Hi Andreas,
On 06/05/14 16:51, Andreas Herrmann wrote:
> From: David Daney <[email protected]>
>
> So far this was tested with host running KVM using MIPS-VZ (on Cavium
> Octeon3). A paravirtualized mips kernel was used for the guest.
>
> [andreas.herrmann:
> * Renamed kvm__arch_periodic_poll to kvm__arch_read_term
> because of commit fa817d892508b6d3a90f478dbeedbe5583b14da7
> (kvm tools: remove periodic tick in favour of a polling thread)
> * Added ioport__map_irq skeleton to fix build problem.
> * Rely on TERM_MAX_DEVS instead of using other macros
> * Adaptions for MMIO support
> * Set coalesc offset
> * Fixed compile warnings]
>
> Signed-off-by: David Daney <[email protected]>
> Signed-off-by: Andreas Herrmann <[email protected]>
> +static bool kvm_cpu__hypercall_write_cons(struct kvm_cpu *vcpu)
> +{
> + int term = (int)vcpu->kvm_run->hypercall.args[0];
> + u64 addr = vcpu->kvm_run->hypercall.args[1];
> + int len = (int)vcpu->kvm_run->hypercall.args[2];
> + char *host_addr;
> +
> + if (term < 0 || term >= TERM_MAX_DEVS) {
> + pr_warning("hypercall_write_cons term out of range <%d>", term);
> + return false;
> + }
> + if (len <= 0) {
> + pr_warning("hypercall_write_cons len out of range <%d>", len);
> + return false;
> + }
> +
> + if ((addr & 0xffffffffc0000000ull) == 0xffffffff80000000ull)
> + addr &= 0x1ffffffful; /* Convert KSEG{0,1} to physical. */
> + if ((addr & 0xc000000000000000ull) == 0x8000000000000000ull)
> + addr &= 0x07ffffffffffffffull; /* Convert XKPHYS to pysical */
> +
> + host_addr = guest_flat_to_host(vcpu->kvm, addr);
> + if (!host_addr) {
> + pr_warning("hypercall_write_cons unmapped physaddr %llx",
> (unsigned long long)addr);
> + return false;
> + }
> +
> + term_putc(host_addr, len, term);
Does len need to be range checked?
> +void kvm_cpu__show_registers(struct kvm_cpu *vcpu)
> +{
> + struct kvm_regs regs;
> +
> + if (ioctl(vcpu->vcpu_fd, KVM_GET_REGS, ®s) < 0)
> + die("KVM_GET_REGS failed");
> + dprintf(debug_fd, "\n Registers:\n");
> + dprintf(debug_fd, " ----------\n");
> + dprintf(debug_fd, "$0 : %016lx %016lx %016lx %016lx\n",
> + (unsigned long)regs.gpr[0], (unsigned long)regs.gpr[1],
> + (unsigned long)regs.gpr[2], (unsigned long)regs.gpr[3]);
Presumably there's nothing stopping a 32-bit userland from creating a
64-bit guest? If that's the case should this all use unsigned long longs?
> + dprintf(debug_fd, "$4 : %016lx %016lx %016lx %016lx\n",
> + (unsigned long)regs.gpr[4], (unsigned long)regs.gpr[5],
> + (unsigned long)regs.gpr[6], (unsigned long)regs.gpr[7]);
> + dprintf(debug_fd, "$8 : %016lx %016lx %016lx %016lx\n",
> + (unsigned long)regs.gpr[8], (unsigned long)regs.gpr[9],
> + (unsigned long)regs.gpr[10], (unsigned long)regs.gpr[11]);
> + dprintf(debug_fd, "$12 : %016lx %016lx %016lx %016lx\n",
> + (unsigned long)regs.gpr[12], (unsigned long)regs.gpr[13],
> + (unsigned long)regs.gpr[14], (unsigned long)regs.gpr[15]);
> + dprintf(debug_fd, "$16 : %016lx %016lx %016lx %016lx\n",
> + (unsigned long)regs.gpr[16], (unsigned long)regs.gpr[17],
> + (unsigned long)regs.gpr[18], (unsigned long)regs.gpr[19]);
> + dprintf(debug_fd, "$20 : %016lx %016lx %016lx %016lx\n",
> + (unsigned long)regs.gpr[20], (unsigned long)regs.gpr[21],
> + (unsigned long)regs.gpr[22], (unsigned long)regs.gpr[23]);
> + dprintf(debug_fd, "$24 : %016lx %016lx %016lx %016lx\n",
> + (unsigned long)regs.gpr[24], (unsigned long)regs.gpr[25],
> + (unsigned long)regs.gpr[26], (unsigned long)regs.gpr[27]);
> + dprintf(debug_fd, "$28 : %016lx %016lx %016lx %016lx\n",
> + (unsigned long)regs.gpr[28], (unsigned long)regs.gpr[29],
> + (unsigned long)regs.gpr[30], (unsigned long)regs.gpr[31]);
> +
> + dprintf(debug_fd, "hi : %016lx\n", (unsigned long)regs.hi);
> + dprintf(debug_fd, "lo : %016lx\n", (unsigned long)regs.lo);
> + dprintf(debug_fd, "epc : %016lx\n", (unsigned long)regs.pc);
> +
> + dprintf(debug_fd, "\n");
> +}
Cheers
James
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html