Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp6102786ybi; Wed, 31 Jul 2019 08:23:12 -0700 (PDT) X-Google-Smtp-Source: APXvYqzanF0rb17/u7YtjvPwBNoi3b8xFn+N0tH/G7gnbk7cIZXTK1jzBq28SGnsAIX/PuxVHt48 X-Received: by 2002:a62:3895:: with SMTP id f143mr47427658pfa.116.1564586592255; Wed, 31 Jul 2019 08:23:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564586592; cv=none; d=google.com; s=arc-20160816; b=c9QwkAKa1HrxkbbRlpkYbkKojg0H8dVwQsO9JQydCX9FgwEGqwpDjXKIG8DrxadigB MHH3MnK+L6KJlkluuvML2jTA4KRX6JZBH8KKFKB4uIBAPrjNslU9VHy4TLyEbMNvWqnZ K8jpq9jUJgzLg5714khS4kb/6VwHIjKJV1hkK86bKSNPfLf2P3y6HFbAYg8Ljc2TSSNr p3a23uW6+AVZKU2rBcnL3v3zUrFw+oOOYNBT4EVOpzcXarmFQpLvTvO82rApPV0rcqu1 5DIaoqShS+UPsFFzvtT5z/z4/RmBienhClkLuUzeUwFDfwktjHtJ34bmfGqQqnQPE+Ry Ruiw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=sPa3yJQgnMuv90HGi3HT4TgCyjEehRsxQ/fk2Ww2AX8=; b=XX/9u1XFvJJhMhF3kz8/EU4FZGDYn+JqEg+nMIoiIO7ZGneWQ89o5OjL8vGhkN6dpp PLU2zCohDpJdSz754vKpuq01FL/dzNK2glRwjyFN9a7Isb/7pjukmPMO8IiiSD0aPmIy jLEawyHCy72BhiI2iwAMPvSxtCHrK6D34aKsiNkZsfZe1iyXDjDFwh/0ktUFu7MorwZz 6ZTkX2ySNQGoEoF2VRle0zyzfIgeuAjGWmjwrEsZZtBGPESvLSjrIHL5babpI3IapKHP apEdBvPm1jUci3/IwFeP+8nZHogubB0nJ4TJXih9WlidMGpD+06d7eLf7A1MDnEcijd2 SCYA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x35si29156186pga.337.2019.07.31.08.22.56; Wed, 31 Jul 2019 08:23:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729957AbfGaOnn (ORCPT + 99 others); Wed, 31 Jul 2019 10:43:43 -0400 Received: from mx1.redhat.com ([209.132.183.28]:44212 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727779AbfGaOnm (ORCPT ); Wed, 31 Jul 2019 10:43:42 -0400 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 02BBA5859E; Wed, 31 Jul 2019 14:43:42 +0000 (UTC) Received: from kamzik.brq.redhat.com (unknown [10.43.2.160]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 05F80600C4; Wed, 31 Jul 2019 14:43:34 +0000 (UTC) Date: Wed, 31 Jul 2019 16:43:32 +0200 From: Andrew Jones To: Thomas Huth Cc: kvm@vger.kernel.org, Christian Borntraeger , Janosch Frank , linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, linux-s390@vger.kernel.org, David Hildenbrand , Paolo Bonzini , Peter Xu Subject: Re: [PATCH v2 1/3] KVM: selftests: Split ucall.c into architecture specific files Message-ID: <20190731144332.yjrrwbqvl7lmudiz@kamzik.brq.redhat.com> References: <20190731133216.5620-1-thuth@redhat.com> <20190731133216.5620-2-thuth@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190731133216.5620-2-thuth@redhat.com> User-Agent: NeoMutt/20180716 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.39]); Wed, 31 Jul 2019 14:43:42 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jul 31, 2019 at 03:32:14PM +0200, Thomas Huth wrote: > The way we exit from a guest to userspace is very specific to the > architecture: On x86, we use PIO, on aarch64 we are using MMIO and on > s390x we're going to use an instruction instead. The possibility to > select a type via the ucall_type_t enum is currently also completely > unused, so the code in ucall.c currently looks more complex than > required. Let's split this up into architecture specific ucall.c > files instead, so we can get rid of the #ifdefs and the unnecessary > ucall_type_t handling. > > Signed-off-by: Thomas Huth > --- > tools/testing/selftests/kvm/Makefile | 6 +- > tools/testing/selftests/kvm/dirty_log_test.c | 2 +- > .../testing/selftests/kvm/include/kvm_util.h | 8 +- > .../testing/selftests/kvm/lib/aarch64/ucall.c | 112 +++++++++++++ > tools/testing/selftests/kvm/lib/ucall.c | 157 ------------------ > .../testing/selftests/kvm/lib/x86_64/ucall.c | 56 +++++++ > 6 files changed, 173 insertions(+), 168 deletions(-) > create mode 100644 tools/testing/selftests/kvm/lib/aarch64/ucall.c > delete mode 100644 tools/testing/selftests/kvm/lib/ucall.c > create mode 100644 tools/testing/selftests/kvm/lib/x86_64/ucall.c > > diff --git a/tools/testing/selftests/kvm/Makefile b/tools/testing/selftests/kvm/Makefile > index ba7849751989..a51e3b83df40 100644 > --- a/tools/testing/selftests/kvm/Makefile > +++ b/tools/testing/selftests/kvm/Makefile > @@ -7,9 +7,9 @@ top_srcdir = ../../../.. > KSFT_KHDR_INSTALL := 1 > UNAME_M := $(shell uname -m) > > -LIBKVM = lib/assert.c lib/elf.c lib/io.c lib/kvm_util.c lib/ucall.c lib/sparsebit.c > -LIBKVM_x86_64 = lib/x86_64/processor.c lib/x86_64/vmx.c > -LIBKVM_aarch64 = lib/aarch64/processor.c > +LIBKVM = lib/assert.c lib/elf.c lib/io.c lib/kvm_util.c lib/sparsebit.c > +LIBKVM_x86_64 = lib/x86_64/processor.c lib/x86_64/vmx.c lib/x86_64/ucall.c > +LIBKVM_aarch64 = lib/aarch64/processor.c lib/aarch64/ucall.c > LIBKVM_s390x = lib/s390x/processor.c > > TEST_GEN_PROGS_x86_64 = x86_64/cr4_cpuid_sync_test > diff --git a/tools/testing/selftests/kvm/dirty_log_test.c b/tools/testing/selftests/kvm/dirty_log_test.c > index ceb52b952637..5d5ae1be4984 100644 > --- a/tools/testing/selftests/kvm/dirty_log_test.c > +++ b/tools/testing/selftests/kvm/dirty_log_test.c > @@ -337,7 +337,7 @@ static void run_test(enum vm_guest_mode mode, unsigned long iterations, > vcpu_set_cpuid(vm, VCPU_ID, kvm_get_supported_cpuid()); > #endif > #ifdef __aarch64__ > - ucall_init(vm, UCALL_MMIO, NULL); > + ucall_init(vm, NULL); > #endif > > /* Export the shared variables to the guest */ > diff --git a/tools/testing/selftests/kvm/include/kvm_util.h b/tools/testing/selftests/kvm/include/kvm_util.h > index e0e66b115ef2..5463b7896a0a 100644 > --- a/tools/testing/selftests/kvm/include/kvm_util.h > +++ b/tools/testing/selftests/kvm/include/kvm_util.h > @@ -165,12 +165,6 @@ int vm_create_device(struct kvm_vm *vm, struct kvm_create_device *cd); > memcpy(&(g), _p, sizeof(g)); \ > }) > > -/* ucall implementation types */ > -typedef enum { > - UCALL_PIO, > - UCALL_MMIO, > -} ucall_type_t; > - > /* Common ucalls */ > enum { > UCALL_NONE, > @@ -186,7 +180,7 @@ struct ucall { > uint64_t args[UCALL_MAX_ARGS]; > }; > > -void ucall_init(struct kvm_vm *vm, ucall_type_t type, void *arg); > +void ucall_init(struct kvm_vm *vm, void *arg); > void ucall_uninit(struct kvm_vm *vm); > void ucall(uint64_t cmd, int nargs, ...); > uint64_t get_ucall(struct kvm_vm *vm, uint32_t vcpu_id, struct ucall *uc); > diff --git a/tools/testing/selftests/kvm/lib/aarch64/ucall.c b/tools/testing/selftests/kvm/lib/aarch64/ucall.c > new file mode 100644 > index 000000000000..f69f951a48c0 > --- /dev/null > +++ b/tools/testing/selftests/kvm/lib/aarch64/ucall.c > @@ -0,0 +1,112 @@ > +// SPDX-License-Identifier: GPL-2.0 > +/* > + * ucall support. A ucall is a "hypercall to userspace". > + * > + * Copyright (C) 2018, Red Hat, Inc. > + */ > +#include "kvm_util.h" > +#include "kvm_util_internal.h" This needs to be #include "../kvm_util_internal.h" otherwise we get lib/aarch64/ucall.c:8:10: fatal error: kvm_util_internal.h: No such file or directory #include "kvm_util_internal.h" With that change compilation completes and the tests run. Thanks, drew > + > +static vm_vaddr_t *ucall_exit_mmio_addr; > + > +static bool ucall_mmio_init(struct kvm_vm *vm, vm_paddr_t gpa) > +{ > + if (kvm_userspace_memory_region_find(vm, gpa, gpa + 1)) > + return false; > + > + virt_pg_map(vm, gpa, gpa, 0); > + > + ucall_exit_mmio_addr = (vm_vaddr_t *)gpa; > + sync_global_to_guest(vm, ucall_exit_mmio_addr); > + > + return true; > +} > + > +void ucall_init(struct kvm_vm *vm, void *arg) > +{ > + vm_paddr_t gpa, start, end, step, offset; > + unsigned int bits; > + bool ret; > + > + if (arg) { > + gpa = (vm_paddr_t)arg; > + ret = ucall_mmio_init(vm, gpa); > + TEST_ASSERT(ret, "Can't set ucall mmio address to %lx", gpa); > + return; > + } > + > + /* > + * Find an address within the allowed physical and virtual address > + * spaces, that does _not_ have a KVM memory region associated with > + * it. Identity mapping an address like this allows the guest to > + * access it, but as KVM doesn't know what to do with it, it > + * will assume it's something userspace handles and exit with > + * KVM_EXIT_MMIO. Well, at least that's how it works for AArch64. > + * Here we start with a guess that the addresses around 5/8th > + * of the allowed space are unmapped and then work both down and > + * up from there in 1/16th allowed space sized steps. > + * > + * Note, we need to use VA-bits - 1 when calculating the allowed > + * virtual address space for an identity mapping because the upper > + * half of the virtual address space is the two's complement of the > + * lower and won't match physical addresses. > + */ > + bits = vm->va_bits - 1; > + bits = vm->pa_bits < bits ? vm->pa_bits : bits; > + end = 1ul << bits; > + start = end * 5 / 8; > + step = end / 16; > + for (offset = 0; offset < end - start; offset += step) { > + if (ucall_mmio_init(vm, start - offset)) > + return; > + if (ucall_mmio_init(vm, start + offset)) > + return; > + } > + TEST_ASSERT(false, "Can't find a ucall mmio address"); > +} > + > +void ucall_uninit(struct kvm_vm *vm) > +{ > + ucall_exit_mmio_addr = 0; > + sync_global_to_guest(vm, ucall_exit_mmio_addr); > +} > + > +void ucall(uint64_t cmd, int nargs, ...) > +{ > + struct ucall uc = { > + .cmd = cmd, > + }; > + va_list va; > + int i; > + > + nargs = nargs <= UCALL_MAX_ARGS ? nargs : UCALL_MAX_ARGS; > + > + va_start(va, nargs); > + for (i = 0; i < nargs; ++i) > + uc.args[i] = va_arg(va, uint64_t); > + va_end(va); > + > + *ucall_exit_mmio_addr = (vm_vaddr_t)&uc; > +} > + > +uint64_t get_ucall(struct kvm_vm *vm, uint32_t vcpu_id, struct ucall *uc) > +{ > + struct kvm_run *run = vcpu_state(vm, vcpu_id); > + struct ucall ucall = {}; > + > + if (run->exit_reason == KVM_EXIT_MMIO && > + run->mmio.phys_addr == (uint64_t)ucall_exit_mmio_addr) { > + vm_vaddr_t gva; > + > + TEST_ASSERT(run->mmio.is_write && run->mmio.len == 8, > + "Unexpected ucall exit mmio address access"); > + memcpy(&gva, run->mmio.data, sizeof(gva)); > + memcpy(&ucall, addr_gva2hva(vm, gva), sizeof(ucall)); > + > + vcpu_run_complete_io(vm, vcpu_id); > + if (uc) > + memcpy(uc, &ucall, sizeof(ucall)); > + } > + > + return ucall.cmd; > +} > diff --git a/tools/testing/selftests/kvm/lib/ucall.c b/tools/testing/selftests/kvm/lib/ucall.c > deleted file mode 100644 > index dd9a66700f96..000000000000 > --- a/tools/testing/selftests/kvm/lib/ucall.c > +++ /dev/null > @@ -1,157 +0,0 @@ > -// SPDX-License-Identifier: GPL-2.0 > -/* > - * ucall support. A ucall is a "hypercall to userspace". > - * > - * Copyright (C) 2018, Red Hat, Inc. > - */ > -#include "kvm_util.h" > -#include "kvm_util_internal.h" > - > -#define UCALL_PIO_PORT ((uint16_t)0x1000) > - > -static ucall_type_t ucall_type; > -static vm_vaddr_t *ucall_exit_mmio_addr; > - > -static bool ucall_mmio_init(struct kvm_vm *vm, vm_paddr_t gpa) > -{ > - if (kvm_userspace_memory_region_find(vm, gpa, gpa + 1)) > - return false; > - > - virt_pg_map(vm, gpa, gpa, 0); > - > - ucall_exit_mmio_addr = (vm_vaddr_t *)gpa; > - sync_global_to_guest(vm, ucall_exit_mmio_addr); > - > - return true; > -} > - > -void ucall_init(struct kvm_vm *vm, ucall_type_t type, void *arg) > -{ > - ucall_type = type; > - sync_global_to_guest(vm, ucall_type); > - > - if (type == UCALL_PIO) > - return; > - > - if (type == UCALL_MMIO) { > - vm_paddr_t gpa, start, end, step, offset; > - unsigned bits; > - bool ret; > - > - if (arg) { > - gpa = (vm_paddr_t)arg; > - ret = ucall_mmio_init(vm, gpa); > - TEST_ASSERT(ret, "Can't set ucall mmio address to %lx", gpa); > - return; > - } > - > - /* > - * Find an address within the allowed physical and virtual address > - * spaces, that does _not_ have a KVM memory region associated with > - * it. Identity mapping an address like this allows the guest to > - * access it, but as KVM doesn't know what to do with it, it > - * will assume it's something userspace handles and exit with > - * KVM_EXIT_MMIO. Well, at least that's how it works for AArch64. > - * Here we start with a guess that the addresses around 5/8th > - * of the allowed space are unmapped and then work both down and > - * up from there in 1/16th allowed space sized steps. > - * > - * Note, we need to use VA-bits - 1 when calculating the allowed > - * virtual address space for an identity mapping because the upper > - * half of the virtual address space is the two's complement of the > - * lower and won't match physical addresses. > - */ > - bits = vm->va_bits - 1; > - bits = vm->pa_bits < bits ? vm->pa_bits : bits; > - end = 1ul << bits; > - start = end * 5 / 8; > - step = end / 16; > - for (offset = 0; offset < end - start; offset += step) { > - if (ucall_mmio_init(vm, start - offset)) > - return; > - if (ucall_mmio_init(vm, start + offset)) > - return; > - } > - TEST_ASSERT(false, "Can't find a ucall mmio address"); > - } > -} > - > -void ucall_uninit(struct kvm_vm *vm) > -{ > - ucall_type = 0; > - sync_global_to_guest(vm, ucall_type); > - ucall_exit_mmio_addr = 0; > - sync_global_to_guest(vm, ucall_exit_mmio_addr); > -} > - > -static void ucall_pio_exit(struct ucall *uc) > -{ > -#ifdef __x86_64__ > - asm volatile("in %[port], %%al" > - : : [port] "d" (UCALL_PIO_PORT), "D" (uc) : "rax"); > -#endif > -} > - > -static void ucall_mmio_exit(struct ucall *uc) > -{ > - *ucall_exit_mmio_addr = (vm_vaddr_t)uc; > -} > - > -void ucall(uint64_t cmd, int nargs, ...) > -{ > - struct ucall uc = { > - .cmd = cmd, > - }; > - va_list va; > - int i; > - > - nargs = nargs <= UCALL_MAX_ARGS ? nargs : UCALL_MAX_ARGS; > - > - va_start(va, nargs); > - for (i = 0; i < nargs; ++i) > - uc.args[i] = va_arg(va, uint64_t); > - va_end(va); > - > - switch (ucall_type) { > - case UCALL_PIO: > - ucall_pio_exit(&uc); > - break; > - case UCALL_MMIO: > - ucall_mmio_exit(&uc); > - break; > - }; > -} > - > -uint64_t get_ucall(struct kvm_vm *vm, uint32_t vcpu_id, struct ucall *uc) > -{ > - struct kvm_run *run = vcpu_state(vm, vcpu_id); > - struct ucall ucall = {}; > - bool got_ucall = false; > - > -#ifdef __x86_64__ > - if (ucall_type == UCALL_PIO && run->exit_reason == KVM_EXIT_IO && > - run->io.port == UCALL_PIO_PORT) { > - struct kvm_regs regs; > - vcpu_regs_get(vm, vcpu_id, ®s); > - memcpy(&ucall, addr_gva2hva(vm, (vm_vaddr_t)regs.rdi), sizeof(ucall)); > - got_ucall = true; > - } > -#endif > - if (ucall_type == UCALL_MMIO && run->exit_reason == KVM_EXIT_MMIO && > - run->mmio.phys_addr == (uint64_t)ucall_exit_mmio_addr) { > - vm_vaddr_t gva; > - TEST_ASSERT(run->mmio.is_write && run->mmio.len == 8, > - "Unexpected ucall exit mmio address access"); > - memcpy(&gva, run->mmio.data, sizeof(gva)); > - memcpy(&ucall, addr_gva2hva(vm, gva), sizeof(ucall)); > - got_ucall = true; > - } > - > - if (got_ucall) { > - vcpu_run_complete_io(vm, vcpu_id); > - if (uc) > - memcpy(uc, &ucall, sizeof(ucall)); > - } > - > - return ucall.cmd; > -} > diff --git a/tools/testing/selftests/kvm/lib/x86_64/ucall.c b/tools/testing/selftests/kvm/lib/x86_64/ucall.c > new file mode 100644 > index 000000000000..4bfc9a90b1de > --- /dev/null > +++ b/tools/testing/selftests/kvm/lib/x86_64/ucall.c > @@ -0,0 +1,56 @@ > +// SPDX-License-Identifier: GPL-2.0 > +/* > + * ucall support. A ucall is a "hypercall to userspace". > + * > + * Copyright (C) 2018, Red Hat, Inc. > + */ > +#include "kvm_util.h" > + > +#define UCALL_PIO_PORT ((uint16_t)0x1000) > + > +void ucall_init(struct kvm_vm *vm, void *arg) > +{ > +} > + > +void ucall_uninit(struct kvm_vm *vm) > +{ > +} > + > +void ucall(uint64_t cmd, int nargs, ...) > +{ > + struct ucall uc = { > + .cmd = cmd, > + }; > + va_list va; > + int i; > + > + nargs = nargs <= UCALL_MAX_ARGS ? nargs : UCALL_MAX_ARGS; > + > + va_start(va, nargs); > + for (i = 0; i < nargs; ++i) > + uc.args[i] = va_arg(va, uint64_t); > + va_end(va); > + > + asm volatile("in %[port], %%al" > + : : [port] "d" (UCALL_PIO_PORT), "D" (&uc) : "rax"); > +} > + > +uint64_t get_ucall(struct kvm_vm *vm, uint32_t vcpu_id, struct ucall *uc) > +{ > + struct kvm_run *run = vcpu_state(vm, vcpu_id); > + struct ucall ucall = {}; > + > + if (run->exit_reason == KVM_EXIT_IO && run->io.port == UCALL_PIO_PORT) { > + struct kvm_regs regs; > + > + vcpu_regs_get(vm, vcpu_id, ®s); > + memcpy(&ucall, addr_gva2hva(vm, (vm_vaddr_t)regs.rdi), > + sizeof(ucall)); > + > + vcpu_run_complete_io(vm, vcpu_id); > + if (uc) > + memcpy(uc, &ucall, sizeof(ucall)); > + } > + > + return ucall.cmd; > +} > -- > 2.21.0 >