Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp6726529rwd; Tue, 6 Jun 2023 00:41:20 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ6bw3b6GAYKEMLbB2tp3UYOMqNDodr8+Facbt6j7pElp2uiX1XOXHu+jjSbDNQyOxWw9sub X-Received: by 2002:a17:902:f68a:b0:1ac:85b0:1bd8 with SMTP id l10-20020a170902f68a00b001ac85b01bd8mr1836472plg.34.1686037280530; Tue, 06 Jun 2023 00:41:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1686037280; cv=none; d=google.com; s=arc-20160816; b=DYtSYFQhvMmzOro91XPvTSS3sRT7q7/i9wbc6j5H/3IGBriiXwtJYnkFhpD1iq4Zfa w4UgPNrGdKpAq0dhvsd4erVZ55Y1Yyt5OcDHN6/cMFxOvvrybIm1fCl9+ZHmdsIsDQsy 1LJRQ9a/goAzRWppdow+qcVBpMvq6UC5sJ4WZXfpFigJWsnXyku4VWbWRpMgkKk4IqBE hbfQgL4rhNAFnk5v6bakCmsTe91gHfDm7MI+lB0Yr+ib3VR+zu9FvrDvbDIuuGop8ULL JjwsQsBkZEO9Tcwr0iUhfHuTQeXEduYHabsAANTCKTHmOHZKHQP6eH6CqYHgqsYiqCXa YXcg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:cc:references:to :subject; bh=KuGDbeO9+q3arYUSxXikTirgRufuF6A1iRsUeYF6ACA=; b=lLiK/exKL4KNSyuQqxuEuW6DaSpnrIXSqWXJk51ldLaED3BRGQvQdbeoIIJe43Lj1+ ipYB8oltYZeA7zt+aywkGLI3VHPwmbEdHST2rpO/lMZu3SAmYcTZSPd4BC2eJyvMjvW5 1cYzpwmVe3PPhdxjCMfzFcc8BWvSeF9Z8L1lLKfbM4IrOBZDq7IoEVLlRjzDEZRfguHH Nis+zPIjepC7v6zjInXopuPbNRZ11yLgBJjAq3rFY8ac1SX/cKzb+2hRWgN4ZzaIjZUx 4NnRqL2wfPsQyjiot5BZbnFgTDitY1v4pnaNnrMC36RpCZgS5qeReTn/LF9yrslUhoXr 2Nlg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id jj1-20020a170903048100b001b03e56a51dsi6674021plb.29.2023.06.06.00.41.08; Tue, 06 Jun 2023 00:41:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235725AbjFFHA2 (ORCPT + 99 others); Tue, 6 Jun 2023 03:00:28 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55528 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235685AbjFFHAR (ORCPT ); Tue, 6 Jun 2023 03:00:17 -0400 Received: from mail.loongson.cn (mail.loongson.cn [114.242.206.163]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 1A63D1B8; Tue, 6 Jun 2023 00:00:14 -0700 (PDT) Received: from loongson.cn (unknown [192.168.100.1]) by gateway (Coremail) with SMTP id _____8DxDet92X5kDwcAAA--.198S3; Tue, 06 Jun 2023 15:00:13 +0800 (CST) Received: from [0.0.0.0] (unknown [192.168.100.1]) by localhost.localdomain (Coremail) with SMTP id AQAAf8AxJeR72X5kR+oBAA--.8393S3; Tue, 06 Jun 2023 15:00:12 +0800 (CST) Subject: Re: [PATCH v12 26/31] LoongArch: KVM: Implement kvm exception vector To: Tianrui Zhao References: <20230530015223.147755-1-zhaotianrui@loongson.cn> <20230530015223.147755-27-zhaotianrui@loongson.cn> Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org, Paolo Bonzini , Huacai Chen , WANG Xuerui , Greg Kroah-Hartman , loongarch@lists.linux.dev, Jens Axboe , Mark Brown , Alex Deucher , Oliver Upton , maobibo@loongson.cn, Xi Ruoyao From: Youling Tang Message-ID: Date: Tue, 6 Jun 2023 15:00:11 +0800 User-Agent: Mozilla/5.0 (X11; Linux mips64; rv:45.0) Gecko/20100101 Thunderbird/45.4.0 MIME-Version: 1.0 In-Reply-To: <20230530015223.147755-27-zhaotianrui@loongson.cn> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit X-CM-TRANSID: AQAAf8AxJeR72X5kR+oBAA--.8393S3 X-CM-SenderInfo: 5wdqw5prxox03j6o00pqjv00gofq/ X-Coremail-Antispam: 1Uk129KBj93XoWxJFyUtr1xJr4DKF47tFyDXFc_yoW5XF1kpF yfCw1akrWUWF12vFy2ka1qgr13C3yxKr17Wr4xG345uw4vqryrtrWvg393JF43KrykZF1x AayUJr15uF4UG3cCm3ZEXasCq-sJn29KB7ZKAUJUUUU3529EdanIXcx71UUUUU7KY7ZEXa sCq-sGcSsGvfJ3Ic02F40EFcxC0VAKzVAqx4xG6I80ebIjqfuFe4nvWSU5nxnvy29KBjDU 0xBIdaVrnRJUUUPab4IE77IF4wAFF20E14v26r1j6r4UM7CY07I20VC2zVCF04k26cxKx2 IYs7xG6rWj6s0DM7CIcVAFz4kK6r1Y6r17M28lY4IEw2IIxxk0rwA2F7IY1VAKz4vEj48v e4kI8wA2z4x0Y4vE2Ix0cI8IcVAFwI0_Xr0_Ar1l84ACjcxK6xIIjxv20xvEc7CjxVAFwI 0_Gr0_Cr1l84ACjcxK6I8E87Iv67AKxVW8Jr0_Cr1UM28EF7xvwVC2z280aVCY1x0267AK xVWxJr0_GcWln4kS14v26r126r1DM2AIxVAIcxkEcVAq07x20xvEncxIr21l57IF6xkI12 xvs2x26I8E6xACxx1l5I8CrVACY4xI64kE6c02F40Ex7xfMcIj6xIIjxv20xvE14v26r1q 6rW5McIj6I8E87Iv67AKxVWxJVW8Jr1lOx8S6xCaFVCjc4AY6r1j6r4UM4x0Y48IcVAKI4 8JMxk0xIA0c2IEe2xFo4CEbIxvr21lc7CjxVAaw2AFwI0_JF0_Jw1l42xK82IYc2Ij64vI r41l4I8I3I0E4IkC6x0Yz7v_Jr0_Gr1l4IxYO2xFxVAFwI0_JF0_Jw1lx2IqxVAqx4xG67 AKxVWUJVWUGwC20s026x8GjcxK67AKxVWUGVWUWwC2zVAF1VAY17CE14v26r1q6r43MIIY rxkI7VAKI48JMIIF0xvE2Ix0cI8IcVAFwI0_Gr0_Xr1lIxAIcVC0I7IYx2IY6xkF7I0E14 v26r4j6F4UMIIF0xvE42xK8VAvwI8IcIk0rVWUJVWUCwCI42IY6I8E87Iv67AKxVW8JVWx JwCI42IY6I8E87Iv6xkF7I0E14v26r4j6r4UJbIYCTnIWIevJa73UjIFyTuYvjxU28nYUU UUU X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,NICE_REPLY_A, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/30/2023 09:52 AM, Tianrui Zhao wrote: > Implement kvm exception vector, using _kvm_fault_tables array to save > the handle function pointer and it is used when vcpu handle exit. > > Signed-off-by: Tianrui Zhao > --- > arch/loongarch/kvm/exit.c | 48 +++++++++++++++++++++++++++++++++++++++ > 1 file changed, 48 insertions(+) > > diff --git a/arch/loongarch/kvm/exit.c b/arch/loongarch/kvm/exit.c > index 10f9922a7e76..625045fc95c8 100644 > --- a/arch/loongarch/kvm/exit.c > +++ b/arch/loongarch/kvm/exit.c > @@ -657,3 +657,51 @@ static int _kvm_handle_fpu_disabled(struct kvm_vcpu *vcpu) > kvm_own_fpu(vcpu); > return RESUME_GUEST; > } > + > +/* > + * Loongarch KVM callback handling for not implemented guest exiting > + */ > +static int _kvm_fault_ni(struct kvm_vcpu *vcpu) > +{ > + unsigned long estat, badv; > + unsigned int exccode, inst; > + > + /* > + * Fetch the instruction. > + */ > + badv = vcpu->arch.badv; > + estat = vcpu->arch.host_estat; > + exccode = (estat & CSR_ESTAT_EXC) >> CSR_ESTAT_EXC_SHIFT; > + inst = vcpu->arch.badi; > + kvm_err("Exccode: %d PC=%#lx inst=0x%08x BadVaddr=%#lx estat=%#lx\n", > + exccode, vcpu->arch.pc, inst, badv, read_gcsr_estat()); > + kvm_arch_vcpu_dump_regs(vcpu); > + vcpu->run->exit_reason = KVM_EXIT_INTERNAL_ERROR; > + > + return RESUME_HOST; > +} > + > +static exit_handle_fn _kvm_fault_tables[EXCCODE_INT_START] = { > + [EXCCODE_TLBL] = _kvm_handle_read_fault, > + [EXCCODE_TLBI] = _kvm_handle_read_fault, > + [EXCCODE_TLBNR] = _kvm_handle_read_fault, > + [EXCCODE_TLBNX] = _kvm_handle_read_fault, > + [EXCCODE_TLBS] = _kvm_handle_write_fault, > + [EXCCODE_TLBM] = _kvm_handle_write_fault, > + [EXCCODE_FPDIS] = _kvm_handle_fpu_disabled, > + [EXCCODE_GSPR] = _kvm_handle_gspr, > +}; It can be modified as follows and remove _kvm_init_fault(). static exit_handle_fn _kvm_fault_tables[EXCCODE_INT_START] = { [0 ... EXCCODE_INT_START - 1] = _kvm_fault_ni, [EXCCODE_TLBL] = _kvm_handle_read_fault, [EXCCODE_TLBI] = _kvm_handle_read_fault, [EXCCODE_TLBNR] = _kvm_handle_read_fault, [EXCCODE_TLBNX] = _kvm_handle_read_fault, [EXCCODE_TLBS] = _kvm_handle_write_fault, [EXCCODE_TLBM] = _kvm_handle_write_fault, [EXCCODE_FPDIS] = _kvm_handle_fpu_disabled, [EXCCODE_GSPR] = _kvm_handle_gspr, }; Thanks, Youling > + > +int _kvm_handle_fault(struct kvm_vcpu *vcpu, int fault) > +{ > + return _kvm_fault_tables[fault](vcpu); > +} > + > +void _kvm_init_fault(void) > +{ > + int i; > + > + for (i = 0; i < EXCCODE_INT_START; i++) > + if (!_kvm_fault_tables[i]) > + _kvm_fault_tables[i] = _kvm_fault_ni; > +} >