 +578,16 @@ static int vgic_v3_get_attr(struct kvm_device *dev,

>  		ret = put_user(tmp32, uaddr);

>  		return ret;

>  	}

> +	case KVM_DEV_ARM_VGIC_CPU_SYSREGS: {

> +		u64 __user *uaddr = (u64 __user *)(long)attr->addr;

> +		u64 reg;

> +

> +		ret = vgic_attr_regs_access_v3(dev, attr, &reg, false);

> +		if (ret)

> +			return ret;

> +		ret = put_user(reg, uaddr);

> +		return ret;

> +	}

>  	}

>  

>  	return -ENXIO;

> @@ -578,6 +606,7 @@ static int vgic_v3_has_attr(struct kvm_device *dev,

>  		break;

>  	case KVM_DEV_ARM_VGIC_GRP_DIST_REGS:

>  	case KVM_DEV_ARM_VGIC_GRP_REDIST_REGS:

> +	case KVM_DEV_ARM_VGIC_CPU_SYSREGS:

>  		return vgic_v3_has_attr_regs(dev, attr);

>  	case KVM_DEV_ARM_VGIC_GRP_NR_IRQS:

>  		return 0;

> diff --git a/virt/kvm/arm/vgic/vgic-mmio-v2.c b/virt/kvm/arm/vgic/vgic-mmio-v2.c

> index cd37159..4a35eb8 100644

> --- a/virt/kvm/arm/vgic/vgic-mmio-v2.c

> +++ b/virt/kvm/arm/vgic/vgic-mmio-v2.c

> @@ -212,7 +212,7 @@ static void vgic_mmio_write_sgipends(struct kvm_vcpu *vcpu,

>  	}

>  }

>  

> -static void vgic_set_vmcr(struct kvm_vcpu *vcpu, struct vgic_vmcr *vmcr)

> +void vgic_set_vmcr(struct kvm_vcpu *vcpu, struct vgic_vmcr *vmcr)

>  {

>  	if (kvm_vgic_global_state.type == VGIC_V2)

>  		vgic_v2_set_vmcr(vcpu, vmcr);

> @@ -220,7 +220,7 @@ static void vgic_set_vmcr(struct kvm_vcpu *vcpu, struct vgic_vmcr *vmcr)

>  		vgic_v3_set_vmcr(vcpu, vmcr);

>  }

>  

> -static void vgic_get_vmcr(struct kvm_vcpu *vcpu, struct vgic_vmcr *vmcr)

> +void vgic_get_vmcr(struct kvm_vcpu *vcpu, struct vgic_vmcr *vmcr)

>  {

>  	if (kvm_vgic_global_state.type == VGIC_V2)

>  		vgic_v2_get_vmcr(vcpu, vmcr);

> diff --git a/virt/kvm/arm/vgic/vgic-mmio-v3.c b/virt/kvm/arm/vgic/vgic-mmio-v3.c

> index c2df103..61abea0 100644

> --- a/virt/kvm/arm/vgic/vgic-mmio-v3.c

> +++ b/virt/kvm/arm/vgic/vgic-mmio-v3.c

> @@ -23,6 +23,7 @@

>  

>  #include "vgic.h"

>  #include "vgic-mmio.h"

> +#include "sys_regs.h"

>  

>  /* extract @num bytes at @offset bytes offset in data */

>  unsigned long extract_bytes(unsigned long data, unsigned int offset,

> @@ -598,6 +599,11 @@ int vgic_v3_has_attr_regs(struct kvm_device *dev, struct kvm_device_attr *attr)

>  		nr_regions = ARRAY_SIZE(vgic_v3_rdbase_registers);

>  		break;

>  	}

> +	case KVM_DEV_ARM_VGIC_CPU_SYSREGS: {

> +		u64 reg;

> +

> +		return vgic_v3_has_cpu_sysregs_attr(vcpu, 0, cpuid, &reg);

> +	}

>  	default:

>  		return -ENXIO;

>  	}

> diff --git a/virt/kvm/arm/vgic/vgic-sys-reg-v3.c b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c

> new file mode 100644

> index 0000000..581d053

> --- /dev/null

> +++ b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c

> @@ -0,0 +1,211 @@

> +#include <linux/irqchip/arm-gic-v3.h>

> +#include <linux/kvm.h>

> +#include <linux/kvm_host.h>

> +#include <kvm/iodev.h>

> +#include <kvm/arm_vgic.h>

> +#include <asm/kvm_emulate.h>

> +#include <asm/kvm_arm.h>

> +#include <asm/kvm_mmu.h>

> +

> +#include "vgic.h"

> +#include "vgic-mmio.h"

> +#include "sys_regs.h"

> +

> +static bool access_gic_ctlr(struct kvm_vcpu *vcpu, struct sys_reg_params *p,

> +			    const struct sys_reg_desc *r)

> +{

> +	struct vgic_vmcr vmcr;

> +

> +	vgic_get_vmcr(vcpu, &vmcr);

> +	if (p->is_write) {

> +		vmcr.ctlr = (u32)p->regval;

> +		vgic_set_vmcr(vcpu, &vmcr);

> +	} else {

> +		p->regval = vmcr.ctlr;

> +	}

> +

> +	return true;

> +}

> +

> +static bool access_gic_pmr(struct kvm_vcpu *vcpu, struct sys_reg_params *p,

> +			   const struct sys_reg_desc *r)

> +{

> +	struct vgic_vmcr vmcr;

> +

> +	vgic_get_vmcr(vcpu, &vmcr);

> +	if (p->is_write) {

> +		vmcr.pmr = (u32)p->regval;

> +		vgic_set_vmcr(vcpu, &vmcr);

> +	} else {

> +		p->regval = vmcr.pmr;

> +	}

> +

> +	return true;

> +}

> +

> +static bool access_gic_bpr0(struct kvm_vcpu *vcpu, struct sys_reg_params *p,

> +			    const struct sys_reg_desc *r)

> +{

> +	struct vgic_vmcr vmcr;

> +

> +	vgic_get_vmcr(vcpu, &vmcr);

> +	if (p->is_write) {

> +		vmcr.bpr = (u32)p->regval;

> +		vgic_set_vmcr(vcpu, &vmcr);

> +	} else {

> +		p->regval = vmcr.bpr;

> +	}

> +

> +	return true;

> +}

> +

> +static bool access_gic_bpr1(struct kvm_vcpu *vcpu, struct sys_reg_params *p,

> +			    const struct sys_reg_desc *r)

> +{

> +	struct vgic_vmcr vmcr;

> +

> +	vgic_get_vmcr(vcpu, &vmcr);

> +	if (p->is_write) {

> +		vmcr.abpr = (u32)p->regval;

> +		vgic_set_vmcr(vcpu, &vmcr);

> +	} else {

> +		p->regval = vmcr.abpr;

> +	}

> +

> +	return true;

> +}

> +

> +static bool access_gic_grpen0(struct kvm_vcpu *vcpu, struct sys_reg_params *p,

> +			      const struct sys_reg_desc *r)

> +{

> +	struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;

> +

> +	if (p->is_write) {

> +		vgicv3->vgic_vmcr &= ~ICH_VMCR_ENG0;

> +		vgicv3->vgic_vmcr |= (p->regval << ICH_VMCR_ENG0_SHIFT) &

> +				      ICH_VMCR_ENG0;

> +	} else {

> +		p->regval = (vgicv3->vgic_vmcr & ICH_VMCR_ENG0) >>

> +			     ICH_VMCR_ENG0_SHIFT;

> +	}

> +

> +	return true;

> +}

> +

> +static bool access_gic_grpen1(struct kvm_vcpu *vcpu, struct sys_reg_params *p,

> +			      const struct sys_reg_desc *r)

> +{

> +	struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;

> +

> +	if (p->is_write) {

> +		vgicv3->vgic_vmcr &= ~ICH_VMCR_ENG1;

> +		vgicv3->vgic_vmcr |= (p->regval << ICH_VMCR_ENG1_SHIFT) &

> +				      ICH_VMCR_ENG1;

> +	} else {

> +		p->regval = (vgicv3->vgic_vmcr & ICH_VMCR_ENG1) >>

> +			     ICH_VMCR_ENG1_SHIFT;

> +	}

> +

> +	return true;

> +}

> +

> +static bool access_gic_ap0r(struct kvm_vcpu *vcpu, struct sys_reg_params *p,

> +			    const struct sys_reg_desc *r)

> +{

> +	struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;

> +	u8 idx = r->Op2 & 3;

> +

> +	if (p->is_write)

> +		vgicv3->vgic_ap0r[idx] = p->regval;

> +	else

> +		p->regval = vgicv3->vgic_ap0r[idx];

> +

> +	return true;

> +}

> +

> +static bool access_gic_ap1r(struct kvm_vcpu *vcpu, struct sys_reg_params *p,

> +			    const struct sys_reg_desc *r)

> +{

> +	struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;

> +	u8 idx = r->Op2 & 3;

> +

> +	if (p->is_write)

> +		vgicv3->vgic_ap1r[idx] = p->regval;

> +	else

> +		p->regval = vgicv3->vgic_ap1r[idx];

> +

> +	return true;

> +}

> +

> +static const struct sys_reg_desc gic_v3_icc_reg_descs[] = {

> +	/* ICC_PMR_EL1 */

> +	{ Op0(3), Op1(0), CRn(4), CRm(6), Op2(0), access_gic_pmr },

> +	/* ICC_BPR0_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(8), Op2(3), access_gic_bpr0 },

> +	/* ICC_AP0R0_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(8), Op2(4), access_gic_ap0r },

> +	/* ICC_AP0R1_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(8), Op2(5), access_gic_ap0r },

> +	/* ICC_AP0R2_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(8), Op2(6), access_gic_ap0r },

> +	/* ICC_AP0R3_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(8), Op2(7), access_gic_ap0r },

> +	/* ICC_AP1R0_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(9), Op2(0), access_gic_ap1r },

> +	/* ICC_AP1R1_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(9), Op2(1), access_gic_ap1r },

> +	/* ICC_AP1R2_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(9), Op2(2), access_gic_ap1r },

> +	/* ICC_AP1R3_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(9), Op2(3), access_gic_ap1r },

> +	/* ICC_BPR1_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(12), Op2(3), access_gic_bpr1 },

> +	/* ICC_CTLR_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(12), Op2(4), access_gic_ctlr },

> +	/* ICC_IGRPEN0_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(12), Op2(6), access_gic_grpen0 },

> +	/* ICC_GRPEN1_EL1 */

> +	{ Op0(3), Op1(0), CRn(12), CRm(12), Op2(7), access_gic_grpen1 },

> +};

> +

> +int vgic_v3_has_cpu_sysregs_attr(struct kvm_vcpu *vcpu, bool is_write, u64 id,

> +				u64 *reg)

> +{

> +	struct sys_reg_params params;

> +

> +	params.regval = le64_to_cpu(*reg);

> +	params.is_write = is_write;

> +	params.is_aarch32 = false;

> +	params.is_32bit = false;

> +

> +	return find_reg_by_id(id, &params, gic_v3_icc_reg_descs,

> +			      ARRAY_SIZE(gic_v3_icc_reg_descs)) ?

> +		0 : -ENXIO;

> +}

> +

> +int vgic_v3_cpu_sysregs_uaccess(struct kvm_vcpu *vcpu, bool is_write, u64 id,

> +				u64 *reg)

> +{

> +	struct sys_reg_params params;

> +	const struct sys_reg_desc *r;

> +

> +	if (is_write)

> +		params.regval = le64_to_cpu(*reg);

> +	params.is_write = is_write;

> +	params.is_aarch32 = false;

> +	params.is_32bit = false;

> +

> +	r = find_reg_by_id(id, &params, gic_v3_icc_reg_descs,

> +			   ARRAY_SIZE(gic_v3_icc_reg_descs));

> +	if (!r)

> +		return -ENXIO;

> +

> +	if (!r->access(vcpu, &params, r))

> +		return -EINVAL;

> +

> +	if (!is_write)

> +		*reg = cpu_to_le64(params.regval);

> +

> +	return 0;

> +}

> +


Btw. I get a warning about this stray white space line at the end of the
file here when applying these patches.

Thanks,
-Christoffer

> diff --git a/virt/kvm/arm/vgic/vgic.h b/virt/kvm/arm/vgic/vgic.h

> index 14e4ce5..20eab36c 100644

> --- a/virt/kvm/arm/vgic/vgic.h

> +++ b/virt/kvm/arm/vgic/vgic.h

> @@ -96,6 +96,10 @@ int vgic_v3_dist_uaccess(struct kvm_vcpu *vcpu, bool is_write,

>  			 int offset, u32 *val);

>  int vgic_v3_redist_uaccess(struct kvm_vcpu *vcpu, bool is_write,

>  			 int offset, u32 *val);

> +int vgic_v3_cpu_sysregs_uaccess(struct kvm_vcpu *vcpu, bool is_write,

> +			 u64 id, u64 *val);

> +int vgic_v3_has_cpu_sysregs_attr(struct kvm_vcpu *vcpu, bool is_write, u64 id,

> +				u64 *reg);

>  #else

>  static inline void vgic_v3_process_maintenance(struct kvm_vcpu *vcpu)

>  {

> @@ -169,6 +173,8 @@ static inline int vgic_its_inject_msi(struct kvm *kvm, struct kvm_msi *msi)

>  #endif

>  

>  int kvm_register_vgic_device(unsigned long type);

> +void vgic_set_vmcr(struct kvm_vcpu *vcpu, struct vgic_vmcr *vmcr);

> +void vgic_get_vmcr(struct kvm_vcpu *vcpu, struct vgic_vmcr *vmcr);

>  int vgic_lazy_init(struct kvm *kvm);

>  int vgic_init(struct kvm *kvm);

>  

> -- 

> 1.9.1

> 


_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
Christoffer Dall Sept. 6, 2016, 7:19 p.m. UTC | #3
On Tue, Sep 06, 2016 at 07:43:23PM +0530, Vijay Kilari wrote:
> Resending in plain text mode

> 

> On Tue, Sep 6, 2016 at 7:18 PM, Vijay Kilari <vijay.kilari@gmail.com> wrote:

> >

> >

> > On Tue, Aug 30, 2016 at 7:15 PM, Christoffer Dall

> > <christoffer.dall@linaro.org> wrote:

> >>

> >> On Wed, Aug 24, 2016 at 04:50:08PM +0530, vijay.kilari@gmail.com wrote:

> >> > From: Vijaya Kumar K <Vijaya.Kumar@cavium.com>

> >

> >

> >>

> >> > diff --git a/virt/kvm/arm/vgic/vgic-sys-reg-v3.c

> >> > b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c

> >>

> >> > new file mode 100644

> >> > index 0000000..581d053

> >> > --- /dev/null

> >> > +++ b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c

> >> > @@ -0,0 +1,211 @@

> >> > +#include <linux/irqchip/arm-gic-v3.h>

> >> > +#include <linux/kvm.h>

> >> > +#include <linux/kvm_host.h>

> >> > +#include <kvm/iodev.h>

> >> > +#include <kvm/arm_vgic.h>

> >> > +#include <asm/kvm_emulate.h>

> >> > +#include <asm/kvm_arm.h>

> >> > +#include <asm/kvm_mmu.h>

> >> > +

> >> > +#include "vgic.h"

> >> > +#include "vgic-mmio.h"

> >> > +#include "sys_regs.h"

> >> > +

> >> > +static bool access_gic_ctlr(struct kvm_vcpu *vcpu, struct

> >> > sys_reg_params *p,

> >> > +                         const struct sys_reg_desc *r)

> >> > +{

> >> > +     struct vgic_vmcr vmcr;

> >> > +

> >> > +     vgic_get_vmcr(vcpu, &vmcr);

> >> > +     if (p->is_write) {

> >> > +             vmcr.ctlr = (u32)p->regval;

> >> > +             vgic_set_vmcr(vcpu, &vmcr);

> >> > +     } else {

> >> > +             p->regval = vmcr.ctlr;

> >> > +     }

> >> > +

> >>

> >> really?  Have you looked at the spec and implementation of this or did

> >> you just copy the v2 code?

> >>

> >> The ICH_VMCR_EL2 register field mappings are not identical to the ctlr

> >> mappings.  I think this causes some rework for much of this patch, so

> >> I'll have a look at the next revision.

> >

> >

> >   ICH_VMCR_EL2.VEOIM &  ICH_VMCR_EL2.CBPR holds

> > ICC_CTLR_EL1.EOImode & ICC_CTLR_EL1.CBPR  respectively.

> > Remaining fields are Readonly except PHME. AFAIK, vgic is not

> > holding ICC_CTLR_EL1 except the fields in ICH_VMCR_EL2.


This function implements the accessor for ICC_CTLR_EL1 according to your
own comment (and the system register encoding).

If you planned on exposing ICH_VMCR_EL2 to userspace, then why did you
expose it for the encoding of ICC_CTLR_EL1?

More to the point, you're exposing the *VM's* state of the GIC, not
details about the hypervisor implementation.

> >> > +     return true;

> >> > +}

> >> > +

> >> > +static bool access_gic_pmr(struct kvm_vcpu *vcpu, struct sys_reg_params

> >> > *p,

> >> > +                        const struct sys_reg_desc *r)

> >> > +{

> >> > +     struct vgic_vmcr vmcr;

> >> > +

> >> > +     vgic_get_vmcr(vcpu, &vmcr);

> >> > +     if (p->is_write) {

> >> > +             vmcr.pmr = (u32)p->regval;

> >> > +             vgic_set_vmcr(vcpu, &vmcr);

> >> > +     } else {

> >> > +             p->regval = vmcr.pmr;

> >> > +     }

> >> > +

> >> > +     return true;

> >> > +}

> >> > +

> >> > +static bool access_gic_bpr0(struct kvm_vcpu *vcpu, struct

> >> > sys_reg_params *p,

> >> > +                         const struct sys_reg_desc *r)

> >> > +{

> >> > +     struct vgic_vmcr vmcr;

> >> > +

> >> > +     vgic_get_vmcr(vcpu, &vmcr);

> >> > +     if (p->is_write) {

> >> > +             vmcr.bpr = (u32)p->regval;

> >> > +             vgic_set_vmcr(vcpu, &vmcr);

> >> > +     } else {

> >> > +             p->regval = vmcr.bpr;

> >> > +     }

> >> > +

> >> > +     return true;

> >> > +}

> >> > +

> >> > +static bool access_gic_bpr1(struct kvm_vcpu *vcpu, struct

> >> > sys_reg_params *p,

> >> > +                         const struct sys_reg_desc *r)

> >> > +{

> >> > +     struct vgic_vmcr vmcr;

> >> > +

> >> > +     vgic_get_vmcr(vcpu, &vmcr);

> >> > +     if (p->is_write) {

> >> > +             vmcr.abpr = (u32)p->regval;

> >> > +             vgic_set_vmcr(vcpu, &vmcr);

> >> > +     } else {

> >> > +             p->regval = vmcr.abpr;

> >> > +     }

> >> > +

> >> > +     return true;

> >> > +}

> >> > +

> >> > +static bool access_gic_grpen0(struct kvm_vcpu *vcpu, struct

> >> > sys_reg_params *p,

> >> > +                           const struct sys_reg_desc *r)

> >> > +{

> >> > +     struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;

> >> > +

> >> > +     if (p->is_write) {

> >> > +             vgicv3->vgic_vmcr &= ~ICH_VMCR_ENG0;

> >> > +             vgicv3->vgic_vmcr |= (p->regval << ICH_VMCR_ENG0_SHIFT) &

> >> > +                                   ICH_VMCR_ENG0;

> >> > +     } else {

> >> > +             p->regval = (vgicv3->vgic_vmcr & ICH_VMCR_ENG0) >>

> >> > +                          ICH_VMCR_ENG0_SHIFT;

> >> > +     }

> >>

> >> so for example, why shouldn't these go through the vgic_set/get_vmcr

> >> wrappers?

> >

> >

> > The vgic_vmcr struct as below is not managing ENG0 and ENG1 fields.

> > So could not use vgic_set/get wrappers.


eh, but you could expand this structure, right?

It's strange that some things go through access functions, while others
do not.  If there is a good reason for that, then document that somehow.

> >

> > struct vgic_vmcr {

> >         u32     ctlr;

> >         u32     abpr;

> >         u32     bpr;

> >         u32     pmr;

> > };

> >

> >

> >>

> >>

> >> > +

> >> > +     return true;

> >> > +}

> >> > +

> >> > +static bool access_gic_grpen1(struct kvm_vcpu *vcpu, struct

> >> > sys_reg_params *p,

> >> > +                           const struct sys_reg_desc *r)

> >> > +{

> >> > +     struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;

> >> > +

> >> > +     if (p->is_write) {

> >> > +             vgicv3->vgic_vmcr &= ~ICH_VMCR_ENG1;

> >> > +             vgicv3->vgic_vmcr |= (p->regval << ICH_VMCR_ENG1_SHIFT) &

> >> > +                                   ICH_VMCR_ENG1;

> >> > +     } else {

> >> > +             p->regval = (vgicv3->vgic_vmcr & ICH_VMCR_ENG1) >>

> >> > +                          ICH_VMCR_ENG1_SHIFT;

> >> > +     }

> >> > +

> >> > +     return true;

> >> > +}

> >> > +

> >> > +static bool access_gic_ap0r(struct kvm_vcpu *vcpu, struct

> >> > sys_reg_params *p,

> >> > +                         const struct sys_reg_desc *r)

> >> > +{

> >> > +     struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;

> >> > +     u8 idx = r->Op2 & 3;

> >> > +

> >> > +     if (p->is_write)

> >> > +             vgicv3->vgic_ap0r[idx] = p->regval;

> >> > +     else

> >> > +             p->regval = vgicv3->vgic_ap0r[idx];

> >> > +

> >> > +     return true;

> >> > +}

> >> > +

> >> > +static bool access_gic_ap1r(struct kvm_vcpu *vcpu, struct

> >> > sys_reg_params *p,

> >> > +                         const struct sys_reg_desc *r)

> >> > +{

> >> > +     struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;

> >> > +     u8 idx = r->Op2 & 3;

> >> > +

> >> > +     if (p->is_write)

> >> > +             vgicv3->vgic_ap1r[idx] = p->regval;

> >> > +     else

> >> > +             p->regval = vgicv3->vgic_ap1r[idx];

> >> > +

> >> > +     return true;

> >> > +}

> >> > +

> >> > +static const struct sys_reg_desc gic_v3_icc_reg_descs[] = {

> >> > +     /* ICC_PMR_EL1 */

> >> > +     { Op0(3), Op1(0), CRn(4), CRm(6), Op2(0), access_gic_pmr },

> >> > +     /* ICC_BPR0_EL1 */

> >> > +     { Op0(3), Op1(0), CRn(12), CRm(8), Op2(3), access_gic_bpr0 },

> >> > +     /* ICC_AP0R0_EL1 */

> >> > +     { Op0(3), Op1(0), CRn(12), CRm(8), Op2(4), access_gic_ap0r },

> >> > +     /* ICC_AP0R1_EL1 */

> >> > +     { Op0(3), Op1(0), CRn(12), CRm(8), Op2(5), access_gic_ap0r },

> >> > +     /* ICC_AP0R2_EL1 */

> >> > +     { Op0(3), Op1(0), CRn(12), CRm(8), Op2(6), access_gic_ap0r },

> >> > +     /* ICC_AP0R3_EL1 */

> >> > +     { Op0(3), Op1(0), CRn(12), CRm(8), Op2(7), access_gic_ap0r },

> >> > +     /* ICC_AP1R0_EL1 */

> >> > +     { Op0(3), Op1(0), CRn(12), CRm(9), Op2(0), access_gic_ap1r },

> >> > +     /* ICC_AP1R1_EL1 */

> >> > +     { Op0(3), Op1(0), CRn(12), CRm(9), Op2(1), access_gic_ap1r },

> >> > +     /* ICC_AP1R2_EL1 */

> >> > +     { Op0(3), Op1(0), CRn(12), CRm(9), Op2(2), access_gic_ap1r },

> >> > +     /* ICC_AP1R3_EL1 */

> >> > +     { Op0(3), Op1(0), CRn(12), CRm(9), Op2(3), access_gic_ap1r },

> >> > +     /* ICC_BPR1_EL1 */

> >> > +     { Op0(3), Op1(0), CRn(12), CRm(12), Op2(3), access_gic_bpr1 },

> >> > +     /* ICC_CTLR_EL1 */

> >> > +     { Op0(3), Op1(0), CRn(12), CRm(12), Op2(4), access_gic_ctlr },

> >> > +     /* ICC_IGRPEN0_EL1 */

> >> > +     { Op0(3), Op1(0), CRn(12), CRm(12), Op2(6), access_gic_grpen0 },

> >> > +     /* ICC_GRPEN1_EL1 */

> >> > +     { Op0(3), Op1(0), CRn(12), CRm(12), Op2(7), access_gic_grpen1 },

> >>

> >> Do we need to allow userspace to at least read ICC_SRE_EL1?

> >

> >

> > ICC_SRE_EL1.SRE is enabled at vgic initialization and DIB and FDB are not

> > configured.

> >     So save and restore does not make any effect.


I know, but that doesn't mean that userspace shouldn't be able to tell
what the result of the vgic initialization was by looking at the
register.

So I am looking for slightly better arguments than 'it doesn't seem to
matter in practice right now'.

> >

> >>

> >> Should we verify that the DIB and FDB fields of that register are

> >> written as the system understands them (clear, WI)?

> >

> >

> >   What kind of verification we can do on DIB and FDB by userspace?.


That userspace tries to write a value as it thinks they should be and
the kernel code checks that this corresponds to the underlying hardware.

> >>

> >>

> >> > +

> >> > +int vgic_v3_cpu_sysregs_uaccess(struct kvm_vcpu *vcpu, bool is_write,

> >> > u64 id,

> >> > +                             u64 *reg)

> >> > +{

> >> > +     struct sys_reg_params params;

> >> > +     const struct sys_reg_desc *r;

> >> > +

> >> > +     if (is_write)

> >> > +             params.regval = le64_to_cpu(*reg);

> >>

> >> why do we need this conversion here?

> >>

> >    The registers are managed in LE mode.


What do you mean?  They are stored as typed values, right?  Why is
endianness a factor here.

System registers are registers, they do not have an endianness.


> >  So here the value to be

> > writtern is coverted to LE mode and similarly on reading back it is

> > converted

> > from LE.

> >


I don't understand where you feel the mismatch in endianness comes from?

The reason why we use vgic_data_host_to_mmio_bus() is historic and I
think we can actually get rid of that in the uaccess part.  (Looking at
the symmetry between vgic_uaccess and vgic_mmio_uaccess_{read,write}
should tell us that this is completely unnecessary and we can just
replace the prototype to take an unsigned long instead of a void * for
the val parameter.)

Can you provide an example of how it goes bad if you don't have this
conversion?

Thanks,
-Christoffer

> >> > +     params.is_write = is_write;

> >> > +     params.is_aarch32 = false;

> >> > +     params.is_32bit = false;

> >> > +

> >> > +     r = find_reg_by_id(id, &params, gic_v3_icc_reg_descs,

> >> > +                        ARRAY_SIZE(gic_v3_icc_reg_descs));

> >> > +     if (!r)

> >> > +             return -ENXIO;

> >> > +

> >> > +     if (!r->access(vcpu, &params, r))

> >> > +             return -EINVAL;

> >> > +

> >> > +     if (!is_write)

> >> > +             *reg = cpu_to_le64(params.regval);

> >>

> >> same question as above

> >>

> >


_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
Christoffer Dall Sept. 7, 2016, 2:15 p.m. UTC | #4
On Wed, Sep 07, 2016 at 07:19:48PM +0530, Vijay Kilari wrote:
> On Wed, Sep 7, 2016 at 12:49 AM, Christoffer Dall

> <christoffer.dall@linaro.org> wrote:

> > On Tue, Sep 06, 2016 at 07:43:23PM +0530, Vijay Kilari wrote:

> >> Resending in plain text mode

> >>

> >> On Tue, Sep 6, 2016 at 7:18 PM, Vijay Kilari <vijay.kilari@gmail.com> wrote:

> >> >

> >> >

> >> > On Tue, Aug 30, 2016 at 7:15 PM, Christoffer Dall

> >> > <christoffer.dall@linaro.org> wrote:

> >> >>

> >> >> On Wed, Aug 24, 2016 at 04:50:08PM +0530, vijay.kilari@gmail.com wrote:

> >> >> > From: Vijaya Kumar K <Vijaya.Kumar@cavium.com>

> >> >

> >> >

> >> >>

> >> >> > diff --git a/virt/kvm/arm/vgic/vgic-sys-reg-v3.c

> >> >> > b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c

> >> >>

> >> >> > new file mode 100644

> >> >> > index 0000000..581d053

> >> >> > --- /dev/null

> >> >> > +++ b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c

> >> >> > @@ -0,0 +1,211 @@

> >> >> > +#include <linux/irqchip/arm-gic-v3.h>

> >> >> > +#include <linux/kvm.h>

> >> >> > +#include <linux/kvm_host.h>

> >> >> > +#include <kvm/iodev.h>

> >> >> > +#include <kvm/arm_vgic.h>

> >> >> > +#include <asm/kvm_emulate.h>

> >> >> > +#include <asm/kvm_arm.h>

> >> >> > +#include <asm/kvm_mmu.h>

> >> >> > +

> >> >> > +#include "vgic.h"

> >> >> > +#include "vgic-mmio.h"

> >> >> > +#include "sys_regs.h"

> >> >> > +

> >> >> > +static bool access_gic_ctlr(struct kvm_vcpu *vcpu, struct

> >> >> > sys_reg_params *p,

> >> >> > +                         const struct sys_reg_desc *r)

> >> >> > +{

> >> >> > +     struct vgic_vmcr vmcr;

> >> >> > +

> >> >> > +     vgic_get_vmcr(vcpu, &vmcr);

> >> >> > +     if (p->is_write) {

> >> >> > +             vmcr.ctlr = (u32)p->regval;

> >> >> > +             vgic_set_vmcr(vcpu, &vmcr);

> >> >> > +     } else {

> >> >> > +             p->regval = vmcr.ctlr;

> >> >> > +     }

> >> >> > +

> >> >>

> >> >> really?  Have you looked at the spec and implementation of this or did

> >> >> you just copy the v2 code?

> >> >>

> >> >> The ICH_VMCR_EL2 register field mappings are not identical to the ctlr

> >> >> mappings.  I think this causes some rework for much of this patch, so

> >> >> I'll have a look at the next revision.

> >> >

> >> >

> >> >   ICH_VMCR_EL2.VEOIM &  ICH_VMCR_EL2.CBPR holds

> >> > ICC_CTLR_EL1.EOImode & ICC_CTLR_EL1.CBPR  respectively.

> >> > Remaining fields are Readonly except PHME. AFAIK, vgic is not

> >> > holding ICC_CTLR_EL1 except the fields in ICH_VMCR_EL2.

> >

> > This function implements the accessor for ICC_CTLR_EL1 according to your

> > own comment (and the system register encoding).

> >

> > If you planned on exposing ICH_VMCR_EL2 to userspace, then why did you

> > expose it for the encoding of ICC_CTLR_EL1?

> >

> > More to the point, you're exposing the *VM's* state of the GIC, not

> > details about the hypervisor implementation.

> 

> ICH_VMCR_EL2 provides virtual access to ICC_CTLR_EL1, PMR_EL1, BPR0_EL1,

> and few more regs. So access for these registers, we rely on VMCR_EL2.


I know how this works, I'm not asking you to explain me how VMCR_EL2
works.

> and more over VMCR_EL2 is EL2 register to expose to userspace.

> 


If you wanted to go that route, you shouldn't export it using the
encoding of ICC_CTRL_EL1, then you should export it using VMCR_EL2.

But this is now what we do for all the other state, so it's fairly
obvious to me what you need to do.  But let me spell it out for you:

Export the VM's state in shape of the EL1 registers as they are
presented to the guest, similar to what we do for the distributor with
the exception of the latch state for the pending state.

You have failed to explain the design of what you are implementing, and
what you have here is wildly inconsistent.  Please try to understand
what I'm saying instead of just insisting on your original understanding
of how to solve this problem.


> >

> >> >> > +     return true;

> >> >> > +}

> >> >> > +

> >> >> > +static bool access_gic_pmr(struct kvm_vcpu *vcpu, struct sys_reg_params

> >> >> > *p,

> >> >> > +                        const struct sys_reg_desc *r)

> >> >> > +{

> >> >> > +     struct vgic_vmcr vmcr;

> >> >> > +

> >> >> > +     vgic_get_vmcr(vcpu, &vmcr);

> >> >> > +     if (p->is_write) {

> >> >> > +             vmcr.pmr = (u32)p->regval;

> >> >> > +             vgic_set_vmcr(vcpu, &vmcr);

> >> >> > +     } else {

> >> >> > +             p->regval = vmcr.pmr;

> >> >> > +     }

> >> >> > +

> >> >> > +     return true;

> >> >> > +}

> >> >> > +

> >> >> > +static bool access_gic_bpr0(struct kvm_vcpu *vcpu, struct

> >> >> > sys_reg_params *p,

> >> >> > +                         const struct sys_reg_desc *r)

> >> >> > +{

> >> >> > +     struct vgic_vmcr vmcr;

> >> >> > +

> >> >> > +     vgic_get_vmcr(vcpu, &vmcr);

> >> >> > +     if (p->is_write) {

> >> >> > +             vmcr.bpr = (u32)p->regval;

> >> >> > +             vgic_set_vmcr(vcpu, &vmcr);

> >> >> > +     } else {

> >> >> > +             p->regval = vmcr.bpr;

> >> >> > +     }

> >> >> > +

> >> >> > +     return true;

> >> >> > +}

> >> >> > +

> >> >> > +static bool access_gic_bpr1(struct kvm_vcpu *vcpu, struct

> >> >> > sys_reg_params *p,

> >> >> > +                         const struct sys_reg_desc *r)

> >> >> > +{

> >> >> > +     struct vgic_vmcr vmcr;

> >> >> > +

> >> >> > +     vgic_get_vmcr(vcpu, &vmcr);

> >> >> > +     if (p->is_write) {

> >> >> > +             vmcr.abpr = (u32)p->regval;

> >> >> > +             vgic_set_vmcr(vcpu, &vmcr);

> >> >> > +     } else {

> >> >> > +             p->regval = vmcr.abpr;

> >> >> > +     }

> >> >> > +

> >> >> > +     return true;

> >> >> > +}

> >> >> > +

> >> >> > +static bool access_gic_grpen0(struct kvm_vcpu *vcpu, struct

> >> >> > sys_reg_params *p,

> >> >> > +                           const struct sys_reg_desc *r)

> >> >> > +{

> >> >> > +     struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;

> >> >> > +

> >> >> > +     if (p->is_write) {

> >> >> > +             vgicv3->vgic_vmcr &= ~ICH_VMCR_ENG0;

> >> >> > +             vgicv3->vgic_vmcr |= (p->regval << ICH_VMCR_ENG0_SHIFT) &

> >> >> > +                                   ICH_VMCR_ENG0;

> >> >> > +     } else {

> >> >> > +             p->regval = (vgicv3->vgic_vmcr & ICH_VMCR_ENG0) >>

> >> >> > +                          ICH_VMCR_ENG0_SHIFT;

> >> >> > +     }

> >> >>

> >> >> so for example, why shouldn't these go through the vgic_set/get_vmcr

> >> >> wrappers?

> >> >

> >> >

> >> > The vgic_vmcr struct as below is not managing ENG0 and ENG1 fields.

> >> > So could not use vgic_set/get wrappers.

> >

> > eh, but you could expand this structure, right?

> OK, I will try to expand this structure

> >

> > It's strange that some things go through access functions, while others

> > do not.  If there is a good reason for that, then document that somehow.

> >

> >> >

> >> > struct vgic_vmcr {

> >> >         u32     ctlr;

> >> >         u32     abpr;

> >> >         u32     bpr;

> >> >         u32     pmr;

> >> > };

> >> >

> >> >

> >> >>

> >> >>

> >> >> > +

> >> >> > +     return true;

> >> >> > +}

> >> >> > +

> >> >> > +static bool access_gic_grpen1(struct kvm_vcpu *vcpu, struct

> >> >> > sys_reg_params *p,

> >> >> > +                           const struct sys_reg_desc *r)

> >> >> > +{

> >> >> > +     struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;

> >> >> > +

> >> >> > +     if (p->is_write) {

> >> >> > +             vgicv3->vgic_vmcr &= ~ICH_VMCR_ENG1;

> >> >> > +             vgicv3->vgic_vmcr |= (p->regval << ICH_VMCR_ENG1_SHIFT) &

> >> >> > +                                   ICH_VMCR_ENG1;

> >> >> > +     } else {

> >> >> > +             p->regval = (vgicv3->vgic_vmcr & ICH_VMCR_ENG1) >>

> >> >> > +                          ICH_VMCR_ENG1_SHIFT;

> >> >> > +     }

> >> >> > +

> >> >> > +     return true;

> >> >> > +}

> >> >> > +

> >> >> > +static bool access_gic_ap0r(struct kvm_vcpu *vcpu, struct

> >> >> > sys_reg_params *p,

> >> >> > +                         const struct sys_reg_desc *r)

> >> >> > +{

> >> >> > +     struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;

> >> >> > +     u8 idx = r->Op2 & 3;

> >> >> > +

> >> >> > +     if (p->is_write)

> >> >> > +             vgicv3->vgic_ap0r[idx] = p->regval;

> >> >> > +     else

> >> >> > +             p->regval = vgicv3->vgic_ap0r[idx];

> >> >> > +

> >> >> > +     return true;

> >> >> > +}

> >> >> > +

> >> >> > +static bool access_gic_ap1r(struct kvm_vcpu *vcpu, struct

> >> >> > sys_reg_params *p,

> >> >> > +                         const struct sys_reg_desc *r)

> >> >> > +{

> >> >> > +     struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;

> >> >> > +     u8 idx = r->Op2 & 3;

> >> >> > +

> >> >> > +     if (p->is_write)

> >> >> > +             vgicv3->vgic_ap1r[idx] = p->regval;

> >> >> > +     else

> >> >> > +             p->regval = vgicv3->vgic_ap1r[idx];

> >> >> > +

> >> >> > +     return true;

> >> >> > +}

> >> >> > +

> >> >> > +static const struct sys_reg_desc gic_v3_icc_reg_descs[] = {

> >> >> > +     /* ICC_PMR_EL1 */

> >> >> > +     { Op0(3), Op1(0), CRn(4), CRm(6), Op2(0), access_gic_pmr },

> >> >> > +     /* ICC_BPR0_EL1 */

> >> >> > +     { Op0(3), Op1(0), CRn(12), CRm(8), Op2(3), access_gic_bpr0 },

> >> >> > +     /* ICC_AP0R0_EL1 */

> >> >> > +     { Op0(3), Op1(0), CRn(12), CRm(8), Op2(4), access_gic_ap0r },

> >> >> > +     /* ICC_AP0R1_EL1 */

> >> >> > +     { Op0(3), Op1(0), CRn(12), CRm(8), Op2(5), access_gic_ap0r },

> >> >> > +     /* ICC_AP0R2_EL1 */

> >> >> > +     { Op0(3), Op1(0), CRn(12), CRm(8), Op2(6), access_gic_ap0r },

> >> >> > +     /* ICC_AP0R3_EL1 */

> >> >> > +     { Op0(3), Op1(0), CRn(12), CRm(8), Op2(7), access_gic_ap0r },

> >> >> > +     /* ICC_AP1R0_EL1 */

> >> >> > +     { Op0(3), Op1(0), CRn(12), CRm(9), Op2(0), access_gic_ap1r },

> >> >> > +     /* ICC_AP1R1_EL1 */

> >> >> > +     { Op0(3), Op1(0), CRn(12), CRm(9), Op2(1), access_gic_ap1r },

> >> >> > +     /* ICC_AP1R2_EL1 */

> >> >> > +     { Op0(3), Op1(0), CRn(12), CRm(9), Op2(2), access_gic_ap1r },

> >> >> > +     /* ICC_AP1R3_EL1 */

> >> >> > +     { Op0(3), Op1(0), CRn(12), CRm(9), Op2(3), access_gic_ap1r },

> >> >> > +     /* ICC_BPR1_EL1 */

> >> >> > +     { Op0(3), Op1(0), CRn(12), CRm(12), Op2(3), access_gic_bpr1 },

> >> >> > +     /* ICC_CTLR_EL1 */

> >> >> > +     { Op0(3), Op1(0), CRn(12), CRm(12), Op2(4), access_gic_ctlr },

> >> >> > +     /* ICC_IGRPEN0_EL1 */

> >> >> > +     { Op0(3), Op1(0), CRn(12), CRm(12), Op2(6), access_gic_grpen0 },

> >> >> > +     /* ICC_GRPEN1_EL1 */

> >> >> > +     { Op0(3), Op1(0), CRn(12), CRm(12), Op2(7), access_gic_grpen1 },

> >> >>

> >> >> Do we need to allow userspace to at least read ICC_SRE_EL1?

> >> >

> >> >

> >> > ICC_SRE_EL1.SRE is enabled at vgic initialization and DIB and FDB are not

> >> > configured.

> >> >     So save and restore does not make any effect.

> >

> > I know, but that doesn't mean that userspace shouldn't be able to tell

> > what the result of the vgic initialization was by looking at the

> > register.

> >

> Ok, I will save and restore this registers with some verification in

> userspace.

> 


My point was that the kernel could verify that the systems are
consistent, similar to what we do for invariant sysregs.

> > So I am looking for slightly better arguments than 'it doesn't seem to

> > matter in practice right now'.

> >

> >> >

> >> >>

> >> >> Should we verify that the DIB and FDB fields of that register are

> >> >> written as the system understands them (clear, WI)?

> >> >

> >> >

> >> >   What kind of verification we can do on DIB and FDB by userspace?.

> >

> > That userspace tries to write a value as it thinks they should be and

> > the kernel code checks that this corresponds to the underlying hardware.

> >

> >> >>

> >> >>

> >> >> > +

> >> >> > +int vgic_v3_cpu_sysregs_uaccess(struct kvm_vcpu *vcpu, bool is_write,

> >> >> > u64 id,

> >> >> > +                             u64 *reg)

> >> >> > +{

> >> >> > +     struct sys_reg_params params;

> >> >> > +     const struct sys_reg_desc *r;

> >> >> > +

> >> >> > +     if (is_write)

> >> >> > +             params.regval = le64_to_cpu(*reg);

> >> >>

> >> >> why do we need this conversion here?

> >> >>

> >> >    The registers are managed in LE mode.

> >

> > What do you mean?  They are stored as typed values, right?  Why is

> > endianness a factor here.

> >

> > System registers are registers, they do not have an endianness.

> >

> >

> >> >  So here the value to be

> >> > writtern is coverted to LE mode and similarly on reading back it is

> >> > converted

> >> > from LE.

> >> >

> >

> > I don't understand where you feel the mismatch in endianness comes from?

> >

> > The reason why we use vgic_data_host_to_mmio_bus() is historic and I

> > think we can actually get rid of that in the uaccess part.  (Looking at

> > the symmetry between vgic_uaccess and vgic_mmio_uaccess_{read,write}

> > should tell us that this is completely unnecessary and we can just

> > replace the prototype to take an unsigned long instead of a void * for

> > the val parameter.)

> >

> > Can you provide an example of how it goes bad if you don't have this

> > conversion?

> 

> You have added a comment for vgic_uaccess() that conversion is required

> from the patch commit c3199f28e09496aa9fec9313b4f6e90e7dc913f0

> "KVM: arm/arm64: vgic-new: Export register access interface"


Again, I didn't ask you to quote a commit, but to actually understand
what you are implementing.

I've already stated that I do not see a need for the endianness
conversion here, yet you persist that it is needed.  To substantiate
your claim, I asked to provide an example of a situation where we would
write the wrong value to the kernel without the le64_to_cpu operation,
not to quote a commit on a different function, which uses an existing
function to conveniently place date into a byte array.

As I told you, this was needed *before your patches* because we reused
dispatch_mmio_write, but now you do the region lookup in
vgic_mmio_uaccess_write() and do not reuse the mmio path that expected a
void * to a byte array.

> 

> If sysregs does not have endianess, then this conversion can be dropped

> for sysregs.

> 


As I've said, I don't see where there would be an endianness mismatch
here.

-Christoffer

_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
diff mbox

Patch

diff --git a/arch/arm64/include/uapi/asm/kvm.h b/arch/arm64/include/uapi/asm/kvm.h
index 94ea676..b13c944 100644
--- a/arch/arm64/include/uapi/asm/kvm.h
+++ b/arch/arm64/include/uapi/asm/kvm.h
@@ -182,14 +182,14 @@  struct kvm_arch_memory_slot {
 	KVM_REG_ARM64_SYSREG_ ## n ## _MASK)
 
 #define __ARM64_SYS_REG(op0,op1,crn,crm,op2) \
-	(KVM_REG_ARM64 | KVM_REG_ARM64_SYSREG | \
-	ARM64_SYS_REG_SHIFT_MASK(op0, OP0) | \
+	(ARM64_SYS_REG_SHIFT_MASK(op0, OP0) | \
 	ARM64_SYS_REG_SHIFT_MASK(op1, OP1) | \
 	ARM64_SYS_REG_SHIFT_MASK(crn, CRN) | \
 	ARM64_SYS_REG_SHIFT_MASK(crm, CRM) | \
 	ARM64_SYS_REG_SHIFT_MASK(op2, OP2))
 
-#define ARM64_SYS_REG(...) (__ARM64_SYS_REG(__VA_ARGS__) | KVM_REG_SIZE_U64)
+#define ARM64_SYS_REG(...) (__ARM64_SYS_REG(__VA_ARGS__) | KVM_REG_SIZE_U64 | \
+			    KVM_REG_ARM64 | KVM_REG_ARM64_SYSREG)
 
 #define KVM_REG_ARM_TIMER_CTL		ARM64_SYS_REG(3, 3, 14, 3, 1)
 #define KVM_REG_ARM_TIMER_CNT		ARM64_SYS_REG(3, 3, 14, 3, 2)
@@ -208,7 +208,16 @@  struct kvm_arch_memory_slot {
 #define KVM_DEV_ARM_VGIC_GRP_NR_IRQS	3
 #define KVM_DEV_ARM_VGIC_GRP_CTRL	4
 #define KVM_DEV_ARM_VGIC_GRP_REDIST_REGS 5
+#define KVM_DEV_ARM_VGIC_CPU_SYSREGS    6
+
 #define   KVM_DEV_ARM_VGIC_CTRL_INIT	0
+#define   KVM_DEV_ARM_VGIC_SYSREG_MASK (KVM_REG_ARM64_SYSREG_OP0_MASK | \
+					KVM_REG_ARM64_SYSREG_OP1_MASK | \
+					KVM_REG_ARM64_SYSREG_CRN_MASK | \
+					KVM_REG_ARM64_SYSREG_CRM_MASK | \
+					KVM_REG_ARM64_SYSREG_OP2_MASK)
+#define   KVM_DEV_ARM_VGIC_SYSREG(op0, op1, crn, crm, op2) \
+					__ARM64_SYS_REG(op0, op1, crn, crm, op2)
 
 /* Device Control API on vcpu fd */
 #define KVM_ARM_VCPU_PMU_V3_CTRL	0
diff --git a/arch/arm64/kvm/Makefile b/arch/arm64/kvm/Makefile
index 695eb3c..dafbd0e 100644
--- a/arch/arm64/kvm/Makefile
+++ b/arch/arm64/kvm/Makefile
@@ -31,5 +31,6 @@  kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-mmio-v3.o
 kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-kvm-device.o
 kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-its.o
 kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/irqchip.o
+kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/vgic/vgic-sys-reg-v3.o
 kvm-$(CONFIG_KVM_ARM_HOST) += $(KVM)/arm/arch_timer.o
 kvm-$(CONFIG_KVM_ARM_PMU) += $(KVM)/arm/pmu.o
diff --git a/include/linux/irqchip/arm-gic-v3.h b/include/linux/irqchip/arm-gic-v3.h
index 56b0b7e..164463b 100644
--- a/include/linux/irqchip/arm-gic-v3.h
+++ b/include/linux/irqchip/arm-gic-v3.h
@@ -383,6 +383,10 @@ 
 
 #define ICH_VMCR_CTLR_SHIFT		0
 #define ICH_VMCR_CTLR_MASK		(0x21f << ICH_VMCR_CTLR_SHIFT)
+#define ICH_VMCR_ENG0_SHIFT		0
+#define ICH_VMCR_ENG0			(1 << ICH_VMCR_ENG0_SHIFT)
+#define ICH_VMCR_ENG1_SHIFT		1
+#define ICH_VMCR_ENG1			(1 << ICH_VMCR_ENG1_SHIFT)
 #define ICH_VMCR_BPR1_SHIFT		18
 #define ICH_VMCR_BPR1_MASK		(7 << ICH_VMCR_BPR1_SHIFT)
 #define ICH_VMCR_BPR0_SHIFT		21
diff --git a/virt/kvm/arm/vgic/vgic-kvm-device.c b/virt/kvm/arm/vgic/vgic-kvm-device.c
index 06f0158..74e5c38 100644
--- a/virt/kvm/arm/vgic/vgic-kvm-device.c
+++ b/virt/kvm/arm/vgic/vgic-kvm-device.c
@@ -500,6 +500,15 @@  static int vgic_attr_regs_access_v3(struct kvm_device *dev,
 		if (!is_write)
 			*reg = tmp32;
 		break;
+	case KVM_DEV_ARM_VGIC_CPU_SYSREGS: {
+		u64 regid;
+
+		regid = (attr->attr & KVM_DEV_ARM_VGIC_SYSREG_MASK) |
+			 KVM_REG_SIZE_U64;
+		ret = vgic_v3_cpu_sysregs_uaccess(vcpu, is_write,
+						  regid, reg);
+		break;
+	}
 	default:
 		ret = -EINVAL;
 		break;
@@ -533,6 +542,15 @@  static int vgic_v3_set_attr(struct kvm_device *dev,
 		reg = tmp32;
 		return vgic_attr_regs_access_v3(dev, attr, &reg, true);
 	}
+	case KVM_DEV_ARM_VGIC_CPU_SYSREGS: {
+		u64 __user *uaddr = (u64 __user *)(long)attr->addr;
+		u64 reg;
+
+		if (get_user(reg, uaddr))
+			return -EFAULT;
+
+		return vgic_attr_regs_access_v3(dev, attr, &reg, true);
+	}
 	}
 	return -ENXIO;
 }
@@ -560,6 +578,16 @@  static int vgic_v3_get_attr(struct kvm_device *dev,
 		ret = put_user(tmp32, uaddr);
 		return ret;
 	}
+	case KVM_DEV_ARM_VGIC_CPU_SYSREGS: {
+		u64 __user *uaddr = (u64 __user *)(long)attr->addr;
+		u64 reg;
+
+		ret = vgic_attr_regs_access_v3(dev, attr, &reg, false);
+		if (ret)
+			return ret;
+		ret = put_user(reg, uaddr);
+		return ret;
+	}
 	}
 
 	return -ENXIO;
@@ -578,6 +606,7 @@  static int vgic_v3_has_attr(struct kvm_device *dev,
 		break;
 	case KVM_DEV_ARM_VGIC_GRP_DIST_REGS:
 	case KVM_DEV_ARM_VGIC_GRP_REDIST_REGS:
+	case KVM_DEV_ARM_VGIC_CPU_SYSREGS:
 		return vgic_v3_has_attr_regs(dev, attr);
 	case KVM_DEV_ARM_VGIC_GRP_NR_IRQS:
 		return 0;
diff --git a/virt/kvm/arm/vgic/vgic-mmio-v2.c b/virt/kvm/arm/vgic/vgic-mmio-v2.c
index cd37159..4a35eb8 100644
--- a/virt/kvm/arm/vgic/vgic-mmio-v2.c
+++ b/virt/kvm/arm/vgic/vgic-mmio-v2.c
@@ -212,7 +212,7 @@  static void vgic_mmio_write_sgipends(struct kvm_vcpu *vcpu,
 	}
 }
 
-static void vgic_set_vmcr(struct kvm_vcpu *vcpu, struct vgic_vmcr *vmcr)
+void vgic_set_vmcr(struct kvm_vcpu *vcpu, struct vgic_vmcr *vmcr)
 {
 	if (kvm_vgic_global_state.type == VGIC_V2)
 		vgic_v2_set_vmcr(vcpu, vmcr);
@@ -220,7 +220,7 @@  static void vgic_set_vmcr(struct kvm_vcpu *vcpu, struct vgic_vmcr *vmcr)
 		vgic_v3_set_vmcr(vcpu, vmcr);
 }
 
-static void vgic_get_vmcr(struct kvm_vcpu *vcpu, struct vgic_vmcr *vmcr)
+void vgic_get_vmcr(struct kvm_vcpu *vcpu, struct vgic_vmcr *vmcr)
 {
 	if (kvm_vgic_global_state.type == VGIC_V2)
 		vgic_v2_get_vmcr(vcpu, vmcr);
diff --git a/virt/kvm/arm/vgic/vgic-mmio-v3.c b/virt/kvm/arm/vgic/vgic-mmio-v3.c
index c2df103..61abea0 100644
--- a/virt/kvm/arm/vgic/vgic-mmio-v3.c
+++ b/virt/kvm/arm/vgic/vgic-mmio-v3.c
@@ -23,6 +23,7 @@ 
 
 #include "vgic.h"
 #include "vgic-mmio.h"
+#include "sys_regs.h"
 
 /* extract @num bytes at @offset bytes offset in data */
 unsigned long extract_bytes(unsigned long data, unsigned int offset,
@@ -598,6 +599,11 @@  int vgic_v3_has_attr_regs(struct kvm_device *dev, struct kvm_device_attr *attr)
 		nr_regions = ARRAY_SIZE(vgic_v3_rdbase_registers);
 		break;
 	}
+	case KVM_DEV_ARM_VGIC_CPU_SYSREGS: {
+		u64 reg;
+
+		return vgic_v3_has_cpu_sysregs_attr(vcpu, 0, cpuid, &reg);
+	}
 	default:
 		return -ENXIO;
 	}
diff --git a/virt/kvm/arm/vgic/vgic-sys-reg-v3.c b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c
new file mode 100644
index 0000000..581d053
--- /dev/null
+++ b/virt/kvm/arm/vgic/vgic-sys-reg-v3.c
@@ -0,0 +1,211 @@ 
+#include <linux/irqchip/arm-gic-v3.h>
+#include <linux/kvm.h>
+#include <linux/kvm_host.h>
+#include <kvm/iodev.h>
+#include <kvm/arm_vgic.h>
+#include <asm/kvm_emulate.h>
+#include <asm/kvm_arm.h>
+#include <asm/kvm_mmu.h>
+
+#include "vgic.h"
+#include "vgic-mmio.h"
+#include "sys_regs.h"
+
+static bool access_gic_ctlr(struct kvm_vcpu *vcpu, struct sys_reg_params *p,
+			    const struct sys_reg_desc *r)
+{
+	struct vgic_vmcr vmcr;
+
+	vgic_get_vmcr(vcpu, &vmcr);
+	if (p->is_write) {
+		vmcr.ctlr = (u32)p->regval;
+		vgic_set_vmcr(vcpu, &vmcr);
+	} else {
+		p->regval = vmcr.ctlr;
+	}
+
+	return true;
+}
+
+static bool access_gic_pmr(struct kvm_vcpu *vcpu, struct sys_reg_params *p,
+			   const struct sys_reg_desc *r)
+{
+	struct vgic_vmcr vmcr;
+
+	vgic_get_vmcr(vcpu, &vmcr);
+	if (p->is_write) {
+		vmcr.pmr = (u32)p->regval;
+		vgic_set_vmcr(vcpu, &vmcr);
+	} else {
+		p->regval = vmcr.pmr;
+	}
+
+	return true;
+}
+
+static bool access_gic_bpr0(struct kvm_vcpu *vcpu, struct sys_reg_params *p,
+			    const struct sys_reg_desc *r)
+{
+	struct vgic_vmcr vmcr;
+
+	vgic_get_vmcr(vcpu, &vmcr);
+	if (p->is_write) {
+		vmcr.bpr = (u32)p->regval;
+		vgic_set_vmcr(vcpu, &vmcr);
+	} else {
+		p->regval = vmcr.bpr;
+	}
+
+	return true;
+}
+
+static bool access_gic_bpr1(struct kvm_vcpu *vcpu, struct sys_reg_params *p,
+			    const struct sys_reg_desc *r)
+{
+	struct vgic_vmcr vmcr;
+
+	vgic_get_vmcr(vcpu, &vmcr);
+	if (p->is_write) {
+		vmcr.abpr = (u32)p->regval;
+		vgic_set_vmcr(vcpu, &vmcr);
+	} else {
+		p->regval = vmcr.abpr;
+	}
+
+	return true;
+}
+
+static bool access_gic_grpen0(struct kvm_vcpu *vcpu, struct sys_reg_params *p,
+			      const struct sys_reg_desc *r)
+{
+	struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;
+
+	if (p->is_write) {
+		vgicv3->vgic_vmcr &= ~ICH_VMCR_ENG0;
+		vgicv3->vgic_vmcr |= (p->regval << ICH_VMCR_ENG0_SHIFT) &
+				      ICH_VMCR_ENG0;
+	} else {
+		p->regval = (vgicv3->vgic_vmcr & ICH_VMCR_ENG0) >>
+			     ICH_VMCR_ENG0_SHIFT;
+	}
+
+	return true;
+}
+
+static bool access_gic_grpen1(struct kvm_vcpu *vcpu, struct sys_reg_params *p,
+			      const struct sys_reg_desc *r)
+{
+	struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;
+
+	if (p->is_write) {
+		vgicv3->vgic_vmcr &= ~ICH_VMCR_ENG1;
+		vgicv3->vgic_vmcr |= (p->regval << ICH_VMCR_ENG1_SHIFT) &
+				      ICH_VMCR_ENG1;
+	} else {
+		p->regval = (vgicv3->vgic_vmcr & ICH_VMCR_ENG1) >>
+			     ICH_VMCR_ENG1_SHIFT;
+	}
+
+	return true;
+}
+
+static bool access_gic_ap0r(struct kvm_vcpu *vcpu, struct sys_reg_params *p,
+			    const struct sys_reg_desc *r)
+{
+	struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;
+	u8 idx = r->Op2 & 3;
+
+	if (p->is_write)
+		vgicv3->vgic_ap0r[idx] = p->regval;
+	else
+		p->regval = vgicv3->vgic_ap0r[idx];
+
+	return true;
+}
+
+static bool access_gic_ap1r(struct kvm_vcpu *vcpu, struct sys_reg_params *p,
+			    const struct sys_reg_desc *r)
+{
+	struct vgic_v3_cpu_if *vgicv3 = &vcpu->arch.vgic_cpu.vgic_v3;
+	u8 idx = r->Op2 & 3;
+
+	if (p->is_write)
+		vgicv3->vgic_ap1r[idx] = p->regval;
+	else
+		p->regval = vgicv3->vgic_ap1r[idx];
+
+	return true;
+}
+
+static const struct sys_reg_desc gic_v3_icc_reg_descs[] = {
+	/* ICC_PMR_EL1 */
+	{ Op0(3), Op1(0), CRn(4), CRm(6), Op2(0), access_gic_pmr },
+	/* ICC_BPR0_EL1 */
+	{ Op0(3), Op1(0), CRn(12), CRm(8), Op2(3), access_gic_bpr0 },
+	/* ICC_AP0R0_EL1 */
+	{ Op0(3), Op1(0), CRn(12), CRm(8), Op2(4), access_gic_ap0r },
+	/* ICC_AP0R1_EL1 */
+	{ Op0(3), Op1(0), CRn(12), CRm(8), Op2(5), access_gic_ap0r },
+	/* ICC_AP0R2_EL1 */
+	{ Op0(3), Op1(0), CRn(12), CRm(8), Op2(6), access_gic_ap0r },
+	/* ICC_AP0R3_EL1 */
+	{ Op0(3), Op1(0), CRn(12), CRm(8), Op2(7), access_gic_ap0r },
+	/* ICC_AP1R0_EL1 */
+	{ Op0(3), Op1(0), CRn(12), CRm(9), Op2(0), access_gic_ap1r },
+	/* ICC_AP1R1_EL1 */
+	{ Op0(3), Op1(0), CRn(12), CRm(9), Op2(1), access_gic_ap1r },
+	/* ICC_AP1R2_EL1 */
+	{ Op0(3), Op1(0), CRn(12), CRm(9), Op2(2), access_gic_ap1r },
+	/* ICC_AP1R3_EL1 */
+	{ Op0(3), Op1(0), CRn(12), CRm(9), Op2(3), access_gic_ap1r },
+	/* ICC_BPR1_EL1 */
+	{ Op0(3), Op1(0), CRn(12), CRm(12), Op2(3), access_gic_bpr1 },
+	/* ICC_CTLR_EL1 */
+	{ Op0(3), Op1(0), CRn(12), CRm(12), Op2(4), access_gic_ctlr },
+	/* ICC_IGRPEN0_EL1 */
+	{ Op0(3), Op1(0), CRn(12), CRm(12), Op2(6), access_gic_grpen0 },
+	/* ICC_GRPEN1_EL1 */
+	{ Op0(3), Op1(0), CRn(12), CRm(12), Op2(7), access_gic_grpen1 },
+};
+
+int vgic_v3_has_cpu_sysregs_attr(struct kvm_vcpu *vcpu, bool is_write, u64 id,
+				u64 *reg)
+{
+	struct sys_reg_params params;
+
+	params.regval = le64_to_cpu(*reg);
+	params.is_write = is_write;
+	params.is_aarch32 = false;
+	params.is_32bit = false;
+
+	return find_reg_by_id(id, &params, gic_v3_icc_reg_descs,
+			      ARRAY_SIZE(gic_v3_icc_reg_descs)) ?
+		0 : -ENXIO;
+}
+
+int vgic_v3_cpu_sysregs_uaccess(struct kvm_vcpu *vcpu, bool is_write, u64 id,
+				u64 *reg)
+{
+	struct sys_reg_params params;
+	const struct sys_reg_desc *r;
+
+	if (is_write)
+		params.regval = le64_to_cpu(*reg);
+	params.is_write = is_write;
+	params.is_aarch32 = false;
+	params.is_32bit = false;
+
+	r = find_reg_by_id(id, &params, gic_v3_icc_reg_descs,
+			   ARRAY_SIZE(gic_v3_icc_reg_descs));
+	if (!r)
+		return -ENXIO;
+
+	if (!r->access(vcpu, &params, r))
+		return -EINVAL;
+
+	if (!is_write)
+		*reg = cpu_to_le64(params.regval);
+
+	return 0;
+}
+
diff --git a/virt/kvm/arm/vgic/vgic.h b/virt/kvm/arm/vgic/vgic.h
index 14e4ce5..20eab36c 100644
--- a/virt/kvm/arm/vgic/vgic.h
+++ b/virt/kvm/arm/vgic/vgic.h
@@ -96,6 +96,10 @@  int vgic_v3_dist_uaccess(struct kvm_vcpu *vcpu, bool is_write,
 			 int offset, u32 *val);
 int vgic_v3_redist_uaccess(struct kvm_vcpu *vcpu, bool is_write,
 			 int offset, u32 *val);
+int vgic_v3_cpu_sysregs_uaccess(struct kvm_vcpu *vcpu, bool is_write,
+			 u64 id, u64 *val);
+int vgic_v3_has_cpu_sysregs_attr(struct kvm_vcpu *vcpu, bool is_write, u64 id,
+				u64 *reg);
 #else
 static inline void vgic_v3_process_maintenance(struct kvm_vcpu *vcpu)
 {
@@ -169,6 +173,8 @@  static inline int vgic_its_inject_msi(struct kvm *kvm, struct kvm_msi *msi)
 #endif
 
 int kvm_register_vgic_device(unsigned long type);
+void vgic_set_vmcr(struct kvm_vcpu *vcpu, struct vgic_vmcr *vmcr);
+void vgic_get_vmcr(struct kvm_vcpu *vcpu, struct vgic_vmcr *vmcr);
 int vgic_lazy_init(struct kvm *kvm);
 int vgic_init(struct kvm *kvm);