On 12/22/2010 10:44 AM, Sheng Yang wrote:
Then we can support mask bit operation of assigned devices now.
@@ -3817,14 +3819,16 @@ static int emulator_write_emulated_onepage(unsigned
long addr,
mmio:
trace_kvm_mmio(KVM_TRACE_MMIO_WRITE, bytes, gpa, *(u64 *)val);
+ r = vcpu_mmio_write(vcpu, gpa, bytes, val);
/*
* Is this MMIO handled locally?
*/
- if (!vcpu_mmio_write(vcpu, gpa, bytes, val))
+ if (!r)
return X86EMUL_CONTINUE;
vcpu->mmio_needed = 1;
- vcpu->run->exit_reason = KVM_EXIT_MMIO;
+ vcpu->run->exit_reason = (r == -ENOTSYNC) ?
+ KVM_EXIT_MSIX_ROUTING_UPDATE : KVM_EXIT_MMIO;
This isn't very pretty, exit_reason should be written in
vcpu_mmio_write(). I guess we can refactor it later.
+#define KVM_MSIX_MMIO_TYPE_ASSIGNED_DEV (1<< 0)
+
+#define KVM_MSIX_MMIO_TYPE_BASE_TABLE (1<< 8)
+#define KVM_MSIX_MMIO_TYPE_BASE_PBA (1<< 9)
+
+#define KVM_MSIX_MMIO_TYPE_DEV_MASK 0x00ff
+#define KVM_MSIX_MMIO_TYPE_BASE_MASK 0xff00
Any explanation of these?
+struct kvm_msix_mmio_user {
+ __u32 dev_id;
+ __u16 type;
+ __u16 max_entries_nr;
+ __u64 base_addr;
+ __u64 base_va;
+ __u64 flags;
+ __u64 reserved[4];
+};
+
+int kvm_assigned_device_update_msix_mask_bit(struct kvm *kvm,
+ int assigned_dev_id, int entry, u32 flag)
+{
Need a better name for 'flag' (and make it a bool).
+ int r = -EFAULT;
+ struct kvm_assigned_dev_kernel *adev;
+ int i;
+
+ if (!irqchip_in_kernel(kvm))
+ return r;
+
+ mutex_lock(&kvm->lock);
+ adev = kvm_find_assigned_dev(&kvm->arch.assigned_dev_head,
+ assigned_dev_id);
+ if (!adev)
+ goto out;
+
+ for (i = 0; i< adev->entries_nr; i++)
+ if (adev->host_msix_entries[i].entry == entry) {
+ if (flag)
+ disable_irq_nosync(
+ adev->host_msix_entries[i].vector);
+ else
+ enable_irq(adev->host_msix_entries[i].vector);
+ r = 0;
+ break;
+ }
+out:
+ mutex_unlock(&kvm->lock);
+ return r;
+}
@@ -1988,6 +2008,12 @@ static int kvm_dev_ioctl_create_vm(void)
return r;
}
#endif
+ r = kvm_register_msix_mmio_dev(kvm);
+ if (r< 0) {
+ kvm_put_kvm(kvm);
+ return r;
+ }
Shouldn't this be part of individual KVM_REGISTER_MSIX_MMIO calls?
+static int msix_table_mmio_read(struct kvm_io_device *this, gpa_t addr, int
len,
+ void *val)
+{
+ struct kvm_msix_mmio_dev *mmio_dev =
+ container_of(this, struct kvm_msix_mmio_dev, table_dev);
+ struct kvm_msix_mmio *mmio;
+ int idx, ret = 0, entry, offset, r;
+
+ mutex_lock(&mmio_dev->lock);
+ idx = get_mmio_table_index(mmio_dev, addr, len);
+ if (idx< 0) {
+ ret = -EOPNOTSUPP;
+ goto out;
+ }
+ if ((addr& 0x3) || (len != 4&& len != 8))
+ goto out;
What about (addr & 4) && (len == 8)? Is it supported? It may cross entry
boundaries.
+ mmio =&mmio_dev->mmio[idx];
+
+ entry = (addr - mmio->table_base_addr) / PCI_MSIX_ENTRY_SIZE;
+ offset = addr& 0xf;
+ r = copy_from_user(val, (void *)(mmio->table_base_va +
+ entry * PCI_MSIX_ENTRY_SIZE + offset), len);
+ if (r)
+ goto out;
+out:
+ mutex_unlock(&mmio_dev->lock);
+ return ret;
+}
+
+static int msix_table_mmio_write(struct kvm_io_device *this, gpa_t addr,
+ int len, const void *val)
+{
+ struct kvm_msix_mmio_dev *mmio_dev =
+ container_of(this, struct kvm_msix_mmio_dev, table_dev);
+ struct kvm_msix_mmio *mmio;
+ int idx, entry, offset, ret = 0, r = 0;
+ gpa_t entry_base;
+ u32 old_ctrl, new_ctrl;
+
+ mutex_lock(&mmio_dev->lock);
+ idx = get_mmio_table_index(mmio_dev, addr, len);
+ if (idx< 0) {
+ ret = -EOPNOTSUPP;
+ goto out;
+ }
+ if ((addr& 0x3) || (len != 4&& len != 8))
+ goto out;
+ mmio =&mmio_dev->mmio[idx];
+ entry = (addr - mmio->table_base_addr) / PCI_MSIX_ENTRY_SIZE;
+ entry_base = mmio->table_base_va + entry * PCI_MSIX_ENTRY_SIZE;
+ offset = addr& 0xF;
+
+ if (copy_from_user(&old_ctrl,
+ entry_base + PCI_MSIX_ENTRY_VECTOR_CTRL,
+ sizeof old_ctrl))
+ goto out;
get_user() is easier.
+
+ /* No allow writing to other fields when entry is unmasked */
+ if (!(old_ctrl& PCI_MSIX_ENTRY_CTRL_MASKBIT)&&
+ offset != PCI_MSIX_ENTRY_VECTOR_CTRL)
+ goto out;
+
+ if (copy_to_user(entry_base + offset, val, len))
+ goto out;
+
+ if (copy_from_user(&new_ctrl,
+ entry_base + PCI_MSIX_ENTRY_VECTOR_CTRL,
+ sizeof new_ctrl))
+ goto out;
put_user()
+
+ if ((offset< PCI_MSIX_ENTRY_VECTOR_CTRL&& len == 4) ||
+ (offset< PCI_MSIX_ENTRY_DATA&& len == 8))
+ ret = -ENOTSYNC;
+ if (old_ctrl == new_ctrl)
+ goto out;
+ if (!(old_ctrl& PCI_MSIX_ENTRY_CTRL_MASKBIT)&&
+ (new_ctrl& PCI_MSIX_ENTRY_CTRL_MASKBIT))
+ r = update_msix_mask_bit(mmio_dev->kvm, mmio, entry, 1);
+ else if ((old_ctrl& PCI_MSIX_ENTRY_CTRL_MASKBIT)&&
+ !(new_ctrl& PCI_MSIX_ENTRY_CTRL_MASKBIT))
+ r = update_msix_mask_bit(mmio_dev->kvm, mmio, entry, 0);
+ if (r || ret)
+ ret = -ENOTSYNC;
+out:
+ mutex_unlock(&mmio_dev->lock);
+ return ret;
+}
blank line...
+static const struct kvm_io_device_ops msix_mmio_table_ops = {
+ .read = msix_table_mmio_read,
+ .write = msix_table_mmio_write,
+};
+
++
+int kvm_vm_ioctl_register_msix_mmio(struct kvm *kvm,
+ struct kvm_msix_mmio_user *mmio_user)
+{
+ struct kvm_msix_mmio_dev *mmio_dev =&kvm->msix_mmio_dev;
+ struct kvm_msix_mmio *mmio = NULL;
+ int r = 0, i;
+
+ mutex_lock(&mmio_dev->lock);
+ for (i = 0; i< mmio_dev->mmio_nr; i++) {
+ if (mmio_dev->mmio[i].dev_id == mmio_user->dev_id&&
+ (mmio_dev->mmio[i].type& KVM_MSIX_MMIO_TYPE_DEV_MASK) ==
+ (mmio_user->type& KVM_MSIX_MMIO_TYPE_DEV_MASK)) {
+ mmio =&mmio_dev->mmio[i];
+ if (mmio->max_entries_nr != mmio_user->max_entries_nr) {
+ r = -EINVAL;
+ goto out;
+ }
+ break;
+ }
+ }
+ if (!mmio) {
+ if (mmio_dev->mmio_nr == KVM_MSIX_MMIO_MAX) {
+ r = -ENOSPC;
+ goto out;
+ }
+ mmio =&mmio_dev->mmio[mmio_dev->mmio_nr];
+ mmio_dev->mmio_nr++;
+ }
+ mmio->max_entries_nr = mmio_user->max_entries_nr;
Sanity check to avoid overflow.
+ mmio->dev_id = mmio_user->dev_id;
+ mmio->flags = mmio_user->flags;
Check for unsupported bits (all of them at present?)
+ if ((mmio_user->type& KVM_MSIX_MMIO_TYPE_DEV_MASK) ==
+ KVM_MSIX_MMIO_TYPE_ASSIGNED_DEV)
+ mmio->type = KVM_MSIX_MMIO_TYPE_ASSIGNED_DEV;
+
+ if ((mmio_user->type& KVM_MSIX_MMIO_TYPE_BASE_MASK) ==
+ KVM_MSIX_MMIO_TYPE_BASE_TABLE) {
+ mmio->type |= KVM_MSIX_MMIO_TYPE_BASE_TABLE;
+ mmio->table_base_addr = mmio_user->base_addr;
+ mmio->table_base_va = mmio_user->base_va;
Check for va in kernel space.
+ } else if ((mmio_user->type& KVM_MSIX_MMIO_TYPE_BASE_MASK) ==
+ KVM_MSIX_MMIO_TYPE_BASE_PBA) {
+ mmio->type |= KVM_MSIX_MMIO_TYPE_BASE_PBA;
+ mmio->pba_base_addr = mmio_user->base_addr;
+ mmio->pba_base_va = mmio_user->base_va;
+ }
+out:
+ mutex_unlock(&mmio_dev->lock);
+ return r;
+}
+
+
In all, looks reasonable. I'd like to see documentation for it, and
review from the pci people. Alex, mst?
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html