From: Christoffer Dall <christoffer.dall@linaro.org>
To: zichao <zhichao.huang@linaro.org>
Cc: kvm@vger.kernel.org, linux-arm-kernel@lists.infradead.org,
kvmarm@lists.cs.columbia.edu, marc.zyngier@arm.com,
alex.bennee@linaro.org, will.deacon@arm.com,
huangzhichao@huawei.com
Subject: Re: [PATCH v3 04/11] KVM: arm: common infrastructure for handling AArch32 CP14/CP15
Date: Wed, 1 Jul 2015 11:00:36 +0200 [thread overview]
Message-ID: <20150701090036.GE11332@cbox> (raw)
In-Reply-To: <67A0000D-7F97-49E2-94A1-A6C89E45AA97@linaro.org>
On Wed, Jul 01, 2015 at 03:09:35PM +0800, zichao wrote:
>
>
> On June 30, 2015 3:43:34 AM GMT+08:00, Christoffer Dall <christoffer.dall@linaro.org> wrote:
> >On Mon, Jun 22, 2015 at 06:41:27PM +0800, Zhichao Huang wrote:
> >> As we're about to trap a bunch of CP14 registers, let's rework
> >> the CP15 handling so it can be generalized and work with multiple
> >> tables.
> >>
> >> Signed-off-by: Zhichao Huang <zhichao.huang@linaro.org>
> >> ---
> >> arch/arm/kvm/coproc.c | 176
> >++++++++++++++++++++++++++---------------
> >> arch/arm/kvm/interrupts_head.S | 2 +-
> >> 2 files changed, 112 insertions(+), 66 deletions(-)
> >>
> >> diff --git a/arch/arm/kvm/coproc.c b/arch/arm/kvm/coproc.c
> >> index 9d283d9..d23395b 100644
> >> --- a/arch/arm/kvm/coproc.c
> >> +++ b/arch/arm/kvm/coproc.c
> >> @@ -375,6 +375,9 @@ static const struct coproc_reg cp15_regs[] = {
> >> { CRn(15), CRm( 0), Op1( 4), Op2( 0), is32, access_cbar},
> >> };
> >>
> >> +static const struct coproc_reg cp14_regs[] = {
> >> +};
> >> +
> >> /* Target specific emulation tables */
> >> static struct kvm_coproc_target_table
> >*target_tables[KVM_ARM_NUM_TARGETS];
> >>
> >> @@ -424,47 +427,75 @@ static const struct coproc_reg *find_reg(const
> >struct coproc_params *params,
> >> return NULL;
> >> }
> >>
> >> -static int emulate_cp15(struct kvm_vcpu *vcpu,
> >> - const struct coproc_params *params)
> >> +/*
> >> + * emulate_cp -- tries to match a cp14/cp15 access in a handling
> >table,
> >> + * and call the corresponding trap handler.
> >> + *
> >> + * @params: pointer to the descriptor of the access
> >> + * @table: array of trap descriptors
> >> + * @num: size of the trap descriptor array
> >> + *
> >> + * Return 0 if the access has been handled, and -1 if not.
> >> + */
> >> +static int emulate_cp(struct kvm_vcpu *vcpu,
> >> + const struct coproc_params *params,
> >> + const struct coproc_reg *table,
> >> + size_t num)
> >> {
> >> - size_t num;
> >> - const struct coproc_reg *table, *r;
> >> -
> >> - trace_kvm_emulate_cp15_imp(params->Op1, params->Rt1, params->CRn,
> >> - params->CRm, params->Op2, params->is_write);
> >> + const struct coproc_reg *r;
> >>
> >> - table = get_target_table(vcpu->arch.target, &num);
> >> + if (!table)
> >> + return -1; /* Not handled */
> >>
> >> - /* Search target-specific then generic table. */
> >> r = find_reg(params, table, num);
> >> - if (!r)
> >> - r = find_reg(params, cp15_regs, ARRAY_SIZE(cp15_regs));
> >>
> >> - if (likely(r)) {
> >> + if (r) {
> >> /* If we don't have an accessor, we should never get here! */
> >> BUG_ON(!r->access);
> >>
> >> if (likely(r->access(vcpu, params, r))) {
> >> /* Skip instruction, since it was emulated */
> >> kvm_skip_instr(vcpu, kvm_vcpu_trap_il_is32bit(vcpu));
> >> - return 1;
> >> }
> >> - /* If access function fails, it should complain. */
> >> - } else {
> >> - kvm_err("Unsupported guest CP15 access at: %08lx\n",
> >> - *vcpu_pc(vcpu));
> >> - print_cp_instr(params);
> >> +
> >> + /* Handled */
> >> + return 0;
> >> }
> >> +
> >> + /* Not handled */
> >> + return -1;
> >> +}
> >> +
> >> +static void unhandled_cp_access(struct kvm_vcpu *vcpu,
> >> + const struct coproc_params *params)
> >> +{
> >> + u8 hsr_ec = kvm_vcpu_trap_get_class(vcpu);
> >> + int cp;
> >> +
> >> + switch (hsr_ec) {
> >> + case HSR_EC_CP15_32:
> >> + case HSR_EC_CP15_64:
> >> + cp = 15;
> >> + break;
> >> + case HSR_EC_CP14_MR:
> >> + case HSR_EC_CP14_64:
> >> + cp = 14;
> >> + break;
> >> + default:
> >> + WARN_ON((cp = -1));
> >> + }
> >> +
> >> + kvm_err("Unsupported guest CP%d access at: %08lx\n",
> >> + cp, *vcpu_pc(vcpu));
> >> + print_cp_instr(params);
> >> kvm_inject_undefined(vcpu);
> >> - return 1;
> >> }
> >>
> >> -/**
> >> - * kvm_handle_cp15_64 -- handles a mrrc/mcrr trap on a guest CP15
> >access
> >> - * @vcpu: The VCPU pointer
> >> - * @run: The kvm_run struct
> >> - */
> >> -int kvm_handle_cp15_64(struct kvm_vcpu *vcpu, struct kvm_run *run)
> >> +int kvm_handle_cp_64(struct kvm_vcpu *vcpu,
> >> + const struct coproc_reg *global,
> >> + size_t nr_global,
> >> + const struct coproc_reg *target_specific,
> >> + size_t nr_specific)
> >> {
> >> struct coproc_params params;
> >>
> >> @@ -478,7 +509,13 @@ int kvm_handle_cp15_64(struct kvm_vcpu *vcpu,
> >struct kvm_run *run)
> >> params.Rt2 = (kvm_vcpu_get_hsr(vcpu) >> 10) & 0xf;
> >> params.CRm = 0;
> >>
> >> - return emulate_cp15(vcpu, ¶ms);
> >> + if (!emulate_cp(vcpu, ¶ms, target_specific, nr_specific))
> >> + return 1;
> >> + if (!emulate_cp(vcpu, ¶ms, global, nr_global))
> >> + return 1;
> >> +
> >> + unhandled_cp_access(vcpu, ¶ms);
> >> + return 1;
> >> }
> >>
> >> static void reset_coproc_regs(struct kvm_vcpu *vcpu,
> >> @@ -491,12 +528,11 @@ static void reset_coproc_regs(struct kvm_vcpu
> >*vcpu,
> >> table[i].reset(vcpu, &table[i]);
> >> }
> >>
> >> -/**
> >> - * kvm_handle_cp15_32 -- handles a mrc/mcr trap on a guest CP15
> >access
> >> - * @vcpu: The VCPU pointer
> >> - * @run: The kvm_run struct
> >> - */
> >> -int kvm_handle_cp15_32(struct kvm_vcpu *vcpu, struct kvm_run *run)
> >> +int kvm_handle_cp_32(struct kvm_vcpu *vcpu,
> >> + const struct coproc_reg *global,
> >> + size_t nr_global,
> >> + const struct coproc_reg *target_specific,
> >> + size_t nr_specific)
> >> {
> >> struct coproc_params params;
> >>
> >> @@ -510,33 +546,57 @@ int kvm_handle_cp15_32(struct kvm_vcpu *vcpu,
> >struct kvm_run *run)
> >> params.Op2 = (kvm_vcpu_get_hsr(vcpu) >> 17) & 0x7;
> >> params.Rt2 = 0;
> >>
> >> - return emulate_cp15(vcpu, ¶ms);
> >> + if (!emulate_cp(vcpu, ¶ms, target_specific, nr_specific))
> >> + return 1;
> >> + if (!emulate_cp(vcpu, ¶ms, global, nr_global))
> >> + return 1;
> >> +
> >> + unhandled_cp_access(vcpu, ¶ms);
> >> + return 1;
> >> }
> >>
> >> /**
> >> - * kvm_handle_cp14_64 -- handles a mrrc/mcrr trap on a guest CP14
> >access
> >> + * kvm_handle_cp15_64 -- handles a mrrc/mcrr trap on a guest CP15
> >access
> >> * @vcpu: The VCPU pointer
> >> * @run: The kvm_run struct
> >> */
> >> -int kvm_handle_cp14_64(struct kvm_vcpu *vcpu, struct kvm_run *run)
> >> +int kvm_handle_cp15_64(struct kvm_vcpu *vcpu, struct kvm_run *run)
> >> {
> >> - struct coproc_params params;
> >> + const struct coproc_reg *target_specific;
> >> + size_t num;
> >>
> >> - params.CRn = (kvm_vcpu_get_hsr(vcpu) >> 1) & 0xf;
> >> - params.Rt1 = (kvm_vcpu_get_hsr(vcpu) >> 5) & 0xf;
> >> - params.is_write = ((kvm_vcpu_get_hsr(vcpu) & 1) == 0);
> >> - params.is_64bit = true;
> >> + target_specific = get_target_table(vcpu->arch.target, &num);
> >> + return kvm_handle_cp_64(vcpu,
> >> + cp15_regs, ARRAY_SIZE(cp15_regs),
> >> + target_specific, num);
> >> +}
> >>
> >> - params.Op1 = (kvm_vcpu_get_hsr(vcpu) >> 16) & 0xf;
> >> - params.Op2 = 0;
> >> - params.Rt2 = (kvm_vcpu_get_hsr(vcpu) >> 10) & 0xf;
> >> - params.CRm = 0;
> >> +/**
> >> + * kvm_handle_cp15_32 -- handles a mrc/mcr trap on a guest CP15
> >access
> >> + * @vcpu: The VCPU pointer
> >> + * @run: The kvm_run struct
> >> + */
> >> +int kvm_handle_cp15_32(struct kvm_vcpu *vcpu, struct kvm_run *run)
> >> +{
> >> + const struct coproc_reg *target_specific;
> >> + size_t num;
> >>
> >> - (void)trap_raz_wi(vcpu, ¶ms, NULL);
> >> + target_specific = get_target_table(vcpu->arch.target, &num);
> >> + return kvm_handle_cp_32(vcpu,
> >> + cp15_regs, ARRAY_SIZE(cp15_regs),
> >> + target_specific, num);
> >> +}
> >>
> >> - /* handled */
> >> - kvm_skip_instr(vcpu, kvm_vcpu_trap_il_is32bit(vcpu));
> >> - return 1;
> >> +/**
> >> + * kvm_handle_cp14_64 -- handles a mrrc/mcrr trap on a guest CP14
> >access
> >> + * @vcpu: The VCPU pointer
> >> + * @run: The kvm_run struct
> >> + */
> >> +int kvm_handle_cp14_64(struct kvm_vcpu *vcpu, struct kvm_run *run)
> >> +{
> >> + return kvm_handle_cp_64(vcpu,
> >> + cp14_regs, ARRAY_SIZE(cp14_regs),
> >> + NULL, 0);
> >> }
> >>
> >> /**
> >> @@ -546,23 +606,9 @@ int kvm_handle_cp14_64(struct kvm_vcpu *vcpu,
> >struct kvm_run *run)
> >> */
> >> int kvm_handle_cp14_32(struct kvm_vcpu *vcpu, struct kvm_run *run)
> >> {
> >> - struct coproc_params params;
> >> -
> >> - params.CRm = (kvm_vcpu_get_hsr(vcpu) >> 1) & 0xf;
> >> - params.Rt1 = (kvm_vcpu_get_hsr(vcpu) >> 5) & 0xf;
> >> - params.is_write = ((kvm_vcpu_get_hsr(vcpu) & 1) == 0);
> >> - params.is_64bit = false;
> >> -
> >> - params.CRn = (kvm_vcpu_get_hsr(vcpu) >> 10) & 0xf;
> >> - params.Op1 = (kvm_vcpu_get_hsr(vcpu) >> 14) & 0x7;
> >> - params.Op2 = (kvm_vcpu_get_hsr(vcpu) >> 17) & 0x7;
> >> - params.Rt2 = 0;
> >> -
> >> - (void)trap_raz_wi(vcpu, ¶ms, NULL);
> >> -
> >> - /* handled */
> >> - kvm_skip_instr(vcpu, kvm_vcpu_trap_il_is32bit(vcpu));
> >> - return 1;
> >> + return kvm_handle_cp_32(vcpu,
> >> + cp14_regs, ARRAY_SIZE(cp14_regs),
> >> + NULL, 0);
> >> }
> >>
> >>
> >/******************************************************************************
> >> diff --git a/arch/arm/kvm/interrupts_head.S
> >b/arch/arm/kvm/interrupts_head.S
> >> index f85c447..a20b9ad 100644
> >> --- a/arch/arm/kvm/interrupts_head.S
> >> +++ b/arch/arm/kvm/interrupts_head.S
> >> @@ -618,7 +618,7 @@ ARM_BE8(rev r6, r6 )
> >> * (hardware reset value is 0) */
> >> .macro set_hdcr operation
> >> mrc p15, 4, r2, c1, c1, 1
> >> - ldr r3, =(HDCR_TPM|HDCR_TPMCR|HDCR_TDRA|HDCR_TDOSA|HDCR_TDA)
> >> + ldr r3, =(HDCR_TPM|HDCR_TPMCR)
> >
> >why do we stop trapping accesses here?
>
> Because we didn't finish our trap handlers yet, if we keep the trapping enable here, the vm would not run normally as we use unhandled_cp_access in the trap handlers instead of trap_raz_wi.
>
> I enable trapping until everything is ok, in the last patch [11/11].
>
ok, I see. Feels a bit quirky, but ok.
-Christoffer
WARNING: multiple messages have this Message-ID (diff)
From: christoffer.dall@linaro.org (Christoffer Dall)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v3 04/11] KVM: arm: common infrastructure for handling AArch32 CP14/CP15
Date: Wed, 1 Jul 2015 11:00:36 +0200 [thread overview]
Message-ID: <20150701090036.GE11332@cbox> (raw)
In-Reply-To: <67A0000D-7F97-49E2-94A1-A6C89E45AA97@linaro.org>
On Wed, Jul 01, 2015 at 03:09:35PM +0800, zichao wrote:
>
>
> On June 30, 2015 3:43:34 AM GMT+08:00, Christoffer Dall <christoffer.dall@linaro.org> wrote:
> >On Mon, Jun 22, 2015 at 06:41:27PM +0800, Zhichao Huang wrote:
> >> As we're about to trap a bunch of CP14 registers, let's rework
> >> the CP15 handling so it can be generalized and work with multiple
> >> tables.
> >>
> >> Signed-off-by: Zhichao Huang <zhichao.huang@linaro.org>
> >> ---
> >> arch/arm/kvm/coproc.c | 176
> >++++++++++++++++++++++++++---------------
> >> arch/arm/kvm/interrupts_head.S | 2 +-
> >> 2 files changed, 112 insertions(+), 66 deletions(-)
> >>
> >> diff --git a/arch/arm/kvm/coproc.c b/arch/arm/kvm/coproc.c
> >> index 9d283d9..d23395b 100644
> >> --- a/arch/arm/kvm/coproc.c
> >> +++ b/arch/arm/kvm/coproc.c
> >> @@ -375,6 +375,9 @@ static const struct coproc_reg cp15_regs[] = {
> >> { CRn(15), CRm( 0), Op1( 4), Op2( 0), is32, access_cbar},
> >> };
> >>
> >> +static const struct coproc_reg cp14_regs[] = {
> >> +};
> >> +
> >> /* Target specific emulation tables */
> >> static struct kvm_coproc_target_table
> >*target_tables[KVM_ARM_NUM_TARGETS];
> >>
> >> @@ -424,47 +427,75 @@ static const struct coproc_reg *find_reg(const
> >struct coproc_params *params,
> >> return NULL;
> >> }
> >>
> >> -static int emulate_cp15(struct kvm_vcpu *vcpu,
> >> - const struct coproc_params *params)
> >> +/*
> >> + * emulate_cp -- tries to match a cp14/cp15 access in a handling
> >table,
> >> + * and call the corresponding trap handler.
> >> + *
> >> + * @params: pointer to the descriptor of the access
> >> + * @table: array of trap descriptors
> >> + * @num: size of the trap descriptor array
> >> + *
> >> + * Return 0 if the access has been handled, and -1 if not.
> >> + */
> >> +static int emulate_cp(struct kvm_vcpu *vcpu,
> >> + const struct coproc_params *params,
> >> + const struct coproc_reg *table,
> >> + size_t num)
> >> {
> >> - size_t num;
> >> - const struct coproc_reg *table, *r;
> >> -
> >> - trace_kvm_emulate_cp15_imp(params->Op1, params->Rt1, params->CRn,
> >> - params->CRm, params->Op2, params->is_write);
> >> + const struct coproc_reg *r;
> >>
> >> - table = get_target_table(vcpu->arch.target, &num);
> >> + if (!table)
> >> + return -1; /* Not handled */
> >>
> >> - /* Search target-specific then generic table. */
> >> r = find_reg(params, table, num);
> >> - if (!r)
> >> - r = find_reg(params, cp15_regs, ARRAY_SIZE(cp15_regs));
> >>
> >> - if (likely(r)) {
> >> + if (r) {
> >> /* If we don't have an accessor, we should never get here! */
> >> BUG_ON(!r->access);
> >>
> >> if (likely(r->access(vcpu, params, r))) {
> >> /* Skip instruction, since it was emulated */
> >> kvm_skip_instr(vcpu, kvm_vcpu_trap_il_is32bit(vcpu));
> >> - return 1;
> >> }
> >> - /* If access function fails, it should complain. */
> >> - } else {
> >> - kvm_err("Unsupported guest CP15 access at: %08lx\n",
> >> - *vcpu_pc(vcpu));
> >> - print_cp_instr(params);
> >> +
> >> + /* Handled */
> >> + return 0;
> >> }
> >> +
> >> + /* Not handled */
> >> + return -1;
> >> +}
> >> +
> >> +static void unhandled_cp_access(struct kvm_vcpu *vcpu,
> >> + const struct coproc_params *params)
> >> +{
> >> + u8 hsr_ec = kvm_vcpu_trap_get_class(vcpu);
> >> + int cp;
> >> +
> >> + switch (hsr_ec) {
> >> + case HSR_EC_CP15_32:
> >> + case HSR_EC_CP15_64:
> >> + cp = 15;
> >> + break;
> >> + case HSR_EC_CP14_MR:
> >> + case HSR_EC_CP14_64:
> >> + cp = 14;
> >> + break;
> >> + default:
> >> + WARN_ON((cp = -1));
> >> + }
> >> +
> >> + kvm_err("Unsupported guest CP%d access at: %08lx\n",
> >> + cp, *vcpu_pc(vcpu));
> >> + print_cp_instr(params);
> >> kvm_inject_undefined(vcpu);
> >> - return 1;
> >> }
> >>
> >> -/**
> >> - * kvm_handle_cp15_64 -- handles a mrrc/mcrr trap on a guest CP15
> >access
> >> - * @vcpu: The VCPU pointer
> >> - * @run: The kvm_run struct
> >> - */
> >> -int kvm_handle_cp15_64(struct kvm_vcpu *vcpu, struct kvm_run *run)
> >> +int kvm_handle_cp_64(struct kvm_vcpu *vcpu,
> >> + const struct coproc_reg *global,
> >> + size_t nr_global,
> >> + const struct coproc_reg *target_specific,
> >> + size_t nr_specific)
> >> {
> >> struct coproc_params params;
> >>
> >> @@ -478,7 +509,13 @@ int kvm_handle_cp15_64(struct kvm_vcpu *vcpu,
> >struct kvm_run *run)
> >> params.Rt2 = (kvm_vcpu_get_hsr(vcpu) >> 10) & 0xf;
> >> params.CRm = 0;
> >>
> >> - return emulate_cp15(vcpu, ¶ms);
> >> + if (!emulate_cp(vcpu, ¶ms, target_specific, nr_specific))
> >> + return 1;
> >> + if (!emulate_cp(vcpu, ¶ms, global, nr_global))
> >> + return 1;
> >> +
> >> + unhandled_cp_access(vcpu, ¶ms);
> >> + return 1;
> >> }
> >>
> >> static void reset_coproc_regs(struct kvm_vcpu *vcpu,
> >> @@ -491,12 +528,11 @@ static void reset_coproc_regs(struct kvm_vcpu
> >*vcpu,
> >> table[i].reset(vcpu, &table[i]);
> >> }
> >>
> >> -/**
> >> - * kvm_handle_cp15_32 -- handles a mrc/mcr trap on a guest CP15
> >access
> >> - * @vcpu: The VCPU pointer
> >> - * @run: The kvm_run struct
> >> - */
> >> -int kvm_handle_cp15_32(struct kvm_vcpu *vcpu, struct kvm_run *run)
> >> +int kvm_handle_cp_32(struct kvm_vcpu *vcpu,
> >> + const struct coproc_reg *global,
> >> + size_t nr_global,
> >> + const struct coproc_reg *target_specific,
> >> + size_t nr_specific)
> >> {
> >> struct coproc_params params;
> >>
> >> @@ -510,33 +546,57 @@ int kvm_handle_cp15_32(struct kvm_vcpu *vcpu,
> >struct kvm_run *run)
> >> params.Op2 = (kvm_vcpu_get_hsr(vcpu) >> 17) & 0x7;
> >> params.Rt2 = 0;
> >>
> >> - return emulate_cp15(vcpu, ¶ms);
> >> + if (!emulate_cp(vcpu, ¶ms, target_specific, nr_specific))
> >> + return 1;
> >> + if (!emulate_cp(vcpu, ¶ms, global, nr_global))
> >> + return 1;
> >> +
> >> + unhandled_cp_access(vcpu, ¶ms);
> >> + return 1;
> >> }
> >>
> >> /**
> >> - * kvm_handle_cp14_64 -- handles a mrrc/mcrr trap on a guest CP14
> >access
> >> + * kvm_handle_cp15_64 -- handles a mrrc/mcrr trap on a guest CP15
> >access
> >> * @vcpu: The VCPU pointer
> >> * @run: The kvm_run struct
> >> */
> >> -int kvm_handle_cp14_64(struct kvm_vcpu *vcpu, struct kvm_run *run)
> >> +int kvm_handle_cp15_64(struct kvm_vcpu *vcpu, struct kvm_run *run)
> >> {
> >> - struct coproc_params params;
> >> + const struct coproc_reg *target_specific;
> >> + size_t num;
> >>
> >> - params.CRn = (kvm_vcpu_get_hsr(vcpu) >> 1) & 0xf;
> >> - params.Rt1 = (kvm_vcpu_get_hsr(vcpu) >> 5) & 0xf;
> >> - params.is_write = ((kvm_vcpu_get_hsr(vcpu) & 1) == 0);
> >> - params.is_64bit = true;
> >> + target_specific = get_target_table(vcpu->arch.target, &num);
> >> + return kvm_handle_cp_64(vcpu,
> >> + cp15_regs, ARRAY_SIZE(cp15_regs),
> >> + target_specific, num);
> >> +}
> >>
> >> - params.Op1 = (kvm_vcpu_get_hsr(vcpu) >> 16) & 0xf;
> >> - params.Op2 = 0;
> >> - params.Rt2 = (kvm_vcpu_get_hsr(vcpu) >> 10) & 0xf;
> >> - params.CRm = 0;
> >> +/**
> >> + * kvm_handle_cp15_32 -- handles a mrc/mcr trap on a guest CP15
> >access
> >> + * @vcpu: The VCPU pointer
> >> + * @run: The kvm_run struct
> >> + */
> >> +int kvm_handle_cp15_32(struct kvm_vcpu *vcpu, struct kvm_run *run)
> >> +{
> >> + const struct coproc_reg *target_specific;
> >> + size_t num;
> >>
> >> - (void)trap_raz_wi(vcpu, ¶ms, NULL);
> >> + target_specific = get_target_table(vcpu->arch.target, &num);
> >> + return kvm_handle_cp_32(vcpu,
> >> + cp15_regs, ARRAY_SIZE(cp15_regs),
> >> + target_specific, num);
> >> +}
> >>
> >> - /* handled */
> >> - kvm_skip_instr(vcpu, kvm_vcpu_trap_il_is32bit(vcpu));
> >> - return 1;
> >> +/**
> >> + * kvm_handle_cp14_64 -- handles a mrrc/mcrr trap on a guest CP14
> >access
> >> + * @vcpu: The VCPU pointer
> >> + * @run: The kvm_run struct
> >> + */
> >> +int kvm_handle_cp14_64(struct kvm_vcpu *vcpu, struct kvm_run *run)
> >> +{
> >> + return kvm_handle_cp_64(vcpu,
> >> + cp14_regs, ARRAY_SIZE(cp14_regs),
> >> + NULL, 0);
> >> }
> >>
> >> /**
> >> @@ -546,23 +606,9 @@ int kvm_handle_cp14_64(struct kvm_vcpu *vcpu,
> >struct kvm_run *run)
> >> */
> >> int kvm_handle_cp14_32(struct kvm_vcpu *vcpu, struct kvm_run *run)
> >> {
> >> - struct coproc_params params;
> >> -
> >> - params.CRm = (kvm_vcpu_get_hsr(vcpu) >> 1) & 0xf;
> >> - params.Rt1 = (kvm_vcpu_get_hsr(vcpu) >> 5) & 0xf;
> >> - params.is_write = ((kvm_vcpu_get_hsr(vcpu) & 1) == 0);
> >> - params.is_64bit = false;
> >> -
> >> - params.CRn = (kvm_vcpu_get_hsr(vcpu) >> 10) & 0xf;
> >> - params.Op1 = (kvm_vcpu_get_hsr(vcpu) >> 14) & 0x7;
> >> - params.Op2 = (kvm_vcpu_get_hsr(vcpu) >> 17) & 0x7;
> >> - params.Rt2 = 0;
> >> -
> >> - (void)trap_raz_wi(vcpu, ¶ms, NULL);
> >> -
> >> - /* handled */
> >> - kvm_skip_instr(vcpu, kvm_vcpu_trap_il_is32bit(vcpu));
> >> - return 1;
> >> + return kvm_handle_cp_32(vcpu,
> >> + cp14_regs, ARRAY_SIZE(cp14_regs),
> >> + NULL, 0);
> >> }
> >>
> >>
> >/******************************************************************************
> >> diff --git a/arch/arm/kvm/interrupts_head.S
> >b/arch/arm/kvm/interrupts_head.S
> >> index f85c447..a20b9ad 100644
> >> --- a/arch/arm/kvm/interrupts_head.S
> >> +++ b/arch/arm/kvm/interrupts_head.S
> >> @@ -618,7 +618,7 @@ ARM_BE8(rev r6, r6 )
> >> * (hardware reset value is 0) */
> >> .macro set_hdcr operation
> >> mrc p15, 4, r2, c1, c1, 1
> >> - ldr r3, =(HDCR_TPM|HDCR_TPMCR|HDCR_TDRA|HDCR_TDOSA|HDCR_TDA)
> >> + ldr r3, =(HDCR_TPM|HDCR_TPMCR)
> >
> >why do we stop trapping accesses here?
>
> Because we didn't finish our trap handlers yet, if we keep the trapping enable here, the vm would not run normally as we use unhandled_cp_access in the trap handlers instead of trap_raz_wi.
>
> I enable trapping until everything is ok, in the last patch [11/11].
>
ok, I see. Feels a bit quirky, but ok.
-Christoffer
next prev parent reply other threads:[~2015-07-01 9:00 UTC|newest]
Thread overview: 82+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-06-22 10:41 [PATCH v3 00/11] KVM: arm: debug infrastructure support Zhichao Huang
2015-06-22 10:41 ` Zhichao Huang
2015-06-22 10:41 ` [PATCH v3 01/11] KVM: arm: plug guest debug exploit Zhichao Huang
2015-06-22 10:41 ` Zhichao Huang
2015-06-22 10:41 ` Zhichao Huang
2015-06-29 15:49 ` Christoffer Dall
2015-06-29 15:49 ` Christoffer Dall
2015-07-01 7:04 ` zichao
2015-07-01 7:04 ` zichao
2015-07-01 9:00 ` Christoffer Dall
2015-07-01 9:00 ` Christoffer Dall
2015-07-01 9:00 ` Christoffer Dall
2015-06-22 10:41 ` [PATCH v3 02/11] KVM: arm: rename pm_fake handler to trap_raz_wi Zhichao Huang
2015-06-22 10:41 ` Zhichao Huang
2015-06-30 13:20 ` Christoffer Dall
2015-06-30 13:20 ` Christoffer Dall
2015-06-22 10:41 ` [PATCH v3 03/11] KVM: arm: enable to use the ARM_DSCR_MDBGEN macro from KVM assembly code Zhichao Huang
2015-06-22 10:41 ` Zhichao Huang
2015-06-30 13:20 ` Christoffer Dall
2015-06-30 13:20 ` Christoffer Dall
2015-06-22 10:41 ` [PATCH v3 04/11] KVM: arm: common infrastructure for handling AArch32 CP14/CP15 Zhichao Huang
2015-06-22 10:41 ` Zhichao Huang
2015-06-29 19:43 ` Christoffer Dall
2015-06-29 19:43 ` Christoffer Dall
2015-07-01 7:09 ` zichao
2015-07-01 7:09 ` zichao
2015-07-01 9:00 ` Christoffer Dall [this message]
2015-07-01 9:00 ` Christoffer Dall
2015-06-22 10:41 ` [PATCH v3 05/11] KVM: arm: check ordering of all system register tables Zhichao Huang
2015-06-22 10:41 ` Zhichao Huang
2015-06-30 13:20 ` Christoffer Dall
2015-06-30 13:20 ` Christoffer Dall
2015-06-22 10:41 ` [PATCH v3 06/11] KVM: arm: add trap handlers for 32-bit debug registers Zhichao Huang
2015-06-22 10:41 ` Zhichao Huang
2015-06-29 21:16 ` Christoffer Dall
2015-06-29 21:16 ` Christoffer Dall
2015-07-01 7:14 ` zichao
2015-07-01 7:14 ` zichao
2015-06-22 10:41 ` [PATCH v3 07/11] KVM: arm: add trap handlers for 64-bit " Zhichao Huang
2015-06-22 10:41 ` Zhichao Huang
2015-06-30 13:20 ` Christoffer Dall
2015-06-30 13:20 ` Christoffer Dall
2015-07-01 7:43 ` Zhichao Huang
2015-07-01 7:43 ` Zhichao Huang
2015-06-22 10:41 ` [PATCH v3 08/11] KVM: arm: implement dirty bit mechanism for " Zhichao Huang
2015-06-22 10:41 ` Zhichao Huang
2015-06-30 9:20 ` Christoffer Dall
2015-06-30 9:20 ` Christoffer Dall
2015-07-03 9:54 ` Zhichao Huang
2015-07-03 9:54 ` Zhichao Huang
2015-07-03 11:56 ` Christoffer Dall
2015-07-03 11:56 ` Christoffer Dall
2015-07-07 10:06 ` Zhichao Huang
2015-07-07 10:06 ` Zhichao Huang
2015-07-07 10:24 ` Will Deacon
2015-07-07 10:24 ` Will Deacon
2015-07-08 10:50 ` Zhichao Huang
2015-07-08 10:50 ` Zhichao Huang
2015-07-08 17:08 ` Will Deacon
2015-07-08 17:08 ` Will Deacon
2015-07-09 12:54 ` Zhichao Huang
2015-07-09 12:54 ` Zhichao Huang
2015-07-09 11:50 ` Christoffer Dall
2015-07-09 11:50 ` Christoffer Dall
2015-07-13 12:12 ` zichao
2015-07-13 12:12 ` zichao
2015-06-22 10:41 ` [PATCH v3 09/11] KVM: arm: implement lazy world switch " Zhichao Huang
2015-06-22 10:41 ` Zhichao Huang
2015-06-30 13:15 ` Christoffer Dall
2015-06-30 13:15 ` Christoffer Dall
2015-07-03 10:06 ` Zhichao Huang
2015-07-03 10:06 ` Zhichao Huang
2015-07-03 21:05 ` Christoffer Dall
2015-07-03 21:05 ` Christoffer Dall
2015-06-22 10:41 ` [PATCH v3 10/11] KVM: arm: add a trace event for cp14 traps Zhichao Huang
2015-06-22 10:41 ` Zhichao Huang
2015-06-30 13:20 ` Christoffer Dall
2015-06-30 13:20 ` Christoffer Dall
2015-06-22 10:41 ` [PATCH v3 11/11] KVM: arm: enable trapping of all debug registers Zhichao Huang
2015-06-22 10:41 ` Zhichao Huang
2015-06-30 13:19 ` Christoffer Dall
2015-06-30 13:19 ` Christoffer Dall
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20150701090036.GE11332@cbox \
--to=christoffer.dall@linaro.org \
--cc=alex.bennee@linaro.org \
--cc=huangzhichao@huawei.com \
--cc=kvm@vger.kernel.org \
--cc=kvmarm@lists.cs.columbia.edu \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=marc.zyngier@arm.com \
--cc=will.deacon@arm.com \
--cc=zhichao.huang@linaro.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.